-
Notifications
You must be signed in to change notification settings - Fork 30.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crypto: load PFX chain the same way as regular one #4165
Changes from all commits
d04c1f6
564a88b
4e9d541
57d441b
e0f6f4b
64ef090
3cd0efb
078ff9f
3691db8
8c17c3c
7890de4
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -530,46 +530,35 @@ int SSL_CTX_get_issuer(SSL_CTX* ctx, X509* cert, X509** issuer) { | |
} | ||
|
||
|
||
// Read a file that contains our certificate in "PEM" format, | ||
// possibly followed by a sequence of CA certificates that should be | ||
// sent to the peer in the Certificate message. | ||
// | ||
// Taken from OpenSSL - editted for style. | ||
int SSL_CTX_use_certificate_chain(SSL_CTX* ctx, | ||
BIO* in, | ||
X509* x, | ||
STACK_OF(X509)* extra_certs, | ||
X509** cert, | ||
X509** issuer) { | ||
int ret = 0; | ||
X509* x = nullptr; | ||
CHECK_EQ(*issuer, nullptr); | ||
CHECK_EQ(*cert, nullptr); | ||
|
||
x = PEM_read_bio_X509_AUX(in, nullptr, CryptoPemCallback, nullptr); | ||
|
||
if (x == nullptr) { | ||
SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE, ERR_R_PEM_LIB); | ||
goto end; | ||
} | ||
|
||
ret = SSL_CTX_use_certificate(ctx, x); | ||
int ret = SSL_CTX_use_certificate(ctx, x); | ||
|
||
if (ret) { | ||
// If we could set up our certificate, now proceed to | ||
// the CA certificates. | ||
X509 *ca; | ||
int r; | ||
unsigned long err; | ||
|
||
if (ctx->extra_certs != nullptr) { | ||
sk_X509_pop_free(ctx->extra_certs, X509_free); | ||
ctx->extra_certs = nullptr; | ||
} | ||
|
||
while ((ca = PEM_read_bio_X509(in, nullptr, CryptoPemCallback, nullptr))) { | ||
for (int i = 0; i < sk_X509_num(extra_certs); i++) { | ||
X509* ca = sk_X509_value(extra_certs, i); | ||
|
||
// NOTE: Increments reference count on `ca` | ||
r = SSL_CTX_add1_chain_cert(ctx, ca); | ||
|
||
if (!r) { | ||
X509_free(ca); | ||
ret = 0; | ||
*issuer = nullptr; | ||
goto end; | ||
} | ||
// Note that we must not free r if it was successfully | ||
|
@@ -580,17 +569,8 @@ int SSL_CTX_use_certificate_chain(SSL_CTX* ctx, | |
// Find issuer | ||
if (*issuer != nullptr || X509_check_issued(ca, x) != X509_V_OK) | ||
continue; | ||
*issuer = ca; | ||
} | ||
|
||
// When the while loop ends, it's usually just EOF. | ||
err = ERR_peek_last_error(); | ||
if (ERR_GET_LIB(err) == ERR_LIB_PEM && | ||
ERR_GET_REASON(err) == PEM_R_NO_START_LINE) { | ||
ERR_clear_error(); | ||
} else { | ||
// some real error | ||
ret = 0; | ||
*issuer = ca; | ||
} | ||
} | ||
|
||
|
@@ -603,13 +583,88 @@ int SSL_CTX_use_certificate_chain(SSL_CTX* ctx, | |
// no need to free `store` | ||
} else { | ||
// Increment issuer reference count | ||
CRYPTO_add(&(*issuer)->references, 1, CRYPTO_LOCK_X509); | ||
*issuer = X509_dup(*issuer); | ||
if (*issuer == nullptr) { | ||
ret = 0; | ||
goto end; | ||
} | ||
} | ||
} | ||
|
||
end: | ||
if (ret && x != nullptr) { | ||
*cert = X509_dup(x); | ||
if (*cert == nullptr) | ||
ret = 0; | ||
} | ||
return ret; | ||
} | ||
|
||
|
||
// Read a file that contains our certificate in "PEM" format, | ||
// possibly followed by a sequence of CA certificates that should be | ||
// sent to the peer in the Certificate message. | ||
// | ||
// Taken from OpenSSL - edited for style. | ||
int SSL_CTX_use_certificate_chain(SSL_CTX* ctx, | ||
BIO* in, | ||
X509** cert, | ||
X509** issuer) { | ||
X509* x = nullptr; | ||
|
||
// Just to ensure that `ERR_peek_last_error` below will return only errors | ||
// that we are interested in | ||
ERR_clear_error(); | ||
|
||
x = PEM_read_bio_X509_AUX(in, nullptr, CryptoPemCallback, nullptr); | ||
|
||
if (x == nullptr) { | ||
SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE, ERR_R_PEM_LIB); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I realize it's not new code but I believe There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I would keep it as it is right now, just because it may make this PR a semver-major. Let's reconsider it later. |
||
return 0; | ||
} | ||
|
||
X509* extra = nullptr; | ||
int ret = 0; | ||
unsigned long err = 0; | ||
|
||
// Read extra certs | ||
STACK_OF(X509)* extra_certs = sk_X509_new_null(); | ||
if (extra_certs == nullptr) { | ||
SSLerr(SSL_F_SSL_CTX_USE_CERTIFICATE_CHAIN_FILE, ERR_R_MALLOC_FAILURE); | ||
goto done; | ||
} | ||
|
||
while ((extra = PEM_read_bio_X509(in, nullptr, CryptoPemCallback, nullptr))) { | ||
if (sk_X509_push(extra_certs, extra)) | ||
continue; | ||
|
||
// Failure, free all certs | ||
goto done; | ||
} | ||
extra = nullptr; | ||
|
||
// When the while loop ends, it's usually just EOF. | ||
err = ERR_peek_last_error(); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
EDIT: I imagine you may need to call There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yeah, I will put There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Ack. |
||
if (ERR_GET_LIB(err) == ERR_LIB_PEM && | ||
ERR_GET_REASON(err) == PEM_R_NO_START_LINE) { | ||
ERR_clear_error(); | ||
} else { | ||
// some real error | ||
goto done; | ||
} | ||
|
||
ret = SSL_CTX_use_certificate_chain(ctx, x, extra_certs, cert, issuer); | ||
if (!ret) | ||
goto done; | ||
|
||
done: | ||
if (extra_certs != nullptr) | ||
sk_X509_pop_free(extra_certs, X509_free); | ||
if (extra != nullptr) | ||
X509_free(extra); | ||
if (x != nullptr) | ||
*cert = x; | ||
X509_free(x); | ||
|
||
return ret; | ||
} | ||
|
||
|
@@ -627,6 +682,16 @@ void SecureContext::SetCert(const FunctionCallbackInfo<Value>& args) { | |
if (!bio) | ||
return; | ||
|
||
// Free previous certs | ||
if (sc->issuer_ != nullptr) { | ||
X509_free(sc->issuer_); | ||
sc->issuer_ = nullptr; | ||
} | ||
if (sc->cert_ != nullptr) { | ||
X509_free(sc->cert_); | ||
sc->cert_ = nullptr; | ||
} | ||
|
||
int rv = SSL_CTX_use_certificate_chain(sc->ctx_, | ||
bio, | ||
&sc->cert_, | ||
|
@@ -898,7 +963,7 @@ void SecureContext::LoadPKCS12(const FunctionCallbackInfo<Value>& args) { | |
PKCS12* p12 = nullptr; | ||
EVP_PKEY* pkey = nullptr; | ||
X509* cert = nullptr; | ||
STACK_OF(X509)* extraCerts = nullptr; | ||
STACK_OF(X509)* extra_certs = nullptr; | ||
char* pass = nullptr; | ||
bool ret = false; | ||
|
||
|
@@ -923,28 +988,33 @@ void SecureContext::LoadPKCS12(const FunctionCallbackInfo<Value>& args) { | |
pass[passlen] = '\0'; | ||
} | ||
|
||
// Free previous certs | ||
if (sc->issuer_ != nullptr) { | ||
X509_free(sc->issuer_); | ||
sc->issuer_ = nullptr; | ||
} | ||
if (sc->cert_ != nullptr) { | ||
X509_free(sc->cert_); | ||
sc->cert_ = nullptr; | ||
} | ||
|
||
if (d2i_PKCS12_bio(in, &p12) && | ||
PKCS12_parse(p12, pass, &pkey, &cert, &extraCerts) && | ||
SSL_CTX_use_certificate(sc->ctx_, cert) && | ||
PKCS12_parse(p12, pass, &pkey, &cert, &extra_certs) && | ||
SSL_CTX_use_certificate_chain(sc->ctx_, | ||
cert, | ||
extra_certs, | ||
&sc->cert_, | ||
&sc->issuer_) && | ||
SSL_CTX_use_PrivateKey(sc->ctx_, pkey)) { | ||
// set extra certs | ||
while (X509* x509 = sk_X509_pop(extraCerts)) { | ||
if (!sc->ca_store_) { | ||
sc->ca_store_ = X509_STORE_new(); | ||
SSL_CTX_set_cert_store(sc->ctx_, sc->ca_store_); | ||
} | ||
|
||
X509_STORE_add_cert(sc->ca_store_, x509); | ||
SSL_CTX_add_client_CA(sc->ctx_, x509); | ||
X509_free(x509); | ||
} | ||
ret = true; | ||
} | ||
|
||
if (pkey != nullptr) | ||
EVP_PKEY_free(pkey); | ||
if (cert != nullptr) | ||
X509_free(cert); | ||
sk_X509_free(extraCerts); | ||
|
||
ret = true; | ||
} | ||
if (extra_certs != nullptr) | ||
sk_X509_free(extra_certs); | ||
|
||
PKCS12_free(p12); | ||
BIO_free_all(in); | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you add a
CHECK_EQ(*issuer, nullptr)
and maybe aCHECK_EQ(*cert, nullptr)
while you're here?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You are totally right. It needs something more complex though, since we don't prevent people from passing in both
cert
+key
andpfx
for TLS server.