OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/x509_util_openssl.h" | 5 #include "net/cert/x509_util_openssl.h" |
6 | 6 |
7 #include <algorithm> | 7 #include <algorithm> |
8 #include <openssl/asn1.h> | 8 #include <openssl/asn1.h> |
9 | 9 |
10 #include "base/lazy_instance.h" | 10 #include "base/lazy_instance.h" |
11 #include "base/logging.h" | 11 #include "base/logging.h" |
12 #include "base/strings/string_piece.h" | 12 #include "base/strings/string_piece.h" |
| 13 #include "base/strings/string_util.h" |
13 #include "crypto/ec_private_key.h" | 14 #include "crypto/ec_private_key.h" |
14 #include "crypto/openssl_util.h" | 15 #include "crypto/openssl_util.h" |
15 #include "crypto/rsa_private_key.h" | 16 #include "crypto/rsa_private_key.h" |
16 #include "crypto/scoped_openssl_types.h" | 17 #include "crypto/scoped_openssl_types.h" |
17 #include "net/cert/x509_cert_types.h" | 18 #include "net/cert/x509_cert_types.h" |
18 #include "net/cert/x509_util.h" | 19 #include "net/cert/x509_util.h" |
19 | 20 |
20 namespace net { | 21 namespace net { |
21 | 22 |
22 namespace { | 23 namespace { |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
138 return false; | 139 return false; |
139 } | 140 } |
140 | 141 |
141 // Sign it with the private key. | 142 // Sign it with the private key. |
142 if (!X509_sign(cert, key, md)) { | 143 if (!X509_sign(cert, key, md)) { |
143 LOG(ERROR) << "Could not sign certificate with key."; | 144 LOG(ERROR) << "Could not sign certificate with key."; |
144 return false; | 145 return false; |
145 } | 146 } |
146 | 147 |
147 // Convert it into a DER-encoded string copied to |der_encoded|. | 148 // Convert it into a DER-encoded string copied to |der_encoded|. |
148 int der_data_length = i2d_X509(cert, NULL); | 149 return GetDER(cert, der_encoded); |
149 if (der_data_length < 0) | |
150 return false; | |
151 | |
152 der_encoded->resize(der_data_length); | |
153 unsigned char* der_data = | |
154 reinterpret_cast<unsigned char*>(&(*der_encoded)[0]); | |
155 if (i2d_X509(cert, &der_data) < 0) | |
156 return false; | |
157 | |
158 return true; | |
159 } | 150 } |
160 | 151 |
161 // There is no OpenSSL NID for the 'originBoundCertificate' extension OID yet, | 152 // There is no OpenSSL NID for the 'originBoundCertificate' extension OID yet, |
162 // so create a global ASN1_OBJECT lazily with the right parameters. | 153 // so create a global ASN1_OBJECT lazily with the right parameters. |
163 class DomainBoundOid { | 154 class DomainBoundOid { |
164 public: | 155 public: |
165 DomainBoundOid() : obj_(OBJ_txt2obj(kDomainBoundOidText, 1)) { CHECK(obj_); } | 156 DomainBoundOid() : obj_(OBJ_txt2obj(kDomainBoundOidText, 1)) { CHECK(obj_); } |
166 | 157 |
167 ~DomainBoundOid() { | 158 ~DomainBoundOid() { |
168 if (obj_) | 159 if (obj_) |
(...skipping 12 matching lines...) Expand all Loading... |
181 // (iso.org.dod.internet.private.enterprises.google.googleSecurity. | 172 // (iso.org.dod.internet.private.enterprises.google.googleSecurity. |
182 // certificateExtensions.originBoundCertificate) | 173 // certificateExtensions.originBoundCertificate) |
183 const char DomainBoundOid::kDomainBoundOidText[] = "1.3.6.1.4.1.11129.2.1.6"; | 174 const char DomainBoundOid::kDomainBoundOidText[] = "1.3.6.1.4.1.11129.2.1.6"; |
184 | 175 |
185 ASN1_OBJECT* GetDomainBoundOid() { | 176 ASN1_OBJECT* GetDomainBoundOid() { |
186 static base::LazyInstance<DomainBoundOid>::Leaky s_lazy = | 177 static base::LazyInstance<DomainBoundOid>::Leaky s_lazy = |
187 LAZY_INSTANCE_INITIALIZER; | 178 LAZY_INSTANCE_INITIALIZER; |
188 return s_lazy.Get().obj(); | 179 return s_lazy.Get().obj(); |
189 } | 180 } |
190 | 181 |
| 182 |
| 183 struct DERCache { |
| 184 std::string data; |
| 185 }; |
| 186 |
| 187 void DERCache_free(void* parent, void* ptr, CRYPTO_EX_DATA* ad, int idx, |
| 188 long argl, void* argp) { |
| 189 DERCache* der_cache = static_cast<DERCache*>(ptr); |
| 190 delete der_cache; |
| 191 } |
| 192 |
| 193 class DERCacheInitSingleton { |
| 194 public: |
| 195 DERCacheInitSingleton() { |
| 196 crypto::EnsureOpenSSLInit(); |
| 197 der_cache_ex_index_ = X509_get_ex_new_index(0, 0, 0, 0, DERCache_free); |
| 198 DCHECK_NE(-1, der_cache_ex_index_); |
| 199 } |
| 200 |
| 201 int der_cache_ex_index() const { return der_cache_ex_index_; } |
| 202 |
| 203 private: |
| 204 int der_cache_ex_index_; |
| 205 |
| 206 DISALLOW_COPY_AND_ASSIGN(DERCacheInitSingleton); |
| 207 }; |
| 208 |
| 209 base::LazyInstance<DERCacheInitSingleton>::Leaky g_der_cache_singleton = |
| 210 LAZY_INSTANCE_INITIALIZER; |
| 211 |
191 } // namespace | 212 } // namespace |
192 | 213 |
193 bool IsSupportedValidityRange(base::Time not_valid_before, | 214 bool IsSupportedValidityRange(base::Time not_valid_before, |
194 base::Time not_valid_after) { | 215 base::Time not_valid_after) { |
195 if (not_valid_before > not_valid_after) | 216 if (not_valid_before > not_valid_after) |
196 return false; | 217 return false; |
197 | 218 |
198 // The validity field of a certificate can only encode years 1-9999. | 219 // The validity field of a certificate can only encode years 1-9999. |
199 | 220 |
200 // Compute the base::Time values corresponding to Jan 1st,0001 and | 221 // Compute the base::Time values corresponding to Jan 1st,0001 and |
(...skipping 148 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
349 return false; | 370 return false; |
350 | 371 |
351 base::StringPiece str_date(reinterpret_cast<const char*>(x509_time->data), | 372 base::StringPiece str_date(reinterpret_cast<const char*>(x509_time->data), |
352 x509_time->length); | 373 x509_time->length); |
353 | 374 |
354 CertDateFormat format = x509_time->type == V_ASN1_UTCTIME ? | 375 CertDateFormat format = x509_time->type == V_ASN1_UTCTIME ? |
355 CERT_DATE_FORMAT_UTC_TIME : CERT_DATE_FORMAT_GENERALIZED_TIME; | 376 CERT_DATE_FORMAT_UTC_TIME : CERT_DATE_FORMAT_GENERALIZED_TIME; |
356 return ParseCertificateDate(str_date, format, time); | 377 return ParseCertificateDate(str_date, format, time); |
357 } | 378 } |
358 | 379 |
| 380 bool GetDER(X509* x509, std::string* out_der) { |
| 381 int len = i2d_X509(x509, NULL); |
| 382 if (len < 0) |
| 383 return false; |
| 384 |
| 385 uint8_t* ptr = reinterpret_cast<uint8_t*>(WriteInto(out_der, len + 1)); |
| 386 if (i2d_X509(x509, &ptr) < 0) { |
| 387 NOTREACHED(); |
| 388 out_der->clear(); |
| 389 return false; |
| 390 } |
| 391 return true; |
| 392 } |
| 393 |
| 394 // Returns true if |der_cache| points to valid data, false otherwise. |
| 395 // (note: the DER-encoded data in |der_cache| is owned by |cert|, callers should |
| 396 // not free it). |
| 397 bool GetDERAndCacheIfNeeded(X509* x509, base::StringPiece* der_cache) { |
| 398 int x509_der_cache_index = |
| 399 g_der_cache_singleton.Get().der_cache_ex_index(); |
| 400 |
| 401 // Re-encoding the DER data via i2d_X509 is an expensive operation, |
| 402 // but it's necessary for comparing two certificates. Re-encode at |
| 403 // most once per certificate and cache the data within the X509 cert |
| 404 // using X509_set_ex_data. |
| 405 DERCache* internal_cache = static_cast<DERCache*>( |
| 406 X509_get_ex_data(x509, x509_der_cache_index)); |
| 407 if (!internal_cache) { |
| 408 scoped_ptr<DERCache> new_cache(new DERCache); |
| 409 if (!GetDER(x509, &new_cache->data)) |
| 410 return false; |
| 411 internal_cache = new_cache.get(); |
| 412 X509_set_ex_data(x509, x509_der_cache_index, new_cache.release()); |
| 413 } |
| 414 *der_cache = base::StringPiece(internal_cache->data); |
| 415 return true; |
| 416 } |
| 417 |
359 } // namespace x509_util | 418 } // namespace x509_util |
360 | 419 |
361 } // namespace net | 420 } // namespace net |
OLD | NEW |