[xmlsec] xmlsec-nss patches from Sun( 2003-07-22 )
Andrew Fan
Andrew.Fan at sun.com
Wed Jul 23 03:14:43 PDT 2003
It is so hard to make you all understand myself because of my poor
English. :-) My poor English skill! Great, you understand me now. :-)
First of all, I'll describe some ideas and the functions in the patch.
1. I hope end user initialize NSS and xmlSec only once in his application;
2. In order to simplify the interface between high level and xmlSec,
crypto related operations( which xmlSec do not care ) should be done on
high level;
3. User has the right and ability to set up the crypto environment for
every signature/encryption operation instead of a common one.
-PK11SlotInfo* xmlSecNssGetSlot( CK_MECHANISM_TYPE type ) ;
This interface is used by xmlSec functions internally, it is
designed to replace "GetBestSlot". It call "GetBestSlot" if no
particular slot list given.
-PK11SlotList* xmlSecNssSetSlotList( PK11SlotList* list ) ;
This interface is used by high level applications. Only the slots in
the list are available.
-PK11SlotList* xmlSecNssGetSlotList( void ) ;
This interface is used by high level applications if it want to
access or maintain the slot list, such as disable an slot, add a new
slot and so on.
-void xmlSecNssFreeSlot( void ) ;
This interface is used by high level applications when no routines
need to get slot.
Above four function name is somesence obscure. With you recommendation,
I prefer to the following ones:
-PK11SlotInfo* xmlSecNssGetSlot( CK_MECHANISM_TYPE type ) ;
-PK11SlotList* xmlSecNssSlotInit( PK11SlotList* list ) ;
-PK11SlotList* xmlSecNssGetSlotList( void ) ;
-void xmlSecNssSlotShutdown( void ) ;
By now, you should have asked several times, "why Pk11SlotList". Some
reason are:
1. NSS provides a set of functions to manage PK11SlotList;
2. User can dynamicly adjust PK11SlotList directly instead of call
xmlSec functions, and which is safe also because xmlSec only get and
reference the slot handler;
3. xmlSec care less just to find the suitable slot from the list.
See inlines, please.
Aleksey Sanin wrote:
> As far as I can understand Andrew's concerns, he wants to make sure
> that particular crypto operation is performed on particular crypto
> device.
> Since nobody (except NSS developers :) ) knows how PK11_GetBestSlot()
> function selects the crypto device (slot) his point is perfectly valid:
>
> Suppose we have slots A and B that both perform RSA encryption.
> How to ensure that we always do it on slot A and not on slot B?
>
> Again, IMHO this should be done on NSS level. I.e. there should be
> an NSS function that would say: if slot A supports RSA encryption then
> always do it on slot A. However, it does not look like NSS guys want
> or can
> do it in NSS level (correct me if I am wrong and there is such a function
> already :) ). Thus Andrew wants to have this in xmlsec-nss and personaly
> I don't have any objections.
> How about this: xmlsec-nss would have following functions:
>
> int xmlSecNssBestSlotInit(void) :
> Initializes whatever is needed.
It is not the best one, it is the suitable one. So I like the name
"xmlSecNssSlotInit". :-P
>
> void xmlSecNssBestSlotShutdown(void) :
> Shuts down whatever is needed.
Agree.
>
> int xmlSecNssBestSlotAdopt(CK_MECHANISM_TYPE alg, PK11SlotInfo*
> slot) :
> Sets "slot" to be used for "alg" (global inside xmlsec).
No. Which result in complex lines because there are so many crypto
mechanism, and which also result in a table that must be maintained
internally by xmlSec, it is in-flexible. This is another reason why use
PK11SlotList.
>
> PK11SlotInfo* xmlSecNssBestSlotGet(CK_MECHANISM_TYPE* alg):
> Returns the slot for "alg" by first looking thru the list of
> slots
> set with xmlSecNssBestSlotSet() function and if matching slot
> is not found then it simply calls NSS PK11_GetBestSlot()
> function
> and hopes for the best.
Agree.
>
> Finally we replace PK11_GetBestSlot() with xmlSecNssBestSlotGet()
> everywhere
> inside xmlsec-nss.
>
> By default if user does nothing (i.e. user does not call
> xmlSecNssBestSlotAdopt
> function) we have xmlSecNssBestSlotGet() function that simply calls
> PK11_GetBestSlot()
> function with a little overhead to check that something is NULL (or
> not NULL).
>
> Andrew's patch does more or less the same thing but it operates with
> PK11SlotList
> which seems less intuitive to me (I might be wrong). As I wrote,
> functions descriptions
> (API docs) would help. Any approach is good for me. In the outlined
> above API
> I would use subclass of xmlSecList to store the slots and algorithms.
> The only
> problem I have is that xmlSecNssBestSlotGet() would need to
> "duplicate" the returned
> slot because code always frees returned slot with PK11_FreeSlot(). I
> am sure it is possible, \
> I just dn't know how to do this. PK11SlotList might do it as well, I
> just don't know enough
> about it.
>
> To Andrew: I missed this when I looked at your patch first time but
> you have to rename
> you functions from xmlSec* to xmlSecNss* (the functions are NSS specific).
I forgot this, so sorry.
> Also having
> an init function (even if it does nothing) is a good idea: you may
> visually check your
> xmlSecNssInit/xmlSecNssShutdown functions to make sure all inits and
> shutdowns
> are done in correct order. Also probably it's worth it to have a
> fallback to PK11_GetBestSlot()
> in the xmlSecNssGetSlot() function even if there is PK11SlotList
> initialized.
I don't think so( fallback to PK11_getBestSlot(): I understand this is
"if no slot in the slot list meet the require( mechanism ), call this
function", right?). If a PK11Slot list specified, it means only those
slot in the list are available, while "GetBestSlot" will search all
active slots; if not slot list initialized, it means user do not care
which slot selected, we can call "GetBestSlot".
> xmlsec
> has other ways to control which algorithms are allowed.
I think xmlSec controls that which algorithms are supported in gerneral.
The above functions controls that in a certain session, which crypto
devices are permitted.
Thanks,
Andrew
>
>
> Aleksey
>
>
>
>
More information about the xmlsec
mailing list