diff options
Diffstat (limited to 'lib/ssl_openssl.c')
| -rw-r--r-- | lib/ssl_openssl.c | 281 | 
1 files changed, 144 insertions, 137 deletions
| diff --git a/lib/ssl_openssl.c b/lib/ssl_openssl.c index 63937380..c286d509 100644 --- a/lib/ssl_openssl.c +++ b/lib/ssl_openssl.c @@ -1,4 +1,4 @@ -  /********************************************************************\ +/********************************************************************\    * BitlBee -- An IRC to other IM-networks gateway                     *    *                                                                    *    * Copyright 2002-2012 Wilmer van der Gaast and others                * @@ -39,263 +39,270 @@ int ssl_errno = 0;  static gboolean initialized = FALSE; -struct scd -{ +struct scd {  	ssl_input_function func;  	gpointer data;  	int fd;  	gboolean established;  	gboolean verify;  	char *hostname; -	 +  	int inpa; -	int lasterr;		/* Necessary for SSL_get_error */ +	int lasterr;            /* Necessary for SSL_get_error */  	SSL *ssl;  };  static SSL_CTX *ssl_ctx; -static void ssl_conn_free( struct scd *conn ); -static gboolean ssl_connected( gpointer data, gint source, b_input_condition cond ); -static gboolean ssl_starttls_real( gpointer data, gint source, b_input_condition cond ); -static gboolean ssl_handshake( gpointer data, gint source, b_input_condition cond ); +static void ssl_conn_free(struct scd *conn); +static gboolean ssl_connected(gpointer data, gint source, b_input_condition cond); +static gboolean ssl_starttls_real(gpointer data, gint source, b_input_condition cond); +static gboolean ssl_handshake(gpointer data, gint source, b_input_condition cond); -void ssl_init( void ) +void ssl_init(void)  {  	const SSL_METHOD *meth; -	 +  	SSL_library_init(); -	 +  	meth = TLSv1_client_method(); -	ssl_ctx = SSL_CTX_new( meth ); -	 +	ssl_ctx = SSL_CTX_new(meth); +  	initialized = TRUE;  } -void *ssl_connect( char *host, int port, gboolean verify, ssl_input_function func, gpointer data ) +void *ssl_connect(char *host, int port, gboolean verify, ssl_input_function func, gpointer data)  { -	struct scd *conn = g_new0( struct scd, 1 ); -	 -	conn->fd = proxy_connect( host, port, ssl_connected, conn ); -	if( conn->fd < 0 ) -	{ -		ssl_conn_free( conn ); +	struct scd *conn = g_new0(struct scd, 1); + +	conn->fd = proxy_connect(host, port, ssl_connected, conn); +	if (conn->fd < 0) { +		ssl_conn_free(conn);  		return NULL;  	} -	 +  	conn->func = func;  	conn->data = data;  	conn->inpa = -1; -	conn->hostname = g_strdup( host ); -	 +	conn->hostname = g_strdup(host); +  	return conn;  } -void *ssl_starttls( int fd, char *hostname, gboolean verify, ssl_input_function func, gpointer data ) +void *ssl_starttls(int fd, char *hostname, gboolean verify, ssl_input_function func, gpointer data)  { -	struct scd *conn = g_new0( struct scd, 1 ); -	 +	struct scd *conn = g_new0(struct scd, 1); +  	conn->fd = fd;  	conn->func = func;  	conn->data = data;  	conn->inpa = -1;  	conn->verify = verify && global.conf->cafile; -	conn->hostname = g_strdup( hostname ); -	 +	conn->hostname = g_strdup(hostname); +  	/* This function should be called via a (short) timeout instead of  	   directly from here, because these SSL calls are *supposed* to be  	   *completely* asynchronous and not ready yet when this function  	   (or *_connect, for examle) returns. Also, errors are reported via  	   the callback function, not via this function's return value. -	    +  	   In short, doing things like this makes the rest of the code a lot  	   simpler. */ -	 -	b_timeout_add( 1, ssl_starttls_real, conn ); -	 + +	b_timeout_add(1, ssl_starttls_real, conn); +  	return conn;  } -static gboolean ssl_starttls_real( gpointer data, gint source, b_input_condition cond ) +static gboolean ssl_starttls_real(gpointer data, gint source, b_input_condition cond)  {  	struct scd *conn = data; -	 -	return ssl_connected( conn, conn->fd, B_EV_IO_WRITE ); + +	return ssl_connected(conn, conn->fd, B_EV_IO_WRITE);  } -static gboolean ssl_connected( gpointer data, gint source, b_input_condition cond ) +static gboolean ssl_connected(gpointer data, gint source, b_input_condition cond)  {  	struct scd *conn = data; -	 -	if( conn->verify ) -	{ + +	if (conn->verify) {  		/* Right now we don't have any verification functionality for OpenSSL. */ -		conn->func( conn->data, 1, NULL, cond ); -		if( source >= 0 ) closesocket( source ); -		ssl_conn_free( conn ); +		conn->func(conn->data, 1, NULL, cond); +		if (source >= 0) { +			closesocket(source); +		} +		ssl_conn_free(conn);  		return FALSE;  	} -	if( source == -1 ) +	if (source == -1) {  		goto ssl_connected_failure; -	 -	if( !initialized ) -	{ +	} + +	if (!initialized) {  		ssl_init();  	} -	 -	 -	if( ssl_ctx == NULL ) + + +	if (ssl_ctx == NULL) {  		goto ssl_connected_failure; -	 -	conn->ssl = SSL_new( ssl_ctx ); -	if( conn->ssl == NULL ) +	} + +	conn->ssl = SSL_new(ssl_ctx); +	if (conn->ssl == NULL) {  		goto ssl_connected_failure; -	 +	} +  	/* We can do at least the handshake with non-blocking I/O */ -	sock_make_nonblocking( conn->fd ); -	SSL_set_fd( conn->ssl, conn->fd ); -	 -	if( conn->hostname && !g_ascii_isdigit( conn->hostname[0] ) ) -		SSL_set_tlsext_host_name( conn->ssl, conn->hostname ); -	 -	return ssl_handshake( data, source, cond ); +	sock_make_nonblocking(conn->fd); +	SSL_set_fd(conn->ssl, conn->fd); + +	if (conn->hostname && !g_ascii_isdigit(conn->hostname[0])) { +		SSL_set_tlsext_host_name(conn->ssl, conn->hostname); +	} + +	return ssl_handshake(data, source, cond);  ssl_connected_failure: -	conn->func( conn->data, 0, NULL, cond ); -	ssl_disconnect( conn ); +	conn->func(conn->data, 0, NULL, cond); +	ssl_disconnect(conn);  	return FALSE; -}	 +} -static gboolean ssl_handshake( gpointer data, gint source, b_input_condition cond ) +static gboolean ssl_handshake(gpointer data, gint source, b_input_condition cond)  {  	struct scd *conn = data;  	int st; -	 -	if( ( st = SSL_connect( conn->ssl ) ) < 0 ) -	{ -		conn->lasterr = SSL_get_error( conn->ssl, st ); -		if( conn->lasterr != SSL_ERROR_WANT_READ && conn->lasterr != SSL_ERROR_WANT_WRITE ) -		{ -			conn->func( conn->data, 0, NULL, cond ); -			ssl_disconnect( conn ); + +	if ((st = SSL_connect(conn->ssl)) < 0) { +		conn->lasterr = SSL_get_error(conn->ssl, st); +		if (conn->lasterr != SSL_ERROR_WANT_READ && conn->lasterr != SSL_ERROR_WANT_WRITE) { +			conn->func(conn->data, 0, NULL, cond); +			ssl_disconnect(conn);  			return FALSE;  		} -		 -		conn->inpa = b_input_add( conn->fd, ssl_getdirection( conn ), ssl_handshake, data ); + +		conn->inpa = b_input_add(conn->fd, ssl_getdirection(conn), ssl_handshake, data);  		return FALSE;  	} -	 +  	conn->established = TRUE; -	sock_make_blocking( conn->fd );		/* For now... */ -	conn->func( conn->data, 0, conn, cond ); +	sock_make_blocking(conn->fd);           /* For now... */ +	conn->func(conn->data, 0, conn, cond);  	return FALSE;  } -int ssl_read( void *conn, char *buf, int len ) +int ssl_read(void *conn, char *buf, int len)  {  	int st; -	 -	if( !((struct scd*)conn)->established ) -	{ + +	if (!((struct scd*) conn)->established) {  		ssl_errno = SSL_NOHANDSHAKE;  		return -1;  	} -	 -	st = SSL_read( ((struct scd*)conn)->ssl, buf, len ); -	 + +	st = SSL_read(((struct scd*) conn)->ssl, buf, len); +  	ssl_errno = SSL_OK; -	if( st <= 0 ) -	{ -		((struct scd*)conn)->lasterr = SSL_get_error( ((struct scd*)conn)->ssl, st ); -		if( ((struct scd*)conn)->lasterr == SSL_ERROR_WANT_READ || ((struct scd*)conn)->lasterr == SSL_ERROR_WANT_WRITE ) +	if (st <= 0) { +		((struct scd*) conn)->lasterr = SSL_get_error(((struct scd*) conn)->ssl, st); +		if (((struct scd*) conn)->lasterr == SSL_ERROR_WANT_READ || ((struct scd*) conn)->lasterr == +		    SSL_ERROR_WANT_WRITE) {  			ssl_errno = SSL_AGAIN; +		}  	} -	 -	if( 0 && getenv( "BITLBEE_DEBUG" ) && st > 0 ) write( 1, buf, st ); -	 + +	if (0 && getenv("BITLBEE_DEBUG") && st > 0) { +		write(1, buf, st); +	} +  	return st;  } -int ssl_write( void *conn, const char *buf, int len ) +int ssl_write(void *conn, const char *buf, int len)  {  	int st; -	 -	if( !((struct scd*)conn)->established ) -	{ + +	if (!((struct scd*) conn)->established) {  		ssl_errno = SSL_NOHANDSHAKE;  		return -1;  	} -	 -	st = SSL_write( ((struct scd*)conn)->ssl, buf, len ); -	 -	if( 0 && getenv( "BITLBEE_DEBUG" ) && st > 0 ) write( 1, buf, st ); -	 + +	st = SSL_write(((struct scd*) conn)->ssl, buf, len); + +	if (0 && getenv("BITLBEE_DEBUG") && st > 0) { +		write(1, buf, st); +	} +  	ssl_errno = SSL_OK; -	if( st <= 0 ) -	{ -		((struct scd*)conn)->lasterr = SSL_get_error( ((struct scd*)conn)->ssl, st ); -		if( ((struct scd*)conn)->lasterr == SSL_ERROR_WANT_READ || ((struct scd*)conn)->lasterr == SSL_ERROR_WANT_WRITE ) +	if (st <= 0) { +		((struct scd*) conn)->lasterr = SSL_get_error(((struct scd*) conn)->ssl, st); +		if (((struct scd*) conn)->lasterr == SSL_ERROR_WANT_READ || ((struct scd*) conn)->lasterr == +		    SSL_ERROR_WANT_WRITE) {  			ssl_errno = SSL_AGAIN; +		}  	} -	 +  	return st;  } -int ssl_pending( void *conn ) +int ssl_pending(void *conn)  { -	return ( ((struct scd*)conn) && ((struct scd*)conn)->established ) ? -	       SSL_pending( ((struct scd*)conn)->ssl ) > 0 : 0; +	return (((struct scd*) conn) && ((struct scd*) conn)->established) ? +	       SSL_pending(((struct scd*) conn)->ssl) > 0 : 0;  } -static void ssl_conn_free( struct scd *conn ) +static void ssl_conn_free(struct scd *conn)  { -	SSL_free( conn->ssl ); -	g_free( conn->hostname ); -	g_free( conn ); -	 +	SSL_free(conn->ssl); +	g_free(conn->hostname); +	g_free(conn); +  } -void ssl_disconnect( void *conn_ ) +void ssl_disconnect(void *conn_)  {  	struct scd *conn = conn_; -	 -	if( conn->inpa != -1 ) -		b_event_remove( conn->inpa ); -	 -	if( conn->established ) -		SSL_shutdown( conn->ssl ); -	 -	closesocket( conn->fd ); -	 -	ssl_conn_free( conn ); + +	if (conn->inpa != -1) { +		b_event_remove(conn->inpa); +	} + +	if (conn->established) { +		SSL_shutdown(conn->ssl); +	} + +	closesocket(conn->fd); + +	ssl_conn_free(conn);  } -int ssl_getfd( void *conn ) +int ssl_getfd(void *conn)  { -	return( ((struct scd*)conn)->fd ); +	return(((struct scd*) conn)->fd);  } -b_input_condition ssl_getdirection( void *conn ) +b_input_condition ssl_getdirection(void *conn)  { -	return( ((struct scd*)conn)->lasterr == SSL_ERROR_WANT_WRITE ? B_EV_IO_WRITE : B_EV_IO_READ ); +	return(((struct scd*) conn)->lasterr == SSL_ERROR_WANT_WRITE ? B_EV_IO_WRITE : B_EV_IO_READ);  } -char *ssl_verify_strerror( int code ) +char *ssl_verify_strerror(int code)  { -	return g_strdup( "SSL certificate verification not supported by BitlBee OpenSSL code." ); +	return g_strdup("SSL certificate verification not supported by BitlBee OpenSSL code.");  } -size_t ssl_des3_encrypt(const unsigned char *key, size_t key_len, const unsigned char *input, size_t input_len, const unsigned char *iv, unsigned char **res) +size_t ssl_des3_encrypt(const unsigned char *key, size_t key_len, const unsigned char *input, size_t input_len, +                        const unsigned char *iv, unsigned char **res)  { -	int output_length = 0;     +	int output_length = 0;  	EVP_CIPHER_CTX ctx; -	 +  	*res = g_new0(unsigned char, 72); -	 +  	/* Don't set key or IV because we will modify the parameters */  	EVP_CIPHER_CTX_init(&ctx);  	EVP_CipherInit_ex(&ctx, EVP_des_ede3_cbc(), NULL, NULL, NULL, 1); @@ -305,8 +312,8 @@ size_t ssl_des3_encrypt(const unsigned char *key, size_t key_len, const unsigned  	EVP_CipherInit_ex(&ctx, NULL, NULL, key, iv, 1);  	EVP_CipherUpdate(&ctx, *res, &output_length, input, input_len);  	EVP_CipherFinal_ex(&ctx, *res, &output_length); -	EVP_CIPHER_CTX_cleanup(&ctx);    +	EVP_CIPHER_CTX_cleanup(&ctx);  	//EVP_cleanup(); -	 +  	return output_length;  } | 
