| // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #ifndef NET_BASE_X509_CERTIFICATE_H_ |
| #define NET_BASE_X509_CERTIFICATE_H_ |
| |
| #include <string.h> |
| |
| #include <string> |
| #include <vector> |
| |
| #include "base/gtest_prod_util.h" |
| #include "base/memory/ref_counted.h" |
| #include "base/string_piece.h" |
| #include "base/time.h" |
| #include "net/base/cert_type.h" |
| #include "net/base/net_export.h" |
| #include "net/base/x509_cert_types.h" |
| |
| #if defined(OS_WIN) |
| #include <windows.h> |
| #include <wincrypt.h> |
| #elif defined(OS_MACOSX) |
| #include <CoreFoundation/CFArray.h> |
| #include <Security/SecBase.h> |
| |
| #elif defined(USE_OPENSSL) |
| // Forward declaration; real one in <x509.h> |
| typedef struct x509_st X509; |
| typedef struct x509_store_st X509_STORE; |
| #elif defined(USE_NSS) |
| // Forward declaration; real one in <cert.h> |
| struct CERTCertificateStr; |
| #endif |
| |
| class Pickle; |
| class PickleIterator; |
| |
| namespace crypto { |
| class RSAPrivateKey; |
| } // namespace crypto |
| |
| namespace net { |
| |
| class CRLSet; |
| class CertVerifyResult; |
| |
| typedef std::vector<scoped_refptr<X509Certificate> > CertificateList; |
| |
| // X509Certificate represents a X.509 certificate, which is comprised a |
| // particular identity or end-entity certificate, such as an SSL server |
| // identity or an SSL client certificate, and zero or more intermediate |
| // certificates that may be used to build a path to a root certificate. |
| class NET_EXPORT X509Certificate |
| : public base::RefCountedThreadSafe<X509Certificate> { |
| public: |
| // An OSCertHandle is a handle to a certificate object in the underlying |
| // crypto library. We assume that OSCertHandle is a pointer type on all |
| // platforms and that NULL represents an invalid OSCertHandle. |
| #if defined(OS_WIN) |
| typedef PCCERT_CONTEXT OSCertHandle; |
| #elif defined(OS_MACOSX) |
| typedef SecCertificateRef OSCertHandle; |
| #elif defined(USE_OPENSSL) |
| typedef X509* OSCertHandle; |
| #elif defined(USE_NSS) |
| typedef struct CERTCertificateStr* OSCertHandle; |
| #else |
| // TODO(ericroman): not implemented |
| typedef void* OSCertHandle; |
| #endif |
| |
| typedef std::vector<OSCertHandle> OSCertHandles; |
| |
| enum PublicKeyType { |
| kPublicKeyTypeUnknown, |
| kPublicKeyTypeRSA, |
| kPublicKeyTypeDSA, |
| kPublicKeyTypeECDSA, |
| kPublicKeyTypeDH, |
| kPublicKeyTypeECDH |
| }; |
| |
| // Predicate functor used in maps when X509Certificate is used as the key. |
| class NET_EXPORT LessThan { |
| public: |
| bool operator() (X509Certificate* lhs, X509Certificate* rhs) const; |
| }; |
| |
| enum Format { |
| // The data contains a single DER-encoded certificate, or a PEM-encoded |
| // DER certificate with the PEM encoding block name of "CERTIFICATE". |
| // Any subsequent blocks will be ignored. |
| FORMAT_SINGLE_CERTIFICATE = 1 << 0, |
| |
| // The data contains a sequence of one or more PEM-encoded, DER |
| // certificates, with the PEM encoding block name of "CERTIFICATE". |
| // All PEM blocks will be parsed, until the first error is encountered. |
| FORMAT_PEM_CERT_SEQUENCE = 1 << 1, |
| |
| // The data contains a PKCS#7 SignedData structure, whose certificates |
| // member is to be used to initialize the certificate and intermediates. |
| // The data may further be encoded using PEM, specifying block names of |
| // either "PKCS7" or "CERTIFICATE". |
| FORMAT_PKCS7 = 1 << 2, |
| |
| // Automatically detect the format. |
| FORMAT_AUTO = FORMAT_SINGLE_CERTIFICATE | FORMAT_PEM_CERT_SEQUENCE | |
| FORMAT_PKCS7, |
| }; |
| |
| // PickleType is intended for deserializing certificates that were pickled |
| // by previous releases as part of a net::HttpResponseInfo. |
| // When serializing certificates to a new Pickle, |
| // PICKLETYPE_CERTIFICATE_CHAIN_V3 is always used. |
| enum PickleType { |
| // When reading a certificate from a Pickle, the Pickle only contains a |
| // single certificate. |
| PICKLETYPE_SINGLE_CERTIFICATE, |
| |
| // When reading a certificate from a Pickle, the Pickle contains the |
| // the certificate plus any certificates that were stored in |
| // |intermediate_ca_certificates_| at the time it was serialized. |
| // The count of certificates is stored as a size_t, which is either 32 |
| // or 64 bits. |
| PICKLETYPE_CERTIFICATE_CHAIN_V2, |
| |
| // The Pickle contains the certificate and any certificates that were |
| // stored in |intermediate_ca_certs_| at the time it was serialized. |
| // The format is [int count], [data - this certificate], |
| // [data - intermediate1], ... [data - intermediateN]. |
| // All certificates are stored in DER form. |
| PICKLETYPE_CERTIFICATE_CHAIN_V3, |
| }; |
| |
| // Creates a X509Certificate from the ground up. Used by tests that simulate |
| // SSL connections. |
| X509Certificate(const std::string& subject, const std::string& issuer, |
| base::Time start_date, base::Time expiration_date); |
| |
| // Create an X509Certificate from a handle to the certificate object in the |
| // underlying crypto library. The returned pointer must be stored in a |
| // scoped_refptr<X509Certificate>. |
| static X509Certificate* CreateFromHandle(OSCertHandle cert_handle, |
| const OSCertHandles& intermediates); |
| |
| // Create an X509Certificate from a chain of DER encoded certificates. The |
| // first certificate in the chain is the end-entity certificate to which a |
| // handle is returned. The other certificates in the chain are intermediate |
| // certificates. The returned pointer must be stored in a |
| // scoped_refptr<X509Certificate>. |
| static X509Certificate* CreateFromDERCertChain( |
| const std::vector<base::StringPiece>& der_certs); |
| |
| // Create an X509Certificate from the DER-encoded representation. |
| // Returns NULL on failure. |
| // |
| // The returned pointer must be stored in a scoped_refptr<X509Certificate>. |
| static X509Certificate* CreateFromBytes(const char* data, int length); |
| |
| #if defined(USE_NSS) |
| // Create an X509Certificate from the DER-encoded representation. |
| // |nickname| can be NULL if an auto-generated nickname is desired. |
| // Returns NULL on failure. The returned pointer must be stored in a |
| // scoped_refptr<X509Certificate>. |
| // |
| // This function differs from CreateFromBytes in that it takes a |
| // nickname that will be used when the certificate is imported into PKCS#11. |
| static X509Certificate* CreateFromBytesWithNickname(const char* data, |
| int length, |
| const char* nickname); |
| |
| // The default nickname of the certificate, based on the certificate type |
| // passed in. If this object was created using CreateFromBytesWithNickname, |
| // then this will return the nickname specified upon creation. |
| std::string GetDefaultNickname(CertType type) const; |
| #endif |
| |
| // Create an X509Certificate from the representation stored in the given |
| // pickle. The data for this object is found relative to the given |
| // pickle_iter, which should be passed to the pickle's various Read* methods. |
| // Returns NULL on failure. |
| // |
| // The returned pointer must be stored in a scoped_refptr<X509Certificate>. |
| static X509Certificate* CreateFromPickle(const Pickle& pickle, |
| PickleIterator* pickle_iter, |
| PickleType type); |
| |
| // Parses all of the certificates possible from |data|. |format| is a |
| // bit-wise OR of Format, indicating the possible formats the |
| // certificates may have been serialized as. If an error occurs, an empty |
| // collection will be returned. |
| static CertificateList CreateCertificateListFromBytes(const char* data, |
| int length, |
| int format); |
| |
| // Create a self-signed certificate containing the public key in |key|. |
| // Subject, serial number and validity period are given as parameters. |
| // The certificate is signed by the private key in |key|. The hashing |
| // algorithm for the signature is SHA-1. |
| // |
| // |subject| is a distinguished name defined in RFC4514. |
| // |
| // An example: |
| // CN=Michael Wong,O=FooBar Corporation,DC=foobar,DC=com |
| // |
| // SECURITY WARNING |
| // |
| // Using self-signed certificates has the following security risks: |
| // 1. Encryption without authentication and thus vulnerable to |
| // man-in-the-middle attacks. |
| // 2. Self-signed certificates cannot be revoked. |
| // |
| // Use this certificate only after the above risks are acknowledged. |
| static X509Certificate* CreateSelfSigned(crypto::RSAPrivateKey* key, |
| const std::string& subject, |
| uint32 serial_number, |
| base::TimeDelta valid_duration); |
| |
| // Appends a representation of this object to the given pickle. |
| void Persist(Pickle* pickle); |
| |
| // The serial number, DER encoded, possibly including a leading 00 byte. |
| const std::string& serial_number() const { return serial_number_; } |
| |
| // The subject of the certificate. For HTTPS server certificates, this |
| // represents the web server. The common name of the subject should match |
| // the host name of the web server. |
| const CertPrincipal& subject() const { return subject_; } |
| |
| // The issuer of the certificate. |
| const CertPrincipal& issuer() const { return issuer_; } |
| |
| // Time period during which the certificate is valid. More precisely, this |
| // certificate is invalid before the |valid_start| date and invalid after |
| // the |valid_expiry| date. |
| // If we were unable to parse either date from the certificate (or if the cert |
| // lacks either date), the date will be null (i.e., is_null() will be true). |
| const base::Time& valid_start() const { return valid_start_; } |
| const base::Time& valid_expiry() const { return valid_expiry_; } |
| |
| // The fingerprint of this certificate. |
| const SHA1HashValue& fingerprint() const { return fingerprint_; } |
| |
| // The fingerprint of the intermediate CA certificates. |
| const SHA1HashValue& ca_fingerprint() const { |
| return ca_fingerprint_; |
| } |
| |
| // Gets the DNS names in the certificate. Pursuant to RFC 2818, Section 3.1 |
| // Server Identity, if the certificate has a subjectAltName extension of |
| // type dNSName, this method gets the DNS names in that extension. |
| // Otherwise, it gets the common name in the subject field. |
| void GetDNSNames(std::vector<std::string>* dns_names) const; |
| |
| // Gets the subjectAltName extension field from the certificate, if any. |
| // For future extension; currently this only returns those name types that |
| // are required for HTTP certificate name verification - see VerifyHostname. |
| // Unrequired parameters may be passed as NULL. |
| void GetSubjectAltName(std::vector<std::string>* dns_names, |
| std::vector<std::string>* ip_addrs) const; |
| |
| // Convenience method that returns whether this certificate has expired as of |
| // now. |
| bool HasExpired() const; |
| |
| // Returns true if this object and |other| represent the same certificate. |
| bool Equals(const X509Certificate* other) const; |
| |
| // Returns intermediate certificates added via AddIntermediateCertificate(). |
| // Ownership follows the "get" rule: it is the caller's responsibility to |
| // retain the elements of the result. |
| const OSCertHandles& GetIntermediateCertificates() const { |
| return intermediate_ca_certs_; |
| } |
| |
| #if defined(OS_MACOSX) |
| // Does this certificate's usage allow SSL client authentication? |
| bool SupportsSSLClientAuth() const; |
| |
| // Do any of the given issuer names appear in this cert's chain of trust? |
| bool IsIssuedBy(const std::vector<CertPrincipal>& valid_issuers); |
| |
| // Adds all available SSL client identity certs to the given vector. |
| // |server_domain| is a hint for which domain the cert is to be sent to |
| // (a cert previously specified as the default for that domain will be given |
| // precedence and returned first in the output vector.) |
| // If valid_issuers is non-empty, only certs that were transitively issued |
| // by one of the given names will be included in the list. |
| static bool GetSSLClientCertificates( |
| const std::string& server_domain, |
| const std::vector<CertPrincipal>& valid_issuers, |
| CertificateList* certs); |
| |
| // Creates the chain of certs to use for this client identity cert. |
| CFArrayRef CreateClientCertificateChain() const; |
| |
| // Returns a new CFArrayRef containing this certificate and its intermediate |
| // certificates in the form expected by Security.framework and Keychain |
| // Services, or NULL on failure. |
| // The first item in the array will be this certificate, followed by its |
| // intermediates, if any. |
| CFArrayRef CreateOSCertChainForCert() const; |
| #endif |
| |
| #if defined(OS_WIN) |
| // Returns a new PCCERT_CONTEXT containing this certificate and its |
| // intermediate certificates, or NULL on failure. The returned |
| // PCCERT_CONTEXT *MUST NOT* be stored in an X509Certificate, as this will |
| // cause os_cert_handle() to return incorrect results. This function is only |
| // necessary if the CERT_CONTEXT.hCertStore member will be accessed or |
| // enumerated, which is generally true for any CryptoAPI functions involving |
| // certificate chains, including validation or certificate display. |
| // |
| // Remarks: |
| // Depending on the CryptoAPI function, Windows may need to access the |
| // HCERTSTORE that the passed-in PCCERT_CONTEXT belongs to, such as to |
| // locate additional intermediates. However, all certificate handles are added |
| // to a NULL HCERTSTORE, allowing the system to manage the resources. As a |
| // result, intermediates for |cert_handle_| cannot be located simply via |
| // |cert_handle_->hCertStore|, as it refers to a magic value indicating |
| // "only this certificate". |
| // |
| // To avoid this problems, a new in-memory HCERTSTORE is created containing |
| // just this certificate and its intermediates. The handle to the version of |
| // the current certificate in the new HCERTSTORE is then returned, with the |
| // PCCERT_CONTEXT's HCERTSTORE set to be automatically freed when the returned |
| // certificate handle is freed. |
| // |
| // This function is only needed when the HCERTSTORE of the os_cert_handle() |
| // will be accessed, which is generally only during certificate validation |
| // or display. While the returned PCCERT_CONTEXT and its HCERTSTORE can |
| // safely be used on multiple threads if no further modifications happen, it |
| // is generally preferable for each thread that needs such a context to |
| // obtain its own, rather than risk thread-safety issues by sharing. |
| // |
| // Because of how X509Certificate caching is implemented, attempting to |
| // create an X509Certificate from the returned PCCERT_CONTEXT may result in |
| // the original handle (and thus the originall HCERTSTORE) being returned by |
| // os_cert_handle(). For this reason, the returned PCCERT_CONTEXT *MUST NOT* |
| // be stored in an X509Certificate. |
| PCCERT_CONTEXT CreateOSCertChainForCert() const; |
| #endif |
| |
| #if defined(USE_OPENSSL) |
| // Returns a handle to a global, in-memory certificate store. We |
| // use it for test code, e.g. importing the test server's certificate. |
| static X509_STORE* cert_store(); |
| #endif |
| |
| // Verifies that |hostname| matches this certificate. |
| // Does not verify that the certificate is valid, only that the certificate |
| // matches this host. |
| // Returns true if it matches. |
| bool VerifyNameMatch(const std::string& hostname) const; |
| |
| // Obtains the DER encoded certificate data for |cert_handle|. On success, |
| // returns true and writes the DER encoded certificate to |*der_encoded|. |
| static bool GetDEREncoded(OSCertHandle cert_handle, |
| std::string* der_encoded); |
| |
| // Returns the PEM encoded data from an OSCertHandle. If the return value is |
| // true, then the PEM encoded certificate is written to |pem_encoded|. |
| static bool GetPEMEncoded(OSCertHandle cert_handle, |
| std::string* pem_encoded); |
| |
| // Encodes the entire certificate chain (this certificate and any |
| // intermediate certificates stored in |intermediate_ca_certs_|) as a series |
| // of PEM encoded strings. Returns true if all certificates were encoded, |
| // storig the result in |*pem_encoded|, with this certificate stored as |
| // the first element. |
| bool GetPEMEncodedChain(std::vector<std::string>* pem_encoded) const; |
| |
| // Sets |*size_bits| to be the length of the public key in bits, and sets |
| // |*type| to one of the |PublicKeyType| values. In case of |
| // |kPublicKeyTypeUnknown|, |*size_bits| will be set to 0. |
| static void GetPublicKeyInfo(OSCertHandle cert_handle, |
| size_t* size_bits, |
| PublicKeyType* type); |
| |
| // Returns the OSCertHandle of this object. Because of caching, this may |
| // differ from the OSCertHandle originally supplied during initialization. |
| // Note: On Windows, CryptoAPI may return unexpected results if this handle |
| // is used across multiple threads. For more details, see |
| // CreateOSCertChainForCert(). |
| OSCertHandle os_cert_handle() const { return cert_handle_; } |
| |
| // Returns true if two OSCertHandles refer to identical certificates. |
| static bool IsSameOSCert(OSCertHandle a, OSCertHandle b); |
| |
| // Creates an OS certificate handle from the DER-encoded representation. |
| // Returns NULL on failure. |
| static OSCertHandle CreateOSCertHandleFromBytes(const char* data, |
| int length); |
| |
| #if defined(USE_NSS) |
| // Creates an OS certificate handle from the DER-encoded representation. |
| // Returns NULL on failure. Sets the default nickname if |nickname| is |
| // non-NULL. |
| static OSCertHandle CreateOSCertHandleFromBytesWithNickname( |
| const char* data, |
| int length, |
| const char* nickname); |
| #endif |
| |
| // Creates all possible OS certificate handles from |data| encoded in a |
| // specific |format|. Returns an empty collection on failure. |
| static OSCertHandles CreateOSCertHandlesFromBytes( |
| const char* data, |
| int length, |
| Format format); |
| |
| // Duplicates (or adds a reference to) an OS certificate handle. |
| static OSCertHandle DupOSCertHandle(OSCertHandle cert_handle); |
| |
| // Frees (or releases a reference to) an OS certificate handle. |
| static void FreeOSCertHandle(OSCertHandle cert_handle); |
| |
| // Calculates the SHA-1 fingerprint of the certificate. Returns an empty |
| // (all zero) fingerprint on failure. |
| static SHA1HashValue CalculateFingerprint(OSCertHandle cert_handle); |
| |
| // Calculates the SHA-1 fingerprint of the intermediate CA certificates. |
| // Returns an empty (all zero) fingerprint on failure. |
| static SHA1HashValue CalculateCAFingerprint( |
| const OSCertHandles& intermediates); |
| |
| private: |
| friend class base::RefCountedThreadSafe<X509Certificate>; |
| friend class TestRootCerts; // For unit tests |
| |
| FRIEND_TEST_ALL_PREFIXES(X509CertificateNameVerifyTest, VerifyHostname); |
| FRIEND_TEST_ALL_PREFIXES(X509CertificateTest, SerialNumbers); |
| |
| // Construct an X509Certificate from a handle to the certificate object |
| // in the underlying crypto library. |
| X509Certificate(OSCertHandle cert_handle, |
| const OSCertHandles& intermediates); |
| |
| ~X509Certificate(); |
| |
| // Common object initialization code. Called by the constructors only. |
| void Initialize(); |
| |
| #if defined(USE_OPENSSL) |
| // Resets the store returned by cert_store() to default state. Used by |
| // TestRootCerts to undo modifications. |
| static void ResetCertStore(); |
| #endif |
| |
| // Verifies that |hostname| matches one of the certificate names or IP |
| // addresses supplied, based on TLS name matching rules - specifically, |
| // following http://tools.ietf.org/html/rfc6125. |
| // |cert_common_name| is the Subject CN, e.g. from X509Certificate::subject(). |
| // The members of |cert_san_dns_names| and |cert_san_ipaddrs| must be filled |
| // from the dNSName and iPAddress components of the subject alternative name |
| // extension, if present. Note these IP addresses are NOT ascii-encoded: |
| // they must be 4 or 16 bytes of network-ordered data, for IPv4 and IPv6 |
| // addresses, respectively. |
| static bool VerifyHostname(const std::string& hostname, |
| const std::string& cert_common_name, |
| const std::vector<std::string>& cert_san_dns_names, |
| const std::vector<std::string>& cert_san_ip_addrs); |
| |
| // Reads a single certificate from |pickle_iter| and returns a |
| // platform-specific certificate handle. The format of the certificate |
| // stored in |pickle_iter| is not guaranteed to be the same across different |
| // underlying cryptographic libraries, nor acceptable to CreateFromBytes(). |
| // Returns an invalid handle, NULL, on failure. |
| // NOTE: This should not be used for any new code. It is provided for |
| // migration purposes and should eventually be removed. |
| static OSCertHandle ReadOSCertHandleFromPickle(PickleIterator* pickle_iter); |
| |
| // Writes a single certificate to |pickle| in DER form. Returns false on |
| // failure. |
| static bool WriteOSCertHandleToPickle(OSCertHandle handle, Pickle* pickle); |
| |
| // The subject of the certificate. |
| CertPrincipal subject_; |
| |
| // The issuer of the certificate. |
| CertPrincipal issuer_; |
| |
| // This certificate is not valid before |valid_start_| |
| base::Time valid_start_; |
| |
| // This certificate is not valid after |valid_expiry_| |
| base::Time valid_expiry_; |
| |
| // The fingerprint of this certificate. |
| SHA1HashValue fingerprint_; |
| |
| // The fingerprint of the intermediate CA certificates. |
| SHA1HashValue ca_fingerprint_; |
| |
| // The serial number of this certificate, DER encoded. |
| std::string serial_number_; |
| |
| // A handle to the certificate object in the underlying crypto library. |
| OSCertHandle cert_handle_; |
| |
| // Untrusted intermediate certificates associated with this certificate |
| // that may be needed for chain building. |
| OSCertHandles intermediate_ca_certs_; |
| |
| #if defined(USE_NSS) |
| // This stores any default nickname that has been set on the certificate |
| // at creation time with CreateFromBytesWithNickname. |
| // If this is empty, then GetDefaultNickname will return a generated name |
| // based on the type of the certificate. |
| std::string default_nickname_; |
| #endif |
| |
| DISALLOW_COPY_AND_ASSIGN(X509Certificate); |
| }; |
| |
| } // namespace net |
| |
| #endif // NET_BASE_X509_CERTIFICATE_H_ |