]> code.delx.au - gnu-emacs/blob - src/gnutls.c
948a0c56f14bc231612415a91f2dd8733e477b93
[gnu-emacs] / src / gnutls.c
1 /* GnuTLS glue for GNU Emacs.
2 Copyright (C) 2010-2016 Free Software Foundation, Inc.
3
4 This file is part of GNU Emacs.
5
6 GNU Emacs is free software: you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation, either version 3 of the License, or
9 (at your option) any later version.
10
11 GNU Emacs is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15
16 You should have received a copy of the GNU General Public License
17 along with GNU Emacs. If not, see <http://www.gnu.org/licenses/>. */
18
19 #include <config.h>
20 #include <errno.h>
21 #include <stdio.h>
22
23 #include "lisp.h"
24 #include "process.h"
25 #include "gnutls.h"
26 #include "coding.h"
27
28 #ifdef HAVE_GNUTLS
29 #include <gnutls/gnutls.h>
30
31 #ifdef WINDOWSNT
32 #include <windows.h>
33 #include "w32.h"
34 #endif
35
36 static bool emacs_gnutls_handle_error (gnutls_session_t, int);
37
38 static bool gnutls_global_initialized;
39
40 static void gnutls_log_function (int, const char *);
41 static void gnutls_log_function2 (int, const char *, const char *);
42 #ifdef HAVE_GNUTLS3
43 static void gnutls_audit_log_function (gnutls_session_t, const char *);
44 #endif
45
46 enum extra_peer_verification
47 {
48 CERTIFICATE_NOT_MATCHING = 2
49 };
50
51 \f
52 #ifdef WINDOWSNT
53
54 DEF_DLL_FN (gnutls_alert_description_t, gnutls_alert_get,
55 (gnutls_session_t));
56 DEF_DLL_FN (const char *, gnutls_alert_get_name,
57 (gnutls_alert_description_t));
58 DEF_DLL_FN (int, gnutls_alert_send_appropriate, (gnutls_session_t, int));
59 DEF_DLL_FN (int, gnutls_anon_allocate_client_credentials,
60 (gnutls_anon_client_credentials_t *));
61 DEF_DLL_FN (void, gnutls_anon_free_client_credentials,
62 (gnutls_anon_client_credentials_t));
63 DEF_DLL_FN (int, gnutls_bye, (gnutls_session_t, gnutls_close_request_t));
64 DEF_DLL_FN (int, gnutls_certificate_allocate_credentials,
65 (gnutls_certificate_credentials_t *));
66 DEF_DLL_FN (void, gnutls_certificate_free_credentials,
67 (gnutls_certificate_credentials_t));
68 DEF_DLL_FN (const gnutls_datum_t *, gnutls_certificate_get_peers,
69 (gnutls_session_t, unsigned int *));
70 DEF_DLL_FN (void, gnutls_certificate_set_verify_flags,
71 (gnutls_certificate_credentials_t, unsigned int));
72 DEF_DLL_FN (int, gnutls_certificate_set_x509_crl_file,
73 (gnutls_certificate_credentials_t, const char *,
74 gnutls_x509_crt_fmt_t));
75 DEF_DLL_FN (int, gnutls_certificate_set_x509_key_file,
76 (gnutls_certificate_credentials_t, const char *, const char *,
77 gnutls_x509_crt_fmt_t));
78 # if ((GNUTLS_VERSION_MAJOR \
79 + (GNUTLS_VERSION_MINOR > 0 || GNUTLS_VERSION_PATCH >= 20)) \
80 > 3)
81 DEF_DLL_FN (int, gnutls_certificate_set_x509_system_trust,
82 (gnutls_certificate_credentials_t));
83 # endif
84 DEF_DLL_FN (int, gnutls_certificate_set_x509_trust_file,
85 (gnutls_certificate_credentials_t, const char *,
86 gnutls_x509_crt_fmt_t));
87 DEF_DLL_FN (gnutls_certificate_type_t, gnutls_certificate_type_get,
88 (gnutls_session_t));
89 DEF_DLL_FN (int, gnutls_certificate_verify_peers2,
90 (gnutls_session_t, unsigned int *));
91 DEF_DLL_FN (int, gnutls_credentials_set,
92 (gnutls_session_t, gnutls_credentials_type_t, void *));
93 DEF_DLL_FN (void, gnutls_deinit, (gnutls_session_t));
94 DEF_DLL_FN (void, gnutls_dh_set_prime_bits,
95 (gnutls_session_t, unsigned int));
96 DEF_DLL_FN (int, gnutls_dh_get_prime_bits, (gnutls_session_t));
97 DEF_DLL_FN (int, gnutls_error_is_fatal, (int));
98 DEF_DLL_FN (int, gnutls_global_init, (void));
99 DEF_DLL_FN (void, gnutls_global_set_log_function, (gnutls_log_func));
100 # ifdef HAVE_GNUTLS3
101 DEF_DLL_FN (void, gnutls_global_set_audit_log_function, (gnutls_audit_log_func));
102 # endif
103 DEF_DLL_FN (void, gnutls_global_set_log_level, (int));
104 DEF_DLL_FN (int, gnutls_handshake, (gnutls_session_t));
105 DEF_DLL_FN (int, gnutls_init, (gnutls_session_t *, unsigned int));
106 DEF_DLL_FN (int, gnutls_priority_set_direct,
107 (gnutls_session_t, const char *, const char **));
108 DEF_DLL_FN (size_t, gnutls_record_check_pending, (gnutls_session_t));
109 DEF_DLL_FN (ssize_t, gnutls_record_recv, (gnutls_session_t, void *, size_t));
110 DEF_DLL_FN (ssize_t, gnutls_record_send,
111 (gnutls_session_t, const void *, size_t));
112 DEF_DLL_FN (const char *, gnutls_strerror, (int));
113 DEF_DLL_FN (void, gnutls_transport_set_errno, (gnutls_session_t, int));
114 DEF_DLL_FN (const char *, gnutls_check_version, (const char *));
115 DEF_DLL_FN (void, gnutls_transport_set_lowat, (gnutls_session_t, int));
116 DEF_DLL_FN (void, gnutls_transport_set_ptr2,
117 (gnutls_session_t, gnutls_transport_ptr_t,
118 gnutls_transport_ptr_t));
119 DEF_DLL_FN (void, gnutls_transport_set_pull_function,
120 (gnutls_session_t, gnutls_pull_func));
121 DEF_DLL_FN (void, gnutls_transport_set_push_function,
122 (gnutls_session_t, gnutls_push_func));
123 DEF_DLL_FN (int, gnutls_x509_crt_check_hostname,
124 (gnutls_x509_crt_t, const char *));
125 DEF_DLL_FN (int, gnutls_x509_crt_check_issuer,
126 (gnutls_x509_crt_t, gnutls_x509_crt_t));
127 DEF_DLL_FN (void, gnutls_x509_crt_deinit, (gnutls_x509_crt_t));
128 DEF_DLL_FN (int, gnutls_x509_crt_import,
129 (gnutls_x509_crt_t, const gnutls_datum_t *,
130 gnutls_x509_crt_fmt_t));
131 DEF_DLL_FN (int, gnutls_x509_crt_init, (gnutls_x509_crt_t *));
132 DEF_DLL_FN (int, gnutls_x509_crt_get_fingerprint,
133 (gnutls_x509_crt_t,
134 gnutls_digest_algorithm_t, void *, size_t *));
135 DEF_DLL_FN (int, gnutls_x509_crt_get_version,
136 (gnutls_x509_crt_t));
137 DEF_DLL_FN (int, gnutls_x509_crt_get_serial,
138 (gnutls_x509_crt_t, void *, size_t *));
139 DEF_DLL_FN (int, gnutls_x509_crt_get_issuer_dn,
140 (gnutls_x509_crt_t, char *, size_t *));
141 DEF_DLL_FN (time_t, gnutls_x509_crt_get_activation_time,
142 (gnutls_x509_crt_t));
143 DEF_DLL_FN (time_t, gnutls_x509_crt_get_expiration_time,
144 (gnutls_x509_crt_t));
145 DEF_DLL_FN (int, gnutls_x509_crt_get_dn,
146 (gnutls_x509_crt_t, char *, size_t *));
147 DEF_DLL_FN (int, gnutls_x509_crt_get_pk_algorithm,
148 (gnutls_x509_crt_t, unsigned int *));
149 DEF_DLL_FN (const char*, gnutls_pk_algorithm_get_name,
150 (gnutls_pk_algorithm_t));
151 DEF_DLL_FN (int, gnutls_pk_bits_to_sec_param,
152 (gnutls_pk_algorithm_t, unsigned int));
153 DEF_DLL_FN (int, gnutls_x509_crt_get_issuer_unique_id,
154 (gnutls_x509_crt_t, char *, size_t *));
155 DEF_DLL_FN (int, gnutls_x509_crt_get_subject_unique_id,
156 (gnutls_x509_crt_t, char *, size_t *));
157 DEF_DLL_FN (int, gnutls_x509_crt_get_signature_algorithm,
158 (gnutls_x509_crt_t));
159 DEF_DLL_FN (int, gnutls_x509_crt_get_signature,
160 (gnutls_x509_crt_t, char *, size_t *));
161 DEF_DLL_FN (int, gnutls_x509_crt_get_key_id,
162 (gnutls_x509_crt_t, unsigned int, unsigned char *, size_t *_size));
163 DEF_DLL_FN (const char*, gnutls_sec_param_get_name, (gnutls_sec_param_t));
164 DEF_DLL_FN (const char*, gnutls_sign_get_name, (gnutls_sign_algorithm_t));
165 DEF_DLL_FN (int, gnutls_server_name_set,
166 (gnutls_session_t, gnutls_server_name_type_t,
167 const void *, size_t));
168 DEF_DLL_FN (gnutls_kx_algorithm_t, gnutls_kx_get, (gnutls_session_t));
169 DEF_DLL_FN (const char*, gnutls_kx_get_name, (gnutls_kx_algorithm_t));
170 DEF_DLL_FN (gnutls_protocol_t, gnutls_protocol_get_version,
171 (gnutls_session_t));
172 DEF_DLL_FN (const char*, gnutls_protocol_get_name, (gnutls_protocol_t));
173 DEF_DLL_FN (gnutls_cipher_algorithm_t, gnutls_cipher_get,
174 (gnutls_session_t));
175 DEF_DLL_FN (const char*, gnutls_cipher_get_name,
176 (gnutls_cipher_algorithm_t));
177 DEF_DLL_FN (gnutls_mac_algorithm_t, gnutls_mac_get, (gnutls_session_t));
178 DEF_DLL_FN (const char*, gnutls_mac_get_name, (gnutls_mac_algorithm_t));
179
180
181 static bool
182 init_gnutls_functions (void)
183 {
184 HMODULE library;
185 int max_log_level = 1;
186
187 if (!(library = w32_delayed_load (Qgnutls_dll)))
188 {
189 GNUTLS_LOG (1, max_log_level, "GnuTLS library not found");
190 return 0;
191 }
192
193 LOAD_DLL_FN (library, gnutls_alert_get);
194 LOAD_DLL_FN (library, gnutls_alert_get_name);
195 LOAD_DLL_FN (library, gnutls_alert_send_appropriate);
196 LOAD_DLL_FN (library, gnutls_anon_allocate_client_credentials);
197 LOAD_DLL_FN (library, gnutls_anon_free_client_credentials);
198 LOAD_DLL_FN (library, gnutls_bye);
199 LOAD_DLL_FN (library, gnutls_certificate_allocate_credentials);
200 LOAD_DLL_FN (library, gnutls_certificate_free_credentials);
201 LOAD_DLL_FN (library, gnutls_certificate_get_peers);
202 LOAD_DLL_FN (library, gnutls_certificate_set_verify_flags);
203 LOAD_DLL_FN (library, gnutls_certificate_set_x509_crl_file);
204 LOAD_DLL_FN (library, gnutls_certificate_set_x509_key_file);
205 # if ((GNUTLS_VERSION_MAJOR \
206 + (GNUTLS_VERSION_MINOR > 0 || GNUTLS_VERSION_PATCH >= 20)) \
207 > 3)
208 LOAD_DLL_FN (library, gnutls_certificate_set_x509_system_trust);
209 # endif
210 LOAD_DLL_FN (library, gnutls_certificate_set_x509_trust_file);
211 LOAD_DLL_FN (library, gnutls_certificate_type_get);
212 LOAD_DLL_FN (library, gnutls_certificate_verify_peers2);
213 LOAD_DLL_FN (library, gnutls_credentials_set);
214 LOAD_DLL_FN (library, gnutls_deinit);
215 LOAD_DLL_FN (library, gnutls_dh_set_prime_bits);
216 LOAD_DLL_FN (library, gnutls_dh_get_prime_bits);
217 LOAD_DLL_FN (library, gnutls_error_is_fatal);
218 LOAD_DLL_FN (library, gnutls_global_init);
219 LOAD_DLL_FN (library, gnutls_global_set_log_function);
220 # ifdef HAVE_GNUTLS3
221 LOAD_DLL_FN (library, gnutls_global_set_audit_log_function);
222 # endif
223 LOAD_DLL_FN (library, gnutls_global_set_log_level);
224 LOAD_DLL_FN (library, gnutls_handshake);
225 LOAD_DLL_FN (library, gnutls_init);
226 LOAD_DLL_FN (library, gnutls_priority_set_direct);
227 LOAD_DLL_FN (library, gnutls_record_check_pending);
228 LOAD_DLL_FN (library, gnutls_record_recv);
229 LOAD_DLL_FN (library, gnutls_record_send);
230 LOAD_DLL_FN (library, gnutls_strerror);
231 LOAD_DLL_FN (library, gnutls_transport_set_errno);
232 LOAD_DLL_FN (library, gnutls_check_version);
233 /* We don't need to call gnutls_transport_set_lowat in GnuTLS 2.11.1
234 and later, and the function was removed entirely in 3.0.0. */
235 if (!fn_gnutls_check_version ("2.11.1"))
236 LOAD_DLL_FN (library, gnutls_transport_set_lowat);
237 LOAD_DLL_FN (library, gnutls_transport_set_ptr2);
238 LOAD_DLL_FN (library, gnutls_transport_set_pull_function);
239 LOAD_DLL_FN (library, gnutls_transport_set_push_function);
240 LOAD_DLL_FN (library, gnutls_x509_crt_check_hostname);
241 LOAD_DLL_FN (library, gnutls_x509_crt_check_issuer);
242 LOAD_DLL_FN (library, gnutls_x509_crt_deinit);
243 LOAD_DLL_FN (library, gnutls_x509_crt_import);
244 LOAD_DLL_FN (library, gnutls_x509_crt_init);
245 LOAD_DLL_FN (library, gnutls_x509_crt_get_fingerprint);
246 LOAD_DLL_FN (library, gnutls_x509_crt_get_version);
247 LOAD_DLL_FN (library, gnutls_x509_crt_get_serial);
248 LOAD_DLL_FN (library, gnutls_x509_crt_get_issuer_dn);
249 LOAD_DLL_FN (library, gnutls_x509_crt_get_activation_time);
250 LOAD_DLL_FN (library, gnutls_x509_crt_get_expiration_time);
251 LOAD_DLL_FN (library, gnutls_x509_crt_get_dn);
252 LOAD_DLL_FN (library, gnutls_x509_crt_get_pk_algorithm);
253 LOAD_DLL_FN (library, gnutls_pk_algorithm_get_name);
254 LOAD_DLL_FN (library, gnutls_pk_bits_to_sec_param);
255 LOAD_DLL_FN (library, gnutls_x509_crt_get_issuer_unique_id);
256 LOAD_DLL_FN (library, gnutls_x509_crt_get_subject_unique_id);
257 LOAD_DLL_FN (library, gnutls_x509_crt_get_signature_algorithm);
258 LOAD_DLL_FN (library, gnutls_x509_crt_get_signature);
259 LOAD_DLL_FN (library, gnutls_x509_crt_get_key_id);
260 LOAD_DLL_FN (library, gnutls_sec_param_get_name);
261 LOAD_DLL_FN (library, gnutls_sign_get_name);
262 LOAD_DLL_FN (library, gnutls_server_name_set);
263 LOAD_DLL_FN (library, gnutls_kx_get);
264 LOAD_DLL_FN (library, gnutls_kx_get_name);
265 LOAD_DLL_FN (library, gnutls_protocol_get_version);
266 LOAD_DLL_FN (library, gnutls_protocol_get_name);
267 LOAD_DLL_FN (library, gnutls_cipher_get);
268 LOAD_DLL_FN (library, gnutls_cipher_get_name);
269 LOAD_DLL_FN (library, gnutls_mac_get);
270 LOAD_DLL_FN (library, gnutls_mac_get_name);
271
272 max_log_level = global_gnutls_log_level;
273
274 {
275 Lisp_Object name = CAR_SAFE (Fget (Qgnutls_dll, QCloaded_from));
276 GNUTLS_LOG2 (1, max_log_level, "GnuTLS library loaded:",
277 STRINGP (name) ? (const char *) SDATA (name) : "unknown");
278 }
279
280 return 1;
281 }
282
283 # define gnutls_alert_get fn_gnutls_alert_get
284 # define gnutls_alert_get_name fn_gnutls_alert_get_name
285 # define gnutls_alert_send_appropriate fn_gnutls_alert_send_appropriate
286 # define gnutls_anon_allocate_client_credentials fn_gnutls_anon_allocate_client_credentials
287 # define gnutls_anon_free_client_credentials fn_gnutls_anon_free_client_credentials
288 # define gnutls_bye fn_gnutls_bye
289 # define gnutls_certificate_allocate_credentials fn_gnutls_certificate_allocate_credentials
290 # define gnutls_certificate_free_credentials fn_gnutls_certificate_free_credentials
291 # define gnutls_certificate_get_peers fn_gnutls_certificate_get_peers
292 # define gnutls_certificate_set_verify_flags fn_gnutls_certificate_set_verify_flags
293 # define gnutls_certificate_set_x509_crl_file fn_gnutls_certificate_set_x509_crl_file
294 # define gnutls_certificate_set_x509_key_file fn_gnutls_certificate_set_x509_key_file
295 # define gnutls_certificate_set_x509_system_trust fn_gnutls_certificate_set_x509_system_trust
296 # define gnutls_certificate_set_x509_trust_file fn_gnutls_certificate_set_x509_trust_file
297 # define gnutls_certificate_type_get fn_gnutls_certificate_type_get
298 # define gnutls_certificate_verify_peers2 fn_gnutls_certificate_verify_peers2
299 # define gnutls_check_version fn_gnutls_check_version
300 # define gnutls_cipher_get fn_gnutls_cipher_get
301 # define gnutls_cipher_get_name fn_gnutls_cipher_get_name
302 # define gnutls_credentials_set fn_gnutls_credentials_set
303 # define gnutls_deinit fn_gnutls_deinit
304 # define gnutls_dh_get_prime_bits fn_gnutls_dh_get_prime_bits
305 # define gnutls_dh_set_prime_bits fn_gnutls_dh_set_prime_bits
306 # define gnutls_error_is_fatal fn_gnutls_error_is_fatal
307 # define gnutls_global_init fn_gnutls_global_init
308 # define gnutls_global_set_audit_log_function fn_gnutls_global_set_audit_log_function
309 # define gnutls_global_set_log_function fn_gnutls_global_set_log_function
310 # define gnutls_global_set_log_level fn_gnutls_global_set_log_level
311 # define gnutls_handshake fn_gnutls_handshake
312 # define gnutls_init fn_gnutls_init
313 # define gnutls_kx_get fn_gnutls_kx_get
314 # define gnutls_kx_get_name fn_gnutls_kx_get_name
315 # define gnutls_mac_get fn_gnutls_mac_get
316 # define gnutls_mac_get_name fn_gnutls_mac_get_name
317 # define gnutls_pk_algorithm_get_name fn_gnutls_pk_algorithm_get_name
318 # define gnutls_pk_bits_to_sec_param fn_gnutls_pk_bits_to_sec_param
319 # define gnutls_priority_set_direct fn_gnutls_priority_set_direct
320 # define gnutls_protocol_get_name fn_gnutls_protocol_get_name
321 # define gnutls_protocol_get_version fn_gnutls_protocol_get_version
322 # define gnutls_record_check_pending fn_gnutls_record_check_pending
323 # define gnutls_record_recv fn_gnutls_record_recv
324 # define gnutls_record_send fn_gnutls_record_send
325 # define gnutls_sec_param_get_name fn_gnutls_sec_param_get_name
326 # define gnutls_server_name_set fn_gnutls_server_name_set
327 # define gnutls_sign_get_name fn_gnutls_sign_get_name
328 # define gnutls_strerror fn_gnutls_strerror
329 # define gnutls_transport_set_errno fn_gnutls_transport_set_errno
330 # define gnutls_transport_set_lowat fn_gnutls_transport_set_lowat
331 # define gnutls_transport_set_ptr2 fn_gnutls_transport_set_ptr2
332 # define gnutls_transport_set_pull_function fn_gnutls_transport_set_pull_function
333 # define gnutls_transport_set_push_function fn_gnutls_transport_set_push_function
334 # define gnutls_x509_crt_check_hostname fn_gnutls_x509_crt_check_hostname
335 # define gnutls_x509_crt_check_issuer fn_gnutls_x509_crt_check_issuer
336 # define gnutls_x509_crt_deinit fn_gnutls_x509_crt_deinit
337 # define gnutls_x509_crt_get_activation_time fn_gnutls_x509_crt_get_activation_time
338 # define gnutls_x509_crt_get_dn fn_gnutls_x509_crt_get_dn
339 # define gnutls_x509_crt_get_expiration_time fn_gnutls_x509_crt_get_expiration_time
340 # define gnutls_x509_crt_get_fingerprint fn_gnutls_x509_crt_get_fingerprint
341 # define gnutls_x509_crt_get_issuer_dn fn_gnutls_x509_crt_get_issuer_dn
342 # define gnutls_x509_crt_get_issuer_unique_id fn_gnutls_x509_crt_get_issuer_unique_id
343 # define gnutls_x509_crt_get_key_id fn_gnutls_x509_crt_get_key_id
344 # define gnutls_x509_crt_get_pk_algorithm fn_gnutls_x509_crt_get_pk_algorithm
345 # define gnutls_x509_crt_get_serial fn_gnutls_x509_crt_get_serial
346 # define gnutls_x509_crt_get_signature fn_gnutls_x509_crt_get_signature
347 # define gnutls_x509_crt_get_signature_algorithm fn_gnutls_x509_crt_get_signature_algorithm
348 # define gnutls_x509_crt_get_subject_unique_id fn_gnutls_x509_crt_get_subject_unique_id
349 # define gnutls_x509_crt_get_version fn_gnutls_x509_crt_get_version
350 # define gnutls_x509_crt_import fn_gnutls_x509_crt_import
351 # define gnutls_x509_crt_init fn_gnutls_x509_crt_init
352
353 #endif
354
355 \f
356 /* Report memory exhaustion if ERR is an out-of-memory indication. */
357 static void
358 check_memory_full (int err)
359 {
360 /* When GnuTLS exhausts memory, it doesn't say how much memory it
361 asked for, so tell the Emacs allocator that GnuTLS asked for no
362 bytes. This isn't accurate, but it's good enough. */
363 if (err == GNUTLS_E_MEMORY_ERROR)
364 memory_full (0);
365 }
366
367 #ifdef HAVE_GNUTLS3
368 /* Log a simple audit message. */
369 static void
370 gnutls_audit_log_function (gnutls_session_t session, const char *string)
371 {
372 if (global_gnutls_log_level >= 1)
373 {
374 message ("gnutls.c: [audit] %s", string);
375 }
376 }
377 #endif
378
379 /* Log a simple message. */
380 static void
381 gnutls_log_function (int level, const char *string)
382 {
383 message ("gnutls.c: [%d] %s", level, string);
384 }
385
386 /* Log a message and a string. */
387 static void
388 gnutls_log_function2 (int level, const char *string, const char *extra)
389 {
390 message ("gnutls.c: [%d] %s %s", level, string, extra);
391 }
392
393 /* Log a message and an integer. */
394 static void
395 gnutls_log_function2i (int level, const char *string, int extra)
396 {
397 message ("gnutls.c: [%d] %s %d", level, string, extra);
398 }
399
400 static int
401 emacs_gnutls_handshake (struct Lisp_Process *proc)
402 {
403 gnutls_session_t state = proc->gnutls_state;
404 int ret;
405
406 if (proc->gnutls_initstage < GNUTLS_STAGE_HANDSHAKE_CANDO)
407 return -1;
408
409 if (proc->gnutls_initstage < GNUTLS_STAGE_TRANSPORT_POINTERS_SET)
410 {
411 #ifdef WINDOWSNT
412 /* On W32 we cannot transfer socket handles between different runtime
413 libraries, so we tell GnuTLS to use our special push/pull
414 functions. */
415 gnutls_transport_set_ptr2 (state,
416 (gnutls_transport_ptr_t) proc,
417 (gnutls_transport_ptr_t) proc);
418 gnutls_transport_set_push_function (state, &emacs_gnutls_push);
419 gnutls_transport_set_pull_function (state, &emacs_gnutls_pull);
420
421 /* For non blocking sockets or other custom made pull/push
422 functions the gnutls_transport_set_lowat must be called, with
423 a zero low water mark value. (GnuTLS 2.10.4 documentation)
424
425 (Note: this is probably not strictly necessary as the lowat
426 value is only used when no custom pull/push functions are
427 set.) */
428 /* According to GnuTLS NEWS file, lowat level has been set to
429 zero by default in version 2.11.1, and the function
430 gnutls_transport_set_lowat was removed from the library in
431 version 2.99.0. */
432 if (!gnutls_check_version ("2.11.1"))
433 gnutls_transport_set_lowat (state, 0);
434 #else
435 /* This is how GnuTLS takes sockets: as file descriptors passed
436 in. For an Emacs process socket, infd and outfd are the
437 same but we use this two-argument version for clarity. */
438 gnutls_transport_set_ptr2 (state,
439 (void *) (intptr_t) proc->infd,
440 (void *) (intptr_t) proc->outfd);
441 #endif
442
443 proc->gnutls_initstage = GNUTLS_STAGE_TRANSPORT_POINTERS_SET;
444 }
445
446 do
447 {
448 ret = gnutls_handshake (state);
449 emacs_gnutls_handle_error (state, ret);
450 QUIT;
451 }
452 while (ret < 0 && gnutls_error_is_fatal (ret) == 0);
453
454 proc->gnutls_initstage = GNUTLS_STAGE_HANDSHAKE_TRIED;
455
456 if (ret == GNUTLS_E_SUCCESS)
457 {
458 /* Here we're finally done. */
459 proc->gnutls_initstage = GNUTLS_STAGE_READY;
460 }
461 else
462 {
463 check_memory_full (gnutls_alert_send_appropriate (state, ret));
464 }
465 return ret;
466 }
467
468 ptrdiff_t
469 emacs_gnutls_record_check_pending (gnutls_session_t state)
470 {
471 return gnutls_record_check_pending (state);
472 }
473
474 #ifdef WINDOWSNT
475 void
476 emacs_gnutls_transport_set_errno (gnutls_session_t state, int err)
477 {
478 gnutls_transport_set_errno (state, err);
479 }
480 #endif
481
482 ptrdiff_t
483 emacs_gnutls_write (struct Lisp_Process *proc, const char *buf, ptrdiff_t nbyte)
484 {
485 ssize_t rtnval = 0;
486 ptrdiff_t bytes_written;
487 gnutls_session_t state = proc->gnutls_state;
488
489 if (proc->gnutls_initstage != GNUTLS_STAGE_READY)
490 {
491 errno = EAGAIN;
492 return 0;
493 }
494
495 bytes_written = 0;
496
497 while (nbyte > 0)
498 {
499 rtnval = gnutls_record_send (state, buf, nbyte);
500
501 if (rtnval < 0)
502 {
503 if (rtnval == GNUTLS_E_INTERRUPTED)
504 continue;
505 else
506 {
507 /* If we get GNUTLS_E_AGAIN, then set errno
508 appropriately so that send_process retries the
509 correct way instead of erroring out. */
510 if (rtnval == GNUTLS_E_AGAIN)
511 errno = EAGAIN;
512 break;
513 }
514 }
515
516 buf += rtnval;
517 nbyte -= rtnval;
518 bytes_written += rtnval;
519 }
520
521 emacs_gnutls_handle_error (state, rtnval);
522 return (bytes_written);
523 }
524
525 ptrdiff_t
526 emacs_gnutls_read (struct Lisp_Process *proc, char *buf, ptrdiff_t nbyte)
527 {
528 ssize_t rtnval;
529 gnutls_session_t state = proc->gnutls_state;
530
531 int log_level = proc->gnutls_log_level;
532
533 if (proc->gnutls_initstage != GNUTLS_STAGE_READY)
534 {
535 /* If the handshake count is under the limit, try the handshake
536 again and increment the handshake count. This count is kept
537 per process (connection), not globally. */
538 if (proc->gnutls_handshakes_tried < GNUTLS_EMACS_HANDSHAKES_LIMIT)
539 {
540 proc->gnutls_handshakes_tried++;
541 emacs_gnutls_handshake (proc);
542 GNUTLS_LOG2i (5, log_level, "Retried handshake",
543 proc->gnutls_handshakes_tried);
544 return -1;
545 }
546
547 GNUTLS_LOG (2, log_level, "Giving up on handshake; resetting retries");
548 proc->gnutls_handshakes_tried = 0;
549 return 0;
550 }
551 rtnval = gnutls_record_recv (state, buf, nbyte);
552 if (rtnval >= 0)
553 return rtnval;
554 else if (rtnval == GNUTLS_E_UNEXPECTED_PACKET_LENGTH)
555 /* The peer closed the connection. */
556 return 0;
557 else if (emacs_gnutls_handle_error (state, rtnval))
558 /* non-fatal error */
559 return -1;
560 else {
561 /* a fatal error occurred */
562 return 0;
563 }
564 }
565
566 /* Report a GnuTLS error to the user.
567 Return true if the error code was successfully handled. */
568 static bool
569 emacs_gnutls_handle_error (gnutls_session_t session, int err)
570 {
571 int max_log_level = 0;
572
573 bool ret;
574 const char *str;
575
576 /* TODO: use a Lisp_Object generated by gnutls_make_error? */
577 if (err >= 0)
578 return 1;
579
580 check_memory_full (err);
581
582 max_log_level = global_gnutls_log_level;
583
584 /* TODO: use gnutls-error-fatalp and gnutls-error-string. */
585
586 str = gnutls_strerror (err);
587 if (!str)
588 str = "unknown";
589
590 if (gnutls_error_is_fatal (err))
591 {
592 ret = 0;
593 GNUTLS_LOG2 (1, max_log_level, "fatal error:", str);
594 }
595 else
596 {
597 ret = 1;
598
599 switch (err)
600 {
601 case GNUTLS_E_AGAIN:
602 GNUTLS_LOG2 (3,
603 max_log_level,
604 "retry:",
605 str);
606 default:
607 GNUTLS_LOG2 (1,
608 max_log_level,
609 "non-fatal error:",
610 str);
611 }
612 }
613
614 if (err == GNUTLS_E_WARNING_ALERT_RECEIVED
615 || err == GNUTLS_E_FATAL_ALERT_RECEIVED)
616 {
617 int alert = gnutls_alert_get (session);
618 int level = (err == GNUTLS_E_FATAL_ALERT_RECEIVED) ? 0 : 1;
619 str = gnutls_alert_get_name (alert);
620 if (!str)
621 str = "unknown";
622
623 GNUTLS_LOG2 (level, max_log_level, "Received alert: ", str);
624 }
625 return ret;
626 }
627
628 /* convert an integer error to a Lisp_Object; it will be either a
629 known symbol like `gnutls_e_interrupted' and `gnutls_e_again' or
630 simply the integer value of the error. GNUTLS_E_SUCCESS is mapped
631 to Qt. */
632 static Lisp_Object
633 gnutls_make_error (int err)
634 {
635 switch (err)
636 {
637 case GNUTLS_E_SUCCESS:
638 return Qt;
639 case GNUTLS_E_AGAIN:
640 return Qgnutls_e_again;
641 case GNUTLS_E_INTERRUPTED:
642 return Qgnutls_e_interrupted;
643 case GNUTLS_E_INVALID_SESSION:
644 return Qgnutls_e_invalid_session;
645 }
646
647 check_memory_full (err);
648 return make_number (err);
649 }
650
651 Lisp_Object
652 emacs_gnutls_deinit (Lisp_Object proc)
653 {
654 int log_level;
655
656 CHECK_PROCESS (proc);
657
658 if (XPROCESS (proc)->gnutls_p == 0)
659 return Qnil;
660
661 log_level = XPROCESS (proc)->gnutls_log_level;
662
663 if (XPROCESS (proc)->gnutls_x509_cred)
664 {
665 GNUTLS_LOG (2, log_level, "Deallocating x509 credentials");
666 gnutls_certificate_free_credentials (XPROCESS (proc)->gnutls_x509_cred);
667 XPROCESS (proc)->gnutls_x509_cred = NULL;
668 }
669
670 if (XPROCESS (proc)->gnutls_anon_cred)
671 {
672 GNUTLS_LOG (2, log_level, "Deallocating anon credentials");
673 gnutls_anon_free_client_credentials (XPROCESS (proc)->gnutls_anon_cred);
674 XPROCESS (proc)->gnutls_anon_cred = NULL;
675 }
676
677 if (XPROCESS (proc)->gnutls_state)
678 {
679 gnutls_deinit (XPROCESS (proc)->gnutls_state);
680 XPROCESS (proc)->gnutls_state = NULL;
681 if (GNUTLS_INITSTAGE (proc) >= GNUTLS_STAGE_INIT)
682 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_INIT - 1;
683 }
684
685 XPROCESS (proc)->gnutls_p = 0;
686 return Qt;
687 }
688
689 DEFUN ("gnutls-asynchronous-parameters", Fgnutls_asynchronous_parameters,
690 Sgnutls_asynchronous_parameters, 2, 2, 0,
691 doc: /* Mark this process as being a pre-init GnuTLS process.
692 The second parameter is the list of parameters to feed to gnutls-boot
693 to finish setting up the connection. */)
694 (Lisp_Object proc, Lisp_Object params)
695 {
696 CHECK_PROCESS (proc);
697
698 XPROCESS (proc)->gnutls_boot_parameters = params;
699 return Qnil;
700 }
701
702 DEFUN ("gnutls-get-initstage", Fgnutls_get_initstage, Sgnutls_get_initstage, 1, 1, 0,
703 doc: /* Return the GnuTLS init stage of process PROC.
704 See also `gnutls-boot'. */)
705 (Lisp_Object proc)
706 {
707 CHECK_PROCESS (proc);
708
709 return make_number (GNUTLS_INITSTAGE (proc));
710 }
711
712 DEFUN ("gnutls-errorp", Fgnutls_errorp, Sgnutls_errorp, 1, 1, 0,
713 doc: /* Return t if ERROR indicates a GnuTLS problem.
714 ERROR is an integer or a symbol with an integer `gnutls-code' property.
715 usage: (gnutls-errorp ERROR) */
716 attributes: const)
717 (Lisp_Object err)
718 {
719 if (EQ (err, Qt)) return Qnil;
720
721 return Qt;
722 }
723
724 DEFUN ("gnutls-error-fatalp", Fgnutls_error_fatalp, Sgnutls_error_fatalp, 1, 1, 0,
725 doc: /* Return non-nil if ERROR is fatal.
726 ERROR is an integer or a symbol with an integer `gnutls-code' property.
727 Usage: (gnutls-error-fatalp ERROR) */)
728 (Lisp_Object err)
729 {
730 Lisp_Object code;
731
732 if (EQ (err, Qt)) return Qnil;
733
734 if (SYMBOLP (err))
735 {
736 code = Fget (err, Qgnutls_code);
737 if (NUMBERP (code))
738 {
739 err = code;
740 }
741 else
742 {
743 error ("Symbol has no numeric gnutls-code property");
744 }
745 }
746
747 if (! TYPE_RANGED_INTEGERP (int, err))
748 error ("Not an error symbol or code");
749
750 if (0 == gnutls_error_is_fatal (XINT (err)))
751 return Qnil;
752
753 return Qt;
754 }
755
756 DEFUN ("gnutls-error-string", Fgnutls_error_string, Sgnutls_error_string, 1, 1, 0,
757 doc: /* Return a description of ERROR.
758 ERROR is an integer or a symbol with an integer `gnutls-code' property.
759 usage: (gnutls-error-string ERROR) */)
760 (Lisp_Object err)
761 {
762 Lisp_Object code;
763
764 if (EQ (err, Qt)) return build_string ("Not an error");
765
766 if (SYMBOLP (err))
767 {
768 code = Fget (err, Qgnutls_code);
769 if (NUMBERP (code))
770 {
771 err = code;
772 }
773 else
774 {
775 return build_string ("Symbol has no numeric gnutls-code property");
776 }
777 }
778
779 if (! TYPE_RANGED_INTEGERP (int, err))
780 return build_string ("Not an error symbol or code");
781
782 return build_string (gnutls_strerror (XINT (err)));
783 }
784
785 DEFUN ("gnutls-deinit", Fgnutls_deinit, Sgnutls_deinit, 1, 1, 0,
786 doc: /* Deallocate GnuTLS resources associated with process PROC.
787 See also `gnutls-init'. */)
788 (Lisp_Object proc)
789 {
790 return emacs_gnutls_deinit (proc);
791 }
792
793 static Lisp_Object
794 gnutls_hex_string (unsigned char *buf, ptrdiff_t buf_size, const char *prefix)
795 {
796 ptrdiff_t prefix_length = strlen (prefix);
797 ptrdiff_t retlen;
798 if (INT_MULTIPLY_WRAPV (buf_size, 3, &retlen)
799 || INT_ADD_WRAPV (prefix_length - (buf_size != 0), retlen, &retlen))
800 string_overflow ();
801 Lisp_Object ret = make_uninit_string (retlen);
802 char *string = SSDATA (ret);
803 strcpy (string, prefix);
804
805 for (ptrdiff_t i = 0; i < buf_size; i++)
806 sprintf (string + i * 3 + prefix_length,
807 i == buf_size - 1 ? "%02x" : "%02x:",
808 buf[i]);
809
810 return ret;
811 }
812
813 static Lisp_Object
814 gnutls_certificate_details (gnutls_x509_crt_t cert)
815 {
816 Lisp_Object res = Qnil;
817 int err;
818 size_t buf_size;
819
820 /* Version. */
821 {
822 int version = gnutls_x509_crt_get_version (cert);
823 check_memory_full (version);
824 if (version >= GNUTLS_E_SUCCESS)
825 res = nconc2 (res, list2 (intern (":version"),
826 make_number (version)));
827 }
828
829 /* Serial. */
830 buf_size = 0;
831 err = gnutls_x509_crt_get_serial (cert, NULL, &buf_size);
832 check_memory_full (err);
833 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
834 {
835 void *serial = xmalloc (buf_size);
836 err = gnutls_x509_crt_get_serial (cert, serial, &buf_size);
837 check_memory_full (err);
838 if (err >= GNUTLS_E_SUCCESS)
839 res = nconc2 (res, list2 (intern (":serial-number"),
840 gnutls_hex_string (serial, buf_size, "")));
841 xfree (serial);
842 }
843
844 /* Issuer. */
845 buf_size = 0;
846 err = gnutls_x509_crt_get_issuer_dn (cert, NULL, &buf_size);
847 check_memory_full (err);
848 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
849 {
850 char *dn = xmalloc (buf_size);
851 err = gnutls_x509_crt_get_issuer_dn (cert, dn, &buf_size);
852 check_memory_full (err);
853 if (err >= GNUTLS_E_SUCCESS)
854 res = nconc2 (res, list2 (intern (":issuer"),
855 make_string (dn, buf_size)));
856 xfree (dn);
857 }
858
859 /* Validity. */
860 {
861 /* Add 1 to the buffer size, since 1900 is added to tm_year and
862 that might add 1 to the year length. */
863 char buf[INT_STRLEN_BOUND (int) + 1 + sizeof "-12-31"];
864 struct tm t;
865 time_t tim = gnutls_x509_crt_get_activation_time (cert);
866
867 if (gmtime_r (&tim, &t) && strftime (buf, sizeof buf, "%Y-%m-%d", &t))
868 res = nconc2 (res, list2 (intern (":valid-from"), build_string (buf)));
869
870 tim = gnutls_x509_crt_get_expiration_time (cert);
871 if (gmtime_r (&tim, &t) && strftime (buf, sizeof buf, "%Y-%m-%d", &t))
872 res = nconc2 (res, list2 (intern (":valid-to"), build_string (buf)));
873 }
874
875 /* Subject. */
876 buf_size = 0;
877 err = gnutls_x509_crt_get_dn (cert, NULL, &buf_size);
878 check_memory_full (err);
879 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
880 {
881 char *dn = xmalloc (buf_size);
882 err = gnutls_x509_crt_get_dn (cert, dn, &buf_size);
883 check_memory_full (err);
884 if (err >= GNUTLS_E_SUCCESS)
885 res = nconc2 (res, list2 (intern (":subject"),
886 make_string (dn, buf_size)));
887 xfree (dn);
888 }
889
890 /* Versions older than 2.11 doesn't have these four functions. */
891 #if GNUTLS_VERSION_NUMBER >= 0x020b00
892 /* SubjectPublicKeyInfo. */
893 {
894 unsigned int bits;
895
896 err = gnutls_x509_crt_get_pk_algorithm (cert, &bits);
897 check_memory_full (err);
898 if (err >= GNUTLS_E_SUCCESS)
899 {
900 const char *name = gnutls_pk_algorithm_get_name (err);
901 if (name)
902 res = nconc2 (res, list2 (intern (":public-key-algorithm"),
903 build_string (name)));
904
905 name = gnutls_sec_param_get_name (gnutls_pk_bits_to_sec_param
906 (err, bits));
907 res = nconc2 (res, list2 (intern (":certificate-security-level"),
908 build_string (name)));
909 }
910 }
911
912 /* Unique IDs. */
913 buf_size = 0;
914 err = gnutls_x509_crt_get_issuer_unique_id (cert, NULL, &buf_size);
915 check_memory_full (err);
916 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
917 {
918 char *buf = xmalloc (buf_size);
919 err = gnutls_x509_crt_get_issuer_unique_id (cert, buf, &buf_size);
920 check_memory_full (err);
921 if (err >= GNUTLS_E_SUCCESS)
922 res = nconc2 (res, list2 (intern (":issuer-unique-id"),
923 make_string (buf, buf_size)));
924 xfree (buf);
925 }
926
927 buf_size = 0;
928 err = gnutls_x509_crt_get_subject_unique_id (cert, NULL, &buf_size);
929 check_memory_full (err);
930 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
931 {
932 char *buf = xmalloc (buf_size);
933 err = gnutls_x509_crt_get_subject_unique_id (cert, buf, &buf_size);
934 check_memory_full (err);
935 if (err >= GNUTLS_E_SUCCESS)
936 res = nconc2 (res, list2 (intern (":subject-unique-id"),
937 make_string (buf, buf_size)));
938 xfree (buf);
939 }
940 #endif
941
942 /* Signature. */
943 err = gnutls_x509_crt_get_signature_algorithm (cert);
944 check_memory_full (err);
945 if (err >= GNUTLS_E_SUCCESS)
946 {
947 const char *name = gnutls_sign_get_name (err);
948 if (name)
949 res = nconc2 (res, list2 (intern (":signature-algorithm"),
950 build_string (name)));
951 }
952
953 /* Public key ID. */
954 buf_size = 0;
955 err = gnutls_x509_crt_get_key_id (cert, 0, NULL, &buf_size);
956 check_memory_full (err);
957 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
958 {
959 void *buf = xmalloc (buf_size);
960 err = gnutls_x509_crt_get_key_id (cert, 0, buf, &buf_size);
961 check_memory_full (err);
962 if (err >= GNUTLS_E_SUCCESS)
963 res = nconc2 (res, list2 (intern (":public-key-id"),
964 gnutls_hex_string (buf, buf_size, "sha1:")));
965 xfree (buf);
966 }
967
968 /* Certificate fingerprint. */
969 buf_size = 0;
970 err = gnutls_x509_crt_get_fingerprint (cert, GNUTLS_DIG_SHA1,
971 NULL, &buf_size);
972 check_memory_full (err);
973 if (err == GNUTLS_E_SHORT_MEMORY_BUFFER)
974 {
975 void *buf = xmalloc (buf_size);
976 err = gnutls_x509_crt_get_fingerprint (cert, GNUTLS_DIG_SHA1,
977 buf, &buf_size);
978 check_memory_full (err);
979 if (err >= GNUTLS_E_SUCCESS)
980 res = nconc2 (res, list2 (intern (":certificate-id"),
981 gnutls_hex_string (buf, buf_size, "sha1:")));
982 xfree (buf);
983 }
984
985 return res;
986 }
987
988 DEFUN ("gnutls-peer-status-warning-describe", Fgnutls_peer_status_warning_describe, Sgnutls_peer_status_warning_describe, 1, 1, 0,
989 doc: /* Describe the warning of a GnuTLS peer status from `gnutls-peer-status'. */)
990 (Lisp_Object status_symbol)
991 {
992 CHECK_SYMBOL (status_symbol);
993
994 if (EQ (status_symbol, intern (":invalid")))
995 return build_string ("certificate could not be verified");
996
997 if (EQ (status_symbol, intern (":revoked")))
998 return build_string ("certificate was revoked (CRL)");
999
1000 if (EQ (status_symbol, intern (":self-signed")))
1001 return build_string ("certificate signer was not found (self-signed)");
1002
1003 if (EQ (status_symbol, intern (":unknown-ca")))
1004 return build_string ("the certificate was signed by an unknown "
1005 "and therefore untrusted authority");
1006
1007 if (EQ (status_symbol, intern (":not-ca")))
1008 return build_string ("certificate signer is not a CA");
1009
1010 if (EQ (status_symbol, intern (":insecure")))
1011 return build_string ("certificate was signed with an insecure algorithm");
1012
1013 if (EQ (status_symbol, intern (":not-activated")))
1014 return build_string ("certificate is not yet activated");
1015
1016 if (EQ (status_symbol, intern (":expired")))
1017 return build_string ("certificate has expired");
1018
1019 if (EQ (status_symbol, intern (":no-host-match")))
1020 return build_string ("certificate host does not match hostname");
1021
1022 return Qnil;
1023 }
1024
1025 DEFUN ("gnutls-peer-status", Fgnutls_peer_status, Sgnutls_peer_status, 1, 1, 0,
1026 doc: /* Describe a GnuTLS PROC peer certificate and any warnings about it.
1027 The return value is a property list with top-level keys :warnings and
1028 :certificate. The :warnings entry is a list of symbols you can describe with
1029 `gnutls-peer-status-warning-describe'. */)
1030 (Lisp_Object proc)
1031 {
1032 Lisp_Object warnings = Qnil, result = Qnil;
1033 unsigned int verification;
1034 gnutls_session_t state;
1035
1036 CHECK_PROCESS (proc);
1037
1038 if (GNUTLS_INITSTAGE (proc) < GNUTLS_STAGE_INIT)
1039 return Qnil;
1040
1041 /* Then collect any warnings already computed by the handshake. */
1042 verification = XPROCESS (proc)->gnutls_peer_verification;
1043
1044 if (verification & GNUTLS_CERT_INVALID)
1045 warnings = Fcons (intern (":invalid"), warnings);
1046
1047 if (verification & GNUTLS_CERT_REVOKED)
1048 warnings = Fcons (intern (":revoked"), warnings);
1049
1050 if (verification & GNUTLS_CERT_SIGNER_NOT_FOUND)
1051 warnings = Fcons (intern (":unknown-ca"), warnings);
1052
1053 if (verification & GNUTLS_CERT_SIGNER_NOT_CA)
1054 warnings = Fcons (intern (":not-ca"), warnings);
1055
1056 if (verification & GNUTLS_CERT_INSECURE_ALGORITHM)
1057 warnings = Fcons (intern (":insecure"), warnings);
1058
1059 if (verification & GNUTLS_CERT_NOT_ACTIVATED)
1060 warnings = Fcons (intern (":not-activated"), warnings);
1061
1062 if (verification & GNUTLS_CERT_EXPIRED)
1063 warnings = Fcons (intern (":expired"), warnings);
1064
1065 if (XPROCESS (proc)->gnutls_extra_peer_verification &
1066 CERTIFICATE_NOT_MATCHING)
1067 warnings = Fcons (intern (":no-host-match"), warnings);
1068
1069 /* This could get called in the INIT stage, when the certificate is
1070 not yet set. */
1071 if (XPROCESS (proc)->gnutls_certificate != NULL &&
1072 gnutls_x509_crt_check_issuer(XPROCESS (proc)->gnutls_certificate,
1073 XPROCESS (proc)->gnutls_certificate))
1074 warnings = Fcons (intern (":self-signed"), warnings);
1075
1076 if (!NILP (warnings))
1077 result = list2 (intern (":warnings"), warnings);
1078
1079 /* This could get called in the INIT stage, when the certificate is
1080 not yet set. */
1081 if (XPROCESS (proc)->gnutls_certificate != NULL)
1082 result = nconc2 (result, list2
1083 (intern (":certificate"),
1084 gnutls_certificate_details (XPROCESS (proc)->gnutls_certificate)));
1085
1086 state = XPROCESS (proc)->gnutls_state;
1087
1088 /* Diffie-Hellman prime bits. */
1089 {
1090 int bits = gnutls_dh_get_prime_bits (state);
1091 check_memory_full (bits);
1092 if (bits > 0)
1093 result = nconc2 (result, list2 (intern (":diffie-hellman-prime-bits"),
1094 make_number (bits)));
1095 }
1096
1097 /* Key exchange. */
1098 result = nconc2
1099 (result, list2 (intern (":key-exchange"),
1100 build_string (gnutls_kx_get_name
1101 (gnutls_kx_get (state)))));
1102
1103 /* Protocol name. */
1104 result = nconc2
1105 (result, list2 (intern (":protocol"),
1106 build_string (gnutls_protocol_get_name
1107 (gnutls_protocol_get_version (state)))));
1108
1109 /* Cipher name. */
1110 result = nconc2
1111 (result, list2 (intern (":cipher"),
1112 build_string (gnutls_cipher_get_name
1113 (gnutls_cipher_get (state)))));
1114
1115 /* MAC name. */
1116 result = nconc2
1117 (result, list2 (intern (":mac"),
1118 build_string (gnutls_mac_get_name
1119 (gnutls_mac_get (state)))));
1120
1121
1122 return result;
1123 }
1124
1125 /* Initialize global GnuTLS state to defaults.
1126 Call `gnutls-global-deinit' when GnuTLS usage is no longer needed.
1127 Return zero on success. */
1128 Lisp_Object
1129 emacs_gnutls_global_init (void)
1130 {
1131 int ret = GNUTLS_E_SUCCESS;
1132
1133 if (!gnutls_global_initialized)
1134 {
1135 ret = gnutls_global_init ();
1136 if (ret == GNUTLS_E_SUCCESS)
1137 gnutls_global_initialized = 1;
1138 }
1139
1140 return gnutls_make_error (ret);
1141 }
1142
1143 static bool
1144 gnutls_ip_address_p (char *string)
1145 {
1146 char c;
1147
1148 while ((c = *string++) != 0)
1149 if (! ((c == '.' || c == ':' || (c >= '0' && c <= '9'))))
1150 return false;
1151
1152 return true;
1153 }
1154
1155 #if 0
1156 /* Deinitialize global GnuTLS state.
1157 See also `gnutls-global-init'. */
1158 static Lisp_Object
1159 emacs_gnutls_global_deinit (void)
1160 {
1161 if (gnutls_global_initialized)
1162 gnutls_global_deinit ();
1163
1164 gnutls_global_initialized = 0;
1165
1166 return gnutls_make_error (GNUTLS_E_SUCCESS);
1167 }
1168 #endif
1169
1170 /* VARARGS 1 */
1171 static void
1172 boot_error (struct Lisp_Process *p, const char *m, ...)
1173 {
1174 va_list ap;
1175 va_start (ap, m);
1176 if (p->is_non_blocking_client)
1177 pset_status (p, list2 (Qfailed, vformat_string (m, ap)));
1178 else
1179 verror (m, ap);
1180 }
1181
1182
1183 DEFUN ("gnutls-boot", Fgnutls_boot, Sgnutls_boot, 3, 3, 0,
1184 doc: /* Initialize GnuTLS client for process PROC with TYPE+PROPLIST.
1185 Currently only client mode is supported. Return a success/failure
1186 value you can check with `gnutls-errorp'.
1187
1188 TYPE is a symbol, either `gnutls-anon' or `gnutls-x509pki'.
1189 PROPLIST is a property list with the following keys:
1190
1191 :hostname is a string naming the remote host.
1192
1193 :priority is a GnuTLS priority string, defaults to "NORMAL".
1194
1195 :trustfiles is a list of PEM-encoded trust files for `gnutls-x509pki'.
1196
1197 :crlfiles is a list of PEM-encoded CRL lists for `gnutls-x509pki'.
1198
1199 :keylist is an alist of PEM-encoded key files and PEM-encoded
1200 certificates for `gnutls-x509pki'.
1201
1202 :callbacks is an alist of callback functions, see below.
1203
1204 :loglevel is the debug level requested from GnuTLS, try 4.
1205
1206 :verify-flags is a bitset as per GnuTLS'
1207 gnutls_certificate_set_verify_flags.
1208
1209 :verify-hostname-error is ignored. Pass :hostname in :verify-error
1210 instead.
1211
1212 :verify-error is a list of symbols to express verification checks or
1213 t to do all checks. Currently it can contain `:trustfiles' and
1214 `:hostname' to verify the certificate or the hostname respectively.
1215
1216 :min-prime-bits is the minimum accepted number of bits the client will
1217 accept in Diffie-Hellman key exchange.
1218
1219 The debug level will be set for this process AND globally for GnuTLS.
1220 So if you set it higher or lower at any point, it affects global
1221 debugging.
1222
1223 Note that the priority is set on the client. The server does not use
1224 the protocols's priority except for disabling protocols that were not
1225 specified.
1226
1227 Processes must be initialized with this function before other GnuTLS
1228 functions are used. This function allocates resources which can only
1229 be deallocated by calling `gnutls-deinit' or by calling it again.
1230
1231 The callbacks alist can have a `verify' key, associated with a
1232 verification function (UNUSED).
1233
1234 Each authentication type may need additional information in order to
1235 work. For X.509 PKI (`gnutls-x509pki'), you probably need at least
1236 one trustfile (usually a CA bundle). */)
1237 (Lisp_Object proc, Lisp_Object type, Lisp_Object proplist)
1238 {
1239 int ret = GNUTLS_E_SUCCESS;
1240 int max_log_level = 0;
1241 bool verify_error_all = 0;
1242
1243 gnutls_session_t state;
1244 gnutls_certificate_credentials_t x509_cred = NULL;
1245 gnutls_anon_client_credentials_t anon_cred = NULL;
1246 Lisp_Object global_init;
1247 char const *priority_string_ptr = "NORMAL"; /* default priority string. */
1248 unsigned int peer_verification;
1249 char *c_hostname;
1250
1251 /* Placeholders for the property list elements. */
1252 Lisp_Object priority_string;
1253 Lisp_Object trustfiles;
1254 Lisp_Object crlfiles;
1255 Lisp_Object keylist;
1256 /* Lisp_Object callbacks; */
1257 Lisp_Object loglevel;
1258 Lisp_Object hostname;
1259 Lisp_Object verify_error;
1260 Lisp_Object prime_bits;
1261 Lisp_Object warnings;
1262 struct Lisp_Process *p = XPROCESS (proc);
1263
1264 CHECK_PROCESS (proc);
1265 CHECK_SYMBOL (type);
1266 CHECK_LIST (proplist);
1267
1268 if (NILP (Fgnutls_available_p ()))
1269 {
1270 boot_error (p, "GnuTLS not available");
1271 return Qnil;
1272 }
1273
1274 if (!EQ (type, Qgnutls_x509pki) && !EQ (type, Qgnutls_anon))
1275 {
1276 boot_error (p, "Invalid GnuTLS credential type");
1277 return Qnil;
1278 }
1279
1280 hostname = Fplist_get (proplist, QCgnutls_bootprop_hostname);
1281 priority_string = Fplist_get (proplist, QCgnutls_bootprop_priority);
1282 trustfiles = Fplist_get (proplist, QCgnutls_bootprop_trustfiles);
1283 keylist = Fplist_get (proplist, QCgnutls_bootprop_keylist);
1284 crlfiles = Fplist_get (proplist, QCgnutls_bootprop_crlfiles);
1285 loglevel = Fplist_get (proplist, QCgnutls_bootprop_loglevel);
1286 verify_error = Fplist_get (proplist, QCgnutls_bootprop_verify_error);
1287 prime_bits = Fplist_get (proplist, QCgnutls_bootprop_min_prime_bits);
1288
1289 if (EQ (verify_error, Qt))
1290 {
1291 verify_error_all = 1;
1292 }
1293 else if (NILP (Flistp (verify_error)))
1294 {
1295 boot_error (p, "gnutls-boot: invalid :verify_error parameter (not a list)");
1296 return Qnil;
1297 }
1298
1299 if (!STRINGP (hostname))
1300 {
1301 boot_error (p, "gnutls-boot: invalid :hostname parameter (not a string)");
1302 return Qnil;
1303 }
1304 c_hostname = SSDATA (hostname);
1305
1306 state = XPROCESS (proc)->gnutls_state;
1307
1308 if (TYPE_RANGED_INTEGERP (int, loglevel))
1309 {
1310 gnutls_global_set_log_function (gnutls_log_function);
1311 #ifdef HAVE_GNUTLS3
1312 gnutls_global_set_audit_log_function (gnutls_audit_log_function);
1313 #endif
1314 gnutls_global_set_log_level (XINT (loglevel));
1315 max_log_level = XINT (loglevel);
1316 XPROCESS (proc)->gnutls_log_level = max_log_level;
1317 }
1318
1319 GNUTLS_LOG2 (1, max_log_level, "connecting to host:", c_hostname);
1320
1321 /* Always initialize globals. */
1322 global_init = emacs_gnutls_global_init ();
1323 if (! NILP (Fgnutls_errorp (global_init)))
1324 return global_init;
1325
1326 /* Before allocating new credentials, deallocate any credentials
1327 that PROC might already have. */
1328 emacs_gnutls_deinit (proc);
1329
1330 /* Mark PROC as a GnuTLS process. */
1331 XPROCESS (proc)->gnutls_state = NULL;
1332 XPROCESS (proc)->gnutls_x509_cred = NULL;
1333 XPROCESS (proc)->gnutls_anon_cred = NULL;
1334 pset_gnutls_cred_type (XPROCESS (proc), type);
1335 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_EMPTY;
1336
1337 GNUTLS_LOG (1, max_log_level, "allocating credentials");
1338 if (EQ (type, Qgnutls_x509pki))
1339 {
1340 Lisp_Object verify_flags;
1341 unsigned int gnutls_verify_flags = GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT;
1342
1343 GNUTLS_LOG (2, max_log_level, "allocating x509 credentials");
1344 check_memory_full (gnutls_certificate_allocate_credentials (&x509_cred));
1345 XPROCESS (proc)->gnutls_x509_cred = x509_cred;
1346
1347 verify_flags = Fplist_get (proplist, QCgnutls_bootprop_verify_flags);
1348 if (NUMBERP (verify_flags))
1349 {
1350 gnutls_verify_flags = XINT (verify_flags);
1351 GNUTLS_LOG (2, max_log_level, "setting verification flags");
1352 }
1353 else if (NILP (verify_flags))
1354 GNUTLS_LOG (2, max_log_level, "using default verification flags");
1355 else
1356 GNUTLS_LOG (2, max_log_level, "ignoring invalid verify-flags");
1357
1358 gnutls_certificate_set_verify_flags (x509_cred, gnutls_verify_flags);
1359 }
1360 else /* Qgnutls_anon: */
1361 {
1362 GNUTLS_LOG (2, max_log_level, "allocating anon credentials");
1363 check_memory_full (gnutls_anon_allocate_client_credentials (&anon_cred));
1364 XPROCESS (proc)->gnutls_anon_cred = anon_cred;
1365 }
1366
1367 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_CRED_ALLOC;
1368
1369 if (EQ (type, Qgnutls_x509pki))
1370 {
1371 /* TODO: GNUTLS_X509_FMT_DER is also an option. */
1372 int file_format = GNUTLS_X509_FMT_PEM;
1373 Lisp_Object tail;
1374
1375 #if GNUTLS_VERSION_MAJOR + \
1376 (GNUTLS_VERSION_MINOR > 0 || GNUTLS_VERSION_PATCH >= 20) > 3
1377 ret = gnutls_certificate_set_x509_system_trust (x509_cred);
1378 if (ret < GNUTLS_E_SUCCESS)
1379 {
1380 check_memory_full (ret);
1381 GNUTLS_LOG2i (4, max_log_level,
1382 "setting system trust failed with code ", ret);
1383 }
1384 #endif
1385
1386 for (tail = trustfiles; CONSP (tail); tail = XCDR (tail))
1387 {
1388 Lisp_Object trustfile = XCAR (tail);
1389 if (STRINGP (trustfile))
1390 {
1391 GNUTLS_LOG2 (1, max_log_level, "setting the trustfile: ",
1392 SSDATA (trustfile));
1393 trustfile = ENCODE_FILE (trustfile);
1394 #ifdef WINDOWSNT
1395 /* Since GnuTLS doesn't support UTF-8 or UTF-16 encoded
1396 file names on Windows, we need to re-encode the file
1397 name using the current ANSI codepage. */
1398 trustfile = ansi_encode_filename (trustfile);
1399 #endif
1400 ret = gnutls_certificate_set_x509_trust_file
1401 (x509_cred,
1402 SSDATA (trustfile),
1403 file_format);
1404
1405 if (ret < GNUTLS_E_SUCCESS)
1406 return gnutls_make_error (ret);
1407 }
1408 else
1409 {
1410 emacs_gnutls_deinit (proc);
1411 boot_error (p, "Invalid trustfile");
1412 return Qnil;
1413 }
1414 }
1415
1416 for (tail = crlfiles; CONSP (tail); tail = XCDR (tail))
1417 {
1418 Lisp_Object crlfile = XCAR (tail);
1419 if (STRINGP (crlfile))
1420 {
1421 GNUTLS_LOG2 (1, max_log_level, "setting the CRL file: ",
1422 SSDATA (crlfile));
1423 crlfile = ENCODE_FILE (crlfile);
1424 #ifdef WINDOWSNT
1425 crlfile = ansi_encode_filename (crlfile);
1426 #endif
1427 ret = gnutls_certificate_set_x509_crl_file
1428 (x509_cred, SSDATA (crlfile), file_format);
1429
1430 if (ret < GNUTLS_E_SUCCESS)
1431 return gnutls_make_error (ret);
1432 }
1433 else
1434 {
1435 emacs_gnutls_deinit (proc);
1436 boot_error (p, "Invalid CRL file");
1437 return Qnil;
1438 }
1439 }
1440
1441 for (tail = keylist; CONSP (tail); tail = XCDR (tail))
1442 {
1443 Lisp_Object keyfile = Fcar (XCAR (tail));
1444 Lisp_Object certfile = Fcar (Fcdr (XCAR (tail)));
1445 if (STRINGP (keyfile) && STRINGP (certfile))
1446 {
1447 GNUTLS_LOG2 (1, max_log_level, "setting the client key file: ",
1448 SSDATA (keyfile));
1449 GNUTLS_LOG2 (1, max_log_level, "setting the client cert file: ",
1450 SSDATA (certfile));
1451 keyfile = ENCODE_FILE (keyfile);
1452 certfile = ENCODE_FILE (certfile);
1453 #ifdef WINDOWSNT
1454 keyfile = ansi_encode_filename (keyfile);
1455 certfile = ansi_encode_filename (certfile);
1456 #endif
1457 ret = gnutls_certificate_set_x509_key_file
1458 (x509_cred, SSDATA (certfile), SSDATA (keyfile), file_format);
1459
1460 if (ret < GNUTLS_E_SUCCESS)
1461 return gnutls_make_error (ret);
1462 }
1463 else
1464 {
1465 emacs_gnutls_deinit (proc);
1466 boot_error (p, STRINGP (keyfile) ? "Invalid client cert file"
1467 : "Invalid client key file");
1468 return Qnil;
1469 }
1470 }
1471 }
1472
1473 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_FILES;
1474 GNUTLS_LOG (1, max_log_level, "gnutls callbacks");
1475 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_CALLBACKS;
1476
1477 /* Call gnutls_init here: */
1478
1479 GNUTLS_LOG (1, max_log_level, "gnutls_init");
1480 ret = gnutls_init (&state, GNUTLS_CLIENT);
1481 XPROCESS (proc)->gnutls_state = state;
1482 if (ret < GNUTLS_E_SUCCESS)
1483 return gnutls_make_error (ret);
1484 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_INIT;
1485
1486 if (STRINGP (priority_string))
1487 {
1488 priority_string_ptr = SSDATA (priority_string);
1489 GNUTLS_LOG2 (1, max_log_level, "got non-default priority string:",
1490 priority_string_ptr);
1491 }
1492 else
1493 {
1494 GNUTLS_LOG2 (1, max_log_level, "using default priority string:",
1495 priority_string_ptr);
1496 }
1497
1498 GNUTLS_LOG (1, max_log_level, "setting the priority string");
1499 ret = gnutls_priority_set_direct (state, priority_string_ptr, NULL);
1500 if (ret < GNUTLS_E_SUCCESS)
1501 return gnutls_make_error (ret);
1502
1503 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_PRIORITY;
1504
1505 if (INTEGERP (prime_bits))
1506 gnutls_dh_set_prime_bits (state, XUINT (prime_bits));
1507
1508 ret = EQ (type, Qgnutls_x509pki)
1509 ? gnutls_credentials_set (state, GNUTLS_CRD_CERTIFICATE, x509_cred)
1510 : gnutls_credentials_set (state, GNUTLS_CRD_ANON, anon_cred);
1511 if (ret < GNUTLS_E_SUCCESS)
1512 return gnutls_make_error (ret);
1513
1514 if (!gnutls_ip_address_p (c_hostname))
1515 {
1516 ret = gnutls_server_name_set (state, GNUTLS_NAME_DNS, c_hostname,
1517 strlen (c_hostname));
1518 if (ret < GNUTLS_E_SUCCESS)
1519 return gnutls_make_error (ret);
1520 }
1521
1522 GNUTLS_INITSTAGE (proc) = GNUTLS_STAGE_CRED_SET;
1523 ret = emacs_gnutls_handshake (XPROCESS (proc));
1524 if (ret < GNUTLS_E_SUCCESS)
1525 return gnutls_make_error (ret);
1526
1527 /* Now verify the peer, following
1528 http://www.gnu.org/software/gnutls/manual/html_node/Verifying-peer_0027s-certificate.html.
1529 The peer should present at least one certificate in the chain; do a
1530 check of the certificate's hostname with
1531 gnutls_x509_crt_check_hostname against :hostname. */
1532
1533 ret = gnutls_certificate_verify_peers2 (state, &peer_verification);
1534 if (ret < GNUTLS_E_SUCCESS)
1535 return gnutls_make_error (ret);
1536
1537 XPROCESS (proc)->gnutls_peer_verification = peer_verification;
1538
1539 warnings = Fplist_get (Fgnutls_peer_status (proc), intern (":warnings"));
1540 if (!NILP (warnings))
1541 {
1542 Lisp_Object tail;
1543 for (tail = warnings; CONSP (tail); tail = XCDR (tail))
1544 {
1545 Lisp_Object warning = XCAR (tail);
1546 Lisp_Object message = Fgnutls_peer_status_warning_describe (warning);
1547 if (!NILP (message))
1548 GNUTLS_LOG2 (1, max_log_level, "verification:", SSDATA (message));
1549 }
1550 }
1551
1552 if (peer_verification != 0)
1553 {
1554 if (verify_error_all
1555 || !NILP (Fmember (QCgnutls_bootprop_trustfiles, verify_error)))
1556 {
1557 emacs_gnutls_deinit (proc);
1558 boot_error (p, "Certificate validation failed %s, verification code %x",
1559 c_hostname, peer_verification);
1560 return Qnil;
1561 }
1562 else
1563 {
1564 GNUTLS_LOG2 (1, max_log_level, "certificate validation failed:",
1565 c_hostname);
1566 }
1567 }
1568
1569 /* Up to here the process is the same for X.509 certificates and
1570 OpenPGP keys. From now on X.509 certificates are assumed. This
1571 can be easily extended to work with openpgp keys as well. */
1572 if (gnutls_certificate_type_get (state) == GNUTLS_CRT_X509)
1573 {
1574 gnutls_x509_crt_t gnutls_verify_cert;
1575 const gnutls_datum_t *gnutls_verify_cert_list;
1576 unsigned int gnutls_verify_cert_list_size;
1577
1578 ret = gnutls_x509_crt_init (&gnutls_verify_cert);
1579 if (ret < GNUTLS_E_SUCCESS)
1580 return gnutls_make_error (ret);
1581
1582 gnutls_verify_cert_list =
1583 gnutls_certificate_get_peers (state, &gnutls_verify_cert_list_size);
1584
1585 if (gnutls_verify_cert_list == NULL)
1586 {
1587 gnutls_x509_crt_deinit (gnutls_verify_cert);
1588 emacs_gnutls_deinit (proc);
1589 boot_error (p, "No x509 certificate was found\n");
1590 return Qnil;
1591 }
1592
1593 /* We only check the first certificate in the given chain. */
1594 ret = gnutls_x509_crt_import (gnutls_verify_cert,
1595 &gnutls_verify_cert_list[0],
1596 GNUTLS_X509_FMT_DER);
1597
1598 if (ret < GNUTLS_E_SUCCESS)
1599 {
1600 gnutls_x509_crt_deinit (gnutls_verify_cert);
1601 return gnutls_make_error (ret);
1602 }
1603
1604 XPROCESS (proc)->gnutls_certificate = gnutls_verify_cert;
1605
1606 int err = gnutls_x509_crt_check_hostname (gnutls_verify_cert,
1607 c_hostname);
1608 check_memory_full (err);
1609 if (!err)
1610 {
1611 XPROCESS (proc)->gnutls_extra_peer_verification |=
1612 CERTIFICATE_NOT_MATCHING;
1613 if (verify_error_all
1614 || !NILP (Fmember (QCgnutls_bootprop_hostname, verify_error)))
1615 {
1616 gnutls_x509_crt_deinit (gnutls_verify_cert);
1617 emacs_gnutls_deinit (proc);
1618 boot_error (p, "The x509 certificate does not match \"%s\"", c_hostname);
1619 return Qnil;
1620 }
1621 else
1622 {
1623 GNUTLS_LOG2 (1, max_log_level, "x509 certificate does not match:",
1624 c_hostname);
1625 }
1626 }
1627 }
1628
1629 /* Set this flag only if the whole initialization succeeded. */
1630 XPROCESS (proc)->gnutls_p = 1;
1631
1632 return gnutls_make_error (ret);
1633 }
1634
1635 DEFUN ("gnutls-bye", Fgnutls_bye,
1636 Sgnutls_bye, 2, 2, 0,
1637 doc: /* Terminate current GnuTLS connection for process PROC.
1638 The connection should have been initiated using `gnutls-handshake'.
1639
1640 If CONT is not nil the TLS connection gets terminated and further
1641 receives and sends will be disallowed. If the return value is zero you
1642 may continue using the connection. If CONT is nil, GnuTLS actually
1643 sends an alert containing a close request and waits for the peer to
1644 reply with the same message. In order to reuse the connection you
1645 should wait for an EOF from the peer.
1646
1647 This function may also return `gnutls-e-again', or
1648 `gnutls-e-interrupted'. */)
1649 (Lisp_Object proc, Lisp_Object cont)
1650 {
1651 gnutls_session_t state;
1652 int ret;
1653
1654 CHECK_PROCESS (proc);
1655
1656 state = XPROCESS (proc)->gnutls_state;
1657
1658 gnutls_x509_crt_deinit (XPROCESS (proc)->gnutls_certificate);
1659
1660 ret = gnutls_bye (state, NILP (cont) ? GNUTLS_SHUT_RDWR : GNUTLS_SHUT_WR);
1661
1662 return gnutls_make_error (ret);
1663 }
1664
1665 #endif /* HAVE_GNUTLS */
1666
1667 DEFUN ("gnutls-available-p", Fgnutls_available_p, Sgnutls_available_p, 0, 0, 0,
1668 doc: /* Return t if GnuTLS is available in this instance of Emacs. */)
1669 (void)
1670 {
1671 #ifdef HAVE_GNUTLS
1672 # ifdef WINDOWSNT
1673 Lisp_Object found = Fassq (Qgnutls_dll, Vlibrary_cache);
1674 if (CONSP (found))
1675 return XCDR (found);
1676 else
1677 {
1678 Lisp_Object status;
1679 status = init_gnutls_functions () ? Qt : Qnil;
1680 Vlibrary_cache = Fcons (Fcons (Qgnutls_dll, status), Vlibrary_cache);
1681 return status;
1682 }
1683 # else /* !WINDOWSNT */
1684 return Qt;
1685 # endif /* !WINDOWSNT */
1686 #else /* !HAVE_GNUTLS */
1687 return Qnil;
1688 #endif /* !HAVE_GNUTLS */
1689 }
1690
1691 void
1692 syms_of_gnutls (void)
1693 {
1694 DEFSYM (Qlibgnutls_version, "libgnutls-version");
1695 Fset (Qlibgnutls_version,
1696 #ifdef HAVE_GNUTLS
1697 make_number (GNUTLS_VERSION_MAJOR * 10000
1698 + GNUTLS_VERSION_MINOR * 100
1699 + GNUTLS_VERSION_PATCH)
1700 #else
1701 make_number (-1)
1702 #endif
1703 );
1704 #ifdef HAVE_GNUTLS
1705 gnutls_global_initialized = 0;
1706
1707 DEFSYM (Qgnutls_code, "gnutls-code");
1708 DEFSYM (Qgnutls_anon, "gnutls-anon");
1709 DEFSYM (Qgnutls_x509pki, "gnutls-x509pki");
1710
1711 /* The following are for the property list of 'gnutls-boot'. */
1712 DEFSYM (QCgnutls_bootprop_hostname, ":hostname");
1713 DEFSYM (QCgnutls_bootprop_priority, ":priority");
1714 DEFSYM (QCgnutls_bootprop_trustfiles, ":trustfiles");
1715 DEFSYM (QCgnutls_bootprop_keylist, ":keylist");
1716 DEFSYM (QCgnutls_bootprop_crlfiles, ":crlfiles");
1717 DEFSYM (QCgnutls_bootprop_min_prime_bits, ":min-prime-bits");
1718 DEFSYM (QCgnutls_bootprop_loglevel, ":loglevel");
1719 DEFSYM (QCgnutls_bootprop_verify_flags, ":verify-flags");
1720 DEFSYM (QCgnutls_bootprop_verify_error, ":verify-error");
1721
1722 DEFSYM (Qgnutls_e_interrupted, "gnutls-e-interrupted");
1723 Fput (Qgnutls_e_interrupted, Qgnutls_code,
1724 make_number (GNUTLS_E_INTERRUPTED));
1725
1726 DEFSYM (Qgnutls_e_again, "gnutls-e-again");
1727 Fput (Qgnutls_e_again, Qgnutls_code,
1728 make_number (GNUTLS_E_AGAIN));
1729
1730 DEFSYM (Qgnutls_e_invalid_session, "gnutls-e-invalid-session");
1731 Fput (Qgnutls_e_invalid_session, Qgnutls_code,
1732 make_number (GNUTLS_E_INVALID_SESSION));
1733
1734 DEFSYM (Qgnutls_e_not_ready_for_handshake, "gnutls-e-not-ready-for-handshake");
1735 Fput (Qgnutls_e_not_ready_for_handshake, Qgnutls_code,
1736 make_number (GNUTLS_E_APPLICATION_ERROR_MIN));
1737
1738 defsubr (&Sgnutls_get_initstage);
1739 defsubr (&Sgnutls_asynchronous_parameters);
1740 defsubr (&Sgnutls_errorp);
1741 defsubr (&Sgnutls_error_fatalp);
1742 defsubr (&Sgnutls_error_string);
1743 defsubr (&Sgnutls_boot);
1744 defsubr (&Sgnutls_deinit);
1745 defsubr (&Sgnutls_bye);
1746 defsubr (&Sgnutls_peer_status);
1747 defsubr (&Sgnutls_peer_status_warning_describe);
1748
1749 DEFVAR_INT ("gnutls-log-level", global_gnutls_log_level,
1750 doc: /* Logging level used by the GnuTLS functions.
1751 Set this larger than 0 to get debug output in the *Messages* buffer.
1752 1 is for important messages, 2 is for debug data, and higher numbers
1753 are as per the GnuTLS logging conventions. */);
1754 global_gnutls_log_level = 0;
1755
1756 #endif /* HAVE_GNUTLS */
1757
1758 defsubr (&Sgnutls_available_p);
1759 }