blob: 1d3d0c03efd49d6b8bc5e1e0cc5a0cf258e7c1f7 [file] [log] [blame]
Bob Beckbc97b7a2023-04-18 08:35:15 -06001// Copyright 2015 The Chromium Authors
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#include "verify_certificate_chain.h"
6
7#include <algorithm>
8#include <cassert>
9
Bob Beck5c7a2a02023-11-20 17:28:21 -070010#include <openssl/base.h>
Bob Beckbc97b7a2023-04-18 08:35:15 -060011#include "cert_error_params.h"
12#include "cert_errors.h"
13#include "common_cert_errors.h"
14#include "extended_key_usage.h"
Bob Beck5c7a2a02023-11-20 17:28:21 -070015#include "input.h"
Bob Beckbc97b7a2023-04-18 08:35:15 -060016#include "name_constraints.h"
17#include "parse_certificate.h"
18#include "signature_algorithm.h"
19#include "trust_store.h"
20#include "verify_signed_data.h"
Bob Beckbc97b7a2023-04-18 08:35:15 -060021
22namespace bssl {
23
24namespace {
25
Bob Beck5c7a2a02023-11-20 17:28:21 -070026bool IsHandledCriticalExtension(const ParsedExtension &extension,
27 const ParsedCertificate &cert) {
Bob Beck6beabf32023-11-21 09:43:52 -070028 if (extension.oid == der::Input(kBasicConstraintsOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060029 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070030 }
Bob Beckbc97b7a2023-04-18 08:35:15 -060031 // Key Usage is NOT processed for end-entity certificates (this is the
32 // responsibility of callers), however it is considered "handled" here in
33 // order to allow being marked as critical.
Bob Beck6beabf32023-11-21 09:43:52 -070034 if (extension.oid == der::Input(kKeyUsageOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060035 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070036 }
37 if (extension.oid == der::Input(kExtKeyUsageOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060038 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070039 }
40 if (extension.oid == der::Input(kNameConstraintsOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060041 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070042 }
43 if (extension.oid == der::Input(kSubjectAltNameOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060044 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070045 }
Bob Beckbc97b7a2023-04-18 08:35:15 -060046 if (extension.oid == der::Input(kCertificatePoliciesOid)) {
47 // Policy qualifiers are skipped during processing, so if the
48 // extension is marked critical need to ensure there weren't any
49 // qualifiers other than User Notice / CPS.
50 //
51 // This follows from RFC 5280 section 4.2.1.4:
52 //
53 // If this extension is critical, the path validation software MUST
54 // be able to interpret this extension (including the optional
55 // qualifier), or MUST reject the certificate.
56 std::vector<der::Input> unused_policies;
57 CertErrors unused_errors;
58 return ParseCertificatePoliciesExtensionOids(
59 extension.value, true /*fail_parsing_unknown_qualifier_oids*/,
60 &unused_policies, &unused_errors);
61
62 // TODO(eroman): Give a better error message.
63 }
Bob Beck6beabf32023-11-21 09:43:52 -070064 if (extension.oid == der::Input(kPolicyMappingsOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060065 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070066 }
67 if (extension.oid == der::Input(kPolicyConstraintsOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060068 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070069 }
70 if (extension.oid == der::Input(kInhibitAnyPolicyOid)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -060071 return true;
Bob Beck6beabf32023-11-21 09:43:52 -070072 }
Bob Beckbc97b7a2023-04-18 08:35:15 -060073 if (extension.oid == der::Input(kMSApplicationPoliciesOid)) {
74 // Per https://crbug.com/1439638 and
75 // https://learn.microsoft.com/en-us/windows/win32/seccertenroll/supported-extensions#msapplicationpolicies
76 // The MSApplicationPolicies extension may be ignored if the
77 // extendedKeyUsage extension is also present.
78 return cert.has_extended_key_usage();
79 }
80
81 return false;
82}
83
84// Adds errors to |errors| if the certificate contains unconsumed _critical_
85// extensions.
Bob Beck5c7a2a02023-11-20 17:28:21 -070086void VerifyNoUnconsumedCriticalExtensions(const ParsedCertificate &cert,
87 CertErrors *errors) {
88 for (const auto &it : cert.extensions()) {
89 const ParsedExtension &extension = it.second;
Bob Beckbc97b7a2023-04-18 08:35:15 -060090 if (extension.critical && !IsHandledCriticalExtension(extension, cert)) {
91 errors->AddError(cert_errors::kUnconsumedCriticalExtension,
92 CreateCertErrorParams2Der("oid", extension.oid, "value",
93 extension.value));
94 }
95 }
96}
97
98// Returns true if |cert| was self-issued. The definition of self-issuance
99// comes from RFC 5280 section 6.1:
100//
101// A certificate is self-issued if the same DN appears in the subject
102// and issuer fields (the two DNs are the same if they match according
103// to the rules specified in Section 7.1). In general, the issuer and
104// subject of the certificates that make up a path are different for
105// each certificate. However, a CA may issue a certificate to itself to
106// support key rollover or changes in certificate policies. These
107// self-issued certificates are not counted when evaluating path length
108// or name constraints.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700109[[nodiscard]] bool IsSelfIssued(const ParsedCertificate &cert) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600110 return cert.normalized_subject() == cert.normalized_issuer();
111}
112
113// Adds errors to |errors| if |cert| is not valid at time |time|.
114//
115// The certificate's validity requirements are described by RFC 5280 section
116// 4.1.2.5:
117//
118// The validity period for a certificate is the period of time from
119// notBefore through notAfter, inclusive.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700120void VerifyTimeValidity(const ParsedCertificate &cert,
121 const der::GeneralizedTime &time, CertErrors *errors) {
Bob Beck6beabf32023-11-21 09:43:52 -0700122 if (time < cert.tbs().validity_not_before) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600123 errors->AddError(cert_errors::kValidityFailedNotBefore);
Bob Beck6beabf32023-11-21 09:43:52 -0700124 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600125
Bob Beck6beabf32023-11-21 09:43:52 -0700126 if (cert.tbs().validity_not_after < time) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600127 errors->AddError(cert_errors::kValidityFailedNotAfter);
Bob Beck6beabf32023-11-21 09:43:52 -0700128 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600129}
130
131// Adds errors to |errors| if |cert| has internally inconsistent signature
132// algorithms.
133//
134// X.509 certificates contain two different signature algorithms:
135// (1) The signatureAlgorithm field of Certificate
136// (2) The signature field of TBSCertificate
137//
138// According to RFC 5280 section 4.1.1.2 and 4.1.2.3 these two fields must be
139// equal:
140//
141// This field MUST contain the same algorithm identifier as the
142// signature field in the sequence tbsCertificate (Section 4.1.2.3).
143//
144// The spec is not explicit about what "the same algorithm identifier" means.
145// Our interpretation is that the two DER-encoded fields must be byte-for-byte
146// identical.
147//
148// In practice however there are certificates which use different encodings for
149// specifying RSA with SHA1 (different OIDs). This is special-cased for
150// compatibility sake.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700151bool VerifySignatureAlgorithmsMatch(const ParsedCertificate &cert,
152 CertErrors *errors) {
David Benjamin81138bc2024-01-23 14:53:40 -0500153 der::Input alg1_tlv = cert.signature_algorithm_tlv();
154 der::Input alg2_tlv = cert.tbs().signature_algorithm_tlv;
Bob Beckbc97b7a2023-04-18 08:35:15 -0600155
156 // Ensure that the two DER-encoded signature algorithms are byte-for-byte
157 // equal.
Bob Beck6beabf32023-11-21 09:43:52 -0700158 if (alg1_tlv == alg2_tlv) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600159 return true;
Bob Beck6beabf32023-11-21 09:43:52 -0700160 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600161
162 // But make a compatibility concession if alternate encodings are used
163 // TODO(eroman): Turn this warning into an error.
164 // TODO(eroman): Add a unit-test that exercises this case.
165 std::optional<SignatureAlgorithm> alg1 = ParseSignatureAlgorithm(alg1_tlv);
166 if (!alg1) {
167 errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm);
168 return false;
169 }
170 std::optional<SignatureAlgorithm> alg2 = ParseSignatureAlgorithm(alg2_tlv);
171 if (!alg2) {
172 errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm);
173 return false;
174 }
175
176 if (*alg1 == *alg2) {
177 errors->AddWarning(
178 cert_errors::kSignatureAlgorithmsDifferentEncoding,
179 CreateCertErrorParams2Der("Certificate.algorithm", alg1_tlv,
180 "TBSCertificate.signature", alg2_tlv));
181 return true;
182 }
183
184 errors->AddError(
185 cert_errors::kSignatureAlgorithmMismatch,
186 CreateCertErrorParams2Der("Certificate.algorithm", alg1_tlv,
187 "TBSCertificate.signature", alg2_tlv));
188 return false;
189}
190
191// Verify that |cert| can be used for |required_key_purpose|.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700192void VerifyExtendedKeyUsage(const ParsedCertificate &cert,
193 KeyPurpose required_key_purpose, CertErrors *errors,
194 bool is_target_cert, bool is_target_cert_issuer) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600195 // We treat a required KeyPurpose of ANY_EKU to mean "Do not check EKU"
196 if (required_key_purpose == KeyPurpose::ANY_EKU) {
197 return;
198 }
199 bool has_any_eku = false;
200 bool has_server_auth_eku = false;
201 bool has_client_auth_eku = false;
202 bool has_code_signing_eku = false;
203 bool has_time_stamping_eku = false;
204 bool has_ocsp_signing_eku = false;
Bob Beckbc97b7a2023-04-18 08:35:15 -0600205 if (cert.has_extended_key_usage()) {
Bob Beck5c7a2a02023-11-20 17:28:21 -0700206 for (const auto &key_purpose_oid : cert.extended_key_usage()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600207 if (key_purpose_oid == der::Input(kAnyEKU)) {
208 has_any_eku = true;
209 }
210 if (key_purpose_oid == der::Input(kServerAuth)) {
211 has_server_auth_eku = true;
212 }
213 if (key_purpose_oid == der::Input(kClientAuth)) {
214 has_client_auth_eku = true;
215 }
216 if (key_purpose_oid == der::Input(kCodeSigning)) {
217 has_code_signing_eku = true;
218 }
219 if (key_purpose_oid == der::Input(kTimeStamping)) {
220 has_time_stamping_eku = true;
221 }
222 if (key_purpose_oid == der::Input(kOCSPSigning)) {
223 has_ocsp_signing_eku = true;
224 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600225 }
226 }
227
228 auto add_error_if_strict = [&](CertErrorId id) {
229 if (required_key_purpose == KeyPurpose::SERVER_AUTH_STRICT ||
230 required_key_purpose == KeyPurpose::CLIENT_AUTH_STRICT) {
231 errors->AddError(id);
232 } else {
233 errors->AddWarning(id);
234 }
235 };
236 if (is_target_cert) {
237 // Loosely based upon CABF BR version 1.8.4, 7.1.2.3(f). We are more
238 // permissive in that we still allow EKU any to be present in a leaf
239 // certificate, but we ignore it for purposes of server or client auth. We
240 // are less permissive in that we prohibit Code Signing, OCSP Signing, and
241 // Time Stamping which are currently only a SHOULD NOT. The BR does
242 // explicitly allow Email authentication to be present, as this still exists
243 // in the wild (2022), so we do not prohibit Email authentication here (and
244 // by extension must allow it to be present in the signer, below).
245 if (!cert.has_extended_key_usage()) {
246 // This is added as a warning, an error will be added in STRICT modes
247 // if we then lack client or server auth due to this not being present.
248 errors->AddWarning(cert_errors::kEkuNotPresent);
249 } else {
250 if (has_code_signing_eku) {
251 add_error_if_strict(cert_errors::kEkuHasProhibitedCodeSigning);
252 }
253 if (has_ocsp_signing_eku) {
254 add_error_if_strict(cert_errors::kEkuHasProhibitedOCSPSigning);
255 }
256 if (has_time_stamping_eku) {
257 add_error_if_strict(cert_errors::kEkuHasProhibitedTimeStamping);
258 }
259 }
260 } else if (is_target_cert_issuer) {
261 // Handle the decision to overload EKU as a constraint on issuers.
262 //
263 // CABF BR version 1.8.4, 7.1.2.2(g) pertains to the case of "Certs used to
264 // issue TLS certificates", While the BR refers to the entire chain of
265 // intermediates, there are a number of exceptions regarding CA ownership
266 // and cross signing which are impossible for us to know or enforce here.
267 // Therefore, we can only enforce at the level of the intermediate that
268 // issued our target certificate. This means we we differ in the following
269 // ways:
270 // - We only enforce at the issuer of the TLS certificate.
271 // - We allow email protection to exist in the issuer, since without
272 // this it can not be allowed in the client (other than via EKU any))
273 // - As in the leaf certificate case, we allow EKU any to be present, but
274 // we ignore it for the purposes of server or client auth.
275 //
276 // At this time (until at least 2023) some intermediates are lacking EKU in
277 // the world at large from common CA's, so we allow the noEKU case to permit
278 // everything.
279 // TODO(bbe): enforce requiring EKU in the issuer when we can manage it.
280 if (cert.has_extended_key_usage()) {
281 if (has_code_signing_eku) {
282 add_error_if_strict(cert_errors::kEkuHasProhibitedCodeSigning);
283 }
284 if (has_time_stamping_eku) {
285 add_error_if_strict(cert_errors::kEkuHasProhibitedTimeStamping);
286 }
287 }
288 }
289 // Otherwise, we are a parent of an issuer of a TLS certificate. The CABF
290 // BR version 1.8.4, 7.1.2.2(g) goes as far as permitting EKU any in certain
291 // cases of Cross Signing and CA Ownership, having permitted cases where EKU
292 // is permitted to not be present at all. These cases are not practical to
293 // differentiate here and therefore we don't attempt to enforce any further
294 // EKU "constraints" on such certificates. Unlike the above cases we also
295 // allow the use of EKU any for client or server auth constraint purposes.
296
297 switch (required_key_purpose) {
298 case KeyPurpose::ANY_EKU:
299 assert(0); // NOTREACHED
300 return;
301 case KeyPurpose::SERVER_AUTH:
302 case KeyPurpose::SERVER_AUTH_STRICT: {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600303 if (has_any_eku && !has_server_auth_eku) {
304 if (is_target_cert || is_target_cert_issuer) {
305 errors->AddWarning(cert_errors::kEkuLacksServerAuthButHasAnyEKU);
306 } else {
307 // Accept anyEKU for server auth below target issuer.
308 has_server_auth_eku = true;
309 }
310 }
311 if (is_target_cert_issuer && !cert.has_extended_key_usage()) {
312 // Accept noEKU for server auth in target issuer.
313 // TODO(bbe): remove this once BR requirements catch up with CA's.
314 has_server_auth_eku = true;
315 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600316 if (required_key_purpose == KeyPurpose::SERVER_AUTH) {
317 // Legacy compatible.
318 if (cert.has_extended_key_usage() && !has_server_auth_eku &&
David Benjamincf00b172023-12-25 23:57:22 -0500319 !has_any_eku) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600320 errors->AddError(cert_errors::kEkuLacksServerAuth);
321 }
322 } else {
323 if (!has_server_auth_eku) {
324 errors->AddError(cert_errors::kEkuLacksServerAuth);
325 }
326 }
327 break;
328 }
329 case KeyPurpose::CLIENT_AUTH:
330 case KeyPurpose::CLIENT_AUTH_STRICT: {
331 if (has_any_eku && !has_client_auth_eku) {
332 if (is_target_cert || is_target_cert_issuer) {
333 errors->AddWarning(cert_errors::kEkuLacksClientAuthButHasAnyEKU);
334 } else {
335 // accept anyEKU for client auth.
336 has_client_auth_eku = true;
337 }
338 }
339 if (required_key_purpose == KeyPurpose::CLIENT_AUTH) {
340 // Legacy-compatible.
341 if (cert.has_extended_key_usage() && !has_client_auth_eku &&
342 !has_any_eku) {
343 errors->AddError(cert_errors::kEkuLacksClientAuth);
344 }
345 } else {
346 if (!has_client_auth_eku) {
347 errors->AddError(cert_errors::kEkuLacksClientAuth);
348 }
349 }
350 break;
351 }
352 }
353}
354
355// Representation of RFC 5280's "valid_policy_tree", used to keep track of the
356// valid policies and policy re-mappings. This structure is defined in
357// section 6.1.2.
358//
359// ValidPolicyGraph differs from RFC 5280's description in that:
360//
361// (1) It does not track "qualifier_set". This is not needed as it is not
362// output by this implementation.
363//
364// (2) It builds a directed acyclic graph, rather than a tree. When a given
365// policy matches multiple parents, RFC 5280 makes a separate node for
366// each parent. This representation condenses them into one node with
367// multiple parents.
368//
369// (3) It does not track "expected_policy_set" or anyPolicy nodes directly.
370// Rather it maintains, only for the most recent level, whether there is an
371// anyPolicy node and an inverted map of all "expected_policy_set" values.
372//
373// (4) Some pruning steps are deferred to when policies are evaluated, as a
374// reachability pass.
375class ValidPolicyGraph {
376 public:
377 ValidPolicyGraph() = default;
378
Bob Beck5c7a2a02023-11-20 17:28:21 -0700379 ValidPolicyGraph(const ValidPolicyGraph &) = delete;
380 ValidPolicyGraph &operator=(const ValidPolicyGraph &) = delete;
Bob Beckbc97b7a2023-04-18 08:35:15 -0600381
382 // A Node is an entry in the policy graph. It contains information about some
383 // policy asserted by a certificate in the chain. The policy OID itself is
384 // omitted because it is the key in the Level map.
385 struct Node {
386 // The list of "valid_policy" values for all nodes which are a parent of
387 // this node, other than anyPolicy. If empty, this node has a single parent,
388 // anyPolicy.
389 //
390 // Nodes whose parent is anyPolicy are root policies, and may be returned
391 // in the authorities-constrained-policy-set. Nodes with a concrete policy
392 // as a parent are derived from that policy in the issuer certificate,
393 // possibly with a policy mapping applied.
394 //
395 // Note it is not possible for a policy to have both anyPolicy and a
396 // concrete policy as a parent. Section 6.1.3, step d.1.ii only runs if
397 // there was no match in step d.1.i.
398 std::vector<der::Input> parent_policies;
399
400 // Whether this node matches a policy mapping in the certificate. If true,
401 // its "expected_policy_set" comes from the policy mappings extension. If
402 // false, its "expected_policy_set" is itself.
403 bool mapped = false;
404
405 // Whether this node is reachable from some valid policy in the end-entity
406 // certificate. Computed during GetValidRootPolicySet().
407 bool reachable = false;
408 };
409
410 // The policy graph is organized into "levels", each corresponding to a
411 // certificate in the chain. We maintain a map from "valid_policy" to the
412 // corresponding Node. This is the set of policies asserted by this
413 // certificate. The special anyPolicy OID is handled separately below.
414 using Level = std::map<der::Input, Node>;
415
416 // Additional per-level information that only needs to be maintained for the
417 // bottom-most level.
418 struct LevelDetails {
419 // Maintains the "expected_policy_set" values for nodes in a level of the
420 // graph, but the map is inverted from RFC 5280's formulation. For a given
421 // policy OID P, other than anyPolicy, this map gives the set of nodes where
422 // P appears in the node's "expected_policy_set". anyPolicy is handled
423 // separately below.
424 std::map<der::Input, std::vector<der::Input>> expected_policy_map;
425
426 // Whether there is a node at this level whose "valid_policy" is anyPolicy.
427 //
428 // Note anyPolicy's "expected_policy_set" always {anyPolicy}, and anyPolicy
429 // will never appear in the "expected_policy_set" of any other policy. That
430 // means this field also captures how anyPolicy appears in
431 // "expected_policy_set".
432 bool has_any_policy = false;
433 };
434
435 // Initializes the ValidPolicyGraph.
436 void Init() {
437 SetNull();
438 StartLevel();
439 AddAnyPolicyNode();
440 }
441
442 // In RFC 5280 valid_policy_tree may be set to null. That is represented here
443 // by emptiness.
444 bool IsNull() const {
445 return !current_level_.has_any_policy &&
446 (levels_.empty() || levels_.back().empty());
447 }
448 void SetNull() {
449 levels_.clear();
450 current_level_ = LevelDetails{};
451 }
452
453 // Completes the previous level, returning a corresponding LevelDetails
454 // structure, and starts a new level.
455 LevelDetails StartLevel() {
456 // Finish building expected_policy_map for the previous level.
457 if (!levels_.empty()) {
Bob Beck5c7a2a02023-11-20 17:28:21 -0700458 for (const auto &[policy, node] : levels_.back()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600459 if (!node.mapped) {
460 current_level_.expected_policy_map[policy].push_back(policy);
461 }
462 }
463 }
464
465 LevelDetails prev_level = std::move(current_level_);
466 levels_.emplace_back();
467 current_level_ = LevelDetails{};
468 return prev_level;
469 }
470
471 // Gets the set of policies (in terms of root authority's policy domain) that
472 // are valid at the bottom level of the policy graph, intersected with
473 // |user_initial_policy_set|. This is what X.509 calls
474 // "user-constrained-policy-set".
475 //
476 // This method may only be called once, after the policy graph is constructed.
477 std::set<der::Input> GetUserConstrainedPolicySet(
Bob Beck5c7a2a02023-11-20 17:28:21 -0700478 const std::set<der::Input> &user_initial_policy_set) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600479 if (levels_.empty()) {
480 return {};
481 }
482
483 bool user_has_any_policy =
484 user_initial_policy_set.count(der::Input(kAnyPolicyOid)) != 0;
485 if (current_level_.has_any_policy) {
486 if (user_has_any_policy) {
487 return {der::Input(kAnyPolicyOid)};
488 }
489 return user_initial_policy_set;
490 }
491
492 // The root's policy domain is determined by nodes with anyPolicy as a
493 // parent. However, we must limit to those which are reachable from the
494 // end-entity certificate because we defer some pruning steps.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700495 for (auto &[policy, node] : levels_.back()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600496 // GCC before 8.1 tracks individual unused bindings and does not support
497 // marking them [[maybe_unused]].
498 (void)policy;
499 node.reachable = true;
500 }
501 std::set<der::Input> policy_set;
502 for (size_t i = levels_.size() - 1; i < levels_.size(); i--) {
Bob Beck5c7a2a02023-11-20 17:28:21 -0700503 for (auto &[policy, node] : levels_[i]) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600504 if (!node.reachable) {
505 continue;
506 }
507 if (node.parent_policies.empty()) {
508 // |node|'s parent is anyPolicy, so this is in the root policy domain.
509 // Add it to the set if it is also in user's list.
510 if (user_has_any_policy ||
511 user_initial_policy_set.count(policy) > 0) {
512 policy_set.insert(policy);
513 }
514 } else if (i > 0) {
515 // Otherwise, continue searching the previous level.
516 for (der::Input parent : node.parent_policies) {
517 auto iter = levels_[i - 1].find(parent);
518 if (iter != levels_[i - 1].end()) {
519 iter->second.reachable = true;
520 }
521 }
522 }
523 }
524 }
525 return policy_set;
526 }
527
528 // Adds a node with policy anyPolicy to the current level.
529 void AddAnyPolicyNode() {
530 assert(!levels_.empty());
531 current_level_.has_any_policy = true;
532 }
533
534 // Adds a node to the current level which is a child of |parent_policies| with
535 // the specified policy.
536 void AddNode(der::Input policy, std::vector<der::Input> parent_policies) {
537 assert(policy != der::Input(kAnyPolicyOid));
538 AddNodeReturningIterator(policy, std::move(parent_policies));
539 }
540
541 // Adds a node to the current level which is a child of anyPolicy with the
542 // specified policy.
543 void AddNodeWithParentAnyPolicy(der::Input policy) {
544 // An empty parent set represents a node parented by anyPolicy.
545 AddNode(policy, {});
546 }
547
548 // Maps |issuer_policy| to |subject_policy|, as in RFC 5280, section 6.1.4,
549 // step b.1.
550 void AddPolicyMapping(der::Input issuer_policy, der::Input subject_policy) {
551 assert(issuer_policy != der::Input(kAnyPolicyOid));
552 assert(subject_policy != der::Input(kAnyPolicyOid));
553 if (levels_.empty()) {
554 return;
555 }
556
557 // The mapping only applies if |issuer_policy| exists in the current level.
558 auto issuer_policy_iter = levels_.back().find(issuer_policy);
559 if (issuer_policy_iter == levels_.back().end()) {
560 // If there is no match, it can instead match anyPolicy.
561 if (!current_level_.has_any_policy) {
562 return;
563 }
564
565 // From RFC 5280, section 6.1.4, step b.1:
566 //
567 // If no node of depth i in the valid_policy_tree has a
568 // valid_policy of ID-P but there is a node of depth i with a
569 // valid_policy of anyPolicy, then generate a child node of
570 // the node of depth i-1 that has a valid_policy of anyPolicy
571 // as follows: [...]
572 //
573 // The anyPolicy node of depth i-1 is referring to the parent of the
574 // anyPolicy node of depth i. The parent of anyPolicy is always anyPolicy.
575 issuer_policy_iter = AddNodeReturningIterator(issuer_policy, {});
576 }
577
578 // Unmapped nodes have a singleton "expected_policy_set" containing their
579 // valid_policy. Track whether nodes have been mapped so this can be filled
580 // in at StartLevel().
581 issuer_policy_iter->second.mapped = true;
582
583 // Add |subject_policy| to |issuer_policy|'s "expected_policy_set".
584 current_level_.expected_policy_map[subject_policy].push_back(issuer_policy);
585 }
586
587 // Removes the node with the specified policy from the current level.
588 void DeleteNode(der::Input policy) {
589 if (!levels_.empty()) {
590 levels_.back().erase(policy);
591 }
592 }
593
594 private:
595 Level::iterator AddNodeReturningIterator(
Bob Beck5c7a2a02023-11-20 17:28:21 -0700596 der::Input policy, std::vector<der::Input> parent_policies) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600597 assert(policy != der::Input(kAnyPolicyOid));
598 auto [iter, inserted] = levels_.back().insert(
599 std::pair{policy, Node{std::move(parent_policies)}});
600 // GCC before 8.1 tracks individual unused bindings and does not support
601 // marking them [[maybe_unused]].
602 (void)inserted;
603 assert(inserted);
604 return iter;
605 }
606
607 // The list of levels, starting from the root.
608 std::vector<Level> levels_;
609 // Additional information about the current level.
610 LevelDetails current_level_;
611};
612
613// Class that encapsulates the state variables used by certificate path
614// validation.
615class PathVerifier {
616 public:
617 // Same parameters and meaning as VerifyCertificateChain().
Bob Beck5c7a2a02023-11-20 17:28:21 -0700618 void Run(const ParsedCertificateList &certs,
619 const CertificateTrust &last_cert_trust,
620 VerifyCertificateChainDelegate *delegate,
621 const der::GeneralizedTime &time, KeyPurpose required_key_purpose,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600622 InitialExplicitPolicy initial_explicit_policy,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700623 const std::set<der::Input> &user_initial_policy_set,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600624 InitialPolicyMappingInhibit initial_policy_mapping_inhibit,
625 InitialAnyPolicyInhibit initial_any_policy_inhibit,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700626 std::set<der::Input> *user_constrained_policy_set,
627 CertPathErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600628
629 private:
630 // Verifies and updates the valid policies. This corresponds with RFC 5280
631 // section 6.1.3 steps d-f.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700632 void VerifyPolicies(const ParsedCertificate &cert, bool is_target_cert,
633 CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600634
635 // Applies the policy mappings. This corresponds with RFC 5280 section 6.1.4
636 // steps a-b.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700637 void VerifyPolicyMappings(const ParsedCertificate &cert, CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600638
639 // Applies policyConstraints and inhibitAnyPolicy. This corresponds with RFC
640 // 5280 section 6.1.4 steps i-j.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700641 void ApplyPolicyConstraints(const ParsedCertificate &cert);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600642
643 // This function corresponds to RFC 5280 section 6.1.3's "Basic Certificate
644 // Processing" procedure.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700645 void BasicCertificateProcessing(const ParsedCertificate &cert,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600646 bool is_target_cert,
647 bool is_target_cert_issuer,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700648 const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600649 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700650 CertErrors *errors,
651 bool *shortcircuit_chain_validation);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600652
653 // This function corresponds to RFC 5280 section 6.1.4's "Preparation for
654 // Certificate i+1" procedure. |cert| is expected to be an intermediate.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700655 void PrepareForNextCertificate(const ParsedCertificate &cert,
656 CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600657
658 // This function corresponds with RFC 5280 section 6.1.5's "Wrap-Up
659 // Procedure". It does processing for the final certificate (the target cert).
Bob Beck5c7a2a02023-11-20 17:28:21 -0700660 void WrapUp(const ParsedCertificate &cert, KeyPurpose required_key_purpose,
661 const std::set<der::Input> &user_initial_policy_set,
662 CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600663
664 // Enforces trust anchor constraints compatibile with RFC 5937.
665 //
666 // Note that the anchor constraints are encoded via the attached certificate
667 // itself.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700668 void ApplyTrustAnchorConstraints(const ParsedCertificate &cert,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600669 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700670 CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600671
672 // Initializes the path validation algorithm given anchor constraints. This
673 // follows the description in RFC 5937
Bob Beck5c7a2a02023-11-20 17:28:21 -0700674 void ProcessRootCertificate(const ParsedCertificate &cert,
675 const CertificateTrust &trust,
676 const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600677 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700678 CertErrors *errors,
679 bool *shortcircuit_chain_validation);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600680
681 // Processes verification when the input is a single certificate. This is not
682 // defined by any standard. We attempt to match the de-facto behaviour of
683 // Operating System verifiers.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700684 void ProcessSingleCertChain(const ParsedCertificate &cert,
685 const CertificateTrust &trust,
686 const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -0600687 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700688 CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600689
690 // Parses |spki| to an EVP_PKEY and checks whether the public key is accepted
691 // by |delegate_|. On failure parsing returns nullptr. If either parsing the
692 // key or key policy failed, adds a high-severity error to |errors|.
David Benjamin81138bc2024-01-23 14:53:40 -0500693 bssl::UniquePtr<EVP_PKEY> ParseAndCheckPublicKey(der::Input spki,
Bob Beck5c7a2a02023-11-20 17:28:21 -0700694 CertErrors *errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -0600695
696 ValidPolicyGraph valid_policy_graph_;
697
698 std::set<der::Input> user_constrained_policy_set_;
699
700 // Will contain a NameConstraints for each previous cert in the chain which
701 // had nameConstraints. This corresponds to the permitted_subtrees and
702 // excluded_subtrees state variables from RFC 5280.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700703 std::vector<const NameConstraints *> name_constraints_list_;
Bob Beckbc97b7a2023-04-18 08:35:15 -0600704
705 // |explicit_policy_| corresponds with the same named variable from RFC 5280
706 // section 6.1.2:
707 //
708 // explicit_policy: an integer that indicates if a non-NULL
709 // valid_policy_tree is required. The integer indicates the
710 // number of non-self-issued certificates to be processed before
711 // this requirement is imposed. Once set, this variable may be
712 // decreased, but may not be increased. That is, if a certificate in the
713 // path requires a non-NULL valid_policy_tree, a later certificate cannot
714 // remove this requirement. If initial-explicit-policy is set, then the
715 // initial value is 0, otherwise the initial value is n+1.
716 size_t explicit_policy_;
717
718 // |inhibit_any_policy_| corresponds with the same named variable from RFC
719 // 5280 section 6.1.2:
720 //
721 // inhibit_anyPolicy: an integer that indicates whether the
722 // anyPolicy policy identifier is considered a match. The
723 // integer indicates the number of non-self-issued certificates
724 // to be processed before the anyPolicy OID, if asserted in a
725 // certificate other than an intermediate self-issued
726 // certificate, is ignored. Once set, this variable may be
727 // decreased, but may not be increased. That is, if a
728 // certificate in the path inhibits processing of anyPolicy, a
729 // later certificate cannot permit it. If initial-any-policy-
730 // inhibit is set, then the initial value is 0, otherwise the
731 // initial value is n+1.
732 size_t inhibit_any_policy_;
733
734 // |policy_mapping_| corresponds with the same named variable from RFC 5280
735 // section 6.1.2:
736 //
737 // policy_mapping: an integer that indicates if policy mapping
738 // is permitted. The integer indicates the number of non-self-
739 // issued certificates to be processed before policy mapping is
740 // inhibited. Once set, this variable may be decreased, but may
741 // not be increased. That is, if a certificate in the path
742 // specifies that policy mapping is not permitted, it cannot be
743 // overridden by a later certificate. If initial-policy-
744 // mapping-inhibit is set, then the initial value is 0,
745 // otherwise the initial value is n+1.
746 size_t policy_mapping_;
747
748 // |working_public_key_| is an amalgamation of 3 separate variables from RFC
749 // 5280:
750 // * working_public_key
751 // * working_public_key_algorithm
752 // * working_public_key_parameters
753 //
754 // They are combined for simplicity since the signature verification takes an
755 // EVP_PKEY, and the parameter inheritence is not applicable for the supported
756 // key types. |working_public_key_| may be null if parsing failed.
757 //
758 // An approximate explanation of |working_public_key_| is this description
759 // from RFC 5280 section 6.1.2:
760 //
761 // working_public_key: the public key used to verify the
762 // signature of a certificate.
763 bssl::UniquePtr<EVP_PKEY> working_public_key_;
764
765 // |working_normalized_issuer_name_| is the normalized value of the
766 // working_issuer_name variable in RFC 5280 section 6.1.2:
767 //
768 // working_issuer_name: the issuer distinguished name expected
769 // in the next certificate in the chain.
770 der::Input working_normalized_issuer_name_;
771
772 // |max_path_length_| corresponds with the same named variable in RFC 5280
773 // section 6.1.2.
774 //
775 // max_path_length: this integer is initialized to n, is
776 // decremented for each non-self-issued certificate in the path,
777 // and may be reduced to the value in the path length constraint
778 // field within the basic constraints extension of a CA
779 // certificate.
780 size_t max_path_length_;
781
Bob Beck5c7a2a02023-11-20 17:28:21 -0700782 VerifyCertificateChainDelegate *delegate_;
Bob Beckbc97b7a2023-04-18 08:35:15 -0600783};
784
Bob Beck5c7a2a02023-11-20 17:28:21 -0700785void PathVerifier::VerifyPolicies(const ParsedCertificate &cert,
786 bool is_target_cert, CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600787 // From RFC 5280 section 6.1.3:
788 //
789 // (d) If the certificate policies extension is present in the
790 // certificate and the valid_policy_tree is not NULL, process
791 // the policy information by performing the following steps in
792 // order:
793 if (cert.has_policy_oids() && !valid_policy_graph_.IsNull()) {
794 ValidPolicyGraph::LevelDetails previous_level =
795 valid_policy_graph_.StartLevel();
796
797 // (1) For each policy P not equal to anyPolicy in the
798 // certificate policies extension, let P-OID denote the OID
799 // for policy P and P-Q denote the qualifier set for policy
800 // P. Perform the following steps in order:
801 bool cert_has_any_policy = false;
David Benjamin81138bc2024-01-23 14:53:40 -0500802 for (der::Input p_oid : cert.policy_oids()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600803 if (p_oid == der::Input(kAnyPolicyOid)) {
804 cert_has_any_policy = true;
805 continue;
806 }
807
808 // (i) For each node of depth i-1 in the valid_policy_tree
809 // where P-OID is in the expected_policy_set, create a
810 // child node as follows: set the valid_policy to P-OID,
811 // set the qualifier_set to P-Q, and set the
812 // expected_policy_set to {P-OID}.
813 auto iter = previous_level.expected_policy_map.find(p_oid);
814 if (iter != previous_level.expected_policy_map.end()) {
815 valid_policy_graph_.AddNode(
816 p_oid, /*parent_policies=*/std::move(iter->second));
817 previous_level.expected_policy_map.erase(iter);
818 } else if (previous_level.has_any_policy) {
819 // (ii) If there was no match in step (i) and the
820 // valid_policy_tree includes a node of depth i-1 with
821 // the valid_policy anyPolicy, generate a child node with
822 // the following values: set the valid_policy to P-OID,
823 // set the qualifier_set to P-Q, and set the
824 // expected_policy_set to {P-OID}.
825 valid_policy_graph_.AddNodeWithParentAnyPolicy(p_oid);
826 }
827 }
828
829 // (2) If the certificate policies extension includes the policy
830 // anyPolicy with the qualifier set AP-Q and either (a)
831 // inhibit_anyPolicy is greater than 0 or (b) i<n and the
832 // certificate is self-issued, then:
833 //
834 // For each node in the valid_policy_tree of depth i-1, for
835 // each value in the expected_policy_set (including
836 // anyPolicy) that does not appear in a child node, create a
837 // child node with the following values: set the valid_policy
838 // to the value from the expected_policy_set in the parent
839 // node, set the qualifier_set to AP-Q, and set the
840 // expected_policy_set to the value in the valid_policy from
841 // this node.
842 if (cert_has_any_policy && ((inhibit_any_policy_ > 0) ||
843 (!is_target_cert && IsSelfIssued(cert)))) {
Bob Beck5c7a2a02023-11-20 17:28:21 -0700844 for (auto &[p_oid, parent_policies] :
Bob Beckbc97b7a2023-04-18 08:35:15 -0600845 previous_level.expected_policy_map) {
846 valid_policy_graph_.AddNode(p_oid, std::move(parent_policies));
847 }
848 if (previous_level.has_any_policy) {
849 valid_policy_graph_.AddAnyPolicyNode();
850 }
851 }
852
853 // (3) If there is a node in the valid_policy_tree of depth i-1
854 // or less without any child nodes, delete that node. Repeat
855 // this step until there are no nodes of depth i-1 or less
856 // without children.
857 //
858 // This implementation does this as part of GetUserConstrainedPolicySet().
859 // Only the current level needs to be pruned to compute the policy graph.
860 }
861
862 // (e) If the certificate policies extension is not present, set the
863 // valid_policy_tree to NULL.
Bob Beck6beabf32023-11-21 09:43:52 -0700864 if (!cert.has_policy_oids()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600865 valid_policy_graph_.SetNull();
Bob Beck6beabf32023-11-21 09:43:52 -0700866 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600867
868 // (f) Verify that either explicit_policy is greater than 0 or the
869 // valid_policy_tree is not equal to NULL;
Bob Beck6beabf32023-11-21 09:43:52 -0700870 if (!((explicit_policy_ > 0) || !valid_policy_graph_.IsNull())) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600871 errors->AddError(cert_errors::kNoValidPolicy);
Bob Beck6beabf32023-11-21 09:43:52 -0700872 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600873}
874
Bob Beck5c7a2a02023-11-20 17:28:21 -0700875void PathVerifier::VerifyPolicyMappings(const ParsedCertificate &cert,
876 CertErrors *errors) {
Bob Beck6beabf32023-11-21 09:43:52 -0700877 if (!cert.has_policy_mappings()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600878 return;
Bob Beck6beabf32023-11-21 09:43:52 -0700879 }
Bob Beckbc97b7a2023-04-18 08:35:15 -0600880
881 // From RFC 5280 section 6.1.4:
882 //
883 // (a) If a policy mappings extension is present, verify that the
884 // special value anyPolicy does not appear as an
885 // issuerDomainPolicy or a subjectDomainPolicy.
Bob Beck5c7a2a02023-11-20 17:28:21 -0700886 for (const ParsedPolicyMapping &mapping : cert.policy_mappings()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600887 if (mapping.issuer_domain_policy == der::Input(kAnyPolicyOid) ||
888 mapping.subject_domain_policy == der::Input(kAnyPolicyOid)) {
889 // Because this implementation continues processing certificates after
890 // this error, clear the valid policy graph to ensure the
891 // "user_constrained_policy_set" output upon failure is empty.
892 valid_policy_graph_.SetNull();
893 errors->AddError(cert_errors::kPolicyMappingAnyPolicy);
894 return;
895 }
896 }
897
898 // (b) If a policy mappings extension is present, then for each
899 // issuerDomainPolicy ID-P in the policy mappings extension:
900 //
901 // (1) If the policy_mapping variable is greater than 0, for each
902 // node in the valid_policy_tree of depth i where ID-P is the
903 // valid_policy, set expected_policy_set to the set of
904 // subjectDomainPolicy values that are specified as
905 // equivalent to ID-P by the policy mappings extension.
906 //
907 // If no node of depth i in the valid_policy_tree has a
908 // valid_policy of ID-P but there is a node of depth i with a
909 // valid_policy of anyPolicy, then generate a child node of
910 // the node of depth i-1 that has a valid_policy of anyPolicy
911 // as follows:
912 //
913 // (i) set the valid_policy to ID-P;
914 //
915 // (ii) set the qualifier_set to the qualifier set of the
916 // policy anyPolicy in the certificate policies
917 // extension of certificate i; and
918 //
919 // (iii) set the expected_policy_set to the set of
920 // subjectDomainPolicy values that are specified as
921 // equivalent to ID-P by the policy mappings extension.
922 //
923 if (policy_mapping_ > 0) {
Bob Beck5c7a2a02023-11-20 17:28:21 -0700924 for (const ParsedPolicyMapping &mapping : cert.policy_mappings()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600925 valid_policy_graph_.AddPolicyMapping(mapping.issuer_domain_policy,
926 mapping.subject_domain_policy);
927 }
928 }
929
930 // (b) If a policy mappings extension is present, then for each
931 // issuerDomainPolicy ID-P in the policy mappings extension:
932 //
933 // ...
934 //
935 // (2) If the policy_mapping variable is equal to 0:
936 //
937 // (i) delete each node of depth i in the valid_policy_tree
938 // where ID-P is the valid_policy.
939 //
940 // (ii) If there is a node in the valid_policy_tree of depth
941 // i-1 or less without any child nodes, delete that
942 // node. Repeat this step until there are no nodes of
943 // depth i-1 or less without children.
944 //
945 // Step (ii) is deferred to part of GetUserConstrainedPolicySet().
946 if (policy_mapping_ == 0) {
Bob Beck5c7a2a02023-11-20 17:28:21 -0700947 for (const ParsedPolicyMapping &mapping : cert.policy_mappings()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600948 valid_policy_graph_.DeleteNode(mapping.issuer_domain_policy);
949 }
950 }
951}
952
Bob Beck5c7a2a02023-11-20 17:28:21 -0700953void PathVerifier::ApplyPolicyConstraints(const ParsedCertificate &cert) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600954 // RFC 5280 section 6.1.4 step i-j:
955 // (i) If a policy constraints extension is included in the
956 // certificate, modify the explicit_policy and policy_mapping
957 // state variables as follows:
958 if (cert.has_policy_constraints()) {
959 // (1) If requireExplicitPolicy is present and is less than
960 // explicit_policy, set explicit_policy to the value of
961 // requireExplicitPolicy.
962 if (cert.policy_constraints().require_explicit_policy &&
963 cert.policy_constraints().require_explicit_policy.value() <
964 explicit_policy_) {
965 explicit_policy_ =
966 cert.policy_constraints().require_explicit_policy.value();
967 }
968
969 // (2) If inhibitPolicyMapping is present and is less than
970 // policy_mapping, set policy_mapping to the value of
971 // inhibitPolicyMapping.
972 if (cert.policy_constraints().inhibit_policy_mapping &&
973 cert.policy_constraints().inhibit_policy_mapping.value() <
974 policy_mapping_) {
975 policy_mapping_ =
976 cert.policy_constraints().inhibit_policy_mapping.value();
977 }
978 }
979
980 // (j) If the inhibitAnyPolicy extension is included in the
981 // certificate and is less than inhibit_anyPolicy, set
982 // inhibit_anyPolicy to the value of inhibitAnyPolicy.
Bob Beckd24a3822023-09-26 17:06:37 -0600983 if (cert.inhibit_any_policy() &&
984 cert.inhibit_any_policy().value() < inhibit_any_policy_) {
985 inhibit_any_policy_ = cert.inhibit_any_policy().value();
Bob Beckbc97b7a2023-04-18 08:35:15 -0600986 }
987}
988
989void PathVerifier::BasicCertificateProcessing(
Bob Beck5c7a2a02023-11-20 17:28:21 -0700990 const ParsedCertificate &cert, bool is_target_cert,
991 bool is_target_cert_issuer, const der::GeneralizedTime &time,
992 KeyPurpose required_key_purpose, CertErrors *errors,
993 bool *shortcircuit_chain_validation) {
Bob Beckbc97b7a2023-04-18 08:35:15 -0600994 *shortcircuit_chain_validation = false;
995 // Check that the signature algorithms in Certificate vs TBSCertificate
996 // match. This isn't part of RFC 5280 section 6.1.3, but is mandated by
997 // sections 4.1.1.2 and 4.1.2.3.
998 if (!VerifySignatureAlgorithmsMatch(cert, errors)) {
Bob Beck05007562023-08-17 20:22:17 +0000999 BSSL_CHECK(errors->ContainsAnyErrorWithSeverity(CertError::SEVERITY_HIGH));
Bob Beckbc97b7a2023-04-18 08:35:15 -06001000 *shortcircuit_chain_validation = true;
1001 }
1002
1003 // Check whether this signature algorithm is allowed.
1004 if (!cert.signature_algorithm().has_value() ||
1005 !delegate_->IsSignatureAlgorithmAcceptable(*cert.signature_algorithm(),
1006 errors)) {
1007 *shortcircuit_chain_validation = true;
1008 errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm);
1009 return;
1010 }
1011
1012 if (working_public_key_) {
1013 // Verify the digital signature using the previous certificate's key (RFC
1014 // 5280 section 6.1.3 step a.1).
1015 if (!VerifySignedData(*cert.signature_algorithm(),
1016 cert.tbs_certificate_tlv(), cert.signature_value(),
1017 working_public_key_.get(),
1018 delegate_->GetVerifyCache())) {
1019 *shortcircuit_chain_validation = true;
1020 errors->AddError(cert_errors::kVerifySignedDataFailed);
1021 }
1022 }
Bob Beck6beabf32023-11-21 09:43:52 -07001023 if (*shortcircuit_chain_validation) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001024 return;
Bob Beck6beabf32023-11-21 09:43:52 -07001025 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001026
1027 // Check the time range for the certificate's validity, ensuring it is valid
1028 // at |time|.
1029 // (RFC 5280 section 6.1.3 step a.2)
1030 VerifyTimeValidity(cert, time, errors);
1031
1032 // RFC 5280 section 6.1.3 step a.3 calls for checking the certificate's
1033 // revocation status here. In this implementation revocation checking is
1034 // implemented separately from path validation.
1035
1036 // Verify the certificate's issuer name matches the issuing certificate's
1037 // subject name. (RFC 5280 section 6.1.3 step a.4)
Bob Beck6beabf32023-11-21 09:43:52 -07001038 if (cert.normalized_issuer() != working_normalized_issuer_name_) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001039 errors->AddError(cert_errors::kSubjectDoesNotMatchIssuer);
Bob Beck6beabf32023-11-21 09:43:52 -07001040 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001041
1042 // Name constraints (RFC 5280 section 6.1.3 step b & c)
1043 // If certificate i is self-issued and it is not the final certificate in the
1044 // path, skip this step for certificate i.
1045 if (!name_constraints_list_.empty() &&
1046 (!IsSelfIssued(cert) || is_target_cert)) {
Bob Beck5c7a2a02023-11-20 17:28:21 -07001047 for (const NameConstraints *nc : name_constraints_list_) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001048 nc->IsPermittedCert(cert.normalized_subject(), cert.subject_alt_names(),
1049 errors);
1050 }
1051 }
1052
1053 // RFC 5280 section 6.1.3 step d - f.
1054 VerifyPolicies(cert, is_target_cert, errors);
1055
1056 // The key purpose is checked not just for the end-entity certificate, but
1057 // also interpreted as a constraint when it appears in intermediates. This
1058 // goes beyond what RFC 5280 describes, but is the de-facto standard. See
1059 // https://wiki.mozilla.org/CA:CertificatePolicyV2.1#Frequently_Asked_Questions
1060 VerifyExtendedKeyUsage(cert, required_key_purpose, errors, is_target_cert,
1061 is_target_cert_issuer);
1062}
1063
Bob Beck5c7a2a02023-11-20 17:28:21 -07001064void PathVerifier::PrepareForNextCertificate(const ParsedCertificate &cert,
1065 CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001066 // RFC 5280 section 6.1.4 step a-b
1067 VerifyPolicyMappings(cert, errors);
1068
1069 // From RFC 5280 section 6.1.4 step c:
1070 //
1071 // Assign the certificate subject name to working_normalized_issuer_name.
1072 working_normalized_issuer_name_ = cert.normalized_subject();
1073
1074 // From RFC 5280 section 6.1.4 step d:
1075 //
1076 // Assign the certificate subjectPublicKey to working_public_key.
1077 working_public_key_ = ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors);
1078
1079 // Note that steps e and f are omitted as they are handled by
1080 // the assignment to |working_spki| above. See the definition
1081 // of |working_spki|.
1082
1083 // From RFC 5280 section 6.1.4 step g:
Bob Beck6beabf32023-11-21 09:43:52 -07001084 if (cert.has_name_constraints()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001085 name_constraints_list_.push_back(&cert.name_constraints());
Bob Beck6beabf32023-11-21 09:43:52 -07001086 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001087
1088 // (h) If certificate i is not self-issued:
1089 if (!IsSelfIssued(cert)) {
1090 // (1) If explicit_policy is not 0, decrement explicit_policy by
1091 // 1.
Bob Beck6beabf32023-11-21 09:43:52 -07001092 if (explicit_policy_ > 0) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001093 explicit_policy_ -= 1;
Bob Beck6beabf32023-11-21 09:43:52 -07001094 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001095
1096 // (2) If policy_mapping is not 0, decrement policy_mapping by 1.
Bob Beck6beabf32023-11-21 09:43:52 -07001097 if (policy_mapping_ > 0) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001098 policy_mapping_ -= 1;
Bob Beck6beabf32023-11-21 09:43:52 -07001099 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001100
1101 // (3) If inhibit_anyPolicy is not 0, decrement inhibit_anyPolicy
1102 // by 1.
Bob Beck6beabf32023-11-21 09:43:52 -07001103 if (inhibit_any_policy_ > 0) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001104 inhibit_any_policy_ -= 1;
Bob Beck6beabf32023-11-21 09:43:52 -07001105 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001106 }
1107
1108 // RFC 5280 section 6.1.4 step i-j:
1109 ApplyPolicyConstraints(cert);
1110
1111 // From RFC 5280 section 6.1.4 step k:
1112 //
1113 // If certificate i is a version 3 certificate, verify that the
1114 // basicConstraints extension is present and that cA is set to
1115 // TRUE. (If certificate i is a version 1 or version 2
1116 // certificate, then the application MUST either verify that
1117 // certificate i is a CA certificate through out-of-band means
1118 // or reject the certificate. Conforming implementations may
1119 // choose to reject all version 1 and version 2 intermediate
1120 // certificates.)
1121 //
1122 // This code implicitly rejects non version 3 intermediates, since they
1123 // can't contain a BasicConstraints extension.
1124 if (!cert.has_basic_constraints()) {
1125 errors->AddError(cert_errors::kMissingBasicConstraints);
1126 } else if (!cert.basic_constraints().is_ca) {
1127 errors->AddError(cert_errors::kBasicConstraintsIndicatesNotCa);
1128 }
1129
1130 // From RFC 5280 section 6.1.4 step l:
1131 //
1132 // If the certificate was not self-issued, verify that
1133 // max_path_length is greater than zero and decrement
1134 // max_path_length by 1.
1135 if (!IsSelfIssued(cert)) {
1136 if (max_path_length_ == 0) {
1137 errors->AddError(cert_errors::kMaxPathLengthViolated);
1138 } else {
1139 --max_path_length_;
1140 }
1141 }
1142
1143 // From RFC 5280 section 6.1.4 step m:
1144 //
1145 // If pathLenConstraint is present in the certificate and is
1146 // less than max_path_length, set max_path_length to the value
1147 // of pathLenConstraint.
1148 if (cert.has_basic_constraints() && cert.basic_constraints().has_path_len &&
1149 cert.basic_constraints().path_len < max_path_length_) {
1150 max_path_length_ = cert.basic_constraints().path_len;
1151 }
1152
1153 // From RFC 5280 section 6.1.4 step n:
1154 //
1155 // If a key usage extension is present, verify that the
1156 // keyCertSign bit is set.
1157 if (cert.has_key_usage() &&
1158 !cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)) {
1159 errors->AddError(cert_errors::kKeyCertSignBitNotSet);
1160 }
1161
1162 // From RFC 5280 section 6.1.4 step o:
1163 //
1164 // Recognize and process any other critical extension present in
1165 // the certificate. Process any other recognized non-critical
1166 // extension present in the certificate that is relevant to path
1167 // processing.
1168 VerifyNoUnconsumedCriticalExtensions(cert, errors);
1169}
1170
1171// Checks if the target certificate has the CA bit set. If it does, add
1172// the appropriate error or warning to |errors|.
Bob Beck5c7a2a02023-11-20 17:28:21 -07001173void VerifyTargetCertIsNotCA(const ParsedCertificate &cert,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001174 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001175 CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001176 if (cert.has_basic_constraints() && cert.basic_constraints().is_ca) {
1177 // In spite of RFC 5280 4.2.1.9 which says the CA properties MAY exist in
1178 // an end entity certificate, the CABF Baseline Requirements version
1179 // 1.8.4, 7.1.2.3(d) prohibit the CA bit being set in an end entity
1180 // certificate.
1181 switch (required_key_purpose) {
1182 case KeyPurpose::ANY_EKU:
1183 break;
1184 case KeyPurpose::SERVER_AUTH:
1185 case KeyPurpose::CLIENT_AUTH:
1186 errors->AddWarning(cert_errors::kTargetCertShouldNotBeCa);
1187 break;
1188 case KeyPurpose::SERVER_AUTH_STRICT:
1189 case KeyPurpose::CLIENT_AUTH_STRICT:
1190 errors->AddError(cert_errors::kTargetCertShouldNotBeCa);
1191 break;
1192 }
1193 }
1194}
1195
Bob Beck5c7a2a02023-11-20 17:28:21 -07001196void PathVerifier::WrapUp(const ParsedCertificate &cert,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001197 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001198 const std::set<der::Input> &user_initial_policy_set,
1199 CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001200 // From RFC 5280 section 6.1.5:
1201 // (a) If explicit_policy is not 0, decrement explicit_policy by 1.
Bob Beck6beabf32023-11-21 09:43:52 -07001202 if (explicit_policy_ > 0) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001203 explicit_policy_ -= 1;
Bob Beck6beabf32023-11-21 09:43:52 -07001204 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001205
1206 // (b) If a policy constraints extension is included in the
1207 // certificate and requireExplicitPolicy is present and has a
1208 // value of 0, set the explicit_policy state variable to 0.
1209 if (cert.has_policy_constraints() &&
1210 cert.policy_constraints().require_explicit_policy.has_value() &&
1211 cert.policy_constraints().require_explicit_policy == 0) {
1212 explicit_policy_ = 0;
1213 }
1214
1215 // Note step c-e are omitted as the verification function does
1216 // not output the working public key.
1217
1218 // From RFC 5280 section 6.1.5 step f:
1219 //
1220 // Recognize and process any other critical extension present in
1221 // the certificate n. Process any other recognized non-critical
1222 // extension present in certificate n that is relevant to path
1223 // processing.
1224 //
1225 // Note that this is duplicated by PrepareForNextCertificate() so as to
1226 // directly match the procedures in RFC 5280's section 6.1.
1227 VerifyNoUnconsumedCriticalExtensions(cert, errors);
1228
1229 // This calculates the intersection from RFC 5280 section 6.1.5 step g, as
1230 // well as applying the deferred recursive node that were skipped earlier in
1231 // the process.
1232 user_constrained_policy_set_ =
1233 valid_policy_graph_.GetUserConstrainedPolicySet(user_initial_policy_set);
1234
1235 // From RFC 5280 section 6.1.5 step g:
1236 //
1237 // If either (1) the value of explicit_policy variable is greater than
1238 // zero or (2) the valid_policy_tree is not NULL, then path processing
1239 // has succeeded.
1240 if (explicit_policy_ == 0 && user_constrained_policy_set_.empty()) {
1241 errors->AddError(cert_errors::kNoValidPolicy);
1242 }
1243
1244 // The following check is NOT part of RFC 5280 6.1.5's "Wrap-Up Procedure",
1245 // however is implied by RFC 5280 section 4.2.1.9, as well as CABF Base
1246 // Requirements.
1247 VerifyTargetCertIsNotCA(cert, required_key_purpose, errors);
1248
1249 // Check the public key for the target certificate. The public key for the
1250 // other certificates is already checked by PrepareForNextCertificate().
1251 // Note that this step is not part of RFC 5280 6.1.5.
1252 ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors);
1253}
1254
Bob Beck5c7a2a02023-11-20 17:28:21 -07001255void PathVerifier::ApplyTrustAnchorConstraints(const ParsedCertificate &cert,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001256 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001257 CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001258 // If certificatePolicies is present, process the policies. This matches the
1259 // handling for intermediates from RFC 5280 section 6.1.3.d (except that for
1260 // intermediates it is non-optional). It intentionally deviates from RFC 5937
1261 // section 3.2 which says to intersect with user-initial-policy-set, since
1262 // processing as part of user-initial-policy-set has subtly different
1263 // semantics from being handled as part of the chain processing (see
1264 // https://crbug.com/1403258).
1265 if (cert.has_policy_oids()) {
1266 VerifyPolicies(cert, /*is_target_cert=*/false, errors);
1267 }
1268
1269 // Process policyMappings, if present. This matches the handling for
1270 // intermediates from RFC 5280 section 6.1.4 step a-b.
1271 VerifyPolicyMappings(cert, errors);
1272
1273 // Process policyConstraints and inhibitAnyPolicy. This matches the
1274 // handling for intermediates from RFC 5280 section 6.1.4 step i-j.
1275 // This intentionally deviates from RFC 5937 section 3.2 which says to
1276 // initialize the initial-any-policy-inhibit, initial-explicit-policy, and/or
1277 // initial-policy-mapping-inhibit inputs to verification. Those are all
1278 // bools, so they cannot properly represent the constraints encoded in the
1279 // policyConstraints and inhibitAnyPolicy extensions.
1280 ApplyPolicyConstraints(cert);
1281
1282 // If keyUsage is present, verify that |cert| has correct keyUsage bits for a
1283 // CA. This matches the handling for intermediates from RFC 5280 section
1284 // 6.1.4 step n.
1285 if (cert.has_key_usage() &&
1286 !cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)) {
1287 errors->AddError(cert_errors::kKeyCertSignBitNotSet);
1288 }
1289
1290 // This is not part of RFC 5937 nor RFC 5280, but matches the EKU handling
1291 // done for intermediates (described in Web PKI's Baseline Requirements).
1292 VerifyExtendedKeyUsage(cert, required_key_purpose, errors,
1293 /*is_target_cert=*/false,
1294 /*is_target_cert_issuer=*/false);
1295
1296 // The following enforcements follow from RFC 5937 (primarily section 3.2):
1297
1298 // Initialize name constraints initial-permitted/excluded-subtrees.
Bob Beck6beabf32023-11-21 09:43:52 -07001299 if (cert.has_name_constraints()) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001300 name_constraints_list_.push_back(&cert.name_constraints());
Bob Beck6beabf32023-11-21 09:43:52 -07001301 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001302
1303 if (cert.has_basic_constraints()) {
1304 // Enforce CA=true if basicConstraints is present. This matches behavior of
1305 // other verifiers, and seems like a good thing to do to avoid a
1306 // certificate being used in the wrong context if it was specifically
1307 // marked as not being a CA.
1308 if (!cert.basic_constraints().is_ca) {
1309 errors->AddError(cert_errors::kBasicConstraintsIndicatesNotCa);
1310 }
1311 // From RFC 5937 section 3.2:
1312 //
1313 // If a basic constraints extension is associated with the trust
1314 // anchor and contains a pathLenConstraint value, set the
1315 // max_path_length state variable equal to the pathLenConstraint
1316 // value from the basic constraints extension.
1317 //
1318 if (cert.basic_constraints().has_path_len) {
1319 max_path_length_ = cert.basic_constraints().path_len;
1320 }
1321 }
1322
1323 // From RFC 5937 section 2:
1324 //
1325 // Extensions may be marked critical or not critical. When trust anchor
1326 // constraints are enforced, clients MUST reject certification paths
1327 // containing a trust anchor with unrecognized critical extensions.
1328 VerifyNoUnconsumedCriticalExtensions(cert, errors);
1329}
1330
Bob Beck5c7a2a02023-11-20 17:28:21 -07001331void PathVerifier::ProcessRootCertificate(const ParsedCertificate &cert,
1332 const CertificateTrust &trust,
1333 const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001334 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001335 CertErrors *errors,
1336 bool *shortcircuit_chain_validation) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001337 *shortcircuit_chain_validation = false;
1338 switch (trust.type) {
1339 case CertificateTrustType::UNSPECIFIED:
1340 case CertificateTrustType::TRUSTED_LEAF:
1341 // Doesn't chain to a trust anchor - implicitly distrusted
1342 errors->AddError(cert_errors::kCertIsNotTrustAnchor);
1343 *shortcircuit_chain_validation = true;
1344 break;
1345 case CertificateTrustType::DISTRUSTED:
1346 // Chains to an actively distrusted certificate.
1347 errors->AddError(cert_errors::kDistrustedByTrustStore);
1348 *shortcircuit_chain_validation = true;
1349 break;
1350 case CertificateTrustType::TRUSTED_ANCHOR:
1351 case CertificateTrustType::TRUSTED_ANCHOR_OR_LEAF:
1352 break;
1353 }
Bob Beck6beabf32023-11-21 09:43:52 -07001354 if (*shortcircuit_chain_validation) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001355 return;
Bob Beck6beabf32023-11-21 09:43:52 -07001356 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001357
1358 if (trust.enforce_anchor_expiry) {
1359 VerifyTimeValidity(cert, time, errors);
1360 }
1361 if (trust.enforce_anchor_constraints) {
1362 if (trust.require_anchor_basic_constraints &&
1363 !cert.has_basic_constraints()) {
1364 switch (cert.tbs().version) {
1365 case CertificateVersion::V1:
1366 case CertificateVersion::V2:
1367 break;
1368 case CertificateVersion::V3:
1369 errors->AddError(cert_errors::kMissingBasicConstraints);
1370 break;
1371 }
1372 }
1373 ApplyTrustAnchorConstraints(cert, required_key_purpose, errors);
1374 }
1375
1376 // Use the certificate's SPKI and subject when verifying the next certificate.
1377 working_public_key_ = ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors);
1378 working_normalized_issuer_name_ = cert.normalized_subject();
1379}
1380
Bob Beck5c7a2a02023-11-20 17:28:21 -07001381void PathVerifier::ProcessSingleCertChain(const ParsedCertificate &cert,
1382 const CertificateTrust &trust,
1383 const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001384 KeyPurpose required_key_purpose,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001385 CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001386 switch (trust.type) {
1387 case CertificateTrustType::UNSPECIFIED:
1388 case CertificateTrustType::TRUSTED_ANCHOR:
1389 // Target doesn't have a chain and isn't a directly trusted leaf -
1390 // implicitly distrusted.
1391 errors->AddError(cert_errors::kCertIsNotTrustAnchor);
1392 return;
1393 case CertificateTrustType::DISTRUSTED:
1394 // Target is directly distrusted.
1395 errors->AddError(cert_errors::kDistrustedByTrustStore);
1396 return;
1397 case CertificateTrustType::TRUSTED_LEAF:
1398 case CertificateTrustType::TRUSTED_ANCHOR_OR_LEAF:
1399 break;
1400 }
1401
1402 // Check the public key for the target certificate regardless of whether
1403 // `require_leaf_selfsigned` is true. This matches the check in WrapUp and
1404 // fulfills the documented behavior of the IsPublicKeyAcceptable delegate.
1405 ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors);
1406
1407 if (trust.require_leaf_selfsigned) {
1408 if (!VerifyCertificateIsSelfSigned(cert, delegate_->GetVerifyCache(),
1409 errors)) {
1410 // VerifyCertificateIsSelfSigned should have added an error, but just
1411 // double check to be safe.
1412 if (!errors->ContainsAnyErrorWithSeverity(CertError::SEVERITY_HIGH)) {
1413 errors->AddError(cert_errors::kInternalError);
1414 }
1415 return;
1416 }
1417 }
1418
1419 // There is no standard for what it means to verify a directly trusted leaf
1420 // certificate, so this is basically just checking common sense things that
1421 // also mirror what we observed to be enforced with the Operating System
1422 // native verifiers.
1423 VerifyTimeValidity(cert, time, errors);
1424 VerifyExtendedKeyUsage(cert, required_key_purpose, errors,
1425 /*is_target_cert=*/true,
1426 /*is_target_cert_issuer=*/false);
1427
1428 // Checking for unknown critical extensions matches Windows, but is stricter
1429 // than the Mac verifier.
1430 VerifyNoUnconsumedCriticalExtensions(cert, errors);
1431}
1432
1433bssl::UniquePtr<EVP_PKEY> PathVerifier::ParseAndCheckPublicKey(
David Benjamin81138bc2024-01-23 14:53:40 -05001434 der::Input spki, CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001435 // Parse the public key.
1436 bssl::UniquePtr<EVP_PKEY> pkey;
1437 if (!ParsePublicKey(spki, &pkey)) {
1438 errors->AddError(cert_errors::kFailedParsingSpki);
1439 return nullptr;
1440 }
1441
1442 // Check if the key is acceptable by the delegate.
Bob Beck6beabf32023-11-21 09:43:52 -07001443 if (!delegate_->IsPublicKeyAcceptable(pkey.get(), errors)) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001444 errors->AddError(cert_errors::kUnacceptablePublicKey);
Bob Beck6beabf32023-11-21 09:43:52 -07001445 }
Bob Beckbc97b7a2023-04-18 08:35:15 -06001446
1447 return pkey;
1448}
1449
1450void PathVerifier::Run(
Bob Beck5c7a2a02023-11-20 17:28:21 -07001451 const ParsedCertificateList &certs, const CertificateTrust &last_cert_trust,
1452 VerifyCertificateChainDelegate *delegate, const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001453 KeyPurpose required_key_purpose,
1454 InitialExplicitPolicy initial_explicit_policy,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001455 const std::set<der::Input> &user_initial_policy_set,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001456 InitialPolicyMappingInhibit initial_policy_mapping_inhibit,
1457 InitialAnyPolicyInhibit initial_any_policy_inhibit,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001458 std::set<der::Input> *user_constrained_policy_set, CertPathErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001459 // This implementation is structured to mimic the description of certificate
1460 // path verification given by RFC 5280 section 6.1.
Bob Beck05007562023-08-17 20:22:17 +00001461 BSSL_CHECK(delegate);
1462 BSSL_CHECK(errors);
Bob Beckbc97b7a2023-04-18 08:35:15 -06001463
1464 delegate_ = delegate;
1465
1466 // An empty chain is necessarily invalid.
1467 if (certs.empty()) {
1468 errors->GetOtherErrors()->AddError(cert_errors::kChainIsEmpty);
1469 return;
1470 }
1471
1472 // Verifying a trusted leaf certificate isn't a well-specified operation, so
1473 // it's handled separately from the RFC 5280 defined verification process.
1474 if (certs.size() == 1) {
1475 ProcessSingleCertChain(*certs.front(), last_cert_trust, time,
1476 required_key_purpose, errors->GetErrorsForCert(0));
1477 return;
1478 }
1479
1480 // RFC 5280's "n" variable is the length of the path, which does not count
1481 // the trust anchor. (Although in practice it doesn't really change behaviors
1482 // if n is used in place of n+1).
1483 const size_t n = certs.size() - 1;
1484
1485 valid_policy_graph_.Init();
1486
1487 // RFC 5280 section section 6.1.2:
1488 //
1489 // If initial-explicit-policy is set, then the initial value
1490 // [of explicit_policy] is 0, otherwise the initial value is n+1.
1491 explicit_policy_ =
1492 initial_explicit_policy == InitialExplicitPolicy::kTrue ? 0 : n + 1;
1493
1494 // RFC 5280 section section 6.1.2:
1495 //
1496 // If initial-any-policy-inhibit is set, then the initial value
1497 // [of inhibit_anyPolicy] is 0, otherwise the initial value is n+1.
1498 inhibit_any_policy_ =
1499 initial_any_policy_inhibit == InitialAnyPolicyInhibit::kTrue ? 0 : n + 1;
1500
1501 // RFC 5280 section section 6.1.2:
1502 //
1503 // If initial-policy-mapping-inhibit is set, then the initial value
1504 // [of policy_mapping] is 0, otherwise the initial value is n+1.
1505 policy_mapping_ =
1506 initial_policy_mapping_inhibit == InitialPolicyMappingInhibit::kTrue
1507 ? 0
1508 : n + 1;
1509
1510 // RFC 5280 section section 6.1.2:
1511 //
1512 // max_path_length: this integer is initialized to n, ...
1513 max_path_length_ = n;
1514
1515 // Iterate over all the certificates in the reverse direction: starting from
1516 // the root certificate and progressing towards the target certificate.
1517 //
1518 // * i=0 : Root certificate (i.e. trust anchor)
1519 // * i=1 : Certificate issued by root
1520 // * i=x : Certificate i=x is issued by certificate i=x-1
1521 // * i=n : Target certificate.
1522 for (size_t i = 0; i < certs.size(); ++i) {
1523 const size_t index_into_certs = certs.size() - i - 1;
1524
1525 // |is_target_cert| is true if the current certificate is the target
1526 // certificate being verified. The target certificate isn't necessarily an
1527 // end-entity certificate.
1528 const bool is_target_cert = index_into_certs == 0;
1529 const bool is_target_cert_issuer = index_into_certs == 1;
1530 const bool is_root_cert = i == 0;
1531
Bob Beck5c7a2a02023-11-20 17:28:21 -07001532 const ParsedCertificate &cert = *certs[index_into_certs];
Bob Beckbc97b7a2023-04-18 08:35:15 -06001533
1534 // Output errors for the current certificate into an error bucket that is
1535 // associated with that certificate.
Bob Beck5c7a2a02023-11-20 17:28:21 -07001536 CertErrors *cert_errors = errors->GetErrorsForCert(index_into_certs);
Bob Beckbc97b7a2023-04-18 08:35:15 -06001537
1538 if (is_root_cert) {
1539 bool shortcircuit_chain_validation = false;
1540 ProcessRootCertificate(cert, last_cert_trust, time, required_key_purpose,
1541 cert_errors, &shortcircuit_chain_validation);
1542 if (shortcircuit_chain_validation) {
1543 // Chains that don't start from a trusted root should short-circuit the
1544 // rest of the verification, as accumulating more errors from untrusted
1545 // certificates would not be meaningful.
Bob Beck05007562023-08-17 20:22:17 +00001546 BSSL_CHECK(cert_errors->ContainsAnyErrorWithSeverity(
Bob Beckbc97b7a2023-04-18 08:35:15 -06001547 CertError::SEVERITY_HIGH));
1548 return;
1549 }
1550
1551 // Don't do any other checks for root certificates.
1552 continue;
1553 }
1554
1555 bool shortcircuit_chain_validation = false;
1556 // Per RFC 5280 section 6.1:
1557 // * Do basic processing for each certificate
1558 // * If it is the last certificate in the path (target certificate)
1559 // - Then run "Wrap up"
1560 // - Otherwise run "Prepare for Next cert"
1561 BasicCertificateProcessing(cert, is_target_cert, is_target_cert_issuer,
1562 time, required_key_purpose, cert_errors,
1563 &shortcircuit_chain_validation);
1564 if (shortcircuit_chain_validation) {
1565 // Signature errors should short-circuit the rest of the verification, as
1566 // accumulating more errors from untrusted certificates would not be
1567 // meaningful.
Bob Beck05007562023-08-17 20:22:17 +00001568 BSSL_CHECK(
Bob Beckbc97b7a2023-04-18 08:35:15 -06001569 cert_errors->ContainsAnyErrorWithSeverity(CertError::SEVERITY_HIGH));
1570 return;
1571 }
1572 if (!is_target_cert) {
1573 PrepareForNextCertificate(cert, cert_errors);
1574 } else {
1575 WrapUp(cert, required_key_purpose, user_initial_policy_set, cert_errors);
1576 }
1577 }
1578
1579 if (user_constrained_policy_set) {
1580 *user_constrained_policy_set = user_constrained_policy_set_;
1581 }
1582
1583 // TODO(eroman): RFC 5280 forbids duplicate certificates per section 6.1:
1584 //
1585 // A certificate MUST NOT appear more than once in a prospective
1586 // certification path.
1587}
1588
1589} // namespace
1590
1591VerifyCertificateChainDelegate::~VerifyCertificateChainDelegate() = default;
1592
1593void VerifyCertificateChain(
Bob Beck5c7a2a02023-11-20 17:28:21 -07001594 const ParsedCertificateList &certs, const CertificateTrust &last_cert_trust,
1595 VerifyCertificateChainDelegate *delegate, const der::GeneralizedTime &time,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001596 KeyPurpose required_key_purpose,
1597 InitialExplicitPolicy initial_explicit_policy,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001598 const std::set<der::Input> &user_initial_policy_set,
Bob Beckbc97b7a2023-04-18 08:35:15 -06001599 InitialPolicyMappingInhibit initial_policy_mapping_inhibit,
1600 InitialAnyPolicyInhibit initial_any_policy_inhibit,
Bob Beck5c7a2a02023-11-20 17:28:21 -07001601 std::set<der::Input> *user_constrained_policy_set, CertPathErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001602 PathVerifier verifier;
1603 verifier.Run(certs, last_cert_trust, delegate, time, required_key_purpose,
1604 initial_explicit_policy, user_initial_policy_set,
1605 initial_policy_mapping_inhibit, initial_any_policy_inhibit,
1606 user_constrained_policy_set, errors);
1607}
1608
Bob Beck5c7a2a02023-11-20 17:28:21 -07001609bool VerifyCertificateIsSelfSigned(const ParsedCertificate &cert,
1610 SignatureVerifyCache *cache,
1611 CertErrors *errors) {
Bob Beckbc97b7a2023-04-18 08:35:15 -06001612 if (cert.normalized_subject() != cert.normalized_issuer()) {
1613 if (errors) {
1614 errors->AddError(cert_errors::kSubjectDoesNotMatchIssuer);
1615 }
1616 return false;
1617 }
1618
1619 // Note that we do not restrict the available algorithms when determining if
1620 // something is a self-signed cert. The signature isn't very important on a
1621 // self-signed cert so just allow any supported algorithm here, to avoid
1622 // breakage.
1623 if (!cert.signature_algorithm().has_value()) {
1624 if (errors) {
1625 errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm);
1626 }
1627 return false;
1628 }
1629
1630 if (!VerifySignedData(*cert.signature_algorithm(), cert.tbs_certificate_tlv(),
1631 cert.signature_value(), cert.tbs().spki_tlv, cache)) {
1632 if (errors) {
1633 errors->AddError(cert_errors::kVerifySignedDataFailed);
1634 }
1635 return false;
1636 }
1637
1638 return true;
1639}
1640
Bob Beck5c7a2a02023-11-20 17:28:21 -07001641} // namespace bssl