Mercurial > trustbridge > nss-cmake-static
comparison nss/lib/certhigh/certvfypkix.c @ 0:1e5118fa0cb1
This is NSS with a Cmake Buildsyste
To compile a static NSS library for Windows we've used the
Chromium-NSS fork and added a Cmake buildsystem to compile
it statically for Windows. See README.chromium for chromium
changes and README.trustbridge for our modifications.
author | Andre Heinecke <andre.heinecke@intevation.de> |
---|---|
date | Mon, 28 Jul 2014 10:47:06 +0200 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
-1:000000000000 | 0:1e5118fa0cb1 |
---|---|
1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
4 /* | |
5 * nss_pkix_proxy.h | |
6 * | |
7 * PKIX - NSS proxy functions | |
8 * | |
9 * NOTE: All structures, functions, data types are parts of library private | |
10 * api and are subjects to change in any following releases. | |
11 * | |
12 */ | |
13 #include "prerror.h" | |
14 #include "prprf.h" | |
15 | |
16 #include "nspr.h" | |
17 #include "pk11func.h" | |
18 #include "certdb.h" | |
19 #include "cert.h" | |
20 #include "secerr.h" | |
21 #include "nssb64.h" | |
22 #include "secasn1.h" | |
23 #include "secder.h" | |
24 #include "pkit.h" | |
25 | |
26 #include "pkix_pl_common.h" | |
27 | |
28 extern PRLogModuleInfo *pkixLog; | |
29 | |
30 #ifdef DEBUG_volkov | |
31 /* Temporary declarations of functioins. Will be removed with fix for | |
32 * 391183 */ | |
33 extern char * | |
34 pkix_Error2ASCII(PKIX_Error *error, void *plContext); | |
35 | |
36 extern void | |
37 cert_PrintCert(PKIX_PL_Cert *pkixCert, void *plContext); | |
38 | |
39 extern PKIX_Error * | |
40 cert_PrintCertChain(PKIX_List *pkixCertChain, void *plContext); | |
41 | |
42 #endif /* DEBUG */ | |
43 | |
44 #ifdef PKIX_OBJECT_LEAK_TEST | |
45 | |
46 extern PKIX_UInt32 | |
47 pkix_pl_lifecycle_ObjectLeakCheck(int *); | |
48 | |
49 extern SECStatus | |
50 pkix_pl_lifecycle_ObjectTableUpdate(int *objCountTable); | |
51 | |
52 PRInt32 parallelFnInvocationCount; | |
53 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
54 | |
55 | |
56 static PRBool usePKIXValidationEngine = PR_FALSE; | |
57 | |
58 /* | |
59 * FUNCTION: CERT_SetUsePKIXForValidation | |
60 * DESCRIPTION: | |
61 * | |
62 * Enables or disables use of libpkix for certificate validation | |
63 * | |
64 * PARAMETERS: | |
65 * "enable" | |
66 * PR_TRUE: enables use of libpkix for cert validation. | |
67 * PR_FALSE: disables. | |
68 * THREAD SAFETY: | |
69 * NOT Thread Safe. | |
70 * RETURNS: | |
71 * Returns SECSuccess if successfully enabled | |
72 */ | |
73 SECStatus | |
74 CERT_SetUsePKIXForValidation(PRBool enable) | |
75 { | |
76 usePKIXValidationEngine = (enable > 0) ? PR_TRUE : PR_FALSE; | |
77 return SECSuccess; | |
78 } | |
79 | |
80 /* | |
81 * FUNCTION: CERT_GetUsePKIXForValidation | |
82 * DESCRIPTION: | |
83 * | |
84 * Checks if libpkix building function should be use for certificate | |
85 * chain building. | |
86 * | |
87 * PARAMETERS: | |
88 * NONE | |
89 * THREAD SAFETY: | |
90 * NOT Thread Safe | |
91 * RETURNS: | |
92 * Returns PR_TRUE if libpkix should be used. PR_FALSE otherwise. | |
93 */ | |
94 PRBool | |
95 CERT_GetUsePKIXForValidation() | |
96 { | |
97 return usePKIXValidationEngine; | |
98 } | |
99 | |
100 #ifdef NOTDEF | |
101 /* | |
102 * FUNCTION: cert_NssKeyUsagesToPkix | |
103 * DESCRIPTION: | |
104 * | |
105 * Converts nss key usage bit field(PRUint32) to pkix key usage | |
106 * bit field. | |
107 * | |
108 * PARAMETERS: | |
109 * "nssKeyUsage" | |
110 * Nss key usage bit field. | |
111 * "pkixKeyUsage" | |
112 * Pkix key usage big field. | |
113 * "plContext" | |
114 * Platform-specific context pointer. | |
115 * THREAD SAFETY: | |
116 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
117 * RETURNS: | |
118 * Returns NULL if the function succeeds. | |
119 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
120 */ | |
121 static PKIX_Error* | |
122 cert_NssKeyUsagesToPkix( | |
123 PRUint32 nssKeyUsage, | |
124 PKIX_UInt32 *pPkixKeyUsage, | |
125 void *plContext) | |
126 { | |
127 PKIX_UInt32 pkixKeyUsage = 0; | |
128 | |
129 PKIX_ENTER(CERTVFYPKIX, "cert_NssKeyUsagesToPkix"); | |
130 PKIX_NULLCHECK_ONE(pPkixKeyUsage); | |
131 | |
132 *pPkixKeyUsage = 0; | |
133 | |
134 if (nssKeyUsage & KU_DIGITAL_SIGNATURE) { | |
135 pkixKeyUsage |= PKIX_DIGITAL_SIGNATURE; | |
136 } | |
137 | |
138 if (nssKeyUsage & KU_NON_REPUDIATION) { | |
139 pkixKeyUsage |= PKIX_NON_REPUDIATION; | |
140 } | |
141 | |
142 if (nssKeyUsage & KU_KEY_ENCIPHERMENT) { | |
143 pkixKeyUsage |= PKIX_KEY_ENCIPHERMENT; | |
144 } | |
145 | |
146 if (nssKeyUsage & KU_DATA_ENCIPHERMENT) { | |
147 pkixKeyUsage |= PKIX_DATA_ENCIPHERMENT; | |
148 } | |
149 | |
150 if (nssKeyUsage & KU_KEY_AGREEMENT) { | |
151 pkixKeyUsage |= PKIX_KEY_AGREEMENT; | |
152 } | |
153 | |
154 if (nssKeyUsage & KU_KEY_CERT_SIGN) { | |
155 pkixKeyUsage |= PKIX_KEY_CERT_SIGN; | |
156 } | |
157 | |
158 if (nssKeyUsage & KU_CRL_SIGN) { | |
159 pkixKeyUsage |= PKIX_CRL_SIGN; | |
160 } | |
161 | |
162 if (nssKeyUsage & KU_ENCIPHER_ONLY) { | |
163 pkixKeyUsage |= PKIX_ENCIPHER_ONLY; | |
164 } | |
165 | |
166 /* Not supported. XXX we should support this once it is | |
167 * fixed in NSS */ | |
168 /* pkixKeyUsage |= PKIX_DECIPHER_ONLY; */ | |
169 | |
170 *pPkixKeyUsage = pkixKeyUsage; | |
171 | |
172 PKIX_RETURN(CERTVFYPKIX); | |
173 } | |
174 | |
175 extern SECOidTag ekuOidStrings[]; | |
176 | |
177 enum { | |
178 ekuIndexSSLServer = 0, | |
179 ekuIndexSSLClient, | |
180 ekuIndexCodeSigner, | |
181 ekuIndexEmail, | |
182 ekuIndexTimeStamp, | |
183 ekuIndexStatusResponder, | |
184 ekuIndexUnknown | |
185 } ekuIndex; | |
186 | |
187 typedef struct { | |
188 SECCertUsage certUsage; | |
189 PRUint32 ekuStringIndex; | |
190 } SECCertUsageToEku; | |
191 | |
192 const SECCertUsageToEku certUsageEkuStringMap[] = { | |
193 {certUsageSSLClient, ekuIndexSSLClient}, | |
194 {certUsageSSLServer, ekuIndexSSLServer}, | |
195 {certUsageSSLCA, ekuIndexSSLServer}, | |
196 {certUsageEmailSigner, ekuIndexEmail}, | |
197 {certUsageEmailRecipient, ekuIndexEmail}, | |
198 {certUsageObjectSigner, ekuIndexCodeSigner}, | |
199 {certUsageUserCertImport, ekuIndexUnknown}, | |
200 {certUsageVerifyCA, ekuIndexUnknown}, | |
201 {certUsageProtectedObjectSigner, ekuIndexUnknown}, | |
202 {certUsageStatusResponder, ekuIndexStatusResponder}, | |
203 {certUsageAnyCA, ekuIndexUnknown}, | |
204 }; | |
205 | |
206 /* | |
207 * FUNCTION: cert_NssCertificateUsageToPkixKUAndEKU | |
208 * DESCRIPTION: | |
209 * | |
210 * Converts nss CERTCertificateUsage bit field to pkix key and | |
211 * extended key usages. | |
212 * | |
213 * PARAMETERS: | |
214 * "cert" | |
215 * Pointer to CERTCertificate structure of validating cert. | |
216 * "requiredCertUsages" | |
217 * Required usage that will be converted to pkix eku and ku. | |
218 * "requiredKeyUsage", | |
219 * Additional key usages impose to cert. | |
220 * "isCA", | |
221 * it true, convert usages for cert that is a CA cert. | |
222 * "ppkixEKUList" | |
223 * Returned address of a list of pkix extended key usages. | |
224 * "ppkixKU" | |
225 * Returned address of pkix required key usages bit field. | |
226 * "plContext" | |
227 * Platform-specific context pointer. | |
228 * THREAD SAFETY: | |
229 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
230 * RETURNS: | |
231 * Returns NULL if the function succeeds. | |
232 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
233 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
234 */ | |
235 static PKIX_Error* | |
236 cert_NssCertificateUsageToPkixKUAndEKU( | |
237 CERTCertificate *cert, | |
238 SECCertUsage requiredCertUsage, | |
239 PRUint32 requiredKeyUsages, | |
240 PRBool isCA, | |
241 PKIX_List **ppkixEKUList, | |
242 PKIX_UInt32 *ppkixKU, | |
243 void *plContext) | |
244 { | |
245 PKIX_List *ekuOidsList = NULL; | |
246 PKIX_PL_OID *ekuOid = NULL; | |
247 int i = 0; | |
248 int ekuIndex = ekuIndexUnknown; | |
249 | |
250 PKIX_ENTER(CERTVFYPKIX, "cert_NssCertificateUsageToPkixEku"); | |
251 PKIX_NULLCHECK_TWO(ppkixEKUList, ppkixKU); | |
252 | |
253 PKIX_CHECK( | |
254 PKIX_List_Create(&ekuOidsList, plContext), | |
255 PKIX_LISTCREATEFAILED); | |
256 | |
257 for (;i < PR_ARRAY_SIZE(certUsageEkuStringMap);i++) { | |
258 const SECCertUsageToEku *usageToEkuElem = | |
259 &certUsageEkuStringMap[i]; | |
260 if (usageToEkuElem->certUsage == requiredCertUsage) { | |
261 ekuIndex = usageToEkuElem->ekuStringIndex; | |
262 break; | |
263 } | |
264 } | |
265 if (ekuIndex != ekuIndexUnknown) { | |
266 PRUint32 reqKeyUsage = 0; | |
267 PRUint32 reqCertType = 0; | |
268 | |
269 CERT_KeyUsageAndTypeForCertUsage(requiredCertUsage, isCA, | |
270 &reqKeyUsage, | |
271 &reqCertType); | |
272 | |
273 requiredKeyUsages |= reqKeyUsage; | |
274 | |
275 PKIX_CHECK( | |
276 PKIX_PL_OID_Create(ekuOidStrings[ekuIndex], &ekuOid, | |
277 plContext), | |
278 PKIX_OIDCREATEFAILED); | |
279 | |
280 PKIX_CHECK( | |
281 PKIX_List_AppendItem(ekuOidsList, (PKIX_PL_Object *)ekuOid, | |
282 plContext), | |
283 PKIX_LISTAPPENDITEMFAILED); | |
284 | |
285 PKIX_DECREF(ekuOid); | |
286 } | |
287 | |
288 PKIX_CHECK( | |
289 cert_NssKeyUsagesToPkix(requiredKeyUsages, ppkixKU, plContext), | |
290 PKIX_NSSCERTIFICATEUSAGETOPKIXKUANDEKUFAILED); | |
291 | |
292 *ppkixEKUList = ekuOidsList; | |
293 ekuOidsList = NULL; | |
294 | |
295 cleanup: | |
296 | |
297 PKIX_DECREF(ekuOid); | |
298 PKIX_DECREF(ekuOidsList); | |
299 | |
300 PKIX_RETURN(CERTVFYPKIX); | |
301 } | |
302 | |
303 #endif | |
304 | |
305 /* | |
306 * FUNCTION: cert_ProcessingParamsSetKeyAndCertUsage | |
307 * DESCRIPTION: | |
308 * | |
309 * Converts cert usage to pkix KU type and sets | |
310 * converted data into PKIX_ProcessingParams object. It also sets | |
311 * proper cert usage into nsscontext object. | |
312 * | |
313 * PARAMETERS: | |
314 * "procParams" | |
315 * Pointer to PKIX_ProcessingParams used during validation. | |
316 * "requiredCertUsage" | |
317 * Required certificate usages the certificate and chain is built and | |
318 * validated for. | |
319 * "requiredKeyUsage" | |
320 * Request additional key usages the certificate should be validated for. | |
321 * "plContext" | |
322 * Platform-specific context pointer. | |
323 * THREAD SAFETY: | |
324 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
325 * RETURNS: | |
326 * Returns NULL if the function succeeds. | |
327 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
328 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
329 */ | |
330 static PKIX_Error* | |
331 cert_ProcessingParamsSetKeyAndCertUsage( | |
332 PKIX_ProcessingParams *procParams, | |
333 SECCertUsage requiredCertUsage, | |
334 PRUint32 requiredKeyUsages, | |
335 void *plContext) | |
336 { | |
337 PKIX_CertSelector *certSelector = NULL; | |
338 PKIX_ComCertSelParams *certSelParams = NULL; | |
339 PKIX_PL_NssContext *nssContext = (PKIX_PL_NssContext*)plContext; | |
340 | |
341 PKIX_ENTER(CERTVFYPKIX, "cert_ProcessingParamsSetKeyAndCertUsage"); | |
342 PKIX_NULLCHECK_TWO(procParams, nssContext); | |
343 | |
344 PKIX_CHECK( | |
345 pkix_pl_NssContext_SetCertUsage( | |
346 ((SECCertificateUsage)1) << requiredCertUsage, nssContext), | |
347 PKIX_NSSCONTEXTSETCERTUSAGEFAILED); | |
348 | |
349 if (requiredKeyUsages) { | |
350 PKIX_CHECK( | |
351 PKIX_ProcessingParams_GetTargetCertConstraints(procParams, | |
352 &certSelector, plContext), | |
353 PKIX_PROCESSINGPARAMSGETTARGETCERTCONSTRAINTSFAILED); | |
354 | |
355 PKIX_CHECK( | |
356 PKIX_CertSelector_GetCommonCertSelectorParams(certSelector, | |
357 &certSelParams, plContext), | |
358 PKIX_CERTSELECTORGETCOMMONCERTSELECTORPARAMSFAILED); | |
359 | |
360 | |
361 PKIX_CHECK( | |
362 PKIX_ComCertSelParams_SetKeyUsage(certSelParams, requiredKeyUsages, | |
363 plContext), | |
364 PKIX_COMCERTSELPARAMSSETKEYUSAGEFAILED); | |
365 } | |
366 cleanup: | |
367 PKIX_DECREF(certSelector); | |
368 PKIX_DECREF(certSelParams); | |
369 | |
370 PKIX_RETURN(CERTVFYPKIX); | |
371 } | |
372 | |
373 /* | |
374 * Unused parameters: | |
375 * | |
376 * CERTCertList *initialChain, | |
377 * CERTCertStores certStores, | |
378 * CERTCertRevCheckers certRevCheckers, | |
379 * CERTCertChainCheckers certChainCheckers, | |
380 * SECItem *initPolicies, | |
381 * PRBool policyQualifierRejected, | |
382 * PRBool anyPolicyInhibited, | |
383 * PRBool reqExplicitPolicy, | |
384 * PRBool policyMappingInhibited, | |
385 * PKIX_CertSelector certConstraints, | |
386 */ | |
387 | |
388 /* | |
389 * FUNCTION: cert_CreatePkixProcessingParams | |
390 * DESCRIPTION: | |
391 * | |
392 * Creates and fills in PKIX_ProcessingParams structure to be used | |
393 * for certificate chain building. | |
394 * | |
395 * PARAMETERS: | |
396 * "cert" | |
397 * Pointer to the CERTCertificate: the leaf certificate of a chain. | |
398 * "time" | |
399 * Validity time. | |
400 * "wincx" | |
401 * Nss db password token. | |
402 * "useArena" | |
403 * Flags to use arena for data allocation during chain building process. | |
404 * "pprocParams" | |
405 * Address to return created processing parameters. | |
406 * "plContext" | |
407 * Platform-specific context pointer. | |
408 * THREAD SAFETY: | |
409 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
410 * RETURNS: | |
411 * Returns NULL if the function succeeds. | |
412 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
413 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
414 */ | |
415 static PKIX_Error* | |
416 cert_CreatePkixProcessingParams( | |
417 CERTCertificate *cert, | |
418 PRBool checkSig, /* not used yet. See bug 391476 */ | |
419 PRTime time, | |
420 void *wincx, | |
421 PRBool useArena, | |
422 PRBool disableOCSPRemoteFetching, | |
423 PKIX_ProcessingParams **pprocParams, | |
424 void **pplContext) | |
425 { | |
426 PKIX_List *anchors = NULL; | |
427 PKIX_PL_Cert *targetCert = NULL; | |
428 PKIX_PL_Date *date = NULL; | |
429 PKIX_ProcessingParams *procParams = NULL; | |
430 PKIX_CertSelector *certSelector = NULL; | |
431 PKIX_ComCertSelParams *certSelParams = NULL; | |
432 PKIX_CertStore *certStore = NULL; | |
433 PKIX_List *certStores = NULL; | |
434 PKIX_RevocationChecker *revChecker = NULL; | |
435 PKIX_UInt32 methodFlags = 0; | |
436 void *plContext = NULL; | |
437 CERTStatusConfig *statusConfig = NULL; | |
438 | |
439 PKIX_ENTER(CERTVFYPKIX, "cert_CreatePkixProcessingParams"); | |
440 PKIX_NULLCHECK_TWO(cert, pprocParams); | |
441 | |
442 PKIX_CHECK( | |
443 PKIX_PL_NssContext_Create(0, useArena, wincx, &plContext), | |
444 PKIX_NSSCONTEXTCREATEFAILED); | |
445 | |
446 *pplContext = plContext; | |
447 | |
448 #ifdef PKIX_NOTDEF | |
449 /* Functions should be implemented in patch for 390532 */ | |
450 PKIX_CHECK( | |
451 pkix_pl_NssContext_SetCertSignatureCheck(checkSig, | |
452 (PKIX_PL_NssContext*)plContext), | |
453 PKIX_NSSCONTEXTSETCERTSIGNCHECKFAILED); | |
454 | |
455 #endif /* PKIX_NOTDEF */ | |
456 | |
457 PKIX_CHECK( | |
458 PKIX_ProcessingParams_Create(&procParams, plContext), | |
459 PKIX_PROCESSINGPARAMSCREATEFAILED); | |
460 | |
461 PKIX_CHECK( | |
462 PKIX_ComCertSelParams_Create(&certSelParams, plContext), | |
463 PKIX_COMCERTSELPARAMSCREATEFAILED); | |
464 | |
465 PKIX_CHECK( | |
466 PKIX_PL_Cert_CreateFromCERTCertificate(cert, &targetCert, plContext), | |
467 PKIX_CERTCREATEWITHNSSCERTFAILED); | |
468 | |
469 PKIX_CHECK( | |
470 PKIX_ComCertSelParams_SetCertificate(certSelParams, | |
471 targetCert, plContext), | |
472 PKIX_COMCERTSELPARAMSSETCERTIFICATEFAILED); | |
473 | |
474 PKIX_CHECK( | |
475 PKIX_CertSelector_Create(NULL, NULL, &certSelector, plContext), | |
476 PKIX_COULDNOTCREATECERTSELECTOROBJECT); | |
477 | |
478 PKIX_CHECK( | |
479 PKIX_CertSelector_SetCommonCertSelectorParams(certSelector, | |
480 certSelParams, plContext), | |
481 PKIX_CERTSELECTORSETCOMMONCERTSELECTORPARAMSFAILED); | |
482 | |
483 PKIX_CHECK( | |
484 PKIX_ProcessingParams_SetTargetCertConstraints(procParams, | |
485 certSelector, plContext), | |
486 PKIX_PROCESSINGPARAMSSETTARGETCERTCONSTRAINTSFAILED); | |
487 | |
488 /* Turn off quialification of target cert since leaf cert is | |
489 * already check for date validity, key usages and extended | |
490 * key usages. */ | |
491 PKIX_CHECK( | |
492 PKIX_ProcessingParams_SetQualifyTargetCert(procParams, PKIX_FALSE, | |
493 plContext), | |
494 PKIX_PROCESSINGPARAMSSETQUALIFYTARGETCERTFLAGFAILED); | |
495 | |
496 PKIX_CHECK( | |
497 PKIX_PL_Pk11CertStore_Create(&certStore, plContext), | |
498 PKIX_PK11CERTSTORECREATEFAILED); | |
499 | |
500 PKIX_CHECK( | |
501 PKIX_List_Create(&certStores, plContext), | |
502 PKIX_UNABLETOCREATELIST); | |
503 | |
504 PKIX_CHECK( | |
505 PKIX_List_AppendItem(certStores, (PKIX_PL_Object *)certStore, | |
506 plContext), | |
507 PKIX_LISTAPPENDITEMFAILED); | |
508 | |
509 PKIX_CHECK( | |
510 PKIX_ProcessingParams_SetCertStores(procParams, certStores, | |
511 plContext), | |
512 PKIX_PROCESSINGPARAMSADDCERTSTOREFAILED); | |
513 | |
514 PKIX_CHECK( | |
515 PKIX_PL_Date_CreateFromPRTime(time, &date, plContext), | |
516 PKIX_DATECREATEFROMPRTIMEFAILED); | |
517 | |
518 PKIX_CHECK( | |
519 PKIX_ProcessingParams_SetDate(procParams, date, plContext), | |
520 PKIX_PROCESSINGPARAMSSETDATEFAILED); | |
521 | |
522 PKIX_CHECK( | |
523 PKIX_RevocationChecker_Create( | |
524 PKIX_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST | | |
525 PKIX_REV_MI_NO_OVERALL_INFO_REQUIREMENT, | |
526 PKIX_REV_MI_TEST_ALL_LOCAL_INFORMATION_FIRST | | |
527 PKIX_REV_MI_NO_OVERALL_INFO_REQUIREMENT, | |
528 &revChecker, plContext), | |
529 PKIX_REVOCATIONCHECKERCREATEFAILED); | |
530 | |
531 PKIX_CHECK( | |
532 PKIX_ProcessingParams_SetRevocationChecker(procParams, revChecker, | |
533 plContext), | |
534 PKIX_PROCESSINGPARAMSSETREVOCATIONCHECKERFAILED); | |
535 | |
536 /* CRL method flags */ | |
537 methodFlags = | |
538 PKIX_REV_M_TEST_USING_THIS_METHOD | | |
539 PKIX_REV_M_FORBID_NETWORK_FETCHING | | |
540 PKIX_REV_M_SKIP_TEST_ON_MISSING_SOURCE | /* 0 */ | |
541 PKIX_REV_M_IGNORE_MISSING_FRESH_INFO | /* 0 */ | |
542 PKIX_REV_M_CONTINUE_TESTING_ON_FRESH_INFO; | |
543 | |
544 /* add CRL revocation method to check the leaf certificate */ | |
545 PKIX_CHECK( | |
546 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
547 PKIX_RevocationMethod_CRL, methodFlags, | |
548 0, NULL, PKIX_TRUE, plContext), | |
549 PKIX_REVOCATIONCHECKERADDMETHODFAILED); | |
550 | |
551 /* add CRL revocation method for other certs in the chain. */ | |
552 PKIX_CHECK( | |
553 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
554 PKIX_RevocationMethod_CRL, methodFlags, | |
555 0, NULL, PKIX_FALSE, plContext), | |
556 PKIX_REVOCATIONCHECKERADDMETHODFAILED); | |
557 | |
558 /* For compatibility with the old code, need to check that | |
559 * statusConfig is set in the db handle and status checker | |
560 * is defined befor allow ocsp status check on the leaf cert.*/ | |
561 statusConfig = CERT_GetStatusConfig(CERT_GetDefaultCertDB()); | |
562 if (statusConfig != NULL && statusConfig->statusChecker != NULL) { | |
563 | |
564 /* Enable OCSP revocation checking for the leaf cert. */ | |
565 /* OCSP method flags */ | |
566 methodFlags = | |
567 PKIX_REV_M_TEST_USING_THIS_METHOD | | |
568 PKIX_REV_M_ALLOW_NETWORK_FETCHING | /* 0 */ | |
569 PKIX_REV_M_ALLOW_IMPLICIT_DEFAULT_SOURCE | /* 0 */ | |
570 PKIX_REV_M_SKIP_TEST_ON_MISSING_SOURCE | /* 0 */ | |
571 PKIX_REV_M_IGNORE_MISSING_FRESH_INFO | /* 0 */ | |
572 PKIX_REV_M_CONTINUE_TESTING_ON_FRESH_INFO; | |
573 | |
574 /* Disabling ocsp fetching when checking the status | |
575 * of ocsp response signer. Here and in the next if, | |
576 * adjust flags for ocsp signer cert validation case. */ | |
577 if (disableOCSPRemoteFetching) { | |
578 methodFlags |= PKIX_REV_M_FORBID_NETWORK_FETCHING; | |
579 } | |
580 | |
581 if (ocsp_FetchingFailureIsVerificationFailure() | |
582 && !disableOCSPRemoteFetching) { | |
583 methodFlags |= | |
584 PKIX_REV_M_FAIL_ON_MISSING_FRESH_INFO; | |
585 } | |
586 | |
587 /* add OCSP revocation method to check only the leaf certificate.*/ | |
588 PKIX_CHECK( | |
589 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
590 PKIX_RevocationMethod_OCSP, methodFlags, | |
591 1, NULL, PKIX_TRUE, plContext), | |
592 PKIX_REVOCATIONCHECKERADDMETHODFAILED); | |
593 } | |
594 | |
595 PKIX_CHECK( | |
596 PKIX_ProcessingParams_SetAnyPolicyInhibited(procParams, PR_FALSE, | |
597 plContext), | |
598 PKIX_PROCESSINGPARAMSSETANYPOLICYINHIBITED); | |
599 | |
600 PKIX_CHECK( | |
601 PKIX_ProcessingParams_SetExplicitPolicyRequired(procParams, PR_FALSE, | |
602 plContext), | |
603 PKIX_PROCESSINGPARAMSSETEXPLICITPOLICYREQUIRED); | |
604 | |
605 PKIX_CHECK( | |
606 PKIX_ProcessingParams_SetPolicyMappingInhibited(procParams, PR_FALSE, | |
607 plContext), | |
608 PKIX_PROCESSINGPARAMSSETPOLICYMAPPINGINHIBITED); | |
609 | |
610 *pprocParams = procParams; | |
611 procParams = NULL; | |
612 | |
613 cleanup: | |
614 PKIX_DECREF(anchors); | |
615 PKIX_DECREF(targetCert); | |
616 PKIX_DECREF(date); | |
617 PKIX_DECREF(certSelector); | |
618 PKIX_DECREF(certSelParams); | |
619 PKIX_DECREF(certStore); | |
620 PKIX_DECREF(certStores); | |
621 PKIX_DECREF(procParams); | |
622 PKIX_DECREF(revChecker); | |
623 | |
624 PKIX_RETURN(CERTVFYPKIX); | |
625 } | |
626 | |
627 /* | |
628 * FUNCTION: cert_PkixToNssCertsChain | |
629 * DESCRIPTION: | |
630 * | |
631 * Converts pkix cert list into nss cert list. | |
632 * | |
633 * PARAMETERS: | |
634 * "pkixCertChain" | |
635 * Pkix certificate list. | |
636 * "pvalidChain" | |
637 * An address of returned nss certificate list. | |
638 * "plContext" | |
639 * Platform-specific context pointer. | |
640 * THREAD SAFETY: | |
641 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
642 * RETURNS: | |
643 * Returns NULL if the function succeeds. | |
644 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
645 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
646 */ | |
647 static PKIX_Error* | |
648 cert_PkixToNssCertsChain( | |
649 PKIX_List *pkixCertChain, | |
650 CERTCertList **pvalidChain, | |
651 void *plContext) | |
652 { | |
653 PLArenaPool *arena = NULL; | |
654 CERTCertificate *nssCert = NULL; | |
655 CERTCertList *validChain = NULL; | |
656 PKIX_PL_Object *certItem = NULL; | |
657 PKIX_UInt32 length = 0; | |
658 PKIX_UInt32 i = 0; | |
659 | |
660 PKIX_ENTER(CERTVFYPKIX, "cert_PkixToNssCertsChain"); | |
661 PKIX_NULLCHECK_ONE(pvalidChain); | |
662 | |
663 if (pkixCertChain == NULL) { | |
664 goto cleanup; | |
665 } | |
666 arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE); | |
667 if (arena == NULL) { | |
668 PKIX_ERROR(PKIX_OUTOFMEMORY); | |
669 } | |
670 validChain = (CERTCertList*)PORT_ArenaZAlloc(arena, sizeof(CERTCertList)); | |
671 if (validChain == NULL) { | |
672 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
673 } | |
674 PR_INIT_CLIST(&validChain->list); | |
675 validChain->arena = arena; | |
676 arena = NULL; | |
677 | |
678 PKIX_CHECK( | |
679 PKIX_List_GetLength(pkixCertChain, &length, plContext), | |
680 PKIX_LISTGETLENGTHFAILED); | |
681 | |
682 for (i = 0; i < length; i++){ | |
683 CERTCertListNode *node = NULL; | |
684 | |
685 PKIX_CHECK( | |
686 PKIX_List_GetItem(pkixCertChain, i, &certItem, plContext), | |
687 PKIX_LISTGETITEMFAILED); | |
688 | |
689 PKIX_CHECK( | |
690 PKIX_PL_Cert_GetCERTCertificate((PKIX_PL_Cert*)certItem, &nssCert, | |
691 plContext), | |
692 PKIX_CERTGETCERTCERTIFICATEFAILED); | |
693 | |
694 node = | |
695 (CERTCertListNode *)PORT_ArenaZAlloc(validChain->arena, | |
696 sizeof(CERTCertListNode)); | |
697 if ( node == NULL ) { | |
698 PKIX_ERROR(PKIX_PORTARENAALLOCFAILED); | |
699 } | |
700 | |
701 PR_INSERT_BEFORE(&node->links, &validChain->list); | |
702 | |
703 node->cert = nssCert; | |
704 nssCert = NULL; | |
705 | |
706 PKIX_DECREF(certItem); | |
707 } | |
708 | |
709 *pvalidChain = validChain; | |
710 | |
711 cleanup: | |
712 if (PKIX_ERROR_RECEIVED){ | |
713 if (validChain) { | |
714 CERT_DestroyCertList(validChain); | |
715 } else if (arena) { | |
716 PORT_FreeArena(arena, PR_FALSE); | |
717 } | |
718 if (nssCert) { | |
719 CERT_DestroyCertificate(nssCert); | |
720 } | |
721 } | |
722 PKIX_DECREF(certItem); | |
723 | |
724 PKIX_RETURN(CERTVFYPKIX); | |
725 } | |
726 | |
727 | |
728 /* | |
729 * FUNCTION: cert_BuildAndValidateChain | |
730 * DESCRIPTION: | |
731 * | |
732 * The function builds and validates a cert chain based on certificate | |
733 * selection criterias from procParams. This function call PKIX_BuildChain | |
734 * to accomplish chain building. If PKIX_BuildChain returns with incomplete | |
735 * IO, the function waits with PR_Poll until the blocking IO is finished and | |
736 * return control back to PKIX_BuildChain. | |
737 * | |
738 * PARAMETERS: | |
739 * "procParams" | |
740 * Processing parameters to be used during chain building. | |
741 * "pResult" | |
742 * Returned build result. | |
743 * "pVerifyNode" | |
744 * Returned pointed to verify node structure: the tree-like structure | |
745 * that reports points of chain building failures. | |
746 * "plContext" | |
747 * Platform-specific context pointer. | |
748 * THREAD SAFETY: | |
749 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
750 * RETURNS: | |
751 * Returns NULL if the function succeeds. | |
752 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
753 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
754 */ | |
755 static PKIX_Error* | |
756 cert_BuildAndValidateChain( | |
757 PKIX_ProcessingParams *procParams, | |
758 PKIX_BuildResult **pResult, | |
759 PKIX_VerifyNode **pVerifyNode, | |
760 void *plContext) | |
761 { | |
762 PKIX_BuildResult *result = NULL; | |
763 PKIX_VerifyNode *verifyNode = NULL; | |
764 void *nbioContext = NULL; | |
765 void *state = NULL; | |
766 | |
767 PKIX_ENTER(CERTVFYPKIX, "cert_BuildAndVerifyChain"); | |
768 PKIX_NULLCHECK_TWO(procParams, pResult); | |
769 | |
770 do { | |
771 if (nbioContext && state) { | |
772 /* PKIX-XXX: need to test functionality of NBIO handling in libPkix. | |
773 * See bug 391180 */ | |
774 PRInt32 filesReady = 0; | |
775 PRPollDesc *pollDesc = (PRPollDesc*)nbioContext; | |
776 filesReady = PR_Poll(pollDesc, 1, PR_INTERVAL_NO_TIMEOUT); | |
777 if (filesReady <= 0) { | |
778 PKIX_ERROR(PKIX_PRPOLLRETBADFILENUM); | |
779 } | |
780 } | |
781 | |
782 PKIX_CHECK( | |
783 PKIX_BuildChain(procParams, &nbioContext, &state, | |
784 &result, &verifyNode, plContext), | |
785 PKIX_UNABLETOBUILDCHAIN); | |
786 | |
787 } while (nbioContext && state); | |
788 | |
789 *pResult = result; | |
790 | |
791 cleanup: | |
792 if (pVerifyNode) { | |
793 *pVerifyNode = verifyNode; | |
794 } | |
795 | |
796 PKIX_RETURN(CERTVFYPKIX); | |
797 } | |
798 | |
799 | |
800 /* | |
801 * FUNCTION: cert_PkixErrorToNssCode | |
802 * DESCRIPTION: | |
803 * | |
804 * Converts pkix error(PKIX_Error) structure to PR error codes. | |
805 * | |
806 * PKIX-XXX to be implemented. See 391183. | |
807 * | |
808 * PARAMETERS: | |
809 * "error" | |
810 * Pkix error that will be converted. | |
811 * "nssCode" | |
812 * Corresponding nss error code. | |
813 * "plContext" | |
814 * Platform-specific context pointer. | |
815 * THREAD SAFETY: | |
816 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
817 * RETURNS: | |
818 * Returns NULL if the function succeeds. | |
819 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
820 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
821 */ | |
822 static PKIX_Error * | |
823 cert_PkixErrorToNssCode( | |
824 PKIX_Error *error, | |
825 SECErrorCodes *pNssErr, | |
826 void *plContext) | |
827 { | |
828 int errLevel = 0; | |
829 PKIX_Int32 nssErr = 0; | |
830 PKIX_Error *errPtr = error; | |
831 | |
832 PKIX_ENTER(CERTVFYPKIX, "cert_PkixErrorToNssCode"); | |
833 PKIX_NULLCHECK_TWO(error, pNssErr); | |
834 | |
835 /* Loop until we find at least one error with non-null | |
836 * plErr code, that is going to be nss error code. */ | |
837 while (errPtr) { | |
838 if (errPtr->plErr && !nssErr) { | |
839 nssErr = errPtr->plErr; | |
840 if (!pkixLog) break; | |
841 } | |
842 if (pkixLog) { | |
843 #ifdef PKIX_ERROR_DESCRIPTION | |
844 PR_LOG(pkixLog, 2, ("Error at level %d: %s\n", errLevel, | |
845 PKIX_ErrorText[errPtr->errCode])); | |
846 #else | |
847 PR_LOG(pkixLog, 2, ("Error at level %d: Error code %d\n", errLevel, | |
848 errPtr->errCode)); | |
849 #endif /* PKIX_ERROR_DESCRIPTION */ | |
850 } | |
851 errPtr = errPtr->cause; | |
852 errLevel += 1; | |
853 } | |
854 PORT_Assert(nssErr); | |
855 if (!nssErr) { | |
856 *pNssErr = SEC_ERROR_LIBPKIX_INTERNAL; | |
857 } else { | |
858 *pNssErr = nssErr; | |
859 } | |
860 | |
861 PKIX_RETURN(CERTVFYPKIX); | |
862 } | |
863 | |
864 /* | |
865 * FUNCTION: cert_GetLogFromVerifyNode | |
866 * DESCRIPTION: | |
867 * | |
868 * Recursive function that converts verify node tree-like set of structures | |
869 * to CERTVerifyLog. | |
870 * | |
871 * PARAMETERS: | |
872 * "log" | |
873 * Pointed to already allocated CERTVerifyLog structure. | |
874 * "node" | |
875 * A node of PKIX_VerifyNode tree. | |
876 * "plContext" | |
877 * Platform-specific context pointer. | |
878 * THREAD SAFETY: | |
879 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
880 * RETURNS: | |
881 * Returns NULL if the function succeeds. | |
882 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
883 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
884 */ | |
885 static PKIX_Error * | |
886 cert_GetLogFromVerifyNode( | |
887 CERTVerifyLog *log, | |
888 PKIX_VerifyNode *node, | |
889 void *plContext) | |
890 { | |
891 PKIX_List *children = NULL; | |
892 PKIX_VerifyNode *childNode = NULL; | |
893 | |
894 PKIX_ENTER(CERTVFYPKIX, "cert_GetLogFromVerifyNode"); | |
895 | |
896 children = node->children; | |
897 | |
898 if (children == NULL) { | |
899 PKIX_ERRORCODE errCode = PKIX_ANCHORDIDNOTCHAINTOCERT; | |
900 if (node->error && node->error->errCode != errCode) { | |
901 #ifdef DEBUG_volkov | |
902 char *string = pkix_Error2ASCII(node->error, plContext); | |
903 fprintf(stderr, "Branch search finished with error: \t%s\n", string); | |
904 PKIX_PL_Free(string, NULL); | |
905 #endif | |
906 if (log != NULL) { | |
907 SECErrorCodes nssErrorCode = 0; | |
908 CERTCertificate *cert = NULL; | |
909 | |
910 cert = node->verifyCert->nssCert; | |
911 | |
912 PKIX_CHECK( | |
913 cert_PkixErrorToNssCode(node->error, &nssErrorCode, | |
914 plContext), | |
915 PKIX_GETPKIXERRORCODEFAILED); | |
916 | |
917 cert_AddToVerifyLog(log, cert, nssErrorCode, node->depth, NULL); | |
918 } | |
919 } | |
920 PKIX_RETURN(CERTVFYPKIX); | |
921 } else { | |
922 PRUint32 i = 0; | |
923 PKIX_UInt32 length = 0; | |
924 | |
925 PKIX_CHECK( | |
926 PKIX_List_GetLength(children, &length, plContext), | |
927 PKIX_LISTGETLENGTHFAILED); | |
928 | |
929 for (i = 0; i < length; i++){ | |
930 | |
931 PKIX_CHECK( | |
932 PKIX_List_GetItem(children, i, (PKIX_PL_Object**)&childNode, | |
933 plContext), | |
934 PKIX_LISTGETITEMFAILED); | |
935 | |
936 PKIX_CHECK( | |
937 cert_GetLogFromVerifyNode(log, childNode, plContext), | |
938 PKIX_ERRORINRECURSIVEEQUALSCALL); | |
939 | |
940 PKIX_DECREF(childNode); | |
941 } | |
942 } | |
943 | |
944 cleanup: | |
945 PKIX_DECREF(childNode); | |
946 | |
947 PKIX_RETURN(CERTVFYPKIX); | |
948 } | |
949 | |
950 /* | |
951 * FUNCTION: cert_GetBuildResults | |
952 * DESCRIPTION: | |
953 * | |
954 * Converts pkix build results to nss results. This function is called | |
955 * regardless of build result. | |
956 * | |
957 * If it called after chain was successfully constructed, then it will | |
958 * convert: | |
959 * * pkix cert list that represent the chain to nss cert list | |
960 * * trusted root the chain was anchored to nss certificate. | |
961 * | |
962 * In case of failure it will convert: | |
963 * * pkix error to PR error code(will set it with PORT_SetError) | |
964 * * pkix validation log to nss CERTVerifyLog | |
965 * | |
966 * PARAMETERS: | |
967 * "buildResult" | |
968 * Build results returned by PKIX_BuildChain. | |
969 * "verifyNode" | |
970 * Tree-like structure of chain building/validation failures | |
971 * returned by PKIX_BuildChain. Ignored in case of success. | |
972 * "error" | |
973 * Final error returned by PKIX_BuildChain. Should be NULL in | |
974 * case of success. | |
975 * "log" | |
976 * Address of pre-allocated(if not NULL) CERTVerifyLog structure. | |
977 * "ptrustedRoot" | |
978 * Address of returned trusted root the chain was anchored to. | |
979 * "pvalidChain" | |
980 * Address of returned valid chain. | |
981 * "plContext" | |
982 * Platform-specific context pointer. | |
983 * THREAD SAFETY: | |
984 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
985 * RETURNS: | |
986 * Returns NULL if the function succeeds. | |
987 * Returns a Cert Verify Error if the function fails in an unrecoverable way. | |
988 * Returns a Fatal Error if the function fails in an unrecoverable way. | |
989 */ | |
990 static PKIX_Error* | |
991 cert_GetBuildResults( | |
992 PKIX_BuildResult *buildResult, | |
993 PKIX_VerifyNode *verifyNode, | |
994 PKIX_Error *error, | |
995 CERTVerifyLog *log, | |
996 CERTCertificate **ptrustedRoot, | |
997 CERTCertList **pvalidChain, | |
998 void *plContext) | |
999 { | |
1000 PKIX_ValidateResult *validResult = NULL; | |
1001 CERTCertList *validChain = NULL; | |
1002 CERTCertificate *trustedRoot = NULL; | |
1003 PKIX_TrustAnchor *trustAnchor = NULL; | |
1004 PKIX_PL_Cert *trustedCert = NULL; | |
1005 PKIX_List *pkixCertChain = NULL; | |
1006 #ifdef DEBUG_volkov | |
1007 PKIX_Error *tmpPkixError = NULL; | |
1008 #endif /* DEBUG */ | |
1009 | |
1010 PKIX_ENTER(CERTVFYPKIX, "cert_GetBuildResults"); | |
1011 if (buildResult == NULL && error == NULL) { | |
1012 PKIX_ERROR(PKIX_NULLARGUMENT); | |
1013 } | |
1014 | |
1015 if (error) { | |
1016 SECErrorCodes nssErrorCode = 0; | |
1017 #ifdef DEBUG_volkov | |
1018 char *temp = pkix_Error2ASCII(error, plContext); | |
1019 fprintf(stderr, "BUILD ERROR:\n%s\n", temp); | |
1020 PKIX_PL_Free(temp, NULL); | |
1021 #endif /* DEBUG */ | |
1022 if (verifyNode) { | |
1023 PKIX_Error *tmpError = | |
1024 cert_GetLogFromVerifyNode(log, verifyNode, plContext); | |
1025 if (tmpError) { | |
1026 PKIX_PL_Object_DecRef((PKIX_PL_Object *)tmpError, plContext); | |
1027 } | |
1028 } | |
1029 cert_PkixErrorToNssCode(error, &nssErrorCode, plContext); | |
1030 PORT_SetError(nssErrorCode); | |
1031 goto cleanup; | |
1032 } | |
1033 | |
1034 if (pvalidChain) { | |
1035 PKIX_CHECK( | |
1036 PKIX_BuildResult_GetCertChain(buildResult, &pkixCertChain, | |
1037 plContext), | |
1038 PKIX_BUILDRESULTGETCERTCHAINFAILED); | |
1039 | |
1040 #ifdef DEBUG_volkov | |
1041 tmpPkixError = cert_PrintCertChain(pkixCertChain, plContext); | |
1042 if (tmpPkixError) { | |
1043 PKIX_PL_Object_DecRef((PKIX_PL_Object*)tmpPkixError, plContext); | |
1044 } | |
1045 #endif | |
1046 | |
1047 PKIX_CHECK( | |
1048 cert_PkixToNssCertsChain(pkixCertChain, &validChain, plContext), | |
1049 PKIX_CERTCHAINTONSSCHAINFAILED); | |
1050 } | |
1051 | |
1052 if (ptrustedRoot) { | |
1053 PKIX_CHECK( | |
1054 PKIX_BuildResult_GetValidateResult(buildResult, &validResult, | |
1055 plContext), | |
1056 PKIX_BUILDRESULTGETVALIDATERESULTFAILED); | |
1057 | |
1058 PKIX_CHECK( | |
1059 PKIX_ValidateResult_GetTrustAnchor(validResult, &trustAnchor, | |
1060 plContext), | |
1061 PKIX_VALIDATERESULTGETTRUSTANCHORFAILED); | |
1062 | |
1063 PKIX_CHECK( | |
1064 PKIX_TrustAnchor_GetTrustedCert(trustAnchor, &trustedCert, | |
1065 plContext), | |
1066 PKIX_TRUSTANCHORGETTRUSTEDCERTFAILED); | |
1067 | |
1068 #ifdef DEBUG_volkov | |
1069 if (pvalidChain == NULL) { | |
1070 cert_PrintCert(trustedCert, plContext); | |
1071 } | |
1072 #endif | |
1073 | |
1074 PKIX_CHECK( | |
1075 PKIX_PL_Cert_GetCERTCertificate(trustedCert, &trustedRoot, | |
1076 plContext), | |
1077 PKIX_CERTGETCERTCERTIFICATEFAILED); | |
1078 } | |
1079 | |
1080 PORT_Assert(!PKIX_ERROR_RECEIVED); | |
1081 | |
1082 if (trustedRoot) { | |
1083 *ptrustedRoot = trustedRoot; | |
1084 } | |
1085 if (validChain) { | |
1086 *pvalidChain = validChain; | |
1087 } | |
1088 | |
1089 cleanup: | |
1090 if (PKIX_ERROR_RECEIVED) { | |
1091 if (trustedRoot) { | |
1092 CERT_DestroyCertificate(trustedRoot); | |
1093 } | |
1094 if (validChain) { | |
1095 CERT_DestroyCertList(validChain); | |
1096 } | |
1097 } | |
1098 PKIX_DECREF(trustAnchor); | |
1099 PKIX_DECREF(trustedCert); | |
1100 PKIX_DECREF(pkixCertChain); | |
1101 PKIX_DECREF(validResult); | |
1102 PKIX_DECREF(error); | |
1103 PKIX_DECREF(verifyNode); | |
1104 PKIX_DECREF(buildResult); | |
1105 | |
1106 PKIX_RETURN(CERTVFYPKIX); | |
1107 } | |
1108 | |
1109 /* | |
1110 * FUNCTION: cert_VerifyCertChainPkix | |
1111 * DESCRIPTION: | |
1112 * | |
1113 * The main wrapper function that is called from CERT_VerifyCert and | |
1114 * CERT_VerifyCACertForUsage functions to validate cert with libpkix. | |
1115 * | |
1116 * PARAMETERS: | |
1117 * "cert" | |
1118 * Leaf certificate of a chain we want to build. | |
1119 * "checkSig" | |
1120 * Certificate signatures will not be verified if this | |
1121 * flag is set to PR_FALSE. | |
1122 * "requiredUsage" | |
1123 * Required usage for certificate and chain. | |
1124 * "time" | |
1125 * Validity time. | |
1126 * "wincx" | |
1127 * Nss database password token. | |
1128 * "log" | |
1129 * Address of already allocated CERTVerifyLog structure. Not | |
1130 * used if NULL; | |
1131 * "pSigerror" | |
1132 * Address of PRBool. If not NULL, returns true is cert chain | |
1133 * was invalidated because of bad certificate signature. | |
1134 * "pRevoked" | |
1135 * Address of PRBool. If not NULL, returns true is cert chain | |
1136 * was invalidated because a revoked certificate was found in | |
1137 * the chain. | |
1138 * THREAD SAFETY: | |
1139 * Thread Safe (see Thread Safety Definitions in Programmer's Guide) | |
1140 * RETURNS: | |
1141 * SECFailure is chain building process has failed. SECSuccess otherwise. | |
1142 */ | |
1143 SECStatus | |
1144 cert_VerifyCertChainPkix( | |
1145 CERTCertificate *cert, | |
1146 PRBool checkSig, | |
1147 SECCertUsage requiredUsage, | |
1148 PRTime time, | |
1149 void *wincx, | |
1150 CERTVerifyLog *log, | |
1151 PRBool *pSigerror, | |
1152 PRBool *pRevoked) | |
1153 { | |
1154 PKIX_ProcessingParams *procParams = NULL; | |
1155 PKIX_BuildResult *result = NULL; | |
1156 PKIX_VerifyNode *verifyNode = NULL; | |
1157 PKIX_Error *error = NULL; | |
1158 | |
1159 SECStatus rv = SECFailure; | |
1160 void *plContext = NULL; | |
1161 #ifdef DEBUG_volkov | |
1162 CERTCertificate *trustedRoot = NULL; | |
1163 CERTCertList *validChain = NULL; | |
1164 #endif /* DEBUG */ | |
1165 | |
1166 #ifdef PKIX_OBJECT_LEAK_TEST | |
1167 int leakedObjNum = 0; | |
1168 int memLeakLoopCount = 0; | |
1169 int objCountTable[PKIX_NUMTYPES]; | |
1170 int fnInvLocalCount = 0; | |
1171 PKIX_Boolean savedUsePkixEngFlag = usePKIXValidationEngine; | |
1172 | |
1173 if (usePKIXValidationEngine) { | |
1174 /* current memory leak testing implementation does not allow | |
1175 * to run simultaneous tests one the same or a different threads. | |
1176 * Setting the variable to false, to make additional chain | |
1177 * validations be handled by old nss. */ | |
1178 usePKIXValidationEngine = PR_FALSE; | |
1179 } | |
1180 testStartFnStackPosition = 2; | |
1181 fnStackNameArr[0] = "cert_VerifyCertChainPkix"; | |
1182 fnStackInvCountArr[0] = 0; | |
1183 PKIX_Boolean abortOnLeak = | |
1184 (PR_GetEnv("PKIX_OBJECT_LEAK_TEST_ABORT_ON_LEAK") == NULL) ? | |
1185 PKIX_FALSE : PKIX_TRUE; | |
1186 runningLeakTest = PKIX_TRUE; | |
1187 | |
1188 /* Prevent multi-threaded run of object leak test */ | |
1189 fnInvLocalCount = PR_ATOMIC_INCREMENT(¶llelFnInvocationCount); | |
1190 PORT_Assert(fnInvLocalCount == 1); | |
1191 | |
1192 do { | |
1193 rv = SECFailure; | |
1194 plContext = NULL; | |
1195 procParams = NULL; | |
1196 result = NULL; | |
1197 verifyNode = NULL; | |
1198 error = NULL; | |
1199 #ifdef DEBUG_volkov | |
1200 trustedRoot = NULL; | |
1201 validChain = NULL; | |
1202 #endif /* DEBUG */ | |
1203 errorGenerated = PKIX_FALSE; | |
1204 stackPosition = 0; | |
1205 | |
1206 if (leakedObjNum) { | |
1207 pkix_pl_lifecycle_ObjectTableUpdate(objCountTable); | |
1208 } | |
1209 memLeakLoopCount += 1; | |
1210 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
1211 | |
1212 error = | |
1213 cert_CreatePkixProcessingParams(cert, checkSig, time, wincx, | |
1214 PR_FALSE/*use arena*/, | |
1215 requiredUsage == certUsageStatusResponder, | |
1216 &procParams, &plContext); | |
1217 if (error) { | |
1218 goto cleanup; | |
1219 } | |
1220 | |
1221 error = | |
1222 cert_ProcessingParamsSetKeyAndCertUsage(procParams, requiredUsage, 0, | |
1223 plContext); | |
1224 if (error) { | |
1225 goto cleanup; | |
1226 } | |
1227 | |
1228 error = | |
1229 cert_BuildAndValidateChain(procParams, &result, &verifyNode, plContext); | |
1230 if (error) { | |
1231 goto cleanup; | |
1232 } | |
1233 | |
1234 if (pRevoked) { | |
1235 /* Currently always PR_FALSE. Will be fixed as a part of 394077 */ | |
1236 *pRevoked = PR_FALSE; | |
1237 } | |
1238 if (pSigerror) { | |
1239 /* Currently always PR_FALSE. Will be fixed as a part of 394077 */ | |
1240 *pSigerror = PR_FALSE; | |
1241 } | |
1242 rv = SECSuccess; | |
1243 | |
1244 cleanup: | |
1245 error = cert_GetBuildResults(result, verifyNode, error, log, | |
1246 #ifdef DEBUG_volkov | |
1247 &trustedRoot, &validChain, | |
1248 #else | |
1249 NULL, NULL, | |
1250 #endif /* DEBUG */ | |
1251 plContext); | |
1252 if (error) { | |
1253 #ifdef DEBUG_volkov | |
1254 char *temp = pkix_Error2ASCII(error, plContext); | |
1255 fprintf(stderr, "GET BUILD RES ERRORS:\n%s\n", temp); | |
1256 PKIX_PL_Free(temp, NULL); | |
1257 #endif /* DEBUG */ | |
1258 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
1259 } | |
1260 #ifdef DEBUG_volkov | |
1261 if (trustedRoot) { | |
1262 CERT_DestroyCertificate(trustedRoot); | |
1263 } | |
1264 if (validChain) { | |
1265 CERT_DestroyCertList(validChain); | |
1266 } | |
1267 #endif /* DEBUG */ | |
1268 if (procParams) { | |
1269 PKIX_PL_Object_DecRef((PKIX_PL_Object *)procParams, plContext); | |
1270 } | |
1271 if (plContext) { | |
1272 PKIX_PL_NssContext_Destroy(plContext); | |
1273 } | |
1274 | |
1275 #ifdef PKIX_OBJECT_LEAK_TEST | |
1276 leakedObjNum = | |
1277 pkix_pl_lifecycle_ObjectLeakCheck(leakedObjNum ? objCountTable : NULL); | |
1278 | |
1279 if (pkixLog && leakedObjNum) { | |
1280 PR_LOG(pkixLog, 1, ("The generated error caused an object leaks. Loop %d." | |
1281 "Stack %s\n", memLeakLoopCount, errorFnStackString)); | |
1282 } | |
1283 PR_Free(errorFnStackString); | |
1284 errorFnStackString = NULL; | |
1285 if (abortOnLeak) { | |
1286 PORT_Assert(leakedObjNum == 0); | |
1287 } | |
1288 | |
1289 } while (errorGenerated); | |
1290 | |
1291 runningLeakTest = PKIX_FALSE; | |
1292 PR_ATOMIC_DECREMENT(¶llelFnInvocationCount); | |
1293 usePKIXValidationEngine = savedUsePkixEngFlag; | |
1294 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
1295 | |
1296 return rv; | |
1297 } | |
1298 | |
1299 PKIX_CertSelector * | |
1300 cert_GetTargetCertConstraints(CERTCertificate *target, void *plContext) | |
1301 { | |
1302 PKIX_ComCertSelParams *certSelParams = NULL; | |
1303 PKIX_CertSelector *certSelector = NULL; | |
1304 PKIX_CertSelector *r= NULL; | |
1305 PKIX_PL_Cert *eeCert = NULL; | |
1306 PKIX_Error *error = NULL; | |
1307 | |
1308 error = PKIX_PL_Cert_CreateFromCERTCertificate(target, &eeCert, plContext); | |
1309 if (error != NULL) goto cleanup; | |
1310 | |
1311 error = PKIX_CertSelector_Create(NULL, NULL, &certSelector, plContext); | |
1312 if (error != NULL) goto cleanup; | |
1313 | |
1314 error = PKIX_ComCertSelParams_Create(&certSelParams, plContext); | |
1315 if (error != NULL) goto cleanup; | |
1316 | |
1317 error = PKIX_ComCertSelParams_SetCertificate( | |
1318 certSelParams, eeCert, plContext); | |
1319 if (error != NULL) goto cleanup; | |
1320 | |
1321 error = PKIX_CertSelector_SetCommonCertSelectorParams | |
1322 (certSelector, certSelParams, plContext); | |
1323 if (error != NULL) goto cleanup; | |
1324 | |
1325 error = PKIX_PL_Object_IncRef((PKIX_PL_Object *)certSelector, plContext); | |
1326 if (error == NULL) r = certSelector; | |
1327 | |
1328 cleanup: | |
1329 if (certSelParams != NULL) | |
1330 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certSelParams, plContext); | |
1331 | |
1332 if (eeCert != NULL) | |
1333 PKIX_PL_Object_DecRef((PKIX_PL_Object *)eeCert, plContext); | |
1334 | |
1335 if (certSelector != NULL) | |
1336 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certSelector, plContext); | |
1337 | |
1338 if (error != NULL) { | |
1339 SECErrorCodes nssErr; | |
1340 | |
1341 cert_PkixErrorToNssCode(error, &nssErr, plContext); | |
1342 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
1343 PORT_SetError(nssErr); | |
1344 } | |
1345 | |
1346 return r; | |
1347 } | |
1348 | |
1349 static PKIX_List * | |
1350 cert_GetCertStores(void *plContext) | |
1351 { | |
1352 PKIX_CertStore *certStore = NULL; | |
1353 PKIX_List *certStores = NULL; | |
1354 PKIX_List *r = NULL; | |
1355 PKIX_Error *error = NULL; | |
1356 | |
1357 error = PKIX_PL_Pk11CertStore_Create(&certStore, plContext); | |
1358 if (error != NULL) goto cleanup; | |
1359 | |
1360 error = PKIX_List_Create(&certStores, plContext); | |
1361 if (error != NULL) goto cleanup; | |
1362 | |
1363 error = PKIX_List_AppendItem( certStores, | |
1364 (PKIX_PL_Object *)certStore, plContext); | |
1365 if (error != NULL) goto cleanup; | |
1366 | |
1367 error = PKIX_PL_Object_IncRef((PKIX_PL_Object *)certStores, plContext); | |
1368 if (error == NULL) r = certStores; | |
1369 | |
1370 cleanup: | |
1371 if (certStores != NULL) | |
1372 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certStores, plContext); | |
1373 | |
1374 if (certStore != NULL) | |
1375 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certStore, plContext); | |
1376 | |
1377 if (error != NULL) { | |
1378 SECErrorCodes nssErr; | |
1379 | |
1380 cert_PkixErrorToNssCode(error, &nssErr, plContext); | |
1381 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
1382 PORT_SetError(nssErr); | |
1383 } | |
1384 | |
1385 return r; | |
1386 } | |
1387 | |
1388 | |
1389 struct fake_PKIX_PL_CertStruct { | |
1390 CERTCertificate *nssCert; | |
1391 }; | |
1392 | |
1393 /* This needs to be part of the PKIX_PL_* */ | |
1394 /* This definitely needs to go away, and be replaced with | |
1395 a real accessor function in PKIX */ | |
1396 static CERTCertificate * | |
1397 cert_NSSCertFromPKIXCert(const PKIX_PL_Cert *pkix_cert) | |
1398 { | |
1399 struct fake_PKIX_PL_CertStruct *fcert = NULL; | |
1400 | |
1401 fcert = (struct fake_PKIX_PL_CertStruct*)pkix_cert; | |
1402 | |
1403 return CERT_DupCertificate(fcert->nssCert); | |
1404 } | |
1405 | |
1406 PKIX_List *cert_PKIXMakeOIDList(const SECOidTag *oids, int oidCount, void *plContext) | |
1407 { | |
1408 PKIX_List *r = NULL; | |
1409 PKIX_List *policyList = NULL; | |
1410 PKIX_PL_OID *policyOID = NULL; | |
1411 PKIX_Error *error = NULL; | |
1412 int i; | |
1413 | |
1414 error = PKIX_List_Create(&policyList, plContext); | |
1415 if (error != NULL) { | |
1416 goto cleanup; | |
1417 } | |
1418 | |
1419 for (i=0; i<oidCount; i++) { | |
1420 error = PKIX_PL_OID_Create(oids[i], &policyOID, plContext); | |
1421 if (error) { | |
1422 goto cleanup; | |
1423 } | |
1424 error = PKIX_List_AppendItem(policyList, | |
1425 (PKIX_PL_Object *)policyOID, plContext); | |
1426 if (error != NULL) { | |
1427 goto cleanup; | |
1428 } | |
1429 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyOID, plContext); | |
1430 policyOID = NULL; | |
1431 } | |
1432 | |
1433 error = PKIX_List_SetImmutable(policyList, plContext); | |
1434 if (error != NULL) goto cleanup; | |
1435 | |
1436 error = PKIX_PL_Object_IncRef((PKIX_PL_Object *)policyList, plContext); | |
1437 if (error == NULL) r = policyList; | |
1438 | |
1439 cleanup: | |
1440 if (policyOID != NULL) { | |
1441 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyOID, plContext); | |
1442 } | |
1443 if (policyList != NULL) { | |
1444 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyList, plContext); | |
1445 } | |
1446 if (error != NULL) { | |
1447 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
1448 } | |
1449 | |
1450 return r; | |
1451 } | |
1452 | |
1453 CERTValOutParam * | |
1454 cert_pkix_FindOutputParam(CERTValOutParam *params, const CERTValParamOutType t) | |
1455 { | |
1456 CERTValOutParam *i; | |
1457 if (params == NULL) { | |
1458 return NULL; | |
1459 } | |
1460 for (i = params; i->type != cert_po_end; i++) { | |
1461 if (i->type == t) { | |
1462 return i; | |
1463 } | |
1464 } | |
1465 return NULL; | |
1466 } | |
1467 | |
1468 | |
1469 static PKIX_Error* | |
1470 setRevocationMethod(PKIX_RevocationChecker *revChecker, | |
1471 PKIX_ProcessingParams *procParams, | |
1472 const CERTRevocationTests *revTest, | |
1473 CERTRevocationMethodIndex certRevMethod, | |
1474 PKIX_RevocationMethodType pkixRevMethod, | |
1475 PKIX_Boolean verifyResponderUsages, | |
1476 PKIX_Boolean isLeafTest, | |
1477 void *plContext) | |
1478 { | |
1479 PKIX_UInt32 methodFlags = 0; | |
1480 PKIX_Error *error = NULL; | |
1481 int priority = 0; | |
1482 | |
1483 if (revTest->number_of_defined_methods <= certRevMethod) { | |
1484 return NULL; | |
1485 } | |
1486 if (revTest->preferred_methods) { | |
1487 int i = 0; | |
1488 for (;i < revTest->number_of_preferred_methods;i++) { | |
1489 if (revTest->preferred_methods[i] == certRevMethod) | |
1490 break; | |
1491 } | |
1492 priority = i; | |
1493 } | |
1494 methodFlags = revTest->cert_rev_flags_per_method[certRevMethod]; | |
1495 if (verifyResponderUsages && | |
1496 pkixRevMethod == PKIX_RevocationMethod_OCSP) { | |
1497 methodFlags |= PKIX_REV_M_FORBID_NETWORK_FETCHING; | |
1498 } | |
1499 error = | |
1500 PKIX_RevocationChecker_CreateAndAddMethod(revChecker, procParams, | |
1501 pkixRevMethod, methodFlags, | |
1502 priority, NULL, | |
1503 isLeafTest, plContext); | |
1504 return error; | |
1505 } | |
1506 | |
1507 | |
1508 SECStatus | |
1509 cert_pkixSetParam(PKIX_ProcessingParams *procParams, | |
1510 const CERTValInParam *param, void *plContext) | |
1511 { | |
1512 PKIX_Error * error = NULL; | |
1513 SECStatus r=SECSuccess; | |
1514 PKIX_PL_Date *date = NULL; | |
1515 PKIX_List *policyOIDList = NULL; | |
1516 PKIX_List *certListPkix = NULL; | |
1517 const CERTRevocationFlags *flags; | |
1518 SECErrorCodes errCode = SEC_ERROR_INVALID_ARGS; | |
1519 const CERTCertList *certList = NULL; | |
1520 CERTCertListNode *node; | |
1521 PKIX_PL_Cert *certPkix = NULL; | |
1522 PKIX_TrustAnchor *trustAnchor = NULL; | |
1523 PKIX_PL_Date *revDate = NULL; | |
1524 PKIX_RevocationChecker *revChecker = NULL; | |
1525 PKIX_PL_NssContext *nssContext = (PKIX_PL_NssContext *)plContext; | |
1526 | |
1527 /* XXX we need a way to map generic PKIX error to generic NSS errors */ | |
1528 | |
1529 switch (param->type) { | |
1530 | |
1531 case cert_pi_policyOID: | |
1532 | |
1533 /* needed? */ | |
1534 error = PKIX_ProcessingParams_SetExplicitPolicyRequired( | |
1535 procParams, PKIX_TRUE, plContext); | |
1536 | |
1537 if (error != NULL) { | |
1538 break; | |
1539 } | |
1540 | |
1541 policyOIDList = cert_PKIXMakeOIDList(param->value.array.oids, | |
1542 param->value.arraySize,plContext); | |
1543 if (policyOIDList == NULL) { | |
1544 r = SECFailure; | |
1545 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
1546 break; | |
1547 } | |
1548 | |
1549 error = PKIX_ProcessingParams_SetInitialPolicies( | |
1550 procParams,policyOIDList,plContext); | |
1551 break; | |
1552 | |
1553 case cert_pi_date: | |
1554 if (param->value.scalar.time == 0) { | |
1555 error = PKIX_PL_Date_Create_UTCTime(NULL, &date, plContext); | |
1556 if (error != NULL) { | |
1557 errCode = SEC_ERROR_INVALID_TIME; | |
1558 break; | |
1559 } | |
1560 } else { | |
1561 error = pkix_pl_Date_CreateFromPRTime(param->value.scalar.time, | |
1562 &date, plContext); | |
1563 if (error != NULL) { | |
1564 errCode = SEC_ERROR_INVALID_TIME; | |
1565 break; | |
1566 } | |
1567 } | |
1568 | |
1569 error = PKIX_ProcessingParams_SetDate(procParams, date, plContext); | |
1570 if (error != NULL) { | |
1571 errCode = SEC_ERROR_INVALID_TIME; | |
1572 } | |
1573 break; | |
1574 | |
1575 case cert_pi_revocationFlags: | |
1576 { | |
1577 PKIX_UInt32 leafIMFlags = 0; | |
1578 PKIX_UInt32 chainIMFlags = 0; | |
1579 PKIX_Boolean validatingResponderCert = PKIX_FALSE; | |
1580 | |
1581 flags = param->value.pointer.revocation; | |
1582 if (!flags) { | |
1583 PORT_SetError(errCode); | |
1584 r = SECFailure; | |
1585 break; | |
1586 } | |
1587 | |
1588 leafIMFlags = | |
1589 flags->leafTests.cert_rev_method_independent_flags; | |
1590 chainIMFlags = | |
1591 flags->chainTests.cert_rev_method_independent_flags; | |
1592 | |
1593 error = | |
1594 PKIX_RevocationChecker_Create(leafIMFlags, chainIMFlags, | |
1595 &revChecker, plContext); | |
1596 if (error) { | |
1597 break; | |
1598 } | |
1599 | |
1600 error = | |
1601 PKIX_ProcessingParams_SetRevocationChecker(procParams, | |
1602 revChecker, plContext); | |
1603 if (error) { | |
1604 break; | |
1605 } | |
1606 | |
1607 if (((PKIX_PL_NssContext*)plContext)->certificateUsage & | |
1608 certificateUsageStatusResponder) { | |
1609 validatingResponderCert = PKIX_TRUE; | |
1610 } | |
1611 | |
1612 error = setRevocationMethod(revChecker, | |
1613 procParams, &flags->leafTests, | |
1614 cert_revocation_method_crl, | |
1615 PKIX_RevocationMethod_CRL, | |
1616 validatingResponderCert, | |
1617 PKIX_TRUE, plContext); | |
1618 if (error) { | |
1619 break; | |
1620 } | |
1621 | |
1622 error = setRevocationMethod(revChecker, | |
1623 procParams, &flags->leafTests, | |
1624 cert_revocation_method_ocsp, | |
1625 PKIX_RevocationMethod_OCSP, | |
1626 validatingResponderCert, | |
1627 PKIX_TRUE, plContext); | |
1628 if (error) { | |
1629 break; | |
1630 } | |
1631 | |
1632 error = setRevocationMethod(revChecker, | |
1633 procParams, &flags->chainTests, | |
1634 cert_revocation_method_crl, | |
1635 PKIX_RevocationMethod_CRL, | |
1636 validatingResponderCert, | |
1637 PKIX_FALSE, plContext); | |
1638 if (error) { | |
1639 break; | |
1640 } | |
1641 | |
1642 error = setRevocationMethod(revChecker, | |
1643 procParams, &flags->chainTests, | |
1644 cert_revocation_method_ocsp, | |
1645 PKIX_RevocationMethod_OCSP, | |
1646 validatingResponderCert, | |
1647 PKIX_FALSE, plContext); | |
1648 if (error) { | |
1649 break; | |
1650 } | |
1651 | |
1652 } | |
1653 break; | |
1654 | |
1655 case cert_pi_trustAnchors: | |
1656 certList = param->value.pointer.chain; | |
1657 if (!certList) { | |
1658 PORT_SetError(errCode); | |
1659 r = SECFailure; | |
1660 break; | |
1661 } | |
1662 error = PKIX_List_Create(&certListPkix, plContext); | |
1663 if (error != NULL) { | |
1664 break; | |
1665 } | |
1666 for(node = CERT_LIST_HEAD(certList); !CERT_LIST_END(node, certList); | |
1667 node = CERT_LIST_NEXT(node) ) { | |
1668 error = PKIX_PL_Cert_CreateFromCERTCertificate(node->cert, | |
1669 &certPkix, plContext); | |
1670 if (error) { | |
1671 break; | |
1672 } | |
1673 error = PKIX_TrustAnchor_CreateWithCert(certPkix, &trustAnchor, | |
1674 plContext); | |
1675 if (error) { | |
1676 break; | |
1677 } | |
1678 error = PKIX_List_AppendItem(certListPkix, | |
1679 (PKIX_PL_Object*)trustAnchor, plContext); | |
1680 if (error) { | |
1681 break; | |
1682 } | |
1683 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchor, plContext); | |
1684 trustAnchor = NULL; | |
1685 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certPkix, plContext); | |
1686 certPkix = NULL; | |
1687 } | |
1688 error = | |
1689 PKIX_ProcessingParams_SetTrustAnchors(procParams, certListPkix, | |
1690 plContext); | |
1691 break; | |
1692 | |
1693 case cert_pi_useAIACertFetch: | |
1694 error = | |
1695 PKIX_ProcessingParams_SetUseAIAForCertFetching(procParams, | |
1696 (PRBool)(param->value.scalar.b != 0), | |
1697 plContext); | |
1698 break; | |
1699 | |
1700 case cert_pi_chainVerifyCallback: | |
1701 { | |
1702 const CERTChainVerifyCallback *chainVerifyCallback = | |
1703 param->value.pointer.chainVerifyCallback; | |
1704 if (!chainVerifyCallback || !chainVerifyCallback->isChainValid) { | |
1705 PORT_SetError(errCode); | |
1706 r = SECFailure; | |
1707 break; | |
1708 } | |
1709 | |
1710 nssContext->chainVerifyCallback = *chainVerifyCallback; | |
1711 } | |
1712 break; | |
1713 | |
1714 case cert_pi_useOnlyTrustAnchors: | |
1715 error = | |
1716 PKIX_ProcessingParams_SetUseOnlyTrustAnchors(procParams, | |
1717 (PRBool)(param->value.scalar.b != 0), | |
1718 plContext); | |
1719 break; | |
1720 | |
1721 default: | |
1722 PORT_SetError(errCode); | |
1723 r = SECFailure; | |
1724 break; | |
1725 } | |
1726 | |
1727 if (policyOIDList != NULL) | |
1728 PKIX_PL_Object_DecRef((PKIX_PL_Object *)policyOIDList, plContext); | |
1729 | |
1730 if (date != NULL) | |
1731 PKIX_PL_Object_DecRef((PKIX_PL_Object *)date, plContext); | |
1732 | |
1733 if (revDate != NULL) | |
1734 PKIX_PL_Object_DecRef((PKIX_PL_Object *)revDate, plContext); | |
1735 | |
1736 if (revChecker != NULL) | |
1737 PKIX_PL_Object_DecRef((PKIX_PL_Object *)revChecker, plContext); | |
1738 | |
1739 if (certListPkix) | |
1740 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certListPkix, plContext); | |
1741 | |
1742 if (trustAnchor) | |
1743 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchor, plContext); | |
1744 | |
1745 if (certPkix) | |
1746 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certPkix, plContext); | |
1747 | |
1748 if (error != NULL) { | |
1749 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
1750 PORT_SetError(errCode); | |
1751 r = SECFailure; | |
1752 } | |
1753 | |
1754 return r; | |
1755 | |
1756 } | |
1757 | |
1758 void | |
1759 cert_pkixDestroyValOutParam(CERTValOutParam *params) | |
1760 { | |
1761 CERTValOutParam *i; | |
1762 | |
1763 if (params == NULL) { | |
1764 return; | |
1765 } | |
1766 for (i = params; i->type != cert_po_end; i++) { | |
1767 switch (i->type) { | |
1768 case cert_po_trustAnchor: | |
1769 if (i->value.pointer.cert) { | |
1770 CERT_DestroyCertificate(i->value.pointer.cert); | |
1771 i->value.pointer.cert = NULL; | |
1772 } | |
1773 break; | |
1774 | |
1775 case cert_po_certList: | |
1776 if (i->value.pointer.chain) { | |
1777 CERT_DestroyCertList(i->value.pointer.chain); | |
1778 i->value.pointer.chain = NULL; | |
1779 } | |
1780 break; | |
1781 | |
1782 default: | |
1783 break; | |
1784 } | |
1785 } | |
1786 } | |
1787 | |
1788 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_LeafFlags[2] = { | |
1789 /* crl */ | |
1790 CERT_REV_M_TEST_USING_THIS_METHOD | |
1791 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
1792 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
1793 /* ocsp */ | |
1794 CERT_REV_M_TEST_USING_THIS_METHOD | |
1795 }; | |
1796 | |
1797 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_ChainFlags[2] = { | |
1798 /* crl */ | |
1799 CERT_REV_M_TEST_USING_THIS_METHOD | |
1800 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
1801 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
1802 /* ocsp */ | |
1803 0 | |
1804 }; | |
1805 | |
1806 static CERTRevocationMethodIndex | |
1807 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_Method_Preference = { | |
1808 cert_revocation_method_crl | |
1809 }; | |
1810 | |
1811 static const CERTRevocationFlags certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy = { | |
1812 { | |
1813 /* leafTests */ | |
1814 2, | |
1815 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_LeafFlags, | |
1816 1, | |
1817 &certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_Method_Preference, | |
1818 0 | |
1819 }, | |
1820 { | |
1821 /* chainTests */ | |
1822 2, | |
1823 certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy_ChainFlags, | |
1824 0, | |
1825 0, | |
1826 0 | |
1827 } | |
1828 }; | |
1829 | |
1830 extern const CERTRevocationFlags* | |
1831 CERT_GetClassicOCSPEnabledSoftFailurePolicy() | |
1832 { | |
1833 return &certRev_NSS_3_11_Ocsp_Enabled_Soft_Policy; | |
1834 } | |
1835 | |
1836 | |
1837 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_LeafFlags[2] = { | |
1838 /* crl */ | |
1839 CERT_REV_M_TEST_USING_THIS_METHOD | |
1840 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
1841 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
1842 /* ocsp */ | |
1843 CERT_REV_M_TEST_USING_THIS_METHOD | |
1844 | CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO | |
1845 }; | |
1846 | |
1847 static PRUint64 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_ChainFlags[2] = { | |
1848 /* crl */ | |
1849 CERT_REV_M_TEST_USING_THIS_METHOD | |
1850 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
1851 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
1852 /* ocsp */ | |
1853 0 | |
1854 }; | |
1855 | |
1856 static CERTRevocationMethodIndex | |
1857 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_Method_Preference = { | |
1858 cert_revocation_method_crl | |
1859 }; | |
1860 | |
1861 static const CERTRevocationFlags certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy = { | |
1862 { | |
1863 /* leafTests */ | |
1864 2, | |
1865 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_LeafFlags, | |
1866 1, | |
1867 &certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_Method_Preference, | |
1868 0 | |
1869 }, | |
1870 { | |
1871 /* chainTests */ | |
1872 2, | |
1873 certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy_ChainFlags, | |
1874 0, | |
1875 0, | |
1876 0 | |
1877 } | |
1878 }; | |
1879 | |
1880 extern const CERTRevocationFlags* | |
1881 CERT_GetClassicOCSPEnabledHardFailurePolicy() | |
1882 { | |
1883 return &certRev_NSS_3_11_Ocsp_Enabled_Hard_Policy; | |
1884 } | |
1885 | |
1886 | |
1887 static PRUint64 certRev_NSS_3_11_Ocsp_Disabled_Policy_LeafFlags[2] = { | |
1888 /* crl */ | |
1889 CERT_REV_M_TEST_USING_THIS_METHOD | |
1890 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
1891 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
1892 /* ocsp */ | |
1893 0 | |
1894 }; | |
1895 | |
1896 static PRUint64 certRev_NSS_3_11_Ocsp_Disabled_Policy_ChainFlags[2] = { | |
1897 /* crl */ | |
1898 CERT_REV_M_TEST_USING_THIS_METHOD | |
1899 | CERT_REV_M_FORBID_NETWORK_FETCHING | |
1900 | CERT_REV_M_CONTINUE_TESTING_ON_FRESH_INFO, | |
1901 /* ocsp */ | |
1902 0 | |
1903 }; | |
1904 | |
1905 static const CERTRevocationFlags certRev_NSS_3_11_Ocsp_Disabled_Policy = { | |
1906 { | |
1907 /* leafTests */ | |
1908 2, | |
1909 certRev_NSS_3_11_Ocsp_Disabled_Policy_LeafFlags, | |
1910 0, | |
1911 0, | |
1912 0 | |
1913 }, | |
1914 { | |
1915 /* chainTests */ | |
1916 2, | |
1917 certRev_NSS_3_11_Ocsp_Disabled_Policy_ChainFlags, | |
1918 0, | |
1919 0, | |
1920 0 | |
1921 } | |
1922 }; | |
1923 | |
1924 extern const CERTRevocationFlags* | |
1925 CERT_GetClassicOCSPDisabledPolicy() | |
1926 { | |
1927 return &certRev_NSS_3_11_Ocsp_Disabled_Policy; | |
1928 } | |
1929 | |
1930 | |
1931 static PRUint64 certRev_PKIX_Verify_Nist_Policy_LeafFlags[2] = { | |
1932 /* crl */ | |
1933 CERT_REV_M_TEST_USING_THIS_METHOD | |
1934 | CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO | |
1935 | CERT_REV_M_REQUIRE_INFO_ON_MISSING_SOURCE, | |
1936 /* ocsp */ | |
1937 0 | |
1938 }; | |
1939 | |
1940 static PRUint64 certRev_PKIX_Verify_Nist_Policy_ChainFlags[2] = { | |
1941 /* crl */ | |
1942 CERT_REV_M_TEST_USING_THIS_METHOD | |
1943 | CERT_REV_M_FAIL_ON_MISSING_FRESH_INFO | |
1944 | CERT_REV_M_REQUIRE_INFO_ON_MISSING_SOURCE, | |
1945 /* ocsp */ | |
1946 0 | |
1947 }; | |
1948 | |
1949 static const CERTRevocationFlags certRev_PKIX_Verify_Nist_Policy = { | |
1950 { | |
1951 /* leafTests */ | |
1952 2, | |
1953 certRev_PKIX_Verify_Nist_Policy_LeafFlags, | |
1954 0, | |
1955 0, | |
1956 0 | |
1957 }, | |
1958 { | |
1959 /* chainTests */ | |
1960 2, | |
1961 certRev_PKIX_Verify_Nist_Policy_ChainFlags, | |
1962 0, | |
1963 0, | |
1964 0 | |
1965 } | |
1966 }; | |
1967 | |
1968 extern const CERTRevocationFlags* | |
1969 CERT_GetPKIXVerifyNistRevocationPolicy() | |
1970 { | |
1971 return &certRev_PKIX_Verify_Nist_Policy; | |
1972 } | |
1973 | |
1974 CERTRevocationFlags * | |
1975 CERT_AllocCERTRevocationFlags( | |
1976 PRUint32 number_leaf_methods, PRUint32 number_leaf_pref_methods, | |
1977 PRUint32 number_chain_methods, PRUint32 number_chain_pref_methods) | |
1978 { | |
1979 CERTRevocationFlags *flags; | |
1980 | |
1981 flags = PORT_New(CERTRevocationFlags); | |
1982 if (!flags) | |
1983 return(NULL); | |
1984 | |
1985 flags->leafTests.number_of_defined_methods = number_leaf_methods; | |
1986 flags->leafTests.cert_rev_flags_per_method = | |
1987 PORT_NewArray(PRUint64, number_leaf_methods); | |
1988 | |
1989 flags->leafTests.number_of_preferred_methods = number_leaf_pref_methods; | |
1990 flags->leafTests.preferred_methods = | |
1991 PORT_NewArray(CERTRevocationMethodIndex, number_leaf_pref_methods); | |
1992 | |
1993 flags->chainTests.number_of_defined_methods = number_chain_methods; | |
1994 flags->chainTests.cert_rev_flags_per_method = | |
1995 PORT_NewArray(PRUint64, number_chain_methods); | |
1996 | |
1997 flags->chainTests.number_of_preferred_methods = number_chain_pref_methods; | |
1998 flags->chainTests.preferred_methods = | |
1999 PORT_NewArray(CERTRevocationMethodIndex, number_chain_pref_methods); | |
2000 | |
2001 if (!flags->leafTests.cert_rev_flags_per_method | |
2002 || !flags->leafTests.preferred_methods | |
2003 || !flags->chainTests.cert_rev_flags_per_method | |
2004 || !flags->chainTests.preferred_methods) { | |
2005 CERT_DestroyCERTRevocationFlags(flags); | |
2006 return (NULL); | |
2007 } | |
2008 | |
2009 return flags; | |
2010 } | |
2011 | |
2012 void CERT_DestroyCERTRevocationFlags(CERTRevocationFlags *flags) | |
2013 { | |
2014 if (!flags) | |
2015 return; | |
2016 | |
2017 if (flags->leafTests.cert_rev_flags_per_method) | |
2018 PORT_Free(flags->leafTests.cert_rev_flags_per_method); | |
2019 | |
2020 if (flags->leafTests.preferred_methods) | |
2021 PORT_Free(flags->leafTests.preferred_methods); | |
2022 | |
2023 if (flags->chainTests.cert_rev_flags_per_method) | |
2024 PORT_Free(flags->chainTests.cert_rev_flags_per_method); | |
2025 | |
2026 if (flags->chainTests.preferred_methods) | |
2027 PORT_Free(flags->chainTests.preferred_methods); | |
2028 | |
2029 PORT_Free(flags); | |
2030 } | |
2031 | |
2032 /* | |
2033 * CERT_PKIXVerifyCert | |
2034 * | |
2035 * Verify a Certificate using the PKIX library. | |
2036 * | |
2037 * Parameters: | |
2038 * cert - the target certificate to verify. Must be non-null | |
2039 * params - an array of type/value parameters which can be | |
2040 * used to modify the behavior of the validation | |
2041 * algorithm, or supply additional constraints. | |
2042 * | |
2043 * outputTrustAnchor - the trust anchor which the certificate | |
2044 * chains to. The caller is responsible | |
2045 * for freeing this. | |
2046 * | |
2047 * Example Usage: | |
2048 * CERTValParam args[3]; | |
2049 * args[0].type = cvpt_policyOID; | |
2050 * args[0].value.si = oid; | |
2051 * args[1].type = revCheckRequired; | |
2052 * args[1].value.b = PR_TRUE; | |
2053 * args[2].type = cvpt_end; | |
2054 * | |
2055 * CERT_PKIXVerifyCert(cert, &output, args | |
2056 */ | |
2057 SECStatus CERT_PKIXVerifyCert( | |
2058 CERTCertificate *cert, | |
2059 SECCertificateUsage usages, | |
2060 CERTValInParam *paramsIn, | |
2061 CERTValOutParam *paramsOut, | |
2062 void *wincx) | |
2063 { | |
2064 SECStatus r = SECFailure; | |
2065 PKIX_Error * error = NULL; | |
2066 PKIX_ProcessingParams *procParams = NULL; | |
2067 PKIX_BuildResult * buildResult = NULL; | |
2068 void * nbioContext = NULL; /* for non-blocking IO */ | |
2069 void * buildState = NULL; /* for non-blocking IO */ | |
2070 PKIX_CertSelector * certSelector = NULL; | |
2071 PKIX_List * certStores = NULL; | |
2072 PKIX_ValidateResult * valResult = NULL; | |
2073 PKIX_VerifyNode * verifyNode = NULL; | |
2074 PKIX_TrustAnchor * trustAnchor = NULL; | |
2075 PKIX_PL_Cert * trustAnchorCert = NULL; | |
2076 PKIX_List * builtCertList = NULL; | |
2077 CERTValOutParam * oparam = NULL; | |
2078 int i=0; | |
2079 | |
2080 void *plContext = NULL; | |
2081 | |
2082 #ifdef PKIX_OBJECT_LEAK_TEST | |
2083 int leakedObjNum = 0; | |
2084 int memLeakLoopCount = 0; | |
2085 int objCountTable[PKIX_NUMTYPES]; | |
2086 int fnInvLocalCount = 0; | |
2087 PKIX_Boolean savedUsePkixEngFlag = usePKIXValidationEngine; | |
2088 | |
2089 if (usePKIXValidationEngine) { | |
2090 /* current memory leak testing implementation does not allow | |
2091 * to run simultaneous tests one the same or a different threads. | |
2092 * Setting the variable to false, to make additional chain | |
2093 * validations be handled by old nss. */ | |
2094 usePKIXValidationEngine = PR_FALSE; | |
2095 } | |
2096 testStartFnStackPosition = 1; | |
2097 fnStackNameArr[0] = "CERT_PKIXVerifyCert"; | |
2098 fnStackInvCountArr[0] = 0; | |
2099 PKIX_Boolean abortOnLeak = | |
2100 (PR_GetEnv("PKIX_OBJECT_LEAK_TEST_ABORT_ON_LEAK") == NULL) ? | |
2101 PKIX_FALSE : PKIX_TRUE; | |
2102 runningLeakTest = PKIX_TRUE; | |
2103 | |
2104 /* Prevent multi-threaded run of object leak test */ | |
2105 fnInvLocalCount = PR_ATOMIC_INCREMENT(¶llelFnInvocationCount); | |
2106 PORT_Assert(fnInvLocalCount == 1); | |
2107 | |
2108 do { | |
2109 r = SECFailure; | |
2110 error = NULL; | |
2111 procParams = NULL; | |
2112 buildResult = NULL; | |
2113 nbioContext = NULL; /* for non-blocking IO */ | |
2114 buildState = NULL; /* for non-blocking IO */ | |
2115 certSelector = NULL; | |
2116 certStores = NULL; | |
2117 valResult = NULL; | |
2118 verifyNode = NULL; | |
2119 trustAnchor = NULL; | |
2120 trustAnchorCert = NULL; | |
2121 builtCertList = NULL; | |
2122 oparam = NULL; | |
2123 i=0; | |
2124 errorGenerated = PKIX_FALSE; | |
2125 stackPosition = 0; | |
2126 | |
2127 if (leakedObjNum) { | |
2128 pkix_pl_lifecycle_ObjectTableUpdate(objCountTable); | |
2129 } | |
2130 memLeakLoopCount += 1; | |
2131 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
2132 | |
2133 error = PKIX_PL_NssContext_Create( | |
2134 0, PR_FALSE /*use arena*/, wincx, &plContext); | |
2135 if (error != NULL) { /* need pkix->nss error map */ | |
2136 PORT_SetError(SEC_ERROR_CERT_NOT_VALID); | |
2137 goto cleanup; | |
2138 } | |
2139 | |
2140 error = pkix_pl_NssContext_SetCertUsage(usages, plContext); | |
2141 if (error != NULL) { | |
2142 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
2143 goto cleanup; | |
2144 } | |
2145 | |
2146 error = PKIX_ProcessingParams_Create(&procParams, plContext); | |
2147 if (error != NULL) { /* need pkix->nss error map */ | |
2148 PORT_SetError(SEC_ERROR_CERT_NOT_VALID); | |
2149 goto cleanup; | |
2150 } | |
2151 | |
2152 /* local cert store should be set into procParams before | |
2153 * filling in revocation settings. */ | |
2154 certStores = cert_GetCertStores(plContext); | |
2155 if (certStores == NULL) { | |
2156 goto cleanup; | |
2157 } | |
2158 error = PKIX_ProcessingParams_SetCertStores | |
2159 (procParams, certStores, plContext); | |
2160 if (error != NULL) { | |
2161 goto cleanup; | |
2162 } | |
2163 | |
2164 /* now process the extensible input parameters structure */ | |
2165 if (paramsIn != NULL) { | |
2166 i=0; | |
2167 while (paramsIn[i].type != cert_pi_end) { | |
2168 if (paramsIn[i].type >= cert_pi_max) { | |
2169 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
2170 goto cleanup; | |
2171 } | |
2172 if (cert_pkixSetParam(procParams, | |
2173 ¶msIn[i],plContext) != SECSuccess) { | |
2174 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
2175 goto cleanup; | |
2176 } | |
2177 i++; | |
2178 } | |
2179 } | |
2180 | |
2181 certSelector = cert_GetTargetCertConstraints(cert, plContext); | |
2182 if (certSelector == NULL) { | |
2183 goto cleanup; | |
2184 } | |
2185 error = PKIX_ProcessingParams_SetTargetCertConstraints | |
2186 (procParams, certSelector, plContext); | |
2187 if (error != NULL) { | |
2188 goto cleanup; | |
2189 } | |
2190 | |
2191 error = PKIX_BuildChain( procParams, &nbioContext, | |
2192 &buildState, &buildResult, &verifyNode, | |
2193 plContext); | |
2194 if (error != NULL) { | |
2195 goto cleanup; | |
2196 } | |
2197 | |
2198 error = PKIX_BuildResult_GetValidateResult( buildResult, &valResult, | |
2199 plContext); | |
2200 if (error != NULL) { | |
2201 goto cleanup; | |
2202 } | |
2203 | |
2204 error = PKIX_ValidateResult_GetTrustAnchor( valResult, &trustAnchor, | |
2205 plContext); | |
2206 if (error != NULL) { | |
2207 goto cleanup; | |
2208 } | |
2209 | |
2210 if (trustAnchor != NULL) { | |
2211 error = PKIX_TrustAnchor_GetTrustedCert( trustAnchor, &trustAnchorCert, | |
2212 plContext); | |
2213 if (error != NULL) { | |
2214 goto cleanup; | |
2215 } | |
2216 } | |
2217 | |
2218 #ifdef PKIX_OBJECT_LEAK_TEST | |
2219 /* Can not continue if error was generated but not returned. | |
2220 * Jumping to cleanup. */ | |
2221 if (errorGenerated) goto cleanup; | |
2222 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
2223 | |
2224 oparam = cert_pkix_FindOutputParam(paramsOut, cert_po_trustAnchor); | |
2225 if (oparam != NULL) { | |
2226 if (trustAnchorCert != NULL) { | |
2227 oparam->value.pointer.cert = | |
2228 cert_NSSCertFromPKIXCert(trustAnchorCert); | |
2229 } else { | |
2230 oparam->value.pointer.cert = NULL; | |
2231 } | |
2232 } | |
2233 | |
2234 error = PKIX_BuildResult_GetCertChain( buildResult, &builtCertList, | |
2235 plContext); | |
2236 if (error != NULL) { | |
2237 goto cleanup; | |
2238 } | |
2239 | |
2240 oparam = cert_pkix_FindOutputParam(paramsOut, cert_po_certList); | |
2241 if (oparam != NULL) { | |
2242 error = cert_PkixToNssCertsChain(builtCertList, | |
2243 &oparam->value.pointer.chain, | |
2244 plContext); | |
2245 if (error) goto cleanup; | |
2246 } | |
2247 | |
2248 r = SECSuccess; | |
2249 | |
2250 cleanup: | |
2251 if (verifyNode) { | |
2252 /* Return validation log only upon error. */ | |
2253 oparam = cert_pkix_FindOutputParam(paramsOut, cert_po_errorLog); | |
2254 #ifdef PKIX_OBJECT_LEAK_TEST | |
2255 if (!errorGenerated) | |
2256 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
2257 if (r && oparam != NULL) { | |
2258 PKIX_Error *tmpError = | |
2259 cert_GetLogFromVerifyNode(oparam->value.pointer.log, | |
2260 verifyNode, plContext); | |
2261 if (tmpError) { | |
2262 PKIX_PL_Object_DecRef((PKIX_PL_Object *)tmpError, plContext); | |
2263 } | |
2264 } | |
2265 PKIX_PL_Object_DecRef((PKIX_PL_Object *)verifyNode, plContext); | |
2266 } | |
2267 | |
2268 if (procParams != NULL) | |
2269 PKIX_PL_Object_DecRef((PKIX_PL_Object *)procParams, plContext); | |
2270 | |
2271 if (trustAnchorCert != NULL) | |
2272 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchorCert, plContext); | |
2273 | |
2274 if (trustAnchor != NULL) | |
2275 PKIX_PL_Object_DecRef((PKIX_PL_Object *)trustAnchor, plContext); | |
2276 | |
2277 if (valResult != NULL) | |
2278 PKIX_PL_Object_DecRef((PKIX_PL_Object *)valResult, plContext); | |
2279 | |
2280 if (buildResult != NULL) | |
2281 PKIX_PL_Object_DecRef((PKIX_PL_Object *)buildResult, plContext); | |
2282 | |
2283 if (certStores != NULL) | |
2284 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certStores, plContext); | |
2285 | |
2286 if (certSelector != NULL) | |
2287 PKIX_PL_Object_DecRef((PKIX_PL_Object *)certSelector, plContext); | |
2288 | |
2289 if (builtCertList != NULL) | |
2290 PKIX_PL_Object_DecRef((PKIX_PL_Object *)builtCertList, plContext); | |
2291 | |
2292 if (error != NULL) { | |
2293 SECErrorCodes nssErrorCode = 0; | |
2294 | |
2295 cert_PkixErrorToNssCode(error, &nssErrorCode, plContext); | |
2296 cert_pkixDestroyValOutParam(paramsOut); | |
2297 PORT_SetError(nssErrorCode); | |
2298 PKIX_PL_Object_DecRef((PKIX_PL_Object *)error, plContext); | |
2299 } | |
2300 | |
2301 PKIX_PL_NssContext_Destroy(plContext); | |
2302 | |
2303 #ifdef PKIX_OBJECT_LEAK_TEST | |
2304 leakedObjNum = | |
2305 pkix_pl_lifecycle_ObjectLeakCheck(leakedObjNum ? objCountTable : NULL); | |
2306 | |
2307 if (pkixLog && leakedObjNum) { | |
2308 PR_LOG(pkixLog, 1, ("The generated error caused an object leaks. Loop %d." | |
2309 "Stack %s\n", memLeakLoopCount, errorFnStackString)); | |
2310 } | |
2311 PR_Free(errorFnStackString); | |
2312 errorFnStackString = NULL; | |
2313 if (abortOnLeak) { | |
2314 PORT_Assert(leakedObjNum == 0); | |
2315 } | |
2316 | |
2317 } while (errorGenerated); | |
2318 | |
2319 runningLeakTest = PKIX_FALSE; | |
2320 PR_ATOMIC_DECREMENT(¶llelFnInvocationCount); | |
2321 usePKIXValidationEngine = savedUsePkixEngFlag; | |
2322 #endif /* PKIX_OBJECT_LEAK_TEST */ | |
2323 | |
2324 return r; | |
2325 } |