diff options
author | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
---|---|---|
committer | Matt A. Tobin <mattatobin@localhost.localdomain> | 2018-02-02 04:16:08 -0500 |
commit | 5f8de423f190bbb79a62f804151bc24824fa32d8 (patch) | |
tree | 10027f336435511475e392454359edea8e25895d /security/nss/cmd/pk11util/scripts | |
parent | 49ee0794b5d912db1f95dce6eb52d781dc210db5 (diff) | |
download | UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.gz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.lz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.tar.xz UXP-5f8de423f190bbb79a62f804151bc24824fa32d8.zip |
Add m-esr52 at 52.6.0
Diffstat (limited to 'security/nss/cmd/pk11util/scripts')
-rw-r--r-- | security/nss/cmd/pk11util/scripts/dosign | 162 | ||||
-rw-r--r-- | security/nss/cmd/pk11util/scripts/hssign | 48 | ||||
-rw-r--r-- | security/nss/cmd/pk11util/scripts/lcert | 35 | ||||
-rw-r--r-- | security/nss/cmd/pk11util/scripts/mechanisms | 11 | ||||
-rw-r--r-- | security/nss/cmd/pk11util/scripts/pLabel1 | 6 | ||||
-rw-r--r-- | security/nss/cmd/pk11util/scripts/pMechanisms | 8 | ||||
-rw-r--r-- | security/nss/cmd/pk11util/scripts/pcert | 30 |
7 files changed, 300 insertions, 0 deletions
diff --git a/security/nss/cmd/pk11util/scripts/dosign b/security/nss/cmd/pk11util/scripts/dosign new file mode 100644 index 000000000..33e761f0b --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/dosign @@ -0,0 +1,162 @@ +Load nsscapi.dll +C_Initialize NULL +C_GetSlotList false NULL slotCount +NewArray slotList CK_ULONG slotCount +C_GetSlotList false slotList slotCount +#change the following to the appropriate slot id +set slotID 1 +#set slotID slotList[0] +C_GetSlotInfo slotID slotInfo +C_GetTokenInfo slotID tokenInfo +C_OpenSession slotID CKF_SERIAL_SESSION session +# +#uncomment the following line and include the correct password +#C_Login session CKU_USER 0000 4 +# +# build the search template +# +NewTemplate search CKA_CLASS +SetTemplate search 0 CKO_CERTIFICATE +NewArray certID CK_ULONG 10 +C_FindObjectsInit session search 1 +C_FindObjects session certID sizeA(certID) count +C_FindObjectsFinal session +# +# now read the cert out +# +#NewTemplate derCert CKA_VALUE +#NewTemplate certName CKA_LABEL,CKA_VALUE +#C_GetAttributeValue session certID[0] certName sizeA(certName) +#BuildTemplate certName +#C_GetAttributeValue session certID[0] certName sizeA(certName) +#print certName[0] +Set countm1 count +Decrement countm1 1 +LoopRun pLabel1 i 0 countm1 1 +Set i 1 +run pLabel1 +NewTemplate id CKA_CLASS,CKA_ID +C_GetAttributeValue session certID[i] id sizeA(id) +BuildTemplate id +C_GetAttributeValue session certID[i] id sizeA(id) +SetTemplate id 0 CKO_PRIVATE_KEY +NewArray keyID CK_ULONG 10 +C_FindObjectsInit session id sizeA(id) +C_FindObjects session keyID sizeA(keyID) count +C_FindObjectsFinal session + +NewMechanism rsaParams CKM_RSA_PKCS +NewArray sign data 256 +NewArray sdata data 36 +C_SignInit session rsaParams keyID[0] +print sdata +C_Sign session sdata sizeof(sdata) sign sizeof(sign) +save signature sign +save hash sdata +NewTemplate privValue CKA_MODULUS,CKA_PUBLIC_EXPONENT +C_GetAttributeValue session keyID[0] privValue sizeA(privValue) +BuildTemplate privValue +C_GetAttributeValue session keyID[0] privValue sizeA(privValue) +print privValue[0] +print privValue[1] + +# save the public key +SetTemplate id 0 CKO_PUBLIC_KEY +NewArray pubkeyID CK_ULONG 10 +C_FindObjectsInit session id sizeA(id) +C_FindObjects session pubkeyID sizeA(pubkeyID) count +C_FindObjectsFinal session +NewTemplate pubkeyValue CKA_MODULUS,CKA_PUBLIC_EXPONENT +C_GetAttributeValue session pubkeyID[0] pubkeyValue sizeA(pubkeyValue) +BuildTemplate pubkeyValue +C_GetAttributeValue session pubkeyID[0] pubkeyValue sizeA(pubkeyValue) +print pubkeyValue[0] +print pubkeyValue[1] + + +C_Finalize null +unload + +# +# Now do the same for using softoken +# +load softokn3.dll +NewInitArg init CKF_OS_LOCKING_OK configdir=./db +C_Initialize init +C_GetSlotList false NULL slotCount +NewArray slotList CK_ULONG slotCount +C_GetSlotList false slotList slotCount +#change the following to the appropriate slot id +set slotID slotList[1] +#set slotID slotList[0] +C_GetSlotInfo slotID slotInfo +C_GetTokenInfo slotID tokenInfo +C_OpenSession slotID CKF_SERIAL_SESSION session +NewTemplate search CKA_CLASS +SetTemplate search 0 CKO_CERTIFICATE +NewArray certID CK_ULONG 10 +C_FindObjectsInit session search 1 +C_FindObjects session certID sizeA(certID) count +C_FindObjectsFinal session +# +# now read the cert out +# +#NewTemplate derCert CKA_VALUE +#NewTemplate certName CKA_LABEL,CKA_VALUE +#C_GetAttributeValue session certID[0] certName sizeA(certName) +#BuildTemplate certName +#C_GetAttributeValue session certID[0] certName sizeA(certName) +#print certName[0] +#Set countm1 count +#Decrement countm1 1 +#LoopRun pLabel1 i 0 countm1 1 +Set i 0 +run pLabel1 +NewTemplate id CKA_CLASS,CKA_ID +C_GetAttributeValue session certID[i] id sizeA(id) +BuildTemplate id +C_GetAttributeValue session certID[i] id sizeA(id) +SetTemplate id 0 CKO_PRIVATE_KEY +NewArray keyID CK_ULONG 10 +C_FindObjectsInit session id sizeA(id) +C_FindObjects session keyID sizeA(keyID) count +C_FindObjectsFinal session + +NewMechanism rsaParams CKM_RSA_PKCS +NewArray sign data 256 +NewArray sdata data 36 +C_SignInit session rsaParams keyID[0] +C_Sign session sdata sizeof(sdata) sign sizeof(sign) +save signature2 sign +save hash2 sdata + +SetTemplate id 0 CKO_PUBLIC_KEY +NewArray pubkeyID CK_ULONG 10 +C_FindObjectsInit session id sizeA(id) +C_FindObjects session pubkeyID sizeA(pubkeyID) count +C_FindObjectsFinal session + +# +# OK now we use raw unwrap and see what we have... +# +NewMechanism rawRsaParams CKM_RSA_X_509 +NewArray vdata data 256 +C_VerifyRecoverInit session rawRsaParams pubkeyID[0] +C_VerifyRecover session sign sizeof(sign) vdata sizeof(vdata) +save verify2 vdata +restore signature sign +C_VerifyRecoverInit session rawRsaParams pubkeyID[0] +C_VerifyRecover session sign sizeof(sign) vdata sizeof(vdata) +save verify vdata + +NewTemplate pubkeyValue CKA_MODULUS,CKA_PUBLIC_EXPONENT +C_GetAttributeValue session pubkeyID[0] pubkeyValue sizeA(pubkeyValue) +BuildTemplate pubkeyValue +C_GetAttributeValue session pubkeyID[0] pubkeyValue sizeA(pubkeyValue) +print pubkeyValue[0] +print pubkeyValue[1] + + +C_Finalize null + +unload diff --git a/security/nss/cmd/pk11util/scripts/hssign b/security/nss/cmd/pk11util/scripts/hssign new file mode 100644 index 000000000..9bcf365cc --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/hssign @@ -0,0 +1,48 @@ +Load aolkeypk11.dll +C_Initialize NULL +C_GetSlotList false NULL slotCount +NewArray slotList CK_ULONG slotCount +C_GetSlotList false slotList slotCount +#change the following to the appropriate slot id +#set slotID slotList[0] +set slotID 1 +C_GetSlotInfo slotID slotInfo +C_GetTokenInfo slotID tokenInfo +C_OpenSession slotID CK_SESSION_SERIAL session +# +#uncomment the following line and include the correct password +#for authenticated tokens +#C_Login session CKU_USER 0000 4 +# +# build the search template +# +#NewTemplate search CKA_CLASS +#SetTemplate search 0 CKO_CERTIFICATE +#NewArray certID CK_ULONG 1 +#C_FindObjectsInit session search 1 +#C_FindObjects session certID 1 count +#C_FindObjectsFinal session +# +# now read the cert out +# +#NewTemplate derCert CKA_VALUE +#C_GetAttributeValue session certID derCert 1 +#BuildTemplate derCert +#C_GetAttributeValue session certID derCert 1 +# +# Do a signature +# +NewTemplate search CKA_CLASS +SetTemplate search 0 CKO_PRIVATE_KEY +NewArray privateKey CK_ULONG 1 +C_FindObjectsInit session search 1 +C_FindObjects session privateKey 1 count +C_FindObjectsFinal session +# sign +NewMechanism rsaParams CKM_RSA_PKCS +NewArray sign data 128 +NewArray sdata data 20 +C_SignInit session rsaParams privateKey +C_Sign session sdata sizeof(sdata) sign sizeof(sign) +#C_Logout session + diff --git a/security/nss/cmd/pk11util/scripts/lcert b/security/nss/cmd/pk11util/scripts/lcert new file mode 100644 index 000000000..0f249c3b5 --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/lcert @@ -0,0 +1,35 @@ +Load nsscapi.dll +C_Initialize NULL +C_GetSlotList false NULL slotCount +NewArray slotList CK_ULONG slotCount +C_GetSlotList false slotList slotCount +#change the following to the appropriate slot id +set slotID 1 +#set slotID slotList[0] +C_GetSlotInfo slotID slotInfo +C_GetTokenInfo slotID tokenInfo +C_OpenSession slotID CKF_SERIAL_SESSION session +# +#uncomment the following line and include the correct password +#C_Login session CKU_USER 0000 4 +# +# build the search template +# +NewTemplate search CKA_CLASS +SetTemplate search 0 CKO_CERTIFICATE +NewArray certID CK_ULONG 10 +C_FindObjectsInit session search 1 +C_FindObjects session certID sizeA(certID) count +C_FindObjectsFinal session +# +# now read the cert out +# +#NewTemplate derCert CKA_VALUE +#NewTemplate certName CKA_LABEL,CKA_VALUE +#C_GetAttributeValue session certID[0] certName sizeA(certName) +#BuildTemplate certName +#C_GetAttributeValue session certID[0] certName sizeA(certName) +#print certName[0] +Set countm1 count +Decrement countm1 1 +LoopRun pLabel1 i 0 countm1 1 diff --git a/security/nss/cmd/pk11util/scripts/mechanisms b/security/nss/cmd/pk11util/scripts/mechanisms new file mode 100644 index 000000000..d103a9c4f --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/mechanisms @@ -0,0 +1,11 @@ +Load nsscapi.dll +C_Initialize NULL +C_GetSlotList false NULL slotCount +NewArray slotList CK_ULONG slotCount +C_GetSlotList false slotList slotCount + +LoopRun pMechanisms i 0 slotCount 1 + +#C_Finalize +#Unload + diff --git a/security/nss/cmd/pk11util/scripts/pLabel1 b/security/nss/cmd/pk11util/scripts/pLabel1 new file mode 100644 index 000000000..0be909bb4 --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/pLabel1 @@ -0,0 +1,6 @@ +NewTemplate certName CKA_LABEL,CKA_VALUE +C_GetAttributeValue session certID[i] certName sizeA(certName) +BuildTemplate certName +C_GetAttributeValue session certID[i] certName sizeA(certName) +print i +print certName[0] diff --git a/security/nss/cmd/pk11util/scripts/pMechanisms b/security/nss/cmd/pk11util/scripts/pMechanisms new file mode 100644 index 000000000..82e860258 --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/pMechanisms @@ -0,0 +1,8 @@ +# +# print the mechanism list for a given token +# +set slotID slotList[i] +C_GetMechanismList slotID NULL mechCount +NewArray mechanismList CK_ULONG mechcount +C_GetMechanismList slotID mechanismList mechCount +print mechanismList diff --git a/security/nss/cmd/pk11util/scripts/pcert b/security/nss/cmd/pk11util/scripts/pcert new file mode 100644 index 000000000..c322a8bfe --- /dev/null +++ b/security/nss/cmd/pk11util/scripts/pcert @@ -0,0 +1,30 @@ +Load aolkeypk11.dll +C_Initialize NULL +C_GetSlotList false NULL slotCount +NewArray slotList CK_ULONG slotCount +C_GetSlotList false slotList slotCount +#change the following to the appropriate slot id +set slotID 1 +#set slotID slotList[0] +C_GetSlotInfo slotID slotInfo +C_GetTokenInfo slotID tokenInfo +C_OpenSession slotID CK_SESSION_SERIAL session +# +#uncomment the following line and include the correct password +#C_Login session CKU_USER 0000 4 +# +# build the search template +# +NewTemplate search CKA_CLASS +SetTemplate search 0 CKO_CERTIFICATE +NewArray certID CK_ULONG 1 +C_FindObjectsInit session search 1 +C_FindObjects session certID 1 count +C_FindObjectsFinal session +# +# now read the cert out +# +NewTemplate derCert CKA_VALUE +C_GetAttributeValue session certID derCert 1 +BuildTemplate derCert +C_GetAttributeValue session certID derCert 1 |