/src/nss/lib/pki/certificate.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* This Source Code Form is subject to the terms of the Mozilla Public | 
| 2 |  |  * License, v. 2.0. If a copy of the MPL was not distributed with this | 
| 3 |  |  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 
| 4 |  |  | 
| 5 |  | #ifndef NSSPKI_H | 
| 6 |  | #include "nsspki.h" | 
| 7 |  | #endif /* NSSPKI_H */ | 
| 8 |  |  | 
| 9 |  | #ifndef PKIT_H | 
| 10 |  | #include "pkit.h" | 
| 11 |  | #endif /* PKIT_H */ | 
| 12 |  |  | 
| 13 |  | #ifndef PKIM_H | 
| 14 |  | #include "pkim.h" | 
| 15 |  | #endif /* PKIM_H */ | 
| 16 |  |  | 
| 17 |  | #ifndef DEV_H | 
| 18 |  | #include "dev.h" | 
| 19 |  | #endif /* DEV_H */ | 
| 20 |  |  | 
| 21 |  | #include "pkistore.h" | 
| 22 |  |  | 
| 23 |  | #include "pki3hack.h" | 
| 24 |  | #include "pk11func.h" | 
| 25 |  | #include "hasht.h" | 
| 26 |  |  | 
| 27 |  | #ifndef BASE_H | 
| 28 |  | #include "base.h" | 
| 29 |  | #endif /* BASE_H */ | 
| 30 |  |  | 
| 31 |  | extern const NSSError NSS_ERROR_NOT_FOUND; | 
| 32 |  |  | 
| 33 |  | /* Creates a certificate from a base object */ | 
| 34 |  | NSS_IMPLEMENT NSSCertificate * | 
| 35 |  | nssCertificate_Create( | 
| 36 |  |     nssPKIObject *object) | 
| 37 | 0 | { | 
| 38 | 0 |     PRStatus status; | 
| 39 | 0 |     NSSCertificate *rvCert; | 
| 40 | 0 |     nssArenaMark *mark; | 
| 41 | 0 |     NSSArena *arena = object->arena; | 
| 42 | 0 |     PR_ASSERT(object->instances != NULL && object->numInstances > 0); | 
| 43 | 0 |     PR_ASSERT(object->lockType == nssPKIMonitor); | 
| 44 | 0 |     mark = nssArena_Mark(arena); | 
| 45 | 0 |     rvCert = nss_ZNEW(arena, NSSCertificate); | 
| 46 | 0 |     if (!rvCert) { | 
| 47 | 0 |         return (NSSCertificate *)NULL; | 
| 48 | 0 |     } | 
| 49 | 0 |     rvCert->object = *object; | 
| 50 |  |     /* XXX should choose instance based on some criteria */ | 
| 51 | 0 |     status = nssCryptokiCertificate_GetAttributes(object->instances[0], | 
| 52 | 0 |                                                   NULL, /* XXX sessionOpt */ | 
| 53 | 0 |                                                   arena, | 
| 54 | 0 |                                                   &rvCert->type, | 
| 55 | 0 |                                                   &rvCert->id, | 
| 56 | 0 |                                                   &rvCert->encoding, | 
| 57 | 0 |                                                   &rvCert->issuer, | 
| 58 | 0 |                                                   &rvCert->serial, | 
| 59 | 0 |                                                   &rvCert->subject); | 
| 60 | 0 |     if (status != PR_SUCCESS || | 
| 61 | 0 |         !rvCert->encoding.data || | 
| 62 | 0 |         !rvCert->encoding.size || | 
| 63 | 0 |         !rvCert->issuer.data || | 
| 64 | 0 |         !rvCert->issuer.size || | 
| 65 | 0 |         !rvCert->serial.data || | 
| 66 | 0 |         !rvCert->serial.size) { | 
| 67 | 0 |         if (mark) | 
| 68 | 0 |             nssArena_Release(arena, mark); | 
| 69 | 0 |         return (NSSCertificate *)NULL; | 
| 70 | 0 |     } | 
| 71 | 0 |     if (mark) | 
| 72 | 0 |         nssArena_Unmark(arena, mark); | 
| 73 | 0 |     return rvCert; | 
| 74 | 0 | } | 
| 75 |  |  | 
| 76 |  | NSS_IMPLEMENT NSSCertificate * | 
| 77 |  | nssCertificate_AddRef( | 
| 78 |  |     NSSCertificate *c) | 
| 79 | 18.6k | { | 
| 80 | 18.6k |     if (c) { | 
| 81 | 18.6k |         nssPKIObject_AddRef(&c->object); | 
| 82 | 18.6k |     } | 
| 83 | 18.6k |     return c; | 
| 84 | 18.6k | } | 
| 85 |  |  | 
| 86 |  | NSS_IMPLEMENT PRStatus | 
| 87 |  | nssCertificate_Destroy( | 
| 88 |  |     NSSCertificate *c) | 
| 89 | 18.6k | { | 
| 90 | 18.6k |     nssCertificateStoreTrace lockTrace = { NULL, NULL, PR_FALSE, PR_FALSE }; | 
| 91 | 18.6k |     nssCertificateStoreTrace unlockTrace = { NULL, NULL, PR_FALSE, PR_FALSE }; | 
| 92 |  |  | 
| 93 | 18.6k |     if (c) { | 
| 94 | 18.6k |         PRUint32 i; | 
| 95 | 18.6k |         nssDecodedCert *dc = c->decoding; | 
| 96 | 18.6k |         NSSTrustDomain *td = STAN_GetDefaultTrustDomain(); | 
| 97 | 18.6k |         NSSCryptoContext *cc = c->object.cryptoContext; | 
| 98 |  |  | 
| 99 | 18.6k |         PR_ASSERT(c->object.refCount > 0); | 
| 100 |  |  | 
| 101 |  |         /* --- LOCK storage --- */ | 
| 102 | 18.6k |         if (cc) { | 
| 103 | 18.6k |             nssCertificateStore_Lock(cc->certStore, &lockTrace); | 
| 104 | 18.6k |         } else { | 
| 105 | 0 |             nssTrustDomain_LockCertCache(td); | 
| 106 | 0 |         } | 
| 107 | 18.6k |         if (PR_ATOMIC_DECREMENT(&c->object.refCount) == 0) { | 
| 108 |  |             /* --- remove cert and UNLOCK storage --- */ | 
| 109 | 6 |             if (cc) { | 
| 110 | 6 |                 nssCertificateStore_RemoveCertLOCKED(cc->certStore, c); | 
| 111 | 6 |                 nssCertificateStore_Unlock(cc->certStore, &lockTrace, | 
| 112 | 6 |                                            &unlockTrace); | 
| 113 | 6 |             } else { | 
| 114 | 0 |                 nssTrustDomain_RemoveCertFromCacheLOCKED(td, c); | 
| 115 | 0 |                 nssTrustDomain_UnlockCertCache(td); | 
| 116 | 0 |             } | 
| 117 |  |             /* free cert data */ | 
| 118 | 6 |             for (i = 0; i < c->object.numInstances; i++) { | 
| 119 | 0 |                 nssCryptokiObject_Destroy(c->object.instances[i]); | 
| 120 | 0 |             } | 
| 121 | 6 |             nssPKIObject_DestroyLock(&c->object); | 
| 122 | 6 |             nssArena_Destroy(c->object.arena); | 
| 123 | 6 |             nssDecodedCert_Destroy(dc); | 
| 124 | 18.6k |         } else { | 
| 125 |  |             /* --- UNLOCK storage --- */ | 
| 126 | 18.6k |             if (cc) { | 
| 127 | 18.6k |                 nssCertificateStore_Unlock(cc->certStore, | 
| 128 | 18.6k |                                            &lockTrace, | 
| 129 | 18.6k |                                            &unlockTrace); | 
| 130 | 18.6k |             } else { | 
| 131 | 0 |                 nssTrustDomain_UnlockCertCache(td); | 
| 132 | 0 |             } | 
| 133 | 18.6k |         } | 
| 134 | 18.6k |     } | 
| 135 | 18.6k |     return PR_SUCCESS; | 
| 136 | 18.6k | } | 
| 137 |  |  | 
| 138 |  | NSS_IMPLEMENT PRStatus | 
| 139 |  | NSSCertificate_Destroy(NSSCertificate *c) | 
| 140 | 18.6k | { | 
| 141 | 18.6k |     return nssCertificate_Destroy(c); | 
| 142 | 18.6k | } | 
| 143 |  |  | 
| 144 |  | NSS_IMPLEMENT NSSDER * | 
| 145 |  | nssCertificate_GetEncoding(NSSCertificate *c) | 
| 146 | 5 | { | 
| 147 | 5 |     if (c->encoding.size > 0 && c->encoding.data) { | 
| 148 | 5 |         return &c->encoding; | 
| 149 | 5 |     } else { | 
| 150 | 0 |         return (NSSDER *)NULL; | 
| 151 | 0 |     } | 
| 152 | 5 | } | 
| 153 |  |  | 
| 154 |  | NSS_IMPLEMENT NSSDER * | 
| 155 |  | nssCertificate_GetIssuer(NSSCertificate *c) | 
| 156 | 0 | { | 
| 157 | 0 |     if (c->issuer.size > 0 && c->issuer.data) { | 
| 158 | 0 |         return &c->issuer; | 
| 159 | 0 |     } else { | 
| 160 | 0 |         return (NSSDER *)NULL; | 
| 161 | 0 |     } | 
| 162 | 0 | } | 
| 163 |  |  | 
| 164 |  | NSS_IMPLEMENT NSSDER * | 
| 165 |  | nssCertificate_GetSerialNumber(NSSCertificate *c) | 
| 166 | 0 | { | 
| 167 | 0 |     if (c->serial.size > 0 && c->serial.data) { | 
| 168 | 0 |         return &c->serial; | 
| 169 | 0 |     } else { | 
| 170 | 0 |         return (NSSDER *)NULL; | 
| 171 | 0 |     } | 
| 172 | 0 | } | 
| 173 |  |  | 
| 174 |  | NSS_IMPLEMENT NSSDER * | 
| 175 |  | nssCertificate_GetSubject(NSSCertificate *c) | 
| 176 | 0 | { | 
| 177 | 0 |     if (c->subject.size > 0 && c->subject.data) { | 
| 178 | 0 |         return &c->subject; | 
| 179 | 0 |     } else { | 
| 180 | 0 |         return (NSSDER *)NULL; | 
| 181 | 0 |     } | 
| 182 | 0 | } | 
| 183 |  |  | 
| 184 |  | /* Returns a copy, Caller must free using nss_ZFreeIf */ | 
| 185 |  | NSS_IMPLEMENT NSSUTF8 * | 
| 186 |  | nssCertificate_GetNickname( | 
| 187 |  |     NSSCertificate *c, | 
| 188 |  |     NSSToken *tokenOpt) | 
| 189 | 0 | { | 
| 190 | 0 |     return nssPKIObject_GetNicknameForToken(&c->object, tokenOpt); | 
| 191 | 0 | } | 
| 192 |  |  | 
| 193 |  | NSS_IMPLEMENT NSSASCII7 * | 
| 194 |  | nssCertificate_GetEmailAddress(NSSCertificate *c) | 
| 195 | 0 | { | 
| 196 | 0 |     return c->email; | 
| 197 | 0 | } | 
| 198 |  |  | 
| 199 |  | NSS_IMPLEMENT PRStatus | 
| 200 |  | NSSCertificate_DeleteStoredObject( | 
| 201 |  |     NSSCertificate *c, | 
| 202 |  |     NSSCallback *uhh) | 
| 203 | 0 | { | 
| 204 | 0 |     return nssPKIObject_DeleteStoredObject(&c->object, uhh, PR_TRUE); | 
| 205 | 0 | } | 
| 206 |  |  | 
| 207 |  | NSS_IMPLEMENT PRStatus | 
| 208 |  | NSSCertificate_Validate( | 
| 209 |  |     NSSCertificate *c, | 
| 210 |  |     NSSTime *timeOpt, /* NULL for "now" */ | 
| 211 |  |     NSSUsage *usage, | 
| 212 |  |     NSSPolicies *policiesOpt /* NULL for none */ | 
| 213 |  | ) | 
| 214 | 0 | { | 
| 215 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 216 | 0 |     return PR_FAILURE; | 
| 217 | 0 | } | 
| 218 |  |  | 
| 219 |  | NSS_IMPLEMENT void ** /* void *[] */ | 
| 220 |  | NSSCertificate_ValidateCompletely( | 
| 221 |  |     NSSCertificate *c, | 
| 222 |  |     NSSTime *timeOpt, /* NULL for "now" */ | 
| 223 |  |     NSSUsage *usage, | 
| 224 |  |     NSSPolicies *policiesOpt, /* NULL for none */ | 
| 225 |  |     void **rvOpt,             /* NULL for allocate */ | 
| 226 |  |     PRUint32 rvLimit,         /* zero for no limit */ | 
| 227 |  |     NSSArena *arenaOpt        /* NULL for heap */ | 
| 228 |  | ) | 
| 229 | 0 | { | 
| 230 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 231 | 0 |     return NULL; | 
| 232 | 0 | } | 
| 233 |  |  | 
| 234 |  | NSS_IMPLEMENT PRStatus | 
| 235 |  | NSSCertificate_ValidateAndDiscoverUsagesAndPolicies( | 
| 236 |  |     NSSCertificate *c, | 
| 237 |  |     NSSTime **notBeforeOutOpt, | 
| 238 |  |     NSSTime **notAfterOutOpt, | 
| 239 |  |     void *allowedUsages, | 
| 240 |  |     void *disallowedUsages, | 
| 241 |  |     void *allowedPolicies, | 
| 242 |  |     void *disallowedPolicies, | 
| 243 |  |     /* more args.. work on this fgmr */ | 
| 244 |  |     NSSArena *arenaOpt) | 
| 245 | 0 | { | 
| 246 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 247 | 0 |     return PR_FAILURE; | 
| 248 | 0 | } | 
| 249 |  |  | 
| 250 |  | NSS_IMPLEMENT NSSDER * | 
| 251 |  | NSSCertificate_Encode( | 
| 252 |  |     NSSCertificate *c, | 
| 253 |  |     NSSDER *rvOpt, | 
| 254 |  |     NSSArena *arenaOpt) | 
| 255 | 0 | { | 
| 256 |  |     /* Item, DER, BER are all typedefs now... */ | 
| 257 | 0 |     return nssItem_Duplicate((NSSItem *)&c->encoding, arenaOpt, rvOpt); | 
| 258 | 0 | } | 
| 259 |  |  | 
| 260 |  | NSS_IMPLEMENT nssDecodedCert * | 
| 261 |  | nssCertificate_GetDecoding( | 
| 262 |  |     NSSCertificate *c) | 
| 263 | 2 | { | 
| 264 | 2 |     nssDecodedCert *deco = NULL; | 
| 265 | 2 |     if (c->type == NSSCertificateType_PKIX) { | 
| 266 | 0 |         (void)STAN_GetCERTCertificate(c); | 
| 267 | 0 |     } | 
| 268 | 2 |     nssPKIObject_Lock(&c->object); | 
| 269 | 2 |     if (!c->decoding) { | 
| 270 | 0 |         deco = nssDecodedCert_Create(NULL, &c->encoding, c->type); | 
| 271 | 0 |         PORT_Assert(!c->decoding); | 
| 272 | 0 |         c->decoding = deco; | 
| 273 | 2 |     } else { | 
| 274 | 2 |         deco = c->decoding; | 
| 275 | 2 |     } | 
| 276 | 2 |     nssPKIObject_Unlock(&c->object); | 
| 277 | 2 |     return deco; | 
| 278 | 2 | } | 
| 279 |  |  | 
| 280 |  | static NSSCertificate ** | 
| 281 |  | filter_subject_certs_for_id( | 
| 282 |  |     NSSCertificate **subjectCerts, | 
| 283 |  |     void *id) | 
| 284 | 0 | { | 
| 285 | 0 |     NSSCertificate **si; | 
| 286 | 0 |     nssDecodedCert *dcp; | 
| 287 | 0 |     int nextOpenSlot = 0; | 
| 288 | 0 |     int i; | 
| 289 | 0 |     nssCertIDMatch matchLevel = nssCertIDMatch_Unknown; | 
| 290 | 0 |     nssCertIDMatch match; | 
| 291 |  |  | 
| 292 |  |     /* walk the subject certs */ | 
| 293 | 0 |     for (si = subjectCerts; *si; si++) { | 
| 294 | 0 |         dcp = nssCertificate_GetDecoding(*si); | 
| 295 | 0 |         if (!dcp) { | 
| 296 | 0 |             NSSCertificate_Destroy(*si); | 
| 297 | 0 |             continue; | 
| 298 | 0 |         } | 
| 299 | 0 |         match = dcp->matchIdentifier(dcp, id); | 
| 300 | 0 |         switch (match) { | 
| 301 | 0 |             case nssCertIDMatch_Yes: | 
| 302 | 0 |                 if (matchLevel == nssCertIDMatch_Unknown) { | 
| 303 |  |                     /* we have non-definitive matches, forget them */ | 
| 304 | 0 |                     for (i = 0; i < nextOpenSlot; i++) { | 
| 305 | 0 |                         NSSCertificate_Destroy(subjectCerts[i]); | 
| 306 | 0 |                         subjectCerts[i] = NULL; | 
| 307 | 0 |                     } | 
| 308 | 0 |                     nextOpenSlot = 0; | 
| 309 |  |                     /* only keep definitive matches from now on */ | 
| 310 | 0 |                     matchLevel = nssCertIDMatch_Yes; | 
| 311 | 0 |                 } | 
| 312 |  |                 /* keep the cert */ | 
| 313 | 0 |                 subjectCerts[nextOpenSlot++] = *si; | 
| 314 | 0 |                 break; | 
| 315 | 0 |             case nssCertIDMatch_Unknown: | 
| 316 | 0 |                 if (matchLevel == nssCertIDMatch_Unknown) { | 
| 317 |  |                     /* only have non-definitive matches so far, keep it */ | 
| 318 | 0 |                     subjectCerts[nextOpenSlot++] = *si; | 
| 319 | 0 |                     break; | 
| 320 | 0 |                 } | 
| 321 |  |             /* else fall through, we have a definitive match already */ | 
| 322 | 0 |             case nssCertIDMatch_No: | 
| 323 | 0 |             default: | 
| 324 | 0 |                 NSSCertificate_Destroy(*si); | 
| 325 | 0 |                 *si = NULL; | 
| 326 | 0 |         } | 
| 327 | 0 |     } | 
| 328 | 0 |     subjectCerts[nextOpenSlot] = NULL; | 
| 329 | 0 |     return subjectCerts; | 
| 330 | 0 | } | 
| 331 |  |  | 
| 332 |  | static NSSCertificate ** | 
| 333 |  | filter_certs_for_valid_issuers(NSSCertificate **certs) | 
| 334 | 0 | { | 
| 335 | 0 |     NSSCertificate **cp; | 
| 336 | 0 |     nssDecodedCert *dcp; | 
| 337 | 0 |     int nextOpenSlot = 0; | 
| 338 |  | 
 | 
| 339 | 0 |     for (cp = certs; *cp; cp++) { | 
| 340 | 0 |         dcp = nssCertificate_GetDecoding(*cp); | 
| 341 | 0 |         if (dcp && dcp->isValidIssuer(dcp)) { | 
| 342 | 0 |             certs[nextOpenSlot++] = *cp; | 
| 343 | 0 |         } else { | 
| 344 | 0 |             NSSCertificate_Destroy(*cp); | 
| 345 | 0 |         } | 
| 346 | 0 |     } | 
| 347 | 0 |     certs[nextOpenSlot] = NULL; | 
| 348 | 0 |     return certs; | 
| 349 | 0 | } | 
| 350 |  |  | 
| 351 |  | static NSSCertificate * | 
| 352 |  | find_cert_issuer( | 
| 353 |  |     NSSCertificate *c, | 
| 354 |  |     NSSTime *timeOpt, | 
| 355 |  |     NSSUsage *usage, | 
| 356 |  |     NSSPolicies *policiesOpt, | 
| 357 |  |     NSSTrustDomain *td, | 
| 358 |  |     NSSCryptoContext *cc) | 
| 359 | 0 | { | 
| 360 | 0 |     NSSArena *arena; | 
| 361 | 0 |     NSSCertificate **certs = NULL; | 
| 362 | 0 |     NSSCertificate **ccIssuers = NULL; | 
| 363 | 0 |     NSSCertificate **tdIssuers = NULL; | 
| 364 | 0 |     NSSCertificate *issuer = NULL; | 
| 365 |  | 
 | 
| 366 | 0 |     if (!cc) | 
| 367 | 0 |         cc = c->object.cryptoContext; | 
| 368 | 0 |     if (!td) | 
| 369 | 0 |         td = NSSCertificate_GetTrustDomain(c); | 
| 370 | 0 |     arena = nssArena_Create(); | 
| 371 | 0 |     if (!arena) { | 
| 372 | 0 |         return (NSSCertificate *)NULL; | 
| 373 | 0 |     } | 
| 374 | 0 |     if (cc) { | 
| 375 | 0 |         ccIssuers = nssCryptoContext_FindCertificatesBySubject(cc, | 
| 376 | 0 |                                                                &c->issuer, | 
| 377 | 0 |                                                                NULL, | 
| 378 | 0 |                                                                0, | 
| 379 | 0 |                                                                arena); | 
| 380 | 0 |     } | 
| 381 | 0 |     if (td) | 
| 382 | 0 |         tdIssuers = nssTrustDomain_FindCertificatesBySubject(td, | 
| 383 | 0 |                                                              &c->issuer, | 
| 384 | 0 |                                                              NULL, | 
| 385 | 0 |                                                              0, | 
| 386 | 0 |                                                              arena); | 
| 387 | 0 |     certs = nssCertificateArray_Join(ccIssuers, tdIssuers); | 
| 388 | 0 |     if (certs) { | 
| 389 | 0 |         nssDecodedCert *dc = NULL; | 
| 390 | 0 |         void *issuerID = NULL; | 
| 391 | 0 |         dc = nssCertificate_GetDecoding(c); | 
| 392 | 0 |         if (dc) { | 
| 393 | 0 |             issuerID = dc->getIssuerIdentifier(dc); | 
| 394 | 0 |         } | 
| 395 |  |         /* XXX review based on CERT_FindCertIssuer | 
| 396 |  |          * this function is not using the authCertIssuer field as a fallback | 
| 397 |  |          * if authority key id does not exist | 
| 398 |  |          */ | 
| 399 | 0 |         if (issuerID) { | 
| 400 | 0 |             certs = filter_subject_certs_for_id(certs, issuerID); | 
| 401 | 0 |         } | 
| 402 | 0 |         certs = filter_certs_for_valid_issuers(certs); | 
| 403 | 0 |         issuer = nssCertificateArray_FindBestCertificate(certs, | 
| 404 | 0 |                                                          timeOpt, | 
| 405 | 0 |                                                          usage, | 
| 406 | 0 |                                                          policiesOpt); | 
| 407 | 0 |         nssCertificateArray_Destroy(certs); | 
| 408 | 0 |     } | 
| 409 | 0 |     nssArena_Destroy(arena); | 
| 410 | 0 |     return issuer; | 
| 411 | 0 | } | 
| 412 |  |  | 
| 413 |  | /* This function returns the built chain, as far as it gets, | 
| 414 |  | ** even if/when it fails to find an issuer, and returns PR_FAILURE | 
| 415 |  | */ | 
| 416 |  | NSS_IMPLEMENT NSSCertificate ** | 
| 417 |  | nssCertificate_BuildChain( | 
| 418 |  |     NSSCertificate *c, | 
| 419 |  |     NSSTime *timeOpt, | 
| 420 |  |     NSSUsage *usage, | 
| 421 |  |     NSSPolicies *policiesOpt, | 
| 422 |  |     NSSCertificate **rvOpt, | 
| 423 |  |     PRUint32 rvLimit, | 
| 424 |  |     NSSArena *arenaOpt, | 
| 425 |  |     PRStatus *statusOpt, | 
| 426 |  |     NSSTrustDomain *td, | 
| 427 |  |     NSSCryptoContext *cc) | 
| 428 | 5 | { | 
| 429 | 5 |     NSSCertificate **rvChain = NULL; | 
| 430 | 5 |     NSSUsage issuerUsage = *usage; | 
| 431 | 5 |     nssPKIObjectCollection *collection = NULL; | 
| 432 | 5 |     PRUint32 rvCount = 0; | 
| 433 | 5 |     PRStatus st; | 
| 434 | 5 |     PRStatus ret = PR_SUCCESS; | 
| 435 |  |  | 
| 436 | 5 |     if (!c || !cc || | 
| 437 | 5 |         (!td && (td = NSSCertificate_GetTrustDomain(c)) == NULL)) { | 
| 438 | 0 |         goto loser; | 
| 439 | 0 |     } | 
| 440 |  |     /* bump the usage up to CA level */ | 
| 441 | 5 |     issuerUsage.nss3lookingForCA = PR_TRUE; | 
| 442 | 5 |     collection = nssCertificateCollection_Create(td, NULL); | 
| 443 | 5 |     if (!collection) | 
| 444 | 0 |         goto loser; | 
| 445 | 5 |     st = nssPKIObjectCollection_AddObject(collection, (nssPKIObject *)c); | 
| 446 | 5 |     if (st != PR_SUCCESS) | 
| 447 | 0 |         goto loser; | 
| 448 | 5 |     for (rvCount = 1; (!rvLimit || rvCount < rvLimit); ++rvCount) { | 
| 449 | 5 |         CERTCertificate *cCert = STAN_GetCERTCertificate(c); | 
| 450 | 5 |         if (cCert->isRoot) { | 
| 451 |  |             /* not including the issuer of the self-signed cert, which is, | 
| 452 |  |              * of course, itself | 
| 453 |  |              */ | 
| 454 | 5 |             break; | 
| 455 | 5 |         } | 
| 456 | 0 |         c = find_cert_issuer(c, timeOpt, &issuerUsage, policiesOpt, td, cc); | 
| 457 | 0 |         if (!c) { | 
| 458 | 0 |             ret = PR_FAILURE; | 
| 459 | 0 |             break; | 
| 460 | 0 |         } | 
| 461 | 0 |         st = nssPKIObjectCollection_AddObject(collection, (nssPKIObject *)c); | 
| 462 | 0 |         nssCertificate_Destroy(c); /* collection has it */ | 
| 463 | 0 |         if (st != PR_SUCCESS) | 
| 464 | 0 |             goto loser; | 
| 465 | 0 |     } | 
| 466 | 5 |     rvChain = nssPKIObjectCollection_GetCertificates(collection, | 
| 467 | 5 |                                                      rvOpt, | 
| 468 | 5 |                                                      rvLimit, | 
| 469 | 5 |                                                      arenaOpt); | 
| 470 | 5 |     if (rvChain) { | 
| 471 | 5 |         nssPKIObjectCollection_Destroy(collection); | 
| 472 | 5 |         if (statusOpt) | 
| 473 | 3 |             *statusOpt = ret; | 
| 474 | 5 |         if (ret != PR_SUCCESS) | 
| 475 | 0 |             nss_SetError(NSS_ERROR_CERTIFICATE_ISSUER_NOT_FOUND); | 
| 476 | 5 |         return rvChain; | 
| 477 | 5 |     } | 
| 478 |  |  | 
| 479 | 0 | loser: | 
| 480 | 0 |     if (collection) | 
| 481 | 0 |         nssPKIObjectCollection_Destroy(collection); | 
| 482 | 0 |     if (statusOpt) | 
| 483 | 0 |         *statusOpt = PR_FAILURE; | 
| 484 | 0 |     nss_SetError(NSS_ERROR_CERTIFICATE_ISSUER_NOT_FOUND); | 
| 485 | 0 |     return rvChain; | 
| 486 | 5 | } | 
| 487 |  |  | 
| 488 |  | NSS_IMPLEMENT NSSCertificate ** | 
| 489 |  | NSSCertificate_BuildChain( | 
| 490 |  |     NSSCertificate *c, | 
| 491 |  |     NSSTime *timeOpt, | 
| 492 |  |     NSSUsage *usage, | 
| 493 |  |     NSSPolicies *policiesOpt, | 
| 494 |  |     NSSCertificate **rvOpt, | 
| 495 |  |     PRUint32 rvLimit, /* zero for no limit */ | 
| 496 |  |     NSSArena *arenaOpt, | 
| 497 |  |     PRStatus *statusOpt, | 
| 498 |  |     NSSTrustDomain *td, | 
| 499 |  |     NSSCryptoContext *cc) | 
| 500 | 5 | { | 
| 501 | 5 |     return nssCertificate_BuildChain(c, timeOpt, usage, policiesOpt, | 
| 502 | 5 |                                      rvOpt, rvLimit, arenaOpt, statusOpt, | 
| 503 | 5 |                                      td, cc); | 
| 504 | 5 | } | 
| 505 |  |  | 
| 506 |  | NSS_IMPLEMENT NSSCryptoContext * | 
| 507 |  | nssCertificate_GetCryptoContext(NSSCertificate *c) | 
| 508 | 0 | { | 
| 509 | 0 |     return c->object.cryptoContext; | 
| 510 | 0 | } | 
| 511 |  |  | 
| 512 |  | NSS_IMPLEMENT NSSTrustDomain * | 
| 513 |  | nssCertificate_GetTrustDomain(NSSCertificate *c) | 
| 514 | 0 | { | 
| 515 | 0 |     return c->object.trustDomain; | 
| 516 | 0 | } | 
| 517 |  |  | 
| 518 |  | NSS_IMPLEMENT NSSTrustDomain * | 
| 519 |  | NSSCertificate_GetTrustDomain(NSSCertificate *c) | 
| 520 | 0 | { | 
| 521 | 0 |     return nssCertificate_GetTrustDomain(c); | 
| 522 | 0 | } | 
| 523 |  |  | 
| 524 |  | NSS_IMPLEMENT NSSToken * | 
| 525 |  | NSSCertificate_GetToken( | 
| 526 |  |     NSSCertificate *c, | 
| 527 |  |     PRStatus *statusOpt) | 
| 528 | 0 | { | 
| 529 | 0 |     return (NSSToken *)NULL; | 
| 530 | 0 | } | 
| 531 |  |  | 
| 532 |  | NSS_IMPLEMENT NSSSlot * | 
| 533 |  | NSSCertificate_GetSlot( | 
| 534 |  |     NSSCertificate *c, | 
| 535 |  |     PRStatus *statusOpt) | 
| 536 | 0 | { | 
| 537 | 0 |     return (NSSSlot *)NULL; | 
| 538 | 0 | } | 
| 539 |  |  | 
| 540 |  | NSS_IMPLEMENT NSSModule * | 
| 541 |  | NSSCertificate_GetModule( | 
| 542 |  |     NSSCertificate *c, | 
| 543 |  |     PRStatus *statusOpt) | 
| 544 | 0 | { | 
| 545 | 0 |     return (NSSModule *)NULL; | 
| 546 | 0 | } | 
| 547 |  |  | 
| 548 |  | NSS_IMPLEMENT NSSItem * | 
| 549 |  | NSSCertificate_Encrypt( | 
| 550 |  |     NSSCertificate *c, | 
| 551 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 552 |  |     NSSItem *data, | 
| 553 |  |     NSSTime *timeOpt, | 
| 554 |  |     NSSUsage *usage, | 
| 555 |  |     NSSPolicies *policiesOpt, | 
| 556 |  |     NSSCallback *uhh, | 
| 557 |  |     NSSItem *rvOpt, | 
| 558 |  |     NSSArena *arenaOpt) | 
| 559 | 0 | { | 
| 560 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 561 | 0 |     return NULL; | 
| 562 | 0 | } | 
| 563 |  |  | 
| 564 |  | NSS_IMPLEMENT PRStatus | 
| 565 |  | NSSCertificate_Verify( | 
| 566 |  |     NSSCertificate *c, | 
| 567 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 568 |  |     NSSItem *data, | 
| 569 |  |     NSSItem *signature, | 
| 570 |  |     NSSTime *timeOpt, | 
| 571 |  |     NSSUsage *usage, | 
| 572 |  |     NSSPolicies *policiesOpt, | 
| 573 |  |     NSSCallback *uhh) | 
| 574 | 0 | { | 
| 575 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 576 | 0 |     return PR_FAILURE; | 
| 577 | 0 | } | 
| 578 |  |  | 
| 579 |  | NSS_IMPLEMENT NSSItem * | 
| 580 |  | NSSCertificate_VerifyRecover( | 
| 581 |  |     NSSCertificate *c, | 
| 582 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 583 |  |     NSSItem *signature, | 
| 584 |  |     NSSTime *timeOpt, | 
| 585 |  |     NSSUsage *usage, | 
| 586 |  |     NSSPolicies *policiesOpt, | 
| 587 |  |     NSSCallback *uhh, | 
| 588 |  |     NSSItem *rvOpt, | 
| 589 |  |     NSSArena *arenaOpt) | 
| 590 | 0 | { | 
| 591 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 592 | 0 |     return NULL; | 
| 593 | 0 | } | 
| 594 |  |  | 
| 595 |  | NSS_IMPLEMENT NSSItem * | 
| 596 |  | NSSCertificate_WrapSymmetricKey( | 
| 597 |  |     NSSCertificate *c, | 
| 598 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 599 |  |     NSSSymmetricKey *keyToWrap, | 
| 600 |  |     NSSTime *timeOpt, | 
| 601 |  |     NSSUsage *usage, | 
| 602 |  |     NSSPolicies *policiesOpt, | 
| 603 |  |     NSSCallback *uhh, | 
| 604 |  |     NSSItem *rvOpt, | 
| 605 |  |     NSSArena *arenaOpt) | 
| 606 | 0 | { | 
| 607 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 608 | 0 |     return NULL; | 
| 609 | 0 | } | 
| 610 |  |  | 
| 611 |  | NSS_IMPLEMENT NSSCryptoContext * | 
| 612 |  | NSSCertificate_CreateCryptoContext( | 
| 613 |  |     NSSCertificate *c, | 
| 614 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 615 |  |     NSSTime *timeOpt, | 
| 616 |  |     NSSUsage *usage, | 
| 617 |  |     NSSPolicies *policiesOpt, | 
| 618 |  |     NSSCallback *uhh) | 
| 619 | 0 | { | 
| 620 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 621 | 0 |     return NULL; | 
| 622 | 0 | } | 
| 623 |  |  | 
| 624 |  | NSS_IMPLEMENT NSSPublicKey * | 
| 625 |  | NSSCertificate_GetPublicKey( | 
| 626 |  |     NSSCertificate *c) | 
| 627 | 0 | { | 
| 628 |  | #if 0 | 
| 629 |  |     CK_ATTRIBUTE pubktemplate[] = { | 
| 630 |  |     { CKA_CLASS,   NULL, 0 }, | 
| 631 |  |     { CKA_ID,      NULL, 0 }, | 
| 632 |  |     { CKA_SUBJECT, NULL, 0 } | 
| 633 |  |     }; | 
| 634 |  |     PRStatus nssrv; | 
| 635 |  |     CK_ULONG count = sizeof(pubktemplate) / sizeof(pubktemplate[0]); | 
| 636 |  |     NSS_CK_SET_ATTRIBUTE_ITEM(pubktemplate, 0, &g_ck_class_pubkey); | 
| 637 |  |     if (c->id.size > 0) { | 
| 638 |  |     /* CKA_ID */ | 
| 639 |  |     NSS_CK_ITEM_TO_ATTRIBUTE(&c->id, &pubktemplate[1]); | 
| 640 |  |     } else { | 
| 641 |  |     /* failure, yes? */ | 
| 642 |  |     return (NSSPublicKey *)NULL; | 
| 643 |  |     } | 
| 644 |  |     if (c->subject.size > 0) { | 
| 645 |  |     /* CKA_SUBJECT */ | 
| 646 |  |     NSS_CK_ITEM_TO_ATTRIBUTE(&c->subject, &pubktemplate[2]); | 
| 647 |  |     } else { | 
| 648 |  |     /* failure, yes? */ | 
| 649 |  |     return (NSSPublicKey *)NULL; | 
| 650 |  |     } | 
| 651 |  |     /* Try the cert's token first */ | 
| 652 |  |     if (c->token) { | 
| 653 |  |     nssrv = nssToken_FindObjectByTemplate(c->token, pubktemplate, count); | 
| 654 |  |     } | 
| 655 |  | #endif | 
| 656 |  |     /* Try all other key tokens */ | 
| 657 | 0 |     return (NSSPublicKey *)NULL; | 
| 658 | 0 | } | 
| 659 |  |  | 
| 660 |  | NSS_IMPLEMENT NSSPrivateKey * | 
| 661 |  | NSSCertificate_FindPrivateKey( | 
| 662 |  |     NSSCertificate *c, | 
| 663 |  |     NSSCallback *uhh) | 
| 664 | 0 | { | 
| 665 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 666 | 0 |     return NULL; | 
| 667 | 0 | } | 
| 668 |  |  | 
| 669 |  | NSS_IMPLEMENT PRBool | 
| 670 |  | NSSCertificate_IsPrivateKeyAvailable( | 
| 671 |  |     NSSCertificate *c, | 
| 672 |  |     NSSCallback *uhh, | 
| 673 |  |     PRStatus *statusOpt) | 
| 674 | 0 | { | 
| 675 | 0 |     PRBool isUser = PR_FALSE; | 
| 676 | 0 |     nssCryptokiObject **ip; | 
| 677 | 0 |     nssCryptokiObject **instances = nssPKIObject_GetInstances(&c->object); | 
| 678 | 0 |     if (!instances) { | 
| 679 | 0 |         return PR_FALSE; | 
| 680 | 0 |     } | 
| 681 | 0 |     for (ip = instances; *ip; ip++) { | 
| 682 | 0 |         nssCryptokiObject *instance = *ip; | 
| 683 | 0 |         if (nssToken_IsPrivateKeyAvailable(instance->token, c, instance)) { | 
| 684 | 0 |             isUser = PR_TRUE; | 
| 685 | 0 |         } | 
| 686 | 0 |     } | 
| 687 | 0 |     nssCryptokiObjectArray_Destroy(instances); | 
| 688 | 0 |     return isUser; | 
| 689 | 0 | } | 
| 690 |  |  | 
| 691 |  | /* sort the subject cert list from newest to oldest */ | 
| 692 |  | PRIntn | 
| 693 |  | nssCertificate_SubjectListSort( | 
| 694 |  |     void *v1, | 
| 695 |  |     void *v2) | 
| 696 | 1 | { | 
| 697 | 1 |     NSSCertificate *c1 = (NSSCertificate *)v1; | 
| 698 | 1 |     NSSCertificate *c2 = (NSSCertificate *)v2; | 
| 699 | 1 |     nssDecodedCert *dc1 = nssCertificate_GetDecoding(c1); | 
| 700 | 1 |     nssDecodedCert *dc2 = nssCertificate_GetDecoding(c2); | 
| 701 | 1 |     if (!dc1) { | 
| 702 | 0 |         return dc2 ? 1 : 0; | 
| 703 | 1 |     } else if (!dc2) { | 
| 704 | 0 |         return -1; | 
| 705 | 1 |     } else { | 
| 706 | 1 |         return dc1->isNewerThan(dc1, dc2) ? -1 : 1; | 
| 707 | 1 |     } | 
| 708 | 1 | } | 
| 709 |  |  | 
| 710 |  | NSS_IMPLEMENT PRBool | 
| 711 |  | NSSUserCertificate_IsStillPresent( | 
| 712 |  |     NSSUserCertificate *uc, | 
| 713 |  |     PRStatus *statusOpt) | 
| 714 | 0 | { | 
| 715 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 716 | 0 |     return PR_FALSE; | 
| 717 | 0 | } | 
| 718 |  |  | 
| 719 |  | NSS_IMPLEMENT NSSItem * | 
| 720 |  | NSSUserCertificate_Decrypt( | 
| 721 |  |     NSSUserCertificate *uc, | 
| 722 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 723 |  |     NSSItem *data, | 
| 724 |  |     NSSTime *timeOpt, | 
| 725 |  |     NSSUsage *usage, | 
| 726 |  |     NSSPolicies *policiesOpt, | 
| 727 |  |     NSSCallback *uhh, | 
| 728 |  |     NSSItem *rvOpt, | 
| 729 |  |     NSSArena *arenaOpt) | 
| 730 | 0 | { | 
| 731 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 732 | 0 |     return NULL; | 
| 733 | 0 | } | 
| 734 |  |  | 
| 735 |  | NSS_IMPLEMENT NSSItem * | 
| 736 |  | NSSUserCertificate_Sign( | 
| 737 |  |     NSSUserCertificate *uc, | 
| 738 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 739 |  |     NSSItem *data, | 
| 740 |  |     NSSTime *timeOpt, | 
| 741 |  |     NSSUsage *usage, | 
| 742 |  |     NSSPolicies *policiesOpt, | 
| 743 |  |     NSSCallback *uhh, | 
| 744 |  |     NSSItem *rvOpt, | 
| 745 |  |     NSSArena *arenaOpt) | 
| 746 | 0 | { | 
| 747 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 748 | 0 |     return NULL; | 
| 749 | 0 | } | 
| 750 |  |  | 
| 751 |  | NSS_IMPLEMENT NSSItem * | 
| 752 |  | NSSUserCertificate_SignRecover( | 
| 753 |  |     NSSUserCertificate *uc, | 
| 754 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 755 |  |     NSSItem *data, | 
| 756 |  |     NSSTime *timeOpt, | 
| 757 |  |     NSSUsage *usage, | 
| 758 |  |     NSSPolicies *policiesOpt, | 
| 759 |  |     NSSCallback *uhh, | 
| 760 |  |     NSSItem *rvOpt, | 
| 761 |  |     NSSArena *arenaOpt) | 
| 762 | 0 | { | 
| 763 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 764 | 0 |     return NULL; | 
| 765 | 0 | } | 
| 766 |  |  | 
| 767 |  | NSS_IMPLEMENT NSSSymmetricKey * | 
| 768 |  | NSSUserCertificate_UnwrapSymmetricKey( | 
| 769 |  |     NSSUserCertificate *uc, | 
| 770 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 771 |  |     NSSItem *wrappedKey, | 
| 772 |  |     NSSTime *timeOpt, | 
| 773 |  |     NSSUsage *usage, | 
| 774 |  |     NSSPolicies *policiesOpt, | 
| 775 |  |     NSSCallback *uhh, | 
| 776 |  |     NSSItem *rvOpt, | 
| 777 |  |     NSSArena *arenaOpt) | 
| 778 | 0 | { | 
| 779 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 780 | 0 |     return NULL; | 
| 781 | 0 | } | 
| 782 |  |  | 
| 783 |  | NSS_IMPLEMENT NSSSymmetricKey * | 
| 784 |  | NSSUserCertificate_DeriveSymmetricKey( | 
| 785 |  |     NSSUserCertificate *uc, /* provides private key */ | 
| 786 |  |     NSSCertificate *c,      /* provides public key */ | 
| 787 |  |     NSSAlgorithmAndParameters *apOpt, | 
| 788 |  |     NSSOID *target, | 
| 789 |  |     PRUint32 keySizeOpt, /* zero for best allowed */ | 
| 790 |  |     NSSOperations operations, | 
| 791 |  |     NSSCallback *uhh) | 
| 792 | 0 | { | 
| 793 | 0 |     nss_SetError(NSS_ERROR_NOT_FOUND); | 
| 794 | 0 |     return NULL; | 
| 795 | 0 | } | 
| 796 |  |  | 
| 797 |  | NSS_IMPLEMENT nssSMIMEProfile * | 
| 798 |  | nssSMIMEProfile_Create( | 
| 799 |  |     NSSCertificate *cert, | 
| 800 |  |     NSSItem *profileTime, | 
| 801 |  |     NSSItem *profileData) | 
| 802 | 0 | { | 
| 803 | 0 |     NSSArena *arena; | 
| 804 | 0 |     nssSMIMEProfile *rvProfile; | 
| 805 | 0 |     nssPKIObject *object; | 
| 806 | 0 |     NSSTrustDomain *td = nssCertificate_GetTrustDomain(cert); | 
| 807 | 0 |     NSSCryptoContext *cc = nssCertificate_GetCryptoContext(cert); | 
| 808 | 0 |     arena = nssArena_Create(); | 
| 809 | 0 |     if (!arena) { | 
| 810 | 0 |         return NULL; | 
| 811 | 0 |     } | 
| 812 | 0 |     object = nssPKIObject_Create(arena, NULL, td, cc, nssPKILock); | 
| 813 | 0 |     if (!object) { | 
| 814 | 0 |         goto loser; | 
| 815 | 0 |     } | 
| 816 | 0 |     rvProfile = nss_ZNEW(arena, nssSMIMEProfile); | 
| 817 | 0 |     if (!rvProfile) { | 
| 818 | 0 |         goto loser; | 
| 819 | 0 |     } | 
| 820 | 0 |     rvProfile->object = *object; | 
| 821 | 0 |     rvProfile->certificate = cert; | 
| 822 | 0 |     rvProfile->email = nssUTF8_Duplicate(cert->email, arena); | 
| 823 | 0 |     rvProfile->subject = nssItem_Duplicate(&cert->subject, arena, NULL); | 
| 824 | 0 |     if (profileTime) { | 
| 825 | 0 |         rvProfile->profileTime = nssItem_Duplicate(profileTime, arena, NULL); | 
| 826 | 0 |     } | 
| 827 | 0 |     if (profileData) { | 
| 828 | 0 |         rvProfile->profileData = nssItem_Duplicate(profileData, arena, NULL); | 
| 829 | 0 |     } | 
| 830 | 0 |     return rvProfile; | 
| 831 | 0 | loser: | 
| 832 | 0 |     if (object) | 
| 833 | 0 |         nssPKIObject_Destroy(object); | 
| 834 | 0 |     else if (arena) | 
| 835 | 0 |         nssArena_Destroy(arena); | 
| 836 | 0 |     return (nssSMIMEProfile *)NULL; | 
| 837 | 0 | } | 
| 838 |  |  | 
| 839 |  | /* execute a callback function on all members of a cert list */ | 
| 840 |  | NSS_EXTERN PRStatus | 
| 841 |  | nssCertificateList_DoCallback( | 
| 842 |  |     nssList *certList, | 
| 843 |  |     PRStatus (*callback)(NSSCertificate *c, void *arg), | 
| 844 |  |     void *arg) | 
| 845 | 0 | { | 
| 846 | 0 |     nssListIterator *certs; | 
| 847 | 0 |     NSSCertificate *cert; | 
| 848 | 0 |     certs = nssList_CreateIterator(certList); | 
| 849 | 0 |     if (!certs) { | 
| 850 | 0 |         return PR_FAILURE; | 
| 851 | 0 |     } | 
| 852 | 0 |     for (cert = (NSSCertificate *)nssListIterator_Start(certs); | 
| 853 | 0 |          cert != (NSSCertificate *)NULL; | 
| 854 | 0 |          cert = (NSSCertificate *)nssListIterator_Next(certs)) { | 
| 855 | 0 |         (void)(*callback)(cert, arg); | 
| 856 | 0 |     } | 
| 857 | 0 |     nssListIterator_Finish(certs); | 
| 858 | 0 |     nssListIterator_Destroy(certs); | 
| 859 | 0 |     return PR_SUCCESS; | 
| 860 | 0 | } | 
| 861 |  |  | 
| 862 |  | static PRStatus | 
| 863 |  | add_ref_callback(NSSCertificate *c, void *a) | 
| 864 | 0 | { | 
| 865 | 0 |     nssCertificate_AddRef(c); | 
| 866 | 0 |     return PR_SUCCESS; | 
| 867 | 0 | } | 
| 868 |  |  | 
| 869 |  | NSS_IMPLEMENT void | 
| 870 |  | nssCertificateList_AddReferences( | 
| 871 |  |     nssList *certList) | 
| 872 | 0 | { | 
| 873 | 0 |     (void)nssCertificateList_DoCallback(certList, add_ref_callback, NULL); | 
| 874 | 0 | } | 
| 875 |  |  | 
| 876 |  | /* | 
| 877 |  |  * Is this trust record safe to apply to all certs of the same issuer/SN | 
| 878 |  |  * independent of the cert matching the hash. This is only true is the trust | 
| 879 |  |  * is unknown or distrusted. In general this feature is only useful to | 
| 880 |  |  * explicitly distrusting certs. It is not safe to use to trust certs, so | 
| 881 |  |  * only allow unknown and untrusted trust types. | 
| 882 |  |  */ | 
| 883 |  | PRBool | 
| 884 |  | nssTrust_IsSafeToIgnoreCertHash(nssTrustLevel serverAuth, | 
| 885 |  |                                 nssTrustLevel clientAuth, nssTrustLevel codeSigning, | 
| 886 |  |                                 nssTrustLevel email, PRBool stepup) | 
| 887 | 0 | { | 
| 888 |  |     /* step up is a trust type, if it's on, we must have a hash for the cert */ | 
| 889 | 0 |     if (stepup) { | 
| 890 | 0 |         return PR_FALSE; | 
| 891 | 0 |     } | 
| 892 | 0 |     if ((serverAuth != nssTrustLevel_Unknown) && | 
| 893 | 0 |         (serverAuth != nssTrustLevel_NotTrusted)) { | 
| 894 | 0 |         return PR_FALSE; | 
| 895 | 0 |     } | 
| 896 | 0 |     if ((clientAuth != nssTrustLevel_Unknown) && | 
| 897 | 0 |         (clientAuth != nssTrustLevel_NotTrusted)) { | 
| 898 | 0 |         return PR_FALSE; | 
| 899 | 0 |     } | 
| 900 | 0 |     if ((codeSigning != nssTrustLevel_Unknown) && | 
| 901 | 0 |         (codeSigning != nssTrustLevel_NotTrusted)) { | 
| 902 | 0 |         return PR_FALSE; | 
| 903 | 0 |     } | 
| 904 | 0 |     if ((email != nssTrustLevel_Unknown) && | 
| 905 | 0 |         (email != nssTrustLevel_NotTrusted)) { | 
| 906 | 0 |         return PR_FALSE; | 
| 907 | 0 |     } | 
| 908 |  |     /* record only has Unknown and Untrusted entries, ok to accept without a | 
| 909 |  |      * hash */ | 
| 910 | 0 |     return PR_TRUE; | 
| 911 | 0 | } | 
| 912 |  |  | 
| 913 |  | NSS_IMPLEMENT NSSTrust * | 
| 914 |  | nssTrust_Create( | 
| 915 |  |     nssPKIObject *object, | 
| 916 |  |     NSSItem *certData) | 
| 917 | 0 | { | 
| 918 | 0 |     PRStatus status; | 
| 919 | 0 |     PRUint32 i; | 
| 920 | 0 |     PRUint32 lastTrustOrder, myTrustOrder; | 
| 921 | 0 |     unsigned char sha1_hashcmp[SHA1_LENGTH]; | 
| 922 | 0 |     unsigned char sha1_hashin[SHA1_LENGTH]; | 
| 923 | 0 |     NSSItem sha1_hash; | 
| 924 | 0 |     NSSTrust *rvt; | 
| 925 | 0 |     nssCryptokiObject *instance; | 
| 926 | 0 |     nssTrustLevel serverAuth, clientAuth, codeSigning, emailProtection; | 
| 927 | 0 |     SECStatus rv; /* Should be stan flavor */ | 
| 928 | 0 |     PRBool stepUp; | 
| 929 |  | 
 | 
| 930 | 0 |     lastTrustOrder = 1 << 16; /* just make it big */ | 
| 931 | 0 |     PR_ASSERT(object->instances != NULL && object->numInstances > 0); | 
| 932 | 0 |     rvt = nss_ZNEW(object->arena, NSSTrust); | 
| 933 | 0 |     if (!rvt) { | 
| 934 | 0 |         return (NSSTrust *)NULL; | 
| 935 | 0 |     } | 
| 936 | 0 |     rvt->object = *object; | 
| 937 |  |  | 
| 938 |  |     /* should be stan flavor of Hashbuf */ | 
| 939 | 0 |     rv = PK11_HashBuf(SEC_OID_SHA1, sha1_hashcmp, certData->data, certData->size); | 
| 940 | 0 |     if (rv != SECSuccess) { | 
| 941 | 0 |         return (NSSTrust *)NULL; | 
| 942 | 0 |     } | 
| 943 | 0 |     sha1_hash.data = sha1_hashin; | 
| 944 | 0 |     sha1_hash.size = sizeof(sha1_hashin); | 
| 945 |  |     /* trust has to peek into the base object members */ | 
| 946 | 0 |     nssPKIObject_Lock(object); | 
| 947 | 0 |     for (i = 0; i < object->numInstances; i++) { | 
| 948 | 0 |         instance = object->instances[i]; | 
| 949 | 0 |         myTrustOrder = nssToken_GetTrustOrder(instance->token); | 
| 950 | 0 |         status = nssCryptokiTrust_GetAttributes(instance, NULL, | 
| 951 | 0 |                                                 &sha1_hash, | 
| 952 | 0 |                                                 &serverAuth, | 
| 953 | 0 |                                                 &clientAuth, | 
| 954 | 0 |                                                 &codeSigning, | 
| 955 | 0 |                                                 &emailProtection, | 
| 956 | 0 |                                                 &stepUp); | 
| 957 | 0 |         if (status != PR_SUCCESS) { | 
| 958 | 0 |             nssPKIObject_Unlock(object); | 
| 959 | 0 |             return (NSSTrust *)NULL; | 
| 960 | 0 |         } | 
| 961 |  |         /* if no hash is specified, then trust applies to all certs with | 
| 962 |  |          * this issuer/SN. NOTE: This is only true for entries that | 
| 963 |  |          * have distrust and unknown record */ | 
| 964 | 0 |         if (!( | 
| 965 |  |                 /* we continue if there is no hash, and the trust type is | 
| 966 |  |                  * safe to accept without a hash ... or ... */ | 
| 967 | 0 |                 ((sha1_hash.size == 0) && | 
| 968 | 0 |                  nssTrust_IsSafeToIgnoreCertHash(serverAuth, clientAuth, | 
| 969 | 0 |                                                  codeSigning, emailProtection, | 
| 970 | 0 |                                                  stepUp)) || | 
| 971 |  |                 /* we have a hash of the correct size, and it matches */ | 
| 972 | 0 |                 ((sha1_hash.size == SHA1_LENGTH) && (PORT_Memcmp(sha1_hashin, | 
| 973 | 0 |                                                                  sha1_hashcmp, | 
| 974 | 0 |                                                                  SHA1_LENGTH) == 0)))) { | 
| 975 | 0 |             nssPKIObject_Unlock(object); | 
| 976 | 0 |             return (NSSTrust *)NULL; | 
| 977 | 0 |         } | 
| 978 | 0 |         if (rvt->serverAuth == nssTrustLevel_Unknown || | 
| 979 | 0 |             myTrustOrder < lastTrustOrder) { | 
| 980 | 0 |             rvt->serverAuth = serverAuth; | 
| 981 | 0 |         } | 
| 982 | 0 |         if (rvt->clientAuth == nssTrustLevel_Unknown || | 
| 983 | 0 |             myTrustOrder < lastTrustOrder) { | 
| 984 | 0 |             rvt->clientAuth = clientAuth; | 
| 985 | 0 |         } | 
| 986 | 0 |         if (rvt->emailProtection == nssTrustLevel_Unknown || | 
| 987 | 0 |             myTrustOrder < lastTrustOrder) { | 
| 988 | 0 |             rvt->emailProtection = emailProtection; | 
| 989 | 0 |         } | 
| 990 | 0 |         if (rvt->codeSigning == nssTrustLevel_Unknown || | 
| 991 | 0 |             myTrustOrder < lastTrustOrder) { | 
| 992 | 0 |             rvt->codeSigning = codeSigning; | 
| 993 | 0 |         } | 
| 994 | 0 |         rvt->stepUpApproved = stepUp; | 
| 995 | 0 |         lastTrustOrder = myTrustOrder; | 
| 996 | 0 |     } | 
| 997 | 0 |     nssPKIObject_Unlock(object); | 
| 998 | 0 |     return rvt; | 
| 999 | 0 | } | 
| 1000 |  |  | 
| 1001 |  | NSS_IMPLEMENT NSSTrust * | 
| 1002 |  | nssTrust_AddRef(NSSTrust *trust) | 
| 1003 | 0 | { | 
| 1004 | 0 |     if (trust) { | 
| 1005 | 0 |         nssPKIObject_AddRef(&trust->object); | 
| 1006 | 0 |     } | 
| 1007 | 0 |     return trust; | 
| 1008 | 0 | } | 
| 1009 |  |  | 
| 1010 |  | NSS_IMPLEMENT PRStatus | 
| 1011 |  | nssTrust_Destroy(NSSTrust *trust) | 
| 1012 | 0 | { | 
| 1013 | 0 |     if (trust) { | 
| 1014 | 0 |         (void)nssPKIObject_Destroy(&trust->object); | 
| 1015 | 0 |     } | 
| 1016 | 0 |     return PR_SUCCESS; | 
| 1017 | 0 | } | 
| 1018 |  |  | 
| 1019 |  | NSS_IMPLEMENT nssSMIMEProfile * | 
| 1020 |  | nssSMIMEProfile_AddRef(nssSMIMEProfile *profile) | 
| 1021 | 0 | { | 
| 1022 | 0 |     if (profile) { | 
| 1023 | 0 |         nssPKIObject_AddRef(&profile->object); | 
| 1024 | 0 |     } | 
| 1025 | 0 |     return profile; | 
| 1026 | 0 | } | 
| 1027 |  |  | 
| 1028 |  | NSS_IMPLEMENT PRStatus | 
| 1029 |  | nssSMIMEProfile_Destroy(nssSMIMEProfile *profile) | 
| 1030 | 0 | { | 
| 1031 | 0 |     if (profile) { | 
| 1032 | 0 |         (void)nssPKIObject_Destroy(&profile->object); | 
| 1033 | 0 |     } | 
| 1034 | 0 |     return PR_SUCCESS; | 
| 1035 | 0 | } | 
| 1036 |  |  | 
| 1037 |  | NSS_IMPLEMENT NSSCRL * | 
| 1038 |  | nssCRL_Create(nssPKIObject *object) | 
| 1039 | 0 | { | 
| 1040 | 0 |     PRStatus status; | 
| 1041 | 0 |     NSSCRL *rvCRL; | 
| 1042 | 0 |     NSSArena *arena = object->arena; | 
| 1043 | 0 |     PR_ASSERT(object->instances != NULL && object->numInstances > 0); | 
| 1044 | 0 |     rvCRL = nss_ZNEW(arena, NSSCRL); | 
| 1045 | 0 |     if (!rvCRL) { | 
| 1046 | 0 |         return (NSSCRL *)NULL; | 
| 1047 | 0 |     } | 
| 1048 | 0 |     rvCRL->object = *object; | 
| 1049 |  |     /* XXX should choose instance based on some criteria */ | 
| 1050 | 0 |     status = nssCryptokiCRL_GetAttributes(object->instances[0], | 
| 1051 | 0 |                                           NULL, /* XXX sessionOpt */ | 
| 1052 | 0 |                                           arena, | 
| 1053 | 0 |                                           &rvCRL->encoding, | 
| 1054 | 0 |                                           NULL, /* subject */ | 
| 1055 | 0 |                                           NULL, /* class */ | 
| 1056 | 0 |                                           &rvCRL->url, | 
| 1057 | 0 |                                           &rvCRL->isKRL); | 
| 1058 | 0 |     if (status != PR_SUCCESS) { | 
| 1059 | 0 |         if (!arena) { | 
| 1060 | 0 |             nssPKIObject_Destroy((nssPKIObject *)rvCRL); | 
| 1061 | 0 |         } | 
| 1062 | 0 |         return (NSSCRL *)NULL; | 
| 1063 | 0 |     } | 
| 1064 | 0 |     return rvCRL; | 
| 1065 | 0 | } | 
| 1066 |  |  | 
| 1067 |  | NSS_IMPLEMENT NSSCRL * | 
| 1068 |  | nssCRL_AddRef(NSSCRL *crl) | 
| 1069 | 0 | { | 
| 1070 | 0 |     if (crl) { | 
| 1071 | 0 |         nssPKIObject_AddRef(&crl->object); | 
| 1072 | 0 |     } | 
| 1073 | 0 |     return crl; | 
| 1074 | 0 | } | 
| 1075 |  |  | 
| 1076 |  | NSS_IMPLEMENT PRStatus | 
| 1077 |  | nssCRL_Destroy(NSSCRL *crl) | 
| 1078 | 0 | { | 
| 1079 | 0 |     if (crl) { | 
| 1080 | 0 |         (void)nssPKIObject_Destroy(&crl->object); | 
| 1081 | 0 |     } | 
| 1082 | 0 |     return PR_SUCCESS; | 
| 1083 | 0 | } | 
| 1084 |  |  | 
| 1085 |  | NSS_IMPLEMENT PRStatus | 
| 1086 |  | nssCRL_DeleteStoredObject( | 
| 1087 |  |     NSSCRL *crl, | 
| 1088 |  |     NSSCallback *uhh) | 
| 1089 | 0 | { | 
| 1090 | 0 |     return nssPKIObject_DeleteStoredObject(&crl->object, uhh, PR_TRUE); | 
| 1091 | 0 | } | 
| 1092 |  |  | 
| 1093 |  | NSS_IMPLEMENT NSSDER * | 
| 1094 |  | nssCRL_GetEncoding(NSSCRL *crl) | 
| 1095 | 0 | { | 
| 1096 | 0 |     if (crl && crl->encoding.data != NULL && crl->encoding.size > 0) { | 
| 1097 | 0 |         return &crl->encoding; | 
| 1098 | 0 |     } else { | 
| 1099 | 0 |         return (NSSDER *)NULL; | 
| 1100 | 0 |     } | 
| 1101 | 0 | } |