ct_sct.c 10.6 KB
Newer Older
1
/*
R
Rich Salz 已提交
2
 * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved.
3
 *
R
Rich Salz 已提交
4 5 6 7
 * Licensed under the OpenSSL license (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
8 9
 */

10 11 12 13 14 15 16 17 18
#ifdef OPENSSL_NO_CT
# error "CT disabled"
#endif

#include <openssl/ct.h>
#include <openssl/err.h>
#include <openssl/evp.h>
#include <openssl/tls1.h>
#include <openssl/x509.h>
19

20
#include "ct_local.h"
21 22 23

SCT *SCT_new(void)
{
24
    SCT *sct = OPENSSL_zalloc(sizeof(*sct));
25

26 27 28 29
    if (sct == NULL) {
        CTerr(CT_F_SCT_NEW, ERR_R_MALLOC_FAILURE);
        return NULL;
    }
30 31 32

    sct->entry_type = CT_LOG_ENTRY_TYPE_NOT_SET;
    sct->version = SCT_VERSION_NOT_SET;
33 34 35 36 37
    return sct;
}

void SCT_free(SCT *sct)
{
38 39 40 41 42 43 44 45
    if (sct == NULL)
        return;

    OPENSSL_free(sct->log_id);
    OPENSSL_free(sct->ext);
    OPENSSL_free(sct->sig);
    OPENSSL_free(sct->sct);
    OPENSSL_free(sct);
46 47
}

48 49 50 51 52
void SCT_LIST_free(STACK_OF(SCT) *a)
{
    sk_SCT_pop_free(a, SCT_free);
}

53 54
int SCT_set_version(SCT *sct, sct_version_t version)
{
55
    if (version != SCT_VERSION_V1) {
56 57 58 59
        CTerr(CT_F_SCT_SET_VERSION, CT_R_UNSUPPORTED_VERSION);
        return 0;
    }
    sct->version = version;
60
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
61 62 63
    return 1;
}

64
int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type)
65
{
66 67
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;

68 69 70 71 72
    switch (entry_type) {
    case CT_LOG_ENTRY_TYPE_X509:
    case CT_LOG_ENTRY_TYPE_PRECERT:
        sct->entry_type = entry_type;
        return 1;
R
Rich Salz 已提交
73 74
    case CT_LOG_ENTRY_TYPE_NOT_SET:
        break;
75
    }
R
Rich Salz 已提交
76 77
    CTerr(CT_F_SCT_SET_LOG_ENTRY_TYPE, CT_R_UNSUPPORTED_ENTRY_TYPE);
    return 0;
78 79 80 81
}

int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len)
{
82
    if (sct->version == SCT_VERSION_V1 && log_id_len != CT_V1_HASHLEN) {
83 84 85
        CTerr(CT_F_SCT_SET0_LOG_ID, CT_R_INVALID_LOG_ID_LENGTH);
        return 0;
    }
86

87 88 89
    OPENSSL_free(sct->log_id);
    sct->log_id = log_id;
    sct->log_id_len = log_id_len;
90
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
91 92 93
    return 1;
}

94 95
int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len)
{
96
    if (sct->version == SCT_VERSION_V1 && log_id_len != CT_V1_HASHLEN) {
97 98 99 100 101
        CTerr(CT_F_SCT_SET1_LOG_ID, CT_R_INVALID_LOG_ID_LENGTH);
        return 0;
    }

    OPENSSL_free(sct->log_id);
102 103
    sct->log_id = NULL;
    sct->log_id_len = 0;
104
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
105

106 107
    if (log_id != NULL && log_id_len > 0) {
        sct->log_id = OPENSSL_memdup(log_id, log_id_len);
108 109 110 111
        if (sct->log_id == NULL) {
            CTerr(CT_F_SCT_SET1_LOG_ID, ERR_R_MALLOC_FAILURE);
            return 0;
        }
112
        sct->log_id_len = log_id_len;
113 114 115 116 117
    }
    return 1;
}


118 119 120
void SCT_set_timestamp(SCT *sct, uint64_t timestamp)
{
    sct->timestamp = timestamp;
121
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
122 123 124 125
}

int SCT_set_signature_nid(SCT *sct, int nid)
{
F
FdaSilvaYY 已提交
126
    switch (nid) {
127 128 129
    case NID_sha256WithRSAEncryption:
        sct->hash_alg = TLSEXT_hash_sha256;
        sct->sig_alg = TLSEXT_signature_rsa;
130
        sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
131 132 133 134
        return 1;
    case NID_ecdsa_with_SHA256:
        sct->hash_alg = TLSEXT_hash_sha256;
        sct->sig_alg = TLSEXT_signature_ecdsa;
135
        sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
136 137 138 139 140 141 142 143 144 145 146 147
        return 1;
    default:
        CTerr(CT_F_SCT_SET_SIGNATURE_NID, CT_R_UNRECOGNIZED_SIGNATURE_NID);
        return 0;
    }
}

void SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len)
{
    OPENSSL_free(sct->ext);
    sct->ext = ext;
    sct->ext_len = ext_len;
148
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
149 150
}

151 152 153 154 155
int SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len)
{
    OPENSSL_free(sct->ext);
    sct->ext = NULL;
    sct->ext_len = 0;
156
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
157 158 159 160 161 162 163 164 165 166 167 168

    if (ext != NULL && ext_len > 0) {
        sct->ext = OPENSSL_memdup(ext, ext_len);
        if (sct->ext == NULL) {
            CTerr(CT_F_SCT_SET1_EXTENSIONS, ERR_R_MALLOC_FAILURE);
            return 0;
        }
        sct->ext_len = ext_len;
    }
    return 1;
}

169 170 171 172 173
void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len)
{
    OPENSSL_free(sct->sig);
    sct->sig = sig;
    sct->sig_len = sig_len;
174
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
175 176
}

177 178 179
int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len)
{
    OPENSSL_free(sct->sig);
180 181
    sct->sig = NULL;
    sct->sig_len = 0;
182
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
183 184

    if (sig != NULL && sig_len > 0) {
185 186 187 188 189
        sct->sig = OPENSSL_memdup(sig, sig_len);
        if (sct->sig == NULL) {
            CTerr(CT_F_SCT_SET1_SIGNATURE, ERR_R_MALLOC_FAILURE);
            return 0;
        }
190
        sct->sig_len = sig_len;
191 192 193 194
    }
    return 1;
}

195 196 197 198 199
sct_version_t SCT_get_version(const SCT *sct)
{
    return sct->version;
}

200
ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct)
201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217
{
    return sct->entry_type;
}

size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id)
{
    *log_id = sct->log_id;
    return sct->log_id_len;
}

uint64_t SCT_get_timestamp(const SCT *sct)
{
    return sct->timestamp;
}

int SCT_get_signature_nid(const SCT *sct)
{
218
    if (sct->version == SCT_VERSION_V1) {
219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
        if (sct->hash_alg == TLSEXT_hash_sha256) {
            switch (sct->sig_alg) {
            case TLSEXT_signature_ecdsa:
                return NID_ecdsa_with_SHA256;
            case TLSEXT_signature_rsa:
                return NID_sha256WithRSAEncryption;
            default:
                return NID_undef;
            }
        }
    }
    return NID_undef;
}

size_t SCT_get0_extensions(const SCT *sct, unsigned char **ext)
{
    *ext = sct->ext;
    return sct->ext_len;
}

size_t SCT_get0_signature(const SCT *sct, unsigned char **sig)
{
    *sig = sct->sig;
    return sct->sig_len;
}

245
int SCT_is_complete(const SCT *sct)
246 247
{
    switch (sct->version) {
248
    case SCT_VERSION_NOT_SET:
249
        return 0;
250 251
    case SCT_VERSION_V1:
        return sct->log_id != NULL && SCT_signature_is_complete(sct);
252 253 254 255 256
    default:
        return sct->sct != NULL; /* Just need cached encoding */
    }
}

257 258 259 260 261 262
int SCT_signature_is_complete(const SCT *sct)
{
    return SCT_get_signature_nid(sct) != NID_undef &&
        sct->sig != NULL && sct->sig_len > 0;
}

R
Rob Percival 已提交
263 264 265 266 267 268 269 270
sct_source_t SCT_get_source(const SCT *sct)
{
    return sct->source;
}

int SCT_set_source(SCT *sct, sct_source_t source)
{
    sct->source = source;
271
    sct->validation_status = SCT_VALIDATION_STATUS_NOT_SET;
R
Rob Percival 已提交
272 273 274 275 276 277
    switch (source) {
    case SCT_SOURCE_TLS_EXTENSION:
    case SCT_SOURCE_OCSP_STAPLED_RESPONSE:
        return SCT_set_log_entry_type(sct, CT_LOG_ENTRY_TYPE_X509);
    case SCT_SOURCE_X509V3_EXTENSION:
        return SCT_set_log_entry_type(sct, CT_LOG_ENTRY_TYPE_PRECERT);
R
Rich Salz 已提交
278 279
    case SCT_SOURCE_UNKNOWN:
        break;
R
Rob Percival 已提交
280
    }
R
Rich Salz 已提交
281 282
    /* if we aren't sure, leave the log entry type alone */
    return 1;
R
Rob Percival 已提交
283 284
}

R
Rob Percival 已提交
285 286 287 288 289 290 291 292 293 294
sct_validation_status_t SCT_get_validation_status(const SCT *sct)
{
    return sct->validation_status;
}

int SCT_validate(SCT *sct, const CT_POLICY_EVAL_CTX *ctx)
{
    int is_sct_valid = -1;
    SCT_CTX *sctx = NULL;
    X509_PUBKEY *pub = NULL, *log_pkey = NULL;
R
Rob Percival 已提交
295
    const CTLOG *log;
R
Rob Percival 已提交
296

297 298 299 300
    /*
     * With an unrecognized SCT version we don't know what such an SCT means,
     * let alone validate one.  So we return validation failure (0).
     */
R
Rob Percival 已提交
301
    if (sct->version != SCT_VERSION_V1) {
R
Rob Percival 已提交
302
        sct->validation_status = SCT_VALIDATION_STATUS_UNKNOWN_VERSION;
303
        return 0;
R
Rob Percival 已提交
304 305
    }

R
Rob Percival 已提交
306 307 308
    log = CTLOG_STORE_get0_log_by_id(ctx->log_store,
                                     sct->log_id, sct->log_id_len);

309
    /* Similarly, an SCT from an unknown log also cannot be validated. */
R
Rob Percival 已提交
310
    if (log == NULL) {
R
Rob Percival 已提交
311
        sct->validation_status = SCT_VALIDATION_STATUS_UNKNOWN_LOG;
312
        return 0;
R
Rob Percival 已提交
313 314 315 316 317 318
    }

    sctx = SCT_CTX_new();
    if (sctx == NULL)
        goto err;

R
Rob Percival 已提交
319
    if (X509_PUBKEY_set(&log_pkey, CTLOG_get0_public_key(log)) != 1)
R
Rob Percival 已提交
320 321 322 323 324 325 326 327 328 329 330 331
        goto err;
    if (SCT_CTX_set1_pubkey(sctx, log_pkey) != 1)
        goto err;

    if (SCT_get_log_entry_type(sct) == CT_LOG_ENTRY_TYPE_PRECERT) {
        EVP_PKEY *issuer_pkey;

        if (ctx->issuer == NULL) {
            sct->validation_status = SCT_VALIDATION_STATUS_UNVERIFIED;
            goto end;
        }

R
Rob Percival 已提交
332
        issuer_pkey = X509_get0_pubkey(ctx->issuer);
R
Rob Percival 已提交
333 334 335 336 337 338 339

        if (X509_PUBKEY_set(&pub, issuer_pkey) != 1)
            goto err;
        if (SCT_CTX_set1_issuer_pubkey(sctx, pub) != 1)
            goto err;
    }

340 341
    SCT_CTX_set_time(sctx, ctx->epoch_time_in_ms);

342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359
    /*
     * XXX: Potential for optimization.  This repeats some idempotent heavy
     * lifting on the certificate for each candidate SCT, and appears to not
     * use any information in the SCT itself, only the certificate is
     * processed.  So it may make more sense to to do this just once, perhaps
     * associated with the shared (by all SCTs) policy eval ctx.
     *
     * XXX: Failure here is global (SCT independent) and represents either an
     * issue with the certificate (e.g. duplicate extensions) or an out of
     * memory condition.  When the certificate is incompatible with CT, we just
     * mark the SCTs invalid, rather than report a failure to determine the
     * validation status.  That way, callbacks that want to do "soft" SCT
     * processing will not abort handshakes with false positive internal
     * errors.  Since the function does not distinguish between certificate
     * issues (peer's fault) and internal problems (out fault) the safe thing
     * to do is to report a validation failure and let the callback or
     * application decide what to do.
     */
R
Rob Percival 已提交
360
    if (SCT_CTX_set1_cert(sctx, ctx->cert, NULL) != 1)
361 362
        sct->validation_status = SCT_VALIDATION_STATUS_UNVERIFIED;
    else
363
        sct->validation_status = SCT_CTX_verify(sctx, sct) == 1 ?
R
Rob Percival 已提交
364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396
            SCT_VALIDATION_STATUS_VALID : SCT_VALIDATION_STATUS_INVALID;

end:
    is_sct_valid = sct->validation_status == SCT_VALIDATION_STATUS_VALID;
err:
    X509_PUBKEY_free(pub);
    X509_PUBKEY_free(log_pkey);
    SCT_CTX_free(sctx);

    return is_sct_valid;
}

int SCT_LIST_validate(const STACK_OF(SCT) *scts, CT_POLICY_EVAL_CTX *ctx)
{
    int are_scts_valid = 1;
    int sct_count = scts != NULL ? sk_SCT_num(scts) : 0;
    int i;

    for (i = 0; i < sct_count; ++i) {
        int is_sct_valid = -1;
        SCT *sct = sk_SCT_value(scts, i);

        if (sct == NULL)
            continue;

        is_sct_valid = SCT_validate(sct, ctx);
        if (is_sct_valid < 0)
            return is_sct_valid;
        are_scts_valid &= is_sct_valid;
    }

    return are_scts_valid;
}