OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/base/x509_certificate.h" | 5 #include "net/base/x509_certificate.h" |
6 | 6 |
7 #include <cert.h> | 7 #include <cert.h> |
8 #include <cryptohi.h> | 8 #include <cryptohi.h> |
9 #include <keyhi.h> | 9 #include <keyhi.h> |
10 #include <nss.h> | 10 #include <nss.h> |
11 #include <pk11pub.h> | 11 #include <pk11pub.h> |
12 #include <prtime.h> | 12 #include <prtime.h> |
| 13 #include <seccomon.h> |
13 #include <secder.h> | 14 #include <secder.h> |
14 #include <sechash.h> | 15 #include <sechash.h> |
15 | 16 |
16 #include "base/logging.h" | 17 #include "base/logging.h" |
17 #include "base/memory/scoped_ptr.h" | 18 #include "base/memory/scoped_ptr.h" |
18 #include "base/pickle.h" | 19 #include "base/pickle.h" |
19 #include "base/time.h" | 20 #include "base/time.h" |
20 #include "crypto/nss_util.h" | 21 #include "crypto/nss_util.h" |
21 #include "crypto/rsa_private_key.h" | 22 #include "crypto/rsa_private_key.h" |
| 23 #include "crypto/scoped_nss_types.h" |
22 #include "net/base/x509_util_nss.h" | 24 #include "net/base/x509_util_nss.h" |
23 | 25 |
24 namespace net { | 26 namespace net { |
25 | 27 |
26 void X509Certificate::Initialize() { | 28 void X509Certificate::Initialize() { |
27 x509_util::ParsePrincipal(&cert_handle_->subject, &subject_); | 29 x509_util::ParsePrincipal(&cert_handle_->subject, &subject_); |
28 x509_util::ParsePrincipal(&cert_handle_->issuer, &issuer_); | 30 x509_util::ParsePrincipal(&cert_handle_->issuer, &issuer_); |
29 | 31 |
30 x509_util::ParseDate(&cert_handle_->validity.notBefore, &valid_start_); | 32 x509_util::ParseDate(&cert_handle_->validity.notBefore, &valid_start_); |
31 x509_util::ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); | 33 x509_util::ParseDate(&cert_handle_->validity.notAfter, &valid_expiry_); |
(...skipping 115 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
147 void X509Certificate::GetSubjectAltName( | 149 void X509Certificate::GetSubjectAltName( |
148 std::vector<std::string>* dns_names, | 150 std::vector<std::string>* dns_names, |
149 std::vector<std::string>* ip_addrs) const { | 151 std::vector<std::string>* ip_addrs) const { |
150 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs); | 152 x509_util::GetSubjectAltName(cert_handle_, dns_names, ip_addrs); |
151 } | 153 } |
152 | 154 |
153 bool X509Certificate::VerifyNameMatch(const std::string& hostname) const { | 155 bool X509Certificate::VerifyNameMatch(const std::string& hostname) const { |
154 return CERT_VerifyCertName(cert_handle_, hostname.c_str()) == SECSuccess; | 156 return CERT_VerifyCertName(cert_handle_, hostname.c_str()) == SECSuccess; |
155 } | 157 } |
156 | 158 |
| 159 bool X509Certificate::IsIssuedByEncoded( |
| 160 const std::vector<std::string>& valid_issuers) { |
| 161 // Get certificate chain as scoped list of CERTCertificate objects. |
| 162 std::vector<CERTCertificate*> cert_chain; |
| 163 cert_chain.push_back(cert_handle_); |
| 164 for (size_t n = 0; n < intermediate_ca_certs_.size(); ++n) { |
| 165 cert_chain.push_back(intermediate_ca_certs_[n]); |
| 166 } |
| 167 // Convert encoded issuers to scoped CERTName* list. |
| 168 std::vector<CERTName*> issuers; |
| 169 crypto::ScopedPLArenaPool arena(PORT_NewArena(DER_DEFAULT_CHUNKSIZE)); |
| 170 if (!x509_util::GetIssuersFromEncodedList(valid_issuers, |
| 171 arena.get(), |
| 172 &issuers)) { |
| 173 return false; |
| 174 } |
| 175 return x509_util::IsCertificateIssuedBy(cert_chain, issuers); |
| 176 } |
| 177 |
157 // static | 178 // static |
158 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, | 179 bool X509Certificate::GetDEREncoded(X509Certificate::OSCertHandle cert_handle, |
159 std::string* encoded) { | 180 std::string* encoded) { |
160 if (!cert_handle->derCert.len) | 181 if (!cert_handle->derCert.len) |
161 return false; | 182 return false; |
162 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data), | 183 encoded->assign(reinterpret_cast<char*>(cert_handle->derCert.data), |
163 cert_handle->derCert.len); | 184 cert_handle->derCert.len); |
164 return true; | 185 return true; |
165 } | 186 } |
166 | 187 |
(...skipping 109 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
276 } | 297 } |
277 | 298 |
278 // static | 299 // static |
279 void X509Certificate::GetPublicKeyInfo(OSCertHandle cert_handle, | 300 void X509Certificate::GetPublicKeyInfo(OSCertHandle cert_handle, |
280 size_t* size_bits, | 301 size_t* size_bits, |
281 PublicKeyType* type) { | 302 PublicKeyType* type) { |
282 x509_util::GetPublicKeyInfo(cert_handle, size_bits, type); | 303 x509_util::GetPublicKeyInfo(cert_handle, size_bits, type); |
283 } | 304 } |
284 | 305 |
285 } // namespace net | 306 } // namespace net |
OLD | NEW |