Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(155)

Unified Diff: net/cert/cert_verify_proc_openssl_ios.cc

Issue 1810153002: Adding iOS OpenSSL Implementation (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing nits. Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/cert/cert_verify_proc_openssl_ios.cc
diff --git a/net/cert/cert_verify_proc_openssl_ios.cc b/net/cert/cert_verify_proc_openssl_ios.cc
new file mode 100644
index 0000000000000000000000000000000000000000..e8235cea228f96f83d58a2dfcc70ec2ac7a0347c
--- /dev/null
+++ b/net/cert/cert_verify_proc_openssl_ios.cc
@@ -0,0 +1,317 @@
+// Copyright (c) 2016 The Chromium Authors. All rights reserved.
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#include "net/cert/cert_verify_proc_openssl_ios.h"
+
+#include <CommonCrypto/CommonDigest.h>
+#include <Security/Security.h>
+
+#include "base/logging.h"
+#include "base/mac/scoped_cftyperef.h"
+#include "base/strings/sys_string_conversions.h"
+#include "crypto/sha2.h"
+#include "net/base/net_errors.h"
+#include "net/cert/asn1_util.h"
+#include "net/cert/cert_verify_result.h"
+#include "net/cert/crl_set.h"
+#include "net/cert/test_root_certs.h"
+#include "net/cert/x509_certificate.h"
+#include "net/ssl/openssl_ssl_util.h"
+
+using base::ScopedCFTypeRef;
+
+namespace net {
+
+namespace {
+
+typedef OSStatus (*SecTrustCopyExtendedResultFuncPtr)(SecTrustRef,
+ CFDictionaryRef*);
+
+int NetErrorFromOSStatus(OSStatus status) {
+ switch (status) {
+ case noErr:
+ return OK;
+ case errSecNotAvailable:
+ return ERR_NOT_IMPLEMENTED;
+ case errSecAuthFailed:
+ return ERR_ACCESS_DENIED;
Ryan Sleevi 2016/03/21 20:49:55 This doesn't seem right, because it means mapping
svaldez 2016/03/21 21:36:26 This is the same thing we do for cert_verify_proc
+ default:
+ return ERR_FAILED;
+ }
+}
+
+// Creates a series of SecPolicyRefs to be added to a SecTrustRef used to
+// validate a certificate for an SSL server. |hostname| contains the name of
+// the SSL server that the certificate should be verified against. If
+// successful, returns noErr, and stores the resultant array of SecPolicyRefs
+// in |policies|.
+OSStatus CreateTrustPolicies(const std::string& hostname,
+ ScopedCFTypeRef<CFArrayRef>* policies) {
+ ScopedCFTypeRef<CFMutableArrayRef> local_policies(
+ CFArrayCreateMutable(kCFAllocatorDefault, 0, &kCFTypeArrayCallBacks));
+ if (!local_policies)
+ return errSecAllocate;
+
+ SecPolicyRef ssl_policy = SecPolicyCreateBasicX509();
+ CFArrayAppendValue(local_policies, ssl_policy);
+ CFRelease(ssl_policy);
+ ssl_policy = SecPolicyCreateSSL(true, base::SysUTF8ToCFStringRef(hostname));
Ryan Sleevi 2016/03/21 20:49:55 I'm torn as to whether or not we want to do this,
svaldez 2016/03/21 21:36:26 Will drop the hostname verification for now.
+ CFArrayAppendValue(local_policies, ssl_policy);
+ CFRelease(ssl_policy);
+
+ policies->reset(local_policies.release());
+ return noErr;
+}
+
+// Builds and evaluates a SecTrustRef for the certificate chain contained
+// in |cert_array|, using the verification policies in |trust_policies|. On
+// success, returns OK, and updates |trust_ref| and |trust_result|. On failure,
+// no output parameters are modified.
+//
+// Note: An OK return does not mean that |cert_array| is trusted, merely that
+// verification was performed successfully.
+int BuildAndEvaluateSecTrustRef(CFArrayRef cert_array,
+ CFArrayRef trust_policies,
+ ScopedCFTypeRef<SecTrustRef>* trust_ref,
+ ScopedCFTypeRef<CFArrayRef>* verified_chain,
+ SecTrustResultType* trust_result) {
+ SecTrustRef tmp_trust = NULL;
+ OSStatus status =
+ SecTrustCreateWithCertificates(cert_array, trust_policies, &tmp_trust);
+ if (status)
+ return NetErrorFromOSStatus(status);
+ ScopedCFTypeRef<SecTrustRef> scoped_tmp_trust(tmp_trust);
+
+ if (TestRootCerts::HasInstance()) {
+ status = TestRootCerts::GetInstance()->FixupSecTrustRef(tmp_trust);
+ if (status)
+ return NetErrorFromOSStatus(status);
+ }
+
+ SecTrustResultType tmp_trust_result;
+ status = SecTrustEvaluate(tmp_trust, &tmp_trust_result);
+ if (status)
+ return NetErrorFromOSStatus(status);
+
+ ScopedCFTypeRef<CFMutableArrayRef> tmp_verified_chain(
+ CFArrayCreateMutable(kCFAllocatorDefault, 0, &kCFTypeArrayCallBacks));
+ const CFIndex chain_length = SecTrustGetCertificateCount(tmp_trust);
+ for (CFIndex i = 0; i < chain_length; ++i) {
+ SecCertificateRef chain_cert = SecTrustGetCertificateAtIndex(tmp_trust, i);
+ CFArrayAppendValue(tmp_verified_chain, chain_cert);
+ CFRelease(chain_cert);
+ }
+
+ trust_ref->swap(scoped_tmp_trust);
+ *trust_result = tmp_trust_result;
+ verified_chain->reset(tmp_verified_chain.release());
+ return OK;
+}
+
+void GetCertChainInfo(CFArrayRef cert_chain,
+ CertVerifyResult* verify_result,
+ bool* leaf_is_weak) {
+ DCHECK_LT(0, CFArrayGetCount(cert_chain));
+
+ *leaf_is_weak = false;
+ verify_result->has_md2 = false;
+ verify_result->has_md4 = false;
+ verify_result->has_md5 = false;
+ verify_result->has_sha1 = false;
+ verify_result->has_sha1_leaf = false;
+
+ SecCertificateRef verified_cert = NULL;
+ std::vector<SecCertificateRef> verified_chain;
+ for (CFIndex i = 0, count = CFArrayGetCount(cert_chain); i < count; ++i) {
+ SecCertificateRef chain_cert =
+ X509Certificate::DupOSCertHandle(reinterpret_cast<SecCertificateRef>(
Ryan Sleevi 2016/03/21 20:49:55 BUG: You end up leaking all of these certs. You sh
svaldez 2016/03/21 21:36:26 Is that the case, I had errors without this. The R
Ryan Sleevi 2016/03/21 21:44:14 You mean the member |verified_chain|? If so, that
svaldez 2016/03/22 15:05:56 Fixed. There was an extra CFRelease I was doing up
+ const_cast<void*>(CFArrayGetValueAtIndex(cert_chain, i))));
+ if (i == 0) {
+ verified_cert = chain_cert;
+ } else {
+ verified_chain.push_back(chain_cert);
+ }
+
+ ScopedX509 x509_cert = OSCertHandleToOpenSSL(chain_cert);
+ int sig_alg = OBJ_obj2nid(x509_cert->sig_alg->algorithm);
+ if (sig_alg == NID_md2WithRSAEncryption) {
+ verify_result->has_md2 = true;
+ if (i == 0)
+ *leaf_is_weak = true;
+ } else if (sig_alg == NID_md4WithRSAEncryption) {
+ verify_result->has_md4 = true;
+ if (i == 0)
+ *leaf_is_weak = true;
+ } else if (sig_alg == NID_md5WithRSAEncryption ||
+ sig_alg == NID_md5WithRSA) {
+ verify_result->has_md5 = true;
+ if (i == 0)
+ *leaf_is_weak = true;
+ } else if (sig_alg == NID_sha1WithRSAEncryption ||
+ sig_alg == NID_dsaWithSHA || sig_alg == NID_dsaWithSHA1 ||
+ sig_alg == NID_dsaWithSHA1_2 || sig_alg == NID_sha1WithRSA ||
+ sig_alg == NID_ecdsa_with_SHA1) {
+ verify_result->has_sha1 = true;
+ if (i == 0) {
+ verify_result->has_sha1_leaf = true;
+ *leaf_is_weak = true;
+ }
+ }
+ }
+ if (!verified_cert) {
+ NOTREACHED();
+ return;
+ }
+
+ verify_result->verified_cert =
+ X509Certificate::CreateFromHandle(verified_cert, verified_chain);
+}
+
+void AppendPublicKeyHashes(CFArrayRef chain, HashValueVector* hashes) {
+ const CFIndex n = CFArrayGetCount(chain);
+ for (CFIndex i = 0; i < n; i++) {
+ SecCertificateRef cert = reinterpret_cast<SecCertificateRef>(
+ const_cast<void*>(CFArrayGetValueAtIndex(chain, i)));
+
+ std::string der_bytes;
+ if (!X509Certificate::GetDEREncoded(cert, &der_bytes))
+ return;
+ base::StringPiece spki_bytes;
+ if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki_bytes))
+ continue;
+
+ HashValue sha1(HASH_VALUE_SHA1);
+ CC_SHA1(spki_bytes.data(), spki_bytes.size(), sha1.data());
+ hashes->push_back(sha1);
+
+ HashValue sha256(HASH_VALUE_SHA256);
+ CC_SHA256(spki_bytes.data(), spki_bytes.size(), sha256.data());
+ hashes->push_back(sha256);
+ }
+}
+
+bool CheckRevocationWithCRLSet(CFArrayRef chain, CRLSet* crl_set) {
Ryan Sleevi 2016/03/21 20:49:55 I don't think we want/need this behaviour, given t
svaldez 2016/03/21 21:36:26 Done.
+ if (CFArrayGetCount(chain) == 0)
+ return true;
+
+ // We iterate from the root certificate down to the leaf, keeping track of
+ // the issuer's SPKI at each step.
+ std::string issuer_spki_hash;
+ for (CFIndex i = CFArrayGetCount(chain) - 1; i >= 0; i--) {
+ SecCertificateRef cert = reinterpret_cast<SecCertificateRef>(
+ const_cast<void*>(CFArrayGetValueAtIndex(chain, i)));
+
+ std::string der_bytes;
+ if (!X509Certificate::GetDEREncoded(cert, &der_bytes))
+ return false;
+ base::StringPiece spki;
+ if (!asn1::ExtractSPKIFromDERCert(der_bytes, &spki)) {
+ NOTREACHED();
+ continue;
+ }
+
+ const std::string spki_hash = crypto::SHA256HashString(spki);
+ scoped_refptr<X509Certificate::X509Certificate> x509_cert =
+ X509Certificate::CreateFromHandle(cert,
+ X509Certificate::OSCertHandles());
+
+ CRLSet::Result result = crl_set->CheckSPKI(spki_hash);
+
+ if (result != CRLSet::REVOKED && !issuer_spki_hash.empty()) {
+ result =
+ crl_set->CheckSerial(x509_cert->serial_number(), issuer_spki_hash);
+ }
+
+ issuer_spki_hash = spki_hash;
+
+ switch (result) {
+ case CRLSet::REVOKED:
+ return false;
+ case CRLSet::UNKNOWN:
+ case CRLSet::GOOD:
+ continue;
+ default:
+ NOTREACHED();
+ return false;
+ }
+ }
+
+ return true;
+}
+
+} // namespace
+
+CertVerifyProcIOS::CertVerifyProcIOS() {}
+
+CertVerifyProcIOS::~CertVerifyProcIOS() {}
+
+bool CertVerifyProcIOS::SupportsAdditionalTrustAnchors() const {
+ return false;
+}
+
+bool CertVerifyProcIOS::SupportsOCSPStapling() const {
+ return false;
+}
+
+int CertVerifyProcIOS::VerifyInternal(
+ X509Certificate* cert,
+ const std::string& hostname,
+ const std::string& ocsp_response,
+ int flags,
+ CRLSet* crl_set,
+ const CertificateList& additional_trust_anchors,
+ CertVerifyResult* verify_result) {
+ ScopedCFTypeRef<CFArrayRef> trust_policies;
+ OSStatus status = CreateTrustPolicies(hostname, &trust_policies);
+ if (status)
+ return NetErrorFromOSStatus(status);
+
+ ScopedCFTypeRef<CFMutableArrayRef> cert_array(
+ cert->CreateOSCertChainForCert());
+ ScopedCFTypeRef<SecTrustRef> trust_ref;
+ SecTrustResultType trust_result = kSecTrustResultDeny;
+ ScopedCFTypeRef<CFArrayRef> final_chain;
+
+ status = BuildAndEvaluateSecTrustRef(cert_array, trust_policies, &trust_ref,
+ &final_chain, &trust_result);
+ if (status)
+ return NetErrorFromOSStatus(status);
+
+ if (CFArrayGetCount(final_chain) > 0) {
+ bool unused_leaf_weak;
+ GetCertChainInfo(final_chain, verify_result, &unused_leaf_weak);
+ }
+
+ if (crl_set && !CheckRevocationWithCRLSet(final_chain, crl_set))
+ verify_result->cert_status |= CERT_STATUS_REVOKED;
+
+ switch (trust_result) {
Ryan Sleevi 2016/03/21 20:49:55 BUG: No expiration handling is done here, which wa
svaldez 2016/03/21 21:36:26 Added a TODO. As it stands, this is mostly focused
Ryan Sleevi 2016/03/21 21:44:14 Yeah, I debated a comment to that effect, but iOS
+ case kSecTrustResultUnspecified:
+ case kSecTrustResultProceed:
+ break;
+ case kSecTrustResultDeny:
+ verify_result->cert_status |= CERT_STATUS_AUTHORITY_INVALID;
Ryan Sleevi 2016/03/21 20:49:55 I don't think this this the right mapping code; a
svaldez 2016/03/21 21:36:26 For Mac we've been using AUTHORITY_INVALID in this
Ryan Sleevi 2016/03/21 21:44:14 OK, fair enough.
+ default:
+ verify_result->cert_status |= CERT_STATUS_INVALID;
+ }
+
+ // Perform hostname verification independent of SecTrustEvaluate. In order to
+ // do so, mask off any reported name errors first.
+ verify_result->cert_status &= ~CERT_STATUS_COMMON_NAME_INVALID;
Ryan Sleevi 2016/03/21 20:49:55 This is never set (per above), so it's impossible
svaldez 2016/03/21 21:36:26 Done.
+ if (!cert->VerifyNameMatch(hostname,
+ &verify_result->common_name_fallback_used)) {
+ verify_result->cert_status |= CERT_STATUS_COMMON_NAME_INVALID;
+ }
+
+ verify_result->cert_status &= ~CERT_STATUS_NO_REVOCATION_MECHANISM;
Ryan Sleevi 2016/03/21 20:49:55 This is never set.
svaldez 2016/03/21 21:36:26 Done.
+ AppendPublicKeyHashes(final_chain, &verify_result->public_key_hashes);
+ verify_result->is_issued_by_known_root = true;
Ryan Sleevi 2016/03/21 20:49:55 BUG: This isn't correct. We default to false, not
svaldez 2016/03/21 21:36:26 Done.
+
+ if (IsCertStatusError(verify_result->cert_status))
+ return MapCertStatusToNetError(verify_result->cert_status);
+
+ return OK;
+}
+
+} // namespace net

Powered by Google App Engine
This is Rietveld 408576698