1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
|
// Copyright (C) MongoDB, Inc. 2017-present.
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may
// not use this file except in compliance with the License. You may obtain
// a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
package ocsp
import (
"crypto/x509"
"errors"
"fmt"
"golang.org/x/crypto/ocsp"
)
type config struct {
serverCert, issuer *x509.Certificate
cache Cache
disableEndpointChecking bool
ocspRequest *ocsp.Request
ocspRequestBytes []byte
}
func newConfig(certChain []*x509.Certificate, opts *VerifyOptions) (config, error) {
cfg := config{
cache: opts.Cache,
disableEndpointChecking: opts.DisableEndpointChecking,
}
if len(certChain) == 0 {
return cfg, errors.New("verified certificate chain contained no certificates")
}
// In the case where the leaf certificate and CA are the same, the chain may only contain one certificate.
cfg.serverCert = certChain[0]
cfg.issuer = certChain[0]
if len(certChain) > 1 {
// If the chain has multiple certificates, the one directly after the leaf should be the issuer. Use
// CheckSignatureFrom to verify that it is the issuer.
cfg.issuer = certChain[1]
if err := cfg.serverCert.CheckSignatureFrom(cfg.issuer); err != nil {
errString := "error checking if server certificate is signed by the issuer in the verified chain: %v"
return cfg, fmt.Errorf(errString, err)
}
}
var err error
cfg.ocspRequestBytes, err = ocsp.CreateRequest(cfg.serverCert, cfg.issuer, nil)
if err != nil {
return cfg, fmt.Errorf("error creating OCSP request: %v", err)
}
cfg.ocspRequest, err = ocsp.ParseRequest(cfg.ocspRequestBytes)
if err != nil {
return cfg, fmt.Errorf("error parsing OCSP request bytes: %v", err)
}
return cfg, nil
}
|