tls_openssl.c 85 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451
  1. /*
  2. * SSL/TLS interface functions for OpenSSL
  3. * Copyright (c) 2004-2013, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #ifndef CONFIG_SMARTCARD
  10. #ifndef OPENSSL_NO_ENGINE
  11. #ifndef ANDROID
  12. #define OPENSSL_NO_ENGINE
  13. #endif
  14. #endif
  15. #endif
  16. #include <openssl/ssl.h>
  17. #include <openssl/err.h>
  18. #include <openssl/pkcs12.h>
  19. #include <openssl/x509v3.h>
  20. #ifndef OPENSSL_NO_ENGINE
  21. #include <openssl/engine.h>
  22. #endif /* OPENSSL_NO_ENGINE */
  23. #include "common.h"
  24. #include "crypto.h"
  25. #include "tls.h"
  26. #if OPENSSL_VERSION_NUMBER >= 0x0090800fL
  27. #define OPENSSL_d2i_TYPE const unsigned char **
  28. #else
  29. #define OPENSSL_d2i_TYPE unsigned char **
  30. #endif
  31. #if defined(SSL_CTX_get_app_data) && defined(SSL_CTX_set_app_data)
  32. #define OPENSSL_SUPPORTS_CTX_APP_DATA
  33. #endif
  34. #ifdef SSL_F_SSL_SET_SESSION_TICKET_EXT
  35. #ifdef SSL_OP_NO_TICKET
  36. /*
  37. * Session ticket override patch was merged into OpenSSL 0.9.9 tree on
  38. * 2008-11-15. This version uses a bit different API compared to the old patch.
  39. */
  40. #define CONFIG_OPENSSL_TICKET_OVERRIDE
  41. #endif
  42. #endif
  43. #ifdef SSL_set_tlsext_status_type
  44. #ifndef OPENSSL_NO_TLSEXT
  45. #define HAVE_OCSP
  46. #include <openssl/ocsp.h>
  47. #endif /* OPENSSL_NO_TLSEXT */
  48. #endif /* SSL_set_tlsext_status_type */
  49. #ifdef ANDROID
  50. #include <openssl/pem.h>
  51. #include <keystore/keystore_get.h>
  52. static BIO * BIO_from_keystore(const char *key)
  53. {
  54. BIO *bio = NULL;
  55. uint8_t *value = NULL;
  56. int length = keystore_get(key, strlen(key), &value);
  57. if (length != -1 && (bio = BIO_new(BIO_s_mem())) != NULL)
  58. BIO_write(bio, value, length);
  59. free(value);
  60. return bio;
  61. }
  62. #endif /* ANDROID */
  63. static int tls_openssl_ref_count = 0;
  64. struct tls_context {
  65. void (*event_cb)(void *ctx, enum tls_event ev,
  66. union tls_event_data *data);
  67. void *cb_ctx;
  68. int cert_in_cb;
  69. char *ocsp_stapling_response;
  70. };
  71. static struct tls_context *tls_global = NULL;
  72. struct tls_connection {
  73. struct tls_context *context;
  74. SSL *ssl;
  75. BIO *ssl_in, *ssl_out;
  76. #ifndef OPENSSL_NO_ENGINE
  77. ENGINE *engine; /* functional reference to the engine */
  78. EVP_PKEY *private_key; /* the private key if using engine */
  79. #endif /* OPENSSL_NO_ENGINE */
  80. char *subject_match, *altsubject_match, *suffix_match;
  81. int read_alerts, write_alerts, failed;
  82. tls_session_ticket_cb session_ticket_cb;
  83. void *session_ticket_cb_ctx;
  84. /* SessionTicket received from OpenSSL hello_extension_cb (server) */
  85. u8 *session_ticket;
  86. size_t session_ticket_len;
  87. unsigned int ca_cert_verify:1;
  88. unsigned int cert_probe:1;
  89. unsigned int server_cert_only:1;
  90. u8 srv_cert_hash[32];
  91. unsigned int flags;
  92. X509 *peer_cert;
  93. X509 *peer_issuer;
  94. X509 *peer_issuer_issuer;
  95. };
  96. static struct tls_context * tls_context_new(const struct tls_config *conf)
  97. {
  98. struct tls_context *context = os_zalloc(sizeof(*context));
  99. if (context == NULL)
  100. return NULL;
  101. if (conf) {
  102. context->event_cb = conf->event_cb;
  103. context->cb_ctx = conf->cb_ctx;
  104. context->cert_in_cb = conf->cert_in_cb;
  105. }
  106. return context;
  107. }
  108. #ifdef CONFIG_NO_STDOUT_DEBUG
  109. static void _tls_show_errors(void)
  110. {
  111. unsigned long err;
  112. while ((err = ERR_get_error())) {
  113. /* Just ignore the errors, since stdout is disabled */
  114. }
  115. }
  116. #define tls_show_errors(l, f, t) _tls_show_errors()
  117. #else /* CONFIG_NO_STDOUT_DEBUG */
  118. static void tls_show_errors(int level, const char *func, const char *txt)
  119. {
  120. unsigned long err;
  121. wpa_printf(level, "OpenSSL: %s - %s %s",
  122. func, txt, ERR_error_string(ERR_get_error(), NULL));
  123. while ((err = ERR_get_error())) {
  124. wpa_printf(MSG_INFO, "OpenSSL: pending error: %s",
  125. ERR_error_string(err, NULL));
  126. }
  127. }
  128. #endif /* CONFIG_NO_STDOUT_DEBUG */
  129. #ifdef CONFIG_NATIVE_WINDOWS
  130. /* Windows CryptoAPI and access to certificate stores */
  131. #include <wincrypt.h>
  132. #ifdef __MINGW32_VERSION
  133. /*
  134. * MinGW does not yet include all the needed definitions for CryptoAPI, so
  135. * define here whatever extra is needed.
  136. */
  137. #define CERT_SYSTEM_STORE_CURRENT_USER (1 << 16)
  138. #define CERT_STORE_READONLY_FLAG 0x00008000
  139. #define CERT_STORE_OPEN_EXISTING_FLAG 0x00004000
  140. #endif /* __MINGW32_VERSION */
  141. struct cryptoapi_rsa_data {
  142. const CERT_CONTEXT *cert;
  143. HCRYPTPROV crypt_prov;
  144. DWORD key_spec;
  145. BOOL free_crypt_prov;
  146. };
  147. static void cryptoapi_error(const char *msg)
  148. {
  149. wpa_printf(MSG_INFO, "CryptoAPI: %s; err=%u",
  150. msg, (unsigned int) GetLastError());
  151. }
  152. static int cryptoapi_rsa_pub_enc(int flen, const unsigned char *from,
  153. unsigned char *to, RSA *rsa, int padding)
  154. {
  155. wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
  156. return 0;
  157. }
  158. static int cryptoapi_rsa_pub_dec(int flen, const unsigned char *from,
  159. unsigned char *to, RSA *rsa, int padding)
  160. {
  161. wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
  162. return 0;
  163. }
  164. static int cryptoapi_rsa_priv_enc(int flen, const unsigned char *from,
  165. unsigned char *to, RSA *rsa, int padding)
  166. {
  167. struct cryptoapi_rsa_data *priv =
  168. (struct cryptoapi_rsa_data *) rsa->meth->app_data;
  169. HCRYPTHASH hash;
  170. DWORD hash_size, len, i;
  171. unsigned char *buf = NULL;
  172. int ret = 0;
  173. if (priv == NULL) {
  174. RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT,
  175. ERR_R_PASSED_NULL_PARAMETER);
  176. return 0;
  177. }
  178. if (padding != RSA_PKCS1_PADDING) {
  179. RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT,
  180. RSA_R_UNKNOWN_PADDING_TYPE);
  181. return 0;
  182. }
  183. if (flen != 16 /* MD5 */ + 20 /* SHA-1 */) {
  184. wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported",
  185. __func__);
  186. RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT,
  187. RSA_R_INVALID_MESSAGE_LENGTH);
  188. return 0;
  189. }
  190. if (!CryptCreateHash(priv->crypt_prov, CALG_SSL3_SHAMD5, 0, 0, &hash))
  191. {
  192. cryptoapi_error("CryptCreateHash failed");
  193. return 0;
  194. }
  195. len = sizeof(hash_size);
  196. if (!CryptGetHashParam(hash, HP_HASHSIZE, (BYTE *) &hash_size, &len,
  197. 0)) {
  198. cryptoapi_error("CryptGetHashParam failed");
  199. goto err;
  200. }
  201. if ((int) hash_size != flen) {
  202. wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)",
  203. (unsigned) hash_size, flen);
  204. RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT,
  205. RSA_R_INVALID_MESSAGE_LENGTH);
  206. goto err;
  207. }
  208. if (!CryptSetHashParam(hash, HP_HASHVAL, (BYTE * ) from, 0)) {
  209. cryptoapi_error("CryptSetHashParam failed");
  210. goto err;
  211. }
  212. len = RSA_size(rsa);
  213. buf = os_malloc(len);
  214. if (buf == NULL) {
  215. RSAerr(RSA_F_RSA_EAY_PRIVATE_ENCRYPT, ERR_R_MALLOC_FAILURE);
  216. goto err;
  217. }
  218. if (!CryptSignHash(hash, priv->key_spec, NULL, 0, buf, &len)) {
  219. cryptoapi_error("CryptSignHash failed");
  220. goto err;
  221. }
  222. for (i = 0; i < len; i++)
  223. to[i] = buf[len - i - 1];
  224. ret = len;
  225. err:
  226. os_free(buf);
  227. CryptDestroyHash(hash);
  228. return ret;
  229. }
  230. static int cryptoapi_rsa_priv_dec(int flen, const unsigned char *from,
  231. unsigned char *to, RSA *rsa, int padding)
  232. {
  233. wpa_printf(MSG_DEBUG, "%s - not implemented", __func__);
  234. return 0;
  235. }
  236. static void cryptoapi_free_data(struct cryptoapi_rsa_data *priv)
  237. {
  238. if (priv == NULL)
  239. return;
  240. if (priv->crypt_prov && priv->free_crypt_prov)
  241. CryptReleaseContext(priv->crypt_prov, 0);
  242. if (priv->cert)
  243. CertFreeCertificateContext(priv->cert);
  244. os_free(priv);
  245. }
  246. static int cryptoapi_finish(RSA *rsa)
  247. {
  248. cryptoapi_free_data((struct cryptoapi_rsa_data *) rsa->meth->app_data);
  249. os_free((void *) rsa->meth);
  250. rsa->meth = NULL;
  251. return 1;
  252. }
  253. static const CERT_CONTEXT * cryptoapi_find_cert(const char *name, DWORD store)
  254. {
  255. HCERTSTORE cs;
  256. const CERT_CONTEXT *ret = NULL;
  257. cs = CertOpenStore((LPCSTR) CERT_STORE_PROV_SYSTEM, 0, 0,
  258. store | CERT_STORE_OPEN_EXISTING_FLAG |
  259. CERT_STORE_READONLY_FLAG, L"MY");
  260. if (cs == NULL) {
  261. cryptoapi_error("Failed to open 'My system store'");
  262. return NULL;
  263. }
  264. if (strncmp(name, "cert://", 7) == 0) {
  265. unsigned short wbuf[255];
  266. MultiByteToWideChar(CP_ACP, 0, name + 7, -1, wbuf, 255);
  267. ret = CertFindCertificateInStore(cs, X509_ASN_ENCODING |
  268. PKCS_7_ASN_ENCODING,
  269. 0, CERT_FIND_SUBJECT_STR,
  270. wbuf, NULL);
  271. } else if (strncmp(name, "hash://", 7) == 0) {
  272. CRYPT_HASH_BLOB blob;
  273. int len;
  274. const char *hash = name + 7;
  275. unsigned char *buf;
  276. len = os_strlen(hash) / 2;
  277. buf = os_malloc(len);
  278. if (buf && hexstr2bin(hash, buf, len) == 0) {
  279. blob.cbData = len;
  280. blob.pbData = buf;
  281. ret = CertFindCertificateInStore(cs,
  282. X509_ASN_ENCODING |
  283. PKCS_7_ASN_ENCODING,
  284. 0, CERT_FIND_HASH,
  285. &blob, NULL);
  286. }
  287. os_free(buf);
  288. }
  289. CertCloseStore(cs, 0);
  290. return ret;
  291. }
  292. static int tls_cryptoapi_cert(SSL *ssl, const char *name)
  293. {
  294. X509 *cert = NULL;
  295. RSA *rsa = NULL, *pub_rsa;
  296. struct cryptoapi_rsa_data *priv;
  297. RSA_METHOD *rsa_meth;
  298. if (name == NULL ||
  299. (strncmp(name, "cert://", 7) != 0 &&
  300. strncmp(name, "hash://", 7) != 0))
  301. return -1;
  302. priv = os_zalloc(sizeof(*priv));
  303. rsa_meth = os_zalloc(sizeof(*rsa_meth));
  304. if (priv == NULL || rsa_meth == NULL) {
  305. wpa_printf(MSG_WARNING, "CryptoAPI: Failed to allocate memory "
  306. "for CryptoAPI RSA method");
  307. os_free(priv);
  308. os_free(rsa_meth);
  309. return -1;
  310. }
  311. priv->cert = cryptoapi_find_cert(name, CERT_SYSTEM_STORE_CURRENT_USER);
  312. if (priv->cert == NULL) {
  313. priv->cert = cryptoapi_find_cert(
  314. name, CERT_SYSTEM_STORE_LOCAL_MACHINE);
  315. }
  316. if (priv->cert == NULL) {
  317. wpa_printf(MSG_INFO, "CryptoAPI: Could not find certificate "
  318. "'%s'", name);
  319. goto err;
  320. }
  321. cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &priv->cert->pbCertEncoded,
  322. priv->cert->cbCertEncoded);
  323. if (cert == NULL) {
  324. wpa_printf(MSG_INFO, "CryptoAPI: Could not process X509 DER "
  325. "encoding");
  326. goto err;
  327. }
  328. if (!CryptAcquireCertificatePrivateKey(priv->cert,
  329. CRYPT_ACQUIRE_COMPARE_KEY_FLAG,
  330. NULL, &priv->crypt_prov,
  331. &priv->key_spec,
  332. &priv->free_crypt_prov)) {
  333. cryptoapi_error("Failed to acquire a private key for the "
  334. "certificate");
  335. goto err;
  336. }
  337. rsa_meth->name = "Microsoft CryptoAPI RSA Method";
  338. rsa_meth->rsa_pub_enc = cryptoapi_rsa_pub_enc;
  339. rsa_meth->rsa_pub_dec = cryptoapi_rsa_pub_dec;
  340. rsa_meth->rsa_priv_enc = cryptoapi_rsa_priv_enc;
  341. rsa_meth->rsa_priv_dec = cryptoapi_rsa_priv_dec;
  342. rsa_meth->finish = cryptoapi_finish;
  343. rsa_meth->flags = RSA_METHOD_FLAG_NO_CHECK;
  344. rsa_meth->app_data = (char *) priv;
  345. rsa = RSA_new();
  346. if (rsa == NULL) {
  347. SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_FILE,
  348. ERR_R_MALLOC_FAILURE);
  349. goto err;
  350. }
  351. if (!SSL_use_certificate(ssl, cert)) {
  352. RSA_free(rsa);
  353. rsa = NULL;
  354. goto err;
  355. }
  356. pub_rsa = cert->cert_info->key->pkey->pkey.rsa;
  357. X509_free(cert);
  358. cert = NULL;
  359. rsa->n = BN_dup(pub_rsa->n);
  360. rsa->e = BN_dup(pub_rsa->e);
  361. if (!RSA_set_method(rsa, rsa_meth))
  362. goto err;
  363. if (!SSL_use_RSAPrivateKey(ssl, rsa))
  364. goto err;
  365. RSA_free(rsa);
  366. return 0;
  367. err:
  368. if (cert)
  369. X509_free(cert);
  370. if (rsa)
  371. RSA_free(rsa);
  372. else {
  373. os_free(rsa_meth);
  374. cryptoapi_free_data(priv);
  375. }
  376. return -1;
  377. }
  378. static int tls_cryptoapi_ca_cert(SSL_CTX *ssl_ctx, SSL *ssl, const char *name)
  379. {
  380. HCERTSTORE cs;
  381. PCCERT_CONTEXT ctx = NULL;
  382. X509 *cert;
  383. char buf[128];
  384. const char *store;
  385. #ifdef UNICODE
  386. WCHAR *wstore;
  387. #endif /* UNICODE */
  388. if (name == NULL || strncmp(name, "cert_store://", 13) != 0)
  389. return -1;
  390. store = name + 13;
  391. #ifdef UNICODE
  392. wstore = os_malloc((os_strlen(store) + 1) * sizeof(WCHAR));
  393. if (wstore == NULL)
  394. return -1;
  395. wsprintf(wstore, L"%S", store);
  396. cs = CertOpenSystemStore(0, wstore);
  397. os_free(wstore);
  398. #else /* UNICODE */
  399. cs = CertOpenSystemStore(0, store);
  400. #endif /* UNICODE */
  401. if (cs == NULL) {
  402. wpa_printf(MSG_DEBUG, "%s: failed to open system cert store "
  403. "'%s': error=%d", __func__, store,
  404. (int) GetLastError());
  405. return -1;
  406. }
  407. while ((ctx = CertEnumCertificatesInStore(cs, ctx))) {
  408. cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ctx->pbCertEncoded,
  409. ctx->cbCertEncoded);
  410. if (cert == NULL) {
  411. wpa_printf(MSG_INFO, "CryptoAPI: Could not process "
  412. "X509 DER encoding for CA cert");
  413. continue;
  414. }
  415. X509_NAME_oneline(X509_get_subject_name(cert), buf,
  416. sizeof(buf));
  417. wpa_printf(MSG_DEBUG, "OpenSSL: Loaded CA certificate for "
  418. "system certificate store: subject='%s'", buf);
  419. if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {
  420. tls_show_errors(MSG_WARNING, __func__,
  421. "Failed to add ca_cert to OpenSSL "
  422. "certificate store");
  423. }
  424. X509_free(cert);
  425. }
  426. if (!CertCloseStore(cs, 0)) {
  427. wpa_printf(MSG_DEBUG, "%s: failed to close system cert store "
  428. "'%s': error=%d", __func__, name + 13,
  429. (int) GetLastError());
  430. }
  431. return 0;
  432. }
  433. #else /* CONFIG_NATIVE_WINDOWS */
  434. static int tls_cryptoapi_cert(SSL *ssl, const char *name)
  435. {
  436. return -1;
  437. }
  438. #endif /* CONFIG_NATIVE_WINDOWS */
  439. static void ssl_info_cb(const SSL *ssl, int where, int ret)
  440. {
  441. const char *str;
  442. int w;
  443. wpa_printf(MSG_DEBUG, "SSL: (where=0x%x ret=0x%x)", where, ret);
  444. w = where & ~SSL_ST_MASK;
  445. if (w & SSL_ST_CONNECT)
  446. str = "SSL_connect";
  447. else if (w & SSL_ST_ACCEPT)
  448. str = "SSL_accept";
  449. else
  450. str = "undefined";
  451. if (where & SSL_CB_LOOP) {
  452. wpa_printf(MSG_DEBUG, "SSL: %s:%s",
  453. str, SSL_state_string_long(ssl));
  454. } else if (where & SSL_CB_ALERT) {
  455. struct tls_connection *conn = SSL_get_app_data((SSL *) ssl);
  456. wpa_printf(MSG_INFO, "SSL: SSL3 alert: %s:%s:%s",
  457. where & SSL_CB_READ ?
  458. "read (remote end reported an error)" :
  459. "write (local SSL3 detected an error)",
  460. SSL_alert_type_string_long(ret),
  461. SSL_alert_desc_string_long(ret));
  462. if ((ret >> 8) == SSL3_AL_FATAL) {
  463. if (where & SSL_CB_READ)
  464. conn->read_alerts++;
  465. else
  466. conn->write_alerts++;
  467. }
  468. if (conn->context->event_cb != NULL) {
  469. union tls_event_data ev;
  470. struct tls_context *context = conn->context;
  471. os_memset(&ev, 0, sizeof(ev));
  472. ev.alert.is_local = !(where & SSL_CB_READ);
  473. ev.alert.type = SSL_alert_type_string_long(ret);
  474. ev.alert.description = SSL_alert_desc_string_long(ret);
  475. context->event_cb(context->cb_ctx, TLS_ALERT, &ev);
  476. }
  477. } else if (where & SSL_CB_EXIT && ret <= 0) {
  478. wpa_printf(MSG_DEBUG, "SSL: %s:%s in %s",
  479. str, ret == 0 ? "failed" : "error",
  480. SSL_state_string_long(ssl));
  481. }
  482. }
  483. #ifndef OPENSSL_NO_ENGINE
  484. /**
  485. * tls_engine_load_dynamic_generic - load any openssl engine
  486. * @pre: an array of commands and values that load an engine initialized
  487. * in the engine specific function
  488. * @post: an array of commands and values that initialize an already loaded
  489. * engine (or %NULL if not required)
  490. * @id: the engine id of the engine to load (only required if post is not %NULL
  491. *
  492. * This function is a generic function that loads any openssl engine.
  493. *
  494. * Returns: 0 on success, -1 on failure
  495. */
  496. static int tls_engine_load_dynamic_generic(const char *pre[],
  497. const char *post[], const char *id)
  498. {
  499. ENGINE *engine;
  500. const char *dynamic_id = "dynamic";
  501. engine = ENGINE_by_id(id);
  502. if (engine) {
  503. ENGINE_free(engine);
  504. wpa_printf(MSG_DEBUG, "ENGINE: engine '%s' is already "
  505. "available", id);
  506. return 0;
  507. }
  508. ERR_clear_error();
  509. engine = ENGINE_by_id(dynamic_id);
  510. if (engine == NULL) {
  511. wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]",
  512. dynamic_id,
  513. ERR_error_string(ERR_get_error(), NULL));
  514. return -1;
  515. }
  516. /* Perform the pre commands. This will load the engine. */
  517. while (pre && pre[0]) {
  518. wpa_printf(MSG_DEBUG, "ENGINE: '%s' '%s'", pre[0], pre[1]);
  519. if (ENGINE_ctrl_cmd_string(engine, pre[0], pre[1], 0) == 0) {
  520. wpa_printf(MSG_INFO, "ENGINE: ctrl cmd_string failed: "
  521. "%s %s [%s]", pre[0], pre[1],
  522. ERR_error_string(ERR_get_error(), NULL));
  523. ENGINE_free(engine);
  524. return -1;
  525. }
  526. pre += 2;
  527. }
  528. /*
  529. * Free the reference to the "dynamic" engine. The loaded engine can
  530. * now be looked up using ENGINE_by_id().
  531. */
  532. ENGINE_free(engine);
  533. engine = ENGINE_by_id(id);
  534. if (engine == NULL) {
  535. wpa_printf(MSG_INFO, "ENGINE: Can't find engine %s [%s]",
  536. id, ERR_error_string(ERR_get_error(), NULL));
  537. return -1;
  538. }
  539. while (post && post[0]) {
  540. wpa_printf(MSG_DEBUG, "ENGINE: '%s' '%s'", post[0], post[1]);
  541. if (ENGINE_ctrl_cmd_string(engine, post[0], post[1], 0) == 0) {
  542. wpa_printf(MSG_DEBUG, "ENGINE: ctrl cmd_string failed:"
  543. " %s %s [%s]", post[0], post[1],
  544. ERR_error_string(ERR_get_error(), NULL));
  545. ENGINE_remove(engine);
  546. ENGINE_free(engine);
  547. return -1;
  548. }
  549. post += 2;
  550. }
  551. ENGINE_free(engine);
  552. return 0;
  553. }
  554. /**
  555. * tls_engine_load_dynamic_pkcs11 - load the pkcs11 engine provided by opensc
  556. * @pkcs11_so_path: pksc11_so_path from the configuration
  557. * @pcks11_module_path: pkcs11_module_path from the configuration
  558. */
  559. static int tls_engine_load_dynamic_pkcs11(const char *pkcs11_so_path,
  560. const char *pkcs11_module_path)
  561. {
  562. char *engine_id = "pkcs11";
  563. const char *pre_cmd[] = {
  564. "SO_PATH", NULL /* pkcs11_so_path */,
  565. "ID", NULL /* engine_id */,
  566. "LIST_ADD", "1",
  567. /* "NO_VCHECK", "1", */
  568. "LOAD", NULL,
  569. NULL, NULL
  570. };
  571. const char *post_cmd[] = {
  572. "MODULE_PATH", NULL /* pkcs11_module_path */,
  573. NULL, NULL
  574. };
  575. if (!pkcs11_so_path || !pkcs11_module_path)
  576. return 0;
  577. pre_cmd[1] = pkcs11_so_path;
  578. pre_cmd[3] = engine_id;
  579. post_cmd[1] = pkcs11_module_path;
  580. wpa_printf(MSG_DEBUG, "ENGINE: Loading pkcs11 Engine from %s",
  581. pkcs11_so_path);
  582. return tls_engine_load_dynamic_generic(pre_cmd, post_cmd, engine_id);
  583. }
  584. /**
  585. * tls_engine_load_dynamic_opensc - load the opensc engine provided by opensc
  586. * @opensc_so_path: opensc_so_path from the configuration
  587. */
  588. static int tls_engine_load_dynamic_opensc(const char *opensc_so_path)
  589. {
  590. char *engine_id = "opensc";
  591. const char *pre_cmd[] = {
  592. "SO_PATH", NULL /* opensc_so_path */,
  593. "ID", NULL /* engine_id */,
  594. "LIST_ADD", "1",
  595. "LOAD", NULL,
  596. NULL, NULL
  597. };
  598. if (!opensc_so_path)
  599. return 0;
  600. pre_cmd[1] = opensc_so_path;
  601. pre_cmd[3] = engine_id;
  602. wpa_printf(MSG_DEBUG, "ENGINE: Loading OpenSC Engine from %s",
  603. opensc_so_path);
  604. return tls_engine_load_dynamic_generic(pre_cmd, NULL, engine_id);
  605. }
  606. #endif /* OPENSSL_NO_ENGINE */
  607. void * tls_init(const struct tls_config *conf)
  608. {
  609. SSL_CTX *ssl;
  610. struct tls_context *context;
  611. if (tls_openssl_ref_count == 0) {
  612. tls_global = context = tls_context_new(conf);
  613. if (context == NULL)
  614. return NULL;
  615. #ifdef CONFIG_FIPS
  616. #ifdef OPENSSL_FIPS
  617. if (conf && conf->fips_mode) {
  618. if (!FIPS_mode_set(1)) {
  619. wpa_printf(MSG_ERROR, "Failed to enable FIPS "
  620. "mode");
  621. ERR_load_crypto_strings();
  622. ERR_print_errors_fp(stderr);
  623. os_free(tls_global);
  624. tls_global = NULL;
  625. return NULL;
  626. } else
  627. wpa_printf(MSG_INFO, "Running in FIPS mode");
  628. }
  629. #else /* OPENSSL_FIPS */
  630. if (conf && conf->fips_mode) {
  631. wpa_printf(MSG_ERROR, "FIPS mode requested, but not "
  632. "supported");
  633. os_free(tls_global);
  634. tls_global = NULL;
  635. return NULL;
  636. }
  637. #endif /* OPENSSL_FIPS */
  638. #endif /* CONFIG_FIPS */
  639. SSL_load_error_strings();
  640. SSL_library_init();
  641. #if (OPENSSL_VERSION_NUMBER >= 0x0090800fL) && !defined(OPENSSL_NO_SHA256)
  642. EVP_add_digest(EVP_sha256());
  643. #endif /* OPENSSL_NO_SHA256 */
  644. /* TODO: if /dev/urandom is available, PRNG is seeded
  645. * automatically. If this is not the case, random data should
  646. * be added here. */
  647. #ifdef PKCS12_FUNCS
  648. #ifndef OPENSSL_NO_RC2
  649. /*
  650. * 40-bit RC2 is commonly used in PKCS#12 files, so enable it.
  651. * This is enabled by PKCS12_PBE_add() in OpenSSL 0.9.8
  652. * versions, but it looks like OpenSSL 1.0.0 does not do that
  653. * anymore.
  654. */
  655. EVP_add_cipher(EVP_rc2_40_cbc());
  656. #endif /* OPENSSL_NO_RC2 */
  657. PKCS12_PBE_add();
  658. #endif /* PKCS12_FUNCS */
  659. } else {
  660. context = tls_global;
  661. #ifdef OPENSSL_SUPPORTS_CTX_APP_DATA
  662. /* Newer OpenSSL can store app-data per-SSL */
  663. context = tls_context_new(conf);
  664. if (context == NULL)
  665. return NULL;
  666. #endif /* OPENSSL_SUPPORTS_CTX_APP_DATA */
  667. }
  668. tls_openssl_ref_count++;
  669. ssl = SSL_CTX_new(TLSv1_method());
  670. if (ssl == NULL) {
  671. tls_openssl_ref_count--;
  672. #ifdef OPENSSL_SUPPORTS_CTX_APP_DATA
  673. if (context != tls_global)
  674. os_free(context);
  675. #endif /* OPENSSL_SUPPORTS_CTX_APP_DATA */
  676. if (tls_openssl_ref_count == 0) {
  677. os_free(tls_global);
  678. tls_global = NULL;
  679. }
  680. return NULL;
  681. }
  682. SSL_CTX_set_info_callback(ssl, ssl_info_cb);
  683. #ifdef OPENSSL_SUPPORTS_CTX_APP_DATA
  684. SSL_CTX_set_app_data(ssl, context);
  685. #endif /* OPENSSL_SUPPORTS_CTX_APP_DATA */
  686. #ifndef OPENSSL_NO_ENGINE
  687. if (conf &&
  688. (conf->opensc_engine_path || conf->pkcs11_engine_path ||
  689. conf->pkcs11_module_path)) {
  690. wpa_printf(MSG_DEBUG, "ENGINE: Loading dynamic engine");
  691. ERR_load_ENGINE_strings();
  692. ENGINE_load_dynamic();
  693. if (tls_engine_load_dynamic_opensc(conf->opensc_engine_path) ||
  694. tls_engine_load_dynamic_pkcs11(conf->pkcs11_engine_path,
  695. conf->pkcs11_module_path)) {
  696. tls_deinit(ssl);
  697. return NULL;
  698. }
  699. }
  700. #endif /* OPENSSL_NO_ENGINE */
  701. return ssl;
  702. }
  703. void tls_deinit(void *ssl_ctx)
  704. {
  705. SSL_CTX *ssl = ssl_ctx;
  706. #ifdef OPENSSL_SUPPORTS_CTX_APP_DATA
  707. struct tls_context *context = SSL_CTX_get_app_data(ssl);
  708. if (context != tls_global)
  709. os_free(context);
  710. #endif /* OPENSSL_SUPPORTS_CTX_APP_DATA */
  711. SSL_CTX_free(ssl);
  712. tls_openssl_ref_count--;
  713. if (tls_openssl_ref_count == 0) {
  714. #ifndef OPENSSL_NO_ENGINE
  715. ENGINE_cleanup();
  716. #endif /* OPENSSL_NO_ENGINE */
  717. CRYPTO_cleanup_all_ex_data();
  718. ERR_remove_state(0);
  719. ERR_free_strings();
  720. EVP_cleanup();
  721. os_free(tls_global->ocsp_stapling_response);
  722. tls_global->ocsp_stapling_response = NULL;
  723. os_free(tls_global);
  724. tls_global = NULL;
  725. }
  726. }
  727. static int tls_engine_init(struct tls_connection *conn, const char *engine_id,
  728. const char *pin, const char *key_id,
  729. const char *cert_id, const char *ca_cert_id)
  730. {
  731. #ifndef OPENSSL_NO_ENGINE
  732. int ret = -1;
  733. if (engine_id == NULL) {
  734. wpa_printf(MSG_ERROR, "ENGINE: Engine ID not set");
  735. return -1;
  736. }
  737. #ifndef ANDROID
  738. if (pin == NULL) {
  739. wpa_printf(MSG_ERROR, "ENGINE: Smartcard PIN not set");
  740. return -1;
  741. }
  742. #endif
  743. if (key_id == NULL) {
  744. wpa_printf(MSG_ERROR, "ENGINE: Key Id not set");
  745. return -1;
  746. }
  747. ERR_clear_error();
  748. #ifdef ANDROID
  749. ENGINE_load_dynamic();
  750. #endif
  751. conn->engine = ENGINE_by_id(engine_id);
  752. if (!conn->engine) {
  753. wpa_printf(MSG_ERROR, "ENGINE: engine %s not available [%s]",
  754. engine_id, ERR_error_string(ERR_get_error(), NULL));
  755. goto err;
  756. }
  757. if (ENGINE_init(conn->engine) != 1) {
  758. wpa_printf(MSG_ERROR, "ENGINE: engine init failed "
  759. "(engine: %s) [%s]", engine_id,
  760. ERR_error_string(ERR_get_error(), NULL));
  761. goto err;
  762. }
  763. wpa_printf(MSG_DEBUG, "ENGINE: engine initialized");
  764. #ifndef ANDROID
  765. if (ENGINE_ctrl_cmd_string(conn->engine, "PIN", pin, 0) == 0) {
  766. wpa_printf(MSG_ERROR, "ENGINE: cannot set pin [%s]",
  767. ERR_error_string(ERR_get_error(), NULL));
  768. goto err;
  769. }
  770. #endif
  771. /* load private key first in-case PIN is required for cert */
  772. conn->private_key = ENGINE_load_private_key(conn->engine,
  773. key_id, NULL, NULL);
  774. if (!conn->private_key) {
  775. wpa_printf(MSG_ERROR, "ENGINE: cannot load private key with id"
  776. " '%s' [%s]", key_id,
  777. ERR_error_string(ERR_get_error(), NULL));
  778. ret = TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED;
  779. goto err;
  780. }
  781. /* handle a certificate and/or CA certificate */
  782. if (cert_id || ca_cert_id) {
  783. const char *cmd_name = "LOAD_CERT_CTRL";
  784. /* test if the engine supports a LOAD_CERT_CTRL */
  785. if (!ENGINE_ctrl(conn->engine, ENGINE_CTRL_GET_CMD_FROM_NAME,
  786. 0, (void *)cmd_name, NULL)) {
  787. wpa_printf(MSG_ERROR, "ENGINE: engine does not support"
  788. " loading certificates");
  789. ret = TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED;
  790. goto err;
  791. }
  792. }
  793. return 0;
  794. err:
  795. if (conn->engine) {
  796. ENGINE_free(conn->engine);
  797. conn->engine = NULL;
  798. }
  799. if (conn->private_key) {
  800. EVP_PKEY_free(conn->private_key);
  801. conn->private_key = NULL;
  802. }
  803. return ret;
  804. #else /* OPENSSL_NO_ENGINE */
  805. return 0;
  806. #endif /* OPENSSL_NO_ENGINE */
  807. }
  808. static void tls_engine_deinit(struct tls_connection *conn)
  809. {
  810. #ifndef OPENSSL_NO_ENGINE
  811. wpa_printf(MSG_DEBUG, "ENGINE: engine deinit");
  812. if (conn->private_key) {
  813. EVP_PKEY_free(conn->private_key);
  814. conn->private_key = NULL;
  815. }
  816. if (conn->engine) {
  817. ENGINE_finish(conn->engine);
  818. conn->engine = NULL;
  819. }
  820. #endif /* OPENSSL_NO_ENGINE */
  821. }
  822. int tls_get_errors(void *ssl_ctx)
  823. {
  824. int count = 0;
  825. unsigned long err;
  826. while ((err = ERR_get_error())) {
  827. wpa_printf(MSG_INFO, "TLS - SSL error: %s",
  828. ERR_error_string(err, NULL));
  829. count++;
  830. }
  831. return count;
  832. }
  833. struct tls_connection * tls_connection_init(void *ssl_ctx)
  834. {
  835. SSL_CTX *ssl = ssl_ctx;
  836. struct tls_connection *conn;
  837. long options;
  838. struct tls_context *context = tls_global;
  839. #ifdef OPENSSL_SUPPORTS_CTX_APP_DATA
  840. context = SSL_CTX_get_app_data(ssl);
  841. #endif /* OPENSSL_SUPPORTS_CTX_APP_DATA */
  842. conn = os_zalloc(sizeof(*conn));
  843. if (conn == NULL)
  844. return NULL;
  845. conn->ssl = SSL_new(ssl);
  846. if (conn->ssl == NULL) {
  847. tls_show_errors(MSG_INFO, __func__,
  848. "Failed to initialize new SSL connection");
  849. os_free(conn);
  850. return NULL;
  851. }
  852. conn->context = context;
  853. SSL_set_app_data(conn->ssl, conn);
  854. options = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3 |
  855. SSL_OP_SINGLE_DH_USE;
  856. #ifdef SSL_OP_NO_COMPRESSION
  857. options |= SSL_OP_NO_COMPRESSION;
  858. #endif /* SSL_OP_NO_COMPRESSION */
  859. SSL_set_options(conn->ssl, options);
  860. conn->ssl_in = BIO_new(BIO_s_mem());
  861. if (!conn->ssl_in) {
  862. tls_show_errors(MSG_INFO, __func__,
  863. "Failed to create a new BIO for ssl_in");
  864. SSL_free(conn->ssl);
  865. os_free(conn);
  866. return NULL;
  867. }
  868. conn->ssl_out = BIO_new(BIO_s_mem());
  869. if (!conn->ssl_out) {
  870. tls_show_errors(MSG_INFO, __func__,
  871. "Failed to create a new BIO for ssl_out");
  872. SSL_free(conn->ssl);
  873. BIO_free(conn->ssl_in);
  874. os_free(conn);
  875. return NULL;
  876. }
  877. SSL_set_bio(conn->ssl, conn->ssl_in, conn->ssl_out);
  878. return conn;
  879. }
  880. void tls_connection_deinit(void *ssl_ctx, struct tls_connection *conn)
  881. {
  882. if (conn == NULL)
  883. return;
  884. SSL_free(conn->ssl);
  885. tls_engine_deinit(conn);
  886. os_free(conn->subject_match);
  887. os_free(conn->altsubject_match);
  888. os_free(conn->suffix_match);
  889. os_free(conn->session_ticket);
  890. os_free(conn);
  891. }
  892. int tls_connection_established(void *ssl_ctx, struct tls_connection *conn)
  893. {
  894. return conn ? SSL_is_init_finished(conn->ssl) : 0;
  895. }
  896. int tls_connection_shutdown(void *ssl_ctx, struct tls_connection *conn)
  897. {
  898. if (conn == NULL)
  899. return -1;
  900. /* Shutdown previous TLS connection without notifying the peer
  901. * because the connection was already terminated in practice
  902. * and "close notify" shutdown alert would confuse AS. */
  903. SSL_set_quiet_shutdown(conn->ssl, 1);
  904. SSL_shutdown(conn->ssl);
  905. return 0;
  906. }
  907. static int tls_match_altsubject_component(X509 *cert, int type,
  908. const char *value, size_t len)
  909. {
  910. GENERAL_NAME *gen;
  911. void *ext;
  912. int i, found = 0;
  913. ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
  914. for (i = 0; ext && i < sk_GENERAL_NAME_num(ext); i++) {
  915. gen = sk_GENERAL_NAME_value(ext, i);
  916. if (gen->type != type)
  917. continue;
  918. if (os_strlen((char *) gen->d.ia5->data) == len &&
  919. os_memcmp(value, gen->d.ia5->data, len) == 0)
  920. found++;
  921. }
  922. return found;
  923. }
  924. static int tls_match_altsubject(X509 *cert, const char *match)
  925. {
  926. int type;
  927. const char *pos, *end;
  928. size_t len;
  929. pos = match;
  930. do {
  931. if (os_strncmp(pos, "EMAIL:", 6) == 0) {
  932. type = GEN_EMAIL;
  933. pos += 6;
  934. } else if (os_strncmp(pos, "DNS:", 4) == 0) {
  935. type = GEN_DNS;
  936. pos += 4;
  937. } else if (os_strncmp(pos, "URI:", 4) == 0) {
  938. type = GEN_URI;
  939. pos += 4;
  940. } else {
  941. wpa_printf(MSG_INFO, "TLS: Invalid altSubjectName "
  942. "match '%s'", pos);
  943. return 0;
  944. }
  945. end = os_strchr(pos, ';');
  946. while (end) {
  947. if (os_strncmp(end + 1, "EMAIL:", 6) == 0 ||
  948. os_strncmp(end + 1, "DNS:", 4) == 0 ||
  949. os_strncmp(end + 1, "URI:", 4) == 0)
  950. break;
  951. end = os_strchr(end + 1, ';');
  952. }
  953. if (end)
  954. len = end - pos;
  955. else
  956. len = os_strlen(pos);
  957. if (tls_match_altsubject_component(cert, type, pos, len) > 0)
  958. return 1;
  959. pos = end + 1;
  960. } while (end);
  961. return 0;
  962. }
  963. #ifndef CONFIG_NATIVE_WINDOWS
  964. static int domain_suffix_match(const u8 *val, size_t len, const char *match)
  965. {
  966. size_t i, match_len;
  967. /* Check for embedded nuls that could mess up suffix matching */
  968. for (i = 0; i < len; i++) {
  969. if (val[i] == '\0') {
  970. wpa_printf(MSG_DEBUG, "TLS: Embedded null in a string - reject");
  971. return 0;
  972. }
  973. }
  974. match_len = os_strlen(match);
  975. if (match_len > len)
  976. return 0;
  977. if (os_strncasecmp((const char *) val + len - match_len, match,
  978. match_len) != 0)
  979. return 0; /* no match */
  980. if (match_len == len)
  981. return 1; /* exact match */
  982. if (val[len - match_len - 1] == '.')
  983. return 1; /* full label match completes suffix match */
  984. wpa_printf(MSG_DEBUG, "TLS: Reject due to incomplete label match");
  985. return 0;
  986. }
  987. #endif /* CONFIG_NATIVE_WINDOWS */
  988. static int tls_match_suffix(X509 *cert, const char *match)
  989. {
  990. #ifdef CONFIG_NATIVE_WINDOWS
  991. /* wincrypt.h has conflicting X509_NAME definition */
  992. return -1;
  993. #else /* CONFIG_NATIVE_WINDOWS */
  994. GENERAL_NAME *gen;
  995. void *ext;
  996. int i;
  997. int dns_name = 0;
  998. X509_NAME *name;
  999. wpa_printf(MSG_DEBUG, "TLS: Match domain against suffix %s", match);
  1000. ext = X509_get_ext_d2i(cert, NID_subject_alt_name, NULL, NULL);
  1001. for (i = 0; ext && i < sk_GENERAL_NAME_num(ext); i++) {
  1002. gen = sk_GENERAL_NAME_value(ext, i);
  1003. if (gen->type != GEN_DNS)
  1004. continue;
  1005. dns_name++;
  1006. wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate dNSName",
  1007. gen->d.dNSName->data,
  1008. gen->d.dNSName->length);
  1009. if (domain_suffix_match(gen->d.dNSName->data,
  1010. gen->d.dNSName->length, match) == 1) {
  1011. wpa_printf(MSG_DEBUG, "TLS: Suffix match in dNSName found");
  1012. return 1;
  1013. }
  1014. }
  1015. if (dns_name) {
  1016. wpa_printf(MSG_DEBUG, "TLS: None of the dNSName(s) matched");
  1017. return 0;
  1018. }
  1019. name = X509_get_subject_name(cert);
  1020. i = -1;
  1021. for (;;) {
  1022. X509_NAME_ENTRY *e;
  1023. ASN1_STRING *cn;
  1024. i = X509_NAME_get_index_by_NID(name, NID_commonName, i);
  1025. if (i == -1)
  1026. break;
  1027. e = X509_NAME_get_entry(name, i);
  1028. if (e == NULL)
  1029. continue;
  1030. cn = X509_NAME_ENTRY_get_data(e);
  1031. if (cn == NULL)
  1032. continue;
  1033. wpa_hexdump_ascii(MSG_DEBUG, "TLS: Certificate commonName",
  1034. cn->data, cn->length);
  1035. if (domain_suffix_match(cn->data, cn->length, match) == 1) {
  1036. wpa_printf(MSG_DEBUG, "TLS: Suffix match in commonName found");
  1037. return 1;
  1038. }
  1039. }
  1040. wpa_printf(MSG_DEBUG, "TLS: No CommonName suffix match found");
  1041. return 0;
  1042. #endif /* CONFIG_NATIVE_WINDOWS */
  1043. }
  1044. static enum tls_fail_reason openssl_tls_fail_reason(int err)
  1045. {
  1046. switch (err) {
  1047. case X509_V_ERR_CERT_REVOKED:
  1048. return TLS_FAIL_REVOKED;
  1049. case X509_V_ERR_CERT_NOT_YET_VALID:
  1050. case X509_V_ERR_CRL_NOT_YET_VALID:
  1051. return TLS_FAIL_NOT_YET_VALID;
  1052. case X509_V_ERR_CERT_HAS_EXPIRED:
  1053. case X509_V_ERR_CRL_HAS_EXPIRED:
  1054. return TLS_FAIL_EXPIRED;
  1055. case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
  1056. case X509_V_ERR_UNABLE_TO_GET_CRL:
  1057. case X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER:
  1058. case X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
  1059. case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY:
  1060. case X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
  1061. case X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE:
  1062. case X509_V_ERR_CERT_CHAIN_TOO_LONG:
  1063. case X509_V_ERR_PATH_LENGTH_EXCEEDED:
  1064. case X509_V_ERR_INVALID_CA:
  1065. return TLS_FAIL_UNTRUSTED;
  1066. case X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE:
  1067. case X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE:
  1068. case X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY:
  1069. case X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD:
  1070. case X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD:
  1071. case X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD:
  1072. case X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD:
  1073. case X509_V_ERR_CERT_UNTRUSTED:
  1074. case X509_V_ERR_CERT_REJECTED:
  1075. return TLS_FAIL_BAD_CERTIFICATE;
  1076. default:
  1077. return TLS_FAIL_UNSPECIFIED;
  1078. }
  1079. }
  1080. static struct wpabuf * get_x509_cert(X509 *cert)
  1081. {
  1082. struct wpabuf *buf;
  1083. u8 *tmp;
  1084. int cert_len = i2d_X509(cert, NULL);
  1085. if (cert_len <= 0)
  1086. return NULL;
  1087. buf = wpabuf_alloc(cert_len);
  1088. if (buf == NULL)
  1089. return NULL;
  1090. tmp = wpabuf_put(buf, cert_len);
  1091. i2d_X509(cert, &tmp);
  1092. return buf;
  1093. }
  1094. static void openssl_tls_fail_event(struct tls_connection *conn,
  1095. X509 *err_cert, int err, int depth,
  1096. const char *subject, const char *err_str,
  1097. enum tls_fail_reason reason)
  1098. {
  1099. union tls_event_data ev;
  1100. struct wpabuf *cert = NULL;
  1101. struct tls_context *context = conn->context;
  1102. if (context->event_cb == NULL)
  1103. return;
  1104. cert = get_x509_cert(err_cert);
  1105. os_memset(&ev, 0, sizeof(ev));
  1106. ev.cert_fail.reason = reason != TLS_FAIL_UNSPECIFIED ?
  1107. reason : openssl_tls_fail_reason(err);
  1108. ev.cert_fail.depth = depth;
  1109. ev.cert_fail.subject = subject;
  1110. ev.cert_fail.reason_txt = err_str;
  1111. ev.cert_fail.cert = cert;
  1112. context->event_cb(context->cb_ctx, TLS_CERT_CHAIN_FAILURE, &ev);
  1113. wpabuf_free(cert);
  1114. }
  1115. static void openssl_tls_cert_event(struct tls_connection *conn,
  1116. X509 *err_cert, int depth,
  1117. const char *subject)
  1118. {
  1119. struct wpabuf *cert = NULL;
  1120. union tls_event_data ev;
  1121. struct tls_context *context = conn->context;
  1122. #ifdef CONFIG_SHA256
  1123. u8 hash[32];
  1124. #endif /* CONFIG_SHA256 */
  1125. if (context->event_cb == NULL)
  1126. return;
  1127. os_memset(&ev, 0, sizeof(ev));
  1128. if (conn->cert_probe || context->cert_in_cb) {
  1129. cert = get_x509_cert(err_cert);
  1130. ev.peer_cert.cert = cert;
  1131. }
  1132. #ifdef CONFIG_SHA256
  1133. if (cert) {
  1134. const u8 *addr[1];
  1135. size_t len[1];
  1136. addr[0] = wpabuf_head(cert);
  1137. len[0] = wpabuf_len(cert);
  1138. if (sha256_vector(1, addr, len, hash) == 0) {
  1139. ev.peer_cert.hash = hash;
  1140. ev.peer_cert.hash_len = sizeof(hash);
  1141. }
  1142. }
  1143. #endif /* CONFIG_SHA256 */
  1144. ev.peer_cert.depth = depth;
  1145. ev.peer_cert.subject = subject;
  1146. context->event_cb(context->cb_ctx, TLS_PEER_CERTIFICATE, &ev);
  1147. wpabuf_free(cert);
  1148. }
  1149. static int tls_verify_cb(int preverify_ok, X509_STORE_CTX *x509_ctx)
  1150. {
  1151. char buf[256];
  1152. X509 *err_cert;
  1153. int err, depth;
  1154. SSL *ssl;
  1155. struct tls_connection *conn;
  1156. struct tls_context *context;
  1157. char *match, *altmatch, *suffix_match;
  1158. const char *err_str;
  1159. err_cert = X509_STORE_CTX_get_current_cert(x509_ctx);
  1160. err = X509_STORE_CTX_get_error(x509_ctx);
  1161. depth = X509_STORE_CTX_get_error_depth(x509_ctx);
  1162. ssl = X509_STORE_CTX_get_ex_data(x509_ctx,
  1163. SSL_get_ex_data_X509_STORE_CTX_idx());
  1164. X509_NAME_oneline(X509_get_subject_name(err_cert), buf, sizeof(buf));
  1165. conn = SSL_get_app_data(ssl);
  1166. if (conn == NULL)
  1167. return 0;
  1168. if (depth == 0)
  1169. conn->peer_cert = err_cert;
  1170. else if (depth == 1)
  1171. conn->peer_issuer = err_cert;
  1172. else if (depth == 2)
  1173. conn->peer_issuer_issuer = err_cert;
  1174. context = conn->context;
  1175. match = conn->subject_match;
  1176. altmatch = conn->altsubject_match;
  1177. suffix_match = conn->suffix_match;
  1178. if (!preverify_ok && !conn->ca_cert_verify)
  1179. preverify_ok = 1;
  1180. if (!preverify_ok && depth > 0 && conn->server_cert_only)
  1181. preverify_ok = 1;
  1182. if (!preverify_ok && (conn->flags & TLS_CONN_DISABLE_TIME_CHECKS) &&
  1183. (err == X509_V_ERR_CERT_HAS_EXPIRED ||
  1184. err == X509_V_ERR_CERT_NOT_YET_VALID)) {
  1185. wpa_printf(MSG_DEBUG, "OpenSSL: Ignore certificate validity "
  1186. "time mismatch");
  1187. preverify_ok = 1;
  1188. }
  1189. err_str = X509_verify_cert_error_string(err);
  1190. #ifdef CONFIG_SHA256
  1191. if (preverify_ok && depth == 0 && conn->server_cert_only) {
  1192. struct wpabuf *cert;
  1193. cert = get_x509_cert(err_cert);
  1194. if (!cert) {
  1195. wpa_printf(MSG_DEBUG, "OpenSSL: Could not fetch "
  1196. "server certificate data");
  1197. preverify_ok = 0;
  1198. } else {
  1199. u8 hash[32];
  1200. const u8 *addr[1];
  1201. size_t len[1];
  1202. addr[0] = wpabuf_head(cert);
  1203. len[0] = wpabuf_len(cert);
  1204. if (sha256_vector(1, addr, len, hash) < 0 ||
  1205. os_memcmp(conn->srv_cert_hash, hash, 32) != 0) {
  1206. err_str = "Server certificate mismatch";
  1207. err = X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN;
  1208. preverify_ok = 0;
  1209. }
  1210. wpabuf_free(cert);
  1211. }
  1212. }
  1213. #endif /* CONFIG_SHA256 */
  1214. if (!preverify_ok) {
  1215. wpa_printf(MSG_WARNING, "TLS: Certificate verification failed,"
  1216. " error %d (%s) depth %d for '%s'", err, err_str,
  1217. depth, buf);
  1218. openssl_tls_fail_event(conn, err_cert, err, depth, buf,
  1219. err_str, TLS_FAIL_UNSPECIFIED);
  1220. return preverify_ok;
  1221. }
  1222. wpa_printf(MSG_DEBUG, "TLS: tls_verify_cb - preverify_ok=%d "
  1223. "err=%d (%s) ca_cert_verify=%d depth=%d buf='%s'",
  1224. preverify_ok, err, err_str,
  1225. conn->ca_cert_verify, depth, buf);
  1226. if (depth == 0 && match && os_strstr(buf, match) == NULL) {
  1227. wpa_printf(MSG_WARNING, "TLS: Subject '%s' did not "
  1228. "match with '%s'", buf, match);
  1229. preverify_ok = 0;
  1230. openssl_tls_fail_event(conn, err_cert, err, depth, buf,
  1231. "Subject mismatch",
  1232. TLS_FAIL_SUBJECT_MISMATCH);
  1233. } else if (depth == 0 && altmatch &&
  1234. !tls_match_altsubject(err_cert, altmatch)) {
  1235. wpa_printf(MSG_WARNING, "TLS: altSubjectName match "
  1236. "'%s' not found", altmatch);
  1237. preverify_ok = 0;
  1238. openssl_tls_fail_event(conn, err_cert, err, depth, buf,
  1239. "AltSubject mismatch",
  1240. TLS_FAIL_ALTSUBJECT_MISMATCH);
  1241. } else if (depth == 0 && suffix_match &&
  1242. !tls_match_suffix(err_cert, suffix_match)) {
  1243. wpa_printf(MSG_WARNING, "TLS: Domain suffix match '%s' not found",
  1244. suffix_match);
  1245. preverify_ok = 0;
  1246. openssl_tls_fail_event(conn, err_cert, err, depth, buf,
  1247. "Domain suffix mismatch",
  1248. TLS_FAIL_DOMAIN_SUFFIX_MISMATCH);
  1249. } else
  1250. openssl_tls_cert_event(conn, err_cert, depth, buf);
  1251. if (conn->cert_probe && preverify_ok && depth == 0) {
  1252. wpa_printf(MSG_DEBUG, "OpenSSL: Reject server certificate "
  1253. "on probe-only run");
  1254. preverify_ok = 0;
  1255. openssl_tls_fail_event(conn, err_cert, err, depth, buf,
  1256. "Server certificate chain probe",
  1257. TLS_FAIL_SERVER_CHAIN_PROBE);
  1258. }
  1259. if (preverify_ok && context->event_cb != NULL)
  1260. context->event_cb(context->cb_ctx,
  1261. TLS_CERT_CHAIN_SUCCESS, NULL);
  1262. return preverify_ok;
  1263. }
  1264. #ifndef OPENSSL_NO_STDIO
  1265. static int tls_load_ca_der(void *_ssl_ctx, const char *ca_cert)
  1266. {
  1267. SSL_CTX *ssl_ctx = _ssl_ctx;
  1268. X509_LOOKUP *lookup;
  1269. int ret = 0;
  1270. lookup = X509_STORE_add_lookup(ssl_ctx->cert_store,
  1271. X509_LOOKUP_file());
  1272. if (lookup == NULL) {
  1273. tls_show_errors(MSG_WARNING, __func__,
  1274. "Failed add lookup for X509 store");
  1275. return -1;
  1276. }
  1277. if (!X509_LOOKUP_load_file(lookup, ca_cert, X509_FILETYPE_ASN1)) {
  1278. unsigned long err = ERR_peek_error();
  1279. tls_show_errors(MSG_WARNING, __func__,
  1280. "Failed load CA in DER format");
  1281. if (ERR_GET_LIB(err) == ERR_LIB_X509 &&
  1282. ERR_GET_REASON(err) == X509_R_CERT_ALREADY_IN_HASH_TABLE) {
  1283. wpa_printf(MSG_DEBUG, "OpenSSL: %s - ignoring "
  1284. "cert already in hash table error",
  1285. __func__);
  1286. } else
  1287. ret = -1;
  1288. }
  1289. return ret;
  1290. }
  1291. #endif /* OPENSSL_NO_STDIO */
  1292. static int tls_connection_ca_cert(void *_ssl_ctx, struct tls_connection *conn,
  1293. const char *ca_cert, const u8 *ca_cert_blob,
  1294. size_t ca_cert_blob_len, const char *ca_path)
  1295. {
  1296. SSL_CTX *ssl_ctx = _ssl_ctx;
  1297. /*
  1298. * Remove previously configured trusted CA certificates before adding
  1299. * new ones.
  1300. */
  1301. X509_STORE_free(ssl_ctx->cert_store);
  1302. ssl_ctx->cert_store = X509_STORE_new();
  1303. if (ssl_ctx->cert_store == NULL) {
  1304. wpa_printf(MSG_DEBUG, "OpenSSL: %s - failed to allocate new "
  1305. "certificate store", __func__);
  1306. return -1;
  1307. }
  1308. SSL_set_verify(conn->ssl, SSL_VERIFY_PEER, tls_verify_cb);
  1309. conn->ca_cert_verify = 1;
  1310. if (ca_cert && os_strncmp(ca_cert, "probe://", 8) == 0) {
  1311. wpa_printf(MSG_DEBUG, "OpenSSL: Probe for server certificate "
  1312. "chain");
  1313. conn->cert_probe = 1;
  1314. conn->ca_cert_verify = 0;
  1315. return 0;
  1316. }
  1317. if (ca_cert && os_strncmp(ca_cert, "hash://", 7) == 0) {
  1318. #ifdef CONFIG_SHA256
  1319. const char *pos = ca_cert + 7;
  1320. if (os_strncmp(pos, "server/sha256/", 14) != 0) {
  1321. wpa_printf(MSG_DEBUG, "OpenSSL: Unsupported ca_cert "
  1322. "hash value '%s'", ca_cert);
  1323. return -1;
  1324. }
  1325. pos += 14;
  1326. if (os_strlen(pos) != 32 * 2) {
  1327. wpa_printf(MSG_DEBUG, "OpenSSL: Unexpected SHA256 "
  1328. "hash length in ca_cert '%s'", ca_cert);
  1329. return -1;
  1330. }
  1331. if (hexstr2bin(pos, conn->srv_cert_hash, 32) < 0) {
  1332. wpa_printf(MSG_DEBUG, "OpenSSL: Invalid SHA256 hash "
  1333. "value in ca_cert '%s'", ca_cert);
  1334. return -1;
  1335. }
  1336. conn->server_cert_only = 1;
  1337. wpa_printf(MSG_DEBUG, "OpenSSL: Checking only server "
  1338. "certificate match");
  1339. return 0;
  1340. #else /* CONFIG_SHA256 */
  1341. wpa_printf(MSG_INFO, "No SHA256 included in the build - "
  1342. "cannot validate server certificate hash");
  1343. return -1;
  1344. #endif /* CONFIG_SHA256 */
  1345. }
  1346. if (ca_cert_blob) {
  1347. X509 *cert = d2i_X509(NULL, (OPENSSL_d2i_TYPE) &ca_cert_blob,
  1348. ca_cert_blob_len);
  1349. if (cert == NULL) {
  1350. tls_show_errors(MSG_WARNING, __func__,
  1351. "Failed to parse ca_cert_blob");
  1352. return -1;
  1353. }
  1354. if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {
  1355. unsigned long err = ERR_peek_error();
  1356. tls_show_errors(MSG_WARNING, __func__,
  1357. "Failed to add ca_cert_blob to "
  1358. "certificate store");
  1359. if (ERR_GET_LIB(err) == ERR_LIB_X509 &&
  1360. ERR_GET_REASON(err) ==
  1361. X509_R_CERT_ALREADY_IN_HASH_TABLE) {
  1362. wpa_printf(MSG_DEBUG, "OpenSSL: %s - ignoring "
  1363. "cert already in hash table error",
  1364. __func__);
  1365. } else {
  1366. X509_free(cert);
  1367. return -1;
  1368. }
  1369. }
  1370. X509_free(cert);
  1371. wpa_printf(MSG_DEBUG, "OpenSSL: %s - added ca_cert_blob "
  1372. "to certificate store", __func__);
  1373. return 0;
  1374. }
  1375. #ifdef ANDROID
  1376. if (ca_cert && os_strncmp("keystore://", ca_cert, 11) == 0) {
  1377. BIO *bio = BIO_from_keystore(&ca_cert[11]);
  1378. STACK_OF(X509_INFO) *stack = NULL;
  1379. int i;
  1380. if (bio) {
  1381. stack = PEM_X509_INFO_read_bio(bio, NULL, NULL, NULL);
  1382. BIO_free(bio);
  1383. }
  1384. if (!stack)
  1385. return -1;
  1386. for (i = 0; i < sk_X509_INFO_num(stack); ++i) {
  1387. X509_INFO *info = sk_X509_INFO_value(stack, i);
  1388. if (info->x509) {
  1389. X509_STORE_add_cert(ssl_ctx->cert_store,
  1390. info->x509);
  1391. }
  1392. if (info->crl) {
  1393. X509_STORE_add_crl(ssl_ctx->cert_store,
  1394. info->crl);
  1395. }
  1396. }
  1397. sk_X509_INFO_pop_free(stack, X509_INFO_free);
  1398. SSL_set_verify(conn->ssl, SSL_VERIFY_PEER, tls_verify_cb);
  1399. return 0;
  1400. }
  1401. #endif /* ANDROID */
  1402. #ifdef CONFIG_NATIVE_WINDOWS
  1403. if (ca_cert && tls_cryptoapi_ca_cert(ssl_ctx, conn->ssl, ca_cert) ==
  1404. 0) {
  1405. wpa_printf(MSG_DEBUG, "OpenSSL: Added CA certificates from "
  1406. "system certificate store");
  1407. return 0;
  1408. }
  1409. #endif /* CONFIG_NATIVE_WINDOWS */
  1410. if (ca_cert || ca_path) {
  1411. #ifndef OPENSSL_NO_STDIO
  1412. if (SSL_CTX_load_verify_locations(ssl_ctx, ca_cert, ca_path) !=
  1413. 1) {
  1414. tls_show_errors(MSG_WARNING, __func__,
  1415. "Failed to load root certificates");
  1416. if (ca_cert &&
  1417. tls_load_ca_der(ssl_ctx, ca_cert) == 0) {
  1418. wpa_printf(MSG_DEBUG, "OpenSSL: %s - loaded "
  1419. "DER format CA certificate",
  1420. __func__);
  1421. } else
  1422. return -1;
  1423. } else {
  1424. wpa_printf(MSG_DEBUG, "TLS: Trusted root "
  1425. "certificate(s) loaded");
  1426. tls_get_errors(ssl_ctx);
  1427. }
  1428. #else /* OPENSSL_NO_STDIO */
  1429. wpa_printf(MSG_DEBUG, "OpenSSL: %s - OPENSSL_NO_STDIO",
  1430. __func__);
  1431. return -1;
  1432. #endif /* OPENSSL_NO_STDIO */
  1433. } else {
  1434. /* No ca_cert configured - do not try to verify server
  1435. * certificate */
  1436. conn->ca_cert_verify = 0;
  1437. }
  1438. return 0;
  1439. }
  1440. static int tls_global_ca_cert(SSL_CTX *ssl_ctx, const char *ca_cert)
  1441. {
  1442. if (ca_cert) {
  1443. if (SSL_CTX_load_verify_locations(ssl_ctx, ca_cert, NULL) != 1)
  1444. {
  1445. tls_show_errors(MSG_WARNING, __func__,
  1446. "Failed to load root certificates");
  1447. return -1;
  1448. }
  1449. wpa_printf(MSG_DEBUG, "TLS: Trusted root "
  1450. "certificate(s) loaded");
  1451. #ifndef OPENSSL_NO_STDIO
  1452. /* Add the same CAs to the client certificate requests */
  1453. SSL_CTX_set_client_CA_list(ssl_ctx,
  1454. SSL_load_client_CA_file(ca_cert));
  1455. #endif /* OPENSSL_NO_STDIO */
  1456. }
  1457. return 0;
  1458. }
  1459. int tls_global_set_verify(void *ssl_ctx, int check_crl)
  1460. {
  1461. int flags;
  1462. if (check_crl) {
  1463. X509_STORE *cs = SSL_CTX_get_cert_store(ssl_ctx);
  1464. if (cs == NULL) {
  1465. tls_show_errors(MSG_INFO, __func__, "Failed to get "
  1466. "certificate store when enabling "
  1467. "check_crl");
  1468. return -1;
  1469. }
  1470. flags = X509_V_FLAG_CRL_CHECK;
  1471. if (check_crl == 2)
  1472. flags |= X509_V_FLAG_CRL_CHECK_ALL;
  1473. X509_STORE_set_flags(cs, flags);
  1474. }
  1475. return 0;
  1476. }
  1477. static int tls_connection_set_subject_match(struct tls_connection *conn,
  1478. const char *subject_match,
  1479. const char *altsubject_match,
  1480. const char *suffix_match)
  1481. {
  1482. os_free(conn->subject_match);
  1483. conn->subject_match = NULL;
  1484. if (subject_match) {
  1485. conn->subject_match = os_strdup(subject_match);
  1486. if (conn->subject_match == NULL)
  1487. return -1;
  1488. }
  1489. os_free(conn->altsubject_match);
  1490. conn->altsubject_match = NULL;
  1491. if (altsubject_match) {
  1492. conn->altsubject_match = os_strdup(altsubject_match);
  1493. if (conn->altsubject_match == NULL)
  1494. return -1;
  1495. }
  1496. os_free(conn->suffix_match);
  1497. conn->suffix_match = NULL;
  1498. if (suffix_match) {
  1499. conn->suffix_match = os_strdup(suffix_match);
  1500. if (conn->suffix_match == NULL)
  1501. return -1;
  1502. }
  1503. return 0;
  1504. }
  1505. int tls_connection_set_verify(void *ssl_ctx, struct tls_connection *conn,
  1506. int verify_peer)
  1507. {
  1508. static int counter = 0;
  1509. if (conn == NULL)
  1510. return -1;
  1511. if (verify_peer) {
  1512. conn->ca_cert_verify = 1;
  1513. SSL_set_verify(conn->ssl, SSL_VERIFY_PEER |
  1514. SSL_VERIFY_FAIL_IF_NO_PEER_CERT |
  1515. SSL_VERIFY_CLIENT_ONCE, tls_verify_cb);
  1516. } else {
  1517. conn->ca_cert_verify = 0;
  1518. SSL_set_verify(conn->ssl, SSL_VERIFY_NONE, NULL);
  1519. }
  1520. SSL_set_accept_state(conn->ssl);
  1521. /*
  1522. * Set session id context in order to avoid fatal errors when client
  1523. * tries to resume a session. However, set the context to a unique
  1524. * value in order to effectively disable session resumption for now
  1525. * since not all areas of the server code are ready for it (e.g.,
  1526. * EAP-TTLS needs special handling for Phase 2 after abbreviated TLS
  1527. * handshake).
  1528. */
  1529. counter++;
  1530. SSL_set_session_id_context(conn->ssl,
  1531. (const unsigned char *) &counter,
  1532. sizeof(counter));
  1533. return 0;
  1534. }
  1535. static int tls_connection_client_cert(struct tls_connection *conn,
  1536. const char *client_cert,
  1537. const u8 *client_cert_blob,
  1538. size_t client_cert_blob_len)
  1539. {
  1540. if (client_cert == NULL && client_cert_blob == NULL)
  1541. return 0;
  1542. if (client_cert_blob &&
  1543. SSL_use_certificate_ASN1(conn->ssl, (u8 *) client_cert_blob,
  1544. client_cert_blob_len) == 1) {
  1545. wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_certificate_ASN1 --> "
  1546. "OK");
  1547. return 0;
  1548. } else if (client_cert_blob) {
  1549. tls_show_errors(MSG_DEBUG, __func__,
  1550. "SSL_use_certificate_ASN1 failed");
  1551. }
  1552. if (client_cert == NULL)
  1553. return -1;
  1554. #ifdef ANDROID
  1555. if (os_strncmp("keystore://", client_cert, 11) == 0) {
  1556. BIO *bio = BIO_from_keystore(&client_cert[11]);
  1557. X509 *x509 = NULL;
  1558. int ret = -1;
  1559. if (bio) {
  1560. x509 = PEM_read_bio_X509(bio, NULL, NULL, NULL);
  1561. BIO_free(bio);
  1562. }
  1563. if (x509) {
  1564. if (SSL_use_certificate(conn->ssl, x509) == 1)
  1565. ret = 0;
  1566. X509_free(x509);
  1567. }
  1568. return ret;
  1569. }
  1570. #endif /* ANDROID */
  1571. #ifndef OPENSSL_NO_STDIO
  1572. if (SSL_use_certificate_file(conn->ssl, client_cert,
  1573. SSL_FILETYPE_ASN1) == 1) {
  1574. wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_certificate_file (DER)"
  1575. " --> OK");
  1576. return 0;
  1577. }
  1578. if (SSL_use_certificate_file(conn->ssl, client_cert,
  1579. SSL_FILETYPE_PEM) == 1) {
  1580. ERR_clear_error();
  1581. wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_certificate_file (PEM)"
  1582. " --> OK");
  1583. return 0;
  1584. }
  1585. tls_show_errors(MSG_DEBUG, __func__,
  1586. "SSL_use_certificate_file failed");
  1587. #else /* OPENSSL_NO_STDIO */
  1588. wpa_printf(MSG_DEBUG, "OpenSSL: %s - OPENSSL_NO_STDIO", __func__);
  1589. #endif /* OPENSSL_NO_STDIO */
  1590. return -1;
  1591. }
  1592. static int tls_global_client_cert(SSL_CTX *ssl_ctx, const char *client_cert)
  1593. {
  1594. #ifndef OPENSSL_NO_STDIO
  1595. if (client_cert == NULL)
  1596. return 0;
  1597. if (SSL_CTX_use_certificate_file(ssl_ctx, client_cert,
  1598. SSL_FILETYPE_ASN1) != 1 &&
  1599. SSL_CTX_use_certificate_chain_file(ssl_ctx, client_cert) != 1 &&
  1600. SSL_CTX_use_certificate_file(ssl_ctx, client_cert,
  1601. SSL_FILETYPE_PEM) != 1) {
  1602. tls_show_errors(MSG_INFO, __func__,
  1603. "Failed to load client certificate");
  1604. return -1;
  1605. }
  1606. return 0;
  1607. #else /* OPENSSL_NO_STDIO */
  1608. if (client_cert == NULL)
  1609. return 0;
  1610. wpa_printf(MSG_DEBUG, "OpenSSL: %s - OPENSSL_NO_STDIO", __func__);
  1611. return -1;
  1612. #endif /* OPENSSL_NO_STDIO */
  1613. }
  1614. static int tls_passwd_cb(char *buf, int size, int rwflag, void *password)
  1615. {
  1616. if (password == NULL) {
  1617. return 0;
  1618. }
  1619. os_strlcpy(buf, (char *) password, size);
  1620. return os_strlen(buf);
  1621. }
  1622. #ifdef PKCS12_FUNCS
  1623. static int tls_parse_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, PKCS12 *p12,
  1624. const char *passwd)
  1625. {
  1626. EVP_PKEY *pkey;
  1627. X509 *cert;
  1628. STACK_OF(X509) *certs;
  1629. int res = 0;
  1630. char buf[256];
  1631. pkey = NULL;
  1632. cert = NULL;
  1633. certs = NULL;
  1634. if (!PKCS12_parse(p12, passwd, &pkey, &cert, &certs)) {
  1635. tls_show_errors(MSG_DEBUG, __func__,
  1636. "Failed to parse PKCS12 file");
  1637. PKCS12_free(p12);
  1638. return -1;
  1639. }
  1640. wpa_printf(MSG_DEBUG, "TLS: Successfully parsed PKCS12 data");
  1641. if (cert) {
  1642. X509_NAME_oneline(X509_get_subject_name(cert), buf,
  1643. sizeof(buf));
  1644. wpa_printf(MSG_DEBUG, "TLS: Got certificate from PKCS12: "
  1645. "subject='%s'", buf);
  1646. if (ssl) {
  1647. if (SSL_use_certificate(ssl, cert) != 1)
  1648. res = -1;
  1649. } else {
  1650. if (SSL_CTX_use_certificate(ssl_ctx, cert) != 1)
  1651. res = -1;
  1652. }
  1653. X509_free(cert);
  1654. }
  1655. if (pkey) {
  1656. wpa_printf(MSG_DEBUG, "TLS: Got private key from PKCS12");
  1657. if (ssl) {
  1658. if (SSL_use_PrivateKey(ssl, pkey) != 1)
  1659. res = -1;
  1660. } else {
  1661. if (SSL_CTX_use_PrivateKey(ssl_ctx, pkey) != 1)
  1662. res = -1;
  1663. }
  1664. EVP_PKEY_free(pkey);
  1665. }
  1666. if (certs) {
  1667. while ((cert = sk_X509_pop(certs)) != NULL) {
  1668. X509_NAME_oneline(X509_get_subject_name(cert), buf,
  1669. sizeof(buf));
  1670. wpa_printf(MSG_DEBUG, "TLS: additional certificate"
  1671. " from PKCS12: subject='%s'", buf);
  1672. /*
  1673. * There is no SSL equivalent for the chain cert - so
  1674. * always add it to the context...
  1675. */
  1676. if (SSL_CTX_add_extra_chain_cert(ssl_ctx, cert) != 1) {
  1677. res = -1;
  1678. break;
  1679. }
  1680. }
  1681. sk_X509_free(certs);
  1682. }
  1683. PKCS12_free(p12);
  1684. if (res < 0)
  1685. tls_get_errors(ssl_ctx);
  1686. return res;
  1687. }
  1688. #endif /* PKCS12_FUNCS */
  1689. static int tls_read_pkcs12(SSL_CTX *ssl_ctx, SSL *ssl, const char *private_key,
  1690. const char *passwd)
  1691. {
  1692. #ifdef PKCS12_FUNCS
  1693. FILE *f;
  1694. PKCS12 *p12;
  1695. f = fopen(private_key, "rb");
  1696. if (f == NULL)
  1697. return -1;
  1698. p12 = d2i_PKCS12_fp(f, NULL);
  1699. fclose(f);
  1700. if (p12 == NULL) {
  1701. tls_show_errors(MSG_INFO, __func__,
  1702. "Failed to use PKCS#12 file");
  1703. return -1;
  1704. }
  1705. return tls_parse_pkcs12(ssl_ctx, ssl, p12, passwd);
  1706. #else /* PKCS12_FUNCS */
  1707. wpa_printf(MSG_INFO, "TLS: PKCS12 support disabled - cannot read "
  1708. "p12/pfx files");
  1709. return -1;
  1710. #endif /* PKCS12_FUNCS */
  1711. }
  1712. static int tls_read_pkcs12_blob(SSL_CTX *ssl_ctx, SSL *ssl,
  1713. const u8 *blob, size_t len, const char *passwd)
  1714. {
  1715. #ifdef PKCS12_FUNCS
  1716. PKCS12 *p12;
  1717. p12 = d2i_PKCS12(NULL, (OPENSSL_d2i_TYPE) &blob, len);
  1718. if (p12 == NULL) {
  1719. tls_show_errors(MSG_INFO, __func__,
  1720. "Failed to use PKCS#12 blob");
  1721. return -1;
  1722. }
  1723. return tls_parse_pkcs12(ssl_ctx, ssl, p12, passwd);
  1724. #else /* PKCS12_FUNCS */
  1725. wpa_printf(MSG_INFO, "TLS: PKCS12 support disabled - cannot parse "
  1726. "p12/pfx blobs");
  1727. return -1;
  1728. #endif /* PKCS12_FUNCS */
  1729. }
  1730. #ifndef OPENSSL_NO_ENGINE
  1731. static int tls_engine_get_cert(struct tls_connection *conn,
  1732. const char *cert_id,
  1733. X509 **cert)
  1734. {
  1735. /* this runs after the private key is loaded so no PIN is required */
  1736. struct {
  1737. const char *cert_id;
  1738. X509 *cert;
  1739. } params;
  1740. params.cert_id = cert_id;
  1741. params.cert = NULL;
  1742. if (!ENGINE_ctrl_cmd(conn->engine, "LOAD_CERT_CTRL",
  1743. 0, &params, NULL, 1)) {
  1744. wpa_printf(MSG_ERROR, "ENGINE: cannot load client cert with id"
  1745. " '%s' [%s]", cert_id,
  1746. ERR_error_string(ERR_get_error(), NULL));
  1747. return TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED;
  1748. }
  1749. if (!params.cert) {
  1750. wpa_printf(MSG_ERROR, "ENGINE: did not properly cert with id"
  1751. " '%s'", cert_id);
  1752. return TLS_SET_PARAMS_ENGINE_PRV_INIT_FAILED;
  1753. }
  1754. *cert = params.cert;
  1755. return 0;
  1756. }
  1757. #endif /* OPENSSL_NO_ENGINE */
  1758. static int tls_connection_engine_client_cert(struct tls_connection *conn,
  1759. const char *cert_id)
  1760. {
  1761. #ifndef OPENSSL_NO_ENGINE
  1762. X509 *cert;
  1763. if (tls_engine_get_cert(conn, cert_id, &cert))
  1764. return -1;
  1765. if (!SSL_use_certificate(conn->ssl, cert)) {
  1766. tls_show_errors(MSG_ERROR, __func__,
  1767. "SSL_use_certificate failed");
  1768. X509_free(cert);
  1769. return -1;
  1770. }
  1771. X509_free(cert);
  1772. wpa_printf(MSG_DEBUG, "ENGINE: SSL_use_certificate --> "
  1773. "OK");
  1774. return 0;
  1775. #else /* OPENSSL_NO_ENGINE */
  1776. return -1;
  1777. #endif /* OPENSSL_NO_ENGINE */
  1778. }
  1779. static int tls_connection_engine_ca_cert(void *_ssl_ctx,
  1780. struct tls_connection *conn,
  1781. const char *ca_cert_id)
  1782. {
  1783. #ifndef OPENSSL_NO_ENGINE
  1784. X509 *cert;
  1785. SSL_CTX *ssl_ctx = _ssl_ctx;
  1786. if (tls_engine_get_cert(conn, ca_cert_id, &cert))
  1787. return -1;
  1788. /* start off the same as tls_connection_ca_cert */
  1789. X509_STORE_free(ssl_ctx->cert_store);
  1790. ssl_ctx->cert_store = X509_STORE_new();
  1791. if (ssl_ctx->cert_store == NULL) {
  1792. wpa_printf(MSG_DEBUG, "OpenSSL: %s - failed to allocate new "
  1793. "certificate store", __func__);
  1794. X509_free(cert);
  1795. return -1;
  1796. }
  1797. if (!X509_STORE_add_cert(ssl_ctx->cert_store, cert)) {
  1798. unsigned long err = ERR_peek_error();
  1799. tls_show_errors(MSG_WARNING, __func__,
  1800. "Failed to add CA certificate from engine "
  1801. "to certificate store");
  1802. if (ERR_GET_LIB(err) == ERR_LIB_X509 &&
  1803. ERR_GET_REASON(err) == X509_R_CERT_ALREADY_IN_HASH_TABLE) {
  1804. wpa_printf(MSG_DEBUG, "OpenSSL: %s - ignoring cert"
  1805. " already in hash table error",
  1806. __func__);
  1807. } else {
  1808. X509_free(cert);
  1809. return -1;
  1810. }
  1811. }
  1812. X509_free(cert);
  1813. wpa_printf(MSG_DEBUG, "OpenSSL: %s - added CA certificate from engine "
  1814. "to certificate store", __func__);
  1815. SSL_set_verify(conn->ssl, SSL_VERIFY_PEER, tls_verify_cb);
  1816. conn->ca_cert_verify = 1;
  1817. return 0;
  1818. #else /* OPENSSL_NO_ENGINE */
  1819. return -1;
  1820. #endif /* OPENSSL_NO_ENGINE */
  1821. }
  1822. static int tls_connection_engine_private_key(struct tls_connection *conn)
  1823. {
  1824. #ifndef OPENSSL_NO_ENGINE
  1825. if (SSL_use_PrivateKey(conn->ssl, conn->private_key) != 1) {
  1826. tls_show_errors(MSG_ERROR, __func__,
  1827. "ENGINE: cannot use private key for TLS");
  1828. return -1;
  1829. }
  1830. if (!SSL_check_private_key(conn->ssl)) {
  1831. tls_show_errors(MSG_INFO, __func__,
  1832. "Private key failed verification");
  1833. return -1;
  1834. }
  1835. return 0;
  1836. #else /* OPENSSL_NO_ENGINE */
  1837. wpa_printf(MSG_ERROR, "SSL: Configuration uses engine, but "
  1838. "engine support was not compiled in");
  1839. return -1;
  1840. #endif /* OPENSSL_NO_ENGINE */
  1841. }
  1842. static int tls_connection_private_key(void *_ssl_ctx,
  1843. struct tls_connection *conn,
  1844. const char *private_key,
  1845. const char *private_key_passwd,
  1846. const u8 *private_key_blob,
  1847. size_t private_key_blob_len)
  1848. {
  1849. SSL_CTX *ssl_ctx = _ssl_ctx;
  1850. char *passwd;
  1851. int ok;
  1852. if (private_key == NULL && private_key_blob == NULL)
  1853. return 0;
  1854. if (private_key_passwd) {
  1855. passwd = os_strdup(private_key_passwd);
  1856. if (passwd == NULL)
  1857. return -1;
  1858. } else
  1859. passwd = NULL;
  1860. SSL_CTX_set_default_passwd_cb(ssl_ctx, tls_passwd_cb);
  1861. SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, passwd);
  1862. ok = 0;
  1863. while (private_key_blob) {
  1864. if (SSL_use_PrivateKey_ASN1(EVP_PKEY_RSA, conn->ssl,
  1865. (u8 *) private_key_blob,
  1866. private_key_blob_len) == 1) {
  1867. wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_PrivateKey_"
  1868. "ASN1(EVP_PKEY_RSA) --> OK");
  1869. ok = 1;
  1870. break;
  1871. }
  1872. if (SSL_use_PrivateKey_ASN1(EVP_PKEY_DSA, conn->ssl,
  1873. (u8 *) private_key_blob,
  1874. private_key_blob_len) == 1) {
  1875. wpa_printf(MSG_DEBUG, "OpenSSL: SSL_use_PrivateKey_"
  1876. "ASN1(EVP_PKEY_DSA) --> OK");
  1877. ok = 1;
  1878. break;
  1879. }
  1880. if (SSL_use_RSAPrivateKey_ASN1(conn->ssl,
  1881. (u8 *) private_key_blob,
  1882. private_key_blob_len) == 1) {
  1883. wpa_printf(MSG_DEBUG, "OpenSSL: "
  1884. "SSL_use_RSAPrivateKey_ASN1 --> OK");
  1885. ok = 1;
  1886. break;
  1887. }
  1888. if (tls_read_pkcs12_blob(ssl_ctx, conn->ssl, private_key_blob,
  1889. private_key_blob_len, passwd) == 0) {
  1890. wpa_printf(MSG_DEBUG, "OpenSSL: PKCS#12 as blob --> "
  1891. "OK");
  1892. ok = 1;
  1893. break;
  1894. }
  1895. break;
  1896. }
  1897. while (!ok && private_key) {
  1898. #ifndef OPENSSL_NO_STDIO
  1899. if (SSL_use_PrivateKey_file(conn->ssl, private_key,
  1900. SSL_FILETYPE_ASN1) == 1) {
  1901. wpa_printf(MSG_DEBUG, "OpenSSL: "
  1902. "SSL_use_PrivateKey_File (DER) --> OK");
  1903. ok = 1;
  1904. break;
  1905. }
  1906. if (SSL_use_PrivateKey_file(conn->ssl, private_key,
  1907. SSL_FILETYPE_PEM) == 1) {
  1908. wpa_printf(MSG_DEBUG, "OpenSSL: "
  1909. "SSL_use_PrivateKey_File (PEM) --> OK");
  1910. ok = 1;
  1911. break;
  1912. }
  1913. #else /* OPENSSL_NO_STDIO */
  1914. wpa_printf(MSG_DEBUG, "OpenSSL: %s - OPENSSL_NO_STDIO",
  1915. __func__);
  1916. #endif /* OPENSSL_NO_STDIO */
  1917. if (tls_read_pkcs12(ssl_ctx, conn->ssl, private_key, passwd)
  1918. == 0) {
  1919. wpa_printf(MSG_DEBUG, "OpenSSL: Reading PKCS#12 file "
  1920. "--> OK");
  1921. ok = 1;
  1922. break;
  1923. }
  1924. if (tls_cryptoapi_cert(conn->ssl, private_key) == 0) {
  1925. wpa_printf(MSG_DEBUG, "OpenSSL: Using CryptoAPI to "
  1926. "access certificate store --> OK");
  1927. ok = 1;
  1928. break;
  1929. }
  1930. break;
  1931. }
  1932. if (!ok) {
  1933. tls_show_errors(MSG_INFO, __func__,
  1934. "Failed to load private key");
  1935. os_free(passwd);
  1936. return -1;
  1937. }
  1938. ERR_clear_error();
  1939. SSL_CTX_set_default_passwd_cb(ssl_ctx, NULL);
  1940. os_free(passwd);
  1941. if (!SSL_check_private_key(conn->ssl)) {
  1942. tls_show_errors(MSG_INFO, __func__, "Private key failed "
  1943. "verification");
  1944. return -1;
  1945. }
  1946. wpa_printf(MSG_DEBUG, "SSL: Private key loaded successfully");
  1947. return 0;
  1948. }
  1949. static int tls_global_private_key(SSL_CTX *ssl_ctx, const char *private_key,
  1950. const char *private_key_passwd)
  1951. {
  1952. char *passwd;
  1953. if (private_key == NULL)
  1954. return 0;
  1955. if (private_key_passwd) {
  1956. passwd = os_strdup(private_key_passwd);
  1957. if (passwd == NULL)
  1958. return -1;
  1959. } else
  1960. passwd = NULL;
  1961. SSL_CTX_set_default_passwd_cb(ssl_ctx, tls_passwd_cb);
  1962. SSL_CTX_set_default_passwd_cb_userdata(ssl_ctx, passwd);
  1963. if (
  1964. #ifndef OPENSSL_NO_STDIO
  1965. SSL_CTX_use_PrivateKey_file(ssl_ctx, private_key,
  1966. SSL_FILETYPE_ASN1) != 1 &&
  1967. SSL_CTX_use_PrivateKey_file(ssl_ctx, private_key,
  1968. SSL_FILETYPE_PEM) != 1 &&
  1969. #endif /* OPENSSL_NO_STDIO */
  1970. tls_read_pkcs12(ssl_ctx, NULL, private_key, passwd)) {
  1971. tls_show_errors(MSG_INFO, __func__,
  1972. "Failed to load private key");
  1973. os_free(passwd);
  1974. ERR_clear_error();
  1975. return -1;
  1976. }
  1977. os_free(passwd);
  1978. ERR_clear_error();
  1979. SSL_CTX_set_default_passwd_cb(ssl_ctx, NULL);
  1980. if (!SSL_CTX_check_private_key(ssl_ctx)) {
  1981. tls_show_errors(MSG_INFO, __func__,
  1982. "Private key failed verification");
  1983. return -1;
  1984. }
  1985. return 0;
  1986. }
  1987. static int tls_connection_dh(struct tls_connection *conn, const char *dh_file)
  1988. {
  1989. #ifdef OPENSSL_NO_DH
  1990. if (dh_file == NULL)
  1991. return 0;
  1992. wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but "
  1993. "dh_file specified");
  1994. return -1;
  1995. #else /* OPENSSL_NO_DH */
  1996. DH *dh;
  1997. BIO *bio;
  1998. /* TODO: add support for dh_blob */
  1999. if (dh_file == NULL)
  2000. return 0;
  2001. if (conn == NULL)
  2002. return -1;
  2003. bio = BIO_new_file(dh_file, "r");
  2004. if (bio == NULL) {
  2005. wpa_printf(MSG_INFO, "TLS: Failed to open DH file '%s': %s",
  2006. dh_file, ERR_error_string(ERR_get_error(), NULL));
  2007. return -1;
  2008. }
  2009. dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
  2010. BIO_free(bio);
  2011. #ifndef OPENSSL_NO_DSA
  2012. while (dh == NULL) {
  2013. DSA *dsa;
  2014. wpa_printf(MSG_DEBUG, "TLS: Failed to parse DH file '%s': %s -"
  2015. " trying to parse as DSA params", dh_file,
  2016. ERR_error_string(ERR_get_error(), NULL));
  2017. bio = BIO_new_file(dh_file, "r");
  2018. if (bio == NULL)
  2019. break;
  2020. dsa = PEM_read_bio_DSAparams(bio, NULL, NULL, NULL);
  2021. BIO_free(bio);
  2022. if (!dsa) {
  2023. wpa_printf(MSG_DEBUG, "TLS: Failed to parse DSA file "
  2024. "'%s': %s", dh_file,
  2025. ERR_error_string(ERR_get_error(), NULL));
  2026. break;
  2027. }
  2028. wpa_printf(MSG_DEBUG, "TLS: DH file in DSA param format");
  2029. dh = DSA_dup_DH(dsa);
  2030. DSA_free(dsa);
  2031. if (dh == NULL) {
  2032. wpa_printf(MSG_INFO, "TLS: Failed to convert DSA "
  2033. "params into DH params");
  2034. break;
  2035. }
  2036. break;
  2037. }
  2038. #endif /* !OPENSSL_NO_DSA */
  2039. if (dh == NULL) {
  2040. wpa_printf(MSG_INFO, "TLS: Failed to read/parse DH/DSA file "
  2041. "'%s'", dh_file);
  2042. return -1;
  2043. }
  2044. if (SSL_set_tmp_dh(conn->ssl, dh) != 1) {
  2045. wpa_printf(MSG_INFO, "TLS: Failed to set DH params from '%s': "
  2046. "%s", dh_file,
  2047. ERR_error_string(ERR_get_error(), NULL));
  2048. DH_free(dh);
  2049. return -1;
  2050. }
  2051. DH_free(dh);
  2052. return 0;
  2053. #endif /* OPENSSL_NO_DH */
  2054. }
  2055. static int tls_global_dh(SSL_CTX *ssl_ctx, const char *dh_file)
  2056. {
  2057. #ifdef OPENSSL_NO_DH
  2058. if (dh_file == NULL)
  2059. return 0;
  2060. wpa_printf(MSG_ERROR, "TLS: openssl does not include DH support, but "
  2061. "dh_file specified");
  2062. return -1;
  2063. #else /* OPENSSL_NO_DH */
  2064. DH *dh;
  2065. BIO *bio;
  2066. /* TODO: add support for dh_blob */
  2067. if (dh_file == NULL)
  2068. return 0;
  2069. if (ssl_ctx == NULL)
  2070. return -1;
  2071. bio = BIO_new_file(dh_file, "r");
  2072. if (bio == NULL) {
  2073. wpa_printf(MSG_INFO, "TLS: Failed to open DH file '%s': %s",
  2074. dh_file, ERR_error_string(ERR_get_error(), NULL));
  2075. return -1;
  2076. }
  2077. dh = PEM_read_bio_DHparams(bio, NULL, NULL, NULL);
  2078. BIO_free(bio);
  2079. #ifndef OPENSSL_NO_DSA
  2080. while (dh == NULL) {
  2081. DSA *dsa;
  2082. wpa_printf(MSG_DEBUG, "TLS: Failed to parse DH file '%s': %s -"
  2083. " trying to parse as DSA params", dh_file,
  2084. ERR_error_string(ERR_get_error(), NULL));
  2085. bio = BIO_new_file(dh_file, "r");
  2086. if (bio == NULL)
  2087. break;
  2088. dsa = PEM_read_bio_DSAparams(bio, NULL, NULL, NULL);
  2089. BIO_free(bio);
  2090. if (!dsa) {
  2091. wpa_printf(MSG_DEBUG, "TLS: Failed to parse DSA file "
  2092. "'%s': %s", dh_file,
  2093. ERR_error_string(ERR_get_error(), NULL));
  2094. break;
  2095. }
  2096. wpa_printf(MSG_DEBUG, "TLS: DH file in DSA param format");
  2097. dh = DSA_dup_DH(dsa);
  2098. DSA_free(dsa);
  2099. if (dh == NULL) {
  2100. wpa_printf(MSG_INFO, "TLS: Failed to convert DSA "
  2101. "params into DH params");
  2102. break;
  2103. }
  2104. break;
  2105. }
  2106. #endif /* !OPENSSL_NO_DSA */
  2107. if (dh == NULL) {
  2108. wpa_printf(MSG_INFO, "TLS: Failed to read/parse DH/DSA file "
  2109. "'%s'", dh_file);
  2110. return -1;
  2111. }
  2112. if (SSL_CTX_set_tmp_dh(ssl_ctx, dh) != 1) {
  2113. wpa_printf(MSG_INFO, "TLS: Failed to set DH params from '%s': "
  2114. "%s", dh_file,
  2115. ERR_error_string(ERR_get_error(), NULL));
  2116. DH_free(dh);
  2117. return -1;
  2118. }
  2119. DH_free(dh);
  2120. return 0;
  2121. #endif /* OPENSSL_NO_DH */
  2122. }
  2123. int tls_connection_get_keys(void *ssl_ctx, struct tls_connection *conn,
  2124. struct tls_keys *keys)
  2125. {
  2126. #ifdef CONFIG_FIPS
  2127. wpa_printf(MSG_ERROR, "OpenSSL: TLS keys cannot be exported in FIPS "
  2128. "mode");
  2129. return -1;
  2130. #else /* CONFIG_FIPS */
  2131. SSL *ssl;
  2132. if (conn == NULL || keys == NULL)
  2133. return -1;
  2134. ssl = conn->ssl;
  2135. if (ssl == NULL || ssl->s3 == NULL || ssl->session == NULL)
  2136. return -1;
  2137. os_memset(keys, 0, sizeof(*keys));
  2138. keys->master_key = ssl->session->master_key;
  2139. keys->master_key_len = ssl->session->master_key_length;
  2140. keys->client_random = ssl->s3->client_random;
  2141. keys->client_random_len = SSL3_RANDOM_SIZE;
  2142. keys->server_random = ssl->s3->server_random;
  2143. keys->server_random_len = SSL3_RANDOM_SIZE;
  2144. return 0;
  2145. #endif /* CONFIG_FIPS */
  2146. }
  2147. int tls_connection_prf(void *tls_ctx, struct tls_connection *conn,
  2148. const char *label, int server_random_first,
  2149. u8 *out, size_t out_len)
  2150. {
  2151. #if OPENSSL_VERSION_NUMBER >= 0x10001000L
  2152. SSL *ssl;
  2153. if (conn == NULL)
  2154. return -1;
  2155. if (server_random_first)
  2156. return -1;
  2157. ssl = conn->ssl;
  2158. if (SSL_export_keying_material(ssl, out, out_len, label,
  2159. os_strlen(label), NULL, 0, 0) == 1) {
  2160. wpa_printf(MSG_DEBUG, "OpenSSL: Using internal PRF");
  2161. return 0;
  2162. }
  2163. #endif
  2164. return -1;
  2165. }
  2166. static struct wpabuf *
  2167. openssl_handshake(struct tls_connection *conn, const struct wpabuf *in_data,
  2168. int server)
  2169. {
  2170. int res;
  2171. struct wpabuf *out_data;
  2172. /*
  2173. * Give TLS handshake data from the server (if available) to OpenSSL
  2174. * for processing.
  2175. */
  2176. if (in_data &&
  2177. BIO_write(conn->ssl_in, wpabuf_head(in_data), wpabuf_len(in_data))
  2178. < 0) {
  2179. tls_show_errors(MSG_INFO, __func__,
  2180. "Handshake failed - BIO_write");
  2181. return NULL;
  2182. }
  2183. /* Initiate TLS handshake or continue the existing handshake */
  2184. if (server)
  2185. res = SSL_accept(conn->ssl);
  2186. else
  2187. res = SSL_connect(conn->ssl);
  2188. if (res != 1) {
  2189. int err = SSL_get_error(conn->ssl, res);
  2190. if (err == SSL_ERROR_WANT_READ)
  2191. wpa_printf(MSG_DEBUG, "SSL: SSL_connect - want "
  2192. "more data");
  2193. else if (err == SSL_ERROR_WANT_WRITE)
  2194. wpa_printf(MSG_DEBUG, "SSL: SSL_connect - want to "
  2195. "write");
  2196. else {
  2197. tls_show_errors(MSG_INFO, __func__, "SSL_connect");
  2198. conn->failed++;
  2199. }
  2200. }
  2201. /* Get the TLS handshake data to be sent to the server */
  2202. res = BIO_ctrl_pending(conn->ssl_out);
  2203. wpa_printf(MSG_DEBUG, "SSL: %d bytes pending from ssl_out", res);
  2204. out_data = wpabuf_alloc(res);
  2205. if (out_data == NULL) {
  2206. wpa_printf(MSG_DEBUG, "SSL: Failed to allocate memory for "
  2207. "handshake output (%d bytes)", res);
  2208. if (BIO_reset(conn->ssl_out) < 0) {
  2209. tls_show_errors(MSG_INFO, __func__,
  2210. "BIO_reset failed");
  2211. }
  2212. return NULL;
  2213. }
  2214. res = res == 0 ? 0 : BIO_read(conn->ssl_out, wpabuf_mhead(out_data),
  2215. res);
  2216. if (res < 0) {
  2217. tls_show_errors(MSG_INFO, __func__,
  2218. "Handshake failed - BIO_read");
  2219. if (BIO_reset(conn->ssl_out) < 0) {
  2220. tls_show_errors(MSG_INFO, __func__,
  2221. "BIO_reset failed");
  2222. }
  2223. wpabuf_free(out_data);
  2224. return NULL;
  2225. }
  2226. wpabuf_put(out_data, res);
  2227. return out_data;
  2228. }
  2229. static struct wpabuf *
  2230. openssl_get_appl_data(struct tls_connection *conn, size_t max_len)
  2231. {
  2232. struct wpabuf *appl_data;
  2233. int res;
  2234. appl_data = wpabuf_alloc(max_len + 100);
  2235. if (appl_data == NULL)
  2236. return NULL;
  2237. res = SSL_read(conn->ssl, wpabuf_mhead(appl_data),
  2238. wpabuf_size(appl_data));
  2239. if (res < 0) {
  2240. int err = SSL_get_error(conn->ssl, res);
  2241. if (err == SSL_ERROR_WANT_READ ||
  2242. err == SSL_ERROR_WANT_WRITE) {
  2243. wpa_printf(MSG_DEBUG, "SSL: No Application Data "
  2244. "included");
  2245. } else {
  2246. tls_show_errors(MSG_INFO, __func__,
  2247. "Failed to read possible "
  2248. "Application Data");
  2249. }
  2250. wpabuf_free(appl_data);
  2251. return NULL;
  2252. }
  2253. wpabuf_put(appl_data, res);
  2254. wpa_hexdump_buf_key(MSG_MSGDUMP, "SSL: Application Data in Finished "
  2255. "message", appl_data);
  2256. return appl_data;
  2257. }
  2258. static struct wpabuf *
  2259. openssl_connection_handshake(struct tls_connection *conn,
  2260. const struct wpabuf *in_data,
  2261. struct wpabuf **appl_data, int server)
  2262. {
  2263. struct wpabuf *out_data;
  2264. if (appl_data)
  2265. *appl_data = NULL;
  2266. out_data = openssl_handshake(conn, in_data, server);
  2267. if (out_data == NULL)
  2268. return NULL;
  2269. if (SSL_is_init_finished(conn->ssl) && appl_data && in_data)
  2270. *appl_data = openssl_get_appl_data(conn, wpabuf_len(in_data));
  2271. return out_data;
  2272. }
  2273. struct wpabuf *
  2274. tls_connection_handshake(void *ssl_ctx, struct tls_connection *conn,
  2275. const struct wpabuf *in_data,
  2276. struct wpabuf **appl_data)
  2277. {
  2278. return openssl_connection_handshake(conn, in_data, appl_data, 0);
  2279. }
  2280. struct wpabuf * tls_connection_server_handshake(void *tls_ctx,
  2281. struct tls_connection *conn,
  2282. const struct wpabuf *in_data,
  2283. struct wpabuf **appl_data)
  2284. {
  2285. return openssl_connection_handshake(conn, in_data, appl_data, 1);
  2286. }
  2287. struct wpabuf * tls_connection_encrypt(void *tls_ctx,
  2288. struct tls_connection *conn,
  2289. const struct wpabuf *in_data)
  2290. {
  2291. int res;
  2292. struct wpabuf *buf;
  2293. if (conn == NULL)
  2294. return NULL;
  2295. /* Give plaintext data for OpenSSL to encrypt into the TLS tunnel. */
  2296. if ((res = BIO_reset(conn->ssl_in)) < 0 ||
  2297. (res = BIO_reset(conn->ssl_out)) < 0) {
  2298. tls_show_errors(MSG_INFO, __func__, "BIO_reset failed");
  2299. return NULL;
  2300. }
  2301. res = SSL_write(conn->ssl, wpabuf_head(in_data), wpabuf_len(in_data));
  2302. if (res < 0) {
  2303. tls_show_errors(MSG_INFO, __func__,
  2304. "Encryption failed - SSL_write");
  2305. return NULL;
  2306. }
  2307. /* Read encrypted data to be sent to the server */
  2308. buf = wpabuf_alloc(wpabuf_len(in_data) + 300);
  2309. if (buf == NULL)
  2310. return NULL;
  2311. res = BIO_read(conn->ssl_out, wpabuf_mhead(buf), wpabuf_size(buf));
  2312. if (res < 0) {
  2313. tls_show_errors(MSG_INFO, __func__,
  2314. "Encryption failed - BIO_read");
  2315. wpabuf_free(buf);
  2316. return NULL;
  2317. }
  2318. wpabuf_put(buf, res);
  2319. return buf;
  2320. }
  2321. struct wpabuf * tls_connection_decrypt(void *tls_ctx,
  2322. struct tls_connection *conn,
  2323. const struct wpabuf *in_data)
  2324. {
  2325. int res;
  2326. struct wpabuf *buf;
  2327. /* Give encrypted data from TLS tunnel for OpenSSL to decrypt. */
  2328. res = BIO_write(conn->ssl_in, wpabuf_head(in_data),
  2329. wpabuf_len(in_data));
  2330. if (res < 0) {
  2331. tls_show_errors(MSG_INFO, __func__,
  2332. "Decryption failed - BIO_write");
  2333. return NULL;
  2334. }
  2335. if (BIO_reset(conn->ssl_out) < 0) {
  2336. tls_show_errors(MSG_INFO, __func__, "BIO_reset failed");
  2337. return NULL;
  2338. }
  2339. /* Read decrypted data for further processing */
  2340. /*
  2341. * Even though we try to disable TLS compression, it is possible that
  2342. * this cannot be done with all TLS libraries. Add extra buffer space
  2343. * to handle the possibility of the decrypted data being longer than
  2344. * input data.
  2345. */
  2346. buf = wpabuf_alloc((wpabuf_len(in_data) + 500) * 3);
  2347. if (buf == NULL)
  2348. return NULL;
  2349. res = SSL_read(conn->ssl, wpabuf_mhead(buf), wpabuf_size(buf));
  2350. if (res < 0) {
  2351. tls_show_errors(MSG_INFO, __func__,
  2352. "Decryption failed - SSL_read");
  2353. wpabuf_free(buf);
  2354. return NULL;
  2355. }
  2356. wpabuf_put(buf, res);
  2357. return buf;
  2358. }
  2359. int tls_connection_resumed(void *ssl_ctx, struct tls_connection *conn)
  2360. {
  2361. return conn ? conn->ssl->hit : 0;
  2362. }
  2363. int tls_connection_set_cipher_list(void *tls_ctx, struct tls_connection *conn,
  2364. u8 *ciphers)
  2365. {
  2366. char buf[100], *pos, *end;
  2367. u8 *c;
  2368. int ret;
  2369. if (conn == NULL || conn->ssl == NULL || ciphers == NULL)
  2370. return -1;
  2371. buf[0] = '\0';
  2372. pos = buf;
  2373. end = pos + sizeof(buf);
  2374. c = ciphers;
  2375. while (*c != TLS_CIPHER_NONE) {
  2376. const char *suite;
  2377. switch (*c) {
  2378. case TLS_CIPHER_RC4_SHA:
  2379. suite = "RC4-SHA";
  2380. break;
  2381. case TLS_CIPHER_AES128_SHA:
  2382. suite = "AES128-SHA";
  2383. break;
  2384. case TLS_CIPHER_RSA_DHE_AES128_SHA:
  2385. suite = "DHE-RSA-AES128-SHA";
  2386. break;
  2387. case TLS_CIPHER_ANON_DH_AES128_SHA:
  2388. suite = "ADH-AES128-SHA";
  2389. break;
  2390. default:
  2391. wpa_printf(MSG_DEBUG, "TLS: Unsupported "
  2392. "cipher selection: %d", *c);
  2393. return -1;
  2394. }
  2395. ret = os_snprintf(pos, end - pos, ":%s", suite);
  2396. if (ret < 0 || ret >= end - pos)
  2397. break;
  2398. pos += ret;
  2399. c++;
  2400. }
  2401. wpa_printf(MSG_DEBUG, "OpenSSL: cipher suites: %s", buf + 1);
  2402. if (SSL_set_cipher_list(conn->ssl, buf + 1) != 1) {
  2403. tls_show_errors(MSG_INFO, __func__,
  2404. "Cipher suite configuration failed");
  2405. return -1;
  2406. }
  2407. return 0;
  2408. }
  2409. int tls_get_cipher(void *ssl_ctx, struct tls_connection *conn,
  2410. char *buf, size_t buflen)
  2411. {
  2412. const char *name;
  2413. if (conn == NULL || conn->ssl == NULL)
  2414. return -1;
  2415. name = SSL_get_cipher(conn->ssl);
  2416. if (name == NULL)
  2417. return -1;
  2418. os_strlcpy(buf, name, buflen);
  2419. return 0;
  2420. }
  2421. int tls_connection_enable_workaround(void *ssl_ctx,
  2422. struct tls_connection *conn)
  2423. {
  2424. SSL_set_options(conn->ssl, SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS);
  2425. return 0;
  2426. }
  2427. #if defined(EAP_FAST) || defined(EAP_FAST_DYNAMIC) || defined(EAP_SERVER_FAST)
  2428. /* ClientHello TLS extensions require a patch to openssl, so this function is
  2429. * commented out unless explicitly needed for EAP-FAST in order to be able to
  2430. * build this file with unmodified openssl. */
  2431. int tls_connection_client_hello_ext(void *ssl_ctx, struct tls_connection *conn,
  2432. int ext_type, const u8 *data,
  2433. size_t data_len)
  2434. {
  2435. if (conn == NULL || conn->ssl == NULL || ext_type != 35)
  2436. return -1;
  2437. #ifdef CONFIG_OPENSSL_TICKET_OVERRIDE
  2438. if (SSL_set_session_ticket_ext(conn->ssl, (void *) data,
  2439. data_len) != 1)
  2440. return -1;
  2441. #else /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2442. if (SSL_set_hello_extension(conn->ssl, ext_type, (void *) data,
  2443. data_len) != 1)
  2444. return -1;
  2445. #endif /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2446. return 0;
  2447. }
  2448. #endif /* EAP_FAST || EAP_FAST_DYNAMIC || EAP_SERVER_FAST */
  2449. int tls_connection_get_failed(void *ssl_ctx, struct tls_connection *conn)
  2450. {
  2451. if (conn == NULL)
  2452. return -1;
  2453. return conn->failed;
  2454. }
  2455. int tls_connection_get_read_alerts(void *ssl_ctx, struct tls_connection *conn)
  2456. {
  2457. if (conn == NULL)
  2458. return -1;
  2459. return conn->read_alerts;
  2460. }
  2461. int tls_connection_get_write_alerts(void *ssl_ctx, struct tls_connection *conn)
  2462. {
  2463. if (conn == NULL)
  2464. return -1;
  2465. return conn->write_alerts;
  2466. }
  2467. #ifdef HAVE_OCSP
  2468. static void ocsp_debug_print_resp(OCSP_RESPONSE *rsp)
  2469. {
  2470. #ifndef CONFIG_NO_STDOUT_DEBUG
  2471. extern int wpa_debug_level;
  2472. BIO *out;
  2473. size_t rlen;
  2474. char *txt;
  2475. int res;
  2476. if (wpa_debug_level > MSG_DEBUG)
  2477. return;
  2478. out = BIO_new(BIO_s_mem());
  2479. if (!out)
  2480. return;
  2481. OCSP_RESPONSE_print(out, rsp, 0);
  2482. rlen = BIO_ctrl_pending(out);
  2483. txt = os_malloc(rlen + 1);
  2484. if (!txt) {
  2485. BIO_free(out);
  2486. return;
  2487. }
  2488. res = BIO_read(out, txt, rlen);
  2489. if (res > 0) {
  2490. txt[res] = '\0';
  2491. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP Response\n%s", txt);
  2492. }
  2493. os_free(txt);
  2494. BIO_free(out);
  2495. #endif /* CONFIG_NO_STDOUT_DEBUG */
  2496. }
  2497. static int ocsp_resp_cb(SSL *s, void *arg)
  2498. {
  2499. struct tls_connection *conn = arg;
  2500. const unsigned char *p;
  2501. int len, status, reason;
  2502. OCSP_RESPONSE *rsp;
  2503. OCSP_BASICRESP *basic;
  2504. OCSP_CERTID *id;
  2505. ASN1_GENERALIZEDTIME *produced_at, *this_update, *next_update;
  2506. X509_STORE *store;
  2507. STACK_OF(X509) *certs = NULL;
  2508. len = SSL_get_tlsext_status_ocsp_resp(s, &p);
  2509. if (!p) {
  2510. wpa_printf(MSG_DEBUG, "OpenSSL: No OCSP response received");
  2511. return (conn->flags & TLS_CONN_REQUIRE_OCSP) ? 0 : 1;
  2512. }
  2513. wpa_hexdump(MSG_DEBUG, "OpenSSL: OCSP response", p, len);
  2514. rsp = d2i_OCSP_RESPONSE(NULL, &p, len);
  2515. if (!rsp) {
  2516. wpa_printf(MSG_INFO, "OpenSSL: Failed to parse OCSP response");
  2517. return 0;
  2518. }
  2519. ocsp_debug_print_resp(rsp);
  2520. status = OCSP_response_status(rsp);
  2521. if (status != OCSP_RESPONSE_STATUS_SUCCESSFUL) {
  2522. wpa_printf(MSG_INFO, "OpenSSL: OCSP responder error %d (%s)",
  2523. status, OCSP_response_status_str(status));
  2524. return 0;
  2525. }
  2526. basic = OCSP_response_get1_basic(rsp);
  2527. if (!basic) {
  2528. wpa_printf(MSG_INFO, "OpenSSL: Could not find BasicOCSPResponse");
  2529. return 0;
  2530. }
  2531. store = SSL_CTX_get_cert_store(s->ctx);
  2532. if (conn->peer_issuer) {
  2533. wpa_printf(MSG_DEBUG, "OpenSSL: Add issuer");
  2534. X509_print_fp(stdout, conn->peer_issuer);
  2535. if (X509_STORE_add_cert(store, conn->peer_issuer) != 1) {
  2536. tls_show_errors(MSG_INFO, __func__,
  2537. "OpenSSL: Could not add issuer to certificate store\n");
  2538. }
  2539. certs = sk_X509_new_null();
  2540. if (certs) {
  2541. X509 *cert;
  2542. cert = X509_dup(conn->peer_issuer);
  2543. if (cert && !sk_X509_push(certs, cert)) {
  2544. tls_show_errors(
  2545. MSG_INFO, __func__,
  2546. "OpenSSL: Could not add issuer to OCSP responder trust store\n");
  2547. X509_free(cert);
  2548. sk_X509_free(certs);
  2549. certs = NULL;
  2550. }
  2551. if (conn->peer_issuer_issuer) {
  2552. cert = X509_dup(conn->peer_issuer_issuer);
  2553. if (cert && !sk_X509_push(certs, cert)) {
  2554. tls_show_errors(
  2555. MSG_INFO, __func__,
  2556. "OpenSSL: Could not add issuer to OCSP responder trust store\n");
  2557. X509_free(cert);
  2558. }
  2559. }
  2560. }
  2561. }
  2562. status = OCSP_basic_verify(basic, certs, store, OCSP_TRUSTOTHER);
  2563. sk_X509_pop_free(certs, X509_free);
  2564. if (status <= 0) {
  2565. tls_show_errors(MSG_INFO, __func__,
  2566. "OpenSSL: OCSP response failed verification");
  2567. OCSP_BASICRESP_free(basic);
  2568. OCSP_RESPONSE_free(rsp);
  2569. return 0;
  2570. }
  2571. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP response verification succeeded");
  2572. if (!conn->peer_cert) {
  2573. wpa_printf(MSG_DEBUG, "OpenSSL: Peer certificate not available for OCSP status check");
  2574. OCSP_BASICRESP_free(basic);
  2575. OCSP_RESPONSE_free(rsp);
  2576. return 0;
  2577. }
  2578. if (!conn->peer_issuer) {
  2579. wpa_printf(MSG_DEBUG, "OpenSSL: Peer issuer certificate not available for OCSP status check");
  2580. OCSP_BASICRESP_free(basic);
  2581. OCSP_RESPONSE_free(rsp);
  2582. return 0;
  2583. }
  2584. id = OCSP_cert_to_id(NULL, conn->peer_cert, conn->peer_issuer);
  2585. if (!id) {
  2586. wpa_printf(MSG_DEBUG, "OpenSSL: Could not create OCSP certificate identifier");
  2587. OCSP_BASICRESP_free(basic);
  2588. OCSP_RESPONSE_free(rsp);
  2589. return 0;
  2590. }
  2591. if (!OCSP_resp_find_status(basic, id, &status, &reason, &produced_at,
  2592. &this_update, &next_update)) {
  2593. wpa_printf(MSG_INFO, "OpenSSL: Could not find current server certificate from OCSP response%s",
  2594. (conn->flags & TLS_CONN_REQUIRE_OCSP) ? "" :
  2595. " (OCSP not required)");
  2596. OCSP_BASICRESP_free(basic);
  2597. OCSP_RESPONSE_free(rsp);
  2598. return (conn->flags & TLS_CONN_REQUIRE_OCSP) ? 0 : 1;
  2599. }
  2600. if (!OCSP_check_validity(this_update, next_update, 5 * 60, -1)) {
  2601. tls_show_errors(MSG_INFO, __func__,
  2602. "OpenSSL: OCSP status times invalid");
  2603. OCSP_BASICRESP_free(basic);
  2604. OCSP_RESPONSE_free(rsp);
  2605. return 0;
  2606. }
  2607. OCSP_BASICRESP_free(basic);
  2608. OCSP_RESPONSE_free(rsp);
  2609. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status for server certificate: %s",
  2610. OCSP_cert_status_str(status));
  2611. if (status == V_OCSP_CERTSTATUS_GOOD)
  2612. return 1;
  2613. if (status == V_OCSP_CERTSTATUS_REVOKED)
  2614. return 0;
  2615. if (conn->flags & TLS_CONN_REQUIRE_OCSP) {
  2616. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status unknown, but OCSP required");
  2617. return 0;
  2618. }
  2619. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status unknown, but OCSP was not required, so allow connection to continue");
  2620. return 1;
  2621. }
  2622. static int ocsp_status_cb(SSL *s, void *arg)
  2623. {
  2624. char *tmp;
  2625. char *resp;
  2626. size_t len;
  2627. if (tls_global->ocsp_stapling_response == NULL) {
  2628. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status callback - no response configured");
  2629. return SSL_TLSEXT_ERR_OK;
  2630. }
  2631. resp = os_readfile(tls_global->ocsp_stapling_response, &len);
  2632. if (resp == NULL) {
  2633. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status callback - could not read response file");
  2634. /* TODO: Build OCSPResponse with responseStatus = internalError
  2635. */
  2636. return SSL_TLSEXT_ERR_OK;
  2637. }
  2638. wpa_printf(MSG_DEBUG, "OpenSSL: OCSP status callback - send cached response");
  2639. tmp = OPENSSL_malloc(len);
  2640. if (tmp == NULL) {
  2641. os_free(resp);
  2642. return SSL_TLSEXT_ERR_ALERT_FATAL;
  2643. }
  2644. os_memcpy(tmp, resp, len);
  2645. os_free(resp);
  2646. SSL_set_tlsext_status_ocsp_resp(s, tmp, len);
  2647. return SSL_TLSEXT_ERR_OK;
  2648. }
  2649. #endif /* HAVE_OCSP */
  2650. int tls_connection_set_params(void *tls_ctx, struct tls_connection *conn,
  2651. const struct tls_connection_params *params)
  2652. {
  2653. int ret;
  2654. unsigned long err;
  2655. if (conn == NULL)
  2656. return -1;
  2657. while ((err = ERR_get_error())) {
  2658. wpa_printf(MSG_INFO, "%s: Clearing pending SSL error: %s",
  2659. __func__, ERR_error_string(err, NULL));
  2660. }
  2661. if (params->engine) {
  2662. wpa_printf(MSG_DEBUG, "SSL: Initializing TLS engine");
  2663. ret = tls_engine_init(conn, params->engine_id, params->pin,
  2664. params->key_id, params->cert_id,
  2665. params->ca_cert_id);
  2666. if (ret)
  2667. return ret;
  2668. }
  2669. if (tls_connection_set_subject_match(conn,
  2670. params->subject_match,
  2671. params->altsubject_match,
  2672. params->suffix_match))
  2673. return -1;
  2674. if (params->engine && params->ca_cert_id) {
  2675. if (tls_connection_engine_ca_cert(tls_ctx, conn,
  2676. params->ca_cert_id))
  2677. return TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED;
  2678. } else if (tls_connection_ca_cert(tls_ctx, conn, params->ca_cert,
  2679. params->ca_cert_blob,
  2680. params->ca_cert_blob_len,
  2681. params->ca_path))
  2682. return -1;
  2683. if (params->engine && params->cert_id) {
  2684. if (tls_connection_engine_client_cert(conn, params->cert_id))
  2685. return TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED;
  2686. } else if (tls_connection_client_cert(conn, params->client_cert,
  2687. params->client_cert_blob,
  2688. params->client_cert_blob_len))
  2689. return -1;
  2690. if (params->engine && params->key_id) {
  2691. wpa_printf(MSG_DEBUG, "TLS: Using private key from engine");
  2692. if (tls_connection_engine_private_key(conn))
  2693. return TLS_SET_PARAMS_ENGINE_PRV_VERIFY_FAILED;
  2694. } else if (tls_connection_private_key(tls_ctx, conn,
  2695. params->private_key,
  2696. params->private_key_passwd,
  2697. params->private_key_blob,
  2698. params->private_key_blob_len)) {
  2699. wpa_printf(MSG_INFO, "TLS: Failed to load private key '%s'",
  2700. params->private_key);
  2701. return -1;
  2702. }
  2703. if (tls_connection_dh(conn, params->dh_file)) {
  2704. wpa_printf(MSG_INFO, "TLS: Failed to load DH file '%s'",
  2705. params->dh_file);
  2706. return -1;
  2707. }
  2708. #ifdef SSL_OP_NO_TICKET
  2709. if (params->flags & TLS_CONN_DISABLE_SESSION_TICKET)
  2710. SSL_set_options(conn->ssl, SSL_OP_NO_TICKET);
  2711. #ifdef SSL_clear_options
  2712. else
  2713. SSL_clear_options(conn->ssl, SSL_OP_NO_TICKET);
  2714. #endif /* SSL_clear_options */
  2715. #endif /* SSL_OP_NO_TICKET */
  2716. #ifdef HAVE_OCSP
  2717. if (params->flags & TLS_CONN_REQUEST_OCSP) {
  2718. SSL_CTX *ssl_ctx = tls_ctx;
  2719. SSL_set_tlsext_status_type(conn->ssl, TLSEXT_STATUSTYPE_ocsp);
  2720. SSL_CTX_set_tlsext_status_cb(ssl_ctx, ocsp_resp_cb);
  2721. SSL_CTX_set_tlsext_status_arg(ssl_ctx, conn);
  2722. }
  2723. #endif /* HAVE_OCSP */
  2724. conn->flags = params->flags;
  2725. tls_get_errors(tls_ctx);
  2726. return 0;
  2727. }
  2728. int tls_global_set_params(void *tls_ctx,
  2729. const struct tls_connection_params *params)
  2730. {
  2731. SSL_CTX *ssl_ctx = tls_ctx;
  2732. unsigned long err;
  2733. while ((err = ERR_get_error())) {
  2734. wpa_printf(MSG_INFO, "%s: Clearing pending SSL error: %s",
  2735. __func__, ERR_error_string(err, NULL));
  2736. }
  2737. if (tls_global_ca_cert(ssl_ctx, params->ca_cert))
  2738. return -1;
  2739. if (tls_global_client_cert(ssl_ctx, params->client_cert))
  2740. return -1;
  2741. if (tls_global_private_key(ssl_ctx, params->private_key,
  2742. params->private_key_passwd))
  2743. return -1;
  2744. if (tls_global_dh(ssl_ctx, params->dh_file)) {
  2745. wpa_printf(MSG_INFO, "TLS: Failed to load DH file '%s'",
  2746. params->dh_file);
  2747. return -1;
  2748. }
  2749. #ifdef SSL_OP_NO_TICKET
  2750. if (params->flags & TLS_CONN_DISABLE_SESSION_TICKET)
  2751. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_TICKET);
  2752. #ifdef SSL_CTX_clear_options
  2753. else
  2754. SSL_CTX_clear_options(ssl_ctx, SSL_OP_NO_TICKET);
  2755. #endif /* SSL_clear_options */
  2756. #endif /* SSL_OP_NO_TICKET */
  2757. #ifdef HAVE_OCSP
  2758. SSL_CTX_set_tlsext_status_cb(ssl_ctx, ocsp_status_cb);
  2759. SSL_CTX_set_tlsext_status_arg(ssl_ctx, ssl_ctx);
  2760. os_free(tls_global->ocsp_stapling_response);
  2761. if (params->ocsp_stapling_response)
  2762. tls_global->ocsp_stapling_response =
  2763. os_strdup(params->ocsp_stapling_response);
  2764. else
  2765. tls_global->ocsp_stapling_response = NULL;
  2766. #endif /* HAVE_OCSP */
  2767. return 0;
  2768. }
  2769. int tls_connection_get_keyblock_size(void *tls_ctx,
  2770. struct tls_connection *conn)
  2771. {
  2772. const EVP_CIPHER *c;
  2773. const EVP_MD *h;
  2774. int md_size;
  2775. if (conn == NULL || conn->ssl == NULL ||
  2776. conn->ssl->enc_read_ctx == NULL ||
  2777. conn->ssl->enc_read_ctx->cipher == NULL ||
  2778. conn->ssl->read_hash == NULL)
  2779. return -1;
  2780. c = conn->ssl->enc_read_ctx->cipher;
  2781. #if OPENSSL_VERSION_NUMBER >= 0x00909000L
  2782. h = EVP_MD_CTX_md(conn->ssl->read_hash);
  2783. #else
  2784. h = conn->ssl->read_hash;
  2785. #endif
  2786. if (h)
  2787. md_size = EVP_MD_size(h);
  2788. #if OPENSSL_VERSION_NUMBER >= 0x10000000L
  2789. else if (conn->ssl->s3)
  2790. md_size = conn->ssl->s3->tmp.new_mac_secret_size;
  2791. #endif
  2792. else
  2793. return -1;
  2794. wpa_printf(MSG_DEBUG, "OpenSSL: keyblock size: key_len=%d MD_size=%d "
  2795. "IV_len=%d", EVP_CIPHER_key_length(c), md_size,
  2796. EVP_CIPHER_iv_length(c));
  2797. return 2 * (EVP_CIPHER_key_length(c) +
  2798. md_size +
  2799. EVP_CIPHER_iv_length(c));
  2800. }
  2801. unsigned int tls_capabilities(void *tls_ctx)
  2802. {
  2803. return 0;
  2804. }
  2805. #if defined(EAP_FAST) || defined(EAP_FAST_DYNAMIC) || defined(EAP_SERVER_FAST)
  2806. /* Pre-shared secred requires a patch to openssl, so this function is
  2807. * commented out unless explicitly needed for EAP-FAST in order to be able to
  2808. * build this file with unmodified openssl. */
  2809. static int tls_sess_sec_cb(SSL *s, void *secret, int *secret_len,
  2810. STACK_OF(SSL_CIPHER) *peer_ciphers,
  2811. SSL_CIPHER **cipher, void *arg)
  2812. {
  2813. struct tls_connection *conn = arg;
  2814. int ret;
  2815. if (conn == NULL || conn->session_ticket_cb == NULL)
  2816. return 0;
  2817. ret = conn->session_ticket_cb(conn->session_ticket_cb_ctx,
  2818. conn->session_ticket,
  2819. conn->session_ticket_len,
  2820. s->s3->client_random,
  2821. s->s3->server_random, secret);
  2822. os_free(conn->session_ticket);
  2823. conn->session_ticket = NULL;
  2824. if (ret <= 0)
  2825. return 0;
  2826. *secret_len = SSL_MAX_MASTER_KEY_LENGTH;
  2827. return 1;
  2828. }
  2829. #ifdef CONFIG_OPENSSL_TICKET_OVERRIDE
  2830. static int tls_session_ticket_ext_cb(SSL *s, const unsigned char *data,
  2831. int len, void *arg)
  2832. {
  2833. struct tls_connection *conn = arg;
  2834. if (conn == NULL || conn->session_ticket_cb == NULL)
  2835. return 0;
  2836. wpa_printf(MSG_DEBUG, "OpenSSL: %s: length=%d", __func__, len);
  2837. os_free(conn->session_ticket);
  2838. conn->session_ticket = NULL;
  2839. wpa_hexdump(MSG_DEBUG, "OpenSSL: ClientHello SessionTicket "
  2840. "extension", data, len);
  2841. conn->session_ticket = os_malloc(len);
  2842. if (conn->session_ticket == NULL)
  2843. return 0;
  2844. os_memcpy(conn->session_ticket, data, len);
  2845. conn->session_ticket_len = len;
  2846. return 1;
  2847. }
  2848. #else /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2849. #ifdef SSL_OP_NO_TICKET
  2850. static void tls_hello_ext_cb(SSL *s, int client_server, int type,
  2851. unsigned char *data, int len, void *arg)
  2852. {
  2853. struct tls_connection *conn = arg;
  2854. if (conn == NULL || conn->session_ticket_cb == NULL)
  2855. return;
  2856. wpa_printf(MSG_DEBUG, "OpenSSL: %s: type=%d length=%d", __func__,
  2857. type, len);
  2858. if (type == TLSEXT_TYPE_session_ticket && !client_server) {
  2859. os_free(conn->session_ticket);
  2860. conn->session_ticket = NULL;
  2861. wpa_hexdump(MSG_DEBUG, "OpenSSL: ClientHello SessionTicket "
  2862. "extension", data, len);
  2863. conn->session_ticket = os_malloc(len);
  2864. if (conn->session_ticket == NULL)
  2865. return;
  2866. os_memcpy(conn->session_ticket, data, len);
  2867. conn->session_ticket_len = len;
  2868. }
  2869. }
  2870. #else /* SSL_OP_NO_TICKET */
  2871. static int tls_hello_ext_cb(SSL *s, TLS_EXTENSION *ext, void *arg)
  2872. {
  2873. struct tls_connection *conn = arg;
  2874. if (conn == NULL || conn->session_ticket_cb == NULL)
  2875. return 0;
  2876. wpa_printf(MSG_DEBUG, "OpenSSL: %s: type=%d length=%d", __func__,
  2877. ext->type, ext->length);
  2878. os_free(conn->session_ticket);
  2879. conn->session_ticket = NULL;
  2880. if (ext->type == 35) {
  2881. wpa_hexdump(MSG_DEBUG, "OpenSSL: ClientHello SessionTicket "
  2882. "extension", ext->data, ext->length);
  2883. conn->session_ticket = os_malloc(ext->length);
  2884. if (conn->session_ticket == NULL)
  2885. return SSL_AD_INTERNAL_ERROR;
  2886. os_memcpy(conn->session_ticket, ext->data, ext->length);
  2887. conn->session_ticket_len = ext->length;
  2888. }
  2889. return 0;
  2890. }
  2891. #endif /* SSL_OP_NO_TICKET */
  2892. #endif /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2893. #endif /* EAP_FAST || EAP_FAST_DYNAMIC || EAP_SERVER_FAST */
  2894. int tls_connection_set_session_ticket_cb(void *tls_ctx,
  2895. struct tls_connection *conn,
  2896. tls_session_ticket_cb cb,
  2897. void *ctx)
  2898. {
  2899. #if defined(EAP_FAST) || defined(EAP_FAST_DYNAMIC) || defined(EAP_SERVER_FAST)
  2900. conn->session_ticket_cb = cb;
  2901. conn->session_ticket_cb_ctx = ctx;
  2902. if (cb) {
  2903. if (SSL_set_session_secret_cb(conn->ssl, tls_sess_sec_cb,
  2904. conn) != 1)
  2905. return -1;
  2906. #ifdef CONFIG_OPENSSL_TICKET_OVERRIDE
  2907. SSL_set_session_ticket_ext_cb(conn->ssl,
  2908. tls_session_ticket_ext_cb, conn);
  2909. #else /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2910. #ifdef SSL_OP_NO_TICKET
  2911. SSL_set_tlsext_debug_callback(conn->ssl, tls_hello_ext_cb);
  2912. SSL_set_tlsext_debug_arg(conn->ssl, conn);
  2913. #else /* SSL_OP_NO_TICKET */
  2914. if (SSL_set_hello_extension_cb(conn->ssl, tls_hello_ext_cb,
  2915. conn) != 1)
  2916. return -1;
  2917. #endif /* SSL_OP_NO_TICKET */
  2918. #endif /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2919. } else {
  2920. if (SSL_set_session_secret_cb(conn->ssl, NULL, NULL) != 1)
  2921. return -1;
  2922. #ifdef CONFIG_OPENSSL_TICKET_OVERRIDE
  2923. SSL_set_session_ticket_ext_cb(conn->ssl, NULL, NULL);
  2924. #else /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2925. #ifdef SSL_OP_NO_TICKET
  2926. SSL_set_tlsext_debug_callback(conn->ssl, NULL);
  2927. SSL_set_tlsext_debug_arg(conn->ssl, conn);
  2928. #else /* SSL_OP_NO_TICKET */
  2929. if (SSL_set_hello_extension_cb(conn->ssl, NULL, NULL) != 1)
  2930. return -1;
  2931. #endif /* SSL_OP_NO_TICKET */
  2932. #endif /* CONFIG_OPENSSL_TICKET_OVERRIDE */
  2933. }
  2934. return 0;
  2935. #else /* EAP_FAST || EAP_FAST_DYNAMIC || EAP_SERVER_FAST */
  2936. return -1;
  2937. #endif /* EAP_FAST || EAP_FAST_DYNAMIC || EAP_SERVER_FAST */
  2938. }