xref: /freebsd/crypto/openssl/crypto/ct/ct_sct_ctx.c (revision b077aed3)
1e71b7053SJung-uk Kim /*
2*b077aed3SPierre Pronchery  * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
3e71b7053SJung-uk Kim  *
4*b077aed3SPierre Pronchery  * Licensed under the Apache License 2.0 (the "License").  You may not use
5e71b7053SJung-uk Kim  * this file except in compliance with the License.  You can obtain a copy
6e71b7053SJung-uk Kim  * in the file LICENSE in the source distribution or at
7e71b7053SJung-uk Kim  * https://www.openssl.org/source/license.html
8e71b7053SJung-uk Kim  */
9e71b7053SJung-uk Kim 
10e71b7053SJung-uk Kim #ifdef OPENSSL_NO_CT
11e71b7053SJung-uk Kim # error "CT is disabled"
12e71b7053SJung-uk Kim #endif
13e71b7053SJung-uk Kim 
14e71b7053SJung-uk Kim #include <stddef.h>
15e71b7053SJung-uk Kim #include <string.h>
16e71b7053SJung-uk Kim 
17e71b7053SJung-uk Kim #include <openssl/err.h>
18e71b7053SJung-uk Kim #include <openssl/obj_mac.h>
19e71b7053SJung-uk Kim #include <openssl/x509.h>
20e71b7053SJung-uk Kim 
2117f01e99SJung-uk Kim #include "ct_local.h"
22e71b7053SJung-uk Kim 
SCT_CTX_new(OSSL_LIB_CTX * libctx,const char * propq)23*b077aed3SPierre Pronchery SCT_CTX *SCT_CTX_new(OSSL_LIB_CTX *libctx, const char *propq)
24e71b7053SJung-uk Kim {
25e71b7053SJung-uk Kim     SCT_CTX *sctx = OPENSSL_zalloc(sizeof(*sctx));
26e71b7053SJung-uk Kim 
27*b077aed3SPierre Pronchery     if (sctx == NULL) {
28*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
29*b077aed3SPierre Pronchery         return NULL;
30*b077aed3SPierre Pronchery     }
31*b077aed3SPierre Pronchery 
32*b077aed3SPierre Pronchery     sctx->libctx = libctx;
33*b077aed3SPierre Pronchery     if (propq != NULL) {
34*b077aed3SPierre Pronchery         sctx->propq = OPENSSL_strdup(propq);
35*b077aed3SPierre Pronchery         if (sctx->propq == NULL) {
36*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
37*b077aed3SPierre Pronchery             OPENSSL_free(sctx);
38*b077aed3SPierre Pronchery             return NULL;
39*b077aed3SPierre Pronchery         }
40*b077aed3SPierre Pronchery     }
41e71b7053SJung-uk Kim 
42e71b7053SJung-uk Kim     return sctx;
43e71b7053SJung-uk Kim }
44e71b7053SJung-uk Kim 
SCT_CTX_free(SCT_CTX * sctx)45e71b7053SJung-uk Kim void SCT_CTX_free(SCT_CTX *sctx)
46e71b7053SJung-uk Kim {
47e71b7053SJung-uk Kim     if (sctx == NULL)
48e71b7053SJung-uk Kim         return;
49e71b7053SJung-uk Kim     EVP_PKEY_free(sctx->pkey);
50e71b7053SJung-uk Kim     OPENSSL_free(sctx->pkeyhash);
51e71b7053SJung-uk Kim     OPENSSL_free(sctx->ihash);
52e71b7053SJung-uk Kim     OPENSSL_free(sctx->certder);
53e71b7053SJung-uk Kim     OPENSSL_free(sctx->preder);
54*b077aed3SPierre Pronchery     OPENSSL_free(sctx->propq);
55e71b7053SJung-uk Kim     OPENSSL_free(sctx);
56e71b7053SJung-uk Kim }
57e71b7053SJung-uk Kim 
58e71b7053SJung-uk Kim /*
59e71b7053SJung-uk Kim  * Finds the index of the first extension with the given NID in cert.
60e71b7053SJung-uk Kim  * If there is more than one extension with that NID, *is_duplicated is set to
61e71b7053SJung-uk Kim  * 1, otherwise 0 (unless it is NULL).
62e71b7053SJung-uk Kim  */
ct_x509_get_ext(X509 * cert,int nid,int * is_duplicated)63e71b7053SJung-uk Kim static int ct_x509_get_ext(X509 *cert, int nid, int *is_duplicated)
64e71b7053SJung-uk Kim {
65e71b7053SJung-uk Kim     int ret = X509_get_ext_by_NID(cert, nid, -1);
66e71b7053SJung-uk Kim 
67e71b7053SJung-uk Kim     if (is_duplicated != NULL)
68e71b7053SJung-uk Kim         *is_duplicated = ret >= 0 && X509_get_ext_by_NID(cert, nid, ret) >= 0;
69e71b7053SJung-uk Kim 
70e71b7053SJung-uk Kim     return ret;
71e71b7053SJung-uk Kim }
72e71b7053SJung-uk Kim 
73e71b7053SJung-uk Kim /*
74e71b7053SJung-uk Kim  * Modifies a certificate by deleting extensions and copying the issuer and
75e71b7053SJung-uk Kim  * AKID from the presigner certificate, if necessary.
76e71b7053SJung-uk Kim  * Returns 1 on success, 0 otherwise.
77e71b7053SJung-uk Kim  */
ct_x509_cert_fixup(X509 * cert,X509 * presigner)78e71b7053SJung-uk Kim __owur static int ct_x509_cert_fixup(X509 *cert, X509 *presigner)
79e71b7053SJung-uk Kim {
80e71b7053SJung-uk Kim     int preidx, certidx;
81e71b7053SJung-uk Kim     int pre_akid_ext_is_dup, cert_akid_ext_is_dup;
82e71b7053SJung-uk Kim 
83e71b7053SJung-uk Kim     if (presigner == NULL)
84e71b7053SJung-uk Kim         return 1;
85e71b7053SJung-uk Kim 
86e71b7053SJung-uk Kim     preidx = ct_x509_get_ext(presigner, NID_authority_key_identifier,
87e71b7053SJung-uk Kim                              &pre_akid_ext_is_dup);
88e71b7053SJung-uk Kim     certidx = ct_x509_get_ext(cert, NID_authority_key_identifier,
89e71b7053SJung-uk Kim                               &cert_akid_ext_is_dup);
90e71b7053SJung-uk Kim 
91e71b7053SJung-uk Kim     /* An error occurred whilst searching for the extension */
92e71b7053SJung-uk Kim     if (preidx < -1 || certidx < -1)
93e71b7053SJung-uk Kim         return 0;
94e71b7053SJung-uk Kim     /* Invalid certificate if they contain duplicate extensions */
95e71b7053SJung-uk Kim     if (pre_akid_ext_is_dup || cert_akid_ext_is_dup)
96e71b7053SJung-uk Kim         return 0;
97e71b7053SJung-uk Kim     /* AKID must be present in both certificate or absent in both */
98e71b7053SJung-uk Kim     if (preidx >= 0 && certidx == -1)
99e71b7053SJung-uk Kim         return 0;
100e71b7053SJung-uk Kim     if (preidx == -1 && certidx >= 0)
101e71b7053SJung-uk Kim         return 0;
102e71b7053SJung-uk Kim     /* Copy issuer name */
103e71b7053SJung-uk Kim     if (!X509_set_issuer_name(cert, X509_get_issuer_name(presigner)))
104e71b7053SJung-uk Kim         return 0;
105e71b7053SJung-uk Kim     if (preidx != -1) {
106e71b7053SJung-uk Kim         /* Retrieve and copy AKID encoding */
107e71b7053SJung-uk Kim         X509_EXTENSION *preext = X509_get_ext(presigner, preidx);
108e71b7053SJung-uk Kim         X509_EXTENSION *certext = X509_get_ext(cert, certidx);
109e71b7053SJung-uk Kim         ASN1_OCTET_STRING *preextdata;
110e71b7053SJung-uk Kim 
111e71b7053SJung-uk Kim         /* Should never happen */
112e71b7053SJung-uk Kim         if (preext == NULL || certext == NULL)
113e71b7053SJung-uk Kim             return 0;
114e71b7053SJung-uk Kim         preextdata = X509_EXTENSION_get_data(preext);
115e71b7053SJung-uk Kim         if (preextdata == NULL ||
116e71b7053SJung-uk Kim             !X509_EXTENSION_set_data(certext, preextdata))
117e71b7053SJung-uk Kim             return 0;
118e71b7053SJung-uk Kim     }
119e71b7053SJung-uk Kim     return 1;
120e71b7053SJung-uk Kim }
121e71b7053SJung-uk Kim 
SCT_CTX_set1_cert(SCT_CTX * sctx,X509 * cert,X509 * presigner)122e71b7053SJung-uk Kim int SCT_CTX_set1_cert(SCT_CTX *sctx, X509 *cert, X509 *presigner)
123e71b7053SJung-uk Kim {
124e71b7053SJung-uk Kim     unsigned char *certder = NULL, *preder = NULL;
125e71b7053SJung-uk Kim     X509 *pretmp = NULL;
126e71b7053SJung-uk Kim     int certderlen = 0, prederlen = 0;
127e71b7053SJung-uk Kim     int idx = -1;
128e71b7053SJung-uk Kim     int poison_ext_is_dup, sct_ext_is_dup;
129e71b7053SJung-uk Kim     int poison_idx = ct_x509_get_ext(cert, NID_ct_precert_poison, &poison_ext_is_dup);
130e71b7053SJung-uk Kim 
131e71b7053SJung-uk Kim     /* Duplicate poison extensions are present - error */
132e71b7053SJung-uk Kim     if (poison_ext_is_dup)
133e71b7053SJung-uk Kim         goto err;
134e71b7053SJung-uk Kim 
135e71b7053SJung-uk Kim     /* If *cert doesn't have a poison extension, it isn't a precert */
136e71b7053SJung-uk Kim     if (poison_idx == -1) {
137e71b7053SJung-uk Kim         /* cert isn't a precert, so we shouldn't have a presigner */
138e71b7053SJung-uk Kim         if (presigner != NULL)
139e71b7053SJung-uk Kim             goto err;
140e71b7053SJung-uk Kim 
141e71b7053SJung-uk Kim         certderlen = i2d_X509(cert, &certder);
142e71b7053SJung-uk Kim         if (certderlen < 0)
143e71b7053SJung-uk Kim             goto err;
144e71b7053SJung-uk Kim     }
145e71b7053SJung-uk Kim 
146e71b7053SJung-uk Kim     /* See if cert has a precert SCTs extension */
147e71b7053SJung-uk Kim     idx = ct_x509_get_ext(cert, NID_ct_precert_scts, &sct_ext_is_dup);
148e71b7053SJung-uk Kim     /* Duplicate SCT extensions are present - error */
149e71b7053SJung-uk Kim     if (sct_ext_is_dup)
150e71b7053SJung-uk Kim         goto err;
151e71b7053SJung-uk Kim 
152e71b7053SJung-uk Kim     if (idx >= 0 && poison_idx >= 0) {
153e71b7053SJung-uk Kim         /*
154e71b7053SJung-uk Kim          * cert can't both contain SCTs (i.e. have an SCT extension) and be a
155e71b7053SJung-uk Kim          * precert (i.e. have a poison extension).
156e71b7053SJung-uk Kim          */
157e71b7053SJung-uk Kim         goto err;
158e71b7053SJung-uk Kim     }
159e71b7053SJung-uk Kim 
160e71b7053SJung-uk Kim     if (idx == -1) {
161e71b7053SJung-uk Kim         idx = poison_idx;
162e71b7053SJung-uk Kim     }
163e71b7053SJung-uk Kim 
164e71b7053SJung-uk Kim     /*
165e71b7053SJung-uk Kim      * If either a poison or SCT extension is present, remove it before encoding
166e71b7053SJung-uk Kim      * cert. This, along with ct_x509_cert_fixup(), gets a TBSCertificate (see
167e71b7053SJung-uk Kim      * RFC5280) from cert, which is what the CT log signed when it produced the
168e71b7053SJung-uk Kim      * SCT.
169e71b7053SJung-uk Kim      */
170e71b7053SJung-uk Kim     if (idx >= 0) {
171e71b7053SJung-uk Kim         /* Take a copy of certificate so we don't modify passed version */
172e71b7053SJung-uk Kim         pretmp = X509_dup(cert);
173e71b7053SJung-uk Kim         if (pretmp == NULL)
174e71b7053SJung-uk Kim             goto err;
175e71b7053SJung-uk Kim 
176*b077aed3SPierre Pronchery         X509_EXTENSION_free(X509_delete_ext(pretmp, idx));
177e71b7053SJung-uk Kim 
178e71b7053SJung-uk Kim         if (!ct_x509_cert_fixup(pretmp, presigner))
179e71b7053SJung-uk Kim             goto err;
180e71b7053SJung-uk Kim 
181e71b7053SJung-uk Kim         prederlen = i2d_re_X509_tbs(pretmp, &preder);
182e71b7053SJung-uk Kim         if (prederlen <= 0)
183e71b7053SJung-uk Kim             goto err;
184e71b7053SJung-uk Kim     }
185e71b7053SJung-uk Kim 
186e71b7053SJung-uk Kim     X509_free(pretmp);
187e71b7053SJung-uk Kim 
188e71b7053SJung-uk Kim     OPENSSL_free(sctx->certder);
189e71b7053SJung-uk Kim     sctx->certder = certder;
190e71b7053SJung-uk Kim     sctx->certderlen = certderlen;
191e71b7053SJung-uk Kim 
192e71b7053SJung-uk Kim     OPENSSL_free(sctx->preder);
193e71b7053SJung-uk Kim     sctx->preder = preder;
194e71b7053SJung-uk Kim     sctx->prederlen = prederlen;
195e71b7053SJung-uk Kim 
196e71b7053SJung-uk Kim     return 1;
197e71b7053SJung-uk Kim err:
198e71b7053SJung-uk Kim     OPENSSL_free(certder);
199e71b7053SJung-uk Kim     OPENSSL_free(preder);
200e71b7053SJung-uk Kim     X509_free(pretmp);
201e71b7053SJung-uk Kim     return 0;
202e71b7053SJung-uk Kim }
203e71b7053SJung-uk Kim 
ct_public_key_hash(SCT_CTX * sctx,X509_PUBKEY * pkey,unsigned char ** hash,size_t * hash_len)204*b077aed3SPierre Pronchery __owur static int ct_public_key_hash(SCT_CTX *sctx, X509_PUBKEY *pkey,
205*b077aed3SPierre Pronchery                                      unsigned char **hash, size_t *hash_len)
206e71b7053SJung-uk Kim {
207e71b7053SJung-uk Kim     int ret = 0;
208e71b7053SJung-uk Kim     unsigned char *md = NULL, *der = NULL;
209e71b7053SJung-uk Kim     int der_len;
210e71b7053SJung-uk Kim     unsigned int md_len;
211*b077aed3SPierre Pronchery     EVP_MD *sha256 = EVP_MD_fetch(sctx->libctx, "SHA2-256", sctx->propq);
212*b077aed3SPierre Pronchery 
213*b077aed3SPierre Pronchery     if (sha256 == NULL)
214*b077aed3SPierre Pronchery         goto err;
215e71b7053SJung-uk Kim 
216e71b7053SJung-uk Kim     /* Reuse buffer if possible */
217e71b7053SJung-uk Kim     if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) {
218e71b7053SJung-uk Kim         md = *hash;
219e71b7053SJung-uk Kim     } else {
220e71b7053SJung-uk Kim         md = OPENSSL_malloc(SHA256_DIGEST_LENGTH);
221e71b7053SJung-uk Kim         if (md == NULL)
222e71b7053SJung-uk Kim             goto err;
223e71b7053SJung-uk Kim     }
224e71b7053SJung-uk Kim 
225e71b7053SJung-uk Kim     /* Calculate key hash */
226e71b7053SJung-uk Kim     der_len = i2d_X509_PUBKEY(pkey, &der);
227e71b7053SJung-uk Kim     if (der_len <= 0)
228e71b7053SJung-uk Kim         goto err;
229e71b7053SJung-uk Kim 
230*b077aed3SPierre Pronchery     if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL))
231e71b7053SJung-uk Kim         goto err;
232e71b7053SJung-uk Kim 
233e71b7053SJung-uk Kim     if (md != *hash) {
234e71b7053SJung-uk Kim         OPENSSL_free(*hash);
235e71b7053SJung-uk Kim         *hash = md;
236e71b7053SJung-uk Kim         *hash_len = SHA256_DIGEST_LENGTH;
237e71b7053SJung-uk Kim     }
238e71b7053SJung-uk Kim 
239e71b7053SJung-uk Kim     md = NULL;
240e71b7053SJung-uk Kim     ret = 1;
241e71b7053SJung-uk Kim  err:
242*b077aed3SPierre Pronchery     EVP_MD_free(sha256);
243e71b7053SJung-uk Kim     OPENSSL_free(md);
244e71b7053SJung-uk Kim     OPENSSL_free(der);
245e71b7053SJung-uk Kim     return ret;
246e71b7053SJung-uk Kim }
247e71b7053SJung-uk Kim 
SCT_CTX_set1_issuer(SCT_CTX * sctx,const X509 * issuer)248e71b7053SJung-uk Kim int SCT_CTX_set1_issuer(SCT_CTX *sctx, const X509 *issuer)
249e71b7053SJung-uk Kim {
250e71b7053SJung-uk Kim     return SCT_CTX_set1_issuer_pubkey(sctx, X509_get_X509_PUBKEY(issuer));
251e71b7053SJung-uk Kim }
252e71b7053SJung-uk Kim 
SCT_CTX_set1_issuer_pubkey(SCT_CTX * sctx,X509_PUBKEY * pubkey)253e71b7053SJung-uk Kim int SCT_CTX_set1_issuer_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey)
254e71b7053SJung-uk Kim {
255*b077aed3SPierre Pronchery     return ct_public_key_hash(sctx, pubkey, &sctx->ihash, &sctx->ihashlen);
256e71b7053SJung-uk Kim }
257e71b7053SJung-uk Kim 
SCT_CTX_set1_pubkey(SCT_CTX * sctx,X509_PUBKEY * pubkey)258e71b7053SJung-uk Kim int SCT_CTX_set1_pubkey(SCT_CTX *sctx, X509_PUBKEY *pubkey)
259e71b7053SJung-uk Kim {
260e71b7053SJung-uk Kim     EVP_PKEY *pkey = X509_PUBKEY_get(pubkey);
261e71b7053SJung-uk Kim 
262e71b7053SJung-uk Kim     if (pkey == NULL)
263e71b7053SJung-uk Kim         return 0;
264e71b7053SJung-uk Kim 
265*b077aed3SPierre Pronchery     if (!ct_public_key_hash(sctx, pubkey, &sctx->pkeyhash, &sctx->pkeyhashlen)) {
266e71b7053SJung-uk Kim         EVP_PKEY_free(pkey);
267e71b7053SJung-uk Kim         return 0;
268e71b7053SJung-uk Kim     }
269e71b7053SJung-uk Kim 
270e71b7053SJung-uk Kim     EVP_PKEY_free(sctx->pkey);
271e71b7053SJung-uk Kim     sctx->pkey = pkey;
272e71b7053SJung-uk Kim     return 1;
273e71b7053SJung-uk Kim }
274e71b7053SJung-uk Kim 
SCT_CTX_set_time(SCT_CTX * sctx,uint64_t time_in_ms)275e71b7053SJung-uk Kim void SCT_CTX_set_time(SCT_CTX *sctx, uint64_t time_in_ms)
276e71b7053SJung-uk Kim {
277e71b7053SJung-uk Kim     sctx->epoch_time_in_ms = time_in_ms;
278e71b7053SJung-uk Kim }
279