xref: /freebsd/crypto/openssl/apps/sess_id.c (revision 193d9e768ba63fcfb187cfd17f461f7d41345048)
1 /* apps/sess_id.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include "apps.h"
63 #include <openssl/bio.h>
64 #include <openssl/err.h>
65 #include <openssl/x509.h>
66 #include <openssl/pem.h>
67 #include <openssl/ssl.h>
68 
69 #undef PROG
70 #define PROG    sess_id_main
71 
72 static const char *sess_id_usage[] = {
73     "usage: sess_id args\n",
74     "\n",
75     " -inform arg     - input format - default PEM (DER or PEM)\n",
76     " -outform arg    - output format - default PEM\n",
77     " -in arg         - input file - default stdin\n",
78     " -out arg        - output file - default stdout\n",
79     " -text           - print ssl session id details\n",
80     " -cert           - output certificate \n",
81     " -noout          - no CRL output\n",
82     " -context arg    - set the session ID context\n",
83     NULL
84 };
85 
86 static SSL_SESSION *load_sess_id(char *file, int format);
87 
88 int MAIN(int, char **);
89 
90 int MAIN(int argc, char **argv)
91 {
92     SSL_SESSION *x = NULL;
93     X509 *peer = NULL;
94     int ret = 1, i, num, badops = 0;
95     BIO *out = NULL;
96     int informat, outformat;
97     char *infile = NULL, *outfile = NULL, *context = NULL;
98     int cert = 0, noout = 0, text = 0;
99     const char **pp;
100 
101     apps_startup();
102 
103     if (bio_err == NULL)
104         if ((bio_err = BIO_new(BIO_s_file())) != NULL)
105             BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
106 
107     informat = FORMAT_PEM;
108     outformat = FORMAT_PEM;
109 
110     argc--;
111     argv++;
112     num = 0;
113     while (argc >= 1) {
114         if (strcmp(*argv, "-inform") == 0) {
115             if (--argc < 1)
116                 goto bad;
117             informat = str2fmt(*(++argv));
118         } else if (strcmp(*argv, "-outform") == 0) {
119             if (--argc < 1)
120                 goto bad;
121             outformat = str2fmt(*(++argv));
122         } else if (strcmp(*argv, "-in") == 0) {
123             if (--argc < 1)
124                 goto bad;
125             infile = *(++argv);
126         } else if (strcmp(*argv, "-out") == 0) {
127             if (--argc < 1)
128                 goto bad;
129             outfile = *(++argv);
130         } else if (strcmp(*argv, "-text") == 0)
131             text = ++num;
132         else if (strcmp(*argv, "-cert") == 0)
133             cert = ++num;
134         else if (strcmp(*argv, "-noout") == 0)
135             noout = ++num;
136         else if (strcmp(*argv, "-context") == 0) {
137             if (--argc < 1)
138                 goto bad;
139             context = *++argv;
140         } else {
141             BIO_printf(bio_err, "unknown option %s\n", *argv);
142             badops = 1;
143             break;
144         }
145         argc--;
146         argv++;
147     }
148 
149     if (badops) {
150  bad:
151         for (pp = sess_id_usage; (*pp != NULL); pp++)
152             BIO_printf(bio_err, "%s", *pp);
153         goto end;
154     }
155 
156     ERR_load_crypto_strings();
157     x = load_sess_id(infile, informat);
158     if (x == NULL) {
159         goto end;
160     }
161     peer = SSL_SESSION_get0_peer(x);
162 
163     if (context) {
164         size_t ctx_len = strlen(context);
165         if (ctx_len > SSL_MAX_SID_CTX_LENGTH) {
166             BIO_printf(bio_err, "Context too long\n");
167             goto end;
168         }
169         SSL_SESSION_set1_id_context(x, (unsigned char *)context, ctx_len);
170     }
171 #ifdef undef
172     /* just testing for memory leaks :-) */
173     {
174         SSL_SESSION *s;
175         char buf[1024 * 10], *p;
176         int i;
177 
178         s = SSL_SESSION_new();
179 
180         p = &buf;
181         i = i2d_SSL_SESSION(x, &p);
182         p = &buf;
183         d2i_SSL_SESSION(&s, &p, (long)i);
184         p = &buf;
185         d2i_SSL_SESSION(&s, &p, (long)i);
186         p = &buf;
187         d2i_SSL_SESSION(&s, &p, (long)i);
188         SSL_SESSION_free(s);
189     }
190 #endif
191 
192     if (!noout || text) {
193         out = BIO_new(BIO_s_file());
194         if (out == NULL) {
195             ERR_print_errors(bio_err);
196             goto end;
197         }
198 
199         if (outfile == NULL) {
200             BIO_set_fp(out, stdout, BIO_NOCLOSE);
201 #ifdef OPENSSL_SYS_VMS
202             {
203                 BIO *tmpbio = BIO_new(BIO_f_linebuffer());
204                 out = BIO_push(tmpbio, out);
205             }
206 #endif
207         } else {
208             if (BIO_write_filename(out, outfile) <= 0) {
209                 perror(outfile);
210                 goto end;
211             }
212         }
213     }
214 
215     if (text) {
216         SSL_SESSION_print(out, x);
217 
218         if (cert) {
219             if (peer == NULL)
220                 BIO_puts(out, "No certificate present\n");
221             else
222                 X509_print(out, peer);
223         }
224     }
225 
226     if (!noout && !cert) {
227         if (outformat == FORMAT_ASN1)
228             i = i2d_SSL_SESSION_bio(out, x);
229         else if (outformat == FORMAT_PEM)
230             i = PEM_write_bio_SSL_SESSION(out, x);
231         else {
232             BIO_printf(bio_err, "bad output format specified for outfile\n");
233             goto end;
234         }
235         if (!i) {
236             BIO_printf(bio_err, "unable to write SSL_SESSION\n");
237             goto end;
238         }
239     } else if (!noout && (peer != NULL)) { /* just print the certificate */
240         if (outformat == FORMAT_ASN1)
241             i = (int)i2d_X509_bio(out, peer);
242         else if (outformat == FORMAT_PEM)
243             i = PEM_write_bio_X509(out, peer);
244         else {
245             BIO_printf(bio_err, "bad output format specified for outfile\n");
246             goto end;
247         }
248         if (!i) {
249             BIO_printf(bio_err, "unable to write X509\n");
250             goto end;
251         }
252     }
253     ret = 0;
254  end:
255     if (out != NULL)
256         BIO_free_all(out);
257     if (x != NULL)
258         SSL_SESSION_free(x);
259     apps_shutdown();
260     OPENSSL_EXIT(ret);
261 }
262 
263 static SSL_SESSION *load_sess_id(char *infile, int format)
264 {
265     SSL_SESSION *x = NULL;
266     BIO *in = NULL;
267 
268     in = BIO_new(BIO_s_file());
269     if (in == NULL) {
270         ERR_print_errors(bio_err);
271         goto end;
272     }
273 
274     if (infile == NULL)
275         BIO_set_fp(in, stdin, BIO_NOCLOSE);
276     else {
277         if (BIO_read_filename(in, infile) <= 0) {
278             perror(infile);
279             goto end;
280         }
281     }
282     if (format == FORMAT_ASN1)
283         x = d2i_SSL_SESSION_bio(in, NULL);
284     else if (format == FORMAT_PEM)
285         x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
286     else {
287         BIO_printf(bio_err, "bad input format specified for input crl\n");
288         goto end;
289     }
290     if (x == NULL) {
291         BIO_printf(bio_err, "unable to load SSL_SESSION\n");
292         ERR_print_errors(bio_err);
293         goto end;
294     }
295 
296  end:
297     if (in != NULL)
298         BIO_free(in);
299     return (x);
300 }
301