summaryrefslogtreecommitdiffstats
path: root/security/manager/ssl/nsNSSModule.cpp
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-19 00:47:55 +0000
commit26a029d407be480d791972afb5975cf62c9360a6 (patch)
treef435a8308119effd964b339f76abb83a57c29483 /security/manager/ssl/nsNSSModule.cpp
parentInitial commit. (diff)
downloadfirefox-26a029d407be480d791972afb5975cf62c9360a6.tar.xz
firefox-26a029d407be480d791972afb5975cf62c9360a6.zip
Adding upstream version 124.0.1.upstream/124.0.1
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/manager/ssl/nsNSSModule.cpp')
-rw-r--r--security/manager/ssl/nsNSSModule.cpp107
1 files changed, 107 insertions, 0 deletions
diff --git a/security/manager/ssl/nsNSSModule.cpp b/security/manager/ssl/nsNSSModule.cpp
new file mode 100644
index 0000000000..ec62d25fc7
--- /dev/null
+++ b/security/manager/ssl/nsNSSModule.cpp
@@ -0,0 +1,107 @@
+/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*-
+ *
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "nsNSSModule.h"
+
+#include "ContentSignatureVerifier.h"
+#include "OSKeyStore.h"
+#include "OSReauthenticator.h"
+#include "PKCS11ModuleDB.h"
+#include "SecretDecoderRing.h"
+#include "mozilla/MacroArgs.h"
+#include "mozilla/ModuleUtils.h"
+#include "mozilla/SyncRunnable.h"
+#include "nsCertTree.h"
+#include "nsNSSCertificateDB.h"
+#include "nsPK11TokenDB.h"
+#include "nsRandomGenerator.h"
+#include "nsXULAppAPI.h"
+
+namespace mozilla {
+namespace psm {
+
+// Many of the implementations in this module call NSS functions and as a result
+// require that PSM has successfully initialized NSS before being used.
+// Additionally, some of the implementations have various restrictions on which
+// process and threads they can be used on (e.g. some can only be used in the
+// parent process and some must be initialized only on the main thread).
+// The following initialization framework allows these requirements to be
+// succinctly expressed and implemented.
+
+template <class InstanceClass, nsresult (InstanceClass::*InitMethod)()>
+MOZ_ALWAYS_INLINE static nsresult Instantiate(REFNSIID aIID, void** aResult) {
+ InstanceClass* inst = new InstanceClass();
+ NS_ADDREF(inst);
+ nsresult rv = InitMethod != nullptr ? (inst->*InitMethod)() : NS_OK;
+ if (NS_SUCCEEDED(rv)) {
+ rv = inst->QueryInterface(aIID, aResult);
+ }
+ NS_RELEASE(inst);
+ return rv;
+}
+
+enum class ThreadRestriction {
+ // must be initialized on the main thread (but can be used on any thread)
+ MainThreadOnly,
+ // can be initialized and used on any thread
+ AnyThread,
+};
+
+enum class ProcessRestriction {
+ ParentProcessOnly,
+ AnyProcess,
+};
+
+template <class InstanceClass,
+ nsresult (InstanceClass::*InitMethod)() = nullptr,
+ ProcessRestriction processRestriction =
+ ProcessRestriction::ParentProcessOnly,
+ ThreadRestriction threadRestriction = ThreadRestriction::AnyThread>
+static nsresult Constructor(REFNSIID aIID, void** aResult) {
+ *aResult = nullptr;
+
+ if (processRestriction == ProcessRestriction::ParentProcessOnly &&
+ !XRE_IsParentProcess()) {
+ return NS_ERROR_NOT_AVAILABLE;
+ }
+
+ if (!EnsureNSSInitializedChromeOrContent()) {
+ return NS_ERROR_FAILURE;
+ }
+
+ if (threadRestriction == ThreadRestriction::MainThreadOnly &&
+ !NS_IsMainThread()) {
+ return NS_ERROR_NOT_SAME_THREAD;
+ }
+
+ return Instantiate<InstanceClass, InitMethod>(aIID, aResult);
+}
+
+#define IMPL(type, ...) \
+ template <> \
+ nsresult NSSConstructor<type>(const nsIID& aIID, void** aResult) { \
+ return Constructor<type, __VA_ARGS__>(aIID, aResult); \
+ }
+
+// Components that require main thread initialization could cause a deadlock
+// in necko code (bug 1418752). To prevent it we initialize all such components
+// on main thread in advance in net_EnsurePSMInit(). Update that function when
+// new component with ThreadRestriction::MainThreadOnly is added.
+IMPL(SecretDecoderRing, nullptr)
+IMPL(nsPK11TokenDB, nullptr)
+IMPL(PKCS11ModuleDB, nullptr)
+IMPL(nsNSSCertificateDB, nullptr)
+IMPL(nsCertTree, nullptr)
+IMPL(ContentSignatureVerifier, nullptr)
+IMPL(nsRandomGenerator, nullptr, ProcessRestriction::AnyProcess)
+IMPL(OSKeyStore, nullptr, ProcessRestriction::ParentProcessOnly,
+ ThreadRestriction::MainThreadOnly)
+IMPL(OSReauthenticator, nullptr, ProcessRestriction::ParentProcessOnly,
+ ThreadRestriction::MainThreadOnly)
+#undef IMPL
+
+} // namespace psm
+} // namespace mozilla