Hash :
8c08bc97
Author :
Thomas de Grivel
Date :
2025-10-16T12:32:02
configure: wip socket, test, tls
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172
/* kc3
* Copyright from 2022 to 2025 kmx.io <contact@kmx.io>
*
* Permission is hereby granted to use this software granted the above
* copyright notice and this permission paragraph are included in all
* copies and substantial portions of this software.
*
* THIS SOFTWARE IS PROVIDED "AS-IS" WITHOUT ANY GUARANTEE OF
* PURPOSE AND PERFORMANCE. IN NO EVENT WHATSOEVER SHALL THE
* AUTHOR BE CONSIDERED LIABLE FOR THE USE AND PERFORMANCE OF
* THIS SOFTWARE.
*/
#if defined(WIN32) || defined(WIN64)
# include <windows.h>
# include <wincrypt.h>
#else
# include <unistd.h>
# include <stdlib.h>
#endif
#include <tls.h>
#include "../libkc3/kc3.h"
#include "tls.h"
p_tls * kc3_tls_accept_socket (p_tls *ctx, p_tls *dest_client_ctx,
p_socket client_fd)
{
p_tls tmp = NULL;
assert(ctx);
assert(*ctx);
assert(dest_client_ctx);
assert(client_fd);
if (tls_accept_socket(*ctx, &tmp, *client_fd)) {
err_write_1("kc3_tls_accept_socket: tls_accept_socket: ");
err_puts(tls_error(*ctx));
assert(! "kc3_tls_accept_socket: tls_accept_socket");
return NULL;
}
*dest_client_ctx = tmp;
return dest_client_ctx;
}
p_tls * kc3_tls_configure (p_tls *ctx, p_tls_config *cfg, p_tls *dest)
{
assert(ctx);
assert(*ctx);
assert(cfg);
assert(*cfg);
if (tls_configure(*ctx, *cfg)) {
err_write_1("kc3_tls_configure: tls_configure: ");
err_puts(tls_error(*ctx));
assert(! "kc3_tls_configure: tls_configure");
return NULL;
}
if (! dest)
return ctx;
*dest = *ctx;
return dest;
}
s_str * kc3_tls_ca_cert_path (s_str *dest)
{
const char *default_path;
uw i;
const s_str paths[] = {
STR("/etc/certs/ca-certificates.crt"),
STR("/etc/pki/tls/certs/ca-bundle.crt"),
STR("/etc/ssl/cert.pem"),
STR("/etc/ssl/certs/ca-certificates.crt"),
STR("/usr/share/certs/ca-root-nss.crt"),
STR("/usr/local/share/certs/ca-root-nss.crt"),
STR("/usr/ssl/certs/ca-bundle.crt"),
};
const char *ssl_cert_file;
assert(dest);
ssl_cert_file = getenv("SSL_CERT_FILE");
if (ssl_cert_file && access(ssl_cert_file, R_OK) == 0)
return str_init_1_alloc(dest, ssl_cert_file);
default_path = tls_default_ca_cert_file();
if (default_path && access(default_path, R_OK) == 0)
return str_init_1_alloc(dest, default_path);
i = 0;
while (i < sizeof(paths) / sizeof(*paths)) {
if (access(paths[i].ptr.pchar, R_OK) == 0) {
*dest = paths[i];
return dest;
}
i++;
}
#if defined(WIN32) || defined(WIN64)
err_puts("kc3_tls_ca_cert_path: not implemented");
assert(! "kc3_tls_ca_cert_path: not implemented");
#else
err_puts("kc3_tls_ca_cert_path: not found");
assert(! "kc3_tls_ca_cert_path: not found");
#endif
return NULL;
}
p_tls * kc3_tls_client (p_tls *dest)
{
p_tls tmp = NULL;
assert(dest);
if (! (tmp = tls_client())) {
err_puts("kc3_tls_client: tls_client");
assert(! "kc3_tls_client: tls_client");
return NULL;
}
*dest = tmp;
return dest;
}
p_tls * kc3_tls_close (p_tls *ctx, p_tls *dest)
{
assert(ctx);
assert(*ctx);
assert(dest);
if (tls_close(*ctx)) {
err_write_1("kc3_tls_close: tls_close: ");
err_puts(tls_error(*ctx));
return NULL;
}
*dest = *ctx;
return dest;
}
p_tls * kc3_tls_connect_socket (p_tls *ctx, p_socket sockfd,
const s_str *hostname,
p_tls *dest)
{
assert(ctx);
assert(sockfd);
assert(hostname);
assert(dest);
if (tls_connect_socket(*ctx, *sockfd, hostname->ptr.pchar)) {
err_write_1("kc3_tls_connect_socket: tls_connect_socket: ");
err_puts(tls_error(*ctx));
assert(! "kc3_tls_connect_socket: tls_connect_socket");
return NULL;
}
*dest = *ctx;
return dest;
}
void kc3_tls_free (p_tls *ctx)
{
assert(ctx);
assert(*ctx);
tls_free(*ctx);
}
s_tag * kc3_tls_init (s_tag *dest)
{
if (tls_init()) {
err_puts("kc3_tls_init: tls_init");
assert(! "kc3_tls_init: tls_init");
return NULL;
}
return tag_init_psym(dest, sym_1("TLS"));
}
p_tls * kc3_tls_server (p_tls *dest)
{
p_tls tmp;
if (! (tmp = tls_server())) {
err_write_1("kc3_tls_server: tls_server: ");
err_puts(tls_error(tmp));
assert(! "kc3_tls_server: tls_server");
return NULL;
}
*dest = tmp;
return dest;
}