| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/cert/x509_certificate.h" | 5 #include "net/cert/x509_certificate.h" |
| 6 | 6 |
| 7 #include "base/logging.h" | 7 #include "base/logging.h" |
| 8 #include "base/memory/free_deleter.h" | 8 #include "base/memory/free_deleter.h" |
| 9 #include "base/memory/scoped_ptr.h" | 9 #include "base/memory/scoped_ptr.h" |
| 10 #include "base/numerics/safe_conversions.h" | 10 #include "base/numerics/safe_conversions.h" |
| 11 #include "base/pickle.h" | 11 #include "base/pickle.h" |
| 12 #include "base/sha1.h" | 12 #include "base/sha1.h" |
| 13 #include "base/strings/string_util.h" | 13 #include "base/strings/string_util.h" |
| 14 #include "base/strings/utf_string_conversions.h" | 14 #include "base/strings/utf_string_conversions.h" |
| 15 #include "crypto/capi_util.h" | 15 #include "crypto/capi_util.h" |
| 16 #include "crypto/scoped_capi_types.h" | 16 #include "crypto/scoped_capi_types.h" |
| 17 #include "crypto/sha2.h" | 17 #include "crypto/sha2.h" |
| 18 #include "net/base/net_errors.h" | 18 #include "net/base/net_errors.h" |
| 19 | 19 |
| 20 // Implement CalculateChainFingerprint() with our native crypto library. | |
| 21 #if defined(USE_OPENSSL) | |
| 22 #include <openssl/sha.h> | 20 #include <openssl/sha.h> |
| 23 #else | |
| 24 #include <blapi.h> | |
| 25 #endif | |
| 26 | 21 |
| 27 using base::Time; | 22 using base::Time; |
| 28 | 23 |
| 29 namespace net { | 24 namespace net { |
| 30 | 25 |
| 31 namespace { | 26 namespace { |
| 32 | 27 |
| 33 typedef crypto::ScopedCAPIHandle< | 28 typedef crypto::ScopedCAPIHandle< |
| 34 HCERTSTORE, | 29 HCERTSTORE, |
| 35 crypto::CAPIDestroyerWithFlags<HCERTSTORE, | 30 crypto::CAPIDestroyerWithFlags<HCERTSTORE, |
| (...skipping 296 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 332 cert->cbCertEncoded); | 327 cert->cbCertEncoded); |
| 333 crypto::SHA256HashString(der_cert, sha256.data, sha256_size); | 328 crypto::SHA256HashString(der_cert, sha256.data, sha256_size); |
| 334 return sha256; | 329 return sha256; |
| 335 } | 330 } |
| 336 | 331 |
| 337 SHA1HashValue X509Certificate::CalculateCAFingerprint( | 332 SHA1HashValue X509Certificate::CalculateCAFingerprint( |
| 338 const OSCertHandles& intermediates) { | 333 const OSCertHandles& intermediates) { |
| 339 SHA1HashValue sha1; | 334 SHA1HashValue sha1; |
| 340 memset(sha1.data, 0, sizeof(sha1.data)); | 335 memset(sha1.data, 0, sizeof(sha1.data)); |
| 341 | 336 |
| 342 #if defined(USE_OPENSSL) | |
| 343 SHA_CTX ctx; | 337 SHA_CTX ctx; |
| 344 if (!SHA1_Init(&ctx)) | 338 if (!SHA1_Init(&ctx)) |
| 345 return sha1; | 339 return sha1; |
| 346 for (size_t i = 0; i < intermediates.size(); ++i) { | 340 for (size_t i = 0; i < intermediates.size(); ++i) { |
| 347 PCCERT_CONTEXT ca_cert = intermediates[i]; | 341 PCCERT_CONTEXT ca_cert = intermediates[i]; |
| 348 if (!SHA1_Update(&ctx, ca_cert->pbCertEncoded, ca_cert->cbCertEncoded)) | 342 if (!SHA1_Update(&ctx, ca_cert->pbCertEncoded, ca_cert->cbCertEncoded)) |
| 349 return sha1; | 343 return sha1; |
| 350 } | 344 } |
| 351 SHA1_Final(sha1.data, &ctx); | 345 SHA1_Final(sha1.data, &ctx); |
| 352 #else // !USE_OPENSSL | |
| 353 SHA1Context* sha1_ctx = SHA1_NewContext(); | |
| 354 if (!sha1_ctx) | |
| 355 return sha1; | |
| 356 SHA1_Begin(sha1_ctx); | |
| 357 for (size_t i = 0; i < intermediates.size(); ++i) { | |
| 358 PCCERT_CONTEXT ca_cert = intermediates[i]; | |
| 359 SHA1_Update(sha1_ctx, ca_cert->pbCertEncoded, ca_cert->cbCertEncoded); | |
| 360 } | |
| 361 unsigned int result_len; | |
| 362 SHA1_End(sha1_ctx, sha1.data, &result_len, SHA1_LENGTH); | |
| 363 SHA1_DestroyContext(sha1_ctx, PR_TRUE); | |
| 364 #endif // USE_OPENSSL | |
| 365 | 346 |
| 366 return sha1; | 347 return sha1; |
| 367 } | 348 } |
| 368 | 349 |
| 369 // static | 350 // static |
| 370 X509Certificate::OSCertHandle X509Certificate::ReadOSCertHandleFromPickle( | 351 X509Certificate::OSCertHandle X509Certificate::ReadOSCertHandleFromPickle( |
| 371 base::PickleIterator* pickle_iter) { | 352 base::PickleIterator* pickle_iter) { |
| 372 const char* data; | 353 const char* data; |
| 373 int length; | 354 int length; |
| 374 if (!pickle_iter->ReadData(&data, &length)) | 355 if (!pickle_iter->ReadData(&data, &length)) |
| (...skipping 112 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 487 X509_ASN_ENCODING, | 468 X509_ASN_ENCODING, |
| 488 CRYPT_VERIFY_CERT_SIGN_SUBJECT_CERT, | 469 CRYPT_VERIFY_CERT_SIGN_SUBJECT_CERT, |
| 489 reinterpret_cast<void*>(const_cast<PCERT_CONTEXT>(cert_handle)), | 470 reinterpret_cast<void*>(const_cast<PCERT_CONTEXT>(cert_handle)), |
| 490 CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT, | 471 CRYPT_VERIFY_CERT_SIGN_ISSUER_CERT, |
| 491 reinterpret_cast<void*>(const_cast<PCERT_CONTEXT>(cert_handle)), | 472 reinterpret_cast<void*>(const_cast<PCERT_CONTEXT>(cert_handle)), |
| 492 0, | 473 0, |
| 493 NULL); | 474 NULL); |
| 494 } | 475 } |
| 495 | 476 |
| 496 } // namespace net | 477 } // namespace net |
| OLD | NEW |