r=rrelyea, a1.9=mtschrep git-svn-id: svn://10.0.0.236/trunk@243766 18797224-902f-48f8-a5cc-f745e15eee43
265 lines
6.6 KiB
C++
265 lines
6.6 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
|
*
|
|
* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is mozilla.org code.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Red Hat, Inc.
|
|
* Portions created by the Initial Developer are Copyright (C) 2006
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
* Kai Engert <kengert@redhat.com>
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
#include "nsSSLStatus.h"
|
|
#include "plstr.h"
|
|
#include "nsIClassInfoImpl.h"
|
|
#include "nsIProgrammingLanguage.h"
|
|
#include "nsIObjectOutputStream.h"
|
|
#include "nsIObjectInputStream.h"
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetServerCert(nsIX509Cert** _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
|
|
*_result = mServerCert;
|
|
NS_IF_ADDREF(*_result);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetKeyLength(PRUint32* _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
if (!mHaveKeyLengthAndCipher)
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
*_result = mKeyLength;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetSecretKeyLength(PRUint32* _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
if (!mHaveKeyLengthAndCipher)
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
*_result = mSecretKeyLength;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetCipherName(char** _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
if (!mHaveKeyLengthAndCipher)
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
*_result = PL_strdup(mCipherName.get());
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetIsDomainMismatch(PRBool* _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
|
|
*_result = mHaveCertErrorBits && mIsDomainMismatch;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetIsNotValidAtThisTime(PRBool* _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
|
|
*_result = mHaveCertErrorBits && mIsNotValidAtThisTime;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetIsUntrusted(PRBool* _result)
|
|
{
|
|
NS_ASSERTION(_result, "non-NULL destination required");
|
|
|
|
*_result = mHaveCertErrorBits && mIsUntrusted;
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::Read(nsIObjectInputStream* stream)
|
|
{
|
|
nsCOMPtr<nsISupports> cert;
|
|
nsresult rv = stream->ReadObject(PR_TRUE, getter_AddRefs(cert));
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
mServerCert = do_QueryInterface(cert);
|
|
if (!mServerCert)
|
|
return NS_NOINTERFACE;
|
|
|
|
rv = stream->Read32(&mKeyLength);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->Read32(&mSecretKeyLength);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->ReadCString(mCipherName);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = stream->ReadBoolean(&mIsDomainMismatch);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->ReadBoolean(&mIsNotValidAtThisTime);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->ReadBoolean(&mIsUntrusted);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = stream->ReadBoolean(&mHaveKeyLengthAndCipher);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->ReadBoolean(&mHaveCertErrorBits);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::Write(nsIObjectOutputStream* stream)
|
|
{
|
|
nsresult rv = stream->WriteCompoundObject(mServerCert,
|
|
NS_GET_IID(nsIX509Cert),
|
|
PR_TRUE);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = stream->Write32(mKeyLength);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->Write32(mSecretKeyLength);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->WriteStringZ(mCipherName.get());
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = stream->WriteBoolean(mIsDomainMismatch);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->WriteBoolean(mIsNotValidAtThisTime);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->WriteBoolean(mIsUntrusted);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
rv = stream->WriteBoolean(mHaveKeyLengthAndCipher);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
rv = stream->WriteBoolean(mHaveCertErrorBits);
|
|
NS_ENSURE_SUCCESS(rv, rv);
|
|
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetInterfaces(PRUint32 *count, nsIID * **array)
|
|
{
|
|
*count = 0;
|
|
*array = nsnull;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetHelperForLanguage(PRUint32 language, nsISupports **_retval)
|
|
{
|
|
*_retval = nsnull;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetContractID(char * *aContractID)
|
|
{
|
|
*aContractID = nsnull;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetClassDescription(char * *aClassDescription)
|
|
{
|
|
*aClassDescription = nsnull;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetClassID(nsCID * *aClassID)
|
|
{
|
|
*aClassID = (nsCID*) nsMemory::Alloc(sizeof(nsCID));
|
|
if (!*aClassID)
|
|
return NS_ERROR_OUT_OF_MEMORY;
|
|
return GetClassIDNoAlloc(*aClassID);
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetImplementationLanguage(PRUint32 *aImplementationLanguage)
|
|
{
|
|
*aImplementationLanguage = nsIProgrammingLanguage::CPLUSPLUS;
|
|
return NS_OK;
|
|
}
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetFlags(PRUint32 *aFlags)
|
|
{
|
|
*aFlags = 0;
|
|
return NS_OK;
|
|
}
|
|
|
|
static NS_DEFINE_CID(kSSLStatusCID, NS_SSLSTATUS_CID);
|
|
|
|
NS_IMETHODIMP
|
|
nsSSLStatus::GetClassIDNoAlloc(nsCID *aClassIDNoAlloc)
|
|
{
|
|
*aClassIDNoAlloc = kSSLStatusCID;
|
|
return NS_OK;
|
|
}
|
|
|
|
|
|
|
|
nsSSLStatus::nsSSLStatus()
|
|
: mKeyLength(0), mSecretKeyLength(0)
|
|
, mIsDomainMismatch(PR_FALSE)
|
|
, mIsNotValidAtThisTime(PR_FALSE)
|
|
, mIsUntrusted(PR_FALSE)
|
|
, mHaveKeyLengthAndCipher(PR_FALSE)
|
|
, mHaveCertErrorBits(PR_FALSE)
|
|
{
|
|
}
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS3(nsSSLStatus, nsISSLStatus, nsISerializable, nsIClassInfo)
|
|
|
|
nsSSLStatus::~nsSSLStatus()
|
|
{
|
|
}
|