File: | programs/pluto/keys.c |
Warning: | line 518, column 3 Value stored to 'stop' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* |
2 | * interfaces to the secrets.c library functions in libswan. |
3 | * for now, just stupid wrappers! |
4 | * |
5 | * Copyright (C) 1998-2001 D. Hugh Redelmeier. |
6 | * Copyright (C) 2003-2008 Michael Richardson <mcr@xelerance.com> |
7 | * Copyright (C) 2003-2010 Paul Wouters <paul@xelerance.com> |
8 | * Copyright (C) 2008 David McCullough <david_mccullough@securecomputing.com> |
9 | * Copyright (C) 2009 Avesh Agarwal <avagarwa@redhat.com> |
10 | * Copyright (C) 2010 Tuomo Soini <tis@foobar.fi> |
11 | * Copyright (C) 2012-2013 Paul Wouters <paul@libreswan.org> |
12 | * Copyright (C) 2015 Paul Wouters <pwouters@redhat.com> |
13 | * Copyright (C) 2016, Andrew Cagney <cagney@gnu.org> |
14 | * Copyright (C) 2017 Vukasin Karadzic <vukasin.karadzic@gmail.com> |
15 | * Copyright (C) 2018 Sahana Prasad <sahana.prasad07@gmail.com> |
16 | * Copyright (C) 2019 D. Hugh Redelmeier <hugh@mimosa.com> |
17 | * |
18 | * This program is free software; you can redistribute it and/or modify it |
19 | * under the terms of the GNU General Public License as published by the |
20 | * Free Software Foundation; either version 2 of the License, or (at your |
21 | * option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>. |
22 | * |
23 | * This program is distributed in the hope that it will be useful, but |
24 | * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY |
25 | * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
26 | * for more details. |
27 | * |
28 | */ |
29 | |
30 | #include <unistd.h> |
31 | #include <sys/socket.h> |
32 | #include <netinet/in.h> |
33 | #include <arpa/inet.h> |
34 | #include <resolv.h> |
35 | |
36 | #include "sysdep.h" |
37 | #include "constants.h" |
38 | #include "ip_info.h" |
39 | #include "defs.h" |
40 | #include "id.h" |
41 | #include "x509.h" |
42 | #include "certs.h" |
43 | #include "connections.h" /* needs id.h */ |
44 | #include "state.h" |
45 | #include "keys.h" |
46 | #include "log.h" |
47 | #include "whack.h" /* for RC_LOG_SERIOUS */ |
48 | #include "timer.h" |
49 | |
50 | #include "fetch.h" |
51 | #include "pluto_x509.h" |
52 | #include "nss_cert_load.h" |
53 | #include "crypt_mac.h" |
54 | #include "nat_traversal.h" |
55 | |
56 | #include <prerror.h> |
57 | #include <prinit.h> |
58 | #include <prmem.h> |
59 | #include <keyhi.h> |
60 | #include <keythi.h> |
61 | #include <pk11pub.h> |
62 | #include <seccomon.h> |
63 | #include <secerr.h> |
64 | #include <secport.h> |
65 | #include <time.h> |
66 | #include "lswconf.h" |
67 | #include "lswnss.h" |
68 | #include "secrets.h" |
69 | #include "ike_alg_hash.h" |
70 | #include "pluto_timing.h" |
71 | |
72 | static struct secret *pluto_secrets = NULL((void*)0); |
73 | |
74 | void load_preshared_secrets(struct logger *logger) |
75 | { |
76 | const struct lsw_conf_options *oco = lsw_init_options(); |
77 | lsw_load_preshared_secrets(&pluto_secrets, oco->secretsfile, logger); |
78 | } |
79 | |
80 | void free_preshared_secrets(struct logger *logger) |
81 | { |
82 | lsw_free_preshared_secrets(&pluto_secrets, logger); |
83 | } |
84 | |
85 | static int print_secrets(struct secret *secret, |
86 | struct private_key_stuff *pks UNUSED__attribute__ ((unused)), |
87 | void *uservoid) |
88 | { |
89 | struct show *s = uservoid; |
90 | |
91 | const char *kind; |
92 | switch (pks->kind) { |
93 | case PKK_PSK: |
94 | kind = "PSK"; |
95 | break; |
96 | case PKK_RSA: |
97 | kind = "RSA"; |
98 | break; |
99 | case PKK_XAUTH: |
100 | kind = "XAUTH"; |
101 | break; |
102 | case PKK_ECDSA: |
103 | kind = "ECDSA"; |
104 | break; |
105 | default: |
106 | return 1; |
107 | } |
108 | |
109 | struct id_list *ids = lsw_get_idlist(secret); |
110 | |
111 | int indent = 0; |
112 | SHOW_JAMBUF(RC_COMMENT, s, buf)for (struct jambuf *buf = show_jambuf(s); buf != ((void*)0); jambuf_to_show (buf, s, RC_COMMENT), buf = ((void*)0)) { |
113 | indent = jam(buf, "%5d:", pks->line); |
114 | jam(buf, " %s ", kind); |
115 | if (ids == NULL((void*)0)) { |
116 | jam(buf, "%%any"); |
117 | } else { |
118 | jam_id_bytes(buf, &ids->id, jam_sanitized_bytes); |
119 | if (ids->next != NULL((void*)0)) { |
120 | jam(buf, " "); |
121 | jam_id_bytes(buf, &ids->next->id, jam_sanitized_bytes); |
122 | if (ids->next->next != NULL((void*)0)) { |
123 | jam(buf, " more"); |
124 | } |
125 | } |
126 | } |
127 | } |
128 | |
129 | const ckaid_t *ckaid = secret_ckaid(secret); /* may be NULL */ |
130 | if (ckaid != NULL((void*)0)) { |
131 | SHOW_JAMBUF(RC_COMMENT, s, buf)for (struct jambuf *buf = show_jambuf(s); buf != ((void*)0); jambuf_to_show (buf, s, RC_COMMENT), buf = ((void*)0)) { |
132 | jam(buf, "%*s ckaid: ", indent, ""); |
133 | jam_ckaid(buf, ckaid); |
134 | } |
135 | } |
136 | |
137 | /* continue loop until end */ |
138 | return 1; |
139 | } |
140 | |
141 | void list_psks(struct show *s) |
142 | { |
143 | const struct lsw_conf_options *oco = lsw_init_options(); |
144 | show_blank(s); |
145 | show_comment(s, "List of Pre-shared secrets (from %s)", |
146 | oco->secretsfile); |
147 | show_blank(s); |
148 | lsw_foreach_secret(pluto_secrets, print_secrets, s); |
149 | } |
150 | |
151 | bool_Bool authsig_using_RSA_pubkey(const struct crypt_mac *expected_hash, |
152 | shunk_t signature, |
153 | struct pubkey *kr, |
154 | const struct hash_desc *hash_algo, |
155 | diag_t *fatal_diag, |
156 | struct logger *logger) |
157 | { |
158 | const struct RSA_public_key *k = &kr->u.rsa; |
159 | |
160 | /* decrypt the signature -- reversing RSA_sign_hash */ |
161 | if (signature.len != kr->size) { |
162 | /* XXX notification: INVALID_KEY_INFORMATION */ |
163 | *fatal_diag = NULL((void*)0); |
164 | return false0; |
165 | } |
166 | |
167 | SECStatus retVal; |
168 | if (DBGP(DBG_BASE)(cur_debugging & (((lset_t)1 << (DBG_BASE_IX))))) { |
169 | DBG_dump_hunk("NSS RSA: verifying that decrypted signature matches hash: ",{ typeof(*expected_hash) hunk_ = *expected_hash; DBG_dump("NSS RSA: verifying that decrypted signature matches hash: " , hunk_.ptr, hunk_.len); } |
170 | *expected_hash){ typeof(*expected_hash) hunk_ = *expected_hash; DBG_dump("NSS RSA: verifying that decrypted signature matches hash: " , hunk_.ptr, hunk_.len); }; |
171 | } |
172 | |
173 | /* |
174 | * Create a public key storing all keying material in an |
175 | * arena. The arena's lifetime is tied to and released by the |
176 | * key. |
177 | * |
178 | * Danger: |
179 | * |
180 | * Need to use SECKEY_DestroyPublicKey() to release any |
181 | * allocated memory; not SECITEM_FreeArena(); and not both! |
182 | * |
183 | * A look at SECKEY_DestroyPublicKey()'s source shows that it |
184 | * releases the allocated public key by freeing the arena, |
185 | * hence only that is needed. |
186 | */ |
187 | |
188 | PRArenaPoolPLArenaPool *arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE(2048)); |
189 | if (arena == NULL((void*)0)) { |
190 | *fatal_diag = diag_nss_error("allocating RSA arena"); |
191 | return false0; |
192 | } |
193 | |
194 | SECKEYPublicKey *publicKey = PORT_ArenaZAlloc(arena, sizeof(SECKEYPublicKey)); |
195 | if (publicKey == NULL((void*)0)) { |
196 | *fatal_diag = diag_nss_error("allocating RSA pubkey"); |
197 | PORT_FreeArena(arena, PR_FALSE0); |
198 | return false0; |
199 | } |
200 | |
201 | publicKey->arena = arena; |
202 | publicKey->keyType = rsaKey; |
203 | publicKey->pkcs11Slot = NULL((void*)0); |
204 | publicKey->pkcs11ID = CK_INVALID_HANDLE0; |
205 | |
206 | /* |
207 | * Convert n and e to form the public key in the |
208 | * SECKEYPublicKey data structure |
209 | */ |
210 | |
211 | const SECItem nss_n = same_chunk_as_secitem(k->n, siBuffer); |
212 | retVal = SECITEM_CopyItem(publicKey->arena, &publicKey->u.rsa.modulus, &nss_n); |
213 | if (retVal != SECSuccess) { |
214 | llog_nss_error(RC_LOG, logger, "copying 'n' (modulus) to RSA public key"); |
215 | SECKEY_DestroyPublicKey(publicKey); |
216 | return false0; |
217 | } |
218 | |
219 | const SECItem nss_e = same_chunk_as_secitem(k->e, siBuffer); |
220 | retVal = SECITEM_CopyItem(publicKey->arena, &publicKey->u.rsa.publicExponent, &nss_e); |
221 | if (retVal != SECSuccess) { |
222 | llog_nss_error(RC_LOG, logger, "copying 'e' (exponent) to RSA public key"); |
223 | SECKEY_DestroyPublicKey(publicKey); |
224 | return false0; |
225 | } |
226 | |
227 | /* |
228 | * Convert the signature into raw form (NSS doesn't do const). |
229 | */ |
230 | |
231 | const SECItem encrypted_signature = { |
232 | .type = siBuffer, |
233 | .data = DISCARD_CONST(unsigned char *, signature.ptr)(__extension__({ const unsigned char * tmp = (signature.ptr); (unsigned char *)(uintptr_t)tmp; })), |
234 | .len = signature.len, |
235 | }; |
236 | |
237 | if (hash_algo == NULL((void*)0) /* ikev1*/ || |
238 | hash_algo == &ike_alg_hash_sha1 /* old style rsa with SHA1*/) { |
239 | SECItem decrypted_signature = { |
240 | .type = siBuffer, |
241 | }; |
242 | if (SECITEM_AllocItem(publicKey->arena, &decrypted_signature, |
243 | signature.len) == NULL((void*)0)) { |
244 | llog_nss_error(RC_LOG, logger, "allocating space for decrypted RSA signature"); |
245 | SECKEY_DestroyPublicKey(publicKey); |
246 | return false0; |
247 | } |
248 | |
249 | if (PK11_VerifyRecover(publicKey, &encrypted_signature, &decrypted_signature, |
250 | lsw_nss_get_password_context(logger)({ struct logger *l_ = logger; l_; })) != SECSuccess) { |
251 | dbg("NSS RSA verify: decrypting signature is failed"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("NSS RSA verify: decrypting signature is failed" ); } }; |
252 | SECKEY_DestroyPublicKey(publicKey); |
253 | *fatal_diag = NULL((void*)0); |
254 | return false0; |
255 | } |
256 | |
257 | LSWDBGP(DBG_CRYPT, buf)for (_Bool lswlog_p = (cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX)))); lswlog_p; lswlog_p = 0) for (char lswbuf[ ((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf ), sizeof(lswbuf)), *buf = &jambuf; buf != ((void*)0); buf = ((void*)0)) for (; buf != ((void*)0); jambuf_to_logger(buf , &failsafe_logger, DEBUG_STREAM), buf = ((void*)0)) { |
258 | jam_string(buf, "NSS RSA verify: decrypted sig: "); |
259 | jam_nss_secitem(buf, &decrypted_signature); |
260 | } |
261 | |
262 | /* hash at end? See above for length check */ |
263 | passert(decrypted_signature.len >= expected_hash->len)({ _Bool assertion__ = decrypted_signature.len >= expected_hash ->len; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c" , .line = 263, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert(logger_, here, "%s", "decrypted_signature.len >= expected_hash->len" ); } (void) 1; }); |
264 | uint8_t *start = (decrypted_signature.data |
265 | + decrypted_signature.len |
266 | - expected_hash->len); |
267 | if (!memeq(start, expected_hash->ptr, expected_hash->len)(memcmp((start), (expected_hash->ptr), (expected_hash-> len)) == 0)) { |
268 | dbg("RSA Signature NOT verified"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("RSA Signature NOT verified"); } }; |
269 | SECKEY_DestroyPublicKey(publicKey); |
270 | *fatal_diag = NULL((void*)0); |
271 | return false0; |
272 | } |
273 | |
274 | SECKEY_DestroyPublicKey(publicKey); |
275 | *fatal_diag = NULL((void*)0); |
276 | return true1; |
277 | } |
278 | |
279 | /* |
280 | * Digital signature scheme with RSA-PSS |
281 | */ |
282 | const CK_RSA_PKCS_PSS_PARAMS *mech = hash_algo->nss.rsa_pkcs_pss_params; |
283 | if (!pexpect(mech != NULL)({ _Bool assertion__ = mech != ((void*)0); if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 283, }; & here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "mech != ((void*)0)"); } assertion__; })) { |
284 | dbg("NSS RSA verify: hash algorithm not supported"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("NSS RSA verify: hash algorithm not supported" ); } }; |
285 | SECKEY_DestroyPublicKey(publicKey); |
286 | /* internal error? */ |
287 | *fatal_diag = NULL((void*)0); |
288 | return false0; |
289 | } |
290 | |
291 | const SECItem hash_mech_item = { |
292 | .type = siBuffer, |
293 | .data = (void*)mech, /* strip const */ |
294 | .len = sizeof(*mech), |
295 | }; |
296 | |
297 | struct crypt_mac hash_data = *expected_hash; /* cast away const */ |
298 | const SECItem expected_hash_item = { |
299 | .len = hash_data.len, |
300 | .data = hash_data.ptr, |
301 | .type = siBuffer, |
302 | }; |
303 | |
304 | if (PK11_VerifyWithMechanism(publicKey, CKM_RSA_PKCS_PSS0x0000000DUL, |
305 | &hash_mech_item, &encrypted_signature, |
306 | &expected_hash_item, |
307 | lsw_nss_get_password_context(logger)({ struct logger *l_ = logger; l_; })) != SECSuccess) { |
308 | dbg("NSS RSA verify: decrypting signature is failed"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("NSS RSA verify: decrypting signature is failed" ); } }; |
309 | SECKEY_DestroyPublicKey(publicKey); |
310 | *fatal_diag = NULL((void*)0); |
311 | return false0; |
312 | } |
313 | |
314 | SECKEY_DestroyPublicKey(publicKey); |
315 | *fatal_diag = NULL((void*)0); |
316 | return true1; |
317 | } |
318 | |
319 | /* |
320 | * Check signature against all RSA public keys we can find. If we |
321 | * need keys from DNS KEY records, and they haven't been fetched, |
322 | * return STF_SUSPEND to ask for asynch DNS lookup. |
323 | * |
324 | * Note: parameter keys_from_dns contains results of DNS lookup for |
325 | * key or is NULL indicating lookup not yet tried. |
326 | * |
327 | * take_a_crack is a helper function. Mostly forensic. If only we |
328 | * had coroutines. (XXX: generators). |
329 | */ |
330 | |
331 | struct tac_state { |
332 | const struct pubkey_type *type; |
333 | const struct crypt_mac *hash; |
334 | shunk_t signature; |
335 | const struct hash_desc *hash_algo; |
336 | authsig_using_pubkey_fn *try_pubkey; |
337 | realtime_t now; |
338 | struct logger *logger; |
339 | const struct end *remote; |
340 | const char *cert_origin; |
341 | |
342 | /* |
343 | * Both accumulated across calls and used to return the final |
344 | * result. |
345 | * |
346 | * See below. |
347 | */ |
348 | |
349 | int tried_cnt; /* number of keys tried */ |
350 | char tried[50]; /* keyids of tried public keys */ |
351 | struct jambuf tried_jambuf; /* jambuf for same */ |
352 | struct pubkey *key; /* last key tried, if any */ |
353 | diag_t fatal_diag; /* fatal error from KEY, if any */ |
354 | }; |
355 | |
356 | /* |
357 | * Try all keys from PUBKEY_DB. |
358 | * |
359 | * Return true when searching should stop (not when it succeeded); |
360 | * return false when searching can continue. |
361 | * |
362 | * Returns FATAL_DIAG KEY tried_cnt |
363 | * false NULL NULL 0 no key, try again |
364 | * false NULL NULL >0 no key worked, try again |
365 | * true <valid> <valid> N/A fatal error caused by KEY |
366 | * true NULL <valid> N/A KEY worked |
367 | */ |
368 | |
369 | static bool_Bool try_all_keys(const char *cert_origin, |
370 | struct pubkey_list *pubkey_db, |
371 | struct tac_state *s) |
372 | { |
373 | id_buf thatid; |
374 | dbg("trying all '%s's for %s key that matches ID: %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("trying all '%s's for %s key that matches ID: %s" , cert_origin, s->type->name, str_id_bytes(&s->remote ->id, jam_raw_bytes, &thatid)); } } |
375 | cert_origin, s->type->name, str_id(&s->remote->id, &thatid)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("trying all '%s's for %s key that matches ID: %s" , cert_origin, s->type->name, str_id_bytes(&s->remote ->id, jam_raw_bytes, &thatid)); } }; |
376 | s->cert_origin = cert_origin; |
377 | |
378 | bool_Bool described = false0; |
379 | for (struct pubkey_list *p = pubkey_db; p != NULL((void*)0); p = p->next) { |
380 | struct pubkey *key = p->key; |
381 | |
382 | if (key->type != s->type) { |
383 | id_buf printkid; |
384 | dbg(" skipping '%s' with type %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with type %s", str_id_bytes(& key->id, jam_raw_bytes, &printkid), key->type->name ); } } |
385 | str_id(&key->id, &printkid), key->type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with type %s", str_id_bytes(& key->id, jam_raw_bytes, &printkid), key->type->name ); } }; |
386 | continue; |
387 | } |
388 | |
389 | int wildcards; /* value ignored */ |
390 | if (!match_id(&key->id, &s->remote->id, &wildcards)) { |
391 | id_buf printkid; |
392 | dbg(" skipping '%s' with wrong ID",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with wrong ID", str_id_bytes( &key->id, jam_raw_bytes, &printkid)); } } |
393 | str_id(&key->id, &printkid)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with wrong ID", str_id_bytes( &key->id, jam_raw_bytes, &printkid)); } }; |
394 | continue; |
395 | } |
396 | |
397 | int pl; /* value ignored */ |
398 | if (!trusted_ca_nss(key->issuer, s->remote->ca, &pl)) { |
399 | id_buf printkid; |
400 | dn_buf buf; |
401 | dbg(" skipping '%s' with untrusted CA '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with untrusted CA '%s'", str_id_bytes (&key->id, jam_raw_bytes, &printkid), str_dn_or_null (key->issuer, "%any", &buf)); } } |
402 | str_id(&key->id, &printkid),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with untrusted CA '%s'", str_id_bytes (&key->id, jam_raw_bytes, &printkid), str_dn_or_null (key->issuer, "%any", &buf)); } } |
403 | str_dn_or_null(key->issuer, "%any", &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' with untrusted CA '%s'", str_id_bytes (&key->id, jam_raw_bytes, &printkid), str_dn_or_null (key->issuer, "%any", &buf)); } }; |
404 | continue; |
405 | } |
406 | |
407 | /* |
408 | * XXX: even though loop above filtered out these |
409 | * certs, keep this check, at some point the above |
410 | * loop will be deleted. |
411 | */ |
412 | if (!is_realtime_epoch(key->until_time) && |
413 | realtime_cmp(key->until_time, <, s->now)(realtime_sub_sign(key->until_time, s->now) < 0)) { |
414 | id_buf printkid; |
415 | realtime_buf buf; |
416 | dbg(" skipping '%s' which expired on %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' which expired on %s", str_id_bytes (&key->id, jam_raw_bytes, &printkid), str_realtime (key->until_time, 0, &buf)); } } |
417 | str_id(&key->id, &printkid),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' which expired on %s", str_id_bytes (&key->id, jam_raw_bytes, &printkid), str_realtime (key->until_time, 0, &buf)); } } |
418 | str_realtime(key->until_time, /*utc?*/false, &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" skipping '%s' which expired on %s", str_id_bytes (&key->id, jam_raw_bytes, &printkid), str_realtime (key->until_time, 0, &buf)); } }; |
419 | continue; |
420 | } |
421 | |
422 | id_buf printkid; |
423 | dn_buf buf; |
424 | const char *keyid_str = str_keyid(*pubkey_keyid(key))(*pubkey_keyid(key)).keyid; |
425 | dbg(" trying '%s' aka *%s issued by CA '%s'",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" trying '%s' aka *%s issued by CA '%s'", str_id_bytes (&key->id, jam_raw_bytes, &printkid), keyid_str, str_dn_or_null (key->issuer, "%any", &buf)); } } |
426 | str_id(&key->id, &printkid), keyid_str,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" trying '%s' aka *%s issued by CA '%s'", str_id_bytes (&key->id, jam_raw_bytes, &printkid), keyid_str, str_dn_or_null (key->issuer, "%any", &buf)); } } |
427 | str_dn_or_null(key->issuer, "%any", &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" trying '%s' aka *%s issued by CA '%s'", str_id_bytes (&key->id, jam_raw_bytes, &printkid), keyid_str, str_dn_or_null (key->issuer, "%any", &buf)); } }; |
428 | s->tried_cnt++; |
429 | |
430 | if (!described) { |
431 | jam(&s->tried_jambuf, " %s:", cert_origin); |
432 | described = true1; |
433 | } |
434 | jam(&s->tried_jambuf, " *%s", keyid_str); |
435 | |
436 | logtime_t try_time = logtime_start(s->logger); |
437 | bool_Bool passed = (s->try_pubkey)(s->hash, s->signature, |
438 | key, s->hash_algo, |
439 | &s->fatal_diag, s->logger); |
440 | logtime_stop(&try_time, "%s() trying a pubkey", __func__); |
441 | |
442 | if (s->fatal_diag != NULL((void*)0)) { |
443 | /* already logged */ |
444 | dbg(" '%s' fatal", keyid_str){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" '%s' fatal", keyid_str); } }; |
445 | jam(&s->tried_jambuf, "(fatal)"); |
446 | s->key = key; /* also return failing key */ |
447 | return true1; /* stop searching; enough is enough */ |
448 | } |
449 | |
450 | if (passed) { |
451 | dbg(" '%s' passed", keyid_str){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" '%s' passed", keyid_str); } }; |
452 | s->key = key; |
453 | return true1; /* stop searching */ |
454 | } |
455 | |
456 | /* should have been logged */ |
457 | dbg(" '%s' failed", keyid_str){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log(" '%s' failed", keyid_str); } }; |
458 | pexpect(s->key == NULL)({ _Bool assertion__ = s->key == ((void*)0); if (!assertion__ ) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 458, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "s->key == ((void*)0)" ); } assertion__; }); |
459 | } |
460 | |
461 | return false0; /* keep searching */ |
462 | } |
463 | |
464 | diag_t authsig_and_log_using_pubkey(struct ike_sa *ike, |
465 | const struct crypt_mac *hash, |
466 | shunk_t signature, |
467 | const struct hash_desc *hash_algo, |
468 | const struct pubkey_type *type, |
469 | authsig_using_pubkey_fn *try_pubkey) |
470 | { |
471 | const struct connection *c = ike->sa.st_connection; |
472 | struct tac_state s = { |
473 | /* in */ |
474 | .type = type, |
475 | .logger = ike->sa.st_logger, |
476 | .hash = hash, |
477 | .now = realnow(), |
478 | .signature = signature, |
479 | .hash_algo = hash_algo, |
480 | .remote = &c->spd.that, |
481 | .try_pubkey = try_pubkey, |
482 | /* out */ |
483 | .tried_cnt = 0, |
484 | .key = NULL((void*)0), |
485 | .fatal_diag = NULL((void*)0), |
486 | }; |
487 | s.tried_jambuf = ARRAY_AS_JAMBUF(s.tried)array_as_jambuf((s.tried), sizeof(s.tried)); |
488 | |
489 | /* try all appropriate Public keys */ |
490 | |
491 | dn_buf buf; |
492 | dbg("required %s CA is '%s'", type->name,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("required %s CA is '%s'", type->name, str_dn_or_null (c->spd.that.ca, "%any", &buf)); } } |
493 | str_dn_or_null(c->spd.that.ca, "%any", &buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("required %s CA is '%s'", type->name, str_dn_or_null (c->spd.that.ca, "%any", &buf)); } }; |
494 | |
495 | passert(ike->sa.st_remote_certs.processed)({ _Bool assertion__ = ike->sa.st_remote_certs.processed; if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", . line = 495, }; &here; }); const struct logger *logger_ = & failsafe_logger; llog_passert(logger_, here, "%s", "ike->sa.st_remote_certs.processed" ); } (void) 1; }); |
496 | |
497 | /* |
498 | * Prune the expired public keys from the pre-loaded public |
499 | * key list. But why here, and why not as a separate job? |
500 | * And why blame the IKE SA as it isn't really its fault? |
501 | */ |
502 | for (struct pubkey_list **pp = &pluto_pubkeys; *pp != NULL((void*)0); ) { |
503 | struct pubkey *key = (*pp)->key; |
504 | if (!is_realtime_epoch(key->until_time) && |
505 | realtime_cmp(key->until_time, <, s.now)(realtime_sub_sign(key->until_time, s.now) < 0)) { |
506 | id_buf printkid; |
507 | log_state(RC_LOG_SERIOUS, &ike->sa, |
508 | "cached %s public key '%s' has expired and has been deleted", |
509 | key->type->name, str_id(&key->id, &printkid)str_id_bytes(&key->id, jam_raw_bytes, &printkid)); |
510 | *pp = free_public_keyentry(*(pp)); |
511 | continue; /* continue with next public key */ |
512 | } |
513 | pp = &(*pp)->next; |
514 | } |
515 | |
516 | bool_Bool stop = try_all_keys("peer", ike->sa.st_remote_certs.pubkey_db, &s); |
517 | if (!stop) { |
518 | stop = try_all_keys("preloaded", pluto_pubkeys, &s); |
Value stored to 'stop' is never read | |
519 | } |
520 | |
521 | if (s.fatal_diag != NULL((void*)0)) { |
522 | passert(s.key != NULL)({ _Bool assertion__ = s.key != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 522, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "s.key != ((void*)0)"); } (void) 1; }); |
523 | id_buf idb; |
524 | return diag_diag(&s.fatal_diag, "authentication aborted: problem with '%s': ", |
525 | str_id(&s.key->id, &idb)str_id_bytes(&s.key->id, jam_raw_bytes, &idb)); |
526 | } |
527 | |
528 | if (s.key == NULL((void*)0)) { |
529 | if (s.tried_cnt == 0) { |
530 | id_buf idb; |
531 | return diag("authentication failed: no certificate matched %s with %s and '%s'", |
532 | type->name, hash_algo->common.fqn, |
533 | str_id(&c->spd.that.id, &idb)str_id_bytes(&c->spd.that.id, jam_raw_bytes, &idb)); |
534 | } else { |
535 | id_buf idb; |
536 | return diag("authentication failed: using %s with %s for '%s' tried%s", |
537 | type->name, hash_algo->common.fqn, |
538 | str_id(&c->spd.that.id, &idb)str_id_bytes(&c->spd.that.id, jam_raw_bytes, &idb), |
539 | s.tried); |
540 | } |
541 | } |
542 | |
543 | pexpect(s.key != NULL)({ _Bool assertion__ = s.key != ((void*)0); if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 543, }; &here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "s.key != ((void*)0)"); } assertion__; }); |
544 | pexpect(s.tried_cnt > 0)({ _Bool assertion__ = s.tried_cnt > 0; if (!assertion__) { where_t here_ = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 544, }; & here; }); const struct logger *logger_ = &failsafe_logger ; llog_pexpect(logger_, here_, "%s", "s.tried_cnt > 0"); } assertion__; }); |
545 | LLOG_JAMBUF(RC_LOG_SERIOUS, ike->sa.st_logger, buf)for (char lswbuf[((size_t)1024)], *lswbuf_ = lswbuf; lswbuf_ != ((void*)0); lswbuf_ = ((void*)0)) for (struct jambuf jambuf = array_as_jambuf((lswbuf), sizeof(lswbuf)), *buf = &jambuf ; buf != ((void*)0); buf = ((void*)0)) for (({ if (((RC_LOG_SERIOUS ) & NO_PREFIX) == ((lset_t)0) && (((RC_LOG_SERIOUS ) & STREAM_MASK) != DEBUG_STREAM || (cur_debugging & ( ((lset_t)1 << (DBG_ADD_PREFIX_IX)))))) { (ike->sa.st_logger )->object_vec->jam_object_prefix(buf, (ike->sa.st_logger )->object); } }); buf != ((void*)0); jambuf_to_logger(buf, (ike->sa.st_logger), RC_LOG_SERIOUS), buf = ((void*)0)) { |
546 | if (ike->sa.st_ike_versionst_connection->ike_version == IKEv2) { |
547 | jam(buf, "established IKE SA; "); |
548 | } |
549 | jam(buf, "authenticated using %s with %s and %s certificate ", |
550 | type->name, hash_algo->common.fqn, |
551 | s.cert_origin); |
552 | jam(buf, "'"); |
553 | jam_id_bytes(buf, &s.key->id, jam_sanitized_bytes); |
554 | jam(buf, "'"); |
555 | /* this is so that the cert verified line can be deleted */ |
556 | if (s.key->issuer.ptr != NULL((void*)0)) { |
557 | jam(buf, " issued by CA '"); |
558 | jam_dn(buf, s.key->issuer, jam_sanitized_bytes); |
559 | jam(buf, "'"); |
560 | } |
561 | } |
562 | pubkey_delref(&ike->sa.st_peer_pubkey, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 562, }; &here; })); |
563 | ike->sa.st_peer_pubkey = pubkey_addref(s.key, HERE({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 563, }; &here; })); |
564 | return NULL((void*)0); |
565 | } |
566 | |
567 | /* |
568 | * Find the struct secret associated with the combination of me and |
569 | * the peer. We match the Id (if none, the IP address). Failure is |
570 | * indicated by a NULL. |
571 | */ |
572 | |
573 | static struct secret *lsw_get_secret(const struct connection *c, |
574 | enum PrivateKeyKind kind, |
575 | bool_Bool asym) |
576 | { |
577 | /* under certain conditions, override that_id to %ANYADDR */ |
578 | |
579 | struct id rw_id; |
580 | const struct id *const this_id = &c->spd.this.id; |
581 | const struct id *that_id = &c->spd.that.id; /* can change */ |
582 | |
583 | if ( |
584 | /* case 1: */ |
585 | ( remote_id_was_instantiated(c)( (c)->kind == CK_INSTANCE && ( !((&(c)->spd .that.id)->kind == ID_IPV4_ADDR || (&(c)->spd.that. id)->kind == ID_IPV6_ADDR) || sameaddr(&(c)->spd.that .id.ip_addr, &(c)->spd.that.host_addr) ) ) && |
586 | !(c->policy & POLICY_AGGRESSIVE((lset_t)1 << (POLICY_AGGRESSIVE_IX))) && |
587 | (address_is_unset(&c->spd.that.host_addr) || |
588 | address_is_any(c->spd.that.host_addr)) ) || |
589 | |
590 | /* case 2 */ |
591 | ( (c->policy & POLICY_PSK((lset_t)1 << (POLICY_PSK_IX))) && |
592 | kind == PKK_PSK && |
593 | ( ( c->kind == CK_TEMPLATE && |
594 | c->spd.that.id.kind == ID_NONE ) || |
595 | ( c->kind == CK_INSTANCE && |
596 | id_is_ipaddr(&c->spd.that.id)((&c->spd.that.id)->kind == ID_IPV4_ADDR || (&c ->spd.that.id)->kind == ID_IPV6_ADDR) && |
597 | /* Check if we are a road warrior instantiation, not a vnet: instantiation */ |
598 | (address_is_unset(&c->spd.that.host_addr) || |
599 | address_is_any(c->spd.that.host_addr)) ) ) ) |
600 | ) { |
601 | /* roadwarrior: replace that with %ANYADDR */ |
602 | rw_id.kind = address_type(&c->spd.that.host_addr)->id_ip_addr; |
603 | rw_id.ip_addr = address_type(&c->spd.that.host_addr)->address.any; |
604 | id_buf old_buf, new_buf; |
605 | dbg("%s() switching remote roadwarrier ID from %s to %s (%%ANYADDR)",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() switching remote roadwarrier ID from %s to %s (%%ANYADDR)" , __func__, str_id_bytes(that_id, jam_raw_bytes, &old_buf ), str_id_bytes(&rw_id, jam_raw_bytes, &new_buf)); } } |
606 | __func__, str_id(that_id, &old_buf), str_id(&rw_id, &new_buf)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() switching remote roadwarrier ID from %s to %s (%%ANYADDR)" , __func__, str_id_bytes(that_id, jam_raw_bytes, &old_buf ), str_id_bytes(&rw_id, jam_raw_bytes, &new_buf)); } }; |
607 | that_id = &rw_id; |
608 | |
609 | } |
610 | |
611 | id_buf this_buf, that_buf; |
612 | dbg("%s() using IDs for %s->%s of kind %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using IDs for %s->%s of kind %s", __func__ , str_id_bytes(this_id, jam_raw_bytes, &this_buf), str_id_bytes (that_id, jam_raw_bytes, &that_buf), enum_name(&pkk_names , kind)); } } |
613 | __func__,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using IDs for %s->%s of kind %s", __func__ , str_id_bytes(this_id, jam_raw_bytes, &this_buf), str_id_bytes (that_id, jam_raw_bytes, &that_buf), enum_name(&pkk_names , kind)); } } |
614 | str_id(this_id, &this_buf),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using IDs for %s->%s of kind %s", __func__ , str_id_bytes(this_id, jam_raw_bytes, &this_buf), str_id_bytes (that_id, jam_raw_bytes, &that_buf), enum_name(&pkk_names , kind)); } } |
615 | str_id(that_id, &that_buf),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using IDs for %s->%s of kind %s", __func__ , str_id_bytes(this_id, jam_raw_bytes, &this_buf), str_id_bytes (that_id, jam_raw_bytes, &that_buf), enum_name(&pkk_names , kind)); } } |
616 | enum_name(&pkk_names, kind)){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using IDs for %s->%s of kind %s", __func__ , str_id_bytes(this_id, jam_raw_bytes, &this_buf), str_id_bytes (that_id, jam_raw_bytes, &that_buf), enum_name(&pkk_names , kind)); } }; |
617 | |
618 | return lsw_find_secret_by_id(pluto_secrets, kind, |
619 | this_id, that_id, asym); |
620 | } |
621 | |
622 | /* |
623 | * find the struct secret associated with an XAUTH username. |
624 | */ |
625 | struct secret *lsw_get_xauthsecret(char *xauthname) |
626 | { |
627 | struct secret *best = NULL((void*)0); |
628 | |
629 | dbg("started looking for xauth secret for %s", xauthname){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("started looking for xauth secret for %s", xauthname ); } }; |
630 | |
631 | struct id xa_id = { |
632 | .kind = ID_FQDN, |
633 | .name = { |
634 | .ptr = (unsigned char *)xauthname, |
635 | .len = strlen(xauthname) |
636 | } |
637 | }; |
638 | |
639 | best = lsw_find_secret_by_id(pluto_secrets, |
640 | PKK_XAUTH, |
641 | &xa_id, NULL((void*)0), true1); |
642 | |
643 | return best; |
644 | } |
645 | |
646 | /* |
647 | * find the appropriate preshared key (see get_secret). |
648 | * Failure is indicated by a NULL pointer. |
649 | * Note: the result is not to be freed by the caller. |
650 | * Note2: this seems to be called for connections using RSA too? |
651 | */ |
652 | |
653 | const chunk_t *get_connection_psk(const struct connection *c) |
654 | { |
655 | /* caller handles null_auth */ |
656 | passert((c->policy & POLICY_AUTH_NULL) == LEMPTY)({ _Bool assertion__ = (c->policy & ((lset_t)1 << (POLICY_AUTH_NULL_IX))) == ((lset_t)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__ , .file = "programs/pluto/keys.c", .line = 656, }; &here; }); const struct logger *logger_ = &failsafe_logger; llog_passert (logger_, here, "%s", "(c->policy & ((lset_t)1 << (POLICY_AUTH_NULL_IX))) == ((lset_t)0)" ); } (void) 1; }); |
657 | |
658 | struct secret *s = lsw_get_secret(c, PKK_PSK, false0); |
659 | if (s == NULL((void*)0)) { |
660 | dbg("no PreShared Key Found"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("no PreShared Key Found"); } }; |
661 | return NULL((void*)0); |
662 | } |
663 | |
664 | const chunk_t *psk = &lsw_get_pks(s)->u.preshared_secret; |
665 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { |
666 | DBG_dump_hunk("PreShared Key", *psk){ typeof(*psk) hunk_ = *psk; DBG_dump("PreShared Key", hunk_. ptr, hunk_.len); }; |
667 | } |
668 | return psk; |
669 | } |
670 | |
671 | |
672 | /* Return ppk and store ppk_id in *ppk_id */ |
673 | |
674 | chunk_t *get_connection_ppk(const struct connection *c, chunk_t **ppk_id) |
675 | { |
676 | struct secret *s = lsw_get_secret(c, PKK_PPK, false0); |
677 | |
678 | if (s == NULL((void*)0)) { |
679 | *ppk_id = NULL((void*)0); |
680 | return NULL((void*)0); |
681 | } |
682 | |
683 | struct private_key_stuff *pks = lsw_get_pks(s); |
684 | *ppk_id = &pks->ppk_id; |
685 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { |
686 | DBG_log("Found PPK"); |
687 | DBG_dump_hunk("PPK_ID:", **ppk_id){ typeof(**ppk_id) hunk_ = **ppk_id; DBG_dump("PPK_ID:", hunk_ .ptr, hunk_.len); }; |
688 | DBG_dump_hunk("PPK:", pks->ppk){ typeof(pks->ppk) hunk_ = pks->ppk; DBG_dump("PPK:", hunk_ .ptr, hunk_.len); }; |
689 | } |
690 | return &pks->ppk; |
691 | } |
692 | |
693 | /* |
694 | * Find PPK, by its id (PPK_ID). |
695 | * Used by responder. |
696 | */ |
697 | const chunk_t *get_ppk_by_id(const chunk_t *ppk_id) |
698 | { |
699 | struct secret *s = lsw_get_ppk_by_id(pluto_secrets, *ppk_id); |
700 | |
701 | if (s != NULL((void*)0)) { |
702 | const struct private_key_stuff *pks = lsw_get_pks(s); |
703 | if (DBGP(DBG_CRYPT)(cur_debugging & (((lset_t)1 << (DBG_CRYPT_IX))))) { |
704 | DBG_dump_hunk("Found PPK:", pks->ppk){ typeof(pks->ppk) hunk_ = pks->ppk; DBG_dump("Found PPK:" , hunk_.ptr, hunk_.len); }; |
705 | DBG_dump_hunk("with PPK_ID:", *ppk_id){ typeof(*ppk_id) hunk_ = *ppk_id; DBG_dump("with PPK_ID:", hunk_ .ptr, hunk_.len); }; |
706 | } |
707 | return &pks->ppk; |
708 | } |
709 | dbg("No PPK found with given PPK_ID"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("No PPK found with given PPK_ID"); } }; |
710 | return NULL((void*)0); |
711 | } |
712 | |
713 | /* |
714 | * Find the appropriate private key (see get_secret). Failure is |
715 | * indicated by a NULL pointer. |
716 | */ |
717 | |
718 | const struct private_key_stuff *get_connection_private_key(const struct connection *c, |
719 | const struct pubkey_type *type, |
720 | struct logger *logger) |
721 | { |
722 | /* is there a certificate assigned to this connection? */ |
723 | if (c->spd.this.cert.nss_cert != NULL((void*)0)) { |
724 | const char *nickname = cert_nickname(&c->spd.this.cert); |
725 | |
726 | id_buf this_buf, that_buf; |
727 | dbg("%s() using certificate %s to find private key for %s->%s of kind %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using certificate %s to find private key for %s->%s of kind %s" , __func__, nickname, str_id_bytes(&c->spd.this.id, jam_raw_bytes , &this_buf), str_id_bytes(&c->spd.that.id, jam_raw_bytes , &that_buf), type->name); } } |
728 | __func__, nickname,{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using certificate %s to find private key for %s->%s of kind %s" , __func__, nickname, str_id_bytes(&c->spd.this.id, jam_raw_bytes , &this_buf), str_id_bytes(&c->spd.that.id, jam_raw_bytes , &that_buf), type->name); } } |
729 | str_id(&c->spd.this.id, &this_buf),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using certificate %s to find private key for %s->%s of kind %s" , __func__, nickname, str_id_bytes(&c->spd.this.id, jam_raw_bytes , &this_buf), str_id_bytes(&c->spd.that.id, jam_raw_bytes , &that_buf), type->name); } } |
730 | str_id(&c->spd.that.id, &that_buf),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using certificate %s to find private key for %s->%s of kind %s" , __func__, nickname, str_id_bytes(&c->spd.this.id, jam_raw_bytes , &this_buf), str_id_bytes(&c->spd.that.id, jam_raw_bytes , &that_buf), type->name); } } |
731 | type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using certificate %s to find private key for %s->%s of kind %s" , __func__, nickname, str_id_bytes(&c->spd.this.id, jam_raw_bytes , &this_buf), str_id_bytes(&c->spd.that.id, jam_raw_bytes , &that_buf), type->name); } }; |
732 | |
733 | const struct private_key_stuff *pks = NULL((void*)0); |
734 | bool_Bool load_needed; |
735 | err_t err = find_or_load_private_key_by_cert(&pluto_secrets, &c->spd.this.cert, |
736 | &pks, &load_needed, logger); |
737 | if (err != NULL((void*)0)) { |
738 | dbg("private key for certificate %s not found in NSS DB",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("private key for certificate %s not found in NSS DB" , nickname); } } |
739 | nickname){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("private key for certificate %s not found in NSS DB" , nickname); } }; |
740 | return NULL((void*)0); |
741 | } else if (load_needed) { |
742 | /* |
743 | * XXX: the private key that was pre-loaded |
744 | * during "whack add" may have been deleted |
745 | * because all secrets were thrown away. |
746 | * |
747 | * The real problem is that the connection |
748 | * lacks a counted reference to the private |
749 | * key. |
750 | */ |
751 | llog(RC_LOG|LOG_STREAM/*not-whack-grrr*/, logger, |
752 | "reloaded private key matching %s certificate '%s'", |
753 | c->spd.this.config->leftright, nickname); |
754 | } |
755 | |
756 | /* |
757 | * If we don't find the right keytype (RSA, ECDSA, |
758 | * etc) then best will end up as NULL |
759 | */ |
760 | dbg("connection %s's %s private key found in NSS DB using cert",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("connection %s's %s private key found in NSS DB using cert" , c->name, type->name); } } |
761 | c->name, type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("connection %s's %s private key found in NSS DB using cert" , c->name, type->name); } }; |
762 | return pks; |
763 | } |
764 | |
765 | /* is there a CKAID assigned to this connection? */ |
766 | if (c->spd.this.ckaid != NULL((void*)0)) { |
767 | ckaid_buf ckb; |
768 | id_buf this_buf, that_buf; |
769 | dbg("%s() using CKAID %s to find private key for %s->%s of kind %s",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using CKAID %s to find private key for %s->%s of kind %s" , __func__, str_ckaid(c->spd.this.ckaid, &ckb), str_id_bytes (&c->spd.this.id, jam_raw_bytes, &this_buf), str_id_bytes (&c->spd.that.id, jam_raw_bytes, &that_buf), type-> name); } } |
770 | __func__, str_ckaid(c->spd.this.ckaid, &ckb),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using CKAID %s to find private key for %s->%s of kind %s" , __func__, str_ckaid(c->spd.this.ckaid, &ckb), str_id_bytes (&c->spd.this.id, jam_raw_bytes, &this_buf), str_id_bytes (&c->spd.that.id, jam_raw_bytes, &that_buf), type-> name); } } |
771 | str_id(&c->spd.this.id, &this_buf),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using CKAID %s to find private key for %s->%s of kind %s" , __func__, str_ckaid(c->spd.this.ckaid, &ckb), str_id_bytes (&c->spd.this.id, jam_raw_bytes, &this_buf), str_id_bytes (&c->spd.that.id, jam_raw_bytes, &that_buf), type-> name); } } |
772 | str_id(&c->spd.that.id, &that_buf),{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using CKAID %s to find private key for %s->%s of kind %s" , __func__, str_ckaid(c->spd.this.ckaid, &ckb), str_id_bytes (&c->spd.this.id, jam_raw_bytes, &this_buf), str_id_bytes (&c->spd.that.id, jam_raw_bytes, &that_buf), type-> name); } } |
773 | type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("%s() using CKAID %s to find private key for %s->%s of kind %s" , __func__, str_ckaid(c->spd.this.ckaid, &ckb), str_id_bytes (&c->spd.this.id, jam_raw_bytes, &this_buf), str_id_bytes (&c->spd.that.id, jam_raw_bytes, &that_buf), type-> name); } }; |
774 | |
775 | const struct private_key_stuff *pks; |
776 | bool_Bool load_needed; |
777 | err_t err = find_or_load_private_key_by_ckaid(&pluto_secrets, c->spd.this.ckaid, |
778 | &pks, &load_needed, logger); |
779 | if (err != NULL((void*)0)) { |
780 | ckaid_buf ckb; |
781 | llog(RC_LOG_SERIOUS, logger, |
782 | "private key matching CKAID '%s' not found: %s", |
783 | str_ckaid(c->spd.this.ckaid, &ckb), err); |
784 | return NULL((void*)0); |
785 | } else if (load_needed) { |
786 | /* |
787 | * XXX: the private key that was pre-loaded |
788 | * during "whack add" may have been deleted |
789 | * because all secrets were thrown away. |
790 | * |
791 | * The real problem is that the connection |
792 | * lacks a counted reference to the private |
793 | * key. |
794 | */ |
795 | ckaid_buf ckb; |
796 | llog(RC_LOG|LOG_STREAM/*not-whack-grr*/, logger, |
797 | "reloaded private key matching %s CKAID %s", |
798 | c->spd.this.config->leftright, str_ckaid(c->spd.this.ckaid, &ckb)); |
799 | } |
800 | |
801 | |
802 | /* |
803 | * If we don't find the right keytype (RSA, ECDSA, |
804 | * etc) then best will end up as NULL |
805 | */ |
806 | dbg("connection %s's %s private key found in NSS DB using CKAID",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("connection %s's %s private key found in NSS DB using CKAID" , c->name, type->name); } } |
807 | c->name, type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("connection %s's %s private key found in NSS DB using CKAID" , c->name, type->name); } }; |
808 | return pks; |
809 | } |
810 | |
811 | dbg("looking for connection %s's %s private key",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("looking for connection %s's %s private key", c ->name, type->name); } } |
812 | c->name, type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("looking for connection %s's %s private key", c ->name, type->name); } }; |
813 | struct secret *s = lsw_get_secret(c, type->private_key_kind, true1); |
814 | if (s == NULL((void*)0)) { |
815 | llog(RC_LOG_SERIOUS, logger, "connection %s's %s private key not found", |
816 | c->name, type->name); |
817 | return NULL((void*)0); |
818 | } |
819 | |
820 | const struct private_key_stuff *pks = lsw_get_pks(s); |
821 | passert(pks != NULL)({ _Bool assertion__ = pks != ((void*)0); if (!assertion__) { where_t here = ({ static const struct where here = { .func = __func__, .file = "programs/pluto/keys.c", .line = 821, }; & here; }); const struct logger *logger_ = &failsafe_logger ; llog_passert(logger_, here, "%s", "pks != ((void*)0)"); } ( void) 1; }); |
822 | |
823 | dbg("connection %s's %s private key found",{ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("connection %s's %s private key found", c-> name, type->name); } } |
824 | c->name, type->name){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("connection %s's %s private key found", c-> name, type->name); } }; |
825 | return pks; |
826 | } |
827 | |
828 | /* |
829 | * public key machinery |
830 | */ |
831 | |
832 | /* root of chained public key list */ |
833 | |
834 | struct pubkey_list *pluto_pubkeys = NULL((void*)0); /* keys from ipsec.conf */ |
835 | |
836 | void free_remembered_public_keys(void) |
837 | { |
838 | free_public_keys(&pluto_pubkeys); |
839 | } |
840 | |
841 | /* |
842 | * list all public keys in the chained list |
843 | */ |
844 | |
845 | /* |
846 | * checks if the expiration date has been reached and warns during the |
847 | * warning_interval of the imminent expiry. |
848 | * |
849 | * warning interval is in days. |
850 | * |
851 | * strict == TRUE: expiry yields an error message |
852 | * strict == FALSE: expiry yields a warning message |
853 | */ |
854 | |
855 | typedef struct { |
856 | /* note: 20 is a guess at the maximum digits in an intmax_t */ |
857 | char buf[sizeof("warning (expires in %jd minutes)") + 20]; |
858 | } expiry_buf; |
859 | |
860 | static const char *check_expiry(realtime_t expiration_date, time_t warning_interval, expiry_buf *eb) |
861 | { |
862 | if (is_realtime_epoch(expiration_date)) |
863 | return "ok (expires never)"; |
864 | |
865 | time_t time_left = deltasecs(realtimediff(expiration_date, realnow())); |
866 | |
867 | if (time_left < 0) |
868 | return "fatal (expired)"; |
869 | |
870 | if (time_left > warning_interval) |
871 | return NULL((void*)0); |
872 | |
873 | const char *unit; |
874 | if (time_left > 2 * secs_per_day) { |
875 | time_left /= secs_per_day; |
876 | unit = "day"; |
877 | } else if (time_left > 2 * secs_per_hour) { |
878 | time_left /= secs_per_hour; |
879 | unit = "hour"; |
880 | } else if (time_left > 2 * secs_per_minute) { |
881 | time_left /= secs_per_minute; |
882 | unit = "minute"; |
883 | } else { |
884 | unit = "second"; |
885 | } |
886 | |
887 | snprintf(eb->buf, sizeof(eb->buf), "warning (expires in %jd %s%s)", |
888 | (intmax_t) time_left, unit, |
889 | (time_left == 1) ? "" : "s"); |
890 | return eb->buf; |
891 | } |
892 | |
893 | static void show_pubkey(struct show *s, struct pubkey *key, bool_Bool utc, const char *expiry_message) |
894 | { |
895 | bool_Bool load_needed; |
896 | err_t load_err = preload_private_key_by_ckaid(&key->ckaid, |
897 | &load_needed, |
898 | show_logger(s)); |
899 | SHOW_JAMBUF(RC_COMMENT, s, buf)for (struct jambuf *buf = show_jambuf(s); buf != ((void*)0); jambuf_to_show (buf, s, RC_COMMENT), buf = ((void*)0)) { |
900 | jam_realtime(buf, key->installed_time, utc); |
901 | jam(buf, ","); |
902 | jam(buf, " %4zd", 8 * key->size); |
903 | jam(buf, " %s", key->type->name); |
904 | jam(buf, " Key %s", str_keyid(key->keyid)(key->keyid).keyid); |
905 | jam(buf, " (%s private key),", |
906 | (load_err != NULL((void*)0) ? "no" : |
907 | load_needed ? "loaded" : "has")); |
908 | jam(buf, " until "); |
909 | jam_realtime(buf, key->until_time, utc); |
910 | jam(buf, " %s", expiry_message == NULL((void*)0) ? "ok" : expiry_message); |
911 | } |
912 | |
913 | id_buf idb; |
914 | esb_buf b; |
915 | show_comment(s, " %s '%s'", |
916 | enum_show(&ike_id_type_names, key->id.kind, &b), |
917 | str_id(&key->id, &idb)str_id_bytes(&key->id, jam_raw_bytes, &idb)); |
918 | |
919 | if (key->issuer.len > 0) { |
920 | dn_buf b; |
921 | show_comment(s, " Issuer '%s'", |
922 | str_dn(key->issuer, &b)); |
923 | } |
924 | } |
925 | |
926 | void show_pubkeys(struct show *s, bool_Bool utc, enum keys_to_show keys_to_show) |
927 | { |
928 | if (keys_to_show == SHOW_ALL_KEYS) { |
929 | show_blank(s); |
930 | show_comment(s, "List of Public Keys:"); |
931 | show_blank(s); |
932 | } |
933 | |
934 | for (struct pubkey_list *p = pluto_pubkeys; p != NULL((void*)0); p = p->next) { |
935 | struct pubkey *pubkey = p->key; |
936 | expiry_buf eb; |
937 | const char *expiry_msg = check_expiry(pubkey->until_time, PUBKEY_WARNING_INTERVAL(14 * secs_per_day), &eb); |
938 | switch (keys_to_show) { |
939 | case SHOW_ALL_KEYS: |
940 | show_pubkey(s, pubkey, utc, expiry_msg); |
941 | break; |
942 | case SHOW_EXPIRED_KEYS: |
943 | if (expiry_msg != NULL((void*)0)) { |
944 | show_pubkey(s, pubkey, utc, expiry_msg); |
945 | } |
946 | break; |
947 | } |
948 | } |
949 | } |
950 | |
951 | err_t preload_private_key_by_cert(const struct cert *cert, bool_Bool *load_needed, struct logger *logger) |
952 | { |
953 | threadtime_t start = threadtime_start(); |
954 | const struct private_key_stuff *pks; |
955 | err_t err = find_or_load_private_key_by_cert(&pluto_secrets, cert, |
956 | &pks, load_needed, logger); |
957 | threadtime_stop(&start, SOS_NOBODY0, "%s() loading private key %s", __func__, |
958 | cert->nss_cert->nickname); |
959 | return err; |
960 | } |
961 | |
962 | err_t preload_private_key_by_ckaid(const ckaid_t *ckaid, bool_Bool *load_needed, struct logger *logger) |
963 | { |
964 | threadtime_t start = threadtime_start(); |
965 | const struct private_key_stuff *pks; |
966 | err_t err = find_or_load_private_key_by_ckaid(&pluto_secrets, ckaid, |
967 | &pks, load_needed, logger); |
968 | threadtime_stop(&start, SOS_NOBODY0, "%s() loading private key using CKAID", __func__); |
969 | return err; |
970 | } |
971 | |
972 | const struct pubkey *find_pubkey_by_ckaid(const char *ckaid) |
973 | { |
974 | for (struct pubkey_list *p = pluto_pubkeys; p != NULL((void*)0); p = p->next) { |
975 | DBG_log("looking at a PUBKEY"); |
976 | struct pubkey *key = p->key; |
977 | const ckaid_t *key_ckaid = pubkey_ckaid(key); |
978 | if (ckaid_starts_with(key_ckaid, ckaid)) { |
979 | dbg("ckaid matching pubkey"){ if ((cur_debugging & (((lset_t)1 << (DBG_BASE_IX) )))) { DBG_log("ckaid matching pubkey"); } }; |
980 | return key; |
981 | } |
982 | } |
983 | return NULL((void*)0); |
984 | } |