mirror of
				https://github.com/RGBCube/serenity
				synced 2025-10-31 09:02:43 +00:00 
			
		
		
		
	 6e19ab2bbc
			
		
	
	
		6e19ab2bbc
		
	
	
	
	
		
			
			We have a new, improved string type coming up in AK (OOM aware, no null state), and while it's going to use UTF-8, the name UTF8String is a mouthful - so let's free up the String name by renaming the existing class. Making the old one have an annoying name will hopefully also help with quick adoption :^)
		
			
				
	
	
		
			148 lines
		
	
	
	
		
			4.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			148 lines
		
	
	
	
		
			4.3 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /*
 | |
|  * Copyright (c) 2020, the SerenityOS developers.
 | |
|  *
 | |
|  * SPDX-License-Identifier: BSD-2-Clause
 | |
|  */
 | |
| 
 | |
| #pragma once
 | |
| 
 | |
| #include <AK/ByteBuffer.h>
 | |
| #include <AK/Forward.h>
 | |
| #include <AK/Optional.h>
 | |
| #include <AK/Singleton.h>
 | |
| #include <AK/Types.h>
 | |
| #include <LibCore/ConfigFile.h>
 | |
| #include <LibCore/DateTime.h>
 | |
| #include <LibCrypto/BigInt/UnsignedBigInteger.h>
 | |
| #include <LibCrypto/PK/RSA.h>
 | |
| 
 | |
| namespace TLS {
 | |
| 
 | |
| enum class CertificateKeyAlgorithm {
 | |
|     Unsupported = 0x00,
 | |
|     RSA_RSA = 0x01,
 | |
|     RSA_MD5 = 0x04,
 | |
|     RSA_SHA1 = 0x05,
 | |
|     RSA_SHA256 = 0x0b,
 | |
|     RSA_SHA384 = 0x0c,
 | |
|     RSA_SHA512 = 0x0d,
 | |
| };
 | |
| 
 | |
| class Certificate {
 | |
| public:
 | |
|     u16 version { 0 };
 | |
|     CertificateKeyAlgorithm algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     CertificateKeyAlgorithm key_algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     CertificateKeyAlgorithm ec_algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     ByteBuffer exponent {};
 | |
|     Crypto::PK::RSAPublicKey<Crypto::UnsignedBigInteger> public_key {};
 | |
|     Crypto::PK::RSAPrivateKey<Crypto::UnsignedBigInteger> private_key {};
 | |
|     struct Name {
 | |
|         DeprecatedString country;
 | |
|         DeprecatedString state;
 | |
|         DeprecatedString location;
 | |
|         DeprecatedString entity;
 | |
|         DeprecatedString subject;
 | |
|         DeprecatedString unit;
 | |
|     } issuer, subject;
 | |
|     Core::DateTime not_before;
 | |
|     Core::DateTime not_after;
 | |
|     Vector<DeprecatedString> SAN;
 | |
|     u8* ocsp { nullptr };
 | |
|     Crypto::UnsignedBigInteger serial_number;
 | |
|     ByteBuffer sign_key {};
 | |
|     ByteBuffer fingerprint {};
 | |
|     ByteBuffer der {};
 | |
|     ByteBuffer data {};
 | |
|     CertificateKeyAlgorithm signature_algorithm { CertificateKeyAlgorithm::Unsupported };
 | |
|     ByteBuffer signature_value {};
 | |
|     ByteBuffer original_asn1 {};
 | |
|     bool is_allowed_to_sign_certificate { false };
 | |
|     bool is_certificate_authority { false };
 | |
|     Optional<size_t> path_length_constraint {};
 | |
| 
 | |
|     static Optional<Certificate> parse_asn1(ReadonlyBytes, bool client_cert = false);
 | |
| 
 | |
|     bool is_valid() const;
 | |
| 
 | |
|     DeprecatedString subject_identifier_string() const
 | |
|     {
 | |
|         StringBuilder cert_name;
 | |
|         if (!subject.country.is_empty()) {
 | |
|             cert_name.append("/C="sv);
 | |
|             cert_name.append(subject.country);
 | |
|         }
 | |
|         if (!subject.state.is_empty()) {
 | |
|             cert_name.append("/ST="sv);
 | |
|             cert_name.append(subject.state);
 | |
|         }
 | |
|         if (!subject.location.is_empty()) {
 | |
|             cert_name.append("/L="sv);
 | |
|             cert_name.append(subject.location);
 | |
|         }
 | |
|         if (!subject.entity.is_empty()) {
 | |
|             cert_name.append("/O="sv);
 | |
|             cert_name.append(subject.entity);
 | |
|         }
 | |
|         if (!subject.unit.is_empty()) {
 | |
|             cert_name.append("/OU="sv);
 | |
|             cert_name.append(subject.unit);
 | |
|         }
 | |
|         if (!subject.subject.is_empty()) {
 | |
|             cert_name.append("/CN="sv);
 | |
|             cert_name.append(subject.subject);
 | |
|         }
 | |
|         return cert_name.build();
 | |
|     }
 | |
| 
 | |
|     DeprecatedString issuer_identifier_string() const
 | |
|     {
 | |
|         StringBuilder cert_name;
 | |
|         if (!issuer.country.is_empty()) {
 | |
|             cert_name.append("/C="sv);
 | |
|             cert_name.append(issuer.country);
 | |
|         }
 | |
|         if (!issuer.state.is_empty()) {
 | |
|             cert_name.append("/ST="sv);
 | |
|             cert_name.append(issuer.state);
 | |
|         }
 | |
|         if (!issuer.location.is_empty()) {
 | |
|             cert_name.append("/L="sv);
 | |
|             cert_name.append(issuer.location);
 | |
|         }
 | |
|         if (!issuer.entity.is_empty()) {
 | |
|             cert_name.append("/O="sv);
 | |
|             cert_name.append(issuer.entity);
 | |
|         }
 | |
|         if (!issuer.unit.is_empty()) {
 | |
|             cert_name.append("/OU="sv);
 | |
|             cert_name.append(issuer.unit);
 | |
|         }
 | |
|         if (!issuer.subject.is_empty()) {
 | |
|             cert_name.append("/CN="sv);
 | |
|             cert_name.append(issuer.subject);
 | |
|         }
 | |
|         return cert_name.build();
 | |
|     }
 | |
| };
 | |
| 
 | |
| class DefaultRootCACertificates {
 | |
| public:
 | |
|     DefaultRootCACertificates();
 | |
| 
 | |
|     Vector<Certificate> const& certificates() const { return m_ca_certificates; }
 | |
| 
 | |
|     void reload_certificates(Core::ConfigFile&);
 | |
| 
 | |
|     static DefaultRootCACertificates& the() { return s_the; }
 | |
| 
 | |
| private:
 | |
|     static Singleton<DefaultRootCACertificates> s_the;
 | |
| 
 | |
|     Vector<Certificate> m_ca_certificates;
 | |
| };
 | |
| 
 | |
| }
 | |
| 
 | |
| using TLS::Certificate;
 | |
| using TLS::DefaultRootCACertificates;
 |