cmpcert.c

来自「支持SSL v2/v3, TLS, PKCS #5, PKCS #7, PKCS」· C语言 代码 · 共 118 行

C
118
字号
/* * NSS utility functions * * The contents of this file are subject to the Mozilla Public * License Version 1.1 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.mozilla.org/MPL/ *  * Software distributed under the License is distributed on an "AS * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or * implied. See the License for the specific language governing * rights and limitations under the License. *  * The Original Code is the Netscape security libraries. *  * The Initial Developer of the Original Code is Netscape * Communications Corporation.  Portions created by Netscape are  * Copyright (C) 1994-2000 Netscape Communications Corporation.  All * Rights Reserved. *  * Contributor(s): *  * Alternatively, the contents of this file may be used under the * terms of the GNU General Public License Version 2 or later (the * "GPL"), in which case the provisions of the GPL are applicable  * instead of those above.  If you wish to allow use of your  * version of this file only under the terms of the GPL and not to * allow others to use your version of this file under the MPL, * indicate your decision by deleting the provisions above and * replace them with the notice and other provisions required by * the GPL.  If you do not delete the provisions above, a recipient * may use your version of this file under either the MPL or the * GPL. * * $Id: cmpcert.c,v 1.1 2000/03/31 19:31:24 relyea%netscape.com Exp $ */#include <stdio.h>#include <string.h>#include "prerror.h"#include "secitem.h"#include "prnetdb.h"#include "cert.h"#include "nspr.h"#include "secder.h"#include "key.h"#include "nss.h"/* * Look to see if any of the signers in the cert chain for "cert" are found * in the list of caNames.   * Returns SECSuccess if so, SECFailure if not. */SECStatusNSS_CmpCertChainWCANames(CERTCertificate *cert, CERTDistNames *caNames){  SECItem *         caname;  CERTCertificate * curcert;  CERTCertificate * oldcert;  PRInt32           contentlen;  int               j;  int               headerlen;  int               depth;  SECStatus         rv;  SECItem           issuerName;  SECItem           compatIssuerName;    depth=0;  curcert = CERT_DupCertificate(cert);    while( curcert ) {    issuerName = curcert->derIssuer;        /* compute an alternate issuer name for compatibility with 2.0     * enterprise server, which send the CA names without     * the outer layer of DER hearder     */    rv = DER_Lengths(&issuerName, &headerlen, (uint32 *)&contentlen);    if ( rv == SECSuccess ) {      compatIssuerName.data = &issuerName.data[headerlen];      compatIssuerName.len = issuerName.len - headerlen;    } else {      compatIssuerName.data = NULL;      compatIssuerName.len = 0;    }        for (j = 0; j < caNames->nnames; j++) {      caname = &caNames->names[j];      if (SECITEM_CompareItem(&issuerName, caname) == SECEqual) {	rv = SECSuccess;	CERT_DestroyCertificate(curcert);	goto done;      } else if (SECITEM_CompareItem(&compatIssuerName, caname) == SECEqual) {	rv = SECSuccess;	CERT_DestroyCertificate(curcert);	goto done;      }    }    if ( ( depth <= 20 ) &&	 ( SECITEM_CompareItem(&curcert->derIssuer, &curcert->derSubject)	   != SECEqual ) ) {      oldcert = curcert;      curcert = CERT_FindCertByName(curcert->dbhandle,				    &curcert->derIssuer);      CERT_DestroyCertificate(oldcert);      depth++;    } else {      CERT_DestroyCertificate(curcert);      curcert = NULL;    }  }  rv = SECFailure;  done:  return rv;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?