diff options
Diffstat (limited to 'chromium/net/cert/asn1_util.h')
-rw-r--r-- | chromium/net/cert/asn1_util.h | 93 |
1 files changed, 93 insertions, 0 deletions
diff --git a/chromium/net/cert/asn1_util.h b/chromium/net/cert/asn1_util.h new file mode 100644 index 00000000000..ed379b3f122 --- /dev/null +++ b/chromium/net/cert/asn1_util.h @@ -0,0 +1,93 @@ +// Copyright (c) 2012 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef NET_CERT_ASN1_UTIL_H_ +#define NET_CERT_ASN1_UTIL_H_ + +#include <vector> + +#include "base/strings/string_piece.h" +#include "net/base/net_export.h" + +namespace net { + +namespace asn1 { + +// These are the DER encodings of the tag byte for ASN.1 objects. +static const unsigned kBOOLEAN = 0x01; +static const unsigned kINTEGER = 0x02; +static const unsigned kBITSTRING = 0x03; +static const unsigned kOCTETSTRING = 0x04; +static const unsigned kOID = 0x06; +static const unsigned kSEQUENCE = 0x30; + +// These are flags that can be ORed with the above tag numbers. +static const unsigned kContextSpecific = 0x80; +static const unsigned kConstructed = 0x20; + +// kAny matches any tag value; +static const unsigned kAny = 0x10000; +// kOptional denotes an optional element. +static const unsigned kOptional = 0x20000; + +// ParseElement parses a DER encoded ASN1 element from |in|, requiring that +// it have the given |tag_value|. It returns true on success. The following +// limitations are imposed: +// 1) tag numbers > 31 are not permitted. +// 2) lengths > 65535 are not permitted. +// On successful return: +// |in| is advanced over the element +// |out| contains the element, including the tag and length bytes. +// |out_header_len| contains the length of the tag and length bytes in |out|. +// +// If |tag_value & kOptional| is true then *out_header_len can be zero after a +// true return value if the element was not found. +bool ParseElement(base::StringPiece* in, + unsigned tag_value, + base::StringPiece* out, + unsigned *out_header_len); + +// GetElement performs the same actions as ParseElement, except that the header +// bytes are not included in the output. +// +// If |tag_value & kOptional| is true then this function cannot distinguish +// between a missing optional element and an empty one. +bool GetElement(base::StringPiece* in, + unsigned tag_value, + base::StringPiece* out); + +// ExtractSPKIFromDERCert parses the DER encoded certificate in |cert| and +// extracts the bytes of the SubjectPublicKeyInfo. On successful return, +// |spki_out| is set to contain the SPKI, pointing into |cert|. +NET_EXPORT_PRIVATE bool ExtractSPKIFromDERCert(base::StringPiece cert, + base::StringPiece* spki_out); + +// ExtractSubjectPublicKeyFromSPKI parses the DER encoded SubjectPublicKeyInfo +// in |spki| and extracts the bytes of the SubjectPublicKey. On successful +// return, |spk_out| is set to contain the public key, pointing into |spki|. +NET_EXPORT_PRIVATE bool ExtractSubjectPublicKeyFromSPKI( + base::StringPiece spki, + base::StringPiece* spk_out); + +// ExtractCRLURLsFromDERCert parses the DER encoded certificate in |cert| and +// extracts the URL of each CRL. On successful return, the elements of +// |urls_out| point into |cert|. +// +// CRLs that only cover a subset of the reasons are omitted as the spec +// requires that at least one CRL be included that covers all reasons. +// +// CRLs that use an alternative issuer are also omitted. +// +// The nested set of GeneralNames is flattened into a single list because +// having several CRLs with one location is equivalent to having one CRL with +// several locations as far as a CRL filter is concerned. +NET_EXPORT_PRIVATE bool ExtractCRLURLsFromDERCert( + base::StringPiece cert, + std::vector<base::StringPiece>* urls_out); + +} // namespace asn1 + +} // namespace net + +#endif // NET_CERT_ASN1_UTIL_H_ |