summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsPKCS12Blob.h
diff options
context:
space:
mode:
authorMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
committerMatt A. Tobin <mattatobin@localhost.localdomain>2018-02-02 04:16:08 -0500
commit5f8de423f190bbb79a62f804151bc24824fa32d8 (patch)
tree10027f336435511475e392454359edea8e25895d /security/manager/ssl/nsPKCS12Blob.h
parent49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff)
downloadUXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz
UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip
Add m-esr52 at 52.6.0
Diffstat (limited to 'security/manager/ssl/nsPKCS12Blob.h')
-rw-r--r--security/manager/ssl/nsPKCS12Blob.h87
1 files changed, 87 insertions, 0 deletions
diff --git a/security/manager/ssl/nsPKCS12Blob.h b/security/manager/ssl/nsPKCS12Blob.h
new file mode 100644
index 000000000..35891182c
--- /dev/null
+++ b/security/manager/ssl/nsPKCS12Blob.h
@@ -0,0 +1,87 @@
+/* This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+/* $Id: nsPKCS12Blob.h,v 1.16 2006/04/12 15:43:32 benjamin%smedbergs.us Exp $ */
+
+#ifndef _NS_PKCS12BLOB_H_
+#define _NS_PKCS12BLOB_H_
+
+#include "nsCOMPtr.h"
+#include "nsString.h"
+#include "nsIFile.h"
+#include "nsIPK11TokenDB.h"
+#include "nsNSSHelper.h"
+#include "nsIPK11Token.h"
+#include "nsIMutableArray.h"
+
+#include "nss.h"
+
+#include "pkcs12.h"
+#include "p12plcy.h"
+
+class nsIX509Cert;
+
+//
+// nsPKCS12Blob
+//
+// Class for importing/exporting PKCS#12 blobs
+//
+class nsPKCS12Blob : public nsNSSShutDownObject
+{
+public:
+ nsPKCS12Blob();
+ virtual ~nsPKCS12Blob();
+
+ // Nothing to release.
+ virtual void virtualDestroyNSSReference() override {}
+
+ // Set the token to use (default is internal)
+ nsresult SetToken(nsIPK11Token *token);
+
+ // PKCS#12 Import
+ nsresult ImportFromFile(nsIFile *file);
+
+ // PKCS#12 Export
+ nsresult ExportToFile(nsIFile *file, nsIX509Cert **certs, int numCerts);
+
+private:
+
+ nsCOMPtr<nsIPK11Token> mToken;
+ nsCOMPtr<nsIMutableArray> mCertArray;
+ nsCOMPtr<nsIInterfaceRequestor> mUIContext;
+
+ // local helper functions
+ nsresult getPKCS12FilePassword(SECItem *);
+ nsresult newPKCS12FilePassword(SECItem *);
+ nsresult inputToDecoder(SEC_PKCS12DecoderContext *, nsIFile *);
+ nsresult unicodeToItem(const char16_t *, SECItem *);
+ void handleError(int myerr = 0);
+
+ // RetryReason and ImportMode are used when importing a PKCS12 file.
+ // There are two reasons that cause us to retry:
+ // - When the password entered by the user is incorrect.
+ // The user will be prompted to try again.
+ // - When the user entered a zero length password.
+ // An empty password should be represented as an empty
+ // string (a SECItem that contains a single terminating
+ // null UTF16 character), but some applications use a
+ // zero length SECItem.
+ // We try both variations, zero length item and empty string,
+ // without giving a user prompt when trying the different empty password flavors.
+
+ enum RetryReason { rr_do_not_retry, rr_bad_password, rr_auto_retry_empty_password_flavors };
+ enum ImportMode { im_standard_prompt, im_try_zero_length_secitem };
+
+ nsresult ImportFromFileHelper(nsIFile *file, ImportMode aImportMode, RetryReason &aWantRetry);
+
+ // NSPR file I/O for export file
+ PRFileDesc *mTmpFile;
+
+ bool mTokenSet;
+
+ static SECItem * nickname_collision(SECItem *, PRBool *, void *);
+ static void write_export_file(void *arg, const char *buf, unsigned long len);
+
+};
+
+#endif /* _NS_PKCS12BLOB_H_ */