Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(628)

Unified Diff: net/tools/domain_security_preload_generator/cert_util.cc

Issue 2632073002: Rename domain_security_preload_generator. (Closed)
Patch Set: rebase & comment rsleevi Created 3 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/tools/domain_security_preload_generator/cert_util.cc
diff --git a/net/tools/domain_security_preload_generator/cert_util.cc b/net/tools/domain_security_preload_generator/cert_util.cc
deleted file mode 100644
index 6ab00350960ed68d6ca4de8f1d3be3f84f8378b8..0000000000000000000000000000000000000000
--- a/net/tools/domain_security_preload_generator/cert_util.cc
+++ /dev/null
@@ -1,155 +0,0 @@
-// Copyright 2016 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "net/tools/domain_security_preload_generator/cert_util.h"
-
-#include <string>
-
-#include "base/base64.h"
-#include "base/files/file_util.h"
-#include "base/strings/string_util.h"
-#include "base/strings/stringprintf.h"
-#include "net/tools/domain_security_preload_generator/spki_hash.h"
-#include "third_party/boringssl/src/include/openssl/crypto.h"
-
-using net::transport_security_state::SPKIHash;
-
-namespace {
-
-static const char kPEMBeginBlock[] = "-----BEGIN %s-----";
-static const char kPEMEndBlock[] = "-----END %s-----";
-
-// Tries to extract the BASE64 encoded DER structure from |pem_input| by looking
-// for the block type in |expected_block_type|. Only attempts the locate the
-// first matching block. Other blocks are ignored. Returns true on success and
-// copies the der structure to |*der_output|. Returns false on error.
-bool ParsePEM(base::StringPiece pem_input,
- base::StringPiece expected_block_type,
- std::string* der_output) {
- const std::string& block_start =
- base::StringPrintf(kPEMBeginBlock, expected_block_type.data());
- const std::string& block_end =
- base::StringPrintf(kPEMEndBlock, expected_block_type.data());
-
- size_t block_start_pos = pem_input.find(block_start);
- if (block_start_pos == std::string::npos)
- return false;
- size_t base64_start_pos = block_start_pos + block_start.size();
-
- size_t block_end_pos = pem_input.find(block_end, base64_start_pos);
- if (block_end_pos == std::string::npos)
- return false;
-
- base::StringPiece base64_encoded =
- pem_input.substr(base64_start_pos, block_end_pos - base64_start_pos);
-
- if (!base::Base64Decode(
- base::CollapseWhitespaceASCII(base64_encoded.as_string(), true),
- der_output)) {
- return false;
- }
-
- return true;
-}
-
-// Attempts to extract the first entry of type |nid| from |*name|. Returns true
-// if the field exists and was extracted. Returns false when the field was not
-// found or the data could not be extracted.
-bool ExtractFieldFromX509Name(X509_NAME* name, int nid, std::string* field) {
- int index = X509_NAME_get_index_by_NID(name, nid, -1);
- if (index == -1) {
- return false;
- }
-
- X509_NAME_ENTRY* entry = X509_NAME_get_entry(name, index);
- if (!entry) {
- return false;
- }
-
- ASN1_STRING* data = X509_NAME_ENTRY_get_data(entry);
- if (!data) {
- return false;
- }
-
- uint8_t* buffer = nullptr;
- size_t length = ASN1_STRING_to_UTF8(&buffer, data);
- field->assign(reinterpret_cast<const char*>(buffer), length);
- OPENSSL_free(buffer);
- return true;
-}
-
-} // namespace
-
-bssl::UniquePtr<X509> GetX509CertificateFromPEM(base::StringPiece pem_data) {
- std::string der;
- if (!ParsePEM(pem_data, "CERTIFICATE", &der)) {
- return bssl::UniquePtr<X509>();
- }
-
- const uint8_t* der_data = reinterpret_cast<const uint8_t*>(der.c_str());
- return bssl::UniquePtr<X509>(
- d2i_X509(NULL, &der_data, base::checked_cast<long>(der.size())));
-}
-
-bool ExtractSubjectNameFromCertificate(X509* certificate, std::string* name) {
- DCHECK(certificate);
- X509_NAME* subject = X509_get_subject_name(certificate);
- if (!subject) {
- return false;
- }
-
- std::string result;
- // Try extracting the common name first.
- if (!ExtractFieldFromX509Name(subject, NID_commonName, &result) ||
- result.empty()) {
- std::string organization;
- if (!ExtractFieldFromX509Name(subject, NID_organizationName,
- &organization)) {
- return false;
- }
-
- std::string organizational_unit;
- if (!ExtractFieldFromX509Name(subject, NID_organizationalUnitName,
- &organizational_unit)) {
- return false;
- }
- result = organization + " " + organizational_unit;
- }
-
- name->assign(result);
- return true;
-}
-
-bool CalculateSPKIHashFromCertificate(X509* certificate, SPKIHash* out_hash) {
- DCHECK(certificate);
- bssl::UniquePtr<EVP_PKEY> key(X509_get_pubkey(certificate));
- if (!key) {
- return false;
- }
-
- uint8_t* spki_der;
- size_t spki_der_len;
- bssl::ScopedCBB cbb;
- if (!CBB_init(cbb.get(), 0) ||
- !EVP_marshal_public_key(cbb.get(), key.get()) ||
- !CBB_finish(cbb.get(), &spki_der, &spki_der_len)) {
- return false;
- }
-
- out_hash->CalculateFromBytes(spki_der, spki_der_len);
- OPENSSL_free(spki_der);
- return true;
-}
-
-bool CalculateSPKIHashFromKey(base::StringPiece pem_key, SPKIHash* out_hash) {
- std::string der;
- bool result = ParsePEM(pem_key, "PUBLIC KEY", &der);
- if (!result) {
- return false;
- }
-
- out_hash->CalculateFromBytes(reinterpret_cast<const uint8_t*>(der.data()),
- der.size());
- return true;
-}

Powered by Google App Engine
This is Rietveld 408576698