| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/cert/x509_util.h" | 5 #include "net/cert/x509_util.h" |
| 6 #include "net/cert/x509_util_nss.h" | 6 #include "net/cert/x509_util_nss.h" |
| 7 | 7 |
| 8 #include <cert.h> // Must be included before certdb.h | 8 #include <cert.h> // Must be included before certdb.h |
| 9 #include <certdb.h> | 9 #include <certdb.h> |
| 10 #include <cryptohi.h> | 10 #include <cryptohi.h> |
| 11 #include <nss.h> | 11 #include <nss.h> |
| 12 #include <pk11pub.h> | 12 #include <pk11pub.h> |
| 13 #include <prerror.h> | 13 #include <prerror.h> |
| 14 #include <secder.h> | 14 #include <secder.h> |
| 15 #include <secmod.h> | 15 #include <secmod.h> |
| 16 #include <secport.h> | 16 #include <secport.h> |
| 17 | 17 |
| 18 #include "base/debug/leak_annotations.h" | 18 #include "base/debug/leak_annotations.h" |
| 19 #include "base/logging.h" | 19 #include "base/logging.h" |
| 20 #include "base/memory/scoped_ptr.h" | 20 #include "base/memory/scoped_ptr.h" |
| 21 #include "base/memory/singleton.h" | 21 #include "base/memory/singleton.h" |
| 22 #include "base/pickle.h" | 22 #include "base/pickle.h" |
| 23 #include "base/strings/stringprintf.h" | 23 #include "base/strings/stringprintf.h" |
| 24 #include "crypto/ec_private_key.h" | 24 #include "crypto/ec_private_key.h" |
| 25 #include "crypto/nss_util.h" | 25 #include "crypto/nss_util.h" |
| 26 #include "crypto/nss_util_internal.h" | 26 #include "crypto/nss_util_internal.h" |
| 27 #include "crypto/rsa_private_key.h" |
| 27 #include "crypto/scoped_nss_types.h" | 28 #include "crypto/scoped_nss_types.h" |
| 28 #include "crypto/third_party/nss/chromium-nss.h" | 29 #include "crypto/third_party/nss/chromium-nss.h" |
| 29 #include "net/cert/x509_certificate.h" | 30 #include "net/cert/x509_certificate.h" |
| 30 | 31 |
| 31 namespace net { | 32 namespace net { |
| 32 | 33 |
| 33 namespace { | 34 namespace { |
| 34 | 35 |
| 35 class DomainBoundCertOIDWrapper { | 36 class DomainBoundCertOIDWrapper { |
| 36 public: | 37 public: |
| (...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 175 DLOG(ERROR) << "DerSignData: " << PORT_GetError(); | 176 DLOG(ERROR) << "DerSignData: " << PORT_GetError(); |
| 176 return false; | 177 return false; |
| 177 } | 178 } |
| 178 | 179 |
| 179 // Save the signed result to the cert. | 180 // Save the signed result to the cert. |
| 180 cert->derCert = result; | 181 cert->derCert = result; |
| 181 | 182 |
| 182 return true; | 183 return true; |
| 183 } | 184 } |
| 184 | 185 |
| 185 bool CreateDomainBoundCertInternal( | |
| 186 SECKEYPublicKey* public_key, | |
| 187 SECKEYPrivateKey* private_key, | |
| 188 const std::string& domain, | |
| 189 uint32 serial_number, | |
| 190 base::Time not_valid_before, | |
| 191 base::Time not_valid_after, | |
| 192 std::string* der_cert) { | |
| 193 CERTCertificate* cert = CreateCertificate(public_key, | |
| 194 "CN=anonymous.invalid", | |
| 195 serial_number, | |
| 196 not_valid_before, | |
| 197 not_valid_after); | |
| 198 | |
| 199 if (!cert) | |
| 200 return false; | |
| 201 | |
| 202 // Create opaque handle used to add extensions later. | |
| 203 void* cert_handle; | |
| 204 if ((cert_handle = CERT_StartCertExtensions(cert)) == NULL) { | |
| 205 LOG(ERROR) << "Unable to get opaque handle for adding extensions"; | |
| 206 CERT_DestroyCertificate(cert); | |
| 207 return false; | |
| 208 } | |
| 209 | |
| 210 // Create SECItem for IA5String encoding. | |
| 211 SECItem domain_string_item = { | |
| 212 siAsciiString, | |
| 213 (unsigned char*)domain.data(), | |
| 214 static_cast<unsigned>(domain.size()) | |
| 215 }; | |
| 216 | |
| 217 // IA5Encode and arena allocate SECItem | |
| 218 SECItem* asn1_domain_string = SEC_ASN1EncodeItem( | |
| 219 cert->arena, NULL, &domain_string_item, | |
| 220 SEC_ASN1_GET(SEC_IA5StringTemplate)); | |
| 221 if (asn1_domain_string == NULL) { | |
| 222 LOG(ERROR) << "Unable to get ASN1 encoding for domain in domain_bound_cert" | |
| 223 " extension"; | |
| 224 CERT_DestroyCertificate(cert); | |
| 225 return false; | |
| 226 } | |
| 227 | |
| 228 // Add the extension to the opaque handle | |
| 229 if (CERT_AddExtension( | |
| 230 cert_handle, | |
| 231 DomainBoundCertOIDWrapper::GetInstance()->domain_bound_cert_oid_tag(), | |
| 232 asn1_domain_string, PR_TRUE, PR_TRUE) != SECSuccess){ | |
| 233 LOG(ERROR) << "Unable to add domain bound cert extension to opaque handle"; | |
| 234 CERT_DestroyCertificate(cert); | |
| 235 return false; | |
| 236 } | |
| 237 | |
| 238 // Copy extension into x509 cert | |
| 239 if (CERT_FinishExtensions(cert_handle) != SECSuccess){ | |
| 240 LOG(ERROR) << "Unable to copy extension to X509 cert"; | |
| 241 CERT_DestroyCertificate(cert); | |
| 242 return false; | |
| 243 } | |
| 244 | |
| 245 if (!SignCertificate(cert, private_key)) { | |
| 246 CERT_DestroyCertificate(cert); | |
| 247 return false; | |
| 248 } | |
| 249 | |
| 250 DCHECK(cert->derCert.len); | |
| 251 // XXX copied from X509Certificate::GetDEREncoded | |
| 252 der_cert->clear(); | |
| 253 der_cert->append(reinterpret_cast<char*>(cert->derCert.data), | |
| 254 cert->derCert.len); | |
| 255 CERT_DestroyCertificate(cert); | |
| 256 return true; | |
| 257 } | |
| 258 | |
| 259 #if defined(USE_NSS) || defined(OS_IOS) | 186 #if defined(USE_NSS) || defined(OS_IOS) |
| 260 // Callback for CERT_DecodeCertPackage(), used in | 187 // Callback for CERT_DecodeCertPackage(), used in |
| 261 // CreateOSCertHandlesFromBytes(). | 188 // CreateOSCertHandlesFromBytes(). |
| 262 SECStatus PR_CALLBACK CollectCertsCallback(void* arg, | 189 SECStatus PR_CALLBACK CollectCertsCallback(void* arg, |
| 263 SECItem** certs, | 190 SECItem** certs, |
| 264 int num_certs) { | 191 int num_certs) { |
| 265 X509Certificate::OSCertHandles* results = | 192 X509Certificate::OSCertHandles* results = |
| 266 reinterpret_cast<X509Certificate::OSCertHandles*>(arg); | 193 reinterpret_cast<X509Certificate::OSCertHandles*>(arg); |
| 267 | 194 |
| 268 for (int i = 0; i < num_certs; ++i) { | 195 for (int i = 0; i < num_certs; ++i) { |
| (...skipping 36 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 305 | 232 |
| 306 return name.release(); | 233 return name.release(); |
| 307 } | 234 } |
| 308 | 235 |
| 309 #endif // defined(USE_NSS) || defined(OS_IOS) | 236 #endif // defined(USE_NSS) || defined(OS_IOS) |
| 310 | 237 |
| 311 } // namespace | 238 } // namespace |
| 312 | 239 |
| 313 namespace x509_util { | 240 namespace x509_util { |
| 314 | 241 |
| 315 CERTCertificate* CreateSelfSignedCert( | 242 bool CreateSelfSignedCert(crypto::RSAPrivateKey* key, |
| 316 SECKEYPublicKey* public_key, | 243 const std::string& subject, |
| 317 SECKEYPrivateKey* private_key, | 244 uint32 serial_number, |
| 318 const std::string& subject, | 245 base::Time not_valid_before, |
| 319 uint32 serial_number, | 246 base::Time not_valid_after, |
| 320 base::Time not_valid_before, | 247 std::string* der_cert) { |
| 321 base::Time not_valid_after) { | 248 DCHECK(key); |
| 322 CERTCertificate* cert = CreateCertificate(public_key, | 249 CERTCertificate* cert = CreateCertificate(key->public_key(), |
| 323 subject, | 250 subject, |
| 324 serial_number, | 251 serial_number, |
| 325 not_valid_before, | 252 not_valid_before, |
| 326 not_valid_after); | 253 not_valid_after); |
| 327 if (!cert) | 254 if (!cert) |
| 328 return NULL; | 255 return false; |
| 329 | 256 |
| 330 if (!SignCertificate(cert, private_key)) { | 257 if (!SignCertificate(cert, key->key())) { |
| 331 CERT_DestroyCertificate(cert); | 258 CERT_DestroyCertificate(cert); |
| 332 return NULL; | 259 return false; |
| 333 } | 260 } |
| 334 | 261 |
| 335 return cert; | 262 der_cert->assign(reinterpret_cast<char*>(cert->derCert.data), |
| 263 cert->derCert.len); |
| 264 CERT_DestroyCertificate(cert); |
| 265 return true; |
| 336 } | 266 } |
| 337 | 267 |
| 338 bool IsSupportedValidityRange(base::Time not_valid_before, | 268 bool IsSupportedValidityRange(base::Time not_valid_before, |
| 339 base::Time not_valid_after) { | 269 base::Time not_valid_after) { |
| 340 CERTValidity* validity = CERT_CreateValidity( | 270 CERTValidity* validity = CERT_CreateValidity( |
| 341 crypto::BaseTimeToPRTime(not_valid_before), | 271 crypto::BaseTimeToPRTime(not_valid_before), |
| 342 crypto::BaseTimeToPRTime(not_valid_after)); | 272 crypto::BaseTimeToPRTime(not_valid_after)); |
| 343 | 273 |
| 344 if (!validity) | 274 if (!validity) |
| 345 return false; | 275 return false; |
| 346 | 276 |
| 347 CERT_DestroyValidity(validity); | 277 CERT_DestroyValidity(validity); |
| 348 return true; | 278 return true; |
| 349 } | 279 } |
| 350 | 280 |
| 351 bool CreateDomainBoundCertEC( | 281 bool CreateDomainBoundCertEC(crypto::ECPrivateKey* key, |
| 352 crypto::ECPrivateKey* key, | 282 const std::string& domain, |
| 353 const std::string& domain, | 283 uint32 serial_number, |
| 354 uint32 serial_number, | 284 base::Time not_valid_before, |
| 355 base::Time not_valid_before, | 285 base::Time not_valid_after, |
| 356 base::Time not_valid_after, | 286 std::string* der_cert) { |
| 357 std::string* der_cert) { | |
| 358 DCHECK(key); | 287 DCHECK(key); |
| 359 return CreateDomainBoundCertInternal(key->public_key(), | 288 |
| 360 key->key(), | 289 CERTCertificate* cert = CreateCertificate(key->public_key(), |
| 361 domain, | 290 "CN=anonymous.invalid", |
| 362 serial_number, | 291 serial_number, |
| 363 not_valid_before, | 292 not_valid_before, |
| 364 not_valid_after, | 293 not_valid_after); |
| 365 der_cert); | 294 |
| 295 if (!cert) |
| 296 return false; |
| 297 |
| 298 // Create opaque handle used to add extensions later. |
| 299 void* cert_handle; |
| 300 if ((cert_handle = CERT_StartCertExtensions(cert)) == NULL) { |
| 301 LOG(ERROR) << "Unable to get opaque handle for adding extensions"; |
| 302 CERT_DestroyCertificate(cert); |
| 303 return false; |
| 304 } |
| 305 |
| 306 // Create SECItem for IA5String encoding. |
| 307 SECItem domain_string_item = { |
| 308 siAsciiString, |
| 309 (unsigned char*)domain.data(), |
| 310 static_cast<unsigned>(domain.size()) |
| 311 }; |
| 312 |
| 313 // IA5Encode and arena allocate SECItem |
| 314 SECItem* asn1_domain_string = SEC_ASN1EncodeItem( |
| 315 cert->arena, NULL, &domain_string_item, |
| 316 SEC_ASN1_GET(SEC_IA5StringTemplate)); |
| 317 if (asn1_domain_string == NULL) { |
| 318 LOG(ERROR) << "Unable to get ASN1 encoding for domain in domain_bound_cert" |
| 319 " extension"; |
| 320 CERT_DestroyCertificate(cert); |
| 321 return false; |
| 322 } |
| 323 |
| 324 // Add the extension to the opaque handle |
| 325 if (CERT_AddExtension( |
| 326 cert_handle, |
| 327 DomainBoundCertOIDWrapper::GetInstance()->domain_bound_cert_oid_tag(), |
| 328 asn1_domain_string, |
| 329 PR_TRUE, |
| 330 PR_TRUE) != SECSuccess){ |
| 331 LOG(ERROR) << "Unable to add domain bound cert extension to opaque handle"; |
| 332 CERT_DestroyCertificate(cert); |
| 333 return false; |
| 334 } |
| 335 |
| 336 // Copy extension into x509 cert |
| 337 if (CERT_FinishExtensions(cert_handle) != SECSuccess){ |
| 338 LOG(ERROR) << "Unable to copy extension to X509 cert"; |
| 339 CERT_DestroyCertificate(cert); |
| 340 return false; |
| 341 } |
| 342 |
| 343 if (!SignCertificate(cert, key->key())) { |
| 344 CERT_DestroyCertificate(cert); |
| 345 return false; |
| 346 } |
| 347 |
| 348 DCHECK(cert->derCert.len); |
| 349 // XXX copied from X509Certificate::GetDEREncoded |
| 350 der_cert->clear(); |
| 351 der_cert->append(reinterpret_cast<char*>(cert->derCert.data), |
| 352 cert->derCert.len); |
| 353 CERT_DestroyCertificate(cert); |
| 354 return true; |
| 366 } | 355 } |
| 367 | 356 |
| 368 #if defined(USE_NSS) || defined(OS_IOS) | 357 #if defined(USE_NSS) || defined(OS_IOS) |
| 369 void ParsePrincipal(CERTName* name, CertPrincipal* principal) { | 358 void ParsePrincipal(CERTName* name, CertPrincipal* principal) { |
| 370 // Starting in NSS 3.15, CERTGetNameFunc takes a const CERTName* argument. | 359 // Starting in NSS 3.15, CERTGetNameFunc takes a const CERTName* argument. |
| 371 #if NSS_VMINOR >= 15 | 360 #if NSS_VMINOR >= 15 |
| 372 typedef char* (*CERTGetNameFunc)(const CERTName* name); | 361 typedef char* (*CERTGetNameFunc)(const CERTName* name); |
| 373 #else | 362 #else |
| 374 typedef char* (*CERTGetNameFunc)(CERTName* name); | 363 typedef char* (*CERTGetNameFunc)(CERTName* name); |
| 375 #endif | 364 #endif |
| (...skipping 250 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 626 } | 615 } |
| 627 | 616 |
| 628 return new_name; | 617 return new_name; |
| 629 } | 618 } |
| 630 | 619 |
| 631 #endif // defined(USE_NSS) || defined(OS_IOS) | 620 #endif // defined(USE_NSS) || defined(OS_IOS) |
| 632 | 621 |
| 633 } // namespace x509_util | 622 } // namespace x509_util |
| 634 | 623 |
| 635 } // namespace net | 624 } // namespace net |
| OLD | NEW |