fune/security/manager/ssl/X509CertValidity.cpp
Dana Keeler f05d29b7f8 Bug 1754217 - remove brittle time format APIs from nsIX509CertValidity r=jschanck
nsIX509CertValidity had a handful of APIs that would return formatted time
values. Some of these APIs were unused, and the rest were prone to error due to
platform differences. This patch simplifies this interface by removing those
APIs and having callers perform their own formatting using the remaining APIs
that return PRTime values.

Differential Revision: https://phabricator.services.mozilla.com/D138363
2022-02-15 22:55:02 +00:00

96 lines
2.7 KiB
C++

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#include "X509CertValidity.h"
#include "mozpkix/pkixder.h"
#include "mozpkix/pkixutil.h"
#include "nsComponentManagerUtils.h"
#include "secder.h"
NS_IMPL_ISUPPORTS(X509CertValidity, nsIX509CertValidity)
using namespace mozilla;
using namespace mozilla::pkix;
X509CertValidity::X509CertValidity(Input certDER)
: mNotBefore(0), mNotAfter(0), mTimesInitialized(false) {
using namespace mozilla::pkix::der;
// We're not building a verified certificate chain, so the EndEntityOrCA
// parameter doesn't matter.
BackCert cert(certDER, EndEntityOrCA::MustBeEndEntity, nullptr);
pkix::Result rv = cert.Init();
if (rv != Success) {
return;
}
// Validity ::= SEQUENCE {
// notBefore Time,
// notAfter Time }
//
// Time ::= CHOICE {
// utcTime UTCTime,
// generalTime GeneralizedTime }
//
// NB: BackCert::GetValidity returns the value of the Validity of the
// certificate (i.e. notBefore and notAfter, without the enclosing SEQUENCE
// and length)
Reader reader(cert.GetValidity());
uint8_t expectedTag = reader.Peek(UTCTime) ? UTCTime : GENERALIZED_TIME;
Input notBefore;
pkix::Result result = ExpectTagAndGetValue(reader, expectedTag, notBefore);
if (result != Success) {
return;
}
SECItemType notBeforeType =
expectedTag == UTCTime ? siUTCTime : siGeneralizedTime;
SECItem notBeforeItem = {
notBeforeType, const_cast<unsigned char*>(notBefore.UnsafeGetData()),
notBefore.GetLength()};
SECStatus srv = DER_DecodeTimeChoice(&mNotBefore, &notBeforeItem);
if (srv != SECSuccess) {
return;
}
expectedTag = reader.Peek(UTCTime) ? UTCTime : GENERALIZED_TIME;
Input notAfter;
result = ExpectTagAndGetValue(reader, expectedTag, notAfter);
if (result != Success) {
return;
}
SECItemType notAfterType =
expectedTag == UTCTime ? siUTCTime : siGeneralizedTime;
SECItem notAfterItem = {notAfterType,
const_cast<unsigned char*>(notAfter.UnsafeGetData()),
notAfter.GetLength()};
srv = DER_DecodeTimeChoice(&mNotAfter, &notAfterItem);
if (srv != SECSuccess) {
return;
}
mTimesInitialized = true;
}
NS_IMETHODIMP
X509CertValidity::GetNotBefore(PRTime* aNotBefore) {
NS_ENSURE_ARG(aNotBefore);
if (!mTimesInitialized) {
return NS_ERROR_FAILURE;
}
*aNotBefore = mNotBefore;
return NS_OK;
}
NS_IMETHODIMP
X509CertValidity::GetNotAfter(PRTime* aNotAfter) {
NS_ENSURE_ARG(aNotAfter);
if (!mTimesInitialized) {
return NS_ERROR_FAILURE;
}
*aNotAfter = mNotAfter;
return NS_OK;
}