xref: /freebsd/crypto/openssl/crypto/cmp/cmp_http.c (revision e7be843b4a162e68651d3911f0357ed464915629)
1 /*
2  * Copyright 2007-2025 The OpenSSL Project Authors. All Rights Reserved.
3  * Copyright Nokia 2007-2019
4  * Copyright Siemens AG 2015-2019
5  *
6  * Licensed under the Apache License 2.0 (the "License").  You may not use
7  * this file except in compliance with the License.  You can obtain a copy
8  * in the file LICENSE in the source distribution or at
9  * https://www.openssl.org/source/license.html
10  */
11 
12 #include <string.h>
13 #include <stdio.h>
14 
15 #include <openssl/asn1t.h>
16 #include <openssl/http.h>
17 
18 #include <openssl/cmp.h>
19 #include "cmp_local.h"
20 
21 /* explicit #includes not strictly needed since implied by the above: */
22 #include <ctype.h>
23 #include <fcntl.h>
24 #include <stdlib.h>
25 #include <openssl/bio.h>
26 #include <openssl/buffer.h>
27 #include <openssl/err.h>
28 
keep_alive(int keep_alive,int body_type,BIO ** bios)29 static int keep_alive(int keep_alive, int body_type, BIO **bios)
30 {
31     if (keep_alive != 0 && bios == NULL
32         /*
33          * Ask for persistent connection only if may need more round trips.
34          * Do so even with disableConfirm because polling might be needed.
35          */
36             && body_type != OSSL_CMP_PKIBODY_IR
37             && body_type != OSSL_CMP_PKIBODY_CR
38             && body_type != OSSL_CMP_PKIBODY_P10CR
39             && body_type != OSSL_CMP_PKIBODY_KUR
40             && body_type != OSSL_CMP_PKIBODY_POLLREQ)
41         keep_alive = 0;
42     return keep_alive;
43 }
44 
45 /*
46  * Send the PKIMessage req and on success return the response, else NULL.
47  */
OSSL_CMP_MSG_http_perform(OSSL_CMP_CTX * ctx,const OSSL_CMP_MSG * req)48 OSSL_CMP_MSG *OSSL_CMP_MSG_http_perform(OSSL_CMP_CTX *ctx,
49                                         const OSSL_CMP_MSG *req)
50 {
51     char server_port[32] = { '\0' };
52     STACK_OF(CONF_VALUE) *headers = NULL;
53     const char content_type_pkix[] = "application/pkixcmp";
54     int tls_used;
55     const ASN1_ITEM *it = ASN1_ITEM_rptr(OSSL_CMP_MSG);
56     BIO *req_mem, *rsp;
57     BIO **bios; /* optionally used as bio and rbio */
58     OSSL_CMP_MSG *res = NULL;
59 
60     if (ctx == NULL || req == NULL) {
61         ERR_raise(ERR_LIB_CMP, CMP_R_NULL_ARGUMENT);
62         return NULL;
63     }
64 
65     if (!X509V3_add_value("Pragma", "no-cache", &headers))
66         return NULL;
67     if ((req_mem = ASN1_item_i2d_mem_bio(it, (const ASN1_VALUE *)req)) == NULL)
68         goto err;
69 
70     bios = OSSL_CMP_CTX_get_transfer_cb_arg(ctx);
71     if (ctx->serverPort != 0)
72         BIO_snprintf(server_port, sizeof(server_port), "%d", ctx->serverPort);
73     tls_used = ctx->tls_used >= 0 ? ctx->tls_used != 0
74         : OSSL_CMP_CTX_get_http_cb_arg(ctx) != NULL; /* backward compat */
75     if (ctx->http_ctx == NULL) { /* using existing connection or yet not set up own connection */
76         const char *path = ctx->serverPath;
77 
78         if (path == NULL)
79             path = "";
80         if (*path == '/')
81             path++;
82         if (bios == NULL)
83             ossl_cmp_log4(DEBUG, ctx,
84                           "connecting to CMP server via http%s://%s:%s/%s",
85                           tls_used ? "s" : "", ctx->server, server_port, path);
86         else
87             ossl_cmp_log3(DEBUG, ctx,
88                           "using existing connection with CMP server %s:%s and HTTP path /%s",
89                           ctx->server, server_port, path);
90     }
91 
92     rsp = OSSL_HTTP_transfer(&ctx->http_ctx, ctx->server, server_port,
93                              ctx->serverPath, tls_used,
94                              ctx->proxy, ctx->no_proxy,
95                              bios == NULL ? NULL : bios[0] /* bio */,
96                              bios == NULL ? NULL : bios[1] /* rbio */,
97                              ctx->http_cb, OSSL_CMP_CTX_get_http_cb_arg(ctx),
98                              0 /* buf_size */, headers,
99                              content_type_pkix, req_mem,
100                              content_type_pkix, 1 /* expect_asn1 */,
101                              OSSL_HTTP_DEFAULT_MAX_RESP_LEN,
102                              ctx->msg_timeout,
103                              keep_alive(ctx->keep_alive, req->body->type, bios));
104     BIO_free(req_mem);
105     res = (OSSL_CMP_MSG *)ASN1_item_d2i_bio(it, rsp, NULL);
106     BIO_free(rsp);
107 
108     if (ctx->http_ctx == NULL)
109         ossl_cmp_debug(ctx, "disconnected from CMP server");
110     /*
111      * Note that on normal successful end of the transaction the
112      * HTTP connection is not closed at this level if keep_alive(...) != 0.
113      * It should be closed by the CMP client application
114      * using OSSL_CMP_CTX_free() or OSSL_CMP_CTX_reinit().
115      * Any pre-existing bio (== ctx->transfer_cb_arg) is not freed.
116      */
117     if (res != NULL)
118         ossl_cmp_debug(ctx, "finished reading response from CMP server");
119  err:
120     sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
121     return res;
122 }
123