gnutls: add closure-related fields to TLS pollable sources
[platform/upstream/glib-networking.git] / tls / gnutls / gtlsconnection-gnutls.c
1 /* GIO - GLib Input, Output and Streaming Library
2  *
3  * Copyright © 2009 Red Hat, Inc
4  *
5  * This library is free software; you can redistribute it and/or
6  * modify it under the terms of the GNU Lesser General Public
7  * License as published by the Free Software Foundation; either
8  * version 2 of the License, or (at your option) any later version.
9  *
10  * This library is distributed in the hope that it will be useful,
11  * but WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
13  * Lesser General Public License for more details.
14  *
15  * You should have received a copy of the GNU Lesser General
16  * Public License along with this library; if not, write to the
17  * Free Software Foundation, Inc., 59 Temple Place, Suite 330,
18  * Boston, MA 02111-1307, USA.
19  */
20
21 #include "config.h"
22 #include "glib.h"
23
24 #include <errno.h>
25 #include <gnutls/gnutls.h>
26 #include <gnutls/x509.h>
27
28 #include "gtlsconnection-gnutls.h"
29 #include "gtlsbackend-gnutls.h"
30 #include "gtlscertificate-gnutls.h"
31 #include "gtlsinputstream-gnutls.h"
32 #include "gtlsoutputstream-gnutls.h"
33 #include "gtlsserverconnection-gnutls.h"
34 #include "gnutls-marshal.h"
35 #include <glib/gi18n-lib.h>
36
37 static void g_tls_connection_gnutls_get_property (GObject    *object,
38                                                   guint       prop_id,
39                                                   GValue     *value,
40                                                   GParamSpec *pspec);
41 static void g_tls_connection_gnutls_set_property (GObject      *object,
42                                                   guint         prop_id,
43                                                   const GValue *value,
44                                                   GParamSpec   *pspec);
45 static void g_tls_connection_gnutls_finalize     (GObject      *object);
46
47 static gboolean     g_tls_connection_gnutls_handshake        (GTlsConnection       *connection,
48                                                               GCancellable         *cancellable,
49                                                               GError              **error);
50 static void         g_tls_connection_gnutls_handshake_async  (GTlsConnection       *conn,
51                                                               int                   io_priority,
52                                                               GCancellable         *cancellable,
53                                                               GAsyncReadyCallback   callback,
54                                                               gpointer              user_data);
55 static gboolean     g_tls_connection_gnutls_handshake_finish (GTlsConnection       *conn,
56                                                               GAsyncResult         *result,
57                                                               GError              **error);
58
59 static GInputStream  *g_tls_connection_gnutls_get_input_stream  (GIOStream *stream);
60 static GOutputStream *g_tls_connection_gnutls_get_output_stream (GIOStream *stream);
61
62 static gboolean     g_tls_connection_gnutls_close        (GIOStream           *stream,
63                                                           GCancellable        *cancellable,
64                                                           GError             **error);
65 static void         g_tls_connection_gnutls_close_async  (GIOStream           *stream,
66                                                           int                  io_priority,
67                                                           GCancellable        *cancellable,
68                                                           GAsyncReadyCallback  callback,
69                                                           gpointer             user_data);
70 static gboolean     g_tls_connection_gnutls_close_finish (GIOStream           *stream,
71                                                           GAsyncResult        *result,
72                                                           GError             **error);
73
74 static ssize_t g_tls_connection_gnutls_push_func (gnutls_transport_ptr_t  transport_data,
75                                                   const void             *buf,
76                                                   size_t                  buflen);
77 static ssize_t g_tls_connection_gnutls_pull_func (gnutls_transport_ptr_t  transport_data,
78                                                   void                   *buf,
79                                                   size_t                  buflen);
80
81 static void     g_tls_connection_gnutls_initable_iface_init (GInitableIface  *iface);
82 static gboolean g_tls_connection_gnutls_initable_init       (GInitable       *initable,
83                                                              GCancellable    *cancellable,
84                                                              GError         **error);
85
86 static void g_tls_connection_gnutls_init_priorities (void);
87
88 G_DEFINE_ABSTRACT_TYPE_WITH_CODE (GTlsConnectionGnutls, g_tls_connection_gnutls, G_TYPE_TLS_CONNECTION,
89                                   G_IMPLEMENT_INTERFACE (G_TYPE_INITABLE,
90                                                          g_tls_connection_gnutls_initable_iface_init);
91                                   g_tls_connection_gnutls_init_priorities ();
92                                   );
93
94
95 enum
96 {
97   PROP_0,
98   PROP_BASE_IO_STREAM,
99   PROP_REQUIRE_CLOSE_NOTIFY,
100   PROP_REHANDSHAKE_MODE,
101   PROP_USE_SYSTEM_CERTDB,
102   PROP_CERTIFICATE,
103   PROP_PEER_CERTIFICATE,
104   PROP_PEER_CERTIFICATE_ERRORS
105 };
106
107 struct _GTlsConnectionGnutlsPrivate
108 {
109   GIOStream *base_io_stream;
110   GPollableInputStream *base_istream;
111   GPollableOutputStream *base_ostream;
112
113   GList *ca_list;
114   gnutls_certificate_credentials creds;
115   gnutls_session session;
116
117   GTlsCertificate *certificate, *peer_certificate;
118   GTlsCertificateFlags peer_certificate_errors;
119   gboolean require_close_notify;
120   GTlsRehandshakeMode rehandshake_mode;
121   gboolean use_system_certdb;
122   gboolean need_handshake, handshaking, ever_handshaked;
123   gboolean closing;
124
125   GInputStream *tls_istream;
126   GOutputStream *tls_ostream;
127
128   GError *error;
129   GCancellable *cancellable;
130   gboolean blocking, eof;
131   GIOCondition internal_direction;
132 };
133
134 static void
135 g_tls_connection_gnutls_class_init (GTlsConnectionGnutlsClass *klass)
136 {
137   GObjectClass *gobject_class = G_OBJECT_CLASS (klass);
138   GTlsConnectionClass *connection_class = G_TLS_CONNECTION_CLASS (klass);
139   GIOStreamClass *iostream_class = G_IO_STREAM_CLASS (klass);
140
141   g_type_class_add_private (klass, sizeof (GTlsConnectionGnutlsPrivate));
142
143   gobject_class->get_property = g_tls_connection_gnutls_get_property;
144   gobject_class->set_property = g_tls_connection_gnutls_set_property;
145   gobject_class->finalize     = g_tls_connection_gnutls_finalize;
146
147   connection_class->handshake        = g_tls_connection_gnutls_handshake;
148   connection_class->handshake_async  = g_tls_connection_gnutls_handshake_async;
149   connection_class->handshake_finish = g_tls_connection_gnutls_handshake_finish;
150
151   iostream_class->get_input_stream  = g_tls_connection_gnutls_get_input_stream;
152   iostream_class->get_output_stream = g_tls_connection_gnutls_get_output_stream;
153   iostream_class->close_fn          = g_tls_connection_gnutls_close;
154   iostream_class->close_async       = g_tls_connection_gnutls_close_async;
155   iostream_class->close_finish      = g_tls_connection_gnutls_close_finish;
156
157   g_object_class_override_property (gobject_class, PROP_BASE_IO_STREAM, "base-io-stream");
158   g_object_class_override_property (gobject_class, PROP_REQUIRE_CLOSE_NOTIFY, "require-close-notify");
159   g_object_class_override_property (gobject_class, PROP_REHANDSHAKE_MODE, "rehandshake-mode");
160   g_object_class_override_property (gobject_class, PROP_USE_SYSTEM_CERTDB, "use-system-certdb");
161   g_object_class_override_property (gobject_class, PROP_CERTIFICATE, "certificate");
162   g_object_class_override_property (gobject_class, PROP_PEER_CERTIFICATE, "peer-certificate");
163   g_object_class_override_property (gobject_class, PROP_PEER_CERTIFICATE_ERRORS, "peer-certificate-errors");
164 }
165
166 static void
167 g_tls_connection_gnutls_initable_iface_init (GInitableIface *iface)
168 {
169   iface->init = g_tls_connection_gnutls_initable_init;
170 }
171
172 static void
173 g_tls_connection_gnutls_init (GTlsConnectionGnutls *gnutls)
174 {
175   gnutls->priv = G_TYPE_INSTANCE_GET_PRIVATE (gnutls, G_TYPE_TLS_CONNECTION_GNUTLS, GTlsConnectionGnutlsPrivate);
176
177   gnutls_certificate_allocate_credentials (&gnutls->priv->creds);
178   gnutls_certificate_set_verify_flags (gnutls->priv->creds,
179                                        GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT);
180
181   gnutls->priv->need_handshake = TRUE;
182 }
183
184 static gnutls_priority_t priorities[2][2];
185
186 static void
187 g_tls_connection_gnutls_init_priorities (void)
188 {
189   /* First field is "ssl3 only", second is "allow unsafe rehandshaking" */
190
191   gnutls_priority_init (&priorities[FALSE][FALSE],
192                         "NORMAL",
193                         NULL);
194   gnutls_priority_init (&priorities[TRUE][FALSE],
195                         "NORMAL:!VERS-TLS1.2:!VERS-TLS1.1:!VERS-TLS1.0",
196                         NULL);
197   gnutls_priority_init (&priorities[FALSE][TRUE],
198                         "NORMAL:%UNSAFE_RENEGOTIATION",
199                         NULL);
200   gnutls_priority_init (&priorities[TRUE][TRUE],
201                         "NORMAL:!VERS-TLS1.2:!VERS-TLS1.1:!VERS-TLS1.0:%UNSAFE_RENEGOTIATION",
202                         NULL);
203 }
204
205 static void
206 g_tls_connection_gnutls_set_handshake_priority (GTlsConnectionGnutls *gnutls)
207 {
208   gboolean use_ssl3, unsafe_rehandshake;
209
210   if (G_IS_TLS_CLIENT_CONNECTION (gnutls))
211     use_ssl3 = g_tls_client_connection_get_use_ssl3 (G_TLS_CLIENT_CONNECTION (gnutls));
212   else
213     use_ssl3 = FALSE;
214   unsafe_rehandshake = (gnutls->priv->rehandshake_mode == G_TLS_REHANDSHAKE_UNSAFELY);
215   gnutls_priority_set (gnutls->priv->session,
216                        priorities[use_ssl3][unsafe_rehandshake]);
217 }
218
219 static gboolean
220 g_tls_connection_gnutls_initable_init (GInitable     *initable,
221                                        GCancellable  *cancellable,
222                                        GError       **error)
223 {
224   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (initable);
225   int status;
226
227   g_return_val_if_fail (gnutls->priv->base_istream != NULL &&
228                         gnutls->priv->base_ostream != NULL, FALSE);
229
230   /* Make sure gnutls->priv->session has been initialized (it may have
231    * already been initialized by a construct-time property setter).
232    */
233   g_tls_connection_gnutls_get_session (gnutls);
234
235   status = gnutls_credentials_set (gnutls->priv->session,
236                                    GNUTLS_CRD_CERTIFICATE,
237                                    gnutls->priv->creds);
238   if (status != 0)
239     {
240       g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
241                    _("Could not create TLS connection: %s"),
242                    gnutls_strerror (status));
243       return FALSE;
244     }
245
246   gnutls_transport_set_push_function (gnutls->priv->session,
247                                       g_tls_connection_gnutls_push_func);
248   gnutls_transport_set_pull_function (gnutls->priv->session,
249                                       g_tls_connection_gnutls_pull_func);
250   gnutls_transport_set_ptr (gnutls->priv->session, gnutls);
251
252   gnutls->priv->tls_istream = g_tls_input_stream_gnutls_new (gnutls);
253   gnutls->priv->tls_ostream = g_tls_output_stream_gnutls_new (gnutls);
254
255   return TRUE;
256 }
257
258 static void
259 g_tls_connection_gnutls_finalize (GObject *object)
260 {
261   GTlsConnectionGnutls *connection = G_TLS_CONNECTION_GNUTLS (object);
262
263   if (connection->priv->base_io_stream)
264     g_object_unref (connection->priv->base_io_stream);
265
266   if (connection->priv->session)
267     gnutls_deinit (connection->priv->session);
268
269   if (connection->priv->tls_istream)
270     g_object_unref (connection->priv->tls_istream);
271   if (connection->priv->tls_ostream) 
272     g_object_unref (connection->priv->tls_ostream);
273
274   if (connection->priv->creds)
275     gnutls_certificate_free_credentials (connection->priv->creds);
276
277   if (connection->priv->certificate)
278     g_object_unref (connection->priv->certificate);
279   if (connection->priv->peer_certificate)
280     g_object_unref (connection->priv->peer_certificate);
281
282   if (connection->priv->error)
283     g_error_free (connection->priv->error);
284
285   G_OBJECT_CLASS (g_tls_connection_gnutls_parent_class)->finalize (object);
286 }
287
288 static void
289 g_tls_connection_gnutls_get_property (GObject    *object,
290                                       guint       prop_id,
291                                       GValue     *value,
292                                       GParamSpec *pspec)
293 {
294   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (object);
295
296   switch (prop_id)
297     {
298     case PROP_BASE_IO_STREAM:
299       g_value_set_object (value, gnutls->priv->base_io_stream);
300       break;
301
302     case PROP_REQUIRE_CLOSE_NOTIFY:
303       g_value_set_boolean (value, gnutls->priv->require_close_notify);
304       break;
305
306     case PROP_REHANDSHAKE_MODE:
307       g_value_set_enum (value, gnutls->priv->rehandshake_mode);
308       break;
309
310     case PROP_USE_SYSTEM_CERTDB:
311       g_value_set_boolean (value, gnutls->priv->use_system_certdb);
312       break;
313
314     case PROP_CERTIFICATE:
315       g_value_set_object (value, gnutls->priv->certificate);
316       break;
317
318     case PROP_PEER_CERTIFICATE:
319       g_value_set_object (value, gnutls->priv->peer_certificate);
320       break;
321
322     case PROP_PEER_CERTIFICATE_ERRORS:
323       g_value_set_flags (value, gnutls->priv->peer_certificate_errors);
324       break;
325
326     default:
327       G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
328     }
329 }
330
331 static void
332 g_tls_connection_gnutls_set_property (GObject      *object,
333                                       guint         prop_id,
334                                       const GValue *value,
335                                       GParamSpec   *pspec)
336 {
337   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (object);
338   GInputStream *istream;
339   GOutputStream *ostream;
340
341   switch (prop_id)
342     {
343     case PROP_BASE_IO_STREAM:
344       if (gnutls->priv->base_io_stream)
345         {
346           g_object_unref (gnutls->priv->base_io_stream);
347           gnutls->priv->base_istream = NULL;
348           gnutls->priv->base_ostream = NULL;
349         }
350       gnutls->priv->base_io_stream = g_value_dup_object (value);
351       if (!gnutls->priv->base_io_stream)
352         return;
353
354       istream = g_io_stream_get_input_stream (gnutls->priv->base_io_stream);
355       ostream = g_io_stream_get_output_stream (gnutls->priv->base_io_stream);
356
357       if (G_IS_POLLABLE_INPUT_STREAM (istream) &&
358           g_pollable_input_stream_can_poll (G_POLLABLE_INPUT_STREAM (istream)))
359         gnutls->priv->base_istream = G_POLLABLE_INPUT_STREAM (istream);
360       if (G_IS_POLLABLE_OUTPUT_STREAM (ostream) &&
361           g_pollable_output_stream_can_poll (G_POLLABLE_OUTPUT_STREAM (ostream)))
362         gnutls->priv->base_ostream = G_POLLABLE_OUTPUT_STREAM (ostream);
363       break;
364
365     case PROP_REQUIRE_CLOSE_NOTIFY:
366       gnutls->priv->require_close_notify = g_value_get_boolean (value);
367       break;
368
369     case PROP_REHANDSHAKE_MODE:
370       gnutls->priv->rehandshake_mode = g_value_get_enum (value);
371       break;
372
373     case PROP_USE_SYSTEM_CERTDB:
374       gnutls->priv->use_system_certdb = g_value_get_boolean (value);
375
376       gnutls_certificate_free_cas (gnutls->priv->creds);
377       if (gnutls->priv->use_system_certdb)
378         {
379           gnutls_x509_crt_t *cas;
380           int num_cas;
381
382           g_tls_backend_gnutls_get_system_ca_list_gnutls (&cas, &num_cas);
383           gnutls_certificate_set_x509_trust (gnutls->priv->creds, cas, num_cas);
384         }
385       break;
386
387     case PROP_CERTIFICATE:
388       if (gnutls->priv->certificate)
389         g_object_unref (gnutls->priv->certificate);
390       gnutls->priv->certificate = g_value_dup_object (value);
391       break;
392
393     default:
394       G_OBJECT_WARN_INVALID_PROPERTY_ID (object, prop_id, pspec);
395     }
396 }
397
398 gnutls_certificate_credentials
399 g_tls_connection_gnutls_get_credentials (GTlsConnectionGnutls *gnutls)
400 {
401   return gnutls->priv->creds;
402 }
403
404 gnutls_session
405 g_tls_connection_gnutls_get_session (GTlsConnectionGnutls *gnutls)
406 {
407   /* Ideally we would initialize gnutls->priv->session from
408    * g_tls_connection_gnutls_init(), but we can't tell if it's a
409    * client or server connection at that point... And
410    * g_tls_connection_gnutls_initiable_init() is too late, because
411    * construct-time property setters may need to modify it.
412    */
413   if (!gnutls->priv->session)
414     {
415       gboolean client = G_IS_TLS_CLIENT_CONNECTION (gnutls);
416       gnutls_init (&gnutls->priv->session, client ? GNUTLS_CLIENT : GNUTLS_SERVER);
417     }
418
419   return gnutls->priv->session;
420 }
421
422 void
423 g_tls_connection_gnutls_get_certificate (GTlsConnectionGnutls *gnutls,
424                                          gnutls_retr_st       *st)
425 {
426   GTlsCertificate *cert;
427
428   cert = g_tls_connection_get_certificate (G_TLS_CONNECTION (gnutls));
429
430   st->type = GNUTLS_CRT_X509;
431   if (cert)
432     {
433       GTlsCertificateGnutls *gnutlscert = G_TLS_CERTIFICATE_GNUTLS (cert);
434
435       st->ncerts = 1;
436       st->cert.x509 = gnutls_malloc (sizeof (gnutls_x509_crt_t));
437       st->cert.x509[0] = g_tls_certificate_gnutls_copy_cert (gnutlscert);
438       st->key.x509 = g_tls_certificate_gnutls_copy_key (gnutlscert);
439       st->deinit_all = TRUE;
440     }
441   else
442     st->ncerts = 0;
443 }
444
445 GTlsCertificateFlags
446 g_tls_connection_gnutls_validate_peer (GTlsConnectionGnutls *gnutls)
447 {
448   int status;
449
450   status = gnutls_certificate_verify_peers (gnutls->priv->session);
451   return g_tls_certificate_gnutls_convert_flags (status);
452 }
453
454 static void
455 begin_gnutls_io (GTlsConnectionGnutls  *gnutls,
456                  gboolean               blocking,
457                  GCancellable          *cancellable)
458 {
459   gnutls->priv->blocking = blocking;
460   gnutls->priv->cancellable = cancellable;
461   gnutls->priv->internal_direction = 0;
462   g_clear_error (&gnutls->priv->error);
463 }
464
465 static int
466 end_gnutls_io (GTlsConnectionGnutls  *gnutls,
467                int                    status,
468                const char            *generic_error,
469                GError               **error)
470 {
471   gnutls->priv->cancellable = NULL;
472
473   if (status >= 0)
474     {
475       g_clear_error (&gnutls->priv->error);
476       return status;
477     }
478
479   if (gnutls->priv->handshaking && !gnutls->priv->ever_handshaked)
480     {
481       if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_FAILED) ||
482           status == GNUTLS_E_UNEXPECTED_PACKET_LENGTH ||
483           status == GNUTLS_E_FATAL_ALERT_RECEIVED ||
484           status == GNUTLS_E_UNSUPPORTED_VERSION_PACKET)
485         {
486           g_clear_error (&gnutls->priv->error);
487           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_NOT_TLS,
488                                _("Peer failed to perform TLS handshake"));
489           return GNUTLS_E_PULL_ERROR;
490         }
491     }
492
493   if (gnutls->priv->error)
494     {
495       if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
496         status = GNUTLS_E_AGAIN;
497       g_propagate_error (error, gnutls->priv->error);
498       gnutls->priv->error = NULL;
499       return status;
500     }
501   else if (status == GNUTLS_E_REHANDSHAKE)
502     {
503       if (gnutls->priv->rehandshake_mode == G_TLS_REHANDSHAKE_NEVER)
504         {
505           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
506                                _("Peer requested illegal TLS rehandshake"));
507           return GNUTLS_E_PULL_ERROR;
508         }
509
510       gnutls->priv->need_handshake = TRUE;
511       return status;
512     }
513   else if (status == GNUTLS_E_UNEXPECTED_PACKET_LENGTH)
514     {
515       if (gnutls->priv->eof)
516         {
517           if (gnutls->priv->require_close_notify)
518             {
519               g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_EOF,
520                                    _("TLS connection closed unexpectedly"));
521               return status;
522             }
523           else
524             return 0;
525         }
526     }
527
528   g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
529                generic_error, gnutls_strerror (status));
530   return status;
531 }
532
533 #define BEGIN_GNUTLS_IO(gnutls, blocking, cancellable)  \
534   begin_gnutls_io (gnutls, blocking, cancellable);      \
535   do {
536
537 #define END_GNUTLS_IO(gnutls, ret, errmsg, error)       \
538   } while ((ret == GNUTLS_E_AGAIN ||                    \
539             ret == GNUTLS_E_WARNING_ALERT_RECEIVED) &&  \
540            !gnutls->priv->error);                       \
541   ret = end_gnutls_io (gnutls, ret, errmsg, error)
542
543 gboolean
544 g_tls_connection_gnutls_check (GTlsConnectionGnutls  *gnutls,
545                                GIOCondition           condition)
546 {
547   if (gnutls->priv->handshaking || gnutls->priv->closing)
548     condition = gnutls->priv->internal_direction;
549
550   if (condition & G_IO_IN)
551     return g_pollable_input_stream_is_readable (gnutls->priv->base_istream);
552   else
553     return g_pollable_output_stream_is_writable (gnutls->priv->base_ostream);
554 }
555
556 typedef struct {
557   GSource source;
558
559   GTlsConnectionGnutls *gnutls;
560   GObject              *stream;
561
562   GSource              *child_source;
563   GIOCondition          base_direction;
564   GIOCondition          current_direction;
565 } GTlsConnectionGnutlsSource;
566
567 static gboolean
568 gnutls_source_prepare (GSource *source,
569                        gint    *timeout)
570 {
571   *timeout = -1;
572   return FALSE;
573 }
574
575 static gboolean
576 gnutls_source_check (GSource *source)
577 {
578   return FALSE;
579 }
580
581 static void
582 gnutls_source_sync_child_source (GTlsConnectionGnutlsSource *gnutls_source,
583                                  GIOCondition                direction)
584 {
585   GTlsConnectionGnutls *gnutls = gnutls_source->gnutls;
586   GSource *source = (GSource *)gnutls_source;
587
588   if (direction == gnutls_source->current_direction)
589     return;
590
591   if (gnutls_source->child_source)
592     {
593       g_source_remove_child_source (source, gnutls_source->child_source);
594       g_source_unref (gnutls_source->child_source);
595     }
596
597   if (direction & G_IO_IN)
598     gnutls_source->child_source = g_pollable_input_stream_create_source (gnutls->priv->base_istream, NULL);
599   else
600     gnutls_source->child_source = g_pollable_output_stream_create_source (gnutls->priv->base_ostream, NULL);
601
602   g_source_set_dummy_callback (gnutls_source->child_source);
603   g_source_add_child_source (source, gnutls_source->child_source);
604   gnutls_source->current_direction = direction;
605 }
606
607 static gboolean
608 gnutls_source_dispatch (GSource     *source,
609                         GSourceFunc  callback,
610                         gpointer     user_data)
611 {
612   GPollableSourceFunc func = (GPollableSourceFunc)callback;
613   GTlsConnectionGnutlsSource *gnutls_source = (GTlsConnectionGnutlsSource *)source;
614   GTlsConnectionGnutls *gnutls = gnutls_source->gnutls;
615   gboolean ret;
616
617   ret = (*func) (gnutls_source->stream, user_data);
618   if (ret)
619     {
620       GIOCondition direction = gnutls->priv->internal_direction ? gnutls->priv->internal_direction : gnutls_source->base_direction;
621
622       gnutls_source_sync_child_source (gnutls_source, direction);
623     }
624
625   return ret;
626 }
627
628 static void
629 gnutls_source_finalize (GSource *source)
630 {
631   GTlsConnectionGnutlsSource *gnutls_source = (GTlsConnectionGnutlsSource *)source;
632
633   g_object_unref (gnutls_source->gnutls);
634
635   if (gnutls_source->child_source)
636     g_source_unref (gnutls_source->child_source);
637 }
638
639 static gboolean
640 g_tls_connection_gnutls_source_closure_callback (GObject  *stream,
641                                                  gpointer  data)
642 {
643   GClosure *closure = data;
644
645   GValue param = { 0, };
646   GValue result_value = { 0, };
647   gboolean result;
648
649   g_value_init (&result_value, G_TYPE_BOOLEAN);
650
651   g_value_init (&param, G_TYPE_OBJECT);
652   g_value_set_object (&param, stream);
653
654   g_closure_invoke (closure, &result_value, 1, &param, NULL);
655
656   result = g_value_get_boolean (&result_value);
657   g_value_unset (&result_value);
658   g_value_unset (&param);
659
660   return result;
661 }
662
663 static GSourceFuncs gnutls_source_funcs =
664 {
665   gnutls_source_prepare,
666   gnutls_source_check,
667   gnutls_source_dispatch,
668   gnutls_source_finalize,
669   (GSourceFunc)g_tls_connection_gnutls_source_closure_callback,
670   (GSourceDummyMarshal)_gnutls_marshal_BOOLEAN__VOID,
671 };
672
673 GSource *
674 g_tls_connection_gnutls_create_source (GTlsConnectionGnutls  *gnutls,
675                                        GIOCondition           condition,
676                                        GCancellable          *cancellable)
677 {
678   GSource *source, *cancellable_source;
679   GTlsConnectionGnutlsSource *gnutls_source;
680
681   source = g_source_new (&gnutls_source_funcs, sizeof (GTlsConnectionGnutlsSource));
682   g_source_set_name (source, "GTlsConnectionGnutlsSource");
683   gnutls_source = (GTlsConnectionGnutlsSource *)source;
684   gnutls_source->gnutls = g_object_ref (gnutls);
685   gnutls_source->base_direction = condition & (G_IO_IN | G_IO_OUT);
686   if (gnutls_source->base_direction == G_IO_IN)
687     gnutls_source->stream = G_OBJECT (gnutls->priv->tls_istream);
688   else if (gnutls_source->base_direction == G_IO_OUT)
689     gnutls_source->stream = G_OBJECT (gnutls->priv->tls_ostream);
690   else
691     {
692       gnutls_source->base_direction = gnutls->priv->internal_direction;
693       gnutls_source->stream = NULL;
694     }
695   gnutls_source_sync_child_source (gnutls_source, gnutls_source->base_direction);
696
697   if (cancellable)
698     {
699       cancellable_source = g_cancellable_source_new (cancellable);
700       g_source_set_dummy_callback (cancellable_source);
701       g_source_add_child_source (source, cancellable_source);
702       g_source_unref (cancellable_source);
703     }
704
705   return source;
706 }
707
708 static void
709 set_gnutls_error (GTlsConnectionGnutls *gnutls, GIOCondition direction)
710 {
711   if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_CANCELLED))
712     gnutls_transport_set_errno (gnutls->priv->session, EINTR);
713   else if (g_error_matches (gnutls->priv->error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
714     {
715       gnutls_transport_set_errno (gnutls->priv->session, EAGAIN);
716       gnutls->priv->internal_direction = direction;
717     }
718   else
719     gnutls_transport_set_errno (gnutls->priv->session, EIO);
720 }
721
722 static ssize_t
723 g_tls_connection_gnutls_pull_func (gnutls_transport_ptr_t  transport_data,
724                                    void                   *buf,
725                                    size_t                  buflen)
726 {
727   GTlsConnectionGnutls *gnutls = transport_data;
728   ssize_t ret;
729
730   /* If gnutls->priv->error is non-%NULL when we're called, it means
731    * that an error previously occurred, but gnutls decided not to
732    * propagate it. So it's correct for us to just clear it. (Usually
733    * this means it ignored an EAGAIN after a short read, and now
734    * we'll return EAGAIN again, which it will obey this time.)
735    */
736   g_clear_error (&gnutls->priv->error);
737
738   if (gnutls->priv->blocking)
739     {
740       ret = g_input_stream_read (G_INPUT_STREAM (gnutls->priv->base_istream),
741                                  buf, buflen,
742                                  gnutls->priv->cancellable,
743                                  &gnutls->priv->error);
744     }
745   else
746     {
747       ret = g_pollable_input_stream_read_nonblocking (gnutls->priv->base_istream,
748                                                       buf, buflen,
749                                                       gnutls->priv->cancellable,
750                                                       &gnutls->priv->error);
751     }
752
753   if (ret < 0)
754     set_gnutls_error (gnutls, G_IO_IN);
755   else if (ret == 0)
756     gnutls->priv->eof = TRUE;
757
758   return ret;
759 }
760
761 static ssize_t
762 g_tls_connection_gnutls_push_func (gnutls_transport_ptr_t  transport_data,
763                                    const void             *buf,
764                                    size_t                  buflen)
765 {
766   GTlsConnectionGnutls *gnutls = transport_data;
767   ssize_t ret;
768
769   /* See comment in pull_func. */
770   g_clear_error (&gnutls->priv->error);
771
772   if (gnutls->priv->blocking)
773     {
774       ret = g_output_stream_write (G_OUTPUT_STREAM (gnutls->priv->base_ostream),
775                                    buf, buflen,
776                                    gnutls->priv->cancellable,
777                                    &gnutls->priv->error);
778     }
779   else
780     {
781       ret = g_pollable_output_stream_write_nonblocking (gnutls->priv->base_ostream,
782                                                         buf, buflen,
783                                                         gnutls->priv->cancellable,
784                                                         &gnutls->priv->error);
785     }
786   if (ret < 0)
787     set_gnutls_error (gnutls, G_IO_OUT);
788
789   return ret;
790 }
791
792 static gboolean
793 handshake_internal (GTlsConnectionGnutls  *gnutls,
794                     gboolean               blocking,
795                     GCancellable          *cancellable,
796                     GError               **error)
797 {
798   GTlsCertificate *peer_certificate;
799   GTlsCertificateFlags peer_certificate_errors;
800   int ret;
801
802   if (G_IS_TLS_SERVER_CONNECTION_GNUTLS (gnutls) &&
803       gnutls->priv->ever_handshaked && !gnutls->priv->need_handshake)
804     {
805       BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
806       ret = gnutls_rehandshake (gnutls->priv->session);
807       END_GNUTLS_IO (gnutls, ret, _("Error performing TLS handshake: %s"), error);
808
809       if (ret != 0)
810         return FALSE;
811     }
812
813   if (!gnutls->priv->handshaking)
814     {
815       gnutls->priv->handshaking = TRUE;
816
817       if (gnutls->priv->peer_certificate)
818         {
819           g_object_unref (gnutls->priv->peer_certificate);
820           gnutls->priv->peer_certificate = NULL;
821           gnutls->priv->peer_certificate_errors = 0;
822
823           g_object_notify (G_OBJECT (gnutls), "peer-certificate");
824           g_object_notify (G_OBJECT (gnutls), "peer-certificate-errors");
825         }
826
827       g_tls_connection_gnutls_set_handshake_priority (gnutls);
828       G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->begin_handshake (gnutls);
829     }
830
831   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
832   ret = gnutls_handshake (gnutls->priv->session);
833   END_GNUTLS_IO (gnutls, ret, _("Error performing TLS handshake: %s"), error);
834
835   if (ret == GNUTLS_E_AGAIN)
836     return FALSE;
837
838   gnutls->priv->handshaking = FALSE;
839   gnutls->priv->need_handshake = FALSE;
840   gnutls->priv->ever_handshaked = TRUE;
841
842   if (ret == 0 &&
843       gnutls_certificate_type_get (gnutls->priv->session) == GNUTLS_CRT_X509)
844     {
845       GTlsCertificate *chain, *cert;
846       const gnutls_datum_t *certs;
847       unsigned int num_certs;
848       int i;
849
850       certs = gnutls_certificate_get_peers (gnutls->priv->session, &num_certs);
851       chain = NULL;
852       if (certs)
853         {
854           for (i = num_certs - 1; i >= 0; i--)
855             {
856               cert = g_tls_certificate_gnutls_new (&certs[i], chain);
857               chain = cert;
858             }
859         }
860
861       peer_certificate = chain;
862     }
863   else
864     peer_certificate = NULL;
865
866   if (peer_certificate)
867     {
868       if (!G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->verify_peer (gnutls, peer_certificate, &peer_certificate_errors))
869         {
870           g_object_unref (peer_certificate);
871           g_set_error_literal (error, G_TLS_ERROR, G_TLS_ERROR_BAD_CERTIFICATE,
872                                _("Unacceptable TLS certificate"));
873           return FALSE;
874         }
875     }
876
877   G_TLS_CONNECTION_GNUTLS_GET_CLASS (gnutls)->finish_handshake (gnutls, error);
878
879   if (ret == 0)
880     {
881       gnutls->priv->peer_certificate = peer_certificate;
882       gnutls->priv->peer_certificate_errors = peer_certificate_errors;
883
884       g_object_notify (G_OBJECT (gnutls), "peer-certificate");
885       g_object_notify (G_OBJECT (gnutls), "peer-certificate-errors");
886
887       return TRUE;
888     }
889   else
890     return FALSE;
891 }
892
893 static gboolean
894 handshake_in_progress_or_failed (GTlsConnectionGnutls  *gnutls,
895                                  gboolean               blocking,
896                                  GCancellable          *cancellable,
897                                  GError               **error)
898 {
899   if (!(gnutls->priv->need_handshake || gnutls->priv->handshaking))
900     return FALSE;
901
902   return !handshake_internal (gnutls, blocking, cancellable, error);
903 }
904
905 static gboolean
906 g_tls_connection_gnutls_handshake (GTlsConnection   *conn,
907                                    GCancellable     *cancellable,
908                                    GError          **error)
909 {
910   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (conn);
911
912   return handshake_internal (gnutls, TRUE, cancellable, error);
913 }
914
915 static gboolean
916 g_tls_connection_gnutls_handshake_ready (GObject  *pollable_stream,
917                                          gpointer  user_data)
918 {
919   GTlsConnectionGnutls *gnutls;
920   GSimpleAsyncResult *simple = user_data;
921   gboolean success;
922   GError *error = NULL;
923
924   gnutls = G_TLS_CONNECTION_GNUTLS (g_async_result_get_source_object (G_ASYNC_RESULT (simple)));
925   g_object_unref (gnutls);
926
927   success = handshake_internal (gnutls, FALSE, NULL, &error);
928   if (!success && g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
929     {
930       g_error_free (error);
931       return TRUE;
932     }
933
934   if (error)
935     {
936       g_simple_async_result_set_from_error (simple, error);
937       g_error_free (error);
938     }
939   else
940     g_simple_async_result_set_op_res_gboolean (simple, success);
941   g_simple_async_result_complete (simple);
942   g_object_unref (simple);
943
944   return FALSE;
945 }
946
947 static void
948 g_tls_connection_gnutls_handshake_async (GTlsConnection       *conn,
949                                          int                   io_priority,
950                                          GCancellable         *cancellable,
951                                          GAsyncReadyCallback   callback,
952                                          gpointer              user_data)
953 {
954   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (conn);
955   GSimpleAsyncResult *simple;
956   gboolean success;
957   GError *error = NULL;
958   GSource *source;
959
960   simple = g_simple_async_result_new (G_OBJECT (conn), callback, user_data,
961                                       g_tls_connection_gnutls_handshake_async);
962   success = handshake_internal (gnutls, FALSE, cancellable, &error);
963   if (success)
964     {
965       g_simple_async_result_set_op_res_gboolean (simple, TRUE);
966       g_simple_async_result_complete_in_idle (simple);
967       g_object_unref (simple);
968     }
969   else if (!g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
970     {
971       g_simple_async_result_set_from_error (simple, error);
972       g_error_free (error);
973       g_simple_async_result_complete_in_idle (simple);
974       g_object_unref (simple);
975     }
976
977   source = g_tls_connection_gnutls_create_source (gnutls, 0, cancellable);
978   g_source_set_callback (source,
979                          (GSourceFunc) g_tls_connection_gnutls_handshake_ready,
980                          simple, NULL);
981   g_source_set_priority (source, io_priority);
982   g_source_attach (source, g_main_context_get_thread_default ());
983   g_source_unref (source);
984 }
985
986 static gboolean
987 g_tls_connection_gnutls_handshake_finish (GTlsConnection       *conn,
988                                           GAsyncResult         *result,
989                                           GError              **error)
990 {
991   GSimpleAsyncResult *simple;
992
993   g_return_val_if_fail (g_simple_async_result_is_valid (result, G_OBJECT (conn), g_tls_connection_gnutls_handshake_async), FALSE);
994
995   simple = G_SIMPLE_ASYNC_RESULT (result);
996
997   if (g_simple_async_result_propagate_error (simple, error))
998     return FALSE;
999
1000   return g_simple_async_result_get_op_res_gboolean (simple);
1001 }
1002
1003 gssize
1004 g_tls_connection_gnutls_read (GTlsConnectionGnutls  *gnutls,
1005                               void                  *buffer,
1006                               gsize                  count,
1007                               gboolean               blocking,
1008                               GCancellable          *cancellable,
1009                               GError               **error)
1010 {
1011   gssize ret;
1012
1013  again:
1014   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1015     return -1;
1016
1017   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1018   ret = gnutls_record_recv (gnutls->priv->session, buffer, count);
1019   END_GNUTLS_IO (gnutls, ret, _("Error reading data from TLS socket: %s"), error);
1020
1021   if (ret >= 0)
1022     return ret;
1023   else if (ret == GNUTLS_E_REHANDSHAKE)
1024     goto again;
1025   else
1026     return -1;
1027 }
1028
1029 gssize
1030 g_tls_connection_gnutls_write (GTlsConnectionGnutls  *gnutls,
1031                                const void            *buffer,
1032                                gsize                  count,
1033                                gboolean               blocking,
1034                                GCancellable          *cancellable,
1035                                GError               **error)
1036 {
1037   gssize ret;
1038
1039  again:
1040   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1041     return -1;
1042
1043   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1044   ret = gnutls_record_send (gnutls->priv->session, buffer, count);
1045   END_GNUTLS_IO (gnutls, ret, _("Error writing data to TLS socket: %s"), error);
1046
1047   if (ret >= 0)
1048     return ret;
1049   else if (ret == GNUTLS_E_REHANDSHAKE)
1050     goto again;
1051   else
1052     return -1;
1053 }
1054
1055 static GInputStream  *
1056 g_tls_connection_gnutls_get_input_stream (GIOStream *stream)
1057 {
1058   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1059
1060   return gnutls->priv->tls_istream;
1061 }
1062
1063 static GOutputStream *
1064 g_tls_connection_gnutls_get_output_stream (GIOStream *stream)
1065 {
1066   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1067
1068   return gnutls->priv->tls_ostream;
1069 }
1070
1071 static gboolean
1072 close_internal (GTlsConnectionGnutls  *gnutls,
1073                 gboolean               blocking,
1074                 GCancellable          *cancellable,
1075                 GError               **error)
1076 {
1077   int ret;
1078
1079   /* If we haven't finished the initial handshake yet, there's no
1080    * reason to finish it just so we can close.
1081    */
1082   if (gnutls->priv->handshaking && !gnutls->priv->ever_handshaked)
1083     return TRUE;
1084
1085   if (handshake_in_progress_or_failed (gnutls, blocking, cancellable, error))
1086     return FALSE;
1087
1088   gnutls->priv->closing = TRUE;
1089   BEGIN_GNUTLS_IO (gnutls, blocking, cancellable);
1090   ret = gnutls_bye (gnutls->priv->session, GNUTLS_SHUT_WR);
1091   END_GNUTLS_IO (gnutls, ret, _("Error performing TLS close: %s"), error);
1092   if (ret == 0 || !error || !g_error_matches (*error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1093     gnutls->priv->closing = FALSE;
1094
1095   return ret == 0;
1096 }
1097
1098 static gboolean
1099 g_tls_connection_gnutls_close (GIOStream     *stream,
1100                                GCancellable  *cancellable,
1101                                GError       **error)
1102 {
1103   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1104
1105   if (!close_internal (gnutls, TRUE, cancellable, error))
1106     return FALSE;
1107   return g_io_stream_close (gnutls->priv->base_io_stream,
1108                             cancellable, error);
1109 }
1110
1111 typedef struct {
1112   GSimpleAsyncResult *simple;
1113   GCancellable *cancellable;
1114   int io_priority;
1115 } AsyncCloseData;
1116
1117 static void
1118 close_base_stream_cb (GObject      *base_stream,
1119                       GAsyncResult *result,
1120                       gpointer      user_data)
1121 {
1122   gboolean success;
1123   GError *error = NULL;
1124   AsyncCloseData *acd = user_data;
1125
1126   success = g_io_stream_close_finish (G_IO_STREAM (base_stream),
1127                                       result, &error);
1128   if (success)
1129     g_simple_async_result_set_op_res_gboolean (acd->simple, TRUE);
1130   else
1131     {
1132       g_simple_async_result_set_from_error (acd->simple, error);
1133       g_error_free (error);
1134     }
1135
1136   g_simple_async_result_complete (acd->simple);
1137   g_object_unref (acd->simple);
1138   if (acd->cancellable)
1139     g_object_unref (acd->cancellable);
1140   g_slice_free (AsyncCloseData, acd);
1141 }
1142
1143 static gboolean
1144 g_tls_connection_gnutls_close_ready (GObject  *pollable_stream,
1145                                      gpointer  user_data)
1146 {
1147   GTlsConnectionGnutls *gnutls;
1148   AsyncCloseData *acd = user_data;
1149   gboolean success;
1150   GError *error = NULL;
1151
1152   gnutls = G_TLS_CONNECTION_GNUTLS (g_async_result_get_source_object (G_ASYNC_RESULT (acd->simple)));
1153   g_object_unref (gnutls);
1154
1155   success = close_internal (gnutls, FALSE, NULL, &error);
1156   if (!success && g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1157     {
1158       g_error_free (error);
1159       return TRUE;
1160     }
1161
1162   if (error)
1163     {
1164       g_simple_async_result_set_from_error (acd->simple, error);
1165       g_simple_async_result_complete (acd->simple);
1166       g_error_free (error);
1167       g_object_unref (acd->simple);
1168       if (acd->cancellable)
1169         g_object_unref (acd->cancellable);
1170       g_slice_free (AsyncCloseData, acd);
1171     }
1172   else
1173     {
1174       g_io_stream_close_async (gnutls->priv->base_io_stream,
1175                                acd->io_priority, acd->cancellable,
1176                                close_base_stream_cb, acd);
1177     }
1178
1179   return FALSE;
1180 }
1181
1182 static void
1183 g_tls_connection_gnutls_close_async (GIOStream           *stream,
1184                                      int                  io_priority,
1185                                      GCancellable        *cancellable,
1186                                      GAsyncReadyCallback  callback,
1187                                      gpointer             user_data)
1188 {
1189   GTlsConnectionGnutls *gnutls = G_TLS_CONNECTION_GNUTLS (stream);
1190   GSimpleAsyncResult *simple;
1191   gboolean success;
1192   GError *error = NULL;
1193   AsyncCloseData *acd;
1194   GSource *source;
1195
1196   simple = g_simple_async_result_new (G_OBJECT (stream), callback, user_data,
1197                                       g_tls_connection_gnutls_close_async);
1198
1199   success = close_internal (gnutls, FALSE, cancellable, &error);
1200   if (error && !g_error_matches (error, G_IO_ERROR, G_IO_ERROR_WOULD_BLOCK))
1201     {
1202       g_simple_async_result_set_from_error (simple, error);
1203       g_error_free (error);
1204       g_simple_async_result_complete_in_idle (simple);
1205       g_object_unref (simple);
1206     }
1207
1208   if (error)
1209     g_error_free (error);
1210
1211   acd = g_slice_new (AsyncCloseData);
1212   acd->simple = simple;
1213   acd->cancellable = g_object_ref (cancellable);
1214   acd->io_priority = io_priority;
1215
1216   if (success)
1217     {
1218       g_io_stream_close_async (gnutls->priv->base_io_stream,
1219                                io_priority, cancellable,
1220                                close_base_stream_cb, acd);
1221       return;
1222     }
1223
1224   source = g_tls_connection_gnutls_create_source (gnutls, 0, acd->cancellable);
1225   g_source_set_callback (source,
1226                          (GSourceFunc) g_tls_connection_gnutls_close_ready,
1227                          acd, NULL);
1228   g_source_set_priority (source, acd->io_priority);
1229   g_source_attach (source, g_main_context_get_thread_default ());
1230   g_source_unref (source);
1231 }
1232
1233 static gboolean
1234 g_tls_connection_gnutls_close_finish (GIOStream           *stream,
1235                                       GAsyncResult        *result,
1236                                       GError             **error)
1237 {
1238   GSimpleAsyncResult *simple;
1239
1240   g_return_val_if_fail (g_simple_async_result_is_valid (result, G_OBJECT (stream), g_tls_connection_gnutls_close_async), FALSE);
1241
1242   simple = G_SIMPLE_ASYNC_RESULT (result);
1243
1244   if (g_simple_async_result_propagate_error (simple, error))
1245     return FALSE;
1246
1247   return g_simple_async_result_get_op_res_gboolean (simple);
1248 }