import nss-3.41.0-5.el8
This commit is contained in:
commit
5efd4a9568
13
.gitignore
vendored
Normal file
13
.gitignore
vendored
Normal file
@ -0,0 +1,13 @@
|
||||
SOURCES/blank-cert8.db
|
||||
SOURCES/blank-cert9.db
|
||||
SOURCES/blank-key3.db
|
||||
SOURCES/blank-key4.db
|
||||
SOURCES/blank-secmod.db
|
||||
SOURCES/cert8.db.xml
|
||||
SOURCES/cert9.db.xml
|
||||
SOURCES/key3.db.xml
|
||||
SOURCES/key4.db.xml
|
||||
SOURCES/nss-3.41.tar.gz
|
||||
SOURCES/nss-config.xml
|
||||
SOURCES/secmod.db.xml
|
||||
SOURCES/setup-nsssysinit.xml
|
13
.nss.metadata
Normal file
13
.nss.metadata
Normal file
@ -0,0 +1,13 @@
|
||||
d272a7b58364862613d44261c5744f7a336bf177 SOURCES/blank-cert8.db
|
||||
b5570125fbf6bfb410705706af48217a0817c03a SOURCES/blank-cert9.db
|
||||
7f78b5bcecdb5005e7b803604b2ec9d1a9df2fb5 SOURCES/blank-key3.db
|
||||
f9c9568442386da370193474de1b25c3f68cdaf6 SOURCES/blank-key4.db
|
||||
bd748cf6e1465a1bbe6e751b72ffc0076aff0b50 SOURCES/blank-secmod.db
|
||||
6a43a6788fff0f2a967051209adbd354fad4c346 SOURCES/cert8.db.xml
|
||||
ea6705e15999bdc6365f05b3d66f9c1d49677f84 SOURCES/cert9.db.xml
|
||||
24c123810543ff0f6848647d6d910744e275fb01 SOURCES/key3.db.xml
|
||||
af51b16a56fda1f7525a0eed3ecbdcbb4133be0c SOURCES/key4.db.xml
|
||||
69c60e8d3190573dbcbc01f50e68e3ceb7d92522 SOURCES/nss-3.41.tar.gz
|
||||
2905c9b06e7e686c9e3c0b5736a218766d4ae4c2 SOURCES/nss-config.xml
|
||||
ca9ebf79c1437169a02527c18b1e3909943c4be9 SOURCES/secmod.db.xml
|
||||
bcbe05281b38d843273f91ae3f9f19f70c7d97b3 SOURCES/setup-nsssysinit.xml
|
79
SOURCES/enable-fips-when-system-is-in-fips-mode.patch
Normal file
79
SOURCES/enable-fips-when-system-is-in-fips-mode.patch
Normal file
@ -0,0 +1,79 @@
|
||||
diff -up nss/lib/pk11wrap/pk11pars.c.852023_enable_fips_when_in_fips_mode nss/lib/pk11wrap/pk11pars.c
|
||||
--- nss/lib/pk11wrap/pk11pars.c.852023_enable_fips_when_in_fips_mode 2018-03-05 16:58:32.000000000 +0100
|
||||
+++ nss/lib/pk11wrap/pk11pars.c 2018-03-09 17:24:39.815838810 +0100
|
||||
@@ -671,6 +671,10 @@ SECMOD_CreateModuleEx(const char *librar
|
||||
|
||||
mod->internal = NSSUTIL_ArgHasFlag("flags", "internal", nssc);
|
||||
mod->isFIPS = NSSUTIL_ArgHasFlag("flags", "FIPS", nssc);
|
||||
+ /* if the system FIPS mode is enabled, force FIPS to be on */
|
||||
+ if (SECMOD_GetSystemFIPSEnabled()) {
|
||||
+ mod->isFIPS = PR_TRUE;
|
||||
+ }
|
||||
mod->isCritical = NSSUTIL_ArgHasFlag("flags", "critical", nssc);
|
||||
slotParams = NSSUTIL_ArgGetParamValue("slotParams", nssc);
|
||||
mod->slotInfo = NSSUTIL_ArgParseSlotInfo(mod->arena, slotParams,
|
||||
diff -up nss/lib/pk11wrap/pk11util.c.852023_enable_fips_when_in_fips_mode nss/lib/pk11wrap/pk11util.c
|
||||
--- nss/lib/pk11wrap/pk11util.c.852023_enable_fips_when_in_fips_mode 2018-03-05 16:58:32.000000000 +0100
|
||||
+++ nss/lib/pk11wrap/pk11util.c 2018-03-09 17:25:46.804347730 +0100
|
||||
@@ -95,6 +95,26 @@ SECMOD_Shutdown()
|
||||
return SECSuccess;
|
||||
}
|
||||
|
||||
+int SECMOD_GetSystemFIPSEnabled(void) {
|
||||
+#ifdef LINUX
|
||||
+ FILE *f;
|
||||
+ char d;
|
||||
+ size_t size;
|
||||
+
|
||||
+ f = fopen("/proc/sys/crypto/fips_enabled", "r");
|
||||
+ if (!f)
|
||||
+ return 0;
|
||||
+
|
||||
+ size = fread(&d, 1, 1, f);
|
||||
+ fclose(f);
|
||||
+ if (size != 1)
|
||||
+ return 0;
|
||||
+ if (d == '1')
|
||||
+ return 1;
|
||||
+#endif
|
||||
+ return 0;
|
||||
+}
|
||||
+
|
||||
/*
|
||||
* retrieve the internal module
|
||||
*/
|
||||
@@ -428,7 +448,7 @@ SECMOD_DeleteInternalModule(const char *
|
||||
SECMODModuleList **mlpp;
|
||||
SECStatus rv = SECFailure;
|
||||
|
||||
- if (pendingModule) {
|
||||
+ if (SECMOD_GetSystemFIPSEnabled() || pendingModule) {
|
||||
PORT_SetError(SEC_ERROR_MODULE_STUCK);
|
||||
return rv;
|
||||
}
|
||||
@@ -963,7 +983,7 @@ SECMOD_CanDeleteInternalModule(void)
|
||||
#ifdef NSS_FIPS_DISABLED
|
||||
return PR_FALSE;
|
||||
#else
|
||||
- return (PRBool)(pendingModule == NULL);
|
||||
+ return (PRBool) ((pendingModule == NULL) && !SECMOD_GetSystemFIPSEnabled());
|
||||
#endif
|
||||
}
|
||||
|
||||
diff -up nss/lib/pk11wrap/secmodi.h.852023_enable_fips_when_in_fips_mode nss/lib/pk11wrap/secmodi.h
|
||||
--- nss/lib/pk11wrap/secmodi.h.852023_enable_fips_when_in_fips_mode 2018-03-05 16:58:32.000000000 +0100
|
||||
+++ nss/lib/pk11wrap/secmodi.h 2018-03-09 17:24:39.816838788 +0100
|
||||
@@ -115,6 +115,13 @@ PK11SymKey *pk11_TokenKeyGenWithFlagsAnd
|
||||
CK_MECHANISM_TYPE pk11_GetPBECryptoMechanism(SECAlgorithmID *algid,
|
||||
SECItem **param, SECItem *pwd, PRBool faulty3DES);
|
||||
|
||||
+/* Get the state of the system FIPS mode */
|
||||
+/* NSS uses this to force FIPS mode if the system bit is on. Applications which
|
||||
+ * use the SECMOD_CanDeleteInteral() to check to see if they can switch to or
|
||||
+ * from FIPS mode will automatically be told that they can't swith out of FIPS
|
||||
+ * mode */
|
||||
+int SECMOD_GetSystemFIPSEnabled();
|
||||
+
|
||||
extern void pk11sdr_Init(void);
|
||||
extern void pk11sdr_Shutdown(void);
|
||||
|
13
SOURCES/iquote.patch
Normal file
13
SOURCES/iquote.patch
Normal file
@ -0,0 +1,13 @@
|
||||
diff -up nss/coreconf/location.mk.iquote nss/coreconf/location.mk
|
||||
--- nss/coreconf/location.mk.iquote 2017-07-27 16:09:32.000000000 +0200
|
||||
+++ nss/coreconf/location.mk 2017-09-06 13:23:14.633611555 +0200
|
||||
@@ -75,4 +75,9 @@ ifndef SQLITE_LIB_NAME
|
||||
SQLITE_LIB_NAME = sqlite3
|
||||
endif
|
||||
|
||||
+# Prefer in-tree headers over system headers
|
||||
+ifdef IN_TREE_FREEBL_HEADERS_FIRST
|
||||
+ INCLUDES += -iquote $(DIST)/../public/nss -iquote $(DIST)/../private/nss
|
||||
+endif
|
||||
+
|
||||
MK_LOCATION = included
|
804
SOURCES/nss-3.39-create-public-key-on-private-import.patch
Normal file
804
SOURCES/nss-3.39-create-public-key-on-private-import.patch
Normal file
@ -0,0 +1,804 @@
|
||||
# HG changeset patch
|
||||
# User Robert Relyea <rrelyea@redhat.com>
|
||||
# Date 1544226862 28800
|
||||
# Fri Dec 07 15:54:22 2018 -0800
|
||||
# Node ID 521a5b2f10cc197b9349df033f9d3cca0b5226c5
|
||||
# Parent 5ac4d4904afae59149bb1fab49c3b21244a51a22
|
||||
try: -b do -u all - p all -t all
|
||||
|
||||
diff --git a/cmd/manifest.mn b/cmd/manifest.mn
|
||||
--- a/cmd/manifest.mn
|
||||
+++ b/cmd/manifest.mn
|
||||
@@ -51,16 +51,17 @@ NSS_SRCDIRS = \
|
||||
ocspclnt \
|
||||
ocspresp \
|
||||
oidcalc \
|
||||
p7content \
|
||||
p7env \
|
||||
p7sign \
|
||||
p7verify \
|
||||
pk12util \
|
||||
+ pk11import \
|
||||
pk11ectest \
|
||||
pk11gcmtest \
|
||||
pk11mode \
|
||||
pk1sign \
|
||||
pp \
|
||||
pwdecrypt \
|
||||
rsaperf \
|
||||
rsapoptst \
|
||||
diff --git a/cmd/pk11import/Makefile b/cmd/pk11import/Makefile
|
||||
new file mode 100644
|
||||
--- /dev/null
|
||||
+++ b/cmd/pk11import/Makefile
|
||||
@@ -0,0 +1,43 @@
|
||||
+#! gmake
|
||||
+#
|
||||
+# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
+# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
+
|
||||
+#######################################################################
|
||||
+# (1) Include initial platform-independent assignments (MANDATORY). #
|
||||
+#######################################################################
|
||||
+
|
||||
+include manifest.mn
|
||||
+
|
||||
+#######################################################################
|
||||
+# (2) Include "global" configuration information. (OPTIONAL) #
|
||||
+#######################################################################
|
||||
+
|
||||
+include $(CORE_DEPTH)/coreconf/config.mk
|
||||
+
|
||||
+#######################################################################
|
||||
+# (3) Include "component" configuration information. (OPTIONAL) #
|
||||
+#######################################################################
|
||||
+
|
||||
+#######################################################################
|
||||
+# (4) Include "local" platform-dependent assignments (OPTIONAL). #
|
||||
+#######################################################################
|
||||
+
|
||||
+include ../platlibs.mk
|
||||
+
|
||||
+#######################################################################
|
||||
+# (5) Execute "global" rules. (OPTIONAL) #
|
||||
+#######################################################################
|
||||
+
|
||||
+include $(CORE_DEPTH)/coreconf/rules.mk
|
||||
+
|
||||
+#######################################################################
|
||||
+# (6) Execute "component" rules. (OPTIONAL) #
|
||||
+#######################################################################
|
||||
+
|
||||
+#######################################################################
|
||||
+# (7) Execute "local" rules. (OPTIONAL). #
|
||||
+#######################################################################
|
||||
+
|
||||
+include ../platrules.mk
|
||||
diff --git a/cmd/pk11import/manifest.mn b/cmd/pk11import/manifest.mn
|
||||
new file mode 100644
|
||||
--- /dev/null
|
||||
+++ b/cmd/pk11import/manifest.mn
|
||||
@@ -0,0 +1,15 @@
|
||||
+# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
+# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
+
|
||||
+CORE_DEPTH = ../..
|
||||
+
|
||||
+MODULE = nss
|
||||
+
|
||||
+CSRCS = pk11import.c \
|
||||
+ $(NULL)
|
||||
+
|
||||
+REQUIRES = seccmd
|
||||
+
|
||||
+PROGRAM = pk11import
|
||||
+
|
||||
diff --git a/cmd/pk11import/pk11import.c b/cmd/pk11import/pk11import.c
|
||||
new file mode 100644
|
||||
--- /dev/null
|
||||
+++ b/cmd/pk11import/pk11import.c
|
||||
@@ -0,0 +1,410 @@
|
||||
+/* This Source Code Form is subject to the terms of the Mozilla Public
|
||||
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
||||
+
|
||||
+#include "secutil.h"
|
||||
+#include "secmod.h"
|
||||
+#include "cert.h"
|
||||
+#include "secoid.h"
|
||||
+#include "nss.h"
|
||||
+#include "pk11pub.h"
|
||||
+#include "pk11pqg.h"
|
||||
+
|
||||
+/* NSPR 2.0 header files */
|
||||
+#include "prinit.h"
|
||||
+#include "prprf.h"
|
||||
+#include "prsystem.h"
|
||||
+#include "prmem.h"
|
||||
+/* Portable layer header files */
|
||||
+#include "plstr.h"
|
||||
+
|
||||
+SECOidData *
|
||||
+getCurveFromString(char *curve_name)
|
||||
+{
|
||||
+ SECOidTag tag = SEC_OID_SECG_EC_SECP256R1;
|
||||
+
|
||||
+ if (PORT_Strcasecmp(curve_name, "NISTP256") == 0) {
|
||||
+ } else if (PORT_Strcasecmp(curve_name, "NISTP384") == 0) {
|
||||
+ tag = SEC_OID_SECG_EC_SECP384R1;
|
||||
+ } else if (PORT_Strcasecmp(curve_name, "NISTP521") == 0) {
|
||||
+ tag = SEC_OID_SECG_EC_SECP521R1;
|
||||
+ } else if (PORT_Strcasecmp(curve_name, "Curve25519") == 0) {
|
||||
+ tag = SEC_OID_CURVE25519;
|
||||
+ }
|
||||
+ return SECOID_FindOIDByTag(tag);
|
||||
+}
|
||||
+
|
||||
+void
|
||||
+dumpItem(const char *label, const SECItem *item)
|
||||
+{
|
||||
+ int i;
|
||||
+ printf("%s = [%d bytes] {", label, item->len);
|
||||
+ for (i = 0; i < item->len; i++) {
|
||||
+ if ((i & 0xf) == 0)
|
||||
+ printf("\n ");
|
||||
+ else
|
||||
+ printf(", ");
|
||||
+ printf("%02x", item->data[i]);
|
||||
+ }
|
||||
+ printf("};\n");
|
||||
+}
|
||||
+
|
||||
+SECStatus
|
||||
+handleEncryptedPrivateImportTest(char *progName, PK11SlotInfo *slot,
|
||||
+ char *testname, CK_MECHANISM_TYPE genMech, void *params, void *pwArgs)
|
||||
+{
|
||||
+ SECStatus rv = SECSuccess;
|
||||
+ SECItem privID = { 0 };
|
||||
+ SECItem pubID = { 0 };
|
||||
+ SECItem pubValue = { 0 };
|
||||
+ SECItem pbePwItem = { 0 };
|
||||
+ SECItem nickname = { 0 };
|
||||
+ SECItem token = { 0 };
|
||||
+ SECKEYPublicKey *pubKey = NULL;
|
||||
+ SECKEYPrivateKey *privKey = NULL;
|
||||
+ PK11GenericObject *objs = NULL;
|
||||
+ PK11GenericObject *obj = NULL;
|
||||
+ SECKEYEncryptedPrivateKeyInfo *epki = NULL;
|
||||
+ PRBool keyFound = 0;
|
||||
+ KeyType keyType;
|
||||
+
|
||||
+ fprintf(stderr, "Testing %s PrivateKeyImport ***********************\n",
|
||||
+ testname);
|
||||
+
|
||||
+ /* generate a temp key */
|
||||
+ privKey = PK11_GenerateKeyPair(slot, genMech, params, &pubKey,
|
||||
+ PR_FALSE, PR_TRUE, pwArgs);
|
||||
+ if (privKey == NULL) {
|
||||
+ SECU_PrintError(progName, "PK11_GenerateKeyPair Failed");
|
||||
+ goto cleanup;
|
||||
+ }
|
||||
+
|
||||
+ /* wrap the temp key */
|
||||
+ pbePwItem.data = (unsigned char *)"pw";
|
||||
+ pbePwItem.len = 2;
|
||||
+ epki = PK11_ExportEncryptedPrivKeyInfo(slot, SEC_OID_AES_256_CBC,
|
||||
+ &pbePwItem, privKey, 1, NULL);
|
||||
+ if (epki == NULL) {
|
||||
+ SECU_PrintError(progName, "PK11_ExportEncryptedPrivKeyInfo Failed");
|
||||
+ goto cleanup;
|
||||
+ }
|
||||
+
|
||||
+ /* Save the public value, which we will need on import */
|
||||
+ keyType = pubKey->keyType;
|
||||
+ switch (keyType) {
|
||||
+ case rsaKey:
|
||||
+ SECITEM_CopyItem(NULL, &pubValue, &pubKey->u.rsa.modulus);
|
||||
+ break;
|
||||
+ case dhKey:
|
||||
+ SECITEM_CopyItem(NULL, &pubValue, &pubKey->u.dh.publicValue);
|
||||
+ break;
|
||||
+ case dsaKey:
|
||||
+ SECITEM_CopyItem(NULL, &pubValue, &pubKey->u.dsa.publicValue);
|
||||
+ break;
|
||||
+ case ecKey:
|
||||
+ SECITEM_CopyItem(NULL, &pubValue, &pubKey->u.ec.publicValue);
|
||||
+ break;
|
||||
+ default:
|
||||
+ fprintf(stderr, "Unknown keytype = %d\n", keyType);
|
||||
+ goto cleanup;
|
||||
+ }
|
||||
+ dumpItem("pubValue", &pubValue);
|
||||
+
|
||||
+ /* when Asymetric keys represent session keys, those session keys are
|
||||
+ * destroyed when we destroy the Asymetric key representations */
|
||||
+ SECKEY_DestroyPublicKey(pubKey);
|
||||
+ pubKey = NULL;
|
||||
+ SECKEY_DestroyPrivateKey(privKey);
|
||||
+ privKey = NULL;
|
||||
+
|
||||
+ /* unwrap the temp key as a perm */
|
||||
+ nickname.data = (unsigned char *)"testKey";
|
||||
+ nickname.len = sizeof("testKey");
|
||||
+ rv = PK11_ImportEncryptedPrivateKeyInfoAndReturnKey(slot, epki, &pbePwItem,
|
||||
+ &nickname, &pubValue, PR_TRUE, PR_TRUE, keyType, 0, &privKey, NULL);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ SECU_PrintError(progName, "PK11_ImportEncryptedPrivateKeyInfo Failed");
|
||||
+ goto cleanup;
|
||||
+ }
|
||||
+
|
||||
+ /* verify the public key exists */
|
||||
+ rv = PK11_ReadRawAttribute(PK11_TypePrivKey, privKey, CKA_ID, &privID);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ SECU_PrintError(progName,
|
||||
+ "Couldn't read CKA_ID from pub key, checking next key");
|
||||
+ goto cleanup;
|
||||
+ }
|
||||
+ dumpItem("privKey CKA_ID", &privID);
|
||||
+ objs = PK11_FindGenericObjects(slot, CKO_PUBLIC_KEY);
|
||||
+ for (obj = objs; obj; obj = PK11_GetNextGenericObject(obj)) {
|
||||
+ rv = PK11_ReadRawAttribute(PK11_TypeGeneric, obj, CKA_ID, &pubID);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ SECU_PrintError(progName,
|
||||
+ "Couldn't read CKA_ID from pub key, checking next key");
|
||||
+ continue;
|
||||
+ }
|
||||
+ dumpItem("pubKey CKA_ID", &pubID);
|
||||
+ if (!SECITEM_ItemsAreEqual(&privID, &pubID)) {
|
||||
+ fprintf(stderr,
|
||||
+ "CKA_ID does not match priv key, checking next key\n");
|
||||
+ SECITEM_FreeItem(&pubID, PR_FALSE);
|
||||
+ continue;
|
||||
+ }
|
||||
+ SECITEM_FreeItem(&pubID, PR_FALSE);
|
||||
+ rv = PK11_ReadRawAttribute(PK11_TypeGeneric, obj, CKA_TOKEN, &token);
|
||||
+ if (rv == SECSuccess) {
|
||||
+ if (token.len == 1) {
|
||||
+ keyFound = token.data[0];
|
||||
+ }
|
||||
+ SECITEM_FreeItem(&token, PR_FALSE);
|
||||
+ }
|
||||
+ if (keyFound) {
|
||||
+ printf("matching public key found\n");
|
||||
+ break;
|
||||
+ }
|
||||
+ printf("Matching key was not a token key, checking next key\n");
|
||||
+ }
|
||||
+cleanup:
|
||||
+ if (objs) {
|
||||
+ PK11_DestroyGenericObjects(objs);
|
||||
+ }
|
||||
+ if (pubValue.data) {
|
||||
+ SECITEM_FreeItem(&pubValue, PR_FALSE);
|
||||
+ }
|
||||
+ if (privID.data) {
|
||||
+ SECITEM_FreeItem(&privID, PR_FALSE);
|
||||
+ }
|
||||
+ if (epki) {
|
||||
+ PORT_FreeArena(epki->arena, PR_TRUE);
|
||||
+ }
|
||||
+ if (pubKey) {
|
||||
+ SECKEY_DestroyPublicKey(pubKey);
|
||||
+ }
|
||||
+ if (privKey) {
|
||||
+ SECKEY_DestroyPrivateKey(privKey);
|
||||
+ }
|
||||
+ fprintf(stderr, "%s PrivateKeyImport %s ***********************\n",
|
||||
+ testname, keyFound ? "PASSED" : "FAILED");
|
||||
+ return keyFound ? SECSuccess : SECFailure;
|
||||
+}
|
||||
+
|
||||
+static const char *const usageInfo[] = {
|
||||
+ "pk11import - test PK11_PrivateKeyImport()"
|
||||
+ "Options:",
|
||||
+ " -d certdir directory containing cert database",
|
||||
+ " -k keysize size of the rsa, dh, and dsa key to test (default 1024)",
|
||||
+ " -C ecc_curve ecc curve (default )",
|
||||
+ " -f pwFile file to fetch the password from",
|
||||
+ " -p pwString password",
|
||||
+ " -r skip rsa test",
|
||||
+ " -D skip dsa test",
|
||||
+ " -h skip dh test",
|
||||
+ " -e skip ec test",
|
||||
+};
|
||||
+static int nUsageInfo = sizeof(usageInfo) / sizeof(char *);
|
||||
+
|
||||
+static void
|
||||
+Usage(char *progName, FILE *outFile)
|
||||
+{
|
||||
+ int i;
|
||||
+ fprintf(outFile, "Usage: %s [ commands ] options\n", progName);
|
||||
+ for (i = 0; i < nUsageInfo; i++)
|
||||
+ fprintf(outFile, "%s\n", usageInfo[i]);
|
||||
+ exit(-1);
|
||||
+}
|
||||
+
|
||||
+enum {
|
||||
+ opt_CertDir,
|
||||
+ opt_KeySize,
|
||||
+ opt_ECCurve,
|
||||
+ opt_PWFile,
|
||||
+ opt_PWString,
|
||||
+ opt_NoRSA,
|
||||
+ opt_NoDSA,
|
||||
+ opt_NoDH,
|
||||
+ opt_NoEC
|
||||
+};
|
||||
+
|
||||
+static secuCommandFlag options[] =
|
||||
+ {
|
||||
+ { /* opt_CertDir */ 'd', PR_TRUE, 0, PR_FALSE },
|
||||
+ { /* opt_KeySize */ 'k', PR_TRUE, 0, PR_FALSE },
|
||||
+ { /* opt_ECCurve */ 'C', PR_TRUE, 0, PR_FALSE },
|
||||
+ { /* opt_PWFile */ 'f', PR_TRUE, 0, PR_FALSE },
|
||||
+ { /* opt_PWString */ 'p', PR_TRUE, 0, PR_FALSE },
|
||||
+ { /* opt_NORSA */ 'r', PR_FALSE, 0, PR_FALSE },
|
||||
+ { /* opt_NoDSA */ 'D', PR_FALSE, 0, PR_FALSE },
|
||||
+ { /* opt_NoDH */ 'h', PR_FALSE, 0, PR_FALSE },
|
||||
+ { /* opt_NoEC */ 'e', PR_FALSE, 0, PR_FALSE },
|
||||
+ };
|
||||
+
|
||||
+int
|
||||
+main(int argc, char **argv)
|
||||
+{
|
||||
+ char *progName;
|
||||
+ SECStatus rv;
|
||||
+ secuCommand args;
|
||||
+ PK11SlotInfo *slot = NULL;
|
||||
+ PRBool failed = PR_FALSE;
|
||||
+ secuPWData pwArgs = { PW_NONE, 0 };
|
||||
+ PRBool doRSA = PR_TRUE;
|
||||
+ PRBool doDSA = PR_TRUE;
|
||||
+ PRBool doDH = PR_FALSE; /* NSS currently can't export wrapped DH keys */
|
||||
+ PRBool doEC = PR_TRUE;
|
||||
+ PQGParams *pqgParams = NULL;
|
||||
+ int keySize;
|
||||
+
|
||||
+ args.numCommands = 0;
|
||||
+ args.numOptions = sizeof(options) / sizeof(secuCommandFlag);
|
||||
+ args.commands = NULL;
|
||||
+ args.options = options;
|
||||
+
|
||||
+#ifdef XP_PC
|
||||
+ progName = strrchr(argv[0], '\\');
|
||||
+#else
|
||||
+ progName = strrchr(argv[0], '/');
|
||||
+#endif
|
||||
+ progName = progName ? progName + 1 : argv[0];
|
||||
+
|
||||
+ rv = SECU_ParseCommandLine(argc, argv, progName, &args);
|
||||
+ if (SECSuccess != rv) {
|
||||
+ Usage(progName, stderr);
|
||||
+ }
|
||||
+
|
||||
+ /* Set the certdb directory (default is ~/.netscape) */
|
||||
+ rv = NSS_InitReadWrite(SECU_ConfigDirectory(args.options[opt_CertDir].arg));
|
||||
+ if (rv != SECSuccess) {
|
||||
+ SECU_PrintPRandOSError(progName);
|
||||
+ return 255;
|
||||
+ }
|
||||
+ PK11_SetPasswordFunc(SECU_GetModulePassword);
|
||||
+
|
||||
+ /* below here, goto cleanup */
|
||||
+ SECU_RegisterDynamicOids();
|
||||
+
|
||||
+ /* handle the arguments */
|
||||
+ if (args.options[opt_PWFile].arg) {
|
||||
+ pwArgs.source = PW_FROMFILE;
|
||||
+ pwArgs.data = args.options[opt_PWFile].arg;
|
||||
+ }
|
||||
+ if (args.options[opt_PWString].arg) {
|
||||
+ pwArgs.source = PW_PLAINTEXT;
|
||||
+ pwArgs.data = args.options[opt_PWString].arg;
|
||||
+ }
|
||||
+ if (args.options[opt_NoRSA].activated) {
|
||||
+ doRSA = PR_FALSE;
|
||||
+ }
|
||||
+ if (args.options[opt_NoDSA].activated) {
|
||||
+ doDSA = PR_FALSE;
|
||||
+ }
|
||||
+ if (args.options[opt_NoDH].activated) {
|
||||
+ doDH = PR_FALSE;
|
||||
+ }
|
||||
+ if (args.options[opt_NoEC].activated) {
|
||||
+ doEC = PR_FALSE;
|
||||
+ }
|
||||
+
|
||||
+ slot = PK11_GetInternalKeySlot();
|
||||
+ if (slot == NULL) {
|
||||
+ SECU_PrintError(progName, "Couldn't find the internal key slot\n");
|
||||
+ return 255;
|
||||
+ }
|
||||
+ rv = PK11_Authenticate(slot, PR_TRUE, &pwArgs);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ SECU_PrintError(progName, "Failed to log into slot");
|
||||
+ PK11_FreeSlot(slot);
|
||||
+ return 255;
|
||||
+ }
|
||||
+
|
||||
+ keySize = 1024;
|
||||
+ if (args.options[opt_KeySize].activated &&
|
||||
+ args.options[opt_KeySize].arg) {
|
||||
+ keySize = atoi(args.options[opt_KeySize].arg);
|
||||
+ }
|
||||
+
|
||||
+ if (doDSA || doDH) {
|
||||
+ PQGVerify *pqgVfy;
|
||||
+ rv = PK11_PQG_ParamGenV2(keySize, 0, keySize / 16, &pqgParams, &pqgVfy);
|
||||
+ if (rv == SECSuccess) {
|
||||
+ PK11_PQG_DestroyVerify(pqgVfy);
|
||||
+ } else {
|
||||
+ SECU_PrintError(progName,
|
||||
+ "PK11_PQG_ParamGenV2 failed, can't test DH or DSA");
|
||||
+ doDSA = doDH = PR_FALSE;
|
||||
+ failed = PR_TRUE;
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
+ if (doRSA) {
|
||||
+ PK11RSAGenParams rsaParams;
|
||||
+ rsaParams.keySizeInBits = keySize;
|
||||
+ rsaParams.pe = 0x010001;
|
||||
+ rv = handleEncryptedPrivateImportTest(progName, slot, "RSA",
|
||||
+ CKM_RSA_PKCS_KEY_PAIR_GEN, &rsaParams, &pwArgs);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ fprintf(stderr, "RSA Import Failed!\n");
|
||||
+ failed = PR_TRUE;
|
||||
+ }
|
||||
+ }
|
||||
+ if (doDSA) {
|
||||
+ rv = handleEncryptedPrivateImportTest(progName, slot, "DSA",
|
||||
+ CKM_DSA_KEY_PAIR_GEN, pqgParams, &pwArgs);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ fprintf(stderr, "DSA Import Failed!\n");
|
||||
+ failed = PR_TRUE;
|
||||
+ }
|
||||
+ }
|
||||
+ if (doDH) {
|
||||
+ SECKEYDHParams dhParams;
|
||||
+ dhParams.prime = pqgParams->prime;
|
||||
+ dhParams.base = pqgParams->base;
|
||||
+ rv = handleEncryptedPrivateImportTest(progName, slot, "DH",
|
||||
+ CKM_DH_PKCS_KEY_PAIR_GEN, &dhParams, &pwArgs);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ fprintf(stderr, "DH Import Failed!\n");
|
||||
+ failed = PR_TRUE;
|
||||
+ }
|
||||
+ }
|
||||
+ if (doEC) {
|
||||
+ SECKEYECParams ecParams;
|
||||
+ SECOidData *curve = SECOID_FindOIDByTag(SEC_OID_SECG_EC_SECP256R1);
|
||||
+ if (args.options[opt_ECCurve].activated &&
|
||||
+ args.options[opt_ECCurve].arg) {
|
||||
+ curve = getCurveFromString(args.options[opt_ECCurve].arg);
|
||||
+ }
|
||||
+ ecParams.data = PORT_Alloc(curve->oid.len + 2);
|
||||
+ if (ecParams.data == NULL) {
|
||||
+ rv = SECFailure;
|
||||
+ goto ec_failed;
|
||||
+ }
|
||||
+ ecParams.data[0] = SEC_ASN1_OBJECT_ID;
|
||||
+ ecParams.data[1] = (unsigned char)curve->oid.len;
|
||||
+ PORT_Memcpy(&ecParams.data[2], curve->oid.data, curve->oid.len);
|
||||
+ ecParams.len = curve->oid.len + 2;
|
||||
+ rv = handleEncryptedPrivateImportTest(progName, slot, "ECC",
|
||||
+ CKM_EC_KEY_PAIR_GEN, &ecParams, &pwArgs);
|
||||
+ PORT_Free(ecParams.data);
|
||||
+ ec_failed:
|
||||
+ if (rv != SECSuccess) {
|
||||
+ fprintf(stderr, "ECC Import Failed!\n");
|
||||
+ failed = PR_TRUE;
|
||||
+ }
|
||||
+ }
|
||||
+
|
||||
+ if (pqgParams) {
|
||||
+ PK11_PQG_DestroyParams(pqgParams);
|
||||
+ }
|
||||
+
|
||||
+ if (slot) {
|
||||
+ PK11_FreeSlot(slot);
|
||||
+ }
|
||||
+
|
||||
+ rv = NSS_Shutdown();
|
||||
+ if (rv != SECSuccess) {
|
||||
+ fprintf(stderr, "Shutdown failed\n");
|
||||
+ SECU_PrintPRandOSError(progName);
|
||||
+ return 255;
|
||||
+ }
|
||||
+
|
||||
+ return failed ? 1 : 0;
|
||||
+}
|
||||
diff --git a/cmd/pk11import/pk11import.gyp b/cmd/pk11import/pk11import.gyp
|
||||
new file mode 100644
|
||||
--- /dev/null
|
||||
+++ b/cmd/pk11import/pk11import.gyp
|
||||
@@ -0,0 +1,25 @@
|
||||
+# This Source Code Form is subject to the terms of the Mozilla Public
|
||||
+# License, v. 2.0. If a copy of the MPL was not distributed with this
|
||||
+# file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
+{
|
||||
+ 'includes': [
|
||||
+ '../../coreconf/config.gypi',
|
||||
+ '../../cmd/platlibs.gypi'
|
||||
+ ],
|
||||
+ 'targets': [
|
||||
+ {
|
||||
+ 'target_name': 'pk11import',
|
||||
+ 'type': 'executable',
|
||||
+ 'sources': [
|
||||
+ 'pk11import.c'
|
||||
+ ],
|
||||
+ 'dependencies': [
|
||||
+ '<(DEPTH)/exports.gyp:dbm_exports',
|
||||
+ '<(DEPTH)/exports.gyp:nss_exports'
|
||||
+ ]
|
||||
+ }
|
||||
+ ],
|
||||
+ 'variables': {
|
||||
+ 'module': 'nss'
|
||||
+ }
|
||||
+}
|
||||
diff --git a/lib/pk11wrap/pk11akey.c b/lib/pk11wrap/pk11akey.c
|
||||
--- a/lib/pk11wrap/pk11akey.c
|
||||
+++ b/lib/pk11wrap/pk11akey.c
|
||||
@@ -1672,16 +1672,96 @@ PK11_MakeKEAPubKey(unsigned char *keyDat
|
||||
rv = SECITEM_CopyItem(arena, &pubk->u.fortezza.KEAKey, &pkData);
|
||||
if (rv != SECSuccess) {
|
||||
PORT_FreeArena(arena, PR_FALSE);
|
||||
return NULL;
|
||||
}
|
||||
return pubk;
|
||||
}
|
||||
|
||||
+SECStatus
|
||||
+SECKEY_SetPublicValue(SECKEYPrivateKey *privKey, SECItem *publicValue)
|
||||
+{
|
||||
+ SECStatus rv;
|
||||
+ SECKEYPublicKey pubKey;
|
||||
+ PLArenaPool *arena;
|
||||
+ PK11SlotInfo *slot = privKey->pkcs11Slot;
|
||||
+ CK_OBJECT_HANDLE privKeyID = privKey->pkcs11ID;
|
||||
+
|
||||
+ pubKey.arena = NULL;
|
||||
+ pubKey.keyType = privKey->keyType;
|
||||
+ pubKey.pkcs11Slot = NULL;
|
||||
+ pubKey.pkcs11ID = CK_INVALID_HANDLE;
|
||||
+ /* can't use PORT_InitCheapArena here becase SECKEY_DestroyPublic is used
|
||||
+ * to free it, and it uses PORT_FreeArena which not only frees the
|
||||
+ * underlying arena, it also frees the allocated arena struct. */
|
||||
+ arena = PORT_NewArena(DER_DEFAULT_CHUNKSIZE);
|
||||
+ pubKey.arena = arena;
|
||||
+ if (arena == NULL) {
|
||||
+ return SECFailure;
|
||||
+ }
|
||||
+ rv = SECFailure;
|
||||
+ switch (privKey->keyType) {
|
||||
+ default:
|
||||
+ /* error code already set to SECFailure */
|
||||
+ break;
|
||||
+ case rsaKey:
|
||||
+ pubKey.u.rsa.modulus = *publicValue;
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_PUBLIC_EXPONENT,
|
||||
+ arena, &pubKey.u.rsa.publicExponent);
|
||||
+ break;
|
||||
+ case dsaKey:
|
||||
+ pubKey.u.dsa.publicValue = *publicValue;
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_PRIME,
|
||||
+ arena, &pubKey.u.dsa.params.prime);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ break;
|
||||
+ }
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_SUBPRIME,
|
||||
+ arena, &pubKey.u.dsa.params.subPrime);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ break;
|
||||
+ }
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_BASE,
|
||||
+ arena, &pubKey.u.dsa.params.base);
|
||||
+ break;
|
||||
+ case dhKey:
|
||||
+ pubKey.u.dh.publicValue = *publicValue;
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_PRIME,
|
||||
+ arena, &pubKey.u.dh.prime);
|
||||
+ if (rv != SECSuccess) {
|
||||
+ break;
|
||||
+ }
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_BASE,
|
||||
+ arena, &pubKey.u.dh.base);
|
||||
+ break;
|
||||
+ case ecKey:
|
||||
+ pubKey.u.ec.publicValue = *publicValue;
|
||||
+ pubKey.u.ec.encoding = ECPoint_Undefined;
|
||||
+ pubKey.u.ec.size = 0;
|
||||
+ rv = PK11_ReadAttribute(slot, privKeyID, CKA_EC_PARAMS,
|
||||
+ arena, &pubKey.u.ec.DEREncodedParams);
|
||||
+ break;
|
||||
+ }
|
||||
+ if (rv == SECSuccess) {
|
||||
+ rv = PK11_ImportPublicKey(slot, &pubKey, PR_TRUE);
|
||||
+ }
|
||||
+ /* Even though pubKey is stored on the stack, we've allocated
|
||||
+ * some of it's data from the arena. SECKEY_DestroyPublicKey
|
||||
+ * destroys keys by freeing the arena, so this will clean up all
|
||||
+ * the data we allocated specifically for the key above. It will
|
||||
+ * also free any slot references which we may have picked up in
|
||||
+ * PK11_ImportPublicKey. It won't delete the underlying key if
|
||||
+ * its a Token/Permanent key (which it will be if
|
||||
+ * PK11_ImportPublicKey succeeds). */
|
||||
+ SECKEY_DestroyPublicKey(&pubKey);
|
||||
+
|
||||
+ return rv;
|
||||
+}
|
||||
+
|
||||
/*
|
||||
* NOTE: This function doesn't return a SECKEYPrivateKey struct to represent
|
||||
* the new private key object. If it were to create a session object that
|
||||
* could later be looked up by its nickname, it would leak a SECKEYPrivateKey.
|
||||
* So isPerm must be true.
|
||||
*/
|
||||
SECStatus
|
||||
PK11_ImportEncryptedPrivateKeyInfo(PK11SlotInfo *slot,
|
||||
@@ -1797,22 +1877,16 @@ try_faulty_3des:
|
||||
|
||||
PORT_Assert(usage != NULL);
|
||||
PORT_Assert(usageCount != 0);
|
||||
privKey = PK11_UnwrapPrivKey(slot, key, cryptoMechType,
|
||||
crypto_param, &epki->encryptedData,
|
||||
nickname, publicValue, isPerm, isPrivate,
|
||||
key_type, usage, usageCount, wincx);
|
||||
if (privKey) {
|
||||
- if (privk) {
|
||||
- *privk = privKey;
|
||||
- } else {
|
||||
- SECKEY_DestroyPrivateKey(privKey);
|
||||
- }
|
||||
- privKey = NULL;
|
||||
rv = SECSuccess;
|
||||
goto done;
|
||||
}
|
||||
|
||||
/* if we are unable to import the key and the pbeMechType is
|
||||
* CKM_NETSCAPE_PBE_SHA1_TRIPLE_DES_CBC, then it is possible that
|
||||
* the encrypted blob was created with a buggy key generation method
|
||||
* which is described in the PKCS 12 implementation notes. So we
|
||||
@@ -1832,16 +1906,35 @@ try_faulty_3des:
|
||||
faulty3DES = PR_TRUE;
|
||||
goto try_faulty_3des;
|
||||
}
|
||||
|
||||
/* key import really did fail */
|
||||
rv = SECFailure;
|
||||
|
||||
done:
|
||||
+ if ((rv == SECSuccess) && isPerm) {
|
||||
+ /* If we are importing a token object,
|
||||
+ * create the corresponding public key.
|
||||
+ * If this fails, just continue as the target
|
||||
+ * token simply might not support persistant
|
||||
+ * public keys. Such tokens are usable, but
|
||||
+ * need to be authenticated before searching
|
||||
+ * for user certs. */
|
||||
+ (void)SECKEY_SetPublicValue(privKey, publicValue);
|
||||
+ }
|
||||
+
|
||||
+ if (privKey) {
|
||||
+ if (privk) {
|
||||
+ *privk = privKey;
|
||||
+ } else {
|
||||
+ SECKEY_DestroyPrivateKey(privKey);
|
||||
+ }
|
||||
+ privKey = NULL;
|
||||
+ }
|
||||
if (crypto_param != NULL) {
|
||||
SECITEM_ZfreeItem(crypto_param, PR_TRUE);
|
||||
}
|
||||
|
||||
if (key != NULL) {
|
||||
PK11_FreeSymKey(key);
|
||||
}
|
||||
|
||||
diff --git a/lib/softoken/pkcs11.c b/lib/softoken/pkcs11.c
|
||||
--- a/lib/softoken/pkcs11.c
|
||||
+++ b/lib/softoken/pkcs11.c
|
||||
@@ -1810,29 +1810,36 @@ sftk_GetPubKey(SFTKObject *object, CK_KE
|
||||
* Some curves are always pressumed to be non-DER.
|
||||
*/
|
||||
if (pubKey->u.ec.publicValue.len == keyLen &&
|
||||
(pubKey->u.ec.ecParams.fieldID.type == ec_field_plain ||
|
||||
pubKey->u.ec.publicValue.data[0] == EC_POINT_FORM_UNCOMPRESSED)) {
|
||||
break; /* key was not DER encoded, no need to unwrap */
|
||||
}
|
||||
|
||||
- PORT_Assert(pubKey->u.ec.ecParams.name != ECCurve25519);
|
||||
+ /* The PKCS #11 spec says that the Params should be DER encoded. Even though the params from the
|
||||
+ * Certificate aren't according the the ECCurve 25519 spec. We should accept this encoding.
|
||||
+ PORT_Assert(pubKey->u.ec.ecParams.name != ECCurve25519); */
|
||||
|
||||
/* handle the encoded case */
|
||||
if ((pubKey->u.ec.publicValue.data[0] == SEC_ASN1_OCTET_STRING) &&
|
||||
pubKey->u.ec.publicValue.len > keyLen) {
|
||||
SECItem publicValue;
|
||||
SECStatus rv;
|
||||
|
||||
rv = SEC_QuickDERDecodeItem(arena, &publicValue,
|
||||
SEC_ASN1_GET(SEC_OctetStringTemplate),
|
||||
&pubKey->u.ec.publicValue);
|
||||
/* nope, didn't decode correctly */
|
||||
- if ((rv != SECSuccess) || (publicValue.data[0] != EC_POINT_FORM_UNCOMPRESSED) || (publicValue.len != keyLen)) {
|
||||
+ if ((rv != SECSuccess) || (publicValue.len != keyLen)) {
|
||||
+ crv = CKR_ATTRIBUTE_VALUE_INVALID;
|
||||
+ break;
|
||||
+ }
|
||||
+ /* we don't handle compressed points except in the case of ECCurve25519 */
|
||||
+ if ((pubKey->u.ec.ecParams.fieldID.type != ec_field_plain) && (publicValue.data[0] != EC_POINT_FORM_UNCOMPRESSED)) {
|
||||
crv = CKR_ATTRIBUTE_VALUE_INVALID;
|
||||
break;
|
||||
}
|
||||
/* replace our previous with the decoded key */
|
||||
pubKey->u.ec.publicValue = publicValue;
|
||||
break;
|
||||
}
|
||||
crv = CKR_ATTRIBUTE_VALUE_INVALID;
|
||||
diff --git a/nss.gyp b/nss.gyp
|
||||
--- a/nss.gyp
|
||||
+++ b/nss.gyp
|
||||
@@ -159,16 +159,17 @@
|
||||
'cmd/oidcalc/oidcalc.gyp:oidcalc',
|
||||
'cmd/p7content/p7content.gyp:p7content',
|
||||
'cmd/p7env/p7env.gyp:p7env',
|
||||
'cmd/p7sign/p7sign.gyp:p7sign',
|
||||
'cmd/p7verify/p7verify.gyp:p7verify',
|
||||
'cmd/pk11ectest/pk11ectest.gyp:pk11ectest',
|
||||
'cmd/pk11gcmtest/pk11gcmtest.gyp:pk11gcmtest',
|
||||
'cmd/pk11mode/pk11mode.gyp:pk11mode',
|
||||
+ 'cmd/pk11import/pk11import.gyp:pk11import',
|
||||
'cmd/pk1sign/pk1sign.gyp:pk1sign',
|
||||
'cmd/pp/pp.gyp:pp',
|
||||
'cmd/rsaperf/rsaperf.gyp:rsaperf',
|
||||
'cmd/rsapoptst/rsapoptst.gyp:rsapoptst',
|
||||
'cmd/sdrtest/sdrtest.gyp:sdrtest',
|
||||
'cmd/selfserv/selfserv.gyp:selfserv',
|
||||
'cmd/shlibsign/mangle/mangle.gyp:mangle',
|
||||
'cmd/strsclnt/strsclnt.gyp:strsclnt',
|
||||
diff --git a/tests/dbtests/dbtests.sh b/tests/dbtests/dbtests.sh
|
||||
--- a/tests/dbtests/dbtests.sh
|
||||
+++ b/tests/dbtests/dbtests.sh
|
||||
@@ -247,16 +247,35 @@ dbtest_main()
|
||||
# the old one should still be there...
|
||||
${BINDIR}/certutil -L -n bob -d ${CONFLICT_DIR}
|
||||
ret=$?
|
||||
if [ $ret -ne 0 ]; then
|
||||
html_failed "Nicknane conflict test-setting nickname conflict incorrectly worked"
|
||||
else
|
||||
html_passed "Nicknane conflict test-setting nickname conflict was correctly rejected"
|
||||
fi
|
||||
-
|
||||
+ # import a token private key and make sure the corresponding public key is
|
||||
+ # created
|
||||
+ ${BINDIR}/pk11import -d ${CONFLICT_DIR} -f ${R_PWFILE}
|
||||
+ echo ${BINDIR}/pk11import -d ${CONFLICT_DIR} -f ${R_PWFILE}
|
||||
+ ret=$?
|
||||
+ if [ $ret -ne 0 ]; then
|
||||
+ html_failed "Importing Token Private Key does not create the corrresponding Public Key"
|
||||
+ else
|
||||
+ html_passed "Importing Token Private Key correctly creates the corrresponding Public Key"
|
||||
+ fi
|
||||
+ # import a token private key and make sure the corresponding public key is
|
||||
+ # created
|
||||
+ ${BINDIR}/pk11import -r -D -h -C Curve25519 -d ${CONFLICT_DIR} -f ${R_PWFILE}
|
||||
+ echo ${BINDIR}/pk11import -r -D -h -C Curve25519 -d ${CONFLICT_DIR} -f ${R_PWFILE}
|
||||
+ ret=$?
|
||||
+ if [ $ret -ne 0 ]; then
|
||||
+ html_failed "Importing ECC Curve 25519 Token Private Key does not create the corrresponding Public Key"
|
||||
+ else
|
||||
+ html_passed "Importing ECC Curve 25519 Token Private Key correctly creates the corrresponding Public Key"
|
||||
+ fi
|
||||
}
|
||||
|
||||
################## main #################################################
|
||||
|
||||
dbtest_init
|
||||
dbtest_main 2>&1
|
||||
dbtest_cleanup
|
62
SOURCES/nss-539183.patch
Normal file
62
SOURCES/nss-539183.patch
Normal file
@ -0,0 +1,62 @@
|
||||
--- nss/cmd/httpserv/httpserv.c.539183 2016-05-21 18:31:39.879585420 -0700
|
||||
+++ nss/cmd/httpserv/httpserv.c 2016-05-21 18:37:22.374464057 -0700
|
||||
@@ -953,23 +953,23 @@
|
||||
getBoundListenSocket(unsigned short port)
|
||||
{
|
||||
PRFileDesc *listen_sock;
|
||||
int listenQueueDepth = 5 + (2 * maxThreads);
|
||||
PRStatus prStatus;
|
||||
PRNetAddr addr;
|
||||
PRSocketOptionData opt;
|
||||
|
||||
- addr.inet.family = PR_AF_INET;
|
||||
- addr.inet.ip = PR_INADDR_ANY;
|
||||
- addr.inet.port = PR_htons(port);
|
||||
+ if (PR_SetNetAddr(PR_IpAddrAny, PR_AF_INET6, port, &addr) != PR_SUCCESS) {
|
||||
+ errExit("PR_SetNetAddr");
|
||||
+ }
|
||||
|
||||
- listen_sock = PR_NewTCPSocket();
|
||||
+ listen_sock = PR_OpenTCPSocket(PR_AF_INET6);
|
||||
if (listen_sock == NULL) {
|
||||
- errExit("PR_NewTCPSocket");
|
||||
+ errExit("PR_OpenTCPSockett");
|
||||
}
|
||||
|
||||
opt.option = PR_SockOpt_Nonblocking;
|
||||
opt.value.non_blocking = PR_FALSE;
|
||||
prStatus = PR_SetSocketOption(listen_sock, &opt);
|
||||
if (prStatus < 0) {
|
||||
PR_Close(listen_sock);
|
||||
errExit("PR_SetSocketOption(PR_SockOpt_Nonblocking)");
|
||||
--- nss/cmd/selfserv/selfserv.c.539183 2016-05-21 18:31:39.882585367 -0700
|
||||
+++ nss/cmd/selfserv/selfserv.c 2016-05-21 18:41:43.092801174 -0700
|
||||
@@ -1711,23 +1711,23 @@
|
||||
getBoundListenSocket(unsigned short port)
|
||||
{
|
||||
PRFileDesc *listen_sock;
|
||||
int listenQueueDepth = 5 + (2 * maxThreads);
|
||||
PRStatus prStatus;
|
||||
PRNetAddr addr;
|
||||
PRSocketOptionData opt;
|
||||
|
||||
- addr.inet.family = PR_AF_INET;
|
||||
- addr.inet.ip = PR_INADDR_ANY;
|
||||
- addr.inet.port = PR_htons(port);
|
||||
+ if (PR_SetNetAddr(PR_IpAddrAny, PR_AF_INET6, port, &addr) != PR_SUCCESS) {
|
||||
+ errExit("PR_SetNetAddr");
|
||||
+ }
|
||||
|
||||
- listen_sock = PR_NewTCPSocket();
|
||||
+ listen_sock = PR_OpenTCPSocket(PR_AF_INET6);
|
||||
if (listen_sock == NULL) {
|
||||
- errExit("PR_NewTCPSocket");
|
||||
+ errExit("PR_OpenTCPSocket error");
|
||||
}
|
||||
|
||||
opt.option = PR_SockOpt_Nonblocking;
|
||||
opt.value.non_blocking = PR_FALSE;
|
||||
prStatus = PR_SetSocketOption(listen_sock, &opt);
|
||||
if (prStatus < 0) {
|
||||
PR_Close(listen_sock);
|
||||
errExit("PR_SetSocketOption(PR_SockOpt_Nonblocking)");
|
145
SOURCES/nss-config.in
Normal file
145
SOURCES/nss-config.in
Normal file
@ -0,0 +1,145 @@
|
||||
#!/bin/sh
|
||||
|
||||
prefix=@prefix@
|
||||
|
||||
major_version=@MOD_MAJOR_VERSION@
|
||||
minor_version=@MOD_MINOR_VERSION@
|
||||
patch_version=@MOD_PATCH_VERSION@
|
||||
|
||||
usage()
|
||||
{
|
||||
cat <<EOF
|
||||
Usage: nss-config [OPTIONS] [LIBRARIES]
|
||||
Options:
|
||||
[--prefix[=DIR]]
|
||||
[--exec-prefix[=DIR]]
|
||||
[--includedir[=DIR]]
|
||||
[--libdir[=DIR]]
|
||||
[--version]
|
||||
[--libs]
|
||||
[--cflags]
|
||||
Dynamic Libraries:
|
||||
nss
|
||||
nssutil
|
||||
ssl
|
||||
smime
|
||||
EOF
|
||||
exit $1
|
||||
}
|
||||
|
||||
if test $# -eq 0; then
|
||||
usage 1 1>&2
|
||||
fi
|
||||
|
||||
lib_ssl=yes
|
||||
lib_smime=yes
|
||||
lib_nss=yes
|
||||
lib_nssutil=yes
|
||||
|
||||
while test $# -gt 0; do
|
||||
case "$1" in
|
||||
-*=*) optarg=`echo "$1" | sed 's/[-_a-zA-Z0-9]*=//'` ;;
|
||||
*) optarg= ;;
|
||||
esac
|
||||
|
||||
case $1 in
|
||||
--prefix=*)
|
||||
prefix=$optarg
|
||||
;;
|
||||
--prefix)
|
||||
echo_prefix=yes
|
||||
;;
|
||||
--exec-prefix=*)
|
||||
exec_prefix=$optarg
|
||||
;;
|
||||
--exec-prefix)
|
||||
echo_exec_prefix=yes
|
||||
;;
|
||||
--includedir=*)
|
||||
includedir=$optarg
|
||||
;;
|
||||
--includedir)
|
||||
echo_includedir=yes
|
||||
;;
|
||||
--libdir=*)
|
||||
libdir=$optarg
|
||||
;;
|
||||
--libdir)
|
||||
echo_libdir=yes
|
||||
;;
|
||||
--version)
|
||||
echo ${major_version}.${minor_version}.${patch_version}
|
||||
;;
|
||||
--cflags)
|
||||
echo_cflags=yes
|
||||
;;
|
||||
--libs)
|
||||
echo_libs=yes
|
||||
;;
|
||||
ssl)
|
||||
lib_ssl=yes
|
||||
;;
|
||||
smime)
|
||||
lib_smime=yes
|
||||
;;
|
||||
nss)
|
||||
lib_nss=yes
|
||||
;;
|
||||
nssutil)
|
||||
lib_nssutil=yes
|
||||
;;
|
||||
*)
|
||||
usage 1 1>&2
|
||||
;;
|
||||
esac
|
||||
shift
|
||||
done
|
||||
|
||||
# Set variables that may be dependent upon other variables
|
||||
if test -z "$exec_prefix"; then
|
||||
exec_prefix=`pkg-config --variable=exec_prefix nss`
|
||||
fi
|
||||
if test -z "$includedir"; then
|
||||
includedir=`pkg-config --variable=includedir nss`
|
||||
fi
|
||||
if test -z "$libdir"; then
|
||||
libdir=`pkg-config --variable=libdir nss`
|
||||
fi
|
||||
|
||||
if test "$echo_prefix" = "yes"; then
|
||||
echo $prefix
|
||||
fi
|
||||
|
||||
if test "$echo_exec_prefix" = "yes"; then
|
||||
echo $exec_prefix
|
||||
fi
|
||||
|
||||
if test "$echo_includedir" = "yes"; then
|
||||
echo $includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libdir" = "yes"; then
|
||||
echo $libdir
|
||||
fi
|
||||
|
||||
if test "$echo_cflags" = "yes"; then
|
||||
echo -I$includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libs" = "yes"; then
|
||||
libdirs="-Wl,-rpath-link,$libdir -L$libdir"
|
||||
if test -n "$lib_ssl"; then
|
||||
libdirs="$libdirs -lssl${major_version}"
|
||||
fi
|
||||
if test -n "$lib_smime"; then
|
||||
libdirs="$libdirs -lsmime${major_version}"
|
||||
fi
|
||||
if test -n "$lib_nss"; then
|
||||
libdirs="$libdirs -lnss${major_version}"
|
||||
fi
|
||||
if test -n "$lib_nssutil"; then
|
||||
libdirs="$libdirs -lnssutil${major_version}"
|
||||
fi
|
||||
echo $libdirs
|
||||
fi
|
||||
|
170
SOURCES/nss-dsa.patch
Normal file
170
SOURCES/nss-dsa.patch
Normal file
@ -0,0 +1,170 @@
|
||||
# HG changeset patch
|
||||
# User Daiki Ueno <dueno@redhat.com>
|
||||
# Date 1542120846 -3600
|
||||
# Tue Nov 13 15:54:06 2018 +0100
|
||||
# Node ID 5046749fa8a56a99c251bc1cdd1b3302f43947d2
|
||||
# Parent 0d97145d524ab35b8bc2a4a8aea60a83bd244f14
|
||||
Bug 1493936, add a new "DSA" policy keyword
|
||||
|
||||
Summary:
|
||||
This adds a new policy keyword "DSA" to explicitly disable DSA in TLS 1.2 or earlier.
|
||||
|
||||
We could make this a bit more generic, e.g., by adding "ECDSA", "RSA-PSS" etc. However, considering the current use of policy in [fedora-crypto-policies](https://gitlab.com/redhat-crypto/fedora-crypto-policies), I realized that adding new keywords may cause compatibility problems; because the Fedora configuration has `disallow=ALL`, all new keywords would be disabled by default. I think it's okay for DSA, though.
|
||||
|
||||
Reviewers: kaie
|
||||
|
||||
Reviewed By: kaie
|
||||
|
||||
Bug #: 1493936
|
||||
|
||||
Differential Revision: https://phabricator.services.mozilla.com/D6777
|
||||
|
||||
diff --git a/lib/certhigh/certvfy.c b/lib/certhigh/certvfy.c
|
||||
--- a/lib/certhigh/certvfy.c
|
||||
+++ b/lib/certhigh/certvfy.c
|
||||
@@ -37,7 +37,7 @@ CERT_CertTimesValid(CERTCertificate *c)
|
||||
return (valid == secCertTimeValid) ? SECSuccess : SECFailure;
|
||||
}
|
||||
|
||||
-SECStatus
|
||||
+static SECStatus
|
||||
checkKeyParams(const SECAlgorithmID *sigAlgorithm, const SECKEYPublicKey *key)
|
||||
{
|
||||
SECStatus rv;
|
||||
@@ -47,6 +47,12 @@ checkKeyParams(const SECAlgorithmID *sig
|
||||
PRInt32 minLen, len;
|
||||
|
||||
sigAlg = SECOID_GetAlgorithmTag(sigAlgorithm);
|
||||
+ rv = NSS_GetAlgorithmPolicy(sigAlg, &policyFlags);
|
||||
+ if (rv == SECSuccess &&
|
||||
+ !(policyFlags & NSS_USE_ALG_IN_CERT_SIGNATURE)) {
|
||||
+ PORT_SetError(SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED);
|
||||
+ return SECFailure;
|
||||
+ }
|
||||
|
||||
switch (sigAlg) {
|
||||
case SEC_OID_ANSIX962_ECDSA_SHA1_SIGNATURE:
|
||||
diff --git a/lib/pk11wrap/pk11pars.c b/lib/pk11wrap/pk11pars.c
|
||||
--- a/lib/pk11wrap/pk11pars.c
|
||||
+++ b/lib/pk11wrap/pk11pars.c
|
||||
@@ -384,18 +384,26 @@ static const oidValDef kxOptList[] = {
|
||||
{ CIPHER_NAME("ECDH-RSA"), SEC_OID_TLS_ECDH_RSA, NSS_USE_ALG_IN_SSL_KX },
|
||||
};
|
||||
|
||||
+static const oidValDef signOptList[] = {
|
||||
+ /* Signatures */
|
||||
+ { CIPHER_NAME("DSA"), SEC_OID_ANSIX9_DSA_SIGNATURE,
|
||||
+ NSS_USE_ALG_IN_SSL_KX | NSS_USE_ALG_IN_CERT_SIGNATURE },
|
||||
+};
|
||||
+
|
||||
typedef struct {
|
||||
const oidValDef *list;
|
||||
PRUint32 entries;
|
||||
const char *description;
|
||||
+ PRBool allowEmpty;
|
||||
} algListsDef;
|
||||
|
||||
static const algListsDef algOptLists[] = {
|
||||
- { curveOptList, PR_ARRAY_SIZE(curveOptList), "ECC" },
|
||||
- { hashOptList, PR_ARRAY_SIZE(hashOptList), "HASH" },
|
||||
- { macOptList, PR_ARRAY_SIZE(macOptList), "MAC" },
|
||||
- { cipherOptList, PR_ARRAY_SIZE(cipherOptList), "CIPHER" },
|
||||
- { kxOptList, PR_ARRAY_SIZE(kxOptList), "OTHER-KX" },
|
||||
+ { curveOptList, PR_ARRAY_SIZE(curveOptList), "ECC", PR_FALSE },
|
||||
+ { hashOptList, PR_ARRAY_SIZE(hashOptList), "HASH", PR_FALSE },
|
||||
+ { macOptList, PR_ARRAY_SIZE(macOptList), "MAC", PR_FALSE },
|
||||
+ { cipherOptList, PR_ARRAY_SIZE(cipherOptList), "CIPHER", PR_FALSE },
|
||||
+ { kxOptList, PR_ARRAY_SIZE(kxOptList), "OTHER-KX", PR_FALSE },
|
||||
+ { signOptList, PR_ARRAY_SIZE(signOptList), "OTHER-SIGN", PR_TRUE },
|
||||
};
|
||||
|
||||
static const optionFreeDef sslOptList[] = {
|
||||
@@ -718,7 +726,7 @@ secmod_sanityCheckCryptoPolicy(void)
|
||||
for (i = 0; i < PR_ARRAY_SIZE(algOptLists); i++) {
|
||||
const algListsDef *algOptList = &algOptLists[i];
|
||||
fprintf(stderr, "NSS-POLICY-%s: NUMBER-OF-%s: %u\n", enabledCount[i] ? sInfo : sWarn, algOptList->description, enabledCount[i]);
|
||||
- if (!enabledCount[i]) {
|
||||
+ if (!enabledCount[i] && !algOptList->allowEmpty) {
|
||||
haveWarning = PR_TRUE;
|
||||
}
|
||||
}
|
||||
diff --git a/lib/ssl/ssl3con.c b/lib/ssl/ssl3con.c
|
||||
--- a/lib/ssl/ssl3con.c
|
||||
+++ b/lib/ssl/ssl3con.c
|
||||
@@ -64,6 +64,7 @@ static SECStatus ssl3_FlushHandshakeMess
|
||||
static CK_MECHANISM_TYPE ssl3_GetHashMechanismByHashType(SSLHashType hashType);
|
||||
static CK_MECHANISM_TYPE ssl3_GetMgfMechanismByHashType(SSLHashType hash);
|
||||
PRBool ssl_IsRsaPssSignatureScheme(SSLSignatureScheme scheme);
|
||||
+PRBool ssl_IsDsaSignatureScheme(SSLSignatureScheme scheme);
|
||||
|
||||
const PRUint8 ssl_hello_retry_random[] = {
|
||||
0xCF, 0x21, 0xAD, 0x74, 0xE5, 0x9A, 0x61, 0x11,
|
||||
@@ -4309,6 +4310,22 @@ ssl_IsRsaPssSignatureScheme(SSLSignature
|
||||
return PR_FALSE;
|
||||
}
|
||||
|
||||
+PRBool
|
||||
+ssl_IsDsaSignatureScheme(SSLSignatureScheme scheme)
|
||||
+{
|
||||
+ switch (scheme) {
|
||||
+ case ssl_sig_dsa_sha256:
|
||||
+ case ssl_sig_dsa_sha384:
|
||||
+ case ssl_sig_dsa_sha512:
|
||||
+ case ssl_sig_dsa_sha1:
|
||||
+ return PR_TRUE;
|
||||
+
|
||||
+ default:
|
||||
+ return PR_FALSE;
|
||||
+ }
|
||||
+ return PR_FALSE;
|
||||
+}
|
||||
+
|
||||
SSLAuthType
|
||||
ssl_SignatureSchemeToAuthType(SSLSignatureScheme scheme)
|
||||
{
|
||||
@@ -6017,6 +6034,13 @@ ssl_CanUseSignatureScheme(SSLSignatureSc
|
||||
return PR_FALSE;
|
||||
}
|
||||
|
||||
+ if (ssl_IsDsaSignatureScheme(scheme) &&
|
||||
+ (NSS_GetAlgorithmPolicy(SEC_OID_ANSIX9_DSA_SIGNATURE, &policy) ==
|
||||
+ SECSuccess) &&
|
||||
+ !(policy & NSS_USE_ALG_IN_SSL_KX)) {
|
||||
+ return PR_FALSE;
|
||||
+ }
|
||||
+
|
||||
hashType = ssl_SignatureSchemeToHashType(scheme);
|
||||
if (requireSha1 && (hashType != ssl_hash_sha1)) {
|
||||
return PR_FALSE;
|
||||
@@ -9490,6 +9514,14 @@ ssl3_EncodeSigAlgs(const sslSocket *ss,
|
||||
continue;
|
||||
}
|
||||
|
||||
+ /* Skip DSA scheme if it is disabled by policy. */
|
||||
+ if (ssl_IsDsaSignatureScheme(ss->ssl3.signatureSchemes[i]) &&
|
||||
+ (NSS_GetAlgorithmPolicy(SEC_OID_ANSIX9_DSA_SIGNATURE, &policy) ==
|
||||
+ SECSuccess) &&
|
||||
+ !(policy & NSS_USE_ALG_IN_SSL_KX)) {
|
||||
+ continue;
|
||||
+ }
|
||||
+
|
||||
if ((NSS_GetAlgorithmPolicy(hashOID, &policy) != SECSuccess) ||
|
||||
(policy & NSS_USE_ALG_IN_SSL_KX)) {
|
||||
rv = sslBuffer_AppendNumber(buf, ss->ssl3.signatureSchemes[i], 2);
|
||||
diff --git a/tests/ssl/sslpolicy.txt b/tests/ssl/sslpolicy.txt
|
||||
--- a/tests/ssl/sslpolicy.txt
|
||||
+++ b/tests/ssl/sslpolicy.txt
|
||||
@@ -74,6 +74,8 @@
|
||||
# SECT409R1
|
||||
# SECT571K1
|
||||
# SECT571R1
|
||||
+# Signatures:
|
||||
+# DSA
|
||||
# Hashes:
|
||||
# MD2
|
||||
# MD4
|
||||
@@ -172,3 +174,4 @@
|
||||
1 noECC SSL3 d allow=tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Exlicitly
|
||||
1 noECC SSL3 d disallow=all_allow=hmac-sha1:sha256:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Implicitly Narrow.
|
||||
1 noECC SSL3 d disallow=all_allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 Disallow Version Implicitly.
|
||||
+ 0 noECC SSL3 d disallow=dsa Disallow DSA Signatures Explicitly.
|
22
SOURCES/nss-dso-ldflags.patch
Normal file
22
SOURCES/nss-dso-ldflags.patch
Normal file
@ -0,0 +1,22 @@
|
||||
diff --git a/coreconf/Linux.mk b/coreconf/Linux.mk
|
||||
--- a/coreconf/Linux.mk
|
||||
+++ b/coreconf/Linux.mk
|
||||
@@ -135,17 +135,17 @@ ifeq ($(KERNEL),Linux)
|
||||
endif
|
||||
OS_LIBS = $(OS_PTHREAD) -ldl -lc
|
||||
|
||||
ifdef USE_PTHREADS
|
||||
DEFINES += -D_REENTRANT
|
||||
endif
|
||||
|
||||
DSO_CFLAGS = -fPIC
|
||||
-DSO_LDOPTS = -shared $(ARCHFLAG) -Wl,--gc-sections
|
||||
+DSO_LDOPTS = -shared $(ARCHFLAG) -Wl,--gc-sections $(DSO_LDFLAGS)
|
||||
# The linker on Red Hat Linux 7.2 and RHEL 2.1 (GNU ld version 2.11.90.0.8)
|
||||
# incorrectly reports undefined references in the libraries we link with, so
|
||||
# we don't use -z defs there.
|
||||
# Also, -z defs conflicts with Address Sanitizer, which emits relocations
|
||||
# against the libsanitizer runtime built into the main executable.
|
||||
ZDEFS_FLAG = -Wl,-z,defs
|
||||
DSO_LDOPTS += $(if $(findstring 2.11.90.0.8,$(shell ld -v)),,$(ZDEFS_FLAG))
|
||||
LDFLAGS += $(ARCHFLAG) -z noexecstack
|
170
SOURCES/nss-manpage-fixes.patch
Normal file
170
SOURCES/nss-manpage-fixes.patch
Normal file
@ -0,0 +1,170 @@
|
||||
# HG changeset patch
|
||||
# User Daiki Ueno <dueno@redhat.com>
|
||||
# Date 1544699159 -3600
|
||||
# Thu Dec 13 12:05:59 2018 +0100
|
||||
# Node ID 0124a811bdf7abfe4bcf135ccc8c719b14db0580
|
||||
# Parent 5b2efc615899a283c1ab2e26ddb41684aeae60f0
|
||||
Add manual for nss-policy-check
|
||||
|
||||
diff --git a/doc/Makefile b/doc/Makefile
|
||||
--- a/doc/Makefile
|
||||
+++ b/doc/Makefile
|
||||
@@ -21,7 +21,7 @@ all: prepare all-man all-html
|
||||
prepare: date-and-version
|
||||
mkdir -p html
|
||||
mkdir -p nroff
|
||||
-
|
||||
+
|
||||
clean:
|
||||
rm -f date.xml version.xml *.tar.bz2
|
||||
rm -f html/*.proc
|
||||
@@ -45,11 +45,11 @@ version.xml:
|
||||
|
||||
nroff/%.1 : %.xml
|
||||
$(COMPILE.1) $<
|
||||
-
|
||||
+
|
||||
MANPAGES = \
|
||||
nroff/certutil.1 nroff/cmsutil.1 nroff/crlutil.1 nroff/pk12util.1 \
|
||||
nroff/modutil.1 nroff/ssltap.1 nroff/derdump.1 nroff/signtool.1 nroff/signver.1 \
|
||||
-nroff/pp.1 nroff/vfychain.1 nroff/vfyserv.1
|
||||
+nroff/pp.1 nroff/vfychain.1 nroff/vfyserv.1 nroff/nss-policy-check.1
|
||||
|
||||
all-man: prepare $(MANPAGES)
|
||||
|
||||
@@ -64,6 +64,6 @@ html/%.html : %.xml
|
||||
HTMLPAGES = \
|
||||
html/certutil.html html/cmsutil.html html/crlutil.html html/pk12util.html html/modutil.html \
|
||||
html/ssltap.html html/derdump.html html/signtool.html html/signver.html html/pp.html \
|
||||
-html/vfychain.html html/vfyserv.html
|
||||
+html/vfychain.html html/vfyserv.html html/nss-policy-check.html
|
||||
|
||||
all-html: prepare $(HTMLPAGES)
|
||||
diff --git a/doc/certutil.xml b/doc/certutil.xml
|
||||
--- a/doc/certutil.xml
|
||||
+++ b/doc/certutil.xml
|
||||
@@ -180,6 +180,10 @@ For certificate requests, ASCII output d
|
||||
</varlistentry>
|
||||
|
||||
<varlistentry>
|
||||
+ <term>--simple-self-signed</term>
|
||||
+ <listitem><para>When printing the certificate chain, don't search for a chain if issuer name equals to subject name.</para></listitem>
|
||||
+ </varlistentry>
|
||||
+ <varlistentry>
|
||||
<term>-b validity-time</term>
|
||||
<listitem><para>Specify a time at which a certificate is required to be valid. Use when checking certificate validity with the <option>-V</option> option. The format of the <emphasis>validity-time</emphasis> argument is <emphasis>YYMMDDHHMMSS[+HHMM|-HHMM|Z]</emphasis>, which allows offsets to be set relative to the validity end time. Specifying seconds (<emphasis>SS</emphasis>) is optional. When specifying an explicit time, use a Z at the end of the term, <emphasis>YYMMDDHHMMSSZ</emphasis>, to close it. When specifying an offset time, use <emphasis>YYMMDDHHMMSS+HHMM</emphasis> or <emphasis>YYMMDDHHMMSS-HHMM</emphasis> for adding or subtracting time, respectively.
|
||||
</para>
|
||||
diff --git a/doc/nss-policy-check.xml b/doc/nss-policy-check.xml
|
||||
new file mode 100644
|
||||
--- /dev/null
|
||||
+++ b/doc/nss-policy-check.xml
|
||||
@@ -0,0 +1,97 @@
|
||||
+<?xml version="1.0" encoding="UTF-8"?>
|
||||
+<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
||||
+ "http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd" [
|
||||
+<!ENTITY date SYSTEM "date.xml">
|
||||
+<!ENTITY version SYSTEM "version.xml">
|
||||
+]>
|
||||
+
|
||||
+<refentry id="nss-policy-check">
|
||||
+
|
||||
+ <refentryinfo>
|
||||
+ <date>&date;</date>
|
||||
+ <title>NSS Security Tools</title>
|
||||
+ <productname>nss-tools</productname>
|
||||
+ <productnumber>&version;</productnumber>
|
||||
+ </refentryinfo>
|
||||
+
|
||||
+ <refmeta>
|
||||
+ <refentrytitle>NSS-POLICY-CHECK</refentrytitle>
|
||||
+ <manvolnum>1</manvolnum>
|
||||
+ </refmeta>
|
||||
+
|
||||
+ <refnamediv>
|
||||
+ <refname>nss-policy-check</refname>
|
||||
+ <refpurpose>nss-policy-check policy-file</refpurpose>
|
||||
+ </refnamediv>
|
||||
+
|
||||
+ <refsynopsisdiv>
|
||||
+ <cmdsynopsis>
|
||||
+ <command>nss-policy-check</command>
|
||||
+ </cmdsynopsis>
|
||||
+ </refsynopsisdiv>
|
||||
+
|
||||
+ <refsection id="description">
|
||||
+ <title>Description</title>
|
||||
+ <para><command>nss-policy-check</command> verifies crypto-policy configuration that controls certain crypto algorithms are allowed/disallowed to use in the NSS library.</para>
|
||||
+
|
||||
+ <para>The crypto-policy configuration can be stored in either a system-wide configuration file, specified with the POLICY_PATH and POLICY_FILE build options, or in the pkcs11.txt in NSS database.</para>
|
||||
+ </refsection>
|
||||
+
|
||||
+ <refsection id="basic-usage">
|
||||
+ <title>Usage and Examples</title>
|
||||
+ <para>To check the global crypto-policy configuration in <filename>/etc/crypto-policies/back-ends/nss.config</filename>:
|
||||
+ </para>
|
||||
+ <programlisting>$ nss-policy-check /etc/crypto-policies/back-ends/nss.config
|
||||
+NSS-POLICY-INFO: LOADED-SUCCESSFULLY
|
||||
+NSS-POLICY-INFO: PRIME256V1 is enabled for KX
|
||||
+NSS-POLICY-INFO: PRIME256V1 is enabled for CERT-SIGNATURE
|
||||
+NSS-POLICY-INFO: SECP256R1 is enabled for KX
|
||||
+NSS-POLICY-INFO: SECP256R1 is enabled for CERT-SIGNATURE
|
||||
+NSS-POLICY-INFO: SECP384R1 is enabled for KX
|
||||
+NSS-POLICY-INFO: SECP384R1 is enabled for CERT-SIGNATURE
|
||||
+...
|
||||
+NSS-POLICY-INFO: NUMBER-OF-SSL-ALG-KX: 13
|
||||
+NSS-POLICY-INFO: NUMBER-OF-SSL-ALG: 9
|
||||
+NSS-POLICY-INFO: NUMBER-OF-CERT-SIG: 9
|
||||
+...
|
||||
+NSS-POLICY-INFO: ciphersuite TLS_AES_128_GCM_SHA256 is enabled
|
||||
+NSS-POLICY-INFO: ciphersuite TLS_CHACHA20_POLY1305_SHA256 is enabled
|
||||
+NSS-POLICY-INFO: ciphersuite TLS_AES_256_GCM_SHA384 is enabled
|
||||
+...
|
||||
+NSS-POLICY-INFO: NUMBER-OF-CIPHERSUITES: 24
|
||||
+NSS-POLICY-INFO: NUMBER-OF-TLS-VERSIONS: 3
|
||||
+NSS-POLICY-INFO: NUMBER-OF-DTLS-VERSIONS: 2
|
||||
+ </programlisting>
|
||||
+ <para>If there is a failure or warning, it will be prefixed with
|
||||
+ NSS-POLICY-FAIL or NSS-POLICY_WARN.
|
||||
+ </para>
|
||||
+ <para><command>nss-policy-check</command> exits with 2 if any
|
||||
+ failure is found, 1 if any warning is found, or 0 if no errors are
|
||||
+ found.</para>
|
||||
+ </refsection>
|
||||
+
|
||||
+<!-- don't change -->
|
||||
+ <refsection id="resources">
|
||||
+ <title>Additional Resources</title>
|
||||
+ <para>For information about NSS and other tools related to NSS (like JSS), check out the NSS project wiki at <ulink url="http://www.mozilla.org/projects/security/pki/nss/">http://www.mozilla.org/projects/security/pki/nss/</ulink>. The NSS site relates directly to NSS code changes and releases.</para>
|
||||
+ <para>Mailing lists: https://lists.mozilla.org/listinfo/dev-tech-crypto</para>
|
||||
+ <para>IRC: Freenode at #dogtag-pki</para>
|
||||
+ </refsection>
|
||||
+
|
||||
+<!-- fill in your name first; keep the other names for reference -->
|
||||
+ <refsection id="authors">
|
||||
+ <title>Authors</title>
|
||||
+ <para>The NSS tools were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google.</para>
|
||||
+ <para>
|
||||
+ Authors: Elio Maldonado <emaldona@redhat.com>, Deon Lackey <dlackey@redhat.com>.
|
||||
+ </para>
|
||||
+ </refsection>
|
||||
+
|
||||
+<!-- don't change -->
|
||||
+ <refsection id="license">
|
||||
+ <title>LICENSE</title>
|
||||
+ <para>Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
+ </para>
|
||||
+ </refsection>
|
||||
+
|
||||
+</refentry>
|
||||
diff --git a/doc/pk12util.xml b/doc/pk12util.xml
|
||||
--- a/doc/pk12util.xml
|
||||
+++ b/doc/pk12util.xml
|
||||
@@ -108,7 +108,7 @@
|
||||
</varlistentry>
|
||||
|
||||
<varlistentry>
|
||||
- <term>-n | --cert-key-len certKeyLength</term>
|
||||
+ <term>--cert-key-len certKeyLength</term>
|
||||
<listitem><para>Specify the desired length of the symmetric key to be used to encrypt the certificates and other meta-data.</para></listitem>
|
||||
</varlistentry>
|
||||
|
4
SOURCES/nss-p11-kit.config
Normal file
4
SOURCES/nss-p11-kit.config
Normal file
@ -0,0 +1,4 @@
|
||||
name=p11-kit-proxy
|
||||
library=p11-kit-proxy.so
|
||||
|
||||
|
116
SOURCES/nss-softokn-config.in
Normal file
116
SOURCES/nss-softokn-config.in
Normal file
@ -0,0 +1,116 @@
|
||||
#!/bin/sh
|
||||
|
||||
prefix=@prefix@
|
||||
|
||||
major_version=@MOD_MAJOR_VERSION@
|
||||
minor_version=@MOD_MINOR_VERSION@
|
||||
patch_version=@MOD_PATCH_VERSION@
|
||||
|
||||
usage()
|
||||
{
|
||||
cat <<EOF
|
||||
Usage: nss-softokn-config [OPTIONS] [LIBRARIES]
|
||||
Options:
|
||||
[--prefix[=DIR]]
|
||||
[--exec-prefix[=DIR]]
|
||||
[--includedir[=DIR]]
|
||||
[--libdir[=DIR]]
|
||||
[--version]
|
||||
[--libs]
|
||||
[--cflags]
|
||||
Dynamic Libraries:
|
||||
softokn3 - Requires full dynamic linking
|
||||
freebl3 - for internal use only (and glibc for self-integrity check)
|
||||
nssdbm3 - for internal use only
|
||||
Dymamically linked
|
||||
EOF
|
||||
exit $1
|
||||
}
|
||||
|
||||
if test $# -eq 0; then
|
||||
usage 1 1>&2
|
||||
fi
|
||||
|
||||
while test $# -gt 0; do
|
||||
case "$1" in
|
||||
-*=*) optarg=`echo "$1" | sed 's/[-_a-zA-Z0-9]*=//'` ;;
|
||||
*) optarg= ;;
|
||||
esac
|
||||
|
||||
case $1 in
|
||||
--prefix=*)
|
||||
prefix=$optarg
|
||||
;;
|
||||
--prefix)
|
||||
echo_prefix=yes
|
||||
;;
|
||||
--exec-prefix=*)
|
||||
exec_prefix=$optarg
|
||||
;;
|
||||
--exec-prefix)
|
||||
echo_exec_prefix=yes
|
||||
;;
|
||||
--includedir=*)
|
||||
includedir=$optarg
|
||||
;;
|
||||
--includedir)
|
||||
echo_includedir=yes
|
||||
;;
|
||||
--libdir=*)
|
||||
libdir=$optarg
|
||||
;;
|
||||
--libdir)
|
||||
echo_libdir=yes
|
||||
;;
|
||||
--version)
|
||||
echo ${major_version}.${minor_version}.${patch_version}
|
||||
;;
|
||||
--cflags)
|
||||
echo_cflags=yes
|
||||
;;
|
||||
--libs)
|
||||
echo_libs=yes
|
||||
;;
|
||||
*)
|
||||
usage 1 1>&2
|
||||
;;
|
||||
esac
|
||||
shift
|
||||
done
|
||||
|
||||
# Set variables that may be dependent upon other variables
|
||||
if test -z "$exec_prefix"; then
|
||||
exec_prefix=`pkg-config --variable=exec_prefix nss-softokn`
|
||||
fi
|
||||
if test -z "$includedir"; then
|
||||
includedir=`pkg-config --variable=includedir nss-softokn`
|
||||
fi
|
||||
if test -z "$libdir"; then
|
||||
libdir=`pkg-config --variable=libdir nss-softokn`
|
||||
fi
|
||||
|
||||
if test "$echo_prefix" = "yes"; then
|
||||
echo $prefix
|
||||
fi
|
||||
|
||||
if test "$echo_exec_prefix" = "yes"; then
|
||||
echo $exec_prefix
|
||||
fi
|
||||
|
||||
if test "$echo_includedir" = "yes"; then
|
||||
echo $includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libdir" = "yes"; then
|
||||
echo $libdir
|
||||
fi
|
||||
|
||||
if test "$echo_cflags" = "yes"; then
|
||||
echo -I$includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libs" = "yes"; then
|
||||
libdirs="-Wl,-rpath-link,$libdir -L$libdir"
|
||||
echo $libdirs
|
||||
fi
|
||||
|
18
SOURCES/nss-softokn-dracut-module-setup.sh
Normal file
18
SOURCES/nss-softokn-dracut-module-setup.sh
Normal file
@ -0,0 +1,18 @@
|
||||
#!/bin/bash
|
||||
# -*- mode: shell-script; indent-tabs-mode: nil; sh-basic-offset: 4; -*-
|
||||
# ex: ts=8 sw=4 sts=4 et filetype=sh
|
||||
|
||||
check() {
|
||||
return 255
|
||||
}
|
||||
|
||||
depends() {
|
||||
return 0
|
||||
}
|
||||
|
||||
install() {
|
||||
local _dir
|
||||
|
||||
inst_libdir_file libfreeblpriv3.so libfreeblpriv3.chk \
|
||||
libfreebl3.so
|
||||
}
|
3
SOURCES/nss-softokn-dracut.conf
Normal file
3
SOURCES/nss-softokn-dracut.conf
Normal file
@ -0,0 +1,3 @@
|
||||
# turn on nss-softokn module
|
||||
|
||||
add_dracutmodules+=" nss-softokn "
|
6
SOURCES/nss-softokn-prelink.conf
Normal file
6
SOURCES/nss-softokn-prelink.conf
Normal file
@ -0,0 +1,6 @@
|
||||
-b /lib{,64}/libfreeblpriv3.so
|
||||
-b /lib{,64}/libsoftokn3.so
|
||||
-b /lib{,64}/libnssdbm3.so
|
||||
-b /usr/lib{,64}/libfreeblpriv3.so
|
||||
-b /usr/lib{,64}/libsoftokn3.so
|
||||
-b /usr/lib{,64}/libnssdbm3.so
|
11
SOURCES/nss-softokn.pc.in
Normal file
11
SOURCES/nss-softokn.pc.in
Normal file
@ -0,0 +1,11 @@
|
||||
prefix=%prefix%
|
||||
exec_prefix=%exec_prefix%
|
||||
libdir=%libdir%
|
||||
includedir=%includedir%
|
||||
|
||||
Name: NSS-SOFTOKN
|
||||
Description: Network Security Services Softoken PKCS #11 Module
|
||||
Version: %SOFTOKEN_VERSION%
|
||||
Requires: nspr >= %NSPR_VERSION%, nss-util >= %NSSUTIL_VERSION%
|
||||
Libs: -L${libdir} -lfreebl3 -lnssdbm3 -lsoftokn3
|
||||
Cflags: -I${includedir}
|
118
SOURCES/nss-util-config.in
Normal file
118
SOURCES/nss-util-config.in
Normal file
@ -0,0 +1,118 @@
|
||||
#!/bin/sh
|
||||
|
||||
prefix=@prefix@
|
||||
|
||||
major_version=@MOD_MAJOR_VERSION@
|
||||
minor_version=@MOD_MINOR_VERSION@
|
||||
patch_version=@MOD_PATCH_VERSION@
|
||||
|
||||
usage()
|
||||
{
|
||||
cat <<EOF
|
||||
Usage: nss-util-config [OPTIONS] [LIBRARIES]
|
||||
Options:
|
||||
[--prefix[=DIR]]
|
||||
[--exec-prefix[=DIR]]
|
||||
[--includedir[=DIR]]
|
||||
[--libdir[=DIR]]
|
||||
[--version]
|
||||
[--libs]
|
||||
[--cflags]
|
||||
Dynamic Libraries:
|
||||
nssutil
|
||||
EOF
|
||||
exit $1
|
||||
}
|
||||
|
||||
if test $# -eq 0; then
|
||||
usage 1 1>&2
|
||||
fi
|
||||
|
||||
lib_nssutil=yes
|
||||
|
||||
while test $# -gt 0; do
|
||||
case "$1" in
|
||||
-*=*) optarg=`echo "$1" | sed 's/[-_a-zA-Z0-9]*=//'` ;;
|
||||
*) optarg= ;;
|
||||
esac
|
||||
|
||||
case $1 in
|
||||
--prefix=*)
|
||||
prefix=$optarg
|
||||
;;
|
||||
--prefix)
|
||||
echo_prefix=yes
|
||||
;;
|
||||
--exec-prefix=*)
|
||||
exec_prefix=$optarg
|
||||
;;
|
||||
--exec-prefix)
|
||||
echo_exec_prefix=yes
|
||||
;;
|
||||
--includedir=*)
|
||||
includedir=$optarg
|
||||
;;
|
||||
--includedir)
|
||||
echo_includedir=yes
|
||||
;;
|
||||
--libdir=*)
|
||||
libdir=$optarg
|
||||
;;
|
||||
--libdir)
|
||||
echo_libdir=yes
|
||||
;;
|
||||
--version)
|
||||
echo ${major_version}.${minor_version}.${patch_version}
|
||||
;;
|
||||
--cflags)
|
||||
echo_cflags=yes
|
||||
;;
|
||||
--libs)
|
||||
echo_libs=yes
|
||||
;;
|
||||
*)
|
||||
usage 1 1>&2
|
||||
;;
|
||||
esac
|
||||
shift
|
||||
done
|
||||
|
||||
# Set variables that may be dependent upon other variables
|
||||
if test -z "$exec_prefix"; then
|
||||
exec_prefix=`pkg-config --variable=exec_prefix nss-util`
|
||||
fi
|
||||
if test -z "$includedir"; then
|
||||
includedir=`pkg-config --variable=includedir nss-util`
|
||||
fi
|
||||
if test -z "$libdir"; then
|
||||
libdir=`pkg-config --variable=libdir nss-util`
|
||||
fi
|
||||
|
||||
if test "$echo_prefix" = "yes"; then
|
||||
echo $prefix
|
||||
fi
|
||||
|
||||
if test "$echo_exec_prefix" = "yes"; then
|
||||
echo $exec_prefix
|
||||
fi
|
||||
|
||||
if test "$echo_includedir" = "yes"; then
|
||||
echo $includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libdir" = "yes"; then
|
||||
echo $libdir
|
||||
fi
|
||||
|
||||
if test "$echo_cflags" = "yes"; then
|
||||
echo -I$includedir
|
||||
fi
|
||||
|
||||
if test "$echo_libs" = "yes"; then
|
||||
libdirs="-Wl,-rpath-link,$libdir -L$libdir"
|
||||
if test -n "$lib_nssutil"; then
|
||||
libdirs="$libdirs -lnssutil${major_version}"
|
||||
fi
|
||||
echo $libdirs
|
||||
fi
|
||||
|
11
SOURCES/nss-util.pc.in
Normal file
11
SOURCES/nss-util.pc.in
Normal file
@ -0,0 +1,11 @@
|
||||
prefix=%prefix%
|
||||
exec_prefix=%exec_prefix%
|
||||
libdir=%libdir%
|
||||
includedir=%includedir%
|
||||
|
||||
Name: NSS-UTIL
|
||||
Description: Network Security Services Utility Library
|
||||
Version: %NSSUTIL_VERSION%
|
||||
Requires: nspr >= %NSPR_VERSION%
|
||||
Libs: -L${libdir} -lnssutil3
|
||||
Cflags: -I${includedir}
|
11
SOURCES/nss.pc.in
Normal file
11
SOURCES/nss.pc.in
Normal file
@ -0,0 +1,11 @@
|
||||
prefix=%prefix%
|
||||
exec_prefix=%exec_prefix%
|
||||
libdir=%libdir%
|
||||
includedir=%includedir%
|
||||
|
||||
Name: NSS
|
||||
Description: Network Security Services
|
||||
Version: %NSS_VERSION%
|
||||
Requires: nspr >= %NSPR_VERSION%, nss-util >= %NSSUTIL_VERSION%
|
||||
Libs: -L${libdir} -lssl3 -lsmime3 -lnss3
|
||||
Cflags: -I${includedir}
|
56
SOURCES/pkcs11.txt.xml
Normal file
56
SOURCES/pkcs11.txt.xml
Normal file
@ -0,0 +1,56 @@
|
||||
<?xml version='1.0' encoding='UTF-8'?>
|
||||
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.2//EN"
|
||||
"http://www.oasis-open.org/docbook/xml/4.2/docbookx.dtd" [
|
||||
<!ENTITY date SYSTEM "date.xml">
|
||||
<!ENTITY version SYSTEM "version.xml">
|
||||
]>
|
||||
|
||||
<refentry id="pkcs11.txt">
|
||||
|
||||
<refentryinfo>
|
||||
<date>&date;</date>
|
||||
<title>Network Security Services</title>
|
||||
<productname>nss</productname>
|
||||
<productnumber>&version;</productnumber>
|
||||
</refentryinfo>
|
||||
|
||||
<refmeta>
|
||||
<refentrytitle>pkcs11.txt</refentrytitle>
|
||||
<manvolnum>5</manvolnum>
|
||||
</refmeta>
|
||||
|
||||
<refnamediv>
|
||||
<refname>pkcs11.txt</refname>
|
||||
<refpurpose>NSS PKCS #11 module configuration file</refpurpose>
|
||||
</refnamediv>
|
||||
|
||||
<refsection id="description">
|
||||
<title>Description</title>
|
||||
<para>
|
||||
The pkcs11.txt file is used to configure initialization parameters for the nss security module and optionally other pkcs #11 modules.
|
||||
</para>
|
||||
<para>
|
||||
For full documentation visit <ulink url="https://developer.mozilla.org/en-US/docs/PKCS11_Module_Specs">PKCS #11 Module Specs</ulink>.
|
||||
</para>
|
||||
</refsection>
|
||||
|
||||
<refsection>
|
||||
<title>Files</title>
|
||||
<para><filename>/etc/pki/nssdb/pkcs11.txt</filename></para>
|
||||
</refsection>
|
||||
|
||||
<refsection id="authors">
|
||||
<title>Authors</title>
|
||||
<para>The nss libraries were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google.</para>
|
||||
<para>Authors: Elio Maldonado <emaldona@redhat.com>.</para>
|
||||
</refsection>
|
||||
|
||||
<!-- don't change -->
|
||||
<refsection id="license">
|
||||
<title>LICENSE</title>
|
||||
<para>Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/.
|
||||
</para>
|
||||
</refsection>
|
||||
|
||||
</refentry>
|
||||
|
14
SOURCES/rhbz1185708-enable-ecc-3des-ciphers-by-default.patch
Normal file
14
SOURCES/rhbz1185708-enable-ecc-3des-ciphers-by-default.patch
Normal file
@ -0,0 +1,14 @@
|
||||
diff -up nss/lib/ssl/ssl3con.c.1185708_3des nss/lib/ssl/ssl3con.c
|
||||
--- nss/lib/ssl/ssl3con.c.1185708_3des 2018-12-11 18:28:06.736592552 +0100
|
||||
+++ nss/lib/ssl/ssl3con.c 2018-12-11 18:29:06.273314692 +0100
|
||||
@@ -106,8 +106,8 @@ static ssl3CipherSuiteCfg cipherSuites[s
|
||||
{ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, SSL_ALLOWED, PR_TRUE, PR_FALSE},
|
||||
{ TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, SSL_ALLOWED, PR_FALSE, PR_FALSE},
|
||||
{ TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, SSL_ALLOWED, PR_FALSE, PR_FALSE},
|
||||
- { TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_ALLOWED, PR_FALSE, PR_FALSE},
|
||||
- { TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_ALLOWED, PR_FALSE, PR_FALSE},
|
||||
+ { TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, SSL_ALLOWED, PR_TRUE, PR_FALSE},
|
||||
+ { TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_ALLOWED, PR_TRUE, PR_FALSE},
|
||||
{ TLS_ECDHE_ECDSA_WITH_RC4_128_SHA, SSL_ALLOWED, PR_FALSE, PR_FALSE},
|
||||
{ TLS_ECDHE_RSA_WITH_RC4_128_SHA, SSL_ALLOWED, PR_FALSE, PR_FALSE},
|
||||
|
68
SOURCES/setup-nsssysinit.sh
Executable file
68
SOURCES/setup-nsssysinit.sh
Executable file
@ -0,0 +1,68 @@
|
||||
#!/bin/sh
|
||||
#
|
||||
# Turns on or off the nss-sysinit module db by editing the
|
||||
# global PKCS #11 congiguration file. Displays the status.
|
||||
#
|
||||
# This script can be invoked by the user as super user.
|
||||
# It is invoked at nss-sysinit post install time with argument on.
|
||||
#
|
||||
usage()
|
||||
{
|
||||
cat <<EOF
|
||||
Usage: setup-nsssysinit [on|off]
|
||||
on - turns on nsssysinit
|
||||
off - turns off nsssysinit
|
||||
status - reports whether nsssysinit is turned on or off
|
||||
EOF
|
||||
exit $1
|
||||
}
|
||||
|
||||
# validate
|
||||
if [ $# -eq 0 ]; then
|
||||
usage 1 1>&2
|
||||
fi
|
||||
|
||||
# the system-wide configuration file
|
||||
p11conf="/etc/pki/nssdb/pkcs11.txt"
|
||||
# must exist, otherwise report it and exit with failure
|
||||
if [ ! -f $p11conf ]; then
|
||||
echo "Could not find ${p11conf}"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# check if nsssysinit is currently enabled or disabled
|
||||
sysinit_enabled()
|
||||
{
|
||||
grep -q '^library=libnsssysinit' ${p11conf}
|
||||
}
|
||||
|
||||
umask 022
|
||||
case "$1" in
|
||||
on | ON )
|
||||
if sysinit_enabled; then
|
||||
exit 0
|
||||
fi
|
||||
cat ${p11conf} | \
|
||||
sed -e 's/^library=$/library=libnsssysinit.so/' \
|
||||
-e '/^NSS/s/\(Flags=internal\)\(,[^m]\)/\1,moduleDBOnly\2/' > \
|
||||
${p11conf}.on
|
||||
mv ${p11conf}.on ${p11conf}
|
||||
;;
|
||||
off | OFF )
|
||||
if ! sysinit_enabled; then
|
||||
exit 0
|
||||
fi
|
||||
cat ${p11conf} | \
|
||||
sed -e 's/^library=libnsssysinit.so/library=/' \
|
||||
-e '/^NSS/s/Flags=internal,moduleDBOnly/Flags=internal/' > \
|
||||
${p11conf}.off
|
||||
mv ${p11conf}.off ${p11conf}
|
||||
;;
|
||||
status )
|
||||
echo -n 'NSS sysinit is '
|
||||
sysinit_enabled && echo 'enabled' || echo 'disabled'
|
||||
;;
|
||||
* )
|
||||
usage 1 1>&2
|
||||
;;
|
||||
esac
|
5
SOURCES/system-pkcs11.txt
Normal file
5
SOURCES/system-pkcs11.txt
Normal file
@ -0,0 +1,5 @@
|
||||
library=libnsssysinit.so
|
||||
name=NSS Internal PKCS #11 Module
|
||||
parameters=configdir='sql:/etc/pki/nssdb' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription=''
|
||||
NSS=Flags=internal,moduleDBOnly,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30})
|
||||
|
2287
SPECS/nss.spec
Normal file
2287
SPECS/nss.spec
Normal file
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue
Block a user