OLD | NEW |
| (Empty) |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "net/cert/x509_util_openssl.h" | |
6 | |
7 #include <algorithm> | |
8 #include <openssl/asn1.h> | |
9 | |
10 #include "base/lazy_instance.h" | |
11 #include "base/logging.h" | |
12 #include "base/strings/string_piece.h" | |
13 #include "base/strings/string_util.h" | |
14 #include "crypto/ec_private_key.h" | |
15 #include "crypto/openssl_util.h" | |
16 #include "crypto/rsa_private_key.h" | |
17 #include "crypto/scoped_openssl_types.h" | |
18 #include "net/cert/x509_cert_types.h" | |
19 #include "net/cert/x509_util.h" | |
20 | |
21 namespace net { | |
22 | |
23 namespace { | |
24 | |
25 typedef crypto::ScopedOpenSSL<ASN1_INTEGER, ASN1_INTEGER_free>::Type | |
26 ScopedASN1_INTEGER; | |
27 typedef crypto::ScopedOpenSSL<ASN1_OCTET_STRING, ASN1_OCTET_STRING_free>::Type | |
28 ScopedASN1_OCTET_STRING; | |
29 typedef crypto::ScopedOpenSSL<ASN1_STRING, ASN1_STRING_free>::Type | |
30 ScopedASN1_STRING; | |
31 typedef crypto::ScopedOpenSSL<ASN1_TIME, ASN1_TIME_free>::Type ScopedASN1_TIME; | |
32 typedef crypto::ScopedOpenSSL<X509, X509_free>::Type ScopedX509; | |
33 typedef crypto::ScopedOpenSSL<X509_EXTENSION, X509_EXTENSION_free>::Type | |
34 ScopedX509_EXTENSION; | |
35 typedef crypto::ScopedOpenSSL<X509_NAME, X509_NAME_free>::Type ScopedX509_NAME; | |
36 | |
37 const EVP_MD* ToEVP(x509_util::DigestAlgorithm alg) { | |
38 switch (alg) { | |
39 case x509_util::DIGEST_SHA1: | |
40 return EVP_sha1(); | |
41 case x509_util::DIGEST_SHA256: | |
42 return EVP_sha256(); | |
43 } | |
44 return NULL; | |
45 } | |
46 | |
47 } // namespace | |
48 | |
49 namespace x509_util { | |
50 | |
51 namespace { | |
52 | |
53 X509* CreateCertificate(EVP_PKEY* key, | |
54 DigestAlgorithm alg, | |
55 const std::string& common_name, | |
56 uint32_t serial_number, | |
57 base::Time not_valid_before, | |
58 base::Time not_valid_after) { | |
59 // Put the serial number into an OpenSSL-friendly object. | |
60 ScopedASN1_INTEGER asn1_serial(ASN1_INTEGER_new()); | |
61 if (!asn1_serial.get() || | |
62 !ASN1_INTEGER_set(asn1_serial.get(), static_cast<long>(serial_number))) { | |
63 LOG(ERROR) << "Invalid serial number " << serial_number; | |
64 return NULL; | |
65 } | |
66 | |
67 // Do the same for the time stamps. | |
68 ScopedASN1_TIME asn1_not_before_time( | |
69 ASN1_TIME_set(NULL, not_valid_before.ToTimeT())); | |
70 if (!asn1_not_before_time.get()) { | |
71 LOG(ERROR) << "Invalid not_valid_before time: " | |
72 << not_valid_before.ToTimeT(); | |
73 return NULL; | |
74 } | |
75 | |
76 ScopedASN1_TIME asn1_not_after_time( | |
77 ASN1_TIME_set(NULL, not_valid_after.ToTimeT())); | |
78 if (!asn1_not_after_time.get()) { | |
79 LOG(ERROR) << "Invalid not_valid_after time: " << not_valid_after.ToTimeT(); | |
80 return NULL; | |
81 } | |
82 | |
83 // Because |common_name| only contains a common name and starts with 'CN=', | |
84 // there is no need for a full RFC 2253 parser here. Do some sanity checks | |
85 // though. | |
86 static const char kCommonNamePrefix[] = "CN="; | |
87 const size_t kCommonNamePrefixLen = sizeof(kCommonNamePrefix) - 1; | |
88 if (common_name.size() < kCommonNamePrefixLen || | |
89 strncmp(common_name.c_str(), kCommonNamePrefix, kCommonNamePrefixLen)) { | |
90 LOG(ERROR) << "Common name must begin with " << kCommonNamePrefix; | |
91 return NULL; | |
92 } | |
93 if (common_name.size() > INT_MAX) { | |
94 LOG(ERROR) << "Common name too long"; | |
95 return NULL; | |
96 } | |
97 unsigned char* common_name_str = | |
98 reinterpret_cast<unsigned char*>(const_cast<char*>(common_name.data())) + | |
99 kCommonNamePrefixLen; | |
100 int common_name_len = | |
101 static_cast<int>(common_name.size() - kCommonNamePrefixLen); | |
102 | |
103 ScopedX509_NAME name(X509_NAME_new()); | |
104 if (!name.get() || !X509_NAME_add_entry_by_NID(name.get(), | |
105 NID_commonName, | |
106 MBSTRING_ASC, | |
107 common_name_str, | |
108 common_name_len, | |
109 -1, | |
110 0)) { | |
111 LOG(ERROR) << "Can't parse common name: " << common_name.c_str(); | |
112 return NULL; | |
113 } | |
114 | |
115 // Now create certificate and populate it. | |
116 ScopedX509 cert(X509_new()); | |
117 if (!cert.get() || !X509_set_version(cert.get(), 2L) /* i.e. version 3 */ || | |
118 !X509_set_pubkey(cert.get(), key) || | |
119 !X509_set_serialNumber(cert.get(), asn1_serial.get()) || | |
120 !X509_set_notBefore(cert.get(), asn1_not_before_time.get()) || | |
121 !X509_set_notAfter(cert.get(), asn1_not_after_time.get()) || | |
122 !X509_set_subject_name(cert.get(), name.get()) || | |
123 !X509_set_issuer_name(cert.get(), name.get())) { | |
124 LOG(ERROR) << "Could not create certificate"; | |
125 return NULL; | |
126 } | |
127 | |
128 return cert.release(); | |
129 } | |
130 | |
131 // DER-encodes |x509|. On success, returns true and writes the | |
132 // encoding to |*out_der|. | |
133 bool DerEncodeCert(X509* x509, std::string* out_der) { | |
134 int len = i2d_X509(x509, NULL); | |
135 if (len < 0) | |
136 return false; | |
137 | |
138 uint8_t* ptr = reinterpret_cast<uint8_t*>(WriteInto(out_der, len + 1)); | |
139 if (i2d_X509(x509, &ptr) < 0) { | |
140 NOTREACHED(); | |
141 out_der->clear(); | |
142 return false; | |
143 } | |
144 return true; | |
145 } | |
146 | |
147 bool SignAndDerEncodeCert(X509* cert, | |
148 EVP_PKEY* key, | |
149 DigestAlgorithm alg, | |
150 std::string* der_encoded) { | |
151 // Get the message digest algorithm | |
152 const EVP_MD* md = ToEVP(alg); | |
153 if (!md) { | |
154 LOG(ERROR) << "Unrecognized hash algorithm."; | |
155 return false; | |
156 } | |
157 | |
158 // Sign it with the private key. | |
159 if (!X509_sign(cert, key, md)) { | |
160 LOG(ERROR) << "Could not sign certificate with key."; | |
161 return false; | |
162 } | |
163 | |
164 // Convert it into a DER-encoded string copied to |der_encoded|. | |
165 return DerEncodeCert(cert, der_encoded); | |
166 } | |
167 | |
168 // There is no OpenSSL NID for the 'originBoundCertificate' extension OID yet, | |
169 // so create a global ASN1_OBJECT lazily with the right parameters. | |
170 class DomainBoundOid { | |
171 public: | |
172 DomainBoundOid() : obj_(OBJ_txt2obj(kDomainBoundOidText, 1)) { CHECK(obj_); } | |
173 | |
174 ~DomainBoundOid() { | |
175 if (obj_) | |
176 ASN1_OBJECT_free(obj_); | |
177 } | |
178 | |
179 ASN1_OBJECT* obj() const { return obj_; } | |
180 | |
181 private: | |
182 static const char kDomainBoundOidText[]; | |
183 | |
184 ASN1_OBJECT* obj_; | |
185 }; | |
186 | |
187 // 1.3.6.1.4.1.11129.2.1.6 | |
188 // (iso.org.dod.internet.private.enterprises.google.googleSecurity. | |
189 // certificateExtensions.originBoundCertificate) | |
190 const char DomainBoundOid::kDomainBoundOidText[] = "1.3.6.1.4.1.11129.2.1.6"; | |
191 | |
192 ASN1_OBJECT* GetDomainBoundOid() { | |
193 static base::LazyInstance<DomainBoundOid>::Leaky s_lazy = | |
194 LAZY_INSTANCE_INITIALIZER; | |
195 return s_lazy.Get().obj(); | |
196 } | |
197 | |
198 | |
199 struct DERCache { | |
200 std::string data; | |
201 }; | |
202 | |
203 void DERCache_free(void* parent, void* ptr, CRYPTO_EX_DATA* ad, int idx, | |
204 long argl, void* argp) { | |
205 DERCache* der_cache = static_cast<DERCache*>(ptr); | |
206 delete der_cache; | |
207 } | |
208 | |
209 class DERCacheInitSingleton { | |
210 public: | |
211 DERCacheInitSingleton() { | |
212 crypto::EnsureOpenSSLInit(); | |
213 der_cache_ex_index_ = X509_get_ex_new_index(0, 0, 0, 0, DERCache_free); | |
214 DCHECK_NE(-1, der_cache_ex_index_); | |
215 } | |
216 | |
217 int der_cache_ex_index() const { return der_cache_ex_index_; } | |
218 | |
219 private: | |
220 int der_cache_ex_index_; | |
221 | |
222 DISALLOW_COPY_AND_ASSIGN(DERCacheInitSingleton); | |
223 }; | |
224 | |
225 base::LazyInstance<DERCacheInitSingleton>::Leaky g_der_cache_singleton = | |
226 LAZY_INSTANCE_INITIALIZER; | |
227 | |
228 } // namespace | |
229 | |
230 bool IsSupportedValidityRange(base::Time not_valid_before, | |
231 base::Time not_valid_after) { | |
232 if (not_valid_before > not_valid_after) | |
233 return false; | |
234 | |
235 // The validity field of a certificate can only encode years 1-9999. | |
236 | |
237 // Compute the base::Time values corresponding to Jan 1st,0001 and | |
238 // Jan 1st, 10000 respectively. Done by using the pre-computed numbers | |
239 // of days between these dates and the Unix epoch, i.e. Jan 1st, 1970, | |
240 // using the following Python script: | |
241 // | |
242 // from datetime import date as D | |
243 // print (D(1970,1,1)-D(1,1,1)) # -> 719162 days | |
244 // print (D(9999,12,31)-D(1970,1,1)) # -> 2932896 days | |
245 // | |
246 // Note: This ignores leap seconds, but should be enough in practice. | |
247 // | |
248 const int64 kDaysFromYear0001ToUnixEpoch = 719162; | |
249 const int64 kDaysFromUnixEpochToYear10000 = 2932896 + 1; | |
250 const base::Time kEpoch = base::Time::UnixEpoch(); | |
251 const base::Time kYear0001 = kEpoch - | |
252 base::TimeDelta::FromDays(kDaysFromYear0001ToUnixEpoch); | |
253 const base::Time kYear10000 = kEpoch + | |
254 base::TimeDelta::FromDays(kDaysFromUnixEpochToYear10000); | |
255 | |
256 if (not_valid_before < kYear0001 || not_valid_before >= kYear10000 || | |
257 not_valid_after < kYear0001 || not_valid_after >= kYear10000) | |
258 return false; | |
259 | |
260 return true; | |
261 } | |
262 | |
263 bool CreateChannelIDEC( | |
264 crypto::ECPrivateKey* key, | |
265 DigestAlgorithm alg, | |
266 const std::string& domain, | |
267 uint32 serial_number, | |
268 base::Time not_valid_before, | |
269 base::Time not_valid_after, | |
270 std::string* der_cert) { | |
271 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); | |
272 // Create certificate. | |
273 ScopedX509 cert(CreateCertificate(key->key(), | |
274 alg, | |
275 "CN=anonymous.invalid", | |
276 serial_number, | |
277 not_valid_before, | |
278 not_valid_after)); | |
279 if (!cert.get()) | |
280 return false; | |
281 | |
282 // Add TLS-Channel-ID extension to the certificate before signing it. | |
283 // The value must be stored DER-encoded, as a ASN.1 IA5String. | |
284 ScopedASN1_STRING domain_ia5(ASN1_IA5STRING_new()); | |
285 if (!domain_ia5.get() || | |
286 !ASN1_STRING_set(domain_ia5.get(), domain.data(), domain.size())) | |
287 return false; | |
288 | |
289 std::string domain_der; | |
290 int domain_der_len = i2d_ASN1_IA5STRING(domain_ia5.get(), NULL); | |
291 if (domain_der_len < 0) | |
292 return false; | |
293 | |
294 domain_der.resize(domain_der_len); | |
295 unsigned char* domain_der_data = | |
296 reinterpret_cast<unsigned char*>(&domain_der[0]); | |
297 if (i2d_ASN1_IA5STRING(domain_ia5.get(), &domain_der_data) < 0) | |
298 return false; | |
299 | |
300 ScopedASN1_OCTET_STRING domain_str(ASN1_OCTET_STRING_new()); | |
301 if (!domain_str.get() || | |
302 !ASN1_STRING_set(domain_str.get(), domain_der.data(), domain_der.size())) | |
303 return false; | |
304 | |
305 ScopedX509_EXTENSION ext(X509_EXTENSION_create_by_OBJ( | |
306 NULL, GetDomainBoundOid(), 1 /* critical */, domain_str.get())); | |
307 if (!ext.get() || !X509_add_ext(cert.get(), ext.get(), -1)) { | |
308 return false; | |
309 } | |
310 | |
311 // Sign and encode it. | |
312 return SignAndDerEncodeCert(cert.get(), key->key(), alg, der_cert); | |
313 } | |
314 | |
315 bool CreateSelfSignedCert(crypto::RSAPrivateKey* key, | |
316 DigestAlgorithm alg, | |
317 const std::string& common_name, | |
318 uint32 serial_number, | |
319 base::Time not_valid_before, | |
320 base::Time not_valid_after, | |
321 std::string* der_encoded) { | |
322 crypto::OpenSSLErrStackTracer err_tracer(FROM_HERE); | |
323 ScopedX509 cert(CreateCertificate(key->key(), | |
324 alg, | |
325 common_name, | |
326 serial_number, | |
327 not_valid_before, | |
328 not_valid_after)); | |
329 if (!cert.get()) | |
330 return false; | |
331 | |
332 return SignAndDerEncodeCert(cert.get(), key->key(), alg, der_encoded); | |
333 } | |
334 | |
335 bool ParsePrincipalKeyAndValue(X509_NAME_ENTRY* entry, | |
336 std::string* key, | |
337 std::string* value) { | |
338 if (key) { | |
339 ASN1_OBJECT* object = X509_NAME_ENTRY_get_object(entry); | |
340 key->assign(OBJ_nid2sn(OBJ_obj2nid(object))); | |
341 } | |
342 | |
343 ASN1_STRING* data = X509_NAME_ENTRY_get_data(entry); | |
344 if (!data) | |
345 return false; | |
346 | |
347 unsigned char* buf = NULL; | |
348 int len = ASN1_STRING_to_UTF8(&buf, data); | |
349 if (len <= 0) | |
350 return false; | |
351 | |
352 value->assign(reinterpret_cast<const char*>(buf), len); | |
353 OPENSSL_free(buf); | |
354 return true; | |
355 } | |
356 | |
357 bool ParsePrincipalKeyAndValueByIndex(X509_NAME* name, | |
358 int index, | |
359 std::string* key, | |
360 std::string* value) { | |
361 X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, index); | |
362 if (!entry) | |
363 return false; | |
364 | |
365 return ParsePrincipalKeyAndValue(entry, key, value); | |
366 } | |
367 | |
368 bool ParsePrincipalValueByIndex(X509_NAME* name, | |
369 int index, | |
370 std::string* value) { | |
371 return ParsePrincipalKeyAndValueByIndex(name, index, NULL, value); | |
372 } | |
373 | |
374 bool ParsePrincipalValueByNID(X509_NAME* name, int nid, std::string* value) { | |
375 int index = X509_NAME_get_index_by_NID(name, nid, -1); | |
376 if (index < 0) | |
377 return false; | |
378 | |
379 return ParsePrincipalValueByIndex(name, index, value); | |
380 } | |
381 | |
382 bool ParseDate(ASN1_TIME* x509_time, base::Time* time) { | |
383 if (!x509_time || | |
384 (x509_time->type != V_ASN1_UTCTIME && | |
385 x509_time->type != V_ASN1_GENERALIZEDTIME)) | |
386 return false; | |
387 | |
388 base::StringPiece str_date(reinterpret_cast<const char*>(x509_time->data), | |
389 x509_time->length); | |
390 | |
391 CertDateFormat format = x509_time->type == V_ASN1_UTCTIME ? | |
392 CERT_DATE_FORMAT_UTC_TIME : CERT_DATE_FORMAT_GENERALIZED_TIME; | |
393 return ParseCertificateDate(str_date, format, time); | |
394 } | |
395 | |
396 // Returns true if |der_cache| points to valid data, false otherwise. | |
397 // (note: the DER-encoded data in |der_cache| is owned by |cert|, callers should | |
398 // not free it). | |
399 bool GetDER(X509* x509, base::StringPiece* der_cache) { | |
400 int x509_der_cache_index = | |
401 g_der_cache_singleton.Get().der_cache_ex_index(); | |
402 | |
403 // Re-encoding the DER data via i2d_X509 is an expensive operation, | |
404 // but it's necessary for comparing two certificates. Re-encode at | |
405 // most once per certificate and cache the data within the X509 cert | |
406 // using X509_set_ex_data. | |
407 DERCache* internal_cache = static_cast<DERCache*>( | |
408 X509_get_ex_data(x509, x509_der_cache_index)); | |
409 if (!internal_cache) { | |
410 scoped_ptr<DERCache> new_cache(new DERCache); | |
411 if (!DerEncodeCert(x509, &new_cache->data)) | |
412 return false; | |
413 internal_cache = new_cache.get(); | |
414 X509_set_ex_data(x509, x509_der_cache_index, new_cache.release()); | |
415 } | |
416 *der_cache = base::StringPiece(internal_cache->data); | |
417 return true; | |
418 } | |
419 | |
420 } // namespace x509_util | |
421 | |
422 } // namespace net | |
OLD | NEW |