gecko-dev/security/nss/cmd/shlibsign/shlibsign.c

436 lines
11 KiB
C

/* ***** BEGIN LICENSE BLOCK *****
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
*
* The contents of this file are subject to the Mozilla Public License Version
* 1.1 (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
* http://www.mozilla.org/MPL/
*
* Software distributed under the License is distributed on an "AS IS" basis,
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
* for the specific language governing rights and limitations under the
* License.
*
* The Original Code is the Netscape security libraries.
*
* The Initial Developer of the Original Code is
* Netscape Communications Corporation.
* Portions created by the Initial Developer are Copyright (C) 1994-2000
* the Initial Developer. All Rights Reserved.
*
* Contributor(s):
*
* Alternatively, the contents of this file may be used under the terms of
* either the GNU General Public License Version 2 or later (the "GPL"), or
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
* in which case the provisions of the GPL or the LGPL are applicable instead
* of those above. If you wish to allow use of your version of this file only
* under the terms of either the GPL or the LGPL, and not to allow others to
* use your version of this file under the terms of the MPL, indicate your
* decision by deleting the provisions above and replace them with the notice
* and other provisions required by the GPL or the LGPL. If you do not delete
* the provisions above, a recipient may use your version of this file under
* the terms of any one of the MPL, the GPL or the LGPL.
*
* ***** END LICENSE BLOCK ***** */
/*
* Test program for SDR (Secret Decoder Ring) functions.
*
* $Id: shlibsign.c,v 1.14 2005/11/15 00:34:39 julien.pierre.bugs%sun.com Exp $
*/
#ifdef XP_UNIX
#define USES_LINKS 1
#endif
#include "nspr.h"
#include <stdio.h>
#include "nss.h"
#include "secutil.h"
#include "cert.h"
#include "pk11func.h"
#include "plgetopt.h"
#include "pk11sdr.h"
#include "shsign.h"
#include "pk11pqg.h"
#ifdef USES_LINKS
#include <unistd.h>
#include <sys/param.h>
#include <sys/types.h>
#include <sys/stat.h>
#endif
static void
usage (char *program_name)
{
PRFileDesc *pr_stderr;
pr_stderr = PR_STDERR;
PR_fprintf (pr_stderr, "Usage:");
PR_fprintf (pr_stderr, "%s [-v] -i shared_library_name\n", program_name);
}
static char *
mkoutput(const char *input)
{
int in_len = PORT_Strlen(input);
char *output = PORT_Alloc(in_len+sizeof(SGN_SUFFIX));
int index = in_len + 1 - sizeof("."SHLIB_SUFFIX);
if ((index > 0) &&
(PORT_Strncmp(&input[index],
"."SHLIB_SUFFIX,sizeof("."SHLIB_SUFFIX)) == 0)) {
in_len = index;
}
PORT_Memcpy(output,input,in_len);
PORT_Memcpy(&output[in_len],SGN_SUFFIX,sizeof(SGN_SUFFIX));
return output;
}
static void
lperror(const char *string)
{
int errNum = PORT_GetError();
const char *error = SECU_Strerror(errNum);
fprintf(stderr,"%s: %s\n",string, error);
}
static void
encodeInt(unsigned char *buf, int val)
{
buf[3] = (val >> 0) & 0xff;
buf[2] = (val >> 8) & 0xff;
buf[1] = (val >> 16) & 0xff;
buf[0] = (val >> 24) & 0xff;
return;
}
static SECStatus
writeItem(PRFileDesc *fd, SECItem *item, char *file)
{
unsigned char buf[4];
int bytesWritten;
encodeInt(buf,item->len);
bytesWritten = PR_Write(fd,buf, 4);
if (bytesWritten != 4) {
lperror(file);
return SECFailure;
}
bytesWritten = PR_Write(fd, item->data, item->len);
if (bytesWritten != item->len) {
lperror(file);
return SECFailure;
}
return SECSuccess;
}
int
main (int argc, char **argv)
{
int retval = 1; /* 0 - test succeeded. 1 - test failed */
SECStatus rv;
PLOptState *optstate;
char *program_name;
const char *input_file = NULL; /* read encrypted data from here (or create) */
char *output_file = NULL; /* write new encrypted data here */
PRBool verbose = PR_FALSE;
SECKEYPrivateKey *privk = NULL;
SECKEYPublicKey *pubk = NULL;
PK11SlotInfo *slot = NULL;
PRFileDesc *fd;
int bytesRead;
int bytesWritten;
unsigned char file_buf[512];
unsigned char hash_buf[SHA1_LENGTH];
unsigned char sign_buf[40]; /* DSA_LENGTH */
SECItem hash,sign;
PK11Context *hashcx = NULL;
int ks, count=0;
int keySize = 1024;
PQGParams *pqgParams = NULL;
PQGVerify *pqgVerify = NULL;
char* nssDir = NULL;
#ifdef USES_LINKS
int ret;
struct stat stat_buf;
char link_buf[MAXPATHLEN+1];
char *link_file = NULL;
#endif
hash.len = sizeof(hash_buf); hash.data = hash_buf;
sign.len = sizeof(sign_buf); sign.data = sign_buf;
program_name = PL_strrchr(argv[0], '/');
program_name = program_name ? (program_name + 1) : argv[0];
optstate = PL_CreateOptState (argc, argv, "d:i:o:v");
if (optstate == NULL) {
SECU_PrintError (program_name, "PL_CreateOptState failed");
return 1;
}
while (PL_GetNextOpt (optstate) == PL_OPT_OK) {
switch (optstate->option) {
#ifdef notdef
case '?':
short_usage (program_name);
return 0;
case 'H':
long_usage (program_name);
return 0;
#endif
case 'd':
nssDir = optstate->value;
break;
case 'i':
input_file = optstate->value;
break;
case 'o':
output_file = PORT_Strdup(optstate->value);
break;
case 'v':
verbose = PR_TRUE;
break;
}
}
if (input_file == NULL) {
usage(program_name);
return 1;
}
/*
* Initialize the Security libraries.
*/
PK11_SetPasswordFunc(SECU_GetModulePassword);
if (nssDir) {
rv = NSS_Init(nssDir);
if (rv != SECSuccess) {
rv = NSS_NoDB_Init("");
}
} else {
rv = NSS_NoDB_Init("");
}
if (rv != SECSuccess) {
lperror("NSS_Init failed");
goto prdone;
}
/* Generate a DSA Key pair */
slot = PK11_GetBestSlot(CKM_DSA,NULL);
if (slot == NULL) {
lperror("CKM_DSA");
goto loser;
}
printf("Generating DSA Key Pair...."); fflush(stdout);
ks = PQG_PBITS_TO_INDEX(keySize);
rv = PK11_PQG_ParamGen(ks,&pqgParams, &pqgVerify);
if (rv != SECSuccess) {
lperror("Generating PQG Params");
goto loser;
}
privk = PK11_GenerateKeyPair(slot, CKM_DSA_KEY_PAIR_GEN, pqgParams, &pubk,
PR_FALSE, PR_TRUE, NULL);
if (privk == NULL) {
lperror("Generating DSA Key");
goto loser;
}
printf("done\n");
/* open the shared library */
fd = PR_OpenFile(input_file,PR_RDONLY,0);
if (fd == NULL ) {
lperror(input_file);
goto loser;
}
#ifdef USES_LINKS
ret = lstat(input_file, &stat_buf);
if (ret < 0) {
perror(input_file);
goto loser;
}
if (S_ISLNK(stat_buf.st_mode)) {
char *dirpath,*dirend;
ret = readlink(input_file, link_buf, sizeof(link_buf) - 1);
if (ret < 0) {
perror(input_file);
goto loser;
}
link_buf[ret] = 0;
link_file = mkoutput(input_file);
/* get the dirname of input_file */
dirpath = PORT_Strdup(input_file);
dirend = PORT_Strrchr(dirpath, '/');
if (dirend) {
*dirend = '\0';
ret = chdir(dirpath);
if (ret < 0) {
perror(dirpath);
goto loser;
}
}
PORT_Free(dirpath);
input_file = link_buf;
/* get the basename of link_file */
dirend = PORT_Strrchr(link_file, '/');
if (dirend) {
link_file = dirend + 1;
}
}
#endif
if (output_file == NULL) {
output_file = mkoutput(input_file);
}
hashcx = PK11_CreateDigestContext(SEC_OID_SHA1);
if (hashcx == NULL) {
lperror("SHA1 Digest Create");
goto loser;
}
/* hash the file */
while ((bytesRead = PR_Read(fd,file_buf,sizeof(file_buf))) > 0) {
PK11_DigestOp(hashcx,file_buf,bytesRead);
count += bytesRead;
}
PR_Close(fd);
fd = NULL;
if (bytesRead < 0) {
lperror(input_file);
goto loser;
}
PK11_DigestFinal(hashcx, hash.data, &hash.len, hash.len);
if (hash.len != SHA1_LENGTH) {
fprintf(stderr, "Digest length was not correct\n");
goto loser;
}
/* signe the hash */
rv = PK11_Sign(privk,&sign,&hash);
if (rv != SECSuccess) {
lperror("Signing");
goto loser;
}
if (verbose) {
int i,j;
fprintf(stderr,"Library File: %s %d bytes\n",input_file, count);
fprintf(stderr,"Check File: %s\n",output_file);
#ifdef USES_LINKS
if (link_file) {
fprintf(stderr,"Link: %s\n",link_file);
}
#endif
fprintf(stderr," hash: %d bytes\n", hash.len);
#define STEP 10
for (i=0; i < hash.len; i += STEP) {
fprintf(stderr," ");
for (j=0; j < STEP && (i+j) < hash.len; j++) {
fprintf(stderr," %02x", hash.data[i+j]);
}
fprintf(stderr,"\n");
}
fprintf(stderr," signature: %d bytes\n", sign.len);
for (i=0; i < sign.len; i += STEP) {
fprintf(stderr," ");
for (j=0; j < STEP && (i+j) < sign.len; j++) {
fprintf(stderr," %02x", sign.data[i+j]);
}
fprintf(stderr,"\n");
}
}
/* open the target signature file */
fd = PR_OpenFile(output_file,PR_WRONLY|PR_CREATE_FILE|PR_TRUNCATE,0666);
if (fd == NULL ) {
lperror(output_file);
goto loser;
}
/*
* we write the key out in a straight binary format because very
* low level libraries need to read an parse this file. Ideally we should
* just derEncode the public key (which would be pretty simple, and be
* more general), but then we'd need to link the ASN.1 decoder with the
* freebl libraries.
*/
file_buf[0] = NSS_SIGN_CHK_MAGIC1;
file_buf[1] = NSS_SIGN_CHK_MAGIC2;
file_buf[2] = NSS_SIGN_CHK_MAJOR_VERSION;
file_buf[3] = NSS_SIGN_CHK_MINOR_VERSION;
encodeInt(&file_buf[4],12); /* offset to data start */
encodeInt(&file_buf[8],CKK_DSA);
bytesWritten = PR_Write(fd,file_buf, 12);
if (bytesWritten != 12) {
lperror(output_file);
goto loser;
}
rv = writeItem(fd,&pubk->u.dsa.params.prime,output_file);
if (rv != SECSuccess) goto loser;
rv = writeItem(fd,&pubk->u.dsa.params.subPrime,output_file);
if (rv != SECSuccess) goto loser;
rv = writeItem(fd,&pubk->u.dsa.params.base,output_file);
if (rv != SECSuccess) goto loser;
rv = writeItem(fd,&pubk->u.dsa.publicValue,output_file);
if (rv != SECSuccess) goto loser;
rv = writeItem(fd,&sign,output_file);
if (rv != SECSuccess) goto loser;
PR_Close(fd);
#ifdef USES_LINKS
if (link_file) {
(void)unlink(link_file);
ret = symlink(output_file, link_file);
if (ret < 0) {
perror(link_file);
goto loser;
}
}
#endif
retval = 0;
loser:
if (hashcx) {
PK11_DestroyContext(hashcx, PR_TRUE);
}
if (privk) {
SECKEY_DestroyPrivateKey(privk);
}
if (pubk) {
SECKEY_DestroyPublicKey(pubk);
}
if (slot) {
PK11_FreeSlot(slot);
}
if (NSS_Shutdown() != SECSuccess) {
exit(1);
}
prdone:
PR_Cleanup ();
return retval;
}