1 /*
2 * COPYRIGHT (C) 2006,2007
3 * THE REGENTS OF THE UNIVERSITY OF MICHIGAN
4 * ALL RIGHTS RESERVED
5 *
6 * Permission is granted to use, copy, create derivative works
7 * and redistribute this software and such derivative works
8 * for any purpose, so long as the name of The University of
9 * Michigan is not used in any advertising or publicity
10 * pertaining to the use of distribution of this software
11 * without specific, written prior authorization. If the
12 * above copyright notice or any other identification of the
13 * University of Michigan is included in any copy of any
14 * portion of this software, then the disclaimer below must
15 * also be included.
16 *
17 * THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION
18 * FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY
19 * PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF
20 * MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING
21 * WITHOUT LIMITATION THE IMPLIED WARRANTIES OF
22 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
23 * REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE
24 * FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR
25 * CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING
26 * OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN
27 * IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF
28 * SUCH DAMAGES.
29 */
30
31 /*
32 * Copyright (c) 2008, 2010, Oracle and/or its affiliates. All rights reserved.
33 * Copyright 2018 OmniOS Community Edition (OmniOSce) Association.
34 */
35
36 #ifndef _PKINIT_CRYPTO_OPENSSL_H
37 #define _PKINIT_CRYPTO_OPENSSL_H
38
39 #include <openssl/bn.h>
40 #include <openssl/dh.h>
41 #include <openssl/x509.h>
42 #include <openssl/pkcs7.h>
43 #include <openssl/pkcs12.h>
44 #include <openssl/obj_mac.h>
45 #include <openssl/x509v3.h>
46 #include <openssl/err.h>
47 #include <openssl/evp.h>
48 #include <openssl/sha.h>
49 #include <openssl/asn1.h>
50 #include <openssl/pem.h>
51 #include <openssl/rsa.h>
52
53 #if OPENSSL_VERSION_NUMBER < 0x10100000L
54 #include <openssl/asn1_mac.h>
55 #else
56 #include <openssl/asn1t.h>
57 #endif
58
59 #include "pkinit.h"
60
61 #define DN_BUF_LEN 256
62 #define MAX_CREDS_ALLOWED 20
63
64 struct _pkinit_cred_info {
65 X509 *cert;
66 EVP_PKEY *key;
67 #ifndef WITHOUT_PKCS11
68 CK_BYTE_PTR cert_id;
69 int cert_id_len;
70 #endif
71 };
72 typedef struct _pkinit_cred_info * pkinit_cred_info;
73
74 struct _pkinit_identity_crypto_context {
75 pkinit_cred_info creds[MAX_CREDS_ALLOWED+1];
76 STACK_OF(X509) *my_certs; /* available user certs */
77 int cert_index; /* cert to use out of available certs*/
78 EVP_PKEY *my_key; /* available user keys if in filesystem */
79 STACK_OF(X509) *trustedCAs; /* available trusted ca certs */
80 STACK_OF(X509) *intermediateCAs; /* available intermediate ca certs */
81 STACK_OF(X509_CRL) *revoked; /* available crls */
82 int pkcs11_method;
83 krb5_prompter_fct prompter;
84 void *prompter_data;
85 #ifndef WITHOUT_PKCS11
86 char *p11_module_name;
87 CK_SLOT_ID slotid;
88 char *token_label;
89 char *cert_label;
90 char *PIN; /* Solaris Kerberos: */
91 /* These are crypto-specific */
92 void *p11_module;
93 CK_SESSION_HANDLE session;
94 CK_FUNCTION_LIST_PTR p11;
95 CK_BYTE_PTR cert_id;
96 int cert_id_len;
97 CK_MECHANISM_TYPE mech;
98 /* Solaris Kerberos: need to keep some state */
99 uint_t p11flags;
100 /*
101 * Solaris Kerberos:
102 * If PKCS#11 is already being used by the process then C_Finalize should
103 * not be called by pkinit as it would invalidate any PKCS#11 sessions the
104 * process was using prior to loading the pkinit plugin. "finalize_pkcs11"
105 * indicates whether or not C_Finalize should be called by pkinit.
106 */
107 krb5_boolean finalize_pkcs11;
108 #endif
109 };
110
111 /* Solaris Kerberos: need to know if login was done */
112 #define C_LOGIN_DONE 0x1 /* The session is logged in. */
113 #define C_PROMPTED_USER 0x2 /* The user was prompted for token. */
114 #define C_SKIP_PKCS11_AUTH 0x4 /* User does not want to do PKCS11 auth */
115
116 struct _pkinit_plg_crypto_context {
117 DH *dh_1024;
118 DH *dh_2048;
119 DH *dh_4096;
120 ASN1_OBJECT *id_pkinit_authData;
121 ASN1_OBJECT *id_pkinit_authData9;
122 ASN1_OBJECT *id_pkinit_DHKeyData;
123 ASN1_OBJECT *id_pkinit_rkeyData;
124 ASN1_OBJECT *id_pkinit_san;
125 ASN1_OBJECT *id_ms_san_upn;
126 ASN1_OBJECT *id_pkinit_KPClientAuth;
127 ASN1_OBJECT *id_pkinit_KPKdc;
128 ASN1_OBJECT *id_ms_kp_sc_logon;
129 ASN1_OBJECT *id_kp_serverAuth;
130 };
131
132 struct _pkinit_req_crypto_context {
133 X509 *received_cert;
134 DH *dh;
135 };
136
137 #define CERT_MAGIC 0x53534c43
138 struct _pkinit_cert_data {
139 unsigned int magic;
140 pkinit_plg_crypto_context plgctx;
141 pkinit_req_crypto_context reqctx;
142 pkinit_identity_crypto_context idctx;
143 pkinit_cred_info cred;
144 unsigned int index; /* Index of this cred in the creds[] array */
145 };
146
147 #define ITER_MAGIC 0x53534c49
148 struct _pkinit_cert_iter_data {
149 unsigned int magic;
150 pkinit_plg_crypto_context plgctx;
151 pkinit_req_crypto_context reqctx;
152 pkinit_identity_crypto_context idctx;
153 unsigned int index;
154 };
155
156 /* Solaris Kerberos */
157 static krb5_error_code openssl_init(void);
158
159 static krb5_error_code pkinit_init_pkinit_oids(pkinit_plg_crypto_context );
160 static void pkinit_fini_pkinit_oids(pkinit_plg_crypto_context );
161
162 static krb5_error_code pkinit_init_dh_params(pkinit_plg_crypto_context );
163 static void pkinit_fini_dh_params(pkinit_plg_crypto_context );
164
165 static krb5_error_code pkinit_init_certs(pkinit_identity_crypto_context ctx);
166 static void pkinit_fini_certs(pkinit_identity_crypto_context ctx);
167
168 static krb5_error_code pkinit_init_pkcs11(pkinit_identity_crypto_context ctx);
169 static void pkinit_fini_pkcs11(pkinit_identity_crypto_context ctx);
170
171 static krb5_error_code pkinit_encode_dh_params
172 (const BIGNUM *, const BIGNUM *, const BIGNUM *,
173 unsigned char **, unsigned int *);
174 static DH *pkinit_decode_dh_params
175 (DH **, unsigned char **, unsigned int );
176 static int pkinit_check_dh_params
177 (const BIGNUM *p1, const BIGNUM *p2, const BIGNUM *g1,
178 const BIGNUM *q1);
179
180 static krb5_error_code pkinit_sign_data
181 (krb5_context context, pkinit_identity_crypto_context cryptoctx,
182 unsigned char *data, unsigned int data_len,
183 unsigned char **sig, unsigned int *sig_len);
184
185 static krb5_error_code create_signature
186 (unsigned char **, unsigned int *, unsigned char *, unsigned int,
187 EVP_PKEY *pkey);
188
189 static krb5_error_code pkinit_decode_data
190 (krb5_context context, pkinit_identity_crypto_context cryptoctx,
191 unsigned char *data, unsigned int data_len,
192 unsigned char **decoded, unsigned int *decoded_len);
193
194 static krb5_error_code decode_data
195 (unsigned char **, unsigned int *, unsigned char *, unsigned int,
196 EVP_PKEY *pkey, X509 *cert);
197
198 #ifdef DEBUG_DH
199 static void print_dh(DH *, char *);
200 static void print_pubkey(BIGNUM *, char *);
201 #endif
202
203 static int prepare_enc_data
204 (unsigned char *indata, int indata_len, unsigned char **outdata,
205 int *outdata_len);
206
207 static int openssl_callback (int, X509_STORE_CTX *);
208 static int openssl_callback_ignore_crls (int, X509_STORE_CTX *);
209
210 static int pkcs7_decrypt
211 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
212 PKCS7 *p7, BIO *bio);
213
214 static BIO * pkcs7_dataDecode
215 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
216 PKCS7 *p7);
217
218 static ASN1_OBJECT * pkinit_pkcs7type2oid
219 (pkinit_plg_crypto_context plg_cryptoctx, int pkcs7_type);
220
221 static krb5_error_code pkinit_create_sequence_of_principal_identifiers
222 (krb5_context context, pkinit_plg_crypto_context plg_cryptoctx,
223 pkinit_req_crypto_context req_cryptoctx,
224 pkinit_identity_crypto_context id_cryptoctx,
225 int type, krb5_data **out_data);
226
227 #ifndef WITHOUT_PKCS11
228 static krb5_error_code pkinit_find_private_key
229 (pkinit_identity_crypto_context, CK_ATTRIBUTE_TYPE usage,
230 CK_OBJECT_HANDLE *objp);
231 static krb5_error_code pkinit_login
232 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
233 CK_TOKEN_INFO *tip);
234 static void * pkinit_C_LoadModule(const char *modname, CK_FUNCTION_LIST_PTR_PTR p11p);
235 static CK_RV pkinit_C_UnloadModule(void *handle);
236 #ifdef SILLYDECRYPT
237 CK_RV pkinit_C_Decrypt
238 (pkinit_identity_crypto_context id_cryptoctx,
239 CK_BYTE_PTR pEncryptedData, CK_ULONG ulEncryptedDataLen,
240 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
241 #endif
242
243 static krb5_error_code pkinit_sign_data_pkcs11
244 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
245 unsigned char *data, unsigned int data_len,
246 unsigned char **sig, unsigned int *sig_len);
247 static krb5_error_code pkinit_decode_data_pkcs11
248 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
249 unsigned char *data, unsigned int data_len,
250 unsigned char **decoded_data, unsigned int *decoded_data_len);
251 #endif /* WITHOUT_PKCS11 */
252
253 static krb5_error_code pkinit_sign_data_fs
254 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
255 unsigned char *data, unsigned int data_len,
256 unsigned char **sig, unsigned int *sig_len);
257 static krb5_error_code pkinit_decode_data_fs
258 (krb5_context context, pkinit_identity_crypto_context id_cryptoctx,
259 unsigned char *data, unsigned int data_len,
260 unsigned char **decoded_data, unsigned int *decoded_data_len);
261
262 static krb5_error_code der_decode_data
263 (unsigned char *, long, unsigned char **, long *);
264
265 static krb5_error_code
266 create_krb5_invalidCertificates(krb5_context context,
267 pkinit_plg_crypto_context plg_cryptoctx,
268 pkinit_req_crypto_context req_cryptoctx,
269 pkinit_identity_crypto_context id_cryptoctx,
270 krb5_external_principal_identifier *** ids);
271
272 static krb5_error_code
273 create_identifiers_from_stack(STACK_OF(X509) *sk,
274 krb5_external_principal_identifier *** ids);
275 #ifdef LONGHORN_BETA_COMPAT
276 static int
277 wrap_signeddata(unsigned char *data, unsigned int data_len,
278 unsigned char **out, unsigned int *out_len,
279 int is_longhorn_server);
280 #else
281 static int
282 wrap_signeddata(unsigned char *data, unsigned int data_len,
283 unsigned char **out, unsigned int *out_len);
284 #endif
285
286 /* This handy macro borrowed from crypto/x509v3/v3_purp.c */
287
288 #if OPENSSL_VERSION_NUMBER < 0x10100000L
289 #define ku_reject(x, usage) \
290 (((x)->ex_flags & EXFLAG_KUSAGE) && !((x)->ex_kusage & (usage)))
291 #else
292 #define ku_reject(x, usage) \
293 ((X509_get_extension_flags(x) & EXFLAG_KUSAGE) && \
294 !(X509_get_key_usage(x) & (usage)))
295 #endif
296
297 static char *
298 pkinit_pkcs11_code_to_text(int err);
299
300 #endif /* _PKINIT_CRYPTO_OPENSSL_H */