| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1 | /* | 
|  | 2 | *  X.509 certificate and private key decoding | 
|  | 3 | * | 
| Paul Bakker | 7dc4c44 | 2014-02-01 22:50:26 +0100 | [diff] [blame] | 4 | *  Copyright (C) 2006-2014, Brainspark B.V. | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 5 | * | 
|  | 6 | *  This file is part of PolarSSL (http://www.polarssl.org) | 
|  | 7 | *  Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org> | 
|  | 8 | * | 
|  | 9 | *  All rights reserved. | 
|  | 10 | * | 
|  | 11 | *  This program is free software; you can redistribute it and/or modify | 
|  | 12 | *  it under the terms of the GNU General Public License as published by | 
|  | 13 | *  the Free Software Foundation; either version 2 of the License, or | 
|  | 14 | *  (at your option) any later version. | 
|  | 15 | * | 
|  | 16 | *  This program is distributed in the hope that it will be useful, | 
|  | 17 | *  but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | 18 | *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|  | 19 | *  GNU General Public License for more details. | 
|  | 20 | * | 
|  | 21 | *  You should have received a copy of the GNU General Public License along | 
|  | 22 | *  with this program; if not, write to the Free Software Foundation, Inc., | 
|  | 23 | *  51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. | 
|  | 24 | */ | 
|  | 25 | /* | 
|  | 26 | *  The ITU-T X.509 standard defines a certificate format for PKI. | 
|  | 27 | * | 
|  | 28 | *  http://www.ietf.org/rfc/rfc3279.txt | 
|  | 29 | *  http://www.ietf.org/rfc/rfc3280.txt | 
|  | 30 | * | 
|  | 31 | *  ftp://ftp.rsasecurity.com/pub/pkcs/ascii/pkcs-1v2.asc | 
|  | 32 | * | 
|  | 33 | *  http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf | 
|  | 34 | *  http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf | 
|  | 35 | */ | 
|  | 36 |  | 
|  | 37 | #include "polarssl/config.h" | 
|  | 38 |  | 
|  | 39 | #if defined(POLARSSL_X509_CRT_PARSE_C) | 
|  | 40 |  | 
|  | 41 | #include "polarssl/x509_crt.h" | 
|  | 42 | #include "polarssl/oid.h" | 
|  | 43 | #if defined(POLARSSL_PEM_PARSE_C) | 
|  | 44 | #include "polarssl/pem.h" | 
|  | 45 | #endif | 
|  | 46 |  | 
| Paul Bakker | 7dc4c44 | 2014-02-01 22:50:26 +0100 | [diff] [blame] | 47 | #if defined(POLARSSL_PLATFORM_C) | 
|  | 48 | #include "polarssl/platform.h" | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 49 | #else | 
|  | 50 | #define polarssl_malloc     malloc | 
|  | 51 | #define polarssl_free       free | 
|  | 52 | #endif | 
|  | 53 |  | 
| Manuel Pégourié-Gonnard | 5ad68e4 | 2013-11-28 17:11:54 +0100 | [diff] [blame] | 54 | #if defined(POLARSSL_THREADING_C) | 
|  | 55 | #include "polarssl/threading.h" | 
|  | 56 | #endif | 
|  | 57 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 58 | #include <string.h> | 
|  | 59 | #include <stdlib.h> | 
| Paul Bakker | fa6a620 | 2013-10-28 18:48:30 +0100 | [diff] [blame] | 60 | #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 61 | #include <windows.h> | 
|  | 62 | #else | 
|  | 63 | #include <time.h> | 
|  | 64 | #endif | 
|  | 65 |  | 
| Paul Bakker | fa6a620 | 2013-10-28 18:48:30 +0100 | [diff] [blame] | 66 | #if defined(EFIX64) || defined(EFI32) | 
|  | 67 | #include <stdio.h> | 
|  | 68 | #endif | 
|  | 69 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 70 | #if defined(POLARSSL_FS_IO) | 
|  | 71 | #include <stdio.h> | 
|  | 72 | #if !defined(_WIN32) | 
|  | 73 | #include <sys/types.h> | 
|  | 74 | #include <sys/stat.h> | 
|  | 75 | #include <dirent.h> | 
|  | 76 | #endif | 
|  | 77 | #endif | 
|  | 78 |  | 
|  | 79 | /* | 
|  | 80 | *  Version  ::=  INTEGER  {  v1(0), v2(1), v3(2)  } | 
|  | 81 | */ | 
|  | 82 | static int x509_get_version( unsigned char **p, | 
|  | 83 | const unsigned char *end, | 
|  | 84 | int *ver ) | 
|  | 85 | { | 
|  | 86 | int ret; | 
|  | 87 | size_t len; | 
|  | 88 |  | 
|  | 89 | if( ( ret = asn1_get_tag( p, end, &len, | 
|  | 90 | ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | 0 ) ) != 0 ) | 
|  | 91 | { | 
|  | 92 | if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) | 
|  | 93 | { | 
|  | 94 | *ver = 0; | 
|  | 95 | return( 0 ); | 
|  | 96 | } | 
|  | 97 |  | 
|  | 98 | return( ret ); | 
|  | 99 | } | 
|  | 100 |  | 
|  | 101 | end = *p + len; | 
|  | 102 |  | 
|  | 103 | if( ( ret = asn1_get_int( p, end, ver ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 104 | return( POLARSSL_ERR_X509_INVALID_VERSION + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 105 |  | 
|  | 106 | if( *p != end ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 107 | return( POLARSSL_ERR_X509_INVALID_VERSION + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 108 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 109 |  | 
|  | 110 | return( 0 ); | 
|  | 111 | } | 
|  | 112 |  | 
|  | 113 | /* | 
|  | 114 | *  Validity ::= SEQUENCE { | 
|  | 115 | *       notBefore      Time, | 
|  | 116 | *       notAfter       Time } | 
|  | 117 | */ | 
|  | 118 | static int x509_get_dates( unsigned char **p, | 
|  | 119 | const unsigned char *end, | 
|  | 120 | x509_time *from, | 
|  | 121 | x509_time *to ) | 
|  | 122 | { | 
|  | 123 | int ret; | 
|  | 124 | size_t len; | 
|  | 125 |  | 
|  | 126 | if( ( ret = asn1_get_tag( p, end, &len, | 
|  | 127 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 128 | return( POLARSSL_ERR_X509_INVALID_DATE + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 129 |  | 
|  | 130 | end = *p + len; | 
|  | 131 |  | 
|  | 132 | if( ( ret = x509_get_time( p, end, from ) ) != 0 ) | 
|  | 133 | return( ret ); | 
|  | 134 |  | 
|  | 135 | if( ( ret = x509_get_time( p, end, to ) ) != 0 ) | 
|  | 136 | return( ret ); | 
|  | 137 |  | 
|  | 138 | if( *p != end ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 139 | return( POLARSSL_ERR_X509_INVALID_DATE + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 140 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 141 |  | 
|  | 142 | return( 0 ); | 
|  | 143 | } | 
|  | 144 |  | 
|  | 145 | /* | 
|  | 146 | * X.509 v2/v3 unique identifier (not parsed) | 
|  | 147 | */ | 
|  | 148 | static int x509_get_uid( unsigned char **p, | 
|  | 149 | const unsigned char *end, | 
|  | 150 | x509_buf *uid, int n ) | 
|  | 151 | { | 
|  | 152 | int ret; | 
|  | 153 |  | 
|  | 154 | if( *p == end ) | 
|  | 155 | return( 0 ); | 
|  | 156 |  | 
|  | 157 | uid->tag = **p; | 
|  | 158 |  | 
|  | 159 | if( ( ret = asn1_get_tag( p, end, &uid->len, | 
|  | 160 | ASN1_CONTEXT_SPECIFIC | ASN1_CONSTRUCTED | n ) ) != 0 ) | 
|  | 161 | { | 
|  | 162 | if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) | 
|  | 163 | return( 0 ); | 
|  | 164 |  | 
|  | 165 | return( ret ); | 
|  | 166 | } | 
|  | 167 |  | 
|  | 168 | uid->p = *p; | 
|  | 169 | *p += uid->len; | 
|  | 170 |  | 
|  | 171 | return( 0 ); | 
|  | 172 | } | 
|  | 173 |  | 
|  | 174 | static int x509_get_basic_constraints( unsigned char **p, | 
|  | 175 | const unsigned char *end, | 
|  | 176 | int *ca_istrue, | 
|  | 177 | int *max_pathlen ) | 
|  | 178 | { | 
|  | 179 | int ret; | 
|  | 180 | size_t len; | 
|  | 181 |  | 
|  | 182 | /* | 
|  | 183 | * BasicConstraints ::= SEQUENCE { | 
|  | 184 | *      cA                      BOOLEAN DEFAULT FALSE, | 
|  | 185 | *      pathLenConstraint       INTEGER (0..MAX) OPTIONAL } | 
|  | 186 | */ | 
|  | 187 | *ca_istrue = 0; /* DEFAULT FALSE */ | 
|  | 188 | *max_pathlen = 0; /* endless */ | 
|  | 189 |  | 
|  | 190 | if( ( ret = asn1_get_tag( p, end, &len, | 
|  | 191 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 192 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 193 |  | 
|  | 194 | if( *p == end ) | 
|  | 195 | return 0; | 
|  | 196 |  | 
|  | 197 | if( ( ret = asn1_get_bool( p, end, ca_istrue ) ) != 0 ) | 
|  | 198 | { | 
|  | 199 | if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) | 
|  | 200 | ret = asn1_get_int( p, end, ca_istrue ); | 
|  | 201 |  | 
|  | 202 | if( ret != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 203 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 204 |  | 
|  | 205 | if( *ca_istrue != 0 ) | 
|  | 206 | *ca_istrue = 1; | 
|  | 207 | } | 
|  | 208 |  | 
|  | 209 | if( *p == end ) | 
|  | 210 | return 0; | 
|  | 211 |  | 
|  | 212 | if( ( ret = asn1_get_int( p, end, max_pathlen ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 213 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 214 |  | 
|  | 215 | if( *p != end ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 216 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 217 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 218 |  | 
|  | 219 | (*max_pathlen)++; | 
|  | 220 |  | 
|  | 221 | return 0; | 
|  | 222 | } | 
|  | 223 |  | 
|  | 224 | static int x509_get_ns_cert_type( unsigned char **p, | 
|  | 225 | const unsigned char *end, | 
|  | 226 | unsigned char *ns_cert_type) | 
|  | 227 | { | 
|  | 228 | int ret; | 
|  | 229 | x509_bitstring bs = { 0, 0, NULL }; | 
|  | 230 |  | 
|  | 231 | if( ( ret = asn1_get_bitstring( p, end, &bs ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 232 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 233 |  | 
|  | 234 | if( bs.len != 1 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 235 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 236 | POLARSSL_ERR_ASN1_INVALID_LENGTH ); | 
|  | 237 |  | 
|  | 238 | /* Get actual bitstring */ | 
|  | 239 | *ns_cert_type = *bs.p; | 
|  | 240 | return 0; | 
|  | 241 | } | 
|  | 242 |  | 
|  | 243 | static int x509_get_key_usage( unsigned char **p, | 
|  | 244 | const unsigned char *end, | 
|  | 245 | unsigned char *key_usage) | 
|  | 246 | { | 
|  | 247 | int ret; | 
|  | 248 | x509_bitstring bs = { 0, 0, NULL }; | 
|  | 249 |  | 
|  | 250 | if( ( ret = asn1_get_bitstring( p, end, &bs ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 251 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 252 |  | 
|  | 253 | if( bs.len < 1 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 254 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 255 | POLARSSL_ERR_ASN1_INVALID_LENGTH ); | 
|  | 256 |  | 
|  | 257 | /* Get actual bitstring */ | 
|  | 258 | *key_usage = *bs.p; | 
|  | 259 | return 0; | 
|  | 260 | } | 
|  | 261 |  | 
|  | 262 | /* | 
|  | 263 | * ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId | 
|  | 264 | * | 
|  | 265 | * KeyPurposeId ::= OBJECT IDENTIFIER | 
|  | 266 | */ | 
|  | 267 | static int x509_get_ext_key_usage( unsigned char **p, | 
|  | 268 | const unsigned char *end, | 
|  | 269 | x509_sequence *ext_key_usage) | 
|  | 270 | { | 
|  | 271 | int ret; | 
|  | 272 |  | 
|  | 273 | if( ( ret = asn1_get_sequence_of( p, end, ext_key_usage, ASN1_OID ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 274 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 275 |  | 
|  | 276 | /* Sequence length must be >= 1 */ | 
|  | 277 | if( ext_key_usage->buf.p == NULL ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 278 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 279 | POLARSSL_ERR_ASN1_INVALID_LENGTH ); | 
|  | 280 |  | 
|  | 281 | return 0; | 
|  | 282 | } | 
|  | 283 |  | 
|  | 284 | /* | 
|  | 285 | * SubjectAltName ::= GeneralNames | 
|  | 286 | * | 
|  | 287 | * GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName | 
|  | 288 | * | 
|  | 289 | * GeneralName ::= CHOICE { | 
|  | 290 | *      otherName                       [0]     OtherName, | 
|  | 291 | *      rfc822Name                      [1]     IA5String, | 
|  | 292 | *      dNSName                         [2]     IA5String, | 
|  | 293 | *      x400Address                     [3]     ORAddress, | 
|  | 294 | *      directoryName                   [4]     Name, | 
|  | 295 | *      ediPartyName                    [5]     EDIPartyName, | 
|  | 296 | *      uniformResourceIdentifier       [6]     IA5String, | 
|  | 297 | *      iPAddress                       [7]     OCTET STRING, | 
|  | 298 | *      registeredID                    [8]     OBJECT IDENTIFIER } | 
|  | 299 | * | 
|  | 300 | * OtherName ::= SEQUENCE { | 
|  | 301 | *      type-id    OBJECT IDENTIFIER, | 
|  | 302 | *      value      [0] EXPLICIT ANY DEFINED BY type-id } | 
|  | 303 | * | 
|  | 304 | * EDIPartyName ::= SEQUENCE { | 
|  | 305 | *      nameAssigner            [0]     DirectoryString OPTIONAL, | 
|  | 306 | *      partyName               [1]     DirectoryString } | 
|  | 307 | * | 
|  | 308 | * NOTE: PolarSSL only parses and uses dNSName at this point. | 
|  | 309 | */ | 
|  | 310 | static int x509_get_subject_alt_name( unsigned char **p, | 
|  | 311 | const unsigned char *end, | 
|  | 312 | x509_sequence *subject_alt_name ) | 
|  | 313 | { | 
|  | 314 | int ret; | 
|  | 315 | size_t len, tag_len; | 
|  | 316 | asn1_buf *buf; | 
|  | 317 | unsigned char tag; | 
|  | 318 | asn1_sequence *cur = subject_alt_name; | 
|  | 319 |  | 
|  | 320 | /* Get main sequence tag */ | 
|  | 321 | if( ( ret = asn1_get_tag( p, end, &len, | 
|  | 322 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 323 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 324 |  | 
|  | 325 | if( *p + len != end ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 326 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 327 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 328 |  | 
|  | 329 | while( *p < end ) | 
|  | 330 | { | 
|  | 331 | if( ( end - *p ) < 1 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 332 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 333 | POLARSSL_ERR_ASN1_OUT_OF_DATA ); | 
|  | 334 |  | 
|  | 335 | tag = **p; | 
|  | 336 | (*p)++; | 
|  | 337 | if( ( ret = asn1_get_len( p, end, &tag_len ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 338 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 339 |  | 
|  | 340 | if( ( tag & ASN1_CONTEXT_SPECIFIC ) != ASN1_CONTEXT_SPECIFIC ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 341 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 342 | POLARSSL_ERR_ASN1_UNEXPECTED_TAG ); | 
|  | 343 |  | 
|  | 344 | if( tag != ( ASN1_CONTEXT_SPECIFIC | 2 ) ) | 
|  | 345 | { | 
|  | 346 | *p += tag_len; | 
|  | 347 | continue; | 
|  | 348 | } | 
|  | 349 |  | 
|  | 350 | buf = &(cur->buf); | 
|  | 351 | buf->tag = tag; | 
|  | 352 | buf->p = *p; | 
|  | 353 | buf->len = tag_len; | 
|  | 354 | *p += buf->len; | 
|  | 355 |  | 
|  | 356 | /* Allocate and assign next pointer */ | 
|  | 357 | if (*p < end) | 
|  | 358 | { | 
|  | 359 | cur->next = (asn1_sequence *) polarssl_malloc( | 
|  | 360 | sizeof( asn1_sequence ) ); | 
|  | 361 |  | 
|  | 362 | if( cur->next == NULL ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 363 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 364 | POLARSSL_ERR_ASN1_MALLOC_FAILED ); | 
|  | 365 |  | 
|  | 366 | memset( cur->next, 0, sizeof( asn1_sequence ) ); | 
|  | 367 | cur = cur->next; | 
|  | 368 | } | 
|  | 369 | } | 
|  | 370 |  | 
|  | 371 | /* Set final sequence entry's next pointer to NULL */ | 
|  | 372 | cur->next = NULL; | 
|  | 373 |  | 
|  | 374 | if( *p != end ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 375 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 376 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 377 |  | 
|  | 378 | return( 0 ); | 
|  | 379 | } | 
|  | 380 |  | 
|  | 381 | /* | 
|  | 382 | * X.509 v3 extensions | 
|  | 383 | * | 
|  | 384 | * TODO: Perform all of the basic constraints tests required by the RFC | 
|  | 385 | * TODO: Set values for undetected extensions to a sane default? | 
|  | 386 | * | 
|  | 387 | */ | 
|  | 388 | static int x509_get_crt_ext( unsigned char **p, | 
|  | 389 | const unsigned char *end, | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 390 | x509_crt *crt ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 391 | { | 
|  | 392 | int ret; | 
|  | 393 | size_t len; | 
|  | 394 | unsigned char *end_ext_data, *end_ext_octet; | 
|  | 395 |  | 
|  | 396 | if( ( ret = x509_get_ext( p, end, &crt->v3_ext, 3 ) ) != 0 ) | 
|  | 397 | { | 
|  | 398 | if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) | 
|  | 399 | return( 0 ); | 
|  | 400 |  | 
|  | 401 | return( ret ); | 
|  | 402 | } | 
|  | 403 |  | 
|  | 404 | while( *p < end ) | 
|  | 405 | { | 
|  | 406 | /* | 
|  | 407 | * Extension  ::=  SEQUENCE  { | 
|  | 408 | *      extnID      OBJECT IDENTIFIER, | 
|  | 409 | *      critical    BOOLEAN DEFAULT FALSE, | 
|  | 410 | *      extnValue   OCTET STRING  } | 
|  | 411 | */ | 
|  | 412 | x509_buf extn_oid = {0, 0, NULL}; | 
|  | 413 | int is_critical = 0; /* DEFAULT FALSE */ | 
|  | 414 | int ext_type = 0; | 
|  | 415 |  | 
|  | 416 | if( ( ret = asn1_get_tag( p, end, &len, | 
|  | 417 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 418 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 419 |  | 
|  | 420 | end_ext_data = *p + len; | 
|  | 421 |  | 
|  | 422 | /* Get extension ID */ | 
|  | 423 | extn_oid.tag = **p; | 
|  | 424 |  | 
|  | 425 | if( ( ret = asn1_get_tag( p, end, &extn_oid.len, ASN1_OID ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 426 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 427 |  | 
|  | 428 | extn_oid.p = *p; | 
|  | 429 | *p += extn_oid.len; | 
|  | 430 |  | 
|  | 431 | if( ( end - *p ) < 1 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 432 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 433 | POLARSSL_ERR_ASN1_OUT_OF_DATA ); | 
|  | 434 |  | 
|  | 435 | /* Get optional critical */ | 
|  | 436 | if( ( ret = asn1_get_bool( p, end_ext_data, &is_critical ) ) != 0 && | 
|  | 437 | ( ret != POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 438 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 439 |  | 
|  | 440 | /* Data should be octet string type */ | 
|  | 441 | if( ( ret = asn1_get_tag( p, end_ext_data, &len, | 
|  | 442 | ASN1_OCTET_STRING ) ) != 0 ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 443 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 444 |  | 
|  | 445 | end_ext_octet = *p + len; | 
|  | 446 |  | 
|  | 447 | if( end_ext_octet != end_ext_data ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 448 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 449 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 450 |  | 
|  | 451 | /* | 
|  | 452 | * Detect supported extensions | 
|  | 453 | */ | 
|  | 454 | ret = oid_get_x509_ext_type( &extn_oid, &ext_type ); | 
|  | 455 |  | 
|  | 456 | if( ret != 0 ) | 
|  | 457 | { | 
|  | 458 | /* No parser found, skip extension */ | 
|  | 459 | *p = end_ext_octet; | 
|  | 460 |  | 
|  | 461 | #if !defined(POLARSSL_X509_ALLOW_UNSUPPORTED_CRITICAL_EXTENSION) | 
|  | 462 | if( is_critical ) | 
|  | 463 | { | 
|  | 464 | /* Data is marked as critical: fail */ | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 465 | return ( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 466 | POLARSSL_ERR_ASN1_UNEXPECTED_TAG ); | 
|  | 467 | } | 
|  | 468 | #endif | 
|  | 469 | continue; | 
|  | 470 | } | 
|  | 471 |  | 
|  | 472 | crt->ext_types |= ext_type; | 
|  | 473 |  | 
|  | 474 | switch( ext_type ) | 
|  | 475 | { | 
|  | 476 | case EXT_BASIC_CONSTRAINTS: | 
|  | 477 | /* Parse basic constraints */ | 
|  | 478 | if( ( ret = x509_get_basic_constraints( p, end_ext_octet, | 
|  | 479 | &crt->ca_istrue, &crt->max_pathlen ) ) != 0 ) | 
|  | 480 | return ( ret ); | 
|  | 481 | break; | 
|  | 482 |  | 
|  | 483 | case EXT_KEY_USAGE: | 
|  | 484 | /* Parse key usage */ | 
|  | 485 | if( ( ret = x509_get_key_usage( p, end_ext_octet, | 
|  | 486 | &crt->key_usage ) ) != 0 ) | 
|  | 487 | return ( ret ); | 
|  | 488 | break; | 
|  | 489 |  | 
|  | 490 | case EXT_EXTENDED_KEY_USAGE: | 
|  | 491 | /* Parse extended key usage */ | 
|  | 492 | if( ( ret = x509_get_ext_key_usage( p, end_ext_octet, | 
|  | 493 | &crt->ext_key_usage ) ) != 0 ) | 
|  | 494 | return ( ret ); | 
|  | 495 | break; | 
|  | 496 |  | 
|  | 497 | case EXT_SUBJECT_ALT_NAME: | 
|  | 498 | /* Parse subject alt name */ | 
|  | 499 | if( ( ret = x509_get_subject_alt_name( p, end_ext_octet, | 
|  | 500 | &crt->subject_alt_names ) ) != 0 ) | 
|  | 501 | return ( ret ); | 
|  | 502 | break; | 
|  | 503 |  | 
|  | 504 | case EXT_NS_CERT_TYPE: | 
|  | 505 | /* Parse netscape certificate type */ | 
|  | 506 | if( ( ret = x509_get_ns_cert_type( p, end_ext_octet, | 
|  | 507 | &crt->ns_cert_type ) ) != 0 ) | 
|  | 508 | return ( ret ); | 
|  | 509 | break; | 
|  | 510 |  | 
|  | 511 | default: | 
|  | 512 | return( POLARSSL_ERR_X509_FEATURE_UNAVAILABLE ); | 
|  | 513 | } | 
|  | 514 | } | 
|  | 515 |  | 
|  | 516 | if( *p != end ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 517 | return( POLARSSL_ERR_X509_INVALID_EXTENSIONS + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 518 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 519 |  | 
|  | 520 | return( 0 ); | 
|  | 521 | } | 
|  | 522 |  | 
|  | 523 | /* | 
|  | 524 | * Parse and fill a single X.509 certificate in DER format | 
|  | 525 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 526 | static int x509_crt_parse_der_core( x509_crt *crt, const unsigned char *buf, | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 527 | size_t buflen ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 528 | { | 
|  | 529 | int ret; | 
|  | 530 | size_t len; | 
|  | 531 | unsigned char *p, *end, *crt_end; | 
|  | 532 |  | 
|  | 533 | /* | 
|  | 534 | * Check for valid input | 
|  | 535 | */ | 
|  | 536 | if( crt == NULL || buf == NULL ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 537 | return( POLARSSL_ERR_X509_BAD_INPUT_DATA ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 538 |  | 
|  | 539 | p = (unsigned char *) polarssl_malloc( len = buflen ); | 
|  | 540 |  | 
|  | 541 | if( p == NULL ) | 
|  | 542 | return( POLARSSL_ERR_X509_MALLOC_FAILED ); | 
|  | 543 |  | 
|  | 544 | memcpy( p, buf, buflen ); | 
|  | 545 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 546 | crt->raw.p = p; | 
|  | 547 | crt->raw.len = len; | 
|  | 548 | end = p + len; | 
|  | 549 |  | 
|  | 550 | /* | 
|  | 551 | * Certificate  ::=  SEQUENCE  { | 
|  | 552 | *      tbsCertificate       TBSCertificate, | 
|  | 553 | *      signatureAlgorithm   AlgorithmIdentifier, | 
|  | 554 | *      signatureValue       BIT STRING  } | 
|  | 555 | */ | 
|  | 556 | if( ( ret = asn1_get_tag( &p, end, &len, | 
|  | 557 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
|  | 558 | { | 
|  | 559 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 560 | return( POLARSSL_ERR_X509_INVALID_FORMAT ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 561 | } | 
|  | 562 |  | 
|  | 563 | if( len > (size_t) ( end - p ) ) | 
|  | 564 | { | 
|  | 565 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 566 | return( POLARSSL_ERR_X509_INVALID_FORMAT + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 567 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 568 | } | 
|  | 569 | crt_end = p + len; | 
|  | 570 |  | 
|  | 571 | /* | 
|  | 572 | * TBSCertificate  ::=  SEQUENCE  { | 
|  | 573 | */ | 
|  | 574 | crt->tbs.p = p; | 
|  | 575 |  | 
|  | 576 | if( ( ret = asn1_get_tag( &p, end, &len, | 
|  | 577 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
|  | 578 | { | 
|  | 579 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 580 | return( POLARSSL_ERR_X509_INVALID_FORMAT + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 581 | } | 
|  | 582 |  | 
|  | 583 | end = p + len; | 
|  | 584 | crt->tbs.len = end - crt->tbs.p; | 
|  | 585 |  | 
|  | 586 | /* | 
|  | 587 | * Version  ::=  INTEGER  {  v1(0), v2(1), v3(2)  } | 
|  | 588 | * | 
|  | 589 | * CertificateSerialNumber  ::=  INTEGER | 
|  | 590 | * | 
|  | 591 | * signature            AlgorithmIdentifier | 
|  | 592 | */ | 
|  | 593 | if( ( ret = x509_get_version(  &p, end, &crt->version  ) ) != 0 || | 
|  | 594 | ( ret = x509_get_serial(   &p, end, &crt->serial   ) ) != 0 || | 
| Manuel Pégourié-Gonnard | c909308 | 2014-02-12 09:39:59 +0100 | [diff] [blame] | 595 | ( ret = x509_get_alg_null( &p, end, &crt->sig_oid1 ) ) != 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 596 | { | 
|  | 597 | x509_crt_free( crt ); | 
|  | 598 | return( ret ); | 
|  | 599 | } | 
|  | 600 |  | 
|  | 601 | crt->version++; | 
|  | 602 |  | 
|  | 603 | if( crt->version > 3 ) | 
|  | 604 | { | 
|  | 605 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 606 | return( POLARSSL_ERR_X509_UNKNOWN_VERSION ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 607 | } | 
|  | 608 |  | 
| Manuel Pégourié-Gonnard | c909308 | 2014-02-12 09:39:59 +0100 | [diff] [blame] | 609 | if( ( ret = x509_get_sig_alg( &crt->sig_oid1, &crt->sig_md, | 
|  | 610 | &crt->sig_pk ) ) != 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 611 | { | 
|  | 612 | x509_crt_free( crt ); | 
|  | 613 | return( ret ); | 
|  | 614 | } | 
|  | 615 |  | 
|  | 616 | /* | 
|  | 617 | * issuer               Name | 
|  | 618 | */ | 
|  | 619 | crt->issuer_raw.p = p; | 
|  | 620 |  | 
|  | 621 | if( ( ret = asn1_get_tag( &p, end, &len, | 
|  | 622 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
|  | 623 | { | 
|  | 624 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 625 | return( POLARSSL_ERR_X509_INVALID_FORMAT + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 626 | } | 
|  | 627 |  | 
|  | 628 | if( ( ret = x509_get_name( &p, p + len, &crt->issuer ) ) != 0 ) | 
|  | 629 | { | 
|  | 630 | x509_crt_free( crt ); | 
|  | 631 | return( ret ); | 
|  | 632 | } | 
|  | 633 |  | 
|  | 634 | crt->issuer_raw.len = p - crt->issuer_raw.p; | 
|  | 635 |  | 
|  | 636 | /* | 
|  | 637 | * Validity ::= SEQUENCE { | 
|  | 638 | *      notBefore      Time, | 
|  | 639 | *      notAfter       Time } | 
|  | 640 | * | 
|  | 641 | */ | 
|  | 642 | if( ( ret = x509_get_dates( &p, end, &crt->valid_from, | 
|  | 643 | &crt->valid_to ) ) != 0 ) | 
|  | 644 | { | 
|  | 645 | x509_crt_free( crt ); | 
|  | 646 | return( ret ); | 
|  | 647 | } | 
|  | 648 |  | 
|  | 649 | /* | 
|  | 650 | * subject              Name | 
|  | 651 | */ | 
|  | 652 | crt->subject_raw.p = p; | 
|  | 653 |  | 
|  | 654 | if( ( ret = asn1_get_tag( &p, end, &len, | 
|  | 655 | ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) | 
|  | 656 | { | 
|  | 657 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 658 | return( POLARSSL_ERR_X509_INVALID_FORMAT + ret ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 659 | } | 
|  | 660 |  | 
|  | 661 | if( len && ( ret = x509_get_name( &p, p + len, &crt->subject ) ) != 0 ) | 
|  | 662 | { | 
|  | 663 | x509_crt_free( crt ); | 
|  | 664 | return( ret ); | 
|  | 665 | } | 
|  | 666 |  | 
|  | 667 | crt->subject_raw.len = p - crt->subject_raw.p; | 
|  | 668 |  | 
|  | 669 | /* | 
|  | 670 | * SubjectPublicKeyInfo | 
|  | 671 | */ | 
| Paul Bakker | da77115 | 2013-09-16 22:45:03 +0200 | [diff] [blame] | 672 | if( ( ret = pk_parse_subpubkey( &p, end, &crt->pk ) ) != 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 673 | { | 
|  | 674 | x509_crt_free( crt ); | 
|  | 675 | return( ret ); | 
|  | 676 | } | 
|  | 677 |  | 
|  | 678 | /* | 
|  | 679 | *  issuerUniqueID  [1]  IMPLICIT UniqueIdentifier OPTIONAL, | 
|  | 680 | *                       -- If present, version shall be v2 or v3 | 
|  | 681 | *  subjectUniqueID [2]  IMPLICIT UniqueIdentifier OPTIONAL, | 
|  | 682 | *                       -- If present, version shall be v2 or v3 | 
|  | 683 | *  extensions      [3]  EXPLICIT Extensions OPTIONAL | 
|  | 684 | *                       -- If present, version shall be v3 | 
|  | 685 | */ | 
|  | 686 | if( crt->version == 2 || crt->version == 3 ) | 
|  | 687 | { | 
|  | 688 | ret = x509_get_uid( &p, end, &crt->issuer_id,  1 ); | 
|  | 689 | if( ret != 0 ) | 
|  | 690 | { | 
|  | 691 | x509_crt_free( crt ); | 
|  | 692 | return( ret ); | 
|  | 693 | } | 
|  | 694 | } | 
|  | 695 |  | 
|  | 696 | if( crt->version == 2 || crt->version == 3 ) | 
|  | 697 | { | 
|  | 698 | ret = x509_get_uid( &p, end, &crt->subject_id,  2 ); | 
|  | 699 | if( ret != 0 ) | 
|  | 700 | { | 
|  | 701 | x509_crt_free( crt ); | 
|  | 702 | return( ret ); | 
|  | 703 | } | 
|  | 704 | } | 
|  | 705 |  | 
| Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 706 | #if !defined(POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 707 | if( crt->version == 3 ) | 
|  | 708 | { | 
| Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 709 | #endif | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 710 | ret = x509_get_crt_ext( &p, end, crt); | 
|  | 711 | if( ret != 0 ) | 
|  | 712 | { | 
|  | 713 | x509_crt_free( crt ); | 
|  | 714 | return( ret ); | 
|  | 715 | } | 
| Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 716 | #if !defined(POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 717 | } | 
| Paul Bakker | c27c4e2 | 2013-09-23 15:01:36 +0200 | [diff] [blame] | 718 | #endif | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 719 |  | 
|  | 720 | if( p != end ) | 
|  | 721 | { | 
|  | 722 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 723 | return( POLARSSL_ERR_X509_INVALID_FORMAT + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 724 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 725 | } | 
|  | 726 |  | 
|  | 727 | end = crt_end; | 
|  | 728 |  | 
|  | 729 | /* | 
|  | 730 | *  } | 
|  | 731 | *  -- end of TBSCertificate | 
|  | 732 | * | 
|  | 733 | *  signatureAlgorithm   AlgorithmIdentifier, | 
|  | 734 | *  signatureValue       BIT STRING | 
|  | 735 | */ | 
| Manuel Pégourié-Gonnard | c909308 | 2014-02-12 09:39:59 +0100 | [diff] [blame] | 736 | if( ( ret = x509_get_alg_null( &p, end, &crt->sig_oid2 ) ) != 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 737 | { | 
|  | 738 | x509_crt_free( crt ); | 
|  | 739 | return( ret ); | 
|  | 740 | } | 
|  | 741 |  | 
|  | 742 | if( crt->sig_oid1.len != crt->sig_oid2.len || | 
| Manuel Pégourié-Gonnard | c909308 | 2014-02-12 09:39:59 +0100 | [diff] [blame] | 743 | memcmp( crt->sig_oid1.p, crt->sig_oid2.p, crt->sig_oid1.len ) != 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 744 | { | 
|  | 745 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 746 | return( POLARSSL_ERR_X509_SIG_MISMATCH ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 747 | } | 
|  | 748 |  | 
|  | 749 | if( ( ret = x509_get_sig( &p, end, &crt->sig ) ) != 0 ) | 
|  | 750 | { | 
|  | 751 | x509_crt_free( crt ); | 
|  | 752 | return( ret ); | 
|  | 753 | } | 
|  | 754 |  | 
|  | 755 | if( p != end ) | 
|  | 756 | { | 
|  | 757 | x509_crt_free( crt ); | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 758 | return( POLARSSL_ERR_X509_INVALID_FORMAT + | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 759 | POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); | 
|  | 760 | } | 
|  | 761 |  | 
|  | 762 | return( 0 ); | 
|  | 763 | } | 
|  | 764 |  | 
|  | 765 | /* | 
|  | 766 | * Parse one X.509 certificate in DER format from a buffer and add them to a | 
|  | 767 | * chained list | 
|  | 768 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 769 | int x509_crt_parse_der( x509_crt *chain, const unsigned char *buf, | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 770 | size_t buflen ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 771 | { | 
|  | 772 | int ret; | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 773 | x509_crt *crt = chain, *prev = NULL; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 774 |  | 
|  | 775 | /* | 
|  | 776 | * Check for valid input | 
|  | 777 | */ | 
|  | 778 | if( crt == NULL || buf == NULL ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 779 | return( POLARSSL_ERR_X509_BAD_INPUT_DATA ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 780 |  | 
|  | 781 | while( crt->version != 0 && crt->next != NULL ) | 
|  | 782 | { | 
|  | 783 | prev = crt; | 
|  | 784 | crt = crt->next; | 
|  | 785 | } | 
|  | 786 |  | 
|  | 787 | /* | 
|  | 788 | * Add new certificate on the end of the chain if needed. | 
|  | 789 | */ | 
|  | 790 | if ( crt->version != 0 && crt->next == NULL) | 
|  | 791 | { | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 792 | crt->next = (x509_crt *) polarssl_malloc( sizeof( x509_crt ) ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 793 |  | 
|  | 794 | if( crt->next == NULL ) | 
|  | 795 | return( POLARSSL_ERR_X509_MALLOC_FAILED ); | 
|  | 796 |  | 
|  | 797 | prev = crt; | 
|  | 798 | crt = crt->next; | 
| Paul Bakker | 369d2eb | 2013-09-18 11:58:25 +0200 | [diff] [blame] | 799 | x509_crt_init( crt ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 800 | } | 
|  | 801 |  | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 802 | if( ( ret = x509_crt_parse_der_core( crt, buf, buflen ) ) != 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 803 | { | 
|  | 804 | if( prev ) | 
|  | 805 | prev->next = NULL; | 
|  | 806 |  | 
|  | 807 | if( crt != chain ) | 
|  | 808 | polarssl_free( crt ); | 
|  | 809 |  | 
|  | 810 | return( ret ); | 
|  | 811 | } | 
|  | 812 |  | 
|  | 813 | return( 0 ); | 
|  | 814 | } | 
|  | 815 |  | 
|  | 816 | /* | 
|  | 817 | * Parse one or more PEM certificates from a buffer and add them to the chained list | 
|  | 818 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 819 | int x509_crt_parse( x509_crt *chain, const unsigned char *buf, size_t buflen ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 820 | { | 
|  | 821 | int success = 0, first_error = 0, total_failed = 0; | 
|  | 822 | int buf_format = X509_FORMAT_DER; | 
|  | 823 |  | 
|  | 824 | /* | 
|  | 825 | * Check for valid input | 
|  | 826 | */ | 
|  | 827 | if( chain == NULL || buf == NULL ) | 
| Paul Bakker | 5187656 | 2013-09-17 14:36:05 +0200 | [diff] [blame] | 828 | return( POLARSSL_ERR_X509_BAD_INPUT_DATA ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 829 |  | 
|  | 830 | /* | 
|  | 831 | * Determine buffer content. Buffer contains either one DER certificate or | 
|  | 832 | * one or more PEM certificates. | 
|  | 833 | */ | 
|  | 834 | #if defined(POLARSSL_PEM_PARSE_C) | 
|  | 835 | if( strstr( (const char *) buf, "-----BEGIN CERTIFICATE-----" ) != NULL ) | 
|  | 836 | buf_format = X509_FORMAT_PEM; | 
|  | 837 | #endif | 
|  | 838 |  | 
|  | 839 | if( buf_format == X509_FORMAT_DER ) | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 840 | return x509_crt_parse_der( chain, buf, buflen ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 841 |  | 
|  | 842 | #if defined(POLARSSL_PEM_PARSE_C) | 
|  | 843 | if( buf_format == X509_FORMAT_PEM ) | 
|  | 844 | { | 
|  | 845 | int ret; | 
|  | 846 | pem_context pem; | 
|  | 847 |  | 
|  | 848 | while( buflen > 0 ) | 
|  | 849 | { | 
|  | 850 | size_t use_len; | 
|  | 851 | pem_init( &pem ); | 
|  | 852 |  | 
|  | 853 | ret = pem_read_buffer( &pem, | 
|  | 854 | "-----BEGIN CERTIFICATE-----", | 
|  | 855 | "-----END CERTIFICATE-----", | 
|  | 856 | buf, NULL, 0, &use_len ); | 
|  | 857 |  | 
|  | 858 | if( ret == 0 ) | 
|  | 859 | { | 
|  | 860 | /* | 
|  | 861 | * Was PEM encoded | 
|  | 862 | */ | 
|  | 863 | buflen -= use_len; | 
|  | 864 | buf += use_len; | 
|  | 865 | } | 
|  | 866 | else if( ret == POLARSSL_ERR_PEM_BAD_INPUT_DATA ) | 
|  | 867 | { | 
|  | 868 | return( ret ); | 
|  | 869 | } | 
|  | 870 | else if( ret != POLARSSL_ERR_PEM_NO_HEADER_FOOTER_PRESENT ) | 
|  | 871 | { | 
|  | 872 | pem_free( &pem ); | 
|  | 873 |  | 
|  | 874 | /* | 
|  | 875 | * PEM header and footer were found | 
|  | 876 | */ | 
|  | 877 | buflen -= use_len; | 
|  | 878 | buf += use_len; | 
|  | 879 |  | 
|  | 880 | if( first_error == 0 ) | 
|  | 881 | first_error = ret; | 
|  | 882 |  | 
|  | 883 | continue; | 
|  | 884 | } | 
|  | 885 | else | 
|  | 886 | break; | 
|  | 887 |  | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 888 | ret = x509_crt_parse_der( chain, pem.buf, pem.buflen ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 889 |  | 
|  | 890 | pem_free( &pem ); | 
|  | 891 |  | 
|  | 892 | if( ret != 0 ) | 
|  | 893 | { | 
|  | 894 | /* | 
|  | 895 | * Quit parsing on a memory error | 
|  | 896 | */ | 
|  | 897 | if( ret == POLARSSL_ERR_X509_MALLOC_FAILED ) | 
|  | 898 | return( ret ); | 
|  | 899 |  | 
|  | 900 | if( first_error == 0 ) | 
|  | 901 | first_error = ret; | 
|  | 902 |  | 
|  | 903 | total_failed++; | 
|  | 904 | continue; | 
|  | 905 | } | 
|  | 906 |  | 
|  | 907 | success = 1; | 
|  | 908 | } | 
|  | 909 | } | 
|  | 910 | #endif | 
|  | 911 |  | 
|  | 912 | if( success ) | 
|  | 913 | return( total_failed ); | 
|  | 914 | else if( first_error ) | 
|  | 915 | return( first_error ); | 
|  | 916 | else | 
|  | 917 | return( POLARSSL_ERR_X509_CERT_UNKNOWN_FORMAT ); | 
|  | 918 | } | 
|  | 919 |  | 
|  | 920 | #if defined(POLARSSL_FS_IO) | 
|  | 921 | /* | 
|  | 922 | * Load one or more certificates and add them to the chained list | 
|  | 923 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 924 | int x509_crt_parse_file( x509_crt *chain, const char *path ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 925 | { | 
|  | 926 | int ret; | 
|  | 927 | size_t n; | 
|  | 928 | unsigned char *buf; | 
|  | 929 |  | 
|  | 930 | if ( ( ret = x509_load_file( path, &buf, &n ) ) != 0 ) | 
|  | 931 | return( ret ); | 
|  | 932 |  | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 933 | ret = x509_crt_parse( chain, buf, n ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 934 |  | 
|  | 935 | memset( buf, 0, n + 1 ); | 
|  | 936 | polarssl_free( buf ); | 
|  | 937 |  | 
|  | 938 | return( ret ); | 
|  | 939 | } | 
|  | 940 |  | 
| Manuel Pégourié-Gonnard | 6df0957 | 2014-02-12 09:29:05 +0100 | [diff] [blame] | 941 | #if defined(POLARSSL_THREADING_PTHREAD) | 
| Manuel Pégourié-Gonnard | 5ad68e4 | 2013-11-28 17:11:54 +0100 | [diff] [blame] | 942 | static threading_mutex_t readdir_mutex = PTHREAD_MUTEX_INITIALIZER; | 
|  | 943 | #endif | 
|  | 944 |  | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 945 | int x509_crt_parse_path( x509_crt *chain, const char *path ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 946 | { | 
|  | 947 | int ret = 0; | 
| Paul Bakker | fa6a620 | 2013-10-28 18:48:30 +0100 | [diff] [blame] | 948 | #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 949 | int w_ret; | 
|  | 950 | WCHAR szDir[MAX_PATH]; | 
|  | 951 | char filename[MAX_PATH]; | 
|  | 952 | char *p; | 
| Paul Bakker | b9cfaa0 | 2013-10-11 18:58:55 +0200 | [diff] [blame] | 953 | int len = (int) strlen( path ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 954 |  | 
|  | 955 | WIN32_FIND_DATAW file_data; | 
|  | 956 | HANDLE hFind; | 
|  | 957 |  | 
|  | 958 | if( len > MAX_PATH - 3 ) | 
| Paul Bakker | 3cf63ed | 2013-09-23 15:10:16 +0200 | [diff] [blame] | 959 | return( POLARSSL_ERR_X509_BAD_INPUT_DATA ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 960 |  | 
|  | 961 | memset( szDir, 0, sizeof(szDir) ); | 
|  | 962 | memset( filename, 0, MAX_PATH ); | 
|  | 963 | memcpy( filename, path, len ); | 
|  | 964 | filename[len++] = '\\'; | 
|  | 965 | p = filename + len; | 
|  | 966 | filename[len++] = '*'; | 
|  | 967 |  | 
| Paul Bakker | 1a56fc9 | 2013-12-19 13:51:24 +0100 | [diff] [blame] | 968 | w_ret = MultiByteToWideChar( CP_ACP, 0, filename, len, szDir, MAX_PATH - 3 ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 969 |  | 
|  | 970 | hFind = FindFirstFileW( szDir, &file_data ); | 
| Paul Bakker | 4aa40d4 | 2013-10-11 10:49:24 +0200 | [diff] [blame] | 971 | if (hFind == INVALID_HANDLE_VALUE) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 972 | return( POLARSSL_ERR_X509_FILE_IO_ERROR ); | 
|  | 973 |  | 
|  | 974 | len = MAX_PATH - len; | 
|  | 975 | do | 
|  | 976 | { | 
|  | 977 | memset( p, 0, len ); | 
|  | 978 |  | 
|  | 979 | if( file_data.dwFileAttributes & FILE_ATTRIBUTE_DIRECTORY ) | 
|  | 980 | continue; | 
|  | 981 |  | 
|  | 982 | w_ret = WideCharToMultiByte( CP_ACP, 0, file_data.cFileName, | 
|  | 983 | lstrlenW(file_data.cFileName), | 
|  | 984 | p, len - 1, | 
|  | 985 | NULL, NULL ); | 
|  | 986 |  | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 987 | w_ret = x509_crt_parse_file( chain, filename ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 988 | if( w_ret < 0 ) | 
|  | 989 | ret++; | 
|  | 990 | else | 
|  | 991 | ret += w_ret; | 
|  | 992 | } | 
|  | 993 | while( FindNextFileW( hFind, &file_data ) != 0 ); | 
|  | 994 |  | 
| Paul Bakker | 4aa40d4 | 2013-10-11 10:49:24 +0200 | [diff] [blame] | 995 | if (GetLastError() != ERROR_NO_MORE_FILES) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 996 | ret = POLARSSL_ERR_X509_FILE_IO_ERROR; | 
|  | 997 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 998 | FindClose( hFind ); | 
| Paul Bakker | be089b0 | 2013-10-14 15:51:50 +0200 | [diff] [blame] | 999 | #else /* _WIN32 */ | 
| Manuel Pégourié-Gonnard | 964bf9b | 2013-11-26 16:47:11 +0100 | [diff] [blame] | 1000 | int t_ret; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1001 | struct stat sb; | 
| Manuel Pégourié-Gonnard | 964bf9b | 2013-11-26 16:47:11 +0100 | [diff] [blame] | 1002 | struct dirent *entry; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1003 | char entry_name[255]; | 
|  | 1004 | DIR *dir = opendir( path ); | 
|  | 1005 |  | 
|  | 1006 | if( dir == NULL) | 
|  | 1007 | return( POLARSSL_ERR_X509_FILE_IO_ERROR ); | 
|  | 1008 |  | 
| Manuel Pégourié-Gonnard | 6df0957 | 2014-02-12 09:29:05 +0100 | [diff] [blame] | 1009 | #if defined(POLARSSL_THREADING_PTHREAD) | 
| Manuel Pégourié-Gonnard | 5ad68e4 | 2013-11-28 17:11:54 +0100 | [diff] [blame] | 1010 | if( ( ret = polarssl_mutex_lock( &readdir_mutex ) ) != 0 ) | 
|  | 1011 | return( ret ); | 
|  | 1012 | #endif | 
|  | 1013 |  | 
| Manuel Pégourié-Gonnard | 964bf9b | 2013-11-26 16:47:11 +0100 | [diff] [blame] | 1014 | while( ( entry = readdir( dir ) ) != NULL ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1015 | { | 
| Manuel Pégourié-Gonnard | 964bf9b | 2013-11-26 16:47:11 +0100 | [diff] [blame] | 1016 | snprintf( entry_name, sizeof entry_name, "%s/%s", path, entry->d_name ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1017 |  | 
| Manuel Pégourié-Gonnard | 964bf9b | 2013-11-26 16:47:11 +0100 | [diff] [blame] | 1018 | if( stat( entry_name, &sb ) == -1 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1019 | { | 
|  | 1020 | closedir( dir ); | 
| Manuel Pégourié-Gonnard | 5ad68e4 | 2013-11-28 17:11:54 +0100 | [diff] [blame] | 1021 | ret = POLARSSL_ERR_X509_FILE_IO_ERROR; | 
|  | 1022 | goto cleanup; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1023 | } | 
|  | 1024 |  | 
|  | 1025 | if( !S_ISREG( sb.st_mode ) ) | 
|  | 1026 | continue; | 
|  | 1027 |  | 
|  | 1028 | // Ignore parse errors | 
|  | 1029 | // | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1030 | t_ret = x509_crt_parse_file( chain, entry_name ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1031 | if( t_ret < 0 ) | 
|  | 1032 | ret++; | 
|  | 1033 | else | 
|  | 1034 | ret += t_ret; | 
|  | 1035 | } | 
|  | 1036 | closedir( dir ); | 
| Manuel Pégourié-Gonnard | 5ad68e4 | 2013-11-28 17:11:54 +0100 | [diff] [blame] | 1037 |  | 
|  | 1038 | cleanup: | 
| Manuel Pégourié-Gonnard | 6df0957 | 2014-02-12 09:29:05 +0100 | [diff] [blame] | 1039 | #if defined(POLARSSL_THREADING_PTHREAD) | 
| Manuel Pégourié-Gonnard | 5ad68e4 | 2013-11-28 17:11:54 +0100 | [diff] [blame] | 1040 | if( polarssl_mutex_unlock( &readdir_mutex ) != 0 ) | 
|  | 1041 | ret = POLARSSL_ERR_THREADING_MUTEX_ERROR; | 
|  | 1042 | #endif | 
|  | 1043 |  | 
| Paul Bakker | be089b0 | 2013-10-14 15:51:50 +0200 | [diff] [blame] | 1044 | #endif /* _WIN32 */ | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1045 |  | 
|  | 1046 | return( ret ); | 
|  | 1047 | } | 
|  | 1048 | #endif /* POLARSSL_FS_IO */ | 
|  | 1049 |  | 
| Paul Bakker | 6edcd41 | 2013-10-29 15:22:54 +0100 | [diff] [blame] | 1050 | #if defined(_MSC_VER) && !defined snprintf && !defined(EFIX64) && \ | 
|  | 1051 | !defined(EFI32) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1052 | #include <stdarg.h> | 
|  | 1053 |  | 
|  | 1054 | #if !defined vsnprintf | 
|  | 1055 | #define vsnprintf _vsnprintf | 
|  | 1056 | #endif // vsnprintf | 
|  | 1057 |  | 
|  | 1058 | /* | 
|  | 1059 | * Windows _snprintf and _vsnprintf are not compatible to linux versions. | 
|  | 1060 | * Result value is not size of buffer needed, but -1 if no fit is possible. | 
|  | 1061 | * | 
|  | 1062 | * This fuction tries to 'fix' this by at least suggesting enlarging the | 
|  | 1063 | * size by 20. | 
|  | 1064 | */ | 
|  | 1065 | static int compat_snprintf(char *str, size_t size, const char *format, ...) | 
|  | 1066 | { | 
|  | 1067 | va_list ap; | 
|  | 1068 | int res = -1; | 
|  | 1069 |  | 
|  | 1070 | va_start( ap, format ); | 
|  | 1071 |  | 
|  | 1072 | res = vsnprintf( str, size, format, ap ); | 
|  | 1073 |  | 
|  | 1074 | va_end( ap ); | 
|  | 1075 |  | 
|  | 1076 | // No quick fix possible | 
|  | 1077 | if ( res < 0 ) | 
|  | 1078 | return( (int) size + 20 ); | 
|  | 1079 |  | 
|  | 1080 | return res; | 
|  | 1081 | } | 
|  | 1082 |  | 
|  | 1083 | #define snprintf compat_snprintf | 
|  | 1084 | #endif | 
|  | 1085 |  | 
|  | 1086 | #define POLARSSL_ERR_DEBUG_BUF_TOO_SMALL    -2 | 
|  | 1087 |  | 
|  | 1088 | #define SAFE_SNPRINTF()                         \ | 
|  | 1089 | {                                               \ | 
|  | 1090 | if( ret == -1 )                             \ | 
|  | 1091 | return( -1 );                           \ | 
|  | 1092 | \ | 
|  | 1093 | if ( (unsigned int) ret > n ) {             \ | 
|  | 1094 | p[n - 1] = '\0';                        \ | 
|  | 1095 | return POLARSSL_ERR_DEBUG_BUF_TOO_SMALL;\ | 
|  | 1096 | }                                           \ | 
|  | 1097 | \ | 
|  | 1098 | n -= (unsigned int) ret;                    \ | 
|  | 1099 | p += (unsigned int) ret;                    \ | 
|  | 1100 | } | 
|  | 1101 |  | 
|  | 1102 | /* | 
|  | 1103 | * Return an informational string about the certificate. | 
|  | 1104 | */ | 
|  | 1105 | #define BEFORE_COLON    14 | 
|  | 1106 | #define BC              "14" | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1107 | int x509_crt_info( char *buf, size_t size, const char *prefix, | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1108 | const x509_crt *crt ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1109 | { | 
|  | 1110 | int ret; | 
|  | 1111 | size_t n; | 
|  | 1112 | char *p; | 
| Manuel Pégourié-Gonnard | c909308 | 2014-02-12 09:39:59 +0100 | [diff] [blame] | 1113 | const char *desc = NULL; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1114 | char key_size_str[BEFORE_COLON]; | 
|  | 1115 |  | 
|  | 1116 | p = buf; | 
|  | 1117 | n = size; | 
|  | 1118 |  | 
|  | 1119 | ret = snprintf( p, n, "%scert. version : %d\n", | 
|  | 1120 | prefix, crt->version ); | 
|  | 1121 | SAFE_SNPRINTF(); | 
|  | 1122 | ret = snprintf( p, n, "%sserial number : ", | 
|  | 1123 | prefix ); | 
|  | 1124 | SAFE_SNPRINTF(); | 
|  | 1125 |  | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1126 | ret = x509_serial_gets( p, n, &crt->serial); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1127 | SAFE_SNPRINTF(); | 
|  | 1128 |  | 
|  | 1129 | ret = snprintf( p, n, "\n%sissuer name   : ", prefix ); | 
|  | 1130 | SAFE_SNPRINTF(); | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1131 | ret = x509_dn_gets( p, n, &crt->issuer  ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1132 | SAFE_SNPRINTF(); | 
|  | 1133 |  | 
|  | 1134 | ret = snprintf( p, n, "\n%ssubject name  : ", prefix ); | 
|  | 1135 | SAFE_SNPRINTF(); | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1136 | ret = x509_dn_gets( p, n, &crt->subject ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1137 | SAFE_SNPRINTF(); | 
|  | 1138 |  | 
|  | 1139 | ret = snprintf( p, n, "\n%sissued  on    : " \ | 
|  | 1140 | "%04d-%02d-%02d %02d:%02d:%02d", prefix, | 
|  | 1141 | crt->valid_from.year, crt->valid_from.mon, | 
|  | 1142 | crt->valid_from.day,  crt->valid_from.hour, | 
|  | 1143 | crt->valid_from.min,  crt->valid_from.sec ); | 
|  | 1144 | SAFE_SNPRINTF(); | 
|  | 1145 |  | 
|  | 1146 | ret = snprintf( p, n, "\n%sexpires on    : " \ | 
|  | 1147 | "%04d-%02d-%02d %02d:%02d:%02d", prefix, | 
|  | 1148 | crt->valid_to.year, crt->valid_to.mon, | 
|  | 1149 | crt->valid_to.day,  crt->valid_to.hour, | 
|  | 1150 | crt->valid_to.min,  crt->valid_to.sec ); | 
|  | 1151 | SAFE_SNPRINTF(); | 
|  | 1152 |  | 
|  | 1153 | ret = snprintf( p, n, "\n%ssigned using  : ", prefix ); | 
|  | 1154 | SAFE_SNPRINTF(); | 
|  | 1155 |  | 
| Manuel Pégourié-Gonnard | c909308 | 2014-02-12 09:39:59 +0100 | [diff] [blame] | 1156 | ret = oid_get_sig_alg_desc( &crt->sig_oid1, &desc ); | 
|  | 1157 | if( ret != 0 ) | 
|  | 1158 | ret = snprintf( p, n, "???"  ); | 
|  | 1159 | else | 
|  | 1160 | ret = snprintf( p, n, "%s", desc ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1161 | SAFE_SNPRINTF(); | 
|  | 1162 |  | 
|  | 1163 | if( ( ret = x509_key_size_helper( key_size_str, BEFORE_COLON, | 
|  | 1164 | pk_get_name( &crt->pk ) ) ) != 0 ) | 
|  | 1165 | { | 
|  | 1166 | return( ret ); | 
|  | 1167 | } | 
|  | 1168 |  | 
|  | 1169 | ret = snprintf( p, n, "\n%s%-" BC "s: %d bits\n", prefix, key_size_str, | 
|  | 1170 | (int) pk_get_size( &crt->pk ) ); | 
|  | 1171 | SAFE_SNPRINTF(); | 
|  | 1172 |  | 
|  | 1173 | return( (int) ( size - n ) ); | 
|  | 1174 | } | 
|  | 1175 |  | 
|  | 1176 | #if defined(POLARSSL_X509_CRL_PARSE_C) | 
|  | 1177 | /* | 
|  | 1178 | * Return 1 if the certificate is revoked, or 0 otherwise. | 
|  | 1179 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1180 | int x509_crt_revoked( const x509_crt *crt, const x509_crl *crl ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1181 | { | 
|  | 1182 | const x509_crl_entry *cur = &crl->entry; | 
|  | 1183 |  | 
|  | 1184 | while( cur != NULL && cur->serial.len != 0 ) | 
|  | 1185 | { | 
|  | 1186 | if( crt->serial.len == cur->serial.len && | 
|  | 1187 | memcmp( crt->serial.p, cur->serial.p, crt->serial.len ) == 0 ) | 
|  | 1188 | { | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1189 | if( x509_time_expired( &cur->revocation_date ) ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1190 | return( 1 ); | 
|  | 1191 | } | 
|  | 1192 |  | 
|  | 1193 | cur = cur->next; | 
|  | 1194 | } | 
|  | 1195 |  | 
|  | 1196 | return( 0 ); | 
|  | 1197 | } | 
|  | 1198 |  | 
|  | 1199 | /* | 
| Paul Bakker | 60b1d10 | 2013-10-29 10:02:51 +0100 | [diff] [blame] | 1200 | * Check that the given certificate is valid according to the CRL. | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1201 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1202 | static int x509_crt_verifycrl( x509_crt *crt, x509_crt *ca, | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1203 | x509_crl *crl_list) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1204 | { | 
|  | 1205 | int flags = 0; | 
|  | 1206 | unsigned char hash[POLARSSL_MD_MAX_SIZE]; | 
|  | 1207 | const md_info_t *md_info; | 
|  | 1208 |  | 
|  | 1209 | if( ca == NULL ) | 
|  | 1210 | return( flags ); | 
|  | 1211 |  | 
|  | 1212 | /* | 
|  | 1213 | * TODO: What happens if no CRL is present? | 
|  | 1214 | * Suggestion: Revocation state should be unknown if no CRL is present. | 
|  | 1215 | * For backwards compatibility this is not yet implemented. | 
|  | 1216 | */ | 
|  | 1217 |  | 
|  | 1218 | while( crl_list != NULL ) | 
|  | 1219 | { | 
|  | 1220 | if( crl_list->version == 0 || | 
|  | 1221 | crl_list->issuer_raw.len != ca->subject_raw.len || | 
|  | 1222 | memcmp( crl_list->issuer_raw.p, ca->subject_raw.p, | 
|  | 1223 | crl_list->issuer_raw.len ) != 0 ) | 
|  | 1224 | { | 
|  | 1225 | crl_list = crl_list->next; | 
|  | 1226 | continue; | 
|  | 1227 | } | 
|  | 1228 |  | 
|  | 1229 | /* | 
|  | 1230 | * Check if CRL is correctly signed by the trusted CA | 
|  | 1231 | */ | 
|  | 1232 | md_info = md_info_from_type( crl_list->sig_md ); | 
|  | 1233 | if( md_info == NULL ) | 
|  | 1234 | { | 
|  | 1235 | /* | 
|  | 1236 | * Cannot check 'unknown' hash | 
|  | 1237 | */ | 
|  | 1238 | flags |= BADCRL_NOT_TRUSTED; | 
|  | 1239 | break; | 
|  | 1240 | } | 
|  | 1241 |  | 
|  | 1242 | md( md_info, crl_list->tbs.p, crl_list->tbs.len, hash ); | 
|  | 1243 |  | 
|  | 1244 | if( pk_can_do( &ca->pk, crl_list->sig_pk ) == 0 || | 
|  | 1245 | pk_verify( &ca->pk, crl_list->sig_md, hash, md_info->size, | 
|  | 1246 | crl_list->sig.p, crl_list->sig.len ) != 0 ) | 
|  | 1247 | { | 
|  | 1248 | flags |= BADCRL_NOT_TRUSTED; | 
|  | 1249 | break; | 
|  | 1250 | } | 
|  | 1251 |  | 
|  | 1252 | /* | 
|  | 1253 | * Check for validity of CRL (Do not drop out) | 
|  | 1254 | */ | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1255 | if( x509_time_expired( &crl_list->next_update ) ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1256 | flags |= BADCRL_EXPIRED; | 
|  | 1257 |  | 
| Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 1258 | if( x509_time_future( &crl_list->this_update ) ) | 
|  | 1259 | flags |= BADCRL_FUTURE; | 
|  | 1260 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1261 | /* | 
|  | 1262 | * Check if certificate is revoked | 
|  | 1263 | */ | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1264 | if( x509_crt_revoked(crt, crl_list) ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1265 | { | 
|  | 1266 | flags |= BADCERT_REVOKED; | 
|  | 1267 | break; | 
|  | 1268 | } | 
|  | 1269 |  | 
|  | 1270 | crl_list = crl_list->next; | 
|  | 1271 | } | 
|  | 1272 | return flags; | 
|  | 1273 | } | 
|  | 1274 | #endif /* POLARSSL_X509_CRL_PARSE_C */ | 
|  | 1275 |  | 
|  | 1276 | // Equal == 0, inequal == 1 | 
|  | 1277 | static int x509_name_cmp( const void *s1, const void *s2, size_t len ) | 
|  | 1278 | { | 
|  | 1279 | size_t i; | 
|  | 1280 | unsigned char diff; | 
|  | 1281 | const unsigned char *n1 = s1, *n2 = s2; | 
|  | 1282 |  | 
|  | 1283 | for( i = 0; i < len; i++ ) | 
|  | 1284 | { | 
|  | 1285 | diff = n1[i] ^ n2[i]; | 
|  | 1286 |  | 
| Paul Bakker | f2b4d86 | 2013-11-20 17:23:53 +0100 | [diff] [blame] | 1287 | if( diff == 0 ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1288 | continue; | 
|  | 1289 |  | 
| Paul Bakker | f2b4d86 | 2013-11-20 17:23:53 +0100 | [diff] [blame] | 1290 | if( diff == 32 && | 
|  | 1291 | ( ( n1[i] >= 'a' && n1[i] <= 'z' ) || | 
|  | 1292 | ( n1[i] >= 'A' && n1[i] <= 'Z' ) ) ) | 
|  | 1293 | { | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1294 | continue; | 
| Paul Bakker | f2b4d86 | 2013-11-20 17:23:53 +0100 | [diff] [blame] | 1295 | } | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1296 |  | 
|  | 1297 | return( 1 ); | 
|  | 1298 | } | 
|  | 1299 |  | 
|  | 1300 | return( 0 ); | 
|  | 1301 | } | 
|  | 1302 |  | 
|  | 1303 | static int x509_wildcard_verify( const char *cn, x509_buf *name ) | 
|  | 1304 | { | 
|  | 1305 | size_t i; | 
|  | 1306 | size_t cn_idx = 0; | 
|  | 1307 |  | 
|  | 1308 | if( name->len < 3 || name->p[0] != '*' || name->p[1] != '.' ) | 
|  | 1309 | return( 0 ); | 
|  | 1310 |  | 
|  | 1311 | for( i = 0; i < strlen( cn ); ++i ) | 
|  | 1312 | { | 
|  | 1313 | if( cn[i] == '.' ) | 
|  | 1314 | { | 
|  | 1315 | cn_idx = i; | 
|  | 1316 | break; | 
|  | 1317 | } | 
|  | 1318 | } | 
|  | 1319 |  | 
|  | 1320 | if( cn_idx == 0 ) | 
|  | 1321 | return( 0 ); | 
|  | 1322 |  | 
|  | 1323 | if( strlen( cn ) - cn_idx == name->len - 1 && | 
|  | 1324 | x509_name_cmp( name->p + 1, cn + cn_idx, name->len - 1 ) == 0 ) | 
|  | 1325 | { | 
|  | 1326 | return( 1 ); | 
|  | 1327 | } | 
|  | 1328 |  | 
|  | 1329 | return( 0 ); | 
|  | 1330 | } | 
|  | 1331 |  | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1332 | static int x509_crt_verify_top( | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1333 | x509_crt *child, x509_crt *trust_ca, | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1334 | x509_crl *ca_crl, int path_cnt, int *flags, | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1335 | int (*f_vrfy)(void *, x509_crt *, int, int *), | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1336 | void *p_vrfy ) | 
|  | 1337 | { | 
|  | 1338 | int ret; | 
|  | 1339 | int ca_flags = 0, check_path_cnt = path_cnt + 1; | 
|  | 1340 | unsigned char hash[POLARSSL_MD_MAX_SIZE]; | 
|  | 1341 | const md_info_t *md_info; | 
|  | 1342 |  | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1343 | if( x509_time_expired( &child->valid_to ) ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1344 | *flags |= BADCERT_EXPIRED; | 
|  | 1345 |  | 
| Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 1346 | if( x509_time_future( &child->valid_from ) ) | 
|  | 1347 | *flags |= BADCERT_FUTURE; | 
|  | 1348 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1349 | /* | 
|  | 1350 | * Child is the top of the chain. Check against the trust_ca list. | 
|  | 1351 | */ | 
|  | 1352 | *flags |= BADCERT_NOT_TRUSTED; | 
|  | 1353 |  | 
|  | 1354 | md_info = md_info_from_type( child->sig_md ); | 
|  | 1355 | if( md_info == NULL ) | 
|  | 1356 | { | 
|  | 1357 | /* | 
|  | 1358 | * Cannot check 'unknown', no need to try any CA | 
|  | 1359 | */ | 
|  | 1360 | trust_ca = NULL; | 
|  | 1361 | } | 
|  | 1362 | else | 
|  | 1363 | md( md_info, child->tbs.p, child->tbs.len, hash ); | 
|  | 1364 |  | 
|  | 1365 | while( trust_ca != NULL ) | 
|  | 1366 | { | 
|  | 1367 | if( trust_ca->version == 0 || | 
|  | 1368 | child->issuer_raw.len != trust_ca->subject_raw.len || | 
|  | 1369 | memcmp( child->issuer_raw.p, trust_ca->subject_raw.p, | 
|  | 1370 | child->issuer_raw.len ) != 0 ) | 
|  | 1371 | { | 
|  | 1372 | trust_ca = trust_ca->next; | 
|  | 1373 | continue; | 
|  | 1374 | } | 
|  | 1375 |  | 
|  | 1376 | /* | 
|  | 1377 | * Reduce path_len to check against if top of the chain is | 
|  | 1378 | * the same as the trusted CA | 
|  | 1379 | */ | 
|  | 1380 | if( child->subject_raw.len == trust_ca->subject_raw.len && | 
|  | 1381 | memcmp( child->subject_raw.p, trust_ca->subject_raw.p, | 
|  | 1382 | child->issuer_raw.len ) == 0 ) | 
|  | 1383 | { | 
|  | 1384 | check_path_cnt--; | 
|  | 1385 | } | 
|  | 1386 |  | 
|  | 1387 | if( trust_ca->max_pathlen > 0 && | 
|  | 1388 | trust_ca->max_pathlen < check_path_cnt ) | 
|  | 1389 | { | 
|  | 1390 | trust_ca = trust_ca->next; | 
|  | 1391 | continue; | 
|  | 1392 | } | 
|  | 1393 |  | 
|  | 1394 | if( pk_can_do( &trust_ca->pk, child->sig_pk ) == 0 || | 
|  | 1395 | pk_verify( &trust_ca->pk, child->sig_md, hash, md_info->size, | 
|  | 1396 | child->sig.p, child->sig.len ) != 0 ) | 
|  | 1397 | { | 
|  | 1398 | trust_ca = trust_ca->next; | 
|  | 1399 | continue; | 
|  | 1400 | } | 
|  | 1401 |  | 
|  | 1402 | /* | 
|  | 1403 | * Top of chain is signed by a trusted CA | 
|  | 1404 | */ | 
|  | 1405 | *flags &= ~BADCERT_NOT_TRUSTED; | 
|  | 1406 | break; | 
|  | 1407 | } | 
|  | 1408 |  | 
|  | 1409 | /* | 
|  | 1410 | * If top of chain is not the same as the trusted CA send a verify request | 
|  | 1411 | * to the callback for any issues with validity and CRL presence for the | 
|  | 1412 | * trusted CA certificate. | 
|  | 1413 | */ | 
|  | 1414 | if( trust_ca != NULL && | 
|  | 1415 | ( child->subject_raw.len != trust_ca->subject_raw.len || | 
|  | 1416 | memcmp( child->subject_raw.p, trust_ca->subject_raw.p, | 
|  | 1417 | child->issuer_raw.len ) != 0 ) ) | 
|  | 1418 | { | 
|  | 1419 | #if defined(POLARSSL_X509_CRL_PARSE_C) | 
|  | 1420 | /* Check trusted CA's CRL for the chain's top crt */ | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1421 | *flags |= x509_crt_verifycrl( child, trust_ca, ca_crl ); | 
| Manuel Pégourié-Gonnard | cbf3ef3 | 2013-09-23 12:20:02 +0200 | [diff] [blame] | 1422 | #else | 
|  | 1423 | ((void) ca_crl); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1424 | #endif | 
|  | 1425 |  | 
| Paul Bakker | 86d0c19 | 2013-09-18 11:11:02 +0200 | [diff] [blame] | 1426 | if( x509_time_expired( &trust_ca->valid_to ) ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1427 | ca_flags |= BADCERT_EXPIRED; | 
|  | 1428 |  | 
| Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 1429 | if( x509_time_future( &trust_ca->valid_from ) ) | 
|  | 1430 | ca_flags |= BADCERT_FUTURE; | 
|  | 1431 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1432 | if( NULL != f_vrfy ) | 
|  | 1433 | { | 
|  | 1434 | if( ( ret = f_vrfy( p_vrfy, trust_ca, path_cnt + 1, &ca_flags ) ) != 0 ) | 
|  | 1435 | return( ret ); | 
|  | 1436 | } | 
|  | 1437 | } | 
|  | 1438 |  | 
|  | 1439 | /* Call callback on top cert */ | 
|  | 1440 | if( NULL != f_vrfy ) | 
|  | 1441 | { | 
|  | 1442 | if( ( ret = f_vrfy(p_vrfy, child, path_cnt, flags ) ) != 0 ) | 
|  | 1443 | return( ret ); | 
|  | 1444 | } | 
|  | 1445 |  | 
|  | 1446 | *flags |= ca_flags; | 
|  | 1447 |  | 
|  | 1448 | return( 0 ); | 
|  | 1449 | } | 
|  | 1450 |  | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1451 | static int x509_crt_verify_child( | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1452 | x509_crt *child, x509_crt *parent, x509_crt *trust_ca, | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1453 | x509_crl *ca_crl, int path_cnt, int *flags, | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1454 | int (*f_vrfy)(void *, x509_crt *, int, int *), | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1455 | void *p_vrfy ) | 
|  | 1456 | { | 
|  | 1457 | int ret; | 
|  | 1458 | int parent_flags = 0; | 
|  | 1459 | unsigned char hash[POLARSSL_MD_MAX_SIZE]; | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1460 | x509_crt *grandparent; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1461 | const md_info_t *md_info; | 
|  | 1462 |  | 
| Manuel Pégourié-Gonnard | 9533765 | 2014-03-10 13:15:18 +0100 | [diff] [blame] | 1463 | if( x509_time_future( &child->valid_from ) ) | 
|  | 1464 | *flags |= BADCERT_FUTURE; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1465 |  | 
|  | 1466 | md_info = md_info_from_type( child->sig_md ); | 
|  | 1467 | if( md_info == NULL ) | 
|  | 1468 | { | 
|  | 1469 | /* | 
|  | 1470 | * Cannot check 'unknown' hash | 
|  | 1471 | */ | 
|  | 1472 | *flags |= BADCERT_NOT_TRUSTED; | 
|  | 1473 | } | 
|  | 1474 | else | 
|  | 1475 | { | 
|  | 1476 | md( md_info, child->tbs.p, child->tbs.len, hash ); | 
|  | 1477 |  | 
|  | 1478 | if( pk_can_do( &parent->pk, child->sig_pk ) == 0 || | 
|  | 1479 | pk_verify( &parent->pk, child->sig_md, hash, md_info->size, | 
|  | 1480 | child->sig.p, child->sig.len ) != 0 ) | 
|  | 1481 | { | 
|  | 1482 | *flags |= BADCERT_NOT_TRUSTED; | 
|  | 1483 | } | 
|  | 1484 | } | 
|  | 1485 |  | 
|  | 1486 | #if defined(POLARSSL_X509_CRL_PARSE_C) | 
|  | 1487 | /* Check trusted CA's CRL for the given crt */ | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1488 | *flags |= x509_crt_verifycrl(child, parent, ca_crl); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1489 | #endif | 
|  | 1490 |  | 
|  | 1491 | grandparent = parent->next; | 
|  | 1492 |  | 
|  | 1493 | while( grandparent != NULL ) | 
|  | 1494 | { | 
|  | 1495 | if( grandparent->version == 0 || | 
|  | 1496 | grandparent->ca_istrue == 0 || | 
|  | 1497 | parent->issuer_raw.len != grandparent->subject_raw.len || | 
|  | 1498 | memcmp( parent->issuer_raw.p, grandparent->subject_raw.p, | 
|  | 1499 | parent->issuer_raw.len ) != 0 ) | 
|  | 1500 | { | 
|  | 1501 | grandparent = grandparent->next; | 
|  | 1502 | continue; | 
|  | 1503 | } | 
|  | 1504 | break; | 
|  | 1505 | } | 
|  | 1506 |  | 
|  | 1507 | if( grandparent != NULL ) | 
|  | 1508 | { | 
|  | 1509 | /* | 
|  | 1510 | * Part of the chain | 
|  | 1511 | */ | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1512 | ret = x509_crt_verify_child( parent, grandparent, trust_ca, ca_crl, path_cnt + 1, &parent_flags, f_vrfy, p_vrfy ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1513 | if( ret != 0 ) | 
|  | 1514 | return( ret ); | 
|  | 1515 | } | 
|  | 1516 | else | 
|  | 1517 | { | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1518 | ret = x509_crt_verify_top( parent, trust_ca, ca_crl, path_cnt + 1, &parent_flags, f_vrfy, p_vrfy ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1519 | if( ret != 0 ) | 
|  | 1520 | return( ret ); | 
|  | 1521 | } | 
|  | 1522 |  | 
|  | 1523 | /* child is verified to be a child of the parent, call verify callback */ | 
|  | 1524 | if( NULL != f_vrfy ) | 
|  | 1525 | if( ( ret = f_vrfy( p_vrfy, child, path_cnt, flags ) ) != 0 ) | 
|  | 1526 | return( ret ); | 
|  | 1527 |  | 
|  | 1528 | *flags |= parent_flags; | 
|  | 1529 |  | 
|  | 1530 | return( 0 ); | 
|  | 1531 | } | 
|  | 1532 |  | 
|  | 1533 | /* | 
|  | 1534 | * Verify the certificate validity | 
|  | 1535 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1536 | int x509_crt_verify( x509_crt *crt, | 
|  | 1537 | x509_crt *trust_ca, | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1538 | x509_crl *ca_crl, | 
|  | 1539 | const char *cn, int *flags, | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1540 | int (*f_vrfy)(void *, x509_crt *, int, int *), | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1541 | void *p_vrfy ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1542 | { | 
|  | 1543 | size_t cn_len; | 
|  | 1544 | int ret; | 
|  | 1545 | int pathlen = 0; | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1546 | x509_crt *parent; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1547 | x509_name *name; | 
|  | 1548 | x509_sequence *cur = NULL; | 
|  | 1549 |  | 
|  | 1550 | *flags = 0; | 
|  | 1551 |  | 
|  | 1552 | if( cn != NULL ) | 
|  | 1553 | { | 
|  | 1554 | name = &crt->subject; | 
|  | 1555 | cn_len = strlen( cn ); | 
|  | 1556 |  | 
|  | 1557 | if( crt->ext_types & EXT_SUBJECT_ALT_NAME ) | 
|  | 1558 | { | 
|  | 1559 | cur = &crt->subject_alt_names; | 
|  | 1560 |  | 
|  | 1561 | while( cur != NULL ) | 
|  | 1562 | { | 
|  | 1563 | if( cur->buf.len == cn_len && | 
|  | 1564 | x509_name_cmp( cn, cur->buf.p, cn_len ) == 0 ) | 
|  | 1565 | break; | 
|  | 1566 |  | 
|  | 1567 | if( cur->buf.len > 2 && | 
|  | 1568 | memcmp( cur->buf.p, "*.", 2 ) == 0 && | 
|  | 1569 | x509_wildcard_verify( cn, &cur->buf ) ) | 
|  | 1570 | break; | 
|  | 1571 |  | 
|  | 1572 | cur = cur->next; | 
|  | 1573 | } | 
|  | 1574 |  | 
|  | 1575 | if( cur == NULL ) | 
|  | 1576 | *flags |= BADCERT_CN_MISMATCH; | 
|  | 1577 | } | 
|  | 1578 | else | 
|  | 1579 | { | 
|  | 1580 | while( name != NULL ) | 
|  | 1581 | { | 
|  | 1582 | if( OID_CMP( OID_AT_CN, &name->oid ) ) | 
|  | 1583 | { | 
|  | 1584 | if( name->val.len == cn_len && | 
|  | 1585 | x509_name_cmp( name->val.p, cn, cn_len ) == 0 ) | 
|  | 1586 | break; | 
|  | 1587 |  | 
|  | 1588 | if( name->val.len > 2 && | 
|  | 1589 | memcmp( name->val.p, "*.", 2 ) == 0 && | 
|  | 1590 | x509_wildcard_verify( cn, &name->val ) ) | 
|  | 1591 | break; | 
|  | 1592 | } | 
|  | 1593 |  | 
|  | 1594 | name = name->next; | 
|  | 1595 | } | 
|  | 1596 |  | 
|  | 1597 | if( name == NULL ) | 
|  | 1598 | *flags |= BADCERT_CN_MISMATCH; | 
|  | 1599 | } | 
|  | 1600 | } | 
|  | 1601 |  | 
|  | 1602 | /* | 
|  | 1603 | * Iterate upwards in the given cert chain, to find our crt parent. | 
|  | 1604 | * Ignore any upper cert with CA != TRUE. | 
|  | 1605 | */ | 
|  | 1606 | parent = crt->next; | 
|  | 1607 |  | 
|  | 1608 | while( parent != NULL && parent->version != 0 ) | 
|  | 1609 | { | 
|  | 1610 | if( parent->ca_istrue == 0 || | 
|  | 1611 | crt->issuer_raw.len != parent->subject_raw.len || | 
|  | 1612 | memcmp( crt->issuer_raw.p, parent->subject_raw.p, | 
|  | 1613 | crt->issuer_raw.len ) != 0 ) | 
|  | 1614 | { | 
|  | 1615 | parent = parent->next; | 
|  | 1616 | continue; | 
|  | 1617 | } | 
|  | 1618 | break; | 
|  | 1619 | } | 
|  | 1620 |  | 
|  | 1621 | if( parent != NULL ) | 
|  | 1622 | { | 
|  | 1623 | /* | 
|  | 1624 | * Part of the chain | 
|  | 1625 | */ | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1626 | ret = x509_crt_verify_child( crt, parent, trust_ca, ca_crl, pathlen, flags, f_vrfy, p_vrfy ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1627 | if( ret != 0 ) | 
|  | 1628 | return( ret ); | 
|  | 1629 | } | 
|  | 1630 | else | 
|  | 1631 | { | 
| Paul Bakker | ddf26b4 | 2013-09-18 13:46:23 +0200 | [diff] [blame] | 1632 | ret = x509_crt_verify_top( crt, trust_ca, ca_crl, pathlen, flags, f_vrfy, p_vrfy ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1633 | if( ret != 0 ) | 
|  | 1634 | return( ret ); | 
|  | 1635 | } | 
|  | 1636 |  | 
|  | 1637 | if( *flags != 0 ) | 
|  | 1638 | return( POLARSSL_ERR_X509_CERT_VERIFY_FAILED ); | 
|  | 1639 |  | 
|  | 1640 | return( 0 ); | 
|  | 1641 | } | 
|  | 1642 |  | 
|  | 1643 | /* | 
| Paul Bakker | 369d2eb | 2013-09-18 11:58:25 +0200 | [diff] [blame] | 1644 | * Initialize a certificate chain | 
|  | 1645 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1646 | void x509_crt_init( x509_crt *crt ) | 
| Paul Bakker | 369d2eb | 2013-09-18 11:58:25 +0200 | [diff] [blame] | 1647 | { | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1648 | memset( crt, 0, sizeof(x509_crt) ); | 
| Paul Bakker | 369d2eb | 2013-09-18 11:58:25 +0200 | [diff] [blame] | 1649 | } | 
|  | 1650 |  | 
|  | 1651 | /* | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1652 | * Unallocate all certificate data | 
|  | 1653 | */ | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1654 | void x509_crt_free( x509_crt *crt ) | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1655 | { | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1656 | x509_crt *cert_cur = crt; | 
|  | 1657 | x509_crt *cert_prv; | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1658 | x509_name *name_cur; | 
|  | 1659 | x509_name *name_prv; | 
|  | 1660 | x509_sequence *seq_cur; | 
|  | 1661 | x509_sequence *seq_prv; | 
|  | 1662 |  | 
|  | 1663 | if( crt == NULL ) | 
|  | 1664 | return; | 
|  | 1665 |  | 
|  | 1666 | do | 
|  | 1667 | { | 
|  | 1668 | pk_free( &cert_cur->pk ); | 
|  | 1669 |  | 
|  | 1670 | name_cur = cert_cur->issuer.next; | 
|  | 1671 | while( name_cur != NULL ) | 
|  | 1672 | { | 
|  | 1673 | name_prv = name_cur; | 
|  | 1674 | name_cur = name_cur->next; | 
|  | 1675 | memset( name_prv, 0, sizeof( x509_name ) ); | 
|  | 1676 | polarssl_free( name_prv ); | 
|  | 1677 | } | 
|  | 1678 |  | 
|  | 1679 | name_cur = cert_cur->subject.next; | 
|  | 1680 | while( name_cur != NULL ) | 
|  | 1681 | { | 
|  | 1682 | name_prv = name_cur; | 
|  | 1683 | name_cur = name_cur->next; | 
|  | 1684 | memset( name_prv, 0, sizeof( x509_name ) ); | 
|  | 1685 | polarssl_free( name_prv ); | 
|  | 1686 | } | 
|  | 1687 |  | 
|  | 1688 | seq_cur = cert_cur->ext_key_usage.next; | 
|  | 1689 | while( seq_cur != NULL ) | 
|  | 1690 | { | 
|  | 1691 | seq_prv = seq_cur; | 
|  | 1692 | seq_cur = seq_cur->next; | 
|  | 1693 | memset( seq_prv, 0, sizeof( x509_sequence ) ); | 
|  | 1694 | polarssl_free( seq_prv ); | 
|  | 1695 | } | 
|  | 1696 |  | 
|  | 1697 | seq_cur = cert_cur->subject_alt_names.next; | 
|  | 1698 | while( seq_cur != NULL ) | 
|  | 1699 | { | 
|  | 1700 | seq_prv = seq_cur; | 
|  | 1701 | seq_cur = seq_cur->next; | 
|  | 1702 | memset( seq_prv, 0, sizeof( x509_sequence ) ); | 
|  | 1703 | polarssl_free( seq_prv ); | 
|  | 1704 | } | 
|  | 1705 |  | 
|  | 1706 | if( cert_cur->raw.p != NULL ) | 
|  | 1707 | { | 
|  | 1708 | memset( cert_cur->raw.p, 0, cert_cur->raw.len ); | 
|  | 1709 | polarssl_free( cert_cur->raw.p ); | 
|  | 1710 | } | 
|  | 1711 |  | 
|  | 1712 | cert_cur = cert_cur->next; | 
|  | 1713 | } | 
|  | 1714 | while( cert_cur != NULL ); | 
|  | 1715 |  | 
|  | 1716 | cert_cur = crt; | 
|  | 1717 | do | 
|  | 1718 | { | 
|  | 1719 | cert_prv = cert_cur; | 
|  | 1720 | cert_cur = cert_cur->next; | 
|  | 1721 |  | 
| Paul Bakker | c559c7a | 2013-09-18 14:13:26 +0200 | [diff] [blame] | 1722 | memset( cert_prv, 0, sizeof( x509_crt ) ); | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1723 | if( cert_prv != crt ) | 
|  | 1724 | polarssl_free( cert_prv ); | 
|  | 1725 | } | 
|  | 1726 | while( cert_cur != NULL ); | 
|  | 1727 | } | 
|  | 1728 |  | 
| Paul Bakker | 7c6b2c3 | 2013-09-16 13:49:26 +0200 | [diff] [blame] | 1729 | #endif |