Index: chrome/browser/chromeos/cros/onc_network_parser.cc |
diff --git a/chrome/browser/chromeos/cros/onc_network_parser.cc b/chrome/browser/chromeos/cros/onc_network_parser.cc |
index 94a56641aa5773361e61bb8ebcd4cc0fade045ff..98f6ef5a27c8f200f7103eebbb17d4d834627b06 100644 |
--- a/chrome/browser/chromeos/cros/onc_network_parser.cc |
+++ b/chrome/browser/chromeos/cros/onc_network_parser.cc |
@@ -15,6 +15,7 @@ |
#include "net/base/crypto_module.h" |
#include "net/base/net_errors.h" |
#include "net/base/x509_certificate.h" |
+#include "net/base/x509_util_nss.h" |
#include "third_party/cros_system_api/dbus/service_constants.h" |
namespace chromeos { |
@@ -63,7 +64,6 @@ ConnectionType ParseNetworkType(const std::string& type) { |
(table, arraysize(table), TYPE_UNKNOWN)); |
return parser.Get(type); |
} |
- |
wtc
2011/12/08 00:07:43
Nit: you should keep this blank line to match the
Greg Spencer (Chromium)
2011/12/09 18:51:38
Done.
|
} // namespace |
// -------------------- OncNetworkParser -------------------- |
@@ -110,7 +110,8 @@ int OncNetworkParser::GetCertificatesSize() const { |
return certificates_ ? certificates_->GetSize() : 0; |
} |
-bool OncNetworkParser::ParseCertificate(int cert_index) { |
+scoped_refptr<net::X509Certificate> OncNetworkParser::ParseCertificate( |
+ int cert_index) { |
CHECK(certificates_); |
CHECK(static_cast<size_t>(cert_index) < certificates_->GetSize()); |
CHECK(cert_index >= 0); |
@@ -118,35 +119,39 @@ bool OncNetworkParser::ParseCertificate(int cert_index) { |
certificates_->GetDictionary(cert_index, &certificate); |
CHECK(certificate); |
- // Get out the attributes of the given cert. |
+ // Get out the attributes of the given certificate. |
std::string guid; |
bool remove = false; |
if (!certificate->GetString("GUID", &guid) || guid.empty()) { |
LOG(WARNING) << "ONC File: certificate missing identifier at index" |
<< cert_index; |
- return false; |
+ return NULL; |
} |
if (!certificate->GetBoolean("Remove", &remove)) |
remove = false; |
net::CertDatabase cert_database; |
- if (remove) |
- return cert_database.DeleteCertAndKeyByLabel(guid); |
+ if (remove) { |
+ bool success = DeleteCertAndKeyByLabel(guid); |
+ DCHECK(success); |
+ // TODO(gspencer): return removed certificate? |
+ return NULL; |
+ } |
- // Not removing, so let's get the data we need to add this cert. |
+ // Not removing, so let's get the data we need to add this certificate. |
std::string cert_type; |
certificate->GetString("Type", &cert_type); |
if (cert_type == "Server" || cert_type == "Authority") { |
- return ParseServerOrCaCertificate(cert_index, cert_type, certificate); |
+ return ParseServerOrCaCertificate(cert_index, cert_type, guid, certificate); |
} |
if (cert_type == "Client") { |
- return ParseClientCertificate(cert_index, certificate); |
+ return ParseClientCertificate(cert_index, guid, certificate); |
} |
LOG(WARNING) << "ONC File: certificate of unknown type: " << cert_type |
<< " at index " << cert_index; |
- return false; |
+ return NULL; |
} |
Network* OncNetworkParser::ParseNetwork(int n) { |
@@ -222,9 +227,11 @@ std::string OncNetworkParser::GetGuidFromDictionary( |
return guid_string; |
} |
-bool OncNetworkParser::ParseServerOrCaCertificate( |
+scoped_refptr<net::X509Certificate> |
+OncNetworkParser::ParseServerOrCaCertificate( |
int cert_index, |
const std::string& cert_type, |
+ const std::string& guid, |
base::DictionaryValue* certificate) { |
net::CertDatabase cert_database; |
bool web_trust = false; |
@@ -235,7 +242,7 @@ bool OncNetworkParser::ParseServerOrCaCertificate( |
if (!trust_list->GetString(i, &trust_type)) { |
LOG(WARNING) << "ONC File: certificate trust is invalid at index " |
<< cert_index; |
- return false; |
+ return NULL; |
} |
if (trust_type == "Web") { |
web_trust = true; |
@@ -243,7 +250,7 @@ bool OncNetworkParser::ParseServerOrCaCertificate( |
LOG(WARNING) << "ONC File: certificate contains unknown " |
<< "trust type: " << trust_type |
<< " at index " << cert_index; |
- return false; |
+ return NULL; |
} |
} |
} |
@@ -253,23 +260,29 @@ bool OncNetworkParser::ParseServerOrCaCertificate( |
LOG(WARNING) << "ONC File: certificate missing appropriate " |
<< "certificate data for type: " << cert_type |
<< " at index " << cert_index; |
- return false; |
+ return NULL; |
} |
std::string decoded_x509; |
if (!base::Base64Decode(x509_data, &decoded_x509)) { |
LOG(WARNING) << "Unable to base64 decode X509 data: \"" |
<< x509_data << "\"."; |
- return false; |
+ return NULL; |
} |
- scoped_refptr<net::X509Certificate> x509_cert( |
- net::X509Certificate::CreateFromBytes(decoded_x509.c_str(), |
- decoded_x509.size())); |
+ scoped_refptr<net::X509Certificate> x509_cert = |
+ net::X509Certificate::CreateFromBytesWithNickname( |
+ decoded_x509.c_str(), |
+ decoded_x509.size(), |
+ guid.c_str()); |
if (!x509_cert.get()) { |
LOG(WARNING) << "Unable to create X509 certificate from bytes."; |
- return false; |
+ return NULL; |
} |
+ |
+ if (!net::x509_util::SetLabel(x509_cert, guid)) |
+ return NULL; |
wtc
2011/12/08 00:07:43
IMPORTANT: why do you set the label on x509_cert w
Greg Spencer (Chromium)
2011/12/09 18:51:38
I've removed the Label setting code, and I'm now j
|
+ |
net::CertificateList cert_list; |
cert_list.push_back(x509_cert); |
net::CertDatabase::ImportCertFailureList failures; |
@@ -287,18 +300,27 @@ bool OncNetworkParser::ParseServerOrCaCertificate( |
<< net::ErrorToString(failures[0].net_error) |
<< ") importing " << cert_type << " certificate at index " |
<< cert_index; |
- return false; |
+ return NULL; |
} |
if (!success) { |
LOG(WARNING) << "ONC File: Unknown error importing " << cert_type |
<< " certificate at index " << cert_index; |
- return false; |
+ return NULL; |
} |
- return true; |
+ |
+ // Have to set the label again, because PKCS#11 seems to want to set |
+ // it to token:nickname. We have to set it the first time so that |
+ // it gets properly imported into the low-level token inside of |
+ // ImportCACerts or ImportServerCert. |
+ if (!net::x509_util::SetLabel(x509_cert, guid)) |
wtc
2011/12/08 00:07:43
IMPORTANT: this is a sign that we don't fully unde
|
+ return NULL; |
+ |
+ return x509_cert; |
} |
-bool OncNetworkParser::ParseClientCertificate( |
+scoped_refptr<net::X509Certificate> OncNetworkParser::ParseClientCertificate( |
int cert_index, |
+ const std::string& guid, |
base::DictionaryValue* certificate) { |
net::CertDatabase cert_database; |
std::string pkcs12_data; |
@@ -306,29 +328,84 @@ bool OncNetworkParser::ParseClientCertificate( |
pkcs12_data.empty()) { |
LOG(WARNING) << "ONC File: PKCS12 data is missing for Client " |
<< "certificate at index " << cert_index; |
- return false; |
+ return NULL; |
} |
std::string decoded_pkcs12; |
if (!base::Base64Decode(pkcs12_data, &decoded_pkcs12)) { |
LOG(WARNING) << "Unable to base64 decode PKCS#12 data: \"" |
<< pkcs12_data << "\"."; |
- return false; |
+ return NULL; |
} |
// Since this has a private key, always use the private module. |
scoped_refptr<net::CryptoModule> module(cert_database.GetPrivateModule()); |
+ net::CertificateList imported_certs; |
int result = cert_database.ImportFromPKCS12( |
- module.get(), decoded_pkcs12, string16(), false); |
+ module.get(), decoded_pkcs12, string16(), false, &imported_certs); |
if (result != net::OK) { |
LOG(WARNING) << "ONC File: Unable to import Client certificate at index " |
<< cert_index |
<< " (error " << net::ErrorToString(result) << ")."; |
- return false; |
+ return NULL; |
} |
- return true; |
+ |
+ if (imported_certs.size() == 0ul) { |
wtc
2011/12/08 00:07:43
Nit: you should be able to use 0 and 1 without the
Greg Spencer (Chromium)
2011/12/09 18:51:38
Yes, I know that, but for some reason I was gettin
wtc
2011/12/10 00:58:43
I suspect you may have used a DCHECK_EQ here befor
|
+ LOG(WARNING) << "ONC File: PKCS12 data contains no importable certificates" |
+ << " at index " << cert_index; |
+ return NULL; |
+ } |
+ |
+ if (imported_certs.size() != 1ul) { |
+ LOG(WARNING) << "ONC File: PKCS12 data at index " << cert_index |
+ << " contains more than one certificate. Only the first one will" |
+ << " be imported."; |
+ } |
+ |
+ scoped_refptr<net::X509Certificate> cert_result = imported_certs[0]; |
+ if (!net::x509_util::SetLabel(cert_result.get(), guid)) |
wtc
2011/12/08 00:07:43
IMPORTANT: you can specify the certificate "friend
Greg Spencer (Chromium)
2011/12/09 18:51:38
That may be true, but I don't have control over th
|
+ return NULL; |
+ |
+ return cert_result; |
+} |
+ |
+// static |
+bool OncNetworkParser::DeleteCertAndKeyByLabel(const std::string& label) { |
+ net::CertificateList cert_list; |
+ ListCertsWithLabel(label, &cert_list); |
+ net::CertDatabase cert_db; |
+ bool result = true; |
+ for (net::CertificateList::iterator iter = cert_list.begin(); |
+ iter != cert_list.end(); ++iter) { |
+ // If we fail, we try and delete the rest still. |
+ // TODO(gspencer): this isn't very "transactional". If we fail on some, but |
+ // not all, then it's possible to leave things in a weird state. |
+ // Luckily there should only be one cert with a particular |
+ // label, and the cert not being found is one of the few reasons this could |
+ // fail, but still... |
+ if (!cert_db.DeleteCertAndKey(iter->get())) |
+ result = false; |
+ } |
+ return result; |
} |
+// static |
+void OncNetworkParser::ListCertsWithLabel(const std::string& label, |
+ net::CertificateList* result) { |
+ net::CertificateList all_certs; |
+ net::CertDatabase cert_db; |
+ cert_db.ListCerts(&all_certs); |
+ net::CertificateList new_list; |
+ for (net::CertificateList::iterator iter = all_certs.begin(); |
+ iter != all_certs.end(); ++iter) { |
+ if (net::x509_util::GetLabel(iter->get()).find(label) != std::string::npos) |
wtc
2011/12/08 00:07:43
IMPORTANT: document that DeleteCertAndKeyByLabel a
Greg Spencer (Chromium)
2011/12/09 18:51:38
I switched this so that they are using exact match
|
+ new_list.push_back(*iter); |
wtc
2011/12/08 00:07:43
Nit: why don't you just push *iter to |result| dir
Greg Spencer (Chromium)
2011/12/09 18:51:38
Because if there were failures we could abort and
|
+ } |
+ result->swap(new_list); |
+} |
+ |
+ |
+ |
// -------------------- OncWirelessNetworkParser -------------------- |
OncWirelessNetworkParser::OncWirelessNetworkParser() {} |