/* * The contents of this file are subject to the Mozilla Public * License Version 1.1 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or * implied. See the License for the specific language governing * rights and limitations under the License. * * The Original Code is the Netscape security libraries. * * The Initial Developer of the Original Code is Netscape * Communications Corporation. Portions created by Netscape are * Copyright (C) 1994-2000 Netscape Communications Corporation. All * Rights Reserved. * * Contributor(s): * * Alternatively, the contents of this file may be used under the * terms of the GNU General Public License Version 2 or later (the * "GPL"), in which case the provisions of the GPL are applicable * instead of those above. If you wish to allow use of your * version of this file only under the terms of the GPL and not to * allow others to use your version of this file under the MPL, * indicate your decision by deleting the provisions above and * replace them with the notice and other provisions required by * the GPL. If you do not delete the provisions above, a recipient * may use your version of this file under either the MPL or the * GPL. */ #ifndef DEVT_H #define DEVT_H #ifdef DEBUG static const char DEVT_CVS_ID[] = "@(#) $RCSfile: devt.h,v $ $Revision: 1.13 $ $Date: 2002-03-07 23:21:33 $ $Name: not supported by cvs2svn $"; #endif /* DEBUG */ /* * devt.h * * This file contains definitions for the low-level cryptoki devices. */ #ifndef NSSBASET_H #include "nssbaset.h" #endif /* NSSBASET_H */ #ifndef NSSPKIT_H #include "nsspkit.h" #endif /* NSSPKIT_H */ #ifndef NSSDEVT_H #include "nssdevt.h" #endif /* NSSDEVT_H */ #ifndef NSSCKT_H #include "nssckt.h" #endif /* NSSCKT_H */ #ifndef BASET_H #include "baset.h" #endif /* BASET_H */ #ifdef NSS_3_4_CODE #include "secmodt.h" #endif /* NSS_3_4_CODE */ PR_BEGIN_EXTERN_C typedef struct nssSessionStr nssSession; /* The list of boolean flags used to describe properties of a * module. */ #define NSSMODULE_FLAGS_NOT_THREADSAFE 0x0001 /* isThreadSafe */ struct NSSModuleStr { NSSArena *arena; PRInt32 refCount; NSSUTF8 *name; NSSUTF8 *libraryPath; PRLibrary *library; void *epv; NSSSlot **slots; PRUint32 numSlots; PRUint32 flags; }; /* The list of boolean flags used to describe properties of a * slot. */ #define NSSSLOT_FLAGS_LOGIN_REQUIRED 0x0001 /* needLogin */ /*#define NSSSLOT_FLAGS_READONLY 0x0002*/ /* readOnly */ /* this should track global and per-transaction login information */ struct nssSlotAuthInfoStr { PRTime lastLogin; PRInt32 askPasswordTimeout; }; struct NSSSlotStr { NSSArena *arena; PRInt32 refCount; NSSModule *module; /* Parent */ NSSToken *token; /* Child (or peer, if you will) */ NSSUTF8 *name; CK_SLOT_ID slotID; void *epv; CK_FLAGS ckFlags; /* from CK_SLOT_INFO.flags */ PRUint32 flags; struct nssSlotAuthInfoStr authInfo; NSSTrustDomain *trustDomain; #ifdef NSS_3_4_CODE PK11SlotInfo *pk11slot; #endif }; struct NSSTokenStr { NSSArena *arena; PRInt32 refCount; NSSSlot *slot; /* Parent (or peer, if you will) */ NSSUTF8 *name; CK_FLAGS ckFlags; /* from CK_TOKEN_INFO.flags */ PRUint32 flags; void *epv; nssSession *defaultSession; NSSTrustDomain *trustDomain; PRIntervalTime lastTime; PRBool hasNoTrust; PRBool hasNoCrls; #ifdef NSS_3_4_CODE PK11SlotInfo *pk11slot; nssList *certList; /* local cache of certs for slow tokens */ PRBool loggedIn; #endif }; struct nssSessionStr { PZLock *lock; CK_SESSION_HANDLE handle; NSSSlot *slot; PRBool isRW; }; typedef enum { NSSCertificateType_Unknown = 0, NSSCertificateType_PKIX = 1 } NSSCertificateType; #ifdef nodef typedef enum { nssTrustLevel_Unknown = 0, nssTrustLevel_NotTrusted = 1, nssTrustLevel_Trusted = 2, nssTrustLevel_TrustedDelegator = 3, nssTrustLevel_Valid = 4 } nssTrustLevel; #else typedef CK_ULONG nssTrustLevel; /* for now */ #endif typedef struct nssCryptokiInstanceStr nssCryptokiInstance; struct nssCryptokiInstanceStr { CK_OBJECT_HANDLE handle; NSSToken *token; PRBool isTokenObject; NSSUTF8 *label; }; typedef struct nssTokenCertSearchStr nssTokenCertSearch; typedef enum { nssTokenSearchType_AllObjects = 0, nssTokenSearchType_SessionOnly = 1, nssTokenSearchType_TokenOnly = 2 } nssTokenSearchType; struct nssTokenCertSearchStr { nssTokenSearchType searchType; PRStatus (* callback)(NSSCertificate *c, void *arg); void *cbarg; nssList *cached; /* TODO: add a cache query callback if the list would be large * (traversal) */ }; struct NSSAlgorithmAndParametersStr { CK_MECHANISM mechanism; }; PR_END_EXTERN_C #endif /* DEVT_H */