mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
ce2e533bb3
=== r=rrelyea for upgrading to release candidate 1 === reapplying bug 519550 on top === includes PSM makefile tweak to keep TLS disabled (variables changed in the updated NSS snapshot) === change configure.in to require the newer system NSS, r=wtc
274 lines
7.1 KiB
C
274 lines
7.1 KiB
C
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 1994-2000
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
/*
|
|
* p7env -- A command to create a pkcs7 enveloped data.
|
|
*
|
|
* $Id: p7env.c,v 1.10 2010/02/11 02:39:47 wtc%google.com Exp $
|
|
*/
|
|
|
|
#include "nspr.h"
|
|
#include "secutil.h"
|
|
#include "plgetopt.h"
|
|
#include "secpkcs7.h"
|
|
#include "cert.h"
|
|
#include "certdb.h"
|
|
#include "nss.h"
|
|
|
|
#if defined(XP_UNIX)
|
|
#include <unistd.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#if (defined(XP_WIN) && !defined(WIN32)) || (defined(__sun) && !defined(SVR4))
|
|
extern int fread(char *, size_t, size_t, FILE*);
|
|
extern int fwrite(char *, size_t, size_t, FILE*);
|
|
extern int fprintf(FILE *, char *, ...);
|
|
#endif
|
|
|
|
|
|
static void
|
|
Usage(char *progName)
|
|
{
|
|
fprintf(stderr,
|
|
"Usage: %s -r recipient [-d dbdir] [-i input] [-o output]\n",
|
|
progName);
|
|
fprintf(stderr, "%-20s Nickname of cert to use for encryption\n",
|
|
"-r recipient");
|
|
fprintf(stderr, "%-20s Cert database directory (default is ~/.netscape)\n",
|
|
"-d dbdir");
|
|
fprintf(stderr, "%-20s Define an input file to use (default is stdin)\n",
|
|
"-i input");
|
|
fprintf(stderr, "%-20s Define an output file to use (default is stdout)\n",
|
|
"-o output");
|
|
exit(-1);
|
|
}
|
|
|
|
struct recipient {
|
|
struct recipient *next;
|
|
char *nickname;
|
|
CERTCertificate *cert;
|
|
};
|
|
|
|
static void
|
|
EncryptOut(void *arg, const char *buf, unsigned long len)
|
|
{
|
|
FILE *out;
|
|
|
|
out = arg;
|
|
fwrite (buf, len, 1, out);
|
|
}
|
|
|
|
static int
|
|
EncryptFile(FILE *outFile, FILE *inFile, struct recipient *recipients,
|
|
char *progName)
|
|
{
|
|
SEC_PKCS7ContentInfo *cinfo;
|
|
SEC_PKCS7EncoderContext *ecx;
|
|
struct recipient *rcpt;
|
|
SECStatus rv;
|
|
|
|
if (outFile == NULL || inFile == NULL || recipients == NULL)
|
|
return -1;
|
|
|
|
/* XXX Need a better way to handle that certUsage stuff! */
|
|
/* XXX keysize? */
|
|
cinfo = SEC_PKCS7CreateEnvelopedData (recipients->cert,
|
|
certUsageEmailRecipient,
|
|
NULL, SEC_OID_DES_EDE3_CBC, 0,
|
|
NULL, NULL);
|
|
if (cinfo == NULL)
|
|
return -1;
|
|
|
|
for (rcpt = recipients->next; rcpt != NULL; rcpt = rcpt->next) {
|
|
rv = SEC_PKCS7AddRecipient (cinfo, rcpt->cert, certUsageEmailRecipient,
|
|
NULL);
|
|
if (rv != SECSuccess) {
|
|
SECU_PrintError(progName, "error adding recipient \"%s\"",
|
|
rcpt->nickname);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
ecx = SEC_PKCS7EncoderStart (cinfo, EncryptOut, outFile, NULL);
|
|
if (ecx == NULL)
|
|
return -1;
|
|
|
|
for (;;) {
|
|
char ibuf[1024];
|
|
int nb;
|
|
|
|
if (feof(inFile))
|
|
break;
|
|
nb = fread(ibuf, 1, sizeof(ibuf), inFile);
|
|
if (nb == 0) {
|
|
if (ferror(inFile)) {
|
|
PORT_SetError(SEC_ERROR_IO);
|
|
rv = SECFailure;
|
|
}
|
|
break;
|
|
}
|
|
rv = SEC_PKCS7EncoderUpdate(ecx, ibuf, nb);
|
|
if (rv != SECSuccess)
|
|
break;
|
|
}
|
|
|
|
if (SEC_PKCS7EncoderFinish(ecx, NULL, NULL) != SECSuccess)
|
|
rv = SECFailure;
|
|
|
|
SEC_PKCS7DestroyContentInfo (cinfo);
|
|
|
|
if (rv != SECSuccess)
|
|
return -1;
|
|
|
|
return 0;
|
|
}
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
char *progName;
|
|
FILE *inFile, *outFile;
|
|
char *certName;
|
|
CERTCertDBHandle *certHandle;
|
|
struct recipient *recipients, *rcpt;
|
|
PLOptState *optstate;
|
|
PLOptStatus status;
|
|
SECStatus rv;
|
|
|
|
progName = strrchr(argv[0], '/');
|
|
progName = progName ? progName+1 : argv[0];
|
|
|
|
inFile = NULL;
|
|
outFile = NULL;
|
|
certName = NULL;
|
|
recipients = NULL;
|
|
rcpt = NULL;
|
|
|
|
/*
|
|
* Parse command line arguments
|
|
* XXX This needs to be enhanced to allow selection of algorithms
|
|
* and key sizes (or to look up algorithms and key sizes for each
|
|
* recipient in the magic database).
|
|
*/
|
|
optstate = PL_CreateOptState(argc, argv, "d:i:o:r:");
|
|
while ((status = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
|
|
switch (optstate->option) {
|
|
case '?':
|
|
Usage(progName);
|
|
break;
|
|
|
|
case 'd':
|
|
SECU_ConfigDirectory(optstate->value);
|
|
break;
|
|
|
|
case 'i':
|
|
inFile = fopen(optstate->value, "r");
|
|
if (!inFile) {
|
|
fprintf(stderr, "%s: unable to open \"%s\" for reading\n",
|
|
progName, optstate->value);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case 'o':
|
|
outFile = fopen(optstate->value, "wb");
|
|
if (!outFile) {
|
|
fprintf(stderr, "%s: unable to open \"%s\" for writing\n",
|
|
progName, optstate->value);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case 'r':
|
|
if (rcpt == NULL) {
|
|
recipients = rcpt = PORT_Alloc (sizeof(struct recipient));
|
|
} else {
|
|
rcpt->next = PORT_Alloc (sizeof(struct recipient));
|
|
rcpt = rcpt->next;
|
|
}
|
|
if (rcpt == NULL) {
|
|
fprintf(stderr, "%s: unable to allocate recipient struct\n",
|
|
progName);
|
|
return -1;
|
|
}
|
|
rcpt->nickname = strdup(optstate->value);
|
|
rcpt->cert = NULL;
|
|
rcpt->next = NULL;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!recipients) Usage(progName);
|
|
|
|
if (!inFile) inFile = stdin;
|
|
if (!outFile) outFile = stdout;
|
|
|
|
/* Call the NSS initialization routines */
|
|
PR_Init(PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
|
|
rv = NSS_Init(SECU_ConfigDirectory(NULL));
|
|
if (rv != SECSuccess) {
|
|
SECU_PrintPRandOSError(progName);
|
|
return -1;
|
|
}
|
|
|
|
/* open cert database */
|
|
certHandle = CERT_GetDefaultCertDB();
|
|
if (certHandle == NULL) {
|
|
return -1;
|
|
}
|
|
|
|
/* find certs */
|
|
for (rcpt = recipients; rcpt != NULL; rcpt = rcpt->next) {
|
|
rcpt->cert = CERT_FindCertByNickname(certHandle, rcpt->nickname);
|
|
if (rcpt->cert == NULL) {
|
|
SECU_PrintError(progName,
|
|
"the cert for name \"%s\" not found in database",
|
|
rcpt->nickname);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
if (EncryptFile(outFile, inFile, recipients, progName)) {
|
|
SECU_PrintError(progName, "problem encrypting data");
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|