OLD | NEW |
1 Index: mozilla/security/nss/lib/certhigh/certvfy.c | 1 diff -r 3f0105dfc733 lib/certhigh/certvfy.c |
2 =================================================================== | 2 --- a/lib/certhigh/certvfy.c» Mon Apr 22 14:22:48 2013 +0200 |
3 RCS file: /cvsroot/mozilla/security/nss/lib/certhigh/certvfy.c,v | 3 +++ b/lib/certhigh/certvfy.c» Mon Apr 22 14:33:38 2013 -0700 |
4 retrieving revision 1.77 | |
5 diff -p -u -8 -r1.77 certvfy.c | |
6 --- mozilla/security/nss/lib/certhigh/certvfy.c»25 Apr 2012 14:49:27 -0000»
1.77 | |
7 +++ mozilla/security/nss/lib/certhigh/certvfy.c»22 Sep 2012 15:22:26 -0000 | |
8 @@ -8,27 +8,70 @@ | 4 @@ -8,27 +8,70 @@ |
9 #include "secoid.h" | 5 #include "secoid.h" |
10 #include "sslerr.h" | 6 #include "sslerr.h" |
11 #include "genname.h" | 7 #include "genname.h" |
12 #include "keyhi.h" | 8 #include "keyhi.h" |
13 #include "cert.h" | 9 #include "cert.h" |
14 #include "certdb.h" | 10 #include "certdb.h" |
15 #include "certi.h" | 11 #include "certi.h" |
16 #include "cryptohi.h" | 12 #include "cryptohi.h" |
17 +#ifndef NSS_DISABLE_LIBPKIX | 13 +#ifndef NSS_DISABLE_LIBPKIX |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
69 +#endif /* NSS_DISABLE_LIBPKIX */ | 65 +#endif /* NSS_DISABLE_LIBPKIX */ |
70 + | 66 + |
71 /* | 67 /* |
72 * Check the validity times of a certificate | 68 * Check the validity times of a certificate |
73 */ | 69 */ |
74 SECStatus | 70 SECStatus |
75 CERT_CertTimesValid(CERTCertificate *c) | 71 CERT_CertTimesValid(CERTCertificate *c) |
76 { | 72 { |
77 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); | 73 SECCertTimeValidity valid = CERT_CheckCertValidTimes(c, PR_Now(), PR_TRUE); |
78 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; | 74 return (valid == secCertTimeValid) ? SECSuccess : SECFailure; |
79 Index: mozilla/security/nss/lib/ckfw/nssck.api | 75 diff -r 3f0105dfc733 lib/ckfw/nssck.api |
80 =================================================================== | 76 --- a/lib/ckfw/nssck.api» Mon Apr 22 14:22:48 2013 +0200 |
81 RCS file: /cvsroot/mozilla/security/nss/lib/ckfw/nssck.api,v | 77 +++ b/lib/ckfw/nssck.api» Mon Apr 22 14:33:38 2013 -0700 |
82 retrieving revision 1.8 | 78 @@ -1751,17 +1751,17 @@ |
83 diff -p -u -8 -r1.8 nssck.api | |
84 --- mozilla/security/nss/lib/ckfw/nssck.api» 25 Apr 2012 14:49:28 -0000»
1.8 | |
85 +++ mozilla/security/nss/lib/ckfw/nssck.api» 22 Sep 2012 15:22:28 -0000 | |
86 @@ -1751,17 +1751,17 @@ C_WaitForSlotEvent | |
87 CK_SLOT_ID_PTR pSlot, | 79 CK_SLOT_ID_PTR pSlot, |
88 CK_VOID_PTR pRserved | 80 CK_VOID_PTR pRserved |
89 ) | 81 ) |
90 { | 82 { |
91 return __ADJOIN(MODULE_NAME,C_WaitForSlotEvent)(flags, pSlot, pRserved); | 83 return __ADJOIN(MODULE_NAME,C_WaitForSlotEvent)(flags, pSlot, pRserved); |
92 } | 84 } |
93 #endif /* DECLARE_STRICT_CRYPTOKI_NAMES */ | 85 #endif /* DECLARE_STRICT_CRYPTOKI_NAMES */ |
94 | 86 |
95 -static CK_RV CK_ENTRY | 87 -static CK_RV CK_ENTRY |
96 +CK_RV CK_ENTRY | 88 +CK_RV CK_ENTRY |
97 __ADJOIN(MODULE_NAME,C_GetFunctionList) | 89 __ADJOIN(MODULE_NAME,C_GetFunctionList) |
98 ( | 90 ( |
99 CK_FUNCTION_LIST_PTR_PTR ppFunctionList | 91 CK_FUNCTION_LIST_PTR_PTR ppFunctionList |
100 ); | 92 ); |
101 | 93 |
102 static CK_FUNCTION_LIST FunctionList = { | 94 static CK_FUNCTION_LIST FunctionList = { |
103 { 2, 1 }, | 95 { 2, 1 }, |
104 __ADJOIN(MODULE_NAME,C_Initialize), | 96 __ADJOIN(MODULE_NAME,C_Initialize), |
105 @@ -1829,30 +1829,32 @@ __ADJOIN(MODULE_NAME,C_UnwrapKey), | 97 @@ -1829,30 +1829,32 @@ |
106 __ADJOIN(MODULE_NAME,C_DeriveKey), | 98 __ADJOIN(MODULE_NAME,C_DeriveKey), |
107 __ADJOIN(MODULE_NAME,C_SeedRandom), | 99 __ADJOIN(MODULE_NAME,C_SeedRandom), |
108 __ADJOIN(MODULE_NAME,C_GenerateRandom), | 100 __ADJOIN(MODULE_NAME,C_GenerateRandom), |
109 __ADJOIN(MODULE_NAME,C_GetFunctionStatus), | 101 __ADJOIN(MODULE_NAME,C_GetFunctionStatus), |
110 __ADJOIN(MODULE_NAME,C_CancelFunction), | 102 __ADJOIN(MODULE_NAME,C_CancelFunction), |
111 __ADJOIN(MODULE_NAME,C_WaitForSlotEvent) | 103 __ADJOIN(MODULE_NAME,C_WaitForSlotEvent) |
112 }; | 104 }; |
113 | 105 |
114 -static CK_RV CK_ENTRY | 106 -static CK_RV CK_ENTRY |
115 +CK_RV CK_ENTRY | 107 +CK_RV CK_ENTRY |
(...skipping 13 matching lines...) Expand all Loading... |
129 ( | 121 ( |
130 CK_FUNCTION_LIST_PTR_PTR ppFunctionList | 122 CK_FUNCTION_LIST_PTR_PTR ppFunctionList |
131 ) | 123 ) |
132 { | 124 { |
133 return __ADJOIN(MODULE_NAME,C_GetFunctionList)(ppFunctionList); | 125 return __ADJOIN(MODULE_NAME,C_GetFunctionList)(ppFunctionList); |
134 } | 126 } |
135 +#endif | 127 +#endif |
136 | 128 |
137 #undef __ADJOIN | 129 #undef __ADJOIN |
138 | 130 |
139 Index: mozilla/security/nss/lib/freebl/rsa.c | 131 diff -r 3f0105dfc733 lib/freebl/rsa.c |
140 =================================================================== | 132 --- a/lib/freebl/rsa.c» Mon Apr 22 14:22:48 2013 +0200 |
141 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/rsa.c,v | 133 +++ b/lib/freebl/rsa.c» Mon Apr 22 14:33:38 2013 -0700 |
142 retrieving revision 1.44 | 134 @@ -1556,16 +1556,23 @@ |
143 diff -p -u -8 -r1.44 rsa.c | |
144 --- mozilla/security/nss/lib/freebl/rsa.c» 25 Apr 2012 14:49:43 -0000»
1.44 | |
145 +++ mozilla/security/nss/lib/freebl/rsa.c» 22 Sep 2012 15:22:28 -0000 | |
146 @@ -1556,16 +1556,23 @@ void RSA_Cleanup(void) | |
147 * free_bl may have allocated along the way. Currently only RSA does this, | 135 * free_bl may have allocated along the way. Currently only RSA does this, |
148 * so I've put it here for now. | 136 * so I've put it here for now. |
149 */ | 137 */ |
150 void BL_Cleanup(void) | 138 void BL_Cleanup(void) |
151 { | 139 { |
152 RSA_Cleanup(); | 140 RSA_Cleanup(); |
153 } | 141 } |
154 | 142 |
155 +#ifdef NSS_STATIC | 143 +#ifdef NSS_STATIC |
156 +void | 144 +void |
157 +BL_Unload(void) | 145 +BL_Unload(void) |
158 +{ | 146 +{ |
159 +} | 147 +} |
160 +#endif | 148 +#endif |
161 + | 149 + |
162 PRBool bl_parentForkedAfterC_Initialize; | 150 PRBool bl_parentForkedAfterC_Initialize; |
163 | 151 |
164 /* | 152 /* |
165 * Set fork flag so it can be tested in SKIP_AFTER_FORK on relevant platforms. | 153 * Set fork flag so it can be tested in SKIP_AFTER_FORK on relevant platforms. |
166 */ | 154 */ |
167 void BL_SetForkState(PRBool forked) | 155 void BL_SetForkState(PRBool forked) |
168 { | 156 { |
169 bl_parentForkedAfterC_Initialize = forked; | 157 bl_parentForkedAfterC_Initialize = forked; |
170 Index: mozilla/security/nss/lib/freebl/shvfy.c | 158 diff -r 3f0105dfc733 lib/freebl/shvfy.c |
171 =================================================================== | 159 --- a/lib/freebl/shvfy.c» Mon Apr 22 14:22:48 2013 +0200 |
172 RCS file: /cvsroot/mozilla/security/nss/lib/freebl/shvfy.c,v | 160 +++ b/lib/freebl/shvfy.c» Mon Apr 22 14:33:38 2013 -0700 |
173 retrieving revision 1.18 | 161 @@ -269,39 +269,55 @@ |
174 diff -p -u -8 -r1.18 shvfy.c | |
175 --- mozilla/security/nss/lib/freebl/shvfy.c» 22 Sep 2012 15:18:19 -0000»
1.18 | |
176 +++ mozilla/security/nss/lib/freebl/shvfy.c» 22 Sep 2012 15:22:29 -0000 | |
177 @@ -269,39 +269,55 @@ readItem(PRFileDesc *fd, SECItem *item) | |
178 PORT_Free(item->data); | 162 PORT_Free(item->data); |
179 item->data = NULL; | 163 item->data = NULL; |
180 item->len = 0; | 164 item->len = 0; |
181 return SECFailure; | 165 return SECFailure; |
182 } | 166 } |
183 return SECSuccess; | 167 return SECSuccess; |
184 } | 168 } |
185 | 169 |
186 +/* | 170 +/* |
187 + * Define PSEUDO_FIPS if you can't do FIPS software integrity test (e.g., | 171 + * Define PSEUDO_FIPS if you can't do FIPS software integrity test (e.g., |
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
223 + return PR_TRUE; /* a lie, hence *pseudo* FIPS */ | 207 + return PR_TRUE; /* a lie, hence *pseudo* FIPS */ |
224 +#else | 208 +#else |
225 char *checkName = NULL; | 209 char *checkName = NULL; |
226 PRFileDesc *checkFD = NULL; | 210 PRFileDesc *checkFD = NULL; |
227 PRFileDesc *shFD = NULL; | 211 PRFileDesc *shFD = NULL; |
228 void *hashcx = NULL; | 212 void *hashcx = NULL; |
229 const SECHashObject *hashObj = NULL; | 213 const SECHashObject *hashObj = NULL; |
230 SECItem signature = { 0, NULL, 0 }; | 214 SECItem signature = { 0, NULL, 0 }; |
231 SECItem hash; | 215 SECItem hash; |
232 int bytesRead, offset; | 216 int bytesRead, offset; |
233 @@ -488,16 +504,17 @@ loser: | 217 @@ -488,16 +504,17 @@ |
234 if (key.params.base.data != NULL) { | 218 if (key.params.base.data != NULL) { |
235 PORT_Free(key.params.base.data); | 219 PORT_Free(key.params.base.data); |
236 } | 220 } |
237 if (key.publicValue.data != NULL) { | 221 if (key.publicValue.data != NULL) { |
238 PORT_Free(key.publicValue.data); | 222 PORT_Free(key.publicValue.data); |
239 } | 223 } |
240 | 224 |
241 return result; | 225 return result; |
242 +#endif /* PSEUDO_FIPS */ | 226 +#endif /* PSEUDO_FIPS */ |
243 } | 227 } |
244 | 228 |
245 PRBool | 229 PRBool |
246 BLAPI_VerifySelf(const char *name) | 230 BLAPI_VerifySelf(const char *name) |
247 { | 231 { |
248 if (name == NULL) { | 232 if (name == NULL) { |
249 /* | 233 /* |
250 * If name is NULL, freebl is statically linked into softoken. | 234 * If name is NULL, freebl is statically linked into softoken. |
251 Index: mozilla/security/nss/lib/nss/nssinit.c | 235 diff -r 3f0105dfc733 lib/nss/nssinit.c |
252 =================================================================== | 236 --- a/lib/nss/nssinit.c»Mon Apr 22 14:22:48 2013 +0200 |
253 RCS file: /cvsroot/mozilla/security/nss/lib/nss/nssinit.c,v | 237 +++ b/lib/nss/nssinit.c»Mon Apr 22 14:33:38 2013 -0700 |
254 retrieving revision 1.118 | 238 @@ -16,19 +16,21 @@ |
255 diff -p -u -8 -r1.118 nssinit.c | |
256 --- mozilla/security/nss/lib/nss/nssinit.c» 21 Sep 2012 21:58:44 -0000»
1.118 | |
257 +++ mozilla/security/nss/lib/nss/nssinit.c» 22 Sep 2012 15:22:31 -0000 | |
258 @@ -18,19 +18,21 @@ | |
259 #include "key.h" | 239 #include "key.h" |
260 #include "secmod.h" | 240 #include "secmod.h" |
261 #include "secoid.h" | 241 #include "secoid.h" |
262 #include "nss.h" | 242 #include "nss.h" |
263 #include "pk11func.h" | 243 #include "pk11func.h" |
264 #include "secerr.h" | 244 #include "secerr.h" |
265 #include "nssbase.h" | 245 #include "nssbase.h" |
266 #include "nssutil.h" | 246 #include "nssutil.h" |
267 +#ifndef NSS_DISABLE_LIBPKIX | 247 +#ifndef NSS_DISABLE_LIBPKIX |
268 #include "pkixt.h" | 248 #include "pkixt.h" |
269 #include "pkix.h" | 249 #include "pkix.h" |
270 #include "pkix_tools.h" | 250 #include "pkix_tools.h" |
271 +#endif /* NSS_DISABLE_LIBPKIX */ | 251 +#endif /* NSS_DISABLE_LIBPKIX */ |
272 | 252 |
273 #include "pki3hack.h" | 253 #include "pki3hack.h" |
274 #include "certi.h" | 254 #include "certi.h" |
275 #include "secmodi.h" | 255 #include "secmodi.h" |
276 #include "ocspti.h" | 256 #include "ocspti.h" |
277 #include "ocspi.h" | 257 #include "ocspi.h" |
278 #include "utilpars.h" | 258 #include "utilpars.h" |
279 | 259 |
280 @@ -528,18 +530,20 @@ nss_Init(const char *configdir, const ch | 260 @@ -526,18 +528,20 @@ |
281 NSSInitParameters *initParams, | 261 NSSInitParameters *initParams, |
282 PRBool readOnly, PRBool noCertDB, | 262 PRBool readOnly, PRBool noCertDB, |
283 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, | 263 PRBool noModDB, PRBool forceOpen, PRBool noRootInit, |
284 PRBool optimizeSpace, PRBool noSingleThreadedModules, | 264 PRBool optimizeSpace, PRBool noSingleThreadedModules, |
285 PRBool allowAlreadyInitializedModules, | 265 PRBool allowAlreadyInitializedModules, |
286 PRBool dontFinalizeModules) | 266 PRBool dontFinalizeModules) |
287 { | 267 { |
288 SECStatus rv = SECFailure; | 268 SECStatus rv = SECFailure; |
289 +#ifndef NSS_DISABLE_LIBPKIX | 269 +#ifndef NSS_DISABLE_LIBPKIX |
290 PKIX_UInt32 actualMinorVersion = 0; | 270 PKIX_UInt32 actualMinorVersion = 0; |
291 PKIX_Error *pkixError = NULL; | 271 PKIX_Error *pkixError = NULL; |
292 +#endif | 272 +#endif |
293 PRBool isReallyInitted; | 273 PRBool isReallyInitted; |
294 char *configStrings = NULL; | 274 char *configStrings = NULL; |
295 char *configName = NULL; | 275 char *configName = NULL; |
296 PRBool passwordRequired = PR_FALSE; | 276 PRBool passwordRequired = PR_FALSE; |
297 | 277 |
298 /* if we are trying to init with a traditional NSS_Init call, maintain | 278 /* if we are trying to init with a traditional NSS_Init call, maintain |
299 * the traditional idempotent behavior. */ | 279 * the traditional idempotent behavior. */ |
300 if (!initContextPtr && nssIsInitted) { | 280 if (!initContextPtr && nssIsInitted) { |
301 @@ -680,28 +684,30 @@ nss_Init(const char *configdir, const ch | 281 @@ -681,28 +685,30 @@ |
302 nss_FindExternalRoot(dbpath, secmodName); | 282 nss_FindExternalRoot(dbpath, secmodName); |
303 } | 283 } |
304 } | 284 } |
305 } | 285 } |
306 | 286 |
307 pk11sdr_Init(); | 287 pk11sdr_Init(); |
308 cert_CreateSubjectKeyIDHashTable(); | 288 cert_CreateSubjectKeyIDHashTable(); |
309 | 289 |
310 +#ifndef NSS_DISABLE_LIBPKIX | 290 +#ifndef NSS_DISABLE_LIBPKIX |
311 pkixError = PKIX_Initialize | 291 pkixError = PKIX_Initialize |
(...skipping 10 matching lines...) Expand all Loading... |
322 } | 302 } |
323 +#endif /* NSS_DISABLE_LIBPKIX */ | 303 +#endif /* NSS_DISABLE_LIBPKIX */ |
324 | 304 |
325 | 305 |
326 } | 306 } |
327 | 307 |
328 /* | 308 /* |
329 * Now mark the appropriate init state. If initContextPtr was passed | 309 * Now mark the appropriate init state. If initContextPtr was passed |
330 * in, then return the new context pointer and add it to the | 310 * in, then return the new context pointer and add it to the |
331 * nssInitContextList. Otherwise set the global nss_isInitted flag | 311 * nssInitContextList. Otherwise set the global nss_isInitted flag |
332 @@ -1065,17 +1071,19 @@ nss_Shutdown(void) | 312 @@ -1077,17 +1083,19 @@ |
333 | 313 |
334 rv = nss_ShutdownShutdownList(); | 314 rv = nss_ShutdownShutdownList(); |
335 if (rv != SECSuccess) { | 315 if (rv != SECSuccess) { |
336 shutdownRV = SECFailure; | 316 shutdownRV = SECFailure; |
337 } | 317 } |
338 cert_DestroyLocks(); | 318 cert_DestroyLocks(); |
339 ShutdownCRLCache(); | 319 ShutdownCRLCache(); |
340 OCSP_ShutdownGlobal(); | 320 OCSP_ShutdownGlobal(); |
341 +#ifndef NSS_DISABLE_LIBPKIX | 321 +#ifndef NSS_DISABLE_LIBPKIX |
342 PKIX_Shutdown(plContext); | 322 PKIX_Shutdown(plContext); |
343 +#endif | 323 +#endif |
344 SECOID_Shutdown(); | 324 SECOID_Shutdown(); |
345 status = STAN_Shutdown(); | 325 status = STAN_Shutdown(); |
346 cert_DestroySubjectKeyIDHashTable(); | 326 cert_DestroySubjectKeyIDHashTable(); |
347 pk11_SetInternalKeySlot(NULL); | 327 pk11_SetInternalKeySlot(NULL); |
348 rv = SECMOD_Shutdown(); | 328 rv = SECMOD_Shutdown(); |
349 if (rv != SECSuccess) { | 329 if (rv != SECSuccess) { |
350 shutdownRV = SECFailure; | 330 shutdownRV = SECFailure; |
351 } | 331 } |
352 Index: mozilla/security/nss/lib/pk11wrap/pk11load.c | 332 diff -r 3f0105dfc733 lib/pk11wrap/pk11load.c |
353 =================================================================== | 333 --- a/lib/pk11wrap/pk11load.c» Mon Apr 22 14:22:48 2013 +0200 |
354 RCS file: /cvsroot/mozilla/security/nss/lib/pk11wrap/pk11load.c,v | 334 +++ b/lib/pk11wrap/pk11load.c» Mon Apr 22 14:33:38 2013 -0700 |
355 retrieving revision 1.36 | 335 @@ -313,46 +313,55 @@ |
356 diff -p -u -8 -r1.36 pk11load.c | |
357 --- mozilla/security/nss/lib/pk11wrap/pk11load.c» 26 Jun 2012 22:27:30 -00
00» 1.36 | |
358 +++ mozilla/security/nss/lib/pk11wrap/pk11load.c» 22 Sep 2012 15:22:31 -00
00 | |
359 @@ -313,46 +313,55 @@ SECMOD_SetRootCerts(PK11SlotInfo *slot, | |
360 mod->slotInfo = psi_list; | 336 mod->slotInfo = psi_list; |
361 mod->slotInfoCount++; | 337 mod->slotInfoCount++; |
362 | 338 |
363 } | 339 } |
364 psi->hasRootCerts = 1; | 340 psi->hasRootCerts = 1; |
365 } | 341 } |
366 } | 342 } |
367 | 343 |
368 +#ifdef NSS_STATIC | 344 +#ifdef NSS_STATIC |
369 +extern CK_RV NSC_GetFunctionList(CK_FUNCTION_LIST_PTR *pFunctionList); | 345 +extern CK_RV NSC_GetFunctionList(CK_FUNCTION_LIST_PTR *pFunctionList); |
(...skipping 35 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
405 } | 381 } |
406 +#endif /* !NSS_STATIC */ | 382 +#endif /* !NSS_STATIC */ |
407 | 383 |
408 /* | 384 /* |
409 * load a new module into our address space and initialize it. | 385 * load a new module into our address space and initialize it. |
410 */ | 386 */ |
411 SECStatus | 387 SECStatus |
412 secmod_LoadPKCS11Module(SECMODModule *mod, SECMODModule **oldModule) { | 388 secmod_LoadPKCS11Module(SECMODModule *mod, SECMODModule **oldModule) { |
413 PRLibrary *library = NULL; | 389 PRLibrary *library = NULL; |
414 CK_C_GetFunctionList entry = NULL; | 390 CK_C_GetFunctionList entry = NULL; |
415 @@ -361,16 +370,26 @@ secmod_LoadPKCS11Module(SECMODModule *mo | 391 @@ -361,16 +370,26 @@ |
416 SECStatus rv; | 392 SECStatus rv; |
417 PRBool alreadyLoaded = PR_FALSE; | 393 PRBool alreadyLoaded = PR_FALSE; |
418 char *disableUnload = NULL; | 394 char *disableUnload = NULL; |
419 | 395 |
420 if (mod->loaded) return SECSuccess; | 396 if (mod->loaded) return SECSuccess; |
421 | 397 |
422 /* intenal modules get loaded from their internal list */ | 398 /* intenal modules get loaded from their internal list */ |
423 if (mod->internal && (mod->dllName == NULL)) { | 399 if (mod->internal && (mod->dllName == NULL)) { |
424 +#ifdef NSS_STATIC | 400 +#ifdef NSS_STATIC |
425 + if (mod->isFIPS) { | 401 + if (mod->isFIPS) { |
426 + entry = FC_GetFunctionList; | 402 + entry = FC_GetFunctionList; |
427 + } else { | 403 + } else { |
428 + entry = NSC_GetFunctionList; | 404 + entry = NSC_GetFunctionList; |
429 + } | 405 + } |
430 + if (mod->isModuleDB) { | 406 + if (mod->isModuleDB) { |
431 + mod->moduleDBFunc = NSC_ModuleDBFunc; | 407 + mod->moduleDBFunc = NSC_ModuleDBFunc; |
432 + } | 408 + } |
433 +#else | 409 +#else |
434 /* | 410 /* |
435 * Loads softoken as a dynamic library, | 411 * Loads softoken as a dynamic library, |
436 * even though the rest of NSS assumes this as the "internal" module. | 412 * even though the rest of NSS assumes this as the "internal" module. |
437 */ | 413 */ |
438 if (!softokenLib && | 414 if (!softokenLib && |
439 PR_SUCCESS != PR_CallOnce(&loadSoftokenOnce, &softoken_LoadDSO)) | 415 PR_SUCCESS != PR_CallOnce(&loadSoftokenOnce, &softoken_LoadDSO)) |
440 return SECFailure; | 416 return SECFailure; |
441 | 417 |
442 @@ -386,26 +405,36 @@ secmod_LoadPKCS11Module(SECMODModule *mo | 418 @@ -386,26 +405,36 @@ |
443 | 419 |
444 if (!entry) | 420 if (!entry) |
445 return SECFailure; | 421 return SECFailure; |
446 | 422 |
447 if (mod->isModuleDB) { | 423 if (mod->isModuleDB) { |
448 mod->moduleDBFunc = (CK_C_GetFunctionList) | 424 mod->moduleDBFunc = (CK_C_GetFunctionList) |
449 PR_FindSymbol(softokenLib, "NSC_ModuleDBFunc"); | 425 PR_FindSymbol(softokenLib, "NSC_ModuleDBFunc"); |
450 } | 426 } |
451 +#endif | 427 +#endif |
452 | 428 |
(...skipping 16 matching lines...) Expand all Loading... |
469 + } | 445 + } |
470 +#endif | 446 +#endif |
471 | 447 |
472 /* load the library. If this succeeds, then we have to remember to | 448 /* load the library. If this succeeds, then we have to remember to |
473 * unload the library if anything goes wrong from here on out... | 449 * unload the library if anything goes wrong from here on out... |
474 */ | 450 */ |
475 library = PR_LoadLibrary(mod->dllName); | 451 library = PR_LoadLibrary(mod->dllName); |
476 mod->library = (void *)library; | 452 mod->library = (void *)library; |
477 | 453 |
478 if (library == NULL) { | 454 if (library == NULL) { |
479 @@ -418,16 +447,19 @@ secmod_LoadPKCS11Module(SECMODModule *mo | 455 @@ -418,16 +447,19 @@ |
480 if (!mod->moduleDBOnly) { | 456 if (!mod->moduleDBOnly) { |
481 entry = (CK_C_GetFunctionList) | 457 entry = (CK_C_GetFunctionList) |
482 PR_FindSymbol(library, "C_GetFunctionList"); | 458 PR_FindSymbol(library, "C_GetFunctionList"); |
483 } | 459 } |
484 if (mod->isModuleDB) { | 460 if (mod->isModuleDB) { |
485 mod->moduleDBFunc = (void *) | 461 mod->moduleDBFunc = (void *) |
486 PR_FindSymbol(library, "NSS_ReturnModuleSpecData"); | 462 PR_FindSymbol(library, "NSS_ReturnModuleSpecData"); |
487 } | 463 } |
488 +#if defined(NSS_STATIC) && !defined(NSS_DISABLE_ROOT_CERTS) | 464 +#if defined(NSS_STATIC) && !defined(NSS_DISABLE_ROOT_CERTS) |
489 +library_loaded: | 465 +library_loaded: |
490 +#endif | 466 +#endif |
491 if (mod->moduleDBFunc == NULL) mod->isModuleDB = PR_FALSE; | 467 if (mod->moduleDBFunc == NULL) mod->isModuleDB = PR_FALSE; |
492 if (entry == NULL) { | 468 if (entry == NULL) { |
493 if (mod->isModuleDB) { | 469 if (mod->isModuleDB) { |
494 mod->loaded = PR_TRUE; | 470 mod->loaded = PR_TRUE; |
495 mod->moduleDBOnly = PR_TRUE; | 471 mod->moduleDBOnly = PR_TRUE; |
496 return SECSuccess; | 472 return SECSuccess; |
497 } | 473 } |
498 PR_UnloadLibrary(library); | 474 PR_UnloadLibrary(library); |
499 @@ -557,33 +589,40 @@ SECMOD_UnloadModule(SECMODModule *mod) { | 475 @@ -557,33 +589,40 @@ |
500 } | 476 } |
501 mod->moduleID = 0; | 477 mod->moduleID = 0; |
502 mod->loaded = PR_FALSE; | 478 mod->loaded = PR_FALSE; |
503 | 479 |
504 /* do we want the semantics to allow unloading the internal library? | 480 /* do we want the semantics to allow unloading the internal library? |
505 * if not, we should change this to SECFailure and move it above the | 481 * if not, we should change this to SECFailure and move it above the |
506 * mod->loaded = PR_FALSE; */ | 482 * mod->loaded = PR_FALSE; */ |
507 if (mod->internal && (mod->dllName == NULL)) { | 483 if (mod->internal && (mod->dllName == NULL)) { |
508 +#ifndef NSS_STATIC | 484 +#ifndef NSS_STATIC |
509 if (0 == PR_ATOMIC_DECREMENT(&softokenLoadCount)) { | 485 if (0 == PR_ATOMIC_DECREMENT(&softokenLoadCount)) { |
(...skipping 20 matching lines...) Expand all Loading... |
530 + } | 506 + } |
531 +#endif | 507 +#endif |
532 return SECFailure; | 508 return SECFailure; |
533 } | 509 } |
534 | 510 |
535 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | 511 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); |
536 if (!disableUnload) { | 512 if (!disableUnload) { |
537 PR_UnloadLibrary(library); | 513 PR_UnloadLibrary(library); |
538 } | 514 } |
539 return SECSuccess; | 515 return SECSuccess; |
540 Index: mozilla/security/nss/lib/softoken/lgglue.c | 516 diff -r 3f0105dfc733 lib/softoken/lgglue.c |
541 =================================================================== | 517 --- a/lib/softoken/lgglue.c» Mon Apr 22 14:22:48 2013 +0200 |
542 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.c,v | 518 +++ b/lib/softoken/lgglue.c» Mon Apr 22 14:33:38 2013 -0700 |
543 retrieving revision 1.14 | |
544 diff -p -u -8 -r1.14 lgglue.c | |
545 --- mozilla/security/nss/lib/softoken/lgglue.c» 25 Apr 2012 14:50:10 -0000»
1.14 | |
546 +++ mozilla/security/nss/lib/softoken/lgglue.c» 22 Sep 2012 15:22:32 -0000 | |
547 @@ -18,16 +18,17 @@ | 519 @@ -18,16 +18,17 @@ |
548 | 520 |
549 static LGOpenFunc legacy_glue_open = NULL; | 521 static LGOpenFunc legacy_glue_open = NULL; |
550 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; | 522 static LGReadSecmodFunc legacy_glue_readSecmod = NULL; |
551 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; | 523 static LGReleaseSecmodFunc legacy_glue_releaseSecmod = NULL; |
552 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; | 524 static LGDeleteSecmodFunc legacy_glue_deleteSecmod = NULL; |
553 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; | 525 static LGAddSecmodFunc legacy_glue_addSecmod = NULL; |
554 static LGShutdownFunc legacy_glue_shutdown = NULL; | 526 static LGShutdownFunc legacy_glue_shutdown = NULL; |
555 | 527 |
556 +#ifndef NSS_STATIC | 528 +#ifndef NSS_STATIC |
557 /* | 529 /* |
558 * The following 3 functions duplicate the work done by bl_LoadLibrary. | 530 * The following 3 functions duplicate the work done by bl_LoadLibrary. |
559 * We should make bl_LoadLibrary a global and replace the call to | 531 * We should make bl_LoadLibrary a global and replace the call to |
560 * sftkdb_LoadLibrary(const char *libname) with it. | 532 * sftkdb_LoadLibrary(const char *libname) with it. |
561 */ | 533 */ |
562 #ifdef XP_UNIX | 534 #ifdef XP_UNIX |
563 #include <unistd.h> | 535 #include <unistd.h> |
564 #define LG_MAX_LINKS 20 | 536 #define LG_MAX_LINKS 20 |
565 @@ -155,16 +156,17 @@ done: | 537 @@ -155,16 +156,17 @@ |
566 PRLibSpec libSpec; | 538 PRLibSpec libSpec; |
567 libSpec.type = PR_LibSpec_Pathname; | 539 libSpec.type = PR_LibSpec_Pathname; |
568 libSpec.value.pathname = libname; | 540 libSpec.value.pathname = libname; |
569 lib = PR_LoadLibraryWithFlags(libSpec, PR_LD_NOW | PR_LD_LOCAL); | 541 lib = PR_LoadLibraryWithFlags(libSpec, PR_LD_NOW | PR_LD_LOCAL); |
570 } | 542 } |
571 | 543 |
572 return lib; | 544 return lib; |
573 } | 545 } |
574 +#endif /* STATIC LIBRARIES */ | 546 +#endif /* STATIC LIBRARIES */ |
575 | 547 |
576 /* | 548 /* |
577 * stub files for legacy db's to be able to encrypt and decrypt | 549 * stub files for legacy db's to be able to encrypt and decrypt |
578 * various keys and attributes. | 550 * various keys and attributes. |
579 */ | 551 */ |
580 static SECStatus | 552 static SECStatus |
581 sftkdb_encrypt_stub(PRArenaPool *arena, SDB *sdb, SECItem *plainText, | 553 sftkdb_encrypt_stub(PRArenaPool *arena, SDB *sdb, SECItem *plainText, |
582 SECItem **cipherText) | 554 SECItem **cipherText) |
583 @@ -267,16 +269,31 @@ sftkdbLoad_Legacy(PRBool isFIPS) | 555 @@ -267,16 +269,31 @@ |
584 * get cleared in shutdown */ | 556 * get cleared in shutdown */ |
585 return SECFailure; | 557 return SECFailure; |
586 } | 558 } |
587 legacy_glue_libCheckSucceeded = PR_TRUE; | 559 legacy_glue_libCheckSucceeded = PR_TRUE; |
588 } | 560 } |
589 return SECSuccess; | 561 return SECSuccess; |
590 } | 562 } |
591 | 563 |
592 +#ifdef NSS_STATIC | 564 +#ifdef NSS_STATIC |
593 +#ifdef NSS_DISABLE_DBM | 565 +#ifdef NSS_DISABLE_DBM |
(...skipping 11 matching lines...) Expand all Loading... |
605 +#endif | 577 +#endif |
606 +#else | 578 +#else |
607 lib = sftkdb_LoadLibrary(LEGACY_LIB_NAME); | 579 lib = sftkdb_LoadLibrary(LEGACY_LIB_NAME); |
608 if (lib == NULL) { | 580 if (lib == NULL) { |
609 return SECFailure; | 581 return SECFailure; |
610 } | 582 } |
611 | 583 |
612 legacy_glue_open = (LGOpenFunc)PR_FindFunctionSymbol(lib, "legacy_Open"); | 584 legacy_glue_open = (LGOpenFunc)PR_FindFunctionSymbol(lib, "legacy_Open"); |
613 legacy_glue_readSecmod = (LGReadSecmodFunc) PR_FindFunctionSymbol(lib, | 585 legacy_glue_readSecmod = (LGReadSecmodFunc) PR_FindFunctionSymbol(lib, |
614 "legacy_ReadSecmodDB"); | 586 "legacy_ReadSecmodDB"); |
615 @@ -292,21 +309,24 @@ sftkdbLoad_Legacy(PRBool isFIPS) | 587 @@ -292,21 +309,24 @@ |
616 "legacy_SetCryptFunctions"); | 588 "legacy_SetCryptFunctions"); |
617 | 589 |
618 if (!legacy_glue_open || !legacy_glue_readSecmod || | 590 if (!legacy_glue_open || !legacy_glue_readSecmod || |
619 !legacy_glue_releaseSecmod || !legacy_glue_deleteSecmod || | 591 !legacy_glue_releaseSecmod || !legacy_glue_deleteSecmod || |
620 !legacy_glue_addSecmod || !setCryptFunction) { | 592 !legacy_glue_addSecmod || !setCryptFunction) { |
621 PR_UnloadLibrary(lib); | 593 PR_UnloadLibrary(lib); |
622 return SECFailure; | 594 return SECFailure; |
623 } | 595 } |
624 +#endif /* NSS_STATIC */ | 596 +#endif /* NSS_STATIC */ |
625 | 597 |
626 /* verify the loaded library if we are in FIPS mode */ | 598 /* verify the loaded library if we are in FIPS mode */ |
627 if (isFIPS) { | 599 if (isFIPS) { |
628 if (!BLAPI_SHVerify(LEGACY_LIB_NAME,(PRFuncPtr)legacy_glue_open)) { | 600 if (!BLAPI_SHVerify(LEGACY_LIB_NAME,(PRFuncPtr)legacy_glue_open)) { |
629 +#ifndef NSS_STATIC | 601 +#ifndef NSS_STATIC |
630 PR_UnloadLibrary(lib); | 602 PR_UnloadLibrary(lib); |
631 +#endif | 603 +#endif |
632 return SECFailure; | 604 return SECFailure; |
633 } | 605 } |
634 legacy_glue_libCheckSucceeded = PR_TRUE; | 606 legacy_glue_libCheckSucceeded = PR_TRUE; |
635 } | 607 } |
636 | 608 |
637 setCryptFunction(sftkdb_encrypt_stub,sftkdb_decrypt_stub); | 609 setCryptFunction(sftkdb_encrypt_stub,sftkdb_decrypt_stub); |
638 legacy_glue_lib = lib; | 610 legacy_glue_lib = lib; |
639 return SECSuccess; | 611 return SECSuccess; |
640 @@ -413,20 +433,22 @@ sftkdbCall_Shutdown(void) | 612 @@ -413,20 +433,22 @@ |
641 return CKR_OK; | 613 return CKR_OK; |
642 } | 614 } |
643 if (legacy_glue_shutdown) { | 615 if (legacy_glue_shutdown) { |
644 #ifdef NO_FORK_CHECK | 616 #ifdef NO_FORK_CHECK |
645 PRBool parentForkedAfterC_Initialize = PR_FALSE; | 617 PRBool parentForkedAfterC_Initialize = PR_FALSE; |
646 #endif | 618 #endif |
647 crv = (*legacy_glue_shutdown)(parentForkedAfterC_Initialize); | 619 crv = (*legacy_glue_shutdown)(parentForkedAfterC_Initialize); |
648 } | 620 } |
649 +#ifndef NSS_STATIC | 621 +#ifndef NSS_STATIC |
650 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | 622 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); |
651 if (!disableUnload) { | 623 if (!disableUnload) { |
652 PR_UnloadLibrary(legacy_glue_lib); | 624 PR_UnloadLibrary(legacy_glue_lib); |
653 } | 625 } |
654 +#endif | 626 +#endif |
655 legacy_glue_lib = NULL; | 627 legacy_glue_lib = NULL; |
656 legacy_glue_open = NULL; | 628 legacy_glue_open = NULL; |
657 legacy_glue_readSecmod = NULL; | 629 legacy_glue_readSecmod = NULL; |
658 legacy_glue_releaseSecmod = NULL; | 630 legacy_glue_releaseSecmod = NULL; |
659 legacy_glue_deleteSecmod = NULL; | 631 legacy_glue_deleteSecmod = NULL; |
660 legacy_glue_addSecmod = NULL; | 632 legacy_glue_addSecmod = NULL; |
661 legacy_glue_libCheckFailed = PR_FALSE; | 633 legacy_glue_libCheckFailed = PR_FALSE; |
662 legacy_glue_libCheckSucceeded = PR_FALSE; | 634 legacy_glue_libCheckSucceeded = PR_FALSE; |
663 Index: mozilla/security/nss/lib/softoken/lgglue.h | 635 diff -r 3f0105dfc733 lib/softoken/lgglue.h |
664 =================================================================== | 636 --- a/lib/softoken/lgglue.h» Mon Apr 22 14:22:48 2013 +0200 |
665 RCS file: /cvsroot/mozilla/security/nss/lib/softoken/lgglue.h,v | 637 +++ b/lib/softoken/lgglue.h» Mon Apr 22 14:33:38 2013 -0700 |
666 retrieving revision 1.5 | 638 @@ -33,16 +33,35 @@ |
667 diff -p -u -8 -r1.5 lgglue.h | |
668 --- mozilla/security/nss/lib/softoken/lgglue.h» 25 Apr 2012 14:50:10 -0000»
1.5 | |
669 +++ mozilla/security/nss/lib/softoken/lgglue.h» 22 Sep 2012 15:22:32 -0000 | |
670 @@ -33,16 +33,35 @@ typedef SECStatus (*LGDeleteSecmodFunc)( | |
671 const char *dbname, char *params, PRBool rw); | 639 const char *dbname, char *params, PRBool rw); |
672 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, | 640 typedef SECStatus (*LGAddSecmodFunc)(const char *appName, |
673 const char *filename, | 641 const char *filename, |
674 const char *dbname, char *params, PRBool rw); | 642 const char *dbname, char *params, PRBool rw); |
675 typedef SECStatus (*LGShutdownFunc)(PRBool forked); | 643 typedef SECStatus (*LGShutdownFunc)(PRBool forked); |
676 typedef void (*LGSetForkStateFunc)(PRBool); | 644 typedef void (*LGSetForkStateFunc)(PRBool); |
677 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); | 645 typedef void (*LGSetCryptFunc)(LGEncryptFunc, LGDecryptFunc); |
678 | 646 |
679 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, | 647 +extern CK_RV legacy_Open(const char *dir, const char *certPrefix, |
680 + const char *keyPrefix, | 648 + const char *keyPrefix, |
(...skipping 15 matching lines...) Expand all Loading... |
696 +extern void legacy_SetCryptFunctions(LGEncryptFunc, LGDecryptFunc); | 664 +extern void legacy_SetCryptFunctions(LGEncryptFunc, LGDecryptFunc); |
697 + | 665 + |
698 /* | 666 /* |
699 * Softoken Glue Functions | 667 * Softoken Glue Functions |
700 */ | 668 */ |
701 CK_RV sftkdbCall_open(const char *dir, const char *certPrefix, | 669 CK_RV sftkdbCall_open(const char *dir, const char *certPrefix, |
702 const char *keyPrefix, | 670 const char *keyPrefix, |
703 int certVersion, int keyVersion, int flags, PRBool isFIPS, | 671 int certVersion, int keyVersion, int flags, PRBool isFIPS, |
704 SDB **certDB, SDB **keyDB); | 672 SDB **certDB, SDB **keyDB); |
705 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, | 673 char ** sftkdbCall_ReadSecmodDB(const char *appName, const char *filename, |
706 Index: mozilla/security/nss/lib/util/secport.h | 674 diff -r 3f0105dfc733 lib/util/secport.h |
707 =================================================================== | 675 --- a/lib/util/secport.h» Mon Apr 22 14:22:48 2013 +0200 |
708 RCS file: /cvsroot/mozilla/security/nss/lib/util/secport.h,v | 676 +++ b/lib/util/secport.h» Mon Apr 22 14:33:38 2013 -0700 |
709 retrieving revision 1.28 | 677 @@ -207,16 +207,17 @@ |
710 diff -p -u -8 -r1.28 secport.h | |
711 --- mozilla/security/nss/lib/util/secport.h» 25 Apr 2012 14:50:16 -0000»
1.28 | |
712 +++ mozilla/security/nss/lib/util/secport.h» 22 Sep 2012 15:22:32 -0000 | |
713 @@ -216,16 +216,17 @@ sec_port_iso88591_utf8_conversion_functi | |
714 unsigned int maxOutBufLen, | 678 unsigned int maxOutBufLen, |
715 unsigned int *outBufLen | 679 unsigned int *outBufLen |
716 ); | 680 ); |
717 | 681 |
718 extern int NSS_PutEnv(const char * envVarName, const char * envValue); | 682 extern int NSS_PutEnv(const char * envVarName, const char * envValue); |
719 | 683 |
720 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); | 684 extern int NSS_SecureMemcmp(const void *a, const void *b, size_t n); |
721 | 685 |
722 +#ifndef NSS_STATIC | 686 +#ifndef NSS_STATIC |
723 /* | 687 /* |
724 * Load a shared library called "newShLibName" in the same directory as | 688 * Load a shared library called "newShLibName" in the same directory as |
725 * a shared library that is already loaded, called existingShLibName. | 689 * a shared library that is already loaded, called existingShLibName. |
726 * A pointer to a static function in that shared library, | 690 * A pointer to a static function in that shared library, |
727 * staticShLibFunc, is required. | 691 * staticShLibFunc, is required. |
728 * | 692 * |
729 * existingShLibName: | 693 * existingShLibName: |
730 * The file name of the shared library that shall be used as the | 694 * The file name of the shared library that shall be used as the |
731 @@ -250,12 +251,13 @@ extern int NSS_SecureMemcmp(const void * | 695 @@ -241,12 +242,13 @@ |
732 * | 696 * |
733 * If the new shared library is not found in the same location as the reference | 697 * If the new shared library is not found in the same location as the reference |
734 * library, it will then be loaded from the normal system library path. | 698 * library, it will then be loaded from the normal system library path. |
735 */ | 699 */ |
736 PRLibrary * | 700 PRLibrary * |
737 PORT_LoadLibraryFromOrigin(const char* existingShLibName, | 701 PORT_LoadLibraryFromOrigin(const char* existingShLibName, |
738 PRFuncPtr staticShLibFunc, | 702 PRFuncPtr staticShLibFunc, |
739 const char *newShLibName); | 703 const char *newShLibName); |
740 +#endif /* NSS_STATIC */ | 704 +#endif /* NSS_STATIC */ |
741 | 705 |
742 SEC_END_PROTOS | 706 SEC_END_PROTOS |
743 | 707 |
744 #endif /* _SECPORT_H_ */ | 708 #endif /* _SECPORT_H_ */ |
OLD | NEW |