OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/base/ev_root_ca_metadata.h" | 5 #include "net/base/ev_root_ca_metadata.h" |
6 | 6 |
7 #if defined(USE_NSS) | 7 #if defined(USE_NSS) |
8 #include <cert.h> | 8 #include <cert.h> |
9 #include <pkcs11n.h> | 9 #include <pkcs11n.h> |
10 #include <secerr.h> | 10 #include <secerr.h> |
(...skipping 15 matching lines...) Expand all Loading... |
26 // kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At | 26 // kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At |
27 // least one CA has different EV policies for businuss vs government | 27 // least one CA has different EV policies for businuss vs government |
28 // entities and, in the case of cross-signing, we might need to list another | 28 // entities and, in the case of cross-signing, we might need to list another |
29 // CA's policy OID under the cross-signing root. | 29 // CA's policy OID under the cross-signing root. |
30 static const size_t kMaxOIDsPerCA = 2; | 30 static const size_t kMaxOIDsPerCA = 2; |
31 // This is the maximum length of an OID string (including the trailing NUL). | 31 // This is the maximum length of an OID string (including the trailing NUL). |
32 static const size_t kMaxOIDLength = 32; | 32 static const size_t kMaxOIDLength = 32; |
33 | 33 |
34 // The SHA-1 fingerprint of the root CA certificate, used as a unique | 34 // The SHA-1 fingerprint of the root CA certificate, used as a unique |
35 // identifier for a root CA certificate. | 35 // identifier for a root CA certificate. |
36 SHA1Fingerprint fingerprint; | 36 SHA1HashValue fingerprint; |
37 | 37 |
38 // The EV policy OIDs of the root CA. | 38 // The EV policy OIDs of the root CA. |
39 const char policy_oids[kMaxOIDsPerCA][kMaxOIDLength]; | 39 const char policy_oids[kMaxOIDsPerCA][kMaxOIDLength]; |
40 }; | 40 }; |
41 | 41 |
42 static const EVMetadata ev_root_ca_metadata[] = { | 42 static const EVMetadata ev_root_ca_metadata[] = { |
43 // AddTrust External CA Root | 43 // AddTrust External CA Root |
44 // https://addtrustexternalcaroot-ev.comodoca.com | 44 // https://addtrustexternalcaroot-ev.comodoca.com |
45 { { { 0x02, 0xfa, 0xf3, 0xe2, 0x91, 0x43, 0x54, 0x68, 0x60, 0x78, | 45 { { { 0x02, 0xfa, 0xf3, 0xe2, 0x91, 0x43, 0x54, 0x68, 0x60, 0x78, |
46 0x57, 0x69, 0x4d, 0xf5, 0xe4, 0x5b, 0x68, 0x85, 0x18, 0x68 } }, | 46 0x57, 0x69, 0x4d, 0xf5, 0xe4, 0x5b, 0x68, 0x85, 0x18, 0x68 } }, |
(...skipping 19 matching lines...) Expand all Loading... |
66 // AffirmTrust Premium | 66 // AffirmTrust Premium |
67 // https://premium.affirmtrust.com:4432/ | 67 // https://premium.affirmtrust.com:4432/ |
68 { { { 0xd8, 0xa6, 0x33, 0x2c, 0xe0, 0x03, 0x6f, 0xb1, 0x85, 0xf6, | 68 { { { 0xd8, 0xa6, 0x33, 0x2c, 0xe0, 0x03, 0x6f, 0xb1, 0x85, 0xf6, |
69 0x63, 0x4f, 0x7d, 0x6a, 0x06, 0x65, 0x26, 0x32, 0x28, 0x27 } }, | 69 0x63, 0x4f, 0x7d, 0x6a, 0x06, 0x65, 0x26, 0x32, 0x28, 0x27 } }, |
70 {"1.3.6.1.4.1.34697.2.3", ""}, | 70 {"1.3.6.1.4.1.34697.2.3", ""}, |
71 }, | 71 }, |
72 // AffirmTrust Premium ECC | 72 // AffirmTrust Premium ECC |
73 // https://premiumecc.affirmtrust.com:4433/ | 73 // https://premiumecc.affirmtrust.com:4433/ |
74 { { { 0xb8, 0x23, 0x6b, 0x00, 0x2f, 0x1d, 0x16, 0x86, 0x53, 0x01, | 74 { { { 0xb8, 0x23, 0x6b, 0x00, 0x2f, 0x1d, 0x16, 0x86, 0x53, 0x01, |
75 0x55, 0x6c, 0x11, 0xa4, 0x37, 0xca, 0xeb, 0xff, 0xc3, 0xbb } }, | 75 0x55, 0x6c, 0x11, 0xa4, 0x37, 0xca, 0xeb, 0xff, 0xc3, 0xbb } }, |
76 {"1.3.6.1.4.1.34697.2.4", ""}, | 76 {"1.3.6.1.4.1.34697.2.4", ""}, |
77 }, | 77 }, |
78 // CertPlus Class 2 Primary CA (KEYNECTIS) | 78 // CertPlus Class 2 Primary CA (KEYNECTIS) |
79 // https://www.keynectis.com/ | 79 // https://www.keynectis.com/ |
80 { { { 0x74, 0x20, 0x74, 0x41, 0x72, 0x9c, 0xdd, 0x92, 0xec, 0x79, | 80 { { { 0x74, 0x20, 0x74, 0x41, 0x72, 0x9c, 0xdd, 0x92, 0xec, 0x79, |
81 0x31, 0xd8, 0x23, 0x10, 0x8d, 0xc2, 0x81, 0x92, 0xe2, 0xbb } }, | 81 0x31, 0xd8, 0x23, 0x10, 0x8d, 0xc2, 0x81, 0x92, 0xe2, 0xbb } }, |
82 {"1.3.6.1.4.1.22234.2.5.2.3.1", ""}, | 82 {"1.3.6.1.4.1.22234.2.5.2.3.1", ""}, |
83 }, | 83 }, |
84 // Certum Trusted Network CA | 84 // Certum Trusted Network CA |
85 // https://juice.certum.pl/ | 85 // https://juice.certum.pl/ |
86 { { { 0x07, 0xe0, 0x32, 0xe0, 0x20, 0xb7, 0x2c, 0x3f, 0x19, 0x2f, | 86 { { { 0x07, 0xe0, 0x32, 0xe0, 0x20, 0xb7, 0x2c, 0x3f, 0x19, 0x2f, |
(...skipping 228 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
315 g_ev_root_ca_metadata = LAZY_INSTANCE_INITIALIZER; | 315 g_ev_root_ca_metadata = LAZY_INSTANCE_INITIALIZER; |
316 | 316 |
317 // static | 317 // static |
318 EVRootCAMetadata* EVRootCAMetadata::GetInstance() { | 318 EVRootCAMetadata* EVRootCAMetadata::GetInstance() { |
319 return g_ev_root_ca_metadata.Pointer(); | 319 return g_ev_root_ca_metadata.Pointer(); |
320 } | 320 } |
321 | 321 |
322 #if defined(USE_NSS) | 322 #if defined(USE_NSS) |
323 | 323 |
324 bool EVRootCAMetadata::GetPolicyOIDsForCA( | 324 bool EVRootCAMetadata::GetPolicyOIDsForCA( |
325 const SHA1Fingerprint& fingerprint, | 325 const SHA1HashValue& fingerprint, |
326 std::vector<PolicyOID>* policy_oids) const { | 326 std::vector<PolicyOID>* policy_oids) const { |
327 PolicyOIDMap::const_iterator iter = ev_policy_.find(fingerprint); | 327 PolicyOIDMap::const_iterator iter = ev_policy_.find(fingerprint); |
328 if (iter == ev_policy_.end()) | 328 if (iter == ev_policy_.end()) |
329 return false; | 329 return false; |
330 for (std::vector<PolicyOID>::const_iterator | 330 for (std::vector<PolicyOID>::const_iterator |
331 j = iter->second.begin(); j != iter->second.end(); ++j) { | 331 j = iter->second.begin(); j != iter->second.end(); ++j) { |
332 policy_oids->push_back(*j); | 332 policy_oids->push_back(*j); |
333 } | 333 } |
334 return true; | 334 return true; |
335 } | 335 } |
336 | 336 |
337 const EVRootCAMetadata::PolicyOID* EVRootCAMetadata::GetPolicyOIDs() const { | 337 const EVRootCAMetadata::PolicyOID* EVRootCAMetadata::GetPolicyOIDs() const { |
338 return &policy_oids_[0]; | 338 return &policy_oids_[0]; |
339 } | 339 } |
340 | 340 |
341 int EVRootCAMetadata::NumPolicyOIDs() const { | 341 int EVRootCAMetadata::NumPolicyOIDs() const { |
342 return policy_oids_.size(); | 342 return policy_oids_.size(); |
343 } | 343 } |
344 | 344 |
345 bool EVRootCAMetadata::AddEVCA(const SHA1Fingerprint& fingerprint, | 345 bool EVRootCAMetadata::AddEVCA(const SHA1HashValue& fingerprint, |
346 const char* policy) { | 346 const char* policy) { |
347 if (ev_policy_.find(fingerprint) != ev_policy_.end()) | 347 if (ev_policy_.find(fingerprint) != ev_policy_.end()) |
348 return false; | 348 return false; |
349 | 349 |
350 PolicyOID oid; | 350 PolicyOID oid; |
351 if (!RegisterOID(policy, &oid)) | 351 if (!RegisterOID(policy, &oid)) |
352 return false; | 352 return false; |
353 | 353 |
354 ev_policy_[fingerprint].push_back(oid); | 354 ev_policy_[fingerprint].push_back(oid); |
355 policy_oids_.push_back(oid); | 355 policy_oids_.push_back(oid); |
356 | 356 |
357 return true; | 357 return true; |
358 } | 358 } |
359 | 359 |
360 bool EVRootCAMetadata::RemoveEVCA(const SHA1Fingerprint& fingerprint) { | 360 bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { |
361 PolicyOIDMap::iterator it = ev_policy_.find(fingerprint); | 361 PolicyOIDMap::iterator it = ev_policy_.find(fingerprint); |
362 if (it == ev_policy_.end()) | 362 if (it == ev_policy_.end()) |
363 return false; | 363 return false; |
364 PolicyOID oid = it->second[0]; | 364 PolicyOID oid = it->second[0]; |
365 ev_policy_.erase(it); | 365 ev_policy_.erase(it); |
366 | 366 |
367 std::vector<PolicyOID>::iterator it2 = std::find( | 367 std::vector<PolicyOID>::iterator it2 = std::find( |
368 policy_oids_.begin(), policy_oids_.end(), oid); | 368 policy_oids_.begin(), policy_oids_.end(), oid); |
369 if (it2 == policy_oids_.end()) | 369 if (it2 == policy_oids_.end()) |
370 return false; | 370 return false; |
(...skipping 38 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
409 | 409 |
410 for (ExtraEVCAMap::const_iterator i = extra_cas_.begin(); | 410 for (ExtraEVCAMap::const_iterator i = extra_cas_.begin(); |
411 i != extra_cas_.end(); i++) { | 411 i != extra_cas_.end(); i++) { |
412 if (i->second == policy_oid) | 412 if (i->second == policy_oid) |
413 return true; | 413 return true; |
414 } | 414 } |
415 | 415 |
416 return false; | 416 return false; |
417 } | 417 } |
418 | 418 |
419 bool EVRootCAMetadata::HasEVPolicyOID(const SHA1Fingerprint& fingerprint, | 419 bool EVRootCAMetadata::HasEVPolicyOID(const SHA1HashValue& fingerprint, |
420 PolicyOID policy_oid) const { | 420 PolicyOID policy_oid) const { |
421 for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { | 421 for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { |
422 if (!fingerprint.Equals(ev_root_ca_metadata[i].fingerprint)) | 422 if (!fingerprint.Equals(ev_root_ca_metadata[i].fingerprint)) |
423 continue; | 423 continue; |
424 for (size_t j = 0; j < arraysize(ev_root_ca_metadata[i].policy_oids); j++) { | 424 for (size_t j = 0; j < arraysize(ev_root_ca_metadata[i].policy_oids); j++) { |
425 if (ev_root_ca_metadata[i].policy_oids[j][0] == '\0') | 425 if (ev_root_ca_metadata[i].policy_oids[j][0] == '\0') |
426 break; | 426 break; |
427 if (strcmp(policy_oid, ev_root_ca_metadata[i].policy_oids[j]) == 0) | 427 if (strcmp(policy_oid, ev_root_ca_metadata[i].policy_oids[j]) == 0) |
428 return true; | 428 return true; |
429 } | 429 } |
430 return false; | 430 return false; |
431 } | 431 } |
432 | 432 |
433 ExtraEVCAMap::const_iterator it = extra_cas_.find(fingerprint); | 433 ExtraEVCAMap::const_iterator it = extra_cas_.find(fingerprint); |
434 return it != extra_cas_.end() && it->second == policy_oid; | 434 return it != extra_cas_.end() && it->second == policy_oid; |
435 } | 435 } |
436 | 436 |
437 bool EVRootCAMetadata::AddEVCA(const SHA1Fingerprint& fingerprint, | 437 bool EVRootCAMetadata::AddEVCA(const SHA1HashValue& fingerprint, |
438 const char* policy) { | 438 const char* policy) { |
439 for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { | 439 for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { |
440 if (fingerprint.Equals(ev_root_ca_metadata[i].fingerprint)) | 440 if (fingerprint.Equals(ev_root_ca_metadata[i].fingerprint)) |
441 return false; | 441 return false; |
442 } | 442 } |
443 | 443 |
444 if (extra_cas_.find(fingerprint) != extra_cas_.end()) | 444 if (extra_cas_.find(fingerprint) != extra_cas_.end()) |
445 return false; | 445 return false; |
446 | 446 |
447 extra_cas_[fingerprint] = policy; | 447 extra_cas_[fingerprint] = policy; |
448 return true; | 448 return true; |
449 } | 449 } |
450 | 450 |
451 bool EVRootCAMetadata::RemoveEVCA(const SHA1Fingerprint& fingerprint) { | 451 bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { |
452 ExtraEVCAMap::iterator it = extra_cas_.find(fingerprint); | 452 ExtraEVCAMap::iterator it = extra_cas_.find(fingerprint); |
453 if (it == extra_cas_.end()) | 453 if (it == extra_cas_.end()) |
454 return false; | 454 return false; |
455 extra_cas_.erase(it); | 455 extra_cas_.erase(it); |
456 return true; | 456 return true; |
457 } | 457 } |
458 | 458 |
459 #else | 459 #else |
460 | 460 |
461 // These are just stub functions for platforms where we don't use this EV | 461 // These are just stub functions for platforms where we don't use this EV |
462 // metadata. | 462 // metadata. |
463 | 463 |
464 bool EVRootCAMetadata::AddEVCA(const SHA1Fingerprint& fingerprint, | 464 bool EVRootCAMetadata::AddEVCA(const SHA1HashValue& fingerprint, |
465 const char* policy) { | 465 const char* policy) { |
466 return true; | 466 return true; |
467 } | 467 } |
468 | 468 |
469 bool EVRootCAMetadata::RemoveEVCA(const SHA1Fingerprint& fingerprint) { | 469 bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { |
470 return true; | 470 return true; |
471 } | 471 } |
472 | 472 |
473 #endif | 473 #endif |
474 | 474 |
475 EVRootCAMetadata::EVRootCAMetadata() { | 475 EVRootCAMetadata::EVRootCAMetadata() { |
476 // Constructs the object from the raw metadata in ev_root_ca_metadata. | 476 // Constructs the object from the raw metadata in ev_root_ca_metadata. |
477 #if defined(USE_NSS) | 477 #if defined(USE_NSS) |
478 crypto::EnsureNSSInit(); | 478 crypto::EnsureNSSInit(); |
479 | 479 |
(...skipping 13 matching lines...) Expand all Loading... |
493 ev_policy_[metadata.fingerprint].push_back(policy); | 493 ev_policy_[metadata.fingerprint].push_back(policy); |
494 policy_oids_.push_back(policy); | 494 policy_oids_.push_back(policy); |
495 } | 495 } |
496 } | 496 } |
497 #endif | 497 #endif |
498 } | 498 } |
499 | 499 |
500 EVRootCAMetadata::~EVRootCAMetadata() { } | 500 EVRootCAMetadata::~EVRootCAMetadata() { } |
501 | 501 |
502 } // namespace net | 502 } // namespace net |
OLD | NEW |