| OLD | NEW |
| 1 /* ***** BEGIN LICENSE BLOCK ***** | 1 /* ***** BEGIN LICENSE BLOCK ***** |
| 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
| 3 * | 3 * |
| 4 * The contents of this file are subject to the Mozilla Public License Version | 4 * The contents of this file are subject to the Mozilla Public License Version |
| 5 * 1.1 (the "License"); you may not use this file except in compliance with | 5 * 1.1 (the "License"); you may not use this file except in compliance with |
| 6 * the License. You may obtain a copy of the License at | 6 * the License. You may obtain a copy of the License at |
| 7 * http://www.mozilla.org/MPL/ | 7 * http://www.mozilla.org/MPL/ |
| 8 * | 8 * |
| 9 * Software distributed under the License is distributed on an "AS IS" basis, | 9 * Software distributed under the License is distributed on an "AS IS" basis, |
| 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License | 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License |
| (...skipping 108 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 119 SECOidTag eku_ms_encrypting_file_system = SEC_OID_UNKNOWN; | 119 SECOidTag eku_ms_encrypting_file_system = SEC_OID_UNKNOWN; |
| 120 SECOidTag eku_ms_file_recovery = SEC_OID_UNKNOWN; | 120 SECOidTag eku_ms_file_recovery = SEC_OID_UNKNOWN; |
| 121 SECOidTag eku_ms_windows_hardware_driver_verification = SEC_OID_UNKNOWN; | 121 SECOidTag eku_ms_windows_hardware_driver_verification = SEC_OID_UNKNOWN; |
| 122 SECOidTag eku_ms_qualified_subordination = SEC_OID_UNKNOWN; | 122 SECOidTag eku_ms_qualified_subordination = SEC_OID_UNKNOWN; |
| 123 SECOidTag eku_ms_key_recovery = SEC_OID_UNKNOWN; | 123 SECOidTag eku_ms_key_recovery = SEC_OID_UNKNOWN; |
| 124 SECOidTag eku_ms_document_signing = SEC_OID_UNKNOWN; | 124 SECOidTag eku_ms_document_signing = SEC_OID_UNKNOWN; |
| 125 SECOidTag eku_ms_lifetime_signing = SEC_OID_UNKNOWN; | 125 SECOidTag eku_ms_lifetime_signing = SEC_OID_UNKNOWN; |
| 126 SECOidTag eku_ms_smart_card_logon = SEC_OID_UNKNOWN; | 126 SECOidTag eku_ms_smart_card_logon = SEC_OID_UNKNOWN; |
| 127 SECOidTag eku_ms_key_recovery_agent = SEC_OID_UNKNOWN; | 127 SECOidTag eku_ms_key_recovery_agent = SEC_OID_UNKNOWN; |
| 128 SECOidTag eku_netscape_international_step_up = SEC_OID_UNKNOWN; | 128 SECOidTag eku_netscape_international_step_up = SEC_OID_UNKNOWN; |
| 129 SECOidTag cert_attribute_business_category = SEC_OID_UNKNOWN; | |
| 130 SECOidTag cert_attribute_ev_incorporation_country = SEC_OID_UNKNOWN; | |
| 131 | 129 |
| 132 class DynamicOidRegisterer { | 130 class DynamicOidRegisterer { |
| 133 public: | 131 public: |
| 134 DynamicOidRegisterer() { | 132 DynamicOidRegisterer() { |
| 135 ms_cert_ext_certtype = RegisterDynamicOid("1.3.6.1.4.1.311.20.2"); | 133 ms_cert_ext_certtype = RegisterDynamicOid("1.3.6.1.4.1.311.20.2"); |
| 136 ms_certsrv_ca_version = RegisterDynamicOid("1.3.6.1.4.1.311.21.1"); | 134 ms_certsrv_ca_version = RegisterDynamicOid("1.3.6.1.4.1.311.21.1"); |
| 137 ms_nt_principal_name = RegisterDynamicOid("1.3.6.1.4.1.311.20.2.3"); | 135 ms_nt_principal_name = RegisterDynamicOid("1.3.6.1.4.1.311.20.2.3"); |
| 138 ms_ntds_replication = RegisterDynamicOid("1.3.6.1.4.1.311.25.1"); | 136 ms_ntds_replication = RegisterDynamicOid("1.3.6.1.4.1.311.25.1"); |
| 139 | 137 |
| 140 eku_ms_individual_code_signing = RegisterDynamicOid("1.3.6.1.4.1.311.2.1.21"
); | 138 eku_ms_individual_code_signing = RegisterDynamicOid("1.3.6.1.4.1.311.2.1.21"
); |
| 141 eku_ms_commercial_code_signing = RegisterDynamicOid("1.3.6.1.4.1.311.2.1.22"
); | 139 eku_ms_commercial_code_signing = RegisterDynamicOid("1.3.6.1.4.1.311.2.1.22"
); |
| 142 eku_ms_trust_list_signing = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.1"); | 140 eku_ms_trust_list_signing = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.1"); |
| 143 eku_ms_time_stamping = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.2"); | 141 eku_ms_time_stamping = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.2"); |
| 144 eku_ms_server_gated_crypto = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.3"); | 142 eku_ms_server_gated_crypto = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.3"); |
| 145 eku_ms_encrypting_file_system = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.4")
; | 143 eku_ms_encrypting_file_system = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.4")
; |
| 146 eku_ms_file_recovery = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.4.1"); | 144 eku_ms_file_recovery = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.4.1"); |
| 147 eku_ms_windows_hardware_driver_verification = RegisterDynamicOid( | 145 eku_ms_windows_hardware_driver_verification = RegisterDynamicOid( |
| 148 "1.3.6.1.4.1.311.10.3.5"); | 146 "1.3.6.1.4.1.311.10.3.5"); |
| 149 eku_ms_qualified_subordination = RegisterDynamicOid( | 147 eku_ms_qualified_subordination = RegisterDynamicOid( |
| 150 "1.3.6.1.4.1.311.10.3.10"); | 148 "1.3.6.1.4.1.311.10.3.10"); |
| 151 eku_ms_key_recovery = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.11"); | 149 eku_ms_key_recovery = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.11"); |
| 152 eku_ms_document_signing = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.12"); | 150 eku_ms_document_signing = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.12"); |
| 153 eku_ms_lifetime_signing = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.13"); | 151 eku_ms_lifetime_signing = RegisterDynamicOid("1.3.6.1.4.1.311.10.3.13"); |
| 154 eku_ms_smart_card_logon = RegisterDynamicOid("1.3.6.1.4.1.311.20.2.2"); | 152 eku_ms_smart_card_logon = RegisterDynamicOid("1.3.6.1.4.1.311.20.2.2"); |
| 155 eku_ms_key_recovery_agent = RegisterDynamicOid("1.3.6.1.4.1.311.21.6"); | 153 eku_ms_key_recovery_agent = RegisterDynamicOid("1.3.6.1.4.1.311.21.6"); |
| 156 eku_netscape_international_step_up = RegisterDynamicOid( | 154 eku_netscape_international_step_up = RegisterDynamicOid( |
| 157 "2.16.840.1.113730.4.1"); | 155 "2.16.840.1.113730.4.1"); |
| 158 | |
| 159 // These two OIDs will be built-in as SEC_OID_BUSINESS_CATEGORY and | |
| 160 // SEC_OID_EV_INCORPORATION_COUNTRY starting in NSS 3.13. Until then, | |
| 161 // we need to add them dynamically. | |
| 162 cert_attribute_business_category = RegisterDynamicOid("2.5.4.15"); | |
| 163 cert_attribute_ev_incorporation_country = RegisterDynamicOid( | |
| 164 "1.3.6.1.4.1.311.60.2.1.3"); | |
| 165 } | 156 } |
| 166 }; | 157 }; |
| 167 | 158 |
| 168 static base::LazyInstance<DynamicOidRegisterer>::Leaky | 159 static base::LazyInstance<DynamicOidRegisterer>::Leaky |
| 169 g_dynamic_oid_registerer = LAZY_INSTANCE_INITIALIZER; | 160 g_dynamic_oid_registerer = LAZY_INSTANCE_INITIALIZER; |
| 170 | 161 |
| 171 } // namespace | 162 } // namespace |
| 172 | 163 |
| 173 namespace mozilla_security_manager { | 164 namespace mozilla_security_manager { |
| 174 | 165 |
| 175 std::string DumpOidString(SECItem* oid) { | 166 std::string DumpOidString(SECItem* oid) { |
| 176 char* pr_string = CERT_GetOidString(oid); | 167 char* pr_string = CERT_GetOidString(oid); |
| 177 if (pr_string) { | 168 if (pr_string) { |
| 178 std::string rv = pr_string; | 169 std::string rv = pr_string; |
| 179 PR_smprintf_free(pr_string); | 170 PR_smprintf_free(pr_string); |
| 180 return rv; | 171 return rv; |
| 181 } | 172 } |
| 182 | 173 |
| 183 return ProcessRawBytes(oid); | 174 return ProcessRawBytes(oid); |
| 184 } | 175 } |
| 185 | 176 |
| 186 std::string GetOIDText(SECItem* oid) { | 177 std::string GetOIDText(SECItem* oid) { |
| 187 g_dynamic_oid_registerer.Get(); | 178 g_dynamic_oid_registerer.Get(); |
| 188 | 179 |
| 189 int string_id; | 180 int string_id; |
| 190 SECOidTag oid_tag = SECOID_FindOIDTag(oid); | 181 SECOidTag oid_tag = SECOID_FindOIDTag(oid); |
| 191 switch (oid_tag) { | 182 switch (oid_tag) { |
| 183 // Distinguished Name fields: |
| 192 case SEC_OID_AVA_COMMON_NAME: | 184 case SEC_OID_AVA_COMMON_NAME: |
| 193 string_id = IDS_CERT_OID_AVA_COMMON_NAME; | 185 string_id = IDS_CERT_OID_AVA_COMMON_NAME; |
| 194 break; | 186 break; |
| 195 case SEC_OID_AVA_STATE_OR_PROVINCE: | 187 case SEC_OID_AVA_STATE_OR_PROVINCE: |
| 196 string_id = IDS_CERT_OID_AVA_STATE_OR_PROVINCE; | 188 string_id = IDS_CERT_OID_AVA_STATE_OR_PROVINCE; |
| 197 break; | 189 break; |
| 198 case SEC_OID_AVA_ORGANIZATION_NAME: | 190 case SEC_OID_AVA_ORGANIZATION_NAME: |
| 199 string_id = IDS_CERT_OID_AVA_ORGANIZATION_NAME; | 191 string_id = IDS_CERT_OID_AVA_ORGANIZATION_NAME; |
| 200 break; | 192 break; |
| 201 case SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME: | 193 case SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME: |
| (...skipping 16 matching lines...) Expand all Loading... |
| 218 break; | 210 break; |
| 219 case SEC_OID_RFC1274_MAIL: | 211 case SEC_OID_RFC1274_MAIL: |
| 220 string_id = IDS_CERT_OID_RFC1274_MAIL; | 212 string_id = IDS_CERT_OID_RFC1274_MAIL; |
| 221 break; | 213 break; |
| 222 case SEC_OID_RFC1274_UID: | 214 case SEC_OID_RFC1274_UID: |
| 223 string_id = IDS_CERT_OID_RFC1274_UID; | 215 string_id = IDS_CERT_OID_RFC1274_UID; |
| 224 break; | 216 break; |
| 225 case SEC_OID_PKCS9_EMAIL_ADDRESS: | 217 case SEC_OID_PKCS9_EMAIL_ADDRESS: |
| 226 string_id = IDS_CERT_OID_PKCS9_EMAIL_ADDRESS; | 218 string_id = IDS_CERT_OID_PKCS9_EMAIL_ADDRESS; |
| 227 break; | 219 break; |
| 220 |
| 221 // Extended Validation (EV) name fields: |
| 222 case SEC_OID_BUSINESS_CATEGORY: |
| 223 string_id = IDS_CERT_OID_BUSINESS_CATEGORY; |
| 224 break; |
| 225 case SEC_OID_EV_INCORPORATION_LOCALITY: |
| 226 string_id = IDS_CERT_OID_EV_INCORPORATION_LOCALITY; |
| 227 break; |
| 228 case SEC_OID_EV_INCORPORATION_STATE: |
| 229 string_id = IDS_CERT_OID_EV_INCORPORATION_STATE; |
| 230 break; |
| 231 case SEC_OID_EV_INCORPORATION_COUNTRY: |
| 232 string_id = IDS_CERT_OID_EV_INCORPORATION_COUNTRY; |
| 233 break; |
| 234 case SEC_OID_AVA_STREET_ADDRESS: |
| 235 string_id = IDS_CERT_OID_AVA_STREET_ADDRESS; |
| 236 break; |
| 237 case SEC_OID_AVA_POSTAL_CODE: |
| 238 string_id = IDS_CERT_OID_AVA_POSTAL_CODE; |
| 239 break; |
| 240 |
| 241 // Algorithm fields: |
| 228 case SEC_OID_PKCS1_RSA_ENCRYPTION: | 242 case SEC_OID_PKCS1_RSA_ENCRYPTION: |
| 229 string_id = IDS_CERT_OID_PKCS1_RSA_ENCRYPTION; | 243 string_id = IDS_CERT_OID_PKCS1_RSA_ENCRYPTION; |
| 230 break; | 244 break; |
| 231 case SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION: | 245 case SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION: |
| 232 string_id = IDS_CERT_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION; | 246 string_id = IDS_CERT_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION; |
| 233 break; | 247 break; |
| 234 case SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION: | 248 case SEC_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION: |
| 235 string_id = IDS_CERT_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION; | 249 string_id = IDS_CERT_OID_PKCS1_MD4_WITH_RSA_ENCRYPTION; |
| 236 break; | 250 break; |
| 237 case SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION: | 251 case SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION: |
| 238 string_id = IDS_CERT_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION; | 252 string_id = IDS_CERT_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION; |
| 239 break; | 253 break; |
| 240 case SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION: | 254 case SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION: |
| 241 string_id = IDS_CERT_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION; | 255 string_id = IDS_CERT_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION; |
| 242 break; | 256 break; |
| 243 case SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION: | 257 case SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION: |
| 244 string_id = IDS_CERT_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION; | 258 string_id = IDS_CERT_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION; |
| 245 break; | 259 break; |
| 246 case SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION: | 260 case SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION: |
| 247 string_id = IDS_CERT_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION; | 261 string_id = IDS_CERT_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION; |
| 248 break; | 262 break; |
| 249 case SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION: | 263 case SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION: |
| 250 string_id = IDS_CERT_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION; | 264 string_id = IDS_CERT_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION; |
| 251 break; | 265 break; |
| 266 case SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE: |
| 267 string_id = IDS_CERT_OID_ANSIX962_ECDSA_SHA1_SIGNATURE; |
| 268 break; |
| 269 case SEC_OID_ANSIX962_ECDSA_SHA256_SIGNATURE: |
| 270 string_id = IDS_CERT_OID_ANSIX962_ECDSA_SHA256_SIGNATURE; |
| 271 break; |
| 272 case SEC_OID_ANSIX962_ECDSA_SHA384_SIGNATURE: |
| 273 string_id = IDS_CERT_OID_ANSIX962_ECDSA_SHA384_SIGNATURE; |
| 274 break; |
| 275 case SEC_OID_ANSIX962_ECDSA_SHA512_SIGNATURE: |
| 276 string_id = IDS_CERT_OID_ANSIX962_ECDSA_SHA512_SIGNATURE; |
| 277 break; |
| 278 case SEC_OID_ANSIX962_EC_PUBLIC_KEY: |
| 279 string_id = IDS_CERT_OID_ANSIX962_EC_PUBLIC_KEY; |
| 280 break; |
| 281 case SEC_OID_SECG_EC_SECP256R1: |
| 282 string_id = IDS_CERT_OID_SECG_EC_SECP256R1; |
| 283 break; |
| 284 case SEC_OID_SECG_EC_SECP384R1: |
| 285 string_id = IDS_CERT_OID_SECG_EC_SECP384R1; |
| 286 break; |
| 287 case SEC_OID_SECG_EC_SECP521R1: |
| 288 string_id = IDS_CERT_OID_SECG_EC_SECP521R1; |
| 289 break; |
| 290 |
| 291 // Extension fields (including details of extensions): |
| 252 case SEC_OID_NS_CERT_EXT_CERT_TYPE: | 292 case SEC_OID_NS_CERT_EXT_CERT_TYPE: |
| 253 string_id = IDS_CERT_EXT_NS_CERT_TYPE; | 293 string_id = IDS_CERT_EXT_NS_CERT_TYPE; |
| 254 break; | 294 break; |
| 255 case SEC_OID_NS_CERT_EXT_BASE_URL: | 295 case SEC_OID_NS_CERT_EXT_BASE_URL: |
| 256 string_id = IDS_CERT_EXT_NS_CERT_BASE_URL; | 296 string_id = IDS_CERT_EXT_NS_CERT_BASE_URL; |
| 257 break; | 297 break; |
| 258 case SEC_OID_NS_CERT_EXT_REVOCATION_URL: | 298 case SEC_OID_NS_CERT_EXT_REVOCATION_URL: |
| 259 string_id = IDS_CERT_EXT_NS_CERT_REVOCATION_URL; | 299 string_id = IDS_CERT_EXT_NS_CERT_REVOCATION_URL; |
| 260 break; | 300 break; |
| 261 case SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL: | 301 case SEC_OID_NS_CERT_EXT_CA_REVOCATION_URL: |
| (...skipping 52 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 314 break; | 354 break; |
| 315 case SEC_OID_X509_AUTH_KEY_ID: | 355 case SEC_OID_X509_AUTH_KEY_ID: |
| 316 string_id = IDS_CERT_X509_AUTH_KEYID; | 356 string_id = IDS_CERT_X509_AUTH_KEYID; |
| 317 break; | 357 break; |
| 318 case SEC_OID_X509_EXT_KEY_USAGE: | 358 case SEC_OID_X509_EXT_KEY_USAGE: |
| 319 string_id = IDS_CERT_X509_EXT_KEY_USAGE; | 359 string_id = IDS_CERT_X509_EXT_KEY_USAGE; |
| 320 break; | 360 break; |
| 321 case SEC_OID_X509_AUTH_INFO_ACCESS: | 361 case SEC_OID_X509_AUTH_INFO_ACCESS: |
| 322 string_id = IDS_CERT_X509_AUTH_INFO_ACCESS; | 362 string_id = IDS_CERT_X509_AUTH_INFO_ACCESS; |
| 323 break; | 363 break; |
| 364 case SEC_OID_PKIX_CPS_POINTER_QUALIFIER: |
| 365 string_id = IDS_CERT_PKIX_CPS_POINTER_QUALIFIER; |
| 366 break; |
| 367 case SEC_OID_PKIX_USER_NOTICE_QUALIFIER: |
| 368 string_id = IDS_CERT_PKIX_USER_NOTICE_QUALIFIER; |
| 369 break; |
| 370 |
| 371 // Extended Key Usages: |
| 324 case SEC_OID_EXT_KEY_USAGE_SERVER_AUTH: | 372 case SEC_OID_EXT_KEY_USAGE_SERVER_AUTH: |
| 325 string_id = IDS_CERT_EKU_TLS_WEB_SERVER_AUTHENTICATION; | 373 string_id = IDS_CERT_EKU_TLS_WEB_SERVER_AUTHENTICATION; |
| 326 break; | 374 break; |
| 327 case SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH: | 375 case SEC_OID_EXT_KEY_USAGE_CLIENT_AUTH: |
| 328 string_id = IDS_CERT_EKU_TLS_WEB_CLIENT_AUTHENTICATION; | 376 string_id = IDS_CERT_EKU_TLS_WEB_CLIENT_AUTHENTICATION; |
| 329 break; | 377 break; |
| 330 case SEC_OID_EXT_KEY_USAGE_CODE_SIGN: | 378 case SEC_OID_EXT_KEY_USAGE_CODE_SIGN: |
| 331 string_id = IDS_CERT_EKU_CODE_SIGNING; | 379 string_id = IDS_CERT_EKU_CODE_SIGNING; |
| 332 break; | 380 break; |
| 333 case SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT: | 381 case SEC_OID_EXT_KEY_USAGE_EMAIL_PROTECT: |
| 334 string_id = IDS_CERT_EKU_EMAIL_PROTECTION; | 382 string_id = IDS_CERT_EKU_EMAIL_PROTECTION; |
| 335 break; | 383 break; |
| 336 case SEC_OID_EXT_KEY_USAGE_TIME_STAMP: | 384 case SEC_OID_EXT_KEY_USAGE_TIME_STAMP: |
| 337 string_id = IDS_CERT_EKU_TIME_STAMPING; | 385 string_id = IDS_CERT_EKU_TIME_STAMPING; |
| 338 break; | 386 break; |
| 339 case SEC_OID_OCSP_RESPONDER: | 387 case SEC_OID_OCSP_RESPONDER: |
| 340 string_id = IDS_CERT_EKU_OCSP_SIGNING; | 388 string_id = IDS_CERT_EKU_OCSP_SIGNING; |
| 341 break; | 389 break; |
| 342 case SEC_OID_PKIX_CPS_POINTER_QUALIFIER: | 390 |
| 343 string_id = IDS_CERT_PKIX_CPS_POINTER_QUALIFIER; | 391 // Explicitly handle UNKNOWN to avoid the conditional below. |
| 344 break; | |
| 345 case SEC_OID_PKIX_USER_NOTICE_QUALIFIER: | |
| 346 string_id = IDS_CERT_PKIX_USER_NOTICE_QUALIFIER; | |
| 347 break; | |
| 348 case SEC_OID_UNKNOWN: | 392 case SEC_OID_UNKNOWN: |
| 349 string_id = -1; | 393 string_id = -1; |
| 350 break; | 394 break; |
| 351 | 395 |
| 352 // There are a billionty other OIDs we could add here. I tried to get the | 396 // OIDs that are not directly registered with NSS, and thus cannot be |
| 353 // important ones... | 397 // used as part of a switch tag. While there is a potentially boundless |
| 398 // set here, only list ones that either other platforms list or which |
| 399 // might otherwise be encountered in the Web PKI or mainstream Enterprise |
| 400 // deployments. |
| 354 default: | 401 default: |
| 355 if (oid_tag == ms_cert_ext_certtype) | 402 if (oid_tag == ms_cert_ext_certtype) |
| 356 string_id = IDS_CERT_EXT_MS_CERT_TYPE; | 403 string_id = IDS_CERT_EXT_MS_CERT_TYPE; |
| 357 else if (oid_tag == ms_certsrv_ca_version) | 404 else if (oid_tag == ms_certsrv_ca_version) |
| 358 string_id = IDS_CERT_EXT_MS_CA_VERSION; | 405 string_id = IDS_CERT_EXT_MS_CA_VERSION; |
| 359 else if (oid_tag == ms_nt_principal_name) | 406 else if (oid_tag == ms_nt_principal_name) |
| 360 string_id = IDS_CERT_EXT_MS_NT_PRINCIPAL_NAME; | 407 string_id = IDS_CERT_EXT_MS_NT_PRINCIPAL_NAME; |
| 361 else if (oid_tag == ms_ntds_replication) | 408 else if (oid_tag == ms_ntds_replication) |
| 362 string_id = IDS_CERT_EXT_MS_NTDS_REPLICATION; | 409 string_id = IDS_CERT_EXT_MS_NTDS_REPLICATION; |
| 363 else if (oid_tag == eku_ms_individual_code_signing) | 410 else if (oid_tag == eku_ms_individual_code_signing) |
| (...skipping 19 matching lines...) Expand all Loading... |
| 383 else if (oid_tag == eku_ms_document_signing) | 430 else if (oid_tag == eku_ms_document_signing) |
| 384 string_id = IDS_CERT_EKU_MS_DOCUMENT_SIGNING; | 431 string_id = IDS_CERT_EKU_MS_DOCUMENT_SIGNING; |
| 385 else if (oid_tag == eku_ms_lifetime_signing) | 432 else if (oid_tag == eku_ms_lifetime_signing) |
| 386 string_id = IDS_CERT_EKU_MS_LIFETIME_SIGNING; | 433 string_id = IDS_CERT_EKU_MS_LIFETIME_SIGNING; |
| 387 else if (oid_tag == eku_ms_smart_card_logon) | 434 else if (oid_tag == eku_ms_smart_card_logon) |
| 388 string_id = IDS_CERT_EKU_MS_SMART_CARD_LOGON; | 435 string_id = IDS_CERT_EKU_MS_SMART_CARD_LOGON; |
| 389 else if (oid_tag == eku_ms_key_recovery_agent) | 436 else if (oid_tag == eku_ms_key_recovery_agent) |
| 390 string_id = IDS_CERT_EKU_MS_KEY_RECOVERY_AGENT; | 437 string_id = IDS_CERT_EKU_MS_KEY_RECOVERY_AGENT; |
| 391 else if (oid_tag == eku_netscape_international_step_up) | 438 else if (oid_tag == eku_netscape_international_step_up) |
| 392 string_id = IDS_CERT_EKU_NETSCAPE_INTERNATIONAL_STEP_UP; | 439 string_id = IDS_CERT_EKU_NETSCAPE_INTERNATIONAL_STEP_UP; |
| 393 else if (oid_tag == cert_attribute_business_category) | |
| 394 string_id = IDS_CERT_OID_BUSINESS_CATEGORY; | |
| 395 else if (oid_tag == cert_attribute_ev_incorporation_country) | |
| 396 string_id = IDS_CERT_OID_EV_INCORPORATION_COUNTRY; | |
| 397 else | 440 else |
| 398 string_id = -1; | 441 string_id = -1; |
| 399 break; | 442 break; |
| 400 } | 443 } |
| 401 if (string_id >= 0) | 444 if (string_id >= 0) |
| 402 return l10n_util::GetStringUTF8(string_id); | 445 return l10n_util::GetStringUTF8(string_id); |
| 403 | 446 |
| 404 return DumpOidString(oid); | 447 return DumpOidString(oid); |
| 405 } | 448 } |
| 406 | 449 |
| (...skipping 666 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1073 return net::USER_CERT; | 1116 return net::USER_CERT; |
| 1074 if ((all_flags & CERTDB_VALID_CA) || CERT_IsCACert(cert, NULL)) | 1117 if ((all_flags & CERTDB_VALID_CA) || CERT_IsCACert(cert, NULL)) |
| 1075 return net::CA_CERT; | 1118 return net::CA_CERT; |
| 1076 // TODO(mattm): http://crbug.com/128633. | 1119 // TODO(mattm): http://crbug.com/128633. |
| 1077 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) | 1120 if (trust.sslFlags & CERTDB_TERMINAL_RECORD) |
| 1078 return net::SERVER_CERT; | 1121 return net::SERVER_CERT; |
| 1079 return net::OTHER_CERT; | 1122 return net::OTHER_CERT; |
| 1080 } | 1123 } |
| 1081 | 1124 |
| 1082 } // namespace mozilla_security_manager | 1125 } // namespace mozilla_security_manager |
| OLD | NEW |