diff options
Diffstat (limited to 'smime/lib/e-cert.c')
-rw-r--r-- | smime/lib/e-cert.c | 542 |
1 files changed, 542 insertions, 0 deletions
diff --git a/smime/lib/e-cert.c b/smime/lib/e-cert.c new file mode 100644 index 0000000000..969b43c9ed --- /dev/null +++ b/smime/lib/e-cert.c @@ -0,0 +1,542 @@ +/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */ +/* The following is the mozilla license blurb, as the bodies some of + * these functions were derived from the mozilla source. */ +/* + * Version: MPL 1.1/GPL 2.0/LGPL 2.1 + * + * The contents of this file are subject to the Mozilla Public License Version + * 1.1 (the "License"); you may not use this file except in compliance with + * the License. You may obtain a copy of the License at + * http://www.mozilla.org/MPL/ + * + * Software distributed under the License is distributed on an "AS IS" basis, + * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License + * for the specific language governing rights and limitations under the + * License. + * + * The Original Code is the Netscape security libraries. + * + * The Initial Developer of the Original Code is + * Netscape Communications Corporation. + * Portions created by the Initial Developer are Copyright (C) 1994-2000 + * the Initial Developer. All Rights Reserved. + * + * Alternatively, the contents of this file may be used under the terms of + * either the GNU General Public License Version 2 or later (the "GPL"), or + * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), + * in which case the provisions of the GPL or the LGPL are applicable instead + * of those above. If you wish to allow use of your version of this file only + * under the terms of either the GPL or the LGPL, and not to allow others to + * use your version of this file under the terms of the MPL, indicate your + * decision by deleting the provisions above and replace them with the notice + * and other provisions required by the GPL or the LGPL. If you do not delete + * the provisions above, a recipient may use your version of this file under + * the terms of any one of the MPL, the GPL or the LGPL. + */ + +/* + * Author: Chris Toshok (toshok@ximian.com) + * + * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com) + */ +#ifdef HAVE_CONFIG_H +#include <config.h> +#endif + +#include <time.h> + +#include <glib/gi18n.h> + +/* for e_utf8_strftime, what about e_time_format_time? */ +#include <e-util/e-util.h> + +#include "e-cert.h" +#include "e-cert-trust.h" +#include "pk11func.h" +#include "certdb.h" +#include "hasht.h" + +#define E_CERT_GET_PRIVATE(obj) \ + (G_TYPE_INSTANCE_GET_PRIVATE \ + ((obj), E_TYPE_CERT, ECertPrivate)) + +struct _ECertPrivate { + CERTCertificate *cert; + + /* pointers we cache since the nss implementation allocs the + * string */ + gchar *org_name; + gchar *org_unit_name; + gchar *cn; + + gchar *issuer_org_name; + gchar *issuer_org_unit_name; + gchar *issuer_cn; + + PRTime issued_on; + PRTime expires_on; + + gchar *issued_on_string; + gchar *expires_on_string; + + gchar *serial_number; + + gchar *usage_string; + + gchar *sha1_fingerprint; + gchar *md5_fingerprint; + + EASN1Object *asn1; + + gboolean delete; +}; + +G_DEFINE_TYPE (ECert, e_cert, G_TYPE_OBJECT) + +static void +e_cert_finalize (GObject *object) +{ + ECertPrivate *priv; + + priv = E_CERT_GET_PRIVATE (object); + + if (priv->org_name) + PORT_Free (priv->org_name); + if (priv->org_unit_name) + PORT_Free (priv->org_unit_name); + if (priv->cn) + PORT_Free (priv->cn); + + if (priv->issuer_org_name) + PORT_Free (priv->issuer_org_name); + if (priv->issuer_org_unit_name) + PORT_Free (priv->issuer_org_unit_name); + if (priv->issuer_cn) + PORT_Free (priv->issuer_cn); + + if (priv->issued_on_string) + PORT_Free (priv->issued_on_string); + if (priv->expires_on_string) + PORT_Free (priv->expires_on_string); + if (priv->serial_number) + PORT_Free (priv->serial_number); + + g_free (priv->usage_string); + + if (priv->sha1_fingerprint) + PORT_Free (priv->sha1_fingerprint); + if (priv->md5_fingerprint) + PORT_Free (priv->md5_fingerprint); + + if (priv->asn1) + g_object_unref (priv->asn1); + + if (priv->delete) { + printf ("attempting to delete cert marked for deletion\n"); + if (e_cert_get_cert_type (E_CERT (object)) == E_CERT_USER) { + PK11_DeleteTokenCertAndKey (priv->cert, NULL); + } else if (!PK11_IsReadOnly (priv->cert->slot)) { + /* If the list of built-ins does contain a non-removable + * copy of this certificate, our call will not remove + * the certificate permanently, but rather remove all trust. */ + SEC_DeletePermCertificate (priv->cert); + } + } + + if (priv->cert) + CERT_DestroyCertificate (priv->cert); + + /* Chain up to parent's finalize() method. */ + G_OBJECT_CLASS (e_cert_parent_class)->finalize (object); +} + +static void +e_cert_class_init (ECertClass *class) +{ + GObjectClass *object_class; + + g_type_class_add_private (class, sizeof (ECertPrivate)); + + object_class = G_OBJECT_CLASS (class); + object_class->finalize = e_cert_finalize; +} + +static void +e_cert_init (ECert *ec) +{ + ec->priv = E_CERT_GET_PRIVATE (ec); +} + +static void +e_cert_populate (ECert *cert) +{ + CERTCertificate *c = cert->priv->cert; + guchar fingerprint[20]; + SECItem fpItem; + + cert->priv->org_name = CERT_GetOrgName (&c->subject); + cert->priv->org_unit_name = CERT_GetOrgUnitName (&c->subject); + + cert->priv->issuer_org_name = CERT_GetOrgName (&c->issuer); + cert->priv->issuer_org_unit_name = CERT_GetOrgUnitName (&c->issuer); + + cert->priv->cn = CERT_GetCommonName (&c->subject); + cert->priv->issuer_cn = CERT_GetCommonName (&c->issuer); + + if (SECSuccess == CERT_GetCertTimes ( + c, &cert->priv->issued_on, &cert->priv->expires_on)) { + PRExplodedTime explodedTime; + struct tm exploded_tm; + gchar buf[32]; + + PR_ExplodeTime ( + cert->priv->issued_on, + PR_LocalTimeParameters, &explodedTime); + exploded_tm.tm_sec = explodedTime.tm_sec; + exploded_tm.tm_min = explodedTime.tm_min; + exploded_tm.tm_hour = explodedTime.tm_hour; + exploded_tm.tm_mday = explodedTime.tm_mday; + exploded_tm.tm_mon = explodedTime.tm_month; + exploded_tm.tm_year = explodedTime.tm_year - 1900; + e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm); + cert->priv->issued_on_string = g_strdup (buf); + + PR_ExplodeTime ( + cert->priv->expires_on, + PR_LocalTimeParameters, &explodedTime); + exploded_tm.tm_sec = explodedTime.tm_sec; + exploded_tm.tm_min = explodedTime.tm_min; + exploded_tm.tm_hour = explodedTime.tm_hour; + exploded_tm.tm_mday = explodedTime.tm_mday; + exploded_tm.tm_mon = explodedTime.tm_month; + exploded_tm.tm_year = explodedTime.tm_year - 1900; + e_utf8_strftime (buf, sizeof (buf), _("%d/%m/%Y"), &exploded_tm); + cert->priv->expires_on_string = g_strdup (buf); + } + + cert->priv->serial_number = CERT_Hexify (&cert->priv->cert->serialNumber, TRUE); + + memset (fingerprint, 0, sizeof fingerprint); + PK11_HashBuf ( + SEC_OID_SHA1, fingerprint, + cert->priv->cert->derCert.data, + cert->priv->cert->derCert.len); + fpItem.data = fingerprint; + fpItem.len = SHA1_LENGTH; + cert->priv->sha1_fingerprint = CERT_Hexify (&fpItem, TRUE); + + memset (fingerprint, 0, sizeof fingerprint); + PK11_HashBuf ( + SEC_OID_MD5, fingerprint, + cert->priv->cert->derCert.data, + cert->priv->cert->derCert.len); + fpItem.data = fingerprint; + fpItem.len = MD5_LENGTH; + cert->priv->md5_fingerprint = CERT_Hexify (&fpItem, TRUE); +} + +ECert * +e_cert_new (CERTCertificate *cert) +{ + ECert *ecert = E_CERT (g_object_new (E_TYPE_CERT, NULL)); + + /* ECert owns a reference to the 'cert', which will be freed on ECert finalize */ + ecert->priv->cert = cert; + + e_cert_populate (ecert); + + return ecert; +} + +ECert * +e_cert_new_from_der (gchar *data, + guint32 len) +{ + CERTCertificate *cert = CERT_DecodeCertFromPackage (data, len); + + if (!cert) + return NULL; + + if (cert->dbhandle == NULL) + cert->dbhandle = CERT_GetDefaultCertDB (); + + return e_cert_new (cert); +} + +CERTCertificate * +e_cert_get_internal_cert (ECert *cert) +{ + /* XXX should this refcnt it? */ + return cert->priv->cert; +} + +gboolean +e_cert_get_raw_der (ECert *cert, + gchar **data, + guint32 *len) +{ + /* XXX do we really need to check if cert->priv->cert is NULL + * here? it should always be non - null if we have the + * ECert.. */ + if (cert->priv->cert) { + *data = (gchar *)cert->priv->cert->derCert.data; + *len = (guint32)cert->priv->cert->derCert.len; + return TRUE; + } + + *len = 0; + return FALSE; + +} + +const gchar * +e_cert_get_window_title (ECert *cert) +{ + if (cert->priv->cert->nickname) + return cert->priv->cert->nickname; + else if (cert->priv->cn) + return cert->priv->cn; + else + return cert->priv->cert->subjectName; +} + +const gchar * +e_cert_get_nickname (ECert *cert) +{ + return cert->priv->cert->nickname; +} + +const gchar * +e_cert_get_email (ECert *cert) +{ + return cert->priv->cert->emailAddr; +} + +const gchar * +e_cert_get_org (ECert *cert) +{ + return cert->priv->org_name; +} + +const gchar * +e_cert_get_org_unit (ECert *cert) +{ + return cert->priv->org_unit_name; +} + +const gchar * +e_cert_get_cn (ECert *cert) +{ + return cert->priv->cn; +} + +const gchar * +e_cert_get_issuer_name (ECert *cert) +{ + return cert->priv->cert->issuerName; +} + +const gchar * +e_cert_get_issuer_cn (ECert *cert) +{ + return cert->priv->issuer_cn; +} + +const gchar * +e_cert_get_issuer_org (ECert *cert) +{ + return cert->priv->issuer_org_name; +} + +const gchar * +e_cert_get_issuer_org_unit (ECert *cert) +{ + return cert->priv->issuer_org_unit_name; +} + +const gchar * +e_cert_get_subject_name (ECert *cert) +{ + return cert->priv->cert->subjectName; +} + +PRTime +e_cert_get_issued_on_time (ECert *cert) +{ + return cert->priv->issued_on; +} + +const gchar * +e_cert_get_issued_on (ECert *cert) +{ + return cert->priv->issued_on_string; +} + +PRTime +e_cert_get_expires_on_time (ECert *cert) +{ + return cert->priv->expires_on; +} + +const gchar * +e_cert_get_expires_on (ECert *cert) +{ + return cert->priv->expires_on_string; +} + +static struct { + gint bit; + const gchar *text; +} usageinfo[] = { + /* x509 certificate usage types */ + { certificateUsageEmailSigner, N_("Sign") }, + { certificateUsageEmailRecipient, N_("Encrypt") }, +}; + +const gchar * +e_cert_get_usage (ECert *cert) +{ + if (cert->priv->usage_string == NULL) { + gint i; + GString *str = g_string_new (""); + CERTCertificate *icert = e_cert_get_internal_cert (cert); + + for (i = 0; i < G_N_ELEMENTS (usageinfo); i++) { + if (icert->keyUsage & usageinfo[i].bit) { + if (str->len != 0) + g_string_append (str, ", "); + g_string_append (str, _(usageinfo[i].text)); + } + } + + cert->priv->usage_string = str->str; + g_string_free (str, FALSE); + } + + return cert->priv->usage_string; +} + +const gchar * +e_cert_get_serial_number (ECert *cert) +{ + return cert->priv->serial_number; +} + +const gchar * +e_cert_get_sha1_fingerprint (ECert *cert) +{ + return cert->priv->sha1_fingerprint; +} + +const gchar * +e_cert_get_md5_fingerprint (ECert *cert) +{ + return cert->priv->md5_fingerprint; +} + +GList * +e_cert_get_issuers_chain (ECert *ecert) +{ + GList *issuers = NULL; + + while (ecert) { + CERTCertificate *cert = e_cert_get_internal_cert (ecert); + CERTCertificate *next_cert; + + if (SECITEM_CompareItem (&cert->derIssuer, &cert->derSubject) == SECEqual) + break; + + next_cert = CERT_FindCertIssuer (cert, PR_Now (), certUsageSSLClient); + if (!next_cert) + break; + + /* next_cert has a reference already */ + ecert = e_cert_new (next_cert); + + if (ecert) { + /* the first is issuer of the original ecert */ + issuers = g_list_append (issuers, ecert); + } + } + + return issuers; +} + +ECert * +e_cert_get_ca_cert (ECert *ecert) +{ + CERTCertificate *cert, *next = e_cert_get_internal_cert (ecert), *internal; + + cert = next; + internal = cert; + do { + if (cert != next && cert != internal) + CERT_DestroyCertificate (cert); + + cert = next; + next = CERT_FindCertIssuer (cert, PR_Now (), certUsageAnyCA); + } while (next && next != cert); + + if (cert == internal) + return g_object_ref (ecert); + else + return e_cert_new (cert); +} + +EASN1Object * +e_cert_get_asn1_struct (ECert *cert) +{ + if (!cert->priv->asn1) + cert->priv->asn1 = e_asn1_object_new_from_cert (cert->priv->cert); + + if (cert->priv->asn1) + return g_object_ref (cert->priv->asn1); + + return NULL; +} + +gboolean +e_cert_mark_for_deletion (ECert *cert) +{ + /* nsNSSShutDownPreventionLock locker; */ + +#if 0 + /* make sure user is logged in to the token */ + nsCOMPtr < nsIInterfaceRequestor> ctx = new PipUIContext (); +#endif + + if (PK11_NeedLogin (cert->priv->cert->slot) + && !PK11_NeedUserInit (cert->priv->cert->slot) + && !PK11_IsInternal (cert->priv->cert->slot)) { + if (PK11_Authenticate ( + cert->priv->cert->slot, PR_TRUE, NULL) != SECSuccess) { + return FALSE; + } + } + + cert->priv->delete = TRUE; + + return TRUE; +} + +ECertType +e_cert_get_cert_type (ECert *ecert) +{ + const gchar *nick = e_cert_get_nickname (ecert); + const gchar *email = e_cert_get_email (ecert); + CERTCertificate *cert = ecert->priv->cert; + + if (nick) { + if (e_cert_trust_has_any_user (cert->trust)) + return E_CERT_USER; + if (e_cert_trust_has_any_ca (cert->trust) + || CERT_IsCACert (cert,NULL)) + return E_CERT_CA; + if (e_cert_trust_has_peer (cert->trust, PR_TRUE, PR_FALSE, PR_FALSE)) + return E_CERT_SITE; + } + if (email && e_cert_trust_has_peer (cert->trust, PR_FALSE, PR_TRUE, PR_FALSE)) + return E_CERT_CONTACT; + + return E_CERT_UNKNOWN; +} |