aboutsummaryrefslogtreecommitdiffstats
path: root/src
diff options
context:
space:
mode:
authorlloyd <[email protected]>2006-06-23 04:26:45 +0000
committerlloyd <[email protected]>2006-06-23 04:26:45 +0000
commit754c16487b5c2f6ded58a251802ba72c74753282 (patch)
treec361d03ca2cf0dcb60b66351a8096eb70760e631 /src
parent96277a37c3b7125f2c79cb9c2df19d4811379a36 (diff)
Drop X509_Certificate::handle_v3_extension, since that code is
now handled by the Extensions class
Diffstat (limited to 'src')
-rw-r--r--src/x509cert.cpp111
1 files changed, 3 insertions, 108 deletions
diff --git a/src/x509cert.cpp b/src/x509cert.cpp
index 8f0a167f5..817f5a27d 100644
--- a/src/x509cert.cpp
+++ b/src/x509cert.cpp
@@ -116,25 +116,11 @@ void X509_Certificate::force_decode()
if(v3_exts_data.type_tag == 3 &&
v3_exts_data.class_tag == ASN1_Tag(CONSTRUCTED | CONTEXT_SPECIFIC))
{
- BER_Decoder v3_exts_decoder(v3_exts_data.value);
-
-#if 1
Extensions extensions;
- v3_exts_decoder.decode(extensions);
+
+ BER_Decoder(v3_exts_data.value).decode(extensions).verify_end();
extensions.contents_to(subject, issuer);
-#else
- BER_Decoder sequence = v3_exts_decoder.start_cons(SEQUENCE);
-
- while(sequence.more_items())
- {
- Extension extn;
- sequence.decode(extn);
- handle_v3_extension(extn);
- }
- sequence.verify_end();
-#endif
- v3_exts_decoder.verify_end();
}
else if(v3_exts_data.type_tag != NO_OBJECT)
throw BER_Bad_Tag("Unknown tag in X.509 cert",
@@ -167,98 +153,6 @@ void X509_Certificate::force_decode()
}
/*************************************************
-* Decode a particular v3 extension *
-*************************************************/
-void X509_Certificate::handle_v3_extension(const Extension& extn)
- {
- BER_Decoder value(extn.value);
-
- if(extn.oid == OIDS::lookup("X509v3.KeyUsage"))
- {
- Key_Constraints constraints;
- BER::decode(value, constraints);
-
- if(constraints != NO_CONSTRAINTS)
- subject.add("X509v3.KeyUsage", constraints);
- }
- else if(extn.oid == OIDS::lookup("X509v3.ExtendedKeyUsage"))
- {
- BER_Decoder key_usage = value.start_cons(SEQUENCE);
- while(key_usage.more_items())
- {
- OID usage_oid;
- key_usage.decode(usage_oid);
- subject.add("X509v3.ExtendedKeyUsage", usage_oid.as_string());
- }
- }
- else if(extn.oid == OIDS::lookup("X509v3.BasicConstraints"))
- {
- u32bit max_path_len = 0;
- bool is_ca = false;
-
- value.start_cons(SEQUENCE)
- .decode_optional(is_ca, BOOLEAN, UNIVERSAL, false)
- .decode_optional(max_path_len, INTEGER, UNIVERSAL,
- NO_CERT_PATH_LIMIT)
- .verify_end()
- .end_cons();
-
- subject.add("X509v3.BasicConstraints.is_ca", (is_ca ? 1 : 0));
- subject.add("X509v3.BasicConstraints.path_constraint", max_path_len);
- }
- else if(extn.oid == OIDS::lookup("X509v3.SubjectKeyIdentifier"))
- {
- MemoryVector<byte> v3_subject_key_id;
- value.decode(v3_subject_key_id, OCTET_STRING);
- subject.add("X509v3.SubjectKeyIdentifier", v3_subject_key_id);
- }
- else if(extn.oid == OIDS::lookup("X509v3.AuthorityKeyIdentifier"))
- {
- MemoryVector<byte> v3_issuer_key_id;
- BER_Decoder key_id = value.start_cons(SEQUENCE);
- key_id.decode_optional_string(v3_issuer_key_id, OCTET_STRING, 0);
-
- issuer.add("X509v3.AuthorityKeyIdentifier", v3_issuer_key_id);
- }
- else if(extn.oid == OIDS::lookup("X509v3.SubjectAlternativeName"))
- {
- AlternativeName alt_name;
- value.decode(alt_name);
- subject.add(alt_name.contents());
- }
- else if(extn.oid == OIDS::lookup("X509v3.IssuerAlternativeName"))
- {
- AlternativeName alt_name;
- value.decode(alt_name);
- issuer.add(alt_name.contents());
- }
- else if(extn.oid == OIDS::lookup("X509v3.CertificatePolicies"))
- {
- BER_Decoder ber_policies = value.start_cons(SEQUENCE);
- while(ber_policies.more_items())
- {
- OID oid;
- BER_Decoder policy = ber_policies.start_cons(SEQUENCE);
- policy.decode(oid);
-
- if(extn.critical && policy.more_items())
- throw Decoding_Error("X.509 v3 critical policy has qualifiers");
-
- subject.add("X509v3.CertificatePolicies", oid.as_string());
- }
- }
- else
- {
- if(extn.critical)
- throw Decoding_Error("Unknown critical X.509 v3 extension: " +
- extn.oid.as_string());
- return;
- }
-
- value.verify_end();
- }
-
-/*************************************************
* Return the X.509 version in use *
*************************************************/
u32bit X509_Certificate::x509_version() const
@@ -400,6 +294,7 @@ bool X509_Certificate::operator==(const X509_Certificate& other) const
{
return (sig == other.sig &&
sig_algo == other.sig_algo &&
+ self_signed == other.self_signed &&
issuer == other.issuer &&
subject == other.subject);
}