Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(146)

Side by Side Diff: net/ssl/client_cert_store_mac.cc

Issue 2910893002: Improved support for loading client certificates on smart cards on macOS
Patch Set: Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/ssl/client_cert_store_mac.h" 5 #include "net/ssl/client_cert_store_mac.h"
6 6
7 #include <CommonCrypto/CommonDigest.h> 7 #include <CommonCrypto/CommonDigest.h>
8 #include <CoreFoundation/CFArray.h> 8 #include <CoreFoundation/CFArray.h>
9 #include <CoreServices/CoreServices.h> 9 #include <CoreServices/CoreServices.h>
10 #include <Security/SecBase.h> 10 #include <Security/SecBase.h>
(...skipping 266 matching lines...) Expand 10 before | Expand all | Expand 10 after
277 ScopedCFTypeRef<SecIdentitySearchRef> scoped_search(search); 277 ScopedCFTypeRef<SecIdentitySearchRef> scoped_search(search);
278 while (!err) { 278 while (!err) {
279 SecIdentityRef identity = NULL; 279 SecIdentityRef identity = NULL;
280 { 280 {
281 base::AutoLock lock(crypto::GetMacSecurityServicesLock()); 281 base::AutoLock lock(crypto::GetMacSecurityServicesLock());
282 err = SecIdentitySearchCopyNext(search, &identity); 282 err = SecIdentitySearchCopyNext(search, &identity);
283 } 283 }
284 if (err) 284 if (err)
285 break; 285 break;
286 ScopedCFTypeRef<SecIdentityRef> scoped_identity(identity); 286 ScopedCFTypeRef<SecIdentityRef> scoped_identity(identity);
287 287 AddIdentity(regular_certs, preferred_cert, preferred_identity.get(), identit y);
288 SecCertificateRef cert_handle;
289 err = SecIdentityCopyCertificate(identity, &cert_handle);
290 if (err != noErr)
291 continue;
292 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
293
294 if (!SupportsSSLClientAuth(cert_handle))
295 continue;
296
297 scoped_refptr<X509Certificate> cert(
298 x509_util::CreateX509CertificateFromSecCertificate(
299 cert_handle, std::vector<SecCertificateRef>()));
300 if (!cert)
301 continue;
302
303 if (preferred_identity && CFEqual(preferred_identity, identity)) {
304 // Only one certificate should match.
305 DCHECK(!preferred_cert.get());
306 preferred_cert = cert;
307 } else {
308 regular_certs.push_back(cert);
309 }
310 } 288 }
311 289
312 if (err != errSecItemNotFound) { 290 if (err != errSecItemNotFound) {
313 OSSTATUS_LOG(ERROR, err) << "SecIdentitySearch error"; 291 OSSTATUS_LOG(ERROR, err) << "SecIdentitySearch error";
314 callback.Run(CertificateList()); 292 callback.Run(CertificateList());
315 return; 293 return;
316 } 294 }
317 295
296 // For reasons I don't understand, macOS has two different ways of querying
297 // for client certificate identities. The way we just tried will miss some
298 // smart card based certificates, and this way misses some soft certificates.
Ryan Sleevi 2017/05/30 18:00:01 We try to avoid pronouns in comments (I/we) and tr
agaynor 2017/05/31 02:37:33 Done.
299 const void *keys[] = {
Ryan Sleevi 2017/05/30 18:00:01 You can use "git cl format" to ensure this is prop
Ryan Sleevi 2017/05/30 18:00:01 So, I _believe_ for correctness, that kSecAttrCanS
agaynor 2017/05/31 02:37:33 Done.
agaynor 2017/05/31 02:37:33 It's a boring old RSA key. I've added |kSecAttrCan
mattm 2017/06/05 23:34:27 Looking at that code a bit, it seems that SecItemC
300 kSecClass,
301 kSecMatchLimit,
302 kSecReturnRef,
303 };
304 const void *values[] = {
305 kSecClassIdentity,
306 kSecMatchLimitAll,
307 kCFBooleanTrue,
308 };
309 CFDictionaryRef query = CFDictionaryCreate(
Ryan Sleevi 2017/05/30 18:00:01 You can see we used the ScopedCFTypeRef C++ helper
agaynor 2017/05/31 02:37:33 Done.
310 kCFAllocatorDefault,
311 keys,
312 values,
313 sizeof(values) / sizeof(values[0]),
314 &kCFTypeDictionaryKeyCallBacks,
315 &kCFTypeDictionaryValueCallBacks
316 );
317 CFArrayRef result = NULL;
318 err = SecItemCopyMatching(query, (CFTypeRef *)&result);
Ryan Sleevi 2017/05/30 18:00:00 Note: Chromium explicitly uses C++ casts rather th
agaynor 2017/05/31 02:37:33 Done.
319 if (!err) {
Ryan Sleevi 2017/05/30 18:00:01 In general, we try to handle the error case first,
320 for (CFIndex i = 0; i < CFArrayGetCount(result); i++) {
321 CFTypeRef item = CFArrayGetValueAtIndex(result, i);
322 AddIdentity(regular_certs, preferred_cert, preferred_identity, (SecIdentit yRef)item);
323 }
324 }
325 CFRelease(query);
326 CFRelease(result);
327
318 CertificateList selected_certs; 328 CertificateList selected_certs;
319 GetClientCertsImpl(preferred_cert, regular_certs, request, true, 329 GetClientCertsImpl(preferred_cert, regular_certs, request, true,
320 &selected_certs); 330 &selected_certs);
321 callback.Run(std::move(selected_certs)); 331 callback.Run(std::move(selected_certs));
322 } 332 }
323 333
334 void ClientCertStoreMac::AddIdentity(
335 CertificateList& regular_certs,
336 scoped_refptr<X509Certificate>& preferred_cert,
337 SecIdentityRef preferred_identity,
338 SecIdentityRef identity) {
339 OSStatus err;
340 SecCertificateRef cert_handle;
Ryan Sleevi 2017/05/30 18:00:01 .InitializeInto :)
agaynor 2017/05/31 02:37:33 Done.
341 err = SecIdentityCopyCertificate(identity, &cert_handle);
342 if (err != noErr)
343 return;
344 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
345
346 if (!SupportsSSLClientAuth(cert_handle))
347 return;
348
349 scoped_refptr<X509Certificate> cert(
350 x509_util::CreateX509CertificateFromSecCertificate(
351 cert_handle, std::vector<SecCertificateRef>()));
352 if (!cert)
353 return;
354
355 if (preferred_identity && CFEqual(preferred_identity, identity)) {
356 // Only one certificate should match.
357 DCHECK(!preferred_cert.get());
358 preferred_cert = cert;
359 } else {
360 regular_certs.push_back(cert);
361 }
362 }
363
324 bool ClientCertStoreMac::SelectClientCertsForTesting( 364 bool ClientCertStoreMac::SelectClientCertsForTesting(
325 const CertificateList& input_certs, 365 const CertificateList& input_certs,
326 const SSLCertRequestInfo& request, 366 const SSLCertRequestInfo& request,
327 CertificateList* selected_certs) { 367 CertificateList* selected_certs) {
328 GetClientCertsImpl(NULL, input_certs, request, false, selected_certs); 368 GetClientCertsImpl(NULL, input_certs, request, false, selected_certs);
329 return true; 369 return true;
330 } 370 }
331 371
332 bool ClientCertStoreMac::SelectClientCertsGivenPreferredForTesting( 372 bool ClientCertStoreMac::SelectClientCertsGivenPreferredForTesting(
333 const scoped_refptr<X509Certificate>& preferred_cert, 373 const scoped_refptr<X509Certificate>& preferred_cert,
334 const CertificateList& regular_certs, 374 const CertificateList& regular_certs,
335 const SSLCertRequestInfo& request, 375 const SSLCertRequestInfo& request,
336 CertificateList* selected_certs) { 376 CertificateList* selected_certs) {
337 GetClientCertsImpl( 377 GetClientCertsImpl(
338 preferred_cert, regular_certs, request, false, selected_certs); 378 preferred_cert, regular_certs, request, false, selected_certs);
339 return true; 379 return true;
340 } 380 }
341 381
342 #pragma clang diagnostic pop // "-Wdeprecated-declarations" 382 #pragma clang diagnostic pop // "-Wdeprecated-declarations"
343 383
344 } // namespace net 384 } // namespace net
OLDNEW
« net/ssl/client_cert_store_mac.h ('K') | « net/ssl/client_cert_store_mac.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698