| // Copyright 2017 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "net/cert/internal/general_names.h" |
| |
| #include "base/logging.h" |
| #include "base/strings/string_util.h" |
| #include "net/cert/internal/cert_error_params.h" |
| #include "net/cert/internal/cert_errors.h" |
| #include "net/der/input.h" |
| #include "net/der/parser.h" |
| #include "net/der/tag.h" |
| |
| #include "starboard/client_porting/poem/string_poem.h" |
| #include "starboard/memory.h" |
| |
| namespace net { |
| |
| DEFINE_CERT_ERROR_ID(kFailedParsingGeneralName, "Failed parsing GeneralName"); |
| |
| namespace { |
| |
| DEFINE_CERT_ERROR_ID(kRFC822NameNotAscii, "rfc822Name is not ASCII"); |
| DEFINE_CERT_ERROR_ID(kDnsNameNotAscii, "dNSName is not ASCII"); |
| DEFINE_CERT_ERROR_ID(kURINotAscii, "uniformResourceIdentifier is not ASCII"); |
| DEFINE_CERT_ERROR_ID(kFailedParsingIp, "Failed parsing iPAddress"); |
| DEFINE_CERT_ERROR_ID(kUnknownGeneralNameType, "Unknown GeneralName type"); |
| DEFINE_CERT_ERROR_ID(kFailedReadingGeneralNames, |
| "Failed reading GeneralNames SEQUENCE"); |
| DEFINE_CERT_ERROR_ID(kGeneralNamesTrailingData, |
| "GeneralNames contains trailing data after the sequence"); |
| DEFINE_CERT_ERROR_ID(kGeneralNamesEmpty, |
| "GeneralNames is a sequence of 0 elements"); |
| DEFINE_CERT_ERROR_ID(kFailedReadingGeneralName, |
| "Failed reading GeneralName TLV"); |
| |
| // Return true if the bitmask |mask| contains only zeros after the first |
| // |prefix_length| bits. |
| bool IsSuffixZero(const IPAddressBytes& mask, unsigned prefix_length) { |
| size_t zero_bits = mask.size() * CHAR_BIT - prefix_length; |
| size_t zero_bytes = zero_bits / CHAR_BIT; |
| std::vector<uint8_t> zeros(zero_bytes, 0); |
| if (SbMemoryCompare(zeros.data(), mask.data() + mask.size() - zero_bytes, |
| zero_bytes)) |
| return false; |
| size_t leftover_bits = zero_bits % CHAR_BIT; |
| if (leftover_bits) { |
| uint8_t b = mask[mask.size() - zero_bytes - 1]; |
| for (size_t i = 0; i < leftover_bits; ++i) { |
| if (b & (1 << i)) |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| } // namespace |
| |
| GeneralNames::GeneralNames() = default; |
| |
| GeneralNames::~GeneralNames() = default; |
| |
| // static |
| std::unique_ptr<GeneralNames> GeneralNames::Create( |
| const der::Input& general_names_tlv, |
| CertErrors* errors) { |
| DCHECK(errors); |
| |
| // RFC 5280 section 4.2.1.6: |
| // GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName |
| der::Parser parser(general_names_tlv); |
| der::Input sequence_value; |
| if (!parser.ReadTag(der::kSequence, &sequence_value)) { |
| errors->AddError(kFailedReadingGeneralNames); |
| return nullptr; |
| } |
| // Should not have trailing data after GeneralNames sequence. |
| if (parser.HasMore()) { |
| errors->AddError(kGeneralNamesTrailingData); |
| return nullptr; |
| } |
| return CreateFromValue(sequence_value, errors); |
| } |
| |
| // static |
| std::unique_ptr<GeneralNames> GeneralNames::CreateFromValue( |
| const der::Input& general_names_value, |
| CertErrors* errors) { |
| DCHECK(errors); |
| |
| std::unique_ptr<GeneralNames> general_names(new GeneralNames()); |
| |
| der::Parser sequence_parser(general_names_value); |
| // The GeneralNames sequence should have at least 1 element. |
| if (!sequence_parser.HasMore()) { |
| errors->AddError(kGeneralNamesEmpty); |
| return nullptr; |
| } |
| |
| while (sequence_parser.HasMore()) { |
| der::Input raw_general_name; |
| if (!sequence_parser.ReadRawTLV(&raw_general_name)) { |
| errors->AddError(kFailedReadingGeneralName); |
| return nullptr; |
| } |
| |
| if (!ParseGeneralName(raw_general_name, IP_ADDRESS_ONLY, |
| general_names.get(), errors)) { |
| errors->AddError(kFailedParsingGeneralName); |
| return nullptr; |
| } |
| } |
| |
| return general_names; |
| } |
| |
| WARN_UNUSED_RESULT bool ParseGeneralName( |
| const der::Input& input, |
| GeneralNames::ParseGeneralNameIPAddressType ip_address_type, |
| GeneralNames* subtrees, |
| CertErrors* errors) { |
| DCHECK(errors); |
| der::Parser parser(input); |
| der::Tag tag; |
| der::Input value; |
| if (!parser.ReadTagAndValue(&tag, &value)) |
| return false; |
| GeneralNameTypes name_type = GENERAL_NAME_NONE; |
| if (tag == der::ContextSpecificConstructed(0)) { |
| // otherName [0] OtherName, |
| name_type = GENERAL_NAME_OTHER_NAME; |
| subtrees->other_names.push_back(value); |
| } else if (tag == der::ContextSpecificPrimitive(1)) { |
| // rfc822Name [1] IA5String, |
| name_type = GENERAL_NAME_RFC822_NAME; |
| const base::StringPiece s = value.AsStringPiece(); |
| if (!base::IsStringASCII(s)) { |
| errors->AddError(kRFC822NameNotAscii); |
| return false; |
| } |
| subtrees->rfc822_names.push_back(s); |
| } else if (tag == der::ContextSpecificPrimitive(2)) { |
| // dNSName [2] IA5String, |
| name_type = GENERAL_NAME_DNS_NAME; |
| const base::StringPiece s = value.AsStringPiece(); |
| if (!base::IsStringASCII(s)) { |
| errors->AddError(kDnsNameNotAscii); |
| return false; |
| } |
| subtrees->dns_names.push_back(s); |
| } else if (tag == der::ContextSpecificConstructed(3)) { |
| // x400Address [3] ORAddress, |
| name_type = GENERAL_NAME_X400_ADDRESS; |
| subtrees->x400_addresses.push_back(value); |
| } else if (tag == der::ContextSpecificConstructed(4)) { |
| // directoryName [4] Name, |
| name_type = GENERAL_NAME_DIRECTORY_NAME; |
| // Name is a CHOICE { rdnSequence RDNSequence }, therefore the SEQUENCE |
| // tag is explicit. Remove it, since the name matching functions expect |
| // only the value portion. |
| der::Parser name_parser(value); |
| der::Input name_value; |
| if (!name_parser.ReadTag(der::kSequence, &name_value) || parser.HasMore()) |
| return false; |
| subtrees->directory_names.push_back(name_value); |
| } else if (tag == der::ContextSpecificConstructed(5)) { |
| // ediPartyName [5] EDIPartyName, |
| name_type = GENERAL_NAME_EDI_PARTY_NAME; |
| subtrees->edi_party_names.push_back(value); |
| } else if (tag == der::ContextSpecificPrimitive(6)) { |
| // uniformResourceIdentifier [6] IA5String, |
| name_type = GENERAL_NAME_UNIFORM_RESOURCE_IDENTIFIER; |
| const base::StringPiece s = value.AsStringPiece(); |
| if (!base::IsStringASCII(s)) { |
| errors->AddError(kURINotAscii); |
| return false; |
| } |
| subtrees->uniform_resource_identifiers.push_back(s); |
| } else if (tag == der::ContextSpecificPrimitive(7)) { |
| // iPAddress [7] OCTET STRING, |
| name_type = GENERAL_NAME_IP_ADDRESS; |
| if (ip_address_type == GeneralNames::IP_ADDRESS_ONLY) { |
| // RFC 5280 section 4.2.1.6: |
| // When the subjectAltName extension contains an iPAddress, the address |
| // MUST be stored in the octet string in "network byte order", as |
| // specified in [RFC791]. The least significant bit (LSB) of each octet |
| // is the LSB of the corresponding byte in the network address. For IP |
| // version 4, as specified in [RFC791], the octet string MUST contain |
| // exactly four octets. For IP version 6, as specified in [RFC2460], |
| // the octet string MUST contain exactly sixteen octets. |
| if ((value.Length() != IPAddress::kIPv4AddressSize && |
| value.Length() != IPAddress::kIPv6AddressSize)) { |
| errors->AddError(kFailedParsingIp); |
| return false; |
| } |
| subtrees->ip_addresses.push_back( |
| IPAddress(value.UnsafeData(), value.Length())); |
| } else { |
| DCHECK_EQ(ip_address_type, GeneralNames::IP_ADDRESS_AND_NETMASK); |
| // RFC 5280 section 4.2.1.10: |
| // The syntax of iPAddress MUST be as described in Section 4.2.1.6 with |
| // the following additions specifically for name constraints. For IPv4 |
| // addresses, the iPAddress field of GeneralName MUST contain eight (8) |
| // octets, encoded in the style of RFC 4632 (CIDR) to represent an |
| // address range [RFC4632]. For IPv6 addresses, the iPAddress field |
| // MUST contain 32 octets similarly encoded. For example, a name |
| // constraint for "class C" subnet 192.0.2.0 is represented as the |
| // octets C0 00 02 00 FF FF FF 00, representing the CIDR notation |
| // 192.0.2.0/24 (mask 255.255.255.0). |
| if (value.Length() != IPAddress::kIPv4AddressSize * 2 && |
| value.Length() != IPAddress::kIPv6AddressSize * 2) { |
| errors->AddError(kFailedParsingIp); |
| return false; |
| } |
| const IPAddress mask(value.UnsafeData() + value.Length() / 2, |
| value.Length() / 2); |
| const unsigned mask_prefix_length = MaskPrefixLength(mask); |
| if (!IsSuffixZero(mask.bytes(), mask_prefix_length)) { |
| errors->AddError(kFailedParsingIp); |
| return false; |
| } |
| subtrees->ip_address_ranges.push_back( |
| std::make_pair(IPAddress(value.UnsafeData(), value.Length() / 2), |
| mask_prefix_length)); |
| } |
| } else if (tag == der::ContextSpecificPrimitive(8)) { |
| // registeredID [8] OBJECT IDENTIFIER } |
| name_type = GENERAL_NAME_REGISTERED_ID; |
| subtrees->registered_ids.push_back(value); |
| } else { |
| errors->AddError(kUnknownGeneralNameType, |
| CreateCertErrorParams1SizeT("tag", tag)); |
| return false; |
| } |
| DCHECK_NE(GENERAL_NAME_NONE, name_type); |
| subtrees->present_name_types |= name_type; |
| return true; |
| } |
| |
| } // namespace net |