/src/nss/lib/pk11wrap/pk11pars.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* This Source Code Form is subject to the terms of the Mozilla Public | 
| 2 |  |  * License, v. 2.0. If a copy of the MPL was not distributed with this | 
| 3 |  |  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 
| 4 |  | /* | 
| 5 |  |  * The following handles the loading, unloading and management of | 
| 6 |  |  * various PCKS #11 modules | 
| 7 |  |  */ | 
| 8 |  |  | 
| 9 |  | #include <ctype.h> | 
| 10 |  | #include <assert.h> | 
| 11 |  | #include "pkcs11.h" | 
| 12 |  | #include "seccomon.h" | 
| 13 |  | #include "secmod.h" | 
| 14 |  | #include "secmodi.h" | 
| 15 |  | #include "secmodti.h" | 
| 16 |  | #include "pki3hack.h" | 
| 17 |  | #include "secerr.h" | 
| 18 |  | #include "nss.h" | 
| 19 |  | #include "utilpars.h" | 
| 20 |  | #include "pk11pub.h" | 
| 21 |  |  | 
| 22 |  | /* create a new module */ | 
| 23 |  | static SECMODModule * | 
| 24 |  | secmod_NewModule(void) | 
| 25 | 19.0k | { | 
| 26 | 19.0k |     SECMODModule *newMod; | 
| 27 | 19.0k |     PLArenaPool *arena; | 
| 28 |  |  | 
| 29 |  |     /* create an arena in which dllName and commonName can be | 
| 30 |  |      * allocated. | 
| 31 |  |      */ | 
| 32 | 19.0k |     arena = PORT_NewArena(512); | 
| 33 | 19.0k |     if (arena == NULL) { | 
| 34 | 0 |         return NULL; | 
| 35 | 0 |     } | 
| 36 |  |  | 
| 37 | 19.0k |     newMod = (SECMODModule *)PORT_ArenaAlloc(arena, sizeof(SECMODModule)); | 
| 38 | 19.0k |     if (newMod == NULL) { | 
| 39 | 0 |         PORT_FreeArena(arena, PR_FALSE); | 
| 40 | 0 |         return NULL; | 
| 41 | 0 |     } | 
| 42 |  |  | 
| 43 |  |     /* | 
| 44 |  |      * initialize of the fields of the module | 
| 45 |  |      */ | 
| 46 | 19.0k |     newMod->arena = arena; | 
| 47 | 19.0k |     newMod->internal = PR_FALSE; | 
| 48 | 19.0k |     newMod->loaded = PR_FALSE; | 
| 49 | 19.0k |     newMod->isFIPS = PR_FALSE; | 
| 50 | 19.0k |     newMod->dllName = NULL; | 
| 51 | 19.0k |     newMod->commonName = NULL; | 
| 52 | 19.0k |     newMod->library = NULL; | 
| 53 | 19.0k |     newMod->functionList = NULL; | 
| 54 | 19.0k |     newMod->slotCount = 0; | 
| 55 | 19.0k |     newMod->slots = NULL; | 
| 56 | 19.0k |     newMod->slotInfo = NULL; | 
| 57 | 19.0k |     newMod->slotInfoCount = 0; | 
| 58 | 19.0k |     newMod->refCount = 1; | 
| 59 | 19.0k |     newMod->ssl[0] = 0; | 
| 60 | 19.0k |     newMod->ssl[1] = 0; | 
| 61 | 19.0k |     newMod->libraryParams = NULL; | 
| 62 | 19.0k |     newMod->moduleDBFunc = NULL; | 
| 63 | 19.0k |     newMod->parent = NULL; | 
| 64 | 19.0k |     newMod->isCritical = PR_FALSE; | 
| 65 | 19.0k |     newMod->isModuleDB = PR_FALSE; | 
| 66 | 19.0k |     newMod->moduleDBOnly = PR_FALSE; | 
| 67 | 19.0k |     newMod->trustOrder = 0; | 
| 68 | 19.0k |     newMod->cipherOrder = 0; | 
| 69 | 19.0k |     newMod->evControlMask = 0; | 
| 70 | 19.0k |     newMod->refLock = PZ_NewLock(nssILockRefLock); | 
| 71 | 19.0k |     if (newMod->refLock == NULL) { | 
| 72 | 0 |         PORT_FreeArena(arena, PR_FALSE); | 
| 73 | 0 |         return NULL; | 
| 74 | 0 |     } | 
| 75 | 19.0k |     return newMod; | 
| 76 | 19.0k | } | 
| 77 |  |  | 
| 78 |  | /* private flags for isModuleDB (field in SECMODModule). */ | 
| 79 |  | /* The meaing of these flags is as follows: | 
| 80 |  |  * | 
| 81 |  |  * SECMOD_FLAG_MODULE_DB_IS_MODULE_DB - This is a module that accesses the | 
| 82 |  |  *   database of other modules to load. Module DBs are loadable modules that | 
| 83 |  |  *   tells NSS which PKCS #11 modules to load and when. These module DBs are | 
| 84 |  |  *   chainable. That is, one module DB can load another one. NSS system init | 
| 85 |  |  *   design takes advantage of this feature. In system NSS, a fixed system | 
| 86 |  |  *   module DB loads the system defined libraries, then chains out to the | 
| 87 |  |  *   traditional module DBs to load any system or user configured modules | 
| 88 |  |  *   (like smart cards). This bit is the same as the already existing meaning | 
| 89 |  |  *   of  isModuleDB = PR_TRUE. None of the other module db flags should be set | 
| 90 |  |  *   if this flag isn't on. | 
| 91 |  |  * | 
| 92 |  |  * SECMOD_FLAG_MODULE_DB_SKIP_FIRST - This flag tells NSS to skip the first | 
| 93 |  |  *   PKCS #11 module presented by a module DB. This allows the OS to load a | 
| 94 |  |  *   softoken from the system module, then ask the existing module DB code to | 
| 95 |  |  *   load the other PKCS #11 modules in that module DB (skipping it's request | 
| 96 |  |  *   to load softoken). This gives the system init finer control over the | 
| 97 |  |  *   configuration of that softoken module. | 
| 98 |  |  * | 
| 99 |  |  * SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB - This flag allows system init to mark a | 
| 100 |  |  *   different module DB as the 'default' module DB (the one in which | 
| 101 |  |  *   'Add module' changes will go). Without this flag NSS takes the first | 
| 102 |  |  *   module as the default Module DB, but in system NSS, that first module | 
| 103 |  |  *   is the system module, which is likely read only (at least to the user). | 
| 104 |  |  *   This  allows system NSS to delegate those changes to the user's module DB, | 
| 105 |  |  *   preserving the user's ability to load new PKCS #11 modules (which only | 
| 106 |  |  *   affect him), from existing applications like Firefox. | 
| 107 |  |  */ | 
| 108 | 9.52k | #define SECMOD_FLAG_MODULE_DB_IS_MODULE_DB 0x01 /* must be set if any of the \ | 
| 109 |  |                                                  *other flags are set */ | 
| 110 | 9.52k | #define SECMOD_FLAG_MODULE_DB_SKIP_FIRST 0x02 | 
| 111 | 9.52k | #define SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB 0x04 | 
| 112 | 19.0k | #define SECMOD_FLAG_MODULE_DB_POLICY_ONLY 0x08 | 
| 113 |  |  | 
| 114 |  | /* private flags for internal (field in SECMODModule). */ | 
| 115 |  | /* The meaing of these flags is as follows: | 
| 116 |  |  * | 
| 117 |  |  * SECMOD_FLAG_INTERNAL_IS_INTERNAL - This is a marks the the module is | 
| 118 |  |  *   the internal module (that is, softoken). This bit is the same as the | 
| 119 |  |  *   already existing meaning of internal = PR_TRUE. None of the other | 
| 120 |  |  *   internal flags should be set if this flag isn't on. | 
| 121 |  |  * | 
| 122 |  |  * SECMOD_FLAG_MODULE_INTERNAL_KEY_SLOT - This flag allows system init to mark | 
| 123 |  |  *   a  different slot returned byt PK11_GetInternalKeySlot(). The 'primary' | 
| 124 |  |  *   slot defined by this module will be the new internal key slot. | 
| 125 |  |  */ | 
| 126 | 19.0k | #define SECMOD_FLAG_INTERNAL_IS_INTERNAL 0x01 /* must be set if any of \ | 
| 127 |  |                                                *the other flags are set */ | 
| 128 | 38.0k | #define SECMOD_FLAG_INTERNAL_KEY_SLOT 0x02 | 
| 129 |  |  | 
| 130 |  | /* private flags for policy check. */ | 
| 131 | 0 | #define SECMOD_FLAG_POLICY_CHECK_IDENTIFIER 0x01 | 
| 132 | 0 | #define SECMOD_FLAG_POLICY_CHECK_VALUE 0x02 | 
| 133 |  |  | 
| 134 |  | /* | 
| 135 |  |  * for 3.4 we continue to use the old SECMODModule structure | 
| 136 |  |  */ | 
| 137 |  | SECMODModule * | 
| 138 |  | SECMOD_CreateModule(const char *library, const char *moduleName, | 
| 139 |  |                     const char *parameters, const char *nss) | 
| 140 | 0 | { | 
| 141 | 0 |     return SECMOD_CreateModuleEx(library, moduleName, parameters, nss, NULL); | 
| 142 | 0 | } | 
| 143 |  |  | 
| 144 |  | /* | 
| 145 |  |  * NSS config options format: | 
| 146 |  |  * | 
| 147 |  |  * The specified ciphers will be allowed by policy, but an application | 
| 148 |  |  * may allow more by policy explicitly: | 
| 149 |  |  * config="allow=curve1:curve2:hash1:hash2:rsa-1024..." | 
| 150 |  |  * | 
| 151 |  |  * Only the specified hashes and curves will be allowed: | 
| 152 |  |  * config="disallow=all allow=sha1:sha256:secp256r1:secp384r1" | 
| 153 |  |  * | 
| 154 |  |  * Only the specified hashes and curves will be allowed, and | 
| 155 |  |  *  RSA keys of 2048 or more will be accepted, and DH key exchange | 
| 156 |  |  *  with 1024-bit primes or more: | 
| 157 |  |  * config="disallow=all allow=sha1:sha256:secp256r1:secp384r1:min-rsa=2048:min-dh=1024" | 
| 158 |  |  * | 
| 159 |  |  * A policy that enables the AES ciphersuites and the SECP256/384 curves: | 
| 160 |  |  * config="allow=aes128-cbc:aes128-gcm:TLS1.0:TLS1.2:TLS1.1:HMAC-SHA1:SHA1:SHA256:SHA384:RSA:ECDHE-RSA:SECP256R1:SECP384R1" | 
| 161 |  |  * | 
| 162 |  |  * Disallow values are parsed first, then allow values, independent of the | 
| 163 |  |  * order they appear. | 
| 164 |  |  * | 
| 165 |  |  * flags: turn on the following flags: | 
| 166 |  |  *    policy-lock: turn off the ability for applications to change policy with | 
| 167 |  |  *                 the call NSS_SetAlgorithmPolicy or the other system policy | 
| 168 |  |  *                 calls (SSL_SetPolicy, etc.) | 
| 169 |  |  *    ssl-lock:    turn off the ability to change the ssl defaults. | 
| 170 |  |  * | 
| 171 |  |  * The following only apply to ssl cipher suites (future smime) | 
| 172 |  |  * | 
| 173 |  |  * enable: turn on ciphersuites by default. | 
| 174 |  |  * disable: turn off ciphersuites by default without disallowing them by policy. | 
| 175 |  |  * | 
| 176 |  |  * | 
| 177 |  |  */ | 
| 178 |  |  | 
| 179 |  | typedef struct { | 
| 180 |  |     const char *name; | 
| 181 |  |     unsigned name_size; | 
| 182 |  |     SECOidTag oid; | 
| 183 |  |     PRUint32 val; | 
| 184 |  | } oidValDef; | 
| 185 |  |  | 
| 186 |  | typedef struct { | 
| 187 |  |     const char *name; | 
| 188 |  |     unsigned name_size; | 
| 189 |  |     PRInt32 option; | 
| 190 |  | } optionFreeDef; | 
| 191 |  |  | 
| 192 |  | typedef struct { | 
| 193 |  |     const char *name; | 
| 194 |  |     unsigned name_size; | 
| 195 |  |     PRUint32 flag; | 
| 196 |  | } policyFlagDef; | 
| 197 |  |  | 
| 198 |  | /* | 
| 199 |  |  *  This table should be merged with the SECOID table. | 
| 200 |  |  */ | 
| 201 |  | #define CIPHER_NAME(x) x, (sizeof(x) - 1) | 
| 202 |  | static const oidValDef curveOptList[] = { | 
| 203 |  |     /* Curves */ | 
| 204 |  |     { CIPHER_NAME("PRIME192V1"), SEC_OID_ANSIX962_EC_PRIME192V1, | 
| 205 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 206 |  |     { CIPHER_NAME("PRIME192V2"), SEC_OID_ANSIX962_EC_PRIME192V2, | 
| 207 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 208 |  |     { CIPHER_NAME("PRIME192V3"), SEC_OID_ANSIX962_EC_PRIME192V3, | 
| 209 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 210 |  |     { CIPHER_NAME("PRIME239V1"), SEC_OID_ANSIX962_EC_PRIME239V1, | 
| 211 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 212 |  |     { CIPHER_NAME("PRIME239V2"), SEC_OID_ANSIX962_EC_PRIME239V2, | 
| 213 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 214 |  |     { CIPHER_NAME("PRIME239V3"), SEC_OID_ANSIX962_EC_PRIME239V3, | 
| 215 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 216 |  |     { CIPHER_NAME("PRIME256V1"), SEC_OID_ANSIX962_EC_PRIME256V1, | 
| 217 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 218 |  |     { CIPHER_NAME("SECP112R1"), SEC_OID_SECG_EC_SECP112R1, | 
| 219 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 220 |  |     { CIPHER_NAME("SECP112R2"), SEC_OID_SECG_EC_SECP112R2, | 
| 221 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 222 |  |     { CIPHER_NAME("SECP128R1"), SEC_OID_SECG_EC_SECP128R1, | 
| 223 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 224 |  |     { CIPHER_NAME("SECP128R2"), SEC_OID_SECG_EC_SECP128R2, | 
| 225 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 226 |  |     { CIPHER_NAME("SECP160K1"), SEC_OID_SECG_EC_SECP160K1, | 
| 227 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 228 |  |     { CIPHER_NAME("SECP160R1"), SEC_OID_SECG_EC_SECP160R1, | 
| 229 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 230 |  |     { CIPHER_NAME("SECP160R2"), SEC_OID_SECG_EC_SECP160R2, | 
| 231 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 232 |  |     { CIPHER_NAME("SECP192K1"), SEC_OID_SECG_EC_SECP192K1, | 
| 233 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 234 |  |     { CIPHER_NAME("SECP192R1"), SEC_OID_ANSIX962_EC_PRIME192V1, | 
| 235 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 236 |  |     { CIPHER_NAME("SECP224K1"), SEC_OID_SECG_EC_SECP224K1, | 
| 237 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 238 |  |     { CIPHER_NAME("SECP256K1"), SEC_OID_SECG_EC_SECP256K1, | 
| 239 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 240 |  |     { CIPHER_NAME("SECP256R1"), SEC_OID_ANSIX962_EC_PRIME256V1, | 
| 241 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 242 |  |     { CIPHER_NAME("SECP384R1"), SEC_OID_SECG_EC_SECP384R1, | 
| 243 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 244 |  |     { CIPHER_NAME("SECP521R1"), SEC_OID_SECG_EC_SECP521R1, | 
| 245 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 246 |  |     { CIPHER_NAME("CURVE25519"), SEC_OID_CURVE25519, | 
| 247 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 248 |  |     { CIPHER_NAME("XYBER768D00"), SEC_OID_XYBER768D00, 0 }, | 
| 249 |  |     /* ANSI X9.62 named elliptic curves (characteristic two field) */ | 
| 250 |  |     { CIPHER_NAME("C2PNB163V1"), SEC_OID_ANSIX962_EC_C2PNB163V1, | 
| 251 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 252 |  |     { CIPHER_NAME("C2PNB163V2"), SEC_OID_ANSIX962_EC_C2PNB163V2, | 
| 253 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 254 |  |     { CIPHER_NAME("C2PNB163V3"), SEC_OID_ANSIX962_EC_C2PNB163V3, | 
| 255 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 256 |  |     { CIPHER_NAME("C2PNB176V1"), SEC_OID_ANSIX962_EC_C2PNB176V1, | 
| 257 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 258 |  |     { CIPHER_NAME("C2TNB191V1"), SEC_OID_ANSIX962_EC_C2TNB191V1, | 
| 259 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 260 |  |     { CIPHER_NAME("C2TNB191V2"), SEC_OID_ANSIX962_EC_C2TNB191V2, | 
| 261 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 262 |  |     { CIPHER_NAME("C2TNB191V3"), SEC_OID_ANSIX962_EC_C2TNB191V3, | 
| 263 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 264 |  |     { CIPHER_NAME("C2ONB191V4"), SEC_OID_ANSIX962_EC_C2ONB191V4, | 
| 265 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 266 |  |     { CIPHER_NAME("C2ONB191V5"), SEC_OID_ANSIX962_EC_C2ONB191V5, | 
| 267 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 268 |  |     { CIPHER_NAME("C2PNB208W1"), SEC_OID_ANSIX962_EC_C2PNB208W1, | 
| 269 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 270 |  |     { CIPHER_NAME("C2TNB239V1"), SEC_OID_ANSIX962_EC_C2TNB239V1, | 
| 271 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 272 |  |     { CIPHER_NAME("C2TNB239V2"), SEC_OID_ANSIX962_EC_C2TNB239V2, | 
| 273 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 274 |  |     { CIPHER_NAME("C2TNB239V3"), SEC_OID_ANSIX962_EC_C2TNB239V3, | 
| 275 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 276 |  |     { CIPHER_NAME("C2ONB239V4"), SEC_OID_ANSIX962_EC_C2ONB239V4, | 
| 277 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 278 |  |     { CIPHER_NAME("C2ONB239V5"), SEC_OID_ANSIX962_EC_C2ONB239V5, | 
| 279 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 280 |  |     { CIPHER_NAME("C2PNB272W1"), SEC_OID_ANSIX962_EC_C2PNB272W1, | 
| 281 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 282 |  |     { CIPHER_NAME("C2PNB304W1"), SEC_OID_ANSIX962_EC_C2PNB304W1, | 
| 283 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 284 |  |     { CIPHER_NAME("C2TNB359V1"), SEC_OID_ANSIX962_EC_C2TNB359V1, | 
| 285 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 286 |  |     { CIPHER_NAME("C2PNB368W1"), SEC_OID_ANSIX962_EC_C2PNB368W1, | 
| 287 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 288 |  |     { CIPHER_NAME("C2TNB431R1"), SEC_OID_ANSIX962_EC_C2TNB431R1, | 
| 289 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 290 |  |     /* SECG named elliptic curves (characteristic two field) */ | 
| 291 |  |     { CIPHER_NAME("SECT113R1"), SEC_OID_SECG_EC_SECT113R1, | 
| 292 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 293 |  |     { CIPHER_NAME("SECT131R1"), SEC_OID_SECG_EC_SECT113R2, | 
| 294 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 295 |  |     { CIPHER_NAME("SECT131R1"), SEC_OID_SECG_EC_SECT131R1, | 
| 296 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 297 |  |     { CIPHER_NAME("SECT131R2"), SEC_OID_SECG_EC_SECT131R2, | 
| 298 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 299 |  |     { CIPHER_NAME("SECT163K1"), SEC_OID_SECG_EC_SECT163K1, | 
| 300 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 301 |  |     { CIPHER_NAME("SECT163R1"), SEC_OID_SECG_EC_SECT163R1, | 
| 302 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 303 |  |     { CIPHER_NAME("SECT163R2"), SEC_OID_SECG_EC_SECT163R2, | 
| 304 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 305 |  |     { CIPHER_NAME("SECT193R1"), SEC_OID_SECG_EC_SECT193R1, | 
| 306 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 307 |  |     { CIPHER_NAME("SECT193R2"), SEC_OID_SECG_EC_SECT193R2, | 
| 308 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 309 |  |     { CIPHER_NAME("SECT233K1"), SEC_OID_SECG_EC_SECT233K1, | 
| 310 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 311 |  |     { CIPHER_NAME("SECT233R1"), SEC_OID_SECG_EC_SECT233R1, | 
| 312 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 313 |  |     { CIPHER_NAME("SECT239K1"), SEC_OID_SECG_EC_SECT239K1, | 
| 314 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 315 |  |     { CIPHER_NAME("SECT283K1"), SEC_OID_SECG_EC_SECT283K1, | 
| 316 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 317 |  |     { CIPHER_NAME("SECT283R1"), SEC_OID_SECG_EC_SECT283R1, | 
| 318 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 319 |  |     { CIPHER_NAME("SECT409K1"), SEC_OID_SECG_EC_SECT409K1, | 
| 320 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 321 |  |     { CIPHER_NAME("SECT409R1"), SEC_OID_SECG_EC_SECT409R1, | 
| 322 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 323 |  |     { CIPHER_NAME("SECT571K1"), SEC_OID_SECG_EC_SECT571K1, | 
| 324 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 325 |  |     { CIPHER_NAME("SECT571R1"), SEC_OID_SECG_EC_SECT571R1, | 
| 326 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 327 |  | }; | 
| 328 |  |  | 
| 329 |  | static const oidValDef hashOptList[] = { | 
| 330 |  |     /* Hashes */ | 
| 331 |  |     { CIPHER_NAME("MD2"), SEC_OID_MD2, | 
| 332 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 333 |  |     { CIPHER_NAME("MD4"), SEC_OID_MD4, | 
| 334 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 335 |  |     { CIPHER_NAME("MD5"), SEC_OID_MD5, | 
| 336 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 337 |  |     { CIPHER_NAME("SHA1"), SEC_OID_SHA1, | 
| 338 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 339 |  |     { CIPHER_NAME("SHA224"), SEC_OID_SHA224, | 
| 340 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 341 |  |     { CIPHER_NAME("SHA256"), SEC_OID_SHA256, | 
| 342 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 343 |  |     { CIPHER_NAME("SHA384"), SEC_OID_SHA384, | 
| 344 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 345 |  |     { CIPHER_NAME("SHA512"), SEC_OID_SHA512, | 
| 346 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE } | 
| 347 |  | }; | 
| 348 |  |  | 
| 349 |  | static const oidValDef macOptList[] = { | 
| 350 |  |     /* MACs */ | 
| 351 |  |     { CIPHER_NAME("HMAC-SHA1"), SEC_OID_HMAC_SHA1, NSS_USE_ALG_IN_SSL }, | 
| 352 |  |     { CIPHER_NAME("HMAC-SHA224"), SEC_OID_HMAC_SHA224, NSS_USE_ALG_IN_SSL }, | 
| 353 |  |     { CIPHER_NAME("HMAC-SHA256"), SEC_OID_HMAC_SHA256, NSS_USE_ALG_IN_SSL }, | 
| 354 |  |     { CIPHER_NAME("HMAC-SHA384"), SEC_OID_HMAC_SHA384, NSS_USE_ALG_IN_SSL }, | 
| 355 |  |     { CIPHER_NAME("HMAC-SHA512"), SEC_OID_HMAC_SHA512, NSS_USE_ALG_IN_SSL }, | 
| 356 |  |     { CIPHER_NAME("HMAC-MD5"), SEC_OID_HMAC_MD5, NSS_USE_ALG_IN_SSL }, | 
| 357 |  | }; | 
| 358 |  |  | 
| 359 |  | static const oidValDef cipherOptList[] = { | 
| 360 |  |     /* Ciphers */ | 
| 361 |  |     { CIPHER_NAME("AES128-CBC"), SEC_OID_AES_128_CBC, NSS_USE_ALG_IN_SSL }, | 
| 362 |  |     { CIPHER_NAME("AES192-CBC"), SEC_OID_AES_192_CBC, NSS_USE_ALG_IN_SSL }, | 
| 363 |  |     { CIPHER_NAME("AES256-CBC"), SEC_OID_AES_256_CBC, NSS_USE_ALG_IN_SSL }, | 
| 364 |  |     { CIPHER_NAME("AES128-GCM"), SEC_OID_AES_128_GCM, NSS_USE_ALG_IN_SSL }, | 
| 365 |  |     { CIPHER_NAME("AES192-GCM"), SEC_OID_AES_192_GCM, NSS_USE_ALG_IN_SSL }, | 
| 366 |  |     { CIPHER_NAME("AES256-GCM"), SEC_OID_AES_256_GCM, NSS_USE_ALG_IN_SSL }, | 
| 367 |  |     { CIPHER_NAME("CAMELLIA128-CBC"), SEC_OID_CAMELLIA_128_CBC, NSS_USE_ALG_IN_SSL }, | 
| 368 |  |     { CIPHER_NAME("CAMELLIA192-CBC"), SEC_OID_CAMELLIA_192_CBC, NSS_USE_ALG_IN_SSL }, | 
| 369 |  |     { CIPHER_NAME("CAMELLIA256-CBC"), SEC_OID_CAMELLIA_256_CBC, NSS_USE_ALG_IN_SSL }, | 
| 370 |  |     { CIPHER_NAME("CHACHA20-POLY1305"), SEC_OID_CHACHA20_POLY1305, NSS_USE_ALG_IN_SSL }, | 
| 371 |  |     { CIPHER_NAME("SEED-CBC"), SEC_OID_SEED_CBC, NSS_USE_ALG_IN_SSL }, | 
| 372 |  |     { CIPHER_NAME("DES-EDE3-CBC"), SEC_OID_DES_EDE3_CBC, NSS_USE_ALG_IN_SSL }, | 
| 373 |  |     { CIPHER_NAME("DES-40-CBC"), SEC_OID_DES_40_CBC, NSS_USE_ALG_IN_SSL }, | 
| 374 |  |     { CIPHER_NAME("DES-CBC"), SEC_OID_DES_CBC, NSS_USE_ALG_IN_SSL }, | 
| 375 |  |     { CIPHER_NAME("NULL-CIPHER"), SEC_OID_NULL_CIPHER, NSS_USE_ALG_IN_SSL }, | 
| 376 |  |     { CIPHER_NAME("RC2"), SEC_OID_RC2_CBC, NSS_USE_ALG_IN_SSL }, | 
| 377 |  |     { CIPHER_NAME("RC4"), SEC_OID_RC4, NSS_USE_ALG_IN_SSL }, | 
| 378 |  |     { CIPHER_NAME("IDEA"), SEC_OID_IDEA_CBC, NSS_USE_ALG_IN_SSL }, | 
| 379 |  | }; | 
| 380 |  |  | 
| 381 |  | static const oidValDef kxOptList[] = { | 
| 382 |  |     /* Key exchange */ | 
| 383 |  |     { CIPHER_NAME("RSA"), SEC_OID_TLS_RSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 384 |  |     { CIPHER_NAME("RSA-EXPORT"), SEC_OID_TLS_RSA_EXPORT, NSS_USE_ALG_IN_SSL_KX }, | 
| 385 |  |     { CIPHER_NAME("DHE-RSA"), SEC_OID_TLS_DHE_RSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 386 |  |     { CIPHER_NAME("DHE-DSS"), SEC_OID_TLS_DHE_DSS, NSS_USE_ALG_IN_SSL_KX }, | 
| 387 |  |     { CIPHER_NAME("DH-RSA"), SEC_OID_TLS_DH_RSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 388 |  |     { CIPHER_NAME("DH-DSS"), SEC_OID_TLS_DH_DSS, NSS_USE_ALG_IN_SSL_KX }, | 
| 389 |  |     { CIPHER_NAME("ECDHE-ECDSA"), SEC_OID_TLS_ECDHE_ECDSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 390 |  |     { CIPHER_NAME("ECDHE-RSA"), SEC_OID_TLS_ECDHE_RSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 391 |  |     { CIPHER_NAME("ECDH-ECDSA"), SEC_OID_TLS_ECDH_ECDSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 392 |  |     { CIPHER_NAME("ECDH-RSA"), SEC_OID_TLS_ECDH_RSA, NSS_USE_ALG_IN_SSL_KX }, | 
| 393 |  | }; | 
| 394 |  |  | 
| 395 |  | static const oidValDef signOptList[] = { | 
| 396 |  |     /* Signatures */ | 
| 397 |  |     { CIPHER_NAME("DSA"), SEC_OID_ANSIX9_DSA_SIGNATURE, | 
| 398 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 399 |  |     { CIPHER_NAME("RSA-PKCS"), SEC_OID_PKCS1_RSA_ENCRYPTION, | 
| 400 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 401 |  |     { CIPHER_NAME("RSA-PSS"), SEC_OID_PKCS1_RSA_PSS_SIGNATURE, | 
| 402 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 403 |  |     { CIPHER_NAME("ECDSA"), SEC_OID_ANSIX962_EC_PUBLIC_KEY, | 
| 404 |  |       NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_SIGNATURE }, | 
| 405 |  |     { CIPHER_NAME("ED25519"), SEC_OID_ED25519_PUBLIC_KEY, | 
| 406 |  |       NSS_USE_ALG_IN_SIGNATURE }, | 
| 407 |  | }; | 
| 408 |  |  | 
| 409 |  | typedef struct { | 
| 410 |  |     const oidValDef *list; | 
| 411 |  |     PRUint32 entries; | 
| 412 |  |     const char *description; | 
| 413 |  |     PRBool allowEmpty; | 
| 414 |  | } algListsDef; | 
| 415 |  |  | 
| 416 |  | static const algListsDef algOptLists[] = { | 
| 417 |  |     { curveOptList, PR_ARRAY_SIZE(curveOptList), "ECC", PR_FALSE }, | 
| 418 |  |     { hashOptList, PR_ARRAY_SIZE(hashOptList), "HASH", PR_FALSE }, | 
| 419 |  |     { macOptList, PR_ARRAY_SIZE(macOptList), "MAC", PR_FALSE }, | 
| 420 |  |     { cipherOptList, PR_ARRAY_SIZE(cipherOptList), "CIPHER", PR_FALSE }, | 
| 421 |  |     { kxOptList, PR_ARRAY_SIZE(kxOptList), "OTHER-KX", PR_FALSE }, | 
| 422 |  |     { signOptList, PR_ARRAY_SIZE(signOptList), "OTHER-SIGN", PR_FALSE }, | 
| 423 |  | }; | 
| 424 |  |  | 
| 425 |  | static const optionFreeDef sslOptList[] = { | 
| 426 |  |     /* Versions */ | 
| 427 |  |     { CIPHER_NAME("SSL2.0"), 0x002 }, | 
| 428 |  |     { CIPHER_NAME("SSL3.0"), 0x300 }, | 
| 429 |  |     { CIPHER_NAME("SSL3.1"), 0x301 }, | 
| 430 |  |     { CIPHER_NAME("TLS1.0"), 0x301 }, | 
| 431 |  |     { CIPHER_NAME("TLS1.1"), 0x302 }, | 
| 432 |  |     { CIPHER_NAME("TLS1.2"), 0x303 }, | 
| 433 |  |     { CIPHER_NAME("TLS1.3"), 0x304 }, | 
| 434 |  |     { CIPHER_NAME("DTLS1.0"), 0x302 }, | 
| 435 |  |     { CIPHER_NAME("DTLS1.1"), 0x302 }, | 
| 436 |  |     { CIPHER_NAME("DTLS1.2"), 0x303 }, | 
| 437 |  |     { CIPHER_NAME("DTLS1.3"), 0x304 }, | 
| 438 |  | }; | 
| 439 |  |  | 
| 440 |  | static const optionFreeDef keySizeFlagsList[] = { | 
| 441 |  |     { CIPHER_NAME("KEY-SIZE-SSL"), NSS_KEY_SIZE_POLICY_SSL_FLAG }, | 
| 442 |  |     { CIPHER_NAME("KEY-SIZE-SIGN"), NSS_KEY_SIZE_POLICY_SIGN_FLAG }, | 
| 443 |  |     { CIPHER_NAME("KEY-SIZE-VERIFY"), NSS_KEY_SIZE_POLICY_VERIFY_FLAG }, | 
| 444 |  | }; | 
| 445 |  |  | 
| 446 |  | static const optionFreeDef freeOptList[] = { | 
| 447 |  |  | 
| 448 |  |     /* Restrictions for asymetric keys */ | 
| 449 |  |     { CIPHER_NAME("RSA-MIN"), NSS_RSA_MIN_KEY_SIZE }, | 
| 450 |  |     { CIPHER_NAME("DH-MIN"), NSS_DH_MIN_KEY_SIZE }, | 
| 451 |  |     { CIPHER_NAME("DSA-MIN"), NSS_DSA_MIN_KEY_SIZE }, | 
| 452 |  |     { CIPHER_NAME("ECC-MIN"), NSS_ECC_MIN_KEY_SIZE }, | 
| 453 |  |     /* what operations doe the key size apply to */ | 
| 454 |  |     { CIPHER_NAME("KEY-SIZE-FLAGS"), NSS_KEY_SIZE_POLICY_FLAGS }, | 
| 455 |  |     /* constraints on SSL Protocols */ | 
| 456 |  |     { CIPHER_NAME("TLS-VERSION-MIN"), NSS_TLS_VERSION_MIN_POLICY }, | 
| 457 |  |     { CIPHER_NAME("TLS-VERSION-MAX"), NSS_TLS_VERSION_MAX_POLICY }, | 
| 458 |  |     /* constraints on DTLS Protocols */ | 
| 459 |  |     { CIPHER_NAME("DTLS-VERSION-MIN"), NSS_DTLS_VERSION_MIN_POLICY }, | 
| 460 |  |     { CIPHER_NAME("DTLS-VERSION-MAX"), NSS_DTLS_VERSION_MAX_POLICY } | 
| 461 |  | }; | 
| 462 |  |  | 
| 463 |  | static const policyFlagDef policyFlagList[] = { | 
| 464 |  |     { CIPHER_NAME("SSL"), NSS_USE_ALG_IN_SSL }, | 
| 465 |  |     { CIPHER_NAME("SSL-KEY-EXCHANGE"), NSS_USE_ALG_IN_SSL_KX }, | 
| 466 |  |     /* add other key exhanges in the future */ | 
| 467 |  |     { CIPHER_NAME("KEY-EXCHANGE"), NSS_USE_ALG_IN_SSL_KX }, | 
| 468 |  |     { CIPHER_NAME("CERT-SIGNATURE"), NSS_USE_ALG_IN_CERT_SIGNATURE }, | 
| 469 |  |     { CIPHER_NAME("CMS-SIGNATURE"), NSS_USE_ALG_IN_CMS_SIGNATURE }, | 
| 470 |  |     { CIPHER_NAME("ALL-SIGNATURE"), NSS_USE_ALG_IN_SIGNATURE }, | 
| 471 |  |     /* sign turns off all signatures, but doesn't change the | 
| 472 |  |      * allowance for specific sigantures... for example: | 
| 473 |  |      * disallow=sha256/all allow=sha256/signature doesn't allow | 
| 474 |  |      * cert-sigantures, where disallow=sha256/all allow=sha256/all-signature | 
| 475 |  |      * does. | 
| 476 |  |      * however, disallow=sha356/signature and disallow=sha256/all-siganture are | 
| 477 |  |      * equivalent in effect */ | 
| 478 |  |     { CIPHER_NAME("SIGNATURE"), NSS_USE_ALG_IN_ANY_SIGNATURE }, | 
| 479 |  |     /* enable/disable everything */ | 
| 480 |  |     { CIPHER_NAME("ALL"), NSS_USE_ALG_IN_SSL | NSS_USE_ALG_IN_SSL_KX | | 
| 481 |  |                               NSS_USE_ALG_IN_SIGNATURE }, | 
| 482 |  |     { CIPHER_NAME("NONE"), 0 } | 
| 483 |  | }; | 
| 484 |  |  | 
| 485 |  | /* | 
| 486 |  |  *  Get the next cipher on the list. point to the next one in 'next'. | 
| 487 |  |  *  return the length; | 
| 488 |  |  */ | 
| 489 |  | static const char * | 
| 490 |  | secmod_ArgGetSubValue(const char *cipher, char sep1, char sep2, | 
| 491 |  |                       int *len, const char **next) | 
| 492 | 0 | { | 
| 493 | 0 |     const char *start = cipher; | 
| 494 |  | 
 | 
| 495 | 0 |     if (start == NULL) { | 
| 496 | 0 |         *len = 0; | 
| 497 | 0 |         *next = NULL; | 
| 498 | 0 |         return start; | 
| 499 | 0 |     } | 
| 500 |  |  | 
| 501 | 0 |     for (; *cipher && *cipher != sep2; cipher++) { | 
| 502 | 0 |         if (*cipher == sep1) { | 
| 503 | 0 |             *next = cipher + 1; | 
| 504 | 0 |             *len = cipher - start; | 
| 505 | 0 |             return start; | 
| 506 | 0 |         } | 
| 507 | 0 |     } | 
| 508 | 0 |     *next = NULL; | 
| 509 | 0 |     *len = cipher - start; | 
| 510 | 0 |     return start; | 
| 511 | 0 | } | 
| 512 |  |  | 
| 513 |  | static PRUint32 | 
| 514 |  | secmod_parsePolicyValue(const char *policyFlags, int policyLength, | 
| 515 |  |                         PRBool printPolicyFeedback, PRUint32 policyCheckFlags) | 
| 516 | 0 | { | 
| 517 | 0 |     const char *flag, *currentString; | 
| 518 | 0 |     PRUint32 flags = 0; | 
| 519 | 0 |     int i; | 
| 520 |  | 
 | 
| 521 | 0 |     for (currentString = policyFlags; currentString && | 
| 522 | 0 |                                       currentString < policyFlags + policyLength;) { | 
| 523 | 0 |         int length; | 
| 524 | 0 |         PRBool unknown = PR_TRUE; | 
| 525 | 0 |         flag = secmod_ArgGetSubValue(currentString, ',', ':', &length, | 
| 526 | 0 |                                      ¤tString); | 
| 527 | 0 |         if (length == 0) { | 
| 528 | 0 |             continue; | 
| 529 | 0 |         } | 
| 530 | 0 |         for (i = 0; i < PR_ARRAY_SIZE(policyFlagList); i++) { | 
| 531 | 0 |             const policyFlagDef *policy = &policyFlagList[i]; | 
| 532 | 0 |             unsigned name_size = policy->name_size; | 
| 533 | 0 |             if ((policy->name_size == length) && | 
| 534 | 0 |                 PORT_Strncasecmp(policy->name, flag, name_size) == 0) { | 
| 535 | 0 |                 flags |= policy->flag; | 
| 536 | 0 |                 unknown = PR_FALSE; | 
| 537 | 0 |                 break; | 
| 538 | 0 |             } | 
| 539 | 0 |         } | 
| 540 | 0 |         if (unknown && printPolicyFeedback && | 
| 541 | 0 |             (policyCheckFlags & SECMOD_FLAG_POLICY_CHECK_VALUE)) { | 
| 542 | 0 |             PR_SetEnv("NSS_POLICY_FAIL=1"); | 
| 543 | 0 |             fprintf(stderr, "NSS-POLICY-FAIL %.*s: unknown value: %.*s\n", | 
| 544 | 0 |                     policyLength, policyFlags, length, flag); | 
| 545 | 0 |         } | 
| 546 | 0 |     } | 
| 547 | 0 |     return flags; | 
| 548 | 0 | } | 
| 549 |  |  | 
| 550 |  | /* allow symbolic names for values. The only ones currently defines or | 
| 551 |  |  * SSL protocol versions. */ | 
| 552 |  | static SECStatus | 
| 553 |  | secmod_getPolicyOptValue(const char *policyValue, int policyValueLength, | 
| 554 |  |                          PRInt32 *result) | 
| 555 | 0 | { | 
| 556 | 0 |     PRInt32 val = atoi(policyValue); | 
| 557 | 0 |     int i; | 
| 558 |  | 
 | 
| 559 | 0 |     if ((val != 0) || (*policyValue == '0')) { | 
| 560 | 0 |         *result = val; | 
| 561 | 0 |         return SECSuccess; | 
| 562 | 0 |     } | 
| 563 |  |     /* handle any ssl strings */ | 
| 564 | 0 |     for (i = 0; i < PR_ARRAY_SIZE(sslOptList); i++) { | 
| 565 | 0 |         if (policyValueLength == sslOptList[i].name_size && | 
| 566 | 0 |             PORT_Strncasecmp(sslOptList[i].name, policyValue, | 
| 567 | 0 |                              sslOptList[i].name_size) == 0) { | 
| 568 | 0 |             *result = sslOptList[i].option; | 
| 569 | 0 |             return SECSuccess; | 
| 570 | 0 |         } | 
| 571 | 0 |     } | 
| 572 |  |     /* handle key_size flags. Each flag represents a bit, which | 
| 573 |  |      * gets or'd together. They can be separated by , | or + */ | 
| 574 | 0 |     val = 0; | 
| 575 | 0 |     while (*policyValue) { | 
| 576 | 0 |         PRBool found = PR_FALSE; | 
| 577 | 0 |         for (i = 0; i < PR_ARRAY_SIZE(keySizeFlagsList); i++) { | 
| 578 | 0 |             if (PORT_Strncasecmp(keySizeFlagsList[i].name, policyValue, | 
| 579 | 0 |                                  keySizeFlagsList[i].name_size) == 0) { | 
| 580 | 0 |                 val |= keySizeFlagsList[i].option; | 
| 581 | 0 |                 found = PR_TRUE; | 
| 582 | 0 |                 policyValue += keySizeFlagsList[i].name_size; | 
| 583 | 0 |                 break; | 
| 584 | 0 |             } | 
| 585 | 0 |         } | 
| 586 | 0 |         if (!found) { | 
| 587 | 0 |             return SECFailure; | 
| 588 | 0 |         } | 
| 589 | 0 |         if (*policyValue == ',' || *policyValue == '|' || *policyValue == '+') { | 
| 590 | 0 |             policyValue++; | 
| 591 | 0 |         } | 
| 592 | 0 |     } | 
| 593 | 0 |     *result = val; | 
| 594 | 0 |     return SECSuccess; | 
| 595 | 0 | } | 
| 596 |  |  | 
| 597 |  | /* Policy operations: | 
| 598 |  |  *     Disallow: operation is disallowed by policy. Implies disabled. | 
| 599 |  |  *     Allow: operation is allowed by policy (but could be disabled). | 
| 600 |  |  *     Disable: operation is turned off by default (but could be allowed). | 
| 601 |  |  *     Enable: operation is enabled by default. Implies allowed. | 
| 602 |  |  */ | 
| 603 |  | typedef enum { | 
| 604 |  |     NSS_DISALLOW, | 
| 605 |  |     NSS_ALLOW, | 
| 606 |  |     NSS_DISABLE, | 
| 607 |  |     NSS_ENABLE | 
| 608 |  | } NSSPolicyOperation; | 
| 609 |  |  | 
| 610 |  | /* apply the operator specific policy */ | 
| 611 |  | SECStatus | 
| 612 |  | secmod_setPolicyOperation(SECOidTag oid, NSSPolicyOperation operation, | 
| 613 |  |                           PRUint32 value) | 
| 614 | 0 | { | 
| 615 | 0 |     SECStatus rv = SECSuccess; | 
| 616 | 0 |     switch (operation) { | 
| 617 | 0 |         case NSS_DISALLOW: | 
| 618 |  |             /* clear the requested policy bits */ | 
| 619 | 0 |             rv = NSS_SetAlgorithmPolicy(oid, 0, value); | 
| 620 | 0 |             break; | 
| 621 | 0 |         case NSS_ALLOW: | 
| 622 |  |             /* set the requested policy bits */ | 
| 623 | 0 |             rv = NSS_SetAlgorithmPolicy(oid, value, 0); | 
| 624 | 0 |             break; | 
| 625 |  |         /* enable/disable only apply to SSL cipher suites (future S/MIME). | 
| 626 |  |          * Enable/disable is implemented by clearing the DEFAULT_NOT_VALID | 
| 627 |  |          * flag, then setting the NSS_USE_DEFAULT_SSL_ENABLE flag to the | 
| 628 |  |          * correct value. The ssl policy code will then sort out what to | 
| 629 |  |          * set based on ciphers and cipher suite values.*/ | 
| 630 | 0 |         case NSS_DISABLE: | 
| 631 | 0 |             if (value & (NSS_USE_ALG_IN_SSL | NSS_USE_ALG_IN_SSL_KX)) { | 
| 632 |  |                 /* clear not valid and enable */ | 
| 633 | 0 |                 rv = NSS_SetAlgorithmPolicy(oid, 0, | 
| 634 | 0 |                                             NSS_USE_DEFAULT_NOT_VALID | | 
| 635 | 0 |                                                 NSS_USE_DEFAULT_SSL_ENABLE); | 
| 636 | 0 |             } | 
| 637 | 0 |             break; | 
| 638 | 0 |         case NSS_ENABLE: | 
| 639 | 0 |             if (value & (NSS_USE_ALG_IN_SSL | NSS_USE_ALG_IN_SSL_KX)) { | 
| 640 |  |                 /* set enable, clear not valid. NOTE: enable implies allow! */ | 
| 641 | 0 |                 rv = NSS_SetAlgorithmPolicy(oid, value | NSS_USE_DEFAULT_SSL_ENABLE, | 
| 642 | 0 |                                             NSS_USE_DEFAULT_NOT_VALID); | 
| 643 | 0 |             } | 
| 644 | 0 |             break; | 
| 645 | 0 |         default: | 
| 646 | 0 |             PORT_SetError(SEC_ERROR_LIBRARY_FAILURE); | 
| 647 | 0 |             rv = SECFailure; | 
| 648 | 0 |             break; | 
| 649 | 0 |     } | 
| 650 | 0 |     return rv; | 
| 651 | 0 | } | 
| 652 |  |  | 
| 653 |  | const char * | 
| 654 |  | secmod_getOperationString(NSSPolicyOperation operation) | 
| 655 | 0 | { | 
| 656 | 0 |     switch (operation) { | 
| 657 | 0 |         case NSS_DISALLOW: | 
| 658 | 0 |             return "disallow"; | 
| 659 | 0 |         case NSS_ALLOW: | 
| 660 | 0 |             return "allow"; | 
| 661 | 0 |         case NSS_DISABLE: | 
| 662 | 0 |             return "disable"; | 
| 663 | 0 |         case NSS_ENABLE: | 
| 664 | 0 |             return "enable"; | 
| 665 | 0 |         default: | 
| 666 | 0 |             break; | 
| 667 | 0 |     } | 
| 668 | 0 |     return "invalid"; | 
| 669 | 0 | } | 
| 670 |  |  | 
| 671 |  | static SECStatus | 
| 672 |  | secmod_applyCryptoPolicy(const char *policyString, NSSPolicyOperation operation, | 
| 673 |  |                          PRBool printPolicyFeedback, PRUint32 policyCheckFlags) | 
| 674 | 0 | { | 
| 675 | 0 |     const char *cipher, *currentString; | 
| 676 | 0 |     unsigned i, j; | 
| 677 | 0 |     SECStatus rv = SECSuccess; | 
| 678 | 0 |     PRBool unknown; | 
| 679 |  | 
 | 
| 680 | 0 |     if (policyString == NULL || policyString[0] == 0) { | 
| 681 | 0 |         return SECSuccess; /* do nothing */ | 
| 682 | 0 |     } | 
| 683 |  |  | 
| 684 |  |     /* if we change any of these, make sure it gets applied in ssl as well */ | 
| 685 | 0 |     NSS_SetAlgorithmPolicy(SEC_OID_APPLY_SSL_POLICY, NSS_USE_POLICY_IN_SSL, 0); | 
| 686 |  | 
 | 
| 687 | 0 |     for (currentString = policyString; currentString;) { | 
| 688 | 0 |         int length; | 
| 689 | 0 |         PRBool newValue = PR_FALSE; | 
| 690 |  | 
 | 
| 691 | 0 |         cipher = secmod_ArgGetSubValue(currentString, ':', 0, &length, | 
| 692 | 0 |                                        ¤tString); | 
| 693 | 0 |         unknown = PR_TRUE; | 
| 694 | 0 |         if (length >= 3 && cipher[3] == '/') { | 
| 695 | 0 |             newValue = PR_TRUE; | 
| 696 | 0 |         } | 
| 697 | 0 |         if ((newValue || (length == 3)) && PORT_Strncasecmp(cipher, "all", 3) == 0) { | 
| 698 |  |             /* disable or enable all options by default */ | 
| 699 | 0 |             PRUint32 value = 0; | 
| 700 | 0 |             if (newValue) { | 
| 701 | 0 |                 value = secmod_parsePolicyValue(&cipher[3] + 1, length - 3 - 1, printPolicyFeedback, policyCheckFlags); | 
| 702 | 0 |             } | 
| 703 | 0 |             for (i = 0; i < PR_ARRAY_SIZE(algOptLists); i++) { | 
| 704 | 0 |                 const algListsDef *algOptList = &algOptLists[i]; | 
| 705 | 0 |                 for (j = 0; j < algOptList->entries; j++) { | 
| 706 | 0 |                     if (!newValue) { | 
| 707 | 0 |                         value = algOptList->list[j].val; | 
| 708 | 0 |                     } | 
| 709 | 0 |                     secmod_setPolicyOperation(algOptList->list[j].oid, operation, value); | 
| 710 | 0 |                 } | 
| 711 | 0 |             } | 
| 712 | 0 |             continue; | 
| 713 | 0 |         } | 
| 714 |  |  | 
| 715 | 0 |         for (i = 0; i < PR_ARRAY_SIZE(algOptLists); i++) { | 
| 716 | 0 |             const algListsDef *algOptList = &algOptLists[i]; | 
| 717 | 0 |             for (j = 0; j < algOptList->entries; j++) { | 
| 718 | 0 |                 const oidValDef *algOpt = &algOptList->list[j]; | 
| 719 | 0 |                 unsigned name_size = algOpt->name_size; | 
| 720 | 0 |                 PRBool newOption = PR_FALSE; | 
| 721 |  | 
 | 
| 722 | 0 |                 if ((length >= name_size) && (cipher[name_size] == '/')) { | 
| 723 | 0 |                     newOption = PR_TRUE; | 
| 724 | 0 |                 } | 
| 725 | 0 |                 if ((newOption || algOpt->name_size == length) && | 
| 726 | 0 |                     PORT_Strncasecmp(algOpt->name, cipher, name_size) == 0) { | 
| 727 | 0 |                     PRUint32 value = algOpt->val; | 
| 728 | 0 |                     if (newOption) { | 
| 729 | 0 |                         value = secmod_parsePolicyValue(&cipher[name_size] + 1, | 
| 730 | 0 |                                                         length - name_size - 1, | 
| 731 | 0 |                                                         printPolicyFeedback, | 
| 732 | 0 |                                                         policyCheckFlags); | 
| 733 | 0 |                     } | 
| 734 | 0 |                     rv = secmod_setPolicyOperation(algOptList->list[j].oid, operation, value); | 
| 735 | 0 |                     if (rv != SECSuccess) { | 
| 736 |  |                         /* could not enable option */ | 
| 737 |  |                         /* NSS_SetAlgorithPolicy should have set the error code */ | 
| 738 | 0 |                         return SECFailure; | 
| 739 | 0 |                     } | 
| 740 | 0 |                     unknown = PR_FALSE; | 
| 741 | 0 |                     break; | 
| 742 | 0 |                 } | 
| 743 | 0 |             } | 
| 744 | 0 |         } | 
| 745 | 0 |         if (!unknown) { | 
| 746 | 0 |             continue; | 
| 747 | 0 |         } | 
| 748 |  |  | 
| 749 | 0 |         for (i = 0; i < PR_ARRAY_SIZE(freeOptList); i++) { | 
| 750 | 0 |             const optionFreeDef *freeOpt = &freeOptList[i]; | 
| 751 | 0 |             unsigned name_size = freeOpt->name_size; | 
| 752 |  | 
 | 
| 753 | 0 |             if ((length > name_size) && cipher[name_size] == '=' && | 
| 754 | 0 |                 PORT_Strncasecmp(freeOpt->name, cipher, name_size) == 0) { | 
| 755 | 0 |                 PRInt32 val; | 
| 756 | 0 |                 const char *policyValue = &cipher[name_size + 1]; | 
| 757 | 0 |                 int policyValueLength = length - name_size - 1; | 
| 758 | 0 |                 rv = secmod_getPolicyOptValue(policyValue, policyValueLength, | 
| 759 | 0 |                                               &val); | 
| 760 | 0 |                 if (rv != SECSuccess) { | 
| 761 | 0 |                     if (printPolicyFeedback && | 
| 762 | 0 |                         (policyCheckFlags & SECMOD_FLAG_POLICY_CHECK_VALUE)) { | 
| 763 | 0 |                         PR_SetEnv("NSS_POLICY_FAIL=1"); | 
| 764 | 0 |                         fprintf(stderr, "NSS-POLICY-FAIL %.*s: unknown value: %.*s\n", | 
| 765 | 0 |                                 length, cipher, policyValueLength, policyValue); | 
| 766 | 0 |                     } | 
| 767 | 0 |                     return SECFailure; | 
| 768 | 0 |                 } | 
| 769 | 0 |                 rv = NSS_OptionSet(freeOpt->option, val); | 
| 770 | 0 |                 if (rv != SECSuccess) { | 
| 771 |  |                     /* could not enable option */ | 
| 772 |  |                     /* NSS_OptionSet should have set the error code */ | 
| 773 | 0 |                     return SECFailure; | 
| 774 | 0 |                 } | 
| 775 |  |                 /* to allow the policy to expand in the future. ignore ciphers | 
| 776 |  |                  * we don't understand */ | 
| 777 | 0 |                 unknown = PR_FALSE; | 
| 778 | 0 |                 break; | 
| 779 | 0 |             } | 
| 780 | 0 |         } | 
| 781 |  |  | 
| 782 | 0 |         if (unknown && printPolicyFeedback && | 
| 783 | 0 |             (policyCheckFlags & SECMOD_FLAG_POLICY_CHECK_IDENTIFIER)) { | 
| 784 | 0 |             PR_SetEnv("NSS_POLICY_FAIL=1"); | 
| 785 | 0 |             fprintf(stderr, "NSS-POLICY-FAIL %s: unknown identifier: %.*s\n", | 
| 786 | 0 |                     secmod_getOperationString(operation), length, cipher); | 
| 787 | 0 |         } | 
| 788 | 0 |     } | 
| 789 | 0 |     return rv; | 
| 790 | 0 | } | 
| 791 |  |  | 
| 792 |  | static void | 
| 793 |  | secmod_sanityCheckCryptoPolicy(void) | 
| 794 | 0 | { | 
| 795 | 0 |     unsigned i, j; | 
| 796 | 0 |     SECStatus rv = SECSuccess; | 
| 797 | 0 |     unsigned num_kx_enabled = 0; | 
| 798 | 0 |     unsigned num_ssl_enabled = 0; | 
| 799 | 0 |     unsigned num_sig_enabled = 0; | 
| 800 | 0 |     unsigned enabledCount[PR_ARRAY_SIZE(algOptLists)]; | 
| 801 | 0 |     const char *sWarn = "WARN"; | 
| 802 | 0 |     const char *sInfo = "INFO"; | 
| 803 | 0 |     PRBool haveWarning = PR_FALSE; | 
| 804 |  | 
 | 
| 805 | 0 |     for (i = 0; i < PR_ARRAY_SIZE(algOptLists); i++) { | 
| 806 | 0 |         const algListsDef *algOptList = &algOptLists[i]; | 
| 807 | 0 |         enabledCount[i] = 0; | 
| 808 | 0 |         for (j = 0; j < algOptList->entries; j++) { | 
| 809 | 0 |             const oidValDef *algOpt = &algOptList->list[j]; | 
| 810 | 0 |             PRUint32 value; | 
| 811 | 0 |             PRBool anyEnabled = PR_FALSE; | 
| 812 | 0 |             rv = NSS_GetAlgorithmPolicy(algOpt->oid, &value); | 
| 813 | 0 |             if (rv != SECSuccess) { | 
| 814 | 0 |                 PR_SetEnv("NSS_POLICY_FAIL=1"); | 
| 815 | 0 |                 fprintf(stderr, "NSS-POLICY-FAIL: internal failure with NSS_GetAlgorithmPolicy at %u\n", i); | 
| 816 | 0 |                 return; | 
| 817 | 0 |             } | 
| 818 |  |  | 
| 819 | 0 |             if ((algOpt->val & NSS_USE_ALG_IN_SSL_KX) && (value & NSS_USE_ALG_IN_SSL_KX)) { | 
| 820 | 0 |                 ++num_kx_enabled; | 
| 821 | 0 |                 anyEnabled = PR_TRUE; | 
| 822 | 0 |                 fprintf(stderr, "NSS-POLICY-INFO: %s is enabled for KX\n", algOpt->name); | 
| 823 | 0 |             } | 
| 824 | 0 |             if ((algOpt->val & NSS_USE_ALG_IN_SSL) && (value & NSS_USE_ALG_IN_SSL)) { | 
| 825 | 0 |                 ++num_ssl_enabled; | 
| 826 | 0 |                 anyEnabled = PR_TRUE; | 
| 827 | 0 |                 fprintf(stderr, "NSS-POLICY-INFO: %s is enabled for SSL\n", algOpt->name); | 
| 828 | 0 |             } | 
| 829 | 0 |             if ((algOpt->val & NSS_USE_ALG_IN_CERT_SIGNATURE) && | 
| 830 | 0 |                 ((value & NSS_USE_CERT_SIGNATURE_OK) == NSS_USE_CERT_SIGNATURE_OK)) { | 
| 831 | 0 |                 ++num_sig_enabled; | 
| 832 | 0 |                 anyEnabled = PR_TRUE; | 
| 833 | 0 |                 fprintf(stderr, "NSS-POLICY-INFO: %s is enabled for CERT-SIGNATURE\n", algOpt->name); | 
| 834 | 0 |             } | 
| 835 | 0 |             if (anyEnabled) { | 
| 836 | 0 |                 ++enabledCount[i]; | 
| 837 | 0 |             } | 
| 838 | 0 |         } | 
| 839 | 0 |     } | 
| 840 | 0 |     fprintf(stderr, "NSS-POLICY-%s: NUMBER-OF-SSL-ALG-KX: %u\n", num_kx_enabled ? sInfo : sWarn, num_kx_enabled); | 
| 841 | 0 |     fprintf(stderr, "NSS-POLICY-%s: NUMBER-OF-SSL-ALG: %u\n", num_ssl_enabled ? sInfo : sWarn, num_ssl_enabled); | 
| 842 | 0 |     fprintf(stderr, "NSS-POLICY-%s: NUMBER-OF-CERT-SIG: %u\n", num_sig_enabled ? sInfo : sWarn, num_sig_enabled); | 
| 843 | 0 |     if (!num_kx_enabled || !num_ssl_enabled || !num_sig_enabled) { | 
| 844 | 0 |         haveWarning = PR_TRUE; | 
| 845 | 0 |     } | 
| 846 | 0 |     for (i = 0; i < PR_ARRAY_SIZE(algOptLists); i++) { | 
| 847 | 0 |         const algListsDef *algOptList = &algOptLists[i]; | 
| 848 | 0 |         fprintf(stderr, "NSS-POLICY-%s: NUMBER-OF-%s: %u\n", enabledCount[i] ? sInfo : sWarn, algOptList->description, enabledCount[i]); | 
| 849 | 0 |         if (!enabledCount[i] && !algOptList->allowEmpty) { | 
| 850 | 0 |             haveWarning = PR_TRUE; | 
| 851 | 0 |         } | 
| 852 | 0 |     } | 
| 853 | 0 |     if (haveWarning) { | 
| 854 | 0 |         PR_SetEnv("NSS_POLICY_WARN=1"); | 
| 855 | 0 |     } | 
| 856 | 0 | } | 
| 857 |  |  | 
| 858 |  | static SECStatus | 
| 859 |  | secmod_parseCryptoPolicy(const char *policyConfig, PRBool printPolicyFeedback, | 
| 860 |  |                          PRUint32 policyCheckFlags) | 
| 861 | 19.0k | { | 
| 862 | 19.0k |     char *args; | 
| 863 | 19.0k |     SECStatus rv; | 
| 864 |  |  | 
| 865 | 19.0k |     if (policyConfig == NULL) { | 
| 866 | 19.0k |         return SECSuccess; /* no policy given */ | 
| 867 | 19.0k |     } | 
| 868 |  |     /* make sure we initialize the oid table and set all the default policy | 
| 869 |  |      * values first so we can override them here */ | 
| 870 | 0 |     rv = SECOID_Init(); | 
| 871 | 0 |     if (rv != SECSuccess) { | 
| 872 | 0 |         return rv; | 
| 873 | 0 |     } | 
| 874 | 0 |     args = NSSUTIL_ArgGetParamValue("disallow", policyConfig); | 
| 875 | 0 |     rv = secmod_applyCryptoPolicy(args, NSS_DISALLOW, printPolicyFeedback, | 
| 876 | 0 |                                   policyCheckFlags); | 
| 877 | 0 |     if (args) | 
| 878 | 0 |         PORT_Free(args); | 
| 879 | 0 |     if (rv != SECSuccess) { | 
| 880 | 0 |         return rv; | 
| 881 | 0 |     } | 
| 882 | 0 |     args = NSSUTIL_ArgGetParamValue("allow", policyConfig); | 
| 883 | 0 |     rv = secmod_applyCryptoPolicy(args, NSS_ALLOW, printPolicyFeedback, | 
| 884 | 0 |                                   policyCheckFlags); | 
| 885 | 0 |     if (args) | 
| 886 | 0 |         PORT_Free(args); | 
| 887 | 0 |     if (rv != SECSuccess) { | 
| 888 | 0 |         return rv; | 
| 889 | 0 |     } | 
| 890 | 0 |     args = NSSUTIL_ArgGetParamValue("disable", policyConfig); | 
| 891 | 0 |     rv = secmod_applyCryptoPolicy(args, NSS_DISABLE, printPolicyFeedback, | 
| 892 | 0 |                                   policyCheckFlags); | 
| 893 | 0 |     if (args) | 
| 894 | 0 |         PORT_Free(args); | 
| 895 | 0 |     if (rv != SECSuccess) { | 
| 896 | 0 |         return rv; | 
| 897 | 0 |     } | 
| 898 | 0 |     args = NSSUTIL_ArgGetParamValue("enable", policyConfig); | 
| 899 | 0 |     rv = secmod_applyCryptoPolicy(args, NSS_ENABLE, printPolicyFeedback, | 
| 900 | 0 |                                   policyCheckFlags); | 
| 901 | 0 |     if (args) | 
| 902 | 0 |         PORT_Free(args); | 
| 903 | 0 |     if (rv != SECSuccess) { | 
| 904 | 0 |         return rv; | 
| 905 | 0 |     } | 
| 906 |  |     /* this has to be last. Everything after this will be a noop */ | 
| 907 | 0 |     if (NSSUTIL_ArgHasFlag("flags", "ssl-lock", policyConfig)) { | 
| 908 | 0 |         PRInt32 locks; | 
| 909 |  |         /* don't overwrite other (future) lock flags */ | 
| 910 | 0 |         rv = NSS_OptionGet(NSS_DEFAULT_LOCKS, &locks); | 
| 911 | 0 |         if (rv == SECSuccess) { | 
| 912 | 0 |             rv = NSS_OptionSet(NSS_DEFAULT_LOCKS, locks | NSS_DEFAULT_SSL_LOCK); | 
| 913 | 0 |         } | 
| 914 | 0 |         if (rv != SECSuccess) { | 
| 915 | 0 |             return rv; | 
| 916 | 0 |         } | 
| 917 | 0 |     } | 
| 918 | 0 |     if (NSSUTIL_ArgHasFlag("flags", "policy-lock", policyConfig)) { | 
| 919 | 0 |         NSS_LockPolicy(); | 
| 920 | 0 |     } | 
| 921 | 0 |     if (printPolicyFeedback) { | 
| 922 |  |         /* This helps to distinguish configurations that don't contain any | 
| 923 |  |          * policy config= statement. */ | 
| 924 | 0 |         PR_SetEnv("NSS_POLICY_LOADED=1"); | 
| 925 | 0 |         fprintf(stderr, "NSS-POLICY-INFO: LOADED-SUCCESSFULLY\n"); | 
| 926 | 0 |         secmod_sanityCheckCryptoPolicy(); | 
| 927 | 0 |     } | 
| 928 | 0 |     return rv; | 
| 929 | 0 | } | 
| 930 |  |  | 
| 931 |  | static PRUint32 | 
| 932 |  | secmod_parsePolicyCheckFlags(const char *nss) | 
| 933 | 38.0k | { | 
| 934 | 38.0k |     PRUint32 policyCheckFlags = 0; | 
| 935 |  |  | 
| 936 | 38.0k |     if (NSSUTIL_ArgHasFlag("flags", "policyCheckIdentifier", nss)) { | 
| 937 | 0 |         policyCheckFlags |= SECMOD_FLAG_POLICY_CHECK_IDENTIFIER; | 
| 938 | 0 |     } | 
| 939 |  |  | 
| 940 | 38.0k |     if (NSSUTIL_ArgHasFlag("flags", "policyCheckValue", nss)) { | 
| 941 | 0 |         policyCheckFlags |= SECMOD_FLAG_POLICY_CHECK_VALUE; | 
| 942 | 0 |     } | 
| 943 |  |  | 
| 944 | 38.0k |     return policyCheckFlags; | 
| 945 | 38.0k | } | 
| 946 |  |  | 
| 947 |  | /* | 
| 948 |  |  * for 3.4 we continue to use the old SECMODModule structure | 
| 949 |  |  */ | 
| 950 |  | SECMODModule * | 
| 951 |  | SECMOD_CreateModuleEx(const char *library, const char *moduleName, | 
| 952 |  |                       const char *parameters, const char *nss, | 
| 953 |  |                       const char *config) | 
| 954 | 19.0k | { | 
| 955 | 19.0k |     SECMODModule *mod; | 
| 956 | 19.0k |     SECStatus rv; | 
| 957 | 19.0k |     char *slotParams, *ciphers; | 
| 958 | 19.0k |     PRBool printPolicyFeedback = NSSUTIL_ArgHasFlag("flags", "printPolicyFeedback", nss); | 
| 959 | 19.0k |     PRUint32 policyCheckFlags = secmod_parsePolicyCheckFlags(nss); | 
| 960 |  |  | 
| 961 | 19.0k |     rv = secmod_parseCryptoPolicy(config, printPolicyFeedback, policyCheckFlags); | 
| 962 |  |  | 
| 963 |  |     /* do not load the module if policy parsing fails */ | 
| 964 | 19.0k |     if (rv != SECSuccess) { | 
| 965 | 0 |         if (printPolicyFeedback) { | 
| 966 | 0 |             PR_SetEnv("NSS_POLICY_FAIL=1"); | 
| 967 | 0 |             fprintf(stderr, "NSS-POLICY-FAIL: policy config parsing failed, not loading module %s\n", moduleName); | 
| 968 | 0 |         } | 
| 969 | 0 |         return NULL; | 
| 970 | 0 |     } | 
| 971 |  |  | 
| 972 | 19.0k |     mod = secmod_NewModule(); | 
| 973 | 19.0k |     if (mod == NULL) | 
| 974 | 0 |         return NULL; | 
| 975 |  |  | 
| 976 | 19.0k |     mod->commonName = PORT_ArenaStrdup(mod->arena, moduleName ? moduleName : ""); | 
| 977 | 19.0k |     if (library) { | 
| 978 | 0 |         mod->dllName = PORT_ArenaStrdup(mod->arena, library); | 
| 979 | 0 |     } | 
| 980 |  |     /* new field */ | 
| 981 | 19.0k |     if (parameters) { | 
| 982 | 19.0k |         mod->libraryParams = PORT_ArenaStrdup(mod->arena, parameters); | 
| 983 | 19.0k |     } | 
| 984 |  |  | 
| 985 | 19.0k |     mod->internal = NSSUTIL_ArgHasFlag("flags", "internal", nss); | 
| 986 | 19.0k |     mod->isFIPS = NSSUTIL_ArgHasFlag("flags", "FIPS", nss); | 
| 987 |  |     /* if the system FIPS mode is enabled, force FIPS to be on */ | 
| 988 | 19.0k |     if (SECMOD_GetSystemFIPSEnabled()) { | 
| 989 | 0 |         mod->isFIPS = PR_TRUE; | 
| 990 | 0 |     } | 
| 991 | 19.0k |     mod->isCritical = NSSUTIL_ArgHasFlag("flags", "critical", nss); | 
| 992 | 19.0k |     slotParams = NSSUTIL_ArgGetParamValue("slotParams", nss); | 
| 993 | 19.0k |     mod->slotInfo = NSSUTIL_ArgParseSlotInfo(mod->arena, slotParams, | 
| 994 | 19.0k |                                              &mod->slotInfoCount); | 
| 995 | 19.0k |     if (slotParams) | 
| 996 | 9.52k |         PORT_Free(slotParams); | 
| 997 |  |     /* new field */ | 
| 998 | 19.0k |     mod->trustOrder = NSSUTIL_ArgReadLong("trustOrder", nss, | 
| 999 | 19.0k |                                           NSSUTIL_DEFAULT_TRUST_ORDER, NULL); | 
| 1000 |  |     /* new field */ | 
| 1001 | 19.0k |     mod->cipherOrder = NSSUTIL_ArgReadLong("cipherOrder", nss, | 
| 1002 | 19.0k |                                            NSSUTIL_DEFAULT_CIPHER_ORDER, NULL); | 
| 1003 |  |     /* new field */ | 
| 1004 | 19.0k |     mod->isModuleDB = NSSUTIL_ArgHasFlag("flags", "moduleDB", nss); | 
| 1005 | 19.0k |     mod->moduleDBOnly = NSSUTIL_ArgHasFlag("flags", "moduleDBOnly", nss); | 
| 1006 | 19.0k |     if (mod->moduleDBOnly) | 
| 1007 | 9.52k |         mod->isModuleDB = PR_TRUE; | 
| 1008 |  |  | 
| 1009 |  |     /* we need more bits, but we also want to preserve binary compatibility | 
| 1010 |  |      * so we overload the isModuleDB PRBool with additional flags. | 
| 1011 |  |      * These flags are only valid if mod->isModuleDB is already set. | 
| 1012 |  |      * NOTE: this depends on the fact that PRBool is at least a char on | 
| 1013 |  |      * all platforms. These flags are only valid if moduleDB is set, so | 
| 1014 |  |      * code checking if (mod->isModuleDB) will continue to work correctly. */ | 
| 1015 | 19.0k |     if (mod->isModuleDB) { | 
| 1016 | 9.52k |         char flags = SECMOD_FLAG_MODULE_DB_IS_MODULE_DB; | 
| 1017 | 9.52k |         if (NSSUTIL_ArgHasFlag("flags", "skipFirst", nss)) { | 
| 1018 | 0 |             flags |= SECMOD_FLAG_MODULE_DB_SKIP_FIRST; | 
| 1019 | 0 |         } | 
| 1020 | 9.52k |         if (NSSUTIL_ArgHasFlag("flags", "defaultModDB", nss)) { | 
| 1021 | 9.52k |             flags |= SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB; | 
| 1022 | 9.52k |         } | 
| 1023 | 9.52k |         if (NSSUTIL_ArgHasFlag("flags", "policyOnly", nss)) { | 
| 1024 | 0 |             flags |= SECMOD_FLAG_MODULE_DB_POLICY_ONLY; | 
| 1025 | 0 |         } | 
| 1026 |  |         /* additional moduleDB flags could be added here in the future */ | 
| 1027 | 9.52k |         mod->isModuleDB = (PRBool)flags; | 
| 1028 | 9.52k |     } | 
| 1029 |  |  | 
| 1030 | 19.0k |     if (mod->internal) { | 
| 1031 | 19.0k |         char flags = SECMOD_FLAG_INTERNAL_IS_INTERNAL; | 
| 1032 |  |  | 
| 1033 | 19.0k |         if (NSSUTIL_ArgHasFlag("flags", "internalKeySlot", nss)) { | 
| 1034 | 9.52k |             flags |= SECMOD_FLAG_INTERNAL_KEY_SLOT; | 
| 1035 | 9.52k |         } | 
| 1036 | 19.0k |         mod->internal = (PRBool)flags; | 
| 1037 | 19.0k |     } | 
| 1038 |  |  | 
| 1039 | 19.0k |     ciphers = NSSUTIL_ArgGetParamValue("ciphers", nss); | 
| 1040 | 19.0k |     NSSUTIL_ArgParseCipherFlags(&mod->ssl[0], ciphers); | 
| 1041 | 19.0k |     if (ciphers) | 
| 1042 | 0 |         PORT_Free(ciphers); | 
| 1043 |  |  | 
| 1044 | 19.0k |     secmod_PrivateModuleCount++; | 
| 1045 |  |  | 
| 1046 | 19.0k |     return mod; | 
| 1047 | 19.0k | } | 
| 1048 |  |  | 
| 1049 |  | PRBool | 
| 1050 |  | SECMOD_GetSkipFirstFlag(SECMODModule *mod) | 
| 1051 | 9.52k | { | 
| 1052 | 9.52k |     char flags = (char)mod->isModuleDB; | 
| 1053 |  |  | 
| 1054 | 9.52k |     return (flags & SECMOD_FLAG_MODULE_DB_SKIP_FIRST) ? PR_TRUE : PR_FALSE; | 
| 1055 | 9.52k | } | 
| 1056 |  |  | 
| 1057 |  | PRBool | 
| 1058 |  | SECMOD_GetDefaultModDBFlag(SECMODModule *mod) | 
| 1059 | 0 | { | 
| 1060 | 0 |     char flags = (char)mod->isModuleDB; | 
| 1061 |  | 
 | 
| 1062 | 0 |     return (flags & SECMOD_FLAG_MODULE_DB_DEFAULT_MODDB) ? PR_TRUE : PR_FALSE; | 
| 1063 | 0 | } | 
| 1064 |  |  | 
| 1065 |  | PRBool | 
| 1066 |  | secmod_PolicyOnly(SECMODModule *mod) | 
| 1067 | 19.0k | { | 
| 1068 | 19.0k |     char flags = (char)mod->isModuleDB; | 
| 1069 |  |  | 
| 1070 | 19.0k |     return (flags & SECMOD_FLAG_MODULE_DB_POLICY_ONLY) ? PR_TRUE : PR_FALSE; | 
| 1071 | 19.0k | } | 
| 1072 |  |  | 
| 1073 |  | PRBool | 
| 1074 |  | secmod_IsInternalKeySlot(SECMODModule *mod) | 
| 1075 | 28.5k | { | 
| 1076 | 28.5k |     char flags = (char)mod->internal; | 
| 1077 |  |  | 
| 1078 | 28.5k |     return (flags & SECMOD_FLAG_INTERNAL_KEY_SLOT) ? PR_TRUE : PR_FALSE; | 
| 1079 | 28.5k | } | 
| 1080 |  |  | 
| 1081 |  | void | 
| 1082 |  | secmod_SetInternalKeySlotFlag(SECMODModule *mod, PRBool val) | 
| 1083 | 0 | { | 
| 1084 | 0 |     char flags = (char)mod->internal; | 
| 1085 |  | 
 | 
| 1086 | 0 |     if (val) { | 
| 1087 | 0 |         flags |= SECMOD_FLAG_INTERNAL_KEY_SLOT; | 
| 1088 | 0 |     } else { | 
| 1089 | 0 |         flags &= ~SECMOD_FLAG_INTERNAL_KEY_SLOT; | 
| 1090 | 0 |     } | 
| 1091 | 0 |     mod->internal = flags; | 
| 1092 | 0 | } | 
| 1093 |  |  | 
| 1094 |  | /* | 
| 1095 |  |  * copy desc and value into target. Target is known to be big enough to | 
| 1096 |  |  * hold desc +2 +value, which is good because the result of this will be | 
| 1097 |  |  * *desc"*value". We may, however, have to add some escapes for special | 
| 1098 |  |  * characters imbedded into value (rare). This string potentially comes from | 
| 1099 |  |  * a user, so we don't want the user overflowing the target buffer by using | 
| 1100 |  |  * excessive escapes. To prevent this we count the escapes we need to add and | 
| 1101 |  |  * try to expand the buffer with Realloc. | 
| 1102 |  |  */ | 
| 1103 |  | static char * | 
| 1104 |  | secmod_doDescCopy(char *target, char **base, int *baseLen, | 
| 1105 |  |                   const char *desc, int descLen, char *value) | 
| 1106 | 0 | { | 
| 1107 | 0 |     int diff, esc_len; | 
| 1108 |  | 
 | 
| 1109 | 0 |     esc_len = NSSUTIL_EscapeSize(value, '\"') - 1; | 
| 1110 | 0 |     diff = esc_len - strlen(value); | 
| 1111 | 0 |     if (diff > 0) { | 
| 1112 |  |         /* we need to escape... expand newSpecPtr as well to make sure | 
| 1113 |  |          * we don't overflow it */ | 
| 1114 | 0 |         int offset = target - *base; | 
| 1115 | 0 |         char *newPtr = PORT_Realloc(*base, *baseLen + diff); | 
| 1116 | 0 |         if (!newPtr) { | 
| 1117 | 0 |             return target; /* not enough space, just drop the whole copy */ | 
| 1118 | 0 |         } | 
| 1119 | 0 |         *baseLen += diff; | 
| 1120 | 0 |         target = newPtr + offset; | 
| 1121 | 0 |         *base = newPtr; | 
| 1122 | 0 |         value = NSSUTIL_Escape(value, '\"'); | 
| 1123 | 0 |         if (value == NULL) { | 
| 1124 | 0 |             return target; /* couldn't escape value, just drop the copy */ | 
| 1125 | 0 |         } | 
| 1126 | 0 |     } | 
| 1127 | 0 |     PORT_Memcpy(target, desc, descLen); | 
| 1128 | 0 |     target += descLen; | 
| 1129 | 0 |     *target++ = '\"'; | 
| 1130 | 0 |     PORT_Memcpy(target, value, esc_len); | 
| 1131 | 0 |     target += esc_len; | 
| 1132 | 0 |     *target++ = '\"'; | 
| 1133 | 0 |     if (diff > 0) { | 
| 1134 | 0 |         PORT_Free(value); | 
| 1135 | 0 |     } | 
| 1136 | 0 |     return target; | 
| 1137 | 0 | } | 
| 1138 |  |  | 
| 1139 |  | #define SECMOD_SPEC_COPY(new, start, end) \ | 
| 1140 | 0 |     if (end > start) {                    \ | 
| 1141 | 0 |         int _cnt = end - start;           \ | 
| 1142 | 0 |         PORT_Memcpy(new, start, _cnt);    \ | 
| 1143 | 0 |         new += _cnt;                      \ | 
| 1144 | 0 |     } | 
| 1145 |  | #define SECMOD_TOKEN_DESCRIPTION "tokenDescription=" | 
| 1146 |  | #define SECMOD_SLOT_DESCRIPTION "slotDescription=" | 
| 1147 |  |  | 
| 1148 |  | /* | 
| 1149 |  |  * Find any tokens= values in the module spec. | 
| 1150 |  |  * Always return a new spec which does not have any tokens= arguments. | 
| 1151 |  |  * If tokens= arguments are found, Split the the various tokens defined into | 
| 1152 |  |  * an array of child specs to return. | 
| 1153 |  |  * | 
| 1154 |  |  * Caller is responsible for freeing the child spec and the new token | 
| 1155 |  |  * spec. | 
| 1156 |  |  */ | 
| 1157 |  | char * | 
| 1158 |  | secmod_ParseModuleSpecForTokens(PRBool convert, PRBool isFIPS, | 
| 1159 |  |                                 const char *moduleSpec, char ***children, | 
| 1160 |  |                                 CK_SLOT_ID **ids) | 
| 1161 | 0 | { | 
| 1162 | 0 |     int newSpecLen = PORT_Strlen(moduleSpec) + 2; | 
| 1163 | 0 |     char *newSpec = PORT_Alloc(newSpecLen); | 
| 1164 | 0 |     char *newSpecPtr = newSpec; | 
| 1165 | 0 |     const char *modulePrev = moduleSpec; | 
| 1166 | 0 |     char *target = NULL; | 
| 1167 | 0 |     char *tmp = NULL; | 
| 1168 | 0 |     char **childArray = NULL; | 
| 1169 | 0 |     const char *tokenIndex; | 
| 1170 | 0 |     CK_SLOT_ID *idArray = NULL; | 
| 1171 | 0 |     int tokenCount = 0; | 
| 1172 | 0 |     int i; | 
| 1173 |  | 
 | 
| 1174 | 0 |     if (newSpec == NULL) { | 
| 1175 | 0 |         return NULL; | 
| 1176 | 0 |     } | 
| 1177 |  |  | 
| 1178 | 0 |     *children = NULL; | 
| 1179 | 0 |     if (ids) { | 
| 1180 | 0 |         *ids = NULL; | 
| 1181 | 0 |     } | 
| 1182 | 0 |     moduleSpec = NSSUTIL_ArgStrip(moduleSpec); | 
| 1183 | 0 |     SECMOD_SPEC_COPY(newSpecPtr, modulePrev, moduleSpec); | 
| 1184 |  |  | 
| 1185 |  |     /* Notes on 'convert' and 'isFIPS' flags: The base parameters for opening | 
| 1186 |  |      * a new softoken module takes the following parameters to name the | 
| 1187 |  |      * various tokens: | 
| 1188 |  |      * | 
| 1189 |  |      *  cryptoTokenDescription: name of the non-fips crypto token. | 
| 1190 |  |      *  cryptoSlotDescription: name of the non-fips crypto slot. | 
| 1191 |  |      *  dbTokenDescription: name of the non-fips db token. | 
| 1192 |  |      *  dbSlotDescription: name of the non-fips db slot. | 
| 1193 |  |      *  FIPSTokenDescription: name of the fips db/crypto token. | 
| 1194 |  |      *  FIPSSlotDescription: name of the fips db/crypto slot. | 
| 1195 |  |      * | 
| 1196 |  |      * if we are opening a new slot, we need to have the following | 
| 1197 |  |      * parameters: | 
| 1198 |  |      *  tokenDescription: name of the token. | 
| 1199 |  |      *  slotDescription: name of the slot. | 
| 1200 |  |      * | 
| 1201 |  |      * | 
| 1202 |  |      * The convert flag tells us to drop the unnecessary *TokenDescription | 
| 1203 |  |      * and *SlotDescription arguments and convert the appropriate pair | 
| 1204 |  |      * (either db or FIPS based on the isFIPS flag) to tokenDescription and | 
| 1205 |  |      * slotDescription). | 
| 1206 |  |      */ | 
| 1207 |  |     /* | 
| 1208 |  |      * walk down the list. if we find a tokens= argument, save it, | 
| 1209 |  |      * otherise copy the argument. | 
| 1210 |  |      */ | 
| 1211 | 0 |     while (*moduleSpec) { | 
| 1212 | 0 |         int next; | 
| 1213 | 0 |         modulePrev = moduleSpec; | 
| 1214 | 0 |         NSSUTIL_HANDLE_STRING_ARG(moduleSpec, target, "tokens=", | 
| 1215 | 0 |                                   modulePrev = moduleSpec; | 
| 1216 | 0 |                                   /* skip copying */) | 
| 1217 | 0 |         NSSUTIL_HANDLE_STRING_ARG( | 
| 1218 | 0 |             moduleSpec, tmp, "cryptoTokenDescription=", | 
| 1219 | 0 |             if (convert) { modulePrev = moduleSpec; }) | 
| 1220 | 0 |         NSSUTIL_HANDLE_STRING_ARG( | 
| 1221 | 0 |             moduleSpec, tmp, "cryptoSlotDescription=", | 
| 1222 | 0 |             if (convert) { modulePrev = moduleSpec; }) | 
| 1223 | 0 |         NSSUTIL_HANDLE_STRING_ARG( | 
| 1224 | 0 |             moduleSpec, tmp, "dbTokenDescription=", | 
| 1225 | 0 |             if (convert) { | 
| 1226 | 0 |                 modulePrev = moduleSpec; | 
| 1227 | 0 |                 if (!isFIPS) { | 
| 1228 | 0 |                     newSpecPtr = secmod_doDescCopy(newSpecPtr, | 
| 1229 | 0 |                                                    &newSpec, &newSpecLen, | 
| 1230 | 0 |                                                    SECMOD_TOKEN_DESCRIPTION, | 
| 1231 | 0 |                                                    sizeof(SECMOD_TOKEN_DESCRIPTION) - 1, | 
| 1232 | 0 |                                                    tmp); | 
| 1233 | 0 |                 } | 
| 1234 | 0 |             }) | 
| 1235 | 0 |         NSSUTIL_HANDLE_STRING_ARG( | 
| 1236 | 0 |             moduleSpec, tmp, "dbSlotDescription=", | 
| 1237 | 0 |             if (convert) { | 
| 1238 | 0 |                 modulePrev = moduleSpec; /* skip copying */ | 
| 1239 | 0 |                 if (!isFIPS) { | 
| 1240 | 0 |                     newSpecPtr = secmod_doDescCopy(newSpecPtr, | 
| 1241 | 0 |                                                    &newSpec, &newSpecLen, | 
| 1242 | 0 |                                                    SECMOD_SLOT_DESCRIPTION, | 
| 1243 | 0 |                                                    sizeof(SECMOD_SLOT_DESCRIPTION) - 1, | 
| 1244 | 0 |                                                    tmp); | 
| 1245 | 0 |                 } | 
| 1246 | 0 |             }) | 
| 1247 | 0 |         NSSUTIL_HANDLE_STRING_ARG( | 
| 1248 | 0 |             moduleSpec, tmp, "FIPSTokenDescription=", | 
| 1249 | 0 |             if (convert) { | 
| 1250 | 0 |                 modulePrev = moduleSpec; /* skip copying */ | 
| 1251 | 0 |                 if (isFIPS) { | 
| 1252 | 0 |                     newSpecPtr = secmod_doDescCopy(newSpecPtr, | 
| 1253 | 0 |                                                    &newSpec, &newSpecLen, | 
| 1254 | 0 |                                                    SECMOD_TOKEN_DESCRIPTION, | 
| 1255 | 0 |                                                    sizeof(SECMOD_TOKEN_DESCRIPTION) - 1, | 
| 1256 | 0 |                                                    tmp); | 
| 1257 | 0 |                 } | 
| 1258 | 0 |             }) | 
| 1259 | 0 |         NSSUTIL_HANDLE_STRING_ARG( | 
| 1260 | 0 |             moduleSpec, tmp, "FIPSSlotDescription=", | 
| 1261 | 0 |             if (convert) { | 
| 1262 | 0 |                 modulePrev = moduleSpec; /* skip copying */ | 
| 1263 | 0 |                 if (isFIPS) { | 
| 1264 | 0 |                     newSpecPtr = secmod_doDescCopy(newSpecPtr, | 
| 1265 | 0 |                                                    &newSpec, &newSpecLen, | 
| 1266 | 0 |                                                    SECMOD_SLOT_DESCRIPTION, | 
| 1267 | 0 |                                                    sizeof(SECMOD_SLOT_DESCRIPTION) - 1, | 
| 1268 | 0 |                                                    tmp); | 
| 1269 | 0 |                 } | 
| 1270 | 0 |             }) | 
| 1271 | 0 |         NSSUTIL_HANDLE_FINAL_ARG(moduleSpec) | 
| 1272 | 0 |         SECMOD_SPEC_COPY(newSpecPtr, modulePrev, moduleSpec); | 
| 1273 | 0 |     } | 
| 1274 | 0 |     if (tmp) { | 
| 1275 | 0 |         PORT_Free(tmp); | 
| 1276 | 0 |         tmp = NULL; | 
| 1277 | 0 |     } | 
| 1278 | 0 |     *newSpecPtr = 0; | 
| 1279 |  |  | 
| 1280 |  |     /* no target found, return the newSpec */ | 
| 1281 | 0 |     if (target == NULL) { | 
| 1282 | 0 |         return newSpec; | 
| 1283 | 0 |     } | 
| 1284 |  |  | 
| 1285 |  |     /* now build the child array from target */ | 
| 1286 |  |     /*first count them */ | 
| 1287 | 0 |     for (tokenIndex = NSSUTIL_ArgStrip(target); *tokenIndex; | 
| 1288 | 0 |          tokenIndex = NSSUTIL_ArgStrip(NSSUTIL_ArgSkipParameter(tokenIndex))) { | 
| 1289 | 0 |         tokenCount++; | 
| 1290 | 0 |     } | 
| 1291 |  | 
 | 
| 1292 | 0 |     childArray = PORT_NewArray(char *, tokenCount + 1); | 
| 1293 | 0 |     if (childArray == NULL) { | 
| 1294 |  |         /* just return the spec as is then */ | 
| 1295 | 0 |         PORT_Free(target); | 
| 1296 | 0 |         return newSpec; | 
| 1297 | 0 |     } | 
| 1298 | 0 |     if (ids) { | 
| 1299 | 0 |         idArray = PORT_NewArray(CK_SLOT_ID, tokenCount + 1); | 
| 1300 | 0 |         if (idArray == NULL) { | 
| 1301 | 0 |             PORT_Free(childArray); | 
| 1302 | 0 |             PORT_Free(target); | 
| 1303 | 0 |             return newSpec; | 
| 1304 | 0 |         } | 
| 1305 | 0 |     } | 
| 1306 |  |  | 
| 1307 |  |     /* now fill them in */ | 
| 1308 | 0 |     for (tokenIndex = NSSUTIL_ArgStrip(target), i = 0; | 
| 1309 | 0 |          *tokenIndex && (i < tokenCount); | 
| 1310 | 0 |          tokenIndex = NSSUTIL_ArgStrip(tokenIndex)) { | 
| 1311 | 0 |         int next; | 
| 1312 | 0 |         char *name = NSSUTIL_ArgGetLabel(tokenIndex, &next); | 
| 1313 | 0 |         tokenIndex += next; | 
| 1314 |  | 
 | 
| 1315 | 0 |         if (idArray) { | 
| 1316 | 0 |             idArray[i] = NSSUTIL_ArgDecodeNumber(name); | 
| 1317 | 0 |         } | 
| 1318 |  | 
 | 
| 1319 | 0 |         PORT_Free(name); /* drop the explicit number */ | 
| 1320 |  |  | 
| 1321 |  |         /* if anything is left, copy the args to the child array */ | 
| 1322 | 0 |         if (!NSSUTIL_ArgIsBlank(*tokenIndex)) { | 
| 1323 | 0 |             childArray[i++] = NSSUTIL_ArgFetchValue(tokenIndex, &next); | 
| 1324 | 0 |             tokenIndex += next; | 
| 1325 | 0 |         } | 
| 1326 | 0 |     } | 
| 1327 |  | 
 | 
| 1328 | 0 |     PORT_Free(target); | 
| 1329 | 0 |     childArray[i] = 0; | 
| 1330 | 0 |     if (idArray) { | 
| 1331 | 0 |         idArray[i] = 0; | 
| 1332 | 0 |     } | 
| 1333 |  |  | 
| 1334 |  |     /* return it */ | 
| 1335 | 0 |     *children = childArray; | 
| 1336 | 0 |     if (ids) { | 
| 1337 | 0 |         *ids = idArray; | 
| 1338 | 0 |     } | 
| 1339 | 0 |     return newSpec; | 
| 1340 | 0 | } | 
| 1341 |  |  | 
| 1342 |  | /* get the database and flags from the spec */ | 
| 1343 |  | static char * | 
| 1344 |  | secmod_getConfigDir(const char *spec, char **certPrefix, char **keyPrefix, | 
| 1345 |  |                     PRBool *readOnly) | 
| 1346 | 0 | { | 
| 1347 | 0 |     char *config = NULL; | 
| 1348 |  | 
 | 
| 1349 | 0 |     *certPrefix = NULL; | 
| 1350 | 0 |     *keyPrefix = NULL; | 
| 1351 | 0 |     *readOnly = NSSUTIL_ArgHasFlag("flags", "readOnly", spec); | 
| 1352 | 0 |     if (NSSUTIL_ArgHasFlag("flags", "nocertdb", spec) || | 
| 1353 | 0 |         NSSUTIL_ArgHasFlag("flags", "nokeydb", spec)) { | 
| 1354 | 0 |         return NULL; | 
| 1355 | 0 |     } | 
| 1356 |  |  | 
| 1357 | 0 |     spec = NSSUTIL_ArgStrip(spec); | 
| 1358 | 0 |     while (*spec) { | 
| 1359 | 0 |         int next; | 
| 1360 | 0 |         NSSUTIL_HANDLE_STRING_ARG(spec, config, "configdir=", ;) | 
| 1361 | 0 |         NSSUTIL_HANDLE_STRING_ARG(spec, *certPrefix, "certPrefix=", ;) | 
| 1362 | 0 |         NSSUTIL_HANDLE_STRING_ARG(spec, *keyPrefix, "keyPrefix=", ;) | 
| 1363 | 0 |         NSSUTIL_HANDLE_FINAL_ARG(spec) | 
| 1364 | 0 |     } | 
| 1365 | 0 |     return config; | 
| 1366 | 0 | } | 
| 1367 |  |  | 
| 1368 |  | struct SECMODConfigListStr { | 
| 1369 |  |     char *config; | 
| 1370 |  |     char *certPrefix; | 
| 1371 |  |     char *keyPrefix; | 
| 1372 |  |     PRBool isReadOnly; | 
| 1373 |  | }; | 
| 1374 |  |  | 
| 1375 |  | /* | 
| 1376 |  |  * return an array of already openned databases from a spec list. | 
| 1377 |  |  */ | 
| 1378 |  | SECMODConfigList * | 
| 1379 |  | secmod_GetConfigList(PRBool isFIPS, char *spec, int *count) | 
| 1380 | 0 | { | 
| 1381 | 0 |     char **children; | 
| 1382 | 0 |     CK_SLOT_ID *ids; | 
| 1383 | 0 |     char *strippedSpec; | 
| 1384 | 0 |     int childCount; | 
| 1385 | 0 |     SECMODConfigList *conflist = NULL; | 
| 1386 | 0 |     int i; | 
| 1387 |  | 
 | 
| 1388 | 0 |     strippedSpec = secmod_ParseModuleSpecForTokens(PR_TRUE, isFIPS, | 
| 1389 | 0 |                                                    spec, &children, &ids); | 
| 1390 | 0 |     if (strippedSpec == NULL) { | 
| 1391 | 0 |         return NULL; | 
| 1392 | 0 |     } | 
| 1393 |  |  | 
| 1394 | 0 |     for (childCount = 0; children && children[childCount]; childCount++) | 
| 1395 | 0 |         ; | 
| 1396 | 0 |     *count = childCount + 1; /* include strippedSpec */ | 
| 1397 | 0 |     conflist = PORT_NewArray(SECMODConfigList, *count); | 
| 1398 | 0 |     if (conflist == NULL) { | 
| 1399 | 0 |         *count = 0; | 
| 1400 | 0 |         goto loser; | 
| 1401 | 0 |     } | 
| 1402 |  |  | 
| 1403 | 0 |     conflist[0].config = secmod_getConfigDir(strippedSpec, | 
| 1404 | 0 |                                              &conflist[0].certPrefix, | 
| 1405 | 0 |                                              &conflist[0].keyPrefix, | 
| 1406 | 0 |                                              &conflist[0].isReadOnly); | 
| 1407 | 0 |     for (i = 0; i < childCount; i++) { | 
| 1408 | 0 |         conflist[i + 1].config = secmod_getConfigDir(children[i], | 
| 1409 | 0 |                                                      &conflist[i + 1].certPrefix, | 
| 1410 | 0 |                                                      &conflist[i + 1].keyPrefix, | 
| 1411 | 0 |                                                      &conflist[i + 1].isReadOnly); | 
| 1412 | 0 |     } | 
| 1413 |  | 
 | 
| 1414 | 0 | loser: | 
| 1415 | 0 |     secmod_FreeChildren(children, ids); | 
| 1416 | 0 |     PORT_Free(strippedSpec); | 
| 1417 | 0 |     return conflist; | 
| 1418 | 0 | } | 
| 1419 |  |  | 
| 1420 |  | /* | 
| 1421 |  |  * determine if we are trying to open an old dbm database. For this test | 
| 1422 |  |  * RDB databases should return PR_FALSE. | 
| 1423 |  |  */ | 
| 1424 |  | static PRBool | 
| 1425 |  | secmod_configIsDBM(char *configDir) | 
| 1426 | 0 | { | 
| 1427 | 0 |     char *env; | 
| 1428 |  |  | 
| 1429 |  |     /* explicit dbm open */ | 
| 1430 | 0 |     if (strncmp(configDir, "dbm:", 4) == 0) { | 
| 1431 | 0 |         return PR_TRUE; | 
| 1432 | 0 |     } | 
| 1433 |  |     /* explicit open of a non-dbm database */ | 
| 1434 | 0 |     if ((strncmp(configDir, "sql:", 4) == 0) || | 
| 1435 | 0 |         (strncmp(configDir, "rdb:", 4) == 0) || | 
| 1436 | 0 |         (strncmp(configDir, "extern:", 7) == 0)) { | 
| 1437 | 0 |         return PR_FALSE; | 
| 1438 | 0 |     } | 
| 1439 | 0 |     env = PR_GetEnvSecure("NSS_DEFAULT_DB_TYPE"); | 
| 1440 |  |     /* implicit dbm open */ | 
| 1441 | 0 |     if ((env == NULL) || (strcmp(env, "dbm") == 0)) { | 
| 1442 | 0 |         return PR_TRUE; | 
| 1443 | 0 |     } | 
| 1444 |  |     /* implicit non-dbm open */ | 
| 1445 | 0 |     return PR_FALSE; | 
| 1446 | 0 | } | 
| 1447 |  |  | 
| 1448 |  | /* | 
| 1449 |  |  * match two prefixes. prefix may be NULL. NULL patches '\0' | 
| 1450 |  |  */ | 
| 1451 |  | static PRBool | 
| 1452 |  | secmod_matchPrefix(char *prefix1, char *prefix2) | 
| 1453 | 0 | { | 
| 1454 | 0 |     if ((prefix1 == NULL) || (*prefix1 == 0)) { | 
| 1455 | 0 |         if ((prefix2 == NULL) || (*prefix2 == 0)) { | 
| 1456 | 0 |             return PR_TRUE; | 
| 1457 | 0 |         } | 
| 1458 | 0 |         return PR_FALSE; | 
| 1459 | 0 |     } | 
| 1460 | 0 |     if (strcmp(prefix1, prefix2) == 0) { | 
| 1461 | 0 |         return PR_TRUE; | 
| 1462 | 0 |     } | 
| 1463 | 0 |     return PR_FALSE; | 
| 1464 | 0 | } | 
| 1465 |  |  | 
| 1466 |  | /* do two config paramters match? Not all callers are compariing | 
| 1467 |  |  * SECMODConfigLists directly, so this function breaks them out to their | 
| 1468 |  |  * components. */ | 
| 1469 |  | static PRBool | 
| 1470 |  | secmod_matchConfig(char *configDir1, char *configDir2, | 
| 1471 |  |                    char *certPrefix1, char *certPrefix2, | 
| 1472 |  |                    char *keyPrefix1, char *keyPrefix2, | 
| 1473 |  |                    PRBool isReadOnly1, PRBool isReadOnly2) | 
| 1474 | 0 | { | 
| 1475 |  |     /* TODO: Document the answer to the question: | 
| 1476 |  |      *       "Why not allow them to match if they are both NULL?" | 
| 1477 |  |      * See: https://bugzilla.mozilla.org/show_bug.cgi?id=1318633#c1 | 
| 1478 |  |      */ | 
| 1479 | 0 |     if ((configDir1 == NULL) || (configDir2 == NULL)) { | 
| 1480 | 0 |         return PR_FALSE; | 
| 1481 | 0 |     } | 
| 1482 | 0 |     if (strcmp(configDir1, configDir2) != 0) { | 
| 1483 | 0 |         return PR_FALSE; | 
| 1484 | 0 |     } | 
| 1485 | 0 |     if (!secmod_matchPrefix(certPrefix1, certPrefix2)) { | 
| 1486 | 0 |         return PR_FALSE; | 
| 1487 | 0 |     } | 
| 1488 | 0 |     if (!secmod_matchPrefix(keyPrefix1, keyPrefix2)) { | 
| 1489 | 0 |         return PR_FALSE; | 
| 1490 | 0 |     } | 
| 1491 |  |     /* these last test -- if we just need the DB open read only, | 
| 1492 |  |      * than any open will suffice, but if we requested it read/write | 
| 1493 |  |      * and it's only open read only, we need to open it again */ | 
| 1494 | 0 |     if (isReadOnly1) { | 
| 1495 | 0 |         return PR_TRUE; | 
| 1496 | 0 |     } | 
| 1497 | 0 |     if (isReadOnly2) { /* isReadonly1 == PR_FALSE */ | 
| 1498 | 0 |         return PR_FALSE; | 
| 1499 | 0 |     } | 
| 1500 | 0 |     return PR_TRUE; | 
| 1501 | 0 | } | 
| 1502 |  |  | 
| 1503 |  | /* | 
| 1504 |  |  * return true if we are requesting a database that is already openned. | 
| 1505 |  |  */ | 
| 1506 |  | PRBool | 
| 1507 |  | secmod_MatchConfigList(const char *spec, SECMODConfigList *conflist, int count) | 
| 1508 | 0 | { | 
| 1509 | 0 |     char *config; | 
| 1510 | 0 |     char *certPrefix; | 
| 1511 | 0 |     char *keyPrefix; | 
| 1512 | 0 |     PRBool isReadOnly; | 
| 1513 | 0 |     PRBool ret = PR_FALSE; | 
| 1514 | 0 |     int i; | 
| 1515 |  | 
 | 
| 1516 | 0 |     config = secmod_getConfigDir(spec, &certPrefix, &keyPrefix, &isReadOnly); | 
| 1517 | 0 |     if (!config) { | 
| 1518 | 0 |         goto done; | 
| 1519 | 0 |     } | 
| 1520 |  |  | 
| 1521 |  |     /* NOTE: we dbm isn't multiple open safe. If we open the same database | 
| 1522 |  |      * twice from two different locations, then we can corrupt our database | 
| 1523 |  |      * (the cache will be inconsistent). Protect against this by claiming | 
| 1524 |  |      * for comparison only that we are always openning dbm databases read only. | 
| 1525 |  |      */ | 
| 1526 | 0 |     if (secmod_configIsDBM(config)) { | 
| 1527 | 0 |         isReadOnly = 1; | 
| 1528 | 0 |     } | 
| 1529 | 0 |     for (i = 0; i < count; i++) { | 
| 1530 | 0 |         if (secmod_matchConfig(config, conflist[i].config, certPrefix, | 
| 1531 | 0 |                                conflist[i].certPrefix, keyPrefix, | 
| 1532 | 0 |                                conflist[i].keyPrefix, isReadOnly, | 
| 1533 | 0 |                                conflist[i].isReadOnly)) { | 
| 1534 | 0 |             ret = PR_TRUE; | 
| 1535 | 0 |             goto done; | 
| 1536 | 0 |         } | 
| 1537 | 0 |     } | 
| 1538 |  |  | 
| 1539 | 0 |     ret = PR_FALSE; | 
| 1540 | 0 | done: | 
| 1541 | 0 |     PORT_Free(config); | 
| 1542 | 0 |     PORT_Free(certPrefix); | 
| 1543 | 0 |     PORT_Free(keyPrefix); | 
| 1544 | 0 |     return ret; | 
| 1545 | 0 | } | 
| 1546 |  |  | 
| 1547 |  | /* | 
| 1548 |  |  * Find the slot id from the module spec. If the slot is the database slot, we | 
| 1549 |  |  * can get the slot id from the default database slot. | 
| 1550 |  |  */ | 
| 1551 |  | CK_SLOT_ID | 
| 1552 |  | secmod_GetSlotIDFromModuleSpec(const char *moduleSpec, SECMODModule *module) | 
| 1553 | 0 | { | 
| 1554 | 0 |     char *tmp_spec = NULL; | 
| 1555 | 0 |     char **children, **thisChild; | 
| 1556 | 0 |     CK_SLOT_ID *ids, *thisID, slotID = -1; | 
| 1557 | 0 |     char *inConfig = NULL, *thisConfig = NULL; | 
| 1558 | 0 |     char *inCertPrefix = NULL, *thisCertPrefix = NULL; | 
| 1559 | 0 |     char *inKeyPrefix = NULL, *thisKeyPrefix = NULL; | 
| 1560 | 0 |     PRBool inReadOnly, thisReadOnly; | 
| 1561 |  | 
 | 
| 1562 | 0 |     inConfig = secmod_getConfigDir(moduleSpec, &inCertPrefix, &inKeyPrefix, | 
| 1563 | 0 |                                    &inReadOnly); | 
| 1564 | 0 |     if (!inConfig) { | 
| 1565 | 0 |         goto done; | 
| 1566 | 0 |     } | 
| 1567 |  |  | 
| 1568 | 0 |     if (secmod_configIsDBM(inConfig)) { | 
| 1569 | 0 |         inReadOnly = 1; | 
| 1570 | 0 |     } | 
| 1571 |  | 
 | 
| 1572 | 0 |     tmp_spec = secmod_ParseModuleSpecForTokens(PR_TRUE, module->isFIPS, | 
| 1573 | 0 |                                                module->libraryParams, &children, &ids); | 
| 1574 | 0 |     if (tmp_spec == NULL) { | 
| 1575 | 0 |         goto done; | 
| 1576 | 0 |     } | 
| 1577 |  |  | 
| 1578 |  |     /* first check to see if the parent is the database */ | 
| 1579 | 0 |     thisConfig = secmod_getConfigDir(tmp_spec, &thisCertPrefix, &thisKeyPrefix, | 
| 1580 | 0 |                                      &thisReadOnly); | 
| 1581 | 0 |     if (!thisConfig) { | 
| 1582 | 0 |         goto done; | 
| 1583 | 0 |     } | 
| 1584 | 0 |     if (secmod_matchConfig(inConfig, thisConfig, inCertPrefix, thisCertPrefix, | 
| 1585 | 0 |                            inKeyPrefix, thisKeyPrefix, inReadOnly, thisReadOnly)) { | 
| 1586 |  |         /* yup it's the default key slot, get the id for it */ | 
| 1587 | 0 |         PK11SlotInfo *slot = PK11_GetInternalKeySlot(); | 
| 1588 | 0 |         if (slot) { | 
| 1589 | 0 |             slotID = slot->slotID; | 
| 1590 | 0 |             PK11_FreeSlot(slot); | 
| 1591 | 0 |         } | 
| 1592 | 0 |         goto done; | 
| 1593 | 0 |     } | 
| 1594 |  |  | 
| 1595 |  |     /* find id of the token */ | 
| 1596 | 0 |     for (thisChild = children, thisID = ids; thisChild && *thisChild; thisChild++, thisID++) { | 
| 1597 | 0 |         PORT_Free(thisConfig); | 
| 1598 | 0 |         PORT_Free(thisCertPrefix); | 
| 1599 | 0 |         PORT_Free(thisKeyPrefix); | 
| 1600 | 0 |         thisConfig = secmod_getConfigDir(*thisChild, &thisCertPrefix, | 
| 1601 | 0 |                                          &thisKeyPrefix, &thisReadOnly); | 
| 1602 | 0 |         if (thisConfig == NULL) { | 
| 1603 | 0 |             continue; | 
| 1604 | 0 |         } | 
| 1605 | 0 |         if (secmod_matchConfig(inConfig, thisConfig, inCertPrefix, thisCertPrefix, | 
| 1606 | 0 |                                inKeyPrefix, thisKeyPrefix, inReadOnly, thisReadOnly)) { | 
| 1607 | 0 |             slotID = *thisID; | 
| 1608 | 0 |             break; | 
| 1609 | 0 |         } | 
| 1610 | 0 |     } | 
| 1611 |  | 
 | 
| 1612 | 0 | done: | 
| 1613 | 0 |     PORT_Free(inConfig); | 
| 1614 | 0 |     PORT_Free(inCertPrefix); | 
| 1615 | 0 |     PORT_Free(inKeyPrefix); | 
| 1616 | 0 |     PORT_Free(thisConfig); | 
| 1617 | 0 |     PORT_Free(thisCertPrefix); | 
| 1618 | 0 |     PORT_Free(thisKeyPrefix); | 
| 1619 | 0 |     if (tmp_spec) { | 
| 1620 | 0 |         secmod_FreeChildren(children, ids); | 
| 1621 | 0 |         PORT_Free(tmp_spec); | 
| 1622 | 0 |     } | 
| 1623 | 0 |     return slotID; | 
| 1624 | 0 | } | 
| 1625 |  |  | 
| 1626 |  | void | 
| 1627 |  | secmod_FreeConfigList(SECMODConfigList *conflist, int count) | 
| 1628 | 0 | { | 
| 1629 | 0 |     int i; | 
| 1630 | 0 |     for (i = 0; i < count; i++) { | 
| 1631 | 0 |         PORT_Free(conflist[i].config); | 
| 1632 | 0 |         PORT_Free(conflist[i].certPrefix); | 
| 1633 | 0 |         PORT_Free(conflist[i].keyPrefix); | 
| 1634 | 0 |     } | 
| 1635 | 0 |     PORT_Free(conflist); | 
| 1636 | 0 | } | 
| 1637 |  |  | 
| 1638 |  | void | 
| 1639 |  | secmod_FreeChildren(char **children, CK_SLOT_ID *ids) | 
| 1640 | 0 | { | 
| 1641 | 0 |     char **thisChild; | 
| 1642 |  | 
 | 
| 1643 | 0 |     if (!children) { | 
| 1644 | 0 |         return; | 
| 1645 | 0 |     } | 
| 1646 |  |  | 
| 1647 | 0 |     for (thisChild = children; thisChild && *thisChild; thisChild++) { | 
| 1648 | 0 |         PORT_Free(*thisChild); | 
| 1649 | 0 |     } | 
| 1650 | 0 |     PORT_Free(children); | 
| 1651 | 0 |     if (ids) { | 
| 1652 | 0 |         PORT_Free(ids); | 
| 1653 | 0 |     } | 
| 1654 | 0 |     return; | 
| 1655 | 0 | } | 
| 1656 |  |  | 
| 1657 |  | /* | 
| 1658 |  |  * caclulate the length of each child record: | 
| 1659 |  |  * " 0x{id}=<{escaped_child}>" | 
| 1660 |  |  */ | 
| 1661 |  | static int | 
| 1662 |  | secmod_getChildLength(char *child, CK_SLOT_ID id) | 
| 1663 | 0 | { | 
| 1664 | 0 |     int length = NSSUTIL_DoubleEscapeSize(child, '>', ']'); | 
| 1665 | 0 |     if (id == 0) { | 
| 1666 | 0 |         length++; | 
| 1667 | 0 |     } | 
| 1668 | 0 |     while (id) { | 
| 1669 | 0 |         length++; | 
| 1670 | 0 |         id = id >> 4; | 
| 1671 | 0 |     } | 
| 1672 | 0 |     length += 6; /* {sp}0x[id]=<{child}> */ | 
| 1673 | 0 |     return length; | 
| 1674 | 0 | } | 
| 1675 |  |  | 
| 1676 |  | /* | 
| 1677 |  |  * Build a child record: | 
| 1678 |  |  * " 0x{id}=<{escaped_child}>" | 
| 1679 |  |  */ | 
| 1680 |  | static SECStatus | 
| 1681 |  | secmod_mkTokenChild(char **next, int *length, char *child, CK_SLOT_ID id) | 
| 1682 | 0 | { | 
| 1683 | 0 |     int len; | 
| 1684 | 0 |     char *escSpec; | 
| 1685 |  | 
 | 
| 1686 | 0 |     len = PR_snprintf(*next, *length, " 0x%x=<", id); | 
| 1687 | 0 |     if (len < 0) { | 
| 1688 | 0 |         return SECFailure; | 
| 1689 | 0 |     } | 
| 1690 | 0 |     *next += len; | 
| 1691 | 0 |     *length -= len; | 
| 1692 | 0 |     escSpec = NSSUTIL_DoubleEscape(child, '>', ']'); | 
| 1693 | 0 |     if (escSpec == NULL) { | 
| 1694 | 0 |         return SECFailure; | 
| 1695 | 0 |     } | 
| 1696 | 0 |     if (*child && (*escSpec == 0)) { | 
| 1697 | 0 |         PORT_Free(escSpec); | 
| 1698 | 0 |         return SECFailure; | 
| 1699 | 0 |     } | 
| 1700 | 0 |     len = strlen(escSpec); | 
| 1701 | 0 |     if (len + 1 > *length) { | 
| 1702 | 0 |         PORT_Free(escSpec); | 
| 1703 | 0 |         return SECFailure; | 
| 1704 | 0 |     } | 
| 1705 | 0 |     PORT_Memcpy(*next, escSpec, len); | 
| 1706 | 0 |     *next += len; | 
| 1707 | 0 |     *length -= len; | 
| 1708 | 0 |     PORT_Free(escSpec); | 
| 1709 | 0 |     **next = '>'; | 
| 1710 | 0 |     (*next)++; | 
| 1711 | 0 |     (*length)--; | 
| 1712 | 0 |     return SECSuccess; | 
| 1713 | 0 | } | 
| 1714 |  |  | 
| 1715 | 0 | #define TOKEN_STRING " tokens=[" | 
| 1716 |  |  | 
| 1717 |  | char * | 
| 1718 |  | secmod_MkAppendTokensList(PLArenaPool *arena, char *oldParam, char *newToken, | 
| 1719 |  |                           CK_SLOT_ID newID, char **children, CK_SLOT_ID *ids) | 
| 1720 | 0 | { | 
| 1721 | 0 |     char *rawParam = NULL;  /* oldParam with tokens stripped off */ | 
| 1722 | 0 |     char *newParam = NULL;  /* space for the return parameter */ | 
| 1723 | 0 |     char *nextParam = NULL; /* current end of the new parameter */ | 
| 1724 | 0 |     char **oldChildren = NULL; | 
| 1725 | 0 |     CK_SLOT_ID *oldIds = NULL; | 
| 1726 | 0 |     void *mark = NULL; /* mark the arena pool in case we need | 
| 1727 |  |                         * to release it */ | 
| 1728 | 0 |     int length, i, tmpLen; | 
| 1729 | 0 |     SECStatus rv; | 
| 1730 |  |  | 
| 1731 |  |     /* first strip out and save the old tokenlist */ | 
| 1732 | 0 |     rawParam = secmod_ParseModuleSpecForTokens(PR_FALSE, PR_FALSE, | 
| 1733 | 0 |                                                oldParam, &oldChildren, &oldIds); | 
| 1734 | 0 |     if (!rawParam) { | 
| 1735 | 0 |         goto loser; | 
| 1736 | 0 |     } | 
| 1737 |  |  | 
| 1738 |  |     /* now calculate the total length of the new buffer */ | 
| 1739 |  |     /* First the 'fixed stuff', length of rawparam (does not include a NULL), | 
| 1740 |  |      * length of the token string (does include the NULL), closing bracket */ | 
| 1741 | 0 |     length = strlen(rawParam) + sizeof(TOKEN_STRING) + 1; | 
| 1742 |  |     /* now add then length of all the old children */ | 
| 1743 | 0 |     for (i = 0; oldChildren && oldChildren[i]; i++) { | 
| 1744 | 0 |         length += secmod_getChildLength(oldChildren[i], oldIds[i]); | 
| 1745 | 0 |     } | 
| 1746 |  |  | 
| 1747 |  |     /* add the new token */ | 
| 1748 | 0 |     length += secmod_getChildLength(newToken, newID); | 
| 1749 |  |  | 
| 1750 |  |     /* and it's new children */ | 
| 1751 | 0 |     for (i = 0; children && children[i]; i++) { | 
| 1752 | 0 |         if (ids[i] == -1) { | 
| 1753 | 0 |             continue; | 
| 1754 | 0 |         } | 
| 1755 | 0 |         length += secmod_getChildLength(children[i], ids[i]); | 
| 1756 | 0 |     } | 
| 1757 |  |  | 
| 1758 |  |     /* now allocate and build the string */ | 
| 1759 | 0 |     mark = PORT_ArenaMark(arena); | 
| 1760 | 0 |     if (!mark) { | 
| 1761 | 0 |         goto loser; | 
| 1762 | 0 |     } | 
| 1763 | 0 |     newParam = PORT_ArenaAlloc(arena, length); | 
| 1764 | 0 |     if (!newParam) { | 
| 1765 | 0 |         goto loser; | 
| 1766 | 0 |     } | 
| 1767 |  |  | 
| 1768 | 0 |     PORT_Strcpy(newParam, oldParam); | 
| 1769 | 0 |     tmpLen = strlen(oldParam); | 
| 1770 | 0 |     nextParam = newParam + tmpLen; | 
| 1771 | 0 |     length -= tmpLen; | 
| 1772 | 0 |     PORT_Memcpy(nextParam, TOKEN_STRING, sizeof(TOKEN_STRING) - 1); | 
| 1773 | 0 |     nextParam += sizeof(TOKEN_STRING) - 1; | 
| 1774 | 0 |     length -= sizeof(TOKEN_STRING) - 1; | 
| 1775 |  | 
 | 
| 1776 | 0 |     for (i = 0; oldChildren && oldChildren[i]; i++) { | 
| 1777 | 0 |         rv = secmod_mkTokenChild(&nextParam, &length, oldChildren[i], oldIds[i]); | 
| 1778 | 0 |         if (rv != SECSuccess) { | 
| 1779 | 0 |             goto loser; | 
| 1780 | 0 |         } | 
| 1781 | 0 |     } | 
| 1782 |  |  | 
| 1783 | 0 |     rv = secmod_mkTokenChild(&nextParam, &length, newToken, newID); | 
| 1784 | 0 |     if (rv != SECSuccess) { | 
| 1785 | 0 |         goto loser; | 
| 1786 | 0 |     } | 
| 1787 |  |  | 
| 1788 | 0 |     for (i = 0; children && children[i]; i++) { | 
| 1789 | 0 |         if (ids[i] == -1) { | 
| 1790 | 0 |             continue; | 
| 1791 | 0 |         } | 
| 1792 | 0 |         rv = secmod_mkTokenChild(&nextParam, &length, children[i], ids[i]); | 
| 1793 | 0 |         if (rv != SECSuccess) { | 
| 1794 | 0 |             goto loser; | 
| 1795 | 0 |         } | 
| 1796 | 0 |     } | 
| 1797 |  |  | 
| 1798 | 0 |     if (length < 2) { | 
| 1799 | 0 |         goto loser; | 
| 1800 | 0 |     } | 
| 1801 |  |  | 
| 1802 | 0 |     *nextParam++ = ']'; | 
| 1803 | 0 |     *nextParam++ = 0; | 
| 1804 |  |  | 
| 1805 |  |     /* we are going to return newParam now, don't release the mark */ | 
| 1806 | 0 |     PORT_ArenaUnmark(arena, mark); | 
| 1807 | 0 |     mark = NULL; | 
| 1808 |  | 
 | 
| 1809 | 0 | loser: | 
| 1810 | 0 |     if (mark) { | 
| 1811 | 0 |         PORT_ArenaRelease(arena, mark); | 
| 1812 | 0 |         newParam = NULL; /* if the mark is still active, | 
| 1813 |  |                           * don't return the param */ | 
| 1814 | 0 |     } | 
| 1815 | 0 |     if (rawParam) { | 
| 1816 | 0 |         PORT_Free(rawParam); | 
| 1817 | 0 |     } | 
| 1818 | 0 |     if (oldChildren) { | 
| 1819 | 0 |         secmod_FreeChildren(oldChildren, oldIds); | 
| 1820 | 0 |     } | 
| 1821 | 0 |     return newParam; | 
| 1822 | 0 | } | 
| 1823 |  |  | 
| 1824 |  | static char * | 
| 1825 |  | secmod_mkModuleSpec(SECMODModule *module) | 
| 1826 | 0 | { | 
| 1827 | 0 |     char *nss = NULL, *modSpec = NULL, **slotStrings = NULL; | 
| 1828 | 0 |     int slotCount, i, si; | 
| 1829 | 0 |     SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); | 
| 1830 |  |  | 
| 1831 |  |     /* allocate target slot info strings */ | 
| 1832 | 0 |     slotCount = 0; | 
| 1833 |  | 
 | 
| 1834 | 0 |     SECMOD_GetReadLock(moduleLock); | 
| 1835 | 0 |     if (module->slotCount) { | 
| 1836 | 0 |         for (i = 0; i < module->slotCount; i++) { | 
| 1837 | 0 |             if (module->slots[i]->defaultFlags != 0) { | 
| 1838 | 0 |                 slotCount++; | 
| 1839 | 0 |             } | 
| 1840 | 0 |         } | 
| 1841 | 0 |     } else { | 
| 1842 | 0 |         slotCount = module->slotInfoCount; | 
| 1843 | 0 |     } | 
| 1844 |  | 
 | 
| 1845 | 0 |     slotStrings = (char **)PORT_ZAlloc(slotCount * sizeof(char *)); | 
| 1846 | 0 |     if (slotStrings == NULL) { | 
| 1847 | 0 |         SECMOD_ReleaseReadLock(moduleLock); | 
| 1848 | 0 |         goto loser; | 
| 1849 | 0 |     } | 
| 1850 |  |  | 
| 1851 |  |     /* build the slot info strings */ | 
| 1852 | 0 |     if (module->slotCount) { | 
| 1853 | 0 |         for (i = 0, si = 0; i < module->slotCount; i++) { | 
| 1854 | 0 |             if (module->slots[i]->defaultFlags) { | 
| 1855 | 0 |                 PORT_Assert(si < slotCount); | 
| 1856 | 0 |                 if (si >= slotCount) | 
| 1857 | 0 |                     break; | 
| 1858 | 0 |                 slotStrings[si] = NSSUTIL_MkSlotString(module->slots[i]->slotID, | 
| 1859 | 0 |                                                        module->slots[i]->defaultFlags, | 
| 1860 | 0 |                                                        module->slots[i]->timeout, | 
| 1861 | 0 |                                                        module->slots[i]->askpw, | 
| 1862 | 0 |                                                        module->slots[i]->hasRootCerts, | 
| 1863 | 0 |                                                        module->slots[i]->hasRootTrust); | 
| 1864 | 0 |                 si++; | 
| 1865 | 0 |             } | 
| 1866 | 0 |         } | 
| 1867 | 0 |     } else { | 
| 1868 | 0 |         for (i = 0; i < slotCount; i++) { | 
| 1869 | 0 |             slotStrings[i] = NSSUTIL_MkSlotString( | 
| 1870 | 0 |                 module->slotInfo[i].slotID, | 
| 1871 | 0 |                 module->slotInfo[i].defaultFlags, | 
| 1872 | 0 |                 module->slotInfo[i].timeout, | 
| 1873 | 0 |                 module->slotInfo[i].askpw, | 
| 1874 | 0 |                 module->slotInfo[i].hasRootCerts, | 
| 1875 | 0 |                 module->slotInfo[i].hasRootTrust); | 
| 1876 | 0 |         } | 
| 1877 | 0 |     } | 
| 1878 |  | 
 | 
| 1879 | 0 |     SECMOD_ReleaseReadLock(moduleLock); | 
| 1880 | 0 |     nss = NSSUTIL_MkNSSString(slotStrings, slotCount, module->internal, | 
| 1881 | 0 |                               module->isFIPS, module->isModuleDB, | 
| 1882 | 0 |                               module->moduleDBOnly, module->isCritical, | 
| 1883 | 0 |                               module->trustOrder, module->cipherOrder, | 
| 1884 | 0 |                               module->ssl[0], module->ssl[1]); | 
| 1885 | 0 |     modSpec = NSSUTIL_MkModuleSpec(module->dllName, module->commonName, | 
| 1886 | 0 |                                    module->libraryParams, nss); | 
| 1887 | 0 |     PORT_Free(slotStrings); | 
| 1888 | 0 |     PR_smprintf_free(nss); | 
| 1889 | 0 | loser: | 
| 1890 | 0 |     return (modSpec); | 
| 1891 | 0 | } | 
| 1892 |  |  | 
| 1893 |  | char ** | 
| 1894 |  | SECMOD_GetModuleSpecList(SECMODModule *module) | 
| 1895 | 9.52k | { | 
| 1896 | 9.52k |     SECMODModuleDBFunc func = (SECMODModuleDBFunc)module->moduleDBFunc; | 
| 1897 | 9.52k |     if (func) { | 
| 1898 | 9.52k |         return (*func)(SECMOD_MODULE_DB_FUNCTION_FIND, | 
| 1899 | 9.52k |                        module->libraryParams, NULL); | 
| 1900 | 9.52k |     } | 
| 1901 | 0 |     return NULL; | 
| 1902 | 9.52k | } | 
| 1903 |  |  | 
| 1904 |  | SECStatus | 
| 1905 |  | SECMOD_AddPermDB(SECMODModule *module) | 
| 1906 | 0 | { | 
| 1907 | 0 |     SECMODModuleDBFunc func; | 
| 1908 | 0 |     char *moduleSpec; | 
| 1909 | 0 |     char **retString; | 
| 1910 |  | 
 | 
| 1911 | 0 |     if (module->parent == NULL) | 
| 1912 | 0 |         return SECFailure; | 
| 1913 |  |  | 
| 1914 | 0 |     func = (SECMODModuleDBFunc)module->parent->moduleDBFunc; | 
| 1915 | 0 |     if (func) { | 
| 1916 | 0 |         moduleSpec = secmod_mkModuleSpec(module); | 
| 1917 | 0 |         retString = (*func)(SECMOD_MODULE_DB_FUNCTION_ADD, | 
| 1918 | 0 |                             module->parent->libraryParams, moduleSpec); | 
| 1919 | 0 |         PORT_Free(moduleSpec); | 
| 1920 | 0 |         if (retString != NULL) | 
| 1921 | 0 |             return SECSuccess; | 
| 1922 | 0 |     } | 
| 1923 | 0 |     return SECFailure; | 
| 1924 | 0 | } | 
| 1925 |  |  | 
| 1926 |  | SECStatus | 
| 1927 |  | SECMOD_DeletePermDB(SECMODModule *module) | 
| 1928 | 0 | { | 
| 1929 | 0 |     SECMODModuleDBFunc func; | 
| 1930 | 0 |     char *moduleSpec; | 
| 1931 | 0 |     char **retString; | 
| 1932 |  | 
 | 
| 1933 | 0 |     if (module->parent == NULL) | 
| 1934 | 0 |         return SECFailure; | 
| 1935 |  |  | 
| 1936 | 0 |     func = (SECMODModuleDBFunc)module->parent->moduleDBFunc; | 
| 1937 | 0 |     if (func) { | 
| 1938 | 0 |         moduleSpec = secmod_mkModuleSpec(module); | 
| 1939 | 0 |         retString = (*func)(SECMOD_MODULE_DB_FUNCTION_DEL, | 
| 1940 | 0 |                             module->parent->libraryParams, moduleSpec); | 
| 1941 | 0 |         PORT_Free(moduleSpec); | 
| 1942 | 0 |         if (retString != NULL) | 
| 1943 | 0 |             return SECSuccess; | 
| 1944 | 0 |     } | 
| 1945 | 0 |     return SECFailure; | 
| 1946 | 0 | } | 
| 1947 |  |  | 
| 1948 |  | SECStatus | 
| 1949 |  | SECMOD_FreeModuleSpecList(SECMODModule *module, char **moduleSpecList) | 
| 1950 | 9.52k | { | 
| 1951 | 9.52k |     SECMODModuleDBFunc func = (SECMODModuleDBFunc)module->moduleDBFunc; | 
| 1952 | 9.52k |     char **retString; | 
| 1953 | 9.52k |     if (func) { | 
| 1954 | 9.52k |         retString = (*func)(SECMOD_MODULE_DB_FUNCTION_RELEASE, | 
| 1955 | 9.52k |                             module->libraryParams, moduleSpecList); | 
| 1956 | 9.52k |         if (retString != NULL) | 
| 1957 | 9.52k |             return SECSuccess; | 
| 1958 | 9.52k |     } | 
| 1959 | 0 |     return SECFailure; | 
| 1960 | 9.52k | } | 
| 1961 |  |  | 
| 1962 |  | /* | 
| 1963 |  |  * load a PKCS#11 module but do not add it to the default NSS trust domain | 
| 1964 |  |  */ | 
| 1965 |  | SECMODModule * | 
| 1966 |  | SECMOD_LoadModule(char *modulespec, SECMODModule *parent, PRBool recurse) | 
| 1967 | 19.0k | { | 
| 1968 | 19.0k |     char *library = NULL, *moduleName = NULL, *parameters = NULL, *nss = NULL; | 
| 1969 | 19.0k |     char *config = NULL; | 
| 1970 | 19.0k |     SECStatus status; | 
| 1971 | 19.0k |     SECMODModule *module = NULL; | 
| 1972 | 19.0k |     SECMODModule *oldModule = NULL; | 
| 1973 | 19.0k |     SECStatus rv; | 
| 1974 | 19.0k |     PRBool forwardPolicyFeedback = PR_FALSE; | 
| 1975 | 19.0k |     PRUint32 forwardPolicyCheckFlags; | 
| 1976 |  |  | 
| 1977 |  |     /* initialize the underlying module structures */ | 
| 1978 | 19.0k |     SECMOD_Init(); | 
| 1979 |  |  | 
| 1980 | 19.0k |     status = NSSUTIL_ArgParseModuleSpecEx(modulespec, &library, &moduleName, | 
| 1981 | 19.0k |                                           ¶meters, &nss, | 
| 1982 | 19.0k |                                           &config); | 
| 1983 | 19.0k |     if (status != SECSuccess) { | 
| 1984 | 0 |         goto loser; | 
| 1985 | 0 |     } | 
| 1986 |  |  | 
| 1987 | 19.0k |     module = SECMOD_CreateModuleEx(library, moduleName, parameters, nss, config); | 
| 1988 | 19.0k |     forwardPolicyFeedback = NSSUTIL_ArgHasFlag("flags", "printPolicyFeedback", nss); | 
| 1989 | 19.0k |     forwardPolicyCheckFlags = secmod_parsePolicyCheckFlags(nss); | 
| 1990 |  |  | 
| 1991 | 19.0k |     if (library) | 
| 1992 | 0 |         PORT_Free(library); | 
| 1993 | 19.0k |     if (moduleName) | 
| 1994 | 19.0k |         PORT_Free(moduleName); | 
| 1995 | 19.0k |     if (parameters) | 
| 1996 | 19.0k |         PORT_Free(parameters); | 
| 1997 | 19.0k |     if (nss) | 
| 1998 | 19.0k |         PORT_Free(nss); | 
| 1999 | 19.0k |     if (config) | 
| 2000 | 0 |         PORT_Free(config); | 
| 2001 | 19.0k |     if (!module) { | 
| 2002 | 0 |         goto loser; | 
| 2003 | 0 |     } | 
| 2004 |  |  | 
| 2005 |  |     /* a policy only stanza doesn't actually get 'loaded'. policy has already | 
| 2006 |  |      * been parsed as a side effect of the CreateModuleEx call */ | 
| 2007 | 19.0k |     if (secmod_PolicyOnly(module)) { | 
| 2008 | 0 |         return module; | 
| 2009 | 0 |     } | 
| 2010 | 19.0k |     if (parent) { | 
| 2011 | 9.52k |         module->parent = SECMOD_ReferenceModule(parent); | 
| 2012 | 9.52k |         if (module->internal && secmod_IsInternalKeySlot(parent)) { | 
| 2013 | 9.52k |             module->internal = parent->internal; | 
| 2014 | 9.52k |         } | 
| 2015 | 9.52k |     } | 
| 2016 |  |  | 
| 2017 |  |     /* load it */ | 
| 2018 | 19.0k |     rv = secmod_LoadPKCS11Module(module, &oldModule); | 
| 2019 | 19.0k |     if (rv != SECSuccess) { | 
| 2020 | 0 |         goto loser; | 
| 2021 | 0 |     } | 
| 2022 |  |  | 
| 2023 |  |     /* if we just reload an old module, no need to add it to any lists. | 
| 2024 |  |      * we simple release all our references */ | 
| 2025 | 19.0k |     if (oldModule) { | 
| 2026 |  |         /* This module already exists, don't link it anywhere. This | 
| 2027 |  |          * will probably destroy this module */ | 
| 2028 | 0 |         SECMOD_DestroyModule(module); | 
| 2029 | 0 |         return oldModule; | 
| 2030 | 0 |     } | 
| 2031 |  |  | 
| 2032 | 19.0k |     if (recurse && module->isModuleDB) { | 
| 2033 | 9.52k |         char **moduleSpecList; | 
| 2034 | 9.52k |         PORT_SetError(0); | 
| 2035 |  |  | 
| 2036 | 9.52k |         moduleSpecList = SECMOD_GetModuleSpecList(module); | 
| 2037 | 9.52k |         if (moduleSpecList) { | 
| 2038 | 9.52k |             char **index; | 
| 2039 |  |  | 
| 2040 | 9.52k |             index = moduleSpecList; | 
| 2041 | 9.52k |             if (*index && SECMOD_GetSkipFirstFlag(module)) { | 
| 2042 | 0 |                 index++; | 
| 2043 | 0 |             } | 
| 2044 |  |  | 
| 2045 | 19.0k |             for (; *index; index++) { | 
| 2046 | 9.52k |                 SECMODModule *child; | 
| 2047 | 9.52k |                 if (0 == PORT_Strcmp(*index, modulespec)) { | 
| 2048 |  |                     /* avoid trivial infinite recursion */ | 
| 2049 | 0 |                     PORT_SetError(SEC_ERROR_NO_MODULE); | 
| 2050 | 0 |                     rv = SECFailure; | 
| 2051 | 0 |                     break; | 
| 2052 | 0 |                 } | 
| 2053 | 9.52k |                 if (!forwardPolicyFeedback) { | 
| 2054 | 9.52k |                     child = SECMOD_LoadModule(*index, module, PR_TRUE); | 
| 2055 | 9.52k |                 } else { | 
| 2056 |  |                     /* Add printPolicyFeedback to the nss flags */ | 
| 2057 | 0 |                     char *specWithForwards = | 
| 2058 | 0 |                         NSSUTIL_AddNSSFlagToModuleSpec(*index, "printPolicyFeedback"); | 
| 2059 | 0 |                     char *tmp; | 
| 2060 | 0 |                     if (forwardPolicyCheckFlags & SECMOD_FLAG_POLICY_CHECK_IDENTIFIER) { | 
| 2061 | 0 |                         tmp = NSSUTIL_AddNSSFlagToModuleSpec(specWithForwards, "policyCheckIdentifier"); | 
| 2062 | 0 |                         PORT_Free(specWithForwards); | 
| 2063 | 0 |                         specWithForwards = tmp; | 
| 2064 | 0 |                     } | 
| 2065 | 0 |                     if (forwardPolicyCheckFlags & SECMOD_FLAG_POLICY_CHECK_VALUE) { | 
| 2066 | 0 |                         tmp = NSSUTIL_AddNSSFlagToModuleSpec(specWithForwards, "policyCheckValue"); | 
| 2067 | 0 |                         PORT_Free(specWithForwards); | 
| 2068 | 0 |                         specWithForwards = tmp; | 
| 2069 | 0 |                     } | 
| 2070 | 0 |                     child = SECMOD_LoadModule(specWithForwards, module, PR_TRUE); | 
| 2071 | 0 |                     PORT_Free(specWithForwards); | 
| 2072 | 0 |                 } | 
| 2073 | 9.52k |                 if (!child) | 
| 2074 | 0 |                     break; | 
| 2075 | 9.52k |                 if (child->isCritical && !child->loaded) { | 
| 2076 | 0 |                     int err = PORT_GetError(); | 
| 2077 | 0 |                     if (!err) | 
| 2078 | 0 |                         err = SEC_ERROR_NO_MODULE; | 
| 2079 | 0 |                     SECMOD_DestroyModule(child); | 
| 2080 | 0 |                     PORT_SetError(err); | 
| 2081 | 0 |                     rv = SECFailure; | 
| 2082 | 0 |                     break; | 
| 2083 | 0 |                 } | 
| 2084 | 9.52k |                 SECMOD_DestroyModule(child); | 
| 2085 | 9.52k |             } | 
| 2086 | 9.52k |             SECMOD_FreeModuleSpecList(module, moduleSpecList); | 
| 2087 | 9.52k |         } else { | 
| 2088 | 0 |             if (!PORT_GetError()) | 
| 2089 | 0 |                 PORT_SetError(SEC_ERROR_NO_MODULE); | 
| 2090 | 0 |             rv = SECFailure; | 
| 2091 | 0 |         } | 
| 2092 | 9.52k |     } | 
| 2093 |  |  | 
| 2094 | 19.0k |     if (rv != SECSuccess) { | 
| 2095 | 0 |         goto loser; | 
| 2096 | 0 |     } | 
| 2097 |  |  | 
| 2098 |  |     /* inherit the reference */ | 
| 2099 | 19.0k |     if (!module->moduleDBOnly) { | 
| 2100 | 9.52k |         SECMOD_AddModuleToList(module); | 
| 2101 | 9.52k |     } else { | 
| 2102 | 9.52k |         SECMOD_AddModuleToDBOnlyList(module); | 
| 2103 | 9.52k |     } | 
| 2104 |  |  | 
| 2105 |  |     /* handle any additional work here */ | 
| 2106 | 19.0k |     return module; | 
| 2107 |  |  | 
| 2108 | 0 | loser: | 
| 2109 | 0 |     if (module) { | 
| 2110 | 0 |         if (module->loaded) { | 
| 2111 | 0 |             SECMOD_UnloadModule(module); | 
| 2112 | 0 |         } | 
| 2113 | 0 |         SECMOD_AddModuleToUnloadList(module); | 
| 2114 | 0 |     } | 
| 2115 | 0 |     return module; | 
| 2116 | 19.0k | } | 
| 2117 |  |  | 
| 2118 |  | /* | 
| 2119 |  |  * load a PKCS#11 module and add it to the default NSS trust domain | 
| 2120 |  |  */ | 
| 2121 |  | SECMODModule * | 
| 2122 |  | SECMOD_LoadUserModule(char *modulespec, SECMODModule *parent, PRBool recurse) | 
| 2123 | 0 | { | 
| 2124 | 0 |     SECStatus rv = SECSuccess; | 
| 2125 | 0 |     SECMODModule *newmod = SECMOD_LoadModule(modulespec, parent, recurse); | 
| 2126 | 0 |     SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); | 
| 2127 |  | 
 | 
| 2128 | 0 |     if (newmod) { | 
| 2129 | 0 |         SECMOD_GetReadLock(moduleLock); | 
| 2130 | 0 |         rv = STAN_AddModuleToDefaultTrustDomain(newmod); | 
| 2131 | 0 |         SECMOD_ReleaseReadLock(moduleLock); | 
| 2132 | 0 |         if (SECSuccess != rv) { | 
| 2133 | 0 |             SECMOD_DestroyModule(newmod); | 
| 2134 | 0 |             return NULL; | 
| 2135 | 0 |         } | 
| 2136 | 0 |     } | 
| 2137 | 0 |     return newmod; | 
| 2138 | 0 | } | 
| 2139 |  |  | 
| 2140 |  | /* | 
| 2141 |  |  * remove the PKCS#11 module from the default NSS trust domain, call | 
| 2142 |  |  * C_Finalize, and destroy the module structure | 
| 2143 |  |  */ | 
| 2144 |  | SECStatus | 
| 2145 |  | SECMOD_UnloadUserModule(SECMODModule *mod) | 
| 2146 | 0 | { | 
| 2147 | 0 |     SECStatus rv = SECSuccess; | 
| 2148 | 0 |     int atype = 0; | 
| 2149 | 0 |     SECMODListLock *moduleLock = SECMOD_GetDefaultModuleListLock(); | 
| 2150 | 0 |     if (!mod) { | 
| 2151 | 0 |         return SECFailure; | 
| 2152 | 0 |     } | 
| 2153 |  |  | 
| 2154 | 0 |     SECMOD_GetReadLock(moduleLock); | 
| 2155 | 0 |     rv = STAN_RemoveModuleFromDefaultTrustDomain(mod); | 
| 2156 | 0 |     SECMOD_ReleaseReadLock(moduleLock); | 
| 2157 | 0 |     if (SECSuccess != rv) { | 
| 2158 | 0 |         return SECFailure; | 
| 2159 | 0 |     } | 
| 2160 | 0 |     return SECMOD_DeleteModuleEx(NULL, mod, &atype, PR_FALSE); | 
| 2161 | 0 | } |