gnutls: rearrange some code to avoid a warning
[platform/upstream/glib-networking.git] / tls / gnutls / gtlsconnection-gnutls.c
1 /* GIO - GLib Input, Output and Streaming Library
2  *
3  * Copyright © 2009 Red Hat, Inc
4  *
5  * This library is free software; you can redistribute it and/or
6  * modify it under the terms of the GNU Lesser General Public
7  * License as published by the Free Software Foundation; either
8  * version 2 of the License, or (at your option) any later version.
9  *
10  * This library is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13  * Lesser General Public License for more details.
14  *
15  * You should have received a copy of the GNU Lesser General
16  * Public License along with this library; if not, write to the
17  * Free Software Foundation, Inc., 59 Temple Place, Suite 330,
18  * Boston, MA 02111-1307, USA.
19  */
20
21 #include "config.h"
22 #include "glib.h"
23
24 #include <errno.h>
25 #include <gnutls/gnutls.h>
26 #include <gnutls/x509.h>
27
28 #include "gtlsconnection-gnutls.h"
29 #include "gtlsbackend-gnutls.h"
30 #include "gtlscertificate-gnutls.h"
31 #include "gtlsinputstream-gnutls.h"
32 #include "gtlsoutputstream-gnutls.h"
33 #include "gtlsserverconnection-gnutls.h"
34 #include "gnutls-marshal.h"
35 #include <glib/gi18n-lib.h>
36
37 static void g_tls_connection_gnutls_get_property (GObject    *object,
38                                                   guint       prop_id,
39                                                   GValue     *value,
40                                                   GParamSpec *pspec);
41 static void g_tls_connection_gnutls_set_property (GObject      *object,
42                                                   guint         prop_id,
43                                                   const GValue *value,
44                                                   GParamSpec   *pspec);
45 static void g_tls_connection_gnutls_finalize     (GObject      *object);
46
47 static gboolean     g_tls_connection_gnutls_handshake        (GTlsConnection       *connection,
48                                                               GCancellable         *cancellable,
49                                                               GError              **error);
50 static void         g_tls_connection_gnutls_handshake_async  (GTlsConnection       *conn,
51                                                               int                   io_priority,
52                                                               GCancellable         *cancellable,
53                                                               GAsyncReadyCallback   callback,
54                                                               gpointer              user_data);
55 static gboolean     g_tls_connection_gnutls_handshake_finish (GTlsConnection       *conn,
56                                                               GAsyncResult         *result,
57                                                               GError              **error);
58
59 static GInputStream  *g_tls_connection_gnutls_get_input_stream  (GIOStream *stream);
60 static GOutputStream *g_tls_connection_gnutls_get_output_stream (GIOStream *stream);
61
62 static gboolean     g_tls_connection_gnutls_close        (GIOStream           *stream,
63                                                           GCancellable        *cancellable,
64                                                           GError             **error);
65 static void         g_tls_connection_gnutls_close_async  (GIOStream           *stream,
66                                                           int                  io_priority,
67                                                           GCancellable        *cancellable,
68                                                           GAsyncReadyCallback  callback,
69                                                           gpointer             user_data);
70 static gboolean     g_tls_connection_gnutls_close_finish (GIOStream           *stream,
71                                                           GAsyncResult        *result,
72                                                           GError             **error);
73
74 static ssize_t g_tls_connection_gnutls_push_func (gnutls_transport_ptr_t  transport_data,
75                                                   const void             *buf,
76                                                   size_t                  buflen);
77 static ssize_t g_tls_connection_gnutls_pull_func (gnutls_transport_ptr_t  transport_data,
78                                                   void                   *buf,
79                                                   size_t                  buflen);
80
81 static void     g_tls_connection_gnutls_initable_iface_init (GInitableIface  *iface);
82 static gboolean g_tls_connection_gnutls_initable_init       (GInitable       *initable,
83                                                              GCancellable    *cancellable,
84                                                              GError         **error);
85
86 static void g_tls_connection_gnutls_init_priorities (void);
87
88 G_DEFINE_ABSTRACT_TYPE_WITH_CODE (GTlsConnectionGnutls, g_tls_connection_gnutls, G_TYPE_TLS_CONNECTION,
89                                   G_IMPLEMENT_INTERFACE (G_TYPE_INITABLE,
90                                                          g_tls_connection_gnutls_initable_iface_init);
91                                   g_tls_connection_gnutls_init_priorities ();
92                                   );
93
94
95 enum
96 {
97   PROP_0,
98   PROP_BASE_IO_STREAM,
99   PROP_REQUIRE_CLOSE_NOTIFY,
100   PROP_REHANDSHAKE_MODE,
101   PROP_USE_SYSTEM_CERTDB,
102   PROP_CERTIFICATE,
103   PROP_PEER_CERTIFICATE,
104   PROP_PEER_CERTIFICATE_ERRORS
105 };
106
107 struct _GTlsConnectionGnutlsPrivate
108 {
109   GIOStream *base_io_stream;
110   GPollableInputStream *base_istream;
111   GPollableOutputStream *base_ostream;
112
113   GList *ca_list;
114   gnutls_certificate_credentials creds;
115   gnutls_session session;
116
117   GTlsCertificate *certificate, *peer_certificate;
118   GTlsCertificateFlags peer_certificate_errors;
119   gboolean require_close_notify;
120   GTlsRehandshakeMode rehandshake_mode;
121   gboolean use_system_certdb;
122   gboolean need_handshake, handshaking, ever_handshaked;
123   gboolean closing;
124
125   GInputStream *tls_istream;
126   GOutputStream *tls_ostream;
127
128   GError *error;
129   GCancellable *cancellable;
130   gboolean blocking, eof;
131   GIOCondition internal_direction;
132 };
133
134 static void
135 g_tls_connection_gnutls_class_init (GTlsConnectionGnutlsClass *klass)
136 {
137   GObjectClass *gobject_class = G_OBJECT_CLASS (klass);
138   GTlsConnectionClass *connection_class = G_TLS_CONNECTION_CLASS (klass);
139   GIOStreamClass *iostream_class = G_IO_STREAM_CLASS (klass);
140
141   g_type_class_add_private (klass, sizeof (GTlsConnectionGnutlsPrivate));
142
143   gobject_class->get_property = g_tls_connection_gnutls_get_property;
144   gobject_class->set_property = g_tls_connection_gnutls_set_property;
145   gobject_class->finalize     = g_tls_connection_gnutls_finalize;
146
147   connection_class->handshake        = g_tls_connection_gnutls_handshake;
148   connection_class->handshake_async  = g_tls_connection_gnutls_handshake_async;
149   connection_class->handshake_finish = g_tls_connection_gnutls_handshake_finish;
150
151   iostream_class->get_input_stream  = g_tls_connection_gnutls_get_input_stream;
152   iostream_class->get_output_stream = g_tls_connection_gnutls_get_output_stream;
153   iostream_class->close_fn          = g_tls_connection_gnutls_close;
154   iostream_class->close_async       = g_tls_connection_gnutls_close_async;
155   iostream_class->close_finish      = g_tls_connection_gnutls_close_finish;
156
157   g_object_class_override_property (gobject_class, PROP_BASE_IO_STREAM, "base-io-stream");
158   g_object_class_override_property (gobject_class, PROP_REQUIRE_CLOSE_NOTIFY, "require-close-notify");
159   g_object_class_override_property (gobject_class, PROP_REHANDSHAKE_MODE, "rehandshake-mode");
160   g_object_class_override_property (gobject_class, PROP_USE_SYSTEM_CERTDB, "use-system-certdb");
161   g_object_class_override_property (gobject_class, PROP_CERTIFICATE, "certificate");
162   g_object_class_override_property (gobject_class, PROP_PEER_CERTIFICATE, "peer-certificate");
163   g_object_class_override_property (gobject_class, PROP_PEER_CERTIFICATE_ERRORS, "peer-certificate-errors");
164 }
165
166 static void
167 g_tls_connection_gnutls_initable_iface_init (GInitableIface *iface)
168 {
169   iface->init = g_tls_connection_gnutls_initable_init;
170 }
171
172 static void
173 g_tls_connection_gnutls_init (GTlsConnectionGnutls *gnutls)
174 {
175   gnutls->priv = G_TYPE_INSTANCE_GET_PRIVATE (gnutls, G_TYPE_TLS_CONNECTION_GNUTLS, GTlsConnectionGnutlsPrivate);
176
177   gnutls_certificate_allocate_credentials (&gnutls->priv->creds);
178   gnutls_certificate_set_verify_flags (gnutls->priv->creds,
179                                        GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT);
180
181   gnutls->priv->need_handshake = TRUE;
182 }
183
184 static gnutls_priority_t priorities[2][2];
185
186 static void
187 g_tls_connection_gnutls_init_priorities (void)
188 {
189   /* First field is "ssl3 only", second is "allow unsafe rehandshaking" */
190
191   gnutls_priority_init (&priorities[FALSE][FALSE],
192                         "NORMAL",
193                         NULL);
194   gnutls_priority_init (&priorities[TRUE][FALSE],
195                         "NORMAL:!VERS-TLS1.2:!VERS-TLS1.1:!VERS-TLS1.0",
196                         NULL);
197   gnutls_priority_init (&priorities[FALSE][TRUE],
198                         "NORMAL:%UNSAFE_RENEGOTIATION",
199                         NULL);
200   gnutls_priority_init (&priorities[TRUE][TRUE],
201                         "NORMAL:!VERS-TLS1.2:!VERS-TLS1.1:!VERS-TLS1.0:%UNSAFE_RENEGOTIATION",
202                         NULL);
203 }
204
205 static void
206 g_tls_connection_gnutls_set_handshake_priority (GTlsConnectionGnutls *gnutls)
207 {
208   gboolean use_ssl3, unsafe_rehandshake;
209
210   if (G_IS_TLS_CLIENT_CONNECTION (gnutls))
211     use_ssl3 = g_tls_client_connection_get_use_ssl3 (G_TLS_CLIENT_CONNECTION (gnutls));
212   else
213     use_ssl3 = FALSE;
214   unsafe_rehandshake = (gnutls->priv->rehandshake_mode == G_TLS_REHANDSHAKE_UNSAFELY);
215   gnutls_priority_set (gnutls->priv->session,
216                        priorities[use_ssl3][unsafe_rehandshake]);
217 }
218
219 static gboolean
220 g_tls_connection_gnutls_initable_init (GInitable     *initable,
221                                        GCancellable  *cancellable,
222                                        GError       **error)
223 {
224   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (initable);
225   int status;
226
227   g_return_val_if_fail (gnutls->priv->base_istream != NULL &&
228                         gnutls->priv->base_ostream != NULL, FALSE);
229
230   /* Make sure gnutls->priv->session has been initialized (it may have
231    * already been initialized by a construct-time property setter).
232    */
233   g_tls_connection_gnutls_get_session (gnutls);
234
235   status = gnutls_credentials_set (gnutls->priv->session,
236                                    GNUTLS_CRD_CERTIFICATE,
237                                    gnutls->priv->creds);
238   if (status != 0)
239     {
240       g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
241                    _("Could not create TLS connection: %s"),
242                    gnutls_strerror (status));
243       return FALSE;
244     }
245
246   gnutls_transport_set_push_function (gnutls->priv->session,
247                                       g_tls_connection_gnutls_push_func);
248   gnutls_transport_set_pull_function (gnutls->priv->session,
249                                       g_tls_connection_gnutls_pull_func);
250   gnutls_transport_set_ptr (gnutls->priv->session, gnutls);
251
252   gnutls->priv->tls_istream = g_tls_input_stream_gnutls_new (gnutls);
253   gnutls->priv->tls_ostream = g_tls_output_stream_gnutls_new (gnutls);
254
255   return TRUE;
256 }
257
258 static void
259 g_tls_connection_gnutls_finalize (GObject *object)
260 {
261   GTlsConnectionGnutls *connection = G_TLS_CONNECTION_GNUTLS (object);
262
263   if (connection->priv->base_io_stream)
264     g_object_unref (connection->priv->base_io_stream);
265
266   if (connection->priv->session)
267     gnutls_deinit (connection->priv->session);
268
269   if (connection->priv->tls_istream)
270     g_object_unref (connection->priv->tls_istream);
271   if (connection->priv->tls_ostream) 
272     g_object_unref (connection->priv->tls_ostream);
273
274   if (connection->priv->creds)
275     gnutls_certificate_free_credentials (connection->priv->creds);
276
277   if (connection->priv->certificate)
278     g_object_unref (connection->priv->certificate);
279   if (connection->priv->peer_certificate)
280     g_object_unref (connection->priv->peer_certificate);
281
282   if (connection->priv->error)
283     g_error_free (connection->priv->error);
284
285   G_OBJECT_CLASS (g_tls_connection_gnutls_parent_class)->finalize (object);
286 }
287
288 static void
289 g_tls_connection_gnutls_get_property (GObject    *object,
290                                       guint       prop_id,
291                                       GValue     *value,
292                                       GParamSpec *pspec)
293 {
294   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (object);
295
296   switch (prop_id)
297     {
298     case PROP_BASE_IO_STREAM:
299       g_value_set_object (value, gnutls->priv->base_io_stream);
300       break;
301
302     case PROP_REQUIRE_CLOSE_NOTIFY:
303       g_value_set_boolean (value, gnutls->priv->require_close_notify);
304       break;
305
306     case PROP_REHANDSHAKE_MODE:
307       g_value_set_enum (value, gnutls->priv->rehandshake_mode);
308       break;
309
310     case PROP_USE_SYSTEM_CERTDB:
311       g_value_set_boolean (value, gnutls->priv->use_system_certdb);
312       break;
313
314     case PROP_CERTIFICATE:
315       g_value_set_object (value, gnutls->priv->certificate);
316       break;
317
318     case PROP_PEER_CERTIFICATE:
319       g_value_set_object (value, gnutls->priv->peer_certificate);
320       break;
321
322     case PROP_PEER_CERTIFICATE_ERRORS:
323       g_value_set_flags (value, gnutls->priv->peer_certificate_errors);
324       break;
325
326     default:
327       G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
328     }
329 }
330
331 static void
332 g_tls_connection_gnutls_set_property (GObject      *object,
333                                       guint         prop_id,
334                                       const GValue *value,
335                                       GParamSpec   *pspec)
336 {
337   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (object);
338   GInputStream *istream;
339   GOutputStream *ostream;
340
341   switch (prop_id)
342     {
343     case PROP_BASE_IO_STREAM:
344       if (gnutls->priv->base_io_stream)
345         {
346           g_object_unref (gnutls->priv->base_io_stream);
347           gnutls->priv->base_istream = NULL;
348           gnutls->priv->base_ostream = NULL;
349         }
350       gnutls->priv->base_io_stream = g_value_dup_object (value);
351       if (!gnutls->priv->base_io_stream)
352         return;
353
354       istream = g_io_stream_get_input_stream (gnutls->priv->base_io_stream);
355       ostream = g_io_stream_get_output_stream (gnutls->priv->base_io_stream);
356
357       if (G_IS_POLLABLE_INPUT_STREAM (istream) &&
358           g_pollable_input_stream_can_poll (G_POLLABLE_INPUT_STREAM (istream)))
359         gnutls->priv->base_istream = G_POLLABLE_INPUT_STREAM (istream);
360       if (G_IS_POLLABLE_OUTPUT_STREAM (ostream) &&
361           g_pollable_output_stream_can_poll (G_POLLABLE_OUTPUT_STREAM (ostream)))
362         gnutls->priv->base_ostream = G_POLLABLE_OUTPUT_STREAM (ostream);
363       break;
364
365     case PROP_REQUIRE_CLOSE_NOTIFY:
366       gnutls->priv->require_close_notify = g_value_get_boolean (value);
367       break;
368
369     case PROP_REHANDSHAKE_MODE:
370       gnutls->priv->rehandshake_mode = g_value_get_enum (value);
371       break;
372
373     case PROP_USE_SYSTEM_CERTDB:
374       gnutls->priv->use_system_certdb = g_value_get_boolean (value);
375
376       gnutls_certificate_free_cas (gnutls->priv->creds);
377       if (gnutls->priv->use_system_certdb)
378         {
379           gnutls_x509_crt_t *cas;
380           int num_cas;
381
382           g_tls_backend_gnutls_get_system_ca_list_gnutls (&cas, &num_cas);
383           gnutls_certificate_set_x509_trust (gnutls->priv->creds, cas, num_cas);
384         }
385       break;
386
387     case PROP_CERTIFICATE:
388       if (gnutls->priv->certificate)
389         g_object_unref (gnutls->priv->certificate);
390       gnutls->priv->certificate = g_value_dup_object (value);
391       break;
392
393     default:
394       G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
395     }
396 }
397
398 gnutls_certificate_credentials
399 g_tls_connection_gnutls_get_credentials (GTlsConnectionGnutls *gnutls)
400 {
401   return gnutls->priv->creds;
402 }
403
404 gnutls_session
405 g_tls_connection_gnutls_get_session (GTlsConnectionGnutls *gnutls)
406 {
407   /* Ideally we would initialize gnutls->priv->session from
408    * g_tls_connection_gnutls_init(), but we can't tell if it's a
409    * client or server connection at that point... And
410    * g_tls_connection_gnutls_initiable_init() is too late, because
411    * construct-time property setters may need to modify it.
412    */
413   if (!gnutls->priv->session)
414     {
415       gboolean client = G_IS_TLS_CLIENT_CONNECTION (gnutls);
416       gnutls_init (&gnutls->priv->session, client ? GNUTLS_CLIENT : GNUTLS_SERVER);
417     }
418
419   return gnutls->priv->session;
420 }
421
422 void
423 g_tls_connection_gnutls_get_certificate (GTlsConnectionGnutls *gnutls,
424                                          gnutls_retr_st       *st)
425 {
426   GTlsCertificate *cert;
427
428   cert = g_tls_connection_get_certificate (G_TLS_CONNECTION (gnutls));
429
430   st->type = GNUTLS_CRT_X509;
431   if (cert)
432     {
433       GTlsCertificateGnutls *gnutlscert = G_TLS_CERTIFICATE_GNUTLS (cert);
434
435       st->ncerts = 1;
436       st->cert.x509 = gnutls_malloc (sizeof (gnutls_x509_crt_t));
437       st->cert.x509[0] = g_tls_certificate_gnutls_copy_cert (gnutlscert);
438       st->key.x509 = g_tls_certificate_gnutls_copy_key (gnutlscert);
439       st->deinit_all = TRUE;
440     }
441   else
442     st->ncerts = 0;
443 }
444
445 static void
446 begin_gnutls_io (GTlsConnectionGnutls  *gnutls,
447                  gboolean               blocking,
448                  GCancellable          *cancellable)
449 {
450   gnutls->priv->blocking = blocking;
451   gnutls->priv->cancellable = cancellable;
452   gnutls->priv->internal_direction = 0;
453   g_clear_error (&gnutls->priv->error);
454 }
455
456 static int
457 end_gnutls_io (GTlsConnectionGnutls  *gnutls,
458                int                    status,
459                GError               **error)
460 {
461   gnutls->priv->cancellable = NULL;
462
463   if (status >= 0)
464     {
465       g_clear_error (&gnutls->priv->error);
466       return status;
467     }
468
469   if (gnutls->priv->handshaking && !gnutls->priv->ever_handshaked)
470     {
471       if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_FAILED) ||
472           status == GNUTLS_E_UNEXPECTED_PACKET_LENGTH ||
473           status == GNUTLS_E_FATAL_ALERT_RECEIVED ||
474           status == GNUTLS_E_UNSUPPORTED_VERSION_PACKET)
475         {
476           g_clear_error (&gnutls->priv->error);
477           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_NOT_TLS,
478                                _("Peer failed to perform TLS handshake"));
479           return GNUTLS_E_PULL_ERROR;
480         }
481     }
482
483   if (gnutls->priv->error)
484     {
485       if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
486         status = GNUTLS_E_AGAIN;
487       g_propagate_error (error, gnutls->priv->error);
488       gnutls->priv->error = NULL;
489       return status;
490     }
491   else if (status == GNUTLS_E_REHANDSHAKE)
492     {
493       if (gnutls->priv->rehandshake_mode == G_TLS_REHANDSHAKE_NEVER)
494         {
495           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
496                                _("Peer requested illegal TLS rehandshake"));
497           return GNUTLS_E_PULL_ERROR;
498         }
499
500       gnutls->priv->need_handshake = TRUE;
501       return status;
502     }
503   else if (status == GNUTLS_E_UNEXPECTED_PACKET_LENGTH)
504     {
505       if (gnutls->priv->eof)
506         {
507           if (gnutls->priv->require_close_notify)
508             {
509               g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_EOF,
510                                    _("TLS connection closed unexpectedly"));
511               return status;
512             }
513           else
514             return 0;
515         }
516     }
517
518   return status;
519 }
520
521 #define BEGIN_GNUTLS_IO(gnutls, blocking, cancellable)  \
522   begin_gnutls_io (gnutls, blocking, cancellable);      \
523   do {
524
525 #define END_GNUTLS_IO(gnutls, ret, errmsg, error)       \
526   } while ((ret == GNUTLS_E_AGAIN ||                    \
527             ret == GNUTLS_E_WARNING_ALERT_RECEIVED) &&  \
528            !gnutls->priv->error);                       \
529   ret = end_gnutls_io (gnutls, ret, error);             \
530   if (ret && error && !*error)                          \
531     {                                                   \
532       g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,\
533                    errmsg, gnutls_strerror (ret));      \
534     }                                                   \
535   ;
536
537 gboolean
538 g_tls_connection_gnutls_check (GTlsConnectionGnutls  *gnutls,
539                                GIOCondition           condition)
540 {
541   if (!gnutls->priv->internal_direction)
542     return TRUE;
543
544   if (gnutls->priv->handshaking || gnutls->priv->closing)
545     condition = gnutls->priv->internal_direction;
546
547   if (condition & G_IO_IN)
548     return g_pollable_input_stream_is_readable (gnutls->priv->base_istream);
549   else
550     return g_pollable_output_stream_is_writable (gnutls->priv->base_ostream);
551 }
552
553 typedef struct {
554   GSource source;
555
556   GTlsConnectionGnutls *gnutls;
557   GObject              *stream;
558
559   GSource              *child_source;
560   GIOCondition          current_direction;
561 } GTlsConnectionGnutlsSource;
562
563 static gboolean
564 gnutls_source_prepare (GSource *source,
565                        gint    *timeout)
566 {
567   *timeout = -1;
568   return FALSE;
569 }
570
571 static gboolean
572 gnutls_source_check (GSource *source)
573 {
574   return FALSE;
575 }
576
577 static gboolean
578 gnutls_source_sync_child_source (GTlsConnectionGnutlsSource *gnutls_source)
579 {
580   GTlsConnectionGnutls *gnutls = gnutls_source->gnutls;
581   GSource *source = (GSource *)gnutls_source;
582   GIOCondition direction;
583
584   if (gnutls->priv->handshaking || gnutls->priv->closing)
585     direction = gnutls->priv->internal_direction;
586   else if (!gnutls_source->stream)
587     return FALSE;
588   else if (G_IS_TLS_INPUT_STREAM_GNUTLS (gnutls_source->stream))
589     direction = G_IO_IN;
590   else
591     direction = G_IO_OUT;
592
593   if (direction == gnutls_source->current_direction)
594     return TRUE;
595
596   if (gnutls_source->child_source)
597     {
598       g_source_remove_child_source (source, gnutls_source->child_source);
599       g_source_unref (gnutls_source->child_source);
600     }
601
602   if (direction & G_IO_IN)
603     gnutls_source->child_source = g_pollable_input_stream_create_source (gnutls->priv->base_istream, NULL);
604   else
605     gnutls_source->child_source = g_pollable_output_stream_create_source (gnutls->priv->base_ostream, NULL);
606
607   g_source_set_dummy_callback (gnutls_source->child_source);
608   g_source_add_child_source (source, gnutls_source->child_source);
609   gnutls_source->current_direction = direction;
610   return TRUE;
611 }
612
613 static gboolean
614 gnutls_source_dispatch (GSource     *source,
615                         GSourceFunc  callback,
616                         gpointer     user_data)
617 {
618   GPollableSourceFunc func = (GPollableSourceFunc)callback;
619   GTlsConnectionGnutlsSource *gnutls_source = (GTlsConnectionGnutlsSource *)source;
620   gboolean ret;
621
622   ret = (*func) (gnutls_source->stream, user_data);
623   if (ret)
624     ret = gnutls_source_sync_child_source (gnutls_source);
625
626   return ret;
627 }
628
629 static void
630 gnutls_source_finalize (GSource *source)
631 {
632   GTlsConnectionGnutlsSource *gnutls_source = (GTlsConnectionGnutlsSource *)source;
633
634   g_object_unref (gnutls_source->gnutls);
635
636   if (gnutls_source->child_source)
637     g_source_unref (gnutls_source->child_source);
638 }
639
640 static gboolean
641 g_tls_connection_gnutls_source_closure_callback (GObject  *stream,
642                                                  gpointer  data)
643 {
644   GClosure *closure = data;
645
646   GValue param = { 0, };
647   GValue result_value = { 0, };
648   gboolean result;
649
650   g_value_init (&result_value, G_TYPE_BOOLEAN);
651
652   g_value_init (&param, G_TYPE_OBJECT);
653   g_value_set_object (&param, stream);
654
655   g_closure_invoke (closure, &result_value, 1, &param, NULL);
656
657   result = g_value_get_boolean (&result_value);
658   g_value_unset (&result_value);
659   g_value_unset (&param);
660
661   return result;
662 }
663
664 static GSourceFuncs gnutls_source_funcs =
665 {
666   gnutls_source_prepare,
667   gnutls_source_check,
668   gnutls_source_dispatch,
669   gnutls_source_finalize,
670   (GSourceFunc)g_tls_connection_gnutls_source_closure_callback,
671   (GSourceDummyMarshal)_gnutls_marshal_BOOLEAN__VOID,
672 };
673
674 GSource *
675 g_tls_connection_gnutls_create_source (GTlsConnectionGnutls  *gnutls,
676                                        GIOCondition           condition,
677                                        GCancellable          *cancellable)
678 {
679   GSource *source, *cancellable_source;
680   GTlsConnectionGnutlsSource *gnutls_source;
681
682   source = g_source_new (&gnutls_source_funcs, sizeof (GTlsConnectionGnutlsSource));
683   g_source_set_name (source, "GTlsConnectionGnutlsSource");
684   gnutls_source = (GTlsConnectionGnutlsSource *)source;
685   gnutls_source->gnutls = g_object_ref (gnutls);
686   if (condition & G_IO_IN)
687     gnutls_source->stream = G_OBJECT (gnutls->priv->tls_istream);
688   else if (condition & G_IO_OUT)
689     gnutls_source->stream = G_OBJECT (gnutls->priv->tls_ostream);
690   gnutls_source_sync_child_source (gnutls_source);
691
692   if (cancellable)
693     {
694       cancellable_source = g_cancellable_source_new (cancellable);
695       g_source_set_dummy_callback (cancellable_source);
696       g_source_add_child_source (source, cancellable_source);
697       g_source_unref (cancellable_source);
698     }
699
700   return source;
701 }
702
703 static void
704 set_gnutls_error (GTlsConnectionGnutls *gnutls, GIOCondition direction)
705 {
706   if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_CANCELLED))
707     gnutls_transport_set_errno (gnutls->priv->session, EINTR);
708   else if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
709     {
710       gnutls_transport_set_errno (gnutls->priv->session, EAGAIN);
711       gnutls->priv->internal_direction = direction;
712     }
713   else
714     gnutls_transport_set_errno (gnutls->priv->session, EIO);
715 }
716
717 static ssize_t
718 g_tls_connection_gnutls_pull_func (gnutls_transport_ptr_t  transport_data,
719                                    void                   *buf,
720                                    size_t                  buflen)
721 {
722   GTlsConnectionGnutls *gnutls = transport_data;
723   ssize_t ret;
724
725   /* If gnutls->priv->error is non-%NULL when we're called, it means
726    * that an error previously occurred, but gnutls decided not to
727    * propagate it. So it's correct for us to just clear it. (Usually
728    * this means it ignored an EAGAIN after a short read, and now
729    * we'll return EAGAIN again, which it will obey this time.)
730    */
731   g_clear_error (&gnutls->priv->error);
732
733   if (gnutls->priv->blocking)
734     {
735       ret = g_input_stream_read (G_INPUT_STREAM (gnutls->priv->base_istream),
736                                  buf, buflen,
737                                  gnutls->priv->cancellable,
738                                  &gnutls->priv->error);
739     }
740   else
741     {
742       ret = g_pollable_input_stream_read_nonblocking (gnutls->priv->base_istream,
743                                                       buf, buflen,
744                                                       gnutls->priv->cancellable,
745                                                       &gnutls->priv->error);
746     }
747
748   if (ret < 0)
749     set_gnutls_error (gnutls, G_IO_IN);
750   else if (ret == 0)
751     gnutls->priv->eof = TRUE;
752
753   return ret;
754 }
755
756 static ssize_t
757 g_tls_connection_gnutls_push_func (gnutls_transport_ptr_t  transport_data,
758                                    const void             *buf,
759                                    size_t                  buflen)
760 {
761   GTlsConnectionGnutls *gnutls = transport_data;
762   ssize_t ret;
763
764   /* See comment in pull_func. */
765   g_clear_error (&gnutls->priv->error);
766
767   if (gnutls->priv->blocking)
768     {
769       ret = g_output_stream_write (G_OUTPUT_STREAM (gnutls->priv->base_ostream),
770                                    buf, buflen,
771                                    gnutls->priv->cancellable,
772                                    &gnutls->priv->error);
773     }
774   else
775     {
776       ret = g_pollable_output_stream_write_nonblocking (gnutls->priv->base_ostream,
777                                                         buf, buflen,
778                                                         gnutls->priv->cancellable,
779                                                         &gnutls->priv->error);
780     }
781   if (ret < 0)
782     set_gnutls_error (gnutls, G_IO_OUT);
783
784   return ret;
785 }
786
787 static gboolean
788 handshake_internal (GTlsConnectionGnutls  *gnutls,
789                     gboolean               blocking,
790                     GCancellable          *cancellable,
791                     GError               **error)
792 {
793   GTlsCertificate *peer_certificate = NULL;
794   GTlsCertificateFlags peer_certificate_errors = 0;
795   int ret;
796
797   if (G_IS_TLS_SERVER_CONNECTION_GNUTLS (gnutls) &&
798       gnutls->priv->ever_handshaked && !gnutls->priv->need_handshake)
799     {
800       BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
801       ret = gnutls_rehandshake (gnutls->priv->session);
802       END_GNUTLS_IO (gnutls, ret, _("Error performing TLS handshake: %s"), error);
803
804       if (ret != 0)
805         return FALSE;
806     }
807
808   if (!gnutls->priv->handshaking)
809     {
810       gnutls->priv->handshaking = TRUE;
811
812       if (gnutls->priv->peer_certificate)
813         {
814           g_object_unref (gnutls->priv->peer_certificate);
815           gnutls->priv->peer_certificate = NULL;
816           gnutls->priv->peer_certificate_errors = 0;
817
818           g_object_notify (G_OBJECT (gnutls), "peer-certificate");
819           g_object_notify (G_OBJECT (gnutls), "peer-certificate-errors");
820         }
821
822       g_tls_connection_gnutls_set_handshake_priority (gnutls);
823       G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->begin_handshake (gnutls);
824     }
825
826   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
827   ret = gnutls_handshake (gnutls->priv->session);
828   END_GNUTLS_IO (gnutls, ret, _("Error performing TLS handshake: %s"), error);
829
830   if (ret == GNUTLS_E_AGAIN)
831     return FALSE;
832
833   gnutls->priv->handshaking = FALSE;
834   gnutls->priv->need_handshake = FALSE;
835   gnutls->priv->ever_handshaked = TRUE;
836
837   if (ret == 0 &&
838       gnutls_certificate_type_get (gnutls->priv->session) == GNUTLS_CRT_X509)
839     {
840       GTlsCertificate *chain, *cert;
841       const gnutls_datum_t *certs;
842       unsigned int num_certs;
843       int i;
844
845       certs = gnutls_certificate_get_peers (gnutls->priv->session, &num_certs);
846       chain = NULL;
847       if (certs)
848         {
849           for (i = num_certs - 1; i >= 0; i--)
850             {
851               cert = g_tls_certificate_gnutls_new (&certs[i], chain);
852               if (chain)
853                 g_object_unref (chain);
854               chain = cert;
855             }
856         }
857
858       peer_certificate = chain;
859     }
860
861   if (peer_certificate)
862     {
863       int status;
864
865       status = gnutls_certificate_verify_peers (gnutls->priv->session);
866       peer_certificate_errors = g_tls_certificate_gnutls_convert_flags (status);
867       if (peer_certificate_errors)
868         {
869           /* gnutls_certificate_verify_peers() bails out on the first
870            * error, which may be G_TLS_CERTIFICATE_UNKNOWN_CA, but the
871            * caller may be planning to check that part themselves. So
872            * call g_tls_certificate_verify() to get any other errors.
873            */
874           peer_certificate_errors |= g_tls_certificate_verify (peer_certificate, NULL, NULL);
875         }
876
877       if (!G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->verify_peer (gnutls, peer_certificate, &peer_certificate_errors))
878         {
879           g_object_unref (peer_certificate);
880           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_BAD_CERTIFICATE,
881                                _("Unacceptable TLS certificate"));
882           return FALSE;
883         }
884     }
885
886   G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->finish_handshake (gnutls, error);
887
888   if (ret == 0)
889     {
890       gnutls->priv->peer_certificate = peer_certificate;
891       gnutls->priv->peer_certificate_errors = peer_certificate_errors;
892
893       g_object_notify (G_OBJECT (gnutls), "peer-certificate");
894       g_object_notify (G_OBJECT (gnutls), "peer-certificate-errors");
895
896       return TRUE;
897     }
898   else
899     return FALSE;
900 }
901
902 static gboolean
903 handshake_in_progress_or_failed (GTlsConnectionGnutls  *gnutls,
904                                  gboolean               blocking,
905                                  GCancellable          *cancellable,
906                                  GError               **error)
907 {
908   if (!(gnutls->priv->need_handshake || gnutls->priv->handshaking))
909     return FALSE;
910
911   return !handshake_internal (gnutls, blocking, cancellable, error);
912 }
913
914 static gboolean
915 g_tls_connection_gnutls_handshake (GTlsConnection   *conn,
916                                    GCancellable     *cancellable,
917                                    GError          **error)
918 {
919   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (conn);
920
921   return handshake_internal (gnutls, TRUE, cancellable, error);
922 }
923
924 static gboolean
925 g_tls_connection_gnutls_handshake_ready (GObject  *pollable_stream,
926                                          gpointer  user_data)
927 {
928   GTlsConnectionGnutls *gnutls;
929   GSimpleAsyncResult *simple = user_data;
930   gboolean success;
931   GError *error = NULL;
932
933   gnutls = G_TLS_CONNECTION_GNUTLS (g_async_result_get_source_object (G_ASYNC_RESULT (simple)));
934   g_object_unref (gnutls);
935
936   success = handshake_internal (gnutls, FALSE, NULL, &error);
937   if (!success && g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
938     {
939       g_error_free (error);
940       return TRUE;
941     }
942
943   if (error)
944     {
945       g_simple_async_result_set_from_error (simple, error);
946       g_error_free (error);
947     }
948   else
949     g_simple_async_result_set_op_res_gboolean (simple, success);
950   g_simple_async_result_complete (simple);
951   g_object_unref (simple);
952
953   return FALSE;
954 }
955
956 static void
957 g_tls_connection_gnutls_handshake_async (GTlsConnection       *conn,
958                                          int                   io_priority,
959                                          GCancellable         *cancellable,
960                                          GAsyncReadyCallback   callback,
961                                          gpointer              user_data)
962 {
963   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (conn);
964   GSimpleAsyncResult *simple;
965   gboolean success;
966   GError *error = NULL;
967   GSource *source;
968
969   simple = g_simple_async_result_new (G_OBJECT (conn), callback, user_data,
970                                       g_tls_connection_gnutls_handshake_async);
971   success = handshake_internal (gnutls, FALSE, cancellable, &error);
972   if (success)
973     {
974       g_simple_async_result_set_op_res_gboolean (simple, TRUE);
975       g_simple_async_result_complete_in_idle (simple);
976       g_object_unref (simple);
977     }
978   else if (!g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
979     {
980       g_simple_async_result_set_from_error (simple, error);
981       g_error_free (error);
982       g_simple_async_result_complete_in_idle (simple);
983       g_object_unref (simple);
984     }
985
986   source = g_tls_connection_gnutls_create_source (gnutls, 0, cancellable);
987   g_source_set_callback (source,
988                          (GSourceFunc) g_tls_connection_gnutls_handshake_ready,
989                          simple, NULL);
990   g_source_set_priority (source, io_priority);
991   g_source_attach (source, g_main_context_get_thread_default ());
992   g_source_unref (source);
993 }
994
995 static gboolean
996 g_tls_connection_gnutls_handshake_finish (GTlsConnection       *conn,
997                                           GAsyncResult         *result,
998                                           GError              **error)
999 {
1000   GSimpleAsyncResult *simple;
1001
1002   g_return_val_if_fail (g_simple_async_result_is_valid (result, G_OBJECT (conn), g_tls_connection_gnutls_handshake_async), FALSE);
1003
1004   simple = G_SIMPLE_ASYNC_RESULT (result);
1005
1006   if (g_simple_async_result_propagate_error (simple, error))
1007     return FALSE;
1008
1009   return g_simple_async_result_get_op_res_gboolean (simple);
1010 }
1011
1012 gssize
1013 g_tls_connection_gnutls_read (GTlsConnectionGnutls  *gnutls,
1014                               void                  *buffer,
1015                               gsize                  count,
1016                               gboolean               blocking,
1017                               GCancellable          *cancellable,
1018                               GError               **error)
1019 {
1020   gssize ret;
1021
1022  again:
1023   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1024     return -1;
1025
1026   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1027   ret = gnutls_record_recv (gnutls->priv->session, buffer, count);
1028   END_GNUTLS_IO (gnutls, ret, _("Error reading data from TLS socket: %s"), error);
1029
1030   if (ret >= 0)
1031     return ret;
1032   else if (ret == GNUTLS_E_REHANDSHAKE)
1033     goto again;
1034   else
1035     return -1;
1036 }
1037
1038 gssize
1039 g_tls_connection_gnutls_write (GTlsConnectionGnutls  *gnutls,
1040                                const void            *buffer,
1041                                gsize                  count,
1042                                gboolean               blocking,
1043                                GCancellable          *cancellable,
1044                                GError               **error)
1045 {
1046   gssize ret;
1047
1048  again:
1049   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1050     return -1;
1051
1052   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1053   ret = gnutls_record_send (gnutls->priv->session, buffer, count);
1054   END_GNUTLS_IO (gnutls, ret, _("Error writing data to TLS socket: %s"), error);
1055
1056   if (ret >= 0)
1057     return ret;
1058   else if (ret == GNUTLS_E_REHANDSHAKE)
1059     goto again;
1060   else
1061     return -1;
1062 }
1063
1064 static GInputStream  *
1065 g_tls_connection_gnutls_get_input_stream (GIOStream *stream)
1066 {
1067   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1068
1069   return gnutls->priv->tls_istream;
1070 }
1071
1072 static GOutputStream *
1073 g_tls_connection_gnutls_get_output_stream (GIOStream *stream)
1074 {
1075   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1076
1077   return gnutls->priv->tls_ostream;
1078 }
1079
1080 static gboolean
1081 close_internal (GTlsConnectionGnutls  *gnutls,
1082                 gboolean               blocking,
1083                 GCancellable          *cancellable,
1084                 GError               **error)
1085 {
1086   int ret;
1087
1088   /* If we haven't finished the initial handshake yet, there's no
1089    * reason to finish it just so we can close.
1090    */
1091   if (gnutls->priv->handshaking && !gnutls->priv->ever_handshaked)
1092     return TRUE;
1093
1094   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1095     return FALSE;
1096
1097   gnutls->priv->closing = TRUE;
1098   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1099   ret = gnutls_bye (gnutls->priv->session, GNUTLS_SHUT_WR);
1100   END_GNUTLS_IO (gnutls, ret, _("Error performing TLS close: %s"), error);
1101   if (ret == 0 || !error || !g_error_matches (*error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1102     gnutls->priv->closing = FALSE;
1103
1104   return ret == 0;
1105 }
1106
1107 static gboolean
1108 g_tls_connection_gnutls_close (GIOStream     *stream,
1109                                GCancellable  *cancellable,
1110                                GError       **error)
1111 {
1112   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1113
1114   if (!close_internal (gnutls, TRUE, cancellable, error))
1115     return FALSE;
1116   return g_io_stream_close (gnutls->priv->base_io_stream,
1117                             cancellable, error);
1118 }
1119
1120 typedef struct {
1121   GSimpleAsyncResult *simple;
1122   GCancellable *cancellable;
1123   int io_priority;
1124 } AsyncCloseData;
1125
1126 static void
1127 close_base_stream_cb (GObject      *base_stream,
1128                       GAsyncResult *result,
1129                       gpointer      user_data)
1130 {
1131   gboolean success;
1132   GError *error = NULL;
1133   AsyncCloseData *acd = user_data;
1134
1135   success = g_io_stream_close_finish (G_IO_STREAM (base_stream),
1136                                       result, &error);
1137   if (success)
1138     g_simple_async_result_set_op_res_gboolean (acd->simple, TRUE);
1139   else
1140     {
1141       g_simple_async_result_set_from_error (acd->simple, error);
1142       g_error_free (error);
1143     }
1144
1145   g_simple_async_result_complete (acd->simple);
1146   g_object_unref (acd->simple);
1147   if (acd->cancellable)
1148     g_object_unref (acd->cancellable);
1149   g_slice_free (AsyncCloseData, acd);
1150 }
1151
1152 static gboolean
1153 g_tls_connection_gnutls_close_ready (GObject  *pollable_stream,
1154                                      gpointer  user_data)
1155 {
1156   GTlsConnectionGnutls *gnutls;
1157   AsyncCloseData *acd = user_data;
1158   gboolean success;
1159   GError *error = NULL;
1160
1161   gnutls = G_TLS_CONNECTION_GNUTLS (g_async_result_get_source_object (G_ASYNC_RESULT (acd->simple)));
1162   g_object_unref (gnutls);
1163
1164   success = close_internal (gnutls, FALSE, NULL, &error);
1165   if (!success && g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1166     {
1167       g_error_free (error);
1168       return TRUE;
1169     }
1170
1171   if (error)
1172     {
1173       g_simple_async_result_set_from_error (acd->simple, error);
1174       g_simple_async_result_complete (acd->simple);
1175       g_error_free (error);
1176       g_object_unref (acd->simple);
1177       if (acd->cancellable)
1178         g_object_unref (acd->cancellable);
1179       g_slice_free (AsyncCloseData, acd);
1180     }
1181   else
1182     {
1183       g_io_stream_close_async (gnutls->priv->base_io_stream,
1184                                acd->io_priority, acd->cancellable,
1185                                close_base_stream_cb, acd);
1186     }
1187
1188   return FALSE;
1189 }
1190
1191 static void
1192 g_tls_connection_gnutls_close_async (GIOStream           *stream,
1193                                      int                  io_priority,
1194                                      GCancellable        *cancellable,
1195                                      GAsyncReadyCallback  callback,
1196                                      gpointer             user_data)
1197 {
1198   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1199   GSimpleAsyncResult *simple;
1200   gboolean success;
1201   GError *error = NULL;
1202   AsyncCloseData *acd;
1203   GSource *source;
1204
1205   simple = g_simple_async_result_new (G_OBJECT (stream), callback, user_data,
1206                                       g_tls_connection_gnutls_close_async);
1207
1208   success = close_internal (gnutls, FALSE, cancellable, &error);
1209   if (error && !g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1210     {
1211       g_simple_async_result_set_from_error (simple, error);
1212       g_error_free (error);
1213       g_simple_async_result_complete_in_idle (simple);
1214       g_object_unref (simple);
1215     }
1216
1217   if (error)
1218     g_error_free (error);
1219
1220   acd = g_slice_new (AsyncCloseData);
1221   acd->simple = simple;
1222   acd->cancellable = g_object_ref (cancellable);
1223   acd->io_priority = io_priority;
1224
1225   if (success)
1226     {
1227       g_io_stream_close_async (gnutls->priv->base_io_stream,
1228                                io_priority, cancellable,
1229                                close_base_stream_cb, acd);
1230       return;
1231     }
1232
1233   source = g_tls_connection_gnutls_create_source (gnutls, 0, acd->cancellable);
1234   g_source_set_callback (source,
1235                          (GSourceFunc) g_tls_connection_gnutls_close_ready,
1236                          acd, NULL);
1237   g_source_set_priority (source, acd->io_priority);
1238   g_source_attach (source, g_main_context_get_thread_default ());
1239   g_source_unref (source);
1240 }
1241
1242 static gboolean
1243 g_tls_connection_gnutls_close_finish (GIOStream           *stream,
1244                                       GAsyncResult        *result,
1245                                       GError             **error)
1246 {
1247   GSimpleAsyncResult *simple;
1248
1249   g_return_val_if_fail (g_simple_async_result_is_valid (result, G_OBJECT (stream), g_tls_connection_gnutls_close_async), FALSE);
1250
1251   simple = G_SIMPLE_ASYNC_RESULT (result);
1252
1253   if (g_simple_async_result_propagate_error (simple, error))
1254     return FALSE;
1255
1256   return g_simple_async_result_get_op_res_gboolean (simple);
1257 }