summaryrefslogtreecommitdiffstats
path: root/src/network/ssl/qwindowscarootfetcher.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/network/ssl/qwindowscarootfetcher.cpp')
-rw-r--r--src/network/ssl/qwindowscarootfetcher.cpp289
1 files changed, 0 insertions, 289 deletions
diff --git a/src/network/ssl/qwindowscarootfetcher.cpp b/src/network/ssl/qwindowscarootfetcher.cpp
deleted file mode 100644
index c414ca580b..0000000000
--- a/src/network/ssl/qwindowscarootfetcher.cpp
+++ /dev/null
@@ -1,289 +0,0 @@
-/****************************************************************************
-**
-** Copyright (C) 2018 The Qt Company Ltd.
-** Contact: https://www.qt.io/licensing/
-**
-** This file is part of the QtNetwork module of the Qt Toolkit.
-**
-** $QT_BEGIN_LICENSE:LGPL$
-** Commercial License Usage
-** Licensees holding valid commercial Qt licenses may use this file in
-** accordance with the commercial license agreement provided with the
-** Software or, alternatively, in accordance with the terms contained in
-** a written agreement between you and The Qt Company. For licensing terms
-** and conditions see https://www.qt.io/terms-conditions. For further
-** information use the contact form at https://www.qt.io/contact-us.
-**
-** GNU Lesser General Public License Usage
-** Alternatively, this file may be used under the terms of the GNU Lesser
-** General Public License version 3 as published by the Free Software
-** Foundation and appearing in the file LICENSE.LGPL3 included in the
-** packaging of this file. Please review the following information to
-** ensure the GNU Lesser General Public License version 3 requirements
-** will be met: https://www.gnu.org/licenses/lgpl-3.0.html.
-**
-** GNU General Public License Usage
-** Alternatively, this file may be used under the terms of the GNU
-** General Public License version 2.0 or (at your option) the GNU General
-** Public license version 3 or any later version approved by the KDE Free
-** Qt Foundation. The licenses are as published by the Free Software
-** Foundation and appearing in the file LICENSE.GPL2 and LICENSE.GPL3
-** included in the packaging of this file. Please review the following
-** information to ensure the GNU General Public License requirements will
-** be met: https://www.gnu.org/licenses/gpl-2.0.html and
-** https://www.gnu.org/licenses/gpl-3.0.html.
-**
-** $QT_END_LICENSE$
-**
-****************************************************************************/
-
-#include "qwindowscarootfetcher_p.h"
-
-#include <QtCore/QThread>
-#include <QtGlobal>
-
-#include <QtCore/qscopeguard.h>
-
-#ifdef QSSLSOCKET_DEBUG
-#include "qssl_p.h" // for debug categories
-#include <QtCore/QElapsedTimer>
-#endif
-
-#include "qsslsocket_p.h" // Transitively includes Wincrypt.h
-
-#if QT_CONFIG(openssl)
-#include "qsslsocket_openssl_p.h"
-#endif
-
-QT_BEGIN_NAMESPACE
-
-class QWindowsCaRootFetcherThread : public QThread
-{
-public:
- QWindowsCaRootFetcherThread()
- {
- qRegisterMetaType<QSslCertificate>();
- setObjectName(QStringLiteral("QWindowsCaRootFetcher"));
- start();
- }
- ~QWindowsCaRootFetcherThread()
- {
- quit();
- wait(15500); // worst case, a running request can block for 15 seconds
- }
-};
-
-Q_GLOBAL_STATIC(QWindowsCaRootFetcherThread, windowsCaRootFetcherThread);
-
-#if QT_CONFIG(openssl)
-namespace {
-
-const QList<QSslCertificate> buildVerifiedChain(const QList<QSslCertificate> &caCertificates,
- PCCERT_CHAIN_CONTEXT chainContext,
- const QString &peerVerifyName)
-{
- // We ended up here because OpenSSL verification failed to
- // build a chain, with intermediate certificate missing
- // but "Authority Information Access" extension present.
- // Also, apparently the normal CA fetching path was disabled
- // by setting custom CA certificates. We convert wincrypt's
- // structures in QSslCertificate and give OpenSSL the second
- // chance to verify the now (apparently) complete chain.
- // In addition, wincrypt gives us a benifit of some checks
- // we don't have in OpenSSL back-end.
- Q_ASSERT(chainContext);
-
- if (!chainContext->cChain)
- return {};
-
- QList<QSslCertificate> verifiedChain;
-
- CERT_SIMPLE_CHAIN *chain = chainContext->rgpChain[chainContext->cChain - 1];
- if (!chain)
- return {};
-
- if (chain->TrustStatus.dwErrorStatus & CERT_TRUST_IS_PARTIAL_CHAIN)
- return {}; // No need to mess with OpenSSL (the chain is still incomplete).
-
- for (DWORD i = 0; i < chain->cElement; ++i) {
- CERT_CHAIN_ELEMENT *element = chain->rgpElement[i];
- QSslCertificate cert(QByteArray(reinterpret_cast<const char*>(element->pCertContext->pbCertEncoded),
- int(element->pCertContext->cbCertEncoded)), QSsl::Der);
-
- if (cert.isBlacklisted())
- return {};
-
- if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_REVOKED) // Good to know!
- return {};
-
- if (element->TrustStatus.dwErrorStatus & CERT_TRUST_IS_NOT_SIGNATURE_VALID)
- return {};
-
- verifiedChain.append(cert);
- }
-
- // We rely on OpenSSL's ability to find other problems.
- const auto tlsErrors = QSslSocketBackendPrivate::verify(caCertificates, verifiedChain, peerVerifyName);
- if (tlsErrors.size())
- verifiedChain.clear();
-
- return verifiedChain;
-}
-
-} // unnamed namespace
-#endif // QT_CONFIG(openssl)
-
-QWindowsCaRootFetcher::QWindowsCaRootFetcher(const QSslCertificate &certificate, QSslSocket::SslMode sslMode,
- const QList<QSslCertificate> &caCertificates, const QString &hostName)
- : cert(certificate), mode(sslMode), explicitlyTrustedCAs(caCertificates), peerVerifyName(hostName)
-{
- moveToThread(windowsCaRootFetcherThread());
-}
-
-QWindowsCaRootFetcher::~QWindowsCaRootFetcher()
-{
-}
-
-void QWindowsCaRootFetcher::start()
-{
- QByteArray der = cert.toDer();
- PCCERT_CONTEXT wincert = CertCreateCertificateContext(X509_ASN_ENCODING, (const BYTE *)der.constData(), der.length());
- if (!wincert) {
-#ifdef QSSLSOCKET_DEBUG
- qCDebug(lcSsl, "QWindowsCaRootFetcher failed to convert certificate to windows form");
-#endif
- emit finished(cert, QSslCertificate());
- deleteLater();
- return;
- }
-
- CERT_CHAIN_PARA parameters;
- memset(&parameters, 0, sizeof(parameters));
- parameters.cbSize = sizeof(parameters);
- // set key usage constraint
- parameters.RequestedUsage.dwType = USAGE_MATCH_TYPE_AND;
- parameters.RequestedUsage.Usage.cUsageIdentifier = 1;
- LPSTR oid = (LPSTR)(mode == QSslSocket::SslClientMode ? szOID_PKIX_KP_SERVER_AUTH : szOID_PKIX_KP_CLIENT_AUTH);
- parameters.RequestedUsage.Usage.rgpszUsageIdentifier = &oid;
-
-#ifdef QSSLSOCKET_DEBUG
- QElapsedTimer stopwatch;
- stopwatch.start();
-#endif
- PCCERT_CHAIN_CONTEXT chain;
- auto additionalStore = createAdditionalStore();
- BOOL result = CertGetCertificateChain(
- nullptr, //default engine
- wincert,
- nullptr, //current date/time
- additionalStore.get(), //default store (nullptr) or CAs an application trusts
- &parameters,
- 0, //default dwFlags
- nullptr, //reserved
- &chain);
-#ifdef QSSLSOCKET_DEBUG
- qCDebug(lcSsl) << "QWindowsCaRootFetcher" << stopwatch.elapsed() << "ms to get chain";
-#endif
-
- QSslCertificate trustedRoot;
- if (result) {
-#ifdef QSSLSOCKET_DEBUG
- qCDebug(lcSsl) << "QWindowsCaRootFetcher - examining windows chains";
- if (chain->TrustStatus.dwErrorStatus == CERT_TRUST_NO_ERROR)
- qCDebug(lcSsl) << " - TRUSTED";
- else
- qCDebug(lcSsl) << " - NOT TRUSTED" << chain->TrustStatus.dwErrorStatus;
- if (chain->TrustStatus.dwInfoStatus & CERT_TRUST_IS_SELF_SIGNED)
- qCDebug(lcSsl) << " - SELF SIGNED";
- qCDebug(lcSsl) << "QSslSocketBackendPrivate::fetchCaRootForCert - dumping simple chains";
- for (unsigned int i = 0; i < chain->cChain; i++) {
- if (chain->rgpChain[i]->TrustStatus.dwErrorStatus == CERT_TRUST_NO_ERROR)
- qCDebug(lcSsl) << " - TRUSTED SIMPLE CHAIN" << i;
- else
- qCDebug(lcSsl) << " - UNTRUSTED SIMPLE CHAIN" << i << "reason:" << chain->rgpChain[i]->TrustStatus.dwErrorStatus;
- for (unsigned int j = 0; j < chain->rgpChain[i]->cElement; j++) {
- QSslCertificate foundCert(QByteArray((const char *)chain->rgpChain[i]->rgpElement[j]->pCertContext->pbCertEncoded
- , chain->rgpChain[i]->rgpElement[j]->pCertContext->cbCertEncoded), QSsl::Der);
- qCDebug(lcSsl) << " - " << foundCert;
- }
- }
- qCDebug(lcSsl) << " - and" << chain->cLowerQualityChainContext << "low quality chains"; //expect 0, we haven't asked for them
-#endif
-
- //based on http://msdn.microsoft.com/en-us/library/windows/desktop/aa377182%28v=vs.85%29.aspx
- //about the final chain rgpChain[cChain-1] which must begin with a trusted root to be valid
- if (chain->TrustStatus.dwErrorStatus == CERT_TRUST_NO_ERROR
- && chain->cChain > 0) {
- const PCERT_SIMPLE_CHAIN finalChain = chain->rgpChain[chain->cChain - 1];
- // http://msdn.microsoft.com/en-us/library/windows/desktop/aa377544%28v=vs.85%29.aspx
- // rgpElement[0] is the end certificate chain element. rgpElement[cElement-1] is the self-signed "root" certificate element.
- if (finalChain->TrustStatus.dwErrorStatus == CERT_TRUST_NO_ERROR
- && finalChain->cElement > 0) {
- trustedRoot = QSslCertificate(QByteArray((const char *)finalChain->rgpElement[finalChain->cElement - 1]->pCertContext->pbCertEncoded
- , finalChain->rgpElement[finalChain->cElement - 1]->pCertContext->cbCertEncoded), QSsl::Der);
- }
- } else if (explicitlyTrustedCAs.size()) {
- // Setting custom CA in configuration, and those CAs are not trusted by MS.
-#if QT_CONFIG(openssl)
- const auto verifiedChain = buildVerifiedChain(explicitlyTrustedCAs, chain, peerVerifyName);
- if (verifiedChain.size())
- trustedRoot = verifiedChain.last();
-#else
- //It's only OpenSSL code-path that can trigger such a fetch.
- Q_UNREACHABLE();
-#endif
- }
- CertFreeCertificateChain(chain);
- }
- CertFreeCertificateContext(wincert);
-
- emit finished(cert, trustedRoot);
- deleteLater();
-}
-
-QHCertStorePointer QWindowsCaRootFetcher::createAdditionalStore() const
-{
- QHCertStorePointer customStore;
- if (explicitlyTrustedCAs.isEmpty())
- return customStore;
-
- if (HCERTSTORE rawPtr = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0, 0, nullptr)) {
- customStore.reset(rawPtr);
-
- unsigned rootsAdded = 0;
- for (const QSslCertificate &caCert : explicitlyTrustedCAs) {
- const auto der = caCert.toDer();
- PCCERT_CONTEXT winCert = CertCreateCertificateContext(X509_ASN_ENCODING,
- reinterpret_cast<const BYTE *>(der.data()),
- DWORD(der.length()));
- if (!winCert) {
-#if defined(QSSLSOCKET_DEBUG)
- qCWarning(lcSsl) << "CA fetcher, failed to convert QSslCertificate"
- << "to the native representation";
-#endif // QSSLSOCKET_DEBUG
- continue;
- }
- const auto deleter = qScopeGuard([winCert](){
- CertFreeCertificateContext(winCert);
- });
- if (CertAddCertificateContextToStore(customStore.get(), winCert, CERT_STORE_ADD_ALWAYS, nullptr))
- ++rootsAdded;
-#if defined(QSSLSOCKET_DEBUG)
- else //Why assert? With flags we're using and winCert check - should not happen!
- Q_ASSERT("CertAddCertificateContextToStore() failed");
-#endif // QSSLSOCKET_DEBUG
- }
- if (!rootsAdded) //Useless store, no cert was added.
- customStore.reset();
-#if defined(QSSLSOCKET_DEBUG)
- } else {
-
- qCWarning(lcSsl) << "CA fetcher, failed to create a custom"
- << "store for explicitly trusted CA certificate";
-#endif // QSSLSOCKET_DEBUG
- }
-
- return customStore;
-}
-
-QT_END_NAMESPACE