| OLD | NEW |
| (Empty) |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 4 /* | |
| 5 * nss_pkix_proxy.h | |
| 6 * | |
| 7 * PKIX - NSS proxy functions | |
| 8 * | |
| 9 * NOTE: All structures, functions, data types are parts of library private | |
| 10 * api and are subjects to change in any following releases. | |
| 11 * | |
| 12 */ | |
| 13 #include "prerror.h" | |
| 14 #include "prprf.h" | |
| 15 | |
| 16 #include "nspr.h" | |
| 17 #include "pk11func.h" | |
| 18 #include "certdb.h" | |
| 19 #include "cert.h" | |
| 20 #include "secerr.h" | |
| 21 #include "nssb64.h" | |
| 22 #include "secasn1.h" | |
| 23 #include "secder.h" | |
| 24 #include "pkit.h" | |
| 25 | |
| 26 #include "pkix_pl_common.h" | |
| 27 | |
| 28 extern PRLogModuleInfo *pkixLog; | |
| 29 | |
| 30 #ifdef DEBUG_volkov | |
| 31 /* Temporary declarations of functioins. Will be removed with fix for | |
| 32 * 391183 */ | |
| 33 extern char * | |
| 34 pkix_Error2ASCII(PKIX_Error *error, void *plContext); | |
| 35 | |
| 36 extern void | |
| 37 cert_PrintCert(PKIX_PL_Cert *pkixCert, void *plContext); | |
| 38 | |
| 39 extern PKIX_Error * | |
| 40 cert_PrintCertChain(PKIX_List *pkixCertChain, void *plContext); | |
| 41 | |
| 42 #endif /* DEBUG */ | |
| 43 | |
| 44 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 45 | |
| 46 extern PKIX_UInt32 | |
| 47 pkix_pl_lifecycle_ObjectLeakCheck(int *); | |
| 48 | |
| 49 extern SECStatus | |
| 50 pkix_pl_lifecycle_ObjectTableUpdate(int *objCountTable); | |
| 51 | |
| 52 PRInt32 parallelFnInvocationCount; | |
| 53 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 54 | |
| 55 | |
| 56 static PRBool usePKIXValidationEngine = PR_FALSE; | |
| 57 | |
| 58 /* | |
| 59 * FUNCTION: CERT_SetUsePKIXForValidation | |
| 60 * DESCRIPTION: | |
| 61 * | |
| 62 * Enables or disables use of libpkix for certificate validation | |
| 63 * | |
| 64 * PARAMETERS: | |
| 65 * "enable" | |
| 66 * PR_TRUE: enables use of libpkix for cert validation. | |
| 67 * PR_FALSE: disables. | |
| 68 * THREAD SAFETY: | |
| 69 * NOT Thread Safe. | |
| 70 * RETURNS: | |
| 71 * Returns SECSuccess if successfully enabled | |
| 72 */ | |
| 73 SECStatus | |
| 74 CERT_SetUsePKIXForValidation(PRBool enable) | |
| 75 { | |
| 76 usePKIXValidationEngine = (enable > 0) ? PR_TRUE : PR_FALSE; | |
| 77 return SECSuccess; | |
| 78 } | |
| 79 | |
| 80 /* | |
| 81 * FUNCTION: CERT_GetUsePKIXForValidation | |
| 82 * DESCRIPTION: | |
| 83 * | |
| 84 * Checks if libpkix building function should be use for certificate | |
| 85 * chain building. | |
| 86 * | |
| 87 * PARAMETERS: | |
| 88 * NONE | |
| 89 * THREAD SAFETY: | |
| 90 * NOT Thread Safe | |
| 91 * RETURNS: | |
| 92 * Returns PR_TRUE if libpkix should be used. PR_FALSE otherwise. | |
| 93 */ | |
| 94 PRBool | |
| 95 CERT_GetUsePKIXForValidation() | |
| 96 { | |
| 97 return usePKIXValidationEngine; | |
| 98 } | |
| 99 | |
| 100 #ifdef NOTDEF | |
| 101 /* | |
| 102 * FUNCTION: cert_NssKeyUsagesToPkix | |
| 103 * DESCRIPTION: | |
| 104 * | |
| 105 * Converts nss key usage bit field(PRUint32) to pkix key usage | |
| 106 * bit field. | |
| 107 * | |
| 108 * PARAMETERS: | |
| 109 * "nssKeyUsage" | |
| 110 * Nss key usage bit field. | |
| 111 * "pkixKeyUsage" | |
| 112 * Pkix key usage big field. | |
| 113 * "plContext" | |
| 114 * Platform-specific context pointer. | |
| 115 * THREAD SAFETY: | |
| 116 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 117 * RETURNS: | |
| 118 * Returns NULL if the function succeeds. | |
| 119 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 120 */ | |
| 121 static PKIX_Error* | |
| 122 cert_NssKeyUsagesToPkix( | |
| 123 PRUint32 nssKeyUsage, | |
| 124 PKIX_UInt32 *pPkixKeyUsage, | |
| 125 void *plContext) | |
| 126 { | |
| 127 PKIX_UInt32 pkixKeyUsage = 0; | |
| 128 | |
| 129 PKIX_ENTER(CERTVFYPKIX, "cert_NssKeyUsagesToPkix"); | |
| 130 PKIX_NULLCHECK_ONE(pPkixKeyUsage); | |
| 131 | |
| 132 *pPkixKeyUsage = 0; | |
| 133 | |
| 134 if (nssKeyUsage & KU_DIGITAL_SIGNATURE) { | |
| 135 pkixKeyUsage |= PKIX_DIGITAL_SIGNATURE; | |
| 136 } | |
| 137 | |
| 138 if (nssKeyUsage & KU_NON_REPUDIATION) { | |
| 139 pkixKeyUsage |= PKIX_NON_REPUDIATION; | |
| 140 } | |
| 141 | |
| 142 if (nssKeyUsage & KU_KEY_ENCIPHERMENT) { | |
| 143 pkixKeyUsage |= PKIX_KEY_ENCIPHERMENT; | |
| 144 } | |
| 145 | |
| 146 if (nssKeyUsage & KU_DATA_ENCIPHERMENT) { | |
| 147 pkixKeyUsage |= PKIX_DATA_ENCIPHERMENT; | |
| 148 } | |
| 149 | |
| 150 if (nssKeyUsage & KU_KEY_AGREEMENT) { | |
| 151 pkixKeyUsage |= PKIX_KEY_AGREEMENT; | |
| 152 } | |
| 153 | |
| 154 if (nssKeyUsage & KU_KEY_CERT_SIGN) { | |
| 155 pkixKeyUsage |= PKIX_KEY_CERT_SIGN; | |
| 156 } | |
| 157 | |
| 158 if (nssKeyUsage & KU_CRL_SIGN) { | |
| 159 pkixKeyUsage |= PKIX_CRL_SIGN; | |
| 160 } | |
| 161 | |
| 162 if (nssKeyUsage & KU_ENCIPHER_ONLY) { | |
| 163 pkixKeyUsage |= PKIX_ENCIPHER_ONLY; | |
| 164 } | |
| 165 | |
| 166 /* Not supported. XXX we should support this once it is | |
| 167 * fixed in NSS */ | |
| 168 /* pkixKeyUsage |= PKIX_DECIPHER_ONLY; */ | |
| 169 | |
| 170 *pPkixKeyUsage = pkixKeyUsage; | |
| 171 | |
| 172 PKIX_RETURN(CERTVFYPKIX); | |
| 173 } | |
| 174 | |
| 175 extern SECOidTag ekuOidStrings[]; | |
| 176 | |
| 177 enum { | |
| 178 ekuIndexSSLServer = 0, | |
| 179 ekuIndexSSLClient, | |
| 180 ekuIndexCodeSigner, | |
| 181 ekuIndexEmail, | |
| 182 ekuIndexTimeStamp, | |
| 183 ekuIndexStatusResponder, | |
| 184 ekuIndexUnknown | |
| 185 } ekuIndex; | |
| 186 | |
| 187 typedef struct { | |
| 188 SECCertUsage certUsage; | |
| 189 PRUint32 ekuStringIndex; | |
| 190 } SECCertUsageToEku; | |
| 191 | |
| 192 const SECCertUsageToEku certUsageEkuStringMap[] = { | |
| 193 {certUsageSSLClient, ekuIndexSSLClient}, | |
| 194 {certUsageSSLServer, ekuIndexSSLServer}, | |
| 195 {certUsageSSLCA, ekuIndexSSLServer}, | |
| 196 {certUsageEmailSigner, ekuIndexEmail}, | |
| 197 {certUsageEmailRecipient, ekuIndexEmail}, | |
| 198 {certUsageObjectSigner, ekuIndexCodeSigner}, | |
| 199 {certUsageUserCertImport, ekuIndexUnknown}, | |
| 200 {certUsageVerifyCA, ekuIndexUnknown}, | |
| 201 {certUsageProtectedObjectSigner, ekuIndexUnknown}, | |
| 202 {certUsageStatusResponder, ekuIndexStatusResponder}, | |
| 203 {certUsageAnyCA, ekuIndexUnknown}, | |
| 204 }; | |
| 205 | |
| 206 /* | |
| 207 * FUNCTION: cert_NssCertificateUsageToPkixKUAndEKU | |
| 208 * DESCRIPTION: | |
| 209 * | |
| 210 * Converts nss CERTCertificateUsage bit field to pkix key and | |
| 211 * extended key usages. | |
| 212 * | |
| 213 * PARAMETERS: | |
| 214 * "cert" | |
| 215 * Pointer to CERTCertificate structure of validating cert. | |
| 216 * "requiredCertUsages" | |
| 217 * Required usage that will be converted to pkix eku and ku. | |
| 218 * "requiredKeyUsage", | |
| 219 * Additional key usages impose to cert. | |
| 220 * "isCA", | |
| 221 * it true, convert usages for cert that is a CA cert. | |
| 222 * "ppkixEKUList" | |
| 223 * Returned address of a list of pkix extended key usages. | |
| 224 * "ppkixKU" | |
| 225 * Returned address of pkix required key usages bit field. | |
| 226 * "plContext" | |
| 227 * Platform-specific context pointer. | |
| 228 * THREAD SAFETY: | |
| 229 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 230 * RETURNS: | |
| 231 * Returns NULL if the function succeeds. | |
| 232 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 233 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 234 */ | |
| 235 static PKIX_Error* | |
| 236 cert_NssCertificateUsageToPkixKUAndEKU( | |
| 237 CERTCertificate *cert, | |
| 238 SECCertUsage requiredCertUsage, | |
| 239 PRUint32 requiredKeyUsages, | |
| 240 PRBool isCA, | |
| 241 PKIX_List **ppkixEKUList, | |
| 242 PKIX_UInt32 *ppkixKU, | |
| 243 void *plContext) | |
| 244 { | |
| 245 PKIX_List *ekuOidsList = NULL; | |
| 246 PKIX_PL_OID *ekuOid = NULL; | |
| 247 int i = 0; | |
| 248 int ekuIndex = ekuIndexUnknown; | |
| 249 | |
| 250 PKIX_ENTER(CERTVFYPKIX, "cert_NssCertificateUsageToPkixEku"); | |
| 251 PKIX_NULLCHECK_TWO(ppkixEKUList, ppkixKU); | |
| 252 | |
| 253 PKIX_CHECK( | |
| 254 PKIX_List_Create(&ekuOidsList, plContext), | |
| 255 PKIX_LISTCREATEFAILED); | |
| 256 | |
| 257 for (;i < PR_ARRAY_SIZE(certUsageEkuStringMap);i++) { | |
| 258 const SECCertUsageToEku *usageToEkuElem = | |
| 259 &certUsageEkuStringMap[i]; | |
| 260 if (usageToEkuElem->certUsage == requiredCertUsage) { | |
| 261 ekuIndex = usageToEkuElem->ekuStringIndex; | |
| 262 break; | |
| 263 } | |
| 264 } | |
| 265 if (ekuIndex != ekuIndexUnknown) { | |
| 266 PRUint32 reqKeyUsage = 0; | |
| 267 PRUint32 reqCertType = 0; | |
| 268 | |
| 269 CERT_KeyUsageAndTypeForCertUsage(requiredCertUsage, isCA, | |
| 270 &reqKeyUsage, | |
| 271 &reqCertType); | |
| 272 | |
| 273 requiredKeyUsages |= reqKeyUsage; | |
| 274 | |
| 275 PKIX_CHECK( | |
| 276 PKIX_PL_OID_Create(ekuOidStrings[ekuIndex], &ekuOid, | |
| 277 plContext), | |
| 278 PKIX_OIDCREATEFAILED); | |
| 279 | |
| 280 PKIX_CHECK( | |
| 281 PKIX_List_AppendItem(ekuOidsList, (PKIX_PL_Object *)ekuOid, | |
| 282 plContext), | |
| 283 PKIX_LISTAPPENDITEMFAILED); | |
| 284 | |
| 285 PKIX_DECREF(ekuOid); | |
| 286 } | |
| 287 | |
| 288 PKIX_CHECK( | |
| 289 cert_NssKeyUsagesToPkix(requiredKeyUsages, ppkixKU, plContext), | |
| 290 PKIX_NSSCERTIFICATEUSAGETOPKIXKUANDEKUFAILED); | |
| 291 | |
| 292 *ppkixEKUList = ekuOidsList; | |
| 293 ekuOidsList = NULL; | |
| 294 | |
| 295 cleanup: | |
| 296 | |
| 297 PKIX_DECREF(ekuOid); | |
| 298 PKIX_DECREF(ekuOidsList); | |
| 299 | |
| 300 PKIX_RETURN(CERTVFYPKIX); | |
| 301 } | |
| 302 | |
| 303 #endif | |
| 304 | |
| 305 /* | |
| 306 * FUNCTION: cert_ProcessingParamsSetKeyAndCertUsage | |
| 307 * DESCRIPTION: | |
| 308 * | |
| 309 * Converts cert usage to pkix KU type and sets | |
| 310 * converted data into PKIX_ProcessingParams object. It also sets | |
| 311 * proper cert usage into nsscontext object. | |
| 312 * | |
| 313 * PARAMETERS: | |
| 314 * "procParams" | |
| 315 * Pointer to PKIX_ProcessingParams used during validation. | |
| 316 * "requiredCertUsage" | |
| 317 * Required certificate usages the certificate and chain is built and | |
| 318 * validated for. | |
| 319 * "requiredKeyUsage" | |
| 320 * Request additional key usages the certificate should be validated for. | |
| 321 * "plContext" | |
| 322 * Platform-specific context pointer. | |
| 323 * THREAD SAFETY: | |
| 324 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 325 * RETURNS: | |
| 326 * Returns NULL if the function succeeds. | |
| 327 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 328 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 329 */ | |
| 330 static PKIX_Error* | |
| 331 cert_ProcessingParamsSetKeyAndCertUsage( | |
| 332 PKIX_ProcessingParams *procParams, | |
| 333 SECCertUsage requiredCertUsage, | |
| 334 PRUint32 requiredKeyUsages, | |
| 335 void *plContext) | |
| 336 { | |
| 337 PKIX_CertSelector *certSelector = NULL; | |
| 338 PKIX_ComCertSelParams *certSelParams = NULL; | |
| 339 PKIX_PL_NssContext *nssContext = (PKIX_PL_NssContext*)plContext; | |
| 340 | |
| 341 PKIX_ENTER(CERTVFYPKIX, "cert_ProcessingParamsSetKeyAndCertUsage"); | |
| 342 PKIX_NULLCHECK_TWO(procParams, nssContext); | |
| 343 | |
| 344 PKIX_CHECK( | |
| 345 pkix_pl_NssContext_SetCertUsage( | |
| 346 ((SECCertificateUsage)1) << requiredCertUsage, nssContext), | |
| 347 PKIX_NSSCONTEXTSETCERTUSAGEFAILED); | |
| 348 | |
| 349 if (requiredKeyUsages) { | |
| 350 PKIX_CHECK( | |
| 351 PKIX_ProcessingParams_GetTargetCertConstraints(procParams, | |
| 352 &certSelector, plCont
ext), | |
| 353 PKIX_PROCESSINGPARAMSGETTARGETCERTCONSTRAINTSFAILED); | |
| 354 | |
| 355 PKIX_CHECK( | |
| 356 PKIX_CertSelector_GetCommonCertSelectorParams(certSelector, | |
| 357 &certSelParams, plCont
ext), | |
| 358 PKIX_CERTSELECTORGETCOMMONCERTSELECTORPARAMSFAILED); | |
| 359 | |
| 360 | |
| 361 PKIX_CHECK( | |
| 362 PKIX_ComCertSelParams_SetKeyUsage(certSelParams, requiredKeyUsages, | |
| 363 plContext), | |
| 364 PKIX_COMCERTSELPARAMSSETKEYUSAGEFAILED); | |
| 365 } | |
| 366 cleanup: | |
| 367 PKIX_DECREF(certSelector); | |
| 368 PKIX_DECREF(certSelParams); | |
| 369 | |
| 370 PKIX_RETURN(CERTVFYPKIX); | |
| 371 } | |
| 372 | |
| 373 /* | |
| 374 * Unused parameters: | |
| 375 * | |
| 376 * CERTCertList *initialChain, | |
| 377 * CERTCertStores certStores, | |
| 378 * CERTCertRevCheckers certRevCheckers, | |
| 379 * CERTCertChainCheckers certChainCheckers, | |
| 380 * SECItem *initPolicies, | |
| 381 * PRBool policyQualifierRejected, | |
| 382 * PRBool anyPolicyInhibited, | |
| 383 * PRBool reqExplicitPolicy, | |
| 384 * PRBool policyMappingInhibited, | |
| 385 * PKIX_CertSelector certConstraints, | |
| 386 */ | |
| 387 | |
| 388 /* | |
| 389 * FUNCTION: cert_CreatePkixProcessingParams | |
| 390 * DESCRIPTION: | |
| 391 * | |
| 392 * Creates and fills in PKIX_ProcessingParams structure to be used | |
| 393 * for certificate chain building. | |
| 394 * | |
| 395 * PARAMETERS: | |
| 396 * "cert" | |
| 397 * Pointer to the CERTCertificate: the leaf certificate of a chain. | |
| 398 * "time" | |
| 399 * Validity time. | |
| 400 * "wincx" | |
| 401 * Nss db password token. | |
| 402 * "useArena" | |
| 403 * Flags to use arena for data allocation during chain building process. | |
| 404 * "pprocParams" | |
| 405 * Address to return created processing parameters. | |
| 406 * "plContext" | |
| 407 * Platform-specific context pointer. | |
| 408 * THREAD SAFETY: | |
| 409 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 410 * RETURNS: | |
| 411 * Returns NULL if the function succeeds. | |
| 412 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 413 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 414 */ | |
| 415 static PKIX_Error* | |
| 416 cert_CreatePkixProcessingParams( | |
| 417 CERTCertificate *cert, | |
| 418 PRBool checkSig, /* not used yet. See bug 391476 */ | |
| 419 PRTime time, | |
| 420 void *wincx, | |
| 421 PRBool useArena, | |
| 422 PRBool disableOCSPRemoteFetching, | |
| 423 PKIX_ProcessingParams **pprocParams, | |
| 424 void **pplContext) | |
| 425 { | |
| 426 PKIX_List *anchors = NULL; | |
| 427 PKIX_PL_Cert *targetCert = NULL; | |
| 428 PKIX_PL_Date *date = NULL; | |
| 429 PKIX_ProcessingParams *procParams = NULL; | |
| 430 PKIX_CertSelector *certSelector = NULL; | |
| 431 PKIX_ComCertSelParams *certSelParams = NULL; | |
| 432 PKIX_CertStore *certStore = NULL; | |
| 433 PKIX_List *certStores = NULL; | |
| 434 PKIX_RevocationChecker *revChecker = NULL; | |
| 435 PKIX_UInt32 methodFlags = 0; | |
| 436 void *plContext = NULL; | |
| 437 CERTStatusConfig *statusConfig = NULL; | |
| 438 | |
| 439 PKIX_ENTER(CERTVFYPKIX, "cert_CreatePkixProcessingParams"); | |
| 440 PKIX_NULLCHECK_TWO(cert, pprocParams); | |
| 441 | |
| 442 PKIX_CHECK( | |
| 443 PKIX_PL_NssContext_Create(0, useArena, wincx, &plContext), | |
| 444 PKIX_NSSCONTEXTCREATEFAILED); | |
| 445 | |
| 446 *pplContext = plContext; | |
| 447 | |
| 448 #ifdef PKIX_NOTDEF | |
| 449 /* Functions should be implemented in patch for 390532 */ | |
| 450 PKIX_CHECK( | |
| 451 pkix_pl_NssContext_SetCertSignatureCheck(checkSig, | |
| 452 (PKIX_PL_NssContext*)plContext)
, | |
| 453 PKIX_NSSCONTEXTSETCERTSIGNCHECKFAILED); | |
| 454 | |
| 455 #endif /* PKIX_NOTDEF */ | |
| 456 | |
| 457 PKIX_CHECK( | |
| 458 PKIX_ProcessingParams_Create(&procParams, plContext), | |
| 459 PKIX_PROCESSINGPARAMSCREATEFAILED); | |
| 460 | |
| 461 PKIX_CHECK( | |
| 462 PKIX_ComCertSelParams_Create(&certSelParams, plContext), | |
| 463 PKIX_COMCERTSELPARAMSCREATEFAILED); | |
| 464 | |
| 465 PKIX_CHECK( | |
| 466 PKIX_PL_Cert_CreateFromCERTCertificate(cert, &targetCert, plContext), | |
| 467 PKIX_CERTCREATEWITHNSSCERTFAILED); | |
| 468 | |
| 469 PKIX_CHECK( | |
| 470 PKIX_ComCertSelParams_SetCertificate(certSelParams, | |
| 471 targetCert, plContext), | |
| 472 PKIX_COMCERTSELPARAMSSETCERTIFICATEFAILED); | |
| 473 | |
| 474 PKIX_CHECK( | |
| 475 PKIX_CertSelector_Create(NULL, NULL, &certSelector, plContext), | |
| 476 PKIX_COULDNOTCREATECERTSELECTOROBJECT); | |
| 477 | |
| 478 PKIX_CHECK( | |
| 479 PKIX_CertSelector_SetCommonCertSelectorParams(certSelector, | |
| 480 certSelParams, plContext), | |
| 481 PKIX_CERTSELECTORSETCOMMONCERTSELECTORPARAMSFAILED); | |
| 482 | |
| 483 PKIX_CHECK( | |
| 484 PKIX_ProcessingParams_SetTargetCertConstraints(procParams, | |
| 485 certSelector, plContext), | |
| 486 PKIX_PROCESSINGPARAMSSETTARGETCERTCONSTRAINTSFAILED); | |
| 487 | |
| 488 /* Turn off quialification of target cert since leaf cert is | |
| 489 * already check for date validity, key usages and extended | |
| 490 * key usages. */ | |
| 491 PKIX_CHECK( | |
| 492 PKIX_ProcessingParams_SetQualifyTargetCert(procParams, PKIX_FALSE, | |
| 493 plContext), | |
| 494 PKIX_PROCESSINGPARAMSSETQUALIFYTARGETCERTFLAGFAILED); | |
| 495 | |
| 496 PKIX_CHECK( | |
| 497 PKIX_PL_Pk11CertStore_Create(&certStore, plContext), | |
| 498 PKIX_PK11CERTSTORECREATEFAILED); | |
| 499 | |
| 500 PKIX_CHECK( | |
| 501 PKIX_List_Create(&certStores, plContext), | |
| 502 PKIX_UNABLETOCREATELIST); | |
| 503 | |
| 504 PKIX_CHECK( | |
| 505 PKIX_List_AppendItem(certStores, (PKIX_PL_Object *)certStore, | |
| 506 plContext), | |
| 507 PKIX_LISTAPPENDITEMFAILED); | |
| 508 | |
| 509 PKIX_CHECK( | |
| 510 PKIX_ProcessingParams_SetCertStores(procParams, certStores, | |
| 511 plContext), | |
| 512 PKIX_PROCESSINGPARAMSADDCERTSTOREFAILED); | |
| 513 | |
| 514 PKIX_CHECK( | |
| 515 PKIX_PL_Date_CreateFromPRTime(time, &date, plContext), | |
| 516 PKIX_DATECREATEFROMPRTIMEFAILED); | |
| 517 | |
| 518 PKIX_CHECK( | |
| 519 PKIX_ProcessingParams_SetDate(procParams, date, plContext), | |
| 520 PKIX_PROCESSINGPARAMSSETDATEFAILED); | |
| 521 | |
| 522 PKIX_CHECK( | |
| 523 PKIX_RevocationChecker_Create( | |
| 524 PKIX_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST | | |
| 525 PKIX_REV_MI_NO_OVERALL_INFO_REQUIREMENT, | |
| 526 PKIX_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST | | |
| 527 PKIX_REV_MI_NO_OVERALL_INFO_REQUIREMENT, | |
| 528 &revChecker, plContext), | |
| 529 PKIX_REVOCATIONCHECKERCREATEFAILED); | |
| 530 | |
| 531 PKIX_CHECK( | |
| 532 PKIX_ProcessingParams_SetRevocationChecker(procParams, revChecker, | |
| 533 plContext), | |
| 534 PKIX_PROCESSINGPARAMSSETREVOCATIONCHECKERFAILED); | |
| 535 | |
| 536 /* CRL method flags */ | |
| 537 methodFlags = | |
| 538 PKIX_REV_M_TEST_USING_THIS_METHOD | | |
| 539 PKIX_REV_M_FORBID_NETWORK_FETCHING | | |
| 540 PKIX_REV_M_SKIP_TEST_ON_MISSING_SOURCE | /* 0 */ | |
| 541 PKIX_REV_M_IGNORE_MISSING_FRESH_INFO | /* 0 */ | |
| 542 PKIX_REV_M_CONTINUE_TESTING_ON_FRESH_INFO; | |
| 543 | |
| 544 /* add CRL revocation method to check the leaf certificate */ | |
| 545 PKIX_CHECK( | |
| 546 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
| 547 PKIX_RevocationMethod_CRL, methodFlags, | |
| 548 0, NULL, PKIX_TRUE, plContext), | |
| 549 PKIX_REVOCATIONCHECKERADDMETHODFAILED); | |
| 550 | |
| 551 /* add CRL revocation method for other certs in the chain. */ | |
| 552 PKIX_CHECK( | |
| 553 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
| 554 PKIX_RevocationMethod_CRL, methodFlags, | |
| 555 0, NULL, PKIX_FALSE, plContext), | |
| 556 PKIX_REVOCATIONCHECKERADDMETHODFAILED); | |
| 557 | |
| 558 /* For compatibility with the old code, need to check that | |
| 559 * statusConfig is set in the db handle and status checker | |
| 560 * is defined befor allow ocsp status check on the leaf cert.*/ | |
| 561 statusConfig = CERT_GetStatusConfig(CERT_GetDefaultCertDB()); | |
| 562 if (statusConfig != NULL && statusConfig->statusChecker != NULL) { | |
| 563 | |
| 564 /* Enable OCSP revocation checking for the leaf cert. */ | |
| 565 /* OCSP method flags */ | |
| 566 methodFlags = | |
| 567 PKIX_REV_M_TEST_USING_THIS_METHOD | | |
| 568 PKIX_REV_M_ALLOW_NETWORK_FETCHING | /* 0 */ | |
| 569 PKIX_REV_M_ALLOW_IMPLICIT_DEFAULT_SOURCE | /* 0 */ | |
| 570 PKIX_REV_M_SKIP_TEST_ON_MISSING_SOURCE | /* 0 */ | |
| 571 PKIX_REV_M_IGNORE_MISSING_FRESH_INFO | /* 0 */ | |
| 572 PKIX_REV_M_CONTINUE_TESTING_ON_FRESH_INFO; | |
| 573 | |
| 574 /* Disabling ocsp fetching when checking the status | |
| 575 * of ocsp response signer. Here and in the next if, | |
| 576 * adjust flags for ocsp signer cert validation case. */ | |
| 577 if (disableOCSPRemoteFetching) { | |
| 578 methodFlags |= PKIX_REV_M_FORBID_NETWORK_FETCHING; | |
| 579 } | |
| 580 | |
| 581 if (ocsp_FetchingFailureIsVerificationFailure() | |
| 582 && !disableOCSPRemoteFetching) { | |
| 583 methodFlags |= | |
| 584 PKIX_REV_M_FAIL_ON_MISSING_FRESH_INFO; | |
| 585 } | |
| 586 | |
| 587 /* add OCSP revocation method to check only the leaf certificate.*/ | |
| 588 PKIX_CHECK( | |
| 589 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
| 590 PKIX_RevocationMethod_OCSP, methodFlags, | |
| 591 1, NULL, PKIX_TRUE, plContext), | |
| 592 PKIX_REVOCATIONCHECKERADDMETHODFAILED); | |
| 593 } | |
| 594 | |
| 595 PKIX_CHECK( | |
| 596 PKIX_ProcessingParams_SetAnyPolicyInhibited(procParams, PR_FALSE, | |
| 597 plContext), | |
| 598 PKIX_PROCESSINGPARAMSSETANYPOLICYINHIBITED); | |
| 599 | |
| 600 PKIX_CHECK( | |
| 601 PKIX_ProcessingParams_SetExplicitPolicyRequired(procParams, PR_FALSE, | |
| 602 plContext), | |
| 603 PKIX_PROCESSINGPARAMSSETEXPLICITPOLICYREQUIRED); | |
| 604 | |
| 605 PKIX_CHECK( | |
| 606 PKIX_ProcessingParams_SetPolicyMappingInhibited(procParams, PR_FALSE, | |
| 607 plContext), | |
| 608 PKIX_PROCESSINGPARAMSSETPOLICYMAPPINGINHIBITED); | |
| 609 | |
| 610 *pprocParams = procParams; | |
| 611 procParams = NULL; | |
| 612 | |
| 613 cleanup: | |
| 614 PKIX_DECREF(anchors); | |
| 615 PKIX_DECREF(targetCert); | |
| 616 PKIX_DECREF(date); | |
| 617 PKIX_DECREF(certSelector); | |
| 618 PKIX_DECREF(certSelParams); | |
| 619 PKIX_DECREF(certStore); | |
| 620 PKIX_DECREF(certStores); | |
| 621 PKIX_DECREF(procParams); | |
| 622 PKIX_DECREF(revChecker); | |
| 623 | |
| 624 PKIX_RETURN(CERTVFYPKIX); | |
| 625 } | |
| 626 | |
| 627 /* | |
| 628 * FUNCTION: cert_PkixToNssCertsChain | |
| 629 * DESCRIPTION: | |
| 630 * | |
| 631 * Converts pkix cert list into nss cert list. | |
| 632 * | |
| 633 * PARAMETERS: | |
| 634 * "pkixCertChain" | |
| 635 * Pkix certificate list. | |
| 636 * "pvalidChain" | |
| 637 * An address of returned nss certificate list. | |
| 638 * "plContext" | |
| 639 * Platform-specific context pointer. | |
| 640 * THREAD SAFETY: | |
| 641 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 642 * RETURNS: | |
| 643 * Returns NULL if the function succeeds. | |
| 644 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 645 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 646 */ | |
| 647 static PKIX_Error* | |
| 648 cert_PkixToNssCertsChain( | |
| 649 PKIX_List *pkixCertChain, | |
| 650 CERTCertList **pvalidChain, | |
| 651 void *plContext) | |
| 652 { | |
| 653 PRArenaPool *arena = NULL; | |
| 654 CERTCertificate *nssCert = NULL; | |
| 655 CERTCertList *validChain = NULL; | |
| 656 PKIX_PL_Object *certItem = NULL; | |
| 657 PKIX_UInt32 length = 0; | |
| 658 PKIX_UInt32 i = 0; | |
| 659 | |
| 660 PKIX_ENTER(CERTVFYPKIX, "cert_PkixToNssCertsChain"); | |
| 661 PKIX_NULLCHECK_ONE(pvalidChain); | |
| 662 | |
| 663 if (pkixCertChain == NULL) { | |
| 664 goto cleanup; | |
| 665 } | |
| 666 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
| 667 if (arena == NULL) { | |
| 668 PKIX_ERROR(PKIX_OUTOFMEMORY); | |
| 669 } | |
| 670 validChain = (CERTCertList*)PORT_ArenaZAlloc(arena, sizeof(CERTCertList)); | |
| 671 if (validChain == NULL) { | |
| 672 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
| 673 } | |
| 674 PR_INIT_CLIST(&validChain->list); | |
| 675 validChain->arena = arena; | |
| 676 arena = NULL; | |
| 677 | |
| 678 PKIX_CHECK( | |
| 679 PKIX_List_GetLength(pkixCertChain, &length, plContext), | |
| 680 PKIX_LISTGETLENGTHFAILED); | |
| 681 | |
| 682 for (i = 0; i < length; i++){ | |
| 683 CERTCertListNode *node = NULL; | |
| 684 | |
| 685 PKIX_CHECK( | |
| 686 PKIX_List_GetItem(pkixCertChain, i, &certItem, plContext), | |
| 687 PKIX_LISTGETITEMFAILED); | |
| 688 | |
| 689 PKIX_CHECK( | |
| 690 PKIX_PL_Cert_GetCERTCertificate((PKIX_PL_Cert*)certItem, &nssCert, | |
| 691 plContext), | |
| 692 PKIX_CERTGETCERTCERTIFICATEFAILED); | |
| 693 | |
| 694 node = | |
| 695 (CERTCertListNode *)PORT_ArenaZAlloc(validChain->arena, | |
| 696 sizeof(CERTCertListNode)); | |
| 697 if ( node == NULL ) { | |
| 698 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
| 699 } | |
| 700 | |
| 701 PR_INSERT_BEFORE(&node->links, &validChain->list); | |
| 702 | |
| 703 node->cert = nssCert; | |
| 704 nssCert = NULL; | |
| 705 | |
| 706 PKIX_DECREF(certItem); | |
| 707 } | |
| 708 | |
| 709 *pvalidChain = validChain; | |
| 710 | |
| 711 cleanup: | |
| 712 if (PKIX_ERROR_RECEIVED){ | |
| 713 if (validChain) { | |
| 714 CERT_DestroyCertList(validChain); | |
| 715 } else if (arena) { | |
| 716 PORT_FreeArena(arena, PR_FALSE); | |
| 717 } | |
| 718 if (nssCert) { | |
| 719 CERT_DestroyCertificate(nssCert); | |
| 720 } | |
| 721 } | |
| 722 PKIX_DECREF(certItem); | |
| 723 | |
| 724 PKIX_RETURN(CERTVFYPKIX); | |
| 725 } | |
| 726 | |
| 727 | |
| 728 /* | |
| 729 * FUNCTION: cert_BuildAndValidateChain | |
| 730 * DESCRIPTION: | |
| 731 * | |
| 732 * The function builds and validates a cert chain based on certificate | |
| 733 * selection criterias from procParams. This function call PKIX_BuildChain | |
| 734 * to accomplish chain building. If PKIX_BuildChain returns with incomplete | |
| 735 * IO, the function waits with PR_Poll until the blocking IO is finished and | |
| 736 * return control back to PKIX_BuildChain. | |
| 737 * | |
| 738 * PARAMETERS: | |
| 739 * "procParams" | |
| 740 * Processing parameters to be used during chain building. | |
| 741 * "pResult" | |
| 742 * Returned build result. | |
| 743 * "pVerifyNode" | |
| 744 * Returned pointed to verify node structure: the tree-like structure | |
| 745 * that reports points of chain building failures. | |
| 746 * "plContext" | |
| 747 * Platform-specific context pointer. | |
| 748 * THREAD SAFETY: | |
| 749 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 750 * RETURNS: | |
| 751 * Returns NULL if the function succeeds. | |
| 752 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 753 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 754 */ | |
| 755 static PKIX_Error* | |
| 756 cert_BuildAndValidateChain( | |
| 757 PKIX_ProcessingParams *procParams, | |
| 758 PKIX_BuildResult **pResult, | |
| 759 PKIX_VerifyNode **pVerifyNode, | |
| 760 void *plContext) | |
| 761 { | |
| 762 PKIX_BuildResult *result = NULL; | |
| 763 PKIX_VerifyNode *verifyNode = NULL; | |
| 764 void *nbioContext = NULL; | |
| 765 void *state = NULL; | |
| 766 | |
| 767 PKIX_ENTER(CERTVFYPKIX, "cert_BuildAndVerifyChain"); | |
| 768 PKIX_NULLCHECK_TWO(procParams, pResult); | |
| 769 | |
| 770 do { | |
| 771 if (nbioContext && state) { | |
| 772 /* PKIX-XXX: need to test functionality of NBIO handling in libPkix. | |
| 773 * See bug 391180 */ | |
| 774 PRInt32 filesReady = 0; | |
| 775 PRPollDesc *pollDesc = (PRPollDesc*)nbioContext; | |
| 776 filesReady = PR_Poll(pollDesc, 1, PR_INTERVAL_NO_TIMEOUT); | |
| 777 if (filesReady <= 0) { | |
| 778 PKIX_ERROR(PKIX_PRPOLLRETBADFILENUM); | |
| 779 } | |
| 780 } | |
| 781 | |
| 782 PKIX_CHECK( | |
| 783 PKIX_BuildChain(procParams, &nbioContext, &state, | |
| 784 &result, &verifyNode, plContext), | |
| 785 PKIX_UNABLETOBUILDCHAIN); | |
| 786 | |
| 787 } while (nbioContext && state); | |
| 788 | |
| 789 *pResult = result; | |
| 790 | |
| 791 cleanup: | |
| 792 if (pVerifyNode) { | |
| 793 *pVerifyNode = verifyNode; | |
| 794 } | |
| 795 | |
| 796 PKIX_RETURN(CERTVFYPKIX); | |
| 797 } | |
| 798 | |
| 799 | |
| 800 /* | |
| 801 * FUNCTION: cert_PkixErrorToNssCode | |
| 802 * DESCRIPTION: | |
| 803 * | |
| 804 * Converts pkix error(PKIX_Error) structure to PR error codes. | |
| 805 * | |
| 806 * PKIX-XXX to be implemented. See 391183. | |
| 807 * | |
| 808 * PARAMETERS: | |
| 809 * "error" | |
| 810 * Pkix error that will be converted. | |
| 811 * "nssCode" | |
| 812 * Corresponding nss error code. | |
| 813 * "plContext" | |
| 814 * Platform-specific context pointer. | |
| 815 * THREAD SAFETY: | |
| 816 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 817 * RETURNS: | |
| 818 * Returns NULL if the function succeeds. | |
| 819 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 820 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 821 */ | |
| 822 static PKIX_Error * | |
| 823 cert_PkixErrorToNssCode( | |
| 824 PKIX_Error *error, | |
| 825 SECErrorCodes *pNssErr, | |
| 826 void *plContext) | |
| 827 { | |
| 828 int errLevel = 0; | |
| 829 PKIX_Int32 nssErr = 0; | |
| 830 PKIX_Error *errPtr = error; | |
| 831 | |
| 832 PKIX_ENTER(CERTVFYPKIX, "cert_PkixErrorToNssCode"); | |
| 833 PKIX_NULLCHECK_TWO(error, pNssErr); | |
| 834 | |
| 835 /* Loop until we find at least one error with non-null | |
| 836 * plErr code, that is going to be nss error code. */ | |
| 837 while (errPtr) { | |
| 838 if (errPtr->plErr && !nssErr) { | |
| 839 nssErr = errPtr->plErr; | |
| 840 if (!pkixLog) break; | |
| 841 } | |
| 842 if (pkixLog) { | |
| 843 #ifdef PKIX_ERROR_DESCRIPTION | |
| 844 PR_LOG(pkixLog, 2, ("Error at level %d: %s\n", errLevel, | |
| 845 PKIX_ErrorText[errPtr->errCode])); | |
| 846 #else | |
| 847 PR_LOG(pkixLog, 2, ("Error at level %d: Error code %d\n", errLevel, | |
| 848 errPtr->errCode)); | |
| 849 #endif /* PKIX_ERROR_DESCRIPTION */ | |
| 850 } | |
| 851 errPtr = errPtr->cause; | |
| 852 errLevel += 1; | |
| 853 } | |
| 854 PORT_Assert(nssErr); | |
| 855 if (!nssErr) { | |
| 856 *pNssErr = SEC_ERROR_LIBPKIX_INTERNAL; | |
| 857 } else { | |
| 858 *pNssErr = nssErr; | |
| 859 } | |
| 860 | |
| 861 PKIX_RETURN(CERTVFYPKIX); | |
| 862 } | |
| 863 | |
| 864 /* | |
| 865 * FUNCTION: cert_GetLogFromVerifyNode | |
| 866 * DESCRIPTION: | |
| 867 * | |
| 868 * Recursive function that converts verify node tree-like set of structures | |
| 869 * to CERTVerifyLog. | |
| 870 * | |
| 871 * PARAMETERS: | |
| 872 * "log" | |
| 873 * Pointed to already allocated CERTVerifyLog structure. | |
| 874 * "node" | |
| 875 * A node of PKIX_VerifyNode tree. | |
| 876 * "plContext" | |
| 877 * Platform-specific context pointer. | |
| 878 * THREAD SAFETY: | |
| 879 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 880 * RETURNS: | |
| 881 * Returns NULL if the function succeeds. | |
| 882 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 883 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 884 */ | |
| 885 static PKIX_Error * | |
| 886 cert_GetLogFromVerifyNode( | |
| 887 CERTVerifyLog *log, | |
| 888 PKIX_VerifyNode *node, | |
| 889 void *plContext) | |
| 890 { | |
| 891 PKIX_List *children = NULL; | |
| 892 PKIX_VerifyNode *childNode = NULL; | |
| 893 | |
| 894 PKIX_ENTER(CERTVFYPKIX, "cert_GetLogFromVerifyNode"); | |
| 895 | |
| 896 children = node->children; | |
| 897 | |
| 898 if (children == NULL) { | |
| 899 PKIX_ERRORCODE errCode = PKIX_ANCHORDIDNOTCHAINTOCERT; | |
| 900 if (node->error && node->error->errCode != errCode) { | |
| 901 #ifdef DEBUG_volkov | |
| 902 char *string = pkix_Error2ASCII(node->error, plContext); | |
| 903 fprintf(stderr, "Branch search finished with error: \t%s\n", string)
; | |
| 904 PKIX_PL_Free(string, NULL); | |
| 905 #endif | |
| 906 if (log != NULL) { | |
| 907 SECErrorCodes nssErrorCode = 0; | |
| 908 CERTCertificate *cert = NULL; | |
| 909 | |
| 910 cert = node->verifyCert->nssCert; | |
| 911 | |
| 912 PKIX_CHECK( | |
| 913 cert_PkixErrorToNssCode(node->error, &nssErrorCode, | |
| 914 plContext), | |
| 915 PKIX_GETPKIXERRORCODEFAILED); | |
| 916 | |
| 917 cert_AddToVerifyLog(log, cert, nssErrorCode, node->depth, NULL); | |
| 918 } | |
| 919 } | |
| 920 PKIX_RETURN(CERTVFYPKIX); | |
| 921 } else { | |
| 922 PRUint32 i = 0; | |
| 923 PKIX_UInt32 length = 0; | |
| 924 | |
| 925 PKIX_CHECK( | |
| 926 PKIX_List_GetLength(children, &length, plContext), | |
| 927 PKIX_LISTGETLENGTHFAILED); | |
| 928 | |
| 929 for (i = 0; i < length; i++){ | |
| 930 | |
| 931 PKIX_CHECK( | |
| 932 PKIX_List_GetItem(children, i, (PKIX_PL_Object**)&childNode, | |
| 933 plContext), | |
| 934 PKIX_LISTGETITEMFAILED); | |
| 935 | |
| 936 PKIX_CHECK( | |
| 937 cert_GetLogFromVerifyNode(log, childNode, plContext), | |
| 938 PKIX_ERRORINRECURSIVEEQUALSCALL); | |
| 939 | |
| 940 PKIX_DECREF(childNode); | |
| 941 } | |
| 942 } | |
| 943 | |
| 944 cleanup: | |
| 945 PKIX_DECREF(childNode); | |
| 946 | |
| 947 PKIX_RETURN(CERTVFYPKIX); | |
| 948 } | |
| 949 | |
| 950 /* | |
| 951 * FUNCTION: cert_GetBuildResults | |
| 952 * DESCRIPTION: | |
| 953 * | |
| 954 * Converts pkix build results to nss results. This function is called | |
| 955 * regardless of build result. | |
| 956 * | |
| 957 * If it called after chain was successfully constructed, then it will | |
| 958 * convert: | |
| 959 * * pkix cert list that represent the chain to nss cert list | |
| 960 * * trusted root the chain was anchored to nss certificate. | |
| 961 * | |
| 962 * In case of failure it will convert: | |
| 963 * * pkix error to PR error code(will set it with PORT_SetError) | |
| 964 * * pkix validation log to nss CERTVerifyLog | |
| 965 * | |
| 966 * PARAMETERS: | |
| 967 * "buildResult" | |
| 968 * Build results returned by PKIX_BuildChain. | |
| 969 * "verifyNode" | |
| 970 * Tree-like structure of chain building/validation failures | |
| 971 * returned by PKIX_BuildChain. Ignored in case of success. | |
| 972 * "error" | |
| 973 * Final error returned by PKIX_BuildChain. Should be NULL in | |
| 974 * case of success. | |
| 975 * "log" | |
| 976 * Address of pre-allocated(if not NULL) CERTVerifyLog structure. | |
| 977 * "ptrustedRoot" | |
| 978 * Address of returned trusted root the chain was anchored to. | |
| 979 * "pvalidChain" | |
| 980 * Address of returned valid chain. | |
| 981 * "plContext" | |
| 982 * Platform-specific context pointer. | |
| 983 * THREAD SAFETY: | |
| 984 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 985 * RETURNS: | |
| 986 * Returns NULL if the function succeeds. | |
| 987 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
| 988 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
| 989 */ | |
| 990 static PKIX_Error* | |
| 991 cert_GetBuildResults( | |
| 992 PKIX_BuildResult *buildResult, | |
| 993 PKIX_VerifyNode *verifyNode, | |
| 994 PKIX_Error *error, | |
| 995 CERTVerifyLog *log, | |
| 996 CERTCertificate **ptrustedRoot, | |
| 997 CERTCertList **pvalidChain, | |
| 998 void *plContext) | |
| 999 { | |
| 1000 PKIX_ValidateResult *validResult = NULL; | |
| 1001 CERTCertList *validChain = NULL; | |
| 1002 CERTCertificate *trustedRoot = NULL; | |
| 1003 PKIX_TrustAnchor *trustAnchor = NULL; | |
| 1004 PKIX_PL_Cert *trustedCert = NULL; | |
| 1005 PKIX_List *pkixCertChain = NULL; | |
| 1006 #ifdef DEBUG_volkov | |
| 1007 PKIX_Error *tmpPkixError = NULL; | |
| 1008 #endif /* DEBUG */ | |
| 1009 | |
| 1010 PKIX_ENTER(CERTVFYPKIX, "cert_GetBuildResults"); | |
| 1011 if (buildResult == NULL && error == NULL) { | |
| 1012 PKIX_ERROR(PKIX_NULLARGUMENT); | |
| 1013 } | |
| 1014 | |
| 1015 if (error) { | |
| 1016 SECErrorCodes nssErrorCode = 0; | |
| 1017 #ifdef DEBUG_volkov | |
| 1018 char *temp = pkix_Error2ASCII(error, plContext); | |
| 1019 fprintf(stderr, "BUILD ERROR:\n%s\n", temp); | |
| 1020 PKIX_PL_Free(temp, NULL); | |
| 1021 #endif /* DEBUG */ | |
| 1022 if (verifyNode) { | |
| 1023 PKIX_Error *tmpError = | |
| 1024 cert_GetLogFromVerifyNode(log, verifyNode, plContext); | |
| 1025 if (tmpError) { | |
| 1026 PKIX_PL_Object_DecRef((PKIX_PL_Object *)tmpError, plContext); | |
| 1027 } | |
| 1028 } | |
| 1029 cert_PkixErrorToNssCode(error, &nssErrorCode, plContext); | |
| 1030 PORT_SetError(nssErrorCode); | |
| 1031 goto cleanup; | |
| 1032 } | |
| 1033 | |
| 1034 if (pvalidChain) { | |
| 1035 PKIX_CHECK( | |
| 1036 PKIX_BuildResult_GetCertChain(buildResult, &pkixCertChain, | |
| 1037 plContext), | |
| 1038 PKIX_BUILDRESULTGETCERTCHAINFAILED); | |
| 1039 | |
| 1040 #ifdef DEBUG_volkov | |
| 1041 tmpPkixError = cert_PrintCertChain(pkixCertChain, plContext); | |
| 1042 if (tmpPkixError) { | |
| 1043 PKIX_PL_Object_DecRef((PKIX_PL_Object*)tmpPkixError, plContext); | |
| 1044 } | |
| 1045 #endif | |
| 1046 | |
| 1047 PKIX_CHECK( | |
| 1048 cert_PkixToNssCertsChain(pkixCertChain, &validChain, plContext), | |
| 1049 PKIX_CERTCHAINTONSSCHAINFAILED); | |
| 1050 } | |
| 1051 | |
| 1052 if (ptrustedRoot) { | |
| 1053 PKIX_CHECK( | |
| 1054 PKIX_BuildResult_GetValidateResult(buildResult, &validResult, | |
| 1055 plContext), | |
| 1056 PKIX_BUILDRESULTGETVALIDATERESULTFAILED); | |
| 1057 | |
| 1058 PKIX_CHECK( | |
| 1059 PKIX_ValidateResult_GetTrustAnchor(validResult, &trustAnchor, | |
| 1060 plContext), | |
| 1061 PKIX_VALIDATERESULTGETTRUSTANCHORFAILED); | |
| 1062 | |
| 1063 PKIX_CHECK( | |
| 1064 PKIX_TrustAnchor_GetTrustedCert(trustAnchor, &trustedCert, | |
| 1065 plContext), | |
| 1066 PKIX_TRUSTANCHORGETTRUSTEDCERTFAILED); | |
| 1067 | |
| 1068 #ifdef DEBUG_volkov | |
| 1069 if (pvalidChain == NULL) { | |
| 1070 cert_PrintCert(trustedCert, plContext); | |
| 1071 } | |
| 1072 #endif | |
| 1073 | |
| 1074 PKIX_CHECK( | |
| 1075 PKIX_PL_Cert_GetCERTCertificate(trustedCert, &trustedRoot, | |
| 1076 plContext), | |
| 1077 PKIX_CERTGETCERTCERTIFICATEFAILED); | |
| 1078 } | |
| 1079 | |
| 1080 PORT_Assert(!PKIX_ERROR_RECEIVED); | |
| 1081 | |
| 1082 if (trustedRoot) { | |
| 1083 *ptrustedRoot = trustedRoot; | |
| 1084 } | |
| 1085 if (validChain) { | |
| 1086 *pvalidChain = validChain; | |
| 1087 } | |
| 1088 | |
| 1089 cleanup: | |
| 1090 if (PKIX_ERROR_RECEIVED) { | |
| 1091 if (trustedRoot) { | |
| 1092 CERT_DestroyCertificate(trustedRoot); | |
| 1093 } | |
| 1094 if (validChain) { | |
| 1095 CERT_DestroyCertList(validChain); | |
| 1096 } | |
| 1097 } | |
| 1098 PKIX_DECREF(trustAnchor); | |
| 1099 PKIX_DECREF(trustedCert); | |
| 1100 PKIX_DECREF(pkixCertChain); | |
| 1101 PKIX_DECREF(validResult); | |
| 1102 PKIX_DECREF(error); | |
| 1103 PKIX_DECREF(verifyNode); | |
| 1104 PKIX_DECREF(buildResult); | |
| 1105 | |
| 1106 PKIX_RETURN(CERTVFYPKIX); | |
| 1107 } | |
| 1108 | |
| 1109 /* | |
| 1110 * FUNCTION: cert_VerifyCertChainPkix | |
| 1111 * DESCRIPTION: | |
| 1112 * | |
| 1113 * The main wrapper function that is called from CERT_VerifyCert and | |
| 1114 * CERT_VerifyCACertForUsage functions to validate cert with libpkix. | |
| 1115 * | |
| 1116 * PARAMETERS: | |
| 1117 * "cert" | |
| 1118 * Leaf certificate of a chain we want to build. | |
| 1119 * "checkSig" | |
| 1120 * Certificate signatures will not be verified if this | |
| 1121 * flag is set to PR_FALSE. | |
| 1122 * "requiredUsage" | |
| 1123 * Required usage for certificate and chain. | |
| 1124 * "time" | |
| 1125 * Validity time. | |
| 1126 * "wincx" | |
| 1127 * Nss database password token. | |
| 1128 * "log" | |
| 1129 * Address of already allocated CERTVerifyLog structure. Not | |
| 1130 * used if NULL; | |
| 1131 * "pSigerror" | |
| 1132 * Address of PRBool. If not NULL, returns true is cert chain | |
| 1133 * was invalidated because of bad certificate signature. | |
| 1134 * "pRevoked" | |
| 1135 * Address of PRBool. If not NULL, returns true is cert chain | |
| 1136 * was invalidated because a revoked certificate was found in | |
| 1137 * the chain. | |
| 1138 * THREAD SAFETY: | |
| 1139 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
| 1140 * RETURNS: | |
| 1141 * SECFailure is chain building process has failed. SECSuccess otherwise. | |
| 1142 */ | |
| 1143 SECStatus | |
| 1144 cert_VerifyCertChainPkix( | |
| 1145 CERTCertificate *cert, | |
| 1146 PRBool checkSig, | |
| 1147 SECCertUsage requiredUsage, | |
| 1148 PRTime time, | |
| 1149 void *wincx, | |
| 1150 CERTVerifyLog *log, | |
| 1151 PRBool *pSigerror, | |
| 1152 PRBool *pRevoked) | |
| 1153 { | |
| 1154 PKIX_ProcessingParams *procParams = NULL; | |
| 1155 PKIX_BuildResult *result = NULL; | |
| 1156 PKIX_VerifyNode *verifyNode = NULL; | |
| 1157 PKIX_Error *error = NULL; | |
| 1158 | |
| 1159 SECStatus rv = SECFailure; | |
| 1160 void *plContext = NULL; | |
| 1161 #ifdef DEBUG_volkov | |
| 1162 CERTCertificate *trustedRoot = NULL; | |
| 1163 CERTCertList *validChain = NULL; | |
| 1164 #endif /* DEBUG */ | |
| 1165 | |
| 1166 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 1167 int leakedObjNum = 0; | |
| 1168 int memLeakLoopCount = 0; | |
| 1169 int objCountTable[PKIX_NUMTYPES]; | |
| 1170 int fnInvLocalCount = 0; | |
| 1171 PKIX_Boolean savedUsePkixEngFlag = usePKIXValidationEngine; | |
| 1172 | |
| 1173 if (usePKIXValidationEngine) { | |
| 1174 /* current memory leak testing implementation does not allow | |
| 1175 * to run simultaneous tests one the same or a different threads. | |
| 1176 * Setting the variable to false, to make additional chain | |
| 1177 * validations be handled by old nss. */ | |
| 1178 usePKIXValidationEngine = PR_FALSE; | |
| 1179 } | |
| 1180 testStartFnStackPosition = 2; | |
| 1181 fnStackNameArr[0] = "cert_VerifyCertChainPkix"; | |
| 1182 fnStackInvCountArr[0] = 0; | |
| 1183 PKIX_Boolean abortOnLeak = | |
| 1184 (PR_GetEnv("PKIX_OBJECT_LEAK_TEST_ABORT_ON_LEAK") == NULL) ? | |
| 1185 PKIX_FALSE : PKIX_TRUE; | |
| 1186 runningLeakTest = PKIX_TRUE; | |
| 1187 | |
| 1188 /* Prevent multi-threaded run of object leak test */ | |
| 1189 fnInvLocalCount = PR_ATOMIC_INCREMENT(¶llelFnInvocationCount); | |
| 1190 PORT_Assert(fnInvLocalCount == 1); | |
| 1191 | |
| 1192 do { | |
| 1193 rv = SECFailure; | |
| 1194 plContext = NULL; | |
| 1195 procParams = NULL; | |
| 1196 result = NULL; | |
| 1197 verifyNode = NULL; | |
| 1198 error = NULL; | |
| 1199 #ifdef DEBUG_volkov | |
| 1200 trustedRoot = NULL; | |
| 1201 validChain = NULL; | |
| 1202 #endif /* DEBUG */ | |
| 1203 errorGenerated = PKIX_FALSE; | |
| 1204 stackPosition = 0; | |
| 1205 | |
| 1206 if (leakedObjNum) { | |
| 1207 pkix_pl_lifecycle_ObjectTableUpdate(objCountTable); | |
| 1208 } | |
| 1209 memLeakLoopCount += 1; | |
| 1210 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 1211 | |
| 1212 error = | |
| 1213 cert_CreatePkixProcessingParams(cert, checkSig, time, wincx, | |
| 1214 PR_FALSE/*use arena*/, | |
| 1215 requiredUsage == certUsageStatusResponder, | |
| 1216 &procParams, &plContext); | |
| 1217 if (error) { | |
| 1218 goto cleanup; | |
| 1219 } | |
| 1220 | |
| 1221 error = | |
| 1222 cert_ProcessingParamsSetKeyAndCertUsage(procParams, requiredUsage, 0, | |
| 1223 plContext); | |
| 1224 if (error) { | |
| 1225 goto cleanup; | |
| 1226 } | |
| 1227 | |
| 1228 error = | |
| 1229 cert_BuildAndValidateChain(procParams, &result, &verifyNode, plContext); | |
| 1230 if (error) { | |
| 1231 goto cleanup; | |
| 1232 } | |
| 1233 | |
| 1234 if (pRevoked) { | |
| 1235 /* Currently always PR_FALSE. Will be fixed as a part of 394077 */ | |
| 1236 *pRevoked = PR_FALSE; | |
| 1237 } | |
| 1238 if (pSigerror) { | |
| 1239 /* Currently always PR_FALSE. Will be fixed as a part of 394077 */ | |
| 1240 *pSigerror = PR_FALSE; | |
| 1241 } | |
| 1242 rv = SECSuccess; | |
| 1243 | |
| 1244 cleanup: | |
| 1245 error = cert_GetBuildResults(result, verifyNode, error, log, | |
| 1246 #ifdef DEBUG_volkov | |
| 1247 &trustedRoot, &validChain, | |
| 1248 #else | |
| 1249 NULL, NULL, | |
| 1250 #endif /* DEBUG */ | |
| 1251 plContext); | |
| 1252 if (error) { | |
| 1253 #ifdef DEBUG_volkov | |
| 1254 char *temp = pkix_Error2ASCII(error, plContext); | |
| 1255 fprintf(stderr, "GET BUILD RES ERRORS:\n%s\n", temp); | |
| 1256 PKIX_PL_Free(temp, NULL); | |
| 1257 #endif /* DEBUG */ | |
| 1258 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
| 1259 } | |
| 1260 #ifdef DEBUG_volkov | |
| 1261 if (trustedRoot) { | |
| 1262 CERT_DestroyCertificate(trustedRoot); | |
| 1263 } | |
| 1264 if (validChain) { | |
| 1265 CERT_DestroyCertList(validChain); | |
| 1266 } | |
| 1267 #endif /* DEBUG */ | |
| 1268 if (procParams) { | |
| 1269 PKIX_PL_Object_DecRef((PKIX_PL_Object *)procParams, plContext); | |
| 1270 } | |
| 1271 if (plContext) { | |
| 1272 PKIX_PL_NssContext_Destroy(plContext); | |
| 1273 } | |
| 1274 | |
| 1275 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 1276 leakedObjNum = | |
| 1277 pkix_pl_lifecycle_ObjectLeakCheck(leakedObjNum ? objCountTable : NULL); | |
| 1278 | |
| 1279 if (pkixLog && leakedObjNum) { | |
| 1280 PR_LOG(pkixLog, 1, ("The generated error caused an object leaks. Loop %d
." | |
| 1281 "Stack %s\n", memLeakLoopCount, errorFnStackString))
; | |
| 1282 } | |
| 1283 PR_Free(errorFnStackString); | |
| 1284 errorFnStackString = NULL; | |
| 1285 if (abortOnLeak) { | |
| 1286 PORT_Assert(leakedObjNum == 0); | |
| 1287 } | |
| 1288 | |
| 1289 } while (errorGenerated); | |
| 1290 | |
| 1291 runningLeakTest = PKIX_FALSE; | |
| 1292 PR_ATOMIC_DECREMENT(¶llelFnInvocationCount); | |
| 1293 usePKIXValidationEngine = savedUsePkixEngFlag; | |
| 1294 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 1295 | |
| 1296 return rv; | |
| 1297 } | |
| 1298 | |
| 1299 PKIX_CertSelector * | |
| 1300 cert_GetTargetCertConstraints(CERTCertificate *target, void *plContext) | |
| 1301 { | |
| 1302 PKIX_ComCertSelParams *certSelParams = NULL; | |
| 1303 PKIX_CertSelector *certSelector = NULL; | |
| 1304 PKIX_CertSelector *r= NULL; | |
| 1305 PKIX_PL_Cert *eeCert = NULL; | |
| 1306 PKIX_Error *error = NULL; | |
| 1307 | |
| 1308 error = PKIX_PL_Cert_CreateFromCERTCertificate(target, &eeCert, plContext); | |
| 1309 if (error != NULL) goto cleanup; | |
| 1310 | |
| 1311 error = PKIX_CertSelector_Create(NULL, NULL, &certSelector, plContext); | |
| 1312 if (error != NULL) goto cleanup; | |
| 1313 | |
| 1314 error = PKIX_ComCertSelParams_Create(&certSelParams, plContext); | |
| 1315 if (error != NULL) goto cleanup; | |
| 1316 | |
| 1317 error = PKIX_ComCertSelParams_SetCertificate( | |
| 1318 certSelParams, eeCert, plContext); | |
| 1319 if (error != NULL) goto cleanup; | |
| 1320 | |
| 1321 error = PKIX_CertSelector_SetCommonCertSelectorParams | |
| 1322 (certSelector, certSelParams, plContext); | |
| 1323 if (error != NULL) goto cleanup; | |
| 1324 | |
| 1325 error = PKIX_PL_Object_IncRef((PKIX_PL_Object *)certSelector, plContext); | |
| 1326 if (error == NULL) r = certSelector; | |
| 1327 | |
| 1328 cleanup: | |
| 1329 if (certSelParams != NULL) | |
| 1330 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certSelParams, plContext); | |
| 1331 | |
| 1332 if (eeCert != NULL) | |
| 1333 PKIX_PL_Object_DecRef((PKIX_PL_Object *)eeCert, plContext); | |
| 1334 | |
| 1335 if (certSelector != NULL) | |
| 1336 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certSelector, plContext); | |
| 1337 | |
| 1338 if (error != NULL) { | |
| 1339 SECErrorCodes nssErr; | |
| 1340 | |
| 1341 cert_PkixErrorToNssCode(error, &nssErr, plContext); | |
| 1342 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
| 1343 PORT_SetError(nssErr); | |
| 1344 } | |
| 1345 | |
| 1346 return r; | |
| 1347 } | |
| 1348 | |
| 1349 static PKIX_List * | |
| 1350 cert_GetCertStores(void *plContext) | |
| 1351 { | |
| 1352 PKIX_CertStore *certStore = NULL; | |
| 1353 PKIX_List *certStores = NULL; | |
| 1354 PKIX_List *r = NULL; | |
| 1355 PKIX_Error *error = NULL; | |
| 1356 | |
| 1357 error = PKIX_PL_Pk11CertStore_Create(&certStore, plContext); | |
| 1358 if (error != NULL) goto cleanup; | |
| 1359 | |
| 1360 error = PKIX_List_Create(&certStores, plContext); | |
| 1361 if (error != NULL) goto cleanup; | |
| 1362 | |
| 1363 error = PKIX_List_AppendItem( certStores, | |
| 1364 (PKIX_PL_Object *)certStore, plContext); | |
| 1365 if (error != NULL) goto cleanup; | |
| 1366 | |
| 1367 error = PKIX_PL_Object_IncRef((PKIX_PL_Object *)certStores, plContext); | |
| 1368 if (error == NULL) r = certStores; | |
| 1369 | |
| 1370 cleanup: | |
| 1371 if (certStores != NULL) | |
| 1372 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certStores, plContext); | |
| 1373 | |
| 1374 if (certStore != NULL) | |
| 1375 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certStore, plContext); | |
| 1376 | |
| 1377 if (error != NULL) { | |
| 1378 SECErrorCodes nssErr; | |
| 1379 | |
| 1380 cert_PkixErrorToNssCode(error, &nssErr, plContext); | |
| 1381 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
| 1382 PORT_SetError(nssErr); | |
| 1383 } | |
| 1384 | |
| 1385 return r; | |
| 1386 } | |
| 1387 | |
| 1388 | |
| 1389 struct fake_PKIX_PL_CertStruct { | |
| 1390 CERTCertificate *nssCert; | |
| 1391 }; | |
| 1392 | |
| 1393 /* This needs to be part of the PKIX_PL_* */ | |
| 1394 /* This definitely needs to go away, and be replaced with | |
| 1395 a real accessor function in PKIX */ | |
| 1396 static CERTCertificate * | |
| 1397 cert_NSSCertFromPKIXCert(const PKIX_PL_Cert *pkix_cert) | |
| 1398 { | |
| 1399 struct fake_PKIX_PL_CertStruct *fcert = NULL; | |
| 1400 | |
| 1401 fcert = (struct fake_PKIX_PL_CertStruct*)pkix_cert; | |
| 1402 | |
| 1403 return CERT_DupCertificate(fcert->nssCert); | |
| 1404 } | |
| 1405 | |
| 1406 PKIX_List *cert_PKIXMakeOIDList(const SECOidTag *oids, int oidCount, void *plCon
text) | |
| 1407 { | |
| 1408 PKIX_List *r = NULL; | |
| 1409 PKIX_List *policyList = NULL; | |
| 1410 PKIX_PL_OID *policyOID = NULL; | |
| 1411 PKIX_Error *error = NULL; | |
| 1412 int i; | |
| 1413 | |
| 1414 error = PKIX_List_Create(&policyList, plContext); | |
| 1415 if (error != NULL) { | |
| 1416 goto cleanup; | |
| 1417 } | |
| 1418 | |
| 1419 for (i=0; i<oidCount; i++) { | |
| 1420 error = PKIX_PL_OID_Create(oids[i], &policyOID, plContext); | |
| 1421 if (error) { | |
| 1422 goto cleanup; | |
| 1423 } | |
| 1424 error = PKIX_List_AppendItem(policyList, | |
| 1425 (PKIX_PL_Object *)policyOID, plContext); | |
| 1426 if (error != NULL) { | |
| 1427 goto cleanup; | |
| 1428 } | |
| 1429 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyOID, plContext); | |
| 1430 policyOID = NULL; | |
| 1431 } | |
| 1432 | |
| 1433 error = PKIX_List_SetImmutable(policyList, plContext); | |
| 1434 if (error != NULL) goto cleanup; | |
| 1435 | |
| 1436 error = PKIX_PL_Object_IncRef((PKIX_PL_Object *)policyList, plContext); | |
| 1437 if (error == NULL) r = policyList; | |
| 1438 | |
| 1439 cleanup: | |
| 1440 if (policyOID != NULL) { | |
| 1441 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyOID, plContext); | |
| 1442 } | |
| 1443 if (policyList != NULL) { | |
| 1444 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyList, plContext); | |
| 1445 } | |
| 1446 if (error != NULL) { | |
| 1447 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
| 1448 } | |
| 1449 | |
| 1450 return r; | |
| 1451 } | |
| 1452 | |
| 1453 CERTValOutParam * | |
| 1454 cert_pkix_FindOutputParam(CERTValOutParam *params, const CERTValParamOutType t) | |
| 1455 { | |
| 1456 CERTValOutParam *i; | |
| 1457 if (params == NULL) { | |
| 1458 return NULL; | |
| 1459 } | |
| 1460 for (i = params; i->type != cert_po_end; i++) { | |
| 1461 if (i->type == t) { | |
| 1462 return i; | |
| 1463 } | |
| 1464 } | |
| 1465 return NULL; | |
| 1466 } | |
| 1467 | |
| 1468 | |
| 1469 static PKIX_Error* | |
| 1470 setRevocationMethod(PKIX_RevocationChecker *revChecker, | |
| 1471 PKIX_ProcessingParams *procParams, | |
| 1472 const CERTRevocationTests *revTest, | |
| 1473 CERTRevocationMethodIndex certRevMethod, | |
| 1474 PKIX_RevocationMethodType pkixRevMethod, | |
| 1475 PKIX_Boolean verifyResponderUsages, | |
| 1476 PKIX_Boolean isLeafTest, | |
| 1477 void *plContext) | |
| 1478 { | |
| 1479 PKIX_UInt32 methodFlags = 0; | |
| 1480 PKIX_Error *error = NULL; | |
| 1481 int priority = 0; | |
| 1482 | |
| 1483 if (revTest->number_of_defined_methods <= certRevMethod) { | |
| 1484 return NULL; | |
| 1485 } | |
| 1486 if (revTest->preferred_methods) { | |
| 1487 int i = 0; | |
| 1488 for (;i < revTest->number_of_preferred_methods;i++) { | |
| 1489 if (revTest->preferred_methods[i] == certRevMethod) | |
| 1490 break; | |
| 1491 } | |
| 1492 priority = i; | |
| 1493 } | |
| 1494 methodFlags = revTest->cert_rev_flags_per_method[certRevMethod]; | |
| 1495 if (verifyResponderUsages && | |
| 1496 pkixRevMethod == PKIX_RevocationMethod_OCSP) { | |
| 1497 methodFlags |= PKIX_REV_M_FORBID_NETWORK_FETCHING; | |
| 1498 } | |
| 1499 error = | |
| 1500 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
| 1501 pkixRevMethod, methodFlags, | |
| 1502 priority, NULL, | |
| 1503 isLeafTest, plContext); | |
| 1504 return error; | |
| 1505 } | |
| 1506 | |
| 1507 | |
| 1508 SECStatus | |
| 1509 cert_pkixSetParam(PKIX_ProcessingParams *procParams, | |
| 1510 const CERTValInParam *param, void *plContext) | |
| 1511 { | |
| 1512 PKIX_Error * error = NULL; | |
| 1513 SECStatus r=SECSuccess; | |
| 1514 PKIX_PL_Date *date = NULL; | |
| 1515 PKIX_List *policyOIDList = NULL; | |
| 1516 PKIX_List *certListPkix = NULL; | |
| 1517 const CERTRevocationFlags *flags; | |
| 1518 SECErrorCodes errCode = SEC_ERROR_INVALID_ARGS; | |
| 1519 const CERTCertList *certList = NULL; | |
| 1520 CERTCertListNode *node; | |
| 1521 PKIX_PL_Cert *certPkix = NULL; | |
| 1522 PKIX_TrustAnchor *trustAnchor = NULL; | |
| 1523 PKIX_PL_Date *revDate = NULL; | |
| 1524 PKIX_RevocationChecker *revChecker = NULL; | |
| 1525 PKIX_PL_NssContext *nssContext = (PKIX_PL_NssContext *)plContext; | |
| 1526 | |
| 1527 /* XXX we need a way to map generic PKIX error to generic NSS errors */ | |
| 1528 | |
| 1529 switch (param->type) { | |
| 1530 | |
| 1531 case cert_pi_policyOID: | |
| 1532 | |
| 1533 /* needed? */ | |
| 1534 error = PKIX_ProcessingParams_SetExplicitPolicyRequired( | |
| 1535 procParams, PKIX_TRUE, plContext); | |
| 1536 | |
| 1537 if (error != NULL) { | |
| 1538 break; | |
| 1539 } | |
| 1540 | |
| 1541 policyOIDList = cert_PKIXMakeOIDList(param->value.array.oids, | |
| 1542 param->value.arraySize,plContext); | |
| 1543 if (policyOIDList == NULL) { | |
| 1544 r = SECFailure; | |
| 1545 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 1546 break; | |
| 1547 } | |
| 1548 | |
| 1549 error = PKIX_ProcessingParams_SetInitialPolicies( | |
| 1550 procParams,policyOIDList,plContext); | |
| 1551 break; | |
| 1552 | |
| 1553 case cert_pi_date: | |
| 1554 if (param->value.scalar.time == 0) { | |
| 1555 error = PKIX_PL_Date_Create_UTCTime(NULL, &date, plContext); | |
| 1556 if (error != NULL) { | |
| 1557 errCode = SEC_ERROR_INVALID_TIME; | |
| 1558 break; | |
| 1559 } | |
| 1560 } else { | |
| 1561 error = pkix_pl_Date_CreateFromPRTime(param->value.scalar.time, | |
| 1562 &date, plContext); | |
| 1563 if (error != NULL) { | |
| 1564 errCode = SEC_ERROR_INVALID_TIME; | |
| 1565 break; | |
| 1566 } | |
| 1567 } | |
| 1568 | |
| 1569 error = PKIX_ProcessingParams_SetDate(procParams, date, plContext); | |
| 1570 if (error != NULL) { | |
| 1571 errCode = SEC_ERROR_INVALID_TIME; | |
| 1572 } | |
| 1573 break; | |
| 1574 | |
| 1575 case cert_pi_revocationFlags: | |
| 1576 { | |
| 1577 PKIX_UInt32 leafIMFlags = 0; | |
| 1578 PKIX_UInt32 chainIMFlags = 0; | |
| 1579 PKIX_Boolean validatingResponderCert = PKIX_FALSE; | |
| 1580 | |
| 1581 flags = param->value.pointer.revocation; | |
| 1582 if (!flags) { | |
| 1583 PORT_SetError(errCode); | |
| 1584 r = SECFailure; | |
| 1585 break; | |
| 1586 } | |
| 1587 | |
| 1588 leafIMFlags = | |
| 1589 flags->leafTests.cert_rev_method_independent_flags; | |
| 1590 chainIMFlags = | |
| 1591 flags->chainTests.cert_rev_method_independent_flags; | |
| 1592 | |
| 1593 error = | |
| 1594 PKIX_RevocationChecker_Create(leafIMFlags, chainIMFlags, | |
| 1595 &revChecker, plContext); | |
| 1596 if (error) { | |
| 1597 break; | |
| 1598 } | |
| 1599 | |
| 1600 error = | |
| 1601 PKIX_ProcessingParams_SetRevocationChecker(procParams, | |
| 1602 revChecker, plContext); | |
| 1603 if (error) { | |
| 1604 break; | |
| 1605 } | |
| 1606 | |
| 1607 if (((PKIX_PL_NssContext*)plContext)->certificateUsage & | |
| 1608 certificateUsageStatusResponder) { | |
| 1609 validatingResponderCert = PKIX_TRUE; | |
| 1610 } | |
| 1611 | |
| 1612 error = setRevocationMethod(revChecker, | |
| 1613 procParams, &flags->leafTests, | |
| 1614 cert_revocation_method_crl, | |
| 1615 PKIX_RevocationMethod_CRL, | |
| 1616 validatingResponderCert, | |
| 1617 PKIX_TRUE, plContext); | |
| 1618 if (error) { | |
| 1619 break; | |
| 1620 } | |
| 1621 | |
| 1622 error = setRevocationMethod(revChecker, | |
| 1623 procParams, &flags->leafTests, | |
| 1624 cert_revocation_method_ocsp, | |
| 1625 PKIX_RevocationMethod_OCSP, | |
| 1626 validatingResponderCert, | |
| 1627 PKIX_TRUE, plContext); | |
| 1628 if (error) { | |
| 1629 break; | |
| 1630 } | |
| 1631 | |
| 1632 error = setRevocationMethod(revChecker, | |
| 1633 procParams, &flags->chainTests, | |
| 1634 cert_revocation_method_crl, | |
| 1635 PKIX_RevocationMethod_CRL, | |
| 1636 validatingResponderCert, | |
| 1637 PKIX_FALSE, plContext); | |
| 1638 if (error) { | |
| 1639 break; | |
| 1640 } | |
| 1641 | |
| 1642 error = setRevocationMethod(revChecker, | |
| 1643 procParams, &flags->chainTests, | |
| 1644 cert_revocation_method_ocsp, | |
| 1645 PKIX_RevocationMethod_OCSP, | |
| 1646 validatingResponderCert, | |
| 1647 PKIX_FALSE, plContext); | |
| 1648 if (error) { | |
| 1649 break; | |
| 1650 } | |
| 1651 | |
| 1652 } | |
| 1653 break; | |
| 1654 | |
| 1655 case cert_pi_trustAnchors: | |
| 1656 certList = param->value.pointer.chain; | |
| 1657 if (!certList) { | |
| 1658 PORT_SetError(errCode); | |
| 1659 r = SECFailure; | |
| 1660 break; | |
| 1661 } | |
| 1662 error = PKIX_List_Create(&certListPkix, plContext); | |
| 1663 if (error != NULL) { | |
| 1664 break; | |
| 1665 } | |
| 1666 for(node = CERT_LIST_HEAD(certList); !CERT_LIST_END(node, certList); | |
| 1667 node = CERT_LIST_NEXT(node) ) { | |
| 1668 error = PKIX_PL_Cert_CreateFromCERTCertificate(node->cert, | |
| 1669 &certPkix, plContext); | |
| 1670 if (error) { | |
| 1671 break; | |
| 1672 } | |
| 1673 error = PKIX_TrustAnchor_CreateWithCert(certPkix, &trustAnchor, | |
| 1674 plContext); | |
| 1675 if (error) { | |
| 1676 break; | |
| 1677 } | |
| 1678 error = PKIX_List_AppendItem(certListPkix, | |
| 1679 (PKIX_PL_Object*)trustAnchor, plContext); | |
| 1680 if (error) { | |
| 1681 break; | |
| 1682 } | |
| 1683 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchor, plContext); | |
| 1684 trustAnchor = NULL; | |
| 1685 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certPkix, plContext); | |
| 1686 certPkix = NULL; | |
| 1687 } | |
| 1688 error = | |
| 1689 PKIX_ProcessingParams_SetTrustAnchors(procParams, certListPkix, | |
| 1690 plContext); | |
| 1691 break; | |
| 1692 | |
| 1693 case cert_pi_useAIACertFetch: | |
| 1694 error = | |
| 1695 PKIX_ProcessingParams_SetUseAIAForCertFetching(procParams, | |
| 1696 (PRBool)(param->value.scalar.b != 0), | |
| 1697 plContext); | |
| 1698 break; | |
| 1699 | |
| 1700 case cert_pi_chainVerifyCallback: | |
| 1701 { | |
| 1702 const CERTChainVerifyCallback *chainVerifyCallback = | |
| 1703 param->value.pointer.chainVerifyCallback; | |
| 1704 if (!chainVerifyCallback || !chainVerifyCallback->isChainValid) { | |
| 1705 PORT_SetError(errCode); | |
| 1706 r = SECFailure; | |
| 1707 break; | |
| 1708 } | |
| 1709 | |
| 1710 nssContext->chainVerifyCallback = *chainVerifyCallback; | |
| 1711 } | |
| 1712 break; | |
| 1713 | |
| 1714 case cert_pi_useOnlyTrustAnchors: | |
| 1715 error = | |
| 1716 PKIX_ProcessingParams_SetUseOnlyTrustAnchors(procParams, | |
| 1717 (PRBool)(param->value.scalar.b != 0), | |
| 1718 plContext); | |
| 1719 break; | |
| 1720 | |
| 1721 default: | |
| 1722 PORT_SetError(errCode); | |
| 1723 r = SECFailure; | |
| 1724 break; | |
| 1725 } | |
| 1726 | |
| 1727 if (policyOIDList != NULL) | |
| 1728 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyOIDList, plContext); | |
| 1729 | |
| 1730 if (date != NULL) | |
| 1731 PKIX_PL_Object_DecRef((PKIX_PL_Object *)date, plContext); | |
| 1732 | |
| 1733 if (revDate != NULL) | |
| 1734 PKIX_PL_Object_DecRef((PKIX_PL_Object *)revDate, plContext); | |
| 1735 | |
| 1736 if (revChecker != NULL) | |
| 1737 PKIX_PL_Object_DecRef((PKIX_PL_Object *)revChecker, plContext); | |
| 1738 | |
| 1739 if (certListPkix) | |
| 1740 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certListPkix, plContext); | |
| 1741 | |
| 1742 if (trustAnchor) | |
| 1743 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchor, plContext); | |
| 1744 | |
| 1745 if (certPkix) | |
| 1746 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certPkix, plContext); | |
| 1747 | |
| 1748 if (error != NULL) { | |
| 1749 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
| 1750 PORT_SetError(errCode); | |
| 1751 r = SECFailure; | |
| 1752 } | |
| 1753 | |
| 1754 return r; | |
| 1755 | |
| 1756 } | |
| 1757 | |
| 1758 void | |
| 1759 cert_pkixDestroyValOutParam(CERTValOutParam *params) | |
| 1760 { | |
| 1761 CERTValOutParam *i; | |
| 1762 | |
| 1763 if (params == NULL) { | |
| 1764 return; | |
| 1765 } | |
| 1766 for (i = params; i->type != cert_po_end; i++) { | |
| 1767 switch (i->type) { | |
| 1768 case cert_po_trustAnchor: | |
| 1769 if (i->value.pointer.cert) { | |
| 1770 CERT_DestroyCertificate(i->value.pointer.cert); | |
| 1771 i->value.pointer.cert = NULL; | |
| 1772 } | |
| 1773 break; | |
| 1774 | |
| 1775 case cert_po_certList: | |
| 1776 if (i->value.pointer.chain) { | |
| 1777 CERT_DestroyCertList(i->value.pointer.chain); | |
| 1778 i->value.pointer.chain = NULL; | |
| 1779 } | |
| 1780 break; | |
| 1781 | |
| 1782 default: | |
| 1783 break; | |
| 1784 } | |
| 1785 } | |
| 1786 } | |
| 1787 | |
| 1788 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_LeafFlags[2] = { | |
| 1789 /* crl */ | |
| 1790 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1791 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
| 1792 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
| 1793 /* ocsp */ | |
| 1794 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1795 }; | |
| 1796 | |
| 1797 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_ChainFlags[2] = { | |
| 1798 /* crl */ | |
| 1799 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1800 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
| 1801 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
| 1802 /* ocsp */ | |
| 1803 0 | |
| 1804 }; | |
| 1805 | |
| 1806 static CERTRevocationMethodIndex | |
| 1807 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_Method_Preference = { | |
| 1808 cert_revocation_method_crl | |
| 1809 }; | |
| 1810 | |
| 1811 static const CERTRevocationFlags certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy = { | |
| 1812 { | |
| 1813 /* leafTests */ | |
| 1814 2, | |
| 1815 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_LeafFlags, | |
| 1816 1, | |
| 1817 &certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_Method_Preference, | |
| 1818 0 | |
| 1819 }, | |
| 1820 { | |
| 1821 /* chainTests */ | |
| 1822 2, | |
| 1823 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_ChainFlags, | |
| 1824 0, | |
| 1825 0, | |
| 1826 0 | |
| 1827 } | |
| 1828 }; | |
| 1829 | |
| 1830 extern const CERTRevocationFlags* | |
| 1831 CERT_GetClassicOCSPEnabledSoftFailurePolicy() | |
| 1832 { | |
| 1833 return &certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy; | |
| 1834 } | |
| 1835 | |
| 1836 | |
| 1837 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_LeafFlags[2] = { | |
| 1838 /* crl */ | |
| 1839 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1840 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
| 1841 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
| 1842 /* ocsp */ | |
| 1843 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1844 | CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO | |
| 1845 }; | |
| 1846 | |
| 1847 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_ChainFlags[2] = { | |
| 1848 /* crl */ | |
| 1849 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1850 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
| 1851 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
| 1852 /* ocsp */ | |
| 1853 0 | |
| 1854 }; | |
| 1855 | |
| 1856 static CERTRevocationMethodIndex | |
| 1857 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_Method_Preference = { | |
| 1858 cert_revocation_method_crl | |
| 1859 }; | |
| 1860 | |
| 1861 static const CERTRevocationFlags certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy = { | |
| 1862 { | |
| 1863 /* leafTests */ | |
| 1864 2, | |
| 1865 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_LeafFlags, | |
| 1866 1, | |
| 1867 &certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_Method_Preference, | |
| 1868 0 | |
| 1869 }, | |
| 1870 { | |
| 1871 /* chainTests */ | |
| 1872 2, | |
| 1873 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_ChainFlags, | |
| 1874 0, | |
| 1875 0, | |
| 1876 0 | |
| 1877 } | |
| 1878 }; | |
| 1879 | |
| 1880 extern const CERTRevocationFlags* | |
| 1881 CERT_GetClassicOCSPEnabledHardFailurePolicy() | |
| 1882 { | |
| 1883 return &certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy; | |
| 1884 } | |
| 1885 | |
| 1886 | |
| 1887 static PRUint64 certRev_NSS_3_11_Ocsp_Disabled_Policy_LeafFlags[2] = { | |
| 1888 /* crl */ | |
| 1889 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1890 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
| 1891 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
| 1892 /* ocsp */ | |
| 1893 0 | |
| 1894 }; | |
| 1895 | |
| 1896 static PRUint64 certRev_NSS_3_11_Ocsp_Disabled_Policy_ChainFlags[2] = { | |
| 1897 /* crl */ | |
| 1898 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1899 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
| 1900 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
| 1901 /* ocsp */ | |
| 1902 0 | |
| 1903 }; | |
| 1904 | |
| 1905 static const CERTRevocationFlags certRev_NSS_3_11_Ocsp_Disabled_Policy = { | |
| 1906 { | |
| 1907 /* leafTests */ | |
| 1908 2, | |
| 1909 certRev_NSS_3_11_Ocsp_Disabled_Policy_LeafFlags, | |
| 1910 0, | |
| 1911 0, | |
| 1912 0 | |
| 1913 }, | |
| 1914 { | |
| 1915 /* chainTests */ | |
| 1916 2, | |
| 1917 certRev_NSS_3_11_Ocsp_Disabled_Policy_ChainFlags, | |
| 1918 0, | |
| 1919 0, | |
| 1920 0 | |
| 1921 } | |
| 1922 }; | |
| 1923 | |
| 1924 extern const CERTRevocationFlags* | |
| 1925 CERT_GetClassicOCSPDisabledPolicy() | |
| 1926 { | |
| 1927 return &certRev_NSS_3_11_Ocsp_Disabled_Policy; | |
| 1928 } | |
| 1929 | |
| 1930 | |
| 1931 static PRUint64 certRev_PKIX_Verify_Nist_Policy_LeafFlags[2] = { | |
| 1932 /* crl */ | |
| 1933 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1934 | CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO | |
| 1935 | CERT_REV_M_REQUIRE_INFO_ON_MISSING_SOURCE, | |
| 1936 /* ocsp */ | |
| 1937 0 | |
| 1938 }; | |
| 1939 | |
| 1940 static PRUint64 certRev_PKIX_Verify_Nist_Policy_ChainFlags[2] = { | |
| 1941 /* crl */ | |
| 1942 CERT_REV_M_TEST_USING_THIS_METHOD | |
| 1943 | CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO | |
| 1944 | CERT_REV_M_REQUIRE_INFO_ON_MISSING_SOURCE, | |
| 1945 /* ocsp */ | |
| 1946 0 | |
| 1947 }; | |
| 1948 | |
| 1949 static const CERTRevocationFlags certRev_PKIX_Verify_Nist_Policy = { | |
| 1950 { | |
| 1951 /* leafTests */ | |
| 1952 2, | |
| 1953 certRev_PKIX_Verify_Nist_Policy_LeafFlags, | |
| 1954 0, | |
| 1955 0, | |
| 1956 0 | |
| 1957 }, | |
| 1958 { | |
| 1959 /* chainTests */ | |
| 1960 2, | |
| 1961 certRev_PKIX_Verify_Nist_Policy_ChainFlags, | |
| 1962 0, | |
| 1963 0, | |
| 1964 0 | |
| 1965 } | |
| 1966 }; | |
| 1967 | |
| 1968 extern const CERTRevocationFlags* | |
| 1969 CERT_GetPKIXVerifyNistRevocationPolicy() | |
| 1970 { | |
| 1971 return &certRev_PKIX_Verify_Nist_Policy; | |
| 1972 } | |
| 1973 | |
| 1974 CERTRevocationFlags * | |
| 1975 CERT_AllocCERTRevocationFlags( | |
| 1976 PRUint32 number_leaf_methods, PRUint32 number_leaf_pref_methods, | |
| 1977 PRUint32 number_chain_methods, PRUint32 number_chain_pref_methods) | |
| 1978 { | |
| 1979 CERTRevocationFlags *flags; | |
| 1980 | |
| 1981 flags = PORT_New(CERTRevocationFlags); | |
| 1982 if (!flags) | |
| 1983 return(NULL); | |
| 1984 | |
| 1985 flags->leafTests.number_of_defined_methods = number_leaf_methods; | |
| 1986 flags->leafTests.cert_rev_flags_per_method = | |
| 1987 PORT_NewArray(PRUint64, number_leaf_methods); | |
| 1988 | |
| 1989 flags->leafTests.number_of_preferred_methods = number_leaf_pref_methods; | |
| 1990 flags->leafTests.preferred_methods = | |
| 1991 PORT_NewArray(CERTRevocationMethodIndex, number_leaf_pref_methods); | |
| 1992 | |
| 1993 flags->chainTests.number_of_defined_methods = number_chain_methods; | |
| 1994 flags->chainTests.cert_rev_flags_per_method = | |
| 1995 PORT_NewArray(PRUint64, number_chain_methods); | |
| 1996 | |
| 1997 flags->chainTests.number_of_preferred_methods = number_chain_pref_methods; | |
| 1998 flags->chainTests.preferred_methods = | |
| 1999 PORT_NewArray(CERTRevocationMethodIndex, number_chain_pref_methods); | |
| 2000 | |
| 2001 if (!flags->leafTests.cert_rev_flags_per_method | |
| 2002 || !flags->leafTests.preferred_methods | |
| 2003 || !flags->chainTests.cert_rev_flags_per_method | |
| 2004 || !flags->chainTests.preferred_methods) { | |
| 2005 CERT_DestroyCERTRevocationFlags(flags); | |
| 2006 return (NULL); | |
| 2007 } | |
| 2008 | |
| 2009 return flags; | |
| 2010 } | |
| 2011 | |
| 2012 void CERT_DestroyCERTRevocationFlags(CERTRevocationFlags *flags) | |
| 2013 { | |
| 2014 if (!flags) | |
| 2015 return; | |
| 2016 | |
| 2017 if (flags->leafTests.cert_rev_flags_per_method) | |
| 2018 PORT_Free(flags->leafTests.cert_rev_flags_per_method); | |
| 2019 | |
| 2020 if (flags->leafTests.preferred_methods) | |
| 2021 PORT_Free(flags->leafTests.preferred_methods); | |
| 2022 | |
| 2023 if (flags->chainTests.cert_rev_flags_per_method) | |
| 2024 PORT_Free(flags->chainTests.cert_rev_flags_per_method); | |
| 2025 | |
| 2026 if (flags->chainTests.preferred_methods) | |
| 2027 PORT_Free(flags->chainTests.preferred_methods); | |
| 2028 | |
| 2029 PORT_Free(flags); | |
| 2030 } | |
| 2031 | |
| 2032 /* | |
| 2033 * CERT_PKIXVerifyCert | |
| 2034 * | |
| 2035 * Verify a Certificate using the PKIX library. | |
| 2036 * | |
| 2037 * Parameters: | |
| 2038 * cert - the target certificate to verify. Must be non-null | |
| 2039 * params - an array of type/value parameters which can be | |
| 2040 * used to modify the behavior of the validation | |
| 2041 * algorithm, or supply additional constraints. | |
| 2042 * | |
| 2043 * outputTrustAnchor - the trust anchor which the certificate | |
| 2044 * chains to. The caller is responsible | |
| 2045 * for freeing this. | |
| 2046 * | |
| 2047 * Example Usage: | |
| 2048 * CERTValParam args[3]; | |
| 2049 * args[0].type = cvpt_policyOID; | |
| 2050 * args[0].value.si = oid; | |
| 2051 * args[1].type = revCheckRequired; | |
| 2052 * args[1].value.b = PR_TRUE; | |
| 2053 * args[2].type = cvpt_end; | |
| 2054 * | |
| 2055 * CERT_PKIXVerifyCert(cert, &output, args | |
| 2056 */ | |
| 2057 SECStatus CERT_PKIXVerifyCert( | |
| 2058 CERTCertificate *cert, | |
| 2059 SECCertificateUsage usages, | |
| 2060 CERTValInParam *paramsIn, | |
| 2061 CERTValOutParam *paramsOut, | |
| 2062 void *wincx) | |
| 2063 { | |
| 2064 SECStatus r = SECFailure; | |
| 2065 PKIX_Error * error = NULL; | |
| 2066 PKIX_ProcessingParams *procParams = NULL; | |
| 2067 PKIX_BuildResult * buildResult = NULL; | |
| 2068 void * nbioContext = NULL; /* for non-blocking IO */ | |
| 2069 void * buildState = NULL; /* for non-blocking IO */ | |
| 2070 PKIX_CertSelector * certSelector = NULL; | |
| 2071 PKIX_List * certStores = NULL; | |
| 2072 PKIX_ValidateResult * valResult = NULL; | |
| 2073 PKIX_VerifyNode * verifyNode = NULL; | |
| 2074 PKIX_TrustAnchor * trustAnchor = NULL; | |
| 2075 PKIX_PL_Cert * trustAnchorCert = NULL; | |
| 2076 PKIX_List * builtCertList = NULL; | |
| 2077 CERTValOutParam * oparam = NULL; | |
| 2078 int i=0; | |
| 2079 | |
| 2080 void *plContext = NULL; | |
| 2081 | |
| 2082 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 2083 int leakedObjNum = 0; | |
| 2084 int memLeakLoopCount = 0; | |
| 2085 int objCountTable[PKIX_NUMTYPES]; | |
| 2086 int fnInvLocalCount = 0; | |
| 2087 PKIX_Boolean savedUsePkixEngFlag = usePKIXValidationEngine; | |
| 2088 | |
| 2089 if (usePKIXValidationEngine) { | |
| 2090 /* current memory leak testing implementation does not allow | |
| 2091 * to run simultaneous tests one the same or a different threads. | |
| 2092 * Setting the variable to false, to make additional chain | |
| 2093 * validations be handled by old nss. */ | |
| 2094 usePKIXValidationEngine = PR_FALSE; | |
| 2095 } | |
| 2096 testStartFnStackPosition = 1; | |
| 2097 fnStackNameArr[0] = "CERT_PKIXVerifyCert"; | |
| 2098 fnStackInvCountArr[0] = 0; | |
| 2099 PKIX_Boolean abortOnLeak = | |
| 2100 (PR_GetEnv("PKIX_OBJECT_LEAK_TEST_ABORT_ON_LEAK") == NULL) ? | |
| 2101 PKIX_FALSE : PKIX_TRUE; | |
| 2102 runningLeakTest = PKIX_TRUE; | |
| 2103 | |
| 2104 /* Prevent multi-threaded run of object leak test */ | |
| 2105 fnInvLocalCount = PR_ATOMIC_INCREMENT(¶llelFnInvocationCount); | |
| 2106 PORT_Assert(fnInvLocalCount == 1); | |
| 2107 | |
| 2108 do { | |
| 2109 r = SECFailure; | |
| 2110 error = NULL; | |
| 2111 procParams = NULL; | |
| 2112 buildResult = NULL; | |
| 2113 nbioContext = NULL; /* for non-blocking IO */ | |
| 2114 buildState = NULL; /* for non-blocking IO */ | |
| 2115 certSelector = NULL; | |
| 2116 certStores = NULL; | |
| 2117 valResult = NULL; | |
| 2118 verifyNode = NULL; | |
| 2119 trustAnchor = NULL; | |
| 2120 trustAnchorCert = NULL; | |
| 2121 builtCertList = NULL; | |
| 2122 oparam = NULL; | |
| 2123 i=0; | |
| 2124 errorGenerated = PKIX_FALSE; | |
| 2125 stackPosition = 0; | |
| 2126 | |
| 2127 if (leakedObjNum) { | |
| 2128 pkix_pl_lifecycle_ObjectTableUpdate(objCountTable); | |
| 2129 } | |
| 2130 memLeakLoopCount += 1; | |
| 2131 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 2132 | |
| 2133 error = PKIX_PL_NssContext_Create( | |
| 2134 0, PR_FALSE /*use arena*/, wincx, &plContext); | |
| 2135 if (error != NULL) { /* need pkix->nss error map */ | |
| 2136 PORT_SetError(SEC_ERROR_CERT_NOT_VALID); | |
| 2137 goto cleanup; | |
| 2138 } | |
| 2139 | |
| 2140 error = pkix_pl_NssContext_SetCertUsage(usages, plContext); | |
| 2141 if (error != NULL) { | |
| 2142 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 2143 goto cleanup; | |
| 2144 } | |
| 2145 | |
| 2146 error = PKIX_ProcessingParams_Create(&procParams, plContext); | |
| 2147 if (error != NULL) { /* need pkix->nss error map */ | |
| 2148 PORT_SetError(SEC_ERROR_CERT_NOT_VALID); | |
| 2149 goto cleanup; | |
| 2150 } | |
| 2151 | |
| 2152 /* local cert store should be set into procParams before | |
| 2153 * filling in revocation settings. */ | |
| 2154 certStores = cert_GetCertStores(plContext); | |
| 2155 if (certStores == NULL) { | |
| 2156 goto cleanup; | |
| 2157 } | |
| 2158 error = PKIX_ProcessingParams_SetCertStores | |
| 2159 (procParams, certStores, plContext); | |
| 2160 if (error != NULL) { | |
| 2161 goto cleanup; | |
| 2162 } | |
| 2163 | |
| 2164 /* now process the extensible input parameters structure */ | |
| 2165 if (paramsIn != NULL) { | |
| 2166 i=0; | |
| 2167 while (paramsIn[i].type != cert_pi_end) { | |
| 2168 if (paramsIn[i].type >= cert_pi_max) { | |
| 2169 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 2170 goto cleanup; | |
| 2171 } | |
| 2172 if (cert_pkixSetParam(procParams, | |
| 2173 ¶msIn[i],plContext) != SECSuccess) { | |
| 2174 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 2175 goto cleanup; | |
| 2176 } | |
| 2177 i++; | |
| 2178 } | |
| 2179 } | |
| 2180 | |
| 2181 certSelector = cert_GetTargetCertConstraints(cert, plContext); | |
| 2182 if (certSelector == NULL) { | |
| 2183 goto cleanup; | |
| 2184 } | |
| 2185 error = PKIX_ProcessingParams_SetTargetCertConstraints | |
| 2186 (procParams, certSelector, plContext); | |
| 2187 if (error != NULL) { | |
| 2188 goto cleanup; | |
| 2189 } | |
| 2190 | |
| 2191 error = PKIX_BuildChain( procParams, &nbioContext, | |
| 2192 &buildState, &buildResult, &verifyNode, | |
| 2193 plContext); | |
| 2194 if (error != NULL) { | |
| 2195 goto cleanup; | |
| 2196 } | |
| 2197 | |
| 2198 error = PKIX_BuildResult_GetValidateResult( buildResult, &valResult, | |
| 2199 plContext); | |
| 2200 if (error != NULL) { | |
| 2201 goto cleanup; | |
| 2202 } | |
| 2203 | |
| 2204 error = PKIX_ValidateResult_GetTrustAnchor( valResult, &trustAnchor, | |
| 2205 plContext); | |
| 2206 if (error != NULL) { | |
| 2207 goto cleanup; | |
| 2208 } | |
| 2209 | |
| 2210 if (trustAnchor != NULL) { | |
| 2211 error = PKIX_TrustAnchor_GetTrustedCert( trustAnchor, &trustAnchorCert, | |
| 2212 plContext); | |
| 2213 if (error != NULL) { | |
| 2214 goto cleanup; | |
| 2215 } | |
| 2216 } | |
| 2217 | |
| 2218 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 2219 /* Can not continue if error was generated but not returned. | |
| 2220 * Jumping to cleanup. */ | |
| 2221 if (errorGenerated) goto cleanup; | |
| 2222 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 2223 | |
| 2224 oparam = cert_pkix_FindOutputParam(paramsOut, cert_po_trustAnchor); | |
| 2225 if (oparam != NULL) { | |
| 2226 if (trustAnchorCert != NULL) { | |
| 2227 oparam->value.pointer.cert = | |
| 2228 cert_NSSCertFromPKIXCert(trustAnchorCert); | |
| 2229 } else { | |
| 2230 oparam->value.pointer.cert = NULL; | |
| 2231 } | |
| 2232 } | |
| 2233 | |
| 2234 error = PKIX_BuildResult_GetCertChain( buildResult, &builtCertList, | |
| 2235 plContext); | |
| 2236 if (error != NULL) { | |
| 2237 goto cleanup; | |
| 2238 } | |
| 2239 | |
| 2240 oparam = cert_pkix_FindOutputParam(paramsOut, cert_po_certList); | |
| 2241 if (oparam != NULL) { | |
| 2242 error = cert_PkixToNssCertsChain(builtCertList, | |
| 2243 &oparam->value.pointer.chain, | |
| 2244 plContext); | |
| 2245 if (error) goto cleanup; | |
| 2246 } | |
| 2247 | |
| 2248 r = SECSuccess; | |
| 2249 | |
| 2250 cleanup: | |
| 2251 if (verifyNode) { | |
| 2252 /* Return validation log only upon error. */ | |
| 2253 oparam = cert_pkix_FindOutputParam(paramsOut, cert_po_errorLog); | |
| 2254 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 2255 if (!errorGenerated) | |
| 2256 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 2257 if (r && oparam != NULL) { | |
| 2258 PKIX_Error *tmpError = | |
| 2259 cert_GetLogFromVerifyNode(oparam->value.pointer.log, | |
| 2260 verifyNode, plContext); | |
| 2261 if (tmpError) { | |
| 2262 PKIX_PL_Object_DecRef((PKIX_PL_Object *)tmpError, plContext); | |
| 2263 } | |
| 2264 } | |
| 2265 PKIX_PL_Object_DecRef((PKIX_PL_Object *)verifyNode, plContext); | |
| 2266 } | |
| 2267 | |
| 2268 if (procParams != NULL) | |
| 2269 PKIX_PL_Object_DecRef((PKIX_PL_Object *)procParams, plContext); | |
| 2270 | |
| 2271 if (trustAnchorCert != NULL) | |
| 2272 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchorCert, plContext); | |
| 2273 | |
| 2274 if (trustAnchor != NULL) | |
| 2275 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchor, plContext); | |
| 2276 | |
| 2277 if (valResult != NULL) | |
| 2278 PKIX_PL_Object_DecRef((PKIX_PL_Object *)valResult, plContext); | |
| 2279 | |
| 2280 if (buildResult != NULL) | |
| 2281 PKIX_PL_Object_DecRef((PKIX_PL_Object *)buildResult, plContext); | |
| 2282 | |
| 2283 if (certStores != NULL) | |
| 2284 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certStores, plContext); | |
| 2285 | |
| 2286 if (certSelector != NULL) | |
| 2287 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certSelector, plContext); | |
| 2288 | |
| 2289 if (builtCertList != NULL) | |
| 2290 PKIX_PL_Object_DecRef((PKIX_PL_Object *)builtCertList, plContext); | |
| 2291 | |
| 2292 if (error != NULL) { | |
| 2293 SECErrorCodes nssErrorCode = 0; | |
| 2294 | |
| 2295 cert_PkixErrorToNssCode(error, &nssErrorCode, plContext); | |
| 2296 cert_pkixDestroyValOutParam(paramsOut); | |
| 2297 PORT_SetError(nssErrorCode); | |
| 2298 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
| 2299 } | |
| 2300 | |
| 2301 PKIX_PL_NssContext_Destroy(plContext); | |
| 2302 | |
| 2303 #ifdef PKIX_OBJECT_LEAK_TEST | |
| 2304 leakedObjNum = | |
| 2305 pkix_pl_lifecycle_ObjectLeakCheck(leakedObjNum ? objCountTable : NULL); | |
| 2306 | |
| 2307 if (pkixLog && leakedObjNum) { | |
| 2308 PR_LOG(pkixLog, 1, ("The generated error caused an object leaks. Loop %d
." | |
| 2309 "Stack %s\n", memLeakLoopCount, errorFnStackString))
; | |
| 2310 } | |
| 2311 PR_Free(errorFnStackString); | |
| 2312 errorFnStackString = NULL; | |
| 2313 if (abortOnLeak) { | |
| 2314 PORT_Assert(leakedObjNum == 0); | |
| 2315 } | |
| 2316 | |
| 2317 } while (errorGenerated); | |
| 2318 | |
| 2319 runningLeakTest = PKIX_FALSE; | |
| 2320 PR_ATOMIC_DECREMENT(¶llelFnInvocationCount); | |
| 2321 usePKIXValidationEngine = savedUsePkixEngFlag; | |
| 2322 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
| 2323 | |
| 2324 return r; | |
| 2325 } | |
| OLD | NEW |