gecko-dev/lib/libpics/picsapi.c

1703 строки
53 KiB
C
Исходник Обычный вид История

1998-03-28 05:44:41 +03:00
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*-
*
* The contents of this file are subject to the Netscape Public
* License Version 1.1 (the "License"); you may not use this file
* except in compliance with the License. You may obtain a copy of
* the License at http://www.mozilla.org/NPL/
1998-03-28 05:44:41 +03:00
*
* Software distributed under the License is distributed on an "AS
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
* implied. See the License for the specific language governing
* rights and limitations under the License.
1998-03-28 05:44:41 +03:00
*
* The Original Code is mozilla.org code.
*
* The Initial Developer of the Original Code is Netscape
1998-03-28 05:44:41 +03:00
* Communications Corporation. Portions created by Netscape are
* Copyright (C) 1998 Netscape Communications Corporation. All
* Rights Reserved.
*
* Contributor(s):
1998-03-28 05:44:41 +03:00
*/
/*
* Glue code to make PICS work in the client. This is just a thin
* layer between the W3C code and our layout engine to digest PICS labels.
* Coded by Lou Montulli
*/
1998-08-30 07:40:51 +04:00
#if defined(CookieManagement)
#define TRUST_LABELS 1
#endif
1998-03-28 05:44:41 +03:00
#include "xp.h"
#include "cslutils.h"
#include "csll.h"
#include "csllst.h"
#include "pics.h"
#include "prefapi.h"
#include "xpgetstr.h"
#include "sechash.h"
#include "base64.h"
extern int XP_ALERT_PROMPT_JAVA_CAPIBILITIES_PASSWORD;
extern int XP_ALERT_PROMPT_JAVA_CAPIBILITIES_PASSWORD_FAILED_ONCE;
typedef struct {
PICS_RatingsStruct * rs;
1998-09-16 23:11:51 +04:00
XP_Bool rs_invalid;
1998-03-28 05:44:41 +03:00
} ClosureData;
PRIVATE StateRet_t
target_callback(CSLabel_t *pCSLabel,
CSParse_t * pCSParse,
1998-09-16 23:11:51 +04:00
CSLLTC_t target, XP_Bool closed,
1998-03-28 05:44:41 +03:00
void * pClosure)
{
char * ratingname;
char * ratingstr;
ClosureData *cd = (ClosureData *)pClosure;
/* closed signifies that the parsing is done for that label */
if(!cd || !closed)
return StateRet_OK;
if(target == CSLLTC_SINGLE)
{
LabelOptions_t * lo = CSLabel_getLabelOptions(pCSLabel);
if(lo)
{
if(lo->generic.state)
{
cd->rs->generic = TRUE;
}
if(lo->fur.value && !cd->rs->fur)
{
StrAllocCopy(cd->rs->fur, lo->fur.value);
}
}
}
else if(target == CSLLTC_RATING)
{
PICS_RatingsStruct *rating_struct = cd->rs;
LabelOptions_t * lo = CSLabel_getLabelOptions(pCSLabel);
ratingstr = CSLabel_getRatingStr(pCSLabel);
ratingname = CSLabel_getRatingName(pCSLabel);
if(ratingname)
{
LabelRating_t * label_rating;
ServiceInfo_t * service_info;
service_info = CSLabel_getServiceInfo(pCSLabel);
if(service_info && !rating_struct->service)
{
rating_struct->service = XP_STRDUP(service_info->rating_service.value);
}
label_rating = CSLabel_getLabelRating(pCSLabel);
if(label_rating)
{
double value;
PICS_RatingValue *rating_value = XP_NEW_ZAP(PICS_RatingValue);
value = label_rating->value.value;
if(rating_value)
{
rating_value->value = label_rating->value.value;
rating_value->name = XP_STRDUP(label_rating->identifier.value);
if(rating_value->name)
{
/* insert it into the list */
XP_ListAddObject(rating_struct->ratings, rating_value);
}
else
{
/* error, cleanup */
XP_FREE(rating_value);
}
}
}
}
}
return StateRet_OK;
}
PRIVATE StateRet_t
parse_error_handler(CSLabel_t * pCSLabel, CSParse_t * pCSParse,
const char * token, char demark,
StateRet_t errorCode)
{
return errorCode;
}
/* return NULL or ratings struct */
PUBLIC PICS_RatingsStruct *
PICS_ParsePICSLable(char * label)
{
CSParse_t *CSParse_handle;
ClosureData *cd;
PICS_RatingsStruct *rs;
CSDoMore_t status;
if(!label)
return NULL;
cd = XP_NEW_ZAP(ClosureData);
if(!cd)
return NULL;
rs = XP_NEW_ZAP(PICS_RatingsStruct);
if(!rs)
{
XP_FREE(cd);
return NULL;
}
rs->ratings = XP_ListNew();
cd->rs = rs;
/* parse pics label using w3c api */
CSParse_handle = CSParse_newLabel(&target_callback, &parse_error_handler);
if(!CSParse_handle)
return NULL;
do {
status = CSParse_parseChunk(CSParse_handle, label, XP_STRLEN(label), cd);
} while(status == CSDoMore_more);
if(cd->rs_invalid)
{
PICS_FreeRatingsStruct(rs);
rs = NULL;
}
XP_FREE(cd);
CSParse_deleteLabel(CSParse_handle);
return(rs);
}
PUBLIC void
PICS_FreeRatingsStruct(PICS_RatingsStruct *rs)
{
if(rs)
{
PICS_RatingValue *rv;
while((rv = XP_ListRemoveTopObject(rs->ratings)) != NULL)
{
XP_FREE(rv->name);
XP_FREE(rv);
}
XP_FREE(rs);
}
}
#define PICS_DOMAIN "browser.PICS."
#define PICS_ENABLED_PREF PICS_DOMAIN"ratings_enabled"
#define PICS_MUST_BE_RATED_PREF PICS_DOMAIN"pages_must_be_rated"
#define PICS_DISABLED_FOR_SESSION PICS_DOMAIN"disable_for_this_session"
#define PICS_REENABLE_FOR_SESSION PICS_DOMAIN"reenable_for_this_session"
#define JAVA_SECURITY_PASSWORD "signed.applets.capabilitiesDB.password"
1998-09-16 23:11:51 +04:00
Bool pics_ratings_enabled = FALSE;
Bool pics_pages_must_be_rated_pref = FALSE;
Bool pics_disabled_for_this_session = FALSE;
1998-03-28 05:44:41 +03:00
int pics_violence_pref = 0;
int pics_sexual_pref = 0;
int pics_language_pref = 0;
int pics_nudity_pref = 0;
/* if TRUE the user can allow additional java and JS
* capibilities. UniversalFileWrite, etc.
*/
1998-09-16 23:11:51 +04:00
Bool pics_java_capabilities_enabled = TRUE;
1998-03-28 05:44:41 +03:00
int PR_CALLBACK
pics_pref_change(const char *pref_name, void *closure)
{
1998-09-16 23:11:51 +04:00
XP_Bool bool_rv;
1998-03-28 05:44:41 +03:00
if(!PREF_GetBoolPref(PICS_ENABLED_PREF, &bool_rv))
pics_ratings_enabled = bool_rv;
if(!PREF_GetBoolPref(PICS_MUST_BE_RATED_PREF, &bool_rv))
pics_pages_must_be_rated_pref = bool_rv;
if(!PREF_GetBoolPref(PICS_DISABLED_FOR_SESSION, &bool_rv))
{
if(bool_rv)
{
pics_disabled_for_this_session = TRUE;
PREF_SetBoolPref(PICS_DISABLED_FOR_SESSION, FALSE);
}
}
if(!PREF_GetBoolPref(PICS_REENABLE_FOR_SESSION, &bool_rv))
{
if(bool_rv)
{
pics_disabled_for_this_session = FALSE;
PREF_SetBoolPref(PICS_REENABLE_FOR_SESSION, FALSE);
}
}
return 0;
}
PRIVATE char *
pics_hash_password(char *pw)
{
SECStatus status;
unsigned char result[SHA1_LENGTH];
status = HASH_HashBuf(HASH_AlgSHA1, result,
(unsigned char *)pw, XP_STRLEN(pw));
1998-03-28 05:44:41 +03:00
if (status != SECSuccess)
return NULL;
return(BTOA_DataToAscii(result, SHA1_LENGTH));
}
PUBLIC void
PICS_Init(MWContext *context)
{
1998-09-16 23:11:51 +04:00
static XP_Bool first_time=TRUE;
1998-03-28 05:44:41 +03:00
if(!first_time)
{
return;
}
else
{
char *password=NULL;
first_time = FALSE;
/* get the prefs */
pics_pref_change(PICS_DOMAIN, NULL);
PREF_RegisterCallback(PICS_DOMAIN, pics_pref_change, NULL);
/* check for security pref that password disables the enableing of
* java permissions
*/
if(PREF_CopyCharPref(JAVA_SECURITY_PASSWORD, &password))
password = NULL;
if(password && *password)
{
/* get prompt string from registry
*/
char *prompt_string = XP_GetString(XP_ALERT_PROMPT_JAVA_CAPIBILITIES_PASSWORD);
char *user_password;
char *hashed_password;
prompt_again:
/* prompt the user for the password
*/
user_password = FE_PromptPassword(context, prompt_string);
/* ### one-way hash password */
if(user_password)
{
hashed_password = pics_hash_password(user_password);
}
else
{
hashed_password = NULL;
}
if(!hashed_password)
{
pics_java_capabilities_enabled = FALSE;
}
else if(!XP_STRCMP(hashed_password, password))
{
pics_java_capabilities_enabled = TRUE;
}
else
{
XP_FREE(user_password);
XP_FREE(hashed_password);
prompt_string = XP_GetString(XP_ALERT_PROMPT_JAVA_CAPIBILITIES_PASSWORD_FAILED_ONCE);
goto prompt_again;
}
XP_FREEIF(user_password);
XP_FREEIF(hashed_password);
}
XP_FREEIF(password);
}
}
1998-09-16 23:11:51 +04:00
PUBLIC XP_Bool
1998-03-28 05:44:41 +03:00
PICS_CanUserEnableAdditionalJavaCapabilities(void)
{
return(pics_java_capabilities_enabled);
}
1998-09-16 23:11:51 +04:00
PUBLIC XP_Bool
1998-03-28 05:44:41 +03:00
PICS_IsPICSEnabledByUser(void)
{
/* short circuit */
if(pics_disabled_for_this_session)
return FALSE;
return(pics_ratings_enabled);
}
1998-09-16 23:11:51 +04:00
PUBLIC XP_Bool
1998-03-28 05:44:41 +03:00
PICS_AreRatingsRequired(void)
{
return pics_pages_must_be_rated_pref;
}
PRIVATE char *
illegal_to_underscore(char *string)
{
char* ptr = string;
if(!string)
return NULL;
if(!XP_IS_ALPHA(*ptr))
*ptr = '_';
for(ptr++; *ptr; ptr++)
if(!XP_IS_ALPHA(*ptr) && !XP_IS_DIGIT(*ptr))
*ptr = '_';
return string;
}
PRIVATE char *
lowercase_string(char *string)
{
char *ptr = string;
if(!string)
return NULL;
for(; *ptr; ptr++)
*ptr = XP_TO_LOWER(*ptr);
return string;
}
#define PICS_URL_PREFIX "about:pics"
/* returns a URL string from a RatingsStruct
* that includes the service URL and rating info
*/
PUBLIC char *
PICS_RStoURL(PICS_RatingsStruct *rs, char *cur_page_url)
{
char *rv;
char *escaped_cur_page=NULL;
if(cur_page_url)
{
escaped_cur_page = NET_Escape(cur_page_url, URL_PATH);
if(!escaped_cur_page)
return NULL;
}
rv = PR_smprintf("%s?Destination=%s",
PICS_URL_PREFIX,
escaped_cur_page ? escaped_cur_page : "none");
XP_FREE(escaped_cur_page);
if(!rs || !rs->service)
{
StrAllocCat(rv, "&NO_RATING");
return(rv);
}
else
{
XP_List *list_ptr = rs->ratings;
PICS_RatingValue *rating_value;
char *escaped_service = NET_Escape(rs->service, URL_PATH);
if(!escaped_service)
return NULL;
StrAllocCat(rv, "&Service=");
StrAllocCat(rv, escaped_service);
XP_FREE(escaped_service);
while((rating_value = XP_ListNextObject(list_ptr)) != NULL)
{
char *add;
char *escaped_name = NET_Escape(
illegal_to_underscore(rating_value->name),
URL_PATH);
1998-03-28 05:44:41 +03:00
if(!escaped_name)
{
XP_FREE(rv);
return NULL;
}
add = PR_smprintf("&%s=%f", escaped_name, rating_value->value);
XP_FREE(escaped_name);
StrAllocCat(rv, add);
XP_FREE(add);
}
return rv;
}
XP_ASSERT(0); /* should never get here */
return NULL;
}
XP_List *pics_tree_ratings=NULL;
PRIVATE void
pics_add_rs_to_tree_ratings(PICS_RatingsStruct *rs)
{
char *path;
if(!pics_tree_ratings)
{
pics_tree_ratings = XP_ListNew();
if(!pics_tree_ratings)
return;
}
if(!rs->fur || !rs->generic)
return; /* doesn't belong here */
/* make sure it's not in the list already */
if(PICS_CheckForValidTreeRating(rs->fur))
return;
/* make sure the fur address smells like a URL and has
* a real host name (at least two dots)
*
* reject "http://" or "http://www"
*/
if(!NET_URL_Type(rs->fur))
return;
path = NET_ParseURL(rs->fur, GET_PATH_PART);
/* if it has a path it's ok */
if(!path || !*path)
{
/* if it doesn't have a path it needs at least two dots */
char *ptr;
char *hostname = NET_ParseURL(rs->fur, GET_HOST_PART);
if(!hostname)
return;
if(!(ptr = XP_STRCHR(hostname, '.'))
|| !XP_STRCHR(ptr+1, '.'))
{
XP_FREE(hostname);
XP_FREEIF(path);
return;
}
XP_FREE(hostname);
}
XP_FREE(path);
XP_ListAddObject(pics_tree_ratings, rs->fur);
return;
}
1998-09-16 23:11:51 +04:00
PUBLIC XP_Bool
1998-03-28 05:44:41 +03:00
PICS_CheckForValidTreeRating(char *url_address)
{
XP_List *list_ptr;
char *valid_tree;
if(!pics_tree_ratings)
return FALSE;
list_ptr = pics_tree_ratings;
while((valid_tree = XP_ListNextObject(list_ptr)))
{
if(!XP_STRNCASECMP(url_address, valid_tree, XP_STRLEN(valid_tree)))
return TRUE;
}
return FALSE;
}
/* returns TRUE if page should be censored
* FALSE if page is allowed to be shown
*/
PUBLIC PICS_PassFailReturnVal
PICS_CompareToUserSettings(PICS_RatingsStruct *rs, char *cur_page_url)
{
int32 int_pref;
1998-09-16 23:11:51 +04:00
XP_Bool bool_pref;
1998-03-28 05:44:41 +03:00
char * pref_prefix;
char * pref_string=NULL;
char * escaped_service;
PICS_PassFailReturnVal rv = PICS_RATINGS_PASSED;
XP_List *list_ptr;
PICS_RatingValue *rating_value;
if(!rs || !rs->service)
{
return PICS_NO_RATINGS;
}
#define PICS_SERVICE_DOMAIN PICS_DOMAIN"service."
#define PICS_SERVICE_ENABLED "service_enabled"
/* cycle through list of ratings and compare to the users prefs */
list_ptr = rs->ratings;
pref_prefix = XP_STRDUP(PICS_SERVICE_DOMAIN);
/* need to deal with bad characters */
escaped_service = XP_STRDUP(rs->service);
escaped_service = illegal_to_underscore(escaped_service);
escaped_service = lowercase_string(escaped_service);
if(!escaped_service)
return PICS_RATINGS_FAILED;
StrAllocCat(pref_prefix, escaped_service);
XP_FREE(escaped_service);
if(!pref_prefix)
return PICS_RATINGS_FAILED;
/* verify that this type of rating system is enabled */
pref_string = PR_smprintf("%s.%s", pref_prefix, PICS_SERVICE_ENABLED);
if(!pref_string)
goto cleanup;
if(!PREF_GetBoolPref(pref_string, &bool_pref))
{
if(!bool_pref)
{
/* this is an unenabled ratings service */
rv = PICS_NO_RATINGS;
XP_FREE(pref_string);
goto cleanup;
}
}
else
{
/* this is an unsupported ratings service */
rv = PICS_NO_RATINGS;
XP_FREE(pref_string);
goto cleanup;
}
XP_FREE(pref_string);
while((rating_value = XP_ListNextObject(list_ptr)) != NULL)
{
/* compose pref lookup string */
pref_string = PR_smprintf("%s.%s",
pref_prefix,
illegal_to_underscore(rating_value->name));
if(!pref_string)
goto cleanup;
/* find the value in the prefs if it exists
* if it does compare it to the value given and if
* less than, censer the page.
*/
if(!PREF_GetIntPref(pref_string, &int_pref))
{
if(rating_value->value > int_pref)
{
rv = PICS_RATINGS_FAILED;
XP_FREE(pref_string);
goto cleanup;
}
}
XP_FREE(pref_string);
}
cleanup:
XP_FREE(pref_prefix);
/* make sure this rating applies to this page */
if(rs->fur)
{
if(XP_STRNCASECMP(cur_page_url, rs->fur, XP_STRLEN(rs->fur)))
rv = PICS_NO_RATINGS;
}
if(rv == PICS_RATINGS_PASSED && rs->generic)
{
/* rating should apply to a whole tree, add to list */
pics_add_rs_to_tree_ratings(rs);
}
return rv;
}
1998-08-30 17:55:38 +04:00
#ifdef TRUST_LABELS
1998-08-30 07:40:51 +04:00
/***************************************************************************/
/***************************************************************************/
/*********** TRUST.C at a latter time **********************************/
/********* break from here down into trust.c ****************************/
/***************************************************************************/
/***************************************************************************/
/* -*- Mode: C; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*-
*
* The contents of this file are subject to the Netscape Public License
* Version 1.0 (the "NPL"); you may not use this file except in
* compliance with the NPL. You may obtain a copy of the NPL at
* http://www.mozilla.org/NPL/
*
* Software distributed under the NPL is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the NPL
* for the specific language governing rights and limitations under the
* NPL.
*
* The Initial Developer of this code under the NPL is Netscape
* Communications Corporation. Portions created by Netscape are
* Copyright (C) 1998 Netscape Communications Corporation. All Rights
* Reserved.
*/
/*
* This is another version of the thin layer between the W3C code - which
* parses the PICS labels - and the HTTP parsing code, to digest PICS labels.
* The original version was coded by Lou Montulli, this version by Paul Chek.
*
* This code is called when the HTTP header is being parsed and a PICS label
* was found.
*
* The broad overview is:
* 1. The PICS parsing engine parses the ENTIRE label creating structures and
* lists of the different rating services and labels in the services.
* 2. After the label is completely parsed we iterate thru the rating
* services and the labels for each service to see if there are any trust
* labels.
* 3. If trust label are found they are added to the TrustList which is part
1998-10-07 00:56:26 +04:00
* of the URL_Struct struct.
1998-08-30 07:40:51 +04:00
*
* The two main functions for the trust label processing are:
* ProcessSingleLabel - this is where the parsing engine presents ONE label with
* all its options and extensions. ProcessSingleLabel examines
* the label and determines if it is a valid trust label. If
* it is the label is added to the TrustList. This list
* is the list of all trust labels.
*
* MatchCookieToLabel - here is where a cookie gets matched to a trust label. The
* entire header for the response has been read. The
* end-of-header processing is pulling out the "Set-Cookie"
* entries. It has retrieved a cookie for processing. The
* cookie processing code see that the user is processing
* cookies using a script and inorder to fill out the cookie
* properties for the script it has called MatchCookieToLabel
* to see if there is a trust label associated with the cookie.
* MatchCookieToLabel will look thru the trust_label list and
* match the best label to the cookie.
*/
#include "xp.h"
/* uncomment out these .h files when trust.c is seperated.
#include "csllst.h"
#include "cslutils.h"
#include "csll.h"
#include "pics.h"
#include "prefapi.h"
#include "xpgetstr.h"
#include "sechash.h"
#include "base64.h"
*/
#include "jscookie.h"
#include "mkaccess.h" /* use #include "trust.h" when it is broken out of mkaccess.h */
#include "prlong.h"
1998-10-07 00:56:26 +04:00
#include "mkgeturl.h"
1998-08-30 07:40:51 +04:00
#ifdef _DEBUG
#define HTTrace OutputDebugString
#else
#define HTTrace
#endif
#define PICS_VERSION 1.1 /* the version of PICS labels that this code expects */
CSLabel_callback_t ProcessService;
CSLabel_callback_t ProcessLabel;
CSLabel_callback_t ProcessSingleLabel;
PRBool IsValidValue( FVal_t *Value, int MinValue, int MaxValue, int *TheValue );
PRBool IsExpired( DVal_t *Value, PRTime *ExpirationDate );
PRBool IsValidTrustService( char *ServiceName );
PRBool ISODateToLocalTime( DVal_t *Value, PRTime *LocalDate );
PRBool CheckOptions( LabelOptions_t *LabelOptions, PRTime *ExpirationDate );
PRBool IsLabelSigned( Extension_t *AExt );
PRBool IsSignatureValid( Extension_t *AExt, LabelOptions_t *LabelOptions );
1998-08-30 07:40:51 +04:00
extern int NET_SameDomain(char * currentHost, char * inlineHost);
extern char * lowercase_string(char *string);
extern char * illegal_to_underscore(char *string);
#ifdef _DEBUG
/************** FOR DEBUGGINGG ***********************************/
#include "csparse.h"
LabelTargetCallback_t targetCallback;
StateRet_t trustCallback(CSLabel_t * pCSMR, CSParse_t * pCSParse, CSLLTC_t target, PRBool closed, void * pVoid)
1998-08-30 07:40:51 +04:00
{
1998-10-07 00:56:26 +04:00
#ifdef NOPE /* for debuggin */
1998-08-30 07:40:51 +04:00
static int Total = 0;
char space[256];
int change = closed ? -target : target;
Total += change;
sprintf( space, "(%2d:%3d)token-->|%s| %s %s \n",
Total, closed ? -target : target, pCSParse->token->data,
closed ? " ending" : "starting", pCSParse->pTargetObject->note );
sprintf(space, "%s %s (%d)\n", closed ? " ending" : "starting", pCSParse->pParseState->note, closed ? -target : target);
HTTrace(space);
if ( Total == 0 ) HTTrace( "All Done\n" );
#endif
return StateRet_OK;
}
/* LLErrorHandler_t parseErrorHandler; */
StateRet_t trustErrorHandler(CSLabel_t * pCSLabel, CSParse_t * pCSParse,
const char * token, char demark,
StateRet_t errorCode)
{
char space[256];
sprintf(space, "%20s - %s: ", pCSParse->pTargetObject->note,
pCSParse->currentSubState == SubState_X ? "SubState_X" :
pCSParse->currentSubState == SubState_N ? "SubState_N" :
pCSParse->currentSubState == SubState_A ? "SubState_A" :
pCSParse->currentSubState == SubState_B ? "SubState_B" :
pCSParse->currentSubState == SubState_C ? "SubState_C" :
pCSParse->currentSubState == SubState_D ? "SubState_D" :
pCSParse->currentSubState == SubState_E ? "SubState_E" :
pCSParse->currentSubState == SubState_F ? "SubState_F" :
pCSParse->currentSubState == SubState_G ? "SubState_G" :
pCSParse->currentSubState == SubState_H ? "SubState_H" :
"???");
HTTrace(space);
switch (errorCode) {
case StateRet_WARN_NO_MATCH:
if (token)
sprintf(space, "Unexpected token \"%s\".\n", token);
else
sprintf(space, "Unexpected lack of token.\n");
break;
case StateRet_WARN_BAD_PUNCT:
if (token)
sprintf(space, "Unexpected punctuation |%c| after token \"%s\".\n", demark, token);
else
sprintf(space, "Unexpected punctuation |%c| \n", demark);
break;
case StateRet_ERROR_BAD_CHAR:
sprintf(space, "Unexpected character \"%c\" in token \"%s\".\n",
*pCSParse->pParseContext->pTokenError, token);
break;
default:
sprintf(space, "Internal error: demark:\"%c\" token:\"%s\".\n", demark, token);
break;
}
HTTrace(space);
/*
CSLabel_dump(pCSMR);
HTTrace(pParseState->note);
*/
return errorCode;
}
/*************** END OF FOR DEBUGGINGG *********************************** */
#endif
/*----------------------------------------------------------------------------------------------------
* Purpose: given the value part of a PICS label parse it and determine
* if it is a valid trust label according to internet draft
* draft-ietf-http-trust-state-mgt-02.txt
*
*---------------------------------------------------------------------------------------------------- */
1998-10-07 00:56:26 +04:00
PUBLIC void PICS_ExtractTrustLabel(URL_Struct *URL_s, char *value )
1998-08-30 07:40:51 +04:00
{
CSParse_t * pCSParse = 0;
CSDoMore_t status;
#ifdef _DEBUG /* display the label for debug */
HTTrace( "\n" );
HTTrace( value );
HTTrace( "\n" );
#endif
/* validate input args */
1998-10-07 00:56:26 +04:00
if ( !URL_s || !value || *value == '\0' ) return;
1998-08-30 07:40:51 +04:00
/* parse the PICS label and extract the trust label information from it */
/* ignoring the other rating information. */
/* init the PICS parsing code */
#ifdef _DEBUG
pCSParse = CSParse_newLabel( &trustCallback, &trustErrorHandler );
#else
pCSParse = CSParse_newLabel( 0, 0 );
#endif
if ( pCSParse ) {
/* parse the label - the entire label is in value. So one call
to parse chunk is all that is needed.*/
status = CSParse_parseChunk(pCSParse, value, XP_STRLEN(value), 0);
/* was the parse sucessfull? */
if ( status == CSDoMore_done ) {
/* yes - Iterate thru the services looking for valid trust labels.
* the PICS label parsing code is set up to iterate thru the labels.
* the hierarchy is:
* Services
* Labels
* SingleLabels
* Label Options
* Label Ratings */
CSLabel_t * pCSLabel = CSParse_getLabel( pCSParse );
/* make sure the PICS version is correct */
if ( PICS_VERSION <= FVal_value(&CSLabel_getCSLLData(pCSLabel)->version) ) {
/* iterate thru each of the service IDs in this label calling ProcessService for each*/
1998-10-07 00:56:26 +04:00
CSLabel_iterateServices( pCSLabel, ProcessService, NULL, 0, (void *)(URL_s));
1998-08-30 07:40:51 +04:00
/* IF there are valid trust labels in this PICS label they are added to */
/* the trust list at TrustList */
}
} else {
/* either there was a error parsing the label or the label wasnt complete.
In either case ignore the label */
HTTrace( "Invalid label\n" );
}
CSParse_deleteLabel(pCSParse); /* free the label parsing structures */
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: the call back to handle a single service ID
*
*
*----------------------------------------------------------------------------------------------------*/
1998-10-07 00:56:26 +04:00
CSError_t ProcessService(CSLabel_t * pCSLabel, State_Parms_t * pParms, const char * identifier, void * URL_s)
1998-08-30 07:40:51 +04:00
{
CSError_t ret = CSError_OK;
if ( IsValidTrustService( CSLabel_getServiceName( pCSLabel ) ) ) {
/* yes - passed the first test for trust labels, i.e. a valid trust service
I dont care about any of the service level options at this point; but if I
did I would use LabelOptions_t Opt = pServiceInfo->pLabelOptions to check them
So iterate thru the labels which if they have the purpose, Recipients and identifiable ratings
will be trust labels */
1998-10-07 00:56:26 +04:00
ret = CSLabel_iterateLabels(pCSLabel, ProcessLabel, pParms, 0, URL_s);
1998-08-30 07:40:51 +04:00
} else {
/* if this is not a trust label but a regular PICS label it will usually
fail the rating service. So this is an expected occurance. */
HTTrace( "ProcessService: invalid trust rating service\n" );
}
return ret;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: the call back to process a label and iterate thru the SingleLabels
*
*
*----------------------------------------------------------------------------------------------------*/
1998-10-07 00:56:26 +04:00
CSError_t ProcessLabel(CSLabel_t * pCSLabel, State_Parms_t * pParms, const char * identifier, void * URL_s)
1998-08-30 07:40:51 +04:00
{
1998-10-07 00:56:26 +04:00
return CSLabel_iterateSingleLabels(pCSLabel, ProcessSingleLabel, pParms, 0, URL_s);
1998-08-30 07:40:51 +04:00
}
1998-08-30 08:49:13 +04:00
void TL_SetTrustAuthority( TrustLabel *ALabel, char *TrustAuthority );
void TL_SetByField( TrustLabel *ALabel, char *szBy );
void TL_ProcessForAttrib( TrustLabel *ALabel, char *szFor);
1998-08-30 08:49:13 +04:00
1998-08-30 07:40:51 +04:00
/*----------------------------------------------------------------------------------------------------
* Purpose: the call back get the options and the ratings for a single label.
* Create a TrustLabel to contain the info about the label and put on the
* the trust label list
*
* Input:
* pCSLabel - current parsed label instance
1998-10-07 00:56:26 +04:00
* URL_s - the URL_Struct associated with this trust label from the HTTP header
1998-08-30 07:40:51 +04:00
* NOTES:
* 1. If the same rating is seen twice in one single label, the first VALID instance is used.
*
* History:
1998-10-07 00:56:26 +04:00
* 9/10/98 Paul Chek - switch recipient back to supporting a single value.
* NOTE: this is now controlled by RECIPIENT_RANGE
1998-08-30 07:40:51 +04:00
* 8/22/98 Paul Chek - switch recipient to support a range of values
*---------------------------------------------------------------------------------------------------- */
1998-10-07 00:56:26 +04:00
CSError_t ProcessSingleLabel(CSLabel_t * pCSLabel, State_Parms_t * pParms, const char * identifier, void * URL_s)
1998-08-30 07:40:51 +04:00
{
/* tracks the ratings I have seen */
#define HAVE_PURPOSE 0x1
#define HAVE_RECIPIENTS 0x2
#define HAVE_ID 0x4
typedef struct {
char *szName; /* the full name of the rating */
int Min, Max; /* the valid ranges for the rating */
} ValidRating;
/* the ratings I am interested in for a trust label */
ValidRating PurposeRating = { "purpose", 0, 5 };
ValidRating RecipientsRating = { "recipients", 0, 3 };
ValidRating IDRating = { "identifiable", 0, 1 };
CSError_t ret = CSError_OK;
int PurposeRange = 0; /* bits corresponding to the purpose ranges seen */
int RecpRange = 0;
int IDValue = 0;
HTList * ranges;
Range_t * pRange;
int TempValue, MinValue, MaxValue;
int i;
TrustLabel *TheLabel;
Extension_t *AExt;
ExtensionData_t *AData;
char *AName;
PRBool bForgedLabel;
1998-10-07 00:56:26 +04:00
URL_Struct *TheURL_s;
1998-08-30 07:40:51 +04:00
/* march thru the ratings looking for purpose, Recipients and identification. When found save their values. */
int count = 0;
1998-10-07 00:56:26 +04:00
if (!pCSLabel || !URL_s ) {
1998-08-30 07:40:51 +04:00
/* oops got a bad one */
ret = CSError_BAD_PARAM;
} else {
/* the current single label */
SingleLabel_t * pSingleLabel = CSLabel_getSingleLabel(pCSLabel);
/* get the options */
LabelOptions_t *LabelOptions = pSingleLabel->pLabelOptions;
PRTime ExpDate; /* the expiration date */
/* VALIDITY TESTS */
/* Has the expiration date passed - there must be an expiration date - sec 3.4.2 */
/* and these options are required "by", "generic", "on" - sec 3.1? */
if ( CheckOptions( LabelOptions, &ExpDate ) ) {
/* yes - check the ratings for purpose, Recipients and ID */
/* get the Ratings list */
HTList *LabelRatings = pSingleLabel->labelRatings;
LabelRating_t *Rating;
PRBool bContinue = TRUE;
1998-08-30 07:40:51 +04:00
short AllRatings = HAVE_PURPOSE | HAVE_RECIPIENTS | HAVE_ID;
/* look thru all the ratings until I have the 3 required ratings */
while ( AllRatings != 0 && (Rating = (LabelRating_t *) HTList_nextObject(LabelRatings))) {
/* is it the purpose rating? */
if ( (AllRatings & HAVE_PURPOSE) &&
!XP_STRCASECMP( SVal_value(&Rating->identifier), PurposeRating.szName)) {
/* Was a single value given?? */
if ( IsValidValue( &Rating->value, PurposeRating.Min, PurposeRating.Max, &TempValue ) ) {
PurposeRange = PurposeRange | ( 1 << TempValue );
AllRatings &= (~HAVE_PURPOSE );
/* Was a range or a list of values given?? */
} else if ( Rating->ranges ) {
ranges = Rating->ranges;
while ((pRange = (Range_t *) HTList_nextObject(ranges))) {
MinValue = MaxValue = -1;
if ( IsValidValue( &pRange->min, PurposeRating.Min, PurposeRating.Max, &MinValue ) ) {
PurposeRange = PurposeRange | ( 1 << MinValue );
AllRatings &= (~HAVE_PURPOSE );
}
if ( IsValidValue( &pRange->max, PurposeRating.Min, PurposeRating.Max, &MaxValue ) ) {
/* if there was also a min value then set all the bits between the min and the max */
if ( 0 <= MinValue && MinValue <= MaxValue ) {
for( i=MinValue; i<=MaxValue; i++ ) PurposeRange = PurposeRange | ( 1 << i );
} else {
PurposeRange = PurposeRange | ( 1 << MaxValue );
}
AllRatings &= (~HAVE_PURPOSE );
}
}
}
/* is it the Recipients rating? */
} else if ( (AllRatings & HAVE_RECIPIENTS) &&
!XP_STRCASECMP(SVal_value(&Rating->identifier), RecipientsRating.szName)) {
1998-10-07 00:56:26 +04:00
#ifndef RECIPIENT_RANGE
/* yes - is the range valid?*/
if ( IsValidValue( &Rating->value, RecipientsRating.Min, RecipientsRating.Max, &RecpRange ) ) {
AllRatings &= (~HAVE_RECIPIENTS );
}
#else
1998-08-30 07:40:51 +04:00
/* Was a single value given?? */
if ( IsValidValue( &Rating->value, RecipientsRating.Min, RecipientsRating.Max, &TempValue ) ) {
RecpRange = RecpRange | ( 1 << TempValue );
AllRatings &= (~HAVE_RECIPIENTS );
/* Was a range or a list of values given?? */
} else if ( Rating->ranges ) {
ranges = Rating->ranges;
while ((pRange = (Range_t *) HTList_nextObject(ranges))) {
MinValue = MaxValue = -1;
if ( IsValidValue( &pRange->min, RecipientsRating.Min, RecipientsRating.Max, &MinValue ) ) {
RecpRange = RecpRange | ( 1 << MinValue );
AllRatings &= (~HAVE_RECIPIENTS );
}
if ( IsValidValue( &pRange->max, RecipientsRating.Min, RecipientsRating.Max, &MaxValue ) ) {
/* if there was also a min value then set all the bits between the min and the max */
if ( 0 <= MinValue && MinValue <= MaxValue ) {
for( i=MinValue; i<=MaxValue; i++ ) RecpRange = RecpRange | ( 1 << i );
} else {
RecpRange = RecpRange | ( 1 << MaxValue );
}
AllRatings &= (~HAVE_RECIPIENTS );
}
}
}
1998-10-07 00:56:26 +04:00
#endif
1998-08-30 07:40:51 +04:00
/* is it the identifiable rating */
} else if ( (AllRatings & HAVE_ID) &&
!XP_STRCASECMP(SVal_value(&Rating->identifier), IDRating.szName)) {
/* yes - is the range valid? */
if ( IsValidValue( &Rating->value, IDRating.Min, IDRating.Max, &IDValue ) ) {
AllRatings &= (~HAVE_ID );
}
}
} /* end while ( AllRatings */
/* Did I get the required ratings? */
if ( !AllRatings ) {
/* yes */
/*HTTrace( " Valid trust label: purpose = 0x%0x, ID = %d, recipients = %d\n", PurposeRange, IDValue, RecpRange ); */
/*HTTrace( " for: \"%s\" \n", SVal_value(&LabelOptions->fur)); */
/*HTTrace( " expires: %s\n", DVal_value( &LabelOptions->until ) ); */
TheLabel = TL_Construct(); /* allocate a net trust label */
if ( TheLabel ) {
/* fill up the structure */
TheLabel->purpose = PurposeRange;
TheLabel->ID = IDValue;
TheLabel->recipients = RecpRange;
TheLabel->ExpDate = ExpDate;
TL_SetTrustAuthority( TheLabel, CSLabel_getServiceName( pCSLabel ) );
TL_SetByField( TheLabel, SVal_value(&LabelOptions->by) );
bForgedLabel = FALSE;
/* if this is a generic label then set the isGeneric flag */
if ( BVal_value( &LabelOptions->generic ) ) TheLabel->isGeneric = TRUE;
/* if there is a cookieinfo extension and it had a name(s) then save the name */
if ( LabelOptions->extensions ) {
while( !bForgedLabel && (AExt = (Extension_t *)XP_ListNextObject( LabelOptions->extensions )) ) {
/* is this an extension for cookie info? */
if ( IsValidTrustService( SVal_value(&AExt->url) ) ) {
/* is there data attached to the extension - that is stuff besides the mandatory | optional and the URL */
if ( AExt->extensionData ) {
/* yes copy the list to the trust label */
if ( !TheLabel->nameList ) TheLabel->nameList = XP_ListNew();
if ( TheLabel->nameList ) {
while( (AData = (ExtensionData_t *)HTList_nextObject( AExt->extensionData ) ) ) {
AName = XP_STRDUP( AData->text ); /* copy it */
XP_ListAddObjectToEnd( TheLabel->nameList, AName ); /* add it to the trust label list */
}
}
}
/* Is this a digital signature extension?? */
} else if ( IsLabelSigned( AExt ) ) {
/* Yes - the label is signed, I must now check if the signature is valid.
If the signature is NOT valid then throw the label out. */
if ( IsSignatureValid( AExt, LabelOptions ) ) {
/* the label is signed with a good signature */
TheLabel->isSigned = TRUE;
} else {
/* the label has a signature but the MIC on the label doesnt match
the signature, so someone has fooled with the label */
bForgedLabel = TRUE;
}
} /* end of if ( IsValidTrustService */
}
}
/* Was the label forged?? */
if ( !bForgedLabel ) {
/* seperate the path and domain out of the "for" label attribute */
TL_ProcessForAttrib( TheLabel, SVal_value(&LabelOptions->fur) );
1998-10-07 00:56:26 +04:00
/* add the trust label to the list of trust labels in this header.
* The list of trust labels is maintained in the URL_Struct that
* was passed in. */
TheURL_s = (URL_Struct *)URL_s;
if ( TheURL_s->TrustList == NULL ) {
1998-08-30 07:40:51 +04:00
/* create the list */
1998-10-07 00:56:26 +04:00
TheURL_s->TrustList = XP_ListNew();
1998-08-30 07:40:51 +04:00
}
1998-10-07 00:56:26 +04:00
if ( TheURL_s->TrustList ) {
1998-08-30 07:40:51 +04:00
/* NOTE: this is the only place where trust label are added to the TrustList */
1998-10-07 00:56:26 +04:00
XP_ListAddObjectToEnd( TheURL_s->TrustList, TheLabel );
1998-08-30 07:40:51 +04:00
HTTrace( " Valid trust label\n" );
} else {
HTTrace( "ERROR in ProcessSingleLabel: unable to allocate the trust list\n" );
ret = CSError_APP;
}
} else {
/* the label was forged - discard it */
HTTrace( "Forged label\n" );
TL_Destruct( TheLabel );
}
} else {
/* memory allocation problems */
HTTrace( "ERROR in ProcessSingleLabel: failed to allocate trust object\n" );
ret = CSError_APP;
}
} else {
/* no not a valid trust label, not a big deal, keep goin */
HTTrace( " Label not a trust label - not all ratings present.\n" );
}
} else {
/* not a valid trust label - missing expiration date or for option */
HTTrace( " Label not a trust label - missing a required option\n" );
} /* if ( !IsExpired( LabelOptions */
} /* if (!pCSLabel || */
return ret;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: determine if the value for a rating falls within the specified range
*
* ---------------------------------------------------------------------------------------------------- */
PRBool IsValidValue( FVal_t *Value, int MinValue, int MaxValue, int *TheValue )
1998-08-30 07:40:51 +04:00
{
if ( FVal_initialized(Value) ) {
/* NOTE: the conversion from a float to an int, since for trust labels we are */
/* only dealing with ints. */
*TheValue = (int)FVal_value(Value);
if ( MinValue <= (*TheValue) && (*TheValue) <= MaxValue ) {
return TRUE;
}
}
return FALSE;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: determine if the required label options are present.
*
*
* returns: TRUE if all the required options are present
* ExpDate - returns the label expiration date
*
* ---------------------------------------------------------------------------------------------------- */
PRBool CheckOptions( LabelOptions_t *LabelOptions, PRTime *ExpirationDate )
1998-08-30 07:40:51 +04:00
{
PRBool Status = FALSE;
1998-08-30 07:40:51 +04:00
/* According to the spec these options must be present:
* "by", "gen", "for", "on" AND "exp" OR "until". AND the expiration date must
* not have passed.
*/
if ( !IsExpired( &LabelOptions->until, ExpirationDate ) && /* expiration date */
SVal_initialized( &LabelOptions->fur ) && /* for option */
SVal_initialized( &LabelOptions->by ) && /* by option */
DVal_initialized( &LabelOptions->on ) && /* on option */
BVal_initialized( &LabelOptions->generic ) ) { /* generic option */
Status = TRUE;
}
return Status;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: determine if the expiration date has passed.
*
* Note:
* The PICS spec calls for only one form for the date, ISO 8601:1988 which is
* YYYY.MM.DDTHH:MMSxxxx
* where S = - or +
* xxxx = four digit time zone offset
*
* returns
* TRUE if the expiration date has PASSED or is not present
* FALSE if the expiration date is AFTER now.
* ---------------------------------------------------------------------------------------------------- */
PRBool IsExpired( DVal_t *Value, PRTime *ExpirationDate )
1998-08-30 07:40:51 +04:00
{
PRTime CurrentTime;
/* Has the expiration date been given?? */
if (DVal_initialized( Value ) ) {
/* yes - is it before now? */
if ( ISODateToLocalTime( Value, ExpirationDate ) ) {
/* get the exploded local time parameters */
CurrentTime = PR_Now();
/*HTTrace( "Cur Time = %s", ctime( &CurrentTime ) ); */
/*HTTrace( "Exp Time = %s", ctime( &ExpTime) ); */
if ( LL_CMP(CurrentTime,>,*ExpirationDate) ) {
return TRUE; /* Expiration time has passed */
} else {
return FALSE; /* Expiration time has NOT passed */
}
}
}
return TRUE;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: if the given service name is a valid trust service.
*
* Note: the valid trust services are stored in the user's preferences.
* They are of the form "browser.trust.service.XXX.service_enabled"
* where XXX is an escaped URL formed by coverting illegal preference characters to underscore
* and lowercasing the string .
* So the preference for the default trust service
* "http: www.w3.org/PICS/systems/P3P-http-trust-state-01.rat" is
* pref("browser.trust.service.http___www_w3_org_pics_systems_p3p_http_trust_state_01_rat.service_enabled", true);
*
* returns TRUE if the given service is a valid trust service
* ----------------------------------------------------------------------------------------------------*/
PRBool IsValidTrustService( char *ServiceName )
1998-08-30 07:40:51 +04:00
{
char *PrefName;
char *escaped_service;
if ( ServiceName && *ServiceName ) {
/* Build the preference string - first escape the service name */
escaped_service = XP_STRDUP(ServiceName);
escaped_service = illegal_to_underscore(escaped_service);
escaped_service = lowercase_string(escaped_service);
if(!escaped_service) return FALSE;
/* create the preference string */
PrefName = XP_Cat( "browser.trust.service.", escaped_service, ".service_enabled", (char *)NULL );
XP_FREE(escaped_service);
if ( PrefName ) {
#ifndef FOR_PHASE2
#define FIRST_STR "browser.trust.service.http___www_w3_org_pics_systems_p3p_http_trust_state_01_rat.service_enabled"
#define SECOND_STR "browser.trust.service.http___www_w3_org_pics_extensions_cookieinfo_1_0_html.service_enabled"
if ( XP_STRCASECMP( PrefName, FIRST_STR ) == 0 ||
XP_STRCASECMP( PrefName, SECOND_STR ) == 0 ) {
return TRUE;
} else {
return FALSE;
}
#else
/* Now make sure the preference both exists and is enabled */
if(!PREF_GetBoolPref(PrefName, &bool_pref)) {
/* the preference exists - this is a known rating service */
XP_FREE( PrefName );
return bool_pref;
} else {
/* the preference does not exist - this is an unknown rating service */
XP_FREE( PrefName );
return FALSE;
}
#endif
}
}
return FALSE;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: takes a parsed ISO date from the PICS label parser and converts
* it to a local PRTime
*
*
* returns
* TRUE if the date is valid
* FALSE if the date is not a valid ISO string
* ---------------------------------------------------------------------------------------------------- */
PRBool ISODateToLocalTime( DVal_t *Value, PRTime *LocalDate )
1998-08-30 07:40:51 +04:00
{
if (DVal_initialized( Value ) ) {
/* the string was parsed into the different fields */
PRExplodedTime tm;
XP_MEMSET( (void *)&tm, 0, sizeof( PRExplodedTime ) );
tm.tm_year = Value->year;
tm.tm_month = Value->month - 1;
tm.tm_mday = Value->day;
tm.tm_hour = Value->hour;
tm.tm_min = HTMIN(Value->minute, 59 );
1998-08-30 07:40:51 +04:00
/* the adjustment for GMT offset to the local time zone in seconds */
tm.tm_params.tp_gmt_offset = Value->timeZoneHours *3600 + Value->timeZoneMinutes * 60;
*LocalDate = PR_ImplodeTime(&tm);
return TRUE;
} else {
return FALSE;
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: determine if path2 is a prefix of path1
*
* returns - TRUE if it is
*---------------------------------------------------------------------------------------------------- */
PRBool IsPrefix( char *path1, char *path2 )
1998-08-30 07:40:51 +04:00
{
int i;
if ( path1 && path2 ) {
int len1 = XP_STRLEN( path1 );
int len2 = XP_STRLEN( path2 );
/* Is path2's length <= path1's length?? */
if ( len2 <= len1 ) {
/* path1 characters must match path2 up to the length of path1 */
for ( i=0; i<len2; i++ ) {
if ( path1[i] != path2[i] ) {
/* not a prefix */
return FALSE;
}
}
/* path2 is a prefix of path1 */
return TRUE;
}
}
return FALSE;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: given the path from a cookie and the list of trust labels in this header
* try to match the cookie to a trust label.
*
* inputs:
* TrustList - the list of trust labels to search
* CookieData - the data struct used for java script partially filled out
* with the cookie name, path and domain
* CookieDomain - the domain attribute from the cookie
* returns
* TRUE if a matching trust label is found
* FALSE if none found
* TheLabel - ptr to the matching trust label
*----------------------------------------------------------------------------------------------------*/
1998-10-07 00:56:26 +04:00
PUBLIC PRBool MatchCookieToLabel( char *TargetURL, JSCFCookieData *CookieData, TrustLabel **TheLabel )
1998-08-30 07:40:51 +04:00
{
PRBool Status = FALSE;
1998-10-07 00:56:26 +04:00
if ( TargetURL && CookieData && TheLabel ) {
Status = MatchCookieToLabel2( TargetURL, CookieData->name_from_header,
1998-08-30 07:40:51 +04:00
CookieData->path_from_header, CookieData->host_from_header,
TheLabel );
}
return Status;
}
/****************************************************************
* Purpose: The actual matching code.
* This implements part of section 3.3.1 of the trust label spec dealing
* with figuring out if a cookie and a trust label are "compatiable".
*
* CookieName - the name of the cookie
* CookiePath - the path for the cookie
* CookieHost - the host for the cookie
*
* returns
* TRUE if a matching trust label is found
* FALSE if none found
* TheLabel - ptr to the matching trust label
*
*
* History:
* Paul Chek - initial creation
****************************************************************/
1998-10-07 00:56:26 +04:00
PUBLIC PRBool MatchCookieToLabel2(char *TargetURL, char *CookieName,
1998-08-30 07:40:51 +04:00
char *CookiePath, char *CookieHost,
TrustLabel **TheLabel )
{
PRBool Status = FALSE;
1998-08-30 07:40:51 +04:00
TrustLabel *ALabel;
char *AName;
PRBool bNameMatch;
1998-08-30 07:40:51 +04:00
XP_List *TempList;
TrustLabel *LastMatch = NULL;
PRBool LastMatchNamed;
1998-08-30 07:40:51 +04:00
XP_List *TempTrustList;
/* make sure I have the data I need */
1998-10-07 00:56:26 +04:00
if ( TargetURL && XP_STRLEN( TargetURL ) &&
CookieName && CookiePath && CookieHost &&
TheLabel ) {
1998-08-30 07:40:51 +04:00
/* look thru the list of trust labels for one to match this cookie */
/* First see if there is a named trust label that matches the cookie */
1998-10-07 00:56:26 +04:00
TempTrustList = NET_GetTrustList( TargetURL );
if ( TempTrustList ) {
1998-08-30 07:40:51 +04:00
while( (ALabel = (TrustLabel *)XP_ListNextObject( TempTrustList )) ) {
/* is this label for a specific cookie(s)?? */
bNameMatch = FALSE;
if ( ALabel->nameList != NULL ) {
/* yes - do the names match - CASE INSENSITIVE COMPARE ?? */
TempList = ALabel->nameList; /* always walk a list with a COPY of the list pointer */
while( (AName = (char *)XP_ListNextObject( TempList ) ) ) {
if ( XP_STRCASECMP (AName, CookieName ) == 0 ) {
/* this label has a cookie name and it matches the current cookie */
bNameMatch = TRUE;
break;
}
}
}
/* do the domains match?? */
if ( NET_SameDomain( ALabel->domainName, CookieHost ) == 1 ) {
/* the domains match - is this label a "Generic" label?? */
if ( ALabel->isGeneric ) {
/* is the path from the label a prefix to the path in the cookie */
if ( IsPrefix( CookiePath, ALabel->path ) ) {
/* this label matches this cookie -- is it the best match */
if ( !LastMatch ) {
/* no previous match - take this one */
LastMatch = ALabel;
LastMatchNamed = bNameMatch;
} else {
/* there was a previus match - is this one more specific??
Pick named over unnamed labels; pick non-generic over generic labels.
So since the current label is GENERIC, if it is named AND
the previous label is NOT named use the current label
because it is a better match - named is better than not named.
An implied test is if neither are named, since this is a GENERIC
label then keep the previous label because it is either
a better match or an equivalent match.
*/
if ( bNameMatch && (!LastMatchNamed) ) {
LastMatch = ALabel;
LastMatchNamed = bNameMatch;
}
}
}
} else {
/* this is not a generic label - do the paths match exactly - CASE INSENSITIVE COMPARE ?? */
if ( XP_STRCASECMP( ALabel->path, CookiePath ) == 0 ) {
/* this label matches this cookie -- is it the best match */
if ( !LastMatch ) {
/* no previous match - take this one */
LastMatch = ALabel;
LastMatchNamed = bNameMatch;
} else {
/* there was a previus match - is this one more specific??
Pick named over unnamed labels; pick non-generic over generic labels.
So since the current label is NON-GENERIC, if it is named
use it because it is either a better match or an equivalent match.
If it is not named AND the previous label is not named then use
the current label because it is either a better match or an equivalent match.
*/
if ( bNameMatch || (!LastMatchNamed) ) {
/* both are named, the current label is non-generic, use it */
LastMatch = ALabel;
LastMatchNamed = bNameMatch;
}
}
}
} /* end of if ( ALabel->isGeneric */
} /* end of if ( NET_SameDomain */
} /* end of while( (ALabel */
1998-10-07 00:56:26 +04:00
} /* end of if ( tmpEntry && tmpEntry */
1998-08-30 07:40:51 +04:00
}
/* Was there a match?? */
if ( LastMatch ) {
/* yes */
*TheLabel = LastMatch;
return TRUE;
} else {
return FALSE;
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: returns true if the user preference for supporting trust labels is
* set to true.
*
*
*---------------------------------------------------------------------------------------------------- */
PUBLIC PRBool IsTrustLabelsEnabled()
1998-08-30 07:40:51 +04:00
{
#ifndef FOR_PHASE2
return TRUE;
#else
static int bEnabled = -1;
if ( bEnabled == -1 ) {
/* on the first call get it from the preferences */
PREF_GetBoolPref("browser.PICS.trust_labels_enabled", &bEnabled);
}
return (PRBool)bEnabled;
1998-08-30 07:40:51 +04:00
#endif
}
/*----------------------------------------------------------------------------------------------------
* Purpose: returns true if the given extension is the Digital Signature extension
*
*---------------------------------------------------------------------------------------------------- */
PRBool IsLabelSigned( Extension_t *AExt )
1998-08-30 07:40:51 +04:00
{
return FALSE; /* not handling signed label right now */
}
/*----------------------------------------------------------------------------------------------------
* Purpose: returns true if the given Digital Signature extension is a valid signature for
* the given label. If this returns false then we have a forged label.
*
*---------------------------------------------------------------------------------------------------- */
PRBool IsSignatureValid( Extension_t *AExt, LabelOptions_t *LabelOptions )
1998-08-30 07:40:51 +04:00
{
return TRUE; /* not handling signed label right now */
}
/*\\//\\//\\//\\// "MEMBERS" OF THE TRUST LABEL "CLASS" \\//\\//\\//\\//\\//\\//\\//\\//\\// */
/*----------------------------------------------------------------------------------------------------
* Purpose: construct a Trust Label and init its members
*
* returns - the new initialized TrustLabel
* ----------------------------------------------------------------------------------------------------*/
TrustLabel *TL_Construct()
{
TrustLabel *ALabel = NULL;
ALabel = XP_ALLOC( sizeof(TrustLabel) );
if ( ALabel ) {
ALabel->purpose = 0;
ALabel->ID = 0;
ALabel->recipients = 0;
ALabel->szTrustAuthority = NULL;
ALabel->isGeneric = FALSE;
ALabel->isSigned = FALSE;
#if defined(XP_MAC) || defined(PRINT64_IS_STRUCT)
ALabel->ExpDate.hi = ALabel->ExpDate.lo = 0;
#else
1998-08-30 07:40:51 +04:00
ALabel->ExpDate = 0;
#endif
1998-08-30 07:40:51 +04:00
ALabel->signatory = NULL;
ALabel->domainName = NULL;
ALabel->path = NULL;
ALabel->nameList = NULL;
ALabel->szBy = NULL;
}
return ALabel;
}
/*----------------------------------------------------------------------------------------------------
* Purpose: destroy a TrustLabel freeing allocated memory
*
* ----------------------------------------------------------------------------------------------------*/
PUBLIC void TL_Destruct( TrustLabel *ALabel )
{
char *AName;
if ( ALabel ) {
if ( ALabel->signatory ) XP_FREE( ALabel->signatory );
if ( ALabel->domainName ) XP_FREE( ALabel->domainName );
if ( ALabel->path ) XP_FREE( ALabel->path );
if ( ALabel->szTrustAuthority ) XP_FREE( ALabel->szTrustAuthority );
if ( ALabel->szBy ) XP_FREE( ALabel->szBy );
if ( ALabel->nameList ) {
while( (AName = (char *)XP_ListRemoveEndObject( ALabel->nameList )) ){
XP_FREE( AName );
}
/* now delete the list */
XP_ListDestroy( ALabel->nameList );
}
XP_FREE( ALabel );
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: decompose the "for" label attribute into a domain and path
* and save in the trust label
*
* ----------------------------------------------------------------------------------------------------*/
void TL_ProcessForAttrib( TrustLabel *ALabel, char *szFor)
{
char *p;
if ( ALabel && szFor ) {
/* for the domain - skip to the "//" to jump over the protocol, */
/* this is the beginning of the domain, then */
/* look for the first ":" or "/" to mark the end of the domain */
p = XP_STRCASESTR(szFor, "//");
if ( p == NULL ) {
NET_SACopy( &ALabel->domainName, szFor);
} else {
NET_SACopy( &ALabel->domainName, p+2);
}
for(p=ALabel->domainName; *p != '\0' && *p != ':' && *p != '/'; p++); /* skip to end OR : or / */
/* for the path it starts where the domain stopped */
NET_SACopy( &ALabel->path, p );
*p = '\0'; /* terminate the domain name */
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: set the signatory for a signed label
*
* ----------------------------------------------------------------------------------------------------*/
void TL_SetSignatory( TrustLabel *ALabel, char *Signatory )
{
if ( ALabel && Signatory ) {
NET_SACopy( &ALabel->signatory, Signatory );
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: set the trust authority string
*
* ----------------------------------------------------------------------------------------------------*/
void TL_SetTrustAuthority( TrustLabel *ALabel, char *TrustAuthority )
{
if ( ALabel && TrustAuthority ) {
NET_SACopy( &ALabel->szTrustAuthority, TrustAuthority );
}
}
/*----------------------------------------------------------------------------------------------------
* Purpose: set the by field in the label from the "by" label option
*
* ----------------------------------------------------------------------------------------------------*/
void TL_SetByField( TrustLabel *ALabel, char *szBy )
{
if ( ALabel && szBy ) {
NET_SACopy( &ALabel->szBy, szBy );
}
}
#endif /* end of #ifdef TRUST_LABELS */