[BACK]Return to sess_id.c CVS log [TXT][DIR] Up to [local] / src / usr.bin / openssl

Annotation of src/usr.bin/openssl/sess_id.c, Revision 1.3

1.3     ! doug        1: /* $OpenBSD: sess_id.c,v 1.2 2014/08/28 14:23:52 jsing Exp $ */
1.1       jsing       2: /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
                      3:  * All rights reserved.
                      4:  *
                      5:  * This package is an SSL implementation written
                      6:  * by Eric Young (eay@cryptsoft.com).
                      7:  * The implementation was written so as to conform with Netscapes SSL.
                      8:  *
                      9:  * This library is free for commercial and non-commercial use as long as
                     10:  * the following conditions are aheared to.  The following conditions
                     11:  * apply to all code found in this distribution, be it the RC4, RSA,
                     12:  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
                     13:  * included with this distribution is covered by the same copyright terms
                     14:  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
                     15:  *
                     16:  * Copyright remains Eric Young's, and as such any Copyright notices in
                     17:  * the code are not to be removed.
                     18:  * If this package is used in a product, Eric Young should be given attribution
                     19:  * as the author of the parts of the library used.
                     20:  * This can be in the form of a textual message at program startup or
                     21:  * in documentation (online or textual) provided with the package.
                     22:  *
                     23:  * Redistribution and use in source and binary forms, with or without
                     24:  * modification, are permitted provided that the following conditions
                     25:  * are met:
                     26:  * 1. Redistributions of source code must retain the copyright
                     27:  *    notice, this list of conditions and the following disclaimer.
                     28:  * 2. Redistributions in binary form must reproduce the above copyright
                     29:  *    notice, this list of conditions and the following disclaimer in the
                     30:  *    documentation and/or other materials provided with the distribution.
                     31:  * 3. All advertising materials mentioning features or use of this software
                     32:  *    must display the following acknowledgement:
                     33:  *    "This product includes cryptographic software written by
                     34:  *     Eric Young (eay@cryptsoft.com)"
                     35:  *    The word 'cryptographic' can be left out if the rouines from the library
                     36:  *    being used are not cryptographic related :-).
                     37:  * 4. If you include any Windows specific code (or a derivative thereof) from
                     38:  *    the apps directory (application code) you must include an acknowledgement:
                     39:  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
                     40:  *
                     41:  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
                     42:  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
                     43:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
                     44:  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
                     45:  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
                     46:  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
                     47:  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
                     48:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
                     49:  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
                     50:  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
                     51:  * SUCH DAMAGE.
                     52:  *
                     53:  * The licence and distribution terms for any publically available version or
                     54:  * derivative of this code cannot be changed.  i.e. this code cannot simply be
                     55:  * copied and put under another distribution licence
                     56:  * [including the GNU Public Licence.]
                     57:  */
                     58:
                     59: #include <stdio.h>
                     60: #include <stdlib.h>
                     61: #include <string.h>
                     62:
                     63: #include "apps.h"
                     64:
                     65: #include <openssl/bio.h>
                     66: #include <openssl/err.h>
                     67: #include <openssl/pem.h>
                     68: #include <openssl/ssl.h>
                     69: #include <openssl/x509.h>
                     70:
1.3     ! doug       71: static struct {
        !            72:        int cert;
        !            73:        char *context;
        !            74:        char *infile;
        !            75:        int informat;
        !            76:        int noout;
        !            77:        char *outfile;
        !            78:        int outformat;
        !            79:        int text;
        !            80: } sess_id_config;
        !            81:
        !            82: static struct option sess_id_options[] = {
        !            83:        {
        !            84:                .name = "cert",
        !            85:                .desc = "Output certificate if present in session",
        !            86:                .type = OPTION_FLAG,
        !            87:                .opt.flag = &sess_id_config.cert,
        !            88:        },
        !            89:        {
        !            90:                .name = "context",
        !            91:                .argname = "id",
        !            92:                .desc = "Set the session ID context for output",
        !            93:                .type = OPTION_ARG,
        !            94:                .opt.arg = &sess_id_config.context,
        !            95:        },
        !            96:        {
        !            97:                .name = "in",
        !            98:                .argname = "file",
        !            99:                .desc = "Input file (default stdin)",
        !           100:                .type = OPTION_ARG,
        !           101:                .opt.arg = &sess_id_config.infile,
        !           102:        },
        !           103:        {
        !           104:                .name = "inform",
        !           105:                .argname = "format",
        !           106:                .desc = "Input format (DER or PEM (default))",
        !           107:                .type = OPTION_ARG_FORMAT,
        !           108:                .opt.value = &sess_id_config.informat,
        !           109:        },
        !           110:        {
        !           111:                .name = "noout",
        !           112:                .desc = "Do not output the encoded session info",
        !           113:                .type = OPTION_FLAG,
        !           114:                .opt.flag = &sess_id_config.noout,
        !           115:        },
        !           116:        {
        !           117:                .name = "out",
        !           118:                .argname = "file",
        !           119:                .desc = "Output file (default stdout)",
        !           120:                .type = OPTION_ARG,
        !           121:                .opt.arg = &sess_id_config.outfile,
        !           122:        },
        !           123:        {
        !           124:                .name = "outform",
        !           125:                .argname = "format",
        !           126:                .desc = "Output format (DER or PEM (default))",
        !           127:                .type = OPTION_ARG_FORMAT,
        !           128:                .opt.value = &sess_id_config.outformat,
        !           129:        },
        !           130:        {
        !           131:                .name = "text",
        !           132:                .desc = "Print various public or private key components in"
        !           133:                    " plain text",
        !           134:                .type = OPTION_FLAG,
        !           135:                .opt.flag = &sess_id_config.text,
        !           136:        },
        !           137:        { NULL }
1.1       jsing     138: };
                    139:
1.3     ! doug      140: static void
        !           141: sess_id_usage(void)
        !           142: {
        !           143:        fprintf(stderr,
        !           144:            "usage: sess_id [-cert] [-context id] [-in file] [-inform fmt] "
        !           145:            "[-noout]\n"
        !           146:            "    [-out file] [-outform fmt] [-text]\n\n");
        !           147:        options_usage(sess_id_options);
        !           148: }
        !           149:
1.1       jsing     150: static SSL_SESSION *load_sess_id(char *file, int format);
                    151:
                    152: int
                    153: sess_id_main(int argc, char **argv)
                    154: {
                    155:        SSL_SESSION *x = NULL;
                    156:        X509 *peer = NULL;
1.3     ! doug      157:        int ret = 1, i;
1.1       jsing     158:        BIO *out = NULL;
                    159:
1.3     ! doug      160:        memset(&sess_id_config, 0, sizeof(sess_id_config));
        !           161:
        !           162:        sess_id_config.informat = FORMAT_PEM;
        !           163:        sess_id_config.outformat = FORMAT_PEM;
        !           164:
        !           165:        if (options_parse(argc, argv, sess_id_options, NULL, NULL) != 0) {
        !           166:                sess_id_usage();
        !           167:                return (1);
1.1       jsing     168:        }
1.2       jsing     169:
1.3     ! doug      170:        x = load_sess_id(sess_id_config.infile, sess_id_config.informat);
1.1       jsing     171:        if (x == NULL) {
                    172:                goto end;
                    173:        }
                    174:        peer = SSL_SESSION_get0_peer(x);
                    175:
1.3     ! doug      176:        if (sess_id_config.context) {
        !           177:                size_t ctx_len = strlen(sess_id_config.context);
1.1       jsing     178:                if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
                    179:                        BIO_printf(bio_err, "Context too long\n");
                    180:                        goto end;
                    181:                }
1.3     ! doug      182:                SSL_SESSION_set1_id_context(x,
        !           183:                    (unsigned char *)sess_id_config.context, ctx_len);
1.1       jsing     184:        }
                    185: #ifdef undef
                    186:        /* just testing for memory leaks :-) */
                    187:        {
                    188:                SSL_SESSION *s;
                    189:                char buf[1024 * 10], *p;
                    190:                int i;
                    191:
                    192:                s = SSL_SESSION_new();
                    193:
                    194:                p = &buf;
                    195:                i = i2d_SSL_SESSION(x, &p);
                    196:                p = &buf;
                    197:                d2i_SSL_SESSION(&s, &p, (long) i);
                    198:                p = &buf;
                    199:                d2i_SSL_SESSION(&s, &p, (long) i);
                    200:                p = &buf;
                    201:                d2i_SSL_SESSION(&s, &p, (long) i);
                    202:                SSL_SESSION_free(s);
                    203:        }
                    204: #endif
                    205:
1.3     ! doug      206:        if (!sess_id_config.noout || sess_id_config.text) {
1.1       jsing     207:                out = BIO_new(BIO_s_file());
                    208:                if (out == NULL) {
                    209:                        ERR_print_errors(bio_err);
                    210:                        goto end;
                    211:                }
1.3     ! doug      212:                if (sess_id_config.outfile == NULL) {
1.1       jsing     213:                        BIO_set_fp(out, stdout, BIO_NOCLOSE);
                    214:                } else {
1.3     ! doug      215:                        if (BIO_write_filename(out, sess_id_config.outfile)
        !           216:                            <= 0) {
        !           217:                                perror(sess_id_config.outfile);
1.1       jsing     218:                                goto end;
                    219:                        }
                    220:                }
                    221:        }
1.3     ! doug      222:        if (sess_id_config.text) {
1.1       jsing     223:                SSL_SESSION_print(out, x);
                    224:
1.3     ! doug      225:                if (sess_id_config.cert) {
1.1       jsing     226:                        if (peer == NULL)
                    227:                                BIO_puts(out, "No certificate present\n");
                    228:                        else
                    229:                                X509_print(out, peer);
                    230:                }
                    231:        }
1.3     ! doug      232:        if (!sess_id_config.noout && !sess_id_config.cert) {
        !           233:                if (sess_id_config.outformat == FORMAT_ASN1)
1.1       jsing     234:                        i = i2d_SSL_SESSION_bio(out, x);
1.3     ! doug      235:                else if (sess_id_config.outformat == FORMAT_PEM)
1.1       jsing     236:                        i = PEM_write_bio_SSL_SESSION(out, x);
                    237:                else {
1.3     ! doug      238:                        BIO_printf(bio_err,
        !           239:                            "bad output format specified for outfile\n");
1.1       jsing     240:                        goto end;
                    241:                }
                    242:                if (!i) {
                    243:                        BIO_printf(bio_err, "unable to write SSL_SESSION\n");
                    244:                        goto end;
                    245:                }
1.3     ! doug      246:        } else if (!sess_id_config.noout && (peer != NULL)) {
        !           247:                /* just print the certificate */
        !           248:                if (sess_id_config.outformat == FORMAT_ASN1)
1.1       jsing     249:                        i = (int) i2d_X509_bio(out, peer);
1.3     ! doug      250:                else if (sess_id_config.outformat == FORMAT_PEM)
1.1       jsing     251:                        i = PEM_write_bio_X509(out, peer);
                    252:                else {
1.3     ! doug      253:                        BIO_printf(bio_err,
        !           254:                            "bad output format specified for outfile\n");
1.1       jsing     255:                        goto end;
                    256:                }
                    257:                if (!i) {
                    258:                        BIO_printf(bio_err, "unable to write X509\n");
                    259:                        goto end;
                    260:                }
                    261:        }
                    262:        ret = 0;
1.3     ! doug      263:
1.1       jsing     264: end:
1.3     ! doug      265:        BIO_free_all(out);
        !           266:        SSL_SESSION_free(x);
1.1       jsing     267:
                    268:        return (ret);
                    269: }
                    270:
                    271: static SSL_SESSION *
                    272: load_sess_id(char *infile, int format)
                    273: {
                    274:        SSL_SESSION *x = NULL;
                    275:        BIO *in = NULL;
                    276:
                    277:        in = BIO_new(BIO_s_file());
                    278:        if (in == NULL) {
                    279:                ERR_print_errors(bio_err);
                    280:                goto end;
                    281:        }
                    282:        if (infile == NULL)
                    283:                BIO_set_fp(in, stdin, BIO_NOCLOSE);
                    284:        else {
                    285:                if (BIO_read_filename(in, infile) <= 0) {
                    286:                        perror(infile);
                    287:                        goto end;
                    288:                }
                    289:        }
                    290:        if (format == FORMAT_ASN1)
                    291:                x = d2i_SSL_SESSION_bio(in, NULL);
                    292:        else if (format == FORMAT_PEM)
                    293:                x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
                    294:        else {
1.3     ! doug      295:                BIO_printf(bio_err,
        !           296:                    "bad input format specified for input crl\n");
1.1       jsing     297:                goto end;
                    298:        }
                    299:        if (x == NULL) {
                    300:                BIO_printf(bio_err, "unable to load SSL_SESSION\n");
                    301:                ERR_print_errors(bio_err);
                    302:                goto end;
                    303:        }
                    304: end:
                    305:        BIO_free(in);
                    306:        return (x);
                    307: }