| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chromeos/network/onc/onc_certificate_importer.h" | |
| 6 | |
| 7 #include <cert.h> | |
| 8 #include <keyhi.h> | |
| 9 #include <pk11pub.h> | |
| 10 | |
| 11 #include "base/base64.h" | |
| 12 #include "base/logging.h" | |
| 13 #include "base/values.h" | |
| 14 #include "chromeos/network/network_event_log.h" | |
| 15 #include "chromeos/network/onc/onc_constants.h" | |
| 16 #include "chromeos/network/onc/onc_utils.h" | |
| 17 #include "net/base/crypto_module.h" | |
| 18 #include "net/base/net_errors.h" | |
| 19 #include "net/cert/nss_cert_database.h" | |
| 20 #include "net/cert/x509_certificate.h" | |
| 21 | |
| 22 #define ONC_LOG_WARNING(message) \ | |
| 23 NET_LOG_DEBUG("ONC Certificate Import Warning", message) | |
| 24 #define ONC_LOG_ERROR(message) \ | |
| 25 NET_LOG_ERROR("ONC Certificate Import Error", message) | |
| 26 | |
| 27 namespace chromeos { | |
| 28 namespace onc { | |
| 29 | |
| 30 CertificateImporter::CertificateImporter(bool allow_trust_imports) | |
| 31 : allow_trust_imports_(allow_trust_imports) { | |
| 32 } | |
| 33 | |
| 34 CertificateImporter::ParseResult CertificateImporter::ParseAndStoreCertificates( | |
| 35 const base::ListValue& certificates, | |
| 36 net::CertificateList* onc_trusted_certificates, | |
| 37 CertsByGUID* imported_server_and_ca_certs) { | |
| 38 size_t successful_imports = 0; | |
| 39 for (size_t i = 0; i < certificates.GetSize(); ++i) { | |
| 40 const base::DictionaryValue* certificate = NULL; | |
| 41 certificates.GetDictionary(i, &certificate); | |
| 42 DCHECK(certificate != NULL); | |
| 43 | |
| 44 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; | |
| 45 | |
| 46 if (!ParseAndStoreCertificate(*certificate, onc_trusted_certificates, | |
| 47 imported_server_and_ca_certs)) { | |
| 48 ONC_LOG_ERROR( | |
| 49 base::StringPrintf("Cannot parse certificate at index %zu", i)); | |
| 50 } else { | |
| 51 VLOG(2) << "Successfully imported certificate at index " << i; | |
| 52 ++successful_imports; | |
| 53 } | |
| 54 } | |
| 55 | |
| 56 if (successful_imports == certificates.GetSize()) { | |
| 57 return IMPORT_OK; | |
| 58 } else if (successful_imports == 0) { | |
| 59 return IMPORT_FAILED; | |
| 60 } else { | |
| 61 return IMPORT_INCOMPLETE; | |
| 62 } | |
| 63 } | |
| 64 | |
| 65 // static | |
| 66 void CertificateImporter::ListCertsWithNickname(const std::string& label, | |
| 67 net::CertificateList* result) { | |
| 68 net::CertificateList all_certs; | |
| 69 net::NSSCertDatabase::GetInstance()->ListCerts(&all_certs); | |
| 70 result->clear(); | |
| 71 for (net::CertificateList::iterator iter = all_certs.begin(); | |
| 72 iter != all_certs.end(); ++iter) { | |
| 73 if (iter->get()->os_cert_handle()->nickname) { | |
| 74 // Separate the nickname stored in the certificate at the colon, since | |
| 75 // NSS likes to store it as token:nickname. | |
| 76 const char* delimiter = | |
| 77 ::strchr(iter->get()->os_cert_handle()->nickname, ':'); | |
| 78 if (delimiter) { | |
| 79 ++delimiter; // move past the colon. | |
| 80 if (strcmp(delimiter, label.c_str()) == 0) { | |
| 81 result->push_back(*iter); | |
| 82 continue; | |
| 83 } | |
| 84 } | |
| 85 } | |
| 86 // Now we find the private key for this certificate and see if it has a | |
| 87 // nickname that matches. If there is a private key, and it matches, | |
| 88 // then this is a client cert that we are looking for. | |
| 89 SECKEYPrivateKey* private_key = PK11_FindPrivateKeyFromCert( | |
| 90 iter->get()->os_cert_handle()->slot, | |
| 91 iter->get()->os_cert_handle(), | |
| 92 NULL); // wincx | |
| 93 if (private_key) { | |
| 94 char* private_key_nickname = PK11_GetPrivateKeyNickname(private_key); | |
| 95 if (private_key_nickname && std::string(label) == private_key_nickname) | |
| 96 result->push_back(*iter); | |
| 97 PORT_Free(private_key_nickname); | |
| 98 SECKEY_DestroyPrivateKey(private_key); | |
| 99 } | |
| 100 } | |
| 101 } | |
| 102 | |
| 103 // static | |
| 104 bool CertificateImporter::DeleteCertAndKeyByNickname(const std::string& label) { | |
| 105 net::CertificateList cert_list; | |
| 106 ListCertsWithNickname(label, &cert_list); | |
| 107 bool result = true; | |
| 108 for (net::CertificateList::iterator iter = cert_list.begin(); | |
| 109 iter != cert_list.end(); ++iter) { | |
| 110 // If we fail, we try and delete the rest still. | |
| 111 // TODO(gspencer): this isn't very "transactional". If we fail on some, but | |
| 112 // not all, then it's possible to leave things in a weird state. | |
| 113 // Luckily there should only be one cert with a particular | |
| 114 // label, and the cert not being found is one of the few reasons the | |
| 115 // delete could fail, but still... The other choice is to return | |
| 116 // failure immediately, but that doesn't seem to do what is intended. | |
| 117 if (!net::NSSCertDatabase::GetInstance()->DeleteCertAndKey(iter->get())) | |
| 118 result = false; | |
| 119 } | |
| 120 return result; | |
| 121 } | |
| 122 | |
| 123 bool CertificateImporter::ParseAndStoreCertificate( | |
| 124 const base::DictionaryValue& certificate, | |
| 125 net::CertificateList* onc_trusted_certificates, | |
| 126 CertsByGUID* imported_server_and_ca_certs) { | |
| 127 // Get out the attributes of the given certificate. | |
| 128 std::string guid; | |
| 129 certificate.GetStringWithoutPathExpansion(certificate::kGUID, &guid); | |
| 130 DCHECK(!guid.empty()); | |
| 131 | |
| 132 bool remove = false; | |
| 133 if (certificate.GetBooleanWithoutPathExpansion(kRemove, &remove) && remove) { | |
| 134 if (!DeleteCertAndKeyByNickname(guid)) { | |
| 135 ONC_LOG_ERROR("Unable to delete certificate"); | |
| 136 return false; | |
| 137 } else { | |
| 138 return true; | |
| 139 } | |
| 140 } | |
| 141 | |
| 142 // Not removing, so let's get the data we need to add this certificate. | |
| 143 std::string cert_type; | |
| 144 certificate.GetStringWithoutPathExpansion(certificate::kType, &cert_type); | |
| 145 if (cert_type == certificate::kServer || | |
| 146 cert_type == certificate::kAuthority) { | |
| 147 return ParseServerOrCaCertificate(cert_type, guid, certificate, | |
| 148 onc_trusted_certificates, | |
| 149 imported_server_and_ca_certs); | |
| 150 } else if (cert_type == certificate::kClient) { | |
| 151 return ParseClientCertificate(guid, certificate); | |
| 152 } | |
| 153 | |
| 154 NOTREACHED(); | |
| 155 return false; | |
| 156 } | |
| 157 | |
| 158 bool CertificateImporter::ParseServerOrCaCertificate( | |
| 159 const std::string& cert_type, | |
| 160 const std::string& guid, | |
| 161 const base::DictionaryValue& certificate, | |
| 162 net::CertificateList* onc_trusted_certificates, | |
| 163 CertsByGUID* imported_server_and_ca_certs) { | |
| 164 bool web_trust_flag = false; | |
| 165 const base::ListValue* trust_list = NULL; | |
| 166 if (certificate.GetListWithoutPathExpansion(certificate::kTrustBits, | |
| 167 &trust_list)) { | |
| 168 for (base::ListValue::const_iterator it = trust_list->begin(); | |
| 169 it != trust_list->end(); ++it) { | |
| 170 std::string trust_type; | |
| 171 if (!(*it)->GetAsString(&trust_type)) | |
| 172 NOTREACHED(); | |
| 173 | |
| 174 if (trust_type == certificate::kWeb) { | |
| 175 // "Web" implies that the certificate is to be trusted for SSL | |
| 176 // identification. | |
| 177 web_trust_flag = true; | |
| 178 } else { | |
| 179 // Trust bits should only increase trust and never restrict. Thus, | |
| 180 // ignoring unknown bits should be safe. | |
| 181 ONC_LOG_WARNING("Certificate contains unknown trust type " + | |
| 182 trust_type); | |
| 183 } | |
| 184 } | |
| 185 } | |
| 186 | |
| 187 bool import_with_ssl_trust = false; | |
| 188 if (web_trust_flag) { | |
| 189 if (!allow_trust_imports_) | |
| 190 ONC_LOG_WARNING("Web trust not granted for certificate: " + guid); | |
| 191 else | |
| 192 import_with_ssl_trust = true; | |
| 193 } | |
| 194 | |
| 195 std::string x509_data; | |
| 196 if (!certificate.GetStringWithoutPathExpansion(certificate::kX509, | |
| 197 &x509_data) || | |
| 198 x509_data.empty()) { | |
| 199 ONC_LOG_ERROR( | |
| 200 "Certificate missing appropriate certificate data for type: " + | |
| 201 cert_type); | |
| 202 return false; | |
| 203 } | |
| 204 | |
| 205 scoped_refptr<net::X509Certificate> x509_cert = | |
| 206 DecodePEMCertificate(x509_data); | |
| 207 if (!x509_cert.get()) { | |
| 208 ONC_LOG_ERROR("Unable to create certificate from PEM encoding, type: " + | |
| 209 cert_type); | |
| 210 return false; | |
| 211 } | |
| 212 | |
| 213 net::NSSCertDatabase::TrustBits trust = (import_with_ssl_trust ? | |
| 214 net::NSSCertDatabase::TRUSTED_SSL : | |
| 215 net::NSSCertDatabase::TRUST_DEFAULT); | |
| 216 | |
| 217 net::NSSCertDatabase* cert_database = net::NSSCertDatabase::GetInstance(); | |
| 218 if (x509_cert->os_cert_handle()->isperm) { | |
| 219 net::CertType net_cert_type = | |
| 220 cert_type == certificate::kServer ? net::SERVER_CERT : net::CA_CERT; | |
| 221 VLOG(1) << "Certificate is already installed."; | |
| 222 net::NSSCertDatabase::TrustBits missing_trust_bits = | |
| 223 trust & ~cert_database->GetCertTrust(x509_cert.get(), net_cert_type); | |
| 224 if (missing_trust_bits) { | |
| 225 std::string error_reason; | |
| 226 bool success = false; | |
| 227 if (cert_database->IsReadOnly(x509_cert.get())) { | |
| 228 error_reason = " Certificate is stored read-only."; | |
| 229 } else { | |
| 230 success = cert_database->SetCertTrust(x509_cert.get(), | |
| 231 net_cert_type, | |
| 232 trust); | |
| 233 } | |
| 234 if (!success) { | |
| 235 ONC_LOG_ERROR("Certificate of type " + cert_type + | |
| 236 " was already present, but trust couldn't be set." + | |
| 237 error_reason); | |
| 238 } | |
| 239 } | |
| 240 } else { | |
| 241 net::CertificateList cert_list; | |
| 242 cert_list.push_back(x509_cert); | |
| 243 net::NSSCertDatabase::ImportCertFailureList failures; | |
| 244 bool success = false; | |
| 245 if (cert_type == certificate::kServer) | |
| 246 success = cert_database->ImportServerCert(cert_list, trust, &failures); | |
| 247 else // Authority cert | |
| 248 success = cert_database->ImportCACerts(cert_list, trust, &failures); | |
| 249 | |
| 250 if (!failures.empty()) { | |
| 251 ONC_LOG_ERROR( | |
| 252 base::StringPrintf("Error ( %s ) importing %s certificate", | |
| 253 net::ErrorToString(failures[0].net_error), | |
| 254 cert_type.c_str())); | |
| 255 return false; | |
| 256 } | |
| 257 | |
| 258 if (!success) { | |
| 259 ONC_LOG_ERROR("Unknown error importing " + cert_type + " certificate."); | |
| 260 return false; | |
| 261 } | |
| 262 } | |
| 263 | |
| 264 if (web_trust_flag && onc_trusted_certificates) | |
| 265 onc_trusted_certificates->push_back(x509_cert); | |
| 266 | |
| 267 if (imported_server_and_ca_certs) | |
| 268 (*imported_server_and_ca_certs)[guid] = x509_cert; | |
| 269 | |
| 270 return true; | |
| 271 } | |
| 272 | |
| 273 bool CertificateImporter::ParseClientCertificate( | |
| 274 const std::string& guid, | |
| 275 const base::DictionaryValue& certificate) { | |
| 276 std::string pkcs12_data; | |
| 277 if (!certificate.GetStringWithoutPathExpansion(certificate::kPKCS12, | |
| 278 &pkcs12_data) || | |
| 279 pkcs12_data.empty()) { | |
| 280 ONC_LOG_ERROR("PKCS12 data is missing for client certificate."); | |
| 281 return false; | |
| 282 } | |
| 283 | |
| 284 std::string decoded_pkcs12; | |
| 285 if (!base::Base64Decode(pkcs12_data, &decoded_pkcs12)) { | |
| 286 ONC_LOG_ERROR( | |
| 287 "Unable to base64 decode PKCS#12 data: \"" + pkcs12_data + "\"."); | |
| 288 return false; | |
| 289 } | |
| 290 | |
| 291 // Since this has a private key, always use the private module. | |
| 292 net::NSSCertDatabase* cert_database = net::NSSCertDatabase::GetInstance(); | |
| 293 scoped_refptr<net::CryptoModule> module(cert_database->GetPrivateModule()); | |
| 294 net::CertificateList imported_certs; | |
| 295 | |
| 296 int import_result = cert_database->ImportFromPKCS12( | |
| 297 module.get(), decoded_pkcs12, string16(), false, &imported_certs); | |
| 298 if (import_result != net::OK) { | |
| 299 ONC_LOG_ERROR( | |
| 300 base::StringPrintf("Unable to import client certificate (error %s)", | |
| 301 net::ErrorToString(import_result))); | |
| 302 return false; | |
| 303 } | |
| 304 | |
| 305 if (imported_certs.size() == 0) { | |
| 306 ONC_LOG_WARNING("PKCS12 data contains no importable certificates."); | |
| 307 return true; | |
| 308 } | |
| 309 | |
| 310 if (imported_certs.size() != 1) { | |
| 311 ONC_LOG_WARNING("ONC File: PKCS12 data contains more than one certificate. " | |
| 312 "Only the first one will be imported."); | |
| 313 } | |
| 314 | |
| 315 scoped_refptr<net::X509Certificate> cert_result = imported_certs[0]; | |
| 316 | |
| 317 // Find the private key associated with this certificate, and set the | |
| 318 // nickname on it. | |
| 319 SECKEYPrivateKey* private_key = PK11_FindPrivateKeyFromCert( | |
| 320 cert_result->os_cert_handle()->slot, | |
| 321 cert_result->os_cert_handle(), | |
| 322 NULL); // wincx | |
| 323 if (private_key) { | |
| 324 PK11_SetPrivateKeyNickname(private_key, const_cast<char*>(guid.c_str())); | |
| 325 SECKEY_DestroyPrivateKey(private_key); | |
| 326 } else { | |
| 327 ONC_LOG_WARNING("Unable to find private key for certificate."); | |
| 328 } | |
| 329 return true; | |
| 330 } | |
| 331 | |
| 332 } // namespace onc | |
| 333 } // namespace chromeos | |
| OLD | NEW |