/src/openssl30/crypto/ct/ct_vfy.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | #include <string.h> | 
| 11 |  |  | 
| 12 |  | #include <openssl/ct.h> | 
| 13 |  | #include <openssl/err.h> | 
| 14 |  | #include <openssl/evp.h> | 
| 15 |  | #include <openssl/x509.h> | 
| 16 |  |  | 
| 17 |  | #include "ct_local.h" | 
| 18 |  |  | 
| 19 |  | typedef enum sct_signature_type_t { | 
| 20 |  |     SIGNATURE_TYPE_NOT_SET = -1, | 
| 21 |  |     SIGNATURE_TYPE_CERT_TIMESTAMP, | 
| 22 |  |     SIGNATURE_TYPE_TREE_HASH | 
| 23 |  | } SCT_SIGNATURE_TYPE; | 
| 24 |  |  | 
| 25 |  | /* | 
| 26 |  |  * Update encoding for SCT signature verification/generation to supplied | 
| 27 |  |  * EVP_MD_CTX. | 
| 28 |  |  */ | 
| 29 |  | static int sct_ctx_update(EVP_MD_CTX *ctx, const SCT_CTX *sctx, const SCT *sct) | 
| 30 | 0 | { | 
| 31 | 0 |     unsigned char tmpbuf[12]; | 
| 32 | 0 |     unsigned char *p, *der; | 
| 33 | 0 |     size_t derlen; | 
| 34 |  |     /*+ | 
| 35 |  |      * digitally-signed struct { | 
| 36 |  |      *   (1 byte) Version sct_version; | 
| 37 |  |      *   (1 byte) SignatureType signature_type = certificate_timestamp; | 
| 38 |  |      *   (8 bytes) uint64 timestamp; | 
| 39 |  |      *   (2 bytes) LogEntryType entry_type; | 
| 40 |  |      *   (? bytes) select(entry_type) { | 
| 41 |  |      *     case x509_entry: ASN.1Cert; | 
| 42 |  |      *     case precert_entry: PreCert; | 
| 43 |  |      *   } signed_entry; | 
| 44 |  |      *   (2 bytes + sct->ext_len) CtExtensions extensions; | 
| 45 |  |      * } | 
| 46 |  |      */ | 
| 47 | 0 |     if (sct->entry_type == CT_LOG_ENTRY_TYPE_NOT_SET) | 
| 48 | 0 |         return 0; | 
| 49 | 0 |     if (sct->entry_type == CT_LOG_ENTRY_TYPE_PRECERT && sctx->ihash == NULL) | 
| 50 | 0 |         return 0; | 
| 51 |  |  | 
| 52 | 0 |     p = tmpbuf; | 
| 53 | 0 |     *p++ = sct->version; | 
| 54 | 0 |     *p++ = SIGNATURE_TYPE_CERT_TIMESTAMP; | 
| 55 | 0 |     l2n8(sct->timestamp, p); | 
| 56 | 0 |     s2n(sct->entry_type, p); | 
| 57 |  | 
 | 
| 58 | 0 |     if (!EVP_DigestUpdate(ctx, tmpbuf, p - tmpbuf)) | 
| 59 | 0 |         return 0; | 
| 60 |  |  | 
| 61 | 0 |     if (sct->entry_type == CT_LOG_ENTRY_TYPE_X509) { | 
| 62 | 0 |         der = sctx->certder; | 
| 63 | 0 |         derlen = sctx->certderlen; | 
| 64 | 0 |     } else { | 
| 65 | 0 |         if (!EVP_DigestUpdate(ctx, sctx->ihash, sctx->ihashlen)) | 
| 66 | 0 |             return 0; | 
| 67 | 0 |         der = sctx->preder; | 
| 68 | 0 |         derlen = sctx->prederlen; | 
| 69 | 0 |     } | 
| 70 |  |  | 
| 71 |  |     /* If no encoding available, fatal error */ | 
| 72 | 0 |     if (der == NULL) | 
| 73 | 0 |         return 0; | 
| 74 |  |  | 
| 75 |  |     /* Include length first */ | 
| 76 | 0 |     p = tmpbuf; | 
| 77 | 0 |     l2n3(derlen, p); | 
| 78 |  | 
 | 
| 79 | 0 |     if (!EVP_DigestUpdate(ctx, tmpbuf, 3)) | 
| 80 | 0 |         return 0; | 
| 81 | 0 |     if (!EVP_DigestUpdate(ctx, der, derlen)) | 
| 82 | 0 |         return 0; | 
| 83 |  |  | 
| 84 |  |     /* Add any extensions */ | 
| 85 | 0 |     p = tmpbuf; | 
| 86 | 0 |     s2n(sct->ext_len, p); | 
| 87 | 0 |     if (!EVP_DigestUpdate(ctx, tmpbuf, 2)) | 
| 88 | 0 |         return 0; | 
| 89 |  |  | 
| 90 | 0 |     if (sct->ext_len && !EVP_DigestUpdate(ctx, sct->ext, sct->ext_len)) | 
| 91 | 0 |         return 0; | 
| 92 |  |  | 
| 93 | 0 |     return 1; | 
| 94 | 0 | } | 
| 95 |  |  | 
| 96 |  | int SCT_CTX_verify(const SCT_CTX *sctx, const SCT *sct) | 
| 97 | 0 | { | 
| 98 | 0 |     EVP_MD_CTX *ctx = NULL; | 
| 99 | 0 |     int ret = 0; | 
| 100 |  | 
 | 
| 101 | 0 |     if (!SCT_is_complete(sct) || sctx->pkey == NULL || | 
| 102 | 0 |         sct->entry_type == CT_LOG_ENTRY_TYPE_NOT_SET || | 
| 103 | 0 |         (sct->entry_type == CT_LOG_ENTRY_TYPE_PRECERT && sctx->ihash == NULL)) { | 
| 104 | 0 |         ERR_raise(ERR_LIB_CT, CT_R_SCT_NOT_SET); | 
| 105 | 0 |         return 0; | 
| 106 | 0 |     } | 
| 107 | 0 |     if (sct->version != SCT_VERSION_V1) { | 
| 108 | 0 |         ERR_raise(ERR_LIB_CT, CT_R_SCT_UNSUPPORTED_VERSION); | 
| 109 | 0 |         return 0; | 
| 110 | 0 |     } | 
| 111 | 0 |     if (sct->log_id_len != sctx->pkeyhashlen || | 
| 112 | 0 |         memcmp(sct->log_id, sctx->pkeyhash, sctx->pkeyhashlen) != 0) { | 
| 113 | 0 |         ERR_raise(ERR_LIB_CT, CT_R_SCT_LOG_ID_MISMATCH); | 
| 114 | 0 |         return 0; | 
| 115 | 0 |     } | 
| 116 | 0 |     if (sct->timestamp > sctx->epoch_time_in_ms) { | 
| 117 | 0 |         ERR_raise(ERR_LIB_CT, CT_R_SCT_FUTURE_TIMESTAMP); | 
| 118 | 0 |         return 0; | 
| 119 | 0 |     } | 
| 120 |  |  | 
| 121 | 0 |     ctx = EVP_MD_CTX_new(); | 
| 122 | 0 |     if (ctx == NULL) | 
| 123 | 0 |         goto end; | 
| 124 |  |  | 
| 125 | 0 |     if (!EVP_DigestVerifyInit_ex(ctx, NULL, "SHA2-256", sctx->libctx, | 
| 126 | 0 |                                  sctx->propq, sctx->pkey, NULL)) | 
| 127 | 0 |         goto end; | 
| 128 |  |  | 
| 129 | 0 |     if (!sct_ctx_update(ctx, sctx, sct)) | 
| 130 | 0 |         goto end; | 
| 131 |  |  | 
| 132 |  |     /* Verify signature */ | 
| 133 | 0 |     ret = EVP_DigestVerifyFinal(ctx, sct->sig, sct->sig_len); | 
| 134 |  |     /* If ret < 0 some other error: fall through without setting error */ | 
| 135 | 0 |     if (ret == 0) | 
| 136 | 0 |         ERR_raise(ERR_LIB_CT, CT_R_SCT_INVALID_SIGNATURE); | 
| 137 |  | 
 | 
| 138 | 0 | end: | 
| 139 | 0 |     EVP_MD_CTX_free(ctx); | 
| 140 | 0 |     return ret; | 
| 141 | 0 | } |