| OLD | NEW |
| (Empty) |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public | |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this | |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | |
| 4 /* | |
| 5 * The following handles the loading, unloading and management of | |
| 6 * various PCKS #11 modules | |
| 7 */ | |
| 8 #define FORCE_PR_LOG 1 | |
| 9 #include "seccomon.h" | |
| 10 #include "pkcs11.h" | |
| 11 #include "secmod.h" | |
| 12 #include "prlink.h" | |
| 13 #include "pk11func.h" | |
| 14 #include "secmodi.h" | |
| 15 #include "secmodti.h" | |
| 16 #include "nssilock.h" | |
| 17 #include "secerr.h" | |
| 18 #include "prenv.h" | |
| 19 #include "utilparst.h" | |
| 20 | |
| 21 #define DEBUG_MODULE 1 | |
| 22 | |
| 23 #ifdef DEBUG_MODULE | |
| 24 static char *modToDBG = NULL; | |
| 25 | |
| 26 #include "debug_module.c" | |
| 27 #endif | |
| 28 | |
| 29 /* build the PKCS #11 2.01 lock files */ | |
| 30 CK_RV PR_CALLBACK secmodCreateMutext(CK_VOID_PTR_PTR pmutex) { | |
| 31 *pmutex = (CK_VOID_PTR) PZ_NewLock(nssILockOther); | |
| 32 if ( *pmutex ) return CKR_OK; | |
| 33 return CKR_HOST_MEMORY; | |
| 34 } | |
| 35 | |
| 36 CK_RV PR_CALLBACK secmodDestroyMutext(CK_VOID_PTR mutext) { | |
| 37 PZ_DestroyLock((PZLock *)mutext); | |
| 38 return CKR_OK; | |
| 39 } | |
| 40 | |
| 41 CK_RV PR_CALLBACK secmodLockMutext(CK_VOID_PTR mutext) { | |
| 42 PZ_Lock((PZLock *)mutext); | |
| 43 return CKR_OK; | |
| 44 } | |
| 45 | |
| 46 CK_RV PR_CALLBACK secmodUnlockMutext(CK_VOID_PTR mutext) { | |
| 47 PZ_Unlock((PZLock *)mutext); | |
| 48 return CKR_OK; | |
| 49 } | |
| 50 | |
| 51 static SECMODModuleID nextModuleID = 1; | |
| 52 static const CK_C_INITIALIZE_ARGS secmodLockFunctions = { | |
| 53 secmodCreateMutext, secmodDestroyMutext, secmodLockMutext, | |
| 54 secmodUnlockMutext, CKF_LIBRARY_CANT_CREATE_OS_THREADS| | |
| 55 CKF_OS_LOCKING_OK | |
| 56 ,NULL | |
| 57 }; | |
| 58 | |
| 59 static PRBool loadSingleThreadedModules = PR_TRUE; | |
| 60 static PRBool enforceAlreadyInitializedError = PR_TRUE; | |
| 61 static PRBool finalizeModules = PR_TRUE; | |
| 62 | |
| 63 /* set global options for NSS PKCS#11 module loader */ | |
| 64 SECStatus pk11_setGlobalOptions(PRBool noSingleThreadedModules, | |
| 65 PRBool allowAlreadyInitializedModules, | |
| 66 PRBool dontFinalizeModules) | |
| 67 { | |
| 68 if (noSingleThreadedModules) { | |
| 69 loadSingleThreadedModules = PR_FALSE; | |
| 70 } else { | |
| 71 loadSingleThreadedModules = PR_TRUE; | |
| 72 } | |
| 73 if (allowAlreadyInitializedModules) { | |
| 74 enforceAlreadyInitializedError = PR_FALSE; | |
| 75 } else { | |
| 76 enforceAlreadyInitializedError = PR_TRUE; | |
| 77 } | |
| 78 if (dontFinalizeModules) { | |
| 79 finalizeModules = PR_FALSE; | |
| 80 } else { | |
| 81 finalizeModules = PR_TRUE; | |
| 82 } | |
| 83 return SECSuccess; | |
| 84 } | |
| 85 | |
| 86 PRBool pk11_getFinalizeModulesOption(void) | |
| 87 { | |
| 88 return finalizeModules; | |
| 89 } | |
| 90 | |
| 91 /* | |
| 92 * Allow specification loading the same module more than once at init time. | |
| 93 * This enables 2 things. | |
| 94 * | |
| 95 * 1) we can load additional databases by manipulating secmod.db/pkcs11.txt. | |
| 96 * 2) we can handle the case where some library has already initialized NSS | |
| 97 * before the main application. | |
| 98 * | |
| 99 * oldModule is the module we have already initialized. | |
| 100 * char *modulespec is the full module spec for the library we want to | |
| 101 * initialize. | |
| 102 */ | |
| 103 static SECStatus | |
| 104 secmod_handleReload(SECMODModule *oldModule, SECMODModule *newModule) | |
| 105 { | |
| 106 PK11SlotInfo *slot; | |
| 107 char *modulespec; | |
| 108 char *newModuleSpec; | |
| 109 char **children; | |
| 110 CK_SLOT_ID *ids; | |
| 111 SECMODConfigList *conflist = NULL; | |
| 112 SECStatus rv = SECFailure; | |
| 113 int count = 0; | |
| 114 | |
| 115 /* first look for tokens= key words from the module spec */ | |
| 116 modulespec = newModule->libraryParams; | |
| 117 newModuleSpec = secmod_ParseModuleSpecForTokens(PR_TRUE, | |
| 118 newModule->isFIPS, modulespec, &children, &ids); | |
| 119 if (!newModuleSpec) { | |
| 120 return SECFailure; | |
| 121 } | |
| 122 | |
| 123 /* | |
| 124 * We are now trying to open a new slot on an already loaded module. | |
| 125 * If that slot represents a cert/key database, we don't want to open | |
| 126 * multiple copies of that same database. Unfortunately we understand | |
| 127 * the softoken flags well enough to be able to do this, so we can only get | |
| 128 * the list of already loaded databases if we are trying to open another | |
| 129 * internal module. | |
| 130 */ | |
| 131 if (oldModule->internal) { | |
| 132 conflist = secmod_GetConfigList(oldModule->isFIPS, | |
| 133 oldModule->libraryParams, &count); | |
| 134 } | |
| 135 | |
| 136 | |
| 137 /* don't open multiple of the same db */ | |
| 138 if (conflist && secmod_MatchConfigList(newModuleSpec, conflist, count)) { | |
| 139 rv = SECSuccess; | |
| 140 goto loser; | |
| 141 } | |
| 142 slot = SECMOD_OpenNewSlot(oldModule, newModuleSpec); | |
| 143 if (slot) { | |
| 144 int newID; | |
| 145 char **thisChild; | |
| 146 CK_SLOT_ID *thisID; | |
| 147 char *oldModuleSpec; | |
| 148 | |
| 149 if (secmod_IsInternalKeySlot(newModule)) { | |
| 150 pk11_SetInternalKeySlotIfFirst(slot); | |
| 151 } | |
| 152 newID = slot->slotID; | |
| 153 PK11_FreeSlot(slot); | |
| 154 for (thisChild=children, thisID=ids; thisChild && *thisChild; | |
| 155 thisChild++,thisID++) { | |
| 156 if (conflist && | |
| 157 secmod_MatchConfigList(*thisChild, conflist, count)) { | |
| 158 *thisID = (CK_SLOT_ID) -1; | |
| 159 continue; | |
| 160 } | |
| 161 slot = SECMOD_OpenNewSlot(oldModule, *thisChild); | |
| 162 if (slot) { | |
| 163 *thisID = slot->slotID; | |
| 164 PK11_FreeSlot(slot); | |
| 165 } else { | |
| 166 *thisID = (CK_SLOT_ID) -1; | |
| 167 } | |
| 168 } | |
| 169 | |
| 170 /* update the old module initialization string in case we need to | |
| 171 * shutdown and reinit the whole mess (this is rare, but can happen | |
| 172 * when trying to stop smart card insertion/removal threads)... */ | |
| 173 oldModuleSpec = secmod_MkAppendTokensList(oldModule->arena, | |
| 174 oldModule->libraryParams, newModuleSpec, newID, | |
| 175 children, ids); | |
| 176 if (oldModuleSpec) { | |
| 177 oldModule->libraryParams = oldModuleSpec; | |
| 178 } | |
| 179 | |
| 180 rv = SECSuccess; | |
| 181 } | |
| 182 | |
| 183 loser: | |
| 184 secmod_FreeChildren(children, ids); | |
| 185 PORT_Free(newModuleSpec); | |
| 186 if (conflist) { | |
| 187 secmod_FreeConfigList(conflist, count); | |
| 188 } | |
| 189 return rv; | |
| 190 } | |
| 191 | |
| 192 /* | |
| 193 * collect the steps we need to initialize a module in a single function | |
| 194 */ | |
| 195 SECStatus | |
| 196 secmod_ModuleInit(SECMODModule *mod, SECMODModule **reload, | |
| 197 PRBool* alreadyLoaded) | |
| 198 { | |
| 199 CK_C_INITIALIZE_ARGS moduleArgs; | |
| 200 CK_VOID_PTR pInitArgs; | |
| 201 CK_RV crv; | |
| 202 | |
| 203 if (reload) { | |
| 204 *reload = NULL; | |
| 205 } | |
| 206 | |
| 207 if (!mod || !alreadyLoaded) { | |
| 208 PORT_SetError(SEC_ERROR_INVALID_ARGS); | |
| 209 return SECFailure; | |
| 210 } | |
| 211 | |
| 212 if (mod->isThreadSafe == PR_FALSE) { | |
| 213 pInitArgs = NULL; | |
| 214 } else if (mod->libraryParams == NULL) { | |
| 215 pInitArgs = (void *) &secmodLockFunctions; | |
| 216 } else { | |
| 217 moduleArgs = secmodLockFunctions; | |
| 218 moduleArgs.LibraryParameters = (void *) mod->libraryParams; | |
| 219 pInitArgs = &moduleArgs; | |
| 220 } | |
| 221 crv = PK11_GETTAB(mod)->C_Initialize(pInitArgs); | |
| 222 if (CKR_CRYPTOKI_ALREADY_INITIALIZED == crv) { | |
| 223 SECMODModule *oldModule = NULL; | |
| 224 | |
| 225 /* Library has already been loaded once, if caller expects it, and it | |
| 226 * has additional configuration, try reloading it as well. */ | |
| 227 if (reload != NULL && mod->libraryParams) { | |
| 228 oldModule = secmod_FindModuleByFuncPtr(mod->functionList); | |
| 229 } | |
| 230 /* Library has been loaded by NSS. It means it may be capable of | |
| 231 * reloading */ | |
| 232 if (oldModule) { | |
| 233 SECStatus rv; | |
| 234 rv = secmod_handleReload(oldModule, mod); | |
| 235 if (rv == SECSuccess) { | |
| 236 /* This module should go away soon, since we've | |
| 237 * simply expanded the slots on the old module. | |
| 238 * When it goes away, it should not Finalize since | |
| 239 * that will close our old module as well. Setting | |
| 240 * the function list to NULL will prevent that close */ | |
| 241 mod->functionList = NULL; | |
| 242 *reload = oldModule; | |
| 243 return SECSuccess; | |
| 244 } | |
| 245 SECMOD_DestroyModule(oldModule); | |
| 246 } | |
| 247 /* reload not possible, fall back to old semantics */ | |
| 248 if (!enforceAlreadyInitializedError) { | |
| 249 *alreadyLoaded = PR_TRUE; | |
| 250 return SECSuccess; | |
| 251 } | |
| 252 } | |
| 253 if (crv != CKR_OK) { | |
| 254 if (pInitArgs == NULL || | |
| 255 crv == CKR_NETSCAPE_CERTDB_FAILED || | |
| 256 crv == CKR_NETSCAPE_KEYDB_FAILED) { | |
| 257 PORT_SetError(PK11_MapError(crv)); | |
| 258 return SECFailure; | |
| 259 } | |
| 260 if (!loadSingleThreadedModules) { | |
| 261 PORT_SetError(SEC_ERROR_INCOMPATIBLE_PKCS11); | |
| 262 return SECFailure; | |
| 263 } | |
| 264 mod->isThreadSafe = PR_FALSE; | |
| 265 crv = PK11_GETTAB(mod)->C_Initialize(NULL); | |
| 266 if ((CKR_CRYPTOKI_ALREADY_INITIALIZED == crv) && | |
| 267 (!enforceAlreadyInitializedError)) { | |
| 268 *alreadyLoaded = PR_TRUE; | |
| 269 return SECSuccess; | |
| 270 } | |
| 271 if (crv != CKR_OK) { | |
| 272 PORT_SetError(PK11_MapError(crv)); | |
| 273 return SECFailure; | |
| 274 } | |
| 275 } | |
| 276 return SECSuccess; | |
| 277 } | |
| 278 | |
| 279 /* | |
| 280 * set the hasRootCerts flags in the module so it can be stored back | |
| 281 * into the database. | |
| 282 */ | |
| 283 void | |
| 284 SECMOD_SetRootCerts(PK11SlotInfo *slot, SECMODModule *mod) { | |
| 285 PK11PreSlotInfo *psi = NULL; | |
| 286 int i; | |
| 287 | |
| 288 if (slot->hasRootCerts) { | |
| 289 for (i=0; i < mod->slotInfoCount; i++) { | |
| 290 if (slot->slotID == mod->slotInfo[i].slotID) { | |
| 291 psi = &mod->slotInfo[i]; | |
| 292 break; | |
| 293 } | |
| 294 } | |
| 295 if (psi == NULL) { | |
| 296 /* allocate more slots */ | |
| 297 PK11PreSlotInfo *psi_list = (PK11PreSlotInfo *) | |
| 298 PORT_ArenaAlloc(mod->arena, | |
| 299 (mod->slotInfoCount+1)* sizeof(PK11PreSlotInfo)); | |
| 300 /* copy the old ones */ | |
| 301 if (mod->slotInfoCount > 0) { | |
| 302 PORT_Memcpy(psi_list,mod->slotInfo, | |
| 303 (mod->slotInfoCount)*sizeof(PK11PreSlotInfo)); | |
| 304 } | |
| 305 /* assign psi to the last new slot */ | |
| 306 psi = &psi_list[mod->slotInfoCount]; | |
| 307 psi->slotID = slot->slotID; | |
| 308 psi->askpw = 0; | |
| 309 psi->timeout = 0; | |
| 310 psi ->defaultFlags = 0; | |
| 311 | |
| 312 /* increment module count & store new list */ | |
| 313 mod->slotInfo = psi_list; | |
| 314 mod->slotInfoCount++; | |
| 315 | |
| 316 } | |
| 317 psi->hasRootCerts = 1; | |
| 318 } | |
| 319 } | |
| 320 | |
| 321 #ifdef NSS_STATIC | |
| 322 extern CK_RV NSC_GetFunctionList(CK_FUNCTION_LIST_PTR *pFunctionList); | |
| 323 extern CK_RV FC_GetFunctionList(CK_FUNCTION_LIST_PTR *pFunctionList); | |
| 324 extern char **NSC_ModuleDBFunc(unsigned long function,char *parameters, void *ar
gs); | |
| 325 extern CK_RV builtinsC_GetFunctionList(CK_FUNCTION_LIST_PTR *pFunctionList); | |
| 326 #else | |
| 327 static const char* my_shlib_name = | |
| 328 SHLIB_PREFIX"nss"SHLIB_VERSION"."SHLIB_SUFFIX; | |
| 329 static const char* softoken_shlib_name = | |
| 330 SHLIB_PREFIX"softokn"SOFTOKEN_SHLIB_VERSION"."SHLIB_SUFFIX; | |
| 331 static const PRCallOnceType pristineCallOnce; | |
| 332 static PRCallOnceType loadSoftokenOnce; | |
| 333 static PRLibrary* softokenLib; | |
| 334 static PRInt32 softokenLoadCount; | |
| 335 #endif /* NSS_STATIC */ | |
| 336 | |
| 337 #include "prio.h" | |
| 338 #include "prprf.h" | |
| 339 #include <stdio.h> | |
| 340 #include "prsystem.h" | |
| 341 | |
| 342 #ifndef NSS_STATIC | |
| 343 /* This function must be run only once. */ | |
| 344 /* determine if hybrid platform, then actually load the DSO. */ | |
| 345 static PRStatus | |
| 346 softoken_LoadDSO( void ) | |
| 347 { | |
| 348 PRLibrary * handle; | |
| 349 | |
| 350 handle = PORT_LoadLibraryFromOrigin(my_shlib_name, | |
| 351 (PRFuncPtr) &softoken_LoadDSO, | |
| 352 softoken_shlib_name); | |
| 353 if (handle) { | |
| 354 softokenLib = handle; | |
| 355 return PR_SUCCESS; | |
| 356 } | |
| 357 return PR_FAILURE; | |
| 358 } | |
| 359 #endif /* !NSS_STATIC */ | |
| 360 | |
| 361 /* | |
| 362 * load a new module into our address space and initialize it. | |
| 363 */ | |
| 364 SECStatus | |
| 365 secmod_LoadPKCS11Module(SECMODModule *mod, SECMODModule **oldModule) { | |
| 366 PRLibrary *library = NULL; | |
| 367 CK_C_GetFunctionList entry = NULL; | |
| 368 CK_INFO info; | |
| 369 CK_ULONG slotCount = 0; | |
| 370 SECStatus rv; | |
| 371 PRBool alreadyLoaded = PR_FALSE; | |
| 372 char *disableUnload = NULL; | |
| 373 | |
| 374 if (mod->loaded) return SECSuccess; | |
| 375 | |
| 376 /* intenal modules get loaded from their internal list */ | |
| 377 if (mod->internal && (mod->dllName == NULL)) { | |
| 378 #ifdef NSS_STATIC | |
| 379 if (mod->isFIPS) { | |
| 380 entry = FC_GetFunctionList; | |
| 381 } else { | |
| 382 entry = NSC_GetFunctionList; | |
| 383 } | |
| 384 if (mod->isModuleDB) { | |
| 385 mod->moduleDBFunc = NSC_ModuleDBFunc; | |
| 386 } | |
| 387 #else | |
| 388 /* | |
| 389 * Loads softoken as a dynamic library, | |
| 390 * even though the rest of NSS assumes this as the "internal" module. | |
| 391 */ | |
| 392 if (!softokenLib && | |
| 393 PR_SUCCESS != PR_CallOnce(&loadSoftokenOnce, &softoken_LoadDSO)) | |
| 394 return SECFailure; | |
| 395 | |
| 396 PR_ATOMIC_INCREMENT(&softokenLoadCount); | |
| 397 | |
| 398 if (mod->isFIPS) { | |
| 399 entry = (CK_C_GetFunctionList) | |
| 400 PR_FindSymbol(softokenLib, "FC_GetFunctionList"); | |
| 401 } else { | |
| 402 entry = (CK_C_GetFunctionList) | |
| 403 PR_FindSymbol(softokenLib, "NSC_GetFunctionList"); | |
| 404 } | |
| 405 | |
| 406 if (!entry) | |
| 407 return SECFailure; | |
| 408 | |
| 409 if (mod->isModuleDB) { | |
| 410 mod->moduleDBFunc = (CK_C_GetFunctionList) | |
| 411 PR_FindSymbol(softokenLib, "NSC_ModuleDBFunc"); | |
| 412 } | |
| 413 #endif | |
| 414 | |
| 415 if (mod->moduleDBOnly) { | |
| 416 mod->loaded = PR_TRUE; | |
| 417 return SECSuccess; | |
| 418 } | |
| 419 } else { | |
| 420 /* Not internal, load the DLL and look up C_GetFunctionList */ | |
| 421 if (mod->dllName == NULL) { | |
| 422 return SECFailure; | |
| 423 } | |
| 424 #if defined(NSS_STATIC) && !defined(NSS_DISABLE_ROOT_CERTS) | |
| 425 if (strstr(mod->dllName, "nssckbi") != NULL) { | |
| 426 mod->library = NULL; | |
| 427 PORT_Assert(!mod->moduleDBOnly); | |
| 428 entry = builtinsC_GetFunctionList; | |
| 429 PORT_Assert(!mod->isModuleDB); | |
| 430 goto library_loaded; | |
| 431 } | |
| 432 #endif | |
| 433 | |
| 434 /* load the library. If this succeeds, then we have to remember to | |
| 435 * unload the library if anything goes wrong from here on out... | |
| 436 */ | |
| 437 library = PR_LoadLibrary(mod->dllName); | |
| 438 mod->library = (void *)library; | |
| 439 | |
| 440 if (library == NULL) { | |
| 441 return SECFailure; | |
| 442 } | |
| 443 | |
| 444 /* | |
| 445 * now we need to get the entry point to find the function pointers | |
| 446 */ | |
| 447 if (!mod->moduleDBOnly) { | |
| 448 entry = (CK_C_GetFunctionList) | |
| 449 PR_FindSymbol(library, "C_GetFunctionList"); | |
| 450 } | |
| 451 if (mod->isModuleDB) { | |
| 452 mod->moduleDBFunc = (void *) | |
| 453 PR_FindSymbol(library, "NSS_ReturnModuleSpecData"); | |
| 454 } | |
| 455 #if defined(NSS_STATIC) && !defined(NSS_DISABLE_ROOT_CERTS) | |
| 456 library_loaded: | |
| 457 #endif | |
| 458 if (mod->moduleDBFunc == NULL) mod->isModuleDB = PR_FALSE; | |
| 459 if (entry == NULL) { | |
| 460 if (mod->isModuleDB) { | |
| 461 mod->loaded = PR_TRUE; | |
| 462 mod->moduleDBOnly = PR_TRUE; | |
| 463 return SECSuccess; | |
| 464 } | |
| 465 PR_UnloadLibrary(library); | |
| 466 return SECFailure; | |
| 467 } | |
| 468 } | |
| 469 | |
| 470 /* | |
| 471 * We need to get the function list | |
| 472 */ | |
| 473 if ((*entry)((CK_FUNCTION_LIST_PTR *)&mod->functionList) != CKR_OK) | |
| 474 goto fail; | |
| 475 | |
| 476 #ifdef DEBUG_MODULE | |
| 477 if (PR_TRUE) { | |
| 478 modToDBG = PR_GetEnv("NSS_DEBUG_PKCS11_MODULE"); | |
| 479 if (modToDBG && strcmp(mod->commonName, modToDBG) == 0) { | |
| 480 mod->functionList = (void *)nss_InsertDeviceLog( | |
| 481 (CK_FUNCTION_LIST_PTR)mod->functionList); | |
| 482 } | |
| 483 } | |
| 484 #endif | |
| 485 | |
| 486 mod->isThreadSafe = PR_TRUE; | |
| 487 | |
| 488 /* Now we initialize the module */ | |
| 489 rv = secmod_ModuleInit(mod, oldModule, &alreadyLoaded); | |
| 490 if (rv != SECSuccess) { | |
| 491 goto fail; | |
| 492 } | |
| 493 | |
| 494 /* module has been reloaded, this module itself is done, | |
| 495 * return to the caller */ | |
| 496 if (mod->functionList == NULL) { | |
| 497 mod->loaded = PR_TRUE; /* technically the module is loaded.. */ | |
| 498 return SECSuccess; | |
| 499 } | |
| 500 | |
| 501 /* check the version number */ | |
| 502 if (PK11_GETTAB(mod)->C_GetInfo(&info) != CKR_OK) goto fail2; | |
| 503 if (info.cryptokiVersion.major != 2) goto fail2; | |
| 504 /* all 2.0 are a priori *not* thread safe */ | |
| 505 if (info.cryptokiVersion.minor < 1) { | |
| 506 if (!loadSingleThreadedModules) { | |
| 507 PORT_SetError(SEC_ERROR_INCOMPATIBLE_PKCS11); | |
| 508 goto fail2; | |
| 509 } else { | |
| 510 mod->isThreadSafe = PR_FALSE; | |
| 511 } | |
| 512 } | |
| 513 mod->cryptokiVersion = info.cryptokiVersion; | |
| 514 | |
| 515 /* If we don't have a common name, get it from the PKCS 11 module */ | |
| 516 if ((mod->commonName == NULL) || (mod->commonName[0] == 0)) { | |
| 517 mod->commonName = PK11_MakeString(mod->arena,NULL, | |
| 518 (char *)info.libraryDescription, sizeof(info.libraryDescription)); | |
| 519 if (mod->commonName == NULL) goto fail2; | |
| 520 } | |
| 521 | |
| 522 | |
| 523 /* initialize the Slots */ | |
| 524 if (PK11_GETTAB(mod)->C_GetSlotList(CK_FALSE, NULL, &slotCount) == CKR_OK) { | |
| 525 CK_SLOT_ID *slotIDs; | |
| 526 int i; | |
| 527 CK_RV crv; | |
| 528 | |
| 529 mod->slots = (PK11SlotInfo **)PORT_ArenaAlloc(mod->arena, | |
| 530 sizeof(PK11SlotInfo *) * slotCount); | |
| 531 if (mod->slots == NULL) goto fail2; | |
| 532 | |
| 533 slotIDs = (CK_SLOT_ID *) PORT_Alloc(sizeof(CK_SLOT_ID)*slotCount); | |
| 534 if (slotIDs == NULL) { | |
| 535 goto fail2; | |
| 536 } | |
| 537 crv = PK11_GETTAB(mod)->C_GetSlotList(CK_FALSE, slotIDs, &slotCount); | |
| 538 if (crv != CKR_OK) { | |
| 539 PORT_Free(slotIDs); | |
| 540 goto fail2; | |
| 541 } | |
| 542 | |
| 543 /* Initialize each slot */ | |
| 544 for (i=0; i < (int)slotCount; i++) { | |
| 545 mod->slots[i] = PK11_NewSlotInfo(mod); | |
| 546 PK11_InitSlot(mod,slotIDs[i],mod->slots[i]); | |
| 547 /* look down the slot info table */ | |
| 548 PK11_LoadSlotList(mod->slots[i],mod->slotInfo,mod->slotInfoCount); | |
| 549 SECMOD_SetRootCerts(mod->slots[i],mod); | |
| 550 /* explicitly mark the internal slot as such if IsInternalKeySlot() | |
| 551 * is set */ | |
| 552 if (secmod_IsInternalKeySlot(mod) && (i == (mod->isFIPS ? 0 : 1))) { | |
| 553 pk11_SetInternalKeySlotIfFirst(mod->slots[i]); | |
| 554 } | |
| 555 } | |
| 556 mod->slotCount = slotCount; | |
| 557 mod->slotInfoCount = 0; | |
| 558 PORT_Free(slotIDs); | |
| 559 } | |
| 560 | |
| 561 mod->loaded = PR_TRUE; | |
| 562 mod->moduleID = nextModuleID++; | |
| 563 return SECSuccess; | |
| 564 fail2: | |
| 565 if (enforceAlreadyInitializedError || (!alreadyLoaded)) { | |
| 566 PK11_GETTAB(mod)->C_Finalize(NULL); | |
| 567 } | |
| 568 fail: | |
| 569 mod->functionList = NULL; | |
| 570 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | |
| 571 if (library && !disableUnload) { | |
| 572 PR_UnloadLibrary(library); | |
| 573 } | |
| 574 return SECFailure; | |
| 575 } | |
| 576 | |
| 577 SECStatus | |
| 578 SECMOD_UnloadModule(SECMODModule *mod) { | |
| 579 PRLibrary *library; | |
| 580 char *disableUnload = NULL; | |
| 581 | |
| 582 if (!mod->loaded) { | |
| 583 return SECFailure; | |
| 584 } | |
| 585 if (finalizeModules) { | |
| 586 if (mod->functionList &&!mod->moduleDBOnly) { | |
| 587 PK11_GETTAB(mod)->C_Finalize(NULL); | |
| 588 } | |
| 589 } | |
| 590 mod->moduleID = 0; | |
| 591 mod->loaded = PR_FALSE; | |
| 592 | |
| 593 /* do we want the semantics to allow unloading the internal library? | |
| 594 * if not, we should change this to SECFailure and move it above the | |
| 595 * mod->loaded = PR_FALSE; */ | |
| 596 if (mod->internal && (mod->dllName == NULL)) { | |
| 597 #ifndef NSS_STATIC | |
| 598 if (0 == PR_ATOMIC_DECREMENT(&softokenLoadCount)) { | |
| 599 if (softokenLib) { | |
| 600 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | |
| 601 if (!disableUnload) { | |
| 602 PRStatus status = PR_UnloadLibrary(softokenLib); | |
| 603 PORT_Assert(PR_SUCCESS == status); | |
| 604 } | |
| 605 softokenLib = NULL; | |
| 606 } | |
| 607 loadSoftokenOnce = pristineCallOnce; | |
| 608 } | |
| 609 #endif | |
| 610 return SECSuccess; | |
| 611 } | |
| 612 | |
| 613 library = (PRLibrary *)mod->library; | |
| 614 /* paranoia */ | |
| 615 if (library == NULL) { | |
| 616 #if defined(NSS_STATIC) && !defined(NSS_DISABLE_ROOT_CERTS) | |
| 617 if (strstr(mod->dllName, "nssckbi") != NULL) { | |
| 618 return SECSuccess; | |
| 619 } | |
| 620 #endif | |
| 621 return SECFailure; | |
| 622 } | |
| 623 | |
| 624 disableUnload = PR_GetEnv("NSS_DISABLE_UNLOAD"); | |
| 625 if (!disableUnload) { | |
| 626 PR_UnloadLibrary(library); | |
| 627 } | |
| 628 return SECSuccess; | |
| 629 } | |
| 630 | |
| 631 void | |
| 632 nss_DumpModuleLog(void) | |
| 633 { | |
| 634 #ifdef DEBUG_MODULE | |
| 635 if (modToDBG) { | |
| 636 print_final_statistics(); | |
| 637 } | |
| 638 #endif | |
| 639 } | |
| OLD | NEW |