]>
Commit | Line | Data |
---|---|---|
846e33c7 | 1 | /* |
6738bf14 | 2 | * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. |
d02b48c6 | 3 | * |
dffa7520 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
846e33c7 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
d02b48c6 RE |
8 | */ |
9 | ||
10 | #include <stdio.h> | |
11 | #include <stdlib.h> | |
12 | #include <string.h> | |
13 | #include "apps.h" | |
dab2cd68 | 14 | #include "progs.h" |
ec577822 BM |
15 | #include <openssl/bio.h> |
16 | #include <openssl/err.h> | |
17 | #include <openssl/x509.h> | |
18 | #include <openssl/pem.h> | |
19 | #include <openssl/ssl.h> | |
d02b48c6 | 20 | |
7e1b7485 RS |
21 | typedef enum OPTION_choice { |
22 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, | |
23 | OPT_INFORM, OPT_OUTFORM, OPT_IN, OPT_OUT, | |
24 | OPT_TEXT, OPT_CERT, OPT_NOOUT, OPT_CONTEXT | |
25 | } OPTION_CHOICE; | |
26 | ||
44c83ebd | 27 | const OPTIONS sess_id_options[] = { |
5388f986 | 28 | OPT_SECTION("General"), |
7e1b7485 | 29 | {"help", OPT_HELP, '-', "Display this summary"}, |
5388f986 RS |
30 | {"context", OPT_CONTEXT, 's', "Set the session ID context"}, |
31 | ||
32 | OPT_SECTION("Input"), | |
33 | {"in", OPT_IN, 's', "Input file - default stdin"}, | |
7e1b7485 | 34 | {"inform", OPT_INFORM, 'F', "Input format - default PEM (DER or PEM)"}, |
5388f986 RS |
35 | |
36 | OPT_SECTION("Output"), | |
37 | {"out", OPT_OUT, '>', "Output file - default stdout"}, | |
1446f72b | 38 | {"outform", OPT_OUTFORM, 'f', |
7e1b7485 | 39 | "Output format - default PEM (PEM, DER or NSS)"}, |
7e1b7485 RS |
40 | {"text", OPT_TEXT, '-', "Print ssl session id details"}, |
41 | {"cert", OPT_CERT, '-', "Output certificate "}, | |
42 | {"noout", OPT_NOOUT, '-', "Don't output the encoded session info"}, | |
7e1b7485 | 43 | {NULL} |
d02b48c6 RE |
44 | }; |
45 | ||
d02b48c6 | 46 | static SSL_SESSION *load_sess_id(char *file, int format); |
667ac4ec | 47 | |
7e1b7485 | 48 | int sess_id_main(int argc, char **argv) |
0f113f3e MC |
49 | { |
50 | SSL_SESSION *x = NULL; | |
51 | X509 *peer = NULL; | |
0f113f3e | 52 | BIO *out = NULL; |
7e1b7485 RS |
53 | char *infile = NULL, *outfile = NULL, *context = NULL, *prog; |
54 | int informat = FORMAT_PEM, outformat = FORMAT_PEM; | |
55 | int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; | |
56 | OPTION_CHOICE o; | |
57 | ||
58 | prog = opt_init(argc, argv, sess_id_options); | |
59 | while ((o = opt_next()) != OPT_EOF) { | |
60 | switch (o) { | |
61 | case OPT_EOF: | |
62 | case OPT_ERR: | |
63 | opthelp: | |
64 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); | |
65 | goto end; | |
66 | case OPT_HELP: | |
67 | opt_help(sess_id_options); | |
68 | ret = 0; | |
69 | goto end; | |
70 | case OPT_INFORM: | |
71 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat)) | |
72 | goto opthelp; | |
73 | break; | |
74 | case OPT_OUTFORM: | |
1446f72b MC |
75 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER | OPT_FMT_NSS, |
76 | &outformat)) | |
7e1b7485 RS |
77 | goto opthelp; |
78 | break; | |
79 | case OPT_IN: | |
80 | infile = opt_arg(); | |
81 | break; | |
82 | case OPT_OUT: | |
83 | outfile = opt_arg(); | |
84 | break; | |
85 | case OPT_TEXT: | |
0f113f3e | 86 | text = ++num; |
7e1b7485 RS |
87 | break; |
88 | case OPT_CERT: | |
0f113f3e | 89 | cert = ++num; |
7e1b7485 RS |
90 | break; |
91 | case OPT_NOOUT: | |
0f113f3e | 92 | noout = ++num; |
7e1b7485 RS |
93 | break; |
94 | case OPT_CONTEXT: | |
95 | context = opt_arg(); | |
0f113f3e MC |
96 | break; |
97 | } | |
0f113f3e | 98 | } |
7e1b7485 | 99 | argc = opt_num_rest(); |
03358517 KR |
100 | if (argc != 0) |
101 | goto opthelp; | |
d02b48c6 | 102 | |
0f113f3e MC |
103 | x = load_sess_id(infile, informat); |
104 | if (x == NULL) { | |
105 | goto end; | |
106 | } | |
107 | peer = SSL_SESSION_get0_peer(x); | |
b4cadc6e | 108 | |
2234212c | 109 | if (context != NULL) { |
0f113f3e MC |
110 | size_t ctx_len = strlen(context); |
111 | if (ctx_len > SSL_MAX_SID_CTX_LENGTH) { | |
112 | BIO_printf(bio_err, "Context too long\n"); | |
113 | goto end; | |
114 | } | |
7e1b7485 | 115 | if (!SSL_SESSION_set1_id_context(x, (unsigned char *)context, |
2234212c | 116 | ctx_len)) { |
ac59d705 MC |
117 | BIO_printf(bio_err, "Error setting id context\n"); |
118 | goto end; | |
119 | } | |
0f113f3e | 120 | } |
d02b48c6 | 121 | |
0f113f3e | 122 | if (!noout || text) { |
bdd58d98 | 123 | out = bio_open_default(outfile, 'w', outformat); |
7e1b7485 | 124 | if (out == NULL) |
0f113f3e | 125 | goto end; |
0f113f3e | 126 | } |
d02b48c6 | 127 | |
0f113f3e MC |
128 | if (text) { |
129 | SSL_SESSION_print(out, x); | |
d02b48c6 | 130 | |
0f113f3e MC |
131 | if (cert) { |
132 | if (peer == NULL) | |
133 | BIO_puts(out, "No certificate present\n"); | |
134 | else | |
135 | X509_print(out, peer); | |
136 | } | |
137 | } | |
d02b48c6 | 138 | |
0f113f3e | 139 | if (!noout && !cert) { |
2234212c | 140 | if (outformat == FORMAT_ASN1) { |
0f113f3e | 141 | i = i2d_SSL_SESSION_bio(out, x); |
2234212c | 142 | } else if (outformat == FORMAT_PEM) { |
0f113f3e | 143 | i = PEM_write_bio_SSL_SESSION(out, x); |
2234212c | 144 | } else if (outformat == FORMAT_NSS) { |
0f113f3e | 145 | i = SSL_SESSION_print_keylog(out, x); |
2234212c | 146 | } else { |
0f113f3e MC |
147 | BIO_printf(bio_err, "bad output format specified for outfile\n"); |
148 | goto end; | |
149 | } | |
150 | if (!i) { | |
151 | BIO_printf(bio_err, "unable to write SSL_SESSION\n"); | |
152 | goto end; | |
153 | } | |
154 | } else if (!noout && (peer != NULL)) { /* just print the certificate */ | |
2234212c | 155 | if (outformat == FORMAT_ASN1) { |
0f113f3e | 156 | i = (int)i2d_X509_bio(out, peer); |
2234212c | 157 | } else if (outformat == FORMAT_PEM) { |
0f113f3e | 158 | i = PEM_write_bio_X509(out, peer); |
2234212c | 159 | } else { |
0f113f3e MC |
160 | BIO_printf(bio_err, "bad output format specified for outfile\n"); |
161 | goto end; | |
162 | } | |
163 | if (!i) { | |
164 | BIO_printf(bio_err, "unable to write X509\n"); | |
165 | goto end; | |
166 | } | |
167 | } | |
168 | ret = 0; | |
169 | end: | |
ca3a82c3 | 170 | BIO_free_all(out); |
25aaa98a | 171 | SSL_SESSION_free(x); |
26a7d938 | 172 | return ret; |
0f113f3e | 173 | } |
d02b48c6 | 174 | |
6b691a5c | 175 | static SSL_SESSION *load_sess_id(char *infile, int format) |
0f113f3e MC |
176 | { |
177 | SSL_SESSION *x = NULL; | |
178 | BIO *in = NULL; | |
d02b48c6 | 179 | |
bdd58d98 | 180 | in = bio_open_default(infile, 'r', format); |
7e1b7485 | 181 | if (in == NULL) |
0f113f3e | 182 | goto end; |
0f113f3e MC |
183 | if (format == FORMAT_ASN1) |
184 | x = d2i_SSL_SESSION_bio(in, NULL); | |
7e1b7485 | 185 | else |
0f113f3e | 186 | x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL); |
0f113f3e MC |
187 | if (x == NULL) { |
188 | BIO_printf(bio_err, "unable to load SSL_SESSION\n"); | |
189 | ERR_print_errors(bio_err); | |
190 | goto end; | |
191 | } | |
d02b48c6 | 192 | |
0f113f3e | 193 | end: |
ca3a82c3 | 194 | BIO_free(in); |
26a7d938 | 195 | return x; |
0f113f3e | 196 | } |