/* * GnuTLS-based implementation of the schannel (SSL/TLS) provider. * * Copyright 2005 Juan Lang * Copyright 2008 Henri Verbeet * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ #if 0 #pragma makedep unix #endif #include "config.h" #include #include #include #include #include #include #ifdef SONAME_LIBGNUTLS #include #include #include #endif #include "ntstatus.h" #define WIN32_NO_STATUS #include "windef.h" #include "winbase.h" #include "winternl.h" #include "sspi.h" #include "secur32_priv.h" #include "wine/unixlib.h" #include "wine/debug.h" #if defined(SONAME_LIBGNUTLS) WINE_DEFAULT_DEBUG_CHANNEL(secur32); WINE_DECLARE_DEBUG_CHANNEL(winediag); /* Not present in gnutls version < 2.9.10. */ static int (*pgnutls_cipher_get_block_size)(gnutls_cipher_algorithm_t); /* Not present in gnutls version < 3.0. */ static void (*pgnutls_transport_set_pull_timeout_function)(gnutls_session_t, int (*)(gnutls_transport_ptr_t, unsigned int)); static void (*pgnutls_dtls_set_mtu)(gnutls_session_t, unsigned int); /* Not present in gnutls version < 3.2.0. */ static int (*pgnutls_alpn_get_selected_protocol)(gnutls_session_t, gnutls_datum_t *); static int (*pgnutls_alpn_set_protocols)(gnutls_session_t, const gnutls_datum_t *, unsigned, unsigned int); /* Not present in gnutls version < 3.3.0. */ static int (*pgnutls_privkey_import_rsa_raw)(gnutls_privkey_t, const gnutls_datum_t *, const gnutls_datum_t *, const gnutls_datum_t *, const gnutls_datum_t *, const gnutls_datum_t *, const gnutls_datum_t *, const gnutls_datum_t *, const gnutls_datum_t *); /* Not present in gnutls version < 3.4.0. */ static int (*pgnutls_privkey_export_x509)(gnutls_privkey_t, gnutls_x509_privkey_t *); static void *libgnutls_handle; #define MAKE_FUNCPTR(f) static typeof(f) * p##f MAKE_FUNCPTR(gnutls_alert_get); MAKE_FUNCPTR(gnutls_alert_get_name); MAKE_FUNCPTR(gnutls_certificate_allocate_credentials); MAKE_FUNCPTR(gnutls_certificate_free_credentials); MAKE_FUNCPTR(gnutls_certificate_get_peers); MAKE_FUNCPTR(gnutls_certificate_set_x509_key); MAKE_FUNCPTR(gnutls_cipher_get); MAKE_FUNCPTR(gnutls_cipher_get_key_size); MAKE_FUNCPTR(gnutls_credentials_set); MAKE_FUNCPTR(gnutls_deinit); MAKE_FUNCPTR(gnutls_global_deinit); MAKE_FUNCPTR(gnutls_global_init); MAKE_FUNCPTR(gnutls_global_set_log_function); MAKE_FUNCPTR(gnutls_global_set_log_level); MAKE_FUNCPTR(gnutls_handshake); MAKE_FUNCPTR(gnutls_init); MAKE_FUNCPTR(gnutls_kx_get); MAKE_FUNCPTR(gnutls_mac_get); MAKE_FUNCPTR(gnutls_mac_get_key_size); MAKE_FUNCPTR(gnutls_perror); MAKE_FUNCPTR(gnutls_protocol_get_version); MAKE_FUNCPTR(gnutls_priority_set_direct); MAKE_FUNCPTR(gnutls_privkey_deinit); MAKE_FUNCPTR(gnutls_privkey_init); MAKE_FUNCPTR(gnutls_record_get_max_size); MAKE_FUNCPTR(gnutls_record_recv); MAKE_FUNCPTR(gnutls_record_send); MAKE_FUNCPTR(gnutls_server_name_set); MAKE_FUNCPTR(gnutls_session_channel_binding); MAKE_FUNCPTR(gnutls_transport_get_ptr); MAKE_FUNCPTR(gnutls_transport_set_errno); MAKE_FUNCPTR(gnutls_transport_set_ptr); MAKE_FUNCPTR(gnutls_transport_set_pull_function); MAKE_FUNCPTR(gnutls_transport_set_push_function); MAKE_FUNCPTR(gnutls_x509_crt_deinit); MAKE_FUNCPTR(gnutls_x509_crt_import); MAKE_FUNCPTR(gnutls_x509_crt_init); MAKE_FUNCPTR(gnutls_x509_privkey_deinit); #undef MAKE_FUNCPTR #if GNUTLS_VERSION_MAJOR < 3 #define GNUTLS_CIPHER_AES_192_CBC 92 #define GNUTLS_CIPHER_AES_128_GCM 93 #define GNUTLS_CIPHER_AES_256_GCM 94 #define GNUTLS_MAC_AEAD 200 #define GNUTLS_KX_ANON_ECDH 11 #define GNUTLS_KX_ECDHE_RSA 12 #define GNUTLS_KX_ECDHE_ECDSA 13 #define GNUTLS_KX_ECDHE_PSK 14 #endif #if GNUTLS_VERSION_MAJOR < 3 || (GNUTLS_VERSION_MAJOR == 3 && GNUTLS_VERSION_MINOR < 5) #define GNUTLS_ALPN_SERVER_PRECEDENCE (1<<1) #endif static int compat_cipher_get_block_size(gnutls_cipher_algorithm_t cipher) { switch(cipher) { case GNUTLS_CIPHER_3DES_CBC: return 8; case GNUTLS_CIPHER_AES_128_CBC: case GNUTLS_CIPHER_AES_256_CBC: return 16; case GNUTLS_CIPHER_ARCFOUR_128: case GNUTLS_CIPHER_ARCFOUR_40: return 1; case GNUTLS_CIPHER_DES_CBC: return 8; case GNUTLS_CIPHER_NULL: return 1; case GNUTLS_CIPHER_RC2_40_CBC: return 8; default: FIXME("Unknown cipher %#x, returning 1\n", cipher); return 1; } } static void compat_gnutls_transport_set_pull_timeout_function(gnutls_session_t session, int (*func)(gnutls_transport_ptr_t, unsigned int)) { FIXME("\n"); } static int compat_gnutls_privkey_export_x509(gnutls_privkey_t privkey, gnutls_x509_privkey_t *key) { FIXME("\n"); return GNUTLS_E_UNKNOWN_PK_ALGORITHM; } static int compat_gnutls_privkey_import_rsa_raw(gnutls_privkey_t key, const gnutls_datum_t *p1, const gnutls_datum_t *p2, const gnutls_datum_t *p3, const gnutls_datum_t *p4, const gnutls_datum_t *p5, const gnutls_datum_t *p6, const gnutls_datum_t *p7, const gnutls_datum_t *p8) { FIXME("\n"); return GNUTLS_E_UNKNOWN_PK_ALGORITHM; } static int compat_gnutls_alpn_get_selected_protocol(gnutls_session_t session, gnutls_datum_t *protocol) { FIXME("\n"); return GNUTLS_E_INVALID_REQUEST; } static int compat_gnutls_alpn_set_protocols(gnutls_session_t session, const gnutls_datum_t *protocols, unsigned size, unsigned int flags) { FIXME("\n"); return GNUTLS_E_INVALID_REQUEST; } static void compat_gnutls_dtls_set_mtu(gnutls_session_t session, unsigned int mtu) { FIXME("\n"); } static void init_schan_buffers(struct schan_buffers *s, const PSecBufferDesc desc, int (*get_next_buffer)(const struct schan_transport *, struct schan_buffers *)) { s->offset = 0; s->limit = ~0UL; s->desc = desc; s->current_buffer_idx = -1; s->alloc_buffer = NULL; s->get_next_buffer = get_next_buffer; } static int schan_find_sec_buffer_idx(const SecBufferDesc *desc, unsigned int start_idx, ULONG buffer_type) { unsigned int i; PSecBuffer buffer; for (i = start_idx; i < desc->cBuffers; ++i) { buffer = &desc->pBuffers[i]; if ((buffer->BufferType | SECBUFFER_ATTRMASK) == (buffer_type | SECBUFFER_ATTRMASK)) return i; } return -1; } static int handshake_get_next_buffer(const struct schan_transport *t, struct schan_buffers *s) { if (s->current_buffer_idx != -1) return -1; return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_TOKEN); } static int handshake_get_next_buffer_alloc(const struct schan_transport *t, struct schan_buffers *s) { if (s->current_buffer_idx == -1) { int idx = schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_TOKEN); if (idx == -1) { idx = schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_EMPTY); if (idx != -1) s->desc->pBuffers[idx].BufferType = SECBUFFER_TOKEN; } if (idx != -1 && !s->desc->pBuffers[idx].pvBuffer && s->alloc_buffer) { s->desc->pBuffers[idx] = *s->alloc_buffer; } return idx; } return -1; } static int send_message_get_next_buffer(const struct schan_transport *t, struct schan_buffers *s) { SecBuffer *b; if (s->current_buffer_idx == -1) return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_STREAM_HEADER); b = &s->desc->pBuffers[s->current_buffer_idx]; if (b->BufferType == SECBUFFER_STREAM_HEADER) return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_DATA); if (b->BufferType == SECBUFFER_DATA) return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_STREAM_TRAILER); return -1; } static int send_message_get_next_buffer_token(const struct schan_transport *t, struct schan_buffers *s) { SecBuffer *b; if (s->current_buffer_idx == -1) return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_TOKEN); b = &s->desc->pBuffers[s->current_buffer_idx]; if (b->BufferType == SECBUFFER_TOKEN) { int idx = schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_TOKEN); if (idx != s->current_buffer_idx) return -1; return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_DATA); } if (b->BufferType == SECBUFFER_DATA) { int idx = schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_TOKEN); if (idx != -1) idx = schan_find_sec_buffer_idx(s->desc, idx + 1, SECBUFFER_TOKEN); return idx; } return -1; } static int recv_message_get_next_buffer(const struct schan_transport *t, struct schan_buffers *s) { if (s->current_buffer_idx != -1) return -1; return schan_find_sec_buffer_idx(s->desc, 0, SECBUFFER_DATA); } static char *get_buffer(const struct schan_transport *t, struct schan_buffers *s, SIZE_T *count) { SIZE_T max_count; PSecBuffer buffer; if (!s->desc) { TRACE("No desc\n"); return NULL; } if (s->current_buffer_idx == -1) { /* Initial buffer */ int buffer_idx = s->get_next_buffer(t, s); if (buffer_idx == -1) { TRACE("No next buffer\n"); return NULL; } s->current_buffer_idx = buffer_idx; } buffer = &s->desc->pBuffers[s->current_buffer_idx]; TRACE("Using buffer %d: cbBuffer %d, BufferType %#x, pvBuffer %p\n", s->current_buffer_idx, buffer->cbBuffer, buffer->BufferType, buffer->pvBuffer); max_count = buffer->cbBuffer - s->offset; if (s->limit != ~0UL && s->limit < max_count) max_count = s->limit; while (!max_count) { int buffer_idx; buffer_idx = s->get_next_buffer(t, s); if (buffer_idx == -1) { TRACE("No next buffer\n"); return NULL; } s->current_buffer_idx = buffer_idx; s->offset = 0; buffer = &s->desc->pBuffers[buffer_idx]; max_count = buffer->cbBuffer; if (s->limit != ~0UL && s->limit < max_count) max_count = s->limit; } if (*count > max_count) *count = max_count; if (s->limit != ~0UL) s->limit -= *count; return (char *)buffer->pvBuffer + s->offset; } static ssize_t pull_adapter(gnutls_transport_ptr_t transport, void *buff, size_t buff_len) { struct schan_transport *t = (struct schan_transport*)transport; gnutls_session_t s = (gnutls_session_t)t->session; SIZE_T len = buff_len; char *b; TRACE("Push %lu bytes\n", len); b = get_buffer(t, &t->in, &len); if (!b) { pgnutls_transport_set_errno(s, EAGAIN); return -1; } memcpy(buff, b, len); t->in.offset += len; TRACE("Wrote %lu bytes\n", len); return len; } static ssize_t push_adapter(gnutls_transport_ptr_t transport, const void *buff, size_t buff_len) { struct schan_transport *t = (struct schan_transport*)transport; gnutls_session_t s = (gnutls_session_t)t->session; SIZE_T len = buff_len; char *b; TRACE("Push %lu bytes\n", len); b = get_buffer(t, &t->out, &len); if (!b) { pgnutls_transport_set_errno(s, EAGAIN); return -1; } memcpy(b, buff, len); t->out.offset += len; TRACE("Wrote %lu bytes\n", len); return len; } static const struct { DWORD enable_flag; const char *gnutls_flag; } protocol_priority_flags[] = { {SP_PROT_DTLS1_2_CLIENT, "VERS-DTLS1.2"}, {SP_PROT_DTLS1_0_CLIENT, "VERS-DTLS1.0"}, {SP_PROT_TLS1_3_CLIENT, "VERS-TLS1.3"}, {SP_PROT_TLS1_2_CLIENT, "VERS-TLS1.2"}, {SP_PROT_TLS1_1_CLIENT, "VERS-TLS1.1"}, {SP_PROT_TLS1_0_CLIENT, "VERS-TLS1.0"}, {SP_PROT_SSL3_CLIENT, "VERS-SSL3.0"} /* {SP_PROT_SSL2_CLIENT} is not supported by GnuTLS */ }; static DWORD supported_protocols; static void check_supported_protocols(void) { gnutls_session_t session; char priority[64]; unsigned i; int err; err = pgnutls_init(&session, GNUTLS_CLIENT); if (err != GNUTLS_E_SUCCESS) { pgnutls_perror(err); return; } for(i = 0; i < ARRAY_SIZE(protocol_priority_flags); i++) { sprintf(priority, "NORMAL:-%s", protocol_priority_flags[i].gnutls_flag); err = pgnutls_priority_set_direct(session, priority, NULL); if (err == GNUTLS_E_SUCCESS) { TRACE("%s is supported\n", protocol_priority_flags[i].gnutls_flag); supported_protocols |= protocol_priority_flags[i].enable_flag; } else TRACE("%s is not supported\n", protocol_priority_flags[i].gnutls_flag); } pgnutls_deinit(session); } static NTSTATUS schan_get_enabled_protocols( void *args ) { return supported_protocols; } static int pull_timeout(gnutls_transport_ptr_t transport, unsigned int timeout) { struct schan_transport *t = (struct schan_transport*)transport; gnutls_session_t s = (gnutls_session_t)t->session; SIZE_T count = 0; TRACE("\n"); if (get_buffer(t, &t->in, &count)) return 1; pgnutls_transport_set_errno(s, EAGAIN); return -1; } static NTSTATUS schan_create_session( void *args ) { const struct create_session_params *params = args; schan_credentials *cred = params->cred; gnutls_session_t *s = (gnutls_session_t*)¶ms->transport->session; char priority[128] = "NORMAL:%LATEST_RECORD_VERSION", *p; BOOL using_vers_all = FALSE, disabled; unsigned int i, flags = (cred->credential_use == SECPKG_CRED_INBOUND) ? GNUTLS_SERVER : GNUTLS_CLIENT; int err; if (cred->enabled_protocols & (SP_PROT_DTLS1_0_CLIENT | SP_PROT_DTLS1_2_CLIENT)) { flags |= GNUTLS_DATAGRAM; } err = pgnutls_init(s, flags); if (err != GNUTLS_E_SUCCESS) { pgnutls_perror(err); return STATUS_INTERNAL_ERROR; } p = priority + strlen(priority); /* VERS-ALL is nice to use for forward compatibility. It was introduced before support for TLS1.3, * so if TLS1.3 is supported, we may safely use it. Otherwise explicitly disable all known * disabled protocols. */ if (supported_protocols & SP_PROT_TLS1_3_CLIENT) { strcpy(p, ":-VERS-ALL"); p += strlen(p); using_vers_all = TRUE; } for (i = 0; i < ARRAY_SIZE(protocol_priority_flags); i++) { if (!(supported_protocols & protocol_priority_flags[i].enable_flag)) continue; disabled = !(cred->enabled_protocols & protocol_priority_flags[i].enable_flag); if (using_vers_all && disabled) continue; *p++ = ':'; *p++ = disabled ? '-' : '+'; strcpy(p, protocol_priority_flags[i].gnutls_flag); p += strlen(p); } TRACE("Using %s priority\n", debugstr_a(priority)); err = pgnutls_priority_set_direct(*s, priority, NULL); if (err != GNUTLS_E_SUCCESS) { pgnutls_perror(err); pgnutls_deinit(*s); return STATUS_INTERNAL_ERROR; } err = pgnutls_credentials_set(*s, GNUTLS_CRD_CERTIFICATE, (gnutls_certificate_credentials_t)cred->credentials); if (err != GNUTLS_E_SUCCESS) { pgnutls_perror(err); pgnutls_deinit(*s); return STATUS_INTERNAL_ERROR; } pgnutls_transport_set_pull_function(*s, pull_adapter); if (flags & GNUTLS_DATAGRAM) pgnutls_transport_set_pull_timeout_function(*s, pull_timeout); pgnutls_transport_set_push_function(*s, push_adapter); pgnutls_transport_set_ptr(*s, (gnutls_transport_ptr_t)params->transport); return STATUS_SUCCESS; } static NTSTATUS schan_dispose_session( void *args ) { const struct session_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; pgnutls_deinit(s); return STATUS_SUCCESS; } static NTSTATUS schan_set_session_target( void *args ) { const struct set_session_target_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; pgnutls_server_name_set( s, GNUTLS_NAME_DNS, params->target, strlen(params->target) ); return STATUS_SUCCESS; } static NTSTATUS schan_handshake( void *args ) { const struct handshake_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; struct schan_transport *t = (struct schan_transport *)pgnutls_transport_get_ptr(s); int err; init_schan_buffers(&t->in, params->input, handshake_get_next_buffer); t->in.limit = params->input_size; init_schan_buffers(&t->out, params->output, handshake_get_next_buffer_alloc ); t->out.alloc_buffer = params->alloc_buffer; while(1) { err = pgnutls_handshake(s); switch(err) { case GNUTLS_E_SUCCESS: TRACE("Handshake completed\n"); return SEC_E_OK; case GNUTLS_E_AGAIN: TRACE("Continue...\n"); return SEC_I_CONTINUE_NEEDED; case GNUTLS_E_WARNING_ALERT_RECEIVED: { gnutls_alert_description_t alert = pgnutls_alert_get(s); WARN("WARNING ALERT: %d %s\n", alert, pgnutls_alert_get_name(alert)); switch(alert) { case GNUTLS_A_UNRECOGNIZED_NAME: TRACE("Ignoring\n"); continue; default: return SEC_E_INTERNAL_ERROR; } } case GNUTLS_E_FATAL_ALERT_RECEIVED: { gnutls_alert_description_t alert = pgnutls_alert_get(s); WARN("FATAL ALERT: %d %s\n", alert, pgnutls_alert_get_name(alert)); return SEC_E_INTERNAL_ERROR; } default: pgnutls_perror(err); return SEC_E_INTERNAL_ERROR; } } /* Never reached */ return SEC_E_OK; } static DWORD get_protocol(gnutls_protocol_t proto) { /* FIXME: currently schannel only implements client connections, but * there's no reason it couldn't be used for servers as well. The * context doesn't tell us which it is, so assume client for now. */ switch (proto) { case GNUTLS_SSL3: return SP_PROT_SSL3_CLIENT; case GNUTLS_TLS1_0: return SP_PROT_TLS1_0_CLIENT; case GNUTLS_TLS1_1: return SP_PROT_TLS1_1_CLIENT; case GNUTLS_TLS1_2: return SP_PROT_TLS1_2_CLIENT; case GNUTLS_DTLS1_0: return SP_PROT_DTLS1_0_CLIENT; case GNUTLS_DTLS1_2: return SP_PROT_DTLS1_2_CLIENT; default: FIXME("unknown protocol %d\n", proto); return 0; } } static ALG_ID get_cipher_algid(gnutls_cipher_algorithm_t cipher) { switch (cipher) { case GNUTLS_CIPHER_UNKNOWN: case GNUTLS_CIPHER_NULL: return 0; case GNUTLS_CIPHER_ARCFOUR_40: case GNUTLS_CIPHER_ARCFOUR_128: return CALG_RC4; case GNUTLS_CIPHER_DES_CBC: return CALG_DES; case GNUTLS_CIPHER_3DES_CBC: return CALG_3DES; case GNUTLS_CIPHER_AES_128_CBC: case GNUTLS_CIPHER_AES_128_GCM: return CALG_AES_128; case GNUTLS_CIPHER_AES_192_CBC: return CALG_AES_192; case GNUTLS_CIPHER_AES_256_GCM: case GNUTLS_CIPHER_AES_256_CBC: return CALG_AES_256; case GNUTLS_CIPHER_RC2_40_CBC: return CALG_RC2; default: FIXME("unknown algorithm %d\n", cipher); return 0; } } static ALG_ID get_mac_algid(gnutls_mac_algorithm_t mac, gnutls_cipher_algorithm_t cipher) { switch (mac) { case GNUTLS_MAC_UNKNOWN: case GNUTLS_MAC_NULL: return 0; case GNUTLS_MAC_MD2: return CALG_MD2; case GNUTLS_MAC_MD5: return CALG_MD5; case GNUTLS_MAC_SHA1: return CALG_SHA1; case GNUTLS_MAC_SHA256: return CALG_SHA_256; case GNUTLS_MAC_SHA384: return CALG_SHA_384; case GNUTLS_MAC_SHA512: return CALG_SHA_512; case GNUTLS_MAC_AEAD: /* When using AEAD (such as GCM), we return PRF algorithm instead which is defined in RFC 5289. */ switch (cipher) { case GNUTLS_CIPHER_AES_128_GCM: return CALG_SHA_256; case GNUTLS_CIPHER_AES_256_GCM: return CALG_SHA_384; default: break; } /* fall through */ default: FIXME("unknown algorithm %d, cipher %d\n", mac, cipher); return 0; } } static ALG_ID get_kx_algid(int kx) { switch (kx) { case GNUTLS_KX_UNKNOWN: return 0; case GNUTLS_KX_RSA: case GNUTLS_KX_RSA_EXPORT: return CALG_RSA_KEYX; case GNUTLS_KX_DHE_PSK: case GNUTLS_KX_DHE_DSS: case GNUTLS_KX_DHE_RSA: return CALG_DH_EPHEM; case GNUTLS_KX_ANON_ECDH: return CALG_ECDH; case GNUTLS_KX_ECDHE_RSA: case GNUTLS_KX_ECDHE_PSK: case GNUTLS_KX_ECDHE_ECDSA: return CALG_ECDH_EPHEM; default: FIXME("unknown algorithm %d\n", kx); return 0; } } static NTSTATUS schan_get_session_cipher_block_size( void *args ) { const struct session_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; return pgnutls_cipher_get_block_size(pgnutls_cipher_get(s)); } static NTSTATUS schan_get_max_message_size( void *args ) { const struct session_params *params = args; return pgnutls_record_get_max_size((gnutls_session_t)params->session); } static NTSTATUS schan_get_connection_info( void *args ) { const struct get_connection_info_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; SecPkgContext_ConnectionInfo *info = params->info; gnutls_protocol_t proto = pgnutls_protocol_get_version(s); gnutls_cipher_algorithm_t alg = pgnutls_cipher_get(s); gnutls_mac_algorithm_t mac = pgnutls_mac_get(s); gnutls_kx_algorithm_t kx = pgnutls_kx_get(s); info->dwProtocol = get_protocol(proto); info->aiCipher = get_cipher_algid(alg); info->dwCipherStrength = pgnutls_cipher_get_key_size(alg) * 8; info->aiHash = get_mac_algid(mac, alg); info->dwHashStrength = pgnutls_mac_get_key_size(mac) * 8; info->aiExch = get_kx_algid(kx); /* FIXME: info->dwExchStrength? */ info->dwExchStrength = 0; return SEC_E_OK; } static NTSTATUS schan_get_unique_channel_binding( void *args ) { const struct get_unique_channel_binding_params *params = args; gnutls_datum_t datum; int rc; SECURITY_STATUS ret; gnutls_session_t s = (gnutls_session_t)params->session; rc = pgnutls_session_channel_binding(s, GNUTLS_CB_TLS_UNIQUE, &datum); if (rc) { pgnutls_perror(rc); return SEC_E_INTERNAL_ERROR; } if (params->buffer && *params->bufsize >= datum.size) { memcpy( params->buffer, datum.data, datum.size ); ret = SEC_E_OK; } else ret = SEC_E_BUFFER_TOO_SMALL; *params->bufsize = datum.size; free(datum.data); return ret; } static NTSTATUS schan_get_key_signature_algorithm( void *args ) { const struct session_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; gnutls_kx_algorithm_t kx = pgnutls_kx_get(s); TRACE("(%p)\n", params->session); switch (kx) { case GNUTLS_KX_UNKNOWN: return 0; case GNUTLS_KX_RSA: case GNUTLS_KX_RSA_EXPORT: case GNUTLS_KX_DHE_RSA: case GNUTLS_KX_ECDHE_RSA: return CALG_RSA_SIGN; case GNUTLS_KX_ECDHE_ECDSA: return CALG_ECDSA; default: FIXME("unknown algorithm %d\n", kx); return 0; } } static NTSTATUS schan_get_session_peer_certificate( void *args ) { const struct get_session_peer_certificate_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; CERT_BLOB *certs = params->certs; const gnutls_datum_t *datum; unsigned int i, size; BYTE *ptr; unsigned int count; if (!(datum = pgnutls_certificate_get_peers(s, &count))) return SEC_E_INTERNAL_ERROR; size = count * sizeof(certs[0]); for (i = 0; i < count; i++) size += datum[i].size; if (!certs || *params->bufsize < size) { *params->bufsize = size; return SEC_E_BUFFER_TOO_SMALL; } ptr = (BYTE *)&certs[count]; for (i = 0; i < count; i++) { certs[i].cbData = datum[i].size; certs[i].pbData = ptr; memcpy(certs[i].pbData, datum[i].data, datum[i].size); ptr += datum[i].size; } *params->bufsize = size; *params->retcount = count; return SEC_E_OK; } static NTSTATUS schan_send( void *args ) { const struct send_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; struct schan_transport *t = (struct schan_transport *)pgnutls_transport_get_ptr(s); SSIZE_T ret, total = 0; if (schan_find_sec_buffer_idx(params->output, 0, SECBUFFER_STREAM_HEADER) != -1) init_schan_buffers(&t->out, params->output, send_message_get_next_buffer); else init_schan_buffers(&t->out, params->output, send_message_get_next_buffer_token); for (;;) { ret = pgnutls_record_send(s, (const char *)params->buffer + total, *params->length - total); if (ret >= 0) { total += ret; TRACE( "sent %ld now %ld/%ld\n", ret, total, *params->length ); if (total == *params->length) break; } else if (ret == GNUTLS_E_AGAIN) { SIZE_T count = 0; if (get_buffer(t, &t->out, &count)) continue; return SEC_I_CONTINUE_NEEDED; } else { pgnutls_perror(ret); return SEC_E_INTERNAL_ERROR; } } t->out.desc->pBuffers[t->out.current_buffer_idx].cbBuffer = t->out.offset; return SEC_E_OK; } static NTSTATUS schan_recv( void *args ) { const struct recv_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; struct schan_transport *t = (struct schan_transport *)pgnutls_transport_get_ptr(s); size_t data_size = *params->length; size_t received = 0; ssize_t ret; SECURITY_STATUS status = SEC_E_OK; init_schan_buffers(&t->in, params->input, recv_message_get_next_buffer); t->in.limit = params->input_size; while (received < data_size) { ret = pgnutls_record_recv(s, (char *)params->buffer + received, data_size - received); if (ret > 0) received += ret; else if (!ret) break; else if (ret == GNUTLS_E_AGAIN) { SIZE_T count = 0; if (!get_buffer(t, &t->in, &count)) break; } else if (ret == GNUTLS_E_REHANDSHAKE) { TRACE("Rehandshake requested\n"); status = SEC_I_RENEGOTIATE; break; } else { pgnutls_perror(ret); return SEC_E_INTERNAL_ERROR; } } *params->length = received; return status; } static unsigned int parse_alpn_protocol_list(unsigned char *buffer, unsigned int buflen, gnutls_datum_t *list) { unsigned int len, offset = 0, count = 0; while (buflen) { len = buffer[offset++]; buflen--; if (!len || len > buflen) return 0; if (list) { list[count].data = &buffer[offset]; list[count].size = len; } buflen -= len; offset += len; count++; } return count; } static NTSTATUS schan_set_application_protocols( void *args ) { const struct set_application_protocols_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; unsigned int extension_len, extension, count = 0, offset = 0; unsigned short list_len; gnutls_datum_t *protocols; int ret; if (sizeof(extension_len) > params->buflen) return STATUS_INVALID_PARAMETER; extension_len = *(unsigned int *)¶ms->buffer[offset]; offset += sizeof(extension_len); if (offset + sizeof(extension) > params->buflen) return STATUS_INVALID_PARAMETER; extension = *(unsigned int *)¶ms->buffer[offset]; if (extension != SecApplicationProtocolNegotiationExt_ALPN) { FIXME("extension %u not supported\n", extension); return STATUS_NOT_SUPPORTED; } offset += sizeof(extension); if (offset + sizeof(list_len) > params->buflen) return STATUS_INVALID_PARAMETER; list_len = *(unsigned short *)¶ms->buffer[offset]; offset += sizeof(list_len); if (offset + list_len > params->buflen) return STATUS_INVALID_PARAMETER; count = parse_alpn_protocol_list(¶ms->buffer[offset], list_len, NULL); if (!count || !(protocols = malloc(count * sizeof(*protocols)))) return STATUS_NO_MEMORY; parse_alpn_protocol_list(¶ms->buffer[offset], list_len, protocols); if ((ret = pgnutls_alpn_set_protocols(s, protocols, count, GNUTLS_ALPN_SERVER_PRECEDENCE) < 0)) { pgnutls_perror(ret); } free(protocols); return STATUS_SUCCESS; } static NTSTATUS schan_get_application_protocol( void *args ) { const struct get_application_protocol_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; SecPkgContext_ApplicationProtocol *protocol = params->protocol; gnutls_datum_t selected; memset(protocol, 0, sizeof(*protocol)); if (pgnutls_alpn_get_selected_protocol(s, &selected) < 0) return SEC_E_OK; if (selected.size <= sizeof(protocol->ProtocolId)) { protocol->ProtoNegoStatus = SecApplicationProtocolNegotiationStatus_Success; protocol->ProtoNegoExt = SecApplicationProtocolNegotiationExt_ALPN; protocol->ProtocolIdSize = selected.size; memcpy(protocol->ProtocolId, selected.data, selected.size); TRACE("returning %s\n", wine_dbgstr_an((const char *)selected.data, selected.size)); } return SEC_E_OK; } static NTSTATUS schan_set_dtls_mtu( void *args ) { const struct set_dtls_mtu_params *params = args; gnutls_session_t s = (gnutls_session_t)params->session; pgnutls_dtls_set_mtu(s, params->mtu); TRACE("MTU set to %u\n", params->mtu); return SEC_E_OK; } static inline void reverse_bytes(BYTE *buf, ULONG len) { BYTE tmp; ULONG i; for (i = 0; i < len / 2; i++) { tmp = buf[i]; buf[i] = buf[len - i - 1]; buf[len - i - 1] = tmp; } } static ULONG set_component(gnutls_datum_t *comp, BYTE *data, ULONG len, ULONG *buflen) { comp->data = data; comp->size = len; reverse_bytes(comp->data, comp->size); if (comp->data[0] & 0x80) /* add leading 0 byte if most significant bit is set */ { memmove(comp->data + 1, comp->data, *buflen); comp->data[0] = 0; comp->size++; } *buflen -= comp->size; return comp->size; } static gnutls_x509_privkey_t get_x509_key(const DATA_BLOB *key_blob) { gnutls_privkey_t key = NULL; gnutls_x509_privkey_t x509key = NULL; gnutls_datum_t m, e, d, p, q, u, e1, e2; BYTE *ptr; RSAPUBKEY *rsakey; DWORD size = key_blob->cbData; int ret; if (size < sizeof(BLOBHEADER)) return NULL; rsakey = (RSAPUBKEY *)(key_blob->pbData + sizeof(BLOBHEADER)); TRACE("RSA key bitlen %u pubexp %u\n", rsakey->bitlen, rsakey->pubexp); size -= sizeof(BLOBHEADER) + FIELD_OFFSET(RSAPUBKEY, pubexp); set_component(&e, (BYTE *)&rsakey->pubexp, sizeof(rsakey->pubexp), &size); ptr = (BYTE *)(rsakey + 1); ptr += set_component(&m, ptr, rsakey->bitlen / 8, &size); ptr += set_component(&p, ptr, rsakey->bitlen / 16, &size); ptr += set_component(&q, ptr, rsakey->bitlen / 16, &size); ptr += set_component(&e1, ptr, rsakey->bitlen / 16, &size); ptr += set_component(&e2, ptr, rsakey->bitlen / 16, &size); ptr += set_component(&u, ptr, rsakey->bitlen / 16, &size); ptr += set_component(&d, ptr, rsakey->bitlen / 8, &size); if ((ret = pgnutls_privkey_init(&key)) < 0) { pgnutls_perror(ret); return NULL; } if (((ret = pgnutls_privkey_import_rsa_raw(key, &m, &e, &d, &p, &q, &u, &e1, &e2)) < 0) || (ret = pgnutls_privkey_export_x509(key, &x509key)) < 0) { pgnutls_perror(ret); pgnutls_privkey_deinit(key); return NULL; } return x509key; } static gnutls_x509_crt_t get_x509_crt(const CERT_CONTEXT *ctx) { gnutls_datum_t data; gnutls_x509_crt_t crt; int ret; if (!ctx) return FALSE; if (ctx->dwCertEncodingType != X509_ASN_ENCODING) { FIXME("encoding type %u not supported\n", ctx->dwCertEncodingType); return NULL; } if ((ret = pgnutls_x509_crt_init(&crt)) < 0) { pgnutls_perror(ret); return NULL; } data.data = ctx->pbCertEncoded; data.size = ctx->cbCertEncoded; if ((ret = pgnutls_x509_crt_import(crt, &data, GNUTLS_X509_FMT_DER)) < 0) { pgnutls_perror(ret); pgnutls_x509_crt_deinit(crt); return NULL; } return crt; } static NTSTATUS schan_allocate_certificate_credentials( void *args ) { const struct allocate_certificate_credentials_params *params = args; gnutls_certificate_credentials_t creds; gnutls_x509_crt_t crt; gnutls_x509_privkey_t key; int ret; ret = pgnutls_certificate_allocate_credentials(&creds); if (ret != GNUTLS_E_SUCCESS) { pgnutls_perror(ret); return STATUS_INTERNAL_ERROR; } if (!params->ctx) { params->c->credentials = creds; return STATUS_SUCCESS; } if (!(crt = get_x509_crt(params->ctx))) { pgnutls_certificate_free_credentials(creds); return STATUS_INTERNAL_ERROR; } if (!(key = get_x509_key(params->key_blob))) { pgnutls_x509_crt_deinit(crt); pgnutls_certificate_free_credentials(creds); return STATUS_INTERNAL_ERROR; } ret = pgnutls_certificate_set_x509_key(creds, &crt, 1, key); pgnutls_x509_privkey_deinit(key); pgnutls_x509_crt_deinit(crt); if (ret != GNUTLS_E_SUCCESS) { pgnutls_perror(ret); pgnutls_certificate_free_credentials(creds); return STATUS_INTERNAL_ERROR; } params->c->credentials = creds; return STATUS_SUCCESS; } static NTSTATUS schan_free_certificate_credentials( void *args ) { const struct free_certificate_credentials_params *params = args; pgnutls_certificate_free_credentials(params->c->credentials); return STATUS_SUCCESS; } static void gnutls_log(int level, const char *msg) { TRACE("<%d> %s", level, msg); } static NTSTATUS process_attach( void *args ) { const char *env_str; int ret; if ((env_str = getenv("GNUTLS_SYSTEM_PRIORITY_FILE"))) { WARN("GNUTLS_SYSTEM_PRIORITY_FILE is %s.\n", debugstr_a(env_str)); } else { WARN("Setting GNUTLS_SYSTEM_PRIORITY_FILE to \"/dev/null\".\n"); setenv("GNUTLS_SYSTEM_PRIORITY_FILE", "/dev/null", 0); } libgnutls_handle = dlopen(SONAME_LIBGNUTLS, RTLD_NOW); if (!libgnutls_handle) { ERR_(winediag)("Failed to load libgnutls, secure connections will not be available.\n"); return STATUS_DLL_NOT_FOUND; } #define LOAD_FUNCPTR(f) \ if (!(p##f = dlsym(libgnutls_handle, #f))) \ { \ ERR("Failed to load %s\n", #f); \ goto fail; \ } LOAD_FUNCPTR(gnutls_alert_get) LOAD_FUNCPTR(gnutls_alert_get_name) LOAD_FUNCPTR(gnutls_certificate_allocate_credentials) LOAD_FUNCPTR(gnutls_certificate_free_credentials) LOAD_FUNCPTR(gnutls_certificate_get_peers) LOAD_FUNCPTR(gnutls_certificate_set_x509_key) LOAD_FUNCPTR(gnutls_cipher_get) LOAD_FUNCPTR(gnutls_cipher_get_key_size) LOAD_FUNCPTR(gnutls_credentials_set) LOAD_FUNCPTR(gnutls_deinit) LOAD_FUNCPTR(gnutls_global_deinit) LOAD_FUNCPTR(gnutls_global_init) LOAD_FUNCPTR(gnutls_global_set_log_function) LOAD_FUNCPTR(gnutls_global_set_log_level) LOAD_FUNCPTR(gnutls_handshake) LOAD_FUNCPTR(gnutls_init) LOAD_FUNCPTR(gnutls_kx_get) LOAD_FUNCPTR(gnutls_mac_get) LOAD_FUNCPTR(gnutls_mac_get_key_size) LOAD_FUNCPTR(gnutls_perror) LOAD_FUNCPTR(gnutls_protocol_get_version) LOAD_FUNCPTR(gnutls_priority_set_direct) LOAD_FUNCPTR(gnutls_privkey_deinit) LOAD_FUNCPTR(gnutls_privkey_init) LOAD_FUNCPTR(gnutls_record_get_max_size); LOAD_FUNCPTR(gnutls_record_recv); LOAD_FUNCPTR(gnutls_record_send); LOAD_FUNCPTR(gnutls_server_name_set) LOAD_FUNCPTR(gnutls_session_channel_binding) LOAD_FUNCPTR(gnutls_transport_get_ptr) LOAD_FUNCPTR(gnutls_transport_set_errno) LOAD_FUNCPTR(gnutls_transport_set_ptr) LOAD_FUNCPTR(gnutls_transport_set_pull_function) LOAD_FUNCPTR(gnutls_transport_set_push_function) LOAD_FUNCPTR(gnutls_x509_crt_deinit) LOAD_FUNCPTR(gnutls_x509_crt_import) LOAD_FUNCPTR(gnutls_x509_crt_init) LOAD_FUNCPTR(gnutls_x509_privkey_deinit) #undef LOAD_FUNCPTR if (!(pgnutls_cipher_get_block_size = dlsym(libgnutls_handle, "gnutls_cipher_get_block_size"))) { WARN("gnutls_cipher_get_block_size not found\n"); pgnutls_cipher_get_block_size = compat_cipher_get_block_size; } if (!(pgnutls_transport_set_pull_timeout_function = dlsym(libgnutls_handle, "gnutls_transport_set_pull_timeout_function"))) { WARN("gnutls_transport_set_pull_timeout_function not found\n"); pgnutls_transport_set_pull_timeout_function = compat_gnutls_transport_set_pull_timeout_function; } if (!(pgnutls_alpn_set_protocols = dlsym(libgnutls_handle, "gnutls_alpn_set_protocols"))) { WARN("gnutls_alpn_set_protocols not found\n"); pgnutls_alpn_set_protocols = compat_gnutls_alpn_set_protocols; } if (!(pgnutls_alpn_get_selected_protocol = dlsym(libgnutls_handle, "gnutls_alpn_get_selected_protocol"))) { WARN("gnutls_alpn_get_selected_protocol not found\n"); pgnutls_alpn_get_selected_protocol = compat_gnutls_alpn_get_selected_protocol; } if (!(pgnutls_dtls_set_mtu = dlsym(libgnutls_handle, "gnutls_dtls_set_mtu"))) { WARN("gnutls_dtls_set_mtu not found\n"); pgnutls_dtls_set_mtu = compat_gnutls_dtls_set_mtu; } if (!(pgnutls_privkey_export_x509 = dlsym(libgnutls_handle, "gnutls_privkey_export_x509"))) { WARN("gnutls_privkey_export_x509 not found\n"); pgnutls_privkey_export_x509 = compat_gnutls_privkey_export_x509; } if (!(pgnutls_privkey_import_rsa_raw = dlsym(libgnutls_handle, "gnutls_privkey_import_rsa_raw"))) { WARN("gnutls_privkey_import_rsa_raw not found\n"); pgnutls_privkey_import_rsa_raw = compat_gnutls_privkey_import_rsa_raw; } ret = pgnutls_global_init(); if (ret != GNUTLS_E_SUCCESS) { pgnutls_perror(ret); goto fail; } if (TRACE_ON(secur32)) { pgnutls_global_set_log_level(4); pgnutls_global_set_log_function(gnutls_log); } check_supported_protocols(); return STATUS_SUCCESS; fail: dlclose(libgnutls_handle); libgnutls_handle = NULL; return STATUS_DLL_NOT_FOUND; } static NTSTATUS process_detach( void *args ) { pgnutls_global_deinit(); dlclose(libgnutls_handle); libgnutls_handle = NULL; return STATUS_SUCCESS; } const unixlib_entry_t __wine_unix_call_funcs[] = { process_attach, process_detach, schan_allocate_certificate_credentials, schan_create_session, schan_dispose_session, schan_free_certificate_credentials, schan_get_application_protocol, schan_get_connection_info, schan_get_enabled_protocols, schan_get_key_signature_algorithm, schan_get_max_message_size, schan_get_session_cipher_block_size, schan_get_session_peer_certificate, schan_get_unique_channel_binding, schan_handshake, schan_recv, schan_send, schan_set_application_protocols, schan_set_dtls_mtu, schan_set_session_target, }; #endif /* SONAME_LIBGNUTLS */