Move top()'s checks on child to child()
This commit is contained in:
parent
784aee3366
commit
6e786747fb
1 changed files with 25 additions and 23 deletions
|
@ -2015,17 +2015,8 @@ static int x509_crt_verify_top(
|
||||||
uint32_t ca_flags = 0;
|
uint32_t ca_flags = 0;
|
||||||
|
|
||||||
(void) self_cnt;
|
(void) self_cnt;
|
||||||
|
|
||||||
/* this wasn't checked by find_parent() */
|
|
||||||
if( x509_profile_check_key( profile, child->sig_pk, &trust_ca->pk ) != 0 )
|
|
||||||
*flags |= MBEDTLS_X509_BADCERT_BAD_KEY;
|
|
||||||
|
|
||||||
/* Check trusted CA's CRL for the chain's top crt */
|
|
||||||
#if defined(MBEDTLS_X509_CRL_PARSE_C)
|
|
||||||
*flags |= x509_crt_verifycrl( child, trust_ca, ca_crl, profile );
|
|
||||||
#else
|
|
||||||
((void) ca_crl);
|
((void) ca_crl);
|
||||||
#endif
|
(void) profile;
|
||||||
|
|
||||||
/* Check time-validity of the parent */
|
/* Check time-validity of the parent */
|
||||||
if( mbedtls_x509_time_is_past( &trust_ca->valid_to ) )
|
if( mbedtls_x509_time_is_past( &trust_ca->valid_to ) )
|
||||||
|
@ -2071,6 +2062,7 @@ static int x509_crt_verify_child(
|
||||||
int ret;
|
int ret;
|
||||||
mbedtls_x509_crt *parent;
|
mbedtls_x509_crt *parent;
|
||||||
uint32_t parent_flags = 0;
|
uint32_t parent_flags = 0;
|
||||||
|
int parent_is_trusted = 0;
|
||||||
|
|
||||||
if( mbedtls_x509_time_is_past( &child->valid_to ) )
|
if( mbedtls_x509_time_is_past( &child->valid_to ) )
|
||||||
*flags |= MBEDTLS_X509_BADCERT_EXPIRED;
|
*flags |= MBEDTLS_X509_BADCERT_EXPIRED;
|
||||||
|
@ -2097,18 +2089,19 @@ static int x509_crt_verify_child(
|
||||||
goto callback;
|
goto callback;
|
||||||
}
|
}
|
||||||
|
|
||||||
return( x509_crt_verify_top( child, parent, ca_crl, profile,
|
parent_is_trusted = 1;
|
||||||
path_cnt, self_cnt, flags, f_vrfy, p_vrfy ) );
|
|
||||||
}
|
}
|
||||||
|
else
|
||||||
/* Look for a parent upwards the chain */
|
|
||||||
parent = x509_crt_find_parent( child, child->next, 0, path_cnt, 0 );
|
|
||||||
|
|
||||||
/* No parent at all? We're done here */
|
|
||||||
if( parent == NULL )
|
|
||||||
{
|
{
|
||||||
*flags |= MBEDTLS_X509_BADCERT_NOT_TRUSTED;
|
/* Look for a parent upwards the chain */
|
||||||
goto callback;
|
parent = x509_crt_find_parent( child, child->next, 0, path_cnt, 0 );
|
||||||
|
|
||||||
|
/* No parent at all? We're done here */
|
||||||
|
if( parent == NULL )
|
||||||
|
{
|
||||||
|
*flags |= MBEDTLS_X509_BADCERT_NOT_TRUSTED;
|
||||||
|
goto callback;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/* Counting intermediate self-issued (not necessarily self-signed) certs
|
/* Counting intermediate self-issued (not necessarily self-signed) certs
|
||||||
|
@ -2116,14 +2109,17 @@ static int x509_crt_verify_child(
|
||||||
if( ( path_cnt != 0 ) && x509_name_cmp( &child->issuer, &child->subject ) == 0 )
|
if( ( path_cnt != 0 ) && x509_name_cmp( &child->issuer, &child->subject ) == 0 )
|
||||||
self_cnt++;
|
self_cnt++;
|
||||||
|
|
||||||
/* path_cnt is 0 for the first intermediate CA */
|
/* path_cnt is 0 for the first intermediate CA,
|
||||||
if( 1 + path_cnt > MBEDTLS_X509_MAX_INTERMEDIATE_CA )
|
* and if parent is trusted it's not an intermediate CA */
|
||||||
|
if( ! parent_is_trusted &&
|
||||||
|
1 + path_cnt > MBEDTLS_X509_MAX_INTERMEDIATE_CA )
|
||||||
{
|
{
|
||||||
/* return immediately as the goal is to avoid unbounded recursion */
|
/* return immediately as the goal is to avoid unbounded recursion */
|
||||||
return( MBEDTLS_ERR_X509_FATAL_ERROR );
|
return( MBEDTLS_ERR_X509_FATAL_ERROR );
|
||||||
}
|
}
|
||||||
|
|
||||||
if( x509_crt_check_signature( child, parent ) != 0 )
|
/* if parent is trusted, the signature was checked by find_parent() */
|
||||||
|
if( ! parent_is_trusted && x509_crt_check_signature( child, parent ) != 0 )
|
||||||
*flags |= MBEDTLS_X509_BADCERT_NOT_TRUSTED;
|
*flags |= MBEDTLS_X509_BADCERT_NOT_TRUSTED;
|
||||||
|
|
||||||
if( x509_profile_check_key( profile, child->sig_pk, &parent->pk ) != 0 )
|
if( x509_profile_check_key( profile, child->sig_pk, &parent->pk ) != 0 )
|
||||||
|
@ -2134,6 +2130,12 @@ static int x509_crt_verify_child(
|
||||||
*flags |= x509_crt_verifycrl(child, parent, ca_crl, profile );
|
*flags |= x509_crt_verifycrl(child, parent, ca_crl, profile );
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
if( parent_is_trusted )
|
||||||
|
{
|
||||||
|
return( x509_crt_verify_top( child, parent, ca_crl, profile,
|
||||||
|
path_cnt, self_cnt, flags, f_vrfy, p_vrfy ) );
|
||||||
|
}
|
||||||
|
|
||||||
/* verify the rest of the chain starting from parent */
|
/* verify the rest of the chain starting from parent */
|
||||||
ret = x509_crt_verify_child( parent, trust_ca, ca_crl,
|
ret = x509_crt_verify_child( parent, trust_ca, ca_crl,
|
||||||
profile, path_cnt + 1, self_cnt, &parent_flags,
|
profile, path_cnt + 1, self_cnt, &parent_flags,
|
||||||
|
|
Loading…
Reference in a new issue