mirror of
https://github.com/rn10950/RetroZilla.git
synced 2024-11-16 12:30:13 +01:00
257 lines
6.4 KiB
C
257 lines
6.4 KiB
C
/* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is the Netscape security libraries.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Netscape Communications Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 1994-2000
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either the GNU General Public License Version 2 or later (the "GPL"), or
|
|
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
#include "secutil.h"
|
|
#include "pk11func.h"
|
|
#include "secoid.h"
|
|
|
|
#if defined(XP_WIN) || (defined(__sun) && !defined(SVR4))
|
|
#if !defined(WIN32)
|
|
extern int fread(char *, size_t, size_t, FILE*);
|
|
extern int fwrite(char *, size_t, size_t, FILE*);
|
|
extern int fprintf(FILE *, char *, ...);
|
|
#endif
|
|
#endif
|
|
|
|
#include "plgetopt.h"
|
|
|
|
static SECOidData *
|
|
HashTypeToOID(HASH_HashType hashtype)
|
|
{
|
|
SECOidTag hashtag;
|
|
|
|
if (hashtype <= HASH_AlgNULL || hashtype >= HASH_AlgTOTAL)
|
|
return NULL;
|
|
|
|
switch (hashtype) {
|
|
case HASH_AlgMD2:
|
|
hashtag = SEC_OID_MD2;
|
|
break;
|
|
case HASH_AlgMD5:
|
|
hashtag = SEC_OID_MD5;
|
|
break;
|
|
case HASH_AlgSHA1:
|
|
hashtag = SEC_OID_SHA1;
|
|
break;
|
|
default:
|
|
fprintf(stderr, "A new hash type has been added to HASH_HashType.\n");
|
|
fprintf(stderr, "This program needs to be updated!\n");
|
|
return NULL;
|
|
}
|
|
|
|
return SECOID_FindOIDByTag(hashtag);
|
|
}
|
|
|
|
static SECOidData *
|
|
HashNameToOID(const char *hashName)
|
|
{
|
|
HASH_HashType htype;
|
|
SECOidData *hashOID;
|
|
|
|
for (htype = HASH_AlgNULL + 1; htype < HASH_AlgTOTAL; htype++) {
|
|
hashOID = HashTypeToOID(htype);
|
|
if (PORT_Strcasecmp(hashName, hashOID->desc) == 0)
|
|
break;
|
|
}
|
|
|
|
if (htype == HASH_AlgTOTAL)
|
|
return NULL;
|
|
|
|
return hashOID;
|
|
}
|
|
|
|
static void
|
|
Usage(char *progName)
|
|
{
|
|
HASH_HashType htype;
|
|
|
|
fprintf(stderr,
|
|
"Usage: %s -t type [-i input] [-o output]\n",
|
|
progName);
|
|
fprintf(stderr, "%-20s Specify the digest method (must be one of\n",
|
|
"-t type");
|
|
fprintf(stderr, "%-20s ", "");
|
|
for (htype = HASH_AlgNULL + 1; htype < HASH_AlgTOTAL; htype++) {
|
|
fprintf(stderr, HashTypeToOID(htype)->desc);
|
|
if (htype == (HASH_AlgTOTAL - 2))
|
|
fprintf(stderr, " or ");
|
|
else if (htype != (HASH_AlgTOTAL - 1))
|
|
fprintf(stderr, ", ");
|
|
}
|
|
fprintf(stderr, " (case ignored))\n");
|
|
fprintf(stderr, "%-20s Define an input file to use (default is stdin)\n",
|
|
"-i input");
|
|
fprintf(stderr, "%-20s Define an output file to use (default is stdout)\n",
|
|
"-o output");
|
|
exit(-1);
|
|
}
|
|
|
|
static int
|
|
DigestFile(FILE *outFile, FILE *inFile, SECOidData *hashOID)
|
|
{
|
|
int nb;
|
|
unsigned char ibuf[4096], digest[32];
|
|
PK11Context *hashcx;
|
|
unsigned int len;
|
|
SECStatus rv;
|
|
|
|
hashcx = PK11_CreateDigestContext(hashOID->offset);
|
|
if (hashcx == NULL) {
|
|
return -1;
|
|
}
|
|
PK11_DigestBegin(hashcx);
|
|
|
|
|
|
for (;;) {
|
|
if (feof(inFile)) break;
|
|
nb = fread(ibuf, 1, sizeof(ibuf), inFile);
|
|
if (nb != sizeof(ibuf)) {
|
|
if (nb == 0) {
|
|
if (ferror(inFile)) {
|
|
PORT_SetError(SEC_ERROR_IO);
|
|
PK11_DestroyContext(hashcx,PR_TRUE);
|
|
return -1;
|
|
}
|
|
/* eof */
|
|
break;
|
|
}
|
|
}
|
|
rv = PK11_DigestOp(hashcx, ibuf, nb);
|
|
if (rv != SECSuccess) {
|
|
PK11_DestroyContext(hashcx, PR_TRUE);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
rv = PK11_DigestFinal(hashcx, digest, &len, 32);
|
|
PK11_DestroyContext(hashcx, PR_TRUE);
|
|
|
|
if (rv != SECSuccess) return -1;
|
|
|
|
nb = fwrite(digest, 1, len, outFile);
|
|
if (nb != len) {
|
|
PORT_SetError(SEC_ERROR_IO);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
#include "nss.h"
|
|
|
|
int
|
|
main(int argc, char **argv)
|
|
{
|
|
char *progName;
|
|
FILE *inFile, *outFile;
|
|
char *hashName;
|
|
SECOidData *hashOID;
|
|
PLOptState *optstate;
|
|
PLOptStatus status;
|
|
SECStatus rv;
|
|
|
|
progName = strrchr(argv[0], '/');
|
|
progName = progName ? progName+1 : argv[0];
|
|
|
|
inFile = NULL;
|
|
outFile = NULL;
|
|
hashName = NULL;
|
|
|
|
rv = NSS_Init("/tmp");
|
|
if (rv != SECSuccess) {
|
|
fprintf(stderr, "%s: NSS_Init failed in directory %s\n",
|
|
progName, "/tmp");
|
|
return -1;
|
|
}
|
|
|
|
/*
|
|
* Parse command line arguments
|
|
*/
|
|
optstate = PL_CreateOptState(argc, argv, "t:i:o:");
|
|
while ((status = PL_GetNextOpt(optstate)) == PL_OPT_OK) {
|
|
switch (optstate->option) {
|
|
case '?':
|
|
Usage(progName);
|
|
break;
|
|
|
|
case 'i':
|
|
inFile = fopen(optstate->value, "r");
|
|
if (!inFile) {
|
|
fprintf(stderr, "%s: unable to open \"%s\" for reading\n",
|
|
progName, optstate->value);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case 'o':
|
|
outFile = fopen(optstate->value, "w");
|
|
if (!outFile) {
|
|
fprintf(stderr, "%s: unable to open \"%s\" for writing\n",
|
|
progName, optstate->value);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
case 't':
|
|
hashName = strdup(optstate->value);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!hashName) Usage(progName);
|
|
|
|
if (!inFile) inFile = stdin;
|
|
if (!outFile) outFile = stdout;
|
|
|
|
hashOID = HashNameToOID(hashName);
|
|
if (hashOID == NULL) {
|
|
fprintf(stderr, "%s: invalid digest type\n", progName);
|
|
Usage(progName);
|
|
}
|
|
|
|
if (DigestFile(outFile, inFile, hashOID)) {
|
|
fprintf(stderr, "%s: problem digesting data (%s)\n",
|
|
progName, SECU_Strerror(PORT_GetError()));
|
|
return -1;
|
|
}
|
|
|
|
if (NSS_Shutdown() != SECSuccess) {
|
|
exit(1);
|
|
}
|
|
|
|
return 0;
|
|
}
|