tlscredspsk.c 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308
  1. /*
  2. * QEMU crypto TLS Pre-Shared Keys (PSK) support
  3. *
  4. * Copyright (c) 2018 Red Hat, Inc.
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation; either
  9. * version 2.1 of the License, or (at your option) any later version.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, see <http://www.gnu.org/licenses/>.
  18. *
  19. */
  20. #include "qemu/osdep.h"
  21. #include "crypto/tlscredspsk.h"
  22. #include "tlscredspriv.h"
  23. #include "qapi/error.h"
  24. #include "qemu/module.h"
  25. #include "qom/object_interfaces.h"
  26. #include "trace.h"
  27. #ifdef CONFIG_GNUTLS
  28. static int
  29. lookup_key(const char *pskfile, const char *username, gnutls_datum_t *key,
  30. Error **errp)
  31. {
  32. const size_t ulen = strlen(username);
  33. GError *gerr = NULL;
  34. char *content = NULL;
  35. char **lines = NULL;
  36. size_t clen = 0, i;
  37. int ret = -1;
  38. if (!g_file_get_contents(pskfile, &content, &clen, &gerr)) {
  39. error_setg(errp, "Cannot read PSK file %s: %s",
  40. pskfile, gerr->message);
  41. g_error_free(gerr);
  42. return -1;
  43. }
  44. lines = g_strsplit(content, "\n", -1);
  45. for (i = 0; lines[i] != NULL; ++i) {
  46. if (strncmp(lines[i], username, ulen) == 0 && lines[i][ulen] == ':') {
  47. key->data = (unsigned char *) g_strdup(&lines[i][ulen + 1]);
  48. key->size = strlen(lines[i]) - ulen - 1;
  49. ret = 0;
  50. goto out;
  51. }
  52. }
  53. error_setg(errp, "Username %s not found in PSK file %s",
  54. username, pskfile);
  55. out:
  56. free(content);
  57. g_strfreev(lines);
  58. return ret;
  59. }
  60. static int
  61. qcrypto_tls_creds_psk_load(QCryptoTLSCredsPSK *creds,
  62. Error **errp)
  63. {
  64. g_autofree char *pskfile = NULL;
  65. g_autofree char *dhparams = NULL;
  66. const char *username;
  67. int ret;
  68. int rv = -1;
  69. gnutls_datum_t key = { .data = NULL };
  70. trace_qcrypto_tls_creds_psk_load(creds,
  71. creds->parent_obj.dir ? creds->parent_obj.dir : "<nodir>");
  72. if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
  73. if (creds->username) {
  74. error_setg(errp, "username should not be set when endpoint=server");
  75. goto cleanup;
  76. }
  77. if (qcrypto_tls_creds_get_path(&creds->parent_obj,
  78. QCRYPTO_TLS_CREDS_DH_PARAMS,
  79. false, &dhparams, errp) < 0 ||
  80. qcrypto_tls_creds_get_path(&creds->parent_obj,
  81. QCRYPTO_TLS_CREDS_PSKFILE,
  82. true, &pskfile, errp) < 0) {
  83. goto cleanup;
  84. }
  85. ret = gnutls_psk_allocate_server_credentials(&creds->data.server);
  86. if (ret < 0) {
  87. error_setg(errp, "Cannot allocate credentials: %s",
  88. gnutls_strerror(ret));
  89. goto cleanup;
  90. }
  91. if (qcrypto_tls_creds_get_dh_params_file(&creds->parent_obj, dhparams,
  92. &creds->parent_obj.dh_params,
  93. errp) < 0) {
  94. goto cleanup;
  95. }
  96. gnutls_psk_set_server_credentials_file(creds->data.server, pskfile);
  97. gnutls_psk_set_server_dh_params(creds->data.server,
  98. creds->parent_obj.dh_params);
  99. } else {
  100. if (qcrypto_tls_creds_get_path(&creds->parent_obj,
  101. QCRYPTO_TLS_CREDS_PSKFILE,
  102. true, &pskfile, errp) < 0) {
  103. goto cleanup;
  104. }
  105. if (creds->username) {
  106. username = creds->username;
  107. } else {
  108. username = "qemu";
  109. }
  110. if (lookup_key(pskfile, username, &key, errp) != 0) {
  111. goto cleanup;
  112. }
  113. ret = gnutls_psk_allocate_client_credentials(&creds->data.client);
  114. if (ret < 0) {
  115. error_setg(errp, "Cannot allocate credentials: %s",
  116. gnutls_strerror(ret));
  117. goto cleanup;
  118. }
  119. gnutls_psk_set_client_credentials(creds->data.client,
  120. username, &key, GNUTLS_PSK_KEY_HEX);
  121. }
  122. rv = 0;
  123. cleanup:
  124. g_free(key.data);
  125. return rv;
  126. }
  127. static void
  128. qcrypto_tls_creds_psk_unload(QCryptoTLSCredsPSK *creds)
  129. {
  130. if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT) {
  131. if (creds->data.client) {
  132. gnutls_psk_free_client_credentials(creds->data.client);
  133. creds->data.client = NULL;
  134. }
  135. } else {
  136. if (creds->data.server) {
  137. gnutls_psk_free_server_credentials(creds->data.server);
  138. creds->data.server = NULL;
  139. }
  140. }
  141. if (creds->parent_obj.dh_params) {
  142. gnutls_dh_params_deinit(creds->parent_obj.dh_params);
  143. creds->parent_obj.dh_params = NULL;
  144. }
  145. }
  146. #else /* ! CONFIG_GNUTLS */
  147. static void
  148. qcrypto_tls_creds_psk_load(QCryptoTLSCredsPSK *creds G_GNUC_UNUSED,
  149. Error **errp)
  150. {
  151. error_setg(errp, "TLS credentials support requires GNUTLS");
  152. }
  153. static void
  154. qcrypto_tls_creds_psk_unload(QCryptoTLSCredsPSK *creds G_GNUC_UNUSED)
  155. {
  156. /* nada */
  157. }
  158. #endif /* ! CONFIG_GNUTLS */
  159. static void
  160. qcrypto_tls_creds_psk_prop_set_loaded(Object *obj,
  161. bool value,
  162. Error **errp)
  163. {
  164. QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj);
  165. if (value) {
  166. qcrypto_tls_creds_psk_load(creds, errp);
  167. } else {
  168. qcrypto_tls_creds_psk_unload(creds);
  169. }
  170. }
  171. #ifdef CONFIG_GNUTLS
  172. static bool
  173. qcrypto_tls_creds_psk_prop_get_loaded(Object *obj,
  174. Error **errp G_GNUC_UNUSED)
  175. {
  176. QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj);
  177. if (creds->parent_obj.endpoint == QCRYPTO_TLS_CREDS_ENDPOINT_SERVER) {
  178. return creds->data.server != NULL;
  179. } else {
  180. return creds->data.client != NULL;
  181. }
  182. }
  183. #else /* ! CONFIG_GNUTLS */
  184. static bool
  185. qcrypto_tls_creds_psk_prop_get_loaded(Object *obj G_GNUC_UNUSED,
  186. Error **errp G_GNUC_UNUSED)
  187. {
  188. return false;
  189. }
  190. #endif /* ! CONFIG_GNUTLS */
  191. static void
  192. qcrypto_tls_creds_psk_complete(UserCreatable *uc, Error **errp)
  193. {
  194. object_property_set_bool(OBJECT(uc), true, "loaded", errp);
  195. }
  196. static void
  197. qcrypto_tls_creds_psk_finalize(Object *obj)
  198. {
  199. QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj);
  200. qcrypto_tls_creds_psk_unload(creds);
  201. }
  202. static void
  203. qcrypto_tls_creds_psk_prop_set_username(Object *obj,
  204. const char *value,
  205. Error **errp G_GNUC_UNUSED)
  206. {
  207. QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj);
  208. creds->username = g_strdup(value);
  209. }
  210. static char *
  211. qcrypto_tls_creds_psk_prop_get_username(Object *obj,
  212. Error **errp G_GNUC_UNUSED)
  213. {
  214. QCryptoTLSCredsPSK *creds = QCRYPTO_TLS_CREDS_PSK(obj);
  215. return g_strdup(creds->username);
  216. }
  217. static void
  218. qcrypto_tls_creds_psk_class_init(ObjectClass *oc, void *data)
  219. {
  220. UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
  221. ucc->complete = qcrypto_tls_creds_psk_complete;
  222. object_class_property_add_bool(oc, "loaded",
  223. qcrypto_tls_creds_psk_prop_get_loaded,
  224. qcrypto_tls_creds_psk_prop_set_loaded,
  225. NULL);
  226. object_class_property_add_str(oc, "username",
  227. qcrypto_tls_creds_psk_prop_get_username,
  228. qcrypto_tls_creds_psk_prop_set_username,
  229. NULL);
  230. }
  231. static const TypeInfo qcrypto_tls_creds_psk_info = {
  232. .parent = TYPE_QCRYPTO_TLS_CREDS,
  233. .name = TYPE_QCRYPTO_TLS_CREDS_PSK,
  234. .instance_size = sizeof(QCryptoTLSCredsPSK),
  235. .instance_finalize = qcrypto_tls_creds_psk_finalize,
  236. .class_size = sizeof(QCryptoTLSCredsPSKClass),
  237. .class_init = qcrypto_tls_creds_psk_class_init,
  238. .interfaces = (InterfaceInfo[]) {
  239. { TYPE_USER_CREATABLE },
  240. { }
  241. }
  242. };
  243. static void
  244. qcrypto_tls_creds_psk_register_types(void)
  245. {
  246. type_register_static(&qcrypto_tls_creds_psk_info);
  247. }
  248. type_init(qcrypto_tls_creds_psk_register_types);