Coverage Report

Created: 2025-07-01 06:25

/src/nss/lib/pki/certificate.c
Line
Count
Source (jump to first uncovered line)
1
/* This Source Code Form is subject to the terms of the Mozilla Public
2
 * License, v. 2.0. If a copy of the MPL was not distributed with this
3
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
4
5
#ifndef NSSPKI_H
6
#include "nsspki.h"
7
#endif /* NSSPKI_H */
8
9
#ifndef PKIT_H
10
#include "pkit.h"
11
#endif /* PKIT_H */
12
13
#ifndef PKIM_H
14
#include "pkim.h"
15
#endif /* PKIM_H */
16
17
#ifndef DEV_H
18
#include "dev.h"
19
#endif /* DEV_H */
20
21
#include "pkistore.h"
22
23
#include "pki3hack.h"
24
#include "pk11func.h"
25
#include "hasht.h"
26
27
#ifndef BASE_H
28
#include "base.h"
29
#endif /* BASE_H */
30
31
extern const NSSError NSS_ERROR_NOT_FOUND;
32
33
/* Creates a certificate from a base object */
34
NSS_IMPLEMENT NSSCertificate *
35
nssCertificate_Create(
36
    nssPKIObject *object)
37
0
{
38
0
    PRStatus status;
39
0
    NSSCertificate *rvCert;
40
0
    nssArenaMark *mark;
41
0
    NSSArena *arena = object->arena;
42
0
    PR_ASSERT(object->instances != NULL && object->numInstances > 0);
43
0
    PR_ASSERT(object->lockType == nssPKIMonitor);
44
0
    mark = nssArena_Mark(arena);
45
0
    rvCert = nss_ZNEW(arena, NSSCertificate);
46
0
    if (!rvCert) {
47
0
        return (NSSCertificate *)NULL;
48
0
    }
49
0
    rvCert->object = *object;
50
    /* XXX should choose instance based on some criteria */
51
0
    status = nssCryptokiCertificate_GetAttributes(object->instances[0],
52
0
                                                  NULL, /* XXX sessionOpt */
53
0
                                                  arena,
54
0
                                                  &rvCert->type,
55
0
                                                  &rvCert->id,
56
0
                                                  &rvCert->encoding,
57
0
                                                  &rvCert->issuer,
58
0
                                                  &rvCert->serial,
59
0
                                                  &rvCert->subject);
60
0
    if (status != PR_SUCCESS ||
61
0
        !rvCert->encoding.data ||
62
0
        !rvCert->encoding.size ||
63
0
        !rvCert->issuer.data ||
64
0
        !rvCert->issuer.size ||
65
0
        !rvCert->serial.data ||
66
0
        !rvCert->serial.size) {
67
0
        if (mark)
68
0
            nssArena_Release(arena, mark);
69
0
        return (NSSCertificate *)NULL;
70
0
    }
71
0
    if (mark)
72
0
        nssArena_Unmark(arena, mark);
73
0
    return rvCert;
74
0
}
75
76
NSS_IMPLEMENT NSSCertificate *
77
nssCertificate_AddRef(
78
    NSSCertificate *c)
79
0
{
80
0
    if (c) {
81
0
        nssPKIObject_AddRef(&c->object);
82
0
    }
83
0
    return c;
84
0
}
85
86
NSS_IMPLEMENT PRStatus
87
nssCertificate_Destroy(
88
    NSSCertificate *c)
89
0
{
90
0
    nssCertificateStoreTrace lockTrace = { NULL, NULL, PR_FALSE, PR_FALSE };
91
0
    nssCertificateStoreTrace unlockTrace = { NULL, NULL, PR_FALSE, PR_FALSE };
92
93
0
    if (c) {
94
0
        PRUint32 i;
95
0
        nssDecodedCert *dc = c->decoding;
96
0
        NSSTrustDomain *td = STAN_GetDefaultTrustDomain();
97
0
        NSSCryptoContext *cc = c->object.cryptoContext;
98
99
0
        PR_ASSERT(c->object.refCount > 0);
100
101
        /* --- LOCK storage --- */
102
0
        if (cc) {
103
0
            nssCertificateStore_Lock(cc->certStore, &lockTrace);
104
0
        } else {
105
0
            nssTrustDomain_LockCertCache(td);
106
0
        }
107
0
        if (PR_ATOMIC_DECREMENT(&c->object.refCount) == 0) {
108
            /* --- remove cert and UNLOCK storage --- */
109
0
            if (cc) {
110
0
                nssCertificateStore_RemoveCertLOCKED(cc->certStore, c);
111
0
                nssCertificateStore_Unlock(cc->certStore, &lockTrace,
112
0
                                           &unlockTrace);
113
0
            } else {
114
0
                nssTrustDomain_RemoveCertFromCacheLOCKED(td, c);
115
0
                nssTrustDomain_UnlockCertCache(td);
116
0
            }
117
            /* free cert data */
118
0
            for (i = 0; i < c->object.numInstances; i++) {
119
0
                nssCryptokiObject_Destroy(c->object.instances[i]);
120
0
            }
121
0
            nssPKIObject_DestroyLock(&c->object);
122
0
            nssArena_Destroy(c->object.arena);
123
0
            nssDecodedCert_Destroy(dc);
124
0
        } else {
125
            /* --- UNLOCK storage --- */
126
0
            if (cc) {
127
0
                nssCertificateStore_Unlock(cc->certStore,
128
0
                                           &lockTrace,
129
0
                                           &unlockTrace);
130
0
            } else {
131
0
                nssTrustDomain_UnlockCertCache(td);
132
0
            }
133
0
        }
134
0
    }
135
0
    return PR_SUCCESS;
136
0
}
137
138
NSS_IMPLEMENT PRStatus
139
NSSCertificate_Destroy(NSSCertificate *c)
140
0
{
141
0
    return nssCertificate_Destroy(c);
142
0
}
143
144
NSS_IMPLEMENT NSSDER *
145
nssCertificate_GetEncoding(NSSCertificate *c)
146
0
{
147
0
    if (c->encoding.size > 0 && c->encoding.data) {
148
0
        return &c->encoding;
149
0
    } else {
150
0
        return (NSSDER *)NULL;
151
0
    }
152
0
}
153
154
NSS_IMPLEMENT NSSDER *
155
nssCertificate_GetIssuer(NSSCertificate *c)
156
0
{
157
0
    if (c->issuer.size > 0 && c->issuer.data) {
158
0
        return &c->issuer;
159
0
    } else {
160
0
        return (NSSDER *)NULL;
161
0
    }
162
0
}
163
164
NSS_IMPLEMENT NSSDER *
165
nssCertificate_GetSerialNumber(NSSCertificate *c)
166
0
{
167
0
    if (c->serial.size > 0 && c->serial.data) {
168
0
        return &c->serial;
169
0
    } else {
170
0
        return (NSSDER *)NULL;
171
0
    }
172
0
}
173
174
NSS_IMPLEMENT NSSDER *
175
nssCertificate_GetSubject(NSSCertificate *c)
176
0
{
177
0
    if (c->subject.size > 0 && c->subject.data) {
178
0
        return &c->subject;
179
0
    } else {
180
0
        return (NSSDER *)NULL;
181
0
    }
182
0
}
183
184
/* Returns a copy, Caller must free using nss_ZFreeIf */
185
NSS_IMPLEMENT NSSUTF8 *
186
nssCertificate_GetNickname(
187
    NSSCertificate *c,
188
    NSSToken *tokenOpt)
189
0
{
190
0
    return nssPKIObject_GetNicknameForToken(&c->object, tokenOpt);
191
0
}
192
193
NSS_IMPLEMENT NSSASCII7 *
194
nssCertificate_GetEmailAddress(NSSCertificate *c)
195
0
{
196
0
    return c->email;
197
0
}
198
199
NSS_IMPLEMENT PRStatus
200
NSSCertificate_DeleteStoredObject(
201
    NSSCertificate *c,
202
    NSSCallback *uhh)
203
0
{
204
0
    return nssPKIObject_DeleteStoredObject(&c->object, uhh, PR_TRUE);
205
0
}
206
207
NSS_IMPLEMENT PRStatus
208
NSSCertificate_Validate(
209
    NSSCertificate *c,
210
    NSSTime *timeOpt, /* NULL for "now" */
211
    NSSUsage *usage,
212
    NSSPolicies *policiesOpt /* NULL for none */
213
)
214
0
{
215
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
216
0
    return PR_FAILURE;
217
0
}
218
219
NSS_IMPLEMENT void ** /* void *[] */
220
NSSCertificate_ValidateCompletely(
221
    NSSCertificate *c,
222
    NSSTime *timeOpt, /* NULL for "now" */
223
    NSSUsage *usage,
224
    NSSPolicies *policiesOpt, /* NULL for none */
225
    void **rvOpt,             /* NULL for allocate */
226
    PRUint32 rvLimit,         /* zero for no limit */
227
    NSSArena *arenaOpt        /* NULL for heap */
228
)
229
0
{
230
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
231
0
    return NULL;
232
0
}
233
234
NSS_IMPLEMENT PRStatus
235
NSSCertificate_ValidateAndDiscoverUsagesAndPolicies(
236
    NSSCertificate *c,
237
    NSSTime **notBeforeOutOpt,
238
    NSSTime **notAfterOutOpt,
239
    void *allowedUsages,
240
    void *disallowedUsages,
241
    void *allowedPolicies,
242
    void *disallowedPolicies,
243
    /* more args.. work on this fgmr */
244
    NSSArena *arenaOpt)
245
0
{
246
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
247
0
    return PR_FAILURE;
248
0
}
249
250
NSS_IMPLEMENT NSSDER *
251
NSSCertificate_Encode(
252
    NSSCertificate *c,
253
    NSSDER *rvOpt,
254
    NSSArena *arenaOpt)
255
0
{
256
    /* Item, DER, BER are all typedefs now... */
257
0
    return nssItem_Duplicate((NSSItem *)&c->encoding, arenaOpt, rvOpt);
258
0
}
259
260
NSS_IMPLEMENT nssDecodedCert *
261
nssCertificate_GetDecoding(
262
    NSSCertificate *c)
263
0
{
264
0
    nssDecodedCert *deco = NULL;
265
0
    if (c->type == NSSCertificateType_PKIX) {
266
0
        (void)STAN_GetCERTCertificate(c);
267
0
    }
268
0
    nssPKIObject_Lock(&c->object);
269
0
    if (!c->decoding) {
270
0
        deco = nssDecodedCert_Create(NULL, &c->encoding, c->type);
271
0
        PORT_Assert(!c->decoding);
272
0
        c->decoding = deco;
273
0
    } else {
274
0
        deco = c->decoding;
275
0
    }
276
0
    nssPKIObject_Unlock(&c->object);
277
0
    return deco;
278
0
}
279
280
static NSSCertificate **
281
filter_subject_certs_for_id(
282
    NSSCertificate **subjectCerts,
283
    void *id)
284
0
{
285
0
    NSSCertificate **si;
286
0
    nssDecodedCert *dcp;
287
0
    int nextOpenSlot = 0;
288
0
    int i;
289
0
    nssCertIDMatch matchLevel = nssCertIDMatch_Unknown;
290
0
    nssCertIDMatch match;
291
292
    /* walk the subject certs */
293
0
    for (si = subjectCerts; *si; si++) {
294
0
        dcp = nssCertificate_GetDecoding(*si);
295
0
        if (!dcp) {
296
0
            NSSCertificate_Destroy(*si);
297
0
            continue;
298
0
        }
299
0
        match = dcp->matchIdentifier(dcp, id);
300
0
        switch (match) {
301
0
            case nssCertIDMatch_Yes:
302
0
                if (matchLevel == nssCertIDMatch_Unknown) {
303
                    /* we have non-definitive matches, forget them */
304
0
                    for (i = 0; i < nextOpenSlot; i++) {
305
0
                        NSSCertificate_Destroy(subjectCerts[i]);
306
0
                        subjectCerts[i] = NULL;
307
0
                    }
308
0
                    nextOpenSlot = 0;
309
                    /* only keep definitive matches from now on */
310
0
                    matchLevel = nssCertIDMatch_Yes;
311
0
                }
312
                /* keep the cert */
313
0
                subjectCerts[nextOpenSlot++] = *si;
314
0
                break;
315
0
            case nssCertIDMatch_Unknown:
316
0
                if (matchLevel == nssCertIDMatch_Unknown) {
317
                    /* only have non-definitive matches so far, keep it */
318
0
                    subjectCerts[nextOpenSlot++] = *si;
319
0
                    break;
320
0
                }
321
            /* else fall through, we have a definitive match already */
322
0
            case nssCertIDMatch_No:
323
0
            default:
324
0
                NSSCertificate_Destroy(*si);
325
0
                *si = NULL;
326
0
        }
327
0
    }
328
0
    subjectCerts[nextOpenSlot] = NULL;
329
0
    return subjectCerts;
330
0
}
331
332
static NSSCertificate **
333
filter_certs_for_valid_issuers(NSSCertificate **certs)
334
0
{
335
0
    NSSCertificate **cp;
336
0
    nssDecodedCert *dcp;
337
0
    int nextOpenSlot = 0;
338
339
0
    for (cp = certs; *cp; cp++) {
340
0
        dcp = nssCertificate_GetDecoding(*cp);
341
0
        if (dcp && dcp->isValidIssuer(dcp)) {
342
0
            certs[nextOpenSlot++] = *cp;
343
0
        } else {
344
0
            NSSCertificate_Destroy(*cp);
345
0
        }
346
0
    }
347
0
    certs[nextOpenSlot] = NULL;
348
0
    return certs;
349
0
}
350
351
static NSSCertificate *
352
find_cert_issuer(
353
    NSSCertificate *c,
354
    NSSTime *timeOpt,
355
    NSSUsage *usage,
356
    NSSPolicies *policiesOpt,
357
    NSSTrustDomain *td,
358
    NSSCryptoContext *cc)
359
0
{
360
0
    NSSArena *arena;
361
0
    NSSCertificate **certs = NULL;
362
0
    NSSCertificate **ccIssuers = NULL;
363
0
    NSSCertificate **tdIssuers = NULL;
364
0
    NSSCertificate *issuer = NULL;
365
366
0
    if (!cc)
367
0
        cc = c->object.cryptoContext;
368
0
    if (!td)
369
0
        td = NSSCertificate_GetTrustDomain(c);
370
0
    arena = nssArena_Create();
371
0
    if (!arena) {
372
0
        return (NSSCertificate *)NULL;
373
0
    }
374
0
    if (cc) {
375
0
        ccIssuers = nssCryptoContext_FindCertificatesBySubject(cc,
376
0
                                                               &c->issuer,
377
0
                                                               NULL,
378
0
                                                               0,
379
0
                                                               arena);
380
0
    }
381
0
    if (td)
382
0
        tdIssuers = nssTrustDomain_FindCertificatesBySubject(td,
383
0
                                                             &c->issuer,
384
0
                                                             NULL,
385
0
                                                             0,
386
0
                                                             arena);
387
0
    certs = nssCertificateArray_Join(ccIssuers, tdIssuers);
388
0
    if (certs) {
389
0
        nssDecodedCert *dc = NULL;
390
0
        void *issuerID = NULL;
391
0
        dc = nssCertificate_GetDecoding(c);
392
0
        if (dc) {
393
0
            issuerID = dc->getIssuerIdentifier(dc);
394
0
        }
395
        /* XXX review based on CERT_FindCertIssuer
396
         * this function is not using the authCertIssuer field as a fallback
397
         * if authority key id does not exist
398
         */
399
0
        if (issuerID) {
400
0
            certs = filter_subject_certs_for_id(certs, issuerID);
401
0
        }
402
0
        certs = filter_certs_for_valid_issuers(certs);
403
0
        issuer = nssCertificateArray_FindBestCertificate(certs,
404
0
                                                         timeOpt,
405
0
                                                         usage,
406
0
                                                         policiesOpt);
407
0
        nssCertificateArray_Destroy(certs);
408
0
    }
409
0
    nssArena_Destroy(arena);
410
0
    return issuer;
411
0
}
412
413
/* This function returns the built chain, as far as it gets,
414
** even if/when it fails to find an issuer, and returns PR_FAILURE
415
*/
416
NSS_IMPLEMENT NSSCertificate **
417
nssCertificate_BuildChain(
418
    NSSCertificate *c,
419
    NSSTime *timeOpt,
420
    NSSUsage *usage,
421
    NSSPolicies *policiesOpt,
422
    NSSCertificate **rvOpt,
423
    PRUint32 rvLimit,
424
    NSSArena *arenaOpt,
425
    PRStatus *statusOpt,
426
    NSSTrustDomain *td,
427
    NSSCryptoContext *cc)
428
0
{
429
0
    NSSCertificate **rvChain = NULL;
430
0
    NSSUsage issuerUsage = *usage;
431
0
    nssPKIObjectCollection *collection = NULL;
432
0
    PRUint32 rvCount = 0;
433
0
    PRStatus st;
434
0
    PRStatus ret = PR_SUCCESS;
435
436
0
    if (!c || !cc ||
437
0
        (!td && (td = NSSCertificate_GetTrustDomain(c)) == NULL)) {
438
0
        goto loser;
439
0
    }
440
    /* bump the usage up to CA level */
441
0
    issuerUsage.nss3lookingForCA = PR_TRUE;
442
0
    collection = nssCertificateCollection_Create(td, NULL);
443
0
    if (!collection)
444
0
        goto loser;
445
0
    st = nssPKIObjectCollection_AddObject(collection, (nssPKIObject *)c);
446
0
    if (st != PR_SUCCESS)
447
0
        goto loser;
448
0
    for (rvCount = 1; (!rvLimit || rvCount < rvLimit); ++rvCount) {
449
0
        CERTCertificate *cCert = STAN_GetCERTCertificate(c);
450
0
        if (cCert->isRoot) {
451
            /* not including the issuer of the self-signed cert, which is,
452
             * of course, itself
453
             */
454
0
            break;
455
0
        }
456
0
        c = find_cert_issuer(c, timeOpt, &issuerUsage, policiesOpt, td, cc);
457
0
        if (!c) {
458
0
            ret = PR_FAILURE;
459
0
            break;
460
0
        }
461
0
        st = nssPKIObjectCollection_AddObject(collection, (nssPKIObject *)c);
462
0
        nssCertificate_Destroy(c); /* collection has it */
463
0
        if (st != PR_SUCCESS)
464
0
            goto loser;
465
0
    }
466
0
    rvChain = nssPKIObjectCollection_GetCertificates(collection,
467
0
                                                     rvOpt,
468
0
                                                     rvLimit,
469
0
                                                     arenaOpt);
470
0
    if (rvChain) {
471
0
        nssPKIObjectCollection_Destroy(collection);
472
0
        if (statusOpt)
473
0
            *statusOpt = ret;
474
0
        if (ret != PR_SUCCESS)
475
0
            nss_SetError(NSS_ERROR_CERTIFICATE_ISSUER_NOT_FOUND);
476
0
        return rvChain;
477
0
    }
478
479
0
loser:
480
0
    if (collection)
481
0
        nssPKIObjectCollection_Destroy(collection);
482
0
    if (statusOpt)
483
0
        *statusOpt = PR_FAILURE;
484
0
    nss_SetError(NSS_ERROR_CERTIFICATE_ISSUER_NOT_FOUND);
485
0
    return rvChain;
486
0
}
487
488
NSS_IMPLEMENT NSSCertificate **
489
NSSCertificate_BuildChain(
490
    NSSCertificate *c,
491
    NSSTime *timeOpt,
492
    NSSUsage *usage,
493
    NSSPolicies *policiesOpt,
494
    NSSCertificate **rvOpt,
495
    PRUint32 rvLimit, /* zero for no limit */
496
    NSSArena *arenaOpt,
497
    PRStatus *statusOpt,
498
    NSSTrustDomain *td,
499
    NSSCryptoContext *cc)
500
0
{
501
0
    return nssCertificate_BuildChain(c, timeOpt, usage, policiesOpt,
502
0
                                     rvOpt, rvLimit, arenaOpt, statusOpt,
503
0
                                     td, cc);
504
0
}
505
506
NSS_IMPLEMENT NSSCryptoContext *
507
nssCertificate_GetCryptoContext(NSSCertificate *c)
508
0
{
509
0
    return c->object.cryptoContext;
510
0
}
511
512
NSS_IMPLEMENT NSSTrustDomain *
513
nssCertificate_GetTrustDomain(NSSCertificate *c)
514
0
{
515
0
    return c->object.trustDomain;
516
0
}
517
518
NSS_IMPLEMENT NSSTrustDomain *
519
NSSCertificate_GetTrustDomain(NSSCertificate *c)
520
0
{
521
0
    return nssCertificate_GetTrustDomain(c);
522
0
}
523
524
NSS_IMPLEMENT NSSToken *
525
NSSCertificate_GetToken(
526
    NSSCertificate *c,
527
    PRStatus *statusOpt)
528
0
{
529
0
    return (NSSToken *)NULL;
530
0
}
531
532
NSS_IMPLEMENT NSSSlot *
533
NSSCertificate_GetSlot(
534
    NSSCertificate *c,
535
    PRStatus *statusOpt)
536
0
{
537
0
    return (NSSSlot *)NULL;
538
0
}
539
540
NSS_IMPLEMENT NSSModule *
541
NSSCertificate_GetModule(
542
    NSSCertificate *c,
543
    PRStatus *statusOpt)
544
0
{
545
0
    return (NSSModule *)NULL;
546
0
}
547
548
NSS_IMPLEMENT NSSItem *
549
NSSCertificate_Encrypt(
550
    NSSCertificate *c,
551
    NSSAlgorithmAndParameters *apOpt,
552
    NSSItem *data,
553
    NSSTime *timeOpt,
554
    NSSUsage *usage,
555
    NSSPolicies *policiesOpt,
556
    NSSCallback *uhh,
557
    NSSItem *rvOpt,
558
    NSSArena *arenaOpt)
559
0
{
560
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
561
0
    return NULL;
562
0
}
563
564
NSS_IMPLEMENT PRStatus
565
NSSCertificate_Verify(
566
    NSSCertificate *c,
567
    NSSAlgorithmAndParameters *apOpt,
568
    NSSItem *data,
569
    NSSItem *signature,
570
    NSSTime *timeOpt,
571
    NSSUsage *usage,
572
    NSSPolicies *policiesOpt,
573
    NSSCallback *uhh)
574
0
{
575
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
576
0
    return PR_FAILURE;
577
0
}
578
579
NSS_IMPLEMENT NSSItem *
580
NSSCertificate_VerifyRecover(
581
    NSSCertificate *c,
582
    NSSAlgorithmAndParameters *apOpt,
583
    NSSItem *signature,
584
    NSSTime *timeOpt,
585
    NSSUsage *usage,
586
    NSSPolicies *policiesOpt,
587
    NSSCallback *uhh,
588
    NSSItem *rvOpt,
589
    NSSArena *arenaOpt)
590
0
{
591
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
592
0
    return NULL;
593
0
}
594
595
NSS_IMPLEMENT NSSItem *
596
NSSCertificate_WrapSymmetricKey(
597
    NSSCertificate *c,
598
    NSSAlgorithmAndParameters *apOpt,
599
    NSSSymmetricKey *keyToWrap,
600
    NSSTime *timeOpt,
601
    NSSUsage *usage,
602
    NSSPolicies *policiesOpt,
603
    NSSCallback *uhh,
604
    NSSItem *rvOpt,
605
    NSSArena *arenaOpt)
606
0
{
607
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
608
0
    return NULL;
609
0
}
610
611
NSS_IMPLEMENT NSSCryptoContext *
612
NSSCertificate_CreateCryptoContext(
613
    NSSCertificate *c,
614
    NSSAlgorithmAndParameters *apOpt,
615
    NSSTime *timeOpt,
616
    NSSUsage *usage,
617
    NSSPolicies *policiesOpt,
618
    NSSCallback *uhh)
619
0
{
620
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
621
0
    return NULL;
622
0
}
623
624
NSS_IMPLEMENT NSSPublicKey *
625
NSSCertificate_GetPublicKey(
626
    NSSCertificate *c)
627
0
{
628
#if 0
629
    CK_ATTRIBUTE pubktemplate[] = {
630
    { CKA_CLASS,   NULL, 0 },
631
    { CKA_ID,      NULL, 0 },
632
    { CKA_SUBJECT, NULL, 0 }
633
    };
634
    PRStatus nssrv;
635
    CK_ULONG count = sizeof(pubktemplate) / sizeof(pubktemplate[0]);
636
    NSS_CK_SET_ATTRIBUTE_ITEM(pubktemplate, 0, &g_ck_class_pubkey);
637
    if (c->id.size > 0) {
638
    /* CKA_ID */
639
    NSS_CK_ITEM_TO_ATTRIBUTE(&c->id, &pubktemplate[1]);
640
    } else {
641
    /* failure, yes? */
642
    return (NSSPublicKey *)NULL;
643
    }
644
    if (c->subject.size > 0) {
645
    /* CKA_SUBJECT */
646
    NSS_CK_ITEM_TO_ATTRIBUTE(&c->subject, &pubktemplate[2]);
647
    } else {
648
    /* failure, yes? */
649
    return (NSSPublicKey *)NULL;
650
    }
651
    /* Try the cert's token first */
652
    if (c->token) {
653
    nssrv = nssToken_FindObjectByTemplate(c->token, pubktemplate, count);
654
    }
655
#endif
656
    /* Try all other key tokens */
657
0
    return (NSSPublicKey *)NULL;
658
0
}
659
660
NSS_IMPLEMENT NSSPrivateKey *
661
NSSCertificate_FindPrivateKey(
662
    NSSCertificate *c,
663
    NSSCallback *uhh)
664
0
{
665
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
666
0
    return NULL;
667
0
}
668
669
NSS_IMPLEMENT PRBool
670
NSSCertificate_IsPrivateKeyAvailable(
671
    NSSCertificate *c,
672
    NSSCallback *uhh,
673
    PRStatus *statusOpt)
674
0
{
675
0
    PRBool isUser = PR_FALSE;
676
0
    nssCryptokiObject **ip;
677
0
    nssCryptokiObject **instances = nssPKIObject_GetInstances(&c->object);
678
0
    if (!instances) {
679
0
        return PR_FALSE;
680
0
    }
681
0
    for (ip = instances; *ip; ip++) {
682
0
        nssCryptokiObject *instance = *ip;
683
0
        if (nssToken_IsPrivateKeyAvailable(instance->token, c, instance)) {
684
0
            isUser = PR_TRUE;
685
0
        }
686
0
    }
687
0
    nssCryptokiObjectArray_Destroy(instances);
688
0
    return isUser;
689
0
}
690
691
/* sort the subject cert list from newest to oldest */
692
PRIntn
693
nssCertificate_SubjectListSort(
694
    void *v1,
695
    void *v2)
696
0
{
697
0
    NSSCertificate *c1 = (NSSCertificate *)v1;
698
0
    NSSCertificate *c2 = (NSSCertificate *)v2;
699
0
    nssDecodedCert *dc1 = nssCertificate_GetDecoding(c1);
700
0
    nssDecodedCert *dc2 = nssCertificate_GetDecoding(c2);
701
0
    if (!dc1) {
702
0
        return dc2 ? 1 : 0;
703
0
    } else if (!dc2) {
704
0
        return -1;
705
0
    } else {
706
0
        return dc1->isNewerThan(dc1, dc2) ? -1 : 1;
707
0
    }
708
0
}
709
710
NSS_IMPLEMENT PRBool
711
NSSUserCertificate_IsStillPresent(
712
    NSSUserCertificate *uc,
713
    PRStatus *statusOpt)
714
0
{
715
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
716
0
    return PR_FALSE;
717
0
}
718
719
NSS_IMPLEMENT NSSItem *
720
NSSUserCertificate_Decrypt(
721
    NSSUserCertificate *uc,
722
    NSSAlgorithmAndParameters *apOpt,
723
    NSSItem *data,
724
    NSSTime *timeOpt,
725
    NSSUsage *usage,
726
    NSSPolicies *policiesOpt,
727
    NSSCallback *uhh,
728
    NSSItem *rvOpt,
729
    NSSArena *arenaOpt)
730
0
{
731
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
732
0
    return NULL;
733
0
}
734
735
NSS_IMPLEMENT NSSItem *
736
NSSUserCertificate_Sign(
737
    NSSUserCertificate *uc,
738
    NSSAlgorithmAndParameters *apOpt,
739
    NSSItem *data,
740
    NSSTime *timeOpt,
741
    NSSUsage *usage,
742
    NSSPolicies *policiesOpt,
743
    NSSCallback *uhh,
744
    NSSItem *rvOpt,
745
    NSSArena *arenaOpt)
746
0
{
747
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
748
0
    return NULL;
749
0
}
750
751
NSS_IMPLEMENT NSSItem *
752
NSSUserCertificate_SignRecover(
753
    NSSUserCertificate *uc,
754
    NSSAlgorithmAndParameters *apOpt,
755
    NSSItem *data,
756
    NSSTime *timeOpt,
757
    NSSUsage *usage,
758
    NSSPolicies *policiesOpt,
759
    NSSCallback *uhh,
760
    NSSItem *rvOpt,
761
    NSSArena *arenaOpt)
762
0
{
763
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
764
0
    return NULL;
765
0
}
766
767
NSS_IMPLEMENT NSSSymmetricKey *
768
NSSUserCertificate_UnwrapSymmetricKey(
769
    NSSUserCertificate *uc,
770
    NSSAlgorithmAndParameters *apOpt,
771
    NSSItem *wrappedKey,
772
    NSSTime *timeOpt,
773
    NSSUsage *usage,
774
    NSSPolicies *policiesOpt,
775
    NSSCallback *uhh,
776
    NSSItem *rvOpt,
777
    NSSArena *arenaOpt)
778
0
{
779
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
780
0
    return NULL;
781
0
}
782
783
NSS_IMPLEMENT NSSSymmetricKey *
784
NSSUserCertificate_DeriveSymmetricKey(
785
    NSSUserCertificate *uc, /* provides private key */
786
    NSSCertificate *c,      /* provides public key */
787
    NSSAlgorithmAndParameters *apOpt,
788
    NSSOID *target,
789
    PRUint32 keySizeOpt, /* zero for best allowed */
790
    NSSOperations operations,
791
    NSSCallback *uhh)
792
0
{
793
0
    nss_SetError(NSS_ERROR_NOT_FOUND);
794
0
    return NULL;
795
0
}
796
797
NSS_IMPLEMENT nssSMIMEProfile *
798
nssSMIMEProfile_Create(
799
    NSSCertificate *cert,
800
    NSSItem *profileTime,
801
    NSSItem *profileData)
802
0
{
803
0
    NSSArena *arena;
804
0
    nssSMIMEProfile *rvProfile;
805
0
    nssPKIObject *object;
806
0
    NSSTrustDomain *td = nssCertificate_GetTrustDomain(cert);
807
0
    NSSCryptoContext *cc = nssCertificate_GetCryptoContext(cert);
808
0
    arena = nssArena_Create();
809
0
    if (!arena) {
810
0
        return NULL;
811
0
    }
812
0
    object = nssPKIObject_Create(arena, NULL, td, cc, nssPKILock);
813
0
    if (!object) {
814
0
        goto loser;
815
0
    }
816
0
    rvProfile = nss_ZNEW(arena, nssSMIMEProfile);
817
0
    if (!rvProfile) {
818
0
        goto loser;
819
0
    }
820
0
    rvProfile->object = *object;
821
0
    rvProfile->certificate = cert;
822
0
    rvProfile->email = nssUTF8_Duplicate(cert->email, arena);
823
0
    rvProfile->subject = nssItem_Duplicate(&cert->subject, arena, NULL);
824
0
    if (profileTime) {
825
0
        rvProfile->profileTime = nssItem_Duplicate(profileTime, arena, NULL);
826
0
    }
827
0
    if (profileData) {
828
0
        rvProfile->profileData = nssItem_Duplicate(profileData, arena, NULL);
829
0
    }
830
0
    return rvProfile;
831
0
loser:
832
0
    if (object)
833
0
        nssPKIObject_Destroy(object);
834
0
    else if (arena)
835
0
        nssArena_Destroy(arena);
836
0
    return (nssSMIMEProfile *)NULL;
837
0
}
838
839
/* execute a callback function on all members of a cert list */
840
NSS_EXTERN PRStatus
841
nssCertificateList_DoCallback(
842
    nssList *certList,
843
    PRStatus (*callback)(NSSCertificate *c, void *arg),
844
    void *arg)
845
0
{
846
0
    nssListIterator *certs;
847
0
    NSSCertificate *cert;
848
0
    certs = nssList_CreateIterator(certList);
849
0
    if (!certs) {
850
0
        return PR_FAILURE;
851
0
    }
852
0
    for (cert = (NSSCertificate *)nssListIterator_Start(certs);
853
0
         cert != (NSSCertificate *)NULL;
854
0
         cert = (NSSCertificate *)nssListIterator_Next(certs)) {
855
0
        (void)(*callback)(cert, arg);
856
0
    }
857
0
    nssListIterator_Finish(certs);
858
0
    nssListIterator_Destroy(certs);
859
0
    return PR_SUCCESS;
860
0
}
861
862
static PRStatus
863
add_ref_callback(NSSCertificate *c, void *a)
864
0
{
865
0
    nssCertificate_AddRef(c);
866
0
    return PR_SUCCESS;
867
0
}
868
869
NSS_IMPLEMENT void
870
nssCertificateList_AddReferences(
871
    nssList *certList)
872
0
{
873
0
    (void)nssCertificateList_DoCallback(certList, add_ref_callback, NULL);
874
0
}
875
876
/*
877
 * Is this trust record safe to apply to all certs of the same issuer/SN
878
 * independent of the cert matching the hash. This is only true is the trust
879
 * is unknown or distrusted. In general this feature is only useful to
880
 * explicitly distrusting certs. It is not safe to use to trust certs, so
881
 * only allow unknown and untrusted trust types.
882
 */
883
PRBool
884
nssTrust_IsSafeToIgnoreCertHash(nssTrustLevel serverAuth,
885
                                nssTrustLevel clientAuth, nssTrustLevel codeSigning,
886
                                nssTrustLevel email, PRBool stepup)
887
0
{
888
    /* step up is a trust type, if it's on, we must have a hash for the cert */
889
0
    if (stepup) {
890
0
        return PR_FALSE;
891
0
    }
892
0
    if ((serverAuth != nssTrustLevel_Unknown) &&
893
0
        (serverAuth != nssTrustLevel_NotTrusted)) {
894
0
        return PR_FALSE;
895
0
    }
896
0
    if ((clientAuth != nssTrustLevel_Unknown) &&
897
0
        (clientAuth != nssTrustLevel_NotTrusted)) {
898
0
        return PR_FALSE;
899
0
    }
900
0
    if ((codeSigning != nssTrustLevel_Unknown) &&
901
0
        (codeSigning != nssTrustLevel_NotTrusted)) {
902
0
        return PR_FALSE;
903
0
    }
904
0
    if ((email != nssTrustLevel_Unknown) &&
905
0
        (email != nssTrustLevel_NotTrusted)) {
906
0
        return PR_FALSE;
907
0
    }
908
    /* record only has Unknown and Untrusted entries, ok to accept without a
909
     * hash */
910
0
    return PR_TRUE;
911
0
}
912
913
NSS_IMPLEMENT NSSTrust *
914
nssTrust_Create(
915
    nssPKIObject *object,
916
    NSSItem *certData)
917
0
{
918
0
    PRStatus status;
919
0
    PRUint32 i;
920
0
    PRUint32 lastTrustOrder, myTrustOrder;
921
0
    unsigned char sha1_hashcmp[SHA1_LENGTH];
922
0
    unsigned char sha1_hashin[SHA1_LENGTH];
923
0
    NSSItem sha1_hash;
924
0
    NSSTrust *rvt;
925
0
    nssCryptokiObject *instance;
926
0
    nssTrustLevel serverAuth, clientAuth, codeSigning, emailProtection;
927
0
    SECStatus rv; /* Should be stan flavor */
928
0
    PRBool stepUp;
929
930
0
    lastTrustOrder = 1 << 16; /* just make it big */
931
0
    PR_ASSERT(object->instances != NULL && object->numInstances > 0);
932
0
    rvt = nss_ZNEW(object->arena, NSSTrust);
933
0
    if (!rvt) {
934
0
        return (NSSTrust *)NULL;
935
0
    }
936
0
    rvt->object = *object;
937
938
    /* should be stan flavor of Hashbuf */
939
0
    rv = PK11_HashBuf(SEC_OID_SHA1, sha1_hashcmp, certData->data, certData->size);
940
0
    if (rv != SECSuccess) {
941
0
        return (NSSTrust *)NULL;
942
0
    }
943
0
    sha1_hash.data = sha1_hashin;
944
0
    sha1_hash.size = sizeof(sha1_hashin);
945
    /* trust has to peek into the base object members */
946
0
    nssPKIObject_Lock(object);
947
0
    for (i = 0; i < object->numInstances; i++) {
948
0
        instance = object->instances[i];
949
0
        myTrustOrder = nssToken_GetTrustOrder(instance->token);
950
0
        status = nssCryptokiTrust_GetAttributes(instance, NULL,
951
0
                                                &sha1_hash,
952
0
                                                &serverAuth,
953
0
                                                &clientAuth,
954
0
                                                &codeSigning,
955
0
                                                &emailProtection,
956
0
                                                &stepUp);
957
0
        if (status != PR_SUCCESS) {
958
0
            nssPKIObject_Unlock(object);
959
0
            return (NSSTrust *)NULL;
960
0
        }
961
        /* if no hash is specified, then trust applies to all certs with
962
         * this issuer/SN. NOTE: This is only true for entries that
963
         * have distrust and unknown record */
964
0
        if (!(
965
                /* we continue if there is no hash, and the trust type is
966
                 * safe to accept without a hash ... or ... */
967
0
                ((sha1_hash.size == 0) &&
968
0
                 nssTrust_IsSafeToIgnoreCertHash(serverAuth, clientAuth,
969
0
                                                 codeSigning, emailProtection,
970
0
                                                 stepUp)) ||
971
                /* we have a hash of the correct size, and it matches */
972
0
                ((sha1_hash.size == SHA1_LENGTH) && (PORT_Memcmp(sha1_hashin,
973
0
                                                                 sha1_hashcmp,
974
0
                                                                 SHA1_LENGTH) == 0)))) {
975
0
            nssPKIObject_Unlock(object);
976
0
            return (NSSTrust *)NULL;
977
0
        }
978
0
        if (rvt->serverAuth == nssTrustLevel_Unknown ||
979
0
            myTrustOrder < lastTrustOrder) {
980
0
            rvt->serverAuth = serverAuth;
981
0
        }
982
0
        if (rvt->clientAuth == nssTrustLevel_Unknown ||
983
0
            myTrustOrder < lastTrustOrder) {
984
0
            rvt->clientAuth = clientAuth;
985
0
        }
986
0
        if (rvt->emailProtection == nssTrustLevel_Unknown ||
987
0
            myTrustOrder < lastTrustOrder) {
988
0
            rvt->emailProtection = emailProtection;
989
0
        }
990
0
        if (rvt->codeSigning == nssTrustLevel_Unknown ||
991
0
            myTrustOrder < lastTrustOrder) {
992
0
            rvt->codeSigning = codeSigning;
993
0
        }
994
0
        rvt->stepUpApproved = stepUp;
995
0
        lastTrustOrder = myTrustOrder;
996
0
    }
997
0
    nssPKIObject_Unlock(object);
998
0
    return rvt;
999
0
}
1000
1001
NSS_IMPLEMENT NSSTrust *
1002
nssTrust_AddRef(NSSTrust *trust)
1003
0
{
1004
0
    if (trust) {
1005
0
        nssPKIObject_AddRef(&trust->object);
1006
0
    }
1007
0
    return trust;
1008
0
}
1009
1010
NSS_IMPLEMENT PRStatus
1011
nssTrust_Destroy(NSSTrust *trust)
1012
0
{
1013
0
    if (trust) {
1014
0
        (void)nssPKIObject_Destroy(&trust->object);
1015
0
    }
1016
0
    return PR_SUCCESS;
1017
0
}
1018
1019
NSS_IMPLEMENT nssSMIMEProfile *
1020
nssSMIMEProfile_AddRef(nssSMIMEProfile *profile)
1021
0
{
1022
0
    if (profile) {
1023
0
        nssPKIObject_AddRef(&profile->object);
1024
0
    }
1025
0
    return profile;
1026
0
}
1027
1028
NSS_IMPLEMENT PRStatus
1029
nssSMIMEProfile_Destroy(nssSMIMEProfile *profile)
1030
0
{
1031
0
    if (profile) {
1032
0
        (void)nssPKIObject_Destroy(&profile->object);
1033
0
    }
1034
0
    return PR_SUCCESS;
1035
0
}
1036
1037
NSS_IMPLEMENT NSSCRL *
1038
nssCRL_Create(nssPKIObject *object)
1039
0
{
1040
0
    PRStatus status;
1041
0
    NSSCRL *rvCRL;
1042
0
    NSSArena *arena = object->arena;
1043
0
    PR_ASSERT(object->instances != NULL && object->numInstances > 0);
1044
0
    rvCRL = nss_ZNEW(arena, NSSCRL);
1045
0
    if (!rvCRL) {
1046
0
        return (NSSCRL *)NULL;
1047
0
    }
1048
0
    rvCRL->object = *object;
1049
    /* XXX should choose instance based on some criteria */
1050
0
    status = nssCryptokiCRL_GetAttributes(object->instances[0],
1051
0
                                          NULL, /* XXX sessionOpt */
1052
0
                                          arena,
1053
0
                                          &rvCRL->encoding,
1054
0
                                          NULL, /* subject */
1055
0
                                          NULL, /* class */
1056
0
                                          &rvCRL->url,
1057
0
                                          &rvCRL->isKRL);
1058
0
    if (status != PR_SUCCESS) {
1059
0
        if (!arena) {
1060
0
            nssPKIObject_Destroy((nssPKIObject *)rvCRL);
1061
0
        }
1062
0
        return (NSSCRL *)NULL;
1063
0
    }
1064
0
    return rvCRL;
1065
0
}
1066
1067
NSS_IMPLEMENT NSSCRL *
1068
nssCRL_AddRef(NSSCRL *crl)
1069
0
{
1070
0
    if (crl) {
1071
0
        nssPKIObject_AddRef(&crl->object);
1072
0
    }
1073
0
    return crl;
1074
0
}
1075
1076
NSS_IMPLEMENT PRStatus
1077
nssCRL_Destroy(NSSCRL *crl)
1078
0
{
1079
0
    if (crl) {
1080
0
        (void)nssPKIObject_Destroy(&crl->object);
1081
0
    }
1082
0
    return PR_SUCCESS;
1083
0
}
1084
1085
NSS_IMPLEMENT PRStatus
1086
nssCRL_DeleteStoredObject(
1087
    NSSCRL *crl,
1088
    NSSCallback *uhh)
1089
0
{
1090
0
    return nssPKIObject_DeleteStoredObject(&crl->object, uhh, PR_TRUE);
1091
0
}
1092
1093
NSS_IMPLEMENT NSSDER *
1094
nssCRL_GetEncoding(NSSCRL *crl)
1095
0
{
1096
0
    if (crl && crl->encoding.data != NULL && crl->encoding.size > 0) {
1097
0
        return &crl->encoding;
1098
0
    } else {
1099
0
        return (NSSDER *)NULL;
1100
0
    }
1101
0
}