cert.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514
  1. /** BEGIN COPYRIGHT BLOCK
  2. * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
  3. * Copyright (C) 2005 Red Hat, Inc.
  4. * All rights reserved.
  5. *
  6. * License: GPL (version 3 or any later version).
  7. * See LICENSE for details.
  8. * END COPYRIGHT BLOCK **/
  9. #ifdef HAVE_CONFIG_H
  10. #include <config.h>
  11. #endif
  12. #include <string.h>
  13. /* This was malloc.h - but it's moved to stdlib.h on most platforms, and FBSD is strict */
  14. /* Make it stdlib.h, and revert to malloc.h with ifdefs if we have issues here. WB 2016 */
  15. #include <stdlib.h>
  16. /* removed for ns security integration
  17. #include <sec.h>
  18. */
  19. #include "prmem.h"
  20. #include <keyhi.h>
  21. #include <cert.h>
  22. #include <nss.h>
  23. #include <ldaputil/certmap.h>
  24. #include <ldaputil/errors.h>
  25. #include <ldaputil/cert.h>
  26. #include "ldaputili.h"
  27. #include "slapi-plugin.h"
  28. NSAPI_PUBLIC int
  29. ldapu_get_cert(void *SSLendpoint __attribute__((unused)), void **cert __attribute__((unused)))
  30. {
  31. /* TEMPORARY -- not implemented yet*/
  32. return LDAPU_FAILED;
  33. }
  34. NSAPI_PUBLIC int
  35. ldapu_get_cert_subject_dn(void *cert_in, char **subjectDN)
  36. {
  37. CERTCertificate *cert = (CERTCertificate *)cert_in;
  38. char *cert_subject = CERT_NameToAscii(&cert->subject);
  39. if (cert_subject != NULL)
  40. *subjectDN = strdup(cert_subject);
  41. else
  42. *subjectDN = NULL;
  43. PR_Free(cert_subject);
  44. return *subjectDN ? LDAPU_SUCCESS : LDAPU_ERR_EXTRACT_SUBJECTDN_FAILED;
  45. }
  46. /*
  47. * Return the Issuer DN as a CERTName.
  48. * The CERTName is owned by the CERTCertificate.
  49. */
  50. NSAPI_PUBLIC CERTName *
  51. ldapu_get_cert_issuer_dn_as_CERTName(CERTCertificate *cert_in)
  52. {
  53. return &cert_in->issuer;
  54. }
  55. /*
  56. * Return the Issuer DN as a string.
  57. * The string should be freed by the caller.
  58. */
  59. NSAPI_PUBLIC int
  60. ldapu_get_cert_issuer_dn(void *cert_in, char **issuerDN)
  61. {
  62. *issuerDN = NULL;
  63. CERTName *dn = ldapu_get_cert_issuer_dn_as_CERTName((CERTCertificate *)cert_in);
  64. if (dn != NULL) {
  65. char *cert_issuer = CERT_NameToAscii(dn);
  66. *issuerDN = strdup(cert_issuer);
  67. PR_Free(cert_issuer);
  68. }
  69. return *issuerDN ? LDAPU_SUCCESS : LDAPU_ERR_EXTRACT_ISSUERDN_FAILED;
  70. }
  71. NSAPI_PUBLIC int
  72. ldapu_get_cert_der(void *cert_in, unsigned char **der, unsigned int *len)
  73. {
  74. CERTCertificate *cert = (CERTCertificate *)cert_in;
  75. SECItem derCert = ((CERTCertificate *)cert)->derCert;
  76. unsigned char *data = derCert.data;
  77. *len = derCert.len;
  78. *der = (unsigned char *)malloc(*len);
  79. if (!*der)
  80. return LDAPU_ERR_OUT_OF_MEMORY;
  81. memcpy(*der, data, *len);
  82. return *len ? LDAPU_SUCCESS : LDAPU_ERR_EXTRACT_DERCERT_FAILED;
  83. }
  84. static int
  85. certmap_name_to_secoid(const char *str)
  86. {
  87. if (!ldapu_strcasecmp(str, "c"))
  88. return SEC_OID_AVA_COUNTRY_NAME;
  89. if (!ldapu_strcasecmp(str, "o"))
  90. return SEC_OID_AVA_ORGANIZATION_NAME;
  91. if (!ldapu_strcasecmp(str, "cn"))
  92. return SEC_OID_AVA_COMMON_NAME;
  93. if (!ldapu_strcasecmp(str, "l"))
  94. return SEC_OID_AVA_LOCALITY;
  95. if (!ldapu_strcasecmp(str, "st"))
  96. return SEC_OID_AVA_STATE_OR_PROVINCE;
  97. if (!ldapu_strcasecmp(str, "ou"))
  98. return SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME;
  99. if (!ldapu_strcasecmp(str, "uid"))
  100. return SEC_OID_RFC1274_UID;
  101. if (!ldapu_strcasecmp(str, "e"))
  102. return SEC_OID_PKCS9_EMAIL_ADDRESS;
  103. if (!ldapu_strcasecmp(str, "mail"))
  104. return SEC_OID_RFC1274_MAIL;
  105. if (!ldapu_strcasecmp(str, "dc"))
  106. return SEC_OID_AVA_DC;
  107. return SEC_OID_AVA_UNKNOWN; /* return invalid OID */
  108. }
  109. NSAPI_PUBLIC int
  110. ldapu_get_cert_ava_val(void *cert_in, int which_dn, const char *attr, char ***val_out)
  111. {
  112. CERTCertificate *cert = (CERTCertificate *)cert_in;
  113. CERTName *cert_dn;
  114. CERTRDN **rdns;
  115. CERTRDN **rdn;
  116. CERTAVA **avas;
  117. CERTAVA *ava;
  118. int attr_tag = certmap_name_to_secoid(attr);
  119. int nbvals = 1; /* reserve 1 slot for final NULL */
  120. char **val;
  121. char **ptr;
  122. int rv;
  123. *val_out = 0;
  124. if (attr_tag == SEC_OID_AVA_UNKNOWN) {
  125. return LDAPU_ERR_INVALID_ARGUMENT;
  126. }
  127. if (which_dn == LDAPU_SUBJECT_DN)
  128. cert_dn = &cert->subject;
  129. else if (which_dn == LDAPU_ISSUER_DN)
  130. cert_dn = &cert->issuer;
  131. else
  132. return LDAPU_ERR_INVALID_ARGUMENT;
  133. rdns = cert_dn->rdns;
  134. if (!rdns) {
  135. return LDAPU_FAILED;
  136. }
  137. for (rdn = rdns; *rdn; rdn++) {
  138. nbvals++;
  139. }
  140. val = (char **)malloc(nbvals*sizeof(char *));
  141. if (!val)
  142. return LDAPU_ERR_OUT_OF_MEMORY;
  143. ptr = val;
  144. for (rdn = rdns; *rdn; rdn++) {
  145. avas = (*rdn)->avas;
  146. while ((ava = *avas++) != NULL) {
  147. int tag = CERT_GetAVATag(ava);
  148. if (tag == attr_tag) {
  149. char buf[BIG_LINE];
  150. int lenLen;
  151. int vallen;
  152. /* Found it */
  153. /* Copied from ns/lib/libsec ...
  154. * XXX this code is incorrect in general
  155. * -- should use a DER template.
  156. */
  157. lenLen = 2;
  158. if (ava->value.len >= 128)
  159. lenLen = 3;
  160. vallen = ava->value.len - lenLen;
  161. rv = CERT_RFC1485_EscapeAndQuote(buf,
  162. BIG_LINE,
  163. (char *)ava->value.data + lenLen,
  164. vallen);
  165. if (rv == SECSuccess) {
  166. char *newbuf = strdup(buf);
  167. if (newbuf != NULL) {
  168. *ptr++ = newbuf;
  169. }
  170. }
  171. break;
  172. }
  173. }
  174. }
  175. *ptr = 0;
  176. if (*val) {
  177. /* At least one value found */
  178. *val_out = val;
  179. rv = LDAPU_SUCCESS;
  180. } else {
  181. free(val);
  182. rv = LDAPU_FAILED;
  183. }
  184. return rv;
  185. }
  186. static void
  187. _rdns_free(char ***rdns)
  188. {
  189. auto char ***rdn;
  190. for (rdn = rdns; *rdn; ++rdn) {
  191. slapi_ldap_value_free(*rdn);
  192. }
  193. free(rdns);
  194. }
  195. static char ***
  196. _explode_dn(const char *dn)
  197. {
  198. auto char ***exp = NULL;
  199. if (dn && *dn) {
  200. auto char **rdns = slapi_ldap_explode_dn(dn, 0);
  201. if (rdns) {
  202. auto size_t expLen = 0;
  203. auto char **rdn;
  204. for (rdn = rdns; *rdn; ++rdn) {
  205. auto char **avas = slapi_ldap_explode_rdn(*rdn, 0);
  206. if (avas && *avas) {
  207. exp = (char ***)ldapu_realloc(exp, sizeof(char **) * (expLen + 2));
  208. if (exp) {
  209. exp[expLen++] = avas;
  210. } else {
  211. slapi_ldap_value_free(avas);
  212. break;
  213. }
  214. } else { /* parse error */
  215. if (avas) {
  216. slapi_ldap_value_free(avas);
  217. }
  218. if (exp) {
  219. exp[expLen] = NULL;
  220. _rdns_free(exp);
  221. exp = NULL;
  222. }
  223. break;
  224. }
  225. }
  226. if (exp) {
  227. exp[expLen] = NULL;
  228. }
  229. slapi_ldap_value_free(rdns);
  230. }
  231. }
  232. return exp;
  233. }
  234. static size_t
  235. _rdns_count(char ***rdns)
  236. {
  237. auto size_t count = 0;
  238. auto char ***rdn;
  239. for (rdn = rdns; *rdn; ++rdn) {
  240. auto char **ava;
  241. for (ava = *rdn; *ava; ++ava) {
  242. ++count;
  243. }
  244. }
  245. return count;
  246. }
  247. static int
  248. _replaceAVA(char *attr, char **avas)
  249. {
  250. if (attr && avas) {
  251. for (; *avas; ++avas) {
  252. if (!ldapu_strcasecmp(*avas, attr)) {
  253. *avas = attr;
  254. return 1;
  255. }
  256. }
  257. }
  258. return 0;
  259. }
  260. struct _attr_getter_pair
  261. {
  262. #if NSS_VMAJOR < 3 || (NSS_VMAJOR == 3 && NSS_VMINOR < 15)
  263. char *(*getter)(CERTName *dn);
  264. #else
  265. /* in 3.15.x "const" was added to the declarations */
  266. char *(*getter)(const CERTName *dn);
  267. #endif
  268. const char *name1;
  269. const char *name2;
  270. } _attr_getter_table[] =
  271. {
  272. {NULL, "OU", "organizationalUnitName"},
  273. {CERT_GetOrgName, "O", "organizationName"},
  274. {CERT_GetCommonName, "CN", "commonName"},
  275. {CERT_GetCertEmailAddress, "E", NULL},
  276. {CERT_GetCertEmailAddress, "MAIL", "rfc822mailbox"},
  277. {CERT_GetCertUid, "uid", NULL},
  278. {CERT_GetCountryName, "C", "country"},
  279. {CERT_GetStateName, "ST", "state"},
  280. {CERT_GetLocalityName, "L", "localityName"},
  281. {CERT_GetDomainComponentName, "DC", "dc"},
  282. {NULL, NULL, NULL}};
  283. static int
  284. _is_OU(const char *attr)
  285. {
  286. auto struct _attr_getter_pair *descAttr;
  287. for (descAttr = _attr_getter_table; descAttr->name1; ++descAttr) {
  288. if (descAttr->getter == NULL) { /* OU attribute */
  289. if (!ldapu_strcasecmp(attr, descAttr->name1) || (descAttr->name2 &&
  290. !ldapu_strcasecmp(attr, descAttr->name2))) {
  291. return 1;
  292. }
  293. break;
  294. }
  295. }
  296. return 0;
  297. }
  298. static char **
  299. _previous_OU(char **ava, char **avas)
  300. {
  301. while (ava != avas) {
  302. --ava;
  303. if (_is_OU(*ava)) {
  304. return ava;
  305. }
  306. }
  307. return NULL;
  308. }
  309. static char *
  310. _value_normalize(char *value)
  311. /* Remove leading and trailing spaces, and
  312. change consecutive spaces to a single space.
  313. */
  314. {
  315. auto char *t;
  316. auto char *f;
  317. t = f = value;
  318. while (*f == ' ')
  319. ++f; /* ignore leading spaces */
  320. for (; *f; ++f) {
  321. if (*f != ' ' || t[-1] != ' ') {
  322. *t++ = *f; /* no consecutive spaces */
  323. }
  324. }
  325. if (t > value && t[-1] == ' ') {
  326. --t; /* ignore trailing space */
  327. }
  328. *t = '\0';
  329. return value;
  330. }
  331. static int
  332. _explode_AVA(char *AVA)
  333. /* Change an attributeTypeAndValue a la <draft-ietf-asid-ldapv3-dn>,
  334. to the type name, followed immediately by the attribute value,
  335. both normalized.
  336. */
  337. {
  338. auto char *value = strchr(AVA, '=');
  339. if (!value)
  340. return LDAPU_FAILED;
  341. *value++ = '\0';
  342. _value_normalize(AVA);
  343. _value_normalize(value);
  344. {
  345. auto char *typeEnd = AVA + strlen(AVA);
  346. if ((typeEnd + 1) != value) {
  347. memmove(typeEnd + 1, value, strlen(value) + 1);
  348. }
  349. }
  350. return LDAPU_SUCCESS;
  351. }
  352. static char *
  353. _AVA_value(char *AVA)
  354. {
  355. return (AVA + strlen(AVA) + 1);
  356. }
  357. static int
  358. _value_match(char *value, char *desc)
  359. {
  360. auto const int result =
  361. !ldapu_strcasecmp(_value_normalize(value), desc);
  362. return result;
  363. }
  364. int
  365. ldapu_member_certificate_match(void *cert, const char *desc)
  366. /*
  367. * Return Values: (same as ldapu_find)
  368. * LDAPU_SUCCESS cert matches desc
  369. * LDAPU_FAILED cert doesn't match desc
  370. * <rv> Something went wrong.
  371. */
  372. {
  373. auto int err = LDAPU_FAILED;
  374. auto char ***descRDNs;
  375. if (!cert || !desc || desc[0] != '{')
  376. return LDAPU_FAILED;
  377. if (desc[1] == '\0')
  378. return LDAPU_SUCCESS; /* no AVAs */
  379. descRDNs = _explode_dn(desc + 1);
  380. if (descRDNs) {
  381. auto char **descAVAs = (char **)ldapu_malloc(sizeof(char *) * (_rdns_count(descRDNs) + 1));
  382. if (!descAVAs) {
  383. err = LDAPU_ERR_OUT_OF_MEMORY;
  384. } else {
  385. auto CERTName *subject = &(((CERTCertificate *)cert)->subject);
  386. auto char **descAVA;
  387. err = LDAPU_SUCCESS;
  388. { /* extract all the AVAs, but not duplicate types, except OU */
  389. auto size_t descAVAsLen = 0;
  390. auto char ***descRDN;
  391. descAVAs[0] = NULL;
  392. for (descRDN = descRDNs; err == LDAPU_SUCCESS && *descRDN; ++descRDN) {
  393. for (descAVA = *descRDN; err == LDAPU_SUCCESS && *descAVA; ++descAVA) {
  394. err = _explode_AVA(*descAVA);
  395. if (err == LDAPU_SUCCESS) {
  396. if (_is_OU(*descAVA) ||
  397. !_replaceAVA(*descAVA, descAVAs)) {
  398. descAVAs[descAVAsLen++] = *descAVA;
  399. descAVAs[descAVAsLen] = NULL;
  400. }
  401. }
  402. }
  403. }
  404. }
  405. /* match all the attributes except OU */
  406. for (descAVA = descAVAs; err == LDAPU_SUCCESS && *descAVA; ++descAVA) {
  407. auto struct _attr_getter_pair *descAttr;
  408. err = LDAPU_FAILED; /* if no match */
  409. for (descAttr = _attr_getter_table; descAttr->name1; ++descAttr) {
  410. if (!ldapu_strcasecmp(*descAVA, descAttr->name1) || (descAttr->name2 &&
  411. !ldapu_strcasecmp(*descAVA, descAttr->name2))) {
  412. if (descAttr->getter == NULL) { /* OU attribute */
  413. err = LDAPU_SUCCESS; /* for now */
  414. } else {
  415. auto char *certVal = (*(descAttr->getter))(subject);
  416. if (certVal && _value_match(certVal, _AVA_value(*descAVA))) {
  417. err = LDAPU_SUCCESS;
  418. }
  419. PR_Free(certVal);
  420. }
  421. break;
  422. }
  423. }
  424. }
  425. /* match the OU attributes */
  426. if (err == LDAPU_SUCCESS && descAVA != descAVAs) {
  427. /* Iterate over the OUs in the certificate subject */
  428. auto CERTRDN **certRDN = subject->rdns;
  429. descAVA = _previous_OU(descAVA, descAVAs);
  430. for (; descAVA && *certRDN; ++certRDN) {
  431. auto CERTAVA **certAVA = (*certRDN)->avas;
  432. for (; descAVA && *certAVA; ++certAVA) {
  433. auto const int tag = CERT_GetAVATag(*certAVA);
  434. if (tag == SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME) {
  435. auto const size_t certValLen = (*certAVA)->value.len;
  436. auto const size_t lenLen = (certValLen < 128) ? 2 : 3;
  437. auto const size_t buflen = certValLen - lenLen;
  438. auto char *buf = (char *)ldapu_malloc(buflen + 1);
  439. if (!buf) {
  440. err = LDAPU_ERR_OUT_OF_MEMORY;
  441. descAVA = NULL;
  442. } else {
  443. memcpy(buf, (*certAVA)->value.data + lenLen, buflen);
  444. buf[buflen] = 0;
  445. if (_value_match(buf, _AVA_value(*descAVA))) {
  446. descAVA = _previous_OU(descAVA, descAVAs);
  447. }
  448. free(buf);
  449. }
  450. }
  451. }
  452. }
  453. if (descAVA) {
  454. err = LDAPU_FAILED; /* no match for descAVA in subject */
  455. }
  456. }
  457. free(descAVAs);
  458. }
  459. _rdns_free(descRDNs);
  460. }
  461. return err;
  462. }