pjs/security/nss/lib/fortcrypt/macinst.htm

149 строки
5.8 KiB
HTML

<HTML>
<--
- The contents of this file are subject to the Mozilla Public
- License Version 1.1 (the "License"); you may not use this file
- except in compliance with the License. You may obtain a copy of
- the License at http://www.mozilla.org/MPL/
-
- Software distributed under the License is distributed on an "AS
- IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
- implied. See the License for the specific language governing
- rights and limitations under the License.
-
- The Original Code is the Netscape security libraries.
-
- The Initial Developer of the Original Code is Netscape
- Communications Corporation. Portions created by Netscape are
- Copyright (C) 1994-2000 Netscape Communications Corporation. All
- Rights Reserved.
-
- Contributor(s):
-
- Alternatively, the contents of this file may be used under the
- terms of the GNU General Public License Version 2 or later (the
- "GPL"), in which case the provisions of the GPL are applicable
- instead of those above. If you wish to allow use of your
- version of this file only under the terms of the GPL and not to
- allow others to use your version of this file under the MPL,
- indicate your decision by deleting the provisions above and
- replace them with the notice and other provisions required by
- the GPL. If you do not delete the provisions above, a recipient
- may use your version of this file under either the MPL or the
- GPL.
-->
<TITLE>MAC Installer</TITLE>
<SCRIPT>
// Crypto Mechanism Flags
PKCS11_MECH_RSA_FLAG = 0x1<<0;
PKCS11_MECH_DSA_FLAG = 0x1<<1;
PKCS11_MECH_RC2_FLAG = 0x1<<2;
PKCS11_MECH_RC4_FLAG = 0x1<<3;
PKCS11_MECH_DES_FLAG = 0x1<<4;
PKCS11_MECH_DH_FLAG = 0x1<<5; //Diffie-Hellman
PKCS11_MECH_SKIPJACK_FLAG = 0x1<<6; //SKIPJACK algorithm as in Fortezza cards
PKCS11_MECH_RC5_FLAG = 0x1<<7;
PKCS11_MECH_SHA1_FLAG = 0x1<<8;
PKCS11_MECH_MD5_FLAG = 0x1<<9;
PKCS11_MECH_MD2_FLAG = 0x1<<10;
PKCS11_MECH_RANDOM_FLAG = 0x1<<27; //Random number generator
PKCS11_PUB_READABLE_CERT_FLAG = 0x1<<28; //Stored certs can be read off the token w/o logging in
PKCS11_DISABLE_FLAG = 0x1<<30; //tell Navigator to disable this slot by default
// Important:
// 0x1<<11, 0x1<<12, ... , 0x1<<26, 0x1<<29, and 0x1<<31 are reserved
// for internal use in Navigator.
// Therefore, these bits should always be set to 0; otherwise,
// Navigator might exhibit unpredictable behavior.
// These flags indicate which mechanisms should be turned on by
pkcs11MechanismFlags = PKCS11_MECH_RANDOM_FLAG;
// Ciphers that support SSL or S/MIME
PKCS11_CIPHER_FORTEZZA_FLAG = 0x1<<0;
// Important:
// 0x1<<1, 0x1<<2, ... , 0x1<<31 are reserved
// for internal use in Navigator.
// Therefore, these bits should ALWAYS be set to 0; otherwise,
// Navigator might exhibit unpredictable behavior.
// These flags indicate which SSL ciphers are supported
pkcs11CipherFlags = PKCS11_CIPHER_FORTEZZA_FLAG;
// Return values of pkcs11.addmodule() & pkcs11.delmodule()
// success codes
JS_OK_ADD_MODULE = 3 // Successfully added a module
JS_OK_DEL_EXTERNAL_MODULE = 2 // Successfully deleted ext. module
JS_OK_DEL_INTERNAL_MODULE = 1 // Successfully deleted int. module
// failure codes
JS_ERR_OTHER = -1 // Other errors than the followings
JS_ERR_USER_CANCEL_ACTION = -2 // User abort an action
JS_ERR_INCORRECT_NUM_OF_ARGUMENTS= -3 // Calling a method w/ incorrect # of arguments
JS_ERR_DEL_MODULE = -4 // Error deleting a module
JS_ERR_ADD_MODULE = -5 // Error adding a module
JS_ERR_BAD_MODULE_NAME = -6 // The module name is invalid
JS_ERR_BAD_DLL_NAME = -7 // The DLL name is bad
JS_ERR_BAD_MECHANISM_FLAGS = -8 // The mechanism flags are invalid
JS_ERR_BAD_CIPHER_ENABLE_FLAGS = -9 // The SSL, S/MIME cipher flags are invalid
var new_window;
var has_new_window = 0;
function colonize(string) {
len = string.length;
end = len -1;
if (len == 0) return string;
for (i=0; i < len; i++) {
if (string.charAt(i) == "/") {
if (i == 0) {
new_string = ":" + string.substring(1,len);
} else if (i == end) {
new_string = string.substring(0,i)+':';
} else {
new_string = string.substring(0,i)+':'+
string.substring(i+1,len);
}
string = new_string;
}
}
if (string.charAt(0) == ":") string = string.substring(1,len);
return string;
}
function DoInstall(module) {
module = colonize(module);
result = pkcs11.addmodule("Netscape FORTEZZA Module", module, pkcs11MechanismFlags, pkcs11CipherFlags);
if ( result < 0) {
window.alert("New module setup failed. Error code: " + result);
}
if (has_new_window) new_window.close();
}
function DoUnpack(name) {
new_window = open(name,"unpacking","toolbar=no,location=no,status=yes,scrollbar=no,width=50,height=50");
has_new_window = 1;
}
filename=navigator.platform+".hqx"
default_module = "D:/dogbert/ns/dist/WIN32_D.OBJ/bin/fort32.dll"
document.writeln("<FORM name=instform target=_self> <H2>Mac Fortezza Installer</H2>");
document.writeln("<I>You must first unpack the <b>"+filename+"</b> file.");
document.writeln(" Do that by clicking on button below.</i><p>");
document.writeln("<Input type=button value=Unpack name=unpack onclick=DoUnpack(\""+filename+"\"); ><p>");
document.writeln("<I>Then move <b>FortPK11Lib</b> to an appropriate directory ");
document.writeln(" enter that directory below, then click the Install button.</i><p>");
document.writeln(" Module Name: <Input Type=FILE Name=module><p>");
document.write("<Input type=submit Name=Install Value=Install onclick=DoInstall(");
document.writeln( "document.instform.module.value) >");
document.writeln("</FORM>");
</SCRIPT>