// Copyright 2017 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/cert/internal/general_names.h" #include "base/logging.h" #include "base/strings/string_util.h" #include "net/cert/internal/cert_error_params.h" #include "net/cert/internal/cert_errors.h" #include "net/der/input.h" #include "net/der/parser.h" #include "net/der/tag.h" namespace net { DEFINE_CERT_ERROR_ID(kFailedParsingGeneralName, "Failed parsing GeneralName"); namespace { DEFINE_CERT_ERROR_ID(kRFC822NameNotAscii, "rfc822Name is not ASCII"); DEFINE_CERT_ERROR_ID(kDnsNameNotAscii, "dNSName is not ASCII"); DEFINE_CERT_ERROR_ID(kURINotAscii, "uniformResourceIdentifier is not ASCII"); DEFINE_CERT_ERROR_ID(kFailedParsingIp, "Failed parsing iPAddress"); DEFINE_CERT_ERROR_ID(kUnknownGeneralNameType, "Unknown GeneralName type"); DEFINE_CERT_ERROR_ID(kFailedReadingGeneralNames, "Failed reading GeneralNames SEQUENCE"); DEFINE_CERT_ERROR_ID(kGeneralNamesTrailingData, "GeneralNames contains trailing data after the sequence"); DEFINE_CERT_ERROR_ID(kGeneralNamesEmpty, "GeneralNames is a sequence of 0 elements"); DEFINE_CERT_ERROR_ID(kFailedReadingGeneralName, "Failed reading GeneralName TLV"); // Return true if the bitmask |mask| contains only zeros after the first // |prefix_length| bits. bool IsSuffixZero(const IPAddressBytes& mask, unsigned prefix_length) { size_t zero_bits = mask.size() * CHAR_BIT - prefix_length; size_t zero_bytes = zero_bits / CHAR_BIT; std::vector zeros(zero_bytes, 0); if (memcmp(zeros.data(), mask.data() + mask.size() - zero_bytes, zero_bytes)) return false; size_t leftover_bits = zero_bits % CHAR_BIT; if (leftover_bits) { uint8_t b = mask[mask.size() - zero_bytes - 1]; for (size_t i = 0; i < leftover_bits; ++i) { if (b & (1 << i)) return false; } } return true; } } // namespace GeneralNames::GeneralNames() {} GeneralNames::~GeneralNames() {} // static std::unique_ptr GeneralNames::Create( const der::Input& general_names_tlv, CertErrors* errors) { DCHECK(errors); // RFC 5280 section 4.2.1.6: // GeneralNames ::= SEQUENCE SIZE (1..MAX) OF GeneralName der::Parser parser(general_names_tlv); der::Input sequence_value; if (!parser.ReadTag(der::kSequence, &sequence_value)) { errors->AddError(kFailedReadingGeneralNames); return nullptr; } // Should not have trailing data after GeneralNames sequence. if (parser.HasMore()) { errors->AddError(kGeneralNamesTrailingData); return nullptr; } return CreateFromValue(sequence_value, errors); } // static std::unique_ptr GeneralNames::CreateFromValue( const der::Input& general_names_value, CertErrors* errors) { DCHECK(errors); std::unique_ptr general_names(new GeneralNames()); der::Parser sequence_parser(general_names_value); // The GeneralNames sequence should have at least 1 element. if (!sequence_parser.HasMore()) { errors->AddError(kGeneralNamesEmpty); return nullptr; } while (sequence_parser.HasMore()) { der::Input raw_general_name; if (!sequence_parser.ReadRawTLV(&raw_general_name)) { errors->AddError(kFailedReadingGeneralName); return nullptr; } if (!ParseGeneralName(raw_general_name, IP_ADDRESS_ONLY, general_names.get(), errors)) { errors->AddError(kFailedParsingGeneralName); return nullptr; } } return general_names; } WARN_UNUSED_RESULT bool ParseGeneralName( const der::Input& input, GeneralNames::ParseGeneralNameIPAddressType ip_address_type, GeneralNames* subtrees, CertErrors* errors) { DCHECK(errors); der::Parser parser(input); der::Tag tag; der::Input value; if (!parser.ReadTagAndValue(&tag, &value)) return false; GeneralNameTypes name_type = GENERAL_NAME_NONE; if (tag == der::ContextSpecificConstructed(0)) { // otherName [0] OtherName, name_type = GENERAL_NAME_OTHER_NAME; subtrees->other_names.push_back(value); } else if (tag == der::ContextSpecificPrimitive(1)) { // rfc822Name [1] IA5String, name_type = GENERAL_NAME_RFC822_NAME; const base::StringPiece s = value.AsStringPiece(); if (!base::IsStringASCII(s)) { errors->AddError(kRFC822NameNotAscii); return false; } subtrees->rfc822_names.push_back(s); } else if (tag == der::ContextSpecificPrimitive(2)) { // dNSName [2] IA5String, name_type = GENERAL_NAME_DNS_NAME; const base::StringPiece s = value.AsStringPiece(); if (!base::IsStringASCII(s)) { errors->AddError(kDnsNameNotAscii); return false; } subtrees->dns_names.push_back(s); } else if (tag == der::ContextSpecificConstructed(3)) { // x400Address [3] ORAddress, name_type = GENERAL_NAME_X400_ADDRESS; subtrees->x400_addresses.push_back(value); } else if (tag == der::ContextSpecificConstructed(4)) { // directoryName [4] Name, name_type = GENERAL_NAME_DIRECTORY_NAME; // Name is a CHOICE { rdnSequence RDNSequence }, therefore the SEQUENCE // tag is explicit. Remove it, since the name matching functions expect // only the value portion. der::Parser name_parser(value); der::Input name_value; if (!name_parser.ReadTag(der::kSequence, &name_value) || parser.HasMore()) return false; subtrees->directory_names.push_back(name_value); } else if (tag == der::ContextSpecificConstructed(5)) { // ediPartyName [5] EDIPartyName, name_type = GENERAL_NAME_EDI_PARTY_NAME; subtrees->edi_party_names.push_back(value); } else if (tag == der::ContextSpecificPrimitive(6)) { // uniformResourceIdentifier [6] IA5String, name_type = GENERAL_NAME_UNIFORM_RESOURCE_IDENTIFIER; const base::StringPiece s = value.AsStringPiece(); if (!base::IsStringASCII(s)) { errors->AddError(kURINotAscii); return false; } subtrees->uniform_resource_identifiers.push_back(s); } else if (tag == der::ContextSpecificPrimitive(7)) { // iPAddress [7] OCTET STRING, name_type = GENERAL_NAME_IP_ADDRESS; if (ip_address_type == GeneralNames::IP_ADDRESS_ONLY) { // RFC 5280 section 4.2.1.6: // When the subjectAltName extension contains an iPAddress, the address // MUST be stored in the octet string in "network byte order", as // specified in [RFC791]. The least significant bit (LSB) of each octet // is the LSB of the corresponding byte in the network address. For IP // version 4, as specified in [RFC791], the octet string MUST contain // exactly four octets. For IP version 6, as specified in [RFC2460], // the octet string MUST contain exactly sixteen octets. if ((value.Length() != IPAddress::kIPv4AddressSize && value.Length() != IPAddress::kIPv6AddressSize)) { errors->AddError(kFailedParsingIp); return false; } subtrees->ip_addresses.push_back( IPAddress(value.UnsafeData(), value.Length())); } else { DCHECK_EQ(ip_address_type, GeneralNames::IP_ADDRESS_AND_NETMASK); // RFC 5280 section 4.2.1.10: // The syntax of iPAddress MUST be as described in Section 4.2.1.6 with // the following additions specifically for name constraints. For IPv4 // addresses, the iPAddress field of GeneralName MUST contain eight (8) // octets, encoded in the style of RFC 4632 (CIDR) to represent an // address range [RFC4632]. For IPv6 addresses, the iPAddress field // MUST contain 32 octets similarly encoded. For example, a name // constraint for "class C" subnet 192.0.2.0 is represented as the // octets C0 00 02 00 FF FF FF 00, representing the CIDR notation // 192.0.2.0/24 (mask 255.255.255.0). if (value.Length() != IPAddress::kIPv4AddressSize * 2 && value.Length() != IPAddress::kIPv6AddressSize * 2) { errors->AddError(kFailedParsingIp); return false; } const IPAddress mask(value.UnsafeData() + value.Length() / 2, value.Length() / 2); const unsigned mask_prefix_length = MaskPrefixLength(mask); if (!IsSuffixZero(mask.bytes(), mask_prefix_length)) { errors->AddError(kFailedParsingIp); return false; } subtrees->ip_address_ranges.push_back( std::make_pair(IPAddress(value.UnsafeData(), value.Length() / 2), mask_prefix_length)); } } else if (tag == der::ContextSpecificPrimitive(8)) { // registeredID [8] OBJECT IDENTIFIER } name_type = GENERAL_NAME_REGISTERED_ID; subtrees->registered_ids.push_back(value); } else { errors->AddError(kUnknownGeneralNameType, CreateCertErrorParams1SizeT("tag", tag)); return false; } DCHECK_NE(GENERAL_NAME_NONE, name_type); subtrees->present_name_types |= name_type; return true; } } // namespace net