aboutsummaryrefslogblamecommitdiffstats
path: root/smime/lib/e-pkcs12.c
blob: bc6377a0a1429f213e42c64d860ce3f50becf083 (plain) (tree)
1
2
3
4
5
6
7
8
9
10
                                                                           
                                                                    
                                                           
  
                                    
  



                                                                              
  



                                                                             
  
                                                        
  



                                                                        
  










                                                                             

   




                                                        



                    
                        
                    
                       




                   

                                              
                      



                     
                




                     
                                                           
                                                                                 
 
                                          
 








                                       
                                                

           
                                         
 




                           

 
         

                   
                                                  


               


                                                


                                                  

                                      


                       
                                  

                                
                                                      





                                                          


                                     
 
                                                         
                                                   
                                                             

                                                      
                                         









                                                
                                                              

                                                                    
               


                                   
 
                      
 



                                                                

                     
                                            

                                            
                            
 
                                                                              
 
                                    


                                                                                       

                                                      
                 
 

                              
 
                                                    






                                




                                              

                                                
                    



                                             
 
                            

                           


                                                               





                                                    
                                    






                                                                      






                                                        
             

                                                          
                                                                  

                                         

                                 





                                            
                             

                                                                      
                             

                                                
                             



                                                                           

                                                                       
                                
                                                                 

                                           
                                                
                         
                                                     
         
                                
                
                                              



                    


                                             



                                               
                           
 
                                                      
 
                                          
 

                                                               
 
            
                                                                                     





                                  



                                           
 
                     


                                                                    
                                                                        
                            


                                     

                                                 


                                                            

                          
                           


                                                                            









                                                                                  




                                                                                 










                                                                                        







                                                                                       
                                                                         



                                                         
                                               




                                                

                                                           


                        
               
                         

                                              
 
                     
 
/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */
/* The following is the mozilla license blurb, as the bodies some of
 * these functions were derived from the mozilla source. */
/*
 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
 *
 * The contents of this file are subject to the Mozilla Public License Version
 * 1.1 (the "License"); you may not use this file except in compliance with
 * the License. You may obtain a copy of the License at
 * http://www.mozilla.org/MPL/
 *
 * Software distributed under the License is distributed on an "AS IS" basis,
 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
 * for the specific language governing rights and limitations under the
 * License.
 *
 * The Original Code is the Netscape security libraries.
 *
 * The Initial Developer of the Original Code is
 * Netscape Communications Corporation.
 * Portions created by the Initial Developer are Copyright (C) 1994-2000
 * the Initial Developer. All Rights Reserved.
 *
 * Alternatively, the contents of this file may be used under the terms of
 * either the GNU General Public License Version 2 or later (the "GPL"), or
 * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
 * in which case the provisions of the GPL or the LGPL are applicable instead
 * of those above. If you wish to allow use of your version of this file only
 * under the terms of either the GPL or the LGPL, and not to allow others to
 * use your version of this file under the terms of the MPL, indicate your
 * decision by deleting the provisions above and replace them with the notice
 * and other provisions required by the GPL or the LGPL. If you do not delete
 * the provisions above, a recipient may use your version of this file under
 * the terms of any one of the MPL, the GPL or the LGPL.
 */

/*
 * Author: Chris Toshok (toshok@ximian.com)
 *
 * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com)
 */
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif

#include <glib/gstdio.h>
#include <gtk/gtk.h>
#include <glib/gi18n.h>

#include <time.h>
#include <fcntl.h>
#include <unistd.h>

#include <libedataserverui/libedataserverui.h>

#include "e-cert-db.h"
#include "e-pkcs12.h"

#include "prmem.h"
#include "nss.h"
#include "ssl.h"
#include "pkcs12.h"
#include "p12plcy.h"
#include "pk11func.h"
#include "secerr.h"

/* static callback functions for the NSS PKCS#12 library */
static SECItem * PR_CALLBACK nickname_collision (SECItem *, PRBool *, gpointer );

static gboolean handle_error (gint myerr);

#define PKCS12_BUFFER_SIZE         2048
#define PKCS12_RESTORE_OK          1
#define PKCS12_BACKUP_OK           2
#define PKCS12_USER_CANCELED       3
#define PKCS12_NOSMARTCARD_EXPORT  4
#define PKCS12_RESTORE_FAILED      5
#define PKCS12_BACKUP_FAILED       6
#define PKCS12_NSS_ERROR           7

G_DEFINE_TYPE (EPKCS12, e_pkcs12, G_TYPE_OBJECT)

static void
e_pkcs12_class_init (EPKCS12Class *class)
{
}

static void
e_pkcs12_init (EPKCS12 *ec)
{
}

EPKCS12 *
e_pkcs12_new (void)
{
    return g_object_new (E_TYPE_PKCS12, NULL);
}

static gboolean
input_to_decoder (SEC_PKCS12DecoderContext *dcx,
                  const gchar *path,
                  GError **error)
{
    /*  nsNSSShutDownPreventionLock locker; */
    SECStatus srv;
    gint amount;
    gchar buf[PKCS12_BUFFER_SIZE];
    FILE *fp;

    /* open path */
    fp = g_fopen (path, "rb");
    if (!fp) {
        /* XXX gerror */
        printf ("couldn't open '%s'\n", path);
        return FALSE;
    }

    while (TRUE) {
        amount = fread (buf, 1, sizeof (buf), fp);
        if (amount < 0) {
            fclose (fp);
            return FALSE;
        }

        /* feed the file data into the decoder */
        srv = SEC_PKCS12DecoderUpdate (dcx,
                          (guchar *) buf,
                          amount);
        if (srv) {
            /* XXX g_error */
            fclose (fp);
            return FALSE;
        }
        if (amount < PKCS12_BUFFER_SIZE)
            break;
    }
    fclose (fp);
    return TRUE;
}

/* XXX toshok - this needs to be done using a signal as in the
 * e_cert_db_login_to_slot stuff, instead of a direct gui dep here..
 * for now, though, it stays. */
static gboolean
prompt_for_password (gchar *title,
                     gchar *prompt,
                     SECItem *pwd)
{
    gchar *passwd;

    passwd = e_passwords_ask_password (
        title, NULL, "", prompt,
        E_PASSWORDS_REMEMBER_NEVER | E_PASSWORDS_SECRET,
        NULL, NULL);

    if (passwd) {
        gsize len = strlen (passwd);
        const gchar *inptr = passwd;
        guchar *outptr;
        gunichar2 c;

        SECITEM_AllocItem (NULL, pwd, sizeof (gunichar2) * (len + 1));

        outptr =  pwd->data;
        while (inptr && (c = (gunichar2) (g_utf8_get_char (inptr) & 0xffff))) {
            inptr = g_utf8_next_char (inptr);
            c = GUINT16_TO_BE (c);
            *outptr++ = ((gchar *) &c)[0];
            *outptr++ = ((gchar *) &c)[1];
        }

        outptr[0] = 0;
        outptr[1] = 0;

        memset (passwd, 0, strlen (passwd));
        g_free (passwd);
    }

    return TRUE;
}

static gboolean
import_from_file_helper (EPKCS12 *pkcs12,
                         PK11SlotInfo *slot,
                         const gchar *path,
                         gboolean *aWantRetry,
                         GError **error)
{
    /*nsNSSShutDownPreventionLock locker; */
    gboolean rv;
    SECStatus srv = SECSuccess;
    SEC_PKCS12DecoderContext *dcx = NULL;
    SECItem passwd;
    GError *err = NULL;

    *aWantRetry = FALSE;

    passwd.data = NULL;
    rv = prompt_for_password (
        _("PKCS12 File Password"),
        _("Enter password for PKCS12 file:"), &passwd);
    if (!rv) goto finish;
    if (passwd.data == NULL) {
        handle_error (PKCS12_USER_CANCELED);
        return TRUE;
    }

    /* initialize the decoder */
    dcx = SEC_PKCS12DecoderStart (&passwd,
                      slot,
                      /* we specify NULL for all the
                     funcs + data so it'll use the
                     default pk11wrap functions */
                      NULL, NULL, NULL,
                      NULL, NULL, NULL);
    if (!dcx) {
        srv = SECFailure;
        goto finish;
    }
    /* read input file and feed it to the decoder */
    rv = input_to_decoder (dcx, path, &err);
    if (!rv) {
#ifdef notyet
        /* XXX we need this to check the gerror */
        if (NS_ERROR_ABORT == rv) {
            /* inputToDecoder indicated a NSS error */
            srv = SECFailure;
        }
#else
        srv = SECFailure;
#endif
        goto finish;
    }

    /* verify the blob */
    srv = SEC_PKCS12DecoderVerify (dcx);
    if (srv) goto finish;
    /* validate bags */
    srv = SEC_PKCS12DecoderValidateBags (dcx, nickname_collision);
    if (srv) goto finish;
    /* import cert and key */
    srv = SEC_PKCS12DecoderImportBags (dcx);
    if (srv) goto finish;
    /* Later - check to see if this should become default email cert */
    handle_error (PKCS12_RESTORE_OK);
 finish:
    /* If srv != SECSuccess, NSS probably set a specific error code.
     * We should use that error code instead of inventing a new one
     * for every error possible. */
    if (srv != SECSuccess) {
        if (SEC_ERROR_BAD_PASSWORD == PORT_GetError ()) {
            *aWantRetry = TRUE;
        }
        handle_error (PKCS12_NSS_ERROR);
    } else if (!rv) {
        handle_error (PKCS12_RESTORE_FAILED);
    }
    /* finish the decoder */
    if (dcx)
        SEC_PKCS12DecoderFinish (dcx);
    return TRUE;
}

gboolean
e_pkcs12_import_from_file (EPKCS12 *pkcs12,
                           const gchar *path,
                           GError **error)
{
    /*nsNSSShutDownPreventionLock locker;*/
    gboolean rv = TRUE;
    gboolean wantRetry;
    PK11SlotInfo *slot;

    printf ("importing pkcs12 from '%s'\n", path);

    slot = PK11_GetInternalKeySlot ();

    if (!e_cert_db_login_to_slot (e_cert_db_peek (), slot))
        return FALSE;

    do {
        rv = import_from_file_helper (pkcs12, slot, path, &wantRetry, error);
    } while (rv && wantRetry);

    return rv;
}

gboolean
e_pkcs12_export_to_file (EPKCS12 *pkcs12,
                         const gchar *path,
                         GList *certs,
                         GError **error)
{
    return FALSE;
}

/* what to do when the nickname collides with one already in the db.
 * TODO: not handled, throw a dialog allowing the nick to be changed? */
static SECItem * PR_CALLBACK
nickname_collision (SECItem *oldNick,
                    PRBool *cancel,
                    gpointer wincx)
{
    /* nsNSSShutDownPreventionLock locker; */
    gint count = 1;
    gchar *nickname = NULL;
    gchar *default_nickname = _("Imported Certificate");
    SECItem *new_nick;

    *cancel = PR_FALSE;
    printf ("nickname_collision\n");

    /* The user is trying to import a PKCS#12 file that doesn't have the
     * attribute we use to set the nickname.  So in order to reduce the
     * number of interactions we require with the user, we'll build a nickname
     * for the user.  The nickname isn't prominently displayed in the UI,
     * so it's OK if we generate one on our own here.
     * XXX If the NSS API were smarter and actually passed a pointer to
     *     the CERTCertificate * we're importing we could actually just
     *     call default_nickname (which is what the issuance code path
     *     does) and come up with a reasonable nickname.  Alas, the NSS
     *     API limits our ability to produce a useful nickname without
     *     bugging the user.  :(
    */
    while (1) {
        CERTCertificate *cert;

        /* If we've gotten this far, that means there isn't a certificate
         * in the database that has the same subject name as the cert we're
         * trying to import.  So we need to come up with a "nickname" to
         * satisfy the NSS requirement or fail in trying to import.
         * Basically we use a default nickname from a properties file and
         * see if a certificate exists with that nickname.  If there isn't, then
         * create update the count by one and append the string '#1' Or
         * whatever the count currently is, and look for a cert with
         * that nickname.  Keep updating the count until we find a nickname
         * without a corresponding cert.
         * XXX If a user imports *many * certs without the 'friendly name'
         * attribute, then this may take a long time.  :(
        */
        if (count > 1) {
            g_free (nickname);
            nickname = g_strdup_printf ("%s #%d", default_nickname, count);
        } else {
            g_free (nickname);
            nickname = g_strdup (default_nickname);
        }
        cert = CERT_FindCertByNickname (CERT_GetDefaultCertDB (),
                           nickname);
        if (!cert) {
            break;
        }
        CERT_DestroyCertificate (cert);
        count++;
    }

    new_nick = PR_Malloc (sizeof (SECItem));
    new_nick->type = siAsciiString;
    new_nick->data = (guchar *) nickname;
    new_nick->len  = strlen ((gchar *) new_nick->data);
    return new_nick;
}

static gboolean
handle_error (gint myerr)
{
    printf ("handle_error (%d)\n", myerr);

    return FALSE;
}