|
1 /* This Source Code Form is subject to the terms of the Mozilla Public |
|
2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
|
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
|
4 /* $Id: nsPKCS12Blob.h,v 1.16 2006/04/12 15:43:32 benjamin%smedbergs.us Exp $ */ |
|
5 |
|
6 #ifndef _NS_PKCS12BLOB_H_ |
|
7 #define _NS_PKCS12BLOB_H_ |
|
8 |
|
9 #include "nsCOMPtr.h" |
|
10 #include "nsString.h" |
|
11 #include "nsIFile.h" |
|
12 #include "nsIPK11TokenDB.h" |
|
13 #include "nsNSSHelper.h" |
|
14 #include "nsIPK11Token.h" |
|
15 #include "nsIMutableArray.h" |
|
16 |
|
17 #include "nss.h" |
|
18 |
|
19 #include "pkcs12.h" |
|
20 #include "p12plcy.h" |
|
21 |
|
22 class nsIX509Cert; |
|
23 |
|
24 // |
|
25 // nsPKCS12Blob |
|
26 // |
|
27 // Class for importing/exporting PKCS#12 blobs |
|
28 // |
|
29 class nsPKCS12Blob |
|
30 { |
|
31 public: |
|
32 nsPKCS12Blob(); |
|
33 virtual ~nsPKCS12Blob(); |
|
34 |
|
35 // Set the token to use (default is internal) |
|
36 nsresult SetToken(nsIPK11Token *token); |
|
37 |
|
38 // PKCS#12 Import |
|
39 nsresult ImportFromFile(nsIFile *file); |
|
40 |
|
41 // PKCS#12 Export |
|
42 nsresult ExportToFile(nsIFile *file, nsIX509Cert **certs, int numCerts); |
|
43 |
|
44 private: |
|
45 |
|
46 nsCOMPtr<nsIPK11Token> mToken; |
|
47 nsCOMPtr<nsIMutableArray> mCertArray; |
|
48 nsCOMPtr<nsIInterfaceRequestor> mUIContext; |
|
49 |
|
50 // local helper functions |
|
51 nsresult getPKCS12FilePassword(SECItem *); |
|
52 nsresult newPKCS12FilePassword(SECItem *); |
|
53 nsresult inputToDecoder(SEC_PKCS12DecoderContext *, nsIFile *); |
|
54 void unicodeToItem(const char16_t *, SECItem *); |
|
55 void handleError(int myerr = 0); |
|
56 |
|
57 // RetryReason and ImportMode are used when importing a PKCS12 file. |
|
58 // There are two reasons that cause us to retry: |
|
59 // - When the password entered by the user is incorrect. |
|
60 // The user will be prompted to try again. |
|
61 // - When the user entered a zero length password. |
|
62 // An empty password should be represented as an empty |
|
63 // string (a SECItem that contains a single terminating |
|
64 // null UTF16 character), but some applications use a |
|
65 // zero length SECItem. |
|
66 // We try both variations, zero length item and empty string, |
|
67 // without giving a user prompt when trying the different empty password flavors. |
|
68 |
|
69 enum RetryReason { rr_do_not_retry, rr_bad_password, rr_auto_retry_empty_password_flavors }; |
|
70 enum ImportMode { im_standard_prompt, im_try_zero_length_secitem }; |
|
71 |
|
72 nsresult ImportFromFileHelper(nsIFile *file, ImportMode aImportMode, RetryReason &aWantRetry); |
|
73 |
|
74 // NSPR file I/O for export file |
|
75 PRFileDesc *mTmpFile; |
|
76 |
|
77 // simulated file I/O for "in memory" temporary digest data |
|
78 nsCString *mDigest; |
|
79 nsCString::const_iterator *mDigestIterator; |
|
80 |
|
81 bool mTokenSet; |
|
82 |
|
83 // C-style callback functions for the NSS PKCS#12 library |
|
84 static SECStatus digest_open(void *, PRBool); |
|
85 static SECStatus digest_close(void *, PRBool); |
|
86 static int digest_read(void *, unsigned char *, unsigned long); |
|
87 static int digest_write(void *, unsigned char *, unsigned long); |
|
88 static SECItem * nickname_collision(SECItem *, PRBool *, void *); |
|
89 static void write_export_file(void *arg, const char *buf, unsigned long len); |
|
90 |
|
91 }; |
|
92 |
|
93 #endif /* _NS_PKCS12BLOB_H_ */ |