gecko-dev/security/nss/lib/fortcrypt/inst_PPC.js
2000-03-31 20:13:40 +00:00

135 lines
6.0 KiB
JavaScript

//
// The contents of this file are subject to the Mozilla Public
// License Version 1.1 (the "License"); you may not use this file
// except in compliance with the License. You may obtain a copy of
// the License at http://www.mozilla.org/MPL/
//
// Software distributed under the License is distributed on an "AS
// IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
// implied. See the License for the specific language governing
// rights and limitations under the License.
//
// The Original Code is the Netscape security libraries.
//
// The Initial Developer of the Original Code is Netscape
// Communications Corporation. Portions created by Netscape are
// Copyright (C) 1994-2000 Netscape Communications Corporation. All
// Rights Reserved.
//
// Contributor(s):
//
// Alternatively, the contents of this file may be used under the
// terms of the GNU General Public License Version 2 or later (the
// "GPL"), in which case the provisions of the GPL are applicable
// instead of those above. If you wish to allow use of your
// version of this file only under the terms of the GPL and not to
// allow others to use your version of this file under the MPL,
// indicate your decision by deleting the provisions above and
// replace them with the notice and other provisions required by
// the GPL. If you do not delete the provisions above, a recipient
// may use your version of this file under either the MPL or the
// GPL.
//
// Crypto Mechanism Flags
PKCS11_MECH_RSA_FLAG = 0x1<<0;
PKCS11_MECH_DSA_FLAG = 0x1<<1;
PKCS11_MECH_RC2_FLAG = 0x1<<2;
PKCS11_MECH_RC4_FLAG = 0x1<<3;
PKCS11_MECH_DES_FLAG = 0x1<<4;
PKCS11_MECH_DH_FLAG = 0x1<<5; //Diffie-Hellman
PKCS11_MECH_SKIPJACK_FLAG = 0x1<<6; //SKIPJACK algorithm as in Fortezza cards
PKCS11_MECH_RC5_FLAG = 0x1<<7;
PKCS11_MECH_SHA1_FLAG = 0x1<<8;
PKCS11_MECH_MD5_FLAG = 0x1<<9;
PKCS11_MECH_MD2_FLAG = 0x1<<10;
PKCS11_MECH_RANDOM_FLAG = 0x1<<27; //Random number generator
PKCS11_PUB_READABLE_CERT_FLAG = 0x1<<28; //Stored certs can be read off the token w/o logging in
PKCS11_DISABLE_FLAG = 0x1<<30; //tell Navigator to disable this slot by default
// Important:
// 0x1<<11, 0x1<<12, ... , 0x1<<26, 0x1<<29, and 0x1<<31 are reserved
// for internal use in Navigator.
// Therefore, these bits should always be set to 0; otherwise,
// Navigator might exhibit unpredictable behavior.
// These flags indicate which mechanisms should be turned on by
pkcs11MechanismFlags = PKCS11_MECH_RANDOM_FLAG;
// Ciphers that support SSL or S/MIME
PKCS11_CIPHER_FORTEZZA_FLAG = 0x1<<0;
// Important:
// 0x1<<1, 0x1<<2, ... , 0x1<<31 are reserved
// for internal use in Navigator.
// Therefore, these bits should ALWAYS be set to 0; otherwise,
// Navigator might exhibit unpredictable behavior.
// These flags indicate which SSL ciphers are supported
pkcs11CipherFlags = PKCS11_CIPHER_FORTEZZA_FLAG;
// Return values of pkcs11.addmodule() & pkcs11.delmodule()
// success codes
JS_OK_ADD_MODULE = 3 // Successfully added a module
JS_OK_DEL_EXTERNAL_MODULE = 2 // Successfully deleted ext. module
JS_OK_DEL_INTERNAL_MODULE = 1 // Successfully deleted int. module
// failure codes
JS_ERR_OTHER = -1 // Other errors than the followings
JS_ERR_USER_CANCEL_ACTION = -2 // User abort an action
JS_ERR_INCORRECT_NUM_OF_ARGUMENTS= -3 // Calling a method w/ incorrect # of arguments
JS_ERR_DEL_MODULE = -4 // Error deleting a module
JS_ERR_ADD_MODULE = -5 // Error adding a module
JS_ERR_BAD_MODULE_NAME = -6 // The module name is invalid
JS_ERR_BAD_DLL_NAME = -7 // The DLL name is bad
JS_ERR_BAD_MECHANISM_FLAGS = -8 // The mechanism flags are invalid
JS_ERR_BAD_CIPHER_ENABLE_FLAGS = -9 // The SSL, S/MIME cipher flags are invalid
if (confirm("This script will install and configure a security module, do you want to continue?")) {
// Step 1. Create a version object and a software update object
vi = new netscape.softupdate.VersionInfo(1, 6, 0, 0);
su = new netscape.softupdate.SoftwareUpdate(this, "Fortezza Card PKCS#11 Module");
// "Fortezza ... Module" is the logical name of the bundle
// Step 2. Start the install process
bAbort = false;
err = su.StartInstall("NSfortezza", vi, netscape.softupdate.SoftwareUpdate.FULL_INSTALL);
// nsfortezza is the component folder (logical)
bAbort = bAbort || (err !=0);
if (err == 0) {
// Step 3. Find out the physical location of the Program dir
Folder = su.GetFolder("Program");
// Step 4. Install the files. Unpack them and list where they go
err = su.AddSubcomponent("FortezzaCardDLL", //component name (logical)
vi, // version info
"FortPK11Lib", // source file in JAR (physical)
Folder, // target folder (physical)
"FortPK11Lib", // target path & filename (physical)
this.force); // forces update
bAbort = bAbort || (err !=0);
}
// Step 5. Unless there was a problem, move files to final location
// and update the Client Version Registry
if (bAbort) {
window.alert("Installation Aborted");
su.AbortInstall();
} else {
err = su.FinalizeInstall();
window.alert("Files have been installed.\nContinue to setup the newly isntalled module...");
// Add Module
compFolder = su.GetComponentFolder("NSfortezza/FortezzaCardDLL") + "/FortPK11Lib";
result = pkcs11.addmodule("Netscape FORTEZZA Module", compFolder, pkcs11MechanismFlags, pkcs11CipherFlags);
if ( result < 0) {
window.alert("New module setup failed. Error code: " + result);
} else {
window.alert("New module setup completed.");
}
}
}