Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ | 5 #ifndef CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ |
| 6 #define CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ | 6 #define CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ |
| 7 | 7 |
| 8 #include <string> | 8 #include <string> |
| 9 #include <vector> | 9 #include <vector> |
| 10 | 10 |
| 11 #include "base/memory/ref_counted.h" | 11 #include "base/memory/ref_counted.h" |
| 12 #include "chromeos/chromeos_export.h" | 12 #include "chromeos/chromeos_export.h" |
| 13 #include "chromeos/network/certificate_pattern.h" | |
| 13 | 14 |
| 14 namespace base { | 15 namespace base { |
| 15 class DictionaryValue; | 16 class DictionaryValue; |
| 16 } | 17 } |
| 17 | 18 |
| 18 namespace net { | 19 namespace net { |
| 19 struct CertPrincipal; | 20 struct CertPrincipal; |
| 20 class X509Certificate; | 21 class X509Certificate; |
| 21 typedef std::vector<scoped_refptr<X509Certificate> > CertificateList; | 22 typedef std::vector<scoped_refptr<X509Certificate> > CertificateList; |
| 22 } | 23 } |
| 23 | 24 |
| 24 namespace chromeos { | 25 namespace chromeos { |
| 25 | 26 |
| 26 class CertificatePattern; | |
| 27 class IssuerSubjectPattern; | 27 class IssuerSubjectPattern; |
| 28 | 28 |
| 29 namespace client_cert { | 29 namespace client_cert { |
| 30 | 30 |
| 31 enum ConfigType { | 31 enum ConfigType { |
| 32 CONFIG_TYPE_NONE, | 32 CONFIG_TYPE_NONE, |
| 33 CONFIG_TYPE_OPENVPN, | 33 CONFIG_TYPE_OPENVPN, |
| 34 CONFIG_TYPE_IPSEC, | 34 CONFIG_TYPE_IPSEC, |
| 35 CONFIG_TYPE_EAP | 35 CONFIG_TYPE_EAP |
| 36 }; | 36 }; |
| 37 | 37 |
| 38 struct CHROMEOS_EXPORT ClientCertConfig { | |
| 39 ClientCertConfig(); | |
| 40 | |
| 41 // Independent of whether the client cert (pattern or reference) is | |
| 42 // configured, the location determines whether this network configuration | |
| 43 // supports client certs and what kind of configuration it requires. | |
| 44 ConfigType location; | |
| 45 | |
| 46 // One of the ClientCertTypes defined in ONC: kNone, kRef, or kPattern. | |
| 47 std::string client_cert_type; | |
|
stevenjb
2014/07/07 19:34:05
nit: WS (and maybe comment)
pneubeck (no reviews)
2014/07/09 07:51:26
Done.
| |
| 48 CertificatePattern pattern; | |
| 49 }; | |
| 50 | |
| 38 // Returns true only if any fields set in this pattern match exactly with | 51 // Returns true only if any fields set in this pattern match exactly with |
| 39 // similar fields in the principal. If organization_ or organizational_unit_ | 52 // similar fields in the principal. If organization_ or organizational_unit_ |
| 40 // are set, then at least one of the organizations or units in the principal | 53 // are set, then at least one of the organizations or units in the principal |
| 41 // must match. | 54 // must match. |
| 42 bool CertPrincipalMatches(const IssuerSubjectPattern& pattern, | 55 bool CertPrincipalMatches(const IssuerSubjectPattern& pattern, |
| 43 const net::CertPrincipal& principal); | 56 const net::CertPrincipal& principal); |
| 44 | 57 |
| 45 // Fetches the matching certificate that has the latest valid start date. | 58 // Fetches the matching certificate that has the latest valid start date. |
| 46 // Returns a NULL refptr if there is no such match. | 59 // Returns a NULL refptr if there is no such match. |
| 47 CHROMEOS_EXPORT scoped_refptr<net::X509Certificate> GetCertificateMatch( | 60 CHROMEOS_EXPORT scoped_refptr<net::X509Certificate> GetCertificateMatch( |
| 48 const CertificatePattern& pattern, | 61 const CertificatePattern& pattern, |
| 49 const net::CertificateList& all_certs); | 62 const net::CertificateList& all_certs); |
| 50 | 63 |
| 51 // If not empty, sets the TPM properties in |properties|. If |pkcs11_id| is not | 64 // If not empty, sets the TPM properties in |properties|. If |pkcs11_id| is not |
| 52 // NULL, also sets the ClientCertID. |cert_config_type| determines which | 65 // NULL, also sets the ClientCertID. |cert_config_type| determines which |
| 53 // dictionary entries to set. | 66 // dictionary entries to set. |
| 54 void SetShillProperties(const ConfigType cert_config_type, | 67 void SetShillProperties(const ConfigType cert_config_type, |
| 55 const std::string& tpm_slot, | 68 const std::string& tpm_slot, |
| 56 const std::string& tpm_pin, | 69 const std::string& tpm_pin, |
| 57 const std::string* pkcs11_id, | 70 const std::string* pkcs11_id, |
| 58 base::DictionaryValue* properties); | 71 base::DictionaryValue* properties); |
| 59 | 72 |
| 60 // Returns true if all required configuration properties are set and not empty. | 73 // Returns true if all required configuration properties are set and not empty. |
| 61 bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, | 74 bool IsCertificateConfigured(const client_cert::ConfigType cert_config_type, |
| 62 const base::DictionaryValue& service_properties); | 75 const base::DictionaryValue& service_properties); |
| 63 | 76 |
| 77 // Determines the type of the CertificatePattern configuration, i.e. is it a | |
| 78 // pattern within an EAP, IPsec or OpenVPN configuration. | |
| 79 CHROMEOS_EXPORT void OncToClientCertConfig( | |
| 80 const base::DictionaryValue& network_config, | |
| 81 ClientCertConfig* cert_config); | |
| 82 | |
| 64 } // namespace client_cert | 83 } // namespace client_cert |
| 65 | 84 |
| 66 } // namespace chromeos | 85 } // namespace chromeos |
| 67 | 86 |
| 68 #endif // CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ | 87 #endif // CHROMEOS_NETWORK_CLIENT_CERT_UTIL_H_ |
| OLD | NEW |