|
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- |
|
2 * |
|
3 * This Source Code Form is subject to the terms of the Mozilla Public |
|
4 * License, v. 2.0. If a copy of the MPL was not distributed with this |
|
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
|
6 |
|
7 #include "stdlib.h" |
|
8 #include "plstr.h" |
|
9 #include "plbase64.h" |
|
10 |
|
11 #include "mozilla/Services.h" |
|
12 #include "nsMemory.h" |
|
13 #include "nsString.h" |
|
14 #include "nsCOMPtr.h" |
|
15 #include "nsThreadUtils.h" |
|
16 #include "nsIInterfaceRequestor.h" |
|
17 #include "nsIInterfaceRequestorUtils.h" |
|
18 #include "nsIServiceManager.h" |
|
19 #include "nsITokenPasswordDialogs.h" |
|
20 |
|
21 #include "nsISecretDecoderRing.h" |
|
22 #include "nsCRT.h" |
|
23 #include "nsSDR.h" |
|
24 #include "nsNSSComponent.h" |
|
25 #include "nsNSSShutDown.h" |
|
26 #include "ScopedNSSTypes.h" |
|
27 |
|
28 #include "pk11func.h" |
|
29 #include "pk11sdr.h" // For PK11SDR_Encrypt, PK11SDR_Decrypt |
|
30 |
|
31 #include "ssl.h" // For SSL_ClearSessionCache |
|
32 |
|
33 using namespace mozilla; |
|
34 |
|
35 // Standard ISupports implementation |
|
36 // NOTE: Should these be the thread-safe versions? |
|
37 NS_IMPL_ISUPPORTS(nsSecretDecoderRing, nsISecretDecoderRing, nsISecretDecoderRingConfig) |
|
38 |
|
39 // nsSecretDecoderRing constructor |
|
40 nsSecretDecoderRing::nsSecretDecoderRing() |
|
41 { |
|
42 // initialize superclass |
|
43 } |
|
44 |
|
45 // nsSecretDecoderRing destructor |
|
46 nsSecretDecoderRing::~nsSecretDecoderRing() |
|
47 { |
|
48 } |
|
49 |
|
50 /* [noscript] long encrypt (in buffer data, in long dataLen, out buffer result); */ |
|
51 NS_IMETHODIMP nsSecretDecoderRing:: |
|
52 Encrypt(unsigned char * data, int32_t dataLen, unsigned char * *result, int32_t *_retval) |
|
53 { |
|
54 nsNSSShutDownPreventionLock locker; |
|
55 nsresult rv = NS_OK; |
|
56 ScopedPK11SlotInfo slot; |
|
57 SECItem keyid; |
|
58 SECItem request; |
|
59 SECItem reply; |
|
60 SECStatus s; |
|
61 nsCOMPtr<nsIInterfaceRequestor> ctx = new PipUIContext(); |
|
62 |
|
63 slot = PK11_GetInternalKeySlot(); |
|
64 if (!slot) { rv = NS_ERROR_NOT_AVAILABLE; goto loser; } |
|
65 |
|
66 /* Make sure token is initialized. */ |
|
67 rv = setPassword(slot, ctx); |
|
68 if (NS_FAILED(rv)) |
|
69 goto loser; |
|
70 |
|
71 /* Force authentication */ |
|
72 s = PK11_Authenticate(slot, true, ctx); |
|
73 if (s != SECSuccess) { rv = NS_ERROR_FAILURE; goto loser; } |
|
74 |
|
75 /* Use default key id */ |
|
76 keyid.data = 0; |
|
77 keyid.len = 0; |
|
78 request.data = data; |
|
79 request.len = dataLen; |
|
80 reply.data = 0; |
|
81 reply.len = 0; |
|
82 s= PK11SDR_Encrypt(&keyid, &request, &reply, ctx); |
|
83 if (s != SECSuccess) { rv = NS_ERROR_FAILURE; goto loser; } |
|
84 |
|
85 *result = reply.data; |
|
86 *_retval = reply.len; |
|
87 |
|
88 loser: |
|
89 return rv; |
|
90 } |
|
91 |
|
92 /* [noscript] long decrypt (in buffer data, in long dataLen, out buffer result); */ |
|
93 NS_IMETHODIMP nsSecretDecoderRing:: |
|
94 Decrypt(unsigned char * data, int32_t dataLen, unsigned char * *result, int32_t *_retval) |
|
95 { |
|
96 nsNSSShutDownPreventionLock locker; |
|
97 nsresult rv = NS_OK; |
|
98 ScopedPK11SlotInfo slot; |
|
99 SECStatus s; |
|
100 SECItem request; |
|
101 SECItem reply; |
|
102 nsCOMPtr<nsIInterfaceRequestor> ctx = new PipUIContext(); |
|
103 |
|
104 *result = 0; |
|
105 *_retval = 0; |
|
106 |
|
107 /* Find token with SDR key */ |
|
108 slot = PK11_GetInternalKeySlot(); |
|
109 if (!slot) { rv = NS_ERROR_NOT_AVAILABLE; goto loser; } |
|
110 |
|
111 /* Force authentication */ |
|
112 if (PK11_Authenticate(slot, true, ctx) != SECSuccess) |
|
113 { |
|
114 rv = NS_ERROR_NOT_AVAILABLE; |
|
115 goto loser; |
|
116 } |
|
117 |
|
118 request.data = data; |
|
119 request.len = dataLen; |
|
120 reply.data = 0; |
|
121 reply.len = 0; |
|
122 s = PK11SDR_Decrypt(&request, &reply, ctx); |
|
123 if (s != SECSuccess) { rv = NS_ERROR_FAILURE; goto loser; } |
|
124 |
|
125 *result = reply.data; |
|
126 *_retval = reply.len; |
|
127 |
|
128 loser: |
|
129 return rv; |
|
130 } |
|
131 |
|
132 /* string encryptString (in string text); */ |
|
133 NS_IMETHODIMP nsSecretDecoderRing:: |
|
134 EncryptString(const char *text, char **_retval) |
|
135 { |
|
136 nsNSSShutDownPreventionLock locker; |
|
137 nsresult rv = NS_OK; |
|
138 unsigned char *encrypted = 0; |
|
139 int32_t eLen; |
|
140 |
|
141 if (!text || !_retval) { |
|
142 rv = NS_ERROR_INVALID_POINTER; |
|
143 goto loser; |
|
144 } |
|
145 |
|
146 rv = Encrypt((unsigned char *)text, strlen(text), &encrypted, &eLen); |
|
147 if (rv != NS_OK) { goto loser; } |
|
148 |
|
149 rv = encode(encrypted, eLen, _retval); |
|
150 |
|
151 loser: |
|
152 if (encrypted) PORT_Free(encrypted); |
|
153 |
|
154 return rv; |
|
155 } |
|
156 |
|
157 /* string decryptString (in string crypt); */ |
|
158 NS_IMETHODIMP nsSecretDecoderRing:: |
|
159 DecryptString(const char *crypt, char **_retval) |
|
160 { |
|
161 nsNSSShutDownPreventionLock locker; |
|
162 nsresult rv = NS_OK; |
|
163 char *r = 0; |
|
164 unsigned char *decoded = 0; |
|
165 int32_t decodedLen; |
|
166 unsigned char *decrypted = 0; |
|
167 int32_t decryptedLen; |
|
168 |
|
169 if (!crypt || !_retval) { |
|
170 rv = NS_ERROR_INVALID_POINTER; |
|
171 goto loser; |
|
172 } |
|
173 |
|
174 rv = decode(crypt, &decoded, &decodedLen); |
|
175 if (rv != NS_OK) goto loser; |
|
176 |
|
177 rv = Decrypt(decoded, decodedLen, &decrypted, &decryptedLen); |
|
178 if (rv != NS_OK) goto loser; |
|
179 |
|
180 // Convert to NUL-terminated string |
|
181 r = (char *)nsMemory::Alloc(decryptedLen+1); |
|
182 if (!r) { rv = NS_ERROR_OUT_OF_MEMORY; goto loser; } |
|
183 |
|
184 memcpy(r, decrypted, decryptedLen); |
|
185 r[decryptedLen] = 0; |
|
186 |
|
187 *_retval = r; |
|
188 r = 0; |
|
189 |
|
190 loser: |
|
191 if (decrypted) PORT_Free(decrypted); |
|
192 if (decoded) PR_DELETE(decoded); |
|
193 |
|
194 return rv; |
|
195 } |
|
196 |
|
197 /* void changePassword(); */ |
|
198 NS_IMETHODIMP nsSecretDecoderRing:: |
|
199 ChangePassword() |
|
200 { |
|
201 nsNSSShutDownPreventionLock locker; |
|
202 nsresult rv; |
|
203 ScopedPK11SlotInfo slot(PK11_GetInternalKeySlot()); |
|
204 if (!slot) return NS_ERROR_NOT_AVAILABLE; |
|
205 |
|
206 /* Convert UTF8 token name to UCS2 */ |
|
207 NS_ConvertUTF8toUTF16 tokenName(PK11_GetTokenName(slot)); |
|
208 |
|
209 /* Get the set password dialog handler imlementation */ |
|
210 nsCOMPtr<nsITokenPasswordDialogs> dialogs; |
|
211 |
|
212 rv = getNSSDialogs(getter_AddRefs(dialogs), |
|
213 NS_GET_IID(nsITokenPasswordDialogs), |
|
214 NS_TOKENPASSWORDSDIALOG_CONTRACTID); |
|
215 if (NS_FAILED(rv)) return rv; |
|
216 |
|
217 nsCOMPtr<nsIInterfaceRequestor> ctx = new PipUIContext(); |
|
218 bool canceled; |
|
219 |
|
220 { |
|
221 nsPSMUITracker tracker; |
|
222 if (tracker.isUIForbidden()) { |
|
223 rv = NS_ERROR_NOT_AVAILABLE; |
|
224 } |
|
225 else { |
|
226 rv = dialogs->SetPassword(ctx, tokenName.get(), &canceled); |
|
227 } |
|
228 } |
|
229 |
|
230 /* canceled is ignored */ |
|
231 |
|
232 return rv; |
|
233 } |
|
234 |
|
235 NS_IMETHODIMP nsSecretDecoderRing:: |
|
236 Logout() |
|
237 { |
|
238 static NS_DEFINE_CID(kNSSComponentCID, NS_NSSCOMPONENT_CID); |
|
239 |
|
240 nsresult rv; |
|
241 nsCOMPtr<nsINSSComponent> nssComponent(do_GetService(kNSSComponentCID, &rv)); |
|
242 if (NS_FAILED(rv)) |
|
243 return rv; |
|
244 |
|
245 { |
|
246 nsNSSShutDownPreventionLock locker; |
|
247 PK11_LogoutAll(); |
|
248 SSL_ClearSessionCache(); |
|
249 } |
|
250 |
|
251 return NS_OK; |
|
252 } |
|
253 |
|
254 NS_IMETHODIMP nsSecretDecoderRing:: |
|
255 LogoutAndTeardown() |
|
256 { |
|
257 static NS_DEFINE_CID(kNSSComponentCID, NS_NSSCOMPONENT_CID); |
|
258 |
|
259 nsresult rv; |
|
260 nsCOMPtr<nsINSSComponent> nssComponent(do_GetService(kNSSComponentCID, &rv)); |
|
261 if (NS_FAILED(rv)) |
|
262 return rv; |
|
263 |
|
264 { |
|
265 nsNSSShutDownPreventionLock locker; |
|
266 PK11_LogoutAll(); |
|
267 SSL_ClearSessionCache(); |
|
268 } |
|
269 |
|
270 rv = nssComponent->LogoutAuthenticatedPK11(); |
|
271 |
|
272 // After we just logged out, we need to prune dead connections to make |
|
273 // sure that all connections that should be stopped, are stopped. See |
|
274 // bug 517584. |
|
275 nsCOMPtr<nsIObserverService> os = mozilla::services::GetObserverService(); |
|
276 if (os) |
|
277 os->NotifyObservers(nullptr, "net:prune-dead-connections", nullptr); |
|
278 |
|
279 return rv; |
|
280 } |
|
281 |
|
282 /* void setWindow(in nsISupports w); */ |
|
283 NS_IMETHODIMP nsSecretDecoderRing:: |
|
284 SetWindow(nsISupports *w) |
|
285 { |
|
286 return NS_OK; |
|
287 } |
|
288 |
|
289 // Support routines |
|
290 |
|
291 nsresult nsSecretDecoderRing:: |
|
292 encode(const unsigned char *data, int32_t dataLen, char **_retval) |
|
293 { |
|
294 nsresult rv = NS_OK; |
|
295 |
|
296 char *result = PL_Base64Encode((const char *)data, dataLen, nullptr); |
|
297 if (!result) { rv = NS_ERROR_OUT_OF_MEMORY; goto loser; } |
|
298 |
|
299 *_retval = NS_strdup(result); |
|
300 PR_DELETE(result); |
|
301 if (!*_retval) { rv = NS_ERROR_OUT_OF_MEMORY; goto loser; } |
|
302 |
|
303 loser: |
|
304 return rv; |
|
305 } |
|
306 |
|
307 nsresult nsSecretDecoderRing:: |
|
308 decode(const char *data, unsigned char **result, int32_t * _retval) |
|
309 { |
|
310 nsresult rv = NS_OK; |
|
311 uint32_t len = strlen(data); |
|
312 int adjust = 0; |
|
313 |
|
314 /* Compute length adjustment */ |
|
315 if (data[len-1] == '=') { |
|
316 adjust++; |
|
317 if (data[len-2] == '=') adjust++; |
|
318 } |
|
319 |
|
320 *result = (unsigned char *)PL_Base64Decode(data, len, nullptr); |
|
321 if (!*result) { rv = NS_ERROR_ILLEGAL_VALUE; goto loser; } |
|
322 |
|
323 *_retval = (len*3)/4 - adjust; |
|
324 |
|
325 loser: |
|
326 return rv; |
|
327 } |