revert between 56095 -> 55830 in arch
[AROS.git] / workbench / network / WirelessManager / src / tls / tlsv1_cred.c
blobaa467efc8c3c28bcf8cbebac558af5b99295a904
1 /*
2 * TLSv1 credentials
3 * Copyright (c) 2006-2009, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
12 * See README and COPYING for more details.
15 #include "includes.h"
17 #include "common.h"
18 #include "base64.h"
19 #include "crypto/crypto.h"
20 #include "x509v3.h"
21 #include "tlsv1_cred.h"
24 struct tlsv1_credentials * tlsv1_cred_alloc(void)
26 struct tlsv1_credentials *cred;
27 cred = os_zalloc(sizeof(*cred));
28 return cred;
32 void tlsv1_cred_free(struct tlsv1_credentials *cred)
34 if (cred == NULL)
35 return;
37 x509_certificate_chain_free(cred->trusted_certs);
38 x509_certificate_chain_free(cred->cert);
39 crypto_private_key_free(cred->key);
40 os_free(cred->dh_p);
41 os_free(cred->dh_g);
42 os_free(cred);
46 static int tlsv1_add_cert_der(struct x509_certificate **chain,
47 const u8 *buf, size_t len)
49 struct x509_certificate *cert;
50 char name[128];
52 cert = x509_certificate_parse(buf, len);
53 if (cert == NULL) {
54 wpa_printf(MSG_INFO, "TLSv1: %s - failed to parse certificate",
55 __func__);
56 return -1;
59 cert->next = *chain;
60 *chain = cert;
62 x509_name_string(&cert->subject, name, sizeof(name));
63 wpa_printf(MSG_DEBUG, "TLSv1: Added certificate: %s", name);
65 return 0;
69 static const char *pem_cert_begin = "-----BEGIN CERTIFICATE-----";
70 static const char *pem_cert_end = "-----END CERTIFICATE-----";
71 static const char *pem_key_begin = "-----BEGIN RSA PRIVATE KEY-----";
72 static const char *pem_key_end = "-----END RSA PRIVATE KEY-----";
73 static const char *pem_key2_begin = "-----BEGIN PRIVATE KEY-----";
74 static const char *pem_key2_end = "-----END PRIVATE KEY-----";
75 static const char *pem_key_enc_begin = "-----BEGIN ENCRYPTED PRIVATE KEY-----";
76 static const char *pem_key_enc_end = "-----END ENCRYPTED PRIVATE KEY-----";
79 static const u8 * search_tag(const char *tag, const u8 *buf, size_t len)
81 size_t i, plen;
83 plen = os_strlen(tag);
84 if (len < plen)
85 return NULL;
87 for (i = 0; i < len - plen; i++) {
88 if (os_memcmp(buf + i, tag, plen) == 0)
89 return buf + i;
92 return NULL;
96 static int tlsv1_add_cert(struct x509_certificate **chain,
97 const u8 *buf, size_t len)
99 const u8 *pos, *end;
100 unsigned char *der;
101 size_t der_len;
103 pos = search_tag(pem_cert_begin, buf, len);
104 if (!pos) {
105 wpa_printf(MSG_DEBUG, "TLSv1: No PEM certificate tag found - "
106 "assume DER format");
107 return tlsv1_add_cert_der(chain, buf, len);
110 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format certificate into "
111 "DER format");
113 while (pos) {
114 pos += os_strlen(pem_cert_begin);
115 end = search_tag(pem_cert_end, pos, buf + len - pos);
116 if (end == NULL) {
117 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM "
118 "certificate end tag (%s)", pem_cert_end);
119 return -1;
122 der = base64_decode(pos, end - pos, &der_len);
123 if (der == NULL) {
124 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM "
125 "certificate");
126 return -1;
129 if (tlsv1_add_cert_der(chain, der, der_len) < 0) {
130 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM "
131 "certificate after DER conversion");
132 os_free(der);
133 return -1;
136 os_free(der);
138 end += os_strlen(pem_cert_end);
139 pos = search_tag(pem_cert_begin, end, buf + len - end);
142 return 0;
146 static int tlsv1_set_cert_chain(struct x509_certificate **chain,
147 const char *cert, const u8 *cert_blob,
148 size_t cert_blob_len)
150 if (cert_blob)
151 return tlsv1_add_cert(chain, cert_blob, cert_blob_len);
153 if (cert) {
154 u8 *buf;
155 size_t len;
156 int ret;
158 buf = (u8 *) os_readfile(cert, &len);
159 if (buf == NULL) {
160 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
161 cert);
162 return -1;
165 ret = tlsv1_add_cert(chain, buf, len);
166 os_free(buf);
167 return ret;
170 return 0;
175 * tlsv1_set_ca_cert - Set trusted CA certificate(s)
176 * @cred: TLSv1 credentials from tlsv1_cred_alloc()
177 * @cert: File or reference name for X.509 certificate in PEM or DER format
178 * @cert_blob: cert as inlined data or %NULL if not used
179 * @cert_blob_len: ca_cert_blob length
180 * @path: Path to CA certificates (not yet supported)
181 * Returns: 0 on success, -1 on failure
183 int tlsv1_set_ca_cert(struct tlsv1_credentials *cred, const char *cert,
184 const u8 *cert_blob, size_t cert_blob_len,
185 const char *path)
187 if (tlsv1_set_cert_chain(&cred->trusted_certs, cert,
188 cert_blob, cert_blob_len) < 0)
189 return -1;
191 if (path) {
192 /* TODO: add support for reading number of certificate files */
193 wpa_printf(MSG_INFO, "TLSv1: Use of CA certificate directory "
194 "not yet supported");
195 return -1;
198 return 0;
203 * tlsv1_set_cert - Set certificate
204 * @cred: TLSv1 credentials from tlsv1_cred_alloc()
205 * @cert: File or reference name for X.509 certificate in PEM or DER format
206 * @cert_blob: cert as inlined data or %NULL if not used
207 * @cert_blob_len: cert_blob length
208 * Returns: 0 on success, -1 on failure
210 int tlsv1_set_cert(struct tlsv1_credentials *cred, const char *cert,
211 const u8 *cert_blob, size_t cert_blob_len)
213 return tlsv1_set_cert_chain(&cred->cert, cert,
214 cert_blob, cert_blob_len);
218 static struct crypto_private_key * tlsv1_set_key_pem(const u8 *key, size_t len)
220 const u8 *pos, *end;
221 unsigned char *der;
222 size_t der_len;
223 struct crypto_private_key *pkey;
225 pos = search_tag(pem_key_begin, key, len);
226 if (!pos) {
227 pos = search_tag(pem_key2_begin, key, len);
228 if (!pos)
229 return NULL;
230 pos += os_strlen(pem_key2_begin);
231 end = search_tag(pem_key2_end, pos, key + len - pos);
232 if (!end)
233 return NULL;
234 } else {
235 pos += os_strlen(pem_key_begin);
236 end = search_tag(pem_key_end, pos, key + len - pos);
237 if (!end)
238 return NULL;
241 der = base64_decode(pos, end - pos, &der_len);
242 if (!der)
243 return NULL;
244 pkey = crypto_private_key_import(der, der_len, NULL);
245 os_free(der);
246 return pkey;
250 static struct crypto_private_key * tlsv1_set_key_enc_pem(const u8 *key,
251 size_t len,
252 const char *passwd)
254 const u8 *pos, *end;
255 unsigned char *der;
256 size_t der_len;
257 struct crypto_private_key *pkey;
259 if (passwd == NULL)
260 return NULL;
261 pos = search_tag(pem_key_enc_begin, key, len);
262 if (!pos)
263 return NULL;
264 pos += os_strlen(pem_key_enc_begin);
265 end = search_tag(pem_key_enc_end, pos, key + len - pos);
266 if (!end)
267 return NULL;
269 der = base64_decode(pos, end - pos, &der_len);
270 if (!der)
271 return NULL;
272 pkey = crypto_private_key_import(der, der_len, passwd);
273 os_free(der);
274 return pkey;
278 static int tlsv1_set_key(struct tlsv1_credentials *cred,
279 const u8 *key, size_t len, const char *passwd)
281 cred->key = crypto_private_key_import(key, len, passwd);
282 if (cred->key == NULL)
283 cred->key = tlsv1_set_key_pem(key, len);
284 if (cred->key == NULL)
285 cred->key = tlsv1_set_key_enc_pem(key, len, passwd);
286 if (cred->key == NULL) {
287 wpa_printf(MSG_INFO, "TLSv1: Failed to parse private key");
288 return -1;
290 return 0;
295 * tlsv1_set_private_key - Set private key
296 * @cred: TLSv1 credentials from tlsv1_cred_alloc()
297 * @private_key: File or reference name for the key in PEM or DER format
298 * @private_key_passwd: Passphrase for decrypted private key, %NULL if no
299 * passphrase is used.
300 * @private_key_blob: private_key as inlined data or %NULL if not used
301 * @private_key_blob_len: private_key_blob length
302 * Returns: 0 on success, -1 on failure
304 int tlsv1_set_private_key(struct tlsv1_credentials *cred,
305 const char *private_key,
306 const char *private_key_passwd,
307 const u8 *private_key_blob,
308 size_t private_key_blob_len)
310 crypto_private_key_free(cred->key);
311 cred->key = NULL;
313 if (private_key_blob)
314 return tlsv1_set_key(cred, private_key_blob,
315 private_key_blob_len,
316 private_key_passwd);
318 if (private_key) {
319 u8 *buf;
320 size_t len;
321 int ret;
323 buf = (u8 *) os_readfile(private_key, &len);
324 if (buf == NULL) {
325 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
326 private_key);
327 return -1;
330 ret = tlsv1_set_key(cred, buf, len, private_key_passwd);
331 os_free(buf);
332 return ret;
335 return 0;
339 static int tlsv1_set_dhparams_der(struct tlsv1_credentials *cred,
340 const u8 *dh, size_t len)
342 struct asn1_hdr hdr;
343 const u8 *pos, *end;
345 pos = dh;
346 end = dh + len;
349 * DHParameter ::= SEQUENCE {
350 * prime INTEGER, -- p
351 * base INTEGER, -- g
352 * privateValueLength INTEGER OPTIONAL }
355 /* DHParamer ::= SEQUENCE */
356 if (asn1_get_next(pos, len, &hdr) < 0 ||
357 hdr.class != ASN1_CLASS_UNIVERSAL ||
358 hdr.tag != ASN1_TAG_SEQUENCE) {
359 wpa_printf(MSG_DEBUG, "DH: DH parameters did not start with a "
360 "valid SEQUENCE - found class %d tag 0x%x",
361 hdr.class, hdr.tag);
362 return -1;
364 pos = hdr.payload;
366 /* prime INTEGER */
367 if (asn1_get_next(pos, end - pos, &hdr) < 0)
368 return -1;
370 if (hdr.class != ASN1_CLASS_UNIVERSAL ||
371 hdr.tag != ASN1_TAG_INTEGER) {
372 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for p; "
373 "class=%d tag=0x%x", hdr.class, hdr.tag);
374 return -1;
377 wpa_hexdump(MSG_MSGDUMP, "DH: prime (p)", hdr.payload, hdr.length);
378 if (hdr.length == 0)
379 return -1;
380 os_free(cred->dh_p);
381 cred->dh_p = os_malloc(hdr.length);
382 if (cred->dh_p == NULL)
383 return -1;
384 os_memcpy(cred->dh_p, hdr.payload, hdr.length);
385 cred->dh_p_len = hdr.length;
386 pos = hdr.payload + hdr.length;
388 /* base INTEGER */
389 if (asn1_get_next(pos, end - pos, &hdr) < 0)
390 return -1;
392 if (hdr.class != ASN1_CLASS_UNIVERSAL ||
393 hdr.tag != ASN1_TAG_INTEGER) {
394 wpa_printf(MSG_DEBUG, "DH: No INTEGER tag found for g; "
395 "class=%d tag=0x%x", hdr.class, hdr.tag);
396 return -1;
399 wpa_hexdump(MSG_MSGDUMP, "DH: base (g)", hdr.payload, hdr.length);
400 if (hdr.length == 0)
401 return -1;
402 os_free(cred->dh_g);
403 cred->dh_g = os_malloc(hdr.length);
404 if (cred->dh_g == NULL)
405 return -1;
406 os_memcpy(cred->dh_g, hdr.payload, hdr.length);
407 cred->dh_g_len = hdr.length;
409 return 0;
413 static const char *pem_dhparams_begin = "-----BEGIN DH PARAMETERS-----";
414 static const char *pem_dhparams_end = "-----END DH PARAMETERS-----";
417 static int tlsv1_set_dhparams_blob(struct tlsv1_credentials *cred,
418 const u8 *buf, size_t len)
420 const u8 *pos, *end;
421 unsigned char *der;
422 size_t der_len;
424 pos = search_tag(pem_dhparams_begin, buf, len);
425 if (!pos) {
426 wpa_printf(MSG_DEBUG, "TLSv1: No PEM dhparams tag found - "
427 "assume DER format");
428 return tlsv1_set_dhparams_der(cred, buf, len);
431 wpa_printf(MSG_DEBUG, "TLSv1: Converting PEM format dhparams into DER "
432 "format");
434 pos += os_strlen(pem_dhparams_begin);
435 end = search_tag(pem_dhparams_end, pos, buf + len - pos);
436 if (end == NULL) {
437 wpa_printf(MSG_INFO, "TLSv1: Could not find PEM dhparams end "
438 "tag (%s)", pem_dhparams_end);
439 return -1;
442 der = base64_decode(pos, end - pos, &der_len);
443 if (der == NULL) {
444 wpa_printf(MSG_INFO, "TLSv1: Could not decode PEM dhparams");
445 return -1;
448 if (tlsv1_set_dhparams_der(cred, der, der_len) < 0) {
449 wpa_printf(MSG_INFO, "TLSv1: Failed to parse PEM dhparams "
450 "DER conversion");
451 os_free(der);
452 return -1;
455 os_free(der);
457 return 0;
462 * tlsv1_set_dhparams - Set Diffie-Hellman parameters
463 * @cred: TLSv1 credentials from tlsv1_cred_alloc()
464 * @dh_file: File or reference name for the DH params in PEM or DER format
465 * @dh_blob: DH params as inlined data or %NULL if not used
466 * @dh_blob_len: dh_blob length
467 * Returns: 0 on success, -1 on failure
469 int tlsv1_set_dhparams(struct tlsv1_credentials *cred, const char *dh_file,
470 const u8 *dh_blob, size_t dh_blob_len)
472 if (dh_blob)
473 return tlsv1_set_dhparams_blob(cred, dh_blob, dh_blob_len);
475 if (dh_file) {
476 u8 *buf;
477 size_t len;
478 int ret;
480 buf = (u8 *) os_readfile(dh_file, &len);
481 if (buf == NULL) {
482 wpa_printf(MSG_INFO, "TLSv1: Failed to read '%s'",
483 dh_file);
484 return -1;
487 ret = tlsv1_set_dhparams_blob(cred, buf, len);
488 os_free(buf);
489 return ret;
492 return 0;