RetroZilla/extensions/wallet/src/nsPasswordManager.cpp

295 lines
8.5 KiB
C++
Raw Normal View History

2015-10-21 05:03:22 +02:00
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is mozilla.org code.
*
* The Initial Developer of the Original Code is
* Netscape Communications Corporation.
* Portions created by the Initial Developer are Copyright (C) 1998
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
* Mike Calmus
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
#include "nsPasswordManager.h"
#include "nsPassword.h"
#include "singsign.h"
#include "wallet.h"
#include "nsReadableUtils.h"
////////////////////////////////////////////////////////////////////////////////
class nsPasswordManagerEnumerator : public nsISimpleEnumerator
{
public:
NS_DECL_ISUPPORTS
nsPasswordManagerEnumerator(PRBool aDecrypt = PR_TRUE) :
mHostCount(0), mUserCount(0), mDecrypt(aDecrypt)
{
}
NS_IMETHOD HasMoreElements(PRBool *result)
{
*result = SINGSIGN_HostCount() > mHostCount;
return NS_OK;
}
NS_IMETHOD GetNext(nsISupports **result)
{
char * host;
PRUnichar * user;
PRUnichar * pswd;
nsresult rv = SINGSIGN_Enumerate(mHostCount, mUserCount++, mDecrypt, &host, &user, &pswd);
if (NS_FAILED(rv)) {
mUserCount = 0;
mHostCount++;
return rv;
}
if (mUserCount == SINGSIGN_UserCount(mHostCount)) {
mUserCount = 0;
mHostCount++;
}
nsIPassword *password = new nsPassword(host, user, pswd);
// note that memory is handed off to "new nsPassword" in a non-xpcom fashion
if (password == nsnull) {
nsMemory::Free(host);
nsMemory::Free(user);
nsMemory::Free(pswd);
return NS_ERROR_OUT_OF_MEMORY;
}
*result = password;
NS_ADDREF(*result);
return NS_OK;
}
virtual ~nsPasswordManagerEnumerator()
{
}
protected:
PRInt32 mHostCount;
PRInt32 mUserCount;
PRBool mDecrypt;
};
NS_IMPL_ISUPPORTS1(nsPasswordManagerEnumerator, nsISimpleEnumerator)
////////////////////////////////////////////////////////////////////////////////
class nsPasswordManagerRejectEnumerator : public nsISimpleEnumerator
{
public:
NS_DECL_ISUPPORTS
nsPasswordManagerRejectEnumerator() : mRejectCount(0)
{
}
NS_IMETHOD HasMoreElements(PRBool *result)
{
*result = SINGSIGN_RejectCount() > mRejectCount;
return NS_OK;
}
NS_IMETHOD GetNext(nsISupports **result)
{
char * host;
nsresult rv = SINGSIGN_RejectEnumerate(mRejectCount++, &host);
if (NS_FAILED(rv)) {
return rv;
}
nsIPassword *password = new nsPassword(host, nsnull, nsnull); /* only first argument used */
if (password == nsnull) {
nsMemory::Free(host);
return NS_ERROR_OUT_OF_MEMORY;
}
*result = password;
NS_ADDREF(*result);
return NS_OK;
}
virtual ~nsPasswordManagerRejectEnumerator()
{
}
protected:
PRInt32 mRejectCount;
};
NS_IMPL_ISUPPORTS1(nsPasswordManagerRejectEnumerator, nsISimpleEnumerator)
////////////////////////////////////////////////////////////////////////////////
// nsPasswordManager Implementation
NS_IMPL_ISUPPORTS3(nsPasswordManager, nsIPasswordManager, nsIPasswordManagerInternal, nsISupportsWeakReference)
nsPasswordManager::nsPasswordManager()
{
}
nsPasswordManager::~nsPasswordManager(void)
{
}
nsresult nsPasswordManager::Init()
{
return NS_OK;
}
NS_IMETHODIMP nsPasswordManager::GetEnumerator(nsISimpleEnumerator * *entries)
{
*entries = nsnull;
nsPasswordManagerEnumerator* enumerator = new nsPasswordManagerEnumerator();
if (enumerator == nsnull) {
return NS_ERROR_OUT_OF_MEMORY;
}
NS_ADDREF(enumerator);
*entries = enumerator;
return NS_OK;
}
NS_IMETHODIMP nsPasswordManager::AddUser(const nsACString& aHost, const nsAString& aUser, const nsAString& aPwd) {
SINGSIGN_StorePassword(PromiseFlatCString(aHost).get(),
PromiseFlatString(aUser).get(),
PromiseFlatString(aPwd).get());
return NS_OK;
}
NS_IMETHODIMP nsPasswordManager::RemoveUser(const nsACString& aHost, const nsAString& aUser)
{
return ::SINGSIGN_RemoveUser(PromiseFlatCString(aHost).get(),
PromiseFlatString(aUser).get(), PR_TRUE);
}
NS_IMETHODIMP nsPasswordManager::GetRejectEnumerator(nsISimpleEnumerator * *entries)
{
*entries = nsnull;
nsPasswordManagerRejectEnumerator* enumerator = new nsPasswordManagerRejectEnumerator();
if (enumerator == nsnull) {
return NS_ERROR_OUT_OF_MEMORY;
}
NS_ADDREF(enumerator);
*entries = enumerator;
return NS_OK;
}
NS_IMETHODIMP nsPasswordManager::RemoveReject(const nsACString& aHost)
{
return ::SINGSIGN_RemoveReject(PromiseFlatCString(aHost).get());
}
NS_IMETHODIMP
nsPasswordManager::FindPasswordEntry
(const nsACString& aHostURI, const nsAString& aUsername, const nsAString& aPassword,
nsACString& aHostURIFound, nsAString& aUsernameFound, nsAString& aPasswordFound)
{
nsresult rv;
nsCOMPtr<nsIPassword> passwordElem;
nsCOMPtr<nsISimpleEnumerator> enumerator = new nsPasswordManagerEnumerator(PR_FALSE);
if (!enumerator) {
return NS_ERROR_OUT_OF_MEMORY;
}
PRBool hasMoreElements = PR_FALSE;
enumerator->HasMoreElements(&hasMoreElements);
// Emumerate through set of saved logins
while (hasMoreElements) {
rv = enumerator->GetNext(getter_AddRefs(passwordElem));
if (NS_FAILED(rv))
return rv;
if (passwordElem) {
// Get the contents of this saved login
nsCAutoString hostURI;
nsAutoString encUsername, username;
nsAutoString encPassword, password;
passwordElem->GetHost(hostURI);
passwordElem->GetUser(encUsername);
passwordElem->GetPassword(encPassword);
// Check for a match with the input parameters, treating null input values as
// wild cards
PRBool hostURIOK = aHostURI.IsEmpty() || hostURI.Equals(aHostURI);
if (hostURIOK) {
rv = Wallet_Decrypt(encUsername, username);
if (NS_FAILED(rv)) {
return rv;
}
rv = Wallet_Decrypt(encPassword, password);
if (NS_FAILED(rv)) {
return rv;
}
}
PRBool usernameOK = aUsername.IsEmpty() || username.Equals(aUsername);
PRBool passwordOK = aPassword.IsEmpty() || password.Equals(aPassword);
// If a match is found, return success
if (hostURIOK && usernameOK && passwordOK) {
aHostURIFound = hostURI;
aUsernameFound = username;
aPasswordFound = password;
return NS_OK;
}
}
enumerator->HasMoreElements(&hasMoreElements);
}
// no match found
return NS_ERROR_FAILURE;
}
NS_IMETHODIMP nsPasswordManager::AddReject(const nsACString& host)
{
return ::SINGSIGN_AddReject(PromiseFlatCString(host).get());
}
NS_IMETHODIMP
nsPasswordManager::AddUserFull(const nsACString& aKey,
const nsAString& aUser,
const nsAString& aPassword,
const nsAString& aUserFieldName,
const nsAString& aPassFieldName)
{
return NS_ERROR_NOT_IMPLEMENTED;
}
NS_IMETHODIMP nsPasswordManager::ReadPasswords(nsIFile* aPasswordFile)
{
return NS_ERROR_NOT_IMPLEMENTED;
}