1 | // Copyright 2015 Brian Smith. |
2 | // |
3 | // Permission to use, copy, modify, and/or distribute this software for any |
4 | // purpose with or without fee is hereby granted, provided that the above |
5 | // copyright notice and this permission notice appear in all copies. |
6 | // |
7 | // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES |
8 | // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
9 | // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR |
10 | // ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
11 | // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
12 | // ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
13 | // OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
14 | |
15 | #[cfg (feature = "alloc" )] |
16 | use alloc::string::String; |
17 | #[cfg (feature = "alloc" )] |
18 | use alloc::vec::Vec; |
19 | use core::fmt; |
20 | use core::ops::ControlFlow; |
21 | |
22 | #[cfg (feature = "alloc" )] |
23 | use pki_types::ServerName; |
24 | use pki_types::UnixTime; |
25 | |
26 | /// An error that occurs during certificate validation or name validation. |
27 | #[derive (Clone, Debug, PartialEq, Eq)] |
28 | #[non_exhaustive ] |
29 | pub enum Error { |
30 | /// The encoding of some ASN.1 DER-encoded item is invalid. |
31 | BadDer, |
32 | |
33 | /// The encoding of an ASN.1 DER-encoded time is invalid. |
34 | BadDerTime, |
35 | |
36 | /// A CA certificate is being used as an end-entity certificate. |
37 | CaUsedAsEndEntity, |
38 | |
39 | /// The certificate is expired; i.e. the time it is being validated for is |
40 | /// later than the certificate's notAfter time. |
41 | CertExpired { |
42 | /// The validation time. |
43 | time: UnixTime, |
44 | /// The notAfter time of the certificate. |
45 | not_after: UnixTime, |
46 | }, |
47 | |
48 | /// The certificate is not valid for the name it is being validated for. |
49 | CertNotValidForName(InvalidNameContext), |
50 | |
51 | /// The certificate is not valid yet; i.e. the time it is being validated |
52 | /// for is earlier than the certificate's notBefore time. |
53 | CertNotValidYet { |
54 | /// The validation time. |
55 | time: UnixTime, |
56 | /// The notBefore time of the certificate. |
57 | not_before: UnixTime, |
58 | }, |
59 | |
60 | /// The certificate, or one of its issuers, has been revoked. |
61 | CertRevoked, |
62 | |
63 | /// The CRL is expired; i.e. the verification time is not before the time |
64 | /// in the CRL nextUpdate field. |
65 | CrlExpired { |
66 | /// The validation time. |
67 | time: UnixTime, |
68 | /// The nextUpdate time of the CRL. |
69 | next_update: UnixTime, |
70 | }, |
71 | |
72 | /// An end-entity certificate is being used as a CA certificate. |
73 | EndEntityUsedAsCa, |
74 | |
75 | /// An X.509 extension is invalid. |
76 | ExtensionValueInvalid, |
77 | |
78 | /// The certificate validity period (notBefore, notAfter) is invalid; e.g. |
79 | /// the notAfter time is earlier than the notBefore time. |
80 | InvalidCertValidity, |
81 | |
82 | /// A CRL number extension was invalid: |
83 | /// - it was mis-encoded |
84 | /// - it was negative |
85 | /// - it was too long |
86 | InvalidCrlNumber, |
87 | |
88 | /// A iPAddress name constraint was invalid: |
89 | /// - it had a sparse network mask (ie, cannot be written in CIDR form). |
90 | /// - it was too long or short |
91 | InvalidNetworkMaskConstraint, |
92 | |
93 | /// A serial number was invalid: |
94 | /// - it was misencoded |
95 | /// - it was negative |
96 | /// - it was too long |
97 | InvalidSerialNumber, |
98 | |
99 | /// The CRL signature is invalid for the issuer's public key. |
100 | InvalidCrlSignatureForPublicKey, |
101 | |
102 | /// The signature is invalid for the given public key. |
103 | InvalidSignatureForPublicKey, |
104 | |
105 | /// A CRL was signed by an issuer that has a KeyUsage bitstring that does not include |
106 | /// the cRLSign key usage bit. |
107 | IssuerNotCrlSigner, |
108 | |
109 | /// A presented or reference DNS identifier was malformed, potentially |
110 | /// containing invalid characters or invalid labels. |
111 | MalformedDnsIdentifier, |
112 | |
113 | /// The certificate extensions are malformed. |
114 | /// |
115 | /// In particular, webpki requires the DNS name(s) be in the subjectAltName |
116 | /// extension as required by the CA/Browser Forum Baseline Requirements |
117 | /// and as recommended by RFC6125. |
118 | MalformedExtensions, |
119 | |
120 | /// A name constraint was malformed, potentially containing invalid characters or |
121 | /// invalid labels. |
122 | MalformedNameConstraint, |
123 | |
124 | /// The maximum number of name constraint comparisons has been reached. |
125 | MaximumNameConstraintComparisonsExceeded, |
126 | |
127 | /// The maximum number of internal path building calls has been reached. Path complexity is too great. |
128 | MaximumPathBuildCallsExceeded, |
129 | |
130 | /// The path search was terminated because it became too deep. |
131 | MaximumPathDepthExceeded, |
132 | |
133 | /// The maximum number of signature checks has been reached. Path complexity is too great. |
134 | MaximumSignatureChecksExceeded, |
135 | |
136 | /// The certificate violates one or more name constraints. |
137 | NameConstraintViolation, |
138 | |
139 | /// The certificate violates one or more path length constraints. |
140 | PathLenConstraintViolated, |
141 | |
142 | /// The certificate is not valid for the Extended Key Usage for which it is |
143 | /// being validated. |
144 | RequiredEkuNotFound, |
145 | |
146 | /// The algorithm in the TBSCertificate "signature" field of a certificate |
147 | /// does not match the algorithm in the signature of the certificate. |
148 | SignatureAlgorithmMismatch, |
149 | |
150 | /// Trailing data was found while parsing DER-encoded input for the named type. |
151 | TrailingData(DerTypeId), |
152 | |
153 | /// A valid issuer for the certificate could not be found. |
154 | UnknownIssuer, |
155 | |
156 | /// The certificate's revocation status could not be determined. |
157 | UnknownRevocationStatus, |
158 | |
159 | /// The certificate is not a v3 X.509 certificate. |
160 | /// |
161 | /// This error may be also reported if the certificate version field |
162 | /// is malformed. |
163 | UnsupportedCertVersion, |
164 | |
165 | /// The certificate contains an unsupported critical extension. |
166 | UnsupportedCriticalExtension, |
167 | |
168 | /// The CRL contains an issuing distribution point with no distribution point name, |
169 | /// or a distribution point name relative to an issuer. |
170 | UnsupportedCrlIssuingDistributionPoint, |
171 | |
172 | /// The CRL is not a v2 X.509 CRL. |
173 | /// |
174 | /// The RFC 5280 web PKI profile mandates only version 2 be used. See section |
175 | /// 5.1.2.1 for more information. |
176 | /// |
177 | /// This error may also be reported if the CRL version field is malformed. |
178 | UnsupportedCrlVersion, |
179 | |
180 | /// The CRL is an unsupported "delta" CRL. |
181 | UnsupportedDeltaCrl, |
182 | |
183 | /// The CRL contains unsupported "indirect" entries. |
184 | UnsupportedIndirectCrl, |
185 | |
186 | /// The `ServerName` contained an unsupported type of value. |
187 | UnsupportedNameType, |
188 | |
189 | /// The revocation reason is not in the set of supported revocation reasons. |
190 | UnsupportedRevocationReason, |
191 | |
192 | /// The CRL is partitioned by revocation reasons. |
193 | UnsupportedRevocationReasonsPartitioning, |
194 | |
195 | /// The signature algorithm for a signature over a CRL is not in the set of supported |
196 | /// signature algorithms given. |
197 | UnsupportedCrlSignatureAlgorithm, |
198 | |
199 | /// The signature algorithm for a signature is not in the set of supported |
200 | /// signature algorithms given. |
201 | UnsupportedSignatureAlgorithm, |
202 | |
203 | /// The CRL signature's algorithm does not match the algorithm of the issuer |
204 | /// public key it is being validated for. This may be because the public key |
205 | /// algorithm's OID isn't recognized (e.g. DSA), or the public key |
206 | /// algorithm's parameters don't match the supported parameters for that |
207 | /// algorithm (e.g. ECC keys for unsupported curves), or the public key |
208 | /// algorithm and the signature algorithm simply don't match (e.g. |
209 | /// verifying an RSA signature with an ECC public key). |
210 | UnsupportedCrlSignatureAlgorithmForPublicKey, |
211 | |
212 | /// The signature's algorithm does not match the algorithm of the public |
213 | /// key it is being validated for. This may be because the public key |
214 | /// algorithm's OID isn't recognized (e.g. DSA), or the public key |
215 | /// algorithm's parameters don't match the supported parameters for that |
216 | /// algorithm (e.g. ECC keys for unsupported curves), or the public key |
217 | /// algorithm and the signature algorithm simply don't match (e.g. |
218 | /// verifying an RSA signature with an ECC public key). |
219 | UnsupportedSignatureAlgorithmForPublicKey, |
220 | } |
221 | |
222 | impl Error { |
223 | // Compare the Error with the new error by rank, returning the higher rank of the two as |
224 | // the most specific error. |
225 | pub(crate) fn most_specific(self, new: Self) -> Self { |
226 | // Assign an error a numeric value ranking it by specificity. |
227 | if self.rank() >= new.rank() { self } else { new } |
228 | } |
229 | |
230 | // Return a numeric indication of how specific the error is, where an error with a higher rank |
231 | // is considered more useful to an end user than an error with a lower rank. This is used by |
232 | // Error::most_specific to compare two errors in order to return which is more specific. |
233 | #[allow (clippy::as_conversions)] // We won't exceed u32 errors. |
234 | pub(crate) fn rank(&self) -> u32 { |
235 | match &self { |
236 | // Errors related to certificate validity |
237 | Self::CertNotValidYet { .. } | Self::CertExpired { .. } => 290, |
238 | Self::CertNotValidForName(_) => 280, |
239 | Self::CertRevoked | Self::UnknownRevocationStatus | Self::CrlExpired { .. } => 270, |
240 | Self::InvalidCrlSignatureForPublicKey | Self::InvalidSignatureForPublicKey => 260, |
241 | Self::SignatureAlgorithmMismatch => 250, |
242 | Self::RequiredEkuNotFound => 240, |
243 | Self::NameConstraintViolation => 230, |
244 | Self::PathLenConstraintViolated => 220, |
245 | Self::CaUsedAsEndEntity | Self::EndEntityUsedAsCa => 210, |
246 | Self::IssuerNotCrlSigner => 200, |
247 | |
248 | // Errors related to supported features used in an invalid way. |
249 | Self::InvalidCertValidity => 190, |
250 | Self::InvalidNetworkMaskConstraint => 180, |
251 | Self::InvalidSerialNumber => 170, |
252 | Self::InvalidCrlNumber => 160, |
253 | |
254 | // Errors related to unsupported features. |
255 | Self::UnsupportedCrlSignatureAlgorithmForPublicKey |
256 | | Self::UnsupportedSignatureAlgorithmForPublicKey => 150, |
257 | Self::UnsupportedCrlSignatureAlgorithm | Self::UnsupportedSignatureAlgorithm => 140, |
258 | Self::UnsupportedCriticalExtension => 130, |
259 | Self::UnsupportedCertVersion => 130, |
260 | Self::UnsupportedCrlVersion => 120, |
261 | Self::UnsupportedDeltaCrl => 110, |
262 | Self::UnsupportedIndirectCrl => 100, |
263 | Self::UnsupportedNameType => 95, |
264 | Self::UnsupportedRevocationReason => 90, |
265 | Self::UnsupportedRevocationReasonsPartitioning => 80, |
266 | Self::UnsupportedCrlIssuingDistributionPoint => 70, |
267 | Self::MaximumPathDepthExceeded => 61, |
268 | |
269 | // Errors related to malformed data. |
270 | Self::MalformedDnsIdentifier => 60, |
271 | Self::MalformedNameConstraint => 50, |
272 | Self::MalformedExtensions | Self::TrailingData(_) => 40, |
273 | Self::ExtensionValueInvalid => 30, |
274 | |
275 | // Generic DER errors. |
276 | Self::BadDerTime => 20, |
277 | Self::BadDer => 10, |
278 | |
279 | // Special case errors - not subject to ranking. |
280 | Self::MaximumSignatureChecksExceeded => 0, |
281 | Self::MaximumPathBuildCallsExceeded => 0, |
282 | Self::MaximumNameConstraintComparisonsExceeded => 0, |
283 | |
284 | // Default catch all error - should be renamed in the future. |
285 | Self::UnknownIssuer => 0, |
286 | } |
287 | } |
288 | |
289 | /// Returns true for errors that should be considered fatal during path building. Errors of |
290 | /// this class should halt any further path building and be returned immediately. |
291 | #[inline ] |
292 | pub(crate) fn is_fatal(&self) -> bool { |
293 | matches!( |
294 | self, |
295 | Self::MaximumSignatureChecksExceeded |
296 | | Self::MaximumPathBuildCallsExceeded |
297 | | Self::MaximumNameConstraintComparisonsExceeded |
298 | ) |
299 | } |
300 | } |
301 | |
302 | impl From<Error> for ControlFlow<Error, Error> { |
303 | fn from(value: Error) -> Self { |
304 | match value { |
305 | // If an error is fatal, we've exhausted the potential for continued search. |
306 | err: Error if err.is_fatal() => Self::Break(err), |
307 | // Otherwise we've rejected one candidate chain, but may continue to search for others. |
308 | err: Error => Self::Continue(err), |
309 | } |
310 | } |
311 | } |
312 | |
313 | impl fmt::Display for Error { |
314 | fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { |
315 | write!(f, " {:?}" , self) |
316 | } |
317 | } |
318 | |
319 | #[cfg (feature = "std" )] |
320 | impl ::std::error::Error for Error {} |
321 | |
322 | /// Additional context for the `CertNotValidForName` error variant. |
323 | /// |
324 | /// The contents of this type depend on whether the `alloc` feature is enabled. |
325 | #[derive (Clone, Debug, PartialEq, Eq)] |
326 | pub struct InvalidNameContext { |
327 | /// Expected server name. |
328 | #[cfg (feature = "alloc" )] |
329 | pub expected: ServerName<'static>, |
330 | /// The names presented in the end entity certificate. |
331 | /// |
332 | /// These are the subject names as present in the leaf certificate and may contain DNS names |
333 | /// with or without a wildcard label as well as IP address names. |
334 | #[cfg (feature = "alloc" )] |
335 | pub presented: Vec<String>, |
336 | } |
337 | |
338 | /// Trailing data was found while parsing DER-encoded input for the named type. |
339 | #[allow (missing_docs)] |
340 | #[non_exhaustive ] |
341 | #[derive (Clone, Copy, Debug, Eq, PartialEq)] |
342 | pub enum DerTypeId { |
343 | BitString, |
344 | Bool, |
345 | Certificate, |
346 | CertificateExtensions, |
347 | CertificateTbsCertificate, |
348 | CertRevocationList, |
349 | CertRevocationListExtension, |
350 | CrlDistributionPoint, |
351 | CommonNameInner, |
352 | CommonNameOuter, |
353 | DistributionPointName, |
354 | Extension, |
355 | GeneralName, |
356 | RevocationReason, |
357 | Signature, |
358 | SignatureAlgorithm, |
359 | SignedData, |
360 | SubjectPublicKeyInfo, |
361 | Time, |
362 | TrustAnchorV1, |
363 | TrustAnchorV1TbsCertificate, |
364 | U8, |
365 | RevokedCertificate, |
366 | RevokedCertificateExtension, |
367 | RevokedCertEntry, |
368 | IssuingDistributionPoint, |
369 | } |
370 | |