37
37
#define OPENSSL_d2i_TYPE unsigned char **
38
38
#endif
39
39
40
+ #ifdef ANDROID
41
+ #include <openssl/pem.h>
42
+ #include "keystore_get.h"
43
+
44
+ static BIO * BIO_from_keystore (const char * key )
45
+ {
46
+ BIO * bio = NULL ;
47
+ char value [KEYSTORE_MESSAGE_SIZE ];
48
+ int length = keystore_get (key , value );
49
+ if (length != -1 && (bio = BIO_new (BIO_s_mem ())) != NULL ) {
50
+ BIO_write (bio , value , length );
51
+ }
52
+ return bio ;
53
+ }
54
+ #endif
55
+
40
56
static int tls_openssl_ref_count = 0 ;
41
57
42
58
struct tls_connection {
@@ -1092,35 +1108,6 @@ static int tls_load_ca_der(void *_ssl_ctx, const char *ca_cert)
1092
1108
}
1093
1109
#endif /* OPENSSL_NO_STDIO */
1094
1110
1095
- #ifdef ANDROID
1096
- static int add_cert_chain_from_blob (X509_STORE * store , char * value , int size )
1097
- {
1098
- int i , ret = -1 ;
1099
- BIO * bio = NULL ;
1100
- STACK_OF (X509_INFO ) * stack = NULL ;
1101
-
1102
- bio = BIO_new (BIO_s_mem ());
1103
- if (bio == NULL ) goto end ;
1104
- BIO_write (bio , value , size );
1105
- stack = PEM_X509_INFO_read_bio (bio , NULL , NULL , NULL );
1106
- if (stack == NULL ) goto end ;
1107
- for (i = 0 ; i < sk_X509_INFO_num (stack ); ++ i ) {
1108
- X509_INFO * info = sk_X509_INFO_value (stack , i );
1109
- if (info -> x509 ) {
1110
- X509_STORE_add_cert (store , info -> x509 );
1111
- }
1112
- if (info -> crl ) {
1113
- X509_STORE_add_crl (store , info -> crl );
1114
- }
1115
- }
1116
- sk_X509_INFO_pop_free (stack , X509_INFO_free );
1117
- ret = 0 ;
1118
- end :
1119
- if (bio != NULL ) BIO_free (bio );
1120
- return ret ;
1121
- }
1122
- #endif
1123
-
1124
1111
static int tls_connection_ca_cert (void * _ssl_ctx , struct tls_connection * conn ,
1125
1112
const char * ca_cert , const u8 * ca_cert_blob ,
1126
1113
size_t ca_cert_blob_len , const char * ca_path )
@@ -1138,12 +1125,8 @@ static int tls_connection_ca_cert(void *_ssl_ctx, struct tls_connection *conn,
1138
1125
"certificate store" , __func__ );
1139
1126
return -1 ;
1140
1127
}
1128
+
1141
1129
if (ca_cert_blob ) {
1142
- #ifdef ANDROID
1143
- return add_cert_chain_from_blob (ssl_ctx -> cert_store ,
1144
- (char * )ca_cert_blob ,
1145
- (int )ca_cert_blob_len );
1146
- #else
1147
1130
X509 * cert = d2i_X509 (NULL , (OPENSSL_d2i_TYPE ) & ca_cert_blob ,
1148
1131
ca_cert_blob_len );
1149
1132
if (cert == NULL ) {
@@ -1173,9 +1156,34 @@ static int tls_connection_ca_cert(void *_ssl_ctx, struct tls_connection *conn,
1173
1156
"to certificate store" , __func__ );
1174
1157
SSL_set_verify (conn -> ssl , SSL_VERIFY_PEER , tls_verify_cb );
1175
1158
return 0 ;
1176
- #endif
1177
1159
}
1178
1160
1161
+ #ifdef ANDROID
1162
+ if (strncmp ("keystore://" , ca_cert , 11 ) == 0 ) {
1163
+ BIO * bio = BIO_from_keystore (& ca_cert [11 ]);
1164
+ STACK_OF (X509_INFO ) * stack = NULL ;
1165
+ int i ;
1166
+ if (bio ) {
1167
+ stack = PEM_X509_INFO_read_bio (bio , NULL , NULL , NULL );
1168
+ BIO_free (bio );
1169
+ }
1170
+ if (!stack ) {
1171
+ return -1 ;
1172
+ }
1173
+ for (i = 0 ; i < sk_X509_INFO_num (stack ); ++ i ) {
1174
+ X509_INFO * info = sk_X509_INFO_value (stack , i );
1175
+ if (info -> x509 ) {
1176
+ X509_STORE_add_cert (ssl_ctx -> cert_store , info -> x509 );
1177
+ }
1178
+ if (info -> crl ) {
1179
+ X509_STORE_add_crl (ssl_ctx -> cert_store , info -> crl );
1180
+ }
1181
+ }
1182
+ sk_X509_INFO_pop_free (stack , X509_INFO_free );
1183
+ SSL_set_verify (conn -> ssl , SSL_VERIFY_PEER , tls_verify_cb );
1184
+ return 0 ;
1185
+ }
1186
+ #endif
1179
1187
1180
1188
#ifdef CONFIG_NATIVE_WINDOWS
1181
1189
if (ca_cert && tls_cryptoapi_ca_cert (ssl_ctx , conn -> ssl , ca_cert ) ==
@@ -1332,6 +1340,25 @@ static int tls_connection_client_cert(struct tls_connection *conn,
1332
1340
if (client_cert == NULL )
1333
1341
return -1 ;
1334
1342
1343
+ #ifdef ANDROID
1344
+ if (strncmp ("keystore://" , client_cert , 11 ) == 0 ) {
1345
+ BIO * bio = BIO_from_keystore (& client_cert [11 ]);
1346
+ X509 * x509 = NULL ;
1347
+ int ret = -1 ;
1348
+ if (bio ) {
1349
+ x509 = PEM_read_bio_X509 (bio , NULL , NULL , NULL );
1350
+ BIO_free (bio );
1351
+ }
1352
+ if (x509 ) {
1353
+ if (SSL_use_certificate (conn -> ssl , x509 ) == 1 ) {
1354
+ ret = 0 ;
1355
+ }
1356
+ X509_free (x509 );
1357
+ }
1358
+ return ret ;
1359
+ }
1360
+ #endif
1361
+
1335
1362
#ifndef OPENSSL_NO_STDIO
1336
1363
if (SSL_use_certificate_file (conn -> ssl , client_cert ,
1337
1364
SSL_FILETYPE_ASN1 ) == 1 ) {
@@ -1621,6 +1648,23 @@ static int tls_connection_private_key(void *_ssl_ctx,
1621
1648
break ;
1622
1649
}
1623
1650
1651
+ #ifdef ANDROID
1652
+ if (!ok && private_key && strncmp ("keystore://" , private_key , 11 ) == 0 ) {
1653
+ BIO * bio = BIO_from_keystore (& private_key [11 ]);
1654
+ EVP_PKEY * pkey = NULL ;
1655
+ if (bio ) {
1656
+ pkey = PEM_read_bio_PrivateKey (bio , NULL , NULL , NULL );
1657
+ BIO_free (bio );
1658
+ }
1659
+ if (pkey ) {
1660
+ if (SSL_use_PrivateKey (conn -> ssl , pkey ) == 1 ) {
1661
+ ok = 1 ;
1662
+ }
1663
+ EVP_PKEY_free (pkey );
1664
+ }
1665
+ }
1666
+ #endif
1667
+
1624
1668
while (!ok && private_key ) {
1625
1669
#ifndef OPENSSL_NO_STDIO
1626
1670
if (SSL_use_PrivateKey_file (conn -> ssl , private_key ,
0 commit comments