mirror of
https://github.com/strongswan/strongswan.git
synced 2025-10-04 00:00:14 -04:00
pki: Get CA certs via SCEP
This commit is contained in:
parent
5900426a71
commit
6851273944
@ -13,9 +13,11 @@ pki_SOURCES = pki.c pki.h command.c command.h \
|
||||
commands/print.c \
|
||||
commands/pub.c \
|
||||
commands/req.c \
|
||||
commands/scepca.c \
|
||||
commands/self.c \
|
||||
commands/signcrl.c \
|
||||
commands/verify.c
|
||||
commands/verify.c \
|
||||
scep/scep.h scep/scep.c
|
||||
|
||||
pki_LDADD = \
|
||||
$(top_builddir)/src/libstrongswan/libstrongswan.la \
|
||||
|
@ -25,7 +25,7 @@
|
||||
/**
|
||||
* Maximum number of commands (+1).
|
||||
*/
|
||||
#define MAX_COMMANDS 14
|
||||
#define MAX_COMMANDS 15
|
||||
|
||||
/**
|
||||
* Maximum number of options in a command (+3)
|
||||
|
439
src/pki/commands/scepca.c
Normal file
439
src/pki/commands/scepca.c
Normal file
@ -0,0 +1,439 @@
|
||||
/*
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Copyright (C) 2012 Tobias Brunner
|
||||
* Copyright (C) 2022 Andreas Steffen, strongSec GmbH
|
||||
*
|
||||
* Copyright (C) secunet Security Networks AG
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#define _GNU_SOURCE
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
#include <unistd.h>
|
||||
#include <stdio.h>
|
||||
#include <errno.h>
|
||||
|
||||
#include "pki.h"
|
||||
#include "scep/scep.h"
|
||||
|
||||
#include <credentials/certificates/certificate.h>
|
||||
#include <credentials/certificates/x509.h>
|
||||
#include <credentials/sets/mem_cred.h>
|
||||
|
||||
|
||||
typedef enum {
|
||||
CERT_TYPE_ROOT_CA,
|
||||
CERT_TYPE_SUB_CA,
|
||||
CERT_TYPE_RA
|
||||
} cert_type_t;
|
||||
|
||||
static char *cert_type_label[] = { "Root CA", "Sub CA", "RA" };
|
||||
|
||||
/**
|
||||
* Determine certificate type based on X.509 certificate flags
|
||||
*/
|
||||
static cert_type_t get_cert_type(certificate_t *cert)
|
||||
{
|
||||
x509_t *x509;
|
||||
x509_flag_t flags;
|
||||
|
||||
x509 = (x509_t*)cert;
|
||||
flags = x509->get_flags(x509);
|
||||
|
||||
if (flags & X509_CA)
|
||||
{
|
||||
if (flags & X509_SELF_SIGNED)
|
||||
{
|
||||
return CERT_TYPE_ROOT_CA;
|
||||
}
|
||||
else
|
||||
{
|
||||
return CERT_TYPE_SUB_CA;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
return CERT_TYPE_RA;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Output cert type, subject as well as SHA256 and SHA1 fingerprints
|
||||
*/
|
||||
static bool print_cert_info(certificate_t *cert, cert_type_t cert_type)
|
||||
{
|
||||
hasher_t *hasher = NULL;
|
||||
char digest_buf[HASH_SIZE_SHA256];
|
||||
char base64_buf[HASH_SIZE_SHA256];
|
||||
chunk_t cert_digest = {digest_buf, HASH_SIZE_SHA256};
|
||||
chunk_t cert_id, encoding = chunk_empty;
|
||||
bool success = FALSE;
|
||||
|
||||
DBG1(DBG_APP, "%s cert \"%Y\"", cert_type_label[cert_type],
|
||||
cert->get_subject(cert));
|
||||
|
||||
if (!cert->get_encoding(cert, CERT_ASN1_DER, &encoding))
|
||||
{
|
||||
DBG1(DBG_APP, "could not get certificate encoding");
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
/* SHA256 certificate digest */
|
||||
hasher = lib->crypto->create_hasher(lib->crypto, HASH_SHA256);
|
||||
if (!hasher)
|
||||
{
|
||||
DBG1(DBG_APP, "could not create SHA256 hasher");
|
||||
goto end;
|
||||
}
|
||||
if (!hasher->get_hash(hasher, encoding, digest_buf))
|
||||
{
|
||||
DBG1(DBG_APP, "could not compute SHA256 hash");
|
||||
goto end;
|
||||
}
|
||||
hasher->destroy(hasher);
|
||||
|
||||
DBG1(DBG_APP, " SHA256: %#B", &cert_digest);
|
||||
|
||||
/* SHA1 certificate digest */
|
||||
hasher = lib->crypto->create_hasher(lib->crypto, HASH_SHA1);
|
||||
if (!hasher)
|
||||
{
|
||||
DBG1(DBG_APP, "could not create SHA1 hasher");
|
||||
goto end;
|
||||
}
|
||||
if (!hasher->get_hash(hasher, encoding, digest_buf))
|
||||
{
|
||||
DBG1(DBG_APP, "could not compute SHA1 hash");
|
||||
goto end;
|
||||
}
|
||||
cert_digest.len = HASH_SIZE_SHA1;
|
||||
cert_id = chunk_to_base64(cert_digest, base64_buf);
|
||||
|
||||
DBG1(DBG_APP, " SHA1 : %#B (%.*s)", &cert_digest,
|
||||
cert_id.len-1, cert_id.ptr);
|
||||
success = TRUE;
|
||||
|
||||
end:
|
||||
DESTROY_IF(hasher);
|
||||
chunk_free(&encoding);
|
||||
|
||||
return success;
|
||||
}
|
||||
|
||||
static bool build_pathname(char **path, cert_type_t cert_type, int *cert_type_count,
|
||||
char *caout, char *raout, cred_encoding_type_t form)
|
||||
{
|
||||
char *basename, *extension, *dot, *suffix;
|
||||
int count, len;
|
||||
bool number;
|
||||
|
||||
basename = caout;
|
||||
extension = "";
|
||||
suffix = (form == CERT_ASN1_DER) ? "der" : "pem";
|
||||
|
||||
count = cert_type_count[cert_type];
|
||||
number = count > 1;
|
||||
|
||||
switch (cert_type)
|
||||
{
|
||||
default:
|
||||
case CERT_TYPE_ROOT_CA:
|
||||
if (count > 1)
|
||||
{
|
||||
extension = "-root";
|
||||
}
|
||||
break;
|
||||
case CERT_TYPE_SUB_CA:
|
||||
number = TRUE;
|
||||
break;
|
||||
case CERT_TYPE_RA:
|
||||
if (raout)
|
||||
{
|
||||
basename = raout;
|
||||
}
|
||||
else
|
||||
{
|
||||
extension = "-ra";
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
/* skip if no path is defined */
|
||||
if (!basename)
|
||||
{
|
||||
*path = NULL;
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/* check for a file suffix */
|
||||
dot = strrchr(basename, '.');
|
||||
len = dot ? (dot - basename) : strlen(basename);
|
||||
if (dot && (dot[1] != '\0'))
|
||||
{
|
||||
suffix = dot + 1;
|
||||
}
|
||||
|
||||
if (number)
|
||||
{
|
||||
return asprintf(path, "%.*s%s-%d.%s", len, basename, extension,
|
||||
count, suffix) > 0;
|
||||
}
|
||||
else
|
||||
{
|
||||
return asprintf(path, "%.*s%s.%s", len, basename, extension, suffix) > 0;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Writo CA/RA certificate to file in DER or PEM format
|
||||
*/
|
||||
static bool write_cert(certificate_t *cert, cert_type_t cert_type, bool trusted,
|
||||
char *path, cred_encoding_type_t form, bool force)
|
||||
{
|
||||
chunk_t encoding = chunk_empty;
|
||||
time_t until;
|
||||
bool written, valid;
|
||||
|
||||
if (path)
|
||||
{
|
||||
if (!cert->get_encoding(cert, form, &encoding))
|
||||
{
|
||||
DBG1(DBG_APP, "could not get certificate encoding");
|
||||
return FALSE;
|
||||
}
|
||||
|
||||
written = chunk_write(encoding, path, 0022, force);
|
||||
chunk_free(&encoding);
|
||||
|
||||
if (!written)
|
||||
{
|
||||
DBG1(DBG_APP, "could not write cert file '%s': %s",
|
||||
path, strerror(errno));
|
||||
return FALSE;
|
||||
}
|
||||
}
|
||||
valid = cert->get_validity(cert, NULL, NULL, &until);
|
||||
DBG1(DBG_APP, "%s cert is %strusted, %s %T, %s'%s'",
|
||||
cert_type_label[cert_type], trusted ? "" : "un",
|
||||
valid ? "valid until" : "invalid since", &until, FALSE,
|
||||
path ? "written to " : "", path ? path : "not written");
|
||||
|
||||
return TRUE;
|
||||
}
|
||||
|
||||
/**
|
||||
* Get CA certificate[s] from a SCEP server (RFC 8894)
|
||||
*/
|
||||
static int scepca()
|
||||
{
|
||||
cred_encoding_type_t form = CERT_ASN1_DER;
|
||||
chunk_t scep_response = chunk_empty;
|
||||
mem_cred_t *creds = NULL;
|
||||
certificate_t *cert;
|
||||
cert_type_t cert_type;
|
||||
pkcs7_t *pkcs7 = NULL;
|
||||
bool force = FALSE, written = FALSE;
|
||||
char *arg, *url = NULL, *caout = NULL, *raout = NULL, *path = NULL;
|
||||
int status = 1;
|
||||
|
||||
int cert_type_count[] = { 0, 0, 0 };
|
||||
|
||||
scep_http_params_t http_params = {
|
||||
.get_request = TRUE, .timeout = 30, .bind = NULL
|
||||
};
|
||||
|
||||
while (TRUE)
|
||||
{
|
||||
switch (command_getopt(&arg))
|
||||
{
|
||||
case 'h':
|
||||
return command_usage(NULL);
|
||||
case 'u':
|
||||
url = arg;
|
||||
continue;
|
||||
case 'c':
|
||||
caout = arg;
|
||||
continue;
|
||||
case 'r':
|
||||
raout = arg;
|
||||
continue;
|
||||
case 'f':
|
||||
if (!get_form(arg, &form, CRED_CERTIFICATE))
|
||||
{
|
||||
return command_usage("invalid certificate output format");
|
||||
}
|
||||
continue;
|
||||
case 'F':
|
||||
force = TRUE;
|
||||
continue;
|
||||
case EOF:
|
||||
break;
|
||||
default:
|
||||
return command_usage("invalid --scepca option");
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
if (!url)
|
||||
{
|
||||
return command_usage("--url is required");
|
||||
}
|
||||
|
||||
if (!scep_http_request(url, chunk_empty, SCEP_GET_CA_CERT, &http_params,
|
||||
&scep_response))
|
||||
{
|
||||
DBG1(DBG_APP, "did not receive a valid scep response");
|
||||
return 1;
|
||||
}
|
||||
|
||||
creds = mem_cred_create();
|
||||
lib->credmgr->add_set(lib->credmgr, &creds->set);
|
||||
|
||||
pkcs7 = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
|
||||
BUILD_BLOB_ASN1_DER, scep_response, BUILD_END);
|
||||
if (!pkcs7)
|
||||
{ /* no PKCS#7 encoded CA+RA certificates, assume single root CA cert */
|
||||
|
||||
cert = lib->creds->create(lib->creds, CRED_CERTIFICATE, CERT_X509,
|
||||
BUILD_BLOB, scep_response, BUILD_END);
|
||||
if (!cert)
|
||||
{
|
||||
DBG1(DBG_APP, "could not parse single CA certificate");
|
||||
goto end;
|
||||
}
|
||||
cert_type = get_cert_type(cert);
|
||||
cert_type_count[cert_type]++;
|
||||
|
||||
if (print_cert_info(cert, cert_type) &&
|
||||
build_pathname(&path, cert_type, cert_type_count, caout, raout, form))
|
||||
{
|
||||
written = write_cert(cert, cert_type, FALSE, path, form, force);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
enumerator_t *enumerator;
|
||||
|
||||
enumerator = pkcs7->create_cert_enumerator(pkcs7);
|
||||
while (enumerator->enumerate(enumerator, &cert))
|
||||
{
|
||||
cert_type = get_cert_type(cert);
|
||||
if (cert_type == CERT_TYPE_ROOT_CA)
|
||||
{
|
||||
/* trust in root CA has to be established manuallly */
|
||||
creds->add_cert(creds, TRUE, cert->get_ref(cert));
|
||||
|
||||
cert_type_count[cert_type]++;
|
||||
|
||||
if (!print_cert_info(cert, cert_type))
|
||||
{
|
||||
goto end;
|
||||
}
|
||||
if (build_pathname(&path, cert_type, cert_type_count,
|
||||
caout, raout, form))
|
||||
{
|
||||
written = write_cert(cert, cert_type, FALSE, path, form, force);
|
||||
free(path);
|
||||
}
|
||||
if (!written)
|
||||
{
|
||||
break;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
/* trust relative to root CA will be established in round 2 */
|
||||
creds->add_cert(creds, FALSE, cert->get_ref(cert));
|
||||
}
|
||||
}
|
||||
enumerator->destroy(enumerator);
|
||||
|
||||
if (!written)
|
||||
{
|
||||
goto end;
|
||||
}
|
||||
|
||||
enumerator = pkcs7->create_cert_enumerator(pkcs7);
|
||||
while (enumerator->enumerate(enumerator, &cert))
|
||||
{
|
||||
written = FALSE;
|
||||
|
||||
cert_type = get_cert_type(cert);
|
||||
if (cert_type != CERT_TYPE_ROOT_CA)
|
||||
{
|
||||
enumerator_t *certs;
|
||||
bool trusted;
|
||||
|
||||
if (!print_cert_info(cert, cert_type))
|
||||
{
|
||||
break;
|
||||
}
|
||||
|
||||
/* establish trust relativ to root CA */
|
||||
certs = lib->credmgr->create_trusted_enumerator(lib->credmgr,
|
||||
KEY_RSA, cert->get_subject(cert), FALSE);
|
||||
trusted = certs->enumerate(certs, &cert, NULL);
|
||||
certs->destroy(certs);
|
||||
|
||||
cert_type_count[cert_type]++;
|
||||
|
||||
if (build_pathname(&path, cert_type, cert_type_count,
|
||||
caout, raout, form))
|
||||
{
|
||||
written = write_cert(cert, cert_type, trusted, path, form, force);
|
||||
free(path);
|
||||
}
|
||||
if (!written)
|
||||
{
|
||||
break;
|
||||
}
|
||||
}
|
||||
}
|
||||
enumerator->destroy(enumerator);
|
||||
}
|
||||
status = written ? 0 : 1;
|
||||
|
||||
end:
|
||||
/* cleanup */
|
||||
lib->credmgr->remove_set(lib->credmgr, &creds->set);
|
||||
creds->destroy(creds);
|
||||
free(scep_response.ptr);
|
||||
if (pkcs7)
|
||||
{
|
||||
container_t *container = &pkcs7->container;
|
||||
|
||||
container->destroy(container);
|
||||
}
|
||||
|
||||
return status;
|
||||
}
|
||||
|
||||
/**
|
||||
* Register the command.
|
||||
*/
|
||||
static void __attribute__ ((constructor))reg()
|
||||
{
|
||||
command_register((command_t) {
|
||||
scepca, 'C', "scepca",
|
||||
"get CA [and RA] certificate[s] from a SCEP server",
|
||||
{"--url url [--caout file] [--raout file] [--outform der|pem] [--force]"},
|
||||
{
|
||||
{"help", 'h', 0, "show usage information"},
|
||||
{"url", 'u', 1, "URL of the SCEP server"},
|
||||
{"caout", 'c', 1, "CA certificate [template]"},
|
||||
{"raout", 'r', 1, "RA certificate [template]"},
|
||||
{"outform", 'f', 1, "encoding of stored certificates, default: der"},
|
||||
{"force", 'F', 0, "force overwrite of existing files"},
|
||||
}
|
||||
});
|
||||
}
|
461
src/pki/scep/scep.c
Normal file
461
src/pki/scep/scep.c
Normal file
@ -0,0 +1,461 @@
|
||||
/*
|
||||
* Copyright (C) 2012 Tobias Brunner
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Copyright (C) 2022 Andreas Steffen, strongSec GmbH
|
||||
*
|
||||
* Copyright (C) secunet Security Networks AG
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
|
||||
#include <library.h>
|
||||
#include <utils/debug.h>
|
||||
#include <asn1/asn1.h>
|
||||
#include <asn1/asn1_parser.h>
|
||||
#include <asn1/oid.h>
|
||||
#include <crypto/rngs/rng.h>
|
||||
#include <crypto/hashers/hasher.h>
|
||||
|
||||
#include "scep.h"
|
||||
|
||||
static const char *pkiStatus_values[] = { "0", "2", "3" };
|
||||
|
||||
static const char *pkiStatus_names[] = {
|
||||
"SUCCESS",
|
||||
"FAILURE",
|
||||
"PENDING",
|
||||
"UNKNOWN"
|
||||
};
|
||||
|
||||
static const char *msgType_values[] = { "3", "17", "19", "20", "21", "22" };
|
||||
|
||||
static const char *msgType_names[] = {
|
||||
"CertRep",
|
||||
"RenewalReq",
|
||||
"PKCSReq",
|
||||
"CertPoll",
|
||||
"GetCert",
|
||||
"GetCRL",
|
||||
"Unknown"
|
||||
};
|
||||
|
||||
static const char *failInfo_reasons[] = {
|
||||
"badAlg - unrecognized or unsupported algorithm identifier",
|
||||
"badMessageCheck - integrity check failed",
|
||||
"badRequest - transaction not permitted or supported",
|
||||
"badTime - Message time field was not sufficiently close to the system time",
|
||||
"badCertId - No certificate could be identified matching the provided criteria"
|
||||
};
|
||||
|
||||
const scep_attributes_t empty_scep_attributes = {
|
||||
SCEP_Unknown_MSG , /* msgType */
|
||||
SCEP_UNKNOWN , /* pkiStatus */
|
||||
SCEP_unknown_REASON, /* failInfo */
|
||||
{ NULL, 0 } , /* transID */
|
||||
{ NULL, 0 } , /* senderNonce */
|
||||
{ NULL, 0 } , /* recipientNonce */
|
||||
};
|
||||
|
||||
/**
|
||||
* Extract X.501 attributes
|
||||
*/
|
||||
void extract_attributes(pkcs7_t *pkcs7, enumerator_t *enumerator,
|
||||
scep_attributes_t *attrs)
|
||||
{
|
||||
chunk_t attr;
|
||||
|
||||
if (pkcs7->get_attribute(pkcs7, OID_PKI_MESSAGE_TYPE, enumerator, &attr))
|
||||
{
|
||||
scep_msg_t m;
|
||||
|
||||
for (m = SCEP_CertRep_MSG; m < SCEP_Unknown_MSG; m++)
|
||||
{
|
||||
if (strncmp(msgType_values[m], attr.ptr, attr.len) == 0)
|
||||
{
|
||||
attrs->msgType = m;
|
||||
}
|
||||
}
|
||||
DBG2(DBG_APP, "messageType: %s", msgType_names[attrs->msgType]);
|
||||
free(attr.ptr);
|
||||
}
|
||||
if (pkcs7->get_attribute(pkcs7, OID_PKI_STATUS, enumerator, &attr))
|
||||
{
|
||||
pkiStatus_t s;
|
||||
|
||||
for (s = SCEP_SUCCESS; s < SCEP_UNKNOWN; s++)
|
||||
{
|
||||
if (strncmp(pkiStatus_values[s], attr.ptr, attr.len) == 0)
|
||||
{
|
||||
attrs->pkiStatus = s;
|
||||
}
|
||||
}
|
||||
DBG2(DBG_APP, "pkiStatus: %s", pkiStatus_names[attrs->pkiStatus]);
|
||||
free(attr.ptr);
|
||||
}
|
||||
if (pkcs7->get_attribute(pkcs7, OID_PKI_FAIL_INFO, enumerator, &attr))
|
||||
{
|
||||
if (attr.len == 1 && *attr.ptr >= '0' && *attr.ptr <= '4')
|
||||
{
|
||||
attrs->failInfo = (failInfo_t)(*attr.ptr - '0');
|
||||
}
|
||||
if (attrs->failInfo != SCEP_unknown_REASON)
|
||||
{
|
||||
DBG1(DBG_APP, "failInfo: %s", failInfo_reasons[attrs->failInfo]);
|
||||
}
|
||||
free(attr.ptr);
|
||||
}
|
||||
|
||||
pkcs7->get_attribute(pkcs7, OID_PKI_SENDER_NONCE, enumerator,
|
||||
&attrs->senderNonce);
|
||||
pkcs7->get_attribute(pkcs7, OID_PKI_RECIPIENT_NONCE, enumerator,
|
||||
&attrs->recipientNonce);
|
||||
pkcs7->get_attribute(pkcs7, OID_PKI_TRANS_ID, enumerator,
|
||||
&attrs->transID);
|
||||
}
|
||||
|
||||
/**
|
||||
* Generates a unique fingerprint of the pkcs10 request
|
||||
* by computing an MD5 hash over it
|
||||
*/
|
||||
chunk_t scep_generate_pkcs10_fingerprint(chunk_t pkcs10)
|
||||
{
|
||||
chunk_t digest = chunk_alloca(HASH_SIZE_MD5);
|
||||
hasher_t *hasher;
|
||||
|
||||
hasher = lib->crypto->create_hasher(lib->crypto, HASH_MD5);
|
||||
if (!hasher || !hasher->get_hash(hasher, pkcs10, digest.ptr))
|
||||
{
|
||||
DESTROY_IF(hasher);
|
||||
return chunk_empty;
|
||||
}
|
||||
hasher->destroy(hasher);
|
||||
|
||||
return chunk_to_hex(digest, NULL, FALSE);
|
||||
}
|
||||
|
||||
/**
|
||||
* Generate a transaction id as the MD5 hash of an public key
|
||||
* the transaction id is also used as a unique serial number
|
||||
*/
|
||||
void scep_generate_transaction_id(public_key_t *key, chunk_t *transID,
|
||||
chunk_t *serialNumber)
|
||||
{
|
||||
chunk_t digest = chunk_alloca(HASH_SIZE_MD5);
|
||||
chunk_t keyEncoding = chunk_empty, keyInfo;
|
||||
hasher_t *hasher;
|
||||
int zeros = 0, msb_set = 0;
|
||||
|
||||
key->get_encoding(key, PUBKEY_ASN1_DER, &keyEncoding);
|
||||
|
||||
keyInfo = asn1_wrap(ASN1_SEQUENCE, "mm",
|
||||
asn1_algorithmIdentifier(OID_RSA_ENCRYPTION),
|
||||
asn1_bitstring("m", keyEncoding));
|
||||
|
||||
hasher = lib->crypto->create_hasher(lib->crypto, HASH_MD5);
|
||||
if (!hasher || !hasher->get_hash(hasher, keyInfo, digest.ptr))
|
||||
{
|
||||
memset(digest.ptr, 0, digest.len);
|
||||
}
|
||||
DESTROY_IF(hasher);
|
||||
free(keyInfo.ptr);
|
||||
|
||||
/* the serialNumber should be valid ASN1 integer content:
|
||||
* remove leading zeros, add one if MSB is set (two's complement) */
|
||||
while (zeros < digest.len)
|
||||
{
|
||||
if (digest.ptr[zeros])
|
||||
{
|
||||
if (digest.ptr[zeros] & 0x80)
|
||||
{
|
||||
msb_set = 1;
|
||||
}
|
||||
break;
|
||||
}
|
||||
zeros++;
|
||||
}
|
||||
*serialNumber = chunk_alloc(digest.len - zeros + msb_set);
|
||||
if (msb_set)
|
||||
{
|
||||
serialNumber->ptr[0] = 0x00;
|
||||
}
|
||||
memcpy(serialNumber->ptr + msb_set, digest.ptr + zeros,
|
||||
digest.len - zeros);
|
||||
|
||||
/* the transaction id is the serial number in hex format */
|
||||
*transID = chunk_to_hex(digest, NULL, TRUE);
|
||||
}
|
||||
|
||||
/**
|
||||
* Builds a pkcs7 enveloped and signed scep request
|
||||
*/
|
||||
chunk_t scep_build_request(chunk_t data, chunk_t transID, scep_msg_t msg,
|
||||
certificate_t *enc_cert, encryption_algorithm_t enc_alg,
|
||||
size_t key_size, certificate_t *signer_cert,
|
||||
hash_algorithm_t digest_alg, private_key_t *private_key)
|
||||
{
|
||||
chunk_t request;
|
||||
container_t *container;
|
||||
char nonce[16];
|
||||
rng_t *rng;
|
||||
chunk_t senderNonce, msgType;
|
||||
|
||||
/* generate senderNonce */
|
||||
rng = lib->crypto->create_rng(lib->crypto, RNG_WEAK);
|
||||
if (!rng || !rng->get_bytes(rng, sizeof(nonce), nonce))
|
||||
{
|
||||
DESTROY_IF(rng);
|
||||
return chunk_empty;
|
||||
}
|
||||
rng->destroy(rng);
|
||||
|
||||
/* encrypt data in enveloped-data PKCS#7 */
|
||||
container = lib->creds->create(lib->creds,
|
||||
CRED_CONTAINER, CONTAINER_PKCS7_ENVELOPED_DATA,
|
||||
BUILD_BLOB, data,
|
||||
BUILD_CERT, enc_cert,
|
||||
BUILD_ENCRYPTION_ALG, enc_alg,
|
||||
BUILD_KEY_SIZE, (int)key_size,
|
||||
BUILD_END);
|
||||
if (!container)
|
||||
{
|
||||
return chunk_empty;
|
||||
}
|
||||
if (!container->get_encoding(container, &request))
|
||||
{
|
||||
container->destroy(container);
|
||||
return chunk_empty;
|
||||
}
|
||||
container->destroy(container);
|
||||
|
||||
/* sign enveloped-data in a signed-data PKCS#7 */
|
||||
senderNonce = asn1_wrap(ASN1_OCTET_STRING, "c", chunk_from_thing(nonce));
|
||||
transID = asn1_wrap(ASN1_PRINTABLESTRING, "c", transID);
|
||||
msgType = asn1_wrap(ASN1_PRINTABLESTRING, "c",
|
||||
chunk_create((char*)msgType_values[msg],
|
||||
strlen(msgType_values[msg])));
|
||||
|
||||
container = lib->creds->create(lib->creds,
|
||||
CRED_CONTAINER, CONTAINER_PKCS7_SIGNED_DATA,
|
||||
BUILD_BLOB, request,
|
||||
BUILD_SIGNING_CERT, signer_cert,
|
||||
BUILD_SIGNING_KEY, private_key,
|
||||
BUILD_DIGEST_ALG, digest_alg,
|
||||
BUILD_PKCS7_ATTRIBUTE, OID_PKI_SENDER_NONCE, senderNonce,
|
||||
BUILD_PKCS7_ATTRIBUTE, OID_PKI_TRANS_ID, transID,
|
||||
BUILD_PKCS7_ATTRIBUTE, OID_PKI_MESSAGE_TYPE, msgType,
|
||||
BUILD_END);
|
||||
|
||||
free(request.ptr);
|
||||
free(senderNonce.ptr);
|
||||
free(transID.ptr);
|
||||
free(msgType.ptr);
|
||||
|
||||
if (!container)
|
||||
{
|
||||
return chunk_empty;
|
||||
}
|
||||
if (!container->get_encoding(container, &request))
|
||||
{
|
||||
container->destroy(container);
|
||||
return chunk_empty;
|
||||
}
|
||||
container->destroy(container);
|
||||
|
||||
return request;
|
||||
}
|
||||
|
||||
/**
|
||||
* Converts a binary request to base64 with 64 characters per line
|
||||
* newline and '+' characters are escaped by %0A and %2B, respectively
|
||||
*/
|
||||
static char* escape_http_request(chunk_t req)
|
||||
{
|
||||
char *escaped_req = NULL;
|
||||
char *p1, *p2;
|
||||
int lines = 0;
|
||||
int plus = 0;
|
||||
int n = 0;
|
||||
|
||||
/* compute and allocate the size of the base64-encoded request */
|
||||
int len = 1 + 4 * ((req.len + 2) / 3);
|
||||
char *encoded_req = malloc(len);
|
||||
|
||||
/* do the base64 conversion */
|
||||
chunk_t base64 = chunk_to_base64(req, encoded_req);
|
||||
len = base64.len + 1;
|
||||
|
||||
/* compute newline characters to be inserted every 64 characters */
|
||||
lines = (len - 2) / 64;
|
||||
|
||||
/* count number of + characters to be escaped */
|
||||
p1 = encoded_req;
|
||||
while (*p1 != '\0')
|
||||
{
|
||||
if (*p1++ == '+')
|
||||
{
|
||||
plus++;
|
||||
}
|
||||
}
|
||||
|
||||
escaped_req = malloc(len + 3 * (lines + plus));
|
||||
|
||||
/* escape special characters in the request */
|
||||
p1 = encoded_req;
|
||||
p2 = escaped_req;
|
||||
while (*p1 != '\0')
|
||||
{
|
||||
if (n == 64)
|
||||
{
|
||||
memcpy(p2, "%0A", 3);
|
||||
p2 += 3;
|
||||
n = 0;
|
||||
}
|
||||
if (*p1 == '+')
|
||||
{
|
||||
memcpy(p2, "%2B", 3);
|
||||
p2 += 3;
|
||||
}
|
||||
else
|
||||
{
|
||||
*p2++ = *p1;
|
||||
}
|
||||
p1++;
|
||||
n++;
|
||||
}
|
||||
*p2 = '\0';
|
||||
free(encoded_req);
|
||||
return escaped_req;
|
||||
}
|
||||
|
||||
/**
|
||||
* Send a SCEP request via HTTP and wait for a response
|
||||
*/
|
||||
bool scep_http_request(const char *url, chunk_t msg, scep_op_t op,
|
||||
scep_http_params_t *http_params, chunk_t *response)
|
||||
{
|
||||
int len;
|
||||
status_t status;
|
||||
char *complete_url = NULL;
|
||||
host_t *srcip = NULL;
|
||||
|
||||
/* initialize response */
|
||||
*response = chunk_empty;
|
||||
|
||||
if (http_params->bind)
|
||||
{
|
||||
srcip = host_create_from_string(http_params->bind, 0);
|
||||
}
|
||||
|
||||
DBG2(DBG_APP, "sending scep request to '%s'", url);
|
||||
|
||||
if (op == SCEP_PKI_OPERATION)
|
||||
{
|
||||
const char operation[] = "PKIOperation";
|
||||
|
||||
if (http_params->get_request)
|
||||
{
|
||||
char *escaped_req = escape_http_request(msg);
|
||||
|
||||
/* form complete url */
|
||||
len = strlen(url) + 20 + strlen(operation) + strlen(escaped_req) + 1;
|
||||
complete_url = malloc(len);
|
||||
snprintf(complete_url, len, "%s?operation=%s&message=%s"
|
||||
, url, operation, escaped_req);
|
||||
free(escaped_req);
|
||||
|
||||
status = lib->fetcher->fetch(lib->fetcher, complete_url, response,
|
||||
FETCH_TIMEOUT, http_params->timeout,
|
||||
FETCH_REQUEST_HEADER, "Pragma:",
|
||||
FETCH_REQUEST_HEADER, "Host:",
|
||||
FETCH_REQUEST_HEADER, "Accept:",
|
||||
FETCH_SOURCEIP, srcip,
|
||||
FETCH_END);
|
||||
}
|
||||
else /* HTTP_POST */
|
||||
{
|
||||
/* form complete url */
|
||||
len = strlen(url) + 11 + strlen(operation) + 1;
|
||||
complete_url = malloc(len);
|
||||
snprintf(complete_url, len, "%s?operation=%s", url, operation);
|
||||
|
||||
status = lib->fetcher->fetch(lib->fetcher, complete_url, response,
|
||||
FETCH_TIMEOUT, http_params->timeout,
|
||||
FETCH_REQUEST_DATA, msg,
|
||||
FETCH_REQUEST_TYPE, "",
|
||||
FETCH_REQUEST_HEADER, "Expect:",
|
||||
FETCH_SOURCEIP, srcip,
|
||||
FETCH_END);
|
||||
}
|
||||
}
|
||||
else /* SCEP_GET_CA_CERT */
|
||||
{
|
||||
const char operation[] = "GetCACert";
|
||||
|
||||
/* form complete url */
|
||||
len = strlen(url) + 11 + strlen(operation) + 1;
|
||||
complete_url = malloc(len);
|
||||
snprintf(complete_url, len, "%s?operation=%s", url, operation);
|
||||
|
||||
status = lib->fetcher->fetch(lib->fetcher, complete_url, response,
|
||||
FETCH_TIMEOUT, http_params->timeout,
|
||||
FETCH_SOURCEIP, srcip,
|
||||
FETCH_END);
|
||||
}
|
||||
|
||||
DESTROY_IF(srcip);
|
||||
free(complete_url);
|
||||
return (status == SUCCESS);
|
||||
}
|
||||
|
||||
err_t scep_parse_response(chunk_t response, chunk_t transID,
|
||||
container_t **out, scep_attributes_t *attrs)
|
||||
{
|
||||
enumerator_t *enumerator;
|
||||
bool verified = FALSE;
|
||||
container_t *container;
|
||||
auth_cfg_t *auth;
|
||||
|
||||
container = lib->creds->create(lib->creds, CRED_CONTAINER, CONTAINER_PKCS7,
|
||||
BUILD_BLOB_ASN1_DER, response, BUILD_END);
|
||||
if (!container)
|
||||
{
|
||||
return "error parsing the scep response";
|
||||
}
|
||||
if (container->get_type(container) != CONTAINER_PKCS7_SIGNED_DATA)
|
||||
{
|
||||
container->destroy(container);
|
||||
return "scep response is not PKCS#7 signed-data";
|
||||
}
|
||||
|
||||
enumerator = container->create_signature_enumerator(container);
|
||||
while (enumerator->enumerate(enumerator, &auth))
|
||||
{
|
||||
verified = TRUE;
|
||||
extract_attributes((pkcs7_t*)container, enumerator, attrs);
|
||||
if (!chunk_equals(transID, attrs->transID))
|
||||
{
|
||||
enumerator->destroy(enumerator);
|
||||
container->destroy(container);
|
||||
return "transaction ID of scep response does not match";
|
||||
}
|
||||
}
|
||||
enumerator->destroy(enumerator);
|
||||
if (!verified)
|
||||
{
|
||||
container->destroy(container);
|
||||
return "unable to verify PKCS#7 container";
|
||||
}
|
||||
*out = container;
|
||||
return NULL;
|
||||
}
|
104
src/pki/scep/scep.h
Normal file
104
src/pki/scep/scep.h
Normal file
@ -0,0 +1,104 @@
|
||||
/*
|
||||
* Copyright (C) 2012 Tobias Brunner
|
||||
* Copyright (C) 2005 Jan Hutter, Martin Willi
|
||||
* Copyright (C) 2022 Andreas Steffen, strongSec GmbH
|
||||
*
|
||||
* Copyright (C) secunet Security Networks AG
|
||||
*
|
||||
* This program is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License as published by the
|
||||
* Free Software Foundation; either version 2 of the License, or (at your
|
||||
* option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
|
||||
*
|
||||
* This program is distributed in the hope that it will be useful, but
|
||||
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
|
||||
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* for more details.
|
||||
*/
|
||||
|
||||
#ifndef _SCEP_H
|
||||
#define _SCEP_H
|
||||
|
||||
#include <credentials/containers/pkcs7.h>
|
||||
#include <credentials/certificates/certificate.h>
|
||||
|
||||
/* supported SCEP operation types */
|
||||
typedef enum {
|
||||
SCEP_PKI_OPERATION,
|
||||
SCEP_GET_CA_CERT
|
||||
} scep_op_t;
|
||||
|
||||
/* SCEP pkiStatus values */
|
||||
typedef enum {
|
||||
SCEP_SUCCESS,
|
||||
SCEP_FAILURE,
|
||||
SCEP_PENDING,
|
||||
SCEP_UNKNOWN
|
||||
} pkiStatus_t;
|
||||
|
||||
/* SCEP messageType values */
|
||||
typedef enum {
|
||||
SCEP_CertRep_MSG,
|
||||
SCEP_RenewalReq_MSG,
|
||||
SCEP_PKCSReq_MSG,
|
||||
SCEP_CertPoll_MSG,
|
||||
SCEP_GetCert_MSG,
|
||||
SCEP_GetCRL_MSG,
|
||||
SCEP_Unknown_MSG
|
||||
} scep_msg_t;
|
||||
|
||||
/* SCEP failure reasons */
|
||||
typedef enum {
|
||||
SCEP_badAlg_REASON = 0,
|
||||
SCEP_badMessageCheck_REASON = 1,
|
||||
SCEP_badRequest_REASON = 2,
|
||||
SCEP_badTime_REASON = 3,
|
||||
SCEP_badCertId_REASON = 4,
|
||||
SCEP_unknown_REASON = 5
|
||||
} failInfo_t;
|
||||
|
||||
/* SCEP attributes */
|
||||
typedef struct {
|
||||
scep_msg_t msgType;
|
||||
pkiStatus_t pkiStatus;
|
||||
failInfo_t failInfo;
|
||||
chunk_t transID;
|
||||
chunk_t senderNonce;
|
||||
chunk_t recipientNonce;
|
||||
} scep_attributes_t;
|
||||
|
||||
/* SCEP http parameters */
|
||||
typedef struct {
|
||||
bool get_request;
|
||||
u_int timeout;
|
||||
char *bind;
|
||||
} scep_http_params_t;
|
||||
|
||||
extern const scep_attributes_t empty_scep_attributes;
|
||||
|
||||
bool parse_attributes(chunk_t blob, scep_attributes_t *attrs);
|
||||
|
||||
void scep_generate_transaction_id(public_key_t *key,
|
||||
chunk_t *transID,
|
||||
chunk_t *serialNumber);
|
||||
|
||||
chunk_t scep_generate_pkcs10_fingerprint(chunk_t pkcs10);
|
||||
|
||||
chunk_t scep_transId_attribute(chunk_t transaction_id);
|
||||
|
||||
chunk_t scep_messageType_attribute(scep_msg_t m);
|
||||
|
||||
chunk_t scep_senderNonce_attribute(void);
|
||||
|
||||
chunk_t scep_build_request(chunk_t data, chunk_t transID, scep_msg_t msg,
|
||||
certificate_t *enc_cert, encryption_algorithm_t enc_alg,
|
||||
size_t key_size, certificate_t *signer_cert,
|
||||
hash_algorithm_t digest_alg, private_key_t *private_key);
|
||||
|
||||
bool scep_http_request(const char *url, chunk_t msg, scep_op_t op,
|
||||
scep_http_params_t *http_params, chunk_t *response);
|
||||
|
||||
err_t scep_parse_response(chunk_t response, chunk_t transID,
|
||||
container_t **out, scep_attributes_t *attrs);
|
||||
|
||||
#endif /* _SCEP_H */
|
Loading…
x
Reference in New Issue
Block a user