blob: c6d1e3103698ef0aec123508313f700b901de20a [file] [log] [blame]
DRCff1e1ff2011-02-08 23:43:55 +00001/*
Adam Tkacb10489b2010-04-23 14:16:04 +00002 * Copyright (C) 2004 Red Hat Inc.
3 * Copyright (C) 2005 Martin Koegler
4 * Copyright (C) 2010 TigerVNC Team
Adam Tkac27b2f772010-11-18 13:33:57 +00005 * Copyright (C) 2010 m-privacy GmbH
Adam Tkacb10489b2010-04-23 14:16:04 +00006 *
7 * This is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This software is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this software; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307,
20 * USA.
21 */
22
23#ifdef HAVE_CONFIG_H
24#include <config.h>
25#endif
26
Adam Tkac43958232010-07-21 09:06:59 +000027#ifndef HAVE_GNUTLS
28#error "This header should not be compiled without HAVE_GNUTLS defined"
29#endif
Adam Tkacb10489b2010-04-23 14:16:04 +000030
Adam Tkac27b2f772010-11-18 13:33:57 +000031#include <stdlib.h>
Adam Tkacc4674db2011-01-19 14:11:16 +000032#ifndef WIN32
Adam Tkac27b2f772010-11-18 13:33:57 +000033#include <unistd.h>
Adam Tkacc4674db2011-01-19 14:11:16 +000034#endif
Adam Tkac27b2f772010-11-18 13:33:57 +000035
Adam Tkac3c5be392010-07-21 09:27:34 +000036#include <rfb/CSecurityTLS.h>
Adam Tkacb10489b2010-04-23 14:16:04 +000037#include <rfb/CConnection.h>
38#include <rfb/LogWriter.h>
39#include <rfb/Exception.h>
Adam Tkac27b2f772010-11-18 13:33:57 +000040#include <rfb/UserMsgBox.h>
Adam Tkacb10489b2010-04-23 14:16:04 +000041#include <rdr/TLSInStream.h>
42#include <rdr/TLSOutStream.h>
Adam Tkac27b2f772010-11-18 13:33:57 +000043#include <os/os.h>
Adam Tkacb10489b2010-04-23 14:16:04 +000044
Adam Tkac0e61c342010-07-21 09:23:25 +000045#include <gnutls/x509.h>
46
Adam Tkac68481c12011-02-09 14:15:09 +000047/*
48 * GNUTLS 2.6.5 and older didn't have some variables defined so don't use them.
49 * GNUTLS 1.X.X defined LIBGNUTLS_VERSION_NUMBER so treat it as "old" gnutls as
50 * well
51 */
52#if (defined(GNUTLS_VERSION_NUMBER) && GNUTLS_VERSION_NUMBER < 0x020606) || \
53 defined(LIBGNUTLS_VERSION_NUMBER)
54#define WITHOUT_X509_TIMES
DRCb7ab54f2011-02-09 03:27:26 +000055#endif
56
Adam Tkacb4864232011-02-09 15:38:37 +000057/* Ancient GNUTLS... */
58#if !defined(GNUTLS_VERSION_NUMBER) && !defined(LIBGNUTLS_VERSION_NUMBER)
59#define WITHOUT_X509_TIMES
60#endif
61
Adam Tkacb10489b2010-04-23 14:16:04 +000062using namespace rfb;
63
Pierre Ossman3d2a84b2014-09-17 16:45:35 +020064StringParameter CSecurityTLS::X509CA("X509CA", "X509 CA certificate", "", ConfViewer);
65StringParameter CSecurityTLS::X509CRL("X509CRL", "X509 CRL file", "", ConfViewer);
Adam Tkac0e61c342010-07-21 09:23:25 +000066
Adam Tkacb10489b2010-04-23 14:16:04 +000067static LogWriter vlog("TLS");
Adam Tkacb10489b2010-04-23 14:16:04 +000068
Pierre Ossmanad2b3c42018-09-21 15:31:11 +020069CSecurityTLS::CSecurityTLS(CConnection* cc, bool _anon)
70 : CSecurity(cc), session(NULL), anon_cred(NULL), cert_cred(NULL),
Pierre Ossman06c11992018-09-21 15:34:47 +020071 anon(_anon), tlsis(NULL), tlsos(NULL), rawis(NULL), rawos(NULL)
Adam Tkacb10489b2010-04-23 14:16:04 +000072{
Pierre Ossman3d2a84b2014-09-17 16:45:35 +020073 cafile = X509CA.getData();
74 crlfile = X509CRL.getData();
Pierre Ossman8aa4bc52016-08-23 17:02:58 +020075
76 if (gnutls_global_init() != GNUTLS_E_SUCCESS)
77 throw AuthFailureException("gnutls_global_init failed");
Adam Tkacb10489b2010-04-23 14:16:04 +000078}
79
Adam Tkac27b2f772010-11-18 13:33:57 +000080void CSecurityTLS::setDefaults()
81{
82 char* homeDir = NULL;
83
Adam Tkacaf081722011-02-07 10:45:15 +000084 if (getvnchomedir(&homeDir) == -1) {
85 vlog.error("Could not obtain VNC home directory path");
Adam Tkac27b2f772010-11-18 13:33:57 +000086 return;
87 }
88
Adam Tkacaf081722011-02-07 10:45:15 +000089 int len = strlen(homeDir) + 1;
Adam Tkac437b0c22011-02-07 10:46:16 +000090 CharArray caDefault(len + 11);
91 CharArray crlDefault(len + 12);
92 sprintf(caDefault.buf, "%sx509_ca.pem", homeDir);
93 sprintf(crlDefault.buf, "%s509_crl.pem", homeDir);
Adam Tkac27b2f772010-11-18 13:33:57 +000094 delete [] homeDir;
95
Adam Tkacf16a4212011-02-07 10:47:07 +000096 if (!fileexists(caDefault.buf))
Jan Grulich8105be92018-09-26 12:50:33 +020097 X509CA.setDefaultStr(caDefault.buf);
Adam Tkacf16a4212011-02-07 10:47:07 +000098 if (!fileexists(crlDefault.buf))
Jan Grulich8105be92018-09-26 12:50:33 +020099 X509CRL.setDefaultStr(crlDefault.buf);
Adam Tkac27b2f772010-11-18 13:33:57 +0000100}
101
Adam Tkac44cdb132011-02-09 14:09:10 +0000102void CSecurityTLS::shutdown(bool needbye)
Adam Tkacb10489b2010-04-23 14:16:04 +0000103{
Adam Tkac44cdb132011-02-09 14:09:10 +0000104 if (session && needbye)
Adam Tkac6948ead2010-08-11 15:58:59 +0000105 if (gnutls_bye(session, GNUTLS_SHUT_RDWR) != GNUTLS_E_SUCCESS)
Adam Tkac44cdb132011-02-09 14:09:10 +0000106 vlog.error("gnutls_bye failed");
Adam Tkac0e61c342010-07-21 09:23:25 +0000107
108 if (anon_cred) {
109 gnutls_anon_free_client_credentials(anon_cred);
110 anon_cred = 0;
111 }
112
113 if (cert_cred) {
114 gnutls_certificate_free_credentials(cert_cred);
115 cert_cred = 0;
116 }
117
Pierre Ossman06c11992018-09-21 15:34:47 +0200118 if (rawis && rawos) {
119 cc->setStreams(rawis, rawos);
120 rawis = NULL;
121 rawos = NULL;
122 }
123
Pierre Ossman1b746342018-09-21 15:33:30 +0200124 if (tlsis) {
125 delete tlsis;
126 tlsis = NULL;
127 }
128 if (tlsos) {
129 delete tlsos;
130 tlsos = NULL;
131 }
132
Adam Tkac0e61c342010-07-21 09:23:25 +0000133 if (session) {
134 gnutls_deinit(session);
135 session = 0;
Adam Tkac0e61c342010-07-21 09:23:25 +0000136 }
Adam Tkacb10489b2010-04-23 14:16:04 +0000137}
138
139
Adam Tkac3c5be392010-07-21 09:27:34 +0000140CSecurityTLS::~CSecurityTLS()
Adam Tkacb10489b2010-04-23 14:16:04 +0000141{
Adam Tkac44cdb132011-02-09 14:09:10 +0000142 shutdown(true);
Adam Tkac0e61c342010-07-21 09:23:25 +0000143
Adam Tkac0e61c342010-07-21 09:23:25 +0000144 delete[] cafile;
145 delete[] crlfile;
Pierre Ossman8aa4bc52016-08-23 17:02:58 +0200146
147 gnutls_global_deinit();
Adam Tkacb10489b2010-04-23 14:16:04 +0000148}
149
Pierre Ossmanad2b3c42018-09-21 15:31:11 +0200150bool CSecurityTLS::processMsg()
Adam Tkacb10489b2010-04-23 14:16:04 +0000151{
152 rdr::InStream* is = cc->getInStream();
153 rdr::OutStream* os = cc->getOutStream();
154 client = cc;
155
Adam Tkacb10489b2010-04-23 14:16:04 +0000156 if (!session) {
157 if (!is->checkNoWait(1))
158 return false;
159
Adam Tkacce6c8b02011-05-10 08:54:57 +0000160 if (is->readU8() == 0) {
161 rdr::U32 result = is->readU32();
162 CharArray reason;
163 if (result == secResultFailed || result == secResultTooMany)
164 reason.buf = is->readString();
165 else
Pierre Ossman19225502017-10-12 15:05:07 +0200166 reason.buf = strDup("protocol error");
Adam Tkacce6c8b02011-05-10 08:54:57 +0000167 throw AuthFailureException(reason.buf);
168 }
Adam Tkacb10489b2010-04-23 14:16:04 +0000169
Adam Tkac6948ead2010-08-11 15:58:59 +0000170 if (gnutls_init(&session, GNUTLS_CLIENT) != GNUTLS_E_SUCCESS)
171 throw AuthFailureException("gnutls_init failed");
172
173 if (gnutls_set_default_priority(session) != GNUTLS_E_SUCCESS)
174 throw AuthFailureException("gnutls_set_default_priority failed");
Adam Tkacb10489b2010-04-23 14:16:04 +0000175
Adam Tkac0e61c342010-07-21 09:23:25 +0000176 setParam();
Adam Tkacb10489b2010-04-23 14:16:04 +0000177
Pierre Ossman1b746342018-09-21 15:33:30 +0200178 // Create these early as they set up the push/pull functions
179 // for GnuTLS
180 tlsis = new rdr::TLSInStream(is, session);
181 tlsos = new rdr::TLSOutStream(os, session);
Pierre Ossman06c11992018-09-21 15:34:47 +0200182
183 rawis = is;
184 rawos = os;
Pierre Ossman1b746342018-09-21 15:33:30 +0200185 }
Pierre Ossmanfe48cd42012-07-03 14:43:38 +0000186
Adam Tkacb10489b2010-04-23 14:16:04 +0000187 int err;
188 err = gnutls_handshake(session);
Adam Tkacb10489b2010-04-23 14:16:04 +0000189 if (err != GNUTLS_E_SUCCESS) {
Pierre Ossmanfe48cd42012-07-03 14:43:38 +0000190 if (!gnutls_error_is_fatal(err))
191 return false;
192
Adam Tkacb10489b2010-04-23 14:16:04 +0000193 vlog.error("TLS Handshake failed: %s\n", gnutls_strerror (err));
Adam Tkac44cdb132011-02-09 14:09:10 +0000194 shutdown(false);
Adam Tkacb10489b2010-04-23 14:16:04 +0000195 throw AuthFailureException("TLS Handshake failed");
196 }
Adam Tkac0e61c342010-07-21 09:23:25 +0000197
Pierre Ossman83eee752018-10-09 16:54:38 +0200198 vlog.debug("TLS handshake completed with %s",
199 gnutls_session_get_desc(session));
200
Adam Tkac0e61c342010-07-21 09:23:25 +0000201 checkSession();
Adam Tkacb10489b2010-04-23 14:16:04 +0000202
Pierre Ossman1b746342018-09-21 15:33:30 +0200203 cc->setStreams(tlsis, tlsos);
Adam Tkacb10489b2010-04-23 14:16:04 +0000204
205 return true;
206}
207
Adam Tkac3c5be392010-07-21 09:27:34 +0000208void CSecurityTLS::setParam()
Adam Tkac0e61c342010-07-21 09:23:25 +0000209{
Pierre Ossman27eb55e2015-01-29 13:31:06 +0100210 static const char kx_anon_priority[] = ":+ANON-ECDH:+ANON-DH";
Pierre Ossman88c24ed2015-01-29 13:12:22 +0100211
212 int ret;
Pierre Ossman27eb55e2015-01-29 13:31:06 +0100213 char *prio;
Pierre Ossman88c24ed2015-01-29 13:12:22 +0100214 const char *err;
Adam Tkac0e61c342010-07-21 09:23:25 +0000215
Pierre Ossman27eb55e2015-01-29 13:31:06 +0100216 prio = (char*)malloc(strlen(Security::GnuTLSPriority) +
217 strlen(kx_anon_priority) + 1);
218 if (prio == NULL)
219 throw AuthFailureException("Not enough memory for GnuTLS priority string");
Adam Tkac6948ead2010-08-11 15:58:59 +0000220
Pierre Ossman27eb55e2015-01-29 13:31:06 +0100221 strcpy(prio, Security::GnuTLSPriority);
222 if (anon)
223 strcat(prio, kx_anon_priority);
224
225 ret = gnutls_priority_set_direct(session, prio, &err);
226
227 free(prio);
228
229 if (ret != GNUTLS_E_SUCCESS) {
230 if (ret == GNUTLS_E_INVALID_REQUEST)
231 vlog.error("GnuTLS priority syntax error at: %s", err);
232 throw AuthFailureException("gnutls_set_priority_direct failed");
233 }
234
235 if (anon) {
Adam Tkac6948ead2010-08-11 15:58:59 +0000236 if (gnutls_anon_allocate_client_credentials(&anon_cred) != GNUTLS_E_SUCCESS)
237 throw AuthFailureException("gnutls_anon_allocate_client_credentials failed");
238
239 if (gnutls_credentials_set(session, GNUTLS_CRD_ANON, anon_cred) != GNUTLS_E_SUCCESS)
240 throw AuthFailureException("gnutls_credentials_set failed");
Adam Tkac0e61c342010-07-21 09:23:25 +0000241
242 vlog.debug("Anonymous session has been set");
243 } else {
Adam Tkac6948ead2010-08-11 15:58:59 +0000244 if (gnutls_certificate_allocate_credentials(&cert_cred) != GNUTLS_E_SUCCESS)
245 throw AuthFailureException("gnutls_certificate_allocate_credentials failed");
Adam Tkac0e61c342010-07-21 09:23:25 +0000246
Pierre Ossmanc04f7562018-08-16 13:28:37 +0200247 if (gnutls_certificate_set_x509_system_trust(cert_cred) != GNUTLS_E_SUCCESS)
248 vlog.error("Could not load system certificate trust store");
249
Adam Tkac0e61c342010-07-21 09:23:25 +0000250 if (*cafile && gnutls_certificate_set_x509_trust_file(cert_cred,cafile,GNUTLS_X509_FMT_PEM) < 0)
251 throw AuthFailureException("load of CA cert failed");
252
Adam Tkace32573a2011-02-09 14:13:41 +0000253 /* Load previously saved certs */
254 char *homeDir = NULL;
255 int err;
256 if (getvnchomedir(&homeDir) == -1)
257 vlog.error("Could not obtain VNC home directory path");
258 else {
259 CharArray caSave(strlen(homeDir) + 19 + 1);
260 sprintf(caSave.buf, "%sx509_savedcerts.pem", homeDir);
261 delete [] homeDir;
262
263 err = gnutls_certificate_set_x509_trust_file(cert_cred, caSave.buf,
264 GNUTLS_X509_FMT_PEM);
265 if (err < 0)
266 vlog.debug("Failed to load saved server certificates from %s", caSave.buf);
267 }
268
Adam Tkac0e61c342010-07-21 09:23:25 +0000269 if (*crlfile && gnutls_certificate_set_x509_crl_file(cert_cred,crlfile,GNUTLS_X509_FMT_PEM) < 0)
270 throw AuthFailureException("load of CRL failed");
271
Adam Tkac6948ead2010-08-11 15:58:59 +0000272 if (gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, cert_cred) != GNUTLS_E_SUCCESS)
273 throw AuthFailureException("gnutls_credentials_set failed");
Adam Tkac0e61c342010-07-21 09:23:25 +0000274
Pierre Ossman894f2c52017-09-08 15:28:39 +0200275 if (gnutls_server_name_set(session, GNUTLS_NAME_DNS,
276 client->getServerName(),
277 strlen(client->getServerName())) != GNUTLS_E_SUCCESS)
278 vlog.error("Failed to configure the server name for TLS handshake");
279
Adam Tkac0e61c342010-07-21 09:23:25 +0000280 vlog.debug("X509 session has been set");
281 }
282}
283
Adam Tkac3c5be392010-07-21 09:27:34 +0000284void CSecurityTLS::checkSession()
Adam Tkac0e61c342010-07-21 09:23:25 +0000285{
Adam Tkace32573a2011-02-09 14:13:41 +0000286 const unsigned allowed_errors = GNUTLS_CERT_INVALID |
287 GNUTLS_CERT_SIGNER_NOT_FOUND |
288 GNUTLS_CERT_SIGNER_NOT_CA;
289 unsigned int status;
Pierre Ossman88c24ed2015-01-29 13:12:22 +0100290 const gnutls_datum_t *cert_list;
Adam Tkac0e61c342010-07-21 09:23:25 +0000291 unsigned int cert_list_size = 0;
Adam Tkace32573a2011-02-09 14:13:41 +0000292 int err;
Pierre Ossman88c24ed2015-01-29 13:12:22 +0100293 gnutls_datum_t info;
Adam Tkac0e61c342010-07-21 09:23:25 +0000294
295 if (anon)
296 return;
297
298 if (gnutls_certificate_type_get(session) != GNUTLS_CRT_X509)
299 throw AuthFailureException("unsupported certificate type");
300
Adam Tkace32573a2011-02-09 14:13:41 +0000301 err = gnutls_certificate_verify_peers2(session, &status);
302 if (err != 0) {
303 vlog.error("server certificate verification failed: %s", gnutls_strerror(err));
304 throw AuthFailureException("server certificate verification failed");
305 }
306
307 if (status & GNUTLS_CERT_REVOKED)
308 throw AuthFailureException("server certificate has been revoked");
309
Adam Tkac68481c12011-02-09 14:15:09 +0000310#ifndef WITHOUT_X509_TIMES
Adam Tkace32573a2011-02-09 14:13:41 +0000311 if (status & GNUTLS_CERT_NOT_ACTIVATED)
312 throw AuthFailureException("server certificate has not been activated");
313
314 if (status & GNUTLS_CERT_EXPIRED) {
315 vlog.debug("server certificate has expired");
316 if (!msg->showMsgBox(UserMsgBox::M_YESNO, "certificate has expired",
317 "The certificate of the server has expired, "
318 "do you want to continue?"))
319 throw AuthFailureException("server certificate has expired");
320 }
Adam Tkac68481c12011-02-09 14:15:09 +0000321#endif
Adam Tkace32573a2011-02-09 14:13:41 +0000322 /* Process other errors later */
323
Adam Tkac0e61c342010-07-21 09:23:25 +0000324 cert_list = gnutls_certificate_get_peers(session, &cert_list_size);
325 if (!cert_list_size)
Adam Tkace32573a2011-02-09 14:13:41 +0000326 throw AuthFailureException("empty certificate chain");
Adam Tkac0e61c342010-07-21 09:23:25 +0000327
Adam Tkace32573a2011-02-09 14:13:41 +0000328 /* Process only server's certificate, not issuer's certificate */
Pierre Ossman88c24ed2015-01-29 13:12:22 +0100329 gnutls_x509_crt_t crt;
Adam Tkace32573a2011-02-09 14:13:41 +0000330 gnutls_x509_crt_init(&crt);
Adam Tkac0e61c342010-07-21 09:23:25 +0000331
Adam Tkace32573a2011-02-09 14:13:41 +0000332 if (gnutls_x509_crt_import(crt, &cert_list[0], GNUTLS_X509_FMT_DER) < 0)
333 throw AuthFailureException("decoding of certificate failed");
334
335 if (gnutls_x509_crt_check_hostname(crt, client->getServerName()) == 0) {
336 char buf[255];
337 vlog.debug("hostname mismatch");
338 snprintf(buf, sizeof(buf), "Hostname (%s) does not match any certificate, "
339 "do you want to continue?", client->getServerName());
340 buf[sizeof(buf) - 1] = '\0';
341 if (!msg->showMsgBox(UserMsgBox::M_YESNO, "hostname mismatch", buf))
342 throw AuthFailureException("hostname mismatch");
Adam Tkac0e61c342010-07-21 09:23:25 +0000343 }
344
Adam Tkace32573a2011-02-09 14:13:41 +0000345 if (status == 0) {
346 /* Everything is fine (hostname + verification) */
Adam Tkac0e61c342010-07-21 09:23:25 +0000347 gnutls_x509_crt_deinit(crt);
Adam Tkace32573a2011-02-09 14:13:41 +0000348 return;
349 }
350
351 if (status & GNUTLS_CERT_INVALID)
352 vlog.debug("server certificate invalid");
353 if (status & GNUTLS_CERT_SIGNER_NOT_FOUND)
354 vlog.debug("server cert signer not found");
355 if (status & GNUTLS_CERT_SIGNER_NOT_CA)
356 vlog.debug("server cert signer not CA");
357
Pierre Ossmane43e5e32017-09-01 11:15:31 +0200358 if (status & GNUTLS_CERT_INSECURE_ALGORITHM)
359 throw AuthFailureException("The server certificate uses an insecure algorithm");
360
Adam Tkace32573a2011-02-09 14:13:41 +0000361 if ((status & (~allowed_errors)) != 0) {
362 /* No other errors are allowed */
363 vlog.debug("GNUTLS status of certificate verification: %u", status);
364 throw AuthFailureException("Invalid status of server certificate verification");
365 }
366
367 vlog.debug("Saved server certificates don't match");
368
Adam Tkace32573a2011-02-09 14:13:41 +0000369 if (gnutls_x509_crt_print(crt, GNUTLS_CRT_PRINT_ONELINE, &info)) {
Adam Tkac5d4c6ac2011-01-19 14:06:48 +0000370 /*
371 * GNUTLS doesn't correctly export gnutls_free symbol which is
372 * a function pointer. Linking with Visual Studio 2008 Express will
373 * fail when you call gnutls_free().
374 */
375#if WIN32
376 free(info.data);
377#else
Adam Tkac27b2f772010-11-18 13:33:57 +0000378 gnutls_free(info.data);
Adam Tkac5d4c6ac2011-01-19 14:06:48 +0000379#endif
Adam Tkace32573a2011-02-09 14:13:41 +0000380 throw AuthFailureException("Could not find certificate to display");
Adam Tkac0e61c342010-07-21 09:23:25 +0000381 }
Adam Tkace32573a2011-02-09 14:13:41 +0000382
Adam Tkac68481c12011-02-09 14:15:09 +0000383 size_t out_size = 0;
Adam Tkace32573a2011-02-09 14:13:41 +0000384 char *out_buf = NULL;
385 char *certinfo = NULL;
386 int len = 0;
387
388 vlog.debug("certificate issuer unknown");
389
390 len = snprintf(NULL, 0, "This certificate has been signed by an unknown "
391 "authority:\n\n%s\n\nDo you want to save it and "
392 "continue?\n ", info.data);
393 if (len < 0)
394 AuthFailureException("certificate decoding error");
395
396 vlog.debug("%s", info.data);
397
398 certinfo = new char[len];
399 if (certinfo == NULL)
400 throw AuthFailureException("Out of memory");
401
402 snprintf(certinfo, len, "This certificate has been signed by an unknown "
403 "authority:\n\n%s\n\nDo you want to save it and "
404 "continue? ", info.data);
405
406 for (int i = 0; i < len - 1; i++)
407 if (certinfo[i] == ',' && certinfo[i + 1] == ' ')
408 certinfo[i] = '\n';
409
410 if (!msg->showMsgBox(UserMsgBox::M_YESNO, "certificate issuer unknown",
411 certinfo)) {
412 delete [] certinfo;
413 throw AuthFailureException("certificate issuer unknown");
414 }
415
416 delete [] certinfo;
417
418 if (gnutls_x509_crt_export(crt, GNUTLS_X509_FMT_PEM, NULL, &out_size)
419 == GNUTLS_E_SHORT_MEMORY_BUFFER)
420 AuthFailureException("Out of memory");
421
422 // Save cert
423 out_buf = new char[out_size];
424 if (out_buf == NULL)
425 AuthFailureException("Out of memory");
426
427 if (gnutls_x509_crt_export(crt, GNUTLS_X509_FMT_PEM, out_buf, &out_size) < 0)
428 AuthFailureException("certificate issuer unknown, and certificate "
429 "export failed");
430
431 char *homeDir = NULL;
432 if (getvnchomedir(&homeDir) == -1)
433 vlog.error("Could not obtain VNC home directory path");
434 else {
435 FILE *f;
436 CharArray caSave(strlen(homeDir) + 1 + 19);
437 sprintf(caSave.buf, "%sx509_savedcerts.pem", homeDir);
438 delete [] homeDir;
439 f = fopen(caSave.buf, "a+");
440 if (!f)
441 msg->showMsgBox(UserMsgBox::M_OK, "certificate save failed",
442 "Could not save the certificate");
443 else {
444 fprintf(f, "%s\n", out_buf);
445 fclose(f);
446 }
447 }
448
449 delete [] out_buf;
450
451 gnutls_x509_crt_deinit(crt);
452 /*
453 * GNUTLS doesn't correctly export gnutls_free symbol which is
454 * a function pointer. Linking with Visual Studio 2008 Express will
455 * fail when you call gnutls_free().
456 */
457#if WIN32
458 free(info.data);
459#else
460 gnutls_free(info.data);
461#endif
Adam Tkac0e61c342010-07-21 09:23:25 +0000462}
463