mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-11-06 17:16:12 +00:00
128f004a1f
ScopedCERTCertList is based on Scoped.h, which is deprecated in favour of the standardised UniquePtr. Also changes CERTCertList parameters of various functions to make ownership more explicit. MozReview-Commit-ID: EXqxTK6inqy --HG-- extra : transplant_source : %9B%A9a%94%D1%7E%2BTa%9E%9Fu%9F%02%B3%1AT%1B%F1%F6
211 lines
6.4 KiB
C++
211 lines
6.4 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "nsCertPicker.h"
|
|
|
|
#include "ScopedNSSTypes.h"
|
|
#include "cert.h"
|
|
#include "mozilla/RefPtr.h"
|
|
#include "nsCOMPtr.h"
|
|
#include "nsICertPickDialogs.h"
|
|
#include "nsIInterfaceRequestor.h"
|
|
#include "nsIServiceManager.h"
|
|
#include "nsMemory.h"
|
|
#include "nsNSSCertHelper.h"
|
|
#include "nsNSSCertificate.h"
|
|
#include "nsNSSComponent.h"
|
|
#include "nsNSSHelper.h"
|
|
#include "nsNSSShutDown.h"
|
|
#include "nsReadableUtils.h"
|
|
#include "nsString.h"
|
|
#include "pkix/pkixtypes.h"
|
|
|
|
using namespace mozilla;
|
|
|
|
NS_IMPL_ISUPPORTS(nsCertPicker, nsIUserCertPicker)
|
|
|
|
nsCertPicker::nsCertPicker()
|
|
{
|
|
}
|
|
|
|
nsCertPicker::~nsCertPicker()
|
|
{
|
|
nsNSSShutDownPreventionLock locker;
|
|
if (isAlreadyShutDown()) {
|
|
return;
|
|
}
|
|
|
|
shutdown(calledFromObject);
|
|
}
|
|
|
|
NS_IMETHODIMP nsCertPicker::PickByUsage(nsIInterfaceRequestor *ctx,
|
|
const char16_t *selectedNickname,
|
|
int32_t certUsage,
|
|
bool allowInvalid,
|
|
bool allowDuplicateNicknames,
|
|
const nsAString &emailAddress,
|
|
bool *canceled,
|
|
nsIX509Cert **_retval)
|
|
{
|
|
nsNSSShutDownPreventionLock locker;
|
|
if (isAlreadyShutDown()) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
int32_t selectedIndex = -1;
|
|
bool selectionFound = false;
|
|
char16_t **certNicknameList = nullptr;
|
|
char16_t **certDetailsList = nullptr;
|
|
CERTCertListNode* node = nullptr;
|
|
nsresult rv = NS_OK;
|
|
|
|
{
|
|
// Iterate over all certs. This assures that user is logged in to all hardware tokens.
|
|
nsCOMPtr<nsIInterfaceRequestor> ctx = new PipUIContext();
|
|
UniqueCERTCertList allcerts(PK11_ListCerts(PK11CertListUnique, ctx));
|
|
}
|
|
|
|
/* find all user certs that are valid for the specified usage */
|
|
/* note that we are allowing expired certs in this list */
|
|
UniqueCERTCertList certList(
|
|
CERT_FindUserCertsByUsage(CERT_GetDefaultCertDB(),
|
|
(SECCertUsage)certUsage,
|
|
!allowDuplicateNicknames,
|
|
!allowInvalid,
|
|
ctx));
|
|
if (!certList) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
/* if a (non-empty) emailAddress argument is supplied to PickByUsage, */
|
|
/* remove non-matching certificates from the candidate list */
|
|
|
|
if (!emailAddress.IsEmpty()) {
|
|
node = CERT_LIST_HEAD(certList);
|
|
while (!CERT_LIST_END(node, certList)) {
|
|
/* if the cert has at least one e-mail address, check if suitable */
|
|
if (CERT_GetFirstEmailAddress(node->cert)) {
|
|
RefPtr<nsNSSCertificate> tempCert(nsNSSCertificate::Create(node->cert));
|
|
bool match = false;
|
|
rv = tempCert->ContainsEmailAddress(emailAddress, &match);
|
|
if (NS_FAILED(rv)) {
|
|
return rv;
|
|
}
|
|
if (!match) {
|
|
/* doesn't contain the specified address, so remove from the list */
|
|
CERTCertListNode* freenode = node;
|
|
node = CERT_LIST_NEXT(node);
|
|
CERT_RemoveCertListNode(freenode);
|
|
continue;
|
|
}
|
|
}
|
|
node = CERT_LIST_NEXT(node);
|
|
}
|
|
}
|
|
|
|
UniqueCERTCertNicknames nicknames(getNSSCertNicknamesFromCertList(certList));
|
|
if (!nicknames) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
certNicknameList = (char16_t **)moz_xmalloc(sizeof(char16_t *) * nicknames->numnicknames);
|
|
certDetailsList = (char16_t **)moz_xmalloc(sizeof(char16_t *) * nicknames->numnicknames);
|
|
|
|
if (!certNicknameList || !certDetailsList) {
|
|
free(certNicknameList);
|
|
free(certDetailsList);
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
}
|
|
|
|
int32_t CertsToUse;
|
|
|
|
for (CertsToUse = 0, node = CERT_LIST_HEAD(certList.get());
|
|
!CERT_LIST_END(node, certList.get()) &&
|
|
CertsToUse < nicknames->numnicknames;
|
|
node = CERT_LIST_NEXT(node)
|
|
)
|
|
{
|
|
RefPtr<nsNSSCertificate> tempCert(nsNSSCertificate::Create(node->cert));
|
|
|
|
if (tempCert) {
|
|
|
|
nsAutoString i_nickname(NS_ConvertUTF8toUTF16(nicknames->nicknames[CertsToUse]));
|
|
nsAutoString nickWithSerial;
|
|
nsAutoString details;
|
|
|
|
if (!selectionFound) {
|
|
/* for the case when selectedNickname refers to a bare nickname */
|
|
if (i_nickname == nsDependentString(selectedNickname)) {
|
|
selectedIndex = CertsToUse;
|
|
selectionFound = true;
|
|
}
|
|
}
|
|
|
|
if (NS_SUCCEEDED(tempCert->FormatUIStrings(i_nickname, nickWithSerial, details))) {
|
|
certNicknameList[CertsToUse] = ToNewUnicode(nickWithSerial);
|
|
certDetailsList[CertsToUse] = ToNewUnicode(details);
|
|
if (!selectionFound) {
|
|
/* for the case when selectedNickname refers to nickname + serial */
|
|
if (nickWithSerial == nsDependentString(selectedNickname)) {
|
|
selectedIndex = CertsToUse;
|
|
selectionFound = true;
|
|
}
|
|
}
|
|
}
|
|
else {
|
|
certNicknameList[CertsToUse] = nullptr;
|
|
certDetailsList[CertsToUse] = nullptr;
|
|
}
|
|
|
|
++CertsToUse;
|
|
}
|
|
}
|
|
|
|
if (CertsToUse) {
|
|
nsCOMPtr<nsICertPickDialogs> dialogs;
|
|
rv = getNSSDialogs(getter_AddRefs(dialogs), NS_GET_IID(nsICertPickDialogs),
|
|
NS_CERTPICKDIALOGS_CONTRACTID);
|
|
|
|
if (NS_SUCCEEDED(rv)) {
|
|
// Show the cert picker dialog and get the index of the selected cert.
|
|
rv = dialogs->PickCertificate(ctx, (const char16_t**)certNicknameList,
|
|
(const char16_t**)certDetailsList,
|
|
CertsToUse, &selectedIndex, canceled);
|
|
}
|
|
}
|
|
|
|
int32_t i;
|
|
for (i = 0; i < CertsToUse; ++i) {
|
|
free(certNicknameList[i]);
|
|
free(certDetailsList[i]);
|
|
}
|
|
free(certNicknameList);
|
|
free(certDetailsList);
|
|
|
|
if (!CertsToUse) {
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
}
|
|
|
|
if (NS_SUCCEEDED(rv) && !*canceled) {
|
|
for (i = 0, node = CERT_LIST_HEAD(certList);
|
|
!CERT_LIST_END(node, certList);
|
|
++i, node = CERT_LIST_NEXT(node)) {
|
|
|
|
if (i == selectedIndex) {
|
|
RefPtr<nsNSSCertificate> cert = nsNSSCertificate::Create(node->cert);
|
|
if (!cert) {
|
|
rv = NS_ERROR_OUT_OF_MEMORY;
|
|
break;
|
|
}
|
|
|
|
cert.forget(_retval);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
return rv;
|
|
}
|