1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/ssl/client_cert_store_nss.h"
10 #include "base/bind.h"
11 #include "base/location.h"
12 #include "base/logging.h"
13 #include "base/memory/scoped_ptr.h"
14 #include "base/strings/string_piece.h"
15 #include "base/threading/worker_pool.h"
16 #include "crypto/nss_crypto_module_delegate.h"
17 #include "net/cert/x509_util.h"
21 ClientCertStoreNSS::ClientCertStoreNSS(
22 const PasswordDelegateFactory
& password_delegate_factory
)
23 : password_delegate_factory_(password_delegate_factory
) {}
25 ClientCertStoreNSS::~ClientCertStoreNSS() {}
27 void ClientCertStoreNSS::GetClientCerts(const SSLCertRequestInfo
& request
,
28 CertificateList
* selected_certs
,
29 const base::Closure
& callback
) {
30 scoped_ptr
<crypto::CryptoModuleBlockingPasswordDelegate
> password_delegate
;
31 if (!password_delegate_factory_
.is_null()) {
32 password_delegate
.reset(
33 password_delegate_factory_
.Run(request
.host_and_port
));
35 if (base::WorkerPool::PostTaskAndReply(
37 base::Bind(&ClientCertStoreNSS::GetClientCertsOnWorkerThread
,
38 // Caller is responsible for keeping the ClientCertStore
39 // alive until the callback is run.
40 base::Unretained(this),
41 base::Passed(&password_delegate
),
47 selected_certs
->clear();
51 void ClientCertStoreNSS::GetClientCertsImpl(CERTCertList
* cert_list
,
52 const SSLCertRequestInfo
& request
,
54 CertificateList
* selected_certs
) {
56 DCHECK(selected_certs
);
58 selected_certs
->clear();
60 // Create a "fake" CERTDistNames structure. No public API exists to create
61 // one from a list of issuers.
62 CERTDistNames ca_names
;
63 ca_names
.arena
= NULL
;
65 ca_names
.names
= NULL
;
68 std::vector
<SECItem
> ca_names_items(request
.cert_authorities
.size());
69 for (size_t i
= 0; i
< request
.cert_authorities
.size(); ++i
) {
70 const std::string
& authority
= request
.cert_authorities
[i
];
71 ca_names_items
[i
].type
= siBuffer
;
72 ca_names_items
[i
].data
=
73 reinterpret_cast<unsigned char*>(const_cast<char*>(authority
.data()));
74 ca_names_items
[i
].len
= static_cast<unsigned int>(authority
.size());
76 ca_names
.nnames
= static_cast<int>(ca_names_items
.size());
77 if (!ca_names_items
.empty())
78 ca_names
.names
= &ca_names_items
[0];
81 for (CERTCertListNode
* node
= CERT_LIST_HEAD(cert_list
);
82 !CERT_LIST_END(node
, cert_list
);
83 node
= CERT_LIST_NEXT(node
)) {
85 // Only offer unexpired certificates.
86 if (CERT_CheckCertValidTimes(node
->cert
, PR_Now(), PR_TRUE
) !=
88 DVLOG(2) << "skipped expired cert: "
89 << base::StringPiece(node
->cert
->nickname
);
93 scoped_refptr
<X509Certificate
> cert
= X509Certificate::CreateFromHandle(
94 node
->cert
, X509Certificate::OSCertHandles());
96 // Check if the certificate issuer is allowed by the server.
97 if (request
.cert_authorities
.empty() ||
99 cert
->IsIssuedByEncoded(request
.cert_authorities
)) ||
101 NSS_CmpCertChainWCANames(node
->cert
, &ca_names
) == SECSuccess
)) {
102 DVLOG(2) << "matched cert: " << base::StringPiece(node
->cert
->nickname
);
103 selected_certs
->push_back(cert
);
106 DVLOG(2) << "skipped non-matching cert: "
107 << base::StringPiece(node
->cert
->nickname
);
109 DVLOG(2) << "num_raw:" << num_raw
110 << " num_selected:" << selected_certs
->size();
112 std::sort(selected_certs
->begin(), selected_certs
->end(),
113 x509_util::ClientCertSorter());
116 void ClientCertStoreNSS::GetClientCertsOnWorkerThread(
117 scoped_ptr
<crypto::CryptoModuleBlockingPasswordDelegate
> password_delegate
,
118 const SSLCertRequestInfo
* request
,
119 CertificateList
* selected_certs
) {
120 CERTCertList
* client_certs
= CERT_FindUserCertsByUsage(
121 CERT_GetDefaultCertDB(),
125 password_delegate
.get());
126 // It is ok for a user not to have any client certs.
128 DVLOG(2) << "No client certs found.";
129 selected_certs
->clear();
133 GetClientCertsImpl(client_certs
, *request
, true, selected_certs
);
134 CERT_DestroyCertList(client_certs
);
137 bool ClientCertStoreNSS::SelectClientCertsForTesting(
138 const CertificateList
& input_certs
,
139 const SSLCertRequestInfo
& request
,
140 CertificateList
* selected_certs
) {
141 CERTCertList
* cert_list
= CERT_NewCertList();
144 for (size_t i
= 0; i
< input_certs
.size(); ++i
) {
145 CERT_AddCertToListTail(
146 cert_list
, CERT_DupCertificate(input_certs
[i
]->os_cert_handle()));
149 GetClientCertsImpl(cert_list
, request
, false, selected_certs
);
150 CERT_DestroyCertList(cert_list
);