普通文本  |  136行  |  4.47 KB

// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "net/base/test_root_certs.h"

#include <Security/Security.h>

#include "base/logging.h"
#include "base/mac/scoped_cftyperef.h"
#include "net/base/x509_certificate.h"

namespace net {

namespace {

#if !defined(MAC_OS_X_VERSION_10_6) || \
    MAC_OS_X_VERSION_MAX_ALLOWED < MAC_OS_X_VERSION_10_6
// Declared in <Security/SecBase.h> of the 10.6 SDK.
enum {
  errSecUnimplemented = -4,
};
#endif

typedef OSStatus (*SecTrustSetAnchorCertificatesOnlyFuncPtr)(SecTrustRef,
                                                             Boolean);

Boolean OurSecCertificateEqual(const void* value1, const void* value2) {
  if (CFGetTypeID(value1) != SecCertificateGetTypeID() ||
      CFGetTypeID(value2) != SecCertificateGetTypeID())
    return CFEqual(value1, value2);
  return X509Certificate::IsSameOSCert(
      reinterpret_cast<SecCertificateRef>(const_cast<void*>(value1)),
      reinterpret_cast<SecCertificateRef>(const_cast<void*>(value2)));
}

const void* RetainWrapper(CFAllocatorRef unused, const void* value) {
  return CFRetain(value);
}

void ReleaseWrapper(CFAllocatorRef unused, const void* value) {
  CFRelease(value);
}

// CFEqual prior to 10.6 only performed pointer checks on SecCertificateRefs,
// rather than checking if they were the same (logical) certificate, so a
// custom structure is used for the array callbacks.
const CFArrayCallBacks kCertArrayCallbacks = {
  0,  // version
  RetainWrapper,
  ReleaseWrapper,
  CFCopyDescription,
  OurSecCertificateEqual,
};

}  // namespace

bool TestRootCerts::Add(X509Certificate* certificate) {
  if (CFArrayContainsValue(temporary_roots_,
                           CFRangeMake(0, CFArrayGetCount(temporary_roots_)),
                           certificate->os_cert_handle()))
    return true;
  CFArrayAppendValue(temporary_roots_, certificate->os_cert_handle());
  return true;
}

void TestRootCerts::Clear() {
  CFArrayRemoveAllValues(temporary_roots_);
}

bool TestRootCerts::IsEmpty() const {
  return CFArrayGetCount(temporary_roots_) == 0;
}

OSStatus TestRootCerts::FixupSecTrustRef(SecTrustRef trust_ref) const {
  if (IsEmpty())
    return noErr;

  CFBundleRef bundle =
      CFBundleGetBundleWithIdentifier(CFSTR("com.apple.security"));
  SecTrustSetAnchorCertificatesOnlyFuncPtr set_anchor_certificates_only = NULL;
  if (bundle) {
    set_anchor_certificates_only =
        reinterpret_cast<SecTrustSetAnchorCertificatesOnlyFuncPtr>(
            CFBundleGetFunctionPointerForName(bundle,
                CFSTR("SecTrustSetAnchorCertificatesOnly")));
  }

  OSStatus status = noErr;
  if (set_anchor_certificates_only) {
    // OS X 10.6 includes a function where the system trusts can be
    // preserved while appending application trusts. This is preferable,
    // because it preserves any user trust settings (explicit distrust),
    // which the naive copy in 10.5 does not. Unfortunately, though the
    // function pointer may be available, it is not always implemented. If it
    // returns errSecUnimplemented, fall through to the 10.5 behaviour.
    status = SecTrustSetAnchorCertificates(trust_ref, temporary_roots_);
    if (status)
      return status;
    status = set_anchor_certificates_only(trust_ref, false);
    if (status != errSecUnimplemented)
      return status;

    // Restore the original settings before falling back.
    status = SecTrustSetAnchorCertificates(trust_ref, NULL);
    if (status)
      return status;
  }

  // On 10.5, the system certificates have to be copied and merged into
  // the application trusts, and may override any user trust settings.
  CFArrayRef system_roots = NULL;
  status = SecTrustCopyAnchorCertificates(&system_roots);
  if (status)
    return status;

  base::mac::ScopedCFTypeRef<CFArrayRef> scoped_system_roots(system_roots);
  base::mac::ScopedCFTypeRef<CFMutableArrayRef> scoped_roots(
      CFArrayCreateMutableCopy(kCFAllocatorDefault, 0,
                               scoped_system_roots));
  DCHECK(scoped_roots.get());

  CFArrayAppendArray(scoped_roots, temporary_roots_,
                     CFRangeMake(0, CFArrayGetCount(temporary_roots_)));
  return SecTrustSetAnchorCertificates(trust_ref, scoped_roots);
}

TestRootCerts::~TestRootCerts() {}

void TestRootCerts::Init() {
  temporary_roots_.reset(CFArrayCreateMutable(kCFAllocatorDefault, 0,
                                              &kCertArrayCallbacks));
}

}  // namespace net