Annotation of embedaddon/axTLS/ssl/loader.c, revision 1.1
1.1 ! misho 1: /*
! 2: * Copyright (c) 2007, Cameron Rich
! 3: *
! 4: * All rights reserved.
! 5: *
! 6: * Redistribution and use in source and binary forms, with or without
! 7: * modification, are permitted provided that the following conditions are met:
! 8: *
! 9: * * Redistributions of source code must retain the above copyright notice,
! 10: * this list of conditions and the following disclaimer.
! 11: * * Redistributions in binary form must reproduce the above copyright notice,
! 12: * this list of conditions and the following disclaimer in the documentation
! 13: * and/or other materials provided with the distribution.
! 14: * * Neither the name of the axTLS project nor the names of its contributors
! 15: * may be used to endorse or promote products derived from this software
! 16: * without specific prior written permission.
! 17: *
! 18: * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
! 19: * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
! 20: * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
! 21: * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
! 22: * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
! 23: * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
! 24: * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
! 25: * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
! 26: * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
! 27: * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
! 28: * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
! 29: */
! 30:
! 31: /**
! 32: * Load certificates/keys into memory. These can be in many different formats.
! 33: * PEM support and other formats can be processed here.
! 34: *
! 35: * The PEM private keys may be optionally encrypted with AES128 or AES256.
! 36: * The encrypted PEM keys were generated with something like:
! 37: *
! 38: * openssl genrsa -aes128 -passout pass:abcd -out axTLS.key_aes128.pem 512
! 39: */
! 40:
! 41: #include <stdlib.h>
! 42: #include <string.h>
! 43: #include <stdio.h>
! 44: #include "os_port.h"
! 45: #include "ssl.h"
! 46:
! 47: static int do_obj(SSL_CTX *ssl_ctx, int obj_type,
! 48: SSLObjLoader *ssl_obj, const char *password);
! 49: #ifdef CONFIG_SSL_HAS_PEM
! 50: static int ssl_obj_PEM_load(SSL_CTX *ssl_ctx, int obj_type,
! 51: SSLObjLoader *ssl_obj, const char *password);
! 52: #endif
! 53:
! 54: /*
! 55: * Load a file into memory that is in binary DER (or ascii PEM) format.
! 56: */
! 57: EXP_FUNC int STDCALL ssl_obj_load(SSL_CTX *ssl_ctx, int obj_type,
! 58: const char *filename, const char *password)
! 59: {
! 60: #ifndef CONFIG_SSL_SKELETON_MODE
! 61: static const char * const begin = "-----BEGIN";
! 62: int ret = SSL_OK;
! 63: SSLObjLoader *ssl_obj = NULL;
! 64:
! 65: if (filename == NULL)
! 66: {
! 67: ret = SSL_ERROR_INVALID_KEY;
! 68: goto error;
! 69: }
! 70:
! 71: ssl_obj = (SSLObjLoader *)calloc(1, sizeof(SSLObjLoader));
! 72: ssl_obj->len = get_file(filename, &ssl_obj->buf);
! 73: if (ssl_obj->len <= 0)
! 74: {
! 75: ret = SSL_ERROR_INVALID_KEY;
! 76: goto error;
! 77: }
! 78:
! 79: /* is the file a PEM file? */
! 80: if (strstr((char *)ssl_obj->buf, begin) != NULL)
! 81: {
! 82: #ifdef CONFIG_SSL_HAS_PEM
! 83: ret = ssl_obj_PEM_load(ssl_ctx, obj_type, ssl_obj, password);
! 84: #else
! 85: printf(unsupported_str);
! 86: ret = SSL_ERROR_NOT_SUPPORTED;
! 87: #endif
! 88: }
! 89: else
! 90: ret = do_obj(ssl_ctx, obj_type, ssl_obj, password);
! 91:
! 92: error:
! 93: ssl_obj_free(ssl_obj);
! 94: return ret;
! 95: #else
! 96: printf(unsupported_str);
! 97: return SSL_ERROR_NOT_SUPPORTED;
! 98: #endif /* CONFIG_SSL_SKELETON_MODE */
! 99: }
! 100:
! 101: /*
! 102: * Transfer binary data into the object loader.
! 103: */
! 104: EXP_FUNC int STDCALL ssl_obj_memory_load(SSL_CTX *ssl_ctx, int mem_type,
! 105: const uint8_t *data, int len, const char *password)
! 106: {
! 107: int ret;
! 108: SSLObjLoader *ssl_obj;
! 109:
! 110: ssl_obj = (SSLObjLoader *)calloc(1, sizeof(SSLObjLoader));
! 111: ssl_obj->buf = (uint8_t *)malloc(len);
! 112: memcpy(ssl_obj->buf, data, len);
! 113: ssl_obj->len = len;
! 114: ret = do_obj(ssl_ctx, mem_type, ssl_obj, password);
! 115: ssl_obj_free(ssl_obj);
! 116: return ret;
! 117: }
! 118:
! 119: /*
! 120: * Actually work out what we are doing
! 121: */
! 122: static int do_obj(SSL_CTX *ssl_ctx, int obj_type,
! 123: SSLObjLoader *ssl_obj, const char *password)
! 124: {
! 125: int ret = SSL_OK;
! 126:
! 127: switch (obj_type)
! 128: {
! 129: case SSL_OBJ_RSA_KEY:
! 130: ret = add_private_key(ssl_ctx, ssl_obj);
! 131: break;
! 132:
! 133: case SSL_OBJ_X509_CERT:
! 134: ret = add_cert(ssl_ctx, ssl_obj->buf, ssl_obj->len);
! 135: break;
! 136:
! 137: #ifdef CONFIG_SSL_CERT_VERIFICATION
! 138: case SSL_OBJ_X509_CACERT:
! 139: add_cert_auth(ssl_ctx, ssl_obj->buf, ssl_obj->len);
! 140: break;
! 141: #endif
! 142:
! 143: #ifdef CONFIG_SSL_USE_PKCS12
! 144: case SSL_OBJ_PKCS8:
! 145: ret = pkcs8_decode(ssl_ctx, ssl_obj, password);
! 146: break;
! 147:
! 148: case SSL_OBJ_PKCS12:
! 149: ret = pkcs12_decode(ssl_ctx, ssl_obj, password);
! 150: break;
! 151: #endif
! 152: default:
! 153: printf(unsupported_str);
! 154: ret = SSL_ERROR_NOT_SUPPORTED;
! 155: break;
! 156: }
! 157:
! 158: return ret;
! 159: }
! 160:
! 161: /*
! 162: * Clean up our mess.
! 163: */
! 164: void ssl_obj_free(SSLObjLoader *ssl_obj)
! 165: {
! 166: if (ssl_obj)
! 167: {
! 168: free(ssl_obj->buf);
! 169: free(ssl_obj);
! 170: }
! 171: }
! 172:
! 173: /*
! 174: * Support for PEM encoded keys/certificates.
! 175: */
! 176: #ifdef CONFIG_SSL_HAS_PEM
! 177:
! 178: #define NUM_PEM_TYPES 4
! 179: #define IV_SIZE 16
! 180: #define IS_RSA_PRIVATE_KEY 0
! 181: #define IS_ENCRYPTED_PRIVATE_KEY 1
! 182: #define IS_PRIVATE_KEY 2
! 183: #define IS_CERTIFICATE 3
! 184:
! 185: static const char * const begins[NUM_PEM_TYPES] =
! 186: {
! 187: "-----BEGIN RSA PRIVATE KEY-----",
! 188: "-----BEGIN ENCRYPTED PRIVATE KEY-----",
! 189: "-----BEGIN PRIVATE KEY-----",
! 190: "-----BEGIN CERTIFICATE-----",
! 191: };
! 192:
! 193: static const char * const ends[NUM_PEM_TYPES] =
! 194: {
! 195: "-----END RSA PRIVATE KEY-----",
! 196: "-----END ENCRYPTED PRIVATE KEY-----",
! 197: "-----END PRIVATE KEY-----",
! 198: "-----END CERTIFICATE-----",
! 199: };
! 200:
! 201: static const char * const aes_str[2] =
! 202: {
! 203: "DEK-Info: AES-128-CBC,",
! 204: "DEK-Info: AES-256-CBC,"
! 205: };
! 206:
! 207: /**
! 208: * Take a base64 blob of data and decrypt it (using AES) into its
! 209: * proper ASN.1 form.
! 210: */
! 211: static int pem_decrypt(const char *where, const char *end,
! 212: const char *password, SSLObjLoader *ssl_obj)
! 213: {
! 214: int ret = -1;
! 215: int is_aes_256 = 0;
! 216: char *start = NULL;
! 217: uint8_t iv[IV_SIZE];
! 218: int i, pem_size;
! 219: MD5_CTX md5_ctx;
! 220: AES_CTX aes_ctx;
! 221: uint8_t key[32]; /* AES256 size */
! 222:
! 223: if (password == NULL || strlen(password) == 0)
! 224: {
! 225: #ifdef CONFIG_SSL_FULL_MODE
! 226: printf("Error: Need a password for this PEM file\n"); TTY_FLUSH();
! 227: #endif
! 228: goto error;
! 229: }
! 230:
! 231: if ((start = strstr((const char *)where, aes_str[0]))) /* AES128? */
! 232: {
! 233: start += strlen(aes_str[0]);
! 234: }
! 235: else if ((start = strstr((const char *)where, aes_str[1]))) /* AES256? */
! 236: {
! 237: is_aes_256 = 1;
! 238: start += strlen(aes_str[1]);
! 239: }
! 240: else
! 241: {
! 242: #ifdef CONFIG_SSL_FULL_MODE
! 243: printf("Error: Unsupported password cipher\n"); TTY_FLUSH();
! 244: #endif
! 245: goto error;
! 246: }
! 247:
! 248: /* convert from hex to binary - assumes uppercase hex */
! 249: for (i = 0; i < IV_SIZE; i++)
! 250: {
! 251: char c = *start++ - '0';
! 252: iv[i] = (c > 9 ? c + '0' - 'A' + 10 : c) << 4;
! 253: c = *start++ - '0';
! 254: iv[i] += (c > 9 ? c + '0' - 'A' + 10 : c);
! 255: }
! 256:
! 257: while (*start == '\r' || *start == '\n')
! 258: start++;
! 259:
! 260: /* turn base64 into binary */
! 261: pem_size = (int)(end-start);
! 262: if (base64_decode(start, pem_size, ssl_obj->buf, &ssl_obj->len) != 0)
! 263: goto error;
! 264:
! 265: /* work out the key */
! 266: MD5_Init(&md5_ctx);
! 267: MD5_Update(&md5_ctx, (const uint8_t *)password, strlen(password));
! 268: MD5_Update(&md5_ctx, iv, SALT_SIZE);
! 269: MD5_Final(key, &md5_ctx);
! 270:
! 271: if (is_aes_256)
! 272: {
! 273: MD5_Init(&md5_ctx);
! 274: MD5_Update(&md5_ctx, key, MD5_SIZE);
! 275: MD5_Update(&md5_ctx, (const uint8_t *)password, strlen(password));
! 276: MD5_Update(&md5_ctx, iv, SALT_SIZE);
! 277: MD5_Final(&key[MD5_SIZE], &md5_ctx);
! 278: }
! 279:
! 280: /* decrypt using the key/iv */
! 281: AES_set_key(&aes_ctx, key, iv, is_aes_256 ? AES_MODE_256 : AES_MODE_128);
! 282: AES_convert_key(&aes_ctx);
! 283: AES_cbc_decrypt(&aes_ctx, ssl_obj->buf, ssl_obj->buf, ssl_obj->len);
! 284: ret = 0;
! 285:
! 286: error:
! 287: return ret;
! 288: }
! 289:
! 290: /**
! 291: * Take a base64 blob of data and turn it into its proper ASN.1 form.
! 292: */
! 293: static int new_pem_obj(SSL_CTX *ssl_ctx, int is_cacert, char *where,
! 294: int remain, const char *password)
! 295: {
! 296: int ret = SSL_ERROR_BAD_CERTIFICATE;
! 297: SSLObjLoader *ssl_obj = NULL;
! 298:
! 299: while (remain > 0)
! 300: {
! 301: int i, pem_size, obj_type;
! 302: char *start = NULL, *end = NULL;
! 303:
! 304: for (i = 0; i < NUM_PEM_TYPES; i++)
! 305: {
! 306: if ((start = strstr(where, begins[i])) &&
! 307: (end = strstr(where, ends[i])))
! 308: {
! 309: remain -= (int)(end-where);
! 310: start += strlen(begins[i]);
! 311: pem_size = (int)(end-start);
! 312:
! 313: ssl_obj = (SSLObjLoader *)calloc(1, sizeof(SSLObjLoader));
! 314:
! 315: /* 4/3 bigger than what we need but so what */
! 316: ssl_obj->buf = (uint8_t *)calloc(1, pem_size);
! 317: ssl_obj->len = pem_size;
! 318:
! 319: if (i == IS_RSA_PRIVATE_KEY &&
! 320: strstr(start, "Proc-Type:") &&
! 321: strstr(start, "4,ENCRYPTED"))
! 322: {
! 323: /* check for encrypted PEM file */
! 324: if (pem_decrypt(start, end, password, ssl_obj) < 0)
! 325: {
! 326: ret = SSL_ERROR_BAD_CERTIFICATE;
! 327: goto error;
! 328: }
! 329: }
! 330: else
! 331: {
! 332: ssl_obj->len = pem_size;
! 333: if (base64_decode(start, pem_size,
! 334: ssl_obj->buf, &ssl_obj->len) != 0)
! 335: {
! 336: ret = SSL_ERROR_BAD_CERTIFICATE;
! 337: goto error;
! 338: }
! 339: }
! 340:
! 341: switch (i)
! 342: {
! 343: case IS_RSA_PRIVATE_KEY:
! 344: obj_type = SSL_OBJ_RSA_KEY;
! 345: break;
! 346:
! 347: case IS_ENCRYPTED_PRIVATE_KEY:
! 348: case IS_PRIVATE_KEY:
! 349: obj_type = SSL_OBJ_PKCS8;
! 350: break;
! 351:
! 352: case IS_CERTIFICATE:
! 353: obj_type = is_cacert ?
! 354: SSL_OBJ_X509_CACERT : SSL_OBJ_X509_CERT;
! 355: break;
! 356:
! 357: default:
! 358: ret = SSL_ERROR_BAD_CERTIFICATE;
! 359: goto error;
! 360: }
! 361:
! 362: /* In a format we can now understand - so process it */
! 363: if ((ret = do_obj(ssl_ctx, obj_type, ssl_obj, password)))
! 364: goto error;
! 365:
! 366: end += strlen(ends[i]);
! 367: remain -= strlen(ends[i]);
! 368: while (remain > 0 && (*end == '\r' || *end == '\n'))
! 369: {
! 370: end++;
! 371: remain--;
! 372: }
! 373:
! 374: where = end;
! 375: break;
! 376: }
! 377: }
! 378:
! 379: ssl_obj_free(ssl_obj);
! 380: ssl_obj = NULL;
! 381: if (start == NULL)
! 382: break;
! 383: }
! 384: error:
! 385: ssl_obj_free(ssl_obj);
! 386: return ret;
! 387: }
! 388:
! 389: /*
! 390: * Load a file into memory that is in ASCII PEM format.
! 391: */
! 392: static int ssl_obj_PEM_load(SSL_CTX *ssl_ctx, int obj_type,
! 393: SSLObjLoader *ssl_obj, const char *password)
! 394: {
! 395: char *start;
! 396:
! 397: /* add a null terminator */
! 398: ssl_obj->len++;
! 399: ssl_obj->buf = (uint8_t *)realloc(ssl_obj->buf, ssl_obj->len);
! 400: ssl_obj->buf[ssl_obj->len-1] = 0;
! 401: start = (char *)ssl_obj->buf;
! 402: return new_pem_obj(ssl_ctx, obj_type == SSL_OBJ_X509_CACERT,
! 403: start, ssl_obj->len, password);
! 404: }
! 405: #endif /* CONFIG_SSL_HAS_PEM */
! 406:
! 407: /**
! 408: * Load the key/certificates in memory depending on compile-time and user
! 409: * options.
! 410: */
! 411: int load_key_certs(SSL_CTX *ssl_ctx)
! 412: {
! 413: int ret = SSL_OK;
! 414: uint32_t options = ssl_ctx->options;
! 415: #ifdef CONFIG_SSL_GENERATE_X509_CERT
! 416: uint8_t *cert_data = NULL;
! 417: int cert_size;
! 418: static const char *dn[] =
! 419: {
! 420: CONFIG_SSL_X509_COMMON_NAME,
! 421: CONFIG_SSL_X509_ORGANIZATION_NAME,
! 422: CONFIG_SSL_X509_ORGANIZATION_UNIT_NAME
! 423: };
! 424: #endif
! 425:
! 426: /* do the private key first */
! 427: if (strlen(CONFIG_SSL_PRIVATE_KEY_LOCATION) > 0)
! 428: {
! 429: if ((ret = ssl_obj_load(ssl_ctx, SSL_OBJ_RSA_KEY,
! 430: CONFIG_SSL_PRIVATE_KEY_LOCATION,
! 431: CONFIG_SSL_PRIVATE_KEY_PASSWORD)) < 0)
! 432: goto error;
! 433: }
! 434: else if (!(options & SSL_NO_DEFAULT_KEY))
! 435: {
! 436: #if defined(CONFIG_SSL_USE_DEFAULT_KEY) || defined(CONFIG_SSL_SKELETON_MODE)
! 437: static const /* saves a few more bytes */
! 438: #include "private_key.h"
! 439:
! 440: ssl_obj_memory_load(ssl_ctx, SSL_OBJ_RSA_KEY, default_private_key,
! 441: default_private_key_len, NULL);
! 442: #endif
! 443: }
! 444:
! 445: /* now load the certificate */
! 446: #ifdef CONFIG_SSL_GENERATE_X509_CERT
! 447: if ((cert_size = ssl_x509_create(ssl_ctx, 0, dn, &cert_data)) < 0)
! 448: {
! 449: ret = cert_size;
! 450: goto error;
! 451: }
! 452:
! 453: ssl_obj_memory_load(ssl_ctx, SSL_OBJ_X509_CERT, cert_data, cert_size, NULL);
! 454: free(cert_data);
! 455: #else
! 456: if (strlen(CONFIG_SSL_X509_CERT_LOCATION))
! 457: {
! 458: if ((ret = ssl_obj_load(ssl_ctx, SSL_OBJ_X509_CERT,
! 459: CONFIG_SSL_X509_CERT_LOCATION, NULL)) < 0)
! 460: goto error;
! 461: }
! 462: else if (!(options & SSL_NO_DEFAULT_KEY))
! 463: {
! 464: #if defined(CONFIG_SSL_USE_DEFAULT_KEY) || defined(CONFIG_SSL_SKELETON_MODE)
! 465: static const /* saves a few bytes and RAM */
! 466: #include "cert.h"
! 467: ssl_obj_memory_load(ssl_ctx, SSL_OBJ_X509_CERT,
! 468: default_certificate, default_certificate_len, NULL);
! 469: #endif
! 470: }
! 471: #endif
! 472:
! 473: error:
! 474: #ifdef CONFIG_SSL_FULL_MODE
! 475: if (ret)
! 476: {
! 477: printf("Error: Certificate or key not loaded\n"); TTY_FLUSH();
! 478: }
! 479: #endif
! 480:
! 481: return ret;
! 482:
! 483: }
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>