зеркало из https://github.com/mozilla/pjs.git
572 строки
14 KiB
C
572 строки
14 KiB
C
/*
|
|
* The contents of this file are subject to the Mozilla Public
|
|
* License Version 1.1 (the "License"); you may not use this file
|
|
* except in compliance with the License. You may obtain a copy of
|
|
* the License at http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS
|
|
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
|
* implied. See the License for the specific language governing
|
|
* rights and limitations under the License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is Netscape
|
|
* Communications Corporation. Portions created by Netscape are
|
|
* Copyright (C) 1994-2000 Netscape Communications Corporation. All
|
|
* Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the
|
|
* terms of the GNU General Public License Version 2 or later (the
|
|
* "GPL"), in which case the provisions of the GPL are applicable
|
|
* instead of those above. If you wish to allow use of your
|
|
* version of this file only under the terms of the GPL and not to
|
|
* allow others to use your version of this file under the MPL,
|
|
* indicate your decision by deleting the provisions above and
|
|
* replace them with the notice and other provisions required by
|
|
* the GPL. If you do not delete the provisions above, a recipient
|
|
* may use your version of this file under either the MPL or the
|
|
* GPL.
|
|
*/
|
|
|
|
/*
|
|
* JAREVIL
|
|
*
|
|
* Wrappers to callback in the mozilla thread
|
|
*
|
|
* Certificate code is unsafe when called outside the
|
|
* mozilla thread. These functions push an event on the
|
|
* queue to cause the cert function to run in that thread.
|
|
*
|
|
*/
|
|
|
|
#include "jar.h"
|
|
#include "jarint.h"
|
|
|
|
#include "jarevil.h"
|
|
|
|
/* from libevent.h */
|
|
#ifdef MOZILLA_CLIENT
|
|
typedef void (*ETVoidPtrFunc) (void * data);
|
|
extern void ET_moz_CallFunction (ETVoidPtrFunc fn, void *data);
|
|
|
|
extern void *mozilla_event_queue;
|
|
#endif
|
|
|
|
|
|
/* Special macros facilitate running on Win 16 */
|
|
#if defined(XP_PC) && !defined(_WIN32) /* then we are win 16 */
|
|
|
|
/*
|
|
* Allocate the data passed to the callback functions from the heap...
|
|
*
|
|
* This inter-thread structure cannot reside on a thread stack since the
|
|
* thread's stack is swapped away with the thread under Win16...
|
|
*/
|
|
|
|
#define ALLOC_OR_DEFINE(type, pointer_var_name, out_of_memory_return_value) \
|
|
type * pointer_var_name = PORT_ZAlloc (sizeof(type)); \
|
|
do { \
|
|
if (!pointer_var_name) \
|
|
return (out_of_memory_return_value); \
|
|
} while (0) /* and now a semicolon can follow :-) */
|
|
|
|
#define FREE_IF_ALLOC_IS_USED(pointer_var_name) PORT_Free(pointer_var_name)
|
|
|
|
#else /* not win 16... so we can alloc via auto variables */
|
|
|
|
#define ALLOC_OR_DEFINE(type, pointer_var_name, out_of_memory_return_value) \
|
|
type actual_structure_allocated_in_macro; \
|
|
type * pointer_var_name = &actual_structure_allocated_in_macro; \
|
|
PORT_Memset (pointer_var_name, 0, sizeof (*pointer_var_name)); \
|
|
((void) 0) /* and now a semicolon can follow */
|
|
|
|
#define FREE_IF_ALLOC_IS_USED(pointer_var_name) ((void) 0)
|
|
|
|
#endif /* not Win 16 */
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_encode
|
|
*
|
|
* Call SEC_PKCS7Encode inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_encode
|
|
{
|
|
int error;
|
|
SECStatus status;
|
|
SEC_PKCS7ContentInfo *cinfo;
|
|
SEC_PKCS7EncoderOutputCallback outputfn;
|
|
void *outputarg;
|
|
PK11SymKey *bulkkey;
|
|
SECKEYGetPasswordKey pwfn;
|
|
void *pwfnarg;
|
|
};
|
|
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_encode_fn (void *data)
|
|
{
|
|
SECStatus status;
|
|
struct EVIL_encode *encode_data = (struct EVIL_encode *)data;
|
|
|
|
PORT_SetError (encode_data->error);
|
|
|
|
status = SEC_PKCS7Encode (encode_data->cinfo, encode_data->outputfn,
|
|
encode_data->outputarg, encode_data->bulkkey,
|
|
encode_data->pwfn, encode_data->pwfnarg);
|
|
|
|
encode_data->status = status;
|
|
encode_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
SECStatus jar_moz_encode
|
|
(
|
|
SEC_PKCS7ContentInfo *cinfo,
|
|
SEC_PKCS7EncoderOutputCallback outputfn,
|
|
void *outputarg,
|
|
PK11SymKey *bulkkey,
|
|
SECKEYGetPasswordKey pwfn,
|
|
void *pwfnarg
|
|
)
|
|
{
|
|
SECStatus ret;
|
|
ALLOC_OR_DEFINE(struct EVIL_encode, encode_data, SECFailure);
|
|
|
|
encode_data->error = PORT_GetError();
|
|
encode_data->cinfo = cinfo;
|
|
encode_data->outputfn = outputfn;
|
|
encode_data->outputarg = outputarg;
|
|
encode_data->bulkkey = bulkkey;
|
|
encode_data->pwfn = pwfn;
|
|
encode_data->pwfnarg = pwfnarg;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_encode_fn, encode_data);
|
|
else
|
|
jar_moz_encode_fn (encode_data);
|
|
#else
|
|
jar_moz_encode_fn (encode_data);
|
|
#endif
|
|
|
|
PORT_SetError (encode_data->error);
|
|
ret = encode_data->status;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(encode_data);
|
|
return ret;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_verify
|
|
*
|
|
* Call SEC_PKCS7VerifyDetachedSignature inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_verify
|
|
{
|
|
int error;
|
|
SECStatus status;
|
|
SEC_PKCS7ContentInfo *cinfo;
|
|
SECCertUsage certusage;
|
|
SECItem *detached_digest;
|
|
HASH_HashType digest_type;
|
|
PRBool keepcerts;
|
|
};
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_verify_fn (void *data)
|
|
{
|
|
PRBool result;
|
|
struct EVIL_verify *verify_data = (struct EVIL_verify *)data;
|
|
|
|
PORT_SetError (verify_data->error);
|
|
|
|
result = SEC_PKCS7VerifyDetachedSignature
|
|
(verify_data->cinfo, verify_data->certusage, verify_data->detached_digest,
|
|
verify_data->digest_type, verify_data->keepcerts);
|
|
|
|
|
|
verify_data->status = result==PR_TRUE ? SECSuccess : SECFailure;
|
|
verify_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
SECStatus jar_moz_verify
|
|
(
|
|
SEC_PKCS7ContentInfo *cinfo,
|
|
SECCertUsage certusage,
|
|
SECItem *detached_digest,
|
|
HASH_HashType digest_type,
|
|
PRBool keepcerts
|
|
)
|
|
{
|
|
SECStatus ret;
|
|
ALLOC_OR_DEFINE(struct EVIL_verify, verify_data, SECFailure);
|
|
|
|
verify_data->error = PORT_GetError();
|
|
verify_data->cinfo = cinfo;
|
|
verify_data->certusage = certusage;
|
|
verify_data->detached_digest = detached_digest;
|
|
verify_data->digest_type = digest_type;
|
|
verify_data->keepcerts = keepcerts;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_verify_fn, verify_data);
|
|
else
|
|
jar_moz_verify_fn (verify_data);
|
|
#else
|
|
jar_moz_verify_fn (verify_data);
|
|
#endif
|
|
|
|
PORT_SetError (verify_data->error);
|
|
ret = verify_data->status;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(verify_data);
|
|
return ret;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_nickname
|
|
*
|
|
* Call CERT_FindCertByNickname inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_nickname
|
|
{
|
|
int error;
|
|
CERTCertDBHandle *certdb;
|
|
char *nickname;
|
|
CERTCertificate *cert;
|
|
};
|
|
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_nickname_fn (void *data)
|
|
{
|
|
CERTCertificate *cert;
|
|
struct EVIL_nickname *nickname_data = (struct EVIL_nickname *)data;
|
|
|
|
PORT_SetError (nickname_data->error);
|
|
|
|
cert = CERT_FindCertByNickname (nickname_data->certdb, nickname_data->nickname);
|
|
|
|
nickname_data->cert = cert;
|
|
nickname_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
CERTCertificate *jar_moz_nickname (CERTCertDBHandle *certdb, char *nickname)
|
|
{
|
|
CERTCertificate *cert;
|
|
ALLOC_OR_DEFINE(struct EVIL_nickname, nickname_data, NULL );
|
|
|
|
nickname_data->error = PORT_GetError();
|
|
nickname_data->certdb = certdb;
|
|
nickname_data->nickname = nickname;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_nickname_fn, nickname_data);
|
|
else
|
|
jar_moz_nickname_fn (nickname_data);
|
|
#else
|
|
jar_moz_nickname_fn (nickname_data);
|
|
#endif
|
|
|
|
PORT_SetError (nickname_data->error);
|
|
cert = nickname_data->cert;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(nickname_data);
|
|
return cert;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_perm
|
|
*
|
|
* Call CERT_AddTempCertToPerm inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_perm
|
|
{
|
|
int error;
|
|
SECStatus status;
|
|
CERTCertificate *cert;
|
|
char *nickname;
|
|
CERTCertTrust *trust;
|
|
};
|
|
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_perm_fn (void *data)
|
|
{
|
|
SECStatus status;
|
|
struct EVIL_perm *perm_data = (struct EVIL_perm *)data;
|
|
|
|
PORT_SetError (perm_data->error);
|
|
|
|
status = CERT_AddTempCertToPerm (perm_data->cert, perm_data->nickname, perm_data->trust);
|
|
|
|
perm_data->status = status;
|
|
perm_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
SECStatus jar_moz_perm
|
|
(CERTCertificate *cert, char *nickname, CERTCertTrust *trust)
|
|
{
|
|
SECStatus ret;
|
|
ALLOC_OR_DEFINE(struct EVIL_perm, perm_data, SECFailure);
|
|
|
|
perm_data->error = PORT_GetError();
|
|
perm_data->cert = cert;
|
|
perm_data->nickname = nickname;
|
|
perm_data->trust = trust;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_perm_fn, perm_data);
|
|
else
|
|
jar_moz_perm_fn (perm_data);
|
|
#else
|
|
jar_moz_perm_fn (perm_data);
|
|
#endif
|
|
|
|
PORT_SetError (perm_data->error);
|
|
ret = perm_data->status;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(perm_data);
|
|
return ret;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_certkey
|
|
*
|
|
* Call CERT_FindCertByKey inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_certkey
|
|
{
|
|
int error;
|
|
CERTCertificate *cert;
|
|
CERTCertDBHandle *certdb;
|
|
SECItem *seckey;
|
|
};
|
|
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_certkey_fn (void *data)
|
|
{
|
|
CERTCertificate *cert;
|
|
struct EVIL_certkey *certkey_data = (struct EVIL_certkey *)data;
|
|
|
|
PORT_SetError (certkey_data->error);
|
|
|
|
cert = CERT_FindCertByKey (certkey_data->certdb, certkey_data->seckey);
|
|
|
|
certkey_data->cert = cert;
|
|
certkey_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
CERTCertificate *jar_moz_certkey (CERTCertDBHandle *certdb, SECItem *seckey)
|
|
{
|
|
CERTCertificate *cert;
|
|
ALLOC_OR_DEFINE(struct EVIL_certkey, certkey_data, NULL);
|
|
|
|
certkey_data->error = PORT_GetError();
|
|
certkey_data->certdb = certdb;
|
|
certkey_data->seckey = seckey;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_certkey_fn, certkey_data);
|
|
else
|
|
jar_moz_certkey_fn (certkey_data);
|
|
#else
|
|
jar_moz_certkey_fn (certkey_data);
|
|
#endif
|
|
|
|
PORT_SetError (certkey_data->error);
|
|
cert = certkey_data->cert;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(certkey_data);
|
|
return cert;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_issuer
|
|
*
|
|
* Call CERT_FindCertIssuer inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_issuer
|
|
{
|
|
int error;
|
|
CERTCertificate *cert;
|
|
CERTCertificate *issuer;
|
|
};
|
|
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_issuer_fn (void *data)
|
|
{
|
|
CERTCertificate *issuer;
|
|
struct EVIL_issuer *issuer_data = (struct EVIL_issuer *)data;
|
|
|
|
PORT_SetError (issuer_data->error);
|
|
|
|
issuer = CERT_FindCertIssuer (issuer_data->cert, PR_Now(),
|
|
certUsageObjectSigner);
|
|
|
|
issuer_data->issuer = issuer;
|
|
issuer_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
CERTCertificate *jar_moz_issuer (CERTCertificate *cert)
|
|
{
|
|
CERTCertificate *issuer_cert;
|
|
ALLOC_OR_DEFINE(struct EVIL_issuer, issuer_data, NULL);
|
|
|
|
issuer_data->error = PORT_GetError();
|
|
issuer_data->cert = cert;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_issuer_fn, issuer_data);
|
|
else
|
|
jar_moz_issuer_fn (issuer_data);
|
|
#else
|
|
jar_moz_issuer_fn (issuer_data);
|
|
#endif
|
|
|
|
PORT_SetError (issuer_data->error);
|
|
issuer_cert = issuer_data->issuer;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(issuer_data);
|
|
return issuer_cert;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|
|
|
|
/*
|
|
* JAR_MOZ_dup
|
|
*
|
|
* Call CERT_DupCertificate inside
|
|
* the mozilla thread
|
|
*
|
|
*/
|
|
|
|
struct EVIL_dup
|
|
{
|
|
int error;
|
|
CERTCertificate *cert;
|
|
CERTCertificate *return_cert;
|
|
};
|
|
|
|
|
|
/* This is called inside the mozilla thread */
|
|
|
|
PR_STATIC_CALLBACK(void) jar_moz_dup_fn (void *data)
|
|
{
|
|
CERTCertificate *return_cert;
|
|
struct EVIL_dup *dup_data = (struct EVIL_dup *)data;
|
|
|
|
PORT_SetError (dup_data->error);
|
|
|
|
return_cert = CERT_DupCertificate (dup_data->cert);
|
|
|
|
dup_data->return_cert = return_cert;
|
|
dup_data->error = PORT_GetError();
|
|
}
|
|
|
|
|
|
/* Wrapper for the ET_MOZ call */
|
|
|
|
CERTCertificate *jar_moz_dup (CERTCertificate *cert)
|
|
{
|
|
CERTCertificate *dup_cert;
|
|
ALLOC_OR_DEFINE(struct EVIL_dup, dup_data, NULL);
|
|
|
|
dup_data->error = PORT_GetError();
|
|
dup_data->cert = cert;
|
|
|
|
/* Synchronously invoke the callback function on the mozilla thread. */
|
|
#ifdef MOZILLA_CLIENT
|
|
if (mozilla_event_queue)
|
|
ET_moz_CallFunction (jar_moz_dup_fn, dup_data);
|
|
else
|
|
jar_moz_dup_fn (dup_data);
|
|
#else
|
|
jar_moz_dup_fn (dup_data);
|
|
#endif
|
|
|
|
PORT_SetError (dup_data->error);
|
|
dup_cert = dup_data->return_cert;
|
|
|
|
/* Free the data passed to the callback function... */
|
|
FREE_IF_ALLOC_IS_USED(dup_data);
|
|
return dup_cert;
|
|
}
|
|
|
|
/* --- --- --- --- --- --- --- --- --- --- --- --- --- */
|