/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
/*
**
** Sample client side test program that uses SSL and NSS
**
*/
#include "secutil.h"
#if defined(XP_UNIX)
#include <unistd.h>
#else
#include "ctype.h" /* for isalpha() */
#endif
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <stdarg.h>
#include "nspr.h"
#include "prio.h"
#include "prnetdb.h"
#include "nss.h"
#include "pk11func.h"
#include "plgetopt.h"
void
Usage(
char *progName)
{
fprintf(stderr,
"usage: %s [-d profiledir] -t tokenName [-r]\n", progName);
exit(1);
}
int
main(
int argc,
char **argv)
{
char *certDir = NULL;
PLOptState *optstate;
PLOptStatus optstatus;
SECStatus rv;
char *tokenName = NULL;
PRBool cont = PR_TRUE;
PK11TokenEvent event = PK11TokenPresentEvent;
PK11TokenStatus status;
char *progName;
PK11SlotInfo *slot;
progName = strrchr(argv[0],
'/');
if (!progName)
progName = strrchr(argv[0],
'\\');
progName = progName ? progName + 1 : argv[0];
optstate = PL_CreateOptState(argc, argv,
"rd:t:");
while ((optstatus = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
switch (optstate->option) {
case 'd':
certDir = strdup(optstate->value);
certDir = SECU_ConfigDirectory(certDir);
break;
case 't':
tokenName = strdup(optstate->value);
break;
case 'r':
event = PK11TokenRemovedOrChangedEvent;
break;
}
}
if (optstatus == PL_OPT_BAD)
Usage(progName);
if (tokenName == NULL) {
Usage(progName);
}
if (!certDir) {
certDir = SECU_DefaultSSLDir();
/* Look in $SSL_DIR */
certDir = SECU_ConfigDirectory(certDir);
/* call even if it's NULL */
}
PR_Init(PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
PK11_SetPasswordFunc(SECU_GetModulePassword);
/* open the cert DB, the key DB, and the secmod DB. */
rv = NSS_Init(certDir);
if (rv != SECSuccess) {
SECU_PrintError(progName,
"unable to open cert database");
return 1;
}
printf(
"Looking up tokenNamed: <%s>\n", tokenName);
slot = PK11_FindSlotByName(tokenName);
if (slot == NULL) {
SECU_PrintError(progName,
"unable to find token");
return 1;
}
do {
status =
PK11_WaitForTokenEvent(slot, event, PR_INTERVAL_NO_TIMEOUT, 0, 0);
switch (status) {
case PK11TokenNotRemovable:
cont = PR_FALSE;
printf(
"%s Token Not Removable\n", tokenName);
break;
case PK11TokenChanged:
event = PK11TokenRemovedOrChangedEvent;
printf(
"%s Token Changed\n", tokenName);
break;
case PK11TokenRemoved:
event = PK11TokenPresentEvent;
printf(
"%s Token Removed\n", tokenName);
break;
case PK11TokenPresent:
event = PK11TokenRemovedOrChangedEvent;
printf(
"%s Token Present\n", tokenName);
break;
}
}
while (cont);
PK11_FreeSlot(slot);
if (NSS_Shutdown() != SECSuccess) {
exit(1);
}
PR_Cleanup();
return 0;
}