|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#include "curl_setup.h" |
|
|
|
|
|
#ifdef USE_GNUTLS |
|
|
|
|
|
#include <gnutls/abstract.h> |
|
|
#include <gnutls/gnutls.h> |
|
|
#include <gnutls/x509.h> |
|
|
#include <gnutls/crypto.h> |
|
|
#include <nettle/sha2.h> |
|
|
|
|
|
#include "urldata.h" |
|
|
#include "sendf.h" |
|
|
#include "inet_pton.h" |
|
|
#include "keylog.h" |
|
|
#include "gtls.h" |
|
|
#include "vtls.h" |
|
|
#include "vtls_int.h" |
|
|
#include "vauth/vauth.h" |
|
|
#include "parsedate.h" |
|
|
#include "connect.h" |
|
|
#include "progress.h" |
|
|
#include "select.h" |
|
|
#include "strcase.h" |
|
|
#include "warnless.h" |
|
|
#include "x509asn1.h" |
|
|
#include "multiif.h" |
|
|
#include "curl_printf.h" |
|
|
#include "curl_memory.h" |
|
|
|
|
|
#include "memdebug.h" |
|
|
|
|
|
#ifndef ARRAYSIZE |
|
|
#define ARRAYSIZE(A) (sizeof(A)/sizeof((A)[0])) |
|
|
#endif |
|
|
|
|
|
#define QUIC_PRIORITY \ |
|
|
"NORMAL:-VERS-ALL:+VERS-TLS1.3:-CIPHER-ALL:+AES-128-GCM:+AES-256-GCM:" \ |
|
|
"+CHACHA20-POLY1305:+AES-128-CCM:-GROUP-ALL:+GROUP-SECP256R1:" \ |
|
|
"+GROUP-X25519:+GROUP-SECP384R1:+GROUP-SECP521R1:" \ |
|
|
"%DISABLE_TLS13_COMPAT_MODE" |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef GTLSDEBUG |
|
|
static void tls_log_func(int level, const char *str) |
|
|
{ |
|
|
fprintf(stderr, "|<%d>| %s", level, str); |
|
|
} |
|
|
#endif |
|
|
static bool gtls_inited = FALSE; |
|
|
|
|
|
#if !defined(GNUTLS_VERSION_NUMBER) || (GNUTLS_VERSION_NUMBER < 0x03010a) |
|
|
#error "too old GnuTLS version" |
|
|
#endif |
|
|
|
|
|
# include <gnutls/ocsp.h> |
|
|
|
|
|
struct gtls_ssl_backend_data { |
|
|
struct gtls_ctx gtls; |
|
|
}; |
|
|
|
|
|
static ssize_t gtls_push(void *s, const void *buf, size_t blen) |
|
|
{ |
|
|
struct Curl_cfilter *cf = s; |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
struct Curl_easy *data = CF_DATA_CURRENT(cf); |
|
|
ssize_t nwritten; |
|
|
CURLcode result; |
|
|
|
|
|
DEBUGASSERT(data); |
|
|
nwritten = Curl_conn_cf_send(cf->next, data, buf, blen, FALSE, &result); |
|
|
CURL_TRC_CF(data, cf, "gtls_push(len=%zu) -> %zd, err=%d", |
|
|
blen, nwritten, result); |
|
|
backend->gtls.io_result = result; |
|
|
if(nwritten < 0) { |
|
|
gnutls_transport_set_errno(backend->gtls.session, |
|
|
(CURLE_AGAIN == result) ? EAGAIN : EINVAL); |
|
|
nwritten = -1; |
|
|
} |
|
|
return nwritten; |
|
|
} |
|
|
|
|
|
static ssize_t gtls_pull(void *s, void *buf, size_t blen) |
|
|
{ |
|
|
struct Curl_cfilter *cf = s; |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
struct Curl_easy *data = CF_DATA_CURRENT(cf); |
|
|
ssize_t nread; |
|
|
CURLcode result; |
|
|
|
|
|
DEBUGASSERT(data); |
|
|
if(!backend->gtls.shared_creds->trust_setup) { |
|
|
result = Curl_gtls_client_trust_setup(cf, data, &backend->gtls); |
|
|
if(result) { |
|
|
gnutls_transport_set_errno(backend->gtls.session, EINVAL); |
|
|
backend->gtls.io_result = result; |
|
|
return -1; |
|
|
} |
|
|
} |
|
|
|
|
|
nread = Curl_conn_cf_recv(cf->next, data, buf, blen, &result); |
|
|
CURL_TRC_CF(data, cf, "glts_pull(len=%zu) -> %zd, err=%d", |
|
|
blen, nread, result); |
|
|
backend->gtls.io_result = result; |
|
|
if(nread < 0) { |
|
|
gnutls_transport_set_errno(backend->gtls.session, |
|
|
(CURLE_AGAIN == result) ? EAGAIN : EINVAL); |
|
|
nread = -1; |
|
|
} |
|
|
else if(nread == 0) |
|
|
connssl->peer_closed = TRUE; |
|
|
return nread; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static int gtls_init(void) |
|
|
{ |
|
|
int ret = 1; |
|
|
if(!gtls_inited) { |
|
|
ret = gnutls_global_init() ? 0 : 1; |
|
|
#ifdef GTLSDEBUG |
|
|
gnutls_global_set_log_function(tls_log_func); |
|
|
gnutls_global_set_log_level(2); |
|
|
#endif |
|
|
gtls_inited = TRUE; |
|
|
} |
|
|
return ret; |
|
|
} |
|
|
|
|
|
static void gtls_cleanup(void) |
|
|
{ |
|
|
if(gtls_inited) { |
|
|
gnutls_global_deinit(); |
|
|
gtls_inited = FALSE; |
|
|
} |
|
|
} |
|
|
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS |
|
|
static void showtime(struct Curl_easy *data, |
|
|
const char *text, |
|
|
time_t stamp) |
|
|
{ |
|
|
struct tm buffer; |
|
|
const struct tm *tm = &buffer; |
|
|
char str[96]; |
|
|
CURLcode result = Curl_gmtime(stamp, &buffer); |
|
|
if(result) |
|
|
return; |
|
|
|
|
|
msnprintf(str, |
|
|
sizeof(str), |
|
|
" %s: %s, %02d %s %4d %02d:%02d:%02d GMT", |
|
|
text, |
|
|
Curl_wkday[tm->tm_wday ? tm->tm_wday-1 : 6], |
|
|
tm->tm_mday, |
|
|
Curl_month[tm->tm_mon], |
|
|
tm->tm_year + 1900, |
|
|
tm->tm_hour, |
|
|
tm->tm_min, |
|
|
tm->tm_sec); |
|
|
infof(data, "%s", str); |
|
|
} |
|
|
#endif |
|
|
|
|
|
static gnutls_datum_t load_file(const char *file) |
|
|
{ |
|
|
FILE *f; |
|
|
gnutls_datum_t loaded_file = { NULL, 0 }; |
|
|
long filelen; |
|
|
void *ptr; |
|
|
|
|
|
f = fopen(file, "rb"); |
|
|
if(!f) |
|
|
return loaded_file; |
|
|
if(fseek(f, 0, SEEK_END) != 0 |
|
|
|| (filelen = ftell(f)) < 0 |
|
|
|| fseek(f, 0, SEEK_SET) != 0 |
|
|
|| !(ptr = malloc((size_t)filelen))) |
|
|
goto out; |
|
|
if(fread(ptr, 1, (size_t)filelen, f) < (size_t)filelen) { |
|
|
free(ptr); |
|
|
goto out; |
|
|
} |
|
|
|
|
|
loaded_file.data = ptr; |
|
|
loaded_file.size = (unsigned int)filelen; |
|
|
out: |
|
|
fclose(f); |
|
|
return loaded_file; |
|
|
} |
|
|
|
|
|
static void unload_file(gnutls_datum_t data) |
|
|
{ |
|
|
free(data.data); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
static CURLcode handshake(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
bool duringconnect, |
|
|
bool nonblocking) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
gnutls_session_t session; |
|
|
curl_socket_t sockfd = Curl_conn_cf_get_socket(cf, data); |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
session = backend->gtls.session; |
|
|
connssl->connecting_state = ssl_connect_2; |
|
|
|
|
|
for(;;) { |
|
|
timediff_t timeout_ms; |
|
|
int rc; |
|
|
|
|
|
|
|
|
timeout_ms = Curl_timeleft(data, NULL, duringconnect); |
|
|
|
|
|
if(timeout_ms < 0) { |
|
|
|
|
|
failf(data, "SSL connection timeout"); |
|
|
return CURLE_OPERATION_TIMEDOUT; |
|
|
} |
|
|
|
|
|
|
|
|
if(connssl->io_need) { |
|
|
int what; |
|
|
curl_socket_t writefd = (connssl->io_need & CURL_SSL_IO_NEED_SEND) ? |
|
|
sockfd : CURL_SOCKET_BAD; |
|
|
curl_socket_t readfd = (connssl->io_need & CURL_SSL_IO_NEED_RECV) ? |
|
|
sockfd : CURL_SOCKET_BAD; |
|
|
|
|
|
what = Curl_socket_check(readfd, CURL_SOCKET_BAD, writefd, |
|
|
nonblocking ? 0 : |
|
|
timeout_ms ? timeout_ms : 1000); |
|
|
if(what < 0) { |
|
|
|
|
|
failf(data, "select/poll on SSL socket, errno: %d", SOCKERRNO); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
else if(0 == what) { |
|
|
if(nonblocking) |
|
|
return CURLE_AGAIN; |
|
|
else if(timeout_ms) { |
|
|
|
|
|
failf(data, "SSL connection timeout at %ld", (long)timeout_ms); |
|
|
return CURLE_OPERATION_TIMEDOUT; |
|
|
} |
|
|
} |
|
|
|
|
|
} |
|
|
|
|
|
connssl->io_need = CURL_SSL_IO_NEED_NONE; |
|
|
backend->gtls.io_result = CURLE_OK; |
|
|
rc = gnutls_handshake(session); |
|
|
|
|
|
if(!backend->gtls.shared_creds->trust_setup) { |
|
|
|
|
|
|
|
|
CURLcode result = Curl_gtls_client_trust_setup(cf, data, &backend->gtls); |
|
|
if(result) |
|
|
return result; |
|
|
} |
|
|
|
|
|
if((rc == GNUTLS_E_AGAIN) || (rc == GNUTLS_E_INTERRUPTED)) { |
|
|
connssl->io_need = |
|
|
gnutls_record_get_direction(session) ? |
|
|
CURL_SSL_IO_NEED_SEND : CURL_SSL_IO_NEED_RECV; |
|
|
continue; |
|
|
} |
|
|
else if((rc < 0) && !gnutls_error_is_fatal(rc)) { |
|
|
const char *strerr = NULL; |
|
|
|
|
|
if(rc == GNUTLS_E_WARNING_ALERT_RECEIVED) { |
|
|
gnutls_alert_description_t alert = gnutls_alert_get(session); |
|
|
strerr = gnutls_alert_get_name(alert); |
|
|
} |
|
|
|
|
|
if(!strerr) |
|
|
strerr = gnutls_strerror(rc); |
|
|
|
|
|
infof(data, "gnutls_handshake() warning: %s", strerr); |
|
|
continue; |
|
|
} |
|
|
else if((rc < 0) && backend->gtls.io_result) { |
|
|
return backend->gtls.io_result; |
|
|
} |
|
|
else if(rc < 0) { |
|
|
const char *strerr = NULL; |
|
|
|
|
|
if(rc == GNUTLS_E_FATAL_ALERT_RECEIVED) { |
|
|
gnutls_alert_description_t alert = gnutls_alert_get(session); |
|
|
strerr = gnutls_alert_get_name(alert); |
|
|
} |
|
|
|
|
|
if(!strerr) |
|
|
strerr = gnutls_strerror(rc); |
|
|
|
|
|
failf(data, "GnuTLS, handshake failed: %s", strerr); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
|
|
|
connssl->connecting_state = ssl_connect_1; |
|
|
return CURLE_OK; |
|
|
} |
|
|
} |
|
|
|
|
|
static gnutls_x509_crt_fmt_t gnutls_do_file_type(const char *type) |
|
|
{ |
|
|
if(!type || !type[0]) |
|
|
return GNUTLS_X509_FMT_PEM; |
|
|
if(strcasecompare(type, "PEM")) |
|
|
return GNUTLS_X509_FMT_PEM; |
|
|
if(strcasecompare(type, "DER")) |
|
|
return GNUTLS_X509_FMT_DER; |
|
|
return GNUTLS_X509_FMT_PEM; |
|
|
} |
|
|
|
|
|
#define GNUTLS_CIPHERS "NORMAL:-ARCFOUR-128:-CTYPE-ALL:+CTYPE-X509" |
|
|
|
|
|
|
|
|
|
|
|
#define GNUTLS_SRP "+SRP" |
|
|
|
|
|
static CURLcode |
|
|
gnutls_set_ssl_version_min_max(struct Curl_easy *data, |
|
|
struct ssl_peer *peer, |
|
|
struct ssl_primary_config *conn_config, |
|
|
const char **prioritylist, |
|
|
const char *tls13support) |
|
|
{ |
|
|
long ssl_version = conn_config->version; |
|
|
long ssl_version_max = conn_config->version_max; |
|
|
|
|
|
if((ssl_version == CURL_SSLVERSION_DEFAULT) || |
|
|
(ssl_version == CURL_SSLVERSION_TLSv1)) |
|
|
ssl_version = CURL_SSLVERSION_TLSv1_0; |
|
|
if(ssl_version_max == CURL_SSLVERSION_MAX_NONE) |
|
|
ssl_version_max = CURL_SSLVERSION_MAX_DEFAULT; |
|
|
|
|
|
if(peer->transport == TRNSPRT_QUIC) { |
|
|
if((ssl_version_max != CURL_SSLVERSION_MAX_DEFAULT) && |
|
|
(ssl_version_max < CURL_SSLVERSION_MAX_TLSv1_3)) { |
|
|
failf(data, "QUIC needs at least TLS version 1.3"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
*prioritylist = QUIC_PRIORITY; |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
if(!tls13support) { |
|
|
|
|
|
|
|
|
|
|
|
if((ssl_version_max == CURL_SSLVERSION_MAX_TLSv1_3) || |
|
|
(ssl_version_max == CURL_SSLVERSION_MAX_DEFAULT)) { |
|
|
ssl_version_max = CURL_SSLVERSION_MAX_TLSv1_2; |
|
|
} |
|
|
} |
|
|
else if(ssl_version_max == CURL_SSLVERSION_MAX_DEFAULT) { |
|
|
ssl_version_max = CURL_SSLVERSION_MAX_TLSv1_3; |
|
|
} |
|
|
|
|
|
switch(ssl_version | ssl_version_max) { |
|
|
case CURL_SSLVERSION_TLSv1_0 | CURL_SSLVERSION_MAX_TLSv1_0: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.0"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_0 | CURL_SSLVERSION_MAX_TLSv1_1: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.1:+VERS-TLS1.0"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_0 | CURL_SSLVERSION_MAX_TLSv1_2: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_1 | CURL_SSLVERSION_MAX_TLSv1_1: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.1"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_1 | CURL_SSLVERSION_MAX_TLSv1_2: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.2:+VERS-TLS1.1"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_2 | CURL_SSLVERSION_MAX_TLSv1_2: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.2"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_3 | CURL_SSLVERSION_MAX_TLSv1_3: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.3"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_0 | CURL_SSLVERSION_MAX_TLSv1_3: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_1 | CURL_SSLVERSION_MAX_TLSv1_3: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1"; |
|
|
return CURLE_OK; |
|
|
case CURL_SSLVERSION_TLSv1_2 | CURL_SSLVERSION_MAX_TLSv1_3: |
|
|
*prioritylist = GNUTLS_CIPHERS ":-VERS-SSL3.0:-VERS-TLS-ALL:" |
|
|
"+VERS-TLS1.3:+VERS-TLS1.2"; |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
failf(data, "GnuTLS: cannot set ssl protocol"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
CURLcode Curl_gtls_shared_creds_create(struct Curl_easy *data, |
|
|
struct gtls_shared_creds **pcreds) |
|
|
{ |
|
|
struct gtls_shared_creds *shared; |
|
|
int rc; |
|
|
|
|
|
*pcreds = NULL; |
|
|
shared = calloc(1, sizeof(*shared)); |
|
|
if(!shared) |
|
|
return CURLE_OUT_OF_MEMORY; |
|
|
|
|
|
rc = gnutls_certificate_allocate_credentials(&shared->creds); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_cert_all_cred() failed: %s", gnutls_strerror(rc)); |
|
|
free(shared); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
shared->refcount = 1; |
|
|
shared->time = Curl_now(); |
|
|
*pcreds = shared; |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
CURLcode Curl_gtls_shared_creds_up_ref(struct gtls_shared_creds *creds) |
|
|
{ |
|
|
DEBUGASSERT(creds); |
|
|
if(creds->refcount < SIZE_T_MAX) { |
|
|
++creds->refcount; |
|
|
return CURLE_OK; |
|
|
} |
|
|
return CURLE_BAD_FUNCTION_ARGUMENT; |
|
|
} |
|
|
|
|
|
void Curl_gtls_shared_creds_free(struct gtls_shared_creds **pcreds) |
|
|
{ |
|
|
struct gtls_shared_creds *shared = *pcreds; |
|
|
*pcreds = NULL; |
|
|
if(shared) { |
|
|
--shared->refcount; |
|
|
if(!shared->refcount) { |
|
|
gnutls_certificate_free_credentials(shared->creds); |
|
|
free(shared->CAfile); |
|
|
free(shared); |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
static CURLcode gtls_populate_creds(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
gnutls_certificate_credentials_t creds) |
|
|
{ |
|
|
struct ssl_primary_config *config = Curl_ssl_cf_get_primary_config(cf); |
|
|
struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data); |
|
|
int rc; |
|
|
|
|
|
if(config->verifypeer) { |
|
|
bool imported_native_ca = FALSE; |
|
|
|
|
|
if(ssl_config->native_ca_store) { |
|
|
rc = gnutls_certificate_set_x509_system_trust(creds); |
|
|
if(rc < 0) |
|
|
infof(data, "error reading native ca store (%s), continuing anyway", |
|
|
gnutls_strerror(rc)); |
|
|
else { |
|
|
infof(data, "found %d certificates in native ca store", rc); |
|
|
if(rc > 0) |
|
|
imported_native_ca = TRUE; |
|
|
} |
|
|
} |
|
|
|
|
|
if(config->CAfile) { |
|
|
|
|
|
gnutls_certificate_set_verify_flags(creds, |
|
|
GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT); |
|
|
|
|
|
rc = gnutls_certificate_set_x509_trust_file(creds, |
|
|
config->CAfile, |
|
|
GNUTLS_X509_FMT_PEM); |
|
|
if(rc < 0) { |
|
|
infof(data, "error reading ca cert file %s (%s)%s", |
|
|
config->CAfile, gnutls_strerror(rc), |
|
|
(imported_native_ca ? ", continuing anyway" : "")); |
|
|
if(!imported_native_ca) { |
|
|
ssl_config->certverifyresult = rc; |
|
|
return CURLE_SSL_CACERT_BADFILE; |
|
|
} |
|
|
} |
|
|
else |
|
|
infof(data, "found %d certificates in %s", rc, config->CAfile); |
|
|
} |
|
|
|
|
|
if(config->CApath) { |
|
|
|
|
|
rc = gnutls_certificate_set_x509_trust_dir(creds, config->CApath, |
|
|
GNUTLS_X509_FMT_PEM); |
|
|
if(rc < 0) { |
|
|
infof(data, "error reading ca cert file %s (%s)%s", |
|
|
config->CApath, gnutls_strerror(rc), |
|
|
(imported_native_ca ? ", continuing anyway" : "")); |
|
|
if(!imported_native_ca) { |
|
|
ssl_config->certverifyresult = rc; |
|
|
return CURLE_SSL_CACERT_BADFILE; |
|
|
} |
|
|
} |
|
|
else |
|
|
infof(data, "found %d certificates in %s", rc, config->CApath); |
|
|
} |
|
|
} |
|
|
|
|
|
if(config->CRLfile) { |
|
|
|
|
|
rc = gnutls_certificate_set_x509_crl_file(creds, config->CRLfile, |
|
|
GNUTLS_X509_FMT_PEM); |
|
|
if(rc < 0) { |
|
|
failf(data, "error reading crl file %s (%s)", |
|
|
config->CRLfile, gnutls_strerror(rc)); |
|
|
return CURLE_SSL_CRL_BADFILE; |
|
|
} |
|
|
else |
|
|
infof(data, "found %d CRL in %s", rc, config->CRLfile); |
|
|
} |
|
|
|
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
|
|
|
#define MPROTO_GTLS_X509_KEY "tls:gtls:x509:share" |
|
|
|
|
|
static bool gtls_shared_creds_expired(const struct Curl_easy *data, |
|
|
const struct gtls_shared_creds *sc) |
|
|
{ |
|
|
const struct ssl_general_config *cfg = &data->set.general_ssl; |
|
|
struct curltime now = Curl_now(); |
|
|
timediff_t elapsed_ms = Curl_timediff(now, sc->time); |
|
|
timediff_t timeout_ms = cfg->ca_cache_timeout * (timediff_t)1000; |
|
|
|
|
|
if(timeout_ms < 0) |
|
|
return FALSE; |
|
|
|
|
|
return elapsed_ms >= timeout_ms; |
|
|
} |
|
|
|
|
|
static bool gtls_shared_creds_different(struct Curl_cfilter *cf, |
|
|
const struct gtls_shared_creds *sc) |
|
|
{ |
|
|
struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf); |
|
|
if(!sc->CAfile || !conn_config->CAfile) |
|
|
return sc->CAfile != conn_config->CAfile; |
|
|
|
|
|
return strcmp(sc->CAfile, conn_config->CAfile); |
|
|
} |
|
|
|
|
|
static struct gtls_shared_creds* |
|
|
gtls_get_cached_creds(struct Curl_cfilter *cf, struct Curl_easy *data) |
|
|
{ |
|
|
struct gtls_shared_creds *shared_creds; |
|
|
|
|
|
if(data->multi) { |
|
|
shared_creds = Curl_hash_pick(&data->multi->proto_hash, |
|
|
(void *)MPROTO_GTLS_X509_KEY, |
|
|
sizeof(MPROTO_GTLS_X509_KEY)-1); |
|
|
if(shared_creds && shared_creds->creds && |
|
|
!gtls_shared_creds_expired(data, shared_creds) && |
|
|
!gtls_shared_creds_different(cf, shared_creds)) { |
|
|
return shared_creds; |
|
|
} |
|
|
} |
|
|
return NULL; |
|
|
} |
|
|
|
|
|
static void gtls_shared_creds_hash_free(void *key, size_t key_len, void *p) |
|
|
{ |
|
|
struct gtls_shared_creds *sc = p; |
|
|
DEBUGASSERT(key_len == (sizeof(MPROTO_GTLS_X509_KEY)-1)); |
|
|
DEBUGASSERT(!memcmp(MPROTO_GTLS_X509_KEY, key, key_len)); |
|
|
(void)key; |
|
|
(void)key_len; |
|
|
Curl_gtls_shared_creds_free(&sc); |
|
|
} |
|
|
|
|
|
static void gtls_set_cached_creds(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
struct gtls_shared_creds *sc) |
|
|
{ |
|
|
struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf); |
|
|
|
|
|
DEBUGASSERT(sc); |
|
|
DEBUGASSERT(sc->creds); |
|
|
DEBUGASSERT(!sc->CAfile); |
|
|
DEBUGASSERT(sc->refcount == 1); |
|
|
if(!data->multi) |
|
|
return; |
|
|
|
|
|
if(conn_config->CAfile) { |
|
|
sc->CAfile = strdup(conn_config->CAfile); |
|
|
if(!sc->CAfile) |
|
|
return; |
|
|
} |
|
|
|
|
|
if(Curl_gtls_shared_creds_up_ref(sc)) |
|
|
return; |
|
|
|
|
|
if(!Curl_hash_add2(&data->multi->proto_hash, |
|
|
(void *)MPROTO_GTLS_X509_KEY, |
|
|
sizeof(MPROTO_GTLS_X509_KEY)-1, |
|
|
sc, gtls_shared_creds_hash_free)) { |
|
|
Curl_gtls_shared_creds_free(&sc); |
|
|
return; |
|
|
} |
|
|
} |
|
|
|
|
|
CURLcode Curl_gtls_client_trust_setup(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
struct gtls_ctx *gtls) |
|
|
{ |
|
|
struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf); |
|
|
struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data); |
|
|
struct gtls_shared_creds *cached_creds = NULL; |
|
|
bool cache_criteria_met; |
|
|
CURLcode result; |
|
|
int rc; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
cache_criteria_met = (data->set.general_ssl.ca_cache_timeout != 0) && |
|
|
conn_config->verifypeer && |
|
|
!conn_config->CApath && |
|
|
!conn_config->ca_info_blob && |
|
|
!ssl_config->primary.CRLfile && |
|
|
!ssl_config->native_ca_store && |
|
|
!conn_config->clientcert; |
|
|
|
|
|
if(cache_criteria_met) |
|
|
cached_creds = gtls_get_cached_creds(cf, data); |
|
|
|
|
|
if(cached_creds && !Curl_gtls_shared_creds_up_ref(cached_creds)) { |
|
|
CURL_TRC_CF(data, cf, "using shared trust anchors and CRLs"); |
|
|
Curl_gtls_shared_creds_free(>ls->shared_creds); |
|
|
gtls->shared_creds = cached_creds; |
|
|
rc = gnutls_credentials_set(gtls->session, GNUTLS_CRD_CERTIFICATE, |
|
|
gtls->shared_creds->creds); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_credentials_set() failed: %s", gnutls_strerror(rc)); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
else { |
|
|
CURL_TRC_CF(data, cf, "loading trust anchors and CRLs"); |
|
|
result = gtls_populate_creds(cf, data, gtls->shared_creds->creds); |
|
|
if(result) |
|
|
return result; |
|
|
gtls->shared_creds->trust_setup = TRUE; |
|
|
if(cache_criteria_met) |
|
|
gtls_set_cached_creds(cf, data, gtls->shared_creds); |
|
|
} |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static void gtls_sessionid_free(void *sessionid, size_t idsize) |
|
|
{ |
|
|
(void)idsize; |
|
|
free(sessionid); |
|
|
} |
|
|
|
|
|
CURLcode Curl_gtls_update_session_id(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
gnutls_session_t session, |
|
|
struct ssl_peer *peer, |
|
|
const char *alpn) |
|
|
{ |
|
|
struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data); |
|
|
void *connect_sessionid; |
|
|
size_t connect_idsize = 0; |
|
|
CURLcode result = CURLE_OK; |
|
|
|
|
|
if(!ssl_config->primary.cache_session) |
|
|
return CURLE_OK; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
gnutls_session_get_data(session, NULL, &connect_idsize); |
|
|
if(!connect_idsize) |
|
|
return CURLE_OK; |
|
|
|
|
|
connect_sessionid = malloc(connect_idsize); |
|
|
if(!connect_sessionid) |
|
|
return CURLE_OUT_OF_MEMORY; |
|
|
|
|
|
|
|
|
gnutls_session_get_data(session, connect_sessionid, &connect_idsize); |
|
|
|
|
|
CURL_TRC_CF(data, cf, "get session id (len=%zu, alpn=%s) and store in cache", |
|
|
connect_idsize, alpn ? alpn : "-"); |
|
|
Curl_ssl_sessionid_lock(data); |
|
|
|
|
|
result = Curl_ssl_set_sessionid(cf, data, peer, alpn, |
|
|
connect_sessionid, connect_idsize, |
|
|
gtls_sessionid_free); |
|
|
Curl_ssl_sessionid_unlock(data); |
|
|
return result; |
|
|
} |
|
|
|
|
|
static CURLcode cf_gtls_update_session_id(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
gnutls_session_t session) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
return Curl_gtls_update_session_id(cf, data, session, &connssl->peer, |
|
|
connssl->alpn_negotiated); |
|
|
} |
|
|
|
|
|
static int gtls_handshake_cb(gnutls_session_t session, unsigned int htype, |
|
|
unsigned when, unsigned int incoming, |
|
|
const gnutls_datum_t *msg) |
|
|
{ |
|
|
struct Curl_cfilter *cf = gnutls_session_get_ptr(session); |
|
|
|
|
|
(void)msg; |
|
|
(void)incoming; |
|
|
if(when) { |
|
|
struct Curl_easy *data = CF_DATA_CURRENT(cf); |
|
|
if(data) { |
|
|
CURL_TRC_CF(data, cf, "handshake: %s message type %d", |
|
|
incoming ? "incoming" : "outgoing", htype); |
|
|
switch(htype) { |
|
|
case GNUTLS_HANDSHAKE_NEW_SESSION_TICKET: { |
|
|
cf_gtls_update_session_id(cf, data, session); |
|
|
break; |
|
|
} |
|
|
default: |
|
|
break; |
|
|
} |
|
|
} |
|
|
} |
|
|
return 0; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_client_init(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
struct ssl_peer *peer, |
|
|
struct gtls_ctx *gtls) |
|
|
{ |
|
|
struct ssl_primary_config *config = Curl_ssl_cf_get_primary_config(cf); |
|
|
struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data); |
|
|
unsigned int init_flags; |
|
|
int rc; |
|
|
bool sni = TRUE; |
|
|
const char *prioritylist; |
|
|
const char *err = NULL; |
|
|
const char *tls13support; |
|
|
CURLcode result; |
|
|
|
|
|
if(!gtls_inited) |
|
|
gtls_init(); |
|
|
|
|
|
if(config->version == CURL_SSLVERSION_SSLv2) { |
|
|
failf(data, "GnuTLS does not support SSLv2"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
else if(config->version == CURL_SSLVERSION_SSLv3) |
|
|
sni = FALSE; |
|
|
|
|
|
|
|
|
result = Curl_gtls_shared_creds_create(data, >ls->shared_creds); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
#ifdef USE_GNUTLS_SRP |
|
|
if(config->username && Curl_auth_allowed_to_host(data)) { |
|
|
infof(data, "Using TLS-SRP username: %s", config->username); |
|
|
|
|
|
rc = gnutls_srp_allocate_client_credentials(>ls->srp_client_cred); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_srp_allocate_client_cred() failed: %s", |
|
|
gnutls_strerror(rc)); |
|
|
return CURLE_OUT_OF_MEMORY; |
|
|
} |
|
|
|
|
|
rc = gnutls_srp_set_client_credentials(gtls->srp_client_cred, |
|
|
config->username, |
|
|
config->password); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_srp_set_client_cred() failed: %s", |
|
|
gnutls_strerror(rc)); |
|
|
return CURLE_BAD_FUNCTION_ARGUMENT; |
|
|
} |
|
|
} |
|
|
#endif |
|
|
|
|
|
ssl_config->certverifyresult = 0; |
|
|
|
|
|
|
|
|
init_flags = GNUTLS_CLIENT; |
|
|
|
|
|
#if defined(GNUTLS_FORCE_CLIENT_CERT) |
|
|
init_flags |= GNUTLS_FORCE_CLIENT_CERT; |
|
|
#endif |
|
|
|
|
|
#if defined(GNUTLS_NO_TICKETS_TLS12) |
|
|
init_flags |= GNUTLS_NO_TICKETS_TLS12; |
|
|
#elif defined(GNUTLS_NO_TICKETS) |
|
|
|
|
|
if((config->version != CURL_SSLVERSION_TLSv1_3) && |
|
|
(config->version != CURL_SSLVERSION_DEFAULT)) |
|
|
init_flags |= GNUTLS_NO_TICKETS; |
|
|
#endif |
|
|
|
|
|
#if defined(GNUTLS_NO_STATUS_REQUEST) |
|
|
if(!config->verifystatus) |
|
|
|
|
|
|
|
|
init_flags |= GNUTLS_NO_STATUS_REQUEST; |
|
|
#endif |
|
|
|
|
|
rc = gnutls_init(>ls->session, init_flags); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_init() failed: %d", rc); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
if(sni && peer->sni) { |
|
|
if(gnutls_server_name_set(gtls->session, GNUTLS_NAME_DNS, |
|
|
peer->sni, strlen(peer->sni)) < 0) { |
|
|
failf(data, "Failed to set SNI"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
rc = gnutls_set_default_priority(gtls->session); |
|
|
if(rc != GNUTLS_E_SUCCESS) |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
|
|
|
|
|
|
tls13support = gnutls_check_version("3.6.5"); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if(config->version == CURL_SSLVERSION_SSLv2 || |
|
|
config->version == CURL_SSLVERSION_SSLv3) { |
|
|
failf(data, "GnuTLS does not support SSLv2 or SSLv3"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
if(config->version == CURL_SSLVERSION_TLSv1_3) { |
|
|
if(!tls13support) { |
|
|
failf(data, "This GnuTLS installation does not support TLS 1.3"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
result = gnutls_set_ssl_version_min_max(data, peer, |
|
|
config, &prioritylist, tls13support); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
#ifdef USE_GNUTLS_SRP |
|
|
|
|
|
|
|
|
if(config->username) { |
|
|
char *prioritysrp = aprintf("%s:" GNUTLS_SRP, prioritylist); |
|
|
if(!prioritysrp) |
|
|
return CURLE_OUT_OF_MEMORY; |
|
|
rc = gnutls_priority_set_direct(gtls->session, prioritysrp, &err); |
|
|
free(prioritysrp); |
|
|
|
|
|
if((rc == GNUTLS_E_INVALID_REQUEST) && err) { |
|
|
infof(data, "This GnuTLS does not support SRP"); |
|
|
} |
|
|
} |
|
|
else { |
|
|
#endif |
|
|
infof(data, "GnuTLS ciphers: %s", prioritylist); |
|
|
rc = gnutls_priority_set_direct(gtls->session, prioritylist, &err); |
|
|
#ifdef USE_GNUTLS_SRP |
|
|
} |
|
|
#endif |
|
|
|
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "Error %d setting GnuTLS cipher list starting with %s", |
|
|
rc, err); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
if(config->clientcert) { |
|
|
if(!gtls->shared_creds->trust_setup) { |
|
|
result = Curl_gtls_client_trust_setup(cf, data, gtls); |
|
|
if(result) |
|
|
return result; |
|
|
} |
|
|
if(ssl_config->cert_type && strcasecompare(ssl_config->cert_type, "P12")) { |
|
|
rc = gnutls_certificate_set_x509_simple_pkcs12_file( |
|
|
gtls->shared_creds->creds, config->clientcert, GNUTLS_X509_FMT_DER, |
|
|
ssl_config->key_passwd ? ssl_config->key_passwd : ""); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, |
|
|
"error reading X.509 potentially-encrypted key or certificate " |
|
|
"file: %s", |
|
|
gnutls_strerror(rc)); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
else if(ssl_config->key_passwd) { |
|
|
const unsigned int supported_key_encryption_algorithms = |
|
|
GNUTLS_PKCS_USE_PKCS12_3DES | GNUTLS_PKCS_USE_PKCS12_ARCFOUR | |
|
|
GNUTLS_PKCS_USE_PKCS12_RC2_40 | GNUTLS_PKCS_USE_PBES2_3DES | |
|
|
GNUTLS_PKCS_USE_PBES2_AES_128 | GNUTLS_PKCS_USE_PBES2_AES_192 | |
|
|
GNUTLS_PKCS_USE_PBES2_AES_256; |
|
|
rc = gnutls_certificate_set_x509_key_file2( |
|
|
gtls->shared_creds->creds, |
|
|
config->clientcert, |
|
|
ssl_config->key ? ssl_config->key : config->clientcert, |
|
|
gnutls_do_file_type(ssl_config->cert_type), |
|
|
ssl_config->key_passwd, |
|
|
supported_key_encryption_algorithms); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, |
|
|
"error reading X.509 potentially-encrypted key file: %s", |
|
|
gnutls_strerror(rc)); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
else { |
|
|
if(gnutls_certificate_set_x509_key_file( |
|
|
gtls->shared_creds->creds, |
|
|
config->clientcert, |
|
|
ssl_config->key ? ssl_config->key : config->clientcert, |
|
|
gnutls_do_file_type(ssl_config->cert_type) ) != |
|
|
GNUTLS_E_SUCCESS) { |
|
|
failf(data, "error reading X.509 key or certificate file"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
#ifdef USE_GNUTLS_SRP |
|
|
|
|
|
if(config->username) { |
|
|
rc = gnutls_credentials_set(gtls->session, GNUTLS_CRD_SRP, |
|
|
gtls->srp_client_cred); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_credentials_set() failed: %s", gnutls_strerror(rc)); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
else |
|
|
#endif |
|
|
{ |
|
|
rc = gnutls_credentials_set(gtls->session, GNUTLS_CRD_CERTIFICATE, |
|
|
gtls->shared_creds->creds); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_credentials_set() failed: %s", gnutls_strerror(rc)); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
if(config->verifystatus) { |
|
|
rc = gnutls_ocsp_status_request_enable_client(gtls->session, |
|
|
NULL, 0, NULL); |
|
|
if(rc != GNUTLS_E_SUCCESS) { |
|
|
failf(data, "gnutls_ocsp_status_request_enable_client() failed: %d", rc); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static int keylog_callback(gnutls_session_t session, const char *label, |
|
|
const gnutls_datum_t *secret) |
|
|
{ |
|
|
gnutls_datum_t crandom; |
|
|
gnutls_datum_t srandom; |
|
|
|
|
|
gnutls_session_get_random(session, &crandom, &srandom); |
|
|
if(crandom.size != 32) { |
|
|
return -1; |
|
|
} |
|
|
|
|
|
Curl_tls_keylog_write(label, crandom.data, secret->data, secret->size); |
|
|
return 0; |
|
|
} |
|
|
|
|
|
CURLcode Curl_gtls_ctx_init(struct gtls_ctx *gctx, |
|
|
struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
struct ssl_peer *peer, |
|
|
const unsigned char *alpn, size_t alpn_len, |
|
|
struct ssl_connect_data *connssl, |
|
|
Curl_gtls_ctx_setup_cb *cb_setup, |
|
|
void *cb_user_data, |
|
|
void *ssl_user_data) |
|
|
{ |
|
|
struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf); |
|
|
struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data); |
|
|
gnutls_datum_t gtls_alpns[5]; |
|
|
size_t gtls_alpns_count = 0; |
|
|
CURLcode result; |
|
|
|
|
|
DEBUGASSERT(gctx); |
|
|
|
|
|
result = gtls_client_init(cf, data, peer, gctx); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
gnutls_session_set_ptr(gctx->session, ssl_user_data); |
|
|
|
|
|
if(cb_setup) { |
|
|
result = cb_setup(cf, data, cb_user_data); |
|
|
if(result) |
|
|
return result; |
|
|
} |
|
|
|
|
|
|
|
|
Curl_tls_keylog_open(); |
|
|
if(Curl_tls_keylog_enabled()) { |
|
|
gnutls_session_set_keylog_function(gctx->session, keylog_callback); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
if(conn_config->cache_session) { |
|
|
void *ssl_sessionid; |
|
|
size_t ssl_idsize; |
|
|
char *session_alpn; |
|
|
Curl_ssl_sessionid_lock(data); |
|
|
if(!Curl_ssl_getsessionid(cf, data, peer, |
|
|
&ssl_sessionid, &ssl_idsize, &session_alpn)) { |
|
|
|
|
|
int rc; |
|
|
|
|
|
rc = gnutls_session_set_data(gctx->session, ssl_sessionid, ssl_idsize); |
|
|
if(rc < 0) |
|
|
infof(data, "SSL failed to set session ID"); |
|
|
else { |
|
|
infof(data, "SSL reusing session ID (size=%zu, alpn=%s)", |
|
|
ssl_idsize, session_alpn ? session_alpn : "-"); |
|
|
#ifdef DEBUGBUILD |
|
|
if((ssl_config->earlydata || !!getenv("CURL_USE_EARLYDATA")) && |
|
|
#else |
|
|
if(ssl_config->earlydata && |
|
|
#endif |
|
|
!cf->conn->connect_only && connssl && |
|
|
(gnutls_protocol_get_version(gctx->session) == GNUTLS_TLS1_3) && |
|
|
Curl_alpn_contains_proto(connssl->alpn, session_alpn)) { |
|
|
connssl->earlydata_max = |
|
|
gnutls_record_get_max_early_data_size(gctx->session); |
|
|
if((!connssl->earlydata_max || |
|
|
connssl->earlydata_max == 0xFFFFFFFFUL)) { |
|
|
|
|
|
CURL_TRC_CF(data, cf, "TLS session does not allow earlydata"); |
|
|
} |
|
|
else { |
|
|
CURL_TRC_CF(data, cf, "TLS session allows %zu earlydata bytes, " |
|
|
"reusing ALPN '%s'", |
|
|
connssl->earlydata_max, session_alpn); |
|
|
connssl->earlydata_state = ssl_earlydata_use; |
|
|
connssl->state = ssl_connection_deferred; |
|
|
result = Curl_alpn_set_negotiated(cf, data, connssl, |
|
|
(const unsigned char *)session_alpn, |
|
|
session_alpn ? strlen(session_alpn) : 0); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
|
|
|
gtls_alpns[0].data = (unsigned char *)session_alpn; |
|
|
gtls_alpns[0].size = (unsigned)strlen(session_alpn); |
|
|
gtls_alpns_count = 1; |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
Curl_ssl_sessionid_unlock(data); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
if(!gtls_alpns_count && alpn && alpn_len) { |
|
|
size_t i, alen = alpn_len; |
|
|
unsigned char *s = (unsigned char *)alpn; |
|
|
unsigned char slen; |
|
|
for(i = 0; (i < ARRAYSIZE(gtls_alpns)) && alen; ++i) { |
|
|
slen = s[0]; |
|
|
if(slen >= alen) |
|
|
return CURLE_FAILED_INIT; |
|
|
gtls_alpns[i].data = s + 1; |
|
|
gtls_alpns[i].size = slen; |
|
|
s += slen + 1; |
|
|
alen -= (size_t)slen + 1; |
|
|
} |
|
|
if(alen) |
|
|
return CURLE_FAILED_INIT; |
|
|
gtls_alpns_count = i; |
|
|
} |
|
|
|
|
|
if(gtls_alpns_count && |
|
|
gnutls_alpn_set_protocols(gctx->session, |
|
|
gtls_alpns, (unsigned int)gtls_alpns_count, |
|
|
GNUTLS_ALPN_MANDATORY)) { |
|
|
failf(data, "failed setting ALPN"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static CURLcode |
|
|
gtls_connect_step1(struct Curl_cfilter *cf, struct Curl_easy *data) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
struct alpn_proto_buf proto; |
|
|
CURLcode result; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
DEBUGASSERT(ssl_connect_1 == connssl->connecting_state); |
|
|
|
|
|
if(connssl->state == ssl_connection_complete) |
|
|
|
|
|
|
|
|
return CURLE_OK; |
|
|
|
|
|
memset(&proto, 0, sizeof(proto)); |
|
|
if(connssl->alpn) { |
|
|
result = Curl_alpn_to_proto_buf(&proto, connssl->alpn); |
|
|
if(result) { |
|
|
failf(data, "Error determining ALPN"); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
} |
|
|
|
|
|
result = Curl_gtls_ctx_init(&backend->gtls, cf, data, &connssl->peer, |
|
|
proto.data, proto.len, connssl, NULL, NULL, cf); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
if(connssl->alpn && (connssl->state != ssl_connection_deferred)) { |
|
|
Curl_alpn_to_proto_str(&proto, connssl->alpn); |
|
|
infof(data, VTLS_INFOF_ALPN_OFFER_1STR, proto.data); |
|
|
} |
|
|
|
|
|
gnutls_handshake_set_hook_function(backend->gtls.session, |
|
|
GNUTLS_HANDSHAKE_ANY, GNUTLS_HOOK_POST, |
|
|
gtls_handshake_cb); |
|
|
|
|
|
|
|
|
gnutls_transport_set_ptr(backend->gtls.session, cf); |
|
|
gnutls_transport_set_push_function(backend->gtls.session, gtls_push); |
|
|
gnutls_transport_set_pull_function(backend->gtls.session, gtls_pull); |
|
|
|
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static CURLcode pkp_pin_peer_pubkey(struct Curl_easy *data, |
|
|
gnutls_x509_crt_t cert, |
|
|
const char *pinnedpubkey) |
|
|
{ |
|
|
|
|
|
size_t len1 = 0, len2 = 0; |
|
|
unsigned char *buff1 = NULL; |
|
|
|
|
|
gnutls_pubkey_t key = NULL; |
|
|
|
|
|
|
|
|
CURLcode result = CURLE_SSL_PINNEDPUBKEYNOTMATCH; |
|
|
|
|
|
|
|
|
if(!pinnedpubkey) |
|
|
return CURLE_OK; |
|
|
|
|
|
if(!cert) |
|
|
return result; |
|
|
|
|
|
do { |
|
|
int ret; |
|
|
|
|
|
|
|
|
gnutls_pubkey_init(&key); |
|
|
|
|
|
ret = gnutls_pubkey_import_x509(key, cert, 0); |
|
|
if(ret < 0) |
|
|
break; |
|
|
|
|
|
ret = gnutls_pubkey_export(key, GNUTLS_X509_FMT_DER, NULL, &len1); |
|
|
if(ret != GNUTLS_E_SHORT_MEMORY_BUFFER || len1 == 0) |
|
|
break; |
|
|
|
|
|
buff1 = malloc(len1); |
|
|
if(!buff1) |
|
|
break; |
|
|
|
|
|
len2 = len1; |
|
|
|
|
|
ret = gnutls_pubkey_export(key, GNUTLS_X509_FMT_DER, buff1, &len2); |
|
|
if(ret < 0 || len1 != len2) |
|
|
break; |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
result = Curl_pin_peer_pubkey(data, pinnedpubkey, buff1, len1); |
|
|
} while(0); |
|
|
|
|
|
if(key) |
|
|
gnutls_pubkey_deinit(key); |
|
|
|
|
|
Curl_safefree(buff1); |
|
|
|
|
|
return result; |
|
|
} |
|
|
|
|
|
CURLcode |
|
|
Curl_gtls_verifyserver(struct Curl_easy *data, |
|
|
gnutls_session_t session, |
|
|
struct ssl_primary_config *config, |
|
|
struct ssl_config_data *ssl_config, |
|
|
struct ssl_peer *peer, |
|
|
const char *pinned_key) |
|
|
{ |
|
|
unsigned int cert_list_size; |
|
|
const gnutls_datum_t *chainp; |
|
|
unsigned int verify_status = 0; |
|
|
gnutls_x509_crt_t x509_cert, x509_issuer; |
|
|
gnutls_datum_t issuerp; |
|
|
gnutls_datum_t certfields; |
|
|
char certname[65] = ""; |
|
|
size_t size; |
|
|
time_t certclock; |
|
|
int rc; |
|
|
CURLcode result = CURLE_OK; |
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS |
|
|
const char *ptr; |
|
|
int algo; |
|
|
unsigned int bits; |
|
|
gnutls_protocol_t version = gnutls_protocol_get_version(session); |
|
|
#endif |
|
|
long * const certverifyresult = &ssl_config->certverifyresult; |
|
|
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS |
|
|
|
|
|
ptr = gnutls_cipher_suite_get_name(gnutls_kx_get(session), |
|
|
gnutls_cipher_get(session), |
|
|
gnutls_mac_get(session)); |
|
|
|
|
|
infof(data, "SSL connection using %s / %s", |
|
|
gnutls_protocol_get_name(version), ptr); |
|
|
#endif |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
chainp = gnutls_certificate_get_peers(session, &cert_list_size); |
|
|
if(!chainp) { |
|
|
if(config->verifypeer || |
|
|
config->verifyhost || |
|
|
config->issuercert) { |
|
|
#ifdef USE_GNUTLS_SRP |
|
|
if(ssl_config->primary.username && !config->verifypeer && |
|
|
gnutls_cipher_get(session)) { |
|
|
|
|
|
|
|
|
} |
|
|
else { |
|
|
#endif |
|
|
failf(data, "failed to get server cert"); |
|
|
*certverifyresult = GNUTLS_E_NO_CERTIFICATE_FOUND; |
|
|
return CURLE_PEER_FAILED_VERIFICATION; |
|
|
#ifdef USE_GNUTLS_SRP |
|
|
} |
|
|
#endif |
|
|
} |
|
|
infof(data, " common name: WARNING could not obtain"); |
|
|
} |
|
|
|
|
|
if(data->set.ssl.certinfo && chainp) { |
|
|
unsigned int i; |
|
|
|
|
|
result = Curl_ssl_init_certinfo(data, (int)cert_list_size); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
for(i = 0; i < cert_list_size; i++) { |
|
|
const char *beg = (const char *) chainp[i].data; |
|
|
const char *end = beg + chainp[i].size; |
|
|
|
|
|
result = Curl_extract_certinfo(data, (int)i, beg, end); |
|
|
if(result) |
|
|
return result; |
|
|
} |
|
|
} |
|
|
|
|
|
if(config->verifypeer) { |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
rc = gnutls_certificate_verify_peers2(session, &verify_status); |
|
|
if(rc < 0) { |
|
|
failf(data, "server cert verify failed: %d", rc); |
|
|
*certverifyresult = rc; |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
|
|
|
*certverifyresult = verify_status; |
|
|
|
|
|
|
|
|
if(verify_status & GNUTLS_CERT_INVALID) { |
|
|
if(config->verifypeer) { |
|
|
const char *cause = "certificate error, no details available"; |
|
|
if(verify_status & GNUTLS_CERT_EXPIRED) |
|
|
cause = "certificate has expired"; |
|
|
else if(verify_status & GNUTLS_CERT_SIGNER_NOT_FOUND) |
|
|
cause = "certificate signer not trusted"; |
|
|
else if(verify_status & GNUTLS_CERT_INSECURE_ALGORITHM) |
|
|
cause = "certificate uses insecure algorithm"; |
|
|
else if(verify_status & GNUTLS_CERT_INVALID_OCSP_STATUS) |
|
|
cause = "attached OCSP status response is invalid"; |
|
|
failf(data, "server verification failed: %s. (CAfile: %s " |
|
|
"CRLfile: %s)", cause, |
|
|
config->CAfile ? config->CAfile : "none", |
|
|
ssl_config->primary.CRLfile ? |
|
|
ssl_config->primary.CRLfile : "none"); |
|
|
return CURLE_PEER_FAILED_VERIFICATION; |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate verification FAILED"); |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate verification OK"); |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate verification SKIPPED"); |
|
|
|
|
|
if(config->verifystatus) { |
|
|
gnutls_datum_t status_request; |
|
|
gnutls_ocsp_resp_t ocsp_resp; |
|
|
gnutls_ocsp_cert_status_t status; |
|
|
gnutls_x509_crl_reason_t reason; |
|
|
|
|
|
rc = gnutls_ocsp_status_request_get(session, &status_request); |
|
|
|
|
|
if(rc == GNUTLS_E_REQUESTED_DATA_NOT_AVAILABLE) { |
|
|
failf(data, "No OCSP response received"); |
|
|
return CURLE_SSL_INVALIDCERTSTATUS; |
|
|
} |
|
|
|
|
|
if(rc < 0) { |
|
|
failf(data, "Invalid OCSP response received"); |
|
|
return CURLE_SSL_INVALIDCERTSTATUS; |
|
|
} |
|
|
|
|
|
gnutls_ocsp_resp_init(&ocsp_resp); |
|
|
|
|
|
rc = gnutls_ocsp_resp_import(ocsp_resp, &status_request); |
|
|
if(rc < 0) { |
|
|
failf(data, "Invalid OCSP response received"); |
|
|
return CURLE_SSL_INVALIDCERTSTATUS; |
|
|
} |
|
|
|
|
|
(void)gnutls_ocsp_resp_get_single(ocsp_resp, 0, NULL, NULL, NULL, NULL, |
|
|
&status, NULL, NULL, NULL, &reason); |
|
|
|
|
|
switch(status) { |
|
|
case GNUTLS_OCSP_CERT_GOOD: |
|
|
break; |
|
|
|
|
|
case GNUTLS_OCSP_CERT_REVOKED: { |
|
|
const char *crl_reason; |
|
|
|
|
|
switch(reason) { |
|
|
default: |
|
|
case GNUTLS_X509_CRLREASON_UNSPECIFIED: |
|
|
crl_reason = "unspecified reason"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_KEYCOMPROMISE: |
|
|
crl_reason = "private key compromised"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_CACOMPROMISE: |
|
|
crl_reason = "CA compromised"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_AFFILIATIONCHANGED: |
|
|
crl_reason = "affiliation has changed"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_SUPERSEDED: |
|
|
crl_reason = "certificate superseded"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_CESSATIONOFOPERATION: |
|
|
crl_reason = "operation has ceased"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_CERTIFICATEHOLD: |
|
|
crl_reason = "certificate is on hold"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_REMOVEFROMCRL: |
|
|
crl_reason = "will be removed from delta CRL"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_PRIVILEGEWITHDRAWN: |
|
|
crl_reason = "privilege withdrawn"; |
|
|
break; |
|
|
|
|
|
case GNUTLS_X509_CRLREASON_AACOMPROMISE: |
|
|
crl_reason = "AA compromised"; |
|
|
break; |
|
|
} |
|
|
|
|
|
failf(data, "Server certificate was revoked: %s", crl_reason); |
|
|
break; |
|
|
} |
|
|
|
|
|
default: |
|
|
case GNUTLS_OCSP_CERT_UNKNOWN: |
|
|
failf(data, "Server certificate status is unknown"); |
|
|
break; |
|
|
} |
|
|
|
|
|
gnutls_ocsp_resp_deinit(ocsp_resp); |
|
|
if(status != GNUTLS_OCSP_CERT_GOOD) |
|
|
return CURLE_SSL_INVALIDCERTSTATUS; |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate status verification SKIPPED"); |
|
|
|
|
|
|
|
|
gnutls_x509_crt_init(&x509_cert); |
|
|
|
|
|
if(chainp) |
|
|
|
|
|
|
|
|
gnutls_x509_crt_import(x509_cert, chainp, GNUTLS_X509_FMT_DER); |
|
|
|
|
|
if(config->issuercert) { |
|
|
gnutls_x509_crt_init(&x509_issuer); |
|
|
issuerp = load_file(config->issuercert); |
|
|
gnutls_x509_crt_import(x509_issuer, &issuerp, GNUTLS_X509_FMT_PEM); |
|
|
rc = (int)gnutls_x509_crt_check_issuer(x509_cert, x509_issuer); |
|
|
gnutls_x509_crt_deinit(x509_issuer); |
|
|
unload_file(issuerp); |
|
|
if(rc <= 0) { |
|
|
failf(data, "server certificate issuer check failed (IssuerCert: %s)", |
|
|
config->issuercert ? config->issuercert : "none"); |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return CURLE_SSL_ISSUER_ERROR; |
|
|
} |
|
|
infof(data, " server certificate issuer check OK (Issuer Cert: %s)", |
|
|
config->issuercert ? config->issuercert : "none"); |
|
|
} |
|
|
|
|
|
size = sizeof(certname); |
|
|
rc = gnutls_x509_crt_get_dn_by_oid(x509_cert, GNUTLS_OID_X520_COMMON_NAME, |
|
|
0, |
|
|
FALSE, |
|
|
certname, |
|
|
&size); |
|
|
if(rc) { |
|
|
infof(data, "error fetching CN from cert:%s", |
|
|
gnutls_strerror(rc)); |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
rc = (int)gnutls_x509_crt_check_hostname(x509_cert, |
|
|
peer->sni ? peer->sni : |
|
|
peer->hostname); |
|
|
#if GNUTLS_VERSION_NUMBER < 0x030306 |
|
|
|
|
|
|
|
|
if(!rc) { |
|
|
#ifdef USE_IPV6 |
|
|
#define use_addr in6_addr |
|
|
#else |
|
|
#define use_addr in_addr |
|
|
#endif |
|
|
unsigned char addrbuf[sizeof(struct use_addr)]; |
|
|
size_t addrlen = 0; |
|
|
|
|
|
if(Curl_inet_pton(AF_INET, peer->hostname, addrbuf) > 0) |
|
|
addrlen = 4; |
|
|
#ifdef USE_IPV6 |
|
|
else if(Curl_inet_pton(AF_INET6, peer->hostname, addrbuf) > 0) |
|
|
addrlen = 16; |
|
|
#endif |
|
|
|
|
|
if(addrlen) { |
|
|
unsigned char certaddr[sizeof(struct use_addr)]; |
|
|
int i; |
|
|
|
|
|
for(i = 0; ; i++) { |
|
|
size_t certaddrlen = sizeof(certaddr); |
|
|
int ret = gnutls_x509_crt_get_subject_alt_name(x509_cert, i, certaddr, |
|
|
&certaddrlen, NULL); |
|
|
|
|
|
if(ret == GNUTLS_E_SHORT_MEMORY_BUFFER) |
|
|
continue; |
|
|
if(ret < 0) |
|
|
break; |
|
|
if(ret != GNUTLS_SAN_IPADDRESS) |
|
|
continue; |
|
|
if(certaddrlen == addrlen && !memcmp(addrbuf, certaddr, addrlen)) { |
|
|
rc = 1; |
|
|
break; |
|
|
} |
|
|
} |
|
|
} |
|
|
} |
|
|
#endif |
|
|
if(!rc) { |
|
|
if(config->verifyhost) { |
|
|
failf(data, "SSL: certificate subject name (%s) does not match " |
|
|
"target hostname '%s'", certname, peer->dispname); |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return CURLE_PEER_FAILED_VERIFICATION; |
|
|
} |
|
|
else |
|
|
infof(data, " common name: %s (does not match '%s')", |
|
|
certname, peer->dispname); |
|
|
} |
|
|
else |
|
|
infof(data, " common name: %s (matched)", certname); |
|
|
|
|
|
|
|
|
certclock = gnutls_x509_crt_get_expiration_time(x509_cert); |
|
|
|
|
|
if(certclock == (time_t)-1) { |
|
|
if(config->verifypeer) { |
|
|
failf(data, "server cert expiration date verify failed"); |
|
|
*certverifyresult = GNUTLS_CERT_EXPIRED; |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate expiration date verify FAILED"); |
|
|
} |
|
|
else { |
|
|
if(certclock < time(NULL)) { |
|
|
if(config->verifypeer) { |
|
|
failf(data, "server certificate expiration date has passed."); |
|
|
*certverifyresult = GNUTLS_CERT_EXPIRED; |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return CURLE_PEER_FAILED_VERIFICATION; |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate expiration date FAILED"); |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate expiration date OK"); |
|
|
} |
|
|
|
|
|
certclock = gnutls_x509_crt_get_activation_time(x509_cert); |
|
|
|
|
|
if(certclock == (time_t)-1) { |
|
|
if(config->verifypeer) { |
|
|
failf(data, "server cert activation date verify failed"); |
|
|
*certverifyresult = GNUTLS_CERT_NOT_ACTIVATED; |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return CURLE_SSL_CONNECT_ERROR; |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate activation date verify FAILED"); |
|
|
} |
|
|
else { |
|
|
if(certclock > time(NULL)) { |
|
|
if(config->verifypeer) { |
|
|
failf(data, "server certificate not activated yet."); |
|
|
*certverifyresult = GNUTLS_CERT_NOT_ACTIVATED; |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return CURLE_PEER_FAILED_VERIFICATION; |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate activation date FAILED"); |
|
|
} |
|
|
else |
|
|
infof(data, " server certificate activation date OK"); |
|
|
} |
|
|
|
|
|
if(pinned_key) { |
|
|
result = pkp_pin_peer_pubkey(data, x509_cert, pinned_key); |
|
|
if(result != CURLE_OK) { |
|
|
failf(data, "SSL: public key does not match pinned public key"); |
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
return result; |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS |
|
|
|
|
|
algo = gnutls_x509_crt_get_pk_algorithm(x509_cert, &bits); |
|
|
infof(data, " certificate public key: %s", |
|
|
gnutls_pk_algorithm_get_name((gnutls_pk_algorithm_t)algo)); |
|
|
|
|
|
|
|
|
infof(data, " certificate version: #%d", |
|
|
gnutls_x509_crt_get_version(x509_cert)); |
|
|
|
|
|
|
|
|
rc = gnutls_x509_crt_get_dn2(x509_cert, &certfields); |
|
|
if(rc) |
|
|
infof(data, "Failed to get certificate name"); |
|
|
else { |
|
|
infof(data, " subject: %s", certfields.data); |
|
|
|
|
|
certclock = gnutls_x509_crt_get_activation_time(x509_cert); |
|
|
showtime(data, "start date", certclock); |
|
|
|
|
|
certclock = gnutls_x509_crt_get_expiration_time(x509_cert); |
|
|
showtime(data, "expire date", certclock); |
|
|
|
|
|
gnutls_free(certfields.data); |
|
|
} |
|
|
|
|
|
rc = gnutls_x509_crt_get_issuer_dn2(x509_cert, &certfields); |
|
|
if(rc) |
|
|
infof(data, "Failed to get certificate issuer"); |
|
|
else { |
|
|
infof(data, " issuer: %s", certfields.data); |
|
|
|
|
|
gnutls_free(certfields.data); |
|
|
} |
|
|
#endif |
|
|
|
|
|
gnutls_x509_crt_deinit(x509_cert); |
|
|
|
|
|
return result; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_verifyserver(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
gnutls_session_t session) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct ssl_primary_config *conn_config = Curl_ssl_cf_get_primary_config(cf); |
|
|
struct ssl_config_data *ssl_config = Curl_ssl_cf_get_config(cf, data); |
|
|
#ifndef CURL_DISABLE_PROXY |
|
|
const char *pinned_key = Curl_ssl_cf_is_proxy(cf) ? |
|
|
data->set.str[STRING_SSL_PINNEDPUBLICKEY_PROXY] : |
|
|
data->set.str[STRING_SSL_PINNEDPUBLICKEY]; |
|
|
#else |
|
|
const char *pinned_key = data->set.str[STRING_SSL_PINNEDPUBLICKEY]; |
|
|
#endif |
|
|
CURLcode result; |
|
|
|
|
|
result = Curl_gtls_verifyserver(data, session, conn_config, ssl_config, |
|
|
&connssl->peer, pinned_key); |
|
|
if(result) |
|
|
goto out; |
|
|
|
|
|
|
|
|
|
|
|
if(gnutls_protocol_get_version(session) < GNUTLS_TLS1_3) |
|
|
result = cf_gtls_update_session_id(cf, data, session); |
|
|
|
|
|
out: |
|
|
return result; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_set_earlydata(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
const void *buf, size_t blen) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
ssize_t nwritten = 0; |
|
|
CURLcode result = CURLE_OK; |
|
|
|
|
|
DEBUGASSERT(connssl->earlydata_state == ssl_earlydata_use); |
|
|
DEBUGASSERT(Curl_bufq_is_empty(&connssl->earlydata)); |
|
|
if(blen) { |
|
|
if(blen > connssl->earlydata_max) |
|
|
blen = connssl->earlydata_max; |
|
|
nwritten = Curl_bufq_write(&connssl->earlydata, buf, blen, &result); |
|
|
CURL_TRC_CF(data, cf, "gtls_set_earlydata(len=%zu) -> %zd", |
|
|
blen, nwritten); |
|
|
if(nwritten < 0) |
|
|
return result; |
|
|
} |
|
|
connssl->earlydata_state = ssl_earlydata_sending; |
|
|
connssl->earlydata_skip = Curl_bufq_len(&connssl->earlydata); |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_send_earlydata(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
CURLcode result = CURLE_OK; |
|
|
const unsigned char *buf; |
|
|
size_t blen; |
|
|
ssize_t n; |
|
|
|
|
|
DEBUGASSERT(connssl->earlydata_state == ssl_earlydata_sending); |
|
|
backend->gtls.io_result = CURLE_OK; |
|
|
while(Curl_bufq_peek(&connssl->earlydata, &buf, &blen)) { |
|
|
n = gnutls_record_send_early_data(backend->gtls.session, buf, blen); |
|
|
CURL_TRC_CF(data, cf, "gtls_send_earlydata(len=%zu) -> %zd", |
|
|
blen, n); |
|
|
if(n < 0) { |
|
|
if(n == GNUTLS_E_AGAIN) |
|
|
result = CURLE_AGAIN; |
|
|
else |
|
|
result = backend->gtls.io_result ? |
|
|
backend->gtls.io_result : CURLE_SEND_ERROR; |
|
|
goto out; |
|
|
} |
|
|
else if(!n) { |
|
|
|
|
|
|
|
|
n = (ssize_t)blen; |
|
|
} |
|
|
|
|
|
Curl_bufq_skip(&connssl->earlydata, (size_t)n); |
|
|
} |
|
|
|
|
|
infof(data, "SSL sending %" FMT_OFF_T " bytes of early data", |
|
|
connssl->earlydata_skip); |
|
|
out: |
|
|
return result; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static CURLcode |
|
|
gtls_connect_common(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
bool nonblocking, |
|
|
bool *done) { |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
CURLcode result = CURLE_OK; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
|
|
|
|
|
|
if(connssl->connecting_state == ssl_connect_1) { |
|
|
result = gtls_connect_step1(cf, data); |
|
|
if(result) |
|
|
goto out; |
|
|
connssl->connecting_state = ssl_connect_2; |
|
|
} |
|
|
|
|
|
if(connssl->connecting_state == ssl_connect_2) { |
|
|
if(connssl->earlydata_state == ssl_earlydata_use) { |
|
|
goto out; |
|
|
} |
|
|
else if(connssl->earlydata_state == ssl_earlydata_sending) { |
|
|
result = gtls_send_earlydata(cf, data); |
|
|
if(result) |
|
|
goto out; |
|
|
connssl->earlydata_state = ssl_earlydata_sent; |
|
|
if(!Curl_ssl_cf_is_proxy(cf)) |
|
|
Curl_pgrsEarlyData(data, (curl_off_t)connssl->earlydata_skip); |
|
|
} |
|
|
DEBUGASSERT((connssl->earlydata_state == ssl_earlydata_none) || |
|
|
(connssl->earlydata_state == ssl_earlydata_sent)); |
|
|
|
|
|
result = handshake(cf, data, TRUE, nonblocking); |
|
|
if(result) |
|
|
goto out; |
|
|
connssl->connecting_state = ssl_connect_3; |
|
|
} |
|
|
|
|
|
|
|
|
if(connssl->connecting_state == ssl_connect_3) { |
|
|
gnutls_datum_t proto; |
|
|
int rc; |
|
|
result = gtls_verifyserver(cf, data, backend->gtls.session); |
|
|
if(result) |
|
|
goto out; |
|
|
|
|
|
connssl->state = ssl_connection_complete; |
|
|
connssl->connecting_state = ssl_connect_1; |
|
|
|
|
|
rc = gnutls_alpn_get_selected_protocol(backend->gtls.session, &proto); |
|
|
if(rc) { |
|
|
proto.data = NULL; |
|
|
proto.size = 0; |
|
|
} |
|
|
|
|
|
result = Curl_alpn_set_negotiated(cf, data, connssl, |
|
|
proto.data, proto.size); |
|
|
if(result) |
|
|
goto out; |
|
|
|
|
|
if(connssl->earlydata_state == ssl_earlydata_sent) { |
|
|
if(gnutls_session_get_flags(backend->gtls.session) & |
|
|
GNUTLS_SFLAGS_EARLY_DATA) { |
|
|
connssl->earlydata_state = ssl_earlydata_accepted; |
|
|
infof(data, "Server accepted %zu bytes of TLS early data.", |
|
|
connssl->earlydata_skip); |
|
|
} |
|
|
else { |
|
|
connssl->earlydata_state = ssl_earlydata_rejected; |
|
|
if(!Curl_ssl_cf_is_proxy(cf)) |
|
|
Curl_pgrsEarlyData(data, -(curl_off_t)connssl->earlydata_skip); |
|
|
infof(data, "Server rejected TLS early data."); |
|
|
connssl->earlydata_skip = 0; |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
out: |
|
|
if(result == CURLE_AGAIN) { |
|
|
*done = FALSE; |
|
|
return CURLE_OK; |
|
|
} |
|
|
*done = ((connssl->connecting_state == ssl_connect_1) || |
|
|
(connssl->state == ssl_connection_deferred)); |
|
|
return result; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_connect_nonblocking(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
bool *done) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
if(connssl->state == ssl_connection_deferred) { |
|
|
|
|
|
*done = TRUE; |
|
|
return CURLE_OK; |
|
|
} |
|
|
return gtls_connect_common(cf, data, TRUE, done); |
|
|
} |
|
|
|
|
|
static CURLcode gtls_connect(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data) |
|
|
{ |
|
|
CURLcode result; |
|
|
bool done = FALSE; |
|
|
|
|
|
result = gtls_connect_common(cf, data, FALSE, &done); |
|
|
if(result) |
|
|
return result; |
|
|
|
|
|
DEBUGASSERT(done); |
|
|
|
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_connect_deferred(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
const void *buf, |
|
|
size_t blen, |
|
|
bool *done) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
CURLcode result = CURLE_OK; |
|
|
|
|
|
DEBUGASSERT(connssl->state == ssl_connection_deferred); |
|
|
*done = FALSE; |
|
|
if(connssl->earlydata_state == ssl_earlydata_use) { |
|
|
result = gtls_set_earlydata(cf, data, buf, blen); |
|
|
if(result) |
|
|
return result; |
|
|
} |
|
|
|
|
|
return gtls_connect_common(cf, data, TRUE, done); |
|
|
} |
|
|
|
|
|
static bool gtls_data_pending(struct Curl_cfilter *cf, |
|
|
const struct Curl_easy *data) |
|
|
{ |
|
|
struct ssl_connect_data *ctx = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend; |
|
|
|
|
|
(void)data; |
|
|
DEBUGASSERT(ctx && ctx->backend); |
|
|
backend = (struct gtls_ssl_backend_data *)ctx->backend; |
|
|
if(backend->gtls.session && |
|
|
0 != gnutls_record_check_pending(backend->gtls.session)) |
|
|
return TRUE; |
|
|
return FALSE; |
|
|
} |
|
|
|
|
|
static ssize_t gtls_send(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
const void *buf, |
|
|
size_t blen, |
|
|
CURLcode *curlcode) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
ssize_t rc; |
|
|
size_t nwritten, total_written = 0; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
|
|
|
if(connssl->state == ssl_connection_deferred) { |
|
|
bool done = FALSE; |
|
|
*curlcode = gtls_connect_deferred(cf, data, buf, blen, &done); |
|
|
if(*curlcode) { |
|
|
rc = -1; |
|
|
goto out; |
|
|
} |
|
|
else if(!done) { |
|
|
*curlcode = CURLE_AGAIN; |
|
|
rc = -1; |
|
|
goto out; |
|
|
} |
|
|
DEBUGASSERT(connssl->state == ssl_connection_complete); |
|
|
} |
|
|
|
|
|
if(connssl->earlydata_skip) { |
|
|
if(connssl->earlydata_skip >= blen) { |
|
|
connssl->earlydata_skip -= blen; |
|
|
*curlcode = CURLE_OK; |
|
|
rc = (ssize_t)blen; |
|
|
goto out; |
|
|
} |
|
|
else { |
|
|
total_written += connssl->earlydata_skip; |
|
|
buf = ((const char *)buf) + connssl->earlydata_skip; |
|
|
blen -= connssl->earlydata_skip; |
|
|
connssl->earlydata_skip = 0; |
|
|
} |
|
|
} |
|
|
|
|
|
while(blen) { |
|
|
backend->gtls.io_result = CURLE_OK; |
|
|
rc = gnutls_record_send(backend->gtls.session, buf, blen); |
|
|
|
|
|
if(rc < 0) { |
|
|
if(total_written && (rc == GNUTLS_E_AGAIN)) { |
|
|
*curlcode = CURLE_OK; |
|
|
rc = (ssize_t)total_written; |
|
|
goto out; |
|
|
} |
|
|
*curlcode = (rc == GNUTLS_E_AGAIN) ? |
|
|
CURLE_AGAIN : |
|
|
(backend->gtls.io_result ? backend->gtls.io_result : CURLE_SEND_ERROR); |
|
|
|
|
|
rc = -1; |
|
|
goto out; |
|
|
} |
|
|
nwritten = (size_t)rc; |
|
|
total_written += nwritten; |
|
|
DEBUGASSERT(nwritten <= blen); |
|
|
buf = (char *)buf + nwritten; |
|
|
blen -= nwritten; |
|
|
} |
|
|
rc = total_written; |
|
|
|
|
|
out: |
|
|
return rc; |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
static CURLcode gtls_shutdown(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
bool send_shutdown, bool *done) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
char buf[1024]; |
|
|
CURLcode result = CURLE_OK; |
|
|
ssize_t nread; |
|
|
size_t i; |
|
|
|
|
|
DEBUGASSERT(backend); |
|
|
|
|
|
if(!backend->gtls.session || cf->shutdown || |
|
|
connssl->state != ssl_connection_complete) { |
|
|
*done = TRUE; |
|
|
goto out; |
|
|
} |
|
|
|
|
|
connssl->io_need = CURL_SSL_IO_NEED_NONE; |
|
|
*done = FALSE; |
|
|
|
|
|
if(!backend->gtls.sent_shutdown) { |
|
|
|
|
|
backend->gtls.sent_shutdown = TRUE; |
|
|
if(send_shutdown) { |
|
|
int ret = gnutls_bye(backend->gtls.session, GNUTLS_SHUT_RDWR); |
|
|
if((ret == GNUTLS_E_AGAIN) || (ret == GNUTLS_E_INTERRUPTED)) { |
|
|
CURL_TRC_CF(data, cf, "SSL shutdown, gnutls_bye EAGAIN"); |
|
|
connssl->io_need = gnutls_record_get_direction(backend->gtls.session) ? |
|
|
CURL_SSL_IO_NEED_SEND : CURL_SSL_IO_NEED_RECV; |
|
|
backend->gtls.sent_shutdown = FALSE; |
|
|
result = CURLE_OK; |
|
|
goto out; |
|
|
} |
|
|
if(ret != GNUTLS_E_SUCCESS) { |
|
|
CURL_TRC_CF(data, cf, "SSL shutdown, gnutls_bye error: '%s'(%d)", |
|
|
gnutls_strerror((int)ret), (int)ret); |
|
|
result = CURLE_RECV_ERROR; |
|
|
goto out; |
|
|
} |
|
|
} |
|
|
} |
|
|
|
|
|
|
|
|
|
|
|
for(i = 0; i < 10; ++i) { |
|
|
nread = gnutls_record_recv(backend->gtls.session, buf, sizeof(buf)); |
|
|
if(nread <= 0) |
|
|
break; |
|
|
} |
|
|
if(nread > 0) { |
|
|
|
|
|
} |
|
|
else if(nread == 0) { |
|
|
|
|
|
*done = TRUE; |
|
|
} |
|
|
else if((nread == GNUTLS_E_AGAIN) || (nread == GNUTLS_E_INTERRUPTED)) { |
|
|
connssl->io_need = gnutls_record_get_direction(backend->gtls.session) ? |
|
|
CURL_SSL_IO_NEED_SEND : CURL_SSL_IO_NEED_RECV; |
|
|
} |
|
|
else { |
|
|
CURL_TRC_CF(data, cf, "SSL shutdown, error: '%s'(%d)", |
|
|
gnutls_strerror((int)nread), (int)nread); |
|
|
result = CURLE_RECV_ERROR; |
|
|
} |
|
|
|
|
|
out: |
|
|
cf->shutdown = (result || *done); |
|
|
return result; |
|
|
} |
|
|
|
|
|
static void gtls_close(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
|
|
|
(void) data; |
|
|
DEBUGASSERT(backend); |
|
|
CURL_TRC_CF(data, cf, "close"); |
|
|
if(backend->gtls.session) { |
|
|
gnutls_deinit(backend->gtls.session); |
|
|
backend->gtls.session = NULL; |
|
|
} |
|
|
if(backend->gtls.shared_creds) { |
|
|
Curl_gtls_shared_creds_free(&backend->gtls.shared_creds); |
|
|
} |
|
|
#ifdef USE_GNUTLS_SRP |
|
|
if(backend->gtls.srp_client_cred) { |
|
|
gnutls_srp_free_client_credentials(backend->gtls.srp_client_cred); |
|
|
backend->gtls.srp_client_cred = NULL; |
|
|
} |
|
|
#endif |
|
|
} |
|
|
|
|
|
static ssize_t gtls_recv(struct Curl_cfilter *cf, |
|
|
struct Curl_easy *data, |
|
|
char *buf, |
|
|
size_t buffersize, |
|
|
CURLcode *curlcode) |
|
|
{ |
|
|
struct ssl_connect_data *connssl = cf->ctx; |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
ssize_t ret; |
|
|
|
|
|
(void)data; |
|
|
DEBUGASSERT(backend); |
|
|
|
|
|
if(connssl->state == ssl_connection_deferred) { |
|
|
bool done = FALSE; |
|
|
*curlcode = gtls_connect_deferred(cf, data, NULL, 0, &done); |
|
|
if(*curlcode) { |
|
|
ret = -1; |
|
|
goto out; |
|
|
} |
|
|
else if(!done) { |
|
|
*curlcode = CURLE_AGAIN; |
|
|
ret = -1; |
|
|
goto out; |
|
|
} |
|
|
DEBUGASSERT(connssl->state == ssl_connection_complete); |
|
|
} |
|
|
|
|
|
ret = gnutls_record_recv(backend->gtls.session, buf, buffersize); |
|
|
if((ret == GNUTLS_E_AGAIN) || (ret == GNUTLS_E_INTERRUPTED)) { |
|
|
*curlcode = CURLE_AGAIN; |
|
|
ret = -1; |
|
|
goto out; |
|
|
} |
|
|
|
|
|
if(ret == GNUTLS_E_REHANDSHAKE) { |
|
|
|
|
|
|
|
|
CURLcode result = handshake(cf, data, FALSE, FALSE); |
|
|
if(result) |
|
|
|
|
|
*curlcode = result; |
|
|
else |
|
|
*curlcode = CURLE_AGAIN; |
|
|
ret = -1; |
|
|
goto out; |
|
|
} |
|
|
|
|
|
if(ret < 0) { |
|
|
failf(data, "GnuTLS recv error (%d): %s", |
|
|
(int)ret, gnutls_strerror((int)ret)); |
|
|
*curlcode = backend->gtls.io_result ? |
|
|
backend->gtls.io_result : CURLE_RECV_ERROR; |
|
|
ret = -1; |
|
|
goto out; |
|
|
} |
|
|
|
|
|
out: |
|
|
return ret; |
|
|
} |
|
|
|
|
|
static size_t gtls_version(char *buffer, size_t size) |
|
|
{ |
|
|
return msnprintf(buffer, size, "GnuTLS/%s", gnutls_check_version(NULL)); |
|
|
} |
|
|
|
|
|
|
|
|
static CURLcode gtls_random(struct Curl_easy *data, |
|
|
unsigned char *entropy, size_t length) |
|
|
{ |
|
|
int rc; |
|
|
(void)data; |
|
|
rc = gnutls_rnd(GNUTLS_RND_RANDOM, entropy, length); |
|
|
return rc ? CURLE_FAILED_INIT : CURLE_OK; |
|
|
} |
|
|
|
|
|
static CURLcode gtls_sha256sum(const unsigned char *tmp, |
|
|
size_t tmplen, |
|
|
unsigned char *sha256sum, |
|
|
size_t sha256len) |
|
|
{ |
|
|
struct sha256_ctx SHA256pw; |
|
|
sha256_init(&SHA256pw); |
|
|
sha256_update(&SHA256pw, (unsigned int)tmplen, tmp); |
|
|
sha256_digest(&SHA256pw, (unsigned int)sha256len, sha256sum); |
|
|
return CURLE_OK; |
|
|
} |
|
|
|
|
|
static bool gtls_cert_status_request(void) |
|
|
{ |
|
|
return TRUE; |
|
|
} |
|
|
|
|
|
static void *gtls_get_internals(struct ssl_connect_data *connssl, |
|
|
CURLINFO info UNUSED_PARAM) |
|
|
{ |
|
|
struct gtls_ssl_backend_data *backend = |
|
|
(struct gtls_ssl_backend_data *)connssl->backend; |
|
|
(void)info; |
|
|
DEBUGASSERT(backend); |
|
|
return backend->gtls.session; |
|
|
} |
|
|
|
|
|
const struct Curl_ssl Curl_ssl_gnutls = { |
|
|
{ CURLSSLBACKEND_GNUTLS, "gnutls" }, |
|
|
|
|
|
SSLSUPP_CA_PATH | |
|
|
SSLSUPP_CERTINFO | |
|
|
SSLSUPP_PINNEDPUBKEY | |
|
|
SSLSUPP_HTTPS_PROXY | |
|
|
SSLSUPP_CA_CACHE, |
|
|
|
|
|
sizeof(struct gtls_ssl_backend_data), |
|
|
|
|
|
gtls_init, |
|
|
gtls_cleanup, |
|
|
gtls_version, |
|
|
Curl_none_check_cxn, |
|
|
gtls_shutdown, |
|
|
gtls_data_pending, |
|
|
gtls_random, |
|
|
gtls_cert_status_request, |
|
|
gtls_connect, |
|
|
gtls_connect_nonblocking, |
|
|
Curl_ssl_adjust_pollset, |
|
|
gtls_get_internals, |
|
|
gtls_close, |
|
|
Curl_none_close_all, |
|
|
Curl_none_set_engine, |
|
|
Curl_none_set_engine_default, |
|
|
Curl_none_engines_list, |
|
|
Curl_none_false_start, |
|
|
gtls_sha256sum, |
|
|
NULL, |
|
|
NULL, |
|
|
gtls_recv, |
|
|
gtls_send, |
|
|
NULL, |
|
|
}; |
|
|
|
|
|
#endif |
|
|
|