2013-06-24 09:04:00 +00:00
//This file should be easily portable.
//The biggest strength of this plugin system is that ALL interactions are performed via
//named functions, this makes it *really* easy to port plugins from one engine to annother.
# include "quakedef.h"
2017-06-21 01:24:25 +00:00
# include "netinc.h"
2016-11-15 22:22:04 +00:00
2017-05-18 10:24:09 +00:00
# ifndef GNUTLS_STATIC
# define GNUTLS_DYNAMIC //statically linking is bad, because that just dynamically links to a .so that probably won't exist.
//on the other hand, it does validate that the function types are correct.
# endif
2016-11-15 22:22:04 +00:00
2013-06-24 09:04:00 +00:00
# ifdef HAVE_GNUTLS
2017-05-18 10:24:09 +00:00
# if defined(_WIN32) && !defined(MINGW) && 0
2016-11-02 08:01:21 +00:00
# define GNUTLS_VERSION "2.12.23"
# define GNUTLS_SOPREFIX ""
# define GNUTLS_SONUM 26
2013-06-24 09:04:00 +00:00
2013-11-21 23:02:28 +00:00
# ifdef _MSC_VER
# if SIZE_MAX == ULONG_MAX
# define ssize_t long
# else
# define ssize_t int
# endif
# endif
2013-06-24 09:04:00 +00:00
//lets rip stuff out of the header and supply a seperate dll.
//gnutls is huge.
//also this helps get around the whole msvc/mingw thing.
struct DSTRUCT ;
2016-11-02 08:01:21 +00:00
typedef struct DSTRUCT * gnutls_certificate_credentials_t ;
typedef gnutls_certificate_credentials_t gnutls_certificate_client_credentials_t ;
typedef struct DSTRUCT * gnutls_anon_client_credentials_t ;
2013-06-24 09:04:00 +00:00
struct gnutls_session_int ;
typedef struct gnutls_session_int * gnutls_session_t ;
typedef void * gnutls_transport_ptr_t ;
2014-03-30 00:39:37 +00:00
struct gnutls_x509_crt_int ;
2013-11-21 23:02:28 +00:00
typedef struct gnutls_x509_crt_int * gnutls_x509_crt_t ;
2014-03-30 00:39:37 +00:00
typedef struct
{
unsigned char * data ;
unsigned int size ;
2013-11-21 23:02:28 +00:00
} gnutls_datum_t ;
2013-06-24 09:04:00 +00:00
typedef enum gnutls_kx_algorithm { GNUTLS_KX_RSA = 1 , GNUTLS_KX_DHE_DSS ,
GNUTLS_KX_DHE_RSA , GNUTLS_KX_ANON_DH , GNUTLS_KX_SRP ,
GNUTLS_KX_RSA_EXPORT , GNUTLS_KX_SRP_RSA , GNUTLS_KX_SRP_DSS
} gnutls_kx_algorithm ;
2014-03-30 00:39:37 +00:00
typedef enum {
2016-07-12 00:40:13 +00:00
GNUTLS_CRT_UNKNOWN = 0 ,
GNUTLS_CRT_X509 = 1 ,
GNUTLS_CRT_OPENPGP = 2 ,
GNUTLS_CRT_RAW = 3
2013-11-21 23:02:28 +00:00
} gnutls_certificate_type_t ;
2014-03-30 00:39:37 +00:00
typedef enum {
2016-07-12 00:40:13 +00:00
GNUTLS_X509_FMT_DER = 0 ,
GNUTLS_X509_FMT_PEM = 1
2013-11-21 23:02:28 +00:00
} gnutls_x509_crt_fmt_t ;
2014-03-30 00:39:37 +00:00
typedef enum
{
GNUTLS_CERT_INVALID = 1 < < 1 ,
GNUTLS_CERT_REVOKED = 1 < < 5 ,
GNUTLS_CERT_SIGNER_NOT_FOUND = 1 < < 6 ,
GNUTLS_CERT_SIGNER_NOT_CA = 1 < < 7 ,
GNUTLS_CERT_INSECURE_ALGORITHM = 1 < < 8 ,
GNUTLS_CERT_NOT_ACTIVATED = 1 < < 9 ,
GNUTLS_CERT_EXPIRED = 1 < < 10 ,
GNUTLS_CERT_SIGNATURE_FAILURE = 1 < < 11 ,
GNUTLS_CERT_REVOCATION_DATA_SUPERSEDED = 1 < < 12 ,
GNUTLS_CERT_UNEXPECTED_OWNER = 1 < < 14 ,
GNUTLS_CERT_REVOCATION_DATA_ISSUED_IN_FUTURE = 1 < < 15 ,
GNUTLS_CERT_SIGNER_CONSTRAINTS_FAILURE = 1 < < 16 ,
GNUTLS_CERT_MISMATCH = 1 < < 17 ,
2013-11-21 23:02:28 +00:00
} gnutls_certificate_status_t ;
2016-11-02 08:01:21 +00:00
typedef enum gnutls_connection_end { GNUTLS_SERVER = 1 , GNUTLS_CLIENT } gnutls_connection_end_t ;
typedef enum gnutls_credentials_type { GNUTLS_CRD_CERTIFICATE = 1 , GNUTLS_CRD_ANON , GNUTLS_CRD_SRP } gnutls_credentials_type_t ;
typedef enum gnutls_close_request { GNUTLS_SHUT_RDWR = 0 , GNUTLS_SHUT_WR = 1 } gnutls_close_request_t ;
2013-06-24 09:04:00 +00:00
typedef ssize_t ( * gnutls_pull_func ) ( gnutls_transport_ptr_t , void * , size_t ) ;
typedef ssize_t ( * gnutls_push_func ) ( gnutls_transport_ptr_t , const void * , size_t ) ;
# define GNUTLS_E_AGAIN -28
2013-11-21 23:02:28 +00:00
# define GNUTLS_E_CERTIFICATE_ERROR -43
2013-06-24 09:04:00 +00:00
# define GNUTLS_E_INTERRUPTED -52
2016-11-02 08:01:21 +00:00
# define GNUTLS_E_PREMATURE_TERMINATION -110
2013-06-24 09:04:00 +00:00
2016-07-12 00:40:13 +00:00
typedef enum
{
GNUTLS_NAME_DNS = 1
} gnutls_server_name_type_t ;
2016-11-02 08:01:21 +00:00
typedef int ( VARGS gnutls_certificate_verify_function ) ( gnutls_session_t session ) ;
# else
# include <gnutls/gnutls.h>
2017-05-23 07:48:45 +00:00
# if GNUTLS_VERSION_MAJOR >= 3 && defined(HAVE_DTLS)
2017-05-28 15:42:32 +00:00
# include <gnutls/dtls.h>
2017-05-23 07:48:45 +00:00
# else
2017-05-28 15:42:32 +00:00
# undef HAVE_DTLS
2017-05-23 07:48:45 +00:00
# endif
2016-11-02 08:01:21 +00:00
# define gnutls_connection_end_t unsigned int
# if GNUTLS_VERSION_MAJOR < 3 || (GNUTLS_VERSION_MAJOR == 3 && GNUTLS_VERSION_MINOR < 3)
# define GNUTLS_SONUM 26 //cygwin or something.
# endif
# if GNUTLS_VERSION_MAJOR == 3 && GNUTLS_VERSION_MINOR == 3
# define GNUTLS_SOPREFIX "-deb0" //not sure what this is about.
# define GNUTLS_SONUM 28 //debian jessie
# endif
# if GNUTLS_VERSION_MAJOR == 3 && GNUTLS_VERSION_MINOR == 4
# define GNUTLS_SONUM 30 //ubuntu 16.04
# endif
# if GNUTLS_VERSION_MAJOR == 3 && GNUTLS_VERSION_MINOR == 5
# define GNUTLS_SONUM 30 //debian stretch
# endif
# if GNUTLS_VERSION_MAJOR == 3 && GNUTLS_VERSION_MINOR > 5
# define GNUTLS_SONUM 30 //no idea what the future holds. maybe we'll be lucky...
# endif
# ifndef GNUTLS_SONUM
# pragma message "GNUTLS version not recognised. Will probably not be loadable."
# endif
# ifndef GNUTLS_SOPREFIX
# define GNUTLS_SOPREFIX
# endif
# endif
# if GNUTLS_VERSION_MAJOR >= 3
2016-11-15 22:22:04 +00:00
# define GNUTLS_HAVE_SYSTEMTRUST
2016-11-02 08:01:21 +00:00
# endif
# if GNUTLS_VERSION_MAJOR >= 4 || (GNUTLS_VERSION_MAJOR == 3 && (GNUTLS_VERSION_MINOR > 1 || (GNUTLS_VERSION_MINOR == 1 && GNUTLS_VERSION_PATCH >= 1)))
2016-11-15 22:22:04 +00:00
# define GNUTLS_HAVE_VERIFY3
2016-11-02 08:01:21 +00:00
# endif
2016-11-15 22:22:04 +00:00
2016-11-02 08:01:21 +00:00
static int ( VARGS * qgnutls_bye ) ( gnutls_session_t session , gnutls_close_request_t how ) ;
static void ( VARGS * qgnutls_perror ) ( int error ) ;
static int ( VARGS * qgnutls_handshake ) ( gnutls_session_t session ) ;
static void ( VARGS * qgnutls_transport_set_ptr ) ( gnutls_session_t session , gnutls_transport_ptr_t ptr ) ;
static void ( VARGS * qgnutls_transport_set_push_function ) ( gnutls_session_t session , gnutls_push_func push_func ) ;
static void ( VARGS * qgnutls_transport_set_pull_function ) ( gnutls_session_t session , gnutls_pull_func pull_func ) ;
static void ( VARGS * qgnutls_transport_set_errno ) ( gnutls_session_t session , int err ) ;
static int ( VARGS * qgnutls_error_is_fatal ) ( int error ) ;
static int ( VARGS * qgnutls_credentials_set ) ( gnutls_session_t , gnutls_credentials_type_t type , void * cred ) ;
2017-04-29 02:45:21 +00:00
//static int (VARGS *qgnutls_kx_set_priority)(gnutls_session_t session, const int*);
2016-11-02 08:01:21 +00:00
static int ( VARGS * qgnutls_init ) ( gnutls_session_t * session , gnutls_connection_end_t con_end ) ;
static int ( VARGS * qgnutls_set_default_priority ) ( gnutls_session_t session ) ;
static int ( VARGS * qgnutls_certificate_allocate_credentials ) ( gnutls_certificate_credentials_t * sc ) ;
static int ( VARGS * qgnutls_anon_allocate_client_credentials ) ( gnutls_anon_client_credentials_t * sc ) ;
static int ( VARGS * qgnutls_global_init ) ( void ) ;
2016-11-15 22:22:04 +00:00
static ssize_t ( VARGS * qgnutls_record_send ) ( gnutls_session_t session , const void * data , size_t sizeofdata ) ;
static ssize_t ( VARGS * qgnutls_record_recv ) ( gnutls_session_t session , void * data , size_t sizeofdata ) ;
2016-11-02 08:01:21 +00:00
2016-11-15 22:22:04 +00:00
static void ( VARGS * qgnutls_certificate_set_verify_function ) ( gnutls_certificate_credentials_t cred , gnutls_certificate_verify_function * func ) ;
2016-11-02 08:01:21 +00:00
static void * ( VARGS * qgnutls_session_get_ptr ) ( gnutls_session_t session ) ;
static void ( VARGS * qgnutls_session_set_ptr ) ( gnutls_session_t session , void * ptr ) ;
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_SYSTEMTRUST
2016-11-02 08:01:21 +00:00
static int ( VARGS * qgnutls_certificate_set_x509_system_trust ) ( gnutls_certificate_credentials_t cred ) ;
2013-11-21 23:02:28 +00:00
# else
2016-11-02 08:01:21 +00:00
static int ( VARGS * qgnutls_certificate_set_x509_trust_file ) ( gnutls_certificate_credentials_t cred , const char * cafile , gnutls_x509_crt_fmt_t type ) ;
2013-11-21 23:02:28 +00:00
# endif
2017-05-18 10:24:09 +00:00
static int ( VARGS * qgnutls_certificate_set_x509_key_file ) ( gnutls_certificate_credentials_t res , const char * certfile , const char * keyfile , gnutls_x509_crt_fmt_t type ) ;
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_VERIFY3
2016-11-02 08:01:21 +00:00
static int ( VARGS * qgnutls_certificate_verify_peers3 ) ( gnutls_session_t session , const char * hostname , unsigned int * status ) ;
static int ( VARGS * qgnutls_certificate_verification_status_print ) ( unsigned int status , gnutls_certificate_type_t type , gnutls_datum_t * out , unsigned int flags ) ;
2013-11-21 23:02:28 +00:00
# else
2016-11-02 08:01:21 +00:00
static int ( VARGS * qgnutls_certificate_verify_peers2 ) ( gnutls_session_t session , unsigned int * status ) ;
static int ( VARGS * qgnutls_x509_crt_check_hostname ) ( gnutls_x509_crt_t cert , const char * hostname ) ;
static int ( VARGS * qgnutls_x509_crt_init ) ( gnutls_x509_crt_t * cert ) ;
static int ( VARGS * qgnutls_x509_crt_import ) ( gnutls_x509_crt_t cert , const gnutls_datum_t * data , gnutls_x509_crt_fmt_t format ) ;
2013-11-21 23:02:28 +00:00
# endif
2017-04-09 05:43:08 +00:00
static const gnutls_datum_t * ( VARGS * qgnutls_certificate_get_peers ) ( gnutls_session_t session , unsigned int * list_size ) ;
2016-11-02 08:01:21 +00:00
static gnutls_certificate_type_t ( VARGS * qgnutls_certificate_type_get ) ( gnutls_session_t session ) ;
static void ( VARGS * qgnutls_free ) ( void * ptr ) ;
static int ( VARGS * qgnutls_server_name_set ) ( gnutls_session_t session , gnutls_server_name_type_t type , const void * name , size_t name_length ) ;
2013-11-21 23:02:28 +00:00
2017-05-18 10:24:09 +00:00
# ifdef HAVE_DTLS
static int ( VARGS * qgnutls_key_generate ) ( gnutls_datum_t * key , unsigned int key_size ) ;
static void ( VARGS * qgnutls_transport_set_pull_timeout_function ) ( gnutls_session_t session , gnutls_pull_timeout_func func ) ;
static int ( VARGS * qgnutls_dtls_cookie_verify ) ( gnutls_datum_t * key , void * client_data , size_t client_data_size , void * _msg , size_t msg_size , gnutls_dtls_prestate_st * prestate ) ;
static int ( VARGS * qgnutls_dtls_cookie_send ) ( gnutls_datum_t * key , void * client_data , size_t client_data_size , gnutls_dtls_prestate_st * prestate , gnutls_transport_ptr_t ptr , gnutls_push_func push_func ) ;
static void ( VARGS * qgnutls_dtls_prestate_set ) ( gnutls_session_t session , gnutls_dtls_prestate_st * prestate ) ;
static void ( VARGS * qgnutls_dtls_set_mtu ) ( gnutls_session_t session , unsigned int mtu ) ;
# endif
2013-06-24 09:04:00 +00:00
static qboolean Init_GNUTLS ( void )
{
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_SYSTEMTRUST
2016-11-02 08:01:21 +00:00
# define GNUTLS_TRUSTFUNCS GNUTLS_FUNC(gnutls_certificate_set_x509_system_trust)
# else
# define GNUTLS_TRUSTFUNCS GNUTLS_FUNC(gnutls_certificate_set_x509_trust_file)
# endif
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_VERIFY3
2016-11-02 08:01:21 +00:00
# define GNUTLS_VERIFYFUNCS \
GNUTLS_FUNC ( gnutls_certificate_verify_peers3 ) \
GNUTLS_FUNC ( gnutls_certificate_verification_status_print )
# else
# define GNUTLS_VERIFYFUNCS \
GNUTLS_FUNC ( gnutls_certificate_verify_peers2 ) \
GNUTLS_FUNC ( gnutls_x509_crt_check_hostname ) \
GNUTLS_FUNC ( gnutls_x509_crt_init ) \
GNUTLS_FUNC ( gnutls_x509_crt_import ) \
GNUTLS_FUNC ( gnutls_certificate_get_peers )
# endif
2017-05-18 10:24:09 +00:00
# ifdef HAVE_DTLS
# define GNUTLS_DTLS_STUFF \
GNUTLS_FUNC ( gnutls_key_generate ) \
GNUTLS_FUNC ( gnutls_transport_set_pull_timeout_function ) \
GNUTLS_FUNC ( gnutls_dtls_cookie_verify ) \
GNUTLS_FUNC ( gnutls_dtls_cookie_send ) \
GNUTLS_FUNC ( gnutls_dtls_prestate_set ) \
GNUTLS_FUNC ( gnutls_dtls_set_mtu )
# else
# define GNUTLS_DTLS_STUFF
# endif
2016-11-02 08:01:21 +00:00
# define GNUTLS_FUNCS \
GNUTLS_FUNC ( gnutls_bye ) \
GNUTLS_FUNC ( gnutls_perror ) \
GNUTLS_FUNC ( gnutls_handshake ) \
GNUTLS_FUNC ( gnutls_transport_set_ptr ) \
GNUTLS_FUNC ( gnutls_transport_set_push_function ) \
GNUTLS_FUNC ( gnutls_transport_set_pull_function ) \
GNUTLS_FUNC ( gnutls_transport_set_errno ) \
GNUTLS_FUNC ( gnutls_error_is_fatal ) \
GNUTLS_FUNC ( gnutls_credentials_set ) \
GNUTLS_FUNC ( gnutls_init ) \
GNUTLS_FUNC ( gnutls_set_default_priority ) \
GNUTLS_FUNC ( gnutls_certificate_allocate_credentials ) \
GNUTLS_FUNC ( gnutls_anon_allocate_client_credentials ) \
GNUTLS_FUNC ( gnutls_global_init ) \
GNUTLS_FUNC ( gnutls_record_send ) \
GNUTLS_FUNC ( gnutls_record_recv ) \
GNUTLS_FUNC ( gnutls_certificate_set_verify_function ) \
GNUTLS_FUNC ( gnutls_session_get_ptr ) \
GNUTLS_FUNC ( gnutls_session_set_ptr ) \
GNUTLS_TRUSTFUNCS \
2017-05-18 10:24:09 +00:00
GNUTLS_FUNC ( gnutls_certificate_set_x509_key_file ) \
2016-11-02 08:01:21 +00:00
GNUTLS_VERIFYFUNCS \
GNUTLS_FUNC ( gnutls_certificate_type_get ) \
GNUTLS_FUNC ( gnutls_free ) \
GNUTLS_FUNC ( gnutls_server_name_set ) \
2017-05-18 10:24:09 +00:00
GNUTLS_DTLS_STUFF
2016-11-02 08:01:21 +00:00
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_DYNAMIC
2015-01-07 13:47:35 +00:00
dllhandle_t * hmod ;
2013-06-24 09:04:00 +00:00
dllfunction_t functable [ ] =
{
2016-11-02 08:01:21 +00:00
//#define GNUTLS_FUNC(nam) {(void**)&q##nam, #nam},
// GNUTLS_FUNCS
//#undef GNUTLS_FUNC
{ ( void * * ) & qgnutls_bye , " gnutls_bye " } ,
{ ( void * * ) & qgnutls_perror , " gnutls_perror " } ,
{ ( void * * ) & qgnutls_handshake , " gnutls_handshake " } ,
{ ( void * * ) & qgnutls_transport_set_ptr , " gnutls_transport_set_ptr " } ,
{ ( void * * ) & qgnutls_transport_set_push_function , " gnutls_transport_set_push_function " } ,
{ ( void * * ) & qgnutls_transport_set_pull_function , " gnutls_transport_set_pull_function " } ,
{ ( void * * ) & qgnutls_transport_set_errno , " gnutls_transport_set_errno " } ,
{ ( void * * ) & qgnutls_error_is_fatal , " gnutls_error_is_fatal " } ,
{ ( void * * ) & qgnutls_credentials_set , " gnutls_credentials_set " } ,
2017-04-29 02:45:21 +00:00
// {(void**)&qgnutls_kx_set_priority, "gnutls_kx_set_priority"},
2016-11-02 08:01:21 +00:00
{ ( void * * ) & qgnutls_init , " gnutls_init " } ,
{ ( void * * ) & qgnutls_set_default_priority , " gnutls_set_default_priority " } ,
{ ( void * * ) & qgnutls_certificate_allocate_credentials , " gnutls_certificate_allocate_credentials " } ,
{ ( void * * ) & qgnutls_anon_allocate_client_credentials , " gnutls_anon_allocate_client_credentials " } ,
{ ( void * * ) & qgnutls_global_init , " gnutls_global_init " } ,
{ ( void * * ) & qgnutls_record_send , " gnutls_record_send " } ,
{ ( void * * ) & qgnutls_record_recv , " gnutls_record_recv " } ,
{ ( void * * ) & qgnutls_certificate_set_verify_function , " gnutls_certificate_set_verify_function " } ,
{ ( void * * ) & qgnutls_session_get_ptr , " gnutls_session_get_ptr " } ,
{ ( void * * ) & qgnutls_session_set_ptr , " gnutls_session_set_ptr " } ,
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_SYSTEMTRUST
2016-11-02 08:01:21 +00:00
{ ( void * * ) & qgnutls_certificate_set_x509_system_trust , " gnutls_certificate_set_x509_system_trust " } ,
2013-11-21 23:02:28 +00:00
# else
2016-11-02 08:01:21 +00:00
{ ( void * * ) & qgnutls_certificate_set_x509_trust_file , " gnutls_certificate_set_x509_trust_file " } ,
2013-11-21 23:02:28 +00:00
# endif
2017-05-18 10:24:09 +00:00
{ ( void * * ) & qgnutls_certificate_set_x509_key_file , " gnutls_certificate_set_x509_key_file " } ,
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_VERIFY3
2016-11-02 08:01:21 +00:00
{ ( void * * ) & qgnutls_certificate_verify_peers3 , " gnutls_certificate_verify_peers3 " } ,
{ ( void * * ) & qgnutls_certificate_verification_status_print , " gnutls_certificate_verification_status_print " } ,
2013-11-21 23:02:28 +00:00
# else
2016-11-02 08:01:21 +00:00
{ ( void * * ) & qgnutls_certificate_verify_peers2 , " gnutls_certificate_verify_peers2 " } ,
{ ( void * * ) & qgnutls_x509_crt_init , " gnutls_x509_crt_init " } ,
{ ( void * * ) & qgnutls_x509_crt_import , " gnutls_x509_crt_import " } ,
{ ( void * * ) & qgnutls_x509_crt_check_hostname , " gnutls_x509_crt_check_hostname " } ,
2013-11-21 23:02:28 +00:00
# endif
2017-04-09 05:43:08 +00:00
{ ( void * * ) & qgnutls_certificate_get_peers , " gnutls_certificate_get_peers " } ,
2016-11-02 08:01:21 +00:00
{ ( void * * ) & qgnutls_certificate_type_get , " gnutls_certificate_type_get " } ,
{ ( void * * ) & qgnutls_free , " gnutls_free " } ,
{ ( void * * ) & qgnutls_server_name_set , " gnutls_server_name_set " } ,
2017-05-18 10:24:09 +00:00
# ifdef HAVE_DTLS
{ ( void * * ) & qgnutls_key_generate , " gnutls_key_generate " } ,
{ ( void * * ) & qgnutls_transport_set_pull_timeout_function , " gnutls_transport_set_pull_timeout_function " } ,
{ ( void * * ) & qgnutls_dtls_cookie_verify , " gnutls_dtls_cookie_verify " } ,
{ ( void * * ) & qgnutls_dtls_cookie_send , " gnutls_dtls_cookie_send " } ,
{ ( void * * ) & qgnutls_dtls_prestate_set , " gnutls_dtls_prestate_set " } ,
{ ( void * * ) & qgnutls_dtls_set_mtu , " gnutls_dtls_set_mtu " } ,
# endif
2013-06-24 09:04:00 +00:00
{ NULL , NULL }
} ;
2016-11-02 08:01:21 +00:00
# ifdef GNUTLS_SONUM
# ifdef __CYGWIN__
hmod = Sys_LoadLibrary ( " cyggnutls " GNUTLS_SOPREFIX " - " STRINGIFY ( GNUTLS_SONUM ) " .dll " , functable ) ;
# else
hmod = Sys_LoadLibrary ( " libgnutls " GNUTLS_SOPREFIX " .so. " STRINGIFY ( GNUTLS_SONUM ) , functable ) ;
# endif
2013-11-21 23:02:28 +00:00
# else
2016-11-02 08:01:21 +00:00
hmod = Sys_LoadLibrary ( " libgnutls " GNUTLS_SOPREFIX " .so " , functable ) ; //hope and pray
2013-11-21 23:02:28 +00:00
# endif
2013-06-24 09:04:00 +00:00
if ( ! hmod )
return false ;
# else
2016-11-02 08:01:21 +00:00
# define GNUTLS_FUNC(name) q##name = name;
GNUTLS_FUNCS
# undef GNUTLS_FUNC
2013-06-24 09:04:00 +00:00
# endif
2016-11-02 08:01:21 +00:00
return true ;
}
2013-06-24 09:04:00 +00:00
typedef struct
{
vfsfile_t funcs ;
vfsfile_t * stream ;
2013-11-21 23:02:28 +00:00
char certname [ 512 ] ;
2013-06-24 09:04:00 +00:00
gnutls_session_t session ;
qboolean handshaking ;
2016-07-12 00:40:13 +00:00
qboolean datagram ;
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
qboolean challenging ; //not sure this is actually needed, but hey.
void * cbctx ;
neterr_t ( * cbpush ) ( void * cbctx , const qbyte * data , size_t datasize ) ;
qbyte * readdata ;
size_t readsize ;
2017-05-28 08:17:25 +00:00
# ifdef HAVE_DTLS
2017-05-18 10:24:09 +00:00
gnutls_dtls_prestate_st prestate ;
2017-05-28 08:17:25 +00:00
# endif
2017-05-18 10:24:09 +00:00
// int mtu;
2013-06-24 09:04:00 +00:00
} gnutlsfile_t ;
2013-11-21 23:02:28 +00:00
# define CAFILE " / etc / ssl / certs / ca-certificates.crt"
2016-02-15 06:01:17 +00:00
static qboolean QDECL SSL_Close ( vfsfile_t * vfs )
2013-06-24 09:04:00 +00:00
{
gnutlsfile_t * file = ( void * ) vfs ;
2013-11-21 23:02:28 +00:00
file - > handshaking = true ;
if ( file - > session )
2016-11-02 08:01:21 +00:00
qgnutls_bye ( file - > session , file - > datagram ? GNUTLS_SHUT_WR : GNUTLS_SHUT_RDWR ) ;
2013-11-21 23:02:28 +00:00
file - > session = NULL ;
if ( file - > stream )
VFS_CLOSE ( file - > stream ) ;
file - > stream = NULL ;
2016-02-15 06:01:17 +00:00
return true ;
2013-06-24 09:04:00 +00:00
}
2017-04-09 05:43:08 +00:00
static const qbyte fte_triptohell_certdata [ 917 ] = " \x30 \x82 \x03 \x91 \x30 \x82 \x02 \x79 \xa0 \x03 \x02 \x01 \x02 \x02 \x09 \x00 \xb5 \x71 \x47 \x8d \x5e \x66 \xf1 \xd9 \x30 \x0d \x06 \x09 \x2a \x86 \x48 \x86 \xf7 \x0d \x01 \x01 \x0b \x05 \x00 \x30 \x5f \x31 \x0b \x30 \x09 \x06 \x03 \x55 \x04 \x06 \x13 \x02 \x55 \x53 \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x08 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x07 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x0c \x30 \x0a \x06 \x03 \x55 \x04 \x0a \x0c \x03 \x46 \x54 \x45 \x31 \x1c \x30 \x1a \x06 \x03 \x55 \x04 \x03 \x0c \x13 \x66 \x74 \x65 \x2e \x74 \x72 \x69 \x70 \x74 \x6f \x68 \x65 \x6c \x6c \x2e \x69 \x6e \x66 \x6f \x30 \x1e \x17 \x0d \x31 \x34 \x31 \x32 \x32 \x35 \x30 \x30 \x35 \x38 \x31 \x34 \x5a \x17 \x0d \x31 \x37 \x30 \x33 \x30 \x34 \x30 \x30 \x35 \x38 \x31 \x34 \x5a \x30 \x5f \x31 \x0b \x30 \x09 \x06 \x03 \x55 \x04 \x06 \x13 \x02 \x55 \x53 \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x08 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x07 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x0c \x30 \x0a \x06 \x03 \x55 \x04 \x0a \x0c \x03 \x46 \x54 \x45 \x31 \x1c \x30 \x1a \x06 \x03 \x55 \x04 \x03 \x0c \x13 \x66 \x74 \x65 \x2e \x74 \x72 \x69 \x70 \x74 \x6f \x68 \x65 \x6c \x6c \x2e \x69 \x6e \x66 \x6f \x30 \x82 \x01 \x22 \x30 \x0d \x06 \x09 \x2a \x86 \x48 \x86 \xf7 \x0d \x01 \x01 \x01 \x05 \x00 \x03 \x82 \x01 \x0f \x00 \x30 \x82 \x01 \x0a \x02 \x82 \x01 \x01 \x00 \xdd \xb8 \x7c \x69 \x3d \x63 \x95 \xe3 \x88 \x15 \xfd \xad \x93 \x5e \x6b \x97 \xfb \x74 \xba \x1f \x83 \x33 \xe5 \x8a \x8d \x8f \xb0 \xbf \xf9 \xd3 \xa1 \x2c \x65 \x53 \xa7 \xef \xd3 \x0f \xdc \x03 \x60 \x0a \x40 \xef \xa8 \xef \x3f \xb3 \xd9 \x8d \x31 \x39 \x12 \x8a \xd8 \x0e \x24 \x8f \xe5 \x58 \x26 \x86 \x4c \x76 \x6c \x59 \x9a \xab \xea \x1c \x3d \xfb \x62 \x62 \xad \xaf \xd6 \x00 \x33 \x76 \x2d \xbb \xeb \xe8 \xec \xb4 \x76 \x4f \xb0 \xbe \xcf \xf0 \x46 \x94 \x40 \x02 \x99 \xd4 \xb2 \x71 \x71 \xd6 \xf5 \x1f \xc3 \x4f \x1e \x1e \xb4 \x0d \x82 \x49 \xc4 \xa2 \xdc \xae \x6f \x4e \x3a \xf9 \x0e \xdd \xf4 \xd2 \x53 \xe3 \xe7 \x7d \x58 \x79 \xf4 \xce \x1f \x6c \xac \x81 \x8c \x8c \xe1 \x03 \x5b \x22 \x56 \x92 \x19 \x4f \x74 \xc0 \x36 \x41 \xac \x1b \xfa \x9e \xf7 \x2a \x0f \xd6 \x4b \xcc \x9a \xca \x67 \x87 \xb7 \x95 \xdf \xb7 \xd4 \x7d \x8c \xcc \xa9 \x25 \xde \xdd \x8c \x1b \xd7 \x32 \xf2 \x84 \x25 \x46 \x7b \x10 \x55 \xf9 \x80 \xfd \x5d \xad \xab \xf9 \x4c \x1f \xc0 \xa5 \xd1 \x3f \x01 \x86 \x4d \xfa \x57 \xab \x7a \x6d \xec \xf1 \xdb \xf4 \xad \xf2 \x33 \xcd \xa0 \xed \xfe \x1b \x27 \x55 \x56 \xba \x8c \x47 \x70 \x16 \xd5 \x75 \x17 \x8e \x80 \xaa \x49 \x5e \x93 \x83 \x1d \x6f \x1f \x2c \xf7 \xa7 \x64 \xe6 \x2e \x88 \x8e \xff \x70 \x5a \x41 \x52 \xae \x93 \x02 \x03 \x01 \x00 \x01 \xa3 \x50 \x30 \x4e \x30 \x1d \x06 \x03 \x55 \x1d \x0e \x04 \x16 \x04 \x14 \x4e \x76 \x4a \xce \x7b \x45 \x14 \x39 \xeb \x9c \x28 \x56 \xb5 \x7b \x8a \x18 \x6f \x22 \x17 \x82 \x30 \x1f \x06 \x03 \x55 \x1d \x23 \x04 \x18 \x30 \x16 \x80 \x14 \x4e \x76 \x4a \xce \x7b \x45 \x14 \x39 \xeb \x9c \x28 \x56 \xb5 \x7b \x8a \x18 \x6f \x22 \x17 \x82 \x30 \x0c \x06 \x03 \x55 \x1d \x13 \x04 \x05 \x30 \x03 \x01 \x01 \xff \x30 \x0d \x06 \x09 \x2a \x86 \x48 \x86 \xf7 \x0d \x01 \x01 \x0b \x05 \x00 \x03 \x82 \x01 \x01 \x00 \x48 \x22 \x65 \xed \x2e \xc5 \xed \xbb \xe9 \x40 \x6c \x80 \xc4 \x63 \x19 \xd1 \x00 \xb4 \x30 \x34 \x17 \x7c \x7c \xbd \x1b \xc5 \xa9 \x43 \x0c \x92 \x6e \xd6 \x2d \x11 \x6c \x0d \xa6 \xda \x30 \xe9 \xf7 \x46 \x7b \x01 \xe4 \x53 \x23 \xae \x88 \xd1 \xf2 \xed \xca \x84 \x06 \x19 \x97 \xb9 \x06 \xfb \xda \xec \x72 \x2d \x15 \x20 \xd2 \x8f \x66 \xad \xb5 \xdd \x4b \x4f \xdf \x7e \xaf \xa3 \x6c \x7f \x53 \x32 \x8f \xe2 \x19 \x5c \x44 \x98 \x86 \x31 \xee \xb4 \x03 \xe7 \x27 \xa1 \x83 \xab \xc3 \xce \xb4 \x9a \x01 \xbe \x8c \x64 \x2e \x2b \xe3 \x4e \x55 \xdf \x95 \xeb \x16 \x87 \xbd \xfa \x11 \xa2 \x3e \x38 \x92 \x97 \x36 \xe9 \x65 \x60 \xf3 \xac \x68 \x44 \xb3 \x51 \x54 \x3a \x42 \xa8 \x98 \x9b \xee \x1b \x9e \x79 \x6a \xaf \xc0 \xbe \x41 \xc4 \xb1 \x96 \x42 \xd9 \x94 \xef \x49 \x5b \xbe \x2d \x04 \xb9 \xfb \x92 \xbb \xdc \x0e \x29 \xfd \xee \xa9 \x68 \x09 \xf9 \x9f \x69 \x8b \x3d \xe1 \x4b \xee \x24 \xf9 \xfe \x02 \x3a \x0a \xb8 \xcd \x6c \x07 \x43 \xa9 \x4a \xe7 \x03 \x34 \x2e \x72 \xa7 \x81 \xaa \x40 \xa9 \x98 \x5d \x97 \xee \x2a \x99 \xc6 \x8f \xe8 \x6f \x98 \xa2 \x85 \xc9 \x0d \x04 \x19 \x43 \x6a \xd3 \xc7 \x15 \x4c \x4b \xbc \xa5 \xb8 \x9f \x38 \xf3 \x43 \x83 \x0c \xef \x97 \x6e \xa6 \x20 \xde \xc5 \xd3 \x1e \x3e \x5d \xcd \x58 \x3d \x5c \x55 \x7a \x90 \x94 " ;
static const qbyte triptohell_certdata [ 933 ] = " \x30 \x82 \x03 \xa1 \x30 \x82 \x02 \x89 \xa0 \x03 \x02 \x01 \x02 \x02 \x09 \x00 \xea \xb7 \x13 \xcf \x55 \xe5 \xe8 \x8c \x30 \x0d \x06 \x09 \x2a \x86 \x48 \x86 \xf7 \x0d \x01 \x01 \x0b \x05 \x00 \x30 \x67 \x31 \x0b \x30 \x09 \x06 \x03 \x55 \x04 \x06 \x13 \x02 \x55 \x53 \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x08 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x07 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x18 \x30 \x16 \x06 \x03 \x55 \x04 \x0a \x0c \x0f \x74 \x72 \x69 \x70 \x74 \x6f \x68 \x65 \x6c \x6c \x2e \x69 \x6e \x66 \x6f \x31 \x18 \x30 \x16 \x06 \x03 \x55 \x04 \x03 \x0c \x0f \x74 \x72 \x69 \x70 \x74 \x6f \x68 \x65 \x6c \x6c \x2e \x69 \x6e \x66 \x6f \x30 \x1e \x17 \x0d \x31 \x34 \x31 \x32 \x32 \x35 \x30 \x30 \x35 \x38 \x33 \x37 \x5a \x17 \x0d \x31 \x37 \x30 \x33 \x30 \x34 \x30 \x30 \x35 \x38 \x33 \x37 \x5a \x30 \x67 \x31 \x0b \x30 \x09 \x06 \x03 \x55 \x04 \x06 \x13 \x02 \x55 \x53 \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x08 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x11 \x30 \x0f \x06 \x03 \x55 \x04 \x07 \x0c \x08 \x4e \x65 \x77 \x20 \x59 \x6f \x72 \x6b \x31 \x18 \x30 \x16 \x06 \x03 \x55 \x04 \x0a \x0c \x0f \x74 \x72 \x69 \x70 \x74 \x6f \x68 \x65 \x6c \x6c \x2e \x69 \x6e \x66 \x6f \x31 \x18 \x30 \x16 \x06 \x03 \x55 \x04 \x03 \x0c \x0f \x74 \x72 \x69 \x70 \x74 \x6f \x68 \x65 \x6c \x6c \x2e \x69 \x6e \x66 \x6f \x30 \x82 \x01 \x22 \x30 \x0d \x06 \x09 \x2a \x86 \x48 \x86 \xf7 \x0d \x01 \x01 \x01 \x05 \x00 \x03 \x82 \x01 \x0f \x00 \x30 \x82 \x01 \x0a \x02 \x82 \x01 \x01 \x00 \xd8 \x77 \x62 \xf6 \x74 \xa7 \x75 \xde \xda \x09 \xae \x9e \x76 \x7a \xc6 \x2a \xcf \x9a \xbe \xc6 \xb9 \x6d \xe2 \xca \x0f \x2d \x95 \xb8 \x89 \x93 \xf7 \x50 \x64 \x92 \x7d \x95 \x34 \xe4 \x6e \xef \x52 \x56 \xef \x13 \x9a \x3a \xae \x84 \x5b \x57 \x82 \x04 \x86 \x74 \xbd \x4e \x38 \x32 \x56 \x00 \xd6 \x34 \x9c \x23 \xd6 \x81 \x8e \x29 \x77 \x45 \x61 \x20 \xdf \x28 \xf8 \xe5 \x61 \x83 \xec \xe6 \xa0 \x1a \x75 \xa8 \x3b \x53 \x6f \xc4 \x09 \x61 \x66 \x3a \xf0 \x81 \xbf \x2c \xf5 \x8e \xf1 \xe2 \x35 \xe4 \x24 \x7f \x16 \xcc \xce \x60 \xa2 \x42 \x6e \xc2 \x3a \x29 \x75 \x6c \x79 \xb0 \x99 \x9c \xe2 \xfe \x27 \x32 \xb6 \xf7 \x0d \x71 \xfd \x62 \x9d \x54 \x7c \x40 \xb2 \xf5 \xa0 \xa4 \x25 \x31 \x8d \x65 \xfd \x3f \x3b \x9b \x7e \x84 \x74 \x17 \x3c \x1f \xec \x50 \xcf \x75 \xb8 \x5c \xca \xfc \x0f \xe8 \x47 \xd8 \x64 \xec \x5f \x6c \x45 \x9a \x55 \x49 \x97 \x3f \xcb \x49 \x34 \x71 \x0a \x12 \x13 \xbc \x3d \x53 \x81 \x17 \x9a \x92 \x44 \x91 \x07 \xc2 \xef \x6d \x64 \x86 \x5d \xfd \x67 \xd5 \x99 \x38 \x95 \x46 \x74 \x6d \xb6 \xbf \x29 \xc9 \x5b \xac \xb1 \x46 \xd6 \x9e \x57 \x5c \x7b \x24 \x91 \xf4 \x7c \xe4 \x01 \x31 \x8c \xec \x79 \x94 \xb7 \x3f \xd2 \x93 \x6d \xe2 \x69 \xbe \x61 \x44 \x2e \x8f \x1a \xdc \xa8 \x97 \xf5 \x81 \x8e \x0c \xe1 \x00 \xf2 \x71 \x51 \xf3 \x02 \x03 \x01 \x00 \x01 \xa3 \x50 \x30 \x4e \x30 \x1d \x06 \x03 \x55 \x1d \x0e \x04 \x16 \x04 \x14 \x18 \xb2 \x6b \x63 \xcc \x17 \x54 \xf6 \xf0 \xb6 \x9e \x62 \xa4 \x35 \xcf \x47 \x74 \x13 \x29 \xbf \x30 \x1f \x06 \x03 \x55 \x1d \x23 \x04 \x18 \x30 \x16 \x80 \x14 \x18 \xb2 \x6b \x63 \xcc \x17 \x54 \xf6 \xf0 \xb6 \x9e \x62 \xa4 \x35 \xcf \x47 \x74 \x13 \x29 \xbf \x30 \x0c \x06 \x03 \x55 \x1d \x13 \x04 \x05 \x30 \x03 \x01 \x01 \xff \x30 \x0d \x06 \x09 \x2a \x86 \x48 \x86 \xf7 \x0d \x01 \x01 \x0b \x05 \x00 \x03 \x82 \x01 \x01 \x00 \x7f \x24 \x18 \x8a \x79 \xee \xf9 \xeb \xed \x29 \x1e \x21 \x15 \x8a \x53 \xc9 \xb7 \xec \x30 \xc4 \x85 \x9f \x45 \x85 \x26 \x36 \xb7 \x07 \xf3 \xf1 \xff \x3b \x89 \x05 \x0a \xd4 \x30 \x68 \x31 \x68 \x33 \xdd \xf6 \x58 \xa3 \x85 \x9f \x49 \x50 \x76 \x9a \xc5 \x79 \x13 \xe1 \x4d \x67 \x0c \xf3 \x92 \xf0 \x1d \x02 \x1f \xc4 \x5c \xd4 \xa1 \x0c \x57 \xdf \x46 \x84 \x43 \x9f \xb0 \xe2 \x91 \x62 \xa8 \xe0 \x86 \x0d \x47 \xe1 \xd9 \x60 \x01 \xc4 \xe0 \xda \x6f \x06 \x0a \xad \x38 \xf3 \x66 \x68 \xc5 \xe2 \x66 \x3e \x47 \x83 \x65 \x64 \xcd \xff \xf3 \xbb \xa7 \xfa \x23 \xf1 \x82 \x5e \x06 \x6a \x91 \x37 \x51 \xcd \xb9 \x95 \x20 \x89 \xff \xa1 \x54 \xb2 \x76 \xcf \x8e \xe1 \xcd \x13 \x93 \x13 \xd1 \xda \x0d \x0d \xbc \x0f \xd5 \x11 \x26 \xd6 \xaf \x60 \x0f \x4d \x8a \x4f \x28 \xee \x6c \xf1 \x99 \xdc \xed \x16 \xdc \x87 \x26 \xfd \x23 \x8a \xb8 \xb0 \x20 \x0e \xe2 \x32 \xf5 \x8e \xb0 \x65 \x98 \x13 \xb8 \x4b \x39 \x7c \x8c \x98 \xa2 \x29 \x75 \x48 \x3a \x89 \xf9 \x61 \x77 \x6c \x2d \x84 \x41 \x40 \x17 \xa6 \x50 \xc5 \x09 \x63 \x10 \xe7 \x09 \xd4 \x5c \xdd \x0e \x71 \x16 \xaf \xb1 \x32 \xe4 \xc0 \xe6 \xea \xfd \x26 \x55 \x07 \x40 \x95 \x84 \x48 \x62 \x04 \x10 \x92 \xb2 \xd9 \x27 \xfb \x8a \xf3 \x7c \xe6 \xfe \xd4 \xfc \xa6 \x33 \x79 \x01 \x5c \xc3 \x1f \x80 \xa8 \xf3 " ;
static struct
{
char * hostname ;
unsigned int datasize ;
const qbyte * data ;
} knowncerts [ ] = {
{ " triptohell.info " , sizeof ( triptohell_certdata ) , triptohell_certdata } ,
{ " fte.triptohell.info " , sizeof ( fte_triptohell_certdata ) , fte_triptohell_certdata } ,
} ;
2013-11-21 23:02:28 +00:00
static int QDECL SSL_CheckCert ( gnutls_session_t session )
{
2016-11-02 08:01:21 +00:00
gnutlsfile_t * file = qgnutls_session_get_ptr ( session ) ;
2013-11-21 23:02:28 +00:00
unsigned int certstatus ;
cvar_t * tls_ignorecertificateerrors ;
2017-04-09 05:43:08 +00:00
qboolean preverified = false ;
size_t i ;
for ( i = 0 ; i < countof ( knowncerts ) ; i + + )
{
if ( ! strcmp ( knowncerts [ i ] . hostname , file - > certname ) )
{
unsigned int certcount , j ;
const gnutls_datum_t * const certlist = qgnutls_certificate_get_peers ( session , & certcount ) ;
if ( certlist & & certcount )
{
size_t offset = 0 ;
for ( j = 0 ; j < certcount ; offset + = certlist [ j + + ] . size )
{
if ( certlist [ j ] . size + offset > knowncerts [ i ] . datasize )
break ; //overflow...
if ( memcmp ( certlist [ j ] . data , knowncerts [ i ] . data + offset , certlist [ j ] . size ) )
break ;
}
if ( j & & j = = certcount & & offset = = knowncerts [ i ] . datasize )
preverified = true ;
else
{
# ifdef _DEBUG
for ( j = 0 , offset = 0 ; j < certcount ; j + + )
offset + = certlist [ j ] . size ;
Con_Printf ( " %s cert %zu bytes (chain %u) \n " , file - > certname , offset , certcount ) ;
Con_Printf ( " \" " ) ;
for ( j = 0 ; j < certcount ; j + + )
{
unsigned char * data = certlist [ j ] . data ;
unsigned int datasize = certlist [ j ] . size , k ;
for ( k = 0 ; k < datasize ; k + + )
Con_Printf ( " \\ x%02x " , data [ k ] ) ;
}
Con_Printf ( " \" \n \n " ) ;
# endif
Con_Printf ( CON_ERROR " %s: Reported certificate does not match known certificate. Possible MITM attack, alternatively just an outdated client. \n " , file - > certname ) ;
return GNUTLS_E_CERTIFICATE_ERROR ;
}
}
break ;
}
}
2013-11-21 23:02:28 +00:00
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_VERIFY3
2016-11-02 08:01:21 +00:00
if ( qgnutls_certificate_verify_peers3 ( session , file - > certname , & certstatus ) > = 0 )
2013-11-21 23:02:28 +00:00
{
{
gnutls_datum_t out ;
gnutls_certificate_type_t type ;
2017-04-09 05:43:08 +00:00
2017-04-29 02:45:21 +00:00
if ( preverified & & ( certstatus & ~ GNUTLS_CERT_EXPIRED ) = = ( GNUTLS_CERT_INVALID | GNUTLS_CERT_SIGNER_NOT_FOUND ) )
2017-04-09 05:43:08 +00:00
return 0 ;
2013-11-21 23:02:28 +00:00
if ( certstatus = = 0 )
return 0 ;
2016-11-02 08:01:21 +00:00
type = qgnutls_certificate_type_get ( session ) ;
if ( qgnutls_certificate_verification_status_print ( certstatus , type , & out , 0 ) > = 0 )
2013-11-21 23:02:28 +00:00
{
2017-04-09 05:43:08 +00:00
Con_Printf ( " %s: %s (%x) \n " , file - > certname , out . data , certstatus ) ;
2016-11-15 22:22:04 +00:00
//looks like its static anyway. qgnutls_free(out.data);
2013-11-21 23:02:28 +00:00
# else
2016-11-02 08:01:21 +00:00
if ( qgnutls_certificate_verify_peers2 ( session , & certstatus ) > = 0 )
2013-11-21 23:02:28 +00:00
{
int certslen ;
//grab the certificate
2016-11-02 08:01:21 +00:00
const gnutls_datum_t * const certlist = qgnutls_certificate_get_peers ( session , & certslen ) ;
2013-11-21 23:02:28 +00:00
if ( certlist & & certslen )
{
//and make sure the hostname on it actually makes sense.
gnutls_x509_crt_t cert ;
2016-11-02 08:01:21 +00:00
qgnutls_x509_crt_init ( & cert ) ;
qgnutls_x509_crt_import ( cert , certlist , GNUTLS_X509_FMT_DER ) ;
if ( qgnutls_x509_crt_check_hostname ( cert , file - > certname ) )
2013-11-21 23:02:28 +00:00
{
2017-04-09 05:43:08 +00:00
if ( preverified & & certstatus = = ( GNUTLS_CERT_INVALID | GNUTLS_CERT_SIGNER_NOT_FOUND ) )
return 0 ;
2013-11-21 23:02:28 +00:00
if ( certstatus = = 0 )
return 0 ;
if ( certstatus & GNUTLS_CERT_SIGNER_NOT_FOUND )
Con_Printf ( " %s: Certificate authority is not recognised \n " , file - > certname ) ;
else if ( certstatus & GNUTLS_CERT_INSECURE_ALGORITHM )
Con_Printf ( " %s: Certificate uses insecure algorithm \n " , file - > certname ) ;
else if ( certstatus & ( GNUTLS_CERT_REVOCATION_DATA_ISSUED_IN_FUTURE | GNUTLS_CERT_REVOCATION_DATA_SUPERSEDED | GNUTLS_CERT_EXPIRED | GNUTLS_CERT_REVOKED | GNUTLS_CERT_NOT_ACTIVATED ) )
Con_Printf ( " %s: Certificate has expired or was revoked or not yet valid \n " , file - > certname ) ;
else if ( certstatus & GNUTLS_CERT_SIGNATURE_FAILURE )
Con_Printf ( " %s: Certificate signature failure \n " , file - > certname ) ;
else
Con_Printf ( " %s: Certificate error \n " , file - > certname ) ;
# endif
tls_ignorecertificateerrors = Cvar_Get ( " tls_ignorecertificateerrors " , " 0 " , CVAR_NOTFROMSERVER , " TLS " ) ;
if ( tls_ignorecertificateerrors & & tls_ignorecertificateerrors - > ival )
{
Con_Printf ( " %s: Ignoring certificate errors (tls_ignorecertificateerrors is %i) \n " , file - > certname , tls_ignorecertificateerrors - > ival ) ;
return 0 ;
}
}
2016-07-12 00:40:13 +00:00
else
Con_DPrintf ( " %s: certificate is for a different domain \n " , file - > certname ) ;
2013-11-21 23:02:28 +00:00
}
}
Con_DPrintf ( " %s: rejecting certificate \n " , file - > certname ) ;
return GNUTLS_E_CERTIFICATE_ERROR ;
}
//return 1 to read data.
//-1 or 0 for error or not ready
int SSL_DoHandshake ( gnutlsfile_t * file )
{
int err ;
//session was previously closed = error
if ( ! file - > session )
2017-05-18 10:24:09 +00:00
{
Sys_Printf ( " null session \n " ) ;
2013-11-21 23:02:28 +00:00
return - 1 ;
2017-05-18 10:24:09 +00:00
}
2013-11-21 23:02:28 +00:00
2016-11-02 08:01:21 +00:00
err = qgnutls_handshake ( file - > session ) ;
2013-11-21 23:02:28 +00:00
if ( err < 0 )
{ //non-fatal errors can just handshake again the next time the caller checks to see if there's any data yet
//(e_again or e_intr)
2016-11-02 08:01:21 +00:00
if ( ! qgnutls_error_is_fatal ( err ) )
2013-11-21 23:02:28 +00:00
return 0 ;
//certificate errors etc
2017-05-18 10:24:09 +00:00
qgnutls_perror ( err ) ;
2013-11-21 23:02:28 +00:00
SSL_Close ( & file - > funcs ) ;
// Con_Printf("%s: abort\n", file->certname);
return - 1 ;
}
file - > handshaking = false ;
return 1 ;
}
static int QDECL SSL_Read ( struct vfsfile_s * f , void * buffer , int bytestoread )
2013-06-24 09:04:00 +00:00
{
gnutlsfile_t * file = ( void * ) f ;
int read ;
if ( file - > handshaking )
{
2013-11-21 23:02:28 +00:00
read = SSL_DoHandshake ( file ) ;
if ( read < = 0 )
return read ;
2013-06-24 09:04:00 +00:00
}
2016-11-02 08:01:21 +00:00
read = qgnutls_record_recv ( file - > session , buffer , bytestoread ) ;
2013-06-24 09:04:00 +00:00
if ( read < 0 )
{
2016-11-02 08:01:21 +00:00
if ( read = = GNUTLS_E_PREMATURE_TERMINATION )
{
2017-04-10 07:52:18 +00:00
Con_Printf ( " TLS Premature Termination from %s \n " , file - > certname ) ;
2016-11-02 08:01:21 +00:00
return - 1 ;
}
else if ( read = = GNUTLS_E_REHANDSHAKE )
{
file - > handshaking = false ; //gnutls_safe_renegotiation_status();
//if false, 'recommended' to send an GNUTLS_A_NO_RENEGOTIATION alert, no idea how.
}
else if ( ! qgnutls_error_is_fatal ( read ) )
2017-04-10 07:52:18 +00:00
return 0 ; //caller is expected to try again later, no real need to loop here, just in case it repeats (eg E_AGAIN)
2013-06-24 09:04:00 +00:00
else
{
Con_Printf ( " TLS Read Error %i (bufsize %i) \n " , read , bytestoread ) ;
return - 1 ;
}
}
else if ( read = = 0 )
return - 1 ; //closed by remote connection.
return read ;
}
2013-11-21 23:02:28 +00:00
static int QDECL SSL_Write ( struct vfsfile_s * f , const void * buffer , int bytestowrite )
2013-06-24 09:04:00 +00:00
{
gnutlsfile_t * file = ( void * ) f ;
int written ;
if ( file - > handshaking )
{
2013-11-21 23:02:28 +00:00
written = SSL_DoHandshake ( file ) ;
if ( written < = 0 )
return written ;
2013-06-24 09:04:00 +00:00
}
2016-11-02 08:01:21 +00:00
written = qgnutls_record_send ( file - > session , buffer , bytestowrite ) ;
2013-06-24 09:04:00 +00:00
if ( written < 0 )
{
2016-11-02 08:01:21 +00:00
if ( ! qgnutls_error_is_fatal ( written ) )
2013-06-24 09:04:00 +00:00
return 0 ;
else
{
Con_Printf ( " TLS Send Error %i (%i bytes) \n " , written , bytestowrite ) ;
return - 1 ;
}
}
else if ( written = = 0 )
return - 1 ; //closed by remote connection.
return written ;
}
2014-03-30 00:39:37 +00:00
static qboolean QDECL SSL_Seek ( struct vfsfile_s * file , qofs_t pos )
2013-06-24 09:04:00 +00:00
{
return false ;
}
2014-03-30 00:39:37 +00:00
static qofs_t QDECL SSL_Tell ( struct vfsfile_s * file )
2013-06-24 09:04:00 +00:00
{
return 0 ;
}
2014-03-30 00:39:37 +00:00
static qofs_t QDECL SSL_GetLen ( struct vfsfile_s * file )
2013-06-24 09:04:00 +00:00
{
return 0 ;
}
# include <errno.h>
/*functions for gnutls to call when it wants to send data*/
static ssize_t SSL_Push ( gnutls_transport_ptr_t p , const void * data , size_t size )
{
gnutlsfile_t * file = p ;
2017-05-18 10:24:09 +00:00
// Sys_Printf("SSL_Push: %u\n", size);
2013-06-24 09:04:00 +00:00
int done = VFS_WRITE ( file - > stream , data , size ) ;
if ( ! done )
{
2016-11-02 08:01:21 +00:00
qgnutls_transport_set_errno ( file - > session , EAGAIN ) ;
2013-06-24 09:04:00 +00:00
return - 1 ;
}
2017-04-10 07:52:18 +00:00
qgnutls_transport_set_errno ( file - > session , done < 0 ? errno : 0 ) ;
2013-06-24 09:04:00 +00:00
if ( done < 0 )
return 0 ;
return done ;
}
static ssize_t SSL_Pull ( gnutls_transport_ptr_t p , void * data , size_t size )
{
2016-07-12 00:40:13 +00:00
gnutlsfile_t * file = p ;
2017-05-18 10:24:09 +00:00
// Sys_Printf("SSL_Pull: %u\n", size);
2016-07-12 00:40:13 +00:00
int done = VFS_READ ( file - > stream , data , size ) ;
if ( ! done )
{
2016-11-02 08:01:21 +00:00
qgnutls_transport_set_errno ( file - > session , EAGAIN ) ;
2016-07-12 00:40:13 +00:00
return - 1 ;
}
2017-04-10 07:52:18 +00:00
qgnutls_transport_set_errno ( file - > session , done < 0 ? errno : 0 ) ;
2013-06-24 09:04:00 +00:00
if ( done < 0 )
{
return 0 ;
}
2016-07-12 00:40:13 +00:00
return done ;
2013-06-24 09:04:00 +00:00
}
2017-05-18 10:24:09 +00:00
static ssize_t DTLS_Push ( gnutls_transport_ptr_t p , const void * data , size_t size )
2013-06-24 09:04:00 +00:00
{
2017-05-18 10:24:09 +00:00
gnutlsfile_t * file = p ;
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
neterr_t ne = file - > cbpush ( file - > cbctx , data , size ) ;
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
// Sys_Printf("DTLS_Push: %u, err=%i\n", (unsigned)size, (int)ne);
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
switch ( ne )
2016-11-02 08:01:21 +00:00
{
2017-05-18 10:24:09 +00:00
case NETERR_CLOGGED :
qgnutls_transport_set_errno ( file - > session , EAGAIN ) ;
return - 1 ;
case NETERR_MTU :
qgnutls_transport_set_errno ( file - > session , EMSGSIZE ) ;
return - 1 ;
case NETERR_DISCONNECTED :
qgnutls_transport_set_errno ( file - > session , EPERM ) ;
return - 1 ;
default :
qgnutls_transport_set_errno ( file - > session , 0 ) ;
return size ;
2016-11-02 08:01:21 +00:00
}
2017-05-18 10:24:09 +00:00
}
static ssize_t DTLS_Pull ( gnutls_transport_ptr_t p , void * data , size_t size )
{
gnutlsfile_t * file = p ;
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
// Sys_Printf("DTLS_Pull: %u of %u\n", size, file->readsize);
if ( ! file - > readsize )
{ //no data left
// Sys_Printf("DTLS_Pull: EAGAIN\n");
qgnutls_transport_set_errno ( file - > session , EAGAIN ) ;
return - 1 ;
}
else if ( file - > readsize > size )
{ //buffer passed is smaller than available data
// Sys_Printf("DTLS_Pull: EMSGSIZE\n");
memcpy ( data , file - > readdata , size ) ;
file - > readsize = 0 ;
qgnutls_transport_set_errno ( file - > session , EMSGSIZE ) ;
return - 1 ;
}
else
{ //buffer is big enough to read it all
size = file - > readsize ;
file - > readsize = 0 ;
// Sys_Printf("DTLS_Pull: reading %i\n", size);
memcpy ( data , file - > readdata , size ) ;
qgnutls_transport_set_errno ( file - > session , 0 ) ;
return size ;
}
}
2017-05-28 08:17:25 +00:00
# ifdef HAVE_DTLS
2017-05-18 10:24:09 +00:00
static int DTLS_Pull_Timeout ( gnutls_transport_ptr_t p , unsigned int timeout )
{ //gnutls (pointlessly) requires this function for dtls.
gnutlsfile_t * f = p ;
// Sys_Printf("DTLS_Pull_Timeout %i, %i\n", timeout, f->readsize);
return f - > readsize > 0 ? 1 : 0 ;
}
2017-05-28 08:17:25 +00:00
# endif
2017-05-18 10:24:09 +00:00
# ifdef USE_ANON
static gnutls_anon_client_credentials_t anoncred [ 2 ] ;
# else
static gnutls_certificate_credentials_t xcred [ 2 ] ;
2016-07-12 00:40:13 +00:00
# endif
2017-05-28 08:17:25 +00:00
# ifdef HAVE_DTLS
2017-05-18 10:24:09 +00:00
static gnutls_datum_t cookie_key ;
2017-05-28 08:17:25 +00:00
# endif
2016-07-12 00:40:13 +00:00
2017-05-18 10:24:09 +00:00
qboolean SSL_InitGlobal ( qboolean isserver )
{
static int initstatus [ 2 ] ;
2017-06-21 01:24:25 +00:00
isserver = ! ! isserver ;
2017-05-18 10:24:09 +00:00
if ( ! initstatus [ isserver ] )
2013-06-24 09:04:00 +00:00
{
2017-05-18 10:24:09 +00:00
if ( ! Init_GNUTLS ( ) )
2013-06-24 09:04:00 +00:00
{
2017-05-18 10:24:09 +00:00
Con_Printf ( " GnuTLS " GNUTLS_VERSION " library not available. \n " ) ;
return false ;
}
initstatus [ isserver ] = true ;
qgnutls_global_init ( ) ;
2017-05-28 08:17:25 +00:00
# ifdef HAVE_DTLS
2017-05-18 10:24:09 +00:00
if ( isserver )
qgnutls_key_generate ( & cookie_key , GNUTLS_COOKIE_KEY_SIZE ) ;
2017-05-28 08:17:25 +00:00
# endif
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
# ifdef USE_ANON
qgnutls_anon_allocate_client_credentials ( & anoncred [ isserver ] ) ;
# else
qgnutls_certificate_allocate_credentials ( & xcred [ isserver ] ) ;
2013-11-21 23:02:28 +00:00
2016-11-15 22:22:04 +00:00
# ifdef GNUTLS_HAVE_SYSTEMTRUST
2017-05-18 10:24:09 +00:00
qgnutls_certificate_set_x509_system_trust ( xcred [ isserver ] ) ;
2013-11-21 23:02:28 +00:00
# else
2017-05-18 10:24:09 +00:00
qgnutls_certificate_set_x509_trust_file ( xcred [ isserver ] , CAFILE , GNUTLS_X509_FMT_PEM ) ;
2014-03-30 00:39:37 +00:00
# endif
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
if ( isserver )
{
2017-05-23 07:48:45 +00:00
int ret = - 1 ;
char keyfile [ MAX_OSPATH ] ;
char certfile [ MAX_OSPATH ] ;
* keyfile = * certfile = 0 ;
2017-06-21 01:24:25 +00:00
if ( FS_NativePath ( " key.pem " , FS_ROOT , keyfile , sizeof ( keyfile ) ) )
if ( FS_NativePath ( " cert.pem " , FS_ROOT , certfile , sizeof ( certfile ) ) )
ret = qgnutls_certificate_set_x509_key_file ( xcred [ isserver ] , certfile , keyfile , GNUTLS_X509_FMT_PEM ) ;
2017-05-18 10:24:09 +00:00
if ( ret < 0 )
{
2017-06-21 01:24:25 +00:00
Con_Printf ( " No certificate or key was found in %s and %s \n " , certfile , keyfile ) ;
2017-05-18 10:24:09 +00:00
initstatus [ isserver ] = - 1 ;
}
2013-06-24 09:04:00 +00:00
}
2017-05-18 10:24:09 +00:00
else
qgnutls_certificate_set_verify_function ( xcred [ isserver ] , SSL_CheckCert ) ;
# endif
2013-06-24 09:04:00 +00:00
}
2017-05-18 10:24:09 +00:00
if ( initstatus [ isserver ] < 0 )
return false ;
return true ;
}
qboolean SSL_InitConnection ( gnutlsfile_t * newf , qboolean isserver , qboolean datagram )
{
// Initialize TLS session
qgnutls_init ( & newf - > session , GNUTLS_NONBLOCK | ( isserver ? GNUTLS_SERVER : GNUTLS_CLIENT ) | ( datagram ? GNUTLS_DATAGRAM : 0 ) ) ;
if ( ! isserver )
qgnutls_server_name_set ( newf - > session , GNUTLS_NAME_DNS , newf - > certname , strlen ( newf - > certname ) ) ;
qgnutls_session_set_ptr ( newf - > session , newf ) ;
# ifdef USE_ANON
//qgnutls_kx_set_priority (newf->session, kx_prio);
qgnutls_credentials_set ( newf - > session , GNUTLS_CRD_ANON , anoncred [ isserver ] ) ;
# else
//#if GNUTLS_VERSION_MAJOR >= 3
//gnutls_priority_set_direct();
//#else
//qgnutls_certificate_type_set_priority (newf->session, cert_type_priority);
//#endif
qgnutls_credentials_set ( newf - > session , GNUTLS_CRD_CERTIFICATE , xcred [ isserver ] ) ;
# endif
// Use default priorities
qgnutls_set_default_priority ( newf - > session ) ;
// tell gnutls how to send/receive data
qgnutls_transport_set_ptr ( newf - > session , newf ) ;
qgnutls_transport_set_push_function ( newf - > session , datagram ? DTLS_Push : SSL_Push ) ;
//qgnutls_transport_set_vec_push_function(newf->session, SSL_PushV);
qgnutls_transport_set_pull_function ( newf - > session , datagram ? DTLS_Pull : SSL_Pull ) ;
2017-05-28 08:17:25 +00:00
# ifdef HAVE_DTLS
2017-05-18 10:24:09 +00:00
if ( datagram )
qgnutls_transport_set_pull_timeout_function ( newf - > session , DTLS_Pull_Timeout ) ;
2017-05-28 08:17:25 +00:00
# endif
2017-05-18 10:24:09 +00:00
// if (isserver) //don't bother to auth any client certs
// qgnutls_certificate_server_set_request(newf->session, GNUTLS_CERT_IGNORE);
newf - > handshaking = true ;
return true ;
}
vfsfile_t * FS_OpenSSL ( const char * hostname , vfsfile_t * source , qboolean isserver )
{
gnutlsfile_t * newf ;
if ( ! source )
return NULL ;
if ( ! SSL_InitGlobal ( isserver ) )
newf = NULL ;
else
newf = Z_Malloc ( sizeof ( * newf ) ) ;
2013-06-24 09:04:00 +00:00
if ( ! newf )
{
VFS_CLOSE ( source ) ;
return NULL ;
}
newf - > stream = source ;
newf - > funcs . Close = SSL_Close ;
newf - > funcs . Flush = NULL ;
newf - > funcs . GetLen = SSL_GetLen ;
newf - > funcs . ReadBytes = SSL_Read ;
newf - > funcs . WriteBytes = SSL_Write ;
newf - > funcs . Seek = SSL_Seek ;
newf - > funcs . Tell = SSL_Tell ;
2017-05-10 02:57:34 +00:00
newf - > funcs . seekstyle = SS_UNSEEKABLE ;
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
if ( hostname )
Q_strncpyz ( newf - > certname , hostname , sizeof ( newf - > certname ) ) ;
else
Q_strncpyz ( newf - > certname , " " , sizeof ( newf - > certname ) ) ;
2013-11-21 23:02:28 +00:00
2017-05-18 10:24:09 +00:00
if ( ! SSL_InitConnection ( newf , isserver , false ) )
{
VFS_CLOSE ( & newf - > funcs ) ;
return NULL ;
}
2016-07-12 00:40:13 +00:00
2017-05-18 10:24:09 +00:00
return & newf - > funcs ;
}
2013-06-24 09:04:00 +00:00
2013-11-21 23:02:28 +00:00
2017-05-18 10:24:09 +00:00
# ifdef HAVE_DTLS
2017-06-21 01:24:25 +00:00
void GNUDTLS_DestroyContext ( void * ctx )
2017-05-18 10:24:09 +00:00
{
SSL_Close ( ctx ) ;
}
2017-06-21 01:24:25 +00:00
void * GNUDTLS_CreateContext ( const char * remotehost , void * cbctx , neterr_t ( * push ) ( void * cbctx , const qbyte * data , size_t datasize ) , qboolean isserver )
2017-05-18 10:24:09 +00:00
{
gnutlsfile_t * newf ;
if ( ! SSL_InitGlobal ( isserver ) )
newf = NULL ;
else
newf = Z_Malloc ( sizeof ( * newf ) ) ;
if ( ! newf )
return NULL ;
newf - > datagram = true ;
newf - > cbctx = cbctx ;
newf - > cbpush = push ;
newf - > challenging = isserver ;
// Sys_Printf("DTLS_CreateContext: server=%i\n", isserver);
2017-06-21 01:24:25 +00:00
Q_strncpyz ( newf - > certname , remotehost ? remotehost : " " , sizeof ( newf - > certname ) ) ;
2017-05-18 10:24:09 +00:00
if ( ! SSL_InitConnection ( newf , isserver , true ) )
2013-06-24 09:04:00 +00:00
{
2017-05-18 10:24:09 +00:00
SSL_Close ( & newf - > funcs ) ;
return NULL ;
2013-06-24 09:04:00 +00:00
}
2017-05-18 10:24:09 +00:00
return newf ;
}
2017-06-21 01:24:25 +00:00
neterr_t GNUDTLS_Transmit ( void * ctx , const qbyte * data , size_t datasize )
2017-05-18 10:24:09 +00:00
{
int ret ;
gnutlsfile_t * f = ( gnutlsfile_t * ) ctx ;
// Sys_Printf("DTLS_Transmit: %u\n", datasize);
// Sys_Printf("%su\n", data);
if ( f - > challenging )
return NETERR_CLOGGED ;
if ( f - > handshaking )
2013-06-24 09:04:00 +00:00
{
2017-05-18 10:24:09 +00:00
ret = SSL_DoHandshake ( f ) ;
if ( ! ret )
return NETERR_CLOGGED ;
if ( ret < 0 )
return NETERR_DISCONNECTED ;
2013-06-24 09:04:00 +00:00
}
2017-05-18 10:24:09 +00:00
ret = qgnutls_record_send ( f - > session , data , datasize ) ;
if ( ret < 0 )
{
if ( ret = = GNUTLS_E_LARGE_PACKET )
return NETERR_MTU ;
//Sys_Error("qgnutls_record_send returned %i\n", ret);
2013-06-24 09:04:00 +00:00
2017-05-18 10:24:09 +00:00
if ( qgnutls_error_is_fatal ( ret ) )
return NETERR_DISCONNECTED ;
return NETERR_CLOGGED ;
}
return NETERR_SENT ;
}
2013-06-24 09:04:00 +00:00
2017-06-21 01:24:25 +00:00
neterr_t GNUDTLS_Received ( void * ctx , qbyte * data , size_t datasize )
2017-05-18 10:24:09 +00:00
{
int cli_addr = 0xdeadbeef ;
int ret ;
gnutlsfile_t * f = ( gnutlsfile_t * ) ctx ;
//Sys_Printf("DTLS_Received: %u\n", datasize);
if ( f - > challenging )
{
memset ( & f - > prestate , 0 , sizeof ( f - > prestate ) ) ;
ret = qgnutls_dtls_cookie_verify ( & cookie_key ,
& cli_addr , sizeof ( cli_addr ) ,
data , datasize ,
& f - > prestate ) ;
if ( ret < 0 )
{
//Sys_Printf("Sending cookie\n");
qgnutls_dtls_cookie_send ( & cookie_key ,
& cli_addr , sizeof ( cli_addr ) ,
& f - > prestate ,
( gnutls_transport_ptr_t ) f , DTLS_Push ) ;
return NETERR_CLOGGED ;
}
//Sys_Printf("Got correct cookie\n");
f - > challenging = false ;
qgnutls_dtls_prestate_set ( f - > session , & f - > prestate ) ;
qgnutls_dtls_set_mtu ( f - > session , 1440 ) ;
// qgnutls_transport_set_push_function(f->session, DTLS_Push);
// qgnutls_transport_set_pull_function(f->session, DTLS_Pull);
f - > handshaking = true ;
}
f - > readdata = data ;
f - > readsize = datasize ;
if ( f - > handshaking )
{
ret = SSL_DoHandshake ( f ) ;
if ( ret < = 0 )
f - > readsize = 0 ;
if ( ! ret )
return NETERR_CLOGGED ;
if ( ret < 0 )
return NETERR_DISCONNECTED ;
}
ret = qgnutls_record_recv ( f - > session , net_message_buffer , sizeof ( net_message_buffer ) ) ;
//Sys_Printf("DTLS_Received returned %i of %i\n", ret, f->readsize);
f - > readsize = 0 ;
if ( ret < = 0 )
{
if ( ! ret )
{
// Sys_Printf("DTLS_Received peer terminated connection\n");
return NETERR_DISCONNECTED ;
}
if ( qgnutls_error_is_fatal ( ret ) )
{
// Sys_Printf("DTLS_Received fail error\n");
return NETERR_DISCONNECTED ;
}
// Sys_Printf("DTLS_Received temp error\n");
return NETERR_CLOGGED ;
}
net_message . cursize = ret ;
data [ ret ] = 0 ;
// Sys_Printf("DTLS_Received returned %s\n", data);
return NETERR_SENT ;
2013-06-24 09:04:00 +00:00
}
2016-11-02 08:01:21 +00:00
2017-06-21 01:24:25 +00:00
neterr_t GNUDTLS_Timeouts ( void * ctx )
2016-11-02 08:01:21 +00:00
{
2017-05-18 10:24:09 +00:00
gnutlsfile_t * f = ( gnutlsfile_t * ) ctx ;
int ret ;
if ( f - > challenging )
return NETERR_CLOGGED ;
if ( f - > handshaking )
{
f - > readsize = 0 ;
ret = SSL_DoHandshake ( f ) ;
f - > readsize = 0 ;
if ( ! ret )
return NETERR_CLOGGED ;
if ( ret < 0 )
return NETERR_DISCONNECTED ;
// Sys_Printf("handshaking over?\n");
}
return NETERR_SENT ;
2016-11-02 08:01:21 +00:00
}
2017-06-21 01:24:25 +00:00
static const dtlsfuncs_t dtlsfuncs_gnutls =
{
GNUDTLS_CreateContext ,
GNUDTLS_DestroyContext ,
GNUDTLS_Transmit ,
GNUDTLS_Received ,
GNUDTLS_Timeouts ,
} ;
const dtlsfuncs_t * DTLS_InitServer ( void )
{
if ( ! SSL_InitGlobal ( true ) )
return NULL ; //unable to init a server certificate. don't allow dtls to init.
return & dtlsfuncs_gnutls ;
}
const dtlsfuncs_t * DTLS_InitClient ( void )
{
return & dtlsfuncs_gnutls ;
}
2017-05-18 10:24:09 +00:00
# endif
2013-06-24 09:04:00 +00:00
# endif