blob: 157a6b67ef24f01c4a8ca7711e0124a42355e486 [file] [log] [blame]
/* Copyright (c) 2023, Google Inc.
*
* Permission to use, copy, modify, and/or distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY
* SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION
* OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN
* CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */
#include <openssl/pki/verify.h>
#include <assert.h>
#include <chrono>
#include <optional>
#include <string_view>
#include <openssl/base.h>
#include <openssl/bytestring.h>
#include <openssl/pool.h>
#include <openssl/pki/signature_verify_cache.h>
#include "cert_errors.h"
#include "cert_issuer_source_static.h"
#include "certificate_policies.h"
#include "common_cert_errors.h"
#include "encode_values.h"
#include "input.h"
#include "parse_certificate.h"
#include "parse_values.h"
#include "parsed_certificate.h"
#include "path_builder.h"
#include "simple_path_builder_delegate.h"
#include "trust_store.h"
#include "trust_store_in_memory.h"
#include "verify_certificate_chain.h"
BSSL_NAMESPACE_BEGIN
namespace {
std::optional<std::shared_ptr<const ParsedCertificate>>
InternalParseCertificate(Span<const uint8_t> cert, std::string *out_diagnostic) {
ParseCertificateOptions default_options{};
// We follow Chromium in setting |allow_invalid_serial_numbers| in order to
// not choke on 21-byte serial numbers, which are common.
//
// The reason for the discrepancy is that unsigned numbers with the high bit
// otherwise set get an extra 0 byte in front to keep them positive. So if you
// do:
// var num [20]byte
// fillWithRandom(num[:])
// serialNumber := new(big.Int).SetBytes(num[:])
// encodeASN1Integer(serialNumber)
//
// Then half of your serial numbers will be encoded with 21 bytes. (And
// 1/512th will have 19 bytes instead of 20.)
default_options.allow_invalid_serial_numbers = true;
UniquePtr<CRYPTO_BUFFER> buffer(
CRYPTO_BUFFER_new(cert.data(), cert.size(), nullptr));
CertErrors errors;
std::shared_ptr<const ParsedCertificate> parsed_cert(
ParsedCertificate::Create(std::move(buffer), default_options, &errors));
if (!parsed_cert) {
*out_diagnostic = errors.ToDebugString();
return {};
}
return parsed_cert;
}
} // namespace
CertPool::CertPool() {}
CertificateVerifyOptions::CertificateVerifyOptions() {}
static std::unique_ptr<VerifyTrustStore> WrapTrustStore(
std::unique_ptr<TrustStoreInMemory> trust_store) {
std::unique_ptr<VerifyTrustStore> ret(new VerifyTrustStore);
ret->trust_store = std::move(trust_store);
return ret;
}
VerifyTrustStore::~VerifyTrustStore() {}
std::unique_ptr<VerifyTrustStore> VerifyTrustStore::FromDER(
std::string_view der_certs, std::string *out_diagnostic) {
auto store = std::make_unique<TrustStoreInMemory>();
CBS cbs = StringAsBytes(der_certs);
for (size_t cert_num = 1; CBS_len(&cbs) != 0; cert_num++) {
CBS cert;
if (!CBS_get_asn1_element(&cbs, &cert, CBS_ASN1_SEQUENCE)) {
*out_diagnostic = "failed to get ASN.1 SEQUENCE from input at cert " +
std::to_string(cert_num);
return {};
}
auto parsed_cert = InternalParseCertificate(cert, out_diagnostic);
if (!parsed_cert.has_value()) {
return {};
}
store->AddTrustAnchor(parsed_cert.value());
}
return WrapTrustStore(std::move(store));
}
std::unique_ptr<VerifyTrustStore> VerifyTrustStore::FromDER(
const std::vector<std::string_view> &der_roots,
std::string *out_diagnostic) {
auto store = std::make_unique<TrustStoreInMemory>();
for (const std::string_view &cert : der_roots) {
auto parsed_cert = InternalParseCertificate(StringAsBytes(cert), out_diagnostic);
if (!parsed_cert.has_value()) {
return {};
}
store->AddTrustAnchor(parsed_cert.value());
}
return WrapTrustStore(std::move(store));
}
CertPool::~CertPool() {}
std::unique_ptr<CertPool> CertPool::FromCerts(
const std::vector<std::string_view> &der_certs,
std::string *out_diagnostic) {
auto pool = std::make_unique<CertPool>();
pool->impl_ = std::make_unique<CertIssuerSourceStatic>();
for (const std::string_view &cert : der_certs) {
auto parsed_cert =
InternalParseCertificate(StringAsBytes(cert), out_diagnostic);
if (!parsed_cert.has_value()) {
return {};
}
pool->impl_->AddCert(std::move(parsed_cert.value()));
}
return pool;
}
CertificateVerifyStatus::CertificateVerifyStatus() {}
size_t CertificateVerifyStatus::IterationCount() const {
return iteration_count_;
}
size_t CertificateVerifyStatus::MaxDepthSeen() const { return max_depth_seen_; }
// PathBuilderDelegateImpl implements a deadline and allows for the
// use of a SignatureVerifyCache if an implementation is provided.
class PathBuilderDelegateImpl : public SimplePathBuilderDelegate {
public:
PathBuilderDelegateImpl(
size_t min_rsa_modulus_length_bits, DigestPolicy digest_policy,
std::chrono::time_point<std::chrono::steady_clock> deadline,
SignatureVerifyCache *cache)
: SimplePathBuilderDelegate(min_rsa_modulus_length_bits, digest_policy),
deadline_(deadline),
cache_(cache) {}
bool IsDeadlineExpired() override {
return (std::chrono::steady_clock::now() > deadline_);
}
SignatureVerifyCache *GetVerifyCache() override { return cache_; }
private:
const std::chrono::time_point<std::chrono::steady_clock> deadline_;
SignatureVerifyCache *cache_;
};
std::optional<std::vector<std::vector<std::string>>> CertificateVerifyInternal(
const CertificateVerifyOptions &opts, VerifyError *out_error,
CertificateVerifyStatus *out_status, bool all_paths) {
VerifyError dummy;
if (!out_error) {
out_error = &dummy;
}
if (out_status != nullptr) {
out_status->iteration_count_ = 0;
out_status->max_depth_seen_ = 0;
}
std::string diagnostic;
std::optional<std::shared_ptr<const ParsedCertificate>> maybe_leaf =
InternalParseCertificate(StringAsBytes(opts.leaf_cert), &diagnostic);
if (!maybe_leaf.has_value()) {
*out_error = {VerifyError::StatusCode::CERTIFICATE_INVALID, 0, diagnostic};
return {};
}
std::shared_ptr<const ParsedCertificate> leaf_cert = maybe_leaf.value();
int64_t now;
if (opts.time.has_value()) {
now = opts.time.value();
} else {
now = time(NULL);
}
der::GeneralizedTime verification_time;
if (!der::EncodePosixTimeAsGeneralizedTime(now, &verification_time)) {
*out_error = {VerifyError::StatusCode::VERIFICATION_FAILURE, -1,
"\nCould not encode verification time\n"};
return {};
}
TrustStore *trust_store = nullptr;
if (opts.trust_store) {
trust_store = opts.trust_store->trust_store.get();
}
auto digest_policy = SimplePathBuilderDelegate::DigestPolicy::kStrong;
// TODO(b/111551631): remove this
if (opts.insecurely_allow_sha1) {
digest_policy = SimplePathBuilderDelegate::DigestPolicy::kWeakAllowSha1;
}
std::chrono::time_point<std::chrono::steady_clock> deadline =
std::chrono::time_point<std::chrono::steady_clock>::max();
if (opts.deadline.has_value()) {
deadline = opts.deadline.value();
}
PathBuilderDelegateImpl path_builder_delegate(
opts.min_rsa_modulus_length, digest_policy, deadline,
opts.signature_verify_cache);
KeyPurpose key_purpose = KeyPurpose::SERVER_AUTH;
switch (opts.key_purpose) {
case CertificateVerifyOptions::KeyPurpose::ANY_EKU:
key_purpose = KeyPurpose::ANY_EKU;
break;
case CertificateVerifyOptions::KeyPurpose::SERVER_AUTH:
key_purpose = KeyPurpose::SERVER_AUTH;
break;
case CertificateVerifyOptions::KeyPurpose::CLIENT_AUTH:
key_purpose = KeyPurpose::CLIENT_AUTH;
break;
case CertificateVerifyOptions::KeyPurpose::SERVER_AUTH_STRICT:
key_purpose = KeyPurpose::SERVER_AUTH_STRICT;
break;
case CertificateVerifyOptions::KeyPurpose::CLIENT_AUTH_STRICT:
key_purpose = KeyPurpose::CLIENT_AUTH_STRICT;
break;
case CertificateVerifyOptions::KeyPurpose::SERVER_AUTH_STRICT_LEAF:
key_purpose = KeyPurpose::SERVER_AUTH_STRICT_LEAF;
break;
case CertificateVerifyOptions::KeyPurpose::CLIENT_AUTH_STRICT_LEAF:
key_purpose = KeyPurpose::CLIENT_AUTH_STRICT_LEAF;
break;
}
CertPathBuilder path_builder(leaf_cert, trust_store, &path_builder_delegate,
verification_time, key_purpose,
InitialExplicitPolicy::kFalse,
/* user_initial_policy_set= */
{der::Input(kAnyPolicyOid)},
InitialPolicyMappingInhibit::kFalse,
InitialAnyPolicyInhibit::kFalse);
CertIssuerSourceStatic intermediates;
for (const std::string_view &cert : opts.intermediates) {
std::string diag_string;
std::optional<std::shared_ptr<const ParsedCertificate>> parsed =
InternalParseCertificate(StringAsBytes(cert), &diag_string);
if (!parsed.has_value()) {
if (path_builder_delegate.IsDebugLogEnabled()) {
path_builder_delegate.DebugLog("skipping bad intermediate: " +
diag_string);
}
continue;
}
intermediates.AddCert(std::move(parsed.value()));
}
path_builder.AddCertIssuerSource(&intermediates);
if (opts.extra_intermediates != nullptr) {
path_builder.AddCertIssuerSource(opts.extra_intermediates->impl_.get());
}
if (opts.max_iteration_count > 0) {
path_builder.SetIterationLimit(opts.max_iteration_count);
}
if (opts.max_path_building_depth > 0) {
path_builder.SetDepthLimit(opts.max_path_building_depth);
}
path_builder.SetExploreAllPaths(all_paths);
CertPathBuilder::Result result = path_builder.Run();
if (out_status != nullptr) {
out_status->iteration_count_ = result.iteration_count;
out_status->max_depth_seen_ = result.max_depth_seen;
}
*out_error = result.GetBestPathVerifyError();
if (result.HasValidPath()) {
std::vector<std::vector<std::string>> ret;
if (!all_paths) {
auto best_path = result.GetBestValidPath();
ret.push_back(std::vector<std::string>());
for (size_t i = 0; i < best_path->certs.size(); i++) {
ret[0].emplace_back(BytesAsStringView(best_path->certs[i]->der_cert()));
}
return ret;
}
for (const auto &path : result.paths) {
if (!path->IsValid()) {
continue;
}
std::vector<std::string> ret_path;
for (const auto &cert : path->certs) {
ret_path.emplace_back(BytesAsStringView(cert->der_cert()));
}
ret.push_back(ret_path);
}
return ret;
}
return {};
}
std::optional<std::vector<std::string>> CertificateVerify(
const CertificateVerifyOptions &opts, VerifyError *out_error,
CertificateVerifyStatus *out_status) {
auto single_path = CertificateVerifyInternal(opts, out_error, out_status,
/*all_paths=*/false);
if (!single_path.has_value()) {
return {};
}
return single_path.value()[0];
}
std::optional<std::vector<std::vector<std::string>>> CertificateVerifyAllPaths(
const CertificateVerifyOptions &opts) {
return CertificateVerifyInternal(opts, nullptr, nullptr, /*all_paths=*/true);
}
BSSL_NAMESPACE_END