security/manager/ssl/src/nsCertPicker.cpp

changeset 0
6474c204b198
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/security/manager/ssl/src/nsCertPicker.cpp	Wed Dec 31 06:09:35 2014 +0100
     1.3 @@ -0,0 +1,188 @@
     1.4 +/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
     1.5 +/* This Source Code Form is subject to the terms of the Mozilla Public
     1.6 + * License, v. 2.0. If a copy of the MPL was not distributed with this
     1.7 + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     1.8 +
     1.9 +#include "nsCertPicker.h"
    1.10 +#include "pkix/pkixtypes.h"
    1.11 +#include "nsMemory.h"
    1.12 +#include "nsCOMPtr.h"
    1.13 +#include "nsXPIDLString.h"
    1.14 +#include "nsIServiceManager.h"
    1.15 +#include "nsNSSComponent.h"
    1.16 +#include "nsNSSCertificate.h"
    1.17 +#include "nsReadableUtils.h"
    1.18 +#include "nsICertPickDialogs.h"
    1.19 +#include "nsNSSShutDown.h"
    1.20 +#include "nsNSSCertHelper.h"
    1.21 +#include "ScopedNSSTypes.h"
    1.22 +
    1.23 +#include "cert.h"
    1.24 +
    1.25 +using namespace mozilla;
    1.26 +
    1.27 +NS_IMPL_ISUPPORTS(nsCertPicker, nsIUserCertPicker)
    1.28 +
    1.29 +nsCertPicker::nsCertPicker()
    1.30 +{
    1.31 +}
    1.32 +
    1.33 +nsCertPicker::~nsCertPicker()
    1.34 +{
    1.35 +}
    1.36 +
    1.37 +NS_IMETHODIMP nsCertPicker::PickByUsage(nsIInterfaceRequestor *ctx, 
    1.38 +                                        const char16_t *selectedNickname, 
    1.39 +                                        int32_t certUsage, 
    1.40 +                                        bool allowInvalid, 
    1.41 +                                        bool allowDuplicateNicknames, 
    1.42 +                                        bool *canceled, 
    1.43 +                                        nsIX509Cert **_retval)
    1.44 +{
    1.45 +  nsNSSShutDownPreventionLock locker;
    1.46 +  int32_t selectedIndex = -1;
    1.47 +  bool selectionFound = false;
    1.48 +  char16_t **certNicknameList = nullptr;
    1.49 +  char16_t **certDetailsList = nullptr;
    1.50 +  CERTCertListNode* node = nullptr;
    1.51 +  nsresult rv = NS_OK;
    1.52 +
    1.53 +  {
    1.54 +    // Iterate over all certs. This assures that user is logged in to all hardware tokens.
    1.55 +    nsCOMPtr<nsIInterfaceRequestor> ctx = new PipUIContext();
    1.56 +    mozilla::pkix::ScopedCERTCertList allcerts(
    1.57 +      PK11_ListCerts(PK11CertListUnique, ctx));
    1.58 +  }
    1.59 +
    1.60 +  /* find all user certs that are valid and for SSL */
    1.61 +  /* note that we are allowing expired certs in this list */
    1.62 +
    1.63 +  mozilla::pkix::ScopedCERTCertList certList(
    1.64 +    CERT_FindUserCertsByUsage(CERT_GetDefaultCertDB(), 
    1.65 +                              (SECCertUsage)certUsage,
    1.66 +                              !allowDuplicateNicknames,
    1.67 +                              !allowInvalid,
    1.68 +                              ctx));
    1.69 +  if (!certList) {
    1.70 +    return NS_ERROR_NOT_AVAILABLE;
    1.71 +  }
    1.72 +
    1.73 +  ScopedCERTCertNicknames nicknames(getNSSCertNicknamesFromCertList(certList.get()));
    1.74 +  if (!nicknames) {
    1.75 +    return NS_ERROR_NOT_AVAILABLE;
    1.76 +  }
    1.77 +
    1.78 +  certNicknameList = (char16_t **)nsMemory::Alloc(sizeof(char16_t *) * nicknames->numnicknames);
    1.79 +  certDetailsList = (char16_t **)nsMemory::Alloc(sizeof(char16_t *) * nicknames->numnicknames);
    1.80 +
    1.81 +  if (!certNicknameList || !certDetailsList) {
    1.82 +    nsMemory::Free(certNicknameList);
    1.83 +    nsMemory::Free(certDetailsList);
    1.84 +    return NS_ERROR_OUT_OF_MEMORY;
    1.85 +  }
    1.86 +
    1.87 +  int32_t CertsToUse;
    1.88 +
    1.89 +  for (CertsToUse = 0, node = CERT_LIST_HEAD(certList.get());
    1.90 +       !CERT_LIST_END(node, certList.get()) &&
    1.91 +         CertsToUse < nicknames->numnicknames;
    1.92 +       node = CERT_LIST_NEXT(node)
    1.93 +      )
    1.94 +  {
    1.95 +    nsNSSCertificate *tempCert = nsNSSCertificate::Create(node->cert);
    1.96 +
    1.97 +    if (tempCert) {
    1.98 +
    1.99 +      // XXX we really should be using an nsCOMPtr instead of manually add-refing,
   1.100 +      // but nsNSSCertificate does not have a default constructor.
   1.101 +
   1.102 +      NS_ADDREF(tempCert);
   1.103 +
   1.104 +      nsAutoString i_nickname(NS_ConvertUTF8toUTF16(nicknames->nicknames[CertsToUse]));
   1.105 +      nsAutoString nickWithSerial;
   1.106 +      nsAutoString details;
   1.107 +
   1.108 +      if (!selectionFound) {
   1.109 +        if (i_nickname == nsDependentString(selectedNickname)) {
   1.110 +          selectedIndex = CertsToUse;
   1.111 +          selectionFound = true;
   1.112 +        }
   1.113 +      }
   1.114 +
   1.115 +      if (NS_SUCCEEDED(tempCert->FormatUIStrings(i_nickname, nickWithSerial, details))) {
   1.116 +        certNicknameList[CertsToUse] = ToNewUnicode(nickWithSerial);
   1.117 +        certDetailsList[CertsToUse] = ToNewUnicode(details);
   1.118 +      }
   1.119 +      else {
   1.120 +        certNicknameList[CertsToUse] = nullptr;
   1.121 +        certDetailsList[CertsToUse] = nullptr;
   1.122 +      }
   1.123 +
   1.124 +      NS_RELEASE(tempCert);
   1.125 +
   1.126 +      ++CertsToUse;
   1.127 +    }
   1.128 +  }
   1.129 +
   1.130 +  if (CertsToUse) {
   1.131 +    nsICertPickDialogs *dialogs = nullptr;
   1.132 +    rv = getNSSDialogs((void**)&dialogs, 
   1.133 +      NS_GET_IID(nsICertPickDialogs), 
   1.134 +      NS_CERTPICKDIALOGS_CONTRACTID);
   1.135 +
   1.136 +    if (NS_SUCCEEDED(rv)) {
   1.137 +      nsPSMUITracker tracker;
   1.138 +      if (tracker.isUIForbidden()) {
   1.139 +        rv = NS_ERROR_NOT_AVAILABLE;
   1.140 +      }
   1.141 +      else {
   1.142 +        /* Throw up the cert picker dialog and get back the index of the selected cert */
   1.143 +        rv = dialogs->PickCertificate(ctx,
   1.144 +          (const char16_t**)certNicknameList, (const char16_t**)certDetailsList,
   1.145 +          CertsToUse, &selectedIndex, canceled);
   1.146 +      }
   1.147 +
   1.148 +      NS_RELEASE(dialogs);
   1.149 +    }
   1.150 +  }
   1.151 +
   1.152 +  int32_t i;
   1.153 +  for (i = 0; i < CertsToUse; ++i) {
   1.154 +    nsMemory::Free(certNicknameList[i]);
   1.155 +    nsMemory::Free(certDetailsList[i]);
   1.156 +  }
   1.157 +  nsMemory::Free(certNicknameList);
   1.158 +  nsMemory::Free(certDetailsList);
   1.159 +  
   1.160 +  if (!CertsToUse) {
   1.161 +    return NS_ERROR_NOT_AVAILABLE;
   1.162 +  }
   1.163 +
   1.164 +  if (NS_SUCCEEDED(rv) && !*canceled) {
   1.165 +    for (i = 0, node = CERT_LIST_HEAD(certList);
   1.166 +         !CERT_LIST_END(node, certList);
   1.167 +         ++i, node = CERT_LIST_NEXT(node)) {
   1.168 +
   1.169 +      if (i == selectedIndex) {
   1.170 +        nsNSSCertificate *cert = nsNSSCertificate::Create(node->cert);
   1.171 +        if (!cert) {
   1.172 +          rv = NS_ERROR_OUT_OF_MEMORY;
   1.173 +          break;
   1.174 +        }
   1.175 +
   1.176 +        nsIX509Cert *x509 = 0;
   1.177 +        nsresult rv = cert->QueryInterface(NS_GET_IID(nsIX509Cert), (void**)&x509);
   1.178 +        if (NS_FAILED(rv)) {
   1.179 +          break;
   1.180 +        }
   1.181 +
   1.182 +        NS_ADDREF(x509);
   1.183 +        *_retval = x509;
   1.184 +        NS_RELEASE(cert);
   1.185 +        break;
   1.186 +      }
   1.187 +    }
   1.188 +  }
   1.189 +
   1.190 +  return rv;
   1.191 +}

mercurial