Annotation of src/usr.bin/openssl/sess_id.c, Revision 1.3
1.3 ! doug 1: /* $OpenBSD: sess_id.c,v 1.2 2014/08/28 14:23:52 jsing Exp $ */
1.1 jsing 2: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3: * All rights reserved.
4: *
5: * This package is an SSL implementation written
6: * by Eric Young (eay@cryptsoft.com).
7: * The implementation was written so as to conform with Netscapes SSL.
8: *
9: * This library is free for commercial and non-commercial use as long as
10: * the following conditions are aheared to. The following conditions
11: * apply to all code found in this distribution, be it the RC4, RSA,
12: * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13: * included with this distribution is covered by the same copyright terms
14: * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15: *
16: * Copyright remains Eric Young's, and as such any Copyright notices in
17: * the code are not to be removed.
18: * If this package is used in a product, Eric Young should be given attribution
19: * as the author of the parts of the library used.
20: * This can be in the form of a textual message at program startup or
21: * in documentation (online or textual) provided with the package.
22: *
23: * Redistribution and use in source and binary forms, with or without
24: * modification, are permitted provided that the following conditions
25: * are met:
26: * 1. Redistributions of source code must retain the copyright
27: * notice, this list of conditions and the following disclaimer.
28: * 2. Redistributions in binary form must reproduce the above copyright
29: * notice, this list of conditions and the following disclaimer in the
30: * documentation and/or other materials provided with the distribution.
31: * 3. All advertising materials mentioning features or use of this software
32: * must display the following acknowledgement:
33: * "This product includes cryptographic software written by
34: * Eric Young (eay@cryptsoft.com)"
35: * The word 'cryptographic' can be left out if the rouines from the library
36: * being used are not cryptographic related :-).
37: * 4. If you include any Windows specific code (or a derivative thereof) from
38: * the apps directory (application code) you must include an acknowledgement:
39: * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40: *
41: * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42: * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43: * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44: * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45: * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46: * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47: * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48: * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49: * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50: * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51: * SUCH DAMAGE.
52: *
53: * The licence and distribution terms for any publically available version or
54: * derivative of this code cannot be changed. i.e. this code cannot simply be
55: * copied and put under another distribution licence
56: * [including the GNU Public Licence.]
57: */
58:
59: #include <stdio.h>
60: #include <stdlib.h>
61: #include <string.h>
62:
63: #include "apps.h"
64:
65: #include <openssl/bio.h>
66: #include <openssl/err.h>
67: #include <openssl/pem.h>
68: #include <openssl/ssl.h>
69: #include <openssl/x509.h>
70:
1.3 ! doug 71: static struct {
! 72: int cert;
! 73: char *context;
! 74: char *infile;
! 75: int informat;
! 76: int noout;
! 77: char *outfile;
! 78: int outformat;
! 79: int text;
! 80: } sess_id_config;
! 81:
! 82: static struct option sess_id_options[] = {
! 83: {
! 84: .name = "cert",
! 85: .desc = "Output certificate if present in session",
! 86: .type = OPTION_FLAG,
! 87: .opt.flag = &sess_id_config.cert,
! 88: },
! 89: {
! 90: .name = "context",
! 91: .argname = "id",
! 92: .desc = "Set the session ID context for output",
! 93: .type = OPTION_ARG,
! 94: .opt.arg = &sess_id_config.context,
! 95: },
! 96: {
! 97: .name = "in",
! 98: .argname = "file",
! 99: .desc = "Input file (default stdin)",
! 100: .type = OPTION_ARG,
! 101: .opt.arg = &sess_id_config.infile,
! 102: },
! 103: {
! 104: .name = "inform",
! 105: .argname = "format",
! 106: .desc = "Input format (DER or PEM (default))",
! 107: .type = OPTION_ARG_FORMAT,
! 108: .opt.value = &sess_id_config.informat,
! 109: },
! 110: {
! 111: .name = "noout",
! 112: .desc = "Do not output the encoded session info",
! 113: .type = OPTION_FLAG,
! 114: .opt.flag = &sess_id_config.noout,
! 115: },
! 116: {
! 117: .name = "out",
! 118: .argname = "file",
! 119: .desc = "Output file (default stdout)",
! 120: .type = OPTION_ARG,
! 121: .opt.arg = &sess_id_config.outfile,
! 122: },
! 123: {
! 124: .name = "outform",
! 125: .argname = "format",
! 126: .desc = "Output format (DER or PEM (default))",
! 127: .type = OPTION_ARG_FORMAT,
! 128: .opt.value = &sess_id_config.outformat,
! 129: },
! 130: {
! 131: .name = "text",
! 132: .desc = "Print various public or private key components in"
! 133: " plain text",
! 134: .type = OPTION_FLAG,
! 135: .opt.flag = &sess_id_config.text,
! 136: },
! 137: { NULL }
1.1 jsing 138: };
139:
1.3 ! doug 140: static void
! 141: sess_id_usage(void)
! 142: {
! 143: fprintf(stderr,
! 144: "usage: sess_id [-cert] [-context id] [-in file] [-inform fmt] "
! 145: "[-noout]\n"
! 146: " [-out file] [-outform fmt] [-text]\n\n");
! 147: options_usage(sess_id_options);
! 148: }
! 149:
1.1 jsing 150: static SSL_SESSION *load_sess_id(char *file, int format);
151:
152: int
153: sess_id_main(int argc, char **argv)
154: {
155: SSL_SESSION *x = NULL;
156: X509 *peer = NULL;
1.3 ! doug 157: int ret = 1, i;
1.1 jsing 158: BIO *out = NULL;
159:
1.3 ! doug 160: memset(&sess_id_config, 0, sizeof(sess_id_config));
! 161:
! 162: sess_id_config.informat = FORMAT_PEM;
! 163: sess_id_config.outformat = FORMAT_PEM;
! 164:
! 165: if (options_parse(argc, argv, sess_id_options, NULL, NULL) != 0) {
! 166: sess_id_usage();
! 167: return (1);
1.1 jsing 168: }
1.2 jsing 169:
1.3 ! doug 170: x = load_sess_id(sess_id_config.infile, sess_id_config.informat);
1.1 jsing 171: if (x == NULL) {
172: goto end;
173: }
174: peer = SSL_SESSION_get0_peer(x);
175:
1.3 ! doug 176: if (sess_id_config.context) {
! 177: size_t ctx_len = strlen(sess_id_config.context);
1.1 jsing 178: if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
179: BIO_printf(bio_err, "Context too long\n");
180: goto end;
181: }
1.3 ! doug 182: SSL_SESSION_set1_id_context(x,
! 183: (unsigned char *)sess_id_config.context, ctx_len);
1.1 jsing 184: }
185: #ifdef undef
186: /* just testing for memory leaks :-) */
187: {
188: SSL_SESSION *s;
189: char buf[1024 * 10], *p;
190: int i;
191:
192: s = SSL_SESSION_new();
193:
194: p = &buf;
195: i = i2d_SSL_SESSION(x, &p);
196: p = &buf;
197: d2i_SSL_SESSION(&s, &p, (long) i);
198: p = &buf;
199: d2i_SSL_SESSION(&s, &p, (long) i);
200: p = &buf;
201: d2i_SSL_SESSION(&s, &p, (long) i);
202: SSL_SESSION_free(s);
203: }
204: #endif
205:
1.3 ! doug 206: if (!sess_id_config.noout || sess_id_config.text) {
1.1 jsing 207: out = BIO_new(BIO_s_file());
208: if (out == NULL) {
209: ERR_print_errors(bio_err);
210: goto end;
211: }
1.3 ! doug 212: if (sess_id_config.outfile == NULL) {
1.1 jsing 213: BIO_set_fp(out, stdout, BIO_NOCLOSE);
214: } else {
1.3 ! doug 215: if (BIO_write_filename(out, sess_id_config.outfile)
! 216: <= 0) {
! 217: perror(sess_id_config.outfile);
1.1 jsing 218: goto end;
219: }
220: }
221: }
1.3 ! doug 222: if (sess_id_config.text) {
1.1 jsing 223: SSL_SESSION_print(out, x);
224:
1.3 ! doug 225: if (sess_id_config.cert) {
1.1 jsing 226: if (peer == NULL)
227: BIO_puts(out, "No certificate present\n");
228: else
229: X509_print(out, peer);
230: }
231: }
1.3 ! doug 232: if (!sess_id_config.noout && !sess_id_config.cert) {
! 233: if (sess_id_config.outformat == FORMAT_ASN1)
1.1 jsing 234: i = i2d_SSL_SESSION_bio(out, x);
1.3 ! doug 235: else if (sess_id_config.outformat == FORMAT_PEM)
1.1 jsing 236: i = PEM_write_bio_SSL_SESSION(out, x);
237: else {
1.3 ! doug 238: BIO_printf(bio_err,
! 239: "bad output format specified for outfile\n");
1.1 jsing 240: goto end;
241: }
242: if (!i) {
243: BIO_printf(bio_err, "unable to write SSL_SESSION\n");
244: goto end;
245: }
1.3 ! doug 246: } else if (!sess_id_config.noout && (peer != NULL)) {
! 247: /* just print the certificate */
! 248: if (sess_id_config.outformat == FORMAT_ASN1)
1.1 jsing 249: i = (int) i2d_X509_bio(out, peer);
1.3 ! doug 250: else if (sess_id_config.outformat == FORMAT_PEM)
1.1 jsing 251: i = PEM_write_bio_X509(out, peer);
252: else {
1.3 ! doug 253: BIO_printf(bio_err,
! 254: "bad output format specified for outfile\n");
1.1 jsing 255: goto end;
256: }
257: if (!i) {
258: BIO_printf(bio_err, "unable to write X509\n");
259: goto end;
260: }
261: }
262: ret = 0;
1.3 ! doug 263:
1.1 jsing 264: end:
1.3 ! doug 265: BIO_free_all(out);
! 266: SSL_SESSION_free(x);
1.1 jsing 267:
268: return (ret);
269: }
270:
271: static SSL_SESSION *
272: load_sess_id(char *infile, int format)
273: {
274: SSL_SESSION *x = NULL;
275: BIO *in = NULL;
276:
277: in = BIO_new(BIO_s_file());
278: if (in == NULL) {
279: ERR_print_errors(bio_err);
280: goto end;
281: }
282: if (infile == NULL)
283: BIO_set_fp(in, stdin, BIO_NOCLOSE);
284: else {
285: if (BIO_read_filename(in, infile) <= 0) {
286: perror(infile);
287: goto end;
288: }
289: }
290: if (format == FORMAT_ASN1)
291: x = d2i_SSL_SESSION_bio(in, NULL);
292: else if (format == FORMAT_PEM)
293: x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
294: else {
1.3 ! doug 295: BIO_printf(bio_err,
! 296: "bad input format specified for input crl\n");
1.1 jsing 297: goto end;
298: }
299: if (x == NULL) {
300: BIO_printf(bio_err, "unable to load SSL_SESSION\n");
301: ERR_print_errors(bio_err);
302: goto end;
303: }
304: end:
305: BIO_free(in);
306: return (x);
307: }