mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-10-11 12:25:53 +00:00
Program to test smartcard removal and insertion detection.
This commit is contained in:
parent
b3956b6cb3
commit
79fda8d95f
@ -36,14 +36,14 @@ CORE_DEPTH = ../../..
|
||||
# MODULE public and private header directories are implicitly REQUIRED.
|
||||
MODULE = nss
|
||||
|
||||
#CSRCS = testname.c \
|
||||
CSRCS = remtest.c
|
||||
|
||||
# The MODULE is always implicitly required.
|
||||
# Listing it here in REQUIRES makes it appear twice in the cc command line.
|
||||
REQUIRES = dbm seccmd
|
||||
REQUIRES = seccmd dbm
|
||||
|
||||
PROGRAMS = $(CSRCS:.c=)
|
||||
|
||||
TARGETS = $(PROGRAMS)
|
||||
|
||||
NO_MD_RELEASE = 1
|
||||
#NO_MD_RELEASE = 1
|
||||
|
160
security/nss/cmd/tests/remtest.c
Normal file
160
security/nss/cmd/tests/remtest.c
Normal file
@ -0,0 +1,160 @@
|
||||
/*
|
||||
* The contents of this file are subject to the Mozilla Public
|
||||
* License Version 1.1 (the "License"); you may not use this file
|
||||
* except in compliance with the License. You may obtain a copy of
|
||||
* the License at http://www.mozilla.org/MPL/
|
||||
*
|
||||
* Software distributed under the License is distributed on an "AS
|
||||
* IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
|
||||
* implied. See the License for the specific language governing
|
||||
* rights and limitations under the License.
|
||||
*
|
||||
* The Original Code is the Netscape security libraries.
|
||||
*
|
||||
* The Initial Developer of the Original Code is Netscape
|
||||
* Communications Corporation. Portions created by Netscape are
|
||||
* Copyright (C) 1994-2000 Netscape Communications Corporation. All
|
||||
* Rights Reserved.
|
||||
*
|
||||
* Contributor(s):
|
||||
*
|
||||
* Alternatively, the contents of this file may be used under the
|
||||
* terms of the GNU General Public License Version 2 or later (the
|
||||
* "GPL"), in which case the provisions of the GPL are applicable
|
||||
* instead of those above. If you wish to allow use of your
|
||||
* version of this file only under the terms of the GPL and not to
|
||||
* allow others to use your version of this file under the MPL,
|
||||
* indicate your decision by deleting the provisions above and
|
||||
* replace them with the notice and other provisions required by
|
||||
* the GPL. If you do not delete the provisions above, a recipient
|
||||
* may use your version of this file under either the MPL or the
|
||||
* GPL.
|
||||
*/
|
||||
|
||||
/*
|
||||
**
|
||||
** Sample client side test program that uses SSL and libsec
|
||||
**
|
||||
*/
|
||||
|
||||
#include "secutil.h"
|
||||
|
||||
#if defined(XP_UNIX)
|
||||
#include <unistd.h>
|
||||
#else
|
||||
#include "ctype.h" /* for isalpha() */
|
||||
#endif
|
||||
|
||||
#include <stdio.h>
|
||||
#include <string.h>
|
||||
#include <stdlib.h>
|
||||
#include <errno.h>
|
||||
#include <fcntl.h>
|
||||
#include <stdarg.h>
|
||||
|
||||
#include "nspr.h"
|
||||
#include "prio.h"
|
||||
#include "prnetdb.h"
|
||||
#include "nss.h"
|
||||
#include "pk11func.h"
|
||||
#include "plgetopt.h"
|
||||
|
||||
void
|
||||
Usage(char *progName)
|
||||
{
|
||||
fprintf(stderr,"usage: %s [-d profiledir] -t tokenName [-r]\n", progName);
|
||||
exit(1);
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
char * certDir = NULL;
|
||||
PLOptState *optstate;
|
||||
PLOptStatus optstatus;
|
||||
SECStatus rv;
|
||||
char * tokenName = NULL;
|
||||
PRBool cont=PR_TRUE;
|
||||
PK11TokenEvent event = PK11TokenPresentEvent;
|
||||
PK11TokenStatus status;
|
||||
char *progName;
|
||||
PK11SlotInfo *slot;
|
||||
|
||||
progName = strrchr(argv[0], '/');
|
||||
if (!progName)
|
||||
progName = strrchr(argv[0], '\\');
|
||||
progName = progName ? progName+1 : argv[0];
|
||||
|
||||
optstate = PL_CreateOptState(argc, argv, "rd:t:");
|
||||
while ((optstatus = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
|
||||
switch (optstate->option) {
|
||||
|
||||
case 'd':
|
||||
certDir = strdup(optstate->value);
|
||||
certDir = SECU_ConfigDirectory(certDir);
|
||||
break;
|
||||
case 't':
|
||||
tokenName = strdup(optstate->value);
|
||||
break;
|
||||
case 'r':
|
||||
event = PK11TokenRemovedOrChangedEvent;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (optstatus == PL_OPT_BAD)
|
||||
Usage(progName);
|
||||
|
||||
if (tokenName == NULL) {
|
||||
Usage(progName);
|
||||
}
|
||||
|
||||
if (!certDir) {
|
||||
certDir = SECU_DefaultSSLDir(); /* Look in $SSL_DIR */
|
||||
certDir = SECU_ConfigDirectory(certDir); /* call even if it's NULL */
|
||||
}
|
||||
|
||||
PR_Init( PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
|
||||
|
||||
PK11_SetPasswordFunc(SECU_GetModulePassword);
|
||||
|
||||
/* open the cert DB, the key DB, and the secmod DB. */
|
||||
rv = NSS_Init(certDir);
|
||||
if (rv != SECSuccess) {
|
||||
SECU_PrintError(progName, "unable to open cert database");
|
||||
return 1;
|
||||
}
|
||||
|
||||
printf("Looking up tokenNamed: <%s>\n",tokenName);
|
||||
slot = PK11_FindSlotByName(tokenName);
|
||||
if (slot == NULL) {
|
||||
SECU_PrintError(progName, "unable to find token");
|
||||
return 1;
|
||||
}
|
||||
|
||||
do {
|
||||
status =
|
||||
PK11_WaitForTokenEvent(slot,event,PR_INTERVAL_NO_TIMEOUT, 0, 0);
|
||||
|
||||
switch (status) {
|
||||
case PK11TokenNotRemovable:
|
||||
cont = PR_FALSE;
|
||||
printf("%s Token Not Removable\n",tokenName);
|
||||
break;
|
||||
case PK11TokenChanged:
|
||||
event = PK11TokenRemovedOrChangedEvent;
|
||||
printf("%s Token Changed\n", tokenName);
|
||||
break;
|
||||
case PK11TokenRemoved:
|
||||
event = PK11TokenPresentEvent;
|
||||
printf("%s Token Removed\n", tokenName);
|
||||
break;
|
||||
case PK11TokenPresent:
|
||||
event = PK11TokenRemovedOrChangedEvent;
|
||||
printf("%s Token Present\n", tokenName);
|
||||
break;
|
||||
}
|
||||
} while (cont);
|
||||
|
||||
NSS_Shutdown();
|
||||
PR_Cleanup();
|
||||
return 0;
|
||||
}
|
Loading…
Reference in New Issue
Block a user