📄 ocsp.c
字号:
static const FAR_BSS BYTE respIntError[] = {
0x30, 0x03, 0x0A, 0x01, 0x02 /* Rejection, internal error */
};
/* Read a request from an OCSP client */
static int readClientRequest( SESSION_INFO *sessionInfoPtr )
{
CRYPT_CERTIFICATE iOcspRequest;
MESSAGE_CREATEOBJECT_INFO createInfo;
STREAM stream;
int status;
/* Read the request data from the client. We don't write an error
response at this initial stage to prevent scanning/DOS attacks
(vir sapit qui pauca loquitur) */
status = readPkiDatagram( sessionInfoPtr );
if( cryptStatusError( status ) )
return( status );
DEBUG_DUMP( "ocsp_sreq", sessionInfoPtr->receiveBuffer,
sessionInfoPtr->receiveBufEnd );
/* Basic lint filter to check for approximately-OK requests */
sMemConnect( &stream, sessionInfoPtr->receiveBuffer,
sessionInfoPtr->receiveBufEnd );
readSequence( &stream, NULL );
readSequence( &stream, NULL );
if( peekTag( &stream ) == MAKE_CTAG( 0 ) )
readUniversal( &stream );
if( peekTag( &stream ) == MAKE_CTAG( 1 ) )
readUniversal( &stream );
readSequence( &stream, NULL );
status = readSequence( &stream, NULL );
sMemDisconnect( &stream );
if( cryptStatusError( status ) )
retExt( sessionInfoPtr, status, "Invalid OCSP request header" );
/* Import the request as a cryptlib object */
setMessageCreateObjectIndirectInfo( &createInfo,
sessionInfoPtr->receiveBuffer,
sessionInfoPtr->receiveBufEnd,
CRYPT_CERTTYPE_OCSP_REQUEST );
status = krnlSendMessage( SYSTEM_OBJECT_HANDLE,
IMESSAGE_DEV_CREATEOBJECT_INDIRECT,
&createInfo, OBJECT_TYPE_CERTIFICATE );
if( cryptStatusError( status ) )
{
sendErrorResponse( sessionInfoPtr, respBadRequest, RESPONSE_SIZE );
retExt( sessionInfoPtr, status, "Invalid OCSP request data" );
}
iOcspRequest = createInfo.cryptHandle;
/* Create an OCSP response and add the request information to it */
setMessageCreateObjectInfo( &createInfo, CRYPT_CERTTYPE_OCSP_RESPONSE );
status = krnlSendMessage( SYSTEM_OBJECT_HANDLE, IMESSAGE_DEV_CREATEOBJECT,
&createInfo, OBJECT_TYPE_CERTIFICATE );
if( cryptStatusError( status ) )
{
krnlSendNotifier( iOcspRequest, IMESSAGE_DECREFCOUNT );
sendErrorResponse( sessionInfoPtr, respIntError, RESPONSE_SIZE );
return( status );
}
status = krnlSendMessage( createInfo.cryptHandle,
IMESSAGE_SETATTRIBUTE, &iOcspRequest,
CRYPT_IATTRIBUTE_OCSPREQUEST );
krnlSendNotifier( iOcspRequest, IMESSAGE_DECREFCOUNT );
if( cryptStatusError( status ) )
{
krnlSendNotifier( createInfo.cryptHandle, IMESSAGE_DECREFCOUNT );
sendErrorResponse( sessionInfoPtr, respIntError, RESPONSE_SIZE );
retExt( sessionInfoPtr, status,
"Couldn't create OCSP response from request" );
}
sessionInfoPtr->iCertResponse = createInfo.cryptHandle;
return( CRYPT_OK );
}
/* Return a response to an OCSP client */
static int sendServerResponse( SESSION_INFO *sessionInfoPtr )
{
RESOURCE_DATA msgData;
STREAM stream;
int responseLength, responseDataLength, status;
/* Check the entries from the request against the cert store and sign
the resulting status information ("Love, ken"). Note that
CRYPT_ERROR_INVALID is a valid return status for the sigcheck call
since it indicates that one (or more) of the certs was revoked */
status = krnlSendMessage( sessionInfoPtr->iCertResponse,
IMESSAGE_CRT_SIGCHECK, NULL,
sessionInfoPtr->cryptKeyset );
if( cryptStatusError( status ) && status != CRYPT_ERROR_INVALID )
{
sendErrorResponse( sessionInfoPtr, respIntError, RESPONSE_SIZE );
retExt( sessionInfoPtr, status,
"Couldn't check OCSP request against certificate store" );
}
setMessageData( &msgData, NULL, 0 );
status = krnlSendMessage( sessionInfoPtr->iCertResponse,
IMESSAGE_CRT_SIGN, NULL,
sessionInfoPtr->privateKey );
if( cryptStatusOK( status ) )
status = krnlSendMessage( sessionInfoPtr->iCertResponse,
IMESSAGE_CRT_EXPORT, &msgData,
CRYPT_CERTFORMAT_CERTIFICATE );
responseDataLength = msgData.length;
if( cryptStatusError( status ) )
{
sendErrorResponse( sessionInfoPtr, respIntError, RESPONSE_SIZE );
retExt( sessionInfoPtr, status,
"Couldn't create signed OCSP response" );
}
/* Write the wrapper for the response */
sMemOpen( &stream, sessionInfoPtr->receiveBuffer,
sessionInfoPtr->receiveBufSize );
responseLength = sizeofOID( OID_OCSP_RESPONSE_OCSP ) + \
sizeofObject( responseDataLength );
writeSequence( &stream, sizeofEnumerated( 0 ) + \
sizeofObject( sizeofObject( responseLength ) ) );
writeEnumerated( &stream, 0, DEFAULT_TAG ); /* respStatus */
writeConstructed( &stream, sizeofObject( responseLength ), 0 );
writeSequence( &stream, responseLength ); /* respBytes */
writeOID( &stream, OID_OCSP_RESPONSE_OCSP ); /* respType */
writeOctetStringHole( &stream, responseDataLength, DEFAULT_TAG );
/* response */
/* Get the encoded response data */
status = exportCertToStream( &stream, sessionInfoPtr->iCertResponse,
CRYPT_CERTFORMAT_CERTIFICATE );
sessionInfoPtr->receiveBufEnd = stell( &stream );
sMemDisconnect( &stream );
if( cryptStatusError( status ) )
{
sendErrorResponse( sessionInfoPtr, respIntError, RESPONSE_SIZE );
return( status );
}
DEBUG_DUMP( "ocsp_sresp", sessionInfoPtr->receiveBuffer,
sessionInfoPtr->receiveBufEnd );
/* Send the response to the client */
return( writePkiDatagram( sessionInfoPtr ) );
}
/****************************************************************************
* *
* Init/Shutdown Functions *
* *
****************************************************************************/
/* Exchange data with an OCSP client/server */
static int clientTransact( SESSION_INFO *sessionInfoPtr )
{
int status;
/* Get cert revocation information from the server */
status = sendClientRequest( sessionInfoPtr );
if( cryptStatusOK( status ) )
status = readServerResponse( sessionInfoPtr );
return( status );
}
static int serverTransact( SESSION_INFO *sessionInfoPtr )
{
int status;
/* Send cert revocation information to the client */
status = readClientRequest( sessionInfoPtr );
if( cryptStatusOK( status ) )
status = sendServerResponse( sessionInfoPtr );
return( status );
}
/****************************************************************************
* *
* Control Information Management Functions *
* *
****************************************************************************/
static int setAttributeFunction( SESSION_INFO *sessionInfoPtr,
const void *data,
const CRYPT_ATTRIBUTE_TYPE type )
{
const CRYPT_CERTIFICATE ocspRequest = *( ( CRYPT_CERTIFICATE * ) data );
RESOURCE_DATA msgData = { NULL, 0 };
int status;
assert( type == CRYPT_SESSINFO_REQUEST );
/* Make sure that everything is set up ready to go. Since OCSP requests
aren't (usually) signed like normal cert objects, we can't just check
the immutable attribute but have to perform a dummy export for which
the cert export code will return an error status if there's a
problem with the request. If not, it pseudo-signs the request (if it
hasn't already done so) and prepares it for use */
status = krnlSendMessage( ocspRequest, IMESSAGE_CRT_EXPORT, &msgData,
CRYPT_ICERTFORMAT_DATA );
if( cryptStatusError( status ) )
return( CRYPT_ARGERROR_NUM1 );
/* If we haven't already got a server name explicitly set, try and get
it from the request */
if( findSessionAttribute( sessionInfoPtr->attributeList,
CRYPT_SESSINFO_SERVER_NAME ) == NULL )
{
char buffer[ MAX_URL_SIZE ];
setMessageData( &msgData, buffer, MAX_URL_SIZE );
status = krnlSendMessage( ocspRequest, IMESSAGE_GETATTRIBUTE_S,
&msgData, CRYPT_IATTRIBUTE_RESPONDERURL );
if( cryptStatusOK( status ) )
krnlSendMessage( sessionInfoPtr->objectHandle,
IMESSAGE_SETATTRIBUTE_S, &msgData,
CRYPT_SESSINFO_SERVER_NAME );
}
/* Add the request and increment its usage count */
krnlSendNotifier( ocspRequest, IMESSAGE_INCREFCOUNT );
sessionInfoPtr->iCertRequest = ocspRequest;
return( CRYPT_OK );
}
/****************************************************************************
* *
* Session Access Routines *
* *
****************************************************************************/
int setAccessMethodOCSP( SESSION_INFO *sessionInfoPtr )
{
static const PROTOCOL_INFO protocolInfo = {
/* General session information */
TRUE, /* Request-response protocol */
SESSION_ISHTTPTRANSPORT, /* Flags */
80, /* HTTP port */
SESSION_NEEDS_REQUEST, /* Client attributes */
SESSION_NEEDS_PRIVATEKEY | /* Server attributes */
SESSION_NEEDS_PRIVKEYSIGN | \
SESSION_NEEDS_PRIVKEYCERT | \
SESSION_NEEDS_KEYSET,
1, 1, 2, /* Version 1 */
"application/ocsp-request", /* Client content-type */
"application/ocsp-response" /* Server content-type */
/* Protocol-specific information */
};
/* Set the access method pointers */
sessionInfoPtr->protocolInfo = &protocolInfo;
if( sessionInfoPtr->flags & SESSION_ISSERVER )
sessionInfoPtr->transactFunction = serverTransact;
else
sessionInfoPtr->transactFunction = clientTransact;
sessionInfoPtr->setAttributeFunction = setAttributeFunction;
return( CRYPT_OK );
}
#endif /* USE_OCSP */
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -