blob: f07b60fbc609cd7edf4d99dbb5925f1024537053 [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#import "ios/web/net/crw_cert_verification_controller.h"
#include <memory>
#include "base/bind.h"
#import "base/ios/block_types.h"
#include "base/logging.h"
#include "base/memory/ref_counted.h"
#include "base/strings/sys_string_conversions.h"
#include "base/task/post_task.h"
#include "ios/web/public/browser_state.h"
#include "ios/web/public/certificate_policy_cache.h"
#include "ios/web/public/web_task_traits.h"
#include "ios/web/public/web_thread.h"
#import "ios/web/web_state/wk_web_view_security_util.h"
#include "net/cert/cert_verify_proc_ios.h"
#include "net/cert/x509_util.h"
#include "net/cert/x509_util_ios.h"
#if !defined(__has_feature) || !__has_feature(objc_arc)
#error "This file requires ARC support."
#endif
using base::TaskShutdownBehavior;
using base::TaskTraits;
using web::WebThread;
@interface CRWCertVerificationController () {
// Used to remember user exceptions to invalid certs.
scoped_refptr<web::CertificatePolicyCache> _certPolicyCache;
}
// Returns cert status for the given |trust|.
- (net::CertStatus)certStatusFromTrustResult:(SecTrustResultType)trustResult
serverTrust:
(base::ScopedCFTypeRef<SecTrustRef>)trust;
// Decides the policy for the given |trust| which was rejected by iOS and the
// given |host| and calls |handler| on completion. Must be called on UI thread.
// |handler| can not be null and will be called on UI thread.
- (void)
decideLoadPolicyForRejectedTrustResult:(SecTrustResultType)trustResult
serverTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
host:(NSString*)host
completionHandler:(web::PolicyDecisionHandler)handler;
// Verifies the given |trust| using SecTrustRef API. |completionHandler| cannot
// be null and will be called on UI thread or never be called if the worker task
// can't start or complete. Must be called on UI thread.
- (void)verifyTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
completionHandler:(void (^)(SecTrustResultType))completionHandler;
// Returns cert accept policy for the given SecTrust result. |trustResult| must
// not be for a valid cert. Must be called on IO thread.
- (web::CertAcceptPolicy)
loadPolicyForRejectedTrustResult:(SecTrustResultType)trustResult
certStatus:(net::CertStatus)certStatus
serverTrust:(SecTrustRef)trust
host:(NSString*)host;
@end
@implementation CRWCertVerificationController
#pragma mark - Public
- (instancetype)initWithBrowserState:(web::BrowserState*)browserState {
DCHECK(browserState);
DCHECK_CURRENTLY_ON(WebThread::UI);
self = [super init];
if (self) {
_certPolicyCache =
web::BrowserState::GetCertificatePolicyCache(browserState);
}
return self;
}
- (void)decideLoadPolicyForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
host:(NSString*)host
completionHandler:(web::PolicyDecisionHandler)completionHandler {
DCHECK_CURRENTLY_ON(WebThread::UI);
DCHECK(completionHandler);
[self verifyTrust:trust
completionHandler:^(SecTrustResultType trustResult) {
DCHECK_CURRENTLY_ON(WebThread::UI);
if (trustResult == kSecTrustResultProceed ||
trustResult == kSecTrustResultUnspecified) {
completionHandler(web::CERT_ACCEPT_POLICY_ALLOW, net::CertStatus());
return;
}
[self decideLoadPolicyForRejectedTrustResult:trustResult
serverTrust:trust
host:host
completionHandler:completionHandler];
}];
}
- (void)querySSLStatusForTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
host:(NSString*)host
completionHandler:(web::StatusQueryHandler)completionHandler {
DCHECK_CURRENTLY_ON(WebThread::UI);
DCHECK(completionHandler);
[self verifyTrust:trust
completionHandler:^(SecTrustResultType trustResult) {
web::SecurityStyle securityStyle =
web::GetSecurityStyleFromTrustResult(trustResult);
net::CertStatus certStatus =
[self certStatusFromTrustResult:trustResult serverTrust:trust];
completionHandler(securityStyle, certStatus);
}];
}
- (void)allowCert:(scoped_refptr<net::X509Certificate>)cert
forHost:(NSString*)host
status:(net::CertStatus)status {
DCHECK_CURRENTLY_ON(WebThread::UI);
// Store user decisions with the leaf cert, ignoring any intermediates.
// This is because WKWebView returns the verified certificate chain in
// |webView:didReceiveAuthenticationChallenge:completionHandler:|,
// but the server-supplied chain in
// |webView:didFailProvisionalNavigation:withError:|.
if (!cert->intermediate_buffers().empty()) {
cert = net::X509Certificate::CreateFromBuffer(
bssl::UpRef(cert->cert_buffer()), {});
DCHECK(cert);
}
DCHECK(cert->intermediate_buffers().empty());
base::PostTaskWithTraits(FROM_HERE, {WebThread::IO}, base::BindOnce(^{
_certPolicyCache->AllowCertForHost(
cert.get(), base::SysNSStringToUTF8(host),
status);
}));
}
#pragma mark - Private
- (net::CertStatus)certStatusFromTrustResult:(SecTrustResultType)trustResult
serverTrust:
(base::ScopedCFTypeRef<SecTrustRef>)trust {
net::CertStatus certStatus = net::CertStatus();
switch (trustResult) {
case kSecTrustResultProceed:
case kSecTrustResultUnspecified:
break;
case kSecTrustResultDeny:
certStatus |= net::CERT_STATUS_AUTHORITY_INVALID;
break;
default:
certStatus |=
net::CertVerifyProcIOS::GetCertFailureStatusFromTrust(trust);
if (!net::IsCertStatusError(certStatus)) {
certStatus |= net::CERT_STATUS_INVALID;
}
}
return certStatus;
}
- (void)
decideLoadPolicyForRejectedTrustResult:(SecTrustResultType)trustResult
serverTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
host:(NSString*)host
completionHandler:(web::PolicyDecisionHandler)handler {
DCHECK_CURRENTLY_ON(WebThread::UI);
DCHECK(handler);
TaskTraits traits{WebThread::IO, TaskShutdownBehavior::BLOCK_SHUTDOWN};
base::PostTaskWithTraits(
FROM_HERE, traits, base::BindOnce(^{
// |loadPolicyForRejectedTrustResult:certStatus:serverTrust:host:| can
// only be called on IO thread.
net::CertStatus certStatus =
[self certStatusFromTrustResult:trustResult serverTrust:trust];
web::CertAcceptPolicy policy =
[self loadPolicyForRejectedTrustResult:trustResult
certStatus:certStatus
serverTrust:trust.get()
host:host];
TaskTraits traits{WebThread::UI, TaskShutdownBehavior::BLOCK_SHUTDOWN};
base::PostTaskWithTraits(FROM_HERE, traits, base::BindOnce(^{
handler(policy, certStatus);
}));
}));
}
- (void)verifyTrust:(base::ScopedCFTypeRef<SecTrustRef>)trust
completionHandler:(void (^)(SecTrustResultType))completionHandler {
DCHECK_CURRENTLY_ON(WebThread::UI);
DCHECK(completionHandler);
// SecTrustEvaluate performs trust evaluation synchronously, possibly making
// network requests. The UI thread should not be blocked by that operation.
base::PostTaskWithTraits(
FROM_HERE, {TaskShutdownBehavior::BLOCK_SHUTDOWN}, base::BindOnce(^{
SecTrustResultType trustResult = kSecTrustResultInvalid;
if (SecTrustEvaluate(trust.get(), &trustResult) != errSecSuccess) {
trustResult = kSecTrustResultInvalid;
}
TaskTraits traits{WebThread::UI, TaskShutdownBehavior::BLOCK_SHUTDOWN};
base::PostTaskWithTraits(FROM_HERE, traits, base::BindOnce(^{
completionHandler(trustResult);
}));
}));
}
- (web::CertAcceptPolicy)
loadPolicyForRejectedTrustResult:(SecTrustResultType)trustResult
certStatus:(net::CertStatus)certStatus
serverTrust:(SecTrustRef)trust
host:(NSString*)host {
DCHECK_CURRENTLY_ON(WebThread::IO);
DCHECK_NE(web::SECURITY_STYLE_AUTHENTICATED,
web::GetSecurityStyleFromTrustResult(trustResult));
if (trustResult != kSecTrustResultRecoverableTrustFailure ||
SecTrustGetCertificateCount(trust) == 0) {
// Trust result is not recoverable or leaf cert is missing.
return web::CERT_ACCEPT_POLICY_NON_RECOVERABLE_ERROR;
}
// Check if user has decided to proceed with this bad cert.
scoped_refptr<net::X509Certificate> leafCert =
net::x509_util::CreateX509CertificateFromSecCertificate(
SecTrustGetCertificateAtIndex(trust, 0),
std::vector<SecCertificateRef>());
if (!leafCert)
return web::CERT_ACCEPT_POLICY_NON_RECOVERABLE_ERROR;
web::CertPolicy::Judgment judgment = _certPolicyCache->QueryPolicy(
leafCert.get(), base::SysNSStringToUTF8(host), certStatus);
return (judgment == web::CertPolicy::ALLOWED)
? web::CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_ACCEPTED_BY_USER
: web::CERT_ACCEPT_POLICY_RECOVERABLE_ERROR_UNDECIDED_BY_USER;
}
@end