| OLD | NEW |
| (Empty) |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 4 #include "cert.h" | |
| 5 #include "secitem.h" | |
| 6 #include "ssl.h" | |
| 7 #include "sslimpl.h" | |
| 8 #include "sslproto.h" | |
| 9 #include "pk11func.h" | |
| 10 #include "ocsp.h" | |
| 11 | |
| 12 /* NEED LOCKS IN HERE. */ | |
| 13 CERTCertificate * | |
| 14 SSL_PeerCertificate(PRFileDesc *fd) | |
| 15 { | |
| 16 sslSocket *ss; | |
| 17 | |
| 18 ss = ssl_FindSocket(fd); | |
| 19 if (!ss) { | |
| 20 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificate", | |
| 21 SSL_GETPID(), fd)); | |
| 22 return 0; | |
| 23 } | |
| 24 if (ss->opt.useSecurity && ss->sec.peerCert) { | |
| 25 return CERT_DupCertificate(ss->sec.peerCert); | |
| 26 } | |
| 27 return 0; | |
| 28 } | |
| 29 | |
| 30 /* NEED LOCKS IN HERE. */ | |
| 31 CERTCertList * | |
| 32 SSL_PeerCertificateChain(PRFileDesc *fd) | |
| 33 { | |
| 34 sslSocket *ss; | |
| 35 CERTCertList *chain = NULL; | |
| 36 CERTCertificate *cert; | |
| 37 ssl3CertNode *cur; | |
| 38 | |
| 39 ss = ssl_FindSocket(fd); | |
| 40 if (!ss) { | |
| 41 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificateChain", | |
| 42 SSL_GETPID(), fd)); | |
| 43 return NULL; | |
| 44 } | |
| 45 if (!ss->opt.useSecurity || !ss->sec.peerCert) { | |
| 46 PORT_SetError(SSL_ERROR_NO_CERTIFICATE); | |
| 47 return NULL; | |
| 48 } | |
| 49 chain = CERT_NewCertList(); | |
| 50 if (!chain) { | |
| 51 return NULL; | |
| 52 } | |
| 53 cert = CERT_DupCertificate(ss->sec.peerCert); | |
| 54 if (CERT_AddCertToListTail(chain, cert) != SECSuccess) { | |
| 55 goto loser; | |
| 56 } | |
| 57 for (cur = ss->ssl3.peerCertChain; cur; cur = cur->next) { | |
| 58 cert = CERT_DupCertificate(cur->cert); | |
| 59 if (CERT_AddCertToListTail(chain, cert) != SECSuccess) { | |
| 60 goto loser; | |
| 61 } | |
| 62 } | |
| 63 return chain; | |
| 64 | |
| 65 loser: | |
| 66 CERT_DestroyCertList(chain); | |
| 67 return NULL; | |
| 68 } | |
| 69 | |
| 70 /* NEED LOCKS IN HERE. */ | |
| 71 CERTCertificate * | |
| 72 SSL_LocalCertificate(PRFileDesc *fd) | |
| 73 { | |
| 74 sslSocket *ss; | |
| 75 | |
| 76 ss = ssl_FindSocket(fd); | |
| 77 if (!ss) { | |
| 78 SSL_DBG(("%d: SSL[%d]: bad socket in PeerCertificate", | |
| 79 SSL_GETPID(), fd)); | |
| 80 return NULL; | |
| 81 } | |
| 82 if (ss->opt.useSecurity) { | |
| 83 if (ss->sec.localCert) { | |
| 84 return CERT_DupCertificate(ss->sec.localCert); | |
| 85 } | |
| 86 if (ss->sec.ci.sid && ss->sec.ci.sid->localCert) { | |
| 87 return CERT_DupCertificate(ss->sec.ci.sid->localCert); | |
| 88 } | |
| 89 } | |
| 90 return NULL; | |
| 91 } | |
| 92 | |
| 93 | |
| 94 | |
| 95 /* NEED LOCKS IN HERE. */ | |
| 96 SECStatus | |
| 97 SSL_SecurityStatus(PRFileDesc *fd, int *op, char **cp, int *kp0, int *kp1, | |
| 98 char **ip, char **sp) | |
| 99 { | |
| 100 sslSocket *ss; | |
| 101 const char *cipherName; | |
| 102 PRBool isDes = PR_FALSE; | |
| 103 | |
| 104 ss = ssl_FindSocket(fd); | |
| 105 if (!ss) { | |
| 106 SSL_DBG(("%d: SSL[%d]: bad socket in SecurityStatus", | |
| 107 SSL_GETPID(), fd)); | |
| 108 return SECFailure; | |
| 109 } | |
| 110 | |
| 111 if (cp) *cp = 0; | |
| 112 if (kp0) *kp0 = 0; | |
| 113 if (kp1) *kp1 = 0; | |
| 114 if (ip) *ip = 0; | |
| 115 if (sp) *sp = 0; | |
| 116 if (op) { | |
| 117 *op = SSL_SECURITY_STATUS_OFF; | |
| 118 } | |
| 119 | |
| 120 if (ss->opt.useSecurity && ss->enoughFirstHsDone) { | |
| 121 if (ss->version < SSL_LIBRARY_VERSION_3_0) { | |
| 122 cipherName = ssl_cipherName[ss->sec.cipherType]; | |
| 123 } else { | |
| 124 cipherName = ssl3_cipherName[ss->sec.cipherType]; | |
| 125 } | |
| 126 PORT_Assert(cipherName); | |
| 127 if (cipherName) { | |
| 128 if (PORT_Strstr(cipherName, "DES")) isDes = PR_TRUE; | |
| 129 | |
| 130 if (cp) { | |
| 131 *cp = PORT_Strdup(cipherName); | |
| 132 } | |
| 133 } | |
| 134 | |
| 135 if (kp0) { | |
| 136 *kp0 = ss->sec.keyBits; | |
| 137 if (isDes) *kp0 = (*kp0 * 7) / 8; | |
| 138 } | |
| 139 if (kp1) { | |
| 140 *kp1 = ss->sec.secretKeyBits; | |
| 141 if (isDes) *kp1 = (*kp1 * 7) / 8; | |
| 142 } | |
| 143 if (op) { | |
| 144 if (ss->sec.keyBits == 0) { | |
| 145 *op = SSL_SECURITY_STATUS_OFF; | |
| 146 } else if (ss->sec.secretKeyBits < 90) { | |
| 147 *op = SSL_SECURITY_STATUS_ON_LOW; | |
| 148 | |
| 149 } else { | |
| 150 *op = SSL_SECURITY_STATUS_ON_HIGH; | |
| 151 } | |
| 152 } | |
| 153 | |
| 154 if (ip || sp) { | |
| 155 CERTCertificate *cert; | |
| 156 | |
| 157 cert = ss->sec.peerCert; | |
| 158 if (cert) { | |
| 159 if (ip) { | |
| 160 *ip = CERT_NameToAscii(&cert->issuer); | |
| 161 } | |
| 162 if (sp) { | |
| 163 *sp = CERT_NameToAscii(&cert->subject); | |
| 164 } | |
| 165 } else { | |
| 166 if (ip) { | |
| 167 *ip = PORT_Strdup("no certificate"); | |
| 168 } | |
| 169 if (sp) { | |
| 170 *sp = PORT_Strdup("no certificate"); | |
| 171 } | |
| 172 } | |
| 173 } | |
| 174 } | |
| 175 | |
| 176 return SECSuccess; | |
| 177 } | |
| 178 | |
| 179 /************************************************************************/ | |
| 180 | |
| 181 /* NEED LOCKS IN HERE. */ | |
| 182 SECStatus | |
| 183 SSL_AuthCertificateHook(PRFileDesc *s, SSLAuthCertificate func, void *arg) | |
| 184 { | |
| 185 sslSocket *ss; | |
| 186 | |
| 187 ss = ssl_FindSocket(s); | |
| 188 if (!ss) { | |
| 189 SSL_DBG(("%d: SSL[%d]: bad socket in AuthCertificateHook", | |
| 190 SSL_GETPID(), s)); | |
| 191 return SECFailure; | |
| 192 } | |
| 193 | |
| 194 ss->authCertificate = func; | |
| 195 ss->authCertificateArg = arg; | |
| 196 | |
| 197 return SECSuccess; | |
| 198 } | |
| 199 | |
| 200 /* NEED LOCKS IN HERE. */ | |
| 201 SECStatus | |
| 202 SSL_GetClientAuthDataHook(PRFileDesc *s, SSLGetClientAuthData func, | |
| 203 void *arg) | |
| 204 { | |
| 205 sslSocket *ss; | |
| 206 | |
| 207 ss = ssl_FindSocket(s); | |
| 208 if (!ss) { | |
| 209 SSL_DBG(("%d: SSL[%d]: bad socket in GetClientAuthDataHook", | |
| 210 SSL_GETPID(), s)); | |
| 211 return SECFailure; | |
| 212 } | |
| 213 | |
| 214 ss->getClientAuthData = func; | |
| 215 ss->getClientAuthDataArg = arg; | |
| 216 return SECSuccess; | |
| 217 } | |
| 218 | |
| 219 SECStatus | |
| 220 SSL_SetClientChannelIDCallback(PRFileDesc *fd, | |
| 221 SSLClientChannelIDCallback callback, | |
| 222 void *arg) { | |
| 223 sslSocket *ss = ssl_FindSocket(fd); | |
| 224 | |
| 225 if (!ss) { | |
| 226 SSL_DBG(("%d: SSL[%d]: bad socket in SSL_SetClientChannelIDCallback", | |
| 227 SSL_GETPID(), fd)); | |
| 228 return SECFailure; | |
| 229 } | |
| 230 | |
| 231 ss->getChannelID = callback; | |
| 232 ss->getChannelIDArg = arg; | |
| 233 | |
| 234 return SECSuccess; | |
| 235 } | |
| 236 | |
| 237 #ifdef NSS_PLATFORM_CLIENT_AUTH | |
| 238 /* NEED LOCKS IN HERE. */ | |
| 239 SECStatus | |
| 240 SSL_GetPlatformClientAuthDataHook(PRFileDesc *s, | |
| 241 SSLGetPlatformClientAuthData func, | |
| 242 void *arg) | |
| 243 { | |
| 244 sslSocket *ss; | |
| 245 | |
| 246 ss = ssl_FindSocket(s); | |
| 247 if (!ss) { | |
| 248 SSL_DBG(("%d: SSL[%d]: bad socket in GetPlatformClientAuthDataHook", | |
| 249 SSL_GETPID(), s)); | |
| 250 return SECFailure; | |
| 251 } | |
| 252 | |
| 253 ss->getPlatformClientAuthData = func; | |
| 254 ss->getPlatformClientAuthDataArg = arg; | |
| 255 return SECSuccess; | |
| 256 } | |
| 257 #endif /* NSS_PLATFORM_CLIENT_AUTH */ | |
| 258 | |
| 259 /* NEED LOCKS IN HERE. */ | |
| 260 SECStatus | |
| 261 SSL_SetPKCS11PinArg(PRFileDesc *s, void *arg) | |
| 262 { | |
| 263 sslSocket *ss; | |
| 264 | |
| 265 ss = ssl_FindSocket(s); | |
| 266 if (!ss) { | |
| 267 SSL_DBG(("%d: SSL[%d]: bad socket in GetClientAuthDataHook", | |
| 268 SSL_GETPID(), s)); | |
| 269 return SECFailure; | |
| 270 } | |
| 271 | |
| 272 ss->pkcs11PinArg = arg; | |
| 273 return SECSuccess; | |
| 274 } | |
| 275 | |
| 276 | |
| 277 /* This is the "default" authCert callback function. It is called when a | |
| 278 * certificate message is received from the peer and the local application | |
| 279 * has not registered an authCert callback function. | |
| 280 */ | |
| 281 SECStatus | |
| 282 SSL_AuthCertificate(void *arg, PRFileDesc *fd, PRBool checkSig, PRBool isServer) | |
| 283 { | |
| 284 SECStatus rv; | |
| 285 CERTCertDBHandle * handle; | |
| 286 sslSocket * ss; | |
| 287 SECCertUsage certUsage; | |
| 288 const char * hostname = NULL; | |
| 289 PRTime now = PR_Now(); | |
| 290 SECItemArray * certStatusArray; | |
| 291 | |
| 292 ss = ssl_FindSocket(fd); | |
| 293 PORT_Assert(ss != NULL); | |
| 294 if (!ss) { | |
| 295 return SECFailure; | |
| 296 } | |
| 297 | |
| 298 handle = (CERTCertDBHandle *)arg; | |
| 299 certStatusArray = &ss->sec.ci.sid->peerCertStatus; | |
| 300 | |
| 301 if (certStatusArray->len) { | |
| 302 PORT_SetError(0); | |
| 303 if (CERT_CacheOCSPResponseFromSideChannel(handle, ss->sec.peerCert, now, | |
| 304 &certStatusArray->items[0], | |
| 305 ss->pkcs11PinArg) | |
| 306 != SECSuccess) { | |
| 307 PRErrorCode error = PR_GetError(); | |
| 308 PORT_Assert(error != 0); | |
| 309 } | |
| 310 } | |
| 311 | |
| 312 /* this may seem backwards, but isn't. */ | |
| 313 certUsage = isServer ? certUsageSSLClient : certUsageSSLServer; | |
| 314 | |
| 315 rv = CERT_VerifyCert(handle, ss->sec.peerCert, checkSig, certUsage, | |
| 316 now, ss->pkcs11PinArg, NULL); | |
| 317 | |
| 318 if ( rv != SECSuccess || isServer ) | |
| 319 return rv; | |
| 320 | |
| 321 /* cert is OK. This is the client side of an SSL connection. | |
| 322 * Now check the name field in the cert against the desired hostname. | |
| 323 * NB: This is our only defense against Man-In-The-Middle (MITM) attacks! | |
| 324 */ | |
| 325 hostname = ss->url; | |
| 326 if (hostname && hostname[0]) | |
| 327 rv = CERT_VerifyCertName(ss->sec.peerCert, hostname); | |
| 328 else | |
| 329 rv = SECFailure; | |
| 330 if (rv != SECSuccess) | |
| 331 PORT_SetError(SSL_ERROR_BAD_CERT_DOMAIN); | |
| 332 | |
| 333 return rv; | |
| 334 } | |
| OLD | NEW |