/src/FreeRDP/libfreerdp/crypto/certificate.c
Line | Count | Source |
1 | | /** |
2 | | * FreeRDP: A Remote Desktop Protocol Implementation |
3 | | * Certificate Handling |
4 | | * |
5 | | * Copyright 2011 Jiten Pathy |
6 | | * Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com> |
7 | | * Copyright 2015 Thincast Technologies GmbH |
8 | | * Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com> |
9 | | * Copyright 2023 Armin Novak <anovak@thincast.com> |
10 | | * Copyright 2023 Thincast Technologies GmbH |
11 | | * |
12 | | * Licensed under the Apache License, Version 2.0 (the "License"); |
13 | | * you may not use this file except in compliance with the License. |
14 | | * You may obtain a copy of the License at |
15 | | * |
16 | | * http://www.apache.org/licenses/LICENSE-2.0 |
17 | | * |
18 | | * Unless required by applicable law or agreed to in writing, software |
19 | | * distributed under the License is distributed on an "AS IS" BASIS, |
20 | | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
21 | | * See the License for the specific language governing permissions and |
22 | | * limitations under the License. |
23 | | */ |
24 | | |
25 | | #include <freerdp/config.h> |
26 | | |
27 | | #include <errno.h> |
28 | | #include <stdio.h> |
29 | | #include <string.h> |
30 | | |
31 | | #include <winpr/assert.h> |
32 | | #include <winpr/wtypes.h> |
33 | | #include <winpr/crt.h> |
34 | | #include <winpr/file.h> |
35 | | #include <winpr/print.h> |
36 | | #include <winpr/crypto.h> |
37 | | |
38 | | #include <freerdp/crypto/certificate.h> |
39 | | |
40 | | #include <openssl/err.h> |
41 | | #include <openssl/pem.h> |
42 | | #include <openssl/rsa.h> |
43 | | #include <openssl/bn.h> |
44 | | |
45 | | #if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR >= 3) |
46 | | #include <openssl/core_names.h> |
47 | | #include <openssl/param_build.h> |
48 | | #include <openssl/evp.h> |
49 | | #include <openssl/x509.h> |
50 | | #endif |
51 | | |
52 | | #include "certificate.h" |
53 | | #include "cert_common.h" |
54 | | #include "crypto.h" |
55 | | |
56 | | #include "x509_utils.h" |
57 | | #include "privatekey.h" |
58 | | #include "opensslcompat.h" |
59 | | |
60 | | #define TAG FREERDP_TAG("core") |
61 | | |
62 | | #ifdef WITH_DEBUG_CERTIFICATE |
63 | | #define CERTIFICATE_TAG FREERDP_TAG("core.certificate") |
64 | | #define DEBUG_CERTIFICATE(...) WLog_DBG(TAG, __VA_ARGS__) |
65 | | #else |
66 | | #define DEBUG_CERTIFICATE(...) \ |
67 | 0 | do \ |
68 | 0 | { \ |
69 | 0 | } while (0) |
70 | | #endif |
71 | | |
72 | | #define TSSK_KEY_LENGTH 64 |
73 | | |
74 | | struct rdp_CertBlob |
75 | | { |
76 | | UINT32 length; |
77 | | BYTE* data; |
78 | | }; |
79 | | typedef struct rdp_CertBlob rdpCertBlob; |
80 | | |
81 | | struct rdp_X509CertChain |
82 | | { |
83 | | UINT32 count; |
84 | | rdpCertBlob* array; |
85 | | }; |
86 | | typedef struct rdp_X509CertChain rdpX509CertChain; |
87 | | |
88 | | struct rdp_certificate |
89 | | { |
90 | | X509* x509; |
91 | | STACK_OF(X509) * chain; |
92 | | |
93 | | rdpCertInfo cert_info; |
94 | | rdpX509CertChain x509_cert_chain; |
95 | | }; |
96 | | |
97 | | /** |
98 | | * |
99 | | * X.509 Certificate Structure |
100 | | * |
101 | | * Certificate ::= SEQUENCE |
102 | | * { |
103 | | * tbsCertificate TBSCertificate, |
104 | | * signatureAlgorithm AlgorithmIdentifier, |
105 | | * signatureValue BIT_STRING |
106 | | * } |
107 | | * |
108 | | * TBSCertificate ::= SEQUENCE |
109 | | * { |
110 | | * version [0] EXPLICIT Version DEFAULT v1, |
111 | | * serialNumber CertificateSerialNumber, |
112 | | * signature AlgorithmIdentifier, |
113 | | * issuer Name, |
114 | | * validity Validity, |
115 | | * subject Name, |
116 | | * subjectPublicKeyInfo SubjectPublicKeyInfo, |
117 | | * issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL, |
118 | | * subjectUniqueId [2] IMPLICIT UniqueIdentifier OPTIONAL, |
119 | | * extensions [3] EXPLICIT Extensions OPTIONAL |
120 | | * } |
121 | | * |
122 | | * Version ::= INTEGER { v1(0), v2(1), v3(2) } |
123 | | * |
124 | | * CertificateSerialNumber ::= INTEGER |
125 | | * |
126 | | * AlgorithmIdentifier ::= SEQUENCE |
127 | | * { |
128 | | * algorithm OBJECT_IDENTIFIER, |
129 | | * parameters ANY DEFINED BY algorithm OPTIONAL |
130 | | * } |
131 | | * |
132 | | * Name ::= CHOICE { RDNSequence } |
133 | | * |
134 | | * RDNSequence ::= SEQUENCE OF RelativeDistinguishedName |
135 | | * |
136 | | * RelativeDistinguishedName ::= SET OF AttributeTypeAndValue |
137 | | * |
138 | | * AttributeTypeAndValue ::= SEQUENCE |
139 | | * { |
140 | | * type AttributeType, |
141 | | * value AttributeValue |
142 | | * } |
143 | | * |
144 | | * AttributeType ::= OBJECT_IDENTIFIER |
145 | | * |
146 | | * AttributeValue ::= ANY DEFINED BY AttributeType |
147 | | * |
148 | | * Validity ::= SEQUENCE |
149 | | * { |
150 | | * notBefore Time, |
151 | | * notAfter Time |
152 | | * } |
153 | | * |
154 | | * Time ::= CHOICE |
155 | | * { |
156 | | * utcTime UTCTime, |
157 | | * generalTime GeneralizedTime |
158 | | * } |
159 | | * |
160 | | * UniqueIdentifier ::= BIT_STRING |
161 | | * |
162 | | * SubjectPublicKeyInfo ::= SEQUENCE |
163 | | * { |
164 | | * algorithm AlgorithmIdentifier, |
165 | | * subjectPublicKey BIT_STRING |
166 | | * } |
167 | | * |
168 | | * RSAPublicKey ::= SEQUENCE |
169 | | * { |
170 | | * modulus INTEGER |
171 | | * publicExponent INTEGER |
172 | | * } |
173 | | * |
174 | | * Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension |
175 | | * |
176 | | * Extension ::= SEQUENCE |
177 | | * { |
178 | | * extnID OBJECT_IDENTIFIER |
179 | | * critical BOOLEAN DEFAULT FALSE, |
180 | | * extnValue OCTET_STRING |
181 | | * } |
182 | | * |
183 | | */ |
184 | | |
185 | | static const char rsa_magic[4] = { 'R', 'S', 'A', '1' }; |
186 | | |
187 | | static const char* certificate_read_errors[] = { "Certificate tag", |
188 | | "TBSCertificate", |
189 | | "Explicit Contextual Tag [0]", |
190 | | "version", |
191 | | "CertificateSerialNumber", |
192 | | "AlgorithmIdentifier", |
193 | | "Issuer Name", |
194 | | "Validity", |
195 | | "Subject Name", |
196 | | "SubjectPublicKeyInfo Tag", |
197 | | "subjectPublicKeyInfo::AlgorithmIdentifier", |
198 | | "subjectPublicKeyInfo::subjectPublicKey", |
199 | | "RSAPublicKey Tag", |
200 | | "modulusLength", |
201 | | "zero padding", |
202 | | "modulusLength", |
203 | | "modulus", |
204 | | "publicExponent length", |
205 | | "publicExponent" }; |
206 | | |
207 | | static const BYTE initial_signature[] = { |
208 | | 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
209 | | 0x00, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
210 | | 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, |
211 | | 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x01 |
212 | | }; |
213 | | |
214 | | #if defined(CERT_VALIDATE_RSA) |
215 | | static const BYTE tssk_exponent[] = { 0x5b, 0x7b, 0x88, 0xc0 }; |
216 | | #endif |
217 | | |
218 | | static void certificate_free_int(rdpCertificate* certificate); |
219 | | static BOOL cert_clone_int(rdpCertificate* dst, const rdpCertificate* src); |
220 | | |
221 | | /* [MS-RDPBCGR] 5.3.3.2 X.509 Certificate Chains: |
222 | | * |
223 | | * More detail[MS-RDPELE] section 2.2.1.4.2. |
224 | | */ |
225 | | static BOOL cert_blob_copy(rdpCertBlob* dst, const rdpCertBlob* src); |
226 | | static void cert_blob_free(rdpCertBlob* blob); |
227 | | static BOOL cert_blob_write(const rdpCertBlob* blob, wStream* s); |
228 | | static BOOL cert_blob_read(rdpCertBlob* blob, wStream* s); |
229 | | |
230 | | BOOL cert_blob_read(rdpCertBlob* blob, wStream* s) |
231 | 0 | { |
232 | 0 | UINT32 certLength = 0; |
233 | 0 | WINPR_ASSERT(blob); |
234 | 0 | cert_blob_free(blob); |
235 | |
|
236 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) |
237 | 0 | goto fail; |
238 | | |
239 | 0 | Stream_Read_UINT32(s, certLength); |
240 | |
|
241 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, certLength)) |
242 | 0 | goto fail; |
243 | | |
244 | 0 | DEBUG_CERTIFICATE("X.509 Certificate length:%" PRIu32 "", certLength); |
245 | 0 | blob->data = (BYTE*)malloc(certLength); |
246 | |
|
247 | 0 | if (!blob->data) |
248 | 0 | goto fail; |
249 | | |
250 | 0 | Stream_Read(s, blob->data, certLength); |
251 | 0 | blob->length = certLength; |
252 | |
|
253 | 0 | return TRUE; |
254 | | |
255 | 0 | fail: |
256 | 0 | cert_blob_free(blob); |
257 | 0 | return FALSE; |
258 | 0 | } |
259 | | |
260 | | BOOL cert_blob_write(const rdpCertBlob* blob, wStream* s) |
261 | 0 | { |
262 | 0 | WINPR_ASSERT(blob); |
263 | |
|
264 | 0 | if (!Stream_EnsureRemainingCapacity(s, 4 + blob->length)) |
265 | 0 | return FALSE; |
266 | | |
267 | 0 | Stream_Write_UINT32(s, blob->length); |
268 | 0 | Stream_Write(s, blob->data, blob->length); |
269 | 0 | return TRUE; |
270 | 0 | } |
271 | | |
272 | | void cert_blob_free(rdpCertBlob* blob) |
273 | 0 | { |
274 | 0 | if (!blob) |
275 | 0 | return; |
276 | 0 | free(blob->data); |
277 | 0 | blob->data = nullptr; |
278 | 0 | blob->length = 0; |
279 | 0 | } |
280 | | |
281 | | /** |
282 | | * Read X.509 Certificate |
283 | | */ |
284 | | |
285 | | static BOOL is_rsa_key(const X509* x509) |
286 | 129 | { |
287 | 129 | EVP_PKEY* evp = X509_get0_pubkey(x509); |
288 | 129 | if (!evp) |
289 | 87 | return FALSE; |
290 | | |
291 | 42 | return (EVP_PKEY_id(evp) == EVP_PKEY_RSA); |
292 | 129 | } |
293 | | |
294 | | static BOOL certificate_read_x509_certificate(const rdpCertBlob* cert, rdpCertInfo* info) |
295 | 0 | { |
296 | 0 | wStream sbuffer = WINPR_C_ARRAY_INIT; |
297 | 0 | wStream* s = nullptr; |
298 | 0 | size_t length = 0; |
299 | 0 | BYTE padding = 0; |
300 | 0 | UINT32 version = 0; |
301 | 0 | size_t modulus_length = 0; |
302 | 0 | size_t exponent_length = 0; |
303 | 0 | int error = 0; |
304 | |
|
305 | 0 | WINPR_ASSERT(cert); |
306 | 0 | WINPR_ASSERT(info); |
307 | |
|
308 | 0 | cert_info_free(info); |
309 | |
|
310 | 0 | s = Stream_StaticConstInit(&sbuffer, cert->data, cert->length); |
311 | |
|
312 | 0 | if (!s) |
313 | 0 | return FALSE; |
314 | | |
315 | 0 | if (!ber_read_sequence_tag(s, &length)) /* Certificate (SEQUENCE) */ |
316 | 0 | goto error; |
317 | | |
318 | 0 | error++; |
319 | |
|
320 | 0 | if (!ber_read_sequence_tag(s, &length)) /* TBSCertificate (SEQUENCE) */ |
321 | 0 | goto error; |
322 | | |
323 | 0 | error++; |
324 | |
|
325 | 0 | if (!ber_read_contextual_tag(s, 0, &length, TRUE)) /* Explicit Contextual Tag [0] */ |
326 | 0 | goto error; |
327 | | |
328 | 0 | error++; |
329 | |
|
330 | 0 | if (!ber_read_integer(s, &version)) /* version (INTEGER) */ |
331 | 0 | goto error; |
332 | | |
333 | 0 | error++; |
334 | 0 | version++; |
335 | | |
336 | | /* serialNumber */ |
337 | 0 | if (!ber_read_integer(s, nullptr)) /* CertificateSerialNumber (INTEGER) */ |
338 | 0 | goto error; |
339 | | |
340 | 0 | error++; |
341 | | |
342 | | /* signature */ |
343 | 0 | if (!ber_read_sequence_tag(s, &length) || |
344 | 0 | !Stream_SafeSeek(s, length)) /* AlgorithmIdentifier (SEQUENCE) */ |
345 | 0 | goto error; |
346 | | |
347 | 0 | error++; |
348 | | |
349 | | /* issuer */ |
350 | 0 | if (!ber_read_sequence_tag(s, &length) || !Stream_SafeSeek(s, length)) /* Name (SEQUENCE) */ |
351 | 0 | goto error; |
352 | | |
353 | 0 | error++; |
354 | | |
355 | | /* validity */ |
356 | 0 | if (!ber_read_sequence_tag(s, &length) || !Stream_SafeSeek(s, length)) /* Validity (SEQUENCE) */ |
357 | 0 | goto error; |
358 | | |
359 | 0 | error++; |
360 | | |
361 | | /* subject */ |
362 | 0 | if (!ber_read_sequence_tag(s, &length) || !Stream_SafeSeek(s, length)) /* Name (SEQUENCE) */ |
363 | 0 | goto error; |
364 | | |
365 | 0 | error++; |
366 | | |
367 | | /* subjectPublicKeyInfo */ |
368 | 0 | if (!ber_read_sequence_tag(s, &length)) /* SubjectPublicKeyInfo (SEQUENCE) */ |
369 | 0 | goto error; |
370 | | |
371 | 0 | error++; |
372 | | |
373 | | /* subjectPublicKeyInfo::AlgorithmIdentifier */ |
374 | 0 | if (!ber_read_sequence_tag(s, &length) || |
375 | 0 | !Stream_SafeSeek(s, length)) /* AlgorithmIdentifier (SEQUENCE) */ |
376 | 0 | goto error; |
377 | | |
378 | 0 | error++; |
379 | | |
380 | | /* subjectPublicKeyInfo::subjectPublicKey */ |
381 | 0 | if (!ber_read_bit_string(s, &length, &padding)) /* BIT_STRING */ |
382 | 0 | goto error; |
383 | | |
384 | 0 | error++; |
385 | | |
386 | | /* RSAPublicKey (SEQUENCE) */ |
387 | 0 | if (!ber_read_sequence_tag(s, &length)) /* SEQUENCE */ |
388 | 0 | goto error; |
389 | | |
390 | 0 | error++; |
391 | |
|
392 | 0 | if (!ber_read_integer_length(s, &modulus_length)) /* modulus (INTEGER) */ |
393 | 0 | goto error; |
394 | | |
395 | 0 | error++; |
396 | | |
397 | | /* skip zero padding, if any */ |
398 | 0 | do |
399 | 0 | { |
400 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 1)) |
401 | 0 | goto error; |
402 | | |
403 | 0 | Stream_Peek_UINT8(s, padding); |
404 | |
|
405 | 0 | if (padding == 0) |
406 | 0 | { |
407 | 0 | if (!Stream_SafeSeek(s, 1)) |
408 | 0 | goto error; |
409 | | |
410 | 0 | modulus_length--; |
411 | 0 | } |
412 | 0 | } while (padding == 0); |
413 | | |
414 | 0 | error++; |
415 | |
|
416 | 0 | if (!cert_info_read_modulus(info, modulus_length, s)) |
417 | 0 | goto error; |
418 | | |
419 | 0 | error++; |
420 | |
|
421 | 0 | if (!ber_read_integer_length(s, &exponent_length)) /* publicExponent (INTEGER) */ |
422 | 0 | goto error; |
423 | | |
424 | 0 | error++; |
425 | |
|
426 | 0 | if (!cert_info_read_exponent(info, exponent_length, s)) |
427 | 0 | goto error; |
428 | 0 | return TRUE; |
429 | 0 | error: |
430 | 0 | WLog_ERR(TAG, "error reading when reading certificate: part=%s error=%d", |
431 | 0 | certificate_read_errors[error], error); |
432 | 0 | cert_info_free(info); |
433 | 0 | return FALSE; |
434 | 0 | } |
435 | | |
436 | | /** |
437 | | * Instantiate new X.509 Certificate Chain. |
438 | | * @param count certificate chain count |
439 | | * @return new X.509 certificate chain |
440 | | */ |
441 | | |
442 | | static BOOL certificate_new_x509_certificate_chain(UINT32 count, wStream* s, |
443 | | rdpX509CertChain* chain) |
444 | 0 | { |
445 | 0 | WINPR_ASSERT(chain); |
446 | |
|
447 | 0 | rdpX509CertChain x509_cert_chain = WINPR_C_ARRAY_INIT; |
448 | 0 | *chain = x509_cert_chain; |
449 | |
|
450 | 0 | if (!Stream_CheckAndLogRequiredCapacityOfSize(TAG, s, count, sizeof(rdpCertBlob))) |
451 | 0 | return FALSE; |
452 | | |
453 | 0 | if (count == 0) |
454 | 0 | return TRUE; |
455 | | |
456 | 0 | x509_cert_chain.array = (rdpCertBlob*)calloc(count, sizeof(rdpCertBlob)); |
457 | 0 | if (!x509_cert_chain.array) |
458 | 0 | return FALSE; |
459 | | |
460 | 0 | x509_cert_chain.count = count; |
461 | |
|
462 | 0 | *chain = x509_cert_chain; |
463 | 0 | return TRUE; |
464 | 0 | } |
465 | | |
466 | | /** |
467 | | * Free X.509 Certificate Chain. |
468 | | * @param x509_cert_chain X.509 certificate chain to be freed |
469 | | */ |
470 | | |
471 | | static void certificate_free_x509_certificate_chain(rdpX509CertChain* x509_cert_chain) |
472 | 133 | { |
473 | 133 | if (!x509_cert_chain) |
474 | 0 | return; |
475 | | |
476 | 133 | if (x509_cert_chain->array) |
477 | 0 | { |
478 | 0 | for (UINT32 i = 0; i < x509_cert_chain->count; i++) |
479 | 0 | { |
480 | 0 | rdpCertBlob* element = &x509_cert_chain->array[i]; |
481 | 0 | cert_blob_free(element); |
482 | 0 | } |
483 | 0 | } |
484 | | |
485 | 133 | free(x509_cert_chain->array); |
486 | 133 | x509_cert_chain->array = nullptr; |
487 | 133 | x509_cert_chain->count = 0; |
488 | 133 | } |
489 | | |
490 | | #if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR >= 3) |
491 | | static OSSL_PARAM* get_params(const BIGNUM* e, const BIGNUM* mod) |
492 | | { |
493 | | WINPR_ASSERT(e); |
494 | | WINPR_ASSERT(mod); |
495 | | |
496 | | OSSL_PARAM* parameters = nullptr; |
497 | | OSSL_PARAM_BLD* param = OSSL_PARAM_BLD_new(); |
498 | | if (!param) |
499 | | { |
500 | | WLog_ERR(TAG, "OSSL_PARAM_BLD_new() failed"); |
501 | | return nullptr; |
502 | | } |
503 | | |
504 | | const int bits = BN_num_bits(e); |
505 | | if ((bits < 0) || (bits > 32)) |
506 | | { |
507 | | WLog_ERR(TAG, "BN_num_bits(e) out of range: 0 <= %d <= 32", bits); |
508 | | goto fail; |
509 | | } |
510 | | |
511 | | { |
512 | | UINT ie = 0; |
513 | | { |
514 | | const int ne = BN_bn2nativepad(e, (BYTE*)&ie, sizeof(ie)); |
515 | | if ((ne < 0) || (ne > 4)) |
516 | | { |
517 | | WLog_ERR(TAG, |
518 | | "BN_bn2nativepad(e, (BYTE*)&ie, sizeof(ie)) out of range: 0<= %d <= 4", |
519 | | ne); |
520 | | goto fail; |
521 | | } |
522 | | } |
523 | | |
524 | | if (OSSL_PARAM_BLD_push_BN(param, OSSL_PKEY_PARAM_RSA_N, mod) != 1) |
525 | | { |
526 | | WLog_ERR(TAG, "OSSL_PARAM_BLD_push_BN(param, OSSL_PKEY_PARAM_RSA_N, mod) failed"); |
527 | | goto fail; |
528 | | } |
529 | | if (OSSL_PARAM_BLD_push_uint(param, OSSL_PKEY_PARAM_RSA_E, ie) != 1) |
530 | | { |
531 | | WLog_ERR(TAG, "OSSL_PARAM_BLD_push_uint(param, OSSL_PKEY_PARAM_RSA_E, ie) failed"); |
532 | | goto fail; |
533 | | } |
534 | | } |
535 | | |
536 | | parameters = OSSL_PARAM_BLD_to_param(param); |
537 | | if (!parameters) |
538 | | WLog_ERR(TAG, "OSSL_PARAM_BLD_to_param(param) failed"); |
539 | | fail: |
540 | | OSSL_PARAM_BLD_free(param); |
541 | | |
542 | | return parameters; |
543 | | } |
544 | | #endif |
545 | | |
546 | | static BOOL update_x509_from_info(rdpCertificate* cert) |
547 | 0 | { |
548 | 0 | BOOL rc = FALSE; |
549 | |
|
550 | 0 | WINPR_ASSERT(cert); |
551 | |
|
552 | 0 | X509_free(cert->x509); |
553 | 0 | cert->x509 = nullptr; |
554 | |
|
555 | 0 | rdpCertInfo* info = &cert->cert_info; |
556 | |
|
557 | 0 | BIGNUM* e = BN_new(); |
558 | 0 | BIGNUM* mod = BN_new(); |
559 | 0 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
560 | 0 | RSA* rsa = RSA_new(); |
561 | 0 | if (!rsa) |
562 | 0 | { |
563 | 0 | WLog_ERR(TAG, "RSA_new() failed"); |
564 | 0 | goto fail; |
565 | 0 | } |
566 | 0 | #endif |
567 | | |
568 | 0 | if (!mod || !e) |
569 | 0 | { |
570 | 0 | WLog_ERR(TAG, "failure: mod=%p, e=%p", WINPR_CXX_COMPAT_CAST(const void*, mod), |
571 | 0 | WINPR_CXX_COMPAT_CAST(const void*, e)); |
572 | 0 | goto fail; |
573 | 0 | } |
574 | | |
575 | 0 | WINPR_ASSERT(info->ModulusLength <= INT_MAX); |
576 | 0 | if (!BN_bin2bn(info->Modulus, (int)info->ModulusLength, mod)) |
577 | 0 | { |
578 | 0 | WLog_ERR(TAG, "BN_bin2bn(info->Modulus, (int)info->ModulusLength, mod) failed"); |
579 | 0 | goto fail; |
580 | 0 | } |
581 | | |
582 | 0 | if (!BN_bin2bn(info->exponent, (int)sizeof(info->exponent), e)) |
583 | 0 | { |
584 | 0 | WLog_ERR(TAG, "BN_bin2bn(info->exponent, (int)sizeof(info->exponent), e) failed"); |
585 | 0 | goto fail; |
586 | 0 | } |
587 | | |
588 | 0 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
589 | 0 | const int rec = RSA_set0_key(rsa, mod, e, nullptr); |
590 | 0 | if (rec != 1) |
591 | 0 | { |
592 | 0 | WLog_ERR(TAG, "RSA_set0_key(rsa, mod, e, nullptr) failed"); |
593 | 0 | goto fail; |
594 | 0 | } |
595 | | |
596 | 0 | cert->x509 = x509_from_rsa(rsa); |
597 | | #else |
598 | | { |
599 | | EVP_PKEY* pkey = nullptr; |
600 | | EVP_PKEY_CTX* ctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr); |
601 | | if (!ctx) |
602 | | { |
603 | | WLog_ERR(TAG, "EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, nullptr) failed"); |
604 | | goto fail2; |
605 | | } |
606 | | |
607 | | { |
608 | | const int xx = EVP_PKEY_fromdata_init(ctx); |
609 | | if (xx != 1) |
610 | | { |
611 | | WLog_ERR(TAG, "EVP_PKEY_fromdata_init(ctx) failed"); |
612 | | goto fail2; |
613 | | } |
614 | | } |
615 | | |
616 | | { |
617 | | OSSL_PARAM* parameters = get_params(e, mod); |
618 | | if (!parameters) |
619 | | goto fail2; |
620 | | |
621 | | { |
622 | | const int rc2 = EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_PUBLIC_KEY, parameters); |
623 | | OSSL_PARAM_free(parameters); |
624 | | if (rc2 <= 0) |
625 | | { |
626 | | WLog_ERR( |
627 | | TAG, |
628 | | "EVP_PKEY_fromdata(ctx, &pkey, EVP_PKEY_PUBLIC_KEY, parameters) failed"); |
629 | | goto fail2; |
630 | | } |
631 | | } |
632 | | } |
633 | | |
634 | | cert->x509 = X509_new(); |
635 | | if (!cert->x509) |
636 | | { |
637 | | WLog_ERR(TAG, "X509_new() failed"); |
638 | | goto fail2; |
639 | | } |
640 | | |
641 | | if (X509_set_pubkey(cert->x509, pkey) != 1) |
642 | | { |
643 | | WLog_ERR(TAG, "X509_set_pubkey(cert->x509, pkey) failed"); |
644 | | X509_free(cert->x509); |
645 | | cert->x509 = nullptr; |
646 | | } |
647 | | fail2: |
648 | | EVP_PKEY_free(pkey); |
649 | | EVP_PKEY_CTX_free(ctx); |
650 | | } |
651 | | #endif |
652 | 0 | if (!cert->x509) |
653 | 0 | goto fail; |
654 | | |
655 | 0 | rc = TRUE; |
656 | |
|
657 | 0 | fail: |
658 | 0 | if (!rc) |
659 | 0 | WLog_ERR(TAG, "failed to update x509 from rdpCertInfo"); |
660 | |
|
661 | 0 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
662 | 0 | if (rsa) |
663 | 0 | RSA_free(rsa); |
664 | 0 | else |
665 | 0 | #endif |
666 | 0 | { |
667 | 0 | BN_free(mod); |
668 | 0 | BN_free(e); |
669 | 0 | } |
670 | 0 | return rc; |
671 | 0 | } |
672 | | |
673 | | static BOOL certificate_process_server_public_key(rdpCertificate* cert, wStream* s, |
674 | | WINPR_ATTR_UNUSED UINT32 length) |
675 | 0 | { |
676 | 0 | char magic[sizeof(rsa_magic)] = WINPR_C_ARRAY_INIT; |
677 | 0 | UINT32 keylen = 0; |
678 | 0 | UINT32 bitlen = 0; |
679 | 0 | UINT32 datalen = 0; |
680 | |
|
681 | 0 | WINPR_ASSERT(cert); |
682 | 0 | WINPR_ASSERT(s); |
683 | |
|
684 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 20)) |
685 | 0 | return FALSE; |
686 | | |
687 | 0 | Stream_Read(s, magic, sizeof(magic)); |
688 | |
|
689 | 0 | if (memcmp(magic, rsa_magic, sizeof(magic)) != 0) |
690 | 0 | { |
691 | 0 | WLog_ERR(TAG, "invalid RSA magic bytes"); |
692 | 0 | return FALSE; |
693 | 0 | } |
694 | | |
695 | 0 | rdpCertInfo* info = &cert->cert_info; |
696 | 0 | cert_info_free(info); |
697 | |
|
698 | 0 | Stream_Read_UINT32(s, keylen); |
699 | 0 | Stream_Read_UINT32(s, bitlen); |
700 | 0 | Stream_Read_UINT32(s, datalen); |
701 | 0 | Stream_Read(s, info->exponent, 4); |
702 | |
|
703 | 0 | if (keylen <= 8) |
704 | 0 | { |
705 | 0 | WLog_ERR(TAG, "Invalid RSA keylen=%" PRIu32 " <= 8", keylen); |
706 | 0 | return FALSE; |
707 | 0 | } |
708 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, keylen)) |
709 | 0 | return FALSE; |
710 | 0 | if (keylen != (bitlen / 8ull) + 8ull) |
711 | 0 | { |
712 | 0 | WLog_ERR(TAG, "Invalid RSA key bitlen %" PRIu32 ", expected %" PRIu32, bitlen, |
713 | 0 | (keylen - 8) * 8); |
714 | 0 | return FALSE; |
715 | 0 | } |
716 | 0 | if (datalen != (bitlen / 8ull) - 1ull) |
717 | 0 | { |
718 | 0 | WLog_ERR(TAG, "Invalid RSA key datalen %" PRIu32 ", expected %llu", datalen, |
719 | 0 | (1ull * bitlen / 8ull) - 1ull); |
720 | 0 | return FALSE; |
721 | 0 | } |
722 | 0 | info->ModulusLength = keylen - 8; |
723 | 0 | BYTE* tmp = realloc(info->Modulus, info->ModulusLength); |
724 | |
|
725 | 0 | if (!tmp) |
726 | 0 | { |
727 | 0 | WLog_ERR(TAG, "Failed to reallocate modulus of length %" PRIu32, info->ModulusLength); |
728 | 0 | return FALSE; |
729 | 0 | } |
730 | 0 | info->Modulus = tmp; |
731 | |
|
732 | 0 | Stream_Read(s, info->Modulus, info->ModulusLength); |
733 | 0 | Stream_Seek(s, 8); /* 8 bytes of zero padding */ |
734 | 0 | return update_x509_from_info(cert); |
735 | 0 | } |
736 | | |
737 | | static BOOL certificate_process_server_public_signature(rdpCertificate* certificate, |
738 | | const BYTE* sigdata, size_t sigdatalen, |
739 | | wStream* s, UINT32 siglen) |
740 | 0 | { |
741 | 0 | WINPR_ASSERT(certificate); |
742 | | #if defined(CERT_VALIDATE_RSA) |
743 | | BYTE sig[TSSK_KEY_LENGTH]; |
744 | | #endif |
745 | 0 | BYTE encsig[TSSK_KEY_LENGTH + 8]; |
746 | | #if defined(CERT_VALIDATE_MD5) && defined(CERT_VALIDATE_RSA) |
747 | | BYTE md5hash[WINPR_MD5_DIGEST_LENGTH]; |
748 | | #endif |
749 | 0 | #if !defined(CERT_VALIDATE_MD5) || !defined(CERT_VALIDATE_RSA) |
750 | 0 | (void)sigdata; |
751 | 0 | (void)sigdatalen; |
752 | 0 | #endif |
753 | 0 | (void)certificate; |
754 | | /* Do not bother with validation of server proprietary certificate. The use of MD5 here is not |
755 | | * allowed under FIPS. Since the validation is not protecting against anything since the |
756 | | * private/public keys are well known and documented in MS-RDPBCGR section 5.3.3.1, we are not |
757 | | * gaining any security by using MD5 for signature comparison. Rather then use MD5 |
758 | | * here we just don't do the validation to avoid its use. Historically, freerdp has been |
759 | | * ignoring a failed validation anyways. */ |
760 | | #if defined(CERT_VALIDATE_MD5) |
761 | | |
762 | | if (!winpr_Digest(WINPR_MD_MD5, sigdata, sigdatalen, md5hash, sizeof(md5hash))) |
763 | | return FALSE; |
764 | | |
765 | | #endif |
766 | 0 | Stream_Read(s, encsig, siglen); |
767 | |
|
768 | 0 | if (siglen < 8) |
769 | 0 | { |
770 | 0 | WLog_WARN(TAG, "public signature too short: %" PRIu32, siglen); |
771 | 0 | return FALSE; |
772 | 0 | } |
773 | | |
774 | | /* Last 8 bytes shall be all zero. */ |
775 | | #if defined(CERT_VALIDATE_PADDING) |
776 | | { |
777 | | size_t sum = 0; |
778 | | for (size_t i = sizeof(encsig) - 8; i < sizeof(encsig); i++) |
779 | | sum += encsig[i]; |
780 | | |
781 | | if (sum != 0) |
782 | | { |
783 | | WLog_ERR(TAG, "invalid signature"); |
784 | | return FALSE; |
785 | | } |
786 | | } |
787 | | #endif |
788 | | #if defined(CERT_VALIDATE_RSA) |
789 | | |
790 | | if (crypto_rsa_public_decrypt(encsig, siglen - 8, TSSK_KEY_LENGTH, tssk_modulus, tssk_exponent, |
791 | | sig) <= 0) |
792 | | { |
793 | | WLog_ERR(TAG, "invalid RSA decrypt"); |
794 | | return FALSE; |
795 | | } |
796 | | |
797 | | /* Verify signature. */ |
798 | | /* Do not bother with validation of server proprietary certificate as described above. */ |
799 | | #if defined(CERT_VALIDATE_MD5) |
800 | | |
801 | | if (memcmp(md5hash, sig, sizeof(md5hash)) != 0) |
802 | | { |
803 | | WLog_ERR(TAG, "invalid signature"); |
804 | | return FALSE; |
805 | | } |
806 | | |
807 | | #endif |
808 | | /* |
809 | | * Verify rest of decrypted data: |
810 | | * The 17th byte is 0x00. |
811 | | * The 18th through 62nd bytes are each 0xFF. |
812 | | * The 63rd byte is 0x01. |
813 | | */ |
814 | | { |
815 | | size_t sum = 0; |
816 | | for (size_t i = 17; i < 62; i++) |
817 | | sum += sig[i]; |
818 | | |
819 | | if (sig[16] != 0x00 || sum != 0xFF * (62 - 17) || sig[62] != 0x01) |
820 | | { |
821 | | WLog_ERR(TAG, "invalid signature"); |
822 | | return FALSE; |
823 | | } |
824 | | } |
825 | | #endif |
826 | 0 | return TRUE; |
827 | 0 | } |
828 | | |
829 | | static BOOL certificate_read_server_proprietary_certificate(rdpCertificate* certificate, wStream* s) |
830 | 0 | { |
831 | 0 | UINT32 dwSigAlgId = 0; |
832 | 0 | UINT32 dwKeyAlgId = 0; |
833 | 0 | UINT16 wPublicKeyBlobType = 0; |
834 | 0 | UINT16 wPublicKeyBlobLen = 0; |
835 | 0 | UINT16 wSignatureBlobType = 0; |
836 | 0 | UINT16 wSignatureBlobLen = 0; |
837 | 0 | size_t sigdatalen = 0; |
838 | |
|
839 | 0 | WINPR_ASSERT(certificate); |
840 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 12)) |
841 | 0 | return FALSE; |
842 | | |
843 | | /* -4, because we need to include dwVersion */ |
844 | 0 | const BYTE* sigdata = Stream_PointerAs(s, const BYTE) - 4; |
845 | 0 | Stream_Read_UINT32(s, dwSigAlgId); |
846 | 0 | Stream_Read_UINT32(s, dwKeyAlgId); |
847 | |
|
848 | 0 | if (!((dwSigAlgId == SIGNATURE_ALG_RSA) && (dwKeyAlgId == KEY_EXCHANGE_ALG_RSA))) |
849 | 0 | { |
850 | 0 | WLog_ERR(TAG, |
851 | 0 | "unsupported signature or key algorithm, dwSigAlgId=%" PRIu32 |
852 | 0 | " dwKeyAlgId=%" PRIu32 "", |
853 | 0 | dwSigAlgId, dwKeyAlgId); |
854 | 0 | return FALSE; |
855 | 0 | } |
856 | | |
857 | 0 | Stream_Read_UINT16(s, wPublicKeyBlobType); |
858 | |
|
859 | 0 | if (wPublicKeyBlobType != BB_RSA_KEY_BLOB) |
860 | 0 | { |
861 | 0 | WLog_ERR(TAG, "unsupported public key blob type %" PRIu16 "", wPublicKeyBlobType); |
862 | 0 | return FALSE; |
863 | 0 | } |
864 | | |
865 | 0 | Stream_Read_UINT16(s, wPublicKeyBlobLen); |
866 | |
|
867 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, wPublicKeyBlobLen)) |
868 | 0 | return FALSE; |
869 | | |
870 | 0 | if (!certificate_process_server_public_key(certificate, s, wPublicKeyBlobLen)) |
871 | 0 | return FALSE; |
872 | | |
873 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) |
874 | 0 | return FALSE; |
875 | | |
876 | 0 | sigdatalen = WINPR_ASSERTING_INT_CAST(size_t, Stream_PointerAs(s, const BYTE) - sigdata); |
877 | 0 | Stream_Read_UINT16(s, wSignatureBlobType); |
878 | |
|
879 | 0 | if (wSignatureBlobType != BB_RSA_SIGNATURE_BLOB) |
880 | 0 | { |
881 | 0 | WLog_ERR(TAG, "unsupported blob signature %" PRIu16 "", wSignatureBlobType); |
882 | 0 | return FALSE; |
883 | 0 | } |
884 | | |
885 | 0 | Stream_Read_UINT16(s, wSignatureBlobLen); |
886 | |
|
887 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, wSignatureBlobLen)) |
888 | 0 | return FALSE; |
889 | | |
890 | 0 | if (wSignatureBlobLen != 72) |
891 | 0 | { |
892 | 0 | WLog_ERR(TAG, "invalid signature length (got %" PRIu16 ", expected 72)", wSignatureBlobLen); |
893 | 0 | return FALSE; |
894 | 0 | } |
895 | | |
896 | 0 | if (!certificate_process_server_public_signature(certificate, sigdata, sigdatalen, s, |
897 | 0 | wSignatureBlobLen)) |
898 | 0 | { |
899 | 0 | WLog_ERR(TAG, "unable to parse server public signature"); |
900 | 0 | return FALSE; |
901 | 0 | } |
902 | 0 | return TRUE; |
903 | 0 | } |
904 | | |
905 | | /* [MS-RDPBCGR] 2.2.1.4.3.1.1.1 RSA Public Key (RSA_PUBLIC_KEY) */ |
906 | | static BOOL cert_write_rsa_public_key(wStream* s, const rdpCertificate* cert) |
907 | 0 | { |
908 | 0 | WINPR_ASSERT(cert); |
909 | 0 | WINPR_ASSERT(freerdp_certificate_is_rsa(cert)); |
910 | |
|
911 | 0 | const rdpCertInfo* info = &cert->cert_info; |
912 | |
|
913 | 0 | const UINT32 keyLen = info->ModulusLength + 8; |
914 | 0 | const UINT32 bitLen = info->ModulusLength * 8; |
915 | 0 | const UINT32 dataLen = (bitLen / 8) - 1; |
916 | 0 | const size_t pubExpLen = sizeof(info->exponent); |
917 | 0 | const BYTE* pubExp = info->exponent; |
918 | 0 | const BYTE* modulus = info->Modulus; |
919 | |
|
920 | 0 | const size_t wPublicKeyBlobLen = 16 + pubExpLen + keyLen; |
921 | 0 | WINPR_ASSERT(wPublicKeyBlobLen <= UINT16_MAX); |
922 | 0 | if (!Stream_EnsureRemainingCapacity(s, 2 + wPublicKeyBlobLen)) |
923 | 0 | return FALSE; |
924 | 0 | Stream_Write_UINT16(s, (UINT16)wPublicKeyBlobLen); |
925 | 0 | Stream_Write(s, rsa_magic, sizeof(rsa_magic)); |
926 | 0 | Stream_Write_UINT32(s, keyLen); |
927 | 0 | Stream_Write_UINT32(s, bitLen); |
928 | 0 | Stream_Write_UINT32(s, dataLen); |
929 | 0 | Stream_Write(s, pubExp, pubExpLen); |
930 | 0 | Stream_Write(s, modulus, info->ModulusLength); |
931 | 0 | Stream_Zero(s, 8); |
932 | 0 | return TRUE; |
933 | 0 | } |
934 | | |
935 | | static BOOL cert_write_rsa_signature(wStream* s, const void* sigData, size_t sigDataLen) |
936 | 0 | { |
937 | 0 | BYTE encryptedSignature[TSSK_KEY_LENGTH] = WINPR_C_ARRAY_INIT; |
938 | 0 | BYTE signature[sizeof(initial_signature)] = WINPR_C_ARRAY_INIT; |
939 | |
|
940 | 0 | memcpy(signature, initial_signature, sizeof(initial_signature)); |
941 | 0 | if (!winpr_Digest(WINPR_MD_MD5, sigData, sigDataLen, signature, sizeof(signature))) |
942 | 0 | return FALSE; |
943 | | |
944 | 0 | if (crypto_rsa_private_encrypt(signature, sizeof(signature), priv_key_tssk, encryptedSignature, |
945 | 0 | sizeof(encryptedSignature)) < 0) |
946 | 0 | return FALSE; |
947 | | |
948 | 0 | if (!Stream_EnsureRemainingCapacity(s, 2 * sizeof(UINT16) + sizeof(encryptedSignature) + 8)) |
949 | 0 | return FALSE; |
950 | 0 | Stream_Write_UINT16(s, BB_RSA_SIGNATURE_BLOB); |
951 | 0 | Stream_Write_UINT16(s, sizeof(encryptedSignature) + 8); /* wSignatureBlobLen */ |
952 | 0 | Stream_Write(s, encryptedSignature, sizeof(encryptedSignature)); |
953 | 0 | Stream_Zero(s, 8); |
954 | 0 | return TRUE; |
955 | 0 | } |
956 | | |
957 | | /* [MS-RDPBCGR] 2.2.1.4.3.1.1 Server Proprietary Certificate (PROPRIETARYSERVERCERTIFICATE) */ |
958 | | static BOOL cert_write_server_certificate_v1(wStream* s, const rdpCertificate* certificate) |
959 | 0 | { |
960 | 0 | const size_t start = Stream_GetPosition(s); |
961 | 0 | const BYTE* sigData = Stream_PointerAs(s, const BYTE) - sizeof(UINT32); |
962 | |
|
963 | 0 | WINPR_ASSERT(start >= 4); |
964 | 0 | if (!Stream_EnsureRemainingCapacity(s, 10)) |
965 | 0 | return FALSE; |
966 | 0 | Stream_Write_UINT32(s, SIGNATURE_ALG_RSA); |
967 | 0 | Stream_Write_UINT32(s, KEY_EXCHANGE_ALG_RSA); |
968 | 0 | Stream_Write_UINT16(s, BB_RSA_KEY_BLOB); |
969 | 0 | if (!cert_write_rsa_public_key(s, certificate)) |
970 | 0 | return FALSE; |
971 | | |
972 | 0 | const size_t end = Stream_GetPosition(s); |
973 | 0 | return cert_write_rsa_signature(s, sigData, end - start + sizeof(UINT32)); |
974 | 0 | } |
975 | | |
976 | | static BOOL cert_write_server_certificate_v2(wStream* s, const rdpCertificate* certificate) |
977 | 0 | { |
978 | 0 | WINPR_ASSERT(certificate); |
979 | |
|
980 | 0 | const rdpX509CertChain* chain = &certificate->x509_cert_chain; |
981 | 0 | const size_t padding = 8ull + 4ull * chain->count; |
982 | |
|
983 | 0 | if (!Stream_EnsureRemainingCapacity(s, sizeof(UINT32))) |
984 | 0 | return FALSE; |
985 | | |
986 | 0 | Stream_Write_UINT32(s, chain->count); |
987 | 0 | for (UINT32 x = 0; x < chain->count; x++) |
988 | 0 | { |
989 | 0 | const rdpCertBlob* cert = &chain->array[x]; |
990 | 0 | if (!cert_blob_write(cert, s)) |
991 | 0 | return FALSE; |
992 | 0 | } |
993 | | |
994 | 0 | if (!Stream_EnsureRemainingCapacity(s, padding)) |
995 | 0 | return FALSE; |
996 | 0 | Stream_Zero(s, padding); |
997 | 0 | return TRUE; |
998 | 0 | } |
999 | | |
1000 | | SSIZE_T freerdp_certificate_write_server_cert(const rdpCertificate* certificate, UINT32 dwVersion, |
1001 | | wStream* s) |
1002 | 0 | { |
1003 | 0 | if (!certificate) |
1004 | 0 | return -1; |
1005 | | |
1006 | 0 | const size_t start = Stream_GetPosition(s); |
1007 | 0 | if (!Stream_EnsureRemainingCapacity(s, 4)) |
1008 | 0 | return -1; |
1009 | 0 | Stream_Write_UINT32(s, dwVersion); |
1010 | |
|
1011 | 0 | switch (dwVersion & CERT_CHAIN_VERSION_MASK) |
1012 | 0 | { |
1013 | 0 | case CERT_CHAIN_VERSION_1: |
1014 | 0 | if (!cert_write_server_certificate_v1(s, certificate)) |
1015 | 0 | return -1; |
1016 | 0 | break; |
1017 | 0 | case CERT_CHAIN_VERSION_2: |
1018 | 0 | if (!cert_write_server_certificate_v2(s, certificate)) |
1019 | 0 | return -1; |
1020 | 0 | break; |
1021 | 0 | default: |
1022 | 0 | WLog_ERR(TAG, "invalid certificate chain version:%" PRIu32 "", |
1023 | 0 | dwVersion & CERT_CHAIN_VERSION_MASK); |
1024 | 0 | return -1; |
1025 | 0 | } |
1026 | | |
1027 | 0 | const size_t end = Stream_GetPosition(s); |
1028 | 0 | if (start > end) |
1029 | 0 | return -1; |
1030 | | |
1031 | 0 | const size_t diff = end - start; |
1032 | 0 | WINPR_ASSERT(diff <= SSIZE_MAX); |
1033 | 0 | return (SSIZE_T)diff; |
1034 | 0 | } |
1035 | | |
1036 | | /** |
1037 | | * Read an X.509 Certificate Chain. |
1038 | | * @param cert certificate module |
1039 | | * @param s stream |
1040 | | * @return \b TRUE for success, \b FALSE otherwise. |
1041 | | */ |
1042 | | |
1043 | | static BOOL certificate_read_server_x509_certificate_chain(rdpCertificate* cert, wStream* s) |
1044 | 0 | { |
1045 | 0 | UINT32 numCertBlobs = 0; |
1046 | 0 | DEBUG_CERTIFICATE("Server X.509 Certificate Chain"); |
1047 | |
|
1048 | 0 | WINPR_ASSERT(cert); |
1049 | 0 | if (!Stream_CheckAndLogRequiredLength(TAG, s, 4)) |
1050 | 0 | return FALSE; |
1051 | | |
1052 | 0 | Stream_Read_UINT32(s, numCertBlobs); /* numCertBlobs */ |
1053 | 0 | certificate_free_x509_certificate_chain(&cert->x509_cert_chain); |
1054 | 0 | if (!certificate_new_x509_certificate_chain(numCertBlobs, s, &cert->x509_cert_chain)) |
1055 | 0 | return FALSE; |
1056 | | |
1057 | 0 | for (UINT32 i = 0; i < cert->x509_cert_chain.count; i++) |
1058 | 0 | { |
1059 | 0 | rdpCertBlob* blob = &cert->x509_cert_chain.array[i]; |
1060 | 0 | if (!cert_blob_read(blob, s)) |
1061 | 0 | return FALSE; |
1062 | | |
1063 | 0 | if (numCertBlobs - i == 1) |
1064 | 0 | { |
1065 | 0 | DEBUG_CERTIFICATE("Terminal Server Certificate"); |
1066 | |
|
1067 | 0 | BOOL res = certificate_read_x509_certificate(blob, &cert->cert_info); |
1068 | |
|
1069 | 0 | if (res) |
1070 | 0 | { |
1071 | 0 | if (!update_x509_from_info(cert)) |
1072 | 0 | res = FALSE; |
1073 | 0 | } |
1074 | |
|
1075 | 0 | if (!res) |
1076 | 0 | { |
1077 | 0 | WLog_ERR(TAG, "Failed to read x509 certificate"); |
1078 | 0 | return FALSE; |
1079 | 0 | } |
1080 | | |
1081 | 0 | DEBUG_CERTIFICATE("modulus length:%" PRIu32 "", cert->cert_info.ModulusLength); |
1082 | 0 | } |
1083 | 0 | } |
1084 | | |
1085 | 0 | return update_x509_from_info(cert); |
1086 | 0 | } |
1087 | | |
1088 | | /** |
1089 | | * Read a Server Certificate. |
1090 | | * @param certificate certificate module |
1091 | | * @param server_cert server certificate |
1092 | | * @param length certificate length |
1093 | | */ |
1094 | | |
1095 | | BOOL freerdp_certificate_read_server_cert(rdpCertificate* certificate, const BYTE* server_cert, |
1096 | | size_t length) |
1097 | 0 | { |
1098 | 0 | BOOL ret = FALSE; |
1099 | 0 | wStream* s = nullptr; |
1100 | 0 | wStream sbuffer; |
1101 | 0 | UINT32 dwVersion = 0; |
1102 | |
|
1103 | 0 | WINPR_ASSERT(certificate); |
1104 | 0 | if (length < 4) /* nullptr certificate is not an error see #1795 */ |
1105 | 0 | { |
1106 | 0 | WLog_DBG(TAG, "Received empty certificate, ignoring..."); |
1107 | 0 | return TRUE; |
1108 | 0 | } |
1109 | | |
1110 | 0 | WINPR_ASSERT(server_cert); |
1111 | 0 | s = Stream_StaticConstInit(&sbuffer, server_cert, length); |
1112 | |
|
1113 | 0 | if (!s) |
1114 | 0 | { |
1115 | 0 | WLog_ERR(TAG, "Stream_New failed!"); |
1116 | 0 | return FALSE; |
1117 | 0 | } |
1118 | | |
1119 | 0 | Stream_Read_UINT32(s, dwVersion); /* dwVersion (4 bytes) */ |
1120 | |
|
1121 | 0 | switch (dwVersion & CERT_CHAIN_VERSION_MASK) |
1122 | 0 | { |
1123 | 0 | case CERT_CHAIN_VERSION_1: |
1124 | 0 | ret = certificate_read_server_proprietary_certificate(certificate, s); |
1125 | 0 | break; |
1126 | | |
1127 | 0 | case CERT_CHAIN_VERSION_2: |
1128 | 0 | ret = certificate_read_server_x509_certificate_chain(certificate, s); |
1129 | 0 | break; |
1130 | | |
1131 | 0 | default: |
1132 | 0 | WLog_ERR(TAG, "invalid certificate chain version:%" PRIu32 "", |
1133 | 0 | dwVersion & CERT_CHAIN_VERSION_MASK); |
1134 | 0 | ret = FALSE; |
1135 | 0 | break; |
1136 | 0 | } |
1137 | | |
1138 | 0 | return ret; |
1139 | 0 | } |
1140 | | |
1141 | | static BOOL cert_blob_copy(rdpCertBlob* dst, const rdpCertBlob* src) |
1142 | 0 | { |
1143 | 0 | WINPR_ASSERT(dst); |
1144 | 0 | WINPR_ASSERT(src); |
1145 | |
|
1146 | 0 | cert_blob_free(dst); |
1147 | 0 | if (src->length > 0) |
1148 | 0 | { |
1149 | 0 | dst->data = malloc(src->length); |
1150 | 0 | if (!dst->data) |
1151 | 0 | return FALSE; |
1152 | 0 | dst->length = src->length; |
1153 | 0 | memcpy(dst->data, src->data, src->length); |
1154 | 0 | } |
1155 | | |
1156 | 0 | return TRUE; |
1157 | 0 | } |
1158 | | |
1159 | | static BOOL cert_x509_chain_copy(rdpX509CertChain* cert, const rdpX509CertChain* src) |
1160 | 0 | { |
1161 | 0 | WINPR_ASSERT(cert); |
1162 | |
|
1163 | 0 | certificate_free_x509_certificate_chain(cert); |
1164 | 0 | if (!src) |
1165 | 0 | return TRUE; |
1166 | | |
1167 | 0 | if (src->count > 0) |
1168 | 0 | { |
1169 | 0 | cert->array = calloc(src->count, sizeof(rdpCertBlob)); |
1170 | 0 | if (!cert->array) |
1171 | 0 | { |
1172 | 0 | return FALSE; |
1173 | 0 | } |
1174 | 0 | cert->count = src->count; |
1175 | |
|
1176 | 0 | for (UINT32 x = 0; x < cert->count; x++) |
1177 | 0 | { |
1178 | 0 | const rdpCertBlob* srcblob = &src->array[x]; |
1179 | 0 | rdpCertBlob* dstblob = &cert->array[x]; |
1180 | |
|
1181 | 0 | if (!cert_blob_copy(dstblob, srcblob)) |
1182 | 0 | { |
1183 | 0 | certificate_free_x509_certificate_chain(cert); |
1184 | 0 | return FALSE; |
1185 | 0 | } |
1186 | 0 | } |
1187 | 0 | } |
1188 | | |
1189 | 0 | return TRUE; |
1190 | 0 | } |
1191 | | |
1192 | | BOOL cert_clone_int(rdpCertificate* dst, const rdpCertificate* src) |
1193 | 0 | { |
1194 | 0 | WINPR_ASSERT(dst); |
1195 | 0 | WINPR_ASSERT(src); |
1196 | |
|
1197 | 0 | if (!cert_info_clone(&dst->cert_info, &src->cert_info)) |
1198 | 0 | return FALSE; |
1199 | | |
1200 | 0 | if (src->x509) |
1201 | 0 | { |
1202 | 0 | dst->x509 = X509_dup(src->x509); |
1203 | 0 | if (!dst->x509) |
1204 | 0 | { |
1205 | | /* Workaround for SSL deprecation issues: |
1206 | | * some security modes use weak RSA ciphers where X509_dup fails. |
1207 | | * In that case recreate the X509 from the raw RSA data |
1208 | | */ |
1209 | 0 | if (!update_x509_from_info(dst)) |
1210 | 0 | { |
1211 | 0 | WLog_ERR(TAG, "X509_dup failed, SSL configuration bug?"); |
1212 | 0 | return FALSE; |
1213 | 0 | } |
1214 | 0 | } |
1215 | 0 | } |
1216 | | |
1217 | 0 | if (src->chain) |
1218 | 0 | { |
1219 | 0 | if (dst->chain) |
1220 | 0 | sk_X509_pop_free(dst->chain, X509_free); |
1221 | |
|
1222 | 0 | dst->chain = sk_X509_deep_copy(src->chain, X509_const_dup, X509_free); |
1223 | 0 | } |
1224 | 0 | return cert_x509_chain_copy(&dst->x509_cert_chain, &src->x509_cert_chain); |
1225 | 0 | } |
1226 | | |
1227 | | rdpCertificate* freerdp_certificate_clone(const rdpCertificate* certificate) |
1228 | 0 | { |
1229 | 0 | if (!certificate) |
1230 | 0 | return nullptr; |
1231 | | |
1232 | 0 | rdpCertificate* _certificate = freerdp_certificate_new(); |
1233 | |
|
1234 | 0 | if (!_certificate) |
1235 | 0 | return nullptr; |
1236 | | |
1237 | 0 | if (!cert_clone_int(_certificate, certificate)) |
1238 | 0 | goto out_fail; |
1239 | | |
1240 | 0 | return _certificate; |
1241 | 0 | out_fail: |
1242 | |
|
1243 | 0 | freerdp_certificate_free(_certificate); |
1244 | 0 | return nullptr; |
1245 | 0 | } |
1246 | | |
1247 | | /** |
1248 | | * Instantiate new certificate module. |
1249 | | * @return new certificate module |
1250 | | */ |
1251 | | |
1252 | | rdpCertificate* freerdp_certificate_new(void) |
1253 | 133 | { |
1254 | 133 | return (rdpCertificate*)calloc(1, sizeof(rdpCertificate)); |
1255 | 133 | } |
1256 | | |
1257 | | void certificate_free_int(rdpCertificate* cert) |
1258 | 133 | { |
1259 | 133 | WINPR_ASSERT(cert); |
1260 | | |
1261 | 133 | if (cert->x509) |
1262 | 129 | X509_free(cert->x509); |
1263 | 133 | if (cert->chain) |
1264 | 110 | sk_X509_pop_free(cert->chain, X509_free); |
1265 | | |
1266 | 133 | certificate_free_x509_certificate_chain(&cert->x509_cert_chain); |
1267 | 133 | cert_info_free(&cert->cert_info); |
1268 | 133 | } |
1269 | | |
1270 | | /** |
1271 | | * Free certificate module. |
1272 | | * @param cert certificate module to be freed |
1273 | | */ |
1274 | | |
1275 | | void freerdp_certificate_free(rdpCertificate* cert) |
1276 | 1.06k | { |
1277 | 1.06k | if (!cert) |
1278 | 928 | return; |
1279 | | |
1280 | 133 | certificate_free_int(cert); |
1281 | 133 | free(cert); |
1282 | 133 | } |
1283 | | |
1284 | | static BOOL freerdp_rsa_from_x509(rdpCertificate* cert) |
1285 | 129 | { |
1286 | 129 | BOOL rc = FALSE; |
1287 | | |
1288 | 129 | WINPR_ASSERT(cert); |
1289 | | |
1290 | 129 | if (!freerdp_certificate_is_rsa(cert)) |
1291 | 96 | return TRUE; |
1292 | | |
1293 | 33 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
1294 | 33 | RSA* rsa = nullptr; |
1295 | 33 | const BIGNUM* rsa_n = nullptr; |
1296 | 33 | const BIGNUM* rsa_e = nullptr; |
1297 | | #else |
1298 | | BIGNUM* rsa_n = nullptr; |
1299 | | BIGNUM* rsa_e = nullptr; |
1300 | | #endif |
1301 | 33 | EVP_PKEY* pubkey = X509_get0_pubkey(cert->x509); |
1302 | 33 | if (!pubkey) |
1303 | 0 | goto fail; |
1304 | | |
1305 | 33 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
1306 | 33 | rsa = EVP_PKEY_get1_RSA(pubkey); |
1307 | | |
1308 | | /* If this is not a RSA key return success */ |
1309 | 33 | rc = TRUE; |
1310 | 33 | if (!rsa) |
1311 | 0 | goto fail; |
1312 | | |
1313 | | /* Now we return failure again if something is wrong. */ |
1314 | 33 | rc = FALSE; |
1315 | | |
1316 | 33 | RSA_get0_key(rsa, &rsa_n, &rsa_e, nullptr); |
1317 | | #else |
1318 | | if (!EVP_PKEY_get_bn_param(pubkey, OSSL_PKEY_PARAM_RSA_E, &rsa_e)) |
1319 | | goto fail; |
1320 | | if (!EVP_PKEY_get_bn_param(pubkey, OSSL_PKEY_PARAM_RSA_N, &rsa_n)) |
1321 | | goto fail; |
1322 | | #endif |
1323 | 33 | if (!rsa_n || !rsa_e) |
1324 | 0 | goto fail; |
1325 | 33 | if (!cert_info_create(&cert->cert_info, rsa_n, rsa_e)) |
1326 | 17 | goto fail; |
1327 | 16 | rc = TRUE; |
1328 | 33 | fail: |
1329 | 33 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
1330 | 33 | RSA_free(rsa); |
1331 | | #else |
1332 | | BN_free(rsa_n); |
1333 | | BN_free(rsa_e); |
1334 | | #endif |
1335 | 33 | return rc; |
1336 | 16 | } |
1337 | | |
1338 | | rdpCertificate* freerdp_certificate_new_from_der(const BYTE* data, size_t length) |
1339 | 0 | { |
1340 | 0 | rdpCertificate* cert = freerdp_certificate_new(); |
1341 | |
|
1342 | 0 | if (!cert || !data || (length == 0) || (length > INT_MAX)) |
1343 | 0 | goto fail; |
1344 | | |
1345 | 0 | { |
1346 | 0 | const BYTE* ptr = data; |
1347 | 0 | cert->x509 = d2i_X509(nullptr, &ptr, (int)length); |
1348 | 0 | } |
1349 | |
|
1350 | 0 | if (!cert->x509) |
1351 | 0 | goto fail; |
1352 | 0 | if (!freerdp_rsa_from_x509(cert)) |
1353 | 0 | goto fail; |
1354 | 0 | return cert; |
1355 | 0 | fail: |
1356 | 0 | freerdp_certificate_free(cert); |
1357 | 0 | return nullptr; |
1358 | 0 | } |
1359 | | |
1360 | | rdpCertificate* freerdp_certificate_new_from_x509(const X509* xcert, const STACK_OF(X509) * chain) |
1361 | 133 | { |
1362 | 133 | WINPR_ASSERT(xcert); |
1363 | | |
1364 | 133 | rdpCertificate* cert = freerdp_certificate_new(); |
1365 | 133 | if (!cert) |
1366 | 0 | return nullptr; |
1367 | | |
1368 | 133 | X509* wcert = WINPR_CAST_CONST_PTR_AWAY(xcert, X509*); |
1369 | 133 | cert->x509 = X509_dup(wcert); |
1370 | 133 | if (!cert->x509) |
1371 | 4 | goto fail; |
1372 | | |
1373 | 129 | if (!freerdp_rsa_from_x509(cert)) |
1374 | 17 | goto fail; |
1375 | | |
1376 | 112 | if (chain) |
1377 | 112 | cert->chain = sk_X509_deep_copy(chain, X509_const_dup, X509_free); |
1378 | | |
1379 | 112 | return cert; |
1380 | 21 | fail: |
1381 | 21 | freerdp_certificate_free(cert); |
1382 | 21 | return nullptr; |
1383 | 129 | } |
1384 | | |
1385 | | static STACK_OF(X509) * extract_chain_from_pem(const char* pem, BOOL isFile) |
1386 | 133 | { |
1387 | 133 | if (!pem) |
1388 | 0 | { |
1389 | 0 | return nullptr; |
1390 | 0 | } |
1391 | | |
1392 | 133 | BIO* bio = nullptr; |
1393 | 133 | if (isFile) |
1394 | 0 | bio = BIO_new_file(pem, "rb"); |
1395 | 133 | else |
1396 | 133 | { |
1397 | 133 | const size_t len = strlen(pem); |
1398 | 133 | bio = BIO_new_mem_buf(pem, WINPR_ASSERTING_INT_CAST(int, len)); |
1399 | 133 | } |
1400 | | |
1401 | 133 | if (!bio) |
1402 | 0 | { |
1403 | 0 | return nullptr; |
1404 | 0 | } |
1405 | | |
1406 | 133 | X509* leaf = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr); |
1407 | 133 | if (!leaf) |
1408 | 0 | { |
1409 | 0 | BIO_free(bio); |
1410 | 0 | return nullptr; |
1411 | 0 | } |
1412 | | |
1413 | 133 | STACK_OF(X509)* chain = sk_X509_new_null(); |
1414 | 133 | if (!chain) |
1415 | 0 | { |
1416 | 0 | X509_free(leaf); |
1417 | 0 | BIO_free(bio); |
1418 | 0 | return nullptr; |
1419 | 0 | } |
1420 | | |
1421 | 133 | X509* cert = nullptr; |
1422 | 8.41k | while ((cert = PEM_read_bio_X509(bio, nullptr, nullptr, nullptr)) != nullptr) |
1423 | 8.27k | { |
1424 | 8.27k | sk_X509_push(chain, cert); |
1425 | 8.27k | } |
1426 | | |
1427 | 133 | X509_free(leaf); |
1428 | 133 | BIO_free(bio); |
1429 | 133 | return chain; |
1430 | 133 | } |
1431 | | |
1432 | | static rdpCertificate* freerdp_certificate_new_from(const char* file, BOOL isFile) |
1433 | 1.03k | { |
1434 | 1.03k | X509* x509 = x509_utils_from_pem(file, strlen(file), isFile); |
1435 | 1.03k | if (!x509) |
1436 | 902 | return nullptr; |
1437 | 1.03k | STACK_OF(X509)* chain = extract_chain_from_pem(file, isFile); |
1438 | 133 | rdpCertificate* cert = freerdp_certificate_new_from_x509(x509, chain); |
1439 | 133 | if (chain) |
1440 | 133 | sk_X509_pop_free(chain, X509_free); |
1441 | 133 | X509_free(x509); |
1442 | 133 | return cert; |
1443 | 1.03k | } |
1444 | | |
1445 | | rdpCertificate* freerdp_certificate_new_from_file(const char* file) |
1446 | 0 | { |
1447 | 0 | return freerdp_certificate_new_from(file, TRUE); |
1448 | 0 | } |
1449 | | |
1450 | | rdpCertificate* freerdp_certificate_new_from_pem(const char* pem) |
1451 | 1.03k | { |
1452 | 1.03k | return freerdp_certificate_new_from(pem, FALSE); |
1453 | 1.03k | } |
1454 | | |
1455 | | const rdpCertInfo* freerdp_certificate_get_info(const rdpCertificate* cert) |
1456 | 0 | { |
1457 | 0 | WINPR_ASSERT(cert); |
1458 | 0 | if (!freerdp_certificate_is_rsa(cert)) |
1459 | 0 | return nullptr; |
1460 | 0 | return &cert->cert_info; |
1461 | 0 | } |
1462 | | |
1463 | | char* freerdp_certificate_get_fingerprint(const rdpCertificate* cert) |
1464 | 107 | { |
1465 | 107 | return freerdp_certificate_get_fingerprint_by_hash(cert, "sha256"); |
1466 | 107 | } |
1467 | | |
1468 | | char* freerdp_certificate_get_fingerprint_by_hash(const rdpCertificate* cert, const char* hash) |
1469 | 107 | { |
1470 | 107 | return freerdp_certificate_get_fingerprint_by_hash_ex(cert, hash, TRUE); |
1471 | 107 | } |
1472 | | |
1473 | | char* freerdp_certificate_get_fingerprint_by_hash_ex(const rdpCertificate* cert, const char* hash, |
1474 | | BOOL separator) |
1475 | 107 | { |
1476 | 107 | size_t fp_len = 0; |
1477 | 107 | size_t pos = 0; |
1478 | 107 | size_t size = 0; |
1479 | 107 | BYTE* fp = nullptr; |
1480 | 107 | char* fp_buffer = nullptr; |
1481 | 107 | if (!cert || !cert->x509) |
1482 | 0 | { |
1483 | 0 | WLog_ERR(TAG, "Invalid certificate [%p, %p]", WINPR_CXX_COMPAT_CAST(const void*, cert), |
1484 | 0 | WINPR_CXX_COMPAT_CAST(const void*, cert ? cert->x509 : nullptr)); |
1485 | 0 | return nullptr; |
1486 | 0 | } |
1487 | 107 | if (!hash) |
1488 | 0 | { |
1489 | 0 | WLog_ERR(TAG, "Invalid certificate hash %p", WINPR_CXX_COMPAT_CAST(const void*, hash)); |
1490 | 0 | return nullptr; |
1491 | 0 | } |
1492 | 107 | fp = x509_utils_get_hash(cert->x509, hash, &fp_len); |
1493 | 107 | if (!fp) |
1494 | 0 | return nullptr; |
1495 | | |
1496 | 107 | if (fp_len < 1) |
1497 | 0 | goto fail; |
1498 | | |
1499 | 107 | size = fp_len * 3 + 1; |
1500 | 107 | fp_buffer = calloc(size, sizeof(char)); |
1501 | 107 | if (!fp_buffer) |
1502 | 0 | goto fail; |
1503 | | |
1504 | 107 | pos = 0; |
1505 | | |
1506 | 107 | { |
1507 | 107 | size_t i = 0; |
1508 | 3.42k | for (; i < (fp_len - 1); i++) |
1509 | 3.31k | { |
1510 | 3.31k | int rc = 0; |
1511 | 3.31k | char* p = &fp_buffer[pos]; |
1512 | 3.31k | if (separator) |
1513 | 3.31k | rc = sprintf_s(p, size - pos, "%02" PRIx8 ":", fp[i]); |
1514 | 0 | else |
1515 | 0 | rc = sprintf_s(p, size - pos, "%02" PRIx8, fp[i]); |
1516 | 3.31k | if (rc <= 0) |
1517 | 0 | goto fail; |
1518 | 3.31k | pos += (size_t)rc; |
1519 | 3.31k | } |
1520 | | |
1521 | 107 | (void)sprintf_s(&fp_buffer[pos], size - pos, "%02" PRIx8 "", fp[i]); |
1522 | 107 | } |
1523 | | |
1524 | 0 | free(fp); |
1525 | | |
1526 | 107 | return fp_buffer; |
1527 | 0 | fail: |
1528 | 0 | free(fp); |
1529 | 0 | free(fp_buffer); |
1530 | 0 | return nullptr; |
1531 | 107 | } |
1532 | | |
1533 | | static BOOL bio_read_pem(BIO* bio, char** ppem, size_t* plength) |
1534 | 221 | { |
1535 | 221 | BOOL rc = FALSE; |
1536 | | |
1537 | 221 | WINPR_ASSERT(bio); |
1538 | 221 | WINPR_ASSERT(ppem); |
1539 | | |
1540 | 221 | const size_t blocksize = 2048; |
1541 | 221 | size_t offset = 0; |
1542 | 221 | size_t length = blocksize; |
1543 | 221 | char* pem = nullptr; |
1544 | | |
1545 | 221 | *ppem = nullptr; |
1546 | 221 | if (plength) |
1547 | 221 | *plength = 0; |
1548 | | |
1549 | 4.12k | while (offset < length) |
1550 | 4.12k | { |
1551 | 4.12k | char* tmp = realloc(pem, length + 1); |
1552 | 4.12k | if (!tmp) |
1553 | 0 | goto fail; |
1554 | 4.12k | pem = tmp; |
1555 | | |
1556 | 4.12k | ERR_clear_error(); |
1557 | | |
1558 | 4.12k | const int status = BIO_read(bio, &pem[offset], (int)(length - offset)); |
1559 | 4.12k | if (status < 0) |
1560 | 5 | { |
1561 | 5 | WLog_ERR(TAG, "failed to read certificate"); |
1562 | 5 | goto fail; |
1563 | 5 | } |
1564 | | |
1565 | 4.12k | if (status == 0) |
1566 | 0 | break; |
1567 | | |
1568 | 4.12k | offset += (size_t)status; |
1569 | 4.12k | if (length - offset > 0) |
1570 | 216 | break; |
1571 | 3.90k | length += blocksize; |
1572 | 3.90k | } |
1573 | | |
1574 | 216 | if (pem) |
1575 | 216 | { |
1576 | 216 | if (offset >= length) |
1577 | 0 | goto fail; |
1578 | 216 | pem[offset] = '\0'; |
1579 | 216 | } |
1580 | 216 | *ppem = pem; |
1581 | 216 | if (plength) |
1582 | 216 | *plength = offset; |
1583 | 216 | rc = TRUE; |
1584 | 221 | fail: |
1585 | 221 | if (!rc) |
1586 | 5 | free(pem); |
1587 | | |
1588 | 221 | return rc; |
1589 | 216 | } |
1590 | | |
1591 | | char* freerdp_certificate_get_pem(const rdpCertificate* cert, size_t* pLength) |
1592 | 0 | { |
1593 | 0 | return freerdp_certificate_get_pem_ex(cert, pLength, TRUE); |
1594 | 0 | } |
1595 | | |
1596 | | char* freerdp_certificate_get_pem_ex(const rdpCertificate* cert, size_t* pLength, |
1597 | | BOOL withCertChain) |
1598 | 221 | { |
1599 | 221 | WINPR_ASSERT(cert); |
1600 | | |
1601 | 221 | if (!cert->x509) |
1602 | 0 | return nullptr; |
1603 | | |
1604 | | /** |
1605 | | * Don't manage certificates internally, leave it up entirely to the external client |
1606 | | * implementation |
1607 | | */ |
1608 | 221 | BIO* bio = BIO_new(BIO_s_mem()); |
1609 | | |
1610 | 221 | if (!bio) |
1611 | 0 | { |
1612 | 0 | WLog_ERR(TAG, "BIO_new() failure"); |
1613 | 0 | return nullptr; |
1614 | 0 | } |
1615 | | |
1616 | 221 | char* pem = nullptr; |
1617 | | |
1618 | 221 | const int status = PEM_write_bio_X509(bio, cert->x509); |
1619 | 221 | if (status < 0) |
1620 | 0 | { |
1621 | 0 | WLog_ERR(TAG, "PEM_write_bio_X509 failure: %d", status); |
1622 | 0 | goto fail; |
1623 | 0 | } |
1624 | | |
1625 | 221 | if (cert->chain && withCertChain) |
1626 | 108 | { |
1627 | 108 | const int count = sk_X509_num(cert->chain); |
1628 | 8.38k | for (int x = 0; x < count; x++) |
1629 | 8.27k | { |
1630 | 8.27k | X509* c = sk_X509_value(cert->chain, x); |
1631 | 8.27k | const int rc = PEM_write_bio_X509(bio, c); |
1632 | 8.27k | if (rc < 0) |
1633 | 0 | { |
1634 | 0 | WLog_ERR(TAG, "PEM_write_bio_X509 failure: %d", rc); |
1635 | 0 | goto fail; |
1636 | 0 | } |
1637 | 8.27k | } |
1638 | 108 | } |
1639 | | |
1640 | 221 | (void)bio_read_pem(bio, &pem, pLength); |
1641 | | |
1642 | 221 | fail: |
1643 | 221 | BIO_free_all(bio); |
1644 | 221 | return pem; |
1645 | 221 | } |
1646 | | |
1647 | | char* freerdp_certificate_get_subject(const rdpCertificate* cert) |
1648 | 112 | { |
1649 | 112 | WINPR_ASSERT(cert); |
1650 | 112 | return x509_utils_get_subject(cert->x509); |
1651 | 112 | } |
1652 | | |
1653 | | char* freerdp_certificate_get_issuer(const rdpCertificate* cert) |
1654 | 107 | { |
1655 | 107 | WINPR_ASSERT(cert); |
1656 | 107 | return x509_utils_get_issuer(cert->x509); |
1657 | 107 | } |
1658 | | |
1659 | | char* freerdp_certificate_get_upn(const rdpCertificate* cert) |
1660 | 0 | { |
1661 | 0 | WINPR_ASSERT(cert); |
1662 | 0 | return x509_utils_get_upn(cert->x509); |
1663 | 0 | } |
1664 | | |
1665 | | char* freerdp_certificate_get_email(const rdpCertificate* cert) |
1666 | 0 | { |
1667 | 0 | WINPR_ASSERT(cert); |
1668 | 0 | return x509_utils_get_email(cert->x509); |
1669 | 0 | } |
1670 | | |
1671 | | char* freerdp_certificate_get_validity(const rdpCertificate* cert, BOOL startDate) |
1672 | 0 | { |
1673 | 0 | WINPR_ASSERT(cert); |
1674 | 0 | return x509_utils_get_date(cert->x509, startDate); |
1675 | 0 | } |
1676 | | |
1677 | | BOOL freerdp_certificate_check_eku(const rdpCertificate* cert, int nid) |
1678 | 0 | { |
1679 | 0 | WINPR_ASSERT(cert); |
1680 | 0 | return x509_utils_check_eku(cert->x509, nid); |
1681 | 0 | } |
1682 | | |
1683 | | BOOL freerdp_certificate_get_public_key(const rdpCertificate* cert, BYTE** PublicKey, |
1684 | | DWORD* PublicKeyLength) |
1685 | 0 | { |
1686 | 0 | BYTE* ptr = nullptr; |
1687 | 0 | BYTE* optr = nullptr; |
1688 | 0 | int length = 0; |
1689 | 0 | BOOL status = FALSE; |
1690 | 0 | EVP_PKEY* pkey = nullptr; |
1691 | |
|
1692 | 0 | WINPR_ASSERT(cert); |
1693 | |
|
1694 | 0 | pkey = X509_get0_pubkey(cert->x509); |
1695 | |
|
1696 | 0 | if (!pkey) |
1697 | 0 | { |
1698 | 0 | WLog_ERR(TAG, "X509_get_pubkey() failed"); |
1699 | 0 | goto exit; |
1700 | 0 | } |
1701 | | |
1702 | 0 | length = i2d_PublicKey(pkey, nullptr); |
1703 | |
|
1704 | 0 | if (length < 1) |
1705 | 0 | { |
1706 | 0 | WLog_ERR(TAG, "i2d_PublicKey() failed"); |
1707 | 0 | goto exit; |
1708 | 0 | } |
1709 | | |
1710 | 0 | *PublicKey = optr = ptr = (BYTE*)calloc(WINPR_ASSERTING_INT_CAST(size_t, length), sizeof(BYTE)); |
1711 | |
|
1712 | 0 | if (!ptr) |
1713 | 0 | goto exit; |
1714 | | |
1715 | 0 | { |
1716 | 0 | const int length2 = i2d_PublicKey(pkey, &ptr); |
1717 | 0 | if (length != length2) |
1718 | 0 | goto exit; |
1719 | 0 | *PublicKeyLength = (DWORD)length2; |
1720 | 0 | } |
1721 | 0 | status = TRUE; |
1722 | 0 | exit: |
1723 | |
|
1724 | 0 | if (!status) |
1725 | 0 | free(optr); |
1726 | |
|
1727 | 0 | return status; |
1728 | 0 | } |
1729 | | |
1730 | | BOOL freerdp_certificate_verify(const rdpCertificate* cert, const char* certificate_store_path) |
1731 | 0 | { |
1732 | 0 | WINPR_ASSERT(cert); |
1733 | 0 | return x509_utils_verify(cert->x509, cert->chain, certificate_store_path); |
1734 | 0 | } |
1735 | | |
1736 | | char** freerdp_certificate_get_dns_names(const rdpCertificate* cert, size_t* pcount, |
1737 | | size_t** pplengths) |
1738 | 0 | { |
1739 | 0 | WINPR_ASSERT(cert); |
1740 | 0 | return x509_utils_get_dns_names(cert->x509, pcount, pplengths); |
1741 | 0 | } |
1742 | | |
1743 | | char* freerdp_certificate_get_common_name(const rdpCertificate* cert, size_t* plength) |
1744 | 0 | { |
1745 | 0 | WINPR_ASSERT(cert); |
1746 | 0 | return x509_utils_get_common_name(cert->x509, plength); |
1747 | 0 | } |
1748 | | |
1749 | | WINPR_MD_TYPE freerdp_certificate_get_signature_alg(const rdpCertificate* cert) |
1750 | 0 | { |
1751 | 0 | WINPR_ASSERT(cert); |
1752 | 0 | return x509_utils_get_signature_alg(cert->x509); |
1753 | 0 | } |
1754 | | |
1755 | | void freerdp_certificate_free_dns_names(size_t count, size_t* lengths, char** names) |
1756 | 0 | { |
1757 | 0 | x509_utils_dns_names_free(count, lengths, names); |
1758 | 0 | } |
1759 | | |
1760 | | char* freerdp_certificate_get_hash(const rdpCertificate* cert, const char* hash, size_t* plength) |
1761 | 0 | { |
1762 | 0 | WINPR_ASSERT(cert); |
1763 | 0 | return (char*)x509_utils_get_hash(cert->x509, hash, plength); |
1764 | 0 | } |
1765 | | |
1766 | | X509* freerdp_certificate_get_x509(rdpCertificate* cert) |
1767 | 0 | { |
1768 | 0 | WINPR_ASSERT(cert); |
1769 | 0 | return cert->x509; |
1770 | 0 | } |
1771 | | |
1772 | | BOOL freerdp_certificate_publickey_encrypt(const rdpCertificate* cert, const BYTE* input, |
1773 | | size_t cbInput, BYTE** poutput, size_t* pcbOutput) |
1774 | 0 | { |
1775 | 0 | WINPR_ASSERT(cert); |
1776 | 0 | WINPR_ASSERT(input); |
1777 | 0 | WINPR_ASSERT(poutput); |
1778 | 0 | WINPR_ASSERT(pcbOutput); |
1779 | |
|
1780 | 0 | BOOL ret = FALSE; |
1781 | 0 | BYTE* output = nullptr; |
1782 | 0 | EVP_PKEY* pkey = X509_get0_pubkey(cert->x509); |
1783 | 0 | if (!pkey) |
1784 | 0 | return FALSE; |
1785 | | |
1786 | 0 | EVP_PKEY_CTX* ctx = EVP_PKEY_CTX_new(pkey, nullptr); |
1787 | 0 | if (!ctx) |
1788 | 0 | return FALSE; |
1789 | | |
1790 | 0 | size_t outputSize = WINPR_ASSERTING_INT_CAST(size_t, EVP_PKEY_size(pkey)); |
1791 | 0 | output = malloc(outputSize); |
1792 | 0 | if (output == nullptr) |
1793 | 0 | goto out; |
1794 | 0 | *pcbOutput = outputSize; |
1795 | |
|
1796 | 0 | if (EVP_PKEY_encrypt_init(ctx) != 1 || |
1797 | 0 | EVP_PKEY_CTX_set_rsa_padding(ctx, RSA_PKCS1_PADDING) != 1 || |
1798 | 0 | EVP_PKEY_encrypt(ctx, output, pcbOutput, input, cbInput) != 1) |
1799 | 0 | { |
1800 | 0 | WLog_ERR(TAG, "error when setting up public key"); |
1801 | 0 | goto out; |
1802 | 0 | } |
1803 | | |
1804 | 0 | *poutput = output; |
1805 | 0 | output = nullptr; |
1806 | 0 | ret = TRUE; |
1807 | 0 | out: |
1808 | 0 | EVP_PKEY_CTX_free(ctx); |
1809 | 0 | free(output); |
1810 | 0 | return ret; |
1811 | 0 | } |
1812 | | |
1813 | | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
1814 | | static RSA* freerdp_certificate_get_RSA(const rdpCertificate* cert) |
1815 | 0 | { |
1816 | 0 | WINPR_ASSERT(cert); |
1817 | |
|
1818 | 0 | if (!freerdp_certificate_is_rsa(cert)) |
1819 | 0 | return nullptr; |
1820 | | |
1821 | 0 | EVP_PKEY* pubkey = X509_get0_pubkey(cert->x509); |
1822 | 0 | if (!pubkey) |
1823 | 0 | return nullptr; |
1824 | | |
1825 | 0 | return EVP_PKEY_get1_RSA(pubkey); |
1826 | 0 | } |
1827 | | #endif |
1828 | | |
1829 | | BYTE* freerdp_certificate_get_der(const rdpCertificate* cert, size_t* pLength) |
1830 | 0 | { |
1831 | 0 | WINPR_ASSERT(cert); |
1832 | |
|
1833 | 0 | if (pLength) |
1834 | 0 | *pLength = 0; |
1835 | |
|
1836 | 0 | const int rc = i2d_X509(cert->x509, nullptr); |
1837 | 0 | if (rc <= 0) |
1838 | 0 | return nullptr; |
1839 | | |
1840 | 0 | BYTE* ptr = calloc(WINPR_ASSERTING_INT_CAST(size_t, rc) + 1, sizeof(BYTE)); |
1841 | 0 | if (!ptr) |
1842 | 0 | return nullptr; |
1843 | 0 | BYTE* i2d_ptr = ptr; |
1844 | |
|
1845 | 0 | const int rc2 = i2d_X509(cert->x509, &i2d_ptr); |
1846 | 0 | if (rc2 <= 0) |
1847 | 0 | { |
1848 | 0 | free(ptr); |
1849 | 0 | return nullptr; |
1850 | 0 | } |
1851 | | |
1852 | 0 | if (pLength) |
1853 | 0 | *pLength = (size_t)rc2; |
1854 | 0 | return ptr; |
1855 | 0 | } |
1856 | | |
1857 | | BOOL freerdp_certificate_is_rsa(const rdpCertificate* cert) |
1858 | 129 | { |
1859 | 129 | WINPR_ASSERT(cert); |
1860 | 129 | return is_rsa_key(cert->x509); |
1861 | 129 | } |
1862 | | |
1863 | | BOOL freerdp_certificate_is_rdp_security_compatible(const rdpCertificate* cert) |
1864 | 0 | { |
1865 | 0 | const rdpCertInfo* info = freerdp_certificate_get_info(cert); |
1866 | 0 | if (!freerdp_certificate_is_rsa(cert) || !info || (info->ModulusLength != 2048 / 8)) |
1867 | 0 | { |
1868 | 0 | WLog_INFO(TAG, "certificate is not RSA 2048, RDP security not supported."); |
1869 | 0 | return FALSE; |
1870 | 0 | } |
1871 | 0 | return TRUE; |
1872 | 0 | } |
1873 | | |
1874 | | char* freerdp_certificate_get_param(const rdpCertificate* cert, enum FREERDP_CERT_PARAM what, |
1875 | | size_t* psize) |
1876 | 0 | { |
1877 | 0 | WINPR_ASSERT(cert); |
1878 | 0 | WINPR_ASSERT(psize); |
1879 | |
|
1880 | 0 | *psize = 0; |
1881 | |
|
1882 | 0 | #if !defined(OPENSSL_VERSION_MAJOR) || (OPENSSL_VERSION_MAJOR < 3) |
1883 | 0 | const BIGNUM* bn = nullptr; |
1884 | 0 | RSA* rsa = freerdp_certificate_get_RSA(cert); |
1885 | 0 | switch (what) |
1886 | 0 | { |
1887 | 0 | case FREERDP_CERT_RSA_E: |
1888 | 0 | RSA_get0_key(rsa, nullptr, &bn, nullptr); |
1889 | 0 | break; |
1890 | 0 | case FREERDP_CERT_RSA_N: |
1891 | 0 | RSA_get0_key(rsa, &bn, nullptr, nullptr); |
1892 | 0 | break; |
1893 | 0 | default: |
1894 | 0 | RSA_free(rsa); |
1895 | 0 | return nullptr; |
1896 | 0 | } |
1897 | 0 | RSA_free(rsa); |
1898 | | #else |
1899 | | EVP_PKEY* pkey = X509_get0_pubkey(cert->x509); |
1900 | | if (!pkey) |
1901 | | return nullptr; |
1902 | | |
1903 | | BIGNUM* bn = nullptr; |
1904 | | switch (what) |
1905 | | { |
1906 | | case FREERDP_CERT_RSA_E: |
1907 | | if (!EVP_PKEY_get_bn_param(pkey, OSSL_PKEY_PARAM_RSA_E, &bn)) |
1908 | | return nullptr; |
1909 | | break; |
1910 | | case FREERDP_CERT_RSA_N: |
1911 | | if (!EVP_PKEY_get_bn_param(pkey, OSSL_PKEY_PARAM_RSA_N, &bn)) |
1912 | | return nullptr; |
1913 | | break; |
1914 | | default: |
1915 | | return nullptr; |
1916 | | } |
1917 | | #endif |
1918 | |
|
1919 | 0 | const size_t bnsize = WINPR_ASSERTING_INT_CAST(size_t, BN_num_bytes(bn)); |
1920 | 0 | char* rc = calloc(bnsize + 1, sizeof(char)); |
1921 | 0 | if (!rc) |
1922 | 0 | goto fail; |
1923 | 0 | BN_bn2bin(bn, (BYTE*)rc); |
1924 | 0 | *psize = bnsize; |
1925 | |
|
1926 | 0 | fail: |
1927 | | #if defined(OPENSSL_VERSION_MAJOR) && (OPENSSL_VERSION_MAJOR < 3) |
1928 | | BN_free(bn); |
1929 | | #endif |
1930 | 0 | return rc; |
1931 | 0 | } |
1932 | | |
1933 | | size_t freerdp_certificate_get_chain_len(rdpCertificate* certificate) |
1934 | 0 | { |
1935 | 0 | WINPR_ASSERT(certificate); |
1936 | 0 | if (!certificate->chain) |
1937 | 0 | return 0; |
1938 | | |
1939 | 0 | return WINPR_ASSERTING_INT_CAST(size_t, sk_X509_num(certificate->chain)); |
1940 | 0 | } |
1941 | | |
1942 | | X509* freerdp_certificate_get_chain_at(rdpCertificate* certificate, size_t offset) |
1943 | 0 | { |
1944 | 0 | WINPR_ASSERT(certificate); |
1945 | 0 | WINPR_ASSERT(freerdp_certificate_get_chain_len(certificate) > offset); |
1946 | 0 | const int ioff = WINPR_ASSERTING_INT_CAST(int, offset); |
1947 | 0 | return sk_X509_value(certificate->chain, ioff); |
1948 | 0 | } |