Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(153)

Unified Diff: net/cert/internal/verify_certificate_chain.h

Issue 2903283002: Add policies support to VerifyCertificateChain(). (Closed)
Patch Set: improve comments, and null policy tree when anyPolicy is incorrectly mapped Created 3 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « net/cert/internal/test_helpers.cc ('k') | net/cert/internal/verify_certificate_chain.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/cert/internal/verify_certificate_chain.h
diff --git a/net/cert/internal/verify_certificate_chain.h b/net/cert/internal/verify_certificate_chain.h
index 8d1f044805192df088776b66f6a9b9f6f6c9a50e..a8b29176d756d8af2b38efe9b535606060a2eb74 100644
--- a/net/cert/internal/verify_certificate_chain.h
+++ b/net/cert/internal/verify_certificate_chain.h
@@ -5,7 +5,7 @@
#ifndef NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_
#define NET_CERT_INTERNAL_VERIFY_CERTIFICATE_CHAIN_H_
-#include <vector>
+#include <set>
#include "base/compiler_specific.h"
#include "base/memory/ref_counted.h"
@@ -30,72 +30,160 @@ enum class KeyPurpose {
CLIENT_AUTH,
};
+enum class InitialExplicitPolicy {
+ kFalse,
+ kTrue,
+};
+
+enum class InitialPolicyMappingInhibit {
+ kFalse,
+ kTrue,
+};
+
+enum class InitialAnyPolicyInhibit {
+ kFalse,
+ kTrue,
+};
+
// VerifyCertificateChain() verifies an ordered certificate path in accordance
-// with RFC 5280 (with some modifications [1]).
+// with RFC 5280's "Certification Path Validation" algorithm (section 6).
//
-// [1] Deviations from RFC 5280:
+// -----------------------------------------
+// Deviations from RFC 5280
+// -----------------------------------------
//
-// * If Extended Key Usage appears on intermediates it is treated as a
-// restriction on subordinate certificates.
+// * If Extended Key Usage appears on intermediates, it is treated as
+// a restriction on subordinate certificates.
//
-// The caller is responsible for additionally checking:
-//
-// * The end-entity's KeyUsage before using its SPKI.
-// * The end-entity's name/subjectAltName (note that name constraints from
-// intermediates will have already been applied, so just need to check
-// the end-entity for a match).
-// * Policies
+// -----------------------------------------
+// Additional responsibilities of the caller
+// -----------------------------------------
//
-// WARNING: This implementation is in progress, and is currently incomplete.
-// Consult an OWNER before using it.
+// After successful path verification, the caller is responsible for
+// subsequently checking:
//
-// TODO(eroman): Take a CertPath instead of ParsedCertificateList +
-// TrustAnchor.
+// * The end-entity's KeyUsage before using its SPKI.
+// * The end-entity's name/subjectAltName. Name constraints from intermediates
+// will have already been applied, so it is sufficient to check the
+// end-entity for a match.
//
// ---------
// Inputs
// ---------
//
-// cert_chain:
-// A non-empty chain of N DER-encoded certificates, listed in the
-// "forward" direction. The first certificate is the target certificate to
-// verify, and the last certificate has trustedness given by
-// |last_cert_trust|.
+// certs:
+// A non-empty chain of DER-encoded certificates, listed in the
+// "forward" direction. The first certificate is the target
+// certificate to verify, and the last certificate has trustedness
+// given by |last_cert_trust| (generally a trust anchor).
+//
+// * certs[0] is the target certificate to verify.
+// * certs[i+1] holds the certificate that issued cert_chain[i].
+// * certs[N-1] the root certificate
//
-// * cert_chain[0] is the target certificate to verify.
-// * cert_chain[i+1] holds the certificate that issued cert_chain[i].
-// * cert_chain[N-1] the root certificate
+// Note that THIS IS NOT identical in meaning to the same named
+// "certs" input defined in RFC 5280 section 6.1.1.a. The differences
+// are:
+//
+// * The order of certificates is reversed
+// * In RFC 5280 "certs" DOES NOT include the trust anchor
//
// last_cert_trust:
-// Trustedness of certs.back(). The trustedness of certs.back() MUST BE
-// decided by the caller -- this function takes it purely as an input.
-// Moreover, the CertificateTrust can be used to specify trust anchor
-// constraints [1]
+// Trustedness of |certs.back()|. The trustedness of |certs.back()|
+// MUST BE decided by the caller -- this function takes it purely as
+// an input. Moreover, the CertificateTrust can be used to specify
+// trust anchor constraints.
+//
+// This combined with |certs.back()| (the root certificate) fills a
+// similar role to "trust anchor information" defined in RFC 5280
+// section 6.1.1.d.
//
// signature_policy:
// The policy to use when verifying signatures (what hash algorithms are
// allowed, what length keys, what named curves, etc).
//
// time:
-// The UTC time to use for expiration checks.
+// The UTC time to use for expiration checks. This is equivalent to
+// the input from RFC 5280 section 6.1.1:
//
-// key_purpose:
+// (b) the current date/time.
+//
+// required_key_purpose:
// The key purpose that the target certificate needs to be valid for.
//
+// user_initial_policy_set:
+// This is equivalent to the same named input in RFC 5280 section
+// 6.1.1:
+//
+// (c) user-initial-policy-set: A set of certificate policy
+// identifiers naming the policies that are acceptable to the
+// certificate user. The user-initial-policy-set contains the
+// special value any-policy if the user is not concerned about
+// certificate policy.
+//
+// initial_policy_mapping_inhibit:
+// This is equivalent to the same named input in RFC 5280 section
+// 6.1.1:
+//
+// (e) initial-policy-mapping-inhibit, which indicates if policy
+// mapping is allowed in the certification path.
+//
+// initial_explicit_policy:
+// This is equivalent to the same named input in RFC 5280 section
+// 6.1.1:
+//
+// (f) initial-explicit-policy, which indicates if the path must be
+// valid for at least one of the certificate policies in the
+// user-initial-policy-set.
+//
+// initial_any_policy_inhibit:
+// This is equivalent to the same named input in RFC 5280 section
+// 6.1.1:
+//
+// (g) initial-any-policy-inhibit, which indicates whether the
+// anyPolicy OID should be processed if it is included in a
+// certificate.
+//
// ---------
// Outputs
// ---------
+//
+// user_constrained_policy_set:
+// Can be null. If non-null, |user_constrained_policy_set| will be filled
+// with the matching policies (intersected with user_initial_policy_set).
+// This is equivalent to the same named output in X.509 section 10.2.
+// Note that it is OK for this to point to input user_initial_policy_set.
+//
// errors:
// Must be non-null. The set of errors/warnings encountered while
// validating the path are appended to this structure. If verification
// failed, then there is guaranteed to be at least 1 high severity error
// written to |errors|.
//
-// [1] Conceptually VerifyCertificateChain() sets RFC 5937's
-// "enforceTrustAnchorConstraints" to true. And one specifies whether to
-// interpret a root certificate as having trust anchor constraints through the
-// |last_cert_trust| parameter. The constraints are just a subset of the
-// extensions present in the certificate:
+// -------------------------
+// Trust Anchor constraints
+// -------------------------
+//
+// Conceptually, VerifyCertificateChain() sets RFC 5937's
+// "enforceTrustAnchorConstraints" to true.
+//
+// One specifies trust anchor constraints using the |last_cert_trust|
+// parameter in conjunction with extensions appearing in |certs.back()|.
+//
+// The trust anchor |certs.back()| is always passed as a certificate to
+// this function, however the manner in which that certificate is
+// interpreted depends on |last_cert_trust|:
+//
+// TRUSTED_ANCHOR:
+//
+// No properties from the root certificate, other than its Subject and
+// SPKI, are checked during verification. This is the usual
+// interpretation for a "trust anchor".
+//
+// TRUSTED_ANCHOR_WITH_CONSTRAINTS:
+//
+// Only a subset of extensions and properties from the certificate are checked,
+// as described by RFC 5937.
//
// * Signature: No
// * Validity (expiration): No
@@ -104,17 +192,24 @@ enum class KeyPurpose {
// * Basic constraints: Yes, but only the pathlen (CA=false is accepted)
// * Name constraints: Yes
// * Certificate policies: Not currently, TODO(crbug.com/634453)
+// * Policy Mappings: No
// * inhibitAnyPolicy: Not currently, TODO(crbug.com/634453)
// * PolicyConstraints: Not currently, TODO(crbug.com/634452)
//
// The presence of any other unrecognized extension marked as critical fails
// validation.
-NET_EXPORT void VerifyCertificateChain(const ParsedCertificateList& certs,
- const CertificateTrust& last_cert_trust,
- const SignaturePolicy* signature_policy,
- const der::GeneralizedTime& time,
- KeyPurpose required_key_purpose,
- CertPathErrors* errors);
+NET_EXPORT void VerifyCertificateChain(
+ const ParsedCertificateList& certs,
+ const CertificateTrust& last_cert_trust,
+ const SignaturePolicy* signature_policy,
+ const der::GeneralizedTime& time,
+ KeyPurpose required_key_purpose,
+ InitialExplicitPolicy initial_explicit_policy,
+ const std::set<der::Input>& user_initial_policy_set,
+ InitialPolicyMappingInhibit initial_policy_mapping_inhibit,
+ InitialAnyPolicyInhibit initial_any_policy_inhibit,
+ std::set<der::Input>* user_constrained_policy_set,
+ CertPathErrors* errors);
// TODO(crbug.com/634443): Move exported errors to a central location?
extern CertErrorId kValidityFailedNotAfter;
« no previous file with comments | « net/cert/internal/test_helpers.cc ('k') | net/cert/internal/verify_certificate_chain.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698