1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
|
/* --- BEGIN COPYRIGHT BLOCK ---
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; version 2 of the License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License along
* with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Copyright (C) 2007 Red Hat, Inc.
* All rights reserved.
* --- END COPYRIGHT BLOCK ---
*/
#include "tkstool.h"
static SECStatus
DeleteKey( char *keyname,
PK11SymKey *key )
{
char *name = NULL;
SECStatus rv = SECFailure;
name = PK11_GetSymKeyNickname( /* symmetric key */ key );
if( name == NULL ) {
name = PORT_Strdup( "< orphaned >" );
}
/* Delete this key ONLY if its name is the specified keyname */
/* */
/* NOTE: If duplicate keys are allowed to be added to an */
/* individual token, this function will delete */
/* EVERY key named by the specified keyname; */
/* therefore, MORE than ONE key may be DELETED from */
/* the specified token!!! */
if( PL_strcmp( keyname, name ) == 0 ) {
rv = PK11_DeleteTokenSymKey( /* symmetric key */ key );
}
PORT_Free( name );
return rv;
}
SECStatus
TKS_DeleteKeys( char *progName,
PK11SlotInfo *slot,
char *keyname,
secuPWData *pwdata )
{
int count = 0;
int keys_deleted = 0;
PK11SymKey *symKey = NULL;
PK11SymKey *nextSymKey = NULL;
SECStatus rvDelete = SECFailure;
SECStatus rv;
if( PK11_NeedLogin( /* slot */ slot ) ) {
PK11_Authenticate(
/* slot */ slot,
/* load certs */ PR_TRUE,
/* wincx */ pwdata );
}
/* Initialize the symmetric key list. */
symKey = PK11_ListFixedKeysInSlot(
/* slot */ slot,
/* nickname */ NULL,
/* wincx */ ( void *) pwdata );
/* Iterate through the symmetric key list. */
while( symKey != NULL ) {
rvDelete = DeleteKey( keyname,
symKey );
if( rvDelete != SECFailure ) {
keys_deleted++;
}
nextSymKey = PK11_GetNextSymKey( /* symmetric key */ symKey );
PK11_FreeSymKey( /* symmetric key */ symKey );
symKey = nextSymKey;
count++;
}
if( keys_deleted == 0 ) {
PR_fprintf( PR_STDOUT,
"\t%s: no key(s) called \"%s\" could be deleted\n",
progName,
keyname );
rv = SECFailure;
} else {
PR_fprintf( PR_STDOUT,
"%s: %d key(s) called \"%s\" were deleted\n",
progName,
keys_deleted,
keyname );
rv = SECSuccess;
}
return rv;
}
|