// PolicyInformation ::= SEQUENCE { // policyIdentifier CertPolicyId, // policyQualifiers SEQUENCE SIZE (1..MAX) OF // PolicyQualifierInfo OPTIONAL } inline der::Result CheckPolicyInformation(der::Input& input, EndEntityOrCA endEntityOrCA, const CertPolicyId& requiredPolicy, /*in/out*/ bool& found) { if (input.MatchTLV(der::OIDTag, requiredPolicy.numBytes, requiredPolicy.bytes)) { found = true; } else if (endEntityOrCA == EndEntityOrCA::MustBeCA && input.MatchTLV(der::OIDTag, CertPolicyId::anyPolicy.numBytes, CertPolicyId::anyPolicy.bytes)) { found = true; } // RFC 5280 Section 4.2.1.4 says "Optional qualifiers, which MAY be present, // are not expected to change the definition of the policy." Also, it seems // that Section 6, which defines validation, does not require any matching of // qualifiers. Thus, doing anything with the policy qualifiers would be a // waste of time and a source of potential incompatibilities, so we just // ignore them. // Skip unmatched OID and/or policyQualifiers input.SkipToEnd(); return der::Success; }
// CertID ::= SEQUENCE { // hashAlgorithm AlgorithmIdentifier, // issuerNameHash OCTET STRING, -- Hash of issuer's DN // issuerKeyHash OCTET STRING, -- Hash of issuer's public key // serialNumber CertificateSerialNumber } static inline der::Result CertID(der::Input& input, const Context& context, /*out*/ bool& match) { match = false; SECAlgorithmID hashAlgorithm; if (der::Nested(input, der::SEQUENCE, bind(der::AlgorithmIdentifier, _1, ref(hashAlgorithm))) != der::Success) { return der::Failure; } SECItem issuerNameHash; if (der::Skip(input, der::OCTET_STRING, issuerNameHash) != der::Success) { return der::Failure; } SECItem issuerKeyHash; if (der::Skip(input, der::OCTET_STRING, issuerKeyHash) != der::Success) { return der::Failure; } SECItem serialNumber; if (der::CertificateSerialNumber(input, serialNumber) != der::Success) { return der::Failure; } const CERTCertificate& cert = context.cert; const CERTCertificate& issuerCert = context.issuerCert; if (!SECITEM_ItemsAreEqual(&serialNumber, &cert.serialNumber)) { // This does not reference the certificate we're interested in. // Consume the rest of the input and return successfully to // potentially continue processing other responses. input.SkipToEnd(); return der::Success; } // TODO: support SHA-2 hashes. SECOidTag hashAlg = SECOID_GetAlgorithmTag(&hashAlgorithm); if (hashAlg != SEC_OID_SHA1) { // Again, not interested in this response. Consume input, return success. input.SkipToEnd(); return der::Success; } if (issuerNameHash.len != SHA1_LENGTH) { return der::Fail(SEC_ERROR_OCSP_MALFORMED_RESPONSE); } // From http://tools.ietf.org/html/rfc6960#section-4.1.1: // "The hash shall be calculated over the DER encoding of the // issuer's name field in the certificate being checked." uint8_t hashBuf[SHA1_LENGTH]; if (PK11_HashBuf(SEC_OID_SHA1, hashBuf, cert.derIssuer.data, cert.derIssuer.len) != SECSuccess) { return der::Failure; } if (memcmp(hashBuf, issuerNameHash.data, issuerNameHash.len)) { // Again, not interested in this response. Consume input, return success. input.SkipToEnd(); return der::Success; } return MatchIssuerKey(issuerKeyHash, issuerCert, match); }
// SingleResponse ::= SEQUENCE { // certID CertID, // certStatus CertStatus, // thisUpdate GeneralizedTime, // nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL, // singleExtensions [1] EXPLICIT Extensions{{re-ocsp-crl | // re-ocsp-archive-cutoff | // CrlEntryExtensions, ...} // } OPTIONAL } static inline der::Result SingleResponse(der::Input& input, Context& context) { bool match = false; if (der::Nested(input, der::SEQUENCE, bind(CertID, _1, cref(context), ref(match))) != der::Success) { return der::Failure; } if (!match) { // This response does not reference the certificate we're interested in. // By consuming the rest of our input and returning successfully, we can // continue processing and examine another response that might have what // we want. input.SkipToEnd(); return der::Success; } // CertStatus ::= CHOICE { // good [0] IMPLICIT NULL, // revoked [1] IMPLICIT RevokedInfo, // unknown [2] IMPLICIT UnknownInfo } // // In the event of multiple SingleResponses for a cert that have conflicting // statuses, we use the following precedence rules: // // * revoked overrides good and unknown // * good overrides unknown if (input.Peek(static_cast<uint8_t>(CertStatus::Good))) { if (ExpectTagAndLength(input, static_cast<uint8_t>(CertStatus::Good), 0) != der::Success) { return der::Failure; } if (context.certStatus != CertStatus::Revoked) { context.certStatus = CertStatus::Good; } } else if (input.Peek(static_cast<uint8_t>(CertStatus::Revoked))) { // We don't need any info from the RevokedInfo structure, so we don't even // parse it. TODO: We should mention issues like this in the explanation of // why we treat invalid OCSP responses equivalently to revoked for OCSP // stapling. if (der::Skip(input, static_cast<uint8_t>(CertStatus::Revoked)) != der::Success) { return der::Failure; } context.certStatus = CertStatus::Revoked; } else if (ExpectTagAndLength(input, static_cast<uint8_t>(CertStatus::Unknown), 0) != der::Success) { return der::Failure; } // http://tools.ietf.org/html/rfc6960#section-3.2 // 5. The time at which the status being indicated is known to be // correct (thisUpdate) is sufficiently recent; // 6. When available, the time at or before which newer information will // be available about the status of the certificate (nextUpdate) is // greater than the current time. // We won't accept any OCSP responses that are more than 10 days old, even if // the nextUpdate time is further in the future. static const PRTime OLDEST_ACCEPTABLE = INT64_C(10) * ONE_DAY; PRTime thisUpdate; if (der::GeneralizedTime(input, thisUpdate) != der::Success) { return der::Failure; } if (thisUpdate > context.time + SLOP) { return der::Fail(SEC_ERROR_OCSP_FUTURE_RESPONSE); } PRTime notAfter; static const uint8_t NEXT_UPDATE_TAG = der::CONTEXT_SPECIFIC | der::CONSTRUCTED | 0; if (input.Peek(NEXT_UPDATE_TAG)) { PRTime nextUpdate; if (der::Nested(input, NEXT_UPDATE_TAG, bind(der::GeneralizedTime, _1, ref(nextUpdate))) != der::Success) { return der::Failure; } if (nextUpdate < thisUpdate) { return der::Fail(SEC_ERROR_OCSP_MALFORMED_RESPONSE); } if (nextUpdate - thisUpdate <= OLDEST_ACCEPTABLE) { notAfter = nextUpdate; } else { notAfter = thisUpdate + OLDEST_ACCEPTABLE; } } else { // NSS requires all OCSP responses without a nextUpdate to be recent. // Match that stricter behavior. notAfter = thisUpdate + ONE_DAY; } if (context.time < SLOP) { // prevent underflow return der::Fail(SEC_ERROR_INVALID_ARGS); } if (context.time - SLOP > notAfter) { return der::Fail(SEC_ERROR_OCSP_OLD_RESPONSE); } if (!input.AtEnd()) { if (CheckExtensionsForCriticality(input) != der::Success) { return der::Failure; } } if (context.thisUpdate) { *context.thisUpdate = thisUpdate; } if (context.validThrough) { *context.validThrough = notAfter; } return der::Success; }
static der::Result MatchEKU(der::Input& value, KeyPurposeId requiredEKU, EndEntityOrCA endEntityOrCA, /*in/out*/ bool& found, /*in/out*/ bool& foundOCSPSigning) { // See Section 5.9 of "A Layman's Guide to a Subset of ASN.1, BER, and DER" // for a description of ASN.1 DER encoding of OIDs. // id-pkix OBJECT IDENTIFIER ::= // { iso(1) identified-organization(3) dod(6) internet(1) // security(5) mechanisms(5) pkix(7) } // id-kp OBJECT IDENTIFIER ::= { id-pkix 3 } // id-kp-serverAuth OBJECT IDENTIFIER ::= { id-kp 1 } // id-kp-clientAuth OBJECT IDENTIFIER ::= { id-kp 2 } // id-kp-codeSigning OBJECT IDENTIFIER ::= { id-kp 3 } // id-kp-emailProtection OBJECT IDENTIFIER ::= { id-kp 4 } // id-kp-OCSPSigning OBJECT IDENTIFIER ::= { id-kp 9 } static const uint8_t server[] = { (40*1)+3, 6, 1, 5, 5, 7, 3, 1 }; static const uint8_t client[] = { (40*1)+3, 6, 1, 5, 5, 7, 3, 2 }; static const uint8_t code [] = { (40*1)+3, 6, 1, 5, 5, 7, 3, 3 }; static const uint8_t email [] = { (40*1)+3, 6, 1, 5, 5, 7, 3, 4 }; static const uint8_t ocsp [] = { (40*1)+3, 6, 1, 5, 5, 7, 3, 9 }; // id-Netscape OBJECT IDENTIFIER ::= { 2 16 840 1 113730 } // id-Netscape-policy OBJECT IDENTIFIER ::= { id-Netscape 4 } // id-Netscape-stepUp OBJECT IDENTIFIER ::= { id-Netscape-policy 1 } static const uint8_t serverStepUp[] = { (40*2)+16, 128+6,72, 1, 128+6,128+120,66, 4, 1 }; bool match = false; if (!found) { switch (requiredEKU) { case KeyPurposeId::id_kp_serverAuth: // Treat CA certs with step-up OID as also having SSL server type. // Comodo has issued certificates that require this behavior that don't // expire until June 2020! TODO(bug 982932): Limit this exception to // old certificates. match = value.MatchRest(server) || (endEntityOrCA == EndEntityOrCA::MustBeCA && value.MatchRest(serverStepUp)); break; case KeyPurposeId::id_kp_clientAuth: match = value.MatchRest(client); break; case KeyPurposeId::id_kp_codeSigning: match = value.MatchRest(code); break; case KeyPurposeId::id_kp_emailProtection: match = value.MatchRest(email); break; case KeyPurposeId::id_kp_OCSPSigning: match = value.MatchRest(ocsp); break; case KeyPurposeId::anyExtendedKeyUsage: PR_NOT_REACHED("anyExtendedKeyUsage should start with found==true"); return der::Fail(SEC_ERROR_LIBRARY_FAILURE); default: PR_NOT_REACHED("unrecognized EKU"); return der::Fail(SEC_ERROR_LIBRARY_FAILURE); } } if (match) { found = true; if (requiredEKU == KeyPurposeId::id_kp_OCSPSigning) { foundOCSPSigning = true; } } else if (value.MatchRest(ocsp)) { foundOCSPSigning = true; } value.SkipToEnd(); // ignore unmatched OIDs. return der::Success; }