blob: 35913c19d2b5cd1ba2e7eee46ddf9aa4e9844f0d [file] [log] [blame]
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "net/cert/x509_util.h"
#include <memory>
#include "base/time/time.h"
#include "crypto/ec_private_key.h"
#include "crypto/rsa_private_key.h"
#include "net/base/hash_value.h"
#include "net/cert/internal/name_constraints.h"
#include "net/cert/internal/parse_certificate.h"
#include "net/cert/internal/parse_name.h"
#include "net/cert/internal/signature_algorithm.h"
#include "net/cert/x509_certificate.h"
#include "net/der/input.h"
#include "net/der/parse_values.h"
namespace net {
namespace {
bool GetCommonName(const der::Input& tlv, std::string* common_name) {
RDNSequence rdn_sequence;
if (!ParseName(tlv, &rdn_sequence))
return false;
for (const auto& rdn : rdn_sequence) {
for (const auto& atv : rdn) {
if (atv.type == TypeCommonNameOid()) {
return atv.ValueAsStringUnsafe(common_name);
}
}
}
return true;
}
bool DecodeTime(const der::GeneralizedTime& generalized_time,
base::Time* time) {
base::Time::Exploded exploded = {0};
exploded.year = generalized_time.year;
exploded.month = generalized_time.month;
exploded.day_of_month = generalized_time.day;
exploded.hour = generalized_time.hours;
exploded.minute = generalized_time.minutes;
exploded.second = generalized_time.seconds;
return base::Time::FromUTCExploded(exploded, time);
}
} // namespace
namespace x509_util {
// RSA keys created by CreateKeyAndSelfSignedCert will be of this length.
static const uint16_t kRSAKeyLength = 1024;
// Certificates made by CreateKeyAndSelfSignedCert and
// CreateKeyAndChannelIDEC will be signed using this digest algorithm.
static const DigestAlgorithm kSignatureDigestAlgorithm = DIGEST_SHA256;
ClientCertSorter::ClientCertSorter() : now_(base::Time::Now()) {}
bool ClientCertSorter::operator()(
const scoped_refptr<X509Certificate>& a,
const scoped_refptr<X509Certificate>& b) const {
// Certificates that are null are sorted last.
if (!a.get() || !b.get())
return a.get() && !b.get();
// Certificates that are expired/not-yet-valid are sorted last.
bool a_is_valid = now_ >= a->valid_start() && now_ <= a->valid_expiry();
bool b_is_valid = now_ >= b->valid_start() && now_ <= b->valid_expiry();
if (a_is_valid != b_is_valid)
return a_is_valid && !b_is_valid;
// Certificates with longer expirations appear as higher priority (less
// than) certificates with shorter expirations.
if (a->valid_expiry() != b->valid_expiry())
return a->valid_expiry() > b->valid_expiry();
// If the expiration dates are equivalent, certificates that were issued
// more recently should be prioritized over older certificates.
if (a->valid_start() != b->valid_start())
return a->valid_start() > b->valid_start();
// Otherwise, prefer client certificates with shorter chains.
const X509Certificate::OSCertHandles& a_intermediates =
a->GetIntermediateCertificates();
const X509Certificate::OSCertHandles& b_intermediates =
b->GetIntermediateCertificates();
return a_intermediates.size() < b_intermediates.size();
}
bool CreateKeyAndSelfSignedCert(const std::string& subject,
uint32_t serial_number,
base::Time not_valid_before,
base::Time not_valid_after,
std::unique_ptr<crypto::RSAPrivateKey>* key,
std::string* der_cert) {
std::unique_ptr<crypto::RSAPrivateKey> new_key(
crypto::RSAPrivateKey::Create(kRSAKeyLength));
if (!new_key.get())
return false;
bool success = CreateSelfSignedCert(new_key.get(),
kSignatureDigestAlgorithm,
subject,
serial_number,
not_valid_before,
not_valid_after,
der_cert);
if (success)
key->reset(new_key.release());
return success;
}
bool ParseCertificateSandboxed(const base::StringPiece& certificate,
std::string* subject,
std::string* issuer,
base::Time* not_before,
base::Time* not_after,
std::vector<std::string>* dns_names,
std::vector<std::string>* ip_addresses) {
der::Input cert_data(certificate);
der::Input tbs_cert, signature_alg;
der::BitString signature_value;
if (!ParseCertificate(cert_data, &tbs_cert, &signature_alg, &signature_value,
nullptr))
return false;
ParsedTbsCertificate parsed_tbs_cert;
if (!ParseTbsCertificate(tbs_cert, ParseCertificateOptions(),
&parsed_tbs_cert, nullptr))
return false;
if (!GetCommonName(parsed_tbs_cert.subject_tlv, subject))
return false;
if (!GetCommonName(parsed_tbs_cert.issuer_tlv, issuer))
return false;
if (!DecodeTime(parsed_tbs_cert.validity_not_before, not_before))
return false;
if (!DecodeTime(parsed_tbs_cert.validity_not_after, not_after))
return false;
if (!parsed_tbs_cert.has_extensions)
return true;
std::map<der::Input, ParsedExtension> extensions;
if (!ParseExtensions(parsed_tbs_cert.extensions_tlv, &extensions))
return false;
std::vector<std::string> san;
auto iter = extensions.find(SubjectAltNameOid());
if (iter != extensions.end()) {
std::unique_ptr<GeneralNames> subject_alt_names =
GeneralNames::Create(iter->second.value);
if (subject_alt_names) {
*dns_names = subject_alt_names->dns_names;
for (const auto& ip : subject_alt_names->ip_addresses)
ip_addresses->push_back(ip.ToString());
}
}
return true;
}
} // namespace x509_util
} // namespace net