Index: nss/lib/ckfw/session.c |
diff --git a/nss/lib/ckfw/session.c b/nss/lib/ckfw/session.c |
index 1d0526272ab651c3d01061b27debb27b720ead3a..4320a3971211fc965822cacd124bb1db1b1553d4 100644 |
--- a/nss/lib/ckfw/session.c |
+++ b/nss/lib/ckfw/session.c |
@@ -61,26 +61,26 @@ |
*/ |
struct NSSCKFWSessionStr { |
- NSSArena *arena; |
- NSSCKMDSession *mdSession; |
- NSSCKFWToken *fwToken; |
- NSSCKMDToken *mdToken; |
- NSSCKFWInstance *fwInstance; |
- NSSCKMDInstance *mdInstance; |
- CK_VOID_PTR pApplication; |
- CK_NOTIFY Notify; |
- |
- /* |
- * Everything above is set at creation time, and then not modified. |
- * The items below are atomic. No locking required. If we fear |
- * about pointer-copies being nonatomic, we'll lock fwFindObjects. |
- */ |
- |
- CK_BBOOL rw; |
- NSSCKFWFindObjects *fwFindObjects; |
- NSSCKFWCryptoOperation *fwOperationArray[NSSCKFWCryptoOperationState_Max]; |
- nssCKFWHash *sessionObjectHash; |
- CK_SESSION_HANDLE hSession; |
+ NSSArena *arena; |
+ NSSCKMDSession *mdSession; |
+ NSSCKFWToken *fwToken; |
+ NSSCKMDToken *mdToken; |
+ NSSCKFWInstance *fwInstance; |
+ NSSCKMDInstance *mdInstance; |
+ CK_VOID_PTR pApplication; |
+ CK_NOTIFY Notify; |
+ |
+ /* |
+ * Everything above is set at creation time, and then not modified. |
+ * The items below are atomic. No locking required. If we fear |
+ * about pointer-copies being nonatomic, we'll lock fwFindObjects. |
+ */ |
+ |
+ CK_BBOOL rw; |
+ NSSCKFWFindObjects *fwFindObjects; |
+ NSSCKFWCryptoOperation *fwOperationArray[NSSCKFWCryptoOperationState_Max]; |
+ nssCKFWHash *sessionObjectHash; |
+ CK_SESSION_HANDLE hSession; |
}; |
#ifdef DEBUG |
@@ -96,30 +96,24 @@ struct NSSCKFWSessionStr { |
*/ |
static CK_RV |
-session_add_pointer |
-( |
- const NSSCKFWSession *fwSession |
-) |
+session_add_pointer( |
+ const NSSCKFWSession *fwSession) |
{ |
- return CKR_OK; |
+ return CKR_OK; |
} |
static CK_RV |
-session_remove_pointer |
-( |
- const NSSCKFWSession *fwSession |
-) |
+session_remove_pointer( |
+ const NSSCKFWSession *fwSession) |
{ |
- return CKR_OK; |
+ return CKR_OK; |
} |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_verifyPointer |
-( |
- const NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_verifyPointer( |
+ const NSSCKFWSession *fwSession) |
{ |
- return CKR_OK; |
+ return CKR_OK; |
} |
#endif /* DEBUG */ |
@@ -129,95 +123,91 @@ nssCKFWSession_verifyPointer |
* |
*/ |
NSS_IMPLEMENT NSSCKFWSession * |
-nssCKFWSession_Create |
-( |
- NSSCKFWToken *fwToken, |
- CK_BBOOL rw, |
- CK_VOID_PTR pApplication, |
- CK_NOTIFY Notify, |
- CK_RV *pError |
-) |
+nssCKFWSession_Create( |
+ NSSCKFWToken *fwToken, |
+ CK_BBOOL rw, |
+ CK_VOID_PTR pApplication, |
+ CK_NOTIFY Notify, |
+ CK_RV *pError) |
{ |
- NSSArena *arena = (NSSArena *)NULL; |
- NSSCKFWSession *fwSession; |
- NSSCKFWSlot *fwSlot; |
+ NSSArena *arena = (NSSArena *)NULL; |
+ NSSCKFWSession *fwSession; |
+ NSSCKFWSlot *fwSlot; |
#ifdef NSSDEBUG |
- if (!pError) { |
- return (NSSCKFWSession *)NULL; |
- } |
+ if (!pError) { |
+ return (NSSCKFWSession *)NULL; |
+ } |
- *pError = nssCKFWToken_verifyPointer(fwToken); |
- if( CKR_OK != *pError ) { |
- return (NSSCKFWSession *)NULL; |
- } |
+ *pError = nssCKFWToken_verifyPointer(fwToken); |
+ if (CKR_OK != *pError) { |
+ return (NSSCKFWSession *)NULL; |
+ } |
#endif /* NSSDEBUG */ |
- arena = NSSArena_Create(); |
- if (!arena) { |
- *pError = CKR_HOST_MEMORY; |
- return (NSSCKFWSession *)NULL; |
- } |
+ arena = NSSArena_Create(); |
+ if (!arena) { |
+ *pError = CKR_HOST_MEMORY; |
+ return (NSSCKFWSession *)NULL; |
+ } |
- fwSession = nss_ZNEW(arena, NSSCKFWSession); |
- if (!fwSession) { |
- *pError = CKR_HOST_MEMORY; |
- goto loser; |
- } |
+ fwSession = nss_ZNEW(arena, NSSCKFWSession); |
+ if (!fwSession) { |
+ *pError = CKR_HOST_MEMORY; |
+ goto loser; |
+ } |
- fwSession->arena = arena; |
- fwSession->mdSession = (NSSCKMDSession *)NULL; /* set later */ |
- fwSession->fwToken = fwToken; |
- fwSession->mdToken = nssCKFWToken_GetMDToken(fwToken); |
+ fwSession->arena = arena; |
+ fwSession->mdSession = (NSSCKMDSession *)NULL; /* set later */ |
+ fwSession->fwToken = fwToken; |
+ fwSession->mdToken = nssCKFWToken_GetMDToken(fwToken); |
- fwSlot = nssCKFWToken_GetFWSlot(fwToken); |
- fwSession->fwInstance = nssCKFWSlot_GetFWInstance(fwSlot); |
- fwSession->mdInstance = nssCKFWSlot_GetMDInstance(fwSlot); |
+ fwSlot = nssCKFWToken_GetFWSlot(fwToken); |
+ fwSession->fwInstance = nssCKFWSlot_GetFWInstance(fwSlot); |
+ fwSession->mdInstance = nssCKFWSlot_GetMDInstance(fwSlot); |
- fwSession->rw = rw; |
- fwSession->pApplication = pApplication; |
- fwSession->Notify = Notify; |
+ fwSession->rw = rw; |
+ fwSession->pApplication = pApplication; |
+ fwSession->Notify = Notify; |
- fwSession->fwFindObjects = (NSSCKFWFindObjects *)NULL; |
+ fwSession->fwFindObjects = (NSSCKFWFindObjects *)NULL; |
- fwSession->sessionObjectHash = nssCKFWHash_Create(fwSession->fwInstance, arena, pError); |
- if (!fwSession->sessionObjectHash) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
+ fwSession->sessionObjectHash = nssCKFWHash_Create(fwSession->fwInstance, arena, pError); |
+ if (!fwSession->sessionObjectHash) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ goto loser; |
} |
- goto loser; |
- } |
#ifdef DEBUG |
- *pError = session_add_pointer(fwSession); |
- if( CKR_OK != *pError ) { |
- goto loser; |
- } |
+ *pError = session_add_pointer(fwSession); |
+ if (CKR_OK != *pError) { |
+ goto loser; |
+ } |
#endif /* DEBUG */ |
- return fwSession; |
+ return fwSession; |
- loser: |
- if (arena) { |
- if (fwSession && fwSession->sessionObjectHash) { |
- (void)nssCKFWHash_Destroy(fwSession->sessionObjectHash); |
+loser: |
+ if (arena) { |
+ if (fwSession && fwSession->sessionObjectHash) { |
+ (void)nssCKFWHash_Destroy(fwSession->sessionObjectHash); |
+ } |
+ NSSArena_Destroy(arena); |
} |
- NSSArena_Destroy(arena); |
- } |
- return (NSSCKFWSession *)NULL; |
+ return (NSSCKFWSession *)NULL; |
} |
static void |
-nss_ckfw_session_object_destroy_iterator |
-( |
- const void *key, |
- void *value, |
- void *closure |
-) |
+nss_ckfw_session_object_destroy_iterator( |
+ const void *key, |
+ void *value, |
+ void *closure) |
{ |
- NSSCKFWObject *fwObject = (NSSCKFWObject *)value; |
- nssCKFWObject_Finalize(fwObject, PR_TRUE); |
+ NSSCKFWObject *fwObject = (NSSCKFWObject *)value; |
+ nssCKFWObject_Finalize(fwObject, PR_TRUE); |
} |
/* |
@@ -225,51 +215,49 @@ nss_ckfw_session_object_destroy_iterator |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_Destroy |
-( |
- NSSCKFWSession *fwSession, |
- CK_BBOOL removeFromTokenHash |
-) |
+nssCKFWSession_Destroy( |
+ NSSCKFWSession *fwSession, |
+ CK_BBOOL removeFromTokenHash) |
{ |
- CK_RV error = CKR_OK; |
- nssCKFWHash *sessionObjectHash; |
- NSSCKFWCryptoOperationState i; |
+ CK_RV error = CKR_OK; |
+ nssCKFWHash *sessionObjectHash; |
+ NSSCKFWCryptoOperationState i; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
#endif /* NSSDEBUG */ |
- if( removeFromTokenHash ) { |
- error = nssCKFWToken_RemoveSession(fwSession->fwToken, fwSession); |
- } |
+ if (removeFromTokenHash) { |
+ error = nssCKFWToken_RemoveSession(fwSession->fwToken, fwSession); |
+ } |
- /* |
- * Invalidate session objects |
- */ |
+ /* |
+ * Invalidate session objects |
+ */ |
- sessionObjectHash = fwSession->sessionObjectHash; |
- fwSession->sessionObjectHash = (nssCKFWHash *)NULL; |
+ sessionObjectHash = fwSession->sessionObjectHash; |
+ fwSession->sessionObjectHash = (nssCKFWHash *)NULL; |
- nssCKFWHash_Iterate(sessionObjectHash, |
- nss_ckfw_session_object_destroy_iterator, |
- (void *)NULL); |
+ nssCKFWHash_Iterate(sessionObjectHash, |
+ nss_ckfw_session_object_destroy_iterator, |
+ (void *)NULL); |
- for (i=0; i < NSSCKFWCryptoOperationState_Max; i++) { |
- if (fwSession->fwOperationArray[i]) { |
- nssCKFWCryptoOperation_Destroy(fwSession->fwOperationArray[i]); |
+ for (i = 0; i < NSSCKFWCryptoOperationState_Max; i++) { |
+ if (fwSession->fwOperationArray[i]) { |
+ nssCKFWCryptoOperation_Destroy(fwSession->fwOperationArray[i]); |
+ } |
} |
- } |
#ifdef DEBUG |
- (void)session_remove_pointer(fwSession); |
+ (void)session_remove_pointer(fwSession); |
#endif /* DEBUG */ |
- (void)nssCKFWHash_Destroy(sessionObjectHash); |
- NSSArena_Destroy(fwSession->arena); |
+ (void)nssCKFWHash_Destroy(sessionObjectHash); |
+ NSSArena_Destroy(fwSession->arena); |
- return error; |
+ return error; |
} |
/* |
@@ -277,18 +265,16 @@ nssCKFWSession_Destroy |
* |
*/ |
NSS_IMPLEMENT NSSCKMDSession * |
-nssCKFWSession_GetMDSession |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_GetMDSession( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return (NSSCKMDSession *)NULL; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return (NSSCKMDSession *)NULL; |
+ } |
#endif /* NSSDEBUG */ |
- return fwSession->mdSession; |
+ return fwSession->mdSession; |
} |
/* |
@@ -296,24 +282,22 @@ nssCKFWSession_GetMDSession |
* |
*/ |
NSS_IMPLEMENT NSSArena * |
-nssCKFWSession_GetArena |
-( |
- NSSCKFWSession *fwSession, |
- CK_RV *pError |
-) |
+nssCKFWSession_GetArena( |
+ NSSCKFWSession *fwSession, |
+ CK_RV *pError) |
{ |
#ifdef NSSDEBUG |
- if (!pError) { |
- return (NSSArena *)NULL; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != *pError ) { |
- return (NSSArena *)NULL; |
- } |
+ if (!pError) { |
+ return (NSSArena *)NULL; |
+ } |
+ |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != *pError) { |
+ return (NSSArena *)NULL; |
+ } |
#endif /* NSSDEBUG */ |
- return fwSession->arena; |
+ return fwSession->arena; |
} |
/* |
@@ -321,34 +305,32 @@ nssCKFWSession_GetArena |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_CallNotification |
-( |
- NSSCKFWSession *fwSession, |
- CK_NOTIFICATION event |
-) |
+nssCKFWSession_CallNotification( |
+ NSSCKFWSession *fwSession, |
+ CK_NOTIFICATION event) |
{ |
- CK_RV error = CKR_OK; |
- CK_SESSION_HANDLE handle; |
+ CK_RV error = CKR_OK; |
+ CK_SESSION_HANDLE handle; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
#endif /* NSSDEBUG */ |
- if( (CK_NOTIFY)NULL == fwSession->Notify ) { |
- return CKR_OK; |
- } |
+ if ((CK_NOTIFY)NULL == fwSession->Notify) { |
+ return CKR_OK; |
+ } |
- handle = nssCKFWInstance_FindSessionHandle(fwSession->fwInstance, fwSession); |
- if( (CK_SESSION_HANDLE)0 == handle ) { |
- return CKR_GENERAL_ERROR; |
- } |
+ handle = nssCKFWInstance_FindSessionHandle(fwSession->fwInstance, fwSession); |
+ if ((CK_SESSION_HANDLE)0 == handle) { |
+ return CKR_GENERAL_ERROR; |
+ } |
- error = fwSession->Notify(handle, event, fwSession->pApplication); |
+ error = fwSession->Notify(handle, event, fwSession->pApplication); |
- return error; |
+ return error; |
} |
/* |
@@ -356,18 +338,16 @@ nssCKFWSession_CallNotification |
* |
*/ |
NSS_IMPLEMENT CK_BBOOL |
-nssCKFWSession_IsRWSession |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_IsRWSession( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CK_FALSE; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CK_FALSE; |
+ } |
#endif /* NSSDEBUG */ |
- return fwSession->rw; |
+ return fwSession->rw; |
} |
/* |
@@ -375,31 +355,29 @@ nssCKFWSession_IsRWSession |
* |
*/ |
NSS_IMPLEMENT CK_BBOOL |
-nssCKFWSession_IsSO |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_IsSO( |
+ NSSCKFWSession *fwSession) |
{ |
- CK_STATE state; |
+ CK_STATE state; |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CK_FALSE; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CK_FALSE; |
+ } |
#endif /* NSSDEBUG */ |
- state = nssCKFWToken_GetSessionState(fwSession->fwToken); |
- switch( state ) { |
- case CKS_RO_PUBLIC_SESSION: |
- case CKS_RO_USER_FUNCTIONS: |
- case CKS_RW_PUBLIC_SESSION: |
- case CKS_RW_USER_FUNCTIONS: |
- return CK_FALSE; |
- case CKS_RW_SO_FUNCTIONS: |
- return CK_TRUE; |
- default: |
- return CK_FALSE; |
- } |
+ state = nssCKFWToken_GetSessionState(fwSession->fwToken); |
+ switch (state) { |
+ case CKS_RO_PUBLIC_SESSION: |
+ case CKS_RO_USER_FUNCTIONS: |
+ case CKS_RW_PUBLIC_SESSION: |
+ case CKS_RW_USER_FUNCTIONS: |
+ return CK_FALSE; |
+ case CKS_RW_SO_FUNCTIONS: |
+ return CK_TRUE; |
+ default: |
+ return CK_FALSE; |
+ } |
} |
/* |
@@ -407,18 +385,16 @@ nssCKFWSession_IsSO |
* |
*/ |
NSS_IMPLEMENT NSSCKFWSlot * |
-nssCKFWSession_GetFWSlot |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_GetFWSlot( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return (NSSCKFWSlot *)NULL; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return (NSSCKFWSlot *)NULL; |
+ } |
#endif /* NSSDEBUG */ |
- return nssCKFWToken_GetFWSlot(fwSession->fwToken); |
+ return nssCKFWToken_GetFWSlot(fwSession->fwToken); |
} |
/* |
@@ -426,18 +402,16 @@ nssCKFWSession_GetFWSlot |
* |
*/ |
NSS_IMPLEMENT CK_STATE |
-nssCKFWSession_GetSessionState |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_GetSessionState( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CKS_RO_PUBLIC_SESSION; /* whatever */ |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CKS_RO_PUBLIC_SESSION; /* whatever */ |
+ } |
#endif /* NSSDEBUG */ |
- return nssCKFWToken_GetSessionState(fwSession->fwToken); |
+ return nssCKFWToken_GetSessionState(fwSession->fwToken); |
} |
/* |
@@ -445,33 +419,31 @@ nssCKFWSession_GetSessionState |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_SetFWFindObjects |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWFindObjects *fwFindObjects |
-) |
+nssCKFWSession_SetFWFindObjects( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWFindObjects *fwFindObjects) |
{ |
#ifdef NSSDEBUG |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
#endif /* NSSDEBUG */ |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- /* fwFindObjects may be null */ |
+/* fwFindObjects may be null */ |
#endif /* NSSDEBUG */ |
- if ((fwSession->fwFindObjects) && |
- (fwFindObjects)) { |
- return CKR_OPERATION_ACTIVE; |
- } |
+ if ((fwSession->fwFindObjects) && |
+ (fwFindObjects)) { |
+ return CKR_OPERATION_ACTIVE; |
+ } |
- fwSession->fwFindObjects = fwFindObjects; |
+ fwSession->fwFindObjects = fwFindObjects; |
- return CKR_OK; |
+ return CKR_OK; |
} |
/* |
@@ -479,29 +451,27 @@ nssCKFWSession_SetFWFindObjects |
* |
*/ |
NSS_IMPLEMENT NSSCKFWFindObjects * |
-nssCKFWSession_GetFWFindObjects |
-( |
- NSSCKFWSession *fwSession, |
- CK_RV *pError |
-) |
+nssCKFWSession_GetFWFindObjects( |
+ NSSCKFWSession *fwSession, |
+ CK_RV *pError) |
{ |
#ifdef NSSDEBUG |
- if (!pError) { |
- return (NSSCKFWFindObjects *)NULL; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != *pError ) { |
- return (NSSCKFWFindObjects *)NULL; |
- } |
+ if (!pError) { |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
+ |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != *pError) { |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
#endif /* NSSDEBUG */ |
- if (!fwSession->fwFindObjects) { |
- *pError = CKR_OPERATION_NOT_INITIALIZED; |
- return (NSSCKFWFindObjects *)NULL; |
- } |
+ if (!fwSession->fwFindObjects) { |
+ *pError = CKR_OPERATION_NOT_INITIALIZED; |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
- return fwSession->fwFindObjects; |
+ return fwSession->fwFindObjects; |
} |
/* |
@@ -509,34 +479,32 @@ nssCKFWSession_GetFWFindObjects |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_SetMDSession |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKMDSession *mdSession |
-) |
+nssCKFWSession_SetMDSession( |
+ NSSCKFWSession *fwSession, |
+ NSSCKMDSession *mdSession) |
{ |
#ifdef NSSDEBUG |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
#endif /* NSSDEBUG */ |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!mdSession) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!mdSession) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
#endif /* NSSDEBUG */ |
- if (fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
- fwSession->mdSession = mdSession; |
+ fwSession->mdSession = mdSession; |
- return CKR_OK; |
+ return CKR_OK; |
} |
/* |
@@ -544,30 +512,28 @@ nssCKFWSession_SetMDSession |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_SetHandle |
-( |
- NSSCKFWSession *fwSession, |
- CK_SESSION_HANDLE hSession |
-) |
+nssCKFWSession_SetHandle( |
+ NSSCKFWSession *fwSession, |
+ CK_SESSION_HANDLE hSession) |
{ |
#ifdef NSSDEBUG |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
#endif /* NSSDEBUG */ |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
#endif /* NSSDEBUG */ |
- if( (CK_SESSION_HANDLE)0 != fwSession->hSession ) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if ((CK_SESSION_HANDLE)0 != fwSession->hSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
- fwSession->hSession = hSession; |
+ fwSession->hSession = hSession; |
- return CKR_OK; |
+ return CKR_OK; |
} |
/* |
@@ -575,18 +541,16 @@ nssCKFWSession_SetHandle |
* |
*/ |
NSS_IMPLEMENT CK_SESSION_HANDLE |
-nssCKFWSession_GetHandle |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_GetHandle( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return NULL; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return NULL; |
+ } |
#endif /* NSSDEBUG */ |
- return fwSession->hSession; |
+ return fwSession->hSession; |
} |
/* |
@@ -594,25 +558,23 @@ nssCKFWSession_GetHandle |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_RegisterSessionObject |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWObject *fwObject |
-) |
+nssCKFWSession_RegisterSessionObject( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWObject *fwObject) |
{ |
- CK_RV rv = CKR_OK; |
+ CK_RV rv = CKR_OK; |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- if (fwSession->sessionObjectHash) { |
- rv = nssCKFWHash_Add(fwSession->sessionObjectHash, fwObject, fwObject); |
- } |
+ if (fwSession->sessionObjectHash) { |
+ rv = nssCKFWHash_Add(fwSession->sessionObjectHash, fwObject, fwObject); |
+ } |
- return rv; |
+ return rv; |
} |
/* |
@@ -620,23 +582,21 @@ nssCKFWSession_RegisterSessionObject |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_DeregisterSessionObject |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWObject *fwObject |
-) |
+nssCKFWSession_DeregisterSessionObject( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWObject *fwObject) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- if (fwSession->sessionObjectHash) { |
- nssCKFWHash_Remove(fwSession->sessionObjectHash, fwObject); |
- } |
+ if (fwSession->sessionObjectHash) { |
+ nssCKFWHash_Remove(fwSession->sessionObjectHash, fwObject); |
+ } |
- return CKR_OK; |
+ return CKR_OK; |
} |
/* |
@@ -644,28 +604,26 @@ nssCKFWSession_DeregisterSessionObject |
* |
*/ |
NSS_IMPLEMENT CK_ULONG |
-nssCKFWSession_GetDeviceError |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_GetDeviceError( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef NSSDEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return (CK_ULONG)0; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return (CK_ULONG)0; |
+ } |
- if (!fwSession->mdSession) { |
- return (CK_ULONG)0; |
- } |
+ if (!fwSession->mdSession) { |
+ return (CK_ULONG)0; |
+ } |
#endif /* NSSDEBUG */ |
- if (!fwSession->mdSession->GetDeviceError) { |
- return (CK_ULONG)0; |
- } |
+ if (!fwSession->mdSession->GetDeviceError) { |
+ return (CK_ULONG)0; |
+ } |
- return fwSession->mdSession->GetDeviceError(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance); |
+ return fwSession->mdSession->GetDeviceError(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance); |
} |
/* |
@@ -673,116 +631,117 @@ nssCKFWSession_GetDeviceError |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_Login |
-( |
- NSSCKFWSession *fwSession, |
- CK_USER_TYPE userType, |
- NSSItem *pin |
-) |
+nssCKFWSession_Login( |
+ NSSCKFWSession *fwSession, |
+ CK_USER_TYPE userType, |
+ NSSItem *pin) |
{ |
- CK_RV error = CKR_OK; |
- CK_STATE oldState; |
- CK_STATE newState; |
+ CK_RV error = CKR_OK; |
+ CK_STATE oldState; |
+ CK_STATE newState; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- switch( userType ) { |
- case CKU_SO: |
- case CKU_USER: |
- break; |
- default: |
- return CKR_USER_TYPE_INVALID; |
- } |
+ switch (userType) { |
+ case CKU_SO: |
+ case CKU_USER: |
+ break; |
+ default: |
+ return CKR_USER_TYPE_INVALID; |
+ } |
- if (!pin) { |
- if( CK_TRUE != nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken) ) { |
- return CKR_ARGUMENTS_BAD; |
+ if (!pin) { |
+ if (CK_TRUE != nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken)) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
} |
- } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- oldState = nssCKFWToken_GetSessionState(fwSession->fwToken); |
- |
- /* |
- * It's not clear what happens when you're already logged in. |
- * I'll just fail; but if we decide to change, the logic is |
- * all right here. |
- */ |
- |
- if( CKU_SO == userType ) { |
- switch( oldState ) { |
- case CKS_RO_PUBLIC_SESSION: |
- /* |
- * There's no such thing as a read-only security officer |
- * session, so fail. The error should be CKR_SESSION_READ_ONLY, |
- * except that C_Login isn't defined to return that. So we'll |
- * do CKR_SESSION_READ_ONLY_EXISTS, which is what is documented. |
- */ |
- return CKR_SESSION_READ_ONLY_EXISTS; |
- case CKS_RO_USER_FUNCTIONS: |
- return CKR_USER_ANOTHER_ALREADY_LOGGED_IN; |
- case CKS_RW_PUBLIC_SESSION: |
- newState = CKS_RW_SO_FUNCTIONS; |
- break; |
- case CKS_RW_USER_FUNCTIONS: |
- return CKR_USER_ANOTHER_ALREADY_LOGGED_IN; |
- case CKS_RW_SO_FUNCTIONS: |
- return CKR_USER_ALREADY_LOGGED_IN; |
- default: |
- return CKR_GENERAL_ERROR; |
- } |
- } else /* CKU_USER == userType */ { |
- switch( oldState ) { |
- case CKS_RO_PUBLIC_SESSION: |
- newState = CKS_RO_USER_FUNCTIONS; |
- break; |
- case CKS_RO_USER_FUNCTIONS: |
- return CKR_USER_ALREADY_LOGGED_IN; |
- case CKS_RW_PUBLIC_SESSION: |
- newState = CKS_RW_USER_FUNCTIONS; |
- break; |
- case CKS_RW_USER_FUNCTIONS: |
- return CKR_USER_ALREADY_LOGGED_IN; |
- case CKS_RW_SO_FUNCTIONS: |
- return CKR_USER_ANOTHER_ALREADY_LOGGED_IN; |
- default: |
- return CKR_GENERAL_ERROR; |
- } |
- } |
- |
- /* |
- * So now we're in one of three cases: |
- * |
- * Old == CKS_RW_PUBLIC_SESSION, New == CKS_RW_SO_FUNCTIONS; |
- * Old == CKS_RW_PUBLIC_SESSION, New == CKS_RW_USER_FUNCTIONS; |
- * Old == CKS_RO_PUBLIC_SESSION, New == CKS_RO_USER_FUNCTIONS; |
- */ |
- |
- if (!fwSession->mdSession->Login) { |
+ oldState = nssCKFWToken_GetSessionState(fwSession->fwToken); |
+ |
+ /* |
+ * It's not clear what happens when you're already logged in. |
+ * I'll just fail; but if we decide to change, the logic is |
+ * all right here. |
+ */ |
+ |
+ if (CKU_SO == userType) { |
+ switch (oldState) { |
+ case CKS_RO_PUBLIC_SESSION: |
+ /* |
+ * There's no such thing as a read-only security officer |
+ * session, so fail. The error should be CKR_SESSION_READ_ONLY, |
+ * except that C_Login isn't defined to return that. So we'll |
+ * do CKR_SESSION_READ_ONLY_EXISTS, which is what is documented. |
+ */ |
+ return CKR_SESSION_READ_ONLY_EXISTS; |
+ case CKS_RO_USER_FUNCTIONS: |
+ return CKR_USER_ANOTHER_ALREADY_LOGGED_IN; |
+ case CKS_RW_PUBLIC_SESSION: |
+ newState = |
+ CKS_RW_SO_FUNCTIONS; |
+ break; |
+ case CKS_RW_USER_FUNCTIONS: |
+ return CKR_USER_ANOTHER_ALREADY_LOGGED_IN; |
+ case CKS_RW_SO_FUNCTIONS: |
+ return CKR_USER_ALREADY_LOGGED_IN; |
+ default: |
+ return CKR_GENERAL_ERROR; |
+ } |
+ } else /* CKU_USER == userType */ { |
+ switch (oldState) { |
+ case CKS_RO_PUBLIC_SESSION: |
+ newState = |
+ CKS_RO_USER_FUNCTIONS; |
+ break; |
+ case CKS_RO_USER_FUNCTIONS: |
+ return CKR_USER_ALREADY_LOGGED_IN; |
+ case CKS_RW_PUBLIC_SESSION: |
+ newState = |
+ CKS_RW_USER_FUNCTIONS; |
+ break; |
+ case CKS_RW_USER_FUNCTIONS: |
+ return CKR_USER_ALREADY_LOGGED_IN; |
+ case CKS_RW_SO_FUNCTIONS: |
+ return CKR_USER_ANOTHER_ALREADY_LOGGED_IN; |
+ default: |
+ return CKR_GENERAL_ERROR; |
+ } |
+ } |
+ |
/* |
- * The Module doesn't want to be informed (or check the pin) |
- * it'll just rely on the Framework as needed. |
+ * So now we're in one of three cases: |
+ * |
+ * Old == CKS_RW_PUBLIC_SESSION, New == CKS_RW_SO_FUNCTIONS; |
+ * Old == CKS_RW_PUBLIC_SESSION, New == CKS_RW_USER_FUNCTIONS; |
+ * Old == CKS_RO_PUBLIC_SESSION, New == CKS_RO_USER_FUNCTIONS; |
*/ |
- ; |
- } else { |
- error = fwSession->mdSession->Login(fwSession->mdSession, fwSession, |
- fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, userType, pin, oldState, newState); |
- if( CKR_OK != error ) { |
- return error; |
- } |
- } |
- |
- (void)nssCKFWToken_SetSessionState(fwSession->fwToken, newState); |
- return CKR_OK; |
+ |
+ if (!fwSession->mdSession->Login) { |
+ /* |
+ * The Module doesn't want to be informed (or check the pin) |
+ * it'll just rely on the Framework as needed. |
+ */ |
+ ; |
+ } else { |
+ error = fwSession->mdSession->Login(fwSession->mdSession, fwSession, |
+ fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, userType, pin, oldState, newState); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
+ } |
+ |
+ (void)nssCKFWToken_SetSessionState(fwSession->fwToken, newState); |
+ return CKR_OK; |
} |
/* |
@@ -790,74 +749,72 @@ nssCKFWSession_Login |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_Logout |
-( |
- NSSCKFWSession *fwSession |
-) |
+nssCKFWSession_Logout( |
+ NSSCKFWSession *fwSession) |
{ |
- CK_RV error = CKR_OK; |
- CK_STATE oldState; |
- CK_STATE newState; |
+ CK_RV error = CKR_OK; |
+ CK_STATE oldState; |
+ CK_STATE newState; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- oldState = nssCKFWToken_GetSessionState(fwSession->fwToken); |
- |
- switch( oldState ) { |
- case CKS_RO_PUBLIC_SESSION: |
- return CKR_USER_NOT_LOGGED_IN; |
- case CKS_RO_USER_FUNCTIONS: |
- newState = CKS_RO_PUBLIC_SESSION; |
- break; |
- case CKS_RW_PUBLIC_SESSION: |
- return CKR_USER_NOT_LOGGED_IN; |
- case CKS_RW_USER_FUNCTIONS: |
- newState = CKS_RW_PUBLIC_SESSION; |
- break; |
- case CKS_RW_SO_FUNCTIONS: |
- newState = CKS_RW_PUBLIC_SESSION; |
- break; |
- default: |
- return CKR_GENERAL_ERROR; |
- } |
- |
- /* |
- * So now we're in one of three cases: |
- * |
- * Old == CKS_RW_SO_FUNCTIONS, New == CKS_RW_PUBLIC_SESSION; |
- * Old == CKS_RW_USER_FUNCTIONS, New == CKS_RW_PUBLIC_SESSION; |
- * Old == CKS_RO_USER_FUNCTIONS, New == CKS_RO_PUBLIC_SESSION; |
- */ |
- |
- if (!fwSession->mdSession->Logout) { |
+ oldState = nssCKFWToken_GetSessionState(fwSession->fwToken); |
+ |
+ switch (oldState) { |
+ case CKS_RO_PUBLIC_SESSION: |
+ return CKR_USER_NOT_LOGGED_IN; |
+ case CKS_RO_USER_FUNCTIONS: |
+ newState = CKS_RO_PUBLIC_SESSION; |
+ break; |
+ case CKS_RW_PUBLIC_SESSION: |
+ return CKR_USER_NOT_LOGGED_IN; |
+ case CKS_RW_USER_FUNCTIONS: |
+ newState = CKS_RW_PUBLIC_SESSION; |
+ break; |
+ case CKS_RW_SO_FUNCTIONS: |
+ newState = CKS_RW_PUBLIC_SESSION; |
+ break; |
+ default: |
+ return CKR_GENERAL_ERROR; |
+ } |
+ |
/* |
- * The Module doesn't want to be informed. Okay. |
+ * So now we're in one of three cases: |
+ * |
+ * Old == CKS_RW_SO_FUNCTIONS, New == CKS_RW_PUBLIC_SESSION; |
+ * Old == CKS_RW_USER_FUNCTIONS, New == CKS_RW_PUBLIC_SESSION; |
+ * Old == CKS_RO_USER_FUNCTIONS, New == CKS_RO_PUBLIC_SESSION; |
*/ |
- ; |
- } else { |
- error = fwSession->mdSession->Logout(fwSession->mdSession, fwSession, |
- fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, oldState, newState); |
- if( CKR_OK != error ) { |
- /* |
- * Now what?! A failure really should end up with the Framework |
- * considering it logged out, right? |
- */ |
- ; |
- } |
- } |
- |
- (void)nssCKFWToken_SetSessionState(fwSession->fwToken, newState); |
- return error; |
+ |
+ if (!fwSession->mdSession->Logout) { |
+ /* |
+ * The Module doesn't want to be informed. Okay. |
+ */ |
+ ; |
+ } else { |
+ error = fwSession->mdSession->Logout(fwSession->mdSession, fwSession, |
+ fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, oldState, newState); |
+ if (CKR_OK != error) { |
+ /* |
+ * Now what?! A failure really should end up with the Framework |
+ * considering it logged out, right? |
+ */ |
+ ; |
+ } |
+ } |
+ |
+ (void)nssCKFWToken_SetSessionState(fwSession->fwToken, newState); |
+ return error; |
} |
/* |
@@ -865,47 +822,45 @@ nssCKFWSession_Logout |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_InitPIN |
-( |
- NSSCKFWSession *fwSession, |
- NSSItem *pin |
-) |
+nssCKFWSession_InitPIN( |
+ NSSCKFWSession *fwSession, |
+ NSSItem *pin) |
{ |
- CK_RV error = CKR_OK; |
- CK_STATE state; |
+ CK_RV error = CKR_OK; |
+ CK_STATE state; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- state = nssCKFWToken_GetSessionState(fwSession->fwToken); |
- if( CKS_RW_SO_FUNCTIONS != state ) { |
- return CKR_USER_NOT_LOGGED_IN; |
- } |
+ state = nssCKFWToken_GetSessionState(fwSession->fwToken); |
+ if (CKS_RW_SO_FUNCTIONS != state) { |
+ return CKR_USER_NOT_LOGGED_IN; |
+ } |
- if (!pin) { |
- CK_BBOOL has = nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken); |
- if( CK_TRUE != has ) { |
- return CKR_ARGUMENTS_BAD; |
+ if (!pin) { |
+ CK_BBOOL has = nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken); |
+ if (CK_TRUE != has) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
} |
- } |
- if (!fwSession->mdSession->InitPIN) { |
- return CKR_TOKEN_WRITE_PROTECTED; |
- } |
+ if (!fwSession->mdSession->InitPIN) { |
+ return CKR_TOKEN_WRITE_PROTECTED; |
+ } |
- error = fwSession->mdSession->InitPIN(fwSession->mdSession, fwSession, |
- fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, pin); |
+ error = fwSession->mdSession->InitPIN(fwSession->mdSession, fwSession, |
+ fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, pin); |
- return error; |
+ return error; |
} |
/* |
@@ -913,49 +868,47 @@ nssCKFWSession_InitPIN |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_SetPIN |
-( |
- NSSCKFWSession *fwSession, |
- NSSItem *newPin, |
- NSSItem *oldPin |
-) |
+nssCKFWSession_SetPIN( |
+ NSSCKFWSession *fwSession, |
+ NSSItem *oldPin, |
+ NSSItem *newPin) |
{ |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- if (!newPin) { |
- CK_BBOOL has = nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken); |
- if( CK_TRUE != has ) { |
- return CKR_ARGUMENTS_BAD; |
+ if (!newPin) { |
+ CK_BBOOL has = nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken); |
+ if (CK_TRUE != has) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
} |
- } |
- if (!oldPin) { |
- CK_BBOOL has = nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken); |
- if( CK_TRUE != has ) { |
- return CKR_ARGUMENTS_BAD; |
+ if (!oldPin) { |
+ CK_BBOOL has = nssCKFWToken_GetHasProtectedAuthenticationPath(fwSession->fwToken); |
+ if (CK_TRUE != has) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
} |
- } |
- if (!fwSession->mdSession->SetPIN) { |
- return CKR_TOKEN_WRITE_PROTECTED; |
- } |
+ if (!fwSession->mdSession->SetPIN) { |
+ return CKR_TOKEN_WRITE_PROTECTED; |
+ } |
- error = fwSession->mdSession->SetPIN(fwSession->mdSession, fwSession, |
- fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, newPin, oldPin); |
+ error = fwSession->mdSession->SetPIN(fwSession->mdSession, fwSession, |
+ fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, oldPin, newPin); |
- return error; |
+ return error; |
} |
/* |
@@ -963,54 +916,52 @@ nssCKFWSession_SetPIN |
* |
*/ |
NSS_IMPLEMENT CK_ULONG |
-nssCKFWSession_GetOperationStateLen |
-( |
- NSSCKFWSession *fwSession, |
- CK_RV *pError |
-) |
+nssCKFWSession_GetOperationStateLen( |
+ NSSCKFWSession *fwSession, |
+ CK_RV *pError) |
{ |
- CK_ULONG mdAmt; |
- CK_ULONG fwAmt; |
+ CK_ULONG mdAmt; |
+ CK_ULONG fwAmt; |
#ifdef NSSDEBUG |
- if (!pError) { |
- return (CK_ULONG)0; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != *pError ) { |
- return (CK_ULONG)0; |
- } |
- |
- if (!fwSession->mdSession) { |
- *pError = CKR_GENERAL_ERROR; |
- return (CK_ULONG)0; |
- } |
+ if (!pError) { |
+ return (CK_ULONG)0; |
+ } |
+ |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != *pError) { |
+ return (CK_ULONG)0; |
+ } |
+ |
+ if (!fwSession->mdSession) { |
+ *pError = CKR_GENERAL_ERROR; |
+ return (CK_ULONG)0; |
+ } |
#endif /* NSSDEBUG */ |
- if (!fwSession->mdSession->GetOperationStateLen) { |
- *pError = CKR_STATE_UNSAVEABLE; |
- return (CK_ULONG)0; |
- } |
+ if (!fwSession->mdSession->GetOperationStateLen) { |
+ *pError = CKR_STATE_UNSAVEABLE; |
+ return (CK_ULONG)0; |
+ } |
- /* |
- * We could check that the session is actually in some state.. |
- */ |
+ /* |
+ * We could check that the session is actually in some state.. |
+ */ |
- mdAmt = fwSession->mdSession->GetOperationStateLen(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, pError); |
+ mdAmt = fwSession->mdSession->GetOperationStateLen(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, pError); |
- if( ((CK_ULONG)0 == mdAmt) && (CKR_OK != *pError) ) { |
- return (CK_ULONG)0; |
- } |
+ if (((CK_ULONG)0 == mdAmt) && (CKR_OK != *pError)) { |
+ return (CK_ULONG)0; |
+ } |
- /* |
- * Add a bit of sanity-checking |
- */ |
- fwAmt = mdAmt + 2*sizeof(CK_ULONG); |
+ /* |
+ * Add a bit of sanity-checking |
+ */ |
+ fwAmt = mdAmt + 2 * sizeof(CK_ULONG); |
- return fwAmt; |
+ return fwAmt; |
} |
/* |
@@ -1018,82 +969,80 @@ nssCKFWSession_GetOperationStateLen |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_GetOperationState |
-( |
- NSSCKFWSession *fwSession, |
- NSSItem *buffer |
-) |
+nssCKFWSession_GetOperationState( |
+ NSSCKFWSession *fwSession, |
+ NSSItem *buffer) |
{ |
- CK_RV error = CKR_OK; |
- CK_ULONG fwAmt; |
- CK_ULONG *ulBuffer; |
- NSSItem i2; |
- CK_ULONG n, i; |
+ CK_RV error = CKR_OK; |
+ CK_ULONG fwAmt; |
+ CK_ULONG *ulBuffer; |
+ NSSItem i2; |
+ CK_ULONG n, i; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!buffer) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!buffer) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!buffer->data) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!buffer->data) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- if (!fwSession->mdSession->GetOperationState) { |
- return CKR_STATE_UNSAVEABLE; |
- } |
+ if (!fwSession->mdSession->GetOperationState) { |
+ return CKR_STATE_UNSAVEABLE; |
+ } |
+ |
+ /* |
+ * Sanity-check the caller's buffer. |
+ */ |
- /* |
- * Sanity-check the caller's buffer. |
- */ |
+ error = CKR_OK; |
+ fwAmt = nssCKFWSession_GetOperationStateLen(fwSession, &error); |
+ if (((CK_ULONG)0 == fwAmt) && (CKR_OK != error)) { |
+ return error; |
+ } |
- error = CKR_OK; |
- fwAmt = nssCKFWSession_GetOperationStateLen(fwSession, &error); |
- if( ((CK_ULONG)0 == fwAmt) && (CKR_OK != error) ) { |
- return error; |
- } |
+ if (buffer->size < fwAmt) { |
+ return CKR_BUFFER_TOO_SMALL; |
+ } |
+ |
+ ulBuffer = (CK_ULONG *)buffer->data; |
- if( buffer->size < fwAmt ) { |
- return CKR_BUFFER_TOO_SMALL; |
- } |
+ i2.size = buffer->size - 2 * sizeof(CK_ULONG); |
+ i2.data = (void *)&ulBuffer[2]; |
- ulBuffer = (CK_ULONG *)buffer->data; |
+ error = fwSession->mdSession->GetOperationState(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance, &i2); |
- i2.size = buffer->size - 2*sizeof(CK_ULONG); |
- i2.data = (void *)&ulBuffer[2]; |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- error = fwSession->mdSession->GetOperationState(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance, &i2); |
+ /* |
+ * Add a little integrety/identity check. |
+ * NOTE: right now, it's pretty stupid. |
+ * A CRC or something would be better. |
+ */ |
- if( CKR_OK != error ) { |
- return error; |
- } |
- |
- /* |
- * Add a little integrety/identity check. |
- * NOTE: right now, it's pretty stupid. |
- * A CRC or something would be better. |
- */ |
- |
- ulBuffer[0] = 0x434b4657; /* CKFW */ |
- ulBuffer[1] = 0; |
- n = i2.size/sizeof(CK_ULONG); |
- for( i = 0; i < n; i++ ) { |
- ulBuffer[1] ^= ulBuffer[2+i]; |
- } |
- |
- return CKR_OK; |
+ ulBuffer[0] = 0x434b4657; /* CKFW */ |
+ ulBuffer[1] = 0; |
+ n = i2.size / sizeof(CK_ULONG); |
+ for (i = 0; i < n; i++) { |
+ ulBuffer[1] ^= ulBuffer[2 + i]; |
+ } |
+ |
+ return CKR_OK; |
} |
/* |
@@ -1101,126 +1050,122 @@ nssCKFWSession_GetOperationState |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_SetOperationState |
-( |
- NSSCKFWSession *fwSession, |
- NSSItem *state, |
- NSSCKFWObject *encryptionKey, |
- NSSCKFWObject *authenticationKey |
-) |
+nssCKFWSession_SetOperationState( |
+ NSSCKFWSession *fwSession, |
+ NSSItem *state, |
+ NSSCKFWObject *encryptionKey, |
+ NSSCKFWObject *authenticationKey) |
{ |
- CK_RV error = CKR_OK; |
- CK_ULONG *ulBuffer; |
- CK_ULONG n, i; |
- CK_ULONG x; |
- NSSItem s; |
- NSSCKMDObject *mdek; |
- NSSCKMDObject *mdak; |
+ CK_RV error = CKR_OK; |
+ CK_ULONG *ulBuffer; |
+ CK_ULONG n, i; |
+ CK_ULONG x; |
+ NSSItem s; |
+ NSSCKMDObject *mdek; |
+ NSSCKMDObject *mdak; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!state) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!state) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!state->data) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!state->data) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (encryptionKey) { |
- error = nssCKFWObject_verifyPointer(encryptionKey); |
- if( CKR_OK != error ) { |
- return error; |
+ if (encryptionKey) { |
+ error = nssCKFWObject_verifyPointer(encryptionKey); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
} |
- } |
- if (authenticationKey) { |
- error = nssCKFWObject_verifyPointer(authenticationKey); |
- if( CKR_OK != error ) { |
- return error; |
+ if (authenticationKey) { |
+ error = nssCKFWObject_verifyPointer(authenticationKey); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
} |
- } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- ulBuffer = (CK_ULONG *)state->data; |
- if( 0x43b4657 != ulBuffer[0] ) { |
- return CKR_SAVED_STATE_INVALID; |
- } |
- n = (state->size / sizeof(CK_ULONG)) - 2; |
- x = (CK_ULONG)0; |
- for( i = 0; i < n; i++ ) { |
- x ^= ulBuffer[2+i]; |
- } |
- |
- if( x != ulBuffer[1] ) { |
- return CKR_SAVED_STATE_INVALID; |
- } |
- |
- if (!fwSession->mdSession->SetOperationState) { |
- return CKR_GENERAL_ERROR; |
- } |
- |
- s.size = state->size - 2*sizeof(CK_ULONG); |
- s.data = (void *)&ulBuffer[2]; |
- |
- if (encryptionKey) { |
- mdek = nssCKFWObject_GetMDObject(encryptionKey); |
- } else { |
- mdek = (NSSCKMDObject *)NULL; |
- } |
- |
- if (authenticationKey) { |
- mdak = nssCKFWObject_GetMDObject(authenticationKey); |
- } else { |
- mdak = (NSSCKMDObject *)NULL; |
- } |
- |
- error = fwSession->mdSession->SetOperationState(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, &s, mdek, encryptionKey, mdak, authenticationKey); |
- |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ ulBuffer = (CK_ULONG *)state->data; |
+ if (0x43b4657 != ulBuffer[0]) { |
+ return CKR_SAVED_STATE_INVALID; |
+ } |
+ n = (state->size / sizeof(CK_ULONG)) - 2; |
+ x = (CK_ULONG)0; |
+ for (i = 0; i < n; i++) { |
+ x ^= ulBuffer[2 + i]; |
+ } |
+ |
+ if (x != ulBuffer[1]) { |
+ return CKR_SAVED_STATE_INVALID; |
+ } |
+ |
+ if (!fwSession->mdSession->SetOperationState) { |
+ return CKR_GENERAL_ERROR; |
+ } |
+ |
+ s.size = state->size - 2 * sizeof(CK_ULONG); |
+ s.data = (void *)&ulBuffer[2]; |
+ |
+ if (encryptionKey) { |
+ mdek = nssCKFWObject_GetMDObject(encryptionKey); |
+ } else { |
+ mdek = (NSSCKMDObject *)NULL; |
+ } |
+ |
+ if (authenticationKey) { |
+ mdak = nssCKFWObject_GetMDObject(authenticationKey); |
+ } else { |
+ mdak = (NSSCKMDObject *)NULL; |
+ } |
+ |
+ error = fwSession->mdSession->SetOperationState(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, &s, mdek, encryptionKey, mdak, authenticationKey); |
+ |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
+ |
+ /* |
+ * Here'd we restore any session data |
+ */ |
- /* |
- * Here'd we restore any session data |
- */ |
- |
- return CKR_OK; |
+ return CKR_OK; |
} |
static CK_BBOOL |
-nss_attributes_form_token_object |
-( |
- CK_ATTRIBUTE_PTR pTemplate, |
- CK_ULONG ulAttributeCount |
-) |
+nss_attributes_form_token_object( |
+ CK_ATTRIBUTE_PTR pTemplate, |
+ CK_ULONG ulAttributeCount) |
{ |
- CK_ULONG i; |
- CK_BBOOL rv; |
- |
- for( i = 0; i < ulAttributeCount; i++ ) { |
- if( CKA_TOKEN == pTemplate[i].type ) { |
- /* If we sanity-check, we can remove this sizeof check */ |
- if( sizeof(CK_BBOOL) == pTemplate[i].ulValueLen ) { |
- (void)nsslibc_memcpy(&rv, pTemplate[i].pValue, sizeof(CK_BBOOL)); |
- return rv; |
- } else { |
- return CK_FALSE; |
- } |
+ CK_ULONG i; |
+ CK_BBOOL rv; |
+ |
+ for (i = 0; i < ulAttributeCount; i++) { |
+ if (CKA_TOKEN == pTemplate[i].type) { |
+ /* If we sanity-check, we can remove this sizeof check */ |
+ if (sizeof(CK_BBOOL) == pTemplate[i].ulValueLen) { |
+ (void)nsslibc_memcpy(&rv, pTemplate[i].pValue, sizeof(CK_BBOOL)); |
+ return rv; |
+ } else { |
+ return CK_FALSE; |
+ } |
+ } |
} |
- } |
- return CK_FALSE; |
+ return CK_FALSE; |
} |
/* |
@@ -1228,492 +1173,502 @@ nss_attributes_form_token_object |
* |
*/ |
NSS_IMPLEMENT NSSCKFWObject * |
-nssCKFWSession_CreateObject |
-( |
- NSSCKFWSession *fwSession, |
- CK_ATTRIBUTE_PTR pTemplate, |
- CK_ULONG ulAttributeCount, |
- CK_RV *pError |
-) |
+nssCKFWSession_CreateObject( |
+ NSSCKFWSession *fwSession, |
+ CK_ATTRIBUTE_PTR pTemplate, |
+ CK_ULONG ulAttributeCount, |
+ CK_RV *pError) |
{ |
- NSSArena *arena; |
- NSSCKMDObject *mdObject; |
- NSSCKFWObject *fwObject; |
- CK_BBOOL isTokenObject; |
+ NSSArena *arena; |
+ NSSCKMDObject *mdObject; |
+ NSSCKFWObject *fwObject; |
+ CK_BBOOL isTokenObject; |
#ifdef NSSDEBUG |
- if (!pError) { |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != pError ) { |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- if( (CK_ATTRIBUTE_PTR)NULL == pTemplate ) { |
- *pError = CKR_ARGUMENTS_BAD; |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- if (!fwSession->mdSession) { |
- *pError = CKR_GENERAL_ERROR; |
- return (NSSCKFWObject *)NULL; |
- } |
-#endif /* NSSDEBUG */ |
- |
- /* |
- * Here would be an excellent place to sanity-check the object. |
- */ |
- |
- isTokenObject = nss_attributes_form_token_object(pTemplate, ulAttributeCount); |
- if( CK_TRUE == isTokenObject ) { |
- /* === TOKEN OBJECT === */ |
- |
- if (!fwSession->mdSession->CreateObject) { |
- *pError = CKR_TOKEN_WRITE_PROTECTED; |
- return (NSSCKFWObject *)NULL; |
+ if (!pError) { |
+ return (NSSCKFWObject *)NULL; |
} |
- arena = nssCKFWToken_GetArena(fwSession->fwToken, pError); |
- if (!arena) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWObject *)NULL; |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != pError) { |
+ return (NSSCKFWObject *)NULL; |
} |
- goto callmdcreateobject; |
- } else { |
- /* === SESSION OBJECT === */ |
- |
- arena = nssCKFWSession_GetArena(fwSession, pError); |
- if (!arena) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWObject *)NULL; |
+ if ((CK_ATTRIBUTE_PTR)NULL == pTemplate) { |
+ *pError = CKR_ARGUMENTS_BAD; |
+ return (NSSCKFWObject *)NULL; |
} |
- if( CK_TRUE == nssCKFWInstance_GetModuleHandlesSessionObjects( |
- fwSession->fwInstance) ) { |
- /* --- module handles the session object -- */ |
- |
- if (!fwSession->mdSession->CreateObject) { |
+ if (!fwSession->mdSession) { |
*pError = CKR_GENERAL_ERROR; |
return (NSSCKFWObject *)NULL; |
- } |
- |
- goto callmdcreateobject; |
- } else { |
- /* --- framework handles the session object -- */ |
- mdObject = nssCKMDSessionObject_Create(fwSession->fwToken, |
- arena, pTemplate, ulAttributeCount, pError); |
- goto gotmdobject; |
- } |
- } |
- |
- callmdcreateobject: |
- mdObject = fwSession->mdSession->CreateObject(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance, arena, pTemplate, |
- ulAttributeCount, pError); |
- |
- gotmdobject: |
- if (!mdObject) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- fwObject = nssCKFWObject_Create(arena, mdObject, |
- isTokenObject ? NULL : fwSession, |
- fwSession->fwToken, fwSession->fwInstance, pError); |
- if (!fwObject) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- |
- if (mdObject->Destroy) { |
- (void)mdObject->Destroy(mdObject, (NSSCKFWObject *)NULL, |
- fwSession->mdSession, fwSession, fwSession->mdToken, |
- fwSession->fwToken, fwSession->mdInstance, fwSession->fwInstance); |
- } |
- |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- if( CK_FALSE == isTokenObject ) { |
- if( CK_FALSE == nssCKFWHash_Exists(fwSession->sessionObjectHash, fwObject) ) { |
- *pError = nssCKFWHash_Add(fwSession->sessionObjectHash, fwObject, fwObject); |
- if( CKR_OK != *pError ) { |
- nssCKFWObject_Finalize(fwObject, PR_TRUE); |
- return (NSSCKFWObject *)NULL; |
- } |
} |
- } |
- |
- return fwObject; |
-} |
- |
-/* |
- * nssCKFWSession_CopyObject |
- * |
- */ |
-NSS_IMPLEMENT NSSCKFWObject * |
-nssCKFWSession_CopyObject |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWObject *fwObject, |
- CK_ATTRIBUTE_PTR pTemplate, |
- CK_ULONG ulAttributeCount, |
- CK_RV *pError |
-) |
-{ |
- CK_BBOOL oldIsToken; |
- CK_BBOOL newIsToken; |
- CK_ULONG i; |
- NSSCKFWObject *rv; |
- |
-#ifdef NSSDEBUG |
- if (!pError) { |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != *pError ) { |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- *pError = nssCKFWObject_verifyPointer(fwObject); |
- if( CKR_OK != *pError ) { |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- if (!fwSession->mdSession) { |
- *pError = CKR_GENERAL_ERROR; |
- return (NSSCKFWObject *)NULL; |
- } |
#endif /* NSSDEBUG */ |
- /* |
- * Sanity-check object |
- */ |
+ /* |
+ * Here would be an excellent place to sanity-check the object. |
+ */ |
- if (!fwObject) { |
- *pError = CKR_ARGUMENTS_BAD; |
- return (NSSCKFWObject *)NULL; |
- } |
+ isTokenObject = nss_attributes_form_token_object(pTemplate, ulAttributeCount); |
+ if (CK_TRUE == isTokenObject) { |
+ /* === TOKEN OBJECT === */ |
- oldIsToken = nssCKFWObject_IsTokenObject(fwObject); |
+ if (!fwSession->mdSession->CreateObject) { |
+ *pError = CKR_TOKEN_WRITE_PROTECTED; |
+ return (NSSCKFWObject *)NULL; |
+ } |
- newIsToken = oldIsToken; |
- for( i = 0; i < ulAttributeCount; i++ ) { |
- if( CKA_TOKEN == pTemplate[i].type ) { |
- /* Since we sanity-checked the object, we know this is the right size. */ |
- (void)nsslibc_memcpy(&newIsToken, pTemplate[i].pValue, sizeof(CK_BBOOL)); |
- break; |
- } |
- } |
+ arena = nssCKFWToken_GetArena(fwSession->fwToken, pError); |
+ if (!arena) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWObject *)NULL; |
+ } |
- /* |
- * If the Module handles its session objects, or if both the new |
- * and old object are token objects, use CopyObject if it exists. |
- */ |
+ goto callmdcreateobject; |
+ } else { |
+ /* === SESSION OBJECT === */ |
+ |
+ arena = nssCKFWSession_GetArena(fwSession, pError); |
+ if (!arena) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWObject *)NULL; |
+ } |
- if ((fwSession->mdSession->CopyObject) && |
- (((CK_TRUE == oldIsToken) && (CK_TRUE == newIsToken)) || |
- (CK_TRUE == nssCKFWInstance_GetModuleHandlesSessionObjects( |
- fwSession->fwInstance))) ) { |
- /* use copy object */ |
- NSSArena *arena; |
- NSSCKMDObject *mdOldObject; |
- NSSCKMDObject *mdObject; |
+ if (CK_TRUE == nssCKFWInstance_GetModuleHandlesSessionObjects( |
+ fwSession->fwInstance)) { |
+ /* --- module handles the session object -- */ |
- mdOldObject = nssCKFWObject_GetMDObject(fwObject); |
+ if (!fwSession->mdSession->CreateObject) { |
+ *pError = CKR_GENERAL_ERROR; |
+ return (NSSCKFWObject *)NULL; |
+ } |
- if( CK_TRUE == newIsToken ) { |
- arena = nssCKFWToken_GetArena(fwSession->fwToken, pError); |
- } else { |
- arena = nssCKFWSession_GetArena(fwSession, pError); |
- } |
- if (!arena) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWObject *)NULL; |
+ goto callmdcreateobject; |
+ } else { |
+ /* --- framework handles the session object -- */ |
+ mdObject = nssCKMDSessionObject_Create(fwSession->fwToken, |
+ arena, pTemplate, ulAttributeCount, pError); |
+ goto gotmdobject; |
+ } |
} |
- mdObject = fwSession->mdSession->CopyObject(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance, mdOldObject, |
- fwObject, arena, pTemplate, ulAttributeCount, pError); |
+callmdcreateobject: |
+ mdObject = fwSession->mdSession->CreateObject(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance, arena, pTemplate, |
+ ulAttributeCount, pError); |
+ |
+gotmdobject: |
if (!mdObject) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWObject *)NULL; |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWObject *)NULL; |
} |
- rv = nssCKFWObject_Create(arena, mdObject, |
- newIsToken ? NULL : fwSession, |
- fwSession->fwToken, fwSession->fwInstance, pError); |
+ fwObject = nssCKFWObject_Create(arena, mdObject, |
+ isTokenObject ? NULL |
+ : fwSession, |
+ fwSession->fwToken, fwSession->fwInstance, pError); |
+ if (!fwObject) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
- if( CK_FALSE == newIsToken ) { |
- if( CK_FALSE == nssCKFWHash_Exists(fwSession->sessionObjectHash, rv) ) { |
- *pError = nssCKFWHash_Add(fwSession->sessionObjectHash, rv, rv); |
- if( CKR_OK != *pError ) { |
- nssCKFWObject_Finalize(rv, PR_TRUE); |
- return (NSSCKFWObject *)NULL; |
+ if (mdObject->Destroy) { |
+ (void)mdObject->Destroy(mdObject, (NSSCKFWObject *)NULL, |
+ fwSession->mdSession, fwSession, fwSession->mdToken, |
+ fwSession->fwToken, fwSession->mdInstance, fwSession->fwInstance); |
} |
- } |
- } |
- return rv; |
- } else { |
- /* use create object */ |
- NSSArena *tmpArena; |
- CK_ATTRIBUTE_PTR newTemplate; |
- CK_ULONG i, j, n, newLength, k; |
- CK_ATTRIBUTE_TYPE_PTR oldTypes; |
- NSSCKFWObject *rv; |
- |
- n = nssCKFWObject_GetAttributeCount(fwObject, pError); |
- if( (0 == n) && (CKR_OK != *pError) ) { |
- return (NSSCKFWObject *)NULL; |
+ return (NSSCKFWObject *)NULL; |
} |
- tmpArena = NSSArena_Create(); |
- if (!tmpArena) { |
- *pError = CKR_HOST_MEMORY; |
- return (NSSCKFWObject *)NULL; |
+ if (CK_FALSE == isTokenObject) { |
+ if (CK_FALSE == nssCKFWHash_Exists(fwSession->sessionObjectHash, fwObject)) { |
+ *pError = nssCKFWHash_Add(fwSession->sessionObjectHash, fwObject, fwObject); |
+ if (CKR_OK != *pError) { |
+ nssCKFWObject_Finalize(fwObject, PR_TRUE); |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ } |
} |
- oldTypes = nss_ZNEWARRAY(tmpArena, CK_ATTRIBUTE_TYPE, n); |
- if( (CK_ATTRIBUTE_TYPE_PTR)NULL == oldTypes ) { |
- NSSArena_Destroy(tmpArena); |
- *pError = CKR_HOST_MEMORY; |
- return (NSSCKFWObject *)NULL; |
+ return fwObject; |
+} |
+ |
+/* |
+ * nssCKFWSession_CopyObject |
+ * |
+ */ |
+NSS_IMPLEMENT NSSCKFWObject * |
+nssCKFWSession_CopyObject( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWObject *fwObject, |
+ CK_ATTRIBUTE_PTR pTemplate, |
+ CK_ULONG ulAttributeCount, |
+ CK_RV *pError) |
+{ |
+ CK_BBOOL oldIsToken; |
+ CK_BBOOL newIsToken; |
+ CK_ULONG i; |
+ NSSCKFWObject *rv; |
+ |
+#ifdef NSSDEBUG |
+ if (!pError) { |
+ return (NSSCKFWObject *)NULL; |
} |
- *pError = nssCKFWObject_GetAttributeTypes(fwObject, oldTypes, n); |
- if( CKR_OK != *pError ) { |
- NSSArena_Destroy(tmpArena); |
- return (NSSCKFWObject *)NULL; |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != *pError) { |
+ return (NSSCKFWObject *)NULL; |
} |
- newLength = n; |
- for( i = 0; i < ulAttributeCount; i++ ) { |
- for( j = 0; j < n; j++ ) { |
- if( oldTypes[j] == pTemplate[i].type ) { |
- if( (CK_VOID_PTR)NULL == pTemplate[i].pValue ) { |
- /* Removing the attribute */ |
- newLength--; |
- } |
- break; |
- } |
- } |
- if( j == n ) { |
- /* Not found */ |
- newLength++; |
- } |
- } |
- |
- newTemplate = nss_ZNEWARRAY(tmpArena, CK_ATTRIBUTE, newLength); |
- if( (CK_ATTRIBUTE_PTR)NULL == newTemplate ) { |
- NSSArena_Destroy(tmpArena); |
- *pError = CKR_HOST_MEMORY; |
- return (NSSCKFWObject *)NULL; |
- } |
- |
- k = 0; |
- for( j = 0; j < n; j++ ) { |
- for( i = 0; i < ulAttributeCount; i++ ) { |
- if( oldTypes[j] == pTemplate[i].type ) { |
- if( (CK_VOID_PTR)NULL == pTemplate[i].pValue ) { |
- /* This attribute is being deleted */ |
- ; |
- } else { |
- /* This attribute is being replaced */ |
- newTemplate[k].type = pTemplate[i].type; |
- newTemplate[k].pValue = pTemplate[i].pValue; |
- newTemplate[k].ulValueLen = pTemplate[i].ulValueLen; |
- k++; |
- } |
- break; |
- } |
- } |
- if( i == ulAttributeCount ) { |
- /* This attribute is being copied over from the old object */ |
- NSSItem item, *it; |
- item.size = 0; |
- item.data = (void *)NULL; |
- it = nssCKFWObject_GetAttribute(fwObject, oldTypes[j], |
- &item, tmpArena, pError); |
- if (!it) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- NSSArena_Destroy(tmpArena); |
- return (NSSCKFWObject *)NULL; |
- } |
- newTemplate[k].type = oldTypes[j]; |
- newTemplate[k].pValue = it->data; |
- newTemplate[k].ulValueLen = it->size; |
- k++; |
- } |
+ *pError = nssCKFWObject_verifyPointer(fwObject); |
+ if (CKR_OK != *pError) { |
+ return (NSSCKFWObject *)NULL; |
} |
- /* assert that k == newLength */ |
- rv = nssCKFWSession_CreateObject(fwSession, newTemplate, newLength, pError); |
- if (!rv) { |
- if( CKR_OK == *pError ) { |
+ if (!fwSession->mdSession) { |
*pError = CKR_GENERAL_ERROR; |
- } |
- NSSArena_Destroy(tmpArena); |
- return (NSSCKFWObject *)NULL; |
+ return (NSSCKFWObject *)NULL; |
} |
+#endif /* NSSDEBUG */ |
- NSSArena_Destroy(tmpArena); |
- return rv; |
- } |
-} |
+ /* |
+ * Sanity-check object |
+ */ |
-/* |
- * nssCKFWSession_FindObjectsInit |
- * |
- */ |
-NSS_IMPLEMENT NSSCKFWFindObjects * |
-nssCKFWSession_FindObjectsInit |
-( |
- NSSCKFWSession *fwSession, |
- CK_ATTRIBUTE_PTR pTemplate, |
- CK_ULONG ulAttributeCount, |
- CK_RV *pError |
-) |
-{ |
- NSSCKMDFindObjects *mdfo1 = (NSSCKMDFindObjects *)NULL; |
- NSSCKMDFindObjects *mdfo2 = (NSSCKMDFindObjects *)NULL; |
+ if (!fwObject) { |
+ *pError = CKR_ARGUMENTS_BAD; |
+ return (NSSCKFWObject *)NULL; |
+ } |
-#ifdef NSSDEBUG |
- if (!pError) { |
- return (NSSCKFWFindObjects *)NULL; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != *pError ) { |
- return (NSSCKFWFindObjects *)NULL; |
- } |
- |
- if( ((CK_ATTRIBUTE_PTR)NULL == pTemplate) && (ulAttributeCount != 0) ) { |
- *pError = CKR_ARGUMENTS_BAD; |
- return (NSSCKFWFindObjects *)NULL; |
- } |
- |
- if (!fwSession->mdSession) { |
- *pError = CKR_GENERAL_ERROR; |
- return (NSSCKFWFindObjects *)NULL; |
- } |
-#endif /* NSSDEBUG */ |
+ oldIsToken = nssCKFWObject_IsTokenObject(fwObject); |
- if( CK_TRUE != nssCKFWInstance_GetModuleHandlesSessionObjects( |
- fwSession->fwInstance) ) { |
- CK_ULONG i; |
+ newIsToken = oldIsToken; |
+ for (i = 0; i < ulAttributeCount; i++) { |
+ if (CKA_TOKEN == pTemplate[i].type) { |
+ /* Since we sanity-checked the object, we know this is the right size. */ |
+ (void)nsslibc_memcpy(&newIsToken, pTemplate[i].pValue, sizeof(CK_BBOOL)); |
+ break; |
+ } |
+ } |
/* |
- * Does the search criteria restrict us to token or session |
- * objects? |
+ * If the Module handles its session objects, or if both the new |
+ * and old object are token objects, use CopyObject if it exists. |
*/ |
- for( i = 0; i < ulAttributeCount; i++ ) { |
- if( CKA_TOKEN == pTemplate[i].type ) { |
- /* Yes, it does. */ |
- CK_BBOOL isToken; |
- if( sizeof(CK_BBOOL) != pTemplate[i].ulValueLen ) { |
- *pError = CKR_ATTRIBUTE_VALUE_INVALID; |
- return (NSSCKFWFindObjects *)NULL; |
- } |
- (void)nsslibc_memcpy(&isToken, pTemplate[i].pValue, sizeof(CK_BBOOL)); |
+ if ((fwSession->mdSession->CopyObject) && |
+ (((CK_TRUE == oldIsToken) && (CK_TRUE == newIsToken)) || |
+ (CK_TRUE == nssCKFWInstance_GetModuleHandlesSessionObjects( |
+ fwSession->fwInstance)))) { |
+ /* use copy object */ |
+ NSSArena *arena; |
+ NSSCKMDObject *mdOldObject; |
+ NSSCKMDObject *mdObject; |
- if( CK_TRUE == isToken ) { |
- /* Pass it on to the module's search routine */ |
- if (!fwSession->mdSession->FindObjectsInit) { |
- goto wrap; |
- } |
+ mdOldObject = nssCKFWObject_GetMDObject(fwObject); |
- mdfo1 = fwSession->mdSession->FindObjectsInit(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance, |
- pTemplate, ulAttributeCount, pError); |
+ if (CK_TRUE == newIsToken) { |
+ arena = nssCKFWToken_GetArena(fwSession->fwToken, pError); |
} else { |
- /* Do the search ourselves */ |
- mdfo1 = nssCKMDFindSessionObjects_Create(fwSession->fwToken, |
- pTemplate, ulAttributeCount, pError); |
+ arena = nssCKFWSession_GetArena(fwSession, pError); |
+ } |
+ if (!arena) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWObject *)NULL; |
} |
- if (!mdfo1) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWFindObjects *)NULL; |
+ mdObject = fwSession->mdSession->CopyObject(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance, mdOldObject, |
+ fwObject, arena, pTemplate, ulAttributeCount, pError); |
+ if (!mdObject) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWObject *)NULL; |
} |
- |
- goto wrap; |
- } |
- } |
- if( i == ulAttributeCount ) { |
- /* No, it doesn't. Do a hybrid search. */ |
- mdfo1 = fwSession->mdSession->FindObjectsInit(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance, |
- pTemplate, ulAttributeCount, pError); |
+ rv = nssCKFWObject_Create(arena, mdObject, |
+ newIsToken ? NULL |
+ : fwSession, |
+ fwSession->fwToken, fwSession->fwInstance, pError); |
+ |
+ if (CK_FALSE == newIsToken) { |
+ if (CK_FALSE == nssCKFWHash_Exists(fwSession->sessionObjectHash, rv)) { |
+ *pError = nssCKFWHash_Add(fwSession->sessionObjectHash, rv, rv); |
+ if (CKR_OK != *pError) { |
+ nssCKFWObject_Finalize(rv, PR_TRUE); |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ } |
+ } |
- if (!mdfo1) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
+ return rv; |
+ } else { |
+ /* use create object */ |
+ NSSArena *tmpArena; |
+ CK_ATTRIBUTE_PTR newTemplate; |
+ CK_ULONG i, j, n, newLength, k; |
+ CK_ATTRIBUTE_TYPE_PTR oldTypes; |
+ NSSCKFWObject *rv; |
+ |
+ n = nssCKFWObject_GetAttributeCount(fwObject, pError); |
+ if ((0 == n) && (CKR_OK != *pError)) { |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ |
+ tmpArena = NSSArena_Create(); |
+ if (!tmpArena) { |
+ *pError = CKR_HOST_MEMORY; |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ |
+ oldTypes = nss_ZNEWARRAY(tmpArena, CK_ATTRIBUTE_TYPE, n); |
+ if ((CK_ATTRIBUTE_TYPE_PTR)NULL == oldTypes) { |
+ NSSArena_Destroy(tmpArena); |
+ *pError = CKR_HOST_MEMORY; |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ |
+ *pError = nssCKFWObject_GetAttributeTypes(fwObject, oldTypes, n); |
+ if (CKR_OK != *pError) { |
+ NSSArena_Destroy(tmpArena); |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ |
+ newLength = n; |
+ for (i = 0; i < ulAttributeCount; i++) { |
+ for (j = 0; j < n; j++) { |
+ if (oldTypes[j] == pTemplate[i].type) { |
+ if ((CK_VOID_PTR)NULL == |
+ pTemplate[i].pValue) { |
+ /* Removing the attribute */ |
+ newLength--; |
+ } |
+ break; |
+ } |
+ } |
+ if (j == n) { |
+ /* Not found */ |
+ newLength++; |
+ } |
+ } |
+ |
+ newTemplate = nss_ZNEWARRAY(tmpArena, CK_ATTRIBUTE, newLength); |
+ if ((CK_ATTRIBUTE_PTR)NULL == newTemplate) { |
+ NSSArena_Destroy(tmpArena); |
+ *pError = CKR_HOST_MEMORY; |
+ return (NSSCKFWObject *)NULL; |
} |
- return (NSSCKFWFindObjects *)NULL; |
- } |
- mdfo2 = nssCKMDFindSessionObjects_Create(fwSession->fwToken, |
- pTemplate, ulAttributeCount, pError); |
- if (!mdfo2) { |
- if( CKR_OK == *pError ) { |
- *pError = CKR_GENERAL_ERROR; |
+ k = 0; |
+ for (j = 0; j < n; j++) { |
+ for (i = 0; i < ulAttributeCount; i++) { |
+ if (oldTypes[j] == pTemplate[i].type) { |
+ if ((CK_VOID_PTR)NULL == |
+ pTemplate[i].pValue) { |
+ /* This attribute is being deleted */ |
+ ; |
+ } else { |
+ /* This attribute is being replaced */ |
+ newTemplate[k].type = |
+ pTemplate[i].type; |
+ newTemplate[k].pValue = |
+ pTemplate[i].pValue; |
+ newTemplate[k].ulValueLen = |
+ pTemplate[i].ulValueLen; |
+ k++; |
+ } |
+ break; |
+ } |
+ } |
+ if (i == ulAttributeCount) { |
+ /* This attribute is being copied over from the old object */ |
+ NSSItem item, *it; |
+ item.size = 0; |
+ item.data = (void *)NULL; |
+ it = nssCKFWObject_GetAttribute(fwObject, oldTypes[j], |
+ &item, tmpArena, pError); |
+ if (!it) { |
+ if (CKR_OK == |
+ *pError) { |
+ *pError = |
+ CKR_GENERAL_ERROR; |
+ } |
+ NSSArena_Destroy(tmpArena); |
+ return (NSSCKFWObject *)NULL; |
+ } |
+ newTemplate[k].type = oldTypes[j]; |
+ newTemplate[k].pValue = it->data; |
+ newTemplate[k].ulValueLen = it->size; |
+ k++; |
+ } |
} |
- if (mdfo1->Final) { |
- mdfo1->Final(mdfo1, (NSSCKFWFindObjects *)NULL, fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance); |
+ /* assert that k == newLength */ |
+ |
+ rv = nssCKFWSession_CreateObject(fwSession, newTemplate, newLength, pError); |
+ if (!rv) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ NSSArena_Destroy(tmpArena); |
+ return (NSSCKFWObject *)NULL; |
} |
+ |
+ NSSArena_Destroy(tmpArena); |
+ return rv; |
+ } |
+} |
+ |
+/* |
+ * nssCKFWSession_FindObjectsInit |
+ * |
+ */ |
+NSS_IMPLEMENT NSSCKFWFindObjects * |
+nssCKFWSession_FindObjectsInit( |
+ NSSCKFWSession *fwSession, |
+ CK_ATTRIBUTE_PTR pTemplate, |
+ CK_ULONG ulAttributeCount, |
+ CK_RV *pError) |
+{ |
+ NSSCKMDFindObjects *mdfo1 = (NSSCKMDFindObjects *)NULL; |
+ NSSCKMDFindObjects *mdfo2 = (NSSCKMDFindObjects *)NULL; |
+ |
+#ifdef NSSDEBUG |
+ if (!pError) { |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
+ |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != *pError) { |
return (NSSCKFWFindObjects *)NULL; |
- } |
+ } |
- goto wrap; |
+ if (((CK_ATTRIBUTE_PTR)NULL == pTemplate) && (ulAttributeCount != 0)) { |
+ *pError = CKR_ARGUMENTS_BAD; |
+ return (NSSCKFWFindObjects *)NULL; |
} |
- /*NOTREACHED*/ |
- } else { |
- /* Module handles all its own objects. Pass on to module's search */ |
- mdfo1 = fwSession->mdSession->FindObjectsInit(fwSession->mdSession, |
- fwSession, fwSession->mdToken, fwSession->fwToken, |
- fwSession->mdInstance, fwSession->fwInstance, |
- pTemplate, ulAttributeCount, pError); |
- if (!mdfo1) { |
- if( CKR_OK == *pError ) { |
+ if (!fwSession->mdSession) { |
*pError = CKR_GENERAL_ERROR; |
- } |
- return (NSSCKFWFindObjects *)NULL; |
+ return (NSSCKFWFindObjects *)NULL; |
} |
+#endif /* NSSDEBUG */ |
+ |
+ if (CK_TRUE != nssCKFWInstance_GetModuleHandlesSessionObjects( |
+ fwSession->fwInstance)) { |
+ CK_ULONG i; |
+ |
+ /* |
+ * Does the search criteria restrict us to token or session |
+ * objects? |
+ */ |
+ |
+ for (i = 0; i < ulAttributeCount; i++) { |
+ if (CKA_TOKEN == pTemplate[i].type) { |
+ /* Yes, it does. */ |
+ CK_BBOOL isToken; |
+ if (sizeof(CK_BBOOL) != pTemplate[i].ulValueLen) { |
+ *pError = |
+ CKR_ATTRIBUTE_VALUE_INVALID; |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
+ (void)nsslibc_memcpy(&isToken, pTemplate[i].pValue, sizeof(CK_BBOOL)); |
+ |
+ if (CK_TRUE == isToken) { |
+ /* Pass it on to the module's search routine */ |
+ if (!fwSession->mdSession->FindObjectsInit) { |
+ goto wrap; |
+ } |
+ |
+ mdfo1 = |
+ fwSession->mdSession->FindObjectsInit(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance, |
+ pTemplate, ulAttributeCount, pError); |
+ } else { |
+ /* Do the search ourselves */ |
+ mdfo1 = |
+ nssCKMDFindSessionObjects_Create(fwSession->fwToken, |
+ pTemplate, ulAttributeCount, pError); |
+ } |
+ |
+ if (!mdfo1) { |
+ if (CKR_OK == |
+ *pError) { |
+ *pError = |
+ CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
+ |
+ goto wrap; |
+ } |
+ } |
+ |
+ if (i == ulAttributeCount) { |
+ /* No, it doesn't. Do a hybrid search. */ |
+ mdfo1 = fwSession->mdSession->FindObjectsInit(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance, |
+ pTemplate, ulAttributeCount, pError); |
+ |
+ if (!mdfo1) { |
+ if (CKR_OK == *pError) { |
+ *pError = |
+ CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
+ |
+ mdfo2 = nssCKMDFindSessionObjects_Create(fwSession->fwToken, |
+ pTemplate, ulAttributeCount, pError); |
+ if (!mdfo2) { |
+ if (CKR_OK == *pError) { |
+ *pError = |
+ CKR_GENERAL_ERROR; |
+ } |
+ if (mdfo1->Final) { |
+ mdfo1->Final(mdfo1, (NSSCKFWFindObjects *)NULL, fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance); |
+ } |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
+ |
+ goto wrap; |
+ } |
+ /*NOTREACHED*/ |
+ } else { |
+ /* Module handles all its own objects. Pass on to module's search */ |
+ mdfo1 = fwSession->mdSession->FindObjectsInit(fwSession->mdSession, |
+ fwSession, fwSession->mdToken, fwSession->fwToken, |
+ fwSession->mdInstance, fwSession->fwInstance, |
+ pTemplate, ulAttributeCount, pError); |
- goto wrap; |
- } |
+ if (!mdfo1) { |
+ if (CKR_OK == *pError) { |
+ *pError = CKR_GENERAL_ERROR; |
+ } |
+ return (NSSCKFWFindObjects *)NULL; |
+ } |
- wrap: |
- return nssCKFWFindObjects_Create(fwSession, fwSession->fwToken, |
- fwSession->fwInstance, mdfo1, mdfo2, pError); |
+ goto wrap; |
+ } |
+ |
+wrap: |
+ return nssCKFWFindObjects_Create(fwSession, fwSession->fwToken, |
+ fwSession->fwInstance, mdfo1, mdfo2, pError); |
} |
/* |
@@ -1721,46 +1676,44 @@ nssCKFWSession_FindObjectsInit |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_SeedRandom |
-( |
- NSSCKFWSession *fwSession, |
- NSSItem *seed |
-) |
+nssCKFWSession_SeedRandom( |
+ NSSCKFWSession *fwSession, |
+ NSSItem *seed) |
{ |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!seed) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!seed) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!seed->data) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!seed->data) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if( 0 == seed->size ) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (0 == seed->size) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- if (!fwSession->mdSession->SeedRandom) { |
- return CKR_RANDOM_SEED_NOT_SUPPORTED; |
- } |
+ if (!fwSession->mdSession->SeedRandom) { |
+ return CKR_RANDOM_SEED_NOT_SUPPORTED; |
+ } |
- error = fwSession->mdSession->SeedRandom(fwSession->mdSession, fwSession, |
- fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, seed); |
+ error = fwSession->mdSession->SeedRandom(fwSession->mdSession, fwSession, |
+ fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, seed); |
- return error; |
+ return error; |
} |
/* |
@@ -1768,584 +1721,558 @@ nssCKFWSession_SeedRandom |
* |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_GetRandom |
-( |
- NSSCKFWSession *fwSession, |
- NSSItem *buffer |
-) |
+nssCKFWSession_GetRandom( |
+ NSSCKFWSession *fwSession, |
+ NSSItem *buffer) |
{ |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!buffer) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!buffer) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!buffer->data) { |
- return CKR_ARGUMENTS_BAD; |
- } |
+ if (!buffer->data) { |
+ return CKR_ARGUMENTS_BAD; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- if (!fwSession->mdSession->GetRandom) { |
- if( CK_TRUE == nssCKFWToken_GetHasRNG(fwSession->fwToken) ) { |
- return CKR_GENERAL_ERROR; |
- } else { |
- return CKR_RANDOM_NO_RNG; |
+ if (!fwSession->mdSession->GetRandom) { |
+ if (CK_TRUE == nssCKFWToken_GetHasRNG(fwSession->fwToken)) { |
+ return CKR_GENERAL_ERROR; |
+ } else { |
+ return CKR_RANDOM_NO_RNG; |
+ } |
} |
- } |
- if( 0 == buffer->size ) { |
- return CKR_OK; |
- } |
+ if (0 == buffer->size) { |
+ return CKR_OK; |
+ } |
- error = fwSession->mdSession->GetRandom(fwSession->mdSession, fwSession, |
- fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
- fwSession->fwInstance, buffer); |
+ error = fwSession->mdSession->GetRandom(fwSession->mdSession, fwSession, |
+ fwSession->mdToken, fwSession->fwToken, fwSession->mdInstance, |
+ fwSession->fwInstance, buffer); |
- return error; |
+ return error; |
} |
- |
/* |
* nssCKFWSession_SetCurrentCryptoOperation |
*/ |
NSS_IMPLEMENT void |
-nssCKFWSession_SetCurrentCryptoOperation |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperation * fwOperation, |
- NSSCKFWCryptoOperationState state |
-) |
+nssCKFWSession_SetCurrentCryptoOperation( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperation *fwOperation, |
+ NSSCKFWCryptoOperationState state) |
{ |
#ifdef NSSDEBUG |
- CK_RV error = CKR_OK; |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return; |
- } |
+ CK_RV error = CKR_OK; |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return; |
+ } |
- if ( state >= NSSCKFWCryptoOperationState_Max) { |
- return; |
- } |
+ if (state >= NSSCKFWCryptoOperationState_Max) { |
+ return; |
+ } |
- if (!fwSession->mdSession) { |
- return; |
- } |
+ if (!fwSession->mdSession) { |
+ return; |
+ } |
#endif /* NSSDEBUG */ |
- fwSession->fwOperationArray[state] = fwOperation; |
- return; |
+ fwSession->fwOperationArray[state] = fwOperation; |
+ return; |
} |
/* |
* nssCKFWSession_GetCurrentCryptoOperation |
*/ |
NSS_IMPLEMENT NSSCKFWCryptoOperation * |
-nssCKFWSession_GetCurrentCryptoOperation |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationState state |
-) |
+nssCKFWSession_GetCurrentCryptoOperation( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationState state) |
{ |
#ifdef NSSDEBUG |
- CK_RV error = CKR_OK; |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return (NSSCKFWCryptoOperation *)NULL; |
- } |
- |
- if ( state >= NSSCKFWCryptoOperationState_Max) { |
- return (NSSCKFWCryptoOperation *)NULL; |
- } |
- |
- if (!fwSession->mdSession) { |
- return (NSSCKFWCryptoOperation *)NULL; |
- } |
+ CK_RV error = CKR_OK; |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return (NSSCKFWCryptoOperation *)NULL; |
+ } |
+ |
+ if (state >= NSSCKFWCryptoOperationState_Max) { |
+ return (NSSCKFWCryptoOperation *)NULL; |
+ } |
+ |
+ if (!fwSession->mdSession) { |
+ return (NSSCKFWCryptoOperation *)NULL; |
+ } |
#endif /* NSSDEBUG */ |
- return fwSession->fwOperationArray[state]; |
+ return fwSession->fwOperationArray[state]; |
} |
/* |
* nssCKFWSession_Final |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_Final |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationType type, |
- NSSCKFWCryptoOperationState state, |
- CK_BYTE_PTR outBuf, |
- CK_ULONG_PTR outBufLen |
-) |
+nssCKFWSession_Final( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationType type, |
+ NSSCKFWCryptoOperationState state, |
+ CK_BYTE_PTR outBuf, |
+ CK_ULONG_PTR outBufLen) |
{ |
- NSSCKFWCryptoOperation *fwOperation; |
- NSSItem outputBuffer; |
- CK_RV error = CKR_OK; |
+ NSSCKFWCryptoOperation *fwOperation; |
+ NSSItem outputBuffer; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- /* make sure we have a valid operation initialized */ |
- fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
- if (!fwOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- /* make sure it's the correct type */ |
- if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- /* handle buffer issues, note for Verify, the type is an input buffer. */ |
- if (NSSCKFWCryptoOperationType_Verify == type) { |
- if ((CK_BYTE_PTR)NULL == outBuf) { |
- error = CKR_ARGUMENTS_BAD; |
- goto done; |
+ /* make sure we have a valid operation initialized */ |
+ fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
+ if (!fwOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
} |
- } else { |
- CK_ULONG len = nssCKFWCryptoOperation_GetFinalLength(fwOperation, &error); |
- CK_ULONG maxBufLen = *outBufLen; |
- if (CKR_OK != error) { |
- goto done; |
- } |
- *outBufLen = len; |
- if ((CK_BYTE_PTR)NULL == outBuf) { |
- return CKR_OK; |
+ /* make sure it's the correct type */ |
+ if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
} |
- if (len > maxBufLen) { |
- return CKR_BUFFER_TOO_SMALL; |
+ /* handle buffer issues, note for Verify, the type is an input buffer. */ |
+ if (NSSCKFWCryptoOperationType_Verify == type) { |
+ if ((CK_BYTE_PTR)NULL == outBuf) { |
+ error = CKR_ARGUMENTS_BAD; |
+ goto done; |
+ } |
+ } else { |
+ CK_ULONG len = nssCKFWCryptoOperation_GetFinalLength(fwOperation, &error); |
+ CK_ULONG maxBufLen = *outBufLen; |
+ |
+ if (CKR_OK != error) { |
+ goto done; |
+ } |
+ *outBufLen = len; |
+ if ((CK_BYTE_PTR)NULL == outBuf) { |
+ return CKR_OK; |
+ } |
+ |
+ if (len > maxBufLen) { |
+ return CKR_BUFFER_TOO_SMALL; |
+ } |
} |
- } |
- outputBuffer.data = outBuf; |
- outputBuffer.size = *outBufLen; |
+ outputBuffer.data = outBuf; |
+ outputBuffer.size = *outBufLen; |
- error = nssCKFWCryptoOperation_Final(fwOperation, &outputBuffer); |
+ error = nssCKFWCryptoOperation_Final(fwOperation, &outputBuffer); |
done: |
- if (CKR_BUFFER_TOO_SMALL == error) { |
+ if (CKR_BUFFER_TOO_SMALL == error) { |
+ return error; |
+ } |
+ /* clean up our state */ |
+ nssCKFWCryptoOperation_Destroy(fwOperation); |
+ nssCKFWSession_SetCurrentCryptoOperation(fwSession, NULL, state); |
return error; |
- } |
- /* clean up our state */ |
- nssCKFWCryptoOperation_Destroy(fwOperation); |
- nssCKFWSession_SetCurrentCryptoOperation(fwSession, NULL, state); |
- return error; |
} |
/* |
* nssCKFWSession_Update |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_Update |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationType type, |
- NSSCKFWCryptoOperationState state, |
- CK_BYTE_PTR inBuf, |
- CK_ULONG inBufLen, |
- CK_BYTE_PTR outBuf, |
- CK_ULONG_PTR outBufLen |
-) |
+nssCKFWSession_Update( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationType type, |
+ NSSCKFWCryptoOperationState state, |
+ CK_BYTE_PTR inBuf, |
+ CK_ULONG inBufLen, |
+ CK_BYTE_PTR outBuf, |
+ CK_ULONG_PTR outBufLen) |
{ |
- NSSCKFWCryptoOperation *fwOperation; |
- NSSItem inputBuffer; |
- NSSItem outputBuffer; |
- CK_ULONG len; |
- CK_ULONG maxBufLen; |
- CK_RV error = CKR_OK; |
+ NSSCKFWCryptoOperation *fwOperation; |
+ NSSItem inputBuffer; |
+ NSSItem outputBuffer; |
+ CK_ULONG len; |
+ CK_ULONG maxBufLen; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- /* make sure we have a valid operation initialized */ |
- fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
- if (!fwOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
+ /* make sure we have a valid operation initialized */ |
+ fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
+ if (!fwOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- /* make sure it's the correct type */ |
- if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
+ /* make sure it's the correct type */ |
+ if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- inputBuffer.data = inBuf; |
- inputBuffer.size = inBufLen; |
+ inputBuffer.data = inBuf; |
+ inputBuffer.size = inBufLen; |
- /* handle buffer issues, note for Verify, the type is an input buffer. */ |
- len = nssCKFWCryptoOperation_GetOperationLength(fwOperation, &inputBuffer, |
- &error); |
- if (CKR_OK != error) { |
- return error; |
- } |
- maxBufLen = *outBufLen; |
+ /* handle buffer issues, note for Verify, the type is an input buffer. */ |
+ len = nssCKFWCryptoOperation_GetOperationLength(fwOperation, &inputBuffer, |
+ &error); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
+ maxBufLen = *outBufLen; |
- *outBufLen = len; |
- if ((CK_BYTE_PTR)NULL == outBuf) { |
- return CKR_OK; |
- } |
+ *outBufLen = len; |
+ if ((CK_BYTE_PTR)NULL == outBuf) { |
+ return CKR_OK; |
+ } |
- if (len > maxBufLen) { |
- return CKR_BUFFER_TOO_SMALL; |
- } |
- outputBuffer.data = outBuf; |
- outputBuffer.size = *outBufLen; |
+ if (len > maxBufLen) { |
+ return CKR_BUFFER_TOO_SMALL; |
+ } |
+ outputBuffer.data = outBuf; |
+ outputBuffer.size = *outBufLen; |
- return nssCKFWCryptoOperation_Update(fwOperation, |
- &inputBuffer, &outputBuffer); |
+ return nssCKFWCryptoOperation_Update(fwOperation, |
+ &inputBuffer, &outputBuffer); |
} |
/* |
* nssCKFWSession_DigestUpdate |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_DigestUpdate |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationType type, |
- NSSCKFWCryptoOperationState state, |
- CK_BYTE_PTR inBuf, |
- CK_ULONG inBufLen |
-) |
+nssCKFWSession_DigestUpdate( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationType type, |
+ NSSCKFWCryptoOperationState state, |
+ CK_BYTE_PTR inBuf, |
+ CK_ULONG inBufLen) |
{ |
- NSSCKFWCryptoOperation *fwOperation; |
- NSSItem inputBuffer; |
- CK_RV error = CKR_OK; |
+ NSSCKFWCryptoOperation *fwOperation; |
+ NSSItem inputBuffer; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- /* make sure we have a valid operation initialized */ |
- fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
- if (!fwOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- /* make sure it's the correct type */ |
- if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
+ /* make sure we have a valid operation initialized */ |
+ fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
+ if (!fwOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- inputBuffer.data = inBuf; |
- inputBuffer.size = inBufLen; |
+ /* make sure it's the correct type */ |
+ if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
+ inputBuffer.data = inBuf; |
+ inputBuffer.size = inBufLen; |
- error = nssCKFWCryptoOperation_DigestUpdate(fwOperation, &inputBuffer); |
- return error; |
+ error = nssCKFWCryptoOperation_DigestUpdate(fwOperation, &inputBuffer); |
+ return error; |
} |
/* |
* nssCKFWSession_DigestUpdate |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_DigestKey |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWObject *fwKey |
-) |
+nssCKFWSession_DigestKey( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWObject *fwKey) |
{ |
- NSSCKFWCryptoOperation *fwOperation; |
- NSSItem *inputBuffer; |
- CK_RV error = CKR_OK; |
+ NSSCKFWCryptoOperation *fwOperation; |
+ NSSItem *inputBuffer; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- /* make sure we have a valid operation initialized */ |
- fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, |
- NSSCKFWCryptoOperationState_Digest); |
- if (!fwOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- /* make sure it's the correct type */ |
- if (NSSCKFWCryptoOperationType_Digest != |
- nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- error = nssCKFWCryptoOperation_DigestKey(fwOperation, fwKey); |
- if (CKR_FUNCTION_FAILED != error) { |
- return error; |
- } |
+ /* make sure we have a valid operation initialized */ |
+ fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, |
+ NSSCKFWCryptoOperationState_Digest); |
+ if (!fwOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- /* no machine depended way for this to happen, do it by hand */ |
- inputBuffer=nssCKFWObject_GetAttribute(fwKey, CKA_VALUE, NULL, NULL, &error); |
- if (!inputBuffer) { |
- /* couldn't get the value, just fail then */ |
+ /* make sure it's the correct type */ |
+ if (NSSCKFWCryptoOperationType_Digest != |
+ nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
+ |
+ error = nssCKFWCryptoOperation_DigestKey(fwOperation, fwKey); |
+ if (CKR_FUNCTION_FAILED != error) { |
+ return error; |
+ } |
+ |
+ /* no machine depended way for this to happen, do it by hand */ |
+ inputBuffer = nssCKFWObject_GetAttribute(fwKey, CKA_VALUE, NULL, NULL, &error); |
+ if (!inputBuffer) { |
+ /* couldn't get the value, just fail then */ |
+ return error; |
+ } |
+ error = nssCKFWCryptoOperation_DigestUpdate(fwOperation, inputBuffer); |
+ nssItem_Destroy(inputBuffer); |
return error; |
- } |
- error = nssCKFWCryptoOperation_DigestUpdate(fwOperation, inputBuffer); |
- nssItem_Destroy(inputBuffer); |
- return error; |
} |
/* |
* nssCKFWSession_UpdateFinal |
*/ |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_UpdateFinal |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationType type, |
- NSSCKFWCryptoOperationState state, |
- CK_BYTE_PTR inBuf, |
- CK_ULONG inBufLen, |
- CK_BYTE_PTR outBuf, |
- CK_ULONG_PTR outBufLen |
-) |
+nssCKFWSession_UpdateFinal( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationType type, |
+ NSSCKFWCryptoOperationState state, |
+ CK_BYTE_PTR inBuf, |
+ CK_ULONG inBufLen, |
+ CK_BYTE_PTR outBuf, |
+ CK_ULONG_PTR outBufLen) |
{ |
- NSSCKFWCryptoOperation *fwOperation; |
- NSSItem inputBuffer; |
- NSSItem outputBuffer; |
- PRBool isEncryptDecrypt; |
- CK_RV error = CKR_OK; |
+ NSSCKFWCryptoOperation *fwOperation; |
+ NSSItem inputBuffer; |
+ NSSItem outputBuffer; |
+ PRBool isEncryptDecrypt; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- /* make sure we have a valid operation initialized */ |
- fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
- if (!fwOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
+ /* make sure we have a valid operation initialized */ |
+ fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
+ if (!fwOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- /* make sure it's the correct type */ |
- if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
+ /* make sure it's the correct type */ |
+ if (type != nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- inputBuffer.data = inBuf; |
- inputBuffer.size = inBufLen; |
- isEncryptDecrypt = (PRBool) ((NSSCKFWCryptoOperationType_Encrypt == type) || |
- (NSSCKFWCryptoOperationType_Decrypt == type)) ; |
+ inputBuffer.data = inBuf; |
+ inputBuffer.size = inBufLen; |
+ isEncryptDecrypt = (PRBool)((NSSCKFWCryptoOperationType_Encrypt == type) || |
+ (NSSCKFWCryptoOperationType_Decrypt == type)); |
- /* handle buffer issues, note for Verify, the type is an input buffer. */ |
- if (NSSCKFWCryptoOperationType_Verify == type) { |
- if ((CK_BYTE_PTR)NULL == outBuf) { |
- error = CKR_ARGUMENTS_BAD; |
- goto done; |
- } |
- } else { |
- CK_ULONG maxBufLen = *outBufLen; |
- CK_ULONG len; |
+ /* handle buffer issues, note for Verify, the type is an input buffer. */ |
+ if (NSSCKFWCryptoOperationType_Verify == type) { |
+ if ((CK_BYTE_PTR)NULL == outBuf) { |
+ error = CKR_ARGUMENTS_BAD; |
+ goto done; |
+ } |
+ } else { |
+ CK_ULONG maxBufLen = *outBufLen; |
+ CK_ULONG len; |
- len = (isEncryptDecrypt) ? |
- nssCKFWCryptoOperation_GetOperationLength(fwOperation, |
- &inputBuffer, &error) : |
- nssCKFWCryptoOperation_GetFinalLength(fwOperation, &error); |
+ len = (isEncryptDecrypt) ? nssCKFWCryptoOperation_GetOperationLength(fwOperation, |
+ &inputBuffer, &error) |
+ : nssCKFWCryptoOperation_GetFinalLength(fwOperation, &error); |
- if (CKR_OK != error) { |
- goto done; |
- } |
+ if (CKR_OK != error) { |
+ goto done; |
+ } |
- *outBufLen = len; |
- if ((CK_BYTE_PTR)NULL == outBuf) { |
- return CKR_OK; |
- } |
+ *outBufLen = len; |
+ if ((CK_BYTE_PTR)NULL == outBuf) { |
+ return CKR_OK; |
+ } |
- if (len > maxBufLen) { |
- return CKR_BUFFER_TOO_SMALL; |
+ if (len > maxBufLen) { |
+ return CKR_BUFFER_TOO_SMALL; |
+ } |
} |
- } |
- outputBuffer.data = outBuf; |
- outputBuffer.size = *outBufLen; |
+ outputBuffer.data = outBuf; |
+ outputBuffer.size = *outBufLen; |
- error = nssCKFWCryptoOperation_UpdateFinal(fwOperation, |
- &inputBuffer, &outputBuffer); |
+ error = nssCKFWCryptoOperation_UpdateFinal(fwOperation, |
+ &inputBuffer, &outputBuffer); |
- /* UpdateFinal isn't support, manually use Update and Final */ |
- if (CKR_FUNCTION_FAILED == error) { |
- error = isEncryptDecrypt ? |
- nssCKFWCryptoOperation_Update(fwOperation, &inputBuffer, &outputBuffer) : |
- nssCKFWCryptoOperation_DigestUpdate(fwOperation, &inputBuffer); |
+ /* UpdateFinal isn't support, manually use Update and Final */ |
+ if (CKR_FUNCTION_FAILED == error) { |
+ error = isEncryptDecrypt ? nssCKFWCryptoOperation_Update(fwOperation, &inputBuffer, &outputBuffer) |
+ : nssCKFWCryptoOperation_DigestUpdate(fwOperation, &inputBuffer); |
- if (CKR_OK == error) { |
- error = nssCKFWCryptoOperation_Final(fwOperation, &outputBuffer); |
+ if (CKR_OK == error) { |
+ error = nssCKFWCryptoOperation_Final(fwOperation, &outputBuffer); |
+ } |
} |
- } |
- |
done: |
- if (CKR_BUFFER_TOO_SMALL == error) { |
- /* if we return CKR_BUFFER_TOO_SMALL, we the caller is not expecting. |
- * the crypto state to be freed */ |
- return error; |
- } |
+ if (CKR_BUFFER_TOO_SMALL == error) { |
+ /* if we return CKR_BUFFER_TOO_SMALL, we the caller is not expecting. |
+ * the crypto state to be freed */ |
+ return error; |
+ } |
- /* clean up our state */ |
- nssCKFWCryptoOperation_Destroy(fwOperation); |
- nssCKFWSession_SetCurrentCryptoOperation(fwSession, NULL, state); |
- return error; |
+ /* clean up our state */ |
+ nssCKFWCryptoOperation_Destroy(fwOperation); |
+ nssCKFWSession_SetCurrentCryptoOperation(fwSession, NULL, state); |
+ return error; |
} |
NSS_IMPLEMENT CK_RV |
-nssCKFWSession_UpdateCombo |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationType encryptType, |
- NSSCKFWCryptoOperationType digestType, |
- NSSCKFWCryptoOperationState digestState, |
- CK_BYTE_PTR inBuf, |
- CK_ULONG inBufLen, |
- CK_BYTE_PTR outBuf, |
- CK_ULONG_PTR outBufLen |
-) |
+nssCKFWSession_UpdateCombo( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationType encryptType, |
+ NSSCKFWCryptoOperationType digestType, |
+ NSSCKFWCryptoOperationState digestState, |
+ CK_BYTE_PTR inBuf, |
+ CK_ULONG inBufLen, |
+ CK_BYTE_PTR outBuf, |
+ CK_ULONG_PTR outBufLen) |
{ |
- NSSCKFWCryptoOperation *fwOperation; |
- NSSCKFWCryptoOperation *fwPeerOperation; |
- NSSItem inputBuffer; |
- NSSItem outputBuffer; |
- CK_ULONG maxBufLen = *outBufLen; |
- CK_ULONG len; |
- CK_RV error = CKR_OK; |
+ NSSCKFWCryptoOperation *fwOperation; |
+ NSSCKFWCryptoOperation *fwPeerOperation; |
+ NSSItem inputBuffer; |
+ NSSItem outputBuffer; |
+ CK_ULONG maxBufLen = *outBufLen; |
+ CK_ULONG len; |
+ CK_RV error = CKR_OK; |
#ifdef NSSDEBUG |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
- if (!fwSession->mdSession) { |
- return CKR_GENERAL_ERROR; |
- } |
+ if (!fwSession->mdSession) { |
+ return CKR_GENERAL_ERROR; |
+ } |
#endif /* NSSDEBUG */ |
- /* make sure we have a valid operation initialized */ |
- fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, |
- NSSCKFWCryptoOperationState_EncryptDecrypt); |
- if (!fwOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- /* make sure it's the correct type */ |
- if (encryptType != nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- /* make sure we have a valid operation initialized */ |
- fwPeerOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, |
- digestState); |
- if (!fwPeerOperation) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- /* make sure it's the correct type */ |
- if (digestType != nssCKFWCryptoOperation_GetType(fwOperation)) { |
- return CKR_OPERATION_NOT_INITIALIZED; |
- } |
- |
- inputBuffer.data = inBuf; |
- inputBuffer.size = inBufLen; |
- len = nssCKFWCryptoOperation_GetOperationLength(fwOperation, |
- &inputBuffer, &error); |
- if (CKR_OK != error) { |
- return error; |
- } |
- |
- *outBufLen = len; |
- if ((CK_BYTE_PTR)NULL == outBuf) { |
- return CKR_OK; |
- } |
- |
- if (len > maxBufLen) { |
- return CKR_BUFFER_TOO_SMALL; |
- } |
+ /* make sure we have a valid operation initialized */ |
+ fwOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, |
+ NSSCKFWCryptoOperationState_EncryptDecrypt); |
+ if (!fwOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- outputBuffer.data = outBuf; |
- outputBuffer.size = *outBufLen; |
+ /* make sure it's the correct type */ |
+ if (encryptType != nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
+ /* make sure we have a valid operation initialized */ |
+ fwPeerOperation = nssCKFWSession_GetCurrentCryptoOperation(fwSession, |
+ digestState); |
+ if (!fwPeerOperation) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- error = nssCKFWCryptoOperation_UpdateCombo(fwOperation, fwPeerOperation, |
- &inputBuffer, &outputBuffer); |
- if (CKR_FUNCTION_FAILED == error) { |
- PRBool isEncrypt = |
- (PRBool) (NSSCKFWCryptoOperationType_Encrypt == encryptType); |
+ /* make sure it's the correct type */ |
+ if (digestType != nssCKFWCryptoOperation_GetType(fwOperation)) { |
+ return CKR_OPERATION_NOT_INITIALIZED; |
+ } |
- if (isEncrypt) { |
- error = nssCKFWCryptoOperation_DigestUpdate(fwPeerOperation, |
- &inputBuffer); |
- if (CKR_OK != error) { |
+ inputBuffer.data = inBuf; |
+ inputBuffer.size = inBufLen; |
+ len = nssCKFWCryptoOperation_GetOperationLength(fwOperation, |
+ &inputBuffer, &error); |
+ if (CKR_OK != error) { |
return error; |
- } |
} |
- error = nssCKFWCryptoOperation_Update(fwOperation, |
- &inputBuffer, &outputBuffer); |
- if (CKR_OK != error) { |
- return error; |
+ |
+ *outBufLen = len; |
+ if ((CK_BYTE_PTR)NULL == outBuf) { |
+ return CKR_OK; |
+ } |
+ |
+ if (len > maxBufLen) { |
+ return CKR_BUFFER_TOO_SMALL; |
} |
- if (!isEncrypt) { |
- error = nssCKFWCryptoOperation_DigestUpdate(fwPeerOperation, |
- &outputBuffer); |
+ |
+ outputBuffer.data = outBuf; |
+ outputBuffer.size = *outBufLen; |
+ |
+ error = nssCKFWCryptoOperation_UpdateCombo(fwOperation, fwPeerOperation, |
+ &inputBuffer, &outputBuffer); |
+ if (CKR_FUNCTION_FAILED == error) { |
+ PRBool isEncrypt = |
+ (PRBool)(NSSCKFWCryptoOperationType_Encrypt == encryptType); |
+ |
+ if (isEncrypt) { |
+ error = nssCKFWCryptoOperation_DigestUpdate(fwPeerOperation, |
+ &inputBuffer); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
+ } |
+ error = nssCKFWCryptoOperation_Update(fwOperation, |
+ &inputBuffer, &outputBuffer); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
+ if (!isEncrypt) { |
+ error = nssCKFWCryptoOperation_DigestUpdate(fwPeerOperation, |
+ &outputBuffer); |
+ } |
} |
- } |
- return error; |
+ return error; |
} |
- |
/* |
* NSSCKFWSession_GetMDSession |
* |
*/ |
NSS_IMPLEMENT NSSCKMDSession * |
-NSSCKFWSession_GetMDSession |
-( |
- NSSCKFWSession *fwSession |
-) |
+NSSCKFWSession_GetMDSession( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef DEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return (NSSCKMDSession *)NULL; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return (NSSCKMDSession *)NULL; |
+ } |
#endif /* DEBUG */ |
- return nssCKFWSession_GetMDSession(fwSession); |
+ return nssCKFWSession_GetMDSession(fwSession); |
} |
/* |
@@ -2354,24 +2281,22 @@ NSSCKFWSession_GetMDSession |
*/ |
NSS_IMPLEMENT NSSArena * |
-NSSCKFWSession_GetArena |
-( |
- NSSCKFWSession *fwSession, |
- CK_RV *pError |
-) |
+NSSCKFWSession_GetArena( |
+ NSSCKFWSession *fwSession, |
+ CK_RV *pError) |
{ |
#ifdef DEBUG |
- if (!pError) { |
- return (NSSArena *)NULL; |
- } |
- |
- *pError = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != *pError ) { |
- return (NSSArena *)NULL; |
- } |
+ if (!pError) { |
+ return (NSSArena *)NULL; |
+ } |
+ |
+ *pError = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != *pError) { |
+ return (NSSArena *)NULL; |
+ } |
#endif /* DEBUG */ |
- return nssCKFWSession_GetArena(fwSession, pError); |
+ return nssCKFWSession_GetArena(fwSession, pError); |
} |
/* |
@@ -2380,22 +2305,20 @@ NSSCKFWSession_GetArena |
*/ |
NSS_IMPLEMENT CK_RV |
-NSSCKFWSession_CallNotification |
-( |
- NSSCKFWSession *fwSession, |
- CK_NOTIFICATION event |
-) |
+NSSCKFWSession_CallNotification( |
+ NSSCKFWSession *fwSession, |
+ CK_NOTIFICATION event) |
{ |
#ifdef DEBUG |
- CK_RV error = CKR_OK; |
+ CK_RV error = CKR_OK; |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return error; |
- } |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return error; |
+ } |
#endif /* DEBUG */ |
- return nssCKFWSession_CallNotification(fwSession, event); |
+ return nssCKFWSession_CallNotification(fwSession, event); |
} |
/* |
@@ -2404,18 +2327,16 @@ NSSCKFWSession_CallNotification |
*/ |
NSS_IMPLEMENT CK_BBOOL |
-NSSCKFWSession_IsRWSession |
-( |
- NSSCKFWSession *fwSession |
-) |
+NSSCKFWSession_IsRWSession( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef DEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CK_FALSE; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CK_FALSE; |
+ } |
#endif /* DEBUG */ |
- return nssCKFWSession_IsRWSession(fwSession); |
+ return nssCKFWSession_IsRWSession(fwSession); |
} |
/* |
@@ -2424,37 +2345,33 @@ NSSCKFWSession_IsRWSession |
*/ |
NSS_IMPLEMENT CK_BBOOL |
-NSSCKFWSession_IsSO |
-( |
- NSSCKFWSession *fwSession |
-) |
+NSSCKFWSession_IsSO( |
+ NSSCKFWSession *fwSession) |
{ |
#ifdef DEBUG |
- if( CKR_OK != nssCKFWSession_verifyPointer(fwSession) ) { |
- return CK_FALSE; |
- } |
+ if (CKR_OK != nssCKFWSession_verifyPointer(fwSession)) { |
+ return CK_FALSE; |
+ } |
#endif /* DEBUG */ |
- return nssCKFWSession_IsSO(fwSession); |
+ return nssCKFWSession_IsSO(fwSession); |
} |
NSS_IMPLEMENT NSSCKFWCryptoOperation * |
-NSSCKFWSession_GetCurrentCryptoOperation |
-( |
- NSSCKFWSession *fwSession, |
- NSSCKFWCryptoOperationState state |
-) |
+NSSCKFWSession_GetCurrentCryptoOperation( |
+ NSSCKFWSession *fwSession, |
+ NSSCKFWCryptoOperationState state) |
{ |
#ifdef DEBUG |
- CK_RV error = CKR_OK; |
- error = nssCKFWSession_verifyPointer(fwSession); |
- if( CKR_OK != error ) { |
- return (NSSCKFWCryptoOperation *)NULL; |
- } |
- |
- if ( state >= NSSCKFWCryptoOperationState_Max) { |
- return (NSSCKFWCryptoOperation *)NULL; |
- } |
+ CK_RV error = CKR_OK; |
+ error = nssCKFWSession_verifyPointer(fwSession); |
+ if (CKR_OK != error) { |
+ return (NSSCKFWCryptoOperation *)NULL; |
+ } |
+ |
+ if (state >= NSSCKFWCryptoOperationState_Max) { |
+ return (NSSCKFWCryptoOperation *)NULL; |
+ } |
#endif /* DEBUG */ |
- return nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
+ return nssCKFWSession_GetCurrentCryptoOperation(fwSession, state); |
} |