1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "net/cert/x509_cert_types.h"
10 #include "base/logging.h"
11 #include "base/string_number_conversions.h"
12 #include "base/strings/string_piece.h"
13 #include "base/time.h"
14 #include "net/cert/x509_certificate.h"
20 // Helper for ParseCertificateDate. |*field| must contain at least
21 // |field_len| characters. |*field| will be advanced by |field_len| on exit.
22 // |*ok| is set to false if there is an error in parsing the number, but left
23 // untouched otherwise. Returns the parsed integer.
24 int ParseIntAndAdvance(const char** field
, size_t field_len
, bool* ok
) {
26 *ok
&= base::StringToInt(base::StringPiece(*field
, field_len
), &result
);
33 CertPrincipal::CertPrincipal() {
36 CertPrincipal::CertPrincipal(const std::string
& name
) : common_name(name
) {}
38 CertPrincipal::~CertPrincipal() {
41 std::string
CertPrincipal::GetDisplayName() const {
42 if (!common_name
.empty())
44 if (!organization_names
.empty())
45 return organization_names
[0];
46 if (!organization_unit_names
.empty())
47 return organization_unit_names
[0];
52 CertPolicy::CertPolicy() {
55 CertPolicy::~CertPolicy() {
58 CertPolicy::Judgment
CertPolicy::Check(
59 X509Certificate
* cert
) const {
60 // It shouldn't matter which set we check first, but we check denied first
61 // in case something strange has happened.
63 if (denied_
.find(cert
->fingerprint()) != denied_
.end()) {
64 // DCHECK that the order didn't matter.
65 DCHECK(allowed_
.find(cert
->fingerprint()) == allowed_
.end());
69 if (allowed_
.find(cert
->fingerprint()) != allowed_
.end()) {
70 // DCHECK that the order didn't matter.
71 DCHECK(denied_
.find(cert
->fingerprint()) == denied_
.end());
75 // We don't have a policy for this cert.
79 void CertPolicy::Allow(X509Certificate
* cert
) {
80 // Put the cert in the allowed set and (maybe) remove it from the denied set.
81 denied_
.erase(cert
->fingerprint());
82 allowed_
.insert(cert
->fingerprint());
85 void CertPolicy::Deny(X509Certificate
* cert
) {
86 // Put the cert in the denied set and (maybe) remove it from the allowed set.
87 allowed_
.erase(cert
->fingerprint());
88 denied_
.insert(cert
->fingerprint());
91 bool CertPolicy::HasAllowedCert() const {
92 return !allowed_
.empty();
95 bool CertPolicy::HasDeniedCert() const {
96 return !denied_
.empty();
99 bool ParseCertificateDate(const base::StringPiece
& raw_date
,
100 CertDateFormat format
,
102 size_t year_length
= format
== CERT_DATE_FORMAT_UTC_TIME
? 2 : 4;
104 if (raw_date
.length() < 11 + year_length
)
107 const char* field
= raw_date
.data();
109 base::Time::Exploded exploded
= {0};
111 exploded
.year
= ParseIntAndAdvance(&field
, year_length
, &valid
);
112 exploded
.month
= ParseIntAndAdvance(&field
, 2, &valid
);
113 exploded
.day_of_month
= ParseIntAndAdvance(&field
, 2, &valid
);
114 exploded
.hour
= ParseIntAndAdvance(&field
, 2, &valid
);
115 exploded
.minute
= ParseIntAndAdvance(&field
, 2, &valid
);
116 exploded
.second
= ParseIntAndAdvance(&field
, 2, &valid
);
117 if (valid
&& year_length
== 2)
118 exploded
.year
+= exploded
.year
< 50 ? 2000 : 1900;
120 valid
&= exploded
.HasValidValues();
125 *time
= base::Time::FromUTCExploded(exploded
);