Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(271)

Unified Diff: net/base/x509_cert_types.h

Issue 1128008: Mac: Make client-cert picker only show certs the server will accept. (Closed)
Patch Set: Added a test case of parsing T61STRING. Created 10 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | net/base/x509_cert_types.cc » ('j') | net/base/x509_cert_types.cc » ('J')
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: net/base/x509_cert_types.h
diff --git a/net/base/x509_cert_types.h b/net/base/x509_cert_types.h
new file mode 100644
index 0000000000000000000000000000000000000000..7bc66495668ccfd060733c14257337795e7246b2
--- /dev/null
+++ b/net/base/x509_cert_types.h
@@ -0,0 +1,134 @@
+// Copyright (c) 2006-2010 The Chromium Authors. All rights reserved.
wtc 2010/03/24 23:52:05 Nit: the copyright notice should just say 2010. I
+// Use of this source code is governed by a BSD-style license that can be
+// found in the LICENSE file.
+
+#ifndef NET_BASE_X509_TYPES_H_
+#define NET_BASE_X509_TYPES_H_
+
+#include <string.h>
+
+#include <iostream>
+#include <map>
+#include <set>
+#include <string>
+#include <vector>
+
+#include "base/ref_counted.h"
+#include "base/singleton.h"
+#include "base/time.h"
+#include "testing/gtest/include/gtest/gtest_prod.h"
+
+#if defined(OS_WIN)
+#include <windows.h>
+#include <wincrypt.h>
+#elif defined(OS_MACOSX)
+#include <Security/x509defs.h>
+#elif defined(USE_NSS)
+// Forward declaration; real one in <cert.h>
+struct CERTCertificateStr;
+#endif
+
+namespace net {
+
+ class X509Certificate;
wtc 2010/03/24 23:52:05 Nit: don't indent the contents of a namespace. ht
+
+ // SHA-1 fingerprint (160 bits) of a certificate.
+ struct SHA1Fingerprint {
+ bool Equals(const SHA1Fingerprint& other) const {
+ return memcmp(data, other.data, sizeof(data)) == 0;
+ }
+
+ unsigned char data[20];
+ };
+
+ class SHA1FingerprintLessThan
+ : public std::binary_function<SHA1Fingerprint, SHA1Fingerprint, bool> {
+ public:
+ bool operator() (const SHA1Fingerprint& lhs, const SHA1Fingerprint& rhs) const;
+ };
+
+ // Principal represent an X.509 principal.
wtc 2010/03/24 23:52:05 Nit: let's change this comment to: // CertPrinc
+ struct CertPrincipal {
+ CertPrincipal() { }
+ explicit CertPrincipal(const std::string& name) : common_name(name) { }
+
+ // Parses a BER-format X.509 DistinguishedName.
wtc 2010/03/24 23:52:05 Nit: remove "X.509" because DistinguishedName come
+ bool ParseDistinguishedName(const void* x509_name_data, size_t length);
+
+#if defined(OS_MACOSX)
+ // Parses a CSSM_X509_NAME struct.
+ void Parse(const CSSM_X509_NAME* name);
+#endif
+
+ // Returns true if all non-empty components of |against| match the
+ // corresponding components of the receiver, where "match" is defined
wtc 2010/03/24 23:52:05 Nit: receiver => object? I still think we should
+ // in RFC 5280 sec. 7.1.
+ bool Matches(const CertPrincipal& against) const;
+
+ // The different attributes for a principal. They may be "".
+ // Note that some of them can have several values.
+
+ std::string common_name;
+ std::string locality_name;
+ std::string state_or_province_name;
+ std::string country_name;
+
+ std::vector<std::string> street_addresses;
+ std::vector<std::string> organization_names;
+ std::vector<std::string> organization_unit_names;
+ std::vector<std::string> domain_components;
+ };
+
+ // Writes a human-readable description of a Principal, for debugging.
wtc 2010/03/24 23:52:05 Nit: Principal => CertPrincipal
+ std::ostream& operator<<(std::ostream& s, const CertPrincipal& p);
+
+ // This class is useful for maintaining policies about which certificates are
+ // permitted or forbidden for a particular purpose.
+ class CertPolicy {
+ public:
+ // The judgments this policy can reach.
+ enum Judgment {
+ // We don't have policy information for this certificate.
+ UNKNOWN,
+
+ // This certificate is allowed.
+ ALLOWED,
+
+ // This certificate is denied.
+ DENIED,
+ };
+
+ // Returns the judgment this policy makes about this certificate.
+ Judgment Check(X509Certificate* cert) const;
+
+ // Causes the policy to allow this certificate.
+ void Allow(X509Certificate* cert);
+
+ // Causes the policy to deny this certificate.
+ void Deny(X509Certificate* cert);
+
+ // Returns true if this policy has allowed at least one certificate.
+ bool HasAllowedCert() const;
+
+ // Returns true if this policy has denied at least one certificate.
+ bool HasDeniedCert() const;
+
+ private:
+ // The set of fingerprints of allowed certificates.
+ std::set<SHA1Fingerprint, SHA1FingerprintLessThan> allowed_;
+
+ // The set of fingerprints of denied certificates.
+ std::set<SHA1Fingerprint, SHA1FingerprintLessThan> denied_;
+ };
+
+#if defined(OS_MACOSX)
+ // Compares two OIDs by value.
+ inline bool CSSMOIDEqual(const CSSM_OID* oid1, const CSSM_OID* oid2) {
+ return oid1->Length == oid2->Length &&
+ (memcmp(oid1->Data, oid2->Data, oid1->Length) == 0);
+ }
+#endif
+
+} // namespace net
+
+#endif // NET_BASE_X509_TYPES_H_
« no previous file with comments | « no previous file | net/base/x509_cert_types.cc » ('j') | net/base/x509_cert_types.cc » ('J')

Powered by Google App Engine
This is Rietveld 408576698