Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(636)

Side by Side Diff: net/ssl/client_cert_store_mac.cc

Issue 2910893002: Improved support for loading client certificates on smart cards on macOS
Patch Set: Improved support for loading client certificates on smart cards on macOS Created 3 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/ssl/client_cert_store_mac.h" 5 #include "net/ssl/client_cert_store_mac.h"
6 6
7 #include <CommonCrypto/CommonDigest.h> 7 #include <CommonCrypto/CommonDigest.h>
8 #include <CoreFoundation/CFArray.h> 8 #include <CoreFoundation/CFArray.h>
9 #include <CoreServices/CoreServices.h> 9 #include <CoreServices/CoreServices.h>
10 #include <Security/SecBase.h> 10 #include <Security/SecBase.h>
11 #include <Security/Security.h> 11 #include <Security/Security.h>
12 12
13 #include <algorithm> 13 #include <algorithm>
14 #include <string> 14 #include <string>
15 #include <utility>
16 #include <vector>
15 17
16 #include "base/callback.h" 18 #include "base/callback.h"
17 #include "base/logging.h" 19 #include "base/logging.h"
18 #include "base/mac/mac_logging.h" 20 #include "base/mac/mac_logging.h"
19 #include "base/mac/scoped_cftyperef.h" 21 #include "base/mac/scoped_cftyperef.h"
20 #include "base/strings/sys_string_conversions.h" 22 #include "base/strings/sys_string_conversions.h"
21 #include "base/synchronization/lock.h" 23 #include "base/synchronization/lock.h"
22 #include "crypto/mac_security_services_lock.h" 24 #include "crypto/mac_security_services_lock.h"
23 #include "net/base/host_port_pair.h" 25 #include "net/base/host_port_pair.h"
24 #include "net/cert/x509_util.h" 26 #include "net/cert/x509_util.h"
(...skipping 205 matching lines...) Expand 10 before | Expand all | Expand 10 after
230 } 232 }
231 sort(sort_begin, sort_end, x509_util::ClientCertSorter()); 233 sort(sort_begin, sort_end, x509_util::ClientCertSorter());
232 } 234 }
233 235
234 } // namespace 236 } // namespace
235 237
236 ClientCertStoreMac::ClientCertStoreMac() {} 238 ClientCertStoreMac::ClientCertStoreMac() {}
237 239
238 ClientCertStoreMac::~ClientCertStoreMac() {} 240 ClientCertStoreMac::~ClientCertStoreMac() {}
239 241
242 // Given an |identity|, identifies its corresponding certificate, and either
243 // adds it to |regular_certs| or assigns it to |preferred_cert|, if the
244 // |identity| matches the |preferred_identity|.
245 void AddIdentity(SecIdentityRef identity,
246 SecIdentityRef preferred_identity,
247 CertificateList* regular_certs,
248 scoped_refptr<X509Certificate>* preferred_cert);
249
240 void ClientCertStoreMac::GetClientCerts( 250 void ClientCertStoreMac::GetClientCerts(
241 const SSLCertRequestInfo& request, 251 const SSLCertRequestInfo& request,
242 const ClientCertListCallback& callback) { 252 const ClientCertListCallback& callback) {
243 std::string server_domain = request.host_and_port.host(); 253 std::string server_domain = request.host_and_port.host();
244 254
245 ScopedCFTypeRef<SecIdentityRef> preferred_identity; 255 ScopedCFTypeRef<SecIdentityRef> preferred_identity;
246 if (!server_domain.empty()) { 256 if (!server_domain.empty()) {
247 // See if there's an identity preference for this domain: 257 // See if there's an identity preference for this domain:
248 ScopedCFTypeRef<CFStringRef> domain_str( 258 ScopedCFTypeRef<CFStringRef> domain_str(
249 base::SysUTF8ToCFStringRef("https://" + server_domain)); 259 base::SysUTF8ToCFStringRef("https://" + server_domain));
(...skipping 27 matching lines...) Expand all
277 ScopedCFTypeRef<SecIdentitySearchRef> scoped_search(search); 287 ScopedCFTypeRef<SecIdentitySearchRef> scoped_search(search);
278 while (!err) { 288 while (!err) {
279 SecIdentityRef identity = NULL; 289 SecIdentityRef identity = NULL;
280 { 290 {
281 base::AutoLock lock(crypto::GetMacSecurityServicesLock()); 291 base::AutoLock lock(crypto::GetMacSecurityServicesLock());
282 err = SecIdentitySearchCopyNext(search, &identity); 292 err = SecIdentitySearchCopyNext(search, &identity);
283 } 293 }
284 if (err) 294 if (err)
285 break; 295 break;
286 ScopedCFTypeRef<SecIdentityRef> scoped_identity(identity); 296 ScopedCFTypeRef<SecIdentityRef> scoped_identity(identity);
287 297 AddIdentity(identity, preferred_identity, &regular_certs, &preferred_cert);
288 SecCertificateRef cert_handle;
289 err = SecIdentityCopyCertificate(identity, &cert_handle);
290 if (err != noErr)
291 continue;
292 ScopedCFTypeRef<SecCertificateRef> scoped_cert_handle(cert_handle);
293
294 if (!SupportsSSLClientAuth(cert_handle))
295 continue;
296
297 scoped_refptr<X509Certificate> cert(
298 x509_util::CreateX509CertificateFromSecCertificate(
299 cert_handle, std::vector<SecCertificateRef>()));
300 if (!cert)
301 continue;
302
303 if (preferred_identity && CFEqual(preferred_identity, identity)) {
304 // Only one certificate should match.
305 DCHECK(!preferred_cert.get());
306 preferred_cert = cert;
307 } else {
308 regular_certs.push_back(cert);
309 }
310 } 298 }
311 299
312 if (err != errSecItemNotFound) { 300 if (err != errSecItemNotFound) {
313 OSSTATUS_LOG(ERROR, err) << "SecIdentitySearch error"; 301 OSSTATUS_LOG(ERROR, err) << "SecIdentitySearch error";
314 callback.Run(CertificateList()); 302 callback.Run(CertificateList());
315 return; 303 return;
316 } 304 }
317 305
306 // macOS provides two ways to search for identities. SecIdentitySearchCreate()
awong 2017/06/07 00:35:24 macOS -> MacOS codesearch shows it's about 8x mo
mattm 2017/06/07 01:07:56 Well, Apple did change the official name to "macOS
awong 2017/06/07 19:40:14 garagh. okay, ignore my comment then.
307 // is deprecated, as it relies on CSSM_KEYUSE_SIGN (part of the deprecated
308 // CDSM/CSSA implementation), but is necessary to return some certificates
309 // that would otherwise not be returned by SecItemCopyMatching(), which is the
310 // non-deprecated way. However, SecIdentitySearchCreate() will not return all
311 // items, particularly smart-card based identities, so it's necessary to call
312 // both functions.
313 const void* keys[] = {
awong 2017/06/07 00:35:24 Should these really be stack allocated? Make them
agaynor 2017/06/07 21:19:47 Done.
314 kSecClass, kSecMatchLimit, kSecReturnRef, kSecAttrCanSign,
315 };
316 const void* values[] = {
317 kSecClassIdentity, kSecMatchLimitAll, kCFBooleanTrue, kCFBooleanTrue,
318 };
319 ScopedCFTypeRef<CFDictionaryRef> query(CFDictionaryCreate(
320 kCFAllocatorDefault, keys, values, arraysize(values),
321 &kCFTypeDictionaryKeyCallBacks, &kCFTypeDictionaryValueCallBacks));
322 ScopedCFTypeRef<CFArrayRef> result;
323 {
324 base::AutoLock lock(crypto::GetMacSecurityServicesLock());
325 err = SecItemCopyMatching(
326 query, reinterpret_cast<CFTypeRef*>(result.InitializeInto()));
327 }
328 if (!err) {
329 for (CFIndex i = 0; i < CFArrayGetCount(result); i++) {
330 void* item = const_cast<void*>(CFArrayGetValueAtIndex(result, i));
331 AddIdentity(reinterpret_cast<SecIdentityRef>(item), preferred_identity,
332 &regular_certs, &preferred_cert);
333 }
334 }
335
318 CertificateList selected_certs; 336 CertificateList selected_certs;
319 GetClientCertsImpl(preferred_cert, regular_certs, request, true, 337 GetClientCertsImpl(preferred_cert, regular_certs, request, true,
320 &selected_certs); 338 &selected_certs);
321 callback.Run(std::move(selected_certs)); 339 callback.Run(std::move(selected_certs));
322 } 340 }
323 341
342 void AddIdentity(SecIdentityRef identity,
343 SecIdentityRef preferred_identity,
344 CertificateList* regular_certs,
345 scoped_refptr<X509Certificate>* preferred_cert) {
346 OSStatus err;
347 ScopedCFTypeRef<SecCertificateRef> cert_handle;
348 err = SecIdentityCopyCertificate(identity, cert_handle.InitializeInto());
349 if (err != noErr)
350 return;
351
352 if (!SupportsSSLClientAuth(cert_handle))
353 return;
354
355 scoped_refptr<X509Certificate> cert(
356 x509_util::CreateX509CertificateFromSecCertificate(
357 cert_handle, std::vector<SecCertificateRef>()));
358 if (!cert)
359 return;
360
361 if (preferred_identity && CFEqual(preferred_identity, identity)) {
362 // Only one certificate should match.
363 DCHECK(!preferred_cert->get());
awong 2017/06/07 00:35:24 If 2 match in production, and this just uses the l
mattm 2017/06/07 01:07:56 It's which one will be listed first in the client
364 *preferred_cert = cert;
365 } else {
366 regular_certs->push_back(cert);
367 }
368 }
369
324 bool ClientCertStoreMac::SelectClientCertsForTesting( 370 bool ClientCertStoreMac::SelectClientCertsForTesting(
325 const CertificateList& input_certs, 371 const CertificateList& input_certs,
326 const SSLCertRequestInfo& request, 372 const SSLCertRequestInfo& request,
327 CertificateList* selected_certs) { 373 CertificateList* selected_certs) {
328 GetClientCertsImpl(NULL, input_certs, request, false, selected_certs); 374 GetClientCertsImpl(NULL, input_certs, request, false, selected_certs);
329 return true; 375 return true;
330 } 376 }
331 377
332 bool ClientCertStoreMac::SelectClientCertsGivenPreferredForTesting( 378 bool ClientCertStoreMac::SelectClientCertsGivenPreferredForTesting(
333 const scoped_refptr<X509Certificate>& preferred_cert, 379 const scoped_refptr<X509Certificate>& preferred_cert,
334 const CertificateList& regular_certs, 380 const CertificateList& regular_certs,
335 const SSLCertRequestInfo& request, 381 const SSLCertRequestInfo& request,
336 CertificateList* selected_certs) { 382 CertificateList* selected_certs) {
337 GetClientCertsImpl( 383 GetClientCertsImpl(
338 preferred_cert, regular_certs, request, false, selected_certs); 384 preferred_cert, regular_certs, request, false, selected_certs);
339 return true; 385 return true;
340 } 386 }
341 387
342 #pragma clang diagnostic pop // "-Wdeprecated-declarations" 388 #pragma clang diagnostic pop // "-Wdeprecated-declarations"
343 389
344 } // namespace net 390 } // namespace net
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698