mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-14 03:30:17 +01:00
30d33aa8e8
9934c8faef29, 3c3b381c4865, 5a67f6beee9a, 1b1eb6d77728, a8b668fd72f7, bug962760, bug743700, bug857304, bug972653, bug972450, bug971358, bug903885, bug977073, bug976111, bug949939, bug947653, bug947572, bug903885, bug979106, bug966596, bug979004, bug979752, bug980848, bug938369, bug981170, bug668130, bug974693, bug975056, bug979132, bug370717, bug979070, bug985070, bug900067, bug977673, bug519255, bug989558, bug557299, bug987263, bug369802, a751a5146718, bug992343, bug952572, bug979703, bug994883, bug994869, bug993489, bug984608, bug977869, bug667371, bug672828, bug793347, bug977869
172 lines
7.0 KiB
C
172 lines
7.0 KiB
C
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
/*
|
|
* Internal header file included only by files in pkcs11 dir, or in
|
|
* pkcs11 specific client and server files.
|
|
*/
|
|
#ifndef _SECMODI_H_
|
|
#define _SECMODI_H_ 1
|
|
#include "pkcs11.h"
|
|
#include "nssilock.h"
|
|
#include "secoidt.h"
|
|
#include "secdert.h"
|
|
#include "certt.h"
|
|
#include "secmodt.h"
|
|
#include "keyt.h"
|
|
|
|
SEC_BEGIN_PROTOS
|
|
|
|
/* proto-types */
|
|
extern SECStatus SECMOD_DeletePermDB(SECMODModule *module);
|
|
extern SECStatus SECMOD_AddPermDB(SECMODModule *module);
|
|
extern SECStatus SECMOD_Shutdown(void);
|
|
void nss_DumpModuleLog(void);
|
|
|
|
extern int secmod_PrivateModuleCount;
|
|
|
|
extern void SECMOD_Init(void);
|
|
SECStatus secmod_ModuleInit(SECMODModule *mod, SECMODModule **oldModule,
|
|
PRBool* alreadyLoaded);
|
|
|
|
/* list managment */
|
|
extern SECStatus SECMOD_AddModuleToList(SECMODModule *newModule);
|
|
extern SECStatus SECMOD_AddModuleToDBOnlyList(SECMODModule *newModule);
|
|
extern SECStatus SECMOD_AddModuleToUnloadList(SECMODModule *newModule);
|
|
extern void SECMOD_RemoveList(SECMODModuleList **,SECMODModuleList *);
|
|
extern void SECMOD_AddList(SECMODModuleList *,SECMODModuleList *,SECMODListLock *);
|
|
extern SECMODListLock *SECMOD_NewListLock(void);
|
|
extern void SECMOD_DestroyListLock(SECMODListLock *);
|
|
extern void SECMOD_GetWriteLock(SECMODListLock *);
|
|
extern void SECMOD_ReleaseWriteLock(SECMODListLock *);
|
|
|
|
/* Operate on modules by name */
|
|
extern SECMODModule *SECMOD_FindModuleByID(SECMODModuleID);
|
|
extern SECMODModule *secmod_FindModuleByFuncPtr(void *funcPtr);
|
|
|
|
/* database/memory management */
|
|
extern SECMODModuleList *SECMOD_NewModuleListElement(void);
|
|
extern SECMODModuleList *SECMOD_DestroyModuleListElement(SECMODModuleList *);
|
|
extern void SECMOD_DestroyModuleList(SECMODModuleList *);
|
|
extern SECStatus SECMOD_AddModule(SECMODModule *newModule);
|
|
|
|
extern unsigned long SECMOD_InternaltoPubCipherFlags(unsigned long internalFlags);
|
|
|
|
/* Library functions */
|
|
SECStatus secmod_LoadPKCS11Module(SECMODModule *, SECMODModule **oldModule);
|
|
SECStatus SECMOD_UnloadModule(SECMODModule *);
|
|
void SECMOD_SetInternalModule(SECMODModule *);
|
|
PRBool secmod_IsInternalKeySlot(SECMODModule *);
|
|
void secmod_SetInternalKeySlotFlag(SECMODModule *mod, PRBool val);
|
|
|
|
|
|
/* tools for checking if we are loading the same database twice */
|
|
typedef struct SECMODConfigListStr SECMODConfigList;
|
|
/* collect all the databases in a given spec */
|
|
SECMODConfigList *secmod_GetConfigList(PRBool isFIPS, char *spec, int *count);
|
|
/* see is a spec matches a database on the list */
|
|
PRBool secmod_MatchConfigList(char *spec,
|
|
SECMODConfigList *conflist, int count);
|
|
/* free our list of databases */
|
|
void secmod_FreeConfigList(SECMODConfigList *conflist, int count);
|
|
|
|
/* parsing parameters */
|
|
/* returned char * must be freed by caller with PORT_Free */
|
|
/* children and ids are null terminated arrays which must be freed with
|
|
* secmod_FreeChildren */
|
|
char *secmod_ParseModuleSpecForTokens(PRBool convert,
|
|
PRBool isFIPS,
|
|
char *moduleSpec,
|
|
char ***children,
|
|
CK_SLOT_ID **ids);
|
|
void secmod_FreeChildren(char **children, CK_SLOT_ID *ids);
|
|
char *secmod_MkAppendTokensList(PLArenaPool *arena, char *origModuleSpec,
|
|
char *newModuleSpec, CK_SLOT_ID newID,
|
|
char **children, CK_SLOT_ID *ids);
|
|
|
|
|
|
void SECMOD_SlotDestroyModule(SECMODModule *module, PRBool fromSlot);
|
|
CK_RV pk11_notify(CK_SESSION_HANDLE session, CK_NOTIFICATION event,
|
|
CK_VOID_PTR pdata);
|
|
void pk11_SignedToUnsigned(CK_ATTRIBUTE *attrib);
|
|
CK_OBJECT_HANDLE pk11_FindObjectByTemplate(PK11SlotInfo *slot,
|
|
CK_ATTRIBUTE *inTemplate,int tsize);
|
|
CK_OBJECT_HANDLE *pk11_FindObjectsByTemplate(PK11SlotInfo *slot,
|
|
CK_ATTRIBUTE *inTemplate,int tsize, int *objCount);
|
|
|
|
#define PK11_GETTAB(x) ((CK_FUNCTION_LIST_PTR)((x)->functionList))
|
|
#define PK11_SETATTRS(x,id,v,l) (x)->type = (id); \
|
|
(x)->pValue=(v); (x)->ulValueLen = (l);
|
|
SECStatus PK11_CreateNewObject(PK11SlotInfo *slot, CK_SESSION_HANDLE session,
|
|
const CK_ATTRIBUTE *theTemplate, int count,
|
|
PRBool token, CK_OBJECT_HANDLE *objectID);
|
|
|
|
SECStatus pbe_PK11AlgidToParam(SECAlgorithmID *algid,SECItem *mech);
|
|
SECStatus PBE_PK11ParamToAlgid(SECOidTag algTag, SECItem *param,
|
|
PLArenaPool *arena, SECAlgorithmID *algId);
|
|
|
|
PK11SymKey *pk11_TokenKeyGenWithFlagsAndKeyType(PK11SlotInfo *slot,
|
|
CK_MECHANISM_TYPE type, SECItem *param, CK_KEY_TYPE keyType,
|
|
int keySize, SECItem *keyId, CK_FLAGS opFlags,
|
|
PK11AttrFlags attrFlags, void *wincx);
|
|
|
|
CK_MECHANISM_TYPE pk11_GetPBECryptoMechanism(SECAlgorithmID *algid,
|
|
SECItem **param, SECItem *pwd, PRBool faulty3DES);
|
|
|
|
|
|
|
|
extern void pk11sdr_Init(void);
|
|
extern void pk11sdr_Shutdown(void);
|
|
|
|
/*
|
|
* Private to pk11wrap.
|
|
*/
|
|
|
|
PRBool pk11_LoginStillRequired(PK11SlotInfo *slot, void *wincx);
|
|
CK_SESSION_HANDLE pk11_GetNewSession(PK11SlotInfo *slot, PRBool *owner);
|
|
void pk11_CloseSession(PK11SlotInfo *slot, CK_SESSION_HANDLE sess, PRBool own);
|
|
PK11SymKey *pk11_ForceSlot(PK11SymKey *symKey, CK_MECHANISM_TYPE type,
|
|
CK_ATTRIBUTE_TYPE operation);
|
|
/* Convert key operation flags to PKCS #11 attributes. */
|
|
unsigned int pk11_OpFlagsToAttributes(CK_FLAGS flags,
|
|
CK_ATTRIBUTE *attrs, CK_BBOOL *ckTrue);
|
|
/* Check for bad (conflicting) attribute flags */
|
|
PRBool pk11_BadAttrFlags(PK11AttrFlags attrFlags);
|
|
/* Convert key attribute flags to PKCS #11 attributes. */
|
|
unsigned int pk11_AttrFlagsToAttributes(PK11AttrFlags attrFlags,
|
|
CK_ATTRIBUTE *attrs, CK_BBOOL *ckTrue, CK_BBOOL *ckFalse);
|
|
PRBool pk11_FindAttrInTemplate(CK_ATTRIBUTE *attr, unsigned int numAttrs,
|
|
CK_ATTRIBUTE_TYPE target);
|
|
|
|
CK_MECHANISM_TYPE pk11_mapWrapKeyType(KeyType keyType);
|
|
PK11SymKey *pk11_KeyExchange(PK11SlotInfo *slot, CK_MECHANISM_TYPE type,
|
|
CK_ATTRIBUTE_TYPE operation, CK_FLAGS flags, PRBool isPerm,
|
|
PK11SymKey *symKey);
|
|
|
|
PRBool pk11_HandleTrustObject(PK11SlotInfo *slot, CERTCertificate *cert,
|
|
CERTCertTrust *trust);
|
|
CK_OBJECT_HANDLE pk11_FindPubKeyByAnyCert(CERTCertificate *cert,
|
|
PK11SlotInfo **slot, void *wincx);
|
|
SECStatus pk11_AuthenticateUnfriendly(PK11SlotInfo *slot, PRBool loadCerts,
|
|
void *wincx);
|
|
int PK11_NumberObjectsFor(PK11SlotInfo *slot, CK_ATTRIBUTE *findTemplate,
|
|
int templateCount);
|
|
SECItem *pk11_GetLowLevelKeyFromHandle(PK11SlotInfo *slot,
|
|
CK_OBJECT_HANDLE handle);
|
|
SECStatus PK11_TraverseSlot(PK11SlotInfo *slot, void *arg);
|
|
CK_OBJECT_HANDLE pk11_FindPrivateKeyFromCertID(PK11SlotInfo *slot,
|
|
SECItem *keyID);
|
|
SECKEYPrivateKey *PK11_MakePrivKey(PK11SlotInfo *slot, KeyType keyType,
|
|
PRBool isTemp, CK_OBJECT_HANDLE privID, void *wincx);
|
|
CERTCertificate *PK11_MakeCertFromHandle(PK11SlotInfo *slot,
|
|
CK_OBJECT_HANDLE certID, CK_ATTRIBUTE *privateLabel);
|
|
|
|
SECItem *pk11_GenerateNewParamWithKeyLen(CK_MECHANISM_TYPE type, int keyLen);
|
|
SECItem *pk11_ParamFromIVWithLen(CK_MECHANISM_TYPE type,
|
|
SECItem *iv, int keyLen);
|
|
|
|
SEC_END_PROTOS
|
|
|
|
#endif
|
|
|