security/nss/lib/ckfw/capi/ctoken.c

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 /* This Source Code Form is subject to the terms of the Mozilla Public
michael@0 2 * License, v. 2.0. If a copy of the MPL was not distributed with this
michael@0 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
michael@0 4
michael@0 5 #include "ckcapi.h"
michael@0 6
michael@0 7 /*
michael@0 8 * ckcapi/ctoken.c
michael@0 9 *
michael@0 10 * This file implements the NSSCKMDToken object for the
michael@0 11 * "nss to capi" cryptoki module.
michael@0 12 */
michael@0 13
michael@0 14 static NSSUTF8 *
michael@0 15 ckcapi_mdToken_GetLabel
michael@0 16 (
michael@0 17 NSSCKMDToken *mdToken,
michael@0 18 NSSCKFWToken *fwToken,
michael@0 19 NSSCKMDInstance *mdInstance,
michael@0 20 NSSCKFWInstance *fwInstance,
michael@0 21 CK_RV *pError
michael@0 22 )
michael@0 23 {
michael@0 24 return (NSSUTF8 *)nss_ckcapi_TokenLabel;
michael@0 25 }
michael@0 26
michael@0 27 static NSSUTF8 *
michael@0 28 ckcapi_mdToken_GetManufacturerID
michael@0 29 (
michael@0 30 NSSCKMDToken *mdToken,
michael@0 31 NSSCKFWToken *fwToken,
michael@0 32 NSSCKMDInstance *mdInstance,
michael@0 33 NSSCKFWInstance *fwInstance,
michael@0 34 CK_RV *pError
michael@0 35 )
michael@0 36 {
michael@0 37 return (NSSUTF8 *)nss_ckcapi_ManufacturerID;
michael@0 38 }
michael@0 39
michael@0 40 static NSSUTF8 *
michael@0 41 ckcapi_mdToken_GetModel
michael@0 42 (
michael@0 43 NSSCKMDToken *mdToken,
michael@0 44 NSSCKFWToken *fwToken,
michael@0 45 NSSCKMDInstance *mdInstance,
michael@0 46 NSSCKFWInstance *fwInstance,
michael@0 47 CK_RV *pError
michael@0 48 )
michael@0 49 {
michael@0 50 return (NSSUTF8 *)nss_ckcapi_TokenModel;
michael@0 51 }
michael@0 52
michael@0 53 static NSSUTF8 *
michael@0 54 ckcapi_mdToken_GetSerialNumber
michael@0 55 (
michael@0 56 NSSCKMDToken *mdToken,
michael@0 57 NSSCKFWToken *fwToken,
michael@0 58 NSSCKMDInstance *mdInstance,
michael@0 59 NSSCKFWInstance *fwInstance,
michael@0 60 CK_RV *pError
michael@0 61 )
michael@0 62 {
michael@0 63 return (NSSUTF8 *)nss_ckcapi_TokenSerialNumber;
michael@0 64 }
michael@0 65
michael@0 66 static CK_BBOOL
michael@0 67 ckcapi_mdToken_GetIsWriteProtected
michael@0 68 (
michael@0 69 NSSCKMDToken *mdToken,
michael@0 70 NSSCKFWToken *fwToken,
michael@0 71 NSSCKMDInstance *mdInstance,
michael@0 72 NSSCKFWInstance *fwInstance
michael@0 73 )
michael@0 74 {
michael@0 75 return CK_FALSE;
michael@0 76 }
michael@0 77
michael@0 78 /* fake out Mozilla so we don't try to initialize the token */
michael@0 79 static CK_BBOOL
michael@0 80 ckcapi_mdToken_GetUserPinInitialized
michael@0 81 (
michael@0 82 NSSCKMDToken *mdToken,
michael@0 83 NSSCKFWToken *fwToken,
michael@0 84 NSSCKMDInstance *mdInstance,
michael@0 85 NSSCKFWInstance *fwInstance
michael@0 86 )
michael@0 87 {
michael@0 88 return CK_TRUE;
michael@0 89 }
michael@0 90
michael@0 91 static CK_VERSION
michael@0 92 ckcapi_mdToken_GetHardwareVersion
michael@0 93 (
michael@0 94 NSSCKMDToken *mdToken,
michael@0 95 NSSCKFWToken *fwToken,
michael@0 96 NSSCKMDInstance *mdInstance,
michael@0 97 NSSCKFWInstance *fwInstance
michael@0 98 )
michael@0 99 {
michael@0 100 return nss_ckcapi_HardwareVersion;
michael@0 101 }
michael@0 102
michael@0 103 static CK_VERSION
michael@0 104 ckcapi_mdToken_GetFirmwareVersion
michael@0 105 (
michael@0 106 NSSCKMDToken *mdToken,
michael@0 107 NSSCKFWToken *fwToken,
michael@0 108 NSSCKMDInstance *mdInstance,
michael@0 109 NSSCKFWInstance *fwInstance
michael@0 110 )
michael@0 111 {
michael@0 112 return nss_ckcapi_FirmwareVersion;
michael@0 113 }
michael@0 114
michael@0 115 static NSSCKMDSession *
michael@0 116 ckcapi_mdToken_OpenSession
michael@0 117 (
michael@0 118 NSSCKMDToken *mdToken,
michael@0 119 NSSCKFWToken *fwToken,
michael@0 120 NSSCKMDInstance *mdInstance,
michael@0 121 NSSCKFWInstance *fwInstance,
michael@0 122 NSSCKFWSession *fwSession,
michael@0 123 CK_BBOOL rw,
michael@0 124 CK_RV *pError
michael@0 125 )
michael@0 126 {
michael@0 127 return nss_ckcapi_CreateSession(fwSession, pError);
michael@0 128 }
michael@0 129
michael@0 130 static CK_ULONG
michael@0 131 ckcapi_mdToken_GetMechanismCount
michael@0 132 (
michael@0 133 NSSCKMDToken *mdToken,
michael@0 134 NSSCKFWToken *fwToken,
michael@0 135 NSSCKMDInstance *mdInstance,
michael@0 136 NSSCKFWInstance *fwInstance
michael@0 137 )
michael@0 138 {
michael@0 139 return (CK_ULONG)1;
michael@0 140 }
michael@0 141
michael@0 142 static CK_RV
michael@0 143 ckcapi_mdToken_GetMechanismTypes
michael@0 144 (
michael@0 145 NSSCKMDToken *mdToken,
michael@0 146 NSSCKFWToken *fwToken,
michael@0 147 NSSCKMDInstance *mdInstance,
michael@0 148 NSSCKFWInstance *fwInstance,
michael@0 149 CK_MECHANISM_TYPE types[]
michael@0 150 )
michael@0 151 {
michael@0 152 types[0] = CKM_RSA_PKCS;
michael@0 153 return CKR_OK;
michael@0 154 }
michael@0 155
michael@0 156 static NSSCKMDMechanism *
michael@0 157 ckcapi_mdToken_GetMechanism
michael@0 158 (
michael@0 159 NSSCKMDToken *mdToken,
michael@0 160 NSSCKFWToken *fwToken,
michael@0 161 NSSCKMDInstance *mdInstance,
michael@0 162 NSSCKFWInstance *fwInstance,
michael@0 163 CK_MECHANISM_TYPE which,
michael@0 164 CK_RV *pError
michael@0 165 )
michael@0 166 {
michael@0 167 if (which != CKM_RSA_PKCS) {
michael@0 168 *pError = CKR_MECHANISM_INVALID;
michael@0 169 return (NSSCKMDMechanism *)NULL;
michael@0 170 }
michael@0 171 return (NSSCKMDMechanism *)&nss_ckcapi_mdMechanismRSA;
michael@0 172 }
michael@0 173
michael@0 174 NSS_IMPLEMENT_DATA const NSSCKMDToken
michael@0 175 nss_ckcapi_mdToken = {
michael@0 176 (void *)NULL, /* etc */
michael@0 177 NULL, /* Setup */
michael@0 178 NULL, /* Invalidate */
michael@0 179 NULL, /* InitToken -- default errs */
michael@0 180 ckcapi_mdToken_GetLabel,
michael@0 181 ckcapi_mdToken_GetManufacturerID,
michael@0 182 ckcapi_mdToken_GetModel,
michael@0 183 ckcapi_mdToken_GetSerialNumber,
michael@0 184 NULL, /* GetHasRNG -- default is false */
michael@0 185 ckcapi_mdToken_GetIsWriteProtected,
michael@0 186 NULL, /* GetLoginRequired -- default is false */
michael@0 187 ckcapi_mdToken_GetUserPinInitialized,
michael@0 188 NULL, /* GetRestoreKeyNotNeeded -- irrelevant */
michael@0 189 NULL, /* GetHasClockOnToken -- default is false */
michael@0 190 NULL, /* GetHasProtectedAuthenticationPath -- default is false */
michael@0 191 NULL, /* GetSupportsDualCryptoOperations -- default is false */
michael@0 192 NULL, /* GetMaxSessionCount -- default is CK_UNAVAILABLE_INFORMATION */
michael@0 193 NULL, /* GetMaxRwSessionCount -- default is CK_UNAVAILABLE_INFORMATION */
michael@0 194 NULL, /* GetMaxPinLen -- irrelevant */
michael@0 195 NULL, /* GetMinPinLen -- irrelevant */
michael@0 196 NULL, /* GetTotalPublicMemory -- default is CK_UNAVAILABLE_INFORMATION */
michael@0 197 NULL, /* GetFreePublicMemory -- default is CK_UNAVAILABLE_INFORMATION */
michael@0 198 NULL, /* GetTotalPrivateMemory -- default is CK_UNAVAILABLE_INFORMATION */
michael@0 199 NULL, /* GetFreePrivateMemory -- default is CK_UNAVAILABLE_INFORMATION */
michael@0 200 ckcapi_mdToken_GetHardwareVersion,
michael@0 201 ckcapi_mdToken_GetFirmwareVersion,
michael@0 202 NULL, /* GetUTCTime -- no clock */
michael@0 203 ckcapi_mdToken_OpenSession,
michael@0 204 ckcapi_mdToken_GetMechanismCount,
michael@0 205 ckcapi_mdToken_GetMechanismTypes,
michael@0 206 ckcapi_mdToken_GetMechanism,
michael@0 207 (void *)NULL /* null terminator */
michael@0 208 };

mercurial