From patchwork Tue Jan 23 18:06:21 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Selva Nair X-Patchwork-Id: 208 Return-Path: Delivered-To: patchwork@openvpn.net Delivered-To: patchwork@openvpn.net Received: from director1.mail.ord1d.rsapps.net ([172.30.191.6]) by backend31.mail.ord1d.rsapps.net (Dovecot) with LMTP id M8AsAZoUaFqmcwAAgoeIoA for ; Wed, 24 Jan 2018 00:07:38 -0500 Received: from proxy13.mail.ord1d.rsapps.net ([172.30.191.6]) by director1.mail.ord1d.rsapps.net (Dovecot) with LMTP id o7O1AJoUaFrXLgAANGzteQ ; Wed, 24 Jan 2018 00:07:38 -0500 Received: from smtp31.gate.ord1d ([172.30.191.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) by proxy13.mail.ord1d.rsapps.net (Dovecot) with LMTP id sDflAJoUaFroVwAAgjf6aA ; Wed, 24 Jan 2018 00:07:38 -0500 X-Spam-Threshold: 95 X-Spam-Score: 0 X-Spam-Flag: NO X-Virus-Scanned: OK X-Orig-To: openvpnslackdevel@openvpn.net X-Originating-Ip: [216.34.181.88] Authentication-Results: smtp31.gate.ord1d.rsapps.net; iprev=pass policy.iprev="216.34.181.88"; spf=pass smtp.mailfrom="openvpn-devel-bounces@lists.sourceforge.net" smtp.helo="lists.sourceforge.net"; dkim=fail (signature verification failed) header.d=sourceforge.net; dkim=fail (signature verification failed) header.d=sf.net; dkim=fail (signature verification failed) header.d=gmail.com; dmarc=fail (p=none; dis=none) header.from=gmail.com X-Classification-ID: 7ee2230e-00c4-11e8-9209-525400b3ac8c-1-1 Received: from [216.34.181.88] ([216.34.181.88:15160] helo=lists.sourceforge.net) by smtp31.gate.ord1d.rsapps.net (envelope-from ) (ecelerity 4.2.1.56364 r(Core:4.2.1.14)) with ESMTPS (cipher=DHE-RSA-AES256-GCM-SHA384) id 23/3E-13117-994186A5; Wed, 24 Jan 2018 00:07:37 -0500 Received: from localhost ([127.0.0.1] helo=sfs-ml-2.v29.ch3.sourceforge.com) by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.89) (envelope-from ) id 1eeDGf-0006wL-EP; Wed, 24 Jan 2018 05:06:37 +0000 Received: from sfi-mx-2.v28.ch3.sourceforge.com ([172.29.28.192] helo=mx.sourceforge.net) by sfs-ml-2.v29.ch3.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1eeDGf-0006wF-6I for openvpn-devel@lists.sourceforge.net; Wed, 24 Jan 2018 05:06:37 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sourceforge.net; s=x; h=References:In-Reply-To:Message-Id:Date:Subject:Cc: To:From:Sender:Reply-To:MIME-Version:Content-Type:Content-Transfer-Encoding: Content-ID:Content-Description:Resent-Date:Resent-From:Resent-Sender: Resent-To:Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=1oKdYFxOikXRIsJwVMpgVxNTw9CfHq8GgfwcTbSt60E=; b=f+QzYPw/sj3hrNmrjlufJn99Tx s0PyNQnIte7Le4BcNZXCAbeHVIY+tvueVihv+Bhw1ckbr8Ev269fghPSTN8vrnNSnrbOxG9gkPpF0 KZ32Sx5tgAMkzOGlb7XllirSV7eFsri06FQMyQh2yvsZhJVNd9LdZSHCTrXkj1MeEn8g=; DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sf.net; s=x ; h=References:In-Reply-To:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To :MIME-Version:Content-Type:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=1oKdYFxOikXRIsJwVMpgVxNTw9CfHq8GgfwcTbSt60E=; b=l1Vrr7SsnvbS2WFrNFCmx8KqPj xrcfucBJZ1ZGIKMJAYckyzNgUPreoHNpD0YLZF1GoClC469H611bzjbbpGrZ9/IeoqHCsIWAjASe+ nNqX35RE3ZcyU/cCInkZSVWsz7ZPdmdvJ7BeGc6bD3khnPQbzI/glx8nr2yjkY9hisMg=; Received: from mail-io0-f195.google.com ([209.85.223.195]) by sfi-mx-2.v28.ch3.sourceforge.com with esmtps (TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128) (Exim 4.89) id 1eeDGe-0007tn-10 for openvpn-devel@lists.sourceforge.net; Wed, 24 Jan 2018 05:06:37 +0000 Received: by mail-io0-f195.google.com with SMTP id f89so3475024ioj.4 for ; Tue, 23 Jan 2018 21:06:36 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=1oKdYFxOikXRIsJwVMpgVxNTw9CfHq8GgfwcTbSt60E=; b=ZnUC245xRFumXn2TONZiIO0AaWbJQ6iyjE7LoAuDzhLYtU1JxMwXRsgFLRZVb2MXU+ EV2+Afs3BE8IBkpcHZWPx/h5Vlr5BjkBTawXiGcn9pVysSMP+pwSDUbnF5HwDDddX5AA 7NIbjRORpV1ZYs6HBYbs/uEWdgeRgBh+puoJONCuDZtijxkQWEXeHaJs3NNXPe0QzhBS Rm1vURbsGsBmZRKgBLVVEtO8APmgwbF15eHsjeah54bvsyQGij0nzixiXMJ4xl5y0Oun PanAZw33Ho7QbZyDfQtX1UEFENC8NW+gHSkEZEnwocAf71ZhQU0HInhX/u4C/E+hIXD4 qe2g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=1oKdYFxOikXRIsJwVMpgVxNTw9CfHq8GgfwcTbSt60E=; b=Ry3EJC81HZCF8P414A+sBULHk/QEU350FQLNgyiWsbBKe25xvnVY07Qpgyl+tEC2jz bMZl/GQo4SRBkyv34Fy34QcBSOtdqWRv4whkdco4WBQGvUkpR/+b2sDZoruYAk4cXrxQ niSJalSWWvLZj9+bOJm0L/vtuNWaJT30+kf9mx0a4VUm+2TNkIoQjj6qsMwOh0k9WEJo qP0IX52fYXBiIe0PnHZlSkBQu86obZ3GSTX/aB5hFH4GsNxOhgy0jQbQfPfy5SXYPrMX H9+/qCjheutk8yvdDKcrGzizRwnrIXEucxc+9IOwzqjsdl5qAkLbIFYXRhviv7AWFWe6 Wi0Q== X-Gm-Message-State: AKwxytcKGNUw3PvIMYloJuN36J1+akanleKOBK00ItD34e2VHMGeImGD SDRbPkZ/mc76Uc4+yyuc3iFBjrOl X-Google-Smtp-Source: AH8x225ZCl2k/b1zRGkm14ULqMg0TiOlFy/HsVXpuC5UcPZh0Q6H79V2qV4jMDZrvfiAp+bc9UMqqQ== X-Received: by 10.107.184.198 with SMTP id i189mr7017884iof.137.1516770390554; Tue, 23 Jan 2018 21:06:30 -0800 (PST) Received: from saturn.home.sansel.ca (CPE40167ea0e1c2-CM788df74daaa0.cpe.net.cable.rogers.com. [99.228.215.92]) by smtp.gmail.com with ESMTPSA id 140sm289669itx.3.2018.01.23.21.06.29 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 23 Jan 2018 21:06:30 -0800 (PST) From: selva.nair@gmail.com To: openvpn-devel@lists.sourceforge.net Date: Wed, 24 Jan 2018 00:06:21 -0500 Message-Id: <1516770381-29466-4-git-send-email-selva.nair@gmail.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1516770381-29466-1-git-send-email-selva.nair@gmail.com> References: <1516770381-29466-1-git-send-email-selva.nair@gmail.com> X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/, no trust [209.85.223.195 listed in list.dnswl.org] 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (selva.nair[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1eeDGe-0007tn-10 Subject: [Openvpn-devel] [PATCH 3/3] Support EC certificates with cryptoapicert X-BeenThere: openvpn-devel@lists.sourceforge.net X-Mailman-Version: 2.1.21 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: openvpn-devel-bounces@lists.sourceforge.net X-getmail-retrieved-from-mailbox: Inbox From: Selva Nair Requires openssl 1.1.0 or higher Signed-off-by: Selva Nair --- src/openvpn/cryptoapi.c | 198 +++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 197 insertions(+), 1 deletion(-) diff --git a/src/openvpn/cryptoapi.c b/src/openvpn/cryptoapi.c index d6a9dd4..36faa63 100644 --- a/src/openvpn/cryptoapi.c +++ b/src/openvpn/cryptoapi.c @@ -101,6 +101,9 @@ static ERR_STRING_DATA CRYPTOAPI_str_functs[] = { { 0, NULL } }; +/* index for storing external data in EC_KEY: < 0 means uninitialized */ +static int ec_data_idx = -1; + typedef struct _CAPI_DATA { const CERT_CONTEXT *cert_context; HCRYPTPROV_OR_NCRYPT_KEY_HANDLE crypt_prov; @@ -395,6 +398,190 @@ finish(RSA *rsa) return 1; } +#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(OPENSSL_NO_EC) + +static EC_KEY_METHOD *ec_method = NULL; + +/** EC_KEY_METHOD callback: called when the key is freed */ +static void +ec_finish(EC_KEY *ec) +{ + EC_KEY_METHOD_free(ec_method); + ec_method = NULL; + CAPI_DATA *cd = EC_KEY_get_ex_data(ec, ec_data_idx); + CAPI_DATA_free(cd); + EC_KEY_set_ex_data(ec, ec_data_idx, NULL); +} + +/** EC_KEY_METHOD callback sign_setup(): we do nothing here */ +static int +ecdsa_sign_setup(EC_KEY *eckey, BN_CTX *ctx_in, BIGNUM **kinvp, BIGNUM **rp) +{ + return 1; +} + +/** + * Helper to convert ECDSA signature returned by NCryptSignHash + * to an ECDSA_SIG structure. + * On entry 'buf[]' of length len contains r and s contcatenated. + * Returns a newly allocated ECDSA_SIG or NULL (on error). + */ +static ECDSA_SIG * +ecdsa_bin2sig(unsigned char *buf, int len) +{ + ECDSA_SIG *ecsig = NULL; + DWORD rlen = len/2; + BIGNUM *r = BN_bin2bn(buf, rlen, NULL); + BIGNUM *s = BN_bin2bn(buf+rlen, rlen, NULL); + if (!r || !s) + { + goto err; + } + ecsig = ECDSA_SIG_new(); /* in openssl 1.1 this does not allocate r, s */ + if (!ecsig) + { + goto err; + } + ECDSA_SIG_set0(ecsig, r, s); /* ecsig takes ownership of r and s */ + return ecsig; +err: + BN_free(r); /* it is ok to free NULL BN */ + BN_free(s); + return NULL; +} + +/** EC_KEY_METHOD callback sign_sig(): sign and return an ECDSA_SIG pointer. */ +static ECDSA_SIG* +ecdsa_sign_sig(const unsigned char *dgst, int dgstlen, + const BIGNUM *in_kinv, const BIGNUM *in_r, EC_KEY *ec) +{ + ECDSA_SIG *ecsig = NULL; + CAPI_DATA *cd = (CAPI_DATA *) EC_KEY_get_ex_data(ec, ec_data_idx); + + ASSERT(cd->key_spec == CERT_NCRYPT_KEY_SPEC); + + NCRYPT_KEY_HANDLE hkey = cd->crypt_prov; + BYTE buf[512]; /* large enough buffer for signature to avoid malloc */ + DWORD len = _countof(buf); + + msg(D_LOW, "Signing hash using EC key: data size = %d", dgstlen); + + DWORD status = NCryptSignHash(hkey, NULL, (BYTE*) dgst, dgstlen, (BYTE*) buf, len, &len, 0); + if (status != ERROR_SUCCESS) + { + SetLastError(status); + CRYPTOAPIerr(CRYPTOAPI_F_NCRYPT_SIGN_HASH); + } + else + { + /* NCryptSignHash returns r, s concatenated in buf[] */ + ecsig = ecdsa_bin2sig(buf, len); + } + return ecsig; +} + +/** EC_KEY_METHOD callback sign(): sign and return a DER encoded signature */ +static int +ecdsa_sign(int type, const unsigned char *dgst, int dgstlen, unsigned char *sig, + unsigned int *siglen, const BIGNUM *kinv, const BIGNUM *r, EC_KEY *ec) +{ + ECDSA_SIG *s; + + s = ecdsa_sign_sig(dgst, dgstlen, NULL, NULL, ec); + if (s == NULL) + { + *siglen = 0; + return 0; + } + + /* convert internal signature structure 's' to DER encoded byte array in sig */ + *siglen = i2d_ECDSA_SIG((ECDSA_SIG *)s, &sig); + ECDSA_SIG_free(s); + + return 1; +} + +static int +ssl_ctx_set_eckey(SSL_CTX *ssl_ctx, CAPI_DATA *cd, EVP_PKEY *pkey) +{ + EC_KEY *ec = NULL; + EVP_PKEY *privkey = NULL; + + if (cd->key_spec != CERT_NCRYPT_KEY_SPEC) + { + msg(M_NONFATAL, "ERROR: cryptoapicert with only legacy private key handle available." + " EC certificate not supported."); + goto err; + } + /* create a method struct with default callbacks filled in */ + ec_method = EC_KEY_METHOD_new(EC_KEY_OpenSSL()); + if (!ec_method) + { + goto err; + } + + /* We only need to set finish among init methods, and sign methods */ + EC_KEY_METHOD_set_init(ec_method, NULL, ec_finish, NULL, NULL, NULL, NULL); + EC_KEY_METHOD_set_sign(ec_method, ecdsa_sign, ecdsa_sign_setup, ecdsa_sign_sig); + + ec = EC_KEY_dup(EVP_PKEY_get0_EC_KEY(pkey)); + if (!ec) + { + goto err; + } + if (!EC_KEY_set_method(ec, ec_method)) + { + goto err; + } + + /* get an index to store cd as external data */ + if (ec_data_idx < 0) + { + ec_data_idx = EC_KEY_get_ex_new_index(0, "cryptapicert ec key", NULL, NULL, NULL); + if (ec_data_idx < 0) + { + goto err; + } + } + EC_KEY_set_ex_data(ec, ec_data_idx, cd); + + /* cd assigned to ec as ex_data, increase its refcount */ + cd->ref_count++; + + privkey = EVP_PKEY_new(); + if (!EVP_PKEY_assign_EC_KEY(privkey, ec)) + { + EC_KEY_free(ec); + goto err; + } + /* from here on ec will get freed with privkey */ + + if (!SSL_CTX_use_PrivateKey(ssl_ctx, privkey)) + { + goto err; + } + EVP_PKEY_free(privkey); /* this will dn_ref or free ec as well */ + return 1; + +err: + if (privkey) + { + EVP_PKEY_free(privkey); + } + else if (ec) + { + EC_KEY_free(ec); + } + if (ec_method) /* do always set ec_method = NULL after freeing it */ + { + EC_KEY_METHOD_free(ec_method); + ec_method = NULL; + } + return 0; +} + +#endif /* OPENSSL_VERSION_NUMBER >= 1.1.0 */ + static const CERT_CONTEXT * find_certificate_in_store(const char *cert_prop, HCERTSTORE cert_store) { @@ -639,9 +826,18 @@ SSL_CTX_use_CryptoAPI_certificate(SSL_CTX *ssl_ctx, const char *cert_prop) goto err; } } +#if (OPENSSL_VERSION_NUMBER >= 0x10100000L) && !defined(OPENSSL_NO_EC) + else if (EVP_PKEY_id(pkey) == EVP_PKEY_EC) + { + if (!ssl_ctx_set_eckey(ssl_ctx, cd, pkey)) + { + goto err; + } + } +#endif /* OPENSSL_VERSION_NUMBER >= 1.1.0 */ else { - msg(M_WARN, "cryptoapicert requires an RSA certificate"); + msg(M_WARN, "WARNING: cryptoapicert: certificate type not supported"); goto err; } cd->ref_count--; /* so that cd will get freed with the private key */