michael@0: /* This Source Code Form is subject to the terms of the Mozilla Public michael@0: * License, v. 2.0. If a copy of the MPL was not distributed with this michael@0: * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ michael@0: michael@0: #include "nsSyncJPAKE.h" michael@0: #include "mozilla/ModuleUtils.h" michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: #include michael@0: michael@0: using mozilla::fallible_t; michael@0: michael@0: static bool michael@0: hex_from_2char(const unsigned char *c2, unsigned char *byteval) michael@0: { michael@0: int i; michael@0: unsigned char offset; michael@0: *byteval = 0; michael@0: for (i=0; i<2; i++) { michael@0: if (c2[i] >= '0' && c2[i] <= '9') { michael@0: offset = c2[i] - '0'; michael@0: *byteval |= offset << 4*(1-i); michael@0: } else if (c2[i] >= 'a' && c2[i] <= 'f') { michael@0: offset = c2[i] - 'a'; michael@0: *byteval |= (offset + 10) << 4*(1-i); michael@0: } else if (c2[i] >= 'A' && c2[i] <= 'F') { michael@0: offset = c2[i] - 'A'; michael@0: *byteval |= (offset + 10) << 4*(1-i); michael@0: } else { michael@0: return false; michael@0: } michael@0: } michael@0: return true; michael@0: } michael@0: michael@0: static bool michael@0: fromHex(const char * str, unsigned char * p, size_t sLen) michael@0: { michael@0: size_t i; michael@0: if (sLen & 1) michael@0: return false; michael@0: michael@0: for (i = 0; i < sLen / 2; ++i) { michael@0: if (!hex_from_2char((const unsigned char *) str + (2*i), michael@0: (unsigned char *) p + i)) { michael@0: return false; michael@0: } michael@0: } michael@0: return true; michael@0: } michael@0: michael@0: static nsresult michael@0: fromHexString(const nsACString & str, unsigned char * p, size_t pMaxLen) michael@0: { michael@0: char * strData = (char *) str.Data(); michael@0: unsigned len = str.Length(); michael@0: NS_ENSURE_ARG(len / 2 <= pMaxLen); michael@0: if (!fromHex(strData, p, len)) { michael@0: return NS_ERROR_INVALID_ARG; michael@0: } michael@0: return NS_OK; michael@0: } michael@0: michael@0: static bool michael@0: toHexString(const unsigned char * str, unsigned len, nsACString & out) michael@0: { michael@0: static const char digits[] = "0123456789ABCDEF"; michael@0: if (!out.SetCapacity(2 * len, fallible_t())) michael@0: return false; michael@0: out.SetLength(0); michael@0: for (unsigned i = 0; i < len; ++i) { michael@0: out.Append(digits[str[i] >> 4]); michael@0: out.Append(digits[str[i] & 0x0f]); michael@0: } michael@0: return true; michael@0: } michael@0: michael@0: static nsresult michael@0: mapErrno() michael@0: { michael@0: int err = PORT_GetError(); michael@0: switch (err) { michael@0: case SEC_ERROR_NO_MEMORY: return NS_ERROR_OUT_OF_MEMORY; michael@0: default: return NS_ERROR_UNEXPECTED; michael@0: } michael@0: } michael@0: michael@0: #define NUM_ELEM(x) (sizeof(x) / sizeof (x)[0]) michael@0: michael@0: static const char p[] = michael@0: "90066455B5CFC38F9CAA4A48B4281F292C260FEEF01FD61037E56258A7795A1C" michael@0: "7AD46076982CE6BB956936C6AB4DCFE05E6784586940CA544B9B2140E1EB523F" michael@0: "009D20A7E7880E4E5BFA690F1B9004A27811CD9904AF70420EEFD6EA11EF7DA1" michael@0: "29F58835FF56B89FAA637BC9AC2EFAAB903402229F491D8D3485261CD068699B" michael@0: "6BA58A1DDBBEF6DB51E8FE34E8A78E542D7BA351C21EA8D8F1D29F5D5D159394" michael@0: "87E27F4416B0CA632C59EFD1B1EB66511A5A0FBF615B766C5862D0BD8A3FE7A0" michael@0: "E0DA0FB2FE1FCB19E8F9996A8EA0FCCDE538175238FC8B0EE6F29AF7F642773E" michael@0: "BE8CD5402415A01451A840476B2FCEB0E388D30D4B376C37FE401C2A2C2F941D" michael@0: "AD179C540C1C8CE030D460C4D983BE9AB0B20F69144C1AE13F9383EA1C08504F" michael@0: "B0BF321503EFE43488310DD8DC77EC5B8349B8BFE97C2C560EA878DE87C11E3D" michael@0: "597F1FEA742D73EEC7F37BE43949EF1A0D15C3F3E3FC0A8335617055AC91328E" michael@0: "C22B50FC15B941D3D1624CD88BC25F3E941FDDC6200689581BFEC416B4B2CB73"; michael@0: static const char q[] = michael@0: "CFA0478A54717B08CE64805B76E5B14249A77A4838469DF7F7DC987EFCCFB11D"; michael@0: static const char g[] = michael@0: "5E5CBA992E0A680D885EB903AEA78E4A45A469103D448EDE3B7ACCC54D521E37" michael@0: "F84A4BDD5B06B0970CC2D2BBB715F7B82846F9A0C393914C792E6A923E2117AB" michael@0: "805276A975AADB5261D91673EA9AAFFEECBFA6183DFCB5D3B7332AA19275AFA1" michael@0: "F8EC0B60FB6F66CC23AE4870791D5982AAD1AA9485FD8F4A60126FEB2CF05DB8" michael@0: "A7F0F09B3397F3937F2E90B9E5B9C9B6EFEF642BC48351C46FB171B9BFA9EF17" michael@0: "A961CE96C7E7A7CC3D3D03DFAD1078BA21DA425198F07D2481622BCE45969D9C" michael@0: "4D6063D72AB7A0F08B2F49A7CC6AF335E08C4720E31476B67299E231F8BD90B3" michael@0: "9AC3AE3BE0C6B6CACEF8289A2E2873D58E51E029CAFBD55E6841489AB66B5B4B" michael@0: "9BA6E2F784660896AFF387D92844CCB8B69475496DE19DA2E58259B090489AC8" michael@0: "E62363CDF82CFD8EF2A427ABCD65750B506F56DDE3B988567A88126B914D7828" michael@0: "E2B63A6D7ED0747EC59E0E0A23CE7D8A74C1D2C2A7AFB6A29799620F00E11C33" michael@0: "787F7DED3B30E1A22D09F1FBDA1ABBBFBF25CAE05A13F812E34563F99410E73B"; michael@0: michael@0: NS_IMETHODIMP nsSyncJPAKE::Round1(const nsACString & aSignerID, michael@0: nsACString & aGX1, michael@0: nsACString & aGV1, michael@0: nsACString & aR1, michael@0: nsACString & aGX2, michael@0: nsACString & aGV2, michael@0: nsACString & aR2) michael@0: { michael@0: NS_ENSURE_STATE(round == JPAKENotStarted); michael@0: NS_ENSURE_STATE(key == nullptr); michael@0: michael@0: static CK_MECHANISM_TYPE mechanisms[] = { michael@0: CKM_NSS_JPAKE_ROUND1_SHA256, michael@0: CKM_NSS_JPAKE_ROUND2_SHA256, michael@0: CKM_NSS_JPAKE_FINAL_SHA256 michael@0: }; michael@0: michael@0: PK11SlotInfo * slot = PK11_GetBestSlotMultiple(mechanisms, michael@0: NUM_ELEM(mechanisms), michael@0: nullptr); michael@0: NS_ENSURE_STATE(slot != nullptr); michael@0: michael@0: CK_BYTE pBuf[(NUM_ELEM(p) - 1) / 2]; michael@0: CK_BYTE qBuf[(NUM_ELEM(q) - 1) / 2]; michael@0: CK_BYTE gBuf[(NUM_ELEM(g) - 1) / 2]; michael@0: michael@0: CK_KEY_TYPE keyType = CKK_NSS_JPAKE_ROUND1; michael@0: NS_ENSURE_STATE(fromHex(p, pBuf, (NUM_ELEM(p) - 1))); michael@0: NS_ENSURE_STATE(fromHex(q, qBuf, (NUM_ELEM(q) - 1))); michael@0: NS_ENSURE_STATE(fromHex(g, gBuf, (NUM_ELEM(g) - 1))); michael@0: CK_ATTRIBUTE keyTemplate[] = { michael@0: { CKA_NSS_JPAKE_SIGNERID, (CK_BYTE *) aSignerID.Data(), michael@0: aSignerID.Length() }, michael@0: { CKA_KEY_TYPE, &keyType, sizeof keyType }, michael@0: { CKA_PRIME, pBuf, sizeof pBuf }, michael@0: { CKA_SUBPRIME, qBuf, sizeof qBuf }, michael@0: { CKA_BASE, gBuf, sizeof gBuf } michael@0: }; michael@0: michael@0: CK_BYTE gx1Buf[NUM_ELEM(p) / 2]; michael@0: CK_BYTE gv1Buf[NUM_ELEM(p) / 2]; michael@0: CK_BYTE r1Buf [NUM_ELEM(p) / 2]; michael@0: CK_BYTE gx2Buf[NUM_ELEM(p) / 2]; michael@0: CK_BYTE gv2Buf[NUM_ELEM(p) / 2]; michael@0: CK_BYTE r2Buf [NUM_ELEM(p) / 2]; michael@0: CK_NSS_JPAKERound1Params rp = { michael@0: { gx1Buf, sizeof gx1Buf, gv1Buf, sizeof gv1Buf, r1Buf, sizeof r1Buf }, michael@0: { gx2Buf, sizeof gx2Buf, gv2Buf, sizeof gv2Buf, r2Buf, sizeof r2Buf } michael@0: }; michael@0: SECItem paramsItem; michael@0: paramsItem.data = (unsigned char *) &rp; michael@0: paramsItem.len = sizeof rp; michael@0: key = PK11_KeyGenWithTemplate(slot, CKM_NSS_JPAKE_ROUND1_SHA256, michael@0: CKM_NSS_JPAKE_ROUND1_SHA256, michael@0: ¶msItem, keyTemplate, michael@0: NUM_ELEM(keyTemplate), nullptr); michael@0: nsresult rv = key != nullptr michael@0: ? NS_OK michael@0: : mapErrno(); michael@0: if (rv == NS_OK) { michael@0: NS_ENSURE_TRUE(toHexString(rp.gx1.pGX, rp.gx1.ulGXLen, aGX1) && michael@0: toHexString(rp.gx1.pGV, rp.gx1.ulGVLen, aGV1) && michael@0: toHexString(rp.gx1.pR, rp.gx1.ulRLen, aR1) && michael@0: toHexString(rp.gx2.pGX, rp.gx2.ulGXLen, aGX2) && michael@0: toHexString(rp.gx2.pGV, rp.gx2.ulGVLen, aGV2) && michael@0: toHexString(rp.gx2.pR, rp.gx2.ulRLen, aR2), michael@0: NS_ERROR_OUT_OF_MEMORY); michael@0: round = JPAKEBeforeRound2; michael@0: } michael@0: return rv; michael@0: } michael@0: michael@0: NS_IMETHODIMP nsSyncJPAKE::Round2(const nsACString & aPeerID, michael@0: const nsACString & aPIN, michael@0: const nsACString & aGX3, michael@0: const nsACString & aGV3, michael@0: const nsACString & aR3, michael@0: const nsACString & aGX4, michael@0: const nsACString & aGV4, michael@0: const nsACString & aR4, michael@0: nsACString & aA, michael@0: nsACString & aGVA, michael@0: nsACString & aRA) michael@0: { michael@0: NS_ENSURE_STATE(round == JPAKEBeforeRound2); michael@0: NS_ENSURE_STATE(key != nullptr); michael@0: NS_ENSURE_ARG(!aPeerID.IsEmpty()); michael@0: michael@0: /* PIN cannot be equal to zero when converted to a bignum. NSS 3.12.9 J-PAKE michael@0: assumes that the caller has already done this check. Future versions of michael@0: NSS J-PAKE will do this check internally. See Bug 609068 Comment 4 */ michael@0: bool foundNonZero = false; michael@0: for (size_t i = 0; i < aPIN.Length(); ++i) { michael@0: if (aPIN[i] != 0) { michael@0: foundNonZero = true; michael@0: break; michael@0: } michael@0: } michael@0: NS_ENSURE_ARG(foundNonZero); michael@0: michael@0: CK_BYTE gx3Buf[NUM_ELEM(p)/2], gv3Buf[NUM_ELEM(p)/2], r3Buf [NUM_ELEM(p)/2]; michael@0: CK_BYTE gx4Buf[NUM_ELEM(p)/2], gv4Buf[NUM_ELEM(p)/2], r4Buf [NUM_ELEM(p)/2]; michael@0: CK_BYTE gxABuf[NUM_ELEM(p)/2], gvABuf[NUM_ELEM(p)/2], rABuf [NUM_ELEM(p)/2]; michael@0: nsresult rv = fromHexString(aGX3, gx3Buf, sizeof gx3Buf); michael@0: if (rv == NS_OK) rv = fromHexString(aGV3, gv3Buf, sizeof gv3Buf); michael@0: if (rv == NS_OK) rv = fromHexString(aR3, r3Buf, sizeof r3Buf); michael@0: if (rv == NS_OK) rv = fromHexString(aGX4, gx4Buf, sizeof gx4Buf); michael@0: if (rv == NS_OK) rv = fromHexString(aGV4, gv4Buf, sizeof gv4Buf); michael@0: if (rv == NS_OK) rv = fromHexString(aR4, r4Buf, sizeof r4Buf); michael@0: if (rv != NS_OK) michael@0: return rv; michael@0: michael@0: CK_NSS_JPAKERound2Params rp; michael@0: rp.pSharedKey = (CK_BYTE *) aPIN.Data(); michael@0: rp.ulSharedKeyLen = aPIN.Length(); michael@0: rp.gx3.pGX = gx3Buf; rp.gx3.ulGXLen = aGX3.Length() / 2; michael@0: rp.gx3.pGV = gv3Buf; rp.gx3.ulGVLen = aGV3.Length() / 2; michael@0: rp.gx3.pR = r3Buf; rp.gx3.ulRLen = aR3 .Length() / 2; michael@0: rp.gx4.pGX = gx4Buf; rp.gx4.ulGXLen = aGX4.Length() / 2; michael@0: rp.gx4.pGV = gv4Buf; rp.gx4.ulGVLen = aGV4.Length() / 2; michael@0: rp.gx4.pR = r4Buf; rp.gx4.ulRLen = aR4 .Length() / 2; michael@0: rp.A.pGX = gxABuf; rp.A .ulGXLen = sizeof gxABuf; michael@0: rp.A.pGV = gvABuf; rp.A .ulGVLen = sizeof gxABuf; michael@0: rp.A.pR = rABuf; rp.A .ulRLen = sizeof gxABuf; michael@0: michael@0: // Bug 629090: NSS 3.12.9 J-PAKE fails to check that gx^4 != 1, so check here. michael@0: bool gx4Good = false; michael@0: for (unsigned i = 0; i < rp.gx4.ulGXLen; ++i) { michael@0: if (rp.gx4.pGX[i] > 1 || (rp.gx4.pGX[i] != 0 && i < rp.gx4.ulGXLen - 1)) { michael@0: gx4Good = true; michael@0: break; michael@0: } michael@0: } michael@0: NS_ENSURE_ARG(gx4Good); michael@0: michael@0: SECItem paramsItem; michael@0: paramsItem.data = (unsigned char *) &rp; michael@0: paramsItem.len = sizeof rp; michael@0: CK_KEY_TYPE keyType = CKK_NSS_JPAKE_ROUND2; michael@0: CK_ATTRIBUTE keyTemplate[] = { michael@0: { CKA_NSS_JPAKE_PEERID, (CK_BYTE *) aPeerID.Data(), aPeerID.Length(), }, michael@0: { CKA_KEY_TYPE, &keyType, sizeof keyType } michael@0: }; michael@0: PK11SymKey * newKey = PK11_DeriveWithTemplate(key, michael@0: CKM_NSS_JPAKE_ROUND2_SHA256, michael@0: ¶msItem, michael@0: CKM_NSS_JPAKE_FINAL_SHA256, michael@0: CKA_DERIVE, 0, michael@0: keyTemplate, michael@0: NUM_ELEM(keyTemplate), michael@0: false); michael@0: if (newKey != nullptr) { michael@0: if (toHexString(rp.A.pGX, rp.A.ulGXLen, aA) && michael@0: toHexString(rp.A.pGV, rp.A.ulGVLen, aGVA) && michael@0: toHexString(rp.A.pR, rp.A.ulRLen, aRA)) { michael@0: round = JPAKEAfterRound2; michael@0: PK11_FreeSymKey(key); michael@0: key = newKey; michael@0: return NS_OK; michael@0: } else { michael@0: PK11_FreeSymKey(newKey); michael@0: rv = NS_ERROR_OUT_OF_MEMORY; michael@0: } michael@0: } else michael@0: rv = mapErrno(); michael@0: michael@0: return rv; michael@0: } michael@0: michael@0: static nsresult michael@0: setBase64(const unsigned char * data, unsigned len, nsACString & out) michael@0: { michael@0: nsresult rv = NS_OK; michael@0: const char * base64 = BTOA_DataToAscii(data, len); michael@0: michael@0: if (base64 != nullptr) { michael@0: size_t len = PORT_Strlen(base64); michael@0: if (out.SetCapacity(len, fallible_t())) { michael@0: out.SetLength(0); michael@0: out.Append(base64, len); michael@0: PORT_Free((void*) base64); michael@0: } else { michael@0: rv = NS_ERROR_OUT_OF_MEMORY; michael@0: } michael@0: } else { michael@0: rv = NS_ERROR_OUT_OF_MEMORY; michael@0: } michael@0: return rv; michael@0: } michael@0: michael@0: static nsresult michael@0: base64KeyValue(PK11SymKey * key, nsACString & keyString) michael@0: { michael@0: nsresult rv = NS_OK; michael@0: if (PK11_ExtractKeyValue(key) == SECSuccess) { michael@0: const SECItem * value = PK11_GetKeyData(key); michael@0: rv = value != nullptr && value->data != nullptr && value->len > 0 michael@0: ? setBase64(value->data, value->len, keyString) michael@0: : NS_ERROR_UNEXPECTED; michael@0: } else { michael@0: rv = mapErrno(); michael@0: } michael@0: return rv; michael@0: } michael@0: michael@0: static nsresult michael@0: extractBase64KeyValue(PK11SymKey * keyBlock, CK_ULONG bitPosition, michael@0: CK_MECHANISM_TYPE destMech, int keySize, michael@0: nsACString & keyString) michael@0: { michael@0: SECItem paramsItem; michael@0: paramsItem.data = (CK_BYTE *) &bitPosition; michael@0: paramsItem.len = sizeof bitPosition; michael@0: PK11SymKey * key = PK11_Derive(keyBlock, CKM_EXTRACT_KEY_FROM_KEY, michael@0: ¶msItem, destMech, michael@0: CKA_SIGN, keySize); michael@0: if (key == nullptr) michael@0: return mapErrno(); michael@0: nsresult rv = base64KeyValue(key, keyString); michael@0: PK11_FreeSymKey(key); michael@0: return rv; michael@0: } michael@0: michael@0: michael@0: NS_IMETHODIMP nsSyncJPAKE::Final(const nsACString & aB, michael@0: const nsACString & aGVB, michael@0: const nsACString & aRB, michael@0: const nsACString & aHKDFInfo, michael@0: nsACString & aAES256Key, michael@0: nsACString & aHMAC256Key) michael@0: { michael@0: static const unsigned AES256_KEY_SIZE = 256 / 8; michael@0: static const unsigned HMAC_SHA256_KEY_SIZE = 256 / 8; michael@0: CK_EXTRACT_PARAMS aesBitPosition = 0; michael@0: CK_EXTRACT_PARAMS hmacBitPosition = aesBitPosition + (AES256_KEY_SIZE * 8); michael@0: michael@0: NS_ENSURE_STATE(round == JPAKEAfterRound2); michael@0: NS_ENSURE_STATE(key != nullptr); michael@0: michael@0: CK_BYTE gxBBuf[NUM_ELEM(p)/2], gvBBuf[NUM_ELEM(p)/2], rBBuf [NUM_ELEM(p)/2]; michael@0: nsresult rv = fromHexString(aB, gxBBuf, sizeof gxBBuf); michael@0: if (rv == NS_OK) rv = fromHexString(aGVB, gvBBuf, sizeof gvBBuf); michael@0: if (rv == NS_OK) rv = fromHexString(aRB, rBBuf, sizeof rBBuf); michael@0: if (rv != NS_OK) michael@0: return rv; michael@0: michael@0: CK_NSS_JPAKEFinalParams rp; michael@0: rp.B.pGX = gxBBuf; rp.B.ulGXLen = aB .Length() / 2; michael@0: rp.B.pGV = gvBBuf; rp.B.ulGVLen = aGVB.Length() / 2; michael@0: rp.B.pR = rBBuf; rp.B.ulRLen = aRB .Length() / 2; michael@0: SECItem paramsItem; michael@0: paramsItem.data = (unsigned char *) &rp; michael@0: paramsItem.len = sizeof rp; michael@0: PK11SymKey * keyMaterial = PK11_Derive(key, CKM_NSS_JPAKE_FINAL_SHA256, michael@0: ¶msItem, CKM_NSS_HKDF_SHA256, michael@0: CKA_DERIVE, 0); michael@0: PK11SymKey * keyBlock = nullptr; michael@0: michael@0: if (keyMaterial == nullptr) michael@0: rv = mapErrno(); michael@0: michael@0: if (rv == NS_OK) { michael@0: CK_NSS_HKDFParams hkdfParams; michael@0: hkdfParams.bExtract = CK_TRUE; michael@0: hkdfParams.pSalt = nullptr; michael@0: hkdfParams.ulSaltLen = 0; michael@0: hkdfParams.bExpand = CK_TRUE; michael@0: hkdfParams.pInfo = (CK_BYTE *) aHKDFInfo.Data(); michael@0: hkdfParams.ulInfoLen = aHKDFInfo.Length(); michael@0: paramsItem.data = (unsigned char *) &hkdfParams; michael@0: paramsItem.len = sizeof hkdfParams; michael@0: keyBlock = PK11_Derive(keyMaterial, CKM_NSS_HKDF_SHA256, michael@0: ¶msItem, CKM_EXTRACT_KEY_FROM_KEY, michael@0: CKA_DERIVE, AES256_KEY_SIZE + HMAC_SHA256_KEY_SIZE); michael@0: if (keyBlock == nullptr) michael@0: rv = mapErrno(); michael@0: } michael@0: michael@0: if (rv == NS_OK) { michael@0: rv = extractBase64KeyValue(keyBlock, aesBitPosition, CKM_AES_CBC, michael@0: AES256_KEY_SIZE, aAES256Key); michael@0: } michael@0: if (rv == NS_OK) { michael@0: rv = extractBase64KeyValue(keyBlock, hmacBitPosition, CKM_SHA256_HMAC, michael@0: HMAC_SHA256_KEY_SIZE, aHMAC256Key); michael@0: } michael@0: michael@0: if (rv == NS_OK) { michael@0: SECStatus srv = PK11_ExtractKeyValue(keyMaterial); michael@0: NS_ENSURE_TRUE(srv == SECSuccess, NS_ERROR_UNEXPECTED); // XXX leaks michael@0: SECItem * keyMaterialBytes = PK11_GetKeyData(keyMaterial); michael@0: NS_ENSURE_TRUE(keyMaterialBytes != nullptr, NS_ERROR_UNEXPECTED); michael@0: } michael@0: michael@0: if (keyBlock != nullptr) michael@0: PK11_FreeSymKey(keyBlock); michael@0: if (keyMaterial != nullptr) michael@0: PK11_FreeSymKey(keyMaterial); michael@0: michael@0: return rv; michael@0: } michael@0: michael@0: NS_GENERIC_FACTORY_CONSTRUCTOR(nsSyncJPAKE) michael@0: NS_DEFINE_NAMED_CID(NS_SYNCJPAKE_CID); michael@0: michael@0: nsSyncJPAKE::nsSyncJPAKE() : round(JPAKENotStarted), key(nullptr) { } michael@0: michael@0: nsSyncJPAKE::~nsSyncJPAKE() michael@0: { michael@0: if (key != nullptr) michael@0: PK11_FreeSymKey(key); michael@0: } michael@0: michael@0: static const mozilla::Module::CIDEntry kServicesCryptoCIDs[] = { michael@0: { &kNS_SYNCJPAKE_CID, false, nullptr, nsSyncJPAKEConstructor }, michael@0: { nullptr } michael@0: }; michael@0: michael@0: static const mozilla::Module::ContractIDEntry kServicesCryptoContracts[] = { michael@0: { NS_SYNCJPAKE_CONTRACTID, &kNS_SYNCJPAKE_CID }, michael@0: { nullptr } michael@0: }; michael@0: michael@0: static const mozilla::Module kServicesCryptoModule = { michael@0: mozilla::Module::kVersion, michael@0: kServicesCryptoCIDs, michael@0: kServicesCryptoContracts michael@0: }; michael@0: michael@0: NSMODULE_DEFN(nsServicesCryptoModule) = &kServicesCryptoModule;