/* ***** BEGIN LICENSE BLOCK ***** * Version: MPL 1.1/GPL 2.0/LGPL 2.1 * * The contents of this file are subject to the Mozilla Public License Version * 1.1 (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * http://www.mozilla.org/MPL/ * * Software distributed under the License is distributed on an "AS IS" basis, * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License * for the specific language governing rights and limitations under the * License. * * The Original Code is the Netscape security libraries. * * The Initial Developer of the Original Code is * Netscape Communications Corporation. * Portions created by the Initial Developer are Copyright (C) 1994-2000 * the Initial Developer. All Rights Reserved. * * Contributor(s): * * Alternatively, the contents of this file may be used under the terms of * either the GNU General Public License Version 2 or later (the "GPL"), or * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"), * in which case the provisions of the GPL or the LGPL are applicable instead * of those above. If you wish to allow use of your version of this file only * under the terms of either the GPL or the LGPL, and not to allow others to * use your version of this file under the terms of the MPL, indicate your * decision by deleting the provisions above and replace them with the notice * and other provisions required by the GPL or the LGPL. If you do not delete * the provisions above, a recipient may use your version of this file under * the terms of any one of the MPL, the GPL or the LGPL. * * ***** END LICENSE BLOCK ***** */ /* ** ** Sample client side test program that uses SSL and NSS ** */ #include "secutil.h" #if defined(XP_UNIX) #include #else #include "ctype.h" /* for isalpha() */ #endif #include #include #include #include #include #include #include "nspr.h" #include "prio.h" #include "prnetdb.h" #include "nss.h" #include "pk11func.h" #include "plgetopt.h" void Usage(char *progName) { fprintf(stderr,"usage: %s [-d profiledir] -t tokenName [-r]\n", progName); exit(1); } int main(int argc, char **argv) { char * certDir = NULL; PLOptState *optstate; PLOptStatus optstatus; SECStatus rv; char * tokenName = NULL; PRBool cont=PR_TRUE; PK11TokenEvent event = PK11TokenPresentEvent; PK11TokenStatus status; char *progName; PK11SlotInfo *slot; progName = strrchr(argv[0], '/'); if (!progName) progName = strrchr(argv[0], '\\'); progName = progName ? progName+1 : argv[0]; optstate = PL_CreateOptState(argc, argv, "rd:t:"); while ((optstatus = PL_GetNextOpt(optstate)) == PL_OPT_OK) { switch (optstate->option) { case 'd': certDir = strdup(optstate->value); certDir = SECU_ConfigDirectory(certDir); break; case 't': tokenName = strdup(optstate->value); break; case 'r': event = PK11TokenRemovedOrChangedEvent; break; } } if (optstatus == PL_OPT_BAD) Usage(progName); if (tokenName == NULL) { Usage(progName); } if (!certDir) { certDir = SECU_DefaultSSLDir(); /* Look in $SSL_DIR */ certDir = SECU_ConfigDirectory(certDir); /* call even if it's NULL */ } PR_Init( PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1); PK11_SetPasswordFunc(SECU_GetModulePassword); /* open the cert DB, the key DB, and the secmod DB. */ rv = NSS_Init(certDir); if (rv != SECSuccess) { SECU_PrintError(progName, "unable to open cert database"); return 1; } printf("Looking up tokenNamed: <%s>\n",tokenName); slot = PK11_FindSlotByName(tokenName); if (slot == NULL) { SECU_PrintError(progName, "unable to find token"); return 1; } do { status = PK11_WaitForTokenEvent(slot,event,PR_INTERVAL_NO_TIMEOUT, 0, 0); switch (status) { case PK11TokenNotRemovable: cont = PR_FALSE; printf("%s Token Not Removable\n",tokenName); break; case PK11TokenChanged: event = PK11TokenRemovedOrChangedEvent; printf("%s Token Changed\n", tokenName); break; case PK11TokenRemoved: event = PK11TokenPresentEvent; printf("%s Token Removed\n", tokenName); break; case PK11TokenPresent: event = PK11TokenRemovedOrChangedEvent; printf("%s Token Present\n", tokenName); break; } } while (cont); PK11_FreeSlot(slot); if (NSS_Shutdown() != SECSuccess) { exit(1); } PR_Cleanup(); return 0; }