blob: 18aff9a3c69c141d89235136d6b429083f395c7b [file] [log] [blame]
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/.
*
* Copyright 2018 (c) Mark Giraud, Fraunhofer IOSB
* Copyright 2018 (c) Daniel Feist, Precitec GmbH & Co. KG
* Copyright 2019 (c) Kalycito Infotech Private Limited
*
*/
#include <open62541/plugin/securitypolicy.h>
#ifdef UA_ENABLE_ENCRYPTION
#include <open62541/plugin/pki.h>
#include <open62541/plugin/securitypolicy_default.h>
#include <open62541/plugin/securitypolicy_mbedtls_common.h>
#include <open62541/types.h>
#include <open62541/util.h>
#include <mbedtls/aes.h>
#include <mbedtls/entropy.h>
#include <mbedtls/entropy_poll.h>
#include <mbedtls/error.h>
#include <mbedtls/sha1.h>
#include <mbedtls/version.h>
/* Notes:
* mbedTLS' AES allows in-place encryption and decryption. Sow we don't have to
* allocate temp buffers.
* https://tls.mbed.org/discussions/generic/in-place-decryption-with-aes256-same-input-output-buffer
*/
#define UA_SECURITYPOLICY_BASIC256SHA1_RSAPADDING_LEN 42
#define UA_SHA1_LENGTH 20
#define UA_BASIC256_SYM_SIGNING_KEY_LENGTH 24
#define UA_SECURITYPOLICY_BASIC256_SYM_KEY_LENGTH 32
#define UA_SECURITYPOLICY_BASIC256_SYM_ENCRYPTION_BLOCK_SIZE 16
#define UA_SECURITYPOLICY_BASIC256_SYM_PLAIN_TEXT_BLOCK_SIZE 16
#define UA_SECURITYPOLICY_BASIC256_MINASYMKEYLENGTH 128
#define UA_SECURITYPOLICY_BASIC256_MAXASYMKEYLENGTH 512
typedef struct {
const UA_SecurityPolicy *securityPolicy;
UA_ByteString localCertThumbprint;
mbedtls_ctr_drbg_context drbgContext;
mbedtls_entropy_context entropyContext;
mbedtls_md_context_t sha1MdContext;
mbedtls_pk_context localPrivateKey;
} Basic256_PolicyContext;
typedef struct {
Basic256_PolicyContext *policyContext;
UA_ByteString localSymSigningKey;
UA_ByteString localSymEncryptingKey;
UA_ByteString localSymIv;
UA_ByteString remoteSymSigningKey;
UA_ByteString remoteSymEncryptingKey;
UA_ByteString remoteSymIv;
mbedtls_x509_crt remoteCertificate;
} Basic256_ChannelContext;
/********************/
/* AsymmetricModule */
/********************/
/* VERIFY AsymmetricSignatureAlgorithm_RSA-PKCS15-SHA2-256 */
static UA_StatusCode
asym_verify_sp_basic256(const UA_SecurityPolicy *securityPolicy,
Basic256_ChannelContext *cc,
const UA_ByteString *message,
const UA_ByteString *signature) {
if(securityPolicy == NULL || message == NULL || signature == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
return mbedtls_verifySig_sha1(&cc->remoteCertificate, message, signature);
}
/* AsymmetricSignatureAlgorithm_RSA-PKCS15-SHA2-256 */
static UA_StatusCode
asym_sign_sp_basic256(const UA_SecurityPolicy *securityPolicy,
Basic256_ChannelContext *cc,
const UA_ByteString *message,
UA_ByteString *signature) {
if(securityPolicy == NULL || message == NULL || signature == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
Basic256_PolicyContext *pc = cc->policyContext;
return mbedtls_sign_sha1(&pc->localPrivateKey, &pc->drbgContext,
message, signature);
}
static size_t
asym_getLocalSignatureSize_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc) {
if(securityPolicy == NULL || cc == NULL)
return 0;
return mbedtls_pk_rsa(cc->policyContext->localPrivateKey)->len;
}
static size_t
asym_getRemoteSignatureSize_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc) {
if(securityPolicy == NULL || cc == NULL)
return 0;
return mbedtls_pk_rsa(cc->remoteCertificate.pk)->len;
}
/* AsymmetricEncryptionAlgorithm_RSA-OAEP-SHA1 */
static UA_StatusCode
asym_encrypt_sp_basic256(const UA_SecurityPolicy *securityPolicy,
Basic256_ChannelContext *cc,
UA_ByteString *data) {
if(securityPolicy == NULL || cc == NULL || data == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
const size_t plainTextBlockSize = securityPolicy->asymmetricModule.cryptoModule.
encryptionAlgorithm.getRemotePlainTextBlockSize(securityPolicy, cc);
mbedtls_rsa_context *remoteRsaContext = mbedtls_pk_rsa(cc->remoteCertificate.pk);
mbedtls_rsa_set_padding(remoteRsaContext, MBEDTLS_RSA_PKCS_V21, MBEDTLS_MD_SHA1);
return mbedtls_encrypt_rsaOaep(remoteRsaContext, &cc->policyContext->drbgContext,
data, plainTextBlockSize);
}
/* AsymmetricEncryptionAlgorithm_RSA-OAEP-SHA1 */
static UA_StatusCode
asym_decrypt_sp_basic256(const UA_SecurityPolicy *securityPolicy,
Basic256_ChannelContext *cc,
UA_ByteString *data) {
if(securityPolicy == NULL || cc == NULL || data == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
return mbedtls_decrypt_rsaOaep(&cc->policyContext->localPrivateKey,
&cc->policyContext->drbgContext, data);
}
static size_t
asym_getRemoteEncryptionKeyLength_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc) {
return mbedtls_pk_get_len(&cc->remoteCertificate.pk) * 8;
}
static size_t
asym_getRemoteBlockSize_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc) {
mbedtls_rsa_context *const rsaContext = mbedtls_pk_rsa(cc->remoteCertificate.pk);
return rsaContext->len;
}
static size_t
asym_getRemotePlainTextBlockSize_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc) {
mbedtls_rsa_context *const rsaContext = mbedtls_pk_rsa(cc->remoteCertificate.pk);
return rsaContext->len - UA_SECURITYPOLICY_BASIC256SHA1_RSAPADDING_LEN;
}
static UA_StatusCode
asym_makeThumbprint_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const UA_ByteString *certificate,
UA_ByteString *thumbprint) {
if(securityPolicy == NULL || certificate == NULL || thumbprint == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
return mbedtls_thumbprint_sha1(certificate, thumbprint);
}
static UA_StatusCode
asymmetricModule_compareCertificateThumbprint_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const UA_ByteString *certificateThumbprint) {
if(securityPolicy == NULL || certificateThumbprint == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
Basic256_PolicyContext *pc = (Basic256_PolicyContext *)securityPolicy->policyContext;
if(!UA_ByteString_equal(certificateThumbprint, &pc->localCertThumbprint))
return UA_STATUSCODE_BADCERTIFICATEINVALID;
return UA_STATUSCODE_GOOD;
}
/*******************/
/* SymmetricModule */
/*******************/
static UA_StatusCode
sym_verify_sp_basic256(const UA_SecurityPolicy *securityPolicy,
Basic256_ChannelContext *cc,
const UA_ByteString *message,
const UA_ByteString *signature) {
if(securityPolicy == NULL || cc == NULL || message == NULL || signature == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
/* Compute MAC */
if(signature->length != UA_SHA1_LENGTH) {
UA_LOG_ERROR(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Signature size does not have the desired size defined by the security policy");
return UA_STATUSCODE_BADSECURITYCHECKSFAILED;
}
Basic256_PolicyContext *pc =
(Basic256_PolicyContext *)securityPolicy->policyContext;
unsigned char mac[UA_SHA1_LENGTH];
mbedtls_hmac(&pc->sha1MdContext, &cc->remoteSymSigningKey, message, mac);
/* Compare with Signature */
if(!UA_constantTimeEqual(signature->data, mac, UA_SHA1_LENGTH))
return UA_STATUSCODE_BADSECURITYCHECKSFAILED;
return UA_STATUSCODE_GOOD;
}
static UA_StatusCode
sym_sign_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc,
const UA_ByteString *message,
UA_ByteString *signature) {
if(signature->length != UA_SHA1_LENGTH)
return UA_STATUSCODE_BADINTERNALERROR;
mbedtls_hmac(&cc->policyContext->sha1MdContext, &cc->localSymSigningKey,
message, signature->data);
return UA_STATUSCODE_GOOD;
}
static size_t
sym_getSignatureSize_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const void *channelContext) {
return UA_SHA1_LENGTH;
}
static size_t
sym_getSigningKeyLength_sp_basic256(const UA_SecurityPolicy *const securityPolicy,
const void *const channelContext) {
return UA_BASIC256_SYM_SIGNING_KEY_LENGTH;
}
static size_t
sym_getEncryptionKeyLength_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const void *channelContext) {
return UA_SECURITYPOLICY_BASIC256_SYM_KEY_LENGTH;
}
static size_t
sym_getEncryptionBlockSize_sp_basic256(const UA_SecurityPolicy *const securityPolicy,
const void *const channelContext) {
return UA_SECURITYPOLICY_BASIC256_SYM_ENCRYPTION_BLOCK_SIZE;
}
static size_t
sym_getPlainTextBlockSize_sp_basic256(const UA_SecurityPolicy *const securityPolicy,
const void *const channelContext) {
return UA_SECURITYPOLICY_BASIC256_SYM_PLAIN_TEXT_BLOCK_SIZE;
}
static UA_StatusCode
sym_encrypt_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc,
UA_ByteString *data) {
if(securityPolicy == NULL || cc == NULL || data == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
if(cc->localSymIv.length !=
securityPolicy->symmetricModule.cryptoModule.encryptionAlgorithm.
getLocalBlockSize(securityPolicy, cc))
return UA_STATUSCODE_BADINTERNALERROR;
size_t plainTextBlockSize =
securityPolicy->symmetricModule.cryptoModule.encryptionAlgorithm.
getLocalPlainTextBlockSize(securityPolicy, cc);
if(data->length % plainTextBlockSize != 0) {
UA_LOG_ERROR(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Length of data to encrypt is not a multiple of the plain text block size."
"Padding might not have been calculated appropriately.");
return UA_STATUSCODE_BADINTERNALERROR;
}
/* Keylength in bits */
unsigned int keylength = (unsigned int)(cc->localSymEncryptingKey.length * 8);
mbedtls_aes_context aesContext;
int mbedErr = mbedtls_aes_setkey_enc(&aesContext, cc->localSymEncryptingKey.data, keylength);
if(mbedErr)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString ivCopy;
UA_StatusCode retval = UA_ByteString_copy(&cc->localSymIv, &ivCopy);
if(retval != UA_STATUSCODE_GOOD)
return retval;
mbedErr = mbedtls_aes_crypt_cbc(&aesContext, MBEDTLS_AES_ENCRYPT, data->length,
ivCopy.data, data->data, data->data);
if(mbedErr)
retval = UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&ivCopy);
return retval;
}
static UA_StatusCode
sym_decrypt_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const Basic256_ChannelContext *cc,
UA_ByteString *data) {
if(securityPolicy == NULL || cc == NULL || data == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
size_t encryptionBlockSize =
securityPolicy->symmetricModule.cryptoModule.encryptionAlgorithm.
getRemoteBlockSize(securityPolicy, cc);
if(cc->remoteSymIv.length != encryptionBlockSize)
return UA_STATUSCODE_BADINTERNALERROR;
if(data->length % encryptionBlockSize != 0) {
UA_LOG_ERROR(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Length of data to decrypt is not a multiple of the encryptingBlock size.");
return UA_STATUSCODE_BADINTERNALERROR;
}
unsigned int keylength = (unsigned int)(cc->remoteSymEncryptingKey.length * 8);
mbedtls_aes_context aesContext;
int mbedErr = mbedtls_aes_setkey_dec(&aesContext, cc->remoteSymEncryptingKey.data, keylength);
if(mbedErr)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString ivCopy;
UA_StatusCode retval = UA_ByteString_copy(&cc->remoteSymIv, &ivCopy);
if(retval != UA_STATUSCODE_GOOD)
return retval;
mbedErr = mbedtls_aes_crypt_cbc(&aesContext, MBEDTLS_AES_DECRYPT, data->length,
ivCopy.data, data->data, data->data);
if(mbedErr)
retval = UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&ivCopy);
return retval;
}
static UA_StatusCode
sym_generateKey_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const UA_ByteString *secret, const UA_ByteString *seed,
UA_ByteString *out) {
if(securityPolicy == NULL || secret == NULL || seed == NULL || out == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
Basic256_PolicyContext *pc =
(Basic256_PolicyContext *)securityPolicy->policyContext;
return mbedtls_generateKey(&pc->sha1MdContext, secret, seed, out);
}
static UA_StatusCode
sym_generateNonce_sp_basic256(const UA_SecurityPolicy *securityPolicy,
UA_ByteString *out) {
if(securityPolicy == NULL || securityPolicy->policyContext == NULL || out == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
Basic256_PolicyContext *pc =
(Basic256_PolicyContext *)securityPolicy->policyContext;
int mbedErr = mbedtls_ctr_drbg_random(&pc->drbgContext, out->data, out->length);
if(mbedErr)
return UA_STATUSCODE_BADUNEXPECTEDERROR;
return UA_STATUSCODE_GOOD;
}
/*****************/
/* ChannelModule */
/*****************/
/* Assumes that the certificate has been verified externally */
static UA_StatusCode
parseRemoteCertificate_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *remoteCertificate) {
if(remoteCertificate == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
/* Parse the certificate */
int mbedErr = mbedtls_x509_crt_parse(&cc->remoteCertificate, remoteCertificate->data,
remoteCertificate->length);
if(mbedErr)
return UA_STATUSCODE_BADSECURITYCHECKSFAILED;
/* Check the key length */
mbedtls_rsa_context *rsaContext = mbedtls_pk_rsa(cc->remoteCertificate.pk);
if(rsaContext->len < UA_SECURITYPOLICY_BASIC256_MINASYMKEYLENGTH ||
rsaContext->len > UA_SECURITYPOLICY_BASIC256_MAXASYMKEYLENGTH)
return UA_STATUSCODE_BADCERTIFICATEUSENOTALLOWED;
return UA_STATUSCODE_GOOD;
}
static void
channelContext_deleteContext_sp_basic256(Basic256_ChannelContext *cc) {
UA_ByteString_deleteMembers(&cc->localSymSigningKey);
UA_ByteString_deleteMembers(&cc->localSymEncryptingKey);
UA_ByteString_deleteMembers(&cc->localSymIv);
UA_ByteString_deleteMembers(&cc->remoteSymSigningKey);
UA_ByteString_deleteMembers(&cc->remoteSymEncryptingKey);
UA_ByteString_deleteMembers(&cc->remoteSymIv);
mbedtls_x509_crt_free(&cc->remoteCertificate);
UA_free(cc);
}
static UA_StatusCode
channelContext_newContext_sp_basic256(const UA_SecurityPolicy *securityPolicy,
const UA_ByteString *remoteCertificate,
void **pp_contextData) {
if(securityPolicy == NULL || remoteCertificate == NULL || pp_contextData == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
/* Allocate the channel context */
*pp_contextData = UA_malloc(sizeof(Basic256_ChannelContext));
if(*pp_contextData == NULL)
return UA_STATUSCODE_BADOUTOFMEMORY;
Basic256_ChannelContext *cc = (Basic256_ChannelContext *)*pp_contextData;
/* Initialize the channel context */
cc->policyContext = (Basic256_PolicyContext *)securityPolicy->policyContext;
UA_ByteString_init(&cc->localSymSigningKey);
UA_ByteString_init(&cc->localSymEncryptingKey);
UA_ByteString_init(&cc->localSymIv);
UA_ByteString_init(&cc->remoteSymSigningKey);
UA_ByteString_init(&cc->remoteSymEncryptingKey);
UA_ByteString_init(&cc->remoteSymIv);
mbedtls_x509_crt_init(&cc->remoteCertificate);
// TODO: this can be optimized so that we dont allocate memory before parsing the certificate
UA_StatusCode retval = parseRemoteCertificate_sp_basic256(cc, remoteCertificate);
if(retval != UA_STATUSCODE_GOOD) {
channelContext_deleteContext_sp_basic256(cc);
*pp_contextData = NULL;
}
return retval;
}
static UA_StatusCode
channelContext_setLocalSymEncryptingKey_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *key) {
if(key == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&cc->localSymEncryptingKey);
return UA_ByteString_copy(key, &cc->localSymEncryptingKey);
}
static UA_StatusCode
channelContext_setLocalSymSigningKey_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *key) {
if(key == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&cc->localSymSigningKey);
return UA_ByteString_copy(key, &cc->localSymSigningKey);
}
static UA_StatusCode
channelContext_setLocalSymIv_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *iv) {
if(iv == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&cc->localSymIv);
return UA_ByteString_copy(iv, &cc->localSymIv);
}
static UA_StatusCode
channelContext_setRemoteSymEncryptingKey_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *key) {
if(key == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&cc->remoteSymEncryptingKey);
return UA_ByteString_copy(key, &cc->remoteSymEncryptingKey);
}
static UA_StatusCode
channelContext_setRemoteSymSigningKey_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *key) {
if(key == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&cc->remoteSymSigningKey);
return UA_ByteString_copy(key, &cc->remoteSymSigningKey);
}
static UA_StatusCode
channelContext_setRemoteSymIv_sp_basic256(Basic256_ChannelContext *cc,
const UA_ByteString *iv) {
if(iv == NULL || cc == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
UA_ByteString_deleteMembers(&cc->remoteSymIv);
return UA_ByteString_copy(iv, &cc->remoteSymIv);
}
static UA_StatusCode
channelContext_compareCertificate_sp_basic256(const Basic256_ChannelContext *cc,
const UA_ByteString *certificate) {
if(cc == NULL || certificate == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
mbedtls_x509_crt cert;
mbedtls_x509_crt_init(&cert);
int mbedErr = mbedtls_x509_crt_parse(&cert, certificate->data, certificate->length);
if(mbedErr)
return UA_STATUSCODE_BADSECURITYCHECKSFAILED;
UA_StatusCode retval = UA_STATUSCODE_GOOD;
if(cert.raw.len != cc->remoteCertificate.raw.len ||
memcmp(cert.raw.p, cc->remoteCertificate.raw.p, cert.raw.len) != 0)
retval = UA_STATUSCODE_BADSECURITYCHECKSFAILED;
mbedtls_x509_crt_free(&cert);
return retval;
}
static void
deleteMembers_sp_basic256(UA_SecurityPolicy *securityPolicy) {
if(securityPolicy == NULL)
return;
if(securityPolicy->policyContext == NULL)
return;
UA_ByteString_deleteMembers(&securityPolicy->localCertificate);
/* delete all allocated members in the context */
Basic256_PolicyContext *pc = (Basic256_PolicyContext *)
securityPolicy->policyContext;
mbedtls_ctr_drbg_free(&pc->drbgContext);
mbedtls_entropy_free(&pc->entropyContext);
mbedtls_pk_free(&pc->localPrivateKey);
mbedtls_md_free(&pc->sha1MdContext);
UA_ByteString_deleteMembers(&pc->localCertThumbprint);
UA_LOG_DEBUG(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Deleted members of EndpointContext for sp_basic256");
UA_free(pc);
securityPolicy->policyContext = NULL;
}
static UA_StatusCode
updateCertificateAndPrivateKey_sp_basic256(UA_SecurityPolicy *securityPolicy,
const UA_ByteString newCertificate,
const UA_ByteString newPrivateKey) {
if(securityPolicy == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
if(securityPolicy->policyContext == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
Basic256_PolicyContext *pc = (Basic256_PolicyContext *)
securityPolicy->policyContext;
UA_ByteString_deleteMembers(&securityPolicy->localCertificate);
UA_StatusCode retval = UA_ByteString_allocBuffer(&securityPolicy->localCertificate,
newCertificate.length + 1);
if(retval != UA_STATUSCODE_GOOD)
return retval;
memcpy(securityPolicy->localCertificate.data, newCertificate.data, newCertificate.length);
securityPolicy->localCertificate.data[newCertificate.length] = '\0';
securityPolicy->localCertificate.length--;
/* Set the new private key */
mbedtls_pk_free(&pc->localPrivateKey);
mbedtls_pk_init(&pc->localPrivateKey);
int mbedErr = mbedtls_pk_parse_key(&pc->localPrivateKey,
newPrivateKey.data, newPrivateKey.length,
NULL, 0);
if(mbedErr) {
retval = UA_STATUSCODE_BADSECURITYCHECKSFAILED;
goto error;
}
retval = asym_makeThumbprint_sp_basic256(pc->securityPolicy,
&securityPolicy->localCertificate,
&pc->localCertThumbprint);
if(retval != UA_STATUSCODE_GOOD)
goto error;
return retval;
error:
UA_LOG_ERROR(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Could not update certificate and private key");
if(securityPolicy->policyContext != NULL)
deleteMembers_sp_basic256(securityPolicy);
return retval;
}
static UA_StatusCode
policyContext_newContext_sp_basic256(UA_SecurityPolicy *securityPolicy,
const UA_ByteString localPrivateKey) {
UA_StatusCode retval = UA_STATUSCODE_GOOD;
if(securityPolicy == NULL)
return UA_STATUSCODE_BADINTERNALERROR;
if (localPrivateKey.length == 0) {
UA_LOG_ERROR(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Can not initialize security policy. Private key is empty.");
return UA_STATUSCODE_BADINVALIDARGUMENT;
}
Basic256_PolicyContext *pc = (Basic256_PolicyContext *)
UA_malloc(sizeof(Basic256_PolicyContext));
securityPolicy->policyContext = (void *)pc;
if(!pc) {
retval = UA_STATUSCODE_BADOUTOFMEMORY;
goto error;
}
/* Initialize the PolicyContext */
memset(pc, 0, sizeof(Basic256_PolicyContext));
mbedtls_ctr_drbg_init(&pc->drbgContext);
mbedtls_entropy_init(&pc->entropyContext);
mbedtls_pk_init(&pc->localPrivateKey);
mbedtls_md_init(&pc->sha1MdContext);
pc->securityPolicy = securityPolicy;
/* Initialized the message digest */
const mbedtls_md_info_t *mdInfo = mbedtls_md_info_from_type(MBEDTLS_MD_SHA1);
int mbedErr = mbedtls_md_setup(&pc->sha1MdContext, mdInfo, MBEDTLS_MD_SHA1);
if(mbedErr) {
retval = UA_STATUSCODE_BADOUTOFMEMORY;
goto error;
}
/* Add the system entropy source */
mbedErr = mbedtls_entropy_add_source(&pc->entropyContext,
mbedtls_platform_entropy_poll, NULL, 0,
MBEDTLS_ENTROPY_SOURCE_STRONG);
if(mbedErr) {
retval = UA_STATUSCODE_BADSECURITYCHECKSFAILED;
goto error;
}
/* Seed the RNG */
char *personalization = "open62541-drbg";
mbedErr = mbedtls_ctr_drbg_seed(&pc->drbgContext, mbedtls_entropy_func,
&pc->entropyContext,
(const unsigned char *)personalization, 14);
if(mbedErr) {
retval = UA_STATUSCODE_BADSECURITYCHECKSFAILED;
goto error;
}
/* Set the private key */
mbedErr = mbedtls_pk_parse_key(&pc->localPrivateKey, localPrivateKey.data,
localPrivateKey.length, NULL, 0);
if(mbedErr) {
retval = UA_STATUSCODE_BADSECURITYCHECKSFAILED;
goto error;
}
/* Set the local certificate thumbprint */
retval = UA_ByteString_allocBuffer(&pc->localCertThumbprint, UA_SHA1_LENGTH);
if(retval != UA_STATUSCODE_GOOD)
goto error;
retval = asym_makeThumbprint_sp_basic256(pc->securityPolicy,
&securityPolicy->localCertificate,
&pc->localCertThumbprint);
if(retval != UA_STATUSCODE_GOOD)
goto error;
return UA_STATUSCODE_GOOD;
error:
UA_LOG_ERROR(securityPolicy->logger, UA_LOGCATEGORY_SECURITYPOLICY,
"Could not create securityContext: %s", UA_StatusCode_name(retval));
if(securityPolicy->policyContext != NULL)
deleteMembers_sp_basic256(securityPolicy);
return retval;
}
UA_StatusCode
UA_SecurityPolicy_Basic256(UA_SecurityPolicy *policy,
UA_CertificateVerification *certificateVerification,
const UA_ByteString localCertificate,
const UA_ByteString localPrivateKey, const UA_Logger *logger) {
memset(policy, 0, sizeof(UA_SecurityPolicy));
policy->logger = logger;
policy->policyUri = UA_STRING("http://opcfoundation.org/UA/SecurityPolicy#Basic256");
UA_SecurityPolicyAsymmetricModule *const asymmetricModule = &policy->asymmetricModule;
UA_SecurityPolicySymmetricModule *const symmetricModule = &policy->symmetricModule;
UA_SecurityPolicyChannelModule *const channelModule = &policy->channelModule;
/* Copy the certificate and add a NULL to the end */
UA_StatusCode retval =
UA_ByteString_allocBuffer(&policy->localCertificate, localCertificate.length + 1);
if(retval != UA_STATUSCODE_GOOD)
return retval;
memcpy(policy->localCertificate.data, localCertificate.data, localCertificate.length);
policy->localCertificate.data[localCertificate.length] = '\0';
policy->localCertificate.length--;
policy->certificateVerification = certificateVerification;
/* AsymmetricModule */
UA_SecurityPolicySignatureAlgorithm *asym_signatureAlgorithm =
&asymmetricModule->cryptoModule.signatureAlgorithm;
asym_signatureAlgorithm->uri =
UA_STRING("http://www.w3.org/2000/09/xmldsig#rsa-sha1\0");
asym_signatureAlgorithm->verify =
(UA_StatusCode (*)(const UA_SecurityPolicy *, void *,
const UA_ByteString *, const UA_ByteString *))asym_verify_sp_basic256;
asym_signatureAlgorithm->sign =
(UA_StatusCode (*)(const UA_SecurityPolicy *, void *,
const UA_ByteString *, UA_ByteString *))asym_sign_sp_basic256;
asym_signatureAlgorithm->getLocalSignatureSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))asym_getLocalSignatureSize_sp_basic256;
asym_signatureAlgorithm->getRemoteSignatureSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))asym_getRemoteSignatureSize_sp_basic256;
asym_signatureAlgorithm->getLocalKeyLength = NULL; // TODO: Write function
asym_signatureAlgorithm->getRemoteKeyLength = NULL; // TODO: Write function
UA_SecurityPolicyEncryptionAlgorithm *asym_encryptionAlgorithm =
&asymmetricModule->cryptoModule.encryptionAlgorithm;
asym_encryptionAlgorithm->uri = UA_STRING("http://www.w3.org/2001/04/xmlenc#rsa-oaep\0");
asym_encryptionAlgorithm->encrypt =
(UA_StatusCode(*)(const UA_SecurityPolicy *, void *, UA_ByteString *))asym_encrypt_sp_basic256;
asym_encryptionAlgorithm->decrypt =
(UA_StatusCode(*)(const UA_SecurityPolicy *, void *, UA_ByteString *))
asym_decrypt_sp_basic256;
asym_encryptionAlgorithm->getLocalKeyLength = NULL; // TODO: Write function
asym_encryptionAlgorithm->getRemoteKeyLength =
(size_t (*)(const UA_SecurityPolicy *, const void *))asym_getRemoteEncryptionKeyLength_sp_basic256;
asym_encryptionAlgorithm->getLocalBlockSize = NULL; // TODO: Write function
asym_encryptionAlgorithm->getRemoteBlockSize = (size_t (*)(const UA_SecurityPolicy *,
const void *))asym_getRemoteBlockSize_sp_basic256;
asym_encryptionAlgorithm->getLocalPlainTextBlockSize = NULL; // TODO: Write function
asym_encryptionAlgorithm->getRemotePlainTextBlockSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))asym_getRemotePlainTextBlockSize_sp_basic256;
asymmetricModule->makeCertificateThumbprint = asym_makeThumbprint_sp_basic256;
asymmetricModule->compareCertificateThumbprint =
asymmetricModule_compareCertificateThumbprint_sp_basic256;
/* SymmetricModule */
symmetricModule->generateKey = sym_generateKey_sp_basic256;
symmetricModule->generateNonce = sym_generateNonce_sp_basic256;
UA_SecurityPolicySignatureAlgorithm *sym_signatureAlgorithm =
&symmetricModule->cryptoModule.signatureAlgorithm;
sym_signatureAlgorithm->uri =
UA_STRING("http://www.w3.org/2000/09/xmldsig#hmac-sha1\0");
sym_signatureAlgorithm->verify =
(UA_StatusCode (*)(const UA_SecurityPolicy *, void *, const UA_ByteString *,
const UA_ByteString *))sym_verify_sp_basic256;
sym_signatureAlgorithm->sign =
(UA_StatusCode (*)(const UA_SecurityPolicy *, void *,
const UA_ByteString *, UA_ByteString *))sym_sign_sp_basic256;
sym_signatureAlgorithm->getLocalSignatureSize = sym_getSignatureSize_sp_basic256;
sym_signatureAlgorithm->getRemoteSignatureSize = sym_getSignatureSize_sp_basic256;
sym_signatureAlgorithm->getLocalKeyLength =
(size_t (*)(const UA_SecurityPolicy *,
const void *))sym_getSigningKeyLength_sp_basic256;
sym_signatureAlgorithm->getRemoteKeyLength =
(size_t (*)(const UA_SecurityPolicy *,
const void *))sym_getSigningKeyLength_sp_basic256;
UA_SecurityPolicyEncryptionAlgorithm *sym_encryptionAlgorithm =
&symmetricModule->cryptoModule.encryptionAlgorithm;
sym_encryptionAlgorithm->uri = UA_STRING("http://www.w3.org/2001/04/xmlenc#aes256-cbc\0");
sym_encryptionAlgorithm->encrypt =
(UA_StatusCode(*)(const UA_SecurityPolicy *, void *, UA_ByteString *))sym_encrypt_sp_basic256;
sym_encryptionAlgorithm->decrypt =
(UA_StatusCode(*)(const UA_SecurityPolicy *, void *, UA_ByteString *))sym_decrypt_sp_basic256;
sym_encryptionAlgorithm->getLocalKeyLength = sym_getEncryptionKeyLength_sp_basic256;
sym_encryptionAlgorithm->getRemoteKeyLength = sym_getEncryptionKeyLength_sp_basic256;
sym_encryptionAlgorithm->getLocalBlockSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))sym_getEncryptionBlockSize_sp_basic256;
sym_encryptionAlgorithm->getRemoteBlockSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))sym_getEncryptionBlockSize_sp_basic256;
sym_encryptionAlgorithm->getLocalPlainTextBlockSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))sym_getPlainTextBlockSize_sp_basic256;
sym_encryptionAlgorithm->getRemotePlainTextBlockSize =
(size_t (*)(const UA_SecurityPolicy *, const void *))sym_getPlainTextBlockSize_sp_basic256;
symmetricModule->secureChannelNonceLength = 32;
// Use the same signature algorithm as the asymmetric component for certificate signing (see standard)
policy->certificateSigningAlgorithm = policy->asymmetricModule.cryptoModule.signatureAlgorithm;
/* ChannelModule */
channelModule->newContext = channelContext_newContext_sp_basic256;
channelModule->deleteContext = (void (*)(void *))
channelContext_deleteContext_sp_basic256;
channelModule->setLocalSymEncryptingKey = (UA_StatusCode (*)(void *, const UA_ByteString *))
channelContext_setLocalSymEncryptingKey_sp_basic256;
channelModule->setLocalSymSigningKey = (UA_StatusCode (*)(void *, const UA_ByteString *))
channelContext_setLocalSymSigningKey_sp_basic256;
channelModule->setLocalSymIv = (UA_StatusCode (*)(void *, const UA_ByteString *))
channelContext_setLocalSymIv_sp_basic256;
channelModule->setRemoteSymEncryptingKey = (UA_StatusCode (*)(void *, const UA_ByteString *))
channelContext_setRemoteSymEncryptingKey_sp_basic256;
channelModule->setRemoteSymSigningKey = (UA_StatusCode (*)(void *, const UA_ByteString *))
channelContext_setRemoteSymSigningKey_sp_basic256;
channelModule->setRemoteSymIv = (UA_StatusCode (*)(void *, const UA_ByteString *))
channelContext_setRemoteSymIv_sp_basic256;
channelModule->compareCertificate = (UA_StatusCode (*)(const void *, const UA_ByteString *))
channelContext_compareCertificate_sp_basic256;
policy->updateCertificateAndPrivateKey = updateCertificateAndPrivateKey_sp_basic256;
policy->deleteMembers = deleteMembers_sp_basic256;
return policyContext_newContext_sp_basic256(policy, localPrivateKey);
}
#endif