mirror of
https://github.com/mozilla/gecko-dev.git
synced 2025-02-28 05:10:49 +00:00
Bug 374336, add knowledge of Extended Validation / EV Certificates to PSM r=rrelyea, a=mconnor/beltzner
This commit is contained in:
parent
71fdcd6817
commit
0762d8a400
@ -225,6 +225,7 @@ CertDumpHold=Certificate Hold
|
|||||||
CertDumpOCSPResponder=OCSP
|
CertDumpOCSPResponder=OCSP
|
||||||
CertDumpCAIssuers=CA Issuers
|
CertDumpCAIssuers=CA Issuers
|
||||||
CertDumpCPSPointer=Certification Practice Statement pointer
|
CertDumpCPSPointer=Certification Practice Statement pointer
|
||||||
|
CertDumpPolicyOidEV=Extended Validation (EV) SSL Server Certificate
|
||||||
CertDumpUserNotice=User Notice
|
CertDumpUserNotice=User Notice
|
||||||
CertDumpLogotype=Logotype
|
CertDumpLogotype=Logotype
|
||||||
CertDumpECPublicKey=Elliptic Curve Public Key
|
CertDumpECPublicKey=Elliptic Curve Public Key
|
||||||
|
@ -36,9 +36,27 @@
|
|||||||
|
|
||||||
#include "nsISupports.idl"
|
#include "nsISupports.idl"
|
||||||
|
|
||||||
[scriptable, uuid(e72546a4-9b57-4766-a3aa-c05cbc7d8156)]
|
[scriptable, uuid(e9da87b8-b87c-4bd1-a6bc-5a9a2c7f6d8d)]
|
||||||
interface nsIIdentityInfo : nsISupports
|
interface nsIIdentityInfo : nsISupports
|
||||||
{
|
{
|
||||||
|
/**
|
||||||
|
* A "true" value means:
|
||||||
|
* The object that implements this interface uses a certificate that
|
||||||
|
* was successfully verified as an Extended Validation (EV) cert.
|
||||||
|
* The test is bound to SSL Server Cert Usage.
|
||||||
|
*/
|
||||||
readonly attribute boolean isExtendedValidation;
|
readonly attribute boolean isExtendedValidation;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This function uses the same test as attribute
|
||||||
|
* isExtendedValidation
|
||||||
|
*
|
||||||
|
* If isExtendedValidation is true, this function will return
|
||||||
|
* a policy identifier in dotted notation (like 1.2.3.4.5).
|
||||||
|
*
|
||||||
|
* If isExtendedValidation is false, this function will return
|
||||||
|
* an empty (length string) value.
|
||||||
|
*/
|
||||||
|
ACString getValidEVPolicyOid();
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -1,4 +1,455 @@
|
|||||||
|
#include "nsAppDirectoryServiceDefs.h"
|
||||||
|
#include "nsStreamUtils.h"
|
||||||
|
#include "nsNetUtil.h"
|
||||||
|
#include "nsILineInputStream.h"
|
||||||
|
#include "nsPromiseFlatString.h"
|
||||||
|
#include "nsTArray.h"
|
||||||
|
|
||||||
|
#include "cert.h"
|
||||||
|
#include "nsNSSComponent.h"
|
||||||
#include "nsNSSIOLayer.h"
|
#include "nsNSSIOLayer.h"
|
||||||
|
#include "nsNSSCertificate.h"
|
||||||
|
#include "nsNSSCleaner.h"
|
||||||
|
|
||||||
|
#ifdef DEBUG
|
||||||
|
#ifndef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
#define PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
NSSCleanupAutoPtrClass(CERTCertificate, CERT_DestroyCertificate)
|
||||||
|
NSSCleanupAutoPtrClass(CERTCertList, CERT_DestroyCertList)
|
||||||
|
NSSCleanupAutoPtrClass_WithParam(SECItem, SECITEM_FreeItem, TrueParam, PR_TRUE)
|
||||||
|
|
||||||
|
#define CONST_OID static const unsigned char
|
||||||
|
#define OI(x) { siDEROID, (unsigned char *)x, sizeof x }
|
||||||
|
|
||||||
|
struct nsMyTrustedEVInfo
|
||||||
|
{
|
||||||
|
const char *dotted_oid;
|
||||||
|
const char *oid_name; // Set this to null to signal an invalid structure,
|
||||||
|
// (We can't have an empty list, so we'll use a dummy entry)
|
||||||
|
SECOidTag oid_tag;
|
||||||
|
const char *ev_root_subject;
|
||||||
|
const char *ev_root_issuer;
|
||||||
|
const char *ev_root_sha1_fingerprint;
|
||||||
|
};
|
||||||
|
|
||||||
|
static struct nsMyTrustedEVInfo myTrustedEVInfos[] = {
|
||||||
|
{
|
||||||
|
"0.0.0.0",
|
||||||
|
0, // for real entries use a string like "Sample INVALID EV OID"
|
||||||
|
SEC_OID_UNKNOWN,
|
||||||
|
"OU=Sample Certification Authority,O=\"Sample, Inc.\",C=US",
|
||||||
|
"OU=Sample Certification Authority,O=\"Sample, Inc.\",C=US",
|
||||||
|
"00:11:22:33:44:55:66:77:88:99:AA:BB:CC:DD:EE:FF:00:11:22:33"
|
||||||
|
}
|
||||||
|
};
|
||||||
|
|
||||||
|
static SECOidTag
|
||||||
|
register_oid(const SECItem *oid_item, const char *oid_name)
|
||||||
|
{
|
||||||
|
if (!oid_item)
|
||||||
|
return SEC_OID_UNKNOWN;
|
||||||
|
|
||||||
|
SECOidData od;
|
||||||
|
od.oid.len = oid_item->len;
|
||||||
|
od.oid.data = oid_item->data;
|
||||||
|
od.offset = SEC_OID_UNKNOWN;
|
||||||
|
od.desc = oid_name;
|
||||||
|
od.mechanism = CKM_INVALID_MECHANISM;
|
||||||
|
od.supportedExtension = INVALID_CERT_EXTENSION;
|
||||||
|
return SECOID_AddEntry(&od);
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
class nsMyTrustedEVInfoClass : public nsMyTrustedEVInfo
|
||||||
|
{
|
||||||
|
public:
|
||||||
|
nsMyTrustedEVInfoClass();
|
||||||
|
~nsMyTrustedEVInfoClass();
|
||||||
|
};
|
||||||
|
|
||||||
|
nsMyTrustedEVInfoClass::nsMyTrustedEVInfoClass()
|
||||||
|
{
|
||||||
|
dotted_oid = nsnull;
|
||||||
|
oid_name = nsnull;
|
||||||
|
oid_tag = SEC_OID_UNKNOWN;
|
||||||
|
ev_root_subject = nsnull;
|
||||||
|
ev_root_issuer = nsnull;
|
||||||
|
ev_root_sha1_fingerprint = nsnull;
|
||||||
|
}
|
||||||
|
|
||||||
|
nsMyTrustedEVInfoClass::~nsMyTrustedEVInfoClass()
|
||||||
|
{
|
||||||
|
delete dotted_oid;
|
||||||
|
delete oid_name;
|
||||||
|
delete ev_root_subject;
|
||||||
|
delete ev_root_issuer;
|
||||||
|
delete ev_root_sha1_fingerprint;
|
||||||
|
}
|
||||||
|
|
||||||
|
typedef nsTArray< nsMyTrustedEVInfoClass* > testEVArray;
|
||||||
|
static testEVArray *testEVInfos;
|
||||||
|
static PRBool testEVInfosLoaded = PR_FALSE;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static PRBool isEVMatch(SECOidTag policyOIDTag,
|
||||||
|
CERTCertificate *rootCert,
|
||||||
|
const nsMyTrustedEVInfo &info)
|
||||||
|
{
|
||||||
|
if (!rootCert)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
NS_ConvertUTF8toUTF16 info_subject(info.ev_root_subject);
|
||||||
|
NS_ConvertUTF8toUTF16 info_issuer(info.ev_root_issuer);
|
||||||
|
NS_ConvertASCIItoUTF16 info_sha1(info.ev_root_sha1_fingerprint);
|
||||||
|
|
||||||
|
nsNSSCertificate c(rootCert);
|
||||||
|
|
||||||
|
nsAutoString subjectName;
|
||||||
|
if (NS_FAILED(c.GetSubjectName(subjectName)))
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
if (subjectName != info_subject)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
nsAutoString issuerName;
|
||||||
|
if (NS_FAILED(c.GetIssuerName(issuerName)))
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
if (issuerName != info_issuer)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
nsAutoString fingerprint;
|
||||||
|
if (NS_FAILED(c.GetSha1Fingerprint(fingerprint)))
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
if (fingerprint != info_sha1)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
return (policyOIDTag == info.oid_tag);
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
static const char kTestEVRootsFileName[] = "test_ev_roots.txt";
|
||||||
|
|
||||||
|
static void
|
||||||
|
loadTestEVInfos()
|
||||||
|
{
|
||||||
|
if (!testEVInfos)
|
||||||
|
return;
|
||||||
|
|
||||||
|
testEVInfos->Clear();
|
||||||
|
|
||||||
|
char *env_val = getenv("ENABLE_TEST_EV_ROOTS_FILE");
|
||||||
|
if (!env_val)
|
||||||
|
return;
|
||||||
|
|
||||||
|
int enabled_val = atoi(env_val);
|
||||||
|
if (!enabled_val)
|
||||||
|
return;
|
||||||
|
|
||||||
|
nsCOMPtr<nsIFile> aFile;
|
||||||
|
NS_GetSpecialDirectory(NS_APP_USER_PROFILE_50_DIR, getter_AddRefs(aFile));
|
||||||
|
if (!aFile)
|
||||||
|
return;
|
||||||
|
|
||||||
|
aFile->AppendNative(NS_LITERAL_CSTRING(kTestEVRootsFileName));
|
||||||
|
|
||||||
|
nsresult rv;
|
||||||
|
nsCOMPtr<nsIInputStream> fileInputStream;
|
||||||
|
rv = NS_NewLocalFileInputStream(getter_AddRefs(fileInputStream), aFile);
|
||||||
|
if (NS_FAILED(rv))
|
||||||
|
return;
|
||||||
|
|
||||||
|
nsCOMPtr<nsILineInputStream> lineInputStream = do_QueryInterface(fileInputStream, &rv);
|
||||||
|
if (NS_FAILED(rv))
|
||||||
|
return;
|
||||||
|
|
||||||
|
nsCAutoString buffer;
|
||||||
|
PRBool isMore = PR_TRUE;
|
||||||
|
|
||||||
|
/* file format
|
||||||
|
*
|
||||||
|
* file format must be strictly followed
|
||||||
|
* strings in file must be UTF-8
|
||||||
|
* each record consists of multiple lines
|
||||||
|
* each line consists of a descriptor, a single space, and the data
|
||||||
|
* the descriptors are:
|
||||||
|
* 1_subject
|
||||||
|
* 2_issuer
|
||||||
|
* 3_fingerprint (in format XX:XX:XX:...)
|
||||||
|
* 4_readable_oid (treated as a comment)
|
||||||
|
* the input file must strictly follow this order
|
||||||
|
* the input file may contain 0, 1 or many records
|
||||||
|
* completely empty lines are ignored
|
||||||
|
* lines that start with the # char are ignored
|
||||||
|
*/
|
||||||
|
|
||||||
|
int line_counter = 0;
|
||||||
|
PRBool found_error = PR_FALSE;
|
||||||
|
|
||||||
|
enum {
|
||||||
|
pos_subject, pos_issuer, pos_fingerprint, pos_readable_oid
|
||||||
|
} reader_position = pos_subject;
|
||||||
|
|
||||||
|
nsCString subject, issuer, fingerprint, readable_oid;
|
||||||
|
|
||||||
|
while (isMore && NS_SUCCEEDED(lineInputStream->ReadLine(buffer, &isMore))) {
|
||||||
|
++line_counter;
|
||||||
|
if (buffer.IsEmpty() || buffer.First() == '#') {
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
|
||||||
|
PRInt32 seperatorIndex = buffer.FindChar(' ', 0);
|
||||||
|
if (seperatorIndex == 0) {
|
||||||
|
found_error = PR_TRUE;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
const nsASingleFragmentCString &descriptor = Substring(buffer, 0, seperatorIndex);
|
||||||
|
const nsASingleFragmentCString &data =
|
||||||
|
Substring(buffer, seperatorIndex + 1,
|
||||||
|
buffer.Length() - seperatorIndex + 1);
|
||||||
|
|
||||||
|
if (reader_position == pos_subject &&
|
||||||
|
descriptor.EqualsLiteral(("1_subject"))) {
|
||||||
|
subject = data;
|
||||||
|
reader_position = pos_issuer;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
else if (reader_position == pos_issuer &&
|
||||||
|
descriptor.EqualsLiteral(("2_issuer"))) {
|
||||||
|
issuer = data;
|
||||||
|
reader_position = pos_fingerprint;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
else if (reader_position == pos_fingerprint &&
|
||||||
|
descriptor.EqualsLiteral(("3_fingerprint"))) {
|
||||||
|
fingerprint = data;
|
||||||
|
reader_position = pos_readable_oid;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
else if (reader_position == pos_readable_oid &&
|
||||||
|
descriptor.EqualsLiteral(("4_readable_oid"))) {
|
||||||
|
readable_oid = data;
|
||||||
|
reader_position = pos_subject;
|
||||||
|
}
|
||||||
|
else {
|
||||||
|
found_error = PR_TRUE;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
nsMyTrustedEVInfoClass *temp_ev = new nsMyTrustedEVInfoClass;
|
||||||
|
if (!temp_ev)
|
||||||
|
return;
|
||||||
|
|
||||||
|
temp_ev->ev_root_subject = strdup(subject.get());
|
||||||
|
temp_ev->ev_root_issuer = strdup(issuer.get());
|
||||||
|
temp_ev->ev_root_sha1_fingerprint = strdup(fingerprint.get());
|
||||||
|
temp_ev->oid_name = strdup(readable_oid.get());
|
||||||
|
temp_ev->dotted_oid = strdup(readable_oid.get());
|
||||||
|
|
||||||
|
SECItem ev_oid_item;
|
||||||
|
ev_oid_item.data = nsnull;
|
||||||
|
ev_oid_item.len = 0;
|
||||||
|
SECStatus srv = SEC_StringToOID(nsnull, &ev_oid_item,
|
||||||
|
readable_oid.get(), readable_oid.Length());
|
||||||
|
if (srv != SECSuccess) {
|
||||||
|
delete temp_ev;
|
||||||
|
found_error = PR_TRUE;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
temp_ev->oid_tag = register_oid(&ev_oid_item, temp_ev->oid_name);
|
||||||
|
SECITEM_FreeItem(&ev_oid_item, PR_FALSE);
|
||||||
|
|
||||||
|
testEVInfos->AppendElement(temp_ev);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (found_error) {
|
||||||
|
fprintf(stderr, "invalid line %d in test_ev_roots file\n", line_counter);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static PRBool
|
||||||
|
isEVPolicyInExternalDebugRootsFile(SECOidTag policyOIDTag)
|
||||||
|
{
|
||||||
|
if (!testEVInfos)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
char *env_val = getenv("ENABLE_TEST_EV_ROOTS_FILE");
|
||||||
|
if (!env_val)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
int enabled_val = atoi(env_val);
|
||||||
|
if (!enabled_val)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
for (size_t i=0; i<testEVInfos->Length(); ++i) {
|
||||||
|
nsMyTrustedEVInfoClass *ev = testEVInfos->ElementAt(i);
|
||||||
|
if (!ev)
|
||||||
|
continue;
|
||||||
|
if (policyOIDTag == ev->oid_tag)
|
||||||
|
return PR_TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
return PR_FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
static PRBool
|
||||||
|
isEVMatchInExternalDebugRootsFile(SECOidTag policyOIDTag,
|
||||||
|
CERTCertificate *rootCert)
|
||||||
|
{
|
||||||
|
if (!testEVInfos)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
if (!rootCert)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
char *env_val = getenv("ENABLE_TEST_EV_ROOTS_FILE");
|
||||||
|
if (!env_val)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
int enabled_val = atoi(env_val);
|
||||||
|
if (!enabled_val)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
for (size_t i=0; i<testEVInfos->Length(); ++i) {
|
||||||
|
nsMyTrustedEVInfoClass *ev = testEVInfos->ElementAt(i);
|
||||||
|
if (!ev)
|
||||||
|
continue;
|
||||||
|
if (isEVMatch(policyOIDTag, rootCert, *ev))
|
||||||
|
return PR_TRUE;
|
||||||
|
}
|
||||||
|
|
||||||
|
return PR_FALSE;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static PRBool
|
||||||
|
isEVPolicy(SECOidTag policyOIDTag)
|
||||||
|
{
|
||||||
|
for (size_t iEV=0; iEV < (sizeof(myTrustedEVInfos)/sizeof(nsMyTrustedEVInfo)); ++iEV) {
|
||||||
|
nsMyTrustedEVInfo &entry = myTrustedEVInfos[iEV];
|
||||||
|
if (!entry.oid_name) // invalid or placeholder list entry
|
||||||
|
continue;
|
||||||
|
if (policyOIDTag == entry.oid_tag) {
|
||||||
|
return PR_TRUE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
if (isEVPolicyInExternalDebugRootsFile(policyOIDTag)) {
|
||||||
|
return PR_TRUE;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return PR_FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
static PRBool
|
||||||
|
isApprovedForEV(SECOidTag policyOIDTag, CERTCertificate *rootCert)
|
||||||
|
{
|
||||||
|
if (!rootCert)
|
||||||
|
return PR_FALSE;
|
||||||
|
|
||||||
|
for (size_t iEV=0; iEV < (sizeof(myTrustedEVInfos)/sizeof(nsMyTrustedEVInfo)); ++iEV) {
|
||||||
|
nsMyTrustedEVInfo &entry = myTrustedEVInfos[iEV];
|
||||||
|
if (!entry.oid_name) // invalid or placeholder list entry
|
||||||
|
continue;
|
||||||
|
if (isEVMatch(policyOIDTag, rootCert, entry)) {
|
||||||
|
return PR_TRUE;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
if (isEVMatchInExternalDebugRootsFile(policyOIDTag, rootCert)) {
|
||||||
|
return PR_TRUE;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return PR_FALSE;
|
||||||
|
}
|
||||||
|
|
||||||
|
PRStatus PR_CALLBACK
|
||||||
|
nsNSSComponent::IdentityInfoInit()
|
||||||
|
{
|
||||||
|
for (size_t iEV=0; iEV < (sizeof(myTrustedEVInfos)/sizeof(nsMyTrustedEVInfo)); ++iEV) {
|
||||||
|
nsMyTrustedEVInfo &entry = myTrustedEVInfos[iEV];
|
||||||
|
if (!entry.oid_name) // invalid or placeholder list entry
|
||||||
|
continue;
|
||||||
|
|
||||||
|
SECItem ev_oid_item;
|
||||||
|
ev_oid_item.data = nsnull;
|
||||||
|
ev_oid_item.len = 0;
|
||||||
|
SECStatus srv = SEC_StringToOID(nsnull, &ev_oid_item,
|
||||||
|
entry.dotted_oid, 0);
|
||||||
|
if (srv != SECSuccess)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
entry.oid_tag = register_oid(&ev_oid_item, entry.oid_name);
|
||||||
|
|
||||||
|
SECITEM_FreeItem(&ev_oid_item, PR_FALSE);
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
if (!testEVInfosLoaded) {
|
||||||
|
testEVInfosLoaded = PR_TRUE;
|
||||||
|
testEVInfos = new testEVArray;
|
||||||
|
if (testEVInfos) {
|
||||||
|
loadTestEVInfos();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return PR_SUCCESS;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Find the first policy OID that is known to be an EV policy OID.
|
||||||
|
static SECStatus getFirstEVPolicy(CERTCertificate *cert, SECOidTag &outOidTag)
|
||||||
|
{
|
||||||
|
if (!cert)
|
||||||
|
return SECFailure;
|
||||||
|
|
||||||
|
if (cert->extensions) {
|
||||||
|
for (int i=0; cert->extensions[i] != nsnull; i++) {
|
||||||
|
const SECItem *oid = &cert->extensions[i]->id;
|
||||||
|
|
||||||
|
SECOidTag oidTag = SECOID_FindOIDTag(oid);
|
||||||
|
if (oidTag != SEC_OID_X509_CERTIFICATE_POLICIES)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
SECItem *value = &cert->extensions[i]->value;
|
||||||
|
|
||||||
|
CERTCertificatePolicies *policies;
|
||||||
|
CERTPolicyInfo **policyInfos, *policyInfo;
|
||||||
|
|
||||||
|
policies = CERT_DecodeCertificatePoliciesExtension(value);
|
||||||
|
if (!policies)
|
||||||
|
continue;
|
||||||
|
|
||||||
|
policyInfos = policies->policyInfos;
|
||||||
|
|
||||||
|
while (*policyInfos != NULL) {
|
||||||
|
policyInfo = *policyInfos++;
|
||||||
|
|
||||||
|
SECOidTag oid_tag = SECOID_FindOIDTag(&policyInfo->policyID);
|
||||||
|
if (oid_tag == SEC_OID_UNKNOWN) // not in our list of OIDs accepted for EV
|
||||||
|
continue;
|
||||||
|
|
||||||
|
if (!isEVPolicy(oid_tag))
|
||||||
|
continue;
|
||||||
|
|
||||||
|
outOidTag = oid_tag;
|
||||||
|
return SECSuccess;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return SECFailure;
|
||||||
|
}
|
||||||
|
|
||||||
NS_IMETHODIMP
|
NS_IMETHODIMP
|
||||||
nsNSSSocketInfo::GetIsExtendedValidation(PRBool* aIsEV)
|
nsNSSSocketInfo::GetIsExtendedValidation(PRBool* aIsEV)
|
||||||
@ -6,6 +457,139 @@ nsNSSSocketInfo::GetIsExtendedValidation(PRBool* aIsEV)
|
|||||||
NS_ENSURE_ARG(aIsEV);
|
NS_ENSURE_ARG(aIsEV);
|
||||||
*aIsEV = PR_FALSE;
|
*aIsEV = PR_FALSE;
|
||||||
|
|
||||||
|
if (!mCert)
|
||||||
|
return NS_OK;
|
||||||
|
|
||||||
|
return mCert->GetIsExtendedValidation(aIsEV);
|
||||||
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsNSSSocketInfo::GetValidEVPolicyOid(nsACString &outDottedOid)
|
||||||
|
{
|
||||||
|
if (!mCert)
|
||||||
|
return NS_OK;
|
||||||
|
|
||||||
|
return mCert->GetValidEVPolicyOid(outDottedOid);
|
||||||
|
}
|
||||||
|
|
||||||
|
nsresult
|
||||||
|
nsNSSCertificate::hasValidEVOidTag(SECOidTag &resultOidTag, PRBool &validEV)
|
||||||
|
{
|
||||||
|
nsNSSShutDownPreventionLock locker;
|
||||||
|
if (isAlreadyShutDown())
|
||||||
|
return NS_ERROR_NOT_AVAILABLE;
|
||||||
|
|
||||||
|
nsresult nrv;
|
||||||
|
nsCOMPtr<nsINSSComponent> nssComponent =
|
||||||
|
do_GetService(PSM_COMPONENT_CONTRACTID, &nrv);
|
||||||
|
if (NS_FAILED(nrv))
|
||||||
|
return nrv;
|
||||||
|
nssComponent->EnsureIdentityInfoLoaded();
|
||||||
|
|
||||||
|
validEV = PR_FALSE;
|
||||||
|
resultOidTag = SEC_OID_UNKNOWN;
|
||||||
|
|
||||||
|
SECOidTag oid_tag;
|
||||||
|
SECStatus rv = getFirstEVPolicy(mCert, oid_tag);
|
||||||
|
if (rv != SECSuccess)
|
||||||
|
return NS_OK;
|
||||||
|
|
||||||
|
if (oid_tag == SEC_OID_UNKNOWN) // not in our list of OIDs accepted for EV
|
||||||
|
return NS_OK;
|
||||||
|
|
||||||
|
CERTValInParam cvin[3];
|
||||||
|
cvin[0].type = cert_pi_policyOID;
|
||||||
|
cvin[0].value.arraySize = 1;
|
||||||
|
cvin[0].value.array.oids = &oid_tag;
|
||||||
|
cvin[1].type = cert_pi_revocationFlags;
|
||||||
|
cvin[1].value.scalar.ul = CERT_REV_FLAG_OCSP
|
||||||
|
| CERT_REV_FLAG_CRL;
|
||||||
|
cvin[2].type = cert_pi_end;
|
||||||
|
|
||||||
|
CERTValOutParam cvout[2];
|
||||||
|
cvout[0].type = cert_po_trustAnchor;
|
||||||
|
cvout[1].type = cert_po_end;
|
||||||
|
|
||||||
|
rv = CERT_PKIXVerifyCert(mCert, certificateUsageSSLServer,
|
||||||
|
cvin, cvout, nsnull);
|
||||||
|
if (rv != SECSuccess)
|
||||||
|
return NS_OK;
|
||||||
|
|
||||||
|
CERTCertificate *issuerCert = cvout[0].value.pointer.cert;
|
||||||
|
CERTCertificateCleaner issuerCleaner(issuerCert);
|
||||||
|
|
||||||
|
validEV = isApprovedForEV(oid_tag, issuerCert);
|
||||||
|
if (validEV)
|
||||||
|
resultOidTag = oid_tag;
|
||||||
|
|
||||||
return NS_OK;
|
return NS_OK;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsNSSCertificate::GetIsExtendedValidation(PRBool* aIsEV)
|
||||||
|
{
|
||||||
|
nsNSSShutDownPreventionLock locker;
|
||||||
|
if (isAlreadyShutDown())
|
||||||
|
return NS_ERROR_NOT_AVAILABLE;
|
||||||
|
|
||||||
|
NS_ENSURE_ARG(aIsEV);
|
||||||
|
*aIsEV = PR_FALSE;
|
||||||
|
|
||||||
|
SECOidTag oid_tag;
|
||||||
|
return hasValidEVOidTag(oid_tag, *aIsEV);
|
||||||
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsNSSCertificate::GetValidEVPolicyOid(nsACString &outDottedOid)
|
||||||
|
{
|
||||||
|
nsNSSShutDownPreventionLock locker;
|
||||||
|
if (isAlreadyShutDown())
|
||||||
|
return NS_ERROR_NOT_AVAILABLE;
|
||||||
|
|
||||||
|
SECOidTag oid_tag;
|
||||||
|
PRBool valid;
|
||||||
|
nsresult rv = hasValidEVOidTag(oid_tag, valid);
|
||||||
|
if (NS_FAILED(rv))
|
||||||
|
return rv;
|
||||||
|
|
||||||
|
if (valid) {
|
||||||
|
SECOidData *oid_data = SECOID_FindOIDByTag(oid_tag);
|
||||||
|
if (!oid_data)
|
||||||
|
return NS_ERROR_FAILURE;
|
||||||
|
|
||||||
|
char *oid_str = CERT_GetOidString(&oid_data->oid);
|
||||||
|
if (!oid_str)
|
||||||
|
return NS_ERROR_FAILURE;
|
||||||
|
|
||||||
|
outDottedOid = oid_str;
|
||||||
|
PR_smprintf_free(oid_str);
|
||||||
|
}
|
||||||
|
return NS_OK;
|
||||||
|
}
|
||||||
|
|
||||||
|
NS_IMETHODIMP
|
||||||
|
nsNSSComponent::EnsureIdentityInfoLoaded()
|
||||||
|
{
|
||||||
|
PRStatus rv = PR_CallOnce(&mIdentityInfoCallOnce, IdentityInfoInit);
|
||||||
|
return (rv == PR_SUCCESS) ? NS_OK : NS_ERROR_FAILURE;
|
||||||
|
}
|
||||||
|
|
||||||
|
// only called during shutdown
|
||||||
|
void
|
||||||
|
nsNSSComponent::CleanupIdentityInfo()
|
||||||
|
{
|
||||||
|
#ifdef PSM_ENABLE_TEST_EV_ROOTS
|
||||||
|
if (testEVInfosLoaded) {
|
||||||
|
testEVInfosLoaded = PR_FALSE;
|
||||||
|
if (testEVInfos) {
|
||||||
|
for (size_t i; i<testEVInfos->Length(); ++i) {
|
||||||
|
delete testEVInfos->ElementAt(i);
|
||||||
|
}
|
||||||
|
testEVInfos->Clear();
|
||||||
|
delete testEVInfos;
|
||||||
|
testEVInfos = nsnull;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
memset(&mIdentityInfoCallOnce, 0, sizeof(PRCallOnceType));
|
||||||
|
}
|
||||||
|
@ -1328,6 +1328,7 @@ ProcessUserNotice(SECItem *der_notice,
|
|||||||
static nsresult
|
static nsresult
|
||||||
ProcessCertificatePolicies(SECItem *extData,
|
ProcessCertificatePolicies(SECItem *extData,
|
||||||
nsAString &text,
|
nsAString &text,
|
||||||
|
SECOidTag ev_oid_tag, // SEC_OID_UNKNOWN means: not EV
|
||||||
nsINSSComponent *nssComponent)
|
nsINSSComponent *nssComponent)
|
||||||
{
|
{
|
||||||
CERTCertificatePolicies *policies;
|
CERTCertificatePolicies *policies;
|
||||||
@ -1352,10 +1353,28 @@ ProcessCertificatePolicies(SECItem *extData,
|
|||||||
GetDefaultOIDFormat(&policyInfo->policyID, local, '.');
|
GetDefaultOIDFormat(&policyInfo->policyID, local, '.');
|
||||||
text.Append(local);
|
text.Append(local);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
PRBool needColon = PR_TRUE;
|
||||||
|
if (ev_oid_tag != SEC_OID_UNKNOWN) {
|
||||||
|
// This is an EV cert. Let's see if this oid is the EV oid,
|
||||||
|
// because we want to display the EV information string
|
||||||
|
// next to the correct OID.
|
||||||
|
|
||||||
|
SECOidTag oid_tag = SECOID_FindOIDTag(&policyInfo->policyID);
|
||||||
|
if (oid_tag == ev_oid_tag) {
|
||||||
|
text.Append(NS_LITERAL_STRING(":"));
|
||||||
|
text.Append(NS_LITERAL_STRING(SEPARATOR));
|
||||||
|
needColon = PR_FALSE;
|
||||||
|
nssComponent->GetPIPNSSBundleString("CertDumpPolicyOidEV", local);
|
||||||
|
text.Append(local);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (policyInfo->policyQualifiers) {
|
if (policyInfo->policyQualifiers) {
|
||||||
/* Add all qualifiers on separate lines, indented */
|
/* Add all qualifiers on separate lines, indented */
|
||||||
policyQualifiers = policyInfo->policyQualifiers;
|
policyQualifiers = policyInfo->policyQualifiers;
|
||||||
text.Append(NS_LITERAL_STRING(":"));
|
if (needColon)
|
||||||
|
text.Append(NS_LITERAL_STRING(":"));
|
||||||
text.Append(NS_LITERAL_STRING(SEPARATOR));
|
text.Append(NS_LITERAL_STRING(SEPARATOR));
|
||||||
while (*policyQualifiers != NULL) {
|
while (*policyQualifiers != NULL) {
|
||||||
text.Append(NS_LITERAL_STRING(" "));
|
text.Append(NS_LITERAL_STRING(" "));
|
||||||
@ -1568,7 +1587,9 @@ ProcessMSCAVersion(SECItem *extData,
|
|||||||
|
|
||||||
static nsresult
|
static nsresult
|
||||||
ProcessExtensionData(SECOidTag oidTag, SECItem *extData,
|
ProcessExtensionData(SECOidTag oidTag, SECItem *extData,
|
||||||
nsAString &text, nsINSSComponent *nssComponent)
|
nsAString &text,
|
||||||
|
SECOidTag ev_oid_tag, // SEC_OID_UNKNOWN means: not EV
|
||||||
|
nsINSSComponent *nssComponent)
|
||||||
{
|
{
|
||||||
nsresult rv;
|
nsresult rv;
|
||||||
switch (oidTag) {
|
switch (oidTag) {
|
||||||
@ -1595,7 +1616,7 @@ ProcessExtensionData(SECOidTag oidTag, SECItem *extData,
|
|||||||
rv = ProcessAuthKeyId(extData, text, nssComponent);
|
rv = ProcessAuthKeyId(extData, text, nssComponent);
|
||||||
break;
|
break;
|
||||||
case SEC_OID_X509_CERTIFICATE_POLICIES:
|
case SEC_OID_X509_CERTIFICATE_POLICIES:
|
||||||
rv = ProcessCertificatePolicies(extData, text, nssComponent);
|
rv = ProcessCertificatePolicies(extData, text, ev_oid_tag, nssComponent);
|
||||||
break;
|
break;
|
||||||
case SEC_OID_X509_CRL_DIST_POINTS:
|
case SEC_OID_X509_CRL_DIST_POINTS:
|
||||||
rv = ProcessCrlDistPoints(extData, text, nssComponent);
|
rv = ProcessCrlDistPoints(extData, text, nssComponent);
|
||||||
@ -1632,6 +1653,7 @@ ProcessExtensionData(SECOidTag oidTag, SECItem *extData,
|
|||||||
|
|
||||||
static nsresult
|
static nsresult
|
||||||
ProcessSingleExtension(CERTCertExtension *extension,
|
ProcessSingleExtension(CERTCertExtension *extension,
|
||||||
|
SECOidTag ev_oid_tag, // SEC_OID_UNKNOWN means: not EV
|
||||||
nsINSSComponent *nssComponent,
|
nsINSSComponent *nssComponent,
|
||||||
nsIASN1PrintableItem **retExtension)
|
nsIASN1PrintableItem **retExtension)
|
||||||
{
|
{
|
||||||
@ -1655,7 +1677,7 @@ ProcessSingleExtension(CERTCertExtension *extension,
|
|||||||
}
|
}
|
||||||
text.Append(NS_LITERAL_STRING(SEPARATOR).get());
|
text.Append(NS_LITERAL_STRING(SEPARATOR).get());
|
||||||
nsresult rv = ProcessExtensionData(oidTag, &extension->value, extvalue,
|
nsresult rv = ProcessExtensionData(oidTag, &extension->value, extvalue,
|
||||||
nssComponent);
|
ev_oid_tag, nssComponent);
|
||||||
if (NS_FAILED(rv)) {
|
if (NS_FAILED(rv)) {
|
||||||
extvalue.Truncate();
|
extvalue.Truncate();
|
||||||
rv = ProcessRawBytes(nssComponent, &extension->value, extvalue, PR_FALSE);
|
rv = ProcessRawBytes(nssComponent, &extension->value, extvalue, PR_FALSE);
|
||||||
@ -1851,7 +1873,8 @@ ProcessSubjectPublicKeyInfo(CERTSubjectPublicKeyInfo *spki,
|
|||||||
|
|
||||||
static nsresult
|
static nsresult
|
||||||
ProcessExtensions(CERTCertExtension **extensions,
|
ProcessExtensions(CERTCertExtension **extensions,
|
||||||
nsIASN1Sequence *parentSequence,
|
nsIASN1Sequence *parentSequence,
|
||||||
|
SECOidTag ev_oid_tag, // SEC_OID_UNKNOWN means: not EV
|
||||||
nsINSSComponent *nssComponent)
|
nsINSSComponent *nssComponent)
|
||||||
{
|
{
|
||||||
nsCOMPtr<nsIASN1Sequence> extensionSequence = new nsNSSASN1Sequence;
|
nsCOMPtr<nsIASN1Sequence> extensionSequence = new nsNSSASN1Sequence;
|
||||||
@ -1867,7 +1890,9 @@ ProcessExtensions(CERTCertExtension **extensions,
|
|||||||
nsCOMPtr<nsIMutableArray> asn1Objects;
|
nsCOMPtr<nsIMutableArray> asn1Objects;
|
||||||
extensionSequence->GetASN1Objects(getter_AddRefs(asn1Objects));
|
extensionSequence->GetASN1Objects(getter_AddRefs(asn1Objects));
|
||||||
for (i=0; extensions[i] != nsnull; i++) {
|
for (i=0; extensions[i] != nsnull; i++) {
|
||||||
rv = ProcessSingleExtension(extensions[i], nssComponent,
|
rv = ProcessSingleExtension(extensions[i],
|
||||||
|
ev_oid_tag,
|
||||||
|
nssComponent,
|
||||||
getter_AddRefs(newExtension));
|
getter_AddRefs(newExtension));
|
||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return rv;
|
return rv;
|
||||||
@ -2057,7 +2082,16 @@ nsNSSCertificate::CreateTBSCertificateASN1Struct(nsIASN1Sequence **retSequence,
|
|||||||
|
|
||||||
}
|
}
|
||||||
if (mCert->extensions) {
|
if (mCert->extensions) {
|
||||||
rv = ProcessExtensions(mCert->extensions, sequence, nssComponent);
|
SECOidTag ev_oid_tag;
|
||||||
|
PRBool validEV;
|
||||||
|
rv = hasValidEVOidTag(ev_oid_tag, validEV);
|
||||||
|
if (NS_FAILED(rv))
|
||||||
|
return rv;
|
||||||
|
|
||||||
|
if (!validEV)
|
||||||
|
ev_oid_tag = SEC_OID_UNKNOWN;
|
||||||
|
|
||||||
|
rv = ProcessExtensions(mCert->extensions, sequence, ev_oid_tag, nssComponent);
|
||||||
if (NS_FAILED(rv))
|
if (NS_FAILED(rv))
|
||||||
return rv;
|
return rv;
|
||||||
}
|
}
|
||||||
|
@ -110,9 +110,10 @@ NSSCleanupAutoPtrClass(NSSCMSSignedData, NSS_CMSSignedData_Destroy)
|
|||||||
|
|
||||||
/* nsNSSCertificate */
|
/* nsNSSCertificate */
|
||||||
|
|
||||||
NS_IMPL_THREADSAFE_ISUPPORTS4(nsNSSCertificate, nsIX509Cert,
|
NS_IMPL_THREADSAFE_ISUPPORTS5(nsNSSCertificate, nsIX509Cert,
|
||||||
nsIX509Cert2,
|
nsIX509Cert2,
|
||||||
nsIX509Cert3,
|
nsIX509Cert3,
|
||||||
|
nsIIdentityInfo,
|
||||||
nsISMimeCert)
|
nsISMimeCert)
|
||||||
|
|
||||||
nsNSSCertificate*
|
nsNSSCertificate*
|
||||||
|
@ -48,6 +48,7 @@
|
|||||||
#include "nsIX509CertList.h"
|
#include "nsIX509CertList.h"
|
||||||
#include "nsIASN1Object.h"
|
#include "nsIASN1Object.h"
|
||||||
#include "nsISMimeCert.h"
|
#include "nsISMimeCert.h"
|
||||||
|
#include "nsIIdentityInfo.h"
|
||||||
#include "nsNSSShutDown.h"
|
#include "nsNSSShutDown.h"
|
||||||
#include "nsISimpleEnumerator.h"
|
#include "nsISimpleEnumerator.h"
|
||||||
#include "nsISerializable.h"
|
#include "nsISerializable.h"
|
||||||
@ -60,6 +61,7 @@ class nsIASN1Sequence;
|
|||||||
|
|
||||||
/* Certificate */
|
/* Certificate */
|
||||||
class nsNSSCertificate : public nsIX509Cert3,
|
class nsNSSCertificate : public nsIX509Cert3,
|
||||||
|
public nsIIdentityInfo,
|
||||||
public nsISMimeCert,
|
public nsISMimeCert,
|
||||||
public nsISerializable,
|
public nsISerializable,
|
||||||
public nsIClassInfo,
|
public nsIClassInfo,
|
||||||
@ -70,6 +72,7 @@ public:
|
|||||||
NS_DECL_NSIX509CERT
|
NS_DECL_NSIX509CERT
|
||||||
NS_DECL_NSIX509CERT2
|
NS_DECL_NSIX509CERT2
|
||||||
NS_DECL_NSIX509CERT3
|
NS_DECL_NSIX509CERT3
|
||||||
|
NS_DECL_NSIIDENTITYINFO
|
||||||
NS_DECL_NSISMIMECERT
|
NS_DECL_NSISMIMECERT
|
||||||
NS_DECL_NSISERIALIZABLE
|
NS_DECL_NSISERIALIZABLE
|
||||||
NS_DECL_NSICLASSINFO
|
NS_DECL_NSICLASSINFO
|
||||||
@ -95,6 +98,7 @@ private:
|
|||||||
virtual void virtualDestroyNSSReference();
|
virtual void virtualDestroyNSSReference();
|
||||||
void destructorSafeDestroyNSSReference();
|
void destructorSafeDestroyNSSReference();
|
||||||
PRBool InitFromDER(char* certDER, int derLen); // return false on failure
|
PRBool InitFromDER(char* certDER, int derLen); // return false on failure
|
||||||
|
nsresult hasValidEVOidTag(SECOidTag &resultOidTag, PRBool &validEV);
|
||||||
};
|
};
|
||||||
|
|
||||||
class nsNSSCertList: public nsIX509CertList
|
class nsNSSCertList: public nsIX509CertList
|
||||||
|
@ -291,6 +291,10 @@ nsNSSComponent::nsNSSComponent()
|
|||||||
mCrlTimerLock = nsnull;
|
mCrlTimerLock = nsnull;
|
||||||
mObserversRegistered = PR_FALSE;
|
mObserversRegistered = PR_FALSE;
|
||||||
|
|
||||||
|
// In order to keep startup time lower, we delay loading and
|
||||||
|
// registering all identity data until first needed.
|
||||||
|
memset(&mIdentityInfoCallOnce, 0, sizeof(PRCallOnceType));
|
||||||
|
|
||||||
nsSSLIOLayerHelpers::Init();
|
nsSSLIOLayerHelpers::Init();
|
||||||
|
|
||||||
NS_ASSERTION( (0 == mInstanceCount), "nsNSSComponent is a singleton, but instantiated multiple times!");
|
NS_ASSERTION( (0 == mInstanceCount), "nsNSSComponent is a singleton, but instantiated multiple times!");
|
||||||
@ -1678,6 +1682,8 @@ nsNSSComponent::ShutdownNSS()
|
|||||||
else {
|
else {
|
||||||
PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("NSS shutdown =====>> OK <<=====\n"));
|
PR_LOG(gPIPNSSLog, PR_LOG_DEBUG, ("NSS shutdown =====>> OK <<=====\n"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
CleanupIdentityInfo();
|
||||||
}
|
}
|
||||||
|
|
||||||
return rv;
|
return rv;
|
||||||
|
@ -167,6 +167,7 @@ class NS_NO_VTABLE nsINSSComponent : public nsISupports {
|
|||||||
|
|
||||||
NS_IMETHOD DispatchEvent(const nsAString &eventType, const nsAString &token) = 0;
|
NS_IMETHOD DispatchEvent(const nsAString &eventType, const nsAString &token) = 0;
|
||||||
|
|
||||||
|
NS_IMETHOD EnsureIdentityInfoLoaded() = 0;
|
||||||
};
|
};
|
||||||
|
|
||||||
NS_DEFINE_STATIC_IID_ACCESSOR(nsINSSComponent, NS_INSSCOMPONENT_IID)
|
NS_DEFINE_STATIC_IID_ACCESSOR(nsINSSComponent, NS_INSSCOMPONENT_IID)
|
||||||
@ -240,6 +241,7 @@ public:
|
|||||||
NS_IMETHOD ShutdownSmartCardThread(SECMODModule *module);
|
NS_IMETHOD ShutdownSmartCardThread(SECMODModule *module);
|
||||||
NS_IMETHOD PostEvent(const nsAString &eventType, const nsAString &token);
|
NS_IMETHOD PostEvent(const nsAString &eventType, const nsAString &token);
|
||||||
NS_IMETHOD DispatchEvent(const nsAString &eventType, const nsAString &token);
|
NS_IMETHOD DispatchEvent(const nsAString &eventType, const nsAString &token);
|
||||||
|
NS_IMETHOD EnsureIdentityInfoLoaded();
|
||||||
|
|
||||||
private:
|
private:
|
||||||
|
|
||||||
@ -262,6 +264,7 @@ private:
|
|||||||
void UnloadLoadableRoots();
|
void UnloadLoadableRoots();
|
||||||
void LaunchSmartCardThreads();
|
void LaunchSmartCardThreads();
|
||||||
void ShutdownSmartCardThreads();
|
void ShutdownSmartCardThreads();
|
||||||
|
void CleanupIdentityInfo();
|
||||||
nsresult InitializePIPNSSBundle();
|
nsresult InitializePIPNSSBundle();
|
||||||
nsresult ConfigureInternalPKCS11Token();
|
nsresult ConfigureInternalPKCS11Token();
|
||||||
nsresult RegisterPSMContentListener();
|
nsresult RegisterPSMContentListener();
|
||||||
@ -303,6 +306,9 @@ private:
|
|||||||
nsSSLThread *mSSLThread;
|
nsSSLThread *mSSLThread;
|
||||||
nsCertVerificationThread *mCertVerificationThread;
|
nsCertVerificationThread *mCertVerificationThread;
|
||||||
nsNSSHttpInterface mHttpForNSS;
|
nsNSSHttpInterface mHttpForNSS;
|
||||||
|
|
||||||
|
static PRStatus PR_CALLBACK IdentityInfoInit(void);
|
||||||
|
PRCallOnceType mIdentityInfoCallOnce;
|
||||||
};
|
};
|
||||||
|
|
||||||
class PSMContentListener : public nsIURIContentListener,
|
class PSMContentListener : public nsIURIContentListener,
|
||||||
|
Loading…
x
Reference in New Issue
Block a user