Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(298)

Side by Side Diff: nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocspresponse.c

Issue 2078763002: Delete bundled copy of NSS and replace with README. (Closed) Base URL: https://chromium.googlesource.com/chromium/deps/nss@master
Patch Set: Delete bundled copy of NSS and replace with README. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
4 /*
5 * pkix_pl_ocspresponse.c
6 *
7 */
8
9 #include "pkix_pl_ocspresponse.h"
10
11 /* ----Public functions------------------------------------- */
12 /*
13 * This is the libpkix replacement for CERT_VerifyOCSPResponseSignature.
14 * It is used if it has been set as the verifyFcn member of ocspChecker.
15 */
16 PKIX_Error *
17 PKIX_PL_OcspResponse_UseBuildChain(
18 PKIX_PL_Cert *signerCert,
19 PKIX_PL_Date *producedAt,
20 PKIX_ProcessingParams *procParams,
21 void **pNBIOContext,
22 void **pState,
23 PKIX_BuildResult **pBuildResult,
24 PKIX_VerifyNode **pVerifyTree,
25 void *plContext)
26 {
27 PKIX_ProcessingParams *caProcParams = NULL;
28 PKIX_PL_Date *date = NULL;
29 PKIX_ComCertSelParams *certSelParams = NULL;
30 PKIX_CertSelector *certSelector = NULL;
31 void *nbioContext = NULL;
32 PKIX_Error *buildError = NULL;
33
34 PKIX_ENTER(OCSPRESPONSE, "pkix_OcspResponse_UseBuildChain");
35 PKIX_NULLCHECK_THREE(signerCert, producedAt, procParams);
36 PKIX_NULLCHECK_THREE(pNBIOContext, pState, pBuildResult);
37
38 nbioContext = *pNBIOContext;
39 *pNBIOContext = NULL;
40
41 /* Are we resuming after a WOULDBLOCK return, or starting anew ? */
42 if (nbioContext == NULL) {
43 /* Starting anew */
44 PKIX_CHECK(PKIX_PL_Object_Duplicate
45 ((PKIX_PL_Object *)procParams,
46 (PKIX_PL_Object **)&caProcParams,
47 plContext),
48 PKIX_OBJECTDUPLICATEFAILED);
49
50 PKIX_CHECK(PKIX_ProcessingParams_SetDate(procParams, date, plCon text),
51 PKIX_PROCESSINGPARAMSSETDATEFAILED);
52
53 /* create CertSelector with target certificate in params */
54
55 PKIX_CHECK(PKIX_CertSelector_Create
56 (NULL, NULL, &certSelector, plContext),
57 PKIX_CERTSELECTORCREATEFAILED);
58
59 PKIX_CHECK(PKIX_ComCertSelParams_Create
60 (&certSelParams, plContext),
61 PKIX_COMCERTSELPARAMSCREATEFAILED);
62
63 PKIX_CHECK(PKIX_ComCertSelParams_SetCertificate
64 (certSelParams, signerCert, plContext),
65 PKIX_COMCERTSELPARAMSSETCERTIFICATEFAILED);
66
67 PKIX_CHECK(PKIX_CertSelector_SetCommonCertSelectorParams
68 (certSelector, certSelParams, plContext),
69 PKIX_CERTSELECTORSETCOMMONCERTSELECTORPARAMSFAILED);
70
71 PKIX_CHECK(PKIX_ProcessingParams_SetTargetCertConstraints
72 (caProcParams, certSelector, plContext),
73 PKIX_PROCESSINGPARAMSSETTARGETCERTCONSTRAINTSFAILED);
74 }
75
76 buildError = PKIX_BuildChain
77 (caProcParams,
78 &nbioContext,
79 pState,
80 pBuildResult,
81 pVerifyTree,
82 plContext);
83
84 /* non-null nbioContext means the build would block */
85 if (nbioContext != NULL) {
86
87 *pNBIOContext = nbioContext;
88
89 /* no buildResult means the build has failed */
90 } else if (buildError) {
91 pkixErrorResult = buildError;
92 buildError = NULL;
93 } else {
94 PKIX_DECREF(*pState);
95 }
96
97 cleanup:
98
99 PKIX_DECREF(caProcParams);
100 PKIX_DECREF(date);
101 PKIX_DECREF(certSelParams);
102 PKIX_DECREF(certSelector);
103
104 PKIX_RETURN(OCSPRESPONSE);
105 }
106
107 /* --Private-OcspResponse-Functions------------------------------------- */
108
109 /*
110 * FUNCTION: pkix_pl_OcspResponse_Destroy
111 * (see comments for PKIX_PL_DestructorCallback in pkix_pl_system.h)
112 */
113 static PKIX_Error *
114 pkix_pl_OcspResponse_Destroy(
115 PKIX_PL_Object *object,
116 void *plContext)
117 {
118 PKIX_PL_OcspResponse *ocspRsp = NULL;
119 const SEC_HttpClientFcn *httpClient = NULL;
120 const SEC_HttpClientFcnV1 *hcv1 = NULL;
121
122 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_Destroy");
123 PKIX_NULLCHECK_ONE(object);
124
125 PKIX_CHECK(pkix_CheckType(object, PKIX_OCSPRESPONSE_TYPE, plContext),
126 PKIX_OBJECTNOTANOCSPRESPONSE);
127
128 ocspRsp = (PKIX_PL_OcspResponse *)object;
129
130 if (ocspRsp->nssOCSPResponse != NULL) {
131 CERT_DestroyOCSPResponse(ocspRsp->nssOCSPResponse);
132 ocspRsp->nssOCSPResponse = NULL;
133 }
134
135 if (ocspRsp->signerCert != NULL) {
136 CERT_DestroyCertificate(ocspRsp->signerCert);
137 ocspRsp->signerCert = NULL;
138 }
139
140 httpClient = (const SEC_HttpClientFcn *)(ocspRsp->httpClient);
141
142 if (httpClient && (httpClient->version == 1)) {
143
144 hcv1 = &(httpClient->fcnTable.ftable1);
145
146 if (ocspRsp->sessionRequest != NULL) {
147 (*hcv1->freeFcn)(ocspRsp->sessionRequest);
148 ocspRsp->sessionRequest = NULL;
149 }
150
151 if (ocspRsp->serverSession != NULL) {
152 (*hcv1->freeSessionFcn)(ocspRsp->serverSession);
153 ocspRsp->serverSession = NULL;
154 }
155 }
156
157 if (ocspRsp->arena != NULL) {
158 PORT_FreeArena(ocspRsp->arena, PR_FALSE);
159 ocspRsp->arena = NULL;
160 }
161
162 PKIX_DECREF(ocspRsp->producedAtDate);
163 PKIX_DECREF(ocspRsp->pkixSignerCert);
164 PKIX_DECREF(ocspRsp->request);
165
166 cleanup:
167
168 PKIX_RETURN(OCSPRESPONSE);
169 }
170
171 /*
172 * FUNCTION: pkix_pl_OcspResponse_Hashcode
173 * (see comments for PKIX_PL_HashcodeCallback in pkix_pl_system.h)
174 */
175 static PKIX_Error *
176 pkix_pl_OcspResponse_Hashcode(
177 PKIX_PL_Object *object,
178 PKIX_UInt32 *pHashcode,
179 void *plContext)
180 {
181 PKIX_PL_OcspResponse *ocspRsp = NULL;
182
183 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_Hashcode");
184 PKIX_NULLCHECK_TWO(object, pHashcode);
185
186 PKIX_CHECK(pkix_CheckType(object, PKIX_OCSPRESPONSE_TYPE, plContext),
187 PKIX_OBJECTNOTANOCSPRESPONSE);
188
189 ocspRsp = (PKIX_PL_OcspResponse *)object;
190
191 if (ocspRsp->encodedResponse->data == NULL) {
192 *pHashcode = 0;
193 } else {
194 PKIX_CHECK(pkix_hash
195 (ocspRsp->encodedResponse->data,
196 ocspRsp->encodedResponse->len,
197 pHashcode,
198 plContext),
199 PKIX_HASHFAILED);
200 }
201
202 cleanup:
203
204 PKIX_RETURN(OCSPRESPONSE);
205 }
206
207 /*
208 * FUNCTION: pkix_pl_OcspResponse_Equals
209 * (see comments for PKIX_PL_Equals_Callback in pkix_pl_system.h)
210 */
211 static PKIX_Error *
212 pkix_pl_OcspResponse_Equals(
213 PKIX_PL_Object *firstObj,
214 PKIX_PL_Object *secondObj,
215 PKIX_Boolean *pResult,
216 void *plContext)
217 {
218 PKIX_UInt32 secondType = 0;
219 PKIX_UInt32 firstLen = 0;
220 PKIX_UInt32 i = 0;
221 PKIX_PL_OcspResponse *rsp1 = NULL;
222 PKIX_PL_OcspResponse *rsp2 = NULL;
223 const unsigned char *firstData = NULL;
224 const unsigned char *secondData = NULL;
225
226 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_Equals");
227 PKIX_NULLCHECK_THREE(firstObj, secondObj, pResult);
228
229 /* test that firstObj is a OcspResponse */
230 PKIX_CHECK(pkix_CheckType(firstObj, PKIX_OCSPRESPONSE_TYPE, plContext),
231 PKIX_FIRSTOBJARGUMENTNOTANOCSPRESPONSE);
232
233 /*
234 * Since we know firstObj is a OcspResponse, if both references are
235 * identical, they must be equal
236 */
237 if (firstObj == secondObj){
238 *pResult = PKIX_TRUE;
239 goto cleanup;
240 }
241
242 /*
243 * If secondObj isn't a OcspResponse, we don't throw an error.
244 * We simply return a Boolean result of FALSE
245 */
246 *pResult = PKIX_FALSE;
247 PKIX_CHECK(PKIX_PL_Object_GetType(secondObj, &secondType, plContext),
248 PKIX_COULDNOTGETTYPEOFSECONDARGUMENT);
249 if (secondType != PKIX_OCSPRESPONSE_TYPE) {
250 goto cleanup;
251 }
252
253 rsp1 = (PKIX_PL_OcspResponse *)firstObj;
254 rsp2 = (PKIX_PL_OcspResponse *)secondObj;
255
256 /* If either lacks an encoded string, they cannot be compared */
257 firstData = (const unsigned char *)rsp1->encodedResponse->data;
258 secondData = (const unsigned char *)rsp2->encodedResponse->data;
259 if ((firstData == NULL) || (secondData == NULL)) {
260 goto cleanup;
261 }
262
263 firstLen = rsp1->encodedResponse->len;
264
265 if (firstLen != rsp2->encodedResponse->len) {
266 goto cleanup;
267 }
268
269 for (i = 0; i < firstLen; i++) {
270 if (*firstData++ != *secondData++) {
271 goto cleanup;
272 }
273 }
274
275 *pResult = PKIX_TRUE;
276
277 cleanup:
278
279 PKIX_RETURN(OCSPRESPONSE);
280 }
281
282 /*
283 * FUNCTION: pkix_pl_OcspResponse_RegisterSelf
284 * DESCRIPTION:
285 * Registers PKIX_OCSPRESPONSE_TYPE and its related functions with
286 * systemClasses[]
287 * PARAMETERS:
288 * "plContext"
289 * Platform-specific context pointer.
290 * THREAD SAFETY:
291 * Not Thread Safe - for performance and complexity reasons
292 *
293 * Since this function is only called by PKIX_PL_Initialize, which should
294 * only be called once, it is acceptable that this function is not
295 * thread-safe.
296 */
297 PKIX_Error *
298 pkix_pl_OcspResponse_RegisterSelf(void *plContext)
299 {
300 extern pkix_ClassTable_Entry systemClasses[PKIX_NUMTYPES];
301 pkix_ClassTable_Entry *entry = &systemClasses[PKIX_OCSPRESPONSE_TYPE];
302
303 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_RegisterSelf");
304
305 entry->description = "OcspResponse";
306 entry->typeObjectSize = sizeof(PKIX_PL_OcspResponse);
307 entry->destructor = pkix_pl_OcspResponse_Destroy;
308 entry->equalsFunction = pkix_pl_OcspResponse_Equals;
309 entry->hashcodeFunction = pkix_pl_OcspResponse_Hashcode;
310 entry->duplicateFunction = pkix_duplicateImmutable;
311
312 PKIX_RETURN(OCSPRESPONSE);
313 }
314
315 /* --Public-Functions------------------------------------------------------- */
316
317 /*
318 * FUNCTION: pkix_pl_OcspResponse_Create
319 * DESCRIPTION:
320 *
321 * This function transmits the OcspRequest pointed to by "request" and obtains
322 * an OcspResponse, which it stores at "pOcspResponse". If the HTTPClient
323 * supports non-blocking I/O this function may store a non-NULL value at
324 * "pNBIOContext" (the WOULDBLOCK condition). In that case the caller should
325 * make a subsequent call with the same value in "pNBIOContext" and
326 * "pOcspResponse" to resume the operation. Additional WOULDBLOCK returns may
327 * occur; the caller should persist until a return occurs with NULL stored at
328 * "pNBIOContext".
329 *
330 * If a SEC_HttpClientFcn "responder" is supplied, it is used as the client
331 * to which the OCSP query is sent. If none is supplied, the default responder
332 * is used.
333 *
334 * If an OcspResponse_VerifyCallback "verifyFcn" is supplied, it is used to
335 * verify the Cert received from the responder as the signer. If none is
336 * supplied, the default verification function is used.
337 *
338 * The contents of "request" are ignored on calls subsequent to a WOULDBLOCK
339 * return, and the caller is permitted to supply NULL.
340 *
341 * PARAMETERS
342 * "request"
343 * Address of the OcspRequest for which a response is desired.
344 * "httpMethod"
345 * GET or POST
346 * "responder"
347 * Address, if non-NULL, of the SEC_HttpClientFcn to be sent the OCSP
348 * query.
349 * "verifyFcn"
350 * Address, if non-NULL, of the OcspResponse_VerifyCallback function to be
351 * used to verify the Cert of the OCSP responder.
352 * "pNBIOContext"
353 * Address at which platform-dependent information is stored for handling
354 * of non-blocking I/O. Must be non-NULL.
355 * "pOcspResponse"
356 * The address where the created OcspResponse is stored. Must be non-NULL.
357 * "plContext"
358 * Platform-specific context pointer.
359 * THREAD SAFETY:
360 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
361 * RETURNS:
362 * Returns NULL if the function succeeds.
363 * Returns an OcspResponse Error if the function fails in a non-fatal way.
364 * Returns a Fatal Error if the function fails in an unrecoverable way.
365 */
366 PKIX_Error *
367 pkix_pl_OcspResponse_Create(
368 PKIX_PL_OcspRequest *request,
369 const char *httpMethod,
370 void *responder,
371 PKIX_PL_VerifyCallback verifyFcn,
372 void **pNBIOContext,
373 PKIX_PL_OcspResponse **pResponse,
374 void *plContext)
375 {
376 void *nbioContext = NULL;
377 PKIX_PL_OcspResponse *ocspResponse = NULL;
378 const SEC_HttpClientFcn *httpClient = NULL;
379 const SEC_HttpClientFcnV1 *hcv1 = NULL;
380 SECStatus rv = SECFailure;
381 char *location = NULL;
382 char *hostname = NULL;
383 char *path = NULL;
384 char *responseContentType = NULL;
385 PRUint16 port = 0;
386 SEC_HTTP_SERVER_SESSION serverSession = NULL;
387 SEC_HTTP_REQUEST_SESSION sessionRequest = NULL;
388 SECItem *encodedRequest = NULL;
389 PRUint16 responseCode = 0;
390 char *responseData = NULL;
391
392 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_Create");
393 PKIX_NULLCHECK_TWO(pNBIOContext, pResponse);
394
395 if (!strcmp(httpMethod, "GET") && !strcmp(httpMethod, "POST")) {
396 PKIX_ERROR(PKIX_INVALIDOCSPHTTPMETHOD);
397 }
398
399 nbioContext = *pNBIOContext;
400 *pNBIOContext = NULL;
401
402 if (nbioContext != NULL) {
403
404 ocspResponse = *pResponse;
405 PKIX_NULLCHECK_ONE(ocspResponse);
406
407 httpClient = ocspResponse->httpClient;
408 serverSession = ocspResponse->serverSession;
409 sessionRequest = ocspResponse->sessionRequest;
410 PKIX_NULLCHECK_THREE(httpClient, serverSession, sessionRequest);
411
412 } else {
413 PKIX_UInt32 timeout =
414 ((PKIX_PL_NssContext*)plContext)->timeoutSeconds;
415
416 PKIX_NULLCHECK_ONE(request);
417
418 PKIX_CHECK(pkix_pl_OcspRequest_GetEncoded
419 (request, &encodedRequest, plContext),
420 PKIX_OCSPREQUESTGETENCODEDFAILED);
421
422 /* prepare initial message to HTTPClient */
423
424 /* Is there a default responder and is it enabled? */
425 if (responder) {
426 httpClient = (const SEC_HttpClientFcn *)responder;
427 } else {
428 httpClient = SEC_GetRegisteredHttpClient();
429 }
430
431 if (httpClient && (httpClient->version == 1)) {
432 char *fullGetPath = NULL;
433 const char *sessionPath = NULL;
434 PRBool usePOST = !strcmp(httpMethod, "POST");
435
436 hcv1 = &(httpClient->fcnTable.ftable1);
437
438 PKIX_CHECK(pkix_pl_OcspRequest_GetLocation
439 (request, &location, plContext),
440 PKIX_OCSPREQUESTGETLOCATIONFAILED);
441
442 /* parse location -> hostname, port, path */
443 rv = CERT_ParseURL(location, &hostname, &port, &path);
444 if (rv == SECFailure || hostname == NULL || path == NULL ) {
445 PKIX_ERROR(PKIX_URLPARSINGFAILED);
446 }
447
448 rv = (*hcv1->createSessionFcn)(hostname, port,
449 &serverSession);
450 if (rv != SECSuccess) {
451 PKIX_ERROR(PKIX_OCSPSERVERERROR);
452 }
453
454 if (usePOST) {
455 sessionPath = path;
456 } else {
457 /* calculate, are we allowed to use GET? */
458 enum { max_get_request_size = 255 }; /* defined by RFC2560 */
459 char b64ReqBuf[max_get_request_size+1];
460 size_t base64size;
461 size_t slashLengthIfNeeded = 0;
462 size_t pathLength;
463 PRInt32 urlEncodedBufLength;
464 size_t getURLLength;
465 char *walkOutput = NULL;
466
467 pathLength = strlen(path);
468 if (path[pathLength-1] != '/') {
469 slashLengthIfNeeded = 1;
470 }
471 base64size = (((encodedRequest->len +2)/3) * 4);
472 if (base64size > max_get_request_size) {
473 PKIX_ERROR(PKIX_OCSPGETREQUESTTOOBIG);
474 }
475 memset(b64ReqBuf, 0, sizeof(b64ReqBuf));
476 PL_Base64Encode((const char *)encodedRequest->da ta, encodedRequest->len, b64ReqBuf);
477 urlEncodedBufLength = ocsp_UrlEncodeBase64Buf(b6 4ReqBuf, NULL);
478 getURLLength = pathLength + urlEncodedBufLength + slashLengthIfNeeded;
479 fullGetPath = (char*)PORT_Alloc(getURLLength);
480 if (!fullGetPath) {
481 PKIX_ERROR(PKIX_OUTOFMEMORY);
482 }
483 strcpy(fullGetPath, path);
484 walkOutput = fullGetPath + pathLength;
485 if (walkOutput > fullGetPath && slashLengthIfNee ded) {
486 strcpy(walkOutput, "/");
487 ++walkOutput;
488 }
489 ocsp_UrlEncodeBase64Buf(b64ReqBuf, walkOutput);
490 sessionPath = fullGetPath;
491 }
492
493 rv = (*hcv1->createFcn)(serverSession, "http",
494 sessionPath, httpMethod,
495 PR_SecondsToInterval(timeout),
496 &sessionRequest);
497 sessionPath = NULL;
498 if (fullGetPath) {
499 PORT_Free(fullGetPath);
500 fullGetPath = NULL;
501 }
502
503 if (rv != SECSuccess) {
504 PKIX_ERROR(PKIX_OCSPSERVERERROR);
505 }
506
507 if (usePOST) {
508 rv = (*hcv1->setPostDataFcn)(sessionRequest,
509 (char *)encodedRequest ->data,
510 encodedRequest->len,
511 "application/ocsp-requ est");
512 if (rv != SECSuccess) {
513 PKIX_ERROR(PKIX_OCSPSERVERERROR);
514 }
515 }
516
517 /* create a PKIX_PL_OcspResponse object */
518 PKIX_CHECK(PKIX_PL_Object_Alloc
519 (PKIX_OCSPRESPONSE_TYPE,
520 sizeof (PKIX_PL_OcspResponse),
521 (PKIX_PL_Object **)&ocspResponse,
522 plContext),
523 PKIX_COULDNOTCREATEOBJECT);
524
525 PKIX_INCREF(request);
526 ocspResponse->request = request;
527 ocspResponse->httpClient = httpClient;
528 ocspResponse->serverSession = serverSession;
529 serverSession = NULL;
530 ocspResponse->sessionRequest = sessionRequest;
531 sessionRequest = NULL;
532 ocspResponse->verifyFcn = verifyFcn;
533 ocspResponse->handle = CERT_GetDefaultCertDB();
534 ocspResponse->encodedResponse = NULL;
535 ocspResponse->arena = NULL;
536 ocspResponse->producedAt = 0;
537 ocspResponse->producedAtDate = NULL;
538 ocspResponse->pkixSignerCert = NULL;
539 ocspResponse->nssOCSPResponse = NULL;
540 ocspResponse->signerCert = NULL;
541 }
542 }
543
544 /* begin or resume IO to HTTPClient */
545 if (httpClient && (httpClient->version == 1)) {
546 PRUint32 responseDataLen =
547 ((PKIX_PL_NssContext*)plContext)->maxResponseLength;
548
549 hcv1 = &(httpClient->fcnTable.ftable1);
550
551 rv = (*hcv1->trySendAndReceiveFcn)(ocspResponse->sessionRequest,
552 (PRPollDesc **)&nbioContext,
553 &responseCode,
554 (const char **)&responseContentType,
555 NULL, /* responseHeaders */
556 (const char **)&responseData,
557 &responseDataLen);
558
559 if (rv != SECSuccess) {
560 PKIX_ERROR(PKIX_OCSPSERVERERROR);
561 }
562 /* responseContentType is a pointer to the null-terminated
563 * string returned by httpclient. Memory allocated for context
564 * type will be freed with freeing of the HttpClient struct. */
565 if (PORT_Strcasecmp(responseContentType,
566 "application/ocsp-response")) {
567 PKIX_ERROR(PKIX_OCSPSERVERERROR);
568 }
569 if (nbioContext != NULL) {
570 *pNBIOContext = nbioContext;
571 goto cleanup;
572 }
573 if (responseCode != 200) {
574 PKIX_ERROR(PKIX_OCSPBADHTTPRESPONSE);
575 }
576 ocspResponse->arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE);
577 if (ocspResponse->arena == NULL) {
578 PKIX_ERROR(PKIX_OUTOFMEMORY);
579 }
580 ocspResponse->encodedResponse = SECITEM_AllocItem
581 (ocspResponse->arena, NULL, responseDataLen);
582 if (ocspResponse->encodedResponse == NULL) {
583 PKIX_ERROR(PKIX_OUTOFMEMORY);
584 }
585 PORT_Memcpy(ocspResponse->encodedResponse->data,
586 responseData, responseDataLen);
587 }
588 *pResponse = ocspResponse;
589 ocspResponse = NULL;
590
591 cleanup:
592
593 if (path != NULL) {
594 PORT_Free(path);
595 }
596 if (hostname != NULL) {
597 PORT_Free(hostname);
598 }
599 if (ocspResponse) {
600 PKIX_DECREF(ocspResponse);
601 }
602 if (serverSession) {
603 hcv1->freeSessionFcn(serverSession);
604 }
605 if (sessionRequest) {
606 hcv1->freeFcn(sessionRequest);
607 }
608
609 PKIX_RETURN(OCSPRESPONSE);
610 }
611
612 /*
613 * FUNCTION: pkix_pl_OcspResponse_Decode
614 * DESCRIPTION:
615 *
616 * This function decodes the DER data contained in the OcspResponse pointed to
617 * by "response", storing PKIX_TRUE at "pPassed" if the decoding was
618 * successful, and PKIX_FALSE otherwise.
619 *
620 * PARAMETERS
621 * "response"
622 * The address of the OcspResponse whose DER data is to be decoded. Must
623 * be non-NULL.
624 * "pPassed"
625 * Address at which the Boolean result is stored. Must be non-NULL.
626 * "pReturnCode"
627 * Address at which the SECErrorCodes result is stored. Must be non-NULL.
628 * "plContext"
629 * Platform-specific context pointer.
630 * THREAD SAFETY:
631 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
632 * RETURNS:
633 * Returns NULL if the function succeeds.
634 * Returns an OcspResponse Error if the function fails in a non-fatal way.
635 * Returns a Fatal Error if the function fails in an unrecoverable way.
636 */
637
638 PKIX_Error *
639 pkix_pl_OcspResponse_Decode(
640 PKIX_PL_OcspResponse *response,
641 PKIX_Boolean *pPassed,
642 SECErrorCodes *pReturnCode,
643 void *plContext)
644 {
645
646 PKIX_ENTER(OCSPRESPONSE, "PKIX_PL_OcspResponse_Decode");
647 PKIX_NULLCHECK_TWO(response, response->encodedResponse);
648
649 response->nssOCSPResponse =
650 CERT_DecodeOCSPResponse(response->encodedResponse);
651
652 if (response->nssOCSPResponse != NULL) {
653 *pPassed = PKIX_TRUE;
654 *pReturnCode = 0;
655 } else {
656 *pPassed = PKIX_FALSE;
657 *pReturnCode = PORT_GetError();
658 }
659
660 PKIX_RETURN(OCSPRESPONSE);
661 }
662
663 /*
664 * FUNCTION: pkix_pl_OcspResponse_GetStatus
665 * DESCRIPTION:
666 *
667 * This function checks the response status of the OcspResponse pointed to
668 * by "response", storing PKIX_TRUE at "pPassed" if the responder understood
669 * the request and considered it valid, and PKIX_FALSE otherwise.
670 *
671 * PARAMETERS
672 * "response"
673 * The address of the OcspResponse whose status is to be retrieved. Must
674 * be non-NULL.
675 * "pPassed"
676 * Address at which the Boolean result is stored. Must be non-NULL.
677 * "plContext"
678 * Platform-specific context pointer.
679 * THREAD SAFETY:
680 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
681 * RETURNS:
682 * Returns NULL if the function succeeds.
683 * Returns an OcspResponse Error if the function fails in a non-fatal way.
684 * Returns a Fatal Error if the function fails in an unrecoverable way.
685 */
686
687 PKIX_Error *
688 pkix_pl_OcspResponse_GetStatus(
689 PKIX_PL_OcspResponse *response,
690 PKIX_Boolean *pPassed,
691 SECErrorCodes *pReturnCode,
692 void *plContext)
693 {
694 SECStatus rv = SECFailure;
695
696 PKIX_ENTER(OCSPRESPONSE, "PKIX_PL_OcspResponse_GetStatus");
697 PKIX_NULLCHECK_FOUR(response, response->nssOCSPResponse, pPassed, pRetur nCode);
698
699 rv = CERT_GetOCSPResponseStatus(response->nssOCSPResponse);
700
701 if (rv == SECSuccess) {
702 *pPassed = PKIX_TRUE;
703 *pReturnCode = 0;
704 } else {
705 *pPassed = PKIX_FALSE;
706 *pReturnCode = PORT_GetError();
707 }
708
709 PKIX_RETURN(OCSPRESPONSE);
710 }
711
712
713 static PKIX_Error*
714 pkix_pl_OcspResponse_VerifyResponse(
715 PKIX_PL_OcspResponse *response,
716 PKIX_ProcessingParams *procParams,
717 SECCertUsage certUsage,
718 void **state,
719 PKIX_BuildResult **buildResult,
720 void **pNBIOContext,
721 void *plContext)
722 {
723 SECStatus rv = SECFailure;
724
725 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_VerifyResponse");
726
727 if (response->verifyFcn != NULL) {
728 void *lplContext = NULL;
729
730 PKIX_CHECK(
731 PKIX_PL_NssContext_Create(((SECCertificateUsage)1) << certUsage,
732 PKIX_FALSE, NULL, &lplContext),
733 PKIX_NSSCONTEXTCREATEFAILED);
734
735 PKIX_CHECK(
736 (response->verifyFcn)((PKIX_PL_Object*)response->pkixSignerCert,
737 NULL, response->producedAtDate,
738 procParams, pNBIOContext,
739 state, buildResult,
740 NULL, lplContext),
741 PKIX_CERTVERIFYKEYUSAGEFAILED);
742 rv = SECSuccess;
743 } else {
744 rv = CERT_VerifyCert(response->handle, response->signerCert, PKIX_TRUE,
745 certUsage, response->producedAt, NULL, NULL);
746 if (rv != SECSuccess) {
747 PKIX_ERROR(PKIX_CERTVERIFYKEYUSAGEFAILED);
748 }
749 }
750
751 cleanup:
752 if (rv != SECSuccess) {
753 PORT_SetError(SEC_ERROR_OCSP_INVALID_SIGNING_CERT);
754 }
755
756 PKIX_RETURN(OCSPRESPONSE);
757 }
758
759 /*
760 * FUNCTION: pkix_pl_OcspResponse_VerifySignature
761 * DESCRIPTION:
762 *
763 * This function verifies the ocspResponse signature field in the OcspResponse
764 * pointed to by "response", storing PKIX_TRUE at "pPassed" if verification
765 * is successful and PKIX_FALSE otherwise. If verification is unsuccessful an
766 * error code (an enumeration of type SECErrorCodes) is stored at *pReturnCode.
767 *
768 * PARAMETERS
769 * "response"
770 * The address of the OcspResponse whose signature field is to be
771 * retrieved. Must be non-NULL.
772 * "cert"
773 * The address of the Cert for which the OCSP query was made. Must be
774 * non-NULL.
775 * "procParams"
776 * Address of ProcessingParams used to initialize the ExpirationChecker
777 * and TargetCertChecker. Must be non-NULL.
778 * "pPassed"
779 * Address at which the Boolean result is stored. Must be non-NULL.
780 * "pNBIOContext"
781 * Address at which the NBIOContext is stored indicating whether the
782 * checking is complete. Must be non-NULL.
783 * "plContext"
784 * Platform-specific context pointer.
785 * THREAD SAFETY:
786 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
787 * RETURNS:
788 * Returns NULL if the function succeeds.
789 * Returns an OcspResponse Error if the function fails in a non-fatal way.
790 * Returns a Fatal Error if the function fails in an unrecoverable way.
791 */
792 PKIX_Error *
793 pkix_pl_OcspResponse_VerifySignature(
794 PKIX_PL_OcspResponse *response,
795 PKIX_PL_Cert *cert,
796 PKIX_ProcessingParams *procParams,
797 PKIX_Boolean *pPassed,
798 void **pNBIOContext,
799 void *plContext)
800 {
801 SECStatus rv = SECFailure;
802 CERTOCSPResponse *nssOCSPResponse = NULL;
803 CERTCertificate *issuerCert = NULL;
804 PKIX_BuildResult *buildResult = NULL;
805 void *nbio = NULL;
806 void *state = NULL;
807
808 ocspSignature *signature = NULL;
809 ocspResponseData *tbsData = NULL;
810 SECItem *tbsResponseDataDER = NULL;
811
812
813 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_VerifySignature");
814 PKIX_NULLCHECK_FOUR(response, cert, pPassed, pNBIOContext);
815
816 nbio = *pNBIOContext;
817 *pNBIOContext = NULL;
818
819 nssOCSPResponse = response->nssOCSPResponse;
820 if (nssOCSPResponse == NULL) {
821 PORT_SetError(SEC_ERROR_OCSP_MALFORMED_RESPONSE);
822 goto cleanup;
823 }
824
825 tbsData =
826 ocsp_GetResponseData(nssOCSPResponse, &tbsResponseDataDER);
827
828 signature = ocsp_GetResponseSignature(nssOCSPResponse);
829
830
831 /* Are we resuming after a WOULDBLOCK response? */
832 if (nbio == NULL) {
833 /* No, this is a new query */
834
835 issuerCert = CERT_FindCertIssuer(cert->nssCert, PR_Now(),
836 certUsageAnyCA);
837
838 /*
839 * If this signature has already gone through verification,
840 * just return the cached result.
841 */
842 if (signature->wasChecked) {
843 if (signature->status == SECSuccess) {
844 response->signerCert =
845 CERT_DupCertificate(signature->cert);
846 } else {
847 PORT_SetError(signature->failureReason);
848 goto cleanup;
849 }
850 }
851
852 response->signerCert =
853 ocsp_GetSignerCertificate(response->handle, tbsData,
854 signature, issuerCert);
855
856 if (response->signerCert == NULL) {
857 if (PORT_GetError() == SEC_ERROR_UNKNOWN_CERT) {
858 /* Make the error a little more specific. */
859 PORT_SetError(SEC_ERROR_OCSP_INVALID_SIGNING_CERT);
860 }
861 goto cleanup;
862 }
863 PKIX_CHECK(
864 PKIX_PL_Cert_CreateFromCERTCertificate(response->signerCert,
865 &(response->pkixSignerCer t),
866 plContext),
867 PKIX_CERTCREATEWITHNSSCERTFAILED);
868
869 /*
870 * We could mark this true at the top of this function, or
871 * always below at "finish", but if the problem was just that
872 * we could not find the signer's cert, leave that as if the
873 * signature hasn't been checked. Maybe a subsequent call will
874 * have better luck.
875 */
876 signature->wasChecked = PR_TRUE;
877
878 /*
879 * We are about to verify the signer certificate; we need to
880 * specify *when* that certificate must be valid -- for our
881 * purposes we expect it to be valid when the response was
882 * signed. The value of "producedAt" is the signing time.
883 */
884 rv = DER_GeneralizedTimeToTime(&response->producedAt,
885 &tbsData->producedAt);
886 if (rv != SECSuccess) {
887 PORT_SetError(SEC_ERROR_OCSP_MALFORMED_RESPONSE);
888 goto cleanup;
889 }
890
891 /*
892 * We need producedAtDate and pkixSignerCert if we are calling a
893 * user-supplied verification function. Let's put their
894 * creation before the code that gets repeated when
895 * non-blocking I/O is used.
896 */
897
898 PKIX_CHECK(
899 pkix_pl_Date_CreateFromPRTime((PRTime)response->producedAt,
900 &(response->producedAtDate),
901 plContext),
902 PKIX_DATECREATEFROMPRTIMEFAILED);
903
904 }
905
906 /*
907 * Just because we have a cert does not mean it is any good; check
908 * it for validity, trust and usage. Use the caller-supplied
909 * verification function, if one was supplied.
910 */
911 if (ocsp_CertIsOCSPDefaultResponder(response->handle,
912 response->signerCert)) {
913 rv = SECSuccess;
914 } else {
915 SECCertUsage certUsage;
916 if (CERT_IsCACert(response->signerCert, NULL)) {
917 certUsage = certUsageAnyCA;
918 } else {
919 certUsage = certUsageStatusResponder;
920 }
921 PKIX_CHECK_ONLY_FATAL(
922 pkix_pl_OcspResponse_VerifyResponse(response, procParams,
923 certUsage, &state,
924 &buildResult, &nbio,
925 plContext),
926 PKIX_CERTVERIFYKEYUSAGEFAILED);
927 if (pkixTempErrorReceived) {
928 rv = SECFailure;
929 goto cleanup;
930 }
931 if (nbio != NULL) {
932 *pNBIOContext = nbio;
933 goto cleanup;
934 }
935 }
936
937 rv = ocsp_VerifyResponseSignature(response->signerCert, signature,
938 tbsResponseDataDER, NULL);
939
940 cleanup:
941 if (rv == SECSuccess) {
942 *pPassed = PKIX_TRUE;
943 } else {
944 *pPassed = PKIX_FALSE;
945 }
946
947 if (signature) {
948 if (signature->wasChecked) {
949 signature->status = rv;
950 }
951
952 if (rv != SECSuccess) {
953 signature->failureReason = PORT_GetError();
954 if (response->signerCert != NULL) {
955 CERT_DestroyCertificate(response->signerCert);
956 response->signerCert = NULL;
957 }
958 } else {
959 /* Save signer's certificate in signature. */
960 signature->cert = CERT_DupCertificate(response->signerCert);
961 }
962 }
963
964 if (issuerCert)
965 CERT_DestroyCertificate(issuerCert);
966
967 PKIX_RETURN(OCSPRESPONSE);
968 }
969
970 /*
971 * FUNCTION: pkix_pl_OcspResponse_GetStatusForCert
972 * DESCRIPTION:
973 *
974 * This function checks the revocation status of the Cert for which the
975 * OcspResponse was obtained, storing PKIX_TRUE at "pPassed" if the Cert has
976 * not been revoked and PKIX_FALSE otherwise.
977 *
978 * PARAMETERS
979 * "response"
980 * The address of the OcspResponse whose certificate status is to be
981 * retrieved. Must be non-NULL.
982 * "pPassed"
983 * Address at which the Boolean result is stored. Must be non-NULL.
984 * "pReturnCode"
985 * Address at which the SECErrorCodes result is stored. Must be non-NULL.
986 * "plContext"
987 * Platform-specific context pointer.
988 * THREAD SAFETY:
989 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
990 * RETURNS:
991 * Returns NULL if the function succeeds.
992 * Returns an OcspResponse Error if the function fails in a non-fatal way.
993 * Returns a Fatal Error if the function fails in an unrecoverable way.
994 */
995 PKIX_Error *
996 pkix_pl_OcspResponse_GetStatusForCert(
997 PKIX_PL_OcspCertID *cid,
998 PKIX_PL_OcspResponse *response,
999 PKIX_Boolean allowCachingOfFailures,
1000 PKIX_PL_Date *validity,
1001 PKIX_Boolean *pPassed,
1002 SECErrorCodes *pReturnCode,
1003 void *plContext)
1004 {
1005 PRTime time = 0;
1006 SECStatus rv = SECFailure;
1007 CERTOCSPSingleResponse *single = NULL;
1008
1009 PKIX_ENTER(OCSPRESPONSE, "pkix_pl_OcspResponse_GetStatusForCert");
1010 PKIX_NULLCHECK_THREE(response, pPassed, pReturnCode);
1011
1012 /*
1013 * It is an error to call this function except following a successful
1014 * return from pkix_pl_OcspResponse_VerifySignature, which would have
1015 * set response->signerCert.
1016 */
1017 PKIX_NULLCHECK_TWO(response->signerCert, response->request);
1018 PKIX_NULLCHECK_TWO(cid, cid->certID);
1019
1020 if (validity != NULL) {
1021 PKIX_Error *er = pkix_pl_Date_GetPRTime(validity, &time, plContext);
1022 PKIX_DECREF(er);
1023 }
1024 if (!time) {
1025 time = PR_Now();
1026 }
1027
1028 rv = ocsp_GetVerifiedSingleResponseForCertID(response->handle,
1029 response->nssOCSPResponse,
1030 cid->certID,
1031 response->signerCert,
1032 time, &single);
1033 if (rv == SECSuccess) {
1034 /*
1035 * Check whether the status says revoked, and if so
1036 * how that compares to the time value passed into this routine.
1037 */
1038 rv = ocsp_CertHasGoodStatus(single->certStatus, time);
1039 }
1040
1041 if (rv == SECSuccess || allowCachingOfFailures) {
1042 /* allowed to update the cache */
1043 PRBool certIDWasConsumed = PR_FALSE;
1044
1045 if (single) {
1046 ocsp_CacheSingleResponse(cid->certID,single,
1047 &certIDWasConsumed);
1048 } else {
1049 cert_RememberOCSPProcessingFailure(cid->certID,
1050 &certIDWasConsumed);
1051 }
1052
1053 if (certIDWasConsumed) {
1054 cid->certID = NULL;
1055 }
1056 }
1057
1058 if (rv == SECSuccess) {
1059 *pPassed = PKIX_TRUE;
1060 *pReturnCode = 0;
1061 } else {
1062 *pPassed = PKIX_FALSE;
1063 *pReturnCode = PORT_GetError();
1064 }
1065
1066 PKIX_RETURN(OCSPRESPONSE);
1067 }
OLDNEW
« no previous file with comments | « nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_ocspresponse.h ('k') | nss/lib/libpkix/pkix_pl_nss/pki/pkix_pl_publickey.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698