diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /security/nss/cmd/digest | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'security/nss/cmd/digest')
-rw-r--r-- | security/nss/cmd/digest/Makefile | 48 | ||||
-rw-r--r-- | security/nss/cmd/digest/digest.c | 228 | ||||
-rw-r--r-- | security/nss/cmd/digest/digest.gyp | 30 | ||||
-rw-r--r-- | security/nss/cmd/digest/manifest.mn | 22 |
4 files changed, 328 insertions, 0 deletions
diff --git a/security/nss/cmd/digest/Makefile b/security/nss/cmd/digest/Makefile new file mode 100644 index 000000000..c2039d82b --- /dev/null +++ b/security/nss/cmd/digest/Makefile @@ -0,0 +1,48 @@ +#! gmake +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +####################################################################### +# (1) Include initial platform-independent assignments (MANDATORY). # +####################################################################### + +include manifest.mn + +####################################################################### +# (2) Include "global" configuration information. (OPTIONAL) # +####################################################################### + +include $(CORE_DEPTH)/coreconf/config.mk + +####################################################################### +# (3) Include "component" configuration information. (OPTIONAL) # +####################################################################### + +####################################################################### +# (4) Include "local" platform-dependent assignments (OPTIONAL). # +####################################################################### + +include ../platlibs.mk + +####################################################################### +# (5) Execute "global" rules. (OPTIONAL) # +####################################################################### + +include $(CORE_DEPTH)/coreconf/rules.mk + +####################################################################### +# (6) Execute "component" rules. (OPTIONAL) # +####################################################################### + + + +####################################################################### +# (7) Execute "local" rules. (OPTIONAL). # +####################################################################### + + + +include ../platrules.mk + diff --git a/security/nss/cmd/digest/digest.c b/security/nss/cmd/digest/digest.c new file mode 100644 index 000000000..8c4c14926 --- /dev/null +++ b/security/nss/cmd/digest/digest.c @@ -0,0 +1,228 @@ +/* This Source Code Form is subject to the terms of the Mozilla Public + * License, v. 2.0. If a copy of the MPL was not distributed with this + * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ + +#include "secutil.h" +#include "pk11func.h" +#include "secoid.h" + +#if defined(XP_WIN) || (defined(__sun) && !defined(SVR4)) +#if !defined(WIN32) +extern int fread(char *, size_t, size_t, FILE *); +extern int fwrite(char *, size_t, size_t, FILE *); +extern int fprintf(FILE *, char *, ...); +#endif +#endif + +#include "plgetopt.h" + +static SECOidData * +HashTypeToOID(HASH_HashType hashtype) +{ + SECOidTag hashtag; + + if (hashtype <= HASH_AlgNULL || hashtype >= HASH_AlgTOTAL) + return NULL; + + switch (hashtype) { + case HASH_AlgMD2: + hashtag = SEC_OID_MD2; + break; + case HASH_AlgMD5: + hashtag = SEC_OID_MD5; + break; + case HASH_AlgSHA1: + hashtag = SEC_OID_SHA1; + break; + default: + fprintf(stderr, "A new hash type has been added to HASH_HashType.\n"); + fprintf(stderr, "This program needs to be updated!\n"); + return NULL; + } + + return SECOID_FindOIDByTag(hashtag); +} + +static SECOidData * +HashNameToOID(const char *hashName) +{ + HASH_HashType htype; + SECOidData *hashOID; + + for (htype = HASH_AlgNULL + 1; htype < HASH_AlgTOTAL; htype++) { + hashOID = HashTypeToOID(htype); + if (PORT_Strcasecmp(hashName, hashOID->desc) == 0) + break; + } + + if (htype == HASH_AlgTOTAL) + return NULL; + + return hashOID; +} + +static void +Usage(char *progName) +{ + HASH_HashType htype; + + fprintf(stderr, + "Usage: %s -t type [-i input] [-o output]\n", + progName); + fprintf(stderr, "%-20s Specify the digest method (must be one of\n", + "-t type"); + fprintf(stderr, "%-20s ", ""); + for (htype = HASH_AlgNULL + 1; htype < HASH_AlgTOTAL; htype++) { + fprintf(stderr, "%s", HashTypeToOID(htype)->desc); + if (htype == (HASH_AlgTOTAL - 2)) + fprintf(stderr, " or "); + else if (htype != (HASH_AlgTOTAL - 1)) + fprintf(stderr, ", "); + } + fprintf(stderr, " (case ignored))\n"); + fprintf(stderr, "%-20s Define an input file to use (default is stdin)\n", + "-i input"); + fprintf(stderr, "%-20s Define an output file to use (default is stdout)\n", + "-o output"); + exit(-1); +} + +static int +DigestFile(FILE *outFile, FILE *inFile, SECOidData *hashOID) +{ + int nb; + unsigned char ibuf[4096], digest[32]; + PK11Context *hashcx; + unsigned int len; + SECStatus rv; + + hashcx = PK11_CreateDigestContext(hashOID->offset); + if (hashcx == NULL) { + return -1; + } + PK11_DigestBegin(hashcx); + + for (;;) { + if (feof(inFile)) + break; + nb = fread(ibuf, 1, sizeof(ibuf), inFile); + if (nb != sizeof(ibuf)) { + if (nb == 0) { + if (ferror(inFile)) { + PORT_SetError(SEC_ERROR_IO); + PK11_DestroyContext(hashcx, PR_TRUE); + return -1; + } + /* eof */ + break; + } + } + rv = PK11_DigestOp(hashcx, ibuf, nb); + if (rv != SECSuccess) { + PK11_DestroyContext(hashcx, PR_TRUE); + return -1; + } + } + + rv = PK11_DigestFinal(hashcx, digest, &len, 32); + PK11_DestroyContext(hashcx, PR_TRUE); + + if (rv != SECSuccess) + return -1; + + nb = fwrite(digest, 1, len, outFile); + if (nb != len) { + PORT_SetError(SEC_ERROR_IO); + return -1; + } + + return 0; +} + +#include "nss.h" + +int +main(int argc, char **argv) +{ + char *progName; + FILE *inFile, *outFile; + char *hashName; + SECOidData *hashOID; + PLOptState *optstate; + PLOptStatus status; + SECStatus rv; + + progName = strrchr(argv[0], '/'); + progName = progName ? progName + 1 : argv[0]; + + inFile = NULL; + outFile = NULL; + hashName = NULL; + + rv = NSS_Init("/tmp"); + if (rv != SECSuccess) { + fprintf(stderr, "%s: NSS_Init failed in directory %s\n", + progName, "/tmp"); + return -1; + } + + /* + * Parse command line arguments + */ + optstate = PL_CreateOptState(argc, argv, "t:i:o:"); + while ((status = PL_GetNextOpt(optstate)) == PL_OPT_OK) { + switch (optstate->option) { + case '?': + Usage(progName); + break; + + case 'i': + inFile = fopen(optstate->value, "r"); + if (!inFile) { + fprintf(stderr, "%s: unable to open \"%s\" for reading\n", + progName, optstate->value); + return -1; + } + break; + + case 'o': + outFile = fopen(optstate->value, "w"); + if (!outFile) { + fprintf(stderr, "%s: unable to open \"%s\" for writing\n", + progName, optstate->value); + return -1; + } + break; + + case 't': + hashName = strdup(optstate->value); + break; + } + } + + if (!hashName) + Usage(progName); + + if (!inFile) + inFile = stdin; + if (!outFile) + outFile = stdout; + + hashOID = HashNameToOID(hashName); + if (hashOID == NULL) { + fprintf(stderr, "%s: invalid digest type\n", progName); + Usage(progName); + } + + if (DigestFile(outFile, inFile, hashOID)) { + fprintf(stderr, "%s: problem digesting data (%s)\n", + progName, SECU_Strerror(PORT_GetError())); + return -1; + } + + if (NSS_Shutdown() != SECSuccess) { + exit(1); + } + + return 0; +} diff --git a/security/nss/cmd/digest/digest.gyp b/security/nss/cmd/digest/digest.gyp new file mode 100644 index 000000000..c2e00289f --- /dev/null +++ b/security/nss/cmd/digest/digest.gyp @@ -0,0 +1,30 @@ +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. +{ + 'includes': [ + '../../coreconf/config.gypi', + '../../cmd/platlibs.gypi' + ], + 'targets': [ + { + 'target_name': 'digest', + 'type': 'executable', + 'sources': [ + 'digest.c' + ], + 'dependencies': [ + '<(DEPTH)/exports.gyp:dbm_exports', + '<(DEPTH)/exports.gyp:nss_exports' + ] + } + ], + 'target_defaults': { + 'defines': [ + 'NSPR20' + ] + }, + 'variables': { + 'module': 'nss' + } +}
\ No newline at end of file diff --git a/security/nss/cmd/digest/manifest.mn b/security/nss/cmd/digest/manifest.mn new file mode 100644 index 000000000..3e764063a --- /dev/null +++ b/security/nss/cmd/digest/manifest.mn @@ -0,0 +1,22 @@ +# +# This Source Code Form is subject to the terms of the Mozilla Public +# License, v. 2.0. If a copy of the MPL was not distributed with this +# file, You can obtain one at http://mozilla.org/MPL/2.0/. + +CORE_DEPTH = ../.. + +# MODULE public and private header directories are implicitly REQUIRED. +MODULE = nss + +# This next line is used by .mk files +# and gets translated into $LINCS in manifest.mnw +# The MODULE is always implicitly required. +# Listing it here in REQUIRES makes it appear twice in the cc command line. +REQUIRES = seccmd dbm + +DEFINES = -DNSPR20 + +CSRCS = digest.c + +PROGRAM = digest + |