Index: net/cert/x509_util_ios.cc |
diff --git a/net/cert/x509_util_ios.cc b/net/cert/x509_util_ios.cc |
index 9bf41850efa7a0aee487c7a862cc959f11989211..18d3315185610f4967393d07cc5d53a16e386370 100644 |
--- a/net/cert/x509_util_ios.cc |
+++ b/net/cert/x509_util_ios.cc |
@@ -5,16 +5,101 @@ |
#include "net/cert/x509_util_ios.h" |
#include "net/cert/x509_certificate.h" |
+#include "third_party/boringssl/src/include/openssl/pool.h" |
namespace net { |
namespace x509_util { |
+namespace { |
+ |
+// Returns true if a given |cert_handle| is actually a valid X.509 certificate |
+// handle. |
+// |
+// SecCertificateCreateFromData() does not always force the immediate parsing of |
+// the certificate, and as such, may return a SecCertificateRef for an |
+// invalid/unparsable certificate. Force parsing to occur to ensure that the |
+// SecCertificateRef is correct. On later versions where |
+// SecCertificateCreateFromData() immediately parses, rather than lazily, this |
+// call is cheap, as the subject is cached. |
+bool IsValidSecCertificate(SecCertificateRef cert_handle) { |
+ base::ScopedCFTypeRef<CFStringRef> sanity_check( |
+ SecCertificateCopySubjectSummary(cert_handle)); |
+ return sanity_check != nullptr; |
+} |
+ |
+} // namespace |
+ |
+base::ScopedCFTypeRef<SecCertificateRef> CreateSecCertificateFromBytes( |
+ const uint8_t* data, |
+ size_t length) { |
+ base::ScopedCFTypeRef<CFDataRef> cert_data(CFDataCreateWithBytesNoCopy( |
+ kCFAllocatorDefault, reinterpret_cast<const UInt8*>(data), |
+ base::checked_cast<CFIndex>(length), kCFAllocatorNull)); |
+ if (!cert_data) |
+ return base::ScopedCFTypeRef<SecCertificateRef>(); |
+ |
+ base::ScopedCFTypeRef<SecCertificateRef> cert_handle( |
+ SecCertificateCreateWithData(nullptr, cert_data)); |
+ if (!cert_handle) |
+ return base::ScopedCFTypeRef<SecCertificateRef>(); |
+ |
+ if (!IsValidSecCertificate(cert_handle.get())) |
+ return base::ScopedCFTypeRef<SecCertificateRef>(); |
+ return cert_handle; |
+} |
+ |
base::ScopedCFTypeRef<SecCertificateRef> |
CreateSecCertificateFromX509Certificate(const X509Certificate* cert) { |
+#if BUILDFLAG(USE_BYTE_CERTS) |
+ return CreateSecCertificateFromBytes( |
+ CRYPTO_BUFFER_data(cert->os_cert_handle()), |
+ CRYPTO_BUFFER_len(cert->os_cert_handle())); |
+#else |
return base::ScopedCFTypeRef<SecCertificateRef>( |
reinterpret_cast<SecCertificateRef>( |
const_cast<void*>(CFRetain(cert->os_cert_handle())))); |
+#endif |
+} |
+ |
+scoped_refptr<X509Certificate> CreateX509CertificateFromSecCertificate( |
+ SecCertificateRef sec_cert, |
+ const std::vector<SecCertificateRef>& sec_chain) { |
+#if BUILDFLAG(USE_BYTE_CERTS) |
+ if (!sec_cert) |
+ return nullptr; |
+ base::ScopedCFTypeRef<CFDataRef> der_data(SecCertificateCopyData(sec_cert)); |
+ if (!der_data) |
+ return nullptr; |
+ bssl::UniquePtr<CRYPTO_BUFFER> cert_handle( |
+ X509Certificate::CreateOSCertHandleFromBytes( |
+ reinterpret_cast<const char*>(CFDataGetBytePtr(der_data)), |
+ CFDataGetLength(der_data))); |
+ if (!cert_handle) |
+ return nullptr; |
+ std::vector<bssl::UniquePtr<CRYPTO_BUFFER>> intermediates; |
+ X509Certificate::OSCertHandles intermediates_raw; |
+ for (const SecCertificateRef& sec_intermediate : sec_chain) { |
+ if (!sec_intermediate) |
+ return nullptr; |
+ der_data.reset(SecCertificateCopyData(sec_intermediate)); |
+ if (!der_data) |
+ return nullptr; |
+ bssl::UniquePtr<CRYPTO_BUFFER> intermediate_cert_handle( |
+ X509Certificate::CreateOSCertHandleFromBytes( |
+ reinterpret_cast<const char*>(CFDataGetBytePtr(der_data)), |
+ CFDataGetLength(der_data))); |
+ if (!intermediate_cert_handle) |
+ return nullptr; |
+ intermediates_raw.push_back(intermediate_cert_handle.get()); |
+ intermediates.push_back(std::move(intermediate_cert_handle)); |
+ } |
+ scoped_refptr<X509Certificate> result( |
+ X509Certificate::CreateFromHandle(cert_handle.get(), intermediates_raw)); |
+ return result; |
+#else |
+ return X509Certificate::CreateFromHandle(sec_cert, sec_chain); |
+#endif |
} |
} // namespace x509_util |