Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(381)

Side by Side Diff: chrome/browser/ui/webui/options2/certificate_manager_handler.cc

Issue 8930012: Revert 114236 - Options2: Pull the trigger. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src/
Patch Set: Created 9 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "chrome/browser/ui/webui/options2/certificate_manager_handler.h"
6
7 #include "base/bind.h"
8 #include "base/bind_helpers.h"
9 #include "base/file_util.h" // for FileAccessProvider
10 #include "base/memory/scoped_vector.h"
11 #include "base/safe_strerror_posix.h"
12 #include "base/string_number_conversions.h"
13 #include "base/values.h"
14 #include "chrome/browser/browser_process.h"
15 #include "chrome/browser/certificate_viewer.h"
16 #include "chrome/browser/ui/certificate_dialogs.h"
17 #include "chrome/browser/ui/crypto_module_password_dialog.h"
18 #include "content/browser/tab_contents/tab_contents.h"
19 #include "content/browser/tab_contents/tab_contents_view.h"
20 #include "content/public/browser/browser_thread.h" // for FileAccessProvider
21 #include "grit/generated_resources.h"
22 #include "net/base/crypto_module.h"
23 #include "net/base/x509_certificate.h"
24 #include "ui/base/l10n/l10n_util.h"
25 #include "ui/base/l10n/l10n_util_collator.h"
26
27 #if defined(OS_CHROMEOS)
28 #include "chrome/browser/chromeos/cros/cros_library.h"
29 #include "chrome/browser/chromeos/cros/cryptohome_library.h"
30 #endif
31
32 using content::BrowserThread;
33
34 namespace {
35
36 static const char kKeyId[] = "id";
37 static const char kSubNodesId[] = "subnodes";
38 static const char kNameId[] = "name";
39 static const char kReadOnlyId[] = "readonly";
40 static const char kUntrustedId[] = "untrusted";
41 static const char kSecurityDeviceId[] = "device";
42 static const char kErrorId[] = "error";
43
44 // Enumeration of different callers of SelectFile. (Start counting at 1 so
45 // if SelectFile is accidentally called with params=NULL it won't match any.)
46 enum {
47 EXPORT_PERSONAL_FILE_SELECTED = 1,
48 IMPORT_PERSONAL_FILE_SELECTED,
49 IMPORT_SERVER_FILE_SELECTED,
50 IMPORT_CA_FILE_SELECTED,
51 };
52
53 // TODO(mattm): These are duplicated from cookies_view_handler.cc
54 // Encodes a pointer value into a hex string.
55 std::string PointerToHexString(const void* pointer) {
56 return base::HexEncode(&pointer, sizeof(pointer));
57 }
58
59 // Decodes a pointer from a hex string.
60 void* HexStringToPointer(const std::string& str) {
61 std::vector<uint8> buffer;
62 if (!base::HexStringToBytes(str, &buffer) ||
63 buffer.size() != sizeof(void*)) {
64 return NULL;
65 }
66
67 return *reinterpret_cast<void**>(&buffer[0]);
68 }
69
70 std::string OrgNameToId(const std::string& org) {
71 return "org-" + org;
72 }
73
74 std::string CertToId(const net::X509Certificate& cert) {
75 return "cert-" + PointerToHexString(&cert);
76 }
77
78 net::X509Certificate* IdToCert(const std::string& id) {
79 if (!StartsWithASCII(id, "cert-", true))
80 return NULL;
81 return reinterpret_cast<net::X509Certificate*>(
82 HexStringToPointer(id.substr(5)));
83 }
84
85 net::X509Certificate* CallbackArgsToCert(const ListValue* args) {
86 std::string node_id;
87 if (!args->GetString(0, &node_id)){
88 return NULL;
89 }
90 net::X509Certificate* cert = IdToCert(node_id);
91 if (!cert) {
92 NOTREACHED();
93 return NULL;
94 }
95 return cert;
96 }
97
98 bool CallbackArgsToBool(const ListValue* args, int index, bool* result) {
99 std::string string_value;
100 if (!args->GetString(index, &string_value))
101 return false;
102
103 *result = string_value[0] == 't';
104 return true;
105 }
106
107 struct DictionaryIdComparator {
108 explicit DictionaryIdComparator(icu::Collator* collator)
109 : collator_(collator) {
110 }
111
112 bool operator()(const Value* a,
113 const Value* b) const {
114 DCHECK(a->GetType() == Value::TYPE_DICTIONARY);
115 DCHECK(b->GetType() == Value::TYPE_DICTIONARY);
116 const DictionaryValue* a_dict = reinterpret_cast<const DictionaryValue*>(a);
117 const DictionaryValue* b_dict = reinterpret_cast<const DictionaryValue*>(b);
118 string16 a_str;
119 string16 b_str;
120 a_dict->GetString(kNameId, &a_str);
121 b_dict->GetString(kNameId, &b_str);
122 if (collator_ == NULL)
123 return a_str < b_str;
124 return l10n_util::CompareString16WithCollator(
125 collator_, a_str, b_str) == UCOL_LESS;
126 }
127
128 icu::Collator* collator_;
129 };
130
131 std::string NetErrorToString(int net_error) {
132 switch (net_error) {
133 // TODO(mattm): handle more cases.
134 case net::ERR_IMPORT_CA_CERT_NOT_CA:
135 return l10n_util::GetStringUTF8(IDS_CERT_MANAGER_ERROR_NOT_CA);
136 default:
137 return l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR);
138 }
139 }
140
141 } // namespace
142
143 ///////////////////////////////////////////////////////////////////////////////
144 // FileAccessProvider
145
146 // TODO(mattm): Move to some shared location?
147 class FileAccessProvider
148 : public base::RefCountedThreadSafe<FileAccessProvider>,
149 public CancelableRequestProvider {
150 public:
151 // Reports 0 on success or errno on failure, and the data of the file upon
152 // success.
153 // TODO(mattm): don't pass std::string by value.. could use RefCountedBytes
154 // but it's a vector. Maybe do the derive from CancelableRequest thing
155 // described in cancelable_request.h?
156 typedef Callback2<int, std::string>::Type ReadCallback;
157
158 // Reports 0 on success or errno on failure, and the number of bytes written,
159 // on success.
160 typedef Callback2<int, int>::Type WriteCallback;
161
162 Handle StartRead(const FilePath& path,
163 CancelableRequestConsumerBase* consumer,
164 ReadCallback* callback);
165 Handle StartWrite(const FilePath& path,
166 const std::string& data,
167 CancelableRequestConsumerBase* consumer,
168 WriteCallback* callback);
169
170 private:
171 void DoRead(scoped_refptr<CancelableRequest<ReadCallback> > request,
172 FilePath path);
173 void DoWrite(scoped_refptr<CancelableRequest<WriteCallback> > request,
174 FilePath path,
175 std::string data);
176 };
177
178 CancelableRequestProvider::Handle FileAccessProvider::StartRead(
179 const FilePath& path,
180 CancelableRequestConsumerBase* consumer,
181 FileAccessProvider::ReadCallback* callback) {
182 scoped_refptr<CancelableRequest<ReadCallback> > request(
183 new CancelableRequest<ReadCallback>(callback));
184 AddRequest(request, consumer);
185
186 // Send the parameters and the request to the file thread.
187 BrowserThread::PostTask(
188 BrowserThread::FILE, FROM_HERE,
189 base::Bind(&FileAccessProvider::DoRead, this, request, path));
190
191 // The handle will have been set by AddRequest.
192 return request->handle();
193 }
194
195 CancelableRequestProvider::Handle FileAccessProvider::StartWrite(
196 const FilePath& path,
197 const std::string& data,
198 CancelableRequestConsumerBase* consumer,
199 WriteCallback* callback) {
200 scoped_refptr<CancelableRequest<WriteCallback> > request(
201 new CancelableRequest<WriteCallback>(callback));
202 AddRequest(request, consumer);
203
204 // Send the parameters and the request to the file thWrite.
205 BrowserThread::PostTask(
206 BrowserThread::FILE, FROM_HERE,
207 base::Bind(&FileAccessProvider::DoWrite, this, request, path, data));
208
209 // The handle will have been set by AddRequest.
210 return request->handle();
211 }
212
213 void FileAccessProvider::DoRead(
214 scoped_refptr<CancelableRequest<ReadCallback> > request,
215 FilePath path) {
216 if (request->canceled())
217 return;
218
219 std::string data;
220 VLOG(1) << "DoRead starting read";
221 bool success = file_util::ReadFileToString(path, &data);
222 int saved_errno = success ? 0 : errno;
223 VLOG(1) << "DoRead done read: " << success << " " << data.size();
224 request->ForwardResult(ReadCallback::TupleType(saved_errno, data));
225 }
226
227 void FileAccessProvider::DoWrite(
228 scoped_refptr<CancelableRequest<WriteCallback> > request,
229 FilePath path,
230 std::string data) {
231 VLOG(1) << "DoWrite starting write";
232 int bytes_written = file_util::WriteFile(path, data.data(), data.size());
233 int saved_errno = bytes_written >= 0 ? 0 : errno;
234 VLOG(1) << "DoWrite done write " << bytes_written;
235
236 if (request->canceled())
237 return;
238
239 request->ForwardResult(WriteCallback::TupleType(saved_errno, bytes_written));
240 }
241
242 ///////////////////////////////////////////////////////////////////////////////
243 // CertificateManagerHandler
244
245 CertificateManagerHandler::CertificateManagerHandler()
246 : file_access_provider_(new FileAccessProvider) {
247 certificate_manager_model_.reset(new CertificateManagerModel(this));
248 }
249
250 CertificateManagerHandler::~CertificateManagerHandler() {
251 }
252
253 void CertificateManagerHandler::GetLocalizedValues(
254 DictionaryValue* localized_strings) {
255 DCHECK(localized_strings);
256
257 RegisterTitle(localized_strings, "certificateManagerPage",
258 IDS_CERTIFICATE_MANAGER_TITLE);
259
260 // Tabs.
261 localized_strings->SetString("personalCertsTabTitle",
262 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PERSONAL_CERTS_TAB_LABEL));
263 localized_strings->SetString("serverCertsTabTitle",
264 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERVER_CERTS_TAB_LABEL));
265 localized_strings->SetString("caCertsTabTitle",
266 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_CERT_AUTHORITIES_TAB_LABEL));
267 localized_strings->SetString("unknownCertsTabTitle",
268 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNKNOWN_TAB_LABEL));
269
270 // Tab descriptions.
271 localized_strings->SetString("personalCertsTabDescription",
272 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_USER_TREE_DESCRIPTION));
273 localized_strings->SetString("serverCertsTabDescription",
274 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERVER_TREE_DESCRIPTION));
275 localized_strings->SetString("caCertsTabDescription",
276 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_AUTHORITIES_TREE_DESCRIPTION));
277 localized_strings->SetString("unknownCertsTabDescription",
278 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNKNOWN_TREE_DESCRIPTION));
279
280 // Tree columns.
281 localized_strings->SetString("certNameColumn",
282 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_NAME_COLUMN_LABEL));
283 localized_strings->SetString("certDeviceColumn",
284 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DEVICE_COLUMN_LABEL));
285 localized_strings->SetString("certSerialColumn",
286 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERIAL_NUMBER_COLUMN_LABEL));
287 localized_strings->SetString("certExpiresColumn",
288 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPIRES_COLUMN_LABEL));
289
290 // Buttons.
291 localized_strings->SetString("view_certificate",
292 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_VIEW_CERT_BUTTON));
293 localized_strings->SetString("import_certificate",
294 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_BUTTON));
295 localized_strings->SetString("export_certificate",
296 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_BUTTON));
297 localized_strings->SetString("export_all_certificates",
298 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_ALL_BUTTON));
299 localized_strings->SetString("edit_certificate",
300 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_BUTTON));
301 localized_strings->SetString("delete_certificate",
302 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_BUTTON));
303
304 // Certificate Delete overlay strings.
305 localized_strings->SetString("personalCertsTabDeleteConfirm",
306 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_USER_FORMAT));
307 localized_strings->SetString("personalCertsTabDeleteImpact",
308 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_USER_DESCRIPTION));
309 localized_strings->SetString("serverCertsTabDeleteConfirm",
310 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_SERVER_FORMAT));
311 localized_strings->SetString("serverCertsTabDeleteImpact",
312 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_SERVER_DESCRIPTION));
313 localized_strings->SetString("caCertsTabDeleteConfirm",
314 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_CA_FORMAT));
315 localized_strings->SetString("caCertsTabDeleteImpact",
316 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_CA_DESCRIPTION));
317 localized_strings->SetString("unknownCertsTabDeleteConfirm",
318 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_UNKNOWN_FORMAT));
319 localized_strings->SetString("unknownCertsTabDeleteImpact", "");
320
321 // Certificate Restore overlay strings.
322 localized_strings->SetString("certificateRestorePasswordDescription",
323 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_RESTORE_PASSWORD_DESC));
324 localized_strings->SetString("certificatePasswordLabel",
325 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PASSWORD_LABEL));
326
327 // Personal Certificate Export overlay strings.
328 localized_strings->SetString("certificateExportPasswordDescription",
329 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_PASSWORD_DESC));
330 localized_strings->SetString("certificateExportPasswordHelp",
331 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_PASSWORD_HELP));
332 localized_strings->SetString("certificateConfirmPasswordLabel",
333 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_CONFIRM_PASSWORD_LABEL));
334
335 // Edit CA Trust & Import CA overlay strings.
336 localized_strings->SetString("certificateEditTrustLabel",
337 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_TRUST_LABEL));
338 localized_strings->SetString("certificateEditCaTrustDescriptionFormat",
339 l10n_util::GetStringUTF16(
340 IDS_CERT_MANAGER_EDIT_CA_TRUST_DESCRIPTION_FORMAT));
341 localized_strings->SetString("certificateImportCaDescriptionFormat",
342 l10n_util::GetStringUTF16(
343 IDS_CERT_MANAGER_IMPORT_CA_DESCRIPTION_FORMAT));
344 localized_strings->SetString("certificateCaTrustSSLLabel",
345 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_SSL_LABEL));
346 localized_strings->SetString("certificateCaTrustEmailLabel",
347 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_EMAIL_LABEL));
348 localized_strings->SetString("certificateCaTrustObjSignLabel",
349 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_OBJSIGN_LABEL));
350 localized_strings->SetString("certificateImportErrorFormat",
351 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_ERROR_FORMAT));
352
353 // Badges next to certificates
354 localized_strings->SetString("badgeCertUntrusted",
355 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNTRUSTED));
356
357 #if defined(OS_CHROMEOS)
358 localized_strings->SetString("importAndBindCertificate",
359 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_AND_BIND_BUTTON));
360 localized_strings->SetString("hardwareBackedKeyFormat",
361 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_HARDWARE_BACKED_KEY_FORMAT));
362 localized_strings->SetString("chromeOSDeviceName",
363 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_HARDWARE_BACKED));
364 #endif // defined(OS_CHROMEOS)
365 }
366
367 void CertificateManagerHandler::RegisterMessages() {
368 web_ui_->RegisterMessageCallback(
369 "viewCertificate",
370 base::Bind(&CertificateManagerHandler::View, base::Unretained(this)));
371
372 web_ui_->RegisterMessageCallback(
373 "getCaCertificateTrust",
374 base::Bind(&CertificateManagerHandler::GetCATrust,
375 base::Unretained(this)));
376 web_ui_->RegisterMessageCallback(
377 "editCaCertificateTrust",
378 base::Bind(&CertificateManagerHandler::EditCATrust,
379 base::Unretained(this)));
380
381 web_ui_->RegisterMessageCallback(
382 "editServerCertificate",
383 base::Bind(&CertificateManagerHandler::EditServer,
384 base::Unretained(this)));
385
386 web_ui_->RegisterMessageCallback(
387 "cancelImportExportCertificate",
388 base::Bind(&CertificateManagerHandler::CancelImportExportProcess,
389 base::Unretained(this)));
390
391 web_ui_->RegisterMessageCallback(
392 "exportPersonalCertificate",
393 base::Bind(&CertificateManagerHandler::ExportPersonal,
394 base::Unretained(this)));
395 web_ui_->RegisterMessageCallback(
396 "exportAllPersonalCertificates",
397 base::Bind(&CertificateManagerHandler::ExportAllPersonal,
398 base::Unretained(this)));
399 web_ui_->RegisterMessageCallback(
400 "exportPersonalCertificatePasswordSelected",
401 base::Bind(&CertificateManagerHandler::ExportPersonalPasswordSelected,
402 base::Unretained(this)));
403
404 web_ui_->RegisterMessageCallback(
405 "importPersonalCertificate",
406 base::Bind(&CertificateManagerHandler::StartImportPersonal,
407 base::Unretained(this)));
408 web_ui_->RegisterMessageCallback(
409 "importPersonalCertificatePasswordSelected",
410 base::Bind(&CertificateManagerHandler::ImportPersonalPasswordSelected,
411 base::Unretained(this)));
412
413 web_ui_->RegisterMessageCallback(
414 "importCaCertificate",
415 base::Bind(&CertificateManagerHandler::ImportCA,
416 base::Unretained(this)));
417 web_ui_->RegisterMessageCallback(
418 "importCaCertificateTrustSelected",
419 base::Bind(&CertificateManagerHandler::ImportCATrustSelected,
420 base::Unretained(this)));
421
422 web_ui_->RegisterMessageCallback(
423 "importServerCertificate",
424 base::Bind(&CertificateManagerHandler::ImportServer,
425 base::Unretained(this)));
426
427 web_ui_->RegisterMessageCallback(
428 "exportCertificate",
429 base::Bind(&CertificateManagerHandler::Export,
430 base::Unretained(this)));
431
432 web_ui_->RegisterMessageCallback(
433 "deleteCertificate",
434 base::Bind(&CertificateManagerHandler::Delete,
435 base::Unretained(this)));
436
437 web_ui_->RegisterMessageCallback(
438 "populateCertificateManager",
439 base::Bind(&CertificateManagerHandler::Populate,
440 base::Unretained(this)));
441
442 #if defined(OS_CHROMEOS)
443 web_ui_->RegisterMessageCallback(
444 "checkTpmTokenReady",
445 base::Bind(&CertificateManagerHandler::CheckTpmTokenReady,
446 base::Unretained(this)));
447 #endif
448 }
449
450 void CertificateManagerHandler::CertificatesRefreshed() {
451 PopulateTree("personalCertsTab", net::USER_CERT);
452 PopulateTree("serverCertsTab", net::SERVER_CERT);
453 PopulateTree("caCertsTab", net::CA_CERT);
454 PopulateTree("otherCertsTab", net::UNKNOWN_CERT);
455 VLOG(1) << "populating finished";
456 }
457
458 void CertificateManagerHandler::FileSelected(const FilePath& path, int index,
459 void* params) {
460 switch (reinterpret_cast<intptr_t>(params)) {
461 case EXPORT_PERSONAL_FILE_SELECTED:
462 ExportPersonalFileSelected(path);
463 break;
464 case IMPORT_PERSONAL_FILE_SELECTED:
465 ImportPersonalFileSelected(path);
466 break;
467 case IMPORT_SERVER_FILE_SELECTED:
468 ImportServerFileSelected(path);
469 break;
470 case IMPORT_CA_FILE_SELECTED:
471 ImportCAFileSelected(path);
472 break;
473 default:
474 NOTREACHED();
475 }
476 }
477
478 void CertificateManagerHandler::FileSelectionCanceled(void* params) {
479 switch (reinterpret_cast<intptr_t>(params)) {
480 case EXPORT_PERSONAL_FILE_SELECTED:
481 case IMPORT_PERSONAL_FILE_SELECTED:
482 case IMPORT_SERVER_FILE_SELECTED:
483 case IMPORT_CA_FILE_SELECTED:
484 ImportExportCleanup();
485 break;
486 default:
487 NOTREACHED();
488 }
489 }
490
491 void CertificateManagerHandler::View(const ListValue* args) {
492 net::X509Certificate* cert = CallbackArgsToCert(args);
493 if (!cert)
494 return;
495 ShowCertificateViewer(GetParentWindow(), cert);
496 }
497
498 void CertificateManagerHandler::GetCATrust(const ListValue* args) {
499 net::X509Certificate* cert = CallbackArgsToCert(args);
500 if (!cert) {
501 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
502 return;
503 }
504
505 net::CertDatabase::TrustBits trust_bits =
506 certificate_manager_model_->cert_db().GetCertTrust(cert, net::CA_CERT);
507 base::FundamentalValue ssl_value(
508 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_SSL));
509 base::FundamentalValue email_value(
510 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_EMAIL));
511 base::FundamentalValue obj_sign_value(
512 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_OBJ_SIGN));
513 web_ui_->CallJavascriptFunction(
514 "CertificateEditCaTrustOverlay.populateTrust",
515 ssl_value, email_value, obj_sign_value);
516 }
517
518 void CertificateManagerHandler::EditCATrust(const ListValue* args) {
519 net::X509Certificate* cert = CallbackArgsToCert(args);
520 bool fail = !cert;
521 bool trust_ssl = false;
522 bool trust_email = false;
523 bool trust_obj_sign = false;
524 fail |= !CallbackArgsToBool(args, 1, &trust_ssl);
525 fail |= !CallbackArgsToBool(args, 2, &trust_email);
526 fail |= !CallbackArgsToBool(args, 3, &trust_obj_sign);
527 if (fail) {
528 LOG(ERROR) << "EditCATrust args fail";
529 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
530 return;
531 }
532
533 bool result = certificate_manager_model_->SetCertTrust(
534 cert,
535 net::CA_CERT,
536 trust_ssl * net::CertDatabase::TRUSTED_SSL +
537 trust_email * net::CertDatabase::TRUSTED_EMAIL +
538 trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN);
539 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
540 if (!result) {
541 // TODO(mattm): better error messages?
542 ShowError(
543 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SET_TRUST_ERROR_TITLE),
544 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR));
545 }
546 }
547
548 void CertificateManagerHandler::EditServer(const ListValue* args) {
549 NOTIMPLEMENTED();
550 }
551
552 void CertificateManagerHandler::ExportPersonal(const ListValue* args) {
553 net::X509Certificate* cert = CallbackArgsToCert(args);
554 if (!cert)
555 return;
556
557 selected_cert_list_.push_back(cert);
558
559 SelectFileDialog::FileTypeInfo file_type_info;
560 file_type_info.extensions.resize(1);
561 file_type_info.extensions[0].push_back(FILE_PATH_LITERAL("p12"));
562 file_type_info.extension_description_overrides.push_back(
563 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PKCS12_FILES));
564 file_type_info.include_all_files = true;
565 select_file_dialog_ = SelectFileDialog::Create(this);
566 select_file_dialog_->SelectFile(
567 SelectFileDialog::SELECT_SAVEAS_FILE, string16(),
568 FilePath(), &file_type_info, 1, FILE_PATH_LITERAL("p12"),
569 web_ui_->tab_contents(), GetParentWindow(),
570 reinterpret_cast<void*>(EXPORT_PERSONAL_FILE_SELECTED));
571 }
572
573 void CertificateManagerHandler::ExportAllPersonal(const ListValue* args) {
574 NOTIMPLEMENTED();
575 }
576
577 void CertificateManagerHandler::ExportPersonalFileSelected(
578 const FilePath& path) {
579 file_path_ = path;
580 web_ui_->CallJavascriptFunction(
581 "CertificateManager.exportPersonalAskPassword");
582 }
583
584 void CertificateManagerHandler::ExportPersonalPasswordSelected(
585 const ListValue* args) {
586 if (!args->GetString(0, &password_)){
587 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
588 ImportExportCleanup();
589 return;
590 }
591
592 // Currently, we don't support exporting more than one at a time. If we do,
593 // this would need to either change this to use UnlockSlotsIfNecessary or
594 // change UnlockCertSlotIfNecessary to take a CertificateList.
595 DCHECK_EQ(selected_cert_list_.size(), 1U);
596
597 // TODO(mattm): do something smarter about non-extractable keys
598 browser::UnlockCertSlotIfNecessary(
599 selected_cert_list_[0].get(),
600 browser::kCryptoModulePasswordCertExport,
601 "", // unused.
602 base::Bind(&CertificateManagerHandler::ExportPersonalSlotsUnlocked,
603 base::Unretained(this)));
604 }
605
606 void CertificateManagerHandler::ExportPersonalSlotsUnlocked() {
607 std::string output;
608 int num_exported = certificate_manager_model_->cert_db().ExportToPKCS12(
609 selected_cert_list_,
610 password_,
611 &output);
612 if (!num_exported) {
613 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
614 ShowError(
615 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE),
616 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR));
617 ImportExportCleanup();
618 return;
619 }
620 file_access_provider_->StartWrite(
621 file_path_,
622 output,
623 &consumer_,
624 NewCallback(this, &CertificateManagerHandler::ExportPersonalFileWritten));
625 }
626
627 void CertificateManagerHandler::ExportPersonalFileWritten(int write_errno,
628 int bytes_written) {
629 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
630 ImportExportCleanup();
631 if (write_errno) {
632 ShowError(
633 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE),
634 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_WRITE_ERROR_FORMAT,
635 UTF8ToUTF16(safe_strerror(write_errno))));
636 }
637 }
638
639 void CertificateManagerHandler::StartImportPersonal(const ListValue* args) {
640 SelectFileDialog::FileTypeInfo file_type_info;
641 if (!args->GetBoolean(0, &use_hardware_backed_)){
642 // Unable to retrieve the hardware backed attribute from the args,
643 // so bail.
644 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
645 ImportExportCleanup();
646 return;
647 }
648 file_type_info.extensions.resize(1);
649 file_type_info.extensions[0].push_back(FILE_PATH_LITERAL("p12"));
650 file_type_info.extension_description_overrides.push_back(
651 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PKCS12_FILES));
652 file_type_info.include_all_files = true;
653 select_file_dialog_ = SelectFileDialog::Create(this);
654 select_file_dialog_->SelectFile(
655 SelectFileDialog::SELECT_OPEN_FILE, string16(),
656 FilePath(), &file_type_info, 1, FILE_PATH_LITERAL("p12"),
657 web_ui_->tab_contents(), GetParentWindow(),
658 reinterpret_cast<void*>(IMPORT_PERSONAL_FILE_SELECTED));
659 }
660
661 void CertificateManagerHandler::ImportPersonalFileSelected(
662 const FilePath& path) {
663 file_path_ = path;
664 web_ui_->CallJavascriptFunction(
665 "CertificateManager.importPersonalAskPassword");
666 }
667
668 void CertificateManagerHandler::ImportPersonalPasswordSelected(
669 const ListValue* args) {
670 if (!args->GetString(0, &password_)){
671 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
672 ImportExportCleanup();
673 return;
674 }
675 file_access_provider_->StartRead(
676 file_path_,
677 &consumer_,
678 NewCallback(this, &CertificateManagerHandler::ImportPersonalFileRead));
679 }
680
681 void CertificateManagerHandler::ImportPersonalFileRead(
682 int read_errno, std::string data) {
683 if (read_errno) {
684 ImportExportCleanup();
685 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
686 ShowError(
687 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_IMPORT_ERROR_TITLE),
688 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT,
689 UTF8ToUTF16(safe_strerror(read_errno))));
690 return;
691 }
692
693 file_data_ = data;
694
695 if (use_hardware_backed_) {
696 module_ = certificate_manager_model_->cert_db().GetPrivateModule();
697 } else {
698 module_ = certificate_manager_model_->cert_db().GetPublicModule();
699 }
700
701 net::CryptoModuleList modules;
702 modules.push_back(module_);
703 browser::UnlockSlotsIfNecessary(
704 modules,
705 browser::kCryptoModulePasswordCertImport,
706 "", // unused.
707 base::Bind(&CertificateManagerHandler::ImportPersonalSlotUnlocked,
708 base::Unretained(this)));
709 }
710
711 void CertificateManagerHandler::ImportPersonalSlotUnlocked() {
712 // Determine if the private key should be unextractable after the import.
713 // We do this by checking the value of |use_hardware_backed_| which is set
714 // to true if importing into a hardware module. Currently, this only happens
715 // for Chrome OS when the "Import and Bind" option is chosen.
716 bool is_extractable = !use_hardware_backed_;
717 int result = certificate_manager_model_->ImportFromPKCS12(
718 module_, file_data_, password_, is_extractable);
719 ImportExportCleanup();
720 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss");
721 int string_id;
722 switch (result) {
723 case net::OK:
724 return;
725 case net::ERR_PKCS12_IMPORT_BAD_PASSWORD:
726 // TODO(mattm): if the error was a bad password, we should reshow the
727 // password dialog after the user dismisses the error dialog.
728 string_id = IDS_CERT_MANAGER_BAD_PASSWORD;
729 break;
730 case net::ERR_PKCS12_IMPORT_INVALID_MAC:
731 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_INVALID_MAC;
732 break;
733 case net::ERR_PKCS12_IMPORT_INVALID_FILE:
734 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_INVALID_FILE;
735 break;
736 case net::ERR_PKCS12_IMPORT_UNSUPPORTED:
737 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_UNSUPPORTED;
738 break;
739 default:
740 string_id = IDS_CERT_MANAGER_UNKNOWN_ERROR;
741 break;
742 }
743 ShowError(
744 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_IMPORT_ERROR_TITLE),
745 l10n_util::GetStringUTF8(string_id));
746 }
747
748 void CertificateManagerHandler::CancelImportExportProcess(
749 const ListValue* args) {
750 ImportExportCleanup();
751 }
752
753 void CertificateManagerHandler::ImportExportCleanup() {
754 file_path_.clear();
755 password_.clear();
756 file_data_.clear();
757 use_hardware_backed_ = false;
758 selected_cert_list_.clear();
759 module_ = NULL;
760
761 // There may be pending file dialogs, we need to tell them that we've gone
762 // away so they don't try and call back to us.
763 if (select_file_dialog_.get())
764 select_file_dialog_->ListenerDestroyed();
765 select_file_dialog_ = NULL;
766 }
767
768 void CertificateManagerHandler::ImportServer(const ListValue* args) {
769 select_file_dialog_ = SelectFileDialog::Create(this);
770 ShowCertSelectFileDialog(
771 select_file_dialog_.get(),
772 SelectFileDialog::SELECT_OPEN_FILE,
773 FilePath(),
774 web_ui_->tab_contents(),
775 GetParentWindow(),
776 reinterpret_cast<void*>(IMPORT_SERVER_FILE_SELECTED));
777 }
778
779 void CertificateManagerHandler::ImportServerFileSelected(const FilePath& path) {
780 file_path_ = path;
781 file_access_provider_->StartRead(
782 file_path_,
783 &consumer_,
784 NewCallback(this, &CertificateManagerHandler::ImportServerFileRead));
785 }
786
787 void CertificateManagerHandler::ImportServerFileRead(int read_errno,
788 std::string data) {
789 if (read_errno) {
790 ImportExportCleanup();
791 ShowError(
792 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE),
793 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT,
794 UTF8ToUTF16(safe_strerror(read_errno))));
795 return;
796 }
797
798 selected_cert_list_ = net::X509Certificate::CreateCertificateListFromBytes(
799 data.data(), data.size(), net::X509Certificate::FORMAT_AUTO);
800 if (selected_cert_list_.empty()) {
801 ImportExportCleanup();
802 ShowError(
803 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE),
804 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CERT_PARSE_ERROR));
805 return;
806 }
807
808 net::CertDatabase::ImportCertFailureList not_imported;
809 bool result = certificate_manager_model_->ImportServerCert(
810 selected_cert_list_,
811 &not_imported);
812 if (!result) {
813 ShowError(
814 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE),
815 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR));
816 } else if (!not_imported.empty()) {
817 ShowImportErrors(
818 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE),
819 not_imported);
820 }
821 ImportExportCleanup();
822 }
823
824 void CertificateManagerHandler::ImportCA(const ListValue* args) {
825 select_file_dialog_ = SelectFileDialog::Create(this);
826 ShowCertSelectFileDialog(select_file_dialog_.get(),
827 SelectFileDialog::SELECT_OPEN_FILE,
828 FilePath(),
829 web_ui_->tab_contents(),
830 GetParentWindow(),
831 reinterpret_cast<void*>(IMPORT_CA_FILE_SELECTED));
832 }
833
834 void CertificateManagerHandler::ImportCAFileSelected(const FilePath& path) {
835 file_path_ = path;
836 file_access_provider_->StartRead(
837 file_path_,
838 &consumer_,
839 NewCallback(this, &CertificateManagerHandler::ImportCAFileRead));
840 }
841
842 void CertificateManagerHandler::ImportCAFileRead(int read_errno,
843 std::string data) {
844 if (read_errno) {
845 ImportExportCleanup();
846 ShowError(
847 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE),
848 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT,
849 UTF8ToUTF16(safe_strerror(read_errno))));
850 return;
851 }
852
853 selected_cert_list_ = net::X509Certificate::CreateCertificateListFromBytes(
854 data.data(), data.size(), net::X509Certificate::FORMAT_AUTO);
855 if (selected_cert_list_.empty()) {
856 ImportExportCleanup();
857 ShowError(
858 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE),
859 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CERT_PARSE_ERROR));
860 return;
861 }
862
863 scoped_refptr<net::X509Certificate> root_cert =
864 certificate_manager_model_->cert_db().FindRootInList(selected_cert_list_);
865
866 // TODO(mattm): check here if root_cert is not a CA cert and show error.
867
868 StringValue cert_name(root_cert->subject().GetDisplayName());
869 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.showImport",
870 cert_name);
871 }
872
873 void CertificateManagerHandler::ImportCATrustSelected(const ListValue* args) {
874 bool fail = false;
875 bool trust_ssl = false;
876 bool trust_email = false;
877 bool trust_obj_sign = false;
878 fail |= !CallbackArgsToBool(args, 0, &trust_ssl);
879 fail |= !CallbackArgsToBool(args, 1, &trust_email);
880 fail |= !CallbackArgsToBool(args, 2, &trust_obj_sign);
881 if (fail) {
882 LOG(ERROR) << "ImportCATrustSelected args fail";
883 ImportExportCleanup();
884 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
885 return;
886 }
887
888 net::CertDatabase::ImportCertFailureList not_imported;
889 bool result = certificate_manager_model_->ImportCACerts(
890 selected_cert_list_,
891 trust_ssl * net::CertDatabase::TRUSTED_SSL +
892 trust_email * net::CertDatabase::TRUSTED_EMAIL +
893 trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN,
894 &not_imported);
895 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss");
896 if (!result) {
897 ShowError(
898 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE),
899 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR));
900 } else if (!not_imported.empty()) {
901 ShowImportErrors(
902 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE),
903 not_imported);
904 }
905 ImportExportCleanup();
906 }
907
908 void CertificateManagerHandler::Export(const ListValue* args) {
909 net::X509Certificate* cert = CallbackArgsToCert(args);
910 if (!cert)
911 return;
912 ShowCertExportDialog(web_ui_->tab_contents(), GetParentWindow(),
913 cert->os_cert_handle());
914 }
915
916 void CertificateManagerHandler::Delete(const ListValue* args) {
917 net::X509Certificate* cert = CallbackArgsToCert(args);
918 if (!cert)
919 return;
920 bool result = certificate_manager_model_->Delete(cert);
921 if (!result) {
922 // TODO(mattm): better error messages?
923 ShowError(
924 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_DELETE_CERT_ERROR_TITLE),
925 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR));
926 }
927 }
928
929 void CertificateManagerHandler::Populate(const ListValue* args) {
930 certificate_manager_model_->Refresh();
931 }
932
933 void CertificateManagerHandler::PopulateTree(const std::string& tab_name,
934 net::CertType type) {
935 const std::string tree_name = tab_name + "-tree";
936
937 scoped_ptr<icu::Collator> collator;
938 UErrorCode error = U_ZERO_ERROR;
939 collator.reset(
940 icu::Collator::createInstance(
941 icu::Locale(g_browser_process->GetApplicationLocale().c_str()),
942 error));
943 if (U_FAILURE(error))
944 collator.reset(NULL);
945 DictionaryIdComparator comparator(collator.get());
946 CertificateManagerModel::OrgGroupingMap map;
947
948 certificate_manager_model_->FilterAndBuildOrgGroupingMap(type, &map);
949
950 {
951 ListValue* nodes = new ListValue;
952 for (CertificateManagerModel::OrgGroupingMap::iterator i = map.begin();
953 i != map.end(); ++i) {
954 // Populate first level (org name).
955 DictionaryValue* dict = new DictionaryValue;
956 dict->SetString(kKeyId, OrgNameToId(i->first));
957 dict->SetString(kNameId, i->first);
958
959 // Populate second level (certs).
960 ListValue* subnodes = new ListValue;
961 for (net::CertificateList::const_iterator org_cert_it = i->second.begin();
962 org_cert_it != i->second.end(); ++org_cert_it) {
963 DictionaryValue* cert_dict = new DictionaryValue;
964 net::X509Certificate* cert = org_cert_it->get();
965 cert_dict->SetString(kKeyId, CertToId(*cert));
966 cert_dict->SetString(kNameId, certificate_manager_model_->GetColumnText(
967 *cert, CertificateManagerModel::COL_SUBJECT_NAME));
968 cert_dict->SetBoolean(
969 kReadOnlyId,
970 certificate_manager_model_->cert_db().IsReadOnly(cert));
971 cert_dict->SetBoolean(
972 kUntrustedId,
973 certificate_manager_model_->cert_db().IsUntrusted(cert));
974 // TODO(mattm): Other columns.
975 subnodes->Append(cert_dict);
976 }
977 std::sort(subnodes->begin(), subnodes->end(), comparator);
978
979 dict->Set(kSubNodesId, subnodes);
980 nodes->Append(dict);
981 }
982 std::sort(nodes->begin(), nodes->end(), comparator);
983
984 ListValue args;
985 args.Append(Value::CreateStringValue(tree_name));
986 args.Append(nodes);
987 web_ui_->CallJavascriptFunction("CertificateManager.onPopulateTree", args);
988 }
989 }
990
991 void CertificateManagerHandler::ShowError(const std::string& title,
992 const std::string& error) const {
993 ScopedVector<const Value> args;
994 args.push_back(Value::CreateStringValue(title));
995 args.push_back(Value::CreateStringValue(error));
996 args.push_back(Value::CreateStringValue(l10n_util::GetStringUTF8(IDS_OK)));
997 args.push_back(Value::CreateNullValue()); // cancelTitle
998 args.push_back(Value::CreateNullValue()); // okCallback
999 args.push_back(Value::CreateNullValue()); // cancelCallback
1000 web_ui_->CallJavascriptFunction("AlertOverlay.show", args.get());
1001 }
1002
1003 void CertificateManagerHandler::ShowImportErrors(
1004 const std::string& title,
1005 const net::CertDatabase::ImportCertFailureList& not_imported) const {
1006 std::string error;
1007 if (selected_cert_list_.size() == 1)
1008 error = l10n_util::GetStringUTF8(
1009 IDS_CERT_MANAGER_IMPORT_SINGLE_NOT_IMPORTED);
1010 else if (not_imported.size() == selected_cert_list_.size())
1011 error = l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_ALL_NOT_IMPORTED);
1012 else
1013 error = l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_SOME_NOT_IMPORTED);
1014
1015 ListValue cert_error_list;
1016 for (size_t i = 0; i < not_imported.size(); ++i) {
1017 const net::CertDatabase::ImportCertFailure& failure = not_imported[i];
1018 DictionaryValue* dict = new DictionaryValue;
1019 dict->SetString(kNameId, failure.certificate->subject().GetDisplayName());
1020 dict->SetString(kErrorId, NetErrorToString(failure.net_error));
1021 cert_error_list.Append(dict);
1022 }
1023
1024 StringValue title_value(title);
1025 StringValue error_value(error);
1026 web_ui_->CallJavascriptFunction("CertificateImportErrorOverlay.show",
1027 title_value,
1028 error_value,
1029 cert_error_list);
1030 }
1031
1032 #if defined(OS_CHROMEOS)
1033 void CertificateManagerHandler::CheckTpmTokenReady(const ListValue* args) {
1034 chromeos::CryptohomeLibrary* cryptohome =
1035 chromeos::CrosLibrary::Get()->GetCryptohomeLibrary();
1036
1037 // TODO(xiyuan): Use async way when underlying supports it.
1038 base::FundamentalValue ready(cryptohome->Pkcs11IsTpmTokenReady());
1039 web_ui_->CallJavascriptFunction("CertificateManager.onCheckTpmTokenReady",
1040 ready);
1041 }
1042 #endif
1043
1044 gfx::NativeWindow CertificateManagerHandler::GetParentWindow() const {
1045 return web_ui_->tab_contents()->view()->GetTopLevelNativeWindow();
1046 }
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698