123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306 |
- /*
- * Copyright (C) 2014 Michael Brown <mbrown@fensystems.co.uk>.
- *
- * This program is free software; you can redistribute it and/or
- * modify it under the terms of the GNU General Public License as
- * published by the Free Software Foundation; either version 2 of the
- * License, or any later version.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- * General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program; if not, write to the Free Software
- * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
- * 02110-1301, USA.
- *
- * You can also choose to distribute this program under the terms of
- * the Unmodified Binary Distribution Licence (as given in the file
- * COPYING.UBDL), provided that you have satisfied its requirements.
- */
-
- FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL );
-
- #include <string.h>
- #include <stdlib.h>
- #include <ipxe/init.h>
- #include <ipxe/dhcp.h>
- #include <ipxe/settings.h>
- #include <ipxe/malloc.h>
- #include <ipxe/crypto.h>
- #include <ipxe/asn1.h>
- #include <ipxe/x509.h>
- #include <ipxe/certstore.h>
-
- /** @file
- *
- * Certificate store
- *
- */
-
- /** Raw certificate data for all permanent stored certificates */
- #undef CERT
- #define CERT( _index, _path ) \
- extern char stored_cert_ ## _index ## _data[]; \
- extern char stored_cert_ ## _index ## _len[]; \
- __asm__ ( ".section \".rodata\", \"a\", " PROGBITS "\n\t" \
- "\nstored_cert_" #_index "_data:\n\t" \
- ".incbin \"" _path "\"\n\t" \
- "\nstored_cert_" #_index "_end:\n\t" \
- ".equ stored_cert_" #_index "_len, " \
- "( stored_cert_" #_index "_end - " \
- " stored_cert_" #_index "_data )\n\t" \
- ".previous\n\t" );
- CERT_ALL
-
- /** Raw certificate cursors for all permanent stored certificates */
- #undef CERT
- #define CERT( _index, _path ) { \
- .data = stored_cert_ ## _index ## _data, \
- .len = ( size_t ) stored_cert_ ## _index ## _len, \
- },
- static struct asn1_cursor certstore_raw[] = {
- CERT_ALL
- };
-
- /** X.509 certificate structures for all permanent stored certificates */
- static struct x509_certificate certstore_certs[ sizeof ( certstore_raw ) /
- sizeof ( certstore_raw[0] ) ];
-
- /** Certificate store */
- struct x509_chain certstore = {
- .refcnt = REF_INIT ( ref_no_free ),
- .links = LIST_HEAD_INIT ( certstore.links ),
- };
-
- /**
- * Mark stored certificate as most recently used
- *
- * @v cert X.509 certificate
- * @ret cert X.509 certificate
- */
- static struct x509_certificate *
- certstore_found ( struct x509_certificate *cert ) {
-
- /* Mark as most recently used */
- list_del ( &cert->store.list );
- list_add ( &cert->store.list, &certstore.links );
- DBGC2 ( &certstore, "CERTSTORE found certificate %s\n",
- x509_name ( cert ) );
-
- return cert;
- }
-
- /**
- * Find certificate in store
- *
- * @v raw Raw certificate data
- * @ret cert X.509 certificate, or NULL if not found
- */
- struct x509_certificate * certstore_find ( struct asn1_cursor *raw ) {
- struct x509_certificate *cert;
-
- /* Search for certificate within store */
- list_for_each_entry ( cert, &certstore.links, store.list ) {
- if ( asn1_compare ( raw, &cert->raw ) == 0 )
- return certstore_found ( cert );
- }
- return NULL;
- }
-
- /**
- * Find certificate in store corresponding to a private key
- *
- * @v key Private key
- * @ret cert X.509 certificate, or NULL if not found
- */
- struct x509_certificate * certstore_find_key ( struct asn1_cursor *key ) {
- struct x509_certificate *cert;
-
- /* Search for certificate within store */
- list_for_each_entry ( cert, &certstore.links, store.list ) {
- if ( pubkey_match ( cert->signature_algorithm->pubkey,
- key->data, key->len,
- cert->subject.public_key.raw.data,
- cert->subject.public_key.raw.len ) == 0 )
- return certstore_found ( cert );
- }
- return NULL;
- }
-
- /**
- * Add certificate to store
- *
- * @v cert X.509 certificate
- */
- void certstore_add ( struct x509_certificate *cert ) {
-
- /* Add certificate to store */
- cert->store.cert = cert;
- x509_get ( cert );
- list_add ( &cert->store.list, &certstore.links );
- DBGC ( &certstore, "CERTSTORE added certificate %s\n",
- x509_name ( cert ) );
- }
-
- /**
- * Remove certificate from store
- *
- * @v cert X.509 certificate
- */
- void certstore_del ( struct x509_certificate *cert ) {
-
- /* Ignore attempts to remove permanent certificates */
- if ( cert->flags & X509_FL_PERMANENT )
- return;
-
- /* Remove certificate from store */
- DBGC ( &certstore, "CERTSTORE removed certificate %s\n",
- x509_name ( cert ) );
- list_del ( &cert->store.list );
- x509_put ( cert );
- }
-
- /**
- * Discard a stored certificate
- *
- * @ret discarded Number of cached items discarded
- */
- static unsigned int certstore_discard ( void ) {
- struct x509_certificate *cert;
-
- /* Discard the least recently used certificate for which the
- * only reference is held by the store itself.
- */
- list_for_each_entry_reverse ( cert, &certstore.links, store.list ) {
-
- /* Skip certificates for which another reference is held */
- if ( cert->refcnt.count > 0 )
- continue;
-
- /* Skip certificates that were added at build time or
- * added explicitly at run time.
- */
- if ( cert->flags & ( X509_FL_PERMANENT | X509_FL_EXPLICIT ) )
- continue;
-
- /* Discard certificate */
- certstore_del ( cert );
- return 1;
- }
-
- return 0;
- }
-
- /** Certificate store cache discarder */
- struct cache_discarder certstore_discarder __cache_discarder ( CACHE_NORMAL ) ={
- .discard = certstore_discard,
- };
-
- /**
- * Construct permanent certificate store
- *
- */
- static void certstore_init ( void ) {
- struct asn1_cursor *raw;
- struct x509_certificate *cert;
- int i;
- int rc;
-
- /* Skip if we have no permanent stored certificates */
- if ( ! sizeof ( certstore_raw ) )
- return;
-
- /* Add certificates */
- for ( i = 0 ; i < ( int ) ( sizeof ( certstore_raw ) /
- sizeof ( certstore_raw[0] ) ) ; i++ ) {
-
- /* Skip if certificate already present in store */
- raw = &certstore_raw[i];
- if ( ( cert = certstore_find ( raw ) ) != NULL ) {
- DBGC ( &certstore, "CERTSTORE permanent certificate %d "
- "is a duplicate of %s\n", i, x509_name ( cert ));
- continue;
- }
-
- /* Parse certificate */
- cert = &certstore_certs[i];
- ref_init ( &cert->refcnt, ref_no_free );
- if ( ( rc = x509_parse ( cert, raw ) ) != 0 ) {
- DBGC ( &certstore, "CERTSTORE could not parse "
- "permanent certificate %d: %s\n",
- i, strerror ( rc ) );
- continue;
- }
-
- /* Add certificate to store. Certificate will never
- * be discarded from the store, since we retain a
- * permanent reference to it.
- */
- certstore_add ( cert );
- cert->flags |= X509_FL_PERMANENT;
- DBGC ( &certstore, "CERTSTORE permanent certificate %d is %s\n",
- i, x509_name ( cert ) );
- }
- }
-
- /** Certificate store initialisation function */
- struct init_fn certstore_init_fn __init_fn ( INIT_LATE ) = {
- .initialise = certstore_init,
- };
-
- /** Additional certificate setting */
- static struct setting cert_setting __setting ( SETTING_CRYPTO, cert ) = {
- .name = "cert",
- .description = "Certificate",
- .tag = DHCP_EB_CERT,
- .type = &setting_type_hex,
- };
-
- /**
- * Apply certificate store configuration settings
- *
- * @ret rc Return status code
- */
- static int certstore_apply_settings ( void ) {
- static struct x509_certificate *cert = NULL;
- struct x509_certificate *old_cert;
- void *cert_data;
- int len;
- int rc;
-
- /* Record any existing additional certificate */
- old_cert = cert;
- cert = NULL;
-
- /* Add additional certificate, if any */
- if ( ( len = fetch_raw_setting_copy ( NULL, &cert_setting,
- &cert_data ) ) >= 0 ) {
- if ( ( rc = x509_certificate ( cert_data, len, &cert ) ) == 0 ){
- DBGC ( &certstore, "CERTSTORE added additional "
- "certificate %s\n", x509_name ( cert ) );
- } else {
- DBGC ( &certstore, "CERTSTORE could not parse "
- "additional certificate: %s\n",
- strerror ( rc ) );
- /* Do not fail; leave as an unusable certificate */
- }
- free ( cert_data );
- }
-
- /* Free old additional certificiate. Do this after reparsing
- * the additional certificate; in the common case that the
- * certificate has not changed, this will allow the stored
- * certificate to be reused.
- */
- x509_put ( old_cert );
-
- return 0;
- }
-
- /** Certificate store settings applicator */
- struct settings_applicator certstore_applicator __settings_applicator = {
- .apply = certstore_apply_settings,
- };
|