tls_verify.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. /*
  2. * TLS module
  3. *
  4. * Copyright (C) 2005 iptelorg GmbH
  5. *
  6. * Permission to use, copy, modify, and distribute this software for any
  7. * purpose with or without fee is hereby granted, provided that the above
  8. * copyright notice and this permission notice appear in all copies.
  9. *
  10. * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
  11. * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
  12. * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
  13. * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
  14. * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
  15. * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
  16. * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
  17. */
  18. #include "../../dprint.h"
  19. #include "tls_verify.h"
  20. /*!
  21. * \file
  22. * \brief Kamailio TLS support :: Certificate verification
  23. * \ingroup tls
  24. * Module: \ref tls
  25. */
  26. /* FIXME: remove this and use the value in domains instead */
  27. #define VERIFY_DEPTH_S 3
  28. /* This callback is called during each verification process,
  29. at each step during the chain of certificates (this function
  30. is not the certificate_verification one!). */
  31. int verify_callback(int pre_verify_ok, X509_STORE_CTX *ctx) {
  32. char buf[256];
  33. X509 *err_cert;
  34. int err, depth;
  35. depth = X509_STORE_CTX_get_error_depth(ctx);
  36. DBG("verify_callback: depth = %d\n",depth);
  37. if ( depth > VERIFY_DEPTH_S ) {
  38. LOG(L_NOTICE, "tls_init: verify_callback: cert chain too long ( depth > VERIFY_DEPTH_S)\n");
  39. pre_verify_ok=0;
  40. }
  41. if( pre_verify_ok ) {
  42. LOG(L_NOTICE, "tls_init: verify_callback: preverify is good: verify return: %d\n", pre_verify_ok);
  43. return pre_verify_ok;
  44. }
  45. err_cert = X509_STORE_CTX_get_current_cert(ctx);
  46. err = X509_STORE_CTX_get_error(ctx);
  47. X509_NAME_oneline(X509_get_subject_name(err_cert),buf,sizeof buf);
  48. LOG(L_NOTICE, "tls_init: verify_callback: subject = %s\n", buf);
  49. LOG(L_NOTICE, "tls_init: verify_callback: verify error:num=%d:%s\n", err, X509_verify_cert_error_string(err));
  50. LOG(L_NOTICE, "tls_init: verify_callback: error code is %d\n", ctx->error);
  51. switch (ctx->error) {
  52. case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
  53. X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert),buf,sizeof buf);
  54. LOG(L_NOTICE, "tls_init: verify_callback: issuer= %s\n",buf);
  55. break;
  56. case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
  57. case X509_V_ERR_CERT_NOT_YET_VALID:
  58. LOG(L_NOTICE, "tls_init: verify_callback: notBefore\n");
  59. break;
  60. case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
  61. case X509_V_ERR_CERT_HAS_EXPIRED:
  62. LOG(L_NOTICE, "tls_init: verify_callback: notAfter\n");
  63. break;
  64. case X509_V_ERR_CERT_SIGNATURE_FAILURE:
  65. case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
  66. LOG(L_NOTICE, "tls_init: verify_callback: unable to decrypt cert signature\n");
  67. break;
  68. case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY:
  69. LOG(L_NOTICE, "tls_init: verify_callback: unable to decode issuer public key\n");
  70. break;
  71. case X509_V_ERR_OUT_OF_MEM:
  72. ERR("tls_init: verify_callback: Out of memory \n");
  73. break;
  74. case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
  75. case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
  76. LOG(L_NOTICE, "tls_init: verify_callback: Self signed certificate issue\n");
  77. break;
  78. case X509_V_ERR_CERT_CHAIN_TOO_LONG:
  79. LOG(L_NOTICE, "tls_init: verify_callback: certificate chain too long\n");
  80. break;
  81. case X509_V_ERR_INVALID_CA:
  82. LOG(L_NOTICE, "tls_init: verify_callback: invalid CA\n");
  83. break;
  84. case X509_V_ERR_PATH_LENGTH_EXCEEDED:
  85. LOG(L_NOTICE, "tls_init: verify_callback: path length exceeded\n");
  86. break;
  87. case X509_V_ERR_INVALID_PURPOSE:
  88. LOG(L_NOTICE, "tls_init: verify_callback: invalid purpose\n");
  89. break;
  90. case X509_V_ERR_CERT_UNTRUSTED:
  91. LOG(L_NOTICE, "tls_init: verify_callback: certificate untrusted\n");
  92. break;
  93. case X509_V_ERR_CERT_REJECTED:
  94. LOG(L_NOTICE, "tls_init: verify_callback: certificate rejected\n");
  95. break;
  96. default:
  97. LOG(L_NOTICE, "tls_init: verify_callback: something wrong with the cert ... error code is %d (check x509_vfy.h)\n", ctx->error);
  98. break;
  99. }
  100. LOG(L_NOTICE, "tls_init: verify_callback: verify return:%d\n", pre_verify_ok);
  101. return(pre_verify_ok);
  102. }