OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/ssl/client_cert_store_impl.h" | 5 #include "net/ssl/client_cert_store_impl.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #define SECURITY_WIN32 // Needs to be defined before including security.h | 10 #define SECURITY_WIN32 // Needs to be defined before including security.h |
11 #include <windows.h> | 11 #include <windows.h> |
12 #include <wincrypt.h> | 12 #include <wincrypt.h> |
13 #include <security.h> | 13 #include <security.h> |
14 | 14 |
| 15 #include "base/callback.h" |
15 #include "base/logging.h" | 16 #include "base/logging.h" |
16 #include "crypto/scoped_capi_types.h" | 17 #include "crypto/scoped_capi_types.h" |
17 #include "net/cert/x509_util.h" | 18 #include "net/cert/x509_util.h" |
18 | 19 |
19 namespace net { | 20 namespace net { |
20 | 21 |
21 namespace { | 22 namespace { |
22 | 23 |
23 // Callback required by Windows API function CertFindChainInStore(). In addition | 24 // Callback required by Windows API function CertFindChainInStore(). In addition |
24 // to filtering by extended/enhanced key usage, we do not show expired | 25 // to filtering by extended/enhanced key usage, we do not show expired |
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
56 // CertFindChainInStore()? | 57 // CertFindChainInStore()? |
57 DWORD size = 0; | 58 DWORD size = 0; |
58 if (!CertGetCertificateContextProperty( | 59 if (!CertGetCertificateContextProperty( |
59 cert_context, CERT_KEY_PROV_INFO_PROP_ID, NULL, &size)) { | 60 cert_context, CERT_KEY_PROV_INFO_PROP_ID, NULL, &size)) { |
60 return FALSE; | 61 return FALSE; |
61 } | 62 } |
62 | 63 |
63 return TRUE; | 64 return TRUE; |
64 } | 65 } |
65 | 66 |
66 bool GetClientCertsImpl(HCERTSTORE cert_store, | 67 void GetClientCertsImpl(HCERTSTORE cert_store, |
67 const SSLCertRequestInfo& request, | 68 const SSLCertRequestInfo& request, |
68 CertificateList* selected_certs) { | 69 CertificateList* selected_certs) { |
69 selected_certs->clear(); | 70 selected_certs->clear(); |
70 | 71 |
71 const size_t auth_count = request.cert_authorities.size(); | 72 const size_t auth_count = request.cert_authorities.size(); |
72 std::vector<CERT_NAME_BLOB> issuers(auth_count); | 73 std::vector<CERT_NAME_BLOB> issuers(auth_count); |
73 for (size_t i = 0; i < auth_count; ++i) { | 74 for (size_t i = 0; i < auth_count; ++i) { |
74 issuers[i].cbData = static_cast<DWORD>(request.cert_authorities[i].size()); | 75 issuers[i].cbData = static_cast<DWORD>(request.cert_authorities[i].size()); |
75 issuers[i].pbData = reinterpret_cast<BYTE*>( | 76 issuers[i].pbData = reinterpret_cast<BYTE*>( |
76 const_cast<char*>(request.cert_authorities[i].data())); | 77 const_cast<char*>(request.cert_authorities[i].data())); |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
131 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( | 132 scoped_refptr<X509Certificate> cert = X509Certificate::CreateFromHandle( |
132 cert_context2, intermediates); | 133 cert_context2, intermediates); |
133 selected_certs->push_back(cert); | 134 selected_certs->push_back(cert); |
134 CertFreeCertificateContext(cert_context2); | 135 CertFreeCertificateContext(cert_context2); |
135 for (size_t i = 0; i < intermediates.size(); ++i) | 136 for (size_t i = 0; i < intermediates.size(); ++i) |
136 CertFreeCertificateContext(intermediates[i]); | 137 CertFreeCertificateContext(intermediates[i]); |
137 } | 138 } |
138 | 139 |
139 std::sort(selected_certs->begin(), selected_certs->end(), | 140 std::sort(selected_certs->begin(), selected_certs->end(), |
140 x509_util::ClientCertSorter()); | 141 x509_util::ClientCertSorter()); |
141 return true; | |
142 } | 142 } |
143 | 143 |
144 } // namespace | 144 } // namespace |
145 | 145 |
146 bool ClientCertStoreImpl::GetClientCerts(const SSLCertRequestInfo& request, | 146 void ClientCertStoreImpl::GetClientCerts(const SSLCertRequestInfo& request, |
147 CertificateList* selected_certs) { | 147 CertificateList* selected_certs, |
| 148 const base::Closure& callback) { |
148 // Client certificates of the user are in the "MY" system certificate store. | 149 // Client certificates of the user are in the "MY" system certificate store. |
149 HCERTSTORE my_cert_store = CertOpenSystemStore(NULL, L"MY"); | 150 HCERTSTORE my_cert_store = CertOpenSystemStore(NULL, L"MY"); |
150 if (!my_cert_store) { | 151 if (!my_cert_store) { |
151 PLOG(ERROR) << "Could not open the \"MY\" system certificate store: "; | 152 PLOG(ERROR) << "Could not open the \"MY\" system certificate store: "; |
152 return false; | 153 selected_certs->clear(); |
| 154 callback.Run(); |
| 155 return; |
153 } | 156 } |
154 | 157 |
155 bool rv = GetClientCertsImpl(my_cert_store, request, selected_certs); | 158 GetClientCertsImpl(my_cert_store, request, selected_certs); |
156 if (!CertCloseStore(my_cert_store, CERT_CLOSE_STORE_CHECK_FLAG)) { | 159 if (!CertCloseStore(my_cert_store, CERT_CLOSE_STORE_CHECK_FLAG)) |
157 PLOG(ERROR) << "Could not close the \"MY\" system certificate store: "; | 160 PLOG(ERROR) << "Could not close the \"MY\" system certificate store: "; |
158 return false; | 161 callback.Run(); |
159 } | |
160 return rv; | |
161 } | 162 } |
162 | 163 |
163 bool ClientCertStoreImpl::SelectClientCertsForTesting( | 164 bool ClientCertStoreImpl::SelectClientCertsForTesting( |
164 const CertificateList& input_certs, | 165 const CertificateList& input_certs, |
165 const SSLCertRequestInfo& request, | 166 const SSLCertRequestInfo& request, |
166 CertificateList* selected_certs) { | 167 CertificateList* selected_certs) { |
167 typedef crypto::ScopedCAPIHandle< | 168 typedef crypto::ScopedCAPIHandle< |
168 HCERTSTORE, | 169 HCERTSTORE, |
169 crypto::CAPIDestroyerWithFlags<HCERTSTORE, | 170 crypto::CAPIDestroyerWithFlags<HCERTSTORE, |
170 CertCloseStore, 0> > ScopedHCERTSTORE; | 171 CertCloseStore, 0> > ScopedHCERTSTORE; |
(...skipping 20 matching lines...) Expand all Loading... |
191 CERT_KEY_PROV_INFO_PROP_ID, | 192 CERT_KEY_PROV_INFO_PROP_ID, |
192 0, &private_key_data)) { | 193 0, &private_key_data)) { |
193 return false; | 194 return false; |
194 } | 195 } |
195 // Decrement the reference count of the certificate (since we requested a | 196 // Decrement the reference count of the certificate (since we requested a |
196 // copy). | 197 // copy). |
197 if (!CertFreeCertificateContext(cert)) | 198 if (!CertFreeCertificateContext(cert)) |
198 return false; | 199 return false; |
199 } | 200 } |
200 | 201 |
201 bool rv = GetClientCertsImpl(test_store.get(), request, selected_certs); | 202 GetClientCertsImpl(test_store.get(), request, selected_certs); |
202 return rv; | 203 return true; |
203 } | 204 } |
204 | 205 |
205 } // namespace net | 206 } // namespace net |
OLD | NEW |