15821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// found in the LICENSE file.
45821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
5c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#include "net/cert/test_root_certs.h"
65821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
75821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include <Security/Security.h>
85821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
95821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/logging.h"
10c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#include "base/mac/mac_util.h"
115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)#include "base/mac/scoped_cftyperef.h"
12c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)#include "net/cert/x509_certificate.h"
135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
145821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace net {
155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)namespace {
175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
185821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)typedef OSStatus (*SecTrustSetAnchorCertificatesOnlyFuncPtr)(SecTrustRef,
195821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                                             Boolean);
205821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
215821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)Boolean OurSecCertificateEqual(const void* value1, const void* value2) {
225821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (CFGetTypeID(value1) != SecCertificateGetTypeID() ||
235821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      CFGetTypeID(value2) != SecCertificateGetTypeID())
245821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return CFEqual(value1, value2);
255821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return X509Certificate::IsSameOSCert(
265821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<SecCertificateRef>(const_cast<void*>(value1)),
275821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      reinterpret_cast<SecCertificateRef>(const_cast<void*>(value2)));
285821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
295821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
305821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const void* RetainWrapper(CFAllocatorRef unused, const void* value) {
315821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return CFRetain(value);
325821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
335821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
345821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void ReleaseWrapper(CFAllocatorRef unused, const void* value) {
355821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CFRelease(value);
365821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
375821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
385821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// CFEqual prior to 10.6 only performed pointer checks on SecCertificateRefs,
395821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// rather than checking if they were the same (logical) certificate, so a
405821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)// custom structure is used for the array callbacks.
415821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)const CFArrayCallBacks kCertArrayCallbacks = {
425821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  0,  // version
435821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  RetainWrapper,
445821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  ReleaseWrapper,
455821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CFCopyDescription,
465821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  OurSecCertificateEqual,
475821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)};
485821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
495821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace
505821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
515821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool TestRootCerts::Add(X509Certificate* certificate) {
525821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (CFArrayContainsValue(temporary_roots_,
535821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           CFRangeMake(0, CFArrayGetCount(temporary_roots_)),
545821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                           certificate->os_cert_handle()))
555821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return true;
565821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
575821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return true;
585821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
595821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
605821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void TestRootCerts::Clear() {
615821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CFArrayRemoveAllValues(temporary_roots_);
625821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
635821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
645821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)bool TestRootCerts::IsEmpty() const {
655821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return CFArrayGetCount(temporary_roots_) == 0;
665821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
675821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
685821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)OSStatus TestRootCerts::FixupSecTrustRef(SecTrustRef trust_ref) const {
695821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (IsEmpty())
705821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return noErr;
715821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
72c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  // Despite SecTrustSetAnchorCertificatesOnly existing in OS X 10.6, and
73c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  // being documented as available, it is not actually implemented. On 10.7+,
74c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  // however, it always works.
75c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  if (base::mac::IsOSLionOrLater()) {
76c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)    OSStatus status = SecTrustSetAnchorCertificates(trust_ref,
77c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)                                                    temporary_roots_);
785821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    if (status)
795821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)      return status;
807d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)    return SecTrustSetAnchorCertificatesOnly(trust_ref, !allow_system_trust_);
815821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  }
825821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
837d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  if (!allow_system_trust_) {
847d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)    // Avoid any copying if system roots are not to be trusted. This acts as
857d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)    // an exclusive list on 10.6, replacing the built-ins.
867d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)    return SecTrustSetAnchorCertificates(trust_ref, temporary_roots_);
877d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  }
887d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)
897d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  // Otherwise, both system trust and temporary_roots_ must be trusted.
907d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  // Emulate the functionality of SecTrustSetAnchorCertificatesOnly by
917d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  // creating a copy of the system roots and merging with temporary_roots_.
925821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CFArrayRef system_roots = NULL;
93c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)  OSStatus status = SecTrustCopyAnchorCertificates(&system_roots);
945821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  if (status)
955821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)    return status;
965821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
97eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  base::ScopedCFTypeRef<CFArrayRef> scoped_system_roots(system_roots);
98eb525c5499e34cc9c4b825d6d9e75bb07cc06aceBen Murdoch  base::ScopedCFTypeRef<CFMutableArrayRef> scoped_roots(
99c2e0dbddbe15c98d52c4786dac06cb8952a8ae6dTorne (Richard Coles)      CFArrayCreateMutableCopy(kCFAllocatorDefault, 0, scoped_system_roots));
1005821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  CFArrayAppendArray(scoped_roots, temporary_roots_,
1015821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                     CFRangeMake(0, CFArrayGetCount(temporary_roots_)));
1025821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  return SecTrustSetAnchorCertificates(trust_ref, scoped_roots);
1035821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1045821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1057d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)void TestRootCerts::SetAllowSystemTrust(bool allow_system_trust) {
1067d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  allow_system_trust_ = allow_system_trust;
1077d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)}
1087d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)
1095821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)TestRootCerts::~TestRootCerts() {}
1105821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1115821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)void TestRootCerts::Init() {
1125821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)  temporary_roots_.reset(CFArrayCreateMutable(kCFAllocatorDefault, 0,
1135821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)                                              &kCertArrayCallbacks));
1147d4cd473f85ac64c3747c96c277f9e506a0d2246Torne (Richard Coles)  allow_system_trust_ = true;
1155821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}
1165821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)
1175821806d5e7f356e8fa4b058a389a808ea183019Torne (Richard Coles)}  // namespace net
118