1 | /*
|
---|
2 | * Copyright 2007-2022 The OpenSSL Project Authors. All Rights Reserved.
|
---|
3 | * Copyright Nokia 2007-2019
|
---|
4 | * Copyright Siemens AG 2015-2019
|
---|
5 | *
|
---|
6 | * Licensed under the Apache License 2.0 (the "License"). You may not use
|
---|
7 | * this file except in compliance with the License. You can obtain a copy
|
---|
8 | * in the file LICENSE in the source distribution or at
|
---|
9 | * https://www.openssl.org/source/license.html
|
---|
10 | */
|
---|
11 |
|
---|
12 | #include <string.h>
|
---|
13 | #include <stdio.h>
|
---|
14 |
|
---|
15 | #include <openssl/asn1t.h>
|
---|
16 | #include <openssl/http.h>
|
---|
17 | #include "internal/sockets.h"
|
---|
18 |
|
---|
19 | #include <openssl/cmp.h>
|
---|
20 | #include "cmp_local.h"
|
---|
21 |
|
---|
22 | /* explicit #includes not strictly needed since implied by the above: */
|
---|
23 | #include <ctype.h>
|
---|
24 | #include <fcntl.h>
|
---|
25 | #include <stdlib.h>
|
---|
26 | #include <openssl/bio.h>
|
---|
27 | #include <openssl/buffer.h>
|
---|
28 | #include <openssl/err.h>
|
---|
29 |
|
---|
30 | static int keep_alive(int keep_alive, int body_type)
|
---|
31 | {
|
---|
32 | if (keep_alive != 0
|
---|
33 | /*
|
---|
34 | * Ask for persistent connection only if may need more round trips.
|
---|
35 | * Do so even with disableConfirm because polling might be needed.
|
---|
36 | */
|
---|
37 | && body_type != OSSL_CMP_PKIBODY_IR
|
---|
38 | && body_type != OSSL_CMP_PKIBODY_CR
|
---|
39 | && body_type != OSSL_CMP_PKIBODY_P10CR
|
---|
40 | && body_type != OSSL_CMP_PKIBODY_KUR
|
---|
41 | && body_type != OSSL_CMP_PKIBODY_POLLREQ)
|
---|
42 | keep_alive = 0;
|
---|
43 | return keep_alive;
|
---|
44 | }
|
---|
45 |
|
---|
46 | /*
|
---|
47 | * Send the PKIMessage req and on success return the response, else NULL.
|
---|
48 | * Any previous error queue entries will likely be removed by ERR_clear_error().
|
---|
49 | */
|
---|
50 | OSSL_CMP_MSG *OSSL_CMP_MSG_http_perform(OSSL_CMP_CTX *ctx,
|
---|
51 | const OSSL_CMP_MSG *req)
|
---|
52 | {
|
---|
53 | char server_port[32] = { '\0' };
|
---|
54 | STACK_OF(CONF_VALUE) *headers = NULL;
|
---|
55 | const char content_type_pkix[] = "application/pkixcmp";
|
---|
56 | int tls_used;
|
---|
57 | const ASN1_ITEM *it = ASN1_ITEM_rptr(OSSL_CMP_MSG);
|
---|
58 | BIO *req_mem, *rsp;
|
---|
59 | OSSL_CMP_MSG *res = NULL;
|
---|
60 |
|
---|
61 | if (ctx == NULL || req == NULL) {
|
---|
62 | ERR_raise(ERR_LIB_CMP, CMP_R_NULL_ARGUMENT);
|
---|
63 | return NULL;
|
---|
64 | }
|
---|
65 |
|
---|
66 | if (!X509V3_add_value("Pragma", "no-cache", &headers))
|
---|
67 | return NULL;
|
---|
68 | if ((req_mem = ASN1_item_i2d_mem_bio(it, (const ASN1_VALUE *)req)) == NULL)
|
---|
69 | goto err;
|
---|
70 |
|
---|
71 | if (ctx->serverPort != 0)
|
---|
72 | BIO_snprintf(server_port, sizeof(server_port), "%d", ctx->serverPort);
|
---|
73 | tls_used = OSSL_CMP_CTX_get_http_cb_arg(ctx) != NULL;
|
---|
74 | if (ctx->http_ctx == NULL)
|
---|
75 | ossl_cmp_log3(DEBUG, ctx, "connecting to CMP server %s:%s%s",
|
---|
76 | ctx->server, server_port, tls_used ? " using TLS" : "");
|
---|
77 |
|
---|
78 | rsp = OSSL_HTTP_transfer(&ctx->http_ctx, ctx->server, server_port,
|
---|
79 | ctx->serverPath, tls_used,
|
---|
80 | ctx->proxy, ctx->no_proxy,
|
---|
81 | NULL /* bio */, NULL /* rbio */,
|
---|
82 | ctx->http_cb, OSSL_CMP_CTX_get_http_cb_arg(ctx),
|
---|
83 | 0 /* buf_size */, headers,
|
---|
84 | content_type_pkix, req_mem,
|
---|
85 | content_type_pkix, 1 /* expect_asn1 */,
|
---|
86 | OSSL_HTTP_DEFAULT_MAX_RESP_LEN,
|
---|
87 | ctx->msg_timeout,
|
---|
88 | keep_alive(ctx->keep_alive, req->body->type));
|
---|
89 | BIO_free(req_mem);
|
---|
90 | res = (OSSL_CMP_MSG *)ASN1_item_d2i_bio(it, rsp, NULL);
|
---|
91 | BIO_free(rsp);
|
---|
92 |
|
---|
93 | if (ctx->http_ctx == NULL)
|
---|
94 | ossl_cmp_debug(ctx, "disconnected from CMP server");
|
---|
95 | /*
|
---|
96 | * Note that on normal successful end of the transaction the connection
|
---|
97 | * is not closed at this level, but this will be done by the CMP client
|
---|
98 | * application via OSSL_CMP_CTX_free() or OSSL_CMP_CTX_reinit().
|
---|
99 | */
|
---|
100 | if (res != NULL)
|
---|
101 | ossl_cmp_debug(ctx, "finished reading response from CMP server");
|
---|
102 | err:
|
---|
103 | sk_CONF_VALUE_pop_free(headers, X509V3_conf_free);
|
---|
104 | return res;
|
---|
105 | }
|
---|