/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef nsNSSCertificate_h #define nsNSSCertificate_h #include #include #include "ScopedNSSTypes.h" #include "certt.h" #include "nsCOMPtr.h" #include "nsIClassInfo.h" #include "nsISerializable.h" #include "nsIX509Cert.h" #include "nsSimpleEnumerator.h" #include "nsStringFwd.h" namespace mozilla { namespace pkix { class DERArray; } } // namespace mozilla class nsINSSComponent; class nsNSSCertificate final : public nsIX509Cert, public nsISerializable, public nsIClassInfo { public: NS_DECL_THREADSAFE_ISUPPORTS NS_DECL_NSIX509CERT NS_DECL_NSISERIALIZABLE NS_DECL_NSICLASSINFO explicit nsNSSCertificate(CERTCertificate* cert); nsNSSCertificate(); static nsNSSCertificate* Create(CERTCertificate* cert = nullptr); static nsNSSCertificate* ConstructFromDER(char* certDER, int derLen); // Split a certificate chain into the root, intermediates (if any), and end // entity. This method does so blindly, assuming that the current list object // is ordered [end entity, intermediates..., root]. If that isn't true, this // method will return the certificates at the two ends without regard to the // actual chain of trust. Callers are encouraged to check, if there's any // doubt. // Will return error if used on self-signed or empty chains. // This method requires that all arguments be empty, notably the list // `aIntermediates` must be empty. static nsresult SegmentCertificateChain( /* int */ const nsTArray>& aCertList, /* out */ nsCOMPtr& aRoot, /* out */ nsTArray>& aIntermediates, /* out */ nsCOMPtr& aEndEntity); // Obtain the root certificate of a certificate chain. This method does so // blindly, as SegmentCertificateChain; the same restrictions apply. On an // empty list, leaves aRoot empty and returns a failure. static nsresult GetRootCertificate( const nsTArray>& aCertList, /* out */ nsCOMPtr& aRoot); private: virtual ~nsNSSCertificate() = default; mozilla::UniqueCERTCertificate mCert; uint32_t mCertType; nsresult GetSortableDate(PRTime aTime, nsAString& _aSortableDate); bool InitFromDER(char* certDER, int derLen); // return false on failure nsresult GetCertificateHash(nsAString& aFingerprint, SECOidTag aHashAlg); }; namespace mozilla { SECStatus ConstructCERTCertListFromReversedDERArray( const mozilla::pkix::DERArray& certArray, /*out*/ mozilla::UniqueCERTCertList& certList); } // namespace mozilla #define NS_X509CERT_CID \ { /* 660a3226-915c-4ffb-bb20-8985a632df05 */ \ 0x660a3226, 0x915c, 0x4ffb, { \ 0xbb, 0x20, 0x89, 0x85, 0xa6, 0x32, 0xdf, 0x05 \ } \ } #endif // nsNSSCertificate_h