OLD | NEW |
---|---|
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ | 5 #ifndef CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ |
6 #define CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ | 6 #define CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 #include <vector> | 9 #include <vector> |
10 | 10 |
11 #include "base/memory/ref_counted.h" | 11 #include "base/memory/ref_counted.h" |
12 #include "chromeos/chromeos_export.h" | 12 #include "chromeos/chromeos_export.h" |
13 #include "chromeos/network/certificate_pattern.h" | |
13 | 14 |
14 namespace base { | 15 namespace base { |
15 class DictionaryValue; | 16 class DictionaryValue; |
16 } | 17 } |
17 | 18 |
18 namespace net { | 19 namespace net { |
19 struct CertPrincipal; | 20 struct CertPrincipal; |
20 class X509Certificate; | 21 class X509Certificate; |
21 typedef std::vector<scoped_refptr<X509Certificate> > CertificateList; | 22 typedef std::vector<scoped_refptr<X509Certificate> > CertificateList; |
22 } | 23 } |
23 | 24 |
24 namespace chromeos { | 25 namespace chromeos { |
25 | 26 |
26 class CertificatePattern; | |
27 class IssuerSubjectPattern; | 27 class IssuerSubjectPattern; |
28 | 28 |
29 namespace client_cert { | 29 namespace client_cert { |
30 | 30 |
31 enum ConfigType { | 31 enum ConfigType { |
32 CONFIG_TYPE_NONE, | 32 CONFIG_TYPE_NONE, |
33 CONFIG_TYPE_OPENVPN, | 33 CONFIG_TYPE_OPENVPN, |
34 CONFIG_TYPE_IPSEC, | 34 CONFIG_TYPE_IPSEC, |
35 CONFIG_TYPE_EAP | 35 CONFIG_TYPE_EAP |
36 }; | 36 }; |
37 | 37 |
38 struct CHROMEOS_EXPORT ClientCertConfig { | |
39 ClientCertConfig(); | |
40 | |
41 // Independent of whether the client cert (pattern or reference) is | |
42 // configured, the location determines whether this network configuration | |
43 // supports client certs and what kind of configuration it requires. | |
44 ConfigType location; | |
45 | |
46 // One of the ClientCertTypes defined in ONC: kNone, kRef, or kPattern. | |
47 std::string client_cert_type; | |
stevenjb
2014/07/07 19:34:05
nit: WS (and maybe comment)
pneubeck (no reviews)
2014/07/09 07:51:26
Done.
| |
48 CertificatePattern pattern; | |
49 }; | |
50 | |
38 // Returns true only if any fields set in this pattern match exactly with | 51 // Returns true only if any fields set in this pattern match exactly with |
39 // similar fields in the principal. If organization_ or organizational_unit_ | 52 // similar fields in the principal. If organization_ or organizational_unit_ |
40 // are set, then at least one of the organizations or units in the principal | 53 // are set, then at least one of the organizations or units in the principal |
41 // must match. | 54 // must match. |
42 bool CertPrincipalMatches(const IssuerSubjectPattern& pattern, | 55 bool CertPrincipalMatches(const IssuerSubjectPattern& pattern, |
43 const net::CertPrincipal& principal); | 56 const net::CertPrincipal& principal); |
44 | 57 |
45 // Fetches the matching certificate that has the latest valid start date. | 58 // Fetches the matching certificate that has the latest valid start date. |
46 // Returns a NULL refptr if there is no such match. | 59 // Returns a NULL refptr if there is no such match. |
47 CHROMEOS_EXPORT scoped_refptr<net::X509Certificate> GetCertificateMatch( | 60 CHROMEOS_EXPORT scoped_refptr<net::X509Certificate> GetCertificateMatch( |
48 const CertificatePattern& pattern, | 61 const CertificatePattern& pattern, |
49 const net::CertificateList& all_certs); | 62 const net::CertificateList& all_certs); |
50 | 63 |
51 // If not empty, sets the TPM properties in |properties|. If |pkcs11_id| is not | 64 // If not empty, sets the TPM properties in |properties|. If |pkcs11_id| is not |
52 // NULL, also sets the ClientCertID. |cert_config_type| determines which | 65 // NULL, also sets the ClientCertID. |cert_config_type| determines which |
53 // dictionary entries to set. | 66 // dictionary entries to set. |
54 void SetShillProperties(const ConfigType cert_config_type, | 67 void SetShillProperties(const ConfigType cert_config_type, |
55 const std::string& tpm_slot, | 68 const std::string& tpm_slot, |
56 const std::string& tpm_pin, | 69 const std::string& tpm_pin, |
57 const std::string* pkcs11_id, | 70 const std::string* pkcs11_id, |
58 base::DictionaryValue* properties); | 71 base::DictionaryValue* properties); |
59 | 72 |
60 // Returns true if all required configuration properties are set and not empty. | 73 // Returns true if all required configuration properties are set and not empty. |
61 bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, | 74 bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, |
62 const base::DictionaryValue& service_properties); | 75 const base::DictionaryValue& service_properties); |
63 | 76 |
77 // Determines the type of the CertificatePattern configuration, i.e. is it a | |
78 // pattern within an EAP, IPsec or OpenVPN configuration. | |
79 CHROMEOS_EXPORT void OncToClientCertConfig( | |
80 const base::DictionaryValue& network_config, | |
81 ClientCertConfig* cert_config); | |
82 | |
64 } // namespace client_cert | 83 } // namespace client_cert |
65 | 84 |
66 } // namespace chromeos | 85 } // namespace chromeos |
67 | 86 |
68 #endif // CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ | 87 #endif // CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ |
OLD | NEW |