blob: 988a8b2a4ecb39bd696d5ac4760c8322e7d132a0 [file] [log] [blame]
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +00001/* $Id$ */
2/*
3 * Copyright (C) 2009 Teluu Inc. (http://www.teluu.com)
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License as published by
7 * the Free Software Foundation; either version 2 of the License, or
8 * (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 */
19#include <pj/ssl_sock.h>
Nanang Izzuddin2fb937e2010-02-24 05:43:34 +000020#include <pj/assert.h>
Nanang Izzuddin006cc012009-10-16 03:06:13 +000021#include <pj/errno.h>
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +000022#include <pj/string.h>
23
Nanang Izzuddin006cc012009-10-16 03:06:13 +000024/* Cipher name structure */
25typedef struct cipher_name_t {
26 pj_ssl_cipher cipher;
27 const char *name;
28} cipher_name_t;
29
30/* Cipher name constants */
31static cipher_name_t cipher_names[] =
32{
33 {TLS_NULL_WITH_NULL_NULL, "NULL"},
34
35 /* TLS/SSLv3 */
36 {TLS_RSA_WITH_NULL_MD5, "TLS_RSA_WITH_NULL_MD5"},
37 {TLS_RSA_WITH_NULL_SHA, "TLS_RSA_WITH_NULL_SHA"},
38 {TLS_RSA_WITH_NULL_SHA256, "TLS_RSA_WITH_NULL_SHA256"},
39 {TLS_RSA_WITH_RC4_128_MD5, "TLS_RSA_WITH_RC4_128_MD5"},
40 {TLS_RSA_WITH_RC4_128_SHA, "TLS_RSA_WITH_RC4_128_SHA"},
41 {TLS_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_RSA_WITH_3DES_EDE_CBC_SHA"},
42 {TLS_RSA_WITH_AES_128_CBC_SHA, "TLS_RSA_WITH_AES_128_CBC_SHA"},
43 {TLS_RSA_WITH_AES_256_CBC_SHA, "TLS_RSA_WITH_AES_256_CBC_SHA"},
44 {TLS_RSA_WITH_AES_128_CBC_SHA256, "TLS_RSA_WITH_AES_128_CBC_SHA256"},
45 {TLS_RSA_WITH_AES_256_CBC_SHA256, "TLS_RSA_WITH_AES_256_CBC_SHA256"},
46 {TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA, "TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA"},
47 {TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA"},
48 {TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, "TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA"},
49 {TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA"},
50 {TLS_DH_DSS_WITH_AES_128_CBC_SHA, "TLS_DH_DSS_WITH_AES_128_CBC_SHA"},
51 {TLS_DH_RSA_WITH_AES_128_CBC_SHA, "TLS_DH_RSA_WITH_AES_128_CBC_SHA"},
52 {TLS_DHE_DSS_WITH_AES_128_CBC_SHA, "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"},
53 {TLS_DHE_RSA_WITH_AES_128_CBC_SHA, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"},
54 {TLS_DH_DSS_WITH_AES_256_CBC_SHA, "TLS_DH_DSS_WITH_AES_256_CBC_SHA"},
55 {TLS_DH_RSA_WITH_AES_256_CBC_SHA, "TLS_DH_RSA_WITH_AES_256_CBC_SHA"},
56 {TLS_DHE_DSS_WITH_AES_256_CBC_SHA, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"},
57 {TLS_DHE_RSA_WITH_AES_256_CBC_SHA, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"},
58 {TLS_DH_DSS_WITH_AES_128_CBC_SHA256, "TLS_DH_DSS_WITH_AES_128_CBC_SHA256"},
59 {TLS_DH_RSA_WITH_AES_128_CBC_SHA256, "TLS_DH_RSA_WITH_AES_128_CBC_SHA256"},
60 {TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"},
61 {TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"},
62 {TLS_DH_DSS_WITH_AES_256_CBC_SHA256, "TLS_DH_DSS_WITH_AES_256_CBC_SHA256"},
63 {TLS_DH_RSA_WITH_AES_256_CBC_SHA256, "TLS_DH_RSA_WITH_AES_256_CBC_SHA256"},
64 {TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"},
65 {TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"},
66 {TLS_DH_anon_WITH_RC4_128_MD5, "TLS_DH_anon_WITH_RC4_128_MD5"},
67 {TLS_DH_anon_WITH_3DES_EDE_CBC_SHA, "TLS_DH_anon_WITH_3DES_EDE_CBC_SHA"},
68 {TLS_DH_anon_WITH_AES_128_CBC_SHA, "TLS_DH_anon_WITH_AES_128_CBC_SHA"},
69 {TLS_DH_anon_WITH_AES_256_CBC_SHA, "TLS_DH_anon_WITH_AES_256_CBC_SHA"},
70 {TLS_DH_anon_WITH_AES_128_CBC_SHA256, "TLS_DH_anon_WITH_AES_128_CBC_SHA256"},
71 {TLS_DH_anon_WITH_AES_256_CBC_SHA256, "TLS_DH_anon_WITH_AES_256_CBC_SHA256"},
72
73 /* TLS (deprecated) */
74 {TLS_RSA_EXPORT_WITH_RC4_40_MD5, "TLS_RSA_EXPORT_WITH_RC4_40_MD5"},
75 {TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5, "TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5"},
76 {TLS_RSA_WITH_IDEA_CBC_SHA, "TLS_RSA_WITH_IDEA_CBC_SHA"},
77 {TLS_RSA_EXPORT_WITH_DES40_CBC_SHA, "TLS_RSA_EXPORT_WITH_DES40_CBC_SHA"},
78 {TLS_RSA_WITH_DES_CBC_SHA, "TLS_RSA_WITH_DES_CBC_SHA"},
79 {TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA, "TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA"},
80 {TLS_DH_DSS_WITH_DES_CBC_SHA, "TLS_DH_DSS_WITH_DES_CBC_SHA"},
81 {TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA, "TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA"},
82 {TLS_DH_RSA_WITH_DES_CBC_SHA, "TLS_DH_RSA_WITH_DES_CBC_SHA"},
83 {TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, "TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA"},
84 {TLS_DHE_DSS_WITH_DES_CBC_SHA, "TLS_DHE_DSS_WITH_DES_CBC_SHA"},
85 {TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, "TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA"},
86 {TLS_DHE_RSA_WITH_DES_CBC_SHA, "TLS_DHE_RSA_WITH_DES_CBC_SHA"},
87 {TLS_DH_anon_EXPORT_WITH_RC4_40_MD5, "TLS_DH_anon_EXPORT_WITH_RC4_40_MD5"},
88 {TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA, "TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA"},
89 {TLS_DH_anon_WITH_DES_CBC_SHA, "TLS_DH_anon_WITH_DES_CBC_SHA"},
90
91 /* SSLv3 */
92 {SSL_FORTEZZA_KEA_WITH_NULL_SHA, "SSL_FORTEZZA_KEA_WITH_NULL_SHA"},
93 {SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA,"SSL_FORTEZZA_KEA_WITH_FORTEZZA_CBC_SHA"},
94 {SSL_FORTEZZA_KEA_WITH_RC4_128_SHA, "SSL_FORTEZZA_KEA_WITH_RC4_128_SHA"},
95
96 /* SSLv2 */
97 {SSL_CK_RC4_128_WITH_MD5, "SSL_CK_RC4_128_WITH_MD5"},
98 {SSL_CK_RC4_128_EXPORT40_WITH_MD5, "SSL_CK_RC4_128_EXPORT40_WITH_MD5"},
99 {SSL_CK_RC2_128_CBC_WITH_MD5, "SSL_CK_RC2_128_CBC_WITH_MD5"},
100 {SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5, "SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5"},
101 {SSL_CK_IDEA_128_CBC_WITH_MD5, "SSL_CK_IDEA_128_CBC_WITH_MD5"},
102 {SSL_CK_DES_64_CBC_WITH_MD5, "SSL_CK_DES_64_CBC_WITH_MD5"},
103 {SSL_CK_DES_192_EDE3_CBC_WITH_MD5, "SSL_CK_DES_192_EDE3_CBC_WITH_MD5"}
104};
105
106
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +0000107/*
108 * Initialize the SSL socket configuration with the default values.
109 */
Nanang Izzuddin006cc012009-10-16 03:06:13 +0000110PJ_DEF(void) pj_ssl_sock_param_default(pj_ssl_sock_param *param)
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +0000111{
112 pj_bzero(param, sizeof(*param));
113
114 /* Socket config */
115 param->sock_af = PJ_AF_INET;
116 param->sock_type = pj_SOCK_STREAM();
117 param->async_cnt = 1;
118 param->concurrency = -1;
119 param->whole_data = PJ_TRUE;
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +0000120 param->send_buffer_size = 8192;
Nanang Izzuddin006cc012009-10-16 03:06:13 +0000121#if !defined(PJ_SYMBIAN) || PJ_SYMBIAN==0
122 param->read_buffer_size = 1500;
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +0000123#endif
Benny Prijonoa25bc9d2009-11-09 08:51:34 +0000124 param->qos_type = PJ_QOS_TYPE_BEST_EFFORT;
125 param->qos_ignore_error = PJ_TRUE;
Nanang Izzuddin6c62bf42009-08-27 19:55:13 +0000126
127 /* Security config */
128 param->proto = PJ_SSL_SOCK_PROTO_DEFAULT;
129}
130
131
Nanang Izzuddin2fb937e2010-02-24 05:43:34 +0000132/* Get cipher name string */
Nanang Izzuddin006cc012009-10-16 03:06:13 +0000133PJ_DEF(const char*) pj_ssl_cipher_name(pj_ssl_cipher cipher)
134{
135 unsigned i, n;
136
137 n = PJ_ARRAY_SIZE(cipher_names);
138 for (i = 0; i < n; ++i) {
139 if (cipher == cipher_names[i].cipher)
140 return cipher_names[i].name;
141 }
142
143 return NULL;
144}
Nanang Izzuddin2fb937e2010-02-24 05:43:34 +0000145
146
147
148
149PJ_DEF(pj_status_t) pj_ssl_cert_verify_error_st(pj_uint32_t verify_status,
150 const char *error_strings[],
151 unsigned *count)
152{
153 unsigned i = 0, shift_idx = 0;
154 unsigned unknown = 0;
155 pj_uint32_t errs;
156
157 PJ_ASSERT_RETURN(error_strings && count, PJ_EINVAL);
158
159 if (verify_status == PJ_SSL_CERT_ESUCCESS && *count) {
160 error_strings[0] = "OK";
161 *count = 1;
162 return PJ_SUCCESS;
163 }
164
165 errs = verify_status;
166
167 while (errs && i < *count) {
168 pj_uint32_t err;
169 const char *p = NULL;
170
171 if ((errs & 1) == 0) {
172 shift_idx++;
173 errs >>= 1;
174 continue;
175 }
176
177 err = (1 << shift_idx);
178
179 switch (err) {
180 case PJ_SSL_CERT_EISSUER_NOT_FOUND:
181 p = "The issuer certificate cannot be found";
182 break;
183 case PJ_SSL_CERT_EUNTRUSTED:
184 p = "The certificate is untrusted";
185 break;
186 case PJ_SSL_CERT_EVALIDITY_PERIOD:
187 p = "The certificate has expired or not yet valid";
188 break;
189 case PJ_SSL_CERT_EINVALID_FORMAT:
190 p = "One or more fields of the certificate cannot be decoded "
191 "due to invalid format";
192 break;
193 case PJ_SSL_CERT_EISSUER_MISMATCH:
194 p = "The issuer info in the certificate does not match to the "
195 "(candidate) issuer certificate";
196 break;
197 case PJ_SSL_CERT_ECRL_FAILURE:
198 p = "The CRL certificate cannot be found or cannot be read "
199 "properly";
200 break;
201 case PJ_SSL_CERT_EREVOKED:
202 p = "The certificate has been revoked";
203 break;
204 case PJ_SSL_CERT_EINVALID_PURPOSE:
205 p = "The certificate or CA certificate cannot be used for the "
206 "specified purpose";
207 break;
208 case PJ_SSL_CERT_ECHAIN_TOO_LONG:
209 p = "The certificate chain length is too long";
210 break;
211 case PJ_SSL_CERT_EIDENTITY_NOT_MATCH:
212 p = "The server identity does not match to any identities "
213 "specified in the certificate";
214 break;
215 case PJ_SSL_CERT_EUNKNOWN:
216 default:
217 unknown++;
218 break;
219 }
220
221 /* Set error string */
222 if (p)
223 error_strings[i++] = p;
224
225 /* Next */
226 shift_idx++;
227 errs >>= 1;
228 }
229
230 /* Unknown error */
231 if (unknown && i < *count)
232 error_strings[i++] = "Unknown verification error";
233
234 *count = i;
235
236 return PJ_SUCCESS;
237}