Blame libfreerdp/crypto/tls.c

Packit 1fb8d4
/**
Packit 1fb8d4
 * FreeRDP: A Remote Desktop Protocol Implementation
Packit 1fb8d4
 * Transport Layer Security
Packit 1fb8d4
 *
Packit 1fb8d4
 * Copyright 2011-2012 Marc-Andre Moreau <marcandre.moreau@gmail.com>
Packit 1fb8d4
 *
Packit 1fb8d4
 * Licensed under the Apache License, Version 2.0 (the "License");
Packit 1fb8d4
 * you may not use this file except in compliance with the License.
Packit 1fb8d4
 * You may obtain a copy of the License at
Packit 1fb8d4
 *
Packit 1fb8d4
 *		 http://www.apache.org/licenses/LICENSE-2.0
Packit 1fb8d4
 *
Packit 1fb8d4
 * Unless required by applicable law or agreed to in writing, software
Packit 1fb8d4
 * distributed under the License is distributed on an "AS IS" BASIS,
Packit 1fb8d4
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Packit 1fb8d4
 * See the License for the specific language governing permissions and
Packit 1fb8d4
 * limitations under the License.
Packit 1fb8d4
 */
Packit 1fb8d4
Packit 1fb8d4
#ifdef HAVE_CONFIG_H
Packit 1fb8d4
#include "config.h"
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
#include <assert.h>
Packit 1fb8d4
#include <string.h>
Packit 1fb8d4
#include <errno.h>
Packit 1fb8d4
Packit 1fb8d4
#include <winpr/crt.h>
Packit 1fb8d4
#include <winpr/string.h>
Packit 1fb8d4
#include <winpr/sspi.h>
Packit 1fb8d4
#include <winpr/ssl.h>
Packit 1fb8d4
Packit 1fb8d4
#include <winpr/stream.h>
Packit 1fb8d4
#include <freerdp/utils/ringbuffer.h>
Packit 1fb8d4
Packit 1fb8d4
#include <freerdp/log.h>
Packit 1fb8d4
#include <freerdp/crypto/tls.h>
Packit 1fb8d4
#include "../core/tcp.h"
Packit 1fb8d4
#include "opensslcompat.h"
Packit 1fb8d4
Packit 1fb8d4
#ifdef HAVE_POLL_H
Packit 1fb8d4
#include <poll.h>
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
#ifdef HAVE_VALGRIND_MEMCHECK_H
Packit 1fb8d4
#include <valgrind/memcheck.h>
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
#define TAG FREERDP_TAG("crypto")
Packit 1fb8d4
Packit 1fb8d4
/**
Packit 1fb8d4
 * Earlier Microsoft iOS RDP clients have sent a null or even double null
Packit 1fb8d4
 * terminated hostname in the SNI TLS extension.
Packit 1fb8d4
 * If the length indicator does not equal the hostname strlen OpenSSL
Packit 1fb8d4
 * will abort (see openssl:ssl/t1_lib.c).
Packit 1fb8d4
 * Here is a tcpdump segment of Microsoft Remote Desktop Client Version
Packit 1fb8d4
 * 8.1.7 running on an iPhone 4 with iOS 7.1.2 showing the transmitted
Packit 1fb8d4
 * SNI hostname TLV blob when connection to server "abcd":
Packit 1fb8d4
 * 00                  name_type 0x00 (host_name)
Packit 1fb8d4
 * 00 06               length_in_bytes 0x0006
Packit 1fb8d4
 * 61 62 63 64 00 00   host_name "abcd\0\0"
Packit 1fb8d4
 *
Packit 1fb8d4
 * Currently the only (runtime) workaround is setting an openssl tls
Packit 1fb8d4
 * extension debug callback that sets the SSL context's servername_done
Packit 1fb8d4
 * to 1 which effectively disables the parsing of that extension type.
Packit 1fb8d4
 *
Packit 1fb8d4
 * Nowadays this workaround is not required anymore but still can be
Packit 1fb8d4
 * activated by adding the following define:
Packit 1fb8d4
 *
Packit 1fb8d4
 * #define MICROSOFT_IOS_SNI_BUG
Packit 1fb8d4
 */
Packit 1fb8d4
Packit 1fb8d4
struct _BIO_RDP_TLS
Packit 1fb8d4
{
Packit 1fb8d4
	SSL* ssl;
Packit 1fb8d4
	CRITICAL_SECTION lock;
Packit 1fb8d4
};
Packit 1fb8d4
typedef struct _BIO_RDP_TLS BIO_RDP_TLS;
Packit 1fb8d4
Packit Service 5a9772
static int tls_verify_certificate(rdpTls* tls, CryptoCert cert, const char* hostname, UINT16 port);
Packit Service 5a9772
static void tls_print_certificate_name_mismatch_error(const char* hostname, UINT16 port,
Packit Service 5a9772
                                                      const char* common_name, char** alt_names,
Packit Service 5a9772
                                                      int alt_names_count);
Packit Service 5a9772
static void tls_print_certificate_error(const char* hostname, UINT16 port, const char* fingerprint,
Packit Service 5a9772
                                        const char* hosts_file);
Packit Service 5a9772
Packit 1fb8d4
static int bio_rdp_tls_write(BIO* bio, const char* buf, int size)
Packit 1fb8d4
{
Packit 1fb8d4
	int error;
Packit 1fb8d4
	int status;
Packit Service 5a9772
	BIO_RDP_TLS* tls = (BIO_RDP_TLS*)BIO_get_data(bio);
Packit 1fb8d4
Packit 1fb8d4
	if (!buf || !tls)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	BIO_clear_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_READ | BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
	EnterCriticalSection(&tls->lock);
Packit 1fb8d4
	status = SSL_write(tls->ssl, buf, size);
Packit 1fb8d4
	error = SSL_get_error(tls->ssl, status);
Packit 1fb8d4
	LeaveCriticalSection(&tls->lock);
Packit 1fb8d4
Packit 1fb8d4
	if (status <= 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		switch (error)
Packit 1fb8d4
		{
Packit 1fb8d4
			case SSL_ERROR_NONE:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_WRITE:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_READ:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_X509_LOOKUP:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
				BIO_set_retry_reason(bio, BIO_RR_SSL_X509_LOOKUP);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_CONNECT:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
				BIO_set_retry_reason(bio, BIO_RR_CONNECT);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_SYSCALL:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_SSL:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static int bio_rdp_tls_read(BIO* bio, char* buf, int size)
Packit 1fb8d4
{
Packit 1fb8d4
	int error;
Packit 1fb8d4
	int status;
Packit Service 5a9772
	BIO_RDP_TLS* tls = (BIO_RDP_TLS*)BIO_get_data(bio);
Packit 1fb8d4
Packit 1fb8d4
	if (!buf || !tls)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	BIO_clear_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_READ | BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
	EnterCriticalSection(&tls->lock);
Packit 1fb8d4
	status = SSL_read(tls->ssl, buf, size);
Packit 1fb8d4
	error = SSL_get_error(tls->ssl, status);
Packit 1fb8d4
	LeaveCriticalSection(&tls->lock);
Packit 1fb8d4
Packit 1fb8d4
	if (status <= 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		switch (error)
Packit 1fb8d4
		{
Packit 1fb8d4
			case SSL_ERROR_NONE:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_READ:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_WRITE:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_X509_LOOKUP:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
				BIO_set_retry_reason(bio, BIO_RR_SSL_X509_LOOKUP);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_ACCEPT:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
				BIO_set_retry_reason(bio, BIO_RR_ACCEPT);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_WANT_CONNECT:
Packit 1fb8d4
				BIO_set_flags(bio, BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
				BIO_set_retry_reason(bio, BIO_RR_CONNECT);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_SSL:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_ZERO_RETURN:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
Packit 1fb8d4
			case SSL_ERROR_SYSCALL:
Packit 1fb8d4
				BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
				break;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
#ifdef HAVE_VALGRIND_MEMCHECK_H
Packit 1fb8d4
Packit 1fb8d4
	if (status > 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		VALGRIND_MAKE_MEM_DEFINED(buf, status);
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
#endif
Packit 1fb8d4
	return status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static int bio_rdp_tls_puts(BIO* bio, const char* str)
Packit 1fb8d4
{
Packit Service 5a9772
	size_t size;
Packit 1fb8d4
	int status;
Packit 1fb8d4
Packit 1fb8d4
	if (!str)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	size = strlen(str);
Packit 1fb8d4
	status = BIO_write(bio, str, size);
Packit 1fb8d4
	return status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static int bio_rdp_tls_gets(BIO* bio, char* str, int size)
Packit 1fb8d4
{
Packit 1fb8d4
	return 1;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static long bio_rdp_tls_ctrl(BIO* bio, int cmd, long num, void* ptr)
Packit 1fb8d4
{
Packit 1fb8d4
	BIO* ssl_rbio;
Packit 1fb8d4
	BIO* ssl_wbio;
Packit 1fb8d4
	BIO* next_bio;
Packit 1fb8d4
	int status = -1;
Packit Service 5a9772
	BIO_RDP_TLS* tls = (BIO_RDP_TLS*)BIO_get_data(bio);
Packit 1fb8d4
Packit 1fb8d4
	if (!tls)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	if (!tls->ssl && (cmd != BIO_C_SET_SSL))
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	next_bio = BIO_next(bio);
Packit 1fb8d4
	ssl_rbio = tls->ssl ? SSL_get_rbio(tls->ssl) : NULL;
Packit 1fb8d4
	ssl_wbio = tls->ssl ? SSL_get_wbio(tls->ssl) : NULL;
Packit 1fb8d4
Packit 1fb8d4
	switch (cmd)
Packit 1fb8d4
	{
Packit 1fb8d4
		case BIO_CTRL_RESET:
Packit 1fb8d4
			SSL_shutdown(tls->ssl);
Packit 1fb8d4
Packit 1fb8d4
			if (SSL_in_connect_init(tls->ssl))
Packit 1fb8d4
				SSL_set_connect_state(tls->ssl);
Packit 1fb8d4
			else if (SSL_in_accept_init(tls->ssl))
Packit 1fb8d4
				SSL_set_accept_state(tls->ssl);
Packit 1fb8d4
Packit 1fb8d4
			SSL_clear(tls->ssl);
Packit 1fb8d4
Packit 1fb8d4
			if (next_bio)
Packit 1fb8d4
				status = BIO_ctrl(next_bio, cmd, num, ptr);
Packit 1fb8d4
			else if (ssl_rbio)
Packit 1fb8d4
				status = BIO_ctrl(ssl_rbio, cmd, num, ptr);
Packit 1fb8d4
			else
Packit 1fb8d4
				status = 1;
Packit 1fb8d4
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_C_GET_FD:
Packit 1fb8d4
			status = BIO_ctrl(ssl_rbio, cmd, num, ptr);
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_INFO:
Packit 1fb8d4
			status = 0;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_SET_CALLBACK:
Packit 1fb8d4
			status = 0;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_GET_CALLBACK:
Packit Service 5a9772
			*((ULONG_PTR*)ptr) = (ULONG_PTR)SSL_get_info_callback(tls->ssl);
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_C_SSL_MODE:
Packit 1fb8d4
			if (num)
Packit 1fb8d4
				SSL_set_connect_state(tls->ssl);
Packit 1fb8d4
			else
Packit 1fb8d4
				SSL_set_accept_state(tls->ssl);
Packit 1fb8d4
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_GET_CLOSE:
Packit 1fb8d4
			status = BIO_get_shutdown(bio);
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_SET_CLOSE:
Packit Service 5a9772
			BIO_set_shutdown(bio, (int)num);
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_WPENDING:
Packit 1fb8d4
			status = BIO_ctrl(ssl_wbio, cmd, num, ptr);
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_PENDING:
Packit 1fb8d4
			status = SSL_pending(tls->ssl);
Packit 1fb8d4
Packit 1fb8d4
			if (status == 0)
Packit 1fb8d4
				status = BIO_pending(ssl_rbio);
Packit 1fb8d4
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_FLUSH:
Packit 1fb8d4
			BIO_clear_retry_flags(bio);
Packit 1fb8d4
			status = BIO_ctrl(ssl_wbio, cmd, num, ptr);
Packit 1fb8d4
			BIO_copy_next_retry(bio);
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_PUSH:
Packit 1fb8d4
			if (next_bio && (next_bio != ssl_rbio))
Packit 1fb8d4
			{
Packit 1fb8d4
#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
				SSL_set_bio(tls->ssl, next_bio, next_bio);
Packit 1fb8d4
				CRYPTO_add(&(bio->next_bio->references), 1, CRYPTO_LOCK_BIO);
Packit 1fb8d4
#else
Packit 1fb8d4
				/*
Packit 1fb8d4
				 * We are going to pass ownership of next to the SSL object...but
Packit 1fb8d4
				 * we don't own a reference to pass yet - so up ref
Packit 1fb8d4
				 */
Packit 1fb8d4
				BIO_up_ref(next_bio);
Packit 1fb8d4
				SSL_set_bio(tls->ssl, next_bio, next_bio);
Packit 1fb8d4
#endif
Packit 1fb8d4
			}
Packit 1fb8d4
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_CTRL_POP:
Packit 1fb8d4
Packit 1fb8d4
			/* Only detach if we are the BIO explicitly being popped */
Packit 1fb8d4
			if (bio == ptr)
Packit 1fb8d4
			{
Packit 1fb8d4
				if (ssl_rbio != ssl_wbio)
Packit 1fb8d4
					BIO_free_all(ssl_wbio);
Packit 1fb8d4
Packit 1fb8d4
#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
Packit 1fb8d4
				if (next_bio)
Packit 1fb8d4
					CRYPTO_add(&(bio->next_bio->references), -1, CRYPTO_LOCK_BIO);
Packit 1fb8d4
Packit 1fb8d4
				tls->ssl->wbio = tls->ssl->rbio = NULL;
Packit 1fb8d4
#else
Packit 1fb8d4
				/* OpenSSL 1.1: This will also clear the reference we obtained during push */
Packit 1fb8d4
				SSL_set_bio(tls->ssl, NULL, NULL);
Packit 1fb8d4
#endif
Packit 1fb8d4
			}
Packit 1fb8d4
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_C_GET_SSL:
Packit 1fb8d4
			if (ptr)
Packit 1fb8d4
			{
Packit Service 5a9772
				*((SSL**)ptr) = tls->ssl;
Packit 1fb8d4
				status = 1;
Packit 1fb8d4
			}
Packit 1fb8d4
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_C_SET_SSL:
Packit Service 5a9772
			BIO_set_shutdown(bio, (int)num);
Packit 1fb8d4
Packit 1fb8d4
			if (ptr)
Packit 1fb8d4
			{
Packit Service 5a9772
				tls->ssl = (SSL*)ptr;
Packit 1fb8d4
				ssl_rbio = SSL_get_rbio(tls->ssl);
Packit 1fb8d4
				ssl_wbio = SSL_get_wbio(tls->ssl);
Packit 1fb8d4
			}
Packit 1fb8d4
Packit 1fb8d4
			if (ssl_rbio)
Packit 1fb8d4
			{
Packit 1fb8d4
				if (next_bio)
Packit 1fb8d4
					BIO_push(ssl_rbio, next_bio);
Packit 1fb8d4
Packit 1fb8d4
				BIO_set_next(bio, ssl_rbio);
Packit 1fb8d4
#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
				CRYPTO_add(&(ssl_rbio->references), 1, CRYPTO_LOCK_BIO);
Packit 1fb8d4
#else
Packit 1fb8d4
				BIO_up_ref(ssl_rbio);
Packit 1fb8d4
#endif
Packit 1fb8d4
			}
Packit 1fb8d4
Packit 1fb8d4
			BIO_set_init(bio, 1);
Packit 1fb8d4
			status = 1;
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		case BIO_C_DO_STATE_MACHINE:
Packit 1fb8d4
			BIO_clear_flags(bio, BIO_FLAGS_READ | BIO_FLAGS_WRITE | BIO_FLAGS_IO_SPECIAL);
Packit 1fb8d4
			BIO_set_retry_reason(bio, 0);
Packit 1fb8d4
			status = SSL_do_handshake(tls->ssl);
Packit 1fb8d4
Packit 1fb8d4
			if (status <= 0)
Packit 1fb8d4
			{
Packit 1fb8d4
				switch (SSL_get_error(tls->ssl, status))
Packit 1fb8d4
				{
Packit 1fb8d4
					case SSL_ERROR_WANT_READ:
Packit 1fb8d4
						BIO_set_flags(bio, BIO_FLAGS_READ | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
						break;
Packit 1fb8d4
Packit 1fb8d4
					case SSL_ERROR_WANT_WRITE:
Packit 1fb8d4
						BIO_set_flags(bio, BIO_FLAGS_WRITE | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
						break;
Packit 1fb8d4
Packit 1fb8d4
					case SSL_ERROR_WANT_CONNECT:
Packit 1fb8d4
						BIO_set_flags(bio, BIO_FLAGS_IO_SPECIAL | BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
						BIO_set_retry_reason(bio, BIO_get_retry_reason(next_bio));
Packit 1fb8d4
						break;
Packit 1fb8d4
Packit 1fb8d4
					default:
Packit 1fb8d4
						BIO_clear_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
						break;
Packit 1fb8d4
				}
Packit 1fb8d4
			}
Packit 1fb8d4
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		default:
Packit 1fb8d4
			status = BIO_ctrl(ssl_rbio, cmd, num, ptr);
Packit 1fb8d4
			break;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static int bio_rdp_tls_new(BIO* bio)
Packit 1fb8d4
{
Packit 1fb8d4
	BIO_RDP_TLS* tls;
Packit 1fb8d4
	BIO_set_flags(bio, BIO_FLAGS_SHOULD_RETRY);
Packit 1fb8d4
Packit 1fb8d4
	if (!(tls = calloc(1, sizeof(BIO_RDP_TLS))))
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	InitializeCriticalSectionAndSpinCount(&tls->lock, 4000);
Packit Service 5a9772
	BIO_set_data(bio, (void*)tls);
Packit 1fb8d4
	return 1;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static int bio_rdp_tls_free(BIO* bio)
Packit 1fb8d4
{
Packit 1fb8d4
	BIO_RDP_TLS* tls;
Packit 1fb8d4
Packit 1fb8d4
	if (!bio)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit Service 5a9772
	tls = (BIO_RDP_TLS*)BIO_get_data(bio);
Packit 1fb8d4
Packit 1fb8d4
	if (!tls)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	if (BIO_get_shutdown(bio))
Packit 1fb8d4
	{
Packit 1fb8d4
		if (BIO_get_init(bio) && tls->ssl)
Packit 1fb8d4
		{
Packit 1fb8d4
			SSL_shutdown(tls->ssl);
Packit 1fb8d4
			SSL_free(tls->ssl);
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
		BIO_set_init(bio, 0);
Packit 1fb8d4
		BIO_set_flags(bio, 0);
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	DeleteCriticalSection(&tls->lock);
Packit 1fb8d4
	free(tls);
Packit 1fb8d4
	return 1;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static long bio_rdp_tls_callback_ctrl(BIO* bio, int cmd, bio_info_cb* fp)
Packit 1fb8d4
{
Packit Service 5a9772
	long status = 0;
Packit 1fb8d4
	BIO_RDP_TLS* tls;
Packit 1fb8d4
Packit 1fb8d4
	if (!bio)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit Service 5a9772
	tls = (BIO_RDP_TLS*)BIO_get_data(bio);
Packit 1fb8d4
Packit 1fb8d4
	if (!tls)
Packit 1fb8d4
		return 0;
Packit 1fb8d4
Packit 1fb8d4
	switch (cmd)
Packit 1fb8d4
	{
Packit 1fb8d4
		case BIO_CTRL_SET_CALLBACK:
Packit Service 5a9772
		{
Packit Service 5a9772
			typedef void (*fkt_t)(const SSL*, int, int);
Packit Service 5a9772
			/* Documented since https://www.openssl.org/docs/man1.1.1/man3/BIO_set_callback.html
Packit Service 5a9772
			 * the argument is not really of type bio_info_cb* and must be cast
Packit Service 5a9772
			 * to the required type */
Packit Service 5a9772
			fkt_t fkt = (fkt_t)(void*)fp;
Packit Service 5a9772
			SSL_set_info_callback(tls->ssl, fkt);
Packit 1fb8d4
			status = 1;
Packit Service 5a9772
		}
Packit Service 5a9772
		break;
Packit 1fb8d4
Packit 1fb8d4
		default:
Packit 1fb8d4
			status = BIO_callback_ctrl(SSL_get_rbio(tls->ssl), cmd, fp);
Packit 1fb8d4
			break;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
#define BIO_TYPE_RDP_TLS 68
Packit 1fb8d4
Packit 1fb8d4
static BIO_METHOD* BIO_s_rdp_tls(void)
Packit 1fb8d4
{
Packit 1fb8d4
	static BIO_METHOD* bio_methods = NULL;
Packit 1fb8d4
Packit 1fb8d4
	if (bio_methods == NULL)
Packit 1fb8d4
	{
Packit 1fb8d4
		if (!(bio_methods = BIO_meth_new(BIO_TYPE_RDP_TLS, "RdpTls")))
Packit 1fb8d4
			return NULL;
Packit 1fb8d4
Packit 1fb8d4
		BIO_meth_set_write(bio_methods, bio_rdp_tls_write);
Packit 1fb8d4
		BIO_meth_set_read(bio_methods, bio_rdp_tls_read);
Packit 1fb8d4
		BIO_meth_set_puts(bio_methods, bio_rdp_tls_puts);
Packit 1fb8d4
		BIO_meth_set_gets(bio_methods, bio_rdp_tls_gets);
Packit 1fb8d4
		BIO_meth_set_ctrl(bio_methods, bio_rdp_tls_ctrl);
Packit 1fb8d4
		BIO_meth_set_create(bio_methods, bio_rdp_tls_new);
Packit 1fb8d4
		BIO_meth_set_destroy(bio_methods, bio_rdp_tls_free);
Packit 1fb8d4
		BIO_meth_set_callback_ctrl(bio_methods, bio_rdp_tls_callback_ctrl);
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return bio_methods;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static BIO* BIO_new_rdp_tls(SSL_CTX* ctx, int client)
Packit 1fb8d4
{
Packit 1fb8d4
	BIO* bio;
Packit 1fb8d4
	SSL* ssl;
Packit 1fb8d4
	bio = BIO_new(BIO_s_rdp_tls());
Packit 1fb8d4
Packit 1fb8d4
	if (!bio)
Packit 1fb8d4
		return NULL;
Packit 1fb8d4
Packit 1fb8d4
	ssl = SSL_new(ctx);
Packit 1fb8d4
Packit 1fb8d4
	if (!ssl)
Packit 1fb8d4
	{
Packit 1fb8d4
		BIO_free_all(bio);
Packit 1fb8d4
		return NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (client)
Packit 1fb8d4
		SSL_set_connect_state(ssl);
Packit 1fb8d4
	else
Packit 1fb8d4
		SSL_set_accept_state(ssl);
Packit 1fb8d4
Packit 1fb8d4
	BIO_set_ssl(bio, ssl, BIO_CLOSE);
Packit 1fb8d4
	return bio;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static CryptoCert tls_get_certificate(rdpTls* tls, BOOL peer)
Packit 1fb8d4
{
Packit 1fb8d4
	CryptoCert cert;
Packit 1fb8d4
	X509* remote_cert;
Packit Service 5a9772
	STACK_OF(X509) * chain;
Packit 1fb8d4
Packit 1fb8d4
	if (peer)
Packit 1fb8d4
		remote_cert = SSL_get_peer_certificate(tls->ssl);
Packit 1fb8d4
	else
Packit 1fb8d4
		remote_cert = X509_dup(SSL_get_certificate(tls->ssl));
Packit 1fb8d4
Packit 1fb8d4
	if (!remote_cert)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "failed to get the server TLS certificate");
Packit 1fb8d4
		return NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	cert = malloc(sizeof(*cert));
Packit 1fb8d4
Packit 1fb8d4
	if (!cert)
Packit 1fb8d4
	{
Packit 1fb8d4
		X509_free(remote_cert);
Packit 1fb8d4
		return NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	cert->px509 = remote_cert;
Packit 1fb8d4
	/* Get the peer's chain. If it does not exist, we're setting NULL (clean data either way) */
Packit 1fb8d4
	chain = SSL_get_peer_cert_chain(tls->ssl);
Packit 1fb8d4
	cert->px509chain = chain;
Packit 1fb8d4
	return cert;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static void tls_free_certificate(CryptoCert cert)
Packit 1fb8d4
{
Packit 1fb8d4
	X509_free(cert->px509);
Packit 1fb8d4
	free(cert);
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
#define TLS_SERVER_END_POINT "tls-server-end-point:"
Packit 1fb8d4
Packit 1fb8d4
static SecPkgContext_Bindings* tls_get_channel_bindings(X509* cert)
Packit 1fb8d4
{
Packit 1fb8d4
	UINT32 CertificateHashLength;
Packit 1fb8d4
	BYTE* ChannelBindingToken;
Packit 1fb8d4
	UINT32 ChannelBindingTokenLength;
Packit 1fb8d4
	SEC_CHANNEL_BINDINGS* ChannelBindings;
Packit 1fb8d4
	SecPkgContext_Bindings* ContextBindings;
Packit 1fb8d4
	const size_t PrefixLength = strnlen(TLS_SERVER_END_POINT, ARRAYSIZE(TLS_SERVER_END_POINT));
Packit Service 5a9772
	BYTE* CertificateHash = crypto_cert_hash(cert, "sha256", &CertificateHashLength);
Packit Service 5a9772
	if (!CertificateHash)
Packit Service 5a9772
		return NULL;
Packit Service 5a9772
Packit 1fb8d4
	ChannelBindingTokenLength = PrefixLength + CertificateHashLength;
Packit Service 5a9772
	ContextBindings = (SecPkgContext_Bindings*)calloc(1, sizeof(SecPkgContext_Bindings));
Packit 1fb8d4
Packit 1fb8d4
	if (!ContextBindings)
Packit Service 5a9772
		goto out_free;
Packit 1fb8d4
Packit Service 5a9772
	ContextBindings->BindingsLength = sizeof(SEC_CHANNEL_BINDINGS) + ChannelBindingTokenLength;
Packit Service 5a9772
	ChannelBindings = (SEC_CHANNEL_BINDINGS*)calloc(1, ContextBindings->BindingsLength);
Packit 1fb8d4
Packit 1fb8d4
	if (!ChannelBindings)
Packit 1fb8d4
		goto out_free;
Packit 1fb8d4
Packit 1fb8d4
	ContextBindings->Bindings = ChannelBindings;
Packit 1fb8d4
	ChannelBindings->cbApplicationDataLength = ChannelBindingTokenLength;
Packit 1fb8d4
	ChannelBindings->dwApplicationDataOffset = sizeof(SEC_CHANNEL_BINDINGS);
Packit Service 5a9772
	ChannelBindingToken = &((BYTE*)ChannelBindings)[ChannelBindings->dwApplicationDataOffset];
Packit 1fb8d4
	memcpy(ChannelBindingToken, TLS_SERVER_END_POINT, PrefixLength);
Packit 1fb8d4
	memcpy(ChannelBindingToken + PrefixLength, CertificateHash, CertificateHashLength);
Packit Service 5a9772
	free(CertificateHash);
Packit 1fb8d4
	return ContextBindings;
Packit 1fb8d4
out_free:
Packit Service 5a9772
	free(CertificateHash);
Packit 1fb8d4
	free(ContextBindings);
Packit 1fb8d4
	return NULL;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
#if OPENSSL_VERSION_NUMBER >= 0x010000000L
Packit Service 5a9772
static BOOL tls_prepare(rdpTls* tls, BIO* underlying, const SSL_METHOD* method, int options,
Packit Service 5a9772
                        BOOL clientMode)
Packit 1fb8d4
#else
Packit Service 5a9772
static BOOL tls_prepare(rdpTls* tls, BIO* underlying, SSL_METHOD* method, int options,
Packit Service 5a9772
                        BOOL clientMode)
Packit 1fb8d4
#endif
Packit 1fb8d4
{
Packit 1fb8d4
	rdpSettings* settings = tls->settings;
Packit 1fb8d4
	tls->ctx = SSL_CTX_new(method);
Packit 1fb8d4
Packit 1fb8d4
	if (!tls->ctx)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "SSL_CTX_new failed");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	SSL_CTX_set_mode(tls->ctx, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER | SSL_MODE_ENABLE_PARTIAL_WRITE);
Packit 1fb8d4
	SSL_CTX_set_options(tls->ctx, options);
Packit 1fb8d4
	SSL_CTX_set_read_ahead(tls->ctx, 1);
Packit 1fb8d4
#if OPENSSL_VERSION_NUMBER >= 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
	SSL_CTX_set_min_proto_version(tls->ctx, TLS1_VERSION); /* min version */
Packit 1fb8d4
	SSL_CTX_set_max_proto_version(tls->ctx, 0); /* highest supported version by library */
Packit 1fb8d4
#endif
Packit Service 5a9772
#if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
	SSL_CTX_set_security_level(tls->ctx, settings->TlsSecLevel);
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
	if (settings->AllowedTlsCiphers)
Packit 1fb8d4
	{
Packit 1fb8d4
		if (!SSL_CTX_set_cipher_list(tls->ctx, settings->AllowedTlsCiphers))
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "SSL_CTX_set_cipher_list %s failed", settings->AllowedTlsCiphers);
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	tls->bio = BIO_new_rdp_tls(tls->ctx, clientMode);
Packit 1fb8d4
Packit 1fb8d4
	if (BIO_get_ssl(tls->bio, &tls->ssl) < 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "unable to retrieve the SSL of the connection");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	BIO_push(tls->bio, underlying);
Packit 1fb8d4
	tls->underlying = underlying;
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static int tls_do_handshake(rdpTls* tls, BOOL clientMode)
Packit 1fb8d4
{
Packit 1fb8d4
	CryptoCert cert;
Packit 1fb8d4
	int verify_status;
Packit 1fb8d4
Packit 1fb8d4
	do
Packit 1fb8d4
	{
Packit 1fb8d4
#ifdef HAVE_POLL_H
Packit 1fb8d4
		int fd;
Packit 1fb8d4
		int status;
Packit 1fb8d4
		struct pollfd pollfds;
Packit 1fb8d4
#elif !defined(_WIN32)
Packit 1fb8d4
		SOCKET fd;
Packit 1fb8d4
		int status;
Packit 1fb8d4
		fd_set rset;
Packit 1fb8d4
		struct timeval tv;
Packit 1fb8d4
#else
Packit 1fb8d4
		HANDLE event;
Packit 1fb8d4
		DWORD status;
Packit 1fb8d4
#endif
Packit 1fb8d4
		status = BIO_do_handshake(tls->bio);
Packit 1fb8d4
Packit 1fb8d4
		if (status == 1)
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		if (!BIO_should_retry(tls->bio))
Packit 1fb8d4
			return -1;
Packit 1fb8d4
Packit 1fb8d4
#ifndef _WIN32
Packit 1fb8d4
		/* we select() only for read even if we should test both read and write
Packit 1fb8d4
		 * depending of what have blocked */
Packit 1fb8d4
		fd = BIO_get_fd(tls->bio, NULL);
Packit 1fb8d4
Packit 1fb8d4
		if (fd < 0)
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "unable to retrieve BIO fd");
Packit 1fb8d4
			return -1;
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
#else
Packit 1fb8d4
		BIO_get_event(tls->bio, &event);
Packit 1fb8d4
Packit 1fb8d4
		if (!event)
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "unable to retrieve BIO event");
Packit 1fb8d4
			return -1;
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
#endif
Packit 1fb8d4
#ifdef HAVE_POLL_H
Packit 1fb8d4
		pollfds.fd = fd;
Packit 1fb8d4
		pollfds.events = POLLIN;
Packit 1fb8d4
		pollfds.revents = 0;
Packit 1fb8d4
Packit 1fb8d4
		do
Packit 1fb8d4
		{
Packit 1fb8d4
			status = poll(&pollfds, 1, 10);
Packit Service 5a9772
		} while ((status < 0) && (errno == EINTR));
Packit 1fb8d4
Packit 1fb8d4
#elif !defined(_WIN32)
Packit 1fb8d4
		FD_ZERO(&rset);
Packit 1fb8d4
		FD_SET(fd, &rset);
Packit 1fb8d4
		tv.tv_sec = 0;
Packit 1fb8d4
		tv.tv_usec = 10 * 1000; /* 10ms */
Packit 1fb8d4
		status = _select(fd + 1, &rset, NULL, NULL, &tv;;
Packit 1fb8d4
#else
Packit 1fb8d4
		status = WaitForSingleObject(event, 10);
Packit 1fb8d4
#endif
Packit 1fb8d4
#ifndef _WIN32
Packit 1fb8d4
Packit 1fb8d4
		if (status < 0)
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "error during select()");
Packit 1fb8d4
			return -1;
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
#else
Packit 1fb8d4
Packit 1fb8d4
		if ((status != WAIT_OBJECT_0) && (status != WAIT_TIMEOUT))
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_ERR(TAG, "error during WaitForSingleObject(): 0x%08" PRIX32 "", status);
Packit 1fb8d4
			return -1;
Packit 1fb8d4
		}
Packit 1fb8d4
Packit 1fb8d4
#endif
Packit Service 5a9772
	} while (TRUE);
Packit 1fb8d4
Packit 1fb8d4
	cert = tls_get_certificate(tls, clientMode);
Packit 1fb8d4
Packit 1fb8d4
	if (!cert)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "tls_get_certificate failed to return the server certificate.");
Packit 1fb8d4
		return -1;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	tls->Bindings = tls_get_channel_bindings(cert->px509);
Packit 1fb8d4
Packit 1fb8d4
	if (!tls->Bindings)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "unable to retrieve bindings");
Packit 1fb8d4
		verify_status = -1;
Packit 1fb8d4
		goto out;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (!crypto_cert_get_public_key(cert, &tls->PublicKey, &tls->PublicKeyLength))
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "crypto_cert_get_public_key failed to return the server public key.");
Packit 1fb8d4
		verify_status = -1;
Packit 1fb8d4
		goto out;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	/* server-side NLA needs public keys (keys from us, the server) but no certificate verify */
Packit 1fb8d4
	verify_status = 1;
Packit 1fb8d4
Packit 1fb8d4
	if (clientMode)
Packit 1fb8d4
	{
Packit 1fb8d4
		verify_status = tls_verify_certificate(tls, cert, tls->hostname, tls->port);
Packit 1fb8d4
Packit 1fb8d4
		if (verify_status < 1)
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "certificate not trusted, aborting.");
Packit 1fb8d4
			tls_send_alert(tls);
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
out:
Packit 1fb8d4
	tls_free_certificate(cert);
Packit 1fb8d4
	return verify_status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
int tls_connect(rdpTls* tls, BIO* underlying)
Packit 1fb8d4
{
Packit 1fb8d4
	int options = 0;
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_NO_COMPRESSION:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * The Microsoft RDP server does not advertise support
Packit 1fb8d4
	 * for TLS compression, but alternative servers may support it.
Packit 1fb8d4
	 * This was observed between early versions of the FreeRDP server
Packit 1fb8d4
	 * and the FreeRDP client, and caused major performance issues,
Packit 1fb8d4
	 * which is why we're disabling it.
Packit 1fb8d4
	 */
Packit 1fb8d4
#ifdef SSL_OP_NO_COMPRESSION
Packit 1fb8d4
	options |= SSL_OP_NO_COMPRESSION;
Packit 1fb8d4
#endif
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_TLS_BLOCK_PADDING_BUG:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * The Microsoft RDP server does *not* support TLS padding.
Packit 1fb8d4
	 * It absolutely needs to be disabled otherwise it won't work.
Packit 1fb8d4
	 */
Packit 1fb8d4
	options |= SSL_OP_TLS_BLOCK_PADDING_BUG;
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * Just like TLS padding, the Microsoft RDP server does not
Packit 1fb8d4
	 * support empty fragments. This needs to be disabled.
Packit 1fb8d4
	 */
Packit 1fb8d4
	options |= SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS;
Packit 1fb8d4
#if OPENSSL_VERSION_NUMBER < 0x10100000L || defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * disable SSLv2 and SSLv3
Packit 1fb8d4
	 */
Packit 1fb8d4
	options |= SSL_OP_NO_SSLv2;
Packit 1fb8d4
	options |= SSL_OP_NO_SSLv3;
Packit 1fb8d4
Packit 1fb8d4
	if (!tls_prepare(tls, underlying, SSLv23_client_method(), options, TRUE))
Packit 1fb8d4
#else
Packit 1fb8d4
	if (!tls_prepare(tls, underlying, TLS_client_method(), options, TRUE))
Packit 1fb8d4
#endif
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
#if !defined(OPENSSL_NO_TLSEXT) && !defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
	SSL_set_tlsext_host_name(tls->ssl, tls->hostname);
Packit 1fb8d4
#endif
Packit 1fb8d4
	return tls_do_handshake(tls, TRUE);
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
#if defined(MICROSOFT_IOS_SNI_BUG) && !defined(OPENSSL_NO_TLSEXT) && \
Packit Service 5a9772
    !defined(LIBRESSL_VERSION_NUMBER)
Packit Service 5a9772
static void tls_openssl_tlsext_debug_callback(SSL* s, int client_server, int type,
Packit Service 5a9772
                                              unsigned char* data, int len, void* arg)
Packit 1fb8d4
{
Packit 1fb8d4
	if (type == TLSEXT_TYPE_server_name)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_DBG(TAG, "Client uses SNI (extension disabled)");
Packit 1fb8d4
		s->servername_done = 2;
Packit 1fb8d4
	}
Packit 1fb8d4
}
Packit 1fb8d4
#endif
Packit 1fb8d4
Packit 1fb8d4
BOOL tls_accept(rdpTls* tls, BIO* underlying, rdpSettings* settings)
Packit 1fb8d4
{
Packit 1fb8d4
	long options = 0;
Packit 1fb8d4
	BIO* bio;
Packit Service 5a9772
	EVP_PKEY* privkey;
Packit 1fb8d4
	X509* x509;
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_NO_SSLv2:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * We only want SSLv3 and TLSv1, so disable SSLv2.
Packit 1fb8d4
	 * SSLv3 is used by, eg. Microsoft RDC for Mac OS X.
Packit 1fb8d4
	 */
Packit 1fb8d4
	options |= SSL_OP_NO_SSLv2;
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_NO_COMPRESSION:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * The Microsoft RDP server does not advertise support
Packit 1fb8d4
	 * for TLS compression, but alternative servers may support it.
Packit 1fb8d4
	 * This was observed between early versions of the FreeRDP server
Packit 1fb8d4
	 * and the FreeRDP client, and caused major performance issues,
Packit 1fb8d4
	 * which is why we're disabling it.
Packit 1fb8d4
	 */
Packit 1fb8d4
#ifdef SSL_OP_NO_COMPRESSION
Packit 1fb8d4
	options |= SSL_OP_NO_COMPRESSION;
Packit 1fb8d4
#endif
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_TLS_BLOCK_PADDING_BUG:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * The Microsoft RDP server does *not* support TLS padding.
Packit 1fb8d4
	 * It absolutely needs to be disabled otherwise it won't work.
Packit 1fb8d4
	 */
Packit 1fb8d4
	options |= SSL_OP_TLS_BLOCK_PADDING_BUG;
Packit 1fb8d4
	/**
Packit 1fb8d4
	 * SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS:
Packit 1fb8d4
	 *
Packit 1fb8d4
	 * Just like TLS padding, the Microsoft RDP server does not
Packit 1fb8d4
	 * support empty fragments. This needs to be disabled.
Packit 1fb8d4
	 */
Packit 1fb8d4
	options |= SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS;
Packit 1fb8d4
Packit 1fb8d4
	if (!tls_prepare(tls, underlying, SSLv23_server_method(), options, FALSE))
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	if (settings->PrivateKeyFile)
Packit 1fb8d4
	{
Packit 1fb8d4
		bio = BIO_new_file(settings->PrivateKeyFile, "rb");
Packit 1fb8d4
Packit 1fb8d4
		if (!bio)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_ERR(TAG, "BIO_new_file failed for private key %s", settings->PrivateKeyFile);
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
	else if (settings->PrivateKeyContent)
Packit 1fb8d4
	{
Packit Service 5a9772
		bio = BIO_new_mem_buf(settings->PrivateKeyContent, strlen(settings->PrivateKeyContent));
Packit 1fb8d4
Packit 1fb8d4
		if (!bio)
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "BIO_new_mem_buf failed for private key");
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "no private key defined");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	privkey = PEM_read_bio_PrivateKey(bio, NULL, NULL, NULL);
Packit 1fb8d4
	BIO_free_all(bio);
Packit 1fb8d4
Packit Service 5a9772
	if (!privkey)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "invalid private key");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	if (SSL_use_PrivateKey(tls->ssl, privkey) <= 0)
Packit 1fb8d4
	{
Packit Service 5a9772
		WLog_ERR(TAG, "SSL_CTX_use_PrivateKey_file failed");
Packit Service 5a9772
		EVP_PKEY_free(privkey);
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (settings->CertificateFile)
Packit 1fb8d4
	{
Packit 1fb8d4
		bio = BIO_new_file(settings->CertificateFile, "rb");
Packit 1fb8d4
Packit 1fb8d4
		if (!bio)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_ERR(TAG, "BIO_new_file failed for certificate %s", settings->CertificateFile);
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
	else if (settings->CertificateContent)
Packit 1fb8d4
	{
Packit Service 5a9772
		bio = BIO_new_mem_buf(settings->CertificateContent, strlen(settings->CertificateContent));
Packit 1fb8d4
Packit 1fb8d4
		if (!bio)
Packit 1fb8d4
		{
Packit 1fb8d4
			WLog_ERR(TAG, "BIO_new_mem_buf failed for certificate");
Packit 1fb8d4
			return FALSE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "no certificate defined");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	x509 = PEM_read_bio_X509(bio, NULL, NULL, 0);
Packit 1fb8d4
	BIO_free_all(bio);
Packit 1fb8d4
Packit 1fb8d4
	if (!x509)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "invalid certificate");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (SSL_use_certificate(tls->ssl, x509) <= 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "SSL_use_certificate_file failed");
Packit 1fb8d4
		X509_free(x509);
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
#if defined(MICROSOFT_IOS_SNI_BUG) && !defined(OPENSSL_NO_TLSEXT) && \
Packit Service 5a9772
    !defined(LIBRESSL_VERSION_NUMBER)
Packit 1fb8d4
	SSL_set_tlsext_debug_callback(tls->ssl, tls_openssl_tlsext_debug_callback);
Packit 1fb8d4
#endif
Packit 1fb8d4
	return tls_do_handshake(tls, FALSE) > 0;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
BOOL tls_send_alert(rdpTls* tls)
Packit 1fb8d4
{
Packit 1fb8d4
	if (!tls)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	if (!tls->ssl)
Packit 1fb8d4
		return TRUE;
Packit 1fb8d4
Packit Service 5a9772
		/**
Packit Service 5a9772
		 * FIXME: The following code does not work on OpenSSL > 1.1.0 because the
Packit Service 5a9772
		 *        SSL struct is opaqe now
Packit Service 5a9772
		 */
Packit Service 5a9772
#if (!defined(LIBRESSL_VERSION_NUMBER) && (OPENSSL_VERSION_NUMBER < 0x10100000L)) || \
Packit Service 5a9772
    (defined(LIBRESSL_VERSION_NUMBER) && (LIBRESSL_VERSION_NUMBER <= 0x2080300fL))
Packit 1fb8d4
Packit 1fb8d4
	if (tls->alertDescription != TLS_ALERT_DESCRIPTION_CLOSE_NOTIFY)
Packit 1fb8d4
	{
Packit 1fb8d4
		/**
Packit 1fb8d4
		 * OpenSSL doesn't really expose an API for sending a TLS alert manually.
Packit 1fb8d4
		 *
Packit 1fb8d4
		 * The following code disables the sending of the default "close notify"
Packit 1fb8d4
		 * and then proceeds to force sending a custom TLS alert before shutting down.
Packit 1fb8d4
		 *
Packit 1fb8d4
		 * Manually sending a TLS alert is necessary in certain cases,
Packit 1fb8d4
		 * like when server-side NLA results in an authentication failure.
Packit 1fb8d4
		 */
Packit 1fb8d4
		SSL_SESSION* ssl_session = SSL_get_session(tls->ssl);
Packit 1fb8d4
		SSL_CTX* ssl_ctx = SSL_get_SSL_CTX(tls->ssl);
Packit 1fb8d4
		SSL_set_quiet_shutdown(tls->ssl, 1);
Packit 1fb8d4
Packit 1fb8d4
		if ((tls->alertLevel == TLS_ALERT_LEVEL_FATAL) && (ssl_session))
Packit 1fb8d4
			SSL_CTX_remove_session(ssl_ctx, ssl_session);
Packit 1fb8d4
Packit 1fb8d4
		tls->ssl->s3->alert_dispatch = 1;
Packit 1fb8d4
		tls->ssl->s3->send_alert[0] = tls->alertLevel;
Packit 1fb8d4
		tls->ssl->s3->send_alert[1] = tls->alertDescription;
Packit 1fb8d4
Packit 1fb8d4
		if (tls->ssl->s3->wbuf.left == 0)
Packit 1fb8d4
			tls->ssl->method->ssl_dispatch_alert(tls->ssl);
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
#endif
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
int tls_write_all(rdpTls* tls, const BYTE* data, int length)
Packit 1fb8d4
{
Packit 1fb8d4
	int status;
Packit 1fb8d4
	int offset = 0;
Packit 1fb8d4
	BIO* bio = tls->bio;
Packit 1fb8d4
Packit 1fb8d4
	while (offset < length)
Packit 1fb8d4
	{
Packit 1fb8d4
		status = BIO_write(bio, &data[offset], length - offset);
Packit 1fb8d4
Packit 1fb8d4
		if (status > 0)
Packit 1fb8d4
		{
Packit 1fb8d4
			offset += status;
Packit 1fb8d4
		}
Packit 1fb8d4
		else
Packit 1fb8d4
		{
Packit 1fb8d4
			if (!BIO_should_retry(bio))
Packit 1fb8d4
				return -1;
Packit 1fb8d4
Packit 1fb8d4
			if (BIO_write_blocked(bio))
Packit 1fb8d4
				status = BIO_wait_write(bio, 100);
Packit 1fb8d4
			else if (BIO_read_blocked(bio))
Packit 1fb8d4
				status = BIO_wait_read(bio, 100);
Packit 1fb8d4
			else
Packit 1fb8d4
				USleep(100);
Packit 1fb8d4
Packit 1fb8d4
			if (status < 0)
Packit 1fb8d4
				return -1;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return length;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
int tls_set_alert_code(rdpTls* tls, int level, int description)
Packit 1fb8d4
{
Packit 1fb8d4
	tls->alertLevel = level;
Packit 1fb8d4
	tls->alertDescription = description;
Packit 1fb8d4
	return 0;
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
static BOOL tls_match_hostname(const char* pattern, const size_t pattern_length,
Packit Service 5a9772
                               const char* hostname)
Packit 1fb8d4
{
Packit 1fb8d4
	if (strlen(hostname) == pattern_length)
Packit 1fb8d4
	{
Packit 1fb8d4
		if (_strnicmp(hostname, pattern, pattern_length) == 0)
Packit 1fb8d4
			return TRUE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	if ((pattern_length > 2) && (pattern[0] == '*') && (pattern[1] == '.') &&
Packit Service 5a9772
	    ((strlen(hostname)) >= pattern_length))
Packit 1fb8d4
	{
Packit Service 5a9772
		const char* check_hostname = &hostname[strlen(hostname) - pattern_length + 1];
Packit 1fb8d4
Packit 1fb8d4
		if (_strnicmp(check_hostname, &pattern[1], pattern_length - 1) == 0)
Packit 1fb8d4
		{
Packit 1fb8d4
			return TRUE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return FALSE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static BOOL is_redirected(rdpTls* tls)
Packit 1fb8d4
{
Packit 1fb8d4
	rdpSettings* settings = tls->settings;
Packit 1fb8d4
Packit 1fb8d4
	if (LB_NOREDIRECT & settings->RedirectionFlags)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	return settings->RedirectionFlags != 0;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static BOOL is_accepted(rdpTls* tls, const BYTE* pem, size_t length)
Packit 1fb8d4
{
Packit 1fb8d4
	rdpSettings* settings = tls->settings;
Packit 1fb8d4
	char* AccpetedKey;
Packit 1fb8d4
	UINT32 AcceptedKeyLength;
Packit 1fb8d4
Packit 1fb8d4
	if (tls->isGatewayTransport)
Packit 1fb8d4
	{
Packit 1fb8d4
		AccpetedKey = settings->GatewayAcceptedCert;
Packit 1fb8d4
		AcceptedKeyLength = settings->GatewayAcceptedCertLength;
Packit 1fb8d4
	}
Packit 1fb8d4
	else if (is_redirected(tls))
Packit 1fb8d4
	{
Packit 1fb8d4
		AccpetedKey = settings->RedirectionAcceptedCert;
Packit 1fb8d4
		AcceptedKeyLength = settings->RedirectionAcceptedCertLength;
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
	{
Packit 1fb8d4
		AccpetedKey = settings->AcceptedCert;
Packit 1fb8d4
		AcceptedKeyLength = settings->AcceptedCertLength;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (AcceptedKeyLength > 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		if (AcceptedKeyLength == length)
Packit 1fb8d4
		{
Packit 1fb8d4
			if (memcmp(AccpetedKey, pem, AcceptedKeyLength) == 0)
Packit 1fb8d4
				return TRUE;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (tls->isGatewayTransport)
Packit 1fb8d4
	{
Packit 1fb8d4
		free(settings->GatewayAcceptedCert);
Packit 1fb8d4
		settings->GatewayAcceptedCert = NULL;
Packit 1fb8d4
		settings->GatewayAcceptedCertLength = 0;
Packit 1fb8d4
	}
Packit 1fb8d4
	else if (is_redirected(tls))
Packit 1fb8d4
	{
Packit 1fb8d4
		free(settings->RedirectionAcceptedCert);
Packit 1fb8d4
		settings->RedirectionAcceptedCert = NULL;
Packit 1fb8d4
		settings->RedirectionAcceptedCertLength = 0;
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
	{
Packit 1fb8d4
		free(settings->AcceptedCert);
Packit 1fb8d4
		settings->AcceptedCert = NULL;
Packit 1fb8d4
		settings->AcceptedCertLength = 0;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return FALSE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
static BOOL is_accepted_fingerprint(CryptoCert cert, const char* CertificateAcceptedFingerprints)
Packit Service 5a9772
{
Packit Service 5a9772
	BOOL rc = FALSE;
Packit Service 5a9772
	if (CertificateAcceptedFingerprints)
Packit Service 5a9772
	{
Packit Service 5a9772
		char* context = NULL;
Packit Service 5a9772
		char* copy = _strdup(CertificateAcceptedFingerprints);
Packit Service 5a9772
		char* cur = strtok_s(copy, ",", &context);
Packit Service 5a9772
		while (cur)
Packit Service 5a9772
		{
Packit Service 5a9772
			char* subcontext = NULL;
Packit Service 5a9772
			BOOL equal;
Packit Service 5a9772
			char* strhash;
Packit Service 5a9772
			const char* h = strtok_s(cur, ":", &subcontext);
Packit Service 5a9772
			const char* fp;
Packit Service 5a9772
Packit Service 5a9772
			if (!h)
Packit Service 5a9772
				continue;
Packit Service 5a9772
Packit Service 5a9772
			fp = h + strlen(h) + 1;
Packit Service 5a9772
			if (!fp)
Packit Service 5a9772
				continue;
Packit Service 5a9772
Packit Service 5a9772
			strhash = crypto_cert_fingerprint_by_hash(cert->px509, h);
Packit Service 5a9772
			if (!strhash)
Packit Service 5a9772
				continue;
Packit Service 5a9772
Packit Service 5a9772
			equal = (_stricmp(strhash, fp) == 0);
Packit Service 5a9772
			free(strhash);
Packit Service 5a9772
			if (equal)
Packit Service 5a9772
			{
Packit Service 5a9772
				rc = TRUE;
Packit Service 5a9772
				break;
Packit Service 5a9772
			}
Packit Service 5a9772
Packit Service 5a9772
			cur = strtok_s(NULL, ",", &context);
Packit Service 5a9772
		}
Packit Service 5a9772
		free(copy);
Packit Service 5a9772
	}
Packit Service 5a9772
Packit Service 5a9772
	return rc;
Packit Service 5a9772
}
Packit Service 5a9772
Packit Service 5a9772
static BOOL accept_cert(rdpTls* tls, const BYTE* pem, UINT32 length)
Packit 1fb8d4
{
Packit 1fb8d4
	rdpSettings* settings = tls->settings;
Packit Service 5a9772
	char* dupPem = _strdup((const char*)pem);
Packit Service 5a9772
Packit Service 5a9772
	if (!dupPem)
Packit Service 5a9772
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	if (tls->isGatewayTransport)
Packit 1fb8d4
	{
Packit Service 5a9772
		settings->GatewayAcceptedCert = dupPem;
Packit 1fb8d4
		settings->GatewayAcceptedCertLength = length;
Packit 1fb8d4
	}
Packit 1fb8d4
	else if (is_redirected(tls))
Packit 1fb8d4
	{
Packit Service 5a9772
		settings->RedirectionAcceptedCert = dupPem;
Packit 1fb8d4
		settings->RedirectionAcceptedCertLength = length;
Packit 1fb8d4
	}
Packit 1fb8d4
	else
Packit 1fb8d4
	{
Packit Service 5a9772
		settings->AcceptedCert = dupPem;
Packit 1fb8d4
		settings->AcceptedCertLength = length;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	return TRUE;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
static BOOL tls_extract_pem(CryptoCert cert, BYTE** PublicKey, DWORD* PublicKeyLength)
Packit 1fb8d4
{
Packit 1fb8d4
	BIO* bio;
Packit Service 5a9772
	int status, count, x;
Packit 1fb8d4
	size_t offset;
Packit Service 5a9772
	size_t length = 0;
Packit 1fb8d4
	BOOL rc = FALSE;
Packit 1fb8d4
	BYTE* pemCert = NULL;
Packit 1fb8d4
Packit 1fb8d4
	if (!PublicKey || !PublicKeyLength)
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
Packit 1fb8d4
	*PublicKey = NULL;
Packit 1fb8d4
	*PublicKeyLength = 0;
Packit 1fb8d4
	/**
Packit Service 5a9772
	 * Don't manage certificates internally, leave it up entirely to the external client
Packit Service 5a9772
	 * implementation
Packit 1fb8d4
	 */
Packit 1fb8d4
	bio = BIO_new(BIO_s_mem());
Packit 1fb8d4
Packit 1fb8d4
	if (!bio)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "BIO_new() failure");
Packit 1fb8d4
		return FALSE;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	status = PEM_write_bio_X509(bio, cert->px509);
Packit 1fb8d4
Packit 1fb8d4
	if (status < 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "PEM_write_bio_X509 failure: %d", status);
Packit 1fb8d4
		goto fail;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	if (cert->px509chain)
Packit Service 5a9772
	{
Packit Service 5a9772
		count = sk_X509_num(cert->px509chain);
Packit Service 5a9772
		for (x = 0; x < count; x++)
Packit Service 5a9772
		{
Packit Service 5a9772
			X509* c = sk_X509_value(cert->px509chain, x);
Packit Service 5a9772
			status = PEM_write_bio_X509(bio, c);
Packit Service 5a9772
			if (status < 0)
Packit Service 5a9772
			{
Packit Service 5a9772
				WLog_ERR(TAG, "PEM_write_bio_X509 failure: %d", status);
Packit Service 5a9772
				goto fail;
Packit Service 5a9772
			}
Packit Service 5a9772
		}
Packit Service 5a9772
	}
Packit Service 5a9772
Packit 1fb8d4
	offset = 0;
Packit 1fb8d4
	length = 2048;
Packit Service 5a9772
	pemCert = (BYTE*)malloc(length + 1);
Packit 1fb8d4
Packit 1fb8d4
	if (!pemCert)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "error allocating pemCert");
Packit 1fb8d4
		goto fail;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	status = BIO_read(bio, pemCert, length);
Packit 1fb8d4
Packit 1fb8d4
	if (status < 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "failed to read certificate");
Packit 1fb8d4
		goto fail;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	offset += (size_t)status;
Packit 1fb8d4
Packit 1fb8d4
	while (offset >= length)
Packit 1fb8d4
	{
Packit 1fb8d4
		int new_len;
Packit 1fb8d4
		BYTE* new_cert;
Packit 1fb8d4
		new_len = length * 2;
Packit Service 5a9772
		new_cert = (BYTE*)realloc(pemCert, new_len + 1);
Packit 1fb8d4
Packit 1fb8d4
		if (!new_cert)
Packit 1fb8d4
			goto fail;
Packit 1fb8d4
Packit 1fb8d4
		length = new_len;
Packit 1fb8d4
		pemCert = new_cert;
Packit 1fb8d4
		status = BIO_read(bio, &pemCert[offset], length - offset);
Packit 1fb8d4
Packit 1fb8d4
		if (status < 0)
Packit 1fb8d4
			break;
Packit 1fb8d4
Packit 1fb8d4
		offset += status;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (status < 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		WLog_ERR(TAG, "failed to read certificate");
Packit 1fb8d4
		goto fail;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	length = offset;
Packit 1fb8d4
	pemCert[length] = '\0';
Packit 1fb8d4
	*PublicKey = pemCert;
Packit 1fb8d4
	*PublicKeyLength = length;
Packit 1fb8d4
	rc = TRUE;
Packit 1fb8d4
fail:
Packit 1fb8d4
Packit 1fb8d4
	if (!rc)
Packit 1fb8d4
		free(pemCert);
Packit 1fb8d4
Packit 1fb8d4
	BIO_free_all(bio);
Packit 1fb8d4
	return rc;
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
int tls_verify_certificate(rdpTls* tls, CryptoCert cert, const char* hostname, UINT16 port)
Packit 1fb8d4
{
Packit 1fb8d4
	int match;
Packit 1fb8d4
	int index;
Packit Service 5a9772
	DWORD length;
Packit Service 5a9772
	BOOL certificate_status;
Packit 1fb8d4
	char* common_name = NULL;
Packit 1fb8d4
	int common_name_length = 0;
Packit 1fb8d4
	char** dns_names = 0;
Packit 1fb8d4
	int dns_names_count = 0;
Packit 1fb8d4
	int* dns_names_lengths = NULL;
Packit Service 5a9772
	int verification_status = -1;
Packit 1fb8d4
	BOOL hostname_match = FALSE;
Packit Service 5a9772
	rdpCertificateData* certificate_data = NULL;
Packit Service 5a9772
	freerdp* instance = (freerdp*)tls->settings->instance;
Packit Service 5a9772
	BYTE* pemCert = NULL;
Packit Service 5a9772
	DWORD flags = VERIFY_CERT_FLAG_NONE;
Packit 1fb8d4
Packit Service 5a9772
	if (freerdp_shall_disconnect(instance))
Packit 1fb8d4
		return -1;
Packit 1fb8d4
Packit Service 5a9772
	if (!tls_extract_pem(cert, &pemCert, &length))
Packit Service 5a9772
		goto end;
Packit Service 5a9772
Packit 1fb8d4
	/* Check, if we already accepted this key. */
Packit 1fb8d4
	if (is_accepted(tls, pemCert, length))
Packit 1fb8d4
	{
Packit Service 5a9772
		verification_status = 1;
Packit Service 5a9772
		goto end;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
	if (is_accepted_fingerprint(cert, tls->settings->CertificateAcceptedFingerprints))
Packit 1fb8d4
	{
Packit Service 5a9772
		verification_status = 1;
Packit Service 5a9772
		goto end;
Packit Service 5a9772
	}
Packit 1fb8d4
Packit Service 5a9772
	if (tls->isGatewayTransport || is_redirected(tls))
Packit Service 5a9772
		flags |= VERIFY_CERT_FLAG_LEGACY;
Packit Service 5a9772
Packit Service 5a9772
	if (tls->isGatewayTransport)
Packit Service 5a9772
		flags |= VERIFY_CERT_FLAG_GATEWAY;
Packit Service 5a9772
Packit Service 5a9772
	if (is_redirected(tls))
Packit Service 5a9772
		flags |= VERIFY_CERT_FLAG_REDIRECT;
Packit Service 5a9772
Packit Service 5a9772
	/* Certificate management is done by the application */
Packit Service 5a9772
	if (tls->settings->ExternalCertificateManagement)
Packit Service 5a9772
	{
Packit 1fb8d4
		if (instance->VerifyX509Certificate)
Packit Service 5a9772
			verification_status =
Packit Service 5a9772
			    instance->VerifyX509Certificate(instance, pemCert, length, hostname, port, flags);
Packit 1fb8d4
		else
Packit 1fb8d4
			WLog_ERR(TAG, "No VerifyX509Certificate callback registered!");
Packit 1fb8d4
Packit Service 5a9772
		if (verification_status > 0)
Packit 1fb8d4
			accept_cert(tls, pemCert, length);
Packit Service 5a9772
		else if (verification_status < 0)
Packit 1fb8d4
		{
Packit Service 5a9772
			WLog_ERR(TAG, "VerifyX509Certificate failed: (length = %d) status: [%d] %s", length,
Packit Service 5a9772
			         verification_status, pemCert);
Packit Service 5a9772
			goto end;
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
	/* ignore certificate verification if user explicitly required it (discouraged) */
Packit Service 5a9772
	else if (tls->settings->IgnoreCertificate)
Packit Service 5a9772
		verification_status = 1; /* success! */
Packit Service 5a9772
	else if (!tls->isGatewayTransport && (tls->settings->AuthenticationLevel == 0))
Packit Service 5a9772
		verification_status = 1; /* success! */
Packit Service 5a9772
	else
Packit 1fb8d4
	{
Packit Service 5a9772
		/* if user explicitly specified a certificate name, use it instead of the hostname */
Packit Service 5a9772
		if (!tls->isGatewayTransport && tls->settings->CertificateName)
Packit Service 5a9772
			hostname = tls->settings->CertificateName;
Packit 1fb8d4
Packit Service 5a9772
		/* attempt verification using OpenSSL and the ~/.freerdp/certs certificate store */
Packit Service 5a9772
		certificate_status = x509_verify_certificate(cert, tls->certificate_store->path);
Packit Service 5a9772
		/* verify certificate name match */
Packit Service 5a9772
		certificate_data = crypto_get_certificate_data(cert->px509, hostname, port);
Packit Service 5a9772
		/* extra common name and alternative names */
Packit Service 5a9772
		common_name = crypto_cert_subject_common_name(cert->px509, &common_name_length);
Packit Service 5a9772
		dns_names = crypto_cert_get_dns_names(cert->px509, &dns_names_count, &dns_names_lengths);
Packit 1fb8d4
Packit Service 5a9772
		/* compare against common name */
Packit 1fb8d4
Packit Service 5a9772
		if (common_name)
Packit Service 5a9772
		{
Packit Service 5a9772
			if (tls_match_hostname(common_name, common_name_length, hostname))
Packit Service 5a9772
				hostname_match = TRUE;
Packit Service 5a9772
		}
Packit 1fb8d4
Packit Service 5a9772
		/* compare against alternative names */
Packit 1fb8d4
Packit Service 5a9772
		if (dns_names)
Packit 1fb8d4
		{
Packit Service 5a9772
			for (index = 0; index < dns_names_count; index++)
Packit 1fb8d4
			{
Packit Service 5a9772
				if (tls_match_hostname(dns_names[index], dns_names_lengths[index], hostname))
Packit Service 5a9772
				{
Packit Service 5a9772
					hostname_match = TRUE;
Packit Service 5a9772
					break;
Packit Service 5a9772
				}
Packit 1fb8d4
			}
Packit 1fb8d4
		}
Packit 1fb8d4
Packit Service 5a9772
		/* if the certificate is valid and the certificate name matches, verification succeeds
Packit Service 5a9772
		 */
Packit Service 5a9772
		if (certificate_status && hostname_match)
Packit Service 5a9772
			verification_status = 1; /* success! */
Packit 1fb8d4
Packit Service 5a9772
		if (!hostname_match)
Packit Service 5a9772
			flags |= VERIFY_CERT_FLAG_MISMATCH;
Packit Service 5a9772
Packit Service 5a9772
		/* verification could not succeed with OpenSSL, use known_hosts file and prompt user for
Packit Service 5a9772
		 * manual verification */
Packit Service 5a9772
		if (!certificate_status || !hostname_match)
Packit 1fb8d4
		{
Packit Service 5a9772
			char* issuer;
Packit Service 5a9772
			char* subject;
Packit Service 5a9772
			char* fingerprint;
Packit Service 5a9772
			DWORD accept_certificate = 0;
Packit Service 5a9772
			issuer = crypto_cert_issuer(cert->px509);
Packit Service 5a9772
			subject = crypto_cert_subject(cert->px509);
Packit Service 5a9772
			fingerprint = crypto_cert_fingerprint(cert->px509);
Packit Service 5a9772
			/* search for matching entry in known_hosts file */
Packit Service 5a9772
			match = certificate_data_match(tls->certificate_store, certificate_data);
Packit 1fb8d4
			{
Packit Service 5a9772
				int match_old = -1;
Packit Service 5a9772
				char* sha1 = crypto_cert_fingerprint_by_hash(cert->px509, "sha1");
Packit Service 5a9772
				rdpCertificateData* certificate_data_sha1 =
Packit Service 5a9772
				    certificate_data_new(hostname, port, subject, issuer, sha1);
Packit 1fb8d4
Packit Service 5a9772
				if (sha1 && certificate_data_sha1)
Packit Service 5a9772
					match_old =
Packit Service 5a9772
					    certificate_data_match(tls->certificate_store, certificate_data_sha1);
Packit 1fb8d4
Packit Service 5a9772
				if (match_old == 0)
Packit Service 5a9772
					flags |= VERIFY_CERT_FLAG_MATCH_LEGACY_SHA1;
Packit 1fb8d4
Packit Service 5a9772
				certificate_data_free(certificate_data_sha1);
Packit Service 5a9772
				free(sha1);
Packit 1fb8d4
			}
Packit Service 5a9772
Packit Service 5a9772
			if (match == 1)
Packit 1fb8d4
			{
Packit Service 5a9772
				/* no entry was found in known_hosts file, prompt user for manual verification
Packit Service 5a9772
				 */
Packit Service 5a9772
				if (!hostname_match)
Packit Service 5a9772
					tls_print_certificate_name_mismatch_error(hostname, port, common_name,
Packit Service 5a9772
					                                          dns_names, dns_names_count);
Packit Service 5a9772
Packit Service 5a9772
				/* Automatically accept certificate on first use */
Packit Service 5a9772
				if (tls->settings->AutoAcceptCertificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					WLog_INFO(TAG, "No certificate stored, automatically accepting.");
Packit Service 5a9772
					accept_certificate = 1;
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (tls->settings->AutoDenyCertificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					WLog_INFO(TAG, "No certificate stored, automatically denying.");
Packit Service 5a9772
					accept_certificate = 0;
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (instance->VerifyX509Certificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					int rc = instance->VerifyX509Certificate(instance, pemCert, length, hostname,
Packit Service 5a9772
					                                         port, flags);
Packit Service 5a9772
Packit Service 5a9772
					if (rc == 1)
Packit Service 5a9772
						accept_certificate = 1;
Packit Service 5a9772
					else if (rc > 1)
Packit Service 5a9772
						accept_certificate = 2;
Packit Service 5a9772
					else
Packit Service 5a9772
						accept_certificate = 0;
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (instance->VerifyCertificateEx)
Packit Service 5a9772
				{
Packit Service 5a9772
					accept_certificate = instance->VerifyCertificateEx(
Packit Service 5a9772
					    instance, hostname, port, common_name, subject, issuer, fingerprint, flags);
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (instance->VerifyCertificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					WLog_WARN(TAG, "The VerifyCertificate callback is deprecated, migrate your "
Packit Service 5a9772
					               "application to VerifyCertificateEx");
Packit Service 5a9772
					accept_certificate = instance->VerifyCertificate(
Packit Service 5a9772
					    instance, common_name, subject, issuer, fingerprint, !hostname_match);
Packit Service 5a9772
				}
Packit 1fb8d4
			}
Packit Service 5a9772
			else if (match == -1)
Packit Service 5a9772
			{
Packit Service 5a9772
				char* old_subject = NULL;
Packit Service 5a9772
				char* old_issuer = NULL;
Packit Service 5a9772
				char* old_fingerprint = NULL;
Packit Service 5a9772
				/* entry was found in known_hosts file, but fingerprint does not match. ask user
Packit Service 5a9772
				 * to use it */
Packit Service 5a9772
				tls_print_certificate_error(hostname, port, fingerprint,
Packit Service 5a9772
				                            tls->certificate_store->file);
Packit Service 5a9772
Packit Service 5a9772
				if (!certificate_get_stored_data(tls->certificate_store, certificate_data,
Packit Service 5a9772
				                                 &old_subject, &old_issuer, &old_fingerprint))
Packit Service 5a9772
					WLog_WARN(TAG, "Failed to get certificate entry for %s:%d", hostname, port);
Packit Service 5a9772
Packit Service 5a9772
				if (tls->settings->AutoDenyCertificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					WLog_INFO(TAG, "No certificate stored, automatically denying.");
Packit Service 5a9772
					accept_certificate = 0;
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (instance->VerifyX509Certificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					const int rc =
Packit Service 5a9772
					    instance->VerifyX509Certificate(instance, pemCert, length, hostname, port,
Packit Service 5a9772
					                                    flags | VERIFY_CERT_FLAG_CHANGED);
Packit Service 5a9772
Packit Service 5a9772
					if (rc == 1)
Packit Service 5a9772
						accept_certificate = 1;
Packit Service 5a9772
					else if (rc > 1)
Packit Service 5a9772
						accept_certificate = 2;
Packit Service 5a9772
					else
Packit Service 5a9772
						accept_certificate = 0;
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (instance->VerifyChangedCertificateEx)
Packit Service 5a9772
				{
Packit Service 5a9772
					accept_certificate = instance->VerifyChangedCertificateEx(
Packit Service 5a9772
					    instance, hostname, port, common_name, subject, issuer, fingerprint,
Packit Service 5a9772
					    old_subject, old_issuer, old_fingerprint, flags | VERIFY_CERT_FLAG_CHANGED);
Packit Service 5a9772
				}
Packit Service 5a9772
				else if (instance->VerifyChangedCertificate)
Packit Service 5a9772
				{
Packit Service 5a9772
					WLog_WARN(TAG, "The VerifyChangedCertificate callback is deprecated, migrate "
Packit Service 5a9772
					               "your application to VerifyChangedCertificateEx");
Packit Service 5a9772
					accept_certificate = instance->VerifyChangedCertificate(
Packit Service 5a9772
					    instance, common_name, subject, issuer, fingerprint, old_subject,
Packit Service 5a9772
					    old_issuer, old_fingerprint);
Packit Service 5a9772
				}
Packit 1fb8d4
Packit Service 5a9772
				free(old_subject);
Packit Service 5a9772
				free(old_issuer);
Packit Service 5a9772
				free(old_fingerprint);
Packit Service 5a9772
			}
Packit Service 5a9772
			else if (match == 0)
Packit Service 5a9772
				accept_certificate = 2; /* success! */
Packit 1fb8d4
Packit Service 5a9772
			/* Save certificate or do a simple accept / reject */
Packit 1fb8d4
			switch (accept_certificate)
Packit 1fb8d4
			{
Packit 1fb8d4
				case 1:
Packit Service 5a9772
Packit 1fb8d4
					/* user accepted certificate, add entry in known_hosts file */
Packit Service 5a9772
					if (match < 0)
Packit Service 5a9772
						verification_status =
Packit Service 5a9772
						    certificate_data_replace(tls->certificate_store, certificate_data) ? 1
Packit Service 5a9772
						                                                                       : -1;
Packit Service 5a9772
					else
Packit Service 5a9772
						verification_status =
Packit Service 5a9772
						    certificate_data_print(tls->certificate_store, certificate_data) ? 1
Packit Service 5a9772
						                                                                     : -1;
Packit Service 5a9772
Packit 1fb8d4
					break;
Packit 1fb8d4
Packit 1fb8d4
				case 2:
Packit 1fb8d4
					/* user did accept temporaty, do not add to known hosts file */
Packit Service 5a9772
					verification_status = 1;
Packit 1fb8d4
					break;
Packit 1fb8d4
Packit 1fb8d4
				default:
Packit 1fb8d4
					/* user did not accept, abort and do not add entry in known_hosts file */
Packit Service 5a9772
					verification_status = -1; /* failure! */
Packit 1fb8d4
					break;
Packit 1fb8d4
			}
Packit Service 5a9772
Packit Service 5a9772
			free(issuer);
Packit Service 5a9772
			free(subject);
Packit Service 5a9772
			free(fingerprint);
Packit 1fb8d4
		}
Packit 1fb8d4
Packit Service 5a9772
		if (verification_status > 0)
Packit Service 5a9772
			accept_cert(tls, pemCert, length);
Packit 1fb8d4
	}
Packit 1fb8d4
Packit Service 5a9772
end:
Packit 1fb8d4
	certificate_data_free(certificate_data);
Packit 1fb8d4
	free(common_name);
Packit 1fb8d4
Packit 1fb8d4
	if (dns_names)
Packit Service 5a9772
		crypto_cert_dns_names_free(dns_names_count, dns_names_lengths, dns_names);
Packit 1fb8d4
Packit Service 5a9772
	free(pemCert);
Packit Service 5a9772
	return verification_status;
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
void tls_print_certificate_error(const char* hostname, UINT16 port, const char* fingerprint,
Packit Service 5a9772
                                 const char* hosts_file)
Packit 1fb8d4
{
Packit Service 5a9772
	WLog_ERR(TAG, "The host key for %s:%" PRIu16 " has changed", hostname, port);
Packit 1fb8d4
	WLog_ERR(TAG, "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
Packit 1fb8d4
	WLog_ERR(TAG, "@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @");
Packit 1fb8d4
	WLog_ERR(TAG, "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
Packit 1fb8d4
	WLog_ERR(TAG, "IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!");
Packit Service 5a9772
	WLog_ERR(TAG, "Someone could be eavesdropping on you right now (man-in-the-middle attack)!");
Packit 1fb8d4
	WLog_ERR(TAG, "It is also possible that a host key has just been changed.");
Packit Service 5a9772
	WLog_ERR(TAG, "The fingerprint for the host key sent by the remote host is %s", fingerprint);
Packit 1fb8d4
	WLog_ERR(TAG, "Please contact your system administrator.");
Packit Service 5a9772
	WLog_ERR(TAG, "Add correct host key in %s to get rid of this message.", hosts_file);
Packit Service 5a9772
	WLog_ERR(TAG, "Host key for %s has changed and you have requested strict checking.", hostname);
Packit 1fb8d4
	WLog_ERR(TAG, "Host key verification failed.");
Packit 1fb8d4
}
Packit 1fb8d4
Packit Service 5a9772
void tls_print_certificate_name_mismatch_error(const char* hostname, UINT16 port,
Packit Service 5a9772
                                               const char* common_name, char** alt_names,
Packit Service 5a9772
                                               int alt_names_count)
Packit 1fb8d4
{
Packit 1fb8d4
	int index;
Packit 1fb8d4
	assert(NULL != hostname);
Packit 1fb8d4
	WLog_ERR(TAG, "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
Packit 1fb8d4
	WLog_ERR(TAG, "@           WARNING: CERTIFICATE NAME MISMATCH!           @");
Packit 1fb8d4
	WLog_ERR(TAG, "@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@");
Packit Service 5a9772
	WLog_ERR(TAG, "The hostname used for this connection (%s:%" PRIu16 ") ", hostname, port);
Packit 1fb8d4
	WLog_ERR(TAG, "does not match %s given in the certificate:",
Packit 1fb8d4
	         alt_names_count < 1 ? "the name" : "any of the names");
Packit 1fb8d4
	WLog_ERR(TAG, "Common Name (CN):");
Packit 1fb8d4
	WLog_ERR(TAG, "\t%s", common_name ? common_name : "no CN found in certificate");
Packit 1fb8d4
Packit 1fb8d4
	if (alt_names_count > 0)
Packit 1fb8d4
	{
Packit 1fb8d4
		assert(NULL != alt_names);
Packit 1fb8d4
		WLog_ERR(TAG, "Alternative names:");
Packit 1fb8d4
Packit 1fb8d4
		for (index = 0; index < alt_names_count; index++)
Packit 1fb8d4
		{
Packit 1fb8d4
			assert(alt_names[index]);
Packit 1fb8d4
			WLog_ERR(TAG, "\t %s", alt_names[index]);
Packit 1fb8d4
		}
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	WLog_ERR(TAG, "A valid certificate for the wrong name should NOT be trusted!");
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
rdpTls* tls_new(rdpSettings* settings)
Packit 1fb8d4
{
Packit 1fb8d4
	rdpTls* tls;
Packit Service 5a9772
	tls = (rdpTls*)calloc(1, sizeof(rdpTls));
Packit 1fb8d4
Packit 1fb8d4
	if (!tls)
Packit 1fb8d4
		return NULL;
Packit 1fb8d4
Packit 1fb8d4
	tls->settings = settings;
Packit 1fb8d4
Packit 1fb8d4
	if (!settings->ServerMode)
Packit 1fb8d4
	{
Packit 1fb8d4
		tls->certificate_store = certificate_store_new(settings);
Packit 1fb8d4
Packit 1fb8d4
		if (!tls->certificate_store)
Packit 1fb8d4
			goto out_free;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	tls->alertLevel = TLS_ALERT_LEVEL_WARNING;
Packit 1fb8d4
	tls->alertDescription = TLS_ALERT_DESCRIPTION_CLOSE_NOTIFY;
Packit 1fb8d4
	return tls;
Packit 1fb8d4
out_free:
Packit 1fb8d4
	free(tls);
Packit 1fb8d4
	return NULL;
Packit 1fb8d4
}
Packit 1fb8d4
Packit 1fb8d4
void tls_free(rdpTls* tls)
Packit 1fb8d4
{
Packit 1fb8d4
	if (!tls)
Packit 1fb8d4
		return;
Packit 1fb8d4
Packit 1fb8d4
	if (tls->ctx)
Packit 1fb8d4
	{
Packit 1fb8d4
		SSL_CTX_free(tls->ctx);
Packit 1fb8d4
		tls->ctx = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	/* tls->underlying is a stacked BIO under tls->bio.
Packit 1fb8d4
	 * BIO_free_all will free recursivly. */
Packit 1fb8d4
	BIO_free_all(tls->bio);
Packit 1fb8d4
	tls->bio = NULL;
Packit 1fb8d4
	tls->underlying = NULL;
Packit 1fb8d4
Packit 1fb8d4
	if (tls->PublicKey)
Packit 1fb8d4
	{
Packit 1fb8d4
		free(tls->PublicKey);
Packit 1fb8d4
		tls->PublicKey = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (tls->Bindings)
Packit 1fb8d4
	{
Packit 1fb8d4
		free(tls->Bindings->Bindings);
Packit 1fb8d4
		free(tls->Bindings);
Packit 1fb8d4
		tls->Bindings = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	if (tls->certificate_store)
Packit 1fb8d4
	{
Packit 1fb8d4
		certificate_store_free(tls->certificate_store);
Packit 1fb8d4
		tls->certificate_store = NULL;
Packit 1fb8d4
	}
Packit 1fb8d4
Packit 1fb8d4
	free(tls);
Packit 1fb8d4
}