Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(730)

Unified Diff: net/base/x509_certificate_mac.cc

Issue 651090: Mac client-side SSL cert improvements. (Closed)
Patch Set: Created 10 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/base/x509_certificate_mac.cc
diff --git a/net/base/x509_certificate_mac.cc b/net/base/x509_certificate_mac.cc
index 9487410b72fba449aec7f3c5fa469aae0da21931..b064b4e5072098d5a23054ac30bf411ba8cc696d 100644
--- a/net/base/x509_certificate_mac.cc
+++ b/net/base/x509_certificate_mac.cc
@@ -9,6 +9,7 @@
#include "base/scoped_cftyperef.h"
#include "base/logging.h"
+#include "base/sys_string_conversions.h"
wtc 2010/02/24 01:44:51 Nit: List "base/sys_string_conversions.h" after "b
#include "base/pickle.h"
#include "net/base/cert_status_flags.h"
#include "net/base/cert_verify_result.h"
@@ -356,27 +357,6 @@ void GetCertDateForOID(X509Certificate::OSCertHandle cert_handle,
}
}
-// Returns true if this cert supports a given extended key usage.
-bool CertSupportsUsage(SecCertificateRef cert, const CSSM_OID& usage_oid) {
- CSSMFields fields;
- if (GetCertFields(cert, &fields) != noErr)
- return false;
- for (unsigned f = 0; f < fields.num_of_fields; ++f) {
- const CSSM_FIELD &field = fields.fields[f];
- if (CSSMOIDEqual(&field.FieldOid, &CSSMOID_ExtendedKeyUsage)) {
- const CSSM_X509_EXTENSION* ext =
- reinterpret_cast<const CSSM_X509_EXTENSION*>(field.FieldValue.Data);
- const CE_ExtendedKeyUsage* usage =
- reinterpret_cast<const CE_ExtendedKeyUsage*>(ext->value.parsedValue);
- for (unsigned p = 0; p < usage->numPurposes; ++p) {
- if (CSSMOIDEqual(&usage->purposes[p], &usage_oid))
- return true;
- }
- }
- }
- return false;
-}
-
// Creates a SecPolicyRef for the given OID, with optional value.
OSStatus CreatePolicy(const CSSM_OID* policy_OID,
void* option_data,
@@ -732,6 +712,31 @@ X509Certificate::Fingerprint X509Certificate::CalculateFingerprint(
return sha1;
}
+bool X509Certificate::SupportsSSLClientAuth() const {
+ CSSMFields fields;
+ if (GetCertFields(cert_handle_, &fields) != noErr)
+ return false;
+ for (unsigned f = 0; f < fields.num_of_fields; ++f) {
+ const CSSM_FIELD &field = fields.fields[f];
wtc 2010/02/24 01:44:51 Nit: put & next to the type, CSSM_FIELD.
+ const CSSM_X509_EXTENSION* ext =
+ reinterpret_cast<const CSSM_X509_EXTENSION*>(field.FieldValue.Data);
+ if (CSSMOIDEqual(&field.FieldOid, &CSSMOID_ExtendedKeyUsage)) {
+ const CE_ExtendedKeyUsage* usage =
+ reinterpret_cast<const CE_ExtendedKeyUsage*>(ext->value.parsedValue);
+ for (unsigned p = 0; p < usage->numPurposes; ++p) {
+ if (CSSMOIDEqual(&usage->purposes[p], &CSSMOID_ClientAuth))
+ return true;
+ }
+ } else if (CSSMOIDEqual(&field.FieldOid, &CSSMOID_NetscapeCertType)) {
+ uint16_t flags =
+ *reinterpret_cast<const uint16_t*>(ext->value.parsedValue);
+ if (flags & CE_NCT_SSL_Client)
+ return true;
+ }
+ }
+ return false;
+}
+
// static
OSStatus X509Certificate::CreateSSLClientPolicy(SecPolicyRef* out_policy) {
CSSM_APPLE_TP_SSL_OPTIONS tp_ssl_options = {
@@ -748,7 +753,21 @@ OSStatus X509Certificate::CreateSSLClientPolicy(SecPolicyRef* out_policy) {
// static
bool X509Certificate::GetSSLClientCertificates (
+ std::string domain,
std::vector<scoped_refptr<X509Certificate> >* certs) {
+ scoped_cftyperef<SecIdentityRef> preferred_identity;
+ if (domain != "") {
wtc 2010/02/24 01:44:51 Is it better to say !domain.empty() ?
+ // See if there's an identity preference for this domain:
+ scoped_cftyperef<CFStringRef> domain_str(
+ base::SysUTF8ToCFStringRef("https://" + domain));
+ SecIdentityRef identity = NULL;
+ if (SecIdentityCopyPreference(domain_str,
wtc 2010/02/24 01:44:51 The first argument should also contain the port, i
wtc 2010/02/24 20:13:51 I see the difficulty of getting the port. I forgo
+ 0,
+ NULL,
+ &identity) == noErr)
+ preferred_identity.reset(identity);
+ }
+
SecIdentitySearchRef search = nil;
OSStatus err = SecIdentitySearchCreate(NULL, CSSM_KEYUSE_SIGN, &search);
fprintf(stderr,"====Created SecIdentitySearch %p\n",search);//TEMP
@@ -768,8 +787,7 @@ bool X509Certificate::GetSSLClientCertificates (
scoped_refptr<X509Certificate> cert(
CreateFromHandle(cert_handle, SOURCE_LONE_CERT_IMPORT));
// cert_handle is adoped by cert, so I don't need to release it myself.
- if (cert->HasExpired() ||
- !CertSupportsUsage(cert_handle, CSSMOID_ClientAuth))
+ if (cert->HasExpired() || !cert->SupportsSSLClientAuth())
continue;
// Skip duplicates (a cert may be in multiple keychains).
@@ -783,7 +801,12 @@ bool X509Certificate::GetSSLClientCertificates (
continue;
// The cert passes, so add it to the vector.
- certs->push_back(cert);
+ // If it's the preferred identity, add it at the start (so it'll be
+ // selected by default in the UI.)
wtc 2010/02/24 01:44:51 Nit: the period (.) should be after the closing pa
+ if (preferred_identity && CFEqual(preferred_identity, identity))
+ certs->insert(certs->begin(), cert);
+ else
+ certs->push_back(cert);
}
if (err != errSecItemNotFound) {
@@ -793,7 +816,7 @@ bool X509Certificate::GetSSLClientCertificates (
return true;
}
-CFArrayRef X509Certificate::CreateClientCertificateChain() {
+CFArrayRef X509Certificate::CreateClientCertificateChain() const {
// Initialize the result array with just the IdentityRef of the receiver:
OSStatus result;
SecIdentityRef identity;

Powered by Google App Engine
This is Rietveld 408576698