OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "chrome/browser/ui/webui/options2/certificate_manager_handler.h" |
| 6 |
| 7 #include "base/bind.h" |
| 8 #include "base/bind_helpers.h" |
| 9 #include "base/file_util.h" // for FileAccessProvider |
| 10 #include "base/memory/scoped_vector.h" |
| 11 #include "base/safe_strerror_posix.h" |
| 12 #include "base/string_number_conversions.h" |
| 13 #include "base/values.h" |
| 14 #include "chrome/browser/browser_process.h" |
| 15 #include "chrome/browser/certificate_viewer.h" |
| 16 #include "chrome/browser/ui/certificate_dialogs.h" |
| 17 #include "chrome/browser/ui/crypto_module_password_dialog.h" |
| 18 #include "content/browser/tab_contents/tab_contents.h" |
| 19 #include "content/browser/tab_contents/tab_contents_view.h" |
| 20 #include "content/public/browser/browser_thread.h" // for FileAccessProvider |
| 21 #include "grit/generated_resources.h" |
| 22 #include "net/base/crypto_module.h" |
| 23 #include "net/base/x509_certificate.h" |
| 24 #include "ui/base/l10n/l10n_util.h" |
| 25 #include "ui/base/l10n/l10n_util_collator.h" |
| 26 |
| 27 #if defined(OS_CHROMEOS) |
| 28 #include "chrome/browser/chromeos/cros/cros_library.h" |
| 29 #include "chrome/browser/chromeos/cros/cryptohome_library.h" |
| 30 #endif |
| 31 |
| 32 using content::BrowserThread; |
| 33 |
| 34 namespace { |
| 35 |
| 36 static const char kKeyId[] = "id"; |
| 37 static const char kSubNodesId[] = "subnodes"; |
| 38 static const char kNameId[] = "name"; |
| 39 static const char kReadOnlyId[] = "readonly"; |
| 40 static const char kUntrustedId[] = "untrusted"; |
| 41 static const char kSecurityDeviceId[] = "device"; |
| 42 static const char kErrorId[] = "error"; |
| 43 |
| 44 // Enumeration of different callers of SelectFile. (Start counting at 1 so |
| 45 // if SelectFile is accidentally called with params=NULL it won't match any.) |
| 46 enum { |
| 47 EXPORT_PERSONAL_FILE_SELECTED = 1, |
| 48 IMPORT_PERSONAL_FILE_SELECTED, |
| 49 IMPORT_SERVER_FILE_SELECTED, |
| 50 IMPORT_CA_FILE_SELECTED, |
| 51 }; |
| 52 |
| 53 // TODO(mattm): These are duplicated from cookies_view_handler.cc |
| 54 // Encodes a pointer value into a hex string. |
| 55 std::string PointerToHexString(const void* pointer) { |
| 56 return base::HexEncode(&pointer, sizeof(pointer)); |
| 57 } |
| 58 |
| 59 // Decodes a pointer from a hex string. |
| 60 void* HexStringToPointer(const std::string& str) { |
| 61 std::vector<uint8> buffer; |
| 62 if (!base::HexStringToBytes(str, &buffer) || |
| 63 buffer.size() != sizeof(void*)) { |
| 64 return NULL; |
| 65 } |
| 66 |
| 67 return *reinterpret_cast<void**>(&buffer[0]); |
| 68 } |
| 69 |
| 70 std::string OrgNameToId(const std::string& org) { |
| 71 return "org-" + org; |
| 72 } |
| 73 |
| 74 std::string CertToId(const net::X509Certificate& cert) { |
| 75 return "cert-" + PointerToHexString(&cert); |
| 76 } |
| 77 |
| 78 net::X509Certificate* IdToCert(const std::string& id) { |
| 79 if (!StartsWithASCII(id, "cert-", true)) |
| 80 return NULL; |
| 81 return reinterpret_cast<net::X509Certificate*>( |
| 82 HexStringToPointer(id.substr(5))); |
| 83 } |
| 84 |
| 85 net::X509Certificate* CallbackArgsToCert(const ListValue* args) { |
| 86 std::string node_id; |
| 87 if (!args->GetString(0, &node_id)){ |
| 88 return NULL; |
| 89 } |
| 90 net::X509Certificate* cert = IdToCert(node_id); |
| 91 if (!cert) { |
| 92 NOTREACHED(); |
| 93 return NULL; |
| 94 } |
| 95 return cert; |
| 96 } |
| 97 |
| 98 bool CallbackArgsToBool(const ListValue* args, int index, bool* result) { |
| 99 std::string string_value; |
| 100 if (!args->GetString(index, &string_value)) |
| 101 return false; |
| 102 |
| 103 *result = string_value[0] == 't'; |
| 104 return true; |
| 105 } |
| 106 |
| 107 struct DictionaryIdComparator { |
| 108 explicit DictionaryIdComparator(icu::Collator* collator) |
| 109 : collator_(collator) { |
| 110 } |
| 111 |
| 112 bool operator()(const Value* a, |
| 113 const Value* b) const { |
| 114 DCHECK(a->GetType() == Value::TYPE_DICTIONARY); |
| 115 DCHECK(b->GetType() == Value::TYPE_DICTIONARY); |
| 116 const DictionaryValue* a_dict = reinterpret_cast<const DictionaryValue*>(a); |
| 117 const DictionaryValue* b_dict = reinterpret_cast<const DictionaryValue*>(b); |
| 118 string16 a_str; |
| 119 string16 b_str; |
| 120 a_dict->GetString(kNameId, &a_str); |
| 121 b_dict->GetString(kNameId, &b_str); |
| 122 if (collator_ == NULL) |
| 123 return a_str < b_str; |
| 124 return l10n_util::CompareString16WithCollator( |
| 125 collator_, a_str, b_str) == UCOL_LESS; |
| 126 } |
| 127 |
| 128 icu::Collator* collator_; |
| 129 }; |
| 130 |
| 131 std::string NetErrorToString(int net_error) { |
| 132 switch (net_error) { |
| 133 // TODO(mattm): handle more cases. |
| 134 case net::ERR_IMPORT_CA_CERT_NOT_CA: |
| 135 return l10n_util::GetStringUTF8(IDS_CERT_MANAGER_ERROR_NOT_CA); |
| 136 default: |
| 137 return l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR); |
| 138 } |
| 139 } |
| 140 |
| 141 } // namespace |
| 142 |
| 143 /////////////////////////////////////////////////////////////////////////////// |
| 144 // FileAccessProvider |
| 145 |
| 146 // TODO(mattm): Move to some shared location? |
| 147 class FileAccessProvider |
| 148 : public base::RefCountedThreadSafe<FileAccessProvider>, |
| 149 public CancelableRequestProvider { |
| 150 public: |
| 151 // Reports 0 on success or errno on failure, and the data of the file upon |
| 152 // success. |
| 153 // TODO(mattm): don't pass std::string by value.. could use RefCountedBytes |
| 154 // but it's a vector. Maybe do the derive from CancelableRequest thing |
| 155 // described in cancelable_request.h? |
| 156 typedef Callback2<int, std::string>::Type ReadCallback; |
| 157 |
| 158 // Reports 0 on success or errno on failure, and the number of bytes written, |
| 159 // on success. |
| 160 typedef Callback2<int, int>::Type WriteCallback; |
| 161 |
| 162 Handle StartRead(const FilePath& path, |
| 163 CancelableRequestConsumerBase* consumer, |
| 164 ReadCallback* callback); |
| 165 Handle StartWrite(const FilePath& path, |
| 166 const std::string& data, |
| 167 CancelableRequestConsumerBase* consumer, |
| 168 WriteCallback* callback); |
| 169 |
| 170 private: |
| 171 void DoRead(scoped_refptr<CancelableRequest<ReadCallback> > request, |
| 172 FilePath path); |
| 173 void DoWrite(scoped_refptr<CancelableRequest<WriteCallback> > request, |
| 174 FilePath path, |
| 175 std::string data); |
| 176 }; |
| 177 |
| 178 CancelableRequestProvider::Handle FileAccessProvider::StartRead( |
| 179 const FilePath& path, |
| 180 CancelableRequestConsumerBase* consumer, |
| 181 FileAccessProvider::ReadCallback* callback) { |
| 182 scoped_refptr<CancelableRequest<ReadCallback> > request( |
| 183 new CancelableRequest<ReadCallback>(callback)); |
| 184 AddRequest(request, consumer); |
| 185 |
| 186 // Send the parameters and the request to the file thread. |
| 187 BrowserThread::PostTask( |
| 188 BrowserThread::FILE, FROM_HERE, |
| 189 base::Bind(&FileAccessProvider::DoRead, this, request, path)); |
| 190 |
| 191 // The handle will have been set by AddRequest. |
| 192 return request->handle(); |
| 193 } |
| 194 |
| 195 CancelableRequestProvider::Handle FileAccessProvider::StartWrite( |
| 196 const FilePath& path, |
| 197 const std::string& data, |
| 198 CancelableRequestConsumerBase* consumer, |
| 199 WriteCallback* callback) { |
| 200 scoped_refptr<CancelableRequest<WriteCallback> > request( |
| 201 new CancelableRequest<WriteCallback>(callback)); |
| 202 AddRequest(request, consumer); |
| 203 |
| 204 // Send the parameters and the request to the file thWrite. |
| 205 BrowserThread::PostTask( |
| 206 BrowserThread::FILE, FROM_HERE, |
| 207 base::Bind(&FileAccessProvider::DoWrite, this, request, path, data)); |
| 208 |
| 209 // The handle will have been set by AddRequest. |
| 210 return request->handle(); |
| 211 } |
| 212 |
| 213 void FileAccessProvider::DoRead( |
| 214 scoped_refptr<CancelableRequest<ReadCallback> > request, |
| 215 FilePath path) { |
| 216 if (request->canceled()) |
| 217 return; |
| 218 |
| 219 std::string data; |
| 220 VLOG(1) << "DoRead starting read"; |
| 221 bool success = file_util::ReadFileToString(path, &data); |
| 222 int saved_errno = success ? 0 : errno; |
| 223 VLOG(1) << "DoRead done read: " << success << " " << data.size(); |
| 224 request->ForwardResult(ReadCallback::TupleType(saved_errno, data)); |
| 225 } |
| 226 |
| 227 void FileAccessProvider::DoWrite( |
| 228 scoped_refptr<CancelableRequest<WriteCallback> > request, |
| 229 FilePath path, |
| 230 std::string data) { |
| 231 VLOG(1) << "DoWrite starting write"; |
| 232 int bytes_written = file_util::WriteFile(path, data.data(), data.size()); |
| 233 int saved_errno = bytes_written >= 0 ? 0 : errno; |
| 234 VLOG(1) << "DoWrite done write " << bytes_written; |
| 235 |
| 236 if (request->canceled()) |
| 237 return; |
| 238 |
| 239 request->ForwardResult(WriteCallback::TupleType(saved_errno, bytes_written)); |
| 240 } |
| 241 |
| 242 /////////////////////////////////////////////////////////////////////////////// |
| 243 // CertificateManagerHandler |
| 244 |
| 245 CertificateManagerHandler::CertificateManagerHandler() |
| 246 : file_access_provider_(new FileAccessProvider) { |
| 247 certificate_manager_model_.reset(new CertificateManagerModel(this)); |
| 248 } |
| 249 |
| 250 CertificateManagerHandler::~CertificateManagerHandler() { |
| 251 } |
| 252 |
| 253 void CertificateManagerHandler::GetLocalizedValues( |
| 254 DictionaryValue* localized_strings) { |
| 255 DCHECK(localized_strings); |
| 256 |
| 257 RegisterTitle(localized_strings, "certificateManagerPage", |
| 258 IDS_CERTIFICATE_MANAGER_TITLE); |
| 259 |
| 260 // Tabs. |
| 261 localized_strings->SetString("personalCertsTabTitle", |
| 262 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PERSONAL_CERTS_TAB_LABEL)); |
| 263 localized_strings->SetString("serverCertsTabTitle", |
| 264 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERVER_CERTS_TAB_LABEL)); |
| 265 localized_strings->SetString("caCertsTabTitle", |
| 266 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_CERT_AUTHORITIES_TAB_LABEL)); |
| 267 localized_strings->SetString("unknownCertsTabTitle", |
| 268 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNKNOWN_TAB_LABEL)); |
| 269 |
| 270 // Tab descriptions. |
| 271 localized_strings->SetString("personalCertsTabDescription", |
| 272 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_USER_TREE_DESCRIPTION)); |
| 273 localized_strings->SetString("serverCertsTabDescription", |
| 274 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERVER_TREE_DESCRIPTION)); |
| 275 localized_strings->SetString("caCertsTabDescription", |
| 276 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_AUTHORITIES_TREE_DESCRIPTION)); |
| 277 localized_strings->SetString("unknownCertsTabDescription", |
| 278 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNKNOWN_TREE_DESCRIPTION)); |
| 279 |
| 280 // Tree columns. |
| 281 localized_strings->SetString("certNameColumn", |
| 282 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_NAME_COLUMN_LABEL)); |
| 283 localized_strings->SetString("certDeviceColumn", |
| 284 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DEVICE_COLUMN_LABEL)); |
| 285 localized_strings->SetString("certSerialColumn", |
| 286 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERIAL_NUMBER_COLUMN_LABEL)); |
| 287 localized_strings->SetString("certExpiresColumn", |
| 288 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPIRES_COLUMN_LABEL)); |
| 289 |
| 290 // Buttons. |
| 291 localized_strings->SetString("view_certificate", |
| 292 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_VIEW_CERT_BUTTON)); |
| 293 localized_strings->SetString("import_certificate", |
| 294 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_BUTTON)); |
| 295 localized_strings->SetString("export_certificate", |
| 296 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_BUTTON)); |
| 297 localized_strings->SetString("export_all_certificates", |
| 298 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_ALL_BUTTON)); |
| 299 localized_strings->SetString("edit_certificate", |
| 300 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_BUTTON)); |
| 301 localized_strings->SetString("delete_certificate", |
| 302 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_BUTTON)); |
| 303 |
| 304 // Certificate Delete overlay strings. |
| 305 localized_strings->SetString("personalCertsTabDeleteConfirm", |
| 306 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_USER_FORMAT)); |
| 307 localized_strings->SetString("personalCertsTabDeleteImpact", |
| 308 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_USER_DESCRIPTION)); |
| 309 localized_strings->SetString("serverCertsTabDeleteConfirm", |
| 310 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_SERVER_FORMAT)); |
| 311 localized_strings->SetString("serverCertsTabDeleteImpact", |
| 312 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_SERVER_DESCRIPTION)); |
| 313 localized_strings->SetString("caCertsTabDeleteConfirm", |
| 314 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_CA_FORMAT)); |
| 315 localized_strings->SetString("caCertsTabDeleteImpact", |
| 316 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_CA_DESCRIPTION)); |
| 317 localized_strings->SetString("unknownCertsTabDeleteConfirm", |
| 318 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_UNKNOWN_FORMAT)); |
| 319 localized_strings->SetString("unknownCertsTabDeleteImpact", ""); |
| 320 |
| 321 // Certificate Restore overlay strings. |
| 322 localized_strings->SetString("certificateRestorePasswordDescription", |
| 323 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_RESTORE_PASSWORD_DESC)); |
| 324 localized_strings->SetString("certificatePasswordLabel", |
| 325 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PASSWORD_LABEL)); |
| 326 |
| 327 // Personal Certificate Export overlay strings. |
| 328 localized_strings->SetString("certificateExportPasswordDescription", |
| 329 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_PASSWORD_DESC)); |
| 330 localized_strings->SetString("certificateExportPasswordHelp", |
| 331 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_PASSWORD_HELP)); |
| 332 localized_strings->SetString("certificateConfirmPasswordLabel", |
| 333 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_CONFIRM_PASSWORD_LABEL)); |
| 334 |
| 335 // Edit CA Trust & Import CA overlay strings. |
| 336 localized_strings->SetString("certificateEditTrustLabel", |
| 337 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_TRUST_LABEL)); |
| 338 localized_strings->SetString("certificateEditCaTrustDescriptionFormat", |
| 339 l10n_util::GetStringUTF16( |
| 340 IDS_CERT_MANAGER_EDIT_CA_TRUST_DESCRIPTION_FORMAT)); |
| 341 localized_strings->SetString("certificateImportCaDescriptionFormat", |
| 342 l10n_util::GetStringUTF16( |
| 343 IDS_CERT_MANAGER_IMPORT_CA_DESCRIPTION_FORMAT)); |
| 344 localized_strings->SetString("certificateCaTrustSSLLabel", |
| 345 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_SSL_LABEL)); |
| 346 localized_strings->SetString("certificateCaTrustEmailLabel", |
| 347 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_EMAIL_LABEL)); |
| 348 localized_strings->SetString("certificateCaTrustObjSignLabel", |
| 349 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_OBJSIGN_LABEL)); |
| 350 localized_strings->SetString("certificateImportErrorFormat", |
| 351 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_ERROR_FORMAT)); |
| 352 |
| 353 // Badges next to certificates |
| 354 localized_strings->SetString("badgeCertUntrusted", |
| 355 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNTRUSTED)); |
| 356 |
| 357 #if defined(OS_CHROMEOS) |
| 358 localized_strings->SetString("importAndBindCertificate", |
| 359 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_AND_BIND_BUTTON)); |
| 360 localized_strings->SetString("hardwareBackedKeyFormat", |
| 361 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_HARDWARE_BACKED_KEY_FORMAT)); |
| 362 localized_strings->SetString("chromeOSDeviceName", |
| 363 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_HARDWARE_BACKED)); |
| 364 #endif // defined(OS_CHROMEOS) |
| 365 } |
| 366 |
| 367 void CertificateManagerHandler::RegisterMessages() { |
| 368 web_ui_->RegisterMessageCallback( |
| 369 "viewCertificate", |
| 370 base::Bind(&CertificateManagerHandler::View, base::Unretained(this))); |
| 371 |
| 372 web_ui_->RegisterMessageCallback( |
| 373 "getCaCertificateTrust", |
| 374 base::Bind(&CertificateManagerHandler::GetCATrust, |
| 375 base::Unretained(this))); |
| 376 web_ui_->RegisterMessageCallback( |
| 377 "editCaCertificateTrust", |
| 378 base::Bind(&CertificateManagerHandler::EditCATrust, |
| 379 base::Unretained(this))); |
| 380 |
| 381 web_ui_->RegisterMessageCallback( |
| 382 "editServerCertificate", |
| 383 base::Bind(&CertificateManagerHandler::EditServer, |
| 384 base::Unretained(this))); |
| 385 |
| 386 web_ui_->RegisterMessageCallback( |
| 387 "cancelImportExportCertificate", |
| 388 base::Bind(&CertificateManagerHandler::CancelImportExportProcess, |
| 389 base::Unretained(this))); |
| 390 |
| 391 web_ui_->RegisterMessageCallback( |
| 392 "exportPersonalCertificate", |
| 393 base::Bind(&CertificateManagerHandler::ExportPersonal, |
| 394 base::Unretained(this))); |
| 395 web_ui_->RegisterMessageCallback( |
| 396 "exportAllPersonalCertificates", |
| 397 base::Bind(&CertificateManagerHandler::ExportAllPersonal, |
| 398 base::Unretained(this))); |
| 399 web_ui_->RegisterMessageCallback( |
| 400 "exportPersonalCertificatePasswordSelected", |
| 401 base::Bind(&CertificateManagerHandler::ExportPersonalPasswordSelected, |
| 402 base::Unretained(this))); |
| 403 |
| 404 web_ui_->RegisterMessageCallback( |
| 405 "importPersonalCertificate", |
| 406 base::Bind(&CertificateManagerHandler::StartImportPersonal, |
| 407 base::Unretained(this))); |
| 408 web_ui_->RegisterMessageCallback( |
| 409 "importPersonalCertificatePasswordSelected", |
| 410 base::Bind(&CertificateManagerHandler::ImportPersonalPasswordSelected, |
| 411 base::Unretained(this))); |
| 412 |
| 413 web_ui_->RegisterMessageCallback( |
| 414 "importCaCertificate", |
| 415 base::Bind(&CertificateManagerHandler::ImportCA, |
| 416 base::Unretained(this))); |
| 417 web_ui_->RegisterMessageCallback( |
| 418 "importCaCertificateTrustSelected", |
| 419 base::Bind(&CertificateManagerHandler::ImportCATrustSelected, |
| 420 base::Unretained(this))); |
| 421 |
| 422 web_ui_->RegisterMessageCallback( |
| 423 "importServerCertificate", |
| 424 base::Bind(&CertificateManagerHandler::ImportServer, |
| 425 base::Unretained(this))); |
| 426 |
| 427 web_ui_->RegisterMessageCallback( |
| 428 "exportCertificate", |
| 429 base::Bind(&CertificateManagerHandler::Export, |
| 430 base::Unretained(this))); |
| 431 |
| 432 web_ui_->RegisterMessageCallback( |
| 433 "deleteCertificate", |
| 434 base::Bind(&CertificateManagerHandler::Delete, |
| 435 base::Unretained(this))); |
| 436 |
| 437 web_ui_->RegisterMessageCallback( |
| 438 "populateCertificateManager", |
| 439 base::Bind(&CertificateManagerHandler::Populate, |
| 440 base::Unretained(this))); |
| 441 |
| 442 #if defined(OS_CHROMEOS) |
| 443 web_ui_->RegisterMessageCallback( |
| 444 "checkTpmTokenReady", |
| 445 base::Bind(&CertificateManagerHandler::CheckTpmTokenReady, |
| 446 base::Unretained(this))); |
| 447 #endif |
| 448 } |
| 449 |
| 450 void CertificateManagerHandler::CertificatesRefreshed() { |
| 451 PopulateTree("personalCertsTab", net::USER_CERT); |
| 452 PopulateTree("serverCertsTab", net::SERVER_CERT); |
| 453 PopulateTree("caCertsTab", net::CA_CERT); |
| 454 PopulateTree("otherCertsTab", net::UNKNOWN_CERT); |
| 455 VLOG(1) << "populating finished"; |
| 456 } |
| 457 |
| 458 void CertificateManagerHandler::FileSelected(const FilePath& path, int index, |
| 459 void* params) { |
| 460 switch (reinterpret_cast<intptr_t>(params)) { |
| 461 case EXPORT_PERSONAL_FILE_SELECTED: |
| 462 ExportPersonalFileSelected(path); |
| 463 break; |
| 464 case IMPORT_PERSONAL_FILE_SELECTED: |
| 465 ImportPersonalFileSelected(path); |
| 466 break; |
| 467 case IMPORT_SERVER_FILE_SELECTED: |
| 468 ImportServerFileSelected(path); |
| 469 break; |
| 470 case IMPORT_CA_FILE_SELECTED: |
| 471 ImportCAFileSelected(path); |
| 472 break; |
| 473 default: |
| 474 NOTREACHED(); |
| 475 } |
| 476 } |
| 477 |
| 478 void CertificateManagerHandler::FileSelectionCanceled(void* params) { |
| 479 switch (reinterpret_cast<intptr_t>(params)) { |
| 480 case EXPORT_PERSONAL_FILE_SELECTED: |
| 481 case IMPORT_PERSONAL_FILE_SELECTED: |
| 482 case IMPORT_SERVER_FILE_SELECTED: |
| 483 case IMPORT_CA_FILE_SELECTED: |
| 484 ImportExportCleanup(); |
| 485 break; |
| 486 default: |
| 487 NOTREACHED(); |
| 488 } |
| 489 } |
| 490 |
| 491 void CertificateManagerHandler::View(const ListValue* args) { |
| 492 net::X509Certificate* cert = CallbackArgsToCert(args); |
| 493 if (!cert) |
| 494 return; |
| 495 ShowCertificateViewer(GetParentWindow(), cert); |
| 496 } |
| 497 |
| 498 void CertificateManagerHandler::GetCATrust(const ListValue* args) { |
| 499 net::X509Certificate* cert = CallbackArgsToCert(args); |
| 500 if (!cert) { |
| 501 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); |
| 502 return; |
| 503 } |
| 504 |
| 505 net::CertDatabase::TrustBits trust_bits = |
| 506 certificate_manager_model_->cert_db().GetCertTrust(cert, net::CA_CERT); |
| 507 base::FundamentalValue ssl_value( |
| 508 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_SSL)); |
| 509 base::FundamentalValue email_value( |
| 510 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_EMAIL)); |
| 511 base::FundamentalValue obj_sign_value( |
| 512 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_OBJ_SIGN)); |
| 513 web_ui_->CallJavascriptFunction( |
| 514 "CertificateEditCaTrustOverlay.populateTrust", |
| 515 ssl_value, email_value, obj_sign_value); |
| 516 } |
| 517 |
| 518 void CertificateManagerHandler::EditCATrust(const ListValue* args) { |
| 519 net::X509Certificate* cert = CallbackArgsToCert(args); |
| 520 bool fail = !cert; |
| 521 bool trust_ssl = false; |
| 522 bool trust_email = false; |
| 523 bool trust_obj_sign = false; |
| 524 fail |= !CallbackArgsToBool(args, 1, &trust_ssl); |
| 525 fail |= !CallbackArgsToBool(args, 2, &trust_email); |
| 526 fail |= !CallbackArgsToBool(args, 3, &trust_obj_sign); |
| 527 if (fail) { |
| 528 LOG(ERROR) << "EditCATrust args fail"; |
| 529 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); |
| 530 return; |
| 531 } |
| 532 |
| 533 bool result = certificate_manager_model_->SetCertTrust( |
| 534 cert, |
| 535 net::CA_CERT, |
| 536 trust_ssl * net::CertDatabase::TRUSTED_SSL + |
| 537 trust_email * net::CertDatabase::TRUSTED_EMAIL + |
| 538 trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN); |
| 539 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); |
| 540 if (!result) { |
| 541 // TODO(mattm): better error messages? |
| 542 ShowError( |
| 543 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SET_TRUST_ERROR_TITLE), |
| 544 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); |
| 545 } |
| 546 } |
| 547 |
| 548 void CertificateManagerHandler::EditServer(const ListValue* args) { |
| 549 NOTIMPLEMENTED(); |
| 550 } |
| 551 |
| 552 void CertificateManagerHandler::ExportPersonal(const ListValue* args) { |
| 553 net::X509Certificate* cert = CallbackArgsToCert(args); |
| 554 if (!cert) |
| 555 return; |
| 556 |
| 557 selected_cert_list_.push_back(cert); |
| 558 |
| 559 SelectFileDialog::FileTypeInfo file_type_info; |
| 560 file_type_info.extensions.resize(1); |
| 561 file_type_info.extensions[0].push_back(FILE_PATH_LITERAL("p12")); |
| 562 file_type_info.extension_description_overrides.push_back( |
| 563 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PKCS12_FILES)); |
| 564 file_type_info.include_all_files = true; |
| 565 select_file_dialog_ = SelectFileDialog::Create(this); |
| 566 select_file_dialog_->SelectFile( |
| 567 SelectFileDialog::SELECT_SAVEAS_FILE, string16(), |
| 568 FilePath(), &file_type_info, 1, FILE_PATH_LITERAL("p12"), |
| 569 web_ui_->tab_contents(), GetParentWindow(), |
| 570 reinterpret_cast<void*>(EXPORT_PERSONAL_FILE_SELECTED)); |
| 571 } |
| 572 |
| 573 void CertificateManagerHandler::ExportAllPersonal(const ListValue* args) { |
| 574 NOTIMPLEMENTED(); |
| 575 } |
| 576 |
| 577 void CertificateManagerHandler::ExportPersonalFileSelected( |
| 578 const FilePath& path) { |
| 579 file_path_ = path; |
| 580 web_ui_->CallJavascriptFunction( |
| 581 "CertificateManager.exportPersonalAskPassword"); |
| 582 } |
| 583 |
| 584 void CertificateManagerHandler::ExportPersonalPasswordSelected( |
| 585 const ListValue* args) { |
| 586 if (!args->GetString(0, &password_)){ |
| 587 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 588 ImportExportCleanup(); |
| 589 return; |
| 590 } |
| 591 |
| 592 // Currently, we don't support exporting more than one at a time. If we do, |
| 593 // this would need to either change this to use UnlockSlotsIfNecessary or |
| 594 // change UnlockCertSlotIfNecessary to take a CertificateList. |
| 595 DCHECK_EQ(selected_cert_list_.size(), 1U); |
| 596 |
| 597 // TODO(mattm): do something smarter about non-extractable keys |
| 598 browser::UnlockCertSlotIfNecessary( |
| 599 selected_cert_list_[0].get(), |
| 600 browser::kCryptoModulePasswordCertExport, |
| 601 "", // unused. |
| 602 base::Bind(&CertificateManagerHandler::ExportPersonalSlotsUnlocked, |
| 603 base::Unretained(this))); |
| 604 } |
| 605 |
| 606 void CertificateManagerHandler::ExportPersonalSlotsUnlocked() { |
| 607 std::string output; |
| 608 int num_exported = certificate_manager_model_->cert_db().ExportToPKCS12( |
| 609 selected_cert_list_, |
| 610 password_, |
| 611 &output); |
| 612 if (!num_exported) { |
| 613 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 614 ShowError( |
| 615 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE), |
| 616 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); |
| 617 ImportExportCleanup(); |
| 618 return; |
| 619 } |
| 620 file_access_provider_->StartWrite( |
| 621 file_path_, |
| 622 output, |
| 623 &consumer_, |
| 624 NewCallback(this, &CertificateManagerHandler::ExportPersonalFileWritten)); |
| 625 } |
| 626 |
| 627 void CertificateManagerHandler::ExportPersonalFileWritten(int write_errno, |
| 628 int bytes_written) { |
| 629 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 630 ImportExportCleanup(); |
| 631 if (write_errno) { |
| 632 ShowError( |
| 633 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE), |
| 634 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_WRITE_ERROR_FORMAT, |
| 635 UTF8ToUTF16(safe_strerror(write_errno)))); |
| 636 } |
| 637 } |
| 638 |
| 639 void CertificateManagerHandler::StartImportPersonal(const ListValue* args) { |
| 640 SelectFileDialog::FileTypeInfo file_type_info; |
| 641 if (!args->GetBoolean(0, &use_hardware_backed_)){ |
| 642 // Unable to retrieve the hardware backed attribute from the args, |
| 643 // so bail. |
| 644 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 645 ImportExportCleanup(); |
| 646 return; |
| 647 } |
| 648 file_type_info.extensions.resize(1); |
| 649 file_type_info.extensions[0].push_back(FILE_PATH_LITERAL("p12")); |
| 650 file_type_info.extension_description_overrides.push_back( |
| 651 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PKCS12_FILES)); |
| 652 file_type_info.include_all_files = true; |
| 653 select_file_dialog_ = SelectFileDialog::Create(this); |
| 654 select_file_dialog_->SelectFile( |
| 655 SelectFileDialog::SELECT_OPEN_FILE, string16(), |
| 656 FilePath(), &file_type_info, 1, FILE_PATH_LITERAL("p12"), |
| 657 web_ui_->tab_contents(), GetParentWindow(), |
| 658 reinterpret_cast<void*>(IMPORT_PERSONAL_FILE_SELECTED)); |
| 659 } |
| 660 |
| 661 void CertificateManagerHandler::ImportPersonalFileSelected( |
| 662 const FilePath& path) { |
| 663 file_path_ = path; |
| 664 web_ui_->CallJavascriptFunction( |
| 665 "CertificateManager.importPersonalAskPassword"); |
| 666 } |
| 667 |
| 668 void CertificateManagerHandler::ImportPersonalPasswordSelected( |
| 669 const ListValue* args) { |
| 670 if (!args->GetString(0, &password_)){ |
| 671 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 672 ImportExportCleanup(); |
| 673 return; |
| 674 } |
| 675 file_access_provider_->StartRead( |
| 676 file_path_, |
| 677 &consumer_, |
| 678 NewCallback(this, &CertificateManagerHandler::ImportPersonalFileRead)); |
| 679 } |
| 680 |
| 681 void CertificateManagerHandler::ImportPersonalFileRead( |
| 682 int read_errno, std::string data) { |
| 683 if (read_errno) { |
| 684 ImportExportCleanup(); |
| 685 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 686 ShowError( |
| 687 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_IMPORT_ERROR_TITLE), |
| 688 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT, |
| 689 UTF8ToUTF16(safe_strerror(read_errno)))); |
| 690 return; |
| 691 } |
| 692 |
| 693 file_data_ = data; |
| 694 |
| 695 if (use_hardware_backed_) { |
| 696 module_ = certificate_manager_model_->cert_db().GetPrivateModule(); |
| 697 } else { |
| 698 module_ = certificate_manager_model_->cert_db().GetPublicModule(); |
| 699 } |
| 700 |
| 701 net::CryptoModuleList modules; |
| 702 modules.push_back(module_); |
| 703 browser::UnlockSlotsIfNecessary( |
| 704 modules, |
| 705 browser::kCryptoModulePasswordCertImport, |
| 706 "", // unused. |
| 707 base::Bind(&CertificateManagerHandler::ImportPersonalSlotUnlocked, |
| 708 base::Unretained(this))); |
| 709 } |
| 710 |
| 711 void CertificateManagerHandler::ImportPersonalSlotUnlocked() { |
| 712 // Determine if the private key should be unextractable after the import. |
| 713 // We do this by checking the value of |use_hardware_backed_| which is set |
| 714 // to true if importing into a hardware module. Currently, this only happens |
| 715 // for Chrome OS when the "Import and Bind" option is chosen. |
| 716 bool is_extractable = !use_hardware_backed_; |
| 717 int result = certificate_manager_model_->ImportFromPKCS12( |
| 718 module_, file_data_, password_, is_extractable); |
| 719 ImportExportCleanup(); |
| 720 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); |
| 721 int string_id; |
| 722 switch (result) { |
| 723 case net::OK: |
| 724 return; |
| 725 case net::ERR_PKCS12_IMPORT_BAD_PASSWORD: |
| 726 // TODO(mattm): if the error was a bad password, we should reshow the |
| 727 // password dialog after the user dismisses the error dialog. |
| 728 string_id = IDS_CERT_MANAGER_BAD_PASSWORD; |
| 729 break; |
| 730 case net::ERR_PKCS12_IMPORT_INVALID_MAC: |
| 731 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_INVALID_MAC; |
| 732 break; |
| 733 case net::ERR_PKCS12_IMPORT_INVALID_FILE: |
| 734 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_INVALID_FILE; |
| 735 break; |
| 736 case net::ERR_PKCS12_IMPORT_UNSUPPORTED: |
| 737 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_UNSUPPORTED; |
| 738 break; |
| 739 default: |
| 740 string_id = IDS_CERT_MANAGER_UNKNOWN_ERROR; |
| 741 break; |
| 742 } |
| 743 ShowError( |
| 744 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_IMPORT_ERROR_TITLE), |
| 745 l10n_util::GetStringUTF8(string_id)); |
| 746 } |
| 747 |
| 748 void CertificateManagerHandler::CancelImportExportProcess( |
| 749 const ListValue* args) { |
| 750 ImportExportCleanup(); |
| 751 } |
| 752 |
| 753 void CertificateManagerHandler::ImportExportCleanup() { |
| 754 file_path_.clear(); |
| 755 password_.clear(); |
| 756 file_data_.clear(); |
| 757 use_hardware_backed_ = false; |
| 758 selected_cert_list_.clear(); |
| 759 module_ = NULL; |
| 760 |
| 761 // There may be pending file dialogs, we need to tell them that we've gone |
| 762 // away so they don't try and call back to us. |
| 763 if (select_file_dialog_.get()) |
| 764 select_file_dialog_->ListenerDestroyed(); |
| 765 select_file_dialog_ = NULL; |
| 766 } |
| 767 |
| 768 void CertificateManagerHandler::ImportServer(const ListValue* args) { |
| 769 select_file_dialog_ = SelectFileDialog::Create(this); |
| 770 ShowCertSelectFileDialog( |
| 771 select_file_dialog_.get(), |
| 772 SelectFileDialog::SELECT_OPEN_FILE, |
| 773 FilePath(), |
| 774 web_ui_->tab_contents(), |
| 775 GetParentWindow(), |
| 776 reinterpret_cast<void*>(IMPORT_SERVER_FILE_SELECTED)); |
| 777 } |
| 778 |
| 779 void CertificateManagerHandler::ImportServerFileSelected(const FilePath& path) { |
| 780 file_path_ = path; |
| 781 file_access_provider_->StartRead( |
| 782 file_path_, |
| 783 &consumer_, |
| 784 NewCallback(this, &CertificateManagerHandler::ImportServerFileRead)); |
| 785 } |
| 786 |
| 787 void CertificateManagerHandler::ImportServerFileRead(int read_errno, |
| 788 std::string data) { |
| 789 if (read_errno) { |
| 790 ImportExportCleanup(); |
| 791 ShowError( |
| 792 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), |
| 793 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT, |
| 794 UTF8ToUTF16(safe_strerror(read_errno)))); |
| 795 return; |
| 796 } |
| 797 |
| 798 selected_cert_list_ = net::X509Certificate::CreateCertificateListFromBytes( |
| 799 data.data(), data.size(), net::X509Certificate::FORMAT_AUTO); |
| 800 if (selected_cert_list_.empty()) { |
| 801 ImportExportCleanup(); |
| 802 ShowError( |
| 803 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), |
| 804 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CERT_PARSE_ERROR)); |
| 805 return; |
| 806 } |
| 807 |
| 808 net::CertDatabase::ImportCertFailureList not_imported; |
| 809 bool result = certificate_manager_model_->ImportServerCert( |
| 810 selected_cert_list_, |
| 811 ¬_imported); |
| 812 if (!result) { |
| 813 ShowError( |
| 814 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), |
| 815 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); |
| 816 } else if (!not_imported.empty()) { |
| 817 ShowImportErrors( |
| 818 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), |
| 819 not_imported); |
| 820 } |
| 821 ImportExportCleanup(); |
| 822 } |
| 823 |
| 824 void CertificateManagerHandler::ImportCA(const ListValue* args) { |
| 825 select_file_dialog_ = SelectFileDialog::Create(this); |
| 826 ShowCertSelectFileDialog(select_file_dialog_.get(), |
| 827 SelectFileDialog::SELECT_OPEN_FILE, |
| 828 FilePath(), |
| 829 web_ui_->tab_contents(), |
| 830 GetParentWindow(), |
| 831 reinterpret_cast<void*>(IMPORT_CA_FILE_SELECTED)); |
| 832 } |
| 833 |
| 834 void CertificateManagerHandler::ImportCAFileSelected(const FilePath& path) { |
| 835 file_path_ = path; |
| 836 file_access_provider_->StartRead( |
| 837 file_path_, |
| 838 &consumer_, |
| 839 NewCallback(this, &CertificateManagerHandler::ImportCAFileRead)); |
| 840 } |
| 841 |
| 842 void CertificateManagerHandler::ImportCAFileRead(int read_errno, |
| 843 std::string data) { |
| 844 if (read_errno) { |
| 845 ImportExportCleanup(); |
| 846 ShowError( |
| 847 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), |
| 848 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT, |
| 849 UTF8ToUTF16(safe_strerror(read_errno)))); |
| 850 return; |
| 851 } |
| 852 |
| 853 selected_cert_list_ = net::X509Certificate::CreateCertificateListFromBytes( |
| 854 data.data(), data.size(), net::X509Certificate::FORMAT_AUTO); |
| 855 if (selected_cert_list_.empty()) { |
| 856 ImportExportCleanup(); |
| 857 ShowError( |
| 858 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), |
| 859 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CERT_PARSE_ERROR)); |
| 860 return; |
| 861 } |
| 862 |
| 863 scoped_refptr<net::X509Certificate> root_cert = |
| 864 certificate_manager_model_->cert_db().FindRootInList(selected_cert_list_); |
| 865 |
| 866 // TODO(mattm): check here if root_cert is not a CA cert and show error. |
| 867 |
| 868 StringValue cert_name(root_cert->subject().GetDisplayName()); |
| 869 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.showImport", |
| 870 cert_name); |
| 871 } |
| 872 |
| 873 void CertificateManagerHandler::ImportCATrustSelected(const ListValue* args) { |
| 874 bool fail = false; |
| 875 bool trust_ssl = false; |
| 876 bool trust_email = false; |
| 877 bool trust_obj_sign = false; |
| 878 fail |= !CallbackArgsToBool(args, 0, &trust_ssl); |
| 879 fail |= !CallbackArgsToBool(args, 1, &trust_email); |
| 880 fail |= !CallbackArgsToBool(args, 2, &trust_obj_sign); |
| 881 if (fail) { |
| 882 LOG(ERROR) << "ImportCATrustSelected args fail"; |
| 883 ImportExportCleanup(); |
| 884 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); |
| 885 return; |
| 886 } |
| 887 |
| 888 net::CertDatabase::ImportCertFailureList not_imported; |
| 889 bool result = certificate_manager_model_->ImportCACerts( |
| 890 selected_cert_list_, |
| 891 trust_ssl * net::CertDatabase::TRUSTED_SSL + |
| 892 trust_email * net::CertDatabase::TRUSTED_EMAIL + |
| 893 trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN, |
| 894 ¬_imported); |
| 895 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); |
| 896 if (!result) { |
| 897 ShowError( |
| 898 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), |
| 899 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); |
| 900 } else if (!not_imported.empty()) { |
| 901 ShowImportErrors( |
| 902 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), |
| 903 not_imported); |
| 904 } |
| 905 ImportExportCleanup(); |
| 906 } |
| 907 |
| 908 void CertificateManagerHandler::Export(const ListValue* args) { |
| 909 net::X509Certificate* cert = CallbackArgsToCert(args); |
| 910 if (!cert) |
| 911 return; |
| 912 ShowCertExportDialog(web_ui_->tab_contents(), GetParentWindow(), |
| 913 cert->os_cert_handle()); |
| 914 } |
| 915 |
| 916 void CertificateManagerHandler::Delete(const ListValue* args) { |
| 917 net::X509Certificate* cert = CallbackArgsToCert(args); |
| 918 if (!cert) |
| 919 return; |
| 920 bool result = certificate_manager_model_->Delete(cert); |
| 921 if (!result) { |
| 922 // TODO(mattm): better error messages? |
| 923 ShowError( |
| 924 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_DELETE_CERT_ERROR_TITLE), |
| 925 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); |
| 926 } |
| 927 } |
| 928 |
| 929 void CertificateManagerHandler::Populate(const ListValue* args) { |
| 930 certificate_manager_model_->Refresh(); |
| 931 } |
| 932 |
| 933 void CertificateManagerHandler::PopulateTree(const std::string& tab_name, |
| 934 net::CertType type) { |
| 935 const std::string tree_name = tab_name + "-tree"; |
| 936 |
| 937 scoped_ptr<icu::Collator> collator; |
| 938 UErrorCode error = U_ZERO_ERROR; |
| 939 collator.reset( |
| 940 icu::Collator::createInstance( |
| 941 icu::Locale(g_browser_process->GetApplicationLocale().c_str()), |
| 942 error)); |
| 943 if (U_FAILURE(error)) |
| 944 collator.reset(NULL); |
| 945 DictionaryIdComparator comparator(collator.get()); |
| 946 CertificateManagerModel::OrgGroupingMap map; |
| 947 |
| 948 certificate_manager_model_->FilterAndBuildOrgGroupingMap(type, &map); |
| 949 |
| 950 { |
| 951 ListValue* nodes = new ListValue; |
| 952 for (CertificateManagerModel::OrgGroupingMap::iterator i = map.begin(); |
| 953 i != map.end(); ++i) { |
| 954 // Populate first level (org name). |
| 955 DictionaryValue* dict = new DictionaryValue; |
| 956 dict->SetString(kKeyId, OrgNameToId(i->first)); |
| 957 dict->SetString(kNameId, i->first); |
| 958 |
| 959 // Populate second level (certs). |
| 960 ListValue* subnodes = new ListValue; |
| 961 for (net::CertificateList::const_iterator org_cert_it = i->second.begin(); |
| 962 org_cert_it != i->second.end(); ++org_cert_it) { |
| 963 DictionaryValue* cert_dict = new DictionaryValue; |
| 964 net::X509Certificate* cert = org_cert_it->get(); |
| 965 cert_dict->SetString(kKeyId, CertToId(*cert)); |
| 966 cert_dict->SetString(kNameId, certificate_manager_model_->GetColumnText( |
| 967 *cert, CertificateManagerModel::COL_SUBJECT_NAME)); |
| 968 cert_dict->SetBoolean( |
| 969 kReadOnlyId, |
| 970 certificate_manager_model_->cert_db().IsReadOnly(cert)); |
| 971 cert_dict->SetBoolean( |
| 972 kUntrustedId, |
| 973 certificate_manager_model_->cert_db().IsUntrusted(cert)); |
| 974 // TODO(mattm): Other columns. |
| 975 subnodes->Append(cert_dict); |
| 976 } |
| 977 std::sort(subnodes->begin(), subnodes->end(), comparator); |
| 978 |
| 979 dict->Set(kSubNodesId, subnodes); |
| 980 nodes->Append(dict); |
| 981 } |
| 982 std::sort(nodes->begin(), nodes->end(), comparator); |
| 983 |
| 984 ListValue args; |
| 985 args.Append(Value::CreateStringValue(tree_name)); |
| 986 args.Append(nodes); |
| 987 web_ui_->CallJavascriptFunction("CertificateManager.onPopulateTree", args); |
| 988 } |
| 989 } |
| 990 |
| 991 void CertificateManagerHandler::ShowError(const std::string& title, |
| 992 const std::string& error) const { |
| 993 ScopedVector<const Value> args; |
| 994 args.push_back(Value::CreateStringValue(title)); |
| 995 args.push_back(Value::CreateStringValue(error)); |
| 996 args.push_back(Value::CreateStringValue(l10n_util::GetStringUTF8(IDS_OK))); |
| 997 args.push_back(Value::CreateNullValue()); // cancelTitle |
| 998 args.push_back(Value::CreateNullValue()); // okCallback |
| 999 args.push_back(Value::CreateNullValue()); // cancelCallback |
| 1000 web_ui_->CallJavascriptFunction("AlertOverlay.show", args.get()); |
| 1001 } |
| 1002 |
| 1003 void CertificateManagerHandler::ShowImportErrors( |
| 1004 const std::string& title, |
| 1005 const net::CertDatabase::ImportCertFailureList& not_imported) const { |
| 1006 std::string error; |
| 1007 if (selected_cert_list_.size() == 1) |
| 1008 error = l10n_util::GetStringUTF8( |
| 1009 IDS_CERT_MANAGER_IMPORT_SINGLE_NOT_IMPORTED); |
| 1010 else if (not_imported.size() == selected_cert_list_.size()) |
| 1011 error = l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_ALL_NOT_IMPORTED); |
| 1012 else |
| 1013 error = l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_SOME_NOT_IMPORTED); |
| 1014 |
| 1015 ListValue cert_error_list; |
| 1016 for (size_t i = 0; i < not_imported.size(); ++i) { |
| 1017 const net::CertDatabase::ImportCertFailure& failure = not_imported[i]; |
| 1018 DictionaryValue* dict = new DictionaryValue; |
| 1019 dict->SetString(kNameId, failure.certificate->subject().GetDisplayName()); |
| 1020 dict->SetString(kErrorId, NetErrorToString(failure.net_error)); |
| 1021 cert_error_list.Append(dict); |
| 1022 } |
| 1023 |
| 1024 StringValue title_value(title); |
| 1025 StringValue error_value(error); |
| 1026 web_ui_->CallJavascriptFunction("CertificateImportErrorOverlay.show", |
| 1027 title_value, |
| 1028 error_value, |
| 1029 cert_error_list); |
| 1030 } |
| 1031 |
| 1032 #if defined(OS_CHROMEOS) |
| 1033 void CertificateManagerHandler::CheckTpmTokenReady(const ListValue* args) { |
| 1034 chromeos::CryptohomeLibrary* cryptohome = |
| 1035 chromeos::CrosLibrary::Get()->GetCryptohomeLibrary(); |
| 1036 |
| 1037 // TODO(xiyuan): Use async way when underlying supports it. |
| 1038 base::FundamentalValue ready(cryptohome->Pkcs11IsTpmTokenReady()); |
| 1039 web_ui_->CallJavascriptFunction("CertificateManager.onCheckTpmTokenReady", |
| 1040 ready); |
| 1041 } |
| 1042 #endif |
| 1043 |
| 1044 gfx::NativeWindow CertificateManagerHandler::GetParentWindow() const { |
| 1045 return web_ui_->tab_contents()->view()->GetTopLevelNativeWindow(); |
| 1046 } |
OLD | NEW |