Chromium Code Reviews| Index: net/base/test_root_certs_mac.cc |
| diff --git a/net/base/test_root_certs_mac.cc b/net/base/test_root_certs_mac.cc |
| new file mode 100644 |
| index 0000000000000000000000000000000000000000..6add980f98ea41df1c00bfa546cc8c59a12c488d |
| --- /dev/null |
| +++ b/net/base/test_root_certs_mac.cc |
| @@ -0,0 +1,136 @@ |
| +// Copyright (c) 2010 The Chromium Authors. All rights reserved. |
| +// Use of this source code is governed by a BSD-style license that can be |
| +// found in the LICENSE file. |
| + |
| +#include "net/base/test_root_certs.h" |
| + |
| +#include <Security/Security.h> |
| + |
| +#include "base/logging.h" |
| +#include "base/mac/scoped_cftyperef.h" |
| +#include "net/base/x509_certificate.h" |
| + |
| +namespace net { |
| + |
| +namespace { |
| + |
| +#if !defined(MAC_OS_X_VERSION_10_6) || \ |
| + MAC_OS_X_VERSION_MAX_ALLOWED < MAC_OS_X_VERSION_10_6 |
| +// Declared in <Security/SecBase.h> of the 10.6 SDK. |
| +enum { |
| + errSecUnimplemented = -4, |
| +}; |
| +#endif |
| + |
| +typedef OSStatus (*SecTrustSetAnchorCertificatesOnlyFuncPtr)(SecTrustRef, |
| + Boolean); |
| + |
| +Boolean OurSecCertificateEqual(const void* value1, const void* value2) { |
| + if (CFGetTypeID(value1) != SecCertificateGetTypeID() || |
| + CFGetTypeID(value2) != SecCertificateGetTypeID()) |
| + return CFEqual(value1, value2); |
| + return X509Certificate::IsSameOSCert( |
| + reinterpret_cast<SecCertificateRef>(const_cast<void*>(value1)), |
| + reinterpret_cast<SecCertificateRef>(const_cast<void*>(value2))); |
| +} |
| + |
| +const void* RetainWrapper(CFAllocatorRef unused, const void* value) { |
| + return CFRetain(value); |
| +} |
| + |
| +void ReleaseWrapper(CFAllocatorRef unused, const void* value) { |
| + CFRelease(value); |
| +} |
| + |
| +// CFEqual prior to 10.6 only performed pointer checks on SecCertificateRefs, |
| +// rather than checking if they were the same (logical) certificate, so a |
| +// custom structure is used for the array callbacks. |
| +const CFArrayCallBacks kCertArrayCallbacks = { |
| + 0, // version |
| + RetainWrapper, |
| + ReleaseWrapper, |
| + CFCopyDescription, |
| + OurSecCertificateEqual |
|
bulach
2010/11/17 17:17:30
append ,
|
| +}; |
| + |
| +} // namespace |
| + |
| +bool TestRootCerts::Add(X509Certificate* certificate) { |
| + if (CFArrayContainsValue(temporary_roots_, |
| + CFRangeMake(0, CFArrayGetCount(temporary_roots_)), |
| + certificate->os_cert_handle())) |
| + return true; |
| + CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle()); |
| + return true; |
| +} |
| + |
| +void TestRootCerts::Clear() { |
| + CFArrayRemoveAllValues(temporary_roots_); |
| +} |
| + |
| +bool TestRootCerts::IsEmpty() const { |
| + return CFArrayGetCount(temporary_roots_) == 0; |
| +} |
| + |
| +OSStatus TestRootCerts::SetAnchorCertificates(SecTrustRef trust_ref) const { |
| + if (IsEmpty()) |
| + return noErr; |
| + |
| + CFBundleRef bundle = |
| + CFBundleGetBundleWithIdentifier(CFSTR("com.apple.security")); |
| + SecTrustSetAnchorCertificatesOnlyFuncPtr set_anchor_certificates_only = NULL; |
| + if (bundle) { |
| + set_anchor_certificates_only = |
| + reinterpret_cast<SecTrustSetAnchorCertificatesOnlyFuncPtr>( |
| + CFBundleGetFunctionPointerForName(bundle, |
| + CFSTR("SecTrustSetAnchorCertificatesOnly"))); |
| + } |
| + |
| + OSStatus status = noErr; |
| + if (set_anchor_certificates_only) { |
| + // OS X 10.6 includes a function where the system trusts can be |
| + // preserved while appending application trusts. This is preferable, |
| + // because it preserves any user trust settings (explicit distrust), |
| + // which the naive copy in 10.5 does not. Unfortunately, though the |
| + // function pointer may be available, it is not always implemented. If it |
| + // returns errSecUnimplemented, fall through to the 10.5 behaviour. |
| + status = SecTrustSetAnchorCertificates(trust_ref, temporary_roots_); |
| + if (status) |
| + return status; |
| + status = set_anchor_certificates_only(trust_ref, false); |
| + if (status != errSecUnimplemented) |
| + return status; |
| + |
| + // Restore the original settings before falling back. |
| + status = SecTrustSetAnchorCertificates(trust_ref, NULL); |
| + if (status) |
| + return status; |
| + } |
| + |
| + // On 10.5, the system certificates have to be copied and merged into |
| + // the application trusts, and may override any user trust settings. |
| + CFArrayRef system_roots = NULL; |
| + status = SecTrustCopyAnchorCertificates(&system_roots); |
| + if (status) |
| + return status; |
| + |
| + base::mac::ScopedCFTypeRef<CFArrayRef> scoped_system_roots(system_roots); |
| + base::mac::ScopedCFTypeRef<CFMutableArrayRef> scoped_roots( |
| + CFArrayCreateMutableCopy(kCFAllocatorDefault, 0, |
| + scoped_system_roots)); |
| + DCHECK(scoped_roots.get()); |
| + |
| + CFArrayAppendArray(scoped_roots, temporary_roots_, |
| + CFRangeMake(0, CFArrayGetCount(temporary_roots_))); |
| + return SecTrustSetAnchorCertificates(trust_ref, scoped_roots); |
| +} |
| + |
| +TestRootCerts::TestRootCerts() { |
| + temporary_roots_.reset(CFArrayCreateMutable(kCFAllocatorDefault, 0, |
| + &kCertArrayCallbacks)); |
| +} |
| + |
| +TestRootCerts::~TestRootCerts() { |
| +} |
| + |
| +} // namespace net |