/* * Copyright (C) 2010-2016 Tobias Brunner * HSR Hochschule fuer Technik Rapperwsil * * Copyright (C) 2010 Martin Willi * Copyright (C) 2010 revosec AG * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ #include "mem_cred.h" #include #include typedef struct private_mem_cred_t private_mem_cred_t; /** * Private data of an mem_cred_t object. */ struct private_mem_cred_t { /** * Public mem_cred_t interface. */ mem_cred_t public; /** * Lock for this set */ rwlock_t *lock; /** * List of trusted certificates, certificate_t */ linked_list_t *trusted; /** * List of trusted and untrusted certificates, certificate_t */ linked_list_t *untrusted; /** * List of private keys, private_key_t */ linked_list_t *keys; /** * List of shared keys, as shared_entry_t */ linked_list_t *shared; /** * List of CDPs, as cdp_t */ linked_list_t *cdps; }; /** * Data for the certificate enumerator */ typedef struct { rwlock_t *lock; certificate_type_t cert; key_type_t key; identification_t *id; } cert_data_t; /** * destroy cert_data */ static void cert_data_destroy(cert_data_t *data) { data->lock->unlock(data->lock); free(data); } /** * filter function for certs enumerator */ static bool certs_filter(cert_data_t *data, certificate_t **in, certificate_t **out) { public_key_t *public; certificate_t *cert = *in; if (data->cert == CERT_ANY || data->cert == cert->get_type(cert)) { public = cert->get_public_key(cert); if (public) { if (data->key == KEY_ANY || data->key == public->get_type(public)) { if (data->id && public->has_fingerprint(public, data->id->get_encoding(data->id))) { public->destroy(public); *out = *in; return TRUE; } } public->destroy(public); } else if (data->key != KEY_ANY) { return FALSE; } if (data->id == NULL || cert->has_subject(cert, data->id)) { *out = *in; return TRUE; } } return FALSE; } METHOD(credential_set_t, create_cert_enumerator, enumerator_t*, private_mem_cred_t *this, certificate_type_t cert, key_type_t key, identification_t *id, bool trusted) { cert_data_t *data; enumerator_t *enumerator; INIT(data, .lock = this->lock, .cert = cert, .key = key, .id = id, ); this->lock->read_lock(this->lock); if (trusted) { enumerator = this->trusted->create_enumerator(this->trusted); } else { enumerator = this->untrusted->create_enumerator(this->untrusted); } return enumerator_create_filter(enumerator, (void*)certs_filter, data, (void*)cert_data_destroy); } static bool certificate_equals(certificate_t *item, certificate_t *cert) { return item->equals(item, cert); } /** * Add a certificate the the cache. Returns a reference to "cert" or a * previously cached certificate that equals "cert". */ static certificate_t *add_cert_internal(private_mem_cred_t *this, bool trusted, certificate_t *cert) { certificate_t *cached; this->lock->write_lock(this->lock); if (this->untrusted->find_first(this->untrusted, (linked_list_match_t)certificate_equals, (void**)&cached, cert) == SUCCESS) { cert->destroy(cert); cert = cached->get_ref(cached); } else { if (trusted) { this->trusted->insert_first(this->trusted, cert->get_ref(cert)); } this->untrusted->insert_first(this->untrusted, cert->get_ref(cert)); } this->lock->unlock(this->lock); return cert; } METHOD(mem_cred_t, add_cert, void, private_mem_cred_t *this, bool trusted, certificate_t *cert) { certificate_t *cached = add_cert_internal(this, trusted, cert); cached->destroy(cached); } METHOD(mem_cred_t, add_cert_ref, certificate_t*, private_mem_cred_t *this, bool trusted, certificate_t *cert) { return add_cert_internal(this, trusted, cert); } METHOD(mem_cred_t, get_cert_ref, certificate_t*, private_mem_cred_t *this, certificate_t *cert) { certificate_t *cached; this->lock->read_lock(this->lock); if (this->untrusted->find_first(this->untrusted, (linked_list_match_t)certificate_equals, (void**)&cached, cert) == SUCCESS) { cert->destroy(cert); cert = cached->get_ref(cached); } this->lock->unlock(this->lock); return cert; } METHOD(mem_cred_t, add_crl, bool, private_mem_cred_t *this, crl_t *crl) { certificate_t *current, *cert = &crl->certificate; enumerator_t *enumerator; bool new = TRUE; this->lock->write_lock(this->lock); enumerator = this->untrusted->create_enumerator(this->untrusted); while (enumerator->enumerate(enumerator, (void**)¤t)) { if (current->get_type(current) == CERT_X509_CRL) { chunk_t base; bool found = FALSE; crl_t *crl_c = (crl_t*)current; chunk_t authkey = crl->get_authKeyIdentifier(crl); chunk_t authkey_c = crl_c->get_authKeyIdentifier(crl_c); /* compare authorityKeyIdentifiers if available */ if (chunk_equals(authkey, authkey_c)) { found = TRUE; } else { identification_t *issuer = cert->get_issuer(cert); identification_t *issuer_c = current->get_issuer(current); /* otherwise compare issuer distinguished names */ if (issuer->equals(issuer, issuer_c)) { found = TRUE; } } if (found) { /* we keep at most one delta CRL for each base CRL */ if (crl->is_delta_crl(crl, &base)) { if (!crl_c->is_delta_crl(crl_c, NULL)) { if (chunk_equals(base, crl_c->get_serial(crl_c))) { /* keep the added delta and the existing base CRL * but check if this is the newest delta CRL for * the same base */ continue; } } } else if (crl_c->is_delta_crl(crl_c, &base)) { if (chunk_equals(base, crl->get_serial(crl))) { /* keep the existing delta and the added base CRL, * but check if we don't store it already */ continue; } } new = crl_is_newer(crl, crl_c); if (!new) { cert->destroy(cert); break; } /* we remove the existing older CRL but there might be other * delta or base CRLs we can replace */ this->untrusted->remove_at(this->untrusted, enumerator); current->destroy(current); } } } enumerator->destroy(enumerator); if (new) { this->untrusted->insert_first(this->untrusted, cert); } this->lock->unlock(this->lock); return new; } /** * Data for key enumerator */ typedef struct { rwlock_t *lock; key_type_t type; identification_t *id; } key_data_t; /** * Destroy key enumerator data */ static void key_data_destroy(key_data_t *data) { data->lock->unlock(data->lock); free(data); } /** * filter function for private key enumerator */ static bool key_filter(key_data_t *data, private_key_t **in, private_key_t **out) { private_key_t *key; key = *in; if (data->type == KEY_ANY || data->type == key->get_type(key)) { if (data->id == NULL || key->has_fingerprint(key, data->id->get_encoding(data->id))) { *out = key; return TRUE; } } return FALSE; } METHOD(credential_set_t, create_private_enumerator, enumerator_t*, private_mem_cred_t *this, key_type_t type, identification_t *id) { key_data_t *data; INIT(data, .lock = this->lock, .type = type, .id = id, ); this->lock->read_lock(this->lock); return enumerator_create_filter(this->keys->create_enumerator(this->keys), (void*)key_filter, data, (void*)key_data_destroy); } METHOD(mem_cred_t, add_key, void, private_mem_cred_t *this, private_key_t *key) { enumerator_t *enumerator; private_key_t *current; this->lock->write_lock(this->lock); enumerator = this->keys->create_enumerator(this->keys); while (enumerator->enumerate(enumerator, ¤t)) { if (current->equals(current, key)) { this->keys->remove_at(this->keys, enumerator); current->destroy(current); break; } } enumerator->destroy(enumerator); this->keys->insert_first(this->keys, key); this->lock->unlock(this->lock); } /** * Shared key entry */ typedef struct { /* shared key */ shared_key_t *shared; /* list of owners, identification_t */ linked_list_t *owners; #ifdef NETAPP uint32_t vserverid; #endif /* NETAPP */ } shared_entry_t; /** * Clean up a shared entry */ static void shared_entry_destroy(shared_entry_t *entry) { entry->owners->destroy_offset(entry->owners, offsetof(identification_t, destroy)); entry->shared->destroy(entry->shared); free(entry); } /** * Check if two shared key entries equal */ static bool shared_entry_equals(shared_entry_t *a, shared_entry_t *b) { enumerator_t *e1, *e2; identification_t *id1, *id2; bool equals = TRUE; #ifdef NETAPP if (a->vserverid != b->vserverid) { return FALSE; } #endif /* NETAPP */ if (a->shared->get_type(a->shared) != b->shared->get_type(b->shared)) { return FALSE; } if (!chunk_equals(a->shared->get_key(a->shared), b->shared->get_key(b->shared))) { return FALSE; } if (a->owners->get_count(a->owners) != b->owners->get_count(b->owners)) { return FALSE; } e1 = a->owners->create_enumerator(a->owners); e2 = b->owners->create_enumerator(b->owners); while (e1->enumerate(e1, &id1) && e2->enumerate(e2, &id2)) { if (!id1->equals(id1, id2)) { equals = FALSE; break; } } e1->destroy(e1); e2->destroy(e2); return equals; } /** * Data for the shared_key enumerator */ typedef struct { rwlock_t *lock; identification_t *me; identification_t *other; shared_key_type_t type; #ifdef NETAPP uint32_t vserverid; #endif /* NETAPP */ } shared_data_t; /** * free shared key enumerator data and unlock list */ static void shared_data_destroy(shared_data_t *data) { data->lock->unlock(data->lock); free(data); } /** * Get the best match of an owner in an entry. */ static id_match_t has_owner(shared_entry_t *entry, identification_t *owner) { enumerator_t *enumerator; id_match_t match, best = ID_MATCH_NONE; identification_t *current; enumerator = entry->owners->create_enumerator(entry->owners); while (enumerator->enumerate(enumerator, ¤t)) { match = owner->matches(owner, current); if (match > best) { best = match; } } enumerator->destroy(enumerator); return best; } /** * enumerator filter function for shared entries */ static bool shared_filter(shared_data_t *data, shared_entry_t **in, shared_key_t **out, void **unused1, id_match_t *me, void **unused2, id_match_t *other) { id_match_t my_match = ID_MATCH_NONE, other_match = ID_MATCH_NONE; shared_entry_t *entry = *in; #ifdef NETAPP if (data->vserverid != entry->vserverid) { return FALSE; } #endif /* NETAPP */ if (data->type != SHARED_ANY && entry->shared->get_type(entry->shared) != data->type) { return FALSE; } if (data->me) { my_match = has_owner(entry, data->me); } if (data->other) { other_match = has_owner(entry, data->other); } if ((data->me || data->other) && (!my_match && !other_match)) { return FALSE; } *out = entry->shared; if (me) { *me = my_match; } if (other) { *other = other_match; } return TRUE; } #ifdef NETAPP METHOD(credential_set_t, create_shared_enumerator, enumerator_t*, private_mem_cred_t *this, shared_key_type_t type, identification_t *me, identification_t *other, uint32_t vserverid) #else /* !NETAPP */ METHOD(credential_set_t, create_shared_enumerator, enumerator_t*, private_mem_cred_t *this, shared_key_type_t type, identification_t *me, identification_t *other) #endif /* NETAPP */ { shared_data_t *data; INIT(data, .lock = this->lock, .me = me, .other = other, .type = type, #ifdef NETAPP .vserverid = vserverid, #endif /* NETAPP */ ); data->lock->read_lock(data->lock); return enumerator_create_filter( this->shared->create_enumerator(this->shared), (void*)shared_filter, data, (void*)shared_data_destroy); } #ifdef NETAPP METHOD(mem_cred_t, add_shared_list, void, private_mem_cred_t *this, shared_key_t *shared, linked_list_t* owners, uint32_t vserverid) #else /* !NETAPP */ METHOD(mem_cred_t, add_shared_list, void, private_mem_cred_t *this, shared_key_t *shared, linked_list_t* owners) #endif /* NETAPP */ { shared_entry_t *current, *new; enumerator_t *enumerator; INIT(new, .shared = shared, .owners = owners, #ifdef NETAPP .vserverid = vserverid, #endif /* NETAPP */ ); this->lock->write_lock(this->lock); enumerator = this->shared->create_enumerator(this->shared); while (enumerator->enumerate(enumerator, ¤t)) { if (shared_entry_equals(current, new)) { this->shared->remove_at(this->shared, enumerator); shared_entry_destroy(current); break; } } enumerator->destroy(enumerator); this->shared->insert_first(this->shared, new); this->lock->unlock(this->lock); } METHOD(mem_cred_t, add_shared, void, private_mem_cred_t *this, shared_key_t *shared, ...) { identification_t *id; linked_list_t *owners = linked_list_create(); va_list args; va_start(args, shared); do { id = va_arg(args, identification_t*); if (id) { owners->insert_first(owners, id); } } while (id); va_end(args); #ifdef NETAPP add_shared_list(this, shared, owners, -1); #else /* !NETAPP */ add_shared_list(this, shared, owners); #endif /* NETAPP */ } /** * Certificate distribution point */ typedef struct { certificate_type_t type; identification_t *id; char *uri; } cdp_t; /** * Destroy a CDP entry */ static void cdp_destroy(cdp_t *this) { this->id->destroy(this->id); free(this->uri); free(this); } METHOD(mem_cred_t, add_cdp, void, private_mem_cred_t *this, certificate_type_t type, identification_t *id, char *uri) { cdp_t *cdp; INIT(cdp, .type = type, .id = id->clone(id), .uri = strdup(uri), ); this->lock->write_lock(this->lock); this->cdps->insert_last(this->cdps, cdp); this->lock->unlock(this->lock); } /** * CDP enumerator data */ typedef struct { certificate_type_t type; identification_t *id; rwlock_t *lock; } cdp_data_t; /** * Clean up CDP enumerator data */ static void cdp_data_destroy(cdp_data_t *data) { data->lock->unlock(data->lock); free(data); } /** * CDP enumerator filter */ static bool cdp_filter(cdp_data_t *data, cdp_t **cdp, char **uri) { if (data->type != CERT_ANY && data->type != (*cdp)->type) { return FALSE; } if (data->id && !(*cdp)->id->matches((*cdp)->id, data->id)) { return FALSE; } *uri = (*cdp)->uri; return TRUE; } METHOD(credential_set_t, create_cdp_enumerator, enumerator_t*, private_mem_cred_t *this, certificate_type_t type, identification_t *id) { cdp_data_t *data; INIT(data, .type = type, .id = id, .lock = this->lock, ); this->lock->read_lock(this->lock); return enumerator_create_filter(this->cdps->create_enumerator(this->cdps), (void*)cdp_filter, data, (void*)cdp_data_destroy); } static void reset_certs(private_mem_cred_t *this) { this->trusted->destroy_offset(this->trusted, offsetof(certificate_t, destroy)); this->untrusted->destroy_offset(this->untrusted, offsetof(certificate_t, destroy)); this->trusted = linked_list_create(); this->untrusted = linked_list_create(); } static void copy_certs(linked_list_t *dst, linked_list_t *src, bool clone) { enumerator_t *enumerator; certificate_t *cert; enumerator = src->create_enumerator(src); while (enumerator->enumerate(enumerator, &cert)) { if (clone) { cert = cert->get_ref(cert); } else { src->remove_at(src, enumerator); } dst->insert_last(dst, cert); } enumerator->destroy(enumerator); } METHOD(mem_cred_t, replace_certs, void, private_mem_cred_t *this, mem_cred_t *other_set, bool clone) { private_mem_cred_t *other = (private_mem_cred_t*)other_set; this->lock->write_lock(this->lock); reset_certs(this); copy_certs(this->untrusted, other->untrusted, clone); copy_certs(this->trusted, other->trusted, clone); this->lock->unlock(this->lock); } static void reset_secrets(private_mem_cred_t *this) { this->keys->destroy_offset(this->keys, offsetof(private_key_t, destroy)); this->shared->destroy_function(this->shared, (void*)shared_entry_destroy); this->keys = linked_list_create(); this->shared = linked_list_create(); } METHOD(mem_cred_t, replace_secrets, void, private_mem_cred_t *this, mem_cred_t *other_set, bool clone) { private_mem_cred_t *other = (private_mem_cred_t*)other_set; enumerator_t *enumerator; shared_entry_t *entry, *new_entry; private_key_t *key; this->lock->write_lock(this->lock); reset_secrets(this); if (clone) { enumerator = other->keys->create_enumerator(other->keys); while (enumerator->enumerate(enumerator, &key)) { this->keys->insert_last(this->keys, key->get_ref(key)); } enumerator->destroy(enumerator); enumerator = other->shared->create_enumerator(other->shared); while (enumerator->enumerate(enumerator, &entry)) { INIT(new_entry, .shared = entry->shared->get_ref(entry->shared), .owners = entry->owners->clone_offset(entry->owners, offsetof(identification_t, clone)), ); this->shared->insert_last(this->shared, new_entry); } enumerator->destroy(enumerator); } else { while (other->keys->remove_first(other->keys, (void**)&key) == SUCCESS) { this->keys->insert_last(this->keys, key); } while (other->shared->remove_first(other->shared, (void**)&entry) == SUCCESS) { this->shared->insert_last(this->shared, entry); } } this->lock->unlock(this->lock); } METHOD(mem_cred_t, clear_secrets, void, private_mem_cred_t *this) { this->lock->write_lock(this->lock); reset_secrets(this); this->lock->unlock(this->lock); } METHOD(mem_cred_t, clear_, void, private_mem_cred_t *this) { this->lock->write_lock(this->lock); this->cdps->destroy_function(this->cdps, (void*)cdp_destroy); this->cdps = linked_list_create(); reset_certs(this); reset_secrets(this); this->lock->unlock(this->lock); } METHOD(mem_cred_t, destroy, void, private_mem_cred_t *this) { clear_(this); this->trusted->destroy(this->trusted); this->untrusted->destroy(this->untrusted); this->keys->destroy(this->keys); this->shared->destroy(this->shared); this->cdps->destroy(this->cdps); this->lock->destroy(this->lock); free(this); } /** * See header */ mem_cred_t *mem_cred_create() { private_mem_cred_t *this; INIT(this, .public = { .set = { .create_shared_enumerator = _create_shared_enumerator, .create_private_enumerator = _create_private_enumerator, .create_cert_enumerator = _create_cert_enumerator, .create_cdp_enumerator = _create_cdp_enumerator, .cache_cert = (void*)nop, }, .add_cert = _add_cert, .add_cert_ref = _add_cert_ref, .get_cert_ref = _get_cert_ref, .add_crl = _add_crl, .add_key = _add_key, .add_shared = _add_shared, .add_shared_list = _add_shared_list, .add_cdp = _add_cdp, .replace_certs = _replace_certs, .replace_secrets = _replace_secrets, .clear = _clear_, .clear_secrets = _clear_secrets, .destroy = _destroy, }, .trusted = linked_list_create(), .untrusted = linked_list_create(), .keys = linked_list_create(), .shared = linked_list_create(), .cdps = linked_list_create(), .lock = rwlock_create(RWLOCK_TYPE_DEFAULT), ); return &this->public; }