summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsNSSCertificate.h
diff options
context:
space:
mode:
Diffstat (limited to 'security/manager/ssl/nsNSSCertificate.h')
-rw-r--r--security/manager/ssl/nsNSSCertificate.h91
1 files changed, 91 insertions, 0 deletions
diff --git a/security/manager/ssl/nsNSSCertificate.h b/security/manager/ssl/nsNSSCertificate.h
new file mode 100644
index 0000000000..a3c70f0bdf
--- /dev/null
+++ b/security/manager/ssl/nsNSSCertificate.h
@@ -0,0 +1,91 @@
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#ifndef nsNSSCertificate_h
+#define nsNSSCertificate_h
+
+#include <functional>
+#include <vector>
+
+#include "ScopedNSSTypes.h"
+#include "certt.h"
+#include "nsCOMPtr.h"
+#include "nsIClassInfo.h"
+#include "nsISerializable.h"
+#include "nsIX509Cert.h"
+#include "nsSimpleEnumerator.h"
+#include "nsStringFwd.h"
+
+namespace mozilla {
+namespace pkix {
+class DERArray;
+}
+} // namespace mozilla
+
+class nsINSSComponent;
+
+class nsNSSCertificate final : public nsIX509Cert,
+ public nsISerializable,
+ public nsIClassInfo {
+ public:
+ NS_DECL_THREADSAFE_ISUPPORTS
+ NS_DECL_NSIX509CERT
+ NS_DECL_NSISERIALIZABLE
+ NS_DECL_NSICLASSINFO
+
+ explicit nsNSSCertificate(CERTCertificate* cert);
+ nsNSSCertificate();
+ static nsNSSCertificate* Create(CERTCertificate* cert = nullptr);
+ static nsNSSCertificate* ConstructFromDER(char* certDER, int derLen);
+
+ // Split a certificate chain into the root, intermediates (if any), and end
+ // entity. This method does so blindly, assuming that the current list object
+ // is ordered [end entity, intermediates..., root]. If that isn't true, this
+ // method will return the certificates at the two ends without regard to the
+ // actual chain of trust. Callers are encouraged to check, if there's any
+ // doubt.
+ // Will return error if used on self-signed or empty chains.
+ // This method requires that all arguments be empty, notably the list
+ // `aIntermediates` must be empty.
+ static nsresult SegmentCertificateChain(
+ /* int */ const nsTArray<RefPtr<nsIX509Cert>>& aCertList,
+ /* out */ nsCOMPtr<nsIX509Cert>& aRoot,
+ /* out */ nsTArray<RefPtr<nsIX509Cert>>& aIntermediates,
+ /* out */ nsCOMPtr<nsIX509Cert>& aEndEntity);
+
+ // Obtain the root certificate of a certificate chain. This method does so
+ // blindly, as SegmentCertificateChain; the same restrictions apply. On an
+ // empty list, leaves aRoot empty and returns a failure.
+ static nsresult GetRootCertificate(
+ const nsTArray<RefPtr<nsIX509Cert>>& aCertList,
+ /* out */ nsCOMPtr<nsIX509Cert>& aRoot);
+
+ private:
+ virtual ~nsNSSCertificate() = default;
+
+ mozilla::UniqueCERTCertificate mCert;
+ uint32_t mCertType;
+ nsresult GetSortableDate(PRTime aTime, nsAString& _aSortableDate);
+ bool InitFromDER(char* certDER, int derLen); // return false on failure
+
+ nsresult GetCertificateHash(nsAString& aFingerprint, SECOidTag aHashAlg);
+};
+
+namespace mozilla {
+
+SECStatus ConstructCERTCertListFromReversedDERArray(
+ const mozilla::pkix::DERArray& certArray,
+ /*out*/ mozilla::UniqueCERTCertList& certList);
+
+} // namespace mozilla
+
+#define NS_X509CERT_CID \
+ { /* 660a3226-915c-4ffb-bb20-8985a632df05 */ \
+ 0x660a3226, 0x915c, 0x4ffb, { \
+ 0xbb, 0x20, 0x89, 0x85, 0xa6, 0x32, 0xdf, 0x05 \
+ } \
+ }
+
+#endif // nsNSSCertificate_h