Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/ssl/client_cert_store_mac.h" | 5 #include "net/ssl/client_cert_store_mac.h" |
| 6 | 6 |
| 7 #include <CommonCrypto/CommonDigest.h> | 7 #include <CommonCrypto/CommonDigest.h> |
| 8 #include <CoreFoundation/CFArray.h> | 8 #include <CoreFoundation/CFArray.h> |
| 9 #include <CoreServices/CoreServices.h> | 9 #include <CoreServices/CoreServices.h> |
| 10 #include <Security/SecBase.h> | 10 #include <Security/SecBase.h> |
| (...skipping 266 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 277 ScopedCFTypeRef<SecIdentitySearchRef> scoped_search(search); | 277 ScopedCFTypeRef<SecIdentitySearchRef> scoped_search(search); |
| 278 while (!err) { | 278 while (!err) { |
| 279 SecIdentityRef identity = NULL; | 279 SecIdentityRef identity = NULL; |
| 280 { | 280 { |
| 281 base::AutoLock lock(crypto::GetMacSecurityServicesLock()); | 281 base::AutoLock lock(crypto::GetMacSecurityServicesLock()); |
| 282 err = SecIdentitySearchCopyNext(search, &identity); | 282 err = SecIdentitySearchCopyNext(search, &identity); |
| 283 } | 283 } |
| 284 if (err) | 284 if (err) |
| 285 break; | 285 break; |
| 286 ScopedCFTypeRef<SecIdentityRef> scoped_identity(identity); | 286 ScopedCFTypeRef<SecIdentityRef> scoped_identity(identity); |
| 287 | 287 AddIdentity(regular_certs, preferred_cert, preferred_identity.get(), identit y); |
| 288 SecCertificateRef cert_handle; | |
| 289 err = SecIdentityCopyCertificate(identity, &cert_handle); | |
| 290 if (err != noErr) | |
| 291 continue; | |
| 292 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle); | |
| 293 | |
| 294 if (!SupportsSSLClientAuth(cert_handle)) | |
| 295 continue; | |
| 296 | |
| 297 scoped_refptr<X509Certificate> cert( | |
| 298 x509_util::CreateX509CertificateFromSecCertificate( | |
| 299 cert_handle, std::vector<SecCertificateRef>())); | |
| 300 if (!cert) | |
| 301 continue; | |
| 302 | |
| 303 if (preferred_identity && CFEqual(preferred_identity, identity)) { | |
| 304 // Only one certificate should match. | |
| 305 DCHECK(!preferred_cert.get()); | |
| 306 preferred_cert = cert; | |
| 307 } else { | |
| 308 regular_certs.push_back(cert); | |
| 309 } | |
| 310 } | 288 } |
| 311 | 289 |
| 312 if (err != errSecItemNotFound) { | 290 if (err != errSecItemNotFound) { |
| 313 OSSTATUS_LOG(ERROR, err) << "SecIdentitySearch error"; | 291 OSSTATUS_LOG(ERROR, err) << "SecIdentitySearch error"; |
| 314 callback.Run(CertificateList()); | 292 callback.Run(CertificateList()); |
| 315 return; | 293 return; |
| 316 } | 294 } |
| 317 | 295 |
| 296 // For reasons I don't understand, macOS has two different ways of querying | |
| 297 // for client certificate identities. The way we just tried will miss some | |
| 298 // smart card based certificates, and this way misses some soft certificates. | |
|
Ryan Sleevi
2017/05/30 18:00:01
We try to avoid pronouns in comments (I/we) and tr
agaynor
2017/05/31 02:37:33
Done.
| |
| 299 const void *keys[] = { | |
|
Ryan Sleevi
2017/05/30 18:00:01
You can use "git cl format" to ensure this is prop
Ryan Sleevi
2017/05/30 18:00:01
So, I _believe_ for correctness, that kSecAttrCanS
agaynor
2017/05/31 02:37:33
Done.
agaynor
2017/05/31 02:37:33
It's a boring old RSA key. I've added |kSecAttrCan
mattm
2017/06/05 23:34:27
Looking at that code a bit, it seems that SecItemC
| |
| 300 kSecClass, | |
| 301 kSecMatchLimit, | |
| 302 kSecReturnRef, | |
| 303 }; | |
| 304 const void *values[] = { | |
| 305 kSecClassIdentity, | |
| 306 kSecMatchLimitAll, | |
| 307 kCFBooleanTrue, | |
| 308 }; | |
| 309 CFDictionaryRef query = CFDictionaryCreate( | |
|
Ryan Sleevi
2017/05/30 18:00:01
You can see we used the ScopedCFTypeRef C++ helper
agaynor
2017/05/31 02:37:33
Done.
| |
| 310 kCFAllocatorDefault, | |
| 311 keys, | |
| 312 values, | |
| 313 sizeof(values) / sizeof(values[0]), | |
| 314 &kCFTypeDictionaryKeyCallBacks, | |
| 315 &kCFTypeDictionaryValueCallBacks | |
| 316 ); | |
| 317 CFArrayRef result = NULL; | |
| 318 err = SecItemCopyMatching(query, (CFTypeRef *)&result); | |
|
Ryan Sleevi
2017/05/30 18:00:00
Note: Chromium explicitly uses C++ casts rather th
agaynor
2017/05/31 02:37:33
Done.
| |
| 319 if (!err) { | |
|
Ryan Sleevi
2017/05/30 18:00:01
In general, we try to handle the error case first,
| |
| 320 for (CFIndex i = 0; i < CFArrayGetCount(result); i++) { | |
| 321 CFTypeRef item = CFArrayGetValueAtIndex(result, i); | |
| 322 AddIdentity(regular_certs, preferred_cert, preferred_identity, (SecIdentit yRef)item); | |
| 323 } | |
| 324 } | |
| 325 CFRelease(query); | |
| 326 CFRelease(result); | |
| 327 | |
| 318 CertificateList selected_certs; | 328 CertificateList selected_certs; |
| 319 GetClientCertsImpl(preferred_cert, regular_certs, request, true, | 329 GetClientCertsImpl(preferred_cert, regular_certs, request, true, |
| 320 &selected_certs); | 330 &selected_certs); |
| 321 callback.Run(std::move(selected_certs)); | 331 callback.Run(std::move(selected_certs)); |
| 322 } | 332 } |
| 323 | 333 |
| 334 void ClientCertStoreMac::AddIdentity( | |
| 335 CertificateList& regular_certs, | |
| 336 scoped_refptr<X509Certificate>& preferred_cert, | |
| 337 SecIdentityRef preferred_identity, | |
| 338 SecIdentityRef identity) { | |
| 339 OSStatus err; | |
| 340 SecCertificateRef cert_handle; | |
|
Ryan Sleevi
2017/05/30 18:00:01
.InitializeInto :)
agaynor
2017/05/31 02:37:33
Done.
| |
| 341 err = SecIdentityCopyCertificate(identity, &cert_handle); | |
| 342 if (err != noErr) | |
| 343 return; | |
| 344 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle); | |
| 345 | |
| 346 if (!SupportsSSLClientAuth(cert_handle)) | |
| 347 return; | |
| 348 | |
| 349 scoped_refptr<X509Certificate> cert( | |
| 350 x509_util::CreateX509CertificateFromSecCertificate( | |
| 351 cert_handle, std::vector<SecCertificateRef>())); | |
| 352 if (!cert) | |
| 353 return; | |
| 354 | |
| 355 if (preferred_identity && CFEqual(preferred_identity, identity)) { | |
| 356 // Only one certificate should match. | |
| 357 DCHECK(!preferred_cert.get()); | |
| 358 preferred_cert = cert; | |
| 359 } else { | |
| 360 regular_certs.push_back(cert); | |
| 361 } | |
| 362 } | |
| 363 | |
| 324 bool ClientCertStoreMac::SelectClientCertsForTesting( | 364 bool ClientCertStoreMac::SelectClientCertsForTesting( |
| 325 const CertificateList& input_certs, | 365 const CertificateList& input_certs, |
| 326 const SSLCertRequestInfo& request, | 366 const SSLCertRequestInfo& request, |
| 327 CertificateList* selected_certs) { | 367 CertificateList* selected_certs) { |
| 328 GetClientCertsImpl(NULL, input_certs, request, false, selected_certs); | 368 GetClientCertsImpl(NULL, input_certs, request, false, selected_certs); |
| 329 return true; | 369 return true; |
| 330 } | 370 } |
| 331 | 371 |
| 332 bool ClientCertStoreMac::SelectClientCertsGivenPreferredForTesting( | 372 bool ClientCertStoreMac::SelectClientCertsGivenPreferredForTesting( |
| 333 const scoped_refptr<X509Certificate>& preferred_cert, | 373 const scoped_refptr<X509Certificate>& preferred_cert, |
| 334 const CertificateList& regular_certs, | 374 const CertificateList& regular_certs, |
| 335 const SSLCertRequestInfo& request, | 375 const SSLCertRequestInfo& request, |
| 336 CertificateList* selected_certs) { | 376 CertificateList* selected_certs) { |
| 337 GetClientCertsImpl( | 377 GetClientCertsImpl( |
| 338 preferred_cert, regular_certs, request, false, selected_certs); | 378 preferred_cert, regular_certs, request, false, selected_certs); |
| 339 return true; | 379 return true; |
| 340 } | 380 } |
| 341 | 381 |
| 342 #pragma clang diagnostic pop // "-Wdeprecated-declarations" | 382 #pragma clang diagnostic pop // "-Wdeprecated-declarations" |
| 343 | 383 |
| 344 } // namespace net | 384 } // namespace net |
| OLD | NEW |