p7env.c
上传用户:lyxiangda
上传日期:2007-01-12
资源大小:3042k
文件大小:7k
- /*
- * The contents of this file are subject to the Mozilla Public
- * License Version 1.1 (the "License"); you may not use this file
- * except in compliance with the License. You may obtain a copy of
- * the License at http://www.mozilla.org/MPL/
- *
- * Software distributed under the License is distributed on an "AS
- * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
- * implied. See the License for the specific language governing
- * rights and limitations under the License.
- *
- * The Original Code is the Netscape security libraries.
- *
- * The Initial Developer of the Original Code is Netscape
- * Communications Corporation. Portions created by Netscape are
- * Copyright (C) 1994-2000 Netscape Communications Corporation. All
- * Rights Reserved.
- *
- * Contributor(s):
- *
- * Alternatively, the contents of this file may be used under the
- * terms of the GNU General Public License Version 2 or later (the
- * "GPL"), in which case the provisions of the GPL are applicable
- * instead of those above. If you wish to allow use of your
- * version of this file only under the terms of the GPL and not to
- * allow others to use your version of this file under the MPL,
- * indicate your decision by deleting the provisions above and
- * replace them with the notice and other provisions required by
- * the GPL. If you do not delete the provisions above, a recipient
- * may use your version of this file under either the MPL or the
- * GPL.
- */
- /*
- * p7env -- A command to create a pkcs7 enveloped data.
- *
- * $Id: p7env.c,v 1.1 2000/03/31 20:12:23 relyea%netscape.com Exp $
- */
- #include "nspr.h"
- #include "secutil.h"
- #include "plgetopt.h"
- #include "secpkcs7.h"
- #include "cert.h"
- #include "certdb.h"
- #include "cdbhdl.h"
- #if defined(XP_UNIX)
- #include <unistd.h>
- #endif
- #include <stdio.h>
- #include <string.h>
- #if (defined(XP_WIN) && !defined(WIN32)) || (defined(__sun) && !defined(SVR4))
- extern int fread(char *, size_t, size_t, FILE*);
- extern int fwrite(char *, size_t, size_t, FILE*);
- extern int fprintf(FILE *, char *, ...);
- #endif
- extern void SEC_Init(void); /* XXX */
- static void
- Usage(char *progName)
- {
- fprintf(stderr,
- "Usage: %s -r recipient [-d dbdir] [-i input] [-o output]n",
- progName);
- fprintf(stderr, "%-20s Nickname of cert to use for encryptionn",
- "-r recipient");
- fprintf(stderr, "%-20s Cert database directory (default is ~/.netscape)n",
- "-d dbdir");
- fprintf(stderr, "%-20s Define an input file to use (default is stdin)n",
- "-i input");
- fprintf(stderr, "%-20s Define an output file to use (default is stdout)n",
- "-o output");
- exit(-1);
- }
- static CERTCertDBHandle certHandleStatic; /* avoid having to allocate */
- static CERTCertDBHandle *
- OpenCertDB(char *progName)
- {
- CERTCertDBHandle *certHandle;
- SECStatus rv;
- certHandle = &certHandleStatic;
- rv = CERT_OpenCertDB(certHandle, PR_FALSE, SECU_CertDBNameCallback, NULL);
- if (rv != SECSuccess) {
- SECU_PrintError(progName, "could not open cert database");
- return NULL;
- }
- return certHandle;
- }
- struct recipient {
- struct recipient *next;
- char *nickname;
- CERTCertificate *cert;
- };
- static void
- EncryptOut(void *arg, const char *buf, unsigned long len)
- {
- FILE *out;
- out = arg;
- fwrite (buf, len, 1, out);
- }
- static int
- EncryptFile(FILE *outFile, FILE *inFile, struct recipient *recipients,
- char *progName)
- {
- SEC_PKCS7ContentInfo *cinfo;
- SEC_PKCS7EncoderContext *ecx;
- struct recipient *rcpt;
- SECStatus rv;
- if (outFile == NULL || inFile == NULL || recipients == NULL)
- return -1;
- /* XXX Need a better way to handle that certUsage stuff! */
- /* XXX keysize? */
- cinfo = SEC_PKCS7CreateEnvelopedData (recipients->cert,
- certUsageEmailRecipient,
- NULL, SEC_OID_DES_EDE3_CBC, 0,
- NULL, NULL);
- if (cinfo == NULL)
- return -1;
- for (rcpt = recipients->next; rcpt != NULL; rcpt = rcpt->next) {
- rv = SEC_PKCS7AddRecipient (cinfo, rcpt->cert, certUsageEmailRecipient,
- NULL);
- if (rv != SECSuccess) {
- SECU_PrintError(progName, "error adding recipient "%s"",
- rcpt->nickname);
- return -1;
- }
- }
- ecx = SEC_PKCS7EncoderStart (cinfo, EncryptOut, outFile, NULL);
- if (ecx == NULL)
- return -1;
- for (;;) {
- char ibuf[1024];
- int nb;
-
- if (feof(inFile))
- break;
- nb = fread(ibuf, 1, sizeof(ibuf), inFile);
- if (nb == 0) {
- if (ferror(inFile)) {
- PORT_SetError(SEC_ERROR_IO);
- rv = SECFailure;
- }
- break;
- }
- rv = SEC_PKCS7EncoderUpdate(ecx, ibuf, nb);
- if (rv != SECSuccess)
- break;
- }
- if (SEC_PKCS7EncoderFinish(ecx, NULL, NULL) != SECSuccess)
- rv = SECFailure;
- SEC_PKCS7DestroyContentInfo (cinfo);
- if (rv != SECSuccess)
- return -1;
- return 0;
- }
- int
- main(int argc, char **argv)
- {
- char *progName;
- FILE *inFile, *outFile;
- char *certName;
- CERTCertDBHandle *certHandle;
- CERTCertificate *cert;
- struct recipient *recipients, *rcpt;
- PLOptState *optstate;
- PLOptStatus status;
- progName = strrchr(argv[0], '/');
- progName = progName ? progName+1 : argv[0];
- inFile = NULL;
- outFile = NULL;
- certName = NULL;
- recipients = NULL;
- rcpt = NULL;
- /*
- * Parse command line arguments
- * XXX This needs to be enhanced to allow selection of algorithms
- * and key sizes (or to look up algorithms and key sizes for each
- * recipient in the magic database).
- */
- optstate = PL_CreateOptState(argc, argv, "d:i:o:r:");
- while ((status = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
- switch (optstate->option) {
- case '?':
- Usage(progName);
- break;
- case 'd':
- SECU_ConfigDirectory(optstate->value);
- break;
- case 'i':
- inFile = fopen(optstate->value, "r");
- if (!inFile) {
- fprintf(stderr, "%s: unable to open "%s" for readingn",
- progName, optstate->value);
- return -1;
- }
- break;
- case 'o':
- outFile = fopen(optstate->value, "w");
- if (!outFile) {
- fprintf(stderr, "%s: unable to open "%s" for writingn",
- progName, optstate->value);
- return -1;
- }
- break;
- case 'r':
- if (rcpt == NULL) {
- recipients = rcpt = PORT_Alloc (sizeof(struct recipient));
- } else {
- rcpt->next = PORT_Alloc (sizeof(struct recipient));
- rcpt = rcpt->next;
- }
- if (rcpt == NULL) {
- fprintf(stderr, "%s: unable to allocate recipient structn",
- progName);
- return -1;
- }
- rcpt->nickname = strdup(optstate->value);
- rcpt->cert = NULL;
- rcpt->next = NULL;
- break;
- }
- }
- if (!recipients) Usage(progName);
- if (!inFile) inFile = stdin;
- if (!outFile) outFile = stdout;
- /* Call the libsec initialization routines */
- PR_Init(PR_SYSTEM_THREAD, PR_PRIORITY_NORMAL, 1);
- SECU_PKCS11Init(PR_FALSE);
- SEC_Init();
- /* open cert database */
- certHandle = OpenCertDB(progName);
- if (certHandle == NULL) {
- return -1;
- }
- CERT_SetDefaultCertDB(certHandle);
- /* find certs */
- for (rcpt = recipients; rcpt != NULL; rcpt = rcpt->next) {
- rcpt->cert = CERT_FindCertByNickname(certHandle, rcpt->nickname);
- if (rcpt->cert == NULL) {
- SECU_PrintError(progName,
- "the cert for name "%s" not found in database",
- rcpt->nickname);
- return -1;
- }
- }
- if (EncryptFile(outFile, inFile, recipients, progName)) {
- SECU_PrintError(progName, "problem encrypting data");
- return -1;
- }
- return 0;
- }