gnutls: fix an uninitialized variable
[platform/upstream/glib-networking.git] / tls / gnutls / gtlsconnection-gnutls.c
1 /* GIO - GLib Input, Output and Streaming Library
2  *
3  * Copyright © 2009 Red Hat, Inc
4  *
5  * This library is free software; you can redistribute it and/or
6  * modify it under the terms of the GNU Lesser General Public
7  * License as published by the Free Software Foundation; either
8  * version 2 of the License, or (at your option) any later version.
9  *
10  * This library is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13  * Lesser General Public License for more details.
14  *
15  * You should have received a copy of the GNU Lesser General
16  * Public License along with this library; if not, write to the
17  * Free Software Foundation, Inc., 59 Temple Place, Suite 330,
18  * Boston, MA 02111-1307, USA.
19  */
20
21 #include "config.h"
22 #include "glib.h"
23
24 #include <errno.h>
25 #include <gnutls/gnutls.h>
26 #include <gnutls/x509.h>
27
28 #include "gtlsconnection-gnutls.h"
29 #include "gtlsbackend-gnutls.h"
30 #include "gtlscertificate-gnutls.h"
31 #include "gtlsinputstream-gnutls.h"
32 #include "gtlsoutputstream-gnutls.h"
33 #include "gtlsserverconnection-gnutls.h"
34 #include "gnutls-marshal.h"
35 #include <glib/gi18n-lib.h>
36
37 static void g_tls_connection_gnutls_get_property (GObject    *object,
38                                                   guint       prop_id,
39                                                   GValue     *value,
40                                                   GParamSpec *pspec);
41 static void g_tls_connection_gnutls_set_property (GObject      *object,
42                                                   guint         prop_id,
43                                                   const GValue *value,
44                                                   GParamSpec   *pspec);
45 static void g_tls_connection_gnutls_finalize     (GObject      *object);
46
47 static gboolean     g_tls_connection_gnutls_handshake        (GTlsConnection       *connection,
48                                                               GCancellable         *cancellable,
49                                                               GError              **error);
50 static void         g_tls_connection_gnutls_handshake_async  (GTlsConnection       *conn,
51                                                               int                   io_priority,
52                                                               GCancellable         *cancellable,
53                                                               GAsyncReadyCallback   callback,
54                                                               gpointer              user_data);
55 static gboolean     g_tls_connection_gnutls_handshake_finish (GTlsConnection       *conn,
56                                                               GAsyncResult         *result,
57                                                               GError              **error);
58
59 static GInputStream  *g_tls_connection_gnutls_get_input_stream  (GIOStream *stream);
60 static GOutputStream *g_tls_connection_gnutls_get_output_stream (GIOStream *stream);
61
62 static gboolean     g_tls_connection_gnutls_close        (GIOStream           *stream,
63                                                           GCancellable        *cancellable,
64                                                           GError             **error);
65 static void         g_tls_connection_gnutls_close_async  (GIOStream           *stream,
66                                                           int                  io_priority,
67                                                           GCancellable        *cancellable,
68                                                           GAsyncReadyCallback  callback,
69                                                           gpointer             user_data);
70 static gboolean     g_tls_connection_gnutls_close_finish (GIOStream           *stream,
71                                                           GAsyncResult        *result,
72                                                           GError             **error);
73
74 static ssize_t g_tls_connection_gnutls_push_func (gnutls_transport_ptr_t  transport_data,
75                                                   const void             *buf,
76                                                   size_t                  buflen);
77 static ssize_t g_tls_connection_gnutls_pull_func (gnutls_transport_ptr_t  transport_data,
78                                                   void                   *buf,
79                                                   size_t                  buflen);
80
81 static void     g_tls_connection_gnutls_initable_iface_init (GInitableIface  *iface);
82 static gboolean g_tls_connection_gnutls_initable_init       (GInitable       *initable,
83                                                              GCancellable    *cancellable,
84                                                              GError         **error);
85
86 static void g_tls_connection_gnutls_init_priorities (void);
87
88 G_DEFINE_ABSTRACT_TYPE_WITH_CODE (GTlsConnectionGnutls, g_tls_connection_gnutls, G_TYPE_TLS_CONNECTION,
89                                   G_IMPLEMENT_INTERFACE (G_TYPE_INITABLE,
90                                                          g_tls_connection_gnutls_initable_iface_init);
91                                   g_tls_connection_gnutls_init_priorities ();
92                                   );
93
94
95 enum
96 {
97   PROP_0,
98   PROP_BASE_IO_STREAM,
99   PROP_REQUIRE_CLOSE_NOTIFY,
100   PROP_REHANDSHAKE_MODE,
101   PROP_USE_SYSTEM_CERTDB,
102   PROP_CERTIFICATE,
103   PROP_PEER_CERTIFICATE,
104   PROP_PEER_CERTIFICATE_ERRORS
105 };
106
107 struct _GTlsConnectionGnutlsPrivate
108 {
109   GIOStream *base_io_stream;
110   GPollableInputStream *base_istream;
111   GPollableOutputStream *base_ostream;
112
113   GList *ca_list;
114   gnutls_certificate_credentials creds;
115   gnutls_session session;
116
117   GTlsCertificate *certificate, *peer_certificate;
118   GTlsCertificateFlags peer_certificate_errors;
119   gboolean require_close_notify;
120   GTlsRehandshakeMode rehandshake_mode;
121   gboolean use_system_certdb;
122   gboolean need_handshake, handshaking, ever_handshaked;
123   gboolean closing;
124
125   GInputStream *tls_istream;
126   GOutputStream *tls_ostream;
127
128   GError *error;
129   GCancellable *cancellable;
130   gboolean blocking, eof;
131   GIOCondition internal_direction;
132 };
133
134 static void
135 g_tls_connection_gnutls_class_init (GTlsConnectionGnutlsClass *klass)
136 {
137   GObjectClass *gobject_class = G_OBJECT_CLASS (klass);
138   GTlsConnectionClass *connection_class = G_TLS_CONNECTION_CLASS (klass);
139   GIOStreamClass *iostream_class = G_IO_STREAM_CLASS (klass);
140
141   g_type_class_add_private (klass, sizeof (GTlsConnectionGnutlsPrivate));
142
143   gobject_class->get_property = g_tls_connection_gnutls_get_property;
144   gobject_class->set_property = g_tls_connection_gnutls_set_property;
145   gobject_class->finalize     = g_tls_connection_gnutls_finalize;
146
147   connection_class->handshake        = g_tls_connection_gnutls_handshake;
148   connection_class->handshake_async  = g_tls_connection_gnutls_handshake_async;
149   connection_class->handshake_finish = g_tls_connection_gnutls_handshake_finish;
150
151   iostream_class->get_input_stream  = g_tls_connection_gnutls_get_input_stream;
152   iostream_class->get_output_stream = g_tls_connection_gnutls_get_output_stream;
153   iostream_class->close_fn          = g_tls_connection_gnutls_close;
154   iostream_class->close_async       = g_tls_connection_gnutls_close_async;
155   iostream_class->close_finish      = g_tls_connection_gnutls_close_finish;
156
157   g_object_class_override_property (gobject_class, PROP_BASE_IO_STREAM, "base-io-stream");
158   g_object_class_override_property (gobject_class, PROP_REQUIRE_CLOSE_NOTIFY, "require-close-notify");
159   g_object_class_override_property (gobject_class, PROP_REHANDSHAKE_MODE, "rehandshake-mode");
160   g_object_class_override_property (gobject_class, PROP_USE_SYSTEM_CERTDB, "use-system-certdb");
161   g_object_class_override_property (gobject_class, PROP_CERTIFICATE, "certificate");
162   g_object_class_override_property (gobject_class, PROP_PEER_CERTIFICATE, "peer-certificate");
163   g_object_class_override_property (gobject_class, PROP_PEER_CERTIFICATE_ERRORS, "peer-certificate-errors");
164 }
165
166 static void
167 g_tls_connection_gnutls_initable_iface_init (GInitableIface *iface)
168 {
169   iface->init = g_tls_connection_gnutls_initable_init;
170 }
171
172 static void
173 g_tls_connection_gnutls_init (GTlsConnectionGnutls *gnutls)
174 {
175   gnutls->priv = G_TYPE_INSTANCE_GET_PRIVATE (gnutls, G_TYPE_TLS_CONNECTION_GNUTLS, GTlsConnectionGnutlsPrivate);
176
177   gnutls_certificate_allocate_credentials (&gnutls->priv->creds);
178   gnutls_certificate_set_verify_flags (gnutls->priv->creds,
179                                        GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT);
180
181   gnutls->priv->need_handshake = TRUE;
182 }
183
184 static gnutls_priority_t priorities[2][2];
185
186 static void
187 g_tls_connection_gnutls_init_priorities (void)
188 {
189   /* First field is "ssl3 only", second is "allow unsafe rehandshaking" */
190
191   gnutls_priority_init (&priorities[FALSE][FALSE],
192                         "NORMAL",
193                         NULL);
194   gnutls_priority_init (&priorities[TRUE][FALSE],
195                         "NORMAL:!VERS-TLS1.2:!VERS-TLS1.1:!VERS-TLS1.0",
196                         NULL);
197   gnutls_priority_init (&priorities[FALSE][TRUE],
198                         "NORMAL:%UNSAFE_RENEGOTIATION",
199                         NULL);
200   gnutls_priority_init (&priorities[TRUE][TRUE],
201                         "NORMAL:!VERS-TLS1.2:!VERS-TLS1.1:!VERS-TLS1.0:%UNSAFE_RENEGOTIATION",
202                         NULL);
203 }
204
205 static void
206 g_tls_connection_gnutls_set_handshake_priority (GTlsConnectionGnutls *gnutls)
207 {
208   gboolean use_ssl3, unsafe_rehandshake;
209
210   if (G_IS_TLS_CLIENT_CONNECTION (gnutls))
211     use_ssl3 = g_tls_client_connection_get_use_ssl3 (G_TLS_CLIENT_CONNECTION (gnutls));
212   else
213     use_ssl3 = FALSE;
214   unsafe_rehandshake = (gnutls->priv->rehandshake_mode == G_TLS_REHANDSHAKE_UNSAFELY);
215   gnutls_priority_set (gnutls->priv->session,
216                        priorities[use_ssl3][unsafe_rehandshake]);
217 }
218
219 static gboolean
220 g_tls_connection_gnutls_initable_init (GInitable     *initable,
221                                        GCancellable  *cancellable,
222                                        GError       **error)
223 {
224   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (initable);
225   int status;
226
227   g_return_val_if_fail (gnutls->priv->base_istream != NULL &&
228                         gnutls->priv->base_ostream != NULL, FALSE);
229
230   /* Make sure gnutls->priv->session has been initialized (it may have
231    * already been initialized by a construct-time property setter).
232    */
233   g_tls_connection_gnutls_get_session (gnutls);
234
235   status = gnutls_credentials_set (gnutls->priv->session,
236                                    GNUTLS_CRD_CERTIFICATE,
237                                    gnutls->priv->creds);
238   if (status != 0)
239     {
240       g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
241                    _("Could not create TLS connection: %s"),
242                    gnutls_strerror (status));
243       return FALSE;
244     }
245
246   gnutls_transport_set_push_function (gnutls->priv->session,
247                                       g_tls_connection_gnutls_push_func);
248   gnutls_transport_set_pull_function (gnutls->priv->session,
249                                       g_tls_connection_gnutls_pull_func);
250   gnutls_transport_set_ptr (gnutls->priv->session, gnutls);
251
252   gnutls->priv->tls_istream = g_tls_input_stream_gnutls_new (gnutls);
253   gnutls->priv->tls_ostream = g_tls_output_stream_gnutls_new (gnutls);
254
255   return TRUE;
256 }
257
258 static void
259 g_tls_connection_gnutls_finalize (GObject *object)
260 {
261   GTlsConnectionGnutls *connection = G_TLS_CONNECTION_GNUTLS (object);
262
263   if (connection->priv->base_io_stream)
264     g_object_unref (connection->priv->base_io_stream);
265
266   if (connection->priv->session)
267     gnutls_deinit (connection->priv->session);
268
269   if (connection->priv->tls_istream)
270     g_object_unref (connection->priv->tls_istream);
271   if (connection->priv->tls_ostream) 
272     g_object_unref (connection->priv->tls_ostream);
273
274   if (connection->priv->creds)
275     gnutls_certificate_free_credentials (connection->priv->creds);
276
277   if (connection->priv->certificate)
278     g_object_unref (connection->priv->certificate);
279   if (connection->priv->peer_certificate)
280     g_object_unref (connection->priv->peer_certificate);
281
282   if (connection->priv->error)
283     g_error_free (connection->priv->error);
284
285   G_OBJECT_CLASS (g_tls_connection_gnutls_parent_class)->finalize (object);
286 }
287
288 static void
289 g_tls_connection_gnutls_get_property (GObject    *object,
290                                       guint       prop_id,
291                                       GValue     *value,
292                                       GParamSpec *pspec)
293 {
294   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (object);
295
296   switch (prop_id)
297     {
298     case PROP_BASE_IO_STREAM:
299       g_value_set_object (value, gnutls->priv->base_io_stream);
300       break;
301
302     case PROP_REQUIRE_CLOSE_NOTIFY:
303       g_value_set_boolean (value, gnutls->priv->require_close_notify);
304       break;
305
306     case PROP_REHANDSHAKE_MODE:
307       g_value_set_enum (value, gnutls->priv->rehandshake_mode);
308       break;
309
310     case PROP_USE_SYSTEM_CERTDB:
311       g_value_set_boolean (value, gnutls->priv->use_system_certdb);
312       break;
313
314     case PROP_CERTIFICATE:
315       g_value_set_object (value, gnutls->priv->certificate);
316       break;
317
318     case PROP_PEER_CERTIFICATE:
319       g_value_set_object (value, gnutls->priv->peer_certificate);
320       break;
321
322     case PROP_PEER_CERTIFICATE_ERRORS:
323       g_value_set_flags (value, gnutls->priv->peer_certificate_errors);
324       break;
325
326     default:
327       G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
328     }
329 }
330
331 static void
332 g_tls_connection_gnutls_set_property (GObject      *object,
333                                       guint         prop_id,
334                                       const GValue *value,
335                                       GParamSpec   *pspec)
336 {
337   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (object);
338   GInputStream *istream;
339   GOutputStream *ostream;
340
341   switch (prop_id)
342     {
343     case PROP_BASE_IO_STREAM:
344       if (gnutls->priv->base_io_stream)
345         {
346           g_object_unref (gnutls->priv->base_io_stream);
347           gnutls->priv->base_istream = NULL;
348           gnutls->priv->base_ostream = NULL;
349         }
350       gnutls->priv->base_io_stream = g_value_dup_object (value);
351       if (!gnutls->priv->base_io_stream)
352         return;
353
354       istream = g_io_stream_get_input_stream (gnutls->priv->base_io_stream);
355       ostream = g_io_stream_get_output_stream (gnutls->priv->base_io_stream);
356
357       if (G_IS_POLLABLE_INPUT_STREAM (istream) &&
358           g_pollable_input_stream_can_poll (G_POLLABLE_INPUT_STREAM (istream)))
359         gnutls->priv->base_istream = G_POLLABLE_INPUT_STREAM (istream);
360       if (G_IS_POLLABLE_OUTPUT_STREAM (ostream) &&
361           g_pollable_output_stream_can_poll (G_POLLABLE_OUTPUT_STREAM (ostream)))
362         gnutls->priv->base_ostream = G_POLLABLE_OUTPUT_STREAM (ostream);
363       break;
364
365     case PROP_REQUIRE_CLOSE_NOTIFY:
366       gnutls->priv->require_close_notify = g_value_get_boolean (value);
367       break;
368
369     case PROP_REHANDSHAKE_MODE:
370       gnutls->priv->rehandshake_mode = g_value_get_enum (value);
371       break;
372
373     case PROP_USE_SYSTEM_CERTDB:
374       gnutls->priv->use_system_certdb = g_value_get_boolean (value);
375
376       gnutls_certificate_free_cas (gnutls->priv->creds);
377       if (gnutls->priv->use_system_certdb)
378         {
379           gnutls_x509_crt_t *cas;
380           int num_cas;
381
382           g_tls_backend_gnutls_get_system_ca_list_gnutls (&cas, &num_cas);
383           gnutls_certificate_set_x509_trust (gnutls->priv->creds, cas, num_cas);
384         }
385       break;
386
387     case PROP_CERTIFICATE:
388       if (gnutls->priv->certificate)
389         g_object_unref (gnutls->priv->certificate);
390       gnutls->priv->certificate = g_value_dup_object (value);
391       break;
392
393     default:
394       G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
395     }
396 }
397
398 gnutls_certificate_credentials
399 g_tls_connection_gnutls_get_credentials (GTlsConnectionGnutls *gnutls)
400 {
401   return gnutls->priv->creds;
402 }
403
404 gnutls_session
405 g_tls_connection_gnutls_get_session (GTlsConnectionGnutls *gnutls)
406 {
407   /* Ideally we would initialize gnutls->priv->session from
408    * g_tls_connection_gnutls_init(), but we can't tell if it's a
409    * client or server connection at that point... And
410    * g_tls_connection_gnutls_initiable_init() is too late, because
411    * construct-time property setters may need to modify it.
412    */
413   if (!gnutls->priv->session)
414     {
415       gboolean client = G_IS_TLS_CLIENT_CONNECTION (gnutls);
416       gnutls_init (&gnutls->priv->session, client ? GNUTLS_CLIENT : GNUTLS_SERVER);
417     }
418
419   return gnutls->priv->session;
420 }
421
422 void
423 g_tls_connection_gnutls_get_certificate (GTlsConnectionGnutls *gnutls,
424                                          gnutls_retr_st       *st)
425 {
426   GTlsCertificate *cert;
427
428   cert = g_tls_connection_get_certificate (G_TLS_CONNECTION (gnutls));
429
430   st->type = GNUTLS_CRT_X509;
431   if (cert)
432     {
433       GTlsCertificateGnutls *gnutlscert = G_TLS_CERTIFICATE_GNUTLS (cert);
434
435       st->ncerts = 1;
436       st->cert.x509 = gnutls_malloc (sizeof (gnutls_x509_crt_t));
437       st->cert.x509[0] = g_tls_certificate_gnutls_copy_cert (gnutlscert);
438       st->key.x509 = g_tls_certificate_gnutls_copy_key (gnutlscert);
439       st->deinit_all = TRUE;
440     }
441   else
442     st->ncerts = 0;
443 }
444
445 static void
446 begin_gnutls_io (GTlsConnectionGnutls  *gnutls,
447                  gboolean               blocking,
448                  GCancellable          *cancellable)
449 {
450   gnutls->priv->blocking = blocking;
451   gnutls->priv->cancellable = cancellable;
452   gnutls->priv->internal_direction = 0;
453   g_clear_error (&gnutls->priv->error);
454 }
455
456 static int
457 end_gnutls_io (GTlsConnectionGnutls  *gnutls,
458                int                    status,
459                const char            *generic_error,
460                GError               **error)
461 {
462   gnutls->priv->cancellable = NULL;
463
464   if (status >= 0)
465     {
466       g_clear_error (&gnutls->priv->error);
467       return status;
468     }
469
470   if (gnutls->priv->handshaking && !gnutls->priv->ever_handshaked)
471     {
472       if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_FAILED) ||
473           status == GNUTLS_E_UNEXPECTED_PACKET_LENGTH ||
474           status == GNUTLS_E_FATAL_ALERT_RECEIVED ||
475           status == GNUTLS_E_UNSUPPORTED_VERSION_PACKET)
476         {
477           g_clear_error (&gnutls->priv->error);
478           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_NOT_TLS,
479                                _("Peer failed to perform TLS handshake"));
480           return GNUTLS_E_PULL_ERROR;
481         }
482     }
483
484   if (gnutls->priv->error)
485     {
486       if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
487         status = GNUTLS_E_AGAIN;
488       g_propagate_error (error, gnutls->priv->error);
489       gnutls->priv->error = NULL;
490       return status;
491     }
492   else if (status == GNUTLS_E_REHANDSHAKE)
493     {
494       if (gnutls->priv->rehandshake_mode == G_TLS_REHANDSHAKE_NEVER)
495         {
496           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
497                                _("Peer requested illegal TLS rehandshake"));
498           return GNUTLS_E_PULL_ERROR;
499         }
500
501       gnutls->priv->need_handshake = TRUE;
502       return status;
503     }
504   else if (status == GNUTLS_E_UNEXPECTED_PACKET_LENGTH)
505     {
506       if (gnutls->priv->eof)
507         {
508           if (gnutls->priv->require_close_notify)
509             {
510               g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_EOF,
511                                    _("TLS connection closed unexpectedly"));
512               return status;
513             }
514           else
515             return 0;
516         }
517     }
518
519   g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
520                generic_error, gnutls_strerror (status));
521   return status;
522 }
523
524 #define BEGIN_GNUTLS_IO(gnutls, blocking, cancellable)  \
525   begin_gnutls_io (gnutls, blocking, cancellable);      \
526   do {
527
528 #define END_GNUTLS_IO(gnutls, ret, errmsg, error)       \
529   } while ((ret == GNUTLS_E_AGAIN ||                    \
530             ret == GNUTLS_E_WARNING_ALERT_RECEIVED) &&  \
531            !gnutls->priv->error);                       \
532   ret = end_gnutls_io (gnutls, ret, errmsg, error)
533
534 gboolean
535 g_tls_connection_gnutls_check (GTlsConnectionGnutls  *gnutls,
536                                GIOCondition           condition)
537 {
538   if (gnutls->priv->handshaking || gnutls->priv->closing)
539     condition = gnutls->priv->internal_direction;
540
541   if (condition & G_IO_IN)
542     return g_pollable_input_stream_is_readable (gnutls->priv->base_istream);
543   else
544     return g_pollable_output_stream_is_writable (gnutls->priv->base_ostream);
545 }
546
547 typedef struct {
548   GSource source;
549
550   GTlsConnectionGnutls *gnutls;
551   GObject              *stream;
552
553   GSource              *child_source;
554   GIOCondition          base_direction;
555   GIOCondition          current_direction;
556 } GTlsConnectionGnutlsSource;
557
558 static gboolean
559 gnutls_source_prepare (GSource *source,
560                        gint    *timeout)
561 {
562   *timeout = -1;
563   return FALSE;
564 }
565
566 static gboolean
567 gnutls_source_check (GSource *source)
568 {
569   return FALSE;
570 }
571
572 static void
573 gnutls_source_sync_child_source (GTlsConnectionGnutlsSource *gnutls_source,
574                                  GIOCondition                direction)
575 {
576   GTlsConnectionGnutls *gnutls = gnutls_source->gnutls;
577   GSource *source = (GSource *)gnutls_source;
578
579   if (direction == gnutls_source->current_direction)
580     return;
581
582   if (gnutls_source->child_source)
583     {
584       g_source_remove_child_source (source, gnutls_source->child_source);
585       g_source_unref (gnutls_source->child_source);
586     }
587
588   if (direction & G_IO_IN)
589     gnutls_source->child_source = g_pollable_input_stream_create_source (gnutls->priv->base_istream, NULL);
590   else
591     gnutls_source->child_source = g_pollable_output_stream_create_source (gnutls->priv->base_ostream, NULL);
592
593   g_source_set_dummy_callback (gnutls_source->child_source);
594   g_source_add_child_source (source, gnutls_source->child_source);
595   gnutls_source->current_direction = direction;
596 }
597
598 static gboolean
599 gnutls_source_dispatch (GSource     *source,
600                         GSourceFunc  callback,
601                         gpointer     user_data)
602 {
603   GPollableSourceFunc func = (GPollableSourceFunc)callback;
604   GTlsConnectionGnutlsSource *gnutls_source = (GTlsConnectionGnutlsSource *)source;
605   GTlsConnectionGnutls *gnutls = gnutls_source->gnutls;
606   gboolean ret;
607
608   ret = (*func) (gnutls_source->stream, user_data);
609   if (ret)
610     {
611       GIOCondition direction = gnutls->priv->internal_direction ? gnutls->priv->internal_direction : gnutls_source->base_direction;
612
613       gnutls_source_sync_child_source (gnutls_source, direction);
614     }
615
616   return ret;
617 }
618
619 static void
620 gnutls_source_finalize (GSource *source)
621 {
622   GTlsConnectionGnutlsSource *gnutls_source = (GTlsConnectionGnutlsSource *)source;
623
624   g_object_unref (gnutls_source->gnutls);
625
626   if (gnutls_source->child_source)
627     g_source_unref (gnutls_source->child_source);
628 }
629
630 static gboolean
631 g_tls_connection_gnutls_source_closure_callback (GObject  *stream,
632                                                  gpointer  data)
633 {
634   GClosure *closure = data;
635
636   GValue param = { 0, };
637   GValue result_value = { 0, };
638   gboolean result;
639
640   g_value_init (&result_value, G_TYPE_BOOLEAN);
641
642   g_value_init (&param, G_TYPE_OBJECT);
643   g_value_set_object (&param, stream);
644
645   g_closure_invoke (closure, &result_value, 1, &param, NULL);
646
647   result = g_value_get_boolean (&result_value);
648   g_value_unset (&result_value);
649   g_value_unset (&param);
650
651   return result;
652 }
653
654 static GSourceFuncs gnutls_source_funcs =
655 {
656   gnutls_source_prepare,
657   gnutls_source_check,
658   gnutls_source_dispatch,
659   gnutls_source_finalize,
660   (GSourceFunc)g_tls_connection_gnutls_source_closure_callback,
661   (GSourceDummyMarshal)_gnutls_marshal_BOOLEAN__VOID,
662 };
663
664 GSource *
665 g_tls_connection_gnutls_create_source (GTlsConnectionGnutls  *gnutls,
666                                        GIOCondition           condition,
667                                        GCancellable          *cancellable)
668 {
669   GSource *source, *cancellable_source;
670   GTlsConnectionGnutlsSource *gnutls_source;
671
672   source = g_source_new (&gnutls_source_funcs, sizeof (GTlsConnectionGnutlsSource));
673   g_source_set_name (source, "GTlsConnectionGnutlsSource");
674   gnutls_source = (GTlsConnectionGnutlsSource *)source;
675   gnutls_source->gnutls = g_object_ref (gnutls);
676   gnutls_source->base_direction = condition & (G_IO_IN | G_IO_OUT);
677   if (gnutls_source->base_direction == G_IO_IN)
678     gnutls_source->stream = G_OBJECT (gnutls->priv->tls_istream);
679   else if (gnutls_source->base_direction == G_IO_OUT)
680     gnutls_source->stream = G_OBJECT (gnutls->priv->tls_ostream);
681   else
682     {
683       gnutls_source->base_direction = gnutls->priv->internal_direction;
684       gnutls_source->stream = NULL;
685     }
686   gnutls_source_sync_child_source (gnutls_source, gnutls_source->base_direction);
687
688   if (cancellable)
689     {
690       cancellable_source = g_cancellable_source_new (cancellable);
691       g_source_set_dummy_callback (cancellable_source);
692       g_source_add_child_source (source, cancellable_source);
693       g_source_unref (cancellable_source);
694     }
695
696   return source;
697 }
698
699 static void
700 set_gnutls_error (GTlsConnectionGnutls *gnutls, GIOCondition direction)
701 {
702   if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_CANCELLED))
703     gnutls_transport_set_errno (gnutls->priv->session, EINTR);
704   else if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
705     {
706       gnutls_transport_set_errno (gnutls->priv->session, EAGAIN);
707       gnutls->priv->internal_direction = direction;
708     }
709   else
710     gnutls_transport_set_errno (gnutls->priv->session, EIO);
711 }
712
713 static ssize_t
714 g_tls_connection_gnutls_pull_func (gnutls_transport_ptr_t  transport_data,
715                                    void                   *buf,
716                                    size_t                  buflen)
717 {
718   GTlsConnectionGnutls *gnutls = transport_data;
719   ssize_t ret;
720
721   /* If gnutls->priv->error is non-%NULL when we're called, it means
722    * that an error previously occurred, but gnutls decided not to
723    * propagate it. So it's correct for us to just clear it. (Usually
724    * this means it ignored an EAGAIN after a short read, and now
725    * we'll return EAGAIN again, which it will obey this time.)
726    */
727   g_clear_error (&gnutls->priv->error);
728
729   if (gnutls->priv->blocking)
730     {
731       ret = g_input_stream_read (G_INPUT_STREAM (gnutls->priv->base_istream),
732                                  buf, buflen,
733                                  gnutls->priv->cancellable,
734                                  &gnutls->priv->error);
735     }
736   else
737     {
738       ret = g_pollable_input_stream_read_nonblocking (gnutls->priv->base_istream,
739                                                       buf, buflen,
740                                                       gnutls->priv->cancellable,
741                                                       &gnutls->priv->error);
742     }
743
744   if (ret < 0)
745     set_gnutls_error (gnutls, G_IO_IN);
746   else if (ret == 0)
747     gnutls->priv->eof = TRUE;
748
749   return ret;
750 }
751
752 static ssize_t
753 g_tls_connection_gnutls_push_func (gnutls_transport_ptr_t  transport_data,
754                                    const void             *buf,
755                                    size_t                  buflen)
756 {
757   GTlsConnectionGnutls *gnutls = transport_data;
758   ssize_t ret;
759
760   /* See comment in pull_func. */
761   g_clear_error (&gnutls->priv->error);
762
763   if (gnutls->priv->blocking)
764     {
765       ret = g_output_stream_write (G_OUTPUT_STREAM (gnutls->priv->base_ostream),
766                                    buf, buflen,
767                                    gnutls->priv->cancellable,
768                                    &gnutls->priv->error);
769     }
770   else
771     {
772       ret = g_pollable_output_stream_write_nonblocking (gnutls->priv->base_ostream,
773                                                         buf, buflen,
774                                                         gnutls->priv->cancellable,
775                                                         &gnutls->priv->error);
776     }
777   if (ret < 0)
778     set_gnutls_error (gnutls, G_IO_OUT);
779
780   return ret;
781 }
782
783 static gboolean
784 handshake_internal (GTlsConnectionGnutls  *gnutls,
785                     gboolean               blocking,
786                     GCancellable          *cancellable,
787                     GError               **error)
788 {
789   GTlsCertificate *peer_certificate = NULL;
790   GTlsCertificateFlags peer_certificate_errors = 0;
791   int ret;
792
793   if (G_IS_TLS_SERVER_CONNECTION_GNUTLS (gnutls) &&
794       gnutls->priv->ever_handshaked && !gnutls->priv->need_handshake)
795     {
796       BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
797       ret = gnutls_rehandshake (gnutls->priv->session);
798       END_GNUTLS_IO (gnutls, ret, _("Error performing TLS handshake: %s"), error);
799
800       if (ret != 0)
801         return FALSE;
802     }
803
804   if (!gnutls->priv->handshaking)
805     {
806       gnutls->priv->handshaking = TRUE;
807
808       if (gnutls->priv->peer_certificate)
809         {
810           g_object_unref (gnutls->priv->peer_certificate);
811           gnutls->priv->peer_certificate = NULL;
812           gnutls->priv->peer_certificate_errors = 0;
813
814           g_object_notify (G_OBJECT (gnutls), "peer-certificate");
815           g_object_notify (G_OBJECT (gnutls), "peer-certificate-errors");
816         }
817
818       g_tls_connection_gnutls_set_handshake_priority (gnutls);
819       G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->begin_handshake (gnutls);
820     }
821
822   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
823   ret = gnutls_handshake (gnutls->priv->session);
824   END_GNUTLS_IO (gnutls, ret, _("Error performing TLS handshake: %s"), error);
825
826   if (ret == GNUTLS_E_AGAIN)
827     return FALSE;
828
829   gnutls->priv->handshaking = FALSE;
830   gnutls->priv->need_handshake = FALSE;
831   gnutls->priv->ever_handshaked = TRUE;
832
833   if (ret == 0 &&
834       gnutls_certificate_type_get (gnutls->priv->session) == GNUTLS_CRT_X509)
835     {
836       GTlsCertificate *chain, *cert;
837       const gnutls_datum_t *certs;
838       unsigned int num_certs;
839       int i;
840
841       certs = gnutls_certificate_get_peers (gnutls->priv->session, &num_certs);
842       chain = NULL;
843       if (certs)
844         {
845           for (i = num_certs - 1; i >= 0; i--)
846             {
847               cert = g_tls_certificate_gnutls_new (&certs[i], chain);
848               chain = cert;
849             }
850         }
851
852       peer_certificate = chain;
853     }
854
855   if (peer_certificate)
856     {
857       int status;
858
859       status = gnutls_certificate_verify_peers (gnutls->priv->session);
860       peer_certificate_errors = g_tls_certificate_gnutls_convert_flags (status);
861       if (peer_certificate_errors)
862         {
863           /* gnutls_certificate_verify_peers() bails out on the first
864            * error, which may be G_TLS_CERTIFICATE_UNKNOWN_CA, but the
865            * caller may be planning to check that part themselves. So
866            * call g_tls_certificate_verify() to get any other errors.
867            */
868           peer_certificate_errors |= g_tls_certificate_verify (peer_certificate, NULL, NULL);
869         }
870
871       if (!G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->verify_peer (gnutls, peer_certificate, &peer_certificate_errors))
872         {
873           g_object_unref (peer_certificate);
874           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_BAD_CERTIFICATE,
875                                _("Unacceptable TLS certificate"));
876           return FALSE;
877         }
878     }
879
880   G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->finish_handshake (gnutls, error);
881
882   if (ret == 0)
883     {
884       gnutls->priv->peer_certificate = peer_certificate;
885       gnutls->priv->peer_certificate_errors = peer_certificate_errors;
886
887       g_object_notify (G_OBJECT (gnutls), "peer-certificate");
888       g_object_notify (G_OBJECT (gnutls), "peer-certificate-errors");
889
890       return TRUE;
891     }
892   else
893     return FALSE;
894 }
895
896 static gboolean
897 handshake_in_progress_or_failed (GTlsConnectionGnutls  *gnutls,
898                                  gboolean               blocking,
899                                  GCancellable          *cancellable,
900                                  GError               **error)
901 {
902   if (!(gnutls->priv->need_handshake || gnutls->priv->handshaking))
903     return FALSE;
904
905   return !handshake_internal (gnutls, blocking, cancellable, error);
906 }
907
908 static gboolean
909 g_tls_connection_gnutls_handshake (GTlsConnection   *conn,
910                                    GCancellable     *cancellable,
911                                    GError          **error)
912 {
913   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (conn);
914
915   return handshake_internal (gnutls, TRUE, cancellable, error);
916 }
917
918 static gboolean
919 g_tls_connection_gnutls_handshake_ready (GObject  *pollable_stream,
920                                          gpointer  user_data)
921 {
922   GTlsConnectionGnutls *gnutls;
923   GSimpleAsyncResult *simple = user_data;
924   gboolean success;
925   GError *error = NULL;
926
927   gnutls = G_TLS_CONNECTION_GNUTLS (g_async_result_get_source_object (G_ASYNC_RESULT (simple)));
928   g_object_unref (gnutls);
929
930   success = handshake_internal (gnutls, FALSE, NULL, &error);
931   if (!success && g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
932     {
933       g_error_free (error);
934       return TRUE;
935     }
936
937   if (error)
938     {
939       g_simple_async_result_set_from_error (simple, error);
940       g_error_free (error);
941     }
942   else
943     g_simple_async_result_set_op_res_gboolean (simple, success);
944   g_simple_async_result_complete (simple);
945   g_object_unref (simple);
946
947   return FALSE;
948 }
949
950 static void
951 g_tls_connection_gnutls_handshake_async (GTlsConnection       *conn,
952                                          int                   io_priority,
953                                          GCancellable         *cancellable,
954                                          GAsyncReadyCallback   callback,
955                                          gpointer              user_data)
956 {
957   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (conn);
958   GSimpleAsyncResult *simple;
959   gboolean success;
960   GError *error = NULL;
961   GSource *source;
962
963   simple = g_simple_async_result_new (G_OBJECT (conn), callback, user_data,
964                                       g_tls_connection_gnutls_handshake_async);
965   success = handshake_internal (gnutls, FALSE, cancellable, &error);
966   if (success)
967     {
968       g_simple_async_result_set_op_res_gboolean (simple, TRUE);
969       g_simple_async_result_complete_in_idle (simple);
970       g_object_unref (simple);
971     }
972   else if (!g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
973     {
974       g_simple_async_result_set_from_error (simple, error);
975       g_error_free (error);
976       g_simple_async_result_complete_in_idle (simple);
977       g_object_unref (simple);
978     }
979
980   source = g_tls_connection_gnutls_create_source (gnutls, 0, cancellable);
981   g_source_set_callback (source,
982                          (GSourceFunc) g_tls_connection_gnutls_handshake_ready,
983                          simple, NULL);
984   g_source_set_priority (source, io_priority);
985   g_source_attach (source, g_main_context_get_thread_default ());
986   g_source_unref (source);
987 }
988
989 static gboolean
990 g_tls_connection_gnutls_handshake_finish (GTlsConnection       *conn,
991                                           GAsyncResult         *result,
992                                           GError              **error)
993 {
994   GSimpleAsyncResult *simple;
995
996   g_return_val_if_fail (g_simple_async_result_is_valid (result, G_OBJECT (conn), g_tls_connection_gnutls_handshake_async), FALSE);
997
998   simple = G_SIMPLE_ASYNC_RESULT (result);
999
1000   if (g_simple_async_result_propagate_error (simple, error))
1001     return FALSE;
1002
1003   return g_simple_async_result_get_op_res_gboolean (simple);
1004 }
1005
1006 gssize
1007 g_tls_connection_gnutls_read (GTlsConnectionGnutls  *gnutls,
1008                               void                  *buffer,
1009                               gsize                  count,
1010                               gboolean               blocking,
1011                               GCancellable          *cancellable,
1012                               GError               **error)
1013 {
1014   gssize ret;
1015
1016  again:
1017   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1018     return -1;
1019
1020   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1021   ret = gnutls_record_recv (gnutls->priv->session, buffer, count);
1022   END_GNUTLS_IO (gnutls, ret, _("Error reading data from TLS socket: %s"), error);
1023
1024   if (ret >= 0)
1025     return ret;
1026   else if (ret == GNUTLS_E_REHANDSHAKE)
1027     goto again;
1028   else
1029     return -1;
1030 }
1031
1032 gssize
1033 g_tls_connection_gnutls_write (GTlsConnectionGnutls  *gnutls,
1034                                const void            *buffer,
1035                                gsize                  count,
1036                                gboolean               blocking,
1037                                GCancellable          *cancellable,
1038                                GError               **error)
1039 {
1040   gssize ret;
1041
1042  again:
1043   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1044     return -1;
1045
1046   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1047   ret = gnutls_record_send (gnutls->priv->session, buffer, count);
1048   END_GNUTLS_IO (gnutls, ret, _("Error writing data to TLS socket: %s"), error);
1049
1050   if (ret >= 0)
1051     return ret;
1052   else if (ret == GNUTLS_E_REHANDSHAKE)
1053     goto again;
1054   else
1055     return -1;
1056 }
1057
1058 static GInputStream  *
1059 g_tls_connection_gnutls_get_input_stream (GIOStream *stream)
1060 {
1061   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1062
1063   return gnutls->priv->tls_istream;
1064 }
1065
1066 static GOutputStream *
1067 g_tls_connection_gnutls_get_output_stream (GIOStream *stream)
1068 {
1069   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1070
1071   return gnutls->priv->tls_ostream;
1072 }
1073
1074 static gboolean
1075 close_internal (GTlsConnectionGnutls  *gnutls,
1076                 gboolean               blocking,
1077                 GCancellable          *cancellable,
1078                 GError               **error)
1079 {
1080   int ret;
1081
1082   /* If we haven't finished the initial handshake yet, there's no
1083    * reason to finish it just so we can close.
1084    */
1085   if (gnutls->priv->handshaking && !gnutls->priv->ever_handshaked)
1086     return TRUE;
1087
1088   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1089     return FALSE;
1090
1091   gnutls->priv->closing = TRUE;
1092   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1093   ret = gnutls_bye (gnutls->priv->session, GNUTLS_SHUT_WR);
1094   END_GNUTLS_IO (gnutls, ret, _("Error performing TLS close: %s"), error);
1095   if (ret == 0 || !error || !g_error_matches (*error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1096     gnutls->priv->closing = FALSE;
1097
1098   return ret == 0;
1099 }
1100
1101 static gboolean
1102 g_tls_connection_gnutls_close (GIOStream     *stream,
1103                                GCancellable  *cancellable,
1104                                GError       **error)
1105 {
1106   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1107
1108   if (!close_internal (gnutls, TRUE, cancellable, error))
1109     return FALSE;
1110   return g_io_stream_close (gnutls->priv->base_io_stream,
1111                             cancellable, error);
1112 }
1113
1114 typedef struct {
1115   GSimpleAsyncResult *simple;
1116   GCancellable *cancellable;
1117   int io_priority;
1118 } AsyncCloseData;
1119
1120 static void
1121 close_base_stream_cb (GObject      *base_stream,
1122                       GAsyncResult *result,
1123                       gpointer      user_data)
1124 {
1125   gboolean success;
1126   GError *error = NULL;
1127   AsyncCloseData *acd = user_data;
1128
1129   success = g_io_stream_close_finish (G_IO_STREAM (base_stream),
1130                                       result, &error);
1131   if (success)
1132     g_simple_async_result_set_op_res_gboolean (acd->simple, TRUE);
1133   else
1134     {
1135       g_simple_async_result_set_from_error (acd->simple, error);
1136       g_error_free (error);
1137     }
1138
1139   g_simple_async_result_complete (acd->simple);
1140   g_object_unref (acd->simple);
1141   if (acd->cancellable)
1142     g_object_unref (acd->cancellable);
1143   g_slice_free (AsyncCloseData, acd);
1144 }
1145
1146 static gboolean
1147 g_tls_connection_gnutls_close_ready (GObject  *pollable_stream,
1148                                      gpointer  user_data)
1149 {
1150   GTlsConnectionGnutls *gnutls;
1151   AsyncCloseData *acd = user_data;
1152   gboolean success;
1153   GError *error = NULL;
1154
1155   gnutls = G_TLS_CONNECTION_GNUTLS (g_async_result_get_source_object (G_ASYNC_RESULT (acd->simple)));
1156   g_object_unref (gnutls);
1157
1158   success = close_internal (gnutls, FALSE, NULL, &error);
1159   if (!success && g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1160     {
1161       g_error_free (error);
1162       return TRUE;
1163     }
1164
1165   if (error)
1166     {
1167       g_simple_async_result_set_from_error (acd->simple, error);
1168       g_simple_async_result_complete (acd->simple);
1169       g_error_free (error);
1170       g_object_unref (acd->simple);
1171       if (acd->cancellable)
1172         g_object_unref (acd->cancellable);
1173       g_slice_free (AsyncCloseData, acd);
1174     }
1175   else
1176     {
1177       g_io_stream_close_async (gnutls->priv->base_io_stream,
1178                                acd->io_priority, acd->cancellable,
1179                                close_base_stream_cb, acd);
1180     }
1181
1182   return FALSE;
1183 }
1184
1185 static void
1186 g_tls_connection_gnutls_close_async (GIOStream           *stream,
1187                                      int                  io_priority,
1188                                      GCancellable        *cancellable,
1189                                      GAsyncReadyCallback  callback,
1190                                      gpointer             user_data)
1191 {
1192   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1193   GSimpleAsyncResult *simple;
1194   gboolean success;
1195   GError *error = NULL;
1196   AsyncCloseData *acd;
1197   GSource *source;
1198
1199   simple = g_simple_async_result_new (G_OBJECT (stream), callback, user_data,
1200                                       g_tls_connection_gnutls_close_async);
1201
1202   success = close_internal (gnutls, FALSE, cancellable, &error);
1203   if (error && !g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1204     {
1205       g_simple_async_result_set_from_error (simple, error);
1206       g_error_free (error);
1207       g_simple_async_result_complete_in_idle (simple);
1208       g_object_unref (simple);
1209     }
1210
1211   if (error)
1212     g_error_free (error);
1213
1214   acd = g_slice_new (AsyncCloseData);
1215   acd->simple = simple;
1216   acd->cancellable = g_object_ref (cancellable);
1217   acd->io_priority = io_priority;
1218
1219   if (success)
1220     {
1221       g_io_stream_close_async (gnutls->priv->base_io_stream,
1222                                io_priority, cancellable,
1223                                close_base_stream_cb, acd);
1224       return;
1225     }
1226
1227   source = g_tls_connection_gnutls_create_source (gnutls, 0, acd->cancellable);
1228   g_source_set_callback (source,
1229                          (GSourceFunc) g_tls_connection_gnutls_close_ready,
1230                          acd, NULL);
1231   g_source_set_priority (source, acd->io_priority);
1232   g_source_attach (source, g_main_context_get_thread_default ());
1233   g_source_unref (source);
1234 }
1235
1236 static gboolean
1237 g_tls_connection_gnutls_close_finish (GIOStream           *stream,
1238                                       GAsyncResult        *result,
1239                                       GError             **error)
1240 {
1241   GSimpleAsyncResult *simple;
1242
1243   g_return_val_if_fail (g_simple_async_result_is_valid (result, G_OBJECT (stream), g_tls_connection_gnutls_close_async), FALSE);
1244
1245   simple = G_SIMPLE_ASYNC_RESULT (result);
1246
1247   if (g_simple_async_result_propagate_error (simple, error))
1248     return FALSE;
1249
1250   return g_simple_async_result_get_op_res_gboolean (simple);
1251 }