Line |
Branch |
Exec |
Source |
1 |
|
|
/***************************************************************************** |
2 |
|
|
* vim:tw=78 |
3 |
|
|
* |
4 |
|
|
* Copyright (C) 2021 Bjarne von Horn (vh at igh dot de). |
5 |
|
|
* |
6 |
|
|
* This file is part of the PdCom library. |
7 |
|
|
* |
8 |
|
|
* The PdCom library is free software: you can redistribute it and/or modify |
9 |
|
|
* it under the terms of the GNU Lesser General Public License as published by |
10 |
|
|
* the Free Software Foundation, either version 3 of the License, or (at your |
11 |
|
|
* option) any later version. |
12 |
|
|
* |
13 |
|
|
* The PdCom library is distributed in the hope that it will be useful, but |
14 |
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY |
15 |
|
|
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public |
16 |
|
|
* License for more details. |
17 |
|
|
* |
18 |
|
|
* You should have received a copy of the GNU Lesser General Public License |
19 |
|
|
* along with the PdCom library. If not, see <http://www.gnu.org/licenses/>. |
20 |
|
|
* |
21 |
|
|
*****************************************************************************/ |
22 |
|
|
|
23 |
|
|
#include "../src/Process.h" |
24 |
|
|
|
25 |
|
|
#include <algorithm> |
26 |
|
|
#include <cstring> |
27 |
|
|
#include <exception> |
28 |
|
|
#include <gnutls/gnutls.h> |
29 |
|
|
#include <pdcom5/Exception.h> |
30 |
|
|
#include <pdcom5/SecureProcess.h> |
31 |
|
|
|
32 |
|
|
using PdCom::SecureProcess; |
33 |
|
|
|
34 |
|
|
namespace { |
35 |
|
|
template <typename T, typename... Args> |
36 |
|
✗ |
auto wrap(const char *msg, T func, Args &&...args) |
37 |
|
|
-> decltype(func(std::forward<Args>(args)...)) |
38 |
|
|
{ |
39 |
|
✗ |
const auto ans = func(std::forward<Args>(args)...); |
40 |
|
✗ |
if (ans < 0 && gnutls_error_is_fatal(static_cast<int>(ans))) |
41 |
|
✗ |
throw PdCom::TlsError(msg, static_cast<int>(ans)); |
42 |
|
✗ |
return ans; |
43 |
|
|
} |
44 |
|
|
|
45 |
|
|
struct TlsDeleter |
46 |
|
|
{ |
47 |
|
✗ |
void operator()(gnutls_session_t s) |
48 |
|
|
{ |
49 |
|
✗ |
if (s) |
50 |
|
✗ |
gnutls_deinit(s); |
51 |
|
|
} |
52 |
|
✗ |
void operator()(gnutls_certificate_credentials_t c) |
53 |
|
|
{ |
54 |
|
✗ |
if (c) |
55 |
|
✗ |
gnutls_certificate_free_credentials(c); |
56 |
|
|
} |
57 |
|
|
}; |
58 |
|
|
} // namespace |
59 |
|
|
|
60 |
|
✗ |
struct PDCOM5_LOCAL SecureProcess::Impl final : public PdCom::impl::Process |
61 |
|
|
{ |
62 |
|
|
Impl(SecureProcess::EncryptionDetails const &ed, SecureProcess *This); |
63 |
|
|
std::string host_; |
64 |
|
|
std::unique_ptr<gnutls_certificate_credentials_st, TlsDeleter> cred_; |
65 |
|
|
|
66 |
|
✗ |
struct TlsLayer : PdCom::impl::IOLayer |
67 |
|
|
{ |
68 |
|
|
std::unique_ptr<gnutls_session_int, TlsDeleter> session_; |
69 |
|
|
std::exception_ptr ex_ptr_; |
70 |
|
|
|
71 |
|
|
TlsLayer( |
72 |
|
|
IOLayer *, |
73 |
|
|
gnutls_certificate_credentials_t cc, |
74 |
|
|
const std::string &host); |
75 |
|
|
|
76 |
|
|
// from IOLayer |
77 |
|
|
void write(const char *buf, size_t count) override; |
78 |
|
|
int read(char *buf, int count) override; |
79 |
|
✗ |
void flush() override {} |
80 |
|
|
|
81 |
|
|
|
82 |
|
|
bool handshake(); |
83 |
|
|
/** Close a TLS session */ |
84 |
|
|
void bye(); |
85 |
|
|
} tls_layer_; |
86 |
|
|
}; |
87 |
|
|
|
88 |
|
✗ |
SecureProcess::SecureProcess(SecureProcess::EncryptionDetails const &ed) : |
89 |
|
✗ |
PdCom::Process(std::make_shared<Impl>(ed, this)) |
90 |
|
|
{} |
91 |
|
|
|
92 |
|
✗ |
int SecureProcess::Impl::TlsLayer::read(char *const buf, int const count) |
93 |
|
|
{ |
94 |
|
✗ |
const ssize_t recv_chars = gnutls_record_recv(session_.get(), buf, count); |
95 |
|
✗ |
if (ex_ptr_) |
96 |
|
✗ |
std::rethrow_exception(ex_ptr_); |
97 |
|
✗ |
if (recv_chars >= 0) |
98 |
|
✗ |
return static_cast<int>(recv_chars); |
99 |
|
|
|
100 |
|
✗ |
if (recv_chars == GNUTLS_E_REHANDSHAKE) { |
101 |
|
✗ |
handshake(); |
102 |
|
✗ |
return -EAGAIN; |
103 |
|
|
} |
104 |
|
✗ |
if (!gnutls_error_is_fatal(static_cast<int>(recv_chars))) { |
105 |
|
✗ |
return -EAGAIN; |
106 |
|
|
} |
107 |
|
✗ |
throw TlsError("gnutls_record_recv() failed", recv_chars); |
108 |
|
|
} |
109 |
|
|
|
110 |
|
✗ |
void SecureProcess::Impl::TlsLayer::write(const char *buf, size_t count) |
111 |
|
|
{ |
112 |
|
✗ |
if (count == 0) |
113 |
|
✗ |
return; |
114 |
|
✗ |
const auto ans = gnutls_record_send(session_.get(), buf, count); |
115 |
|
✗ |
if (ex_ptr_) |
116 |
|
✗ |
std::rethrow_exception(ex_ptr_); |
117 |
|
✗ |
if (ans < 0) |
118 |
|
|
throw TlsError( |
119 |
|
✗ |
"SecureProcess::secureWrite() failed", static_cast<int>(ans)); |
120 |
|
✗ |
if (static_cast<size_t>(ans) != count) |
121 |
|
✗ |
throw TlsError("short write in SecureProcess::secureWrite", 0); |
122 |
|
|
} |
123 |
|
|
|
124 |
|
|
|
125 |
|
|
static std::unique_ptr<gnutls_certificate_credentials_st, TlsDeleter> |
126 |
|
✗ |
load_certificates(SecureProcess::EncryptionDetails const &ed) |
127 |
|
|
{ |
128 |
|
✗ |
std::unique_ptr<gnutls_certificate_credentials_st, TlsDeleter> ans; |
129 |
|
|
|
130 |
|
✗ |
gnutls_certificate_credentials_t cc = nullptr; |
131 |
|
✗ |
wrap("gnutls_certificate_allocate_credentials() failed", |
132 |
|
✗ |
gnutls_certificate_allocate_credentials, &cc); |
133 |
|
✗ |
ans.reset(cc); |
134 |
|
|
|
135 |
|
✗ |
const auto to_datum_t = [](const std::string &s) -> gnutls_datum_t { |
136 |
|
|
return {const_cast<unsigned char *>( |
137 |
|
✗ |
reinterpret_cast<const unsigned char *>(s.data())), |
138 |
|
✗ |
static_cast<unsigned>(s.size())}; |
139 |
|
|
}; |
140 |
|
✗ |
if (!ed.server_ca_.empty()) { |
141 |
|
✗ |
const gnutls_datum_t f = to_datum_t(ed.server_ca_); |
142 |
|
|
const auto a = |
143 |
|
✗ |
wrap("reading CA failed", gnutls_certificate_set_x509_trust_mem, |
144 |
|
✗ |
cc, &f, GNUTLS_X509_FMT_PEM); |
145 |
|
✗ |
if (a < 1) |
146 |
|
✗ |
throw PdCom::TlsError("Less than one CA loaded", 0); |
147 |
|
|
} |
148 |
|
✗ |
if (!ed.client_key_.empty() and !ed.client_cert_.empty()) { |
149 |
|
✗ |
const auto key = to_datum_t(ed.client_key_); |
150 |
|
✗ |
const auto cert = to_datum_t(ed.client_cert_); |
151 |
|
✗ |
wrap("importing client certificate failed", |
152 |
|
✗ |
gnutls_certificate_set_x509_key_mem, cc, &cert, &key, |
153 |
|
|
GNUTLS_X509_FMT_PEM); |
154 |
|
|
} |
155 |
|
|
|
156 |
|
✗ |
return ans; |
157 |
|
|
} |
158 |
|
|
|
159 |
|
|
|
160 |
|
✗ |
SecureProcess::Impl::Impl( |
161 |
|
|
SecureProcess::EncryptionDetails const &ed, |
162 |
|
✗ |
SecureProcess *This) : |
163 |
|
|
PdCom::impl::Process(This), |
164 |
|
|
host_(ed.server_hostname_), |
165 |
|
|
cred_(load_certificates(ed)), |
166 |
|
✗ |
tls_layer_(this, cred_.get(), host_) |
167 |
|
|
{ |
168 |
|
|
// register our tls layer |
169 |
|
✗ |
Process::io = &tls_layer_; |
170 |
|
|
} |
171 |
|
|
|
172 |
|
✗ |
SecureProcess::Impl::TlsLayer::TlsLayer( |
173 |
|
|
IOLayer *io, |
174 |
|
|
gnutls_certificate_credentials_t cc, |
175 |
|
✗ |
const std::string &host) : |
176 |
|
✗ |
IOLayer(io) |
177 |
|
|
{ |
178 |
|
|
{ |
179 |
|
✗ |
gnutls_session_t s = nullptr; |
180 |
|
✗ |
wrap("gnutls_init() failed", gnutls_init, &s, |
181 |
|
✗ |
GNUTLS_CLIENT | GNUTLS_NONBLOCK); |
182 |
|
✗ |
session_.reset(s); |
183 |
|
|
} |
184 |
|
|
|
185 |
|
✗ |
wrap("gnutls_priority_set_direct failed", gnutls_priority_set_direct, |
186 |
|
✗ |
session_.get(), "NORMAL", nullptr); |
187 |
|
|
|
188 |
|
|
|
189 |
|
✗ |
wrap("using Certificates failed", gnutls_credentials_set, session_.get(), |
190 |
|
|
GNUTLS_CRD_CERTIFICATE, cc); |
191 |
|
|
|
192 |
|
✗ |
gnutls_transport_set_push_function( |
193 |
|
✗ |
session_.get(), |
194 |
|
|
[](gnutls_transport_ptr_t uptr, const void *data, |
195 |
|
✗ |
size_t count) -> ssize_t { |
196 |
|
✗ |
auto &sp = *reinterpret_cast<TlsLayer *>(uptr); |
197 |
|
|
try { |
198 |
|
✗ |
sp.IOLayer::write( |
199 |
|
|
reinterpret_cast<const char *>(data), count); |
200 |
|
|
} |
201 |
|
✗ |
catch (std::exception const &e) { |
202 |
|
✗ |
sp.ex_ptr_ = std::current_exception(); |
203 |
|
|
// make sure that errno != EAGAIN; |
204 |
|
✗ |
errno = EIO; |
205 |
|
✗ |
return -1; |
206 |
|
|
} |
207 |
|
✗ |
return count; |
208 |
|
✗ |
}); |
209 |
|
✗ |
gnutls_transport_set_pull_function( |
210 |
|
✗ |
session_.get(), |
211 |
|
|
[](gnutls_transport_ptr_t uptr, void *data, |
212 |
|
✗ |
size_t count) -> ssize_t { |
213 |
|
✗ |
auto &sp = *reinterpret_cast<TlsLayer *>(uptr); |
214 |
|
|
try { |
215 |
|
✗ |
const int ans = sp.IOLayer::read( |
216 |
|
✗ |
reinterpret_cast<char *>(data), count); |
217 |
|
✗ |
if (ans >= 0) |
218 |
|
✗ |
return ans; |
219 |
|
✗ |
if (ans == -EAGAIN) |
220 |
|
✗ |
errno = EAGAIN; |
221 |
|
✗ |
return -1; |
222 |
|
|
} |
223 |
|
✗ |
catch (std::exception const &e) { |
224 |
|
✗ |
sp.ex_ptr_ = std::current_exception(); |
225 |
|
|
// make sure that errno != EAGAIN; |
226 |
|
✗ |
errno = EIO; |
227 |
|
✗ |
return -1; |
228 |
|
|
} |
229 |
|
✗ |
}); |
230 |
|
✗ |
if (!host.empty()) |
231 |
|
✗ |
gnutls_session_set_verify_cert(session_.get(), host.c_str(), 0); |
232 |
|
|
|
233 |
|
✗ |
gnutls_transport_set_ptr(session_.get(), this); |
234 |
|
|
} |
235 |
|
|
|
236 |
|
✗ |
bool SecureProcess::Impl::TlsLayer::handshake() |
237 |
|
|
{ |
238 |
|
✗ |
const auto a = gnutls_handshake(session_.get()); |
239 |
|
✗ |
if (a == GNUTLS_E_AGAIN or a == GNUTLS_E_INTERRUPTED) |
240 |
|
✗ |
return false; |
241 |
|
✗ |
else if (gnutls_error_is_fatal(a)) |
242 |
|
✗ |
throw TlsError("TLS Handshake failed", a); |
243 |
|
✗ |
return true; |
244 |
|
|
} |
245 |
|
|
|
246 |
|
✗ |
void SecureProcess::Impl::TlsLayer::bye() |
247 |
|
|
{ |
248 |
|
✗ |
gnutls_bye(session_.get(), GNUTLS_SHUT_RDWR); |
249 |
|
|
} |
250 |
|
|
|
251 |
|
|
|
252 |
|
✗ |
void SecureProcess::bye() |
253 |
|
|
{ |
254 |
|
✗ |
return static_cast<Impl &>(*pimpl).tls_layer_.bye(); |
255 |
|
|
} |
256 |
|
|
|
257 |
|
✗ |
bool SecureProcess::handshake() |
258 |
|
|
{ |
259 |
|
✗ |
return static_cast<Impl &>(*pimpl).tls_layer_.handshake(); |
260 |
|
|
} |
261 |
|
|
|
262 |
|
✗ |
void SecureProcess::InitLibrary() |
263 |
|
|
{ |
264 |
|
✗ |
if (gnutls_global_init() != GNUTLS_E_SUCCESS) |
265 |
|
✗ |
throw PdCom::Exception("gnults_global_init() failed"); |
266 |
|
|
} |
267 |
|
|
|
268 |
|
✗ |
void SecureProcess::FinalizeLibrary() |
269 |
|
|
{ |
270 |
|
✗ |
gnutls_global_deinit(); |
271 |
|
|
} |
272 |
|
|
|
273 |
|
✗ |
void SecureProcess::flush() |
274 |
|
|
{} |
275 |
|
|
|
276 |
|
✗ |
void SecureProcess::asyncData() |
277 |
|
|
{ |
278 |
|
✗ |
do { |
279 |
|
✗ |
Process::asyncData(); |
280 |
|
✗ |
} while (gnutls_record_check_pending( |
281 |
|
✗ |
static_cast<Impl &>(*pimpl).tls_layer_.session_.get())); |
282 |
|
|
} |
283 |
|
|
|