mirror of
https://github.com/netsurf-browser/netsurf
synced 2024-12-22 04:02:34 +03:00
0c34d06494
Instead of extracting information from the X509 certificate chain in the fetcher the entire chain is propagated in Distinguished Encoding Rules (DER) format. This allows all the information contained in a certificate chain to be retained which can subsequently be presented to the user
731 lines
17 KiB
C
731 lines
17 KiB
C
/*
|
|
* Copyright 2009 Paul Blokus <paul_pl@users.sourceforge.net>
|
|
* Copyright 2013 Michael Drake <tlsa@netsurf-browser.org>
|
|
*
|
|
* This file is part of NetSurf, http://www.netsurf-browser.org/
|
|
*
|
|
* NetSurf is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* NetSurf is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
/**
|
|
* \file
|
|
* SSL Certificate verification UI implementation
|
|
*/
|
|
|
|
#include <assert.h>
|
|
#include <stdlib.h>
|
|
|
|
#include "content/fetch.h"
|
|
#include "content/urldb.h"
|
|
#include "content/hlcache.h"
|
|
#include "desktop/sslcert_viewer.h"
|
|
#include "desktop/treeview.h"
|
|
#include "utils/messages.h"
|
|
#include "utils/log.h"
|
|
#include "utils/utils.h"
|
|
|
|
/**
|
|
* ssl certificate viewer data fields
|
|
*/
|
|
enum sslcert_viewer_field {
|
|
SSLCERT_V_SUBJECT,
|
|
SSLCERT_V_SERIAL,
|
|
SSLCERT_V_TYPE,
|
|
SSLCERT_V_VALID_UNTIL,
|
|
SSLCERT_V_VALID_FROM,
|
|
SSLCERT_V_VERSION,
|
|
SSLCERT_V_ISSUER,
|
|
SSLCERT_V_CERTIFICATES,
|
|
SSLCERT_V_N_FIELDS
|
|
};
|
|
|
|
typedef nserror (*response_cb)(bool proceed, void *pw);
|
|
|
|
/**
|
|
* ssl certificate information for certificate error message
|
|
*/
|
|
struct ssl_cert_info {
|
|
long version; /**< Certificate version */
|
|
char not_before[32]; /**< Valid from date */
|
|
char not_after[32]; /**< Valid to date */
|
|
int sig_type; /**< Signature type */
|
|
char serialnum[64]; /**< Serial number */
|
|
char issuer[256]; /**< Issuer details */
|
|
char subject[256]; /**< Subject details */
|
|
int cert_type; /**< Certificate type */
|
|
ssl_cert_err err; /**< Whatever is wrong with this certificate */
|
|
};
|
|
|
|
/**
|
|
* ssl certificate verification context.
|
|
*/
|
|
struct sslcert_session_data {
|
|
struct ssl_cert_info *certs; /**< Certificates */
|
|
unsigned long num; /**< Number of certificates in chain */
|
|
nsurl *url; /**< The url of the certificate */
|
|
response_cb cb; /**< Cert accept/reject callback */
|
|
void *cbpw; /**< Context passed to callback */
|
|
|
|
treeview *tree; /**< The treeview object */
|
|
struct treeview_field_desc fields[SSLCERT_V_N_FIELDS];
|
|
};
|
|
|
|
|
|
/**
|
|
* ssl certificate tree entry
|
|
*/
|
|
struct sslcert_entry {
|
|
treeview_node *entry;
|
|
char version[24];
|
|
char type[24];
|
|
struct treeview_field_data data[SSLCERT_V_N_FIELDS - 1];
|
|
};
|
|
|
|
|
|
/**
|
|
* Free a ssl certificate viewer entry's treeview field data.
|
|
*
|
|
* \param e Entry to free data from
|
|
*/
|
|
static void sslcert_viewer_free_treeview_field_data(struct sslcert_entry *e)
|
|
{
|
|
}
|
|
|
|
|
|
/**
|
|
* Build a sslcert viewer treeview field from given text
|
|
*
|
|
* \param field SSL certificate treeview field to build
|
|
* \param data SSL certificate entry field data to set
|
|
* \param value Text to set in field, ownership yielded
|
|
* \param ssl_d SSL certificate session data
|
|
* \return NSERROR_OK on success, appropriate error otherwise
|
|
*/
|
|
static inline nserror
|
|
sslcert_viewer_field_builder(enum sslcert_viewer_field field,
|
|
struct treeview_field_data *data,
|
|
const char *value,
|
|
struct sslcert_session_data *ssl_d)
|
|
{
|
|
data->field = ssl_d->fields[field].field;
|
|
data->value = value;
|
|
data->value_len = (value != NULL) ? strlen(value) : 0;
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
* Set a sslcert viewer entry's data from the certificate.
|
|
*
|
|
* \param e Entry to set up
|
|
* \param cert Data associated with entry's certificate
|
|
* \param ssl_d SSL certificate session data
|
|
* \return NSERROR_OK on success, appropriate error otherwise
|
|
*/
|
|
static nserror
|
|
sslcert_viewer_set_treeview_field_data(struct sslcert_entry *e,
|
|
const struct ssl_cert_info *cert,
|
|
struct sslcert_session_data *ssl_d)
|
|
{
|
|
unsigned int written;
|
|
|
|
assert(e != NULL);
|
|
assert(cert != NULL);
|
|
assert(ssl_d != NULL);
|
|
|
|
/* Set the fields up */
|
|
sslcert_viewer_field_builder(SSLCERT_V_SUBJECT,
|
|
&e->data[SSLCERT_V_SUBJECT],
|
|
cert->subject, ssl_d);
|
|
|
|
sslcert_viewer_field_builder(SSLCERT_V_SERIAL,
|
|
&e->data[SSLCERT_V_SERIAL],
|
|
cert->serialnum, ssl_d);
|
|
|
|
written = snprintf(e->type, sizeof(e->type), "%i", cert->cert_type);
|
|
assert(written < sizeof(e->type));
|
|
sslcert_viewer_field_builder(SSLCERT_V_TYPE,
|
|
&e->data[SSLCERT_V_TYPE],
|
|
e->type, ssl_d);
|
|
|
|
sslcert_viewer_field_builder(SSLCERT_V_VALID_UNTIL,
|
|
&e->data[SSLCERT_V_VALID_UNTIL],
|
|
cert->not_after, ssl_d);
|
|
|
|
sslcert_viewer_field_builder(SSLCERT_V_VALID_FROM,
|
|
&e->data[SSLCERT_V_VALID_FROM],
|
|
cert->not_before, ssl_d);
|
|
|
|
written = snprintf(e->version, sizeof(e->version),
|
|
"%li", cert->version);
|
|
assert(written < sizeof(e->version));
|
|
sslcert_viewer_field_builder(SSLCERT_V_VERSION,
|
|
&e->data[SSLCERT_V_VERSION],
|
|
e->version, ssl_d);
|
|
|
|
sslcert_viewer_field_builder(SSLCERT_V_ISSUER,
|
|
&e->data[SSLCERT_V_ISSUER],
|
|
cert->issuer, ssl_d);
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
* Create a treeview node for a certificate
|
|
*
|
|
* \param ssl_d SSL certificate session data
|
|
* \param n Number of SSL certificate in chain, to make node for
|
|
* \return NSERROR_OK on success otherwise error code.
|
|
*/
|
|
static nserror
|
|
sslcert_viewer_create_node(struct sslcert_session_data *ssl_d, int n)
|
|
{
|
|
struct sslcert_entry *e;
|
|
const struct ssl_cert_info *cert = &(ssl_d->certs[n]);
|
|
nserror err;
|
|
|
|
/* Create new certificate viewer entry */
|
|
e = malloc(sizeof(struct sslcert_entry));
|
|
if (e == NULL) {
|
|
return NSERROR_NOMEM;
|
|
}
|
|
|
|
err = sslcert_viewer_set_treeview_field_data(e, cert, ssl_d);
|
|
if (err != NSERROR_OK) {
|
|
free(e);
|
|
return err;
|
|
}
|
|
|
|
/* Create the new treeview node */
|
|
err = treeview_create_node_entry(ssl_d->tree, &(e->entry),
|
|
NULL, TREE_REL_FIRST_CHILD,
|
|
e->data, e, TREE_OPTION_NONE);
|
|
if (err != NSERROR_OK) {
|
|
sslcert_viewer_free_treeview_field_data(e);
|
|
free(e);
|
|
return err;
|
|
}
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
* Initialise the treeview entry fields
|
|
*
|
|
* \param ssl_d SSL certificate session data
|
|
* \return NSERROR_OK on success otherwise error code.
|
|
*/
|
|
static nserror sslcert_init_entry_fields(struct sslcert_session_data *ssl_d)
|
|
{
|
|
int i;
|
|
const char *label;
|
|
|
|
for (i = 0; i < SSLCERT_V_N_FIELDS; i++)
|
|
ssl_d->fields[i].field = NULL;
|
|
|
|
ssl_d->fields[SSLCERT_V_SUBJECT].flags = TREE_FLAG_DEFAULT;
|
|
label = "TreeviewLabelSubject";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_SUBJECT].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_SERIAL].flags = TREE_FLAG_SHOW_NAME;
|
|
label = "TreeviewLabelSerial";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_SERIAL].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_TYPE].flags = TREE_FLAG_SHOW_NAME;
|
|
label = "TreeviewLabelType";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_TYPE].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_VALID_UNTIL].flags = TREE_FLAG_SHOW_NAME;
|
|
label = "TreeviewLabelValidUntil";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_VALID_UNTIL].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_VALID_FROM].flags = TREE_FLAG_SHOW_NAME;
|
|
label = "TreeviewLabelValidFrom";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_VALID_FROM].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_VERSION].flags = TREE_FLAG_SHOW_NAME;
|
|
label = "TreeviewLabelVersion";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_VERSION].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_ISSUER].flags = TREE_FLAG_SHOW_NAME;
|
|
label = "TreeviewLabelIssuer";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_ISSUER].field) !=
|
|
lwc_error_ok) {
|
|
goto error;
|
|
}
|
|
|
|
ssl_d->fields[SSLCERT_V_CERTIFICATES].flags = TREE_FLAG_DEFAULT;
|
|
label = "TreeviewLabelCertificates";
|
|
label = messages_get(label);
|
|
if (lwc_intern_string(label, strlen(label),
|
|
&ssl_d->fields[SSLCERT_V_CERTIFICATES].field) !=
|
|
lwc_error_ok) {
|
|
return false;
|
|
}
|
|
|
|
return NSERROR_OK;
|
|
|
|
error:
|
|
for (i = 0; i < SSLCERT_V_N_FIELDS; i++)
|
|
if (ssl_d->fields[i].field != NULL)
|
|
lwc_string_unref(ssl_d->fields[i].field);
|
|
|
|
return NSERROR_UNKNOWN;
|
|
}
|
|
|
|
|
|
/**
|
|
* Delete ssl certificate viewer entries
|
|
*
|
|
* \param e Entry to delete.
|
|
*/
|
|
static void sslcert_viewer_delete_entry(struct sslcert_entry *e)
|
|
{
|
|
sslcert_viewer_free_treeview_field_data(e);
|
|
free(e);
|
|
}
|
|
|
|
|
|
/**
|
|
* folder operation callback
|
|
*
|
|
* \param msg treeview message
|
|
* \param data message context
|
|
* \return NSERROR_OK on success
|
|
*/
|
|
static nserror
|
|
sslcert_viewer_tree_node_folder_cb(struct treeview_node_msg msg, void *data)
|
|
{
|
|
switch (msg.msg) {
|
|
case TREE_MSG_NODE_DELETE:
|
|
case TREE_MSG_NODE_EDIT:
|
|
case TREE_MSG_NODE_LAUNCH:
|
|
break;
|
|
}
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
* node entry callback
|
|
*
|
|
* \param msg treeview message
|
|
* \param data message context
|
|
* \return NSERROR_OK on success
|
|
*/
|
|
static nserror
|
|
sslcert_viewer_tree_node_entry_cb(struct treeview_node_msg msg, void *data)
|
|
{
|
|
struct sslcert_entry *e = data;
|
|
|
|
switch (msg.msg) {
|
|
case TREE_MSG_NODE_DELETE:
|
|
e->entry = NULL;
|
|
sslcert_viewer_delete_entry(e);
|
|
break;
|
|
|
|
case TREE_MSG_NODE_EDIT:
|
|
case TREE_MSG_NODE_LAUNCH:
|
|
break;
|
|
}
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
* ssl certificate treeview callbacks
|
|
*/
|
|
struct treeview_callback_table sslv_tree_cb_t = {
|
|
.folder = sslcert_viewer_tree_node_folder_cb,
|
|
.entry = sslcert_viewer_tree_node_entry_cb
|
|
};
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
nserror
|
|
sslcert_viewer_init(struct core_window_callback_table *cw_t,
|
|
void *core_window_handle,
|
|
struct sslcert_session_data *ssl_d)
|
|
{
|
|
nserror err;
|
|
int cert_loop;
|
|
|
|
assert(ssl_d != NULL);
|
|
|
|
err = treeview_init();
|
|
if (err != NSERROR_OK) {
|
|
return err;
|
|
}
|
|
|
|
NSLOG(netsurf, INFO, "Building certificate viewer");
|
|
|
|
/* Init. certificate chain treeview entry fields */
|
|
err = sslcert_init_entry_fields(ssl_d);
|
|
if (err != NSERROR_OK) {
|
|
ssl_d->tree = NULL;
|
|
return err;
|
|
}
|
|
|
|
/* Create the certificate treeview */
|
|
err = treeview_create(&ssl_d->tree, &sslv_tree_cb_t,
|
|
SSLCERT_V_N_FIELDS, ssl_d->fields,
|
|
cw_t, core_window_handle, TREEVIEW_READ_ONLY);
|
|
if (err != NSERROR_OK) {
|
|
ssl_d->tree = NULL;
|
|
return err;
|
|
}
|
|
|
|
/* Build treeview nodes from certificate chain */
|
|
for (cert_loop = ssl_d->num - 1; cert_loop >= 0; cert_loop--) {
|
|
err = sslcert_viewer_create_node(ssl_d, cert_loop);
|
|
if (err != NSERROR_OK) {
|
|
return err;
|
|
}
|
|
}
|
|
|
|
NSLOG(netsurf, INFO, "Built certificate viewer");
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
* Free SSL certificate session data
|
|
*
|
|
* \param ssl_d SSL certificate session data
|
|
*/
|
|
static void sslcert_cleanup_session(struct sslcert_session_data *ssl_d)
|
|
{
|
|
assert(ssl_d != NULL);
|
|
|
|
if (ssl_d->url) {
|
|
nsurl_unref(ssl_d->url);
|
|
ssl_d->url = NULL;
|
|
}
|
|
|
|
if (ssl_d->certs) {
|
|
free(ssl_d->certs);
|
|
ssl_d->certs = NULL;
|
|
}
|
|
|
|
free(ssl_d);
|
|
}
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
nserror sslcert_viewer_fini(struct sslcert_session_data *ssl_d)
|
|
{
|
|
int i;
|
|
nserror err;
|
|
|
|
NSLOG(netsurf, INFO, "Finalising ssl certificate viewer");
|
|
|
|
/* Destroy the treeview */
|
|
err = treeview_destroy(ssl_d->tree);
|
|
|
|
/* Free treeview entry fields */
|
|
for (i = 0; i < SSLCERT_V_N_FIELDS; i++)
|
|
if (ssl_d->fields[i].field != NULL)
|
|
lwc_string_unref(ssl_d->fields[i].field);
|
|
|
|
/* Destroy the sslcert_session_data */
|
|
sslcert_cleanup_session(ssl_d);
|
|
|
|
err = treeview_fini();
|
|
if (err != NSERROR_OK) {
|
|
return err;
|
|
}
|
|
|
|
NSLOG(netsurf, INFO, "Finalised ssl certificate viewer");
|
|
|
|
return err;
|
|
}
|
|
|
|
#ifdef WITH_OPENSSL
|
|
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/x509v3.h>
|
|
|
|
static nserror
|
|
der_to_certinfo(const uint8_t *der,
|
|
size_t der_length,
|
|
struct ssl_cert_info *info)
|
|
{
|
|
BIO *mem;
|
|
BUF_MEM *buf;
|
|
const ASN1_INTEGER *asn1_num;
|
|
BIGNUM *bignum;
|
|
X509 *cert; /**< Pointer to certificate */
|
|
|
|
if (der == NULL) {
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
cert = d2i_X509(NULL, &der, der_length);
|
|
if (cert == NULL) {
|
|
return NSERROR_INVALID;
|
|
}
|
|
|
|
/* get certificate version */
|
|
info->version = X509_get_version(cert);
|
|
|
|
/* not before date */
|
|
mem = BIO_new(BIO_s_mem());
|
|
ASN1_TIME_print(mem, X509_get_notBefore(cert));
|
|
BIO_get_mem_ptr(mem, &buf);
|
|
(void) BIO_set_close(mem, BIO_NOCLOSE);
|
|
BIO_free(mem);
|
|
memcpy(info->not_before,
|
|
buf->data,
|
|
min(sizeof(info->not_before) - 1, (unsigned)buf->length));
|
|
info->not_before[min(sizeof(info->not_before) - 1, (unsigned)buf->length)] = 0;
|
|
BUF_MEM_free(buf);
|
|
|
|
/* not after date */
|
|
mem = BIO_new(BIO_s_mem());
|
|
ASN1_TIME_print(mem,
|
|
X509_get_notAfter(cert));
|
|
BIO_get_mem_ptr(mem, &buf);
|
|
(void) BIO_set_close(mem, BIO_NOCLOSE);
|
|
BIO_free(mem);
|
|
memcpy(info->not_after,
|
|
buf->data,
|
|
min(sizeof(info->not_after) - 1, (unsigned)buf->length));
|
|
info->not_after[min(sizeof(info->not_after) - 1, (unsigned)buf->length)] = 0;
|
|
BUF_MEM_free(buf);
|
|
|
|
/* signature type */
|
|
info->sig_type = X509_get_signature_type(cert);
|
|
|
|
/* serial number */
|
|
asn1_num = X509_get_serialNumber(cert);
|
|
if (asn1_num != NULL) {
|
|
bignum = ASN1_INTEGER_to_BN(asn1_num, NULL);
|
|
if (bignum != NULL) {
|
|
char *tmp = BN_bn2hex(bignum);
|
|
if (tmp != NULL) {
|
|
strncpy(info->serialnum,
|
|
tmp,
|
|
sizeof(info->serialnum));
|
|
info->serialnum[sizeof(info->serialnum)-1] = '\0';
|
|
OPENSSL_free(tmp);
|
|
}
|
|
BN_free(bignum);
|
|
bignum = NULL;
|
|
}
|
|
}
|
|
|
|
/* issuer name */
|
|
mem = BIO_new(BIO_s_mem());
|
|
X509_NAME_print_ex(mem,
|
|
X509_get_issuer_name(cert),
|
|
0, XN_FLAG_SEP_CPLUS_SPC |
|
|
XN_FLAG_DN_REV | XN_FLAG_FN_NONE);
|
|
BIO_get_mem_ptr(mem, &buf);
|
|
(void) BIO_set_close(mem, BIO_NOCLOSE);
|
|
BIO_free(mem);
|
|
memcpy(info->issuer,
|
|
buf->data,
|
|
min(sizeof(info->issuer) - 1, (unsigned) buf->length));
|
|
info->issuer[min(sizeof(info->issuer) - 1, (unsigned) buf->length)] = 0;
|
|
BUF_MEM_free(buf);
|
|
|
|
/* subject */
|
|
mem = BIO_new(BIO_s_mem());
|
|
X509_NAME_print_ex(mem,
|
|
X509_get_subject_name(cert),
|
|
0,
|
|
XN_FLAG_SEP_CPLUS_SPC |
|
|
XN_FLAG_DN_REV |
|
|
XN_FLAG_FN_NONE);
|
|
BIO_get_mem_ptr(mem, &buf);
|
|
(void) BIO_set_close(mem, BIO_NOCLOSE);
|
|
BIO_free(mem);
|
|
memcpy(info->subject,
|
|
buf->data,
|
|
min(sizeof(info->subject) - 1, (unsigned)buf->length));
|
|
info->subject[min(sizeof(info->subject) - 1, (unsigned) buf->length)] = 0;
|
|
BUF_MEM_free(buf);
|
|
|
|
/* type of certificate */
|
|
info->cert_type = X509_certificate_type(cert, X509_get_pubkey(cert));
|
|
|
|
X509_free(cert);
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
#else
|
|
static nserror
|
|
der_to_certinfo(uint8_t *der, size_t der_length, struct ssl_cert_info *info)
|
|
{
|
|
return NSERROR_NOT_IMPLEMENTED;
|
|
}
|
|
#endif
|
|
|
|
/* copy certificate data */
|
|
static nserror
|
|
convert_chain_to_cert_info(const struct cert_chain *chain,
|
|
struct ssl_cert_info **cert_info_out)
|
|
{
|
|
struct ssl_cert_info *certs;
|
|
size_t depth;
|
|
nserror res;
|
|
|
|
certs = calloc(chain->depth, sizeof(struct ssl_cert_info));
|
|
if (certs == NULL) {
|
|
return NSERROR_NOMEM;
|
|
}
|
|
|
|
for (depth = 0; depth < chain->depth;depth++) {
|
|
res = der_to_certinfo(chain->certs[depth].der,
|
|
chain->certs[depth].der_length,
|
|
certs + depth);
|
|
if (res != NSERROR_OK) {
|
|
free(certs);
|
|
return res;
|
|
}
|
|
certs[depth].err = chain->certs[depth].err;
|
|
}
|
|
|
|
*cert_info_out = certs;
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
nserror
|
|
sslcert_viewer_create_session_data(struct nsurl *url,
|
|
nserror (*cb)(bool proceed, void *pw),
|
|
void *cbpw,
|
|
const struct cert_chain *chain,
|
|
struct sslcert_session_data **ssl_d)
|
|
{
|
|
struct sslcert_session_data *data;
|
|
nserror res;
|
|
assert(url != NULL);
|
|
assert(chain != NULL);
|
|
|
|
data = malloc(sizeof(struct sslcert_session_data));
|
|
if (data == NULL) {
|
|
*ssl_d = NULL;
|
|
return NSERROR_NOMEM;
|
|
}
|
|
res = convert_chain_to_cert_info(chain, &data->certs);
|
|
if (res != NSERROR_OK) {
|
|
free(data);
|
|
*ssl_d = NULL;
|
|
return res;
|
|
}
|
|
|
|
data->url = nsurl_ref(url);
|
|
data->num = chain->depth;
|
|
data->cb = cb;
|
|
data->cbpw = cbpw;
|
|
|
|
data->tree = NULL;
|
|
|
|
*ssl_d = data;
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
nserror sslcert_viewer_reject(struct sslcert_session_data *ssl_d)
|
|
{
|
|
assert(ssl_d != NULL);
|
|
|
|
ssl_d->cb(false, ssl_d->cbpw);
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
nserror sslcert_viewer_accept(struct sslcert_session_data *ssl_d)
|
|
{
|
|
assert(ssl_d != NULL);
|
|
|
|
urldb_set_cert_permissions(ssl_d->url, true);
|
|
|
|
ssl_d->cb(true, ssl_d->cbpw);
|
|
|
|
return NSERROR_OK;
|
|
}
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
void
|
|
sslcert_viewer_redraw(struct sslcert_session_data *ssl_d,
|
|
int x, int y,
|
|
struct rect *clip,
|
|
const struct redraw_context *ctx)
|
|
{
|
|
assert(ssl_d != NULL &&
|
|
"sslcert_viewer_redraw() given bad session data");
|
|
|
|
treeview_redraw(ssl_d->tree, x, y, clip, ctx);
|
|
}
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
void
|
|
sslcert_viewer_mouse_action(struct sslcert_session_data *ssl_d,
|
|
browser_mouse_state mouse,
|
|
int x, int y)
|
|
{
|
|
treeview_mouse_action(ssl_d->tree, mouse, x, y);
|
|
}
|
|
|
|
|
|
/* Exported interface, documented in sslcert_viewer.h */
|
|
bool sslcert_viewer_keypress(struct sslcert_session_data *ssl_d, uint32_t key)
|
|
{
|
|
return treeview_keypress(ssl_d->tree, key);
|
|
}
|