cryptoservices/certificateandkeymgmt/x509/x509gn.cpp
changeset 0 2c201484c85f
child 8 35751d3474b7
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/cryptoservices/certificateandkeymgmt/x509/x509gn.cpp	Wed Jul 08 11:25:26 2009 +0100
@@ -0,0 +1,712 @@
+/*
+* Copyright (c) 1998-2009 Nokia Corporation and/or its subsidiary(-ies).
+* All rights reserved.
+* This component and the accompanying materials are made available
+* under the terms of the License "Eclipse Public License v1.0"
+* which accompanies this distribution, and is available
+* at the URL "http://www.eclipse.org/legal/epl-v10.html".
+*
+* Initial Contributors:
+* Nokia Corporation - initial contribution.
+*
+* Contributors:
+*
+* Description: 
+*
+*/
+
+
+#include <x509gn.h>
+#include "asn1dec.h"
+
+/*
+ * __SECURITY_PLATSEC_ARCH__: Changes for platform security
+ *
+ * If this macro is defined, the represenation of TPtrC arrays is changed from
+ * using CPtrCArray to RArray<TPtrC>.  This is because CPtrCArray is supplied by
+ * bafl.dll, which is not trusted for TCB.  x509 needs to be trusted for TCB so
+ * it can be used by software install, hence this dependency was removed.
+ *
+ * This changes is implmented as a series of macros for the basic operations,
+ * to minimise the amount of conditional compilation.
+ */
+
+
+#define REP_INIT_L		/* do nothing */
+#define REP_FINAL 		iRep.Close()
+#define REP_APPEND_L(X)	User::LeaveIfError(iRep.Append(X))
+#define REP_COUNT		iRep.Count()
+#define REP_AT(X)		iRep[X]
+#define REP_VAL			iRep
+#define REP_VAL_TYPE	RArray<TPtrC>
+
+
+_LIT(KX509RFC822HostDomainSeparator,"@");
+_LIT(KX509SubdomainSeparator,".");
+_LIT(KX509URISchemeSpecificStart, "//");
+_LIT(KX509URIUserPasswordEnd, "@");
+_LIT(KX509URIPortStart, ":");
+_LIT(KX509URIurlPathStart, "/");
+
+const TInt KX509URISchemeSpecificStartLength = 2;
+const TInt KX509URIUserPasswordEndLength = 1;
+const TInt KX509MaxDNSNameLabelLength = 63;
+
+//superclass: common functionality for DNS names & RFC 822 email addresses
+EXPORT_C CX509DomainName::~CX509DomainName()
+	{
+	REP_FINAL;
+	delete iName;
+	}
+
+CX509DomainName::CX509DomainName()
+	{
+	}
+
+EXPORT_C TPtrC CX509DomainName::Name() const 
+	{
+	return *iName;
+	}
+
+EXPORT_C TBool CX509DomainName::IsWithinSubtree(const CX509DomainName& aName) const
+   	{
+   	TInt myCount = REP_COUNT;
+   	TInt otherCount = aName.REP_COUNT;
+   	if (otherCount > myCount)
+   		{
+   		return EFalse;
+   		}
+   	for (TInt i = otherCount-1; i >= 0; i--)
+   		{
+   		myCount--;
+   		if ( KErrNotFound == REP_AT(myCount).MatchF(aName.REP_AT(i)) )
+   			{
+   			return EFalse;
+   			}
+   		}
+   	return ETrue;
+   	}
+
+TBool CX509DomainName::AddDomainL(TInt& aPos)
+	{
+	TInt end = iName->Length();
+	FOREVER
+		{
+		if (!(AddSubdomainL(aPos)))
+			{
+			return EFalse;
+			}
+		if (aPos == end)
+			{
+			break;
+			}
+		AddSubdomainSeparatorL(aPos);
+		}
+	return ETrue;
+	}
+
+TBool CX509DomainName::AddSubdomainL(TInt& aPos)
+	{
+	TBool res = EFalse;
+	TInt end = iName->Length();
+	if (aPos >= end)
+		{
+		return res;
+		}
+	TPtrC whatsLeft(&(iName->operator[] (aPos)), end - aPos);
+	TInt subdomainEnd = whatsLeft.FindF(KX509SubdomainSeparator);
+	if (subdomainEnd == 0)
+		{
+		return res;
+		}
+	if (subdomainEnd == KErrNotFound)
+		{
+		subdomainEnd = end - aPos;
+		}
+	TPtrC subdomain(&whatsLeft[0], subdomainEnd);
+	if (IsValidString(subdomain))
+		{
+		REP_APPEND_L(subdomain);
+		res = ETrue;
+		}
+	aPos = aPos + subdomainEnd;
+	return res;
+	}
+
+TBool CX509DomainName::AddSubdomainSeparatorL(TInt& aPos)
+	{
+	TBool res = EFalse;
+	TInt end = iName->Length();
+	if (end <= aPos)
+		{
+		return res;
+		}
+	TPtrC whatsLeft(&(iName->operator[] (aPos)), end - aPos);
+	TInt separatorEnd = whatsLeft.FindF(KX509SubdomainSeparator);
+	if (separatorEnd == 0)
+		{
+		TPtrC separator(&whatsLeft[0], 1);
+		REP_APPEND_L(separator);
+		aPos++;
+		res = ETrue;
+		}
+	return res;
+	}
+
+TBool CX509DomainName::IsValidString(const TDesC& aStr) const
+	{
+	TInt pos=0;
+	TInt end=aStr.Length()-1;
+	if (end < 0)
+		{
+		return ETrue;	
+		}
+	while (pos<end && IsValidChar(aStr[pos]))
+		{
+		pos++;
+		}
+	return (pos==end && IsValidChar(aStr[end]));
+	}
+
+TBool CX509DomainName::IsAlpha(const TChar& aChar) const 
+	{
+	return (	((aChar >= 97) && (aChar <= 122))	||
+				((aChar >= 65) && (aChar <= 90))	);
+	}
+
+TBool CX509DomainName::IsAlphaOrNum(const TChar& aChar) const
+	{
+	return ((IsAlpha(aChar)) ||
+			((aChar >= 48) && (aChar <= 57)) || (aChar == 42));
+	}
+
+TBool CX509DomainName::IsValidChar(const TChar& aChar) const
+	{
+	//default implementation: must be letter, number or hyphen
+	return ((IsAlphaOrNum(aChar)) ||
+			(aChar == 45) || (aChar == 42));
+	}
+
+//RFC 822 email address
+//subtree
+EXPORT_C CX509RFC822NameSubtree* CX509RFC822NameSubtree::NewL(const TDesC8& aBinaryData)
+	{
+	CX509RFC822NameSubtree* self = CX509RFC822NameSubtree::NewLC(aBinaryData);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509RFC822NameSubtree* CX509RFC822NameSubtree::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509RFC822NameSubtree* self = new(ELeave) CX509RFC822NameSubtree;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+void CX509RFC822NameSubtree::ConstructL(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	TASN1DecIA5String encStr;
+	iName = encStr.DecodeDERL(aBinaryData, pos);
+	REP_INIT_L;
+	//now, parse your data
+	pos = 0;	
+	AddLocalHostL(pos);
+	AddSubdomainSeparatorL(pos);
+	if (!(AddDomainL(pos)))
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+TBool CX509RFC822NameSubtree::AddLocalHostL(TInt& aPos)
+	{
+	TInt localHostLength = iName->FindF(KX509RFC822HostDomainSeparator);
+	if ((localHostLength != KErrNotFound) && (localHostLength > 0))
+		{
+		TPtrC localHost(&(iName->operator[] (aPos)), localHostLength);		
+		//the local host name is not checked here as it caused defect PDEF108960 
+		//and for compatability with IE and Firefox.
+		REP_APPEND_L(localHost);
+		aPos = aPos + localHostLength;
+		aPos++;		//skip the @ symbol
+		return ETrue;
+		}
+	return EFalse;	//local host not found
+	}
+
+
+EXPORT_C const REP_VAL_TYPE& CX509RFC822NameSubtree::Rep() const
+	{
+	return REP_VAL;
+	}
+
+TBool CX509RFC822NameSubtree::IsValidChar(const TChar& aChar) const
+	{
+	//we permit "." here, 'cos it's allowed in local host names
+	//and must have been stripped out by domain parsing code,
+	//since it's the separator char
+	return (	(aChar == 33)						||
+				((aChar >= 35) && (aChar <= 40))	||
+				(aChar == 42)						||
+				(aChar == 43)						||
+				((aChar >= 45) && (aChar <= 57))	||
+				(aChar == 61)						||
+				(aChar == 63)						||
+				((aChar >= 65) && (aChar <= 90))	||
+				((aChar >= 94) && (aChar <= 126))	);
+	}
+
+//full rfc 822 name: exactly as subtree, but requires local host and full domain name
+EXPORT_C CX509RFC822Name* CX509RFC822Name::NewL(const TDesC8& aBinaryData)
+	{
+	CX509RFC822Name* self = CX509RFC822Name::NewLC(aBinaryData);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509RFC822Name* CX509RFC822Name::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509RFC822Name* self = new(ELeave) CX509RFC822Name;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+void CX509RFC822Name::ConstructL(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	TASN1DecIA5String encStr;
+	iName = encStr.DecodeDERL(aBinaryData, pos);
+	REP_INIT_L;
+	//now, parse your data
+	pos = 0;	
+	if (! ((AddLocalHostL(pos)) && (AddDomainL(pos))) )
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+//DNS Name subtree
+EXPORT_C CX509DNSNameSubtree* CX509DNSNameSubtree::NewL(const TDesC8& aBinaryData)
+	{
+	CX509DNSNameSubtree* self = CX509DNSNameSubtree::NewLC(aBinaryData);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509DNSNameSubtree* CX509DNSNameSubtree::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509DNSNameSubtree* self = new(ELeave) CX509DNSNameSubtree;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+void CX509DNSNameSubtree::ConstructL(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	TASN1DecIA5String encStr;
+	iName = encStr.DecodeDERL(aBinaryData, pos);
+	REP_INIT_L;
+	pos = 0;
+	AddSubdomainSeparatorL(pos);//a subtree may start with a period
+	if (!(AddDomainL(pos)))
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+EXPORT_C const REP_VAL_TYPE& CX509DNSNameSubtree::Rep() const
+	{
+	return REP_VAL;
+	}
+
+TBool CX509DNSNameSubtree::IsValidString(const TDesC& aStr) const
+	{
+	//must be <= 63 chars long
+	//must start with letter, end with letter or number
+	TInt len = aStr.Length();
+	return (	(len <= KX509MaxDNSNameLabelLength) &&
+				(IsAlphaOrNum(aStr[0]))				&&
+				(IsAlphaOrNum(aStr[len-1]))			&&
+				(CX509DomainName::IsValidString(aStr))				);
+	}
+
+//dns name: exactly as subtree but requires full domain name
+EXPORT_C CX509DNSName* CX509DNSName::NewL(const TDesC8& aBinaryData)
+	{
+	CX509DNSName* self = CX509DNSName::NewLC(aBinaryData);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509DNSName* CX509DNSName::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509DNSName* self = new(ELeave) CX509DNSName;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+EXPORT_C CX509DNSName* CX509DNSName::NewL(const CX509DNSName& aName)
+	{
+	CX509DNSName* self = CX509DNSName::NewLC(aName);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509DNSName* CX509DNSName::NewLC(const CX509DNSName& aName)
+	{	
+	CX509DNSName* self = new(ELeave) CX509DNSName;
+	CleanupStack::PushL(self);
+	self->ConstructL(aName);
+	return self;	
+	}
+
+
+EXPORT_C CX509DNSName* CX509DNSName::NewL(const TDesC& aNameString)
+	{
+	CX509DNSName* self = CX509DNSName::NewLC(aNameString);
+	CleanupStack::Pop();//self
+	return self;	
+	}
+
+EXPORT_C CX509DNSName* CX509DNSName::NewLC(const TDesC& aNameString)
+	{
+	CX509DNSName* self = new(ELeave) CX509DNSName;
+	CleanupStack::PushL(self);
+	self->ConstructL(aNameString);
+	return self;
+	}
+
+void CX509DNSName::ConstructL(const TDesC& aNameString)
+	{
+	TInt pos = 0;
+	REP_INIT_L;
+	iName = aNameString.AllocL();
+	AddSubdomainSeparatorL(pos);//a subtree may start with a period
+	if (!(AddDomainL(pos)))
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+void CX509DNSName::ConstructL(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	TASN1DecIA5String encStr;
+	iName = encStr.DecodeDERL(aBinaryData, pos);
+	ParseNameL();
+	}
+
+void CX509DNSName::ConstructL(const CX509DNSName& aName)
+	{
+	iName = aName.iName->AllocL();
+	ParseNameL();
+	}
+
+void CX509DNSName::ParseNameL()
+	{
+	REP_INIT_L;
+	TInt pos = 0;
+	if  (!AddDomainL(pos))
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+//URI: must be of 'ip-based' form (rfc 1738 section 3.1)
+//_and_ contain a domain name (not an IP address)
+EXPORT_C CX509IPBasedURI* CX509IPBasedURI::NewL(const TDesC8& aBinaryData)
+	{
+	CX509IPBasedURI* self = CX509IPBasedURI::NewLC(aBinaryData);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509IPBasedURI* CX509IPBasedURI::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509IPBasedURI* self = new(ELeave) CX509IPBasedURI;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+void CX509IPBasedURI::ConstructL(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	TASN1DecIA5String encStr;
+	iName = encStr.DecodeDERL(aBinaryData, pos);
+	iHost = CX509DNSName::NewL(ExtractHostNameL());
+	}
+
+EXPORT_C CX509IPBasedURI::~CX509IPBasedURI()
+	{
+	delete iName;
+	delete iHost;
+	}
+
+CX509IPBasedURI::CX509IPBasedURI()
+	:iHost(NULL), iName(NULL)
+	{
+	}
+
+EXPORT_C const CX509DNSName& CX509IPBasedURI::Host() const
+	{
+	return *iHost;
+	}
+
+EXPORT_C TPtrC CX509IPBasedURI::Name() const
+	{
+	return iName->Des();
+	}
+
+TPtrC CX509IPBasedURI::ExtractHostNameL() const
+	{
+	TInt hostStart;
+	TInt hostEnd;
+	TInt len = iName->Length();
+	TInt schemeSpecificStart = (iName->FindF(KX509URISchemeSpecificStart) + KX509URISchemeSpecificStartLength);
+	TInt userPasswordEnd = (iName->FindF(KX509URIUserPasswordEnd)) + KX509URIUserPasswordEndLength;
+	hostStart = ((userPasswordEnd == 0)? schemeSpecificStart : userPasswordEnd);
+	if (hostStart == KErrNotFound)
+		{
+		User::Leave(KErrArgument);
+		}
+	TPtrC whatsLeft(&(iName->operator[](hostStart)), len - hostStart);
+	TInt newlen = whatsLeft.Length();
+	TInt portStart = whatsLeft.FindF(KX509URIPortStart);
+	TInt urlPathStart = whatsLeft.FindF(KX509URIurlPathStart);
+	if (portStart == KErrNotFound)
+		{
+		if (urlPathStart == KErrNotFound)
+			{
+			hostEnd = newlen;
+			}
+		else
+			{
+			hostEnd = urlPathStart;
+			}
+		}
+	else
+		{
+		if (urlPathStart == KErrNotFound)
+			{
+			hostEnd = portStart;
+			}
+		else //both are there, choose the first one
+			{
+			hostEnd = ((urlPathStart > portStart)? portStart: urlPathStart);
+			}
+		}
+	TPtrC host(&(iName->operator[](hostStart)), hostEnd);
+	return host;
+	}
+
+//IP Address
+//subnet mask
+EXPORT_C CX509IPSubnetMask* CX509IPSubnetMask::NewL(const TDesC8& aBinaryData)
+	{
+	CX509IPSubnetMask* self = CX509IPSubnetMask::NewLC(aBinaryData);
+	CleanupStack::Pop();//self;
+	return self;
+	}
+
+EXPORT_C CX509IPSubnetMask* CX509IPSubnetMask::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509IPSubnetMask* self = new(ELeave) CX509IPSubnetMask;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+void CX509IPSubnetMask::ConstructL(const TDesC8& aBinaryData)
+	{
+	//!!!need to correct this when we have octet strings going!!!
+	TASN1DecGeneric encAddr(aBinaryData);
+	encAddr.InitL();
+	iName = encAddr.GetContentDER().AllocL();// = CASN1OctetString::DecodeDERL(aBinaryData, pos);
+	TInt len = iName->Length();
+	if (!((len == 8) || (len == 32)))
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+EXPORT_C CX509IPSubnetMask::~CX509IPSubnetMask()
+	{
+	delete iName;
+	}
+
+EXPORT_C TPtrC8 CX509IPSubnetMask::BaseAddress() const
+	{
+	TInt half = iName->Length()/2;
+	TPtrC8 ptr(&(iName->operator [] (0)), half);
+	return ptr;
+	}
+
+EXPORT_C TPtrC8 CX509IPSubnetMask::Mask() const
+	{
+	TInt half = iName->Length()/2;
+	TPtrC8 ptr(&(iName->operator [] (half)), half);
+	return ptr;
+	}
+
+CX509IPSubnetMask::CX509IPSubnetMask()
+	:iName(NULL)
+	{
+	}
+
+//ip address
+EXPORT_C CX509IPAddress* CX509IPAddress::NewL(const TDesC8& aBinaryData)
+	{
+	CX509IPAddress* self = CX509IPAddress::NewLC(aBinaryData);
+	CleanupStack::Pop();//self
+	return self;
+	}
+
+EXPORT_C CX509IPAddress* CX509IPAddress::NewLC(const TDesC8& aBinaryData)
+	{
+	CX509IPAddress* self = new(ELeave) CX509IPAddress;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData);
+	return self;
+	}
+
+void CX509IPAddress::ConstructL(const TDesC8& aBinaryData)
+	{
+	TASN1DecGeneric encAddr(aBinaryData);
+	encAddr.InitL();
+	iName = encAddr.GetContentDER().AllocL();
+	TInt len = iName->Length();
+	if (!(len == 4 || len == 16))
+		{
+		User::Leave(KErrArgument);
+		}
+	}
+
+EXPORT_C CX509IPAddress::~CX509IPAddress()
+	{
+	delete iName;
+	}
+
+EXPORT_C TBool CX509IPAddress::IsWithinSubtree(const CX509IPSubnetMask& aName) const
+	{
+	TInt addrLen = iName->Length();
+	if (((aName.iName->Length())/2) !=  addrLen)
+		{
+		return EFalse;
+		}
+	for (TInt i = 0; i < addrLen; i++)
+		{
+		//stop stupid compiler warning
+		TUint8 masked = (TUint8) ((iName->operator [] (i)) & (aName.iName->operator [] (i + addrLen)));
+		if (masked != (aName.iName->operator [] (i)))
+			{
+			return EFalse;
+			}
+		}
+	return ETrue;
+	}
+
+EXPORT_C TPtrC8 CX509IPAddress::Address() const
+	{
+	return iName->Des();
+	}
+
+CX509IPAddress::CX509IPAddress()
+	:iName(NULL)
+	{
+	}
+
+//*******************X.509 General Name**********************//
+EXPORT_C CX509GeneralName* CX509GeneralName::NewL(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	return CX509GeneralName::NewL(aBinaryData, pos);
+	}
+
+EXPORT_C CX509GeneralName* CX509GeneralName::NewLC(const TDesC8& aBinaryData)
+	{
+	TInt pos = 0;
+	return CX509GeneralName::NewLC(aBinaryData, pos);
+	}
+
+EXPORT_C CX509GeneralName* CX509GeneralName::NewL(const TDesC8& aBinaryData, TInt& aPos)
+	{
+	CX509GeneralName* self = CX509GeneralName::NewLC(aBinaryData, aPos);
+	CleanupStack::Pop();
+	return self;
+	}
+
+EXPORT_C CX509GeneralName* CX509GeneralName::NewLC(const TDesC8& aBinaryData, TInt& aPos)
+	{
+	CX509GeneralName* self = new(ELeave) CX509GeneralName;
+	CleanupStack::PushL(self);
+	self->ConstructL(aBinaryData, aPos);
+	return self;
+	}
+
+EXPORT_C CX509GeneralName* CX509GeneralName::NewL(const CX509GeneralName& aName)
+	{
+	CX509GeneralName* self = CX509GeneralName::NewLC(aName);
+	CleanupStack::Pop();
+	return self;
+	}
+
+EXPORT_C CX509GeneralName* CX509GeneralName::NewLC(const CX509GeneralName& aName)
+	{
+	CX509GeneralName* self = new(ELeave) CX509GeneralName(aName.iTag);
+	CleanupStack::PushL(self);
+	self->ConstructL(aName.iData->Des());
+	return self;
+	}
+
+void CX509GeneralName::ConstructL(const TDesC8& aBinaryData, TInt& aPos)
+	{
+	TASN1DecGeneric gen(aBinaryData.Right(aBinaryData.Length() - aPos));
+	gen.InitL();
+	aPos += gen.LengthDER();//add on header info
+	if (gen.Class() != EContextSpecific)
+		{
+		User::Leave(KErrArgument);
+		}
+	iData = gen.Tag() == 4 ? gen.GetContentDER().AllocL(): gen.Encoding().AllocL();
+	iTag = gen.Tag();
+	}
+
+void CX509GeneralName::ConstructL(const TDesC8& aData)
+	{
+	iData = aData.AllocL();
+	}
+
+CX509GeneralName::CX509GeneralName(TGNType aType)
+	:iTag(aType)
+	{
+	}
+
+CX509GeneralName::CX509GeneralName()
+	{
+	}
+
+EXPORT_C TGNType CX509GeneralName::Tag() const
+	{
+	return iTag;
+	}
+
+EXPORT_C TPtrC8 CX509GeneralName::Data() const
+	{
+	return iData->Des();
+	}
+
+EXPORT_C TBool CX509GeneralName::ExactMatch(const CX509GeneralName& /*aName*/) const
+	{
+	return EFalse;
+	}
+
+EXPORT_C CX509GeneralName::~CX509GeneralName()
+	{
+	delete iData;
+	}