mirror of
https://github.com/openssl/openssl.git
synced 2025-04-06 20:20:50 +08:00
check_chain_extensions(): Add check that AKID and SKID are not marked critical
Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/12478)
This commit is contained in:
parent
8a639b9d72
commit
89f13ca434
@ -401,7 +401,6 @@ int x509v3_cache_extensions(X509 *x)
|
||||
ASN1_BIT_STRING *usage;
|
||||
ASN1_BIT_STRING *ns;
|
||||
EXTENDED_KEY_USAGE *extusage;
|
||||
X509_EXTENSION *ex;
|
||||
int i;
|
||||
int res;
|
||||
|
||||
@ -588,17 +587,30 @@ int x509v3_cache_extensions(X509 *x)
|
||||
x->ex_flags |= EXFLAG_INVALID;
|
||||
#endif
|
||||
for (i = 0; i < X509_get_ext_count(x); i++) {
|
||||
ex = X509_get_ext(x, i);
|
||||
if (OBJ_obj2nid(X509_EXTENSION_get_object(ex)) == NID_freshest_crl)
|
||||
X509_EXTENSION *ex = X509_get_ext(x, i);
|
||||
int nid = OBJ_obj2nid(X509_EXTENSION_get_object(ex));
|
||||
|
||||
if (nid == NID_freshest_crl)
|
||||
x->ex_flags |= EXFLAG_FRESHEST;
|
||||
if (!X509_EXTENSION_get_critical(ex))
|
||||
continue;
|
||||
if (OBJ_obj2nid(X509_EXTENSION_get_object(ex)) == NID_basic_constraints)
|
||||
x->ex_flags |= EXFLAG_BCONS_CRITICAL;
|
||||
if (!X509_supported_extension(ex)) {
|
||||
x->ex_flags |= EXFLAG_CRITICAL;
|
||||
break;
|
||||
}
|
||||
switch (nid) {
|
||||
case NID_basic_constraints:
|
||||
x->ex_flags |= EXFLAG_BCONS_CRITICAL;
|
||||
break;
|
||||
case NID_authority_key_identifier:
|
||||
x->ex_flags |= EXFLAG_AKID_CRITICAL;
|
||||
break;
|
||||
case NID_subject_key_identifier:
|
||||
x->ex_flags |= EXFLAG_SKID_CRITICAL;
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
}
|
||||
}
|
||||
|
||||
/* Set x->siginf, ignoring errors due to unsupported algos */
|
||||
|
@ -200,6 +200,10 @@ const char *X509_verify_cert_error_string(long n)
|
||||
return "Empty Subject Alternative Name extension";
|
||||
case X509_V_ERR_CA_BCONS_NOT_CRITICAL:
|
||||
return "Basic Constraints of CA cert not marked critical";
|
||||
case X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL:
|
||||
return "Authority Key Identifier marked critical";
|
||||
case X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL:
|
||||
return "Subject Key Identifier marked critical";
|
||||
|
||||
default:
|
||||
/* Printing an error number into a static buffer is not thread-safe */
|
||||
|
@ -562,6 +562,10 @@ static int check_chain_extensions(X509_STORE_CTX *ctx)
|
||||
/* Check sig alg consistency acc. to RFC 5280 section 4.1.1.2 */
|
||||
if (X509_ALGOR_cmp(&x->sig_alg, &x->cert_info.signature) != 0)
|
||||
ctx->error = X509_V_ERR_SIGNATURE_ALGORITHM_INCONSISTENCY;
|
||||
if (x->akid != NULL && (x->ex_flags & EXFLAG_AKID_CRITICAL) != 0)
|
||||
ctx->error = X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL;
|
||||
if (x->skid != NULL && (x->ex_flags & EXFLAG_SKID_CRITICAL) != 0)
|
||||
ctx->error = X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL;
|
||||
if (X509_get_version(x) >= 2) { /* at least X.509v3 */
|
||||
/* Check AKID presence acc. to RFC 5280 section 4.2.1.1 */
|
||||
if (i + 1 < num /*
|
||||
@ -570,11 +574,9 @@ static int check_chain_extensions(X509_STORE_CTX *ctx)
|
||||
*/
|
||||
&& (x->akid == NULL || x->akid->keyid == NULL))
|
||||
ctx->error = X509_V_ERR_MISSING_AUTHORITY_KEY_IDENTIFIER;
|
||||
/* TODO check that AKID extension is not critical */
|
||||
/* Check SKID presence acc. to RFC 5280 section 4.2.1.2 */
|
||||
if ((x->ex_flags & EXFLAG_CA) != 0 && x->skid == NULL)
|
||||
ctx->error = X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER;
|
||||
/* TODO check that SKID extension is not be critical */
|
||||
}
|
||||
}
|
||||
if (ctx->error != X509_V_OK)
|
||||
|
@ -229,6 +229,8 @@ X509_LOOKUP_ctrl_with_libctx((x), X509_L_ADD_STORE, (name), 0, NULL, \
|
||||
# define X509_V_ERR_MISSING_SUBJECT_KEY_IDENTIFIER 86
|
||||
# define X509_V_ERR_EMPTY_SUBJECT_ALT_NAME 87
|
||||
# define X509_V_ERR_CA_BCONS_NOT_CRITICAL 88
|
||||
# define X509_V_ERR_AUTHORITY_KEY_IDENTIFIER_CRITICAL 89
|
||||
# define X509_V_ERR_SUBJECT_KEY_IDENTIFIER_CRITICAL 90
|
||||
|
||||
/* Certificate verify flags */
|
||||
# ifndef OPENSSL_NO_DEPRECATED_1_1_0
|
||||
|
@ -377,6 +377,8 @@ struct ISSUING_DIST_POINT_st {
|
||||
# define EXFLAG_SS 0x2000 /* cert is apparently self-signed */
|
||||
|
||||
# define EXFLAG_BCONS_CRITICAL 0x10000
|
||||
# define EXFLAG_AKID_CRITICAL 0x20000
|
||||
# define EXFLAG_SKID_CRITICAL 0x40000
|
||||
|
||||
# define KU_DIGITAL_SIGNATURE 0x0080
|
||||
# define KU_NON_REPUDIATION 0x0040
|
||||
|
Loading…
x
Reference in New Issue
Block a user