1125 lines
27 KiB
C
1125 lines
27 KiB
C
/**
|
|
* FreeRDP: A Remote Desktop Protocol Implementation
|
|
* Certificate Handling
|
|
*
|
|
* Copyright 2011 Jiten Pathy
|
|
* Copyright 2011 Marc-Andre Moreau <marcandre.moreau@gmail.com>
|
|
* Copyright 2015 Thincast Technologies GmbH
|
|
* Copyright 2015 DI (FH) Martin Haimberger <martin.haimberger@thincast.com>
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <freerdp/config.h>
|
|
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#include <winpr/assert.h>
|
|
#include <winpr/wtypes.h>
|
|
#include <winpr/crt.h>
|
|
#include <winpr/file.h>
|
|
#include <winpr/crypto.h>
|
|
|
|
#include <openssl/pem.h>
|
|
#include <openssl/rsa.h>
|
|
|
|
#include "certificate.h"
|
|
#include "../crypto/opensslcompat.h"
|
|
|
|
#define TAG "com.freerdp.core"
|
|
|
|
/**
|
|
*
|
|
* X.509 Certificate Structure
|
|
*
|
|
* Certificate ::= SEQUENCE
|
|
* {
|
|
* tbsCertificate TBSCertificate,
|
|
* signatureAlgorithm AlgorithmIdentifier,
|
|
* signatureValue BIT_STRING
|
|
* }
|
|
*
|
|
* TBSCertificate ::= SEQUENCE
|
|
* {
|
|
* version [0] EXPLICIT Version DEFAULT v1,
|
|
* serialNumber CertificateSerialNumber,
|
|
* signature AlgorithmIdentifier,
|
|
* issuer Name,
|
|
* validity Validity,
|
|
* subject Name,
|
|
* subjectPublicKeyInfo SubjectPublicKeyInfo,
|
|
* issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
|
|
* subjectUniqueId [2] IMPLICIT UniqueIdentifier OPTIONAL,
|
|
* extensions [3] EXPLICIT Extensions OPTIONAL
|
|
* }
|
|
*
|
|
* Version ::= INTEGER { v1(0), v2(1), v3(2) }
|
|
*
|
|
* CertificateSerialNumber ::= INTEGER
|
|
*
|
|
* AlgorithmIdentifier ::= SEQUENCE
|
|
* {
|
|
* algorithm OBJECT_IDENTIFIER,
|
|
* parameters ANY DEFINED BY algorithm OPTIONAL
|
|
* }
|
|
*
|
|
* Name ::= CHOICE { RDNSequence }
|
|
*
|
|
* RDNSequence ::= SEQUENCE OF RelativeDistinguishedName
|
|
*
|
|
* RelativeDistinguishedName ::= SET OF AttributeTypeAndValue
|
|
*
|
|
* AttributeTypeAndValue ::= SEQUENCE
|
|
* {
|
|
* type AttributeType,
|
|
* value AttributeValue
|
|
* }
|
|
*
|
|
* AttributeType ::= OBJECT_IDENTIFIER
|
|
*
|
|
* AttributeValue ::= ANY DEFINED BY AttributeType
|
|
*
|
|
* Validity ::= SEQUENCE
|
|
* {
|
|
* notBefore Time,
|
|
* notAfter Time
|
|
* }
|
|
*
|
|
* Time ::= CHOICE
|
|
* {
|
|
* utcTime UTCTime,
|
|
* generalTime GeneralizedTime
|
|
* }
|
|
*
|
|
* UniqueIdentifier ::= BIT_STRING
|
|
*
|
|
* SubjectPublicKeyInfo ::= SEQUENCE
|
|
* {
|
|
* algorithm AlgorithmIdentifier,
|
|
* subjectPublicKey BIT_STRING
|
|
* }
|
|
*
|
|
* RSAPublicKey ::= SEQUENCE
|
|
* {
|
|
* modulus INTEGER
|
|
* publicExponent INTEGER
|
|
* }
|
|
*
|
|
* Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension
|
|
*
|
|
* Extension ::= SEQUENCE
|
|
* {
|
|
* extnID OBJECT_IDENTIFIER
|
|
* critical BOOLEAN DEFAULT FALSE,
|
|
* extnValue OCTET_STRING
|
|
* }
|
|
*
|
|
*/
|
|
|
|
static const char* certificate_read_errors[] = { "Certificate tag",
|
|
"TBSCertificate",
|
|
"Explicit Contextual Tag [0]",
|
|
"version",
|
|
"CertificateSerialNumber",
|
|
"AlgorithmIdentifier",
|
|
"Issuer Name",
|
|
"Validity",
|
|
"Subject Name",
|
|
"SubjectPublicKeyInfo Tag",
|
|
"subjectPublicKeyInfo::AlgorithmIdentifier",
|
|
"subjectPublicKeyInfo::subjectPublicKey",
|
|
"RSAPublicKey Tag",
|
|
"modulusLength",
|
|
"zero padding",
|
|
"modulusLength",
|
|
"modulus",
|
|
"publicExponent length",
|
|
"publicExponent" };
|
|
|
|
/**
|
|
* Read X.509 Certificate
|
|
*/
|
|
|
|
static BOOL certificate_read_x509_certificate(rdpCertBlob* cert, rdpCertInfo* info)
|
|
{
|
|
wStream* s;
|
|
size_t length;
|
|
BYTE padding;
|
|
UINT32 version;
|
|
size_t modulus_length;
|
|
size_t exponent_length;
|
|
int error = 0;
|
|
|
|
if (!cert || !info)
|
|
return FALSE;
|
|
|
|
memset(info, 0, sizeof(rdpCertInfo));
|
|
s = Stream_New(cert->data, cert->length);
|
|
|
|
if (!s)
|
|
return FALSE;
|
|
|
|
info->Modulus = 0;
|
|
|
|
if (!ber_read_sequence_tag(s, &length)) /* Certificate (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
if (!ber_read_sequence_tag(s, &length)) /* TBSCertificate (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
if (!ber_read_contextual_tag(s, 0, &length, TRUE)) /* Explicit Contextual Tag [0] */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
if (!ber_read_integer(s, &version)) /* version (INTEGER) */
|
|
goto error1;
|
|
|
|
error++;
|
|
version++;
|
|
|
|
/* serialNumber */
|
|
if (!ber_read_integer(s, NULL)) /* CertificateSerialNumber (INTEGER) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* signature */
|
|
if (!ber_read_sequence_tag(s, &length) ||
|
|
!Stream_SafeSeek(s, length)) /* AlgorithmIdentifier (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* issuer */
|
|
if (!ber_read_sequence_tag(s, &length) || !Stream_SafeSeek(s, length)) /* Name (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* validity */
|
|
if (!ber_read_sequence_tag(s, &length) || !Stream_SafeSeek(s, length)) /* Validity (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* subject */
|
|
if (!ber_read_sequence_tag(s, &length) || !Stream_SafeSeek(s, length)) /* Name (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* subjectPublicKeyInfo */
|
|
if (!ber_read_sequence_tag(s, &length)) /* SubjectPublicKeyInfo (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* subjectPublicKeyInfo::AlgorithmIdentifier */
|
|
if (!ber_read_sequence_tag(s, &length) ||
|
|
!Stream_SafeSeek(s, length)) /* AlgorithmIdentifier (SEQUENCE) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* subjectPublicKeyInfo::subjectPublicKey */
|
|
if (!ber_read_bit_string(s, &length, &padding)) /* BIT_STRING */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* RSAPublicKey (SEQUENCE) */
|
|
if (!ber_read_sequence_tag(s, &length)) /* SEQUENCE */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
if (!ber_read_integer_length(s, &modulus_length)) /* modulus (INTEGER) */
|
|
goto error1;
|
|
|
|
error++;
|
|
|
|
/* skip zero padding, if any */
|
|
do
|
|
{
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, 1))
|
|
goto error1;
|
|
|
|
Stream_Peek_UINT8(s, padding);
|
|
|
|
if (padding == 0)
|
|
{
|
|
if (!Stream_SafeSeek(s, 1))
|
|
goto error1;
|
|
|
|
modulus_length--;
|
|
}
|
|
} while (padding == 0);
|
|
|
|
error++;
|
|
|
|
if (modulus_length > UINT32_MAX)
|
|
goto error1;
|
|
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, modulus_length))
|
|
goto error1;
|
|
|
|
info->ModulusLength = (UINT32)modulus_length;
|
|
info->Modulus = (BYTE*)malloc(info->ModulusLength);
|
|
|
|
if (!info->Modulus)
|
|
goto error1;
|
|
|
|
Stream_Read(s, info->Modulus, info->ModulusLength);
|
|
error++;
|
|
|
|
if (!ber_read_integer_length(s, &exponent_length)) /* publicExponent (INTEGER) */
|
|
goto error2;
|
|
|
|
error++;
|
|
|
|
if ((!Stream_CheckAndLogRequiredLength(TAG, s, exponent_length)) || (exponent_length > 4))
|
|
goto error2;
|
|
|
|
Stream_Read(s, &info->exponent[4 - exponent_length], exponent_length);
|
|
crypto_reverse(info->Modulus, info->ModulusLength);
|
|
crypto_reverse(info->exponent, 4);
|
|
Stream_Free(s, FALSE);
|
|
return TRUE;
|
|
error2:
|
|
free(info->Modulus);
|
|
info->Modulus = 0;
|
|
error1:
|
|
WLog_ERR(TAG, "error reading when reading certificate: part=%s error=%d",
|
|
certificate_read_errors[error], error);
|
|
Stream_Free(s, FALSE);
|
|
return FALSE;
|
|
}
|
|
|
|
/**
|
|
* Instantiate new X.509 Certificate Chain.
|
|
* @param count certificate chain count
|
|
* @return new X.509 certificate chain
|
|
*/
|
|
|
|
static rdpX509CertChain* certificate_new_x509_certificate_chain(UINT32 count)
|
|
{
|
|
rdpX509CertChain* x509_cert_chain = (rdpX509CertChain*)malloc(sizeof(rdpX509CertChain));
|
|
|
|
if (!x509_cert_chain)
|
|
return NULL;
|
|
|
|
x509_cert_chain->count = count;
|
|
x509_cert_chain->array = (rdpCertBlob*)calloc(count, sizeof(rdpCertBlob));
|
|
|
|
if (!x509_cert_chain->array)
|
|
{
|
|
free(x509_cert_chain);
|
|
return NULL;
|
|
}
|
|
|
|
return x509_cert_chain;
|
|
}
|
|
|
|
/**
|
|
* Free X.509 Certificate Chain.
|
|
* @param x509_cert_chain X.509 certificate chain to be freed
|
|
*/
|
|
|
|
static void certificate_free_x509_certificate_chain(rdpX509CertChain* x509_cert_chain)
|
|
{
|
|
UINT32 i;
|
|
|
|
if (!x509_cert_chain)
|
|
return;
|
|
|
|
if (x509_cert_chain->array)
|
|
{
|
|
for (i = 0; i < x509_cert_chain->count; i++)
|
|
{
|
|
struct rdp_CertBlob* element = &x509_cert_chain->array[i];
|
|
free(element->data);
|
|
}
|
|
}
|
|
|
|
free(x509_cert_chain->array);
|
|
free(x509_cert_chain);
|
|
}
|
|
|
|
static BOOL certificate_process_server_public_key(rdpCertificate* certificate, wStream* s,
|
|
UINT32 length)
|
|
{
|
|
BYTE magic[4];
|
|
UINT32 keylen;
|
|
UINT32 bitlen;
|
|
UINT32 datalen;
|
|
BYTE* tmp;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
WINPR_ASSERT(s);
|
|
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, 20))
|
|
return FALSE;
|
|
|
|
Stream_Read(s, magic, 4);
|
|
|
|
if (memcmp(magic, "RSA1", 4) != 0)
|
|
{
|
|
WLog_ERR(TAG, "magic error");
|
|
return FALSE;
|
|
}
|
|
|
|
Stream_Read_UINT32(s, keylen);
|
|
Stream_Read_UINT32(s, bitlen);
|
|
Stream_Read_UINT32(s, datalen);
|
|
Stream_Read(s, certificate->cert_info.exponent, 4);
|
|
|
|
if ((keylen <= 8) || (!Stream_CheckAndLogRequiredLength(TAG, s, keylen)))
|
|
return FALSE;
|
|
|
|
certificate->cert_info.ModulusLength = keylen - 8;
|
|
tmp = realloc(certificate->cert_info.Modulus, certificate->cert_info.ModulusLength);
|
|
|
|
if (!tmp)
|
|
return FALSE;
|
|
certificate->cert_info.Modulus = tmp;
|
|
|
|
Stream_Read(s, certificate->cert_info.Modulus, certificate->cert_info.ModulusLength);
|
|
Stream_Seek(s, 8); /* 8 bytes of zero padding */
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL certificate_write_server_public_key(const rdpCertificate* certificate, wStream* s)
|
|
{
|
|
const char magic[4] = "RSA1";
|
|
const UINT16 wPublicKeyBlobType = BB_RSA_KEY_BLOB;
|
|
UINT16 wPublicKeyBlobLen = 0;
|
|
UINT32 keylen, bitlen, datalen;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
WINPR_ASSERT(s);
|
|
|
|
/* [MS-RDPBCGR] 2.2.1.4.3.1.1.1 RSA Public Key (RSA_PUBLIC_KEY) */
|
|
wPublicKeyBlobLen = sizeof(magic) + 12 + sizeof(certificate->cert_info.exponent) +
|
|
certificate->cert_info.ModulusLength + 8;
|
|
bitlen = certificate->cert_info.ModulusLength * 8;
|
|
keylen = (bitlen / 8) + 8;
|
|
datalen = bitlen / 8 - 1;
|
|
|
|
if (!Stream_EnsureRemainingCapacity(s, 4 + wPublicKeyBlobLen))
|
|
return FALSE;
|
|
|
|
Stream_Write_UINT16(s, wPublicKeyBlobType);
|
|
Stream_Write_UINT16(s, wPublicKeyBlobLen);
|
|
Stream_Write(s, magic, sizeof(magic));
|
|
Stream_Write_UINT32(s, keylen);
|
|
Stream_Write_UINT32(s, bitlen);
|
|
Stream_Write_UINT32(s, datalen);
|
|
|
|
Stream_Write(s, certificate->cert_info.exponent, sizeof(certificate->cert_info.exponent));
|
|
Stream_Write(s, certificate->cert_info.Modulus, certificate->cert_info.ModulusLength);
|
|
Stream_Zero(s, 8); /* 8 bytes of zero padding */
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL certificate_process_server_public_signature(rdpCertificate* certificate,
|
|
const BYTE* sigdata, size_t sigdatalen,
|
|
wStream* s, UINT32 siglen)
|
|
{
|
|
WINPR_ASSERT(certificate);
|
|
#if defined(CERT_VALIDATE_PADDING) || defined(CERT_VALIDATE_RSA)
|
|
size_t i, sum;
|
|
#endif
|
|
#if defined(CERT_VALIDATE_RSA)
|
|
BYTE sig[TSSK_KEY_LENGTH];
|
|
#endif
|
|
BYTE encsig[TSSK_KEY_LENGTH + 8];
|
|
#if defined(CERT_VALIDATE_MD5) && defined(CERT_VALIDATE_RSA)
|
|
BYTE md5hash[WINPR_MD5_DIGEST_LENGTH];
|
|
#endif
|
|
#if !defined(CERT_VALIDATE_MD5) || !defined(CERT_VALIDATE_RSA)
|
|
(void)sigdata;
|
|
(void)sigdatalen;
|
|
#endif
|
|
(void)certificate;
|
|
/* Do not bother with validation of server proprietary certificate. The use of MD5 here is not
|
|
* allowed under FIPS. Since the validation is not protecting against anything since the
|
|
* private/public keys are well known and documented in MS-RDPBCGR section 5.3.3.1, we are not
|
|
* gaining any security by using MD5 for signature comparison. Rather then use MD5
|
|
* here we just dont do the validation to avoid its use. Historically, freerdp has been ignoring
|
|
* a failed validation anyways. */
|
|
#if defined(CERT_VALIDATE_MD5)
|
|
|
|
if (!winpr_Digest(WINPR_MD_MD5, sigdata, sigdatalen, md5hash, sizeof(md5hash)))
|
|
return FALSE;
|
|
|
|
#endif
|
|
Stream_Read(s, encsig, siglen);
|
|
|
|
if (siglen < 8)
|
|
return FALSE;
|
|
|
|
/* Last 8 bytes shall be all zero. */
|
|
#if defined(CERT_VALIDATE_PADDING)
|
|
|
|
for (sum = 0, i = sizeof(encsig) - 8; i < sizeof(encsig); i++)
|
|
sum += encsig[i];
|
|
|
|
if (sum != 0)
|
|
{
|
|
WLog_ERR(TAG, "invalid signature");
|
|
return FALSE;
|
|
}
|
|
|
|
#endif
|
|
#if defined(CERT_VALIDATE_RSA)
|
|
|
|
if (crypto_rsa_public_decrypt(encsig, siglen - 8, TSSK_KEY_LENGTH, tssk_modulus, tssk_exponent,
|
|
sig) <= 0)
|
|
{
|
|
WLog_ERR(TAG, "invalid RSA decrypt");
|
|
return FALSE;
|
|
}
|
|
|
|
/* Verify signature. */
|
|
/* Do not bother with validation of server proprietary certificate as described above. */
|
|
#if defined(CERT_VALIDATE_MD5)
|
|
|
|
if (memcmp(md5hash, sig, sizeof(md5hash)) != 0)
|
|
{
|
|
WLog_ERR(TAG, "invalid signature");
|
|
return FALSE;
|
|
}
|
|
|
|
#endif
|
|
/*
|
|
* Verify rest of decrypted data:
|
|
* The 17th byte is 0x00.
|
|
* The 18th through 62nd bytes are each 0xFF.
|
|
* The 63rd byte is 0x01.
|
|
*/
|
|
|
|
for (sum = 0, i = 17; i < 62; i++)
|
|
sum += sig[i];
|
|
|
|
if (sig[16] != 0x00 || sum != 0xFF * (62 - 17) || sig[62] != 0x01)
|
|
{
|
|
WLog_ERR(TAG, "invalid signature");
|
|
return FALSE;
|
|
}
|
|
|
|
#endif
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL certificate_write_server_public_signature(const rdpCertificate* certificate, wStream* s)
|
|
{
|
|
const UINT16 wSignatureBlobType = BB_RSA_SIGNATURE_BLOB;
|
|
UINT16 wSignatureBlobLen = 72;
|
|
char signature[72] = { 0 };
|
|
|
|
WINPR_ASSERT(certificate);
|
|
WINPR_ASSERT(s);
|
|
|
|
if (!Stream_EnsureRemainingCapacity(s, 4 + wSignatureBlobLen))
|
|
return FALSE;
|
|
|
|
Stream_Write_UINT16(s, wSignatureBlobType);
|
|
Stream_Write_UINT16(s, wSignatureBlobLen);
|
|
|
|
WLog_WARN(TAG, "[%s] TODO: Calcualte proper signature", __FUNCTION__);
|
|
|
|
Stream_Write(s, signature, wSignatureBlobLen);
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL certificate_read_server_proprietary_certificate(rdpCertificate* certificate, wStream* s)
|
|
{
|
|
UINT32 dwSigAlgId;
|
|
UINT32 dwKeyAlgId;
|
|
UINT16 wPublicKeyBlobType;
|
|
UINT16 wPublicKeyBlobLen;
|
|
UINT16 wSignatureBlobType;
|
|
UINT16 wSignatureBlobLen;
|
|
BYTE* sigdata;
|
|
size_t sigdatalen;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, 12))
|
|
return FALSE;
|
|
|
|
/* -4, because we need to include dwVersion */
|
|
sigdata = Stream_Pointer(s) - 4;
|
|
Stream_Read_UINT32(s, dwSigAlgId);
|
|
Stream_Read_UINT32(s, dwKeyAlgId);
|
|
|
|
if (!((dwSigAlgId == SIGNATURE_ALG_RSA) && (dwKeyAlgId == KEY_EXCHANGE_ALG_RSA)))
|
|
{
|
|
WLog_ERR(TAG,
|
|
"unsupported signature or key algorithm, dwSigAlgId=%" PRIu32
|
|
" dwKeyAlgId=%" PRIu32 "",
|
|
dwSigAlgId, dwKeyAlgId);
|
|
return FALSE;
|
|
}
|
|
|
|
Stream_Read_UINT16(s, wPublicKeyBlobType);
|
|
|
|
if (wPublicKeyBlobType != BB_RSA_KEY_BLOB)
|
|
{
|
|
WLog_ERR(TAG, "unsupported public key blob type %" PRIu16 "", wPublicKeyBlobType);
|
|
return FALSE;
|
|
}
|
|
|
|
Stream_Read_UINT16(s, wPublicKeyBlobLen);
|
|
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, wPublicKeyBlobLen))
|
|
return FALSE;
|
|
|
|
if (!certificate_process_server_public_key(certificate, s, wPublicKeyBlobLen))
|
|
{
|
|
WLog_ERR(TAG, "error in server public key");
|
|
return FALSE;
|
|
}
|
|
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
|
return FALSE;
|
|
|
|
sigdatalen = Stream_Pointer(s) - sigdata;
|
|
Stream_Read_UINT16(s, wSignatureBlobType);
|
|
|
|
if (wSignatureBlobType != BB_RSA_SIGNATURE_BLOB)
|
|
{
|
|
WLog_ERR(TAG, "unsupported blob signature %" PRIu16 "", wSignatureBlobType);
|
|
return FALSE;
|
|
}
|
|
|
|
Stream_Read_UINT16(s, wSignatureBlobLen);
|
|
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, wSignatureBlobLen))
|
|
return FALSE;
|
|
|
|
if (wSignatureBlobLen != 72)
|
|
{
|
|
WLog_ERR(TAG, "invalid signature length (got %" PRIu16 ", expected 72)", wSignatureBlobLen);
|
|
return FALSE;
|
|
}
|
|
|
|
if (!certificate_process_server_public_signature(certificate, sigdata, sigdatalen, s,
|
|
wSignatureBlobLen))
|
|
{
|
|
WLog_ERR(TAG, "unable to parse server public signature");
|
|
return FALSE;
|
|
}
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL certificate_write_server_proprietary_certificate(const rdpCertificate* certificate,
|
|
wStream* s)
|
|
{
|
|
const UINT32 dwSigAlgId = SIGNATURE_ALG_RSA;
|
|
const UINT32 dwKeyAlgId = KEY_EXCHANGE_ALG_RSA;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
WINPR_ASSERT(s);
|
|
|
|
if (!Stream_EnsureRemainingCapacity(s, 8))
|
|
return FALSE;
|
|
|
|
Stream_Write_UINT32(s, dwSigAlgId);
|
|
Stream_Write_UINT32(s, dwKeyAlgId);
|
|
|
|
if (!certificate_write_server_public_key(certificate, s))
|
|
return FALSE;
|
|
|
|
if (!certificate_write_server_public_signature(certificate, s))
|
|
return FALSE;
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* Read an X.509 Certificate Chain.
|
|
* @param certificate certificate module
|
|
* @param s stream
|
|
*/
|
|
|
|
static BOOL certificate_read_server_x509_certificate_chain(rdpCertificate* certificate, wStream* s)
|
|
{
|
|
UINT32 i;
|
|
BOOL ret;
|
|
UINT32 certLength;
|
|
UINT32 numCertBlobs;
|
|
DEBUG_CERTIFICATE("Server X.509 Certificate Chain");
|
|
|
|
WINPR_ASSERT(certificate);
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
|
return FALSE;
|
|
|
|
Stream_Read_UINT32(s, numCertBlobs); /* numCertBlobs */
|
|
certificate->x509_cert_chain = certificate_new_x509_certificate_chain(numCertBlobs);
|
|
|
|
if (!certificate->x509_cert_chain)
|
|
return FALSE;
|
|
|
|
for (i = 0; i < numCertBlobs; i++)
|
|
{
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, 4))
|
|
return FALSE;
|
|
|
|
Stream_Read_UINT32(s, certLength);
|
|
|
|
if (!Stream_CheckAndLogRequiredLength(TAG, s, certLength))
|
|
return FALSE;
|
|
|
|
DEBUG_CERTIFICATE("X.509 Certificate #%" PRIu32 ", length:%" PRIu32 "", i + 1, certLength);
|
|
certificate->x509_cert_chain->array[i].data = (BYTE*)malloc(certLength);
|
|
|
|
if (!certificate->x509_cert_chain->array[i].data)
|
|
return FALSE;
|
|
|
|
Stream_Read(s, certificate->x509_cert_chain->array[i].data, certLength);
|
|
certificate->x509_cert_chain->array[i].length = certLength;
|
|
|
|
if ((numCertBlobs - i) == 2)
|
|
{
|
|
rdpCertInfo cert_info = { 0 };
|
|
DEBUG_CERTIFICATE("License Server Certificate");
|
|
ret = certificate_read_x509_certificate(&certificate->x509_cert_chain->array[i],
|
|
&cert_info);
|
|
DEBUG_LICENSE("modulus length:%" PRIu32 "", cert_info.ModulusLength);
|
|
free(cert_info.Modulus);
|
|
|
|
if (!ret)
|
|
{
|
|
WLog_ERR(TAG, "failed to read License Server, content follows:");
|
|
winpr_HexDump(TAG, WLOG_ERROR, certificate->x509_cert_chain->array[i].data,
|
|
certificate->x509_cert_chain->array[i].length);
|
|
return FALSE;
|
|
}
|
|
}
|
|
else if (numCertBlobs - i == 1)
|
|
{
|
|
DEBUG_CERTIFICATE("Terminal Server Certificate");
|
|
|
|
if (!certificate_read_x509_certificate(&certificate->x509_cert_chain->array[i],
|
|
&certificate->cert_info))
|
|
return FALSE;
|
|
|
|
DEBUG_CERTIFICATE("modulus length:%" PRIu32 "", certificate->cert_info.ModulusLength);
|
|
}
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
static BOOL certificate_write_server_x509_certificate_chain(const rdpCertificate* certificate,
|
|
wStream* s)
|
|
{
|
|
UINT32 i;
|
|
UINT32 numCertBlobs = 0;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
WINPR_ASSERT(s);
|
|
|
|
if (certificate->x509_cert_chain)
|
|
numCertBlobs = certificate->x509_cert_chain->count;
|
|
|
|
if (!Stream_EnsureRemainingCapacity(s, 4))
|
|
return FALSE;
|
|
Stream_Write_UINT32(s, numCertBlobs); /* numCertBlobs */
|
|
|
|
for (i = 0; i < numCertBlobs; i++)
|
|
{
|
|
const rdpCertBlob* cert = &certificate->x509_cert_chain->array[i];
|
|
|
|
if (!Stream_EnsureRemainingCapacity(s, 4 + cert->length))
|
|
return FALSE;
|
|
|
|
Stream_Write_UINT32(s, cert->length);
|
|
Stream_Write(s, cert->data, cert->length);
|
|
}
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* Read a Server Certificate.
|
|
* @param certificate certificate module
|
|
* @param server_cert server certificate
|
|
* @param length certificate length
|
|
*/
|
|
|
|
BOOL certificate_read_server_certificate(rdpCertificate* certificate, const BYTE* server_cert,
|
|
size_t length)
|
|
{
|
|
BOOL ret;
|
|
wStream *s, sbuffer;
|
|
UINT32 dwVersion;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
if (length < 4) /* NULL certificate is not an error see #1795 */
|
|
return TRUE;
|
|
|
|
WINPR_ASSERT(server_cert);
|
|
s = Stream_StaticConstInit(&sbuffer, server_cert, length);
|
|
|
|
if (!s)
|
|
{
|
|
WLog_ERR(TAG, "Stream_New failed!");
|
|
return FALSE;
|
|
}
|
|
|
|
Stream_Read_UINT32(s, dwVersion); /* dwVersion (4 bytes) */
|
|
|
|
switch (dwVersion & CERT_CHAIN_VERSION_MASK)
|
|
{
|
|
case CERT_CHAIN_VERSION_1:
|
|
ret = certificate_read_server_proprietary_certificate(certificate, s);
|
|
break;
|
|
|
|
case CERT_CHAIN_VERSION_2:
|
|
ret = certificate_read_server_x509_certificate_chain(certificate, s);
|
|
break;
|
|
|
|
default:
|
|
WLog_ERR(TAG, "invalid certificate chain version:%" PRIu32 "",
|
|
dwVersion & CERT_CHAIN_VERSION_MASK);
|
|
ret = FALSE;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
BOOL certificate_write_server_certificate(rdpCertificate* certificate, UINT32 dwVersion, wStream* s)
|
|
{
|
|
BOOL ret;
|
|
|
|
WINPR_ASSERT(certificate);
|
|
WINPR_ASSERT(s);
|
|
|
|
if (!Stream_EnsureRemainingCapacity(s, 4))
|
|
return FALSE;
|
|
Stream_Write_UINT32(s, dwVersion); /* dwVersion (4 bytes) */
|
|
|
|
switch (dwVersion & CERT_CHAIN_VERSION_MASK)
|
|
{
|
|
case CERT_CHAIN_VERSION_1:
|
|
ret = certificate_write_server_proprietary_certificate(certificate, s);
|
|
break;
|
|
|
|
case CERT_CHAIN_VERSION_2:
|
|
ret = certificate_write_server_x509_certificate_chain(certificate, s);
|
|
break;
|
|
|
|
default:
|
|
WLog_ERR(TAG, "invalid certificate chain version:%" PRIu32 "",
|
|
dwVersion & CERT_CHAIN_VERSION_MASK);
|
|
ret = FALSE;
|
|
break;
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
rdpRsaKey* key_new_from_content(const char* keycontent, const char* keyfile)
|
|
{
|
|
BIO* bio = NULL;
|
|
RSA* rsa = NULL;
|
|
rdpRsaKey* key = NULL;
|
|
const BIGNUM* rsa_e = NULL;
|
|
const BIGNUM* rsa_n = NULL;
|
|
const BIGNUM* rsa_d = NULL;
|
|
|
|
if (!keycontent || !keyfile)
|
|
return NULL;
|
|
|
|
key = (rdpRsaKey*)calloc(1, sizeof(rdpRsaKey));
|
|
|
|
if (!key)
|
|
return NULL;
|
|
|
|
bio = BIO_new_mem_buf((const void*)keycontent, strlen(keycontent));
|
|
|
|
if (!bio)
|
|
goto fail;
|
|
|
|
rsa = PEM_read_bio_RSAPrivateKey(bio, NULL, NULL, NULL);
|
|
BIO_free_all(bio);
|
|
|
|
if (!rsa)
|
|
{
|
|
WLog_ERR(TAG, "unable to load RSA key from %s: %s.", keyfile, strerror(errno));
|
|
goto fail;
|
|
}
|
|
|
|
switch (RSA_check_key(rsa))
|
|
{
|
|
case 0:
|
|
WLog_ERR(TAG, "invalid RSA key in %s", keyfile);
|
|
goto fail;
|
|
|
|
case 1:
|
|
/* Valid key. */
|
|
break;
|
|
|
|
default:
|
|
WLog_ERR(TAG, "unexpected error when checking RSA key from %s: %s.", keyfile,
|
|
strerror(errno));
|
|
goto fail;
|
|
}
|
|
|
|
RSA_get0_key(rsa, &rsa_n, &rsa_e, &rsa_d);
|
|
|
|
if (BN_num_bytes(rsa_e) > 4)
|
|
{
|
|
WLog_ERR(TAG, "RSA public exponent too large in %s", keyfile);
|
|
goto fail;
|
|
}
|
|
|
|
key->ModulusLength = BN_num_bytes(rsa_n);
|
|
key->Modulus = (BYTE*)malloc(key->ModulusLength);
|
|
|
|
if (!key->Modulus)
|
|
goto fail;
|
|
|
|
BN_bn2bin(rsa_n, key->Modulus);
|
|
crypto_reverse(key->Modulus, key->ModulusLength);
|
|
key->PrivateExponentLength = BN_num_bytes(rsa_d);
|
|
key->PrivateExponent = (BYTE*)malloc(key->PrivateExponentLength);
|
|
|
|
if (!key->PrivateExponent)
|
|
goto fail;
|
|
|
|
BN_bn2bin(rsa_d, key->PrivateExponent);
|
|
crypto_reverse(key->PrivateExponent, key->PrivateExponentLength);
|
|
memset(key->exponent, 0, sizeof(key->exponent));
|
|
BN_bn2bin(rsa_e, key->exponent + sizeof(key->exponent) - BN_num_bytes(rsa_e));
|
|
crypto_reverse(key->exponent, sizeof(key->exponent));
|
|
RSA_free(rsa);
|
|
return key;
|
|
fail:
|
|
RSA_free(rsa);
|
|
key_free(key);
|
|
return NULL;
|
|
}
|
|
|
|
rdpRsaKey* key_new(const char* keyfile)
|
|
{
|
|
FILE* fp = NULL;
|
|
INT64 length;
|
|
char* buffer = NULL;
|
|
rdpRsaKey* key = NULL;
|
|
|
|
if (!keyfile)
|
|
return NULL;
|
|
|
|
fp = winpr_fopen(keyfile, "rb");
|
|
|
|
if (!fp)
|
|
{
|
|
WLog_ERR(TAG, "unable to open RSA key file %s: %s.", keyfile, strerror(errno));
|
|
goto out_free;
|
|
}
|
|
|
|
if (_fseeki64(fp, 0, SEEK_END) < 0)
|
|
goto out_free;
|
|
|
|
if ((length = _ftelli64(fp)) < 0)
|
|
goto out_free;
|
|
|
|
if (_fseeki64(fp, 0, SEEK_SET) < 0)
|
|
goto out_free;
|
|
|
|
buffer = (char*)malloc(length + 1);
|
|
|
|
if (!buffer)
|
|
goto out_free;
|
|
|
|
if (fread((void*)buffer, length, 1, fp) != 1)
|
|
goto out_free;
|
|
|
|
buffer[length] = '\0';
|
|
key = key_new_from_content(buffer, keyfile);
|
|
out_free:
|
|
|
|
if (fp)
|
|
fclose(fp);
|
|
|
|
free(buffer);
|
|
return key;
|
|
}
|
|
|
|
rdpRsaKey* key_clone(const rdpRsaKey* key)
|
|
{
|
|
if (!key)
|
|
return NULL;
|
|
|
|
rdpRsaKey* _key = (rdpRsaKey*)calloc(1, sizeof(rdpRsaKey));
|
|
|
|
if (!_key)
|
|
return NULL;
|
|
|
|
CopyMemory(_key, key, sizeof(rdpRsaKey));
|
|
|
|
if (key->Modulus)
|
|
{
|
|
_key->Modulus = (BYTE*)malloc(key->ModulusLength);
|
|
|
|
if (!_key->Modulus)
|
|
goto out_fail;
|
|
|
|
CopyMemory(_key->Modulus, key->Modulus, key->ModulusLength);
|
|
}
|
|
|
|
if (key->PrivateExponent)
|
|
{
|
|
_key->PrivateExponent = (BYTE*)malloc(key->PrivateExponentLength);
|
|
|
|
if (!_key->PrivateExponent)
|
|
goto out_fail;
|
|
|
|
CopyMemory(_key->PrivateExponent, key->PrivateExponent, key->PrivateExponentLength);
|
|
}
|
|
|
|
return _key;
|
|
out_fail:
|
|
key_free(_key);
|
|
return NULL;
|
|
}
|
|
|
|
void key_free(rdpRsaKey* key)
|
|
{
|
|
if (!key)
|
|
return;
|
|
|
|
if (key->Modulus)
|
|
memset(key->Modulus, 0, key->ModulusLength);
|
|
free(key->Modulus);
|
|
if (key->PrivateExponent)
|
|
memset(key->PrivateExponent, 0, key->PrivateExponentLength);
|
|
free(key->PrivateExponent);
|
|
free(key);
|
|
}
|
|
|
|
rdpCertificate* certificate_clone(const rdpCertificate* certificate)
|
|
{
|
|
UINT32 index;
|
|
|
|
if (!certificate)
|
|
return NULL;
|
|
|
|
rdpCertificate* _certificate = (rdpCertificate*)calloc(1, sizeof(rdpCertificate));
|
|
|
|
if (!_certificate)
|
|
return NULL;
|
|
|
|
CopyMemory(_certificate, certificate, sizeof(rdpCertificate));
|
|
|
|
if (certificate->cert_info.ModulusLength)
|
|
{
|
|
_certificate->cert_info.Modulus = (BYTE*)malloc(certificate->cert_info.ModulusLength);
|
|
|
|
if (!_certificate->cert_info.Modulus)
|
|
goto out_fail;
|
|
|
|
CopyMemory(_certificate->cert_info.Modulus, certificate->cert_info.Modulus,
|
|
certificate->cert_info.ModulusLength);
|
|
_certificate->cert_info.ModulusLength = certificate->cert_info.ModulusLength;
|
|
}
|
|
|
|
if (certificate->x509_cert_chain)
|
|
{
|
|
_certificate->x509_cert_chain = (rdpX509CertChain*)malloc(sizeof(rdpX509CertChain));
|
|
|
|
if (!_certificate->x509_cert_chain)
|
|
goto out_fail;
|
|
|
|
CopyMemory(_certificate->x509_cert_chain, certificate->x509_cert_chain,
|
|
sizeof(rdpX509CertChain));
|
|
|
|
if (certificate->x509_cert_chain->count)
|
|
{
|
|
_certificate->x509_cert_chain->array =
|
|
(rdpCertBlob*)calloc(certificate->x509_cert_chain->count, sizeof(rdpCertBlob));
|
|
|
|
if (!_certificate->x509_cert_chain->array)
|
|
goto out_fail;
|
|
|
|
for (index = 0; index < certificate->x509_cert_chain->count; index++)
|
|
{
|
|
_certificate->x509_cert_chain->array[index].length =
|
|
certificate->x509_cert_chain->array[index].length;
|
|
|
|
if (certificate->x509_cert_chain->array[index].length)
|
|
{
|
|
_certificate->x509_cert_chain->array[index].data =
|
|
(BYTE*)malloc(certificate->x509_cert_chain->array[index].length);
|
|
|
|
if (!_certificate->x509_cert_chain->array[index].data)
|
|
{
|
|
for (; index > 0; --index)
|
|
{
|
|
if (certificate->x509_cert_chain->array[index - 1].length)
|
|
free(_certificate->x509_cert_chain->array[index - 1].data);
|
|
}
|
|
|
|
goto out_fail;
|
|
}
|
|
|
|
CopyMemory(_certificate->x509_cert_chain->array[index].data,
|
|
certificate->x509_cert_chain->array[index].data,
|
|
_certificate->x509_cert_chain->array[index].length);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return _certificate;
|
|
out_fail:
|
|
|
|
certificate_free(_certificate);
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* Instantiate new certificate module.
|
|
* @return new certificate module
|
|
*/
|
|
|
|
rdpCertificate* certificate_new(void)
|
|
{
|
|
return (rdpCertificate*)calloc(1, sizeof(rdpCertificate));
|
|
}
|
|
|
|
/**
|
|
* Free certificate module.
|
|
* @param certificate certificate module to be freed
|
|
*/
|
|
|
|
void certificate_free(rdpCertificate* certificate)
|
|
{
|
|
if (!certificate)
|
|
return;
|
|
|
|
certificate_free_x509_certificate_chain(certificate->x509_cert_chain);
|
|
free(certificate->cert_info.Modulus);
|
|
free(certificate);
|
|
}
|