1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
|
// Copyright (c) 2010 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#ifndef NET_BASE_CERT_DATABASE_H_
#define NET_BASE_CERT_DATABASE_H_
#pragma once
#include <string>
#include <vector>
#include "base/basictypes.h"
#include "base/string16.h"
#include "base/ref_counted.h"
namespace net {
class X509Certificate;
typedef std::vector<scoped_refptr<X509Certificate> > CertificateList;
// Constants to classify the type of a certificate.
// This is only used in the context of CertDatabase, but is defined outside to
// avoid an awkwardly long type name.
enum CertType {
UNKNOWN_CERT,
CA_CERT,
USER_CERT,
EMAIL_CERT,
SERVER_CERT,
NUM_CERT_TYPES
};
// This class provides functions to manipulate the local
// certificate store.
// TODO(gauravsh): This class could be augmented with methods
// for all operations that manipulate the underlying system
// certificate store.
class CertDatabase {
public:
// Constants that define which usages a certificate is trusted for.
enum {
UNTRUSTED = 0,
TRUSTED_SSL = 1 << 0,
TRUSTED_EMAIL = 1 << 1,
TRUSTED_OBJ_SIGN = 1 << 2,
};
// Stores per-certificate import results.
struct ImportCertResult {
public:
ImportCertResult(X509Certificate* cert, int err);
scoped_refptr<X509Certificate> certificate;
int net_error;
};
typedef std::vector<ImportCertResult> ImportCertResultList;
CertDatabase();
// Check whether this is a valid user cert that we have the private key for.
// Returns OK or a network error code such as ERR_CERT_CONTAINS_ERRORS.
int CheckUserCert(X509Certificate* cert);
// Store user (client) certificate. Assumes CheckUserCert has already passed.
// Returns OK, or ERR_ADD_USER_CERT_FAILED if there was a problem saving to
// the platform cert database, or possibly other network error codes.
int AddUserCert(X509Certificate* cert);
#if defined(USE_NSS)
// Get a list of unique certificates in the certificate database. (One
// instance of all certificates.)
void ListCerts(CertificateList* certs);
// Import certificates and private keys from PKCS #12 blob.
// Returns OK or a network error code such as ERR_PKCS12_IMPORT_BAD_PASSWORD
// or ERR_PKCS12_IMPORT_ERROR.
int ImportFromPKCS12(const std::string& data, const string16& password);
// Export the given certificates and private keys into a PKCS #12 blob,
// storing into |output|.
// Returns the number of certificates successfully exported.
int ExportToPKCS12(const CertificateList& certs, const string16& password,
std::string* output);
// Uses similar logic to nsNSSCertificateDB::handleCACertDownload to find the
// root. Assumes the list is an ordered hierarchy with the root being either
// the first or last element.
// TODO(mattm): improve this to handle any order.
X509Certificate* FindRootInList(const CertificateList& certificates);
// Import CA certificates.
// Tries to import all the certificates given. The root will be trusted
// according to |trust_bits|. Any certificates that could not be imported
// will be listed in |not_imported|.
// Returns false if there is an internal error, otherwise true is returned and
// |not_imported| should be checked for any certificates that were not
// imported.
bool ImportCACerts(const CertificateList& certificates,
unsigned int trust_bits,
ImportCertResultList* not_imported);
// Set trust values for certificate.
// Returns true on success or false on failure.
bool SetCertTrust(const X509Certificate* cert,
CertType type,
unsigned int trust_bits);
// Delete certificate and associated private key (if one exists).
// Returns true on success or false on failure.
bool DeleteCertAndKey(const X509Certificate* cert);
#endif
private:
DISALLOW_COPY_AND_ASSIGN(CertDatabase);
};
} // namespace net
#endif // NET_BASE_CERT_DATABASE_H_
|