aboutsummaryrefslogtreecommitdiffstats
path: root/smime/lib/e-cert.c
diff options
context:
space:
mode:
Diffstat (limited to 'smime/lib/e-cert.c')
-rw-r--r--smime/lib/e-cert.c542
1 files changed, 542 insertions, 0 deletions
diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c
new file mode 100644
index 0000000000..969b43c9ed
--- /dev/null
+++ b/smime/lib/e-cert.c
@@ -0,0 +1,542 @@
+/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
+/* The following is the mozilla license blurb, as the bodies some of
+ * these functions were derived from the mozilla source. */
+/*
+ * Version: MPL 1.1/GPL 2.0/LGPL 2.1
+ *
+ * The contents of this file are subject to the Mozilla Public License Version
+ * 1.1 (the "License"); you may not use this file except in compliance with
+ * the License. You may obtain a copy of the License at
+ * http://www.mozilla.org/MPL/
+ *
+ * Software distributed under the License is distributed on an "AS IS" basis,
+ * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
+ * for the specific language governing rights and limitations under the
+ * License.
+ *
+ * The Original Code is the Netscape security libraries.
+ *
+ * The Initial Developer of the Original Code is
+ * Netscape Communications Corporation.
+ * Portions created by the Initial Developer are Copyright (C) 1994-2000
+ * the Initial Developer. All Rights Reserved.
+ *
+ * Alternatively, the contents of this file may be used under the terms of
+ * either the GNU General Public License Version 2 or later (the "GPL"), or
+ * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
+ * in which case the provisions of the GPL or the LGPL are applicable instead
+ * of those above. If you wish to allow use of your version of this file only
+ * under the terms of either the GPL or the LGPL, and not to allow others to
+ * use your version of this file under the terms of the MPL, indicate your
+ * decision by deleting the provisions above and replace them with the notice
+ * and other provisions required by the GPL or the LGPL. If you do not delete
+ * the provisions above, a recipient may use your version of this file under
+ * the terms of any one of the MPL, the GPL or the LGPL.
+ */
+
+/*
+ * Author: Chris Toshok (toshok@ximian.com)
+ *
+ * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com)
+ */
+#ifdef HAVE_CONFIG_H
+#include <config.h>
+#endif
+
+#include <time.h>
+
+#include <glib/gi18n.h>
+
+/* for e_utf8_strftime, what about e_time_format_time? */
+#include <e-util/e-util.h>
+
+#include "e-cert.h"
+#include "e-cert-trust.h"
+#include "pk11func.h"
+#include "certdb.h"
+#include "hasht.h"
+
+#define E_CERT_GET_PRIVATE(obj) \
+ (G_TYPE_INSTANCE_GET_PRIVATE \
+ ((obj), E_TYPE_CERT, ECertPrivate))
+
+struct _ECertPrivate {
+ CERTCertificate *cert;
+
+ /* pointers we cache since the nss implementation allocs the
+ * string */
+ gchar *org_name;
+ gchar *org_unit_name;
+ gchar *cn;
+
+ gchar *issuer_org_name;
+ gchar *issuer_org_unit_name;
+ gchar *issuer_cn;
+
+ PRTime issued_on;
+ PRTime expires_on;
+
+ gchar *issued_on_string;
+ gchar *expires_on_string;
+
+ gchar *serial_number;
+
+ gchar *usage_string;
+
+ gchar *sha1_fingerprint;
+ gchar *md5_fingerprint;
+
+ EASN1Object *asn1;
+
+ gboolean delete;
+};
+
+G_DEFINE_TYPE (ECert, e_cert, G_TYPE_OBJECT)
+
+static void
+e_cert_finalize (GObject *object)
+{
+ ECertPrivate *priv;
+
+ priv = E_CERT_GET_PRIVATE (object);
+
+ if (priv->org_name)
+ PORT_Free (priv->org_name);
+ if (priv->org_unit_name)
+ PORT_Free (priv->org_unit_name);
+ if (priv->cn)
+ PORT_Free (priv->cn);
+
+ if (priv->issuer_org_name)
+ PORT_Free (priv->issuer_org_name);
+ if (priv->issuer_org_unit_name)
+ PORT_Free (priv->issuer_org_unit_name);
+ if (priv->issuer_cn)
+ PORT_Free (priv->issuer_cn);
+
+ if (priv->issued_on_string)
+ PORT_Free (priv->issued_on_string);
+ if (priv->expires_on_string)
+ PORT_Free (priv->expires_on_string);
+ if (priv->serial_number)
+ PORT_Free (priv->serial_number);
+
+ g_free (priv->usage_string);
+
+ if (priv->sha1_fingerprint)
+ PORT_Free (priv->sha1_fingerprint);
+ if (priv->md5_fingerprint)
+ PORT_Free (priv->md5_fingerprint);
+
+ if (priv->asn1)
+ g_object_unref (priv->asn1);
+
+ if (priv->delete) {
+ printf ("attempting to delete cert marked for deletion\n");
+ if (e_cert_get_cert_type (E_CERT (object)) == E_CERT_USER) {
+ PK11_DeleteTokenCertAndKey (priv->cert, NULL);
+ } else if (!PK11_IsReadOnly (priv->cert->slot)) {
+ /* If the list of built-ins does contain a non-removable
+ * copy of this certificate, our call will not remove
+ * the certificate permanently, but rather remove all trust. */
+ SEC_DeletePermCertificate (priv->cert);
+ }
+ }
+
+ if (priv->cert)
+ CERT_DestroyCertificate (priv->cert);
+
+ /* Chain up to parent's finalize() method. */
+ G_OBJECT_CLASS (e_cert_parent_class)->finalize (object);
+}
+
+static void
+e_cert_class_init (ECertClass *class)
+{
+ GObjectClass *object_class;
+
+ g_type_class_add_private (class, sizeof (ECertPrivate));
+
+ object_class = G_OBJECT_CLASS (class);
+ object_class->finalize = e_cert_finalize;
+}
+
+static void
+e_cert_init (ECert *ec)
+{
+ ec->priv = E_CERT_GET_PRIVATE (ec);
+}
+
+static void
+e_cert_populate (ECert *cert)
+{
+ CERTCertificate *c = cert->priv->cert;
+ guchar fingerprint[20];
+ SECItem fpItem;
+
+ cert->priv->org_name = CERT_GetOrgName (&c->subject);
+ cert->priv->org_unit_name = CERT_GetOrgUnitName (&c->subject);
+
+ cert->priv->issuer_org_name = CERT_GetOrgName (&c->issuer);
+ cert->priv->issuer_org_unit_name = CERT_GetOrgUnitName (&c->issuer);
+
+ cert->priv->cn = CERT_GetCommonName (&c->subject);
+ cert->priv->issuer_cn = CERT_GetCommonName (&c->issuer);
+
+ if (SECSuccess == CERT_GetCertTimes (
+ c, &cert->priv->issued_on, &cert->priv->expires_on)) {
+ PRExplodedTime explodedTime;
+ struct tm exploded_tm;
+ gchar buf[32];
+
+ PR_ExplodeTime (
+ cert->priv->issued_on,
+ PR_LocalTimeParameters, &explodedTime);
+ exploded_tm.tm_sec = explodedTime.tm_sec;
+ exploded_tm.tm_min = explodedTime.tm_min;
+ exploded_tm.tm_hour = explodedTime.tm_hour;
+ exploded_tm.tm_mday = explodedTime.tm_mday;
+ exploded_tm.tm_mon = explodedTime.tm_month;
+ exploded_tm.tm_year = explodedTime.tm_year - 1900;
+ e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm);
+ cert->priv->issued_on_string = g_strdup (buf);
+
+ PR_ExplodeTime (
+ cert->priv->expires_on,
+ PR_LocalTimeParameters, &explodedTime);
+ exploded_tm.tm_sec = explodedTime.tm_sec;
+ exploded_tm.tm_min = explodedTime.tm_min;
+ exploded_tm.tm_hour = explodedTime.tm_hour;
+ exploded_tm.tm_mday = explodedTime.tm_mday;
+ exploded_tm.tm_mon = explodedTime.tm_month;
+ exploded_tm.tm_year = explodedTime.tm_year - 1900;
+ e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm);
+ cert->priv->expires_on_string = g_strdup (buf);
+ }
+
+ cert->priv->serial_number = CERT_Hexify (&cert->priv->cert->serialNumber, TRUE);
+
+ memset (fingerprint, 0, sizeof fingerprint);
+ PK11_HashBuf (
+ SEC_OID_SHA1, fingerprint,
+ cert->priv->cert->derCert.data,
+ cert->priv->cert->derCert.len);
+ fpItem.data = fingerprint;
+ fpItem.len = SHA1_LENGTH;
+ cert->priv->sha1_fingerprint = CERT_Hexify (&fpItem, TRUE);
+
+ memset (fingerprint, 0, sizeof fingerprint);
+ PK11_HashBuf (
+ SEC_OID_MD5, fingerprint,
+ cert->priv->cert->derCert.data,
+ cert->priv->cert->derCert.len);
+ fpItem.data = fingerprint;
+ fpItem.len = MD5_LENGTH;
+ cert->priv->md5_fingerprint = CERT_Hexify (&fpItem, TRUE);
+}
+
+ECert *
+e_cert_new (CERTCertificate *cert)
+{
+ ECert *ecert = E_CERT (g_object_new (E_TYPE_CERT, NULL));
+
+ /* ECert owns a reference to the 'cert', which will be freed on ECert finalize */
+ ecert->priv->cert = cert;
+
+ e_cert_populate (ecert);
+
+ return ecert;
+}
+
+ECert *
+e_cert_new_from_der (gchar *data,
+ guint32 len)
+{
+ CERTCertificate *cert = CERT_DecodeCertFromPackage (data, len);
+
+ if (!cert)
+ return NULL;
+
+ if (cert->dbhandle == NULL)
+ cert->dbhandle = CERT_GetDefaultCertDB ();
+
+ return e_cert_new (cert);
+}
+
+CERTCertificate *
+e_cert_get_internal_cert (ECert *cert)
+{
+ /* XXX should this refcnt it? */
+ return cert->priv->cert;
+}
+
+gboolean
+e_cert_get_raw_der (ECert *cert,
+ gchar **data,
+ guint32 *len)
+{
+ /* XXX do we really need to check if cert->priv->cert is NULL
+ * here? it should always be non - null if we have the
+ * ECert.. */
+ if (cert->priv->cert) {
+ *data = (gchar *)cert->priv->cert->derCert.data;
+ *len = (guint32)cert->priv->cert->derCert.len;
+ return TRUE;
+ }
+
+ *len = 0;
+ return FALSE;
+
+}
+
+const gchar *
+e_cert_get_window_title (ECert *cert)
+{
+ if (cert->priv->cert->nickname)
+ return cert->priv->cert->nickname;
+ else if (cert->priv->cn)
+ return cert->priv->cn;
+ else
+ return cert->priv->cert->subjectName;
+}
+
+const gchar *
+e_cert_get_nickname (ECert *cert)
+{
+ return cert->priv->cert->nickname;
+}
+
+const gchar *
+e_cert_get_email (ECert *cert)
+{
+ return cert->priv->cert->emailAddr;
+}
+
+const gchar *
+e_cert_get_org (ECert *cert)
+{
+ return cert->priv->org_name;
+}
+
+const gchar *
+e_cert_get_org_unit (ECert *cert)
+{
+ return cert->priv->org_unit_name;
+}
+
+const gchar *
+e_cert_get_cn (ECert *cert)
+{
+ return cert->priv->cn;
+}
+
+const gchar *
+e_cert_get_issuer_name (ECert *cert)
+{
+ return cert->priv->cert->issuerName;
+}
+
+const gchar *
+e_cert_get_issuer_cn (ECert *cert)
+{
+ return cert->priv->issuer_cn;
+}
+
+const gchar *
+e_cert_get_issuer_org (ECert *cert)
+{
+ return cert->priv->issuer_org_name;
+}
+
+const gchar *
+e_cert_get_issuer_org_unit (ECert *cert)
+{
+ return cert->priv->issuer_org_unit_name;
+}
+
+const gchar *
+e_cert_get_subject_name (ECert *cert)
+{
+ return cert->priv->cert->subjectName;
+}
+
+PRTime
+e_cert_get_issued_on_time (ECert *cert)
+{
+ return cert->priv->issued_on;
+}
+
+const gchar *
+e_cert_get_issued_on (ECert *cert)
+{
+ return cert->priv->issued_on_string;
+}
+
+PRTime
+e_cert_get_expires_on_time (ECert *cert)
+{
+ return cert->priv->expires_on;
+}
+
+const gchar *
+e_cert_get_expires_on (ECert *cert)
+{
+ return cert->priv->expires_on_string;
+}
+
+static struct {
+ gint bit;
+ const gchar *text;
+} usageinfo[] = {
+ /* x509 certificate usage types */
+ { certificateUsageEmailSigner, N_("Sign") },
+ { certificateUsageEmailRecipient, N_("Encrypt") },
+};
+
+const gchar *
+e_cert_get_usage (ECert *cert)
+{
+ if (cert->priv->usage_string == NULL) {
+ gint i;
+ GString *str = g_string_new ("");
+ CERTCertificate *icert = e_cert_get_internal_cert (cert);
+
+ for (i = 0; i < G_N_ELEMENTS (usageinfo); i++) {
+ if (icert->keyUsage & usageinfo[i].bit) {
+ if (str->len != 0)
+ g_string_append (str, ", ");
+ g_string_append (str, _(usageinfo[i].text));
+ }
+ }
+
+ cert->priv->usage_string = str->str;
+ g_string_free (str, FALSE);
+ }
+
+ return cert->priv->usage_string;
+}
+
+const gchar *
+e_cert_get_serial_number (ECert *cert)
+{
+ return cert->priv->serial_number;
+}
+
+const gchar *
+e_cert_get_sha1_fingerprint (ECert *cert)
+{
+ return cert->priv->sha1_fingerprint;
+}
+
+const gchar *
+e_cert_get_md5_fingerprint (ECert *cert)
+{
+ return cert->priv->md5_fingerprint;
+}
+
+GList *
+e_cert_get_issuers_chain (ECert *ecert)
+{
+ GList *issuers = NULL;
+
+ while (ecert) {
+ CERTCertificate *cert = e_cert_get_internal_cert (ecert);
+ CERTCertificate *next_cert;
+
+ if (SECITEM_CompareItem (&cert->derIssuer, &cert->derSubject) == SECEqual)
+ break;
+
+ next_cert = CERT_FindCertIssuer (cert, PR_Now (), certUsageSSLClient);
+ if (!next_cert)
+ break;
+
+ /* next_cert has a reference already */
+ ecert = e_cert_new (next_cert);
+
+ if (ecert) {
+ /* the first is issuer of the original ecert */
+ issuers = g_list_append (issuers, ecert);
+ }
+ }
+
+ return issuers;
+}
+
+ECert *
+e_cert_get_ca_cert (ECert *ecert)
+{
+ CERTCertificate *cert, *next = e_cert_get_internal_cert (ecert), *internal;
+
+ cert = next;
+ internal = cert;
+ do {
+ if (cert != next && cert != internal)
+ CERT_DestroyCertificate (cert);
+
+ cert = next;
+ next = CERT_FindCertIssuer (cert, PR_Now (), certUsageAnyCA);
+ } while (next && next != cert);
+
+ if (cert == internal)
+ return g_object_ref (ecert);
+ else
+ return e_cert_new (cert);
+}
+
+EASN1Object *
+e_cert_get_asn1_struct (ECert *cert)
+{
+ if (!cert->priv->asn1)
+ cert->priv->asn1 = e_asn1_object_new_from_cert (cert->priv->cert);
+
+ if (cert->priv->asn1)
+ return g_object_ref (cert->priv->asn1);
+
+ return NULL;
+}
+
+gboolean
+e_cert_mark_for_deletion (ECert *cert)
+{
+ /* nsNSSShutDownPreventionLock locker; */
+
+#if 0
+ /* make sure user is logged in to the token */
+ nsCOMPtr < nsIInterfaceRequestor> ctx = new PipUIContext ();
+#endif
+
+ if (PK11_NeedLogin (cert->priv->cert->slot)
+ && !PK11_NeedUserInit (cert->priv->cert->slot)
+ && !PK11_IsInternal (cert->priv->cert->slot)) {
+ if (PK11_Authenticate (
+ cert->priv->cert->slot, PR_TRUE, NULL) != SECSuccess) {
+ return FALSE;
+ }
+ }
+
+ cert->priv->delete = TRUE;
+
+ return TRUE;
+}
+
+ECertType
+e_cert_get_cert_type (ECert *ecert)
+{
+ const gchar *nick = e_cert_get_nickname (ecert);
+ const gchar *email = e_cert_get_email (ecert);
+ CERTCertificate *cert = ecert->priv->cert;
+
+ if (nick) {
+ if (e_cert_trust_has_any_user (cert->trust))
+ return E_CERT_USER;
+ if (e_cert_trust_has_any_ca (cert->trust)
+ || CERT_IsCACert (cert,NULL))
+ return E_CERT_CA;
+ if (e_cert_trust_has_peer (cert->trust, PR_TRUE, PR_FALSE, PR_FALSE))
+ return E_CERT_SITE;
+ }
+ if (email && e_cert_trust_has_peer (cert->trust, PR_FALSE, PR_TRUE, PR_FALSE))
+ return E_CERT_CONTACT;
+
+ return E_CERT_UNKNOWN;
+}