mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 09:12:45 +00:00 
			
		
		
		
	 3f3f45580a
			
		
	
	
		3f3f45580a
		
	
	
	
	
		
			
			Each of these strings would previously rely on StringView's char const* constructor overload, which would call __builtin_strlen on the string. Since we now have operator ""sv, we can replace these with much simpler versions. This opens the door to being able to remove StringView(char const*). No functional changes.
		
			
				
	
	
		
			145 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			145 lines
		
	
	
	
		
			4.1 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2020, the SerenityOS developers.
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #pragma once
 | |
| 
 | |
| #include <AK/ByteBuffer.h>
 | |
| #include <AK/Forward.h>
 | |
| #include <AK/Optional.h>
 | |
| #include <AK/Singleton.h>
 | |
| #include <AK/Types.h>
 | |
| #include <LibCore/DateTime.h>
 | |
| #include <LibCrypto/BigInt/UnsignedBigInteger.h>
 | |
| #include <LibCrypto/PK/RSA.h>
 | |
| 
 | |
| namespace TLS {
 | |
| 
 | |
| enum class CertificateKeyAlgorithm {
 | |
|     Unsupported = 0x00,
 | |
|     RSA_RSA = 0x01,
 | |
|     RSA_MD5 = 0x04,
 | |
|     RSA_SHA1 = 0x05,
 | |
|     RSA_SHA256 = 0x0b,
 | |
|     RSA_SHA384 = 0x0c,
 | |
|     RSA_SHA512 = 0x0d,
 | |
| };
 | |
| 
 | |
| class Certificate {
 | |
| public:
 | |
|     u16 version { 0 };
 | |
|     CertificateKeyAlgorithm algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     CertificateKeyAlgorithm key_algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     CertificateKeyAlgorithm ec_algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     ByteBuffer exponent {};
 | |
|     Crypto::PK::RSAPublicKey<Crypto::UnsignedBigInteger> public_key {};
 | |
|     Crypto::PK::RSAPrivateKey<Crypto::UnsignedBigInteger> private_key {};
 | |
|     struct Name {
 | |
|         String country;
 | |
|         String state;
 | |
|         String location;
 | |
|         String entity;
 | |
|         String subject;
 | |
|         String unit;
 | |
|     } issuer, subject;
 | |
|     Core::DateTime not_before;
 | |
|     Core::DateTime not_after;
 | |
|     Vector<String> SAN;
 | |
|     u8* ocsp { nullptr };
 | |
|     Crypto::UnsignedBigInteger serial_number;
 | |
|     ByteBuffer sign_key {};
 | |
|     ByteBuffer fingerprint {};
 | |
|     ByteBuffer der {};
 | |
|     ByteBuffer data {};
 | |
|     CertificateKeyAlgorithm signature_algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     ByteBuffer signature_value {};
 | |
|     ByteBuffer original_asn1 {};
 | |
|     bool is_allowed_to_sign_certificate { false };
 | |
|     bool is_certificate_authority { false };
 | |
|     Optional<size_t> path_length_constraint {};
 | |
| 
 | |
|     static Optional<Certificate> parse_asn1(ReadonlyBytes, bool client_cert = false);
 | |
| 
 | |
|     bool is_valid() const;
 | |
| 
 | |
|     String subject_identifier_string() const
 | |
|     {
 | |
|         StringBuilder cert_name;
 | |
|         if (!subject.country.is_empty()) {
 | |
|             cert_name.append("/C="sv);
 | |
|             cert_name.append(subject.country);
 | |
|         }
 | |
|         if (!subject.state.is_empty()) {
 | |
|             cert_name.append("/ST="sv);
 | |
|             cert_name.append(subject.state);
 | |
|         }
 | |
|         if (!subject.location.is_empty()) {
 | |
|             cert_name.append("/L="sv);
 | |
|             cert_name.append(subject.location);
 | |
|         }
 | |
|         if (!subject.entity.is_empty()) {
 | |
|             cert_name.append("/O="sv);
 | |
|             cert_name.append(subject.entity);
 | |
|         }
 | |
|         if (!subject.unit.is_empty()) {
 | |
|             cert_name.append("/OU="sv);
 | |
|             cert_name.append(subject.unit);
 | |
|         }
 | |
|         if (!subject.subject.is_empty()) {
 | |
|             cert_name.append("/CN="sv);
 | |
|             cert_name.append(subject.subject);
 | |
|         }
 | |
|         return cert_name.build();
 | |
|     }
 | |
| 
 | |
|     String issuer_identifier_string() const
 | |
|     {
 | |
|         StringBuilder cert_name;
 | |
|         if (!issuer.country.is_empty()) {
 | |
|             cert_name.append("/C="sv);
 | |
|             cert_name.append(issuer.country);
 | |
|         }
 | |
|         if (!issuer.state.is_empty()) {
 | |
|             cert_name.append("/ST="sv);
 | |
|             cert_name.append(issuer.state);
 | |
|         }
 | |
|         if (!issuer.location.is_empty()) {
 | |
|             cert_name.append("/L="sv);
 | |
|             cert_name.append(issuer.location);
 | |
|         }
 | |
|         if (!issuer.entity.is_empty()) {
 | |
|             cert_name.append("/O="sv);
 | |
|             cert_name.append(issuer.entity);
 | |
|         }
 | |
|         if (!issuer.unit.is_empty()) {
 | |
|             cert_name.append("/OU="sv);
 | |
|             cert_name.append(issuer.unit);
 | |
|         }
 | |
|         if (!issuer.subject.is_empty()) {
 | |
|             cert_name.append("/CN="sv);
 | |
|             cert_name.append(issuer.subject);
 | |
|         }
 | |
|         return cert_name.build();
 | |
|     }
 | |
| };
 | |
| 
 | |
| class DefaultRootCACertificates {
 | |
| public:
 | |
|     DefaultRootCACertificates();
 | |
| 
 | |
|     Vector<Certificate> const& certificates() const { return m_ca_certificates; }
 | |
| 
 | |
|     static DefaultRootCACertificates& the() { return s_the; }
 | |
| 
 | |
| private:
 | |
|     static Singleton<DefaultRootCACertificates> s_the;
 | |
| 
 | |
|     Vector<Certificate> m_ca_certificates;
 | |
| };
 | |
| 
 | |
| }
 | |
| 
 | |
| using TLS::Certificate;
 | |
| using TLS::DefaultRootCACertificates;
 |