/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */ /* * This file is part of the LibreOffice project. * * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. * * This file incorporates work covered by the following license notice: * * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed * with this work for additional information regarding copyright * ownership. The ASF licenses this file to you under the Apache * License, Version 2.0 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.apache.org/licenses/LICENSE-2.0 . */ #include "nssrenam.h" #include #include #include #include #include #include #include #include #include #include #include "x509certificate_nssimpl.hxx" #include #include #include "sanextension_nssimpl.hxx" #include #include using ::css::util::DateTime; X509Certificate_NssImpl::X509Certificate_NssImpl() : m_pCert(nullptr) { } X509Certificate_NssImpl::~X509Certificate_NssImpl() { if( m_pCert != nullptr ) { CERT_DestroyCertificate( m_pCert ) ; } } //Methods from XCertificate sal_Int16 SAL_CALL X509Certificate_NssImpl::getVersion() { if( m_pCert != nullptr ) { if( m_pCert->version.len > 0 ) { return static_cast(*( m_pCert->version.data )) ; } else return 0 ; } else { return -1 ; } } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getSerialNumber() { if( m_pCert != nullptr && m_pCert->serialNumber.len > 0 ) { return comphelper::arrayToSequence(m_pCert->serialNumber.data, m_pCert->serialNumber.len) ; } else { return css::uno::Sequence< sal_Int8 >(); } } OUString SAL_CALL X509Certificate_NssImpl::getIssuerName() { if( m_pCert != nullptr ) { return OUString(m_pCert->issuerName , PL_strlen(m_pCert->issuerName) , RTL_TEXTENCODING_UTF8) ; } else { return OUString() ; } } OUString SAL_CALL X509Certificate_NssImpl::getSubjectName() { if( m_pCert != nullptr ) { return OUString(m_pCert->subjectName , PL_strlen(m_pCert->subjectName) , RTL_TEXTENCODING_UTF8); } else { return OUString() ; } } css::util::DateTime SAL_CALL X509Certificate_NssImpl::getNotValidBefore() { if( m_pCert != nullptr ) { SECStatus rv ; PRTime notBefore ; PRExplodedTime explTime ; DateTime dateTime ; rv = DER_DecodeTimeChoice( ¬Before, &m_pCert->validity.notBefore ) ; if( rv != SECStatus::SECSuccess ) { return DateTime() ; } //Convert the time to readable local time PR_ExplodeTime( notBefore, PR_LocalTimeParameters, &explTime ) ; dateTime.NanoSeconds = static_cast< sal_Int32 >( explTime.tm_usec * ::tools::Time::nanoPerMicro ); dateTime.Seconds = static_cast< sal_Int16 >( explTime.tm_sec ); dateTime.Minutes = static_cast< sal_Int16 >( explTime.tm_min ); dateTime.Hours = static_cast< sal_Int16 >( explTime.tm_hour ); dateTime.Day = static_cast< sal_Int16 >( explTime.tm_mday ); dateTime.Month = static_cast< sal_Int16 >( explTime.tm_month+1 ); dateTime.Year = static_cast< sal_Int16 >( explTime.tm_year ); return dateTime ; } else { return DateTime() ; } } css::util::DateTime SAL_CALL X509Certificate_NssImpl::getNotValidAfter() { if( m_pCert != nullptr ) { SECStatus rv ; PRTime notAfter ; PRExplodedTime explTime ; DateTime dateTime ; rv = DER_DecodeTimeChoice( ¬After, &m_pCert->validity.notAfter ) ; if( rv != SECStatus::SECSuccess ) { return DateTime() ; } //Convert the time to readable local time PR_ExplodeTime( notAfter, PR_LocalTimeParameters, &explTime ) ; dateTime.NanoSeconds = static_cast< sal_Int16 >( explTime.tm_usec * ::tools::Time::nanoPerMicro ); dateTime.Seconds = static_cast< sal_Int16 >( explTime.tm_sec ); dateTime.Minutes = static_cast< sal_Int16 >( explTime.tm_min ); dateTime.Hours = static_cast< sal_Int16 >( explTime.tm_hour ); dateTime.Day = static_cast< sal_Int16 >( explTime.tm_mday ); dateTime.Month = static_cast< sal_Int16 >( explTime.tm_month+1 ); dateTime.Year = static_cast< sal_Int16 >( explTime.tm_year ); return dateTime ; } else { return DateTime() ; } } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getIssuerUniqueID() { if( m_pCert != nullptr && m_pCert->issuerID.len > 0 ) { return comphelper::arrayToSequence(m_pCert->issuerID.data, m_pCert->issuerID.len) ; } else { return css::uno::Sequence< sal_Int8 >(); } } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getSubjectUniqueID() { if( m_pCert != nullptr && m_pCert->subjectID.len > 0 ) { return comphelper::arrayToSequence(m_pCert->subjectID.data, m_pCert->subjectID.len) ; } else { return css::uno::Sequence< sal_Int8 >(); } } css::uno::Sequence< css::uno::Reference< css::security::XCertificateExtension > > SAL_CALL X509Certificate_NssImpl::getExtensions() { if( m_pCert != nullptr && m_pCert->extensions != nullptr ) { CERTCertExtension** extns ; int len ; for( len = 0, extns = m_pCert->extensions; *extns != nullptr; len ++, extns ++ ) ; css::uno::Sequence< css::uno::Reference< css::security::XCertificateExtension > > xExtns( len ) ; auto xExtnsRange = asNonConstRange(xExtns); for( extns = m_pCert->extensions, len = 0; *extns != nullptr; extns ++, len ++ ) { const SECItem id = (*extns)->id; OString oidString(CERT_GetOidString(&id)); bool crit; if( (*extns)->critical.data == nullptr ) crit = false ; else crit = (*extns)->critical.data[0] == 0xFF; // remove "OID." prefix if existing OString objID; OString oid("OID."); if (oidString.match(oid)) objID = oidString.copy(oid.getLength()); else objID = oidString; unsigned char* value = (*extns)->value.data; unsigned int vlen = (*extns)->value.len; unsigned char* objid = reinterpret_cast(const_cast(objID.getStr())); unsigned int objidlen = objID.getLength(); if (objID == "2.5.29.17") { rtl::Reference pExtn = new SanExtensionImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtnsRange[len] = pExtn ; } else { rtl::Reference pExtn = new CertificateExtension_XmlSecImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtnsRange[len] = pExtn; } } return xExtns ; } else { return css::uno::Sequence< css::uno::Reference< css::security::XCertificateExtension > > (); } } css::uno::Reference< css::security::XCertificateExtension > SAL_CALL X509Certificate_NssImpl::findCertificateExtension( const css::uno::Sequence< sal_Int8 >& oid ) { if( m_pCert != nullptr && m_pCert->extensions != nullptr ) { CERTCertExtension** extns ; SECItem idItem ; idItem.data = reinterpret_cast(const_cast(oid.getConstArray())); idItem.len = oid.getLength() ; css::uno::Reference xExtn; for( extns = m_pCert->extensions; *extns != nullptr; extns ++ ) { if( SECITEM_CompareItem( &idItem, &(*extns)->id ) == SECEqual ) { const SECItem id = (*extns)->id; OString objId(CERT_GetOidString(&id)); bool crit; if( (*extns)->critical.data == nullptr ) crit = false ; else crit = (*extns)->critical.data[0] == 0xFF; unsigned char* value = (*extns)->value.data; unsigned int vlen = (*extns)->value.len; unsigned char* objid = (*extns)->id.data; unsigned int objidlen = (*extns)->id.len; if ( objId == "OID.2.5.29.17" ) { rtl::Reference xSanImpl( new SanExtensionImpl); xSanImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSanImpl.get(); } else { rtl::Reference xSecImpl( new CertificateExtension_XmlSecImpl); xSecImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSecImpl.get(); } break; } } return xExtn; } else { return nullptr ; } } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getEncoded() { if( m_pCert != nullptr && m_pCert->derCert.len > 0 ) { return comphelper::arrayToSequence(m_pCert->derCert.data, m_pCert->derCert.len) ; } else { return css::uno::Sequence< sal_Int8 >(); } } //Helper methods void X509Certificate_NssImpl::setCert( CERTCertificate* cert ) { if( m_pCert != nullptr ) { CERT_DestroyCertificate( m_pCert ) ; m_pCert = nullptr ; } if( cert != nullptr ) { m_pCert = CERT_DupCertificate( cert ) ; } } const CERTCertificate* X509Certificate_NssImpl::getNssCert() const { if( m_pCert != nullptr ) { return m_pCert ; } else { return nullptr ; } } void X509Certificate_NssImpl::setRawCert( const css::uno::Sequence< sal_Int8 >& rawCert ) { CERTCertificate* cert ; SECItem certItem ; certItem.data = reinterpret_cast(const_cast(rawCert.getConstArray())); certItem.len = rawCert.getLength() ; cert = CERT_DecodeDERCertificate( &certItem, PR_TRUE, nullptr ) ; if( cert == nullptr ) throw css::uno::RuntimeException() ; if( m_pCert != nullptr ) { CERT_DestroyCertificate( m_pCert ) ; m_pCert = nullptr ; } m_pCert = cert ; } SECKEYPrivateKey* X509Certificate_NssImpl::getPrivateKey() { if (m_pCert && m_pCert->slot) { SECKEYPrivateKey* pPrivateKey = PK11_FindPrivateKeyFromCert(m_pCert->slot, m_pCert, nullptr); if (pPrivateKey) return pPrivateKey; pPrivateKey = PK11_FindKeyByDERCert(m_pCert->slot, m_pCert, nullptr); if (pPrivateKey) { SAL_INFO("xmlsecurity.xmlsec", "fallback from PK11_FindPrivateKeyFromCert to PK11_FindKeyByDERCert needed"); return pPrivateKey; } SAL_WARN("xmlsecurity.xmlsec", "X509Certificate_NssImpl::getPrivateKey() cannot find private key"); } return nullptr; } /* XUnoTunnel */ sal_Int64 SAL_CALL X509Certificate_NssImpl::getSomething( const css::uno::Sequence< sal_Int8 >& aIdentifier ) { return comphelper::getSomethingImpl(aIdentifier, this); } /* XUnoTunnel extension */ const css::uno::Sequence< sal_Int8>& X509Certificate_NssImpl::getUnoTunnelId() { static const comphelper::UnoIdInit theX509Certificate_NssImplUnoTunnelId; return theX509Certificate_NssImplUnoTunnelId.getSeq(); } static OUString getAlgorithmDescription(SECAlgorithmID const *aid) { SECOidTag tag; tag = SECOID_GetAlgorithmTag(aid); const char *pDesc = SECOID_FindOIDTagDescription(tag); return OUString::createFromAscii( pDesc ) ; } static css::uno::Sequence< sal_Int8 > getThumbprint(CERTCertificate const *pCert, SECOidTag id) { if( pCert != nullptr ) { SECStatus rv; unsigned char fingerprint[32]; int length = 0; switch (id) { case SEC_OID_MD5: length = MD5_LENGTH; break; case SEC_OID_SHA1: length = SHA1_LENGTH; break; case SEC_OID_SHA256: length = SHA256_LENGTH; break; default: break; } memset(fingerprint, 0, sizeof fingerprint); rv = PK11_HashBuf(id, fingerprint, pCert->derCert.data, pCert->derCert.len); if(rv == SECStatus::SECSuccess) { return comphelper::arrayToSequence(fingerprint, length); } } return css::uno::Sequence< sal_Int8 >(); } OUString SAL_CALL X509Certificate_NssImpl::getSubjectPublicKeyAlgorithm() { if( m_pCert != nullptr ) { return getAlgorithmDescription(&(m_pCert->subjectPublicKeyInfo.algorithm)); } else { return OUString() ; } } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getSubjectPublicKeyValue() { if( m_pCert != nullptr ) { SECItem spk = m_pCert->subjectPublicKeyInfo.subjectPublicKey; DER_ConvertBitString(&spk); if ( spk.len>0) { return comphelper::arrayToSequence(spk.data, spk.len) ; } } return css::uno::Sequence< sal_Int8 >(); } OUString SAL_CALL X509Certificate_NssImpl::getSignatureAlgorithm() { if( m_pCert != nullptr ) { return getAlgorithmDescription(&(m_pCert->signature)); } else { return OUString() ; } } svl::crypto::SignatureMethodAlgorithm X509Certificate_NssImpl::getSignatureMethodAlgorithm() { svl::crypto::SignatureMethodAlgorithm nRet = svl::crypto::SignatureMethodAlgorithm::RSA; if (!m_pCert) return nRet; SECOidTag eTag = SECOID_GetAlgorithmTag(&m_pCert->subjectPublicKeyInfo.algorithm); if (eTag == SEC_OID_ANSIX962_EC_PUBLIC_KEY) nRet = svl::crypto::SignatureMethodAlgorithm::ECDSA; return nRet; } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getSHA1Thumbprint() { return getThumbprint(m_pCert, SEC_OID_SHA1); } css::uno::Sequence X509Certificate_NssImpl::getSHA256Thumbprint() { return getThumbprint(m_pCert, SEC_OID_SHA256); } css::uno::Sequence< sal_Int8 > SAL_CALL X509Certificate_NssImpl::getMD5Thumbprint() { return getThumbprint(m_pCert, SEC_OID_MD5); } css::security::CertificateKind SAL_CALL X509Certificate_NssImpl::getCertificateKind() { return css::security::CertificateKind_X509; } sal_Int32 SAL_CALL X509Certificate_NssImpl::getCertificateUsage( ) { SECStatus rv; SECItem tmpitem; sal_Int32 usage; rv = CERT_FindKeyUsageExtension(m_pCert, &tmpitem); if ( rv == SECStatus::SECSuccess ) { usage = tmpitem.data[0]; PORT_Free(tmpitem.data); tmpitem.data = nullptr; } else { usage = KU_ALL; } /* * to make the nss implementation compatible with MSCrypto, * the following usage is ignored * * if ( CERT_GovtApprovedBitSet(m_pCert) ) { usage |= KU_NS_GOVT_APPROVED; } */ return usage; } /* XServiceInfo */ OUString SAL_CALL X509Certificate_NssImpl::getImplementationName() { return "com.sun.star.xml.security.gpg.XCertificate_NssImpl"; } /* XServiceInfo */ sal_Bool SAL_CALL X509Certificate_NssImpl::supportsService(const OUString& serviceName) { return cppu::supportsService(this, serviceName); } /* XServiceInfo */ css::uno::Sequence SAL_CALL X509Certificate_NssImpl::getSupportedServiceNames() { return { OUString() }; } namespace xmlsecurity { // based on some guesswork and: // https://datatracker.ietf.org/doc/html/rfc1485 // https://docs.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-certnametostra#CERT_X500_NAME_STR // the main problem appears to be that in values " is escaped as "" vs. \" static OUString CompatDNCryptoAPI(OUString const& rDN) { OUStringBuffer buf(rDN.getLength()); enum { DEFAULT, INVALUE, INQUOTE } state(DEFAULT); for (sal_Int32 i = 0; i < rDN.getLength(); ++i) { if (state == DEFAULT) { buf.append(rDN[i]); if (rDN[i] == '=') { if (rDN.getLength() == i+1) { break; // invalid? } else if (rDN[i+1] == '"') { buf.append(rDN[i+1]); ++i; state = INQUOTE; } else { state = INVALUE; } } } else if (state == INVALUE) { if (rDN[i] == '+' || rDN[i] == ',' || rDN[i] == ';') { state = DEFAULT; } buf.append(rDN[i]); } else { assert(state == INQUOTE); if (rDN[i] == '"') { if (rDN.getLength() != i+1 && rDN[i+1] == '"') { buf.append('\\'); buf.append(rDN[i+1]); ++i; } else { buf.append(rDN[i]); state = DEFAULT; } } else { buf.append(rDN[i]); } } } return buf.makeStringAndClear(); } bool EqualDistinguishedNames( std::u16string_view const rName1, std::u16string_view const rName2, EqualMode const eMode) { if (eMode == COMPAT_BOTH && !rName1.empty() && rName1 == rName2) { // handle case where both need to be converted return true; } CERTName *const pName1(CERT_AsciiToName(OUStringToOString(rName1, RTL_TEXTENCODING_UTF8).getStr())); if (pName1 == nullptr) { return false; } CERTName *const pName2(CERT_AsciiToName(OUStringToOString(rName2, RTL_TEXTENCODING_UTF8).getStr())); bool ret(false); if (pName2) { ret = (CERT_CompareName(pName1, pName2) == SECEqual); CERT_DestroyName(pName2); } if (!ret && eMode == COMPAT_2ND) { CERTName *const pName2Compat(CERT_AsciiToName(OUStringToOString( CompatDNCryptoAPI(OUString(rName2)), RTL_TEXTENCODING_UTF8).getStr())); if (pName2Compat == nullptr) { CERT_DestroyName(pName1); return false; } ret = CERT_CompareName(pName1, pName2Compat) == SECEqual; CERT_DestroyName(pName2Compat); } CERT_DestroyName(pName1); return ret; } } // namespace xmlsecurity /* vim:set shiftwidth=4 softtabstop=4 expandtab: */