wined3d: Use command buffer IDs for synchronisation in wined3d_buffer_gl_sync_apple().
[wine/zf.git] / dlls / crypt32 / unixlib.c
blob035f2d936bba475a4233f76fec264b55ba9c4a77
1 /*
2 * Copyright 2019 Hans Leidekker for CodeWeavers
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19 #if 0
20 #pragma makedep unix
21 #endif
23 #include "config.h"
24 #include "wine/port.h"
26 #include <stdarg.h>
27 #include <dirent.h>
28 #include <fcntl.h>
29 #include <unistd.h>
30 #ifdef HAVE_SYS_STAT_H
31 #include <sys/stat.h>
32 #endif
33 #ifdef HAVE_SECURITY_SECURITY_H
34 #include <Security/Security.h>
35 #endif
36 #ifdef SONAME_LIBGNUTLS
37 #include <gnutls/pkcs12.h>
38 #endif
40 #include "ntstatus.h"
41 #define WIN32_NO_STATUS
42 #include "windef.h"
43 #include "winbase.h"
44 #include "winternl.h"
45 #include "wincrypt.h"
46 #include "snmp.h"
47 #include "crypt32_private.h"
49 #include "wine/debug.h"
50 #include "wine/heap.h"
52 WINE_DEFAULT_DEBUG_CHANNEL(crypt);
54 #ifdef SONAME_LIBGNUTLS
56 WINE_DECLARE_DEBUG_CHANNEL(winediag);
58 /* Not present in gnutls version < 3.0 */
59 int gnutls_pkcs12_simple_parse(gnutls_pkcs12_t p12, const char *password,
60 gnutls_x509_privkey_t *key, gnutls_x509_crt_t **chain, unsigned int *chain_len,
61 gnutls_x509_crt_t **extra_certs, unsigned int *extra_certs_len,
62 gnutls_x509_crl_t * crl, unsigned int flags);
64 int gnutls_x509_privkey_get_pk_algorithm2(gnutls_x509_privkey_t, unsigned int*);
66 static void *libgnutls_handle;
67 #define MAKE_FUNCPTR(f) static typeof(f) * p##f
68 MAKE_FUNCPTR(gnutls_global_deinit);
69 MAKE_FUNCPTR(gnutls_global_init);
70 MAKE_FUNCPTR(gnutls_global_set_log_function);
71 MAKE_FUNCPTR(gnutls_global_set_log_level);
72 MAKE_FUNCPTR(gnutls_perror);
73 MAKE_FUNCPTR(gnutls_pkcs12_deinit);
74 MAKE_FUNCPTR(gnutls_pkcs12_import);
75 MAKE_FUNCPTR(gnutls_pkcs12_init);
76 MAKE_FUNCPTR(gnutls_pkcs12_simple_parse);
77 MAKE_FUNCPTR(gnutls_x509_crt_export);
78 MAKE_FUNCPTR(gnutls_x509_privkey_export_rsa_raw2);
79 MAKE_FUNCPTR(gnutls_x509_privkey_get_pk_algorithm2);
80 #undef MAKE_FUNCPTR
82 static void gnutls_log( int level, const char *msg )
84 TRACE( "<%d> %s", level, msg );
87 BOOL gnutls_initialize(void)
89 const char *env_str;
90 int ret;
92 if ((env_str = getenv("GNUTLS_SYSTEM_PRIORITY_FILE")))
94 WARN("GNUTLS_SYSTEM_PRIORITY_FILE is %s.\n", debugstr_a(env_str));
96 else
98 WARN("Setting GNUTLS_SYSTEM_PRIORITY_FILE to \"/dev/null\".\n");
99 setenv("GNUTLS_SYSTEM_PRIORITY_FILE", "/dev/null", 0);
102 if (!(libgnutls_handle = dlopen( SONAME_LIBGNUTLS, RTLD_NOW )))
104 ERR_(winediag)( "failed to load libgnutls, no support for pfx import/export\n" );
105 return FALSE;
108 #define LOAD_FUNCPTR(f) \
109 if (!(p##f = dlsym( libgnutls_handle, #f ))) \
111 ERR( "failed to load %s\n", #f ); \
112 goto fail; \
115 LOAD_FUNCPTR(gnutls_global_deinit)
116 LOAD_FUNCPTR(gnutls_global_init)
117 LOAD_FUNCPTR(gnutls_global_set_log_function)
118 LOAD_FUNCPTR(gnutls_global_set_log_level)
119 LOAD_FUNCPTR(gnutls_perror)
120 LOAD_FUNCPTR(gnutls_pkcs12_deinit)
121 LOAD_FUNCPTR(gnutls_pkcs12_import)
122 LOAD_FUNCPTR(gnutls_pkcs12_init)
123 LOAD_FUNCPTR(gnutls_pkcs12_simple_parse)
124 LOAD_FUNCPTR(gnutls_x509_crt_export)
125 LOAD_FUNCPTR(gnutls_x509_privkey_export_rsa_raw2)
126 LOAD_FUNCPTR(gnutls_x509_privkey_get_pk_algorithm2)
127 #undef LOAD_FUNCPTR
129 if ((ret = pgnutls_global_init()) != GNUTLS_E_SUCCESS)
131 pgnutls_perror( ret );
132 goto fail;
135 if (TRACE_ON( crypt ))
137 pgnutls_global_set_log_level( 4 );
138 pgnutls_global_set_log_function( gnutls_log );
141 return TRUE;
143 fail:
144 dlclose( libgnutls_handle );
145 libgnutls_handle = NULL;
146 return FALSE;
149 void gnutls_uninitialize(void)
151 pgnutls_global_deinit();
152 dlclose( libgnutls_handle );
153 libgnutls_handle = NULL;
155 #define RSA_MAGIC_KEY ('R' | ('S' << 8) | ('A' << 16) | ('2' << 24))
156 #define RSA_PUBEXP 65537
158 static DWORD import_key( gnutls_x509_privkey_t key, DWORD flags, void **data_ret )
160 int i, ret;
161 unsigned int bitlen;
162 gnutls_datum_t m, e, d, p, q, u, e1, e2;
163 BLOBHEADER *hdr;
164 RSAPUBKEY *rsakey;
165 BYTE *buf, *src, *dst;
166 DWORD size;
168 *data_ret = NULL;
170 if ((ret = pgnutls_x509_privkey_get_pk_algorithm2( key, &bitlen )) < 0)
172 pgnutls_perror( ret );
173 return 0;
176 if (ret != GNUTLS_PK_RSA)
178 FIXME( "key algorithm %u not supported\n", ret );
179 return 0;
182 if ((ret = pgnutls_x509_privkey_export_rsa_raw2( key, &m, &e, &d, &p, &q, &u, &e1, &e2 )) < 0)
184 pgnutls_perror( ret );
185 return 0;
188 size = sizeof(*hdr) + sizeof(*rsakey) + (bitlen * 9 / 16);
189 if (!(buf = RtlAllocateHeap( GetProcessHeap(), 0, size ))) goto done;
191 hdr = (BLOBHEADER *)buf;
192 hdr->bType = PRIVATEKEYBLOB;
193 hdr->bVersion = CUR_BLOB_VERSION;
194 hdr->reserved = 0;
195 hdr->aiKeyAlg = CALG_RSA_KEYX;
197 rsakey = (RSAPUBKEY *)(hdr + 1);
198 rsakey->magic = RSA_MAGIC_KEY;
199 rsakey->bitlen = bitlen;
200 rsakey->pubexp = RSA_PUBEXP;
202 dst = (BYTE *)(rsakey + 1);
203 if (m.size == bitlen / 8 + 1 && !m.data[0]) src = m.data + 1;
204 else if (m.size != bitlen / 8) goto done;
205 else src = m.data;
206 for (i = bitlen / 8 - 1; i >= 0; i--) *dst++ = src[i];
208 if (p.size == bitlen / 16 + 1 && !p.data[0]) src = p.data + 1;
209 else if (p.size != bitlen / 16) goto done;
210 else src = p.data;
211 for (i = bitlen / 16 - 1; i >= 0; i--) *dst++ = src[i];
213 if (q.size == bitlen / 16 + 1 && !q.data[0]) src = q.data + 1;
214 else if (q.size != bitlen / 16) goto done;
215 else src = q.data;
216 for (i = bitlen / 16 - 1; i >= 0; i--) *dst++ = src[i];
218 if (e1.size == bitlen / 16 + 1 && !e1.data[0]) src = e1.data + 1;
219 else if (e1.size != bitlen / 16) goto done;
220 else src = e1.data;
221 for (i = bitlen / 16 - 1; i >= 0; i--) *dst++ = src[i];
223 if (e2.size == bitlen / 16 + 1 && !e2.data[0]) src = e2.data + 1;
224 else if (e2.size != bitlen / 16) goto done;
225 else src = e2.data;
226 for (i = bitlen / 16 - 1; i >= 0; i--) *dst++ = src[i];
228 if (u.size == bitlen / 16 + 1 && !u.data[0]) src = u.data + 1;
229 else if (u.size != bitlen / 16) goto done;
230 else src = u.data;
231 for (i = bitlen / 16 - 1; i >= 0; i--) *dst++ = src[i];
233 if (d.size == bitlen / 8 + 1 && !d.data[0]) src = d.data + 1;
234 else if (d.size != bitlen / 8) goto done;
235 else src = d.data;
236 for (i = bitlen / 8 - 1; i >= 0; i--) *dst++ = src[i];
238 *data_ret = buf;
240 done:
241 free( m.data );
242 free( e.data );
243 free( d.data );
244 free( p.data );
245 free( q.data );
246 free( u.data );
247 free( e1.data );
248 free( e2.data );
249 if (!*data_ret) RtlFreeHeap( GetProcessHeap(), 0, buf );
250 return size;
253 static char *password_to_ascii( const WCHAR *str )
255 char *ret;
256 unsigned int i = 0;
258 if (!(ret = malloc( (lstrlenW(str) + 1) * sizeof(*ret) ))) return NULL;
259 while (*str)
261 if (*str > 0x7f) WARN( "password contains non-ascii characters\n" );
262 ret[i++] = *str++;
264 ret[i] = 0;
265 return ret;
268 static BOOL WINAPI import_cert_store( CRYPT_DATA_BLOB *pfx, const WCHAR *password, DWORD flags,
269 void **key_ret, void ***chain_ret, DWORD *count_ret )
271 gnutls_pkcs12_t p12;
272 gnutls_datum_t pfx_data;
273 gnutls_x509_privkey_t key;
274 gnutls_x509_crt_t *chain;
275 unsigned int chain_len, i;
276 char *pwd = NULL;
277 int ret;
279 if (password && !(pwd = password_to_ascii( password ))) return FALSE;
281 if ((ret = pgnutls_pkcs12_init( &p12 )) < 0) goto error;
283 pfx_data.data = pfx->pbData;
284 pfx_data.size = pfx->cbData;
285 if ((ret = pgnutls_pkcs12_import( p12, &pfx_data, GNUTLS_X509_FMT_DER, 0 )) < 0) goto error;
287 if ((ret = pgnutls_pkcs12_simple_parse( p12, pwd ? pwd : "", &key, &chain, &chain_len, NULL, NULL, NULL, 0 )) < 0)
288 goto error;
290 if (!import_key( key, flags, key_ret )) goto error;
292 *chain_ret = RtlAllocateHeap( GetProcessHeap(), 0, chain_len * sizeof(*chain_ret) );
293 *count_ret = chain_len;
294 for (i = 0; i < chain_len; i++)
296 size_t size = 0;
298 if ((ret = pgnutls_x509_crt_export( chain[i], GNUTLS_X509_FMT_DER, NULL, &size )) != GNUTLS_E_SHORT_MEMORY_BUFFER)
299 goto error;
301 (*chain_ret)[i] = RtlAllocateHeap( GetProcessHeap(), 0, size );
302 if ((ret = pgnutls_x509_crt_export( chain[i], GNUTLS_X509_FMT_DER, (*chain_ret)[i], &size )) < 0)
304 i++;
305 while (i) RtlFreeHeap( GetProcessHeap(), 0, (*chain_ret)[--i] );
306 RtlFreeHeap( GetProcessHeap(), 0, *chain_ret );
307 goto error;
310 pgnutls_pkcs12_deinit( p12 );
311 return TRUE;
313 error:
314 pgnutls_perror( ret );
315 pgnutls_pkcs12_deinit( p12 );
316 free( pwd );
317 return FALSE;
320 #endif /* SONAME_LIBGNUTLS */
322 struct root_cert
324 struct list entry;
325 SIZE_T size;
326 BYTE data[1];
329 static struct list root_cert_list = LIST_INIT(root_cert_list);
331 static BYTE *add_cert( SIZE_T size )
333 struct root_cert *cert = malloc( offsetof( struct root_cert, data[size] ));
335 if (!cert) return NULL;
336 cert->size = size;
337 list_add_tail( &root_cert_list, &cert->entry );
338 return cert->data;
341 struct DynamicBuffer
343 DWORD allocated;
344 DWORD used;
345 char *data;
348 static inline void reset_buffer(struct DynamicBuffer *buffer)
350 buffer->used = 0;
351 if (buffer->data) buffer->data[0] = 0;
354 static void add_line_to_buffer(struct DynamicBuffer *buffer, LPCSTR line)
356 if (buffer->used + strlen(line) + 1 > buffer->allocated)
358 DWORD new_size = max( max( buffer->allocated * 2, 1024 ), buffer->used + strlen(line) + 1 );
359 void *ptr = realloc( buffer->data, new_size );
360 if (!ptr) return;
361 buffer->data = ptr;
362 buffer->allocated = new_size;
363 if (!buffer->used) buffer->data[0] = 0;
365 strcpy( buffer->data + buffer->used, line );
366 buffer->used += strlen(line);
369 #define BASE64_DECODE_PADDING 0x100
370 #define BASE64_DECODE_WHITESPACE 0x200
371 #define BASE64_DECODE_INVALID 0x300
373 static inline int decodeBase64Byte(char c)
375 int ret = BASE64_DECODE_INVALID;
377 if (c >= 'A' && c <= 'Z')
378 ret = c - 'A';
379 else if (c >= 'a' && c <= 'z')
380 ret = c - 'a' + 26;
381 else if (c >= '0' && c <= '9')
382 ret = c - '0' + 52;
383 else if (c == '+')
384 ret = 62;
385 else if (c == '/')
386 ret = 63;
387 else if (c == '=')
388 ret = BASE64_DECODE_PADDING;
389 else if (c == ' ' || c == '\t' || c == '\r' || c == '\n')
390 ret = BASE64_DECODE_WHITESPACE;
391 return ret;
394 static BOOL base64_to_cert( const char *str )
396 DWORD i, valid, out, hasPadding;
397 BYTE block[4], *data;
399 for (i = valid = out = hasPadding = 0; str[i]; i++)
401 int d = decodeBase64Byte( str[i] );
402 if (d == BASE64_DECODE_INVALID) return FALSE;
403 if (d == BASE64_DECODE_WHITESPACE) continue;
405 /* When padding starts, data is not acceptable */
406 if (hasPadding && d != BASE64_DECODE_PADDING) return FALSE;
408 /* Padding after a full block (like "VVVV=") is ok and stops decoding */
409 if (d == BASE64_DECODE_PADDING && (valid & 3) == 0) break;
411 valid++;
412 if (d == BASE64_DECODE_PADDING)
414 hasPadding = 1;
415 /* When padding reaches a full block, stop decoding */
416 if ((valid & 3) == 0) break;
417 continue;
420 /* out is incremented in the 4-char block as follows: "1-23" */
421 if ((valid & 3) != 2) out++;
423 /* Fail if the block has bad padding; omitting padding is fine */
424 if ((valid & 3) != 0 && hasPadding) return FALSE;
426 if (!(data = add_cert( out ))) return FALSE;
427 for (i = valid = out = 0; str[i]; i++)
429 int d = decodeBase64Byte( str[i] );
430 if (d == BASE64_DECODE_WHITESPACE) continue;
431 if (d == BASE64_DECODE_PADDING) break;
432 block[valid & 3] = d;
433 valid += 1;
434 switch (valid & 3)
436 case 1:
437 data[out++] = (block[0] << 2);
438 break;
439 case 2:
440 data[out-1] = (block[0] << 2) | (block[1] >> 4);
441 break;
442 case 3:
443 data[out++] = (block[1] << 4) | (block[2] >> 2);
444 break;
445 case 0:
446 data[out++] = (block[2] << 6) | (block[3] >> 0);
447 break;
450 return TRUE;
453 /* Reads the file fd, and imports any certificates in it into store. */
454 static void import_certs_from_file( int fd )
456 FILE *fp = fdopen(fd, "r");
457 char line[1024];
458 BOOL in_cert = FALSE;
459 struct DynamicBuffer saved_cert = { 0, 0, NULL };
460 int num_certs = 0;
462 if (!fp) return;
463 TRACE("\n");
464 while (fgets(line, sizeof(line), fp))
466 static const char header[] = "-----BEGIN CERTIFICATE-----";
467 static const char trailer[] = "-----END CERTIFICATE-----";
469 if (!strncmp(line, header, strlen(header)))
471 TRACE("begin new certificate\n");
472 in_cert = TRUE;
473 reset_buffer(&saved_cert);
475 else if (!strncmp(line, trailer, strlen(trailer)))
477 TRACE("end of certificate, adding cert\n");
478 in_cert = FALSE;
479 if (base64_to_cert( saved_cert.data )) num_certs++;
481 else if (in_cert) add_line_to_buffer(&saved_cert, line);
483 free( saved_cert.data );
484 TRACE("Read %d certs\n", num_certs);
485 fclose(fp);
488 static void import_certs_from_path(LPCSTR path, BOOL allow_dir);
490 static BOOL check_buffer_resize(char **ptr_buf, size_t *buf_size, size_t check_size)
492 if (check_size > *buf_size)
494 void *ptr = realloc(*ptr_buf, check_size);
496 if (!ptr) return FALSE;
497 *buf_size = check_size;
498 *ptr_buf = ptr;
500 return TRUE;
503 /* Opens path, which must be a directory, and imports certificates from every
504 * file in the directory into store.
505 * Returns TRUE if any certificates were successfully imported.
507 static void import_certs_from_dir( LPCSTR path )
509 DIR *dir;
511 dir = opendir(path);
512 if (dir)
514 size_t path_len = strlen(path), bufsize = 0;
515 char *filebuf = NULL;
517 struct dirent *entry;
518 while ((entry = readdir(dir)))
520 if (strcmp(entry->d_name, ".") && strcmp(entry->d_name, ".."))
522 size_t name_len = strlen(entry->d_name);
524 if (!check_buffer_resize(&filebuf, &bufsize, path_len + 1 + name_len + 1)) break;
525 snprintf(filebuf, bufsize, "%s/%s", path, entry->d_name);
526 import_certs_from_path(filebuf, FALSE);
529 free(filebuf);
530 closedir(dir);
534 /* Opens path, which may be a file or a directory, and imports any certificates
535 * it finds into store.
536 * Returns TRUE if any certificates were successfully imported.
538 static void import_certs_from_path(LPCSTR path, BOOL allow_dir)
540 int fd;
542 TRACE("(%s, %d)\n", debugstr_a(path), allow_dir);
544 fd = open(path, O_RDONLY);
545 if (fd != -1)
547 struct stat st;
549 if (fstat(fd, &st) == 0)
551 if (S_ISREG(st.st_mode))
552 import_certs_from_file(fd);
553 else if (S_ISDIR(st.st_mode))
555 if (allow_dir)
556 import_certs_from_dir(path);
557 else
558 WARN("%s is a directory and directories are disallowed\n",
559 debugstr_a(path));
561 else
562 ERR("%s: invalid file type\n", path);
564 close(fd);
568 static const char * const CRYPT_knownLocations[] = {
569 "/etc/ssl/certs/ca-certificates.crt",
570 "/etc/ssl/certs",
571 "/etc/pki/tls/certs/ca-bundle.crt",
572 "/usr/share/ca-certificates/ca-bundle.crt",
573 "/usr/local/share/certs/",
574 "/etc/sfw/openssl/certs",
575 "/etc/security/cacerts", /* Android */
578 static void load_root_certs(void)
580 DWORD i;
582 #ifdef HAVE_SECURITY_SECURITY_H
583 OSStatus status;
584 CFArrayRef rootCerts;
586 status = SecTrustCopyAnchorCertificates(&rootCerts);
587 if (status == noErr)
589 for (i = 0; i < CFArrayGetCount(rootCerts); i++)
591 SecCertificateRef cert = (SecCertificateRef)CFArrayGetValueAtIndex(rootCerts, i);
592 CFDataRef certData;
593 if ((status = SecKeychainItemExport(cert, kSecFormatX509Cert, 0, NULL, &certData)) == noErr)
595 BYTE *data = add_cert( CFDataGetLength(certData) );
596 if (data) memcpy( data, CFDataGetBytePtr(certData), CFDataGetLength(certData) );
597 CFRelease(certData);
599 else
600 WARN("could not export certificate %d to X509 format: 0x%08x\n", i, (unsigned int)status);
602 CFRelease(rootCerts);
604 #endif
606 for (i = 0; i < ARRAY_SIZE(CRYPT_knownLocations) && list_empty(&root_cert_list); i++)
607 import_certs_from_path( CRYPT_knownLocations[i], TRUE );
610 static BOOL WINAPI enum_root_certs( void *buffer, SIZE_T size, SIZE_T *needed )
612 static BOOL loaded;
613 struct list *ptr;
614 struct root_cert *cert;
616 if (!loaded) load_root_certs();
617 loaded = TRUE;
619 if (!(ptr = list_head( &root_cert_list ))) return FALSE;
620 cert = LIST_ENTRY( ptr, struct root_cert, entry );
621 *needed = cert->size;
622 if (cert->size <= size)
624 memcpy( buffer, cert->data, cert->size );
625 list_remove( &cert->entry );
626 free( cert );
628 return TRUE;
631 static struct unix_funcs funcs =
633 enum_root_certs,
634 NULL
637 NTSTATUS CDECL __wine_init_unix_lib( HMODULE module, DWORD reason, const void *ptr_in, void *ptr_out )
639 switch (reason)
641 case DLL_PROCESS_ATTACH:
642 #ifdef SONAME_LIBGNUTLS
643 if (gnutls_initialize()) funcs.import_cert_store = import_cert_store;
644 #endif
645 *(const struct unix_funcs **)ptr_out = &funcs;
646 break;
647 case DLL_PROCESS_DETACH:
648 #ifdef SONAME_LIBGNUTLS
649 if (libgnutls_handle) gnutls_uninitialize();
650 #endif
651 break;
653 return STATUS_SUCCESS;