cmp_http.c 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105
  1. /*
  2. * Copyright 2007-2022 The OpenSSL Project Authors. All Rights Reserved.
  3. * Copyright Nokia 2007-2019
  4. * Copyright Siemens AG 2015-2019
  5. *
  6. * Licensed under the Apache License 2.0 (the "License"). You may not use
  7. * this file except in compliance with the License. You can obtain a copy
  8. * in the file LICENSE in the source distribution or at
  9. * https://www.openssl.org/source/license.html
  10. */
  11. #include <string.h>
  12. #include <stdio.h>
  13. #include <openssl/asn1t.h>
  14. #include <openssl/http.h>
  15. #include "internal/sockets.h"
  16. #include <openssl/cmp.h>
  17. #include "cmp_local.h"
  18. /* explicit #includes not strictly needed since implied by the above: */
  19. #include <ctype.h>
  20. #include <fcntl.h>
  21. #include <stdlib.h>
  22. #include <openssl/bio.h>
  23. #include <openssl/buffer.h>
  24. #include <openssl/err.h>
  25. static int keep_alive(int keep_alive, int body_type)
  26. {
  27. if (keep_alive != 0
  28. /*
  29. * Ask for persistent connection only if may need more round trips.
  30. * Do so even with disableConfirm because polling might be needed.
  31. */
  32. && body_type != OSSL_CMP_PKIBODY_IR
  33. && body_type != OSSL_CMP_PKIBODY_CR
  34. && body_type != OSSL_CMP_PKIBODY_P10CR
  35. && body_type != OSSL_CMP_PKIBODY_KUR
  36. && body_type != OSSL_CMP_PKIBODY_POLLREQ)
  37. keep_alive = 0;
  38. return keep_alive;
  39. }
  40. /*
  41. * Send the PKIMessage req and on success return the response, else NULL.
  42. * Any previous error queue entries will likely be removed by ERR_clear_error().
  43. */
  44. OSSL_CMP_MSG *OSSL_CMP_MSG_http_perform(OSSL_CMP_CTX *ctx,
  45. const OSSL_CMP_MSG *req)
  46. {
  47. char server_port[32] = { '\0' };
  48. STACK_OF(CONF_VALUE) *headers = NULL;
  49. const char content_type_pkix[] = "application/pkixcmp";
  50. int tls_used;
  51. const ASN1_ITEM *it = ASN1_ITEM_rptr(OSSL_CMP_MSG);
  52. BIO *req_mem, *rsp;
  53. OSSL_CMP_MSG *res = NULL;
  54. if (ctx == NULL || req == NULL) {
  55. ERR_raise(ERR_LIB_CMP, CMP_R_NULL_ARGUMENT);
  56. return NULL;
  57. }
  58. if (!X509V3_add_value("Pragma", "no-cache", &headers))
  59. return NULL;
  60. if ((req_mem = ASN1_item_i2d_mem_bio(it, (const ASN1_VALUE *)req)) == NULL)
  61. goto err;
  62. if (ctx->serverPort != 0)
  63. BIO_snprintf(server_port, sizeof(server_port), "%d", ctx->serverPort);
  64. tls_used = OSSL_CMP_CTX_get_http_cb_arg(ctx) != NULL;
  65. if (ctx->http_ctx == NULL)
  66. ossl_cmp_log3(DEBUG, ctx, "connecting to CMP server %s:%s%s",
  67. ctx->server, server_port, tls_used ? " using TLS" : "");
  68. rsp = OSSL_HTTP_transfer(&ctx->http_ctx, ctx->server, server_port,
  69. ctx->serverPath, tls_used,
  70. ctx->proxy, ctx->no_proxy,
  71. NULL /* bio */, NULL /* rbio */,
  72. ctx->http_cb, OSSL_CMP_CTX_get_http_cb_arg(ctx),
  73. 0 /* buf_size */, headers,
  74. content_type_pkix, req_mem,
  75. content_type_pkix, 1 /* expect_asn1 */,
  76. OSSL_HTTP_DEFAULT_MAX_RESP_LEN,
  77. ctx->msg_timeout,
  78. keep_alive(ctx->keep_alive, req->body->type));
  79. BIO_free(req_mem);
  80. res = (OSSL_CMP_MSG *)ASN1_item_d2i_bio(it, rsp, NULL);
  81. BIO_free(rsp);
  82. if (ctx->http_ctx == NULL)
  83. ossl_cmp_debug(ctx, "disconnected from CMP server");
  84. /*
  85. * Note that on normal successful end of the transaction the connection
  86. * is not closed at this level, but this will be done by the CMP client
  87. * application via OSSL_CMP_CTX_free() or OSSL_CMP_CTX_reinit().
  88. */
  89. if (res != NULL)
  90. ossl_cmp_debug(ctx, "finished reading response from CMP server");
  91. err:
  92. sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
  93. return res;
  94. }