1use alloc::vec::Vec;
2use core::fmt;
3
4use pki_types::{
5 CertificateDer, ServerName, SignatureVerificationAlgorithm, SubjectPublicKeyInfoDer, UnixTime,
6};
7
8use super::anchors::RootCertStore;
9use super::pki_error;
10use crate::enums::SignatureScheme;
11use crate::error::{Error, PeerMisbehaved};
12use crate::verify::{DigitallySignedStruct, HandshakeSignatureValid};
13
14#[allow(dead_code)]
26pub fn verify_server_cert_signed_by_trust_anchor(
27 cert: &ParsedCertificate<'_>,
28 roots: &RootCertStore,
29 intermediates: &[CertificateDer<'_>],
30 now: UnixTime,
31 supported_algs: &[&dyn SignatureVerificationAlgorithm],
32) -> Result<(), Error> {
33 verify_server_cert_signed_by_trust_anchor_impl(
34 cert,
35 roots,
36 intermediates,
37 None, now,
39 supported_algs,
40 )
41}
42
43pub fn verify_server_name(
48 cert: &ParsedCertificate<'_>,
49 server_name: &ServerName<'_>,
50) -> Result<(), Error> {
51 cert.0
52 .verify_is_valid_for_subject_name(server_name)
53 .map_err(pki_error)
54}
55
56#[derive(Clone, Copy)]
59#[allow(unreachable_pub)]
60pub struct WebPkiSupportedAlgorithms {
61 pub all: &'static [&'static dyn SignatureVerificationAlgorithm],
67
68 pub mapping: &'static [(
80 SignatureScheme,
81 &'static [&'static dyn SignatureVerificationAlgorithm],
82 )],
83}
84
85impl WebPkiSupportedAlgorithms {
86 pub fn supported_schemes(&self) -> Vec<SignatureScheme> {
88 self.mapping
89 .iter()
90 .map(|item| item.0)
91 .collect()
92 }
93
94 fn convert_scheme(
96 &self,
97 scheme: SignatureScheme,
98 ) -> Result<&[&'static dyn SignatureVerificationAlgorithm], Error> {
99 self.mapping
100 .iter()
101 .filter_map(|item| if item.0 == scheme { Some(item.1) } else { None })
102 .next()
103 .ok_or_else(|| PeerMisbehaved::SignedHandshakeWithUnadvertisedSigScheme.into())
104 }
105
106 pub fn fips(&self) -> bool {
108 self.all.iter().all(|alg| alg.fips())
109 && self
110 .mapping
111 .iter()
112 .all(|item| item.1.iter().all(|alg| alg.fips()))
113 }
114}
115
116impl fmt::Debug for WebPkiSupportedAlgorithms {
117 fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
118 write!(f, "WebPkiSupportedAlgorithms {{ all: [ .. ], mapping: ")?;
119 f.debug_list()
120 .entries(self.mapping.iter().map(|item| item.0))
121 .finish()?;
122 write!(f, " }}")
123 }
124}
125
126pub struct ParsedCertificate<'a>(pub(crate) webpki::EndEntityCert<'a>);
130
131impl<'a> ParsedCertificate<'a> {
132 pub fn subject_public_key_info(&self) -> SubjectPublicKeyInfoDer<'static> {
134 self.0.subject_public_key_info()
135 }
136}
137
138impl<'a> TryFrom<&'a CertificateDer<'a>> for ParsedCertificate<'a> {
139 type Error = Error;
140 fn try_from(value: &'a CertificateDer<'a>) -> Result<Self, Self::Error> {
141 webpki::EndEntityCert::try_from(value)
142 .map_err(pki_error)
143 .map(ParsedCertificate)
144 }
145}
146
147pub fn verify_tls12_signature(
156 message: &[u8],
157 cert: &CertificateDer<'_>,
158 dss: &DigitallySignedStruct,
159 supported_schemes: &WebPkiSupportedAlgorithms,
160) -> Result<HandshakeSignatureValid, Error> {
161 let possible_algs = supported_schemes.convert_scheme(dss.scheme)?;
162 let cert = webpki::EndEntityCert::try_from(cert).map_err(pki_error)?;
163
164 for alg in possible_algs {
165 match cert.verify_signature(*alg, message, dss.signature()) {
166 Err(webpki::Error::UnsupportedSignatureAlgorithmForPublicKey) => continue,
167 Err(e) => return Err(pki_error(e)),
168 Ok(()) => return Ok(HandshakeSignatureValid::assertion()),
169 }
170 }
171
172 Err(pki_error(
173 webpki::Error::UnsupportedSignatureAlgorithmForPublicKey,
174 ))
175}
176
177pub fn verify_tls13_signature(
184 msg: &[u8],
185 cert: &CertificateDer<'_>,
186 dss: &DigitallySignedStruct,
187 supported_schemes: &WebPkiSupportedAlgorithms,
188) -> Result<HandshakeSignatureValid, Error> {
189 if !dss.scheme.supported_in_tls13() {
190 return Err(PeerMisbehaved::SignedHandshakeWithUnadvertisedSigScheme.into());
191 }
192
193 let alg = supported_schemes.convert_scheme(dss.scheme)?[0];
194
195 let cert = webpki::EndEntityCert::try_from(cert).map_err(pki_error)?;
196
197 cert.verify_signature(alg, msg, dss.signature())
198 .map_err(pki_error)
199 .map(|_| HandshakeSignatureValid::assertion())
200}
201
202pub(crate) fn verify_server_cert_signed_by_trust_anchor_impl(
216 cert: &ParsedCertificate<'_>,
217 roots: &RootCertStore,
218 intermediates: &[CertificateDer<'_>],
219 revocation: Option<webpki::RevocationOptions<'_>>,
220 now: UnixTime,
221 supported_algs: &[&dyn SignatureVerificationAlgorithm],
222) -> Result<(), Error> {
223 let result = cert.0.verify_for_usage(
224 supported_algs,
225 &roots.roots,
226 intermediates,
227 now,
228 webpki::KeyUsage::server_auth(),
229 revocation,
230 None,
231 );
232 match result {
233 Ok(_) => Ok(()),
234 Err(e) => Err(pki_error(e)),
235 }
236}
237
238#[cfg(test)]
239mod tests {
240 use std::format;
241
242 use super::*;
243
244 #[test]
245 fn certificate_debug() {
246 assert_eq!(
247 "CertificateDer(0x6162)",
248 format!("{:?}", CertificateDer::from(b"ab".to_vec()))
249 );
250 }
251
252 #[cfg(feature = "ring")]
253 #[test]
254 fn webpki_supported_algorithms_is_debug() {
255 assert_eq!(
256 "WebPkiSupportedAlgorithms { all: [ .. ], mapping: [ECDSA_NISTP384_SHA384, ECDSA_NISTP256_SHA256, ED25519, RSA_PSS_SHA512, RSA_PSS_SHA384, RSA_PSS_SHA256, RSA_PKCS1_SHA512, RSA_PKCS1_SHA384, RSA_PKCS1_SHA256] }",
257 format!("{:?}", crate::crypto::ring::default_provider().signature_verification_algorithms)
258 );
259 }
260}