Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/base/x509_util.h" | 5 #include "net/base/x509_util.h" |
| 6 #include "net/base/x509_util_nss.h" | 6 #include "net/base/x509_util_nss.h" |
| 7 | 7 |
| 8 #include <cert.h> | 8 #include <cert.h> |
| 9 #include <cryptohi.h> | 9 #include <cryptohi.h> |
| 10 #include <nss.h> | 10 #include <nss.h> |
| (...skipping 255 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 266 for (int i = 0; i < num_certs; ++i) { | 266 for (int i = 0; i < num_certs; ++i) { |
| 267 X509Certificate::OSCertHandle handle = | 267 X509Certificate::OSCertHandle handle = |
| 268 X509Certificate::CreateOSCertHandleFromBytes( | 268 X509Certificate::CreateOSCertHandleFromBytes( |
| 269 reinterpret_cast<char*>(certs[i]->data), certs[i]->len); | 269 reinterpret_cast<char*>(certs[i]->data), certs[i]->len); |
| 270 if (handle) | 270 if (handle) |
| 271 results->push_back(handle); | 271 results->push_back(handle); |
| 272 } | 272 } |
| 273 | 273 |
| 274 return SECSuccess; | 274 return SECSuccess; |
| 275 } | 275 } |
| 276 | |
| 277 typedef scoped_ptr_malloc< | |
| 278 CERTName, | |
| 279 crypto::NSSDestroyer<CERTName, CERT_DestroyName> > ScopedCERTName; | |
| 280 | |
| 281 // Create a new CERTName object from its encoded representation. | |
| 282 // |arena| is the allocation pool to use. | |
| 283 // |data| points to a DER-encoded X.509 DistinguishedName. | |
| 284 // Return a new CERTName pointer on success, or NULL. | |
| 285 CERTName* CreateCertNameFromEncoded(PLArenaPool* arena, | |
| 286 const base::StringPiece& data) { | |
| 287 if (!arena) | |
| 288 return NULL; | |
| 289 | |
| 290 ScopedCERTName name(PORT_ArenaZNew(arena, CERTName)); | |
| 291 if (!name.get()) | |
| 292 return NULL; | |
| 293 | |
| 294 SECItem item; | |
| 295 item.len = static_cast<unsigned int>(data.length()); | |
| 296 item.data = reinterpret_cast<unsigned char*>( | |
| 297 const_cast<char*>(data.data())); | |
| 298 | |
| 299 SECStatus rv = SEC_ASN1DecodeItem( | |
| 300 arena, name.get(), SEC_ASN1_GET(CERT_NameTemplate), &item); | |
| 301 if (rv != SECSuccess) | |
| 302 return NULL; | |
| 303 | |
| 304 return name.release(); | |
| 305 } | |
| 306 | |
| 276 #endif // defined(USE_NSS) || defined(OS_IOS) | 307 #endif // defined(USE_NSS) || defined(OS_IOS) |
| 277 | 308 |
| 278 } // namespace | 309 } // namespace |
| 279 | 310 |
| 280 namespace x509_util { | 311 namespace x509_util { |
| 281 | 312 |
| 282 CERTCertificate* CreateSelfSignedCert( | 313 CERTCertificate* CreateSelfSignedCert( |
| 283 SECKEYPublicKey* public_key, | 314 SECKEYPublicKey* public_key, |
| 284 SECKEYPrivateKey* private_key, | 315 SECKEYPrivateKey* private_key, |
| 285 const std::string& subject, | 316 const std::string& subject, |
| (...skipping 234 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 520 break; | 551 break; |
| 521 case ecKey: | 552 case ecKey: |
| 522 *type = X509Certificate::kPublicKeyTypeECDSA; | 553 *type = X509Certificate::kPublicKeyTypeECDSA; |
| 523 break; | 554 break; |
| 524 default: | 555 default: |
| 525 *type = X509Certificate::kPublicKeyTypeUnknown; | 556 *type = X509Certificate::kPublicKeyTypeUnknown; |
| 526 *size_bits = 0; | 557 *size_bits = 0; |
| 527 break; | 558 break; |
| 528 } | 559 } |
| 529 } | 560 } |
| 561 | |
| 562 bool GetIssuersFromEncodedList( | |
| 563 const std::vector<std::string>& encoded_issuers, | |
| 564 PLArenaPool* arena, | |
| 565 std::vector<CERTName*>* out) { | |
| 566 std::vector<CERTName*> result; | |
| 567 for (size_t n = 0; n < encoded_issuers.size(); ++n) { | |
| 568 CERTName* name = CreateCertNameFromEncoded(arena, encoded_issuers[n]); | |
| 569 if (name != NULL) | |
| 570 out->push_back(name); | |
| 571 } | |
| 572 | |
| 573 if (result.size() == encoded_issuers.size()) { | |
| 574 out->swap(result); | |
| 575 return true; | |
| 576 } | |
| 577 | |
| 578 for (size_t n = 0; n < result.size(); ++n) | |
| 579 CERT_DestroyName(result[n]); | |
| 580 return false; | |
| 581 } | |
| 582 | |
| 583 | |
| 584 bool IsCertificateIssuedBy(const std::vector<CERTCertificate*>& cert_chain, | |
| 585 const std::vector<CERTName*>& valid_issuers) { | |
| 586 for (size_t n = 0; n < cert_chain.size(); ++n) { | |
| 587 CERTName* cert_issuer = &cert_chain[n]->issuer; | |
| 588 for (size_t i = 0; i < valid_issuers.size(); ++i) { | |
| 589 if (CERT_CompareName(valid_issuers[i], cert_issuer)) | |
|
Ryan Sleevi
2013/01/07 18:11:14
CERT_CompareName returns a SECComparison.
if (CER
| |
| 590 return true; | |
| 591 } | |
| 592 } | |
| 593 return false; | |
| 594 } | |
| 595 | |
| 530 #endif // defined(USE_NSS) || defined(OS_IOS) | 596 #endif // defined(USE_NSS) || defined(OS_IOS) |
| 531 | 597 |
| 532 } // namespace x509_util | 598 } // namespace x509_util |
| 533 | 599 |
| 534 } // namespace net | 600 } // namespace net |
| OLD | NEW |