25RCSID(
"$Id: 96d1505c7ed6fa18c2f020a80654ba63bdd60511 $")
29#define LOG_PREFIX "tls"
31#include <freeradius-devel/tls/openssl_user_macros.h>
32#include <freeradius-devel/util/pair.h>
33#include <freeradius-devel/server/request.h>
34#include <freeradius-devel/server/pair.h>
42#include <openssl/x509v3.h>
43#include <openssl/ssl.h>
52 GENERAL_NAMES *
names = NULL;
56 if (!(
names = X509V3_EXT_d2i(ext)))
return false;
58 for (i = 0; i < sk_GENERAL_NAME_num(
names); i++) {
59 GENERAL_NAME *
name = sk_GENERAL_NAME_value(
names, i);
67 (
char const *)ASN1_STRING_get0_data(
name->d.rfc822Name),
68 ASN1_STRING_length(
name->d.rfc822Name),
true) == 0);
76 (
char const *)ASN1_STRING_get0_data(
name->d.dNSName),
77 ASN1_STRING_length(
name->d.dNSName),
true) == 0);
83 if (NID_ms_upn != OBJ_obj2nid(
name->d.otherName->type_id))
break;
86 if (
name->d.otherName->value->type == V_ASN1_UTF8STRING) {
90 (
char const *)ASN1_STRING_get0_data(
name->d.otherName->value->value.utf8string),
91 ASN1_STRING_length(
name->d.otherName->value->value.utf8string),
95 RWARN(
"Invalid UPN in Subject Alt Name (should be UTF-8)");
113 ASN1_STRING *s = X509_EXTENSION_get_data(ext);
114 char unsigned const *
data = ASN1_STRING_get0_data(s);
115 STACK_OF(DIST_POINT) *dps;
117 STACK_OF(GENERAL_NAME) *
names;
122 if (!(dps = d2i_CRL_DIST_POINTS(NULL, &
data, ASN1_STRING_length(s))))
return false;
124 for (i = 0; i < sk_DIST_POINT_num(dps); i++) {
125 dp = sk_DIST_POINT_value(dps, i);
126 names = dp->distpoint->name.fullname;
132 if (dp->reasons)
continue;
134 for (j = 0; j < sk_GENERAL_NAME_num(
names); j++) {
137 if (
name->type != GEN_URI)
continue;
141 (
char const *)ASN1_STRING_get0_data(
name->d.uniformResourceIdentifier),
146 CRL_DIST_POINTS_free(dps);
167 ASN1_TIME
const *asn_time;
170 STACK_OF(X509_EXTENSION)
const *ext_list = NULL;
174 bool san_found =
false, crl_found =
false;
180 if (
unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(
vp, 256, 0),
181 X509_get_subject_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
182 fr_tls_bio_dbuff_thread_local_clear();
183 fr_tls_log(request,
"Failed retrieving certificate subject");
195 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert),
196 NID_commonName, NULL, 0);
203 slen = X509_NAME_get_text_by_NID(X509_get_subject_name(cert), NID_commonName, cn, (
size_t)slen + 1);
205 fr_tls_log(request,
"Failed retrieving certificate common name");
214 ASN1_BIT_STRING
const *sig;
215 X509_ALGOR
const *alg;
217 X509_get0_signature(&sig, &alg, cert);
221 (
uint8_t const *)ASN1_STRING_get0_data(sig),
222 ASN1_STRING_length(sig),
true) == 0);
224 OBJ_obj2txt(
buff,
sizeof(
buff), alg->algorithm, 0);
233 if (
unlikely(X509_NAME_print_ex(fr_tls_bio_dbuff_thread_local(
vp, 256, 0),
234 X509_get_issuer_name(cert), 0, XN_FLAG_ONELINE) < 0)) {
235 fr_tls_bio_dbuff_thread_local_clear();
236 fr_tls_log(request,
"Failed retrieving certificate issuer");
245 ASN1_INTEGER
const *serial = NULL;
249 serial = X509_get0_serialNumber(cert);
251 fr_tls_log(request,
"Failed retrieving certificate serial");
255 len = i2d_ASN1_INTEGER(serial, NULL);
258 i2d_ASN1_INTEGER(serial, &der);
264 asn_time = X509_get0_notBefore(cert);
267 RPWDEBUG(
"Failed parsing certificate not-before");
277 asn_time = X509_get0_notAfter(cert);
280 RPWDEBUG(
"Failed parsing certificate not-after");
290 loc = X509_get_ext_by_NID(cert, NID_subject_alt_name, 0);
292 X509_EXTENSION *ext = X509_get_ext(cert, loc);
293 if (ext) san_found = tls_session_pairs_from_san(
pair_list, ctx, request, ext);
296 loc = X509_get_ext_by_NID(cert, NID_crl_distribution_points, 0);
298 X509_EXTENSION *ext = X509_get_ext(cert, loc);
299 if (ext) crl_found = tls_session_pairs_from_crl(
pair_list, ctx, request, ext);
305 ext_list = X509_get0_extensions(cert);
307 RWDEBUG(
"Failed retrieving extensions");
315 if (sk_X509_EXTENSION_num(ext_list) > 0) {
318 fr_tls_bio_dbuff_t *bd;
321 bio = fr_tls_bio_dbuff_alloc(&bd, NULL, NULL, 257, 4097,
true);
322 in = fr_tls_bio_dbuff_in(bd);
323 out = fr_tls_bio_dbuff_out(bd);
325 for (i = 0; i < sk_X509_EXTENSION_num(ext_list); i++) {
331 ext = sk_X509_EXTENSION_value(ext_list, i);
333 obj = X509_EXTENSION_get_object(ext);
343 if (OBJ_obj2nid(obj) == NID_subject_alt_name) {
344 if (!san_found) san_found = tls_session_pairs_from_san(
pair_list, ctx, request, ext);
348 if (OBJ_obj2nid(obj) == NID_crl_distribution_points) {
349 if (!crl_found) crl_found = tls_session_pairs_from_crl(
pair_list, ctx, request, ext);
353 if (i2a_ASN1_OBJECT(bio, obj) <= 0) {
354 RPWDEBUG(
"Skipping X509 Extension (%i) conversion to attribute. "
355 "Conversion from ASN1 failed...", i);
357 fr_tls_bio_dbuff_reset(bd);
375 RWDEBUG(
"Attribute name too long");
384 RWDEBUG3(
"Skipping attribute \"%pV\": "
385 "Add a dictionary definition if you want to access it",
392 fr_tls_bio_dbuff_reset(bd);
394 if (X509V3_EXT_print(bio, ext, X509V3_EXT_PARSE_UNKNOWN, 0) != 1) {
395 REDEBUG(
"Failed extracting data for \"%s\"", da->name);
408 fr_tls_bio_dbuff_reset(bd);
#define USES_APPLE_DEPRECATED_API
#define DIAG_UNKNOWN_PRAGMAS
#define fr_dbuff_current(_dbuff_or_marker)
Return the 'current' position of a dbuff or marker.
#define fr_dbuff_set(_dst, _src)
Set the 'current' position in a dbuff or marker using another dbuff or marker, a char pointer,...
#define fr_dbuff_end(_dbuff_or_marker)
Return the current 'end' position of a dbuff or marker.
#define fr_dbuff_remaining(_dbuff_or_marker)
Return the number of bytes remaining between the dbuff or marker and the end of the buffer.
#define fr_dbuff_in_bytes(_dbuff_or_marker,...)
Copy a byte sequence into a dbuff or marker.
bool const fr_dict_attr_allowed_chars[UINT8_MAX+1]
Characters that are allowed in dictionary attribute names.
fr_dict_attr_t const * fr_dict_attr_by_name(fr_dict_attr_err_t *err, fr_dict_attr_t const *parent, char const *attr))
Locate a fr_dict_attr_t by its name.
HIDDEN fr_dict_attr_t const * attr_tls_certificate
Attribute definitions for lib curl.
#define RPWDEBUG3(fmt,...)
#define RPWDEBUG(fmt,...)
#define RWDEBUG3(fmt,...)
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject
HIDDEN fr_dict_attr_t const * attr_tls_certificate_serial
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_dns
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_after
HIDDEN fr_dict_attr_t const * attr_tls_certificate_not_before
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature_algorithm
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_upn
HIDDEN fr_dict_attr_t const * attr_tls_certificate_common_name
HIDDEN fr_dict_attr_t const * attr_tls_certificate_issuer
HIDDEN fr_dict_attr_t const * attr_tls_certificate_x509v3_crl_distribution_points
HIDDEN fr_dict_attr_t const * attr_tls_certificate_signature
HIDDEN fr_dict_attr_t const * attr_tls_certificate_subject_alt_name_email
int fr_pair_append_by_da(TALLOC_CTX *ctx, fr_pair_t **out, fr_pair_list_t *list, fr_dict_attr_t const *da)
Alloc a new fr_pair_t (and append)
int fr_pair_value_memdup(fr_pair_t *vp, uint8_t const *src, size_t len, bool tainted)
Copy data into an "octets" data type.
int fr_pair_value_strdup(fr_pair_t *vp, char const *src, bool tainted)
Copy data into an "string" data type.
int fr_pair_value_bstrdup_buffer_shallow(fr_pair_t *vp, char const *src, bool tainted)
Assign a string to a "string" type value pair.
int fr_pair_value_from_str(fr_pair_t *vp, char const *value, size_t inlen, fr_sbuff_unescape_rules_t const *uerules, UNUSED bool tainted)
Convert string value to native attribute value.
int fr_pair_append(fr_pair_list_t *list, fr_pair_t *to_add)
Add a VP to the end of the list.
fr_pair_t * fr_pair_afrom_da(TALLOC_CTX *ctx, fr_dict_attr_t const *da)
Dynamically allocate a new attribute and assign a fr_dict_attr_t.
int fr_pair_value_bstrndup(fr_pair_t *vp, char const *src, size_t len, bool tainted)
Copy data into a "string" type value pair.
int fr_pair_value_bstr_alloc(fr_pair_t *vp, char **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "string" type value pair.
int fr_pair_value_mem_alloc(fr_pair_t *vp, uint8_t **out, size_t size, bool tainted)
Pre-allocate a memory buffer for a "octets" type value pair.
static char buff[sizeof("18446744073709551615")+3]
Stores an attribute, a value and various bits of other data.
static const char * names[8]
static fr_unix_time_t fr_unix_time_from_time(time_t time)
Convert a time_t into out internal fr_unix_time_t.
void fr_pair_list_free(fr_pair_list_t *list)
Free memory used by a valuepair list.
void fr_strerror_clear(void)
Clears all pending messages from the talloc pools.
int fr_tls_utils_asn1time_to_epoch(time_t *out, ASN1_TIME const *asn1)
Convert OpenSSL's ASN1_TIME to an epoch time.
#define fr_box_strvalue_buffer(_val)
#define fr_box_strvalue_len(_val, _len)
static size_t char ** out