xref: /aosp_15_r20/external/libevent/sample/openssl_hostname_validation.c (revision 663afb9b963571284e0f0a60f257164ab54f64bf)
1*663afb9bSAndroid Build Coastguard Worker /* Obtained from: https://github.com/iSECPartners/ssl-conservatory */
2*663afb9bSAndroid Build Coastguard Worker 
3*663afb9bSAndroid Build Coastguard Worker /*
4*663afb9bSAndroid Build Coastguard Worker Copyright (C) 2012, iSEC Partners.
5*663afb9bSAndroid Build Coastguard Worker 
6*663afb9bSAndroid Build Coastguard Worker Permission is hereby granted, free of charge, to any person obtaining a copy of
7*663afb9bSAndroid Build Coastguard Worker this software and associated documentation files (the "Software"), to deal in
8*663afb9bSAndroid Build Coastguard Worker the Software without restriction, including without limitation the rights to
9*663afb9bSAndroid Build Coastguard Worker use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies
10*663afb9bSAndroid Build Coastguard Worker of the Software, and to permit persons to whom the Software is furnished to do
11*663afb9bSAndroid Build Coastguard Worker so, subject to the following conditions:
12*663afb9bSAndroid Build Coastguard Worker 
13*663afb9bSAndroid Build Coastguard Worker The above copyright notice and this permission notice shall be included in all
14*663afb9bSAndroid Build Coastguard Worker copies or substantial portions of the Software.
15*663afb9bSAndroid Build Coastguard Worker 
16*663afb9bSAndroid Build Coastguard Worker THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
17*663afb9bSAndroid Build Coastguard Worker IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
18*663afb9bSAndroid Build Coastguard Worker FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
19*663afb9bSAndroid Build Coastguard Worker AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
20*663afb9bSAndroid Build Coastguard Worker LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
21*663afb9bSAndroid Build Coastguard Worker OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
22*663afb9bSAndroid Build Coastguard Worker SOFTWARE.
23*663afb9bSAndroid Build Coastguard Worker  */
24*663afb9bSAndroid Build Coastguard Worker 
25*663afb9bSAndroid Build Coastguard Worker /*
26*663afb9bSAndroid Build Coastguard Worker  * Helper functions to perform basic hostname validation using OpenSSL.
27*663afb9bSAndroid Build Coastguard Worker  *
28*663afb9bSAndroid Build Coastguard Worker  * Please read "everything-you-wanted-to-know-about-openssl.pdf" before
29*663afb9bSAndroid Build Coastguard Worker  * attempting to use this code. This whitepaper describes how the code works,
30*663afb9bSAndroid Build Coastguard Worker  * how it should be used, and what its limitations are.
31*663afb9bSAndroid Build Coastguard Worker  *
32*663afb9bSAndroid Build Coastguard Worker  * Author:  Alban Diquet
33*663afb9bSAndroid Build Coastguard Worker  * License: See LICENSE
34*663afb9bSAndroid Build Coastguard Worker  *
35*663afb9bSAndroid Build Coastguard Worker  */
36*663afb9bSAndroid Build Coastguard Worker 
37*663afb9bSAndroid Build Coastguard Worker // Get rid of OSX 10.7 and greater deprecation warnings.
38*663afb9bSAndroid Build Coastguard Worker #if defined(__APPLE__) && defined(__clang__)
39*663afb9bSAndroid Build Coastguard Worker #pragma clang diagnostic ignored "-Wdeprecated-declarations"
40*663afb9bSAndroid Build Coastguard Worker #endif
41*663afb9bSAndroid Build Coastguard Worker 
42*663afb9bSAndroid Build Coastguard Worker #include <openssl/x509v3.h>
43*663afb9bSAndroid Build Coastguard Worker #include <openssl/ssl.h>
44*663afb9bSAndroid Build Coastguard Worker #include <string.h>
45*663afb9bSAndroid Build Coastguard Worker 
46*663afb9bSAndroid Build Coastguard Worker #include "openssl_hostname_validation.h"
47*663afb9bSAndroid Build Coastguard Worker #include "hostcheck.h"
48*663afb9bSAndroid Build Coastguard Worker 
49*663afb9bSAndroid Build Coastguard Worker #define HOSTNAME_MAX_SIZE 255
50*663afb9bSAndroid Build Coastguard Worker 
51*663afb9bSAndroid Build Coastguard Worker #if (OPENSSL_VERSION_NUMBER < 0x10100000L) || \
52*663afb9bSAndroid Build Coastguard Worker 	(defined(LIBRESSL_VERSION_NUMBER) && LIBRESSL_VERSION_NUMBER < 0x20700000L)
53*663afb9bSAndroid Build Coastguard Worker #define ASN1_STRING_get0_data ASN1_STRING_data
54*663afb9bSAndroid Build Coastguard Worker #endif
55*663afb9bSAndroid Build Coastguard Worker 
56*663afb9bSAndroid Build Coastguard Worker /**
57*663afb9bSAndroid Build Coastguard Worker * Tries to find a match for hostname in the certificate's Common Name field.
58*663afb9bSAndroid Build Coastguard Worker *
59*663afb9bSAndroid Build Coastguard Worker * Returns MatchFound if a match was found.
60*663afb9bSAndroid Build Coastguard Worker * Returns MatchNotFound if no matches were found.
61*663afb9bSAndroid Build Coastguard Worker * Returns MalformedCertificate if the Common Name had a NUL character embedded in it.
62*663afb9bSAndroid Build Coastguard Worker * Returns Error if the Common Name could not be extracted.
63*663afb9bSAndroid Build Coastguard Worker */
matches_common_name(const char * hostname,const X509 * server_cert)64*663afb9bSAndroid Build Coastguard Worker static HostnameValidationResult matches_common_name(const char *hostname, const X509 *server_cert) {
65*663afb9bSAndroid Build Coastguard Worker         int common_name_loc = -1;
66*663afb9bSAndroid Build Coastguard Worker         X509_NAME_ENTRY *common_name_entry = NULL;
67*663afb9bSAndroid Build Coastguard Worker         ASN1_STRING *common_name_asn1 = NULL;
68*663afb9bSAndroid Build Coastguard Worker         const char *common_name_str = NULL;
69*663afb9bSAndroid Build Coastguard Worker 
70*663afb9bSAndroid Build Coastguard Worker         // Find the position of the CN field in the Subject field of the certificate
71*663afb9bSAndroid Build Coastguard Worker         common_name_loc = X509_NAME_get_index_by_NID(X509_get_subject_name((X509 *) server_cert), NID_commonName, -1);
72*663afb9bSAndroid Build Coastguard Worker         if (common_name_loc < 0) {
73*663afb9bSAndroid Build Coastguard Worker                 return Error;
74*663afb9bSAndroid Build Coastguard Worker         }
75*663afb9bSAndroid Build Coastguard Worker 
76*663afb9bSAndroid Build Coastguard Worker         // Extract the CN field
77*663afb9bSAndroid Build Coastguard Worker         common_name_entry = X509_NAME_get_entry(X509_get_subject_name((X509 *) server_cert), common_name_loc);
78*663afb9bSAndroid Build Coastguard Worker         if (common_name_entry == NULL) {
79*663afb9bSAndroid Build Coastguard Worker                 return Error;
80*663afb9bSAndroid Build Coastguard Worker         }
81*663afb9bSAndroid Build Coastguard Worker 
82*663afb9bSAndroid Build Coastguard Worker         // Convert the CN field to a C string
83*663afb9bSAndroid Build Coastguard Worker         common_name_asn1 = X509_NAME_ENTRY_get_data(common_name_entry);
84*663afb9bSAndroid Build Coastguard Worker         if (common_name_asn1 == NULL) {
85*663afb9bSAndroid Build Coastguard Worker                 return Error;
86*663afb9bSAndroid Build Coastguard Worker         }
87*663afb9bSAndroid Build Coastguard Worker         common_name_str = (char *) ASN1_STRING_get0_data(common_name_asn1);
88*663afb9bSAndroid Build Coastguard Worker 
89*663afb9bSAndroid Build Coastguard Worker         // Make sure there isn't an embedded NUL character in the CN
90*663afb9bSAndroid Build Coastguard Worker         if ((size_t)ASN1_STRING_length(common_name_asn1) != strlen(common_name_str)) {
91*663afb9bSAndroid Build Coastguard Worker                 return MalformedCertificate;
92*663afb9bSAndroid Build Coastguard Worker         }
93*663afb9bSAndroid Build Coastguard Worker 
94*663afb9bSAndroid Build Coastguard Worker         // Compare expected hostname with the CN
95*663afb9bSAndroid Build Coastguard Worker         if (Curl_cert_hostcheck(common_name_str, hostname) == CURL_HOST_MATCH) {
96*663afb9bSAndroid Build Coastguard Worker                 return MatchFound;
97*663afb9bSAndroid Build Coastguard Worker         }
98*663afb9bSAndroid Build Coastguard Worker         else {
99*663afb9bSAndroid Build Coastguard Worker                 return MatchNotFound;
100*663afb9bSAndroid Build Coastguard Worker         }
101*663afb9bSAndroid Build Coastguard Worker }
102*663afb9bSAndroid Build Coastguard Worker 
103*663afb9bSAndroid Build Coastguard Worker 
104*663afb9bSAndroid Build Coastguard Worker /**
105*663afb9bSAndroid Build Coastguard Worker * Tries to find a match for hostname in the certificate's Subject Alternative Name extension.
106*663afb9bSAndroid Build Coastguard Worker *
107*663afb9bSAndroid Build Coastguard Worker * Returns MatchFound if a match was found.
108*663afb9bSAndroid Build Coastguard Worker * Returns MatchNotFound if no matches were found.
109*663afb9bSAndroid Build Coastguard Worker * Returns MalformedCertificate if any of the hostnames had a NUL character embedded in it.
110*663afb9bSAndroid Build Coastguard Worker * Returns NoSANPresent if the SAN extension was not present in the certificate.
111*663afb9bSAndroid Build Coastguard Worker */
matches_subject_alternative_name(const char * hostname,const X509 * server_cert)112*663afb9bSAndroid Build Coastguard Worker static HostnameValidationResult matches_subject_alternative_name(const char *hostname, const X509 *server_cert) {
113*663afb9bSAndroid Build Coastguard Worker         HostnameValidationResult result = MatchNotFound;
114*663afb9bSAndroid Build Coastguard Worker         int i;
115*663afb9bSAndroid Build Coastguard Worker         int san_names_nb = -1;
116*663afb9bSAndroid Build Coastguard Worker         STACK_OF(GENERAL_NAME) *san_names = NULL;
117*663afb9bSAndroid Build Coastguard Worker 
118*663afb9bSAndroid Build Coastguard Worker         // Try to extract the names within the SAN extension from the certificate
119*663afb9bSAndroid Build Coastguard Worker         san_names = X509_get_ext_d2i((X509 *) server_cert, NID_subject_alt_name, NULL, NULL);
120*663afb9bSAndroid Build Coastguard Worker         if (san_names == NULL) {
121*663afb9bSAndroid Build Coastguard Worker                 return NoSANPresent;
122*663afb9bSAndroid Build Coastguard Worker         }
123*663afb9bSAndroid Build Coastguard Worker         san_names_nb = sk_GENERAL_NAME_num(san_names);
124*663afb9bSAndroid Build Coastguard Worker 
125*663afb9bSAndroid Build Coastguard Worker         // Check each name within the extension
126*663afb9bSAndroid Build Coastguard Worker         for (i=0; i<san_names_nb; i++) {
127*663afb9bSAndroid Build Coastguard Worker                 const GENERAL_NAME *current_name = sk_GENERAL_NAME_value(san_names, i);
128*663afb9bSAndroid Build Coastguard Worker 
129*663afb9bSAndroid Build Coastguard Worker                 if (current_name->type == GEN_DNS) {
130*663afb9bSAndroid Build Coastguard Worker                         // Current name is a DNS name, let's check it
131*663afb9bSAndroid Build Coastguard Worker                         const char *dns_name = (char *) ASN1_STRING_get0_data(current_name->d.dNSName);
132*663afb9bSAndroid Build Coastguard Worker 
133*663afb9bSAndroid Build Coastguard Worker                         // Make sure there isn't an embedded NUL character in the DNS name
134*663afb9bSAndroid Build Coastguard Worker                         if ((size_t)ASN1_STRING_length(current_name->d.dNSName) != strlen(dns_name)) {
135*663afb9bSAndroid Build Coastguard Worker                                 result = MalformedCertificate;
136*663afb9bSAndroid Build Coastguard Worker                                 break;
137*663afb9bSAndroid Build Coastguard Worker                         }
138*663afb9bSAndroid Build Coastguard Worker                         else { // Compare expected hostname with the DNS name
139*663afb9bSAndroid Build Coastguard Worker                                 if (Curl_cert_hostcheck(dns_name, hostname)
140*663afb9bSAndroid Build Coastguard Worker                                     == CURL_HOST_MATCH) {
141*663afb9bSAndroid Build Coastguard Worker                                         result = MatchFound;
142*663afb9bSAndroid Build Coastguard Worker                                         break;
143*663afb9bSAndroid Build Coastguard Worker                                 }
144*663afb9bSAndroid Build Coastguard Worker                         }
145*663afb9bSAndroid Build Coastguard Worker                 }
146*663afb9bSAndroid Build Coastguard Worker         }
147*663afb9bSAndroid Build Coastguard Worker         sk_GENERAL_NAME_pop_free(san_names, GENERAL_NAME_free);
148*663afb9bSAndroid Build Coastguard Worker 
149*663afb9bSAndroid Build Coastguard Worker         return result;
150*663afb9bSAndroid Build Coastguard Worker }
151*663afb9bSAndroid Build Coastguard Worker 
152*663afb9bSAndroid Build Coastguard Worker 
153*663afb9bSAndroid Build Coastguard Worker /**
154*663afb9bSAndroid Build Coastguard Worker * Validates the server's identity by looking for the expected hostname in the
155*663afb9bSAndroid Build Coastguard Worker * server's certificate. As described in RFC 6125, it first tries to find a match
156*663afb9bSAndroid Build Coastguard Worker * in the Subject Alternative Name extension. If the extension is not present in
157*663afb9bSAndroid Build Coastguard Worker * the certificate, it checks the Common Name instead.
158*663afb9bSAndroid Build Coastguard Worker *
159*663afb9bSAndroid Build Coastguard Worker * Returns MatchFound if a match was found.
160*663afb9bSAndroid Build Coastguard Worker * Returns MatchNotFound if no matches were found.
161*663afb9bSAndroid Build Coastguard Worker * Returns MalformedCertificate if any of the hostnames had a NUL character embedded in it.
162*663afb9bSAndroid Build Coastguard Worker * Returns Error if there was an error.
163*663afb9bSAndroid Build Coastguard Worker */
validate_hostname(const char * hostname,const X509 * server_cert)164*663afb9bSAndroid Build Coastguard Worker HostnameValidationResult validate_hostname(const char *hostname, const X509 *server_cert) {
165*663afb9bSAndroid Build Coastguard Worker         HostnameValidationResult result;
166*663afb9bSAndroid Build Coastguard Worker 
167*663afb9bSAndroid Build Coastguard Worker         if((hostname == NULL) || (server_cert == NULL))
168*663afb9bSAndroid Build Coastguard Worker                 return Error;
169*663afb9bSAndroid Build Coastguard Worker 
170*663afb9bSAndroid Build Coastguard Worker         // First try the Subject Alternative Names extension
171*663afb9bSAndroid Build Coastguard Worker         result = matches_subject_alternative_name(hostname, server_cert);
172*663afb9bSAndroid Build Coastguard Worker         if (result == NoSANPresent) {
173*663afb9bSAndroid Build Coastguard Worker                 // Extension was not found: try the Common Name
174*663afb9bSAndroid Build Coastguard Worker                 result = matches_common_name(hostname, server_cert);
175*663afb9bSAndroid Build Coastguard Worker         }
176*663afb9bSAndroid Build Coastguard Worker 
177*663afb9bSAndroid Build Coastguard Worker         return result;
178*663afb9bSAndroid Build Coastguard Worker }
179