summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsNSSModule.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 14:29:10 +0000
commit2aa4a82499d4becd2284cdb482213d541b8804dd (patch)
treeb80bf8bf13c3766139fbacc530efd0dd9d54394c /security/manager/ssl/nsNSSModule.cpp
parentInitial commit. (diff)
downloadfirefox-2aa4a82499d4becd2284cdb482213d541b8804dd.tar.xz
firefox-2aa4a82499d4becd2284cdb482213d541b8804dd.zip
Adding upstream version 86.0.1.upstream/86.0.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/manager/ssl/nsNSSModule.cpp')
-rw-r--r--security/manager/ssl/nsNSSModule.cpp134
1 files changed, 134 insertions, 0 deletions
diff --git a/security/manager/ssl/nsNSSModule.cpp b/security/manager/ssl/nsNSSModule.cpp
new file mode 100644
index 0000000000..2fa628ad58
--- /dev/null
+++ b/security/manager/ssl/nsNSSModule.cpp
@@ -0,0 +1,134 @@
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
+ *
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsNSSModule.h"
+
+#include "ContentSignatureVerifier.h"
+#include "NSSErrorsService.h"
+#include "OSKeyStore.h"
+#include "OSReauthenticator.h"
+#include "PKCS11ModuleDB.h"
+#include "SecretDecoderRing.h"
+#include "TransportSecurityInfo.h"
+#include "mozilla/MacroArgs.h"
+#include "mozilla/ModuleUtils.h"
+#include "mozilla/SyncRunnable.h"
+#include "nsCURILoader.h"
+#include "nsCryptoHash.h"
+#include "nsKeyModule.h"
+#include "nsNSSCertificate.h"
+#include "nsNSSCertificateDB.h"
+#include "nsNSSComponent.h"
+#include "nsNSSVersion.h"
+#include "nsNetCID.h"
+#include "nsPK11TokenDB.h"
+#include "nsPKCS11Slot.h"
+#include "nsRandomGenerator.h"
+#include "nsSecureBrowserUI.h"
+#include "nsXULAppAPI.h"
+
+#ifdef MOZ_XUL
+# include "nsCertTree.h"
+#endif
+
+namespace mozilla {
+namespace psm {
+
+// Many of the implementations in this module call NSS functions and as a result
+// require that PSM has successfully initialized NSS before being used.
+// Additionally, some of the implementations have various restrictions on which
+// process and threads they can be used on (e.g. some can only be used in the
+// parent process and some must be initialized only on the main thread).
+// The following initialization framework allows these requirements to be
+// succinctly expressed and implemented.
+
+template <class InstanceClass, nsresult (InstanceClass::*InitMethod)()>
+MOZ_ALWAYS_INLINE static nsresult Instantiate(REFNSIID aIID, void** aResult) {
+ InstanceClass* inst = new InstanceClass();
+ NS_ADDREF(inst);
+ nsresult rv = InitMethod != nullptr ? (inst->*InitMethod)() : NS_OK;
+ if (NS_SUCCEEDED(rv)) {
+ rv = inst->QueryInterface(aIID, aResult);
+ }
+ NS_RELEASE(inst);
+ return rv;
+}
+
+enum class ThreadRestriction {
+ // must be initialized on the main thread (but can be used on any thread)
+ MainThreadOnly,
+ // can be initialized and used on any thread
+ AnyThread,
+};
+
+enum class ProcessRestriction {
+ ParentProcessOnly,
+ AnyProcess,
+};
+
+template <class InstanceClass,
+ nsresult (InstanceClass::*InitMethod)() = nullptr,
+ ProcessRestriction processRestriction =
+ ProcessRestriction::ParentProcessOnly,
+ ThreadRestriction threadRestriction = ThreadRestriction::AnyThread>
+static nsresult Constructor(nsISupports* aOuter, REFNSIID aIID,
+ void** aResult) {
+ *aResult = nullptr;
+ if (aOuter != nullptr) {
+ return NS_ERROR_NO_AGGREGATION;
+ }
+
+ if (processRestriction == ProcessRestriction::ParentProcessOnly &&
+ !XRE_IsParentProcess()) {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ if (!EnsureNSSInitializedChromeOrContent()) {
+ return NS_ERROR_FAILURE;
+ }
+
+ if (threadRestriction == ThreadRestriction::MainThreadOnly &&
+ !NS_IsMainThread()) {
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ return Instantiate<InstanceClass, InitMethod>(aIID, aResult);
+}
+
+#define IMPL(type, ...) \
+ template <> \
+ nsresult NSSConstructor<type>(nsISupports * aOuter, const nsIID& aIID, \
+ void** aResult) { \
+ return Constructor<type, __VA_ARGS__>(aOuter, aIID, aResult); \
+ }
+
+// Components that require main thread initialization could cause a deadlock
+// in necko code (bug 1418752). To prevent it we initialize all such components
+// on main thread in advance in net_EnsurePSMInit(). Update that function when
+// new component with ThreadRestriction::MainThreadOnly is added.
+IMPL(SecretDecoderRing, nullptr)
+IMPL(nsPK11TokenDB, nullptr)
+IMPL(PKCS11ModuleDB, nullptr)
+IMPL(nsNSSCertificate, nullptr, ProcessRestriction::AnyProcess)
+IMPL(nsNSSCertificateDB, nullptr)
+#ifdef MOZ_XUL
+IMPL(nsCertTree, nullptr)
+#endif
+IMPL(nsCryptoHash, nullptr, ProcessRestriction::AnyProcess)
+IMPL(nsCryptoHMAC, nullptr, ProcessRestriction::AnyProcess)
+IMPL(nsKeyObject, nullptr, ProcessRestriction::AnyProcess)
+IMPL(nsKeyObjectFactory, nullptr, ProcessRestriction::AnyProcess)
+IMPL(ContentSignatureVerifier, nullptr)
+IMPL(nsRandomGenerator, nullptr, ProcessRestriction::AnyProcess)
+IMPL(TransportSecurityInfo, nullptr, ProcessRestriction::AnyProcess)
+IMPL(OSKeyStore, nullptr, ProcessRestriction::ParentProcessOnly,
+ ThreadRestriction::MainThreadOnly)
+IMPL(OSReauthenticator, nullptr, ProcessRestriction::ParentProcessOnly,
+ ThreadRestriction::MainThreadOnly)
+#undef IMPL
+
+} // namespace psm
+} // namespace mozilla