| OLD | NEW |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/cert/internal/parse_certificate.h" | 5 #include "net/cert/internal/parse_certificate.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "net/der/input.h" | 9 #include "net/der/input.h" |
| 10 #include "net/der/parse_values.h" | 10 #include "net/der/parse_values.h" |
| (...skipping 132 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 143 // guarantees they are all zero. | 143 // guarantees they are all zero. |
| 144 for (size_t i = 0; i < bits.bytes().Length(); ++i) { | 144 for (size_t i = 0; i < bits.bytes().Length(); ++i) { |
| 145 if (bits.bytes().UnsafeData()[i] != 0) | 145 if (bits.bytes().UnsafeData()[i] != 0) |
| 146 return false; | 146 return false; |
| 147 } | 147 } |
| 148 return true; | 148 return true; |
| 149 } | 149 } |
| 150 | 150 |
| 151 } // namespace | 151 } // namespace |
| 152 | 152 |
| 153 ParsedCertificate::ParsedCertificate() {} | |
| 154 | |
| 155 ParsedCertificate::~ParsedCertificate() {} | |
| 156 | |
| 157 ParsedTbsCertificate::ParsedTbsCertificate() {} | 153 ParsedTbsCertificate::ParsedTbsCertificate() {} |
| 158 | 154 |
| 159 ParsedTbsCertificate::~ParsedTbsCertificate() {} | 155 ParsedTbsCertificate::~ParsedTbsCertificate() {} |
| 160 | 156 |
| 161 bool VerifySerialNumber(const der::Input& value) { | 157 bool VerifySerialNumber(const der::Input& value) { |
| 162 bool unused_negative; | 158 bool unused_negative; |
| 163 if (!der::IsValidInteger(value, &unused_negative)) | 159 if (!der::IsValidInteger(value, &unused_negative)) |
| 164 return false; | 160 return false; |
| 165 | 161 |
| 166 // Check if the serial number is too long per RFC 5280. | 162 // Check if the serial number is too long per RFC 5280. |
| 167 if (value.Length() > 20) | 163 if (value.Length() > 20) |
| 168 return false; | 164 return false; |
| 169 | 165 |
| 170 return true; | 166 return true; |
| 171 } | 167 } |
| 172 | 168 |
| 173 bool ParseCertificate(const der::Input& certificate_tlv, | 169 bool ParseCertificate(const der::Input& certificate_tlv, |
| 174 ParsedCertificate* out) { | 170 der::Input* out_tbs_certificate_tlv, |
| 171 der::Input* out_signature_algorithm_tlv, |
| 172 der::BitString* out_signature_value) { |
| 175 der::Parser parser(certificate_tlv); | 173 der::Parser parser(certificate_tlv); |
| 176 | 174 |
| 177 // Certificate ::= SEQUENCE { | 175 // Certificate ::= SEQUENCE { |
| 178 der::Parser certificate_parser; | 176 der::Parser certificate_parser; |
| 179 if (!parser.ReadSequence(&certificate_parser)) | 177 if (!parser.ReadSequence(&certificate_parser)) |
| 180 return false; | 178 return false; |
| 181 | 179 |
| 182 // tbsCertificate TBSCertificate, | 180 // tbsCertificate TBSCertificate, |
| 183 if (!ReadSequenceTLV(&certificate_parser, &out->tbs_certificate_tlv)) | 181 if (!ReadSequenceTLV(&certificate_parser, out_tbs_certificate_tlv)) |
| 184 return false; | 182 return false; |
| 185 | 183 |
| 186 // signatureAlgorithm AlgorithmIdentifier, | 184 // signatureAlgorithm AlgorithmIdentifier, |
| 187 if (!ReadSequenceTLV(&certificate_parser, &out->signature_algorithm_tlv)) | 185 if (!ReadSequenceTLV(&certificate_parser, out_signature_algorithm_tlv)) |
| 188 return false; | 186 return false; |
| 189 | 187 |
| 190 // signatureValue BIT STRING } | 188 // signatureValue BIT STRING } |
| 191 if (!certificate_parser.ReadBitString(&out->signature_value)) | 189 if (!certificate_parser.ReadBitString(out_signature_value)) |
| 192 return false; | 190 return false; |
| 193 | 191 |
| 194 // There isn't an extension point at the end of Certificate. | 192 // There isn't an extension point at the end of Certificate. |
| 195 if (certificate_parser.HasMore()) | 193 if (certificate_parser.HasMore()) |
| 196 return false; | 194 return false; |
| 197 | 195 |
| 198 // By definition the input was a single Certificate, so there shouldn't be | 196 // By definition the input was a single Certificate, so there shouldn't be |
| 199 // unconsumed data. | 197 // unconsumed data. |
| 200 if (parser.HasMore()) | 198 if (parser.HasMore()) |
| 201 return false; | 199 return false; |
| (...skipping 371 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 573 // | 571 // |
| 574 // When the keyUsage extension appears in a certificate, at least | 572 // When the keyUsage extension appears in a certificate, at least |
| 575 // one of the bits MUST be set to 1. | 573 // one of the bits MUST be set to 1. |
| 576 if (BitStringIsAllZeros(*key_usage)) | 574 if (BitStringIsAllZeros(*key_usage)) |
| 577 return false; | 575 return false; |
| 578 | 576 |
| 579 return true; | 577 return true; |
| 580 } | 578 } |
| 581 | 579 |
| 582 } // namespace net | 580 } // namespace net |
| OLD | NEW |