security/nss/cmd/tests/remtest.c
author Wes Kocher <wkocher@mozilla.com>
Mon, 19 Oct 2015 16:21:44 -0700
changeset 268403 19c3ba35bcaefc29534fade508fd077e509ed194
parent 108835 699db88b5ea01fd321fe8abfe5bb071e991b120d
child 294923 178243415be60cfd4bed7adae993736ab0238f12
permissions -rw-r--r--
Backed out changeset 668563c7fab8 (bug 1214077) for build failures

/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

/*
**
** Sample client side test program that uses SSL and NSS
**
*/

#include "secutil.h"

#if defined(XP_UNIX)
#include <unistd.h>
#else
#include "ctype.h"	/* for isalpha() */
#endif

#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <stdarg.h>

#include "nspr.h"
#include "prio.h"
#include "prnetdb.h"
#include "nss.h"
#include "pk11func.h"
#include "plgetopt.h"

void
Usage(char *progName) 
{
    fprintf(stderr,"usage: %s [-d profiledir] -t tokenName [-r]\n", progName);
    exit(1);
}

int main(int argc, char **argv)
{
    char *             certDir  =  NULL;
    PLOptState *optstate;
    PLOptStatus optstatus;
    SECStatus rv;
    char * tokenName = NULL;
    PRBool cont=PR_TRUE;
    PK11TokenEvent event = PK11TokenPresentEvent;
    PK11TokenStatus status;
    char *progName;
    PK11SlotInfo *slot;

    progName = strrchr(argv[0], '/');
    if (!progName)
	progName = strrchr(argv[0], '\\');
    progName = progName ? progName+1 : argv[0];

    optstate = PL_CreateOptState(argc, argv, "rd:t:");
    while ((optstatus = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
	switch (optstate->option) {

	  case 'd':
	    certDir = strdup(optstate->value);
	    certDir = SECU_ConfigDirectory(certDir);
	    break;
	  case 't':
	    tokenName = strdup(optstate->value);
	    break;
	  case 'r':
	    event = PK11TokenRemovedOrChangedEvent;
	    break;
	}
    }
    if (optstatus == PL_OPT_BAD)
	Usage(progName);

    if (tokenName == NULL) {
	Usage(progName);
    }

    if (!certDir) {
	certDir = SECU_DefaultSSLDir();	/* Look in $SSL_DIR */
	certDir = SECU_ConfigDirectory(certDir); /* call even if it's NULL */
    }

    PR_Init( PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);

    PK11_SetPasswordFunc(SECU_GetModulePassword);

    /* open the cert DB, the key DB, and the secmod DB. */
    rv = NSS_Init(certDir);
    if (rv != SECSuccess) {
	SECU_PrintError(progName, "unable to open cert database");
	return 1;
    }

    printf("Looking up tokenNamed: <%s>\n",tokenName);
    slot = PK11_FindSlotByName(tokenName);
    if (slot == NULL) {
	SECU_PrintError(progName, "unable to find token");
	return 1;
    }

    do {
	status = 
	   PK11_WaitForTokenEvent(slot,event,PR_INTERVAL_NO_TIMEOUT, 0, 0);

	switch (status) {
	case PK11TokenNotRemovable:
	    cont = PR_FALSE;
	    printf("%s Token Not Removable\n",tokenName);
	    break;
	case PK11TokenChanged:
	    event = PK11TokenRemovedOrChangedEvent;
	    printf("%s Token Changed\n", tokenName);
	    break;
	case PK11TokenRemoved:
	    event = PK11TokenPresentEvent;
	    printf("%s Token Removed\n", tokenName);
	    break;
	case PK11TokenPresent:
	    event = PK11TokenRemovedOrChangedEvent;
	    printf("%s Token Present\n", tokenName);
	    break;
	}
    } while (cont);

    PK11_FreeSlot(slot);

    if (NSS_Shutdown() != SECSuccess) {
        exit(1);
    }
    PR_Cleanup();
    return 0;
}