| File: | root/firefox-clang/security/nss/lib/pk11wrap/pk11pars.c |
| Warning: | line 466, column 9 Excessive padding in 'algListsDef' (8 padding bytes, where 0 is optimal). Optimal fields order: list, description, entries, allowEmpty, consider reordering the fields or adding explicit padding members |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
| 1 | /* This Source Code Form is subject to the terms of the Mozilla Public |
| 2 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 3 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 4 | /* |
| 5 | * The following handles the loading, unloading and management of |
| 6 | * various PCKS #11 modules |
| 7 | */ |
| 8 | |
| 9 | #include <ctype.h> |
| 10 | #include <assert.h> |
| 11 | #include "pkcs11.h" |
| 12 | #include "seccomon.h" |
| 13 | #include "secmod.h" |
| 14 | #include "secmodi.h" |
| 15 | #include "secmodti.h" |
| 16 | #include "pki3hack.h" |
| 17 | #include "secerr.h" |
| 18 | #include "nss.h" |
| 19 | #include "utilpars.h" |
| 20 | #include "pk11pub.h" |
| 21 | |
| 22 | /* create a new module */ |
| 23 | static SECMODModule * |
| 24 | secmod_NewModule(void) |
| 25 | { |
| 26 | SECMODModule *newMod; |
| 27 | PLArenaPool *arena; |
| 28 | |
| 29 | /* create an arena in which dllName and commonName can be |
| 30 | * allocated. |
| 31 | */ |
| 32 | arena = PORT_NewArenaPORT_NewArena_Util(512); |
| 33 | if (arena == NULL((void*)0)) { |
| 34 | return NULL((void*)0); |
| 35 | } |
| 36 | |
| 37 | newMod = (SECMODModule *)PORT_ArenaAllocPORT_ArenaAlloc_Util(arena, sizeof(SECMODModule)); |
| 38 | if (newMod == NULL((void*)0)) { |
| 39 | PORT_FreeArenaPORT_FreeArena_Util(arena, PR_FALSE0); |
| 40 | return NULL((void*)0); |
| 41 | } |
| 42 | |
| 43 | /* |
| 44 | * initialize of the fields of the module |
| 45 | */ |
| 46 | newMod->arena = arena; |
| 47 | newMod->internal = PR_FALSE0; |
| 48 | newMod->loaded = PR_FALSE0; |
| 49 | newMod->isFIPS = PR_FALSE0; |
| 50 | newMod->dllName = NULL((void*)0); |
| 51 | newMod->commonName = NULL((void*)0); |
| 52 | newMod->library = NULL((void*)0); |
| 53 | newMod->functionList = NULL((void*)0); |
| 54 | newMod->slotCount = 0; |
| 55 | newMod->slots = NULL((void*)0); |
| 56 | newMod->slotInfo = NULL((void*)0); |
| 57 | newMod->slotInfoCount = 0; |
| 58 | newMod->refCount = 1; |
| 59 | newMod->ssl[0] = 0; |
| 60 | newMod->ssl[1] = 0; |
| 61 | newMod->libraryParams = NULL((void*)0); |
| 62 | newMod->moduleDBFunc = NULL((void*)0); |
| 63 | newMod->parent = NULL((void*)0); |
| 64 | newMod->isCritical = PR_FALSE0; |
| 65 | newMod->isModuleDB = PR_FALSE0; |
| 66 | newMod->moduleDBOnly = PR_FALSE0; |
| 67 | newMod->trustOrder = 0; |
| 68 | newMod->cipherOrder = 0; |
| 69 | newMod->evControlMask = 0; |
| 70 | newMod->refLock = PZ_NewLock(nssILockRefLock)PR_NewLock(); |
| 71 | if (newMod->refLock == NULL((void*)0)) { |
| 72 | PORT_FreeArenaPORT_FreeArena_Util(arena, PR_FALSE0); |
| 73 | return NULL((void*)0); |
| 74 | } |
| 75 | return newMod; |
| 76 | } |
| 77 | |
| 78 | /* private flags for isModuleDB (field in SECMODModule). */ |
| 79 | /* The meaing of these flags is as follows: |
| 80 | * |
| 81 | * SECMOD_FLAG_MODULE_DB_IS_MODULE_DB - This is a module that accesses the |
| 82 | * database of other modules to load. Module DBs are loadable modules that |
| 83 | * tells NSS which PKCS #11 modules to load and when. These module DBs are |
| 84 | * chainable. That is, one module DB can load another one. NSS system init |
| 85 | * design takes advantage of this feature. In system NSS, a fixed system |
| 86 | * module DB loads the system defined libraries, then chains out to the |
| 87 | * traditional module DBs to load any system or user configured modules |
| 88 | * (like smart cards). This bit is the same as the already existing meaning |
| 89 | * of isModuleDB = PR_TRUE. None of the other module db flags should be set |
| 90 | * if this flag isn't on. |
| 91 | * |
| 92 | * SECMOD_FLAG_MODULE_DB_SKIP_FIRST - This flag tells NSS to skip the first |
| 93 | * PKCS #11 module presented by a module DB. This allows the OS to load a |
| 94 | * softoken from the system module, then ask the existing module DB code to |
| 95 | * load the other PKCS #11 modules in that module DB (skipping it's request |
| 96 | * to load softoken). This gives the system init finer control over the |
| 97 | * configuration of that softoken module. |
| 98 | * |
| 99 | * SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB - This flag allows system init to mark a |
| 100 | * different module DB as the 'default' module DB (the one in which |
| 101 | * 'Add module' changes will go). Without this flag NSS takes the first |
| 102 | * module as the default Module DB, but in system NSS, that first module |
| 103 | * is the system module, which is likely read only (at least to the user). |
| 104 | * This allows system NSS to delegate those changes to the user's module DB, |
| 105 | * preserving the user's ability to load new PKCS #11 modules (which only |
| 106 | * affect him), from existing applications like Firefox. |
| 107 | */ |
| 108 | #define SECMOD_FLAG_MODULE_DB_IS_MODULE_DB0x01 0x01 /* must be set if any of the \ |
| 109 | *other flags are set */ |
| 110 | #define SECMOD_FLAG_MODULE_DB_SKIP_FIRST0x02 0x02 |
| 111 | #define SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB0x04 0x04 |
| 112 | #define SECMOD_FLAG_MODULE_DB_POLICY_ONLY0x08 0x08 |
| 113 | |
| 114 | /* private flags for internal (field in SECMODModule). */ |
| 115 | /* The meaing of these flags is as follows: |
| 116 | * |
| 117 | * SECMOD_FLAG_INTERNAL_IS_INTERNAL - This is a marks the the module is |
| 118 | * the internal module (that is, softoken). This bit is the same as the |
| 119 | * already existing meaning of internal = PR_TRUE. None of the other |
| 120 | * internal flags should be set if this flag isn't on. |
| 121 | * |
| 122 | * SECMOD_FLAG_MODULE_INTERNAL_KEY_SLOT - This flag allows system init to mark |
| 123 | * a different slot returned byt PK11_GetInternalKeySlot(). The 'primary' |
| 124 | * slot defined by this module will be the new internal key slot. |
| 125 | */ |
| 126 | #define SECMOD_FLAG_INTERNAL_IS_INTERNAL0x01 0x01 /* must be set if any of \ |
| 127 | *the other flags are set */ |
| 128 | #define SECMOD_FLAG_INTERNAL_KEY_SLOT0x02 0x02 |
| 129 | |
| 130 | /* private flags for policy check. */ |
| 131 | #define SECMOD_FLAG_POLICY_CHECK_IDENTIFIER0x01 0x01 |
| 132 | #define SECMOD_FLAG_POLICY_CHECK_VALUE0x02 0x02 |
| 133 | |
| 134 | /* |
| 135 | * for 3.4 we continue to use the old SECMODModule structure |
| 136 | */ |
| 137 | SECMODModule * |
| 138 | SECMOD_CreateModule(const char *library, const char *moduleName, |
| 139 | const char *parameters, const char *nss) |
| 140 | { |
| 141 | return SECMOD_CreateModuleEx(library, moduleName, parameters, nss, NULL((void*)0)); |
| 142 | } |
| 143 | |
| 144 | /* |
| 145 | * NSS config options format: |
| 146 | * |
| 147 | * The specified ciphers will be allowed by policy, but an application |
| 148 | * may allow more by policy explicitly: |
| 149 | * config="allow=curve1:curve2:hash1:hash2:rsa-1024..." |
| 150 | * |
| 151 | * Only the specified hashes and curves will be allowed: |
| 152 | * config="disallow=all allow=sha1:sha256:secp256r1:secp384r1" |
| 153 | * |
| 154 | * Only the specified hashes and curves will be allowed, and |
| 155 | * RSA keys of 2048 or more will be accepted, and DH key exchange |
| 156 | * with 1024-bit primes or more: |
| 157 | * config="disallow=all allow=sha1:sha256:secp256r1:secp384r1:min-rsa=2048:min-dh=1024" |
| 158 | * |
| 159 | * A policy that enables the AES ciphersuites and the SECP256/384 curves: |
| 160 | * config="allow=aes128-cbc:aes128-gcm:TLS1.0:TLS1.2:TLS1.1:HMAC-SHA1:SHA1:SHA256:SHA384:RSA:ECDHE-RSA:SECP256R1:SECP384R1" |
| 161 | * |
| 162 | * Disallow values are parsed first, then allow values, independent of the |
| 163 | * order they appear. |
| 164 | * |
| 165 | * flags: turn on the following flags: |
| 166 | * policy-lock: turn off the ability for applications to change policy with |
| 167 | * the call NSS_SetAlgorithmPolicy or the other system policy |
| 168 | * calls (SSL_SetPolicy, etc.) |
| 169 | * ssl-lock: turn off the ability to change the ssl defaults. |
| 170 | * |
| 171 | * The following only apply to ssl cipher suites (future smime) |
| 172 | * |
| 173 | * enable: turn on ciphersuites by default. |
| 174 | * disable: turn off ciphersuites by default without disallowing them by policy. |
| 175 | * |
| 176 | * |
| 177 | */ |
| 178 | |
| 179 | typedef struct { |
| 180 | const char *name; |
| 181 | unsigned name_size; |
| 182 | SECOidTag oid; |
| 183 | PRUint32 val; |
| 184 | } oidValDef; |
| 185 | |
| 186 | typedef struct { |
| 187 | const char *name; |
| 188 | unsigned name_size; |
| 189 | PRInt32 option; |
| 190 | } optionFreeDef; |
| 191 | |
| 192 | typedef struct { |
| 193 | const char *name; |
| 194 | unsigned name_size; |
| 195 | PRUint32 flag; |
| 196 | } policyFlagDef; |
| 197 | |
| 198 | /* |
| 199 | * This table should be merged with the SECOID table. |
| 200 | */ |
| 201 | #define CIPHER_NAME(x)x, (sizeof(x) - 1) x, (sizeof(x) - 1) |
| 202 | static const oidValDef curveOptList[] = { |
| 203 | /* Curves */ |
| 204 | { CIPHER_NAME("PRIME192V1")"PRIME192V1", (sizeof("PRIME192V1") - 1), SEC_OID_ANSIX962_EC_PRIME192V1, |
| 205 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 206 | { CIPHER_NAME("PRIME192V2")"PRIME192V2", (sizeof("PRIME192V2") - 1), SEC_OID_ANSIX962_EC_PRIME192V2, |
| 207 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 208 | { CIPHER_NAME("PRIME192V3")"PRIME192V3", (sizeof("PRIME192V3") - 1), SEC_OID_ANSIX962_EC_PRIME192V3, |
| 209 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 210 | { CIPHER_NAME("PRIME239V1")"PRIME239V1", (sizeof("PRIME239V1") - 1), SEC_OID_ANSIX962_EC_PRIME239V1, |
| 211 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 212 | { CIPHER_NAME("PRIME239V2")"PRIME239V2", (sizeof("PRIME239V2") - 1), SEC_OID_ANSIX962_EC_PRIME239V2, |
| 213 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 214 | { CIPHER_NAME("PRIME239V3")"PRIME239V3", (sizeof("PRIME239V3") - 1), SEC_OID_ANSIX962_EC_PRIME239V3, |
| 215 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 216 | { CIPHER_NAME("PRIME256V1")"PRIME256V1", (sizeof("PRIME256V1") - 1), SEC_OID_ANSIX962_EC_PRIME256V1, |
| 217 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 218 | { CIPHER_NAME("SECP112R1")"SECP112R1", (sizeof("SECP112R1") - 1), SEC_OID_SECG_EC_SECP112R1, |
| 219 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 220 | { CIPHER_NAME("SECP112R2")"SECP112R2", (sizeof("SECP112R2") - 1), SEC_OID_SECG_EC_SECP112R2, |
| 221 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 222 | { CIPHER_NAME("SECP128R1")"SECP128R1", (sizeof("SECP128R1") - 1), SEC_OID_SECG_EC_SECP128R1, |
| 223 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 224 | { CIPHER_NAME("SECP128R2")"SECP128R2", (sizeof("SECP128R2") - 1), SEC_OID_SECG_EC_SECP128R2, |
| 225 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 226 | { CIPHER_NAME("SECP160K1")"SECP160K1", (sizeof("SECP160K1") - 1), SEC_OID_SECG_EC_SECP160K1, |
| 227 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 228 | { CIPHER_NAME("SECP160R1")"SECP160R1", (sizeof("SECP160R1") - 1), SEC_OID_SECG_EC_SECP160R1, |
| 229 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 230 | { CIPHER_NAME("SECP160R2")"SECP160R2", (sizeof("SECP160R2") - 1), SEC_OID_SECG_EC_SECP160R2, |
| 231 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 232 | { CIPHER_NAME("SECP192K1")"SECP192K1", (sizeof("SECP192K1") - 1), SEC_OID_SECG_EC_SECP192K1, |
| 233 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 234 | { CIPHER_NAME("SECP192R1")"SECP192R1", (sizeof("SECP192R1") - 1), SEC_OID_ANSIX962_EC_PRIME192V1, |
| 235 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 236 | { CIPHER_NAME("SECP224K1")"SECP224K1", (sizeof("SECP224K1") - 1), SEC_OID_SECG_EC_SECP224K1, |
| 237 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 238 | { CIPHER_NAME("SECP256K1")"SECP256K1", (sizeof("SECP256K1") - 1), SEC_OID_SECG_EC_SECP256K1, |
| 239 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 240 | { CIPHER_NAME("SECP256R1")"SECP256R1", (sizeof("SECP256R1") - 1), SEC_OID_ANSIX962_EC_PRIME256V1, |
| 241 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 242 | { CIPHER_NAME("SECP384R1")"SECP384R1", (sizeof("SECP384R1") - 1), SEC_OID_SECG_EC_SECP384R1, |
| 243 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 244 | { CIPHER_NAME("SECP521R1")"SECP521R1", (sizeof("SECP521R1") - 1), SEC_OID_SECG_EC_SECP521R1, |
| 245 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 246 | { CIPHER_NAME("CURVE25519")"CURVE25519", (sizeof("CURVE25519") - 1), SEC_OID_CURVE25519, |
| 247 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 248 | { CIPHER_NAME("XYBER768D00")"XYBER768D00", (sizeof("XYBER768D00") - 1), SEC_OID_XYBER768D00, 0 }, |
| 249 | { CIPHER_NAME("MLKEM768X25519")"MLKEM768X25519", (sizeof("MLKEM768X25519") - 1), SEC_OID_MLKEM768X25519, 0 }, |
| 250 | /* ANSI X9.62 named elliptic curves (characteristic two field) */ |
| 251 | { CIPHER_NAME("C2PNB163V1")"C2PNB163V1", (sizeof("C2PNB163V1") - 1), SEC_OID_ANSIX962_EC_C2PNB163V1, |
| 252 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 253 | { CIPHER_NAME("C2PNB163V2")"C2PNB163V2", (sizeof("C2PNB163V2") - 1), SEC_OID_ANSIX962_EC_C2PNB163V2, |
| 254 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 255 | { CIPHER_NAME("C2PNB163V3")"C2PNB163V3", (sizeof("C2PNB163V3") - 1), SEC_OID_ANSIX962_EC_C2PNB163V3, |
| 256 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 257 | { CIPHER_NAME("C2PNB176V1")"C2PNB176V1", (sizeof("C2PNB176V1") - 1), SEC_OID_ANSIX962_EC_C2PNB176V1, |
| 258 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 259 | { CIPHER_NAME("C2TNB191V1")"C2TNB191V1", (sizeof("C2TNB191V1") - 1), SEC_OID_ANSIX962_EC_C2TNB191V1, |
| 260 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 261 | { CIPHER_NAME("C2TNB191V2")"C2TNB191V2", (sizeof("C2TNB191V2") - 1), SEC_OID_ANSIX962_EC_C2TNB191V2, |
| 262 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 263 | { CIPHER_NAME("C2TNB191V3")"C2TNB191V3", (sizeof("C2TNB191V3") - 1), SEC_OID_ANSIX962_EC_C2TNB191V3, |
| 264 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 265 | { CIPHER_NAME("C2ONB191V4")"C2ONB191V4", (sizeof("C2ONB191V4") - 1), SEC_OID_ANSIX962_EC_C2ONB191V4, |
| 266 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 267 | { CIPHER_NAME("C2ONB191V5")"C2ONB191V5", (sizeof("C2ONB191V5") - 1), SEC_OID_ANSIX962_EC_C2ONB191V5, |
| 268 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 269 | { CIPHER_NAME("C2PNB208W1")"C2PNB208W1", (sizeof("C2PNB208W1") - 1), SEC_OID_ANSIX962_EC_C2PNB208W1, |
| 270 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 271 | { CIPHER_NAME("C2TNB239V1")"C2TNB239V1", (sizeof("C2TNB239V1") - 1), SEC_OID_ANSIX962_EC_C2TNB239V1, |
| 272 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 273 | { CIPHER_NAME("C2TNB239V2")"C2TNB239V2", (sizeof("C2TNB239V2") - 1), SEC_OID_ANSIX962_EC_C2TNB239V2, |
| 274 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 275 | { CIPHER_NAME("C2TNB239V3")"C2TNB239V3", (sizeof("C2TNB239V3") - 1), SEC_OID_ANSIX962_EC_C2TNB239V3, |
| 276 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 277 | { CIPHER_NAME("C2ONB239V4")"C2ONB239V4", (sizeof("C2ONB239V4") - 1), SEC_OID_ANSIX962_EC_C2ONB239V4, |
| 278 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 279 | { CIPHER_NAME("C2ONB239V5")"C2ONB239V5", (sizeof("C2ONB239V5") - 1), SEC_OID_ANSIX962_EC_C2ONB239V5, |
| 280 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 281 | { CIPHER_NAME("C2PNB272W1")"C2PNB272W1", (sizeof("C2PNB272W1") - 1), SEC_OID_ANSIX962_EC_C2PNB272W1, |
| 282 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 283 | { CIPHER_NAME("C2PNB304W1")"C2PNB304W1", (sizeof("C2PNB304W1") - 1), SEC_OID_ANSIX962_EC_C2PNB304W1, |
| 284 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 285 | { CIPHER_NAME("C2TNB359V1")"C2TNB359V1", (sizeof("C2TNB359V1") - 1), SEC_OID_ANSIX962_EC_C2TNB359V1, |
| 286 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 287 | { CIPHER_NAME("C2PNB368W1")"C2PNB368W1", (sizeof("C2PNB368W1") - 1), SEC_OID_ANSIX962_EC_C2PNB368W1, |
| 288 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 289 | { CIPHER_NAME("C2TNB431R1")"C2TNB431R1", (sizeof("C2TNB431R1") - 1), SEC_OID_ANSIX962_EC_C2TNB431R1, |
| 290 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 291 | /* SECG named elliptic curves (characteristic two field) */ |
| 292 | { CIPHER_NAME("SECT113R1")"SECT113R1", (sizeof("SECT113R1") - 1), SEC_OID_SECG_EC_SECT113R1, |
| 293 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 294 | { CIPHER_NAME("SECT131R1")"SECT131R1", (sizeof("SECT131R1") - 1), SEC_OID_SECG_EC_SECT113R2, |
| 295 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 296 | { CIPHER_NAME("SECT131R1")"SECT131R1", (sizeof("SECT131R1") - 1), SEC_OID_SECG_EC_SECT131R1, |
| 297 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 298 | { CIPHER_NAME("SECT131R2")"SECT131R2", (sizeof("SECT131R2") - 1), SEC_OID_SECG_EC_SECT131R2, |
| 299 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 300 | { CIPHER_NAME("SECT163K1")"SECT163K1", (sizeof("SECT163K1") - 1), SEC_OID_SECG_EC_SECT163K1, |
| 301 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 302 | { CIPHER_NAME("SECT163R1")"SECT163R1", (sizeof("SECT163R1") - 1), SEC_OID_SECG_EC_SECT163R1, |
| 303 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 304 | { CIPHER_NAME("SECT163R2")"SECT163R2", (sizeof("SECT163R2") - 1), SEC_OID_SECG_EC_SECT163R2, |
| 305 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 306 | { CIPHER_NAME("SECT193R1")"SECT193R1", (sizeof("SECT193R1") - 1), SEC_OID_SECG_EC_SECT193R1, |
| 307 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 308 | { CIPHER_NAME("SECT193R2")"SECT193R2", (sizeof("SECT193R2") - 1), SEC_OID_SECG_EC_SECT193R2, |
| 309 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 310 | { CIPHER_NAME("SECT233K1")"SECT233K1", (sizeof("SECT233K1") - 1), SEC_OID_SECG_EC_SECT233K1, |
| 311 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 312 | { CIPHER_NAME("SECT233R1")"SECT233R1", (sizeof("SECT233R1") - 1), SEC_OID_SECG_EC_SECT233R1, |
| 313 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 314 | { CIPHER_NAME("SECT239K1")"SECT239K1", (sizeof("SECT239K1") - 1), SEC_OID_SECG_EC_SECT239K1, |
| 315 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 316 | { CIPHER_NAME("SECT283K1")"SECT283K1", (sizeof("SECT283K1") - 1), SEC_OID_SECG_EC_SECT283K1, |
| 317 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 318 | { CIPHER_NAME("SECT283R1")"SECT283R1", (sizeof("SECT283R1") - 1), SEC_OID_SECG_EC_SECT283R1, |
| 319 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 320 | { CIPHER_NAME("SECT409K1")"SECT409K1", (sizeof("SECT409K1") - 1), SEC_OID_SECG_EC_SECT409K1, |
| 321 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 322 | { CIPHER_NAME("SECT409R1")"SECT409R1", (sizeof("SECT409R1") - 1), SEC_OID_SECG_EC_SECT409R1, |
| 323 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 324 | { CIPHER_NAME("SECT571K1")"SECT571K1", (sizeof("SECT571K1") - 1), SEC_OID_SECG_EC_SECT571K1, |
| 325 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 326 | { CIPHER_NAME("SECT571R1")"SECT571R1", (sizeof("SECT571R1") - 1), SEC_OID_SECG_EC_SECT571R1, |
| 327 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 328 | }; |
| 329 | |
| 330 | static const oidValDef hashOptList[] = { |
| 331 | /* Hashes */ |
| 332 | { CIPHER_NAME("MD2")"MD2", (sizeof("MD2") - 1), SEC_OID_MD2, |
| 333 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 334 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 335 | { CIPHER_NAME("MD4")"MD4", (sizeof("MD4") - 1), SEC_OID_MD4, |
| 336 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 337 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 338 | { CIPHER_NAME("MD5")"MD5", (sizeof("MD5") - 1), SEC_OID_MD5, |
| 339 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 340 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 341 | { CIPHER_NAME("SHA1")"SHA1", (sizeof("SHA1") - 1), SEC_OID_SHA1, |
| 342 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 343 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 344 | { CIPHER_NAME("SHA224")"SHA224", (sizeof("SHA224") - 1), SEC_OID_SHA224, |
| 345 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 346 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 347 | { CIPHER_NAME("SHA256")"SHA256", (sizeof("SHA256") - 1), SEC_OID_SHA256, |
| 348 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 349 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 350 | { CIPHER_NAME("SHA384")"SHA384", (sizeof("SHA384") - 1), SEC_OID_SHA384, |
| 351 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 352 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 353 | { CIPHER_NAME("SHA512")"SHA512", (sizeof("SHA512") - 1), SEC_OID_SHA512, |
| 354 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 355 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 356 | { CIPHER_NAME("SHA3-224")"SHA3-224", (sizeof("SHA3-224") - 1), SEC_OID_SHA3_224, |
| 357 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 358 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 359 | { CIPHER_NAME("SHA3-256")"SHA3-256", (sizeof("SHA3-256") - 1), SEC_OID_SHA3_256, |
| 360 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 361 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 362 | { CIPHER_NAME("SHA3-384")"SHA3-384", (sizeof("SHA3-384") - 1), SEC_OID_SHA3_384, |
| 363 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 364 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 365 | { CIPHER_NAME("SHA3-512")"SHA3-512", (sizeof("SHA3-512") - 1), SEC_OID_SHA3_512, |
| 366 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 367 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) } |
| 368 | }; |
| 369 | |
| 370 | static const oidValDef macOptList[] = { |
| 371 | /* MACs */ |
| 372 | { CIPHER_NAME("HMAC-MD5")"HMAC-MD5", (sizeof("HMAC-MD5") - 1), SEC_OID_HMAC_MD5, |
| 373 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 374 | { CIPHER_NAME("HMAC-SHA1")"HMAC-SHA1", (sizeof("HMAC-SHA1") - 1), SEC_OID_HMAC_SHA1, |
| 375 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 376 | { CIPHER_NAME("HMAC-SHA224")"HMAC-SHA224", (sizeof("HMAC-SHA224") - 1), SEC_OID_HMAC_SHA224, |
| 377 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 378 | { CIPHER_NAME("HMAC-SHA256")"HMAC-SHA256", (sizeof("HMAC-SHA256") - 1), SEC_OID_HMAC_SHA256, |
| 379 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 380 | { CIPHER_NAME("HMAC-SHA384")"HMAC-SHA384", (sizeof("HMAC-SHA384") - 1), SEC_OID_HMAC_SHA384, |
| 381 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 382 | { CIPHER_NAME("HMAC-SHA512")"HMAC-SHA512", (sizeof("HMAC-SHA512") - 1), SEC_OID_HMAC_SHA512, |
| 383 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 384 | { CIPHER_NAME("HMAC-SHA3-224")"HMAC-SHA3-224", (sizeof("HMAC-SHA3-224") - 1), SEC_OID_HMAC_SHA3_224, |
| 385 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 386 | { CIPHER_NAME("HMAC-SHA3-256")"HMAC-SHA3-256", (sizeof("HMAC-SHA3-256") - 1), SEC_OID_HMAC_SHA3_256, |
| 387 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 388 | { CIPHER_NAME("HMAC-SHA3-384")"HMAC-SHA3-384", (sizeof("HMAC-SHA3-384") - 1), SEC_OID_HMAC_SHA3_384, |
| 389 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 390 | { CIPHER_NAME("HMAC-SHA3-512")"HMAC-SHA3-512", (sizeof("HMAC-SHA3-512") - 1), SEC_OID_HMAC_SHA3_512, |
| 391 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 392 | }; |
| 393 | |
| 394 | static const oidValDef cipherOptList[] = { |
| 395 | /* Ciphers */ |
| 396 | { CIPHER_NAME("AES128-CBC")"AES128-CBC", (sizeof("AES128-CBC") - 1), SEC_OID_AES_128_CBC, |
| 397 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 398 | { CIPHER_NAME("AES192-CBC")"AES192-CBC", (sizeof("AES192-CBC") - 1), SEC_OID_AES_192_CBC, |
| 399 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 400 | { CIPHER_NAME("AES256-CBC")"AES256-CBC", (sizeof("AES256-CBC") - 1), SEC_OID_AES_256_CBC, |
| 401 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 402 | { CIPHER_NAME("AES128-GCM")"AES128-GCM", (sizeof("AES128-GCM") - 1), SEC_OID_AES_128_GCM, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 403 | { CIPHER_NAME("AES192-GCM")"AES192-GCM", (sizeof("AES192-GCM") - 1), SEC_OID_AES_192_GCM, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 404 | { CIPHER_NAME("AES256-GCM")"AES256-GCM", (sizeof("AES256-GCM") - 1), SEC_OID_AES_256_GCM, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 405 | { CIPHER_NAME("CAMELLIA128-CBC")"CAMELLIA128-CBC", (sizeof("CAMELLIA128-CBC") - 1), SEC_OID_CAMELLIA_128_CBC, |
| 406 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 407 | { CIPHER_NAME("CAMELLIA192-CBC")"CAMELLIA192-CBC", (sizeof("CAMELLIA192-CBC") - 1), SEC_OID_CAMELLIA_192_CBC, |
| 408 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 409 | { CIPHER_NAME("CAMELLIA256-CBC")"CAMELLIA256-CBC", (sizeof("CAMELLIA256-CBC") - 1), SEC_OID_CAMELLIA_256_CBC, |
| 410 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 411 | { CIPHER_NAME("CHACHA20-POLY1305")"CHACHA20-POLY1305", (sizeof("CHACHA20-POLY1305") - 1), SEC_OID_CHACHA20_POLY1305, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 412 | { CIPHER_NAME("SEED-CBC")"SEED-CBC", (sizeof("SEED-CBC") - 1), SEC_OID_SEED_CBC, |
| 413 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 414 | { CIPHER_NAME("DES-EDE3-CBC")"DES-EDE3-CBC", (sizeof("DES-EDE3-CBC") - 1), SEC_OID_DES_EDE3_CBC, |
| 415 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 416 | { CIPHER_NAME("DES-40-CBC")"DES-40-CBC", (sizeof("DES-40-CBC") - 1), SEC_OID_DES_40_CBC, |
| 417 | NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 418 | { CIPHER_NAME("DES-CBC")"DES-CBC", (sizeof("DES-CBC") - 1), SEC_OID_DES_CBC, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 419 | { CIPHER_NAME("NULL-CIPHER")"NULL-CIPHER", (sizeof("NULL-CIPHER") - 1), SEC_OID_NULL_CIPHER, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 420 | { CIPHER_NAME("RC2")"RC2", (sizeof("RC2") - 1), SEC_OID_RC2_CBC, NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 421 | { CIPHER_NAME("RC2-40-CBC")"RC2-40-CBC", (sizeof("RC2-40-CBC") - 1), SEC_OID_RC2_40_CBC, NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) }, |
| 422 | { CIPHER_NAME("RC2-64-CBC")"RC2-64-CBC", (sizeof("RC2-64-CBC") - 1), SEC_OID_RC2_64_CBC, NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) }, |
| 423 | { CIPHER_NAME("RC2-128-CBC")"RC2-128-CBC", (sizeof("RC2-128-CBC") - 1), SEC_OID_RC2_128_CBC, NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) }, |
| 424 | { CIPHER_NAME("RC4")"RC4", (sizeof("RC4") - 1), SEC_OID_RC4, NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 425 | { CIPHER_NAME("IDEA")"IDEA", (sizeof("IDEA") - 1), SEC_OID_IDEA_CBC, NSS_USE_ALG_IN_SSL0x00000008 }, |
| 426 | }; |
| 427 | |
| 428 | static const oidValDef kxOptList[] = { |
| 429 | /* Key exchange */ |
| 430 | { CIPHER_NAME("RSA")"RSA", (sizeof("RSA") - 1), SEC_OID_TLS_RSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 431 | { CIPHER_NAME("RSA-EXPORT")"RSA-EXPORT", (sizeof("RSA-EXPORT") - 1), SEC_OID_TLS_RSA_EXPORT, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 432 | { CIPHER_NAME("DHE-RSA")"DHE-RSA", (sizeof("DHE-RSA") - 1), SEC_OID_TLS_DHE_RSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 433 | { CIPHER_NAME("DHE-DSS")"DHE-DSS", (sizeof("DHE-DSS") - 1), SEC_OID_TLS_DHE_DSS, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 434 | { CIPHER_NAME("DH-RSA")"DH-RSA", (sizeof("DH-RSA") - 1), SEC_OID_TLS_DH_RSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 435 | { CIPHER_NAME("DH-DSS")"DH-DSS", (sizeof("DH-DSS") - 1), SEC_OID_TLS_DH_DSS, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 436 | { CIPHER_NAME("ECDHE-ECDSA")"ECDHE-ECDSA", (sizeof("ECDHE-ECDSA") - 1), SEC_OID_TLS_ECDHE_ECDSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 437 | { CIPHER_NAME("ECDHE-RSA")"ECDHE-RSA", (sizeof("ECDHE-RSA") - 1), SEC_OID_TLS_ECDHE_RSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 438 | { CIPHER_NAME("ECDH-ECDSA")"ECDH-ECDSA", (sizeof("ECDH-ECDSA") - 1), SEC_OID_TLS_ECDH_ECDSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 439 | { CIPHER_NAME("ECDH-RSA")"ECDH-RSA", (sizeof("ECDH-RSA") - 1), SEC_OID_TLS_ECDH_RSA, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 440 | { CIPHER_NAME("TLS-REQUIRE-EMS")"TLS-REQUIRE-EMS", (sizeof("TLS-REQUIRE-EMS") - 1), SEC_OID_TLS_REQUIRE_EMS, NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 441 | |
| 442 | }; |
| 443 | |
| 444 | static const oidValDef smimeKxOptList[] = { |
| 445 | /* Key exchange */ |
| 446 | { CIPHER_NAME("RSA-PKCS")"RSA-PKCS", (sizeof("RSA-PKCS") - 1), SEC_OID_PKCS1_RSA_ENCRYPTION, NSS_USE_ALG_IN_SMIME_KX(0x00000400 | 0x00000800) }, |
| 447 | { CIPHER_NAME("RSA-OAEP")"RSA-OAEP", (sizeof("RSA-OAEP") - 1), SEC_OID_PKCS1_RSA_OAEP_ENCRYPTION, NSS_USE_ALG_IN_SMIME_KX(0x00000400 | 0x00000800) }, |
| 448 | { CIPHER_NAME("ECDH")"ECDH", (sizeof("ECDH") - 1), SEC_OID_ECDH_KEA, NSS_USE_ALG_IN_SMIME_KX(0x00000400 | 0x00000800) }, |
| 449 | { CIPHER_NAME("DH")"DH", (sizeof("DH") - 1), SEC_OID_X942_DIFFIE_HELMAN_KEY, NSS_USE_ALG_IN_SMIME_KX(0x00000400 | 0x00000800) }, |
| 450 | }; |
| 451 | |
| 452 | static const oidValDef signOptList[] = { |
| 453 | /* Signatures */ |
| 454 | { CIPHER_NAME("DSA")"DSA", (sizeof("DSA") - 1), SEC_OID_ANSIX9_DSA_SIGNATURE, |
| 455 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) }, |
| 456 | { CIPHER_NAME("RSA-PKCS")"RSA-PKCS", (sizeof("RSA-PKCS") - 1), SEC_OID_PKCS1_RSA_ENCRYPTION, |
| 457 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) }, |
| 458 | { CIPHER_NAME("RSA-PSS")"RSA-PSS", (sizeof("RSA-PSS") - 1), SEC_OID_PKCS1_RSA_PSS_SIGNATURE, |
| 459 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) }, |
| 460 | { CIPHER_NAME("ECDSA")"ECDSA", (sizeof("ECDSA") - 1), SEC_OID_ANSIX962_EC_PUBLIC_KEY, |
| 461 | NSS_USE_ALG_IN_SSL_KX0x00000004 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) }, |
| 462 | { CIPHER_NAME("ED25519")"ED25519", (sizeof("ED25519") - 1), SEC_OID_ED25519_PUBLIC_KEY, |
| 463 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) }, |
| 464 | }; |
| 465 | |
| 466 | typedef struct { |
Excessive padding in 'algListsDef' (8 padding bytes, where 0 is optimal). Optimal fields order: list, description, entries, allowEmpty, consider reordering the fields or adding explicit padding members | |
| 467 | const oidValDef *list; |
| 468 | PRUint32 entries; |
| 469 | const char *description; |
| 470 | PRBool allowEmpty; |
| 471 | } algListsDef; |
| 472 | |
| 473 | static const algListsDef algOptLists[] = { |
| 474 | { curveOptList, PR_ARRAY_SIZE(curveOptList)(sizeof(curveOptList)/sizeof((curveOptList)[0])), "ECC", PR_FALSE0 }, |
| 475 | { hashOptList, PR_ARRAY_SIZE(hashOptList)(sizeof(hashOptList)/sizeof((hashOptList)[0])), "HASH", PR_FALSE0 }, |
| 476 | { macOptList, PR_ARRAY_SIZE(macOptList)(sizeof(macOptList)/sizeof((macOptList)[0])), "MAC", PR_FALSE0 }, |
| 477 | { cipherOptList, PR_ARRAY_SIZE(cipherOptList)(sizeof(cipherOptList)/sizeof((cipherOptList)[0])), "CIPHER", PR_FALSE0 }, |
| 478 | { kxOptList, PR_ARRAY_SIZE(kxOptList)(sizeof(kxOptList)/sizeof((kxOptList)[0])), "SSL-KX", PR_FALSE0 }, |
| 479 | { smimeKxOptList, PR_ARRAY_SIZE(smimeKxOptList)(sizeof(smimeKxOptList)/sizeof((smimeKxOptList)[0])), "SMIME-KX", PR_TRUE1 }, |
| 480 | { signOptList, PR_ARRAY_SIZE(signOptList)(sizeof(signOptList)/sizeof((signOptList)[0])), "OTHER-SIGN", PR_FALSE0 }, |
| 481 | }; |
| 482 | |
| 483 | static const optionFreeDef sslOptList[] = { |
| 484 | /* Versions */ |
| 485 | { CIPHER_NAME("SSL2.0")"SSL2.0", (sizeof("SSL2.0") - 1), 0x002 }, |
| 486 | { CIPHER_NAME("SSL3.0")"SSL3.0", (sizeof("SSL3.0") - 1), 0x300 }, |
| 487 | { CIPHER_NAME("SSL3.1")"SSL3.1", (sizeof("SSL3.1") - 1), 0x301 }, |
| 488 | { CIPHER_NAME("TLS1.0")"TLS1.0", (sizeof("TLS1.0") - 1), 0x301 }, |
| 489 | { CIPHER_NAME("TLS1.1")"TLS1.1", (sizeof("TLS1.1") - 1), 0x302 }, |
| 490 | { CIPHER_NAME("TLS1.2")"TLS1.2", (sizeof("TLS1.2") - 1), 0x303 }, |
| 491 | { CIPHER_NAME("TLS1.3")"TLS1.3", (sizeof("TLS1.3") - 1), 0x304 }, |
| 492 | { CIPHER_NAME("DTLS1.0")"DTLS1.0", (sizeof("DTLS1.0") - 1), 0x302 }, |
| 493 | { CIPHER_NAME("DTLS1.1")"DTLS1.1", (sizeof("DTLS1.1") - 1), 0x302 }, |
| 494 | { CIPHER_NAME("DTLS1.2")"DTLS1.2", (sizeof("DTLS1.2") - 1), 0x303 }, |
| 495 | { CIPHER_NAME("DTLS1.3")"DTLS1.3", (sizeof("DTLS1.3") - 1), 0x304 }, |
| 496 | }; |
| 497 | |
| 498 | static const optionFreeDef keySizeFlagsList[] = { |
| 499 | { CIPHER_NAME("KEY-SIZE-SSL")"KEY-SIZE-SSL", (sizeof("KEY-SIZE-SSL") - 1), NSS_KEY_SIZE_POLICY_SSL_FLAG1 }, |
| 500 | { CIPHER_NAME("KEY-SIZE-SIGN")"KEY-SIZE-SIGN", (sizeof("KEY-SIZE-SIGN") - 1), NSS_KEY_SIZE_POLICY_SIGN_FLAG4 }, |
| 501 | { CIPHER_NAME("KEY-SIZE-VERIFY")"KEY-SIZE-VERIFY", (sizeof("KEY-SIZE-VERIFY") - 1), NSS_KEY_SIZE_POLICY_VERIFY_FLAG2 }, |
| 502 | { CIPHER_NAME("KEY-SIZE-SMIME")"KEY-SIZE-SMIME", (sizeof("KEY-SIZE-SMIME") - 1), NSS_KEY_SIZE_POLICY_SMIME_FLAG8 }, |
| 503 | { CIPHER_NAME("KEY-SIZE-ALL")"KEY-SIZE-ALL", (sizeof("KEY-SIZE-ALL") - 1), NSS_KEY_SIZE_POLICY_ALL_FLAGS0x0f }, |
| 504 | }; |
| 505 | |
| 506 | static const optionFreeDef freeOptList[] = { |
| 507 | |
| 508 | /* Restrictions for asymetric keys */ |
| 509 | { CIPHER_NAME("RSA-MIN")"RSA-MIN", (sizeof("RSA-MIN") - 1), NSS_RSA_MIN_KEY_SIZE0x001 }, |
| 510 | { CIPHER_NAME("DH-MIN")"DH-MIN", (sizeof("DH-MIN") - 1), NSS_DH_MIN_KEY_SIZE0x002 }, |
| 511 | { CIPHER_NAME("DSA-MIN")"DSA-MIN", (sizeof("DSA-MIN") - 1), NSS_DSA_MIN_KEY_SIZE0x004 }, |
| 512 | { CIPHER_NAME("ECC-MIN")"ECC-MIN", (sizeof("ECC-MIN") - 1), NSS_ECC_MIN_KEY_SIZE0x011 }, |
| 513 | /* what operations doe the key size apply to */ |
| 514 | { CIPHER_NAME("KEY-SIZE-FLAGS")"KEY-SIZE-FLAGS", (sizeof("KEY-SIZE-FLAGS") - 1), NSS_KEY_SIZE_POLICY_FLAGS0x00e }, |
| 515 | /* constraints on SSL Protocols */ |
| 516 | { CIPHER_NAME("TLS-VERSION-MIN")"TLS-VERSION-MIN", (sizeof("TLS-VERSION-MIN") - 1), NSS_TLS_VERSION_MIN_POLICY0x008 }, |
| 517 | { CIPHER_NAME("TLS-VERSION-MAX")"TLS-VERSION-MAX", (sizeof("TLS-VERSION-MAX") - 1), NSS_TLS_VERSION_MAX_POLICY0x009 }, |
| 518 | /* constraints on DTLS Protocols */ |
| 519 | { CIPHER_NAME("DTLS-VERSION-MIN")"DTLS-VERSION-MIN", (sizeof("DTLS-VERSION-MIN") - 1), NSS_DTLS_VERSION_MIN_POLICY0x00a }, |
| 520 | { CIPHER_NAME("DTLS-VERSION-MAX")"DTLS-VERSION-MAX", (sizeof("DTLS-VERSION-MAX") - 1), NSS_DTLS_VERSION_MAX_POLICY0x00b } |
| 521 | }; |
| 522 | |
| 523 | static const policyFlagDef policyFlagList[] = { |
| 524 | { CIPHER_NAME("SSL")"SSL", (sizeof("SSL") - 1), NSS_USE_ALG_IN_SSL0x00000008 }, |
| 525 | { CIPHER_NAME("SSL-KEY-EXCHANGE")"SSL-KEY-EXCHANGE", (sizeof("SSL-KEY-EXCHANGE") - 1), NSS_USE_ALG_IN_SSL_KX0x00000004 }, |
| 526 | /* add other key exhanges in the future */ |
| 527 | { CIPHER_NAME("KEY-EXCHANGE")"KEY-EXCHANGE", (sizeof("KEY-EXCHANGE") - 1), NSS_USE_ALG_IN_KEY_EXCHANGE((0x00000400 | 0x00000800) | 0x00000004) }, |
| 528 | { CIPHER_NAME("CERT-SIGNATURE")"CERT-SIGNATURE", (sizeof("CERT-SIGNATURE") - 1), NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001 }, |
| 529 | { CIPHER_NAME("CMS-SIGNATURE")"CMS-SIGNATURE", (sizeof("CMS-SIGNATURE") - 1), NSS_USE_ALG_IN_SMIME_SIGNATURE0x00000002 }, |
| 530 | { CIPHER_NAME("SMIME-SIGNATURE")"SMIME-SIGNATURE", (sizeof("SMIME-SIGNATURE") - 1), NSS_USE_ALG_IN_SMIME_SIGNATURE0x00000002 }, |
| 531 | { CIPHER_NAME("ALL-SIGNATURE")"ALL-SIGNATURE", (sizeof("ALL-SIGNATURE") - 1), NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) }, |
| 532 | { CIPHER_NAME("PKCS12")"PKCS12", (sizeof("PKCS12") - 1), NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) }, |
| 533 | /* only use in allow */ |
| 534 | { CIPHER_NAME("PKCS12-LEGACY")"PKCS12-LEGACY", (sizeof("PKCS12-LEGACY") - 1), NSS_USE_ALG_IN_PKCS12_DECRYPT0x00000040 }, |
| 535 | /* only use in disallow */ |
| 536 | { CIPHER_NAME("PKCS12-ENCRYPT")"PKCS12-ENCRYPT", (sizeof("PKCS12-ENCRYPT") - 1), NSS_USE_ALG_IN_PKCS12_ENCRYPT0x00000080 }, |
| 537 | { CIPHER_NAME("SMIME")"SMIME", (sizeof("SMIME") - 1), NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) }, |
| 538 | /* only use in allow, enable */ |
| 539 | { CIPHER_NAME("SMIME-LEGACY")"SMIME-LEGACY", (sizeof("SMIME-LEGACY") - 1), NSS_USE_ALG_IN_SMIME_LEGACY0x00000100 }, |
| 540 | /* only use in disallow, disable */ |
| 541 | { CIPHER_NAME("SMIME-ENCRYPT")"SMIME-ENCRYPT", (sizeof("SMIME-ENCRYPT") - 1), NSS_USE_ALG_IN_SMIME_ENCRYPT0x00000200 }, |
| 542 | { CIPHER_NAME("SMIME-KEY-EXCHANGE")"SMIME-KEY-EXCHANGE", (sizeof("SMIME-KEY-EXCHANGE") - 1), NSS_USE_ALG_IN_SMIME_KX(0x00000400 | 0x00000800) }, |
| 543 | /* only use in allow */ |
| 544 | { CIPHER_NAME("SMIME-KEY-EXCHANGE-LEGACY")"SMIME-KEY-EXCHANGE-LEGACY", (sizeof("SMIME-KEY-EXCHANGE-LEGACY" ) - 1), NSS_USE_ALG_IN_SMIME_KX_LEGACY0x00000400 }, |
| 545 | /* only use in disallow */ |
| 546 | { CIPHER_NAME("SMIME-KEY-EXCHANGE-ENCRYPT")"SMIME-KEY-EXCHANGE-ENCRYPT", (sizeof("SMIME-KEY-EXCHANGE-ENCRYPT" ) - 1), NSS_USE_ALG_IN_SMIME_KX_ENCRYPT0x00000800 }, |
| 547 | /* sign turns off all signatures, but doesn't change the |
| 548 | * allowance for specific signatures... for example: |
| 549 | * disallow=sha256/all allow=sha256/signature |
| 550 | * doesn't allow cert-signatures or sime-signatures, where |
| 551 | * disallow=sha256/all allow=sha256/all-signature |
| 552 | * does. however, |
| 553 | * disallow=sha256/signature |
| 554 | * and |
| 555 | * disallow=sha256/all-signature |
| 556 | * are equivalent in effect */ |
| 557 | { CIPHER_NAME("SIGNATURE")"SIGNATURE", (sizeof("SIGNATURE") - 1), NSS_USE_ALG_IN_ANY_SIGNATURE0x00000020 }, |
| 558 | /* enable/allow algorithms for legacy (read/verify)operations */ |
| 559 | { CIPHER_NAME("LEGACY")"LEGACY", (sizeof("LEGACY") - 1), NSS_USE_ALG_IN_PKCS12_DECRYPT0x00000040 | |
| 560 | NSS_USE_ALG_IN_SMIME_LEGACY0x00000100 | |
| 561 | NSS_USE_ALG_IN_SMIME_KX_LEGACY0x00000400 }, |
| 562 | /* enable/disable everything */ |
| 563 | { CIPHER_NAME("ALL")"ALL", (sizeof("ALL") - 1), NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SSL_KX0x00000004 | |
| 564 | NSS_USE_ALG_IN_PKCS12(0x00000040 | 0x00000080) | NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200) | |
| 565 | NSS_USE_ALG_IN_SIGNATURE(0x00000001 | 0x00000002 | 0x00000020) | |
| 566 | NSS_USE_ALG_IN_SMIME_KX(0x00000400 | 0x00000800) }, |
| 567 | { CIPHER_NAME("NONE")"NONE", (sizeof("NONE") - 1), 0 } |
| 568 | }; |
| 569 | |
| 570 | /* |
| 571 | * Get the next cipher on the list. point to the next one in 'next'. |
| 572 | * return the length; |
| 573 | */ |
| 574 | static const char * |
| 575 | secmod_ArgGetSubValue(const char *cipher, char sep1, char sep2, |
| 576 | int *len, const char **next) |
| 577 | { |
| 578 | const char *start = cipher; |
| 579 | |
| 580 | if (start == NULL((void*)0)) { |
| 581 | *len = 0; |
| 582 | *next = NULL((void*)0); |
| 583 | return start; |
| 584 | } |
| 585 | |
| 586 | for (; *cipher && *cipher != sep2; cipher++) { |
| 587 | if (*cipher == sep1) { |
| 588 | *next = cipher + 1; |
| 589 | *len = cipher - start; |
| 590 | return start; |
| 591 | } |
| 592 | } |
| 593 | *next = NULL((void*)0); |
| 594 | *len = cipher - start; |
| 595 | return start; |
| 596 | } |
| 597 | |
| 598 | static PRUint32 |
| 599 | secmod_parsePolicyValue(const char *policyFlags, int policyLength, |
| 600 | PRBool printPolicyFeedback, PRUint32 policyCheckFlags) |
| 601 | { |
| 602 | const char *flag, *currentString; |
| 603 | PRUint32 flags = 0; |
| 604 | int i; |
| 605 | |
| 606 | for (currentString = policyFlags; currentString && |
| 607 | currentString < policyFlags + policyLength;) { |
| 608 | int length; |
| 609 | PRBool unknown = PR_TRUE1; |
| 610 | flag = secmod_ArgGetSubValue(currentString, ',', ':', &length, |
| 611 | ¤tString); |
| 612 | if (length == 0) { |
| 613 | continue; |
| 614 | } |
| 615 | for (i = 0; i < PR_ARRAY_SIZE(policyFlagList)(sizeof(policyFlagList)/sizeof((policyFlagList)[0])); i++) { |
| 616 | const policyFlagDef *policy = &policyFlagList[i]; |
| 617 | unsigned name_size = policy->name_size; |
| 618 | if ((policy->name_size == length) && |
| 619 | PORT_StrncasecmpPL_strncasecmp(policy->name, flag, name_size) == 0) { |
| 620 | flags |= policy->flag; |
| 621 | unknown = PR_FALSE0; |
| 622 | break; |
| 623 | } |
| 624 | } |
| 625 | if (unknown && printPolicyFeedback && |
| 626 | (policyCheckFlags & SECMOD_FLAG_POLICY_CHECK_VALUE0x02)) { |
| 627 | PR_SetEnv("NSS_POLICY_FAIL=1"); |
| 628 | fprintf(stderrstderr, "NSS-POLICY-FAIL %.*s: unknown value: %.*s\n", |
| 629 | policyLength, policyFlags, length, flag); |
| 630 | } |
| 631 | } |
| 632 | return flags; |
| 633 | } |
| 634 | |
| 635 | /* allow symbolic names for values. The only ones currently defines or |
| 636 | * SSL protocol versions. */ |
| 637 | static SECStatus |
| 638 | secmod_getPolicyOptValue(const char *policyValue, int policyValueLength, |
| 639 | PRInt32 *result) |
| 640 | { |
| 641 | PRInt32 val = atoi(policyValue); |
| 642 | int i; |
| 643 | |
| 644 | if ((val != 0) || (*policyValue == '0')) { |
| 645 | *result = val; |
| 646 | return SECSuccess; |
| 647 | } |
| 648 | if (policyValueLength == 0) { |
| 649 | return SECFailure; |
| 650 | } |
| 651 | /* handle any ssl strings */ |
| 652 | for (i = 0; i < PR_ARRAY_SIZE(sslOptList)(sizeof(sslOptList)/sizeof((sslOptList)[0])); i++) { |
| 653 | if (policyValueLength == sslOptList[i].name_size && |
| 654 | PORT_StrncasecmpPL_strncasecmp(sslOptList[i].name, policyValue, |
| 655 | sslOptList[i].name_size) == 0) { |
| 656 | *result = sslOptList[i].option; |
| 657 | return SECSuccess; |
| 658 | } |
| 659 | } |
| 660 | /* handle key_size flags. Each flag represents a bit, which |
| 661 | * gets or'd together. They can be separated by , | or + */ |
| 662 | val = 0; |
| 663 | while (policyValueLength > 0) { |
| 664 | PRBool found = PR_FALSE0; |
| 665 | for (i = 0; i < PR_ARRAY_SIZE(keySizeFlagsList)(sizeof(keySizeFlagsList)/sizeof((keySizeFlagsList)[0])); i++) { |
| 666 | if (PORT_StrncasecmpPL_strncasecmp(keySizeFlagsList[i].name, policyValue, |
| 667 | keySizeFlagsList[i].name_size) == 0) { |
| 668 | val |= keySizeFlagsList[i].option; |
| 669 | found = PR_TRUE1; |
| 670 | policyValue += keySizeFlagsList[i].name_size; |
| 671 | policyValueLength -= keySizeFlagsList[i].name_size; |
| 672 | break; |
| 673 | } |
| 674 | } |
| 675 | if (!found) { |
| 676 | return SECFailure; |
| 677 | } |
| 678 | if (*policyValue == ',' || *policyValue == '|' || *policyValue == '+') { |
| 679 | policyValue++; |
| 680 | policyValueLength--; |
| 681 | } |
| 682 | } |
| 683 | *result = val; |
| 684 | return SECSuccess; |
| 685 | } |
| 686 | |
| 687 | /* Policy operations: |
| 688 | * Disallow: operation is disallowed by policy. Implies disabled. |
| 689 | * Allow: operation is allowed by policy (but could be disabled). |
| 690 | * Disable: operation is turned off by default (but could be allowed). |
| 691 | * Enable: operation is enabled by default. Implies allowed. |
| 692 | */ |
| 693 | typedef enum { |
| 694 | NSS_DISALLOW, |
| 695 | NSS_ALLOW, |
| 696 | NSS_DISABLE, |
| 697 | NSS_ENABLE |
| 698 | } NSSPolicyOperation; |
| 699 | |
| 700 | /* Enable/Disable only apply to SSL cipher suites and S/MIME symetric algorithms. |
| 701 | * Enable/Disable is implemented by clearing the DEFAULT_NOT_VALID |
| 702 | * flag, then setting the NSS_USE_DEFAULT_SSL_ENABLE and |
| 703 | * NSS_USE_DEFAULT_SMIME_ENABLE flags to the correct value. The ssl |
| 704 | * policy code will then sort out what to set based on ciphers and |
| 705 | * cipher suite values and the smime policy code will sort |
| 706 | * out which ciphers to include in capabilities based on these values */ |
| 707 | static SECStatus |
| 708 | secmod_setDefault(SECOidTag oid, NSSPolicyOperation operation, |
| 709 | PRUint32 value) |
| 710 | { |
| 711 | SECStatus rv = SECSuccess; |
| 712 | PRUint32 policy; |
| 713 | PRUint32 useDefault = 0; |
| 714 | PRUint32 set = 0; |
| 715 | /* we always clear the default not valid flag as this operation will |
| 716 | * make the defaults valid */ |
| 717 | PRUint32 clear = NSS_USE_DEFAULT_NOT_VALID0x80000000; |
| 718 | |
| 719 | /* what values are we trying to change */ |
| 720 | /* if either SSL or SSL_KX is set, enable SSL */ |
| 721 | if (value & (NSS_USE_ALG_IN_SSL0x00000008 | NSS_USE_ALG_IN_SSL_KX0x00000004)) { |
| 722 | useDefault |= NSS_USE_DEFAULT_SSL_ENABLE0x40000000; |
| 723 | } |
| 724 | /* only bulk ciphers are configured as enable in S/MIME, only |
| 725 | * enable them if both SMIME bits are set */ |
| 726 | if ((value & NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200)) == NSS_USE_ALG_IN_SMIME(0x00000100 | 0x00000200)) { |
| 727 | useDefault |= NSS_USE_DEFAULT_SMIME_ENABLE0x20000000; |
| 728 | } |
| 729 | |
| 730 | /* on disable we clear, on enable we set */ |
| 731 | if (operation == NSS_DISABLE) { |
| 732 | clear |= useDefault; |
| 733 | } else { |
| 734 | /* we also turn the cipher on by policy if we enable it, |
| 735 | * so include the policy bits */ |
| 736 | set |= value | useDefault; |
| 737 | } |
| 738 | |
| 739 | /* if we haven't set the not valid flag yet, then we need to |
| 740 | * clear any of the other bits we aren't actually setting as well. |
| 741 | */ |
| 742 | rv = NSS_GetAlgorithmPolicy(oid, &policy); |
| 743 | if (rv != SECSuccess) { |
| 744 | return rv; |
| 745 | } |
| 746 | if (policy & NSS_USE_DEFAULT_NOT_VALID0x80000000) { |
| 747 | clear |= ((NSS_USE_DEFAULT_SSL_ENABLE0x40000000 | NSS_USE_DEFAULT_SMIME_ENABLE0x20000000) & |
| 748 | ~set); |
| 749 | } |
| 750 | return NSS_SetAlgorithmPolicy(oid, set, clear); |
| 751 | } |
| 752 | |
| 753 | /* apply the operator specific policy */ |
| 754 | SECStatus |
| 755 | secmod_setPolicyOperation(SECOidTag oid, NSSPolicyOperation operation, |
| 756 | PRUint32 value) |
| 757 | { |
| 758 | SECStatus rv = SECSuccess; |
| 759 | switch (operation) { |
| 760 | case NSS_DISALLOW: |
| 761 | /* clear the requested policy bits */ |
| 762 | rv = NSS_SetAlgorithmPolicy(oid, 0, value); |
| 763 | break; |
| 764 | case NSS_ALLOW: |
| 765 | /* set the requested policy bits */ |
| 766 | rv = NSS_SetAlgorithmPolicy(oid, value, 0); |
| 767 | break; |
| 768 | case NSS_DISABLE: |
| 769 | case NSS_ENABLE: |
| 770 | rv = secmod_setDefault(oid, operation, value); |
| 771 | break; |
| 772 | default: |
| 773 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_LIBRARY_FAILURE); |
| 774 | rv = SECFailure; |
| 775 | break; |
| 776 | } |
| 777 | return rv; |
| 778 | } |
| 779 | |
| 780 | const char * |
| 781 | secmod_getOperationString(NSSPolicyOperation operation) |
| 782 | { |
| 783 | switch (operation) { |
| 784 | case NSS_DISALLOW: |
| 785 | return "disallow"; |
| 786 | case NSS_ALLOW: |
| 787 | return "allow"; |
| 788 | case NSS_DISABLE: |
| 789 | return "disable"; |
| 790 | case NSS_ENABLE: |
| 791 | return "enable"; |
| 792 | default: |
| 793 | break; |
| 794 | } |
| 795 | return "invalid"; |
| 796 | } |
| 797 | |
| 798 | /* Allow external applications fetch the policy oid based on the internal |
| 799 | * string mapping used by the configuration system. The search can be |
| 800 | * narrowed by supplying the name of the table (list) that the policy |
| 801 | * is on. The value 'Any' allows the policy to be searched on all lists */ |
| 802 | SECOidTag |
| 803 | SECMOD_PolicyStringToOid(const char *policy, const char *list) |
| 804 | { |
| 805 | PRBool any = (PORT_StrcasecmpPL_strcasecmp(list, "Any") == 0) ? PR_TRUE1 : PR_FALSE0; |
| 806 | int len = PORT_Strlen(policy)strlen(policy); |
| 807 | int i, j; |
| 808 | |
| 809 | for (i = 0; i < PR_ARRAY_SIZE(algOptLists)(sizeof(algOptLists)/sizeof((algOptLists)[0])); i++) { |
| 810 | const algListsDef *algOptList = &algOptLists[i]; |
| 811 | if (any || (PORT_StrcasecmpPL_strcasecmp(algOptList->description, list) == 0)) { |
| 812 | for (j = 0; j < algOptList->entries; j++) { |
| 813 | const oidValDef *algOpt = &algOptList->list[j]; |
| 814 | unsigned name_size = algOpt->name_size; |
| 815 | if (len == name_size && |
| 816 | PORT_StrcasecmpPL_strcasecmp(algOpt->name, policy) == 0) { |
| 817 | return algOpt->oid; |
| 818 | } |
| 819 | } |
| 820 | } |
| 821 | } |
| 822 | return SEC_OID_UNKNOWN; |
| 823 | } |
| 824 | |
| 825 | /* Allow external applications fetch the NSS option based on the internal |
| 826 | * string mapping used by the configuration system. */ |
| 827 | PRUint32 |
| 828 | SECMOD_PolicyStringToOpt(const char *policy) |
| 829 | { |
| 830 | int len = PORT_Strlen(policy)strlen(policy); |
| 831 | int i; |
| 832 | |
| 833 | for (i = 0; i < PR_ARRAY_SIZE(freeOptList)(sizeof(freeOptList)/sizeof((freeOptList)[0])); i++) { |
| 834 | const optionFreeDef *freeOpt = &freeOptList[i]; |
| 835 | unsigned name_size = freeOpt->name_size; |
| 836 | if (len == name_size && |
| 837 | PORT_StrcasecmpPL_strcasecmp(freeOpt->name, policy) == 0) { |
| 838 | return freeOpt->option; |
| 839 | } |
| 840 | } |
| 841 | return 0; |
| 842 | } |
| 843 | |
| 844 | /* Allow external applications map policy flags to their string equivalance. |
| 845 | * Some strings represent more than one flag. If more than one flag is included |
| 846 | * the returned string is the string that contains any of the |
| 847 | * supplied flags unless exact is specified. If exact is specified, then the |
| 848 | * returned value matches all the included flags and only those flags. For |
| 849 | * Example: 'ALL-SIGNATURE' has the bits NSS_USE_ALG_IN_CERTSIGNATURE| |
| 850 | * NSS_USE_ALG_IN_SMIME_SIGNATURE|NSS_USE_ALG_IN_ANY_SIGNATURE. If you ask for |
| 851 | * NSS_USE_ALG_IN_CERT_SIGNATURE|NSS_USE_ALG_IN_SMIME_SIGNATURE and don't set |
| 852 | * exact, this function will return 'ALL-SIGNATURE' if you do set exact, you must |
| 853 | * include all three bits in value to get 'All-SIGNATURE'*/ |
| 854 | const char * |
| 855 | SECMOD_FlagsToPolicyString(PRUint32 val, PRBool exact) |
| 856 | { |
| 857 | int i; |
| 858 | |
| 859 | for (i = 0; i < PR_ARRAY_SIZE(policyFlagList)(sizeof(policyFlagList)/sizeof((policyFlagList)[0])); i++) { |
| 860 | const policyFlagDef *policy = &policyFlagList[i]; |
| 861 | if (exact && (policy->flag == val)) { |
| 862 | return policy->name; |
| 863 | } |
| 864 | if (!exact && ((policy->flag & val) == policy->flag)) { |
| 865 | return policy->name; |
| 866 | } |
| 867 | } |
| 868 | return NULL((void*)0); |
| 869 | } |
| 870 | |
| 871 | static SECStatus |
| 872 | secmod_applyCryptoPolicy(const char *policyString, NSSPolicyOperation operation, |
| 873 | PRBool printPolicyFeedback, PRUint32 policyCheckFlags) |
| 874 | { |
| 875 | const char *cipher, *currentString; |
| 876 | unsigned i, j; |
| 877 | SECStatus rv = SECSuccess; |
| 878 | PRBool unknown; |
| 879 | |
| 880 | if (policyString == NULL((void*)0) || policyString[0] == 0) { |
| 881 | return SECSuccess; /* do nothing */ |
| 882 | } |
| 883 | |
| 884 | /* if we change any of these, make sure it gets applied in ssl as well */ |
| 885 | NSS_SetAlgorithmPolicy(SEC_OID_APPLY_SSL_POLICY, NSS_USE_POLICY_IN_SSL0x00000010, 0); |
| 886 | |
| 887 | for (currentString = policyString; currentString;) { |
| 888 | int length; |
| 889 | PRBool newValue = PR_FALSE0; |
| 890 | |
| 891 | cipher = secmod_ArgGetSubValue(currentString, ':', 0, &length, |
| 892 | ¤tString); |
| 893 | unknown = PR_TRUE1; |
| 894 | if (length >= 3 && cipher[3] == '/') { |
| 895 | newValue = PR_TRUE1; |
| 896 | } |
| 897 | if ((newValue || (length == 3)) && PORT_StrncasecmpPL_strncasecmp(cipher, "all", 3) == 0) { |
| 898 | /* disable or enable all options by default */ |
| 899 | PRUint32 value = 0; |
| 900 | if (newValue) { |
| 901 | value = secmod_parsePolicyValue(&cipher[3] + 1, length - 3 - 1, printPolicyFeedback, policyCheckFlags); |
| 902 | } |
| 903 | for (i = 0; i < PR_ARRAY_SIZE(algOptLists)(sizeof(algOptLists)/sizeof((algOptLists)[0])); i++) { |
| 904 | const algListsDef *algOptList = &algOptLists[i]; |
| 905 | for (j = 0; j < algOptList->entries; j++) { |
| 906 | if (!newValue) { |
| 907 | value = algOptList->list[j].val; |
| 908 | } |
| 909 | secmod_setPolicyOperation(algOptList->list[j].oid, operation, value); |
| 910 | } |
| 911 | } |
| 912 | continue; |
| 913 | } |
| 914 | |
| 915 | for (i = 0; i < PR_ARRAY_SIZE(algOptLists)(sizeof(algOptLists)/sizeof((algOptLists)[0])); i++) { |
| 916 | const algListsDef *algOptList = &algOptLists[i]; |
| 917 | for (j = 0; j < algOptList->entries; j++) { |
| 918 | const oidValDef *algOpt = &algOptList->list[j]; |
| 919 | unsigned name_size = algOpt->name_size; |
| 920 | PRBool newOption = PR_FALSE0; |
| 921 | |
| 922 | if ((length >= name_size) && (cipher[name_size] == '/')) { |
| 923 | newOption = PR_TRUE1; |
| 924 | } |
| 925 | if ((newOption || algOpt->name_size == length) && |
| 926 | PORT_StrncasecmpPL_strncasecmp(algOpt->name, cipher, name_size) == 0) { |
| 927 | PRUint32 value = algOpt->val; |
| 928 | if (newOption) { |
| 929 | value = secmod_parsePolicyValue(&cipher[name_size] + 1, |
| 930 | length - name_size - 1, |
| 931 | printPolicyFeedback, |
| 932 | policyCheckFlags); |
| 933 | } |
| 934 | rv = secmod_setPolicyOperation(algOptList->list[j].oid, operation, value); |
| 935 | if (rv != SECSuccess) { |
| 936 | /* could not enable option */ |
| 937 | /* NSS_SetAlgorithPolicy should have set the error code */ |
| 938 | return SECFailure; |
| 939 | } |
| 940 | unknown = PR_FALSE0; |
| 941 | break; |
| 942 | } |
| 943 | } |
| 944 | } |
| 945 | if (!unknown) { |
| 946 | continue; |
| 947 | } |
| 948 | |
| 949 | for (i = 0; i < PR_ARRAY_SIZE(freeOptList)(sizeof(freeOptList)/sizeof((freeOptList)[0])); i++) { |
| 950 | const optionFreeDef *freeOpt = &freeOptList[i]; |
| 951 | unsigned name_size = freeOpt->name_size; |
| 952 | |
| 953 | if ((length > name_size) && cipher[name_size] == '=' && |
| 954 | PORT_StrncasecmpPL_strncasecmp(freeOpt->name, cipher, name_size) == 0) { |
| 955 | PRInt32 val; |
| 956 | const char *policyValue = &cipher[name_size + 1]; |
| 957 | int policyValueLength = length - name_size - 1; |
| 958 | rv = secmod_getPolicyOptValue(policyValue, policyValueLength, |
| 959 | &val); |
| 960 | if (rv != SECSuccess) { |
| 961 | if (printPolicyFeedback && |
| 962 | (policyCheckFlags & SECMOD_FLAG_POLICY_CHECK_VALUE0x02)) { |
| 963 | PR_SetEnv("NSS_POLICY_FAIL=1"); |
| 964 | fprintf(stderrstderr, "NSS-POLICY-FAIL %.*s: unknown value: %.*s\n", |
| 965 | length, cipher, policyValueLength, policyValue); |
| 966 | } |
| 967 | return SECFailure; |
| 968 | } |
| 969 | rv = NSS_OptionSet(freeOpt->option, val); |
| 970 | if (rv != SECSuccess) { |
| 971 | /* could not enable option */ |
| 972 | /* NSS_OptionSet should have set the error code */ |
| 973 | return SECFailure; |
| 974 | } |
| 975 | /* to allow the policy to expand in the future. ignore ciphers |
| 976 | * we don't understand */ |
| 977 | unknown = PR_FALSE0; |
| 978 | break; |
| 979 | } |
| 980 | } |
| 981 | |
| 982 | if (unknown && printPolicyFeedback && |
| 983 | (policyCheckFlags & SECMOD_FLAG_POLICY_CHECK_IDENTIFIER0x01)) { |
| 984 | PR_SetEnv("NSS_POLICY_FAIL=1"); |
| 985 | fprintf(stderrstderr, "NSS-POLICY-FAIL %s: unknown identifier: %.*s\n", |
| 986 | secmod_getOperationString(operation), length, cipher); |
| 987 | } |
| 988 | } |
| 989 | return rv; |
| 990 | } |
| 991 | |
| 992 | static void |
| 993 | secmod_sanityCheckCryptoPolicy(void) |
| 994 | { |
| 995 | unsigned i, j; |
| 996 | SECStatus rv = SECSuccess; |
| 997 | unsigned num_kx_enabled = 0; |
| 998 | unsigned num_ssl_enabled = 0; |
| 999 | unsigned num_sig_enabled = 0; |
| 1000 | unsigned enabledCount[PR_ARRAY_SIZE(algOptLists)(sizeof(algOptLists)/sizeof((algOptLists)[0]))]; |
| 1001 | const char *sWarn = "WARN"; |
| 1002 | const char *sInfo = "INFO"; |
| 1003 | PRBool haveWarning = PR_FALSE0; |
| 1004 | |
| 1005 | for (i = 0; i < PR_ARRAY_SIZE(algOptLists)(sizeof(algOptLists)/sizeof((algOptLists)[0])); i++) { |
| 1006 | const algListsDef *algOptList = &algOptLists[i]; |
| 1007 | enabledCount[i] = 0; |
| 1008 | for (j = 0; j < algOptList->entries; j++) { |
| 1009 | const oidValDef *algOpt = &algOptList->list[j]; |
| 1010 | PRUint32 value; |
| 1011 | PRBool anyEnabled = PR_FALSE0; |
| 1012 | rv = NSS_GetAlgorithmPolicy(algOpt->oid, &value); |
| 1013 | if (rv != SECSuccess) { |
| 1014 | PR_SetEnv("NSS_POLICY_FAIL=1"); |
| 1015 | fprintf(stderrstderr, "NSS-POLICY-FAIL: internal failure with NSS_GetAlgorithmPolicy at %u\n", i); |
| 1016 | return; |
| 1017 | } |
| 1018 | |
| 1019 | if ((algOpt->val & NSS_USE_ALG_IN_SSL_KX0x00000004) && (value & NSS_USE_ALG_IN_SSL_KX0x00000004)) { |
| 1020 | ++num_kx_enabled; |
| 1021 | anyEnabled = PR_TRUE1; |
| 1022 | fprintf(stderrstderr, "NSS-POLICY-INFO: %s is enabled for SSL-KX\n", algOpt->name); |
| 1023 | } |
| 1024 | if ((algOpt->val & NSS_USE_ALG_IN_SSL0x00000008) && (value & NSS_USE_ALG_IN_SSL0x00000008)) { |
| 1025 | ++num_ssl_enabled; |
| 1026 | anyEnabled = PR_TRUE1; |
| 1027 | fprintf(stderrstderr, "NSS-POLICY-INFO: %s is enabled for SSL\n", algOpt->name); |
| 1028 | } |
| 1029 | if ((algOpt->val & NSS_USE_ALG_IN_CERT_SIGNATURE0x00000001) && |
| 1030 | ((value & NSS_USE_CERT_SIGNATURE_OK(0x00000001 | 0x00000020)) == NSS_USE_CERT_SIGNATURE_OK(0x00000001 | 0x00000020))) { |
| 1031 | ++num_sig_enabled; |
| 1032 | anyEnabled = PR_TRUE1; |
| 1033 | fprintf(stderrstderr, "NSS-POLICY-INFO: %s is enabled for CERT-SIGNATURE\n", algOpt->name); |
| 1034 | } |
| 1035 | if (anyEnabled) { |
| 1036 | ++enabledCount[i]; |
| 1037 | } |
| 1038 | } |
| 1039 | } |
| 1040 | fprintf(stderrstderr, "NSS-POLICY-%s: NUMBER-OF-SSL-ALG-KX: %u\n", num_kx_enabled ? sInfo : sWarn, num_kx_enabled); |
| 1041 | fprintf(stderrstderr, "NSS-POLICY-%s: NUMBER-OF-SSL-ALG: %u\n", num_ssl_enabled ? sInfo : sWarn, num_ssl_enabled); |
| 1042 | fprintf(stderrstderr, "NSS-POLICY-%s: NUMBER-OF-CERT-SIG: %u\n", num_sig_enabled ? sInfo : sWarn, num_sig_enabled); |
| 1043 | if (!num_kx_enabled || !num_ssl_enabled || !num_sig_enabled) { |
| 1044 | haveWarning = PR_TRUE1; |
| 1045 | } |
| 1046 | for (i = 0; i < PR_ARRAY_SIZE(algOptLists)(sizeof(algOptLists)/sizeof((algOptLists)[0])); i++) { |
| 1047 | const algListsDef *algOptList = &algOptLists[i]; |
| 1048 | fprintf(stderrstderr, "NSS-POLICY-%s: NUMBER-OF-%s: %u\n", enabledCount[i] ? sInfo : sWarn, algOptList->description, enabledCount[i]); |
| 1049 | if (!enabledCount[i] && !algOptList->allowEmpty) { |
| 1050 | haveWarning = PR_TRUE1; |
| 1051 | } |
| 1052 | } |
| 1053 | if (haveWarning) { |
| 1054 | PR_SetEnv("NSS_POLICY_WARN=1"); |
| 1055 | } |
| 1056 | } |
| 1057 | |
| 1058 | static SECStatus |
| 1059 | secmod_parseCryptoPolicy(const char *policyConfig, PRBool printPolicyFeedback, |
| 1060 | PRUint32 policyCheckFlags) |
| 1061 | { |
| 1062 | char *args; |
| 1063 | SECStatus rv; |
| 1064 | |
| 1065 | if (policyConfig == NULL((void*)0)) { |
| 1066 | return SECSuccess; /* no policy given */ |
| 1067 | } |
| 1068 | /* make sure we initialize the oid table and set all the default policy |
| 1069 | * values first so we can override them here */ |
| 1070 | rv = SECOID_Init(); |
| 1071 | if (rv != SECSuccess) { |
| 1072 | return rv; |
| 1073 | } |
| 1074 | args = NSSUTIL_ArgGetParamValue("disallow", policyConfig); |
| 1075 | rv = secmod_applyCryptoPolicy(args, NSS_DISALLOW, printPolicyFeedback, |
| 1076 | policyCheckFlags); |
| 1077 | if (args) |
| 1078 | PORT_FreePORT_Free_Util(args); |
| 1079 | if (rv != SECSuccess) { |
| 1080 | return rv; |
| 1081 | } |
| 1082 | args = NSSUTIL_ArgGetParamValue("allow", policyConfig); |
| 1083 | rv = secmod_applyCryptoPolicy(args, NSS_ALLOW, printPolicyFeedback, |
| 1084 | policyCheckFlags); |
| 1085 | if (args) |
| 1086 | PORT_FreePORT_Free_Util(args); |
| 1087 | if (rv != SECSuccess) { |
| 1088 | return rv; |
| 1089 | } |
| 1090 | args = NSSUTIL_ArgGetParamValue("disable", policyConfig); |
| 1091 | rv = secmod_applyCryptoPolicy(args, NSS_DISABLE, printPolicyFeedback, |
| 1092 | policyCheckFlags); |
| 1093 | if (args) |
| 1094 | PORT_FreePORT_Free_Util(args); |
| 1095 | if (rv != SECSuccess) { |
| 1096 | return rv; |
| 1097 | } |
| 1098 | args = NSSUTIL_ArgGetParamValue("enable", policyConfig); |
| 1099 | rv = secmod_applyCryptoPolicy(args, NSS_ENABLE, printPolicyFeedback, |
| 1100 | policyCheckFlags); |
| 1101 | if (args) |
| 1102 | PORT_FreePORT_Free_Util(args); |
| 1103 | if (rv != SECSuccess) { |
| 1104 | return rv; |
| 1105 | } |
| 1106 | /* this has to be last. Everything after this will be a noop */ |
| 1107 | if (NSSUTIL_ArgHasFlag("flags", "ssl-lock", policyConfig)) { |
| 1108 | PRInt32 locks; |
| 1109 | /* don't overwrite other (future) lock flags */ |
| 1110 | rv = NSS_OptionGet(NSS_DEFAULT_LOCKS0x00d, &locks); |
| 1111 | if (rv == SECSuccess) { |
| 1112 | rv = NSS_OptionSet(NSS_DEFAULT_LOCKS0x00d, locks | NSS_DEFAULT_SSL_LOCK1); |
| 1113 | } |
| 1114 | if (rv != SECSuccess) { |
| 1115 | return rv; |
| 1116 | } |
| 1117 | } |
| 1118 | if (NSSUTIL_ArgHasFlag("flags", "policy-lock", policyConfig)) { |
| 1119 | NSS_LockPolicy(); |
| 1120 | } |
| 1121 | if (printPolicyFeedback) { |
| 1122 | /* This helps to distinguish configurations that don't contain any |
| 1123 | * policy config= statement. */ |
| 1124 | PR_SetEnv("NSS_POLICY_LOADED=1"); |
| 1125 | fprintf(stderrstderr, "NSS-POLICY-INFO: LOADED-SUCCESSFULLY\n"); |
| 1126 | secmod_sanityCheckCryptoPolicy(); |
| 1127 | } |
| 1128 | return rv; |
| 1129 | } |
| 1130 | |
| 1131 | static PRUint32 |
| 1132 | secmod_parsePolicyCheckFlags(const char *nss) |
| 1133 | { |
| 1134 | PRUint32 policyCheckFlags = 0; |
| 1135 | |
| 1136 | if (NSSUTIL_ArgHasFlag("flags", "policyCheckIdentifier", nss)) { |
| 1137 | policyCheckFlags |= SECMOD_FLAG_POLICY_CHECK_IDENTIFIER0x01; |
| 1138 | } |
| 1139 | |
| 1140 | if (NSSUTIL_ArgHasFlag("flags", "policyCheckValue", nss)) { |
| 1141 | policyCheckFlags |= SECMOD_FLAG_POLICY_CHECK_VALUE0x02; |
| 1142 | } |
| 1143 | |
| 1144 | return policyCheckFlags; |
| 1145 | } |
| 1146 | |
| 1147 | /* |
| 1148 | * for 3.4 we continue to use the old SECMODModule structure |
| 1149 | */ |
| 1150 | SECMODModule * |
| 1151 | SECMOD_CreateModuleEx(const char *library, const char *moduleName, |
| 1152 | const char *parameters, const char *nss, |
| 1153 | const char *config) |
| 1154 | { |
| 1155 | SECMODModule *mod; |
| 1156 | SECStatus rv; |
| 1157 | char *slotParams, *ciphers; |
| 1158 | PRBool printPolicyFeedback = NSSUTIL_ArgHasFlag("flags", "printPolicyFeedback", nss); |
| 1159 | PRUint32 policyCheckFlags = secmod_parsePolicyCheckFlags(nss); |
| 1160 | |
| 1161 | rv = secmod_parseCryptoPolicy(config, printPolicyFeedback, policyCheckFlags); |
| 1162 | |
| 1163 | /* do not load the module if policy parsing fails */ |
| 1164 | if (rv != SECSuccess) { |
| 1165 | if (printPolicyFeedback) { |
| 1166 | PR_SetEnv("NSS_POLICY_FAIL=1"); |
| 1167 | fprintf(stderrstderr, "NSS-POLICY-FAIL: policy config parsing failed, not loading module %s\n", moduleName); |
| 1168 | } |
| 1169 | return NULL((void*)0); |
| 1170 | } |
| 1171 | |
| 1172 | mod = secmod_NewModule(); |
| 1173 | if (mod == NULL((void*)0)) |
| 1174 | return NULL((void*)0); |
| 1175 | |
| 1176 | mod->commonName = PORT_ArenaStrdupPORT_ArenaStrdup_Util(mod->arena, moduleName ? moduleName : ""); |
| 1177 | if (library) { |
| 1178 | mod->dllName = PORT_ArenaStrdupPORT_ArenaStrdup_Util(mod->arena, library); |
| 1179 | } |
| 1180 | /* new field */ |
| 1181 | if (parameters) { |
| 1182 | mod->libraryParams = PORT_ArenaStrdupPORT_ArenaStrdup_Util(mod->arena, parameters); |
| 1183 | } |
| 1184 | |
| 1185 | mod->internal = NSSUTIL_ArgHasFlag("flags", "internal", nss); |
| 1186 | mod->isFIPS = NSSUTIL_ArgHasFlag("flags", "FIPS", nss); |
| 1187 | /* if the system FIPS mode is enabled, force FIPS to be on */ |
| 1188 | if (SECMOD_GetSystemFIPSEnabled()) { |
| 1189 | mod->isFIPS = PR_TRUE1; |
| 1190 | } |
| 1191 | mod->isCritical = NSSUTIL_ArgHasFlag("flags", "critical", nss); |
| 1192 | slotParams = NSSUTIL_ArgGetParamValue("slotParams", nss); |
| 1193 | mod->slotInfo = NSSUTIL_ArgParseSlotInfo(mod->arena, slotParams, |
| 1194 | &mod->slotInfoCount); |
| 1195 | if (slotParams) |
| 1196 | PORT_FreePORT_Free_Util(slotParams); |
| 1197 | /* new field */ |
| 1198 | mod->trustOrder = NSSUTIL_ArgReadLong("trustOrder", nss, |
| 1199 | NSSUTIL_DEFAULT_TRUST_ORDER50, NULL((void*)0)); |
| 1200 | /* new field */ |
| 1201 | mod->cipherOrder = NSSUTIL_ArgReadLong("cipherOrder", nss, |
| 1202 | NSSUTIL_DEFAULT_CIPHER_ORDER0, NULL((void*)0)); |
| 1203 | /* new field */ |
| 1204 | mod->isModuleDB = NSSUTIL_ArgHasFlag("flags", "moduleDB", nss); |
| 1205 | mod->moduleDBOnly = NSSUTIL_ArgHasFlag("flags", "moduleDBOnly", nss); |
| 1206 | if (mod->moduleDBOnly) |
| 1207 | mod->isModuleDB = PR_TRUE1; |
| 1208 | |
| 1209 | /* we need more bits, but we also want to preserve binary compatibility |
| 1210 | * so we overload the isModuleDB PRBool with additional flags. |
| 1211 | * These flags are only valid if mod->isModuleDB is already set. |
| 1212 | * NOTE: this depends on the fact that PRBool is at least a char on |
| 1213 | * all platforms. These flags are only valid if moduleDB is set, so |
| 1214 | * code checking if (mod->isModuleDB) will continue to work correctly. */ |
| 1215 | if (mod->isModuleDB) { |
| 1216 | char flags = SECMOD_FLAG_MODULE_DB_IS_MODULE_DB0x01; |
| 1217 | if (NSSUTIL_ArgHasFlag("flags", "skipFirst", nss)) { |
| 1218 | flags |= SECMOD_FLAG_MODULE_DB_SKIP_FIRST0x02; |
| 1219 | } |
| 1220 | if (NSSUTIL_ArgHasFlag("flags", "defaultModDB", nss)) { |
| 1221 | flags |= SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB0x04; |
| 1222 | } |
| 1223 | if (NSSUTIL_ArgHasFlag("flags", "policyOnly", nss)) { |
| 1224 | flags |= SECMOD_FLAG_MODULE_DB_POLICY_ONLY0x08; |
| 1225 | } |
| 1226 | /* additional moduleDB flags could be added here in the future */ |
| 1227 | mod->isModuleDB = (PRBool)flags; |
| 1228 | } |
| 1229 | |
| 1230 | if (mod->internal) { |
| 1231 | char flags = SECMOD_FLAG_INTERNAL_IS_INTERNAL0x01; |
| 1232 | |
| 1233 | if (NSSUTIL_ArgHasFlag("flags", "internalKeySlot", nss)) { |
| 1234 | flags |= SECMOD_FLAG_INTERNAL_KEY_SLOT0x02; |
| 1235 | } |
| 1236 | mod->internal = (PRBool)flags; |
| 1237 | } |
| 1238 | |
| 1239 | ciphers = NSSUTIL_ArgGetParamValue("ciphers", nss); |
| 1240 | NSSUTIL_ArgParseCipherFlags(&mod->ssl[0], ciphers); |
| 1241 | if (ciphers) |
| 1242 | PORT_FreePORT_Free_Util(ciphers); |
| 1243 | |
| 1244 | secmod_PrivateModuleCount++; |
| 1245 | |
| 1246 | return mod; |
| 1247 | } |
| 1248 | |
| 1249 | PRBool |
| 1250 | SECMOD_GetSkipFirstFlag(SECMODModule *mod) |
| 1251 | { |
| 1252 | char flags = (char)mod->isModuleDB; |
| 1253 | |
| 1254 | return (flags & SECMOD_FLAG_MODULE_DB_SKIP_FIRST0x02) ? PR_TRUE1 : PR_FALSE0; |
| 1255 | } |
| 1256 | |
| 1257 | PRBool |
| 1258 | SECMOD_GetDefaultModDBFlag(SECMODModule *mod) |
| 1259 | { |
| 1260 | char flags = (char)mod->isModuleDB; |
| 1261 | |
| 1262 | return (flags & SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB0x04) ? PR_TRUE1 : PR_FALSE0; |
| 1263 | } |
| 1264 | |
| 1265 | PRBool |
| 1266 | secmod_PolicyOnly(SECMODModule *mod) |
| 1267 | { |
| 1268 | char flags = (char)mod->isModuleDB; |
| 1269 | |
| 1270 | return (flags & SECMOD_FLAG_MODULE_DB_POLICY_ONLY0x08) ? PR_TRUE1 : PR_FALSE0; |
| 1271 | } |
| 1272 | |
| 1273 | PRBool |
| 1274 | secmod_IsInternalKeySlot(SECMODModule *mod) |
| 1275 | { |
| 1276 | char flags = (char)mod->internal; |
| 1277 | |
| 1278 | return (flags & SECMOD_FLAG_INTERNAL_KEY_SLOT0x02) ? PR_TRUE1 : PR_FALSE0; |
| 1279 | } |
| 1280 | |
| 1281 | void |
| 1282 | secmod_SetInternalKeySlotFlag(SECMODModule *mod, PRBool val) |
| 1283 | { |
| 1284 | char flags = (char)mod->internal; |
| 1285 | |
| 1286 | if (val) { |
| 1287 | flags |= SECMOD_FLAG_INTERNAL_KEY_SLOT0x02; |
| 1288 | } else { |
| 1289 | flags &= ~SECMOD_FLAG_INTERNAL_KEY_SLOT0x02; |
| 1290 | } |
| 1291 | mod->internal = flags; |
| 1292 | } |
| 1293 | |
| 1294 | /* |
| 1295 | * copy desc and value into target. Target is known to be big enough to |
| 1296 | * hold desc +2 +value, which is good because the result of this will be |
| 1297 | * *desc"*value". We may, however, have to add some escapes for special |
| 1298 | * characters imbedded into value (rare). This string potentially comes from |
| 1299 | * a user, so we don't want the user overflowing the target buffer by using |
| 1300 | * excessive escapes. To prevent this we count the escapes we need to add and |
| 1301 | * try to expand the buffer with Realloc. |
| 1302 | */ |
| 1303 | static char * |
| 1304 | secmod_doDescCopy(char *target, char **base, int *baseLen, |
| 1305 | const char *desc, int descLen, char *value) |
| 1306 | { |
| 1307 | int diff, esc_len; |
| 1308 | |
| 1309 | esc_len = NSSUTIL_EscapeSize(value, '\"') - 1; |
| 1310 | diff = esc_len - strlen(value); |
| 1311 | if (diff > 0) { |
| 1312 | /* we need to escape... expand newSpecPtr as well to make sure |
| 1313 | * we don't overflow it */ |
| 1314 | int offset = target - *base; |
| 1315 | char *newPtr = PORT_ReallocPORT_Realloc_Util(*base, *baseLen + diff); |
| 1316 | if (!newPtr) { |
| 1317 | return target; /* not enough space, just drop the whole copy */ |
| 1318 | } |
| 1319 | *baseLen += diff; |
| 1320 | target = newPtr + offset; |
| 1321 | *base = newPtr; |
| 1322 | value = NSSUTIL_Escape(value, '\"'); |
| 1323 | if (value == NULL((void*)0)) { |
| 1324 | return target; /* couldn't escape value, just drop the copy */ |
| 1325 | } |
| 1326 | } |
| 1327 | PORT_Memcpymemcpy(target, desc, descLen); |
| 1328 | target += descLen; |
| 1329 | *target++ = '\"'; |
| 1330 | PORT_Memcpymemcpy(target, value, esc_len); |
| 1331 | target += esc_len; |
| 1332 | *target++ = '\"'; |
| 1333 | if (diff > 0) { |
| 1334 | PORT_FreePORT_Free_Util(value); |
| 1335 | } |
| 1336 | return target; |
| 1337 | } |
| 1338 | |
| 1339 | #define SECMOD_SPEC_COPY(new, start, end)if (end > start) { int _cnt = end - start; memcpy(new, start , _cnt); new += _cnt; } \ |
| 1340 | if (end > start) { \ |
| 1341 | int _cnt = end - start; \ |
| 1342 | PORT_Memcpymemcpy(new, start, _cnt); \ |
| 1343 | new += _cnt; \ |
| 1344 | } |
| 1345 | #define SECMOD_TOKEN_DESCRIPTION"tokenDescription=" "tokenDescription=" |
| 1346 | #define SECMOD_SLOT_DESCRIPTION"slotDescription=" "slotDescription=" |
| 1347 | |
| 1348 | /* |
| 1349 | * Find any tokens= values in the module spec. |
| 1350 | * Always return a new spec which does not have any tokens= arguments. |
| 1351 | * If tokens= arguments are found, Split the the various tokens defined into |
| 1352 | * an array of child specs to return. |
| 1353 | * |
| 1354 | * Caller is responsible for freeing the child spec and the new token |
| 1355 | * spec. |
| 1356 | */ |
| 1357 | char * |
| 1358 | secmod_ParseModuleSpecForTokens(PRBool convert, PRBool isFIPS, |
| 1359 | const char *moduleSpec, char ***children, |
| 1360 | CK_SLOT_ID **ids) |
| 1361 | { |
| 1362 | int newSpecLen = PORT_Strlen(moduleSpec)strlen(moduleSpec) + 2; |
| 1363 | char *newSpec = PORT_AllocPORT_Alloc_Util(newSpecLen); |
| 1364 | char *newSpecPtr = newSpec; |
| 1365 | const char *modulePrev = moduleSpec; |
| 1366 | char *target = NULL((void*)0); |
| 1367 | char *tmp = NULL((void*)0); |
| 1368 | char **childArray = NULL((void*)0); |
| 1369 | const char *tokenIndex; |
| 1370 | CK_SLOT_ID *idArray = NULL((void*)0); |
| 1371 | int tokenCount = 0; |
| 1372 | int i; |
| 1373 | |
| 1374 | if (newSpec == NULL((void*)0)) { |
| 1375 | return NULL((void*)0); |
| 1376 | } |
| 1377 | |
| 1378 | *children = NULL((void*)0); |
| 1379 | if (ids) { |
| 1380 | *ids = NULL((void*)0); |
| 1381 | } |
| 1382 | moduleSpec = NSSUTIL_ArgStrip(moduleSpec); |
| 1383 | SECMOD_SPEC_COPY(newSpecPtr, modulePrev, moduleSpec)if (moduleSpec > modulePrev) { int _cnt = moduleSpec - modulePrev ; memcpy(newSpecPtr, modulePrev, _cnt); newSpecPtr += _cnt; }; |
| 1384 | |
| 1385 | /* Notes on 'convert' and 'isFIPS' flags: The base parameters for opening |
| 1386 | * a new softoken module takes the following parameters to name the |
| 1387 | * various tokens: |
| 1388 | * |
| 1389 | * cryptoTokenDescription: name of the non-fips crypto token. |
| 1390 | * cryptoSlotDescription: name of the non-fips crypto slot. |
| 1391 | * dbTokenDescription: name of the non-fips db token. |
| 1392 | * dbSlotDescription: name of the non-fips db slot. |
| 1393 | * FIPSTokenDescription: name of the fips db/crypto token. |
| 1394 | * FIPSSlotDescription: name of the fips db/crypto slot. |
| 1395 | * |
| 1396 | * if we are opening a new slot, we need to have the following |
| 1397 | * parameters: |
| 1398 | * tokenDescription: name of the token. |
| 1399 | * slotDescription: name of the slot. |
| 1400 | * |
| 1401 | * |
| 1402 | * The convert flag tells us to drop the unnecessary *TokenDescription |
| 1403 | * and *SlotDescription arguments and convert the appropriate pair |
| 1404 | * (either db or FIPS based on the isFIPS flag) to tokenDescription and |
| 1405 | * slotDescription). |
| 1406 | */ |
| 1407 | /* |
| 1408 | * walk down the list. if we find a tokens= argument, save it, |
| 1409 | * otherise copy the argument. |
| 1410 | */ |
| 1411 | while (*moduleSpec) { |
| 1412 | int next; |
| 1413 | modulePrev = moduleSpec; |
| 1414 | NSSUTIL_HANDLE_STRING_ARG(moduleSpec, target, "tokens=",if (PL_strncasecmp(moduleSpec, "tokens=", sizeof("tokens=") - 1) == 0) { moduleSpec += sizeof("tokens=") - 1; if (target) PORT_Free_Util (target); target = NSSUTIL_ArgFetchValue(moduleSpec, &next ); moduleSpec += next; modulePrev = moduleSpec;; } else |
| 1415 | modulePrev = moduleSpec;if (PL_strncasecmp(moduleSpec, "tokens=", sizeof("tokens=") - 1) == 0) { moduleSpec += sizeof("tokens=") - 1; if (target) PORT_Free_Util (target); target = NSSUTIL_ArgFetchValue(moduleSpec, &next ); moduleSpec += next; modulePrev = moduleSpec;; } else |
| 1416 | /* skip copying */)if (PL_strncasecmp(moduleSpec, "tokens=", sizeof("tokens=") - 1) == 0) { moduleSpec += sizeof("tokens=") - 1; if (target) PORT_Free_Util (target); target = NSSUTIL_ArgFetchValue(moduleSpec, &next ); moduleSpec += next; modulePrev = moduleSpec;; } else |
| 1417 | NSSUTIL_HANDLE_STRING_ARG(if (PL_strncasecmp(moduleSpec, "cryptoTokenDescription=", sizeof ("cryptoTokenDescription=") - 1) == 0) { moduleSpec += sizeof ("cryptoTokenDescription=") - 1; if (tmp) PORT_Free_Util(tmp) ; tmp = NSSUTIL_ArgFetchValue(moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; }; } else |
| 1418 | moduleSpec, tmp, "cryptoTokenDescription=",if (PL_strncasecmp(moduleSpec, "cryptoTokenDescription=", sizeof ("cryptoTokenDescription=") - 1) == 0) { moduleSpec += sizeof ("cryptoTokenDescription=") - 1; if (tmp) PORT_Free_Util(tmp) ; tmp = NSSUTIL_ArgFetchValue(moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; }; } else |
| 1419 | if (convert) { modulePrev = moduleSpec; })if (PL_strncasecmp(moduleSpec, "cryptoTokenDescription=", sizeof ("cryptoTokenDescription=") - 1) == 0) { moduleSpec += sizeof ("cryptoTokenDescription=") - 1; if (tmp) PORT_Free_Util(tmp) ; tmp = NSSUTIL_ArgFetchValue(moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; }; } else |
| 1420 | NSSUTIL_HANDLE_STRING_ARG(if (PL_strncasecmp(moduleSpec, "cryptoSlotDescription=", sizeof ("cryptoSlotDescription=") - 1) == 0) { moduleSpec += sizeof( "cryptoSlotDescription=") - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; }; } else |
| 1421 | moduleSpec, tmp, "cryptoSlotDescription=",if (PL_strncasecmp(moduleSpec, "cryptoSlotDescription=", sizeof ("cryptoSlotDescription=") - 1) == 0) { moduleSpec += sizeof( "cryptoSlotDescription=") - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; }; } else |
| 1422 | if (convert) { modulePrev = moduleSpec; })if (PL_strncasecmp(moduleSpec, "cryptoSlotDescription=", sizeof ("cryptoSlotDescription=") - 1) == 0) { moduleSpec += sizeof( "cryptoSlotDescription=") - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; }; } else |
| 1423 | NSSUTIL_HANDLE_STRING_ARG(if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1424 | moduleSpec, tmp, "dbTokenDescription=",if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1425 | if (convert) {if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1426 | modulePrev = moduleSpec;if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1427 | if (!isFIPS) {if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1428 | newSpecPtr = secmod_doDescCopy(newSpecPtr,if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1429 | &newSpec, &newSpecLen,if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1430 | SECMOD_TOKEN_DESCRIPTION,if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1431 | sizeof(SECMOD_TOKEN_DESCRIPTION) - 1,if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1432 | tmp);if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1433 | }if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1434 | })if (PL_strncasecmp(moduleSpec, "dbTokenDescription=", sizeof( "dbTokenDescription=") - 1) == 0) { moduleSpec += sizeof("dbTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy( newSpecPtr, &newSpec, &newSpecLen, "tokenDescription=" , sizeof("tokenDescription=") - 1, tmp); } }; } else |
| 1435 | NSSUTIL_HANDLE_STRING_ARG(if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1436 | moduleSpec, tmp, "dbSlotDescription=",if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1437 | if (convert) {if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1438 | modulePrev = moduleSpec; /* skip copying */if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1439 | if (!isFIPS) {if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1440 | newSpecPtr = secmod_doDescCopy(newSpecPtr,if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1441 | &newSpec, &newSpecLen,if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1442 | SECMOD_SLOT_DESCRIPTION,if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1443 | sizeof(SECMOD_SLOT_DESCRIPTION) - 1,if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1444 | tmp);if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1445 | }if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1446 | })if (PL_strncasecmp(moduleSpec, "dbSlotDescription=", sizeof("dbSlotDescription=" ) - 1) == 0) { moduleSpec += sizeof("dbSlotDescription=") - 1 ; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue(moduleSpec , &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (!isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1447 | NSSUTIL_HANDLE_STRING_ARG(if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1448 | moduleSpec, tmp, "FIPSTokenDescription=",if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1449 | if (convert) {if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1450 | modulePrev = moduleSpec; /* skip copying */if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1451 | if (isFIPS) {if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1452 | newSpecPtr = secmod_doDescCopy(newSpecPtr,if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1453 | &newSpec, &newSpecLen,if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1454 | SECMOD_TOKEN_DESCRIPTION,if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1455 | sizeof(SECMOD_TOKEN_DESCRIPTION) - 1,if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1456 | tmp);if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1457 | }if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1458 | })if (PL_strncasecmp(moduleSpec, "FIPSTokenDescription=", sizeof ("FIPSTokenDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSTokenDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "tokenDescription=", sizeof( "tokenDescription=") - 1, tmp); } }; } else |
| 1459 | NSSUTIL_HANDLE_STRING_ARG(if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1460 | moduleSpec, tmp, "FIPSSlotDescription=",if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1461 | if (convert) {if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1462 | modulePrev = moduleSpec; /* skip copying */if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1463 | if (isFIPS) {if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1464 | newSpecPtr = secmod_doDescCopy(newSpecPtr,if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1465 | &newSpec, &newSpecLen,if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1466 | SECMOD_SLOT_DESCRIPTION,if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1467 | sizeof(SECMOD_SLOT_DESCRIPTION) - 1,if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1468 | tmp);if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1469 | }if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1470 | })if (PL_strncasecmp(moduleSpec, "FIPSSlotDescription=", sizeof ("FIPSSlotDescription=") - 1) == 0) { moduleSpec += sizeof("FIPSSlotDescription=" ) - 1; if (tmp) PORT_Free_Util(tmp); tmp = NSSUTIL_ArgFetchValue (moduleSpec, &next); moduleSpec += next; if (convert) { modulePrev = moduleSpec; if (isFIPS) { newSpecPtr = secmod_doDescCopy(newSpecPtr , &newSpec, &newSpecLen, "slotDescription=", sizeof("slotDescription=" ) - 1, tmp); } }; } else |
| 1471 | NSSUTIL_HANDLE_FINAL_ARG(moduleSpec){ moduleSpec = NSSUTIL_ArgSkipParameter(moduleSpec); } moduleSpec = NSSUTIL_ArgStrip(moduleSpec); |
| 1472 | SECMOD_SPEC_COPY(newSpecPtr, modulePrev, moduleSpec)if (moduleSpec > modulePrev) { int _cnt = moduleSpec - modulePrev ; memcpy(newSpecPtr, modulePrev, _cnt); newSpecPtr += _cnt; }; |
| 1473 | } |
| 1474 | if (tmp) { |
| 1475 | PORT_FreePORT_Free_Util(tmp); |
| 1476 | tmp = NULL((void*)0); |
| 1477 | } |
| 1478 | *newSpecPtr = 0; |
| 1479 | |
| 1480 | /* no target found, return the newSpec */ |
| 1481 | if (target == NULL((void*)0)) { |
| 1482 | return newSpec; |
| 1483 | } |
| 1484 | |
| 1485 | /* now build the child array from target */ |
| 1486 | /*first count them */ |
| 1487 | for (tokenIndex = NSSUTIL_ArgStrip(target); *tokenIndex; |
| 1488 | tokenIndex = NSSUTIL_ArgStrip(NSSUTIL_ArgSkipParameter(tokenIndex))) { |
| 1489 | tokenCount++; |
| 1490 | } |
| 1491 | |
| 1492 | childArray = PORT_NewArray(char *, tokenCount + 1)(char * *)PORT_Alloc_Util(sizeof(char *) * (tokenCount + 1)); |
| 1493 | if (childArray == NULL((void*)0)) { |
| 1494 | /* just return the spec as is then */ |
| 1495 | PORT_FreePORT_Free_Util(target); |
| 1496 | return newSpec; |
| 1497 | } |
| 1498 | if (ids) { |
| 1499 | idArray = PORT_NewArray(CK_SLOT_ID, tokenCount + 1)(CK_SLOT_ID *)PORT_Alloc_Util(sizeof(CK_SLOT_ID) * (tokenCount + 1)); |
| 1500 | if (idArray == NULL((void*)0)) { |
| 1501 | PORT_FreePORT_Free_Util(childArray); |
| 1502 | PORT_FreePORT_Free_Util(target); |
| 1503 | return newSpec; |
| 1504 | } |
| 1505 | } |
| 1506 | |
| 1507 | /* now fill them in */ |
| 1508 | for (tokenIndex = NSSUTIL_ArgStrip(target), i = 0; |
| 1509 | *tokenIndex && (i < tokenCount); |
| 1510 | tokenIndex = NSSUTIL_ArgStrip(tokenIndex)) { |
| 1511 | int next; |
| 1512 | char *name = NSSUTIL_ArgGetLabel(tokenIndex, &next); |
| 1513 | tokenIndex += next; |
| 1514 | |
| 1515 | if (idArray) { |
| 1516 | idArray[i] = NSSUTIL_ArgDecodeNumber(name); |
| 1517 | } |
| 1518 | |
| 1519 | PORT_FreePORT_Free_Util(name); /* drop the explicit number */ |
| 1520 | |
| 1521 | /* if anything is left, copy the args to the child array */ |
| 1522 | if (!NSSUTIL_ArgIsBlank(*tokenIndex)) { |
| 1523 | childArray[i++] = NSSUTIL_ArgFetchValue(tokenIndex, &next); |
| 1524 | tokenIndex += next; |
| 1525 | } |
| 1526 | } |
| 1527 | |
| 1528 | PORT_FreePORT_Free_Util(target); |
| 1529 | childArray[i] = 0; |
| 1530 | if (idArray) { |
| 1531 | idArray[i] = 0; |
| 1532 | } |
| 1533 | |
| 1534 | /* return it */ |
| 1535 | *children = childArray; |
| 1536 | if (ids) { |
| 1537 | *ids = idArray; |
| 1538 | } |
| 1539 | return newSpec; |
| 1540 | } |
| 1541 | |
| 1542 | /* get the database and flags from the spec */ |
| 1543 | static char * |
| 1544 | secmod_getConfigDir(const char *spec, char **certPrefix, char **keyPrefix, |
| 1545 | PRBool *readOnly) |
| 1546 | { |
| 1547 | char *config = NULL((void*)0); |
| 1548 | |
| 1549 | *certPrefix = NULL((void*)0); |
| 1550 | *keyPrefix = NULL((void*)0); |
| 1551 | *readOnly = NSSUTIL_ArgHasFlag("flags", "readOnly", spec); |
| 1552 | if (NSSUTIL_ArgHasFlag("flags", "nocertdb", spec) || |
| 1553 | NSSUTIL_ArgHasFlag("flags", "nokeydb", spec)) { |
| 1554 | return NULL((void*)0); |
| 1555 | } |
| 1556 | |
| 1557 | spec = NSSUTIL_ArgStrip(spec); |
| 1558 | while (*spec) { |
| 1559 | int next; |
| 1560 | NSSUTIL_HANDLE_STRING_ARG(spec, config, "configdir=", ;)if (PL_strncasecmp(spec, "configdir=", sizeof("configdir=") - 1) == 0) { spec += sizeof("configdir=") - 1; if (config) PORT_Free_Util (config); config = NSSUTIL_ArgFetchValue(spec, &next); spec += next; ;; } else |
| 1561 | NSSUTIL_HANDLE_STRING_ARG(spec, *certPrefix, "certPrefix=", ;)if (PL_strncasecmp(spec, "certPrefix=", sizeof("certPrefix=") - 1) == 0) { spec += sizeof("certPrefix=") - 1; if (*certPrefix ) PORT_Free_Util(*certPrefix); *certPrefix = NSSUTIL_ArgFetchValue (spec, &next); spec += next; ;; } else |
| 1562 | NSSUTIL_HANDLE_STRING_ARG(spec, *keyPrefix, "keyPrefix=", ;)if (PL_strncasecmp(spec, "keyPrefix=", sizeof("keyPrefix=") - 1) == 0) { spec += sizeof("keyPrefix=") - 1; if (*keyPrefix) PORT_Free_Util(*keyPrefix); *keyPrefix = NSSUTIL_ArgFetchValue (spec, &next); spec += next; ;; } else |
| 1563 | NSSUTIL_HANDLE_FINAL_ARG(spec){ spec = NSSUTIL_ArgSkipParameter(spec); } spec = NSSUTIL_ArgStrip (spec); |
| 1564 | } |
| 1565 | return config; |
| 1566 | } |
| 1567 | |
| 1568 | struct SECMODConfigListStr { |
| 1569 | char *config; |
| 1570 | char *certPrefix; |
| 1571 | char *keyPrefix; |
| 1572 | PRBool isReadOnly; |
| 1573 | }; |
| 1574 | |
| 1575 | /* |
| 1576 | * return an array of already openned databases from a spec list. |
| 1577 | */ |
| 1578 | SECMODConfigList * |
| 1579 | secmod_GetConfigList(PRBool isFIPS, char *spec, int *count) |
| 1580 | { |
| 1581 | char **children; |
| 1582 | CK_SLOT_ID *ids; |
| 1583 | char *strippedSpec; |
| 1584 | int childCount; |
| 1585 | SECMODConfigList *conflist = NULL((void*)0); |
| 1586 | int i; |
| 1587 | |
| 1588 | strippedSpec = secmod_ParseModuleSpecForTokens(PR_TRUE1, isFIPS, |
| 1589 | spec, &children, &ids); |
| 1590 | if (strippedSpec == NULL((void*)0)) { |
| 1591 | return NULL((void*)0); |
| 1592 | } |
| 1593 | |
| 1594 | for (childCount = 0; children && children[childCount]; childCount++) |
| 1595 | ; |
| 1596 | *count = childCount + 1; /* include strippedSpec */ |
| 1597 | conflist = PORT_NewArray(SECMODConfigList, *count)(SECMODConfigList *)PORT_Alloc_Util(sizeof(SECMODConfigList) * (*count)); |
| 1598 | if (conflist == NULL((void*)0)) { |
| 1599 | *count = 0; |
| 1600 | goto loser; |
| 1601 | } |
| 1602 | |
| 1603 | conflist[0].config = secmod_getConfigDir(strippedSpec, |
| 1604 | &conflist[0].certPrefix, |
| 1605 | &conflist[0].keyPrefix, |
| 1606 | &conflist[0].isReadOnly); |
| 1607 | for (i = 0; i < childCount; i++) { |
| 1608 | conflist[i + 1].config = secmod_getConfigDir(children[i], |
| 1609 | &conflist[i + 1].certPrefix, |
| 1610 | &conflist[i + 1].keyPrefix, |
| 1611 | &conflist[i + 1].isReadOnly); |
| 1612 | } |
| 1613 | |
| 1614 | loser: |
| 1615 | secmod_FreeChildren(children, ids); |
| 1616 | PORT_FreePORT_Free_Util(strippedSpec); |
| 1617 | return conflist; |
| 1618 | } |
| 1619 | |
| 1620 | /* |
| 1621 | * determine if we are trying to open an old dbm database. For this test |
| 1622 | * RDB databases should return PR_FALSE. |
| 1623 | */ |
| 1624 | static PRBool |
| 1625 | secmod_configIsDBM(char *configDir) |
| 1626 | { |
| 1627 | char *env; |
| 1628 | |
| 1629 | /* explicit dbm open */ |
| 1630 | if (strncmp(configDir, "dbm:", 4) == 0) { |
| 1631 | return PR_TRUE1; |
| 1632 | } |
| 1633 | /* explicit open of a non-dbm database */ |
| 1634 | if ((strncmp(configDir, "sql:", 4) == 0) || |
| 1635 | (strncmp(configDir, "rdb:", 4) == 0) || |
| 1636 | (strncmp(configDir, "extern:", 7) == 0)) { |
| 1637 | return PR_FALSE0; |
| 1638 | } |
| 1639 | env = PR_GetEnvSecure("NSS_DEFAULT_DB_TYPE"); |
| 1640 | /* implicit dbm open */ |
| 1641 | if ((env == NULL((void*)0)) || (strcmp(env, "dbm") == 0)) { |
| 1642 | return PR_TRUE1; |
| 1643 | } |
| 1644 | /* implicit non-dbm open */ |
| 1645 | return PR_FALSE0; |
| 1646 | } |
| 1647 | |
| 1648 | /* |
| 1649 | * match two prefixes. prefix may be NULL. NULL patches '\0' |
| 1650 | */ |
| 1651 | static PRBool |
| 1652 | secmod_matchPrefix(char *prefix1, char *prefix2) |
| 1653 | { |
| 1654 | if ((prefix1 == NULL((void*)0)) || (*prefix1 == 0)) { |
| 1655 | if ((prefix2 == NULL((void*)0)) || (*prefix2 == 0)) { |
| 1656 | return PR_TRUE1; |
| 1657 | } |
| 1658 | return PR_FALSE0; |
| 1659 | } |
| 1660 | if (strcmp(prefix1, prefix2) == 0) { |
| 1661 | return PR_TRUE1; |
| 1662 | } |
| 1663 | return PR_FALSE0; |
| 1664 | } |
| 1665 | |
| 1666 | /* do two config paramters match? Not all callers are compariing |
| 1667 | * SECMODConfigLists directly, so this function breaks them out to their |
| 1668 | * components. */ |
| 1669 | static PRBool |
| 1670 | secmod_matchConfig(char *configDir1, char *configDir2, |
| 1671 | char *certPrefix1, char *certPrefix2, |
| 1672 | char *keyPrefix1, char *keyPrefix2, |
| 1673 | PRBool isReadOnly1, PRBool isReadOnly2) |
| 1674 | { |
| 1675 | /* TODO: Document the answer to the question: |
| 1676 | * "Why not allow them to match if they are both NULL?" |
| 1677 | * See: https://bugzilla.mozilla.org/show_bug.cgi?id=1318633#c1 |
| 1678 | */ |
| 1679 | if ((configDir1 == NULL((void*)0)) || (configDir2 == NULL((void*)0))) { |
| 1680 | return PR_FALSE0; |
| 1681 | } |
| 1682 | if (strcmp(configDir1, configDir2) != 0) { |
| 1683 | return PR_FALSE0; |
| 1684 | } |
| 1685 | if (!secmod_matchPrefix(certPrefix1, certPrefix2)) { |
| 1686 | return PR_FALSE0; |
| 1687 | } |
| 1688 | if (!secmod_matchPrefix(keyPrefix1, keyPrefix2)) { |
| 1689 | return PR_FALSE0; |
| 1690 | } |
| 1691 | /* these last test -- if we just need the DB open read only, |
| 1692 | * than any open will suffice, but if we requested it read/write |
| 1693 | * and it's only open read only, we need to open it again */ |
| 1694 | if (isReadOnly1) { |
| 1695 | return PR_TRUE1; |
| 1696 | } |
| 1697 | if (isReadOnly2) { /* isReadonly1 == PR_FALSE */ |
| 1698 | return PR_FALSE0; |
| 1699 | } |
| 1700 | return PR_TRUE1; |
| 1701 | } |
| 1702 | |
| 1703 | /* |
| 1704 | * return true if we are requesting a database that is already openned. |
| 1705 | */ |
| 1706 | PRBool |
| 1707 | secmod_MatchConfigList(const char *spec, SECMODConfigList *conflist, int count) |
| 1708 | { |
| 1709 | char *config; |
| 1710 | char *certPrefix; |
| 1711 | char *keyPrefix; |
| 1712 | PRBool isReadOnly; |
| 1713 | PRBool ret = PR_FALSE0; |
| 1714 | int i; |
| 1715 | |
| 1716 | config = secmod_getConfigDir(spec, &certPrefix, &keyPrefix, &isReadOnly); |
| 1717 | if (!config) { |
| 1718 | goto done; |
| 1719 | } |
| 1720 | |
| 1721 | /* NOTE: we dbm isn't multiple open safe. If we open the same database |
| 1722 | * twice from two different locations, then we can corrupt our database |
| 1723 | * (the cache will be inconsistent). Protect against this by claiming |
| 1724 | * for comparison only that we are always openning dbm databases read only. |
| 1725 | */ |
| 1726 | if (secmod_configIsDBM(config)) { |
| 1727 | isReadOnly = 1; |
| 1728 | } |
| 1729 | for (i = 0; i < count; i++) { |
| 1730 | if (secmod_matchConfig(config, conflist[i].config, certPrefix, |
| 1731 | conflist[i].certPrefix, keyPrefix, |
| 1732 | conflist[i].keyPrefix, isReadOnly, |
| 1733 | conflist[i].isReadOnly)) { |
| 1734 | ret = PR_TRUE1; |
| 1735 | goto done; |
| 1736 | } |
| 1737 | } |
| 1738 | |
| 1739 | ret = PR_FALSE0; |
| 1740 | done: |
| 1741 | PORT_FreePORT_Free_Util(config); |
| 1742 | PORT_FreePORT_Free_Util(certPrefix); |
| 1743 | PORT_FreePORT_Free_Util(keyPrefix); |
| 1744 | return ret; |
| 1745 | } |
| 1746 | |
| 1747 | /* |
| 1748 | * Find the slot id from the module spec. If the slot is the database slot, we |
| 1749 | * can get the slot id from the default database slot. |
| 1750 | */ |
| 1751 | CK_SLOT_ID |
| 1752 | secmod_GetSlotIDFromModuleSpec(const char *moduleSpec, SECMODModule *module) |
| 1753 | { |
| 1754 | char *tmp_spec = NULL((void*)0); |
| 1755 | char **children, **thisChild; |
| 1756 | CK_SLOT_ID *ids, *thisID, slotID = -1; |
| 1757 | char *inConfig = NULL((void*)0), *thisConfig = NULL((void*)0); |
| 1758 | char *inCertPrefix = NULL((void*)0), *thisCertPrefix = NULL((void*)0); |
| 1759 | char *inKeyPrefix = NULL((void*)0), *thisKeyPrefix = NULL((void*)0); |
| 1760 | PRBool inReadOnly, thisReadOnly; |
| 1761 | |
| 1762 | inConfig = secmod_getConfigDir(moduleSpec, &inCertPrefix, &inKeyPrefix, |
| 1763 | &inReadOnly); |
| 1764 | if (!inConfig) { |
| 1765 | goto done; |
| 1766 | } |
| 1767 | |
| 1768 | if (secmod_configIsDBM(inConfig)) { |
| 1769 | inReadOnly = 1; |
| 1770 | } |
| 1771 | |
| 1772 | tmp_spec = secmod_ParseModuleSpecForTokens(PR_TRUE1, module->isFIPS, |
| 1773 | module->libraryParams, &children, &ids); |
| 1774 | if (tmp_spec == NULL((void*)0)) { |
| 1775 | goto done; |
| 1776 | } |
| 1777 | |
| 1778 | /* first check to see if the parent is the database */ |
| 1779 | thisConfig = secmod_getConfigDir(tmp_spec, &thisCertPrefix, &thisKeyPrefix, |
| 1780 | &thisReadOnly); |
| 1781 | if (!thisConfig) { |
| 1782 | goto done; |
| 1783 | } |
| 1784 | if (secmod_matchConfig(inConfig, thisConfig, inCertPrefix, thisCertPrefix, |
| 1785 | inKeyPrefix, thisKeyPrefix, inReadOnly, thisReadOnly)) { |
| 1786 | /* yup it's the default key slot, get the id for it */ |
| 1787 | PK11SlotInfo *slot = PK11_GetInternalKeySlot(); |
| 1788 | if (slot) { |
| 1789 | slotID = slot->slotID; |
| 1790 | PK11_FreeSlot(slot); |
| 1791 | } |
| 1792 | goto done; |
| 1793 | } |
| 1794 | |
| 1795 | /* find id of the token */ |
| 1796 | for (thisChild = children, thisID = ids; thisChild && *thisChild; thisChild++, thisID++) { |
| 1797 | PORT_FreePORT_Free_Util(thisConfig); |
| 1798 | PORT_FreePORT_Free_Util(thisCertPrefix); |
| 1799 | PORT_FreePORT_Free_Util(thisKeyPrefix); |
| 1800 | thisConfig = secmod_getConfigDir(*thisChild, &thisCertPrefix, |
| 1801 | &thisKeyPrefix, &thisReadOnly); |
| 1802 | if (thisConfig == NULL((void*)0)) { |
| 1803 | continue; |
| 1804 | } |
| 1805 | if (secmod_matchConfig(inConfig, thisConfig, inCertPrefix, thisCertPrefix, |
| 1806 | inKeyPrefix, thisKeyPrefix, inReadOnly, thisReadOnly)) { |
| 1807 | slotID = *thisID; |
| 1808 | break; |
| 1809 | } |
| 1810 | } |
| 1811 | |
| 1812 | done: |
| 1813 | PORT_FreePORT_Free_Util(inConfig); |
| 1814 | PORT_FreePORT_Free_Util(inCertPrefix); |
| 1815 | PORT_FreePORT_Free_Util(inKeyPrefix); |
| 1816 | PORT_FreePORT_Free_Util(thisConfig); |
| 1817 | PORT_FreePORT_Free_Util(thisCertPrefix); |
| 1818 | PORT_FreePORT_Free_Util(thisKeyPrefix); |
| 1819 | if (tmp_spec) { |
| 1820 | secmod_FreeChildren(children, ids); |
| 1821 | PORT_FreePORT_Free_Util(tmp_spec); |
| 1822 | } |
| 1823 | return slotID; |
| 1824 | } |
| 1825 | |
| 1826 | void |
| 1827 | secmod_FreeConfigList(SECMODConfigList *conflist, int count) |
| 1828 | { |
| 1829 | int i; |
| 1830 | for (i = 0; i < count; i++) { |
| 1831 | PORT_FreePORT_Free_Util(conflist[i].config); |
| 1832 | PORT_FreePORT_Free_Util(conflist[i].certPrefix); |
| 1833 | PORT_FreePORT_Free_Util(conflist[i].keyPrefix); |
| 1834 | } |
| 1835 | PORT_FreePORT_Free_Util(conflist); |
| 1836 | } |
| 1837 | |
| 1838 | void |
| 1839 | secmod_FreeChildren(char **children, CK_SLOT_ID *ids) |
| 1840 | { |
| 1841 | char **thisChild; |
| 1842 | |
| 1843 | if (!children) { |
| 1844 | return; |
| 1845 | } |
| 1846 | |
| 1847 | for (thisChild = children; thisChild && *thisChild; thisChild++) { |
| 1848 | PORT_FreePORT_Free_Util(*thisChild); |
| 1849 | } |
| 1850 | PORT_FreePORT_Free_Util(children); |
| 1851 | if (ids) { |
| 1852 | PORT_FreePORT_Free_Util(ids); |
| 1853 | } |
| 1854 | return; |
| 1855 | } |
| 1856 | |
| 1857 | /* |
| 1858 | * caclulate the length of each child record: |
| 1859 | * " 0x{id}=<{escaped_child}>" |
| 1860 | */ |
| 1861 | static int |
| 1862 | secmod_getChildLength(char *child, CK_SLOT_ID id) |
| 1863 | { |
| 1864 | int length = NSSUTIL_DoubleEscapeSize(child, '>', ']'); |
| 1865 | if (id == 0) { |
| 1866 | length++; |
| 1867 | } |
| 1868 | while (id) { |
| 1869 | length++; |
| 1870 | id = id >> 4; |
| 1871 | } |
| 1872 | length += 6; /* {sp}0x[id]=<{child}> */ |
| 1873 | return length; |
| 1874 | } |
| 1875 | |
| 1876 | /* |
| 1877 | * Build a child record: |
| 1878 | * " 0x{id}=<{escaped_child}>" |
| 1879 | */ |
| 1880 | static SECStatus |
| 1881 | secmod_mkTokenChild(char **next, int *length, char *child, CK_SLOT_ID id) |
| 1882 | { |
| 1883 | int len; |
| 1884 | char *escSpec; |
| 1885 | |
| 1886 | len = PR_snprintf(*next, *length, " 0x%x=<", id); |
| 1887 | if (len < 0) { |
| 1888 | return SECFailure; |
| 1889 | } |
| 1890 | *next += len; |
| 1891 | *length -= len; |
| 1892 | escSpec = NSSUTIL_DoubleEscape(child, '>', ']'); |
| 1893 | if (escSpec == NULL((void*)0)) { |
| 1894 | return SECFailure; |
| 1895 | } |
| 1896 | if (*child && (*escSpec == 0)) { |
| 1897 | PORT_FreePORT_Free_Util(escSpec); |
| 1898 | return SECFailure; |
| 1899 | } |
| 1900 | len = strlen(escSpec); |
| 1901 | if (len + 1 > *length) { |
| 1902 | PORT_FreePORT_Free_Util(escSpec); |
| 1903 | return SECFailure; |
| 1904 | } |
| 1905 | PORT_Memcpymemcpy(*next, escSpec, len); |
| 1906 | *next += len; |
| 1907 | *length -= len; |
| 1908 | PORT_FreePORT_Free_Util(escSpec); |
| 1909 | **next = '>'; |
| 1910 | (*next)++; |
| 1911 | (*length)--; |
| 1912 | return SECSuccess; |
| 1913 | } |
| 1914 | |
| 1915 | #define TOKEN_STRING" tokens=[" " tokens=[" |
| 1916 | |
| 1917 | char * |
| 1918 | secmod_MkAppendTokensList(PLArenaPool *arena, char *oldParam, char *newToken, |
| 1919 | CK_SLOT_ID newID, char **children, CK_SLOT_ID *ids) |
| 1920 | { |
| 1921 | char *rawParam = NULL((void*)0); /* oldParam with tokens stripped off */ |
| 1922 | char *newParam = NULL((void*)0); /* space for the return parameter */ |
| 1923 | char *nextParam = NULL((void*)0); /* current end of the new parameter */ |
| 1924 | char **oldChildren = NULL((void*)0); |
| 1925 | CK_SLOT_ID *oldIds = NULL((void*)0); |
| 1926 | void *mark = NULL((void*)0); /* mark the arena pool in case we need |
| 1927 | * to release it */ |
| 1928 | int length, i, tmpLen; |
| 1929 | SECStatus rv; |
| 1930 | |
| 1931 | /* first strip out and save the old tokenlist */ |
| 1932 | rawParam = secmod_ParseModuleSpecForTokens(PR_FALSE0, PR_FALSE0, |
| 1933 | oldParam, &oldChildren, &oldIds); |
| 1934 | if (!rawParam) { |
| 1935 | goto loser; |
| 1936 | } |
| 1937 | |
| 1938 | /* now calculate the total length of the new buffer */ |
| 1939 | /* First the 'fixed stuff', length of rawparam (does not include a NULL), |
| 1940 | * length of the token string (does include the NULL), closing bracket */ |
| 1941 | length = strlen(rawParam) + sizeof(TOKEN_STRING" tokens=[") + 1; |
| 1942 | /* now add then length of all the old children */ |
| 1943 | for (i = 0; oldChildren && oldChildren[i]; i++) { |
| 1944 | length += secmod_getChildLength(oldChildren[i], oldIds[i]); |
| 1945 | } |
| 1946 | |
| 1947 | /* add the new token */ |
| 1948 | length += secmod_getChildLength(newToken, newID); |
| 1949 | |
| 1950 | /* and it's new children */ |
| 1951 | for (i = 0; children && children[i]; i++) { |
| 1952 | if (ids[i] == -1) { |
| 1953 | continue; |
| 1954 | } |
| 1955 | length += secmod_getChildLength(children[i], ids[i]); |
| 1956 | } |
| 1957 | |
| 1958 | /* now allocate and build the string */ |
| 1959 | mark = PORT_ArenaMarkPORT_ArenaMark_Util(arena); |
| 1960 | if (!mark) { |
| 1961 | goto loser; |
| 1962 | } |
| 1963 | newParam = PORT_ArenaAllocPORT_ArenaAlloc_Util(arena, length); |
| 1964 | if (!newParam) { |
| 1965 | goto loser; |
| 1966 | } |
| 1967 | |
| 1968 | PORT_Strcpystrcpy(newParam, oldParam); |
| 1969 | tmpLen = strlen(oldParam); |
| 1970 | nextParam = newParam + tmpLen; |
| 1971 | length -= tmpLen; |
| 1972 | PORT_Memcpymemcpy(nextParam, TOKEN_STRING" tokens=[", sizeof(TOKEN_STRING" tokens=[") - 1); |
| 1973 | nextParam += sizeof(TOKEN_STRING" tokens=[") - 1; |
| 1974 | length -= sizeof(TOKEN_STRING" tokens=[") - 1; |
| 1975 | |
| 1976 | for (i = 0; oldChildren && oldChildren[i]; i++) { |
| 1977 | rv = secmod_mkTokenChild(&nextParam, &length, oldChildren[i], oldIds[i]); |
| 1978 | if (rv != SECSuccess) { |
| 1979 | goto loser; |
| 1980 | } |
| 1981 | } |
| 1982 | |
| 1983 | rv = secmod_mkTokenChild(&nextParam, &length, newToken, newID); |
| 1984 | if (rv != SECSuccess) { |
| 1985 | goto loser; |
| 1986 | } |
| 1987 | |
| 1988 | for (i = 0; children && children[i]; i++) { |
| 1989 | if (ids[i] == -1) { |
| 1990 | continue; |
| 1991 | } |
| 1992 | rv = secmod_mkTokenChild(&nextParam, &length, children[i], ids[i]); |
| 1993 | if (rv != SECSuccess) { |
| 1994 | goto loser; |
| 1995 | } |
| 1996 | } |
| 1997 | |
| 1998 | if (length < 2) { |
| 1999 | goto loser; |
| 2000 | } |
| 2001 | |
| 2002 | *nextParam++ = ']'; |
| 2003 | *nextParam++ = 0; |
| 2004 | |
| 2005 | /* we are going to return newParam now, don't release the mark */ |
| 2006 | PORT_ArenaUnmarkPORT_ArenaUnmark_Util(arena, mark); |
| 2007 | mark = NULL((void*)0); |
| 2008 | |
| 2009 | loser: |
| 2010 | if (mark) { |
| 2011 | PORT_ArenaReleasePORT_ArenaRelease_Util(arena, mark); |
| 2012 | newParam = NULL((void*)0); /* if the mark is still active, |
| 2013 | * don't return the param */ |
| 2014 | } |
| 2015 | if (rawParam) { |
| 2016 | PORT_FreePORT_Free_Util(rawParam); |
| 2017 | } |
| 2018 | if (oldChildren) { |
| 2019 | secmod_FreeChildren(oldChildren, oldIds); |
| 2020 | } |
| 2021 | return newParam; |
| 2022 | } |
| 2023 | |
| 2024 | static char * |
| 2025 | secmod_mkModuleSpec(SECMODModule *module) |
| 2026 | { |
| 2027 | char *nss = NULL((void*)0), *modSpec = NULL((void*)0), **slotStrings = NULL((void*)0); |
| 2028 | int slotCount, i, si; |
| 2029 | SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); |
| 2030 | |
| 2031 | /* allocate target slot info strings */ |
| 2032 | slotCount = 0; |
| 2033 | |
| 2034 | SECMOD_GetReadLock(moduleLock); |
| 2035 | if (module->slotCount) { |
| 2036 | for (i = 0; i < module->slotCount; i++) { |
| 2037 | if (module->slots[i]->defaultFlags != 0) { |
| 2038 | slotCount++; |
| 2039 | } |
| 2040 | } |
| 2041 | } else { |
| 2042 | slotCount = module->slotInfoCount; |
| 2043 | } |
| 2044 | |
| 2045 | slotStrings = (char **)PORT_ZAllocPORT_ZAlloc_Util(slotCount * sizeof(char *)); |
| 2046 | if (slotStrings == NULL((void*)0)) { |
| 2047 | SECMOD_ReleaseReadLock(moduleLock); |
| 2048 | goto loser; |
| 2049 | } |
| 2050 | |
| 2051 | /* build the slot info strings */ |
| 2052 | if (module->slotCount) { |
| 2053 | for (i = 0, si = 0; i < module->slotCount; i++) { |
| 2054 | if (module->slots[i]->defaultFlags) { |
| 2055 | PORT_Assert(si < slotCount)((si < slotCount)?((void)0):PR_Assert("si < slotCount", "/root/firefox-clang/security/nss/lib/pk11wrap/pk11pars.c",2055 )); |
| 2056 | if (si >= slotCount) |
| 2057 | break; |
| 2058 | slotStrings[si] = NSSUTIL_MkSlotString(module->slots[i]->slotID, |
| 2059 | module->slots[i]->defaultFlags, |
| 2060 | module->slots[i]->timeout, |
| 2061 | module->slots[i]->askpw, |
| 2062 | module->slots[i]->hasRootCerts, |
| 2063 | module->slots[i]->hasRootTrust); |
| 2064 | si++; |
| 2065 | } |
| 2066 | } |
| 2067 | } else { |
| 2068 | for (i = 0; i < slotCount; i++) { |
| 2069 | slotStrings[i] = NSSUTIL_MkSlotString( |
| 2070 | module->slotInfo[i].slotID, |
| 2071 | module->slotInfo[i].defaultFlags, |
| 2072 | module->slotInfo[i].timeout, |
| 2073 | module->slotInfo[i].askpw, |
| 2074 | module->slotInfo[i].hasRootCerts, |
| 2075 | module->slotInfo[i].hasRootTrust); |
| 2076 | } |
| 2077 | } |
| 2078 | |
| 2079 | SECMOD_ReleaseReadLock(moduleLock); |
| 2080 | nss = NSSUTIL_MkNSSString(slotStrings, slotCount, module->internal, |
| 2081 | module->isFIPS, module->isModuleDB, |
| 2082 | module->moduleDBOnly, module->isCritical, |
| 2083 | module->trustOrder, module->cipherOrder, |
| 2084 | module->ssl[0], module->ssl[1]); |
| 2085 | modSpec = NSSUTIL_MkModuleSpec(module->dllName, module->commonName, |
| 2086 | module->libraryParams, nss); |
| 2087 | PORT_FreePORT_Free_Util(slotStrings); |
| 2088 | PR_smprintf_free(nss); |
| 2089 | loser: |
| 2090 | return (modSpec); |
| 2091 | } |
| 2092 | |
| 2093 | char ** |
| 2094 | SECMOD_GetModuleSpecList(SECMODModule *module) |
| 2095 | { |
| 2096 | SECMODModuleDBFunc func = (SECMODModuleDBFunc)module->moduleDBFunc; |
| 2097 | if (func) { |
| 2098 | return (*func)(SECMOD_MODULE_DB_FUNCTION_FIND0, |
| 2099 | module->libraryParams, NULL((void*)0)); |
| 2100 | } |
| 2101 | return NULL((void*)0); |
| 2102 | } |
| 2103 | |
| 2104 | SECStatus |
| 2105 | SECMOD_AddPermDB(SECMODModule *module) |
| 2106 | { |
| 2107 | SECMODModuleDBFunc func; |
| 2108 | char *moduleSpec; |
| 2109 | char **retString; |
| 2110 | |
| 2111 | if (module->parent == NULL((void*)0)) |
| 2112 | return SECFailure; |
| 2113 | |
| 2114 | func = (SECMODModuleDBFunc)module->parent->moduleDBFunc; |
| 2115 | if (func) { |
| 2116 | moduleSpec = secmod_mkModuleSpec(module); |
| 2117 | retString = (*func)(SECMOD_MODULE_DB_FUNCTION_ADD1, |
| 2118 | module->parent->libraryParams, moduleSpec); |
| 2119 | PORT_FreePORT_Free_Util(moduleSpec); |
| 2120 | if (retString != NULL((void*)0)) |
| 2121 | return SECSuccess; |
| 2122 | } |
| 2123 | return SECFailure; |
| 2124 | } |
| 2125 | |
| 2126 | SECStatus |
| 2127 | SECMOD_DeletePermDB(SECMODModule *module) |
| 2128 | { |
| 2129 | SECMODModuleDBFunc func; |
| 2130 | char *moduleSpec; |
| 2131 | char **retString; |
| 2132 | |
| 2133 | if (module->parent == NULL((void*)0)) |
| 2134 | return SECFailure; |
| 2135 | |
| 2136 | func = (SECMODModuleDBFunc)module->parent->moduleDBFunc; |
| 2137 | if (func) { |
| 2138 | moduleSpec = secmod_mkModuleSpec(module); |
| 2139 | retString = (*func)(SECMOD_MODULE_DB_FUNCTION_DEL2, |
| 2140 | module->parent->libraryParams, moduleSpec); |
| 2141 | PORT_FreePORT_Free_Util(moduleSpec); |
| 2142 | if (retString != NULL((void*)0)) |
| 2143 | return SECSuccess; |
| 2144 | } |
| 2145 | return SECFailure; |
| 2146 | } |
| 2147 | |
| 2148 | SECStatus |
| 2149 | SECMOD_FreeModuleSpecList(SECMODModule *module, char **moduleSpecList) |
| 2150 | { |
| 2151 | SECMODModuleDBFunc func = (SECMODModuleDBFunc)module->moduleDBFunc; |
| 2152 | char **retString; |
| 2153 | if (func) { |
| 2154 | retString = (*func)(SECMOD_MODULE_DB_FUNCTION_RELEASE3, |
| 2155 | module->libraryParams, moduleSpecList); |
| 2156 | if (retString != NULL((void*)0)) |
| 2157 | return SECSuccess; |
| 2158 | } |
| 2159 | return SECFailure; |
| 2160 | } |
| 2161 | |
| 2162 | /* |
| 2163 | * load a PKCS#11 module but do not add it to the default NSS trust domain |
| 2164 | */ |
| 2165 | SECMODModule * |
| 2166 | SECMOD_LoadModule(char *modulespec, SECMODModule *parent, PRBool recurse) |
| 2167 | { |
| 2168 | char *library = NULL((void*)0), *moduleName = NULL((void*)0), *parameters = NULL((void*)0), *nss = NULL((void*)0); |
| 2169 | char *config = NULL((void*)0); |
| 2170 | SECStatus status; |
| 2171 | SECMODModule *module = NULL((void*)0); |
| 2172 | SECMODModule *oldModule = NULL((void*)0); |
| 2173 | SECStatus rv; |
| 2174 | PRBool forwardPolicyFeedback = PR_FALSE0; |
| 2175 | PRUint32 forwardPolicyCheckFlags; |
| 2176 | |
| 2177 | /* initialize the underlying module structures */ |
| 2178 | SECMOD_Init(); |
| 2179 | |
| 2180 | status = NSSUTIL_ArgParseModuleSpecEx(modulespec, &library, &moduleName, |
| 2181 | ¶meters, &nss, |
| 2182 | &config); |
| 2183 | if (status != SECSuccess) { |
| 2184 | goto loser; |
| 2185 | } |
| 2186 | |
| 2187 | module = SECMOD_CreateModuleEx(library, moduleName, parameters, nss, config); |
| 2188 | forwardPolicyFeedback = NSSUTIL_ArgHasFlag("flags", "printPolicyFeedback", nss); |
| 2189 | forwardPolicyCheckFlags = secmod_parsePolicyCheckFlags(nss); |
| 2190 | |
| 2191 | if (library) |
| 2192 | PORT_FreePORT_Free_Util(library); |
| 2193 | if (moduleName) |
| 2194 | PORT_FreePORT_Free_Util(moduleName); |
| 2195 | if (parameters) |
| 2196 | PORT_FreePORT_Free_Util(parameters); |
| 2197 | if (nss) |
| 2198 | PORT_FreePORT_Free_Util(nss); |
| 2199 | if (config) |
| 2200 | PORT_FreePORT_Free_Util(config); |
| 2201 | if (!module) { |
| 2202 | goto loser; |
| 2203 | } |
| 2204 | |
| 2205 | /* a policy only stanza doesn't actually get 'loaded'. policy has already |
| 2206 | * been parsed as a side effect of the CreateModuleEx call */ |
| 2207 | if (secmod_PolicyOnly(module)) { |
| 2208 | return module; |
| 2209 | } |
| 2210 | if (parent) { |
| 2211 | module->parent = SECMOD_ReferenceModule(parent); |
| 2212 | if (module->internal && secmod_IsInternalKeySlot(parent)) { |
| 2213 | module->internal = parent->internal; |
| 2214 | } |
| 2215 | } |
| 2216 | |
| 2217 | /* load it */ |
| 2218 | rv = secmod_LoadPKCS11Module(module, &oldModule); |
| 2219 | if (rv != SECSuccess) { |
| 2220 | goto loser; |
| 2221 | } |
| 2222 | |
| 2223 | /* if we just reload an old module, no need to add it to any lists. |
| 2224 | * we simple release all our references */ |
| 2225 | if (oldModule) { |
| 2226 | /* This module already exists, don't link it anywhere. This |
| 2227 | * will probably destroy this module */ |
| 2228 | SECMOD_DestroyModule(module); |
| 2229 | return oldModule; |
| 2230 | } |
| 2231 | |
| 2232 | if (recurse && module->isModuleDB) { |
| 2233 | char **moduleSpecList; |
| 2234 | PORT_SetErrorPORT_SetError_Util(0); |
| 2235 | |
| 2236 | moduleSpecList = SECMOD_GetModuleSpecList(module); |
| 2237 | if (moduleSpecList) { |
| 2238 | char **index; |
| 2239 | |
| 2240 | index = moduleSpecList; |
| 2241 | if (*index && SECMOD_GetSkipFirstFlag(module)) { |
| 2242 | index++; |
| 2243 | } |
| 2244 | |
| 2245 | for (; *index; index++) { |
| 2246 | SECMODModule *child; |
| 2247 | if (0 == PORT_Strcmpstrcmp(*index, modulespec)) { |
| 2248 | /* avoid trivial infinite recursion */ |
| 2249 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_NO_MODULE); |
| 2250 | rv = SECFailure; |
| 2251 | break; |
| 2252 | } |
| 2253 | if (!forwardPolicyFeedback) { |
| 2254 | child = SECMOD_LoadModule(*index, module, PR_TRUE1); |
| 2255 | } else { |
| 2256 | /* Add printPolicyFeedback to the nss flags */ |
| 2257 | char *specWithForwards = |
| 2258 | NSSUTIL_AddNSSFlagToModuleSpec(*index, "printPolicyFeedback"); |
| 2259 | char *tmp; |
| 2260 | if (forwardPolicyCheckFlags & SECMOD_FLAG_POLICY_CHECK_IDENTIFIER0x01) { |
| 2261 | tmp = NSSUTIL_AddNSSFlagToModuleSpec(specWithForwards, "policyCheckIdentifier"); |
| 2262 | PORT_FreePORT_Free_Util(specWithForwards); |
| 2263 | specWithForwards = tmp; |
| 2264 | } |
| 2265 | if (forwardPolicyCheckFlags & SECMOD_FLAG_POLICY_CHECK_VALUE0x02) { |
| 2266 | tmp = NSSUTIL_AddNSSFlagToModuleSpec(specWithForwards, "policyCheckValue"); |
| 2267 | PORT_FreePORT_Free_Util(specWithForwards); |
| 2268 | specWithForwards = tmp; |
| 2269 | } |
| 2270 | child = SECMOD_LoadModule(specWithForwards, module, PR_TRUE1); |
| 2271 | PORT_FreePORT_Free_Util(specWithForwards); |
| 2272 | } |
| 2273 | if (!child) |
| 2274 | break; |
| 2275 | if (child->isCritical && !child->loaded) { |
| 2276 | int err = PORT_GetErrorPORT_GetError_Util(); |
| 2277 | if (!err) |
| 2278 | err = SEC_ERROR_NO_MODULE; |
| 2279 | SECMOD_DestroyModule(child); |
| 2280 | PORT_SetErrorPORT_SetError_Util(err); |
| 2281 | rv = SECFailure; |
| 2282 | break; |
| 2283 | } |
| 2284 | SECMOD_DestroyModule(child); |
| 2285 | } |
| 2286 | SECMOD_FreeModuleSpecList(module, moduleSpecList); |
| 2287 | } else { |
| 2288 | if (!PORT_GetErrorPORT_GetError_Util()) |
| 2289 | PORT_SetErrorPORT_SetError_Util(SEC_ERROR_NO_MODULE); |
| 2290 | rv = SECFailure; |
| 2291 | } |
| 2292 | } |
| 2293 | |
| 2294 | if (rv != SECSuccess) { |
| 2295 | goto loser; |
| 2296 | } |
| 2297 | |
| 2298 | /* inherit the reference */ |
| 2299 | if (!module->moduleDBOnly) { |
| 2300 | SECMOD_AddModuleToList(module); |
| 2301 | } else { |
| 2302 | SECMOD_AddModuleToDBOnlyList(module); |
| 2303 | } |
| 2304 | |
| 2305 | /* handle any additional work here */ |
| 2306 | return module; |
| 2307 | |
| 2308 | loser: |
| 2309 | if (module) { |
| 2310 | if (module->loaded) { |
| 2311 | SECMOD_UnloadModule(module); |
| 2312 | } |
| 2313 | SECMOD_AddModuleToUnloadList(module); |
| 2314 | } |
| 2315 | return module; |
| 2316 | } |
| 2317 | |
| 2318 | SECMODModule * |
| 2319 | SECMOD_LoadModuleWithFunction(const char *moduleName, CK_C_GetFunctionList fentry) |
| 2320 | { |
| 2321 | SECMODModule *module = NULL((void*)0); |
| 2322 | SECMODModule *oldModule = NULL((void*)0); |
| 2323 | SECStatus rv; |
| 2324 | |
| 2325 | /* initialize the underlying module structures */ |
| 2326 | SECMOD_Init(); |
| 2327 | |
| 2328 | module = secmod_NewModule(); |
| 2329 | if (module == NULL((void*)0)) { |
| 2330 | goto loser; |
| 2331 | } |
| 2332 | |
| 2333 | module->commonName = PORT_ArenaStrdupPORT_ArenaStrdup_Util(module->arena, moduleName ? moduleName : ""); |
| 2334 | module->internal = PR_FALSE0; |
| 2335 | module->isFIPS = PR_FALSE0; |
| 2336 | /* if the system FIPS mode is enabled, force FIPS to be on */ |
| 2337 | if (SECMOD_GetSystemFIPSEnabled()) { |
| 2338 | module->isFIPS = PR_TRUE1; |
| 2339 | } |
| 2340 | |
| 2341 | module->isCritical = PR_FALSE0; |
| 2342 | /* new field */ |
| 2343 | module->trustOrder = NSSUTIL_DEFAULT_TRUST_ORDER50; |
| 2344 | /* new field */ |
| 2345 | module->cipherOrder = NSSUTIL_DEFAULT_CIPHER_ORDER0; |
| 2346 | /* new field */ |
| 2347 | module->isModuleDB = PR_FALSE0; |
| 2348 | module->moduleDBOnly = PR_FALSE0; |
| 2349 | |
| 2350 | module->ssl[0] = 0; |
| 2351 | module->ssl[1] = 0; |
| 2352 | |
| 2353 | secmod_PrivateModuleCount++; |
| 2354 | |
| 2355 | /* load it */ |
| 2356 | rv = secmod_LoadPKCS11ModuleFromFunction(module, &oldModule, fentry); |
| 2357 | if (rv != SECSuccess) { |
| 2358 | goto loser; |
| 2359 | } |
| 2360 | |
| 2361 | /* if we just reload an old module, no need to add it to any lists. |
| 2362 | * we simple release all our references */ |
| 2363 | if (oldModule) { |
| 2364 | /* This module already exists, don't link it anywhere. This |
| 2365 | * will probably destroy this module */ |
| 2366 | SECMOD_DestroyModule(module); |
| 2367 | return oldModule; |
| 2368 | } |
| 2369 | |
| 2370 | SECMOD_AddModuleToList(module); |
| 2371 | /* handle any additional work here */ |
| 2372 | return module; |
| 2373 | |
| 2374 | loser: |
| 2375 | if (module) { |
| 2376 | if (module->loaded) { |
| 2377 | SECMOD_UnloadModule(module); |
| 2378 | } |
| 2379 | SECMOD_AddModuleToUnloadList(module); |
| 2380 | } |
| 2381 | return module; |
| 2382 | } |
| 2383 | |
| 2384 | /* |
| 2385 | * load a PKCS#11 module and add it to the default NSS trust domain |
| 2386 | */ |
| 2387 | SECMODModule * |
| 2388 | SECMOD_LoadUserModule(char *modulespec, SECMODModule *parent, PRBool recurse) |
| 2389 | { |
| 2390 | SECStatus rv = SECSuccess; |
| 2391 | SECMODModule *newmod = SECMOD_LoadModule(modulespec, parent, recurse); |
| 2392 | SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); |
| 2393 | |
| 2394 | if (newmod) { |
| 2395 | SECMOD_GetReadLock(moduleLock); |
| 2396 | rv = STAN_AddModuleToDefaultTrustDomain(newmod); |
| 2397 | SECMOD_ReleaseReadLock(moduleLock); |
| 2398 | if (SECSuccess != rv) { |
| 2399 | SECMOD_DestroyModule(newmod); |
| 2400 | return NULL((void*)0); |
| 2401 | } |
| 2402 | } |
| 2403 | return newmod; |
| 2404 | } |
| 2405 | |
| 2406 | SECMODModule * |
| 2407 | SECMOD_LoadUserModuleWithFunction(const char *moduleName, CK_C_GetFunctionList fentry) |
| 2408 | { |
| 2409 | SECStatus rv = SECSuccess; |
| 2410 | SECMODModule *newmod = SECMOD_LoadModuleWithFunction(moduleName, fentry); |
| 2411 | SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); |
| 2412 | |
| 2413 | if (newmod) { |
| 2414 | SECMOD_GetReadLock(moduleLock); |
| 2415 | rv = STAN_AddModuleToDefaultTrustDomain(newmod); |
| 2416 | SECMOD_ReleaseReadLock(moduleLock); |
| 2417 | if (SECSuccess != rv) { |
| 2418 | SECMOD_DestroyModule(newmod); |
| 2419 | return NULL((void*)0); |
| 2420 | } |
| 2421 | } |
| 2422 | return newmod; |
| 2423 | } |
| 2424 | |
| 2425 | /* |
| 2426 | * remove the PKCS#11 module from the default NSS trust domain, call |
| 2427 | * C_Finalize, and destroy the module structure |
| 2428 | */ |
| 2429 | SECStatus |
| 2430 | SECMOD_UnloadUserModule(SECMODModule *mod) |
| 2431 | { |
| 2432 | SECStatus rv = SECSuccess; |
| 2433 | int atype = 0; |
| 2434 | SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); |
| 2435 | if (!mod) { |
| 2436 | return SECFailure; |
| 2437 | } |
| 2438 | |
| 2439 | SECMOD_GetReadLock(moduleLock); |
| 2440 | rv = STAN_RemoveModuleFromDefaultTrustDomain(mod); |
| 2441 | SECMOD_ReleaseReadLock(moduleLock); |
| 2442 | if (SECSuccess != rv) { |
| 2443 | return SECFailure; |
| 2444 | } |
| 2445 | return SECMOD_DeleteModuleEx(NULL((void*)0), mod, &atype, PR_FALSE0); |
| 2446 | } |