| OLD | NEW | 
|---|
| (Empty) |  | 
|  | 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 
|  | 2 // Use of this source code is governed by a BSD-style license that can be | 
|  | 3 // found in the LICENSE file. | 
|  | 4 | 
|  | 5 #include "net/tools/domain_security_preload_generator/cert_util.h" | 
|  | 6 | 
|  | 7 #include <string> | 
|  | 8 | 
|  | 9 #include "base/base64.h" | 
|  | 10 #include "base/files/file_util.h" | 
|  | 11 #include "base/strings/string_util.h" | 
|  | 12 #include "base/strings/stringprintf.h" | 
|  | 13 #include "net/tools/domain_security_preload_generator/spki_hash.h" | 
|  | 14 #include "third_party/boringssl/src/include/openssl/crypto.h" | 
|  | 15 | 
|  | 16 using net::transport_security_state::SPKIHash; | 
|  | 17 | 
|  | 18 namespace { | 
|  | 19 | 
|  | 20 static const char kPEMBeginBlock[] = "-----BEGIN %s-----"; | 
|  | 21 static const char kPEMEndBlock[] = "-----END %s-----"; | 
|  | 22 | 
|  | 23 // Tries to extract the BASE64 encoded DER structure from |pem_input| by looking | 
|  | 24 // for the block type in |expected_block_type|. Only attempts the locate the | 
|  | 25 // first matching block. Other blocks are ignored. Returns true on success and | 
|  | 26 // copies the der structure to |*der_output|. Returns false on error. | 
|  | 27 bool ParsePEM(base::StringPiece pem_input, | 
|  | 28               base::StringPiece expected_block_type, | 
|  | 29               std::string* der_output) { | 
|  | 30   const std::string& block_start = | 
|  | 31       base::StringPrintf(kPEMBeginBlock, expected_block_type.data()); | 
|  | 32   const std::string& block_end = | 
|  | 33       base::StringPrintf(kPEMEndBlock, expected_block_type.data()); | 
|  | 34 | 
|  | 35   size_t block_start_pos = pem_input.find(block_start); | 
|  | 36   if (block_start_pos == std::string::npos) | 
|  | 37     return false; | 
|  | 38   size_t base64_start_pos = block_start_pos + block_start.size(); | 
|  | 39 | 
|  | 40   size_t block_end_pos = pem_input.find(block_end, base64_start_pos); | 
|  | 41   if (block_end_pos == std::string::npos) | 
|  | 42     return false; | 
|  | 43 | 
|  | 44   base::StringPiece base64_encoded = | 
|  | 45       pem_input.substr(base64_start_pos, block_end_pos - base64_start_pos); | 
|  | 46 | 
|  | 47   if (!base::Base64Decode( | 
|  | 48           base::CollapseWhitespaceASCII(base64_encoded.as_string(), true), | 
|  | 49           der_output)) { | 
|  | 50     return false; | 
|  | 51   } | 
|  | 52 | 
|  | 53   return true; | 
|  | 54 } | 
|  | 55 | 
|  | 56 // Attempts to extract the first entry of type |nid| from |*name|. Returns true | 
|  | 57 // if the field exists and was extracted. Returns false when the field was not | 
|  | 58 // found or the data could not be extracted. | 
|  | 59 bool ExtractFieldFromX509Name(X509_NAME* name, int nid, std::string* field) { | 
|  | 60   int index = X509_NAME_get_index_by_NID(name, nid, -1); | 
|  | 61   if (index == -1) { | 
|  | 62     return false; | 
|  | 63   } | 
|  | 64 | 
|  | 65   X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, index); | 
|  | 66   if (!entry) { | 
|  | 67     return false; | 
|  | 68   } | 
|  | 69 | 
|  | 70   ASN1_STRING* data = X509_NAME_ENTRY_get_data(entry); | 
|  | 71   if (!data) { | 
|  | 72     return false; | 
|  | 73   } | 
|  | 74 | 
|  | 75   uint8_t* buffer = nullptr; | 
|  | 76   size_t length = ASN1_STRING_to_UTF8(&buffer, data); | 
|  | 77   field->assign(reinterpret_cast<const char*>(buffer), length); | 
|  | 78   OPENSSL_free(buffer); | 
|  | 79   return true; | 
|  | 80 } | 
|  | 81 | 
|  | 82 }  // namespace | 
|  | 83 | 
|  | 84 bssl::UniquePtr<X509> GetX509CertificateFromPEM(base::StringPiece pem_data) { | 
|  | 85   std::string der; | 
|  | 86   if (!ParsePEM(pem_data, "CERTIFICATE", &der)) { | 
|  | 87     return bssl::UniquePtr<X509>(); | 
|  | 88   } | 
|  | 89 | 
|  | 90   const uint8_t* der_data = reinterpret_cast<const uint8_t*>(der.c_str()); | 
|  | 91   return bssl::UniquePtr<X509>( | 
|  | 92       d2i_X509(NULL, &der_data, base::checked_cast<long>(der.size()))); | 
|  | 93 } | 
|  | 94 | 
|  | 95 bool ExtractSubjectNameFromCertificate(X509* certificate, std::string* name) { | 
|  | 96   DCHECK(certificate); | 
|  | 97   X509_NAME* subject = X509_get_subject_name(certificate); | 
|  | 98   if (!subject) { | 
|  | 99     return false; | 
|  | 100   } | 
|  | 101 | 
|  | 102   std::string result; | 
|  | 103   // Try extracting the common name first. | 
|  | 104   if (!ExtractFieldFromX509Name(subject, NID_commonName, &result) || | 
|  | 105       result.empty()) { | 
|  | 106     std::string organization; | 
|  | 107     if (!ExtractFieldFromX509Name(subject, NID_organizationName, | 
|  | 108                                   &organization)) { | 
|  | 109       return false; | 
|  | 110     } | 
|  | 111 | 
|  | 112     std::string organizational_unit; | 
|  | 113     if (!ExtractFieldFromX509Name(subject, NID_organizationalUnitName, | 
|  | 114                                   &organizational_unit)) { | 
|  | 115       return false; | 
|  | 116     } | 
|  | 117     result = organization + " " + organizational_unit; | 
|  | 118   } | 
|  | 119 | 
|  | 120   name->assign(result); | 
|  | 121   return true; | 
|  | 122 } | 
|  | 123 | 
|  | 124 bool CalculateSPKIHashFromCertificate(X509* certificate, SPKIHash* out_hash) { | 
|  | 125   DCHECK(certificate); | 
|  | 126   bssl::UniquePtr<EVP_PKEY> key(X509_get_pubkey(certificate)); | 
|  | 127   if (!key) { | 
|  | 128     return false; | 
|  | 129   } | 
|  | 130 | 
|  | 131   uint8_t* spki_der; | 
|  | 132   size_t spki_der_len; | 
|  | 133   bssl::ScopedCBB cbb; | 
|  | 134   if (!CBB_init(cbb.get(), 0) || | 
|  | 135       !EVP_marshal_public_key(cbb.get(), key.get()) || | 
|  | 136       !CBB_finish(cbb.get(), &spki_der, &spki_der_len)) { | 
|  | 137     return false; | 
|  | 138   } | 
|  | 139 | 
|  | 140   out_hash->CalculateFromBytes(spki_der, spki_der_len); | 
|  | 141   OPENSSL_free(spki_der); | 
|  | 142   return true; | 
|  | 143 } | 
|  | 144 | 
|  | 145 bool CalculateSPKIHashFromKey(base::StringPiece pem_key, SPKIHash* out_hash) { | 
|  | 146   std::string der; | 
|  | 147   bool result = ParsePEM(pem_key, "PUBLIC KEY", &der); | 
|  | 148   if (!result) { | 
|  | 149     return false; | 
|  | 150   } | 
|  | 151 | 
|  | 152   out_hash->CalculateFromBytes(reinterpret_cast<const uint8_t*>(der.data()), | 
|  | 153                                der.size()); | 
|  | 154   return true; | 
|  | 155 } | 
| OLD | NEW | 
|---|