1
0

gnutls.c 5.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. #include "hssl.h"
  2. #ifdef WITH_GNUTLS
  3. #include "gnutls/gnutls.h"
  4. const char* hssl_backend() {
  5. return "gnutls";
  6. }
  7. typedef gnutls_certificate_credentials_t gnutls_ctx_t;
  8. hssl_ctx_t hssl_ctx_init(hssl_ctx_init_param_t* param) {
  9. static int s_initialized = 0;
  10. if (s_initialized == 0) {
  11. gnutls_global_init();
  12. s_initialized = 1;
  13. }
  14. gnutls_ctx_t ctx;
  15. const char* crt_file = NULL;
  16. const char* key_file = NULL;
  17. const char* ca_file = NULL;
  18. int ret = gnutls_certificate_allocate_credentials(&ctx);
  19. if (ret != GNUTLS_E_SUCCESS) {
  20. return NULL;
  21. }
  22. if (param) {
  23. if (param->crt_file && *param->crt_file) {
  24. crt_file = param->crt_file;
  25. }
  26. if (param->key_file && *param->key_file) {
  27. key_file = param->key_file;
  28. }
  29. if (param->ca_file && *param->ca_file) {
  30. ca_file = param->ca_file;
  31. }
  32. if (ca_file) {
  33. ret = gnutls_certificate_set_x509_trust_file(ctx, ca_file, GNUTLS_X509_FMT_PEM);
  34. if (ret < 0) {
  35. fprintf(stderr, "ssl ca_file failed!\n");
  36. goto error;
  37. }
  38. }
  39. if (crt_file && key_file) {
  40. ret = gnutls_certificate_set_x509_key_file(ctx, crt_file, key_file, GNUTLS_X509_FMT_PEM);
  41. if (ret != GNUTLS_E_SUCCESS) {
  42. fprintf(stderr, "ssl crt_file/key_file error!\n");
  43. goto error;
  44. }
  45. }
  46. if (param->verify_peer && !ca_file) {
  47. gnutls_certificate_set_x509_system_trust(ctx);
  48. }
  49. }
  50. g_ssl_ctx = ctx;
  51. return ctx;
  52. error:
  53. gnutls_certificate_free_credentials(ctx);
  54. return NULL;
  55. }
  56. void hssl_ctx_cleanup(hssl_ctx_t ssl_ctx) {
  57. if (!ssl_ctx) return;
  58. if (g_ssl_ctx == ssl_ctx) {
  59. g_ssl_ctx = NULL;
  60. }
  61. gnutls_ctx_t ctx = (gnutls_ctx_t)ssl_ctx;
  62. gnutls_certificate_free_credentials(ctx);
  63. }
  64. typedef struct gnutls_s {
  65. gnutls_session_t session;
  66. gnutls_ctx_t ctx;
  67. int fd;
  68. } gnutls_t;
  69. hssl_t hssl_new(hssl_ctx_t ssl_ctx, int fd) {
  70. gnutls_t* gnutls = (gnutls_t*)malloc(sizeof(gnutls_t));
  71. if (gnutls == NULL) return NULL;
  72. gnutls->session = NULL;
  73. gnutls->ctx = (gnutls_ctx_t)ssl_ctx;
  74. gnutls->fd = fd;
  75. return (hssl_t)gnutls;
  76. }
  77. static int hssl_init(hssl_t ssl, int endpoint) {
  78. if (ssl == NULL) return HSSL_ERROR;
  79. gnutls_t* gnutls = (gnutls_t*)ssl;
  80. if (gnutls->session == NULL) {
  81. gnutls_init(&gnutls->session, endpoint);
  82. gnutls_priority_set_direct(gnutls->session, "NORMAL", NULL);
  83. gnutls_credentials_set(gnutls->session, GNUTLS_CRD_CERTIFICATE, gnutls->ctx);
  84. gnutls_transport_set_ptr(gnutls->session, (gnutls_transport_ptr_t)(ptrdiff_t)gnutls->fd);
  85. }
  86. return HSSL_OK;
  87. }
  88. void hssl_free(hssl_t ssl) {
  89. if (ssl == NULL) return;
  90. gnutls_t* gnutls = (gnutls_t*)ssl;
  91. if (gnutls->session) {
  92. gnutls_deinit(gnutls->session);
  93. gnutls->session = NULL;
  94. }
  95. free(gnutls);
  96. }
  97. static int hssl_handshake(hssl_t ssl) {
  98. if (ssl == NULL) return HSSL_ERROR;
  99. gnutls_t* gnutls = (gnutls_t*)ssl;
  100. if (gnutls->session == NULL) return HSSL_ERROR;
  101. int ret = 0;
  102. while (1) {
  103. ret = gnutls_handshake(gnutls->session);
  104. if (ret == GNUTLS_E_SUCCESS) {
  105. return HSSL_OK;
  106. }
  107. else if (ret == GNUTLS_E_AGAIN || ret == GNUTLS_E_INTERRUPTED) {
  108. return gnutls_record_get_direction(gnutls->session) == 0 ? HSSL_WANT_READ : HSSL_WANT_WRITE;
  109. }
  110. else if (gnutls_error_is_fatal(ret)) {
  111. // fprintf(stderr, "gnutls_handshake failed: %s\n", gnutls_strerror(ret));
  112. return HSSL_ERROR;
  113. }
  114. }
  115. return HSSL_OK;
  116. }
  117. int hssl_accept(hssl_t ssl) {
  118. if (ssl == NULL) return HSSL_ERROR;
  119. gnutls_t* gnutls = (gnutls_t*)ssl;
  120. if (gnutls->session == NULL) {
  121. hssl_init(ssl, GNUTLS_SERVER);
  122. }
  123. return hssl_handshake(ssl);
  124. }
  125. int hssl_connect(hssl_t ssl) {
  126. if (ssl == NULL) return HSSL_ERROR;
  127. gnutls_t* gnutls = (gnutls_t*)ssl;
  128. if (gnutls->session == NULL) {
  129. hssl_init(ssl, GNUTLS_CLIENT);
  130. }
  131. return hssl_handshake(ssl);
  132. }
  133. int hssl_read(hssl_t ssl, void* buf, int len) {
  134. if (ssl == NULL) return HSSL_ERROR;
  135. gnutls_t* gnutls = (gnutls_t*)ssl;
  136. if (gnutls->session == NULL) return HSSL_ERROR;
  137. int ret = 0;
  138. while ((ret = gnutls_record_recv(gnutls->session, buf, len)) == GNUTLS_E_INTERRUPTED);
  139. return ret;
  140. }
  141. int hssl_write(hssl_t ssl, const void* buf, int len) {
  142. if (ssl == NULL) return HSSL_ERROR;
  143. gnutls_t* gnutls = (gnutls_t*)ssl;
  144. if (gnutls->session == NULL) return HSSL_ERROR;
  145. int ret = 0;
  146. while ((ret = gnutls_record_send(gnutls->session, buf, len)) == GNUTLS_E_INTERRUPTED);
  147. return ret;
  148. }
  149. int hssl_close(hssl_t ssl) {
  150. if (ssl == NULL) return HSSL_ERROR;
  151. gnutls_t* gnutls = (gnutls_t*)ssl;
  152. if (gnutls->session == NULL) return HSSL_ERROR;
  153. gnutls_bye(gnutls->session, GNUTLS_SHUT_RDWR);
  154. return HSSL_OK;
  155. }
  156. int hssl_set_sni_hostname(hssl_t ssl, const char* hostname) {
  157. if (ssl == NULL) return HSSL_ERROR;
  158. gnutls_t* gnutls = (gnutls_t*)ssl;
  159. if (gnutls->session == NULL) {
  160. hssl_init(ssl, GNUTLS_SERVER);
  161. }
  162. gnutls_server_name_set(gnutls->session, GNUTLS_NAME_DNS, hostname, strlen(hostname));
  163. return 0;
  164. }
  165. #endif // WITH_GNUTLS