]>
git.ipfire.org Git - thirdparty/openssl.git/blob - apps/sess_id.c
2 * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
15 #include <openssl/bio.h>
16 #include <openssl/err.h>
17 #include <openssl/x509.h>
18 #include <openssl/pem.h>
19 #include <openssl/ssl.h>
21 typedef enum OPTION_choice
{
22 OPT_ERR
= -1, OPT_EOF
= 0, OPT_HELP
,
23 OPT_INFORM
, OPT_OUTFORM
, OPT_IN
, OPT_OUT
,
24 OPT_TEXT
, OPT_CERT
, OPT_NOOUT
, OPT_CONTEXT
27 const OPTIONS sess_id_options
[] = {
28 {"help", OPT_HELP
, '-', "Display this summary"},
29 {"inform", OPT_INFORM
, 'F', "Input format - default PEM (DER or PEM)"},
30 {"outform", OPT_OUTFORM
, 'f',
31 "Output format - default PEM (PEM, DER or NSS)"},
32 {"in", OPT_IN
, 's', "Input file - default stdin"},
33 {"out", OPT_OUT
, '>', "Output file - default stdout"},
34 {"text", OPT_TEXT
, '-', "Print ssl session id details"},
35 {"cert", OPT_CERT
, '-', "Output certificate "},
36 {"noout", OPT_NOOUT
, '-', "Don't output the encoded session info"},
37 {"context", OPT_CONTEXT
, 's', "Set the session ID context"},
41 static SSL_SESSION
*load_sess_id(char *file
, int format
);
43 int sess_id_main(int argc
, char **argv
)
45 SSL_SESSION
*x
= NULL
;
48 char *infile
= NULL
, *outfile
= NULL
, *context
= NULL
, *prog
;
49 int informat
= FORMAT_PEM
, outformat
= FORMAT_PEM
;
50 int cert
= 0, noout
= 0, text
= 0, ret
= 1, i
, num
= 0;
53 prog
= opt_init(argc
, argv
, sess_id_options
);
54 while ((o
= opt_next()) != OPT_EOF
) {
59 BIO_printf(bio_err
, "%s: Use -help for summary.\n", prog
);
62 opt_help(sess_id_options
);
66 if (!opt_format(opt_arg(), OPT_FMT_PEMDER
, &informat
))
70 if (!opt_format(opt_arg(), OPT_FMT_PEMDER
| OPT_FMT_NSS
,
94 argc
= opt_num_rest();
98 x
= load_sess_id(infile
, informat
);
102 peer
= SSL_SESSION_get0_peer(x
);
104 if (context
!= NULL
) {
105 size_t ctx_len
= strlen(context
);
106 if (ctx_len
> SSL_MAX_SID_CTX_LENGTH
) {
107 BIO_printf(bio_err
, "Context too long\n");
110 if (!SSL_SESSION_set1_id_context(x
, (unsigned char *)context
,
112 BIO_printf(bio_err
, "Error setting id context\n");
117 if (!noout
|| text
) {
118 out
= bio_open_default(outfile
, 'w', outformat
);
124 SSL_SESSION_print(out
, x
);
128 BIO_puts(out
, "No certificate present\n");
130 X509_print(out
, peer
);
134 if (!noout
&& !cert
) {
135 if (outformat
== FORMAT_ASN1
) {
136 i
= i2d_SSL_SESSION_bio(out
, x
);
137 } else if (outformat
== FORMAT_PEM
) {
138 i
= PEM_write_bio_SSL_SESSION(out
, x
);
139 } else if (outformat
== FORMAT_NSS
) {
140 i
= SSL_SESSION_print_keylog(out
, x
);
142 BIO_printf(bio_err
, "bad output format specified for outfile\n");
146 BIO_printf(bio_err
, "unable to write SSL_SESSION\n");
149 } else if (!noout
&& (peer
!= NULL
)) { /* just print the certificate */
150 if (outformat
== FORMAT_ASN1
) {
151 i
= (int)i2d_X509_bio(out
, peer
);
152 } else if (outformat
== FORMAT_PEM
) {
153 i
= PEM_write_bio_X509(out
, peer
);
155 BIO_printf(bio_err
, "bad output format specified for outfile\n");
159 BIO_printf(bio_err
, "unable to write X509\n");
170 static SSL_SESSION
*load_sess_id(char *infile
, int format
)
172 SSL_SESSION
*x
= NULL
;
175 in
= bio_open_default(infile
, 'r', format
);
178 if (format
== FORMAT_ASN1
)
179 x
= d2i_SSL_SESSION_bio(in
, NULL
);
181 x
= PEM_read_bio_SSL_SESSION(in
, NULL
, NULL
, NULL
);
183 BIO_printf(bio_err
, "unable to load SSL_SESSION\n");
184 ERR_print_errors(bio_err
);