Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(48)

Side by Side Diff: net/third_party/mozilla_security_manager/nsPKCS12Blob.cpp

Issue 3189014: NSS cert database cleanups (Closed) Base URL: git://codf21.jail/chromium.git
Patch Set: indentation, terminology, syntax Created 10 years, 4 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/base/cert_database_nss_unittest.cc ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* ***** BEGIN LICENSE BLOCK ***** 1 /* ***** BEGIN LICENSE BLOCK *****
2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1
3 * 3 *
4 * The contents of this file are subject to the Mozilla Public License Version 4 * The contents of this file are subject to the Mozilla Public License Version
5 * 1.1 (the "License"); you may not use this file except in compliance with 5 * 1.1 (the "License"); you may not use this file except in compliance with
6 * the License. You may obtain a copy of the License at 6 * the License. You may obtain a copy of the License at
7 * http://www.mozilla.org/MPL/ 7 * http://www.mozilla.org/MPL/
8 * 8 *
9 * Software distributed under the License is distributed on an "AS IS" basis, 9 * Software distributed under the License is distributed on an "AS IS" basis,
10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
(...skipping 24 matching lines...) Expand all
35 * 35 *
36 * ***** END LICENSE BLOCK ***** */ 36 * ***** END LICENSE BLOCK ***** */
37 37
38 #include "net/third_party/mozilla_security_manager/nsPKCS12Blob.h" 38 #include "net/third_party/mozilla_security_manager/nsPKCS12Blob.h"
39 39
40 #include <pk11pub.h> 40 #include <pk11pub.h>
41 #include <pkcs12.h> 41 #include <pkcs12.h>
42 #include <p12plcy.h> 42 #include <p12plcy.h>
43 #include <secerr.h> 43 #include <secerr.h>
44 44
45 #include "base/crypto/scoped_nss_types.h"
45 #include "base/logging.h" 46 #include "base/logging.h"
46 #include "base/nss_util_internal.h" 47 #include "base/nss_util_internal.h"
47 #include "base/string_util.h" 48 #include "base/string_util.h"
48 #include "net/base/net_errors.h" 49 #include "net/base/net_errors.h"
49 #include "net/base/x509_certificate.h" 50 #include "net/base/x509_certificate.h"
50 51
51 namespace mozilla_security_manager { 52 namespace mozilla_security_manager {
52 53
53 namespace { 54 namespace {
54 55
(...skipping 198 matching lines...) Expand 10 before | Expand all | Expand 10 after
253 } // namespace 254 } // namespace
254 255
255 void EnsurePKCS12Init() { 256 void EnsurePKCS12Init() {
256 Singleton<PKCS12InitSingleton>::get(); 257 Singleton<PKCS12InitSingleton>::get();
257 } 258 }
258 259
259 // Based on nsPKCS12Blob::ImportFromFile. 260 // Based on nsPKCS12Blob::ImportFromFile.
260 int nsPKCS12Blob_Import(const char* pkcs12_data, 261 int nsPKCS12Blob_Import(const char* pkcs12_data,
261 size_t pkcs12_len, 262 size_t pkcs12_len,
262 const string16& password) { 263 const string16& password) {
263 PK11SlotInfo *slot = base::GetDefaultNSSKeySlot(); 264 base::ScopedPK11Slot slot(base::GetDefaultNSSKeySlot());
264 if (!slot) { 265 if (!slot.get()) {
265 LOG(ERROR) << "Couldn't get Internal key slot!"; 266 LOG(ERROR) << "Couldn't get Internal key slot!";
266 return net::ERR_PKCS12_IMPORT_FAILED; 267 return net::ERR_PKCS12_IMPORT_FAILED;
267 } 268 }
268 269
269 int rv = nsPKCS12Blob_ImportHelper(pkcs12_data, pkcs12_len, password, false, 270 int rv = nsPKCS12Blob_ImportHelper(pkcs12_data, pkcs12_len, password, false,
270 slot); 271 slot.get());
271 272
272 // When the user entered a zero length password: 273 // When the user entered a zero length password:
273 // An empty password should be represented as an empty 274 // An empty password should be represented as an empty
274 // string (a SECItem that contains a single terminating 275 // string (a SECItem that contains a single terminating
275 // NULL UTF16 character), but some applications use a 276 // NULL UTF16 character), but some applications use a
276 // zero length SECItem. 277 // zero length SECItem.
277 // We try both variations, zero length item and empty string, 278 // We try both variations, zero length item and empty string,
278 // without giving a user prompt when trying the different empty password fla vors. 279 // without giving a user prompt when trying the different empty password fla vors.
279 if (rv == net::ERR_PKCS12_IMPORT_BAD_PASSWORD && password.size() == 0) { 280 if (rv == net::ERR_PKCS12_IMPORT_BAD_PASSWORD && password.size() == 0) {
280 rv = nsPKCS12Blob_ImportHelper(pkcs12_data, pkcs12_len, password, true, 281 rv = nsPKCS12Blob_ImportHelper(pkcs12_data, pkcs12_len, password, true,
281 slot); 282 slot.get());
282 } 283 }
283
284 PK11_FreeSlot(slot);
285 return rv; 284 return rv;
286 } 285 }
287 286
288 // Based on nsPKCS12Blob::ExportToFile 287 // Based on nsPKCS12Blob::ExportToFile
289 // 288 //
290 // Having already loaded the certs, form them into a blob (loading the keys 289 // Having already loaded the certs, form them into a blob (loading the keys
291 // also), encode the blob, and stuff it into the file. 290 // also), encode the blob, and stuff it into the file.
292 // 291 //
293 // TODO: handle slots correctly 292 // TODO: handle slots correctly
294 // mirror "slotToUse" behavior from PSM 1.x 293 // mirror "slotToUse" behavior from PSM 1.x
(...skipping 93 matching lines...) Expand 10 before | Expand all | Expand 10 after
388 finish: 387 finish:
389 if (srv) 388 if (srv)
390 LOG(ERROR) << "PKCS#12 export failed with error " << PORT_GetError(); 389 LOG(ERROR) << "PKCS#12 export failed with error " << PORT_GetError();
391 if (ecx) 390 if (ecx)
392 SEC_PKCS12DestroyExportContext(ecx); 391 SEC_PKCS12DestroyExportContext(ecx);
393 SECITEM_ZfreeItem(&unicodePw, PR_FALSE); 392 SECITEM_ZfreeItem(&unicodePw, PR_FALSE);
394 return return_count; 393 return return_count;
395 } 394 }
396 395
397 } // namespace mozilla_security_manager 396 } // namespace mozilla_security_manager
OLDNEW
« no previous file with comments | « net/base/cert_database_nss_unittest.cc ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698