tls_verify.c 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129
  1. /*
  2. * $Id$
  3. *
  4. * TLS module - certificate verification function
  5. *
  6. * Copyright (C) 2001-2003 FhG FOKUS
  7. * Copyright (C) 2004,2005 Free Software Foundation, Inc.
  8. * COpyright (C) 2005 iptelorg GmbH
  9. *
  10. * This file is part of sip-router, a free SIP server.
  11. *
  12. * sip-router is free software; you can redistribute it and/or modify
  13. * it under the terms of the GNU General Public License as published by
  14. * the Free Software Foundation; either version 2 of the License, or
  15. * (at your option) any later version
  16. *
  17. * sip-router is distributed in the hope that it will be useful,
  18. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  19. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  20. * GNU General Public License for more details.
  21. *
  22. * You should have received a copy of the GNU General Public License
  23. * along with this program; if not, write to the Free Software
  24. * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
  25. */
  26. #include "../../dprint.h"
  27. #include "tls_verify.h"
  28. /*!
  29. * \file
  30. * \brief SIP-router TLS support :: Certificate verification
  31. * \ingroup tls
  32. * Module: \ref tls
  33. */
  34. /* FIXME: remove this and use the value in domains instead */
  35. #define VERIFY_DEPTH_S 3
  36. /* This callback is called during each verification process,
  37. at each step during the chain of certificates (this function
  38. is not the certificate_verification one!). */
  39. int verify_callback(int pre_verify_ok, X509_STORE_CTX *ctx) {
  40. char buf[256];
  41. X509 *err_cert;
  42. int err, depth;
  43. depth = X509_STORE_CTX_get_error_depth(ctx);
  44. DBG("verify_callback: depth = %d\n",depth);
  45. if ( depth > VERIFY_DEPTH_S ) {
  46. LOG(L_NOTICE, "tls_init: verify_callback: cert chain too long ( depth > VERIFY_DEPTH_S)\n");
  47. pre_verify_ok=0;
  48. }
  49. if( pre_verify_ok ) {
  50. LOG(L_NOTICE, "tls_init: verify_callback: preverify is good: verify return: %d\n", pre_verify_ok);
  51. return pre_verify_ok;
  52. }
  53. err_cert = X509_STORE_CTX_get_current_cert(ctx);
  54. err = X509_STORE_CTX_get_error(ctx);
  55. X509_NAME_oneline(X509_get_subject_name(err_cert),buf,sizeof buf);
  56. LOG(L_NOTICE, "tls_init: verify_callback: subject = %s\n", buf);
  57. LOG(L_NOTICE, "tls_init: verify_callback: verify error:num=%d:%s\n", err, X509_verify_cert_error_string(err));
  58. LOG(L_NOTICE, "tls_init: verify_callback: error code is %d\n", ctx->error);
  59. switch (ctx->error) {
  60. case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
  61. X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert),buf,sizeof buf);
  62. LOG(L_NOTICE, "tls_init: verify_callback: issuer= %s\n",buf);
  63. break;
  64. case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
  65. case X509_V_ERR_CERT_NOT_YET_VALID:
  66. LOG(L_NOTICE, "tls_init: verify_callback: notBefore\n");
  67. break;
  68. case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
  69. case X509_V_ERR_CERT_HAS_EXPIRED:
  70. LOG(L_NOTICE, "tls_init: verify_callback: notAfter\n");
  71. break;
  72. case X509_V_ERR_CERT_SIGNATURE_FAILURE:
  73. case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
  74. LOG(L_NOTICE, "tls_init: verify_callback: unable to decrypt cert signature\n");
  75. break;
  76. case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY:
  77. LOG(L_NOTICE, "tls_init: verify_callback: unable to decode issuer public key\n");
  78. break;
  79. case X509_V_ERR_OUT_OF_MEM:
  80. ERR("tls_init: verify_callback: Out of memory \n");
  81. break;
  82. case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
  83. case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
  84. LOG(L_NOTICE, "tls_init: verify_callback: Self signed certificate issue\n");
  85. break;
  86. case X509_V_ERR_CERT_CHAIN_TOO_LONG:
  87. LOG(L_NOTICE, "tls_init: verify_callback: certificate chain too long\n");
  88. break;
  89. case X509_V_ERR_INVALID_CA:
  90. LOG(L_NOTICE, "tls_init: verify_callback: invalid CA\n");
  91. break;
  92. case X509_V_ERR_PATH_LENGTH_EXCEEDED:
  93. LOG(L_NOTICE, "tls_init: verify_callback: path length exceeded\n");
  94. break;
  95. case X509_V_ERR_INVALID_PURPOSE:
  96. LOG(L_NOTICE, "tls_init: verify_callback: invalid purpose\n");
  97. break;
  98. case X509_V_ERR_CERT_UNTRUSTED:
  99. LOG(L_NOTICE, "tls_init: verify_callback: certificate untrusted\n");
  100. break;
  101. case X509_V_ERR_CERT_REJECTED:
  102. LOG(L_NOTICE, "tls_init: verify_callback: certificate rejected\n");
  103. break;
  104. default:
  105. LOG(L_NOTICE, "tls_init: verify_callback: something wrong with the cert ... error code is %d (check x509_vfy.h)\n", ctx->error);
  106. break;
  107. }
  108. LOG(L_NOTICE, "tls_init: verify_callback: verify return:%d\n", pre_verify_ok);
  109. return(pre_verify_ok);
  110. }