2013-07-10 02:45:36 +02:00
|
|
|
/*
|
|
|
|
* libjingle
|
|
|
|
* Copyright 2004, Google Inc.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
* 3. The name of the author may not be used to endorse or promote products
|
|
|
|
* derived from this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
|
|
|
|
* EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
|
|
|
|
* PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
|
|
|
|
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
|
|
* WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
|
|
|
|
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
|
|
|
|
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
// Handling of certificates and keypairs for SSLStreamAdapter's peer mode.
|
|
|
|
#if HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif // HAVE_CONFIG_H
|
|
|
|
|
|
|
|
#include "talk/base/sslidentity.h"
|
|
|
|
|
|
|
|
#include <string>
|
|
|
|
|
2013-08-10 09:18:04 +02:00
|
|
|
#include "talk/base/base64.h"
|
|
|
|
#include "talk/base/logging.h"
|
2013-07-10 02:45:36 +02:00
|
|
|
#include "talk/base/sslconfig.h"
|
|
|
|
|
|
|
|
#if SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
#elif SSL_USE_OPENSSL // !SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
#include "talk/base/opensslidentity.h"
|
|
|
|
|
|
|
|
#elif SSL_USE_NSS // !SSL_USE_SCHANNEL && !SSL_USE_OPENSSL
|
|
|
|
|
|
|
|
#include "talk/base/nssidentity.h"
|
|
|
|
|
|
|
|
#endif // SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
namespace talk_base {
|
|
|
|
|
2013-08-10 09:18:04 +02:00
|
|
|
const char kPemTypeCertificate[] = "CERTIFICATE";
|
|
|
|
const char kPemTypeRsaPrivateKey[] = "RSA PRIVATE KEY";
|
|
|
|
|
|
|
|
bool SSLIdentity::PemToDer(const std::string& pem_type,
|
|
|
|
const std::string& pem_string,
|
|
|
|
std::string* der) {
|
|
|
|
// Find the inner body. We need this to fulfill the contract of
|
|
|
|
// returning pem_length.
|
|
|
|
size_t header = pem_string.find("-----BEGIN " + pem_type + "-----");
|
|
|
|
if (header == std::string::npos)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
size_t body = pem_string.find("\n", header);
|
|
|
|
if (body == std::string::npos)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
size_t trailer = pem_string.find("-----END " + pem_type + "-----");
|
|
|
|
if (trailer == std::string::npos)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
std::string inner = pem_string.substr(body + 1, trailer - (body + 1));
|
|
|
|
|
|
|
|
*der = Base64::Decode(inner, Base64::DO_PARSE_WHITE |
|
|
|
|
Base64::DO_PAD_ANY |
|
|
|
|
Base64::DO_TERM_BUFFER);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
std::string SSLIdentity::DerToPem(const std::string& pem_type,
|
|
|
|
const unsigned char* data,
|
|
|
|
size_t length) {
|
|
|
|
std::stringstream result;
|
|
|
|
|
|
|
|
result << "-----BEGIN " << pem_type << "-----\n";
|
|
|
|
|
|
|
|
std::string b64_encoded;
|
|
|
|
Base64::EncodeFromArray(data, length, &b64_encoded);
|
|
|
|
|
|
|
|
// Divide the Base-64 encoded data into 64-character chunks, as per
|
|
|
|
// 4.3.2.4 of RFC 1421.
|
|
|
|
static const size_t kChunkSize = 64;
|
|
|
|
size_t chunks = (b64_encoded.size() + (kChunkSize - 1)) / kChunkSize;
|
|
|
|
for (size_t i = 0, chunk_offset = 0; i < chunks;
|
|
|
|
++i, chunk_offset += kChunkSize) {
|
|
|
|
result << b64_encoded.substr(chunk_offset, kChunkSize);
|
|
|
|
result << "\n";
|
|
|
|
}
|
|
|
|
|
|
|
|
result << "-----END " << pem_type << "-----\n";
|
|
|
|
|
|
|
|
return result.str();
|
|
|
|
}
|
|
|
|
|
2013-07-10 02:45:36 +02:00
|
|
|
#if SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
SSLCertificate* SSLCertificate::FromPEMString(const std::string& pem_string) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
SSLIdentity* SSLIdentity::Generate(const std::string& common_name) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2014-01-03 23:08:47 +01:00
|
|
|
SSLIdentity* GenerateForTest(const SSLIdentityParams& params) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-07-10 02:45:36 +02:00
|
|
|
SSLIdentity* SSLIdentity::FromPEMStrings(const std::string& private_key,
|
|
|
|
const std::string& certificate) {
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#elif SSL_USE_OPENSSL // !SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
SSLCertificate* SSLCertificate::FromPEMString(const std::string& pem_string) {
|
|
|
|
return OpenSSLCertificate::FromPEMString(pem_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
SSLIdentity* SSLIdentity::Generate(const std::string& common_name) {
|
|
|
|
return OpenSSLIdentity::Generate(common_name);
|
|
|
|
}
|
|
|
|
|
2014-01-03 23:08:47 +01:00
|
|
|
SSLIdentity* SSLIdentity::GenerateForTest(const SSLIdentityParams& params) {
|
|
|
|
return OpenSSLIdentity::GenerateForTest(params);
|
|
|
|
}
|
|
|
|
|
2013-07-10 02:45:36 +02:00
|
|
|
SSLIdentity* SSLIdentity::FromPEMStrings(const std::string& private_key,
|
|
|
|
const std::string& certificate) {
|
|
|
|
return OpenSSLIdentity::FromPEMStrings(private_key, certificate);
|
|
|
|
}
|
|
|
|
|
|
|
|
#elif SSL_USE_NSS // !SSL_USE_OPENSSL && !SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
SSLCertificate* SSLCertificate::FromPEMString(const std::string& pem_string) {
|
|
|
|
return NSSCertificate::FromPEMString(pem_string);
|
|
|
|
}
|
|
|
|
|
|
|
|
SSLIdentity* SSLIdentity::Generate(const std::string& common_name) {
|
|
|
|
return NSSIdentity::Generate(common_name);
|
|
|
|
}
|
|
|
|
|
2014-01-03 23:08:47 +01:00
|
|
|
SSLIdentity* SSLIdentity::GenerateForTest(const SSLIdentityParams& params) {
|
|
|
|
return NSSIdentity::GenerateForTest(params);
|
|
|
|
}
|
|
|
|
|
2013-07-10 02:45:36 +02:00
|
|
|
SSLIdentity* SSLIdentity::FromPEMStrings(const std::string& private_key,
|
|
|
|
const std::string& certificate) {
|
|
|
|
return NSSIdentity::FromPEMStrings(private_key, certificate);
|
|
|
|
}
|
|
|
|
|
|
|
|
#else // !SSL_USE_OPENSSL && !SSL_USE_SCHANNEL && !SSL_USE_NSS
|
|
|
|
|
|
|
|
#error "No SSL implementation"
|
|
|
|
|
|
|
|
#endif // SSL_USE_SCHANNEL
|
|
|
|
|
|
|
|
} // namespace talk_base
|