mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-28 20:55:39 +00:00
179 lines
4.8 KiB
C
179 lines
4.8 KiB
C
/*
|
|
* The contents of this file are subject to the Mozilla Public
|
|
* License Version 1.1 (the "License"); you may not use this file
|
|
* except in compliance with the License. You may obtain a copy of
|
|
* the License at http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS
|
|
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
|
* implied. See the License for the specific language governing
|
|
* rights and limitations under the License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is Netscape
|
|
* Communications Corporation. Portions created by Netscape are
|
|
* Copyright (C) 1994-2000 Netscape Communications Corporation. All
|
|
* Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the
|
|
* terms of the GNU General Public License Version 2 or later (the
|
|
* "GPL"), in which case the provisions of the GPL are applicable
|
|
* instead of those above. If you wish to allow use of your
|
|
* version of this file only under the terms of the GPL and not to
|
|
* allow others to use your version of this file under the MPL,
|
|
* indicate your decision by deleting the provisions above and
|
|
* replace them with the notice and other provisions required by
|
|
* the GPL. If you do not delete the provisions above, a recipient
|
|
* may use your version of this file under either the MPL or the
|
|
* GPL.
|
|
*/
|
|
|
|
#include <plarena.h>
|
|
#include <prio.h>
|
|
#include <prprf.h>
|
|
#include <seccomon.h>
|
|
#include <secmod.h>
|
|
#include <jar.h>
|
|
#include <secutil.h>
|
|
|
|
/* These are installation functions that make calls to the security library.
|
|
* We don't want to include security include files in the C++ code too much.
|
|
*/
|
|
|
|
static char* PR_fgets(char *buf, int size, PRFileDesc *file);
|
|
|
|
/***************************************************************************
|
|
*
|
|
* P k 1 1 I n s t a l l _ A d d N e w M o d u l e
|
|
*/
|
|
int
|
|
Pk11Install_AddNewModule(char* moduleName, char* dllPath,
|
|
unsigned long defaultMechanismFlags,
|
|
unsigned long cipherEnableFlags)
|
|
{
|
|
return (SECMOD_AddNewModule(moduleName, dllPath,
|
|
SECMOD_PubMechFlagstoInternal(defaultMechanismFlags),
|
|
SECMOD_PubCipherFlagstoInternal(cipherEnableFlags))
|
|
== SECSuccess) ? 0 : -1;
|
|
}
|
|
|
|
/*************************************************************************
|
|
*
|
|
* P k 1 1 I n s t a l l _ U s e r V e r i f y J a r
|
|
*
|
|
* Gives the user feedback on the signatures of a JAR files, asks them
|
|
* whether they actually want to continue.
|
|
* Assumes the jar structure has already been created and is valid.
|
|
* Returns 0 if the user wants to continue the installation, nonzero
|
|
* if the user wishes to abort.
|
|
*/
|
|
short
|
|
Pk11Install_UserVerifyJar(JAR *jar, PRFileDesc *out, PRBool query)
|
|
{
|
|
JAR_Context *ctx;
|
|
JAR_Cert *fing;
|
|
JAR_Item *item;
|
|
char stdinbuf[80];
|
|
int count=0;
|
|
|
|
CERTCertificate *cert, *prev=NULL;
|
|
|
|
PR_fprintf(out, "\nThis installation JAR file was signed by:\n");
|
|
|
|
ctx = JAR_find(jar, NULL, jarTypeSign);
|
|
|
|
while(JAR_find_next(ctx, &item) >= 0 ) {
|
|
fing = (JAR_Cert*) item->data;
|
|
cert = fing->cert;
|
|
if(cert==prev) {
|
|
continue;
|
|
}
|
|
|
|
count++;
|
|
PR_fprintf(out, "----------------------------------------------\n");
|
|
if(cert) {
|
|
if(cert->nickname) {
|
|
PR_fprintf(out, "**NICKNAME**\n%s\n", cert->nickname);
|
|
}
|
|
if(cert->subjectName) {
|
|
PR_fprintf(out, "**SUBJECT NAME**\n%s\n", cert->subjectName); }
|
|
if(cert->issuerName) {
|
|
PR_fprintf(out, "**ISSUER NAME**\n%s\n", cert->issuerName);
|
|
}
|
|
} else {
|
|
PR_fprintf(out, "No matching certificate could be found.\n");
|
|
}
|
|
PR_fprintf(out, "----------------------------------------------\n\n");
|
|
|
|
prev=cert;
|
|
}
|
|
|
|
JAR_find_end(ctx);
|
|
|
|
if(count==0) {
|
|
PR_fprintf(out, "No signatures found: JAR FILE IS UNSIGNED.\n");
|
|
}
|
|
|
|
if(query) {
|
|
PR_fprintf(out,
|
|
"Do you wish to continue this installation? (y/n) ");
|
|
|
|
if(PR_fgets(stdinbuf, 80, PR_STDIN) != NULL) {
|
|
char *response;
|
|
|
|
if( (response=strtok(stdinbuf, " \t\n\r")) ) {
|
|
if( !PL_strcasecmp(response, "y") ||
|
|
!PL_strcasecmp(response, "yes") ) {
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
/**************************************************************************
|
|
*
|
|
* P R _ f g e t s
|
|
*
|
|
* fgets implemented with NSPR.
|
|
*/
|
|
static char*
|
|
PR_fgets(char *buf, int size, PRFileDesc *file)
|
|
{
|
|
int i;
|
|
int status;
|
|
char c;
|
|
|
|
i=0;
|
|
while(i < size-1) {
|
|
status = PR_Read(file, (void*) &c, 1);
|
|
if(status==-1) {
|
|
return NULL;
|
|
} else if(status==0) {
|
|
break;
|
|
}
|
|
buf[i++] = c;
|
|
if(c=='\n') {
|
|
break;
|
|
}
|
|
}
|
|
buf[i]='\0';
|
|
|
|
return buf;
|
|
}
|
|
|
|
/**************************************************************************
|
|
*
|
|
* m y S E C U _ E r r o r S t r i n g
|
|
*
|
|
*/
|
|
char* mySECU_ErrorString(int16 errnum)
|
|
{
|
|
return SECU_Strerror(errnum);
|
|
}
|