38#ifdef ENABLE_CRYPTOAPI
40#include <openssl/ssl.h>
41#include <openssl/evp.h>
42#include <openssl/err.h>
56#ifndef HAVE_XKEY_PROVIDER
61 msg(
M_NONFATAL,
"ERROR: this binary was built without cryptoapicert support");
67static XKEY_EXTERNAL_SIGN_fn xkey_cng_sign;
69typedef struct _CAPI_DATA
71 const CERT_CONTEXT *cert_context;
72 HCRYPTPROV_OR_NCRYPT_KEY_HANDLE crypt_prov;
85cng_hash_algo(
int md_type)
87 const wchar_t *alg = L
"UNKNOWN";
91 alg = BCRYPT_MD5_ALGORITHM;
95 alg = BCRYPT_SHA1_ALGORITHM;
99 alg = BCRYPT_SHA256_ALGORITHM;
103 alg = BCRYPT_SHA384_ALGORITHM;
107 alg = BCRYPT_SHA512_ALGORITHM;
116 msg(
M_WARN |
M_INFO,
"cryptoapicert: Unknown hash type NID=0x%x", md_type);
123CAPI_DATA_free(CAPI_DATA *cd)
125 if (!cd || cd->ref_count-- > 0)
129 if (cd->free_crypt_prov && cd->crypt_prov)
131 if (cd->key_spec == CERT_NCRYPT_KEY_SPEC)
133 NCryptFreeObject(cd->crypt_prov);
137 CryptReleaseContext(cd->crypt_prov, 0);
140 if (cd->cert_context)
142 CertFreeCertificateContext(cd->cert_context);
144 EVP_PKEY_free(cd->pubkey);
158parse_hexstring(
const char *p,
unsigned char *arr,
size_t capacity)
161 for (; *p &&
i < capacity; p += 2)
173 if (!isxdigit(p[0]) || !isxdigit(p[1]) || sscanf(p,
"%2hhx", &arr[
i++]) != 1)
182decode_object(
struct gc_arena *
gc, LPCSTR struct_type,
const CRYPT_OBJID_BLOB *val, DWORD flags,
187 if (!CryptDecodeObject(X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, struct_type, val->pbData,
188 val->cbData, flags, NULL, cb))
195 if (!CryptDecodeObject(X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, struct_type, val->pbData,
196 val->cbData, flags, buf, cb))
204static const CRYPT_OID_INFO *
205find_oid(DWORD keytype,
const void *
key, DWORD groupid)
207 const CRYPT_OID_INFO *info = NULL;
210 info = CryptFindOIDInfo(keytype, (
void *)
key, groupid);
213 if (!info && groupid)
215 info = CryptFindOIDInfo(keytype, (
void *)
key, 0);
222test_certificate_template(
const char *cert_prop,
const CERT_CONTEXT *cert_ctx)
224 const CERT_INFO *info = cert_ctx->pCertInfo;
225 const CERT_EXTENSION *ext;
232 ext = CertFindExtension(szOID_CERTIFICATE_TEMPLATE, info->cExtension, info->rgExtension);
235 pvext = decode_object(&
gc, X509_CERTIFICATE_TEMPLATE, &ext->Value, 0, &cbext);
236 if (pvext && cbext >=
sizeof(CERT_TEMPLATE_EXT))
238 const CERT_TEMPLATE_EXT *cte = (
const CERT_TEMPLATE_EXT *)pvext;
239 if (!stricmp(cert_prop, cte->pszObjId))
246 const CRYPT_OID_INFO *tmpl_oid =
247 find_oid(CRYPT_OID_INFO_NAME_KEY, tmpl_name, CRYPT_TEMPLATE_OID_GROUP_ID);
248 if (tmpl_oid && !stricmp(tmpl_oid->pszOID, cte->pszObjId))
262static const CERT_CONTEXT *
263find_certificate_in_store(
const char *cert_prop, HCERTSTORE cert_store)
273 const CERT_CONTEXT *rv = NULL;
275 const void *find_param;
276 unsigned char hash[255];
277 CRYPT_HASH_BLOB blob = { .cbData = 0, .pbData =
hash };
280 if (!strncmp(cert_prop,
"SUBJ:", 5))
284 find_type = CERT_FIND_SUBJECT_STR_W;
286 else if (!strncmp(cert_prop,
"ISSUER:", 7))
289 find_type = CERT_FIND_ISSUER_STR_W;
291 else if (!strncmp(cert_prop,
"THUMB:", 6))
293 find_type = CERT_FIND_HASH;
296 blob.cbData = parse_hexstring(cert_prop + 6,
hash,
sizeof(
hash));
297 if (blob.cbData == 0)
299 msg(
M_WARN |
M_INFO,
"WARNING: cryptoapicert: error parsing <%s>.", cert_prop);
303 else if (!strncmp(cert_prop,
"TMPL:", 5))
307 find_type = CERT_FIND_HAS_PRIVATE_KEY;
311 msg(
M_NONFATAL,
"Error in cryptoapicert: unsupported certificate specification <%s>",
320 rv = CertFindCertificateInStore(cert_store, X509_ASN_ENCODING | PKCS_7_ASN_ENCODING, 0,
321 find_type, find_param, rv);
327 if (find_type == CERT_FIND_HAS_PRIVATE_KEY && !test_certificate_template(cert_prop, rv))
331 validity = CertVerifyTimeValidity(NULL, rv->pCertInfo);
336 msg(
M_WARN |
M_INFO,
"WARNING: cryptoapicert: ignoring certificate in store %s.",
337 validity < 0 ?
"not yet valid" :
"that has expired");
347xkey_cng_ec_sign(CAPI_DATA *cd,
unsigned char *sig,
size_t *siglen,
const unsigned char *tbs,
352 msg(
D_LOW,
"Signing using NCryptSignHash with EC key");
354 DWORD
status = NCryptSignHash(cd->crypt_prov, NULL, (BYTE *)tbs, tbslen, sig, len, &len, 0);
356 if (
status != ERROR_SUCCESS)
364 int derlen = ecdsa_bin2der(sig, (
int)len, *siglen);
375xkey_cng_rsa_sign(CAPI_DATA *cd,
unsigned char *sig,
size_t *siglen,
const unsigned char *tbs,
376 size_t tbslen, XKEY_SIGALG sigalg)
384 DWORD
status = ERROR_SUCCESS;
387 const wchar_t *hashalg = cng_hash_algo(OBJ_sn2nid(sigalg.mdname));
389 if (hashalg && wcscmp(hashalg, L
"UNKNOWN") == 0)
391 msg(
M_NONFATAL,
"Error in cryptoapicert: Unknown hash name <%s>", sigalg.mdname);
395 if (!strcmp(sigalg.padmode,
"pkcs1"))
397 msg(
D_LOW,
"Signing using NCryptSignHash with PKCS1 padding: hashalg <%s>", sigalg.mdname);
399 BCRYPT_PKCS1_PADDING_INFO padinfo = { hashalg };
400 status = NCryptSignHash(cd->crypt_prov, &padinfo, (BYTE *)tbs, (DWORD)tbslen, sig,
401 (DWORD)*siglen, &len, BCRYPT_PAD_PKCS1);
403 else if (!strcmp(sigalg.padmode,
"pss"))
405 int saltlen = tbslen;
406 if (!strcmp(sigalg.saltlen,
"max"))
408 saltlen = xkey_max_saltlen(EVP_PKEY_bits(cd->pubkey), tbslen);
411 msg(
M_NONFATAL,
"Error in cryptoapicert: invalid salt length (%d)", saltlen);
416 msg(
D_LOW,
"Signing using NCryptSignHash with PSS padding: hashalg <%s>, saltlen <%d>",
417 sigalg.mdname, saltlen);
419 BCRYPT_PSS_PADDING_INFO padinfo = { hashalg,
421 status = NCryptSignHash(cd->crypt_prov, &padinfo, (BYTE *)tbs, (DWORD)tbslen, sig,
422 (DWORD)*siglen, &len, BCRYPT_PAD_PSS);
426 msg(
M_NONFATAL,
"Error in cryptoapicert: Unsupported padding mode <%s>", sigalg.padmode);
430 if (
status != ERROR_SUCCESS)
438 return (*siglen > 0);
443xkey_cng_sign(
void *handle,
unsigned char *sig,
size_t *siglen,
const unsigned char *tbs,
444 size_t tbslen, XKEY_SIGALG sigalg)
448 CAPI_DATA *cd = handle;
453 unsigned char mdbuf[EVP_MAX_MD_SIZE];
454 size_t buflen = _countof(mdbuf);
457 if (!strcmp(sigalg.op,
"DigestSign"))
459 if (!xkey_digest(tbs, tbslen, mdbuf, &buflen, sigalg.mdname))
467 if (!strcmp(sigalg.keytype,
"EC"))
469 return xkey_cng_ec_sign(cd, sig, siglen, tbs, tbslen);
471 else if (!strcmp(sigalg.keytype,
"RSA"))
473 return xkey_cng_rsa_sign(cd, sig, siglen, tbs, tbslen, sigalg);
482get_cert_name(
const CERT_CONTEXT *cc,
struct gc_arena *
gc)
484 DWORD len = CertGetNameStringW(cc, CERT_NAME_FRIENDLY_DISPLAY_TYPE, 0, NULL, NULL, 0);
488 wchar_t *wname =
gc_malloc(len *
sizeof(
wchar_t),
false,
gc);
490 || CertGetNameStringW(cc, CERT_NAME_FRIENDLY_DISPLAY_TYPE, 0, NULL, wname, len) == 0)
506Load_CryptoAPI_certificate(
const char *cert_prop, X509 **cert, EVP_PKEY **privkey)
509 CAPI_DATA *cd = calloc(1,
sizeof(*cd));
518 cs = CertOpenStore((LPCSTR)CERT_STORE_PROV_SYSTEM, 0, 0,
519 CERT_SYSTEM_STORE_CURRENT_USER | CERT_STORE_OPEN_EXISTING_FLAG
520 | CERT_STORE_READONLY_FLAG,
527 cd->cert_context = find_certificate_in_store(cert_prop, cs);
528 CertCloseStore(cs, 0);
529 if (!cd->cert_context)
531 cs = CertOpenStore((LPCSTR)CERT_STORE_PROV_SYSTEM, 0, 0,
532 CERT_SYSTEM_STORE_LOCAL_MACHINE | CERT_STORE_OPEN_EXISTING_FLAG
533 | CERT_STORE_READONLY_FLAG,
538 "Error in cryptoapicert: failed to open machine certficate store");
541 cd->cert_context = find_certificate_in_store(cert_prop, cs);
542 CertCloseStore(cs, 0);
543 if (cd->cert_context == NULL)
545 msg(
M_NONFATAL,
"Error in cryptoapicert: certificate matching <%s> not found",
552 char *cert_name = get_cert_name(cd->cert_context, &
gc);
555 msg(
D_LOW,
"cryptapicert: using certificate with name <%s>", cert_name);
559 *cert = d2i_X509(NULL, (
const unsigned char **)&cd->cert_context->pbCertEncoded,
560 cd->cert_context->cbCertEncoded);
563 msg(
M_NONFATAL,
"Error in cryptoapicert: X509 certificate decode failed");
569 DWORD flags = CRYPT_ACQUIRE_COMPARE_KEY_FLAG | CRYPT_ACQUIRE_ONLY_NCRYPT_KEY_FLAG;
570 if (!CryptAcquireCertificatePrivateKey(cd->cert_context, flags, NULL, &cd->crypt_prov,
571 &cd->key_spec, &cd->free_crypt_prov))
575 "Error in cryptoapicert: failed to acquire key. Key not present or "
576 "is in a legacy token not supported by Windows CNG API");
582 EVP_PKEY *pkey = X509_get_pubkey(*cert);
585 *privkey = xkey_load_generic_key(
tls_libctx, cd, pkey, xkey_cng_sign,
586 (XKEY_PRIVKEY_FREE_fn *)CAPI_DATA_free);
600 EVP_PKEY *privkey = NULL;
603 if (!Load_CryptoAPI_certificate(cert_prop, &cert, &privkey))
607 if (SSL_CTX_use_certificate(ssl_ctx, cert) && SSL_CTX_use_PrivateKey(ssl_ctx, privkey))
616 EVP_PKEY_free(privkey);
void * gc_malloc(size_t size, bool clear, struct gc_arena *a)
static void gc_free(struct gc_arena *a)
static struct gc_arena gc_new(void)
void crypto_print_openssl_errors(const unsigned int flags)
Retrieve any occurred OpenSSL errors and print those errors.
Data Channel Cryptography OpenSSL-specific backend interface.
int SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const char *cert_prop)
static SERVICE_STATUS status
OpenSSL compatibility stub.
OSSL_LIB_CTX * tls_libctx
Garbage collection arena used to keep track of dynamically allocated memory.
Container for unidirectional cipher and HMAC key material.
char * utf16to8(const wchar_t *utf16, struct gc_arena *gc)
WCHAR * wide_string(const char *utf8, struct gc_arena *gc)