Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/ssl/openssl_platform_key.h" | |
| 6 | |
| 7 #include <openssl/err.h> | |
| 8 #include <openssl/evp.h> | |
| 9 #include <openssl/rsa.h> | |
| 10 | |
| 11 #include <Security/cssm.h> | |
| 12 #include <Security/SecBase.h> | |
| 13 #include <Security/SecCertificate.h> | |
| 14 #include <Security/SecIdentity.h> | |
| 15 #include <Security/SecKey.h> | |
| 16 | |
| 17 #include "base/lazy_instance.h" | |
| 18 #include "base/location.h" | |
| 19 #include "base/logging.h" | |
| 20 #include "base/mac/mac_logging.h" | |
| 21 #include "base/mac/scoped_cftyperef.h" | |
| 22 #include "base/memory/scoped_ptr.h" | |
| 23 #include "base/synchronization/lock.h" | |
| 24 #include "crypto/mac_security_services_lock.h" | |
| 25 #include "net/base/net_errors.h" | |
| 26 #include "net/cert/x509_certificate.h" | |
| 27 #include "net/ssl/openssl_ssl_util.h" | |
| 28 | |
| 29 namespace net { | |
| 30 | |
| 31 namespace { | |
| 32 | |
| 33 class ScopedCSSM_CC_HANDLE { | |
| 34 public: | |
| 35 ScopedCSSM_CC_HANDLE() : handle_(0) { | |
| 36 } | |
| 37 | |
| 38 ~ScopedCSSM_CC_HANDLE() { | |
| 39 reset(); | |
| 40 } | |
| 41 | |
| 42 CSSM_CC_HANDLE get() const { | |
| 43 return handle_; | |
| 44 } | |
| 45 | |
| 46 void reset() { | |
| 47 if (handle_) | |
| 48 CSSM_DeleteContext(handle_); | |
| 49 handle_ = 0; | |
| 50 } | |
| 51 | |
| 52 CSSM_CC_HANDLE* InitializeInto() { | |
| 53 reset(); | |
| 54 return &handle_; | |
| 55 } | |
| 56 private: | |
| 57 CSSM_CC_HANDLE handle_; | |
| 58 }; | |
| 59 | |
| 60 // Looks up the private key for |certificate| in KeyChain and returns | |
| 61 // a SecKeyRef or NULL on failure. The caller takes ownership of the | |
| 62 // result. | |
| 63 SecKeyRef FetchSecKeyRefForCertificate(const X509Certificate* certificate) { | |
| 64 OSStatus status; | |
| 65 base::ScopedCFTypeRef<SecIdentityRef> identity; | |
| 66 { | |
| 67 base::AutoLock lock(crypto::GetMacSecurityServicesLock()); | |
| 68 status = SecIdentityCreateWithCertificate( | |
| 69 NULL, certificate->os_cert_handle(), identity.InitializeInto()); | |
| 70 } | |
| 71 if (status != noErr) { | |
| 72 OSSTATUS_LOG(WARNING, status); | |
| 73 return NULL; | |
| 74 } | |
| 75 | |
| 76 base::ScopedCFTypeRef<SecKeyRef> private_key; | |
| 77 status = SecIdentityCopyPrivateKey(identity, private_key.InitializeInto()); | |
| 78 if (status != noErr) { | |
| 79 OSSTATUS_LOG(WARNING, status); | |
| 80 return NULL; | |
| 81 } | |
| 82 | |
| 83 return private_key.release(); | |
| 84 } | |
| 85 | |
| 86 | |
| 87 void ExDataFree(void* parent, | |
| 88 void* ptr, | |
| 89 CRYPTO_EX_DATA* ex_data, | |
| 90 int idx, | |
| 91 long argl, void* argp) { | |
| 92 SecKeyRef key = reinterpret_cast<SecKeyRef>(ptr); | |
| 93 if (key == NULL) | |
| 94 return; | |
| 95 | |
| 96 CRYPTO_set_ex_data(ex_data, idx, NULL); | |
| 97 CFRelease(key); | |
| 98 } | |
| 99 | |
| 100 int ExDataDup(CRYPTO_EX_DATA* to, | |
| 101 CRYPTO_EX_DATA* from, | |
| 102 void* from_d, | |
| 103 int idx, | |
| 104 long argl, | |
| 105 void* argp) { | |
| 106 // This should never actually get called. | |
| 107 NOTREACHED(); | |
| 108 SecKeyRef* key = reinterpret_cast<SecKeyRef*>(from_d); | |
| 109 if (*key) | |
| 110 CFRetain(*key); | |
| 111 return 0; | |
| 112 } | |
| 113 | |
| 114 class OpenSSLExDataIndices { | |
| 115 public: | |
| 116 OpenSSLExDataIndices() | |
| 117 : rsa_index_(RSA_get_ex_new_index(0, NULL, NULL, | |
| 118 ExDataDup, ExDataFree)) { | |
| 119 } | |
| 120 | |
| 121 int rsa_index() const { return rsa_index_; } | |
| 122 | |
| 123 private: | |
| 124 int rsa_index_; | |
| 125 }; | |
| 126 base::LazyInstance<OpenSSLExDataIndices>::Leaky g_indices = | |
| 127 LAZY_INSTANCE_INITIALIZER; | |
| 128 | |
| 129 int RsaIndex() { | |
| 130 return g_indices.Get().rsa_index(); | |
| 131 } | |
| 132 | |
| 133 int RsaMethodPubEnc(int flen, | |
| 134 const unsigned char* from, | |
| 135 unsigned char* to, | |
| 136 RSA* rsa, | |
| 137 int padding) { | |
| 138 NOTIMPLEMENTED(); | |
| 139 RSAerr(RSA_F_RSA_PUBLIC_ENCRYPT, RSA_R_RSA_OPERATIONS_NOT_SUPPORTED); | |
| 140 return -1; | |
| 141 } | |
| 142 | |
| 143 int RsaMethodPubDec(int flen, | |
| 144 const unsigned char* from, | |
| 145 unsigned char* to, | |
| 146 RSA* rsa, | |
| 147 int padding) { | |
| 148 NOTIMPLEMENTED(); | |
| 149 RSAerr(RSA_F_RSA_PUBLIC_DECRYPT, RSA_R_RSA_OPERATIONS_NOT_SUPPORTED); | |
| 150 return -1; | |
| 151 } | |
| 152 | |
| 153 int RsaMethodPrivEnc(int flen, | |
| 154 const unsigned char *from, | |
| 155 unsigned char *to, | |
| 156 RSA *rsa, | |
| 157 int padding) { | |
| 158 // Only support PKCS#1 padding. | |
| 159 DCHECK_EQ(RSA_PKCS1_PADDING, padding); | |
| 160 if (padding != RSA_PKCS1_PADDING) { | |
| 161 RSAerr(RSA_F_RSA_PRIVATE_ENCRYPT, RSA_R_UNKNOWN_PADDING_TYPE); | |
| 162 return -1; | |
| 163 } | |
| 164 | |
| 165 SecKeyRef key = | |
| 166 reinterpret_cast<SecKeyRef>(RSA_get_ex_data(rsa, RsaIndex())); | |
| 167 if (!key) { | |
| 168 LOG(WARNING) << "Null SecKeyRef passed to RsaMethodPrivEnc!"; | |
| 169 RSAerr(RSA_F_RSA_PRIVATE_ENCRYPT, ERR_R_INTERNAL_ERROR); | |
| 170 return -1; | |
| 171 } | |
| 172 | |
| 173 CSSM_CSP_HANDLE csp_handle; | |
| 174 OSStatus status = SecKeyGetCSPHandle(key, &csp_handle); | |
| 175 if (status != noErr) { | |
| 176 RSAerr(RSA_F_RSA_PRIVATE_ENCRYPT, ERR_R_INTERNAL_ERROR); | |
| 177 return -1; | |
| 178 } | |
| 179 | |
| 180 const CSSM_KEY* cssm_key; | |
| 181 status = SecKeyGetCSSMKey(key, &cssm_key); | |
| 182 if (status != noErr) { | |
| 183 RSAerr(RSA_F_RSA_PRIVATE_ENCRYPT, ERR_R_INTERNAL_ERROR); | |
| 184 return -1; | |
| 185 } | |
| 186 DCHECK_EQ(CSSM_ALGID_RSA, cssm_key->KeyHeader.AlgorithmId); | |
| 187 | |
| 188 // TODO(davidben): (Taken from TODO(rsleevi) in sslplatf.c) Should | |
| 189 // it be kSecCredentialTypeNoUI? In Win32, at least, you can prevent | |
| 190 // the UI by setting the provider handle on the certificate to be | |
| 191 // opened with CRYPT_SILENT, but is there an equivalent? | |
| 192 const CSSM_ACCESS_CREDENTIALS * cssm_creds = NULL; | |
| 193 status = SecKeyGetCredentials(key, CSSM_ACL_AUTHORIZATION_SIGN, | |
| 194 kSecCredentialTypeDefault, &cssm_creds); | |
| 195 if (status != noErr) { | |
| 196 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED); | |
| 197 return -1; | |
| 198 } | |
| 199 | |
| 200 ScopedCSSM_CC_HANDLE cssm_signature; | |
| 201 if (CSSM_CSP_CreateSignatureContext( | |
| 202 csp_handle, CSSM_ALGID_RSA, cssm_creds, | |
| 203 cssm_key, cssm_signature.InitializeInto()) != CSSM_OK) { | |
| 204 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED); | |
| 205 return -1; | |
| 206 } | |
| 207 | |
| 208 // Set RSA blinding. | |
| 209 CSSM_CONTEXT_ATTRIBUTE blinding_attr; | |
| 210 blinding_attr.AttributeType = CSSM_ATTRIBUTE_RSA_BLINDING; | |
| 211 blinding_attr.AttributeLength = sizeof(uint32); | |
| 212 blinding_attr.Attribute.Uint32 = 1; | |
| 213 if (CSSM_UpdateContextAttributes( | |
| 214 cssm_signature.get(), 1, &blinding_attr) != CSSM_OK) { | |
| 215 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED); | |
| 216 return -1; | |
| 217 } | |
| 218 | |
| 219 CSSM_DATA hash_data; | |
| 220 hash_data.Length = flen; | |
| 221 hash_data.Data = const_cast<uint8*>(from); | |
| 222 | |
| 223 CSSM_DATA signature_data; | |
| 224 signature_data.Length = RSA_size(rsa); | |
| 225 signature_data.Data = to; | |
| 226 | |
| 227 if (CSSM_SignData(cssm_signature.get(), &hash_data, 1, | |
| 228 CSSM_ALGID_NONE, &signature_data) != CSSM_OK) { | |
| 229 OpenSSLPutNetError(FROM_HERE, ERR_SSL_CLIENT_AUTH_SIGNATURE_FAILED); | |
| 230 return -1; | |
| 231 } | |
| 232 | |
| 233 return signature_data.Length; | |
| 234 } | |
| 235 | |
| 236 int RsaMethodPrivDec(int flen, | |
| 237 const unsigned char* from, | |
| 238 unsigned char* to, | |
| 239 RSA* rsa, | |
| 240 int padding) { | |
| 241 NOTIMPLEMENTED(); | |
| 242 RSAerr(RSA_F_RSA_PRIVATE_DECRYPT, RSA_R_RSA_OPERATIONS_NOT_SUPPORTED); | |
| 243 return -1; | |
| 244 } | |
| 245 | |
| 246 const RSA_METHOD mac_rsa_method = { | |
| 247 /* .name = */ "Mac signing-only RSA method", | |
| 248 /* .rsa_pub_enc = */ RsaMethodPubEnc, | |
| 249 /* .rsa_pub_dec = */ RsaMethodPubDec, | |
| 250 /* .rsa_priv_enc = */ RsaMethodPrivEnc, | |
| 251 /* .rsa_priv_dec = */ RsaMethodPrivDec, | |
| 252 /* .rsa_mod_exp = */ NULL, | |
| 253 /* .bn_mod_exp = */ NULL, | |
| 254 /* .init = */ NULL, | |
| 255 /* .finish = */ NULL, | |
| 256 // This flag is necessary to tell OpenSSL to avoid checking the content | |
| 257 // (i.e. internal fields) of the private key. Otherwise, it will complain | |
| 258 // it's not valid for the certificate. | |
| 259 /* .flags = */ RSA_METHOD_FLAG_NO_CHECK, | |
| 260 /* .app_data = */ NULL, | |
| 261 /* .rsa_sign = */ NULL, | |
| 262 /* .rsa_verify = */ NULL, | |
| 263 /* .rsa_keygen = */ NULL, | |
| 264 }; | |
| 265 | |
| 266 crypto::ScopedEVP_PKEY CreateRSAWrapper(SecKeyRef key, | |
| 267 const CSSM_KEY* cssm_key) { | |
| 268 crypto::ScopedRSA rsa(RSA_new()); | |
| 269 if (!rsa) | |
| 270 return crypto::ScopedEVP_PKEY(); | |
| 271 RSA_set_method(rsa.get(), &mac_rsa_method); | |
| 272 CFRetain(key); | |
| 273 RSA_set_ex_data(rsa.get(), RsaIndex(), key); | |
| 274 | |
| 275 // HACK: RSA_size() doesn't work with custom RSA_METHODs. To ensure that | |
| 276 // it will return the right value, set the 'n' field of the RSA object | |
| 277 // to match the private key's modulus. | |
| 278 // TODO(davidben): Avoid this after the BoringSSL transition. | |
| 279 size_t rsa_size = (cssm_key->KeyHeader.LogicalKeySizeInBits + 7) / 8; | |
| 280 std::vector<uint8_t> bogus(rsa_size, 0xFF); | |
| 281 crypto::ScopedBIGNUM bn(BN_bin2bn(&bogus[0], bogus.size(), NULL)); | |
| 282 if (!bn) | |
| 283 return crypto::ScopedEVP_PKEY(); | |
| 284 rsa->n = bn.release(); | |
| 285 | |
| 286 DCHECK_EQ(rsa_size, (size_t)RSA_size(rsa.get())); | |
| 287 | |
| 288 crypto::ScopedEVP_PKEY pkey(EVP_PKEY_new()); | |
| 289 if (!pkey) | |
| 290 return crypto::ScopedEVP_PKEY(); | |
| 291 | |
| 292 if (!EVP_PKEY_set1_RSA(pkey.get(), rsa.get())) | |
| 293 return crypto::ScopedEVP_PKEY(); | |
| 294 | |
| 295 return pkey.Pass(); | |
| 296 } | |
| 297 | |
| 298 crypto::ScopedEVP_PKEY CreateECDSAWrapper(SecKeyRef key) { | |
| 299 // TODO(davidben): Implement ECDSA after BoringSSL transition. Most | |
| 300 // of the signing implementation can be shared with RsaMethodPrivEnc | |
| 301 // and pulled into a common function. | |
| 302 NOTIMPLEMENTED(); | |
| 303 return crypto::ScopedEVP_PKEY(); | |
| 304 } | |
| 305 | |
| 306 crypto::ScopedEVP_PKEY CreatePkeyWrapper(SecKeyRef key) { | |
| 307 const CSSM_KEY* cssm_key; | |
| 308 OSStatus status = SecKeyGetCSSMKey(key, &cssm_key); | |
| 309 if (status != noErr) | |
| 310 return crypto::ScopedEVP_PKEY(); | |
| 311 | |
| 312 switch (cssm_key->KeyHeader.AlgorithmId) { | |
| 313 case CSSM_ALGID_RSA: | |
| 314 return CreateRSAWrapper(key, cssm_key); | |
| 315 case CSSM_ALGID_ECDSA: | |
| 316 return CreateECDSAWrapper(key); | |
| 317 default: | |
| 318 // TODO(davidben): Filter out anything other than ECDSA and RSA | |
| 319 // elsewhere. We don't support other key types. | |
| 320 NOTREACHED(); | |
| 321 LOG(ERROR) << "Unknown key type"; | |
| 322 return crypto::ScopedEVP_PKEY(); | |
| 323 } | |
| 324 } | |
| 325 | |
| 326 } // namespace | |
| 327 | |
| 328 // Default missing implementation. | |
|
wtc
2014/07/16 00:09:58
What does "missing implementation" mean?
davidben
2014/07/16 16:25:35
Oops, removed.
| |
| 329 crypto::ScopedEVP_PKEY FetchClientCertPrivateKey( | |
| 330 const X509Certificate* certificate) { | |
| 331 // Look up the private key. | |
| 332 base::ScopedCFTypeRef<SecKeyRef> private_key( | |
| 333 FetchSecKeyRefForCertificate(certificate)); | |
| 334 if (!private_key) | |
| 335 return crypto::ScopedEVP_PKEY(); | |
| 336 | |
| 337 // Create an EVP_PKEY wrapper. | |
| 338 return CreatePkeyWrapper(private_key.get()); | |
| 339 } | |
| 340 | |
| 341 } // namespace net | |
| OLD | NEW |