25RCSID(
"$Id: 98a9b2c74954ced9fb4ffed45d3237ff55bfba8e $")
29#define LOG_PREFIX "tls"
31#include <freeradius-devel/tls/openssl_user_macros.h>
32#include <freeradius-devel/util/pair.h>
33#include <freeradius-devel/server/request.h>
34#include <freeradius-devel/server/pair.h>
35#include <freeradius-devel/der/der.h>
43#include <openssl/x509v3.h>
44#include <openssl/ssl.h>
53 GENERAL_NAMES *
names = NULL;
57 if (!(
names = X509V3_EXT_d2i(ext)))
return false;
59 for (i = 0; i < sk_GENERAL_NAME_num(
names); i++) {
60 GENERAL_NAME *
name = sk_GENERAL_NAME_value(
names, i);
68 (
char const *)ASN1_STRING_get0_data(
name->d.rfc822Name),
69 ASN1_STRING_length(
name->d.rfc822Name),
true) == 0);
77 (
char const *)ASN1_STRING_get0_data(
name->d.dNSName),
78 ASN1_STRING_length(
name->d.dNSName),
true) == 0);
84 if (NID_ms_upn != OBJ_obj2nid(
name->d.otherName->type_id))
break;
87 if (
name->d.otherName->value->type == V_ASN1_UTF8STRING) {
91 (
char const *)ASN1_STRING_get0_data(
name->d.otherName->value->value.utf8string),
92 ASN1_STRING_length(
name->d.otherName->value->value.utf8string),
96 RWARN(
"Invalid UPN in Subject Alt Name (should be UTF-8)");
114 ASN1_STRING *s = X509_EXTENSION_get_data(ext);
115 char unsigned const *
data = ASN1_STRING_get0_data(s);
116 STACK_OF(DIST_POINT) *dps;
118 STACK_OF(GENERAL_NAME) *
names;
123 if (!(dps = d2i_CRL_DIST_POINTS(NULL, &
data, ASN1_STRING_length(s))))
return false;
125 for (i = 0; i < sk_DIST_POINT_num(dps); i++) {
126 dp = sk_DIST_POINT_value(dps, i);
127 names = dp->distpoint->name.fullname;
133 if (dp->reasons)
continue;
135 for (j = 0; j < sk_GENERAL_NAME_num(
names); j++) {
138 if (
name->type != GEN_URI)
continue;
142 (
char const *)ASN1_STRING_get0_data(
name->d.uniformResourceIdentifier),
147 CRL_DIST_POINTS_free(dps);
165#
if OPENSSL_VERSION_NUMBER >= 0x30400000L
175 ASN1_TIME
const *asn_time;
178 STACK_OF(X509_EXTENSION)
const *ext_list = NULL;
182 bool san_found =
false, crl_found =
false;
188#if OPENSSL_VERSION_NUMBER >= 0x30400000L
195 der_len = i2d_X509(cert, NULL);
197 fr_tls_log(request,
"Failed retrieving certificate");
200 der_ctx.
tmp_ctx = talloc_new(ctx);
207 fr_tls_log(request,
"Failed decoding certificate");
217 if (
unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(
vp, 256, 0),
218 X509_get_subject_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
219 fr_tls_bio_dbuff_thread_local_clear();
220 fr_tls_log(request,
"Failed retrieving certificate subject");
232 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert),
233 NID_commonName, NULL, 0);
240 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert), NID_commonName, cn, (
size_t)slen + 1);
242 fr_tls_log(request,
"Failed retrieving certificate common name");
251 ASN1_BIT_STRING
const *sig;
252 X509_ALGOR
const *alg;
254 X509_get0_signature(&sig, &alg, cert);
258 (
uint8_t const *)ASN1_STRING_get0_data(sig),
259 ASN1_STRING_length(sig),
true) == 0);
261 OBJ_obj2txt(
buff,
sizeof(
buff), alg->algorithm, 0);
270 if (
unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(
vp, 256, 0),
271 X509_get_issuer_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
272 fr_tls_bio_dbuff_thread_local_clear();
273 fr_tls_log(request,
"Failed retrieving certificate issuer");
282 ASN1_INTEGER
const *serial = NULL;
286 serial = X509_get0_serialNumber(cert);
288 fr_tls_log(request,
"Failed retrieving certificate serial");
292 len = i2d_ASN1_INTEGER(serial, NULL);
295 i2d_ASN1_INTEGER(serial, &der);
301 asn_time = X509_get0_notBefore(cert);
304 RPWDEBUG(
"Failed parsing certificate not-before");
314 asn_time = X509_get0_notAfter(cert);
317 RPWDEBUG(
"Failed parsing certificate not-after");
327 loc = X509_get_ext_by_NID(cert, NID_subject_alt_name, 0);
329 X509_EXTENSION *ext = X509_get_ext(cert, loc);
330 if (ext) san_found = tls_session_pairs_from_san(
pair_list, ctx, request, ext);
333 loc = X509_get_ext_by_NID(cert, NID_crl_distribution_points, 0);
335 X509_EXTENSION *ext = X509_get_ext(cert, loc);
336 if (ext) crl_found = tls_session_pairs_from_crl(
pair_list, ctx, request, ext);
342 ext_list = X509_get0_extensions(cert);
344 RWDEBUG(
"Failed retrieving extensions");
352 if (sk_X509_EXTENSION_num(ext_list) > 0) {
355 fr_tls_bio_dbuff_t *bd;
358 bio = fr_tls_bio_dbuff_alloc(&bd, NULL, NULL, 257, 4097,
true);
359 in = fr_tls_bio_dbuff_in(bd);
360 out = fr_tls_bio_dbuff_out(bd);
362 for (i = 0; i < sk_X509_EXTENSION_num(ext_list); i++) {
368 ext = sk_X509_EXTENSION_value(ext_list, i);
370 obj = X509_EXTENSION_get_object(ext);
380 if (OBJ_obj2nid(obj) == NID_subject_alt_name) {
381 if (!san_found) san_found = tls_session_pairs_from_san(
pair_list, ctx, request, ext);
385 if (OBJ_obj2nid(obj) == NID_crl_distribution_points) {
386 if (!crl_found) crl_found = tls_session_pairs_from_crl(
pair_list, ctx, request, ext);
390 if (i2a_ASN1_OBJECT(bio, obj) <= 0) {
391 RPWDEBUG(
"Skipping X509 Extension (%i) conversion to attribute. "
392 "Conversion from ASN1 failed...", i);
394 fr_tls_bio_dbuff_reset(bd);
412 RWDEBUG(
"Attribute name too long");
421 RWDEBUG3(
"Skipping attribute \"%pV\": "
422 "Add a dictionary definition if you want to access it",
429 fr_tls_bio_dbuff_reset(bd);
431 if (X509V3_EXT_print(bio, ext, X509V3_EXT_PARSE_UNKNOWN, 0) != 1) {
432 REDEBUG(
"Failed extracting data for \"%s\"", da->name);
445 fr_tls_bio_dbuff_reset(bd);
#define USES_APPLE_DEPRECATED_API
#define DIAG_UNKNOWN_PRAGMAS
#define fr_dbuff_current(_dbuff_or_marker)
Return the 'current' position of a dbuff or marker.
#define fr_dbuff_set(_dst, _src)
Set the 'current' position in a dbuff or marker using another dbuff or marker, a char pointer,...
#define fr_dbuff_end(_dbuff_or_marker)
Return the current 'end' position of a dbuff or marker.
#define fr_dbuff_remaining(_dbuff_or_marker)
Return the number of bytes remaining between the dbuff or marker and the end of the buffer.
#define fr_dbuff_in_bytes(_dbuff_or_marker,...)
Copy a byte sequence into a dbuff or marker.
#define FR_DBUFF_TMP(_start, _len_or_end)
Creates a compound literal to pass into functions which accept a dbuff.
TALLOC_CTX * tmp_ctx
ctx under which temporary data will be allocated
bool const fr_dict_attr_allowed_chars[UINT8_MAX+1]
Characters allowed in a single dictionary attribute name.
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
#define RPWDEBUG3(fmt,...)
#define RPWDEBUG(fmt,...)
#define RWDEBUG3(fmt,...)
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject
HIDDEN fr_dict_attr_t const * attr_tls_certificate_serial
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_dns
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_after
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_before
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature_algorithm
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_upn
HIDDEN fr_dict_attr_t const * attr_tls_certificate_common_name
HIDDEN fr_dict_attr_t const * attr_tls_certificate_issuer
HIDDEN fr_dict_attr_t const * attr_tls_certificate_x509v3_crl_distribution_points
HIDDEN fr_dict_attr_t const * attr_der_certificate
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_email
int fr_pair_append_by_da(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, fr_dict_attr_t const *da)
Alloc a new fr_pair_t (and append)
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
int fr_pair_value_strdup(fr_pair_t *vp, char const *src, bool tainted)
Copy data into an "string" data type.
int fr_pair_value_bstrdup_buffer_shallow(fr_pair_t *vp, char const *src, bool tainted)
Assign a string to a "string" type value pair.
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, UNUSED bool tainted)
Convert string value to native attribute value.
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
int fr_pair_value_bstr_alloc(fr_pair_t *vp, char **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "string" type value pair.
int fr_pair_value_mem_alloc(fr_pair_t *vp, uint8_t **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "octets" type value pair.
ssize_t fr_der_decode_pair_dbuff(TALLOC_CTX *ctx, fr_pair_list_t *out, fr_dict_attr_t const *parent, fr_dbuff_t *in, fr_der_decode_ctx_t *decode_ctx)
static char buff[sizeof("18446744073709551615")+3]
Stores an attribute, a value and various bits of other data.
static const char * names[8]
static fr_unix_time_t fr_unix_time_from_time(time_t time)
Convert a time_t into out internal fr_unix_time_t.
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
int fr_tls_utils_asn1time_to_epoch(time_t *out, ASN1_TIME const *asn1)
Convert OpenSSL's ASN1_TIME to an epoch time.
#define fr_box_strvalue_buffer(_val)
#define fr_box_strvalue_len(_val, _len)
static size_t char ** out