blob: ed89fb25071c660fbed331e4b4f81d8c5fd2865a [file] [log] [blame]
/**
* @file session_server_tls.c
* @author Michal Vasko <mvasko@cesnet.cz>
* @author Roman Janota <janota@cesnet.cz>
* @brief libnetconf2 TLS server session manipulation functions
*
* @copyright
* Copyright (c) 2015 - 2023 CESNET, z.s.p.o.
*
* This source code is licensed under BSD 3-Clause License (the "License").
* You may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* https://opensource.org/licenses/BSD-3-Clause
*/
#define _GNU_SOURCE
#include <poll.h>
#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>
#include <curl/curl.h>
#include "compat.h"
#include "config.h"
#include "log_p.h"
#include "session.h"
#include "session_p.h"
#include "session_wrapper.h"
struct nc_server_tls_opts tls_ch_opts;
extern struct nc_server_opts server_opts;
static int
nc_server_tls_ks_ref_get_cert_key(const char *referenced_key_name, const char *referenced_cert_name,
char **privkey_data, NC_PRIVKEY_FORMAT *privkey_type, char **cert_data)
{
uint16_t i, j;
struct nc_keystore *ks = &server_opts.keystore;
*privkey_data = NULL;
*cert_data = NULL;
/* lookup name */
for (i = 0; i < ks->asym_key_count; i++) {
if (!strcmp(referenced_key_name, ks->asym_keys[i].name)) {
break;
}
}
if (i == ks->asym_key_count) {
ERR(NULL, "Keystore entry \"%s\" not found.", referenced_key_name);
return -1;
}
for (j = 0; j < ks->asym_keys[i].cert_count; j++) {
if (!strcmp(referenced_cert_name, ks->asym_keys[i].certs[j].name)) {
break;
}
}
if (j == ks->asym_keys[i].cert_count) {
ERR(NULL, "Keystore certificate entry \"%s\" associated with the key \"%s\" not found.",
referenced_cert_name, referenced_key_name);
return -1;
}
*privkey_data = ks->asym_keys[i].privkey_data;
*privkey_type = ks->asym_keys[i].privkey_type;
*cert_data = ks->asym_keys[i].certs[j].data;
return 0;
}
static int
nc_server_tls_truststore_ref_get_certs(const char *referenced_name, struct nc_certificate **certs, uint16_t *cert_count)
{
uint16_t i;
struct nc_truststore *ts = &server_opts.truststore;
*certs = NULL;
*cert_count = 0;
/* lookup name */
for (i = 0; i < ts->cert_bag_count; i++) {
if (!strcmp(referenced_name, ts->cert_bags[i].name)) {
break;
}
}
if (i == ts->cert_bag_count) {
ERR(NULL, "Truststore entry \"%s\" not found.", referenced_name);
return -1;
}
*certs = ts->cert_bags[i].certs;
*cert_count = ts->cert_bags[i].cert_count;
return 0;
}
static void *
nc_base64der_to_privkey(const char *in, const char *key_str)
{
char *buf = NULL;
void *pkey;
NC_CHECK_ARG_RET(NULL, in, NULL);
if (asprintf(&buf, "%s%s%s%s%s%s%s", "-----BEGIN", key_str, "PRIVATE KEY-----\n", in, "\n-----END",
key_str, "PRIVATE KEY-----") == -1) {
ERRMEM;
return NULL;
}
pkey = nc_tls_pem_to_privkey_wrap(buf);
free(buf);
return pkey;
}
static char *
nc_server_tls_digest_to_hex(const unsigned char *digest, unsigned int digest_len)
{
unsigned int i;
char *hex;
hex = malloc(digest_len * 3);
NC_CHECK_ERRMEM_RET(!hex, NULL);
for (i = 0; i < digest_len - 1; ++i) {
sprintf(hex + (i * 3), "%02x:", digest[i]);
}
sprintf(hex + (i * 3), "%02x", digest[i]);
return hex;
}
static char *
nc_server_tls_md5(void *cert)
{
int rc;
unsigned int buf_len = 16;
unsigned char buf[buf_len];
/* compute MD-5 hash of cert and store it in buf */
rc = nc_server_tls_md5_wrap(cert, buf);
if (rc) {
return NULL;
}
/* convert the hash to hex */
return nc_server_tls_digest_to_hex(buf, buf_len);
}
static char *
nc_server_tls_sha1(void *cert)
{
int rc;
unsigned int buf_len = 20;
unsigned char buf[buf_len];
/* compute SHA-1 hash of cert and store it in buf */
rc = nc_server_tls_sha1_wrap(cert, buf);
if (rc) {
return NULL;
}
/* convert the hash to hex */
return nc_server_tls_digest_to_hex(buf, buf_len);
}
static char *
nc_server_tls_sha224(void *cert)
{
int rc;
unsigned int buf_len = 28;
unsigned char buf[buf_len];
/* compute SHA-224 hash of cert and store it in buf */
rc = nc_server_tls_sha224_wrap(cert, buf);
if (rc) {
return NULL;
}
/* convert the hash to hex */
return nc_server_tls_digest_to_hex(buf, buf_len);
}
static char *
nc_server_tls_sha256(void *cert)
{
int rc;
unsigned int buf_len = 32;
unsigned char buf[buf_len];
/* compute SHA-256 hash of cert and store it in buf */
rc = nc_server_tls_sha256_wrap(cert, buf);
if (rc) {
return NULL;
}
/* convert the hash to hex */
return nc_server_tls_digest_to_hex(buf, buf_len);
}
static char *
nc_server_tls_sha384(void *cert)
{
int rc;
unsigned int buf_len = 48;
unsigned char buf[buf_len];
/* compute SHA-384 hash of cert and store it in buf */
rc = nc_server_tls_sha384_wrap(cert, buf);
if (rc) {
return NULL;
}
/* convert the hash to hex */
return nc_server_tls_digest_to_hex(buf, buf_len);
}
static char *
nc_server_tls_sha512(void *cert)
{
int rc;
unsigned int buf_len = 64;
unsigned char buf[buf_len];
/* compute SHA-512 hash of cert and store it in buf */
rc = nc_server_tls_sha512_wrap(cert, buf);
if (rc) {
return NULL;
}
/* convert the hash to hex */
return nc_server_tls_digest_to_hex(buf, buf_len);
}
static int
nc_server_tls_get_username(void *cert, struct nc_ctn *ctn, char **username)
{
char *subject, *cn, *san_value = NULL, rdn_separator;
void *sans;
int i, nsans = 0, rc;
NC_TLS_CTN_MAPTYPE san_type = 0;
#ifdef HAVE_LIBMEDTLS
rdn_separator = ',';
#else
rdn_separator = '/';
#endif
if (ctn->map_type == NC_TLS_CTN_SPECIFIED) {
*username = strdup(ctn->name);
NC_CHECK_ERRMEM_RET(!*username, -1);
} else if (ctn->map_type == NC_TLS_CTN_COMMON_NAME) {
subject = nc_server_tls_get_subject_wrap(cert);
if (!subject) {
return -1;
}
cn = strstr(subject, "CN=");
if (!cn) {
WRN(NULL, "Certificate does not include the commonName field.");
free(subject);
return 1;
}
/* skip "CN=" */
cn += 3;
if (strchr(cn, rdn_separator)) {
*strchr(cn, rdn_separator) = '\0';
}
*username = strdup(cn);
free(subject);
NC_CHECK_ERRMEM_RET(!*username, -1);
} else {
sans = nc_tls_get_sans_wrap(cert);
if (!sans) {
WRN(NULL, "Certificate has no SANs or failed to retrieve them.");
return 1;
}
nsans = nc_tls_get_num_sans_wrap(sans);
for (i = 0; i < nsans; i++) {
if ((rc = nc_tls_get_san_value_type_wrap(sans, i, &san_value, &san_type))) {
if (rc == -1) {
/* fatal error */
nc_tls_sans_destroy_wrap(sans);
return -1;
}
/* got a type that we dont care about */
continue;
}
if ((ctn->map_type == NC_TLS_CTN_SAN_ANY) || (ctn->map_type == san_type)) {
/* found a match */
*username = san_value;
break;
}
free(san_value);
}
nc_tls_sans_destroy_wrap(sans);
if (i == nsans) {
switch (ctn->map_type) {
case NC_TLS_CTN_SAN_RFC822_NAME:
WRN(NULL, "Certificate does not include the SAN rfc822Name field.");
break;
case NC_TLS_CTN_SAN_DNS_NAME:
WRN(NULL, "Certificate does not include the SAN dNSName field.");
break;
case NC_TLS_CTN_SAN_IP_ADDRESS:
WRN(NULL, "Certificate does not include the SAN iPAddress field.");
break;
case NC_TLS_CTN_SAN_ANY:
WRN(NULL, "Certificate does not include any relevant SAN fields.");
break;
default:
break;
}
return 1;
}
}
return 0;
}
static int
nc_server_tls_cert_to_name(struct nc_ctn *ctn, void *cert_chain, char **username)
{
int ret = 1, i, cert_count, fingerprint_match;
char *digest_md5 = NULL, *digest_sha1 = NULL, *digest_sha224 = NULL;
char *digest_sha256 = NULL, *digest_sha384 = NULL, *digest_sha512 = NULL;
void *cert;
/* first make sure the entry is valid */
if (!ctn->map_type || ((ctn->map_type == NC_TLS_CTN_SPECIFIED) && !ctn->name)) {
VRB(NULL, "Cert verify CTN: entry with id %u not valid, skipping.", ctn->id);
return 1;
}
cert_count = nc_tls_get_num_certs_wrap(cert_chain);
for (i = 0; i < cert_count; i++) {
/* reset the flag */
fingerprint_match = 0;
/*get next cert */
nc_tls_get_cert_wrap(cert_chain, i, &cert);
if (!cert) {
ERR(NULL, "Failed to get certificate from the chain.");
ret = -1;
goto cleanup;
}
if (!ctn->fingerprint) {
/* if ctn has no fingerprint, it will match any certificate */
fingerprint_match = 1;
/* MD5 */
} else if (!strncmp(ctn->fingerprint, "01", 2)) {
digest_md5 = nc_server_tls_md5(cert);
if (!digest_md5) {
ret = -1;
goto cleanup;
}
if (!strcasecmp(ctn->fingerprint + 3, digest_md5)) {
/* we got ourselves a potential winner! */
VRB(NULL, "Cert verify CTN: entry with a matching fingerprint found.");
fingerprint_match = 1;
}
free(digest_md5);
digest_md5 = NULL;
/* SHA-1 */
} else if (!strncmp(ctn->fingerprint, "02", 2)) {
digest_sha1 = nc_server_tls_sha1(cert);
if (!digest_sha1) {
ret = -1;
goto cleanup;
}
if (!strcasecmp(ctn->fingerprint + 3, digest_sha1)) {
/* we got ourselves a potential winner! */
VRB(NULL, "Cert verify CTN: entry with a matching fingerprint found.");
fingerprint_match = 1;
}
free(digest_sha1);
digest_sha1 = NULL;
/* SHA-224 */
} else if (!strncmp(ctn->fingerprint, "03", 2)) {
digest_sha224 = nc_server_tls_sha224(cert);
if (!digest_sha224) {
ret = -1;
goto cleanup;
}
if (!strcasecmp(ctn->fingerprint + 3, digest_sha224)) {
/* we got ourselves a potential winner! */
VRB(NULL, "Cert verify CTN: entry with a matching fingerprint found.");
fingerprint_match = 1;
}
free(digest_sha224);
digest_sha224 = NULL;
/* SHA-256 */
} else if (!strncmp(ctn->fingerprint, "04", 2)) {
digest_sha256 = nc_server_tls_sha256(cert);
if (!digest_sha256) {
ret = -1;
goto cleanup;
}
if (!strcasecmp(ctn->fingerprint + 3, digest_sha256)) {
/* we got ourselves a potential winner! */
VRB(NULL, "Cert verify CTN: entry with a matching fingerprint found.");
fingerprint_match = 1;
}
free(digest_sha256);
digest_sha256 = NULL;
/* SHA-384 */
} else if (!strncmp(ctn->fingerprint, "05", 2)) {
digest_sha384 = nc_server_tls_sha384(cert);
if (!digest_sha384) {
ret = -1;
goto cleanup;
}
if (!strcasecmp(ctn->fingerprint + 3, digest_sha384)) {
/* we got ourselves a potential winner! */
VRB(NULL, "Cert verify CTN: entry with a matching fingerprint found.");
fingerprint_match = 1;
}
free(digest_sha384);
digest_sha384 = NULL;
/* SHA-512 */
} else if (!strncmp(ctn->fingerprint, "06", 2)) {
digest_sha512 = nc_server_tls_sha512(cert);
if (!digest_sha512) {
ret = -1;
goto cleanup;
}
if (!strcasecmp(ctn->fingerprint + 3, digest_sha512)) {
/* we got ourselves a potential winner! */
VRB(NULL, "Cert verify CTN: entry with a matching fingerprint found.");
fingerprint_match = 1;
}
free(digest_sha512);
digest_sha512 = NULL;
/* unknown */
} else {
WRN(NULL, "Unknown fingerprint algorithm used (%s), skipping.", ctn->fingerprint);
continue;
}
if (fingerprint_match) {
/* found a fingerprint match, try to obtain the username */
ret = nc_server_tls_get_username(cert, ctn, username);
if (ret == -1) {
/* fatal error */
goto cleanup;
} else if (!ret) {
/* username found */
goto cleanup;
}
}
}
cleanup:
return ret;
}
static int
_nc_server_tls_cert_to_name(struct nc_server_tls_opts *opts, void *cert_chain, char **username)
{
int ret = 1;
struct nc_endpt *referenced_endpt;
struct nc_ctn *ctn;
for (ctn = opts->ctn; ctn; ctn = ctn->next) {
ret = nc_server_tls_cert_to_name(ctn, cert_chain, username);
if (ret != 1) {
/* fatal error or success */
goto cleanup;
}
}
/* do the same for referenced endpoint's ctn entries */
if (opts->referenced_endpt_name) {
if (nc_server_get_referenced_endpt(opts->referenced_endpt_name, &referenced_endpt)) {
ERRINT;
ret = -1;
goto cleanup;
}
for (ctn = referenced_endpt->opts.tls->ctn; ctn; ctn = ctn->next) {
ret = nc_server_tls_cert_to_name(ctn, cert_chain, username);
if (ret != 1) {
/* fatal error or success */
goto cleanup;
}
}
}
cleanup:
return ret;
}
static int
_nc_server_tls_verify_peer_cert(void *peer_cert, struct nc_cert_grouping *ee_certs)
{
int i, ret;
void *cert;
struct nc_certificate *certs;
uint16_t cert_count;
if (ee_certs->store == NC_STORE_LOCAL) {
/* local definition */
certs = ee_certs->certs;
cert_count = ee_certs->cert_count;
} else {
/* truststore reference */
if (nc_server_tls_truststore_ref_get_certs(ee_certs->ts_ref, &certs, &cert_count)) {
ERR(NULL, "Error getting end-entity certificates from the truststore reference \"%s\".", ee_certs->ts_ref);
return -1;
}
}
for (i = 0; i < cert_count; i++) {
/* import stored cert */
cert = nc_base64der_to_cert(certs[i].data);
/* compare stored with received */
ret = nc_server_tls_certs_match_wrap(peer_cert, cert);
nc_tls_cert_destroy_wrap(cert);
if (ret) {
/* found a match */
VRB(NULL, "Cert verify: fail, but the end-entity certificate is trusted, continuing.");
return 0;
}
}
return 1;
}
int
nc_server_tls_verify_peer_cert(void *peer_cert, struct nc_server_tls_opts *opts)
{
int rc;
struct nc_endpt *referenced_endpt;
rc = _nc_server_tls_verify_peer_cert(peer_cert, &opts->ee_certs);
if (!rc) {
return 0;
}
if (opts->referenced_endpt_name) {
if (nc_server_get_referenced_endpt(opts->referenced_endpt_name, &referenced_endpt)) {
ERRINT;
return -1;
}
rc = _nc_server_tls_verify_peer_cert(peer_cert, &referenced_endpt->opts.tls->ee_certs);
if (!rc) {
return 0;
}
}
return 1;
}
int
nc_server_tls_verify_cert(void *cert, int depth, int trusted, struct nc_tls_verify_cb_data *cb_data)
{
int ret = 0;
char *subject = NULL, *issuer = NULL;
struct nc_server_tls_opts *opts = cb_data->opts;
struct nc_session *session = cb_data->session;
void *cert_chain = cb_data->chain;
if (session->username) {
/* already verified */
return 0;
}
subject = nc_server_tls_get_subject_wrap(cert);
issuer = nc_server_tls_get_issuer_wrap(cert);
if (!subject || !issuer) {
ERR(session, "Failed to get certificate's subject or issuer.");
ret = -1;
goto cleanup;
}
VRB(session, "Cert verify: depth %d.", depth);
VRB(session, "Cert verify: subject: %s.", subject);
VRB(session, "Cert verify: issuer: %s.", issuer);
if (depth == 0) {
if (!trusted) {
/* peer cert is not trusted, so it must match any configured end-entity cert
* on the given endpoint in order for the client to be authenticated */
ret = nc_server_tls_verify_peer_cert(cert, opts);
if (ret) {
ERR(session, "Cert verify: fail (Client certificate not trusted and does not match any configured end-entity certificate).");
goto cleanup;
}
}
/* get username since we are at depth 0 and have the whole cert chain,
* the whole chain is needed in order to comply with the following issue:
* https://github.com/CESNET/netopeer2/issues/1596
*/
ret = _nc_server_tls_cert_to_name(opts, cert_chain, &session->username);
if (ret == -1) {
/* fatal error */
goto cleanup;
}
if (session->username) {
VRB(NULL, "Cert verify CTN: new client username recognized as \"%s\".", session->username);
} else {
VRB(NULL, "Cert verify CTN: unsuccessful, dropping the new client.");
ret = 1;
goto cleanup;
}
if (server_opts.user_verify_clb && !server_opts.user_verify_clb(session)) {
VRB(session, "Cert verify: user verify callback revoked authorization.");
ret = 1;
goto cleanup;
}
}
cleanup:
free(subject);
free(issuer);
return ret;
}
API const void *
nc_session_get_client_cert(const struct nc_session *session)
{
if (!session || (session->side != NC_SERVER)) {
ERRARG(session, "session");
return NULL;
}
return session->opts.server.client_cert;
}
API void
nc_server_tls_set_verify_clb(int (*verify_clb)(const struct nc_session *session))
{
server_opts.user_verify_clb = verify_clb;
}
int
nc_server_tls_load_server_cert_key(struct nc_server_tls_opts *opts, void **srv_cert, void **srv_pkey)
{
char *privkey_data = NULL, *cert_data = NULL;
NC_PRIVKEY_FORMAT privkey_type;
void *cert = NULL;
void *pkey = NULL;
*srv_cert = *srv_pkey = NULL;
/* get data needed for setting the server cert */
if (opts->store == NC_STORE_LOCAL) {
/* local definition */
cert_data = opts->cert_data;
privkey_data = opts->privkey_data;
privkey_type = opts->privkey_type;
} else {
/* keystore */
if (nc_server_tls_ks_ref_get_cert_key(opts->key_ref, opts->cert_ref, &privkey_data, &privkey_type, &cert_data)) {
ERR(NULL, "Getting server certificate from the keystore reference \"%s\" failed.", opts->key_ref);
return 1;
}
}
if (!cert_data || !privkey_data) {
ERR(NULL, "Server certificate not configured.");
return 1;
}
cert = nc_base64der_to_cert(cert_data);
if (!cert) {
return 1;
}
pkey = nc_base64der_to_privkey(privkey_data, nc_privkey_format_to_str(privkey_type));
if (!pkey) {
nc_tls_cert_destroy_wrap(cert);
return 1;
}
*srv_cert = cert;
*srv_pkey = pkey;
return 0;
}
int
nc_server_tls_load_trusted_certs(struct nc_cert_grouping *ca_certs, void *cert_store)
{
struct nc_certificate *certs;
uint16_t i, cert_count;
void *cert;
if (ca_certs->store == NC_STORE_LOCAL) {
/* local definition */
certs = ca_certs->certs;
cert_count = ca_certs->cert_count;
} else {
/* truststore */
if (nc_server_tls_truststore_ref_get_certs(ca_certs->ts_ref, &certs, &cert_count)) {
ERR(NULL, "Error getting certificate-authority certificates from the truststore reference \"%s\".", ca_certs->ts_ref);
return 1;
}
}
for (i = 0; i < cert_count; i++) {
/* parse data into cert */
cert = nc_base64der_to_cert(certs[i].data);
if (!cert) {
return 1;
}
/* store cert in cert store */
if (nc_tls_add_cert_to_store_wrap(cert, cert_store)) {
nc_tls_cert_destroy_wrap(cert);
return 1;
}
}
return 0;
}
static int
nc_server_tls_accept_check(int accept_ret, void *tls_session)
{
uint32_t verify;
char *err;
/* check certificate verification result */
verify = nc_tls_get_verify_result_wrap(tls_session);
if (!verify && (accept_ret == 1)) {
VRB(NULL, "Client certificate verified.");
} else if (verify) {
err = nc_tls_verify_error_string_wrap(verify);
ERR(NULL, "Client certificate error (%s).", err);
free(err);
}
if (accept_ret != 1) {
nc_server_tls_print_accept_err_wrap(accept_ret, tls_session);
}
return accept_ret;
}
/**
* @brief Get the number of certificates in a certificate grouping.
*
* @param[in] certs_grp Certificate grouping to get the number of certificates from.
* @return Number of certificates in the grouping, or -1 on error.
*/
static uint16_t
nc_server_tls_get_num_certs(struct nc_cert_grouping *certs_grp)
{
uint16_t count = 0;
struct nc_certificate *certs;
if (certs_grp->store == NC_STORE_LOCAL) {
count = certs_grp->cert_count;
} else if (certs_grp->store == NC_STORE_TRUSTSTORE) {
if (nc_server_tls_truststore_ref_get_certs(certs_grp->ts_ref, &certs, &count)) {
ERR(NULL, "Getting CA certificates from the truststore reference \"%s\" failed.", certs_grp->ts_ref);
return -1;
}
}
return count;
}
int
nc_accept_tls_session(struct nc_session *session, struct nc_server_tls_opts *opts, int sock, int timeout)
{
int rc, timeouted = 0;
struct timespec ts_timeout;
struct nc_tls_verify_cb_data cb_data = {0};
struct nc_endpt *referenced_endpt;
void *tls_cfg, *srv_cert, *srv_pkey, *cert_store, *crl_store;
uint32_t cert_count = 0;
tls_cfg = srv_cert = srv_pkey = cert_store = crl_store = NULL;
/* set verify cb data */
cb_data.session = session;
cb_data.opts = opts;
/* prepare TLS context from which a session will be created */
tls_cfg = nc_tls_config_new_wrap(NC_SERVER);
if (!tls_cfg) {
goto fail;
}
/* opaque CA/CRL certificate store */
cert_store = nc_tls_cert_store_new_wrap();
if (!cert_store) {
goto fail;
}
/* load server's key and certificate */
if (nc_server_tls_load_server_cert_key(opts, &srv_cert, &srv_pkey)) {
ERR(session, "Loading server certificate and/or private key failed.");
goto fail;
}
/* load trusted CA certificates */
if (nc_server_tls_load_trusted_certs(&opts->ca_certs, cert_store)) {
ERR(session, "Loading server CA certs failed.");
goto fail;
}
/* load referenced endpoint's trusted CA certs if set */
if (opts->referenced_endpt_name) {
if (nc_server_get_referenced_endpt(opts->referenced_endpt_name, &referenced_endpt)) {
ERR(session, "Referenced endpoint \"%s\" not found.", opts->referenced_endpt_name);
goto fail;
}
if (nc_server_tls_load_trusted_certs(&referenced_endpt->opts.tls->ca_certs, cert_store)) {
ERR(session, "Loading server CA certs from referenced endpoint failed.");
goto fail;
}
}
/* Check if there are no CA/end entity certs configured, which is a valid config.
* However, that would imply not using TLS for auth, which is not (yet) supported */
if (!opts->referenced_endpt_name) {
cert_count = nc_server_tls_get_num_certs(&opts->ca_certs) + nc_server_tls_get_num_certs(&opts->ee_certs);
} else {
cert_count = nc_server_tls_get_num_certs(&opts->ca_certs) + nc_server_tls_get_num_certs(&opts->ee_certs) +
nc_server_tls_get_num_certs(&referenced_endpt->opts.tls->ca_certs) +
nc_server_tls_get_num_certs(&referenced_endpt->opts.tls->ee_certs);
}
if (cert_count <= 0) {
ERR(session, "Neither CA nor end-entity certificates configured.");
goto fail;
}
if (nc_session_tls_crl_from_cert_ext_fetch(srv_cert, cert_store, &crl_store)) {
ERR(session, "Loading server CRL failed.");
goto fail;
}
/* set supported TLS versions */
if (opts->tls_versions) {
if (nc_server_tls_set_tls_versions_wrap(tls_cfg, opts->tls_versions)) {
ERR(session, "Setting supported server TLS versions failed.");
goto fail;
}
}
/* set supported cipher suites */
if (opts->ciphers) {
nc_server_tls_set_cipher_suites_wrap(tls_cfg, opts->ciphers);
}
/* set verify flags, callback and its data */
nc_server_tls_set_verify_wrap(tls_cfg, &cb_data);
/* init TLS context and store data which may be needed later in it */
if (nc_tls_init_ctx_wrap(sock, srv_cert, srv_pkey, cert_store, crl_store, &session->ti.tls.ctx)) {
goto fail;
}
/* memory is managed by context now */
srv_cert = srv_pkey = cert_store = crl_store = NULL;
/* setup config from ctx */
if (nc_tls_setup_config_from_ctx_wrap(&session->ti.tls.ctx, NC_SERVER, tls_cfg)) {
goto fail;
}
session->ti.tls.config = tls_cfg;
tls_cfg = NULL;
/* fill session data and create TLS session from config */
session->ti_type = NC_TI_TLS;
if (!(session->ti.tls.session = nc_tls_session_new_wrap(session->ti.tls.config))) {
goto fail;
}
/* set session fd */
nc_server_tls_set_fd_wrap(session->ti.tls.session, sock, &session->ti.tls.ctx);
sock = -1;
/* do the handshake */
if (timeout > -1) {
nc_timeouttime_get(&ts_timeout, timeout);
}
while ((rc = nc_server_tls_handshake_step_wrap(session->ti.tls.session)) == 0) {
usleep(NC_TIMEOUT_STEP);
if ((timeout > -1) && (nc_timeouttime_cur_diff(&ts_timeout) < 1)) {
ERR(session, "TLS accept timeout.");
timeouted = 1;
goto fail;
}
}
/* check if handshake was ok */
if (nc_server_tls_accept_check(rc, session->ti.tls.session) != 1) {
goto fail;
}
return 1;
fail:
if (sock > -1) {
close(sock);
}
nc_tls_config_destroy_wrap(tls_cfg);
nc_tls_cert_destroy_wrap(srv_cert);
nc_tls_privkey_destroy_wrap(srv_pkey);
nc_tls_cert_store_destroy_wrap(cert_store);
nc_tls_crl_store_destroy_wrap(crl_store);
if (timeouted) {
return 0;
} else {
return -1;
}
}