summaryrefslogtreecommitdiff
path: root/security/nss/lib/jar/jarjart.c
diff options
context:
space:
mode:
Diffstat (limited to 'security/nss/lib/jar/jarjart.c')
-rw-r--r--security/nss/lib/jar/jarjart.c354
1 files changed, 354 insertions, 0 deletions
diff --git a/security/nss/lib/jar/jarjart.c b/security/nss/lib/jar/jarjart.c
new file mode 100644
index 000000000..039531a2b
--- /dev/null
+++ b/security/nss/lib/jar/jarjart.c
@@ -0,0 +1,354 @@
+/*
+ * The contents of this file are subject to the Mozilla Public
+ * License Version 1.1 (the "License"); you may not use this file
+ * except in compliance with the License. You may obtain a copy of
+ * the License at http://www.mozilla.org/MPL/
+ *
+ * Software distributed under the License is distributed on an "AS
+ * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
+ * implied. See the License for the specific language governing
+ * rights and limitations under the License.
+ *
+ * The Original Code is the Netscape security libraries.
+ *
+ * The Initial Developer of the Original Code is Netscape
+ * Communications Corporation. Portions created by Netscape are
+ * Copyright (C) 1994-2000 Netscape Communications Corporation. All
+ * Rights Reserved.
+ *
+ * Contributor(s):
+ *
+ * Alternatively, the contents of this file may be used under the
+ * terms of the GNU General Public License Version 2 or later (the
+ * "GPL"), in which case the provisions of the GPL are applicable
+ * instead of those above. If you wish to allow use of your
+ * version of this file only under the terms of the GPL and not to
+ * allow others to use your version of this file under the MPL,
+ * indicate your decision by deleting the provisions above and
+ * replace them with the notice and other provisions required by
+ * the GPL. If you do not delete the provisions above, a recipient
+ * may use your version of this file under either the MPL or the
+ * GPL.
+ */
+
+/*
+ * JARJART
+ *
+ * JAR functions used by Jartool
+ */
+
+/* This allows manifest files above 64k to be
+ processed on non-win16 platforms */
+
+#include "jar.h"
+#include "jarint.h"
+#include "jarjart.h"
+#include "blapi.h" /* JAR is supposed to be above the line!! */
+#include "pk11func.h" /* PK11 wrapper funcs are all above the line. */
+#include "certdb.h"
+
+/* from certdb.h */
+#define CERTDB_USER (1<<6)
+
+#if 0
+/* from certdb.h */
+typedef SECStatus (* PermCertCallback)(CERTCertificate *cert, SECItem *k, void *pdata);
+/* from certdb.h */
+SECStatus SEC_TraversePermCerts
+ (CERTCertDBHandle *handle, PermCertCallback certfunc, void *udata);
+#endif
+
+/*
+ * S O B _ l i s t _ c e r t s
+ *
+ * Return a list of newline separated certificate nicknames
+ * (this function used by the Jartool)
+ *
+ */
+
+static SECStatus jar_list_cert_callback
+ (CERTCertificate *cert, SECItem *k, void *data)
+ {
+ char *name;
+ char **ugly_list;
+
+ int trusted;
+
+ ugly_list = (char **) data;
+
+ if (cert)
+ {
+ name = cert->nickname;
+
+ trusted = cert->trust->objectSigningFlags & CERTDB_USER;
+
+ /* Add this name or email to list */
+
+ if (name && trusted)
+ {
+ *ugly_list = (char*)PORT_Realloc
+ (*ugly_list, PORT_Strlen (*ugly_list) + PORT_Strlen (name) + 2);
+
+ if (*ugly_list)
+ {
+ if (**ugly_list)
+ PORT_Strcat (*ugly_list, "\n");
+
+ PORT_Strcat (*ugly_list, name);
+ }
+ }
+ }
+
+ return (SECSuccess);
+ }
+
+/*
+ * S O B _ J A R _ l i s t _ c e r t s
+ *
+ * Return a linfeed separated ascii list of certificate
+ * nicknames for the Jartool.
+ *
+ */
+
+char *JAR_JAR_list_certs (void)
+ {
+ SECStatus status = SECFailure;
+ CERTCertDBHandle *certdb;
+
+ char *ugly_list;
+
+ certdb = JAR_open_database();
+
+ /* a little something */
+ ugly_list = (char*)PORT_ZAlloc (16);
+
+ if (ugly_list)
+ {
+ *ugly_list = 0;
+
+ status = SEC_TraversePermCerts
+ (certdb, jar_list_cert_callback, (void *) &ugly_list);
+ }
+
+ JAR_close_database (certdb);
+
+ return (status != SECSuccess) ? NULL : ugly_list;
+ }
+
+int JAR_JAR_validate_archive (char *filename)
+ {
+ JAR *jar;
+ int status = -1;
+
+ jar = JAR_new();
+
+ if (jar)
+ {
+ status = JAR_pass_archive (jar, jarArchGuess, filename, "");
+
+ if (status == 0)
+ status = jar->valid;
+
+ JAR_destroy (jar);
+ }
+
+ return status;
+ }
+
+char *JAR_JAR_get_error (int status)
+ {
+ return JAR_get_error (status);
+ }
+
+/*
+ * S O B _ J A R _ h a s h
+ *
+ * Hash algorithm interface for use by the Jartool. Since we really
+ * don't know the private sizes of the context, and Java does need to
+ * know this number, allocate 512 bytes for it.
+ *
+ * In april 1997 hashes in this file were changed to call PKCS11,
+ * as FIPS requires that when a smartcard has failed validation,
+ * hashes are not to be performed. But because of the difficulty of
+ * preserving pointer context between calls to the JAR_JAR hashing
+ * functions, the hash routines are called directly, though after
+ * checking to see if hashing is allowed.
+ *
+ */
+
+void *JAR_JAR_new_hash (int alg)
+ {
+ void *context;
+
+ MD5Context *md5;
+ SHA1Context *sha1;
+
+ /* this is a hack because this whole PORT_ZAlloc stuff looks scary */
+
+ if (!PK11_HashOK (alg == 1 ? SEC_OID_MD5 : SEC_OID_SHA1))
+ return NULL;
+
+ context = PORT_ZAlloc (512);
+
+ if (context)
+ {
+ switch (alg)
+ {
+ case 1: /* MD5 */
+ md5 = (MD5Context *) context;
+ MD5_Begin (md5);
+ break;
+
+ case 2: /* SHA1 */
+ sha1 = (SHA1Context *) context;
+ SHA1_Begin (sha1);
+ break;
+ }
+ }
+
+ return context;
+ }
+
+void *JAR_JAR_hash (int alg, void *cookie, int length, void *data)
+ {
+ MD5Context *md5;
+ SHA1Context *sha1;
+
+ /* this is a hack because this whole PORT_ZAlloc stuff looks scary */
+
+ if (!PK11_HashOK (alg == 1 ? SEC_OID_MD5 : SEC_OID_SHA1))
+ return NULL;
+
+ if (length > 0)
+ {
+ switch (alg)
+ {
+ case 1: /* MD5 */
+ md5 = (MD5Context *) cookie;
+ MD5_Update (md5, (unsigned char*)data, length);
+ break;
+
+ case 2: /* SHA1 */
+ sha1 = (SHA1Context *) cookie;
+ SHA1_Update (sha1, (unsigned char*)data, length);
+ break;
+ }
+ }
+
+ return cookie;
+ }
+
+void *JAR_JAR_end_hash (int alg, void *cookie)
+ {
+ int length;
+ unsigned char *data;
+ char *ascii;
+
+ MD5Context *md5;
+ SHA1Context *sha1;
+
+ unsigned int md5_length;
+ unsigned char md5_digest [MD5_LENGTH];
+
+ unsigned int sha1_length;
+ unsigned char sha1_digest [SHA1_LENGTH];
+
+ /* this is a hack because this whole PORT_ZAlloc stuff looks scary */
+
+ if (!PK11_HashOK (alg == 1 ? SEC_OID_MD5 : SEC_OID_SHA1))
+ return NULL;
+
+ switch (alg)
+ {
+ case 1: /* MD5 */
+
+ md5 = (MD5Context *) cookie;
+
+ MD5_End (md5, md5_digest, &md5_length, MD5_LENGTH);
+ /* MD5_DestroyContext (md5, PR_TRUE); */
+
+ data = md5_digest;
+ length = md5_length;
+
+ break;
+
+ case 2: /* SHA1 */
+
+ sha1 = (SHA1Context *) cookie;
+
+ SHA1_End (sha1, sha1_digest, &sha1_length, SHA1_LENGTH);
+ /* SHA1_DestroyContext (sha1, PR_TRUE); */
+
+ data = sha1_digest;
+ length = sha1_length;
+
+ break;
+
+ default: return NULL;
+ }
+
+ /* Instead of destroy context, since we created it */
+ /* PORT_Free (cookie); */
+
+ ascii = BTOA_DataToAscii(data, length);
+
+ return ascii ? PORT_Strdup (ascii) : NULL;
+ }
+
+/*
+ * S O B _ J A R _ s i g n _ a r c h i v e
+ *
+ * A simple API to sign a JAR archive.
+ *
+ */
+
+int JAR_JAR_sign_archive
+ (char *nickname, char *password, char *sf, char *outsig)
+ {
+ char *out_fn;
+
+ int status = JAR_ERR_GENERAL;
+ JAR_FILE sf_fp;
+ JAR_FILE out_fp;
+
+ CERTCertDBHandle *certdb;
+ void *keydb;
+
+ CERTCertificate *cert;
+
+ /* open cert and key databases */
+
+ certdb = JAR_open_database();
+ if (certdb == NULL)
+ return JAR_ERR_GENERAL;
+
+ keydb = jar_open_key_database();
+ if (keydb == NULL)
+ return JAR_ERR_GENERAL;
+
+ out_fn = PORT_Strdup (sf);
+
+ if (out_fn == NULL || PORT_Strlen (sf) < 5)
+ return JAR_ERR_GENERAL;
+
+ sf_fp = JAR_FOPEN (sf, "rb");
+ out_fp = JAR_FOPEN (outsig, "wb");
+
+ cert = CERT_FindCertByNickname (certdb, nickname);
+
+ if (cert && sf_fp && out_fp)
+ {
+ status = jar_create_pk7 (certdb, keydb, cert, password, sf_fp, out_fp);
+ }
+
+ /* remove password from prying eyes */
+ PORT_Memset (password, 0, PORT_Strlen (password));
+
+ JAR_FCLOSE (sf_fp);
+ JAR_FCLOSE (out_fp);
+
+ JAR_close_database (certdb);
+ jar_close_key_database (keydb);
+
+ return status;
+ }