mirror of
https://github.com/gnustep/libs-base.git
synced 2025-04-23 17:10:48 +00:00
git-svn-id: svn+ssh://svn.gna.org/svn/gnustep/libs/base/trunk@34290 72102866-910b-0410-8b05-ffd578937521
506 lines
11 KiB
Objective-C
506 lines
11 KiB
Objective-C
/** Implementation for GSSSLHandle for GNUStep
|
|
Copyright (C) 1997-1999 Free Software Foundation, Inc.
|
|
|
|
Written by: Richard Frith-Macdonald <richard@brainstorm.co.uk>
|
|
Date: 1997
|
|
|
|
This file is part of the GNUstep Base Library.
|
|
|
|
This library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Lesser General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2 of the License, or (at your option) any later version.
|
|
|
|
This library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public
|
|
License along with this library; if not, write to the Free
|
|
Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
|
|
Boston, MA 02111 USA.
|
|
*/
|
|
|
|
|
|
#include "config.h"
|
|
|
|
#if defined(__WIN32__) || defined(_WIN32) || defined(__MS_WIN32__)
|
|
#ifndef __WIN32__
|
|
#define __WIN32__
|
|
#endif
|
|
#endif
|
|
|
|
#ifdef __MINGW__
|
|
#ifndef __WIN32__
|
|
#define __WIN32__
|
|
#endif
|
|
#endif
|
|
|
|
#if defined(__WIN32__)
|
|
#include <windows.h>
|
|
#endif
|
|
|
|
/* Because openssl uses `id' as variable name sometime,
|
|
while it is an Objective-C reserved keyword. */
|
|
#define id id_x_
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/rand.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/crypto.h>
|
|
#undef id
|
|
|
|
#define EXPOSE_GSFileHandle_IVARS 1
|
|
#import "Foundation/NSDebug.h"
|
|
#import "Foundation/NSFileHandle.h"
|
|
#import "Foundation/NSFileManager.h"
|
|
#import "Foundation/NSLock.h"
|
|
#import "Foundation/NSNotification.h"
|
|
#import "Foundation/NSProcessInfo.h"
|
|
#import "Foundation/NSThread.h"
|
|
#import "Foundation/NSUserDefaults.h"
|
|
|
|
#import "GSPrivate.h"
|
|
#import "GSNetwork.h"
|
|
#import "GSFileHandle.h"
|
|
|
|
#if defined(HAVE_SYS_SIGNAL_H)
|
|
# include <sys/signal.h>
|
|
#elif defined(HAVE_SIGNAL_H)
|
|
# include <signal.h>
|
|
#endif
|
|
|
|
#if defined(HAVE_SYS_FILE_H)
|
|
# include <sys/file.h>
|
|
#endif
|
|
|
|
#if defined(__MINGW__)
|
|
#include <winsock2.h>
|
|
#else
|
|
#include <time.h>
|
|
#include <sys/time.h>
|
|
#include <sys/param.h>
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
#endif /* __MINGW__ */
|
|
|
|
#include <sys/stat.h>
|
|
|
|
#if defined(HAVE_SYS_FCNTL_H)
|
|
# include <sys/fcntl.h>
|
|
#elif defined(HAVE_FCNTL_H)
|
|
# include <fcntl.h>
|
|
#endif
|
|
|
|
#include <sys/ioctl.h>
|
|
#ifdef __svr4__
|
|
#include <sys/filio.h>
|
|
#endif
|
|
#include <netdb.h>
|
|
#include <string.h>
|
|
|
|
static NSString*
|
|
sslError(int err)
|
|
{
|
|
NSString *str;
|
|
|
|
SSL_load_error_strings();
|
|
|
|
if (err == SSL_ERROR_SYSCALL)
|
|
{
|
|
NSError *e = [NSError _last];
|
|
|
|
str = [NSString stringWithFormat: @"Syscall error %d - %@",
|
|
[e code], [e description]];
|
|
}
|
|
else if (err == SSL_ERROR_NONE)
|
|
{
|
|
str = @"No error: really helpful";
|
|
}
|
|
else
|
|
{
|
|
str = [NSString stringWithFormat: @"%s", ERR_reason_error_string(err)];
|
|
|
|
}
|
|
return str;
|
|
}
|
|
|
|
|
|
static NSLock **locks = 0;
|
|
|
|
static void
|
|
locking_function(int mode, int n, const char *file, int line)
|
|
{
|
|
if (mode & CRYPTO_LOCK)
|
|
{
|
|
[locks[n] lock];
|
|
}
|
|
else
|
|
{
|
|
[locks[n] unlock];
|
|
}
|
|
}
|
|
|
|
#if defined(HAVE_CRYPTO_THREADID_SET_CALLBACK)
|
|
static void
|
|
threadid_function(CRYPTO_THREADID *ref)
|
|
{
|
|
CRYPTO_THREADID_set_pointer(ref, GSCurrentThread());
|
|
}
|
|
#else
|
|
static unsigned long
|
|
threadid_function()
|
|
{
|
|
return (unsigned long) GSCurrentThread();
|
|
}
|
|
#endif
|
|
|
|
|
|
@interface GSSSLHandle : GSFileHandle
|
|
{
|
|
SSL_CTX *ctx;
|
|
SSL *ssl;
|
|
BOOL connected;
|
|
}
|
|
|
|
- (BOOL) sslAccept;
|
|
- (BOOL) sslConnect;
|
|
- (void) sslDisconnect;
|
|
- (BOOL) sslHandshakeEstablished: (BOOL*)result outgoing: (BOOL)isOutgoing;
|
|
- (void) sslSetCertificate: (NSString*)certFile
|
|
privateKey: (NSString*)privateKey
|
|
PEMpasswd: (NSString*)PEMpasswd;
|
|
@end
|
|
|
|
static BOOL permitSSLv2 = NO;
|
|
static NSString *cipherList = nil;
|
|
|
|
@implementation GSSSLHandle
|
|
+ (void) _defaultsChanged: (NSNotification*)n
|
|
{
|
|
permitSSLv2
|
|
= [[NSUserDefaults standardUserDefaults] boolForKey: @"GSPermitSSLv2"];
|
|
cipherList
|
|
= [[NSUserDefaults standardUserDefaults] stringForKey: @"GSCipherList"];
|
|
}
|
|
|
|
+ (void) initialize
|
|
{
|
|
if (self == [GSSSLHandle class])
|
|
{
|
|
NSUserDefaults *defs;
|
|
unsigned count;
|
|
|
|
SSL_library_init();
|
|
|
|
count = CRYPTO_num_locks();
|
|
locks = (NSLock**)malloc(count * sizeof(NSLock*));
|
|
while (count-- > 0)
|
|
{
|
|
locks[count] = [NSLock new];
|
|
}
|
|
CRYPTO_set_locking_callback(locking_function);
|
|
#if defined(HAVE_CRYPTO_THREADID_SET_CALLBACK)
|
|
CRYPTO_THREADID_set_callback(threadid_function);
|
|
#else
|
|
CRYPTO_set_id_callback(threadid_function);
|
|
#endif
|
|
|
|
/*
|
|
* If there is no /dev/urandom for ssl to use, we must seed the
|
|
* random number generator ourselves.
|
|
*/
|
|
if (![[NSFileManager defaultManager] fileExistsAtPath: @"/dev/urandom"])
|
|
{
|
|
const char *inf;
|
|
|
|
inf = [[[NSProcessInfo processInfo] globallyUniqueString] UTF8String];
|
|
RAND_seed(inf, strlen(inf));
|
|
}
|
|
defs = [NSUserDefaults standardUserDefaults];
|
|
permitSSLv2 = [defs boolForKey: @"GSPermitSSLv2"];
|
|
cipherList = [defs stringForKey: @"GSCipherList"];
|
|
[[NSNotificationCenter defaultCenter]
|
|
addObserver: self
|
|
selector: @selector(_defaultsChanged:)
|
|
name: NSUserDefaultsDidChangeNotification
|
|
object: nil];
|
|
}
|
|
}
|
|
|
|
- (void) closeFile
|
|
{
|
|
[self sslDisconnect];
|
|
[super closeFile];
|
|
}
|
|
|
|
- (void) finalize
|
|
{
|
|
[self sslDisconnect];
|
|
[super finalize];
|
|
}
|
|
|
|
- (NSInteger) read: (void*)buf length: (NSUInteger)len
|
|
{
|
|
if (connected)
|
|
{
|
|
return SSL_read(ssl, buf, len);
|
|
}
|
|
return [super read: buf length: len];
|
|
}
|
|
|
|
- (BOOL) sslAccept
|
|
{
|
|
BOOL result = NO;
|
|
|
|
if (YES == isStandardFile)
|
|
{
|
|
NSLog(@"Attempt to make ssl connection to a standard file");
|
|
return NO;
|
|
}
|
|
if (NO == [self sslHandshakeEstablished: &result outgoing: NO])
|
|
{
|
|
NSRunLoop *loop;
|
|
|
|
IF_NO_GC([self retain];) // Don't get destroyed during runloop
|
|
loop = [NSRunLoop currentRunLoop];
|
|
[loop runUntilDate: [NSDate dateWithTimeIntervalSinceNow: 0.01]];
|
|
if (NO == [self sslHandshakeEstablished: &result outgoing: NO])
|
|
{
|
|
NSDate *final;
|
|
NSDate *when;
|
|
NSTimeInterval last = 0.0;
|
|
NSTimeInterval limit = 0.1;
|
|
|
|
final = [[NSDate alloc] initWithTimeIntervalSinceNow: 30.0];
|
|
when = [NSDate alloc];
|
|
|
|
while (NO == [self sslHandshakeEstablished: &result outgoing: NO]
|
|
&& [final timeIntervalSinceNow] > 0.0)
|
|
{
|
|
NSTimeInterval tmp = limit;
|
|
|
|
limit += last;
|
|
last = tmp;
|
|
if (limit > 0.5)
|
|
{
|
|
limit = 0.1;
|
|
last = 0.1;
|
|
}
|
|
when = [when initWithTimeIntervalSinceNow: limit];
|
|
[loop runUntilDate: when];
|
|
}
|
|
RELEASE(when);
|
|
RELEASE(final);
|
|
}
|
|
DESTROY(self);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
- (BOOL) sslConnect
|
|
{
|
|
BOOL result = NO;
|
|
|
|
if (YES == isStandardFile)
|
|
{
|
|
NSLog(@"Attempt to make ssl connection to a standard file");
|
|
return NO;
|
|
}
|
|
if (NO == [self sslHandshakeEstablished: &result outgoing: YES])
|
|
{
|
|
NSRunLoop *loop;
|
|
|
|
IF_NO_GC([self retain];) // Don't get destroyed during runloop
|
|
loop = [NSRunLoop currentRunLoop];
|
|
[loop runUntilDate: [NSDate dateWithTimeIntervalSinceNow: 0.01]];
|
|
if (NO == [self sslHandshakeEstablished: &result outgoing: YES])
|
|
{
|
|
NSDate *final;
|
|
NSDate *when;
|
|
NSTimeInterval last = 0.0;
|
|
NSTimeInterval limit = 0.1;
|
|
|
|
final = [[NSDate alloc] initWithTimeIntervalSinceNow: 30.0];
|
|
when = [NSDate alloc];
|
|
|
|
while (NO == [self sslHandshakeEstablished: &result outgoing: YES]
|
|
&& [final timeIntervalSinceNow] > 0.0)
|
|
{
|
|
NSTimeInterval tmp = limit;
|
|
|
|
limit += last;
|
|
last = tmp;
|
|
if (limit > 0.5)
|
|
{
|
|
limit = 0.1;
|
|
last = 0.1;
|
|
}
|
|
when = [when initWithTimeIntervalSinceNow: limit];
|
|
[loop runUntilDate: when];
|
|
}
|
|
RELEASE(when);
|
|
RELEASE(final);
|
|
}
|
|
DESTROY(self);
|
|
}
|
|
return result;
|
|
}
|
|
|
|
- (void) sslDisconnect
|
|
{
|
|
if (ssl != 0)
|
|
{
|
|
if (connected == YES)
|
|
{
|
|
SSL_shutdown(ssl);
|
|
}
|
|
SSL_clear(ssl);
|
|
SSL_free(ssl);
|
|
ssl = 0;
|
|
}
|
|
if (ctx != 0)
|
|
{
|
|
SSL_CTX_free(ctx);
|
|
ctx = 0;
|
|
}
|
|
connected = NO;
|
|
}
|
|
|
|
- (BOOL) sslHandshakeEstablished: (BOOL*)result outgoing: (BOOL)isOutgoing
|
|
{
|
|
int ret;
|
|
int err;
|
|
|
|
NSAssert(0 != result, NSInvalidArgumentException);
|
|
|
|
if (YES == connected)
|
|
{
|
|
return YES; /* Already connected. */
|
|
}
|
|
if (YES == isStandardFile)
|
|
{
|
|
NSLog(@"Attempt to perform ssl handshake with a standard file");
|
|
return NO;
|
|
}
|
|
|
|
/*
|
|
* Ensure we have a context and handle to connect with.
|
|
*/
|
|
if (ctx == 0)
|
|
{
|
|
ctx = SSL_CTX_new(SSLv23_client_method());
|
|
if (permitSSLv2 == NO)
|
|
{
|
|
SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2);
|
|
}
|
|
if (nil != cipherList)
|
|
{
|
|
SSL_CTX_set_cipher_list(ctx, [cipherList UTF8String]);
|
|
}
|
|
}
|
|
if (ssl == 0)
|
|
{
|
|
ssl = SSL_new(ctx);
|
|
}
|
|
|
|
/*
|
|
* Set non-blocking so accept won't hang if remote end goes wrong.
|
|
*/
|
|
[self setNonBlocking: YES];
|
|
ret = SSL_set_fd(ssl, descriptor);
|
|
if (1 == ret)
|
|
{
|
|
if (YES == isOutgoing)
|
|
{
|
|
ret = SSL_connect(ssl);
|
|
}
|
|
else
|
|
{
|
|
ret = SSL_accept(ssl);
|
|
}
|
|
}
|
|
if (1 == ret)
|
|
{
|
|
connected = YES;
|
|
*result = YES;
|
|
}
|
|
else
|
|
{
|
|
err = SSL_get_error(ssl, ret);
|
|
if (SSL_ERROR_WANT_READ == err || SSL_ERROR_WANT_WRITE == err)
|
|
{
|
|
return NO;
|
|
}
|
|
|
|
NSLog(@"unable to make SSL connection to %@:%@ - %@",
|
|
address, service, sslError(err));
|
|
*result = NO;
|
|
}
|
|
return YES;
|
|
}
|
|
|
|
- (void) sslSetCertificate: (NSString*)certFile
|
|
privateKey: (NSString*)privateKey
|
|
PEMpasswd: (NSString*)PEMpasswd
|
|
{
|
|
int ret;
|
|
|
|
if (isStandardFile == YES)
|
|
{
|
|
NSLog(@"Attempt to set ssl certificate for a standard file");
|
|
return;
|
|
}
|
|
/*
|
|
* Ensure we have a context to set the certificate for.
|
|
*/
|
|
if (ctx == 0)
|
|
{
|
|
ctx = SSL_CTX_new(SSLv23_method());
|
|
if (permitSSLv2 == NO)
|
|
{
|
|
SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2);
|
|
}
|
|
if (nil != cipherList)
|
|
{
|
|
SSL_CTX_set_cipher_list(ctx, [cipherList UTF8String]);
|
|
}
|
|
}
|
|
if ([PEMpasswd length] > 0)
|
|
{
|
|
SSL_CTX_set_default_passwd_cb_userdata(ctx,
|
|
(char*)[PEMpasswd UTF8String]);
|
|
}
|
|
if ([certFile length] > 0)
|
|
{
|
|
ret = SSL_CTX_use_certificate_chain_file(ctx, [certFile UTF8String]);
|
|
if (ret != 1)
|
|
{
|
|
NSLog(@"Failed to set certificate file to %@ - %@",
|
|
certFile, sslError(ERR_get_error()));
|
|
}
|
|
}
|
|
if ([privateKey length] > 0)
|
|
{
|
|
ret = SSL_CTX_use_PrivateKey_file(ctx, [privateKey UTF8String],
|
|
X509_FILETYPE_PEM);
|
|
if (ret != 1)
|
|
{
|
|
NSLog(@"Failed to set private key file to %@ - %@",
|
|
privateKey, sslError(ERR_get_error()));
|
|
}
|
|
}
|
|
}
|
|
|
|
- (NSInteger) write: (const void*)buf length: (NSUInteger)len
|
|
{
|
|
if (connected)
|
|
{
|
|
return SSL_write(ssl, buf, len);
|
|
}
|
|
return [super write: buf length: len];
|
|
}
|
|
|
|
@end
|
|
|