OLD | NEW |
1 /* ***** BEGIN LICENSE BLOCK ***** | 1 /* ***** BEGIN LICENSE BLOCK ***** |
2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 | 2 * Version: MPL 1.1/GPL 2.0/LGPL 2.1 |
3 * | 3 * |
4 * The contents of this file are subject to the Mozilla Public License Version | 4 * The contents of this file are subject to the Mozilla Public License Version |
5 * 1.1 (the "License"); you may not use this file except in compliance with | 5 * 1.1 (the "License"); you may not use this file except in compliance with |
6 * the License. You may obtain a copy of the License at | 6 * the License. You may obtain a copy of the License at |
7 * http://www.mozilla.org/MPL/ | 7 * http://www.mozilla.org/MPL/ |
8 * | 8 * |
9 * Software distributed under the License is distributed on an "AS IS" basis, | 9 * Software distributed under the License is distributed on an "AS IS" basis, |
10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License | 10 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License |
(...skipping 25 matching lines...) Expand all Loading... |
36 * ***** END LICENSE BLOCK ***** */ | 36 * ***** END LICENSE BLOCK ***** */ |
37 | 37 |
38 #include "net/third_party/mozilla_security_manager/nsPKCS12Blob.h" | 38 #include "net/third_party/mozilla_security_manager/nsPKCS12Blob.h" |
39 | 39 |
40 #include <pk11pub.h> | 40 #include <pk11pub.h> |
41 #include <pkcs12.h> | 41 #include <pkcs12.h> |
42 #include <p12plcy.h> | 42 #include <p12plcy.h> |
43 #include <secerr.h> | 43 #include <secerr.h> |
44 | 44 |
45 #include "base/crypto/scoped_nss_types.h" | 45 #include "base/crypto/scoped_nss_types.h" |
| 46 #include "base/lazy_instance.h" |
46 #include "base/logging.h" | 47 #include "base/logging.h" |
47 #include "base/nss_util_internal.h" | 48 #include "base/nss_util_internal.h" |
48 #include "base/singleton.h" | |
49 #include "base/string_util.h" | 49 #include "base/string_util.h" |
50 #include "net/base/net_errors.h" | 50 #include "net/base/net_errors.h" |
51 #include "net/base/x509_certificate.h" | 51 #include "net/base/x509_certificate.h" |
52 | 52 |
53 namespace mozilla_security_manager { | 53 namespace mozilla_security_manager { |
54 | 54 |
55 namespace { | 55 namespace { |
56 | 56 |
57 // unicodeToItem | 57 // unicodeToItem |
58 // | 58 // |
(...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
245 SEC_PKCS12EnableCipher(PKCS12_DES_EDE3_168, 1); | 245 SEC_PKCS12EnableCipher(PKCS12_DES_EDE3_168, 1); |
246 SEC_PKCS12SetPreferredCipher(PKCS12_DES_EDE3_168, 1); | 246 SEC_PKCS12SetPreferredCipher(PKCS12_DES_EDE3_168, 1); |
247 | 247 |
248 // Set no-op ascii-ucs2 conversion function to work around weird NSS | 248 // Set no-op ascii-ucs2 conversion function to work around weird NSS |
249 // interface. Thankfully, PKCS12 appears to be the only thing in NSS that | 249 // interface. Thankfully, PKCS12 appears to be the only thing in NSS that |
250 // uses PORT_UCS2_ASCIIConversion, so this doesn't break anything else. | 250 // uses PORT_UCS2_ASCIIConversion, so this doesn't break anything else. |
251 PORT_SetUCS2_ASCIIConversionFunction(pip_ucs2_ascii_conversion_fn); | 251 PORT_SetUCS2_ASCIIConversionFunction(pip_ucs2_ascii_conversion_fn); |
252 } | 252 } |
253 }; | 253 }; |
254 | 254 |
| 255 static base::LazyInstance<PKCS12InitSingleton> g_pkcs12_init_singleton( |
| 256 base::LINKER_INITIALIZED); |
| 257 |
255 } // namespace | 258 } // namespace |
256 | 259 |
257 void EnsurePKCS12Init() { | 260 void EnsurePKCS12Init() { |
258 Singleton<PKCS12InitSingleton>::get(); | 261 g_pkcs12_init_singleton.Get(); |
259 } | 262 } |
260 | 263 |
261 // Based on nsPKCS12Blob::ImportFromFile. | 264 // Based on nsPKCS12Blob::ImportFromFile. |
262 int nsPKCS12Blob_Import(const char* pkcs12_data, | 265 int nsPKCS12Blob_Import(const char* pkcs12_data, |
263 size_t pkcs12_len, | 266 size_t pkcs12_len, |
264 const string16& password) { | 267 const string16& password) { |
265 base::ScopedPK11Slot slot(base::GetDefaultNSSKeySlot()); | 268 base::ScopedPK11Slot slot(base::GetDefaultNSSKeySlot()); |
266 if (!slot.get()) { | 269 if (!slot.get()) { |
267 LOG(ERROR) << "Couldn't get Internal key slot!"; | 270 LOG(ERROR) << "Couldn't get Internal key slot!"; |
268 return net::ERR_PKCS12_IMPORT_FAILED; | 271 return net::ERR_PKCS12_IMPORT_FAILED; |
(...skipping 119 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
388 finish: | 391 finish: |
389 if (srv) | 392 if (srv) |
390 LOG(ERROR) << "PKCS#12 export failed with error " << PORT_GetError(); | 393 LOG(ERROR) << "PKCS#12 export failed with error " << PORT_GetError(); |
391 if (ecx) | 394 if (ecx) |
392 SEC_PKCS12DestroyExportContext(ecx); | 395 SEC_PKCS12DestroyExportContext(ecx); |
393 SECITEM_ZfreeItem(&unicodePw, PR_FALSE); | 396 SECITEM_ZfreeItem(&unicodePw, PR_FALSE); |
394 return return_count; | 397 return return_count; |
395 } | 398 } |
396 | 399 |
397 } // namespace mozilla_security_manager | 400 } // namespace mozilla_security_manager |
OLD | NEW |