|  | /* | 
|  | *  Copyright 2004 The WebRTC Project Authors. All rights reserved. | 
|  | * | 
|  | *  Use of this source code is governed by a BSD-style license | 
|  | *  that can be found in the LICENSE file in the root of the source | 
|  | *  tree. An additional intellectual property rights grant can be found | 
|  | *  in the file PATENTS.  All contributing project authors may | 
|  | *  be found in the AUTHORS file in the root of the source tree. | 
|  | */ | 
|  |  | 
|  | #ifndef WEBRTC_BASE_NSSIDENTITY_H_ | 
|  | #define WEBRTC_BASE_NSSIDENTITY_H_ | 
|  |  | 
|  | #include <string> | 
|  |  | 
|  | #include "cert.h" | 
|  | #include "nspr.h" | 
|  | #include "hasht.h" | 
|  | #include "keythi.h" | 
|  |  | 
|  | #include "webrtc/base/common.h" | 
|  | #include "webrtc/base/logging.h" | 
|  | #include "webrtc/base/scoped_ptr.h" | 
|  | #include "webrtc/base/sslidentity.h" | 
|  |  | 
|  | namespace rtc { | 
|  |  | 
|  | class NSSKeyPair { | 
|  | public: | 
|  | NSSKeyPair(SECKEYPrivateKey* privkey, SECKEYPublicKey* pubkey) : | 
|  | privkey_(privkey), pubkey_(pubkey) {} | 
|  | ~NSSKeyPair(); | 
|  |  | 
|  | // Generate a 1024-bit RSA key pair. | 
|  | static NSSKeyPair* Generate(); | 
|  | NSSKeyPair* GetReference(); | 
|  |  | 
|  | SECKEYPrivateKey* privkey() const { return privkey_; } | 
|  | SECKEYPublicKey * pubkey() const { return pubkey_; } | 
|  |  | 
|  | private: | 
|  | SECKEYPrivateKey* privkey_; | 
|  | SECKEYPublicKey* pubkey_; | 
|  |  | 
|  | DISALLOW_EVIL_CONSTRUCTORS(NSSKeyPair); | 
|  | }; | 
|  |  | 
|  |  | 
|  | class NSSCertificate : public SSLCertificate { | 
|  | public: | 
|  | static NSSCertificate* FromPEMString(const std::string& pem_string); | 
|  | // The caller retains ownership of the argument to all the constructors, | 
|  | // and the constructor makes a copy. | 
|  | explicit NSSCertificate(CERTCertificate* cert); | 
|  | explicit NSSCertificate(CERTCertList* cert_list); | 
|  | virtual ~NSSCertificate() { | 
|  | if (certificate_) | 
|  | CERT_DestroyCertificate(certificate_); | 
|  | } | 
|  |  | 
|  | virtual NSSCertificate* GetReference() const; | 
|  |  | 
|  | virtual std::string ToPEMString() const; | 
|  |  | 
|  | virtual void ToDER(Buffer* der_buffer) const; | 
|  |  | 
|  | virtual bool GetSignatureDigestAlgorithm(std::string* algorithm) const; | 
|  |  | 
|  | virtual bool ComputeDigest(const std::string& algorithm, | 
|  | unsigned char* digest, | 
|  | size_t size, | 
|  | size_t* length) const; | 
|  |  | 
|  | virtual bool GetChain(SSLCertChain** chain) const; | 
|  |  | 
|  | CERTCertificate* certificate() { return certificate_; } | 
|  |  | 
|  | // Performs minimal checks to determine if the list is a valid chain.  This | 
|  | // only checks that each certificate certifies the preceding certificate, | 
|  | // and ignores many other certificate features such as expiration dates. | 
|  | static bool IsValidChain(const CERTCertList* cert_list); | 
|  |  | 
|  | // Helper function to get the length of a digest | 
|  | static bool GetDigestLength(const std::string& algorithm, size_t* length); | 
|  |  | 
|  | // Comparison.  Only the certificate itself is considered, not the chain. | 
|  | bool Equals(const NSSCertificate* tocompare) const; | 
|  |  | 
|  | private: | 
|  | NSSCertificate(CERTCertificate* cert, SSLCertChain* chain); | 
|  | static bool GetDigestObject(const std::string& algorithm, | 
|  | const SECHashObject** hash_object); | 
|  |  | 
|  | CERTCertificate* certificate_; | 
|  | scoped_ptr<SSLCertChain> chain_; | 
|  |  | 
|  | DISALLOW_EVIL_CONSTRUCTORS(NSSCertificate); | 
|  | }; | 
|  |  | 
|  | // Represents a SSL key pair and certificate for NSS. | 
|  | class NSSIdentity : public SSLIdentity { | 
|  | public: | 
|  | static NSSIdentity* Generate(const std::string& common_name); | 
|  | static NSSIdentity* GenerateForTest(const SSLIdentityParams& params); | 
|  | static SSLIdentity* FromPEMStrings(const std::string& private_key, | 
|  | const std::string& certificate); | 
|  | virtual ~NSSIdentity() { | 
|  | LOG(LS_INFO) << "Destroying NSS identity"; | 
|  | } | 
|  |  | 
|  | virtual NSSIdentity* GetReference() const; | 
|  | virtual NSSCertificate& certificate() const; | 
|  |  | 
|  | NSSKeyPair* keypair() const { return keypair_.get(); } | 
|  |  | 
|  | private: | 
|  | NSSIdentity(NSSKeyPair* keypair, NSSCertificate* cert) : | 
|  | keypair_(keypair), certificate_(cert) {} | 
|  |  | 
|  | static NSSIdentity* GenerateInternal(const SSLIdentityParams& params); | 
|  |  | 
|  | rtc::scoped_ptr<NSSKeyPair> keypair_; | 
|  | rtc::scoped_ptr<NSSCertificate> certificate_; | 
|  |  | 
|  | DISALLOW_EVIL_CONSTRUCTORS(NSSIdentity); | 
|  | }; | 
|  |  | 
|  | }  // namespace rtc | 
|  |  | 
|  | #endif  // WEBRTC_BASE_NSSIDENTITY_H_ |