summaryrefslogtreecommitdiffstats
blob: 872717b74f45c8b0126fda5b725e8323c282824b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
/*
 * Copyright (c) 2010-2016 Isode Limited.
 * All rights reserved.
 * See the COPYING file for more information.
 */

#include <Swiften/TLS/ServerIdentityVerifier.h>

#include <boost/algorithm/string.hpp>

#include <Swiften/Base/foreach.h>
#include <Swiften/IDN/IDNConverter.h>

namespace Swift {

ServerIdentityVerifier::ServerIdentityVerifier(const JID& jid, IDNConverter* idnConverter) : domainValid(false) {
    domain = jid.getDomain();
    boost::optional<std::string> domainResult = idnConverter->getIDNAEncoded(domain);
    if (!!domainResult) {
        encodedDomain = *domainResult;
        domainValid = true;
    }
}

bool ServerIdentityVerifier::certificateVerifies(Certificate::ref certificate) {
    bool hasSAN = false;

    if (certificate == nullptr) {
        return false;
    }
    // DNS names
    std::vector<std::string> dnsNames = certificate->getDNSNames();
    foreach (const std::string& dnsName, dnsNames) {
        if (matchesDomain(dnsName)) {
            return true;
        }
    }
    hasSAN |= !dnsNames.empty();

    // SRV names
    std::vector<std::string> srvNames = certificate->getSRVNames();
    foreach (const std::string& srvName, srvNames) {
        // Only match SRV names that begin with the service; this isn't required per
        // spec, but we're being purist about this.
        if (boost::starts_with(srvName, "_xmpp-client.") && matchesDomain(srvName.substr(std::string("_xmpp-client.").size(), srvName.npos))) {
            return true;
        }
    }
    hasSAN |= !srvNames.empty();

    // XmppAddr
    std::vector<std::string> xmppAddresses = certificate->getXMPPAddresses();
    foreach (const std::string& xmppAddress, xmppAddresses) {
        if (matchesAddress(xmppAddress)) {
            return true;
        }
    }
    hasSAN |= !xmppAddresses.empty();

    // CommonNames. Only check this if there was no SAN (according to spec).
    if (!hasSAN) {
        std::vector<std::string> commonNames = certificate->getCommonNames();
        foreach (const std::string& commonName, commonNames) {
            if (matchesDomain(commonName)) {
                return true;
            }
        }
    }

    return false;
}

bool ServerIdentityVerifier::matchesDomain(const std::string& s) const {
    if (!domainValid) {
        return false;
    }
    if (boost::starts_with(s, "*.")) {
        std::string matchString(s.substr(2, s.npos));
        std::string matchDomain = encodedDomain;
        size_t dotIndex = matchDomain.find('.');
        if (dotIndex != matchDomain.npos) {
            matchDomain = matchDomain.substr(dotIndex + 1, matchDomain.npos);
        }
        return matchString == matchDomain;
    }
    else {
        return s == encodedDomain;
    }
}

bool ServerIdentityVerifier::matchesAddress(const std::string& s) const {
    return s == domain;
}

}