XRootD
Loading...
Searching...
No Matches
XrdTlsNotaryUtils.icc
Go to the documentation of this file.
1/* Obtained from: https://github.com/iSECPartners/ssl-conservatory */
2// Original name: openssl_hostname_validation.c
3
4/*
5Copyright (C) 2012, iSEC Partners.
6
7Permission is hereby granted, free of charge, to any person obtaining a copy of
8this software and associated documentation files (the "Software"), to deal in
9the Software without restriction, including without limitation the rights to
10use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
11of the Software, and to permit persons to whom the Software is furnished to do
12so, subject to the following conditions:
13
14The above copyright notice and this permission notice shall be included in all
15copies or substantial portions of the Software.
16
17THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
18IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
19FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
20AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
21LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
22OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
23SOFTWARE.
24 */
25
26/*
27 * Helper functions to perform basic hostname validation using OpenSSL.
28 *
29 * Please read "everything-you-wanted-to-know-about-openssl.pdf" before
30 * attempting to use this code. This whitepaper describes how the code works,
31 * how it should be used, and what its limitations are.
32 *
33 * Author: Alban Diquet
34 * License: See LICENSE
35 *
36 */
37
38
39#include <openssl/x509v3.h>
40#include <openssl/ssl.h>
41
42/*
43#include "openssl_hostname_validation.h"
44#include "hostcheck.h"
45*/
46
47#define HOSTNAME_MAX_SIZE 255
48
57static HostnameValidationResult matches_common_name(const char *hostname, const X509 *server_cert) {
58 int common_name_loc = -1;
59 X509_NAME_ENTRY *common_name_entry = NULL;
60 ASN1_STRING *common_name_asn1 = NULL;
61 char *common_name_str = NULL;
62
63 // Find the position of the CN field in the Subject field of the certificate
64 common_name_loc = X509_NAME_get_index_by_NID(X509_get_subject_name((X509 *) server_cert), NID_commonName, -1);
65 if (common_name_loc < 0) {
66 return Error;
67 }
68
69 // Extract the CN field
70 common_name_entry = X509_NAME_get_entry(X509_get_subject_name((X509 *) server_cert), common_name_loc);
71 if (common_name_entry == NULL) {
72 return Error;
73 }
74
75 // Convert the CN field to a C string
76 common_name_asn1 = X509_NAME_ENTRY_get_data(common_name_entry);
77 if (common_name_asn1 == NULL) {
78 return Error;
79 }
80 common_name_str = (char *) ASN1_STRING_get0_data(common_name_asn1);
81
82 // Make sure there isn't an embedded NUL character in the CN
83 if ((size_t)ASN1_STRING_length(common_name_asn1) != strlen(common_name_str)) {
85 }
86
87 // Compare expected hostname with the CN
88 if (Curl_cert_hostcheck(common_name_str, hostname) == CURL_HOST_MATCH) {
89 return MatchFound;
90 }
91 else {
92 return MatchNotFound;
93 }
94}
95
96
105static HostnameValidationResult matches_subject_alternative_name(const char *hostname, const X509 *server_cert) {
107 int i;
108 int san_names_nb = -1;
109 STACK_OF(GENERAL_NAME) *san_names = NULL;
110
111 // Try to extract the names within the SAN extension from the certificate
112 san_names = static_cast<GENERAL_NAMES *>(
113 X509_get_ext_d2i((X509 *) server_cert,
114 NID_subject_alt_name, NULL, NULL));
115 if (san_names == NULL) {
116 return NoSANPresent;
117 }
118 san_names_nb = sk_GENERAL_NAME_num(san_names);
119
120 // Check each name within the extension
121 for (i=0; i<san_names_nb; i++) {
122 const GENERAL_NAME *current_name = sk_GENERAL_NAME_value(san_names, i);
123
124 if (current_name->type == GEN_DNS) {
125 // Current name is a DNS name, let's check it
126 char *dns_name = (char *) ASN1_STRING_get0_data(current_name->d.dNSName);
127
128 // Make sure there isn't an embedded NUL character in the DNS name
129 if ((size_t)ASN1_STRING_length(current_name->d.dNSName) != strlen(dns_name)) {
130 result = MalformedCertificate;
131 break;
132 }
133 else { // Compare expected hostname with the DNS name
134 if (Curl_cert_hostcheck(dns_name, hostname)
135 == CURL_HOST_MATCH) {
136 result = MatchFound;
137 break;
138 }
139 }
140 }
141 }
142 sk_GENERAL_NAME_pop_free(san_names, GENERAL_NAME_free);
143
144 return result;
145}
146
147
159HostnameValidationResult validate_hostname(const char *hostname, const X509 *server_cert) {
161
162 if((hostname == NULL) || (server_cert == NULL))
163 return Error;
164
165 // First try the Subject Alternative Names extension
166 result = matches_subject_alternative_name(hostname, server_cert);
167 if (result == NoSANPresent) {
168 // Extension was not found: try the Common Name
169 result = matches_common_name(hostname, server_cert);
170 }
171
172 return result;
173}
int Curl_cert_hostcheck(const char *match_pattern, const char *hostname)
#define CURL_HOST_MATCH
HostnameValidationResult
@ MatchNotFound
@ NoSANPresent
@ MalformedCertificate
@ MatchFound
HostnameValidationResult validate_hostname(const char *hostname, const X509 *server_cert)
static HostnameValidationResult matches_common_name(const char *hostname, const X509 *server_cert)
static HostnameValidationResult matches_subject_alternative_name(const char *hostname, const X509 *server_cert)