2 * Copyright (C) 1996-2016 The Squid Software Foundation and contributors
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
10 #include "ssl/crtd_message.h"
11 #include "ssl/gadgets.h"
17 Ssl::CrtdMessage::CrtdMessage(MessageKind kind
)
18 : body_size(0), state(kind
== REPLY
? BEFORE_LENGTH
: BEFORE_CODE
)
21 Ssl::CrtdMessage::ParseResult
Ssl::CrtdMessage::parse(const char * buffer
, size_t len
)
23 char const *current_pos
= buffer
;
24 while (current_pos
!= buffer
+ len
&& state
!= END
) {
27 if (xisspace(*current_pos
)) {
31 if (xisalpha(*current_pos
)) {
39 if (xisalnum(*current_pos
) || *current_pos
== '_') {
40 current_block
+= *current_pos
;
44 if (xisspace(*current_pos
)) {
46 current_block
.clear();
47 state
= BEFORE_LENGTH
;
54 if (xisspace(*current_pos
)) {
58 if (xisdigit(*current_pos
)) {
66 if (xisdigit(*current_pos
)) {
67 current_block
+= *current_pos
;
71 if (xisspace(*current_pos
)) {
72 body_size
= atoi(current_block
.c_str());
73 current_block
.clear();
85 if (xisspace(*current_pos
)) {
94 size_t body_len
= (static_cast<size_t>(buffer
+ len
- current_pos
) >= body_size
- current_block
.length())
95 ? body_size
- current_block
.length()
96 : static_cast<size_t>(buffer
+ len
- current_pos
);
97 current_block
+= std::string(current_pos
, body_len
);
98 current_pos
+= body_len
;
99 if (current_block
.length() == body_size
) {
100 body
= current_block
;
103 if (current_block
.length() > body_size
) {
114 if (state
!= END
) return INCOMPLETE
;
118 std::string
const & Ssl::CrtdMessage::getBody() const { return body
; }
120 std::string
const & Ssl::CrtdMessage::getCode() const { return code
; }
122 void Ssl::CrtdMessage::setBody(std::string
const & aBody
) { body
= aBody
; }
124 void Ssl::CrtdMessage::setCode(std::string
const & aCode
) { code
= aCode
; }
126 std::string
Ssl::CrtdMessage::compose() const
128 if (code
.empty()) return std::string();
130 snprintf(buffer
, sizeof(buffer
), "%zd", body
.length());
131 return code
+ ' ' + buffer
+ ' ' + body
;
134 void Ssl::CrtdMessage::clear()
140 current_block
.clear();
143 void Ssl::CrtdMessage::parseBody(CrtdMessage::BodyParams
& map
, std::string
& other_part
) const
146 // Copy string for using it as temp buffer.
147 std::string
temp_body(body
.c_str(), body
.length());
148 char * buffer
= const_cast<char *>(temp_body
.c_str());
149 char * token
= strtok(buffer
, "\r\n");
150 while (token
!= NULL
) {
151 std::string
current_string(token
);
152 size_t equal_pos
= current_string
.find('=');
153 if (equal_pos
== std::string::npos
) {
154 size_t offset_body_part
= token
- temp_body
.c_str();
155 other_part
= std::string(body
.c_str() + offset_body_part
, body
.length() - offset_body_part
);
158 std::string
param(current_string
.c_str(), current_string
.c_str() + equal_pos
);
159 std::string
value(current_string
.c_str() + equal_pos
+ 1);
160 map
.insert(std::make_pair(param
, value
));
162 token
= strtok(NULL
, "\r\n");
166 void Ssl::CrtdMessage::composeBody(CrtdMessage::BodyParams
const & map
, std::string
const & other_part
)
169 for (BodyParams::const_iterator i
= map
.begin(); i
!= map
.end(); ++i
) {
170 if (i
!= map
.begin())
172 body
+= i
->first
+ "=" + i
->second
;
174 if (!other_part
.empty())
175 body
+= '\n' + other_part
;
178 bool Ssl::CrtdMessage::parseRequest(Ssl::CertificateProperties
&certProperties
, std::string
&error
)
180 Ssl::CrtdMessage::BodyParams map
;
181 std::string certs_part
;
182 parseBody(map
, certs_part
);
183 Ssl::CrtdMessage::BodyParams::iterator i
= map
.find(Ssl::CrtdMessage::param_host
);
184 if (i
== map
.end()) {
185 error
= "Cannot find \"host\" parameter in request message";
188 certProperties
.commonName
= i
->second
;
190 i
= map
.find(Ssl::CrtdMessage::param_SetValidAfter
);
191 if (i
!= map
.end() && strcasecmp(i
->second
.c_str(), "on") == 0)
192 certProperties
.setValidAfter
= true;
194 i
= map
.find(Ssl::CrtdMessage::param_SetValidBefore
);
195 if (i
!= map
.end() && strcasecmp(i
->second
.c_str(), "on") == 0)
196 certProperties
.setValidBefore
= true;
198 i
= map
.find(Ssl::CrtdMessage::param_SetCommonName
);
199 if (i
!= map
.end()) {
200 // use this as Common Name instead of the hostname
201 // defined with host or Common Name from mimic cert
202 certProperties
.commonName
= i
->second
;
203 certProperties
.setCommonName
= true;
206 i
= map
.find(Ssl::CrtdMessage::param_Sign
);
207 if (i
!= map
.end()) {
208 if ((certProperties
.signAlgorithm
= Ssl::certSignAlgorithmId(i
->second
.c_str())) == Ssl::algSignEnd
) {
209 error
= "Wrong signing algoritm: ";
214 certProperties
.signAlgorithm
= Ssl::algSignTrusted
;
216 i
= map
.find(Ssl::CrtdMessage::param_SignHash
);
217 const char *signHashName
= i
!= map
.end() ? i
->second
.c_str() : SQUID_SSL_SIGN_HASH_IF_NONE
;
218 if (!(certProperties
.signHash
= EVP_get_digestbyname(signHashName
))) {
219 error
= "Wrong signing hash: ";
220 error
+= signHashName
;
224 if (!Ssl::readCertAndPrivateKeyFromMemory(certProperties
.signWithX509
, certProperties
.signWithPkey
, certs_part
.c_str())) {
225 error
= "Broken signing certificate!";
229 static const std::string
CERT_BEGIN_STR("-----BEGIN CERTIFICATE");
231 if ((pos
= certs_part
.find(CERT_BEGIN_STR
)) != std::string::npos
) {
232 pos
+= CERT_BEGIN_STR
.length();
233 if ((pos
= certs_part
.find(CERT_BEGIN_STR
, pos
)) != std::string::npos
)
234 Ssl::readCertFromMemory(certProperties
.mimicCert
, certs_part
.c_str() + pos
);
239 void Ssl::CrtdMessage::composeRequest(Ssl::CertificateProperties
const &certProperties
)
242 body
= Ssl::CrtdMessage::param_host
+ "=" + certProperties
.commonName
;
243 if (certProperties
.setCommonName
)
244 body
+= "\n" + Ssl::CrtdMessage::param_SetCommonName
+ "=" + certProperties
.commonName
;
245 if (certProperties
.setValidAfter
)
246 body
+= "\n" + Ssl::CrtdMessage::param_SetValidAfter
+ "=on";
247 if (certProperties
.setValidBefore
)
248 body
+= "\n" + Ssl::CrtdMessage::param_SetValidBefore
+ "=on";
249 if (certProperties
.signAlgorithm
!= Ssl::algSignEnd
)
250 body
+= "\n" + Ssl::CrtdMessage::param_Sign
+ "=" + certSignAlgorithm(certProperties
.signAlgorithm
);
251 if (certProperties
.signHash
)
252 body
+= "\n" + Ssl::CrtdMessage::param_SignHash
+ "=" + EVP_MD_name(certProperties
.signHash
);
254 std::string certsPart
;
255 if (!Ssl::writeCertAndPrivateKeyToMemory(certProperties
.signWithX509
, certProperties
.signWithPkey
, certsPart
))
256 throw std::runtime_error("Ssl::writeCertAndPrivateKeyToMemory()");
257 if (certProperties
.mimicCert
.get()) {
258 if (!Ssl::appendCertToMemory(certProperties
.mimicCert
, certsPart
))
259 throw std::runtime_error("Ssl::appendCertToMemory()");
261 body
+= "\n" + certsPart
;
264 const std::string
Ssl::CrtdMessage::code_new_certificate("new_certificate");
265 const std::string
Ssl::CrtdMessage::param_host("host");
266 const std::string
Ssl::CrtdMessage::param_SetValidAfter(Ssl::CertAdaptAlgorithmStr
[algSetValidAfter
]);
267 const std::string
Ssl::CrtdMessage::param_SetValidBefore(Ssl::CertAdaptAlgorithmStr
[algSetValidBefore
]);
268 const std::string
Ssl::CrtdMessage::param_SetCommonName(Ssl::CertAdaptAlgorithmStr
[algSetCommonName
]);
269 const std::string
Ssl::CrtdMessage::param_Sign("Sign");
270 const std::string
Ssl::CrtdMessage::param_SignHash("SignHash");