1 /* 2 * Hotspot 2.0 OSU client - EST client 3 * Copyright (c) 2012-2014, Qualcomm Atheros, Inc. 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9 #include "includes.h" 10 #include <openssl/err.h> 11 #include <openssl/evp.h> 12 #include <openssl/pem.h> 13 #include <openssl/pkcs7.h> 14 #include <openssl/rsa.h> 15 #include <openssl/asn1.h> 16 #include <openssl/asn1t.h> 17 #include <openssl/x509.h> 18 #include <openssl/x509v3.h> 19 #include <openssl/opensslv.h> 20 #ifdef OPENSSL_IS_BORINGSSL 21 #include <openssl/buf.h> 22 #endif /* OPENSSL_IS_BORINGSSL */ 23 24 #include "common.h" 25 #include "utils/base64.h" 26 #include "utils/xml-utils.h" 27 #include "utils/http-utils.h" 28 #include "osu_client.h" 29 30 31 static int pkcs7_to_cert(struct hs20_osu_client *ctx, const u8 *pkcs7, 32 size_t len, char *pem_file, char *der_file) 33 { 34 #ifdef OPENSSL_IS_BORINGSSL 35 CBS pkcs7_cbs; 36 #else /* OPENSSL_IS_BORINGSSL */ 37 PKCS7 *p7 = NULL; 38 const unsigned char *p = pkcs7; 39 #endif /* OPENSSL_IS_BORINGSSL */ 40 STACK_OF(X509) *certs; 41 int i, num, ret = -1; 42 BIO *out = NULL; 43 44 #ifdef OPENSSL_IS_BORINGSSL 45 certs = sk_X509_new_null(); 46 if (!certs) 47 goto fail; 48 CBS_init(&pkcs7_cbs, pkcs7, len); 49 if (!PKCS7_get_certificates(certs, &pkcs7_cbs)) { 50 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", 51 ERR_error_string(ERR_get_error(), NULL)); 52 write_result(ctx, "Could not parse PKCS#7 object from EST"); 53 goto fail; 54 } 55 #else /* OPENSSL_IS_BORINGSSL */ 56 p7 = d2i_PKCS7(NULL, &p, len); 57 if (p7 == NULL) { 58 wpa_printf(MSG_INFO, "Could not parse PKCS#7 object: %s", 59 ERR_error_string(ERR_get_error(), NULL)); 60 write_result(ctx, "Could not parse PKCS#7 object from EST"); 61 goto fail; 62 } 63 64 switch (OBJ_obj2nid(p7->type)) { 65 case NID_pkcs7_signed: 66 certs = p7->d.sign->cert; 67 break; 68 case NID_pkcs7_signedAndEnveloped: 69 certs = p7->d.signed_and_enveloped->cert; 70 break; 71 default: 72 certs = NULL; 73 break; 74 } 75 #endif /* OPENSSL_IS_BORINGSSL */ 76 77 if (!certs || ((num = sk_X509_num(certs)) == 0)) { 78 wpa_printf(MSG_INFO, "No certificates found in PKCS#7 object"); 79 write_result(ctx, "No certificates found in PKCS#7 object"); 80 goto fail; 81 } 82 83 if (der_file) { 84 FILE *f = fopen(der_file, "wb"); 85 if (f == NULL) 86 goto fail; 87 i2d_X509_fp(f, sk_X509_value(certs, 0)); 88 fclose(f); 89 } 90 91 if (pem_file) { 92 out = BIO_new(BIO_s_file()); 93 if (out == NULL || 94 BIO_write_filename(out, pem_file) <= 0) 95 goto fail; 96 97 for (i = 0; i < num; i++) { 98 X509 *cert = sk_X509_value(certs, i); 99 X509_print(out, cert); 100 PEM_write_bio_X509(out, cert); 101 BIO_puts(out, "\n"); 102 } 103 } 104 105 ret = 0; 106 107 fail: 108 #ifdef OPENSSL_IS_BORINGSSL 109 if (certs) 110 sk_X509_pop_free(certs, X509_free); 111 #else /* OPENSSL_IS_BORINGSSL */ 112 PKCS7_free(p7); 113 #endif /* OPENSSL_IS_BORINGSSL */ 114 if (out) 115 BIO_free_all(out); 116 117 return ret; 118 } 119 120 121 int est_load_cacerts(struct hs20_osu_client *ctx, const char *url) 122 { 123 char *buf, *resp; 124 size_t buflen; 125 unsigned char *pkcs7; 126 size_t pkcs7_len, resp_len; 127 int res; 128 129 buflen = os_strlen(url) + 100; 130 buf = os_malloc(buflen); 131 if (buf == NULL) 132 return -1; 133 134 os_snprintf(buf, buflen, "%s/cacerts", url); 135 wpa_printf(MSG_INFO, "Download EST cacerts from %s", buf); 136 write_summary(ctx, "Download EST cacerts from %s", buf); 137 ctx->no_osu_cert_validation = 1; 138 http_ocsp_set(ctx->http, 1); 139 res = http_download_file(ctx->http, buf, "Cert/est-cacerts.txt", 140 ctx->ca_fname); 141 http_ocsp_set(ctx->http, 142 (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2); 143 ctx->no_osu_cert_validation = 0; 144 if (res < 0) { 145 wpa_printf(MSG_INFO, "Failed to download EST cacerts from %s", 146 buf); 147 write_result(ctx, "Failed to download EST cacerts from %s", 148 buf); 149 os_free(buf); 150 return -1; 151 } 152 os_free(buf); 153 154 resp = os_readfile("Cert/est-cacerts.txt", &resp_len); 155 if (resp == NULL) { 156 wpa_printf(MSG_INFO, "Could not read Cert/est-cacerts.txt"); 157 write_result(ctx, "Could not read EST cacerts"); 158 return -1; 159 } 160 161 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); 162 if (pkcs7 && pkcs7_len < resp_len / 2) { 163 wpa_printf(MSG_INFO, "Too short base64 decode (%u bytes; downloaded %u bytes) - assume this was binary", 164 (unsigned int) pkcs7_len, (unsigned int) resp_len); 165 os_free(pkcs7); 166 pkcs7 = NULL; 167 } 168 if (pkcs7 == NULL) { 169 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); 170 pkcs7 = os_malloc(resp_len); 171 if (pkcs7) { 172 os_memcpy(pkcs7, resp, resp_len); 173 pkcs7_len = resp_len; 174 } 175 } 176 os_free(resp); 177 178 if (pkcs7 == NULL) { 179 wpa_printf(MSG_INFO, "Could not fetch PKCS7 cacerts"); 180 write_result(ctx, "Could not fetch EST PKCS#7 cacerts"); 181 return -1; 182 } 183 184 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est-cacerts.pem", 185 NULL); 186 os_free(pkcs7); 187 if (res < 0) { 188 wpa_printf(MSG_INFO, "Could not parse CA certs from PKCS#7 cacerts response"); 189 write_result(ctx, "Could not parse CA certs from EST PKCS#7 cacerts response"); 190 return -1; 191 } 192 unlink("Cert/est-cacerts.txt"); 193 194 return 0; 195 } 196 197 198 /* 199 * CsrAttrs ::= SEQUENCE SIZE (0..MAX) OF AttrOrOID 200 * 201 * AttrOrOID ::= CHOICE { 202 * oid OBJECT IDENTIFIER, 203 * attribute Attribute } 204 * 205 * Attribute ::= SEQUENCE { 206 * type OBJECT IDENTIFIER, 207 * values SET SIZE(1..MAX) OF OBJECT IDENTIFIER } 208 */ 209 210 typedef struct { 211 ASN1_OBJECT *type; 212 STACK_OF(ASN1_OBJECT) *values; 213 } Attribute; 214 215 typedef struct { 216 int type; 217 union { 218 ASN1_OBJECT *oid; 219 Attribute *attribute; 220 } d; 221 } AttrOrOID; 222 223 #if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL) 224 DEFINE_STACK_OF(AttrOrOID) 225 #endif 226 227 typedef struct { 228 int type; 229 STACK_OF(AttrOrOID) *attrs; 230 } CsrAttrs; 231 232 ASN1_SEQUENCE(Attribute) = { 233 ASN1_SIMPLE(Attribute, type, ASN1_OBJECT), 234 ASN1_SET_OF(Attribute, values, ASN1_OBJECT) 235 } ASN1_SEQUENCE_END(Attribute); 236 237 ASN1_CHOICE(AttrOrOID) = { 238 ASN1_SIMPLE(AttrOrOID, d.oid, ASN1_OBJECT), 239 ASN1_SIMPLE(AttrOrOID, d.attribute, Attribute) 240 } ASN1_CHOICE_END(AttrOrOID); 241 242 ASN1_CHOICE(CsrAttrs) = { 243 ASN1_SEQUENCE_OF(CsrAttrs, attrs, AttrOrOID) 244 } ASN1_CHOICE_END(CsrAttrs); 245 246 IMPLEMENT_ASN1_FUNCTIONS(CsrAttrs); 247 248 249 static void add_csrattrs_oid(struct hs20_osu_client *ctx, ASN1_OBJECT *oid, 250 STACK_OF(X509_EXTENSION) *exts) 251 { 252 char txt[100]; 253 int res; 254 255 if (!oid) 256 return; 257 258 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); 259 if (res < 0 || res >= (int) sizeof(txt)) 260 return; 261 262 if (os_strcmp(txt, "1.2.840.113549.1.9.7") == 0) { 263 wpa_printf(MSG_INFO, "TODO: csrattr challengePassword"); 264 } else if (os_strcmp(txt, "1.2.840.113549.1.1.11") == 0) { 265 wpa_printf(MSG_INFO, "csrattr sha256WithRSAEncryption"); 266 } else { 267 wpa_printf(MSG_INFO, "Ignore unsupported csrattr oid %s", txt); 268 } 269 } 270 271 272 static void add_csrattrs_ext_req(struct hs20_osu_client *ctx, 273 STACK_OF(ASN1_OBJECT) *values, 274 STACK_OF(X509_EXTENSION) *exts) 275 { 276 char txt[100]; 277 int i, num, res; 278 279 num = sk_ASN1_OBJECT_num(values); 280 for (i = 0; i < num; i++) { 281 ASN1_OBJECT *oid = sk_ASN1_OBJECT_value(values, i); 282 283 res = OBJ_obj2txt(txt, sizeof(txt), oid, 1); 284 if (res < 0 || res >= (int) sizeof(txt)) 285 continue; 286 287 if (os_strcmp(txt, "1.3.6.1.1.1.1.22") == 0) { 288 wpa_printf(MSG_INFO, "TODO: extReq macAddress"); 289 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.3") == 0) { 290 wpa_printf(MSG_INFO, "TODO: extReq imei"); 291 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.4") == 0) { 292 wpa_printf(MSG_INFO, "TODO: extReq meid"); 293 } else if (os_strcmp(txt, "1.3.6.1.4.1.40808.1.1.5") == 0) { 294 wpa_printf(MSG_INFO, "TODO: extReq DevId"); 295 } else { 296 wpa_printf(MSG_INFO, "Ignore unsupported cstattr extensionsRequest %s", 297 txt); 298 } 299 } 300 } 301 302 303 static void add_csrattrs_attr(struct hs20_osu_client *ctx, Attribute *attr, 304 STACK_OF(X509_EXTENSION) *exts) 305 { 306 char txt[100], txt2[100]; 307 int i, num, res; 308 309 if (!attr || !attr->type || !attr->values) 310 return; 311 312 res = OBJ_obj2txt(txt, sizeof(txt), attr->type, 1); 313 if (res < 0 || res >= (int) sizeof(txt)) 314 return; 315 316 if (os_strcmp(txt, "1.2.840.113549.1.9.14") == 0) { 317 add_csrattrs_ext_req(ctx, attr->values, exts); 318 return; 319 } 320 321 num = sk_ASN1_OBJECT_num(attr->values); 322 for (i = 0; i < num; i++) { 323 ASN1_OBJECT *oid = sk_ASN1_OBJECT_value(attr->values, i); 324 325 res = OBJ_obj2txt(txt2, sizeof(txt2), oid, 1); 326 if (res < 0 || res >= (int) sizeof(txt2)) 327 continue; 328 329 wpa_printf(MSG_INFO, "Ignore unsupported cstattr::attr %s oid %s", 330 txt, txt2); 331 } 332 } 333 334 335 static void add_csrattrs(struct hs20_osu_client *ctx, CsrAttrs *csrattrs, 336 STACK_OF(X509_EXTENSION) *exts) 337 { 338 int i, num; 339 340 if (!csrattrs || ! csrattrs->attrs) 341 return; 342 343 #ifdef OPENSSL_IS_BORINGSSL 344 num = sk_num(CHECKED_CAST(_STACK *, STACK_OF(AttrOrOID) *, 345 csrattrs->attrs)); 346 for (i = 0; i < num; i++) { 347 AttrOrOID *ao = sk_value( 348 CHECKED_CAST(_STACK *, const STACK_OF(AttrOrOID) *, 349 csrattrs->attrs), i); 350 switch (ao->type) { 351 case 0: 352 add_csrattrs_oid(ctx, ao->d.oid, exts); 353 break; 354 case 1: 355 add_csrattrs_attr(ctx, ao->d.attribute, exts); 356 break; 357 } 358 } 359 #else /* OPENSSL_IS_BORINGSSL */ 360 #if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL) 361 num = sk_AttrOrOID_num(csrattrs->attrs); 362 #else 363 num = SKM_sk_num(AttrOrOID, csrattrs->attrs); 364 #endif 365 for (i = 0; i < num; i++) { 366 #if OPENSSL_VERSION_NUMBER >= 0x10100000L && !defined(OPENSSL_IS_BORINGSSL) 367 AttrOrOID *ao = sk_AttrOrOID_value(csrattrs->attrs, i); 368 #else 369 AttrOrOID *ao = SKM_sk_value(AttrOrOID, csrattrs->attrs, i); 370 #endif 371 switch (ao->type) { 372 case 0: 373 add_csrattrs_oid(ctx, ao->d.oid, exts); 374 break; 375 case 1: 376 add_csrattrs_attr(ctx, ao->d.attribute, exts); 377 break; 378 } 379 } 380 #endif /* OPENSSL_IS_BORINGSSL */ 381 } 382 383 384 static int generate_csr(struct hs20_osu_client *ctx, char *key_pem, 385 char *csr_pem, char *est_req, char *old_cert, 386 CsrAttrs *csrattrs) 387 { 388 EVP_PKEY_CTX *pctx = NULL; 389 EVP_PKEY *pkey = NULL; 390 RSA *rsa; 391 X509_REQ *req = NULL; 392 int ret = -1; 393 unsigned int val; 394 X509_NAME *subj = NULL; 395 char name[100]; 396 STACK_OF(X509_EXTENSION) *exts = NULL; 397 X509_EXTENSION *ex; 398 BIO *out; 399 CONF *ctmp = NULL; 400 401 wpa_printf(MSG_INFO, "Generate RSA private key"); 402 write_summary(ctx, "Generate RSA private key"); 403 pctx = EVP_PKEY_CTX_new_id(EVP_PKEY_RSA, NULL); 404 if (!pctx) 405 return -1; 406 407 if (EVP_PKEY_keygen_init(pctx) <= 0) 408 goto fail; 409 410 if (EVP_PKEY_CTX_set_rsa_keygen_bits(pctx, 2048) <= 0) 411 goto fail; 412 413 if (EVP_PKEY_keygen(pctx, &pkey) <= 0) 414 goto fail; 415 EVP_PKEY_CTX_free(pctx); 416 pctx = NULL; 417 418 rsa = EVP_PKEY_get1_RSA(pkey); 419 if (rsa == NULL) 420 goto fail; 421 422 if (key_pem) { 423 FILE *f = fopen(key_pem, "wb"); 424 if (f == NULL) 425 goto fail; 426 if (!PEM_write_RSAPrivateKey(f, rsa, NULL, NULL, 0, NULL, 427 NULL)) { 428 wpa_printf(MSG_INFO, "Could not write private key: %s", 429 ERR_error_string(ERR_get_error(), NULL)); 430 fclose(f); 431 goto fail; 432 } 433 fclose(f); 434 } 435 436 wpa_printf(MSG_INFO, "Generate CSR"); 437 write_summary(ctx, "Generate CSR"); 438 req = X509_REQ_new(); 439 if (req == NULL) 440 goto fail; 441 442 if (old_cert) { 443 FILE *f; 444 X509 *cert; 445 int res; 446 447 f = fopen(old_cert, "r"); 448 if (f == NULL) 449 goto fail; 450 cert = PEM_read_X509(f, NULL, NULL, NULL); 451 fclose(f); 452 453 if (cert == NULL) 454 goto fail; 455 res = X509_REQ_set_subject_name(req, 456 X509_get_subject_name(cert)); 457 X509_free(cert); 458 if (!res) 459 goto fail; 460 } else { 461 os_get_random((u8 *) &val, sizeof(val)); 462 os_snprintf(name, sizeof(name), "cert-user-%u", val); 463 subj = X509_NAME_new(); 464 if (subj == NULL || 465 !X509_NAME_add_entry_by_txt(subj, "CN", MBSTRING_ASC, 466 (unsigned char *) name, 467 -1, -1, 0) || 468 !X509_REQ_set_subject_name(req, subj)) 469 goto fail; 470 X509_NAME_free(subj); 471 subj = NULL; 472 } 473 474 if (!X509_REQ_set_pubkey(req, pkey)) 475 goto fail; 476 477 exts = sk_X509_EXTENSION_new_null(); 478 if (!exts) 479 goto fail; 480 481 ex = X509V3_EXT_nconf_nid(ctmp, NULL, NID_basic_constraints, 482 "CA:FALSE"); 483 if (ex == NULL || 484 !sk_X509_EXTENSION_push(exts, ex)) 485 goto fail; 486 487 ex = X509V3_EXT_nconf_nid(ctmp, NULL, NID_key_usage, 488 "nonRepudiation,digitalSignature,keyEncipherment"); 489 if (ex == NULL || 490 !sk_X509_EXTENSION_push(exts, ex)) 491 goto fail; 492 493 ex = X509V3_EXT_nconf_nid(ctmp, NULL, NID_ext_key_usage, 494 "1.3.6.1.4.1.40808.1.1.2"); 495 if (ex == NULL || 496 !sk_X509_EXTENSION_push(exts, ex)) 497 goto fail; 498 499 add_csrattrs(ctx, csrattrs, exts); 500 501 if (!X509_REQ_add_extensions(req, exts)) 502 goto fail; 503 sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free); 504 exts = NULL; 505 506 if (!X509_REQ_sign(req, pkey, EVP_sha256())) 507 goto fail; 508 509 out = BIO_new(BIO_s_mem()); 510 if (out) { 511 char *txt; 512 size_t rlen; 513 514 #if !defined(ANDROID) || !defined(OPENSSL_IS_BORINGSSL) 515 X509_REQ_print(out, req); 516 #endif 517 rlen = BIO_ctrl_pending(out); 518 txt = os_malloc(rlen + 1); 519 if (txt) { 520 int res = BIO_read(out, txt, rlen); 521 if (res > 0) { 522 txt[res] = '\0'; 523 wpa_printf(MSG_MSGDUMP, "OpenSSL: Certificate request:\n%s", 524 txt); 525 } 526 os_free(txt); 527 } 528 BIO_free(out); 529 } 530 531 if (csr_pem) { 532 FILE *f = fopen(csr_pem, "w"); 533 if (f == NULL) 534 goto fail; 535 #if !defined(ANDROID) || !defined(OPENSSL_IS_BORINGSSL) 536 X509_REQ_print_fp(f, req); 537 #endif 538 if (!PEM_write_X509_REQ(f, req)) { 539 fclose(f); 540 goto fail; 541 } 542 fclose(f); 543 } 544 545 if (est_req) { 546 BIO *mem = BIO_new(BIO_s_mem()); 547 BUF_MEM *ptr; 548 char *pos, *end, *buf_end; 549 FILE *f; 550 551 if (mem == NULL) 552 goto fail; 553 if (!PEM_write_bio_X509_REQ(mem, req)) { 554 BIO_free(mem); 555 goto fail; 556 } 557 558 BIO_get_mem_ptr(mem, &ptr); 559 pos = ptr->data; 560 buf_end = pos + ptr->length; 561 562 /* Remove START/END lines */ 563 while (pos < buf_end && *pos != '\n') 564 pos++; 565 if (pos == buf_end) { 566 BIO_free(mem); 567 goto fail; 568 } 569 pos++; 570 571 end = pos; 572 while (end < buf_end && *end != '-') 573 end++; 574 575 f = fopen(est_req, "w"); 576 if (f == NULL) { 577 BIO_free(mem); 578 goto fail; 579 } 580 fwrite(pos, end - pos, 1, f); 581 fclose(f); 582 583 BIO_free(mem); 584 } 585 586 ret = 0; 587 fail: 588 if (exts) 589 sk_X509_EXTENSION_pop_free(exts, X509_EXTENSION_free); 590 if (subj) 591 X509_NAME_free(subj); 592 if (req) 593 X509_REQ_free(req); 594 if (pkey) 595 EVP_PKEY_free(pkey); 596 if (pctx) 597 EVP_PKEY_CTX_free(pctx); 598 return ret; 599 } 600 601 602 int est_build_csr(struct hs20_osu_client *ctx, const char *url) 603 { 604 char *buf; 605 size_t buflen; 606 int res; 607 char old_cert_buf[200]; 608 char *old_cert = NULL; 609 CsrAttrs *csrattrs = NULL; 610 611 buflen = os_strlen(url) + 100; 612 buf = os_malloc(buflen); 613 if (buf == NULL) 614 return -1; 615 616 os_snprintf(buf, buflen, "%s/csrattrs", url); 617 wpa_printf(MSG_INFO, "Download csrattrs from %s", buf); 618 write_summary(ctx, "Download EST csrattrs from %s", buf); 619 ctx->no_osu_cert_validation = 1; 620 http_ocsp_set(ctx->http, 1); 621 res = http_download_file(ctx->http, buf, "Cert/est-csrattrs.txt", 622 ctx->ca_fname); 623 http_ocsp_set(ctx->http, 624 (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2); 625 ctx->no_osu_cert_validation = 0; 626 os_free(buf); 627 if (res < 0) { 628 wpa_printf(MSG_INFO, "Failed to download EST csrattrs - assume no extra attributes are needed"); 629 } else { 630 size_t resp_len; 631 char *resp; 632 unsigned char *attrs; 633 const unsigned char *pos; 634 size_t attrs_len; 635 636 resp = os_readfile("Cert/est-csrattrs.txt", &resp_len); 637 if (resp == NULL) { 638 wpa_printf(MSG_INFO, "Could not read csrattrs"); 639 return -1; 640 } 641 642 attrs = base64_decode((unsigned char *) resp, resp_len, 643 &attrs_len); 644 os_free(resp); 645 646 if (attrs == NULL) { 647 wpa_printf(MSG_INFO, "Could not base64 decode csrattrs"); 648 return -1; 649 } 650 unlink("Cert/est-csrattrs.txt"); 651 652 pos = attrs; 653 csrattrs = d2i_CsrAttrs(NULL, &pos, attrs_len); 654 os_free(attrs); 655 if (csrattrs == NULL) { 656 wpa_printf(MSG_INFO, "Failed to parse csrattrs ASN.1"); 657 /* Continue assuming no additional requirements */ 658 } 659 } 660 661 if (ctx->client_cert_present) { 662 os_snprintf(old_cert_buf, sizeof(old_cert_buf), 663 "SP/%s/client-cert.pem", ctx->fqdn); 664 old_cert = old_cert_buf; 665 } 666 667 res = generate_csr(ctx, "Cert/privkey-plain.pem", "Cert/est-req.pem", 668 "Cert/est-req.b64", old_cert, csrattrs); 669 if (csrattrs) 670 CsrAttrs_free(csrattrs); 671 672 return res; 673 } 674 675 676 int est_simple_enroll(struct hs20_osu_client *ctx, const char *url, 677 const char *user, const char *pw) 678 { 679 char *buf, *resp, *req, *req2; 680 size_t buflen, resp_len, len, pkcs7_len; 681 unsigned char *pkcs7; 682 char client_cert_buf[200]; 683 char client_key_buf[200]; 684 const char *client_cert = NULL, *client_key = NULL; 685 int res; 686 687 req = os_readfile("Cert/est-req.b64", &len); 688 if (req == NULL) { 689 wpa_printf(MSG_INFO, "Could not read Cert/req.b64"); 690 return -1; 691 } 692 req2 = os_realloc(req, len + 1); 693 if (req2 == NULL) { 694 os_free(req); 695 return -1; 696 } 697 req2[len] = '\0'; 698 req = req2; 699 wpa_printf(MSG_DEBUG, "EST simpleenroll request: %s", req); 700 701 buflen = os_strlen(url) + 100; 702 buf = os_malloc(buflen); 703 if (buf == NULL) { 704 os_free(req); 705 return -1; 706 } 707 708 if (ctx->client_cert_present) { 709 os_snprintf(buf, buflen, "%s/simplereenroll", url); 710 os_snprintf(client_cert_buf, sizeof(client_cert_buf), 711 "SP/%s/client-cert.pem", ctx->fqdn); 712 client_cert = client_cert_buf; 713 os_snprintf(client_key_buf, sizeof(client_key_buf), 714 "SP/%s/client-key.pem", ctx->fqdn); 715 client_key = client_key_buf; 716 } else 717 os_snprintf(buf, buflen, "%s/simpleenroll", url); 718 wpa_printf(MSG_INFO, "EST simpleenroll URL: %s", buf); 719 write_summary(ctx, "EST simpleenroll URL: %s", buf); 720 ctx->no_osu_cert_validation = 1; 721 http_ocsp_set(ctx->http, 1); 722 resp = http_post(ctx->http, buf, req, "application/pkcs10", 723 "Content-Transfer-Encoding: base64", 724 ctx->ca_fname, user, pw, client_cert, client_key, 725 &resp_len); 726 http_ocsp_set(ctx->http, 727 (ctx->workarounds & WORKAROUND_OCSP_OPTIONAL) ? 1 : 2); 728 ctx->no_osu_cert_validation = 0; 729 os_free(buf); 730 if (resp == NULL) { 731 wpa_printf(MSG_INFO, "EST certificate enrollment failed"); 732 write_result(ctx, "EST certificate enrollment failed"); 733 return -1; 734 } 735 wpa_printf(MSG_DEBUG, "EST simpleenroll response: %s", resp); 736 737 pkcs7 = base64_decode((unsigned char *) resp, resp_len, &pkcs7_len); 738 if (pkcs7 == NULL) { 739 wpa_printf(MSG_INFO, "EST workaround - Could not decode base64, assume this is DER encoded PKCS7"); 740 pkcs7 = os_malloc(resp_len); 741 if (pkcs7) { 742 os_memcpy(pkcs7, resp, resp_len); 743 pkcs7_len = resp_len; 744 } 745 } 746 os_free(resp); 747 748 if (pkcs7 == NULL) { 749 wpa_printf(MSG_INFO, "Failed to parse simpleenroll base64 response"); 750 write_result(ctx, "Failed to parse EST simpleenroll base64 response"); 751 return -1; 752 } 753 754 res = pkcs7_to_cert(ctx, pkcs7, pkcs7_len, "Cert/est_cert.pem", 755 "Cert/est_cert.der"); 756 os_free(pkcs7); 757 758 if (res < 0) { 759 wpa_printf(MSG_INFO, "EST: Failed to extract certificate from PKCS7 file"); 760 write_result(ctx, "EST: Failed to extract certificate from EST PKCS7 file"); 761 return -1; 762 } 763 764 wpa_printf(MSG_INFO, "EST simple%senroll completed successfully", 765 ctx->client_cert_present ? "re" : ""); 766 write_summary(ctx, "EST simple%senroll completed successfully", 767 ctx->client_cert_present ? "re" : ""); 768 769 return 0; 770 } 771