123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948 |
-
-
- FILE_LICENCE ( GPL2_OR_LATER );
-
- #include <stdint.h>
- #include <stdlib.h>
- #include <stdio.h>
- #include <string.h>
- #include <errno.h>
- #include <ipxe/asn1.h>
- #include <ipxe/x509.h>
- #include <ipxe/sha1.h>
- #include <ipxe/base64.h>
- #include <ipxe/uri.h>
- #include <ipxe/ocsp.h>
-
-
-
-
- #define EACCES_CERT_STATUS \
- __einfo_error ( EINFO_EACCES_CERT_STATUS )
- #define EINFO_EACCES_CERT_STATUS \
- __einfo_uniqify ( EINFO_EACCES, 0x01, \
- "Certificate status not good" )
- #define EACCES_CERT_MISMATCH \
- __einfo_error ( EINFO_EACCES_CERT_MISMATCH )
- #define EINFO_EACCES_CERT_MISMATCH \
- __einfo_uniqify ( EINFO_EACCES, 0x02, \
- "Certificate ID mismatch" )
- #define EACCES_NON_OCSP_SIGNING \
- __einfo_error ( EINFO_EACCES_NON_OCSP_SIGNING )
- #define EINFO_EACCES_NON_OCSP_SIGNING \
- __einfo_uniqify ( EINFO_EACCES, 0x03, \
- "Not an OCSP signing certificate" )
- #define EACCES_STALE \
- __einfo_error ( EINFO_EACCES_STALE )
- #define EINFO_EACCES_STALE \
- __einfo_uniqify ( EINFO_EACCES, 0x04, \
- "Stale (or premature) OCSP repsonse" )
- #define EACCES_NO_RESPONDER \
- __einfo_error ( EINFO_EACCES_NO_RESPONDER )
- #define EINFO_EACCES_NO_RESPONDER \
- __einfo_uniqify ( EINFO_EACCES, 0x05, \
- "Missing OCSP responder certificate" )
- #define ENOTSUP_RESPONSE_TYPE \
- __einfo_error ( EINFO_ENOTSUP_RESPONSE_TYPE )
- #define EINFO_ENOTSUP_RESPONSE_TYPE \
- __einfo_uniqify ( EINFO_ENOTSUP, 0x01, \
- "Unsupported OCSP response type" )
- #define ENOTSUP_RESPONDER_ID \
- __einfo_error ( EINFO_ENOTSUP_RESPONDER_ID )
- #define EINFO_ENOTSUP_RESPONDER_ID \
- __einfo_uniqify ( EINFO_ENOTSUP, 0x02, \
- "Unsupported OCSP responder ID" )
- #define EPROTO_MALFORMED_REQUEST \
- __einfo_error ( EINFO_EPROTO_MALFORMED_REQUEST )
- #define EINFO_EPROTO_MALFORMED_REQUEST \
- __einfo_uniqify ( EINFO_EPROTO, OCSP_STATUS_MALFORMED_REQUEST, \
- "Illegal confirmation request" )
- #define EPROTO_INTERNAL_ERROR \
- __einfo_error ( EINFO_EPROTO_INTERNAL_ERROR )
- #define EINFO_EPROTO_INTERNAL_ERROR \
- __einfo_uniqify ( EINFO_EPROTO, OCSP_STATUS_INTERNAL_ERROR, \
- "Internal error in issuer" )
- #define EPROTO_TRY_LATER \
- __einfo_error ( EINFO_EPROTO_TRY_LATER )
- #define EINFO_EPROTO_TRY_LATER \
- __einfo_uniqify ( EINFO_EPROTO, OCSP_STATUS_TRY_LATER, \
- "Try again later" )
- #define EPROTO_SIG_REQUIRED \
- __einfo_error ( EINFO_EPROTO_SIG_REQUIRED )
- #define EINFO_EPROTO_SIG_REQUIRED \
- __einfo_uniqify ( EINFO_EPROTO, OCSP_STATUS_SIG_REQUIRED, \
- "Must sign the request" )
- #define EPROTO_UNAUTHORIZED \
- __einfo_error ( EINFO_EPROTO_UNAUTHORIZED )
- #define EINFO_EPROTO_UNAUTHORIZED \
- __einfo_uniqify ( EINFO_EPROTO, OCSP_STATUS_UNAUTHORIZED, \
- "Request unauthorized" )
- #define EPROTO_STATUS( status ) \
- EUNIQ ( EINFO_EPROTO, (status), EPROTO_MALFORMED_REQUEST, \
- EPROTO_INTERNAL_ERROR, EPROTO_TRY_LATER, \
- EPROTO_SIG_REQUIRED, EPROTO_UNAUTHORIZED )
-
-
- #define ocsp_digest_algorithm sha1_algorithm
-
-
- static const uint8_t ocsp_algorithm_id[] =
- { OCSP_ALGORITHM_IDENTIFIER ( ASN1_OID_SHA1 ) };
-
-
- static const uint8_t oid_basic_response_type[] = { ASN1_OID_OCSP_BASIC };
-
-
- static struct asn1_cursor oid_basic_response_type_cursor =
- ASN1_OID_CURSOR ( oid_basic_response_type );
-
-
- static void ocsp_free ( struct refcnt *refcnt ) {
- struct ocsp_check *ocsp =
- container_of ( refcnt, struct ocsp_check, refcnt );
-
- x509_put ( ocsp->cert );
- x509_put ( ocsp->issuer );
- free ( ocsp->uri_string );
- free ( ocsp->request.builder.data );
- free ( ocsp->response.data );
- x509_put ( ocsp->response.signer );
- free ( ocsp );
- }
-
-
- static int ocsp_request ( struct ocsp_check *ocsp ) {
- struct digest_algorithm *digest = &ocsp_digest_algorithm;
- struct asn1_builder *builder = &ocsp->request.builder;
- struct asn1_cursor *cert_id = &ocsp->request.cert_id;
- uint8_t digest_ctx[digest->ctxsize];
- uint8_t name_digest[digest->digestsize];
- uint8_t pubkey_digest[digest->digestsize];
- int rc;
-
-
- digest_init ( digest, digest_ctx );
- digest_update ( digest, digest_ctx, ocsp->cert->issuer.raw.data,
- ocsp->cert->issuer.raw.len );
- digest_final ( digest, digest_ctx, name_digest );
- digest_init ( digest, digest_ctx );
- digest_update ( digest, digest_ctx,
- ocsp->issuer->subject.public_key.raw_bits.data,
- ocsp->issuer->subject.public_key.raw_bits.len );
- digest_final ( digest, digest_ctx, pubkey_digest );
-
-
- if ( ( rc = ( asn1_prepend_raw ( builder, ocsp->cert->serial.raw.data,
- ocsp->cert->serial.raw.len ),
- asn1_prepend ( builder, ASN1_OCTET_STRING,
- pubkey_digest, sizeof ( pubkey_digest ) ),
- asn1_prepend ( builder, ASN1_OCTET_STRING,
- name_digest, sizeof ( name_digest ) ),
- asn1_prepend ( builder, ASN1_SEQUENCE,
- ocsp_algorithm_id,
- sizeof ( ocsp_algorithm_id ) ),
- asn1_wrap ( builder, ASN1_SEQUENCE ),
- asn1_wrap ( builder, ASN1_SEQUENCE ),
- asn1_wrap ( builder, ASN1_SEQUENCE ),
- asn1_wrap ( builder, ASN1_SEQUENCE ),
- asn1_wrap ( builder, ASN1_SEQUENCE ) ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not build request: %s\n",
- ocsp, ocsp->cert->subject.name, strerror ( rc ) );
- return rc;
- }
- DBGC2 ( ocsp, "OCSP %p \"%s\" request is:\n",
- ocsp, ocsp->cert->subject.name );
- DBGC2_HDA ( ocsp, 0, builder->data, builder->len );
-
-
- cert_id->data = builder->data;
- cert_id->len = builder->len;
- if ( ( rc = ( asn1_enter ( cert_id, ASN1_SEQUENCE ),
- asn1_enter ( cert_id, ASN1_SEQUENCE ),
- asn1_enter ( cert_id, ASN1_SEQUENCE ),
- asn1_enter ( cert_id, ASN1_SEQUENCE ) ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not locate certID: %s\n",
- ocsp, ocsp->cert->subject.name, strerror ( rc ) );
- return rc;
- }
-
- return 0;
- }
-
-
- static int ocsp_uri_string ( struct ocsp_check *ocsp ) {
- struct uri path_uri;
- char *base_uri_string;
- char *path_base64_string;
- char *path_uri_string;
- size_t path_len;
- int len;
- int rc;
-
-
- base_uri_string = ocsp->cert->extensions.auth_info.ocsp.uri;
- if ( ! base_uri_string ) {
- DBGC ( ocsp, "OCSP %p \"%s\" has no OCSP URI\n",
- ocsp, ocsp->cert->subject.name );
- rc = -ENOTTY;
- goto err_no_uri;
- }
-
-
- path_len = ( base64_encoded_len ( ocsp->request.builder.len )
- + 1 );
- path_base64_string = malloc ( path_len );
- if ( ! path_base64_string ) {
- rc = -ENOMEM;
- goto err_path_base64;
- }
- base64_encode ( ocsp->request.builder.data, ocsp->request.builder.len,
- path_base64_string );
-
-
- memset ( &path_uri, 0, sizeof ( path_uri ) );
- path_uri.path = path_base64_string;
- path_uri_string = format_uri_alloc ( &path_uri );
- if ( ! path_uri_string ) {
- rc = -ENOMEM;
- goto err_path_uri;
- }
-
-
- if ( ( len = asprintf ( &ocsp->uri_string, "%s/%s", base_uri_string,
- path_uri_string ) ) < 0 ) {
- rc = len;
- goto err_ocsp_uri;
- }
- DBGC2 ( ocsp, "OCSP %p \"%s\" URI is %s\n",
- ocsp, ocsp->cert->subject.name, ocsp->uri_string );
-
-
- rc = 0;
-
- err_ocsp_uri:
- free ( path_uri_string );
- err_path_uri:
- free ( path_base64_string );
- err_path_base64:
- err_no_uri:
- return rc;
- }
-
-
- int ocsp_check ( struct x509_certificate *cert,
- struct x509_certificate *issuer,
- struct ocsp_check **ocsp ) {
- int rc;
-
-
- assert ( cert != NULL );
- assert ( issuer != NULL );
- assert ( issuer->valid );
-
-
- *ocsp = zalloc ( sizeof ( **ocsp ) );
- if ( ! *ocsp ) {
- rc = -ENOMEM;
- goto err_alloc;
- }
- ref_init ( &(*ocsp)->refcnt, ocsp_free );
- (*ocsp)->cert = x509_get ( cert );
- (*ocsp)->issuer = x509_get ( issuer );
-
-
- if ( ( rc = ocsp_request ( *ocsp ) ) != 0 )
- goto err_request;
-
-
- if ( ( rc = ocsp_uri_string ( *ocsp ) ) != 0 )
- goto err_uri_string;
-
- return 0;
-
- err_uri_string:
- err_request:
- ocsp_put ( *ocsp );
- err_alloc:
- *ocsp = NULL;
- return rc;
- }
-
-
- static int ocsp_parse_response_status ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
- uint8_t status;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- if ( ( rc = asn1_enter ( &cursor, ASN1_ENUMERATED ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not locate responseStatus: "
- "%s\n", ocsp, ocsp->cert->subject.name, strerror ( rc ));
- return rc;
- }
-
-
- if ( cursor.len != sizeof ( status ) ) {
- DBGC ( ocsp, "OCSP %p \"%s\" invalid status:\n",
- ocsp, ocsp->cert->subject.name );
- DBGC_HDA ( ocsp, 0, cursor.data, cursor.len );
- return -EINVAL;
- }
- memcpy ( &status, cursor.data, sizeof ( status ) );
-
-
- if ( status != OCSP_STATUS_SUCCESSFUL ) {
- DBGC ( ocsp, "OCSP %p \"%s\" response status %d\n",
- ocsp, ocsp->cert->subject.name, status );
- return EPROTO_STATUS ( status );
- }
-
- return 0;
- }
-
-
- static int ocsp_parse_response_type ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_OID );
-
-
- if ( asn1_compare ( &oid_basic_response_type_cursor, &cursor ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" response type not supported:\n",
- ocsp, ocsp->cert->subject.name );
- DBGC_HDA ( ocsp, 0, cursor.data, cursor.len );
- return -ENOTSUP_RESPONSE_TYPE;
- }
-
- return 0;
- }
-
-
- static int ocsp_compare_responder_name ( struct ocsp_check *ocsp,
- struct x509_certificate *cert ) {
- struct ocsp_responder *responder = &ocsp->response.responder;
-
-
- return asn1_compare ( &responder->id, &cert->subject.raw );
- }
-
-
- static int ocsp_compare_responder_key_hash ( struct ocsp_check *ocsp,
- struct x509_certificate *cert ) {
- struct ocsp_responder *responder = &ocsp->response.responder;
- uint8_t ctx[SHA1_CTX_SIZE];
- uint8_t digest[SHA1_DIGEST_SIZE];
- int difference;
-
-
- difference = ( sizeof ( digest ) - responder->id.len );
- if ( difference )
- return difference;
-
-
- digest_init ( &sha1_algorithm, ctx );
- digest_update ( &sha1_algorithm, ctx,
- cert->subject.public_key.raw_bits.data,
- cert->subject.public_key.raw_bits.len );
- digest_final ( &sha1_algorithm, ctx, digest );
-
-
- return memcmp ( digest, responder->id.data, sizeof ( digest ) );
- }
-
-
- static int ocsp_parse_responder_id ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct ocsp_responder *responder = &ocsp->response.responder;
- struct asn1_cursor *responder_id = &responder->id;
- unsigned int type;
-
-
- memcpy ( responder_id, raw, sizeof ( *responder_id ) );
- type = asn1_type ( responder_id );
- asn1_enter_any ( responder_id );
-
-
- switch ( type ) {
- case ASN1_EXPLICIT_TAG ( 1 ) :
- DBGC2 ( ocsp, "OCSP %p \"%s\" responder identified by name\n",
- ocsp, ocsp->cert->subject.name );
- responder->compare = ocsp_compare_responder_name;
- return 0;
- case ASN1_EXPLICIT_TAG ( 2 ) :
- DBGC2 ( ocsp, "OCSP %p \"%s\" responder identified by key "
- "hash\n", ocsp, ocsp->cert->subject.name );
- responder->compare = ocsp_compare_responder_key_hash;
- return 0;
- default:
- DBGC ( ocsp, "OCSP %p \"%s\" unsupported responder ID type "
- "%d\n", ocsp, ocsp->cert->subject.name, type );
- return -ENOTSUP_RESPONDER_ID;
- }
- }
-
-
- static int ocsp_parse_cert_id ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_shrink_any ( &cursor );
- if ( asn1_compare ( &cursor, &ocsp->request.cert_id ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" certID mismatch:\n",
- ocsp, ocsp->cert->subject.name );
- DBGC_HDA ( ocsp, 0, ocsp->request.cert_id.data,
- ocsp->request.cert_id.len );
- DBGC_HDA ( ocsp, 0, cursor.data, cursor.len );
- return -EACCES_CERT_MISMATCH;
- }
-
- return 0;
- }
-
-
- static int ocsp_parse_responses ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct ocsp_response *response = &ocsp->response;
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- if ( ( rc = ocsp_parse_cert_id ( ocsp, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- if ( asn1_type ( &cursor ) != ASN1_IMPLICIT_TAG ( 0 ) ) {
- DBGC ( ocsp, "OCSP %p \"%s\" non-good certStatus:\n",
- ocsp, ocsp->cert->subject.name );
- DBGC_HDA ( ocsp, 0, cursor.data, cursor.len );
- return -EACCES_CERT_STATUS;
- }
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = asn1_generalized_time ( &cursor,
- &response->this_update ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not parse thisUpdate: %s\n",
- ocsp, ocsp->cert->subject.name, strerror ( rc ) );
- return rc;
- }
- DBGC2 ( ocsp, "OCSP %p \"%s\" this update was at time %lld\n",
- ocsp, ocsp->cert->subject.name, response->this_update );
- asn1_skip_any ( &cursor );
-
-
- if ( asn1_type ( &cursor ) == ASN1_EXPLICIT_TAG ( 0 ) ) {
- asn1_enter ( &cursor, ASN1_EXPLICIT_TAG ( 0 ) );
- if ( ( rc = asn1_generalized_time ( &cursor,
- &response->next_update ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not parse "
- "nextUpdate: %s\n", ocsp,
- ocsp->cert->subject.name, strerror ( rc ) );
- return rc;
- }
- DBGC2 ( ocsp, "OCSP %p \"%s\" next update is at time %lld\n",
- ocsp, ocsp->cert->subject.name, response->next_update );
- } else {
-
-
- DBGC ( ocsp, "OCSP %p \"%s\" responder is a moron\n",
- ocsp, ocsp->cert->subject.name );
- response->next_update = time ( NULL );
- }
-
- return 0;
- }
-
-
- static int ocsp_parse_tbs_response_data ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct ocsp_response *response = &ocsp->response;
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_shrink_any ( &cursor );
- memcpy ( &response->tbs, &cursor, sizeof ( response->tbs ) );
-
-
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- asn1_skip_if_exists ( &cursor, ASN1_EXPLICIT_TAG ( 0 ) );
-
-
- if ( ( rc = ocsp_parse_responder_id ( ocsp, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = ocsp_parse_responses ( ocsp, &cursor ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- static int ocsp_parse_certs ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct ocsp_response *response = &ocsp->response;
- struct asn1_cursor cursor;
- struct x509_certificate *cert;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_EXPLICIT_TAG ( 0 ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
-
- while ( cursor.len ) {
-
-
- if ( ( rc = x509_certificate ( cursor.data, cursor.len,
- &cert ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not parse "
- "certificate: %s\n", ocsp,
- ocsp->cert->subject.name, strerror ( rc ) );
- DBGC_HDA ( ocsp, 0, cursor.data, cursor.len );
- return rc;
- }
-
-
- if ( response->responder.compare ( ocsp, cert ) == 0 ) {
- response->signer = cert;
- DBGC2 ( ocsp, "OCSP %p \"%s\" response is signed by "
- "\"%s\"\n", ocsp, ocsp->cert->subject.name,
- response->signer->subject.name );
- return 0;
- }
-
-
- x509_put ( cert );
- asn1_skip_any ( &cursor );
- }
-
- DBGC ( ocsp, "OCSP %p \"%s\" missing responder certificate\n",
- ocsp, ocsp->cert->subject.name );
- return -EACCES_NO_RESPONDER;
- }
-
-
- static int ocsp_parse_basic_response ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct ocsp_response *response = &ocsp->response;
- struct asn1_algorithm **algorithm = &response->algorithm;
- struct asn1_bit_string *signature = &response->signature;
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- if ( ( rc = ocsp_parse_tbs_response_data ( ocsp, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = asn1_signature_algorithm ( &cursor, algorithm ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" cannot parse signature "
- "algorithm: %s\n",
- ocsp, ocsp->cert->subject.name, strerror ( rc ) );
- return rc;
- }
- DBGC2 ( ocsp, "OCSP %p \"%s\" signature algorithm is %s\n",
- ocsp, ocsp->cert->subject.name, (*algorithm)->name );
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = asn1_integral_bit_string ( &cursor, signature ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" cannot parse signature: %s\n",
- ocsp, ocsp->cert->subject.name, strerror ( rc ) );
- return rc;
- }
- asn1_skip_any ( &cursor );
-
-
- if ( ( asn1_type ( &cursor ) == ASN1_EXPLICIT_TAG ( 0 ) ) &&
- ( ( rc = ocsp_parse_certs ( ocsp, &cursor ) ) != 0 ) )
- return rc;
-
- return 0;
- }
-
-
- static int ocsp_parse_response_bytes ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_EXPLICIT_TAG ( 0 ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- if ( ( rc = ocsp_parse_response_type ( ocsp, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- asn1_enter ( &cursor, ASN1_OCTET_STRING );
-
-
- if ( ( rc = ocsp_parse_basic_response ( ocsp, &cursor ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- static int ocsp_parse_response ( struct ocsp_check *ocsp,
- const struct asn1_cursor *raw ) {
- struct asn1_cursor cursor;
- int rc;
-
-
- memcpy ( &cursor, raw, sizeof ( cursor ) );
- asn1_enter ( &cursor, ASN1_SEQUENCE );
-
-
- if ( ( rc = ocsp_parse_response_status ( ocsp, &cursor ) ) != 0 )
- return rc;
- asn1_skip_any ( &cursor );
-
-
- if ( ( rc = ocsp_parse_response_bytes ( ocsp, &cursor ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- int ocsp_response ( struct ocsp_check *ocsp, const void *data, size_t len ) {
- struct ocsp_response *response = &ocsp->response;
- struct asn1_cursor cursor;
- int rc;
-
-
- x509_put ( response->signer );
- response->signer = NULL;
- free ( response->data );
- response->data = malloc ( len );
- if ( ! response->data )
- return -ENOMEM;
- memcpy ( response->data, data, len );
- cursor.data = response->data;
- cursor.len = len;
-
-
- if ( ( rc = ocsp_parse_response ( ocsp, &cursor ) ) != 0 )
- return rc;
-
- return 0;
- }
-
-
- static struct x509_root ocsp_root = {
- .digest = &ocsp_digest_algorithm,
- .count = 0,
- .fingerprints = NULL,
- };
-
-
- static int ocsp_check_signature ( struct ocsp_check *ocsp,
- struct x509_certificate *signer ) {
- struct ocsp_response *response = &ocsp->response;
- struct digest_algorithm *digest = response->algorithm->digest;
- struct pubkey_algorithm *pubkey = response->algorithm->pubkey;
- struct x509_public_key *public_key = &signer->subject.public_key;
- uint8_t digest_ctx[ digest->ctxsize ];
- uint8_t digest_out[ digest->digestsize ];
- uint8_t pubkey_ctx[ pubkey->ctxsize ];
- int rc;
-
-
- digest_init ( digest, digest_ctx );
- digest_update ( digest, digest_ctx, response->tbs.data,
- response->tbs.len );
- digest_final ( digest, digest_ctx, digest_out );
-
-
- if ( ( rc = pubkey_init ( pubkey, pubkey_ctx, public_key->raw.data,
- public_key->raw.len ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not initialise public key: "
- "%s\n", ocsp, ocsp->cert->subject.name, strerror ( rc ));
- goto err_init;
- }
-
-
- if ( ( rc = pubkey_verify ( pubkey, pubkey_ctx, digest, digest_out,
- response->signature.data,
- response->signature.len ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" signature verification failed: "
- "%s\n", ocsp, ocsp->cert->subject.name, strerror ( rc ));
- goto err_verify;
- }
-
- DBGC2 ( ocsp, "OCSP %p \"%s\" signature is correct\n",
- ocsp, ocsp->cert->subject.name );
-
- err_verify:
- pubkey_final ( pubkey, pubkey_ctx );
- err_init:
- return rc;
- }
-
-
- int ocsp_validate ( struct ocsp_check *ocsp, time_t time ) {
- struct ocsp_response *response = &ocsp->response;
- struct x509_certificate *signer;
- int rc;
-
-
- assert ( response->data != NULL );
-
-
-
- signer = ( response->signer ? response->signer : ocsp->issuer );
-
-
-
- if ( signer != ocsp->issuer ) {
-
-
- x509_invalidate ( signer );
- if ( ( rc = x509_validate ( signer, ocsp->issuer, time,
- &ocsp_root ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not validate "
- "signer \"%s\": %s\n", ocsp,
- ocsp->cert->subject.name, signer->subject.name,
- strerror ( rc ) );
- return rc;
- }
-
-
-
- if ( ! ( signer->extensions.ext_usage.bits &
- X509_OCSP_SIGNING ) ) {
- DBGC ( ocsp, "OCSP %p \"%s\" signer \"%s\" is "
- "not an OCSP-signing certificate\n", ocsp,
- ocsp->cert->subject.name, signer->subject.name );
- return -EACCES_NON_OCSP_SIGNING;
- }
- }
-
-
- if ( ( rc = ocsp_check_signature ( ocsp, signer ) ) != 0 )
- return rc;
-
-
-
- if ( response->this_update > ( time + X509_ERROR_MARGIN_TIME ) ) {
- DBGC ( ocsp, "OCSP %p \"%s\" response is not yet valid (at "
- "time %lld)\n", ocsp, ocsp->cert->subject.name, time );
- return -EACCES_STALE;
- }
- if ( response->next_update < ( time - X509_ERROR_MARGIN_TIME ) ) {
- DBGC ( ocsp, "OCSP %p \"%s\" response is stale (at time "
- "%lld)\n", ocsp, ocsp->cert->subject.name, time );
- return -EACCES_STALE;
- }
- DBGC2 ( ocsp, "OCSP %p \"%s\" response is valid (at time %lld)\n",
- ocsp, ocsp->cert->subject.name, time );
-
-
- ocsp->cert->extensions.auth_info.ocsp.good = 1;
-
-
- if ( ( rc = x509_validate ( ocsp->cert, ocsp->issuer, time,
- &ocsp_root ) ) != 0 ) {
- DBGC ( ocsp, "OCSP %p \"%s\" could not validate certificate: "
- "%s\n", ocsp, ocsp->cert->subject.name, strerror ( rc ));
- return rc;
- }
- DBGC ( ocsp, "OCSP %p \"%s\" successfully validated using \"%s\"\n",
- ocsp, ocsp->cert->subject.name, signer->subject.name );
-
- return 0;
- }
|