/src/nss/lib/pki/certificate.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* This Source Code Form is subject to the terms of the Mozilla Public |
2 | | * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 | | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 | | |
5 | | #ifndef NSSPKI_H |
6 | | #include "nsspki.h" |
7 | | #endif /* NSSPKI_H */ |
8 | | |
9 | | #ifndef PKIT_H |
10 | | #include "pkit.h" |
11 | | #endif /* PKIT_H */ |
12 | | |
13 | | #ifndef PKIM_H |
14 | | #include "pkim.h" |
15 | | #endif /* PKIM_H */ |
16 | | |
17 | | #ifndef DEV_H |
18 | | #include "dev.h" |
19 | | #endif /* DEV_H */ |
20 | | |
21 | | #include "pkistore.h" |
22 | | |
23 | | #include "pki3hack.h" |
24 | | #include "pk11func.h" |
25 | | #include "hasht.h" |
26 | | |
27 | | #ifndef BASE_H |
28 | | #include "base.h" |
29 | | #endif /* BASE_H */ |
30 | | |
31 | | extern const NSSError NSS_ERROR_NOT_FOUND; |
32 | | |
33 | | /* Creates a certificate from a base object */ |
34 | | NSS_IMPLEMENT NSSCertificate * |
35 | | nssCertificate_Create( |
36 | | nssPKIObject *object) |
37 | 0 | { |
38 | 0 | PRStatus status; |
39 | 0 | NSSCertificate *rvCert; |
40 | 0 | nssArenaMark *mark; |
41 | 0 | NSSArena *arena = object->arena; |
42 | 0 | PR_ASSERT(object->instances != NULL && object->numInstances > 0); |
43 | 0 | PR_ASSERT(object->lockType == nssPKIMonitor); |
44 | 0 | mark = nssArena_Mark(arena); |
45 | 0 | rvCert = nss_ZNEW(arena, NSSCertificate); |
46 | 0 | if (!rvCert) { |
47 | 0 | return (NSSCertificate *)NULL; |
48 | 0 | } |
49 | 0 | rvCert->object = *object; |
50 | | /* XXX should choose instance based on some criteria */ |
51 | 0 | status = nssCryptokiCertificate_GetAttributes(object->instances[0], |
52 | 0 | NULL, /* XXX sessionOpt */ |
53 | 0 | arena, |
54 | 0 | &rvCert->type, |
55 | 0 | &rvCert->id, |
56 | 0 | &rvCert->encoding, |
57 | 0 | &rvCert->issuer, |
58 | 0 | &rvCert->serial, |
59 | 0 | &rvCert->subject); |
60 | 0 | if (status != PR_SUCCESS || |
61 | 0 | !rvCert->encoding.data || |
62 | 0 | !rvCert->encoding.size || |
63 | 0 | !rvCert->issuer.data || |
64 | 0 | !rvCert->issuer.size || |
65 | 0 | !rvCert->serial.data || |
66 | 0 | !rvCert->serial.size) { |
67 | 0 | if (mark) |
68 | 0 | nssArena_Release(arena, mark); |
69 | 0 | return (NSSCertificate *)NULL; |
70 | 0 | } |
71 | 0 | if (mark) |
72 | 0 | nssArena_Unmark(arena, mark); |
73 | 0 | return rvCert; |
74 | 0 | } |
75 | | |
76 | | NSS_IMPLEMENT NSSCertificate * |
77 | | nssCertificate_AddRef( |
78 | | NSSCertificate *c) |
79 | 0 | { |
80 | 0 | if (c) { |
81 | 0 | nssPKIObject_AddRef(&c->object); |
82 | 0 | } |
83 | 0 | return c; |
84 | 0 | } |
85 | | |
86 | | NSS_IMPLEMENT PRStatus |
87 | | nssCertificate_Destroy( |
88 | | NSSCertificate *c) |
89 | 0 | { |
90 | 0 | nssCertificateStoreTrace lockTrace = { NULL, NULL, PR_FALSE, PR_FALSE }; |
91 | 0 | nssCertificateStoreTrace unlockTrace = { NULL, NULL, PR_FALSE, PR_FALSE }; |
92 | |
|
93 | 0 | if (c) { |
94 | 0 | PRUint32 i; |
95 | 0 | nssDecodedCert *dc = c->decoding; |
96 | 0 | NSSTrustDomain *td = STAN_GetDefaultTrustDomain(); |
97 | 0 | NSSCryptoContext *cc = c->object.cryptoContext; |
98 | |
|
99 | 0 | PR_ASSERT(c->object.refCount > 0); |
100 | | |
101 | | /* --- LOCK storage --- */ |
102 | 0 | if (cc) { |
103 | 0 | nssCertificateStore_Lock(cc->certStore, &lockTrace); |
104 | 0 | } else { |
105 | 0 | nssTrustDomain_LockCertCache(td); |
106 | 0 | } |
107 | 0 | if (PR_ATOMIC_DECREMENT(&c->object.refCount) == 0) { |
108 | | /* --- remove cert and UNLOCK storage --- */ |
109 | 0 | if (cc) { |
110 | 0 | nssCertificateStore_RemoveCertLOCKED(cc->certStore, c); |
111 | 0 | nssCertificateStore_Unlock(cc->certStore, &lockTrace, |
112 | 0 | &unlockTrace); |
113 | 0 | } else { |
114 | 0 | nssTrustDomain_RemoveCertFromCacheLOCKED(td, c); |
115 | 0 | nssTrustDomain_UnlockCertCache(td); |
116 | 0 | } |
117 | | /* free cert data */ |
118 | 0 | for (i = 0; i < c->object.numInstances; i++) { |
119 | 0 | nssCryptokiObject_Destroy(c->object.instances[i]); |
120 | 0 | } |
121 | 0 | nssPKIObject_DestroyLock(&c->object); |
122 | 0 | nssArena_Destroy(c->object.arena); |
123 | 0 | nssDecodedCert_Destroy(dc); |
124 | 0 | } else { |
125 | | /* --- UNLOCK storage --- */ |
126 | 0 | if (cc) { |
127 | 0 | nssCertificateStore_Unlock(cc->certStore, |
128 | 0 | &lockTrace, |
129 | 0 | &unlockTrace); |
130 | 0 | } else { |
131 | 0 | nssTrustDomain_UnlockCertCache(td); |
132 | 0 | } |
133 | 0 | } |
134 | 0 | } |
135 | 0 | return PR_SUCCESS; |
136 | 0 | } |
137 | | |
138 | | NSS_IMPLEMENT PRStatus |
139 | | NSSCertificate_Destroy(NSSCertificate *c) |
140 | 0 | { |
141 | 0 | return nssCertificate_Destroy(c); |
142 | 0 | } |
143 | | |
144 | | NSS_IMPLEMENT NSSDER * |
145 | | nssCertificate_GetEncoding(NSSCertificate *c) |
146 | 0 | { |
147 | 0 | if (c->encoding.size > 0 && c->encoding.data) { |
148 | 0 | return &c->encoding; |
149 | 0 | } else { |
150 | 0 | return (NSSDER *)NULL; |
151 | 0 | } |
152 | 0 | } |
153 | | |
154 | | NSS_IMPLEMENT NSSDER * |
155 | | nssCertificate_GetIssuer(NSSCertificate *c) |
156 | 0 | { |
157 | 0 | if (c->issuer.size > 0 && c->issuer.data) { |
158 | 0 | return &c->issuer; |
159 | 0 | } else { |
160 | 0 | return (NSSDER *)NULL; |
161 | 0 | } |
162 | 0 | } |
163 | | |
164 | | NSS_IMPLEMENT NSSDER * |
165 | | nssCertificate_GetSerialNumber(NSSCertificate *c) |
166 | 0 | { |
167 | 0 | if (c->serial.size > 0 && c->serial.data) { |
168 | 0 | return &c->serial; |
169 | 0 | } else { |
170 | 0 | return (NSSDER *)NULL; |
171 | 0 | } |
172 | 0 | } |
173 | | |
174 | | NSS_IMPLEMENT NSSDER * |
175 | | nssCertificate_GetSubject(NSSCertificate *c) |
176 | 0 | { |
177 | 0 | if (c->subject.size > 0 && c->subject.data) { |
178 | 0 | return &c->subject; |
179 | 0 | } else { |
180 | 0 | return (NSSDER *)NULL; |
181 | 0 | } |
182 | 0 | } |
183 | | |
184 | | /* Returns a copy, Caller must free using nss_ZFreeIf */ |
185 | | NSS_IMPLEMENT NSSUTF8 * |
186 | | nssCertificate_GetNickname( |
187 | | NSSCertificate *c, |
188 | | NSSToken *tokenOpt) |
189 | 0 | { |
190 | 0 | return nssPKIObject_GetNicknameForToken(&c->object, tokenOpt); |
191 | 0 | } |
192 | | |
193 | | NSS_IMPLEMENT NSSASCII7 * |
194 | | nssCertificate_GetEmailAddress(NSSCertificate *c) |
195 | 0 | { |
196 | 0 | return c->email; |
197 | 0 | } |
198 | | |
199 | | NSS_IMPLEMENT PRStatus |
200 | | NSSCertificate_DeleteStoredObject( |
201 | | NSSCertificate *c, |
202 | | NSSCallback *uhh) |
203 | 0 | { |
204 | 0 | return nssPKIObject_DeleteStoredObject(&c->object, uhh, PR_TRUE); |
205 | 0 | } |
206 | | |
207 | | NSS_IMPLEMENT PRStatus |
208 | | NSSCertificate_Validate( |
209 | | NSSCertificate *c, |
210 | | NSSTime *timeOpt, /* NULL for "now" */ |
211 | | NSSUsage *usage, |
212 | | NSSPolicies *policiesOpt /* NULL for none */ |
213 | | ) |
214 | 0 | { |
215 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
216 | 0 | return PR_FAILURE; |
217 | 0 | } |
218 | | |
219 | | NSS_IMPLEMENT void ** /* void *[] */ |
220 | | NSSCertificate_ValidateCompletely( |
221 | | NSSCertificate *c, |
222 | | NSSTime *timeOpt, /* NULL for "now" */ |
223 | | NSSUsage *usage, |
224 | | NSSPolicies *policiesOpt, /* NULL for none */ |
225 | | void **rvOpt, /* NULL for allocate */ |
226 | | PRUint32 rvLimit, /* zero for no limit */ |
227 | | NSSArena *arenaOpt /* NULL for heap */ |
228 | | ) |
229 | 0 | { |
230 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
231 | 0 | return NULL; |
232 | 0 | } |
233 | | |
234 | | NSS_IMPLEMENT PRStatus |
235 | | NSSCertificate_ValidateAndDiscoverUsagesAndPolicies( |
236 | | NSSCertificate *c, |
237 | | NSSTime **notBeforeOutOpt, |
238 | | NSSTime **notAfterOutOpt, |
239 | | void *allowedUsages, |
240 | | void *disallowedUsages, |
241 | | void *allowedPolicies, |
242 | | void *disallowedPolicies, |
243 | | /* more args.. work on this fgmr */ |
244 | | NSSArena *arenaOpt) |
245 | 0 | { |
246 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
247 | 0 | return PR_FAILURE; |
248 | 0 | } |
249 | | |
250 | | NSS_IMPLEMENT NSSDER * |
251 | | NSSCertificate_Encode( |
252 | | NSSCertificate *c, |
253 | | NSSDER *rvOpt, |
254 | | NSSArena *arenaOpt) |
255 | 0 | { |
256 | | /* Item, DER, BER are all typedefs now... */ |
257 | 0 | return nssItem_Duplicate((NSSItem *)&c->encoding, arenaOpt, rvOpt); |
258 | 0 | } |
259 | | |
260 | | NSS_IMPLEMENT nssDecodedCert * |
261 | | nssCertificate_GetDecoding( |
262 | | NSSCertificate *c) |
263 | 0 | { |
264 | 0 | nssDecodedCert *deco = NULL; |
265 | 0 | if (c->type == NSSCertificateType_PKIX) { |
266 | 0 | (void)STAN_GetCERTCertificate(c); |
267 | 0 | } |
268 | 0 | nssPKIObject_Lock(&c->object); |
269 | 0 | if (!c->decoding) { |
270 | 0 | deco = nssDecodedCert_Create(NULL, &c->encoding, c->type); |
271 | 0 | PORT_Assert(!c->decoding); |
272 | 0 | c->decoding = deco; |
273 | 0 | } else { |
274 | 0 | deco = c->decoding; |
275 | 0 | } |
276 | 0 | nssPKIObject_Unlock(&c->object); |
277 | 0 | return deco; |
278 | 0 | } |
279 | | |
280 | | static NSSCertificate ** |
281 | | filter_subject_certs_for_id( |
282 | | NSSCertificate **subjectCerts, |
283 | | void *id) |
284 | 0 | { |
285 | 0 | NSSCertificate **si; |
286 | 0 | nssDecodedCert *dcp; |
287 | 0 | int nextOpenSlot = 0; |
288 | 0 | int i; |
289 | 0 | nssCertIDMatch matchLevel = nssCertIDMatch_Unknown; |
290 | 0 | nssCertIDMatch match; |
291 | | |
292 | | /* walk the subject certs */ |
293 | 0 | for (si = subjectCerts; *si; si++) { |
294 | 0 | dcp = nssCertificate_GetDecoding(*si); |
295 | 0 | if (!dcp) { |
296 | 0 | NSSCertificate_Destroy(*si); |
297 | 0 | continue; |
298 | 0 | } |
299 | 0 | match = dcp->matchIdentifier(dcp, id); |
300 | 0 | switch (match) { |
301 | 0 | case nssCertIDMatch_Yes: |
302 | 0 | if (matchLevel == nssCertIDMatch_Unknown) { |
303 | | /* we have non-definitive matches, forget them */ |
304 | 0 | for (i = 0; i < nextOpenSlot; i++) { |
305 | 0 | NSSCertificate_Destroy(subjectCerts[i]); |
306 | 0 | subjectCerts[i] = NULL; |
307 | 0 | } |
308 | 0 | nextOpenSlot = 0; |
309 | | /* only keep definitive matches from now on */ |
310 | 0 | matchLevel = nssCertIDMatch_Yes; |
311 | 0 | } |
312 | | /* keep the cert */ |
313 | 0 | subjectCerts[nextOpenSlot++] = *si; |
314 | 0 | break; |
315 | 0 | case nssCertIDMatch_Unknown: |
316 | 0 | if (matchLevel == nssCertIDMatch_Unknown) { |
317 | | /* only have non-definitive matches so far, keep it */ |
318 | 0 | subjectCerts[nextOpenSlot++] = *si; |
319 | 0 | break; |
320 | 0 | } |
321 | | /* else fall through, we have a definitive match already */ |
322 | 0 | case nssCertIDMatch_No: |
323 | 0 | default: |
324 | 0 | NSSCertificate_Destroy(*si); |
325 | 0 | *si = NULL; |
326 | 0 | } |
327 | 0 | } |
328 | 0 | subjectCerts[nextOpenSlot] = NULL; |
329 | 0 | return subjectCerts; |
330 | 0 | } |
331 | | |
332 | | static NSSCertificate ** |
333 | | filter_certs_for_valid_issuers(NSSCertificate **certs) |
334 | 0 | { |
335 | 0 | NSSCertificate **cp; |
336 | 0 | nssDecodedCert *dcp; |
337 | 0 | int nextOpenSlot = 0; |
338 | |
|
339 | 0 | for (cp = certs; *cp; cp++) { |
340 | 0 | dcp = nssCertificate_GetDecoding(*cp); |
341 | 0 | if (dcp && dcp->isValidIssuer(dcp)) { |
342 | 0 | certs[nextOpenSlot++] = *cp; |
343 | 0 | } else { |
344 | 0 | NSSCertificate_Destroy(*cp); |
345 | 0 | } |
346 | 0 | } |
347 | 0 | certs[nextOpenSlot] = NULL; |
348 | 0 | return certs; |
349 | 0 | } |
350 | | |
351 | | static NSSCertificate * |
352 | | find_cert_issuer( |
353 | | NSSCertificate *c, |
354 | | NSSTime *timeOpt, |
355 | | NSSUsage *usage, |
356 | | NSSPolicies *policiesOpt, |
357 | | NSSTrustDomain *td, |
358 | | NSSCryptoContext *cc) |
359 | 0 | { |
360 | 0 | NSSArena *arena; |
361 | 0 | NSSCertificate **certs = NULL; |
362 | 0 | NSSCertificate **ccIssuers = NULL; |
363 | 0 | NSSCertificate **tdIssuers = NULL; |
364 | 0 | NSSCertificate *issuer = NULL; |
365 | |
|
366 | 0 | if (!cc) |
367 | 0 | cc = c->object.cryptoContext; |
368 | 0 | if (!td) |
369 | 0 | td = NSSCertificate_GetTrustDomain(c); |
370 | 0 | arena = nssArena_Create(); |
371 | 0 | if (!arena) { |
372 | 0 | return (NSSCertificate *)NULL; |
373 | 0 | } |
374 | 0 | if (cc) { |
375 | 0 | ccIssuers = nssCryptoContext_FindCertificatesBySubject(cc, |
376 | 0 | &c->issuer, |
377 | 0 | NULL, |
378 | 0 | 0, |
379 | 0 | arena); |
380 | 0 | } |
381 | 0 | if (td) |
382 | 0 | tdIssuers = nssTrustDomain_FindCertificatesBySubject(td, |
383 | 0 | &c->issuer, |
384 | 0 | NULL, |
385 | 0 | 0, |
386 | 0 | arena); |
387 | 0 | certs = nssCertificateArray_Join(ccIssuers, tdIssuers); |
388 | 0 | if (certs) { |
389 | 0 | nssDecodedCert *dc = NULL; |
390 | 0 | void *issuerID = NULL; |
391 | 0 | dc = nssCertificate_GetDecoding(c); |
392 | 0 | if (dc) { |
393 | 0 | issuerID = dc->getIssuerIdentifier(dc); |
394 | 0 | } |
395 | | /* XXX review based on CERT_FindCertIssuer |
396 | | * this function is not using the authCertIssuer field as a fallback |
397 | | * if authority key id does not exist |
398 | | */ |
399 | 0 | if (issuerID) { |
400 | 0 | certs = filter_subject_certs_for_id(certs, issuerID); |
401 | 0 | } |
402 | 0 | certs = filter_certs_for_valid_issuers(certs); |
403 | 0 | issuer = nssCertificateArray_FindBestCertificate(certs, |
404 | 0 | timeOpt, |
405 | 0 | usage, |
406 | 0 | policiesOpt); |
407 | 0 | nssCertificateArray_Destroy(certs); |
408 | 0 | } |
409 | 0 | nssArena_Destroy(arena); |
410 | 0 | return issuer; |
411 | 0 | } |
412 | | |
413 | | /* This function returns the built chain, as far as it gets, |
414 | | ** even if/when it fails to find an issuer, and returns PR_FAILURE |
415 | | */ |
416 | | NSS_IMPLEMENT NSSCertificate ** |
417 | | nssCertificate_BuildChain( |
418 | | NSSCertificate *c, |
419 | | NSSTime *timeOpt, |
420 | | NSSUsage *usage, |
421 | | NSSPolicies *policiesOpt, |
422 | | NSSCertificate **rvOpt, |
423 | | PRUint32 rvLimit, |
424 | | NSSArena *arenaOpt, |
425 | | PRStatus *statusOpt, |
426 | | NSSTrustDomain *td, |
427 | | NSSCryptoContext *cc) |
428 | 0 | { |
429 | 0 | NSSCertificate **rvChain = NULL; |
430 | 0 | NSSUsage issuerUsage = *usage; |
431 | 0 | nssPKIObjectCollection *collection = NULL; |
432 | 0 | PRUint32 rvCount = 0; |
433 | 0 | PRStatus st; |
434 | 0 | PRStatus ret = PR_SUCCESS; |
435 | |
|
436 | 0 | if (!c || !cc || |
437 | 0 | (!td && (td = NSSCertificate_GetTrustDomain(c)) == NULL)) { |
438 | 0 | goto loser; |
439 | 0 | } |
440 | | /* bump the usage up to CA level */ |
441 | 0 | issuerUsage.nss3lookingForCA = PR_TRUE; |
442 | 0 | collection = nssCertificateCollection_Create(td, NULL); |
443 | 0 | if (!collection) |
444 | 0 | goto loser; |
445 | 0 | st = nssPKIObjectCollection_AddObject(collection, (nssPKIObject *)c); |
446 | 0 | if (st != PR_SUCCESS) |
447 | 0 | goto loser; |
448 | 0 | for (rvCount = 1; (!rvLimit || rvCount < rvLimit); ++rvCount) { |
449 | 0 | CERTCertificate *cCert = STAN_GetCERTCertificate(c); |
450 | 0 | if (cCert->isRoot) { |
451 | | /* not including the issuer of the self-signed cert, which is, |
452 | | * of course, itself |
453 | | */ |
454 | 0 | break; |
455 | 0 | } |
456 | 0 | c = find_cert_issuer(c, timeOpt, &issuerUsage, policiesOpt, td, cc); |
457 | 0 | if (!c) { |
458 | 0 | ret = PR_FAILURE; |
459 | 0 | break; |
460 | 0 | } |
461 | 0 | st = nssPKIObjectCollection_AddObject(collection, (nssPKIObject *)c); |
462 | 0 | nssCertificate_Destroy(c); /* collection has it */ |
463 | 0 | if (st != PR_SUCCESS) |
464 | 0 | goto loser; |
465 | 0 | } |
466 | 0 | rvChain = nssPKIObjectCollection_GetCertificates(collection, |
467 | 0 | rvOpt, |
468 | 0 | rvLimit, |
469 | 0 | arenaOpt); |
470 | 0 | if (rvChain) { |
471 | 0 | nssPKIObjectCollection_Destroy(collection); |
472 | 0 | if (statusOpt) |
473 | 0 | *statusOpt = ret; |
474 | 0 | if (ret != PR_SUCCESS) |
475 | 0 | nss_SetError(NSS_ERROR_CERTIFICATE_ISSUER_NOT_FOUND); |
476 | 0 | return rvChain; |
477 | 0 | } |
478 | | |
479 | 0 | loser: |
480 | 0 | if (collection) |
481 | 0 | nssPKIObjectCollection_Destroy(collection); |
482 | 0 | if (statusOpt) |
483 | 0 | *statusOpt = PR_FAILURE; |
484 | 0 | nss_SetError(NSS_ERROR_CERTIFICATE_ISSUER_NOT_FOUND); |
485 | 0 | return rvChain; |
486 | 0 | } |
487 | | |
488 | | NSS_IMPLEMENT NSSCertificate ** |
489 | | NSSCertificate_BuildChain( |
490 | | NSSCertificate *c, |
491 | | NSSTime *timeOpt, |
492 | | NSSUsage *usage, |
493 | | NSSPolicies *policiesOpt, |
494 | | NSSCertificate **rvOpt, |
495 | | PRUint32 rvLimit, /* zero for no limit */ |
496 | | NSSArena *arenaOpt, |
497 | | PRStatus *statusOpt, |
498 | | NSSTrustDomain *td, |
499 | | NSSCryptoContext *cc) |
500 | 0 | { |
501 | 0 | return nssCertificate_BuildChain(c, timeOpt, usage, policiesOpt, |
502 | 0 | rvOpt, rvLimit, arenaOpt, statusOpt, |
503 | 0 | td, cc); |
504 | 0 | } |
505 | | |
506 | | NSS_IMPLEMENT NSSCryptoContext * |
507 | | nssCertificate_GetCryptoContext(NSSCertificate *c) |
508 | 0 | { |
509 | 0 | return c->object.cryptoContext; |
510 | 0 | } |
511 | | |
512 | | NSS_IMPLEMENT NSSTrustDomain * |
513 | | nssCertificate_GetTrustDomain(NSSCertificate *c) |
514 | 0 | { |
515 | 0 | return c->object.trustDomain; |
516 | 0 | } |
517 | | |
518 | | NSS_IMPLEMENT NSSTrustDomain * |
519 | | NSSCertificate_GetTrustDomain(NSSCertificate *c) |
520 | 0 | { |
521 | 0 | return nssCertificate_GetTrustDomain(c); |
522 | 0 | } |
523 | | |
524 | | NSS_IMPLEMENT NSSToken * |
525 | | NSSCertificate_GetToken( |
526 | | NSSCertificate *c, |
527 | | PRStatus *statusOpt) |
528 | 0 | { |
529 | 0 | return (NSSToken *)NULL; |
530 | 0 | } |
531 | | |
532 | | NSS_IMPLEMENT NSSSlot * |
533 | | NSSCertificate_GetSlot( |
534 | | NSSCertificate *c, |
535 | | PRStatus *statusOpt) |
536 | 0 | { |
537 | 0 | return (NSSSlot *)NULL; |
538 | 0 | } |
539 | | |
540 | | NSS_IMPLEMENT NSSModule * |
541 | | NSSCertificate_GetModule( |
542 | | NSSCertificate *c, |
543 | | PRStatus *statusOpt) |
544 | 0 | { |
545 | 0 | return (NSSModule *)NULL; |
546 | 0 | } |
547 | | |
548 | | NSS_IMPLEMENT NSSItem * |
549 | | NSSCertificate_Encrypt( |
550 | | NSSCertificate *c, |
551 | | NSSAlgorithmAndParameters *apOpt, |
552 | | NSSItem *data, |
553 | | NSSTime *timeOpt, |
554 | | NSSUsage *usage, |
555 | | NSSPolicies *policiesOpt, |
556 | | NSSCallback *uhh, |
557 | | NSSItem *rvOpt, |
558 | | NSSArena *arenaOpt) |
559 | 0 | { |
560 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
561 | 0 | return NULL; |
562 | 0 | } |
563 | | |
564 | | NSS_IMPLEMENT PRStatus |
565 | | NSSCertificate_Verify( |
566 | | NSSCertificate *c, |
567 | | NSSAlgorithmAndParameters *apOpt, |
568 | | NSSItem *data, |
569 | | NSSItem *signature, |
570 | | NSSTime *timeOpt, |
571 | | NSSUsage *usage, |
572 | | NSSPolicies *policiesOpt, |
573 | | NSSCallback *uhh) |
574 | 0 | { |
575 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
576 | 0 | return PR_FAILURE; |
577 | 0 | } |
578 | | |
579 | | NSS_IMPLEMENT NSSItem * |
580 | | NSSCertificate_VerifyRecover( |
581 | | NSSCertificate *c, |
582 | | NSSAlgorithmAndParameters *apOpt, |
583 | | NSSItem *signature, |
584 | | NSSTime *timeOpt, |
585 | | NSSUsage *usage, |
586 | | NSSPolicies *policiesOpt, |
587 | | NSSCallback *uhh, |
588 | | NSSItem *rvOpt, |
589 | | NSSArena *arenaOpt) |
590 | 0 | { |
591 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
592 | 0 | return NULL; |
593 | 0 | } |
594 | | |
595 | | NSS_IMPLEMENT NSSItem * |
596 | | NSSCertificate_WrapSymmetricKey( |
597 | | NSSCertificate *c, |
598 | | NSSAlgorithmAndParameters *apOpt, |
599 | | NSSSymmetricKey *keyToWrap, |
600 | | NSSTime *timeOpt, |
601 | | NSSUsage *usage, |
602 | | NSSPolicies *policiesOpt, |
603 | | NSSCallback *uhh, |
604 | | NSSItem *rvOpt, |
605 | | NSSArena *arenaOpt) |
606 | 0 | { |
607 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
608 | 0 | return NULL; |
609 | 0 | } |
610 | | |
611 | | NSS_IMPLEMENT NSSCryptoContext * |
612 | | NSSCertificate_CreateCryptoContext( |
613 | | NSSCertificate *c, |
614 | | NSSAlgorithmAndParameters *apOpt, |
615 | | NSSTime *timeOpt, |
616 | | NSSUsage *usage, |
617 | | NSSPolicies *policiesOpt, |
618 | | NSSCallback *uhh) |
619 | 0 | { |
620 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
621 | 0 | return NULL; |
622 | 0 | } |
623 | | |
624 | | NSS_IMPLEMENT NSSPublicKey * |
625 | | NSSCertificate_GetPublicKey( |
626 | | NSSCertificate *c) |
627 | 0 | { |
628 | | #if 0 |
629 | | CK_ATTRIBUTE pubktemplate[] = { |
630 | | { CKA_CLASS, NULL, 0 }, |
631 | | { CKA_ID, NULL, 0 }, |
632 | | { CKA_SUBJECT, NULL, 0 } |
633 | | }; |
634 | | PRStatus nssrv; |
635 | | CK_ULONG count = sizeof(pubktemplate) / sizeof(pubktemplate[0]); |
636 | | NSS_CK_SET_ATTRIBUTE_ITEM(pubktemplate, 0, &g_ck_class_pubkey); |
637 | | if (c->id.size > 0) { |
638 | | /* CKA_ID */ |
639 | | NSS_CK_ITEM_TO_ATTRIBUTE(&c->id, &pubktemplate[1]); |
640 | | } else { |
641 | | /* failure, yes? */ |
642 | | return (NSSPublicKey *)NULL; |
643 | | } |
644 | | if (c->subject.size > 0) { |
645 | | /* CKA_SUBJECT */ |
646 | | NSS_CK_ITEM_TO_ATTRIBUTE(&c->subject, &pubktemplate[2]); |
647 | | } else { |
648 | | /* failure, yes? */ |
649 | | return (NSSPublicKey *)NULL; |
650 | | } |
651 | | /* Try the cert's token first */ |
652 | | if (c->token) { |
653 | | nssrv = nssToken_FindObjectByTemplate(c->token, pubktemplate, count); |
654 | | } |
655 | | #endif |
656 | | /* Try all other key tokens */ |
657 | 0 | return (NSSPublicKey *)NULL; |
658 | 0 | } |
659 | | |
660 | | NSS_IMPLEMENT NSSPrivateKey * |
661 | | NSSCertificate_FindPrivateKey( |
662 | | NSSCertificate *c, |
663 | | NSSCallback *uhh) |
664 | 0 | { |
665 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
666 | 0 | return NULL; |
667 | 0 | } |
668 | | |
669 | | NSS_IMPLEMENT PRBool |
670 | | NSSCertificate_IsPrivateKeyAvailable( |
671 | | NSSCertificate *c, |
672 | | NSSCallback *uhh, |
673 | | PRStatus *statusOpt) |
674 | 0 | { |
675 | 0 | PRBool isUser = PR_FALSE; |
676 | 0 | nssCryptokiObject **ip; |
677 | 0 | nssCryptokiObject **instances = nssPKIObject_GetInstances(&c->object); |
678 | 0 | if (!instances) { |
679 | 0 | return PR_FALSE; |
680 | 0 | } |
681 | 0 | for (ip = instances; *ip; ip++) { |
682 | 0 | nssCryptokiObject *instance = *ip; |
683 | 0 | if (nssToken_IsPrivateKeyAvailable(instance->token, c, instance)) { |
684 | 0 | isUser = PR_TRUE; |
685 | 0 | } |
686 | 0 | } |
687 | 0 | nssCryptokiObjectArray_Destroy(instances); |
688 | 0 | return isUser; |
689 | 0 | } |
690 | | |
691 | | /* sort the subject cert list from newest to oldest */ |
692 | | PRIntn |
693 | | nssCertificate_SubjectListSort( |
694 | | void *v1, |
695 | | void *v2) |
696 | 0 | { |
697 | 0 | NSSCertificate *c1 = (NSSCertificate *)v1; |
698 | 0 | NSSCertificate *c2 = (NSSCertificate *)v2; |
699 | 0 | nssDecodedCert *dc1 = nssCertificate_GetDecoding(c1); |
700 | 0 | nssDecodedCert *dc2 = nssCertificate_GetDecoding(c2); |
701 | 0 | if (!dc1) { |
702 | 0 | return dc2 ? 1 : 0; |
703 | 0 | } else if (!dc2) { |
704 | 0 | return -1; |
705 | 0 | } else { |
706 | 0 | return dc1->isNewerThan(dc1, dc2) ? -1 : 1; |
707 | 0 | } |
708 | 0 | } |
709 | | |
710 | | NSS_IMPLEMENT PRBool |
711 | | NSSUserCertificate_IsStillPresent( |
712 | | NSSUserCertificate *uc, |
713 | | PRStatus *statusOpt) |
714 | 0 | { |
715 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
716 | 0 | return PR_FALSE; |
717 | 0 | } |
718 | | |
719 | | NSS_IMPLEMENT NSSItem * |
720 | | NSSUserCertificate_Decrypt( |
721 | | NSSUserCertificate *uc, |
722 | | NSSAlgorithmAndParameters *apOpt, |
723 | | NSSItem *data, |
724 | | NSSTime *timeOpt, |
725 | | NSSUsage *usage, |
726 | | NSSPolicies *policiesOpt, |
727 | | NSSCallback *uhh, |
728 | | NSSItem *rvOpt, |
729 | | NSSArena *arenaOpt) |
730 | 0 | { |
731 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
732 | 0 | return NULL; |
733 | 0 | } |
734 | | |
735 | | NSS_IMPLEMENT NSSItem * |
736 | | NSSUserCertificate_Sign( |
737 | | NSSUserCertificate *uc, |
738 | | NSSAlgorithmAndParameters *apOpt, |
739 | | NSSItem *data, |
740 | | NSSTime *timeOpt, |
741 | | NSSUsage *usage, |
742 | | NSSPolicies *policiesOpt, |
743 | | NSSCallback *uhh, |
744 | | NSSItem *rvOpt, |
745 | | NSSArena *arenaOpt) |
746 | 0 | { |
747 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
748 | 0 | return NULL; |
749 | 0 | } |
750 | | |
751 | | NSS_IMPLEMENT NSSItem * |
752 | | NSSUserCertificate_SignRecover( |
753 | | NSSUserCertificate *uc, |
754 | | NSSAlgorithmAndParameters *apOpt, |
755 | | NSSItem *data, |
756 | | NSSTime *timeOpt, |
757 | | NSSUsage *usage, |
758 | | NSSPolicies *policiesOpt, |
759 | | NSSCallback *uhh, |
760 | | NSSItem *rvOpt, |
761 | | NSSArena *arenaOpt) |
762 | 0 | { |
763 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
764 | 0 | return NULL; |
765 | 0 | } |
766 | | |
767 | | NSS_IMPLEMENT NSSSymmetricKey * |
768 | | NSSUserCertificate_UnwrapSymmetricKey( |
769 | | NSSUserCertificate *uc, |
770 | | NSSAlgorithmAndParameters *apOpt, |
771 | | NSSItem *wrappedKey, |
772 | | NSSTime *timeOpt, |
773 | | NSSUsage *usage, |
774 | | NSSPolicies *policiesOpt, |
775 | | NSSCallback *uhh, |
776 | | NSSItem *rvOpt, |
777 | | NSSArena *arenaOpt) |
778 | 0 | { |
779 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
780 | 0 | return NULL; |
781 | 0 | } |
782 | | |
783 | | NSS_IMPLEMENT NSSSymmetricKey * |
784 | | NSSUserCertificate_DeriveSymmetricKey( |
785 | | NSSUserCertificate *uc, /* provides private key */ |
786 | | NSSCertificate *c, /* provides public key */ |
787 | | NSSAlgorithmAndParameters *apOpt, |
788 | | NSSOID *target, |
789 | | PRUint32 keySizeOpt, /* zero for best allowed */ |
790 | | NSSOperations operations, |
791 | | NSSCallback *uhh) |
792 | 0 | { |
793 | 0 | nss_SetError(NSS_ERROR_NOT_FOUND); |
794 | 0 | return NULL; |
795 | 0 | } |
796 | | |
797 | | NSS_IMPLEMENT nssSMIMEProfile * |
798 | | nssSMIMEProfile_Create( |
799 | | NSSCertificate *cert, |
800 | | NSSItem *profileTime, |
801 | | NSSItem *profileData) |
802 | 0 | { |
803 | 0 | NSSArena *arena; |
804 | 0 | nssSMIMEProfile *rvProfile; |
805 | 0 | nssPKIObject *object; |
806 | 0 | NSSTrustDomain *td = nssCertificate_GetTrustDomain(cert); |
807 | 0 | NSSCryptoContext *cc = nssCertificate_GetCryptoContext(cert); |
808 | 0 | arena = nssArena_Create(); |
809 | 0 | if (!arena) { |
810 | 0 | return NULL; |
811 | 0 | } |
812 | 0 | object = nssPKIObject_Create(arena, NULL, td, cc, nssPKILock); |
813 | 0 | if (!object) { |
814 | 0 | goto loser; |
815 | 0 | } |
816 | 0 | rvProfile = nss_ZNEW(arena, nssSMIMEProfile); |
817 | 0 | if (!rvProfile) { |
818 | 0 | goto loser; |
819 | 0 | } |
820 | 0 | rvProfile->object = *object; |
821 | 0 | rvProfile->certificate = cert; |
822 | 0 | rvProfile->email = nssUTF8_Duplicate(cert->email, arena); |
823 | 0 | rvProfile->subject = nssItem_Duplicate(&cert->subject, arena, NULL); |
824 | 0 | if (profileTime) { |
825 | 0 | rvProfile->profileTime = nssItem_Duplicate(profileTime, arena, NULL); |
826 | 0 | } |
827 | 0 | if (profileData) { |
828 | 0 | rvProfile->profileData = nssItem_Duplicate(profileData, arena, NULL); |
829 | 0 | } |
830 | 0 | return rvProfile; |
831 | 0 | loser: |
832 | 0 | if (object) |
833 | 0 | nssPKIObject_Destroy(object); |
834 | 0 | else if (arena) |
835 | 0 | nssArena_Destroy(arena); |
836 | 0 | return (nssSMIMEProfile *)NULL; |
837 | 0 | } |
838 | | |
839 | | /* execute a callback function on all members of a cert list */ |
840 | | NSS_EXTERN PRStatus |
841 | | nssCertificateList_DoCallback( |
842 | | nssList *certList, |
843 | | PRStatus (*callback)(NSSCertificate *c, void *arg), |
844 | | void *arg) |
845 | 0 | { |
846 | 0 | nssListIterator *certs; |
847 | 0 | NSSCertificate *cert; |
848 | 0 | certs = nssList_CreateIterator(certList); |
849 | 0 | if (!certs) { |
850 | 0 | return PR_FAILURE; |
851 | 0 | } |
852 | 0 | for (cert = (NSSCertificate *)nssListIterator_Start(certs); |
853 | 0 | cert != (NSSCertificate *)NULL; |
854 | 0 | cert = (NSSCertificate *)nssListIterator_Next(certs)) { |
855 | 0 | (void)(*callback)(cert, arg); |
856 | 0 | } |
857 | 0 | nssListIterator_Finish(certs); |
858 | 0 | nssListIterator_Destroy(certs); |
859 | 0 | return PR_SUCCESS; |
860 | 0 | } |
861 | | |
862 | | static PRStatus |
863 | | add_ref_callback(NSSCertificate *c, void *a) |
864 | 0 | { |
865 | 0 | nssCertificate_AddRef(c); |
866 | 0 | return PR_SUCCESS; |
867 | 0 | } |
868 | | |
869 | | NSS_IMPLEMENT void |
870 | | nssCertificateList_AddReferences( |
871 | | nssList *certList) |
872 | 0 | { |
873 | 0 | (void)nssCertificateList_DoCallback(certList, add_ref_callback, NULL); |
874 | 0 | } |
875 | | |
876 | | /* |
877 | | * Is this trust record safe to apply to all certs of the same issuer/SN |
878 | | * independent of the cert matching the hash. This is only true is the trust |
879 | | * is unknown or distrusted. In general this feature is only useful to |
880 | | * explicitly distrusting certs. It is not safe to use to trust certs, so |
881 | | * only allow unknown and untrusted trust types. |
882 | | */ |
883 | | PRBool |
884 | | nssTrust_IsSafeToIgnoreCertHash(nssTrustLevel serverAuth, |
885 | | nssTrustLevel clientAuth, nssTrustLevel codeSigning, |
886 | | nssTrustLevel email, PRBool stepup) |
887 | 0 | { |
888 | | /* step up is a trust type, if it's on, we must have a hash for the cert */ |
889 | 0 | if (stepup) { |
890 | 0 | return PR_FALSE; |
891 | 0 | } |
892 | 0 | if ((serverAuth != nssTrustLevel_Unknown) && |
893 | 0 | (serverAuth != nssTrustLevel_NotTrusted)) { |
894 | 0 | return PR_FALSE; |
895 | 0 | } |
896 | 0 | if ((clientAuth != nssTrustLevel_Unknown) && |
897 | 0 | (clientAuth != nssTrustLevel_NotTrusted)) { |
898 | 0 | return PR_FALSE; |
899 | 0 | } |
900 | 0 | if ((codeSigning != nssTrustLevel_Unknown) && |
901 | 0 | (codeSigning != nssTrustLevel_NotTrusted)) { |
902 | 0 | return PR_FALSE; |
903 | 0 | } |
904 | 0 | if ((email != nssTrustLevel_Unknown) && |
905 | 0 | (email != nssTrustLevel_NotTrusted)) { |
906 | 0 | return PR_FALSE; |
907 | 0 | } |
908 | | /* record only has Unknown and Untrusted entries, ok to accept without a |
909 | | * hash */ |
910 | 0 | return PR_TRUE; |
911 | 0 | } |
912 | | |
913 | | NSS_IMPLEMENT NSSTrust * |
914 | | nssTrust_Create( |
915 | | nssPKIObject *object, |
916 | | NSSItem *certData) |
917 | 0 | { |
918 | 0 | PRStatus status; |
919 | 0 | PRUint32 i; |
920 | 0 | PRUint32 lastTrustOrder, myTrustOrder; |
921 | 0 | unsigned char sha1_hashcmp[SHA1_LENGTH]; |
922 | 0 | unsigned char sha1_hashin[SHA1_LENGTH]; |
923 | 0 | NSSItem sha1_hash; |
924 | 0 | NSSTrust *rvt; |
925 | 0 | nssCryptokiObject *instance; |
926 | 0 | nssTrustLevel serverAuth, clientAuth, codeSigning, emailProtection; |
927 | 0 | SECStatus rv; /* Should be stan flavor */ |
928 | 0 | PRBool stepUp; |
929 | |
|
930 | 0 | lastTrustOrder = 1 << 16; /* just make it big */ |
931 | 0 | PR_ASSERT(object->instances != NULL && object->numInstances > 0); |
932 | 0 | rvt = nss_ZNEW(object->arena, NSSTrust); |
933 | 0 | if (!rvt) { |
934 | 0 | return (NSSTrust *)NULL; |
935 | 0 | } |
936 | 0 | rvt->object = *object; |
937 | | |
938 | | /* should be stan flavor of Hashbuf */ |
939 | 0 | rv = PK11_HashBuf(SEC_OID_SHA1, sha1_hashcmp, certData->data, certData->size); |
940 | 0 | if (rv != SECSuccess) { |
941 | 0 | return (NSSTrust *)NULL; |
942 | 0 | } |
943 | 0 | sha1_hash.data = sha1_hashin; |
944 | 0 | sha1_hash.size = sizeof(sha1_hashin); |
945 | | /* trust has to peek into the base object members */ |
946 | 0 | nssPKIObject_Lock(object); |
947 | 0 | for (i = 0; i < object->numInstances; i++) { |
948 | 0 | instance = object->instances[i]; |
949 | 0 | myTrustOrder = nssToken_GetTrustOrder(instance->token); |
950 | 0 | status = nssCryptokiTrust_GetAttributes(instance, NULL, |
951 | 0 | &sha1_hash, |
952 | 0 | &serverAuth, |
953 | 0 | &clientAuth, |
954 | 0 | &codeSigning, |
955 | 0 | &emailProtection, |
956 | 0 | &stepUp); |
957 | 0 | if (status != PR_SUCCESS) { |
958 | 0 | nssPKIObject_Unlock(object); |
959 | 0 | return (NSSTrust *)NULL; |
960 | 0 | } |
961 | | /* if no hash is specified, then trust applies to all certs with |
962 | | * this issuer/SN. NOTE: This is only true for entries that |
963 | | * have distrust and unknown record */ |
964 | 0 | if (!( |
965 | | /* we continue if there is no hash, and the trust type is |
966 | | * safe to accept without a hash ... or ... */ |
967 | 0 | ((sha1_hash.size == 0) && |
968 | 0 | nssTrust_IsSafeToIgnoreCertHash(serverAuth, clientAuth, |
969 | 0 | codeSigning, emailProtection, |
970 | 0 | stepUp)) || |
971 | | /* we have a hash of the correct size, and it matches */ |
972 | 0 | ((sha1_hash.size == SHA1_LENGTH) && (PORT_Memcmp(sha1_hashin, |
973 | 0 | sha1_hashcmp, |
974 | 0 | SHA1_LENGTH) == 0)))) { |
975 | 0 | nssPKIObject_Unlock(object); |
976 | 0 | return (NSSTrust *)NULL; |
977 | 0 | } |
978 | 0 | if (rvt->serverAuth == nssTrustLevel_Unknown || |
979 | 0 | myTrustOrder < lastTrustOrder) { |
980 | 0 | rvt->serverAuth = serverAuth; |
981 | 0 | } |
982 | 0 | if (rvt->clientAuth == nssTrustLevel_Unknown || |
983 | 0 | myTrustOrder < lastTrustOrder) { |
984 | 0 | rvt->clientAuth = clientAuth; |
985 | 0 | } |
986 | 0 | if (rvt->emailProtection == nssTrustLevel_Unknown || |
987 | 0 | myTrustOrder < lastTrustOrder) { |
988 | 0 | rvt->emailProtection = emailProtection; |
989 | 0 | } |
990 | 0 | if (rvt->codeSigning == nssTrustLevel_Unknown || |
991 | 0 | myTrustOrder < lastTrustOrder) { |
992 | 0 | rvt->codeSigning = codeSigning; |
993 | 0 | } |
994 | 0 | rvt->stepUpApproved = stepUp; |
995 | 0 | lastTrustOrder = myTrustOrder; |
996 | 0 | } |
997 | 0 | nssPKIObject_Unlock(object); |
998 | 0 | return rvt; |
999 | 0 | } |
1000 | | |
1001 | | NSS_IMPLEMENT NSSTrust * |
1002 | | nssTrust_AddRef(NSSTrust *trust) |
1003 | 0 | { |
1004 | 0 | if (trust) { |
1005 | 0 | nssPKIObject_AddRef(&trust->object); |
1006 | 0 | } |
1007 | 0 | return trust; |
1008 | 0 | } |
1009 | | |
1010 | | NSS_IMPLEMENT PRStatus |
1011 | | nssTrust_Destroy(NSSTrust *trust) |
1012 | 0 | { |
1013 | 0 | if (trust) { |
1014 | 0 | (void)nssPKIObject_Destroy(&trust->object); |
1015 | 0 | } |
1016 | 0 | return PR_SUCCESS; |
1017 | 0 | } |
1018 | | |
1019 | | NSS_IMPLEMENT nssSMIMEProfile * |
1020 | | nssSMIMEProfile_AddRef(nssSMIMEProfile *profile) |
1021 | 0 | { |
1022 | 0 | if (profile) { |
1023 | 0 | nssPKIObject_AddRef(&profile->object); |
1024 | 0 | } |
1025 | 0 | return profile; |
1026 | 0 | } |
1027 | | |
1028 | | NSS_IMPLEMENT PRStatus |
1029 | | nssSMIMEProfile_Destroy(nssSMIMEProfile *profile) |
1030 | 0 | { |
1031 | 0 | if (profile) { |
1032 | 0 | (void)nssPKIObject_Destroy(&profile->object); |
1033 | 0 | } |
1034 | 0 | return PR_SUCCESS; |
1035 | 0 | } |
1036 | | |
1037 | | NSS_IMPLEMENT NSSCRL * |
1038 | | nssCRL_Create(nssPKIObject *object) |
1039 | 0 | { |
1040 | 0 | PRStatus status; |
1041 | 0 | NSSCRL *rvCRL; |
1042 | 0 | NSSArena *arena = object->arena; |
1043 | 0 | PR_ASSERT(object->instances != NULL && object->numInstances > 0); |
1044 | 0 | rvCRL = nss_ZNEW(arena, NSSCRL); |
1045 | 0 | if (!rvCRL) { |
1046 | 0 | return (NSSCRL *)NULL; |
1047 | 0 | } |
1048 | 0 | rvCRL->object = *object; |
1049 | | /* XXX should choose instance based on some criteria */ |
1050 | 0 | status = nssCryptokiCRL_GetAttributes(object->instances[0], |
1051 | 0 | NULL, /* XXX sessionOpt */ |
1052 | 0 | arena, |
1053 | 0 | &rvCRL->encoding, |
1054 | 0 | NULL, /* subject */ |
1055 | 0 | NULL, /* class */ |
1056 | 0 | &rvCRL->url, |
1057 | 0 | &rvCRL->isKRL); |
1058 | 0 | if (status != PR_SUCCESS) { |
1059 | 0 | if (!arena) { |
1060 | 0 | nssPKIObject_Destroy((nssPKIObject *)rvCRL); |
1061 | 0 | } |
1062 | 0 | return (NSSCRL *)NULL; |
1063 | 0 | } |
1064 | 0 | return rvCRL; |
1065 | 0 | } |
1066 | | |
1067 | | NSS_IMPLEMENT NSSCRL * |
1068 | | nssCRL_AddRef(NSSCRL *crl) |
1069 | 0 | { |
1070 | 0 | if (crl) { |
1071 | 0 | nssPKIObject_AddRef(&crl->object); |
1072 | 0 | } |
1073 | 0 | return crl; |
1074 | 0 | } |
1075 | | |
1076 | | NSS_IMPLEMENT PRStatus |
1077 | | nssCRL_Destroy(NSSCRL *crl) |
1078 | 0 | { |
1079 | 0 | if (crl) { |
1080 | 0 | (void)nssPKIObject_Destroy(&crl->object); |
1081 | 0 | } |
1082 | 0 | return PR_SUCCESS; |
1083 | 0 | } |
1084 | | |
1085 | | NSS_IMPLEMENT PRStatus |
1086 | | nssCRL_DeleteStoredObject( |
1087 | | NSSCRL *crl, |
1088 | | NSSCallback *uhh) |
1089 | 0 | { |
1090 | 0 | return nssPKIObject_DeleteStoredObject(&crl->object, uhh, PR_TRUE); |
1091 | 0 | } |
1092 | | |
1093 | | NSS_IMPLEMENT NSSDER * |
1094 | | nssCRL_GetEncoding(NSSCRL *crl) |
1095 | 0 | { |
1096 | 0 | if (crl && crl->encoding.data != NULL && crl->encoding.size > 0) { |
1097 | 0 | return &crl->encoding; |
1098 | 0 | } else { |
1099 | 0 | return (NSSDER *)NULL; |
1100 | 0 | } |
1101 | 0 | } |