2022-04-25 00:29:35 +04:00
|
|
|
/* $OpenBSD: x509_verify.c,v 1.54 2021/11/24 05:38:12 beck Exp $ */
|
2020-12-28 19:15:37 +04:00
|
|
|
/*
|
2022-04-25 00:29:35 +04:00
|
|
|
* Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org>
|
2020-12-28 19:15:37 +04:00
|
|
|
*
|
|
|
|
* Permission to use, copy, modify, and distribute this software for any
|
|
|
|
* purpose with or without fee is hereby granted, provided that the above
|
|
|
|
* copyright notice and this permission notice appear in all copies.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
|
|
|
|
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
|
|
|
|
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
|
|
|
|
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
|
|
|
|
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
|
|
|
|
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/* x509_verify - inspired by golang's crypto/x509.Verify */
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
#include <errno.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
|
|
|
#include <openssl/safestack.h>
|
|
|
|
#include <openssl/x509.h>
|
|
|
|
#include <openssl/x509v3.h>
|
|
|
|
|
|
|
|
#include "x509_internal.h"
|
|
|
|
#include "x509_issuer_cache.h"
|
|
|
|
|
|
|
|
static int x509_verify_cert_valid(struct x509_verify_ctx *ctx, X509 *cert,
|
|
|
|
struct x509_verify_chain *current_chain);
|
|
|
|
static void x509_verify_build_chains(struct x509_verify_ctx *ctx, X509 *cert,
|
2022-04-25 00:29:35 +04:00
|
|
|
struct x509_verify_chain *current_chain, int full_chain);
|
2020-12-28 19:15:37 +04:00
|
|
|
static int x509_verify_cert_error(struct x509_verify_ctx *ctx, X509 *cert,
|
|
|
|
size_t depth, int error, int ok);
|
|
|
|
static void x509_verify_chain_free(struct x509_verify_chain *chain);
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/*
|
|
|
|
* Parse an asn1 to a representable time_t as per RFC 5280 rules.
|
|
|
|
* Returns -1 if that can't be done for any reason.
|
|
|
|
*/
|
|
|
|
time_t
|
|
|
|
x509_verify_asn1_time_to_time_t(const ASN1_TIME *atime, int notAfter)
|
|
|
|
{
|
|
|
|
struct tm tm = { 0 };
|
|
|
|
int type;
|
|
|
|
|
|
|
|
type = ASN1_time_parse(atime->data, atime->length, &tm, atime->type);
|
|
|
|
if (type == -1)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* RFC 5280 section 4.1.2.5 */
|
|
|
|
if (tm.tm_year < 150 && type != V_ASN1_UTCTIME)
|
|
|
|
return -1;
|
|
|
|
if (tm.tm_year >= 150 && type != V_ASN1_GENERALIZEDTIME)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (notAfter) {
|
|
|
|
/*
|
|
|
|
* If we are a completely broken operating system with a
|
|
|
|
* 32 bit time_t, and we have been told this is a notAfter
|
|
|
|
* date, limit the date to a 32 bit representable value.
|
|
|
|
*/
|
|
|
|
if (!ASN1_time_tm_clamp_notafter(&tm))
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Defensively fail if the time string is not representable as
|
|
|
|
* a time_t. A time_t must be sane if you care about times after
|
|
|
|
* Jan 19 2038.
|
|
|
|
*/
|
|
|
|
return timegm(&tm);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cache certificate hash, and values parsed out of an X509.
|
|
|
|
* called from cache_extensions()
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
x509_verify_cert_info_populate(X509 *cert)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Parse and save the cert times, or remember that they
|
|
|
|
* are unacceptable/unparsable.
|
|
|
|
*/
|
|
|
|
cert->not_before = x509_verify_asn1_time_to_time_t(X509_get_notBefore(cert), 0);
|
|
|
|
cert->not_after = x509_verify_asn1_time_to_time_t(X509_get_notAfter(cert), 1);
|
|
|
|
}
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
struct x509_verify_chain *
|
|
|
|
x509_verify_chain_new(void)
|
|
|
|
{
|
|
|
|
struct x509_verify_chain *chain;
|
|
|
|
|
|
|
|
if ((chain = calloc(1, sizeof(*chain))) == NULL)
|
|
|
|
goto err;
|
|
|
|
if ((chain->certs = sk_X509_new_null()) == NULL)
|
|
|
|
goto err;
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((chain->cert_errors = calloc(X509_VERIFY_MAX_CHAIN_CERTS,
|
|
|
|
sizeof(int))) == NULL)
|
|
|
|
goto err;
|
|
|
|
if ((chain->names =
|
|
|
|
x509_constraints_names_new(X509_VERIFY_MAX_CHAIN_NAMES)) == NULL)
|
2020-12-28 19:15:37 +04:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
return chain;
|
|
|
|
err:
|
|
|
|
x509_verify_chain_free(chain);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
x509_verify_chain_clear(struct x509_verify_chain *chain)
|
|
|
|
{
|
|
|
|
sk_X509_pop_free(chain->certs, X509_free);
|
|
|
|
chain->certs = NULL;
|
2022-04-25 00:29:35 +04:00
|
|
|
free(chain->cert_errors);
|
|
|
|
chain->cert_errors = NULL;
|
2020-12-28 19:15:37 +04:00
|
|
|
x509_constraints_names_free(chain->names);
|
|
|
|
chain->names = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
x509_verify_chain_free(struct x509_verify_chain *chain)
|
|
|
|
{
|
|
|
|
if (chain == NULL)
|
|
|
|
return;
|
|
|
|
x509_verify_chain_clear(chain);
|
|
|
|
free(chain);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct x509_verify_chain *
|
|
|
|
x509_verify_chain_dup(struct x509_verify_chain *chain)
|
|
|
|
{
|
|
|
|
struct x509_verify_chain *new_chain;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((new_chain = calloc(1, sizeof(*chain))) == NULL)
|
2020-12-28 19:15:37 +04:00
|
|
|
goto err;
|
|
|
|
if ((new_chain->certs = X509_chain_up_ref(chain->certs)) == NULL)
|
|
|
|
goto err;
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((new_chain->cert_errors = calloc(X509_VERIFY_MAX_CHAIN_CERTS,
|
|
|
|
sizeof(int))) == NULL)
|
|
|
|
goto err;
|
|
|
|
memcpy(new_chain->cert_errors, chain->cert_errors,
|
|
|
|
X509_VERIFY_MAX_CHAIN_CERTS * sizeof(int));
|
2020-12-28 19:15:37 +04:00
|
|
|
if ((new_chain->names =
|
|
|
|
x509_constraints_names_dup(chain->names)) == NULL)
|
|
|
|
goto err;
|
|
|
|
return(new_chain);
|
|
|
|
err:
|
|
|
|
x509_verify_chain_free(new_chain);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_chain_append(struct x509_verify_chain *chain, X509 *cert,
|
|
|
|
int *error)
|
|
|
|
{
|
|
|
|
int verify_err = X509_V_ERR_UNSPECIFIED;
|
2022-04-25 00:29:35 +04:00
|
|
|
size_t idx;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
if (!x509_constraints_extract_names(chain->names, cert,
|
|
|
|
sk_X509_num(chain->certs) == 0, &verify_err)) {
|
|
|
|
*error = verify_err;
|
|
|
|
return 0;
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
X509_up_ref(cert);
|
|
|
|
if (!sk_X509_push(chain->certs, cert)) {
|
|
|
|
X509_free(cert);
|
|
|
|
*error = X509_V_ERR_OUT_OF_MEM;
|
|
|
|
return 0;
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
|
|
|
|
idx = sk_X509_num(chain->certs) - 1;
|
|
|
|
chain->cert_errors[idx] = *error;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We've just added the issuer for the previous certificate,
|
|
|
|
* clear its error if appropriate.
|
|
|
|
*/
|
|
|
|
if (idx > 1 && chain->cert_errors[idx - 1] ==
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY)
|
|
|
|
chain->cert_errors[idx - 1] = X509_V_OK;
|
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static X509 *
|
|
|
|
x509_verify_chain_last(struct x509_verify_chain *chain)
|
|
|
|
{
|
|
|
|
int last;
|
|
|
|
|
|
|
|
if (chain->certs == NULL)
|
|
|
|
return NULL;
|
|
|
|
if ((last = sk_X509_num(chain->certs) - 1) < 0)
|
|
|
|
return NULL;
|
|
|
|
return sk_X509_value(chain->certs, last);
|
|
|
|
}
|
|
|
|
|
|
|
|
X509 *
|
|
|
|
x509_verify_chain_leaf(struct x509_verify_chain *chain)
|
|
|
|
{
|
|
|
|
if (chain->certs == NULL)
|
|
|
|
return NULL;
|
|
|
|
return sk_X509_value(chain->certs, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
x509_verify_ctx_reset(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < ctx->chains_count; i++)
|
|
|
|
x509_verify_chain_free(ctx->chains[i]);
|
2022-04-25 00:29:35 +04:00
|
|
|
sk_X509_pop_free(ctx->saved_error_chain, X509_free);
|
|
|
|
ctx->saved_error = 0;
|
|
|
|
ctx->saved_error_depth = 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
ctx->error = 0;
|
|
|
|
ctx->error_depth = 0;
|
|
|
|
ctx->chains_count = 0;
|
|
|
|
ctx->sig_checks = 0;
|
|
|
|
ctx->check_time = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
x509_verify_ctx_clear(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
x509_verify_ctx_reset(ctx);
|
|
|
|
sk_X509_pop_free(ctx->intermediates, X509_free);
|
|
|
|
free(ctx->chains);
|
|
|
|
memset(ctx, 0, sizeof(*ctx));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_cert_cache_extensions(X509 *cert) {
|
|
|
|
if (!(cert->ex_flags & EXFLAG_SET)) {
|
|
|
|
CRYPTO_w_lock(CRYPTO_LOCK_X509);
|
|
|
|
x509v3_cache_extensions(cert);
|
|
|
|
CRYPTO_w_unlock(CRYPTO_LOCK_X509);
|
|
|
|
}
|
|
|
|
if (cert->ex_flags & EXFLAG_INVALID)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return (cert->ex_flags & EXFLAG_SET);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_cert_self_signed(X509 *cert)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
2022-04-25 00:29:35 +04:00
|
|
|
return (cert->ex_flags & EXFLAG_SS) ? 1 : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_ctx_cert_is_root(struct x509_verify_ctx *ctx, X509 *cert,
|
|
|
|
int full_chain)
|
|
|
|
{
|
|
|
|
X509 *match = NULL;
|
2020-12-28 19:15:37 +04:00
|
|
|
int i;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_cert_cache_extensions(cert))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* Check by lookup if we have a legacy xsc */
|
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
if ((match = x509_vfy_lookup_cert_match(ctx->xsc,
|
|
|
|
cert)) != NULL) {
|
|
|
|
X509_free(match);
|
|
|
|
return !full_chain ||
|
|
|
|
x509_verify_cert_self_signed(cert);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Check the provided roots */
|
|
|
|
for (i = 0; i < sk_X509_num(ctx->roots); i++) {
|
|
|
|
if (X509_cmp(sk_X509_value(ctx->roots, i), cert) == 0)
|
|
|
|
return !full_chain ||
|
|
|
|
x509_verify_cert_self_signed(cert);
|
|
|
|
}
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_ctx_set_xsc_chain(struct x509_verify_ctx *ctx,
|
2022-04-25 00:29:35 +04:00
|
|
|
struct x509_verify_chain *chain, int set_error, int is_trusted)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
2022-04-25 00:29:35 +04:00
|
|
|
size_t num_untrusted;
|
|
|
|
int i;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
if (ctx->xsc == NULL)
|
|
|
|
return 1;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/*
|
|
|
|
* XXX num_untrusted is the number of untrusted certs at the
|
|
|
|
* bottom of the chain. This works now since we stop at the first
|
|
|
|
* trusted cert. This will need fixing once we allow more than one
|
|
|
|
* trusted certificate.
|
|
|
|
*/
|
|
|
|
num_untrusted = sk_X509_num(chain->certs);
|
|
|
|
if (is_trusted && num_untrusted > 0)
|
|
|
|
num_untrusted--;
|
|
|
|
ctx->xsc->num_untrusted = num_untrusted;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
sk_X509_pop_free(ctx->xsc->chain, X509_free);
|
|
|
|
ctx->xsc->chain = X509_chain_up_ref(chain->certs);
|
|
|
|
if (ctx->xsc->chain == NULL)
|
2022-04-25 00:29:35 +04:00
|
|
|
return x509_verify_cert_error(ctx, NULL, 0,
|
2020-12-28 19:15:37 +04:00
|
|
|
X509_V_ERR_OUT_OF_MEM, 0);
|
2022-04-25 00:29:35 +04:00
|
|
|
|
|
|
|
if (set_error) {
|
|
|
|
ctx->xsc->error = X509_V_OK;
|
|
|
|
ctx->xsc->error_depth = 0;
|
|
|
|
for (i = 0; i < sk_X509_num(chain->certs); i++) {
|
|
|
|
if (chain->cert_errors[i] != X509_V_OK) {
|
|
|
|
ctx->xsc->error = chain->cert_errors[i];
|
|
|
|
ctx->xsc->error_depth = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Save the error state and unvalidated chain off of the xsc for
|
|
|
|
* later.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
x509_verify_ctx_save_xsc_error(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
if (ctx->xsc != NULL && ctx->xsc->chain != NULL) {
|
|
|
|
sk_X509_pop_free(ctx->saved_error_chain, X509_free);
|
|
|
|
ctx->saved_error_chain = X509_chain_up_ref(ctx->xsc->chain);
|
|
|
|
if (ctx->saved_error_chain == NULL)
|
|
|
|
return x509_verify_cert_error(ctx, NULL, 0,
|
|
|
|
X509_V_ERR_OUT_OF_MEM, 0);
|
|
|
|
ctx->saved_error = ctx->xsc->error;
|
|
|
|
ctx->saved_error_depth = ctx->xsc->error_depth;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Restore the saved error state and unvalidated chain to the xsc
|
|
|
|
* if we do not have a validated chain.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
x509_verify_ctx_restore_xsc_error(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
if (ctx->xsc != NULL && ctx->chains_count == 0 &&
|
|
|
|
ctx->saved_error_chain != NULL) {
|
|
|
|
sk_X509_pop_free(ctx->xsc->chain, X509_free);
|
|
|
|
ctx->xsc->chain = X509_chain_up_ref(ctx->saved_error_chain);
|
|
|
|
if (ctx->xsc->chain == NULL)
|
|
|
|
return x509_verify_cert_error(ctx, NULL, 0,
|
|
|
|
X509_V_ERR_OUT_OF_MEM, 0);
|
|
|
|
ctx->xsc->error = ctx->saved_error;
|
|
|
|
ctx->xsc->error_depth = ctx->saved_error_depth;
|
|
|
|
}
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Perform legacy style validation of a chain */
|
|
|
|
static int
|
|
|
|
x509_verify_ctx_validate_legacy_chain(struct x509_verify_ctx *ctx,
|
|
|
|
struct x509_verify_chain *chain, size_t depth)
|
|
|
|
{
|
|
|
|
int ret = 0, trust;
|
|
|
|
|
|
|
|
if (ctx->xsc == NULL)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we have a legacy xsc, choose a validated chain, and
|
|
|
|
* apply the extensions, revocation, and policy checks just
|
|
|
|
* like the legacy code did. We do this here instead of as
|
|
|
|
* building the chains to more easily support the callback and
|
|
|
|
* the bewildering array of VERIFY_PARAM knobs that are there
|
|
|
|
* for the fiddling.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* These may be set in one of the following calls. */
|
|
|
|
ctx->xsc->error = X509_V_OK;
|
|
|
|
ctx->xsc->error_depth = 0;
|
|
|
|
|
|
|
|
trust = x509_vfy_check_trust(ctx->xsc);
|
|
|
|
if (trust == X509_TRUST_REJECTED)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (!x509_verify_ctx_set_xsc_chain(ctx, chain, 0, 1))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* XXX currently this duplicates some work done in chain
|
|
|
|
* build, but we keep it here until we have feature parity
|
|
|
|
*/
|
|
|
|
if (!x509_vfy_check_chain_extensions(ctx->xsc))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
#ifndef OPENSSL_NO_RFC3779
|
|
|
|
if (!X509v3_asid_validate_path(ctx->xsc))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (!X509v3_addr_validate_path(ctx->xsc))
|
|
|
|
goto err;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (!x509_constraints_chain(ctx->xsc->chain,
|
|
|
|
&ctx->xsc->error, &ctx->xsc->error_depth)) {
|
|
|
|
X509 *cert = sk_X509_value(ctx->xsc->chain, depth);
|
|
|
|
if (!x509_verify_cert_error(ctx, cert,
|
|
|
|
ctx->xsc->error_depth, ctx->xsc->error, 0))
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!x509_vfy_check_revocation(ctx->xsc))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (!x509_vfy_check_policy(ctx->xsc))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if ((!(ctx->xsc->param->flags & X509_V_FLAG_PARTIAL_CHAIN)) &&
|
|
|
|
trust != X509_TRUST_TRUSTED)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
|
|
|
|
err:
|
|
|
|
/*
|
|
|
|
* The above checks may have set ctx->xsc->error and
|
|
|
|
* ctx->xsc->error_depth - save these for later on.
|
|
|
|
*/
|
|
|
|
if (ctx->xsc->error != X509_V_OK) {
|
|
|
|
if (ctx->xsc->error_depth < 0 ||
|
|
|
|
ctx->xsc->error_depth >= X509_VERIFY_MAX_CHAIN_CERTS)
|
|
|
|
return 0;
|
|
|
|
chain->cert_errors[ctx->xsc->error_depth] =
|
|
|
|
ctx->xsc->error;
|
|
|
|
ctx->error_depth = ctx->xsc->error_depth;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
/* Add a validated chain to our list of valid chains */
|
|
|
|
static int
|
|
|
|
x509_verify_ctx_add_chain(struct x509_verify_ctx *ctx,
|
|
|
|
struct x509_verify_chain *chain)
|
|
|
|
{
|
|
|
|
size_t depth;
|
|
|
|
X509 *last = x509_verify_chain_last(chain);
|
|
|
|
|
|
|
|
depth = sk_X509_num(chain->certs);
|
|
|
|
if (depth > 0)
|
|
|
|
depth--;
|
|
|
|
|
|
|
|
if (ctx->chains_count >= ctx->max_chains)
|
|
|
|
return x509_verify_cert_error(ctx, last, depth,
|
|
|
|
X509_V_ERR_CERT_CHAIN_TOO_LONG, 0);
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/* Clear a get issuer failure for a root certificate. */
|
|
|
|
if (chain->cert_errors[depth] ==
|
|
|
|
X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY)
|
|
|
|
chain->cert_errors[depth] = X509_V_OK;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_ctx_validate_legacy_chain(ctx, chain, depth))
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
/*
|
2022-04-25 00:29:35 +04:00
|
|
|
* In the non-legacy code, extensions and purpose are dealt
|
|
|
|
* with as the chain is built.
|
2020-12-28 19:15:37 +04:00
|
|
|
*
|
|
|
|
* The non-legacy api returns multiple chains but does not do
|
|
|
|
* any revocation checking (it must be done by the caller on
|
|
|
|
* any chain they wish to use)
|
|
|
|
*/
|
|
|
|
|
|
|
|
if ((ctx->chains[ctx->chains_count] = x509_verify_chain_dup(chain)) ==
|
|
|
|
NULL) {
|
|
|
|
return x509_verify_cert_error(ctx, last, depth,
|
|
|
|
X509_V_ERR_OUT_OF_MEM, 0);
|
|
|
|
}
|
|
|
|
ctx->chains_count++;
|
|
|
|
ctx->error = X509_V_OK;
|
|
|
|
ctx->error_depth = depth;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_potential_parent(struct x509_verify_ctx *ctx, X509 *parent,
|
|
|
|
X509 *child)
|
|
|
|
{
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_cert_cache_extensions(parent))
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
if (ctx->xsc != NULL)
|
|
|
|
return (ctx->xsc->check_issued(ctx->xsc, child, parent));
|
|
|
|
|
|
|
|
/* XXX key usage */
|
|
|
|
return X509_check_issued(child, parent) != X509_V_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_parent_signature(X509 *parent, X509 *child, int *error)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
|
|
|
EVP_PKEY *pkey;
|
|
|
|
int cached;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
/* Use cached value if we have it */
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((cached = x509_issuer_cache_find(parent->hash, child->hash)) >= 0)
|
|
|
|
return cached;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
/* Check signature. Did parent sign child? */
|
|
|
|
if ((pkey = X509_get_pubkey(parent)) == NULL) {
|
|
|
|
*error = X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (X509_verify(child, pkey) <= 0)
|
|
|
|
*error = X509_V_ERR_CERT_SIGNATURE_FAILURE;
|
|
|
|
else
|
|
|
|
ret = 1;
|
|
|
|
|
|
|
|
/* Add result to cache */
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_issuer_cache_add(parent->hash, child->hash, ret);
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
EVP_PKEY_free(pkey);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_consider_candidate(struct x509_verify_ctx *ctx, X509 *cert,
|
2022-04-25 00:29:35 +04:00
|
|
|
int is_root_cert, X509 *candidate, struct x509_verify_chain *current_chain,
|
|
|
|
int full_chain)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
|
|
|
int depth = sk_X509_num(current_chain->certs);
|
|
|
|
struct x509_verify_chain *new_chain;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* Fail if the certificate is already in the chain */
|
|
|
|
for (i = 0; i < sk_X509_num(current_chain->certs); i++) {
|
|
|
|
if (X509_cmp(sk_X509_value(current_chain->certs, i),
|
|
|
|
candidate) == 0)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ctx->sig_checks++ > X509_VERIFY_MAX_SIGCHECKS) {
|
|
|
|
/* don't allow callback to override safety check */
|
|
|
|
(void) x509_verify_cert_error(ctx, candidate, depth,
|
|
|
|
X509_V_ERR_CERT_CHAIN_TOO_LONG, 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_parent_signature(candidate, cert, &ctx->error)) {
|
|
|
|
if (!x509_verify_cert_error(ctx, candidate, depth,
|
|
|
|
ctx->error, 0))
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!x509_verify_cert_valid(ctx, candidate, current_chain))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* candidate is good, add it to a copy of the current chain */
|
|
|
|
if ((new_chain = x509_verify_chain_dup(current_chain)) == NULL) {
|
|
|
|
x509_verify_cert_error(ctx, candidate, depth,
|
|
|
|
X509_V_ERR_OUT_OF_MEM, 0);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (!x509_verify_chain_append(new_chain, candidate, &ctx->error)) {
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_cert_error(ctx, candidate, depth, ctx->error, 0);
|
2020-12-28 19:15:37 +04:00
|
|
|
x509_verify_chain_free(new_chain);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If candidate is a trusted root, we have a validated chain,
|
|
|
|
* so we save it. Otherwise, recurse until we find a root or
|
|
|
|
* give up.
|
|
|
|
*/
|
|
|
|
if (is_root_cert) {
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_ctx_set_xsc_chain(ctx, new_chain, 0, 1)) {
|
2020-12-28 19:15:37 +04:00
|
|
|
x509_verify_chain_free(new_chain);
|
|
|
|
return 0;
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_ctx_add_chain(ctx, new_chain)) {
|
|
|
|
x509_verify_chain_free(new_chain);
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
goto done;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_build_chains(ctx, candidate, new_chain, full_chain);
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
done:
|
|
|
|
x509_verify_chain_free(new_chain);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_cert_error(struct x509_verify_ctx *ctx, X509 *cert, size_t depth,
|
|
|
|
int error, int ok)
|
|
|
|
{
|
|
|
|
ctx->error = error;
|
|
|
|
ctx->error_depth = depth;
|
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
ctx->xsc->error = error;
|
|
|
|
ctx->xsc->error_depth = depth;
|
|
|
|
ctx->xsc->current_cert = cert;
|
|
|
|
return ctx->xsc->verify_cb(ok, ctx->xsc);
|
|
|
|
}
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
x509_verify_build_chains(struct x509_verify_ctx *ctx, X509 *cert,
|
2022-04-25 00:29:35 +04:00
|
|
|
struct x509_verify_chain *current_chain, int full_chain)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
|
|
|
X509 *candidate;
|
2022-04-25 00:29:35 +04:00
|
|
|
int i, depth, count, ret, is_root;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we are finding chains with an xsc, just stop after we have
|
|
|
|
* one chain, there's no point in finding more, it just exercises
|
|
|
|
* the potentially buggy callback processing in the calling software.
|
|
|
|
*/
|
|
|
|
if (ctx->xsc != NULL && ctx->chains_count > 0)
|
|
|
|
return;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
depth = sk_X509_num(current_chain->certs);
|
|
|
|
if (depth > 0)
|
|
|
|
depth--;
|
|
|
|
|
|
|
|
if (depth >= ctx->max_depth &&
|
|
|
|
!x509_verify_cert_error(ctx, cert, depth,
|
|
|
|
X509_V_ERR_CERT_CHAIN_TOO_LONG, 0))
|
|
|
|
return;
|
|
|
|
|
|
|
|
count = ctx->chains_count;
|
2022-04-25 00:29:35 +04:00
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
ctx->error = X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY;
|
|
|
|
ctx->error_depth = depth;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if (ctx->saved_error != 0)
|
|
|
|
ctx->error = ctx->saved_error;
|
|
|
|
if (ctx->saved_error_depth != 0)
|
|
|
|
ctx->error_depth = ctx->saved_error_depth;
|
|
|
|
|
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
/*
|
|
|
|
* Long ago experiments at Muppet labs resulted in a
|
|
|
|
* situation where software not only sees these errors
|
|
|
|
* but forced developers to expect them in certain cases.
|
|
|
|
* so we must mimic this awfulness for the legacy case.
|
|
|
|
*/
|
|
|
|
if (cert->ex_flags & EXFLAG_SS)
|
|
|
|
ctx->error = (depth == 0) ?
|
|
|
|
X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT:
|
|
|
|
X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check for legacy mode roots */
|
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
if ((ret = ctx->xsc->get_issuer(&candidate, ctx->xsc, cert)) < 0) {
|
|
|
|
x509_verify_cert_error(ctx, cert, depth,
|
|
|
|
X509_V_ERR_STORE_LOOKUP, 0);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (ret > 0) {
|
|
|
|
if (x509_verify_potential_parent(ctx, candidate, cert)) {
|
|
|
|
is_root = !full_chain ||
|
|
|
|
x509_verify_cert_self_signed(candidate);
|
|
|
|
x509_verify_consider_candidate(ctx, cert,
|
|
|
|
is_root, candidate, current_chain,
|
|
|
|
full_chain);
|
|
|
|
}
|
|
|
|
X509_free(candidate);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Check to see if we have a trusted root issuer. */
|
|
|
|
for (i = 0; i < sk_X509_num(ctx->roots); i++) {
|
|
|
|
candidate = sk_X509_value(ctx->roots, i);
|
|
|
|
if (x509_verify_potential_parent(ctx, candidate, cert)) {
|
|
|
|
is_root = !full_chain ||
|
|
|
|
x509_verify_cert_self_signed(candidate);
|
|
|
|
x509_verify_consider_candidate(ctx, cert,
|
|
|
|
is_root, candidate, current_chain,
|
|
|
|
full_chain);
|
|
|
|
}
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/* Check intermediates after checking roots */
|
2020-12-28 19:15:37 +04:00
|
|
|
if (ctx->intermediates != NULL) {
|
|
|
|
for (i = 0; i < sk_X509_num(ctx->intermediates); i++) {
|
|
|
|
candidate = sk_X509_value(ctx->intermediates, i);
|
|
|
|
if (x509_verify_potential_parent(ctx, candidate, cert)) {
|
|
|
|
x509_verify_consider_candidate(ctx, cert,
|
2022-04-25 00:29:35 +04:00
|
|
|
0, candidate, current_chain,
|
|
|
|
full_chain);
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
|
2020-12-28 19:15:37 +04:00
|
|
|
if (ctx->chains_count > count) {
|
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
ctx->xsc->error = X509_V_OK;
|
|
|
|
ctx->xsc->error_depth = depth;
|
|
|
|
ctx->xsc->current_cert = cert;
|
|
|
|
}
|
|
|
|
} else if (ctx->error_depth == depth) {
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_ctx_set_xsc_chain(ctx, current_chain, 0, 0))
|
|
|
|
return;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_cert_hostname(struct x509_verify_ctx *ctx, X509 *cert, char *name)
|
|
|
|
{
|
|
|
|
char *candidate;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
if (name == NULL) {
|
2022-04-25 00:29:35 +04:00
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if ((ret = x509_vfy_check_id(ctx->xsc)) == 0)
|
|
|
|
ctx->error = ctx->xsc->error;
|
|
|
|
return ret;
|
|
|
|
}
|
2020-12-28 19:15:37 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if ((candidate = strdup(name)) == NULL) {
|
|
|
|
ctx->error = X509_V_ERR_OUT_OF_MEM;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if ((len = strlen(candidate)) < 1) {
|
|
|
|
ctx->error = X509_V_ERR_UNSPECIFIED; /* XXX */
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* IP addresses may be written in [ ]. */
|
|
|
|
if (candidate[0] == '[' && candidate[len - 1] == ']') {
|
|
|
|
candidate[len - 1] = '\0';
|
|
|
|
if (X509_check_ip_asc(cert, candidate + 1, 0) <= 0) {
|
|
|
|
ctx->error = X509_V_ERR_IP_ADDRESS_MISMATCH;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
int flags = 0;
|
|
|
|
|
|
|
|
if (ctx->xsc == NULL)
|
|
|
|
flags = X509_CHECK_FLAG_NEVER_CHECK_SUBJECT;
|
|
|
|
|
|
|
|
if (X509_check_host(cert, candidate, len, flags, NULL) <= 0) {
|
|
|
|
ctx->error = X509_V_ERR_HOSTNAME_MISMATCH;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
free(candidate);
|
|
|
|
return 1;
|
|
|
|
err:
|
|
|
|
free(candidate);
|
|
|
|
return x509_verify_cert_error(ctx, cert, 0, ctx->error, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_set_check_time(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
2020-12-28 19:15:37 +04:00
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
if (ctx->xsc->param->flags & X509_V_FLAG_USE_CHECK_TIME) {
|
|
|
|
ctx->check_time = &ctx->xsc->param->check_time;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
if (ctx->xsc->param->flags & X509_V_FLAG_NO_CHECK_TIME)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx->check_time = NULL;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_cert_times(X509 *cert, time_t *cmp_time, int *error)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
|
|
|
time_t when;
|
|
|
|
|
|
|
|
if (cmp_time == NULL)
|
|
|
|
when = time(NULL);
|
|
|
|
else
|
|
|
|
when = *cmp_time;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if (cert->not_before == -1) {
|
|
|
|
*error = X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD;
|
2020-12-28 19:15:37 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
if (when < cert->not_before) {
|
|
|
|
*error = X509_V_ERR_CERT_NOT_YET_VALID;
|
2020-12-28 19:15:37 +04:00
|
|
|
return 0;
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
if (cert->not_after == -1) {
|
|
|
|
*error = X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (when > cert->not_after) {
|
|
|
|
*error = X509_V_ERR_CERT_HAS_EXPIRED;
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_validate_constraints(X509 *cert,
|
|
|
|
struct x509_verify_chain *current_chain, int *error)
|
|
|
|
{
|
|
|
|
struct x509_constraints_names *excluded = NULL;
|
|
|
|
struct x509_constraints_names *permitted = NULL;
|
|
|
|
int err = X509_V_ERR_UNSPECIFIED;
|
|
|
|
|
|
|
|
if (current_chain == NULL)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (cert->nc != NULL) {
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((permitted = x509_constraints_names_new(
|
|
|
|
X509_VERIFY_MAX_CHAIN_CONSTRAINTS)) == NULL) {
|
2020-12-28 19:15:37 +04:00
|
|
|
err = X509_V_ERR_OUT_OF_MEM;
|
|
|
|
goto err;
|
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((excluded = x509_constraints_names_new(
|
|
|
|
X509_VERIFY_MAX_CHAIN_CONSTRAINTS)) == NULL) {
|
2020-12-28 19:15:37 +04:00
|
|
|
err = X509_V_ERR_OUT_OF_MEM;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (!x509_constraints_extract_constraints(cert,
|
|
|
|
permitted, excluded, &err))
|
|
|
|
goto err;
|
|
|
|
if (!x509_constraints_check(current_chain->names,
|
|
|
|
permitted, excluded, &err))
|
|
|
|
goto err;
|
|
|
|
x509_constraints_names_free(excluded);
|
|
|
|
x509_constraints_names_free(permitted);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
err:
|
|
|
|
*error = err;
|
|
|
|
x509_constraints_names_free(excluded);
|
|
|
|
x509_constraints_names_free(permitted);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
x509_verify_cert_extensions(struct x509_verify_ctx *ctx, X509 *cert, int need_ca)
|
|
|
|
{
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_cert_cache_extensions(cert)) {
|
|
|
|
ctx->error = X509_V_ERR_UNSPECIFIED;
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ctx->xsc != NULL)
|
|
|
|
return 1; /* legacy is checked after chain is built */
|
|
|
|
|
|
|
|
if (cert->ex_flags & EXFLAG_CRITICAL) {
|
|
|
|
ctx->error = X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* No we don't care about v1, netscape, and other ancient silliness */
|
|
|
|
if (need_ca && (!(cert->ex_flags & EXFLAG_BCONS) &&
|
|
|
|
(cert->ex_flags & EXFLAG_CA))) {
|
|
|
|
ctx->error = X509_V_ERR_INVALID_CA;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
if (ctx->purpose > 0 && X509_check_purpose(cert, ctx->purpose, need_ca)) {
|
|
|
|
ctx->error = X509_V_ERR_INVALID_PURPOSE;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* XXX support proxy certs later in new api */
|
|
|
|
if (ctx->xsc == NULL && cert->ex_flags & EXFLAG_PROXY) {
|
|
|
|
ctx->error = X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate that cert is a possible candidate to append to current_chain */
|
|
|
|
static int
|
|
|
|
x509_verify_cert_valid(struct x509_verify_ctx *ctx, X509 *cert,
|
|
|
|
struct x509_verify_chain *current_chain)
|
|
|
|
{
|
|
|
|
X509 *issuer_candidate;
|
|
|
|
int should_be_ca = current_chain != NULL;
|
|
|
|
size_t depth = 0;
|
|
|
|
|
|
|
|
if (current_chain != NULL)
|
|
|
|
depth = sk_X509_num(current_chain->certs);
|
|
|
|
|
|
|
|
if (!x509_verify_cert_extensions(ctx, cert, should_be_ca))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (should_be_ca) {
|
|
|
|
issuer_candidate = x509_verify_chain_last(current_chain);
|
|
|
|
if (issuer_candidate != NULL &&
|
|
|
|
!X509_check_issued(issuer_candidate, cert))
|
|
|
|
if (!x509_verify_cert_error(ctx, cert, depth,
|
|
|
|
X509_V_ERR_SUBJECT_ISSUER_MISMATCH, 0))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (x509_verify_set_check_time(ctx)) {
|
2022-04-25 00:29:35 +04:00
|
|
|
if (!x509_verify_cert_times(cert, ctx->check_time,
|
|
|
|
&ctx->error)) {
|
2020-12-28 19:15:37 +04:00
|
|
|
if (!x509_verify_cert_error(ctx, cert, depth,
|
|
|
|
ctx->error, 0))
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!x509_verify_validate_constraints(cert, current_chain,
|
|
|
|
&ctx->error) && !x509_verify_cert_error(ctx, cert, depth,
|
|
|
|
ctx->error, 0))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct x509_verify_ctx *
|
2022-04-25 00:29:35 +04:00
|
|
|
x509_verify_ctx_new_from_xsc(X509_STORE_CTX *xsc)
|
2020-12-28 19:15:37 +04:00
|
|
|
{
|
|
|
|
struct x509_verify_ctx *ctx;
|
|
|
|
size_t max_depth;
|
|
|
|
|
|
|
|
if (xsc == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if ((ctx = x509_verify_ctx_new(NULL)) == NULL)
|
2020-12-28 19:15:37 +04:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
ctx->xsc = xsc;
|
|
|
|
|
|
|
|
if (xsc->untrusted &&
|
|
|
|
(ctx->intermediates = X509_chain_up_ref(xsc->untrusted)) == NULL)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
max_depth = X509_VERIFY_MAX_CHAIN_CERTS;
|
|
|
|
if (xsc->param->depth > 0 && xsc->param->depth < X509_VERIFY_MAX_CHAIN_CERTS)
|
|
|
|
max_depth = xsc->param->depth;
|
|
|
|
if (!x509_verify_ctx_set_max_depth(ctx, max_depth))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return ctx;
|
|
|
|
err:
|
|
|
|
x509_verify_ctx_free(ctx);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Public API */
|
|
|
|
|
|
|
|
struct x509_verify_ctx *
|
|
|
|
x509_verify_ctx_new(STACK_OF(X509) *roots)
|
|
|
|
{
|
|
|
|
struct x509_verify_ctx *ctx;
|
|
|
|
|
|
|
|
if ((ctx = calloc(1, sizeof(struct x509_verify_ctx))) == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
if (roots != NULL) {
|
|
|
|
if ((ctx->roots = X509_chain_up_ref(roots)) == NULL)
|
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
if ((ctx->roots = sk_X509_new_null()) == NULL)
|
|
|
|
goto err;
|
|
|
|
}
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
ctx->max_depth = X509_VERIFY_MAX_CHAIN_CERTS;
|
|
|
|
ctx->max_chains = X509_VERIFY_MAX_CHAINS;
|
|
|
|
ctx->max_sigs = X509_VERIFY_MAX_SIGCHECKS;
|
|
|
|
|
|
|
|
if ((ctx->chains = calloc(X509_VERIFY_MAX_CHAINS,
|
|
|
|
sizeof(*ctx->chains))) == NULL)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return ctx;
|
|
|
|
err:
|
|
|
|
x509_verify_ctx_free(ctx);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
x509_verify_ctx_free(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
if (ctx == NULL)
|
|
|
|
return;
|
|
|
|
sk_X509_pop_free(ctx->roots, X509_free);
|
|
|
|
x509_verify_ctx_clear(ctx);
|
|
|
|
free(ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
x509_verify_ctx_set_max_depth(struct x509_verify_ctx *ctx, size_t max)
|
|
|
|
{
|
|
|
|
if (max < 1 || max > X509_VERIFY_MAX_CHAIN_CERTS)
|
|
|
|
return 0;
|
|
|
|
ctx->max_depth = max;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
x509_verify_ctx_set_max_chains(struct x509_verify_ctx *ctx, size_t max)
|
|
|
|
{
|
|
|
|
if (max < 1 || max > X509_VERIFY_MAX_CHAINS)
|
|
|
|
return 0;
|
|
|
|
ctx->max_chains = max;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
x509_verify_ctx_set_max_signatures(struct x509_verify_ctx *ctx, size_t max)
|
|
|
|
{
|
|
|
|
if (max < 1 || max > 100000)
|
|
|
|
return 0;
|
|
|
|
ctx->max_sigs = max;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
x509_verify_ctx_set_purpose(struct x509_verify_ctx *ctx, int purpose)
|
|
|
|
{
|
|
|
|
if (purpose < X509_PURPOSE_MIN || purpose > X509_PURPOSE_MAX)
|
|
|
|
return 0;
|
|
|
|
ctx->purpose = purpose;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
x509_verify_ctx_set_intermediates(struct x509_verify_ctx *ctx,
|
|
|
|
STACK_OF(X509) *intermediates)
|
|
|
|
{
|
|
|
|
if ((ctx->intermediates = X509_chain_up_ref(intermediates)) == NULL)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
x509_verify_ctx_error_string(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
return X509_verify_cert_error_string(ctx->error);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t
|
|
|
|
x509_verify_ctx_error_depth(struct x509_verify_ctx *ctx)
|
|
|
|
{
|
|
|
|
return ctx->error_depth;
|
|
|
|
}
|
|
|
|
|
|
|
|
STACK_OF(X509) *
|
|
|
|
x509_verify_ctx_chain(struct x509_verify_ctx *ctx, size_t i)
|
|
|
|
{
|
|
|
|
if (i >= ctx->chains_count)
|
|
|
|
return NULL;
|
|
|
|
return ctx->chains[i]->certs;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t
|
|
|
|
x509_verify(struct x509_verify_ctx *ctx, X509 *leaf, char *name)
|
|
|
|
{
|
|
|
|
struct x509_verify_chain *current_chain;
|
2022-04-25 00:29:35 +04:00
|
|
|
int retry_chain_build, full_chain = 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
if (ctx->roots == NULL || ctx->max_depth == 0) {
|
|
|
|
ctx->error = X509_V_ERR_INVALID_CALL;
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
if (ctx->xsc != NULL) {
|
|
|
|
if (leaf != NULL || name != NULL) {
|
|
|
|
ctx->error = X509_V_ERR_INVALID_CALL;
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
leaf = ctx->xsc->cert;
|
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/* XXX */
|
|
|
|
full_chain = 1;
|
|
|
|
if (ctx->xsc->param->flags & X509_V_FLAG_PARTIAL_CHAIN)
|
|
|
|
full_chain = 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
/*
|
|
|
|
* XXX
|
|
|
|
* The legacy code expects the top level cert to be
|
|
|
|
* there, even if we didn't find a chain. So put it
|
|
|
|
* there, we will clobber it later if we find a valid
|
|
|
|
* chain.
|
|
|
|
*/
|
|
|
|
if ((ctx->xsc->chain = sk_X509_new_null()) == NULL) {
|
|
|
|
ctx->error = X509_V_ERR_OUT_OF_MEM;
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
if (!X509_up_ref(leaf)) {
|
|
|
|
ctx->error = X509_V_ERR_OUT_OF_MEM;
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
if (!sk_X509_push(ctx->xsc->chain, leaf)) {
|
|
|
|
X509_free(leaf);
|
|
|
|
ctx->error = X509_V_ERR_OUT_OF_MEM;
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
ctx->xsc->error_depth = 0;
|
|
|
|
ctx->xsc->current_cert = leaf;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!x509_verify_cert_valid(ctx, leaf, NULL))
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
if (!x509_verify_cert_hostname(ctx, leaf, name))
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
if ((current_chain = x509_verify_chain_new()) == NULL) {
|
|
|
|
ctx->error = X509_V_ERR_OUT_OF_MEM;
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
|
|
|
if (!x509_verify_chain_append(current_chain, leaf, &ctx->error)) {
|
|
|
|
x509_verify_chain_free(current_chain);
|
2022-04-25 00:29:35 +04:00
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
do {
|
|
|
|
retry_chain_build = 0;
|
|
|
|
if (x509_verify_ctx_cert_is_root(ctx, leaf, full_chain)) {
|
|
|
|
if (!x509_verify_ctx_add_chain(ctx, current_chain)) {
|
|
|
|
x509_verify_chain_free(current_chain);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
x509_verify_build_chains(ctx, leaf, current_chain,
|
|
|
|
full_chain);
|
|
|
|
if (full_chain && ctx->chains_count == 0) {
|
|
|
|
/*
|
|
|
|
* Save the error state from the xsc
|
|
|
|
* at this point to put back on the
|
|
|
|
* xsc in case we do not find a chain
|
|
|
|
* that is trusted but not a full
|
|
|
|
* chain to a self signed root. This
|
|
|
|
* is because the unvalidated chain is
|
|
|
|
* used by the autochain batshittery
|
|
|
|
* on failure and will be needed for
|
|
|
|
* that.
|
|
|
|
*/
|
|
|
|
if (!x509_verify_ctx_save_xsc_error(ctx)) {
|
|
|
|
x509_verify_chain_free(current_chain);
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
full_chain = 0;
|
|
|
|
retry_chain_build = 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} while (retry_chain_build);
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
x509_verify_chain_free(current_chain);
|
|
|
|
|
|
|
|
/*
|
2022-04-25 00:29:35 +04:00
|
|
|
* Do the new verifier style return, where we don't have an xsc
|
|
|
|
* that allows a crazy callback to turn invalid things into valid.
|
2020-12-28 19:15:37 +04:00
|
|
|
*/
|
2022-04-25 00:29:35 +04:00
|
|
|
if (ctx->xsc == NULL) {
|
|
|
|
/*
|
|
|
|
* Safety net:
|
|
|
|
* We could not find a validated chain, and for some reason do not
|
|
|
|
* have an error set.
|
|
|
|
*/
|
|
|
|
if (ctx->chains_count == 0 && ctx->error == X509_V_OK)
|
|
|
|
ctx->error = X509_V_ERR_UNSPECIFIED;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we are not using an xsc, and have no possibility for the
|
|
|
|
* crazy OpenSSL callback API changing the results of
|
|
|
|
* validation steps (because the callback can make validation
|
|
|
|
* proceed in the presence of invalid certs), any chains we
|
|
|
|
* have here are correctly built and verified.
|
|
|
|
*/
|
|
|
|
if (ctx->chains_count > 0)
|
|
|
|
ctx->error = X509_V_OK;
|
|
|
|
|
|
|
|
return ctx->chains_count;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Otherwise we are doing compatibility with an xsc, which means that we
|
|
|
|
* will have one chain, which might actually be a bogus chain because
|
|
|
|
* the callback told us to ignore errors and proceed to build an invalid
|
|
|
|
* chain. Possible return values from this include returning 1 with an
|
|
|
|
* invalid chain and a value of xsc->error != X509_V_OK (It's tradition
|
|
|
|
* that makes it ok).
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (ctx->chains_count > 0) {
|
|
|
|
/*
|
|
|
|
* The chain we have using an xsc might not be a verified chain
|
|
|
|
* if the callback perverted things while we built it to ignore
|
|
|
|
* failures and proceed with chain building. We put this chain
|
|
|
|
* and the error associated with it on the xsc.
|
|
|
|
*/
|
|
|
|
if (!x509_verify_ctx_set_xsc_chain(ctx, ctx->chains[0], 1, 1))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Call the callback for completion up our built
|
|
|
|
* chain. The callback could still tell us to
|
|
|
|
* fail. Since this chain might exist as the result of
|
|
|
|
* callback doing perversions, we could still return
|
|
|
|
* "success" with something other than X509_V_OK set
|
|
|
|
* as the error.
|
|
|
|
*/
|
|
|
|
if (!x509_vfy_callback_indicate_completion(ctx->xsc))
|
|
|
|
goto err;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* We did not find a chain. Bring back the failure
|
|
|
|
* case we wanted to the xsc if we saved one. If we
|
|
|
|
* did not we should have just the leaf on the xsc.
|
|
|
|
*/
|
|
|
|
if (!x509_verify_ctx_restore_xsc_error(ctx))
|
|
|
|
goto err;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
2022-04-25 00:29:35 +04:00
|
|
|
/*
|
|
|
|
* Safety net, ensure we have an error set in the
|
|
|
|
* failing case.
|
|
|
|
*/
|
|
|
|
if (ctx->xsc->error == X509_V_OK) {
|
|
|
|
if (ctx->error == X509_V_OK)
|
|
|
|
ctx->error = X509_V_ERR_UNSPECIFIED;
|
|
|
|
ctx->xsc->error = ctx->error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Let the callback override the return value
|
|
|
|
* at depth 0 if it chooses to
|
|
|
|
*/
|
|
|
|
return ctx->xsc->verify_cb(0, ctx->xsc);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* We only ever find one chain in compat mode with an xsc. */
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
err:
|
|
|
|
if (ctx->error == X509_V_OK)
|
|
|
|
ctx->error = X509_V_ERR_UNSPECIFIED;
|
2020-12-28 19:15:37 +04:00
|
|
|
|
|
|
|
if (ctx->xsc != NULL) {
|
2022-04-25 00:29:35 +04:00
|
|
|
if (ctx->xsc->error == X509_V_OK)
|
|
|
|
ctx->xsc->error = X509_V_ERR_UNSPECIFIED;
|
|
|
|
ctx->error = ctx->xsc->error;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
|
|
|
|
return 0;
|
2020-12-28 19:15:37 +04:00
|
|
|
}
|
2022-04-25 00:29:35 +04:00
|
|
|
|