summaryrefslogtreecommitdiffstats
path: root/pki/base/native-tools/src/bulkissuance/bulkissuance.c
diff options
context:
space:
mode:
Diffstat (limited to 'pki/base/native-tools/src/bulkissuance/bulkissuance.c')
-rw-r--r--pki/base/native-tools/src/bulkissuance/bulkissuance.c807
1 files changed, 807 insertions, 0 deletions
diff --git a/pki/base/native-tools/src/bulkissuance/bulkissuance.c b/pki/base/native-tools/src/bulkissuance/bulkissuance.c
new file mode 100644
index 000000000..ec33e8a7a
--- /dev/null
+++ b/pki/base/native-tools/src/bulkissuance/bulkissuance.c
@@ -0,0 +1,807 @@
+/* --- BEGIN COPYRIGHT BLOCK ---
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; version 2 of the License.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License along
+ * with this program; if not, write to the Free Software Foundation, Inc.,
+ * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+ *
+ * Copyright (C) 2007 Red Hat, Inc.
+ * All rights reserved.
+ * --- END COPYRIGHT BLOCK ---
+ */
+
+/* vi: set ts=4 sw=4 : */
+#ifdef HAVE_CONFIG_H
+#ifndef AUTOTOOLS_CONFIG_H
+#define AUTOTOOLS_CONFIG_H
+
+/* Eliminate warnings when using Autotools */
+#undef PACKAGE_BUGREPORT
+#undef PACKAGE_NAME
+#undef PACKAGE_STRING
+#undef PACKAGE_TARNAME
+#undef PACKAGE_VERSION
+
+#include <config.h>
+#endif /* AUTOTOOLS_CONFIG_H */
+#endif /* HAVE_CONFIG_H */
+
+#include <stdio.h>
+#include <string.h>
+#include <time.h>
+
+#if defined(XP_UNIX)
+#include <unistd.h>
+#endif
+
+#include "ssl.h"
+
+#include "prerror.h"
+
+#include "pk11func.h"
+#include "secitem.h"
+
+
+#include <stdlib.h>
+#include <errno.h>
+#include <fcntl.h>
+#include <stdarg.h>
+
+#include "nspr.h"
+#include "prio.h"
+#include "prnetdb.h"
+#include "nss.h"
+
+/*from nss2.8.4 secopt.h*/
+#ifdef XP_PC
+
+/*
+** This comes from the AT&T public-domain getopt published in mod.sources
+** (i.e., comp.sources.unix before the great Usenet renaming).
+*/
+
+extern int opterr;
+extern int optind;
+extern int optopt;
+extern char *optarg;
+
+#ifdef _WIN32
+static void do_opterr(const char *s, int c, char * const av[]);
+#define ERR(s, c) do_opterr(s, c, av)
+#else
+#define ERR(s, c) /* Win16 doesn't do stderr */
+#endif
+
+/*
+** Return options and their values from the command line.
+*/
+int getopt(int ac, char * const av[], const char * opts);
+#else
+#if defined(LINUX)
+#include <getopt.h>
+#endif
+#endif /* XP_PC */
+/*end secopt.h*/
+
+#define VERSIONSTRING "$Revision$ ($Date$)"
+#define MAXLEN 50000
+
+#ifndef PORT_Sprintf
+#define PORT_Sprintf sprintf
+#endif
+
+#ifndef PORT_Strstr
+#define PORT_Strstr strstr
+#endif
+
+#ifndef PORT_Malloc
+#define PORT_Malloc PR_Malloc
+#endif
+
+#define RD_BUF_SIZE (60 * 1024)
+
+#define PRINTF if (verbose) printf
+#define FPRINTF if (verbose) fprintf
+#define FPUTS if (verbose) fputs
+
+#define MAX_SERIAL_LEN 8192
+
+int MakeCertOK=1;
+
+int verbose;
+SECItem bigBuf;
+
+
+static char *ownPasswd( PK11SlotInfo *slot, PRBool retry, void *arg)
+{
+ char *passwd = NULL;
+
+ if ( (!retry) && arg ) {
+ passwd = PL_strdup((char *)arg);
+ }
+
+ return passwd;
+}
+
+static void
+Usage(const char *progName)
+{
+ fprintf( stderr,
+ "\n" );
+ fprintf( stderr,
+ "Description: A command-line utility used to send either a KEYGEN or a\n"
+ " Certificate Request Message Format (CRMF) enrollment\n"
+ " request to the bulk issuance interface of a\n"
+ " Certificate Authority (CA) for the automatic\n"
+ " creation of certificates.\n\n\n" );
+ fprintf( stderr,
+ "Usage:\n\n"
+ " %s -n rsa_nickname [-p password | -w pwfile ]\n"
+ " [-d dbdir] [-v] [-V] [-f inputFile] hostname[:port]\n\n"
+ " where:\n\n"
+ " -n rsa_nickname nickname of the Agent Certificate\n"
+ " [-p password | -w pwfile] password OR file containing password\n"
+ " [-d dbdir] database directory\n"
+ " [-v] verbose mode\n"
+ " [-V] version of %s\n"
+ " [-f inputFile] file containing an http request\n"
+ " which gets sent to the hostname[:port]\n"
+ " hostname[:port] machine name with optional port address\n\n\n",
+ progName, progName );
+ fprintf( stderr,
+ "Example (using the example inputFile called \"bulkissuance.data\"):\n\n" );
+ fprintf( stderr,
+ " (1) cd <server-root>/bin/cert/tools\n" );
+ fprintf( stderr,
+ " (2) cp <client-database>/cert8.db .\n" );
+ fprintf( stderr,
+ " (3) cp <client-database>/key3.db .\n" );
+ fprintf( stderr,
+ " (4) Ensure that the agent certificate is\n"
+ " inside these cert8.db/key3.db databases.\n"
+ " (for this example, call it \"CS Agent\'s CS ID\")\n" );
+ fprintf( stderr,
+ " (5) ./bulkissuance.sh -n \"CS Agent\'s CS ID\" -p password\n"
+ " -d . -f bulkissuance.data example.com:8100\n\n" );
+ exit( 1 );
+}
+
+
+static void
+errWarn(const char * funcString)
+{
+ PRErrorCode perr = PR_GetError();
+
+ FPRINTF(stderr, "exit after %s with error %d:\n", funcString,perr );
+}
+
+static void
+errExit(const char * funcString)
+{
+ errWarn(funcString);
+ exit(1);
+}
+
+/* This invokes the "default" AuthCert handler in libssl.
+** The only reason to use this one is that it prints out info as it goes.
+*/
+static SECStatus
+mySSLAuthCertificate(void *arg, PRFileDesc *fd, PRBool checkSig,
+ PRBool isServer)
+{
+ SECStatus rv;
+ CERTCertificate * peerCert;
+
+ peerCert = SSL_PeerCertificate(fd);
+
+ PRINTF("Subject: %s\nIssuer : %s\n",
+ peerCert->subjectName, peerCert->issuerName);
+ /* invoke the "default" AuthCert handler. */
+ rv = SSL_AuthCertificate(arg, fd, checkSig, isServer);
+
+ if (rv == SECSuccess) {
+ FPUTS("-- SSL3: Server Certificate Validated.\n", stderr);
+ }
+ /* error, if any, will be displayed by the Bad Cert Handler. */
+ return rv;
+}
+
+static SECStatus
+myBadCertHandler( void *arg, PRFileDesc *fd)
+{
+ /* int err = PR_GetError(); */
+ /* fprintf(stderr, "-- SSL: Server Certificate Invalid, err %d.\n%s\n",
+ err, SECU_Strerror(err)); */
+ return (MakeCertOK ? SECSuccess : SECFailure);
+}
+
+
+static SECStatus
+my_GetClientAuthData(void * arg,
+ PRFileDesc * sock,
+ struct CERTDistNamesStr * caNames,
+ struct CERTCertificateStr ** pRetCert,
+ struct SECKEYPrivateKeyStr **pRetKey)
+{
+ CERTCertificate * cert = NULL;
+ SECKEYPrivateKey * privkey = NULL;
+ char * chosenNickName = (char *)arg; /* CONST */
+ void * proto_win = NULL;
+ SECStatus rv = SECFailure;
+
+ FPRINTF(stderr,"Called mygetclientauthdata - nickname = %s\n",chosenNickName);
+
+ proto_win = SSL_RevealPinArg(sock);
+
+ if (chosenNickName) {
+ cert = PK11_FindCertFromNickname(chosenNickName, proto_win);
+ FPRINTF(stderr," mygetclientauthdata - cert = %p\n", cert);
+ if ( cert ) {
+ privkey = PK11_FindKeyByAnyCert(cert, proto_win);
+ FPRINTF(stderr," mygetclientauthdata - privkey = %p\n", privkey);
+ if ( privkey ) {
+ rv = SECSuccess;
+ } else {
+ CERT_DestroyCertificate(cert);
+ }
+ }
+ } else { /* no name given, automatically find the right cert. */
+ CERTCertNicknames * names;
+ int i;
+
+ names = CERT_GetCertNicknames(CERT_GetDefaultCertDB(),
+ SEC_CERT_NICKNAMES_USER, proto_win);
+ if (names != NULL) {
+ for (i = 0; i < names->numnicknames; i++) {
+ cert = PK11_FindCertFromNickname(names->nicknames[i],proto_win);
+ if ( !cert )
+ continue;
+ /* Only check unexpired certs */
+ if (CERT_CheckCertValidTimes(cert, PR_Now(), PR_TRUE) !=
+ secCertTimeValid ) {
+ CERT_DestroyCertificate(cert);
+ continue;
+ }
+ rv = NSS_CmpCertChainWCANames(cert, caNames);
+ if ( rv == SECSuccess ) {
+ privkey = PK11_FindKeyByAnyCert(cert, proto_win);
+ if ( privkey )
+ break;
+ }
+ rv = SECFailure;
+ CERT_DestroyCertificate(cert);
+ }
+ CERT_FreeNicknames(names);
+ }
+ }
+ if (rv == SECSuccess) {
+ *pRetCert = cert;
+ *pRetKey = privkey;
+ }
+ return rv;
+}
+
+
+
+
+static void
+printSecurityInfo(PRFileDesc *fd)
+{
+ char * cp; /* bulk cipher name */
+ char * ip; /* cert issuer DN */
+ char * sp; /* cert subject DN */
+ int op; /* High, Low, Off */
+ int kp0; /* total key bits */
+ int kp1; /* secret key bits */
+ int result;
+
+ static int only_once;
+
+ if (! only_once++ && fd) {
+ result = SSL_SecurityStatus(fd, &op, &cp, &kp0, &kp1, &ip, &sp);
+ if (result != SECSuccess)
+ return;
+#if 0
+ PRINTF("bulk cipher %s, %d secret key bits, %d key bits, status: %d\n"
+ "subject DN: %s\n"
+ "issuer DN: %s\n", cp, kp1, kp0, op, sp, ip);
+#else
+ PRINTF("bulk cipher %s, %d secret key bits, %d key bits, status: %d\n",
+ cp, kp1, kp0, op);
+#endif
+ PR_Free(cp);
+ PR_Free(ip);
+ PR_Free(sp);
+ }
+
+}
+
+
+PRBool useModelSocket = PR_TRUE;
+
+static const char outHeader[] = {
+ "HTTP/1.0 200 OK\r\n"
+ "Server: Netscape-Enterprise/2.0a\r\n"
+ "Date: Tue, 26 Aug 1997 22:10:05 GMT\r\n"
+ "Content-type: text/plain\r\n"
+ "\r\n"
+};
+
+
+static PRInt32
+do_writes(
+ void * a
+)
+{
+ PRFileDesc * ssl_sock = (PRFileDesc *)a;
+ PRUint32 sent = 0;
+ PRInt32 count = 0;
+
+ while (sent < bigBuf.len) {
+
+ count = PR_Write(ssl_sock, bigBuf.data + sent, bigBuf.len - sent);
+ if (count < 0) {
+ errWarn("PR_Write bigBuf");
+ exit(4);
+ break;
+ }
+ FPRINTF(stderr, "PR_Write wrote %d bytes from bigBuf\n", count );
+ FPRINTF(stderr, "bytes: [%*s]\n",count,bigBuf.data);
+
+ sent += (PRUint32)count;
+ }
+ if (count >= 0) { /* last write didn't fail. */
+ FPRINTF(stderr, "do_writes shutting down send socket\n");
+ /* PR_Shutdown(ssl_sock, PR_SHUTDOWN_SEND); */
+ }
+
+ FPRINTF(stderr, "do_writes exiting with (failure = %d)\n",
+ (sent < bigBuf.len) == SECFailure);
+ return (sent < bigBuf.len) ? SECFailure : SECSuccess;
+}
+
+
+
+
+static SECStatus
+do_io( PRFileDesc *ssl_sock, int connection)
+{
+ int countRead = 0;
+ PRInt32 rv;
+ char *buf;
+ int first=1;
+
+ buf = PR_Malloc(RD_BUF_SIZE);
+ if (!buf) exit(5);
+
+
+ /* send the http request here. */
+
+ rv = do_writes(ssl_sock);
+
+ if (rv == SECFailure) {
+ errWarn("returning from after calling do_writes");
+ PR_Free(buf);
+ buf = 0;
+ exit(6);
+ }
+ printSecurityInfo(ssl_sock);
+
+ /* read until EOF */
+ while (1) {
+ rv = PR_Read(ssl_sock, buf, RD_BUF_SIZE);
+ if (rv == 0) {
+ break; /* EOF */
+ }
+ if (rv < 0) {
+ errWarn("PR_Read");
+ exit(1);
+ }
+
+ countRead += rv;
+ FPRINTF(stderr, "connection %d read %d bytes (%d total).\n",
+ connection, rv, countRead );
+ FPRINTF(stderr, "these bytes read: ");
+ if (verbose) {
+ PR_Write(PR_STDERR,buf,rv);
+ }
+
+ if (first) {
+ first=0;
+ if (rv < 13) {
+ errWarn("not enough bytes read in first read");
+ exit(2);
+ } else {
+ if ( ! PL_strnstr(buf,"200",13)) {
+ exit(3);
+ }
+ }
+ }
+ }
+ PR_Free(buf);
+ buf = 0;
+
+ /* Caller closes the socket. */
+
+ FPRINTF(stderr,
+ "connection %d read %d bytes total. -----------------------------\n",
+ connection, countRead);
+
+ return SECSuccess; /* success */
+}
+
+static int
+do_connect(
+ PRNetAddr *addr,
+ PRFileDesc *model_sock,
+ int connection)
+{
+ PRFileDesc * ssl_sock;
+ PRFileDesc * tcp_sock;
+ PRStatus prStatus;
+ SECStatus result;
+ int rv = SECSuccess;
+ PRSocketOptionData opt;
+
+ int family = PR_NetAddrFamily( addr );
+
+ tcp_sock = PR_OpenTCPSocket( family );
+ if (tcp_sock == NULL) {
+ errExit("PR_OpenTCPSocket on tcp socket");
+ }
+
+ opt.option = PR_SockOpt_Nonblocking;
+ opt.value.non_blocking = PR_FALSE;
+ prStatus = PR_SetSocketOption(tcp_sock, &opt);
+ if (prStatus != PR_SUCCESS) {
+ if( tcp_sock != NULL ) {
+ PR_Close(tcp_sock);
+ tcp_sock = NULL;
+ }
+ /* Don't return SECFailure? */
+ return SECSuccess;
+ }
+
+ prStatus = PR_Connect(tcp_sock, addr, PR_SecondsToInterval(3));
+ if (prStatus != PR_SUCCESS) {
+ errWarn("PR_Connect");
+ if( tcp_sock != NULL ) {
+ PR_Close(tcp_sock);
+ tcp_sock = NULL;
+ }
+ exit(6);
+ }
+
+ ssl_sock = SSL_ImportFD(model_sock, tcp_sock);
+ /* XXX if this import fails, close tcp_sock and return. */
+ if (!ssl_sock) {
+ if( tcp_sock != NULL ) {
+ PR_Close(tcp_sock);
+ tcp_sock = NULL;
+ }
+ exit(7);
+ }
+
+ rv = SSL_ResetHandshake(ssl_sock, /* asServer */ 0);
+ if (rv != SECSuccess) {
+ errWarn("SSL_ResetHandshake");
+ exit(8);
+ }
+
+ result = do_io( ssl_sock, connection);
+
+ if( ssl_sock != NULL ) {
+ PR_Close(ssl_sock);
+ ssl_sock = NULL;
+ }
+ return SECSuccess;
+}
+
+#if 0
+/* Returns IP address for hostname as PRUint32 in Host Byte Order.
+** Since the value returned is an integer (not a string of bytes),
+** it is inherently in Host Byte Order.
+*/
+static PRUint32
+getIPAddress(const char * hostName)
+{
+ const unsigned char *p;
+ PRStatus prStatus;
+ PRUint32 rv;
+ PRHostEnt prHostEnt;
+ char scratch[PR_NETDB_BUF_SIZE];
+
+ prStatus = PR_GetHostByName(hostName, scratch, sizeof scratch, &prHostEnt);
+ if (prStatus != PR_SUCCESS)
+ errExit("PR_GetHostByName");
+
+#undef h_addr
+#define h_addr h_addr_list[0] /* address, for backward compatibility */
+
+ p = (const unsigned char *)(prHostEnt.h_addr); /* in Network Byte order */
+ FPRINTF(stderr, "%s -> %d.%d.%d.%d\n", hostName, p[0], p[1], p[2], p[3]);
+ rv = (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3];
+ return rv;
+}
+#endif
+
+static void
+client_main(
+ unsigned short port,
+ int connections,
+ SECKEYPrivateKey ** privKey,
+ CERTCertificate ** cert,
+ const char * hostName,
+ char * nickName)
+{
+ PRFileDesc *model_sock = NULL;
+ int rv;
+ PRAddrInfo *ai;
+ void *iter;
+ PRNetAddr addr;
+ int family = PR_AF_INET;
+
+
+
+ FPRINTF(stderr, "port: %d\n", port);
+
+ /* all suites except RSA_NULL_MD5 are enabled by Domestic Policy */
+ NSS_SetDomesticPolicy();
+
+ /* all the SSL2 and SSL3 cipher suites are enabled by default. */
+ /* SSL_CipherPrefSetDefault(0xC005 */
+ /* TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA */
+ /*, PR_TRUE); */
+
+ /*
+ * Rifle through the values for the host
+ */
+
+ ai = PR_GetAddrInfoByName(hostName, PR_AF_UNSPEC, PR_AI_ADDRCONFIG);
+ if (ai) {
+ FPRINTF( stderr, "addr='%s'\n", PR_GetCanonNameFromAddrInfo( ai ) );
+ iter = NULL;
+ while ((iter = PR_EnumerateAddrInfo(iter, ai, 0, &addr)) != NULL) {
+ family = PR_NetAddrFamily(&addr);
+ FPRINTF( stderr, "family='%d'\n", family );
+ break;
+ }
+ PR_FreeAddrInfo(ai);
+ }
+
+ PR_SetNetAddr( PR_IpAddrNull, family, port, &addr );
+
+ model_sock = PR_OpenTCPSocket( family );
+ if (model_sock == NULL) {
+ errExit("PR_OpenTCPSocket on tcp socket");
+ }
+
+ /* Should we really be re-using the same socket? */
+ model_sock = SSL_ImportFD(NULL, model_sock);
+
+
+ /* check on success of call to SSL_ImportFD() */
+ if (model_sock == NULL) {
+ errExit("SSL_ImportFD");
+ }
+
+ /* enable ECC cipher also */
+
+ /* do SSL configuration. */
+
+ rv = SSL_OptionSet(model_sock, SSL_SECURITY, 1);
+ if (rv < 0) {
+ if( model_sock != NULL ) {
+ PR_Close( model_sock );
+ model_sock = NULL;
+ }
+ errExit("SSL_OptionSet SSL_SECURITY");
+ }
+
+ SSL_SetURL(model_sock, hostName);
+
+ SSL_AuthCertificateHook(model_sock, mySSLAuthCertificate,
+ (void *)CERT_GetDefaultCertDB());
+
+ SSL_BadCertHook(model_sock, myBadCertHandler, NULL);
+
+ SSL_GetClientAuthDataHook(model_sock,
+ (SSLGetClientAuthData)my_GetClientAuthData,
+ nickName);
+
+ /* I'm not going to set the HandshakeCallback function. */
+
+ /* end of ssl configuration. */
+
+ rv = do_connect(&addr, model_sock, 1);
+
+ if( model_sock != NULL ) {
+ PR_Close( model_sock );
+ model_sock = NULL;
+ }
+}
+
+
+static SECStatus
+createRequest(char *progName, char *path)
+{
+ char *temp;
+ char * newstr;
+ FILE *fp;
+
+ temp = (char *)malloc(MAXLEN);
+ fp = fopen(path, "r");
+ if (fp == NULL) {
+ fputs("Input file must be provided on command line in this version"
+ " of bulk issuance client.\n", stderr);
+ Usage(progName);
+ } else {
+ temp = fgets(temp, MAXLEN, fp);
+ if (temp == NULL) {
+ fclose(fp);
+ fputs("File is empty\n", stderr);
+ exit(1);
+ }
+
+ fclose(fp);
+ }
+
+ newstr = PR_smprintf("%s\r\n\r\n", temp);
+/*
+ "GET /ca/bulkissuance?csrRequestorName=++&CN=a&UID=a&E=a&OU=&O=&C=US&email=true&ssl_client=true&digital_signature=true&non_repudiation=true&key_encipherment=true&challengePassword=&confirmChallengePassword=&csrRequestorEmail=a&csrRequestorPhone=&csrRequestorComments=&CRMFRequest=MIICTDCB%2BzCB8wICJ4EwgbWAAQKlQDA%2BMQswCQYDVQQGEwJVUzERMA8GCgmSJomT%0D%0A8ixkAQETAWExCjAIBgNVBAMTAWExEDAOBgkqhkiG9w0BCQEWAWGmXDANBgkqhkiG%0D%0A9w0BAQEFAANLADBIAkEA3R3vkvw3%2F4f5eDJZszB2%2B8BhWtNgwX97KV%2FydZ1kPlei%0D%0AcJwIcHfLbp6tRYs2iKAxbTuw01H1P9gdUIx1nY7R0QIDAQABqRAwDgYDVR0PAQH%2F%0D%0ABAQDAgUgMDUwGwYJKwYBBQUHBQECDA5hdXRoZW50aWNhdG9yADAWBgkrBgEFBQcF%0D%0AAQEMCXJlZ1Rva2VuAKIDgQEBMIIBSjCB8wICRGswgbWAAQKlQDA%2BMQswCQYDVQQG%0D%0AEwJVUzERMA8GCgmSJomT8ixkAQETAWExCjAIBgNVBAMTAWExEDAOBgkqhkiG9w0B%0D%0ACQEWAWGmXDANBgkqhkiG9w0BAQEFAANLADBIAkEAuf9KVCouLB6rKI290XpSghLe%0D%0APtYxSBdGv5gnzYVyokz9DPSSTeRBCUQDGWCVMIgMrUMABK0tkXPlVrD8lylVWQID%0D%0AAQABqRAwDgYDVR0PAQH%2FBAQDAgeAMDUwGwYJKwYBBQUHBQECDA5hdXRoZW50aWNh%0D%0AdG9yADAWBgkrBgEFBQcFAQEMCXJlZ1Rva2VuAKFSMA0GCSqGSIb3DQEBBQUAA0EA%0D%0Aq0tNDOzqcDI%2BwQ6gZMsCbYLh7MBBAzJo8Z67ddx%2BOS%2FZjCAtAbdabeazQnu0UOfN%0D%0A0HwLPDcNuurcvw4y604ang%3D%3D&cmmfResponse=true&certNickname=E%3Da%2C+CN%3Da%2C+UID%3Da%2C+C%3DUS&subject=E%3Da%2C+CN%3Da%2C+UID%3Da%2C+C%3DUS&requestFormat=keygen&certType=client HTTP/1.0\r\n"
+ "Content-Type: application/x-www-form-urlencoded\r\n"
+ "\r\n");
+*/
+
+ bigBuf.data = (unsigned char *)newstr;
+
+ FPUTS((char *)bigBuf.data, stderr);
+
+ bigBuf.len = PORT_Strlen((char *)bigBuf.data);
+
+ free(temp);
+
+ return SECSuccess;
+}
+
+int
+main(int argc, char **argv)
+{
+ const char * dir = ".";
+ char * hostName = NULL;
+ char * nickName = NULL;
+ char * progName = NULL;
+ char * tmp = NULL;
+ CERTCertificate * cert [kt_kea_size] = { NULL };
+ SECKEYPrivateKey * privKey[kt_kea_size] = { NULL };
+ int optchar;
+ int connections = 1;
+ int tmpI;
+ unsigned short port = 443;
+ SECStatus rv;
+ char * passwd = NULL;
+ char * passwdfile = NULL;
+ char path[1000];
+ FILE *fp;
+ char pwbuf[256];
+ int co;
+ char *crlf;
+
+ /* Call the NSPR initialization routines */
+ PR_Init( PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
+
+ tmp = strrchr(argv[0], '/');
+ tmp = tmp ? tmp + 1 : argv[0];
+ progName = strrchr(tmp, '\\');
+ progName = progName ? progName + 1 : tmp;
+
+
+ while ((optchar = getopt(argc, argv, "Vd:n:p:f:v")) != -1) {
+ switch(optchar) {
+
+ case 'V':
+ PRINTF("%s\n",VERSIONSTRING);
+ break;
+
+ case 'd':
+ dir = optarg;
+ break;
+
+ case 'n':
+ nickName = optarg;
+ break;
+
+ case 'p':
+ passwd = optarg;
+ break;
+
+ case 'w':
+ passwdfile = optarg;
+ break;
+
+ case 'v':
+ verbose++;
+ break;
+
+ case 'f':
+ strcpy(path, optarg);
+ break;
+
+ default:
+ case '?':
+ Usage(progName);
+ break;
+
+ }
+ }
+ if (optind != argc - 1)
+ Usage(progName);
+
+ hostName = argv[optind];
+ tmp = strchr(hostName, ':');
+ if (tmp) {
+ *tmp++ = 0;
+ tmpI = atoi(tmp);
+ if (tmpI <= 0)
+ Usage(progName);
+ port = (unsigned short)tmpI;
+ }
+
+ if (!nickName)
+ Usage(progName);
+
+ createRequest(progName, path);
+
+ if (passwdfile) {
+ fp = fopen(passwdfile,"r");
+ if (!fp) { fprintf(stderr, "Couldn't open password file\n"); exit(7); }
+ co = fread(pwbuf,1,256,fp);
+ pwbuf[co] = '\0';
+ crlf = PL_strchr(pwbuf,'\n');
+ if (crlf) {
+ *crlf = '\0';
+ }
+ passwd = pwbuf;
+ }
+
+ /* set our password function */
+ if (passwd == NULL) {
+ PRINTF("Password must be provided on command line in this version of revoker.\n");
+ Usage(progName);
+ }
+ PK11_SetPasswordFunc(ownPasswd);
+
+ /* Call the libsec initialization routines */
+ rv = NSS_Init(dir);
+ if (rv != SECSuccess) {
+ fputs("NSS_Init failed.\n", stderr);
+ exit(1);
+ }
+
+ cert[kt_rsa] = PK11_FindCertFromNickname(nickName, passwd);
+ if (cert[kt_rsa] == NULL) {
+ fprintf(stderr, "Can't find certificate %s\n", nickName);
+ exit(1);
+ }
+
+ privKey[kt_rsa] = PK11_FindKeyByAnyCert(cert[kt_rsa], passwd);
+ if (privKey[kt_rsa] == NULL) {
+ fprintf(stderr, "Can't find Private Key for cert %s (possibly incorrect password)\n", nickName);
+ exit(1);
+ }
+
+
+ client_main(port, connections, privKey, cert, hostName, nickName);
+
+ NSS_Shutdown();
+ PR_Cleanup();
+ return 0;
+}
+