Changeset View
Changeset View
Standalone View
Standalone View
lib/libve/brf.c
- This file was added.
Property | Old Value | New Value |
---|---|---|
svn:eol-style | null | native \ No newline at end of property |
svn:keywords | null | FreeBSD=%H \ No newline at end of property |
svn:mime-type | null | text/plain \ No newline at end of property |
// The functions here are derrived from BearSSL/tools/*.c | |||||
// When that is refactored suitably we can use them directly. | |||||
/* | |||||
* Copyright (c) 2016 Thomas Pornin <pornin@bolet.org> | |||||
* | |||||
* Permission is hereby granted, free of charge, to any person obtaining | |||||
* a copy of this software and associated documentation files (the | |||||
* "Software"), to deal in the Software without restriction, including | |||||
* without limitation the rights to use, copy, modify, merge, publish, | |||||
* distribute, sublicense, and/or sell copies of the Software, and to | |||||
* permit persons to whom the Software is furnished to do so, subject to | |||||
* the following conditions: | |||||
* | |||||
* The above copyright notice and this permission notice shall be | |||||
* included in all copies or substantial portions of the Software. | |||||
* | |||||
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, | |||||
* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF | |||||
* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND | |||||
* NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS | |||||
* BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN | |||||
* ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN | |||||
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE | |||||
* SOFTWARE. | |||||
*/ | |||||
#include <sys/cdefs.h> | |||||
__FBSDID("$FreeBSD$"); | |||||
#define NEED_BRSSL_H | |||||
#include "libve-priv.h" | |||||
#include <brssl.h> | |||||
static int | |||||
is_ign(int c) | |||||
{ | |||||
if (c == 0) { | |||||
return (0); | |||||
} | |||||
if (c <= 32 || c == '-' || c == '_' || c == '.' | |||||
|| c == '/' || c == '+' || c == ':') | |||||
{ | |||||
return (1); | |||||
} | |||||
return (0); | |||||
} | |||||
/* | |||||
* Get next non-ignored character, normalised: | |||||
* ASCII letters are converted to lowercase | |||||
* control characters, space, '-', '_', '.', '/', '+' and ':' are ignored | |||||
* A terminating zero is returned as 0. | |||||
*/ | |||||
static int | |||||
next_char(const char **ps, const char *limit) | |||||
{ | |||||
for (;;) { | |||||
int c; | |||||
if (*ps == limit) { | |||||
return (0); | |||||
} | |||||
c = *(*ps) ++; | |||||
if (c == 0) { | |||||
return (0); | |||||
} | |||||
if (c >= 'A' && c <= 'Z') { | |||||
c += 'a' - 'A'; | |||||
} | |||||
if (!is_ign(c)) { | |||||
return (c); | |||||
} | |||||
} | |||||
} | |||||
/* | |||||
* Partial string equality comparison, with normalisation. | |||||
*/ | |||||
static int | |||||
eqstr_chunk(const char *s1, size_t s1_len, const char *s2, size_t s2_len) | |||||
{ | |||||
const char *lim1, *lim2; | |||||
lim1 = s1 + s1_len; | |||||
lim2 = s2 + s2_len; | |||||
for (;;) { | |||||
int c1, c2; | |||||
c1 = next_char(&s1, lim1); | |||||
c2 = next_char(&s2, lim2); | |||||
if (c1 != c2) { | |||||
return (0); | |||||
} | |||||
if (c1 == 0) { | |||||
return (1); | |||||
} | |||||
} | |||||
} | |||||
/* see brssl.h */ | |||||
int | |||||
eqstr(const char *s1, const char *s2) | |||||
{ | |||||
return (eqstr_chunk(s1, strlen(s1), s2, strlen(s2))); | |||||
} | |||||
int | |||||
looks_like_DER(const unsigned char *buf, size_t len) | |||||
{ | |||||
int fb; | |||||
size_t dlen; | |||||
if (len < 2) { | |||||
return (0); | |||||
} | |||||
if (*buf ++ != 0x30) { | |||||
return (0); | |||||
} | |||||
fb = *buf ++; | |||||
len -= 2; | |||||
if (fb < 0x80) { | |||||
return ((size_t)fb == len); | |||||
} else if (fb == 0x80) { | |||||
return (0); | |||||
} else { | |||||
fb -= 0x80; | |||||
if (len < (size_t)fb + 2) { | |||||
return (0); | |||||
} | |||||
len -= (size_t)fb; | |||||
dlen = 0; | |||||
while (fb -- > 0) { | |||||
if (dlen > (len >> 8)) { | |||||
return (0); | |||||
} | |||||
dlen = (dlen << 8) + (size_t)*buf ++; | |||||
} | |||||
return (dlen == len); | |||||
} | |||||
} | |||||
static void | |||||
vblob_append(void *cc, const void *data, size_t len) | |||||
{ | |||||
bvector *bv; | |||||
bv = cc; | |||||
VEC_ADDMANY(*bv, data, len); | |||||
} | |||||
void | |||||
free_pem_object_contents(pem_object *po) | |||||
{ | |||||
if (po != NULL) { | |||||
xfree(po->name); | |||||
xfree(po->data); | |||||
} | |||||
} | |||||
pem_object * | |||||
decode_pem(const void *src, size_t len, size_t *num) | |||||
{ | |||||
VECTOR(pem_object) pem_list = VEC_INIT; | |||||
br_pem_decoder_context pc; | |||||
pem_object po, *pos; | |||||
const unsigned char *buf; | |||||
bvector bv = VEC_INIT; | |||||
int inobj; | |||||
int extra_nl; | |||||
*num = 0; | |||||
br_pem_decoder_init(&pc); | |||||
buf = src; | |||||
inobj = 0; | |||||
po.name = NULL; | |||||
po.data = NULL; | |||||
po.data_len = 0; | |||||
extra_nl = 1; | |||||
while (len > 0) { | |||||
size_t tlen; | |||||
tlen = br_pem_decoder_push(&pc, buf, len); | |||||
buf += tlen; | |||||
len -= tlen; | |||||
switch (br_pem_decoder_event(&pc)) { | |||||
case BR_PEM_BEGIN_OBJ: | |||||
po.name = xstrdup(br_pem_decoder_name(&pc)); | |||||
br_pem_decoder_setdest(&pc, vblob_append, &bv); | |||||
inobj = 1; | |||||
break; | |||||
case BR_PEM_END_OBJ: | |||||
if (inobj) { | |||||
po.data = VEC_TOARRAY(bv); | |||||
po.data_len = VEC_LEN(bv); | |||||
VEC_ADD(pem_list, po); | |||||
VEC_CLEAR(bv); | |||||
po.name = NULL; | |||||
po.data = NULL; | |||||
po.data_len = 0; | |||||
inobj = 0; | |||||
} | |||||
break; | |||||
case BR_PEM_ERROR: | |||||
xfree(po.name); | |||||
VEC_CLEAR(bv); | |||||
ve_error_set("ERROR: invalid PEM encoding"); | |||||
VEC_CLEAREXT(pem_list, &free_pem_object_contents); | |||||
return (NULL); | |||||
} | |||||
/* | |||||
* We add an extra newline at the end, in order to | |||||
* support PEM files that lack the newline on their last | |||||
* line (this is somwehat invalid, but PEM format is not | |||||
* standardised and such files do exist in the wild, so | |||||
* we'd better accept them). | |||||
*/ | |||||
if (len == 0 && extra_nl) { | |||||
extra_nl = 0; | |||||
buf = (const unsigned char *)"\n"; | |||||
len = 1; | |||||
} | |||||
} | |||||
if (inobj) { | |||||
ve_error_set("ERROR: unfinished PEM object"); | |||||
xfree(po.name); | |||||
VEC_CLEAR(bv); | |||||
VEC_CLEAREXT(pem_list, &free_pem_object_contents); | |||||
return (NULL); | |||||
} | |||||
*num = VEC_LEN(pem_list); | |||||
VEC_ADD(pem_list, po); | |||||
pos = VEC_TOARRAY(pem_list); | |||||
VEC_CLEAR(pem_list); | |||||
return (pos); | |||||
} | |||||
br_x509_certificate * | |||||
parse_certificates(unsigned char *buf, size_t len, size_t *num) | |||||
{ | |||||
VECTOR(br_x509_certificate) cert_list = VEC_INIT; | |||||
pem_object *pos; | |||||
size_t u, num_pos; | |||||
br_x509_certificate *xcs; | |||||
br_x509_certificate dummy; | |||||
*num = 0; | |||||
/* | |||||
* Check for a DER-encoded certificate. | |||||
*/ | |||||
if (looks_like_DER(buf, len)) { | |||||
xcs = xmalloc(2 * sizeof *xcs); | |||||
xcs[0].data = buf; | |||||
xcs[0].data_len = len; | |||||
xcs[1].data = NULL; | |||||
xcs[1].data_len = 0; | |||||
*num = 1; | |||||
return (xcs); | |||||
} | |||||
pos = decode_pem(buf, len, &num_pos); | |||||
if (pos == NULL) { | |||||
return (NULL); | |||||
} | |||||
for (u = 0; u < num_pos; u ++) { | |||||
if (eqstr(pos[u].name, "CERTIFICATE") | |||||
|| eqstr(pos[u].name, "X509 CERTIFICATE")) | |||||
{ | |||||
br_x509_certificate xc; | |||||
xc.data = pos[u].data; | |||||
xc.data_len = pos[u].data_len; | |||||
pos[u].data = NULL; | |||||
VEC_ADD(cert_list, xc); | |||||
} | |||||
} | |||||
for (u = 0; u < num_pos; u ++) { | |||||
free_pem_object_contents(&pos[u]); | |||||
} | |||||
xfree(pos); | |||||
if (VEC_LEN(cert_list) == 0) { | |||||
return (NULL); | |||||
} | |||||
*num = VEC_LEN(cert_list); | |||||
dummy.data = NULL; | |||||
dummy.data_len = 0; | |||||
VEC_ADD(cert_list, dummy); | |||||
xcs = VEC_TOARRAY(cert_list); | |||||
VEC_CLEAR(cert_list); | |||||
return (xcs); | |||||
} | |||||
br_x509_certificate * | |||||
read_certificates(const char *fname, size_t *num) | |||||
{ | |||||
br_x509_certificate *xcs; | |||||
unsigned char *buf; | |||||
size_t len; | |||||
*num = 0; | |||||
/* | |||||
* TODO: reading the whole file is crude; we could parse them | |||||
* in a streamed fashion. But it does not matter much in practice. | |||||
*/ | |||||
buf = read_file(fname, &len); | |||||
if (buf == NULL) { | |||||
return (NULL); | |||||
} | |||||
xcs = parse_certificates(buf, len, num); | |||||
if (xcs == NULL) { | |||||
ve_error_set("ERROR: no certificate in file '%s'\n", fname); | |||||
} | |||||
xfree(buf); | |||||
return (xcs); | |||||
} | |||||
/* see brssl.h */ | |||||
void | |||||
free_certificates(br_x509_certificate *certs, size_t num) | |||||
{ | |||||
size_t u; | |||||
for (u = 0; u < num; u ++) { | |||||
xfree(certs[u].data); | |||||
} | |||||
xfree(certs); | |||||
} | |||||
static void | |||||
dn_append(void *ctx, const void *buf, size_t len) | |||||
{ | |||||
VEC_ADDMANY(*(bvector *)ctx, buf, len); | |||||
} | |||||
int | |||||
certificate_to_trust_anchor_inner(br_x509_trust_anchor *ta, | |||||
br_x509_certificate *xc) | |||||
{ | |||||
br_x509_decoder_context dc; | |||||
bvector vdn = VEC_INIT; | |||||
br_x509_pkey *pk; | |||||
br_x509_decoder_init(&dc, dn_append, &vdn); | |||||
br_x509_decoder_push(&dc, xc->data, xc->data_len); | |||||
pk = br_x509_decoder_get_pkey(&dc); | |||||
if (pk == NULL) { | |||||
ve_error_set("ERROR: CA decoding failed with error %d\n", | |||||
br_x509_decoder_last_error(&dc)); | |||||
VEC_CLEAR(vdn); | |||||
return (-1); | |||||
} | |||||
ta->dn.data = VEC_TOARRAY(vdn); | |||||
ta->dn.len = VEC_LEN(vdn); | |||||
VEC_CLEAR(vdn); | |||||
ta->flags = 0; | |||||
if (br_x509_decoder_isCA(&dc)) { | |||||
ta->flags |= BR_X509_TA_CA; | |||||
} | |||||
switch (pk->key_type) { | |||||
case BR_KEYTYPE_RSA: | |||||
ta->pkey.key_type = BR_KEYTYPE_RSA; | |||||
ta->pkey.key.rsa.n = xblobdup(pk->key.rsa.n, pk->key.rsa.nlen); | |||||
ta->pkey.key.rsa.nlen = pk->key.rsa.nlen; | |||||
ta->pkey.key.rsa.e = xblobdup(pk->key.rsa.e, pk->key.rsa.elen); | |||||
ta->pkey.key.rsa.elen = pk->key.rsa.elen; | |||||
break; | |||||
case BR_KEYTYPE_EC: | |||||
ta->pkey.key_type = BR_KEYTYPE_EC; | |||||
ta->pkey.key.ec.curve = pk->key.ec.curve; | |||||
ta->pkey.key.ec.q = xblobdup(pk->key.ec.q, pk->key.ec.qlen); | |||||
ta->pkey.key.ec.qlen = pk->key.ec.qlen; | |||||
break; | |||||
default: | |||||
ve_error_set("ERROR: unsupported public key type in CA\n"); | |||||
xfree(ta->dn.data); | |||||
return (-1); | |||||
} | |||||
return (0); | |||||
} | |||||
/* see brssl.h */ | |||||
void | |||||
free_ta_contents(br_x509_trust_anchor *ta) | |||||
{ | |||||
xfree(ta->dn.data); | |||||
switch (ta->pkey.key_type) { | |||||
case BR_KEYTYPE_RSA: | |||||
xfree(ta->pkey.key.rsa.n); | |||||
xfree(ta->pkey.key.rsa.e); | |||||
break; | |||||
case BR_KEYTYPE_EC: | |||||
xfree(ta->pkey.key.ec.q); | |||||
break; | |||||
} | |||||
} |