// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "net/base/cert_database.h" #include #include #include #include // NSSBase64_EncodeItem() #include // DER_Encode() #include // SEC_DerSignData() #include // SECKEY_CreateSubjectPublicKeyInfo() #include "base/logging.h" #include "base/scoped_ptr.h" #include "base/nss_util.h" #include "net/base/net_errors.h" #include "net/base/x509_certificate.h" namespace net { CertDatabase::CertDatabase() { base::EnsureNSSInit(); } int CertDatabase::CheckUserCert(X509Certificate* cert_obj) { if (!cert_obj) return ERR_CERT_INVALID; if (cert_obj->HasExpired()) return ERR_CERT_DATE_INVALID; // Check if the private key corresponding to the certificate exist // We shouldn't accept any random client certificate sent by a CA. // Note: The NSS source documentation wrongly suggests that this // also imports the certificate if the private key exists. This // doesn't seem to be the case. CERTCertificate* cert = cert_obj->os_cert_handle(); PK11SlotInfo* slot = PK11_KeyForCertExists(cert, NULL, NULL); if (!slot) { LOG(ERROR) << "No corresponding private key in store"; return ERR_NO_PRIVATE_KEY_FOR_CERT; } PK11_FreeSlot(slot); return OK; } int CertDatabase::AddUserCert(X509Certificate* cert_obj) { CERTCertificate* cert = cert_obj->os_cert_handle(); PK11SlotInfo* slot = NULL; std::string nickname; // Create a nickname for this certificate. // We use the scheme used by Firefox: // --> 's ID. std::string username, ca_name; char* temp_username = CERT_GetCommonName(&cert->subject); char* temp_ca_name = CERT_GetCommonName(&cert->issuer); if (temp_username) { username = temp_username; PORT_Free(temp_username); } if (temp_ca_name) { ca_name = temp_ca_name; PORT_Free(temp_ca_name); } nickname = username + "'s " + ca_name + " ID"; slot = PK11_ImportCertForKey(cert, const_cast(nickname.c_str()), NULL); if (!slot) { LOG(ERROR) << "Couldn't import user certificate."; return ERR_ADD_USER_CERT_FAILED; } PK11_FreeSlot(slot); return OK; } } // namespace net