Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/base/ev_root_ca_metadata.h" | 5 #include "net/base/ev_root_ca_metadata.h" |
| 6 | 6 |
| 7 #if defined(USE_NSS) || defined(OS_IOS) | 7 #if defined(USE_NSS) || defined(OS_IOS) |
| 8 #include <cert.h> | 8 #include <cert.h> |
| 9 #include <pkcs11n.h> | 9 #include <pkcs11n.h> |
| 10 #include <secerr.h> | 10 #include <secerr.h> |
| (...skipping 22 matching lines...) Expand all Loading... | |
| 33 | 33 |
| 34 // The SHA-1 fingerprint of the root CA certificate, used as a unique | 34 // The SHA-1 fingerprint of the root CA certificate, used as a unique |
| 35 // identifier for a root CA certificate. | 35 // identifier for a root CA certificate. |
| 36 SHA1HashValue fingerprint; | 36 SHA1HashValue fingerprint; |
| 37 | 37 |
| 38 // The EV policy OIDs of the root CA. | 38 // The EV policy OIDs of the root CA. |
| 39 const char policy_oids[kMaxOIDsPerCA][kMaxOIDLength]; | 39 const char policy_oids[kMaxOIDsPerCA][kMaxOIDLength]; |
| 40 }; | 40 }; |
| 41 | 41 |
| 42 static const EVMetadata ev_root_ca_metadata[] = { | 42 static const EVMetadata ev_root_ca_metadata[] = { |
| 43 // AC Camerfirma S.A. Chambers of Commerce Root - 2008 | |
| 44 // https://www.camerfirma.com | |
|
wtc
2013/03/22 22:10:33
While inspecting the cert chain of this test site,
| |
| 45 { { { 0x78, 0x6a, 0x74, 0xac, 0x76, 0xab, 0x14, 0x7f, 0x9c, 0x6a, | |
| 46 0x30, 0x50, 0xba, 0x9e, 0xa8, 0x7e, 0xfe, 0x9a, 0xce, 0x3c } }, | |
| 47 { // AC Camerfirma uses the last two arcs to track how the private key is | |
| 48 // managed - the effective verification policy is the same. | |
| 49 "1.3.6.1.4.1.17326.10.14.2.1.2", | |
| 50 "1.3.6.1.4.1.17326.10.14.2.2.2", }, | |
| 51 }, | |
| 52 // AC Camerfirma S.A. Global Chambersign Root - 2008 | |
| 53 // https://server2.camerfirma.com:8082 | |
| 54 { { { 0x4a, 0xbd, 0xee, 0xec, 0x95, 0x0d, 0x35, 0x9c, 0x89, 0xae, | |
| 55 0xc7, 0x52, 0xa1, 0x2c, 0x5b, 0x29, 0xf6, 0xd6, 0xaa, 0x0c } }, | |
| 56 { // AC Camerfirma uses the last two arcs to track how the private key is | |
| 57 // managed - the effective verification policy is the same. | |
| 58 "1.3.6.1.4.1.17326.10.8.12.1.2", | |
| 59 "1.3.6.1.4.1.17326.10.8.12.2.2", }, | |
| 60 }, | |
| 43 // AddTrust External CA Root | 61 // AddTrust External CA Root |
| 44 // https://addtrustexternalcaroot-ev.comodoca.com | 62 // https://addtrustexternalcaroot-ev.comodoca.com |
| 45 { { { 0x02, 0xfa, 0xf3, 0xe2, 0x91, 0x43, 0x54, 0x68, 0x60, 0x78, | 63 { { { 0x02, 0xfa, 0xf3, 0xe2, 0x91, 0x43, 0x54, 0x68, 0x60, 0x78, |
| 46 0x57, 0x69, 0x4d, 0xf5, 0xe4, 0x5b, 0x68, 0x85, 0x18, 0x68 } }, | 64 0x57, 0x69, 0x4d, 0xf5, 0xe4, 0x5b, 0x68, 0x85, 0x18, 0x68 } }, |
| 47 { | 65 { |
| 48 "1.3.6.1.4.1.6449.1.2.1.5.1", | 66 "1.3.6.1.4.1.6449.1.2.1.5.1", |
| 49 // This is the Network Solutions EV OID. However, this root | 67 // This is the Network Solutions EV OID. However, this root |
| 50 // cross-certifies NetSol and so we need it here too. | 68 // cross-certifies NetSol and so we need it here too. |
| 51 "1.3.6.1.4.1.782.1.2.1.8.1", | 69 "1.3.6.1.4.1.782.1.2.1.8.1", |
| 52 }, | 70 }, |
| (...skipping 473 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
| 526 ev_policy_[metadata.fingerprint].push_back(policy); | 544 ev_policy_[metadata.fingerprint].push_back(policy); |
| 527 policy_oids_.insert(policy); | 545 policy_oids_.insert(policy); |
| 528 } | 546 } |
| 529 } | 547 } |
| 530 #endif | 548 #endif |
| 531 } | 549 } |
| 532 | 550 |
| 533 EVRootCAMetadata::~EVRootCAMetadata() { } | 551 EVRootCAMetadata::~EVRootCAMetadata() { } |
| 534 | 552 |
| 535 } // namespace net | 553 } // namespace net |
| OLD | NEW |