Files
common/webauthn/revoke/revoke_legacy.go

88 lines
1.5 KiB
Go
Raw Normal View History

2025-10-10 10:17:22 -04:00
//go:build !go1.19
package revoke
import (
"crypto/x509"
"crypto/x509/pkix"
"time"
)
// CRLSet associates a PKIX certificate list with the URL the CRL is
// fetched from.
var (
CRLSet = map[string]*pkix.CertificateList{}
)
// fetchCRL fetches and parses a CRL.
func fetchCRL(url string) (*pkix.CertificateList, error) {
resp, err := HTTPClient.Get(url)
if err != nil {
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode >= 300 {
return nil, ErrFailedGetCRL
}
body, err := crlRead(resp.Body)
if err != nil {
return nil, err
}
return x509.ParseCRL(body)
}
// check a cert against a specific CRL. Returns the same bool pair
// as revCheck, plus an error if one occurred.
func certIsRevokedCRL(cert *x509.Certificate, url string) (revoked, ok bool, err error) {
var crl *pkix.CertificateList
crlLock.Lock()
if crl, ok = CRLSet[url]; ok && crl == nil {
ok = false
delete(CRLSet, url)
}
crlLock.Unlock()
shouldFetchCRL := true
if ok && !crl.HasExpired(time.Now()) {
shouldFetchCRL = false
}
issuer := getIssuer(cert)
if shouldFetchCRL {
if crl, err = fetchCRL(url); err != nil {
return false, false, err
}
// Check the CRL signature.
if issuer != nil {
if err = issuer.CheckCRLSignature(crl); err != nil {
return false, false, err
}
}
crlLock.Lock()
CRLSet[url] = crl
crlLock.Unlock()
}
var rc pkix.RevokedCertificate
for _, rc = range crl.TBSCertList.RevokedCertificates {
if cert.SerialNumber.Cmp(rc.SerialNumber) == 0 {
return true, true, err
}
}
return false, true, err
}