| lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | /*************************************************************************** | 
 | 2 |  *                                  _   _ ____  _ | 
 | 3 |  *  Project                     ___| | | |  _ \| | | 
 | 4 |  *                             / __| | | | |_) | | | 
 | 5 |  *                            | (__| |_| |  _ <| |___ | 
 | 6 |  *                             \___|\___/|_| \_\_____| | 
 | 7 |  * | 
 | 8 |  * Copyright (C) 2013 - 2017, Daniel Stenberg, <daniel@haxx.se>, et al. | 
 | 9 |  * | 
 | 10 |  * This software is licensed as described in the file COPYING, which | 
 | 11 |  * you should have received as part of this distribution. The terms | 
 | 12 |  * are also available at https://curl.haxx.se/docs/copyright.html. | 
 | 13 |  * | 
 | 14 |  * You may opt to use, copy, modify, merge, publish, distribute and/or sell | 
 | 15 |  * copies of the Software, and permit persons to whom the Software is | 
 | 16 |  * furnished to do so, under the terms of the COPYING file. | 
 | 17 |  * | 
 | 18 |  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY | 
 | 19 |  * KIND, either express or implied. | 
 | 20 |  * | 
 | 21 |  ***************************************************************************/ | 
 | 22 | /* <DESC> | 
 | 23 |  * Use an in-memory user certificate and RSA key and retrieve an https page. | 
 | 24 |  * </DESC> | 
 | 25 |  */ | 
 | 26 | /* Written by Ishan SinghLevett, based on Theo Borm's cacertinmem.c. | 
 | 27 |  * Note that to maintain simplicity this example does not use a CA certificate | 
 | 28 |  * for peer verification.  However, some form of peer verification | 
 | 29 |  * must be used in real circumstances when a secure connection is required. | 
 | 30 |  */ | 
 | 31 |  | 
 | 32 | #include <openssl/ssl.h> | 
 | 33 | #include <openssl/x509.h> | 
 | 34 | #include <openssl/pem.h> | 
 | 35 | #include <curl/curl.h> | 
 | 36 | #include <stdio.h> | 
 | 37 |  | 
 | 38 | static size_t writefunction(void *ptr, size_t size, size_t nmemb, void *stream) | 
 | 39 | { | 
 | 40 |   fwrite(ptr, size, nmemb, stream); | 
 | 41 |   return (nmemb*size); | 
 | 42 | } | 
 | 43 |  | 
 | 44 | static CURLcode sslctx_function(CURL *curl, void *sslctx, void *parm) | 
 | 45 | { | 
 | 46 |   X509 *cert = NULL; | 
 | 47 |   BIO *bio = NULL; | 
 | 48 |   BIO *kbio = NULL; | 
 | 49 |   RSA *rsa = NULL; | 
 | 50 |   int ret; | 
 | 51 |  | 
 | 52 |   const char *mypem = /* www.cacert.org */ | 
 | 53 |     "-----BEGIN CERTIFICATE-----\n"\ | 
 | 54 |     "MIIHPTCCBSWgAwIBAgIBADANBgkqhkiG9w0BAQQFADB5MRAwDgYDVQQKEwdSb290\n"\ | 
 | 55 |     "IENBMR4wHAYDVQQLExVodHRwOi8vd3d3LmNhY2VydC5vcmcxIjAgBgNVBAMTGUNB\n"\ | 
 | 56 |     "IENlcnQgU2lnbmluZyBBdXRob3JpdHkxITAfBgkqhkiG9w0BCQEWEnN1cHBvcnRA\n"\ | 
 | 57 |     "Y2FjZXJ0Lm9yZzAeFw0wMzAzMzAxMjI5NDlaFw0zMzAzMjkxMjI5NDlaMHkxEDAO\n"\ | 
 | 58 |     "BgNVBAoTB1Jvb3QgQ0ExHjAcBgNVBAsTFWh0dHA6Ly93d3cuY2FjZXJ0Lm9yZzEi\n"\ | 
 | 59 |     "MCAGA1UEAxMZQ0EgQ2VydCBTaWduaW5nIEF1dGhvcml0eTEhMB8GCSqGSIb3DQEJ\n"\ | 
 | 60 |     "ARYSc3VwcG9ydEBjYWNlcnQub3JnMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC\n"\ | 
 | 61 |     "CgKCAgEAziLA4kZ97DYoB1CW8qAzQIxL8TtmPzHlawI229Z89vGIj053NgVBlfkJ\n"\ | 
 | 62 |     "8BLPRoZzYLdufujAWGSuzbCtRRcMY/pnCujW0r8+55jE8Ez64AO7NV1sId6eINm6\n"\ | 
 | 63 |     "zWYyN3L69wj1x81YyY7nDl7qPv4coRQKFWyGhFtkZip6qUtTefWIonvuLwphK42y\n"\ | 
 | 64 |     "fk1WpRPs6tqSnqxEQR5YYGUFZvjARL3LlPdCfgv3ZWiYUQXw8wWRBB0bF4LsyFe7\n"\ | 
 | 65 |     "w2t6iPGwcswlWyCR7BYCEo8y6RcYSNDHBS4CMEK4JZwFaz+qOqfrU0j36NK2B5jc\n"\ | 
 | 66 |     "G8Y0f3/JHIJ6BVgrCFvzOKKrF11myZjXnhCLotLddJr3cQxyYN/Nb5gznZY0dj4k\n"\ | 
 | 67 |     "epKwDpUeb+agRThHqtdB7Uq3EvbXG4OKDy7YCbZZ16oE/9KTfWgu3YtLq1i6L43q\n"\ | 
 | 68 |     "laegw1SJpfvbi1EinbLDvhG+LJGGi5Z4rSDTii8aP8bQUWWHIbEZAWV/RRyH9XzQ\n"\ | 
 | 69 |     "QUxPKZgh/TMfdQwEUfoZd9vUFBzugcMd9Zi3aQaRIt0AUMyBMawSB3s42mhb5ivU\n"\ | 
 | 70 |     "fslfrejrckzzAeVLIL+aplfKkQABi6F1ITe1Yw1nPkZPcCBnzsXWWdsC4PDSy826\n"\ | 
 | 71 |     "YreQQejdIOQpvGQpQsgi3Hia/0PsmBsJUUtaWsJx8cTLc6nloQsCAwEAAaOCAc4w\n"\ | 
 | 72 |     "ggHKMB0GA1UdDgQWBBQWtTIb1Mfz4OaO873SsDrusjkY0TCBowYDVR0jBIGbMIGY\n"\ | 
 | 73 |     "gBQWtTIb1Mfz4OaO873SsDrusjkY0aF9pHsweTEQMA4GA1UEChMHUm9vdCBDQTEe\n"\ | 
 | 74 |     "MBwGA1UECxMVaHR0cDovL3d3dy5jYWNlcnQub3JnMSIwIAYDVQQDExlDQSBDZXJ0\n"\ | 
 | 75 |     "IFNpZ25pbmcgQXV0aG9yaXR5MSEwHwYJKoZIhvcNAQkBFhJzdXBwb3J0QGNhY2Vy\n"\ | 
 | 76 |     "dC5vcmeCAQAwDwYDVR0TAQH/BAUwAwEB/zAyBgNVHR8EKzApMCegJaAjhiFodHRw\n"\ | 
 | 77 |     "czovL3d3dy5jYWNlcnQub3JnL3Jldm9rZS5jcmwwMAYJYIZIAYb4QgEEBCMWIWh0\n"\ | 
 | 78 |     "dHBzOi8vd3d3LmNhY2VydC5vcmcvcmV2b2tlLmNybDA0BglghkgBhvhCAQgEJxYl\n"\ | 
 | 79 |     "aHR0cDovL3d3dy5jYWNlcnQub3JnL2luZGV4LnBocD9pZD0xMDBWBglghkgBhvhC\n"\ | 
 | 80 |     "AQ0ESRZHVG8gZ2V0IHlvdXIgb3duIGNlcnRpZmljYXRlIGZvciBGUkVFIGhlYWQg\n"\ | 
 | 81 |     "b3ZlciB0byBodHRwOi8vd3d3LmNhY2VydC5vcmcwDQYJKoZIhvcNAQEEBQADggIB\n"\ | 
 | 82 |     "ACjH7pyCArpcgBLKNQodgW+JapnM8mgPf6fhjViVPr3yBsOQWqy1YPaZQwGjiHCc\n"\ | 
 | 83 |     "nWKdpIevZ1gNMDY75q1I08t0AoZxPuIrA2jxNGJARjtT6ij0rPtmlVOKTV39O9lg\n"\ | 
 | 84 |     "18p5aTuxZZKmxoGCXJzN600BiqXfEVWqFcofN8CCmHBh22p8lqOOLlQ+TyGpkO/c\n"\ | 
 | 85 |     "gr/c6EWtTZBzCDyUZbAEmXZ/4rzCahWqlwQ3JNgelE5tDlG+1sSPypZt90Pf6DBl\n"\ | 
 | 86 |     "Jzt7u0NDY8RD97LsaMzhGY4i+5jhe1o+ATc7iwiwovOVThrLm82asduycPAtStvY\n"\ | 
 | 87 |     "sONvRUgzEv/+PDIqVPfE94rwiCPCR/5kenHA0R6mY7AHfqQv0wGP3J8rtsYIqQ+T\n"\ | 
 | 88 |     "SCX8Ev2fQtzzxD72V7DX3WnRBnc0CkvSyqD/HMaMyRa+xMwyN2hzXwj7UfdJUzYF\n"\ | 
 | 89 |     "CpUCTPJ5GhD22Dp1nPMd8aINcGeGG7MW9S/lpOt5hvk9C8JzC6WZrG/8Z7jlLwum\n"\ | 
 | 90 |     "GCSNe9FINSkYQKyTYOGWhlC0elnYjyELn8+CkcY7v2vcB5G5l1YjqrZslMZIBjzk\n"\ | 
 | 91 |     "zk6q5PYvCdxTby78dOs6Y5nCpqyJvKeyRKANihDjbPIky/qbn3BHLt4Ui9SyIAmW\n"\ | 
 | 92 |     "omTxJBzcoTWcFbLUvFUufQb1nA5V9FrWk9p2rSVzTMVD\n"\ | 
 | 93 |     "-----END CERTIFICATE-----\n"; | 
 | 94 |  | 
 | 95 | /*replace the XXX with the actual RSA key*/ | 
 | 96 |   const char *mykey = | 
 | 97 |     "-----BEGIN RSA PRIVATE KEY-----\n"\ | 
 | 98 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 99 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 100 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 101 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 102 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 103 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 104 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 105 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 106 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 107 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 108 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 109 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 110 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 111 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 112 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 113 |     "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX\n"\ | 
 | 114 |     "-----END RSA PRIVATE KEY-----\n"; | 
 | 115 |  | 
 | 116 |   (void)curl; /* avoid warnings */ | 
 | 117 |   (void)parm; /* avoid warnings */ | 
 | 118 |  | 
 | 119 |   /* get a BIO */ | 
 | 120 |   bio = BIO_new_mem_buf((char *)mypem, -1); | 
 | 121 |  | 
 | 122 |   if(bio == NULL) { | 
 | 123 |     printf("BIO_new_mem_buf failed\n"); | 
 | 124 |   } | 
 | 125 |  | 
 | 126 |   /* use it to read the PEM formatted certificate from memory into an X509 | 
 | 127 |    * structure that SSL can use | 
 | 128 |    */ | 
 | 129 |   cert = PEM_read_bio_X509(bio, NULL, 0, NULL); | 
 | 130 |   if(cert == NULL) { | 
 | 131 |     printf("PEM_read_bio_X509 failed...\n"); | 
 | 132 |   } | 
 | 133 |  | 
 | 134 |   /*tell SSL to use the X509 certificate*/ | 
 | 135 |   ret = SSL_CTX_use_certificate((SSL_CTX*)sslctx, cert); | 
 | 136 |   if(ret != 1) { | 
 | 137 |     printf("Use certificate failed\n"); | 
 | 138 |   } | 
 | 139 |  | 
 | 140 |   /*create a bio for the RSA key*/ | 
 | 141 |   kbio = BIO_new_mem_buf((char *)mykey, -1); | 
 | 142 |   if(kbio == NULL) { | 
 | 143 |     printf("BIO_new_mem_buf failed\n"); | 
 | 144 |   } | 
 | 145 |  | 
 | 146 |   /*read the key bio into an RSA object*/ | 
 | 147 |   rsa = PEM_read_bio_RSAPrivateKey(kbio, NULL, 0, NULL); | 
 | 148 |   if(rsa == NULL) { | 
 | 149 |     printf("Failed to create key bio\n"); | 
 | 150 |   } | 
 | 151 |  | 
 | 152 |   /*tell SSL to use the RSA key from memory*/ | 
 | 153 |   ret = SSL_CTX_use_RSAPrivateKey((SSL_CTX*)sslctx, rsa); | 
 | 154 |   if(ret != 1) { | 
 | 155 |     printf("Use Key failed\n"); | 
 | 156 |   } | 
 | 157 |  | 
 | 158 |   /* free resources that have been allocated by openssl functions */ | 
 | 159 |   if(bio) | 
 | 160 |     BIO_free(bio); | 
 | 161 |  | 
 | 162 |   if(kbio) | 
 | 163 |     BIO_free(kbio); | 
 | 164 |  | 
 | 165 |   if(rsa) | 
 | 166 |     RSA_free(rsa); | 
 | 167 |  | 
 | 168 |   if(cert) | 
 | 169 |     X509_free(cert); | 
 | 170 |  | 
 | 171 |   /* all set to go */ | 
 | 172 |   return CURLE_OK; | 
 | 173 | } | 
 | 174 |  | 
 | 175 | int main(void) | 
 | 176 | { | 
 | 177 |   CURL *ch; | 
 | 178 |   CURLcode rv; | 
 | 179 |  | 
 | 180 |   rv = curl_global_init(CURL_GLOBAL_ALL); | 
 | 181 |   ch = curl_easy_init(); | 
 | 182 |   rv = curl_easy_setopt(ch, CURLOPT_VERBOSE, 0L); | 
 | 183 |   rv = curl_easy_setopt(ch, CURLOPT_HEADER, 0L); | 
 | 184 |   rv = curl_easy_setopt(ch, CURLOPT_NOPROGRESS, 1L); | 
 | 185 |   rv = curl_easy_setopt(ch, CURLOPT_NOSIGNAL, 1L); | 
 | 186 |   rv = curl_easy_setopt(ch, CURLOPT_WRITEFUNCTION, writefunction); | 
 | 187 |   rv = curl_easy_setopt(ch, CURLOPT_WRITEDATA, stdout); | 
 | 188 |   rv = curl_easy_setopt(ch, CURLOPT_HEADERFUNCTION, writefunction); | 
 | 189 |   rv = curl_easy_setopt(ch, CURLOPT_HEADERDATA, stderr); | 
 | 190 |   rv = curl_easy_setopt(ch, CURLOPT_SSLCERTTYPE, "PEM"); | 
 | 191 |  | 
 | 192 |   /* both VERIFYPEER and VERIFYHOST are set to 0 in this case because there is | 
 | 193 |      no CA certificate*/ | 
 | 194 |  | 
 | 195 |   rv = curl_easy_setopt(ch, CURLOPT_SSL_VERIFYPEER, 0L); | 
 | 196 |   rv = curl_easy_setopt(ch, CURLOPT_SSL_VERIFYHOST, 0L); | 
 | 197 |   rv = curl_easy_setopt(ch, CURLOPT_URL, "https://www.example.com/"); | 
 | 198 |   rv = curl_easy_setopt(ch, CURLOPT_SSLKEYTYPE, "PEM"); | 
 | 199 |  | 
 | 200 |   /* first try: retrieve page without user certificate and key -> will fail | 
 | 201 |    */ | 
 | 202 |   rv = curl_easy_perform(ch); | 
 | 203 |   if(rv==CURLE_OK) { | 
 | 204 |     printf("*** transfer succeeded ***\n"); | 
 | 205 |   } | 
 | 206 |   else { | 
 | 207 |     printf("*** transfer failed ***\n"); | 
 | 208 |   } | 
 | 209 |  | 
 | 210 |   /* second try: retrieve page using user certificate and key -> will succeed | 
 | 211 |    * load the certificate and key by installing a function doing the necessary | 
 | 212 |    * "modifications" to the SSL CONTEXT just before link init | 
 | 213 |    */ | 
 | 214 |   rv = curl_easy_setopt(ch, CURLOPT_SSL_CTX_FUNCTION, *sslctx_function); | 
 | 215 |   rv = curl_easy_perform(ch); | 
 | 216 |   if(rv==CURLE_OK) { | 
 | 217 |     printf("*** transfer succeeded ***\n"); | 
 | 218 |   } | 
 | 219 |   else { | 
 | 220 |     printf("*** transfer failed ***\n"); | 
 | 221 |   } | 
 | 222 |  | 
 | 223 |   curl_easy_cleanup(ch); | 
 | 224 |   curl_global_cleanup(); | 
 | 225 |   return rv; | 
 | 226 | } |