OLD | NEW |
| (Empty) |
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "chrome/browser/ui/webui/options2/certificate_manager_handler.h" | |
6 | |
7 #include "base/bind.h" | |
8 #include "base/bind_helpers.h" | |
9 #include "base/file_util.h" // for FileAccessProvider | |
10 #include "base/memory/scoped_vector.h" | |
11 #include "base/safe_strerror_posix.h" | |
12 #include "base/string_number_conversions.h" | |
13 #include "base/values.h" | |
14 #include "chrome/browser/browser_process.h" | |
15 #include "chrome/browser/certificate_viewer.h" | |
16 #include "chrome/browser/ui/certificate_dialogs.h" | |
17 #include "chrome/browser/ui/crypto_module_password_dialog.h" | |
18 #include "content/browser/tab_contents/tab_contents.h" | |
19 #include "content/browser/tab_contents/tab_contents_view.h" | |
20 #include "content/public/browser/browser_thread.h" // for FileAccessProvider | |
21 #include "grit/generated_resources.h" | |
22 #include "net/base/crypto_module.h" | |
23 #include "net/base/x509_certificate.h" | |
24 #include "ui/base/l10n/l10n_util.h" | |
25 #include "ui/base/l10n/l10n_util_collator.h" | |
26 | |
27 #if defined(OS_CHROMEOS) | |
28 #include "chrome/browser/chromeos/cros/cros_library.h" | |
29 #include "chrome/browser/chromeos/cros/cryptohome_library.h" | |
30 #endif | |
31 | |
32 using content::BrowserThread; | |
33 | |
34 namespace { | |
35 | |
36 static const char kKeyId[] = "id"; | |
37 static const char kSubNodesId[] = "subnodes"; | |
38 static const char kNameId[] = "name"; | |
39 static const char kReadOnlyId[] = "readonly"; | |
40 static const char kUntrustedId[] = "untrusted"; | |
41 static const char kSecurityDeviceId[] = "device"; | |
42 static const char kErrorId[] = "error"; | |
43 | |
44 // Enumeration of different callers of SelectFile. (Start counting at 1 so | |
45 // if SelectFile is accidentally called with params=NULL it won't match any.) | |
46 enum { | |
47 EXPORT_PERSONAL_FILE_SELECTED = 1, | |
48 IMPORT_PERSONAL_FILE_SELECTED, | |
49 IMPORT_SERVER_FILE_SELECTED, | |
50 IMPORT_CA_FILE_SELECTED, | |
51 }; | |
52 | |
53 // TODO(mattm): These are duplicated from cookies_view_handler.cc | |
54 // Encodes a pointer value into a hex string. | |
55 std::string PointerToHexString(const void* pointer) { | |
56 return base::HexEncode(&pointer, sizeof(pointer)); | |
57 } | |
58 | |
59 // Decodes a pointer from a hex string. | |
60 void* HexStringToPointer(const std::string& str) { | |
61 std::vector<uint8> buffer; | |
62 if (!base::HexStringToBytes(str, &buffer) || | |
63 buffer.size() != sizeof(void*)) { | |
64 return NULL; | |
65 } | |
66 | |
67 return *reinterpret_cast<void**>(&buffer[0]); | |
68 } | |
69 | |
70 std::string OrgNameToId(const std::string& org) { | |
71 return "org-" + org; | |
72 } | |
73 | |
74 std::string CertToId(const net::X509Certificate& cert) { | |
75 return "cert-" + PointerToHexString(&cert); | |
76 } | |
77 | |
78 net::X509Certificate* IdToCert(const std::string& id) { | |
79 if (!StartsWithASCII(id, "cert-", true)) | |
80 return NULL; | |
81 return reinterpret_cast<net::X509Certificate*>( | |
82 HexStringToPointer(id.substr(5))); | |
83 } | |
84 | |
85 net::X509Certificate* CallbackArgsToCert(const ListValue* args) { | |
86 std::string node_id; | |
87 if (!args->GetString(0, &node_id)){ | |
88 return NULL; | |
89 } | |
90 net::X509Certificate* cert = IdToCert(node_id); | |
91 if (!cert) { | |
92 NOTREACHED(); | |
93 return NULL; | |
94 } | |
95 return cert; | |
96 } | |
97 | |
98 bool CallbackArgsToBool(const ListValue* args, int index, bool* result) { | |
99 std::string string_value; | |
100 if (!args->GetString(index, &string_value)) | |
101 return false; | |
102 | |
103 *result = string_value[0] == 't'; | |
104 return true; | |
105 } | |
106 | |
107 struct DictionaryIdComparator { | |
108 explicit DictionaryIdComparator(icu::Collator* collator) | |
109 : collator_(collator) { | |
110 } | |
111 | |
112 bool operator()(const Value* a, | |
113 const Value* b) const { | |
114 DCHECK(a->GetType() == Value::TYPE_DICTIONARY); | |
115 DCHECK(b->GetType() == Value::TYPE_DICTIONARY); | |
116 const DictionaryValue* a_dict = reinterpret_cast<const DictionaryValue*>(a); | |
117 const DictionaryValue* b_dict = reinterpret_cast<const DictionaryValue*>(b); | |
118 string16 a_str; | |
119 string16 b_str; | |
120 a_dict->GetString(kNameId, &a_str); | |
121 b_dict->GetString(kNameId, &b_str); | |
122 if (collator_ == NULL) | |
123 return a_str < b_str; | |
124 return l10n_util::CompareString16WithCollator( | |
125 collator_, a_str, b_str) == UCOL_LESS; | |
126 } | |
127 | |
128 icu::Collator* collator_; | |
129 }; | |
130 | |
131 std::string NetErrorToString(int net_error) { | |
132 switch (net_error) { | |
133 // TODO(mattm): handle more cases. | |
134 case net::ERR_IMPORT_CA_CERT_NOT_CA: | |
135 return l10n_util::GetStringUTF8(IDS_CERT_MANAGER_ERROR_NOT_CA); | |
136 default: | |
137 return l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR); | |
138 } | |
139 } | |
140 | |
141 } // namespace | |
142 | |
143 /////////////////////////////////////////////////////////////////////////////// | |
144 // FileAccessProvider | |
145 | |
146 // TODO(mattm): Move to some shared location? | |
147 class FileAccessProvider | |
148 : public base::RefCountedThreadSafe<FileAccessProvider>, | |
149 public CancelableRequestProvider { | |
150 public: | |
151 // Reports 0 on success or errno on failure, and the data of the file upon | |
152 // success. | |
153 // TODO(mattm): don't pass std::string by value.. could use RefCountedBytes | |
154 // but it's a vector. Maybe do the derive from CancelableRequest thing | |
155 // described in cancelable_request.h? | |
156 typedef Callback2<int, std::string>::Type ReadCallback; | |
157 | |
158 // Reports 0 on success or errno on failure, and the number of bytes written, | |
159 // on success. | |
160 typedef Callback2<int, int>::Type WriteCallback; | |
161 | |
162 Handle StartRead(const FilePath& path, | |
163 CancelableRequestConsumerBase* consumer, | |
164 ReadCallback* callback); | |
165 Handle StartWrite(const FilePath& path, | |
166 const std::string& data, | |
167 CancelableRequestConsumerBase* consumer, | |
168 WriteCallback* callback); | |
169 | |
170 private: | |
171 void DoRead(scoped_refptr<CancelableRequest<ReadCallback> > request, | |
172 FilePath path); | |
173 void DoWrite(scoped_refptr<CancelableRequest<WriteCallback> > request, | |
174 FilePath path, | |
175 std::string data); | |
176 }; | |
177 | |
178 CancelableRequestProvider::Handle FileAccessProvider::StartRead( | |
179 const FilePath& path, | |
180 CancelableRequestConsumerBase* consumer, | |
181 FileAccessProvider::ReadCallback* callback) { | |
182 scoped_refptr<CancelableRequest<ReadCallback> > request( | |
183 new CancelableRequest<ReadCallback>(callback)); | |
184 AddRequest(request, consumer); | |
185 | |
186 // Send the parameters and the request to the file thread. | |
187 BrowserThread::PostTask( | |
188 BrowserThread::FILE, FROM_HERE, | |
189 base::Bind(&FileAccessProvider::DoRead, this, request, path)); | |
190 | |
191 // The handle will have been set by AddRequest. | |
192 return request->handle(); | |
193 } | |
194 | |
195 CancelableRequestProvider::Handle FileAccessProvider::StartWrite( | |
196 const FilePath& path, | |
197 const std::string& data, | |
198 CancelableRequestConsumerBase* consumer, | |
199 WriteCallback* callback) { | |
200 scoped_refptr<CancelableRequest<WriteCallback> > request( | |
201 new CancelableRequest<WriteCallback>(callback)); | |
202 AddRequest(request, consumer); | |
203 | |
204 // Send the parameters and the request to the file thWrite. | |
205 BrowserThread::PostTask( | |
206 BrowserThread::FILE, FROM_HERE, | |
207 base::Bind(&FileAccessProvider::DoWrite, this, request, path, data)); | |
208 | |
209 // The handle will have been set by AddRequest. | |
210 return request->handle(); | |
211 } | |
212 | |
213 void FileAccessProvider::DoRead( | |
214 scoped_refptr<CancelableRequest<ReadCallback> > request, | |
215 FilePath path) { | |
216 if (request->canceled()) | |
217 return; | |
218 | |
219 std::string data; | |
220 VLOG(1) << "DoRead starting read"; | |
221 bool success = file_util::ReadFileToString(path, &data); | |
222 int saved_errno = success ? 0 : errno; | |
223 VLOG(1) << "DoRead done read: " << success << " " << data.size(); | |
224 request->ForwardResult(ReadCallback::TupleType(saved_errno, data)); | |
225 } | |
226 | |
227 void FileAccessProvider::DoWrite( | |
228 scoped_refptr<CancelableRequest<WriteCallback> > request, | |
229 FilePath path, | |
230 std::string data) { | |
231 VLOG(1) << "DoWrite starting write"; | |
232 int bytes_written = file_util::WriteFile(path, data.data(), data.size()); | |
233 int saved_errno = bytes_written >= 0 ? 0 : errno; | |
234 VLOG(1) << "DoWrite done write " << bytes_written; | |
235 | |
236 if (request->canceled()) | |
237 return; | |
238 | |
239 request->ForwardResult(WriteCallback::TupleType(saved_errno, bytes_written)); | |
240 } | |
241 | |
242 /////////////////////////////////////////////////////////////////////////////// | |
243 // CertificateManagerHandler | |
244 | |
245 CertificateManagerHandler::CertificateManagerHandler() | |
246 : file_access_provider_(new FileAccessProvider) { | |
247 certificate_manager_model_.reset(new CertificateManagerModel(this)); | |
248 } | |
249 | |
250 CertificateManagerHandler::~CertificateManagerHandler() { | |
251 } | |
252 | |
253 void CertificateManagerHandler::GetLocalizedValues( | |
254 DictionaryValue* localized_strings) { | |
255 DCHECK(localized_strings); | |
256 | |
257 RegisterTitle(localized_strings, "certificateManagerPage", | |
258 IDS_CERTIFICATE_MANAGER_TITLE); | |
259 | |
260 // Tabs. | |
261 localized_strings->SetString("personalCertsTabTitle", | |
262 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PERSONAL_CERTS_TAB_LABEL)); | |
263 localized_strings->SetString("serverCertsTabTitle", | |
264 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERVER_CERTS_TAB_LABEL)); | |
265 localized_strings->SetString("caCertsTabTitle", | |
266 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_CERT_AUTHORITIES_TAB_LABEL)); | |
267 localized_strings->SetString("unknownCertsTabTitle", | |
268 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNKNOWN_TAB_LABEL)); | |
269 | |
270 // Tab descriptions. | |
271 localized_strings->SetString("personalCertsTabDescription", | |
272 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_USER_TREE_DESCRIPTION)); | |
273 localized_strings->SetString("serverCertsTabDescription", | |
274 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERVER_TREE_DESCRIPTION)); | |
275 localized_strings->SetString("caCertsTabDescription", | |
276 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_AUTHORITIES_TREE_DESCRIPTION)); | |
277 localized_strings->SetString("unknownCertsTabDescription", | |
278 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNKNOWN_TREE_DESCRIPTION)); | |
279 | |
280 // Tree columns. | |
281 localized_strings->SetString("certNameColumn", | |
282 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_NAME_COLUMN_LABEL)); | |
283 localized_strings->SetString("certDeviceColumn", | |
284 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DEVICE_COLUMN_LABEL)); | |
285 localized_strings->SetString("certSerialColumn", | |
286 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_SERIAL_NUMBER_COLUMN_LABEL)); | |
287 localized_strings->SetString("certExpiresColumn", | |
288 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPIRES_COLUMN_LABEL)); | |
289 | |
290 // Buttons. | |
291 localized_strings->SetString("view_certificate", | |
292 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_VIEW_CERT_BUTTON)); | |
293 localized_strings->SetString("import_certificate", | |
294 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_BUTTON)); | |
295 localized_strings->SetString("export_certificate", | |
296 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_BUTTON)); | |
297 localized_strings->SetString("export_all_certificates", | |
298 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_ALL_BUTTON)); | |
299 localized_strings->SetString("edit_certificate", | |
300 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_BUTTON)); | |
301 localized_strings->SetString("delete_certificate", | |
302 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_BUTTON)); | |
303 | |
304 // Certificate Delete overlay strings. | |
305 localized_strings->SetString("personalCertsTabDeleteConfirm", | |
306 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_USER_FORMAT)); | |
307 localized_strings->SetString("personalCertsTabDeleteImpact", | |
308 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_USER_DESCRIPTION)); | |
309 localized_strings->SetString("serverCertsTabDeleteConfirm", | |
310 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_SERVER_FORMAT)); | |
311 localized_strings->SetString("serverCertsTabDeleteImpact", | |
312 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_SERVER_DESCRIPTION)); | |
313 localized_strings->SetString("caCertsTabDeleteConfirm", | |
314 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_CA_FORMAT)); | |
315 localized_strings->SetString("caCertsTabDeleteImpact", | |
316 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_CA_DESCRIPTION)); | |
317 localized_strings->SetString("unknownCertsTabDeleteConfirm", | |
318 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_DELETE_UNKNOWN_FORMAT)); | |
319 localized_strings->SetString("unknownCertsTabDeleteImpact", ""); | |
320 | |
321 // Certificate Restore overlay strings. | |
322 localized_strings->SetString("certificateRestorePasswordDescription", | |
323 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_RESTORE_PASSWORD_DESC)); | |
324 localized_strings->SetString("certificatePasswordLabel", | |
325 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PASSWORD_LABEL)); | |
326 | |
327 // Personal Certificate Export overlay strings. | |
328 localized_strings->SetString("certificateExportPasswordDescription", | |
329 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_PASSWORD_DESC)); | |
330 localized_strings->SetString("certificateExportPasswordHelp", | |
331 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EXPORT_PASSWORD_HELP)); | |
332 localized_strings->SetString("certificateConfirmPasswordLabel", | |
333 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_CONFIRM_PASSWORD_LABEL)); | |
334 | |
335 // Edit CA Trust & Import CA overlay strings. | |
336 localized_strings->SetString("certificateEditTrustLabel", | |
337 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_TRUST_LABEL)); | |
338 localized_strings->SetString("certificateEditCaTrustDescriptionFormat", | |
339 l10n_util::GetStringUTF16( | |
340 IDS_CERT_MANAGER_EDIT_CA_TRUST_DESCRIPTION_FORMAT)); | |
341 localized_strings->SetString("certificateImportCaDescriptionFormat", | |
342 l10n_util::GetStringUTF16( | |
343 IDS_CERT_MANAGER_IMPORT_CA_DESCRIPTION_FORMAT)); | |
344 localized_strings->SetString("certificateCaTrustSSLLabel", | |
345 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_SSL_LABEL)); | |
346 localized_strings->SetString("certificateCaTrustEmailLabel", | |
347 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_EMAIL_LABEL)); | |
348 localized_strings->SetString("certificateCaTrustObjSignLabel", | |
349 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_EDIT_CA_TRUST_OBJSIGN_LABEL)); | |
350 localized_strings->SetString("certificateImportErrorFormat", | |
351 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_ERROR_FORMAT)); | |
352 | |
353 // Badges next to certificates | |
354 localized_strings->SetString("badgeCertUntrusted", | |
355 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_UNTRUSTED)); | |
356 | |
357 #if defined(OS_CHROMEOS) | |
358 localized_strings->SetString("importAndBindCertificate", | |
359 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_IMPORT_AND_BIND_BUTTON)); | |
360 localized_strings->SetString("hardwareBackedKeyFormat", | |
361 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_HARDWARE_BACKED_KEY_FORMAT)); | |
362 localized_strings->SetString("chromeOSDeviceName", | |
363 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_HARDWARE_BACKED)); | |
364 #endif // defined(OS_CHROMEOS) | |
365 } | |
366 | |
367 void CertificateManagerHandler::RegisterMessages() { | |
368 web_ui_->RegisterMessageCallback( | |
369 "viewCertificate", | |
370 base::Bind(&CertificateManagerHandler::View, base::Unretained(this))); | |
371 | |
372 web_ui_->RegisterMessageCallback( | |
373 "getCaCertificateTrust", | |
374 base::Bind(&CertificateManagerHandler::GetCATrust, | |
375 base::Unretained(this))); | |
376 web_ui_->RegisterMessageCallback( | |
377 "editCaCertificateTrust", | |
378 base::Bind(&CertificateManagerHandler::EditCATrust, | |
379 base::Unretained(this))); | |
380 | |
381 web_ui_->RegisterMessageCallback( | |
382 "editServerCertificate", | |
383 base::Bind(&CertificateManagerHandler::EditServer, | |
384 base::Unretained(this))); | |
385 | |
386 web_ui_->RegisterMessageCallback( | |
387 "cancelImportExportCertificate", | |
388 base::Bind(&CertificateManagerHandler::CancelImportExportProcess, | |
389 base::Unretained(this))); | |
390 | |
391 web_ui_->RegisterMessageCallback( | |
392 "exportPersonalCertificate", | |
393 base::Bind(&CertificateManagerHandler::ExportPersonal, | |
394 base::Unretained(this))); | |
395 web_ui_->RegisterMessageCallback( | |
396 "exportAllPersonalCertificates", | |
397 base::Bind(&CertificateManagerHandler::ExportAllPersonal, | |
398 base::Unretained(this))); | |
399 web_ui_->RegisterMessageCallback( | |
400 "exportPersonalCertificatePasswordSelected", | |
401 base::Bind(&CertificateManagerHandler::ExportPersonalPasswordSelected, | |
402 base::Unretained(this))); | |
403 | |
404 web_ui_->RegisterMessageCallback( | |
405 "importPersonalCertificate", | |
406 base::Bind(&CertificateManagerHandler::StartImportPersonal, | |
407 base::Unretained(this))); | |
408 web_ui_->RegisterMessageCallback( | |
409 "importPersonalCertificatePasswordSelected", | |
410 base::Bind(&CertificateManagerHandler::ImportPersonalPasswordSelected, | |
411 base::Unretained(this))); | |
412 | |
413 web_ui_->RegisterMessageCallback( | |
414 "importCaCertificate", | |
415 base::Bind(&CertificateManagerHandler::ImportCA, | |
416 base::Unretained(this))); | |
417 web_ui_->RegisterMessageCallback( | |
418 "importCaCertificateTrustSelected", | |
419 base::Bind(&CertificateManagerHandler::ImportCATrustSelected, | |
420 base::Unretained(this))); | |
421 | |
422 web_ui_->RegisterMessageCallback( | |
423 "importServerCertificate", | |
424 base::Bind(&CertificateManagerHandler::ImportServer, | |
425 base::Unretained(this))); | |
426 | |
427 web_ui_->RegisterMessageCallback( | |
428 "exportCertificate", | |
429 base::Bind(&CertificateManagerHandler::Export, | |
430 base::Unretained(this))); | |
431 | |
432 web_ui_->RegisterMessageCallback( | |
433 "deleteCertificate", | |
434 base::Bind(&CertificateManagerHandler::Delete, | |
435 base::Unretained(this))); | |
436 | |
437 web_ui_->RegisterMessageCallback( | |
438 "populateCertificateManager", | |
439 base::Bind(&CertificateManagerHandler::Populate, | |
440 base::Unretained(this))); | |
441 | |
442 #if defined(OS_CHROMEOS) | |
443 web_ui_->RegisterMessageCallback( | |
444 "checkTpmTokenReady", | |
445 base::Bind(&CertificateManagerHandler::CheckTpmTokenReady, | |
446 base::Unretained(this))); | |
447 #endif | |
448 } | |
449 | |
450 void CertificateManagerHandler::CertificatesRefreshed() { | |
451 PopulateTree("personalCertsTab", net::USER_CERT); | |
452 PopulateTree("serverCertsTab", net::SERVER_CERT); | |
453 PopulateTree("caCertsTab", net::CA_CERT); | |
454 PopulateTree("otherCertsTab", net::UNKNOWN_CERT); | |
455 VLOG(1) << "populating finished"; | |
456 } | |
457 | |
458 void CertificateManagerHandler::FileSelected(const FilePath& path, int index, | |
459 void* params) { | |
460 switch (reinterpret_cast<intptr_t>(params)) { | |
461 case EXPORT_PERSONAL_FILE_SELECTED: | |
462 ExportPersonalFileSelected(path); | |
463 break; | |
464 case IMPORT_PERSONAL_FILE_SELECTED: | |
465 ImportPersonalFileSelected(path); | |
466 break; | |
467 case IMPORT_SERVER_FILE_SELECTED: | |
468 ImportServerFileSelected(path); | |
469 break; | |
470 case IMPORT_CA_FILE_SELECTED: | |
471 ImportCAFileSelected(path); | |
472 break; | |
473 default: | |
474 NOTREACHED(); | |
475 } | |
476 } | |
477 | |
478 void CertificateManagerHandler::FileSelectionCanceled(void* params) { | |
479 switch (reinterpret_cast<intptr_t>(params)) { | |
480 case EXPORT_PERSONAL_FILE_SELECTED: | |
481 case IMPORT_PERSONAL_FILE_SELECTED: | |
482 case IMPORT_SERVER_FILE_SELECTED: | |
483 case IMPORT_CA_FILE_SELECTED: | |
484 ImportExportCleanup(); | |
485 break; | |
486 default: | |
487 NOTREACHED(); | |
488 } | |
489 } | |
490 | |
491 void CertificateManagerHandler::View(const ListValue* args) { | |
492 net::X509Certificate* cert = CallbackArgsToCert(args); | |
493 if (!cert) | |
494 return; | |
495 ShowCertificateViewer(GetParentWindow(), cert); | |
496 } | |
497 | |
498 void CertificateManagerHandler::GetCATrust(const ListValue* args) { | |
499 net::X509Certificate* cert = CallbackArgsToCert(args); | |
500 if (!cert) { | |
501 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); | |
502 return; | |
503 } | |
504 | |
505 net::CertDatabase::TrustBits trust_bits = | |
506 certificate_manager_model_->cert_db().GetCertTrust(cert, net::CA_CERT); | |
507 base::FundamentalValue ssl_value( | |
508 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_SSL)); | |
509 base::FundamentalValue email_value( | |
510 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_EMAIL)); | |
511 base::FundamentalValue obj_sign_value( | |
512 static_cast<bool>(trust_bits & net::CertDatabase::TRUSTED_OBJ_SIGN)); | |
513 web_ui_->CallJavascriptFunction( | |
514 "CertificateEditCaTrustOverlay.populateTrust", | |
515 ssl_value, email_value, obj_sign_value); | |
516 } | |
517 | |
518 void CertificateManagerHandler::EditCATrust(const ListValue* args) { | |
519 net::X509Certificate* cert = CallbackArgsToCert(args); | |
520 bool fail = !cert; | |
521 bool trust_ssl = false; | |
522 bool trust_email = false; | |
523 bool trust_obj_sign = false; | |
524 fail |= !CallbackArgsToBool(args, 1, &trust_ssl); | |
525 fail |= !CallbackArgsToBool(args, 2, &trust_email); | |
526 fail |= !CallbackArgsToBool(args, 3, &trust_obj_sign); | |
527 if (fail) { | |
528 LOG(ERROR) << "EditCATrust args fail"; | |
529 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); | |
530 return; | |
531 } | |
532 | |
533 bool result = certificate_manager_model_->SetCertTrust( | |
534 cert, | |
535 net::CA_CERT, | |
536 trust_ssl * net::CertDatabase::TRUSTED_SSL + | |
537 trust_email * net::CertDatabase::TRUSTED_EMAIL + | |
538 trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN); | |
539 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); | |
540 if (!result) { | |
541 // TODO(mattm): better error messages? | |
542 ShowError( | |
543 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SET_TRUST_ERROR_TITLE), | |
544 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); | |
545 } | |
546 } | |
547 | |
548 void CertificateManagerHandler::EditServer(const ListValue* args) { | |
549 NOTIMPLEMENTED(); | |
550 } | |
551 | |
552 void CertificateManagerHandler::ExportPersonal(const ListValue* args) { | |
553 net::X509Certificate* cert = CallbackArgsToCert(args); | |
554 if (!cert) | |
555 return; | |
556 | |
557 selected_cert_list_.push_back(cert); | |
558 | |
559 SelectFileDialog::FileTypeInfo file_type_info; | |
560 file_type_info.extensions.resize(1); | |
561 file_type_info.extensions[0].push_back(FILE_PATH_LITERAL("p12")); | |
562 file_type_info.extension_description_overrides.push_back( | |
563 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PKCS12_FILES)); | |
564 file_type_info.include_all_files = true; | |
565 select_file_dialog_ = SelectFileDialog::Create(this); | |
566 select_file_dialog_->SelectFile( | |
567 SelectFileDialog::SELECT_SAVEAS_FILE, string16(), | |
568 FilePath(), &file_type_info, 1, FILE_PATH_LITERAL("p12"), | |
569 web_ui_->tab_contents(), GetParentWindow(), | |
570 reinterpret_cast<void*>(EXPORT_PERSONAL_FILE_SELECTED)); | |
571 } | |
572 | |
573 void CertificateManagerHandler::ExportAllPersonal(const ListValue* args) { | |
574 NOTIMPLEMENTED(); | |
575 } | |
576 | |
577 void CertificateManagerHandler::ExportPersonalFileSelected( | |
578 const FilePath& path) { | |
579 file_path_ = path; | |
580 web_ui_->CallJavascriptFunction( | |
581 "CertificateManager.exportPersonalAskPassword"); | |
582 } | |
583 | |
584 void CertificateManagerHandler::ExportPersonalPasswordSelected( | |
585 const ListValue* args) { | |
586 if (!args->GetString(0, &password_)){ | |
587 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
588 ImportExportCleanup(); | |
589 return; | |
590 } | |
591 | |
592 // Currently, we don't support exporting more than one at a time. If we do, | |
593 // this would need to either change this to use UnlockSlotsIfNecessary or | |
594 // change UnlockCertSlotIfNecessary to take a CertificateList. | |
595 DCHECK_EQ(selected_cert_list_.size(), 1U); | |
596 | |
597 // TODO(mattm): do something smarter about non-extractable keys | |
598 browser::UnlockCertSlotIfNecessary( | |
599 selected_cert_list_[0].get(), | |
600 browser::kCryptoModulePasswordCertExport, | |
601 "", // unused. | |
602 base::Bind(&CertificateManagerHandler::ExportPersonalSlotsUnlocked, | |
603 base::Unretained(this))); | |
604 } | |
605 | |
606 void CertificateManagerHandler::ExportPersonalSlotsUnlocked() { | |
607 std::string output; | |
608 int num_exported = certificate_manager_model_->cert_db().ExportToPKCS12( | |
609 selected_cert_list_, | |
610 password_, | |
611 &output); | |
612 if (!num_exported) { | |
613 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
614 ShowError( | |
615 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE), | |
616 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); | |
617 ImportExportCleanup(); | |
618 return; | |
619 } | |
620 file_access_provider_->StartWrite( | |
621 file_path_, | |
622 output, | |
623 &consumer_, | |
624 NewCallback(this, &CertificateManagerHandler::ExportPersonalFileWritten)); | |
625 } | |
626 | |
627 void CertificateManagerHandler::ExportPersonalFileWritten(int write_errno, | |
628 int bytes_written) { | |
629 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
630 ImportExportCleanup(); | |
631 if (write_errno) { | |
632 ShowError( | |
633 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_EXPORT_ERROR_TITLE), | |
634 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_WRITE_ERROR_FORMAT, | |
635 UTF8ToUTF16(safe_strerror(write_errno)))); | |
636 } | |
637 } | |
638 | |
639 void CertificateManagerHandler::StartImportPersonal(const ListValue* args) { | |
640 SelectFileDialog::FileTypeInfo file_type_info; | |
641 if (!args->GetBoolean(0, &use_hardware_backed_)){ | |
642 // Unable to retrieve the hardware backed attribute from the args, | |
643 // so bail. | |
644 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
645 ImportExportCleanup(); | |
646 return; | |
647 } | |
648 file_type_info.extensions.resize(1); | |
649 file_type_info.extensions[0].push_back(FILE_PATH_LITERAL("p12")); | |
650 file_type_info.extension_description_overrides.push_back( | |
651 l10n_util::GetStringUTF16(IDS_CERT_MANAGER_PKCS12_FILES)); | |
652 file_type_info.include_all_files = true; | |
653 select_file_dialog_ = SelectFileDialog::Create(this); | |
654 select_file_dialog_->SelectFile( | |
655 SelectFileDialog::SELECT_OPEN_FILE, string16(), | |
656 FilePath(), &file_type_info, 1, FILE_PATH_LITERAL("p12"), | |
657 web_ui_->tab_contents(), GetParentWindow(), | |
658 reinterpret_cast<void*>(IMPORT_PERSONAL_FILE_SELECTED)); | |
659 } | |
660 | |
661 void CertificateManagerHandler::ImportPersonalFileSelected( | |
662 const FilePath& path) { | |
663 file_path_ = path; | |
664 web_ui_->CallJavascriptFunction( | |
665 "CertificateManager.importPersonalAskPassword"); | |
666 } | |
667 | |
668 void CertificateManagerHandler::ImportPersonalPasswordSelected( | |
669 const ListValue* args) { | |
670 if (!args->GetString(0, &password_)){ | |
671 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
672 ImportExportCleanup(); | |
673 return; | |
674 } | |
675 file_access_provider_->StartRead( | |
676 file_path_, | |
677 &consumer_, | |
678 NewCallback(this, &CertificateManagerHandler::ImportPersonalFileRead)); | |
679 } | |
680 | |
681 void CertificateManagerHandler::ImportPersonalFileRead( | |
682 int read_errno, std::string data) { | |
683 if (read_errno) { | |
684 ImportExportCleanup(); | |
685 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
686 ShowError( | |
687 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_IMPORT_ERROR_TITLE), | |
688 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT, | |
689 UTF8ToUTF16(safe_strerror(read_errno)))); | |
690 return; | |
691 } | |
692 | |
693 file_data_ = data; | |
694 | |
695 if (use_hardware_backed_) { | |
696 module_ = certificate_manager_model_->cert_db().GetPrivateModule(); | |
697 } else { | |
698 module_ = certificate_manager_model_->cert_db().GetPublicModule(); | |
699 } | |
700 | |
701 net::CryptoModuleList modules; | |
702 modules.push_back(module_); | |
703 browser::UnlockSlotsIfNecessary( | |
704 modules, | |
705 browser::kCryptoModulePasswordCertImport, | |
706 "", // unused. | |
707 base::Bind(&CertificateManagerHandler::ImportPersonalSlotUnlocked, | |
708 base::Unretained(this))); | |
709 } | |
710 | |
711 void CertificateManagerHandler::ImportPersonalSlotUnlocked() { | |
712 // Determine if the private key should be unextractable after the import. | |
713 // We do this by checking the value of |use_hardware_backed_| which is set | |
714 // to true if importing into a hardware module. Currently, this only happens | |
715 // for Chrome OS when the "Import and Bind" option is chosen. | |
716 bool is_extractable = !use_hardware_backed_; | |
717 int result = certificate_manager_model_->ImportFromPKCS12( | |
718 module_, file_data_, password_, is_extractable); | |
719 ImportExportCleanup(); | |
720 web_ui_->CallJavascriptFunction("CertificateRestoreOverlay.dismiss"); | |
721 int string_id; | |
722 switch (result) { | |
723 case net::OK: | |
724 return; | |
725 case net::ERR_PKCS12_IMPORT_BAD_PASSWORD: | |
726 // TODO(mattm): if the error was a bad password, we should reshow the | |
727 // password dialog after the user dismisses the error dialog. | |
728 string_id = IDS_CERT_MANAGER_BAD_PASSWORD; | |
729 break; | |
730 case net::ERR_PKCS12_IMPORT_INVALID_MAC: | |
731 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_INVALID_MAC; | |
732 break; | |
733 case net::ERR_PKCS12_IMPORT_INVALID_FILE: | |
734 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_INVALID_FILE; | |
735 break; | |
736 case net::ERR_PKCS12_IMPORT_UNSUPPORTED: | |
737 string_id = IDS_CERT_MANAGER_PKCS12_IMPORT_UNSUPPORTED; | |
738 break; | |
739 default: | |
740 string_id = IDS_CERT_MANAGER_UNKNOWN_ERROR; | |
741 break; | |
742 } | |
743 ShowError( | |
744 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_PKCS12_IMPORT_ERROR_TITLE), | |
745 l10n_util::GetStringUTF8(string_id)); | |
746 } | |
747 | |
748 void CertificateManagerHandler::CancelImportExportProcess( | |
749 const ListValue* args) { | |
750 ImportExportCleanup(); | |
751 } | |
752 | |
753 void CertificateManagerHandler::ImportExportCleanup() { | |
754 file_path_.clear(); | |
755 password_.clear(); | |
756 file_data_.clear(); | |
757 use_hardware_backed_ = false; | |
758 selected_cert_list_.clear(); | |
759 module_ = NULL; | |
760 | |
761 // There may be pending file dialogs, we need to tell them that we've gone | |
762 // away so they don't try and call back to us. | |
763 if (select_file_dialog_.get()) | |
764 select_file_dialog_->ListenerDestroyed(); | |
765 select_file_dialog_ = NULL; | |
766 } | |
767 | |
768 void CertificateManagerHandler::ImportServer(const ListValue* args) { | |
769 select_file_dialog_ = SelectFileDialog::Create(this); | |
770 ShowCertSelectFileDialog( | |
771 select_file_dialog_.get(), | |
772 SelectFileDialog::SELECT_OPEN_FILE, | |
773 FilePath(), | |
774 web_ui_->tab_contents(), | |
775 GetParentWindow(), | |
776 reinterpret_cast<void*>(IMPORT_SERVER_FILE_SELECTED)); | |
777 } | |
778 | |
779 void CertificateManagerHandler::ImportServerFileSelected(const FilePath& path) { | |
780 file_path_ = path; | |
781 file_access_provider_->StartRead( | |
782 file_path_, | |
783 &consumer_, | |
784 NewCallback(this, &CertificateManagerHandler::ImportServerFileRead)); | |
785 } | |
786 | |
787 void CertificateManagerHandler::ImportServerFileRead(int read_errno, | |
788 std::string data) { | |
789 if (read_errno) { | |
790 ImportExportCleanup(); | |
791 ShowError( | |
792 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), | |
793 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT, | |
794 UTF8ToUTF16(safe_strerror(read_errno)))); | |
795 return; | |
796 } | |
797 | |
798 selected_cert_list_ = net::X509Certificate::CreateCertificateListFromBytes( | |
799 data.data(), data.size(), net::X509Certificate::FORMAT_AUTO); | |
800 if (selected_cert_list_.empty()) { | |
801 ImportExportCleanup(); | |
802 ShowError( | |
803 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), | |
804 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CERT_PARSE_ERROR)); | |
805 return; | |
806 } | |
807 | |
808 net::CertDatabase::ImportCertFailureList not_imported; | |
809 bool result = certificate_manager_model_->ImportServerCert( | |
810 selected_cert_list_, | |
811 ¬_imported); | |
812 if (!result) { | |
813 ShowError( | |
814 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), | |
815 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); | |
816 } else if (!not_imported.empty()) { | |
817 ShowImportErrors( | |
818 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_SERVER_IMPORT_ERROR_TITLE), | |
819 not_imported); | |
820 } | |
821 ImportExportCleanup(); | |
822 } | |
823 | |
824 void CertificateManagerHandler::ImportCA(const ListValue* args) { | |
825 select_file_dialog_ = SelectFileDialog::Create(this); | |
826 ShowCertSelectFileDialog(select_file_dialog_.get(), | |
827 SelectFileDialog::SELECT_OPEN_FILE, | |
828 FilePath(), | |
829 web_ui_->tab_contents(), | |
830 GetParentWindow(), | |
831 reinterpret_cast<void*>(IMPORT_CA_FILE_SELECTED)); | |
832 } | |
833 | |
834 void CertificateManagerHandler::ImportCAFileSelected(const FilePath& path) { | |
835 file_path_ = path; | |
836 file_access_provider_->StartRead( | |
837 file_path_, | |
838 &consumer_, | |
839 NewCallback(this, &CertificateManagerHandler::ImportCAFileRead)); | |
840 } | |
841 | |
842 void CertificateManagerHandler::ImportCAFileRead(int read_errno, | |
843 std::string data) { | |
844 if (read_errno) { | |
845 ImportExportCleanup(); | |
846 ShowError( | |
847 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), | |
848 l10n_util::GetStringFUTF8(IDS_CERT_MANAGER_READ_ERROR_FORMAT, | |
849 UTF8ToUTF16(safe_strerror(read_errno)))); | |
850 return; | |
851 } | |
852 | |
853 selected_cert_list_ = net::X509Certificate::CreateCertificateListFromBytes( | |
854 data.data(), data.size(), net::X509Certificate::FORMAT_AUTO); | |
855 if (selected_cert_list_.empty()) { | |
856 ImportExportCleanup(); | |
857 ShowError( | |
858 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), | |
859 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CERT_PARSE_ERROR)); | |
860 return; | |
861 } | |
862 | |
863 scoped_refptr<net::X509Certificate> root_cert = | |
864 certificate_manager_model_->cert_db().FindRootInList(selected_cert_list_); | |
865 | |
866 // TODO(mattm): check here if root_cert is not a CA cert and show error. | |
867 | |
868 StringValue cert_name(root_cert->subject().GetDisplayName()); | |
869 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.showImport", | |
870 cert_name); | |
871 } | |
872 | |
873 void CertificateManagerHandler::ImportCATrustSelected(const ListValue* args) { | |
874 bool fail = false; | |
875 bool trust_ssl = false; | |
876 bool trust_email = false; | |
877 bool trust_obj_sign = false; | |
878 fail |= !CallbackArgsToBool(args, 0, &trust_ssl); | |
879 fail |= !CallbackArgsToBool(args, 1, &trust_email); | |
880 fail |= !CallbackArgsToBool(args, 2, &trust_obj_sign); | |
881 if (fail) { | |
882 LOG(ERROR) << "ImportCATrustSelected args fail"; | |
883 ImportExportCleanup(); | |
884 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); | |
885 return; | |
886 } | |
887 | |
888 net::CertDatabase::ImportCertFailureList not_imported; | |
889 bool result = certificate_manager_model_->ImportCACerts( | |
890 selected_cert_list_, | |
891 trust_ssl * net::CertDatabase::TRUSTED_SSL + | |
892 trust_email * net::CertDatabase::TRUSTED_EMAIL + | |
893 trust_obj_sign * net::CertDatabase::TRUSTED_OBJ_SIGN, | |
894 ¬_imported); | |
895 web_ui_->CallJavascriptFunction("CertificateEditCaTrustOverlay.dismiss"); | |
896 if (!result) { | |
897 ShowError( | |
898 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), | |
899 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); | |
900 } else if (!not_imported.empty()) { | |
901 ShowImportErrors( | |
902 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_CA_IMPORT_ERROR_TITLE), | |
903 not_imported); | |
904 } | |
905 ImportExportCleanup(); | |
906 } | |
907 | |
908 void CertificateManagerHandler::Export(const ListValue* args) { | |
909 net::X509Certificate* cert = CallbackArgsToCert(args); | |
910 if (!cert) | |
911 return; | |
912 ShowCertExportDialog(web_ui_->tab_contents(), GetParentWindow(), | |
913 cert->os_cert_handle()); | |
914 } | |
915 | |
916 void CertificateManagerHandler::Delete(const ListValue* args) { | |
917 net::X509Certificate* cert = CallbackArgsToCert(args); | |
918 if (!cert) | |
919 return; | |
920 bool result = certificate_manager_model_->Delete(cert); | |
921 if (!result) { | |
922 // TODO(mattm): better error messages? | |
923 ShowError( | |
924 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_DELETE_CERT_ERROR_TITLE), | |
925 l10n_util::GetStringUTF8(IDS_CERT_MANAGER_UNKNOWN_ERROR)); | |
926 } | |
927 } | |
928 | |
929 void CertificateManagerHandler::Populate(const ListValue* args) { | |
930 certificate_manager_model_->Refresh(); | |
931 } | |
932 | |
933 void CertificateManagerHandler::PopulateTree(const std::string& tab_name, | |
934 net::CertType type) { | |
935 const std::string tree_name = tab_name + "-tree"; | |
936 | |
937 scoped_ptr<icu::Collator> collator; | |
938 UErrorCode error = U_ZERO_ERROR; | |
939 collator.reset( | |
940 icu::Collator::createInstance( | |
941 icu::Locale(g_browser_process->GetApplicationLocale().c_str()), | |
942 error)); | |
943 if (U_FAILURE(error)) | |
944 collator.reset(NULL); | |
945 DictionaryIdComparator comparator(collator.get()); | |
946 CertificateManagerModel::OrgGroupingMap map; | |
947 | |
948 certificate_manager_model_->FilterAndBuildOrgGroupingMap(type, &map); | |
949 | |
950 { | |
951 ListValue* nodes = new ListValue; | |
952 for (CertificateManagerModel::OrgGroupingMap::iterator i = map.begin(); | |
953 i != map.end(); ++i) { | |
954 // Populate first level (org name). | |
955 DictionaryValue* dict = new DictionaryValue; | |
956 dict->SetString(kKeyId, OrgNameToId(i->first)); | |
957 dict->SetString(kNameId, i->first); | |
958 | |
959 // Populate second level (certs). | |
960 ListValue* subnodes = new ListValue; | |
961 for (net::CertificateList::const_iterator org_cert_it = i->second.begin(); | |
962 org_cert_it != i->second.end(); ++org_cert_it) { | |
963 DictionaryValue* cert_dict = new DictionaryValue; | |
964 net::X509Certificate* cert = org_cert_it->get(); | |
965 cert_dict->SetString(kKeyId, CertToId(*cert)); | |
966 cert_dict->SetString(kNameId, certificate_manager_model_->GetColumnText( | |
967 *cert, CertificateManagerModel::COL_SUBJECT_NAME)); | |
968 cert_dict->SetBoolean( | |
969 kReadOnlyId, | |
970 certificate_manager_model_->cert_db().IsReadOnly(cert)); | |
971 cert_dict->SetBoolean( | |
972 kUntrustedId, | |
973 certificate_manager_model_->cert_db().IsUntrusted(cert)); | |
974 // TODO(mattm): Other columns. | |
975 subnodes->Append(cert_dict); | |
976 } | |
977 std::sort(subnodes->begin(), subnodes->end(), comparator); | |
978 | |
979 dict->Set(kSubNodesId, subnodes); | |
980 nodes->Append(dict); | |
981 } | |
982 std::sort(nodes->begin(), nodes->end(), comparator); | |
983 | |
984 ListValue args; | |
985 args.Append(Value::CreateStringValue(tree_name)); | |
986 args.Append(nodes); | |
987 web_ui_->CallJavascriptFunction("CertificateManager.onPopulateTree", args); | |
988 } | |
989 } | |
990 | |
991 void CertificateManagerHandler::ShowError(const std::string& title, | |
992 const std::string& error) const { | |
993 ScopedVector<const Value> args; | |
994 args.push_back(Value::CreateStringValue(title)); | |
995 args.push_back(Value::CreateStringValue(error)); | |
996 args.push_back(Value::CreateStringValue(l10n_util::GetStringUTF8(IDS_OK))); | |
997 args.push_back(Value::CreateNullValue()); // cancelTitle | |
998 args.push_back(Value::CreateNullValue()); // okCallback | |
999 args.push_back(Value::CreateNullValue()); // cancelCallback | |
1000 web_ui_->CallJavascriptFunction("AlertOverlay.show", args.get()); | |
1001 } | |
1002 | |
1003 void CertificateManagerHandler::ShowImportErrors( | |
1004 const std::string& title, | |
1005 const net::CertDatabase::ImportCertFailureList& not_imported) const { | |
1006 std::string error; | |
1007 if (selected_cert_list_.size() == 1) | |
1008 error = l10n_util::GetStringUTF8( | |
1009 IDS_CERT_MANAGER_IMPORT_SINGLE_NOT_IMPORTED); | |
1010 else if (not_imported.size() == selected_cert_list_.size()) | |
1011 error = l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_ALL_NOT_IMPORTED); | |
1012 else | |
1013 error = l10n_util::GetStringUTF8(IDS_CERT_MANAGER_IMPORT_SOME_NOT_IMPORTED); | |
1014 | |
1015 ListValue cert_error_list; | |
1016 for (size_t i = 0; i < not_imported.size(); ++i) { | |
1017 const net::CertDatabase::ImportCertFailure& failure = not_imported[i]; | |
1018 DictionaryValue* dict = new DictionaryValue; | |
1019 dict->SetString(kNameId, failure.certificate->subject().GetDisplayName()); | |
1020 dict->SetString(kErrorId, NetErrorToString(failure.net_error)); | |
1021 cert_error_list.Append(dict); | |
1022 } | |
1023 | |
1024 StringValue title_value(title); | |
1025 StringValue error_value(error); | |
1026 web_ui_->CallJavascriptFunction("CertificateImportErrorOverlay.show", | |
1027 title_value, | |
1028 error_value, | |
1029 cert_error_list); | |
1030 } | |
1031 | |
1032 #if defined(OS_CHROMEOS) | |
1033 void CertificateManagerHandler::CheckTpmTokenReady(const ListValue* args) { | |
1034 chromeos::CryptohomeLibrary* cryptohome = | |
1035 chromeos::CrosLibrary::Get()->GetCryptohomeLibrary(); | |
1036 | |
1037 // TODO(xiyuan): Use async way when underlying supports it. | |
1038 base::FundamentalValue ready(cryptohome->Pkcs11IsTpmTokenReady()); | |
1039 web_ui_->CallJavascriptFunction("CertificateManager.onCheckTpmTokenReady", | |
1040 ready); | |
1041 } | |
1042 #endif | |
1043 | |
1044 gfx::NativeWindow CertificateManagerHandler::GetParentWindow() const { | |
1045 return web_ui_->tab_contents()->view()->GetTopLevelNativeWindow(); | |
1046 } | |
OLD | NEW |