Index: mozilla/security/nss/lib/softoken/softoken.h |
=================================================================== |
--- mozilla/security/nss/lib/softoken/softoken.h (revision 191424) |
+++ mozilla/security/nss/lib/softoken/softoken.h (working copy) |
@@ -1,378 +0,0 @@ |
-/* |
- * softoken.h - private data structures and prototypes for the softoken lib |
- * |
- * This Source Code Form is subject to the terms of the Mozilla Public |
- * License, v. 2.0. If a copy of the MPL was not distributed with this |
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
-/* $Id: softoken.h,v 1.29 2013/02/05 02:19:52 ryan.sleevi%gmail.com Exp $ */ |
- |
-#ifndef _SOFTOKEN_H_ |
-#define _SOFTOKEN_H_ |
- |
-#include "blapi.h" |
-#include "lowkeyti.h" |
-#include "softoknt.h" |
-#include "secoidt.h" |
- |
-#include "pkcs11t.h" |
- |
-SEC_BEGIN_PROTOS |
- |
-/* |
-** RSA encryption/decryption. When encrypting/decrypting the output |
-** buffer must be at least the size of the public key modulus. |
-*/ |
- |
-/* |
-** Format some data into a PKCS#1 encryption block, preparing the |
-** data for RSA encryption. |
-** "result" where the formatted block is stored (memory is allocated) |
-** "modulusLen" the size of the formatted block |
-** "blockType" what block type to use (SEC_RSABlock*) |
-** "data" the data to format |
-*/ |
-extern SECStatus RSA_FormatBlock(SECItem *result, |
- unsigned int modulusLen, |
- RSA_BlockType blockType, |
- SECItem *data); |
-/* |
-** Similar, but just returns a pointer to the allocated memory, *and* |
-** will *only* format one block, even if we (in the future) modify |
-** RSA_FormatBlock() to loop over multiples of modulusLen. |
-*/ |
-extern unsigned char *RSA_FormatOneBlock(unsigned int modulusLen, |
- RSA_BlockType blockType, |
- SECItem *data); |
- |
- |
- |
-/* |
- * convenience wrappers for doing single RSA operations. They create the |
- * RSA context internally and take care of the formatting |
- * requirements. Blinding happens automagically within RSA_Sign and |
- * RSA_DecryptBlock. |
- */ |
-extern |
-SECStatus RSA_Sign(NSSLOWKEYPrivateKey *key, unsigned char *output, |
- unsigned int *outputLen, unsigned int maxOutputLen, |
- unsigned char *input, unsigned int inputLen); |
-extern |
-SECStatus RSA_HashSign(SECOidTag hashOid, |
- NSSLOWKEYPrivateKey *key, unsigned char *sig, |
- unsigned int *sigLen, unsigned int maxLen, |
- unsigned char *hash, unsigned int hashLen); |
-extern |
-SECStatus RSA_SignPSS(CK_RSA_PKCS_PSS_PARAMS *pss_params, |
- NSSLOWKEYPrivateKey *key, |
- unsigned char *output, unsigned int *output_len, |
- unsigned int max_output_len, const unsigned char *input, |
- unsigned int input_len); |
-extern |
-SECStatus RSA_CheckSign(NSSLOWKEYPublicKey *key, unsigned char *sign, |
- unsigned int signLength, unsigned char *hash, |
- unsigned int hashLength); |
-extern |
-SECStatus RSA_HashCheckSign(SECOidTag hashOid, |
- NSSLOWKEYPublicKey *key, unsigned char *sig, |
- unsigned int sigLen, unsigned char *digest, |
- unsigned int digestLen); |
-extern |
-SECStatus RSA_CheckSignPSS(CK_RSA_PKCS_PSS_PARAMS *pss_params, |
- NSSLOWKEYPublicKey *key, |
- const unsigned char *sign, unsigned int sign_len, |
- const unsigned char *hash, unsigned int hash_len); |
-extern |
-SECStatus RSA_CheckSignRecover(NSSLOWKEYPublicKey *key, unsigned char *data, |
- unsigned int *data_len,unsigned int max_output_len, |
- unsigned char *sign, unsigned int sign_len); |
-extern |
-SECStatus RSA_EncryptBlock(NSSLOWKEYPublicKey *key, unsigned char *output, |
- unsigned int *outputLen, unsigned int maxOutputLen, |
- unsigned char *input, unsigned int inputLen); |
-extern |
-SECStatus RSA_DecryptBlock(NSSLOWKEYPrivateKey *key, unsigned char *output, |
- unsigned int *outputLen, unsigned int maxOutputLen, |
- unsigned char *input, unsigned int inputLen); |
- |
-extern |
-SECStatus RSA_EncryptOAEP(CK_RSA_PKCS_OAEP_PARAMS *oaepParams, |
- NSSLOWKEYPublicKey *key, |
- unsigned char *output, unsigned int *outputLen, |
- unsigned int maxOutputLen, |
- const unsigned char *input, unsigned int inputLen); |
- |
-extern |
-SECStatus RSA_DecryptOAEP(CK_RSA_PKCS_OAEP_PARAMS *oaepParams, |
- NSSLOWKEYPrivateKey *key, |
- unsigned char *output, unsigned int *outputLen, |
- unsigned int maxOutputLen, |
- const unsigned char *input, unsigned int inputLen); |
- |
-/* |
- * added to make pkcs #11 happy |
- * RAW is RSA_X_509 |
- */ |
-extern |
-SECStatus RSA_SignRaw( NSSLOWKEYPrivateKey *key, unsigned char *output, |
- unsigned int *output_len, unsigned int maxOutputLen, |
- unsigned char *input, unsigned int input_len); |
-extern |
-SECStatus RSA_CheckSignRaw( NSSLOWKEYPublicKey *key, unsigned char *sign, |
- unsigned int sign_len, unsigned char *hash, |
- unsigned int hash_len); |
-extern |
-SECStatus RSA_CheckSignRecoverRaw( NSSLOWKEYPublicKey *key, unsigned char *data, |
- unsigned int *data_len, unsigned int max_output_len, |
- unsigned char *sign, unsigned int sign_len); |
-extern |
-SECStatus RSA_EncryptRaw( NSSLOWKEYPublicKey *key, unsigned char *output, |
- unsigned int *output_len, |
- unsigned int max_output_len, |
- unsigned char *input, unsigned int input_len); |
-extern |
-SECStatus RSA_DecryptRaw(NSSLOWKEYPrivateKey *key, unsigned char *output, |
- unsigned int *output_len, |
- unsigned int max_output_len, |
- unsigned char *input, unsigned int input_len); |
-#ifdef NSS_ENABLE_ECC |
-/* |
-** pepare an ECParam structure from DEREncoded params |
- */ |
-extern SECStatus EC_FillParams(PRArenaPool *arena, |
- const SECItem *encodedParams, ECParams *params); |
-extern SECStatus EC_DecodeParams(const SECItem *encodedParams, |
- ECParams **ecparams); |
-extern SECStatus EC_CopyParams(PRArenaPool *arena, ECParams *dstParams, |
- const ECParams *srcParams); |
-#endif |
- |
- |
-/* |
-** Prepare a buffer for padded CBC encryption, growing to the appropriate |
-** boundary, filling with the appropriate padding. |
-** |
-** blockSize must be a power of 2. |
-** |
-** We add from 1 to blockSize bytes -- we *always* grow. |
-** The extra bytes contain the value of the length of the padding: |
-** if we have 2 bytes of padding, then the padding is "0x02, 0x02". |
-** |
-** NOTE: If arena is non-NULL, we re-allocate from there, otherwise |
-** we assume (and use) PR memory (re)allocation. |
-*/ |
-extern unsigned char * CBC_PadBuffer(PRArenaPool *arena, unsigned char *inbuf, |
- unsigned int inlen, unsigned int *outlen, |
- int blockSize); |
- |
- |
-/****************************************/ |
-/* |
-** Power-Up selftests required for FIPS and invoked only |
-** under PKCS #11 FIPS mode. |
-*/ |
-extern CK_RV sftk_fipsPowerUpSelfTest( void ); |
- |
-/* |
-** make known fixed PKCS #11 key types to their sizes in bytes |
-*/ |
-unsigned long sftk_MapKeySize(CK_KEY_TYPE keyType); |
- |
-/* |
-** FIPS 140-2 auditing |
-*/ |
-extern PRBool sftk_audit_enabled; |
- |
-extern void sftk_LogAuditMessage(NSSAuditSeverity severity, |
- NSSAuditType, const char *msg); |
- |
-extern void sftk_AuditCreateObject(CK_SESSION_HANDLE hSession, |
- CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, |
- CK_OBJECT_HANDLE_PTR phObject, CK_RV rv); |
- |
-extern void sftk_AuditCopyObject(CK_SESSION_HANDLE hSession, |
- CK_OBJECT_HANDLE hObject, |
- CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, |
- CK_OBJECT_HANDLE_PTR phNewObject, CK_RV rv); |
- |
-extern void sftk_AuditDestroyObject(CK_SESSION_HANDLE hSession, |
- CK_OBJECT_HANDLE hObject, CK_RV rv); |
- |
-extern void sftk_AuditGetObjectSize(CK_SESSION_HANDLE hSession, |
- CK_OBJECT_HANDLE hObject, CK_ULONG_PTR pulSize, |
- CK_RV rv); |
- |
-extern void sftk_AuditGetAttributeValue(CK_SESSION_HANDLE hSession, |
- CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, |
- CK_ULONG ulCount, CK_RV rv); |
- |
-extern void sftk_AuditSetAttributeValue(CK_SESSION_HANDLE hSession, |
- CK_OBJECT_HANDLE hObject, CK_ATTRIBUTE_PTR pTemplate, |
- CK_ULONG ulCount, CK_RV rv); |
- |
-extern void sftk_AuditCryptInit(const char *opName, |
- CK_SESSION_HANDLE hSession, |
- CK_MECHANISM_PTR pMechanism, |
- CK_OBJECT_HANDLE hKey, CK_RV rv); |
- |
-extern void sftk_AuditGenerateKey(CK_SESSION_HANDLE hSession, |
- CK_MECHANISM_PTR pMechanism, |
- CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulCount, |
- CK_OBJECT_HANDLE_PTR phKey, CK_RV rv); |
- |
-extern void sftk_AuditGenerateKeyPair(CK_SESSION_HANDLE hSession, |
- CK_MECHANISM_PTR pMechanism, |
- CK_ATTRIBUTE_PTR pPublicKeyTemplate, |
- CK_ULONG ulPublicKeyAttributeCount, |
- CK_ATTRIBUTE_PTR pPrivateKeyTemplate, |
- CK_ULONG ulPrivateKeyAttributeCount, |
- CK_OBJECT_HANDLE_PTR phPublicKey, |
- CK_OBJECT_HANDLE_PTR phPrivateKey, CK_RV rv); |
- |
-extern void sftk_AuditWrapKey(CK_SESSION_HANDLE hSession, |
- CK_MECHANISM_PTR pMechanism, |
- CK_OBJECT_HANDLE hWrappingKey, CK_OBJECT_HANDLE hKey, |
- CK_BYTE_PTR pWrappedKey, |
- CK_ULONG_PTR pulWrappedKeyLen, CK_RV rv); |
- |
-extern void sftk_AuditUnwrapKey(CK_SESSION_HANDLE hSession, |
- CK_MECHANISM_PTR pMechanism, |
- CK_OBJECT_HANDLE hUnwrappingKey, |
- CK_BYTE_PTR pWrappedKey, CK_ULONG ulWrappedKeyLen, |
- CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, |
- CK_OBJECT_HANDLE_PTR phKey, CK_RV rv); |
- |
-extern void sftk_AuditDeriveKey(CK_SESSION_HANDLE hSession, |
- CK_MECHANISM_PTR pMechanism, |
- CK_OBJECT_HANDLE hBaseKey, |
- CK_ATTRIBUTE_PTR pTemplate, CK_ULONG ulAttributeCount, |
- CK_OBJECT_HANDLE_PTR phKey, CK_RV rv); |
- |
-extern void sftk_AuditDigestKey(CK_SESSION_HANDLE hSession, |
- CK_OBJECT_HANDLE hKey, CK_RV rv); |
- |
-/* |
-** FIPS 140-2 Error state |
-*/ |
-extern PRBool sftk_fatalError; |
- |
-/* |
-** macros to check for forked child process after C_Initialize |
-*/ |
-#if defined(XP_UNIX) && !defined(NO_FORK_CHECK) |
- |
-#ifdef DEBUG |
- |
-#define FORK_ASSERT() \ |
- { \ |
- char* forkAssert = getenv("NSS_STRICT_NOFORK"); \ |
- if ( (!forkAssert) || (0 == strcmp(forkAssert, "1")) ) { \ |
- PORT_Assert(0); \ |
- } \ |
- } |
- |
-#else |
- |
-#define FORK_ASSERT() |
- |
-#endif |
- |
-/* we have 3 methods of implementing the fork checks : |
- * - Solaris "mixed" method |
- * - pthread_atfork method |
- * - getpid method |
- */ |
- |
-#if !defined (CHECK_FORK_MIXED) && !defined(CHECK_FORK_PTHREAD) && \ |
- !defined (CHECK_FORK_GETPID) |
- |
-/* Choose fork check method automatically unless specified |
- * This section should be updated as more platforms get pthread fixes |
- * to unregister fork handlers in dlclose. |
- */ |
- |
-#ifdef SOLARIS |
- |
-/* Solaris 8, s9 use PID checks, s10 uses pthread_atfork */ |
- |
-#define CHECK_FORK_MIXED |
- |
-#elif defined(LINUX) |
- |
-#define CHECK_FORK_PTHREAD |
- |
-#else |
- |
-/* Other Unix platforms use only PID checks. Even if pthread_atfork is |
- * available, the behavior of dlclose isn't guaranteed by POSIX to |
- * unregister the fork handler. */ |
- |
-#define CHECK_FORK_GETPID |
- |
-#endif |
- |
-#endif |
- |
-#if defined(CHECK_FORK_MIXED) |
- |
-extern PRBool usePthread_atfork; |
-#include <unistd.h> |
-extern pid_t myPid; |
-extern PRBool forked; |
- |
-#define PARENT_FORKED() (usePthread_atfork ? forked : (myPid && myPid != getpid())) |
- |
-#elif defined(CHECK_FORK_PTHREAD) |
- |
-extern PRBool forked; |
- |
-#define PARENT_FORKED() forked |
- |
-#elif defined(CHECK_FORK_GETPID) |
- |
-#include <unistd.h> |
-extern pid_t myPid; |
- |
-#define PARENT_FORKED() (myPid && myPid != getpid()) |
- |
-#endif |
- |
-extern PRBool parentForkedAfterC_Initialize; |
-extern PRBool sftkForkCheckDisabled; |
- |
-#define CHECK_FORK() \ |
- do { \ |
- if (!sftkForkCheckDisabled && PARENT_FORKED()) { \ |
- FORK_ASSERT(); \ |
- return CKR_DEVICE_ERROR; \ |
- } \ |
- } while (0) |
- |
-#define SKIP_AFTER_FORK(x) if (!parentForkedAfterC_Initialize) x |
- |
-#define ENABLE_FORK_CHECK() \ |
- { \ |
- char* doForkCheck = getenv("NSS_STRICT_NOFORK"); \ |
- if ( doForkCheck && !strcmp(doForkCheck, "DISABLED") ) { \ |
- sftkForkCheckDisabled = PR_TRUE; \ |
- } \ |
- } |
- |
- |
-#else |
- |
-/* non-Unix platforms, or fork check disabled */ |
- |
-#define CHECK_FORK() |
-#define SKIP_AFTER_FORK(x) x |
-#define ENABLE_FORK_CHECK() |
- |
-#ifndef NO_FORK_CHECK |
-#define NO_FORK_CHECK |
-#endif |
- |
-#endif |
- |
- |
-SEC_END_PROTOS |
- |
-#endif /* _SOFTOKEN_H_ */ |