84 lines
2.3 KiB
C
84 lines
2.3 KiB
C
|
/*
|
||
|
**
|
||
|
** Copyright 2009, The Android Open Source Project
|
||
|
**
|
||
|
** Licensed under the Apache License, Version 2.0 (the "License");
|
||
|
** you may not use this file except in compliance with the License.
|
||
|
** You may obtain a copy of the License at
|
||
|
**
|
||
|
** http://www.apache.org/licenses/LICENSE-2.0
|
||
|
**
|
||
|
** Unless required by applicable law or agreed to in writing, software
|
||
|
** distributed under the License is distributed on an "AS IS" BASIS,
|
||
|
** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||
|
** See the License for the specific language governing permissions and
|
||
|
** limitations under the License.
|
||
|
*/
|
||
|
|
||
|
#ifndef __CERTTOOL_H__
|
||
|
#define __CERTTOOL_H__
|
||
|
|
||
|
#include <stdio.h>
|
||
|
#include <string.h>
|
||
|
#include <cutils/sockets.h>
|
||
|
#include <cutils/log.h>
|
||
|
|
||
|
#include "common.h"
|
||
|
#include "netkeystore.h"
|
||
|
|
||
|
/*
|
||
|
* The specific function 'get_cert' is used in daemons to get the key value
|
||
|
* from keystore. Caller should allocate the buffer and the length of the buffer
|
||
|
* should be MAX_KEY_VALUE_LENGTH.
|
||
|
*/
|
||
|
static inline int get_cert(char *certname, unsigned char *value, int *size)
|
||
|
{
|
||
|
int count, fd, ret = -1;
|
||
|
LPC_MARSHAL cmd;
|
||
|
char delimiter[] = "_";
|
||
|
char *namespace, *keyname;
|
||
|
char *context = NULL;
|
||
|
|
||
|
if (value == NULL) {
|
||
|
LOGE("get_cert: value is null\n");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
fd = socket_local_client(SOCKET_PATH,
|
||
|
ANDROID_SOCKET_NAMESPACE_RESERVED,
|
||
|
SOCK_STREAM);
|
||
|
if (fd == -1) {
|
||
|
LOGE("Keystore service is not up and running.\n");
|
||
|
return -1;
|
||
|
}
|
||
|
|
||
|
cmd.opcode = GET;
|
||
|
if (((namespace = strtok_r(certname, delimiter, &context)) == NULL) ||
|
||
|
((keyname = strtok_r(NULL, delimiter, &context)) == NULL)) {
|
||
|
goto err;
|
||
|
}
|
||
|
if ((cmd.len = snprintf((char*)cmd.data, BUFFER_MAX, "%s %s", namespace, keyname))
|
||
|
> (2 * MAX_KEY_NAME_LENGTH + 1)) goto err;
|
||
|
|
||
|
if (write_marshal(fd, &cmd)) {
|
||
|
LOGE("Incorrect command or command line is too long.\n");
|
||
|
goto err;
|
||
|
}
|
||
|
if (read_marshal(fd, &cmd)) {
|
||
|
LOGE("Failed to read the result.\n");
|
||
|
goto err;
|
||
|
}
|
||
|
|
||
|
// copy the result if succeeded.
|
||
|
if (!cmd.retcode && cmd.len <= BUFFER_MAX) {
|
||
|
memcpy(value, cmd.data, cmd.len);
|
||
|
ret = 0;
|
||
|
*size = cmd.len;
|
||
|
}
|
||
|
err:
|
||
|
close(fd);
|
||
|
return ret;
|
||
|
}
|
||
|
|
||
|
#endif
|