File: AppSignatureVerification.h

package info (click to toggle)
firefox 147.0-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 4,683,324 kB
  • sloc: cpp: 7,607,156; javascript: 6,532,492; ansic: 3,775,158; python: 1,415,368; xml: 634,556; asm: 438,949; java: 186,241; sh: 62,751; makefile: 18,079; objc: 13,092; perl: 12,808; yacc: 4,583; cs: 3,846; pascal: 3,448; lex: 1,720; ruby: 1,003; php: 436; lisp: 258; awk: 247; sql: 66; sed: 54; csh: 10; exp: 6
file content (43 lines) | stat: -rw-r--r-- 1,888 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#ifndef AppSignatureVerification_h
#define AppSignatureVerification_h

#include "mozpkix/pkix.h"
#include "mozpkix/pkixnss.h"
#include "mozpkix/pkixutil.h"

// From the list of collectedCerts it gets the SignerCertificate based on
// issuerAndSN.
mozilla::Span<const uint8_t> GetPKCS7SignerCert(
    NSSCMSSignerInfo* signerInfo,
    nsTArray<mozilla::Span<const uint8_t>>& collectedCerts);

// Checks that the ContentType is PKCS7 and returns a pointer to inner content.
NSSCMSSignedData* GetSignedDataContent(NSSCMSMessage* cmsg);

// Gets a list of certificates from the CMS message
void CollectCertificates(
    NSSCMSSignedData* signedData,
    /* out */ nsTArray<mozilla::Span<const uint8_t>>& collectedCerts);

nsresult VerifySignatureFromCertificate(
    mozilla::Span<const uint8_t> signerCertSpan, NSSCMSSignerInfo* signerInfo,
    SECItem* detachedDigest);

// The function returns prioritized list of (signerInfo, digestAlgorithm
// [used to compute the signature digest of the message in signedInfo]).
// The returned signerInfo is owned by signedData, so the caller must ensure
// that the lifetime of the signerInfo is contained by the lifetime of the
// signedData.
// supportedDigestAlgorithms 1st algorithm has the highest priority, i.e.
// the function will first check if there is any SignerInfo
// with the highest priority digest algorithm.
void GetAllSignerInfosForSupportedDigestAlgorithms(
    NSSCMSSignedData* signedData,
    /* out */ nsTArray<std::tuple<NSSCMSSignerInfo*, SECOidTag>>& signerInfos);
#endif  // AppSignatureVerification_h