LCOV - code coverage report
Current view: top level - src - tls_openssl.c (source / functions) Hit Total Coverage
Test: coverage.info Lines: 124 497 24.9 %
Date: 2023-08-10 00:00:00 Functions: 13 36 36.1 %

          Line data    Source code
       1             : /* tls_openssl.c
       2             : ** strophe XMPP client library -- TLS abstraction openssl impl.
       3             : **
       4             : ** Copyright (C) 2005-008 Collecta, Inc.
       5             : **
       6             : **  This software is provided AS-IS with no warranty, either express
       7             : **  or implied.
       8             : **
       9             : **  This program is dual licensed under the MIT and GPLv3 licenses.
      10             : */
      11             : 
      12             : /** @file
      13             :  *  TLS implementation with OpenSSL.
      14             :  */
      15             : 
      16             : #include <errno.h> /* EINTR */
      17             : #include <string.h>
      18             : 
      19             : #ifndef _WIN32
      20             : #include <sys/select.h>
      21             : #else
      22             : #include <winsock2.h>
      23             : #endif
      24             : 
      25             : #include <openssl/ssl.h>
      26             : #include <openssl/err.h>
      27             : #include <openssl/opensslv.h>
      28             : #include <openssl/x509v3.h>
      29             : #include <openssl/pkcs12.h>
      30             : 
      31             : #include "common.h"
      32             : #include "tls.h"
      33             : #include "sock.h"
      34             : 
      35             : /*
      36             :  * Redefine OPENSSL_VERSION_NUMBER for LibreSSL.
      37             :  * LibreSSL and OpenSSL use different and incompatible version schemes. Solve
      38             :  * this issue in the way how nginx project did.
      39             :  */
      40             : #if (defined LIBRESSL_VERSION_NUMBER && OPENSSL_VERSION_NUMBER == 0x20000000L)
      41             : #undef OPENSSL_VERSION_NUMBER
      42             : #if (LIBRESSL_VERSION_NUMBER >= 0x2080000fL)
      43             : #define OPENSSL_VERSION_NUMBER 0x1010000fL
      44             : #elif (LIBRESSL_VERSION_NUMBER >= 0x2070000fL)
      45             : #define OPENSSL_VERSION_NUMBER 0x1000200fL
      46             : #else
      47             : #define OPENSSL_VERSION_NUMBER 0x1000107fL
      48             : #endif
      49             : #endif
      50             : 
      51             : #if OPENSSL_VERSION_NUMBER < 0x30000000L
      52             : #define STROPHE_ERR_func_error_string(e) ERR_func_error_string(e)
      53             : #else
      54             : #define STROPHE_ERR_func_error_string(e) ""
      55             : #endif
      56             : 
      57             : #if OPENSSL_VERSION_NUMBER < 0x10100000L
      58             : static const unsigned char *ASN1_STRING_get0_data(ASN1_STRING *asn1)
      59             : {
      60             :     return ASN1_STRING_data(asn1);
      61             : }
      62             : #endif
      63             : 
      64             : #if OPENSSL_VERSION_NUMBER < 0x10100000L || defined LIBRESSL_VERSION_NUMBER
      65             : static int SSL_CTX_use_cert_and_key(SSL_CTX *ctx,
      66             :                                     X509 *x509,
      67             :                                     EVP_PKEY *privatekey,
      68             :                                     STACK_OF(X509) * chain,
      69             :                                     int override)
      70             : {
      71             :     UNUSED(override);
      72             :     if (!ctx)
      73             :         return 0;
      74             :     if (x509 && !SSL_CTX_use_certificate(ctx, x509))
      75             :         return 0;
      76             :     if (privatekey && !SSL_CTX_use_PrivateKey(ctx, privatekey))
      77             :         return 0;
      78             : #ifdef SSL_CTX_set1_chain
      79             :     if (chain && !SSL_CTX_set1_chain(ctx, chain))
      80             :         return 0;
      81             : #else
      82             :     UNUSED(chain);
      83             : #endif
      84             :     return 1;
      85             : }
      86             : #endif
      87             : 
      88             : #if OPENSSL_VERSION_NUMBER < 0x10000000L
      89             : static int GENERAL_NAME_get0_otherName(const GENERAL_NAME *gen,
      90             :                                        ASN1_OBJECT **poid,
      91             :                                        ASN1_TYPE **pvalue)
      92             : {
      93             :     if (gen->type != GEN_OTHERNAME)
      94             :         return 0;
      95             :     if (poid)
      96             :         *poid = gen->d.otherName->type_id;
      97             :     if (pvalue)
      98             :         *pvalue = gen->d.otherName->value;
      99             :     return 1;
     100             : }
     101             : #endif
     102             : 
     103             : struct _tls {
     104             :     xmpp_ctx_t *ctx;
     105             :     sock_t sock;
     106             :     SSL_CTX *ssl_ctx;
     107             :     SSL *ssl;
     108             :     X509 *client_cert;
     109             :     int lasterror;
     110             : };
     111             : 
     112             : enum {
     113             :     TLS_SHUTDOWN_MAX_RETRIES = 10,
     114             :     TLS_TIMEOUT_SEC = 0,
     115             :     TLS_TIMEOUT_USEC = 100000,
     116             : };
     117             : 
     118             : static void _tls_sock_wait(tls_t *tls, int error);
     119             : static const char *_tls_error_str(int error, const char **tbl, size_t tbl_size);
     120             : static void _tls_set_error(tls_t *tls, int error);
     121             : static void _tls_log_error(xmpp_ctx_t *ctx);
     122             : static void _tls_dump_cert_info(tls_t *tls);
     123             : static X509 *_tls_cert_read(xmpp_conn_t *conn);
     124             : static X509 *
     125             : _tls_cert_read_p12(xmpp_conn_t *conn, EVP_PKEY **pkey, STACK_OF(X509) * *ca);
     126             : static int _tls_xaddr_nid(void);
     127             : static int _tls_xmppaddr_to_string(GENERAL_NAME *name, char **res);
     128             : static int _tls_dnsname_to_string(GENERAL_NAME *name, char **res);
     129             : static GENERAL_NAMES *_tls_conn_get_names(xmpp_conn_t *conn);
     130             : static GENERAL_NAMES *_tls_cert_get_names(X509 *client_cert);
     131             : 
     132             : #define TLS_ERROR_STR(error, table) \
     133             :     _tls_error_str(error, table, ARRAY_SIZE(table))
     134             : 
     135             : #define TLS_ERROR_FIELD(x) [x] = #x
     136             : const char *tls_errors[] = {
     137             :     TLS_ERROR_FIELD(SSL_ERROR_NONE),
     138             :     TLS_ERROR_FIELD(SSL_ERROR_SSL),
     139             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_READ),
     140             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_WRITE),
     141             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_X509_LOOKUP),
     142             :     TLS_ERROR_FIELD(SSL_ERROR_SYSCALL),
     143             :     TLS_ERROR_FIELD(SSL_ERROR_ZERO_RETURN),
     144             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_CONNECT),
     145             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_ACCEPT),
     146             : #ifndef LIBRESSL_VERSION_NUMBER
     147             : #if OPENSSL_VERSION_NUMBER >= 0x10100000L
     148             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_ASYNC),
     149             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_ASYNC_JOB),
     150             : #endif
     151             : #if OPENSSL_VERSION_NUMBER >= 0x10101000L
     152             :     TLS_ERROR_FIELD(SSL_ERROR_WANT_CLIENT_HELLO_CB),
     153             : #endif
     154             : #endif /* !LIBRESSL_VERSION_NUMBER */
     155             : };
     156             : const char *cert_errors[] = {
     157             :     TLS_ERROR_FIELD(X509_V_OK),
     158             : #if OPENSSL_VERSION_NUMBER >= 0x10002000L
     159             :     TLS_ERROR_FIELD(X509_V_ERR_UNSPECIFIED),
     160             : #endif
     161             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT),
     162             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_GET_CRL),
     163             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE),
     164             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE),
     165             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY),
     166             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_SIGNATURE_FAILURE),
     167             :     TLS_ERROR_FIELD(X509_V_ERR_CRL_SIGNATURE_FAILURE),
     168             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_NOT_YET_VALID),
     169             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_HAS_EXPIRED),
     170             :     TLS_ERROR_FIELD(X509_V_ERR_CRL_NOT_YET_VALID),
     171             :     TLS_ERROR_FIELD(X509_V_ERR_CRL_HAS_EXPIRED),
     172             :     TLS_ERROR_FIELD(X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD),
     173             :     TLS_ERROR_FIELD(X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD),
     174             :     TLS_ERROR_FIELD(X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD),
     175             :     TLS_ERROR_FIELD(X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD),
     176             :     TLS_ERROR_FIELD(X509_V_ERR_OUT_OF_MEM),
     177             :     TLS_ERROR_FIELD(X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT),
     178             :     TLS_ERROR_FIELD(X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN),
     179             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY),
     180             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE),
     181             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_CHAIN_TOO_LONG),
     182             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_REVOKED),
     183             :     TLS_ERROR_FIELD(X509_V_ERR_INVALID_CA),
     184             :     TLS_ERROR_FIELD(X509_V_ERR_PATH_LENGTH_EXCEEDED),
     185             :     TLS_ERROR_FIELD(X509_V_ERR_INVALID_PURPOSE),
     186             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_UNTRUSTED),
     187             :     TLS_ERROR_FIELD(X509_V_ERR_CERT_REJECTED),
     188             :     TLS_ERROR_FIELD(X509_V_ERR_SUBJECT_ISSUER_MISMATCH),
     189             :     TLS_ERROR_FIELD(X509_V_ERR_AKID_SKID_MISMATCH),
     190             :     TLS_ERROR_FIELD(X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH),
     191             :     TLS_ERROR_FIELD(X509_V_ERR_KEYUSAGE_NO_CERTSIGN),
     192             :     TLS_ERROR_FIELD(X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER),
     193             :     TLS_ERROR_FIELD(X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION),
     194             :     TLS_ERROR_FIELD(X509_V_ERR_KEYUSAGE_NO_CRL_SIGN),
     195             :     TLS_ERROR_FIELD(X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION),
     196             :     TLS_ERROR_FIELD(X509_V_ERR_INVALID_NON_CA),
     197             :     TLS_ERROR_FIELD(X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED),
     198             :     TLS_ERROR_FIELD(X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE),
     199             :     TLS_ERROR_FIELD(X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED),
     200             :     TLS_ERROR_FIELD(X509_V_ERR_INVALID_EXTENSION),
     201             :     TLS_ERROR_FIELD(X509_V_ERR_INVALID_POLICY_EXTENSION),
     202             :     TLS_ERROR_FIELD(X509_V_ERR_NO_EXPLICIT_POLICY),
     203             :     TLS_ERROR_FIELD(X509_V_ERR_APPLICATION_VERIFICATION),
     204             : #if OPENSSL_VERSION_NUMBER >= 0x10002000L
     205             :     TLS_ERROR_FIELD(X509_V_ERR_DIFFERENT_CRL_SCOPE),
     206             :     TLS_ERROR_FIELD(X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE),
     207             :     TLS_ERROR_FIELD(X509_V_ERR_UNNESTED_RESOURCE),
     208             :     TLS_ERROR_FIELD(X509_V_ERR_PERMITTED_VIOLATION),
     209             :     TLS_ERROR_FIELD(X509_V_ERR_EXCLUDED_VIOLATION),
     210             :     TLS_ERROR_FIELD(X509_V_ERR_SUBTREE_MINMAX),
     211             :     TLS_ERROR_FIELD(X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE),
     212             :     TLS_ERROR_FIELD(X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX),
     213             :     TLS_ERROR_FIELD(X509_V_ERR_UNSUPPORTED_NAME_SYNTAX),
     214             :     TLS_ERROR_FIELD(X509_V_ERR_CRL_PATH_VALIDATION_ERROR),
     215             : #ifndef LIBRESSL_VERSION_NUMBER
     216             :     TLS_ERROR_FIELD(X509_V_ERR_SUITE_B_INVALID_VERSION),
     217             :     TLS_ERROR_FIELD(X509_V_ERR_SUITE_B_INVALID_ALGORITHM),
     218             :     TLS_ERROR_FIELD(X509_V_ERR_SUITE_B_INVALID_CURVE),
     219             :     TLS_ERROR_FIELD(X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM),
     220             :     TLS_ERROR_FIELD(X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED),
     221             :     TLS_ERROR_FIELD(X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256),
     222             : #endif /* !LIBRESSL_VERSION_NUMBER */
     223             :     TLS_ERROR_FIELD(X509_V_ERR_HOSTNAME_MISMATCH),
     224             :     TLS_ERROR_FIELD(X509_V_ERR_EMAIL_MISMATCH),
     225             :     TLS_ERROR_FIELD(X509_V_ERR_IP_ADDRESS_MISMATCH),
     226             : #endif /* OPENSSL_VERSION_NUMBER >= 0x10002000L */
     227             : #if OPENSSL_VERSION_NUMBER >= 0x10100000L
     228             :     TLS_ERROR_FIELD(X509_V_ERR_INVALID_CALL),
     229             :     TLS_ERROR_FIELD(X509_V_ERR_STORE_LOOKUP),
     230             : #ifndef LIBRESSL_VERSION_NUMBER
     231             :     TLS_ERROR_FIELD(X509_V_ERR_PATH_LOOP),
     232             :     TLS_ERROR_FIELD(X509_V_ERR_DANE_NO_MATCH),
     233             :     TLS_ERROR_FIELD(X509_V_ERR_EE_KEY_TOO_SMALL),
     234             :     TLS_ERROR_FIELD(X509_V_ERR_CA_KEY_TOO_SMALL),
     235             :     TLS_ERROR_FIELD(X509_V_ERR_CA_MD_TOO_WEAK),
     236             :     TLS_ERROR_FIELD(X509_V_ERR_NO_VALID_SCTS),
     237             :     TLS_ERROR_FIELD(X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION),
     238             : #if OPENSSL_VERSION_NUMBER >= 0x10101000L
     239             :     TLS_ERROR_FIELD(X509_V_ERR_OCSP_VERIFY_NEEDED),
     240             :     TLS_ERROR_FIELD(X509_V_ERR_OCSP_VERIFY_FAILED),
     241             :     TLS_ERROR_FIELD(X509_V_ERR_OCSP_CERT_UNKNOWN),
     242             : #endif /* OPENSSL_VERSION_NUMBER >= 0x10101000L */
     243             : #endif /* !LIBRESSL_VERSION_NUMBER */
     244             : #endif /* OPENSSL_VERSION_NUMBER >= 0x10100000L */
     245             : };
     246             : #undef TLS_ERROR_FIELD
     247             : 
     248           2 : void tls_initialize(void)
     249             : {
     250             : #if OPENSSL_VERSION_NUMBER < 0x10100000L
     251             :     SSL_library_init();
     252             :     SSL_load_error_strings();
     253             : #else
     254           2 :     OPENSSL_init_ssl(OPENSSL_INIT_LOAD_SSL_STRINGS, NULL);
     255             : #endif
     256             :     /* init xmppAddr OID */
     257           2 :     _tls_xaddr_nid();
     258           2 : }
     259             : 
     260           2 : void tls_shutdown(void)
     261             : {
     262             :     /*
     263             :      * FIXME: Don't free global tables, program or other libraries may use
     264             :      * openssl after libstrophe finalization. Maybe better leak some fixed
     265             :      * memory rather than cause random crashes of the main program.
     266             :      */
     267             : #if OPENSSL_VERSION_NUMBER < 0x10100000L
     268             :     OBJ_cleanup();
     269             :     ERR_free_strings();
     270             :     EVP_cleanup();
     271             :     CRYPTO_cleanup_all_ex_data();
     272             : #if OPENSSL_VERSION_NUMBER >= 0x10002000L
     273             :     SSL_COMP_free_compression_methods();
     274             : #endif
     275             : #if OPENSSL_VERSION_NUMBER < 0x10000000L
     276             :     ERR_remove_state(0);
     277             : #else
     278             :     ERR_remove_thread_state(NULL);
     279             : #endif
     280             : #endif
     281           2 : }
     282             : 
     283           0 : int tls_error(tls_t *tls)
     284             : {
     285           0 :     return tls->lasterror;
     286             : }
     287             : 
     288             : /** Search through the SubjectAlternativeNames and return the next
     289             :  *  id-on-xmppAddr element starting from `n`.
     290             :  */
     291          24 : char *tls_id_on_xmppaddr(xmpp_conn_t *conn, unsigned int n)
     292             : {
     293          24 :     char *ret = NULL;
     294          24 :     int i, j;
     295          24 :     GENERAL_NAMES *names = _tls_conn_get_names(conn);
     296          24 :     if (!names) {
     297           0 :         _tls_log_error(conn->ctx);
     298           0 :         return NULL;
     299             :     }
     300          24 :     int num_names = sk_GENERAL_NAME_num(names);
     301         104 :     for (i = j = 0; i < num_names; ++i) {
     302          72 :         char *res;
     303          72 :         GENERAL_NAME *name = sk_GENERAL_NAME_value(names, i);
     304          72 :         if (name == NULL)
     305             :             break;
     306          72 :         if (_tls_xmppaddr_to_string(name, &res))
     307          32 :             continue;
     308          40 :         if (j == (int)n) {
     309          16 :             strophe_debug(conn->ctx, "tls",
     310             :                           "extracted jid %s from id-on-xmppAddr", res);
     311          16 :             ret = strophe_strdup(conn->ctx, res);
     312          16 :             OPENSSL_free(res);
     313             :             break;
     314             :         }
     315          24 :         j++;
     316          24 :         OPENSSL_free(res);
     317             :     }
     318          24 :     GENERAL_NAMES_free(names);
     319          24 :     return ret;
     320             : }
     321             : 
     322           8 : unsigned int tls_id_on_xmppaddr_num(xmpp_conn_t *conn)
     323             : {
     324           8 :     unsigned int ret = 0;
     325           8 :     GENERAL_NAMES *names = _tls_conn_get_names(conn);
     326           8 :     if (!names) {
     327           0 :         _tls_log_error(conn->ctx);
     328           0 :         return 0;
     329             :     }
     330           8 :     int j, num_names = sk_GENERAL_NAME_num(names);
     331          48 :     for (j = 0; j < num_names; ++j) {
     332          32 :         GENERAL_NAME *name = sk_GENERAL_NAME_value(names, j);
     333          32 :         if (_tls_xmppaddr_to_string(name, NULL))
     334          16 :             continue;
     335          16 :         ret++;
     336             :     }
     337           8 :     GENERAL_NAMES_free(names);
     338           8 :     return ret;
     339             : }
     340             : 
     341           0 : static int _convert_ASN1TIME(ASN1_TIME *ansi_time, char *buf, size_t len)
     342             : {
     343           0 :     BIO *bio = BIO_new(BIO_s_mem());
     344           0 :     int rc = ASN1_TIME_print(bio, ansi_time);
     345           0 :     if (rc <= 0) {
     346           0 :         BIO_free(bio);
     347           0 :         return 0;
     348             :     }
     349           0 :     rc = BIO_gets(bio, buf, len);
     350           0 :     if (rc <= 0) {
     351           0 :         BIO_free(bio);
     352           0 :         return 0;
     353             :     }
     354           0 :     BIO_free(bio);
     355           0 :     return 1;
     356             : }
     357             : 
     358           0 : static char *_asn1_time_to_str(const xmpp_ctx_t *ctx, ASN1_TIME *t)
     359             : {
     360           0 :     char buf[128];
     361           0 :     int res = _convert_ASN1TIME(t, buf, sizeof(buf));
     362           0 :     if (res) {
     363           0 :         return strophe_strdup(ctx, buf);
     364             :     }
     365             :     return NULL;
     366             : }
     367             : 
     368             : static char *
     369           0 : _get_fingerprint(const xmpp_ctx_t *ctx, X509 *err_cert, xmpp_cert_element_t el)
     370             : {
     371           0 :     unsigned char buf[EVP_MAX_MD_SIZE];
     372           0 :     unsigned int len;
     373           0 :     const EVP_MD *digest;
     374           0 :     switch (el) {
     375           0 :     case XMPP_CERT_FINGERPRINT_SHA1:
     376           0 :         digest = EVP_sha1();
     377             :         break;
     378           0 :     case XMPP_CERT_FINGERPRINT_SHA256:
     379           0 :         digest = EVP_sha256();
     380             :         break;
     381             :     default:
     382           0 :         return NULL;
     383             :     }
     384           0 :     if (X509_digest(err_cert, digest, buf, &len) != 0) {
     385           0 :         char fingerprint[4 * EVP_MAX_MD_SIZE];
     386           0 :         hex_encode(fingerprint, buf, len);
     387           0 :         return strophe_strdup(ctx, fingerprint);
     388             :     }
     389             :     return NULL;
     390             : }
     391             : 
     392             : static char *
     393           0 : _get_alg(const xmpp_ctx_t *ctx, X509 *err_cert, xmpp_cert_element_t el)
     394             : {
     395           0 :     int alg_nid = NID_undef;
     396             : 
     397           0 :     switch (el) {
     398           0 :     case XMPP_CERT_KEYALG: {
     399             : #if OPENSSL_VERSION_NUMBER < 0x10100000L
     400             :         alg_nid = OBJ_obj2nid(err_cert->cert_info->key->algor->algorithm);
     401             : #else
     402           0 :         X509_PUBKEY *pubkey = X509_get_X509_PUBKEY(err_cert);
     403           0 :         ASN1_OBJECT *ppkalg = NULL;
     404           0 :         if (X509_PUBKEY_get0_param(&ppkalg, NULL, NULL, NULL, pubkey)) {
     405           0 :             alg_nid = OBJ_obj2nid(ppkalg);
     406             :         }
     407             : #endif
     408           0 :     } break;
     409           0 :     case XMPP_CERT_SIGALG: {
     410             : #if OPENSSL_VERSION_NUMBER < 0x10100000L
     411             :         alg_nid = OBJ_obj2nid(err_cert->sig_alg->algorithm);
     412             : #else
     413           0 :         const X509_ALGOR *palg;
     414           0 :         X509_get0_signature(NULL, &palg, err_cert);
     415           0 :         alg_nid = OBJ_obj2nid(palg->algorithm);
     416             : #endif
     417           0 :     } break;
     418             :     default:
     419             :         break;
     420             :     }
     421           0 :     if (alg_nid != NID_undef) {
     422           0 :         const char *alg = OBJ_nid2ln(alg_nid);
     423           0 :         if (alg) {
     424           0 :             return strophe_strdup(ctx, alg);
     425             :         }
     426             :     }
     427             :     return NULL;
     428             : }
     429             : 
     430           0 : static xmpp_tlscert_t *_x509_to_tlscert(xmpp_ctx_t *ctx, X509 *cert)
     431             : {
     432           0 :     char *subject, *issuer, buf[32];
     433           0 :     xmpp_tlscert_t *tlscert = tlscert_new(ctx);
     434           0 :     if (!tlscert)
     435           0 :         return NULL;
     436             : 
     437           0 :     BIO *b = BIO_new(BIO_s_mem());
     438           0 :     if (!b)
     439           0 :         goto error_out;
     440           0 :     PEM_write_bio_X509(b, cert);
     441           0 :     BUF_MEM *bptr;
     442           0 :     BIO_get_mem_ptr(b, &bptr);
     443           0 :     tlscert->pem = strophe_alloc(ctx, bptr->length + 1);
     444           0 :     if (!tlscert->pem)
     445           0 :         goto error_out;
     446           0 :     memcpy(tlscert->pem, bptr->data, bptr->length);
     447           0 :     tlscert->pem[bptr->length] = '\0';
     448           0 :     BIO_free(b);
     449             : 
     450           0 :     subject = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
     451           0 :     if (!subject)
     452           0 :         goto error_out;
     453           0 :     tlscert->elements[XMPP_CERT_SUBJECT] = strophe_strdup(ctx, subject);
     454           0 :     OPENSSL_free(subject);
     455           0 :     issuer = X509_NAME_oneline(X509_get_issuer_name(cert), NULL, 0);
     456           0 :     if (!issuer)
     457           0 :         goto error_out;
     458           0 :     tlscert->elements[XMPP_CERT_ISSUER] = strophe_strdup(ctx, issuer);
     459           0 :     OPENSSL_free(issuer);
     460             : 
     461           0 :     tlscert->elements[XMPP_CERT_NOTBEFORE] =
     462           0 :         _asn1_time_to_str(ctx, X509_get_notBefore(cert));
     463           0 :     tlscert->elements[XMPP_CERT_NOTAFTER] =
     464           0 :         _asn1_time_to_str(ctx, X509_get_notAfter(cert));
     465             : 
     466           0 :     tlscert->elements[XMPP_CERT_FINGERPRINT_SHA1] =
     467           0 :         _get_fingerprint(ctx, cert, XMPP_CERT_FINGERPRINT_SHA1);
     468           0 :     tlscert->elements[XMPP_CERT_FINGERPRINT_SHA256] =
     469           0 :         _get_fingerprint(ctx, cert, XMPP_CERT_FINGERPRINT_SHA256);
     470             : 
     471           0 :     strophe_snprintf(buf, sizeof(buf), "%ld", X509_get_version(cert) + 1);
     472           0 :     tlscert->elements[XMPP_CERT_VERSION] = strophe_strdup(ctx, buf);
     473             : 
     474           0 :     tlscert->elements[XMPP_CERT_KEYALG] = _get_alg(ctx, cert, XMPP_CERT_KEYALG);
     475           0 :     tlscert->elements[XMPP_CERT_SIGALG] = _get_alg(ctx, cert, XMPP_CERT_SIGALG);
     476             : 
     477           0 :     ASN1_INTEGER *serial = X509_get_serialNumber(cert);
     478           0 :     BIGNUM *bn = ASN1_INTEGER_to_BN(serial, NULL);
     479           0 :     if (bn) {
     480           0 :         char *serialnumber = BN_bn2hex(bn);
     481           0 :         if (serialnumber) {
     482           0 :             tlscert->elements[XMPP_CERT_SERIALNUMBER] =
     483           0 :                 strophe_strdup(ctx, serialnumber);
     484           0 :             OPENSSL_free(serialnumber);
     485             :         }
     486           0 :         BN_free(bn);
     487             :     }
     488             : 
     489           0 :     GENERAL_NAMES *names = _tls_cert_get_names(cert);
     490           0 :     if (names) {
     491           0 :         int j, num_names = sk_GENERAL_NAME_num(names);
     492             :         size_t n = 0;
     493           0 :         for (j = 0; j < num_names; ++j) {
     494           0 :             char *res;
     495           0 :             GENERAL_NAME *name = sk_GENERAL_NAME_value(names, j);
     496           0 :             if (_tls_dnsname_to_string(name, &res))
     497           0 :                 continue;
     498           0 :             if (tlscert_add_dnsname(tlscert, res))
     499           0 :                 strophe_debug(ctx, "tls", "Can't store dnsName(%zu): %s", n,
     500             :                               res);
     501           0 :             n++;
     502           0 :             OPENSSL_free(res);
     503             :         }
     504           0 :         GENERAL_NAMES_free(names);
     505             :     }
     506             : 
     507             :     return tlscert;
     508           0 : error_out:
     509           0 :     xmpp_tlscert_free(tlscert);
     510             :     return NULL;
     511             : }
     512             : 
     513           0 : static int _tls_verify(int preverify_ok, X509_STORE_CTX *x509_ctx)
     514             : {
     515           0 :     if (preverify_ok == 1)
     516             :         return 1;
     517             : 
     518           0 :     SSL *ssl = X509_STORE_CTX_get_ex_data(x509_ctx,
     519             :                                           SSL_get_ex_data_X509_STORE_CTX_idx());
     520           0 :     xmpp_conn_t *conn = SSL_get_app_data(ssl);
     521             : 
     522           0 :     if (!conn->certfail_handler) {
     523           0 :         strophe_error(conn->ctx, "tls",
     524             :                       "No certfail handler set, canceling connection attempt");
     525           0 :         return 0;
     526             :     }
     527             : 
     528           0 :     X509 *err_cert = X509_STORE_CTX_get_current_cert(x509_ctx);
     529             : 
     530           0 :     xmpp_tlscert_t *tlscert = _x509_to_tlscert(conn->ctx, err_cert);
     531             : 
     532           0 :     if (!tlscert)
     533             :         return 0;
     534             : 
     535           0 :     strophe_debug(conn->ctx, "tls", "preverify_ok:%d\nSubject: %s\nIssuer: %s",
     536             :                   preverify_ok, tlscert->elements[XMPP_CERT_SUBJECT],
     537             :                   tlscert->elements[XMPP_CERT_ISSUER]);
     538             : 
     539           0 :     int ret = conn->certfail_handler(
     540             :         tlscert,
     541           0 :         X509_verify_cert_error_string(X509_STORE_CTX_get_error(x509_ctx)));
     542             : 
     543           0 :     xmpp_tlscert_free(tlscert);
     544             : 
     545           0 :     return ret;
     546             : }
     547             : 
     548           8 : static int _tls_password_callback(char *buf, int size, int rwflag, void *u)
     549             : {
     550           8 :     UNUSED(rwflag);
     551           8 :     return tls_caching_password_callback(buf, size, u);
     552             : }
     553             : 
     554           0 : tls_t *tls_new(xmpp_conn_t *conn)
     555             : {
     556           0 :     tls_t *tls = strophe_alloc(conn->ctx, sizeof(*tls));
     557             : 
     558           0 :     if (tls) {
     559           0 :         int ret;
     560             : #if OPENSSL_VERSION_NUMBER >= 0x10002000L
     561             :         /* Hostname verification is supported in OpenSSL 1.0.2 and newer. */
     562           0 :         X509_VERIFY_PARAM *param;
     563             : #endif
     564           0 :         memset(tls, 0, sizeof(*tls));
     565             : 
     566           0 :         tls->ctx = conn->ctx;
     567           0 :         tls->sock = conn->sock;
     568             : #if OPENSSL_VERSION_NUMBER < 0x10100000L
     569             :         tls->ssl_ctx = SSL_CTX_new(SSLv23_client_method());
     570             : #else
     571           0 :         tls->ssl_ctx = SSL_CTX_new(TLS_client_method());
     572             : #endif
     573           0 :         if (tls->ssl_ctx == NULL)
     574           0 :             goto err;
     575             : 
     576             :         /* Enable bug workarounds. */
     577           0 :         SSL_CTX_set_options(tls->ssl_ctx, SSL_OP_ALL);
     578             : 
     579             :         /* Disable insecure SSL/TLS versions. */
     580           0 :         SSL_CTX_set_options(tls->ssl_ctx, SSL_OP_NO_SSLv2); /* DROWN */
     581           0 :         SSL_CTX_set_options(tls->ssl_ctx, SSL_OP_NO_SSLv3); /* POODLE */
     582           0 :         SSL_CTX_set_options(tls->ssl_ctx, SSL_OP_NO_TLSv1); /* BEAST */
     583             : 
     584           0 :         if (conn->password_callback) {
     585           0 :             SSL_CTX_set_default_passwd_cb(tls->ssl_ctx, _tls_password_callback);
     586           0 :             SSL_CTX_set_default_passwd_cb_userdata(tls->ssl_ctx, conn);
     587             :         }
     588             : 
     589           0 :         if (conn->tls_client_cert && conn->tls_client_key) {
     590           0 :             unsigned int retries = 0;
     591           0 :             tls->client_cert = _tls_cert_read(conn);
     592           0 :             if (!tls->client_cert) {
     593           0 :                 strophe_error(tls->ctx, "tls",
     594             :                               "could not read client certificate");
     595           0 :                 goto err_free_ctx;
     596             :             }
     597             : 
     598           0 :             SSL_CTX_use_certificate_file(tls->ssl_ctx, conn->tls_client_cert,
     599             :                                          SSL_FILETYPE_PEM);
     600           0 :             while (retries++ < conn->password_retries) {
     601           0 :                 if (SSL_CTX_use_PrivateKey_file(
     602           0 :                         tls->ssl_ctx, conn->tls_client_key, SSL_FILETYPE_PEM)) {
     603             :                     break;
     604             :                 }
     605           0 :                 tls_clear_password_cache(conn);
     606           0 :                 unsigned long err = ERR_peek_error();
     607           0 :                 if ((ERR_GET_LIB(err) == ERR_LIB_EVP &&
     608           0 :                      ERR_GET_REASON(err) == EVP_R_BAD_DECRYPT) ||
     609           0 :                     (ERR_GET_LIB(err) == ERR_LIB_PEM &&
     610           0 :                      ERR_GET_REASON(err) == PEM_R_BAD_DECRYPT)) {
     611           0 :                     strophe_debug(tls->ctx, "tls", "wrong password?");
     612           0 :                     continue;
     613             :                 }
     614           0 :                 strophe_error(tls->ctx, "tls",
     615             :                               "could not use private key %d %d",
     616             :                               ERR_GET_LIB(err), ERR_GET_REASON(err));
     617           0 :                 goto err_free_ctx;
     618             :             }
     619           0 :         } else if (conn->tls_client_cert) {
     620           0 :             EVP_PKEY *pkey = NULL;
     621           0 :             STACK_OF(X509) *ca = NULL;
     622           0 :             X509 *cert = _tls_cert_read_p12(conn, &pkey, &ca);
     623           0 :             if (!cert) {
     624           0 :                 goto err_free_ctx;
     625             :             }
     626             : 
     627           0 :             SSL_CTX_use_cert_and_key(tls->ssl_ctx, cert, pkey, ca, 1);
     628             : 
     629           0 :             if (pkey)
     630           0 :                 EVP_PKEY_free(pkey);
     631           0 :             if (ca)
     632           0 :                 sk_X509_pop_free(ca, X509_free);
     633           0 :             tls->client_cert = cert;
     634             :         } else {
     635             :             /* If the server asks for a client certificate, don't send one. */
     636           0 :             SSL_CTX_set_client_cert_cb(tls->ssl_ctx, NULL);
     637             :         }
     638             : 
     639           0 :         SSL_CTX_set_mode(tls->ssl_ctx, SSL_MODE_ENABLE_PARTIAL_WRITE);
     640             : 
     641           0 :         ret = SSL_CTX_set_default_verify_paths(tls->ssl_ctx);
     642           0 :         if (ret == 0 && !conn->tls_trust) {
     643             :             /*
     644             :              * Returns 1 on success and 0 on failure. A missing default
     645             :              * location is still treated as a success.
     646             :              * Ignore errors when XMPP_CONN_FLAG_TRUST_TLS is set.
     647             :              */
     648           0 :             strophe_error(tls->ctx, "tls",
     649             :                           "SSL_CTX_set_default_verify_paths() failed");
     650           0 :             goto err_free_cert;
     651             :         }
     652             : 
     653           0 :         if (conn->tls_cafile || conn->tls_capath) {
     654           0 :             if (SSL_CTX_load_verify_locations(tls->ssl_ctx, conn->tls_cafile,
     655           0 :                                               conn->tls_capath) == 0) {
     656           0 :                 strophe_error(tls->ctx, "tls",
     657             :                               "SSL_CTX_load_verify_locations() failed");
     658           0 :                 goto err_free_cert;
     659             :             }
     660             :         }
     661             : 
     662           0 :         tls->ssl = SSL_new(tls->ssl_ctx);
     663           0 :         if (tls->ssl == NULL)
     664           0 :             goto err_free_cert;
     665             : 
     666             : #if OPENSSL_VERSION_NUMBER >= 0x0908060L && !defined(OPENSSL_NO_TLSEXT)
     667             :         /* Enable SNI. */
     668           0 :         SSL_set_tlsext_host_name(tls->ssl, conn->domain);
     669             : #endif
     670             : 
     671             :         /* Trust server's certificate when user sets the flag explicitly.
     672             :          * Otherwise call the verification callback */
     673           0 :         if (conn->tls_trust)
     674           0 :             SSL_set_verify(tls->ssl, SSL_VERIFY_NONE, NULL);
     675             :         else
     676           0 :             SSL_set_verify(tls->ssl, SSL_VERIFY_PEER, _tls_verify);
     677           0 :         SSL_set_app_data(tls->ssl, conn);
     678             : #if OPENSSL_VERSION_NUMBER >= 0x10002000L
     679             :         /* Hostname verification is supported in OpenSSL 1.0.2 and newer. */
     680           0 :         param = SSL_get0_param(tls->ssl);
     681             : 
     682             :         /*
     683             :          * Allow only complete wildcards.  RFC 6125 discourages wildcard usage
     684             :          * completely, and lists internationalized domain names as a reason
     685             :          * against partial wildcards.
     686             :          * See https://tools.ietf.org/html/rfc6125#section-7.2 for more
     687             :          * information.
     688             :          */
     689           0 :         X509_VERIFY_PARAM_set_hostflags(param,
     690             :                                         X509_CHECK_FLAG_NO_PARTIAL_WILDCARDS);
     691           0 :         X509_VERIFY_PARAM_set1_host(param, conn->domain, 0);
     692             : #endif
     693             : 
     694           0 :         ret = SSL_set_fd(tls->ssl, conn->sock);
     695           0 :         if (ret <= 0)
     696           0 :             goto err_free_ssl;
     697             :     }
     698             : 
     699             :     return tls;
     700             : 
     701           0 : err_free_ssl:
     702           0 :     SSL_free(tls->ssl);
     703           0 : err_free_cert:
     704           0 :     X509_free(tls->client_cert);
     705           0 : err_free_ctx:
     706           0 :     SSL_CTX_free(tls->ssl_ctx);
     707           0 : err:
     708           0 :     strophe_free(conn->ctx, tls);
     709           0 :     _tls_log_error(conn->ctx);
     710           0 :     return NULL;
     711             : }
     712             : 
     713           0 : void tls_free(tls_t *tls)
     714             : {
     715           0 :     SSL_free(tls->ssl);
     716           0 :     X509_free(tls->client_cert);
     717           0 :     SSL_CTX_free(tls->ssl_ctx);
     718           0 :     strophe_free(tls->ctx, tls);
     719           0 : }
     720             : 
     721           0 : xmpp_tlscert_t *tls_peer_cert(xmpp_conn_t *conn)
     722             : {
     723           0 :     if (conn && conn->tls && conn->tls->ssl) {
     724           0 :         X509 *cert = SSL_get_peer_certificate(conn->tls->ssl);
     725           0 :         if (cert) {
     726           0 :             xmpp_tlscert_t *tlscert = _x509_to_tlscert(conn->ctx, cert);
     727           0 :             X509_free(cert);
     728           0 :             return tlscert;
     729             :         }
     730             :     }
     731             :     return NULL;
     732             : }
     733             : 
     734           0 : int tls_set_credentials(tls_t *tls, const char *cafilename)
     735             : {
     736           0 :     UNUSED(tls);
     737           0 :     UNUSED(cafilename);
     738           0 :     return -1;
     739             : }
     740             : 
     741           0 : int tls_start(tls_t *tls)
     742             : {
     743           0 :     int error;
     744           0 :     int ret;
     745           0 :     long x509_res;
     746             : 
     747             :     /* Since we're non-blocking, loop the connect call until it
     748             :        succeeds or fails */
     749           0 :     while (1) {
     750           0 :         ret = SSL_connect(tls->ssl);
     751           0 :         error = ret <= 0 ? SSL_get_error(tls->ssl, ret) : 0;
     752             : 
     753           0 :         if (ret == -1 && tls_is_recoverable(error)) {
     754             :             /* wait for something to happen on the sock before looping back */
     755           0 :             _tls_sock_wait(tls, error);
     756           0 :             continue;
     757             :         }
     758             : 
     759             :         /* success or fatal error */
     760           0 :         break;
     761             :     }
     762             : 
     763           0 :     x509_res = SSL_get_verify_result(tls->ssl);
     764           0 :     if (x509_res == X509_V_OK) {
     765           0 :         strophe_debug(tls->ctx, "tls", "Certificate verification passed");
     766             :     } else {
     767           0 :         strophe_debug(tls->ctx, "tls",
     768             :                       "Certificate verification FAILED, result=%s(%ld)",
     769             :                       TLS_ERROR_STR((int)x509_res, cert_errors), x509_res);
     770           0 :         if (ret > 0)
     771           0 :             strophe_debug(tls->ctx, "tls", "User decided to connect anyways");
     772             :     }
     773           0 :     _tls_dump_cert_info(tls);
     774             : 
     775           0 :     _tls_set_error(tls, error);
     776           0 :     return ret <= 0 ? 0 : 1;
     777             : }
     778             : 
     779           0 : int tls_stop(tls_t *tls)
     780             : {
     781           0 :     int retries = 0;
     782           0 :     int error;
     783           0 :     int ret;
     784             : 
     785             :     /* According to OpenSSL.org, we must not call SSL_shutdown(3)
     786             :        if a previous fatal error has occurred on a connection. */
     787           0 :     if (tls->lasterror == SSL_ERROR_SYSCALL || tls->lasterror == SSL_ERROR_SSL)
     788             :         return 1;
     789             : 
     790           0 :     while (1) {
     791           0 :         ++retries;
     792           0 :         ret = SSL_shutdown(tls->ssl);
     793           0 :         error = ret < 0 ? SSL_get_error(tls->ssl, ret) : 0;
     794           0 :         if (ret == 1 || !tls_is_recoverable(error) ||
     795             :             retries >= TLS_SHUTDOWN_MAX_RETRIES) {
     796             :             break;
     797             :         }
     798           0 :         _tls_sock_wait(tls, error);
     799             :     }
     800           0 :     if (error == SSL_ERROR_SYSCALL && errno == 0) {
     801             :         /*
     802             :          * Handle special case when peer closes connection instead of
     803             :          * proper shutdown.
     804             :          */
     805           0 :         error = 0;
     806           0 :         ret = 1;
     807             :     }
     808           0 :     _tls_set_error(tls, error);
     809             : 
     810           0 :     return ret <= 0 ? 0 : 1;
     811             : }
     812             : 
     813           0 : int tls_is_recoverable(int error)
     814             : {
     815           0 :     return (error == SSL_ERROR_NONE || error == SSL_ERROR_WANT_READ ||
     816           0 :             error == SSL_ERROR_WANT_WRITE || error == SSL_ERROR_WANT_CONNECT ||
     817             :             error == SSL_ERROR_WANT_ACCEPT);
     818             : }
     819             : 
     820           0 : int tls_pending(tls_t *tls)
     821             : {
     822           0 :     return SSL_pending(tls->ssl);
     823             : }
     824             : 
     825           0 : int tls_read(tls_t *tls, void *buff, size_t len)
     826             : {
     827           0 :     int ret;
     828             : 
     829           0 :     ret = SSL_read(tls->ssl, buff, len);
     830           0 :     _tls_set_error(tls, ret <= 0 ? SSL_get_error(tls->ssl, ret) : 0);
     831             : 
     832           0 :     return ret;
     833             : }
     834             : 
     835           0 : int tls_write(tls_t *tls, const void *buff, size_t len)
     836             : {
     837           0 :     int ret;
     838             : 
     839           0 :     ret = SSL_write(tls->ssl, buff, len);
     840           0 :     _tls_set_error(tls, ret <= 0 ? SSL_get_error(tls->ssl, ret) : 0);
     841             : 
     842           0 :     return ret;
     843             : }
     844             : 
     845           0 : int tls_clear_pending_write(tls_t *tls)
     846             : {
     847           0 :     UNUSED(tls);
     848           0 :     return 0;
     849             : }
     850             : 
     851           0 : static void _tls_sock_wait(tls_t *tls, int error)
     852             : {
     853           0 :     struct timeval tv;
     854           0 :     fd_set rfds;
     855           0 :     fd_set wfds;
     856           0 :     int nfds;
     857           0 :     int ret;
     858             : 
     859           0 :     if (error == SSL_ERROR_NONE)
     860           0 :         return;
     861             : 
     862           0 :     FD_ZERO(&rfds);
     863           0 :     FD_ZERO(&wfds);
     864           0 :     if (error == SSL_ERROR_WANT_READ)
     865           0 :         FD_SET(tls->sock, &rfds);
     866           0 :     if (error == SSL_ERROR_WANT_WRITE)
     867           0 :         FD_SET(tls->sock, &wfds);
     868           0 :     nfds = (error == SSL_ERROR_WANT_READ || error == SSL_ERROR_WANT_WRITE)
     869           0 :                ? tls->sock + 1
     870           0 :                : 0;
     871           0 :     do {
     872           0 :         tv.tv_sec = TLS_TIMEOUT_SEC;
     873           0 :         tv.tv_usec = TLS_TIMEOUT_USEC;
     874           0 :         ret = select(nfds, &rfds, &wfds, NULL, &tv);
     875           0 :     } while (ret == -1 && errno == EINTR);
     876             : }
     877             : 
     878           0 : static const char *_tls_error_str(int error, const char **tbl, size_t tbl_size)
     879             : {
     880           0 :     return (error >= 0 && (size_t)error < tbl_size) ? tbl[error] : "UNKNOWN";
     881             : }
     882             : 
     883           0 : static void _tls_set_error(tls_t *tls, int error)
     884             : {
     885           0 :     if (error != 0 && !tls_is_recoverable(error)) {
     886           0 :         strophe_debug(tls->ctx, "tls", "error=%s(%d) errno=%d lasterror=%d",
     887           0 :                       TLS_ERROR_STR(error, tls_errors), error, errno,
     888             :                       tls->lasterror);
     889           0 :         _tls_log_error(tls->ctx);
     890           0 :     } else if (tls->lasterror && tls->lasterror != error) {
     891           0 :         strophe_debug_verbose(1, tls->ctx, "tls", "overwrite lasterror=%d",
     892             :                               tls->lasterror);
     893             :     }
     894           0 :     tls->lasterror = error;
     895           0 : }
     896             : 
     897           0 : static void _tls_log_error(xmpp_ctx_t *ctx)
     898             : {
     899           0 :     unsigned long e;
     900             : 
     901           0 :     do {
     902           0 :         e = ERR_get_error();
     903           0 :         if (e != 0) {
     904           0 :             strophe_debug(
     905             :                 ctx, "tls", "error:%08X:%s:%s:%s", e, ERR_lib_error_string(e),
     906             :                 STROPHE_ERR_func_error_string(e), ERR_reason_error_string(e));
     907             :         }
     908           0 :     } while (e != 0);
     909           0 : }
     910             : 
     911           0 : static void _tls_dump_cert_info(tls_t *tls)
     912             : {
     913           0 :     X509 *cert;
     914           0 :     char *name;
     915             : 
     916           0 :     cert = SSL_get_peer_certificate(tls->ssl);
     917           0 :     if (cert == NULL)
     918           0 :         strophe_debug(tls->ctx, "tls", "Certificate was not presented by peer");
     919             :     else {
     920           0 :         name = X509_NAME_oneline(X509_get_subject_name(cert), NULL, 0);
     921           0 :         if (name != NULL) {
     922           0 :             strophe_debug(tls->ctx, "tls", "Subject=%s", name);
     923           0 :             OPENSSL_free(name);
     924             :         }
     925           0 :         name = X509_NAME_oneline(X509_get_issuer_name(cert), NULL, 0);
     926           0 :         if (name != NULL) {
     927           0 :             strophe_debug(tls->ctx, "tls", "Issuer=%s", name);
     928           0 :             OPENSSL_free(name);
     929             :         }
     930           0 :         X509_free(cert);
     931             :     }
     932           0 : }
     933             : 
     934           8 : static X509 *_tls_cert_read_x509(xmpp_conn_t *conn)
     935             : {
     936           8 :     if (conn->tls && conn->tls->client_cert)
     937             :         return conn->tls->client_cert;
     938           8 :     BIO *f = BIO_new_file(conn->tls_client_cert, "r");
     939           8 :     if (!f) {
     940           0 :         strophe_debug(conn->ctx, "tls", "f == NULL");
     941           0 :         return NULL;
     942             :     }
     943           8 :     X509 *c = PEM_read_bio_X509(f, NULL, NULL, NULL);
     944           8 :     BIO_free(f);
     945           8 :     if (!c) {
     946           0 :         _tls_log_error(conn->ctx);
     947             :     }
     948             :     return c;
     949             : }
     950             : 
     951          32 : static int _tls_parse_p12(PKCS12 *p12,
     952             :                           const char *pass,
     953             :                           EVP_PKEY **pkey,
     954             :                           X509 **cert,
     955             :                           STACK_OF(X509) * *ca)
     956             : {
     957             :     /* For some reason `PKCS12_parse()` fails without a `EVP_PKEY`
     958             :      * so if the user doesn't want it, use a local one and free it
     959             :      * again directly after parsing.
     960             :      */
     961          32 :     EVP_PKEY *pkey_;
     962          32 :     if (!pkey)
     963          32 :         pkey = &pkey_;
     964          32 :     int parse_ok = PKCS12_parse(p12, pass, pkey, cert, ca);
     965          32 :     if (pkey == &pkey_ && pkey_)
     966          24 :         EVP_PKEY_free(pkey_);
     967          32 :     return parse_ok;
     968             : }
     969             : 
     970             : static X509 *
     971          24 : _tls_cert_read_p12(xmpp_conn_t *conn, EVP_PKEY **pkey, STACK_OF(X509) * *ca)
     972             : {
     973          24 :     if (conn->tls && conn->tls->client_cert && !pkey && !ca)
     974          24 :         return conn->tls->client_cert;
     975          24 :     X509 *cert = NULL;
     976          24 :     PKCS12 *p12 = NULL;
     977          24 :     BIO *f = BIO_new_file(conn->tls_client_cert, "rb");
     978          24 :     if (!f) {
     979           0 :         strophe_debug(conn->ctx, "tls", "f == NULL");
     980           0 :         goto error_out;
     981             :     }
     982          24 :     p12 = d2i_PKCS12_bio(f, NULL);
     983          24 :     BIO_free(f);
     984          24 :     if (!p12) {
     985           0 :         strophe_debug(conn->ctx, "tls", "Could not read p12 file");
     986           0 :         goto error_out;
     987             :     }
     988             : 
     989             :     /* First try to open file w/o a pass */
     990          24 :     if (_tls_parse_p12(p12, NULL, pkey, &cert, ca)) {
     991          16 :         goto success;
     992             :     }
     993           8 :     cert = NULL;
     994             : 
     995           8 :     unsigned int retries = 0;
     996             : 
     997           8 :     pem_password_cb *cb = PEM_def_callback;
     998           8 :     void *userdata = NULL;
     999           8 :     if (conn->password_callback) {
    1000           8 :         cb = _tls_password_callback;
    1001           8 :         userdata = conn;
    1002             :     }
    1003             : 
    1004           8 :     while (retries++ < conn->password_retries) {
    1005           8 :         char pass[PEM_BUFSIZE + 1];
    1006           8 :         int passlen = cb(pass, PEM_BUFSIZE, 0, userdata);
    1007           8 :         if (passlen < 0 || passlen > PEM_BUFSIZE)
    1008           0 :             goto error_out;
    1009           8 :         int parse_ok = _tls_parse_p12(p12, pass, pkey, &cert, ca);
    1010           8 :         if (parse_ok) {
    1011           8 :             goto success;
    1012             :         }
    1013           0 :         cert = NULL;
    1014           0 :         tls_clear_password_cache(conn);
    1015           0 :         int err = ERR_peek_last_error();
    1016           0 :         if (ERR_GET_LIB(err) == ERR_LIB_PKCS12 &&
    1017           0 :             ERR_GET_REASON(err) == PKCS12_R_MAC_VERIFY_FAILURE) {
    1018           0 :             strophe_debug(conn->ctx, "tls",
    1019             :                           "Entered password is most likely wrong!");
    1020           0 :             continue;
    1021             :         }
    1022           0 :         strophe_debug(conn->ctx, "tls", "Could not parse PKCS#12");
    1023           0 :         goto error_out;
    1024             :     }
    1025           0 : error_out:
    1026           0 :     _tls_log_error(conn->ctx);
    1027          24 : success:
    1028          24 :     if (p12)
    1029          24 :         PKCS12_free(p12);
    1030          24 :     return cert;
    1031             : }
    1032             : 
    1033          32 : static X509 *_tls_cert_read(xmpp_conn_t *conn)
    1034             : {
    1035          32 :     if (conn->tls && conn->tls->client_cert)
    1036             :         return conn->tls->client_cert;
    1037          32 :     if (conn->tls_client_cert && !conn->tls_client_key) {
    1038          24 :         return _tls_cert_read_p12(conn, NULL, NULL);
    1039             :     }
    1040           8 :     return _tls_cert_read_x509(conn);
    1041             : }
    1042             : 
    1043          58 : static int _tls_xaddr_nid(void)
    1044             : {
    1045          58 :     static int xaddr_nid = NID_undef;
    1046          58 :     if (xaddr_nid == NID_undef) {
    1047           2 :         xaddr_nid = OBJ_sn2nid("id-on-xmppAddr");
    1048             :     }
    1049          58 :     if (xaddr_nid == NID_undef) {
    1050           0 :         xaddr_nid = OBJ_create("1.3.6.1.5.5.7.8.5", "id-on-xmppAddr",
    1051             :                                "XmppAddr Identifier");
    1052             :     }
    1053          58 :     return xaddr_nid;
    1054             : }
    1055             : 
    1056          32 : static GENERAL_NAMES *_tls_conn_get_names(xmpp_conn_t *conn)
    1057             : {
    1058          32 :     X509 *client_cert;
    1059          32 :     GENERAL_NAMES *names = NULL;
    1060          32 :     client_cert = _tls_cert_read(conn);
    1061          32 :     if (!client_cert)
    1062             :         return NULL;
    1063          32 :     names = _tls_cert_get_names(client_cert);
    1064          32 :     if (!conn->tls || !conn->tls->client_cert)
    1065          32 :         X509_free(client_cert);
    1066             :     return names;
    1067             : }
    1068             : 
    1069          32 : static GENERAL_NAMES *_tls_cert_get_names(X509 *client_cert)
    1070             : {
    1071          32 :     int san = X509_get_ext_by_NID(client_cert, NID_subject_alt_name, 0);
    1072          32 :     X509_EXTENSION *san_ext = X509_get_ext(client_cert, san);
    1073          32 :     if (!san_ext)
    1074          32 :         return NULL;
    1075          32 :     ASN1_OCTET_STRING *data = X509_EXTENSION_get_data(san_ext);
    1076          32 :     if (!data)
    1077             :         return NULL;
    1078          32 :     const unsigned char *d = ASN1_STRING_get0_data(data);
    1079          32 :     if (!d)
    1080             :         return NULL;
    1081          32 :     return d2i_GENERAL_NAMES(NULL, &d, ASN1_STRING_length(data));
    1082             : }
    1083             : 
    1084             : /** Convert GENERAL_NAME* to a string
    1085             :  *
    1086             :  *  This checks whether the GENERAL_NAME* that is given has the
    1087             :  *  correct id-on-xmppAddr set and then optionally converts this
    1088             :  *  form ASN.1 to a string/char*.
    1089             :  *
    1090             :  *  When `res` pointer is set to NULL this method doesn't allocate
    1091             :  *  the result but only checks whether it is in the correct format.
    1092             :  *
    1093             :  *  @param name Pointer to the GENERAL_NAME that shall be converted
    1094             :  *  @param res Result-pointer (optional, can be NULL)
    1095             :  *
    1096             :  *  @return classic Unix style - 0=success, 1=error
    1097             :  */
    1098         104 : static int _tls_xmppaddr_to_string(GENERAL_NAME *name, char **res)
    1099             : {
    1100         104 :     ASN1_OBJECT *oid;
    1101         104 :     ASN1_TYPE *val;
    1102         104 :     if (!name || name->type != GEN_OTHERNAME)
    1103         104 :         return 1;
    1104          56 :     if (GENERAL_NAME_get0_otherName(name, &oid, &val) == 0)
    1105             :         return 1;
    1106          56 :     if (OBJ_obj2nid(oid) != _tls_xaddr_nid() || !val)
    1107             :         return 1;
    1108          56 :     if (!res)
    1109             :         return 0;
    1110          40 :     if (ASN1_STRING_to_UTF8((unsigned char **)res, val->value.asn1_string) < 0)
    1111             :         return 1;
    1112             :     return 0;
    1113             : }
    1114             : 
    1115           0 : static int _tls_dnsname_to_string(GENERAL_NAME *name, char **res)
    1116             : {
    1117           0 :     ASN1_STRING *str;
    1118           0 :     if (!name || name->type != GEN_DNS)
    1119             :         return 1;
    1120           0 :     str = GENERAL_NAME_get0_value(name, NULL);
    1121           0 :     if (str == NULL)
    1122             :         return 1;
    1123           0 :     if (!res)
    1124             :         return 0;
    1125           0 :     if (ASN1_STRING_to_UTF8((unsigned char **)res, str) < 0)
    1126             :         return 1;
    1127             :     return 0;
    1128             : }

Generated by: LCOV version 1.14