os/ossrv/ssl/tsrc/topenssl/src/sess_id.c
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
/* apps/sess_id.c */
sl@0
     2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
sl@0
     3
 * All rights reserved.
sl@0
     4
 *
sl@0
     5
 * This package is an SSL implementation written
sl@0
     6
 * by Eric Young (eay@cryptsoft.com).
sl@0
     7
 * The implementation was written so as to conform with Netscapes SSL.
sl@0
     8
 * 
sl@0
     9
 * This library is free for commercial and non-commercial use as long as
sl@0
    10
 * the following conditions are aheared to.  The following conditions
sl@0
    11
 * apply to all code found in this distribution, be it the RC4, RSA,
sl@0
    12
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
sl@0
    13
 * included with this distribution is covered by the same copyright terms
sl@0
    14
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
sl@0
    15
 * 
sl@0
    16
 * Copyright remains Eric Young's, and as such any Copyright notices in
sl@0
    17
 * the code are not to be removed.
sl@0
    18
 * If this package is used in a product, Eric Young should be given attribution
sl@0
    19
 * as the author of the parts of the library used.
sl@0
    20
 * This can be in the form of a textual message at program startup or
sl@0
    21
 * in documentation (online or textual) provided with the package.
sl@0
    22
 * 
sl@0
    23
 * Redistribution and use in source and binary forms, with or without
sl@0
    24
 * modification, are permitted provided that the following conditions
sl@0
    25
 * are met:
sl@0
    26
 * 1. Redistributions of source code must retain the copyright
sl@0
    27
 *    notice, this list of conditions and the following disclaimer.
sl@0
    28
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    29
 *    notice, this list of conditions and the following disclaimer in the
sl@0
    30
 *    documentation and/or other materials provided with the distribution.
sl@0
    31
 * 3. All advertising materials mentioning features or use of this software
sl@0
    32
 *    must display the following acknowledgement:
sl@0
    33
 *    "This product includes cryptographic software written by
sl@0
    34
 *     Eric Young (eay@cryptsoft.com)"
sl@0
    35
 *    The word 'cryptographic' can be left out if the rouines from the library
sl@0
    36
 *    being used are not cryptographic related :-).
sl@0
    37
 * 4. If you include any Windows specific code (or a derivative thereof) from 
sl@0
    38
 *    the apps directory (application code) you must include an acknowledgement:
sl@0
    39
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
sl@0
    40
 * 
sl@0
    41
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
sl@0
    42
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    43
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
sl@0
    44
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
sl@0
    45
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
sl@0
    46
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
sl@0
    47
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    48
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
sl@0
    49
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
sl@0
    50
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
sl@0
    51
 * SUCH DAMAGE.
sl@0
    52
 * 
sl@0
    53
 * The licence and distribution terms for any publically available version or
sl@0
    54
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
sl@0
    55
 * copied and put under another distribution licence
sl@0
    56
 * [including the GNU Public Licence.]
sl@0
    57
 */
sl@0
    58
sl@0
    59
#include <stdio.h>
sl@0
    60
#include <stdlib.h>
sl@0
    61
#include <string.h>
sl@0
    62
#include "apps.h"
sl@0
    63
#include <openssl/bio.h>
sl@0
    64
#include <openssl/err.h>
sl@0
    65
#include <openssl/x509.h>
sl@0
    66
#include <openssl/pem.h>
sl@0
    67
#include <openssl/ssl.h>
sl@0
    68
sl@0
    69
#undef PROG
sl@0
    70
#define PROG	sess_id_main
sl@0
    71
sl@0
    72
static const char *sess_id_usage[]={
sl@0
    73
"usage: sess_id args\n",
sl@0
    74
"\n",
sl@0
    75
" -inform arg     - input format - default PEM (DER or PEM)\n",
sl@0
    76
" -outform arg    - output format - default PEM\n",
sl@0
    77
" -in arg         - input file - default stdin\n",
sl@0
    78
" -out arg        - output file - default stdout\n",
sl@0
    79
" -text           - print ssl session id details\n",
sl@0
    80
" -cert           - output certificate \n",
sl@0
    81
" -noout          - no CRL output\n",
sl@0
    82
" -context arg    - set the session ID context\n",
sl@0
    83
NULL
sl@0
    84
};
sl@0
    85
sl@0
    86
static SSL_SESSION *load_sess_id(char *file, int format);
sl@0
    87
sl@0
    88
int MAIN(int, char **);
sl@0
    89
sl@0
    90
int MAIN(int argc, char **argv)
sl@0
    91
	{
sl@0
    92
	SSL_SESSION *x=NULL;
sl@0
    93
	int ret=1,i,num,badops=0;
sl@0
    94
	BIO *out=NULL;
sl@0
    95
	int informat,outformat;
sl@0
    96
	char *infile=NULL,*outfile=NULL,*context=NULL;
sl@0
    97
	int cert=0,noout=0,text=0;
sl@0
    98
	const char **pp;
sl@0
    99
sl@0
   100
	apps_startup();
sl@0
   101
sl@0
   102
	if (bio_err == NULL)
sl@0
   103
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
sl@0
   104
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
sl@0
   105
	informat=FORMAT_PEM;
sl@0
   106
	outformat=FORMAT_PEM;
sl@0
   107
sl@0
   108
	argc--;
sl@0
   109
	argv++;
sl@0
   110
	num=0;
sl@0
   111
	while (argc >= 1)
sl@0
   112
		{
sl@0
   113
		if 	(strcmp(*argv,"-inform") == 0)
sl@0
   114
			{
sl@0
   115
			if (--argc < 1) goto bad;
sl@0
   116
			informat=str2fmt(*(++argv));
sl@0
   117
			}
sl@0
   118
		else if (strcmp(*argv,"-outform") == 0)
sl@0
   119
			{
sl@0
   120
			if (--argc < 1) goto bad;
sl@0
   121
			outformat=str2fmt(*(++argv));
sl@0
   122
			}
sl@0
   123
		else if (strcmp(*argv,"-in") == 0)
sl@0
   124
			{
sl@0
   125
			if (--argc < 1) goto bad;
sl@0
   126
			infile= *(++argv);
sl@0
   127
			}
sl@0
   128
		else if (strcmp(*argv,"-out") == 0)
sl@0
   129
			{
sl@0
   130
			if (--argc < 1) goto bad;
sl@0
   131
			outfile= *(++argv);
sl@0
   132
			}
sl@0
   133
		else if (strcmp(*argv,"-text") == 0)
sl@0
   134
			text= ++num;
sl@0
   135
		else if (strcmp(*argv,"-cert") == 0)
sl@0
   136
			cert= ++num;
sl@0
   137
		else if (strcmp(*argv,"-noout") == 0)
sl@0
   138
			noout= ++num;
sl@0
   139
		else if (strcmp(*argv,"-context") == 0)
sl@0
   140
		    {
sl@0
   141
		    if(--argc < 1) goto bad;
sl@0
   142
		    context=*++argv;
sl@0
   143
		    }
sl@0
   144
		else
sl@0
   145
			{
sl@0
   146
			BIO_printf(bio_err,"unknown option %s\n",*argv);
sl@0
   147
			badops=1;
sl@0
   148
			break;
sl@0
   149
			}
sl@0
   150
		argc--;
sl@0
   151
		argv++;
sl@0
   152
		}
sl@0
   153
sl@0
   154
	if (badops)
sl@0
   155
		{
sl@0
   156
bad:
sl@0
   157
		for (pp=sess_id_usage; (*pp != NULL); pp++)
sl@0
   158
			BIO_printf(bio_err,"%s",*pp);
sl@0
   159
		goto end;
sl@0
   160
		}
sl@0
   161
sl@0
   162
	ERR_load_crypto_strings();
sl@0
   163
	x=load_sess_id(infile,informat);
sl@0
   164
	if (x == NULL) { goto end; }
sl@0
   165
sl@0
   166
	if(context)
sl@0
   167
	    {
sl@0
   168
	    x->sid_ctx_length=strlen(context);
sl@0
   169
	    if(x->sid_ctx_length > SSL_MAX_SID_CTX_LENGTH)
sl@0
   170
		{
sl@0
   171
		BIO_printf(bio_err,"Context too long\n");
sl@0
   172
		goto end;
sl@0
   173
		}
sl@0
   174
	    memcpy(x->sid_ctx,context,x->sid_ctx_length);
sl@0
   175
	    }
sl@0
   176
sl@0
   177
#ifdef undef
sl@0
   178
	/* just testing for memory leaks :-) */
sl@0
   179
	{
sl@0
   180
	SSL_SESSION *s;
sl@0
   181
	char buf[1024*10],*p;
sl@0
   182
	int i;
sl@0
   183
sl@0
   184
	s=SSL_SESSION_new();
sl@0
   185
sl@0
   186
	p= &buf;
sl@0
   187
	i=i2d_SSL_SESSION(x,&p);
sl@0
   188
	p= &buf;
sl@0
   189
	d2i_SSL_SESSION(&s,&p,(long)i);
sl@0
   190
	p= &buf;
sl@0
   191
	d2i_SSL_SESSION(&s,&p,(long)i);
sl@0
   192
	p= &buf;
sl@0
   193
	d2i_SSL_SESSION(&s,&p,(long)i);
sl@0
   194
	SSL_SESSION_free(s);
sl@0
   195
	}
sl@0
   196
#endif
sl@0
   197
sl@0
   198
	if (!noout || text)
sl@0
   199
		{
sl@0
   200
		out=BIO_new(BIO_s_file());
sl@0
   201
		if (out == NULL)
sl@0
   202
			{
sl@0
   203
			ERR_print_errors(bio_err);
sl@0
   204
			goto end;
sl@0
   205
			}
sl@0
   206
sl@0
   207
		if (outfile == NULL)
sl@0
   208
			{
sl@0
   209
			BIO_set_fp(out,stdout,BIO_NOCLOSE);
sl@0
   210
#ifdef OPENSSL_SYS_VMS
sl@0
   211
			{
sl@0
   212
			BIO *tmpbio = BIO_new(BIO_f_linebuffer());
sl@0
   213
			out = BIO_push(tmpbio, out);
sl@0
   214
			}
sl@0
   215
#endif
sl@0
   216
			}
sl@0
   217
		else
sl@0
   218
			{
sl@0
   219
			if (BIO_write_filename(out,outfile) <= 0)
sl@0
   220
				{
sl@0
   221
				perror(outfile);
sl@0
   222
				goto end;
sl@0
   223
				}
sl@0
   224
			}
sl@0
   225
		}
sl@0
   226
sl@0
   227
	if (text)
sl@0
   228
		{
sl@0
   229
		SSL_SESSION_print(out,x);
sl@0
   230
sl@0
   231
		if (cert)
sl@0
   232
			{
sl@0
   233
			if (x->peer == NULL)
sl@0
   234
				BIO_puts(out,"No certificate present\n");
sl@0
   235
			else
sl@0
   236
				X509_print(out,x->peer);
sl@0
   237
			}
sl@0
   238
		}
sl@0
   239
sl@0
   240
	if (!noout && !cert)
sl@0
   241
		{
sl@0
   242
		if 	(outformat == FORMAT_ASN1)
sl@0
   243
			i=i2d_SSL_SESSION_bio(out,x);
sl@0
   244
		else if (outformat == FORMAT_PEM)
sl@0
   245
			i=PEM_write_bio_SSL_SESSION(out,x);
sl@0
   246
		else	{
sl@0
   247
			BIO_printf(bio_err,"bad output format specified for outfile\n");
sl@0
   248
			goto end;
sl@0
   249
			}
sl@0
   250
		if (!i) {
sl@0
   251
			BIO_printf(bio_err,"unable to write SSL_SESSION\n");
sl@0
   252
			goto end;
sl@0
   253
			}
sl@0
   254
		}
sl@0
   255
	else if (!noout && (x->peer != NULL)) /* just print the certificate */
sl@0
   256
		{
sl@0
   257
		if 	(outformat == FORMAT_ASN1)
sl@0
   258
			i=(int)i2d_X509_bio(out,x->peer);
sl@0
   259
		else if (outformat == FORMAT_PEM)
sl@0
   260
			i=PEM_write_bio_X509(out,x->peer);
sl@0
   261
		else	{
sl@0
   262
			BIO_printf(bio_err,"bad output format specified for outfile\n");
sl@0
   263
			goto end;
sl@0
   264
			}
sl@0
   265
		if (!i) {
sl@0
   266
			BIO_printf(bio_err,"unable to write X509\n");
sl@0
   267
			goto end;
sl@0
   268
			}
sl@0
   269
		}
sl@0
   270
	ret=0;
sl@0
   271
end:
sl@0
   272
	if (out != NULL) BIO_free_all(out);
sl@0
   273
	if (x != NULL) SSL_SESSION_free(x);
sl@0
   274
	apps_shutdown();
sl@0
   275
	OPENSSL_EXIT(ret);
sl@0
   276
	}
sl@0
   277
sl@0
   278
static SSL_SESSION *load_sess_id(char *infile, int format)
sl@0
   279
	{
sl@0
   280
	SSL_SESSION *x=NULL;
sl@0
   281
	BIO *in=NULL;
sl@0
   282
sl@0
   283
	in=BIO_new(BIO_s_file());
sl@0
   284
	if (in == NULL)
sl@0
   285
		{
sl@0
   286
		ERR_print_errors(bio_err);
sl@0
   287
		goto end;
sl@0
   288
		}
sl@0
   289
sl@0
   290
	if (infile == NULL)
sl@0
   291
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
sl@0
   292
sl@0
   293
	else
sl@0
   294
		{
sl@0
   295
		if (BIO_read_filename(in,infile) <= 0)
sl@0
   296
			{
sl@0
   297
			perror(infile);
sl@0
   298
			goto end;
sl@0
   299
			}
sl@0
   300
		}
sl@0
   301
	if 	(format == FORMAT_ASN1)
sl@0
   302
		x=d2i_SSL_SESSION_bio(in,NULL);
sl@0
   303
	else if (format == FORMAT_PEM)
sl@0
   304
		x=PEM_read_bio_SSL_SESSION(in,NULL,NULL,NULL);
sl@0
   305
	else	{
sl@0
   306
		BIO_printf(bio_err,"bad input format specified for input crl\n");
sl@0
   307
		goto end;
sl@0
   308
		}
sl@0
   309
	if (x == NULL)
sl@0
   310
		{
sl@0
   311
		BIO_printf(bio_err,"unable to load SSL_SESSION\n");
sl@0
   312
		ERR_print_errors(bio_err);
sl@0
   313
		goto end;
sl@0
   314
		}
sl@0
   315
	
sl@0
   316
end:
sl@0
   317
	if (in != NULL) BIO_free(in);
sl@0
   318
	return(x);
sl@0
   319
	}
sl@0
   320