yuezonghe | 824eb0c | 2024-06-27 02:32:26 -0700 | [diff] [blame^] | 1 | /* |
| 2 | * Copyright 2014-2020 The OpenSSL Project Authors. All Rights Reserved. |
| 3 | * |
| 4 | * Licensed under the OpenSSL license (the "License"). You may not use |
| 5 | * this file except in compliance with the License. You can obtain a copy |
| 6 | * in the file LICENSE in the source distribution or at |
| 7 | * https://www.openssl.org/source/license.html |
| 8 | */ |
| 9 | |
| 10 | #include "internal/refcount.h" |
| 11 | |
| 12 | /* |
| 13 | * This structure holds all parameters associated with a verify operation by |
| 14 | * including an X509_VERIFY_PARAM structure in related structures the |
| 15 | * parameters used can be customized |
| 16 | */ |
| 17 | |
| 18 | struct X509_VERIFY_PARAM_st { |
| 19 | char *name; |
| 20 | time_t check_time; /* Time to use */ |
| 21 | uint32_t inh_flags; /* Inheritance flags */ |
| 22 | unsigned long flags; /* Various verify flags */ |
| 23 | int purpose; /* purpose to check untrusted certificates */ |
| 24 | int trust; /* trust setting to check */ |
| 25 | int depth; /* Verify depth */ |
| 26 | int auth_level; /* Security level for chain verification */ |
| 27 | STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */ |
| 28 | /* Peer identity details */ |
| 29 | STACK_OF(OPENSSL_STRING) *hosts; /* Set of acceptable names */ |
| 30 | unsigned int hostflags; /* Flags to control matching features */ |
| 31 | char *peername; /* Matching hostname in peer certificate */ |
| 32 | char *email; /* If not NULL email address to match */ |
| 33 | size_t emaillen; |
| 34 | unsigned char *ip; /* If not NULL IP address to match */ |
| 35 | size_t iplen; /* Length of IP address */ |
| 36 | }; |
| 37 | |
| 38 | /* No error callback if depth < 0 */ |
| 39 | int x509_check_cert_time(X509_STORE_CTX *ctx, X509 *x, int depth); |
| 40 | |
| 41 | /* a sequence of these are used */ |
| 42 | struct x509_attributes_st { |
| 43 | ASN1_OBJECT *object; |
| 44 | STACK_OF(ASN1_TYPE) *set; |
| 45 | }; |
| 46 | |
| 47 | struct X509_extension_st { |
| 48 | ASN1_OBJECT *object; |
| 49 | ASN1_BOOLEAN critical; |
| 50 | ASN1_OCTET_STRING value; |
| 51 | }; |
| 52 | |
| 53 | /* |
| 54 | * Method to handle CRL access. In general a CRL could be very large (several |
| 55 | * Mb) and can consume large amounts of resources if stored in memory by |
| 56 | * multiple processes. This method allows general CRL operations to be |
| 57 | * redirected to more efficient callbacks: for example a CRL entry database. |
| 58 | */ |
| 59 | |
| 60 | #define X509_CRL_METHOD_DYNAMIC 1 |
| 61 | |
| 62 | struct x509_crl_method_st { |
| 63 | int flags; |
| 64 | int (*crl_init) (X509_CRL *crl); |
| 65 | int (*crl_free) (X509_CRL *crl); |
| 66 | int (*crl_lookup) (X509_CRL *crl, X509_REVOKED **ret, |
| 67 | ASN1_INTEGER *ser, X509_NAME *issuer); |
| 68 | int (*crl_verify) (X509_CRL *crl, EVP_PKEY *pk); |
| 69 | }; |
| 70 | |
| 71 | struct x509_lookup_method_st { |
| 72 | char *name; |
| 73 | int (*new_item) (X509_LOOKUP *ctx); |
| 74 | void (*free) (X509_LOOKUP *ctx); |
| 75 | int (*init) (X509_LOOKUP *ctx); |
| 76 | int (*shutdown) (X509_LOOKUP *ctx); |
| 77 | int (*ctrl) (X509_LOOKUP *ctx, int cmd, const char *argc, long argl, |
| 78 | char **ret); |
| 79 | int (*get_by_subject) (X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
| 80 | X509_NAME *name, X509_OBJECT *ret); |
| 81 | int (*get_by_issuer_serial) (X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
| 82 | X509_NAME *name, ASN1_INTEGER *serial, |
| 83 | X509_OBJECT *ret); |
| 84 | int (*get_by_fingerprint) (X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
| 85 | const unsigned char *bytes, int len, |
| 86 | X509_OBJECT *ret); |
| 87 | int (*get_by_alias) (X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, |
| 88 | const char *str, int len, X509_OBJECT *ret); |
| 89 | }; |
| 90 | |
| 91 | /* This is the functions plus an instance of the local variables. */ |
| 92 | struct x509_lookup_st { |
| 93 | int init; /* have we been started */ |
| 94 | int skip; /* don't use us. */ |
| 95 | X509_LOOKUP_METHOD *method; /* the functions */ |
| 96 | void *method_data; /* method data */ |
| 97 | X509_STORE *store_ctx; /* who owns us */ |
| 98 | }; |
| 99 | |
| 100 | /* |
| 101 | * This is used to hold everything. It is used for all certificate |
| 102 | * validation. Once we have a certificate chain, the 'verify' function is |
| 103 | * then called to actually check the cert chain. |
| 104 | */ |
| 105 | struct x509_store_st { |
| 106 | /* The following is a cache of trusted certs */ |
| 107 | int cache; /* if true, stash any hits */ |
| 108 | STACK_OF(X509_OBJECT) *objs; /* Cache of all objects */ |
| 109 | /* These are external lookup methods */ |
| 110 | STACK_OF(X509_LOOKUP) *get_cert_methods; |
| 111 | X509_VERIFY_PARAM *param; |
| 112 | /* Callbacks for various operations */ |
| 113 | /* called to verify a certificate */ |
| 114 | int (*verify) (X509_STORE_CTX *ctx); |
| 115 | /* error callback */ |
| 116 | int (*verify_cb) (int ok, X509_STORE_CTX *ctx); |
| 117 | /* get issuers cert from ctx */ |
| 118 | int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x); |
| 119 | /* check issued */ |
| 120 | int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer); |
| 121 | /* Check revocation status of chain */ |
| 122 | int (*check_revocation) (X509_STORE_CTX *ctx); |
| 123 | /* retrieve CRL */ |
| 124 | int (*get_crl) (X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x); |
| 125 | /* Check CRL validity */ |
| 126 | int (*check_crl) (X509_STORE_CTX *ctx, X509_CRL *crl); |
| 127 | /* Check certificate against CRL */ |
| 128 | int (*cert_crl) (X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x); |
| 129 | /* Check policy status of the chain */ |
| 130 | int (*check_policy) (X509_STORE_CTX *ctx); |
| 131 | STACK_OF(X509) *(*lookup_certs) (X509_STORE_CTX *ctx, X509_NAME *nm); |
| 132 | STACK_OF(X509_CRL) *(*lookup_crls) (X509_STORE_CTX *ctx, X509_NAME *nm); |
| 133 | int (*cleanup) (X509_STORE_CTX *ctx); |
| 134 | CRYPTO_EX_DATA ex_data; |
| 135 | CRYPTO_REF_COUNT references; |
| 136 | CRYPTO_RWLOCK *lock; |
| 137 | }; |
| 138 | |
| 139 | typedef struct lookup_dir_hashes_st BY_DIR_HASH; |
| 140 | typedef struct lookup_dir_entry_st BY_DIR_ENTRY; |
| 141 | DEFINE_STACK_OF(BY_DIR_HASH) |
| 142 | DEFINE_STACK_OF(BY_DIR_ENTRY) |
| 143 | typedef STACK_OF(X509_NAME_ENTRY) STACK_OF_X509_NAME_ENTRY; |
| 144 | DEFINE_STACK_OF(STACK_OF_X509_NAME_ENTRY) |
| 145 | |
| 146 | void x509_set_signature_info(X509_SIG_INFO *siginf, const X509_ALGOR *alg, |
| 147 | const ASN1_STRING *sig); |
| 148 | int x509_likely_issued(X509 *issuer, X509 *subject); |
| 149 | int x509_signing_allowed(const X509 *issuer, const X509 *subject); |