blob: e7a1670af1b5bb9f6452ecedf5d454bf8df01d2b [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_CERT_INTERNAL_PARSE_CERTIFICATE_H_
#define NET_CERT_INTERNAL_PARSE_CERTIFICATE_H_
#include <stdint.h>
#include <map>
#include "base/compiler_specific.h"
#include "net/base/net_export.h"
#include "net/der/input.h"
#include "net/der/parse_values.h"
namespace net {
struct ParsedCertificate;
struct ParsedTbsCertificate;
// Parses a DER-encoded "Certificate" as specified by RFC 5280. Returns true on
// success and sets the results in |out|.
//
// Note that on success |out| aliases data from the input |certificate_tlv|.
// Hence the fields of the ParsedCertificate are only valid as long as
// |certificate_tlv| remains valid.
//
// On failure |out| has an undefined state. Some of its fields may have been
// updated during parsing, whereas others may not have been changed.
//
// Refer to the per-field documention of the ParsedCertificate structure for
// details on what validity checks parsing performs.
//
// Certificate ::= SEQUENCE {
// tbsCertificate TBSCertificate,
// signatureAlgorithm AlgorithmIdentifier,
// signatureValue BIT STRING }
NET_EXPORT bool ParseCertificate(const der::Input& certificate_tlv,
ParsedCertificate* out) WARN_UNUSED_RESULT;
// Parses a DER-encoded "TBSCertificate" as specified by RFC 5280. Returns true
// on success and sets the results in |out|.
//
// Note that on success |out| aliases data from the input |tbs_tlv|.
// Hence the fields of the ParsedTbsCertificate are only valid as long as
// |tbs_tlv| remains valid.
//
// On failure |out| has an undefined state. Some of its fields may have been
// updated during parsing, whereas others may not have been changed.
//
// Refer to the per-field documentation of ParsedTbsCertificate for details on
// what validity checks parsing performs.
//
// TBSCertificate ::= SEQUENCE {
// version [0] EXPLICIT Version DEFAULT v1,
// serialNumber CertificateSerialNumber,
// signature AlgorithmIdentifier,
// issuer Name,
// validity Validity,
// subject Name,
// subjectPublicKeyInfo SubjectPublicKeyInfo,
// issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
// -- If present, version MUST be v2 or v3
// subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
// -- If present, version MUST be v2 or v3
// extensions [3] EXPLICIT Extensions OPTIONAL
// -- If present, version MUST be v3
// }
NET_EXPORT bool ParseTbsCertificate(const der::Input& tbs_tlv,
ParsedTbsCertificate* out)
WARN_UNUSED_RESULT;
// Represents a "Version" from RFC 5280:
// Version ::= INTEGER { v1(0), v2(1), v3(2) }
enum class CertificateVersion {
V1,
V2,
V3,
};
// ParsedCertificate contains pointers to the main fields of a DER-encoded RFC
// 5280 "Certificate".
//
// ParsedCertificate is expected to be filled by ParseCertificate(), so
// subsequent field descriptions are in terms of what ParseCertificate() sets.
struct NET_EXPORT ParsedCertificate {
// Corresponds with "tbsCertificate" from RFC 5280:
// tbsCertificate TBSCertificate,
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE.
//
// This can be further parsed using ParseTbsCertificate().
der::Input tbs_certificate_tlv;
// Corresponds with "signatureAlgorithm" from RFC 5280:
// signatureAlgorithm AlgorithmIdentifier,
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE.
//
// This can be further parsed using SignatureValue::CreateFromDer().
der::Input signature_algorithm_tlv;
// Corresponds with "signatureValue" from RFC 5280:
// signatureValue BIT STRING }
//
// Parsing guarantees that this is a valid BIT STRING.
der::BitString signature_value;
};
// ParsedTbsCertificate contains pointers to the main fields of a DER-encoded
// RFC 5280 "TBSCertificate".
//
// ParsedTbsCertificate is expected to be filled by ParseTbsCertificate(), so
// subsequent field descriptions are in terms of what ParseTbsCertificate()
// sets.
struct NET_EXPORT ParsedTbsCertificate {
ParsedTbsCertificate();
~ParsedTbsCertificate();
// Corresponds with "version" from RFC 5280:
// version [0] EXPLICIT Version DEFAULT v1,
//
// Parsing guarantees that the version is one of v1, v2, or v3.
CertificateVersion version = CertificateVersion::V1;
// Corresponds with "serialNumber" from RFC 5280:
// serialNumber CertificateSerialNumber,
//
// This field specifically contains the content bytes of the INTEGER. So for
// instance if the serial number was 1000 then this would contain bytes
// {0x03, 0xE8}.
//
// In addition to being a valid DER-encoded INTEGER, parsing guarantees that
// the serial number is at most 20 bytes long. Parsing does NOT guarantee
// that the integer is positive (might be zero or negative).
der::Input serial_number;
// Corresponds with "signatureAlgorithm" from RFC 5280:
// signatureAlgorithm AlgorithmIdentifier,
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE.
//
// This can be further parsed using SignatureValue::CreateFromDer().
der::Input signature_algorithm_tlv;
// Corresponds with "issuer" from RFC 5280:
// issuer Name,
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE.
der::Input issuer_tlv;
// Corresponds with "validity" from RFC 5280:
// validity Validity,
//
// Where Validity is defined as:
//
// Validity ::= SEQUENCE {
// notBefore Time,
// notAfter Time }
//
// Parsing guarantees that notBefore (validity_not_before) and notAfter
// (validity_not_after) are valid DER-encoded dates, however it DOES NOT
// gurantee anything about their values. For instance notAfter could be
// before notBefore, or the dates could indicate an expired certificate.
// Consumers are responsible for testing expiration.
der::GeneralizedTime validity_not_before;
der::GeneralizedTime validity_not_after;
// Corresponds with "subject" from RFC 5280:
// subject Name,
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE.
der::Input subject_tlv;
// Corresponds with "subjectPublicKeyInfo" from RFC 5280:
// subjectPublicKeyInfo SubjectPublicKeyInfo,
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE.
der::Input spki_tlv;
// Corresponds with "issuerUniqueID" from RFC 5280:
// issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL,
// -- If present, version MUST be v2 or v3
//
// Parsing guarantees that if issuer_unique_id is present it is a valid BIT
// STRING, and that the version is either v2 or v3
bool has_issuer_unique_id = false;
der::BitString issuer_unique_id;
// Corresponds with "subjectUniqueID" from RFC 5280:
// subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL,
// -- If present, version MUST be v2 or v3
//
// Parsing guarantees that if subject_unique_id is present it is a valid BIT
// STRING, and that the version is either v2 or v3
bool has_subject_unique_id = false;
der::BitString subject_unique_id;
// Corresponds with "extensions" from RFC 5280:
// extensions [3] EXPLICIT Extensions OPTIONAL
// -- If present, version MUST be v3
//
//
// This contains the full (unverified) Tag-Length-Value for a SEQUENCE. No
// guarantees are made regarding the value of this SEQUENCE. (Note that the
// EXPLICIT outer tag is stripped.)
//
// Parsing guarantees that if extensions is present the version is v3.
bool has_extensions = false;
der::Input extensions_tlv;
};
// ParsedExtension represents a parsed "Extension" from RFC 5280. It contains
// der:Inputs which are not owned so the associated data must be kept alive.
//
// Extension ::= SEQUENCE {
// extnID OBJECT IDENTIFIER,
// critical BOOLEAN DEFAULT FALSE,
// extnValue OCTET STRING
// -- contains the DER encoding of an ASN.1 value
// -- corresponding to the extension type identified
// -- by extnID
// }
struct NET_EXPORT ParsedExtension {
der::Input oid;
// |value| will contain the contents of the OCTET STRING. For instance for
// basicConstraints it will be the TLV for a SEQUENCE.
der::Input value;
bool critical = false;
};
// Parses a DER-encoded "Extension" as specified by RFC 5280. Returns true on
// success and sets the results in |out|.
//
// Note that on success |out| aliases data from the input |extension_tlv|.
// Hence the fields of the ParsedExtension are only valid as long as
// |extension_tlv| remains valid.
//
// On failure |out| has an undefined state. Some of its fields may have been
// updated during parsing, whereas others may not have been changed.
NET_EXPORT bool ParseExtension(const der::Input& extension_tlv,
ParsedExtension* out) WARN_UNUSED_RESULT;
// From RFC 5280:
//
// id-ce-keyUsage OBJECT IDENTIFIER ::= { id-ce 15 }
//
// In dotted notation: 2.5.29.15
NET_EXPORT der::Input KeyUsageOid();
// From RFC 5280:
//
// id-ce-subjectAltName OBJECT IDENTIFIER ::= { id-ce 17 }
//
// In dotted notation: 2.5.29.17
NET_EXPORT der::Input SubjectAltNameOid();
// From RFC 5280:
//
// id-ce-basicConstraints OBJECT IDENTIFIER ::= { id-ce 19 }
//
// In dotted notation: 2.5.29.19
NET_EXPORT der::Input BasicConstraintsOid();
// From RFC 5280:
//
// id-ce-nameConstraints OBJECT IDENTIFIER ::= { id-ce 30 }
//
// In dotted notation: 2.5.29.30
NET_EXPORT der::Input NameConstraintsOid();
// From RFC 5280:
//
// id-ce-certificatePolicies OBJECT IDENTIFIER ::= { id-ce 32 }
//
// In dotted notation: 2.5.29.32
NET_EXPORT der::Input CertificatePoliciesOid();
// From RFC 5280:
//
// id-ce-policyConstraints OBJECT IDENTIFIER ::= { id-ce 36 }
//
// In dotted notation: 2.5.29.36
NET_EXPORT der::Input PolicyConstraintsOid();
// From RFC 5280:
//
// id-ce-extKeyUsage OBJECT IDENTIFIER ::= { id-ce 37 }
//
// In dotted notation: 2.5.29.37
NET_EXPORT der::Input ExtKeyUsageOid();
// Parses the Extensions sequence as defined by RFC 5280. Extensions are added
// to the map |extensions| keyed by the OID. Parsing guarantees that each OID
// is unique. Note that certificate verification must consume each extension
// marked as critical.
//
// Returns true on success and fills |extensions|. The output will reference
// bytes in |extensions_tlv|, so that data must be kept alive.
// On failure |extensions| may be partially written to and should not be used.
NET_EXPORT bool ParseExtensions(
const der::Input& extensions_tlv,
std::map<der::Input, ParsedExtension>* extensions) WARN_UNUSED_RESULT;
struct ParsedBasicConstraints {
bool is_ca = false;
bool has_path_len = false;
uint8_t path_len = 0;
};
// Parses the BasicConstraints extension as defined by RFC 5280:
//
// BasicConstraints ::= SEQUENCE {
// cA BOOLEAN DEFAULT FALSE,
// pathLenConstraint INTEGER (0..MAX) OPTIONAL }
//
// The maximum allowed value of pathLenConstraints will be whatever can fit
// into a uint8_t.
NET_EXPORT bool ParseBasicConstraints(const der::Input& basic_constraints_tlv,
ParsedBasicConstraints* out)
WARN_UNUSED_RESULT;
// KeyUsageBit contains the index for a particular key usage. The index is
// measured from the most significant bit of a bit string.
//
// From RFC 5280 section 4.2.1.3:
//
// KeyUsage ::= BIT STRING {
// digitalSignature (0),
// nonRepudiation (1), -- recent editions of X.509 have
// -- renamed this bit to contentCommitment
// keyEncipherment (2),
// dataEncipherment (3),
// keyAgreement (4),
// keyCertSign (5),
// cRLSign (6),
// encipherOnly (7),
// decipherOnly (8) }
enum KeyUsageBit {
KEY_USAGE_BIT_DIGITAL_SIGNATURE = 0,
KEY_USAGE_BIT_NON_REPUDIATION = 1,
KEY_USAGE_BIT_KEY_ENCIPHERMENT = 2,
KEY_USAGE_BIT_DATA_ENCIPHERMENT = 3,
KEY_USAGE_BIT_KEY_AGREEMENT = 4,
KEY_USAGE_BIT_KEY_CERT_SIGN = 5,
KEY_USAGE_BIT_CRL_SIGN = 6,
KEY_USAGE_BIT_ENCIPHER_ONLY = 7,
KEY_USAGE_BIT_DECIPHER_ONLY = 8,
};
// Parses the KeyUsage extension as defined by RFC 5280. Returns true on
// success, and |key_usage| will alias data in |key_usage_tlv|. On failure
// returns false, and |key_usage| may have been modified.
//
// In addition to validating that key_usage_tlv is a BIT STRING, this does
// additional KeyUsage specific validations such as requiring at least 1 bit to
// be set.
//
// To test if a particular key usage is set, call, e.g.:
// key_usage->AssertsBit(KEY_USAGE_BIT_DIGITAL_SIGNATURE);
NET_EXPORT bool ParseKeyUsage(const der::Input& key_usage_tlv,
der::BitString* key_usage) WARN_UNUSED_RESULT;
} // namespace net
#endif // NET_CERT_INTERNAL_PARSE_CERTIFICATE_H_