mirror of
https://github.com/espressif/esp-idf.git
synced 2025-11-28 21:29:50 +01:00
wpa_supplicant: sync eap code with upstream
This commit is contained in:
759
components/wpa_supplicant/src/tls/tlsv1_client_ocsp.c
Normal file
759
components/wpa_supplicant/src/tls/tlsv1_client_ocsp.c
Normal file
@@ -0,0 +1,759 @@
|
||||
/*
|
||||
* TLSv1 client - OCSP
|
||||
* Copyright (c) 2015, Jouni Malinen <j@w1.fi>
|
||||
*
|
||||
* This software may be distributed under the terms of the BSD license.
|
||||
* See README for more details.
|
||||
*/
|
||||
|
||||
#include "includes.h"
|
||||
|
||||
#include "common.h"
|
||||
#include "crypto/tls.h"
|
||||
#include "crypto/sha1.h"
|
||||
#include "asn1.h"
|
||||
#include "x509v3.h"
|
||||
#include "tlsv1_common.h"
|
||||
#include "tlsv1_record.h"
|
||||
#include "tlsv1_client.h"
|
||||
#include "tlsv1_client_i.h"
|
||||
|
||||
|
||||
/* RFC 6960, 4.2.1: OCSPResponseStatus ::= ENUMERATED */
|
||||
enum ocsp_response_status {
|
||||
OCSP_RESP_STATUS_SUCCESSFUL = 0,
|
||||
OCSP_RESP_STATUS_MALFORMED_REQ = 1,
|
||||
OCSP_RESP_STATUS_INT_ERROR = 2,
|
||||
OCSP_RESP_STATUS_TRY_LATER = 3,
|
||||
/* 4 not used */
|
||||
OCSP_RESP_STATUS_SIG_REQUIRED = 5,
|
||||
OCSP_RESP_STATUS_UNAUTHORIZED = 6,
|
||||
};
|
||||
|
||||
|
||||
static int is_oid_basic_ocsp_resp(struct asn1_oid *oid)
|
||||
{
|
||||
return oid->len == 10 &&
|
||||
oid->oid[0] == 1 /* iso */ &&
|
||||
oid->oid[1] == 3 /* identified-organization */ &&
|
||||
oid->oid[2] == 6 /* dod */ &&
|
||||
oid->oid[3] == 1 /* internet */ &&
|
||||
oid->oid[4] == 5 /* security */ &&
|
||||
oid->oid[5] == 5 /* mechanisms */ &&
|
||||
oid->oid[6] == 7 /* id-pkix */ &&
|
||||
oid->oid[7] == 48 /* id-ad */ &&
|
||||
oid->oid[8] == 1 /* id-pkix-ocsp */ &&
|
||||
oid->oid[9] == 1 /* id-pkix-ocsp-basic */;
|
||||
}
|
||||
|
||||
|
||||
static int ocsp_responder_id_match(struct x509_certificate *signer,
|
||||
struct x509_name *name, const u8 *key_hash)
|
||||
{
|
||||
if (key_hash) {
|
||||
u8 hash[SHA1_MAC_LEN];
|
||||
const u8 *addr[1] = { signer->public_key };
|
||||
size_t len[1] = { signer->public_key_len };
|
||||
|
||||
if (sha1_vector(1, addr, len, hash) < 0)
|
||||
return 0;
|
||||
return os_memcmp(hash, key_hash, SHA1_MAC_LEN) == 0;
|
||||
}
|
||||
|
||||
return x509_name_compare(&signer->subject, name) == 0;
|
||||
}
|
||||
|
||||
|
||||
static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data,
|
||||
size_t data_len, u8 *hash)
|
||||
{
|
||||
const u8 *addr[1] = { data };
|
||||
size_t len[1] = { data_len };
|
||||
char buf[100];
|
||||
|
||||
if (x509_sha1_oid(alg)) {
|
||||
if (sha1_vector(1, addr, len, hash) < 0)
|
||||
return 0;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA1)", hash, 20);
|
||||
return 20;
|
||||
}
|
||||
|
||||
if (x509_sha256_oid(alg)) {
|
||||
if (sha256_vector(1, addr, len, hash) < 0)
|
||||
return 0;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA256)", hash, 32);
|
||||
return 32;
|
||||
}
|
||||
|
||||
if (x509_sha384_oid(alg)) {
|
||||
if (sha384_vector(1, addr, len, hash) < 0)
|
||||
return 0;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA384)", hash, 48);
|
||||
return 48;
|
||||
}
|
||||
|
||||
if (x509_sha512_oid(alg)) {
|
||||
if (sha512_vector(1, addr, len, hash) < 0)
|
||||
return 0;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: Hash (SHA512)", hash, 64);
|
||||
return 64;
|
||||
}
|
||||
|
||||
|
||||
asn1_oid_to_str(alg, buf, sizeof(buf));
|
||||
wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s",
|
||||
buf);
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
static int tls_process_ocsp_single_response(struct tlsv1_client *conn,
|
||||
struct x509_certificate *cert,
|
||||
struct x509_certificate *issuer,
|
||||
const u8 *resp, size_t len,
|
||||
enum tls_ocsp_result *res)
|
||||
{
|
||||
struct asn1_hdr hdr;
|
||||
const u8 *pos, *end;
|
||||
struct x509_algorithm_identifier alg;
|
||||
const u8 *name_hash, *key_hash;
|
||||
size_t name_hash_len, key_hash_len;
|
||||
const u8 *serial_number;
|
||||
size_t serial_number_len;
|
||||
u8 hash[64];
|
||||
unsigned int hash_len;
|
||||
unsigned int cert_status;
|
||||
os_time_t update;
|
||||
struct os_time now;
|
||||
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: SingleResponse", resp, len);
|
||||
|
||||
/*
|
||||
* SingleResponse ::= SEQUENCE {
|
||||
* certID CertID,
|
||||
* certStatus CertStatus,
|
||||
* thisUpdate GeneralizedTime,
|
||||
* nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL,
|
||||
* singleExtensions [1] EXPLICIT Extensions OPTIONAL }
|
||||
*/
|
||||
|
||||
/* CertID ::= SEQUENCE */
|
||||
if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr, "OCSP: Expected SEQUENCE (CertID)");
|
||||
return -1;
|
||||
}
|
||||
pos = hdr.payload;
|
||||
end = hdr.payload + hdr.length;
|
||||
|
||||
/*
|
||||
* CertID ::= SEQUENCE {
|
||||
* hashAlgorithm AlgorithmIdentifier,
|
||||
* issuerNameHash OCTET STRING,
|
||||
* issuerKeyHash OCTET STRING,
|
||||
* serialNumber CertificateSerialNumber }
|
||||
*/
|
||||
|
||||
/* hashAlgorithm AlgorithmIdentifier */
|
||||
if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos))
|
||||
return -1;
|
||||
|
||||
/* issuerNameHash OCTET STRING */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_octetstring(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected OCTET STRING (issuerNameHash)");
|
||||
return -1;
|
||||
}
|
||||
name_hash = hdr.payload;
|
||||
name_hash_len = hdr.length;
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: issuerNameHash",
|
||||
name_hash, name_hash_len);
|
||||
pos = hdr.payload + hdr.length;
|
||||
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: Issuer subject DN",
|
||||
issuer->subject_dn, issuer->subject_dn_len);
|
||||
hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn,
|
||||
issuer->subject_dn_len, hash);
|
||||
if (hash_len == 0 || name_hash_len != hash_len ||
|
||||
os_memcmp(name_hash, hash, hash_len) != 0) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: issuerNameHash mismatch");
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerNameHash",
|
||||
hash, hash_len);
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* issuerKeyHash OCTET STRING */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_octetstring(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected OCTET STRING (issuerKeyHash)");
|
||||
return -1;
|
||||
}
|
||||
key_hash = hdr.payload;
|
||||
key_hash_len = hdr.length;
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: issuerKeyHash", key_hash, key_hash_len);
|
||||
pos = hdr.payload + hdr.length;
|
||||
|
||||
hash_len = ocsp_hash_data(&alg.oid, issuer->public_key,
|
||||
issuer->public_key_len, hash);
|
||||
if (hash_len == 0 || key_hash_len != hash_len ||
|
||||
os_memcmp(key_hash, hash, hash_len) != 0) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: issuerKeyHash mismatch");
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: Calculated issuerKeyHash",
|
||||
hash, hash_len);
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* serialNumber CertificateSerialNumber ::= INTEGER */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_integer(&hdr) ||
|
||||
hdr.length < 1 || hdr.length > X509_MAX_SERIAL_NUM_LEN) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: No INTEGER tag found for serialNumber");
|
||||
return -1;
|
||||
}
|
||||
serial_number = hdr.payload;
|
||||
serial_number_len = hdr.length;
|
||||
while (serial_number_len > 0 && serial_number[0] == 0) {
|
||||
serial_number++;
|
||||
serial_number_len--;
|
||||
}
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: serialNumber", serial_number,
|
||||
serial_number_len);
|
||||
|
||||
if (serial_number_len != cert->serial_number_len ||
|
||||
os_memcmp(serial_number, cert->serial_number,
|
||||
serial_number_len) != 0) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: serialNumber mismatch");
|
||||
return -1;
|
||||
}
|
||||
|
||||
pos = end;
|
||||
end = resp + len;
|
||||
|
||||
/* certStatus CertStatus ::= CHOICE
|
||||
*
|
||||
* CertStatus ::= CHOICE {
|
||||
* good [0] IMPLICIT NULL,
|
||||
* revoked [1] IMPLICIT RevokedInfo,
|
||||
* unknown [2] IMPLICIT UnknownInfo }
|
||||
*/
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
hdr.class != ASN1_CLASS_CONTEXT_SPECIFIC) {
|
||||
asn1_unexpected(&hdr, "OCSP: Expected CHOICE (CertStatus)");
|
||||
return -1;
|
||||
}
|
||||
cert_status = hdr.tag;
|
||||
wpa_printf(MSG_DEBUG, "OCSP: certStatus=%u", cert_status);
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: CertStatus additional data",
|
||||
hdr.payload, hdr.length);
|
||||
pos = hdr.payload + hdr.length;
|
||||
|
||||
os_get_time(&now);
|
||||
/* thisUpdate GeneralizedTime */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_generalizedtime(&hdr) ||
|
||||
x509_parse_time(hdr.payload, hdr.length, hdr.tag, &update) < 0) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: Failed to parse thisUpdate");
|
||||
return -1;
|
||||
}
|
||||
wpa_printf(MSG_DEBUG, "OCSP: thisUpdate %lu", (unsigned long) update);
|
||||
pos = hdr.payload + hdr.length;
|
||||
if ((unsigned long) now.sec < (unsigned long) update) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: thisUpdate time in the future (response not yet valid)");
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL */
|
||||
if (pos < end) {
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0)
|
||||
return -1;
|
||||
if (asn1_is_cs_tag(&hdr, 0) && hdr.constructed) {
|
||||
const u8 *next = hdr.payload + hdr.length;
|
||||
|
||||
if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 ||
|
||||
!asn1_is_generalizedtime(&hdr) ||
|
||||
x509_parse_time(hdr.payload, hdr.length, hdr.tag,
|
||||
&update) < 0) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Failed to parse nextUpdate");
|
||||
return -1;
|
||||
}
|
||||
wpa_printf(MSG_DEBUG, "OCSP: nextUpdate %lu",
|
||||
(unsigned long) update);
|
||||
pos = next;
|
||||
if ((unsigned long) now.sec > (unsigned long) update) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: nextUpdate time in the past (response has expired)");
|
||||
return -1;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/* singleExtensions [1] EXPLICIT Extensions OPTIONAL */
|
||||
if (pos < end) {
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: singleExtensions",
|
||||
pos, end - pos);
|
||||
/* Ignore for now */
|
||||
}
|
||||
|
||||
if (cert_status == 0 /* good */)
|
||||
*res = TLS_OCSP_GOOD;
|
||||
else if (cert_status == 1 /* revoked */)
|
||||
*res = TLS_OCSP_REVOKED;
|
||||
else
|
||||
return -1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
static enum tls_ocsp_result
|
||||
tls_process_ocsp_responses(struct tlsv1_client *conn,
|
||||
struct x509_certificate *cert,
|
||||
struct x509_certificate *issuer, const u8 *resp,
|
||||
size_t len)
|
||||
{
|
||||
struct asn1_hdr hdr;
|
||||
const u8 *pos, *end;
|
||||
enum tls_ocsp_result res;
|
||||
|
||||
pos = resp;
|
||||
end = resp + len;
|
||||
while (pos < end) {
|
||||
/* SingleResponse ::= SEQUENCE */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (SingleResponse)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
if (tls_process_ocsp_single_response(conn, cert, issuer,
|
||||
hdr.payload, hdr.length,
|
||||
&res) == 0)
|
||||
return res;
|
||||
pos = hdr.payload + hdr.length;
|
||||
}
|
||||
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Did not find a response matching the server certificate");
|
||||
return TLS_OCSP_NO_RESPONSE;
|
||||
}
|
||||
|
||||
|
||||
static enum tls_ocsp_result
|
||||
tls_process_basic_ocsp_response(struct tlsv1_client *conn,
|
||||
struct x509_certificate *srv_cert,
|
||||
const u8 *resp, size_t len)
|
||||
{
|
||||
struct asn1_hdr hdr;
|
||||
const u8 *pos, *end;
|
||||
const u8 *resp_data, *sign_value, *key_hash = NULL, *responses;
|
||||
const u8 *resp_data_signed;
|
||||
size_t resp_data_len, sign_value_len, responses_len;
|
||||
size_t resp_data_signed_len;
|
||||
struct x509_algorithm_identifier alg;
|
||||
struct x509_certificate *certs = NULL, *last_cert = NULL;
|
||||
struct x509_certificate *issuer, *signer;
|
||||
struct x509_name name; /* used if key_hash == NULL */
|
||||
char buf[100];
|
||||
os_time_t produced_at;
|
||||
enum tls_ocsp_result res;
|
||||
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: BasicOCSPResponse", resp, len);
|
||||
|
||||
os_memset(&name, 0, sizeof(name));
|
||||
|
||||
/*
|
||||
* RFC 6960, 4.2.1:
|
||||
* BasicOCSPResponse ::= SEQUENCE {
|
||||
* tbsResponseData ResponseData,
|
||||
* signatureAlgorithm AlgorithmIdentifier,
|
||||
* signature BIT STRING,
|
||||
* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
|
||||
*/
|
||||
|
||||
if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (BasicOCSPResponse)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
pos = hdr.payload;
|
||||
end = hdr.payload + hdr.length;
|
||||
|
||||
/* ResponseData ::= SEQUENCE */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (ResponseData)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
resp_data = hdr.payload;
|
||||
resp_data_len = hdr.length;
|
||||
resp_data_signed = pos;
|
||||
pos = hdr.payload + hdr.length;
|
||||
resp_data_signed_len = pos - resp_data_signed;
|
||||
|
||||
/* signatureAlgorithm AlgorithmIdentifier */
|
||||
if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos))
|
||||
return TLS_OCSP_INVALID;
|
||||
|
||||
/* signature BIT STRING */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_bitstring(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected BITSTRING (signature)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
if (hdr.length < 1)
|
||||
return TLS_OCSP_INVALID;
|
||||
pos = hdr.payload;
|
||||
if (*pos) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: BITSTRING - %d unused bits", *pos);
|
||||
/* PKCS #1 v1.5 10.2.1:
|
||||
* It is an error if the length in bits of the signature S is
|
||||
* not a multiple of eight.
|
||||
*/
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
sign_value = pos + 1;
|
||||
sign_value_len = hdr.length - 1;
|
||||
pos += hdr.length;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: signature", sign_value, sign_value_len);
|
||||
|
||||
/* certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL */
|
||||
if (pos < end) {
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!hdr.constructed || !asn1_is_cs_tag(&hdr, 0)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected [0] EXPLICIT (certs)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: certs",
|
||||
hdr.payload, hdr.length);
|
||||
pos = hdr.payload;
|
||||
end = hdr.payload + hdr.length;
|
||||
while (pos < end) {
|
||||
struct x509_certificate *cert;
|
||||
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (Certificate)");
|
||||
goto fail;
|
||||
}
|
||||
|
||||
cert = x509_certificate_parse(hdr.payload, hdr.length);
|
||||
if (!cert)
|
||||
goto fail;
|
||||
if (last_cert) {
|
||||
last_cert->next = cert;
|
||||
last_cert = cert;
|
||||
} else {
|
||||
last_cert = certs = cert;
|
||||
}
|
||||
pos = hdr.payload + hdr.length;
|
||||
}
|
||||
}
|
||||
|
||||
/*
|
||||
* ResponseData ::= SEQUENCE {
|
||||
* version [0] EXPLICIT Version DEFAULT v1,
|
||||
* responderID ResponderID,
|
||||
* producedAt GeneralizedTime,
|
||||
* responses SEQUENCE OF SingleResponse,
|
||||
* responseExtensions [1] EXPLICIT Extensions OPTIONAL }
|
||||
*/
|
||||
pos = resp_data;
|
||||
end = resp_data + resp_data_len;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: ResponseData", pos, end - pos);
|
||||
|
||||
/*
|
||||
* version [0] EXPLICIT Version DEFAULT v1
|
||||
* Version ::= INTEGER { v1(0) }
|
||||
*/
|
||||
if (asn1_get_next(pos, end - pos, &hdr) == 0 && hdr.constructed &&
|
||||
asn1_is_cs_tag(&hdr, 0)) {
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_integer(&hdr) || hdr.length != 1) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: No INTEGER (len=1) tag found for version field");
|
||||
goto fail;
|
||||
}
|
||||
wpa_printf(MSG_DEBUG, "OCSP: ResponseData version %u",
|
||||
hdr.payload[0]);
|
||||
if (hdr.payload[0] != 0) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Unsupported ResponseData version %u",
|
||||
hdr.payload[0]);
|
||||
goto no_resp;
|
||||
}
|
||||
pos = hdr.payload + hdr.length;
|
||||
} else {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Default ResponseData version (v1)");
|
||||
}
|
||||
|
||||
/*
|
||||
* ResponderID ::= CHOICE {
|
||||
* byName [1] Name,
|
||||
* byKey [2] KeyHash }
|
||||
*/
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
hdr.class != ASN1_CLASS_CONTEXT_SPECIFIC) {
|
||||
asn1_unexpected(&hdr, "OCSP: Expected CHOICE (ResponderID)");
|
||||
goto fail;
|
||||
}
|
||||
|
||||
if (hdr.tag == 1) {
|
||||
/* Name */
|
||||
if (x509_parse_name(hdr.payload, hdr.length, &name, &pos) < 0)
|
||||
goto fail;
|
||||
x509_name_string(&name, buf, sizeof(buf));
|
||||
wpa_printf(MSG_DEBUG, "OCSP: ResponderID byName Name: %s", buf);
|
||||
} else if (hdr.tag == 2) {
|
||||
/* KeyHash ::= OCTET STRING */
|
||||
if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 ||
|
||||
!asn1_is_octetstring(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected OCTET STRING (KeyHash)");
|
||||
goto fail;
|
||||
}
|
||||
key_hash = hdr.payload;
|
||||
wpa_hexdump(MSG_DEBUG, "OCSP: ResponderID byKey KeyHash",
|
||||
key_hash, hdr.length);
|
||||
if (hdr.length != SHA1_MAC_LEN) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Unexpected byKey KeyHash length %u - expected %u for SHA-1",
|
||||
hdr.length, SHA1_MAC_LEN);
|
||||
goto fail;
|
||||
}
|
||||
pos = hdr.payload + hdr.length;
|
||||
} else {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: Unexpected ResponderID CHOICE %u",
|
||||
hdr.tag);
|
||||
goto fail;
|
||||
}
|
||||
|
||||
/* producedAt GeneralizedTime */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_generalizedtime(&hdr) ||
|
||||
x509_parse_time(hdr.payload, hdr.length, hdr.tag,
|
||||
&produced_at) < 0) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: Failed to parse producedAt");
|
||||
goto fail;
|
||||
}
|
||||
wpa_printf(MSG_DEBUG, "OCSP: producedAt %lu",
|
||||
(unsigned long) produced_at);
|
||||
pos = hdr.payload + hdr.length;
|
||||
|
||||
/* responses SEQUENCE OF SingleResponse */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (responses)");
|
||||
goto fail;
|
||||
}
|
||||
responses = hdr.payload;
|
||||
responses_len = hdr.length;
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: responses", responses, responses_len);
|
||||
pos = hdr.payload + hdr.length;
|
||||
|
||||
if (pos < end) {
|
||||
/* responseExtensions [1] EXPLICIT Extensions OPTIONAL */
|
||||
wpa_hexdump(MSG_MSGDUMP, "OCSP: responseExtensions",
|
||||
pos, end - pos);
|
||||
/* Ignore for now. */
|
||||
}
|
||||
|
||||
if (!srv_cert) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Server certificate not known - cannot check OCSP response");
|
||||
goto no_resp;
|
||||
}
|
||||
|
||||
if (srv_cert->next) {
|
||||
/* Issuer has already been verified in the chain */
|
||||
issuer = srv_cert->next;
|
||||
} else {
|
||||
/* Find issuer from the set of trusted certificates */
|
||||
for (issuer = conn->cred ? conn->cred->trusted_certs : NULL;
|
||||
issuer; issuer = issuer->next) {
|
||||
if (x509_name_compare(&srv_cert->issuer,
|
||||
&issuer->subject) == 0)
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (!issuer) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Server certificate issuer not known - cannot check OCSP response");
|
||||
goto no_resp;
|
||||
}
|
||||
|
||||
if (ocsp_responder_id_match(issuer, &name, key_hash)) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Server certificate issuer certificate matches ResponderID");
|
||||
signer = issuer;
|
||||
} else {
|
||||
for (signer = certs; signer; signer = signer->next) {
|
||||
if (!ocsp_responder_id_match(signer, &name, key_hash) ||
|
||||
x509_name_compare(&srv_cert->issuer,
|
||||
&issuer->subject) != 0 ||
|
||||
!(signer->ext_key_usage &
|
||||
X509_EXT_KEY_USAGE_OCSP) ||
|
||||
x509_certificate_check_signature(issuer, signer) <
|
||||
0)
|
||||
continue;
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: An extra certificate from the response matches ResponderID and is trusted as an OCSP signer");
|
||||
break;
|
||||
}
|
||||
if (!signer) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Could not find OCSP signer certificate");
|
||||
goto no_resp;
|
||||
}
|
||||
}
|
||||
|
||||
x509_free_name(&name);
|
||||
os_memset(&name, 0, sizeof(name));
|
||||
x509_certificate_chain_free(certs);
|
||||
certs = NULL;
|
||||
|
||||
if (x509_check_signature(signer, &alg, sign_value, sign_value_len,
|
||||
resp_data_signed, resp_data_signed_len) < 0) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: Invalid signature");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
|
||||
res = tls_process_ocsp_responses(conn, srv_cert, issuer,
|
||||
responses, responses_len);
|
||||
if (res == TLS_OCSP_REVOKED)
|
||||
srv_cert->ocsp_revoked = 1;
|
||||
else if (res == TLS_OCSP_GOOD)
|
||||
srv_cert->ocsp_good = 1;
|
||||
return res;
|
||||
|
||||
no_resp:
|
||||
x509_free_name(&name);
|
||||
x509_certificate_chain_free(certs);
|
||||
return TLS_OCSP_NO_RESPONSE;
|
||||
|
||||
fail:
|
||||
x509_free_name(&name);
|
||||
x509_certificate_chain_free(certs);
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
|
||||
|
||||
enum tls_ocsp_result tls_process_ocsp_response(struct tlsv1_client *conn,
|
||||
const u8 *resp, size_t len)
|
||||
{
|
||||
struct asn1_hdr hdr;
|
||||
const u8 *pos, *end;
|
||||
u8 resp_status;
|
||||
struct asn1_oid oid;
|
||||
char obuf[80];
|
||||
struct x509_certificate *cert;
|
||||
enum tls_ocsp_result res = TLS_OCSP_NO_RESPONSE;
|
||||
enum tls_ocsp_result res_first = res;
|
||||
|
||||
wpa_hexdump(MSG_MSGDUMP, "TLSv1: OCSPResponse", resp, len);
|
||||
|
||||
/*
|
||||
* RFC 6960, 4.2.1:
|
||||
* OCSPResponse ::= SEQUENCE {
|
||||
* responseStatus OCSPResponseStatus,
|
||||
* responseBytes [0] EXPLICIT ResponseBytes OPTIONAL }
|
||||
*/
|
||||
|
||||
if (asn1_get_next(resp, len, &hdr) < 0 || !asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (OCSPResponse)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
pos = hdr.payload;
|
||||
end = hdr.payload + hdr.length;
|
||||
|
||||
/* OCSPResponseStatus ::= ENUMERATED */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_enumerated(&hdr) || hdr.length != 1) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected ENUMERATED (responseStatus)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
resp_status = hdr.payload[0];
|
||||
wpa_printf(MSG_DEBUG, "OCSP: responseStatus %u", resp_status);
|
||||
pos = hdr.payload + hdr.length;
|
||||
if (resp_status != OCSP_RESP_STATUS_SUCCESSFUL) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: No stapling result");
|
||||
return TLS_OCSP_NO_RESPONSE;
|
||||
}
|
||||
|
||||
/* responseBytes [0] EXPLICIT ResponseBytes OPTIONAL */
|
||||
if (pos == end)
|
||||
return TLS_OCSP_NO_RESPONSE;
|
||||
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 || !hdr.constructed ||
|
||||
!asn1_is_cs_tag(&hdr, 0)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected [0] EXPLICIT (responseBytes)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
|
||||
/*
|
||||
* ResponseBytes ::= SEQUENCE {
|
||||
* responseType OBJECT IDENTIFIER,
|
||||
* response OCTET STRING }
|
||||
*/
|
||||
|
||||
if (asn1_get_next(hdr.payload, hdr.length, &hdr) < 0 ||
|
||||
!asn1_is_sequence(&hdr)) {
|
||||
asn1_unexpected(&hdr,
|
||||
"OCSP: Expected SEQUENCE (ResponseBytes)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
pos = hdr.payload;
|
||||
end = hdr.payload + hdr.length;
|
||||
|
||||
/* responseType OBJECT IDENTIFIER */
|
||||
if (asn1_get_oid(pos, end - pos, &oid, &pos)) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Failed to parse OID (responseType)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
asn1_oid_to_str(&oid, obuf, sizeof(obuf));
|
||||
wpa_printf(MSG_DEBUG, "OCSP: responseType %s", obuf);
|
||||
if (!is_oid_basic_ocsp_resp(&oid)) {
|
||||
wpa_printf(MSG_DEBUG, "OCSP: Ignore unsupported response type");
|
||||
return TLS_OCSP_NO_RESPONSE;
|
||||
}
|
||||
|
||||
/* response OCTET STRING */
|
||||
if (asn1_get_next(pos, end - pos, &hdr) < 0 ||
|
||||
!asn1_is_octetstring(&hdr)) {
|
||||
asn1_unexpected(&hdr, "OCSP: Expected OCTET STRING (response)");
|
||||
return TLS_OCSP_INVALID;
|
||||
}
|
||||
|
||||
cert = conn->server_cert;
|
||||
while (cert) {
|
||||
if (!cert->ocsp_good && !cert->ocsp_revoked) {
|
||||
char sbuf[128];
|
||||
|
||||
x509_name_string(&cert->subject, sbuf, sizeof(sbuf));
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"OCSP: Trying to find certificate status for %s",
|
||||
sbuf);
|
||||
|
||||
res = tls_process_basic_ocsp_response(conn, cert,
|
||||
hdr.payload,
|
||||
hdr.length);
|
||||
if (cert == conn->server_cert)
|
||||
res_first = res;
|
||||
}
|
||||
if (res == TLS_OCSP_REVOKED || cert->issuer_trusted)
|
||||
break;
|
||||
cert = cert->next;
|
||||
}
|
||||
return res == TLS_OCSP_REVOKED ? res : res_first;
|
||||
}
|
||||
Reference in New Issue
Block a user