X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/5dd5f9ec28f304ca377c42fd7f711d6cf12b90e1..5c19dc3ae3bd8e40a9c028b0deddd50ff337692c:/Security/libsecurity_ssl/lib/sslKeychain.c?ds=inline diff --git a/Security/libsecurity_ssl/lib/sslKeychain.c b/Security/libsecurity_ssl/lib/sslKeychain.c deleted file mode 100644 index 93dcee17..00000000 --- a/Security/libsecurity_ssl/lib/sslKeychain.c +++ /dev/null @@ -1,236 +0,0 @@ -/* - * Copyright (c) 1999-2001,2005-2008,2010-2014 Apple Inc. All Rights Reserved. - * - * @APPLE_LICENSE_HEADER_START@ - * - * This file contains Original Code and/or Modifications of Original Code - * as defined in and that are subject to the Apple Public Source License - * Version 2.0 (the 'License'). You may not use this file except in - * compliance with the License. Please obtain a copy of the License at - * http://www.opensource.apple.com/apsl/ and read it before using this - * file. - * - * The Original Code and all software distributed under the License are - * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER - * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, - * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, - * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. - * Please see the License for the specific language governing rights and - * limitations under the License. - * - * @APPLE_LICENSE_HEADER_END@ - */ - -/* - * sslKeychain.c - Apple Keychain routines - */ - -#include "ssl.h" -#include "sslContext.h" -#include "sslMemory.h" - -#include "sslCrypto.h" -#include -#include -#include -#include -#include -#include -#include "utilities/SecCFRelease.h" - -#include "sslDebug.h" -#include "sslKeychain.h" -#include "sslUtils.h" -#include -#include - - -#include -#include -#include -#include - -#if TARGET_OS_IPHONE -#include -#endif - -/* Private Key operations */ -static -SecAsn1Oid oidForSSLHash(SSL_HashAlgorithm hash) -{ - switch (hash) { - case tls_hash_algorithm_SHA1: - return CSSMOID_SHA1WithRSA; - case tls_hash_algorithm_SHA256: - return CSSMOID_SHA256WithRSA; - case tls_hash_algorithm_SHA384: - return CSSMOID_SHA384WithRSA; - default: - break; - } - // Internal error - assert(0); - // This guarantee failure down the line - return CSSMOID_MD5WithRSA; -} - -static -int mySSLPrivKeyRSA_sign(void *key, tls_hash_algorithm hash, const uint8_t *plaintext, size_t plaintextLen, uint8_t *sig, size_t *sigLen) -{ - SecKeyRef keyRef = key; - - if(hash == tls_hash_algorithm_None) { - return SecKeyRawSign(keyRef, kSecPaddingPKCS1, plaintext, plaintextLen, sig, sigLen); - } else { - SecAsn1AlgId algId; - algId.algorithm = oidForSSLHash(hash); - return SecKeySignDigest(keyRef, &algId, plaintext, plaintextLen, sig, sigLen); - } -} - -static -int mySSLPrivKeyRSA_decrypt(void *key, const uint8_t *ciphertext, size_t ciphertextLen, uint8_t *plaintext, size_t *plaintextLen) -{ - SecKeyRef keyRef = key; - - return SecKeyDecrypt(keyRef, kSecPaddingPKCS1, ciphertext, ciphertextLen, plaintext, plaintextLen); -} - -void sslFreePrivKey(tls_private_key_t *sslPrivKey) -{ - assert(sslPrivKey); - - if(*sslPrivKey) { - CFReleaseSafe(tls_private_key_get_context(*sslPrivKey)); - tls_private_key_destroy(*sslPrivKey); - *sslPrivKey = NULL; - } -} - -OSStatus -parseIncomingCerts( - SSLContext *ctx, - CFArrayRef certs, - SSLCertificate **destCertChain, /* &ctx->{localCertChain,encryptCertChain} */ - tls_private_key_t *sslPrivKey) /* &ctx->signingPrivKeyRef, etc. */ -{ - OSStatus ortn; - CFIndex ix, numCerts; - SecIdentityRef identity; - SSLCertificate *certChain = NULL; /* Retained */ - SecCertificateRef leafCert = NULL; /* Retained */ - SecKeyRef privKey = NULL; /* Retained */ - - assert(ctx != NULL); - assert(destCertChain != NULL); /* though its referent may be NULL */ - assert(sslPrivKey != NULL); - - if (certs == NULL) { - sslErrorLog("parseIncomingCerts: NULL incoming cert array\n"); - ortn = errSSLBadCert; - goto errOut; - } - numCerts = CFArrayGetCount(certs); - if (numCerts == 0) { - sslErrorLog("parseIncomingCerts: empty incoming cert array\n"); - ortn = errSSLBadCert; - goto errOut; - } - - certChain=sslMalloc(numCerts*sizeof(SSLCertificate)); - if (!certChain) { - ortn = errSecAllocate; - goto errOut; - } - - /* - * Certs[0] is an SecIdentityRef from which we extract subject cert, - * privKey, pubKey. - * - * 1. ensure the first element is a SecIdentityRef. - */ - identity = (SecIdentityRef)CFArrayGetValueAtIndex(certs, 0); - if (identity == NULL) { - sslErrorLog("parseIncomingCerts: bad cert array (1)\n"); - ortn = errSecParam; - goto errOut; - } - if (CFGetTypeID(identity) != SecIdentityGetTypeID()) { - sslErrorLog("parseIncomingCerts: bad cert array (2)\n"); - ortn = errSecParam; - goto errOut; - } - - /* - * 2. Extract cert, keys and convert to local format. - */ - ortn = SecIdentityCopyCertificate(identity, &leafCert); - if (ortn) { - sslErrorLog("parseIncomingCerts: bad cert array (3)\n"); - goto errOut; - } - - /* Fetch private key from identity */ - ortn = SecIdentityCopyPrivateKey(identity, &privKey); - if (ortn) { - sslErrorLog("parseIncomingCerts: SecIdentityCopyPrivateKey err %d\n", - (int)ortn); - goto errOut; - } - - /* Convert the input array of SecIdentityRef at the start to an array of - all certificates. */ - - certChain[0].derCert.data = (uint8_t *)SecCertificateGetBytePtr(leafCert); - certChain[0].derCert.length = SecCertificateGetLength(leafCert); - certChain[0].next = NULL; - - for (ix = 1; ix < numCerts; ++ix) { - SecCertificateRef intermediate = - (SecCertificateRef)CFArrayGetValueAtIndex(certs, ix); - if (intermediate == NULL) { - sslErrorLog("parseIncomingCerts: bad cert array (5)\n"); - ortn = errSecParam; - goto errOut; - } - if (CFGetTypeID(intermediate) != SecCertificateGetTypeID()) { - sslErrorLog("parseIncomingCerts: bad cert array (6)\n"); - ortn = errSecParam; - goto errOut; - } - - certChain[ix].derCert.data = (uint8_t *)SecCertificateGetBytePtr(intermediate); - certChain[ix].derCert.length = SecCertificateGetLength(intermediate); - certChain[ix].next = NULL; - certChain[ix-1].next = &certChain[ix]; - - } - - if(sslPrivKeyGetAlgorithmID(privKey)!=kSecRSAAlgorithmID) { - ortn = errSecParam; - goto errOut; - } - - sslFreePrivKey(sslPrivKey); - *sslPrivKey = tls_private_key_rsa_create(privKey, SecKeyGetBlockSize(privKey), mySSLPrivKeyRSA_sign, mySSLPrivKeyRSA_decrypt); - if(*sslPrivKey) - ortn = errSecSuccess; - else - ortn = errSecAllocate; - - /* SUCCESS */ -errOut: - CFReleaseSafe(leafCert); - - sslFree(*destCertChain); - - if (ortn) { - free(certChain); - CFReleaseSafe(privKey); - *destCertChain = NULL; - } else { - *destCertChain = certChain; - } - - return ortn; -}