2017-09-20 11:27:13 +00:00
# include "quakedef.h"
# if defined(HAVE_WINSSPI)
/*regarding HAVE_DTLS
2023-02-20 08:35:56 +00:00
DTLS1 .0 is supported from win8 onwards , or patched - win7
DTLS1 .2 is supported from win10 - 1607 onwards .
unlike the other tls providers we use pfx files ( to work around microsoft making it so fucking hard to actually import / export the damn private key any other way )
pfx files are encrypted with your username as a password
convert from pem to pfx :
openssl pkcs12 - inkey private . pem - in fullchain . pem - export - nodes - out identity . pfx - passout pass : $ USER
( in the above formula , swap out $ USER for % USERNAME % if you ' re using a windows cmd prompt )
you can start fte with an arg like the following for a fully CA - signed cert :
fteqwsv - pfx c : / foo / bar . pfx
( otherwise it ' ll use identity . pfx from your basedir , autogenerated with some dodgy info )
TODO : RTC connections do not validate the client peer .
TODO : get someone else to figure out the PSK stuff . no way can I test / debug / write that without documentation nor working drivers .
Note : testing this stuff is a pain when eg browsers do NOT support DTLS1 .0 any more .
2017-09-20 11:27:13 +00:00
*/
# include "winquake.h"
Too many changes, sorry.
Change revision displays, use the SVN commit date instead of using __DATE__ (when there's no local changes). This should allow reproducible builds.
Added s_al_disable cvar, to block openal and all the various problems people have had with it, without having to name an explicit fallback (which would vary by system).
Add mastervolume cvar (for ss).
Add r_shadows 2 (aka fake shadows - for ss).
Add scr_loadingscreen_aspect -1 setting, to disable levelshots entirely, also disables the progress bar (for ss).
Better support for some effectinfo hacks (for ss).
Added dpcompat_nocsqcwarnings (because of lazy+buggy mods like ss).
Rework the dpcsqc versions of project+unproject builtins for better compat (for ss).
Added dpcompat_csqcinputeventtypes to block unexpected csqc input events (for ss).
Better compat with DP's loadfont console command (for ss).
Added dpcompat_smallerfonts cvar to replicate a DP bug (for ss).
Detect dp's m_draw extension, to work around it (for ss).
Cvar dpcompat_ignoremodificationtimes added. A value of 0 favour the most recently modified file, 1 will use DP-like alphabetically sorted preferences (for ss).
loadfont builtin can now accept outline=1 in the sizes arg for slightly more readable fonts.
Fix bbox calcs for rotated entities, fix needed for r_ignorenetpvs 0.
Hackily parse emoji.json to provide :poop: etc suggestions.
Skip prediction entirely when there's no local entity info. This fixes stair-smoothing in xonotic.
screenshot_cubemap will now capture half-float images when saving to ktx or dds files.
Fix support for xcf files larger than 4gb, mostly to avoid compiler warnings.
Fixed size of gfx/loading.lmp when replacement textures are used.
Added mipmap support for rg8 and l8a8 textures.
r_hdr_framebuffer cvar updated to support format names instead of random negative numbers. Description updated to name some interesting ones.
Perform autoupdate _checks_ ONLY with explicit user confirmation (actual updating already needed user confirmation, but this extra step should reduce the chances of us getting wrongly accused of exfiltrating user data if we're run in a sandbox - we ONLY ever included the updating engine's version in the checks, though there's nothing we can do to avoid sending the user's router's IP).
Removed the 'summon satan all over your harddrive' quit message, in case paranoid security researchers are idiots and don't bother doing actual research.
Removed the triptohell.info and fte.triptohell.info certificates, they really need to stop being self-signed. The updates domain is still self-signed for autoupdates.
Video drivers are now able to report supported video resolutions, visible to menuqc. Currently only works with SDL2 builds.
Added setmousepos builtin. Should work with glx+win32 build.
VF_SKYROOM_CAMERA can now accept an extra two args, setviewprop(VF_SKYROOM_CAMERA, org, axis, degrees).
Removed v_skyroom_origin+v_skyroom_orientation cvars in favour just v_skyroom, which should make it behave more like the 'fog' command (used when csqc isn't overriding).
Added R_EndPolygonRibbon builtin to make it faster+easier to generate textured ribbon/cable/etc wide lines (for TW).
sdl: Fix up sys_sdl.c's file enumeration to support wildcards in directories.
edit command now displays end1.bin/end2.bin correctly, because we can.
Finally add support for f_modified - though ruleset_allow_larger_models and ruleset_allow_overlong_sounds generally make it redundant.
Fix threading race condition in sha1 lookups.
Updated f_ruleset to include the same extra flags reported by ezquake.
A mod's default.fmf file can now contain an eg 'mainconfig config.cfg' line (to explicitly set the main config saved with cfg_save_auto 1 etc).
fmf: basegame steam:GameName/GameDir can be used to try to load a mod directory from an installed steam game. The resulting gamedir will be read-only.
HOMEDIR CHANGE: use homedirs only if the basedir cannot be written or a homedir already exists, which should further reduce the probability of microsoft randomly uploading our data to their cloud (but mostly because its annoying to never know where your data is written).
Fixed buf_cvarlist, should work in xonotic now, and without segfaults.
Added an extra arg to URI_Get_Callback calls - the response size, also changed the tempstring to contain all bytes of the response, you need to be careful about nulls though.
Try to work around nvidia's forced-panning bug on x11 when changing video modes. This might screw with other programs.
sdl: support custom icons.
sdl: support choosing a specific display.
Added some documentation to menuqc builtins.
menusys: use outlines for slightly more readable fonts.
menusys: switch vid_width and vid_height combos into a single video mode combo to set both according to reported video modes.
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5581 fc73d0e0-1445-4013-8a0c-d673dee63da5
2019-11-20 03:09:50 +00:00
# include "netinc.h"
2017-09-20 11:27:13 +00:00
# define SECURITY_WIN32
# include <security.h>
# include <sspi.h>
2023-02-20 08:35:56 +00:00
# include <wincrypt.h>
2017-09-20 11:27:13 +00:00
# include <schannel.h>
# define SP_PROT_TLS1_1_SERVER 0x00000100
# define SP_PROT_TLS1_1_CLIENT 0x00000200
# define SP_PROT_TLS1_2_SERVER 0x00000400
# define SP_PROT_TLS1_2_CLIENT 0x00000800
# define SP_PROT_DTLS_SERVER 0x00010000
# define SP_PROT_DTLS_CLIENT 0x00020000
2023-02-20 08:35:56 +00:00
# define SP_PROT_DTLS1_0_SERVER SP_PROT_DTLS_SERVER
# define SP_PROT_DTLS1_0_CLIENT SP_PROT_DTLS_CLIENT
# define SP_PROT_DTLS1_2_SERVER 0x00040000
# define SP_PROT_DTLS1_2_CLIENT 0x00080000
# define SP_PROT_DTLS1_X_SERVER (SP_PROT_DTLS1_0_SERVER | SP_PROT_DTLS1_2_SERVER)
# define SP_PROT_DTLS1_X_CLIENT (SP_PROT_DTLS1_0_CLIENT | SP_PROT_DTLS1_2_CLIENT)
2017-09-20 11:27:13 +00:00
//avoid the use of outdated/insecure protocols
//so no ssl2/ssl3
# define USE_PROT_SERVER (SP_PROT_TLS1_SERVER | SP_PROT_TLS1_1_SERVER | SP_PROT_TLS1_2_SERVER)
# define USE_PROT_CLIENT (SP_PROT_TLS1_CLIENT | SP_PROT_TLS1_1_CLIENT | SP_PROT_TLS1_2_CLIENT)
2023-02-20 08:35:56 +00:00
# define USE_PROT_DGRAM_SERVER (SP_PROT_DTLS1_X_SERVER)
# define USE_PROT_DGRAM_CLIENT (SP_PROT_DTLS1_X_CLIENT)
2017-09-20 11:27:13 +00:00
# ifndef szOID_RSA_SHA512RSA
# define szOID_RSA_SHA512RSA "1.2.840.113549.1.1.13"
# endif
# ifndef SCH_CRED_SNI_CREDENTIAL
# define SCH_CRED_SNI_CREDENTIAL 0x00080000
# endif
2019-02-16 19:09:07 +00:00
# ifndef SEC_I_MESSAGE_FRAGMENT
2017-09-20 11:27:13 +00:00
# define SEC_I_MESSAGE_FRAGMENT 0x00090364L
2019-02-16 19:09:07 +00:00
# endif
# ifndef SEC_E_INVALID_PARAMETER
2017-09-20 11:27:13 +00:00
# define SEC_E_INVALID_PARAMETER 0x8009035DL
2019-02-16 19:09:07 +00:00
# endif
2017-09-20 11:27:13 +00:00
2023-02-20 08:35:56 +00:00
# ifndef SECBUFFER_ALERT
# define SECBUFFER_ALERT 17
# endif
# ifndef SECPKG_ATTR_DTLS_MTU
# define SECPKG_ATTR_DTLS_MTU 34
# endif
2017-09-20 11:27:13 +00:00
//hungarian ensures we hit no macros.
static struct
{
dllhandle_t * lib ;
SECURITY_STATUS ( WINAPI * pDecryptMessage ) ( PCtxtHandle , PSecBufferDesc , ULONG , PULONG ) ;
SECURITY_STATUS ( WINAPI * pEncryptMessage ) ( PCtxtHandle , ULONG , PSecBufferDesc , ULONG ) ;
SECURITY_STATUS ( WINAPI * pAcquireCredentialsHandleA ) ( SEC_CHAR * , SEC_CHAR * , ULONG , PLUID , PVOID , SEC_GET_KEY_FN , PVOID , PCredHandle , PTimeStamp ) ;
// SECURITY_STATUS (WINAPI *pInitializeSecurityContextA) (PCredHandle,PCtxtHandle,SEC_CHAR*,ULONG,ULONG,ULONG,PSecBufferDesc,ULONG,PCtxtHandle,PSecBufferDesc,PULONG,PTimeStamp);
SECURITY_STATUS ( WINAPI * pInitializeSecurityContextW ) ( PCredHandle , PCtxtHandle , SEC_WCHAR * , ULONG , ULONG , ULONG , PSecBufferDesc , ULONG , PCtxtHandle , PSecBufferDesc , PULONG , PTimeStamp ) ;
SECURITY_STATUS ( WINAPI * pAcceptSecurityContext ) ( PCredHandle , PCtxtHandle , PSecBufferDesc , unsigned long , unsigned long , PCtxtHandle , PSecBufferDesc , unsigned long SEC_FAR * , PTimeStamp ) ;
SECURITY_STATUS ( WINAPI * pCompleteAuthToken ) ( PCtxtHandle , PSecBufferDesc ) ;
2023-02-20 08:35:56 +00:00
SECURITY_STATUS ( WINAPI * pSetContextAttributesA ) ( PCtxtHandle , unsigned long , void * , unsigned long ) ;
2017-09-20 11:27:13 +00:00
SECURITY_STATUS ( WINAPI * pQueryContextAttributesA ) ( PCtxtHandle , ULONG , PVOID ) ;
SECURITY_STATUS ( WINAPI * pFreeCredentialsHandle ) ( PCredHandle ) ;
SECURITY_STATUS ( WINAPI * pDeleteSecurityContext ) ( PCtxtHandle ) ;
} secur ;
static struct
{
dllhandle_t * lib ;
BOOL ( WINAPI * pCertGetCertificateChain ) ( HCERTCHAINENGINE , PCCERT_CONTEXT , LPFILETIME , HCERTSTORE , PCERT_CHAIN_PARA , DWORD , LPVOID , PCCERT_CHAIN_CONTEXT * ) ;
BOOL ( WINAPI * pCertVerifyCertificateChainPolicy ) ( LPCSTR , PCCERT_CHAIN_CONTEXT , PCERT_CHAIN_POLICY_PARA , PCERT_CHAIN_POLICY_STATUS ) ;
void ( WINAPI * pCertFreeCertificateChain ) ( PCCERT_CHAIN_CONTEXT ) ;
2023-02-20 08:35:56 +00:00
PCCERT_CONTEXT ( WINAPI * pCertCreateCertificateContext ) ( DWORD dwCertEncodingType , const BYTE * pbCertEncoded , DWORD cbCertEncoded ) ;
2017-09-20 11:27:13 +00:00
DWORD ( WINAPI * pCertNameToStrA ) ( DWORD dwCertEncodingType , PCERT_NAME_BLOB pName , DWORD dwStrType , LPCSTR psz , DWORD csz ) ;
2023-02-20 08:35:56 +00:00
BOOL ( WINAPI * pCertFreeCertificateContext ) ( PCCERT_CONTEXT pCertContext ) ;
2017-09-20 11:27:13 +00:00
PCCERT_CONTEXT ( WINAPI * pCertCreateSelfSignCertificate ) ( HCRYPTPROV , PCERT_NAME_BLOB , DWORD , PCRYPT_KEY_PROV_INFO , PCRYPT_ALGORITHM_IDENTIFIER , PSYSTEMTIME , PSYSTEMTIME , PCERT_EXTENSIONS ) ;
BOOL ( WINAPI * pCertStrToNameA ) ( DWORD , LPCSTR , DWORD , void * , BYTE * , DWORD * , LPCSTR * ) ;
2023-02-20 08:35:56 +00:00
HCERTSTORE ( WINAPI * pCertOpenStore ) ( LPCSTR lpszStoreProvider , DWORD dwEncodingType , HCRYPTPROV hCryptProv , DWORD dwFlags , const void * pvPara ) ;
BOOL ( WINAPI * pCertAddCertificateContextToStore ) ( HCERTSTORE hCertStore , PCCERT_CONTEXT pCertContext , DWORD dwAddDisposition , PCCERT_CONTEXT * ppStoreContext ) ;
BOOL ( WINAPI * pPFXExportCertStoreEx ) ( HCERTSTORE hStore , CRYPT_DATA_BLOB * pPFX , LPCWSTR szPassword , void * pvPara , DWORD dwFlags ) ;
BOOL ( WINAPI * pCertCloseStore ) ( HCERTSTORE hCertStore , DWORD dwFlags ) ;
HCERTSTORE ( WINAPI * pPFXImportCertStore ) ( CRYPT_DATA_BLOB * pPFX , LPCWSTR szPassword , DWORD dwFlags ) ;
PCCERT_CONTEXT ( WINAPI * pCertFindCertificateInStore ) ( HCERTSTORE hCertStore , DWORD dwCertEncodingType , DWORD dwFindFlags , DWORD dwFindType , const void * pvFindPara , PCCERT_CONTEXT pPrevCertContext ) ;
BOOL ( WINAPI * pCryptAcquireCertificatePrivateKey ) ( PCCERT_CONTEXT pCert , DWORD dwFlags , void * pvParameters , HCRYPTPROV * phCryptProvOrNCryptKey , DWORD * pdwKeySpec , BOOL * pfCallerFreeProvOrNCryptKey ) ;
BOOL ( WINAPI * pCertSetCertificateContextProperty ) ( PCCERT_CONTEXT pCertContext , DWORD dwPropId , DWORD dwFlags , const void * pvData ) ;
2017-09-20 11:27:13 +00:00
} crypt ;
2023-02-20 08:35:56 +00:00
static struct
{
dllhandle_t * lib ;
BOOL ( WINAPI * pCryptAcquireContextW ) ( HCRYPTPROV * phProv , LPCWSTR szContainer , LPCWSTR szProvider , DWORD dwProvType , DWORD dwFlags ) ;
BOOL ( WINAPI * pCryptGenKey ) ( HCRYPTPROV hProv , ALG_ID Algid , DWORD dwFlags , HCRYPTKEY * phKey ) ;
} advapi ;
2017-09-20 11:27:13 +00:00
void SSL_Init ( void )
{
dllfunction_t secur_functable [ ] =
{
{ ( void * * ) & secur . pDecryptMessage , " DecryptMessage " } ,
{ ( void * * ) & secur . pEncryptMessage , " EncryptMessage " } ,
{ ( void * * ) & secur . pAcquireCredentialsHandleA , " AcquireCredentialsHandleA " } ,
// {(void**)&secur.pInitializeSecurityContextA, "InitializeSecurityContextA"},
{ ( void * * ) & secur . pInitializeSecurityContextW , " InitializeSecurityContextW " } ,
{ ( void * * ) & secur . pAcceptSecurityContext , " AcceptSecurityContext " } ,
{ ( void * * ) & secur . pCompleteAuthToken , " CompleteAuthToken " } ,
2023-02-20 08:35:56 +00:00
{ ( void * * ) & secur . pSetContextAttributesA , " SetContextAttributesA " } ,
2017-09-20 11:27:13 +00:00
{ ( void * * ) & secur . pQueryContextAttributesA , " QueryContextAttributesA " } ,
{ ( void * * ) & secur . pFreeCredentialsHandle , " FreeCredentialsHandle " } ,
{ ( void * * ) & secur . pDeleteSecurityContext , " DeleteSecurityContext " } ,
{ NULL , NULL }
} ;
dllfunction_t crypt_functable [ ] =
{
{ ( void * * ) & crypt . pCertGetCertificateChain , " CertGetCertificateChain " } ,
{ ( void * * ) & crypt . pCertVerifyCertificateChainPolicy , " CertVerifyCertificateChainPolicy " } ,
{ ( void * * ) & crypt . pCertFreeCertificateChain , " CertFreeCertificateChain " } ,
2023-02-20 08:35:56 +00:00
{ ( void * * ) & crypt . pCertCreateCertificateContext , " CertCreateCertificateContext " } ,
2017-09-20 11:27:13 +00:00
{ ( void * * ) & crypt . pCertNameToStrA , " CertNameToStrA " } ,
2023-02-20 08:35:56 +00:00
{ ( void * * ) & crypt . pCertFreeCertificateContext , " CertFreeCertificateContext " } ,
2017-09-20 11:27:13 +00:00
{ ( void * * ) & crypt . pCertCreateSelfSignCertificate , " CertCreateSelfSignCertificate " } ,
{ ( void * * ) & crypt . pCertStrToNameA , " CertStrToNameA " } ,
2023-02-20 08:35:56 +00:00
{ ( void * * ) & crypt . pCertOpenStore , " CertOpenStore " } ,
{ ( void * * ) & crypt . pCertAddCertificateContextToStore , " CertAddCertificateContextToStore " } ,
{ ( void * * ) & crypt . pPFXExportCertStoreEx , " PFXExportCertStoreEx " } ,
{ ( void * * ) & crypt . pCertCloseStore , " CertCloseStore " } ,
{ ( void * * ) & crypt . pPFXImportCertStore , " PFXImportCertStore " } ,
{ ( void * * ) & crypt . pCertFindCertificateInStore , " CertFindCertificateInStore " } ,
{ ( void * * ) & crypt . pCryptAcquireCertificatePrivateKey , " CryptAcquireCertificatePrivateKey " } ,
{ ( void * * ) & crypt . pCertSetCertificateContextProperty , " CertSetCertificateContextProperty " } ,
{ NULL , NULL }
} ;
dllfunction_t advapi_functable [ ] =
{
{ ( void * * ) & advapi . pCryptAcquireContextW , " CryptAcquireContextW " } ,
{ ( void * * ) & advapi . pCryptGenKey , " CryptGenKey " } ,
2017-09-20 11:27:13 +00:00
{ NULL , NULL }
} ;
if ( ! secur . lib )
secur . lib = Sys_LoadLibrary ( " secur32.dll " , secur_functable ) ;
if ( ! crypt . lib )
crypt . lib = Sys_LoadLibrary ( " crypt32.dll " , crypt_functable ) ;
2023-02-20 08:35:56 +00:00
if ( ! advapi . lib )
advapi . lib = Sys_LoadLibrary ( " advapi32.dll " , advapi_functable ) ;
2017-09-20 11:27:13 +00:00
}
qboolean SSL_Inited ( void )
{
2023-02-20 08:35:56 +00:00
return ! ! secur . lib & & ! ! crypt . lib & & ! ! advapi . lib ;
2017-09-20 11:27:13 +00:00
}
2023-02-20 08:35:56 +00:00
# define MessageAttribute (ISC_REQ_SEQUENCE_DETECT | ISC_REQ_REPLAY_DETECT | ISC_REQ_CONFIDENTIALITY | /*ISC_REQ_EXTENDED_ERROR |*/ ISC_REQ_ALLOCATE_MEMORY | ISC_REQ_MANUAL_CRED_VALIDATION | ISC_REQ_USE_SUPPLIED_CREDS)
2017-09-20 11:27:13 +00:00
struct sslbuf
{
size_t datasize ;
char * data ;
size_t avail ;
} ;
typedef struct {
vfsfile_t funcs ;
vfsfile_t * stream ;
wchar_t wpeername [ 256 ] ;
qboolean datagram ;
enum
{
HS_ESTABLISHED ,
HS_ERROR ,
HS_STARTCLIENT ,
HS_CLIENT ,
HS_STARTSERVER ,
HS_SERVER
} handshaking ;
struct sslbuf outraw ;
struct sslbuf outcrypt ;
struct sslbuf inraw ;
struct sslbuf incrypt ;
CredHandle cred ;
SecHandle sechnd ;
2023-02-20 08:35:56 +00:00
int headersize , mtu , footersize ; //schannel is strict about its mtus.
2017-09-20 11:27:13 +00:00
char headerdata [ 1024 ] , footerdata [ 1024 ] ;
2023-02-20 08:35:56 +00:00
double resendtimer ; //for the client so it can keep retrying the handshake.
2017-09-20 11:27:13 +00:00
# ifdef HAVE_DTLS
void * cbctx ;
neterr_t ( * transmit ) ( void * cbctx , const qbyte * data , size_t datasize ) ;
# endif
} sslfile_t ;
static int SSPI_ExpandBuffer ( struct sslbuf * buf , size_t bytes )
{
if ( bytes < buf - > datasize )
return buf - > datasize ;
Z_ReallocElements ( ( void * * ) & buf - > data , & buf - > datasize , bytes , 1 ) ;
return bytes ;
}
static int SSPI_CopyIntoBuffer ( struct sslbuf * buf , const void * data , unsigned int bytes , qboolean expand )
{
if ( bytes > buf - > datasize - buf - > avail )
{
if ( ! expand | | SSPI_ExpandBuffer ( buf , buf - > avail + bytes + 1024 ) < buf - > avail + bytes )
bytes = buf - > datasize - buf - > avail ;
}
memcpy ( buf - > data + buf - > avail , data , bytes ) ;
buf - > avail + = bytes ;
return bytes ;
}
2020-08-13 10:09:39 +00:00
static void SSPI_Error ( sslfile_t * f , const char * error , . . . )
2017-09-20 11:27:13 +00:00
{
va_list argptr ;
char string [ 1024 ] ;
va_start ( argptr , error ) ;
vsnprintf ( string , sizeof ( string ) - 1 , error , argptr ) ;
va_end ( argptr ) ;
f - > handshaking = HS_ERROR ;
if ( * string )
2020-08-13 10:09:39 +00:00
{
if ( f - > datagram )
Con_Printf ( CON_ERROR " %s " , string ) ;
else
Sys_Printf ( CON_ERROR " %s " , string ) ;
}
2017-09-20 11:27:13 +00:00
if ( f - > stream )
VFS_CLOSE ( f - > stream ) ;
secur . pDeleteSecurityContext ( & f - > sechnd ) ;
secur . pFreeCredentialsHandle ( & f - > cred ) ;
f - > stream = NULL ;
}
2023-02-20 08:35:56 +00:00
static neterr_t SSPI_TryFlushCryptOut ( sslfile_t * f )
2017-09-20 11:27:13 +00:00
{
int sent ;
if ( f - > outcrypt . avail )
{
# ifdef HAVE_DTLS
if ( f - > transmit )
{
2023-02-20 08:35:56 +00:00
neterr_t e = f - > transmit ( f - > cbctx , f - > outcrypt . data , f - > outcrypt . avail ) ;
2017-09-20 11:27:13 +00:00
f - > outcrypt . avail = 0 ;
2023-02-20 08:35:56 +00:00
return e ;
2017-09-20 11:27:13 +00:00
}
# endif
sent = VFS_WRITE ( f - > stream , f - > outcrypt . data , f - > outcrypt . avail ) ;
}
else
2023-02-20 08:35:56 +00:00
return NETERR_SENT ;
2017-09-20 11:27:13 +00:00
2023-02-20 08:35:56 +00:00
if ( f - > datagram )
f - > outcrypt . avail = 0 ; //anything unsent is a dropped packet...
else if ( sent > 0 )
2017-09-20 11:27:13 +00:00
{
memmove ( f - > outcrypt . data , f - > outcrypt . data + sent , f - > outcrypt . avail - sent ) ;
f - > outcrypt . avail - = sent ;
}
2023-02-20 08:35:56 +00:00
return NETERR_SENT ;
2017-09-20 11:27:13 +00:00
}
static int SSPI_CheckNewInCrypt ( sslfile_t * f )
{
int newd ;
if ( ! f - > stream )
2020-10-06 03:17:28 +00:00
return VFS_ERROR_EOF ;
2017-09-20 11:27:13 +00:00
newd = VFS_READ ( f - > stream , f - > incrypt . data + f - > incrypt . avail , f - > incrypt . datasize - f - > incrypt . avail ) ;
if ( newd < 0 )
return newd ;
else
f - > incrypt . avail + = newd ;
return 0 ;
}
//convert inbound crypt->data
static void SSPI_Decode ( sslfile_t * f )
{
SECURITY_STATUS ss ;
SecBufferDesc BuffDesc ;
SecBuffer SecBuff [ 4 ] ;
ULONG ulQop = 0 ;
SecBuffer * extra = NULL ;
int i ;
if ( ! f - > incrypt . avail )
return ;
BuffDesc . ulVersion = SECBUFFER_VERSION ;
BuffDesc . cBuffers = countof ( SecBuff ) ;
BuffDesc . pBuffers = SecBuff ;
SecBuff [ 0 ] . BufferType = SECBUFFER_DATA ;
SecBuff [ 0 ] . cbBuffer = f - > incrypt . avail ;
SecBuff [ 0 ] . pvBuffer = f - > incrypt . data ;
SecBuff [ 1 ] . BufferType = SECBUFFER_EMPTY ; //space for header
SecBuff [ 2 ] . BufferType = SECBUFFER_EMPTY ; //space for footer
SecBuff [ 3 ] . BufferType = SECBUFFER_EMPTY ; //space for extra marker
ss = secur . pDecryptMessage ( & f - > sechnd , & BuffDesc , 0 , & ulQop ) ;
2023-02-20 08:35:56 +00:00
if ( FAILED ( ss ) )
2017-09-20 11:27:13 +00:00
{
2023-02-20 08:35:56 +00:00
if ( f - > datagram )
return ; //some sort of corruption? ignore that packet.
2017-09-20 11:27:13 +00:00
if ( ss = = SEC_E_INCOMPLETE_MESSAGE )
{
if ( f - > incrypt . avail = = f - > incrypt . datasize )
SSPI_ExpandBuffer ( & f - > incrypt , f - > incrypt . datasize + 1024 ) ;
return ; //no error if its incomplete, we can just get more data later on.
}
switch ( ss )
{
case SEC_E_DECRYPT_FAILURE : SSPI_Error ( f , " DecryptMessage failed: SEC_E_DECRYPT_FAILURE \n " , ss ) ; break ;
case SEC_E_INVALID_HANDLE : SSPI_Error ( f , " DecryptMessage failed: SEC_E_INVALID_HANDLE \n " ) ; break ;
2023-02-20 08:35:56 +00:00
case SEC_E_UNFINISHED_CONTEXT_DELETED : SSPI_Error ( f , " DecryptMessage failed: SEC_E_UNFINISHED_CONTEXT_DELETED \n " ) ; break ; //peer aborted?
2017-09-20 11:27:13 +00:00
default : SSPI_Error ( f , " DecryptMessage failed: %0#lx \n " , ss ) ; break ;
}
return ;
}
for ( i = 0 ; i < BuffDesc . cBuffers ; i + + )
{
switch ( SecBuff [ i ] . BufferType )
{
case SECBUFFER_DATA :
if ( SSPI_CopyIntoBuffer ( & f - > inraw , SecBuff [ i ] . pvBuffer , SecBuff [ i ] . cbBuffer , true ) ! = SecBuff [ i ] . cbBuffer )
SSPI_Error ( f , " outraw buffer overflowed \n " ) ;
break ;
case SECBUFFER_EXTRA :
if ( extra )
SSPI_Error ( f , " multiple extra buffers \n " ) ;
extra = & SecBuff [ i ] ;
break ;
case SECBUFFER_EMPTY :
case SECBUFFER_MISSING :
case SECBUFFER_STREAM_TRAILER :
case SECBUFFER_STREAM_HEADER :
break ;
default :
SSPI_Error ( f , " got unexpected buffer type \n " ) ;
break ;
}
}
//retain the extra. if there's no extra then mark it so.
if ( extra )
{
memmove ( f - > incrypt . data , f - > incrypt . data + ( f - > incrypt . avail - extra - > cbBuffer ) , extra - > cbBuffer ) ;
f - > incrypt . avail = extra - > cbBuffer ;
}
else
f - > incrypt . avail = 0 ;
}
//convert outgoing data->crypt
2023-02-20 08:35:56 +00:00
static neterr_t SSPI_Encode ( sslfile_t * f )
2017-09-20 11:27:13 +00:00
{
SECURITY_STATUS ss ;
SecBufferDesc BuffDesc ;
SecBuffer SecBuff [ 4 ] ;
ULONG ulQop = 0 ;
if ( f - > outcrypt . avail )
{
SSPI_TryFlushCryptOut ( f ) ;
if ( f - > outcrypt . avail )
2023-02-20 08:35:56 +00:00
return NETERR_CLOGGED ; //don't flood too much
2017-09-20 11:27:13 +00:00
}
//don't corrupt the handshake data.
if ( f - > handshaking )
2023-02-20 08:35:56 +00:00
return NETERR_CLOGGED ;
2017-09-20 11:27:13 +00:00
if ( ! f - > outraw . avail )
2023-02-20 08:35:56 +00:00
return NETERR_SENT ;
2017-09-20 11:27:13 +00:00
BuffDesc . ulVersion = SECBUFFER_VERSION ;
BuffDesc . cBuffers = 4 ;
BuffDesc . pBuffers = SecBuff ;
SecBuff [ 0 ] . BufferType = SECBUFFER_STREAM_HEADER ;
SecBuff [ 0 ] . cbBuffer = f - > headersize ;
SecBuff [ 0 ] . pvBuffer = f - > headerdata ;
SecBuff [ 1 ] . BufferType = SECBUFFER_DATA ;
SecBuff [ 1 ] . cbBuffer = f - > outraw . avail ;
SecBuff [ 1 ] . pvBuffer = f - > outraw . data ;
SecBuff [ 2 ] . BufferType = SECBUFFER_STREAM_TRAILER ;
SecBuff [ 2 ] . cbBuffer = f - > footersize ;
SecBuff [ 2 ] . pvBuffer = f - > footerdata ;
SecBuff [ 3 ] . BufferType = SECBUFFER_EMPTY ;
SecBuff [ 3 ] . cbBuffer = 0 ;
SecBuff [ 3 ] . pvBuffer = NULL ;
ss = secur . pEncryptMessage ( & f - > sechnd , ulQop , & BuffDesc , 0 ) ;
if ( ss < 0 )
{
2023-02-20 08:35:56 +00:00
switch ( ss )
{
case SEC_E_ENCRYPT_FAILURE : SSPI_Error ( f , " EncryptMessage failed SEC_E_ENCRYPT_FAILURE (in: %i, max out %i) \n " , f - > outraw . avail , f - > outcrypt . avail ) ;
default : SSPI_Error ( f , " EncryptMessage failed %x \n " , ss ) ;
}
return NETERR_DISCONNECTED ;
2017-09-20 11:27:13 +00:00
}
f - > outraw . avail = 0 ;
//fixme: these should be made non-fatal.
if ( SSPI_CopyIntoBuffer ( & f - > outcrypt , SecBuff [ 0 ] . pvBuffer , SecBuff [ 0 ] . cbBuffer , true ) < SecBuff [ 0 ] . cbBuffer )
{
SSPI_Error ( f , " crypt buffer overflowed \n " ) ;
2023-02-20 08:35:56 +00:00
return NETERR_DISCONNECTED ;
2017-09-20 11:27:13 +00:00
}
if ( SSPI_CopyIntoBuffer ( & f - > outcrypt , SecBuff [ 1 ] . pvBuffer , SecBuff [ 1 ] . cbBuffer , true ) < SecBuff [ 1 ] . cbBuffer )
{
SSPI_Error ( f , " crypt buffer overflowed \n " ) ;
2023-02-20 08:35:56 +00:00
return NETERR_DISCONNECTED ;
2017-09-20 11:27:13 +00:00
}
if ( SSPI_CopyIntoBuffer ( & f - > outcrypt , SecBuff [ 2 ] . pvBuffer , SecBuff [ 2 ] . cbBuffer , true ) < SecBuff [ 2 ] . cbBuffer )
{
SSPI_Error ( f , " crypt buffer overflowed \n " ) ;
2023-02-20 08:35:56 +00:00
return NETERR_DISCONNECTED ;
2017-09-20 11:27:13 +00:00
}
2023-02-20 08:35:56 +00:00
return SSPI_TryFlushCryptOut ( f ) ;
2017-09-20 11:27:13 +00:00
}
char * narrowen ( char * out , size_t outlen , wchar_t * wide ) ;
static DWORD VerifyKnownCertificates ( DWORD status , wchar_t * domain , qbyte * data , size_t datasize , qboolean datagram )
{
Too many changes, sorry.
Change revision displays, use the SVN commit date instead of using __DATE__ (when there's no local changes). This should allow reproducible builds.
Added s_al_disable cvar, to block openal and all the various problems people have had with it, without having to name an explicit fallback (which would vary by system).
Add mastervolume cvar (for ss).
Add r_shadows 2 (aka fake shadows - for ss).
Add scr_loadingscreen_aspect -1 setting, to disable levelshots entirely, also disables the progress bar (for ss).
Better support for some effectinfo hacks (for ss).
Added dpcompat_nocsqcwarnings (because of lazy+buggy mods like ss).
Rework the dpcsqc versions of project+unproject builtins for better compat (for ss).
Added dpcompat_csqcinputeventtypes to block unexpected csqc input events (for ss).
Better compat with DP's loadfont console command (for ss).
Added dpcompat_smallerfonts cvar to replicate a DP bug (for ss).
Detect dp's m_draw extension, to work around it (for ss).
Cvar dpcompat_ignoremodificationtimes added. A value of 0 favour the most recently modified file, 1 will use DP-like alphabetically sorted preferences (for ss).
loadfont builtin can now accept outline=1 in the sizes arg for slightly more readable fonts.
Fix bbox calcs for rotated entities, fix needed for r_ignorenetpvs 0.
Hackily parse emoji.json to provide :poop: etc suggestions.
Skip prediction entirely when there's no local entity info. This fixes stair-smoothing in xonotic.
screenshot_cubemap will now capture half-float images when saving to ktx or dds files.
Fix support for xcf files larger than 4gb, mostly to avoid compiler warnings.
Fixed size of gfx/loading.lmp when replacement textures are used.
Added mipmap support for rg8 and l8a8 textures.
r_hdr_framebuffer cvar updated to support format names instead of random negative numbers. Description updated to name some interesting ones.
Perform autoupdate _checks_ ONLY with explicit user confirmation (actual updating already needed user confirmation, but this extra step should reduce the chances of us getting wrongly accused of exfiltrating user data if we're run in a sandbox - we ONLY ever included the updating engine's version in the checks, though there's nothing we can do to avoid sending the user's router's IP).
Removed the 'summon satan all over your harddrive' quit message, in case paranoid security researchers are idiots and don't bother doing actual research.
Removed the triptohell.info and fte.triptohell.info certificates, they really need to stop being self-signed. The updates domain is still self-signed for autoupdates.
Video drivers are now able to report supported video resolutions, visible to menuqc. Currently only works with SDL2 builds.
Added setmousepos builtin. Should work with glx+win32 build.
VF_SKYROOM_CAMERA can now accept an extra two args, setviewprop(VF_SKYROOM_CAMERA, org, axis, degrees).
Removed v_skyroom_origin+v_skyroom_orientation cvars in favour just v_skyroom, which should make it behave more like the 'fog' command (used when csqc isn't overriding).
Added R_EndPolygonRibbon builtin to make it faster+easier to generate textured ribbon/cable/etc wide lines (for TW).
sdl: Fix up sys_sdl.c's file enumeration to support wildcards in directories.
edit command now displays end1.bin/end2.bin correctly, because we can.
Finally add support for f_modified - though ruleset_allow_larger_models and ruleset_allow_overlong_sounds generally make it redundant.
Fix threading race condition in sha1 lookups.
Updated f_ruleset to include the same extra flags reported by ezquake.
A mod's default.fmf file can now contain an eg 'mainconfig config.cfg' line (to explicitly set the main config saved with cfg_save_auto 1 etc).
fmf: basegame steam:GameName/GameDir can be used to try to load a mod directory from an installed steam game. The resulting gamedir will be read-only.
HOMEDIR CHANGE: use homedirs only if the basedir cannot be written or a homedir already exists, which should further reduce the probability of microsoft randomly uploading our data to their cloud (but mostly because its annoying to never know where your data is written).
Fixed buf_cvarlist, should work in xonotic now, and without segfaults.
Added an extra arg to URI_Get_Callback calls - the response size, also changed the tempstring to contain all bytes of the response, you need to be careful about nulls though.
Try to work around nvidia's forced-panning bug on x11 when changing video modes. This might screw with other programs.
sdl: support custom icons.
sdl: support choosing a specific display.
Added some documentation to menuqc builtins.
menusys: use outlines for slightly more readable fonts.
menusys: switch vid_width and vid_height combos into a single video mode combo to set both according to reported video modes.
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5581 fc73d0e0-1445-4013-8a0c-d673dee63da5
2019-11-20 03:09:50 +00:00
size_t knownsize ;
void * knowncert ;
2017-10-12 12:02:25 +00:00
char realdomain [ 256 ] ;
2020-08-13 10:09:39 +00:00
unsigned int probs = 0 ;
2017-09-20 11:27:13 +00:00
if ( datagram )
{
2020-08-13 10:09:39 +00:00
if ( status = = CERT_E_UNTRUSTEDROOT | | status = = CERT_E_UNTRUSTEDTESTROOT )
probs | = CERTLOG_MISSINGCA ;
if ( status = = CERT_E_EXPIRED )
probs | = CERTLOG_EXPIRED ;
if ( status = = SEC_E_WRONG_PRINCIPAL )
probs | = CERTLOG_WRONGHOST ;
2017-09-20 11:27:13 +00:00
if ( status = = CERT_E_UNTRUSTEDROOT | | SUCCEEDED ( status ) )
{
# ifndef SERVERONLY
2020-08-13 10:09:39 +00:00
if ( CertLog_ConnectOkay ( narrowen ( realdomain , sizeof ( realdomain ) , domain ) , data , datasize , probs ) )
2017-09-20 11:27:13 +00:00
status = SEC_E_OK ;
else
# endif
2023-02-20 08:35:56 +00:00
if ( SUCCEEDED ( status ) )
status = TRUST_E_EXPLICIT_DISTRUST ;
2017-09-20 11:27:13 +00:00
}
return status ;
}
Too many changes, sorry.
Change revision displays, use the SVN commit date instead of using __DATE__ (when there's no local changes). This should allow reproducible builds.
Added s_al_disable cvar, to block openal and all the various problems people have had with it, without having to name an explicit fallback (which would vary by system).
Add mastervolume cvar (for ss).
Add r_shadows 2 (aka fake shadows - for ss).
Add scr_loadingscreen_aspect -1 setting, to disable levelshots entirely, also disables the progress bar (for ss).
Better support for some effectinfo hacks (for ss).
Added dpcompat_nocsqcwarnings (because of lazy+buggy mods like ss).
Rework the dpcsqc versions of project+unproject builtins for better compat (for ss).
Added dpcompat_csqcinputeventtypes to block unexpected csqc input events (for ss).
Better compat with DP's loadfont console command (for ss).
Added dpcompat_smallerfonts cvar to replicate a DP bug (for ss).
Detect dp's m_draw extension, to work around it (for ss).
Cvar dpcompat_ignoremodificationtimes added. A value of 0 favour the most recently modified file, 1 will use DP-like alphabetically sorted preferences (for ss).
loadfont builtin can now accept outline=1 in the sizes arg for slightly more readable fonts.
Fix bbox calcs for rotated entities, fix needed for r_ignorenetpvs 0.
Hackily parse emoji.json to provide :poop: etc suggestions.
Skip prediction entirely when there's no local entity info. This fixes stair-smoothing in xonotic.
screenshot_cubemap will now capture half-float images when saving to ktx or dds files.
Fix support for xcf files larger than 4gb, mostly to avoid compiler warnings.
Fixed size of gfx/loading.lmp when replacement textures are used.
Added mipmap support for rg8 and l8a8 textures.
r_hdr_framebuffer cvar updated to support format names instead of random negative numbers. Description updated to name some interesting ones.
Perform autoupdate _checks_ ONLY with explicit user confirmation (actual updating already needed user confirmation, but this extra step should reduce the chances of us getting wrongly accused of exfiltrating user data if we're run in a sandbox - we ONLY ever included the updating engine's version in the checks, though there's nothing we can do to avoid sending the user's router's IP).
Removed the 'summon satan all over your harddrive' quit message, in case paranoid security researchers are idiots and don't bother doing actual research.
Removed the triptohell.info and fte.triptohell.info certificates, they really need to stop being self-signed. The updates domain is still self-signed for autoupdates.
Video drivers are now able to report supported video resolutions, visible to menuqc. Currently only works with SDL2 builds.
Added setmousepos builtin. Should work with glx+win32 build.
VF_SKYROOM_CAMERA can now accept an extra two args, setviewprop(VF_SKYROOM_CAMERA, org, axis, degrees).
Removed v_skyroom_origin+v_skyroom_orientation cvars in favour just v_skyroom, which should make it behave more like the 'fog' command (used when csqc isn't overriding).
Added R_EndPolygonRibbon builtin to make it faster+easier to generate textured ribbon/cable/etc wide lines (for TW).
sdl: Fix up sys_sdl.c's file enumeration to support wildcards in directories.
edit command now displays end1.bin/end2.bin correctly, because we can.
Finally add support for f_modified - though ruleset_allow_larger_models and ruleset_allow_overlong_sounds generally make it redundant.
Fix threading race condition in sha1 lookups.
Updated f_ruleset to include the same extra flags reported by ezquake.
A mod's default.fmf file can now contain an eg 'mainconfig config.cfg' line (to explicitly set the main config saved with cfg_save_auto 1 etc).
fmf: basegame steam:GameName/GameDir can be used to try to load a mod directory from an installed steam game. The resulting gamedir will be read-only.
HOMEDIR CHANGE: use homedirs only if the basedir cannot be written or a homedir already exists, which should further reduce the probability of microsoft randomly uploading our data to their cloud (but mostly because its annoying to never know where your data is written).
Fixed buf_cvarlist, should work in xonotic now, and without segfaults.
Added an extra arg to URI_Get_Callback calls - the response size, also changed the tempstring to contain all bytes of the response, you need to be careful about nulls though.
Try to work around nvidia's forced-panning bug on x11 when changing video modes. This might screw with other programs.
sdl: support custom icons.
sdl: support choosing a specific display.
Added some documentation to menuqc builtins.
menusys: use outlines for slightly more readable fonts.
menusys: switch vid_width and vid_height combos into a single video mode combo to set both according to reported video modes.
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5581 fc73d0e0-1445-4013-8a0c-d673dee63da5
2019-11-20 03:09:50 +00:00
narrowen ( realdomain , sizeof ( realdomain ) , domain ) ;
knowncert = TLS_GetKnownCertificate ( realdomain , & knownsize ) ;
if ( knowncert )
2017-09-20 11:27:13 +00:00
{
Too many changes, sorry.
Change revision displays, use the SVN commit date instead of using __DATE__ (when there's no local changes). This should allow reproducible builds.
Added s_al_disable cvar, to block openal and all the various problems people have had with it, without having to name an explicit fallback (which would vary by system).
Add mastervolume cvar (for ss).
Add r_shadows 2 (aka fake shadows - for ss).
Add scr_loadingscreen_aspect -1 setting, to disable levelshots entirely, also disables the progress bar (for ss).
Better support for some effectinfo hacks (for ss).
Added dpcompat_nocsqcwarnings (because of lazy+buggy mods like ss).
Rework the dpcsqc versions of project+unproject builtins for better compat (for ss).
Added dpcompat_csqcinputeventtypes to block unexpected csqc input events (for ss).
Better compat with DP's loadfont console command (for ss).
Added dpcompat_smallerfonts cvar to replicate a DP bug (for ss).
Detect dp's m_draw extension, to work around it (for ss).
Cvar dpcompat_ignoremodificationtimes added. A value of 0 favour the most recently modified file, 1 will use DP-like alphabetically sorted preferences (for ss).
loadfont builtin can now accept outline=1 in the sizes arg for slightly more readable fonts.
Fix bbox calcs for rotated entities, fix needed for r_ignorenetpvs 0.
Hackily parse emoji.json to provide :poop: etc suggestions.
Skip prediction entirely when there's no local entity info. This fixes stair-smoothing in xonotic.
screenshot_cubemap will now capture half-float images when saving to ktx or dds files.
Fix support for xcf files larger than 4gb, mostly to avoid compiler warnings.
Fixed size of gfx/loading.lmp when replacement textures are used.
Added mipmap support for rg8 and l8a8 textures.
r_hdr_framebuffer cvar updated to support format names instead of random negative numbers. Description updated to name some interesting ones.
Perform autoupdate _checks_ ONLY with explicit user confirmation (actual updating already needed user confirmation, but this extra step should reduce the chances of us getting wrongly accused of exfiltrating user data if we're run in a sandbox - we ONLY ever included the updating engine's version in the checks, though there's nothing we can do to avoid sending the user's router's IP).
Removed the 'summon satan all over your harddrive' quit message, in case paranoid security researchers are idiots and don't bother doing actual research.
Removed the triptohell.info and fte.triptohell.info certificates, they really need to stop being self-signed. The updates domain is still self-signed for autoupdates.
Video drivers are now able to report supported video resolutions, visible to menuqc. Currently only works with SDL2 builds.
Added setmousepos builtin. Should work with glx+win32 build.
VF_SKYROOM_CAMERA can now accept an extra two args, setviewprop(VF_SKYROOM_CAMERA, org, axis, degrees).
Removed v_skyroom_origin+v_skyroom_orientation cvars in favour just v_skyroom, which should make it behave more like the 'fog' command (used when csqc isn't overriding).
Added R_EndPolygonRibbon builtin to make it faster+easier to generate textured ribbon/cable/etc wide lines (for TW).
sdl: Fix up sys_sdl.c's file enumeration to support wildcards in directories.
edit command now displays end1.bin/end2.bin correctly, because we can.
Finally add support for f_modified - though ruleset_allow_larger_models and ruleset_allow_overlong_sounds generally make it redundant.
Fix threading race condition in sha1 lookups.
Updated f_ruleset to include the same extra flags reported by ezquake.
A mod's default.fmf file can now contain an eg 'mainconfig config.cfg' line (to explicitly set the main config saved with cfg_save_auto 1 etc).
fmf: basegame steam:GameName/GameDir can be used to try to load a mod directory from an installed steam game. The resulting gamedir will be read-only.
HOMEDIR CHANGE: use homedirs only if the basedir cannot be written or a homedir already exists, which should further reduce the probability of microsoft randomly uploading our data to their cloud (but mostly because its annoying to never know where your data is written).
Fixed buf_cvarlist, should work in xonotic now, and without segfaults.
Added an extra arg to URI_Get_Callback calls - the response size, also changed the tempstring to contain all bytes of the response, you need to be careful about nulls though.
Try to work around nvidia's forced-panning bug on x11 when changing video modes. This might screw with other programs.
sdl: support custom icons.
sdl: support choosing a specific display.
Added some documentation to menuqc builtins.
menusys: use outlines for slightly more readable fonts.
menusys: switch vid_width and vid_height combos into a single video mode combo to set both according to reported video modes.
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5581 fc73d0e0-1445-4013-8a0c-d673dee63da5
2019-11-20 03:09:50 +00:00
if ( knownsize = = datasize & & ! memcmp ( data , knowncert , datasize ) )
{ //what we know about matched
if ( status = = CERT_E_UNTRUSTEDROOT | | status = = CERT_E_EXPIRED )
status = SEC_E_OK ;
}
else
2017-09-20 11:27:13 +00:00
{
Too many changes, sorry.
Change revision displays, use the SVN commit date instead of using __DATE__ (when there's no local changes). This should allow reproducible builds.
Added s_al_disable cvar, to block openal and all the various problems people have had with it, without having to name an explicit fallback (which would vary by system).
Add mastervolume cvar (for ss).
Add r_shadows 2 (aka fake shadows - for ss).
Add scr_loadingscreen_aspect -1 setting, to disable levelshots entirely, also disables the progress bar (for ss).
Better support for some effectinfo hacks (for ss).
Added dpcompat_nocsqcwarnings (because of lazy+buggy mods like ss).
Rework the dpcsqc versions of project+unproject builtins for better compat (for ss).
Added dpcompat_csqcinputeventtypes to block unexpected csqc input events (for ss).
Better compat with DP's loadfont console command (for ss).
Added dpcompat_smallerfonts cvar to replicate a DP bug (for ss).
Detect dp's m_draw extension, to work around it (for ss).
Cvar dpcompat_ignoremodificationtimes added. A value of 0 favour the most recently modified file, 1 will use DP-like alphabetically sorted preferences (for ss).
loadfont builtin can now accept outline=1 in the sizes arg for slightly more readable fonts.
Fix bbox calcs for rotated entities, fix needed for r_ignorenetpvs 0.
Hackily parse emoji.json to provide :poop: etc suggestions.
Skip prediction entirely when there's no local entity info. This fixes stair-smoothing in xonotic.
screenshot_cubemap will now capture half-float images when saving to ktx or dds files.
Fix support for xcf files larger than 4gb, mostly to avoid compiler warnings.
Fixed size of gfx/loading.lmp when replacement textures are used.
Added mipmap support for rg8 and l8a8 textures.
r_hdr_framebuffer cvar updated to support format names instead of random negative numbers. Description updated to name some interesting ones.
Perform autoupdate _checks_ ONLY with explicit user confirmation (actual updating already needed user confirmation, but this extra step should reduce the chances of us getting wrongly accused of exfiltrating user data if we're run in a sandbox - we ONLY ever included the updating engine's version in the checks, though there's nothing we can do to avoid sending the user's router's IP).
Removed the 'summon satan all over your harddrive' quit message, in case paranoid security researchers are idiots and don't bother doing actual research.
Removed the triptohell.info and fte.triptohell.info certificates, they really need to stop being self-signed. The updates domain is still self-signed for autoupdates.
Video drivers are now able to report supported video resolutions, visible to menuqc. Currently only works with SDL2 builds.
Added setmousepos builtin. Should work with glx+win32 build.
VF_SKYROOM_CAMERA can now accept an extra two args, setviewprop(VF_SKYROOM_CAMERA, org, axis, degrees).
Removed v_skyroom_origin+v_skyroom_orientation cvars in favour just v_skyroom, which should make it behave more like the 'fog' command (used when csqc isn't overriding).
Added R_EndPolygonRibbon builtin to make it faster+easier to generate textured ribbon/cable/etc wide lines (for TW).
sdl: Fix up sys_sdl.c's file enumeration to support wildcards in directories.
edit command now displays end1.bin/end2.bin correctly, because we can.
Finally add support for f_modified - though ruleset_allow_larger_models and ruleset_allow_overlong_sounds generally make it redundant.
Fix threading race condition in sha1 lookups.
Updated f_ruleset to include the same extra flags reported by ezquake.
A mod's default.fmf file can now contain an eg 'mainconfig config.cfg' line (to explicitly set the main config saved with cfg_save_auto 1 etc).
fmf: basegame steam:GameName/GameDir can be used to try to load a mod directory from an installed steam game. The resulting gamedir will be read-only.
HOMEDIR CHANGE: use homedirs only if the basedir cannot be written or a homedir already exists, which should further reduce the probability of microsoft randomly uploading our data to their cloud (but mostly because its annoying to never know where your data is written).
Fixed buf_cvarlist, should work in xonotic now, and without segfaults.
Added an extra arg to URI_Get_Callback calls - the response size, also changed the tempstring to contain all bytes of the response, you need to be careful about nulls though.
Try to work around nvidia's forced-panning bug on x11 when changing video modes. This might screw with other programs.
sdl: support custom icons.
sdl: support choosing a specific display.
Added some documentation to menuqc builtins.
menusys: use outlines for slightly more readable fonts.
menusys: switch vid_width and vid_height combos into a single video mode combo to set both according to reported video modes.
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5581 fc73d0e0-1445-4013-8a0c-d673dee63da5
2019-11-20 03:09:50 +00:00
if ( status ! = CERT_E_EXPIRED )
Con_Printf ( " %ls has an unexpected certificate \n " , domain ) ;
if ( status = = SEC_E_OK ) //we (think) we know better.
2023-02-20 08:35:56 +00:00
status = TRUST_E_EXPLICIT_DISTRUST ;
2017-09-20 11:27:13 +00:00
}
Too many changes, sorry.
Change revision displays, use the SVN commit date instead of using __DATE__ (when there's no local changes). This should allow reproducible builds.
Added s_al_disable cvar, to block openal and all the various problems people have had with it, without having to name an explicit fallback (which would vary by system).
Add mastervolume cvar (for ss).
Add r_shadows 2 (aka fake shadows - for ss).
Add scr_loadingscreen_aspect -1 setting, to disable levelshots entirely, also disables the progress bar (for ss).
Better support for some effectinfo hacks (for ss).
Added dpcompat_nocsqcwarnings (because of lazy+buggy mods like ss).
Rework the dpcsqc versions of project+unproject builtins for better compat (for ss).
Added dpcompat_csqcinputeventtypes to block unexpected csqc input events (for ss).
Better compat with DP's loadfont console command (for ss).
Added dpcompat_smallerfonts cvar to replicate a DP bug (for ss).
Detect dp's m_draw extension, to work around it (for ss).
Cvar dpcompat_ignoremodificationtimes added. A value of 0 favour the most recently modified file, 1 will use DP-like alphabetically sorted preferences (for ss).
loadfont builtin can now accept outline=1 in the sizes arg for slightly more readable fonts.
Fix bbox calcs for rotated entities, fix needed for r_ignorenetpvs 0.
Hackily parse emoji.json to provide :poop: etc suggestions.
Skip prediction entirely when there's no local entity info. This fixes stair-smoothing in xonotic.
screenshot_cubemap will now capture half-float images when saving to ktx or dds files.
Fix support for xcf files larger than 4gb, mostly to avoid compiler warnings.
Fixed size of gfx/loading.lmp when replacement textures are used.
Added mipmap support for rg8 and l8a8 textures.
r_hdr_framebuffer cvar updated to support format names instead of random negative numbers. Description updated to name some interesting ones.
Perform autoupdate _checks_ ONLY with explicit user confirmation (actual updating already needed user confirmation, but this extra step should reduce the chances of us getting wrongly accused of exfiltrating user data if we're run in a sandbox - we ONLY ever included the updating engine's version in the checks, though there's nothing we can do to avoid sending the user's router's IP).
Removed the 'summon satan all over your harddrive' quit message, in case paranoid security researchers are idiots and don't bother doing actual research.
Removed the triptohell.info and fte.triptohell.info certificates, they really need to stop being self-signed. The updates domain is still self-signed for autoupdates.
Video drivers are now able to report supported video resolutions, visible to menuqc. Currently only works with SDL2 builds.
Added setmousepos builtin. Should work with glx+win32 build.
VF_SKYROOM_CAMERA can now accept an extra two args, setviewprop(VF_SKYROOM_CAMERA, org, axis, degrees).
Removed v_skyroom_origin+v_skyroom_orientation cvars in favour just v_skyroom, which should make it behave more like the 'fog' command (used when csqc isn't overriding).
Added R_EndPolygonRibbon builtin to make it faster+easier to generate textured ribbon/cable/etc wide lines (for TW).
sdl: Fix up sys_sdl.c's file enumeration to support wildcards in directories.
edit command now displays end1.bin/end2.bin correctly, because we can.
Finally add support for f_modified - though ruleset_allow_larger_models and ruleset_allow_overlong_sounds generally make it redundant.
Fix threading race condition in sha1 lookups.
Updated f_ruleset to include the same extra flags reported by ezquake.
A mod's default.fmf file can now contain an eg 'mainconfig config.cfg' line (to explicitly set the main config saved with cfg_save_auto 1 etc).
fmf: basegame steam:GameName/GameDir can be used to try to load a mod directory from an installed steam game. The resulting gamedir will be read-only.
HOMEDIR CHANGE: use homedirs only if the basedir cannot be written or a homedir already exists, which should further reduce the probability of microsoft randomly uploading our data to their cloud (but mostly because its annoying to never know where your data is written).
Fixed buf_cvarlist, should work in xonotic now, and without segfaults.
Added an extra arg to URI_Get_Callback calls - the response size, also changed the tempstring to contain all bytes of the response, you need to be careful about nulls though.
Try to work around nvidia's forced-panning bug on x11 when changing video modes. This might screw with other programs.
sdl: support custom icons.
sdl: support choosing a specific display.
Added some documentation to menuqc builtins.
menusys: use outlines for slightly more readable fonts.
menusys: switch vid_width and vid_height combos into a single video mode combo to set both according to reported video modes.
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5581 fc73d0e0-1445-4013-8a0c-d673dee63da5
2019-11-20 03:09:50 +00:00
BZ_Free ( knowncert ) ;
2017-09-20 11:27:13 +00:00
}
2017-10-12 12:02:25 +00:00
# ifndef SERVERONLY
//self-signed and expired certs are understandable in many situations.
//prompt and cache (although this connection attempt will fail).
2020-08-13 10:09:39 +00:00
if ( status = = CERT_E_UNTRUSTEDROOT | | status = = CERT_E_UNTRUSTEDTESTROOT )
probs | = CERTLOG_MISSINGCA ;
else if ( status = = CERT_E_EXPIRED )
probs | = CERTLOG_EXPIRED ;
else if ( status = = SEC_E_WRONG_PRINCIPAL )
probs | = CERTLOG_WRONGHOST ;
else if ( status ! = SEC_E_OK )
probs | = CERTLOG_UNKNOWN ;
2017-10-12 12:02:25 +00:00
if ( status = = CERT_E_UNTRUSTEDROOT | | status = = CERT_E_UNTRUSTEDTESTROOT | | status = = CERT_E_EXPIRED )
2020-08-13 10:09:39 +00:00
if ( CertLog_ConnectOkay ( realdomain , data , datasize , probs ) )
2017-10-12 12:02:25 +00:00
return SEC_E_OK ;
# endif
2017-09-20 11:27:13 +00:00
return status ;
}
static DWORD VerifyServerCertificate ( PCCERT_CONTEXT pServerCert , PWSTR pwszServerName , DWORD dwCertFlags , qboolean datagram )
{
HTTPSPolicyCallbackData polHttps ;
CERT_CHAIN_POLICY_PARA PolicyPara ;
CERT_CHAIN_POLICY_STATUS PolicyStatus ;
CERT_CHAIN_PARA ChainPara ;
PCCERT_CHAIN_CONTEXT pChainContext ;
DWORD Status ;
LPSTR rgszUsages [ ] =
{
szOID_PKIX_KP_SERVER_AUTH ,
szOID_SERVER_GATED_CRYPTO ,
szOID_SGC_NETSCAPE
} ;
DWORD cUsages = sizeof ( rgszUsages ) / sizeof ( LPSTR ) ;
if ( pServerCert = = NULL )
return SEC_E_WRONG_PRINCIPAL ;
if ( ! * pwszServerName )
return SEC_E_WRONG_PRINCIPAL ;
// Build certificate chain.
memset ( & ChainPara , 0 , sizeof ( ChainPara ) ) ;
ChainPara . cbSize = sizeof ( ChainPara ) ;
ChainPara . RequestedUsage . dwType = USAGE_MATCH_TYPE_OR ;
ChainPara . RequestedUsage . Usage . cUsageIdentifier = cUsages ;
ChainPara . RequestedUsage . Usage . rgpszUsageIdentifier = rgszUsages ;
if ( ! crypt . pCertGetCertificateChain ( NULL , pServerCert , NULL , pServerCert - > hCertStore , & ChainPara , 0 , NULL , & pChainContext ) )
{
Status = GetLastError ( ) ;
Sys_Printf ( " Error %#lx returned by CertGetCertificateChain! \n " , Status ) ;
}
else
{
// Validate certificate chain.
memset ( & polHttps , 0 , sizeof ( HTTPSPolicyCallbackData ) ) ;
polHttps . cbStruct = sizeof ( HTTPSPolicyCallbackData ) ;
polHttps . dwAuthType = AUTHTYPE_SERVER ;
polHttps . fdwChecks = dwCertFlags ;
polHttps . pwszServerName = pwszServerName ;
memset ( & PolicyPara , 0 , sizeof ( PolicyPara ) ) ;
PolicyPara . cbSize = sizeof ( PolicyPara ) ;
PolicyPara . pvExtraPolicyPara = & polHttps ;
memset ( & PolicyStatus , 0 , sizeof ( PolicyStatus ) ) ;
PolicyStatus . cbSize = sizeof ( PolicyStatus ) ;
if ( ! crypt . pCertVerifyCertificateChainPolicy ( CERT_CHAIN_POLICY_SSL , pChainContext , & PolicyPara , & PolicyStatus ) )
{
Status = GetLastError ( ) ;
Sys_Printf ( " Error %#lx returned by CertVerifyCertificateChainPolicy! \n " , Status ) ;
}
else
{
Status = VerifyKnownCertificates ( PolicyStatus . dwError , pwszServerName , pServerCert - > pbCertEncoded , pServerCert - > cbCertEncoded , datagram ) ;
if ( Status )
{
char fmsg [ 512 ] ;
char * err ;
switch ( Status )
{
2023-02-20 08:35:56 +00:00
case CERT_E_EXPIRED : err = " CERT_E_EXPIRED " ; break ;
case CERT_E_VALIDITYPERIODNESTING : err = " CERT_E_VALIDITYPERIODNESTING " ; break ;
case CERT_E_ROLE : err = " CERT_E_ROLE " ; break ;
case CERT_E_PATHLENCONST : err = " CERT_E_PATHLENCONST " ; break ;
case CERT_E_CRITICAL : err = " CERT_E_CRITICAL " ; break ;
case CERT_E_PURPOSE : err = " CERT_E_PURPOSE " ; break ;
case CERT_E_ISSUERCHAINING : err = " CERT_E_ISSUERCHAINING " ; break ;
case CERT_E_MALFORMED : err = " CERT_E_MALFORMED " ; break ;
case CERT_E_UNTRUSTEDROOT : err = " CERT_E_UNTRUSTEDROOT " ; break ;
case CERT_E_CHAINING : err = " CERT_E_CHAINING " ; break ;
case TRUST_E_FAIL : err = " TRUST_E_FAIL " ; break ;
case TRUST_E_EXPLICIT_DISTRUST : err = " blocked " ; break ;
case CERT_E_REVOKED : err = " CERT_E_REVOKED " ; break ;
case CERT_E_UNTRUSTEDTESTROOT : err = " CERT_E_UNTRUSTEDTESTROOT " ; break ;
case CERT_E_REVOCATION_FAILURE : err = " CERT_E_REVOCATION_FAILURE " ; break ;
2017-09-20 11:27:13 +00:00
case CERT_E_CN_NO_MATCH :
err = fmsg ;
Q_strncpyz ( fmsg , " Certificate is for " , sizeof ( fmsg ) ) ;
crypt . pCertNameToStrA ( X509_ASN_ENCODING , & pServerCert - > pCertInfo - > Subject , 0 , fmsg + strlen ( fmsg ) , sizeof ( fmsg ) - strlen ( fmsg ) ) ;
break ;
2023-02-20 08:35:56 +00:00
case CERT_E_WRONG_USAGE : err = " CERT_E_WRONG_USAGE " ; break ;
default : err = va ( " %#x " , ( int ) Status ) ; break ;
2017-09-20 11:27:13 +00:00
}
2019-06-05 20:48:06 +00:00
Con_Printf ( CON_ERROR " Error verifying certificate for '%ls': %s \n " , pwszServerName , err ) ;
2017-09-20 11:27:13 +00:00
2019-06-05 20:48:06 +00:00
if ( tls_ignorecertificateerrors . ival )
2017-09-20 11:27:13 +00:00
{
2019-06-05 20:48:06 +00:00
Con_Printf ( CON_WARNING " pretending it didn't happen... (tls_ignorecertificateerrors is set) \n " ) ;
2017-09-20 11:27:13 +00:00
Status = SEC_E_OK ;
}
}
else
Status = SEC_E_OK ;
}
crypt . pCertFreeCertificateChain ( pChainContext ) ;
}
return Status ;
}
static PCCERT_CONTEXT SSPI_GetServerCertificate ( void )
{
2023-02-20 08:35:56 +00:00
//frankly this is all kinda fucked
2017-09-20 11:27:13 +00:00
static PCCERT_CONTEXT ret ;
2023-02-20 08:35:56 +00:00
static const char * issuertext = " CN=127.0.0.1, O= \" FTE QuakeWorld \" , OU=Fallback, C=QW " ;
wchar_t * const container = L " diediedie " ;
static const int provtype = PROV_RSA_SCHANNEL ;
static wchar_t * const provname = MS_DEF_RSA_SCHANNEL_PROV_W ;
CRYPT_KEY_PROV_INFO kpi ;
2017-09-20 11:27:13 +00:00
CERT_NAME_BLOB issuerblob ;
2023-02-20 08:35:56 +00:00
HCRYPTPROV prov = 0 ;
HCRYPTKEY hkey = 0 ; //nope, not registry related.
2017-09-20 11:27:13 +00:00
2014-03-30 08:55:06 +00:00
CRYPT_ALGORITHM_IDENTIFIER sigalg ;
SYSTEMTIME expiredate ;
2023-02-20 08:35:56 +00:00
int i ;
const char * pfxname = NULL ;
2014-03-30 08:55:06 +00:00
2023-02-20 08:35:56 +00:00
qofs_t fsz = 0 ;
CRYPT_DATA_BLOB pfxblob = { 0 , NULL } ;
HCERTSTORE store ;
wchar_t password [ 512 ] ;
DWORD fucksake = countof ( password ) ;
static qboolean tried ;
if ( ret | | tried )
2014-03-30 08:55:06 +00:00
return ret ;
2023-02-20 08:35:56 +00:00
tried = true ;
i = COM_CheckParm ( " -pfx " ) ;
if ( i & & i < com_argc - 1 )
pfxname = com_argv [ i + 1 ] ;
if ( pfxname )
pfxblob . pbData = FS_MallocFile ( pfxname , FS_SYSTEM , & fsz ) ;
if ( ! pfxblob . pbData )
pfxblob . pbData = FS_MallocFile ( " identity.pfx " , FS_ROOT , & fsz ) ;
if ( pfxblob . pbData )
{
pfxblob . cbData = fsz ;
if ( ! GetUserNameW ( password , & fucksake ) ) //use their username as a password. at least it'll block most accidental redistriction. should prolly mix in their computer name, w/e
* password = 0 ;
store = crypt . pPFXImportCertStore ( & pfxblob , password , 0 ) ;
if ( ! store ) //try a couple of other passwords, for people creating their own manually.
store = crypt . pPFXImportCertStore ( & pfxblob , L " " , 0 ) ;
if ( ! store )
store = crypt . pPFXImportCertStore ( & pfxblob , NULL , 0 ) ;
if ( store )
{
HCRYPTPROV hprov = 0 ;
DWORD keyspec = 0 ;
BOOL willbefalse = false ;
ret = crypt . pCertFindCertificateInStore ( store , X509_ASN_ENCODING | PKCS_7_ASN_ENCODING , 0 , CERT_FIND_ANY , NULL , NULL ) ;
if ( ret & & crypt . pCryptAcquireCertificatePrivateKey ( ret , 0 , NULL , & hprov , & keyspec , & willbefalse ) )
{
char fdn [ 1024 ] ;
char digest [ DIGEST_MAXSIZE ] ;
char b64 [ DIGEST_MAXSIZE * 2 + 1 ] ;
size_t dgsz = CalcHash ( & hash_sha1 , digest , sizeof ( digest ) , ret - > pbCertEncoded , ret - > cbCertEncoded ) ;
Base64_EncodeBlock ( digest , dgsz , b64 , sizeof ( b64 ) ) ;
Con_Printf ( " Loaded Certificate fingerprint is %s \n " , b64 ) ;
crypt . pCertNameToStrA ( ret - > dwCertEncodingType , & ret - > pCertInfo - > Subject , CERT_X500_NAME_STR , fdn , sizeof ( fdn ) ) ;
Con_Printf ( " Loaded Certificate DN: %s \n " , fdn ) ;
return ret ;
}
}
Con_Printf ( CON_ERROR " pfx certificate failed to load. \n " ) ;
pfxname = NULL ; //don't overwrite an overridden name. it
}
else if ( pfxname )
Con_Printf ( CON_WARNING " Generating new pfx file: %s \n " , pfxname ) ;
2014-03-30 08:55:06 +00:00
2017-09-20 11:27:13 +00:00
memset ( & sigalg , 0 , sizeof ( sigalg ) ) ;
sigalg . pszObjId = szOID_RSA_SHA512RSA ;
2014-03-30 08:55:06 +00:00
GetSystemTime ( & expiredate ) ;
2023-02-20 08:35:56 +00:00
expiredate . wYear + = 5 ; //5 years hence. woo
expiredate . wDay = 1 ; //work around feb nightmares... not to be confused with Week-Day...
2017-09-20 11:27:13 +00:00
memset ( & issuerblob , 0 , sizeof ( issuerblob ) ) ;
2014-03-30 08:55:06 +00:00
crypt . pCertStrToNameA ( X509_ASN_ENCODING , issuertext , CERT_X500_NAME_STR , NULL , issuerblob . pbData , & issuerblob . cbData , NULL ) ;
issuerblob . pbData = Z_Malloc ( issuerblob . cbData ) ;
2017-09-20 11:27:13 +00:00
crypt . pCertStrToNameA ( X509_ASN_ENCODING , issuertext , CERT_X500_NAME_STR , NULL , issuerblob . pbData , & issuerblob . cbData , NULL ) ;
2023-02-20 08:35:56 +00:00
advapi . pCryptAcquireContextW ( & prov , container , provname , provtype , CRYPT_NEWKEYSET | CRYPT_MACHINE_KEYSET ) ;
if ( ! prov )
{ //try again. fucking retarded api.
if ( ! advapi . pCryptAcquireContextW ( & prov , container , provname , provtype , CRYPT_MACHINE_KEYSET ) )
{
Con_Printf ( CON_ERROR " CryptAcquireContext failed. \n " ) ;
return NULL ;
}
}
advapi . pCryptGenKey ( prov , AT_KEYEXCHANGE , CRYPT_EXPORTABLE | CRYPT_ARCHIVABLE , & hkey ) ;
kpi . pwszContainerName = container ;
kpi . pwszProvName = provname ;
kpi . dwProvType = provtype ;
kpi . dwFlags = CERT_SET_KEY_CONTEXT_PROP_ID ;
kpi . cProvParam = 0 ;
kpi . dwKeySpec = AT_KEYEXCHANGE ;
2014-03-30 08:55:06 +00:00
ret = crypt . pCertCreateSelfSignCertificate (
2023-02-20 08:35:56 +00:00
prov ,
2014-03-30 08:55:06 +00:00
& issuerblob ,
0 ,
2023-02-20 08:35:56 +00:00
& kpi ,
2014-03-30 08:55:06 +00:00
& sigalg ,
NULL ,
& expiredate ,
NULL
2017-09-20 11:27:13 +00:00
) ;
if ( ! ret )
{ //try and downgrade the signature algo if it failed.
sigalg . pszObjId = szOID_RSA_SHA1RSA ;
playdemo accepts https urls now. will start playing before the file has finished downloading, to avoid unnecessary delays.
reworked network addresses to separate address family and connection type. this should make banning people more reliable, as well as simplifying a whole load of logic (no need to check for ipv4 AND ipv6).
tcpconnect will keep trying to connect even if the connection wasn't instant, instead of giving up instantly.
rewrote tcp connections quite a bit. sv_port_tcp now handles qtv+qizmo+http+ws+rtcbroker+tls equivalents.
qtv_streamport is now a legacy cvar and now acts equivalently to sv_port_tcp (but still separate).
rewrote screenshot and video capture code to use strides. this solves image-is-upside down issues with vulkan.
ignore alt key in browser port. oh no! no more red text! oh no! no more alt-being-wrongly-down-and-being-unable-to-type-anything-without-forcing-alt-released!
reworked audio decoder interface. now has clearly defined success/unavailable/end-of-file results. this should solve a whole load of issues with audio streaming.
fixed various openal audio streaming issues too. openal also got some workarounds for emscripten's poor emulation.
fixed ogg decoder to retain sync properly if seeked.
updated menu_media a bit. now reads vorbis comments/id3v1 tags to get proper track names. also saves the playlist so you don't have to manually repopulate the list so it might actually be usable now (after how many years?)
r_stains now defaults to 0, and is no longer enabled by presets. use decals if you want that sort of thing.
added fs_noreexec cvar, so configs will not be reexeced on gamedir change. this also means defaults won't be reapplied, etc.
added 'nvvk' renderer on windows, using nvidia's vulkan-inside-opengl gl extension. mostly just to see how much slower it is.
fixed up the ftp server quite a lot. more complete, more compliant, and should do ipv6 properly to-boot. file transfers also threaded.
fixed potential crash inside runclientphys.
experimental sv_antilag=3 setting. totally untested. the aim is to avoid missing due to lagged knockbacks. may be expensive for the server.
browser port's websockets support fixed. experimental support for webrtc ('works for me', requires a broker server).
updated avplug(renamed to ffmpeg so people know what it is) to use ffmpeg 3.2.4 properly, with its new encoder api. should be much more robust... also added experimental audio decoder for game music etc (currently doesn't resample, so playback rates are screwed, disabled by cvar).
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5097 fc73d0e0-1445-4013-8a0c-d673dee63da5
2017-05-10 02:08:58 +00:00
ret = crypt . pCertCreateSelfSignCertificate (
2023-02-20 08:35:56 +00:00
prov ,
playdemo accepts https urls now. will start playing before the file has finished downloading, to avoid unnecessary delays.
reworked network addresses to separate address family and connection type. this should make banning people more reliable, as well as simplifying a whole load of logic (no need to check for ipv4 AND ipv6).
tcpconnect will keep trying to connect even if the connection wasn't instant, instead of giving up instantly.
rewrote tcp connections quite a bit. sv_port_tcp now handles qtv+qizmo+http+ws+rtcbroker+tls equivalents.
qtv_streamport is now a legacy cvar and now acts equivalently to sv_port_tcp (but still separate).
rewrote screenshot and video capture code to use strides. this solves image-is-upside down issues with vulkan.
ignore alt key in browser port. oh no! no more red text! oh no! no more alt-being-wrongly-down-and-being-unable-to-type-anything-without-forcing-alt-released!
reworked audio decoder interface. now has clearly defined success/unavailable/end-of-file results. this should solve a whole load of issues with audio streaming.
fixed various openal audio streaming issues too. openal also got some workarounds for emscripten's poor emulation.
fixed ogg decoder to retain sync properly if seeked.
updated menu_media a bit. now reads vorbis comments/id3v1 tags to get proper track names. also saves the playlist so you don't have to manually repopulate the list so it might actually be usable now (after how many years?)
r_stains now defaults to 0, and is no longer enabled by presets. use decals if you want that sort of thing.
added fs_noreexec cvar, so configs will not be reexeced on gamedir change. this also means defaults won't be reapplied, etc.
added 'nvvk' renderer on windows, using nvidia's vulkan-inside-opengl gl extension. mostly just to see how much slower it is.
fixed up the ftp server quite a lot. more complete, more compliant, and should do ipv6 properly to-boot. file transfers also threaded.
fixed potential crash inside runclientphys.
experimental sv_antilag=3 setting. totally untested. the aim is to avoid missing due to lagged knockbacks. may be expensive for the server.
browser port's websockets support fixed. experimental support for webrtc ('works for me', requires a broker server).
updated avplug(renamed to ffmpeg so people know what it is) to use ffmpeg 3.2.4 properly, with its new encoder api. should be much more robust... also added experimental audio decoder for game music etc (currently doesn't resample, so playback rates are screwed, disabled by cvar).
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5097 fc73d0e0-1445-4013-8a0c-d673dee63da5
2017-05-10 02:08:58 +00:00
& issuerblob ,
0 ,
2023-02-20 08:35:56 +00:00
& kpi ,
playdemo accepts https urls now. will start playing before the file has finished downloading, to avoid unnecessary delays.
reworked network addresses to separate address family and connection type. this should make banning people more reliable, as well as simplifying a whole load of logic (no need to check for ipv4 AND ipv6).
tcpconnect will keep trying to connect even if the connection wasn't instant, instead of giving up instantly.
rewrote tcp connections quite a bit. sv_port_tcp now handles qtv+qizmo+http+ws+rtcbroker+tls equivalents.
qtv_streamport is now a legacy cvar and now acts equivalently to sv_port_tcp (but still separate).
rewrote screenshot and video capture code to use strides. this solves image-is-upside down issues with vulkan.
ignore alt key in browser port. oh no! no more red text! oh no! no more alt-being-wrongly-down-and-being-unable-to-type-anything-without-forcing-alt-released!
reworked audio decoder interface. now has clearly defined success/unavailable/end-of-file results. this should solve a whole load of issues with audio streaming.
fixed various openal audio streaming issues too. openal also got some workarounds for emscripten's poor emulation.
fixed ogg decoder to retain sync properly if seeked.
updated menu_media a bit. now reads vorbis comments/id3v1 tags to get proper track names. also saves the playlist so you don't have to manually repopulate the list so it might actually be usable now (after how many years?)
r_stains now defaults to 0, and is no longer enabled by presets. use decals if you want that sort of thing.
added fs_noreexec cvar, so configs will not be reexeced on gamedir change. this also means defaults won't be reapplied, etc.
added 'nvvk' renderer on windows, using nvidia's vulkan-inside-opengl gl extension. mostly just to see how much slower it is.
fixed up the ftp server quite a lot. more complete, more compliant, and should do ipv6 properly to-boot. file transfers also threaded.
fixed potential crash inside runclientphys.
experimental sv_antilag=3 setting. totally untested. the aim is to avoid missing due to lagged knockbacks. may be expensive for the server.
browser port's websockets support fixed. experimental support for webrtc ('works for me', requires a broker server).
updated avplug(renamed to ffmpeg so people know what it is) to use ffmpeg 3.2.4 properly, with its new encoder api. should be much more robust... also added experimental audio decoder for game music etc (currently doesn't resample, so playback rates are screwed, disabled by cvar).
git-svn-id: https://svn.code.sf.net/p/fteqw/code/trunk@5097 fc73d0e0-1445-4013-8a0c-d673dee63da5
2017-05-10 02:08:58 +00:00
& sigalg ,
NULL ,
& expiredate ,
NULL
2017-09-20 11:27:13 +00:00
) ;
}
2023-02-20 08:35:56 +00:00
if ( ! ret )
Con_Printf ( CON_ERROR " Certificate generation failed... \n " ) ;
else
{
//this is stupid and redundant, yet apparently still needed.
kpi . pwszContainerName = container ;
kpi . pwszProvName = provname ;
kpi . dwProvType = provtype ;
kpi . dwFlags = CRYPT_MACHINE_KEYSET ;
kpi . dwKeySpec = AT_KEYEXCHANGE ;
crypt . pCertSetCertificateContextProperty ( ret , CERT_KEY_PROV_INFO_PROP_ID , 0 , & kpi ) ;
2017-09-20 11:27:13 +00:00
2023-02-20 08:35:56 +00:00
{
HCRYPTPROV hprov = 0 ;
DWORD keyspec = 0 ;
BOOL willbefalse = false ;
if ( ! crypt . pCryptAcquireCertificatePrivateKey ( ret , 0 , NULL , & hprov , & keyspec , & willbefalse ) )
{
Con_Printf ( CON_ERROR " Private key is defective. \n " ) ;
return NULL ;
}
}
//write it to disk
{
wchar_t password [ 512 ] ;
CRYPT_DATA_BLOB blob = { 0 } ;
HCERTSTORE store = crypt . pCertOpenStore ( CERT_STORE_PROV_MEMORY , 0 , 0 , CERT_STORE_CREATE_NEW_FLAG , NULL ) ;
if ( store )
{
if ( crypt . pCertAddCertificateContextToStore ( store , ret , CERT_STORE_ADD_ALWAYS , NULL ) )
{
DWORD fucksake = countof ( password ) ;
if ( ! GetUserNameW ( password , & fucksake ) ) //use their username as a password. at least it'll block most accidental redistriction. should prolly mix in their computer name, w/e
* password = 0 ;
if ( crypt . pPFXExportCertStoreEx ( store , & blob , password , NULL , EXPORT_PRIVATE_KEYS | REPORT_NO_PRIVATE_KEY | REPORT_NOT_ABLE_TO_EXPORT_PRIVATE_KEY ) )
{
blob . pbData = alloca ( blob . cbData ) ;
if ( crypt . pPFXExportCertStoreEx ( store , & blob , password , NULL , EXPORT_PRIVATE_KEYS | REPORT_NO_PRIVATE_KEY | REPORT_NOT_ABLE_TO_EXPORT_PRIVATE_KEY ) )
{
if ( blob . cbData )
{
if ( ! FS_WriteFile ( pfxname ? pfxname : " identity.pfx " , blob . pbData , blob . cbData , pfxname ? FS_SYSTEM : FS_ROOT ) )
Con_Printf ( CON_ERROR " FS_WriteFile(%s) failed \n " , pfxname ? pfxname : " identity.pfx " ) ;
}
else
Con_Printf ( CON_ERROR " PFXExportCertStoreEx no data \n " ) ;
}
else
Con_Printf ( CON_ERROR " PFXExportCertStoreEx failed \n " ) ;
}
else
Con_Printf ( CON_ERROR " PFXExportCertStoreEx failed \n " ) ;
}
else
Con_Printf ( CON_ERROR " CertAddCertificateContextToStore failed \n " ) ;
crypt . pCertCloseStore ( store , 0 ) ;
}
else
Con_Printf ( CON_ERROR " CertOpenStore failed \n " ) ;
}
{
char fdn [ 1024 ] ;
char digest [ DIGEST_MAXSIZE ] ;
char b64 [ DIGEST_MAXSIZE * 2 + 1 ] ;
size_t dgsz = CalcHash ( & hash_sha1 , digest , sizeof ( digest ) , ret - > pbCertEncoded , ret - > cbCertEncoded ) ;
Base64_EncodeBlock ( digest , dgsz , b64 , sizeof ( b64 ) ) ;
Con_Printf ( " Generated Certificate fingerprint is %s \n " , b64 ) ;
crypt . pCertNameToStrA ( ret - > dwCertEncodingType , & ret - > pCertInfo - > Subject , CERT_X500_NAME_STR , fdn , sizeof ( fdn ) ) ;
Con_Printf ( " Generated Certificate DN: %s \n " , fdn ) ;
}
}
2017-09-20 11:27:13 +00:00
Z_Free ( issuerblob . pbData ) ;
2023-02-20 08:35:56 +00:00
2017-09-20 11:27:13 +00:00
return ret ;
}
static void SSPI_GenServerCredentials ( sslfile_t * f )
{
SECURITY_STATUS ss ;
TimeStamp Lifetime ;
SCHANNEL_CRED SchannelCred ;
PCCERT_CONTEXT cred ;
memset ( & SchannelCred , 0 , sizeof ( SchannelCred ) ) ;
SchannelCred . dwVersion = SCHANNEL_CRED_VERSION ;
SchannelCred . grbitEnabledProtocols = f - > datagram ? USE_PROT_DGRAM_SERVER : USE_PROT_SERVER ;
SchannelCred . dwFlags | = SCH_CRED_NO_SYSTEM_MAPPER | SCH_CRED_DISABLE_RECONNECTS ; /*don't use windows login info or anything*/
cred = SSPI_GetServerCertificate ( ) ;
SchannelCred . cCreds = 1 ;
SchannelCred . paCred = & cred ;
if ( ! cred )
{
2020-08-13 10:09:39 +00:00
SSPI_Error ( f , localtext ( " Unable to load/generate certificate \n " ) ) ;
2017-09-20 11:27:13 +00:00
return ;
}
ss = secur . pAcquireCredentialsHandleA ( NULL , UNISP_NAME_A , SECPKG_CRED_INBOUND , NULL , & SchannelCred , NULL , NULL , & f - > cred , & Lifetime ) ;
2023-02-20 08:35:56 +00:00
if ( FAILED ( ss ) & & f - > datagram )
{ //try again with just dtls1, for <win10
SchannelCred . grbitEnabledProtocols = SP_PROT_DTLS1_0_SERVER ;
ss = secur . pAcquireCredentialsHandleA ( NULL , UNISP_NAME_A , SECPKG_CRED_INBOUND , NULL , & SchannelCred , NULL , NULL , & f - > cred , & Lifetime ) ;
}
if ( FAILED ( ss ) )
2017-09-20 11:27:13 +00:00
{
2023-02-20 08:35:56 +00:00
SSPI_Error ( f , localtext ( " WinSSPI: AcquireCredentialsHandle failed %#x \n " ) , ss ) ;
2017-09-20 11:27:13 +00:00
return ;
}
}
static void SSPI_Handshake ( sslfile_t * f )
{
SECURITY_STATUS ss ;
TimeStamp Lifetime ;
SecBufferDesc OutBuffDesc ;
SecBuffer OutSecBuff [ 8 ] ;
SecBufferDesc InBuffDesc ;
SecBuffer InSecBuff [ 8 ] ;
ULONG ContextAttributes ;
SCHANNEL_CRED SchannelCred ;
int i ;
qboolean retries = 5 ;
retry :
if ( f - > outcrypt . avail )
{
//don't let things build up too much
SSPI_TryFlushCryptOut ( f ) ;
if ( f - > outcrypt . avail )
return ;
}
//FIXME: skip this if we've had no new data since last time
OutBuffDesc . ulVersion = SECBUFFER_VERSION ;
OutBuffDesc . cBuffers = countof ( OutSecBuff ) ;
OutBuffDesc . pBuffers = OutSecBuff ;
OutSecBuff [ 0 ] . BufferType = SECBUFFER_TOKEN ;
OutSecBuff [ 0 ] . cbBuffer = f - > outcrypt . datasize - f - > outcrypt . avail ;
OutSecBuff [ 0 ] . pvBuffer = f - > outcrypt . data + f - > outcrypt . avail ;
for ( i = 0 ; i < OutBuffDesc . cBuffers ; i + + )
{
OutSecBuff [ i ] . BufferType = SECBUFFER_EMPTY ;
OutSecBuff [ i ] . pvBuffer = NULL ;
OutSecBuff [ i ] . cbBuffer = 0 ;
}
if ( f - > handshaking = = HS_ERROR )
return ; //gave up.
else if ( f - > handshaking = = HS_STARTCLIENT )
{
2023-02-20 08:35:56 +00:00
PCCERT_CONTEXT cert ;
2017-09-20 11:27:13 +00:00
//no input data yet.
f - > handshaking = HS_CLIENT ;
memset ( & SchannelCred , 0 , sizeof ( SchannelCred ) ) ;
SchannelCred . dwVersion = SCHANNEL_CRED_VERSION ;
SchannelCred . grbitEnabledProtocols = f - > datagram ? USE_PROT_DGRAM_CLIENT : USE_PROT_CLIENT ;
SchannelCred . dwFlags | = SCH_CRED_SNI_CREDENTIAL | SCH_CRED_NO_DEFAULT_CREDS ; /*don't use windows login info or anything*/
2023-02-20 08:35:56 +00:00
//just always use the same credentials, cos we're lazy and lame, and windows users don't give a shit about privacy anyway.
cert = SSPI_GetServerCertificate ( ) ;
if ( cert )
{
SchannelCred . cCreds = 1 ;
SchannelCred . paCred = & cert ;
}
2017-09-20 11:27:13 +00:00
ss = secur . pAcquireCredentialsHandleA ( NULL , UNISP_NAME_A , SECPKG_CRED_OUTBOUND , NULL , & SchannelCred , NULL , NULL , & f - > cred , & Lifetime ) ;
2023-02-20 08:35:56 +00:00
if ( FAILED ( ss ) & & f - > datagram )
{
SchannelCred . grbitEnabledProtocols = SP_PROT_DTLS1_0_CLIENT ;
ss = secur . pAcquireCredentialsHandleA ( NULL , UNISP_NAME_A , SECPKG_CRED_OUTBOUND , NULL , & SchannelCred , NULL , NULL , & f - > cred , & Lifetime ) ;
}
2017-09-20 11:27:13 +00:00
if ( ss < 0 )
{
2023-02-20 08:35:56 +00:00
SSPI_Error ( f , localtext ( " WINSSPI: AcquireCredentialsHandle failed (%x) \n " ) , ( int ) ss ) ;
2017-09-20 11:27:13 +00:00
return ;
}
ss = secur . pInitializeSecurityContextW ( & f - > cred , NULL , f - > wpeername , MessageAttribute | ( f - > datagram ? ISC_REQ_DATAGRAM : ISC_REQ_STREAM ) , 0 , SECURITY_NATIVE_DREP , NULL , 0 , & f - > sechnd , & OutBuffDesc , & ContextAttributes , & Lifetime ) ;
}
else if ( f - > handshaking = = HS_CLIENT )
{
//only if we actually have data.
if ( ! f - > incrypt . avail & & ! f - > datagram )
return ;
InBuffDesc . ulVersion = SECBUFFER_VERSION ;
InBuffDesc . cBuffers = 4 ;
InBuffDesc . pBuffers = InSecBuff ;
i = 0 ;
if ( f - > incrypt . avail )
{
InSecBuff [ i ] . BufferType = SECBUFFER_TOKEN ;
InSecBuff [ i ] . cbBuffer = f - > incrypt . avail ;
InSecBuff [ i ] . pvBuffer = f - > incrypt . data ;
i + + ;
}
for ( ; i < InBuffDesc . cBuffers ; i + + )
{
InSecBuff [ i ] . BufferType = SECBUFFER_EMPTY ;
InSecBuff [ i ] . pvBuffer = NULL ;
InSecBuff [ i ] . cbBuffer = 0 ;
}
2023-02-20 08:35:56 +00:00
ss = secur . pInitializeSecurityContextW ( & f - > cred , & f - > sechnd , NULL , MessageAttribute | ( f - > datagram ? ISC_REQ_DATAGRAM : ISC_REQ_STREAM ) , 0 , SECURITY_NETWORK_DREP , & InBuffDesc , 0 , NULL , & OutBuffDesc , & ContextAttributes , & Lifetime ) ;
2017-09-20 11:27:13 +00:00
if ( ss = = SEC_E_INCOMPLETE_MESSAGE )
2023-02-20 08:35:56 +00:00
{ //TLS splits the data randomly, so this should not be considered fatal
// Con_Printf("SEC_E_INCOMPLETE_MESSAGE (available %i)\n", (int)f->incrypt.avail);
2017-09-20 11:27:13 +00:00
if ( ! f - > datagram & & f - > incrypt . avail = = f - > incrypt . datasize )
SSPI_ExpandBuffer ( & f - > incrypt , f - > incrypt . datasize + 1024 ) ;
return ;
}
else if ( ss = = SEC_E_INVALID_TOKEN )
{
// Con_Printf("SEC_E_INVALID_TOKEN\n");
if ( f - > datagram )
return ; //our udp protocol may have non-dtls packets mixed in. besides, we don't want to die from spoofed packets.
}
// else if (ss == SEC_I_MESSAGE_FRAGMENT)
// Con_Printf("SEC_I_MESSAGE_FRAGMENT\n");
// else if (ss == SEC_I_CONTINUE_NEEDED)
// Con_Printf("SEC_I_CONTINUE_NEEDED\n");
// else
// Con_Printf("InitializeSecurityContextA %x\n", ss);
//any extra data should still remain for the next time around. this might be more handshake data or payload data.
if ( InSecBuff [ 1 ] . BufferType = = SECBUFFER_EXTRA )
{
memmove ( f - > incrypt . data , f - > incrypt . data + ( f - > incrypt . avail - InSecBuff [ 1 ] . cbBuffer ) , InSecBuff [ 1 ] . cbBuffer ) ;
f - > incrypt . avail = InSecBuff [ 1 ] . cbBuffer ;
}
else f - > incrypt . avail = 0 ;
}
else if ( f - > handshaking = = HS_STARTSERVER | | f - > handshaking = = HS_SERVER )
{
//only if we actually have data.
if ( ! f - > incrypt . avail )
return ;
InBuffDesc . ulVersion = SECBUFFER_VERSION ;
InBuffDesc . cBuffers = countof ( InSecBuff ) ;
InBuffDesc . pBuffers = InSecBuff ;
i = 0 ;
if ( f - > incrypt . avail )
{
InSecBuff [ i ] . BufferType = SECBUFFER_TOKEN ;
InSecBuff [ i ] . cbBuffer = f - > incrypt . avail ;
InSecBuff [ i ] . pvBuffer = f - > incrypt . data ;
i + + ;
}
2023-02-20 08:35:56 +00:00
if ( f - > datagram )
{ //for dtls's cookie
InSecBuff [ i ] . BufferType = SECBUFFER_EXTRA ;
InSecBuff [ i ] . cbBuffer = 11 ;
InSecBuff [ i ] . pvBuffer = " Hello World " ;
i + + ;
}
2017-09-20 11:27:13 +00:00
for ( ; i < InBuffDesc . cBuffers ; i + + )
{
InSecBuff [ i ] . BufferType = SECBUFFER_EMPTY ;
InSecBuff [ i ] . pvBuffer = NULL ;
InSecBuff [ i ] . cbBuffer = 0 ;
}
i = 1 ;
OutSecBuff [ i + + ] . BufferType = SECBUFFER_EXTRA ;
2023-02-20 08:35:56 +00:00
OutSecBuff [ i + + ] . BufferType = SECBUFFER_ALERT ;
2017-09-20 11:27:13 +00:00
2023-02-20 08:35:56 +00:00
# define ServerMessageAttribute (ASC_REQ_SEQUENCE_DETECT | ASC_REQ_REPLAY_DETECT | ASC_REQ_CONFIDENTIALITY | /*ASC_REQ_EXTENDED_ERROR |*/ ASC_REQ_ALLOCATE_MEMORY)
ContextAttributes = ServerMessageAttribute | ( f - > datagram ? ASC_REQ_DATAGRAM : ASC_REQ_STREAM ) ;
// if (f->peerhash) //for ICE
// ContextAttributes |= ASC_REQ_MUTUAL_AUTH;
2017-09-20 11:27:13 +00:00
ss = secur . pAcceptSecurityContext ( & f - > cred , ( f - > handshaking = = HS_SERVER ) ? & f - > sechnd : NULL , & InBuffDesc ,
2023-02-20 08:35:56 +00:00
ContextAttributes , SECURITY_NETWORK_DREP , & f - > sechnd ,
2017-09-20 11:27:13 +00:00
& OutBuffDesc , & ContextAttributes , NULL ) ;
2023-02-20 08:35:56 +00:00
if ( f - > datagram & & ss = = SEC_I_CONTINUE_NEEDED & & f - > handshaking ! = HS_SERVER )
{ //this seems wrong, but schannel complains if we don't continue to pass null above.
secur . pDeleteSecurityContext ( & f - > sechnd ) ; //avoid leaks
memset ( & f - > sechnd , 0 , sizeof ( f - > sechnd ) ) ;
}
else
f - > handshaking = HS_SERVER ;
2017-09-20 11:27:13 +00:00
if ( ss = = SEC_E_INVALID_TOKEN )
2023-02-20 08:35:56 +00:00
{ //sender sent us something that wasn't (d)tls.
2017-09-20 11:27:13 +00:00
// Con_Printf("SEC_E_INVALID_TOKEN\n");
if ( f - > datagram )
return ;
}
else if ( ss = = SEC_E_INCOMPLETE_MESSAGE )
{
// Con_Printf("SEC_E_INCOMPLETE_MESSAGE\n");
if ( ! f - > datagram & & f - > incrypt . avail = = f - > incrypt . datasize )
SSPI_ExpandBuffer ( & f - > incrypt , f - > incrypt . datasize + 1024 ) ;
return ;
}
2023-02-20 08:35:56 +00:00
// else if (FAILED(ss))
// Con_Printf("AcceptSecurityContext %x\n", ss);
2017-09-20 11:27:13 +00:00
//any extra data should still remain for the next time around. this might be more handshake data or payload data.
2023-02-20 08:35:56 +00:00
if ( InSecBuff [ 1 ] . BufferType = = SECBUFFER_EXTRA & & ! f - > datagram )
2017-09-20 11:27:13 +00:00
{
memmove ( f - > incrypt . data , f - > incrypt . data + ( f - > incrypt . avail - InSecBuff [ 1 ] . cbBuffer ) , InSecBuff [ 1 ] . cbBuffer ) ;
f - > incrypt . avail = InSecBuff [ 1 ] . cbBuffer ;
}
else f - > incrypt . avail = 0 ;
}
else
return ;
2020-08-13 10:09:39 +00:00
2017-09-20 11:27:13 +00:00
if ( ss = = SEC_I_INCOMPLETE_CREDENTIALS )
{
2023-02-20 08:35:56 +00:00
//FIXME: load/generate our identity, redo the pAcquireCredentialsHandleA
Con_TPrintf ( CON_WARNING " server requires credentials, attempting to ignore \n " ) ;
goto retry ;
2017-09-20 11:27:13 +00:00
}
2023-02-20 08:35:56 +00:00
if ( FAILED ( ss ) )
2017-09-20 11:27:13 +00:00
{
2023-02-20 08:35:56 +00:00
const char * fname = ( f - > handshaking > = HS_STARTSERVER ) ? " AcceptSecurityContext " : " InitializeSecurityContext " ;
2017-09-20 11:27:13 +00:00
switch ( ss )
{
2023-02-20 08:35:56 +00:00
case SEC_E_ALGORITHM_MISMATCH : SSPI_Error ( f , " %s failed: SEC_E_ALGORITHM_MISMATCH \n " , fname ) ; break ;
case SEC_E_INVALID_HANDLE : SSPI_Error ( f , " %s failed: SEC_E_INVALID_HANDLE \n " , fname ) ; break ;
case SEC_E_ILLEGAL_MESSAGE : SSPI_Error ( f , " %s failed: SEC_E_ILLEGAL_MESSAGE \n " , fname ) ; break ;
case SEC_E_INVALID_TOKEN : SSPI_Error ( f , " %s failed: SEC_E_INVALID_TOKEN \n " , fname ) ; break ;
case SEC_E_INVALID_PARAMETER : SSPI_Error ( f , " %s failed: SEC_E_INVALID_PARAMETER \n " , fname ) ; break ;
case SEC_E_INTERNAL_ERROR : SSPI_Error ( f , " %s failed: SEC_E_INTERNAL_ERROR \n " , fname ) ; break ;
default : SSPI_Error ( f , " %s failed: %lx \n " , fname , ( long ) ss ) ; break ;
2017-09-20 11:27:13 +00:00
}
return ;
}
if ( ( SEC_I_COMPLETE_NEEDED = = ss ) | | ( SEC_I_COMPLETE_AND_CONTINUE = = ss ) )
{
ss = secur . pCompleteAuthToken ( & f - > sechnd , & OutBuffDesc ) ;
if ( ss < 0 )
{
SSPI_Error ( f , " CompleteAuthToken failed \n " ) ;
return ;
}
}
//its all okay and established if we get this far.
if ( ss = = SEC_E_OK )
{
SecPkgContext_StreamSizes strsizes ;
CERT_CONTEXT * remotecert ;
2023-02-20 08:35:56 +00:00
// Con_Printf("ContextAttributes: %x (%s, %s)\n", ContextAttributes, (f->handshaking == HS_SERVER)?"sv":"cl", f->datagram?"dtls":"tls");
if ( f - > datagram )
{ //ask for a bit bigger. we use sendto for mtu guessing, schannel spitting out errors for arbitrary lower values is just annoying - it knows nothing about the actual connection.
ULONG mtu = 8192 ;
secur . pSetContextAttributesA ( & f - > sechnd , SECPKG_ATTR_DTLS_MTU , & mtu , sizeof ( mtu ) ) ;
}
2017-09-20 11:27:13 +00:00
secur . pQueryContextAttributesA ( & f - > sechnd , SECPKG_ATTR_STREAM_SIZES , & strsizes ) ;
f - > headersize = strsizes . cbHeader ;
f - > footersize = strsizes . cbTrailer ;
2023-02-20 08:35:56 +00:00
f - > mtu = strsizes . cbMaximumMessage - ( f - > headersize + f - > footersize ) ; //compute the maximum payload we can actually get with that.
2017-09-20 11:27:13 +00:00
if ( f - > handshaking ! = HS_SERVER )
{ //server takes an annonymous client. client expects a proper certificate.
if ( * f - > wpeername )
{
ss = secur . pQueryContextAttributesA ( & f - > sechnd , SECPKG_ATTR_REMOTE_CERT_CONTEXT , & remotecert ) ;
if ( ss ! = SEC_E_OK )
{
2020-08-13 10:09:39 +00:00
SSPI_Error ( f , localtext ( " unable to read server's certificate \n " ) ) ;
2017-09-20 11:27:13 +00:00
return ;
}
if ( VerifyServerCertificate ( remotecert , f - > wpeername , 0 , f - > datagram ) )
{
2023-02-20 08:35:56 +00:00
SSPI_Error ( f , localtext ( " Error validating certificate \n " ) ) ;
2017-09-20 11:27:13 +00:00
return ;
}
}
else
Sys_Printf ( " SSL/TLS Server name not specified, skipping verification \n " ) ;
}
f - > handshaking = HS_ESTABLISHED ;
}
//send early, send often.
# ifdef HAVE_DTLS
if ( f - > transmit )
{
for ( i = 0 ; i < OutBuffDesc . cBuffers ; i + + )
if ( OutSecBuff [ i ] . BufferType = = SECBUFFER_TOKEN & & OutSecBuff [ i ] . cbBuffer )
2023-02-20 08:35:56 +00:00
{
f - > resendtimer = realtime + 0.2 ;
2017-09-20 11:27:13 +00:00
f - > transmit ( f - > cbctx , OutSecBuff [ i ] . pvBuffer , OutSecBuff [ i ] . cbBuffer ) ;
2023-02-20 08:35:56 +00:00
}
2017-09-20 11:27:13 +00:00
}
else
# endif
{
i = 0 ;
if ( SSPI_CopyIntoBuffer ( & f - > outcrypt , OutSecBuff [ i ] . pvBuffer , OutSecBuff [ i ] . cbBuffer , true ) < OutSecBuff [ i ] . cbBuffer )
{
SSPI_Error ( f , " crypt overflow \n " ) ;
return ;
}
SSPI_TryFlushCryptOut ( f ) ;
}
if ( f - > handshaking = = HS_ESTABLISHED )
SSPI_Encode ( f ) ;
else if ( ss = = SEC_I_MESSAGE_FRAGMENT ) //looks like we can connect faster if we loop when we get this result.
if ( retries - - > 0 )
goto retry ;
}
static int QDECL SSPI_ReadBytes ( struct vfsfile_s * file , void * buffer , int bytestoread )
{
sslfile_t * f = ( sslfile_t * ) file ;
int err = SSPI_CheckNewInCrypt ( f ) ;
if ( f - > handshaking )
{
SSPI_Handshake ( f ) ;
return err ;
}
SSPI_Encode ( f ) ;
SSPI_Decode ( f ) ;
bytestoread = min ( bytestoread , f - > inraw . avail ) ;
if ( bytestoread )
{
memcpy ( buffer , f - > inraw . data , bytestoread ) ;
f - > inraw . avail - = bytestoread ;
memmove ( f - > inraw . data , f - > inraw . data + bytestoread , f - > inraw . avail ) ;
}
else
{
if ( err )
return err ;
}
return bytestoread ;
}
static int QDECL SSPI_WriteBytes ( struct vfsfile_s * file , const void * buffer , int bytestowrite )
{
sslfile_t * f = ( sslfile_t * ) file ;
//don't endlessly accept data faster than we can push it out.
//we'll buffer a little, but don't go overboard
if ( f - > outcrypt . avail > 8192 )
2023-02-20 08:35:56 +00:00
return 0 ;
2017-09-20 11:27:13 +00:00
bytestowrite = SSPI_CopyIntoBuffer ( & f - > outraw , buffer , bytestowrite , false ) ;
if ( f - > handshaking )
{
SSPI_CheckNewInCrypt ( f ) ; //make sure its ticking over
SSPI_Handshake ( f ) ;
}
else
{
SSPI_Encode ( f ) ;
}
return bytestowrite ;
}
static qboolean QDECL SSPI_Seek ( struct vfsfile_s * file , qofs_t pos )
{
SSPI_Error ( ( sslfile_t * ) file , " unable to seek on streams \n " ) ;
return false ;
}
static qofs_t QDECL SSPI_Tell ( struct vfsfile_s * file )
{
SSPI_Error ( ( sslfile_t * ) file , " unable to seek on streams \n " ) ;
return 0 ;
}
static qofs_t QDECL SSPI_GetLen ( struct vfsfile_s * file )
{
return 0 ;
}
static qboolean QDECL SSPI_Close ( struct vfsfile_s * file )
{
sslfile_t * f = ( sslfile_t * ) file ;
qboolean success = f - > stream ! = NULL ;
SSPI_Error ( f , " " ) ;
Z_Free ( f - > outraw . data ) ;
Z_Free ( f - > outcrypt . data ) ;
Z_Free ( f - > inraw . data ) ;
Z_Free ( f - > incrypt . data ) ;
Z_Free ( f ) ;
return success ;
}
# include <wchar.h>
2023-02-20 08:35:56 +00:00
static qboolean CleanUpHostname ( const char * hostname , wchar_t * out , size_t outcount )
{ //strip any fte-specific junk, like dtls:// or [] or :
const char * hostnameend ;
const char * host = strstr ( hostname , " :// " ) ;
2017-09-20 11:27:13 +00:00
int i = 0 ;
2023-02-20 08:35:56 +00:00
if ( host )
hostname = host + 3 ;
hostnameend = hostname + strlen ( hostname ) ;
//any dtls:// prefix will have been stripped now.
if ( * hostname = = ' [ ' )
{ //eg: [::1]:foo - skip the lead [ and strip the ] and any trailing data (hopefully just a :port or nothing)
hostname + + ;
host = strchr ( hostname , ' ] ' ) ;
if ( host )
hostnameend = host ;
2017-09-20 11:27:13 +00:00
}
else
2023-02-20 08:35:56 +00:00
{ //eg: 127.0.0.1:port - strip the port number if specified.
host = strchr ( hostname , ' : ' ) ;
if ( host )
hostnameend = host ;
2017-09-20 11:27:13 +00:00
}
2023-02-20 08:35:56 +00:00
while ( hostname < hostnameend )
2017-09-20 11:27:13 +00:00
{
2023-02-20 08:35:56 +00:00
int err ;
int c = utf8_decode ( & err , hostname , ( void * ) & hostname ) ;
2017-09-20 11:27:13 +00:00
if ( c > WCHAR_MAX )
err = true ; //no 16bit surrogates. they're evil.
2023-02-20 08:35:56 +00:00
else if ( i = = outcount - 1 )
2017-09-20 11:27:13 +00:00
err = true ; //no space to store it
else
2023-02-20 08:35:56 +00:00
out [ i + + ] = c ;
2017-09-20 11:27:13 +00:00
if ( err )
{
2023-02-20 08:35:56 +00:00
out [ i ] = 0 ;
return false ;
2017-09-20 11:27:13 +00:00
}
}
2023-02-20 08:35:56 +00:00
out [ i ] = 0 ;
return true ;
}
static vfsfile_t * SSPI_OpenVFS ( const char * servername , vfsfile_t * source , qboolean server )
{
sslfile_t * newf ;
if ( ! source | | ! SSL_Inited ( ) )
return NULL ;
/*
if ( server ) //unsupported
return NULL ;
*/
newf = Z_Malloc ( sizeof ( * newf ) ) ;
if ( ! CleanUpHostname ( server ? " " : servername , newf - > wpeername , countof ( newf - > wpeername ) ) )
{
Z_Free ( newf ) ;
return NULL ;
}
2017-09-20 11:27:13 +00:00
newf - > handshaking = server ? HS_STARTSERVER : HS_STARTCLIENT ;
newf - > stream = source ;
newf - > funcs . Close = SSPI_Close ;
newf - > funcs . Flush = NULL ;
newf - > funcs . GetLen = SSPI_GetLen ;
newf - > funcs . ReadBytes = SSPI_ReadBytes ;
newf - > funcs . Seek = SSPI_Seek ;
newf - > funcs . Tell = SSPI_Tell ;
newf - > funcs . WriteBytes = SSPI_WriteBytes ;
newf - > funcs . seekstyle = SS_UNSEEKABLE ;
SSPI_ExpandBuffer ( & newf - > outraw , 8192 ) ;
SSPI_ExpandBuffer ( & newf - > outcrypt , 8192 ) ;
SSPI_ExpandBuffer ( & newf - > inraw , 8192 ) ;
SSPI_ExpandBuffer ( & newf - > incrypt , 8192 ) ;
if ( server )
SSPI_GenServerCredentials ( newf ) ;
return & newf - > funcs ;
}
# ifndef SECPKG_ATTR_UNIQUE_BINDINGS
# define SECPKG_ATTR_UNIQUE_BINDINGS 25
typedef struct _SecPkgContext_Bindings
{
unsigned long BindingsLength ;
SEC_CHANNEL_BINDINGS * Bindings ;
} SecPkgContext_Bindings , * PSecPkgContext_Bindings ;
# endif
2021-06-21 13:43:57 +00:00
static int SSPI_GetChannelBinding ( vfsfile_t * vf , qbyte * binddata , size_t * bindsize )
2017-09-20 11:27:13 +00:00
{
int ret ;
sslfile_t * f = ( sslfile_t * ) vf ;
SecPkgContext_Bindings bindings ;
if ( vf - > Close ! = SSPI_Close )
return - 2 ; //not one of ours.
bindings . BindingsLength = 0 ;
bindings . Bindings = NULL ;
ret = 0 ;
switch ( secur . pQueryContextAttributesA ( & f - > sechnd , SECPKG_ATTR_UNIQUE_BINDINGS , & bindings ) )
{
case SEC_E_OK :
2023-02-20 08:35:56 +00:00
if ( bindings . Bindings - > cbApplicationDataLength < = * bindsize & & ! Q_strncasecmp ( ( ( char * ) bindings . Bindings ) + bindings . Bindings - > dwApplicationDataOffset , " tls-unique: " , 11 ) )
2017-09-20 11:27:13 +00:00
{
//will contain 'tls-unique:BINARYDATA'
* bindsize = bindings . Bindings - > cbApplicationDataLength - 11 ;
memcpy ( binddata , ( ( unsigned char * ) bindings . Bindings ) + bindings . Bindings - > dwApplicationDataOffset + 11 , bindings . Bindings - > cbApplicationDataLength - 11 ) ;
ret = 1 ;
}
//FIXME: leak
//secur.pFreeContextBuffer(bindings.Bindings);
break ;
case SEC_E_UNSUPPORTED_FUNCTION :
ret = - 1 ; //schannel doesn't support it. too old an OS, I guess.
break ;
default :
break ;
}
return ret ;
}
# include "netinc.h"
2021-06-21 13:43:57 +00:00
# if defined(HAVE_DTLS)
2022-04-17 19:46:57 +00:00
static void * SSPI_DTLS_CreateContext ( const dtlscred_t * credinfo , void * cbctx , neterr_t ( * push ) ( void * cbctx , const qbyte * data , size_t datasize ) , qboolean isserver )
2017-09-20 11:27:13 +00:00
{
sslfile_t * ctx ;
if ( ! SSL_Inited ( ) )
return NULL ;
ctx = Z_Malloc ( sizeof ( * ctx ) ) ;
ctx - > datagram = true ;
ctx - > handshaking = isserver ? HS_STARTSERVER : HS_STARTCLIENT ;
ctx - > cbctx = cbctx ;
ctx - > transmit = push ;
2023-02-20 08:35:56 +00:00
if ( ! CleanUpHostname ( ( credinfo & & credinfo - > peer . name ) ? credinfo - > peer . name : " " , ctx - > wpeername , countof ( ctx - > wpeername ) ) )
2017-09-20 11:27:13 +00:00
{
2023-02-20 08:35:56 +00:00
Z_Free ( ctx ) ;
return NULL ;
2017-09-20 11:27:13 +00:00
}
SSPI_ExpandBuffer ( & ctx - > outraw , 8192 ) ;
SSPI_ExpandBuffer ( & ctx - > outcrypt , 65536 ) ;
SSPI_ExpandBuffer ( & ctx - > inraw , 8192 ) ;
SSPI_ExpandBuffer ( & ctx - > incrypt , 65536 ) ;
if ( isserver )
SSPI_GenServerCredentials ( ctx ) ;
else
SSPI_Handshake ( ctx ) ; //begin the initial handshake now
return ctx ;
}
static void SSPI_DTLS_DestroyContext ( void * vctx )
{
SSPI_Close ( vctx ) ;
}
static neterr_t SSPI_DTLS_Transmit ( void * ctx , const qbyte * data , size_t datasize )
{
sslfile_t * f = ( sslfile_t * ) ctx ;
2023-02-20 08:35:56 +00:00
if ( ! datasize )
{ //we use these as a way to probe whether its sendable or not yet.
if ( f - > handshaking )
{
if ( f - > resendtimer < realtime )
SSPI_Handshake ( f ) ; //keep trying...
return NETERR_CLOGGED ;
}
return NETERR_SENT ;
}
2017-09-20 11:27:13 +00:00
if ( f - > handshaking )
2023-02-20 08:35:56 +00:00
SSPI_Handshake ( f ) ; //keep trying...
if ( f - > handshaking = = HS_ERROR )
return NETERR_DISCONNECTED ;
if ( f - > handshaking )
return NETERR_CLOGGED ; //not ready yet
2017-09-20 11:27:13 +00:00
2023-02-20 08:35:56 +00:00
if ( datasize > = f - > mtu )
return NETERR_MTU ; //we're not allowed.
2017-09-20 11:27:13 +00:00
2023-02-20 08:35:56 +00:00
//sspi likes writing over the source data. make sure nothing is hurt by copying it out first.
f - > outraw . avail = 0 ;
SSPI_CopyIntoBuffer ( & f - > outraw , data , datasize , true ) ;
return SSPI_Encode ( f ) ;
2017-09-20 11:27:13 +00:00
}
2021-06-21 13:43:57 +00:00
static neterr_t SSPI_DTLS_Received ( void * ctx , sizebuf_t * msg )
2017-09-20 11:27:13 +00:00
{
int ret ;
sslfile_t * f = ( sslfile_t * ) ctx ;
2021-06-21 13:43:57 +00:00
f - > incrypt . data = msg - > data ;
f - > incrypt . avail = f - > incrypt . datasize = msg - > cursize ;
2017-09-20 11:27:13 +00:00
if ( f - > handshaking )
{
SSPI_Handshake ( f ) ;
ret = NETERR_CLOGGED ; //not ready yet
if ( f - > handshaking = = HS_ERROR )
ret = NETERR_DISCONNECTED ;
}
else
{
SSPI_Decode ( f ) ;
ret = NETERR_SENT ;
2023-02-20 08:35:56 +00:00
if ( f - > inraw . avail < msg - > maxsize )
2021-06-21 13:43:57 +00:00
msg - > cursize = f - > inraw . avail ;
else
msg - > cursize = msg - > maxsize ;
memcpy ( msg - > data , f - > inraw . data , msg - > cursize ) ;
2017-09-20 11:27:13 +00:00
f - > inraw . avail = 0 ;
}
f - > incrypt . data = NULL ;
return ret ;
}
static neterr_t SSPI_DTLS_Timeouts ( void * ctx )
{
sslfile_t * f = ( sslfile_t * ) ctx ;
if ( f - > handshaking )
{
2023-02-20 08:35:56 +00:00
SSPI_DTLS_Transmit ( ctx , NULL , 0 ) ;
2017-09-20 11:27:13 +00:00
return NETERR_CLOGGED ;
}
return NETERR_SENT ;
}
2023-02-20 08:35:56 +00:00
static qboolean SSPI_DTLS_CheckConnection ( void * cbctx , void * peeraddr , size_t peeraddrsize , void * indata , size_t insize , neterr_t ( * push ) ( void * cbctx , const qbyte * data , size_t datasize ) , void ( * EstablishTrueContext ) ( void * * cbctx , void * state ) )
{ //we got a packet that might be a 'dtls hello' packet. try figuring out what's going on.
SECURITY_STATUS ss ;
SecBufferDesc OutBuffDesc ;
SecBuffer OutSecBuff [ 8 ] ;
SecBufferDesc InBuffDesc ;
SecBuffer InSecBuff [ 8 ] ;
ULONG ContextAttributes ;
int i ;
char replymessage [ 4094 ] ;
static sslfile_t * pending ;
if ( ! pending )
{
pending = SSPI_DTLS_CreateContext ( NULL , NULL , NULL , true ) ;
if ( ! pending )
return false ;
}
InBuffDesc . ulVersion = SECBUFFER_VERSION ;
InBuffDesc . cBuffers = countof ( InSecBuff ) ;
InBuffDesc . pBuffers = InSecBuff ;
i = 0 ;
InSecBuff [ i ] . BufferType = SECBUFFER_TOKEN ;
InSecBuff [ i ] . cbBuffer = insize ;
InSecBuff [ i ] . pvBuffer = indata ;
i + + ;
//for dtls's cookie
InSecBuff [ i ] . BufferType = SECBUFFER_EXTRA ;
InSecBuff [ i ] . cbBuffer = peeraddrsize ;
InSecBuff [ i ] . pvBuffer = peeraddr ;
i + + ;
for ( ; i < InBuffDesc . cBuffers ; i + + )
{
InSecBuff [ i ] . BufferType = SECBUFFER_EMPTY ;
InSecBuff [ i ] . pvBuffer = NULL ;
InSecBuff [ i ] . cbBuffer = 0 ;
}
OutBuffDesc . ulVersion = SECBUFFER_VERSION ;
OutBuffDesc . cBuffers = countof ( OutSecBuff ) ;
OutBuffDesc . pBuffers = OutSecBuff ;
OutSecBuff [ 0 ] . BufferType = SECBUFFER_TOKEN ;
OutSecBuff [ 0 ] . cbBuffer = sizeof ( replymessage ) ;
OutSecBuff [ 0 ] . pvBuffer = replymessage ;
for ( i = 1 ; i < OutBuffDesc . cBuffers ; i + + )
{
OutSecBuff [ i ] . BufferType = SECBUFFER_EMPTY ;
OutSecBuff [ i ] . pvBuffer = NULL ;
OutSecBuff [ i ] . cbBuffer = 0 ;
}
i = 1 ;
OutSecBuff [ i + + ] . BufferType = SECBUFFER_EXTRA ;
OutSecBuff [ i + + ] . BufferType = SECBUFFER_ALERT ;
ContextAttributes = ServerMessageAttribute | ASC_REQ_DATAGRAM ;
ss = secur . pAcceptSecurityContext ( & pending - > cred , NULL , & InBuffDesc ,
ContextAttributes , SECURITY_NETWORK_DREP , & pending - > sechnd ,
& OutBuffDesc , & ContextAttributes , NULL ) ;
//expect SEC_I_CONTINUE_NEEDED for a outgoing challenge (cookie request)
//expect SEC_I_MESSAGE_FRAGMENT for anything more.
for ( i = 0 ; i < OutBuffDesc . cBuffers ; i + + )
if ( OutSecBuff [ i ] . BufferType = = SECBUFFER_TOKEN & & OutSecBuff [ i ] . cbBuffer )
push ( cbctx , OutSecBuff [ i ] . pvBuffer , OutSecBuff [ i ] . cbBuffer ) ;
if ( ss = = SEC_I_MESSAGE_FRAGMENT )
{ //looks like we got a reply to the dtls handshake. lock down its ip.
pending - > cbctx = cbctx ;
pending - > transmit = push ;
pending - > handshaking = HS_SERVER ;
EstablishTrueContext ( & pending - > cbctx , pending ) ;
pending = NULL ;
return true ;
}
//try to avoid memory leaks. this stuff isn't documented nearly well enough.
secur . pDeleteSecurityContext ( & pending - > sechnd ) ;
memset ( & pending - > sechnd , 0 , sizeof ( pending - > sechnd ) ) ;
return false ;
}
qboolean SSPI_DTLS_GenTempCertificate ( const char * subject , struct dtlslocalcred_s * cred )
{ //exporting+importing certs here is just too damn painful. use a single cert and a dummy value for the key. for webrtc this SHOULD be okay, even if its expired...
PCCERT_CONTEXT cert = SSPI_GetServerCertificate ( ) ;
if ( ! cert )
return false ;
cred - > cert = memcpy ( BZ_Malloc ( cert - > cbCertEncoded ) , cert - > pbCertEncoded , cert - > cbCertEncoded ) ;
cred - > certsize = cert - > cbCertEncoded ;
cred - > key = NULL ;
cred - > keysize = 0 ;
return true ;
}
static int SSPI_DTLS_GetPeerCertificate ( void * ctx , enum certprops_e prop , char * out , size_t outsize )
{
sslfile_t * f = ( sslfile_t * ) ctx ;
CERT_CONTEXT * cert = NULL ;
safeswitch ( prop )
{
case QCERT_ISENCRYPTED :
if ( f - > handshaking = = HS_ESTABLISHED )
return 0 ; //handshake is done, its all encrypted.
return - 1 ; //still pending, doesn't count as encrypted yet.
case QCERT_PEERCERTIFICATE :
secur . pQueryContextAttributesA ( & f - > sechnd , SECPKG_ATTR_REMOTE_CERT_CONTEXT , & cert ) ;
if ( cert & & cert - > cbCertEncoded < = outsize )
{
memcpy ( out , cert - > pbCertEncoded , cert - > cbCertEncoded ) ;
return cert - > cbCertEncoded ;
}
return - 1 ;
case QCERT_PEERSUBJECT :
secur . pQueryContextAttributesA ( & f - > sechnd , SECPKG_ATTR_REMOTE_CERT_CONTEXT , & cert ) ;
if ( cert & & cert - > cbCertEncoded < = outsize )
return crypt . pCertNameToStrA ( cert - > dwCertEncodingType , & cert - > pCertInfo - > Subject , CERT_X500_NAME_STR , out , outsize ) ;
return - 1 ;
case QCERT_LOCALCERTIFICATE :
safedefault :
return - 1 ;
}
}
2017-09-20 11:27:13 +00:00
static const dtlsfuncs_t dtlsfuncs_schannel =
{
SSPI_DTLS_CreateContext ,
2023-02-20 08:35:56 +00:00
SSPI_DTLS_CheckConnection ,
2017-06-21 01:24:25 +00:00
SSPI_DTLS_DestroyContext ,
SSPI_DTLS_Transmit ,
SSPI_DTLS_Received ,
2017-09-20 11:27:13 +00:00
SSPI_DTLS_Timeouts ,
2023-02-20 08:35:56 +00:00
SSPI_DTLS_GetPeerCertificate ,
SSPI_DTLS_GenTempCertificate
2017-09-20 11:27:13 +00:00
} ;
2023-02-20 08:35:56 +00:00
static const dtlsfuncs_t * SSPI_DTLS_InitServer ( void )
2017-09-20 11:27:13 +00:00
{
2023-02-20 08:35:56 +00:00
//make sure we can load a cert...
if ( ! SSL_Inited ( ) | | ! SSPI_GetServerCertificate ( ) )
return NULL ; //otherwise refuse to run as a server instead of causing cert issues with every restart for users.
2021-06-21 13:43:57 +00:00
return & dtlsfuncs_schannel ;
2023-02-20 08:35:56 +00:00
}
2021-06-21 13:43:57 +00:00
static const dtlsfuncs_t * SSPI_DTLS_InitClient ( void )
2017-09-20 11:27:13 +00:00
{
return & dtlsfuncs_schannel ;
}
# endif
2023-02-20 08:35:56 +00:00
# if defined(_MSC_VER) && (_MSC_VER < 1900)
# define SSPI_VerifyHash NULL //old versions of msvc are crippled...
# else
2020-04-29 10:43:22 +00:00
# define STATUS_SUCCESS ((NTSTATUS)0x00000000)
# define STATUS_INVALID_SIGNATURE ((NTSTATUS)0xC000A000)
2023-02-20 08:35:56 +00:00
# include <bcrypt.h>
2021-06-21 13:43:57 +00:00
static enum hashvalidation_e SSPI_VerifyHash ( const qbyte * hashdata , size_t hashsize , const qbyte * pemcert , size_t pemcertsize , const qbyte * signdata , size_t signsize )
2020-03-25 21:29:30 +00:00
{
NTSTATUS status ;
BCRYPT_KEY_HANDLE pubkey ;
2021-06-21 13:43:57 +00:00
const char * pem = pemcert ;
2020-03-25 21:29:30 +00:00
const char * pemend ;
qbyte * der ;
size_t dersize ;
static const void * ( WINAPI * pCertCreateContext ) ( DWORD dwContextType , DWORD dwEncodingType , const BYTE * pbEncoded , DWORD cbEncoded , DWORD dwFlags , PCERT_CREATE_CONTEXT_PARA pCreatePara ) ;
2020-04-29 10:43:22 +00:00
static BOOL ( WINAPI * pCryptImportPublicKeyInfoEx2 ) ( DWORD dwCertEncodingType , PCERT_PUBLIC_KEY_INFO pInfo , DWORD dwFlags , void * pvAuxInfo , BCRYPT_KEY_HANDLE * phKey ) ;
static BOOL ( WINAPI * pCertFreeCertificateContext ) ( PCCERT_CONTEXT pCertContext ) ;
2020-03-25 21:29:30 +00:00
static dllhandle_t * crypt32 ;
static dllfunction_t crypt32funcs [ ] = {
{ ( void * * ) & pCertCreateContext , " CertCreateContext " } ,
{ ( void * * ) & pCryptImportPublicKeyInfoEx2 , " CryptImportPublicKeyInfoEx2 " } , //WARNING: fails on wine.
{ ( void * * ) & pCertFreeCertificateContext , " CertFreeCertificateContext " } ,
{ NULL , NULL }
} ;
static NTSTATUS ( WINAPI * pBCryptVerifySignature ) ( BCRYPT_KEY_HANDLE hKey , VOID * pPaddingInfo , PUCHAR pbHash , ULONG cbHash , PUCHAR pbSignature , ULONG cbSignature , ULONG dwFlags ) ;
static NTSTATUS ( WINAPI * pBCryptDestroyKey ) ( BCRYPT_KEY_HANDLE hKey ) ;
static dllhandle_t * bcrypt ;
static dllfunction_t bcryptfuncs [ ] = {
{ ( void * * ) & pBCryptVerifySignature , " BCryptVerifySignature " } ,
{ ( void * * ) & pBCryptDestroyKey , " BCryptDestroyKey " } ,
{ NULL , NULL }
} ;
if ( ! crypt32 )
crypt32 = Sys_LoadLibrary ( " crypt32.dll " , crypt32funcs ) ;
if ( ! bcrypt )
bcrypt = Sys_LoadLibrary ( " bcrypt.dll " , bcryptfuncs ) ;
if ( ! crypt32 | | ! bcrypt )
{
Con_Printf ( " Unable to obtain required crypto functions \n " ) ;
return VH_UNSUPPORTED ;
}
if ( ! pem )
return VH_AUTHORITY_UNKNOWN ; //no public cert/key for authority.
pem = strstr ( pem , " -----BEGIN CERTIFICATE----- " ) ;
if ( ! pem )
return VH_UNSUPPORTED ; //not a pem
pem + = strlen ( " -----BEGIN CERTIFICATE----- " ) ;
pemend = strstr ( pem , " -----END CERTIFICATE----- " ) ;
if ( ! pemend )
return VH_UNSUPPORTED ;
dersize = Base64_DecodeBlock ( pem , pemend , NULL , 0 ) ; //guess
der = alloca ( dersize ) ;
dersize = Base64_DecodeBlock ( pem , pemend , der , dersize ) ;
//okay, now its in binary der format.
//make sense of the cert and pull out its public key...
{
const CERT_CONTEXT * cert = pCertCreateContext ( CERT_STORE_CERTIFICATE_CONTEXT , X509_ASN_ENCODING , der , dersize , 0 , NULL ) ;
if ( ! pCryptImportPublicKeyInfoEx2 ( X509_ASN_ENCODING , & cert - > pCertInfo - > SubjectPublicKeyInfo , 0 , NULL , & pubkey ) )
return VH_UNSUPPORTED ;
pCertFreeCertificateContext ( cert ) ;
}
//yay, now we can do what we actually wanted in the first place.
2021-06-21 13:43:57 +00:00
status = pBCryptVerifySignature ( pubkey , NULL , ( qbyte * ) hashdata , hashsize , ( qbyte * ) signdata , signsize , 0 ) ;
2020-03-25 21:29:30 +00:00
pBCryptDestroyKey ( pubkey ) ;
if ( status = = STATUS_SUCCESS )
return VH_CORRECT ; //its okay
else if ( status = = STATUS_INVALID_SIGNATURE )
return VH_INCORRECT ; //its bad
return VH_UNSUPPORTED ; //some weird transient error...?
}
2023-02-20 08:35:56 +00:00
# endif
2020-03-25 21:29:30 +00:00
2021-06-21 13:43:57 +00:00
ftecrypto_t crypto_sspi =
{
2023-02-20 08:35:56 +00:00
" SChannel " ,
2021-06-21 13:43:57 +00:00
SSPI_OpenVFS ,
SSPI_GetChannelBinding ,
SSPI_DTLS_InitClient ,
2023-02-20 08:35:56 +00:00
SSPI_DTLS_InitServer ,
2021-06-21 13:43:57 +00:00
SSPI_VerifyHash ,
NULL , //SSPI_GenerateHash,
} ;
2017-09-20 11:27:13 +00:00
# endif