mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
316 lines
8.7 KiB
C
316 lines
8.7 KiB
C
/* -*- Mode: C; tab-width: 8 -*-*/
|
|
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 1994-2000
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
/*
|
|
* This file will contain all routines dealing with creating a
|
|
* CMMFCertRepContent structure through Create/Set functions.
|
|
*/
|
|
|
|
#include "cmmf.h"
|
|
#include "cmmfi.h"
|
|
#include "crmf.h"
|
|
#include "crmfi.h"
|
|
#include "secitem.h"
|
|
#include "secder.h"
|
|
|
|
CMMFCertRepContent*
|
|
CMMF_CreateCertRepContent(void)
|
|
{
|
|
CMMFCertRepContent *retCertRep;
|
|
PRArenaPool *poolp;
|
|
|
|
poolp = PORT_NewArena(CRMF_DEFAULT_ARENA_SIZE);
|
|
if (poolp == NULL) {
|
|
goto loser;
|
|
}
|
|
retCertRep = PORT_ArenaZNew(poolp, CMMFCertRepContent);
|
|
if (retCertRep == NULL) {
|
|
goto loser;
|
|
}
|
|
retCertRep->poolp = poolp;
|
|
return retCertRep;
|
|
loser:
|
|
if (poolp != NULL) {
|
|
PORT_FreeArena(poolp, PR_FALSE);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
SECStatus
|
|
cmmf_CertOrEncCertSetCertificate(CMMFCertOrEncCert *certOrEncCert,
|
|
PRArenaPool *poolp,
|
|
CERTCertificate *inCert)
|
|
{
|
|
SECItem *derDest = NULL;
|
|
SECStatus rv = SECFailure;
|
|
|
|
if (inCert->derCert.data == NULL) {
|
|
derDest = SEC_ASN1EncodeItem(NULL, NULL, inCert,
|
|
CMMFCertOrEncCertCertificateTemplate);
|
|
if (derDest == NULL) {
|
|
goto loser;
|
|
}
|
|
} else {
|
|
derDest = SECITEM_DupItem(&inCert->derCert);
|
|
if (derDest == NULL) {
|
|
goto loser;
|
|
}
|
|
}
|
|
PORT_Assert(certOrEncCert->cert.certificate == NULL);
|
|
certOrEncCert->cert.certificate = CERT_DupCertificate(inCert);
|
|
certOrEncCert->choice = cmmfCertificate;
|
|
if (poolp != NULL) {
|
|
rv = SECITEM_CopyItem(poolp, &certOrEncCert->derValue, derDest);
|
|
if (rv != SECSuccess) {
|
|
goto loser;
|
|
}
|
|
} else {
|
|
certOrEncCert->derValue = *derDest;
|
|
}
|
|
PORT_Free(derDest);
|
|
return SECSuccess;
|
|
loser:
|
|
if (derDest != NULL) {
|
|
SECITEM_FreeItem(derDest, PR_TRUE);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
SECStatus
|
|
cmmf_ExtractCertsFromList(CERTCertList *inCertList,
|
|
PRArenaPool *poolp,
|
|
CERTCertificate ***certArray)
|
|
{
|
|
CERTCertificate **arrayLocalCopy;
|
|
CERTCertListNode *node;
|
|
int numNodes = 0, i;
|
|
|
|
for (node = CERT_LIST_HEAD(inCertList); !CERT_LIST_END(node, inCertList);
|
|
node = CERT_LIST_NEXT(node)) {
|
|
numNodes++;
|
|
}
|
|
|
|
arrayLocalCopy = *certArray = (poolp == NULL) ?
|
|
PORT_NewArray(CERTCertificate*, (numNodes+1)) :
|
|
PORT_ArenaNewArray(poolp, CERTCertificate*, (numNodes+1));
|
|
if (arrayLocalCopy == NULL) {
|
|
return SECFailure;
|
|
}
|
|
for (node = CERT_LIST_HEAD(inCertList), i=0;
|
|
!CERT_LIST_END(node, inCertList);
|
|
node = CERT_LIST_NEXT(node), i++) {
|
|
arrayLocalCopy[i] = CERT_DupCertificate(node->cert);
|
|
if (arrayLocalCopy[i] == NULL) {
|
|
int j;
|
|
|
|
for (j=0; j<i; j++) {
|
|
CERT_DestroyCertificate(arrayLocalCopy[j]);
|
|
}
|
|
if (poolp == NULL) {
|
|
PORT_Free(arrayLocalCopy);
|
|
}
|
|
*certArray = NULL;
|
|
return SECFailure;
|
|
}
|
|
}
|
|
arrayLocalCopy[numNodes] = NULL;
|
|
return SECSuccess;
|
|
}
|
|
|
|
SECStatus
|
|
CMMF_CertRepContentSetCertResponses(CMMFCertRepContent *inCertRepContent,
|
|
CMMFCertResponse **inCertResponses,
|
|
int inNumResponses)
|
|
{
|
|
PRArenaPool *poolp;
|
|
CMMFCertResponse **respArr, *newResp;
|
|
void *mark;
|
|
SECStatus rv;
|
|
int i;
|
|
|
|
PORT_Assert (inCertRepContent != NULL &&
|
|
inCertResponses != NULL &&
|
|
inNumResponses > 0);
|
|
if (inCertRepContent == NULL ||
|
|
inCertResponses == NULL ||
|
|
inCertRepContent->response != NULL) {
|
|
return SECFailure;
|
|
}
|
|
poolp = inCertRepContent->poolp;
|
|
mark = PORT_ArenaMark(poolp);
|
|
respArr = inCertRepContent->response =
|
|
PORT_ArenaZNewArray(poolp, CMMFCertResponse*, (inNumResponses+1));
|
|
if (respArr == NULL) {
|
|
goto loser;
|
|
}
|
|
for (i=0; i<inNumResponses; i++) {
|
|
newResp = PORT_ArenaZNew(poolp, CMMFCertResponse);
|
|
if (newResp == NULL) {
|
|
goto loser;
|
|
}
|
|
rv = cmmf_CopyCertResponse(poolp, newResp, inCertResponses[i]);
|
|
if (rv != SECSuccess) {
|
|
goto loser;
|
|
}
|
|
respArr[i] = newResp;
|
|
}
|
|
respArr[inNumResponses] = NULL;
|
|
PORT_ArenaUnmark(poolp, mark);
|
|
return SECSuccess;
|
|
|
|
loser:
|
|
PORT_ArenaRelease(poolp, mark);
|
|
return SECFailure;
|
|
}
|
|
|
|
CMMFCertResponse*
|
|
CMMF_CreateCertResponse(long inCertReqId)
|
|
{
|
|
SECItem *dummy;
|
|
CMMFCertResponse *newResp;
|
|
|
|
newResp = PORT_ZNew(CMMFCertResponse);
|
|
if (newResp == NULL) {
|
|
goto loser;
|
|
}
|
|
dummy = SEC_ASN1EncodeInteger(NULL, &newResp->certReqId, inCertReqId);
|
|
if (dummy != &newResp->certReqId) {
|
|
goto loser;
|
|
}
|
|
return newResp;
|
|
|
|
loser:
|
|
if (newResp != NULL) {
|
|
CMMF_DestroyCertResponse(newResp);
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
SECStatus
|
|
CMMF_CertResponseSetPKIStatusInfoStatus(CMMFCertResponse *inCertResp,
|
|
CMMFPKIStatus inPKIStatus)
|
|
{
|
|
PORT_Assert (inCertResp != NULL && inPKIStatus >= cmmfGranted
|
|
&& inPKIStatus < cmmfNumPKIStatus);
|
|
|
|
if (inCertResp == NULL) {
|
|
return SECFailure;
|
|
}
|
|
return cmmf_PKIStatusInfoSetStatus(&inCertResp->status, NULL,
|
|
inPKIStatus);
|
|
}
|
|
|
|
SECStatus
|
|
CMMF_CertResponseSetCertificate (CMMFCertResponse *inCertResp,
|
|
CERTCertificate *inCertificate)
|
|
{
|
|
CMMFCertifiedKeyPair *keyPair = NULL;
|
|
SECStatus rv = SECFailure;
|
|
|
|
PORT_Assert(inCertResp != NULL && inCertificate != NULL);
|
|
if (inCertResp == NULL || inCertificate == NULL) {
|
|
return SECFailure;
|
|
}
|
|
if (inCertResp->certifiedKeyPair == NULL) {
|
|
keyPair = inCertResp->certifiedKeyPair =
|
|
PORT_ZNew(CMMFCertifiedKeyPair);
|
|
} else {
|
|
keyPair = inCertResp->certifiedKeyPair;
|
|
}
|
|
if (keyPair == NULL) {
|
|
goto loser;
|
|
}
|
|
rv = cmmf_CertOrEncCertSetCertificate(&keyPair->certOrEncCert, NULL,
|
|
inCertificate);
|
|
if (rv != SECSuccess) {
|
|
goto loser;
|
|
}
|
|
return SECSuccess;
|
|
loser:
|
|
if (keyPair) {
|
|
if (keyPair->certOrEncCert.derValue.data) {
|
|
PORT_Free(keyPair->certOrEncCert.derValue.data);
|
|
}
|
|
PORT_Free(keyPair);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
|
|
SECStatus
|
|
CMMF_CertRepContentSetCAPubs(CMMFCertRepContent *inCertRepContent,
|
|
CERTCertList *inCAPubs)
|
|
{
|
|
PRArenaPool *poolp;
|
|
void *mark;
|
|
SECStatus rv;
|
|
|
|
PORT_Assert(inCertRepContent != NULL &&
|
|
inCAPubs != NULL &&
|
|
inCertRepContent->caPubs == NULL);
|
|
|
|
if (inCertRepContent == NULL ||
|
|
inCAPubs == NULL || inCertRepContent == NULL) {
|
|
return SECFailure;
|
|
}
|
|
|
|
poolp = inCertRepContent->poolp;
|
|
mark = PORT_ArenaMark(poolp);
|
|
|
|
rv = cmmf_ExtractCertsFromList(inCAPubs, poolp,
|
|
&inCertRepContent->caPubs);
|
|
|
|
if (rv != SECSuccess) {
|
|
PORT_ArenaRelease(poolp, mark);
|
|
} else {
|
|
PORT_ArenaUnmark(poolp, mark);
|
|
}
|
|
return rv;
|
|
}
|
|
|
|
CERTCertificate*
|
|
CMMF_CertifiedKeyPairGetCertificate(CMMFCertifiedKeyPair *inCertKeyPair,
|
|
CERTCertDBHandle *inCertdb)
|
|
{
|
|
PORT_Assert(inCertKeyPair != NULL);
|
|
if (inCertKeyPair == NULL) {
|
|
return NULL;
|
|
}
|
|
return cmmf_CertOrEncCertGetCertificate(&inCertKeyPair->certOrEncCert,
|
|
inCertdb);
|
|
}
|