aboutsummaryrefslogblamecommitdiffstats
path: root/smime/lib/e-cert.c
blob: c3d0b7e3510819b0e0955c9a33c1e3f43ae5b36d (plain) (tree)
1
2
3
4
5
6
7
8
9
10
                                                                           
                                                                    
                                                           
  
                                    
  



                                                                              
  



                                                                             
  
                                                        
  















                                                                             

   




                                                        



                    

                 
                       


                                                         
 
                   
                         

                     
                  
 



                                           

                              

                                                                    
                    


                             
 


                                    



                          

                                 
 
                             
 
                            
 

                                
 

                          
                        

  
                                            

           
                                 
 



































                                                       
                                                                           


                                                                            
                                                                                

                                                                                       
                                                               

                 
 

                                                     
 

                                                                


           
                                     


                                   
                                                                
 

                                                 




                       
                                           

 



                                              
                               

                       
                                                             




                                                                            
                                                          

                                                                

                                                                      

                                            
                              
 


                                                               








                                                                                


                                                               











                                                                                        

                                                    





                                                                   

                                                    




                                                                  

 
       



                                                                 
                                                                                         






                                 


                                 






                                                                       
                                                          



                                 
                 






                                        


                                 

                                                                     

                                                               
                               
                                                                








                                                              
             
                                     








                                                     
             




                                          
             
                              
 
                                           

 
             
                            



                                    
             




                                         
             
                           



                              
             




                                            
             




                                     
             




                                           
             




                                                
             




                                             
      
                                       



                                     
             





                                            
                                        



                                      
             




                                             
               

                          





                                                          
             
                              

                                               
                       


                                                                         
                                                                


                                                                   
                                                                            



                                                    
                                           




                                        
             




                                         
             




                                            
             
                                        



                                           
       











                                                                         
                                                                                          

                              
                                                                                      

                               

                                                       





                                               
       
                                 
 
                                                                                   
 

                        
            


                                                       
                            
                                                                             

                                       
                             
                                            
            
                                         

 
               
                                    
                               

                      
                                                          







                                                               

                                       

                                                 
                       









                                                                           
                                               


                            
                          


















                                                                       

                                                 
 
                            



                                                                  
                                                   









                                                                  
                                     
 


                       
 
                                   
                               







                                                           
                                                                 




                                                               
                  
                         











                                                                               
                        






                         

                           
 
                                                   
                    










                                                                          








                                                                            
                                      
                                       

                                     
                                        

                                                  
                                        

                                           
                                       

                                  
                                       

                                      
                                        

                            
                                        

                                           
                                        













                                                                             
                                         

                                         
                                       









                                                                            
                    

 
               

                                 

                                                          




                                                        


                                         
                        
                                         

                                                               
                                        




                                                    
 

               

                                                    

                                                     
                    




                                                

                                                                       



























                                                                                    
                                                             
 
                                                         

                                   
                     
                    










                                                                                         

                                                                
          

















                                                                                  

                                                  

                        
                          


                            

                                                                                              







































                                                                                

                                               

                        
                        


                            

                                                                                              


































                                                                                
 



                    


                                         









                                                                    
                            


                                                        
                      






                                                       
                                                     

                                         
                    
                                   
                                                              





























                                                                       
                                                   
                                                





                                                                            
                                                 












                                                                             

                             
 



                        


                                                  
                    
                          
                    



                          





                                                               

                                                                 


                                                                
 

                                                                             
                                                                          


                                                                              
                                                                          








                                                                            
                                                                       
                                          


                                             

                                                                             
 
                                                               
 







                                                                              












                                                                                   

                                                      






















                                                                                  
                    
                             
                     

                                                                    
 



                                                                    
 




                                                                                   














                                                                                       
             
                                                                                

                                                                                        

                                                                

                                                                                         
                                                     
                                                    
                                   
 

                                                
                         

                                                                    



                                                                                        

                                                                   

                          
 








                                                               

                                                                   




                                                           


                                                              















                                                                                


                                                              



























                                                                                 
                    


                                                
                                                                                          

                                                                                
                                 





                                                                  

                                                                                
                             

                                                                



                                                                

                                                            

                                                        


                                                      









                                                                      
             







                                               
        

                                      
                                                 

     
                                                      
                                                                    

      


                                                           

                                                                               









                                     
                                   
 

                                                        





                                                            
                                                 







                                                                                      
 
/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
/* The following is the mozilla license blurb, as the bodies some of
 * these functions were derived from the mozilla source. */
/*
 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
 *
 * The contents of this file are subject to the Mozilla Public License Version
 * 1.1 (the "License"); you may not use this file except in compliance with
 * the License. You may obtain a copy of the License at
 * http://www.mozilla.org/MPL/
 *
 * Software distributed under the License is distributed on an "AS IS" basis,
 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
 * for the specific language governing rights and limitations under the
 * License.
 *
 * The Original Code is the Netscape security libraries.
 *
 * The Initial Developer of the Original Code is
 * Netscape Communications Corporation.
 * Portions created by the Initial Developer are Copyright (C) 1994-2000
 * the Initial Developer. All Rights Reserved.
 *
 * Alternatively, the contents of this file may be used under the terms of
 * either the GNU General Public License Version 2 or later (the "GPL"), or
 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
 * in which case the provisions of the GPL or the LGPL are applicable instead
 * of those above. If you wish to allow use of your version of this file only
 * under the terms of either the GPL or the LGPL, and not to allow others to
 * use your version of this file under the terms of the MPL, indicate your
 * decision by deleting the provisions above and replace them with the notice
 * and other provisions required by the GPL or the LGPL. If you do not delete
 * the provisions above, a recipient may use your version of this file under
 * the terms of any one of the MPL, the GPL or the LGPL.
 */

/*
 * Author: Chris Toshok (toshok@ximian.com)
 *
 * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com)
 */
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include <time.h>

#include <glib/gi18n.h>

/* for e_utf8_strftime, what about e_time_format_time? */
#include <e-util/e-util.h>

#include "e-cert.h"
#include "e-cert-trust.h"
#include "pk11func.h"
#include "certdb.h"
#include "hasht.h"

#define E_CERT_GET_PRIVATE(obj) \
    (G_TYPE_INSTANCE_GET_PRIVATE \
    ((obj), E_TYPE_CERT, ECertPrivate))

struct _ECertPrivate {
    CERTCertificate *cert;

    /* pointers we cache since the nss implementation allocs the
     * string */
    gchar *org_name;
    gchar *org_unit_name;
    gchar *cn;

    gchar *issuer_org_name;
    gchar *issuer_org_unit_name;
    gchar *issuer_cn;

    PRTime issued_on;
    PRTime expires_on;

    gchar *issued_on_string;
    gchar *expires_on_string;

    gchar *serial_number;

    gchar *usage_string;

    gchar *sha1_fingerprint;
    gchar *md5_fingerprint;

    EASN1Object *asn1;

    gboolean delete;
};

G_DEFINE_TYPE (ECert, e_cert, G_TYPE_OBJECT)

static void
e_cert_finalize (GObject *object)
{
    ECertPrivate *priv;

    priv = E_CERT_GET_PRIVATE (object);

    if (priv->org_name)
        PORT_Free (priv->org_name);
    if (priv->org_unit_name)
        PORT_Free (priv->org_unit_name);
    if (priv->cn)
        PORT_Free (priv->cn);

    if (priv->issuer_org_name)
        PORT_Free (priv->issuer_org_name);
    if (priv->issuer_org_unit_name)
        PORT_Free (priv->issuer_org_unit_name);
    if (priv->issuer_cn)
        PORT_Free (priv->issuer_cn);

    if (priv->issued_on_string)
        PORT_Free (priv->issued_on_string);
    if (priv->expires_on_string)
        PORT_Free (priv->expires_on_string);
    if (priv->serial_number)
        PORT_Free (priv->serial_number);

    g_free (priv->usage_string);

    if (priv->sha1_fingerprint)
        PORT_Free (priv->sha1_fingerprint);
    if (priv->md5_fingerprint)
        PORT_Free (priv->md5_fingerprint);

    if (priv->asn1)
        g_object_unref (priv->asn1);

    if (priv->delete) {
        printf ("attempting to delete cert marked for deletion\n");
        if (e_cert_get_cert_type (E_CERT (object)) == E_CERT_USER) {
            PK11_DeleteTokenCertAndKey (priv->cert, NULL);
        } else if (!PK11_IsReadOnly (priv->cert->slot)) {
            /* If the list of built-ins does contain a non-removable
             * copy of this certificate, our call will not remove
             * the certificate permanently, but rather remove all trust. */
            SEC_DeletePermCertificate (priv->cert);
        }
    }

    if (priv->cert)
        CERT_DestroyCertificate (priv->cert);

    /* Chain up to parent's finalize() method. */
    G_OBJECT_CLASS (e_cert_parent_class)->finalize (object);
}

static void
e_cert_class_init (ECertClass *class)
{
    GObjectClass *object_class;

    g_type_class_add_private (class, sizeof (ECertPrivate));

    object_class = G_OBJECT_CLASS (class);
    object_class->finalize = e_cert_finalize;
}

static void
e_cert_init (ECert *ec)
{
    ec->priv = E_CERT_GET_PRIVATE (ec);
}

static void
e_cert_populate (ECert *cert)
{
    CERTCertificate *c = cert->priv->cert;
    guchar fingerprint[20];
    SECItem fpItem;

    cert->priv->org_name = CERT_GetOrgName (&c->subject);
    cert->priv->org_unit_name = CERT_GetOrgUnitName (&c->subject);

    cert->priv->issuer_org_name = CERT_GetOrgName (&c->issuer);
    cert->priv->issuer_org_unit_name = CERT_GetOrgUnitName (&c->issuer);

    cert->priv->cn = CERT_GetCommonName (&c->subject);
    cert->priv->issuer_cn = CERT_GetCommonName (&c->issuer);

    if (SECSuccess == CERT_GetCertTimes (
        c, &cert->priv->issued_on, &cert->priv->expires_on)) {
        PRExplodedTime explodedTime;
        struct tm exploded_tm;
        gchar buf[32];

        PR_ExplodeTime (
            cert->priv->issued_on,
            PR_LocalTimeParameters, &explodedTime);
        exploded_tm.tm_sec = explodedTime.tm_sec;
        exploded_tm.tm_min = explodedTime.tm_min;
        exploded_tm.tm_hour = explodedTime.tm_hour;
        exploded_tm.tm_mday = explodedTime.tm_mday;
        exploded_tm.tm_mon = explodedTime.tm_month;
        exploded_tm.tm_year = explodedTime.tm_year - 1900;
        e_utf8_strftime (buf, sizeof(buf), _("%d/%m/%Y"), &exploded_tm);
        cert->priv->issued_on_string = g_strdup (buf);

        PR_ExplodeTime (
            cert->priv->expires_on,
            PR_LocalTimeParameters, &explodedTime);
        exploded_tm.tm_sec = explodedTime.tm_sec;
        exploded_tm.tm_min = explodedTime.tm_min;
        exploded_tm.tm_hour = explodedTime.tm_hour;
        exploded_tm.tm_mday = explodedTime.tm_mday;
        exploded_tm.tm_mon = explodedTime.tm_month;
        exploded_tm.tm_year = explodedTime.tm_year - 1900;
        e_utf8_strftime (buf, sizeof(buf), _("%d/%m/%Y"), &exploded_tm);
        cert->priv->expires_on_string = g_strdup (buf);
    }

    cert->priv->serial_number = CERT_Hexify (&cert->priv->cert->serialNumber, TRUE);

    memset (fingerprint, 0, sizeof fingerprint);
    PK11_HashBuf (SEC_OID_SHA1, fingerprint,
             cert->priv->cert->derCert.data,
             cert->priv->cert->derCert.len);
    fpItem.data = fingerprint;
    fpItem.len = SHA1_LENGTH;
    cert->priv->sha1_fingerprint = CERT_Hexify (&fpItem, TRUE);

    memset (fingerprint, 0, sizeof fingerprint);
    PK11_HashBuf (SEC_OID_MD5, fingerprint,
             cert->priv->cert->derCert.data,
             cert->priv->cert->derCert.len);
    fpItem.data = fingerprint;
    fpItem.len = MD5_LENGTH;
    cert->priv->md5_fingerprint = CERT_Hexify (&fpItem, TRUE);
}

ECert *
e_cert_new (CERTCertificate *cert)
{
    ECert *ecert = E_CERT (g_object_new (E_TYPE_CERT, NULL));

    /* ECert owns a reference to the 'cert', which will be freed on ECert finalize */
    ecert->priv->cert = cert;

    e_cert_populate (ecert);

    return ecert;
}

ECert *
e_cert_new_from_der (gchar *data,
                     guint32 len)
{
    CERTCertificate *cert = CERT_DecodeCertFromPackage (data, len);

    if (!cert)
        return NULL;

    if (cert->dbhandle == NULL)
        cert->dbhandle = CERT_GetDefaultCertDB ();

    return e_cert_new (cert);
}

CERTCertificate *
e_cert_get_internal_cert (ECert *cert)
{
    /* XXX should this refcnt it? */
    return cert->priv->cert;
}

gboolean
e_cert_get_raw_der (ECert *cert,
                    gchar **data,
                    guint32 *len)
{
    /* XXX do we really need to check if cert->priv->cert is NULL
     * here?  it should always be non - null if we have the
     * ECert.. */
    if (cert->priv->cert) {
        *data = (gchar *)cert->priv->cert->derCert.data;
        *len = (guint32)cert->priv->cert->derCert.len;
        return TRUE;
    }

    *len = 0;
    return FALSE;

}

const gchar *
e_cert_get_window_title (ECert *cert)
{
    if (cert->priv->cert->nickname)
        return cert->priv->cert->nickname;
    else if (cert->priv->cn)
        return cert->priv->cn;
    else
        return cert->priv->cert->subjectName;
}

const gchar *
e_cert_get_nickname (ECert *cert)
{
    return cert->priv->cert->nickname;
}

const gchar *
e_cert_get_email (ECert *cert)
{
    return cert->priv->cert->emailAddr;
}

const gchar *
e_cert_get_org (ECert *cert)
{
    return cert->priv->org_name;
}

const gchar *
e_cert_get_org_unit (ECert *cert)
{
    return cert->priv->org_unit_name;
}

const gchar *
e_cert_get_cn (ECert *cert)
{
    return cert->priv->cn;
}

const gchar *
e_cert_get_issuer_name (ECert *cert)
{
    return cert->priv->cert->issuerName;
}

const gchar *
e_cert_get_issuer_cn (ECert *cert)
{
    return cert->priv->issuer_cn;
}

const gchar *
e_cert_get_issuer_org (ECert *cert)
{
    return cert->priv->issuer_org_name;
}

const gchar *
e_cert_get_issuer_org_unit (ECert *cert)
{
    return cert->priv->issuer_org_unit_name;
}

const gchar *
e_cert_get_subject_name (ECert *cert)
{
    return cert->priv->cert->subjectName;
}

PRTime
e_cert_get_issued_on_time (ECert *cert)
{
    return cert->priv->issued_on;
}

const gchar *
e_cert_get_issued_on (ECert *cert)
{
    return cert->priv->issued_on_string;
}

PRTime
e_cert_get_expires_on_time (ECert *cert)
{
    return cert->priv->expires_on;
}

const gchar *
e_cert_get_expires_on (ECert *cert)
{
    return cert->priv->expires_on_string;
}

static struct {
    gint bit;
    const gchar *text;
} usageinfo[] = {
    /* x509 certificate usage types */
    { certificateUsageEmailSigner, N_("Sign") },
    { certificateUsageEmailRecipient, N_("Encrypt") },
};

const gchar *
e_cert_get_usage (ECert *cert)
{
    if (cert->priv->usage_string == NULL) {
        gint i;
        GString *str = g_string_new("");
        CERTCertificate *icert = e_cert_get_internal_cert (cert);

        for (i = 0; i < G_N_ELEMENTS (usageinfo); i++) {
            if (icert->keyUsage & usageinfo[i].bit) {
                if (str->len != 0)
                    g_string_append(str, ", ");
                g_string_append (str, _(usageinfo[i].text));
            }
        }

        cert->priv->usage_string = str->str;
        g_string_free (str, FALSE);
    }

    return cert->priv->usage_string;
}

const gchar *
e_cert_get_serial_number (ECert *cert)
{
    return cert->priv->serial_number;
}

const gchar *
e_cert_get_sha1_fingerprint (ECert *cert)
{
    return cert->priv->sha1_fingerprint;
}

const gchar *
e_cert_get_md5_fingerprint (ECert *cert)
{
    return cert->priv->md5_fingerprint;
}

GList *
e_cert_get_chain (ECert *ecert)
{
    GList *l = NULL;

    g_object_ref (ecert);

    while (ecert) {
        CERTCertificate *cert = e_cert_get_internal_cert (ecert);
        CERTCertificate *next_cert;

        l = g_list_append (l, ecert);

        if (SECITEM_CompareItem (&cert->derIssuer, &cert->derSubject) == SECEqual)
            break;

        next_cert = CERT_FindCertIssuer (cert, PR_Now (), certUsageSSLClient);
        if (!next_cert)
            break;

        /* next_cert has a reference already */
        ecert = e_cert_new (next_cert);
    }

    return l;
}

ECert *
e_cert_get_ca_cert (ECert *ecert)
{
    CERTCertificate *cert, *next = e_cert_get_internal_cert (ecert), *internal;

    cert = next;
    internal = cert;
    do {
        if (cert != next && cert != internal)
            CERT_DestroyCertificate (cert);

        cert = next;
        next = CERT_FindCertIssuer (cert, PR_Now (), certUsageAnyCA);
    } while (next && next != cert);

    if (cert == internal)
        return g_object_ref (ecert);
    else
        return e_cert_new (cert);
}

static gboolean
get_int_value (SECItem *versionItem,
               gulong *version)
{
    SECStatus srv;
    srv = SEC_ASN1DecodeInteger (versionItem,version);
    if (srv != SECSuccess) {
        g_warning ("could not decode version of cert");
        return FALSE;
    }
    return TRUE;
}

static gboolean
process_version (SECItem *versionItem,
                 EASN1Object **retItem)
{
    EASN1Object *item = e_asn1_object_new ();
    gulong version;

    e_asn1_object_set_display_name (item, _("Version"));

    /* Now to figure out what version this certificate is. */

    if (versionItem->data) {
        if (!get_int_value (versionItem, &version))
            return FALSE;
    } else {
        /* If there is no version present in the cert, then rfc2459
         * says we default to v1 (0) */
        version = 0;
    }

    switch (version) {
    case 0:
        e_asn1_object_set_display_value (item, _("Version 1"));
        break;
    case 1:
        e_asn1_object_set_display_value (item, _("Version 2"));
        break;
    case 2:
        e_asn1_object_set_display_value (item, _("Version 3"));
        break;
    default:
        g_warning ("Bad value for cert version");
        return FALSE;
    }

    *retItem = item;
    return TRUE;
}

static gboolean
process_serial_number_der (SECItem *serialItem,
                           EASN1Object **retItem)
{
    gchar *serialNumber;
    EASN1Object *item = e_asn1_object_new ();

    e_asn1_object_set_display_name (item, _("Serial Number"));

    serialNumber = CERT_Hexify (serialItem, 1);

    e_asn1_object_set_display_value (item, serialNumber);
    PORT_Free (serialNumber); /* XXX the right free to use? */

    *retItem = item;
    return TRUE;
}

static gboolean
get_default_oid_format (SECItem *oid,
                        gchar **text)
{
    gchar buf[300];
    guint len;
    gint written;

    gulong val  = oid->data[0];
    guint  i    = val % 40;
    val /= 40;
    written = PR_snprintf(buf, 300, "%lu %u ", val, i);
    if (written < 0)
        return FALSE;
    len = written;

    val = 0;
    for (i = 1; i < oid->len; ++i) {
        /* In this loop, we have to parse a DER formatted
         * If the first bit is a 1, then the integer is
         * represented by more than one byte.  If the
         * first bit is set then we continue on and add
         * the values of the later bytes until we get
         * a byte without the first bit set.
        */
        gulong j;

        j = oid->data[i];
        val = (val << 7) | (j & 0x7f);
        if (j & 0x80)
            continue;
        written = PR_snprintf(&buf[len], sizeof(buf)-len, "%lu ", val);
        if (written < 0)
            return FALSE;

        len += written;
        if (len >= sizeof (buf))
            g_warning ("OID data to big to display in 300 chars.");
        val = 0;
  }

  *text = g_strdup (buf);
  return TRUE;
}

static gboolean
get_oid_text (SECItem *oid,
              gchar **text)
{
    SECOidTag oidTag = SECOID_FindOIDTag (oid);
    gchar *temp;

    switch (oidTag) {
    case SEC_OID_PKCS1_MD2_WITH_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 MD2 With RSA Encryption"));
        break;
    case SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 MD5 With RSA Encryption"));
        break;
    case SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 SHA-1 With RSA Encryption"));
        break;
    case SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 SHA-256 With RSA Encryption"));
        break;
    case SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 SHA-384 With RSA Encryption"));
        break;
    case SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 SHA-512 With RSA Encryption"));
        break;
    case SEC_OID_AVA_COUNTRY_NAME:
        *text = g_strdup ("C");
        break;
    case SEC_OID_AVA_COMMON_NAME:
        *text = g_strdup ("CN");
        break;
    case SEC_OID_AVA_ORGANIZATIONAL_UNIT_NAME:
        *text = g_strdup ("OU");
        break;
    case SEC_OID_AVA_ORGANIZATION_NAME:
        *text = g_strdup ("O");
        break;
    case SEC_OID_AVA_LOCALITY:
        *text = g_strdup ("L");
        break;
    case SEC_OID_AVA_DN_QUALIFIER:
        *text = g_strdup ("DN");
        break;
    case SEC_OID_AVA_DC:
        *text = g_strdup ("DC");
        break;
    case SEC_OID_AVA_STATE_OR_PROVINCE:
        *text = g_strdup ("ST");
        break;
    case SEC_OID_PKCS1_RSA_ENCRYPTION:
        *text = g_strdup (_("PKCS #1 RSA Encryption"));
        break;
    case SEC_OID_X509_KEY_USAGE:
        *text = g_strdup (_("Certificate Key Usage"));
        break;
    case SEC_OID_NS_CERT_EXT_CERT_TYPE:
        *text = g_strdup (_("Netscape Certificate Type"));
        break;
    case SEC_OID_X509_AUTH_KEY_ID:
        *text = g_strdup (_("Certificate Authority Key Identifier"));
        break;
    case SEC_OID_RFC1274_UID:
        *text = g_strdup ("UID");
        break;
    case SEC_OID_PKCS9_EMAIL_ADDRESS:
        *text = g_strdup ("E");
        break;
    default:
        if (!get_default_oid_format (oid, &temp))
            return FALSE;

        *text = g_strdup_printf (_("Object Identifier (%s)"), temp);
        g_free (temp);

        break;
    }
    return TRUE;
}

static gboolean
process_raw_bytes (SECItem *data,
                   gchar **text)
{
    /* This function is used to display some DER bytes
     * that we have not added support for decoding.
     * It prints the value of the byte out into a
     * string that can later be displayed as a byte
     * string.  We place a new line after 24 bytes
     * to break up extermaly long sequence of bytes.
    */
    GString *str = g_string_new ("");
    PRUint32 i;
    gchar buffer[5];
    for (i = 0; i < data->len; i++) {
        PR_snprintf(buffer, 5, "%02x ", data->data[i]);
        g_string_append (str, buffer);
        if ((i + 1) % 16 == 0) {
            g_string_append (str, "\n");
        }
    }
    *text = g_string_free (str, FALSE);
    return TRUE;
}

static gboolean
process_sec_algorithm_id (SECAlgorithmID *algID,
                          EASN1Object **retSequence)
{
    EASN1Object *sequence = e_asn1_object_new ();
    gchar *text;

    *retSequence = NULL;

    get_oid_text (&algID->algorithm, &text);

    if (!algID->parameters.len ||
        algID->parameters.data[0] == E_ASN1_OBJECT_TYPE_NULL) {
        e_asn1_object_set_display_value (sequence, text);
        e_asn1_object_set_valid_container (sequence, FALSE);
    } else {
        EASN1Object *subitem;

        subitem = e_asn1_object_new ();
        e_asn1_object_set_display_name (subitem, _("Algorithm Identifier"));
        e_asn1_object_set_display_value (subitem, text);
        e_asn1_object_append_child (sequence, subitem);
        g_object_unref (subitem);

        g_free (text);

        subitem = e_asn1_object_new ();
        e_asn1_object_set_display_name (subitem, _("Algorithm Parameters"));
        process_raw_bytes (&algID->parameters, &text);
        e_asn1_object_set_display_value (subitem, text);
        e_asn1_object_append_child (sequence, subitem);
        g_object_unref (subitem);
    }

    g_free (text);
    *retSequence = sequence;
    return TRUE;
}

static gboolean
process_subject_public_key_info (CERTSubjectPublicKeyInfo *spki,
                                 EASN1Object *parentSequence)
{
    EASN1Object *spkiSequence = e_asn1_object_new ();
    EASN1Object *sequenceItem;
    EASN1Object *printableItem;
    SECItem data;
    gchar *text;

    e_asn1_object_set_display_name (spkiSequence, _("Subject Public Key Info"));

    if (!process_sec_algorithm_id (&spki->algorithm, &sequenceItem))
        return FALSE;

    e_asn1_object_set_display_name (sequenceItem, _("Subject Public Key Algorithm"));

    e_asn1_object_append_child (spkiSequence, sequenceItem);

    /* The subjectPublicKey field is encoded as a bit string.
     * ProcessRawBytes expects the lenght to be in bytes, so
     * let's convert the lenght into a temporary SECItem.
    */
    data.data = spki->subjectPublicKey.data;
    data.len  = spki->subjectPublicKey.len / 8;

    process_raw_bytes (&data, &text);
    printableItem = e_asn1_object_new ();

    e_asn1_object_set_display_value (printableItem, text);
    e_asn1_object_set_display_name (printableItem, _("Subject's Public Key"));
    e_asn1_object_append_child (spkiSequence, printableItem);
    g_object_unref (printableItem);

    e_asn1_object_append_child (parentSequence, spkiSequence);
    g_object_unref (spkiSequence);

    return TRUE;
}

static gboolean
process_ns_cert_type_extensions (SECItem *extData,
                                 GString *text)
{
    SECItem decoded;
    guchar nsCertType;

    decoded.data = NULL;
    decoded.len  = 0;
    if (SECSuccess != SEC_ASN1DecodeItem (NULL, &decoded,
                         SEC_ASN1_GET (SEC_BitStringTemplate), extData)) {
        g_string_append (text, _("Error: Unable to process extension"));
        return TRUE;
    }

    nsCertType = decoded.data[0];

    PORT_Free (decoded.data); /* XXX right free? */

    if (nsCertType & NS_CERT_TYPE_SSL_CLIENT) {
        g_string_append (text, _("SSL Client Certificate"));
        g_string_append (text, "\n");
    }
    if (nsCertType & NS_CERT_TYPE_SSL_SERVER) {
        g_string_append (text, _("SSL Server Certificate"));
        g_string_append (text, "\n");
    }
    if (nsCertType & NS_CERT_TYPE_EMAIL) {
        g_string_append (text, _("Email"));
        g_string_append (text, "\n");
    }
    if (nsCertType & NS_CERT_TYPE_OBJECT_SIGNING) {
        g_string_append (text, _("Object Signer"));
        g_string_append (text, "\n");
    }
    if (nsCertType & NS_CERT_TYPE_SSL_CA) {
        g_string_append (text, _("SSL Certificate Authority"));
        g_string_append (text, "\n");
    }
    if (nsCertType & NS_CERT_TYPE_EMAIL_CA) {
        g_string_append (text, _("Email Certificate Authority"));
        g_string_append (text, "\n");
    }
    if (nsCertType & NS_CERT_TYPE_OBJECT_SIGNING_CA) {
        g_string_append (text, _("Object Signer"));
        g_string_append (text, "\n");
    }
    return TRUE;
}

static gboolean
process_key_usage_extensions (SECItem *extData,
                              GString *text)
{
    SECItem decoded;
    guchar keyUsage;

    decoded.data = NULL;
    decoded.len  = 0;
    if (SECSuccess != SEC_ASN1DecodeItem (NULL, &decoded,
                         SEC_ASN1_GET (SEC_BitStringTemplate), extData)) {
        g_string_append (text, _("Error: Unable to process extension"));
        return TRUE;
    }

    keyUsage = decoded.data[0];
    PORT_Free (decoded.data); /* XXX right free? */

    if (keyUsage & KU_DIGITAL_SIGNATURE) {
        g_string_append (text, _("Signing"));
        g_string_append (text, "\n");
    }
    if (keyUsage & KU_NON_REPUDIATION) {
        g_string_append (text, _("Non-repudiation"));
        g_string_append (text, "\n");
    }
    if (keyUsage & KU_KEY_ENCIPHERMENT) {
        g_string_append (text, _("Key Encipherment"));
        g_string_append (text, "\n");
    }
    if (keyUsage & KU_DATA_ENCIPHERMENT) {
        g_string_append (text, _("Data Encipherment"));
        g_string_append (text, "\n");
    }
    if (keyUsage & KU_KEY_AGREEMENT) {
        g_string_append (text, _("Key Agreement"));
        g_string_append (text, "\n");
    }
    if (keyUsage & KU_KEY_CERT_SIGN) {
        g_string_append (text, _("Certificate Signer"));
        g_string_append (text, "\n");
    }
    if (keyUsage & KU_CRL_SIGN) {
        g_string_append (text, _("CRL Signer"));
        g_string_append (text, "\n");
    }

    return TRUE;
}

static gboolean
process_extension_data (SECOidTag oidTag,
                        SECItem *extData,
                        GString *str)
{
    gboolean rv;
    switch (oidTag) {
    case SEC_OID_NS_CERT_EXT_CERT_TYPE:
        rv = process_ns_cert_type_extensions (extData, str);
        break;
    case SEC_OID_X509_KEY_USAGE:
        rv = process_key_usage_extensions (extData, str);
        break;
    default: {
        gchar *text;
        rv = process_raw_bytes (extData, &text);
        g_string_append (str, text);
        g_free (text);
        break;
    }
    }
    return rv;
}

static gboolean
process_single_extension (CERTCertExtension *extension,
                          EASN1Object **retExtension)
{
    GString *str = g_string_new ("");
    gchar *text;
    EASN1Object *extensionItem;
    SECOidTag oidTag = SECOID_FindOIDTag (&extension->id);

    get_oid_text (&extension->id, &text);

    extensionItem = e_asn1_object_new ();

    e_asn1_object_set_display_name (extensionItem, text);
    g_free (text);

    if (extension->critical.data != NULL) {
        if (extension->critical.data[0]) {
            g_string_append (str, _("Critical"));
        } else {
            g_string_append (str, _("Not Critical"));
        }
    } else {
        g_string_append (str, _("Not Critical"));
    }
    g_string_append (str, "\n");
    if (!process_extension_data (oidTag, &extension->value, str)) {
        g_string_free (str, TRUE);
        return FALSE;
    }

    e_asn1_object_set_display_value (extensionItem, str->str);
    g_string_free (str, TRUE);
    *retExtension = extensionItem;
    return TRUE;
}

static gboolean
process_extensions (CERTCertExtension **extensions,
                    EASN1Object *parentSequence)
{
    EASN1Object *extensionSequence = e_asn1_object_new ();
    PRInt32 i;

    e_asn1_object_set_display_name (extensionSequence, _("Extensions"));

    for (i = 0; extensions[i] != NULL; i++) {
        EASN1Object *newExtension;

        if (!process_single_extension (extensions[i],
                           &newExtension))
            return FALSE;

        e_asn1_object_append_child (extensionSequence, newExtension);
    }
    e_asn1_object_append_child (parentSequence, extensionSequence);
    return TRUE;
}

static gboolean
process_name (CERTName *name,
              gchar **value)
{
    CERTRDN ** rdns;
    CERTRDN ** rdn;
    CERTAVA ** avas;
    CERTAVA * ava;
    SECItem *decodeItem = NULL;
    GString *final_string = g_string_new ("");

    gchar *type;
    GString *avavalue;
    gchar *temp;
    CERTRDN **lastRdn;

    rdns = name->rdns;

    /* find last RDN */
    lastRdn = rdns;
    while (*lastRdn) lastRdn++;

    /* The above whille loop will put us at the last member
     * of the array which is a NULL pointer.  So let's back
     * up one spot so that we have the last non-NULL entry in
     * the array in preparation for traversing the
     * RDN's (Relative Distinguished Name) in reverse order.
     */
    lastRdn--;

    /*
     * Loop over name contents in _reverse_ RDN order appending to string
     * When building the Ascii string, NSS loops over these entries in
     * reverse order, so I will as well.  The difference is that NSS
     * will always place them in a one line string separated by commas,
     * where I want each entry on a single line.  I can't just use a comma
     * as my delimitter because it is a valid character to have in the
     * value portion of the AVA and could cause trouble when parsing.
     */
    for (rdn = lastRdn; rdn >= rdns; rdn--) {
        avas = (*rdn)->avas;
        while ((ava = *avas++) != 0) {
            if (!get_oid_text (&ava->type, &type))
                return FALSE;

            /* This function returns a string in UTF8 format. */
            decodeItem = CERT_DecodeAVAValue (&ava->value);
            if (!decodeItem) {
                return FALSE;
            }

            avavalue = g_string_new_len (
                (gchar *) decodeItem->data, decodeItem->len);

            SECITEM_FreeItem (decodeItem, PR_TRUE);

            /* Translators: This string is used in Certificate
             * details for fields like Issuer or Subject, which
             * shows the field name on the left and its respective
             * value on the right, both as stored in the
             * certificate itself.  You probably do not need to
             * change this string, unless changing the order of
             * name and value.  As a result example:
             * "OU = VeriSign Trust Network" */
            temp = g_strdup_printf (_("%s = %s"), type, avavalue->str);

            g_string_append (final_string, temp);
            g_string_append (final_string, "\n");
            g_string_free (avavalue, TRUE);
            g_free (temp);
        }
    }
    *value = g_string_free (final_string, FALSE);
    return TRUE;
}

static gboolean
create_tbs_certificate_asn1_struct (ECert *cert,
                                    EASN1Object **seq)
{
    /*
    **   TBSCertificate  ::=  SEQUENCE  {
    **        version         [0]  EXPLICIT Version DEFAULT v1,
    **        serialNumber         CertificateSerialNumber,
    **        signature            AlgorithmIdentifier,
    **        issuer               Name,
    **        validity             Validity,
    **        subject              Name,
    **        subjectPublicKeyInfo SubjectPublicKeyInfo,
    **        issuerUniqueID  [1]  IMPLICIT UniqueIdentifier OPTIONAL,
    **                             -- If present, version shall be v2 or v3
    **        subjectUniqueID [2]  IMPLICIT UniqueIdentifier OPTIONAL,
    **                             -- If present, version shall be v2 or v3
    **        extensions      [3]  EXPLICIT Extensions OPTIONAL
    **                             -- If present, version shall be v3
    **        }
    **
    ** This is the ASN1 structure we should be dealing with at this point.
    ** The code in this method will assert this is the structure we're dealing
    ** and then add more user friendly text for that field.
    */
    EASN1Object *sequence = e_asn1_object_new ();
    gchar *text;
    EASN1Object *subitem;
    SECItem data;

    e_asn1_object_set_display_name (sequence, _("Certificate"));

    if (!process_version (&cert->priv->cert->version, &subitem))
        return FALSE;
    e_asn1_object_append_child (sequence, subitem);
    g_object_unref (subitem);

    if (!process_serial_number_der (&cert->priv->cert->serialNumber, &subitem))
        return FALSE;
    e_asn1_object_append_child (sequence, subitem);
    g_object_unref (subitem);

    if (!process_sec_algorithm_id (&cert->priv->cert->signature, &subitem))
        return FALSE;
    e_asn1_object_set_display_name (subitem, _("Certificate Signature Algorithm"));
    e_asn1_object_append_child (sequence, subitem);
    g_object_unref (subitem);

    process_name (&cert->priv->cert->issuer, &text);
    subitem = e_asn1_object_new ();
    e_asn1_object_set_display_value (subitem, text);
    g_free (text);

    e_asn1_object_set_display_name (subitem, _("Issuer"));
    e_asn1_object_append_child (sequence, subitem);
    g_object_unref (subitem);

#ifdef notyet
    nsCOMPtr < nsIASN1Sequence> validitySequence = new nsNSSASN1Sequence ();
    nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpValidity").get(),
                        text);
    validitySequence->SetDisplayName (text);
    asn1Objects->AppendElement (validitySequence, PR_FALSE);
    nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpNotBefore").get(),
                        text);
    nsCOMPtr < nsIX509CertValidity> validityData;
    GetValidity (getter_AddRefs (validityData));
    PRTime notBefore, notAfter;

    validityData->GetNotBefore (&notBefore);
    validityData->GetNotAfter (&notAfter);
    validityData = 0;
    rv = ProcessTime (notBefore, text.get (), validitySequence);
    if (NS_FAILED (rv))
        return rv;

    nssComponent->GetPIPNSSBundleString(NS_LITERAL_STRING("CertDumpNotAfter").get(),
                        text);
    rv = ProcessTime (notAfter, text.get (), validitySequence);
    if (NS_FAILED (rv))
        return rv;
#endif

    subitem = e_asn1_object_new ();
    e_asn1_object_set_display_name (subitem, _("Subject"));

    process_name (&cert->priv->cert->subject, &text);
    e_asn1_object_set_display_value (subitem, text);
    g_free (text);
    e_asn1_object_append_child (sequence, subitem);
    g_object_unref (subitem);

    if (!process_subject_public_key_info (
        &cert->priv->cert->subjectPublicKeyInfo, sequence))
        return FALSE;

    /* Is there an issuerUniqueID? */
    if (cert->priv->cert->issuerID.data) {
        /* The issuerID is encoded as a bit string.
         * The function ProcessRawBytes expects the
         * length to be in bytes, so let's convert the
         * length in a temporary SECItem
        */
        data.data = cert->priv->cert->issuerID.data;
        data.len  = cert->priv->cert->issuerID.len / 8;

        subitem = e_asn1_object_new ();

        e_asn1_object_set_display_name (subitem, _("Issuer Unique ID"));
        process_raw_bytes (&data, &text);
        e_asn1_object_set_display_value (subitem, text);
        g_free (text);

        e_asn1_object_append_child (sequence, subitem);
    }

    if (cert->priv->cert->subjectID.data) {
        /* The subjectID is encoded as a bit string.
         * The function ProcessRawBytes expects the
         * length to be in bytes, so let's convert the
         * length in a temporary SECItem
        */
        data.data = cert->priv->cert->issuerID.data;
        data.len  = cert->priv->cert->issuerID.len / 8;

        subitem = e_asn1_object_new ();

        e_asn1_object_set_display_name (subitem, _("Subject Unique ID"));
        process_raw_bytes (&data, &text);
        e_asn1_object_set_display_value (subitem, text);
        g_free (text);

        e_asn1_object_append_child (sequence, subitem);
    }
    if (cert->priv->cert->extensions) {
        if (!process_extensions (cert->priv->cert->extensions, sequence))
            return FALSE;
    }

    *seq = sequence;

    return TRUE;
}

static gboolean
create_asn1_struct (ECert *cert)
{
    EASN1Object *sequence;
    SECItem temp;
    gchar *text;

    cert->priv->asn1 = e_asn1_object_new ();

    e_asn1_object_set_display_name (cert->priv->asn1, e_cert_get_window_title (cert));

    /* This sequence will be contain the tbsCertificate, signatureAlgorithm,
     * and signatureValue. */

    if (!create_tbs_certificate_asn1_struct (cert, &sequence))
        return FALSE;
    e_asn1_object_append_child (cert->priv->asn1, sequence);
    g_object_unref (sequence);

    if (!process_sec_algorithm_id (
        &cert->priv->cert->signatureWrap.signatureAlgorithm, &sequence))
        return FALSE;
    e_asn1_object_set_display_name (
        sequence, _("Certificate Signature Algorithm"));
    e_asn1_object_append_child (cert->priv->asn1, sequence);
    g_object_unref (sequence);

    sequence = e_asn1_object_new ();
    e_asn1_object_set_display_name (
        sequence, _("Certificate Signature Value"));

    /* The signatureWrap is encoded as a bit string.
     * The function ProcessRawBytes expects the
     * length to be in bytes, so let's convert the
     * length in a temporary SECItem */
    temp.data = cert->priv->cert->signatureWrap.signature.data;
    temp.len  = cert->priv->cert->signatureWrap.signature.len / 8;
    process_raw_bytes (&temp, &text);
    e_asn1_object_set_display_value (sequence, text);
    e_asn1_object_append_child (cert->priv->asn1, sequence);
    g_free (text);

    return TRUE;
}

EASN1Object *
e_cert_get_asn1_struct (ECert *cert)
{
    if (!cert->priv->asn1)
        create_asn1_struct (cert);

    return g_object_ref (cert->priv->asn1);
}

gboolean
e_cert_mark_for_deletion (ECert *cert)
{
    /* nsNSSShutDownPreventionLock locker; */

#if 0
    /* make sure user is logged in to the token */
    nsCOMPtr < nsIInterfaceRequestor> ctx = new PipUIContext ();
#endif

    if (PK11_NeedLogin (cert->priv->cert->slot)
        && !PK11_NeedUserInit (cert->priv->cert->slot)
        && !PK11_IsInternal (cert->priv->cert->slot)) {
        if (PK11_Authenticate (
            cert->priv->cert->slot, PR_TRUE, NULL) != SECSuccess) {
            return FALSE;
        }
    }

    cert->priv->delete = TRUE;

    return TRUE;
}

ECertType
e_cert_get_cert_type (ECert *ecert)
{
    const gchar *nick = e_cert_get_nickname (ecert);
    const gchar *email = e_cert_get_email (ecert);
    CERTCertificate *cert = ecert->priv->cert;

    if (nick) {
        if (e_cert_trust_has_any_user (cert->trust))
            return E_CERT_USER;
        if (e_cert_trust_has_any_ca (cert->trust)
            || CERT_IsCACert (cert,NULL))
            return E_CERT_CA;
        if (e_cert_trust_has_peer (cert->trust, PR_TRUE, PR_FALSE, PR_FALSE))
            return E_CERT_SITE;
    }
    if (email && e_cert_trust_has_peer (cert->trust, PR_FALSE, PR_TRUE, PR_FALSE))
        return E_CERT_CONTACT;

    return E_CERT_UNKNOWN;
}