summaryrefslogtreecommitdiffstats
path: root/pki/base/native-tools/src/tkstool/delete.c
blob: f40e66d16a241a058a13f2f9683009471656c12e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
/* --- BEGIN COPYRIGHT BLOCK ---
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; version 2 of the License.
 * 
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 * 
 * You should have received a copy of the GNU General Public License along
 * with this program; if not, write to the Free Software Foundation, Inc.,
 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
 * 
 * Copyright (C) 2007 Red Hat, Inc.
 * All rights reserved.
 * --- END COPYRIGHT BLOCK ---
 */

#include "tkstool.h"

static SECStatus
DeleteKey( char       *keyname,
           PK11SymKey *key )
{
    char      *name = NULL;
    SECStatus  rv   = SECFailure;

    name = PK11_GetSymKeyNickname( /* symmetric key */  key );
    if( name == NULL ) {
        name = PORT_Strdup( "< orphaned >" );
    }

    /* Delete this key ONLY if its name is the specified keyname */
    /*                                                           */
    /* NOTE:  If duplicate keys are allowed to be added to an    */
    /*        individual token, this function will delete        */
    /*        EVERY key named by the specified keyname;          */
    /*        therefore, MORE than ONE key may be DELETED from   */
    /*        the specified token!!!                             */
    if( PL_strcmp( keyname, name ) == 0 ) {
        rv = PK11_DeleteTokenSymKey( /* symmetric key */  key );
    }

    PORT_Free( name );

    return rv;
}


SECStatus
TKS_DeleteKeys( char *progName,
                PK11SlotInfo *slot,
                char *keyname,
                secuPWData *pwdata )
{
    int         count        = 0;
    int         keys_deleted = 0;
    PK11SymKey *symKey       = NULL;
    PK11SymKey *nextSymKey   = NULL;
    SECStatus   rvDelete     = SECFailure;
    SECStatus   rv;

    if( PK11_NeedLogin( /* slot */  slot ) ) {
        PK11_Authenticate( 
        /* slot       */   slot,
        /* load certs */   PR_TRUE,
        /* wincx      */   pwdata );
    }

    /* Initialize the symmetric key list. */
    symKey = PK11_ListFixedKeysInSlot( 
             /* slot     */            slot,
             /* nickname */            NULL,
             /* wincx    */            ( void *) pwdata );

    /* Iterate through the symmetric key list. */
	while( symKey != NULL ) {
        rvDelete = DeleteKey( keyname,
                              symKey );
        if( rvDelete != SECFailure ) {
            keys_deleted++;
        }

		nextSymKey = PK11_GetNextSymKey( /* symmetric key */  symKey );
        PK11_FreeSymKey( /* symmetric key */  symKey );
        symKey = nextSymKey;
		
        count++;
    }

    if( keys_deleted == 0 ) {
        PR_fprintf( PR_STDOUT,
                    "\t%s: no key(s) called \"%s\" could be deleted\n",
                    progName,
                    keyname );

        rv = SECFailure;
    } else {
        PR_fprintf( PR_STDOUT,
                    "%s: %d key(s) called \"%s\" were deleted\n",
                    progName,
                    keys_deleted,
                    keyname );

        rv = SECSuccess;
    }

    return rv;
}