123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121 |
- /*
- * TLS module
- *
- * Copyright (C) 2005 iptelorg GmbH
- *
- * Permission to use, copy, modify, and distribute this software for any
- * purpose with or without fee is hereby granted, provided that the above
- * copyright notice and this permission notice appear in all copies.
- *
- * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
- * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
- * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
- * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
- * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
- * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
- * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
- */
- #include "../../dprint.h"
- #include "tls_verify.h"
- /*!
- * \file
- * \brief Kamailio TLS support :: Certificate verification
- * \ingroup tls
- * Module: \ref tls
- */
- /* FIXME: remove this and use the value in domains instead */
- #define VERIFY_DEPTH_S 3
- /* This callback is called during each verification process,
- at each step during the chain of certificates (this function
- is not the certificate_verification one!). */
- int verify_callback(int pre_verify_ok, X509_STORE_CTX *ctx) {
- char buf[256];
- X509 *err_cert;
- int err, depth;
- depth = X509_STORE_CTX_get_error_depth(ctx);
- DBG("verify_callback: depth = %d\n",depth);
- if ( depth > VERIFY_DEPTH_S ) {
- LOG(L_NOTICE, "tls_init: verify_callback: cert chain too long ( depth > VERIFY_DEPTH_S)\n");
- pre_verify_ok=0;
- }
-
- if( pre_verify_ok ) {
- LOG(L_NOTICE, "tls_init: verify_callback: preverify is good: verify return: %d\n", pre_verify_ok);
- return pre_verify_ok;
- }
-
- err_cert = X509_STORE_CTX_get_current_cert(ctx);
- err = X509_STORE_CTX_get_error(ctx);
- X509_NAME_oneline(X509_get_subject_name(err_cert),buf,sizeof buf);
-
- LOG(L_NOTICE, "tls_init: verify_callback: subject = %s\n", buf);
- LOG(L_NOTICE, "tls_init: verify_callback: verify error:num=%d:%s\n", err, X509_verify_cert_error_string(err));
- LOG(L_NOTICE, "tls_init: verify_callback: error code is %d\n", ctx->error);
-
- switch (ctx->error) {
- case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
- X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert),buf,sizeof buf);
- LOG(L_NOTICE, "tls_init: verify_callback: issuer= %s\n",buf);
- break;
-
- case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
- case X509_V_ERR_CERT_NOT_YET_VALID:
- LOG(L_NOTICE, "tls_init: verify_callback: notBefore\n");
- break;
-
- case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
- case X509_V_ERR_CERT_HAS_EXPIRED:
- LOG(L_NOTICE, "tls_init: verify_callback: notAfter\n");
- break;
-
- case X509_V_ERR_CERT_SIGNATURE_FAILURE:
- case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
- LOG(L_NOTICE, "tls_init: verify_callback: unable to decrypt cert signature\n");
- break;
-
- case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY:
- LOG(L_NOTICE, "tls_init: verify_callback: unable to decode issuer public key\n");
- break;
-
- case X509_V_ERR_OUT_OF_MEM:
- ERR("tls_init: verify_callback: Out of memory \n");
- break;
-
- case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
- case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
- LOG(L_NOTICE, "tls_init: verify_callback: Self signed certificate issue\n");
- break;
- case X509_V_ERR_CERT_CHAIN_TOO_LONG:
- LOG(L_NOTICE, "tls_init: verify_callback: certificate chain too long\n");
- break;
- case X509_V_ERR_INVALID_CA:
- LOG(L_NOTICE, "tls_init: verify_callback: invalid CA\n");
- break;
- case X509_V_ERR_PATH_LENGTH_EXCEEDED:
- LOG(L_NOTICE, "tls_init: verify_callback: path length exceeded\n");
- break;
- case X509_V_ERR_INVALID_PURPOSE:
- LOG(L_NOTICE, "tls_init: verify_callback: invalid purpose\n");
- break;
- case X509_V_ERR_CERT_UNTRUSTED:
- LOG(L_NOTICE, "tls_init: verify_callback: certificate untrusted\n");
- break;
- case X509_V_ERR_CERT_REJECTED:
- LOG(L_NOTICE, "tls_init: verify_callback: certificate rejected\n");
- break;
-
- default:
- LOG(L_NOTICE, "tls_init: verify_callback: something wrong with the cert ... error code is %d (check x509_vfy.h)\n", ctx->error);
- break;
- }
-
- LOG(L_NOTICE, "tls_init: verify_callback: verify return:%d\n", pre_verify_ok);
- return(pre_verify_ok);
- }
|