Annotation of src/usr.bin/openssl/sess_id.c, Revision 1.12
1.12 ! tb 1: /* $OpenBSD: sess_id.c,v 1.11 2022/11/11 17:07:39 joshua Exp $ */
1.1 jsing 2: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3: * All rights reserved.
4: *
5: * This package is an SSL implementation written
6: * by Eric Young (eay@cryptsoft.com).
7: * The implementation was written so as to conform with Netscapes SSL.
8: *
9: * This library is free for commercial and non-commercial use as long as
10: * the following conditions are aheared to. The following conditions
11: * apply to all code found in this distribution, be it the RC4, RSA,
12: * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13: * included with this distribution is covered by the same copyright terms
14: * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15: *
16: * Copyright remains Eric Young's, and as such any Copyright notices in
17: * the code are not to be removed.
18: * If this package is used in a product, Eric Young should be given attribution
19: * as the author of the parts of the library used.
20: * This can be in the form of a textual message at program startup or
21: * in documentation (online or textual) provided with the package.
22: *
23: * Redistribution and use in source and binary forms, with or without
24: * modification, are permitted provided that the following conditions
25: * are met:
26: * 1. Redistributions of source code must retain the copyright
27: * notice, this list of conditions and the following disclaimer.
28: * 2. Redistributions in binary form must reproduce the above copyright
29: * notice, this list of conditions and the following disclaimer in the
30: * documentation and/or other materials provided with the distribution.
31: * 3. All advertising materials mentioning features or use of this software
32: * must display the following acknowledgement:
33: * "This product includes cryptographic software written by
34: * Eric Young (eay@cryptsoft.com)"
35: * The word 'cryptographic' can be left out if the rouines from the library
36: * being used are not cryptographic related :-).
37: * 4. If you include any Windows specific code (or a derivative thereof) from
38: * the apps directory (application code) you must include an acknowledgement:
39: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40: *
41: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51: * SUCH DAMAGE.
52: *
53: * The licence and distribution terms for any publically available version or
54: * derivative of this code cannot be changed. i.e. this code cannot simply be
55: * copied and put under another distribution licence
56: * [including the GNU Public Licence.]
57: */
58:
59: #include <stdio.h>
60: #include <stdlib.h>
61: #include <string.h>
62:
63: #include "apps.h"
1.5 deraadt 64: #include "progs.h"
1.1 jsing 65:
66: #include <openssl/bio.h>
67: #include <openssl/err.h>
68: #include <openssl/pem.h>
69: #include <openssl/ssl.h>
70: #include <openssl/x509.h>
71:
1.3 doug 72: static struct {
73: int cert;
74: char *context;
75: char *infile;
76: int informat;
77: int noout;
78: char *outfile;
79: int outformat;
80: int text;
1.12 ! tb 81: } cfg;
1.3 doug 82:
1.10 guenther 83: static const struct option sess_id_options[] = {
1.3 doug 84: {
85: .name = "cert",
86: .desc = "Output certificate if present in session",
87: .type = OPTION_FLAG,
1.12 ! tb 88: .opt.flag = &cfg.cert,
1.3 doug 89: },
90: {
91: .name = "context",
92: .argname = "id",
93: .desc = "Set the session ID context for output",
94: .type = OPTION_ARG,
1.12 ! tb 95: .opt.arg = &cfg.context,
1.3 doug 96: },
97: {
98: .name = "in",
99: .argname = "file",
100: .desc = "Input file (default stdin)",
101: .type = OPTION_ARG,
1.12 ! tb 102: .opt.arg = &cfg.infile,
1.3 doug 103: },
104: {
105: .name = "inform",
106: .argname = "format",
107: .desc = "Input format (DER or PEM (default))",
108: .type = OPTION_ARG_FORMAT,
1.12 ! tb 109: .opt.value = &cfg.informat,
1.3 doug 110: },
111: {
112: .name = "noout",
113: .desc = "Do not output the encoded session info",
114: .type = OPTION_FLAG,
1.12 ! tb 115: .opt.flag = &cfg.noout,
1.3 doug 116: },
117: {
118: .name = "out",
119: .argname = "file",
120: .desc = "Output file (default stdout)",
121: .type = OPTION_ARG,
1.12 ! tb 122: .opt.arg = &cfg.outfile,
1.3 doug 123: },
124: {
125: .name = "outform",
126: .argname = "format",
127: .desc = "Output format (DER or PEM (default))",
128: .type = OPTION_ARG_FORMAT,
1.12 ! tb 129: .opt.value = &cfg.outformat,
1.3 doug 130: },
131: {
132: .name = "text",
133: .desc = "Print various public or private key components in"
134: " plain text",
135: .type = OPTION_FLAG,
1.12 ! tb 136: .opt.flag = &cfg.text,
1.3 doug 137: },
138: { NULL }
1.1 jsing 139: };
140:
1.3 doug 141: static void
142: sess_id_usage(void)
143: {
144: fprintf(stderr,
145: "usage: sess_id [-cert] [-context id] [-in file] [-inform fmt] "
146: "[-noout]\n"
147: " [-out file] [-outform fmt] [-text]\n\n");
148: options_usage(sess_id_options);
149: }
150:
1.1 jsing 151: static SSL_SESSION *load_sess_id(char *file, int format);
152:
153: int
154: sess_id_main(int argc, char **argv)
155: {
156: SSL_SESSION *x = NULL;
157: X509 *peer = NULL;
1.3 doug 158: int ret = 1, i;
1.1 jsing 159: BIO *out = NULL;
1.6 doug 160:
1.11 joshua 161: if (pledge("stdio cpath wpath rpath", NULL) == -1) {
162: perror("pledge");
163: exit(1);
1.6 doug 164: }
1.1 jsing 165:
1.12 ! tb 166: memset(&cfg, 0, sizeof(cfg));
1.3 doug 167:
1.12 ! tb 168: cfg.informat = FORMAT_PEM;
! 169: cfg.outformat = FORMAT_PEM;
1.3 doug 170:
171: if (options_parse(argc, argv, sess_id_options, NULL, NULL) != 0) {
172: sess_id_usage();
173: return (1);
1.1 jsing 174: }
1.2 jsing 175:
1.12 ! tb 176: x = load_sess_id(cfg.infile, cfg.informat);
1.1 jsing 177: if (x == NULL) {
178: goto end;
179: }
180: peer = SSL_SESSION_get0_peer(x);
181:
1.12 ! tb 182: if (cfg.context) {
! 183: size_t ctx_len = strlen(cfg.context);
1.1 jsing 184: if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
185: BIO_printf(bio_err, "Context too long\n");
186: goto end;
187: }
1.3 doug 188: SSL_SESSION_set1_id_context(x,
1.12 ! tb 189: (unsigned char *)cfg.context, ctx_len);
1.1 jsing 190: }
191:
1.12 ! tb 192: if (!cfg.noout || cfg.text) {
1.1 jsing 193: out = BIO_new(BIO_s_file());
194: if (out == NULL) {
195: ERR_print_errors(bio_err);
196: goto end;
197: }
1.12 ! tb 198: if (cfg.outfile == NULL) {
1.1 jsing 199: BIO_set_fp(out, stdout, BIO_NOCLOSE);
200: } else {
1.12 ! tb 201: if (BIO_write_filename(out, cfg.outfile)
1.3 doug 202: <= 0) {
1.12 ! tb 203: perror(cfg.outfile);
1.1 jsing 204: goto end;
205: }
206: }
207: }
1.12 ! tb 208: if (cfg.text) {
1.1 jsing 209: SSL_SESSION_print(out, x);
210:
1.12 ! tb 211: if (cfg.cert) {
1.1 jsing 212: if (peer == NULL)
213: BIO_puts(out, "No certificate present\n");
214: else
215: X509_print(out, peer);
216: }
217: }
1.12 ! tb 218: if (!cfg.noout && !cfg.cert) {
! 219: if (cfg.outformat == FORMAT_ASN1)
1.1 jsing 220: i = i2d_SSL_SESSION_bio(out, x);
1.12 ! tb 221: else if (cfg.outformat == FORMAT_PEM)
1.1 jsing 222: i = PEM_write_bio_SSL_SESSION(out, x);
223: else {
1.3 doug 224: BIO_printf(bio_err,
225: "bad output format specified for outfile\n");
1.1 jsing 226: goto end;
227: }
228: if (!i) {
229: BIO_printf(bio_err, "unable to write SSL_SESSION\n");
230: goto end;
231: }
1.12 ! tb 232: } else if (!cfg.noout && (peer != NULL)) {
1.3 doug 233: /* just print the certificate */
1.12 ! tb 234: if (cfg.outformat == FORMAT_ASN1)
1.1 jsing 235: i = (int) i2d_X509_bio(out, peer);
1.12 ! tb 236: else if (cfg.outformat == FORMAT_PEM)
1.1 jsing 237: i = PEM_write_bio_X509(out, peer);
238: else {
1.3 doug 239: BIO_printf(bio_err,
240: "bad output format specified for outfile\n");
1.1 jsing 241: goto end;
242: }
243: if (!i) {
244: BIO_printf(bio_err, "unable to write X509\n");
245: goto end;
246: }
247: }
248: ret = 0;
1.3 doug 249:
1.9 jsing 250: end:
1.3 doug 251: BIO_free_all(out);
252: SSL_SESSION_free(x);
1.1 jsing 253:
254: return (ret);
255: }
256:
257: static SSL_SESSION *
258: load_sess_id(char *infile, int format)
259: {
260: SSL_SESSION *x = NULL;
261: BIO *in = NULL;
262:
263: in = BIO_new(BIO_s_file());
264: if (in == NULL) {
265: ERR_print_errors(bio_err);
266: goto end;
267: }
268: if (infile == NULL)
269: BIO_set_fp(in, stdin, BIO_NOCLOSE);
270: else {
271: if (BIO_read_filename(in, infile) <= 0) {
272: perror(infile);
273: goto end;
274: }
275: }
276: if (format == FORMAT_ASN1)
277: x = d2i_SSL_SESSION_bio(in, NULL);
278: else if (format == FORMAT_PEM)
279: x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
280: else {
1.3 doug 281: BIO_printf(bio_err,
282: "bad input format specified for input crl\n");
1.1 jsing 283: goto end;
284: }
285: if (x == NULL) {
286: BIO_printf(bio_err, "unable to load SSL_SESSION\n");
287: ERR_print_errors(bio_err);
288: goto end;
289: }
1.9 jsing 290: end:
1.1 jsing 291: BIO_free(in);
292: return (x);
293: }