summaryrefslogtreecommitdiff
path: root/security/nss/cmd/shlibsign/shlibsign.c
diff options
context:
space:
mode:
Diffstat (limited to 'security/nss/cmd/shlibsign/shlibsign.c')
-rw-r--r--security/nss/cmd/shlibsign/shlibsign.c427
1 files changed, 427 insertions, 0 deletions
diff --git a/security/nss/cmd/shlibsign/shlibsign.c b/security/nss/cmd/shlibsign/shlibsign.c
new file mode 100644
index 000000000..6d4af89b4
--- /dev/null
+++ b/security/nss/cmd/shlibsign/shlibsign.c
@@ -0,0 +1,427 @@
+/*
+ * The contents of this file are subject to the Mozilla Public
+ * License Version 1.1 (the "License"); you may not use this file
+ * except in compliance with the License. You may obtain a copy of
+ * the License at http://www.mozilla.org/MPL/
+ *
+ * Software distributed under the License is distributed on an "AS
+ * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
+ * implied. See the License for the specific language governing
+ * rights and limitations under the License.
+ *
+ * The Original Code is the Netscape security libraries.
+ *
+ * The Initial Developer of the Original Code is Netscape
+ * Communications Corporation. Portions created by Netscape are
+ * Copyright (C) 1994-2000 Netscape Communications Corporation. All
+ * Rights Reserved.
+ *
+ * Contributor(s):
+ *
+ * Alternatively, the contents of this file may be used under the
+ * terms of the GNU General Public License Version 2 or later (the
+ * "GPL"), in which case the provisions of the GPL are applicable
+ * instead of those above. If you wish to allow use of your
+ * version of this file only under the terms of the GPL and not to
+ * allow others to use your version of this file under the MPL,
+ * indicate your decision by deleting the provisions above and
+ * replace them with the notice and other provisions required by
+ * the GPL. If you do not delete the provisions above, a recipient
+ * may use your version of this file under either the MPL or the
+ * GPL.
+ */
+
+/*
+ * Test program for SDR (Secret Decoder Ring) functions.
+ *
+ * $Id$
+ */
+
+#ifdef XP_UNIX
+#define USES_LINKS 1
+#endif
+
+#include "nspr.h"
+#include <stdio.h>
+#include "nss.h"
+#include "secutil.h"
+#include "cert.h"
+#include "pk11func.h"
+
+#include "plgetopt.h"
+#include "pk11sdr.h"
+#include "secrng.h"
+#include "shsign.h"
+#include "pk11pqg.h"
+
+#ifdef USES_LINKS
+#include <unistd.h>
+#include <sys/param.h>
+#include <sys/types.h>
+#include <sys/stat.h>
+#endif
+
+static void
+usage (char *program_name)
+{
+ PRFileDesc *pr_stderr;
+
+ pr_stderr = PR_STDERR;
+ PR_fprintf (pr_stderr, "Usage:");
+ PR_fprintf (pr_stderr, "%s [-v] -i shared_library_name\n", program_name);
+}
+
+static char *
+mkoutput(const char *input)
+{
+ int in_len = PORT_Strlen(input);
+ char *output = PORT_Alloc(in_len+sizeof(SGN_SUFFIX));
+ int index = in_len + 1 - sizeof("."SHLIB_SUFFIX);
+
+ if ((index > 0) &&
+ (PORT_Strncmp(&input[index],
+ "."SHLIB_SUFFIX,sizeof("."SHLIB_SUFFIX)) == 0)) {
+ in_len = index;
+ }
+ PORT_Memcpy(output,input,in_len);
+ PORT_Memcpy(&output[in_len],SGN_SUFFIX,sizeof(SGN_SUFFIX));
+ return output;
+}
+
+
+static void
+lperror(const char *string)
+{
+ int errNum = PORT_GetError();
+ const char *error = SECU_Strerror(errNum);
+ fprintf(stderr,"%s: %s\n",string, error);
+}
+
+static void
+encodeInt(unsigned char *buf, int val)
+{
+ buf[3] = (val >> 0) & 0xff;
+ buf[2] = (val >> 8) & 0xff;
+ buf[1] = (val >> 16) & 0xff;
+ buf[0] = (val >> 24) & 0xff;
+ return;
+}
+
+static SECStatus
+writeItem(PRFileDesc *fd, SECItem *item, char *file)
+{
+ unsigned char buf[4];
+ int bytesWritten;
+
+ encodeInt(buf,item->len);
+ bytesWritten = PR_Write(fd,buf, 4);
+ if (bytesWritten != 4) {
+ lperror(file);
+ return SECFailure;
+ }
+ bytesWritten = PR_Write(fd, item->data, item->len);
+ if (bytesWritten != item->len) {
+ lperror(file);
+ return SECFailure;
+ }
+ return SECSuccess;
+}
+
+
+int
+main (int argc, char **argv)
+{
+ int retval = 1; /* 0 - test succeeded. 1 - test failed */
+ SECStatus rv;
+ PLOptState *optstate;
+ char *program_name;
+ const char *input_file = NULL; /* read encrypted data from here (or create) */
+ char *output_file = NULL; /* write new encrypted data here */
+ PRBool verbose = PR_FALSE;
+ SECKEYPrivateKey *privk = NULL;
+ SECKEYPublicKey *pubk = NULL;
+ PK11SlotInfo *slot = NULL;
+ PRFileDesc *fd;
+ int bytesRead;
+ int bytesWritten;
+ unsigned char file_buf[512];
+ unsigned char hash_buf[SHA1_LENGTH];
+ unsigned char sign_buf[40]; /* DSA_LENGTH */
+ SECItem hash,sign;
+ PK11Context *hashcx = NULL;
+ int ks, count=0;
+ int keySize = 1024;
+ PQGParams *pqgParams = NULL;
+ PQGVerify *pqgVerify = NULL;
+#ifdef USES_LINKS
+ int ret;
+ struct stat stat_buf;
+ char link_buf[MAXPATHLEN+1];
+ char *link_file = NULL;
+#endif
+
+ hash.len = sizeof(hash_buf); hash.data = hash_buf;
+ sign.len = sizeof(sign_buf); sign.data = sign_buf;
+
+ program_name = PL_strrchr(argv[0], '/');
+ program_name = program_name ? (program_name + 1) : argv[0];
+
+ optstate = PL_CreateOptState (argc, argv, "d:i:o:v");
+ if (optstate == NULL) {
+ SECU_PrintError (program_name, "PL_CreateOptState failed");
+ return 1;
+ }
+
+ while (PL_GetNextOpt (optstate) == PL_OPT_OK) {
+ switch (optstate->option) {
+#ifdef notdef
+ case '?':
+ short_usage (program_name);
+ return 0;
+
+ case 'H':
+ long_usage (program_name);
+ return 0;
+#endif
+
+ case 'd':
+ SECU_ConfigDirectory(optstate->value);
+ break;
+
+ case 'i':
+ input_file = optstate->value;
+ break;
+
+ case 'o':
+ output_file = PORT_Strdup(optstate->value);
+ break;
+
+ case 'v':
+ verbose = PR_TRUE;
+ break;
+ }
+ }
+
+ if (input_file == NULL) {
+ usage(program_name);
+ return 1;
+ }
+
+ /*
+ * Initialize the Security libraries.
+ */
+ PK11_SetPasswordFunc(SECU_GetModulePassword);
+
+ rv = NSS_Init(SECU_ConfigDirectory(NULL));
+ if (rv != SECSuccess) {
+ rv = NSS_NoDB_Init("");
+ }
+ if (rv != SECSuccess) {
+ lperror("NSS_Init failed");
+ goto prdone;
+ }
+
+ /* Generate a DSA Key pair */
+ slot = PK11_GetBestSlot(CKM_DSA,NULL);
+ if (slot == NULL) {
+ lperror("CKM_DSA");
+ goto loser;
+
+ }
+ printf("Generating DSA Key Pair...."); fflush(stdout);
+ ks = PQG_PBITS_TO_INDEX(keySize);
+ rv = PK11_PQG_ParamGen(ks,&pqgParams, &pqgVerify);
+ if (rv != SECSuccess) {
+ lperror("Generating PQG Params");
+ goto loser;
+ }
+ privk = PK11_GenerateKeyPair(slot, CKM_DSA_KEY_PAIR_GEN, pqgParams, &pubk,
+ PR_FALSE, PR_TRUE, NULL);
+ if (privk == NULL) {
+ lperror("Generating DSA Key");
+ goto loser;
+ }
+
+ printf("done\n");
+
+ /* open the shared library */
+ fd = PR_OpenFile(input_file,PR_RDONLY,0);
+ if (fd == NULL ) {
+ lperror(input_file);
+ goto loser;
+ }
+#ifdef USES_LINKS
+ ret = lstat(input_file, &stat_buf);
+ if (ret < 0) {
+ perror(input_file);
+ goto loser;
+ }
+ if (S_ISLNK(stat_buf.st_mode)) {
+ char *dirpath,*dirend;
+ ret = readlink(input_file, link_buf, sizeof(link_buf) - 1);
+ if (ret < 0) {
+ perror(input_file);
+ goto loser;
+ }
+ link_buf[ret] = 0;
+ link_file = mkoutput(input_file);
+ /* get the dirname of input_file */
+ dirpath = PORT_Strdup(input_file);
+ dirend = PORT_Strrchr(dirpath, '/');
+ if (dirend) {
+ *dirend = '\0';
+ ret = chdir(dirpath);
+ if (ret < 0) {
+ perror(dirpath);
+ goto loser;
+ }
+ }
+ PORT_Free(dirpath);
+ input_file = link_buf;
+ /* get the basename of link_file */
+ dirend = PORT_Strrchr(link_file, '/');
+ if (dirend) {
+ link_file = dirend + 1;
+ }
+ }
+#endif
+ if (output_file == NULL) {
+ output_file = mkoutput(input_file);
+ }
+
+ hashcx = PK11_CreateDigestContext(SEC_OID_SHA1);
+ if (hashcx == NULL) {
+ lperror("SHA1 Digest Create");
+ goto loser;
+ }
+
+ /* hash the file */
+ while ((bytesRead = PR_Read(fd,file_buf,sizeof(file_buf))) > 0) {
+ PK11_DigestOp(hashcx,file_buf,bytesRead);
+ count += bytesRead;
+ }
+
+ PR_Close(fd);
+ fd = NULL;
+ if (bytesRead < 0) {
+ lperror(input_file);
+ goto loser;
+ }
+
+
+ PK11_DigestFinal(hashcx, hash.data, &hash.len, hash.len);
+
+ if (hash.len != SHA1_LENGTH) {
+ fprintf(stderr, "Digest length was not correct\n");
+ goto loser;
+ }
+
+ /* signe the hash */
+ rv = PK11_Sign(privk,&sign,&hash);
+ if (rv != SECSuccess) {
+ lperror("Signing");
+ goto loser;
+ }
+
+ if (verbose) {
+ int i,j;
+ fprintf(stderr,"Library File: %s %d bytes\n",input_file, count);
+ fprintf(stderr,"Check File: %s\n",output_file);
+#ifdef USES_LINKS
+ if (link_file) {
+ fprintf(stderr,"Link: %s\n",link_file);
+ }
+#endif
+ fprintf(stderr," hash: %d bytes\n", hash.len);
+#define STEP 10
+ for (i=0; i < hash.len; i += STEP) {
+ fprintf(stderr," ");
+ for (j=0; j < STEP && (i+j) < hash.len; j++) {
+ fprintf(stderr," %02x", hash.data[i+j]);
+ }
+ fprintf(stderr,"\n");
+ }
+ fprintf(stderr," signature: %d bytes\n", sign.len);
+ for (i=0; i < sign.len; i += STEP) {
+ fprintf(stderr," ");
+ for (j=0; j < STEP && (i+j) < sign.len; j++) {
+ fprintf(stderr," %02x", sign.data[i+j]);
+ }
+ fprintf(stderr,"\n");
+ }
+ }
+
+ /* open the target signature file */
+ fd = PR_OpenFile(output_file,PR_WRONLY|PR_CREATE_FILE|PR_TRUNCATE,0666);
+ if (fd == NULL ) {
+ lperror(output_file);
+ goto loser;
+ }
+
+ /*
+ * we write the key out in a straight binary format because very
+ * low level libraries need to read an parse this file. Ideally we should
+ * just derEncode the public key (which would be pretty simple, and be
+ * more general), but then we'd need to link the ASN.1 decoder with the
+ * freebl libraries.
+ */
+
+ file_buf[0] = NSS_SIGN_CHK_MAGIC1;
+ file_buf[1] = NSS_SIGN_CHK_MAGIC2;
+ file_buf[2] = NSS_SIGN_CHK_MAJOR_VERSION;
+ file_buf[3] = NSS_SIGN_CHK_MINOR_VERSION;
+ encodeInt(&file_buf[4],12); /* offset to data start */
+ encodeInt(&file_buf[8],CKK_DSA);
+ bytesWritten = PR_Write(fd,file_buf, 12);
+ if (bytesWritten != 12) {
+ lperror(output_file);
+ goto loser;
+ }
+
+ rv = writeItem(fd,&pubk->u.dsa.params.prime,output_file);
+ if (rv != SECSuccess) goto loser;
+ rv = writeItem(fd,&pubk->u.dsa.params.subPrime,output_file);
+ if (rv != SECSuccess) goto loser;
+ rv = writeItem(fd,&pubk->u.dsa.params.base,output_file);
+ if (rv != SECSuccess) goto loser;
+ rv = writeItem(fd,&pubk->u.dsa.publicValue,output_file);
+ if (rv != SECSuccess) goto loser;
+ rv = writeItem(fd,&sign,output_file);
+ if (rv != SECSuccess) goto loser;
+
+ PR_Close(fd);
+
+#ifdef USES_LINKS
+ if (link_file) {
+ (void)unlink(link_file);
+ ret = symlink(output_file, link_file);
+ if (ret < 0) {
+ perror(link_file);
+ goto loser;
+ }
+ }
+#endif
+
+ retval = 0;
+
+loser:
+ if (hashcx) {
+ PK11_DestroyContext(hashcx, PR_TRUE);
+ }
+ if (privk) {
+ SECKEY_DestroyPrivateKey(privk);
+ }
+ if (pubk) {
+ SECKEY_DestroyPublicKey(pubk);
+ }
+ if (slot) {
+ PK11_FreeSlot(slot);
+ }
+ if (NSS_Shutdown() != SECSuccess) {
+ exit(1);
+ }
+
+prdone:
+ PR_Cleanup ();
+ return retval;
+}