123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- #include "LocalCertService.h"
- #include "CryptoTask.h"
- #include "ScopedNSSTypes.h"
- #include "cert.h"
- #include "mozilla/Casting.h"
- #include "mozilla/ModuleUtils.h"
- #include "mozilla/RefPtr.h"
- #include "nsIPK11Token.h"
- #include "nsIPK11TokenDB.h"
- #include "nsIX509Cert.h"
- #include "nsIX509CertDB.h"
- #include "nsIX509CertValidity.h"
- #include "nsLiteralString.h"
- #include "nsProxyRelease.h"
- #include "nsServiceManagerUtils.h"
- #include "nsString.h"
- #include "pk11pub.h"
- namespace mozilla {
- class LocalCertTask : public CryptoTask
- {
- protected:
- explicit LocalCertTask(const nsACString& aNickname)
- : mNickname(aNickname)
- {
- }
- nsresult RemoveExisting()
- {
- // Search for any existing certs with this name and remove them
- nsresult rv;
- for (;;) {
- UniqueCERTCertificate cert(
- PK11_FindCertFromNickname(mNickname.get(), nullptr));
- if (!cert) {
- return NS_OK; // All done
- }
- // Found a cert, check if generated by this service
- if (!cert->isRoot) {
- return NS_ERROR_UNEXPECTED; // Should be self-signed
- }
- NS_NAMED_LITERAL_CSTRING(commonNamePrefix, "CN=");
- nsAutoCString subjectNameFromNickname(commonNamePrefix + mNickname);
- if (!subjectNameFromNickname.Equals(cert->subjectName)) {
- return NS_ERROR_UNEXPECTED; // Subject should match nickname
- }
- if (!subjectNameFromNickname.Equals(cert->issuerName)) {
- return NS_ERROR_UNEXPECTED; // Issuer should match nickname
- }
- rv = MapSECStatus(PK11_DeleteTokenCertAndKey(cert.get(), nullptr));
- if (NS_FAILED(rv)) {
- return rv; // Some error, abort the loop
- }
- }
- }
- nsCString mNickname;
- };
- class LocalCertGetTask final : public LocalCertTask
- {
- public:
- LocalCertGetTask(const nsACString& aNickname,
- nsILocalCertGetCallback* aCallback)
- : LocalCertTask(aNickname)
- , mCallback(new nsMainThreadPtrHolder<nsILocalCertGetCallback>(aCallback))
- , mCert(nullptr)
- {
- }
- private:
- virtual nsresult CalculateResult() override
- {
- // Try to lookup an existing cert in the DB
- nsresult rv = GetFromDB();
- // Make a new one if getting fails
- if (NS_FAILED(rv)) {
- rv = Generate();
- }
- // If generation fails, we're out of luck
- if (NS_FAILED(rv)) {
- return rv;
- }
- // Validate cert, make a new one if it fails
- rv = Validate();
- if (NS_FAILED(rv)) {
- rv = Generate();
- }
- // If generation fails, we're out of luck
- if (NS_FAILED(rv)) {
- return rv;
- }
- return NS_OK;
- }
- nsresult Generate()
- {
- nsresult rv;
- // Get the key slot for generation later
- UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
- if (!slot) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Remove existing certs with this name (if any)
- rv = RemoveExisting();
- if (NS_FAILED(rv)) {
- return rv;
- }
- // Generate a new cert
- NS_NAMED_LITERAL_CSTRING(commonNamePrefix, "CN=");
- nsAutoCString subjectNameStr(commonNamePrefix + mNickname);
- UniqueCERTName subjectName(CERT_AsciiToName(subjectNameStr.get()));
- if (!subjectName) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Use the well-known NIST P-256 curve
- SECOidData* curveOidData = SECOID_FindOIDByTag(SEC_OID_SECG_EC_SECP256R1);
- if (!curveOidData) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Get key params from the curve
- ScopedAutoSECItem keyParams(2 + curveOidData->oid.len);
- keyParams.data[0] = SEC_ASN1_OBJECT_ID;
- keyParams.data[1] = curveOidData->oid.len;
- memcpy(keyParams.data + 2, curveOidData->oid.data, curveOidData->oid.len);
- // Generate cert key pair
- SECKEYPublicKey* tempPublicKey;
- UniqueSECKEYPrivateKey privateKey(
- PK11_GenerateKeyPair(slot.get(), CKM_EC_KEY_PAIR_GEN, &keyParams,
- &tempPublicKey, true /* token */,
- true /* sensitive */, nullptr));
- UniqueSECKEYPublicKey publicKey(tempPublicKey);
- tempPublicKey = nullptr;
- if (!privateKey || !publicKey) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Create subject public key info and cert request
- UniqueCERTSubjectPublicKeyInfo spki(
- SECKEY_CreateSubjectPublicKeyInfo(publicKey.get()));
- if (!spki) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- UniqueCERTCertificateRequest certRequest(
- CERT_CreateCertificateRequest(subjectName.get(), spki.get(), nullptr));
- if (!certRequest) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Valid from one day before to 1 year after
- static const PRTime oneDay = PRTime(PR_USEC_PER_SEC)
- * PRTime(60) // sec
- * PRTime(60) // min
- * PRTime(24); // hours
- PRTime now = PR_Now();
- PRTime notBefore = now - oneDay;
- PRTime notAfter = now + (PRTime(365) * oneDay);
- UniqueCERTValidity validity(CERT_CreateValidity(notBefore, notAfter));
- if (!validity) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Generate random serial
- unsigned long serial;
- // This serial in principle could collide, but it's unlikely
- rv = MapSECStatus(PK11_GenerateRandomOnSlot(
- slot.get(), BitwiseCast<unsigned char*, unsigned long*>(&serial),
- sizeof(serial)));
- if (NS_FAILED(rv)) {
- return rv;
- }
- // Create the cert from these pieces
- UniqueCERTCertificate cert(
- CERT_CreateCertificate(serial, subjectName.get(), validity.get(),
- certRequest.get()));
- if (!cert) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Update the cert version to X509v3
- if (!cert->version.data) {
- return NS_ERROR_INVALID_POINTER;
- }
- *(cert->version.data) = SEC_CERTIFICATE_VERSION_3;
- cert->version.len = 1;
- // Set cert signature algorithm
- PLArenaPool* arena = cert->arena;
- if (!arena) {
- return NS_ERROR_INVALID_POINTER;
- }
- rv = MapSECStatus(
- SECOID_SetAlgorithmID(arena, &cert->signature,
- SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE, 0));
- if (NS_FAILED(rv)) {
- return rv;
- }
- // Encode and self-sign the cert
- UniqueSECItem certDER(
- SEC_ASN1EncodeItem(nullptr, nullptr, cert.get(),
- SEC_ASN1_GET(CERT_CertificateTemplate)));
- if (!certDER) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- rv = MapSECStatus(
- SEC_DerSignData(arena, &cert->derCert, certDER->data, certDER->len,
- privateKey.get(),
- SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE));
- if (NS_FAILED(rv)) {
- return rv;
- }
- // Create a CERTCertificate from the signed data
- UniqueCERTCertificate certFromDER(
- CERT_NewTempCertificate(CERT_GetDefaultCertDB(), &cert->derCert, nullptr,
- true /* perm */, true /* copyDER */));
- if (!certFromDER) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // Save the cert in the DB
- rv = MapSECStatus(PK11_ImportCert(slot.get(), certFromDER.get(),
- CK_INVALID_HANDLE, mNickname.get(),
- false /* unused */));
- if (NS_FAILED(rv)) {
- return rv;
- }
- // We should now have cert in the DB, read it back in nsIX509Cert form
- return GetFromDB();
- }
- nsresult GetFromDB()
- {
- nsCOMPtr<nsIX509CertDB> certDB = do_GetService(NS_X509CERTDB_CONTRACTID);
- if (!certDB) {
- return NS_ERROR_FAILURE;
- }
- nsCOMPtr<nsIX509Cert> certFromDB;
- nsresult rv;
- rv = certDB->FindCertByNickname(NS_ConvertASCIItoUTF16(mNickname),
- getter_AddRefs(certFromDB));
- if (NS_FAILED(rv)) {
- return rv;
- }
- mCert = certFromDB;
- return NS_OK;
- }
- nsresult Validate()
- {
- // Verify cert is self-signed
- bool selfSigned;
- nsresult rv = mCert->GetIsSelfSigned(&selfSigned);
- if (NS_FAILED(rv)) {
- return rv;
- }
- if (!selfSigned) {
- return NS_ERROR_FAILURE;
- }
- // Check that subject and issuer match nickname
- nsXPIDLString subjectName;
- nsXPIDLString issuerName;
- mCert->GetSubjectName(subjectName);
- mCert->GetIssuerName(issuerName);
- if (!subjectName.Equals(issuerName)) {
- return NS_ERROR_FAILURE;
- }
- NS_NAMED_LITERAL_STRING(commonNamePrefix, "CN=");
- nsAutoString subjectNameFromNickname(
- commonNamePrefix + NS_ConvertASCIItoUTF16(mNickname));
- if (!subjectName.Equals(subjectNameFromNickname)) {
- return NS_ERROR_FAILURE;
- }
- nsCOMPtr<nsIX509CertValidity> validity;
- mCert->GetValidity(getter_AddRefs(validity));
- PRTime notBefore, notAfter;
- validity->GetNotBefore(¬Before);
- validity->GetNotAfter(¬After);
- // Ensure cert will last at least one more day
- static const PRTime oneDay = PRTime(PR_USEC_PER_SEC)
- * PRTime(60) // sec
- * PRTime(60) // min
- * PRTime(24); // hours
- PRTime now = PR_Now();
- if (notBefore > now ||
- notAfter < (now - oneDay)) {
- return NS_ERROR_FAILURE;
- }
- return NS_OK;
- }
- virtual void ReleaseNSSResources() override {}
- virtual void CallCallback(nsresult rv) override
- {
- (void) mCallback->HandleCert(mCert, rv);
- }
- nsMainThreadPtrHandle<nsILocalCertGetCallback> mCallback;
- nsCOMPtr<nsIX509Cert> mCert; // out
- };
- class LocalCertRemoveTask final : public LocalCertTask
- {
- public:
- LocalCertRemoveTask(const nsACString& aNickname,
- nsILocalCertCallback* aCallback)
- : LocalCertTask(aNickname)
- , mCallback(new nsMainThreadPtrHolder<nsILocalCertCallback>(aCallback))
- {
- }
- private:
- virtual nsresult CalculateResult() override
- {
- return RemoveExisting();
- }
- virtual void ReleaseNSSResources() override {}
- virtual void CallCallback(nsresult rv) override
- {
- (void) mCallback->HandleResult(rv);
- }
- nsMainThreadPtrHandle<nsILocalCertCallback> mCallback;
- };
- NS_IMPL_ISUPPORTS(LocalCertService, nsILocalCertService)
- LocalCertService::LocalCertService()
- {
- }
- LocalCertService::~LocalCertService()
- {
- }
- nsresult
- LocalCertService::LoginToKeySlot()
- {
- nsresult rv;
- // Get access to key slot
- UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
- if (!slot) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // If no user password yet, set it an empty one
- if (PK11_NeedUserInit(slot.get())) {
- rv = MapSECStatus(PK11_InitPin(slot.get(), "", ""));
- if (NS_FAILED(rv)) {
- return rv;
- }
- }
- // If user has a password set, prompt to login
- if (PK11_NeedLogin(slot.get()) && !PK11_IsLoggedIn(slot.get(), nullptr)) {
- // Switching to XPCOM to get the UI prompt that PSM owns
- nsCOMPtr<nsIPK11TokenDB> tokenDB =
- do_GetService(NS_PK11TOKENDB_CONTRACTID);
- if (!tokenDB) {
- return NS_ERROR_FAILURE;
- }
- nsCOMPtr<nsIPK11Token> keyToken;
- tokenDB->GetInternalKeyToken(getter_AddRefs(keyToken));
- if (!keyToken) {
- return NS_ERROR_FAILURE;
- }
- // Prompt the user to login
- return keyToken->Login(false /* force */);
- }
- return NS_OK;
- }
- NS_IMETHODIMP
- LocalCertService::GetOrCreateCert(const nsACString& aNickname,
- nsILocalCertGetCallback* aCallback)
- {
- if (NS_WARN_IF(aNickname.IsEmpty())) {
- return NS_ERROR_INVALID_ARG;
- }
- if (NS_WARN_IF(!aCallback)) {
- return NS_ERROR_INVALID_POINTER;
- }
- // Before sending off the task, login to key slot if needed
- nsresult rv = LoginToKeySlot();
- if (NS_FAILED(rv)) {
- aCallback->HandleCert(nullptr, rv);
- return NS_OK;
- }
- RefPtr<LocalCertGetTask> task(new LocalCertGetTask(aNickname, aCallback));
- return task->Dispatch("LocalCertGet");
- }
- NS_IMETHODIMP
- LocalCertService::RemoveCert(const nsACString& aNickname,
- nsILocalCertCallback* aCallback)
- {
- if (NS_WARN_IF(aNickname.IsEmpty())) {
- return NS_ERROR_INVALID_ARG;
- }
- if (NS_WARN_IF(!aCallback)) {
- return NS_ERROR_INVALID_POINTER;
- }
- // Before sending off the task, login to key slot if needed
- nsresult rv = LoginToKeySlot();
- if (NS_FAILED(rv)) {
- aCallback->HandleResult(rv);
- return NS_OK;
- }
- RefPtr<LocalCertRemoveTask> task(
- new LocalCertRemoveTask(aNickname, aCallback));
- return task->Dispatch("LocalCertRm");
- }
- NS_IMETHODIMP
- LocalCertService::GetLoginPromptRequired(bool* aRequired)
- {
- nsresult rv;
- // Get access to key slot
- UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
- if (!slot) {
- return mozilla::psm::GetXPCOMFromNSSError(PR_GetError());
- }
- // If no user password yet, set it an empty one
- if (PK11_NeedUserInit(slot.get())) {
- rv = MapSECStatus(PK11_InitPin(slot.get(), "", ""));
- if (NS_FAILED(rv)) {
- return rv;
- }
- }
- *aRequired = PK11_NeedLogin(slot.get()) &&
- !PK11_IsLoggedIn(slot.get(), nullptr);
- return NS_OK;
- }
- #define LOCALCERTSERVICE_CID \
- { 0x47402be2, 0xe653, 0x45d0, \
- { 0x8d, 0xaa, 0x9f, 0x0d, 0xce, 0x0a, 0xc1, 0x48 } }
- NS_GENERIC_FACTORY_CONSTRUCTOR(LocalCertService)
- NS_DEFINE_NAMED_CID(LOCALCERTSERVICE_CID);
- static const Module::CIDEntry kLocalCertServiceCIDs[] = {
- { &kLOCALCERTSERVICE_CID, false, nullptr, LocalCertServiceConstructor },
- { nullptr }
- };
- static const Module::ContractIDEntry kLocalCertServiceContracts[] = {
- { LOCALCERTSERVICE_CONTRACTID, &kLOCALCERTSERVICE_CID },
- { nullptr }
- };
- static const Module kLocalCertServiceModule = {
- Module::kVersion,
- kLocalCertServiceCIDs,
- kLocalCertServiceContracts
- };
- NSMODULE_DEFN(LocalCertServiceModule) = &kLocalCertServiceModule;
- } // namespace mozilla
|