|  | // Copyright 2015 The Chromium Authors | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include "verify_certificate_chain.h" | 
|  |  | 
|  | #include <algorithm> | 
|  | #include <cassert> | 
|  |  | 
|  | #include <openssl/base.h> | 
|  | #include "cert_error_params.h" | 
|  | #include "cert_errors.h" | 
|  | #include "common_cert_errors.h" | 
|  | #include "extended_key_usage.h" | 
|  | #include "input.h" | 
|  | #include "name_constraints.h" | 
|  | #include "parse_certificate.h" | 
|  | #include "signature_algorithm.h" | 
|  | #include "trust_store.h" | 
|  | #include "verify_signed_data.h" | 
|  |  | 
|  | BSSL_NAMESPACE_BEGIN | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | bool IsHandledCriticalExtension(const ParsedExtension &extension) { | 
|  | if (extension.oid == der::Input(kBasicConstraintsOid)) { | 
|  | return true; | 
|  | } | 
|  | // Key Usage is NOT processed for end-entity certificates (this is the | 
|  | // responsibility of callers), however it is considered "handled" here in | 
|  | // order to allow being marked as critical. | 
|  | if (extension.oid == der::Input(kKeyUsageOid)) { | 
|  | return true; | 
|  | } | 
|  | if (extension.oid == der::Input(kExtKeyUsageOid)) { | 
|  | return true; | 
|  | } | 
|  | if (extension.oid == der::Input(kNameConstraintsOid)) { | 
|  | return true; | 
|  | } | 
|  | if (extension.oid == der::Input(kSubjectAltNameOid)) { | 
|  | return true; | 
|  | } | 
|  | if (extension.oid == der::Input(kCertificatePoliciesOid)) { | 
|  | // Policy qualifiers are skipped during processing, so if the | 
|  | // extension is marked critical need to ensure there weren't any | 
|  | // qualifiers other than User Notice / CPS. | 
|  | // | 
|  | // This follows from RFC 5280 section 4.2.1.4: | 
|  | // | 
|  | //   If this extension is critical, the path validation software MUST | 
|  | //   be able to interpret this extension (including the optional | 
|  | //   qualifier), or MUST reject the certificate. | 
|  | std::vector<der::Input> unused_policies; | 
|  | CertErrors unused_errors; | 
|  | return ParseCertificatePoliciesExtensionOids( | 
|  | extension.value, true /*fail_parsing_unknown_qualifier_oids*/, | 
|  | &unused_policies, &unused_errors); | 
|  |  | 
|  | // TODO(eroman): Give a better error message. | 
|  | } | 
|  | if (extension.oid == der::Input(kPolicyMappingsOid)) { | 
|  | return true; | 
|  | } | 
|  | if (extension.oid == der::Input(kPolicyConstraintsOid)) { | 
|  | return true; | 
|  | } | 
|  | if (extension.oid == der::Input(kInhibitAnyPolicyOid)) { | 
|  | return true; | 
|  | } | 
|  |  | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Adds errors to |errors| if the certificate contains unconsumed _critical_ | 
|  | // extensions. | 
|  | void VerifyNoUnconsumedCriticalExtensions(const ParsedCertificate &cert, | 
|  | CertErrors *errors, | 
|  | bool allow_precertificate, | 
|  | KeyPurpose key_purpose) { | 
|  | for (const auto &it : cert.extensions()) { | 
|  | const ParsedExtension &extension = it.second; | 
|  | if (extension.critical) { | 
|  | if (key_purpose == KeyPurpose::RCS_MLS_CLIENT_AUTH) { | 
|  | if (extension.oid == der::Input(kRcsMlsParticipantInformation) || | 
|  | extension.oid == der::Input(kRcsMlsAcsParticipantInformation)) { | 
|  | continue; | 
|  | } | 
|  | } | 
|  | if (allow_precertificate && extension.oid == der::Input(kCtPoisonOid)) { | 
|  | continue; | 
|  | } | 
|  | if (extension.oid == der::Input(kMSApplicationPoliciesOid) && | 
|  | cert.has_extended_key_usage()) { | 
|  | // Per https://crbug.com/1439638 and | 
|  | // https://learn.microsoft.com/en-us/windows/win32/seccertenroll/supported-extensions#msapplicationpolicies | 
|  | // The MSApplicationPolicies extension may be ignored if the | 
|  | // extendedKeyUsage extension is also present. | 
|  | continue; | 
|  | } | 
|  | if (!IsHandledCriticalExtension(extension)) { | 
|  | errors->AddError(cert_errors::kUnconsumedCriticalExtension, | 
|  | CreateCertErrorParams2Der("oid", extension.oid, | 
|  | "value", extension.value)); | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // Returns true if |cert| was self-issued. The definition of self-issuance | 
|  | // comes from RFC 5280 section 6.1: | 
|  | // | 
|  | //    A certificate is self-issued if the same DN appears in the subject | 
|  | //    and issuer fields (the two DNs are the same if they match according | 
|  | //    to the rules specified in Section 7.1).  In general, the issuer and | 
|  | //    subject of the certificates that make up a path are different for | 
|  | //    each certificate.  However, a CA may issue a certificate to itself to | 
|  | //    support key rollover or changes in certificate policies.  These | 
|  | //    self-issued certificates are not counted when evaluating path length | 
|  | //    or name constraints. | 
|  | [[nodiscard]] bool IsSelfIssued(const ParsedCertificate &cert) { | 
|  | return cert.normalized_subject() == cert.normalized_issuer(); | 
|  | } | 
|  |  | 
|  | // Adds errors to |errors| if |cert| is not valid at time |time|. | 
|  | // | 
|  | // The certificate's validity requirements are described by RFC 5280 section | 
|  | // 4.1.2.5: | 
|  | // | 
|  | //    The validity period for a certificate is the period of time from | 
|  | //    notBefore through notAfter, inclusive. | 
|  | void VerifyTimeValidity(const ParsedCertificate &cert, | 
|  | const der::GeneralizedTime &time, CertErrors *errors) { | 
|  | if (time < cert.tbs().validity_not_before) { | 
|  | errors->AddError(cert_errors::kValidityFailedNotBefore); | 
|  | } | 
|  |  | 
|  | if (cert.tbs().validity_not_after < time) { | 
|  | errors->AddError(cert_errors::kValidityFailedNotAfter); | 
|  | } | 
|  | } | 
|  |  | 
|  | // Adds errors to |errors| if |cert| has internally inconsistent signature | 
|  | // algorithms. | 
|  | // | 
|  | // X.509 certificates contain two different signature algorithms: | 
|  | //  (1) The signatureAlgorithm field of Certificate | 
|  | //  (2) The signature field of TBSCertificate | 
|  | // | 
|  | // According to RFC 5280 section 4.1.1.2 and 4.1.2.3 these two fields must be | 
|  | // equal: | 
|  | // | 
|  | //     This field MUST contain the same algorithm identifier as the | 
|  | //     signature field in the sequence tbsCertificate (Section 4.1.2.3). | 
|  | // | 
|  | // The spec is not explicit about what "the same algorithm identifier" means. | 
|  | // Our interpretation is that the two DER-encoded fields must be byte-for-byte | 
|  | // identical. | 
|  | // | 
|  | // In practice however there are certificates which use different encodings for | 
|  | // specifying RSA with SHA1 (different OIDs). This is special-cased for | 
|  | // compatibility sake. | 
|  | bool VerifySignatureAlgorithmsMatch(const ParsedCertificate &cert, | 
|  | CertErrors *errors) { | 
|  | der::Input alg1_tlv = cert.signature_algorithm_tlv(); | 
|  | der::Input alg2_tlv = cert.tbs().signature_algorithm_tlv; | 
|  |  | 
|  | // Ensure that the two DER-encoded signature algorithms are byte-for-byte | 
|  | // equal. | 
|  | if (alg1_tlv == alg2_tlv) { | 
|  | return true; | 
|  | } | 
|  |  | 
|  | // But make a compatibility concession if alternate encodings are used | 
|  | // TODO(eroman): Turn this warning into an error. | 
|  | // TODO(eroman): Add a unit-test that exercises this case. | 
|  | std::optional<SignatureAlgorithm> alg1 = ParseSignatureAlgorithm(alg1_tlv); | 
|  | if (!alg1) { | 
|  | errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm); | 
|  | return false; | 
|  | } | 
|  | std::optional<SignatureAlgorithm> alg2 = ParseSignatureAlgorithm(alg2_tlv); | 
|  | if (!alg2) { | 
|  | errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (*alg1 == *alg2) { | 
|  | errors->AddWarning( | 
|  | cert_errors::kSignatureAlgorithmsDifferentEncoding, | 
|  | CreateCertErrorParams2Der("Certificate.algorithm", alg1_tlv, | 
|  | "TBSCertificate.signature", alg2_tlv)); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | errors->AddError( | 
|  | cert_errors::kSignatureAlgorithmMismatch, | 
|  | CreateCertErrorParams2Der("Certificate.algorithm", alg1_tlv, | 
|  | "TBSCertificate.signature", alg2_tlv)); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Verify that |cert| can be used for |required_key_purpose|. | 
|  | void VerifyExtendedKeyUsage(const ParsedCertificate &cert, | 
|  | KeyPurpose required_key_purpose, CertErrors *errors, | 
|  | bool is_target_cert, bool is_target_cert_issuer) { | 
|  | // We treat a required KeyPurpose of ANY_EKU to mean "Do not check EKU" | 
|  | if (required_key_purpose == KeyPurpose::ANY_EKU) { | 
|  | return; | 
|  | } | 
|  | bool has_any_eku = false; | 
|  | bool has_server_auth_eku = false; | 
|  | bool has_client_auth_eku = false; | 
|  | bool has_code_signing_eku = false; | 
|  | bool has_time_stamping_eku = false; | 
|  | bool has_ocsp_signing_eku = false; | 
|  | bool has_rcs_mls_client_eku = false; | 
|  | bool has_document_signing_eku = false; | 
|  | bool has_email_protection_eku = false; | 
|  | size_t eku_oid_count = 0; | 
|  | if (cert.has_extended_key_usage()) { | 
|  | for (const auto &key_purpose_oid : cert.extended_key_usage()) { | 
|  | eku_oid_count++; | 
|  | if (key_purpose_oid == der::Input(kAnyEKU)) { | 
|  | has_any_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kServerAuth)) { | 
|  | has_server_auth_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kClientAuth)) { | 
|  | has_client_auth_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kCodeSigning)) { | 
|  | has_code_signing_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kTimeStamping)) { | 
|  | has_time_stamping_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kOCSPSigning)) { | 
|  | has_ocsp_signing_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kRcsMlsClient)) { | 
|  | has_rcs_mls_client_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kEmailProtection)) { | 
|  | has_email_protection_eku = true; | 
|  | } | 
|  | if (key_purpose_oid == der::Input(kDocumentSigning)) { | 
|  | has_document_signing_eku = true; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | if (required_key_purpose == KeyPurpose::RCS_MLS_CLIENT_AUTH) { | 
|  | // Enforce the key usage restriction for a leaf from section A.3.8.3 here | 
|  | // as well. | 
|  | if (is_target_cert && | 
|  | (!cert.has_key_usage() || | 
|  | // This works to enforce that digital signature is the only bit because | 
|  | // digital signature is bit 0. | 
|  | !cert.key_usage().AssertsBit(KEY_USAGE_BIT_DIGITAL_SIGNATURE) || | 
|  | cert.key_usage().bytes().size() != 1 || | 
|  | cert.key_usage().unused_bits() != 7)) { | 
|  | errors->AddError(cert_errors::kKeyUsageIncorrectForRcsMlsClient); | 
|  | } | 
|  | // Rules for MLS client auth. For the leaf and all intermediates, EKU must | 
|  | // be present and have exactly one EKU which is rcsMlsClient. | 
|  | if (!cert.has_extended_key_usage()) { | 
|  | errors->AddError(cert_errors::kEkuNotPresent); | 
|  | } else if (eku_oid_count != 1 || !has_rcs_mls_client_eku) { | 
|  | errors->AddError(cert_errors::kEkuIncorrectForRcsMlsClient); | 
|  | } | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (required_key_purpose == KeyPurpose::C2PA_TIMESTAMPING) { | 
|  | // https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html#_certificate_profiles | 
|  | // For time stamp signing, C2PA requires that the leaf: | 
|  | // 1) must have EKU | 
|  | // 2) must not have EKU ANY, OCSP signing, document signing, or email protection | 
|  | // 3) must have time stamping | 
|  | // 4) should tolerate other EKU's being present. | 
|  | if (is_target_cert) { | 
|  | if (!cert.has_extended_key_usage()) { | 
|  | errors->AddError(cert_errors::kEkuNotPresent); | 
|  | } | 
|  | if (has_any_eku || has_ocsp_signing_eku || has_document_signing_eku || | 
|  | has_email_protection_eku || !has_time_stamping_eku) { | 
|  | errors->AddError(cert_errors::kEkuIncorrectForC2PATimeStamping); | 
|  | } | 
|  | } | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (required_key_purpose == KeyPurpose::C2PA_MANIFEST) { | 
|  | // https://c2pa.org/specifications/specifications/2.1/specs/C2PA_Specification.html#_certificate_profiles | 
|  | // For manifest signing, C2PA requires that the leaf: | 
|  | // 1) must have EKU | 
|  | // 2) must not have EKU ANY, time stamping, or OCSP signing | 
|  | // 3) should have document signing and/or email protection | 
|  | // 4) should tolerate other EKU's being present. | 
|  | if (is_target_cert) { | 
|  | if (!cert.has_extended_key_usage()) { | 
|  | errors->AddError(cert_errors::kEkuNotPresent); | 
|  | } | 
|  | if (!cert.has_key_usage() || | 
|  | !cert.key_usage().AssertsBit(KEY_USAGE_BIT_DIGITAL_SIGNATURE) || | 
|  | has_any_eku || has_ocsp_signing_eku || has_time_stamping_eku || | 
|  | (!has_email_protection_eku && !has_document_signing_eku)) { | 
|  | errors->AddError(cert_errors::kEkuIncorrectForC2PAManifest); | 
|  | } | 
|  | } | 
|  | return; | 
|  | } | 
|  |  | 
|  | // Rules TLS client and server authentication variants. | 
|  |  | 
|  | // Apply strict only to leaf certificates in these cases. | 
|  | if (required_key_purpose == KeyPurpose::CLIENT_AUTH_STRICT_LEAF) { | 
|  | if (!is_target_cert) { | 
|  | required_key_purpose = KeyPurpose::CLIENT_AUTH; | 
|  | } else { | 
|  | required_key_purpose = KeyPurpose::CLIENT_AUTH_STRICT; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (required_key_purpose == KeyPurpose::SERVER_AUTH_STRICT_LEAF) { | 
|  | if (!is_target_cert) { | 
|  | required_key_purpose = KeyPurpose::SERVER_AUTH; | 
|  | } else { | 
|  | required_key_purpose = KeyPurpose::SERVER_AUTH_STRICT; | 
|  | } | 
|  | } | 
|  |  | 
|  | auto add_error_if_strict = [&](CertErrorId id) { | 
|  | if (required_key_purpose == KeyPurpose::SERVER_AUTH_STRICT || | 
|  | required_key_purpose == KeyPurpose::CLIENT_AUTH_STRICT) { | 
|  | errors->AddError(id); | 
|  | } else { | 
|  | errors->AddWarning(id); | 
|  | } | 
|  | }; | 
|  | if (is_target_cert) { | 
|  | // Loosely based upon CABF BR version 1.8.4, 7.1.2.3(f).  We are more | 
|  | // permissive in that we still allow EKU any to be present in a leaf | 
|  | // certificate, but we ignore it for purposes of server or client auth.  We | 
|  | // are less permissive in that we prohibit Code Signing, OCSP Signing, and | 
|  | // Time Stamping which are currently only a SHOULD NOT. The BR does | 
|  | // explicitly allow Email authentication to be present, as this still exists | 
|  | // in the wild (2022), so we do not prohibit Email authentication here (and | 
|  | // by extension must allow it to be present in the signer, below). | 
|  | if (!cert.has_extended_key_usage()) { | 
|  | // This is added as a warning, an error will be added in STRICT modes | 
|  | // if we then lack client or server auth due to this not being present. | 
|  | errors->AddWarning(cert_errors::kEkuNotPresent); | 
|  | } else { | 
|  | if (has_code_signing_eku) { | 
|  | add_error_if_strict(cert_errors::kEkuHasProhibitedCodeSigning); | 
|  | } | 
|  | if (has_ocsp_signing_eku) { | 
|  | add_error_if_strict(cert_errors::kEkuHasProhibitedOCSPSigning); | 
|  | } | 
|  | if (has_time_stamping_eku) { | 
|  | add_error_if_strict(cert_errors::kEkuHasProhibitedTimeStamping); | 
|  | } | 
|  | } | 
|  | } else if (is_target_cert_issuer) { | 
|  | // Handle the decision to overload EKU as a constraint on issuers. | 
|  | // | 
|  | // CABF BR version 1.8.4, 7.1.2.2(g) pertains to the case of "Certs used to | 
|  | // issue TLS certificates", While the BR refers to the entire chain of | 
|  | // intermediates, there are a number of exceptions regarding CA ownership | 
|  | // and cross signing which are impossible for us to know or enforce here. | 
|  | // Therefore, we can only enforce at the level of the intermediate that | 
|  | // issued our target certificate. This means we we differ in the following | 
|  | // ways: | 
|  | // - We only enforce at the issuer of the TLS certificate. | 
|  | // - We allow email protection to exist in the issuer, since without | 
|  | //   this it can not be allowed in the client (other than via EKU any)) | 
|  | // - As in the leaf certificate case, we allow EKU any to be present, but | 
|  | //   we ignore it for the purposes of server or client auth. | 
|  | // | 
|  | // At this time (until at least 2023) some intermediates are lacking EKU in | 
|  | // the world at large from common CA's, so we allow the noEKU case to permit | 
|  | // everything. | 
|  | // TODO(bbe): enforce requiring EKU in the issuer when we can manage it. | 
|  | if (cert.has_extended_key_usage()) { | 
|  | if (has_code_signing_eku) { | 
|  | add_error_if_strict(cert_errors::kEkuHasProhibitedCodeSigning); | 
|  | } | 
|  | if (has_time_stamping_eku) { | 
|  | add_error_if_strict(cert_errors::kEkuHasProhibitedTimeStamping); | 
|  | } | 
|  | } | 
|  | } | 
|  | // Otherwise, we are a parent of an issuer of a TLS certificate.  The CABF | 
|  | // BR version 1.8.4, 7.1.2.2(g) goes as far as permitting EKU any in certain | 
|  | // cases of Cross Signing and CA Ownership, having permitted cases where EKU | 
|  | // is permitted to not be present at all. These cases are not practical to | 
|  | // differentiate here and therefore we don't attempt to enforce any further | 
|  | // EKU "constraints" on such certificates. Unlike the above cases we also | 
|  | // allow the use of EKU any for client or server auth constraint purposes. | 
|  |  | 
|  | switch (required_key_purpose) { | 
|  | case KeyPurpose::ANY_EKU: | 
|  | case KeyPurpose::CLIENT_AUTH_STRICT_LEAF: | 
|  | case KeyPurpose::SERVER_AUTH_STRICT_LEAF: | 
|  | case KeyPurpose::RCS_MLS_CLIENT_AUTH: | 
|  | case KeyPurpose::C2PA_TIMESTAMPING: | 
|  | case KeyPurpose::C2PA_MANIFEST: | 
|  | assert(0);  // NOTREACHED | 
|  | return; | 
|  | case KeyPurpose::SERVER_AUTH: | 
|  | case KeyPurpose::SERVER_AUTH_STRICT: { | 
|  | if (has_any_eku && !has_server_auth_eku) { | 
|  | if (is_target_cert || is_target_cert_issuer) { | 
|  | errors->AddWarning(cert_errors::kEkuLacksServerAuthButHasAnyEKU); | 
|  | } else { | 
|  | // Accept anyEKU for server auth below target issuer. | 
|  | has_server_auth_eku = true; | 
|  | } | 
|  | } | 
|  | if (is_target_cert_issuer && !cert.has_extended_key_usage()) { | 
|  | // Accept noEKU for server auth in target issuer. | 
|  | // TODO(bbe): remove this once BR requirements catch up with CA's. | 
|  | has_server_auth_eku = true; | 
|  | } | 
|  | if (required_key_purpose == KeyPurpose::SERVER_AUTH) { | 
|  | // Legacy compatible. | 
|  | if (cert.has_extended_key_usage() && !has_server_auth_eku && | 
|  | !has_any_eku) { | 
|  | errors->AddError(cert_errors::kEkuLacksServerAuth); | 
|  | } | 
|  | } else { | 
|  | if (!has_server_auth_eku) { | 
|  | errors->AddError(cert_errors::kEkuLacksServerAuth); | 
|  | } | 
|  | } | 
|  | break; | 
|  | } | 
|  | case KeyPurpose::CLIENT_AUTH: | 
|  | case KeyPurpose::CLIENT_AUTH_STRICT: { | 
|  | if (has_any_eku && !has_client_auth_eku) { | 
|  | if (is_target_cert || is_target_cert_issuer) { | 
|  | errors->AddWarning(cert_errors::kEkuLacksClientAuthButHasAnyEKU); | 
|  | } else { | 
|  | // accept anyEKU for client auth. | 
|  | has_client_auth_eku = true; | 
|  | } | 
|  | } | 
|  | if (required_key_purpose == KeyPurpose::CLIENT_AUTH) { | 
|  | // Legacy-compatible. | 
|  | if (cert.has_extended_key_usage() && !has_client_auth_eku && | 
|  | !has_any_eku) { | 
|  | errors->AddError(cert_errors::kEkuLacksClientAuth); | 
|  | } | 
|  | } else { | 
|  | if (!has_client_auth_eku) { | 
|  | errors->AddError(cert_errors::kEkuLacksClientAuth); | 
|  | } | 
|  | } | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // Representation of RFC 5280's "valid_policy_tree", used to keep track of the | 
|  | // valid policies and policy re-mappings. This structure is defined in | 
|  | // section 6.1.2. | 
|  | // | 
|  | // ValidPolicyGraph differs from RFC 5280's description in that: | 
|  | // | 
|  | //  (1) It does not track "qualifier_set". This is not needed as it is not | 
|  | //      output by this implementation. | 
|  | // | 
|  | //  (2) It builds a directed acyclic graph, rather than a tree. When a given | 
|  | //      policy matches multiple parents, RFC 5280 makes a separate node for | 
|  | //      each parent. This representation condenses them into one node with | 
|  | //      multiple parents. | 
|  | // | 
|  | //  (3) It does not track "expected_policy_set" or anyPolicy nodes directly. | 
|  | //      Rather it maintains, only for the most recent level, whether there is an | 
|  | //      anyPolicy node and an inverted map of all "expected_policy_set" values. | 
|  | // | 
|  | //  (4) Some pruning steps are deferred to when policies are evaluated, as a | 
|  | //      reachability pass. | 
|  | class ValidPolicyGraph { | 
|  | public: | 
|  | ValidPolicyGraph() = default; | 
|  |  | 
|  | ValidPolicyGraph(const ValidPolicyGraph &) = delete; | 
|  | ValidPolicyGraph &operator=(const ValidPolicyGraph &) = delete; | 
|  |  | 
|  | // A Node is an entry in the policy graph. It contains information about some | 
|  | // policy asserted by a certificate in the chain. The policy OID itself is | 
|  | // omitted because it is the key in the Level map. | 
|  | struct Node { | 
|  | // The list of "valid_policy" values for all nodes which are a parent of | 
|  | // this node, other than anyPolicy. If empty, this node has a single parent, | 
|  | // anyPolicy. | 
|  | // | 
|  | // Nodes whose parent is anyPolicy are root policies, and may be returned | 
|  | // in the authorities-constrained-policy-set. Nodes with a concrete policy | 
|  | // as a parent are derived from that policy in the issuer certificate, | 
|  | // possibly with a policy mapping applied. | 
|  | // | 
|  | // Note it is not possible for a policy to have both anyPolicy and a | 
|  | // concrete policy as a parent. Section 6.1.3, step d.1.ii only runs if | 
|  | // there was no match in step d.1.i. | 
|  | std::vector<der::Input> parent_policies; | 
|  |  | 
|  | // Whether this node matches a policy mapping in the certificate. If true, | 
|  | // its "expected_policy_set" comes from the policy mappings extension. If | 
|  | // false, its "expected_policy_set" is itself. | 
|  | bool mapped = false; | 
|  |  | 
|  | // Whether this node is reachable from some valid policy in the end-entity | 
|  | // certificate. Computed during GetValidRootPolicySet(). | 
|  | bool reachable = false; | 
|  | }; | 
|  |  | 
|  | // The policy graph is organized into "levels", each corresponding to a | 
|  | // certificate in the chain. We maintain a map from "valid_policy" to the | 
|  | // corresponding Node. This is the set of policies asserted by this | 
|  | // certificate. The special anyPolicy OID is handled separately below. | 
|  | using Level = std::map<der::Input, Node>; | 
|  |  | 
|  | // Additional per-level information that only needs to be maintained for the | 
|  | // bottom-most level. | 
|  | struct LevelDetails { | 
|  | // Maintains the "expected_policy_set" values for nodes in a level of the | 
|  | // graph, but the map is inverted from RFC 5280's formulation. For a given | 
|  | // policy OID P, other than anyPolicy, this map gives the set of nodes where | 
|  | // P appears in the node's "expected_policy_set". anyPolicy is handled | 
|  | // separately below. | 
|  | std::map<der::Input, std::vector<der::Input>> expected_policy_map; | 
|  |  | 
|  | // Whether there is a node at this level whose "valid_policy" is anyPolicy. | 
|  | // | 
|  | // Note anyPolicy's "expected_policy_set" always {anyPolicy}, and anyPolicy | 
|  | // will never appear in the "expected_policy_set" of any other policy. That | 
|  | // means this field also captures how anyPolicy appears in | 
|  | // "expected_policy_set". | 
|  | bool has_any_policy = false; | 
|  | }; | 
|  |  | 
|  | // Initializes the ValidPolicyGraph. | 
|  | void Init() { | 
|  | SetNull(); | 
|  | StartLevel(); | 
|  | AddAnyPolicyNode(); | 
|  | } | 
|  |  | 
|  | // In RFC 5280 valid_policy_tree may be set to null. That is represented here | 
|  | // by emptiness. | 
|  | bool IsNull() const { | 
|  | return !current_level_.has_any_policy && | 
|  | (levels_.empty() || levels_.back().empty()); | 
|  | } | 
|  | void SetNull() { | 
|  | levels_.clear(); | 
|  | current_level_ = LevelDetails{}; | 
|  | } | 
|  |  | 
|  | // Completes the previous level, returning a corresponding LevelDetails | 
|  | // structure, and starts a new level. | 
|  | LevelDetails StartLevel() { | 
|  | // Finish building expected_policy_map for the previous level. | 
|  | if (!levels_.empty()) { | 
|  | for (const auto &[policy, node] : levels_.back()) { | 
|  | if (!node.mapped) { | 
|  | current_level_.expected_policy_map[policy].push_back(policy); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | LevelDetails prev_level = std::move(current_level_); | 
|  | levels_.emplace_back(); | 
|  | current_level_ = LevelDetails{}; | 
|  | return prev_level; | 
|  | } | 
|  |  | 
|  | // Gets the set of policies (in terms of root authority's policy domain) that | 
|  | // are valid at the bottom level of the policy graph, intersected with | 
|  | // |user_initial_policy_set|. This is what X.509 calls | 
|  | // "user-constrained-policy-set". | 
|  | // | 
|  | // This method may only be called once, after the policy graph is constructed. | 
|  | std::set<der::Input> GetUserConstrainedPolicySet( | 
|  | const std::set<der::Input> &user_initial_policy_set) { | 
|  | if (levels_.empty()) { | 
|  | return {}; | 
|  | } | 
|  |  | 
|  | bool user_has_any_policy = | 
|  | user_initial_policy_set.count(der::Input(kAnyPolicyOid)) != 0; | 
|  | if (current_level_.has_any_policy) { | 
|  | if (user_has_any_policy) { | 
|  | return {der::Input(kAnyPolicyOid)}; | 
|  | } | 
|  | return user_initial_policy_set; | 
|  | } | 
|  |  | 
|  | // The root's policy domain is determined by nodes with anyPolicy as a | 
|  | // parent. However, we must limit to those which are reachable from the | 
|  | // end-entity certificate because we defer some pruning steps. | 
|  | for (auto &[policy, node] : levels_.back()) { | 
|  | // GCC before 8.1 tracks individual unused bindings and does not support | 
|  | // marking them [[maybe_unused]]. | 
|  | (void)policy; | 
|  | node.reachable = true; | 
|  | } | 
|  | std::set<der::Input> policy_set; | 
|  | for (size_t i = levels_.size() - 1; i < levels_.size(); i--) { | 
|  | for (auto &[policy, node] : levels_[i]) { | 
|  | if (!node.reachable) { | 
|  | continue; | 
|  | } | 
|  | if (node.parent_policies.empty()) { | 
|  | // |node|'s parent is anyPolicy, so this is in the root policy domain. | 
|  | // Add it to the set if it is also in user's list. | 
|  | if (user_has_any_policy || | 
|  | user_initial_policy_set.count(policy) > 0) { | 
|  | policy_set.insert(policy); | 
|  | } | 
|  | } else if (i > 0) { | 
|  | // Otherwise, continue searching the previous level. | 
|  | for (der::Input parent : node.parent_policies) { | 
|  | auto iter = levels_[i - 1].find(parent); | 
|  | if (iter != levels_[i - 1].end()) { | 
|  | iter->second.reachable = true; | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  | return policy_set; | 
|  | } | 
|  |  | 
|  | // Adds a node with policy anyPolicy to the current level. | 
|  | void AddAnyPolicyNode() { | 
|  | assert(!levels_.empty()); | 
|  | current_level_.has_any_policy = true; | 
|  | } | 
|  |  | 
|  | // Adds a node to the current level which is a child of |parent_policies| with | 
|  | // the specified policy. | 
|  | void AddNode(der::Input policy, std::vector<der::Input> parent_policies) { | 
|  | assert(policy != der::Input(kAnyPolicyOid)); | 
|  | AddNodeReturningIterator(policy, std::move(parent_policies)); | 
|  | } | 
|  |  | 
|  | // Adds a node to the current level which is a child of anyPolicy with the | 
|  | // specified policy. | 
|  | void AddNodeWithParentAnyPolicy(der::Input policy) { | 
|  | // An empty parent set represents a node parented by anyPolicy. | 
|  | AddNode(policy, {}); | 
|  | } | 
|  |  | 
|  | // Maps |issuer_policy| to |subject_policy|, as in RFC 5280, section 6.1.4, | 
|  | // step b.1. | 
|  | void AddPolicyMapping(der::Input issuer_policy, der::Input subject_policy) { | 
|  | assert(issuer_policy != der::Input(kAnyPolicyOid)); | 
|  | assert(subject_policy != der::Input(kAnyPolicyOid)); | 
|  | if (levels_.empty()) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | // The mapping only applies if |issuer_policy| exists in the current level. | 
|  | auto issuer_policy_iter = levels_.back().find(issuer_policy); | 
|  | if (issuer_policy_iter == levels_.back().end()) { | 
|  | // If there is no match, it can instead match anyPolicy. | 
|  | if (!current_level_.has_any_policy) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | // From RFC 5280, section 6.1.4, step b.1: | 
|  | // | 
|  | //    If no node of depth i in the valid_policy_tree has a | 
|  | //    valid_policy of ID-P but there is a node of depth i with a | 
|  | //    valid_policy of anyPolicy, then generate a child node of | 
|  | //    the node of depth i-1 that has a valid_policy of anyPolicy | 
|  | //    as follows: [...] | 
|  | // | 
|  | // The anyPolicy node of depth i-1 is referring to the parent of the | 
|  | // anyPolicy node of depth i. The parent of anyPolicy is always anyPolicy. | 
|  | issuer_policy_iter = AddNodeReturningIterator(issuer_policy, {}); | 
|  | } | 
|  |  | 
|  | // Unmapped nodes have a singleton "expected_policy_set" containing their | 
|  | // valid_policy. Track whether nodes have been mapped so this can be filled | 
|  | // in at StartLevel(). | 
|  | issuer_policy_iter->second.mapped = true; | 
|  |  | 
|  | // Add |subject_policy| to |issuer_policy|'s "expected_policy_set". | 
|  | current_level_.expected_policy_map[subject_policy].push_back(issuer_policy); | 
|  | } | 
|  |  | 
|  | // Removes the node with the specified policy from the current level. | 
|  | void DeleteNode(der::Input policy) { | 
|  | if (!levels_.empty()) { | 
|  | levels_.back().erase(policy); | 
|  | } | 
|  | } | 
|  |  | 
|  | private: | 
|  | Level::iterator AddNodeReturningIterator( | 
|  | der::Input policy, std::vector<der::Input> parent_policies) { | 
|  | assert(policy != der::Input(kAnyPolicyOid)); | 
|  | auto [iter, inserted] = levels_.back().insert( | 
|  | std::pair{policy, Node{std::move(parent_policies)}}); | 
|  | // GCC before 8.1 tracks individual unused bindings and does not support | 
|  | // marking them [[maybe_unused]]. | 
|  | (void)inserted; | 
|  | assert(inserted); | 
|  | return iter; | 
|  | } | 
|  |  | 
|  | // The list of levels, starting from the root. | 
|  | std::vector<Level> levels_; | 
|  | // Additional information about the current level. | 
|  | LevelDetails current_level_; | 
|  | }; | 
|  |  | 
|  | // Class that encapsulates the state variables used by certificate path | 
|  | // validation. | 
|  | class PathVerifier { | 
|  | public: | 
|  | // Same parameters and meaning as VerifyCertificateChain(). | 
|  | void Run(const ParsedCertificateList &certs, | 
|  | const CertificateTrust &last_cert_trust, | 
|  | VerifyCertificateChainDelegate *delegate, | 
|  | const der::GeneralizedTime &time, KeyPurpose required_key_purpose, | 
|  | InitialExplicitPolicy initial_explicit_policy, | 
|  | const std::set<der::Input> &user_initial_policy_set, | 
|  | InitialPolicyMappingInhibit initial_policy_mapping_inhibit, | 
|  | InitialAnyPolicyInhibit initial_any_policy_inhibit, | 
|  | std::set<der::Input> *user_constrained_policy_set, | 
|  | CertPathErrors *errors); | 
|  |  | 
|  | private: | 
|  | // Verifies and updates the valid policies. This corresponds with RFC 5280 | 
|  | // section 6.1.3 steps d-f. | 
|  | void VerifyPolicies(const ParsedCertificate &cert, bool is_target_cert, | 
|  | CertErrors *errors); | 
|  |  | 
|  | // Applies the policy mappings. This corresponds with RFC 5280 section 6.1.4 | 
|  | // steps a-b. | 
|  | void VerifyPolicyMappings(const ParsedCertificate &cert, CertErrors *errors); | 
|  |  | 
|  | // Applies policyConstraints and inhibitAnyPolicy. This corresponds with RFC | 
|  | // 5280 section 6.1.4 steps i-j. | 
|  | void ApplyPolicyConstraints(const ParsedCertificate &cert); | 
|  |  | 
|  | // This function corresponds to RFC 5280 section 6.1.3's "Basic Certificate | 
|  | // Processing" procedure. | 
|  | void BasicCertificateProcessing(const ParsedCertificate &cert, | 
|  | bool is_target_cert, | 
|  | bool is_target_cert_issuer, | 
|  | const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors, | 
|  | bool *shortcircuit_chain_validation); | 
|  |  | 
|  | // This function corresponds to RFC 5280 section 6.1.4's "Preparation for | 
|  | // Certificate i+1" procedure. |cert| is expected to be an intermediate. | 
|  | void PrepareForNextCertificate(const ParsedCertificate &cert, | 
|  | KeyPurpose key_purpose, CertErrors *errors); | 
|  |  | 
|  | // This function corresponds with RFC 5280 section 6.1.5's "Wrap-Up | 
|  | // Procedure". It does processing for the final certificate (the target cert). | 
|  | void WrapUp(const ParsedCertificate &cert, KeyPurpose required_key_purpose, | 
|  | const std::set<der::Input> &user_initial_policy_set, | 
|  | bool allow_precertificate, CertErrors *errors); | 
|  |  | 
|  | // Enforces trust anchor constraints compatibile with RFC 5937. | 
|  | // | 
|  | // Note that the anchor constraints are encoded via the attached certificate | 
|  | // itself. | 
|  | void ApplyTrustAnchorConstraints(const ParsedCertificate &cert, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors); | 
|  |  | 
|  | // Initializes the path validation algorithm given anchor constraints. This | 
|  | // follows the description in RFC 5937 | 
|  | void ProcessRootCertificate(const ParsedCertificate &cert, | 
|  | const CertificateTrust &trust, | 
|  | const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors, | 
|  | bool *shortcircuit_chain_validation); | 
|  |  | 
|  | // Processes verification when the input is a single certificate. This is not | 
|  | // defined by any standard. We attempt to match the de-facto behaviour of | 
|  | // Operating System verifiers. | 
|  | void ProcessSingleCertChain(const ParsedCertificate &cert, | 
|  | const CertificateTrust &trust, | 
|  | const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors); | 
|  |  | 
|  | // Parses |spki| to an EVP_PKEY and checks whether the public key is accepted | 
|  | // by |delegate_|. On failure parsing returns nullptr. If either parsing the | 
|  | // key or key policy failed, adds a high-severity error to |errors|. | 
|  | bssl::UniquePtr<EVP_PKEY> ParseAndCheckPublicKey(der::Input spki, | 
|  | CertErrors *errors); | 
|  |  | 
|  | ValidPolicyGraph valid_policy_graph_; | 
|  |  | 
|  | std::set<der::Input> user_constrained_policy_set_; | 
|  |  | 
|  | // Will contain a NameConstraints for each previous cert in the chain which | 
|  | // had nameConstraints. This corresponds to the permitted_subtrees and | 
|  | // excluded_subtrees state variables from RFC 5280. | 
|  | std::vector<const NameConstraints *> name_constraints_list_; | 
|  |  | 
|  | // |explicit_policy_| corresponds with the same named variable from RFC 5280 | 
|  | // section 6.1.2: | 
|  | // | 
|  | //   explicit_policy:  an integer that indicates if a non-NULL | 
|  | //   valid_policy_tree is required.  The integer indicates the | 
|  | //   number of non-self-issued certificates to be processed before | 
|  | //   this requirement is imposed.  Once set, this variable may be | 
|  | //   decreased, but may not be increased.  That is, if a certificate in the | 
|  | //   path requires a non-NULL valid_policy_tree, a later certificate cannot | 
|  | //   remove this requirement.  If initial-explicit-policy is set, then the | 
|  | //   initial value is 0, otherwise the initial value is n+1. | 
|  | size_t explicit_policy_; | 
|  |  | 
|  | // |inhibit_any_policy_| corresponds with the same named variable from RFC | 
|  | // 5280 section 6.1.2: | 
|  | // | 
|  | //   inhibit_anyPolicy:  an integer that indicates whether the | 
|  | //   anyPolicy policy identifier is considered a match.  The | 
|  | //   integer indicates the number of non-self-issued certificates | 
|  | //   to be processed before the anyPolicy OID, if asserted in a | 
|  | //   certificate other than an intermediate self-issued | 
|  | //   certificate, is ignored.  Once set, this variable may be | 
|  | //   decreased, but may not be increased.  That is, if a | 
|  | //   certificate in the path inhibits processing of anyPolicy, a | 
|  | //   later certificate cannot permit it.  If initial-any-policy- | 
|  | //   inhibit is set, then the initial value is 0, otherwise the | 
|  | //   initial value is n+1. | 
|  | size_t inhibit_any_policy_; | 
|  |  | 
|  | // |policy_mapping_| corresponds with the same named variable from RFC 5280 | 
|  | // section 6.1.2: | 
|  | // | 
|  | //   policy_mapping:  an integer that indicates if policy mapping | 
|  | //   is permitted.  The integer indicates the number of non-self- | 
|  | //   issued certificates to be processed before policy mapping is | 
|  | //   inhibited.  Once set, this variable may be decreased, but may | 
|  | //   not be increased.  That is, if a certificate in the path | 
|  | //   specifies that policy mapping is not permitted, it cannot be | 
|  | //   overridden by a later certificate.  If initial-policy- | 
|  | //   mapping-inhibit is set, then the initial value is 0, | 
|  | //   otherwise the initial value is n+1. | 
|  | size_t policy_mapping_; | 
|  |  | 
|  | // |working_public_key_| is an amalgamation of 3 separate variables from RFC | 
|  | // 5280: | 
|  | //    * working_public_key | 
|  | //    * working_public_key_algorithm | 
|  | //    * working_public_key_parameters | 
|  | // | 
|  | // They are combined for simplicity since the signature verification takes an | 
|  | // EVP_PKEY, and the parameter inheritence is not applicable for the supported | 
|  | // key types. |working_public_key_| may be null if parsing failed. | 
|  | // | 
|  | // An approximate explanation of |working_public_key_| is this description | 
|  | // from RFC 5280 section 6.1.2: | 
|  | // | 
|  | //    working_public_key:  the public key used to verify the | 
|  | //    signature of a certificate. | 
|  | bssl::UniquePtr<EVP_PKEY> working_public_key_; | 
|  |  | 
|  | // |working_normalized_issuer_name_| is the normalized value of the | 
|  | // working_issuer_name variable in RFC 5280 section 6.1.2: | 
|  | // | 
|  | //    working_issuer_name:  the issuer distinguished name expected | 
|  | //    in the next certificate in the chain. | 
|  | der::Input working_normalized_issuer_name_; | 
|  |  | 
|  | // |max_path_length_| corresponds with the same named variable in RFC 5280 | 
|  | // section 6.1.2. | 
|  | // | 
|  | //    max_path_length:  this integer is initialized to n, is | 
|  | //    decremented for each non-self-issued certificate in the path, | 
|  | //    and may be reduced to the value in the path length constraint | 
|  | //    field within the basic constraints extension of a CA | 
|  | //    certificate. | 
|  | size_t max_path_length_; | 
|  |  | 
|  | VerifyCertificateChainDelegate *delegate_; | 
|  | }; | 
|  |  | 
|  | void PathVerifier::VerifyPolicies(const ParsedCertificate &cert, | 
|  | bool is_target_cert, CertErrors *errors) { | 
|  | // From RFC 5280 section 6.1.3: | 
|  | // | 
|  | //  (d)  If the certificate policies extension is present in the | 
|  | //       certificate and the valid_policy_tree is not NULL, process | 
|  | //       the policy information by performing the following steps in | 
|  | //       order: | 
|  | if (cert.has_policy_oids() && !valid_policy_graph_.IsNull()) { | 
|  | ValidPolicyGraph::LevelDetails previous_level = | 
|  | valid_policy_graph_.StartLevel(); | 
|  |  | 
|  | //     (1)  For each policy P not equal to anyPolicy in the | 
|  | //          certificate policies extension, let P-OID denote the OID | 
|  | //          for policy P and P-Q denote the qualifier set for policy | 
|  | //          P.  Perform the following steps in order: | 
|  | bool cert_has_any_policy = false; | 
|  | for (der::Input p_oid : cert.policy_oids()) { | 
|  | if (p_oid == der::Input(kAnyPolicyOid)) { | 
|  | cert_has_any_policy = true; | 
|  | continue; | 
|  | } | 
|  |  | 
|  | //        (i)   For each node of depth i-1 in the valid_policy_tree | 
|  | //              where P-OID is in the expected_policy_set, create a | 
|  | //              child node as follows: set the valid_policy to P-OID, | 
|  | //              set the qualifier_set to P-Q, and set the | 
|  | //              expected_policy_set to {P-OID}. | 
|  | auto iter = previous_level.expected_policy_map.find(p_oid); | 
|  | if (iter != previous_level.expected_policy_map.end()) { | 
|  | valid_policy_graph_.AddNode( | 
|  | p_oid, /*parent_policies=*/std::move(iter->second)); | 
|  | previous_level.expected_policy_map.erase(iter); | 
|  | } else if (previous_level.has_any_policy) { | 
|  | //      (ii)  If there was no match in step (i) and the | 
|  | //            valid_policy_tree includes a node of depth i-1 with | 
|  | //            the valid_policy anyPolicy, generate a child node with | 
|  | //            the following values: set the valid_policy to P-OID, | 
|  | //            set the qualifier_set to P-Q, and set the | 
|  | //            expected_policy_set to  {P-OID}. | 
|  | valid_policy_graph_.AddNodeWithParentAnyPolicy(p_oid); | 
|  | } | 
|  | } | 
|  |  | 
|  | //     (2)  If the certificate policies extension includes the policy | 
|  | //          anyPolicy with the qualifier set AP-Q and either (a) | 
|  | //          inhibit_anyPolicy is greater than 0 or (b) i<n and the | 
|  | //          certificate is self-issued, then: | 
|  | // | 
|  | //          For each node in the valid_policy_tree of depth i-1, for | 
|  | //          each value in the expected_policy_set (including | 
|  | //          anyPolicy) that does not appear in a child node, create a | 
|  | //          child node with the following values: set the valid_policy | 
|  | //          to the value from the expected_policy_set in the parent | 
|  | //          node, set the qualifier_set to AP-Q, and set the | 
|  | //          expected_policy_set to the value in the valid_policy from | 
|  | //          this node. | 
|  | if (cert_has_any_policy && ((inhibit_any_policy_ > 0) || | 
|  | (!is_target_cert && IsSelfIssued(cert)))) { | 
|  | for (auto &[p_oid, parent_policies] : | 
|  | previous_level.expected_policy_map) { | 
|  | valid_policy_graph_.AddNode(p_oid, std::move(parent_policies)); | 
|  | } | 
|  | if (previous_level.has_any_policy) { | 
|  | valid_policy_graph_.AddAnyPolicyNode(); | 
|  | } | 
|  | } | 
|  |  | 
|  | //     (3)  If there is a node in the valid_policy_tree of depth i-1 | 
|  | //          or less without any child nodes, delete that node.  Repeat | 
|  | //          this step until there are no nodes of depth i-1 or less | 
|  | //          without children. | 
|  | // | 
|  | // This implementation does this as part of GetUserConstrainedPolicySet(). | 
|  | // Only the current level needs to be pruned to compute the policy graph. | 
|  | } | 
|  |  | 
|  | //  (e)  If the certificate policies extension is not present, set the | 
|  | //       valid_policy_tree to NULL. | 
|  | if (!cert.has_policy_oids()) { | 
|  | valid_policy_graph_.SetNull(); | 
|  | } | 
|  |  | 
|  | //  (f)  Verify that either explicit_policy is greater than 0 or the | 
|  | //       valid_policy_tree is not equal to NULL; | 
|  | if (!((explicit_policy_ > 0) || !valid_policy_graph_.IsNull())) { | 
|  | errors->AddError(cert_errors::kNoValidPolicy); | 
|  | } | 
|  | } | 
|  |  | 
|  | void PathVerifier::VerifyPolicyMappings(const ParsedCertificate &cert, | 
|  | CertErrors *errors) { | 
|  | if (!cert.has_policy_mappings()) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | // From RFC 5280 section 6.1.4: | 
|  | // | 
|  | //  (a)  If a policy mappings extension is present, verify that the | 
|  | //       special value anyPolicy does not appear as an | 
|  | //       issuerDomainPolicy or a subjectDomainPolicy. | 
|  | for (const ParsedPolicyMapping &mapping : cert.policy_mappings()) { | 
|  | if (mapping.issuer_domain_policy == der::Input(kAnyPolicyOid) || | 
|  | mapping.subject_domain_policy == der::Input(kAnyPolicyOid)) { | 
|  | // Because this implementation continues processing certificates after | 
|  | // this error, clear the valid policy graph to ensure the | 
|  | // "user_constrained_policy_set" output upon failure is empty. | 
|  | valid_policy_graph_.SetNull(); | 
|  | errors->AddError(cert_errors::kPolicyMappingAnyPolicy); | 
|  | return; | 
|  | } | 
|  | } | 
|  |  | 
|  | //  (b)  If a policy mappings extension is present, then for each | 
|  | //       issuerDomainPolicy ID-P in the policy mappings extension: | 
|  | // | 
|  | //     (1)  If the policy_mapping variable is greater than 0, for each | 
|  | //          node in the valid_policy_tree of depth i where ID-P is the | 
|  | //          valid_policy, set expected_policy_set to the set of | 
|  | //          subjectDomainPolicy values that are specified as | 
|  | //          equivalent to ID-P by the policy mappings extension. | 
|  | // | 
|  | //          If no node of depth i in the valid_policy_tree has a | 
|  | //          valid_policy of ID-P but there is a node of depth i with a | 
|  | //          valid_policy of anyPolicy, then generate a child node of | 
|  | //          the node of depth i-1 that has a valid_policy of anyPolicy | 
|  | //          as follows: | 
|  | // | 
|  | //        (i)    set the valid_policy to ID-P; | 
|  | // | 
|  | //        (ii)   set the qualifier_set to the qualifier set of the | 
|  | //               policy anyPolicy in the certificate policies | 
|  | //               extension of certificate i; and | 
|  | // | 
|  | //        (iii)  set the expected_policy_set to the set of | 
|  | //               subjectDomainPolicy values that are specified as | 
|  | //               equivalent to ID-P by the policy mappings extension. | 
|  | // | 
|  | if (policy_mapping_ > 0) { | 
|  | for (const ParsedPolicyMapping &mapping : cert.policy_mappings()) { | 
|  | valid_policy_graph_.AddPolicyMapping(mapping.issuer_domain_policy, | 
|  | mapping.subject_domain_policy); | 
|  | } | 
|  | } | 
|  |  | 
|  | //  (b)  If a policy mappings extension is present, then for each | 
|  | //       issuerDomainPolicy ID-P in the policy mappings extension: | 
|  | // | 
|  | //  ... | 
|  | // | 
|  | //     (2)  If the policy_mapping variable is equal to 0: | 
|  | // | 
|  | //        (i)    delete each node of depth i in the valid_policy_tree | 
|  | //               where ID-P is the valid_policy. | 
|  | // | 
|  | //        (ii)   If there is a node in the valid_policy_tree of depth | 
|  | //               i-1 or less without any child nodes, delete that | 
|  | //               node.  Repeat this step until there are no nodes of | 
|  | //               depth i-1 or less without children. | 
|  | // | 
|  | // Step (ii) is deferred to part of GetUserConstrainedPolicySet(). | 
|  | if (policy_mapping_ == 0) { | 
|  | for (const ParsedPolicyMapping &mapping : cert.policy_mappings()) { | 
|  | valid_policy_graph_.DeleteNode(mapping.issuer_domain_policy); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | void PathVerifier::ApplyPolicyConstraints(const ParsedCertificate &cert) { | 
|  | // RFC 5280 section 6.1.4 step i-j: | 
|  | //      (i)  If a policy constraints extension is included in the | 
|  | //           certificate, modify the explicit_policy and policy_mapping | 
|  | //           state variables as follows: | 
|  | if (cert.has_policy_constraints()) { | 
|  | //         (1)  If requireExplicitPolicy is present and is less than | 
|  | //              explicit_policy, set explicit_policy to the value of | 
|  | //              requireExplicitPolicy. | 
|  | if (cert.policy_constraints().require_explicit_policy && | 
|  | cert.policy_constraints().require_explicit_policy.value() < | 
|  | explicit_policy_) { | 
|  | explicit_policy_ = | 
|  | cert.policy_constraints().require_explicit_policy.value(); | 
|  | } | 
|  |  | 
|  | //         (2)  If inhibitPolicyMapping is present and is less than | 
|  | //              policy_mapping, set policy_mapping to the value of | 
|  | //              inhibitPolicyMapping. | 
|  | if (cert.policy_constraints().inhibit_policy_mapping && | 
|  | cert.policy_constraints().inhibit_policy_mapping.value() < | 
|  | policy_mapping_) { | 
|  | policy_mapping_ = | 
|  | cert.policy_constraints().inhibit_policy_mapping.value(); | 
|  | } | 
|  | } | 
|  |  | 
|  | //      (j)  If the inhibitAnyPolicy extension is included in the | 
|  | //           certificate and is less than inhibit_anyPolicy, set | 
|  | //           inhibit_anyPolicy to the value of inhibitAnyPolicy. | 
|  | if (cert.inhibit_any_policy() && | 
|  | cert.inhibit_any_policy().value() < inhibit_any_policy_) { | 
|  | inhibit_any_policy_ = cert.inhibit_any_policy().value(); | 
|  | } | 
|  | } | 
|  |  | 
|  | void PathVerifier::BasicCertificateProcessing( | 
|  | const ParsedCertificate &cert, bool is_target_cert, | 
|  | bool is_target_cert_issuer, const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, CertErrors *errors, | 
|  | bool *shortcircuit_chain_validation) { | 
|  | *shortcircuit_chain_validation = false; | 
|  | // Check that the signature algorithms in Certificate vs TBSCertificate | 
|  | // match. This isn't part of RFC 5280 section 6.1.3, but is mandated by | 
|  | // sections 4.1.1.2 and 4.1.2.3. | 
|  | if (!VerifySignatureAlgorithmsMatch(cert, errors)) { | 
|  | BSSL_CHECK(errors->ContainsAnyErrorWithSeverity(CertError::SEVERITY_HIGH)); | 
|  | *shortcircuit_chain_validation = true; | 
|  | } | 
|  |  | 
|  | // Check whether this signature algorithm is allowed. | 
|  | if (!cert.signature_algorithm().has_value() || | 
|  | !delegate_->IsSignatureAlgorithmAcceptable(*cert.signature_algorithm(), | 
|  | errors)) { | 
|  | *shortcircuit_chain_validation = true; | 
|  | errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm); | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (working_public_key_) { | 
|  | // Verify the digital signature using the previous certificate's key (RFC | 
|  | // 5280 section 6.1.3 step a.1). | 
|  | if (!VerifySignedData(*cert.signature_algorithm(), | 
|  | cert.tbs_certificate_tlv(), cert.signature_value(), | 
|  | working_public_key_.get(), | 
|  | delegate_->GetVerifyCache())) { | 
|  | *shortcircuit_chain_validation = true; | 
|  | errors->AddError(cert_errors::kVerifySignedDataFailed); | 
|  | } | 
|  | } else { | 
|  | // If `working_public_key_` is null, that indicates the SPKI of the issuer | 
|  | // could not be parsed. Handle this the same way as an invalid signature by | 
|  | // shortcircuiting the rest of verification. | 
|  | // An error should already have been added by ParseAndCheckPublicKey, but | 
|  | // it's added on the CertErrors for the issuer, so we can't BSSL_CHECK | 
|  | // errors->ContainsAnyErrorWithSeverity here. (It will be BSSL_CHECKed when | 
|  | // the shortcircuit_chain_validation is acted on in PathVerifier::Run.) | 
|  | *shortcircuit_chain_validation = true; | 
|  | } | 
|  | if (*shortcircuit_chain_validation) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | // Check the time range for the certificate's validity, ensuring it is valid | 
|  | // at |time|. | 
|  | // (RFC 5280 section 6.1.3 step a.2) | 
|  | VerifyTimeValidity(cert, time, errors); | 
|  |  | 
|  | // RFC 5280 section 6.1.3 step a.3 calls for checking the certificate's | 
|  | // revocation status here. In this implementation revocation checking is | 
|  | // implemented separately from path validation. | 
|  |  | 
|  | // Verify the certificate's issuer name matches the issuing certificate's | 
|  | // subject name. (RFC 5280 section 6.1.3 step a.4) | 
|  | if (cert.normalized_issuer() != working_normalized_issuer_name_) { | 
|  | errors->AddError(cert_errors::kSubjectDoesNotMatchIssuer); | 
|  | } | 
|  |  | 
|  | // Name constraints (RFC 5280 section 6.1.3 step b & c) | 
|  | // If certificate i is self-issued and it is not the final certificate in the | 
|  | // path, skip this step for certificate i. | 
|  | if (!name_constraints_list_.empty() && | 
|  | (!IsSelfIssued(cert) || is_target_cert)) { | 
|  | for (const NameConstraints *nc : name_constraints_list_) { | 
|  | nc->IsPermittedCert(cert.normalized_subject(), cert.subject_alt_names(), | 
|  | errors); | 
|  | } | 
|  | } | 
|  |  | 
|  | // RFC 5280 section 6.1.3 step d - f. | 
|  | VerifyPolicies(cert, is_target_cert, errors); | 
|  |  | 
|  | // The key purpose is checked not just for the end-entity certificate, but | 
|  | // also interpreted as a constraint when it appears in intermediates. This | 
|  | // goes beyond what RFC 5280 describes, but is the de-facto standard. See | 
|  | // https://wiki.mozilla.org/CA/CertificatePolicyV2.1#Frequently_Asked_Questions | 
|  | VerifyExtendedKeyUsage(cert, required_key_purpose, errors, is_target_cert, | 
|  | is_target_cert_issuer); | 
|  | } | 
|  |  | 
|  | void PathVerifier::PrepareForNextCertificate(const ParsedCertificate &cert, | 
|  | KeyPurpose key_purpose, | 
|  | CertErrors *errors) { | 
|  | // RFC 5280 section 6.1.4 step a-b | 
|  | VerifyPolicyMappings(cert, errors); | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step c: | 
|  | // | 
|  | //    Assign the certificate subject name to working_normalized_issuer_name. | 
|  | working_normalized_issuer_name_ = cert.normalized_subject(); | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step d: | 
|  | // | 
|  | //    Assign the certificate subjectPublicKey to working_public_key. | 
|  | working_public_key_ = ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors); | 
|  |  | 
|  | // Note that steps e and f are omitted as they are handled by | 
|  | // the assignment to |working_spki| above. See the definition | 
|  | // of |working_spki|. | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step g: | 
|  | if (cert.has_name_constraints()) { | 
|  | name_constraints_list_.push_back(&cert.name_constraints()); | 
|  | } | 
|  |  | 
|  | //     (h)  If certificate i is not self-issued: | 
|  | if (!IsSelfIssued(cert)) { | 
|  | //         (1)  If explicit_policy is not 0, decrement explicit_policy by | 
|  | //              1. | 
|  | if (explicit_policy_ > 0) { | 
|  | explicit_policy_ -= 1; | 
|  | } | 
|  |  | 
|  | //         (2)  If policy_mapping is not 0, decrement policy_mapping by 1. | 
|  | if (policy_mapping_ > 0) { | 
|  | policy_mapping_ -= 1; | 
|  | } | 
|  |  | 
|  | //         (3)  If inhibit_anyPolicy is not 0, decrement inhibit_anyPolicy | 
|  | //              by 1. | 
|  | if (inhibit_any_policy_ > 0) { | 
|  | inhibit_any_policy_ -= 1; | 
|  | } | 
|  | } | 
|  |  | 
|  | // RFC 5280 section 6.1.4 step i-j: | 
|  | ApplyPolicyConstraints(cert); | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step k: | 
|  | // | 
|  | //    If certificate i is a version 3 certificate, verify that the | 
|  | //    basicConstraints extension is present and that cA is set to | 
|  | //    TRUE.  (If certificate i is a version 1 or version 2 | 
|  | //    certificate, then the application MUST either verify that | 
|  | //    certificate i is a CA certificate through out-of-band means | 
|  | //    or reject the certificate.  Conforming implementations may | 
|  | //    choose to reject all version 1 and version 2 intermediate | 
|  | //    certificates.) | 
|  | // | 
|  | // This code implicitly rejects non version 3 intermediates, since they | 
|  | // can't contain a BasicConstraints extension. | 
|  | if (!cert.has_basic_constraints()) { | 
|  | errors->AddError(cert_errors::kMissingBasicConstraints); | 
|  | } else if (!cert.basic_constraints().is_ca) { | 
|  | errors->AddError(cert_errors::kBasicConstraintsIndicatesNotCa); | 
|  | } | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step l: | 
|  | // | 
|  | //    If the certificate was not self-issued, verify that | 
|  | //    max_path_length is greater than zero and decrement | 
|  | //    max_path_length by 1. | 
|  | if (!IsSelfIssued(cert)) { | 
|  | if (max_path_length_ == 0) { | 
|  | errors->AddError(cert_errors::kMaxPathLengthViolated); | 
|  | } else { | 
|  | --max_path_length_; | 
|  | } | 
|  | } | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step m: | 
|  | // | 
|  | //    If pathLenConstraint is present in the certificate and is | 
|  | //    less than max_path_length, set max_path_length to the value | 
|  | //    of pathLenConstraint. | 
|  | if (cert.has_basic_constraints() && cert.basic_constraints().has_path_len && | 
|  | cert.basic_constraints().path_len < max_path_length_) { | 
|  | max_path_length_ = cert.basic_constraints().path_len; | 
|  | } | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step n: | 
|  | // | 
|  | //    If a key usage extension is present, verify that the | 
|  | //    keyCertSign bit is set. | 
|  | if (cert.has_key_usage() && | 
|  | !cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)) { | 
|  | errors->AddError(cert_errors::kKeyCertSignBitNotSet); | 
|  | } | 
|  |  | 
|  | // From RFC 5280 section 6.1.4 step o: | 
|  | // | 
|  | //    Recognize and process any other critical extension present in | 
|  | //    the certificate.  Process any other recognized non-critical | 
|  | //    extension present in the certificate that is relevant to path | 
|  | //    processing. | 
|  | VerifyNoUnconsumedCriticalExtensions( | 
|  | cert, errors, delegate_->AcceptPreCertificates(), key_purpose); | 
|  | } | 
|  |  | 
|  | // Checks if the target certificate has the CA bit set. If it does, add | 
|  | // the appropriate error or warning to |errors|. | 
|  | void VerifyTargetCertIsNotCA(const ParsedCertificate &cert, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors) { | 
|  | if (cert.has_basic_constraints() && cert.basic_constraints().is_ca) { | 
|  | // In spite of RFC 5280 4.2.1.9 which says the CA properties MAY exist in | 
|  | // an end entity certificate, the CABF Baseline Requirements version | 
|  | // 1.8.4, 7.1.2.3(d) prohibit the CA bit being set in an end entity | 
|  | // certificate. | 
|  | switch (required_key_purpose) { | 
|  | case KeyPurpose::ANY_EKU: | 
|  | break; | 
|  | case KeyPurpose::SERVER_AUTH: | 
|  | case KeyPurpose::CLIENT_AUTH: | 
|  | errors->AddWarning(cert_errors::kTargetCertShouldNotBeCa); | 
|  | break; | 
|  | case KeyPurpose::SERVER_AUTH_STRICT: | 
|  | case KeyPurpose::CLIENT_AUTH_STRICT: | 
|  | case KeyPurpose::CLIENT_AUTH_STRICT_LEAF: | 
|  | case KeyPurpose::SERVER_AUTH_STRICT_LEAF: | 
|  | case KeyPurpose::RCS_MLS_CLIENT_AUTH: | 
|  | case KeyPurpose::C2PA_TIMESTAMPING: | 
|  | case KeyPurpose::C2PA_MANIFEST: | 
|  | errors->AddError(cert_errors::kTargetCertShouldNotBeCa); | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | void PathVerifier::WrapUp(const ParsedCertificate &cert, | 
|  | KeyPurpose required_key_purpose, | 
|  | const std::set<der::Input> &user_initial_policy_set, | 
|  | bool allow_precertificate, | 
|  | CertErrors * errors) { | 
|  | // From RFC 5280 section 6.1.5: | 
|  | //      (a)  If explicit_policy is not 0, decrement explicit_policy by 1. | 
|  | if (explicit_policy_ > 0) { | 
|  | explicit_policy_ -= 1; | 
|  | } | 
|  |  | 
|  | //      (b)  If a policy constraints extension is included in the | 
|  | //           certificate and requireExplicitPolicy is present and has a | 
|  | //           value of 0, set the explicit_policy state variable to 0. | 
|  | if (cert.has_policy_constraints() && | 
|  | cert.policy_constraints().require_explicit_policy.has_value() && | 
|  | cert.policy_constraints().require_explicit_policy == 0) { | 
|  | explicit_policy_ = 0; | 
|  | } | 
|  |  | 
|  | // Note step c-e are omitted as the verification function does | 
|  | // not output the working public key. | 
|  |  | 
|  | // From RFC 5280 section 6.1.5 step f: | 
|  | // | 
|  | //    Recognize and process any other critical extension present in | 
|  | //    the certificate n.  Process any other recognized non-critical | 
|  | //    extension present in certificate n that is relevant to path | 
|  | //    processing. | 
|  | // | 
|  | // Note that this is duplicated by PrepareForNextCertificate() so as to | 
|  | // directly match the procedures in RFC 5280's section 6.1. | 
|  | VerifyNoUnconsumedCriticalExtensions(cert, errors, allow_precertificate, | 
|  | required_key_purpose); | 
|  |  | 
|  | // This calculates the intersection from RFC 5280 section 6.1.5 step g, as | 
|  | // well as applying the deferred recursive node that were skipped earlier in | 
|  | // the process. | 
|  | user_constrained_policy_set_ = | 
|  | valid_policy_graph_.GetUserConstrainedPolicySet(user_initial_policy_set); | 
|  |  | 
|  | // From RFC 5280 section 6.1.5 step g: | 
|  | // | 
|  | //    If either (1) the value of explicit_policy variable is greater than | 
|  | //    zero or (2) the valid_policy_tree is not NULL, then path processing | 
|  | //    has succeeded. | 
|  | if (explicit_policy_ == 0 && user_constrained_policy_set_.empty()) { | 
|  | errors->AddError(cert_errors::kNoValidPolicy); | 
|  | } | 
|  |  | 
|  | // The following check is NOT part of RFC 5280 6.1.5's "Wrap-Up Procedure", | 
|  | // however is implied by RFC 5280 section 4.2.1.9, as well as CABF Base | 
|  | // Requirements. | 
|  | VerifyTargetCertIsNotCA(cert, required_key_purpose, errors); | 
|  |  | 
|  | // Check the public key for the target certificate. The public key for the | 
|  | // other certificates is already checked by PrepareForNextCertificate(). | 
|  | // Note that this step is not part of RFC 5280 6.1.5. | 
|  | ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors); | 
|  | } | 
|  |  | 
|  | void PathVerifier::ApplyTrustAnchorConstraints(const ParsedCertificate &cert, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors) { | 
|  | // If certificatePolicies is present, process the policies. This matches the | 
|  | // handling for intermediates from RFC 5280 section 6.1.3.d (except that for | 
|  | // intermediates it is non-optional). It intentionally deviates from RFC 5937 | 
|  | // section 3.2 which says to intersect with user-initial-policy-set, since | 
|  | // processing as part of user-initial-policy-set has subtly different | 
|  | // semantics from being handled as part of the chain processing (see | 
|  | // https://crbug.com/1403258). | 
|  | if (cert.has_policy_oids()) { | 
|  | VerifyPolicies(cert, /*is_target_cert=*/false, errors); | 
|  | } | 
|  |  | 
|  | // Process policyMappings, if present. This matches the handling for | 
|  | // intermediates from RFC 5280 section 6.1.4 step a-b. | 
|  | VerifyPolicyMappings(cert, errors); | 
|  |  | 
|  | // Process policyConstraints and inhibitAnyPolicy. This matches the | 
|  | // handling for intermediates from RFC 5280 section 6.1.4 step i-j. | 
|  | // This intentionally deviates from RFC 5937 section 3.2 which says to | 
|  | // initialize the initial-any-policy-inhibit, initial-explicit-policy, and/or | 
|  | // initial-policy-mapping-inhibit inputs to verification. Those are all | 
|  | // bools, so they cannot properly represent the constraints encoded in the | 
|  | // policyConstraints and inhibitAnyPolicy extensions. | 
|  | ApplyPolicyConstraints(cert); | 
|  |  | 
|  | // If keyUsage is present, verify that |cert| has correct keyUsage bits for a | 
|  | // CA. This matches the handling for intermediates from RFC 5280 section | 
|  | // 6.1.4 step n. | 
|  | if (cert.has_key_usage() && | 
|  | !cert.key_usage().AssertsBit(KEY_USAGE_BIT_KEY_CERT_SIGN)) { | 
|  | errors->AddError(cert_errors::kKeyCertSignBitNotSet); | 
|  | } | 
|  |  | 
|  | // This is not part of RFC 5937 nor RFC 5280, but matches the EKU handling | 
|  | // done for intermediates (described in Web PKI's Baseline Requirements). | 
|  | VerifyExtendedKeyUsage(cert, required_key_purpose, errors, | 
|  | /*is_target_cert=*/false, | 
|  | /*is_target_cert_issuer=*/false); | 
|  |  | 
|  | // The following enforcements follow from RFC 5937 (primarily section 3.2): | 
|  |  | 
|  | // Initialize name constraints initial-permitted/excluded-subtrees. | 
|  | if (cert.has_name_constraints()) { | 
|  | name_constraints_list_.push_back(&cert.name_constraints()); | 
|  | } | 
|  |  | 
|  | if (cert.has_basic_constraints()) { | 
|  | // Enforce CA=true if basicConstraints is present. This matches behavior of | 
|  | // other verifiers, and seems like a good thing to do to avoid a | 
|  | // certificate being used in the wrong context if it was specifically | 
|  | // marked as not being a CA. | 
|  | if (!cert.basic_constraints().is_ca) { | 
|  | errors->AddError(cert_errors::kBasicConstraintsIndicatesNotCa); | 
|  | } | 
|  | // From RFC 5937 section 3.2: | 
|  | // | 
|  | //    If a basic constraints extension is associated with the trust | 
|  | //    anchor and contains a pathLenConstraint value, set the | 
|  | //    max_path_length state variable equal to the pathLenConstraint | 
|  | //    value from the basic constraints extension. | 
|  | // | 
|  | if (cert.basic_constraints().has_path_len) { | 
|  | max_path_length_ = cert.basic_constraints().path_len; | 
|  | } | 
|  | } | 
|  |  | 
|  | // From RFC 5937 section 2: | 
|  | // | 
|  | //    Extensions may be marked critical or not critical.  When trust anchor | 
|  | //    constraints are enforced, clients MUST reject certification paths | 
|  | //    containing a trust anchor with unrecognized critical extensions. | 
|  | VerifyNoUnconsumedCriticalExtensions(cert, errors, | 
|  | /*allow_precertificate=*/false, | 
|  | required_key_purpose); | 
|  | } | 
|  |  | 
|  | void PathVerifier::ProcessRootCertificate(const ParsedCertificate &cert, | 
|  | const CertificateTrust &trust, | 
|  | const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors, | 
|  | bool *shortcircuit_chain_validation) { | 
|  | *shortcircuit_chain_validation = false; | 
|  | switch (trust.type) { | 
|  | case CertificateTrustType::UNSPECIFIED: | 
|  | case CertificateTrustType::TRUSTED_LEAF: | 
|  | // Doesn't chain to a trust anchor - implicitly distrusted | 
|  | errors->AddError(cert_errors::kCertIsNotTrustAnchor); | 
|  | *shortcircuit_chain_validation = true; | 
|  | break; | 
|  | case CertificateTrustType::DISTRUSTED: | 
|  | // Chains to an actively distrusted certificate. | 
|  | errors->AddError(cert_errors::kDistrustedByTrustStore); | 
|  | *shortcircuit_chain_validation = true; | 
|  | break; | 
|  | case CertificateTrustType::TRUSTED_ANCHOR: | 
|  | case CertificateTrustType::TRUSTED_ANCHOR_OR_LEAF: | 
|  | break; | 
|  | } | 
|  | if (*shortcircuit_chain_validation) { | 
|  | return; | 
|  | } | 
|  |  | 
|  | if (trust.enforce_anchor_expiry) { | 
|  | VerifyTimeValidity(cert, time, errors); | 
|  | } | 
|  | if (trust.enforce_anchor_constraints) { | 
|  | if (trust.require_anchor_basic_constraints && | 
|  | !cert.has_basic_constraints()) { | 
|  | switch (cert.tbs().version) { | 
|  | case CertificateVersion::V1: | 
|  | case CertificateVersion::V2: | 
|  | break; | 
|  | case CertificateVersion::V3: | 
|  | errors->AddError(cert_errors::kMissingBasicConstraints); | 
|  | break; | 
|  | } | 
|  | } | 
|  | ApplyTrustAnchorConstraints(cert, required_key_purpose, errors); | 
|  | } | 
|  |  | 
|  | // Use the certificate's SPKI and subject when verifying the next certificate. | 
|  | working_public_key_ = ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors); | 
|  | working_normalized_issuer_name_ = cert.normalized_subject(); | 
|  | } | 
|  |  | 
|  | void PathVerifier::ProcessSingleCertChain(const ParsedCertificate &cert, | 
|  | const CertificateTrust &trust, | 
|  | const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | CertErrors *errors) { | 
|  | switch (trust.type) { | 
|  | case CertificateTrustType::UNSPECIFIED: | 
|  | case CertificateTrustType::TRUSTED_ANCHOR: | 
|  | // Target doesn't have a chain and isn't a directly trusted leaf - | 
|  | // implicitly distrusted. | 
|  | errors->AddError(cert_errors::kCertIsNotTrustAnchor); | 
|  | return; | 
|  | case CertificateTrustType::DISTRUSTED: | 
|  | // Target is directly distrusted. | 
|  | errors->AddError(cert_errors::kDistrustedByTrustStore); | 
|  | return; | 
|  | case CertificateTrustType::TRUSTED_LEAF: | 
|  | case CertificateTrustType::TRUSTED_ANCHOR_OR_LEAF: | 
|  | break; | 
|  | } | 
|  |  | 
|  | // Check the public key for the target certificate regardless of whether | 
|  | // `require_leaf_selfsigned` is true. This matches the check in WrapUp and | 
|  | // fulfills the documented behavior of the IsPublicKeyAcceptable delegate. | 
|  | ParseAndCheckPublicKey(cert.tbs().spki_tlv, errors); | 
|  |  | 
|  | if (trust.require_leaf_selfsigned) { | 
|  | if (!VerifyCertificateIsSelfSigned(cert, delegate_->GetVerifyCache(), | 
|  | errors)) { | 
|  | // VerifyCertificateIsSelfSigned should have added an error, but just | 
|  | // double check to be safe. | 
|  | if (!errors->ContainsAnyErrorWithSeverity(CertError::SEVERITY_HIGH)) { | 
|  | errors->AddError(cert_errors::kInternalError); | 
|  | } | 
|  | return; | 
|  | } | 
|  | } | 
|  |  | 
|  | // There is no standard for what it means to verify a directly trusted leaf | 
|  | // certificate, so this is basically just checking common sense things that | 
|  | // also mirror what we observed to be enforced with the Operating System | 
|  | // native verifiers. | 
|  | VerifyTimeValidity(cert, time, errors); | 
|  | VerifyExtendedKeyUsage(cert, required_key_purpose, errors, | 
|  | /*is_target_cert=*/true, | 
|  | /*is_target_cert_issuer=*/false); | 
|  |  | 
|  | // Checking for unknown critical extensions matches Windows, but is stricter | 
|  | // than the Mac verifier. | 
|  | VerifyNoUnconsumedCriticalExtensions(cert, errors, | 
|  | /*allow_precertificate=*/false, | 
|  | required_key_purpose); | 
|  | } | 
|  |  | 
|  | bssl::UniquePtr<EVP_PKEY> PathVerifier::ParseAndCheckPublicKey( | 
|  | der::Input spki, CertErrors *errors) { | 
|  | // Parse the public key. | 
|  | bssl::UniquePtr<EVP_PKEY> pkey; | 
|  | if (!ParsePublicKey(spki, &pkey)) { | 
|  | errors->AddError(cert_errors::kFailedParsingSpki); | 
|  | return nullptr; | 
|  | } | 
|  |  | 
|  | // Check if the key is acceptable by the delegate. | 
|  | if (!delegate_->IsPublicKeyAcceptable(pkey.get(), errors)) { | 
|  | errors->AddError(cert_errors::kUnacceptablePublicKey); | 
|  | } | 
|  |  | 
|  | return pkey; | 
|  | } | 
|  |  | 
|  | void PathVerifier::Run( | 
|  | const ParsedCertificateList &certs, const CertificateTrust &last_cert_trust, | 
|  | VerifyCertificateChainDelegate *delegate, const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | InitialExplicitPolicy initial_explicit_policy, | 
|  | const std::set<der::Input> &user_initial_policy_set, | 
|  | InitialPolicyMappingInhibit initial_policy_mapping_inhibit, | 
|  | InitialAnyPolicyInhibit initial_any_policy_inhibit, | 
|  | std::set<der::Input> *user_constrained_policy_set, CertPathErrors *errors) { | 
|  | // This implementation is structured to mimic the description of certificate | 
|  | // path verification given by RFC 5280 section 6.1. | 
|  | BSSL_CHECK(delegate); | 
|  | BSSL_CHECK(errors); | 
|  |  | 
|  | delegate_ = delegate; | 
|  |  | 
|  | // An empty chain is necessarily invalid. | 
|  | if (certs.empty()) { | 
|  | errors->GetOtherErrors()->AddError(cert_errors::kChainIsEmpty); | 
|  | return; | 
|  | } | 
|  |  | 
|  | // Verifying a trusted leaf certificate isn't a well-specified operation, so | 
|  | // it's handled separately from the RFC 5280 defined verification process. | 
|  | if (certs.size() == 1) { | 
|  | ProcessSingleCertChain(*certs.front(), last_cert_trust, time, | 
|  | required_key_purpose, errors->GetErrorsForCert(0)); | 
|  | return; | 
|  | } | 
|  |  | 
|  | // RFC 5280's "n" variable is the length of the path, which does not count | 
|  | // the trust anchor. (Although in practice it doesn't really change behaviors | 
|  | // if n is used in place of n+1). | 
|  | const size_t n = certs.size() - 1; | 
|  |  | 
|  | valid_policy_graph_.Init(); | 
|  |  | 
|  | // RFC 5280 section section 6.1.2: | 
|  | // | 
|  | // If initial-explicit-policy is set, then the initial value | 
|  | // [of explicit_policy] is 0, otherwise the initial value is n+1. | 
|  | explicit_policy_ = | 
|  | initial_explicit_policy == InitialExplicitPolicy::kTrue ? 0 : n + 1; | 
|  |  | 
|  | // RFC 5280 section section 6.1.2: | 
|  | // | 
|  | // If initial-any-policy-inhibit is set, then the initial value | 
|  | // [of inhibit_anyPolicy] is 0, otherwise the initial value is n+1. | 
|  | inhibit_any_policy_ = | 
|  | initial_any_policy_inhibit == InitialAnyPolicyInhibit::kTrue ? 0 : n + 1; | 
|  |  | 
|  | // RFC 5280 section section 6.1.2: | 
|  | // | 
|  | // If initial-policy-mapping-inhibit is set, then the initial value | 
|  | // [of policy_mapping] is 0, otherwise the initial value is n+1. | 
|  | policy_mapping_ = | 
|  | initial_policy_mapping_inhibit == InitialPolicyMappingInhibit::kTrue | 
|  | ? 0 | 
|  | : n + 1; | 
|  |  | 
|  | // RFC 5280 section section 6.1.2: | 
|  | // | 
|  | // max_path_length:  this integer is initialized to n, ... | 
|  | max_path_length_ = n; | 
|  |  | 
|  | // Iterate over all the certificates in the reverse direction: starting from | 
|  | // the root certificate and progressing towards the target certificate. | 
|  | // | 
|  | //   * i=0  :  Root certificate (i.e. trust anchor) | 
|  | //   * i=1  :  Certificate issued by root | 
|  | //   * i=x  :  Certificate i=x is issued by certificate i=x-1 | 
|  | //   * i=n  :  Target certificate. | 
|  | for (size_t i = 0; i < certs.size(); ++i) { | 
|  | const size_t index_into_certs = certs.size() - i - 1; | 
|  |  | 
|  | // |is_target_cert| is true if the current certificate is the target | 
|  | // certificate being verified. The target certificate isn't necessarily an | 
|  | // end-entity certificate. | 
|  | const bool is_target_cert = index_into_certs == 0; | 
|  | const bool is_target_cert_issuer = index_into_certs == 1; | 
|  | const bool is_root_cert = i == 0; | 
|  |  | 
|  | const ParsedCertificate &cert = *certs[index_into_certs]; | 
|  |  | 
|  | // Output errors for the current certificate into an error bucket that is | 
|  | // associated with that certificate. | 
|  | CertErrors *cert_errors = errors->GetErrorsForCert(index_into_certs); | 
|  |  | 
|  | if (is_root_cert) { | 
|  | bool shortcircuit_chain_validation = false; | 
|  | ProcessRootCertificate(cert, last_cert_trust, time, required_key_purpose, | 
|  | cert_errors, &shortcircuit_chain_validation); | 
|  | if (shortcircuit_chain_validation) { | 
|  | // Chains that don't start from a trusted root should short-circuit the | 
|  | // rest of the verification, as accumulating more errors from untrusted | 
|  | // certificates would not be meaningful. | 
|  | BSSL_CHECK(cert_errors->ContainsAnyErrorWithSeverity( | 
|  | CertError::SEVERITY_HIGH)); | 
|  | return; | 
|  | } | 
|  |  | 
|  | // Don't do any other checks for root certificates. | 
|  | continue; | 
|  | } | 
|  |  | 
|  | bool shortcircuit_chain_validation = false; | 
|  | // Per RFC 5280 section 6.1: | 
|  | //  * Do basic processing for each certificate | 
|  | //  * If it is the last certificate in the path (target certificate) | 
|  | //     - Then run "Wrap up" | 
|  | //     - Otherwise run "Prepare for Next cert" | 
|  | BasicCertificateProcessing(cert, is_target_cert, is_target_cert_issuer, | 
|  | time, required_key_purpose, cert_errors, | 
|  | &shortcircuit_chain_validation); | 
|  | if (shortcircuit_chain_validation) { | 
|  | // Signature errors or unparsable SPKIs should short-circuit the rest of | 
|  | // the verification, as accumulating more errors from untrusted | 
|  | // certificates would not be meaningful. | 
|  | BSSL_CHECK( | 
|  | errors->ContainsAnyErrorWithSeverity(CertError::SEVERITY_HIGH)); | 
|  | return; | 
|  | } | 
|  | if (!is_target_cert) { | 
|  | PrepareForNextCertificate(cert, required_key_purpose, cert_errors); | 
|  | } else { | 
|  | WrapUp(cert, required_key_purpose, user_initial_policy_set, | 
|  | delegate->AcceptPreCertificates(), cert_errors); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (user_constrained_policy_set) { | 
|  | *user_constrained_policy_set = user_constrained_policy_set_; | 
|  | } | 
|  |  | 
|  | // TODO(eroman): RFC 5280 forbids duplicate certificates per section 6.1: | 
|  | // | 
|  | //    A certificate MUST NOT appear more than once in a prospective | 
|  | //    certification path. | 
|  | } | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | VerifyCertificateChainDelegate::~VerifyCertificateChainDelegate() = default; | 
|  |  | 
|  | void VerifyCertificateChain( | 
|  | const ParsedCertificateList &certs, const CertificateTrust &last_cert_trust, | 
|  | VerifyCertificateChainDelegate *delegate, const der::GeneralizedTime &time, | 
|  | KeyPurpose required_key_purpose, | 
|  | InitialExplicitPolicy initial_explicit_policy, | 
|  | const std::set<der::Input> &user_initial_policy_set, | 
|  | InitialPolicyMappingInhibit initial_policy_mapping_inhibit, | 
|  | InitialAnyPolicyInhibit initial_any_policy_inhibit, | 
|  | std::set<der::Input> *user_constrained_policy_set, CertPathErrors *errors) { | 
|  | PathVerifier verifier; | 
|  | verifier.Run(certs, last_cert_trust, delegate, time, required_key_purpose, | 
|  | initial_explicit_policy, user_initial_policy_set, | 
|  | initial_policy_mapping_inhibit, initial_any_policy_inhibit, | 
|  | user_constrained_policy_set, errors); | 
|  | } | 
|  |  | 
|  | bool VerifyCertificateIsSelfSigned(const ParsedCertificate &cert, | 
|  | SignatureVerifyCache *cache, | 
|  | CertErrors *errors) { | 
|  | if (cert.normalized_subject() != cert.normalized_issuer()) { | 
|  | if (errors) { | 
|  | errors->AddError(cert_errors::kSubjectDoesNotMatchIssuer); | 
|  | } | 
|  | return false; | 
|  | } | 
|  |  | 
|  | // Note that we do not restrict the available algorithms when determining if | 
|  | // something is a self-signed cert. The signature isn't very important on a | 
|  | // self-signed cert so just allow any supported algorithm here, to avoid | 
|  | // breakage. | 
|  | if (!cert.signature_algorithm().has_value()) { | 
|  | if (errors) { | 
|  | errors->AddError(cert_errors::kUnacceptableSignatureAlgorithm); | 
|  | } | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (!VerifySignedData(*cert.signature_algorithm(), cert.tbs_certificate_tlv(), | 
|  | cert.signature_value(), cert.tbs().spki_tlv, cache)) { | 
|  | if (errors) { | 
|  | errors->AddError(cert_errors::kVerifySignedDataFailed); | 
|  | } | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | BSSL_NAMESPACE_END |