OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/cert/ev_root_ca_metadata.h" | 5 #include "net/cert/ev_root_ca_metadata.h" |
6 | 6 |
7 #if defined(USE_NSS) || defined(OS_IOS) | 7 #if defined(USE_NSS_CERTS) || defined(OS_IOS) |
8 #include <cert.h> | 8 #include <cert.h> |
9 #include <pkcs11n.h> | 9 #include <pkcs11n.h> |
10 #include <secerr.h> | 10 #include <secerr.h> |
11 #include <secoid.h> | 11 #include <secoid.h> |
12 #elif defined(OS_WIN) | 12 #elif defined(OS_WIN) |
13 #include <stdlib.h> | 13 #include <stdlib.h> |
14 #endif | 14 #endif |
15 | 15 |
16 #include "base/lazy_instance.h" | 16 #include "base/lazy_instance.h" |
17 #include "base/logging.h" | 17 #include "base/logging.h" |
18 #if defined(USE_NSS) || defined(OS_IOS) | 18 #if defined(USE_NSS_CERTS) || defined(OS_IOS) |
19 #include "crypto/nss_util.h" | 19 #include "crypto/nss_util.h" |
20 #endif | 20 #endif |
21 | 21 |
22 namespace net { | 22 namespace net { |
23 | 23 |
24 #if defined(USE_NSS) || defined(OS_IOS) || defined(OS_WIN) | 24 #if defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_WIN) |
25 // Raw metadata. | 25 // Raw metadata. |
26 struct EVMetadata { | 26 struct EVMetadata { |
27 // kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At | 27 // kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At |
28 // least one CA has different EV policies for businuss vs government | 28 // least one CA has different EV policies for businuss vs government |
29 // entities and, in the case of cross-signing, we might need to list another | 29 // entities and, in the case of cross-signing, we might need to list another |
30 // CA's policy OID under the cross-signing root. | 30 // CA's policy OID under the cross-signing root. |
31 static const size_t kMaxOIDsPerCA = 2; | 31 static const size_t kMaxOIDsPerCA = 2; |
32 // This is the maximum length of an OID string (including the trailing NUL). | 32 // This is the maximum length of an OID string (including the trailing NUL). |
33 static const size_t kMaxOIDLength = 32; | 33 static const size_t kMaxOIDLength = 32; |
34 | 34 |
(...skipping 456 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
491 0x90, 0xa7, 0x40, 0x1a, 0x3c, 0xf4, 0x7d, 0x4f, 0xe8, 0xee } }, | 491 0x90, 0xa7, 0x40, 0x1a, 0x3c, 0xf4, 0x7d, 0x4f, 0xe8, 0xee } }, |
492 {"2.16.840.1.114171.500.9", ""}, | 492 {"2.16.840.1.114171.500.9", ""}, |
493 }, | 493 }, |
494 // XRamp Global Certification Authority | 494 // XRamp Global Certification Authority |
495 { { { 0xb8, 0x01, 0x86, 0xd1, 0xeb, 0x9c, 0x86, 0xa5, 0x41, 0x04, | 495 { { { 0xb8, 0x01, 0x86, 0xd1, 0xeb, 0x9c, 0x86, 0xa5, 0x41, 0x04, |
496 0xcf, 0x30, 0x54, 0xf3, 0x4c, 0x52, 0xb7, 0xe5, 0x58, 0xc6 } }, | 496 0xcf, 0x30, 0x54, 0xf3, 0x4c, 0x52, 0xb7, 0xe5, 0x58, 0xc6 } }, |
497 {"2.16.840.1.114404.1.1.2.4.1", ""}, | 497 {"2.16.840.1.114404.1.1.2.4.1", ""}, |
498 } | 498 } |
499 }; | 499 }; |
500 | 500 |
501 #endif // defined(USE_NSS) || defined(OS_IOS) || defined(OS_WIN) | 501 #endif // defined(USE_NSS_CERTS) || defined(OS_IOS) || defined(OS_WIN) |
502 | 502 |
503 static base::LazyInstance<EVRootCAMetadata>::Leaky | 503 static base::LazyInstance<EVRootCAMetadata>::Leaky |
504 g_ev_root_ca_metadata = LAZY_INSTANCE_INITIALIZER; | 504 g_ev_root_ca_metadata = LAZY_INSTANCE_INITIALIZER; |
505 | 505 |
506 // static | 506 // static |
507 EVRootCAMetadata* EVRootCAMetadata::GetInstance() { | 507 EVRootCAMetadata* EVRootCAMetadata::GetInstance() { |
508 return g_ev_root_ca_metadata.Pointer(); | 508 return g_ev_root_ca_metadata.Pointer(); |
509 } | 509 } |
510 | 510 |
511 #if defined(USE_NSS) || defined(OS_IOS) | 511 #if defined(USE_NSS_CERTS) || defined(OS_IOS) |
512 bool EVRootCAMetadata::IsEVPolicyOID(PolicyOID policy_oid) const { | 512 bool EVRootCAMetadata::IsEVPolicyOID(PolicyOID policy_oid) const { |
513 return policy_oids_.find(policy_oid) != policy_oids_.end(); | 513 return policy_oids_.find(policy_oid) != policy_oids_.end(); |
514 } | 514 } |
515 | 515 |
516 bool EVRootCAMetadata::HasEVPolicyOID( | 516 bool EVRootCAMetadata::HasEVPolicyOID( |
517 const SHA1HashValue& fingerprint, | 517 const SHA1HashValue& fingerprint, |
518 PolicyOID policy_oid) const { | 518 PolicyOID policy_oid) const { |
519 PolicyOIDMap::const_iterator iter = ev_policy_.find(fingerprint); | 519 PolicyOIDMap::const_iterator iter = ev_policy_.find(fingerprint); |
520 if (iter == ev_policy_.end()) | 520 if (iter == ev_policy_.end()) |
521 return false; | 521 return false; |
(...skipping 125 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
647 } | 647 } |
648 | 648 |
649 bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { | 649 bool EVRootCAMetadata::RemoveEVCA(const SHA1HashValue& fingerprint) { |
650 return true; | 650 return true; |
651 } | 651 } |
652 | 652 |
653 #endif | 653 #endif |
654 | 654 |
655 EVRootCAMetadata::EVRootCAMetadata() { | 655 EVRootCAMetadata::EVRootCAMetadata() { |
656 // Constructs the object from the raw metadata in ev_root_ca_metadata. | 656 // Constructs the object from the raw metadata in ev_root_ca_metadata. |
657 #if defined(USE_NSS) || defined(OS_IOS) | 657 #if defined(USE_NSS_CERTS) || defined(OS_IOS) |
658 crypto::EnsureNSSInit(); | 658 crypto::EnsureNSSInit(); |
659 | 659 |
660 for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { | 660 for (size_t i = 0; i < arraysize(ev_root_ca_metadata); i++) { |
661 const EVMetadata& metadata = ev_root_ca_metadata[i]; | 661 const EVMetadata& metadata = ev_root_ca_metadata[i]; |
662 for (size_t j = 0; j < arraysize(metadata.policy_oids); j++) { | 662 for (size_t j = 0; j < arraysize(metadata.policy_oids); j++) { |
663 if (metadata.policy_oids[j][0] == '\0') | 663 if (metadata.policy_oids[j][0] == '\0') |
664 break; | 664 break; |
665 const char* policy_oid = metadata.policy_oids[j]; | 665 const char* policy_oid = metadata.policy_oids[j]; |
666 | 666 |
667 PolicyOID policy; | 667 PolicyOID policy; |
668 if (!RegisterOID(policy_oid, &policy)) { | 668 if (!RegisterOID(policy_oid, &policy)) { |
669 LOG(ERROR) << "Failed to register OID: " << policy_oid; | 669 LOG(ERROR) << "Failed to register OID: " << policy_oid; |
670 continue; | 670 continue; |
671 } | 671 } |
672 | 672 |
673 ev_policy_[metadata.fingerprint].push_back(policy); | 673 ev_policy_[metadata.fingerprint].push_back(policy); |
674 policy_oids_.insert(policy); | 674 policy_oids_.insert(policy); |
675 } | 675 } |
676 } | 676 } |
677 #endif | 677 #endif |
678 } | 678 } |
679 | 679 |
680 EVRootCAMetadata::~EVRootCAMetadata() { } | 680 EVRootCAMetadata::~EVRootCAMetadata() { } |
681 | 681 |
682 } // namespace net | 682 } // namespace net |
OLD | NEW |