diff options
-rw-r--r-- | src/lib/libcrypto/ct/ct_local.h | 25 | ||||
-rw-r--r-- | src/lib/libcrypto/ct/ct_oct.c | 275 |
2 files changed, 149 insertions, 151 deletions
diff --git a/src/lib/libcrypto/ct/ct_local.h b/src/lib/libcrypto/ct/ct_local.h index 14d1e5d7e9..109d50255b 100644 --- a/src/lib/libcrypto/ct/ct_local.h +++ b/src/lib/libcrypto/ct/ct_local.h | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ct_local.h,v 1.4 2021/12/05 09:37:46 tb Exp $ */ | 1 | /* $OpenBSD: ct_local.h,v 1.5 2021/12/18 15:59:50 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved. | 3 | * Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved. |
4 | * | 4 | * |
@@ -9,26 +9,24 @@ | |||
9 | */ | 9 | */ |
10 | 10 | ||
11 | #include <stddef.h> | 11 | #include <stddef.h> |
12 | |||
12 | #include <openssl/ct.h> | 13 | #include <openssl/ct.h> |
13 | #include <openssl/evp.h> | 14 | #include <openssl/evp.h> |
14 | #include <openssl/x509.h> | 15 | #include <openssl/x509.h> |
15 | #include <openssl/x509v3.h> | 16 | #include <openssl/x509v3.h> |
16 | #include <openssl/safestack.h> | 17 | #include <openssl/safestack.h> |
17 | 18 | ||
18 | /* | 19 | /* Number of bytes in an SCT v1 LogID - see RFC 6962 section 3.2. */ |
19 | * From RFC6962: opaque SerializedSCT<1..2^16-1>; struct { SerializedSCT | 20 | #define CT_V1_LOG_ID_LEN 32 |
20 | * sct_list <1..2^16-1>; } SignedCertificateTimestampList; | 21 | |
21 | */ | 22 | /* Maximum size of an SCT - see RFC 6962 section 3.3. */ |
22 | #define MAX_SCT_SIZE 65535 | 23 | #define MAX_SCT_SIZE 65535 |
23 | #define MAX_SCT_LIST_SIZE MAX_SCT_SIZE | 24 | #define MAX_SCT_LIST_SIZE MAX_SCT_SIZE |
24 | 25 | ||
25 | /* | 26 | /* |
26 | * Macros to read and write integers in network-byte order. | 27 | * Macros to write integers in network-byte order. |
27 | */ | 28 | */ |
28 | 29 | ||
29 | #define n2s(c,s) ((s=(((unsigned int)((c)[0]))<< 8)| \ | ||
30 | (((unsigned int)((c)[1])) )),c+=2) | ||
31 | |||
32 | #define s2n(s,c) ((c[0]=(unsigned char)(((s)>> 8)&0xff), \ | 30 | #define s2n(s,c) ((c[0]=(unsigned char)(((s)>> 8)&0xff), \ |
33 | c[1]=(unsigned char)(((s) )&0xff)),c+=2) | 31 | c[1]=(unsigned char)(((s) )&0xff)),c+=2) |
34 | 32 | ||
@@ -36,15 +34,6 @@ | |||
36 | c[1]=(unsigned char)(((l)>> 8)&0xff), \ | 34 | c[1]=(unsigned char)(((l)>> 8)&0xff), \ |
37 | c[2]=(unsigned char)(((l) )&0xff)),c+=3) | 35 | c[2]=(unsigned char)(((l) )&0xff)),c+=3) |
38 | 36 | ||
39 | #define n2l8(c,l) (l =((uint64_t)(*((c)++)))<<56, \ | ||
40 | l|=((uint64_t)(*((c)++)))<<48, \ | ||
41 | l|=((uint64_t)(*((c)++)))<<40, \ | ||
42 | l|=((uint64_t)(*((c)++)))<<32, \ | ||
43 | l|=((uint64_t)(*((c)++)))<<24, \ | ||
44 | l|=((uint64_t)(*((c)++)))<<16, \ | ||
45 | l|=((uint64_t)(*((c)++)))<< 8, \ | ||
46 | l|=((uint64_t)(*((c)++)))) | ||
47 | |||
48 | #define l2n8(l,c) (*((c)++)=(unsigned char)(((l)>>56)&0xff), \ | 37 | #define l2n8(l,c) (*((c)++)=(unsigned char)(((l)>>56)&0xff), \ |
49 | *((c)++)=(unsigned char)(((l)>>48)&0xff), \ | 38 | *((c)++)=(unsigned char)(((l)>>48)&0xff), \ |
50 | *((c)++)=(unsigned char)(((l)>>40)&0xff), \ | 39 | *((c)++)=(unsigned char)(((l)>>40)&0xff), \ |
diff --git a/src/lib/libcrypto/ct/ct_oct.c b/src/lib/libcrypto/ct/ct_oct.c index 1163c8b364..4ea58aeb8a 100644 --- a/src/lib/libcrypto/ct/ct_oct.c +++ b/src/lib/libcrypto/ct/ct_oct.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ct_oct.c,v 1.4 2021/12/05 09:37:46 tb Exp $ */ | 1 | /* $OpenBSD: ct_oct.c,v 1.5 2021/12/18 15:59:50 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. | 3 | * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. |
4 | * | 4 | * |
@@ -20,148 +20,164 @@ | |||
20 | #include <openssl/ct.h> | 20 | #include <openssl/ct.h> |
21 | #include <openssl/err.h> | 21 | #include <openssl/err.h> |
22 | 22 | ||
23 | #include "bytestring.h" | ||
23 | #include "ct_local.h" | 24 | #include "ct_local.h" |
24 | 25 | ||
25 | int | 26 | static int |
26 | o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len) | 27 | o2i_SCT_signature_internal(SCT *sct, CBS *cbs) |
27 | { | 28 | { |
28 | size_t siglen; | 29 | uint8_t hash_alg, sig_alg; |
29 | size_t len_remaining = len; | 30 | CBS signature; |
30 | const unsigned char *p; | ||
31 | 31 | ||
32 | if (sct->version != SCT_VERSION_V1) { | 32 | if (sct->version != SCT_VERSION_V1) { |
33 | CTerror(CT_R_UNSUPPORTED_VERSION); | 33 | CTerror(CT_R_UNSUPPORTED_VERSION); |
34 | return -1; | 34 | return 0; |
35 | } | 35 | } |
36 | |||
36 | /* | 37 | /* |
37 | * digitally-signed struct header: (1 byte) Hash algorithm (1 byte) | 38 | * Parse a digitally-signed element - see RFC 6962 section 3.2 and |
38 | * Signature algorithm (2 bytes + ?) Signature | 39 | * RFC 5246 sections 4.7 and 7.4.1.4.1. |
39 | * | ||
40 | * This explicitly rejects empty signatures: they're invalid for | ||
41 | * all supported algorithms. | ||
42 | */ | 40 | */ |
43 | if (len <= 4) { | 41 | if (!CBS_get_u8(cbs, &hash_alg)) |
44 | CTerror(CT_R_SCT_INVALID_SIGNATURE); | 42 | goto err_invalid; |
45 | return -1; | 43 | if (!CBS_get_u8(cbs, &sig_alg)) |
46 | } | 44 | goto err_invalid; |
45 | if (!CBS_get_u16_length_prefixed(cbs, &signature)) | ||
46 | goto err_invalid; | ||
47 | if (CBS_len(cbs) != 0) | ||
48 | goto err_invalid; | ||
47 | 49 | ||
48 | p = *in; | ||
49 | /* Get hash and signature algorithm */ | ||
50 | sct->hash_alg = *p++; | ||
51 | sct->sig_alg = *p++; | ||
52 | if (SCT_get_signature_nid(sct) == NID_undef) { | ||
53 | CTerror(CT_R_SCT_INVALID_SIGNATURE); | ||
54 | return -1; | ||
55 | } | ||
56 | /* | 50 | /* |
57 | * Retrieve signature and check it is consistent with the buffer | 51 | * Reject empty signatures since they are invalid for all supported |
58 | * length | 52 | * algorithms (this really should be done by SCT_set1_signature()). |
59 | */ | 53 | */ |
60 | n2s(p, siglen); | 54 | if (CBS_len(&signature) == 0) |
61 | len_remaining -= (p - *in); | 55 | goto err_invalid; |
62 | if (siglen > len_remaining) { | 56 | |
63 | CTerror(CT_R_SCT_INVALID_SIGNATURE); | 57 | sct->hash_alg = hash_alg; |
58 | sct->sig_alg = sig_alg; | ||
59 | |||
60 | if (SCT_get_signature_nid(sct) == NID_undef) | ||
61 | goto err_invalid; | ||
62 | |||
63 | if (!SCT_set1_signature(sct, CBS_data(&signature), CBS_len(&signature))) | ||
64 | return 0; | ||
65 | |||
66 | return 1; | ||
67 | |||
68 | err_invalid: | ||
69 | CTerror(CT_R_SCT_INVALID_SIGNATURE); | ||
70 | return 0; | ||
71 | } | ||
72 | |||
73 | int | ||
74 | o2i_SCT_signature(SCT *sct, const unsigned char **in, size_t len) | ||
75 | { | ||
76 | size_t sig_len; | ||
77 | CBS cbs; | ||
78 | |||
79 | CBS_init(&cbs, *in, len); | ||
80 | |||
81 | if (!o2i_SCT_signature_internal(sct, &cbs)) | ||
64 | return -1; | 82 | return -1; |
65 | } | ||
66 | 83 | ||
67 | if (SCT_set1_signature(sct, p, siglen) != 1) | 84 | sig_len = len - CBS_len(&cbs); |
85 | if (sig_len > INT_MAX) | ||
68 | return -1; | 86 | return -1; |
69 | len_remaining -= siglen; | ||
70 | *in = p + siglen; | ||
71 | 87 | ||
72 | return len - len_remaining; | 88 | *in = CBS_data(&cbs); |
89 | |||
90 | return sig_len; | ||
73 | } | 91 | } |
74 | 92 | ||
75 | SCT * | 93 | static int |
76 | o2i_SCT(SCT **psct, const unsigned char **in, size_t len) | 94 | o2i_SCT_internal(SCT **out_sct, CBS *cbs) |
77 | { | 95 | { |
78 | SCT *sct = NULL; | 96 | SCT *sct = NULL; |
79 | const unsigned char *p; | 97 | uint8_t version; |
80 | 98 | ||
81 | /* | 99 | *out_sct = NULL; |
82 | * XXX paging Dr Sing. please report to this function for an emergency | ||
83 | * CBS/CBB implantation surgery. Stat. | ||
84 | */ | ||
85 | |||
86 | if (len == 0 || len > MAX_SCT_SIZE) { | ||
87 | CTerror(CT_R_SCT_INVALID); | ||
88 | goto err; | ||
89 | } | ||
90 | 100 | ||
91 | if ((sct = SCT_new()) == NULL) | 101 | if ((sct = SCT_new()) == NULL) |
92 | goto err; | 102 | goto err; |
93 | 103 | ||
94 | p = *in; | 104 | if (CBS_len(cbs) > MAX_SCT_SIZE) |
105 | goto err_invalid; | ||
106 | if (!CBS_peek_u8(cbs, &version)) | ||
107 | goto err_invalid; | ||
95 | 108 | ||
96 | sct->version = *p; | 109 | sct->version = version; |
97 | if (sct->version == SCT_VERSION_V1) { | 110 | |
98 | int sig_len; | 111 | if (version == SCT_VERSION_V1) { |
99 | size_t len2; | 112 | CBS extensions, log_id; |
100 | /*- | 113 | uint64_t timestamp; |
101 | * Fixed-length header: | 114 | |
102 | * struct { | 115 | /* |
103 | * Version sct_version; (1 byte) | 116 | * Parse a v1 SignedCertificateTimestamp - see RFC 6962 |
104 | * log_id id; (32 bytes) | 117 | * section 3.2. |
105 | * uint64 timestamp; (8 bytes) | ||
106 | * CtExtensions extensions; (2 bytes + ?) | ||
107 | * } | ||
108 | */ | 118 | */ |
109 | if (len < 43) { | 119 | if (!CBS_get_u8(cbs, &version)) |
110 | CTerror(CT_R_SCT_INVALID); | 120 | goto err_invalid; |
111 | goto err; | 121 | if (!CBS_get_bytes(cbs, &log_id, CT_V1_LOG_ID_LEN)) |
112 | } | 122 | goto err_invalid; |
113 | len -= 43; | 123 | if (!CBS_get_u64(cbs, ×tamp)) |
114 | p++; | 124 | goto err_invalid; |
115 | sct->log_id = malloc(CT_V1_HASHLEN); | 125 | if (!CBS_get_u16_length_prefixed(cbs, &extensions)) |
116 | if (sct->log_id == NULL) | 126 | goto err_invalid; |
127 | |||
128 | if (!CBS_stow(&log_id, &sct->log_id, &sct->log_id_len)) | ||
117 | goto err; | 129 | goto err; |
118 | memcpy(sct->log_id, p, CT_V1_HASHLEN); | ||
119 | sct->log_id_len = CT_V1_HASHLEN; | ||
120 | p += CT_V1_HASHLEN; | ||
121 | 130 | ||
122 | n2l8(p, sct->timestamp); | 131 | sct->timestamp = timestamp; |
123 | 132 | ||
124 | n2s(p, len2); | 133 | if (!CBS_stow(&extensions, &sct->ext, &sct->ext_len)) |
125 | if (len < len2) { | ||
126 | CTerror(CT_R_SCT_INVALID); | ||
127 | goto err; | 134 | goto err; |
128 | } | ||
129 | if (len2 > 0) { | ||
130 | sct->ext = malloc(len2); | ||
131 | if (sct->ext == NULL) | ||
132 | goto err; | ||
133 | memcpy(sct->ext, p, len2); | ||
134 | } | ||
135 | sct->ext_len = len2; | ||
136 | p += len2; | ||
137 | len -= len2; | ||
138 | 135 | ||
139 | sig_len = o2i_SCT_signature(sct, &p, len); | 136 | if (!o2i_SCT_signature_internal(sct, cbs)) |
140 | if (sig_len <= 0) { | ||
141 | CTerror(CT_R_SCT_INVALID); | ||
142 | goto err; | 137 | goto err; |
143 | } | 138 | |
144 | len -= sig_len; | 139 | if (CBS_len(cbs) != 0) |
145 | *in = p + len; | 140 | goto err_invalid; |
146 | } else { | 141 | } else { |
147 | /* If not V1 just cache encoding */ | 142 | /* If not V1 just cache encoding. */ |
148 | sct->sct = malloc(len); | 143 | if (!CBS_stow(cbs, &sct->sct, &sct->sct_len)) |
149 | if (sct->sct == NULL) | ||
150 | goto err; | 144 | goto err; |
151 | memcpy(sct->sct, p, len); | ||
152 | sct->sct_len = len; | ||
153 | *in = p + len; | ||
154 | } | 145 | } |
155 | 146 | ||
147 | *out_sct = sct; | ||
148 | |||
149 | return 1; | ||
150 | |||
151 | err_invalid: | ||
152 | CTerror(CT_R_SCT_INVALID); | ||
153 | err: | ||
154 | SCT_free(sct); | ||
155 | |||
156 | return 0; | ||
157 | } | ||
158 | |||
159 | SCT * | ||
160 | o2i_SCT(SCT **psct, const unsigned char **in, size_t len) | ||
161 | { | ||
162 | SCT *sct; | ||
163 | CBS cbs; | ||
164 | |||
165 | CBS_init(&cbs, *in, len); | ||
166 | |||
156 | if (psct != NULL) { | 167 | if (psct != NULL) { |
157 | SCT_free(*psct); | 168 | SCT_free(*psct); |
158 | *psct = sct; | 169 | *psct = NULL; |
159 | } | 170 | } |
160 | 171 | ||
172 | if (!o2i_SCT_internal(&sct, &cbs)) | ||
173 | return NULL; | ||
174 | |||
175 | if (psct != NULL) | ||
176 | *psct = sct; | ||
177 | |||
178 | *in = CBS_data(&cbs); | ||
179 | |||
161 | return sct; | 180 | return sct; |
162 | err: | ||
163 | SCT_free(sct); | ||
164 | return NULL; | ||
165 | } | 181 | } |
166 | 182 | ||
167 | int | 183 | int |
@@ -271,52 +287,39 @@ i2o_SCT(const SCT *sct, unsigned char **out) | |||
271 | } | 287 | } |
272 | 288 | ||
273 | STACK_OF(SCT) * | 289 | STACK_OF(SCT) * |
274 | o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, size_t len) | 290 | o2i_SCT_LIST(STACK_OF(SCT) **scts, const unsigned char **pp, size_t len) |
275 | { | 291 | { |
292 | CBS cbs, cbs_scts, cbs_sct; | ||
276 | STACK_OF(SCT) *sk = NULL; | 293 | STACK_OF(SCT) *sk = NULL; |
277 | size_t list_len, sct_len; | ||
278 | 294 | ||
279 | if (len < 2 || len > MAX_SCT_LIST_SIZE) { | 295 | CBS_init(&cbs, *pp, len); |
280 | CTerror(CT_R_SCT_LIST_INVALID); | ||
281 | return NULL; | ||
282 | } | ||
283 | 296 | ||
284 | n2s(*pp, list_len); | 297 | if (CBS_len(&cbs) > MAX_SCT_LIST_SIZE) |
285 | if (list_len != len - 2) { | 298 | goto err_invalid; |
286 | CTerror(CT_R_SCT_LIST_INVALID); | 299 | if (!CBS_get_u16_length_prefixed(&cbs, &cbs_scts)) |
287 | return NULL; | 300 | goto err_invalid; |
288 | } | 301 | if (CBS_len(&cbs) != 0) |
302 | goto err_invalid; | ||
289 | 303 | ||
290 | if (a == NULL || *a == NULL) { | 304 | if (scts == NULL || *scts == NULL) { |
291 | sk = sk_SCT_new_null(); | 305 | if ((sk = sk_SCT_new_null()) == NULL) |
292 | if (sk == NULL) | ||
293 | return NULL; | 306 | return NULL; |
294 | } else { | 307 | } else { |
295 | SCT *sct; | 308 | SCT *sct; |
296 | 309 | ||
297 | /* Use the given stack, but empty it first. */ | 310 | /* Use the given stack, but empty it first. */ |
298 | sk = *a; | 311 | sk = *scts; |
299 | while ((sct = sk_SCT_pop(sk)) != NULL) | 312 | while ((sct = sk_SCT_pop(sk)) != NULL) |
300 | SCT_free(sct); | 313 | SCT_free(sct); |
301 | } | 314 | } |
302 | 315 | ||
303 | while (list_len > 0) { | 316 | while (CBS_len(&cbs_scts) > 0) { |
304 | SCT *sct; | 317 | SCT *sct; |
305 | 318 | ||
306 | if (list_len < 2) { | 319 | if (!CBS_get_u16_length_prefixed(&cbs_scts, &cbs_sct)) |
307 | CTerror(CT_R_SCT_LIST_INVALID); | 320 | goto err_invalid; |
308 | goto err; | ||
309 | } | ||
310 | n2s(*pp, sct_len); | ||
311 | list_len -= 2; | ||
312 | 321 | ||
313 | if (sct_len == 0 || sct_len > list_len) { | 322 | if (!o2i_SCT_internal(&sct, &cbs_sct)) |
314 | CTerror(CT_R_SCT_LIST_INVALID); | ||
315 | goto err; | ||
316 | } | ||
317 | list_len -= sct_len; | ||
318 | |||
319 | if ((sct = o2i_SCT(NULL, pp, sct_len)) == NULL) | ||
320 | goto err; | 323 | goto err; |
321 | if (!sk_SCT_push(sk, sct)) { | 324 | if (!sk_SCT_push(sk, sct)) { |
322 | SCT_free(sct); | 325 | SCT_free(sct); |
@@ -324,13 +327,19 @@ o2i_SCT_LIST(STACK_OF(SCT) **a, const unsigned char **pp, size_t len) | |||
324 | } | 327 | } |
325 | } | 328 | } |
326 | 329 | ||
327 | if (a != NULL && *a == NULL) | 330 | if (scts != NULL && *scts == NULL) |
328 | *a = sk; | 331 | *scts = sk; |
332 | |||
333 | *pp = CBS_data(&cbs); | ||
334 | |||
329 | return sk; | 335 | return sk; |
330 | 336 | ||
337 | err_invalid: | ||
338 | CTerror(CT_R_SCT_LIST_INVALID); | ||
331 | err: | 339 | err: |
332 | if (a == NULL || *a == NULL) | 340 | if (scts == NULL || *scts == NULL) |
333 | SCT_LIST_free(sk); | 341 | SCT_LIST_free(sk); |
342 | |||
334 | return NULL; | 343 | return NULL; |
335 | } | 344 | } |
336 | 345 | ||