Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(380)

Side by Side Diff: chromeos/network/onc/onc_certificate_importer.cc

Issue 11970012: Add a check for server and CA certificates in device policies to the ONC validator. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Fixing unit tests. Created 7 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "chromeos/network/onc/onc_certificate_importer.h" 5 #include "chromeos/network/onc/onc_certificate_importer.h"
6 6
7 #include <cert.h> 7 #include <cert.h>
8 #include <keyhi.h> 8 #include <keyhi.h>
9 #include <pk11pub.h> 9 #include <pk11pub.h>
10 10
(...skipping 16 matching lines...) Expand all
27 // The PEM block header used for DER certificates 27 // The PEM block header used for DER certificates
28 const char kCertificateHeader[] = "CERTIFICATE"; 28 const char kCertificateHeader[] = "CERTIFICATE";
29 // This is an older PEM marker for DER certificates. 29 // This is an older PEM marker for DER certificates.
30 const char kX509CertificateHeader[] = "X509 CERTIFICATE"; 30 const char kX509CertificateHeader[] = "X509 CERTIFICATE";
31 31
32 } // namespace 32 } // namespace
33 33
34 namespace chromeos { 34 namespace chromeos {
35 namespace onc { 35 namespace onc {
36 36
37 CertificateImporter::CertificateImporter( 37 CertificateImporter::CertificateImporter(bool allow_web_trust)
38 ONCSource onc_source, 38 : allow_web_trust_(allow_web_trust) {
39 bool allow_web_trust_from_policy)
40 : onc_source_(onc_source),
41 allow_web_trust_from_policy_(allow_web_trust_from_policy) {
42 } 39 }
43 40
44 CertificateImporter::ParseResult CertificateImporter::ParseAndStoreCertificates( 41 CertificateImporter::ParseResult CertificateImporter::ParseAndStoreCertificates(
45 const base::ListValue& certificates) { 42 const base::ListValue& certificates) {
46 size_t successful_imports = 0; 43 size_t successful_imports = 0;
47 for (size_t i = 0; i < certificates.GetSize(); ++i) { 44 for (size_t i = 0; i < certificates.GetSize(); ++i) {
48 const base::DictionaryValue* certificate = NULL; 45 const base::DictionaryValue* certificate = NULL;
49 if (!certificates.GetDictionary(i, &certificate)) { 46 certificates.GetDictionary(i, &certificate);
50 ONC_LOG_ERROR("Certificate data malformed"); 47 DCHECK(certificate != NULL);
51 continue;
52 }
53 48
54 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate; 49 VLOG(2) << "Parsing certificate at index " << i << ": " << *certificate;
55 50
56 if (!ParseAndStoreCertificate(*certificate)) { 51 if (!ParseAndStoreCertificate(*certificate)) {
57 ONC_LOG_ERROR( 52 ONC_LOG_ERROR(
58 base::StringPrintf("Cannot parse certificate at index %zu", i)); 53 base::StringPrintf("Cannot parse certificate at index %zu", i));
59 } else { 54 } else {
60 VLOG(2) << "Successfully imported certificate at index " << i; 55 VLOG(2) << "Successfully imported certificate at index " << i;
61 ++successful_imports; 56 ++successful_imports;
62 } 57 }
63 } 58 }
64 59
65 if (successful_imports == certificates.GetSize()) 60 if (successful_imports == certificates.GetSize()) {
66 return IMPORT_OK; 61 return IMPORT_OK;
67 else if (successful_imports == 0) 62 } else if (successful_imports == 0) {
68 return IMPORT_FAILED; 63 return IMPORT_FAILED;
69 else 64 } else {
70 return IMPORT_INCOMPLETE; 65 return IMPORT_INCOMPLETE;
66 }
71 } 67 }
72 68
73 bool CertificateImporter::ParseAndStoreCertificate( 69 bool CertificateImporter::ParseAndStoreCertificate(
74 const base::DictionaryValue& certificate) { 70 const base::DictionaryValue& certificate) {
75 // Get out the attributes of the given certificate. 71 // Get out the attributes of the given certificate.
76 std::string guid; 72 std::string guid;
77 if (!certificate.GetString(certificate::kGUID, &guid) || guid.empty()) { 73 certificate.GetString(certificate::kGUID, &guid);
78 ONC_LOG_ERROR("Certificate missing GUID identifier"); 74 DCHECK(!guid.empty());
79 return false;
80 }
81 75
82 bool remove = false; 76 bool remove = false;
83 if (certificate.GetBoolean(kRemove, &remove) && remove) { 77 if (certificate.GetBoolean(kRemove, &remove) && remove) {
84 if (!DeleteCertAndKeyByNickname(guid)) { 78 if (!DeleteCertAndKeyByNickname(guid)) {
85 ONC_LOG_ERROR("Unable to delete certificate"); 79 ONC_LOG_ERROR("Unable to delete certificate");
86 return false; 80 return false;
87 } else { 81 } else {
88 return true; 82 return true;
89 } 83 }
90 } 84 }
91 85
92 // Not removing, so let's get the data we need to add this certificate. 86 // Not removing, so let's get the data we need to add this certificate.
93 std::string cert_type; 87 std::string cert_type;
94 certificate.GetString(certificate::kType, &cert_type); 88 certificate.GetString(certificate::kType, &cert_type);
95 if (cert_type == certificate::kServer || cert_type == certificate::kAuthority) 89 if (cert_type == certificate::kServer ||
90 cert_type == certificate::kAuthority) {
96 return ParseServerOrCaCertificate(cert_type, guid, certificate); 91 return ParseServerOrCaCertificate(cert_type, guid, certificate);
92 } else if (cert_type == certificate::kClient) {
93 return ParseClientCertificate(guid, certificate);
94 }
97 95
98 if (cert_type == certificate::kClient) 96 NOTREACHED();
99 return ParseClientCertificate(guid, certificate);
100
101 ONC_LOG_ERROR("Certificate of unknown type: " + cert_type);
102 return false; 97 return false;
103 } 98 }
104 99
105 // static 100 // static
106 void CertificateImporter::ListCertsWithNickname(const std::string& label, 101 void CertificateImporter::ListCertsWithNickname(const std::string& label,
107 net::CertificateList* result) { 102 net::CertificateList* result) {
108 net::CertificateList all_certs; 103 net::CertificateList all_certs;
109 net::NSSCertDatabase::GetInstance()->ListCerts(&all_certs); 104 net::NSSCertDatabase::GetInstance()->ListCerts(&all_certs);
110 result->clear(); 105 result->clear();
111 for (net::CertificateList::iterator iter = all_certs.begin(); 106 for (net::CertificateList::iterator iter = all_certs.begin();
(...skipping 45 matching lines...) Expand 10 before | Expand all | Expand 10 after
157 if (!net::NSSCertDatabase::GetInstance()->DeleteCertAndKey(iter->get())) 152 if (!net::NSSCertDatabase::GetInstance()->DeleteCertAndKey(iter->get()))
158 result = false; 153 result = false;
159 } 154 }
160 return result; 155 return result;
161 } 156 }
162 157
163 bool CertificateImporter::ParseServerOrCaCertificate( 158 bool CertificateImporter::ParseServerOrCaCertificate(
164 const std::string& cert_type, 159 const std::string& cert_type,
165 const std::string& guid, 160 const std::string& guid,
166 const base::DictionaryValue& certificate) { 161 const base::DictionaryValue& certificate) {
167 // Device policy can't import certificates.
168 if (onc_source_ == ONC_SOURCE_DEVICE_POLICY) {
169 // This isn't a parsing error.
170 ONC_LOG_WARNING("Refusing to import certificate from device policy.");
171 return true;
172 }
173
174 bool web_trust = false; 162 bool web_trust = false;
175 const base::ListValue* trust_list = NULL; 163 const base::ListValue* trust_list = NULL;
176 if (certificate.GetList(certificate::kTrust, &trust_list)) { 164 if (certificate.GetList(certificate::kTrust, &trust_list)) {
177 for (size_t i = 0; i < trust_list->GetSize(); ++i) { 165 for (size_t i = 0; i < trust_list->GetSize(); ++i) {
178 std::string trust_type; 166 std::string trust_type;
179 if (!trust_list->GetString(i, &trust_type)) { 167 if (!trust_list->GetString(i, &trust_type))
180 ONC_LOG_ERROR("Certificate trust is invalid"); 168 NOTREACHED();
181 return false; 169
182 }
183 if (trust_type == certificate::kWeb) { 170 if (trust_type == certificate::kWeb) {
184 // "Web" implies that the certificate is to be trusted for SSL 171 // "Web" implies that the certificate is to be trusted for SSL
185 // identification. 172 // identification.
186 web_trust = true; 173 web_trust = true;
187 } else { 174 } else {
188 ONC_LOG_ERROR("Certificate contains unknown trust type " + trust_type); 175 ONC_LOG_ERROR("Certificate contains unknown trust type " + trust_type);
189 return false; 176 return false;
190 } 177 }
191 } 178 }
192 } 179 }
193 180
194 // Web trust is only granted to certificates imported for a managed user 181 if (web_trust && !allow_web_trust_) {
195 // on a managed device.
196 if (onc_source_ == ONC_SOURCE_USER_POLICY &&
197 web_trust && !allow_web_trust_from_policy_) {
198 LOG(WARNING) << "Web trust not granted for certificate: " << guid; 182 LOG(WARNING) << "Web trust not granted for certificate: " << guid;
199 web_trust = false; 183 web_trust = false;
200 } 184 }
201 185
202 std::string x509_data; 186 std::string x509_data;
203 if (!certificate.GetString(certificate::kX509, &x509_data) || 187 if (!certificate.GetString(certificate::kX509, &x509_data) ||
204 x509_data.empty()) { 188 x509_data.empty()) {
205 ONC_LOG_ERROR( 189 ONC_LOG_ERROR(
206 "Certificate missing appropriate certificate data for type: " + 190 "Certificate missing appropriate certificate data for type: " +
207 cert_type); 191 cert_type);
(...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after
288 return false; 272 return false;
289 } 273 }
290 274
291 net::CertificateList cert_list; 275 net::CertificateList cert_list;
292 cert_list.push_back(x509_cert); 276 cert_list.push_back(x509_cert);
293 net::NSSCertDatabase::ImportCertFailureList failures; 277 net::NSSCertDatabase::ImportCertFailureList failures;
294 bool success = false; 278 bool success = false;
295 net::NSSCertDatabase::TrustBits trust = web_trust ? 279 net::NSSCertDatabase::TrustBits trust = web_trust ?
296 net::NSSCertDatabase::TRUSTED_SSL : 280 net::NSSCertDatabase::TRUSTED_SSL :
297 net::NSSCertDatabase::TRUST_DEFAULT; 281 net::NSSCertDatabase::TRUST_DEFAULT;
298 if (cert_type == certificate::kServer) 282 if (cert_type == certificate::kServer) {
299 success = cert_database->ImportServerCert(cert_list, trust, &failures); 283 success = cert_database->ImportServerCert(cert_list, trust, &failures);
300 else // Authority cert 284 } else { // Authority cert
301 success = cert_database->ImportCACerts(cert_list, trust, &failures); 285 success = cert_database->ImportCACerts(cert_list, trust, &failures);
286 }
302 287
303 if (!failures.empty()) { 288 if (!failures.empty()) {
304 ONC_LOG_ERROR("Error (" + net::ErrorToString(failures[0].net_error) + 289 ONC_LOG_ERROR("Error (" + net::ErrorToString(failures[0].net_error) +
305 ") importing " + cert_type + " certificate"); 290 ") importing " + cert_type + " certificate");
306 return false; 291 return false;
307 } 292 }
308 if (!success) { 293 if (!success) {
309 ONC_LOG_ERROR("Unknown error importing " + cert_type + " certificate."); 294 ONC_LOG_ERROR("Unknown error importing " + cert_type + " certificate.");
310 return false; 295 return false;
311 } 296 }
(...skipping 53 matching lines...) Expand 10 before | Expand all | Expand 10 after
365 PK11_SetPrivateKeyNickname(private_key, const_cast<char*>(guid.c_str())); 350 PK11_SetPrivateKeyNickname(private_key, const_cast<char*>(guid.c_str()));
366 SECKEY_DestroyPrivateKey(private_key); 351 SECKEY_DestroyPrivateKey(private_key);
367 } else { 352 } else {
368 ONC_LOG_WARNING("Unable to find private key for certificate."); 353 ONC_LOG_WARNING("Unable to find private key for certificate.");
369 } 354 }
370 return true; 355 return true;
371 } 356 }
372 357
373 } // namespace onc 358 } // namespace onc
374 } // namespace chromeos 359 } // namespace chromeos
OLDNEW
« no previous file with comments | « chromeos/network/onc/onc_certificate_importer.h ('k') | chromeos/network/onc/onc_certificate_importer_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698