tor-browser

The Tor Browser
git clone https://git.dasho.dev/tor-browser.git
Log | Files | Refs | README | LICENSE

pkix_signaturechecker.c (15654B)


      1 /* This Source Code Form is subject to the terms of the Mozilla Public
      2 * License, v. 2.0. If a copy of the MPL was not distributed with this
      3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
      4 /*
      5 * pkix_signaturechecker.c
      6 *
      7 * Functions for signature validation
      8 *
      9 */
     10 
     11 #include "pkix_signaturechecker.h"
     12 
     13 /*
     14 * FUNCTION: pkix_SignatureCheckerstate_Destroy
     15 * (see comments for PKIX_PL_DestructorCallback in pkix_pl_system.h)
     16 */
     17 static PKIX_Error *
     18 pkix_SignatureCheckerState_Destroy(
     19        PKIX_PL_Object *object,
     20        void *plContext)
     21 {
     22        pkix_SignatureCheckerState *state = NULL;
     23 
     24        PKIX_ENTER(SIGNATURECHECKERSTATE,
     25                    "pkix_SignatureCheckerState_Destroy");
     26        PKIX_NULLCHECK_ONE(object);
     27 
     28        /* Check that this object is a signature checker state */
     29        PKIX_CHECK(pkix_CheckType
     30                    (object, PKIX_SIGNATURECHECKERSTATE_TYPE, plContext),
     31                    PKIX_OBJECTNOTSIGNATURECHECKERSTATE);
     32 
     33        state = (pkix_SignatureCheckerState *) object;
     34 
     35        state->prevCertCertSign = PKIX_FALSE;
     36 
     37        PKIX_DECREF(state->prevPublicKey);
     38        PKIX_DECREF(state->prevPublicKeyList);
     39        PKIX_DECREF(state->keyUsageOID);
     40 
     41 cleanup:
     42 
     43        PKIX_RETURN(SIGNATURECHECKERSTATE);
     44 }
     45 
     46 /*
     47 * FUNCTION: pkix_SignatureCheckerState_RegisterSelf
     48 *
     49 * DESCRIPTION:
     50 *  Registers PKIX_SIGNATURECHECKERSTATE_TYPE and its related functions
     51 *  with systemClasses[]
     52 *
     53 * THREAD SAFETY:
     54 *  Not Thread Safe (see Thread Safety Definitions in Programmer's Guide)
     55 *
     56 *  Since this function is only called by PKIX_PL_Initialize, which should
     57 *  only be called once, it is acceptable that this function is not
     58 *  thread-safe.
     59 */
     60 PKIX_Error *
     61 pkix_SignatureCheckerState_RegisterSelf(void *plContext)
     62 {
     63        extern pkix_ClassTable_Entry systemClasses[PKIX_NUMTYPES];
     64        pkix_ClassTable_Entry entry;
     65 
     66        PKIX_ENTER(SIGNATURECHECKERSTATE,
     67                    "pkix_SignatureCheckerState_RegisterSelf");
     68 
     69        entry.description = "SignatureCheckerState";
     70        entry.objCounter = 0;
     71        entry.typeObjectSize = sizeof(pkix_SignatureCheckerState);
     72        entry.destructor = pkix_SignatureCheckerState_Destroy;
     73        entry.equalsFunction = NULL;
     74        entry.hashcodeFunction = NULL;
     75        entry.toStringFunction = NULL;
     76        entry.comparator = NULL;
     77        entry.duplicateFunction = NULL;
     78 
     79        systemClasses[PKIX_SIGNATURECHECKERSTATE_TYPE] = entry;
     80 
     81        PKIX_RETURN(SIGNATURECHECKERSTATE);
     82 }
     83 
     84 /*
     85 * FUNCTION: pkix_SignatureCheckerState_Create
     86 *
     87 * DESCRIPTION:
     88 *  Allocate and initialize SignatureChecker state data.
     89 *
     90 * PARAMETERS
     91 *  "trustedPubKey"
     92 *      Address of trusted Anchor Public Key for verifying first Cert in the
     93 *      chain. Must be non-NULL.
     94 *  "certsRemaining"
     95 *      Number of certificates remaining in the chain.
     96 *  "pCheckerState"
     97 *      Address where SignatureCheckerState will be stored. Must be non-NULL.
     98 *  "plContext"
     99 *      Platform-specific context pointer.
    100 *
    101 * THREAD SAFETY:
    102 *  Not Thread Safe (see Thread Safety Definitions in Programmer's Guide)
    103 *
    104 * RETURNS:
    105 *  Returns NULL if the function succeeds.
    106 *  Returns a SignatureCheckerState Error if the function fails in a
    107 *  non-fatal way.
    108 *  Returns a Fatal Error if the function fails in an unrecoverable way.
    109 */
    110 static PKIX_Error *
    111 pkix_SignatureCheckerState_Create(
    112    PKIX_PL_PublicKey *trustedPubKey,
    113    PKIX_UInt32 certsRemaining,
    114    pkix_SignatureCheckerState **pCheckerState,
    115    void *plContext)
    116 {
    117        pkix_SignatureCheckerState *state = NULL;
    118        PKIX_PL_OID *keyUsageOID = NULL;
    119 
    120        PKIX_ENTER(SIGNATURECHECKERSTATE, "pkix_SignatureCheckerState_Create");
    121        PKIX_NULLCHECK_TWO(trustedPubKey, pCheckerState);
    122 
    123        PKIX_CHECK(PKIX_PL_Object_Alloc
    124                    (PKIX_SIGNATURECHECKERSTATE_TYPE,
    125                    sizeof (pkix_SignatureCheckerState),
    126                    (PKIX_PL_Object **)&state,
    127                    plContext),
    128                    PKIX_COULDNOTCREATESIGNATURECHECKERSTATEOBJECT);
    129 
    130        /* Initialize fields */
    131 
    132        state->prevCertCertSign = PKIX_TRUE;
    133        state->prevPublicKeyList = NULL;
    134        state->certsRemaining = certsRemaining;
    135 
    136        PKIX_INCREF(trustedPubKey);
    137        state->prevPublicKey = trustedPubKey;
    138 
    139        PKIX_CHECK(PKIX_PL_OID_Create
    140                    (PKIX_CERTKEYUSAGE_OID,
    141                    &keyUsageOID,
    142                    plContext),
    143                    PKIX_OIDCREATEFAILED);
    144 
    145        state->keyUsageOID = keyUsageOID;
    146        keyUsageOID = NULL;
    147 
    148        *pCheckerState = state;
    149        state = NULL;
    150 
    151 cleanup:
    152 
    153        PKIX_DECREF(keyUsageOID);
    154        PKIX_DECREF(state); 
    155 
    156        PKIX_RETURN(SIGNATURECHECKERSTATE);
    157 }
    158 
    159 /* --Private-Functions-------------------------------------------- */
    160 
    161 /*
    162 * FUNCTION: pkix_SignatureChecker_Check
    163 * (see comments for PKIX_CertChainChecker_CheckCallback in pkix_checker.h)
    164 */
    165 PKIX_Error *
    166 pkix_SignatureChecker_Check(
    167        PKIX_CertChainChecker *checker,
    168        PKIX_PL_Cert *cert,
    169        PKIX_List *unresolvedCriticalExtensions,
    170        void **pNBIOContext,
    171        void *plContext)
    172 {
    173        pkix_SignatureCheckerState *state = NULL;
    174        PKIX_PL_PublicKey *prevPubKey = NULL;
    175        PKIX_PL_PublicKey *currPubKey = NULL;
    176        PKIX_PL_PublicKey *newPubKey = NULL;
    177        PKIX_PL_PublicKey *pKey = NULL;
    178        PKIX_PL_CertBasicConstraints *basicConstraints = NULL;
    179        PKIX_Error *checkKeyUsageFail = NULL;
    180        PKIX_Error *verifyFail = NULL;
    181        PKIX_Boolean certVerified = PKIX_FALSE;
    182 
    183        PKIX_ENTER(CERTCHAINCHECKER, "pkix_SignatureChecker_Check");
    184        PKIX_NULLCHECK_THREE(checker, cert, pNBIOContext);
    185 
    186        *pNBIOContext = NULL; /* we never block on pending I/O */
    187 
    188        PKIX_CHECK(PKIX_CertChainChecker_GetCertChainCheckerState
    189                    (checker, (PKIX_PL_Object **)&state, plContext),
    190                    PKIX_CERTCHAINCHECKERGETCERTCHAINCHECKERSTATEFAILED);
    191 
    192        (state->certsRemaining)--;
    193 
    194        PKIX_INCREF(state->prevPublicKey);
    195        prevPubKey = state->prevPublicKey;
    196 
    197        /*
    198         * Previous Cert doesn't have CertSign bit on for signature
    199         * verification and it is not a self-issued Cert so there is no
    200         * old key saved. This is considered error.
    201         */
    202        if (state->prevCertCertSign == PKIX_FALSE &&
    203                state->prevPublicKeyList == NULL) {
    204                    PKIX_ERROR(PKIX_KEYUSAGEKEYCERTSIGNBITNOTON);
    205        }
    206 
    207        /* Previous Cert is valid for signature verification, try it first */
    208        if (state->prevCertCertSign == PKIX_TRUE) {
    209                verifyFail = PKIX_PL_Cert_VerifySignature
    210                        (cert, prevPubKey, plContext);
    211                if (verifyFail == NULL) {
    212                        certVerified = PKIX_TRUE;
    213                } else {
    214                        certVerified = PKIX_FALSE;
    215                }
    216        }
    217 
    218 #ifdef NIST_TEST_4_5_4_AND_4_5_6
    219 
    220        /*
    221         * Following codes under this compiler flag is implemented for
    222         * special cases of NIST tests 4.5.4 and 4.5.6. We are not sure
    223         * we should handle these two tests as what is implemented so the
    224         * codes are commented out, and the tests fails (for now).
    225         * For Cert chain validation, our assumption is all the Certs on
    226         * the chain are using its previous Cert's public key to decode
    227         * its current key. But for thses two tests, keys are used not
    228         * in this precedent order, we can either
    229         * 1) Use what is implemented here: take in what Cert order NIST
    230         *    specified and for continuous self-issued Certs, stacking up
    231         *    their keys and tries all of them in FILO order.
    232         *    But this method breaks the idea of chain key presdency.
    233         * 2) Use Build Chain facility: we will specify the valid Certs
    234         *    order (means key precedency is kept) and count on Build Chain
    235         *    to get the Certs that can fill for the needed keys. This may have
    236         *    performance impact.
    237         * 3) Fetch Certs from CertStore: we will specifiy the valid Certs
    238         *    order and use CertSelector on SubjectName to get a list of
    239         *    candidates Certs to fill in for the needed keys.
    240         * Anyhow, the codes are kept around just in case we want to use
    241         * solution one...
    242         */
    243 
    244        /* If failed and previous key is self-issued, try its old key(s) */
    245        if (certVerified == PKIX_FALSE && state->prevPublicKeyList != NULL) {
    246 
    247                /* Verify from keys on the list */
    248                PKIX_CHECK(PKIX_List_GetLength
    249                        (state->prevPublicKeyList, &numKeys, plContext),
    250                        PKIX_LISTGETLENGTHFAILED);
    251 
    252                for (i = numKeys - 1; i >= 0; i--) {
    253 
    254                        PKIX_CHECK(PKIX_List_GetItem
    255                                (state->prevPublicKeyList,
    256                                i,
    257                                (PKIX_PL_Object **) &pKey,
    258                                plContext),
    259                                PKIX_LISTGETITEMFAILED);
    260 
    261                        PKIX_DECREF(verifyFail);
    262                        verifyFail = PKIX_PL_Cert_VerifySignature
    263                                (cert, pKey, plContext);
    264 
    265                        if (verifyFail == NULL) {
    266                                certVerified = PKIX_TRUE;
    267                                break;
    268                        } else {
    269                                certVerified = PKIX_FALSE;
    270                        }
    271 
    272                        PKIX_DECREF(pKey);
    273                }
    274        }
    275 #endif
    276 
    277        if (certVerified == PKIX_FALSE) {
    278                pkixErrorResult = verifyFail;
    279                verifyFail = NULL;
    280                PKIX_ERROR(PKIX_VALIDATIONFAILEDCERTSIGNATURECHECKING);
    281        }
    282 
    283 #ifdef NIST_TEST_4_5_4_AND_4_5_6
    284        /*
    285         * Check if Cert is self-issued. If so, the old key(s) is saved, in
    286         * conjunction to the new key, for verifying CERT validity later.
    287         */
    288        PKIX_CHECK(pkix_IsCertSelfIssued(cert, &selfIssued, plContext),
    289                    PKIX_ISCERTSELFISSUEFAILED);
    290 
    291        /*
    292         * Check if Cert is self-issued. If so, the public key of the Cert
    293         * that issues this Cert (old key) can be used together with this
    294         * current key (new key) for key verification. If there are multiple
    295         * self-issued certs, keys of those Certs (old keys) can also be used
    296         * for key verification. Old key(s) is saved in a list (PrevPublickKey-
    297         * List) and cleared when a Cert is no longer self-issued. PrevPublic-
    298         * Key keep key of the previous Cert.
    299         */
    300        if (selfIssued == PKIX_TRUE) {
    301 
    302            /* Make sure previous Cert is valid for signature verification */
    303            if (state->prevCertCertSign == PKIX_TRUE) {
    304 
    305                if (state->prevPublicKeyList == NULL) {
    306 
    307                        PKIX_CHECK(PKIX_List_Create
    308                                (&state->prevPublicKeyList, plContext),
    309                                PKIX_LISTCREATEFALIED);
    310 
    311                }
    312 
    313                PKIX_CHECK(PKIX_List_AppendItem
    314                            (state->prevPublicKeyList,
    315                            (PKIX_PL_Object *) state->prevPublicKey,
    316                            plContext),
    317                            PKIX_LISTAPPENDITEMFAILED);
    318            }
    319 
    320        } else {
    321            /* Not self-issued Cert any more, clear old key(s) saved */
    322            PKIX_DECREF(state->prevPublicKeyList);
    323        }
    324 #endif
    325 
    326        /* Save current key as prevPublicKey */
    327        PKIX_CHECK(PKIX_PL_Cert_GetSubjectPublicKey
    328                    (cert, &currPubKey, plContext),
    329                    PKIX_CERTGETSUBJECTPUBLICKEYFAILED);
    330 
    331        PKIX_CHECK(PKIX_PL_PublicKey_MakeInheritedDSAPublicKey
    332                    (currPubKey, prevPubKey, &newPubKey, plContext),
    333                    PKIX_PUBLICKEYMAKEINHERITEDDSAPUBLICKEYFAILED);
    334 
    335        if (newPubKey == NULL){
    336                PKIX_INCREF(currPubKey);
    337                newPubKey = currPubKey;
    338        }
    339 
    340        PKIX_INCREF(newPubKey);
    341        PKIX_DECREF(state->prevPublicKey);
    342 
    343        state->prevPublicKey = newPubKey;
    344 
    345        /* Save this Cert key usage CertSign bit */
    346        if (state->certsRemaining != 0) {
    347                checkKeyUsageFail = PKIX_PL_Cert_VerifyKeyUsage
    348                        (cert, PKIX_KEY_CERT_SIGN, plContext);
    349 
    350                state->prevCertCertSign = (checkKeyUsageFail == NULL)?
    351                        PKIX_TRUE:PKIX_FALSE;
    352 
    353                PKIX_DECREF(checkKeyUsageFail);
    354        }
    355 
    356        /* Remove Key Usage Extension OID from list */
    357        if (unresolvedCriticalExtensions != NULL) {
    358 
    359                PKIX_CHECK(pkix_List_Remove
    360                            (unresolvedCriticalExtensions,
    361                            (PKIX_PL_Object *) state->keyUsageOID,
    362                            plContext),
    363                            PKIX_LISTREMOVEFAILED);
    364        }
    365 
    366        PKIX_CHECK(PKIX_CertChainChecker_SetCertChainCheckerState
    367                    (checker, (PKIX_PL_Object *)state, plContext),
    368                    PKIX_CERTCHAINCHECKERSETCERTCHAINCHECKERSTATEFAILED);
    369 
    370 cleanup:
    371 
    372        PKIX_DECREF(state);
    373        PKIX_DECREF(pKey);
    374        PKIX_DECREF(prevPubKey);
    375        PKIX_DECREF(currPubKey);
    376        PKIX_DECREF(newPubKey);
    377        PKIX_DECREF(basicConstraints);
    378        PKIX_DECREF(verifyFail);
    379        PKIX_DECREF(checkKeyUsageFail);
    380 
    381        PKIX_RETURN(CERTCHAINCHECKER);
    382 
    383 }
    384 
    385 /*
    386 * FUNCTION: pkix_SignatureChecker_Initialize
    387 * DESCRIPTION:
    388 *
    389 *  Creates a new CertChainChecker and stores it at "pChecker", where it will
    390 *  be used by pkix_SignatureChecker_Check to check that the public key in
    391 *  the checker's state is able to successfully validate the certificate's
    392 *  signature. The PublicKey pointed to by "trustedPubKey" is used to
    393 *  initialize the checker's state.
    394 *
    395 * PARAMETERS:
    396 *  "trustedPubKey"
    397 *      Address of PublicKey representing the trusted public key used to
    398 *      initialize the state of this checker. Must be non-NULL.
    399 *  "certsRemaining"
    400 *      Number of certificates remaining in the chain.
    401 *  "pChecker"
    402 *      Address where object pointer will be stored. Must be non-NULL.
    403 *  "plContext"
    404 *      Platform-specific context pointer.
    405 * THREAD SAFETY:
    406 *  Thread Safe (see Thread Safety Definitions in Programmer's Guide)
    407 * RETURNS:
    408 *  Returns NULL if the function succeeds.
    409 *  Returns a CertChainChecker Error if the function fails in a non-fatal way.
    410 *  Returns a Fatal Error if the function fails in an unrecoverable way.
    411 */
    412 PKIX_Error *
    413 pkix_SignatureChecker_Initialize(
    414        PKIX_PL_PublicKey *trustedPubKey,
    415        PKIX_UInt32 certsRemaining,
    416        PKIX_CertChainChecker **pChecker,
    417        void *plContext)
    418 {
    419        pkix_SignatureCheckerState* state = NULL;
    420        PKIX_ENTER(CERTCHAINCHECKER, "PKIX_SignatureChecker_Initialize");
    421        PKIX_NULLCHECK_TWO(pChecker, trustedPubKey);
    422 
    423        PKIX_CHECK(pkix_SignatureCheckerState_Create
    424                    (trustedPubKey, certsRemaining, &state, plContext),
    425                    PKIX_SIGNATURECHECKERSTATECREATEFAILED);
    426 
    427        PKIX_CHECK(PKIX_CertChainChecker_Create
    428                    (pkix_SignatureChecker_Check,
    429                    PKIX_FALSE,
    430                    PKIX_FALSE,
    431                    NULL,
    432                    (PKIX_PL_Object *) state,
    433                    pChecker,
    434                    plContext),
    435                    PKIX_CERTCHAINCHECKERCREATEFAILED);
    436 
    437 cleanup:
    438 
    439        PKIX_DECREF(state);
    440 
    441        PKIX_RETURN(CERTCHAINCHECKER);
    442 
    443 }