mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-09 09:20:15 +01:00
817 lines
24 KiB
C
817 lines
24 KiB
C
|
/* ***** BEGIN LICENSE BLOCK *****
|
||
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
||
|
*
|
||
|
* The contents of this file are subject to the Mozilla Public License Version
|
||
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
||
|
* the License. You may obtain a copy of the License at
|
||
|
* http://www.mozilla.org/MPL/
|
||
|
*
|
||
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
||
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
||
|
* for the specific language governing rights and limitations under the
|
||
|
* License.
|
||
|
*
|
||
|
* The Original Code is the Netscape security libraries.
|
||
|
*
|
||
|
* The Initial Developer of the Original Code is
|
||
|
* Netscape Communications Corporation.
|
||
|
* Portions created by the Initial Developer are Copyright (C) 1994-2000
|
||
|
* the Initial Developer. All Rights Reserved.
|
||
|
*
|
||
|
* Contributor(s):
|
||
|
*
|
||
|
* Alternatively, the contents of this file may be used under the terms of
|
||
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
||
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
||
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
||
|
* of those above. If you wish to allow use of your version of this file only
|
||
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
||
|
* use your version of this file under the terms of the MPL, indicate your
|
||
|
* decision by deleting the provisions above and replace them with the notice
|
||
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
||
|
* the provisions above, a recipient may use your version of this file under
|
||
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
||
|
*
|
||
|
* ***** END LICENSE BLOCK ***** */
|
||
|
/*
|
||
|
* This file manages Netscape specific PKCS #11 objects (CRLs, Trust objects,
|
||
|
* etc).
|
||
|
*/
|
||
|
|
||
|
#include "secport.h"
|
||
|
#include "seccomon.h"
|
||
|
#include "secmod.h"
|
||
|
#include "secmodi.h"
|
||
|
#include "secmodti.h"
|
||
|
#include "pkcs11.h"
|
||
|
#include "pk11func.h"
|
||
|
#include "cert.h"
|
||
|
#include "certi.h"
|
||
|
#include "secitem.h"
|
||
|
#include "sechash.h"
|
||
|
#include "secoid.h"
|
||
|
|
||
|
#include "certdb.h"
|
||
|
#include "secerr.h"
|
||
|
#include "sslerr.h"
|
||
|
|
||
|
#include "pki3hack.h"
|
||
|
#include "dev3hack.h"
|
||
|
|
||
|
#include "devm.h"
|
||
|
#include "pki.h"
|
||
|
#include "pkim.h"
|
||
|
|
||
|
extern const NSSError NSS_ERROR_NOT_FOUND;
|
||
|
|
||
|
CK_TRUST
|
||
|
pk11_GetTrustField(PK11SlotInfo *slot, PRArenaPool *arena,
|
||
|
CK_OBJECT_HANDLE id, CK_ATTRIBUTE_TYPE type)
|
||
|
{
|
||
|
CK_TRUST rv = 0;
|
||
|
SECItem item;
|
||
|
|
||
|
item.data = NULL;
|
||
|
item.len = 0;
|
||
|
|
||
|
if( SECSuccess == PK11_ReadAttribute(slot, id, type, arena, &item) ) {
|
||
|
PORT_Assert(item.len == sizeof(CK_TRUST));
|
||
|
PORT_Memcpy(&rv, item.data, sizeof(CK_TRUST));
|
||
|
/* Damn, is there an endian problem here? */
|
||
|
return rv;
|
||
|
}
|
||
|
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
PRBool
|
||
|
pk11_HandleTrustObject(PK11SlotInfo *slot, CERTCertificate *cert, CERTCertTrust *trust)
|
||
|
{
|
||
|
PRArenaPool *arena;
|
||
|
|
||
|
CK_ATTRIBUTE tobjTemplate[] = {
|
||
|
{ CKA_CLASS, NULL, 0 },
|
||
|
{ CKA_CERT_SHA1_HASH, NULL, 0 },
|
||
|
};
|
||
|
|
||
|
CK_OBJECT_CLASS tobjc = CKO_NETSCAPE_TRUST;
|
||
|
CK_OBJECT_HANDLE tobjID;
|
||
|
unsigned char sha1_hash[SHA1_LENGTH];
|
||
|
|
||
|
CK_TRUST serverAuth, codeSigning, emailProtection, clientAuth;
|
||
|
|
||
|
PK11_HashBuf(SEC_OID_SHA1, sha1_hash, cert->derCert.data, cert->derCert.len);
|
||
|
|
||
|
PK11_SETATTRS(&tobjTemplate[0], CKA_CLASS, &tobjc, sizeof(tobjc));
|
||
|
PK11_SETATTRS(&tobjTemplate[1], CKA_CERT_SHA1_HASH, sha1_hash,
|
||
|
SHA1_LENGTH);
|
||
|
|
||
|
tobjID = pk11_FindObjectByTemplate(slot, tobjTemplate,
|
||
|
sizeof(tobjTemplate)/sizeof(tobjTemplate[0]));
|
||
|
if( CK_INVALID_HANDLE == tobjID ) {
|
||
|
return PR_FALSE;
|
||
|
}
|
||
|
|
||
|
arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE);
|
||
|
if( NULL == arena ) return PR_FALSE;
|
||
|
|
||
|
/* Unfortunately, it seems that PK11_GetAttributes doesn't deal
|
||
|
* well with nonexistant attributes. I guess we have to check
|
||
|
* the trust info fields one at a time.
|
||
|
*/
|
||
|
|
||
|
/* We could verify CKA_CERT_HASH here */
|
||
|
|
||
|
/* We could verify CKA_EXPIRES here */
|
||
|
|
||
|
|
||
|
/* "Purpose" trust information */
|
||
|
serverAuth = pk11_GetTrustField(slot, arena, tobjID, CKA_TRUST_SERVER_AUTH);
|
||
|
clientAuth = pk11_GetTrustField(slot, arena, tobjID, CKA_TRUST_CLIENT_AUTH);
|
||
|
codeSigning = pk11_GetTrustField(slot, arena, tobjID, CKA_TRUST_CODE_SIGNING);
|
||
|
emailProtection = pk11_GetTrustField(slot, arena, tobjID,
|
||
|
CKA_TRUST_EMAIL_PROTECTION);
|
||
|
/* Here's where the fun logic happens. We have to map back from the
|
||
|
* key usage, extended key usage, purpose, and possibly other trust values
|
||
|
* into the old trust-flags bits. */
|
||
|
|
||
|
/* First implementation: keep it simple for testing. We can study what other
|
||
|
* mappings would be appropriate and add them later.. fgmr 20000724 */
|
||
|
|
||
|
if ( serverAuth == CKT_NETSCAPE_TRUSTED ) {
|
||
|
trust->sslFlags |= CERTDB_VALID_PEER | CERTDB_TRUSTED;
|
||
|
}
|
||
|
|
||
|
if ( serverAuth == CKT_NETSCAPE_TRUSTED_DELEGATOR ) {
|
||
|
trust->sslFlags |= CERTDB_VALID_CA | CERTDB_TRUSTED_CA |
|
||
|
CERTDB_NS_TRUSTED_CA;
|
||
|
}
|
||
|
if ( clientAuth == CKT_NETSCAPE_TRUSTED_DELEGATOR ) {
|
||
|
trust->sslFlags |= CERTDB_TRUSTED_CLIENT_CA ;
|
||
|
}
|
||
|
|
||
|
if ( emailProtection == CKT_NETSCAPE_TRUSTED ) {
|
||
|
trust->emailFlags |= CERTDB_VALID_PEER | CERTDB_TRUSTED;
|
||
|
}
|
||
|
|
||
|
if ( emailProtection == CKT_NETSCAPE_TRUSTED_DELEGATOR ) {
|
||
|
trust->emailFlags |= CERTDB_VALID_CA | CERTDB_TRUSTED_CA | CERTDB_NS_TRUSTED_CA;
|
||
|
}
|
||
|
|
||
|
if( codeSigning == CKT_NETSCAPE_TRUSTED ) {
|
||
|
trust->objectSigningFlags |= CERTDB_VALID_PEER | CERTDB_TRUSTED;
|
||
|
}
|
||
|
|
||
|
if( codeSigning == CKT_NETSCAPE_TRUSTED_DELEGATOR ) {
|
||
|
trust->objectSigningFlags |= CERTDB_VALID_CA | CERTDB_TRUSTED_CA | CERTDB_NS_TRUSTED_CA;
|
||
|
}
|
||
|
|
||
|
/* There's certainly a lot more logic that can go here.. */
|
||
|
|
||
|
PORT_FreeArena(arena, PR_FALSE);
|
||
|
|
||
|
return PR_TRUE;
|
||
|
}
|
||
|
|
||
|
static SECStatus
|
||
|
pk11_CollectCrls(PK11SlotInfo *slot, CK_OBJECT_HANDLE crlID, void *arg)
|
||
|
{
|
||
|
SECItem derCrl;
|
||
|
CERTCrlHeadNode *head = (CERTCrlHeadNode *) arg;
|
||
|
CERTCrlNode *new_node = NULL;
|
||
|
CK_ATTRIBUTE fetchCrl[3] = {
|
||
|
{ CKA_VALUE, NULL, 0},
|
||
|
{ CKA_NETSCAPE_KRL, NULL, 0},
|
||
|
{ CKA_NETSCAPE_URL, NULL, 0},
|
||
|
};
|
||
|
const int fetchCrlSize = sizeof(fetchCrl)/sizeof(fetchCrl[2]);
|
||
|
CK_RV crv;
|
||
|
SECStatus rv = SECFailure;
|
||
|
|
||
|
crv = PK11_GetAttributes(head->arena,slot,crlID,fetchCrl,fetchCrlSize);
|
||
|
if (CKR_OK != crv) {
|
||
|
PORT_SetError(PK11_MapError(crv));
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
if (!fetchCrl[1].pValue) {
|
||
|
PORT_SetError(SEC_ERROR_CRL_INVALID);
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
new_node = (CERTCrlNode *)PORT_ArenaAlloc(head->arena, sizeof(CERTCrlNode));
|
||
|
if (new_node == NULL) {
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
if (*((CK_BBOOL *)fetchCrl[1].pValue))
|
||
|
new_node->type = SEC_KRL_TYPE;
|
||
|
else
|
||
|
new_node->type = SEC_CRL_TYPE;
|
||
|
|
||
|
derCrl.type = siBuffer;
|
||
|
derCrl.data = (unsigned char *)fetchCrl[0].pValue;
|
||
|
derCrl.len = fetchCrl[0].ulValueLen;
|
||
|
new_node->crl=CERT_DecodeDERCrl(head->arena,&derCrl,new_node->type);
|
||
|
if (new_node->crl == NULL) {
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
if (fetchCrl[2].pValue) {
|
||
|
int nnlen = fetchCrl[2].ulValueLen;
|
||
|
new_node->crl->url = (char *)PORT_ArenaAlloc(head->arena, nnlen+1);
|
||
|
if ( !new_node->crl->url ) {
|
||
|
goto loser;
|
||
|
}
|
||
|
PORT_Memcpy(new_node->crl->url, fetchCrl[2].pValue, nnlen);
|
||
|
new_node->crl->url[nnlen] = 0;
|
||
|
} else {
|
||
|
new_node->crl->url = NULL;
|
||
|
}
|
||
|
|
||
|
|
||
|
new_node->next = NULL;
|
||
|
if (head->last) {
|
||
|
head->last->next = new_node;
|
||
|
head->last = new_node;
|
||
|
} else {
|
||
|
head->first = head->last = new_node;
|
||
|
}
|
||
|
rv = SECSuccess;
|
||
|
|
||
|
loser:
|
||
|
return(rv);
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* Return a list of all the CRLs .
|
||
|
* CRLs are allocated in the list's arena.
|
||
|
*/
|
||
|
SECStatus
|
||
|
PK11_LookupCrls(CERTCrlHeadNode *nodes, int type, void *wincx) {
|
||
|
pk11TraverseSlot creater;
|
||
|
CK_ATTRIBUTE theTemplate[2];
|
||
|
CK_ATTRIBUTE *attrs;
|
||
|
CK_OBJECT_CLASS certClass = CKO_NETSCAPE_CRL;
|
||
|
CK_BBOOL isKrl = CK_FALSE;
|
||
|
|
||
|
attrs = theTemplate;
|
||
|
PK11_SETATTRS(attrs, CKA_CLASS, &certClass, sizeof(certClass)); attrs++;
|
||
|
if (type != -1) {
|
||
|
isKrl = (CK_BBOOL) (type == SEC_KRL_TYPE);
|
||
|
PK11_SETATTRS(attrs, CKA_NETSCAPE_KRL, &isKrl, sizeof(isKrl)); attrs++;
|
||
|
}
|
||
|
|
||
|
creater.callback = pk11_CollectCrls;
|
||
|
creater.callbackArg = (void *) nodes;
|
||
|
creater.findTemplate = theTemplate;
|
||
|
creater.templateCount = (attrs - theTemplate);
|
||
|
|
||
|
return pk11_TraverseAllSlots(PK11_TraverseSlot, &creater, PR_FALSE, wincx);
|
||
|
}
|
||
|
|
||
|
struct crlOptionsStr {
|
||
|
CERTCrlHeadNode* head;
|
||
|
PRInt32 decodeOptions;
|
||
|
};
|
||
|
|
||
|
typedef struct crlOptionsStr crlOptions;
|
||
|
|
||
|
static SECStatus
|
||
|
pk11_RetrieveCrlsCallback(PK11SlotInfo *slot, CK_OBJECT_HANDLE crlID,
|
||
|
void *arg)
|
||
|
{
|
||
|
SECItem* derCrl = NULL;
|
||
|
crlOptions* options = (crlOptions*) arg;
|
||
|
CERTCrlHeadNode *head = options->head;
|
||
|
CERTCrlNode *new_node = NULL;
|
||
|
CK_ATTRIBUTE fetchCrl[3] = {
|
||
|
{ CKA_VALUE, NULL, 0},
|
||
|
{ CKA_NETSCAPE_KRL, NULL, 0},
|
||
|
{ CKA_NETSCAPE_URL, NULL, 0},
|
||
|
};
|
||
|
const int fetchCrlSize = sizeof(fetchCrl)/sizeof(fetchCrl[2]);
|
||
|
CK_RV crv;
|
||
|
SECStatus rv = SECFailure;
|
||
|
PRBool adopted = PR_FALSE; /* whether the CRL adopted the DER memory
|
||
|
successfully */
|
||
|
int i;
|
||
|
|
||
|
crv = PK11_GetAttributes(NULL,slot,crlID,fetchCrl,fetchCrlSize);
|
||
|
if (CKR_OK != crv) {
|
||
|
PORT_SetError(PK11_MapError(crv));
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
if (!fetchCrl[1].pValue) {
|
||
|
/* reject KRLs */
|
||
|
PORT_SetError(SEC_ERROR_CRL_INVALID);
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
new_node = (CERTCrlNode *)PORT_ArenaAlloc(head->arena,
|
||
|
sizeof(CERTCrlNode));
|
||
|
if (new_node == NULL) {
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
new_node->type = SEC_CRL_TYPE;
|
||
|
|
||
|
derCrl = SECITEM_AllocItem(NULL, NULL, 0);
|
||
|
if (!derCrl) {
|
||
|
goto loser;
|
||
|
}
|
||
|
derCrl->type = siBuffer;
|
||
|
derCrl->data = (unsigned char *)fetchCrl[0].pValue;
|
||
|
derCrl->len = fetchCrl[0].ulValueLen;
|
||
|
new_node->crl = CERT_DecodeDERCrlWithFlags(NULL, derCrl,new_node->type,
|
||
|
options->decodeOptions);
|
||
|
if (new_node->crl == NULL) {
|
||
|
goto loser;
|
||
|
}
|
||
|
adopted = PR_TRUE; /* now that the CRL has adopted the DER memory,
|
||
|
we won't need to free it upon exit */
|
||
|
|
||
|
if (fetchCrl[2].pValue && fetchCrl[2].ulValueLen) {
|
||
|
/* copy the URL if there is one */
|
||
|
int nnlen = fetchCrl[2].ulValueLen;
|
||
|
new_node->crl->url = (char *)PORT_ArenaAlloc(new_node->crl->arena,
|
||
|
nnlen+1);
|
||
|
if ( !new_node->crl->url ) {
|
||
|
goto loser;
|
||
|
}
|
||
|
PORT_Memcpy(new_node->crl->url, fetchCrl[2].pValue, nnlen);
|
||
|
new_node->crl->url[nnlen] = 0;
|
||
|
} else {
|
||
|
new_node->crl->url = NULL;
|
||
|
}
|
||
|
|
||
|
new_node->next = NULL;
|
||
|
if (head->last) {
|
||
|
head->last->next = new_node;
|
||
|
head->last = new_node;
|
||
|
} else {
|
||
|
head->first = head->last = new_node;
|
||
|
}
|
||
|
rv = SECSuccess;
|
||
|
new_node->crl->slot = PK11_ReferenceSlot(slot);
|
||
|
new_node->crl->pkcs11ID = crlID;
|
||
|
|
||
|
loser:
|
||
|
/* free attributes that weren't adopted by the CRL */
|
||
|
for (i=1;i<fetchCrlSize;i++) {
|
||
|
if (fetchCrl[i].pValue) {
|
||
|
PORT_Free(fetchCrl[i].pValue);
|
||
|
}
|
||
|
}
|
||
|
/* free the DER if the CRL object didn't adopt it */
|
||
|
if (fetchCrl[0].pValue && PR_FALSE == adopted) {
|
||
|
PORT_Free(fetchCrl[0].pValue);
|
||
|
}
|
||
|
if (derCrl && !adopted) {
|
||
|
/* clear the data fields, which we already took care of above */
|
||
|
derCrl->data = NULL;
|
||
|
derCrl->len = 0;
|
||
|
/* free the memory for the SECItem structure itself */
|
||
|
SECITEM_FreeItem(derCrl, PR_TRUE);
|
||
|
}
|
||
|
return(rv);
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* Return a list of CRLs matching specified issuer and type
|
||
|
* CRLs are not allocated in the list's arena, but rather in their own,
|
||
|
* arena, so that they can be used individually in the CRL cache .
|
||
|
* CRLs are always partially decoded for efficiency.
|
||
|
*/
|
||
|
SECStatus pk11_RetrieveCrls(CERTCrlHeadNode *nodes, SECItem* issuer,
|
||
|
void *wincx)
|
||
|
{
|
||
|
pk11TraverseSlot creater;
|
||
|
CK_ATTRIBUTE theTemplate[2];
|
||
|
CK_ATTRIBUTE *attrs;
|
||
|
CK_OBJECT_CLASS crlClass = CKO_NETSCAPE_CRL;
|
||
|
crlOptions options;
|
||
|
|
||
|
attrs = theTemplate;
|
||
|
PK11_SETATTRS(attrs, CKA_CLASS, &crlClass, sizeof(crlClass)); attrs++;
|
||
|
|
||
|
options.head = nodes;
|
||
|
|
||
|
/* - do a partial decoding - we don't need to decode the entries while
|
||
|
fetching
|
||
|
- don't copy the DER for optimal performance - CRL can be very large
|
||
|
- have the CRL objects adopt the DER, so SEC_DestroyCrl will free it
|
||
|
- keep bad CRL objects. The CRL cache is interested in them, for
|
||
|
security purposes. Bad CRL objects are a sign of something amiss.
|
||
|
*/
|
||
|
|
||
|
options.decodeOptions = CRL_DECODE_SKIP_ENTRIES | CRL_DECODE_DONT_COPY_DER |
|
||
|
CRL_DECODE_ADOPT_HEAP_DER | CRL_DECODE_KEEP_BAD_CRL;
|
||
|
if (issuer)
|
||
|
{
|
||
|
PK11_SETATTRS(attrs, CKA_SUBJECT, issuer->data, issuer->len); attrs++;
|
||
|
}
|
||
|
|
||
|
creater.callback = pk11_RetrieveCrlsCallback;
|
||
|
creater.callbackArg = (void *) &options;
|
||
|
creater.findTemplate = theTemplate;
|
||
|
creater.templateCount = (attrs - theTemplate);
|
||
|
|
||
|
return pk11_TraverseAllSlots(PK11_TraverseSlot, &creater, PR_FALSE, wincx);
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* return the crl associated with a derSubjectName
|
||
|
*/
|
||
|
SECItem *
|
||
|
PK11_FindCrlByName(PK11SlotInfo **slot, CK_OBJECT_HANDLE *crlHandle,
|
||
|
SECItem *name, int type, char **pUrl)
|
||
|
{
|
||
|
NSSCRL **crls, **crlp, *crl = NULL;
|
||
|
NSSDER subject;
|
||
|
SECItem *rvItem;
|
||
|
NSSTrustDomain *td = STAN_GetDefaultTrustDomain();
|
||
|
char * url = NULL;
|
||
|
|
||
|
PORT_SetError(0);
|
||
|
NSSITEM_FROM_SECITEM(&subject, name);
|
||
|
if (*slot) {
|
||
|
nssCryptokiObject **instances;
|
||
|
nssPKIObjectCollection *collection;
|
||
|
nssTokenSearchType tokenOnly = nssTokenSearchType_TokenOnly;
|
||
|
NSSToken *token = PK11Slot_GetNSSToken(*slot);
|
||
|
collection = nssCRLCollection_Create(td, NULL);
|
||
|
if (!collection) {
|
||
|
goto loser;
|
||
|
}
|
||
|
instances = nssToken_FindCRLsBySubject(token, NULL, &subject,
|
||
|
tokenOnly, 0, NULL);
|
||
|
nssPKIObjectCollection_AddInstances(collection, instances, 0);
|
||
|
nss_ZFreeIf(instances);
|
||
|
crls = nssPKIObjectCollection_GetCRLs(collection, NULL, 0, NULL);
|
||
|
nssPKIObjectCollection_Destroy(collection);
|
||
|
} else {
|
||
|
crls = nssTrustDomain_FindCRLsBySubject(td, &subject);
|
||
|
}
|
||
|
if ((!crls) || (*crls == NULL)) {
|
||
|
if (crls) {
|
||
|
nssCRLArray_Destroy(crls);
|
||
|
}
|
||
|
if (NSS_GetError() == NSS_ERROR_NOT_FOUND) {
|
||
|
PORT_SetError(SEC_ERROR_CRL_NOT_FOUND);
|
||
|
}
|
||
|
goto loser;
|
||
|
}
|
||
|
for (crlp = crls; *crlp; crlp++) {
|
||
|
if ((!(*crlp)->isKRL && type == SEC_CRL_TYPE) ||
|
||
|
((*crlp)->isKRL && type != SEC_CRL_TYPE))
|
||
|
{
|
||
|
crl = nssCRL_AddRef(*crlp);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
nssCRLArray_Destroy(crls);
|
||
|
if (!crl) {
|
||
|
/* CRL collection was found, but no interesting CRL's were on it.
|
||
|
* Not an error */
|
||
|
PORT_SetError(SEC_ERROR_CRL_NOT_FOUND);
|
||
|
goto loser;
|
||
|
}
|
||
|
if (crl->url) {
|
||
|
url = PORT_Strdup(crl->url);
|
||
|
if (!url) {
|
||
|
goto loser;
|
||
|
}
|
||
|
}
|
||
|
rvItem = SECITEM_AllocItem(NULL, NULL, crl->encoding.size);
|
||
|
if (!rvItem) {
|
||
|
goto loser;
|
||
|
}
|
||
|
memcpy(rvItem->data, crl->encoding.data, crl->encoding.size);
|
||
|
*slot = PK11_ReferenceSlot(crl->object.instances[0]->token->pk11slot);
|
||
|
*crlHandle = crl->object.instances[0]->handle;
|
||
|
*pUrl = url;
|
||
|
nssCRL_Destroy(crl);
|
||
|
return rvItem;
|
||
|
|
||
|
loser:
|
||
|
if (url)
|
||
|
PORT_Free(url);
|
||
|
if (crl)
|
||
|
nssCRL_Destroy(crl);
|
||
|
if (PORT_GetError() == 0) {
|
||
|
PORT_SetError(SEC_ERROR_CRL_NOT_FOUND);
|
||
|
}
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
CK_OBJECT_HANDLE
|
||
|
PK11_PutCrl(PK11SlotInfo *slot, SECItem *crl, SECItem *name,
|
||
|
char *url, int type)
|
||
|
{
|
||
|
NSSItem derCRL, derSubject;
|
||
|
NSSToken *token = PK11Slot_GetNSSToken(slot);
|
||
|
nssCryptokiObject *object;
|
||
|
PRBool isKRL = (type == SEC_CRL_TYPE) ? PR_FALSE : PR_TRUE;
|
||
|
CK_OBJECT_HANDLE rvH;
|
||
|
|
||
|
NSSITEM_FROM_SECITEM(&derSubject, name);
|
||
|
NSSITEM_FROM_SECITEM(&derCRL, crl);
|
||
|
|
||
|
object = nssToken_ImportCRL(token, NULL,
|
||
|
&derSubject, &derCRL, isKRL, url, PR_TRUE);
|
||
|
|
||
|
if (object) {
|
||
|
rvH = object->handle;
|
||
|
nssCryptokiObject_Destroy(object);
|
||
|
} else {
|
||
|
rvH = CK_INVALID_HANDLE;
|
||
|
}
|
||
|
return rvH;
|
||
|
}
|
||
|
|
||
|
|
||
|
/*
|
||
|
* delete a crl.
|
||
|
*/
|
||
|
SECStatus
|
||
|
SEC_DeletePermCRL(CERTSignedCrl *crl)
|
||
|
{
|
||
|
PRStatus status;
|
||
|
NSSToken *token;
|
||
|
nssCryptokiObject *object;
|
||
|
PK11SlotInfo *slot = crl->slot;
|
||
|
|
||
|
if (slot == NULL) {
|
||
|
PORT_Assert(slot);
|
||
|
/* shouldn't happen */
|
||
|
PORT_SetError( SEC_ERROR_CRL_INVALID);
|
||
|
return SECFailure;
|
||
|
}
|
||
|
token = PK11Slot_GetNSSToken(slot);
|
||
|
|
||
|
object = nss_ZNEW(NULL, nssCryptokiObject);
|
||
|
if (!object) {
|
||
|
return SECFailure;
|
||
|
}
|
||
|
object->token = nssToken_AddRef(token);
|
||
|
object->handle = crl->pkcs11ID;
|
||
|
object->isTokenObject = PR_TRUE;
|
||
|
|
||
|
status = nssToken_DeleteStoredObject(object);
|
||
|
|
||
|
nssCryptokiObject_Destroy(object);
|
||
|
return (status == PR_SUCCESS) ? SECSuccess : SECFailure;
|
||
|
}
|
||
|
|
||
|
/*
|
||
|
* return the certificate associated with a derCert
|
||
|
*/
|
||
|
SECItem *
|
||
|
PK11_FindSMimeProfile(PK11SlotInfo **slot, char *emailAddr,
|
||
|
SECItem *name, SECItem **profileTime)
|
||
|
{
|
||
|
CK_OBJECT_CLASS smimeClass = CKO_NETSCAPE_SMIME;
|
||
|
CK_ATTRIBUTE theTemplate[] = {
|
||
|
{ CKA_SUBJECT, NULL, 0 },
|
||
|
{ CKA_CLASS, NULL, 0 },
|
||
|
{ CKA_NETSCAPE_EMAIL, NULL, 0 },
|
||
|
};
|
||
|
CK_ATTRIBUTE smimeData[] = {
|
||
|
{ CKA_SUBJECT, NULL, 0 },
|
||
|
{ CKA_VALUE, NULL, 0 },
|
||
|
};
|
||
|
/* if you change the array, change the variable below as well */
|
||
|
int tsize = sizeof(theTemplate)/sizeof(theTemplate[0]);
|
||
|
CK_OBJECT_HANDLE smimeh = CK_INVALID_HANDLE;
|
||
|
CK_ATTRIBUTE *attrs = theTemplate;
|
||
|
CK_RV crv;
|
||
|
SECItem *emailProfile = NULL;
|
||
|
|
||
|
if (!emailAddr || !emailAddr[0]) {
|
||
|
PORT_SetError(SEC_ERROR_INVALID_ARGS);
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
PK11_SETATTRS(attrs, CKA_SUBJECT, name->data, name->len); attrs++;
|
||
|
PK11_SETATTRS(attrs, CKA_CLASS, &smimeClass, sizeof(smimeClass)); attrs++;
|
||
|
PK11_SETATTRS(attrs, CKA_NETSCAPE_EMAIL, emailAddr, strlen(emailAddr));
|
||
|
attrs++;
|
||
|
|
||
|
if (*slot) {
|
||
|
smimeh = pk11_FindObjectByTemplate(*slot,theTemplate,tsize);
|
||
|
} else {
|
||
|
PK11SlotList *list = PK11_GetAllTokens(CKM_INVALID_MECHANISM,
|
||
|
PR_FALSE,PR_TRUE,NULL);
|
||
|
PK11SlotListElement *le;
|
||
|
|
||
|
if (!list) {
|
||
|
return NULL;
|
||
|
}
|
||
|
/* loop through all the slots */
|
||
|
for (le = list->head; le; le = le->next) {
|
||
|
smimeh = pk11_FindObjectByTemplate(le->slot,theTemplate,tsize);
|
||
|
if (smimeh != CK_INVALID_HANDLE) {
|
||
|
*slot = PK11_ReferenceSlot(le->slot);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
PK11_FreeSlotList(list);
|
||
|
}
|
||
|
|
||
|
if (smimeh == CK_INVALID_HANDLE) {
|
||
|
PORT_SetError(SEC_ERROR_NO_KRL);
|
||
|
return NULL;
|
||
|
}
|
||
|
|
||
|
if (profileTime) {
|
||
|
PK11_SETATTRS(smimeData, CKA_NETSCAPE_SMIME_TIMESTAMP, NULL, 0);
|
||
|
}
|
||
|
|
||
|
crv = PK11_GetAttributes(NULL,*slot,smimeh,smimeData,2);
|
||
|
if (crv != CKR_OK) {
|
||
|
PORT_SetError(PK11_MapError (crv));
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
if (!profileTime) {
|
||
|
SECItem profileSubject;
|
||
|
|
||
|
profileSubject.data = (unsigned char*) smimeData[0].pValue;
|
||
|
profileSubject.len = smimeData[0].ulValueLen;
|
||
|
if (!SECITEM_ItemsAreEqual(&profileSubject,name)) {
|
||
|
goto loser;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
emailProfile = (SECItem *)PORT_ZAlloc(sizeof(SECItem));
|
||
|
if (emailProfile == NULL) {
|
||
|
goto loser;
|
||
|
}
|
||
|
|
||
|
emailProfile->data = (unsigned char*) smimeData[1].pValue;
|
||
|
emailProfile->len = smimeData[1].ulValueLen;
|
||
|
|
||
|
if (profileTime) {
|
||
|
*profileTime = (SECItem *)PORT_ZAlloc(sizeof(SECItem));
|
||
|
if (*profileTime) {
|
||
|
(*profileTime)->data = (unsigned char*) smimeData[0].pValue;
|
||
|
(*profileTime)->len = smimeData[0].ulValueLen;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
loser:
|
||
|
if (emailProfile == NULL) {
|
||
|
if (smimeData[1].pValue) {
|
||
|
PORT_Free(smimeData[1].pValue);
|
||
|
}
|
||
|
}
|
||
|
if (profileTime == NULL || *profileTime == NULL) {
|
||
|
if (smimeData[0].pValue) {
|
||
|
PORT_Free(smimeData[0].pValue);
|
||
|
}
|
||
|
}
|
||
|
return emailProfile;
|
||
|
}
|
||
|
|
||
|
|
||
|
SECStatus
|
||
|
PK11_SaveSMimeProfile(PK11SlotInfo *slot, char *emailAddr, SECItem *derSubj,
|
||
|
SECItem *emailProfile, SECItem *profileTime)
|
||
|
{
|
||
|
CK_OBJECT_CLASS smimeClass = CKO_NETSCAPE_SMIME;
|
||
|
CK_BBOOL ck_true = CK_TRUE;
|
||
|
CK_ATTRIBUTE theTemplate[] = {
|
||
|
{ CKA_CLASS, NULL, 0 },
|
||
|
{ CKA_TOKEN, NULL, 0 },
|
||
|
{ CKA_SUBJECT, NULL, 0 },
|
||
|
{ CKA_NETSCAPE_EMAIL, NULL, 0 },
|
||
|
{ CKA_NETSCAPE_SMIME_TIMESTAMP, NULL, 0 },
|
||
|
{ CKA_VALUE, NULL, 0 }
|
||
|
};
|
||
|
/* if you change the array, change the variable below as well */
|
||
|
int realSize = 0;
|
||
|
CK_OBJECT_HANDLE smimeh = CK_INVALID_HANDLE;
|
||
|
CK_ATTRIBUTE *attrs = theTemplate;
|
||
|
CK_SESSION_HANDLE rwsession;
|
||
|
PK11SlotInfo *free_slot = NULL;
|
||
|
CK_RV crv;
|
||
|
#ifdef DEBUG
|
||
|
int tsize = sizeof(theTemplate)/sizeof(theTemplate[0]);
|
||
|
#endif
|
||
|
|
||
|
PK11_SETATTRS(attrs, CKA_CLASS, &smimeClass, sizeof(smimeClass)); attrs++;
|
||
|
PK11_SETATTRS(attrs, CKA_TOKEN, &ck_true, sizeof(ck_true)); attrs++;
|
||
|
PK11_SETATTRS(attrs, CKA_SUBJECT, derSubj->data, derSubj->len); attrs++;
|
||
|
PK11_SETATTRS(attrs, CKA_NETSCAPE_EMAIL,
|
||
|
emailAddr, PORT_Strlen(emailAddr)+1); attrs++;
|
||
|
if (profileTime) {
|
||
|
PK11_SETATTRS(attrs, CKA_NETSCAPE_SMIME_TIMESTAMP, profileTime->data,
|
||
|
profileTime->len); attrs++;
|
||
|
PK11_SETATTRS(attrs, CKA_VALUE,emailProfile->data,
|
||
|
emailProfile->len); attrs++;
|
||
|
}
|
||
|
realSize = attrs - theTemplate;
|
||
|
PORT_Assert (realSize <= tsize);
|
||
|
|
||
|
if (slot == NULL) {
|
||
|
free_slot = slot = PK11_GetInternalKeySlot();
|
||
|
/* we need to free the key slot in the end!!! */
|
||
|
}
|
||
|
|
||
|
rwsession = PK11_GetRWSession(slot);
|
||
|
if (rwsession == CK_INVALID_SESSION) {
|
||
|
PORT_SetError(SEC_ERROR_READ_ONLY);
|
||
|
if (free_slot) {
|
||
|
PK11_FreeSlot(free_slot);
|
||
|
}
|
||
|
return SECFailure;
|
||
|
}
|
||
|
|
||
|
crv = PK11_GETTAB(slot)->
|
||
|
C_CreateObject(rwsession,theTemplate,realSize,&smimeh);
|
||
|
if (crv != CKR_OK) {
|
||
|
PORT_SetError( PK11_MapError(crv) );
|
||
|
}
|
||
|
|
||
|
PK11_RestoreROSession(slot,rwsession);
|
||
|
|
||
|
if (free_slot) {
|
||
|
PK11_FreeSlot(free_slot);
|
||
|
}
|
||
|
return SECSuccess;
|
||
|
}
|
||
|
|
||
|
|
||
|
CERTSignedCrl * crl_storeCRL (PK11SlotInfo *slot,char *url,
|
||
|
CERTSignedCrl *newCrl, SECItem *derCrl, int type);
|
||
|
|
||
|
/* import the CRL into the token */
|
||
|
|
||
|
CERTSignedCrl* PK11_ImportCRL(PK11SlotInfo * slot, SECItem *derCRL, char *url,
|
||
|
int type, void *wincx, PRInt32 importOptions, PRArenaPool* arena,
|
||
|
PRInt32 decodeoptions)
|
||
|
{
|
||
|
CERTSignedCrl *newCrl, *crl;
|
||
|
SECStatus rv;
|
||
|
CERTCertificate *caCert = NULL;
|
||
|
|
||
|
newCrl = crl = NULL;
|
||
|
|
||
|
do {
|
||
|
newCrl = CERT_DecodeDERCrlWithFlags(arena, derCRL, type,
|
||
|
decodeoptions);
|
||
|
if (newCrl == NULL) {
|
||
|
if (type == SEC_CRL_TYPE) {
|
||
|
/* only promote error when the error code is too generic */
|
||
|
if (PORT_GetError () == SEC_ERROR_BAD_DER)
|
||
|
PORT_SetError(SEC_ERROR_CRL_INVALID);
|
||
|
} else {
|
||
|
PORT_SetError(SEC_ERROR_KRL_INVALID);
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
if (0 == (importOptions & CRL_IMPORT_BYPASS_CHECKS)){
|
||
|
CERTCertDBHandle* handle = CERT_GetDefaultCertDB();
|
||
|
PR_ASSERT(handle != NULL);
|
||
|
caCert = CERT_FindCertByName (handle,
|
||
|
&newCrl->crl.derName);
|
||
|
if (caCert == NULL) {
|
||
|
PORT_SetError(SEC_ERROR_UNKNOWN_ISSUER);
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
/* If caCert is a v3 certificate, make sure that it can be used for
|
||
|
crl signing purpose */
|
||
|
rv = CERT_CheckCertUsage (caCert, KU_CRL_SIGN);
|
||
|
if (rv != SECSuccess) {
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
rv = CERT_VerifySignedData(&newCrl->signatureWrap, caCert,
|
||
|
PR_Now(), wincx);
|
||
|
if (rv != SECSuccess) {
|
||
|
if (type == SEC_CRL_TYPE) {
|
||
|
PORT_SetError(SEC_ERROR_CRL_BAD_SIGNATURE);
|
||
|
} else {
|
||
|
PORT_SetError(SEC_ERROR_KRL_BAD_SIGNATURE);
|
||
|
}
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
crl = crl_storeCRL(slot, url, newCrl, derCRL, type);
|
||
|
|
||
|
} while (0);
|
||
|
|
||
|
if (crl == NULL) {
|
||
|
SEC_DestroyCrl (newCrl);
|
||
|
}
|
||
|
if (caCert) {
|
||
|
CERT_DestroyCertificate(caCert);
|
||
|
}
|
||
|
return (crl);
|
||
|
}
|