OpenVPN
cryptoapi.c
Go to the documentation of this file.
1/*
2 * Copyright (c) 2004 Peter 'Luna' Runestig <peter@runestig.com>
3 * Copyright (c) 2018 Selva Nair <selva.nair@gmail.com>
4 * All rights reserved.
5 *
6 * Redistribution and use in source and binary forms, with or without modifi-
7 * cation, are permitted provided that the following conditions are met:
8 *
9 * o Redistributions of source code must retain the above copyright notice,
10 * this list of conditions and the following disclaimer.
11 *
12 * o Redistributions in binary form must reproduce the above copyright no-
13 * tice, this list of conditions and the following disclaimer in the do-
14 * cumentation and/or other materials provided with the distribution.
15 *
16 * o The names of the contributors may not be used to endorse or promote
17 * products derived from this software without specific prior written
18 * permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
22 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
23 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LI-
24 * ABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUEN-
25 * TIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEV-
27 * ER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABI-
28 * LITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
29 * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 */
31
32#ifdef HAVE_CONFIG_H
33#include "config.h"
34#endif
35
36#include "syshead.h"
37
38#ifdef ENABLE_CRYPTOAPI
39
40#include <openssl/ssl.h>
41#include <openssl/evp.h>
42#include <openssl/err.h>
43#include <windows.h>
44#include <wincrypt.h>
45#include <ncrypt.h>
46#include <stdio.h>
47#include <ctype.h>
48#include <assert.h>
49
50#include "buffer.h"
51#include "openssl_compat.h"
52#include "win32.h"
53#include "xkey_common.h"
54#include "crypto_openssl.h"
55
56#ifndef HAVE_XKEY_PROVIDER
57
58int
59SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const char *cert_prop)
60{
61 msg(M_NONFATAL, "ERROR: this binary was built without cryptoapicert support");
62 return 0;
63}
64
65#else /* HAVE_XKEY_PROVIDER */
66
67static XKEY_EXTERNAL_SIGN_fn xkey_cng_sign;
68
69typedef struct _CAPI_DATA
70{
71 const CERT_CONTEXT *cert_context;
72 HCRYPTPROV_OR_NCRYPT_KEY_HANDLE crypt_prov;
73 EVP_PKEY *pubkey;
74 DWORD key_spec;
75 BOOL free_crypt_prov;
76 int ref_count;
77} CAPI_DATA;
78
79/*
80 * Translate OpenSSL hash OID to CNG algorithm name. Returns
81 * "UNKNOWN" for unsupported algorithms and NULL for MD5+SHA1
82 * mixed hash used in TLS 1.1 and earlier.
83 */
84static const wchar_t *
85cng_hash_algo(int md_type)
86{
87 const wchar_t *alg = L"UNKNOWN";
88 switch (md_type)
89 {
90 case NID_md5:
91 alg = BCRYPT_MD5_ALGORITHM;
92 break;
93
94 case NID_sha1:
95 alg = BCRYPT_SHA1_ALGORITHM;
96 break;
97
98 case NID_sha256:
99 alg = BCRYPT_SHA256_ALGORITHM;
100 break;
101
102 case NID_sha384:
103 alg = BCRYPT_SHA384_ALGORITHM;
104 break;
105
106 case NID_sha512:
107 alg = BCRYPT_SHA512_ALGORITHM;
108 break;
109
110 case NID_md5_sha1:
111 case 0:
112 alg = NULL;
113 break;
114
115 default:
116 msg(M_WARN | M_INFO, "cryptoapicert: Unknown hash type NID=0x%x", md_type);
117 break;
118 }
119 return alg;
120}
121
122static void
123CAPI_DATA_free(CAPI_DATA *cd)
124{
125 if (!cd || cd->ref_count-- > 0)
126 {
127 return;
128 }
129 if (cd->free_crypt_prov && cd->crypt_prov)
130 {
131 if (cd->key_spec == CERT_NCRYPT_KEY_SPEC)
132 {
133 NCryptFreeObject(cd->crypt_prov);
134 }
135 else
136 {
137 CryptReleaseContext(cd->crypt_prov, 0);
138 }
139 }
140 if (cd->cert_context)
141 {
142 CertFreeCertificateContext(cd->cert_context);
143 }
144 EVP_PKEY_free(cd->pubkey); /* passing NULL is okay */
145
146 free(cd);
147}
148
157int
158parse_hexstring(const char *p, unsigned char *arr, size_t capacity)
159{
160 int i = 0;
161 for (; *p && i < capacity; p += 2)
162 {
163 /* skip spaces */
164 while (*p == ' ')
165 {
166 p++;
167 }
168 if (!*p) /* ending with spaces is not an error */
169 {
170 break;
171 }
172
173 if (!isxdigit(p[0]) || !isxdigit(p[1]) || sscanf(p, "%2hhx", &arr[i++]) != 1)
174 {
175 return 0;
176 }
177 }
178 return i;
179}
180
181static void *
182decode_object(struct gc_arena *gc, LPCSTR struct_type, const CRYPT_OBJID_BLOB *val, DWORD flags,
183 DWORD *cb)
184{
185 /* get byte count for decoding */
186 BYTE *buf;
187 if (!CryptDecodeObject(X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, struct_type, val->pbData,
188 val->cbData, flags, NULL, cb))
189 {
190 return NULL;
191 }
192
193 /* do the actual decode */
194 buf = gc_malloc(*cb, false, gc);
195 if (!CryptDecodeObject(X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, struct_type, val->pbData,
196 val->cbData, flags, buf, cb))
197 {
198 return NULL;
199 }
200
201 return buf;
202}
203
204static const CRYPT_OID_INFO *
205find_oid(DWORD keytype, const void *key, DWORD groupid)
206{
207 const CRYPT_OID_INFO *info = NULL;
208
209 /* try proper resolve, also including AD */
210 info = CryptFindOIDInfo(keytype, (void *)key, groupid);
211
212 /* fall back to all groups if not found yet */
213 if (!info && groupid)
214 {
215 info = CryptFindOIDInfo(keytype, (void *)key, 0);
216 }
217
218 return info;
219}
220
221static bool
222test_certificate_template(const char *cert_prop, const CERT_CONTEXT *cert_ctx)
223{
224 const CERT_INFO *info = cert_ctx->pCertInfo;
225 const CERT_EXTENSION *ext;
226 DWORD cbext;
227 void *pvext;
228 struct gc_arena gc = gc_new();
229 const WCHAR *tmpl_name = wide_string(cert_prop, &gc);
230
231 /* check for V2 extension (Windows 2003+) */
232 ext = CertFindExtension(szOID_CERTIFICATE_TEMPLATE, info->cExtension, info->rgExtension);
233 if (ext)
234 {
235 pvext = decode_object(&gc, X509_CERTIFICATE_TEMPLATE, &ext->Value, 0, &cbext);
236 if (pvext && cbext >= sizeof(CERT_TEMPLATE_EXT))
237 {
238 const CERT_TEMPLATE_EXT *cte = (const CERT_TEMPLATE_EXT *)pvext;
239 if (!stricmp(cert_prop, cte->pszObjId))
240 {
241 /* found direct OID match with certificate property specified */
242 gc_free(&gc);
243 return true;
244 }
245
246 const CRYPT_OID_INFO *tmpl_oid =
247 find_oid(CRYPT_OID_INFO_NAME_KEY, tmpl_name, CRYPT_TEMPLATE_OID_GROUP_ID);
248 if (tmpl_oid && !stricmp(tmpl_oid->pszOID, cte->pszObjId))
249 {
250 /* found OID match in extension against resolved key */
251 gc_free(&gc);
252 return true;
253 }
254 }
255 }
256
257 /* no extension found, exit */
258 gc_free(&gc);
259 return false;
260}
261
262static const CERT_CONTEXT *
263find_certificate_in_store(const char *cert_prop, HCERTSTORE cert_store)
264{
265 /* Find, and use, the desired certificate from the store. The
266 * 'cert_prop' certificate search string can look like this:
267 * SUBJ:<certificate substring to match>
268 * THUMB:<certificate thumbprint hex value>, e.g.
269 * THUMB:f6 49 24 41 01 b4 fb 44 0c ce f4 36 ae d0 c4 c9 df 7a b6 28
270 * TMPL:<template name or OID>
271 * The first matching certificate that has not expired is returned.
272 */
273 const CERT_CONTEXT *rv = NULL;
274 DWORD find_type;
275 const void *find_param;
276 unsigned char hash[255];
277 CRYPT_HASH_BLOB blob = { .cbData = 0, .pbData = hash };
278 struct gc_arena gc = gc_new();
279
280 if (!strncmp(cert_prop, "SUBJ:", 5))
281 {
282 /* skip the tag */
283 find_param = wide_string(cert_prop + 5, &gc);
284 find_type = CERT_FIND_SUBJECT_STR_W;
285 }
286 else if (!strncmp(cert_prop, "ISSUER:", 7))
287 {
288 find_param = wide_string(cert_prop + 7, &gc);
289 find_type = CERT_FIND_ISSUER_STR_W;
290 }
291 else if (!strncmp(cert_prop, "THUMB:", 6))
292 {
293 find_type = CERT_FIND_HASH;
294 find_param = &blob;
295
296 blob.cbData = parse_hexstring(cert_prop + 6, hash, sizeof(hash));
297 if (blob.cbData == 0)
298 {
299 msg(M_WARN | M_INFO, "WARNING: cryptoapicert: error parsing <%s>.", cert_prop);
300 goto out;
301 }
302 }
303 else if (!strncmp(cert_prop, "TMPL:", 5))
304 {
305 cert_prop += 5;
306 find_param = NULL;
307 find_type = CERT_FIND_HAS_PRIVATE_KEY;
308 }
309 else
310 {
311 msg(M_NONFATAL, "Error in cryptoapicert: unsupported certificate specification <%s>",
312 cert_prop);
313 goto out;
314 }
315
316 while (true)
317 {
318 int validity = 1;
319 /* this frees previous rv, if not NULL */
320 rv = CertFindCertificateInStore(cert_store, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0,
321 find_type, find_param, rv);
322 if (!rv)
323 {
324 break;
325 }
326 /* if searching by template name, check now if it matches */
327 if (find_type == CERT_FIND_HAS_PRIVATE_KEY && !test_certificate_template(cert_prop, rv))
328 {
329 continue;
330 }
331 validity = CertVerifyTimeValidity(NULL, rv->pCertInfo);
332 if (validity == 0)
333 {
334 break;
335 }
336 msg(M_WARN | M_INFO, "WARNING: cryptoapicert: ignoring certificate in store %s.",
337 validity < 0 ? "not yet valid" : "that has expired");
338 }
339
340out:
341 gc_free(&gc);
342 return rv;
343}
344
346static int
347xkey_cng_ec_sign(CAPI_DATA *cd, unsigned char *sig, size_t *siglen, const unsigned char *tbs,
348 size_t tbslen)
349{
350 DWORD len = *siglen;
351
352 msg(D_LOW, "Signing using NCryptSignHash with EC key");
353
354 DWORD status = NCryptSignHash(cd->crypt_prov, NULL, (BYTE *)tbs, tbslen, sig, len, &len, 0);
355
356 if (status != ERROR_SUCCESS)
357 {
358 SetLastError(status);
359 msg(M_NONFATAL | M_ERRNO, "Error in cryptoapicert: ECDSA signature using CNG failed.");
360 return 0;
361 }
362
363 /* NCryptSignHash returns r|s -- convert to DER encoded buffer expected by OpenSSL */
364 int derlen = ecdsa_bin2der(sig, (int)len, *siglen);
365 if (derlen <= 0)
366 {
367 return 0;
368 }
369 *siglen = derlen;
370 return 1;
371}
372
374static int
375xkey_cng_rsa_sign(CAPI_DATA *cd, unsigned char *sig, size_t *siglen, const unsigned char *tbs,
376 size_t tbslen, XKEY_SIGALG sigalg)
377{
378 dmsg(D_LOW, "In xkey_cng_rsa_sign");
379
380 ASSERT(cd);
381 ASSERT(sig);
382 ASSERT(tbs);
383
384 DWORD status = ERROR_SUCCESS;
385 DWORD len = 0;
386
387 const wchar_t *hashalg = cng_hash_algo(OBJ_sn2nid(sigalg.mdname));
388
389 if (hashalg && wcscmp(hashalg, L"UNKNOWN") == 0)
390 {
391 msg(M_NONFATAL, "Error in cryptoapicert: Unknown hash name <%s>", sigalg.mdname);
392 return 0;
393 }
394
395 if (!strcmp(sigalg.padmode, "pkcs1"))
396 {
397 msg(D_LOW, "Signing using NCryptSignHash with PKCS1 padding: hashalg <%s>", sigalg.mdname);
398
399 BCRYPT_PKCS1_PADDING_INFO padinfo = { hashalg };
400 status = NCryptSignHash(cd->crypt_prov, &padinfo, (BYTE *)tbs, (DWORD)tbslen, sig,
401 (DWORD)*siglen, &len, BCRYPT_PAD_PKCS1);
402 }
403 else if (!strcmp(sigalg.padmode, "pss"))
404 {
405 int saltlen = tbslen; /* digest size by default */
406 if (!strcmp(sigalg.saltlen, "max"))
407 {
408 saltlen = xkey_max_saltlen(EVP_PKEY_bits(cd->pubkey), tbslen);
409 if (saltlen < 0)
410 {
411 msg(M_NONFATAL, "Error in cryptoapicert: invalid salt length (%d)", saltlen);
412 return 0;
413 }
414 }
415
416 msg(D_LOW, "Signing using NCryptSignHash with PSS padding: hashalg <%s>, saltlen <%d>",
417 sigalg.mdname, saltlen);
418
419 BCRYPT_PSS_PADDING_INFO padinfo = { hashalg,
420 (DWORD)saltlen }; /* cast is safe as saltlen >= 0 */
421 status = NCryptSignHash(cd->crypt_prov, &padinfo, (BYTE *)tbs, (DWORD)tbslen, sig,
422 (DWORD)*siglen, &len, BCRYPT_PAD_PSS);
423 }
424 else
425 {
426 msg(M_NONFATAL, "Error in cryptoapicert: Unsupported padding mode <%s>", sigalg.padmode);
427 return 0;
428 }
429
430 if (status != ERROR_SUCCESS)
431 {
432 SetLastError(status);
433 msg(M_NONFATAL | M_ERRNO, "Error in cryptoapicert: RSA signature using CNG failed.");
434 return 0;
435 }
436
437 *siglen = len;
438 return (*siglen > 0);
439}
440
442static int
443xkey_cng_sign(void *handle, unsigned char *sig, size_t *siglen, const unsigned char *tbs,
444 size_t tbslen, XKEY_SIGALG sigalg)
445{
446 dmsg(D_LOW, "In xkey_cng_sign");
447
448 CAPI_DATA *cd = handle;
449 ASSERT(cd);
450 ASSERT(sig);
451 ASSERT(tbs);
452
453 unsigned char mdbuf[EVP_MAX_MD_SIZE];
454 size_t buflen = _countof(mdbuf);
455
456 /* compute digest if required */
457 if (!strcmp(sigalg.op, "DigestSign"))
458 {
459 if (!xkey_digest(tbs, tbslen, mdbuf, &buflen, sigalg.mdname))
460 {
461 return 0;
462 }
463 tbs = mdbuf;
464 tbslen = buflen;
465 }
466
467 if (!strcmp(sigalg.keytype, "EC"))
468 {
469 return xkey_cng_ec_sign(cd, sig, siglen, tbs, tbslen);
470 }
471 else if (!strcmp(sigalg.keytype, "RSA"))
472 {
473 return xkey_cng_rsa_sign(cd, sig, siglen, tbs, tbslen, sigalg);
474 }
475 else
476 {
477 return 0; /* Unknown keytype -- should not happen */
478 }
479}
480
481static char *
482get_cert_name(const CERT_CONTEXT *cc, struct gc_arena *gc)
483{
484 DWORD len = CertGetNameStringW(cc, CERT_NAME_FRIENDLY_DISPLAY_TYPE, 0, NULL, NULL, 0);
485 char *name = NULL;
486 if (len)
487 {
488 wchar_t *wname = gc_malloc(len * sizeof(wchar_t), false, gc);
489 if (!wname
490 || CertGetNameStringW(cc, CERT_NAME_FRIENDLY_DISPLAY_TYPE, 0, NULL, wname, len) == 0)
491 {
492 return NULL;
493 }
494 name = utf16to8(wname, gc);
495 }
496 return name;
497}
498
505static int
506Load_CryptoAPI_certificate(const char *cert_prop, X509 **cert, EVP_PKEY **privkey)
507{
508 HCERTSTORE cs;
509 CAPI_DATA *cd = calloc(1, sizeof(*cd));
510 struct gc_arena gc = gc_new();
511
512 if (cd == NULL)
513 {
514 msg(M_NONFATAL, "Error in cryptoapicert: out of memory");
515 goto err;
516 }
517 /* search CURRENT_USER first, then LOCAL_MACHINE */
518 cs = CertOpenStore((LPCSTR)CERT_STORE_PROV_SYSTEM, 0, 0,
519 CERT_SYSTEM_STORE_CURRENT_USER | CERT_STORE_OPEN_EXISTING_FLAG
520 | CERT_STORE_READONLY_FLAG,
521 L"MY");
522 if (cs == NULL)
523 {
524 msg(M_NONFATAL | M_ERRNO, "Error in cryptoapicert: failed to open user certficate store");
525 goto err;
526 }
527 cd->cert_context = find_certificate_in_store(cert_prop, cs);
528 CertCloseStore(cs, 0);
529 if (!cd->cert_context)
530 {
531 cs = CertOpenStore((LPCSTR)CERT_STORE_PROV_SYSTEM, 0, 0,
532 CERT_SYSTEM_STORE_LOCAL_MACHINE | CERT_STORE_OPEN_EXISTING_FLAG
533 | CERT_STORE_READONLY_FLAG,
534 L"MY");
535 if (cs == NULL)
536 {
538 "Error in cryptoapicert: failed to open machine certficate store");
539 goto err;
540 }
541 cd->cert_context = find_certificate_in_store(cert_prop, cs);
542 CertCloseStore(cs, 0);
543 if (cd->cert_context == NULL)
544 {
545 msg(M_NONFATAL, "Error in cryptoapicert: certificate matching <%s> not found",
546 cert_prop);
547 goto err;
548 }
549 }
550
551 /* try to log the "name" of the selected certificate */
552 char *cert_name = get_cert_name(cd->cert_context, &gc);
553 if (cert_name)
554 {
555 msg(D_LOW, "cryptapicert: using certificate with name <%s>", cert_name);
556 }
557
558 /* cert_context->pbCertEncoded is the cert X509 DER encoded. */
559 *cert = d2i_X509(NULL, (const unsigned char **)&cd->cert_context->pbCertEncoded,
560 cd->cert_context->cbCertEncoded);
561 if (*cert == NULL)
562 {
563 msg(M_NONFATAL, "Error in cryptoapicert: X509 certificate decode failed");
564 goto err;
565 }
566
567 /* set up stuff to use the private key */
568 /* We support NCRYPT key handles only */
569 DWORD flags = CRYPT_ACQUIRE_COMPARE_KEY_FLAG | CRYPT_ACQUIRE_ONLY_NCRYPT_KEY_FLAG;
570 if (!CryptAcquireCertificatePrivateKey(cd->cert_context, flags, NULL, &cd->crypt_prov,
571 &cd->key_spec, &cd->free_crypt_prov))
572 {
573 /* private key may be in a token not available, or incompatible with CNG */
575 "Error in cryptoapicert: failed to acquire key. Key not present or "
576 "is in a legacy token not supported by Windows CNG API");
577 X509_free(*cert);
578 goto err;
579 }
580
581 /* the public key */
582 EVP_PKEY *pkey = X509_get_pubkey(*cert);
583 cd->pubkey = pkey; /* will be freed with cd */
584
585 *privkey = xkey_load_generic_key(tls_libctx, cd, pkey, xkey_cng_sign,
586 (XKEY_PRIVKEY_FREE_fn *)CAPI_DATA_free);
587 gc_free(&gc);
588 return 1; /* do not free cd -- its kept by xkey provider */
589
590err:
591 CAPI_DATA_free(cd);
592 gc_free(&gc);
593 return 0;
594}
595
596int
597SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const char *cert_prop)
598{
599 X509 *cert = NULL;
600 EVP_PKEY *privkey = NULL;
601 int ret = 0;
602
603 if (!Load_CryptoAPI_certificate(cert_prop, &cert, &privkey))
604 {
605 return ret;
606 }
607 if (SSL_CTX_use_certificate(ssl_ctx, cert) && SSL_CTX_use_PrivateKey(ssl_ctx, privkey))
608 {
610 ret = 1;
611 }
612
613 /* Always free cert and privkey even if retained by ssl_ctx as
614 * they are reference counted */
615 X509_free(cert);
616 EVP_PKEY_free(privkey);
617 return ret;
618}
619
620#endif /* HAVE_XKEY_PROVIDER */
621#endif /* _WIN32 */
void * gc_malloc(size_t size, bool clear, struct gc_arena *a)
Definition buffer.c:336
static void gc_free(struct gc_arena *a)
Definition buffer.h:1015
static struct gc_arena gc_new(void)
Definition buffer.h:1007
void crypto_print_openssl_errors(const unsigned int flags)
Retrieve any occurred OpenSSL errors and print those errors.
Data Channel Cryptography OpenSSL-specific backend interface.
int SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const char *cert_prop)
Definition cryptoapi.c:59
#define D_LOW
Definition errlevel.h:96
#define M_INFO
Definition errlevel.h:54
static SERVICE_STATUS status
Definition interactive.c:51
OpenSSL compatibility stub.
#define M_NONFATAL
Definition error.h:89
#define dmsg(flags,...)
Definition error.h:170
#define msg(flags,...)
Definition error.h:150
#define ASSERT(x)
Definition error.h:217
#define M_WARN
Definition error.h:90
#define M_ERRNO
Definition error.h:93
OSSL_LIB_CTX * tls_libctx
Definition ssl_openssl.c:78
Garbage collection arena used to keep track of dynamically allocated memory.
Definition buffer.h:116
Definition list.h:56
Container for unidirectional cipher and HMAC key material.
Definition crypto.h:152
struct gc_arena gc
Definition test_ssl.c:154
char * utf16to8(const wchar_t *utf16, struct gc_arena *gc)
Definition win32-util.c:49
WCHAR * wide_string(const char *utf8, struct gc_arena *gc)
Definition win32-util.c:40