]> git.ipfire.org Git - thirdparty/openssl.git/blame - apps/sess_id.c
Run util/openssl-format-source -v -c .
[thirdparty/openssl.git] / apps / sess_id.c
CommitLineData
d02b48c6 1/* apps/sess_id.c */
58964a49 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
d02b48c6
RE
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
0f113f3e 8 *
d02b48c6
RE
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
0f113f3e 15 *
d02b48c6
RE
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
0f113f3e 22 *
d02b48c6
RE
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
0f113f3e 37 * 4. If you include any Windows specific code (or a derivative thereof) from
d02b48c6
RE
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
0f113f3e 40 *
d02b48c6
RE
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
0f113f3e 52 *
d02b48c6
RE
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
57 */
58
59#include <stdio.h>
60#include <stdlib.h>
61#include <string.h>
62#include "apps.h"
ec577822
BM
63#include <openssl/bio.h>
64#include <openssl/err.h>
65#include <openssl/x509.h>
66#include <openssl/pem.h>
67#include <openssl/ssl.h>
d02b48c6
RE
68
69#undef PROG
0f113f3e 70#define PROG sess_id_main
d02b48c6 71
0f113f3e
MC
72static const char *sess_id_usage[] = {
73 "usage: sess_id args\n",
74 "\n",
75 " -inform arg - input format - default PEM (DER or PEM)\n",
76 " -outform arg - output format - default PEM (PEM, DER or NSS)\n",
77 " -in arg - input file - default stdin\n",
78 " -out arg - output file - default stdout\n",
79 " -text - print ssl session id details\n",
80 " -cert - output certificate \n",
81 " -noout - no output of encoded session info\n",
82 " -context arg - set the session ID context\n",
83 NULL
d02b48c6
RE
84};
85
d02b48c6 86static SSL_SESSION *load_sess_id(char *file, int format);
667ac4ec
RE
87
88int MAIN(int, char **);
89
6b691a5c 90int MAIN(int argc, char **argv)
0f113f3e
MC
91{
92 SSL_SESSION *x = NULL;
93 X509 *peer = NULL;
94 int ret = 1, i, num, badops = 0;
95 BIO *out = NULL;
96 int informat, outformat;
97 char *infile = NULL, *outfile = NULL, *context = NULL;
98 int cert = 0, noout = 0, text = 0;
99 const char **pp;
d02b48c6 100
0f113f3e 101 apps_startup();
d02b48c6 102
0f113f3e
MC
103 if (bio_err == NULL)
104 if ((bio_err = BIO_new(BIO_s_file())) != NULL)
105 BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
d02b48c6 106
0f113f3e
MC
107 informat = FORMAT_PEM;
108 outformat = FORMAT_PEM;
d02b48c6 109
0f113f3e
MC
110 argc--;
111 argv++;
112 num = 0;
113 while (argc >= 1) {
114 if (strcmp(*argv, "-inform") == 0) {
115 if (--argc < 1)
116 goto bad;
117 informat = str2fmt(*(++argv));
118 } else if (strcmp(*argv, "-outform") == 0) {
119 if (--argc < 1)
120 goto bad;
121 outformat = str2fmt(*(++argv));
122 } else if (strcmp(*argv, "-in") == 0) {
123 if (--argc < 1)
124 goto bad;
125 infile = *(++argv);
126 } else if (strcmp(*argv, "-out") == 0) {
127 if (--argc < 1)
128 goto bad;
129 outfile = *(++argv);
130 } else if (strcmp(*argv, "-text") == 0)
131 text = ++num;
132 else if (strcmp(*argv, "-cert") == 0)
133 cert = ++num;
134 else if (strcmp(*argv, "-noout") == 0)
135 noout = ++num;
136 else if (strcmp(*argv, "-context") == 0) {
137 if (--argc < 1)
138 goto bad;
139 context = *++argv;
140 } else {
141 BIO_printf(bio_err, "unknown option %s\n", *argv);
142 badops = 1;
143 break;
144 }
145 argc--;
146 argv++;
147 }
d02b48c6 148
0f113f3e
MC
149 if (badops) {
150 bad:
151 for (pp = sess_id_usage; (*pp != NULL); pp++)
152 BIO_printf(bio_err, "%s", *pp);
153 goto end;
154 }
d02b48c6 155
0f113f3e
MC
156 ERR_load_crypto_strings();
157 x = load_sess_id(infile, informat);
158 if (x == NULL) {
159 goto end;
160 }
161 peer = SSL_SESSION_get0_peer(x);
b4cadc6e 162
0f113f3e
MC
163 if (context) {
164 size_t ctx_len = strlen(context);
165 if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
166 BIO_printf(bio_err, "Context too long\n");
167 goto end;
168 }
169 SSL_SESSION_set1_id_context(x, (unsigned char *)context, ctx_len);
170 }
d02b48c6 171#ifdef undef
0f113f3e
MC
172 /* just testing for memory leaks :-) */
173 {
174 SSL_SESSION *s;
175 char buf[1024 * 10], *p;
176 int i;
d02b48c6 177
0f113f3e 178 s = SSL_SESSION_new();
d02b48c6 179
0f113f3e
MC
180 p = &buf;
181 i = i2d_SSL_SESSION(x, &p);
182 p = &buf;
183 d2i_SSL_SESSION(&s, &p, (long)i);
184 p = &buf;
185 d2i_SSL_SESSION(&s, &p, (long)i);
186 p = &buf;
187 d2i_SSL_SESSION(&s, &p, (long)i);
188 SSL_SESSION_free(s);
189 }
d02b48c6
RE
190#endif
191
0f113f3e
MC
192 if (!noout || text) {
193 out = BIO_new(BIO_s_file());
194 if (out == NULL) {
195 ERR_print_errors(bio_err);
196 goto end;
197 }
d02b48c6 198
0f113f3e
MC
199 if (outfile == NULL) {
200 BIO_set_fp(out, stdout, BIO_NOCLOSE);
bc36ee62 201#ifdef OPENSSL_SYS_VMS
0f113f3e
MC
202 {
203 BIO *tmpbio = BIO_new(BIO_f_linebuffer());
204 out = BIO_push(tmpbio, out);
205 }
645749ef 206#endif
0f113f3e
MC
207 } else {
208 if (BIO_write_filename(out, outfile) <= 0) {
209 perror(outfile);
210 goto end;
211 }
212 }
213 }
d02b48c6 214
0f113f3e
MC
215 if (text) {
216 SSL_SESSION_print(out, x);
d02b48c6 217
0f113f3e
MC
218 if (cert) {
219 if (peer == NULL)
220 BIO_puts(out, "No certificate present\n");
221 else
222 X509_print(out, peer);
223 }
224 }
d02b48c6 225
0f113f3e
MC
226 if (!noout && !cert) {
227 if (outformat == FORMAT_ASN1)
228 i = i2d_SSL_SESSION_bio(out, x);
229 else if (outformat == FORMAT_PEM)
230 i = PEM_write_bio_SSL_SESSION(out, x);
231 else if (outformat == FORMAT_NSS)
232 i = SSL_SESSION_print_keylog(out, x);
233 else {
234 BIO_printf(bio_err, "bad output format specified for outfile\n");
235 goto end;
236 }
237 if (!i) {
238 BIO_printf(bio_err, "unable to write SSL_SESSION\n");
239 goto end;
240 }
241 } else if (!noout && (peer != NULL)) { /* just print the certificate */
242 if (outformat == FORMAT_ASN1)
243 i = (int)i2d_X509_bio(out, peer);
244 else if (outformat == FORMAT_PEM)
245 i = PEM_write_bio_X509(out, peer);
246 else {
247 BIO_printf(bio_err, "bad output format specified for outfile\n");
248 goto end;
249 }
250 if (!i) {
251 BIO_printf(bio_err, "unable to write X509\n");
252 goto end;
253 }
254 }
255 ret = 0;
256 end:
257 if (out != NULL)
258 BIO_free_all(out);
259 if (x != NULL)
260 SSL_SESSION_free(x);
261 apps_shutdown();
262 OPENSSL_EXIT(ret);
263}
d02b48c6 264
6b691a5c 265static SSL_SESSION *load_sess_id(char *infile, int format)
0f113f3e
MC
266{
267 SSL_SESSION *x = NULL;
268 BIO *in = NULL;
d02b48c6 269
0f113f3e
MC
270 in = BIO_new(BIO_s_file());
271 if (in == NULL) {
272 ERR_print_errors(bio_err);
273 goto end;
274 }
d02b48c6 275
0f113f3e
MC
276 if (infile == NULL)
277 BIO_set_fp(in, stdin, BIO_NOCLOSE);
278 else {
279 if (BIO_read_filename(in, infile) <= 0) {
280 perror(infile);
281 goto end;
282 }
283 }
284 if (format == FORMAT_ASN1)
285 x = d2i_SSL_SESSION_bio(in, NULL);
286 else if (format == FORMAT_PEM)
287 x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
288 else {
289 BIO_printf(bio_err, "bad input format specified for input crl\n");
290 goto end;
291 }
292 if (x == NULL) {
293 BIO_printf(bio_err, "unable to load SSL_SESSION\n");
294 ERR_print_errors(bio_err);
295 goto end;
296 }
d02b48c6 297
0f113f3e
MC
298 end:
299 if (in != NULL)
300 BIO_free(in);
301 return (x);
302}