/* * Copyright (C) 2010-2012 Free Software Foundation, Inc. * * Author: Nikos Mavrogiannopoulos * * This file is part of GnuTLS. * * The GnuTLS is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public License * as published by the Free Software Foundation; either version 3 of * the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this program. If not, see * */ #include #include #include #include #include #include #ifdef _WIN32 # include # include # if defined(__MINGW32__) && !defined(__MINGW64__) && __MINGW32_MAJOR_VERSION <= 3 && __MINGW32_MINOR_VERSION <= 20 typedef PCCRL_CONTEXT WINAPI (*Type_CertEnumCRLsInStore) (HCERTSTORE hCertStore, PCCRL_CONTEXT pPrevCrlContext); static Type_CertEnumCRLsInStore Loaded_CertEnumCRLsInStore; static HMODULE Crypt32_dll; # endif #else # ifdef HAVE_PTHREAD_LOCKS # include # endif # if defined(HAVE_GETPWUID_R) # include # endif #endif /* We need to disable gnulib's replacement wrappers to get native Windows interfaces. */ #undef recv #undef send #undef select /* System specific function wrappers. */ #ifdef _WIN32 int system_errno (gnutls_transport_ptr p) { int tmperr = WSAGetLastError (); int ret = 0; switch (tmperr) { case WSAEWOULDBLOCK: ret = EAGAIN; break; case NO_ERROR: ret = 0; break; case WSAEINTR: ret = EINTR; break; case WSAEMSGSIZE: ret = EMSGSIZE; break; default: ret = EIO; break; } WSASetLastError (tmperr); return ret; } ssize_t system_write (gnutls_transport_ptr ptr, const void *data, size_t data_size) { return send (GNUTLS_POINTER_TO_INT (ptr), data, data_size, 0); } #else /* POSIX */ int system_errno (gnutls_transport_ptr_t ptr) { #if defined(_AIX) || defined(AIX) if (errno == 0) errno = EAGAIN; #endif return errno; } ssize_t system_writev (gnutls_transport_ptr_t ptr, const giovec_t * iovec, int iovec_cnt) { return writev (GNUTLS_POINTER_TO_INT (ptr), (struct iovec *) iovec, iovec_cnt); } #endif ssize_t system_read (gnutls_transport_ptr_t ptr, void *data, size_t data_size) { return recv (GNUTLS_POINTER_TO_INT (ptr), data, data_size, 0); } /* Wait for data to be received within a timeout period in milliseconds. * To catch a termination it will also try to receive 0 bytes from the * socket if select reports to proceed. * * Returns -1 on error, 0 on timeout, positive value if data are available for reading. */ int system_recv_timeout(gnutls_transport_ptr_t ptr, unsigned int ms) { fd_set rfds; struct timeval tv; int ret; int fd = GNUTLS_POINTER_TO_INT(ptr); FD_ZERO(&rfds); FD_SET(fd, &rfds); tv.tv_sec = 0; tv.tv_usec = ms * 1000; while(tv.tv_usec >= 1000000) { tv.tv_usec -= 1000000; tv.tv_sec++; } ret = select(fd+1, &rfds, NULL, NULL, &tv); if (ret <= 0) return ret; return ret; } /* Thread stuff */ #ifdef HAVE_WIN32_LOCKS static int gnutls_system_mutex_init (void **priv) { CRITICAL_SECTION *lock = malloc (sizeof (CRITICAL_SECTION)); if (lock == NULL) return GNUTLS_E_MEMORY_ERROR; InitializeCriticalSection (lock); *priv = lock; return 0; } static int gnutls_system_mutex_deinit (void **priv) { DeleteCriticalSection ((CRITICAL_SECTION *) * priv); free (*priv); return 0; } static int gnutls_system_mutex_lock (void **priv) { EnterCriticalSection ((CRITICAL_SECTION *) * priv); return 0; } static int gnutls_system_mutex_unlock (void **priv) { LeaveCriticalSection ((CRITICAL_SECTION *) * priv); return 0; } #endif /* WIN32_LOCKS */ #ifdef HAVE_PTHREAD_LOCKS static int gnutls_system_mutex_init (void **priv) { pthread_mutex_t *lock = malloc (sizeof (pthread_mutex_t)); int ret; if (lock == NULL) return GNUTLS_E_MEMORY_ERROR; ret = pthread_mutex_init (lock, NULL); if (ret) { free (lock); gnutls_assert (); return GNUTLS_E_LOCKING_ERROR; } *priv = lock; return 0; } static int gnutls_system_mutex_deinit (void **priv) { pthread_mutex_destroy ((pthread_mutex_t *) * priv); free (*priv); return 0; } static int gnutls_system_mutex_lock (void **priv) { if (pthread_mutex_lock ((pthread_mutex_t *) * priv)) { gnutls_assert (); return GNUTLS_E_LOCKING_ERROR; } return 0; } static int gnutls_system_mutex_unlock (void **priv) { if (pthread_mutex_unlock ((pthread_mutex_t *) * priv)) { gnutls_assert (); return GNUTLS_E_LOCKING_ERROR; } return 0; } #endif /* PTHREAD_LOCKS */ #ifdef HAVE_NO_LOCKS static int gnutls_system_mutex_init (void **priv) { return 0; } static int gnutls_system_mutex_deinit (void **priv) { return 0; } static int gnutls_system_mutex_lock (void **priv) { return 0; } static int gnutls_system_mutex_unlock (void **priv) { return 0; } #endif /* NO_LOCKS */ gnutls_time_func gnutls_time = time; mutex_init_func gnutls_mutex_init = gnutls_system_mutex_init; mutex_deinit_func gnutls_mutex_deinit = gnutls_system_mutex_deinit; mutex_lock_func gnutls_mutex_lock = gnutls_system_mutex_lock; mutex_unlock_func gnutls_mutex_unlock = gnutls_system_mutex_unlock; int gnutls_system_global_init () { #ifdef _WIN32 # if defined(__MINGW32__) && !defined(__MINGW64__) && __MINGW32_MAJOR_VERSION <= 3 && __MINGW32_MINOR_VERSION <= 20 HMODULE crypto; crypto = LoadLibraryA ("Crypt32.dll"); if (crypto == NULL) return GNUTLS_E_CRYPTO_INIT_FAILED; Loaded_CertEnumCRLsInStore = (Type_CertEnumCRLsInStore) GetProcAddress (crypto, "CertEnumCRLsInStore"); if (Loaded_CertEnumCRLsInStore == NULL) { FreeLibrary (crypto); return GNUTLS_E_CRYPTO_INIT_FAILED; } Crypt32_dll = crypto; # endif #endif return 0; } void gnutls_system_global_deinit () { #ifdef _WIN32 # if defined(__MINGW32__) && !defined(__MINGW64__) && __MINGW32_MAJOR_VERSION <= 3 && __MINGW32_MINOR_VERSION <= 20 FreeLibrary (Crypt32_dll); # endif #endif } #define CONFIG_PATH ".gnutls" /* Returns a path to store user-specific configuration * data. */ int _gnutls_find_config_path(char* path, size_t max_size) { char tmp_home_dir[1024]; const char *home_dir = getenv ("HOME"); #ifdef _WIN32 if (home_dir == NULL || home_dir[0] == '\0') { const char *home_drive = getenv ("HOMEDRIVE"); const char *home_path = getenv ("HOMEPATH"); if (home_drive != NULL && home_path != NULL) { snprintf(tmp_home_dir, sizeof(tmp_home_dir), "%s%s", home_drive, home_path); } else { tmp_home_dir[0] = 0; } home_dir = tmp_home_dir; } #elif defined(HAVE_GETPWUID_R) if (home_dir == NULL || home_dir[0] == '\0') { struct passwd *pwd; struct passwd _pwd; char buf[1024]; getpwuid_r(getuid(), &_pwd, buf, sizeof(buf), &pwd); if (pwd != NULL) { snprintf(tmp_home_dir, sizeof(tmp_home_dir), "%s", pwd->pw_dir); } else { tmp_home_dir[0] = 0; } home_dir = tmp_home_dir; } #else if (home_dir == NULL || home_dir[0] == '\0') { tmp_home_dir[0] = 0; home_dir = tmp_home_dir; } #endif if (home_dir == NULL || home_dir[0] == 0) path[0] = 0; else snprintf(path, max_size, "%s/"CONFIG_PATH, home_dir); return 0; } /** * gnutls_x509_trust_list_add_system_trust: * @list: The structure of the list * @tl_flags: GNUTLS_TL_* * @tl_vflags: gnutls_certificate_verify_flags if flags specifies GNUTLS_TL_VERIFY_CRL * * This function adds the system's default trusted certificate * authorities to the trusted list. Note that on unsupported system * this function returns %GNUTLS_E_UNIMPLEMENTED_FEATURE. * * Returns: The number of added elements or a negative error code on error. * * Since: 3.1 **/ int gnutls_x509_trust_list_add_system_trust(gnutls_x509_trust_list_t list, unsigned int tl_flags, unsigned int tl_vflags) { #if !defined(DEFAULT_TRUST_STORE_PKCS11) && !defined(DEFAULT_TRUST_STORE_FILE) && !defined(_WIN32) return GNUTLS_E_UNIMPLEMENTED_FEATURE; #else int ret, r = 0; const char* crl_file = # ifdef DEFAULT_CRL_FILE DEFAULT_CRL_FILE; # else NULL; # endif # ifdef _WIN32 unsigned int i; for (i=0;i<2;i++) { HCERTSTORE store; const CERT_CONTEXT *cert; const CRL_CONTEXT *crl; gnutls_datum_t data; if (i==0) store = CertOpenSystemStore(0, "ROOT"); else store = CertOpenSystemStore(0, "CA"); if (store == NULL) return GNUTLS_E_FILE_ERROR; cert = CertEnumCertificatesInStore(store, NULL); crl = Loaded_CertEnumCRLsInStore(store, NULL); while(cert != NULL) { if (cert->dwCertEncodingType == X509_ASN_ENCODING) { data.data = cert->pbCertEncoded; data.size = cert->cbCertEncoded; if (gnutls_x509_trust_list_add_trust_mem(list, &data, NULL, GNUTLS_X509_FMT_DER, tl_flags, tl_vflags) > 0) r++; } cert = CertEnumCertificatesInStore(store, cert); } while(crl != NULL) { if (crl->dwCertEncodingType == X509_ASN_ENCODING) { data.data = crl->pbCrlEncoded; data.size = crl->cbCrlEncoded; gnutls_x509_trust_list_add_trust_mem(list, NULL, &data, GNUTLS_X509_FMT_DER, tl_flags, tl_vflags); } crl = Loaded_CertEnumCRLsInStore(store, crl); } CertCloseStore(store, 0); } # endif # if defined(ENABLE_PKCS11) && defined(DEFAULT_TRUST_STORE_PKCS11) ret = gnutls_x509_trust_list_add_trust_file(list, DEFAULT_TRUST_STORE_PKCS11, crl_file, GNUTLS_X509_FMT_DER, tl_flags, tl_vflags); if (ret > 0) r += ret; # endif # ifdef DEFAULT_TRUST_STORE_FILE ret = gnutls_x509_trust_list_add_trust_file(list, DEFAULT_TRUST_STORE_FILE, crl_file, GNUTLS_X509_FMT_PEM, tl_flags, tl_vflags); if (ret > 0) r += ret; # endif return r; #endif }