gnutls.c 37.2 KB
Newer Older
Ted Zlatanov's avatar
Ted Zlatanov committed
1
/* GnuTLS glue for GNU Emacs.
2
   Copyright (C) 2010-2011  Free Software Foundation, Inc.
Ted Zlatanov's avatar
Ted Zlatanov committed
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28

This file is part of GNU Emacs.

GNU Emacs is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

GNU Emacs is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with GNU Emacs.  If not, see <http://www.gnu.org/licenses/>.  */

#include <config.h>
#include <errno.h>
#include <setjmp.h>

#include "lisp.h"
#include "process.h"

#ifdef HAVE_GNUTLS
#include <gnutls/gnutls.h>

29 30 31 32 33 34 35 36
#ifdef WINDOWSNT
#include <windows.h>
#include "w32.h"
#endif

static int
emacs_gnutls_handle_error (gnutls_session_t, int err);

37
static Lisp_Object Qgnutls_dll;
38 39 40 41
static Lisp_Object Qgnutls_log_level;
static Lisp_Object Qgnutls_code;
static Lisp_Object Qgnutls_anon, Qgnutls_x509pki;
static Lisp_Object Qgnutls_e_interrupted, Qgnutls_e_again,
Ted Zlatanov's avatar
Ted Zlatanov committed
42
  Qgnutls_e_invalid_session, Qgnutls_e_not_ready_for_handshake;
43
static int gnutls_global_initialized;
Ted Zlatanov's avatar
Ted Zlatanov committed
44

45
/* The following are for the property list of `gnutls-boot'.  */
46 47
static Lisp_Object Qgnutls_bootprop_priority;
static Lisp_Object Qgnutls_bootprop_trustfiles;
48 49
static Lisp_Object Qgnutls_bootprop_keylist;
static Lisp_Object Qgnutls_bootprop_crlfiles;
50 51 52 53 54
static Lisp_Object Qgnutls_bootprop_callbacks;
static Lisp_Object Qgnutls_bootprop_loglevel;
static Lisp_Object Qgnutls_bootprop_hostname;
static Lisp_Object Qgnutls_bootprop_verify_flags;
static Lisp_Object Qgnutls_bootprop_verify_hostname_error;
55 56

/* Callback keys for `gnutls-boot'.  Unused currently.  */
57
static Lisp_Object Qgnutls_bootprop_callbacks_verify;
58

59 60 61 62 63 64 65
static void gnutls_log_function (int, const char *);
static void gnutls_log_function2 (int, const char*, const char*);


#ifdef WINDOWSNT

/* Macro for defining functions that will be loaded from the GnuTLS DLL.  */
66
#define DEF_GNUTLS_FN(rettype,func,args) static rettype (FAR CDECL *fn_##func)args
67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111

/* Macro for loading GnuTLS functions from the library.  */
#define LOAD_GNUTLS_FN(lib,func) {					\
    fn_##func = (void *) GetProcAddress (lib, #func);			\
    if (!fn_##func) return 0;						\
  }

DEF_GNUTLS_FN (gnutls_alert_description_t, gnutls_alert_get,
               (gnutls_session_t));
DEF_GNUTLS_FN (const char *, gnutls_alert_get_name,
               (gnutls_alert_description_t));
DEF_GNUTLS_FN (int, gnutls_alert_send_appropriate, (gnutls_session_t, int));
DEF_GNUTLS_FN (int, gnutls_anon_allocate_client_credentials,
               (gnutls_anon_client_credentials_t *));
DEF_GNUTLS_FN (void, gnutls_anon_free_client_credentials,
               (gnutls_anon_client_credentials_t));
DEF_GNUTLS_FN (int, gnutls_bye, (gnutls_session_t, gnutls_close_request_t));
DEF_GNUTLS_FN (int, gnutls_certificate_allocate_credentials,
               (gnutls_certificate_credentials_t *));
DEF_GNUTLS_FN (void, gnutls_certificate_free_credentials,
               (gnutls_certificate_credentials_t));
DEF_GNUTLS_FN (const gnutls_datum_t *, gnutls_certificate_get_peers,
               (gnutls_session_t, unsigned int *));
DEF_GNUTLS_FN (void, gnutls_certificate_set_verify_flags,
               (gnutls_certificate_credentials_t, unsigned int));
DEF_GNUTLS_FN (int, gnutls_certificate_set_x509_crl_file,
               (gnutls_certificate_credentials_t, const char *,
                gnutls_x509_crt_fmt_t));
DEF_GNUTLS_FN (int, gnutls_certificate_set_x509_key_file,
               (gnutls_certificate_credentials_t, const char *, const char *,
                gnutls_x509_crt_fmt_t));
DEF_GNUTLS_FN (int, gnutls_certificate_set_x509_trust_file,
               (gnutls_certificate_credentials_t, const char *,
                gnutls_x509_crt_fmt_t));
DEF_GNUTLS_FN (gnutls_certificate_type_t, gnutls_certificate_type_get,
               (gnutls_session_t));
DEF_GNUTLS_FN (int, gnutls_certificate_verify_peers2,
               (gnutls_session_t, unsigned int *));
DEF_GNUTLS_FN (int, gnutls_credentials_set,
               (gnutls_session_t, gnutls_credentials_type_t, void *));
DEF_GNUTLS_FN (void, gnutls_deinit, (gnutls_session_t));
DEF_GNUTLS_FN (int, gnutls_error_is_fatal, (int));
DEF_GNUTLS_FN (int, gnutls_global_init, (void));
DEF_GNUTLS_FN (void, gnutls_global_set_log_function, (gnutls_log_func));
DEF_GNUTLS_FN (void, gnutls_global_set_log_level, (int));
112 113 114 115
DEF_GNUTLS_FN (void, gnutls_global_set_mem_functions,
	       (gnutls_alloc_function, gnutls_alloc_function,
		gnutls_is_secure_function, gnutls_realloc_function,
		gnutls_free_function));
116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173
DEF_GNUTLS_FN (int, gnutls_handshake, (gnutls_session_t));
DEF_GNUTLS_FN (int, gnutls_init, (gnutls_session_t *, gnutls_connection_end_t));
DEF_GNUTLS_FN (int, gnutls_priority_set_direct,
               (gnutls_session_t, const char *, const char **));
DEF_GNUTLS_FN (size_t, gnutls_record_check_pending, (gnutls_session_t));
DEF_GNUTLS_FN (ssize_t, gnutls_record_recv, (gnutls_session_t, void *, size_t));
DEF_GNUTLS_FN (ssize_t, gnutls_record_send,
               (gnutls_session_t, const void *, size_t));
DEF_GNUTLS_FN (const char *, gnutls_strerror, (int));
DEF_GNUTLS_FN (void, gnutls_transport_set_errno, (gnutls_session_t, int));
DEF_GNUTLS_FN (void, gnutls_transport_set_lowat, (gnutls_session_t, int));
DEF_GNUTLS_FN (void, gnutls_transport_set_ptr2,
               (gnutls_session_t, gnutls_transport_ptr_t,
                gnutls_transport_ptr_t));
DEF_GNUTLS_FN (void, gnutls_transport_set_pull_function,
               (gnutls_session_t, gnutls_pull_func));
DEF_GNUTLS_FN (void, gnutls_transport_set_push_function,
               (gnutls_session_t, gnutls_push_func));
DEF_GNUTLS_FN (int, gnutls_x509_crt_check_hostname,
               (gnutls_x509_crt_t, const char *));
DEF_GNUTLS_FN (void, gnutls_x509_crt_deinit, (gnutls_x509_crt_t));
DEF_GNUTLS_FN (int, gnutls_x509_crt_import,
               (gnutls_x509_crt_t, const gnutls_datum_t *,
                gnutls_x509_crt_fmt_t));
DEF_GNUTLS_FN (int, gnutls_x509_crt_init, (gnutls_x509_crt_t *));

static int
init_gnutls_functions (Lisp_Object libraries)
{
  HMODULE library;

  if (!(library = w32_delayed_load (libraries, Qgnutls_dll)))
    {
      GNUTLS_LOG (1, 1, "GnuTLS library not found");
      return 0;
    }

  LOAD_GNUTLS_FN (library, gnutls_alert_get);
  LOAD_GNUTLS_FN (library, gnutls_alert_get_name);
  LOAD_GNUTLS_FN (library, gnutls_alert_send_appropriate);
  LOAD_GNUTLS_FN (library, gnutls_anon_allocate_client_credentials);
  LOAD_GNUTLS_FN (library, gnutls_anon_free_client_credentials);
  LOAD_GNUTLS_FN (library, gnutls_bye);
  LOAD_GNUTLS_FN (library, gnutls_certificate_allocate_credentials);
  LOAD_GNUTLS_FN (library, gnutls_certificate_free_credentials);
  LOAD_GNUTLS_FN (library, gnutls_certificate_get_peers);
  LOAD_GNUTLS_FN (library, gnutls_certificate_set_verify_flags);
  LOAD_GNUTLS_FN (library, gnutls_certificate_set_x509_crl_file);
  LOAD_GNUTLS_FN (library, gnutls_certificate_set_x509_key_file);
  LOAD_GNUTLS_FN (library, gnutls_certificate_set_x509_trust_file);
  LOAD_GNUTLS_FN (library, gnutls_certificate_type_get);
  LOAD_GNUTLS_FN (library, gnutls_certificate_verify_peers2);
  LOAD_GNUTLS_FN (library, gnutls_credentials_set);
  LOAD_GNUTLS_FN (library, gnutls_deinit);
  LOAD_GNUTLS_FN (library, gnutls_error_is_fatal);
  LOAD_GNUTLS_FN (library, gnutls_global_init);
  LOAD_GNUTLS_FN (library, gnutls_global_set_log_function);
  LOAD_GNUTLS_FN (library, gnutls_global_set_log_level);
174
  LOAD_GNUTLS_FN (library, gnutls_global_set_mem_functions);
175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209
  LOAD_GNUTLS_FN (library, gnutls_handshake);
  LOAD_GNUTLS_FN (library, gnutls_init);
  LOAD_GNUTLS_FN (library, gnutls_priority_set_direct);
  LOAD_GNUTLS_FN (library, gnutls_record_check_pending);
  LOAD_GNUTLS_FN (library, gnutls_record_recv);
  LOAD_GNUTLS_FN (library, gnutls_record_send);
  LOAD_GNUTLS_FN (library, gnutls_strerror);
  LOAD_GNUTLS_FN (library, gnutls_transport_set_errno);
  LOAD_GNUTLS_FN (library, gnutls_transport_set_lowat);
  LOAD_GNUTLS_FN (library, gnutls_transport_set_ptr2);
  LOAD_GNUTLS_FN (library, gnutls_transport_set_pull_function);
  LOAD_GNUTLS_FN (library, gnutls_transport_set_push_function);
  LOAD_GNUTLS_FN (library, gnutls_x509_crt_check_hostname);
  LOAD_GNUTLS_FN (library, gnutls_x509_crt_deinit);
  LOAD_GNUTLS_FN (library, gnutls_x509_crt_import);
  LOAD_GNUTLS_FN (library, gnutls_x509_crt_init);

  GNUTLS_LOG2 (1, 1, "GnuTLS library loaded:",
               SDATA (Fget (Qgnutls_dll, QCloaded_from)));
  return 1;
}

#else /* !WINDOWSNT */

#define fn_gnutls_alert_get			gnutls_alert_get
#define fn_gnutls_alert_get_name		gnutls_alert_get_name
#define fn_gnutls_alert_send_appropriate	gnutls_alert_send_appropriate
#define fn_gnutls_anon_allocate_client_credentials gnutls_anon_allocate_client_credentials
#define fn_gnutls_anon_free_client_credentials	gnutls_anon_free_client_credentials
#define fn_gnutls_bye				gnutls_bye
#define fn_gnutls_certificate_allocate_credentials gnutls_certificate_allocate_credentials
#define fn_gnutls_certificate_free_credentials	gnutls_certificate_free_credentials
#define fn_gnutls_certificate_get_peers		gnutls_certificate_get_peers
#define fn_gnutls_certificate_set_verify_flags	gnutls_certificate_set_verify_flags
#define fn_gnutls_certificate_set_x509_crl_file	gnutls_certificate_set_x509_crl_file
210
#define fn_gnutls_certificate_set_x509_key_file gnutls_certificate_set_x509_key_file
211
#define fn_gnutls_certificate_set_x509_trust_file gnutls_certificate_set_x509_trust_file
212 213 214 215 216 217 218 219
#define fn_gnutls_certificate_type_get		gnutls_certificate_type_get
#define fn_gnutls_certificate_verify_peers2	gnutls_certificate_verify_peers2
#define fn_gnutls_credentials_set		gnutls_credentials_set
#define fn_gnutls_deinit			gnutls_deinit
#define fn_gnutls_error_is_fatal		gnutls_error_is_fatal
#define fn_gnutls_global_init			gnutls_global_init
#define fn_gnutls_global_set_log_function	gnutls_global_set_log_function
#define fn_gnutls_global_set_log_level		gnutls_global_set_log_level
220
#define fn_gnutls_global_set_mem_functions	gnutls_global_set_mem_functions
221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237
#define fn_gnutls_handshake			gnutls_handshake
#define fn_gnutls_init				gnutls_init
#define fn_gnutls_priority_set_direct		gnutls_priority_set_direct
#define fn_gnutls_record_check_pending		gnutls_record_check_pending
#define fn_gnutls_record_recv			gnutls_record_recv
#define fn_gnutls_record_send			gnutls_record_send
#define fn_gnutls_strerror			gnutls_strerror
#define fn_gnutls_transport_set_errno		gnutls_transport_set_errno
#define fn_gnutls_transport_set_ptr2		gnutls_transport_set_ptr2
#define fn_gnutls_x509_crt_check_hostname	gnutls_x509_crt_check_hostname
#define fn_gnutls_x509_crt_deinit		gnutls_x509_crt_deinit
#define fn_gnutls_x509_crt_import		gnutls_x509_crt_import
#define fn_gnutls_x509_crt_init			gnutls_x509_crt_init

#endif /* !WINDOWSNT */


238
static void
239 240 241 242 243 244 245 246 247 248 249 250
gnutls_log_function (int level, const char* string)
{
  message ("gnutls.c: [%d] %s", level, string);
}

static void
gnutls_log_function2 (int level, const char* string, const char* extra)
{
  message ("gnutls.c: [%d] %s %s", level, string, extra);
}

static int
251 252 253 254 255 256
emacs_gnutls_handshake (struct Lisp_Process *proc)
{
  gnutls_session_t state = proc->gnutls_state;
  int ret;

  if (proc->gnutls_initstage < GNUTLS_STAGE_HANDSHAKE_CANDO)
257
    return -1;
258 259

  if (proc->gnutls_initstage < GNUTLS_STAGE_TRANSPORT_POINTERS_SET)
260
    {
261 262 263 264
#ifdef WINDOWSNT
      /* On W32 we cannot transfer socket handles between different runtime
         libraries, so we tell GnuTLS to use our special push/pull
         functions.  */
265 266 267 268 269
      fn_gnutls_transport_set_ptr2 (state,
                                    (gnutls_transport_ptr_t) proc,
                                    (gnutls_transport_ptr_t) proc);
      fn_gnutls_transport_set_push_function (state, &emacs_gnutls_push);
      fn_gnutls_transport_set_pull_function (state, &emacs_gnutls_pull);
270 271 272 273 274 275 276 277

      /* For non blocking sockets or other custom made pull/push
         functions the gnutls_transport_set_lowat must be called, with
         a zero low water mark value. (GnuTLS 2.10.4 documentation)

         (Note: this is probably not strictly necessary as the lowat
          value is only used when no custom pull/push functions are
          set.)  */
278
      fn_gnutls_transport_set_lowat (state, 0);
279
#else
280 281 282
      /* This is how GnuTLS takes sockets: as file descriptors passed
         in.  For an Emacs process socket, infd and outfd are the
         same but we use this two-argument version for clarity.  */
283 284 285
      fn_gnutls_transport_set_ptr2 (state,
                                    (gnutls_transport_ptr_t) (long) proc->infd,
                                    (gnutls_transport_ptr_t) (long) proc->outfd);
286
#endif
287

288 289
      proc->gnutls_initstage = GNUTLS_STAGE_TRANSPORT_POINTERS_SET;
    }
290

291 292
  do
    {
293
      ret = fn_gnutls_handshake (state);
294 295
      emacs_gnutls_handle_error (state, ret);
    }
296
  while (ret < 0 && fn_gnutls_error_is_fatal (ret) == 0);
297

298 299 300
  proc->gnutls_initstage = GNUTLS_STAGE_HANDSHAKE_TRIED;

  if (ret == GNUTLS_E_SUCCESS)
301
    {
302
      /* Here we're finally done.  */
303 304
      proc->gnutls_initstage = GNUTLS_STAGE_READY;
    }
305 306
  else
    {
307
      fn_gnutls_alert_send_appropriate (state, ret);
308 309
    }
  return ret;
310 311
}

312 313 314 315 316 317 318 319 320 321 322 323
int
emacs_gnutls_record_check_pending (gnutls_session_t state)
{
  return fn_gnutls_record_check_pending (state);
}

void
emacs_gnutls_transport_set_errno (gnutls_session_t state, int err)
{
  fn_gnutls_transport_set_errno (state, err);
}

324
EMACS_INT
325
emacs_gnutls_write (struct Lisp_Process *proc, const char *buf, EMACS_INT nbyte)
Ted Zlatanov's avatar
Ted Zlatanov committed
326
{
327
  ssize_t rtnval = 0;
328
  EMACS_INT bytes_written;
329 330
  gnutls_session_t state = proc->gnutls_state;

331 332 333 334 335 336 337
  if (proc->gnutls_initstage != GNUTLS_STAGE_READY) {
#ifdef EWOULDBLOCK
    errno = EWOULDBLOCK;
#endif
#ifdef EAGAIN
    errno = EAGAIN;
#endif
338
    return 0;
339
  }
Ted Zlatanov's avatar
Ted Zlatanov committed
340 341 342 343 344

  bytes_written = 0;

  while (nbyte > 0)
    {
345
      rtnval = fn_gnutls_record_send (state, buf, nbyte);
Ted Zlatanov's avatar
Ted Zlatanov committed
346

347
      if (rtnval < 0)
Ted Zlatanov's avatar
Ted Zlatanov committed
348
        {
349
          if (rtnval == GNUTLS_E_AGAIN || rtnval == GNUTLS_E_INTERRUPTED)
Ted Zlatanov's avatar
Ted Zlatanov committed
350 351
            continue;
          else
352
            break;
Ted Zlatanov's avatar
Ted Zlatanov committed
353 354 355 356 357 358 359
        }

      buf += rtnval;
      nbyte -= rtnval;
      bytes_written += rtnval;
    }

360
  emacs_gnutls_handle_error (state, rtnval);
Ted Zlatanov's avatar
Ted Zlatanov committed
361 362 363
  return (bytes_written);
}

364
EMACS_INT
365
emacs_gnutls_read (struct Lisp_Process *proc, char *buf, EMACS_INT nbyte)
Ted Zlatanov's avatar
Ted Zlatanov committed
366
{
367
  ssize_t rtnval;
368 369
  gnutls_session_t state = proc->gnutls_state;

370 371 372 373 374
  if (proc->gnutls_initstage != GNUTLS_STAGE_READY)
    {
      emacs_gnutls_handshake (proc);
      return -1;
    }
375
  rtnval = fn_gnutls_record_recv (state, buf, nbyte);
376 377
  if (rtnval >= 0)
    return rtnval;
378 379 380
  else if (emacs_gnutls_handle_error (state, rtnval) == 0)
    /* non-fatal error */
    return -1;
381
  else {
382 383
    /* a fatal error occured */
    return 0;
384
  }
Ted Zlatanov's avatar
Ted Zlatanov committed
385 386
}

387 388 389 390 391 392 393 394
/* report a GnuTLS error to the user.
   Returns zero if the error code was successfully handled. */
static int
emacs_gnutls_handle_error (gnutls_session_t session, int err)
{
  Lisp_Object gnutls_log_level = Fsymbol_value (Qgnutls_log_level);
  int max_log_level = 0;

395
  int ret;
396 397 398 399 400 401 402 403 404 405 406
  const char *str;

  /* TODO: use a Lisp_Object generated by gnutls_make_error?  */
  if (err >= 0)
    return 0;

  if (NUMBERP (gnutls_log_level))
    max_log_level = XINT (gnutls_log_level);

  /* TODO: use gnutls-error-fatalp and gnutls-error-string.  */

407
  str = fn_gnutls_strerror (err);
408 409 410
  if (!str)
    str = "unknown";

411
  if (fn_gnutls_error_is_fatal (err))
412 413 414 415 416 417 418 419 420 421 422 423 424 425
    {
      ret = err;
      GNUTLS_LOG2 (0, max_log_level, "fatal error:", str);
    }
  else
    {
      ret = 0;
      GNUTLS_LOG2 (1, max_log_level, "non-fatal error:", str);
      /* TODO: EAGAIN AKA Qgnutls_e_again should be level 2.  */
    }

  if (err == GNUTLS_E_WARNING_ALERT_RECEIVED
      || err == GNUTLS_E_FATAL_ALERT_RECEIVED)
    {
426
      int alert = fn_gnutls_alert_get (session);
427
      int level = (err == GNUTLS_E_FATAL_ALERT_RECEIVED) ? 0 : 1;
428
      str = fn_gnutls_alert_get_name (alert);
429 430 431 432 433 434 435 436
      if (!str)
	str = "unknown";

      GNUTLS_LOG2 (level, max_log_level, "Received alert: ", str);
    }
  return ret;
}

Ted Zlatanov's avatar
Ted Zlatanov committed
437 438 439 440
/* convert an integer error to a Lisp_Object; it will be either a
   known symbol like `gnutls_e_interrupted' and `gnutls_e_again' or
   simply the integer value of the error.  GNUTLS_E_SUCCESS is mapped
   to Qt.  */
441
static Lisp_Object
442
gnutls_make_error (int err)
Ted Zlatanov's avatar
Ted Zlatanov committed
443
{
444
  switch (err)
445 446 447 448 449 450 451 452 453 454
    {
    case GNUTLS_E_SUCCESS:
      return Qt;
    case GNUTLS_E_AGAIN:
      return Qgnutls_e_again;
    case GNUTLS_E_INTERRUPTED:
      return Qgnutls_e_interrupted;
    case GNUTLS_E_INVALID_SESSION:
      return Qgnutls_e_invalid_session;
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
455

456
  return make_number (err);
Ted Zlatanov's avatar
Ted Zlatanov committed
457 458 459
}

DEFUN ("gnutls-get-initstage", Fgnutls_get_initstage, Sgnutls_get_initstage, 1, 1, 0,
460
       doc: /* Return the GnuTLS init stage of process PROC.
Ted Zlatanov's avatar
Ted Zlatanov committed
461
See also `gnutls-boot'.  */)
462
  (Lisp_Object proc)
Ted Zlatanov's avatar
Ted Zlatanov committed
463 464 465 466 467 468 469
{
  CHECK_PROCESS (proc);

  return make_number (GNUTLS_INITSTAGE (proc));
}

DEFUN ("gnutls-errorp", Fgnutls_errorp, Sgnutls_errorp, 1, 1, 0,
470 471 472 473
       doc: /* Return t if ERROR indicates a GnuTLS problem.
ERROR is an integer or a symbol with an integer `gnutls-code' property.
usage: (gnutls-errorp ERROR)  */)
  (Lisp_Object err)
Ted Zlatanov's avatar
Ted Zlatanov committed
474
{
475
  if (EQ (err, Qt)) return Qnil;
Ted Zlatanov's avatar
Ted Zlatanov committed
476 477 478 479 480

  return Qt;
}

DEFUN ("gnutls-error-fatalp", Fgnutls_error_fatalp, Sgnutls_error_fatalp, 1, 1, 0,
481 482 483 484
       doc: /* Check if ERROR is fatal.
ERROR is an integer or a symbol with an integer `gnutls-code' property.
usage: (gnutls-error-fatalp ERROR)  */)
  (Lisp_Object err)
Ted Zlatanov's avatar
Ted Zlatanov committed
485 486 487 488 489 490 491
{
  Lisp_Object code;

  if (EQ (err, Qt)) return Qnil;

  if (SYMBOLP (err))
    {
492 493 494 495 496 497 498 499 500
      code = Fget (err, Qgnutls_code);
      if (NUMBERP (code))
	{
	  err = code;
	}
      else
	{
	  error ("Symbol has no numeric gnutls-code property");
	}
Ted Zlatanov's avatar
Ted Zlatanov committed
501 502 503 504 505
    }

  if (!NUMBERP (err))
    error ("Not an error symbol or code");

506
  if (0 == fn_gnutls_error_is_fatal (XINT (err)))
Ted Zlatanov's avatar
Ted Zlatanov committed
507 508 509 510 511 512
    return Qnil;

  return Qt;
}

DEFUN ("gnutls-error-string", Fgnutls_error_string, Sgnutls_error_string, 1, 1, 0,
513 514 515 516
       doc: /* Return a description of ERROR.
ERROR is an integer or a symbol with an integer `gnutls-code' property.
usage: (gnutls-error-string ERROR)  */)
  (Lisp_Object err)
Ted Zlatanov's avatar
Ted Zlatanov committed
517 518 519 520 521 522 523
{
  Lisp_Object code;

  if (EQ (err, Qt)) return build_string ("Not an error");

  if (SYMBOLP (err))
    {
524 525 526 527 528 529 530 531 532
      code = Fget (err, Qgnutls_code);
      if (NUMBERP (code))
	{
	  err = code;
	}
      else
	{
	  return build_string ("Symbol has no numeric gnutls-code property");
	}
Ted Zlatanov's avatar
Ted Zlatanov committed
533 534 535 536 537
    }

  if (!NUMBERP (err))
    return build_string ("Not an error symbol or code");

538
  return build_string (fn_gnutls_strerror (XINT (err)));
Ted Zlatanov's avatar
Ted Zlatanov committed
539 540 541
}

DEFUN ("gnutls-deinit", Fgnutls_deinit, Sgnutls_deinit, 1, 1, 0,
542
       doc: /* Deallocate GnuTLS resources associated with process PROC.
Ted Zlatanov's avatar
Ted Zlatanov committed
543
See also `gnutls-init'.  */)
544
  (Lisp_Object proc)
Ted Zlatanov's avatar
Ted Zlatanov committed
545 546 547 548 549 550 551
{
  gnutls_session_t state;

  CHECK_PROCESS (proc);
  state = XPROCESS (proc)->gnutls_state;

  if (GNUTLS_INITSTAGE (proc) >= GNUTLS_STAGE_INIT)
552
    {
553
      fn_gnutls_deinit (state);
Ted Zlatanov's avatar
Ted Zlatanov committed
554
      GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_INIT - 1;
555
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
556 557 558 559

  return Qt;
}

560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580
DEFUN ("gnutls-available-p", Fgnutls_available_p, Sgnutls_available_p, 0, 0, 0,
       doc: /* Return t if GnuTLS is available in this instance of Emacs.  */)
     (void)
{
#ifdef WINDOWSNT
  Lisp_Object found = Fassq (Qgnutls_dll, Vlibrary_cache);
  if (CONSP (found))
    return XCDR (found);
  else
    {
      Lisp_Object status;
      status = init_gnutls_functions (Vdynamic_library_alist) ? Qt : Qnil;
      Vlibrary_cache = Fcons (Fcons (Qgnutls_dll, status), Vlibrary_cache);
      return status;
    }
#else
  return Qt;
#endif
}


581 582
/* Initializes global GnuTLS state to defaults.
Call `gnutls-global-deinit' when GnuTLS usage is no longer needed.
Ted Zlatanov's avatar
Ted Zlatanov committed
583
Returns zero on success.  */
584
static Lisp_Object
585
emacs_gnutls_global_init (void)
Ted Zlatanov's avatar
Ted Zlatanov committed
586 587 588
{
  int ret = GNUTLS_E_SUCCESS;

589
  if (!gnutls_global_initialized)
590 591 592 593 594
    {
      fn_gnutls_global_set_mem_functions (xmalloc, xmalloc, NULL,
					  xrealloc, xfree);
      ret = fn_gnutls_global_init ();
    }
595
  gnutls_global_initialized = 1;
Ted Zlatanov's avatar
Ted Zlatanov committed
596 597 598 599

  return gnutls_make_error (ret);
}

600
#if 0
601
/* Deinitializes global GnuTLS state.
Ted Zlatanov's avatar
Ted Zlatanov committed
602
See also `gnutls-global-init'.  */
603
static Lisp_Object
604
emacs_gnutls_global_deinit (void)
Ted Zlatanov's avatar
Ted Zlatanov committed
605
{
606
  if (gnutls_global_initialized)
Ted Zlatanov's avatar
Ted Zlatanov committed
607 608
    gnutls_global_deinit ();

609
  gnutls_global_initialized = 0;
Ted Zlatanov's avatar
Ted Zlatanov committed
610 611 612

  return gnutls_make_error (GNUTLS_E_SUCCESS);
}
613
#endif
Ted Zlatanov's avatar
Ted Zlatanov committed
614

615 616
DEFUN ("gnutls-boot", Fgnutls_boot, Sgnutls_boot, 3, 3, 0,
       doc: /* Initialize GnuTLS client for process PROC with TYPE+PROPLIST.
Ted Zlatanov's avatar
Ted Zlatanov committed
617 618 619
Currently only client mode is supported.  Returns a success/failure
value you can check with `gnutls-errorp'.

620 621 622
TYPE is a symbol, either `gnutls-anon' or `gnutls-x509pki'.
PROPLIST is a property list with the following keys:

623 624
:hostname is a string naming the remote host.

625
:priority is a GnuTLS priority string, defaults to "NORMAL".
626

627
:trustfiles is a list of PEM-encoded trust files for `gnutls-x509pki'.
628

629 630 631 632
:crlfiles is a list of PEM-encoded CRL lists for `gnutls-x509pki'.

:keylist is an alist of PEM-encoded key files and PEM-encoded
certificates for `gnutls-x509pki'.
633 634 635

:callbacks is an alist of callback functions, see below.

636
:loglevel is the debug level requested from GnuTLS, try 4.
637

638 639 640 641 642 643
:verify-flags is a bitset as per GnuTLS'
gnutls_certificate_set_verify_flags.

:verify-hostname-error, if non-nil, makes a hostname mismatch an
error.  Otherwise it will be just a warning.

644 645 646
The debug level will be set for this process AND globally for GnuTLS.
So if you set it higher or lower at any point, it affects global
debugging.
Ted Zlatanov's avatar
Ted Zlatanov committed
647 648 649 650 651

Note that the priority is set on the client.  The server does not use
the protocols's priority except for disabling protocols that were not
specified.

652
Processes must be initialized with this function before other GnuTLS
Ted Zlatanov's avatar
Ted Zlatanov committed
653 654 655
functions are used.  This function allocates resources which can only
be deallocated by calling `gnutls-deinit' or by calling it again.

656 657 658
The callbacks alist can have a `verify' key, associated with a
verification function (UNUSED).

Ted Zlatanov's avatar
Ted Zlatanov committed
659
Each authentication type may need additional information in order to
660 661 662
work.  For X.509 PKI (`gnutls-x509pki'), you probably need at least
one trustfile (usually a CA bundle).  */)
  (Lisp_Object proc, Lisp_Object type, Lisp_Object proplist)
Ted Zlatanov's avatar
Ted Zlatanov committed
663 664 665
{
  int ret = GNUTLS_E_SUCCESS;

666 667
  int max_log_level = 0;

Ted Zlatanov's avatar
Ted Zlatanov committed
668 669 670
  /* TODO: GNUTLS_X509_FMT_DER is also an option.  */
  int file_format = GNUTLS_X509_FMT_PEM;

671 672 673 674 675
  unsigned int gnutls_verify_flags = GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT;
  gnutls_x509_crt_t gnutls_verify_cert;
  unsigned int gnutls_verify_cert_list_size;
  const gnutls_datum_t *gnutls_verify_cert_list;

Ted Zlatanov's avatar
Ted Zlatanov committed
676 677 678 679
  gnutls_session_t state;
  gnutls_certificate_credentials_t x509_cred;
  gnutls_anon_client_credentials_t anon_cred;
  Lisp_Object global_init;
680
  char const *priority_string_ptr = "NORMAL"; /* default priority string.  */
681
  Lisp_Object tail;
682
  unsigned int peer_verification;
683
  char* c_hostname;
684 685 686 687

  /* Placeholders for the property list elements.  */
  Lisp_Object priority_string;
  Lisp_Object trustfiles;
688 689
  Lisp_Object crlfiles;
  Lisp_Object keylist;
690
  /* Lisp_Object callbacks; */
691
  Lisp_Object loglevel;
692 693
  Lisp_Object hostname;
  Lisp_Object verify_flags;
Paul Eggert's avatar
Paul Eggert committed
694
  /* Lisp_Object verify_error; */
695
  Lisp_Object verify_hostname_error;
Ted Zlatanov's avatar
Ted Zlatanov committed
696 697 698

  CHECK_PROCESS (proc);
  CHECK_SYMBOL (type);
699 700
  CHECK_LIST (proplist);

701 702 703 704 705 706
  if (NILP (Fgnutls_available_p ()))
    {
      error ("GnuTLS not available");
      return gnutls_make_error (GNUTLS_EMACS_ERROR_NOT_LOADED);
    }

707 708 709
  hostname              = Fplist_get (proplist, Qgnutls_bootprop_hostname);
  priority_string       = Fplist_get (proplist, Qgnutls_bootprop_priority);
  trustfiles            = Fplist_get (proplist, Qgnutls_bootprop_trustfiles);
710 711
  keylist               = Fplist_get (proplist, Qgnutls_bootprop_keylist);
  crlfiles              = Fplist_get (proplist, Qgnutls_bootprop_crlfiles);
Paul Eggert's avatar
Paul Eggert committed
712
  /* callbacks          = Fplist_get (proplist, Qgnutls_bootprop_callbacks); */
713 714
  loglevel              = Fplist_get (proplist, Qgnutls_bootprop_loglevel);
  verify_flags          = Fplist_get (proplist, Qgnutls_bootprop_verify_flags);
715
  /* verify_error       = Fplist_get (proplist, Qgnutls_bootprop_verify_error); */
716 717 718 719 720 721
  verify_hostname_error = Fplist_get (proplist, Qgnutls_bootprop_verify_hostname_error);

  if (!STRINGP (hostname))
    error ("gnutls-boot: invalid :hostname parameter");

  c_hostname = SSDATA (hostname);
Ted Zlatanov's avatar
Ted Zlatanov committed
722 723

  state = XPROCESS (proc)->gnutls_state;
724
  XPROCESS (proc)->gnutls_p = 1;
Ted Zlatanov's avatar
Ted Zlatanov committed
725

726 727
  if (NUMBERP (loglevel))
    {
728 729
      fn_gnutls_global_set_log_function (gnutls_log_function);
      fn_gnutls_global_set_log_level (XINT (loglevel));
730 731 732
      max_log_level = XINT (loglevel);
      XPROCESS (proc)->gnutls_log_level = max_log_level;
    }
733

Ted Zlatanov's avatar
Ted Zlatanov committed
734
  /* always initialize globals.  */
735
  global_init = emacs_gnutls_global_init ();
Ted Zlatanov's avatar
Ted Zlatanov committed
736 737 738 739 740
  if (! NILP (Fgnutls_errorp (global_init)))
    return global_init;

  /* deinit and free resources.  */
  if (GNUTLS_INITSTAGE (proc) >= GNUTLS_STAGE_CRED_ALLOC)
741
    {
742 743
      GNUTLS_LOG (1, max_log_level, "deallocating credentials");

Ted Zlatanov's avatar
Ted Zlatanov committed
744
      if (EQ (type, Qgnutls_x509pki))
745
	{
746 747
          GNUTLS_LOG (2, max_log_level, "deallocating x509 credentials");
          x509_cred = XPROCESS (proc)->gnutls_x509_cred;
748
          fn_gnutls_certificate_free_credentials (x509_cred);
749
	}
Ted Zlatanov's avatar
Ted Zlatanov committed
750
      else if (EQ (type, Qgnutls_anon))
751
	{
752 753
          GNUTLS_LOG (2, max_log_level, "deallocating anon credentials");
          anon_cred = XPROCESS (proc)->gnutls_anon_cred;
754
          fn_gnutls_anon_free_client_credentials (anon_cred);
755
	}
Ted Zlatanov's avatar
Ted Zlatanov committed
756
      else
757
	{
Ted Zlatanov's avatar
Ted Zlatanov committed
758 759
          error ("unknown credential type");
          ret = GNUTLS_EMACS_ERROR_INVALID_TYPE;
760
	}
Ted Zlatanov's avatar
Ted Zlatanov committed
761 762

      if (GNUTLS_INITSTAGE (proc) >= GNUTLS_STAGE_INIT)
763
	{
764
          GNUTLS_LOG (1, max_log_level, "deallocating x509 credentials");
Ted Zlatanov's avatar
Ted Zlatanov committed
765
          Fgnutls_deinit (proc);
766 767
	}
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
768 769 770

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_EMPTY;

771 772
  GNUTLS_LOG (1, max_log_level, "allocating credentials");

Ted Zlatanov's avatar
Ted Zlatanov committed
773
  if (EQ (type, Qgnutls_x509pki))
774
    {
775 776
      GNUTLS_LOG (2, max_log_level, "allocating x509 credentials");
      x509_cred = XPROCESS (proc)->gnutls_x509_cred;
777
      fn_gnutls_certificate_allocate_credentials (&x509_cred);
778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793

      if (NUMBERP (verify_flags))
        {
          gnutls_verify_flags = XINT (verify_flags);
          GNUTLS_LOG (2, max_log_level, "setting verification flags");
        }
      else if (NILP (verify_flags))
        {
          /* The default is already GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT.  */
          GNUTLS_LOG (2, max_log_level, "using default verification flags");
        }
      else
        {
          /* The default is already GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT.  */
          GNUTLS_LOG (2, max_log_level, "ignoring invalid verify-flags");
        }
794
      fn_gnutls_certificate_set_verify_flags (x509_cred, gnutls_verify_flags);
795
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
796
  else if (EQ (type, Qgnutls_anon))
797
    {
798 799
      GNUTLS_LOG (2, max_log_level, "allocating anon credentials");
      anon_cred = XPROCESS (proc)->gnutls_anon_cred;
800
      fn_gnutls_anon_allocate_client_credentials (&anon_cred);
801
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
802
  else
803
    {
Ted Zlatanov's avatar
Ted Zlatanov committed
804 805
      error ("unknown credential type");
      ret = GNUTLS_EMACS_ERROR_INVALID_TYPE;
806
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
807 808

  if (ret < GNUTLS_E_SUCCESS)
809
    return gnutls_make_error (ret);
Ted Zlatanov's avatar
Ted Zlatanov committed
810 811 812 813

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_CRED_ALLOC;

  if (EQ (type, Qgnutls_x509pki))
814
    {
815
      for (tail = trustfiles; !NILP (tail); tail = Fcdr (tail))
816
	{
817 818 819 820
	  Lisp_Object trustfile = Fcar (tail);
          if (STRINGP (trustfile))
            {
              GNUTLS_LOG2 (1, max_log_level, "setting the trustfile: ",
821
                           SSDATA (trustfile));
822
              ret = fn_gnutls_certificate_set_x509_trust_file
823
                (x509_cred,
824
                 SSDATA (trustfile),
825
                 file_format);
826

827 828 829 830 831 832
              if (ret < GNUTLS_E_SUCCESS)
                return gnutls_make_error (ret);
            }
          else
            {
              error ("Sorry, GnuTLS can't use non-string trustfile %s",
833
                     SDATA (trustfile));
834 835
            }
        }
Ted Zlatanov's avatar
Ted Zlatanov committed
836

837
      for (tail = crlfiles; !NILP (tail); tail = Fcdr (tail))
838
	{
839 840
	  Lisp_Object crlfile = Fcar (tail);
          if (STRINGP (crlfile))
841
            {
842 843
              GNUTLS_LOG2 (1, max_log_level, "setting the CRL file: ",
                           SSDATA (crlfile));
844
              ret = fn_gnutls_certificate_set_x509_crl_file
845
                (x509_cred,
846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868
                 SSDATA (crlfile),
                 file_format);

              if (ret < GNUTLS_E_SUCCESS)
                return gnutls_make_error (ret);
            }
          else
            {
              error ("Sorry, GnuTLS can't use non-string CRL file %s",
                     SDATA (crlfile));
            }
        }

      for (tail = keylist; !NILP (tail); tail = Fcdr (tail))
	{
	  Lisp_Object keyfile = Fcar (Fcar (tail));
	  Lisp_Object certfile = Fcar (Fcdr (tail));
          if (STRINGP (keyfile) && STRINGP (certfile))
            {
              GNUTLS_LOG2 (1, max_log_level, "setting the client key file: ",
                           SSDATA (keyfile));
              GNUTLS_LOG2 (1, max_log_level, "setting the client cert file: ",
                           SSDATA (certfile));
869
              ret = fn_gnutls_certificate_set_x509_key_file
870 871
                (x509_cred,
                 SSDATA (certfile),
872
                 SSDATA (keyfile),
873
                 file_format);
874

875 876 877 878 879
              if (ret < GNUTLS_E_SUCCESS)
                return gnutls_make_error (ret);
            }
          else
            {
880 881 882 883 884 885
              if (STRINGP (keyfile))
                error ("Sorry, GnuTLS can't use non-string client cert file %s",
                       SDATA (certfile));
              else
                error ("Sorry, GnuTLS can't use non-string client key file %s",
                       SDATA (keyfile));
886 887
            }
        }
888
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
889 890 891

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_FILES;

892 893 894 895 896 897 898 899
  GNUTLS_LOG (1, max_log_level, "gnutls callbacks");

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_CALLBACKS;

#ifdef HAVE_GNUTLS_CALLBACK_CERTIFICATE_VERIFY
#else
#endif

900 901
  GNUTLS_LOG (1, max_log_level, "gnutls_init");

902
  ret = fn_gnutls_init (&state, GNUTLS_CLIENT);
Ted Zlatanov's avatar
Ted Zlatanov committed
903 904

  if (ret < GNUTLS_E_SUCCESS)
905
    return gnutls_make_error (ret);
Ted Zlatanov's avatar
Ted Zlatanov committed
906 907 908 909 910

  XPROCESS (proc)->gnutls_state = state;

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_INIT;

911 912
  if (STRINGP (priority_string))
    {
913
      priority_string_ptr = SSDATA (priority_string);
914 915 916 917 918 919 920 921
      GNUTLS_LOG2 (1, max_log_level, "got non-default priority string:",
                   priority_string_ptr);
    }
  else
    {
      GNUTLS_LOG2 (1, max_log_level, "using default priority string:",
                   priority_string_ptr);
    }
922

923 924
  GNUTLS_LOG (1, max_log_level, "setting the priority string");

925 926 927
  ret = fn_gnutls_priority_set_direct (state,
                                       priority_string_ptr,
                                       NULL);
Ted Zlatanov's avatar
Ted Zlatanov committed
928 929

  if (ret < GNUTLS_E_SUCCESS)
930
    return gnutls_make_error (ret);
Ted Zlatanov's avatar
Ted Zlatanov committed
931 932 933 934

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_PRIORITY;

  if (EQ (type, Qgnutls_x509pki))
935
    {
936
      ret = fn_gnutls_credentials_set (state, GNUTLS_CRD_CERTIFICATE, x509_cred);
937
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
938
  else if (EQ (type, Qgnutls_anon))
939
    {
940
      ret = fn_gnutls_credentials_set (state, GNUTLS_CRD_ANON, anon_cred);
941
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
942
  else
943
    {
Ted Zlatanov's avatar
Ted Zlatanov committed
944 945
      error ("unknown credential type");
      ret = GNUTLS_EMACS_ERROR_INVALID_TYPE;
946
    }
Ted Zlatanov's avatar
Ted Zlatanov committed
947 948

  if (ret < GNUTLS_E_SUCCESS)
949
    return gnutls_make_error (ret);
Ted Zlatanov's avatar
Ted Zlatanov committed
950

951 952
  XPROCESS (proc)->gnutls_anon_cred = anon_cred;
  XPROCESS (proc)->gnutls_x509_cred = x509_cred;
Ted Zlatanov's avatar
Ted Zlatanov committed
953 954 955 956
  XPROCESS (proc)->gnutls_cred_type = type;

  GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_CRED_SET;

957
  ret = emacs_gnutls_handshake (XPROCESS (proc));
958

959 960 961 962 963 964 965 966 967
  if (ret < GNUTLS_E_SUCCESS)
    return gnutls_make_error (ret);

  /* Now verify the peer, following
     http://www.gnu.org/software/gnutls/manual/html_node/Verifying-peer_0027s-certificate.html.
     The peer should present at least one certificate in the chain; do a
     check of the certificate's hostname with
     gnutls_x509_crt_check_hostname() against :hostname.  */

968
  ret = fn_gnutls_certificate_verify_peers2 (state, &peer_verification);
969 970 971

  if (ret < GNUTLS_E_SUCCESS)
    return gnutls_make_error (ret);
Paul Eggert's avatar
Paul Eggert committed
972

973
  if (XINT (loglevel) > 0 && peer_verification & GNUTLS_CERT_INVALID)
Paul Eggert's avatar
Paul Eggert committed
974
    message ("%s certificate could not be verified.",
975
             c_hostname);
Paul Eggert's avatar
Paul Eggert committed
976

977 978 979
 if (peer_verification & GNUTLS_CERT_REVOKED)
   GNUTLS_LOG2 (1, max_log_level, "certificate was revoked (CRL):",
                c_hostname);
Paul Eggert's avatar
Paul Eggert committed
980

981 982 983
 if (peer_verification & GNUTLS_CERT_SIGNER_NOT_FOUND)
   GNUTLS_LOG2 (1, max_log_level, "certificate signer was not found:",
                c_hostname);
Paul Eggert's avatar
Paul Eggert committed
984

985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018
 if (peer_verification & GNUTLS_CERT_SIGNER_NOT_CA)
   GNUTLS_LOG2 (1, max_log_level, "certificate signer is not a CA:",
                c_hostname);

 if (peer_verification & GNUTLS_CERT_INSECURE_ALGORITHM)
   GNUTLS_LOG2 (1, max_log_level,
                "certificate was signed with an insecure algorithm:",
                c_hostname);

 if (peer_verification & GNUTLS_CERT_NOT_ACTIVATED)
   GNUTLS_LOG2 (1, max_log_level, "certificate is not yet activated:",
                c_hostname);

 if (peer_verification & GNUTLS_CERT_EXPIRED)
   GNUTLS_LOG2 (1, max_log_level, "certificate has expired:",
                c_hostname);

 if (peer_verification != 0)
   {
     if (NILP (verify_hostname_error))
       {
         GNUTLS_LOG2 (1, max_log_level, "certificate validation failed:",
                      c_hostname);
       }
     else
       {
         error ("Certificate validation failed %s, verification code %d",
                c_hostname, peer_verification);
       }
   }

  /* Up to here the process is the same for X.509 certificates and
     OpenPGP keys.  From now on X.509 certificates are assumed.  This
     can be easily extended to work with openpgp keys as well.  */
1019
  if (fn_gnutls_certificate_type_get (state) == GNUTLS_CRT_X509)
1020
    {
1021
      ret = fn_gnutls_x509_crt_init (&gnutls_verify_cert);
1022 1023 1024 1025

      if (ret < GNUTLS_E_SUCCESS)
        return gnutls_make_error (ret);

Paul Eggert's avatar
Paul Eggert committed
1026
      gnutls_verify_cert_list =
1027
        fn_gnutls_certificate_get_peers (state, &gnutls_verify_cert_list_size);
1028 1029 1030 1031 1032 1033 1034

      if (NULL == gnutls_verify_cert_list)
        {
          error ("No x509 certificate was found!\n");
        }

      /* We only check the first certificate in the given chain.  */
1035 1036 1037
      ret = fn_gnutls_x509_crt_import (gnutls_verify_cert,
                                       &gnutls_verify_cert_list[0],
                                       GNUTLS_X509_FMT_DER);
1038 1039 1040

      if (ret < GNUTLS_E_SUCCESS)
        {
1041
          fn_gnutls_x509_crt_deinit (gnutls_verify_cert);
1042 1043 1044
          return gnutls_make_error (ret);
        }