gecko/security/nss/cmd/tests/remtest.c
2008-08-15 06:12:54 +02:00

168 lines
4.5 KiB
C

/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is the Netscape security libraries.
*
* The Initial Developer of the Original Code is
* Netscape Communications Corporation.
* Portions created by the Initial Developer are Copyright (C) 1994-2000
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
/*
**
** Sample client side test program that uses SSL and NSS
**
*/
#include "secutil.h"
#if defined(XP_UNIX)
#include <unistd.h>
#else
#include "ctype.h" /* for isalpha() */
#endif
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <stdarg.h>
#include "nspr.h"
#include "prio.h"
#include "prnetdb.h"
#include "nss.h"
#include "pk11func.h"
#include "plgetopt.h"
void
Usage(char *progName)
{
fprintf(stderr,"usage: %s [-d profiledir] -t tokenName [-r]\n", progName);
exit(1);
}
int main(int argc, char **argv)
{
char * certDir = NULL;
PLOptState *optstate;
PLOptStatus optstatus;
SECStatus rv;
char * tokenName = NULL;
PRBool cont=PR_TRUE;
PK11TokenEvent event = PK11TokenPresentEvent;
PK11TokenStatus status;
char *progName;
PK11SlotInfo *slot;
progName = strrchr(argv[0], '/');
if (!progName)
progName = strrchr(argv[0], '\\');
progName = progName ? progName+1 : argv[0];
optstate = PL_CreateOptState(argc, argv, "rd:t:");
while ((optstatus = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
switch (optstate->option) {
case 'd':
certDir = strdup(optstate->value);
certDir = SECU_ConfigDirectory(certDir);
break;
case 't':
tokenName = strdup(optstate->value);
break;
case 'r':
event = PK11TokenRemovedOrChangedEvent;
break;
}
}
if (optstatus == PL_OPT_BAD)
Usage(progName);
if (tokenName == NULL) {
Usage(progName);
}
if (!certDir) {
certDir = SECU_DefaultSSLDir(); /* Look in $SSL_DIR */
certDir = SECU_ConfigDirectory(certDir); /* call even if it's NULL */
}
PR_Init( PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
PK11_SetPasswordFunc(SECU_GetModulePassword);
/* open the cert DB, the key DB, and the secmod DB. */
rv = NSS_Init(certDir);
if (rv != SECSuccess) {
SECU_PrintError(progName, "unable to open cert database");
return 1;
}
printf("Looking up tokenNamed: <%s>\n",tokenName);
slot = PK11_FindSlotByName(tokenName);
if (slot == NULL) {
SECU_PrintError(progName, "unable to find token");
return 1;
}
do {
status =
PK11_WaitForTokenEvent(slot,event,PR_INTERVAL_NO_TIMEOUT, 0, 0);
switch (status) {
case PK11TokenNotRemovable:
cont = PR_FALSE;
printf("%s Token Not Removable\n",tokenName);
break;
case PK11TokenChanged:
event = PK11TokenRemovedOrChangedEvent;
printf("%s Token Changed\n", tokenName);
break;
case PK11TokenRemoved:
event = PK11TokenPresentEvent;
printf("%s Token Removed\n", tokenName);
break;
case PK11TokenPresent:
event = PK11TokenRemovedOrChangedEvent;
printf("%s Token Present\n", tokenName);
break;
}
} while (cont);
PK11_FreeSlot(slot);
if (NSS_Shutdown() != SECSuccess) {
exit(1);
}
PR_Cleanup();
return 0;
}