OLD | NEW |
1 /* v3_ncons.c */ | 1 /* v3_ncons.c */ |
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 * project. | 3 * project. |
4 */ | 4 */ |
5 /* ==================================================================== | 5 /* ==================================================================== |
6 * Copyright (c) 2003 The OpenSSL Project. All rights reserved. | 6 * Copyright (c) 2003 The OpenSSL Project. All rights reserved. |
7 * | 7 * |
8 * Redistribution and use in source and binary forms, with or without | 8 * Redistribution and use in source and binary forms, with or without |
9 * modification, are permitted provided that the following conditions | 9 * modification, are permitted provided that the following conditions |
10 * are met: | 10 * are met: |
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
56 * | 56 * |
57 */ | 57 */ |
58 | 58 |
59 | 59 |
60 #include <stdio.h> | 60 #include <stdio.h> |
61 #include "cryptlib.h" | 61 #include "cryptlib.h" |
62 #include <openssl/asn1t.h> | 62 #include <openssl/asn1t.h> |
63 #include <openssl/conf.h> | 63 #include <openssl/conf.h> |
64 #include <openssl/x509v3.h> | 64 #include <openssl/x509v3.h> |
65 | 65 |
66 static void *v2i_NAME_CONSTRAINTS(X509V3_EXT_METHOD *method, | 66 static void *v2i_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, |
67 » » » » X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); | 67 » » » » X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); |
68 static int i2r_NAME_CONSTRAINTS(X509V3_EXT_METHOD *method, | 68 static int i2r_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, |
69 void *a, BIO *bp, int ind); | 69 void *a, BIO *bp, int ind); |
70 static int do_i2r_name_constraints(X509V3_EXT_METHOD *method, | 70 static int do_i2r_name_constraints(const X509V3_EXT_METHOD *method, |
71 » » » » STACK_OF(GENERAL_SUBTREE) *trees, | 71 » » » » STACK_OF(GENERAL_SUBTREE) *trees, |
72 » » » » » BIO *bp, int ind, char *name); | 72 » » » » BIO *bp, int ind, char *name); |
73 static int print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip); | 73 static int print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip); |
74 | 74 |
| 75 static int nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc); |
| 76 static int nc_match_single(GENERAL_NAME *sub, GENERAL_NAME *gen); |
| 77 static int nc_dn(X509_NAME *sub, X509_NAME *nm); |
| 78 static int nc_dns(ASN1_IA5STRING *sub, ASN1_IA5STRING *dns); |
| 79 static int nc_email(ASN1_IA5STRING *sub, ASN1_IA5STRING *eml); |
| 80 static int nc_uri(ASN1_IA5STRING *uri, ASN1_IA5STRING *base); |
| 81 |
75 const X509V3_EXT_METHOD v3_name_constraints = { | 82 const X509V3_EXT_METHOD v3_name_constraints = { |
76 NID_name_constraints, 0, | 83 NID_name_constraints, 0, |
77 ASN1_ITEM_ref(NAME_CONSTRAINTS), | 84 ASN1_ITEM_ref(NAME_CONSTRAINTS), |
78 0,0,0,0, | 85 0,0,0,0, |
79 0,0, | 86 0,0, |
80 0, v2i_NAME_CONSTRAINTS, | 87 0, v2i_NAME_CONSTRAINTS, |
81 i2r_NAME_CONSTRAINTS,0, | 88 i2r_NAME_CONSTRAINTS,0, |
82 NULL | 89 NULL |
83 }; | 90 }; |
84 | 91 |
85 ASN1_SEQUENCE(GENERAL_SUBTREE) = { | 92 ASN1_SEQUENCE(GENERAL_SUBTREE) = { |
86 ASN1_SIMPLE(GENERAL_SUBTREE, base, GENERAL_NAME), | 93 ASN1_SIMPLE(GENERAL_SUBTREE, base, GENERAL_NAME), |
87 ASN1_IMP_OPT(GENERAL_SUBTREE, minimum, ASN1_INTEGER, 0), | 94 ASN1_IMP_OPT(GENERAL_SUBTREE, minimum, ASN1_INTEGER, 0), |
88 ASN1_IMP_OPT(GENERAL_SUBTREE, maximum, ASN1_INTEGER, 1) | 95 ASN1_IMP_OPT(GENERAL_SUBTREE, maximum, ASN1_INTEGER, 1) |
89 } ASN1_SEQUENCE_END(GENERAL_SUBTREE) | 96 } ASN1_SEQUENCE_END(GENERAL_SUBTREE) |
90 | 97 |
91 ASN1_SEQUENCE(NAME_CONSTRAINTS) = { | 98 ASN1_SEQUENCE(NAME_CONSTRAINTS) = { |
92 ASN1_IMP_SEQUENCE_OF_OPT(NAME_CONSTRAINTS, permittedSubtrees, | 99 ASN1_IMP_SEQUENCE_OF_OPT(NAME_CONSTRAINTS, permittedSubtrees, |
93 GENERAL_SUBTREE, 0), | 100 GENERAL_SUBTREE, 0), |
94 ASN1_IMP_SEQUENCE_OF_OPT(NAME_CONSTRAINTS, excludedSubtrees, | 101 ASN1_IMP_SEQUENCE_OF_OPT(NAME_CONSTRAINTS, excludedSubtrees, |
95 GENERAL_SUBTREE, 1), | 102 GENERAL_SUBTREE, 1), |
96 } ASN1_SEQUENCE_END(NAME_CONSTRAINTS) | 103 } ASN1_SEQUENCE_END(NAME_CONSTRAINTS) |
97 | 104 |
98 | 105 |
99 IMPLEMENT_ASN1_ALLOC_FUNCTIONS(GENERAL_SUBTREE) | 106 IMPLEMENT_ASN1_ALLOC_FUNCTIONS(GENERAL_SUBTREE) |
100 IMPLEMENT_ASN1_ALLOC_FUNCTIONS(NAME_CONSTRAINTS) | 107 IMPLEMENT_ASN1_ALLOC_FUNCTIONS(NAME_CONSTRAINTS) |
101 | 108 |
102 static void *v2i_NAME_CONSTRAINTS(X509V3_EXT_METHOD *method, | 109 static void *v2i_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, |
103 » » » » X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval) | 110 » » » » X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval) |
104 { | 111 { |
105 int i; | 112 int i; |
106 CONF_VALUE tval, *val; | 113 CONF_VALUE tval, *val; |
107 STACK_OF(GENERAL_SUBTREE) **ptree = NULL; | 114 STACK_OF(GENERAL_SUBTREE) **ptree = NULL; |
108 NAME_CONSTRAINTS *ncons = NULL; | 115 NAME_CONSTRAINTS *ncons = NULL; |
109 GENERAL_SUBTREE *sub = NULL; | 116 GENERAL_SUBTREE *sub = NULL; |
110 ncons = NAME_CONSTRAINTS_new(); | 117 ncons = NAME_CONSTRAINTS_new(); |
111 if (!ncons) | 118 if (!ncons) |
112 goto memerr; | 119 goto memerr; |
113 for(i = 0; i < sk_CONF_VALUE_num(nval); i++) | 120 for(i = 0; i < sk_CONF_VALUE_num(nval); i++) |
(...skipping 34 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
148 NAME_CONSTRAINTS_free(ncons); | 155 NAME_CONSTRAINTS_free(ncons); |
149 if (sub) | 156 if (sub) |
150 GENERAL_SUBTREE_free(sub); | 157 GENERAL_SUBTREE_free(sub); |
151 | 158 |
152 return NULL; | 159 return NULL; |
153 } | 160 } |
154 | 161 |
155 | 162 |
156 | 163 |
157 | 164 |
158 static int i2r_NAME_CONSTRAINTS(X509V3_EXT_METHOD *method, | 165 static int i2r_NAME_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, |
159 » » » » void *a, BIO *bp, int ind) | 166 » » » » BIO *bp, int ind) |
160 { | 167 { |
161 NAME_CONSTRAINTS *ncons = a; | 168 NAME_CONSTRAINTS *ncons = a; |
162 do_i2r_name_constraints(method, ncons->permittedSubtrees, | 169 do_i2r_name_constraints(method, ncons->permittedSubtrees, |
163 bp, ind, "Permitted"); | 170 bp, ind, "Permitted"); |
164 do_i2r_name_constraints(method, ncons->excludedSubtrees, | 171 do_i2r_name_constraints(method, ncons->excludedSubtrees, |
165 bp, ind, "Excluded"); | 172 bp, ind, "Excluded"); |
166 return 1; | 173 return 1; |
167 } | 174 } |
168 | 175 |
169 static int do_i2r_name_constraints(X509V3_EXT_METHOD *method, | 176 static int do_i2r_name_constraints(const X509V3_EXT_METHOD *method, |
170 » » » » STACK_OF(GENERAL_SUBTREE) *trees, | 177 » » » » STACK_OF(GENERAL_SUBTREE) *trees, |
171 » » » » » BIO *bp, int ind, char *name) | 178 » » » » BIO *bp, int ind, char *name) |
172 { | 179 { |
173 GENERAL_SUBTREE *tree; | 180 GENERAL_SUBTREE *tree; |
174 int i; | 181 int i; |
175 if (sk_GENERAL_SUBTREE_num(trees) > 0) | 182 if (sk_GENERAL_SUBTREE_num(trees) > 0) |
176 BIO_printf(bp, "%*s%s:\n", ind, "", name); | 183 BIO_printf(bp, "%*s%s:\n", ind, "", name); |
177 for(i = 0; i < sk_GENERAL_SUBTREE_num(trees); i++) | 184 for(i = 0; i < sk_GENERAL_SUBTREE_num(trees); i++) |
178 { | 185 { |
179 tree = sk_GENERAL_SUBTREE_value(trees, i); | 186 tree = sk_GENERAL_SUBTREE_value(trees, i); |
180 BIO_printf(bp, "%*s", ind + 2, ""); | 187 BIO_printf(bp, "%*s", ind + 2, ""); |
181 if (tree->base->type == GEN_IPADD) | 188 if (tree->base->type == GEN_IPADD) |
182 print_nc_ipadd(bp, tree->base->d.ip); | 189 print_nc_ipadd(bp, tree->base->d.ip); |
183 else | 190 else |
184 GENERAL_NAME_print(bp, tree->base); | 191 GENERAL_NAME_print(bp, tree->base); |
185 tree = sk_GENERAL_SUBTREE_value(trees, i); | |
186 BIO_puts(bp, "\n"); | 192 BIO_puts(bp, "\n"); |
187 } | 193 } |
188 return 1; | 194 return 1; |
189 } | 195 } |
190 | 196 |
191 static int print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip) | 197 static int print_nc_ipadd(BIO *bp, ASN1_OCTET_STRING *ip) |
192 { | 198 { |
193 int i, len; | 199 int i, len; |
194 unsigned char *p; | 200 unsigned char *p; |
195 p = ip->data; | 201 p = ip->data; |
(...skipping 15 matching lines...) Expand all Loading... |
211 BIO_puts(bp, "/"); | 217 BIO_puts(bp, "/"); |
212 else if (i != 15) | 218 else if (i != 15) |
213 BIO_puts(bp, ":"); | 219 BIO_puts(bp, ":"); |
214 } | 220 } |
215 } | 221 } |
216 else | 222 else |
217 BIO_printf(bp, "IP Address:<invalid>"); | 223 BIO_printf(bp, "IP Address:<invalid>"); |
218 return 1; | 224 return 1; |
219 } | 225 } |
220 | 226 |
| 227 /* Check a certificate conforms to a specified set of constraints. |
| 228 * Return values: |
| 229 * X509_V_OK: All constraints obeyed. |
| 230 * X509_V_ERR_PERMITTED_VIOLATION: Permitted subtree violation. |
| 231 * X509_V_ERR_EXCLUDED_VIOLATION: Excluded subtree violation. |
| 232 * X509_V_ERR_SUBTREE_MINMAX: Min or max values present and matching type. |
| 233 * X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE: Unsupported constraint type. |
| 234 * X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX: bad unsupported constraint syntax. |
| 235 * X509_V_ERR_UNSUPPORTED_NAME_SYNTAX: bad or unsupported syntax of name |
| 236 |
| 237 */ |
| 238 |
| 239 int NAME_CONSTRAINTS_check(X509 *x, NAME_CONSTRAINTS *nc) |
| 240 { |
| 241 int r, i; |
| 242 X509_NAME *nm; |
| 243 |
| 244 nm = X509_get_subject_name(x); |
| 245 |
| 246 if (X509_NAME_entry_count(nm) > 0) |
| 247 { |
| 248 GENERAL_NAME gntmp; |
| 249 gntmp.type = GEN_DIRNAME; |
| 250 gntmp.d.directoryName = nm; |
| 251 |
| 252 r = nc_match(&gntmp, nc); |
| 253 |
| 254 if (r != X509_V_OK) |
| 255 return r; |
| 256 |
| 257 gntmp.type = GEN_EMAIL; |
| 258 |
| 259 |
| 260 /* Process any email address attributes in subject name */ |
| 261 |
| 262 for (i = -1;;) |
| 263 { |
| 264 X509_NAME_ENTRY *ne; |
| 265 i = X509_NAME_get_index_by_NID(nm, |
| 266 NID_pkcs9_emailAddress, |
| 267 i); |
| 268 if (i == -1) |
| 269 break; |
| 270 ne = X509_NAME_get_entry(nm, i); |
| 271 gntmp.d.rfc822Name = X509_NAME_ENTRY_get_data(ne); |
| 272 if (gntmp.d.rfc822Name->type != V_ASN1_IA5STRING) |
| 273 return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
| 274 |
| 275 r = nc_match(&gntmp, nc); |
| 276 |
| 277 if (r != X509_V_OK) |
| 278 return r; |
| 279 } |
| 280 |
| 281 } |
| 282 |
| 283 for (i = 0; i < sk_GENERAL_NAME_num(x->altname); i++) |
| 284 { |
| 285 GENERAL_NAME *gen = sk_GENERAL_NAME_value(x->altname, i); |
| 286 r = nc_match(gen, nc); |
| 287 if (r != X509_V_OK) |
| 288 return r; |
| 289 } |
| 290 |
| 291 return X509_V_OK; |
| 292 |
| 293 } |
| 294 |
| 295 static int nc_match(GENERAL_NAME *gen, NAME_CONSTRAINTS *nc) |
| 296 { |
| 297 GENERAL_SUBTREE *sub; |
| 298 int i, r, match = 0; |
| 299 |
| 300 /* Permitted subtrees: if any subtrees exist of matching the type |
| 301 * at least one subtree must match. |
| 302 */ |
| 303 |
| 304 for (i = 0; i < sk_GENERAL_SUBTREE_num(nc->permittedSubtrees); i++) |
| 305 { |
| 306 sub = sk_GENERAL_SUBTREE_value(nc->permittedSubtrees, i); |
| 307 if (gen->type != sub->base->type) |
| 308 continue; |
| 309 if (sub->minimum || sub->maximum) |
| 310 return X509_V_ERR_SUBTREE_MINMAX; |
| 311 /* If we already have a match don't bother trying any more */ |
| 312 if (match == 2) |
| 313 continue; |
| 314 if (match == 0) |
| 315 match = 1; |
| 316 r = nc_match_single(gen, sub->base); |
| 317 if (r == X509_V_OK) |
| 318 match = 2; |
| 319 else if (r != X509_V_ERR_PERMITTED_VIOLATION) |
| 320 return r; |
| 321 } |
| 322 |
| 323 if (match == 1) |
| 324 return X509_V_ERR_PERMITTED_VIOLATION; |
| 325 |
| 326 /* Excluded subtrees: must not match any of these */ |
| 327 |
| 328 for (i = 0; i < sk_GENERAL_SUBTREE_num(nc->excludedSubtrees); i++) |
| 329 { |
| 330 sub = sk_GENERAL_SUBTREE_value(nc->excludedSubtrees, i); |
| 331 if (gen->type != sub->base->type) |
| 332 continue; |
| 333 if (sub->minimum || sub->maximum) |
| 334 return X509_V_ERR_SUBTREE_MINMAX; |
| 335 |
| 336 r = nc_match_single(gen, sub->base); |
| 337 if (r == X509_V_OK) |
| 338 return X509_V_ERR_EXCLUDED_VIOLATION; |
| 339 else if (r != X509_V_ERR_PERMITTED_VIOLATION) |
| 340 return r; |
| 341 |
| 342 } |
| 343 |
| 344 return X509_V_OK; |
| 345 |
| 346 } |
| 347 |
| 348 static int nc_match_single(GENERAL_NAME *gen, GENERAL_NAME *base) |
| 349 { |
| 350 switch(base->type) |
| 351 { |
| 352 case GEN_DIRNAME: |
| 353 return nc_dn(gen->d.directoryName, base->d.directoryName); |
| 354 |
| 355 case GEN_DNS: |
| 356 return nc_dns(gen->d.dNSName, base->d.dNSName); |
| 357 |
| 358 case GEN_EMAIL: |
| 359 return nc_email(gen->d.rfc822Name, base->d.rfc822Name); |
| 360 |
| 361 case GEN_URI: |
| 362 return nc_uri(gen->d.uniformResourceIdentifier, |
| 363 base->d.uniformResourceIdentifier); |
| 364 |
| 365 default: |
| 366 return X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE; |
| 367 } |
| 368 |
| 369 } |
| 370 |
| 371 /* directoryName name constraint matching. |
| 372 * The canonical encoding of X509_NAME makes this comparison easy. It is |
| 373 * matched if the subtree is a subset of the name. |
| 374 */ |
| 375 |
| 376 static int nc_dn(X509_NAME *nm, X509_NAME *base) |
| 377 { |
| 378 /* Ensure canonical encodings are up to date. */ |
| 379 if (nm->modified && i2d_X509_NAME(nm, NULL) < 0) |
| 380 return X509_V_ERR_OUT_OF_MEM; |
| 381 if (base->modified && i2d_X509_NAME(base, NULL) < 0) |
| 382 return X509_V_ERR_OUT_OF_MEM; |
| 383 if (base->canon_enclen > nm->canon_enclen) |
| 384 return X509_V_ERR_PERMITTED_VIOLATION; |
| 385 if (memcmp(base->canon_enc, nm->canon_enc, base->canon_enclen)) |
| 386 return X509_V_ERR_PERMITTED_VIOLATION; |
| 387 return X509_V_OK; |
| 388 } |
| 389 |
| 390 static int nc_dns(ASN1_IA5STRING *dns, ASN1_IA5STRING *base) |
| 391 { |
| 392 char *baseptr = (char *)base->data; |
| 393 char *dnsptr = (char *)dns->data; |
| 394 /* Empty matches everything */ |
| 395 if (!*baseptr) |
| 396 return X509_V_OK; |
| 397 /* Otherwise can add zero or more components on the left so |
| 398 * compare RHS and if dns is longer and expect '.' as preceding |
| 399 * character. |
| 400 */ |
| 401 if (dns->length > base->length) |
| 402 { |
| 403 dnsptr += dns->length - base->length; |
| 404 if (dnsptr[-1] != '.') |
| 405 return X509_V_ERR_PERMITTED_VIOLATION; |
| 406 } |
| 407 |
| 408 if (strcasecmp(baseptr, dnsptr)) |
| 409 return X509_V_ERR_PERMITTED_VIOLATION; |
| 410 |
| 411 return X509_V_OK; |
| 412 |
| 413 } |
| 414 |
| 415 static int nc_email(ASN1_IA5STRING *eml, ASN1_IA5STRING *base) |
| 416 { |
| 417 const char *baseptr = (char *)base->data; |
| 418 const char *emlptr = (char *)eml->data; |
| 419 |
| 420 const char *baseat = strchr(baseptr, '@'); |
| 421 const char *emlat = strchr(emlptr, '@'); |
| 422 if (!emlat) |
| 423 return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
| 424 /* Special case: inital '.' is RHS match */ |
| 425 if (!baseat && (*baseptr == '.')) |
| 426 { |
| 427 if (eml->length > base->length) |
| 428 { |
| 429 emlptr += eml->length - base->length; |
| 430 if (!strcasecmp(baseptr, emlptr)) |
| 431 return X509_V_OK; |
| 432 } |
| 433 return X509_V_ERR_PERMITTED_VIOLATION; |
| 434 } |
| 435 |
| 436 /* If we have anything before '@' match local part */ |
| 437 |
| 438 if (baseat) |
| 439 { |
| 440 if (baseat != baseptr) |
| 441 { |
| 442 if ((baseat - baseptr) != (emlat - emlptr)) |
| 443 return X509_V_ERR_PERMITTED_VIOLATION; |
| 444 /* Case sensitive match of local part */ |
| 445 if (strncmp(baseptr, emlptr, emlat - emlptr)) |
| 446 return X509_V_ERR_PERMITTED_VIOLATION; |
| 447 } |
| 448 /* Position base after '@' */ |
| 449 baseptr = baseat + 1; |
| 450 } |
| 451 emlptr = emlat + 1; |
| 452 /* Just have hostname left to match: case insensitive */ |
| 453 if (strcasecmp(baseptr, emlptr)) |
| 454 return X509_V_ERR_PERMITTED_VIOLATION; |
| 455 |
| 456 return X509_V_OK; |
| 457 |
| 458 } |
| 459 |
| 460 static int nc_uri(ASN1_IA5STRING *uri, ASN1_IA5STRING *base) |
| 461 { |
| 462 const char *baseptr = (char *)base->data; |
| 463 const char *hostptr = (char *)uri->data; |
| 464 const char *p = strchr(hostptr, ':'); |
| 465 int hostlen; |
| 466 /* Check for foo:// and skip past it */ |
| 467 if (!p || (p[1] != '/') || (p[2] != '/')) |
| 468 return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
| 469 hostptr = p + 3; |
| 470 |
| 471 /* Determine length of hostname part of URI */ |
| 472 |
| 473 /* Look for a port indicator as end of hostname first */ |
| 474 |
| 475 p = strchr(hostptr, ':'); |
| 476 /* Otherwise look for trailing slash */ |
| 477 if (!p) |
| 478 p = strchr(hostptr, '/'); |
| 479 |
| 480 if (!p) |
| 481 hostlen = strlen(hostptr); |
| 482 else |
| 483 hostlen = p - hostptr; |
| 484 |
| 485 if (hostlen == 0) |
| 486 return X509_V_ERR_UNSUPPORTED_NAME_SYNTAX; |
| 487 |
| 488 /* Special case: inital '.' is RHS match */ |
| 489 if (*baseptr == '.') |
| 490 { |
| 491 if (hostlen > base->length) |
| 492 { |
| 493 p = hostptr + hostlen - base->length; |
| 494 if (!strncasecmp(p, baseptr, base->length)) |
| 495 return X509_V_OK; |
| 496 } |
| 497 return X509_V_ERR_PERMITTED_VIOLATION; |
| 498 } |
| 499 |
| 500 if ((base->length != (int)hostlen) || strncasecmp(hostptr, baseptr, host
len)) |
| 501 return X509_V_ERR_PERMITTED_VIOLATION; |
| 502 |
| 503 return X509_V_OK; |
| 504 |
| 505 } |
OLD | NEW |