Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(96)

Side by Side Diff: net/cert/x509_cert_types.h

Issue 465133004: Remove DenyCertForHost from SSLHostStateDelegate API. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Sleevi comments Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef NET_CERT_X509_CERT_TYPES_H_ 5 #ifndef NET_CERT_X509_CERT_TYPES_H_
6 #define NET_CERT_X509_CERT_TYPES_H_ 6 #define NET_CERT_X509_CERT_TYPES_H_
7 7
8 #include <string.h> 8 #include <string.h>
9 9
10 #include <map> 10 #include <map>
(...skipping 50 matching lines...) Expand 10 before | Expand all | Expand 10 after
61 std::string locality_name; 61 std::string locality_name;
62 std::string state_or_province_name; 62 std::string state_or_province_name;
63 std::string country_name; 63 std::string country_name;
64 64
65 std::vector<std::string> street_addresses; 65 std::vector<std::string> street_addresses;
66 std::vector<std::string> organization_names; 66 std::vector<std::string> organization_names;
67 std::vector<std::string> organization_unit_names; 67 std::vector<std::string> organization_unit_names;
68 std::vector<std::string> domain_components; 68 std::vector<std::string> domain_components;
69 }; 69 };
70 70
71 // This class is useful for maintaining policies about which certificates are
72 // permitted or forbidden for a particular purpose.
73 class NET_EXPORT CertPolicy {
74 public:
75 // The judgments this policy can reach.
76 enum Judgment {
77 // We don't have policy information for this certificate.
78 UNKNOWN,
79
80 // This certificate is allowed.
81 ALLOWED,
82
83 // This certificate is denied.
84 DENIED,
85 };
86
87 CertPolicy();
88 ~CertPolicy();
89
90 // Returns the judgment this policy makes about this certificate.
91 // For a certificate to be allowed, it must not have any *additional* errors
92 // from when it was allowed. For a certificate to be denied, it need only
93 // match *any* of the errors that caused it to be denied. We check denial
94 // first, before checking whether it's been allowed.
95 Judgment Check(X509Certificate* cert, CertStatus error) const;
96
97 // Causes the policy to allow this certificate for a given |error|.
98 void Allow(X509Certificate* cert, CertStatus error);
99
100 // Causes the policy to deny this certificate for a given |error|.
101 void Deny(X509Certificate* cert, CertStatus error);
102
103 // Returns true if this policy has allowed at least one certificate.
104 bool HasAllowedCert() const;
105
106 // Returns true if this policy has denied at least one certificate.
107 bool HasDeniedCert() const;
108
109 private:
110 // The set of fingerprints of allowed certificates.
111 std::map<SHA1HashValue, CertStatus, SHA1HashValueLessThan> allowed_;
112
113 // The set of fingerprints of denied certificates.
114 std::map<SHA1HashValue, CertStatus, SHA1HashValueLessThan> denied_;
115 };
116
117 #if defined(OS_MACOSX) && !defined(OS_IOS) 71 #if defined(OS_MACOSX) && !defined(OS_IOS)
118 // Compares two OIDs by value. 72 // Compares two OIDs by value.
119 inline bool CSSMOIDEqual(const CSSM_OID* oid1, const CSSM_OID* oid2) { 73 inline bool CSSMOIDEqual(const CSSM_OID* oid1, const CSSM_OID* oid2) {
120 return oid1->Length == oid2->Length && 74 return oid1->Length == oid2->Length &&
121 (memcmp(oid1->Data, oid2->Data, oid1->Length) == 0); 75 (memcmp(oid1->Data, oid2->Data, oid1->Length) == 0);
122 } 76 }
123 #endif 77 #endif
124 78
125 // A list of ASN.1 date/time formats that ParseCertificateDate() supports, 79 // A list of ASN.1 date/time formats that ParseCertificateDate() supports,
126 // encoded in the canonical forms specified in RFC 2459/3280/5280. 80 // encoded in the canonical forms specified in RFC 2459/3280/5280.
127 enum CertDateFormat { 81 enum CertDateFormat {
128 // UTCTime: Format is YYMMDDHHMMSSZ 82 // UTCTime: Format is YYMMDDHHMMSSZ
129 CERT_DATE_FORMAT_UTC_TIME, 83 CERT_DATE_FORMAT_UTC_TIME,
130 84
131 // GeneralizedTime: Format is YYYYMMDDHHMMSSZ 85 // GeneralizedTime: Format is YYYYMMDDHHMMSSZ
132 CERT_DATE_FORMAT_GENERALIZED_TIME, 86 CERT_DATE_FORMAT_GENERALIZED_TIME,
133 }; 87 };
134 88
135 // Attempts to parse |raw_date|, an ASN.1 date/time string encoded as 89 // Attempts to parse |raw_date|, an ASN.1 date/time string encoded as
136 // |format|, and writes the result into |*time|. If an invalid date is 90 // |format|, and writes the result into |*time|. If an invalid date is
137 // specified, or if parsing fails, returns false, and |*time| will not be 91 // specified, or if parsing fails, returns false, and |*time| will not be
138 // updated. 92 // updated.
139 NET_EXPORT_PRIVATE bool ParseCertificateDate(const base::StringPiece& raw_date, 93 NET_EXPORT_PRIVATE bool ParseCertificateDate(const base::StringPiece& raw_date,
140 CertDateFormat format, 94 CertDateFormat format,
141 base::Time* time); 95 base::Time* time);
142 } // namespace net 96 } // namespace net
143 97
144 #endif // NET_CERT_X509_CERT_TYPES_H_ 98 #endif // NET_CERT_X509_CERT_TYPES_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698