| lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | /* | 
|  | 2 | * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. | 
|  | 3 | * | 
|  | 4 | * Licensed under the OpenSSL license (the "License").  You may not use | 
|  | 5 | * this file except in compliance with the License.  You can obtain a copy | 
|  | 6 | * in the file LICENSE in the source distribution or at | 
|  | 7 | * https://www.openssl.org/source/license.html | 
|  | 8 | */ | 
|  | 9 |  | 
|  | 10 | #include <stdio.h> | 
|  | 11 | #include <stdlib.h> | 
|  | 12 | #include <string.h> | 
|  | 13 | #include "apps.h" | 
|  | 14 | #include "progs.h" | 
|  | 15 | #include <openssl/bio.h> | 
|  | 16 | #include <openssl/err.h> | 
|  | 17 | #include <openssl/x509.h> | 
|  | 18 | #include <openssl/pem.h> | 
|  | 19 | #include <openssl/ssl.h> | 
|  | 20 |  | 
|  | 21 | typedef enum OPTION_choice { | 
|  | 22 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, | 
|  | 23 | OPT_INFORM, OPT_OUTFORM, OPT_IN, OPT_OUT, | 
|  | 24 | OPT_TEXT, OPT_CERT, OPT_NOOUT, OPT_CONTEXT | 
|  | 25 | } OPTION_CHOICE; | 
|  | 26 |  | 
|  | 27 | const OPTIONS sess_id_options[] = { | 
|  | 28 | {"help", OPT_HELP, '-', "Display this summary"}, | 
|  | 29 | {"inform", OPT_INFORM, 'F', "Input format - default PEM (DER or PEM)"}, | 
|  | 30 | {"outform", OPT_OUTFORM, 'f', | 
|  | 31 | "Output format - default PEM (PEM, DER or NSS)"}, | 
|  | 32 | {"in", OPT_IN, 's', "Input file - default stdin"}, | 
|  | 33 | {"out", OPT_OUT, '>', "Output file - default stdout"}, | 
|  | 34 | {"text", OPT_TEXT, '-', "Print ssl session id details"}, | 
|  | 35 | {"cert", OPT_CERT, '-', "Output certificate "}, | 
|  | 36 | {"noout", OPT_NOOUT, '-', "Don't output the encoded session info"}, | 
|  | 37 | {"context", OPT_CONTEXT, 's', "Set the session ID context"}, | 
|  | 38 | {NULL} | 
|  | 39 | }; | 
|  | 40 |  | 
|  | 41 | static SSL_SESSION *load_sess_id(char *file, int format); | 
|  | 42 |  | 
|  | 43 | int sess_id_main(int argc, char **argv) | 
|  | 44 | { | 
|  | 45 | SSL_SESSION *x = NULL; | 
|  | 46 | X509 *peer = NULL; | 
|  | 47 | BIO *out = NULL; | 
|  | 48 | char *infile = NULL, *outfile = NULL, *context = NULL, *prog; | 
|  | 49 | int informat = FORMAT_PEM, outformat = FORMAT_PEM; | 
|  | 50 | int cert = 0, noout = 0, text = 0, ret = 1, i, num = 0; | 
|  | 51 | OPTION_CHOICE o; | 
|  | 52 |  | 
|  | 53 | prog = opt_init(argc, argv, sess_id_options); | 
|  | 54 | while ((o = opt_next()) != OPT_EOF) { | 
|  | 55 | switch (o) { | 
|  | 56 | case OPT_EOF: | 
|  | 57 | case OPT_ERR: | 
|  | 58 | opthelp: | 
|  | 59 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); | 
|  | 60 | goto end; | 
|  | 61 | case OPT_HELP: | 
|  | 62 | opt_help(sess_id_options); | 
|  | 63 | ret = 0; | 
|  | 64 | goto end; | 
|  | 65 | case OPT_INFORM: | 
|  | 66 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat)) | 
|  | 67 | goto opthelp; | 
|  | 68 | break; | 
|  | 69 | case OPT_OUTFORM: | 
|  | 70 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER | OPT_FMT_NSS, | 
|  | 71 | &outformat)) | 
|  | 72 | goto opthelp; | 
|  | 73 | break; | 
|  | 74 | case OPT_IN: | 
|  | 75 | infile = opt_arg(); | 
|  | 76 | break; | 
|  | 77 | case OPT_OUT: | 
|  | 78 | outfile = opt_arg(); | 
|  | 79 | break; | 
|  | 80 | case OPT_TEXT: | 
|  | 81 | text = ++num; | 
|  | 82 | break; | 
|  | 83 | case OPT_CERT: | 
|  | 84 | cert = ++num; | 
|  | 85 | break; | 
|  | 86 | case OPT_NOOUT: | 
|  | 87 | noout = ++num; | 
|  | 88 | break; | 
|  | 89 | case OPT_CONTEXT: | 
|  | 90 | context = opt_arg(); | 
|  | 91 | break; | 
|  | 92 | } | 
|  | 93 | } | 
|  | 94 | argc = opt_num_rest(); | 
|  | 95 | if (argc != 0) | 
|  | 96 | goto opthelp; | 
|  | 97 |  | 
|  | 98 | x = load_sess_id(infile, informat); | 
|  | 99 | if (x == NULL) { | 
|  | 100 | goto end; | 
|  | 101 | } | 
|  | 102 | peer = SSL_SESSION_get0_peer(x); | 
|  | 103 |  | 
|  | 104 | if (context != NULL) { | 
|  | 105 | size_t ctx_len = strlen(context); | 
|  | 106 | if (ctx_len > SSL_MAX_SID_CTX_LENGTH) { | 
|  | 107 | BIO_printf(bio_err, "Context too long\n"); | 
|  | 108 | goto end; | 
|  | 109 | } | 
|  | 110 | if (!SSL_SESSION_set1_id_context(x, (unsigned char *)context, | 
|  | 111 | ctx_len)) { | 
|  | 112 | BIO_printf(bio_err, "Error setting id context\n"); | 
|  | 113 | goto end; | 
|  | 114 | } | 
|  | 115 | } | 
|  | 116 |  | 
|  | 117 | if (!noout || text) { | 
|  | 118 | out = bio_open_default(outfile, 'w', outformat); | 
|  | 119 | if (out == NULL) | 
|  | 120 | goto end; | 
|  | 121 | } | 
|  | 122 |  | 
|  | 123 | if (text) { | 
|  | 124 | SSL_SESSION_print(out, x); | 
|  | 125 |  | 
|  | 126 | if (cert) { | 
|  | 127 | if (peer == NULL) | 
|  | 128 | BIO_puts(out, "No certificate present\n"); | 
|  | 129 | else | 
|  | 130 | X509_print(out, peer); | 
|  | 131 | } | 
|  | 132 | } | 
|  | 133 |  | 
|  | 134 | if (!noout && !cert) { | 
|  | 135 | if (outformat == FORMAT_ASN1) { | 
|  | 136 | i = i2d_SSL_SESSION_bio(out, x); | 
|  | 137 | } else if (outformat == FORMAT_PEM) { | 
|  | 138 | i = PEM_write_bio_SSL_SESSION(out, x); | 
|  | 139 | } else if (outformat == FORMAT_NSS) { | 
|  | 140 | i = SSL_SESSION_print_keylog(out, x); | 
|  | 141 | } else { | 
|  | 142 | BIO_printf(bio_err, "bad output format specified for outfile\n"); | 
|  | 143 | goto end; | 
|  | 144 | } | 
|  | 145 | if (!i) { | 
|  | 146 | BIO_printf(bio_err, "unable to write SSL_SESSION\n"); | 
|  | 147 | goto end; | 
|  | 148 | } | 
|  | 149 | } else if (!noout && (peer != NULL)) { /* just print the certificate */ | 
|  | 150 | if (outformat == FORMAT_ASN1) { | 
|  | 151 | i = (int)i2d_X509_bio(out, peer); | 
|  | 152 | } else if (outformat == FORMAT_PEM) { | 
|  | 153 | i = PEM_write_bio_X509(out, peer); | 
|  | 154 | } else { | 
|  | 155 | BIO_printf(bio_err, "bad output format specified for outfile\n"); | 
|  | 156 | goto end; | 
|  | 157 | } | 
|  | 158 | if (!i) { | 
|  | 159 | BIO_printf(bio_err, "unable to write X509\n"); | 
|  | 160 | goto end; | 
|  | 161 | } | 
|  | 162 | } | 
|  | 163 | ret = 0; | 
|  | 164 | end: | 
|  | 165 | BIO_free_all(out); | 
|  | 166 | SSL_SESSION_free(x); | 
|  | 167 | return ret; | 
|  | 168 | } | 
|  | 169 |  | 
|  | 170 | static SSL_SESSION *load_sess_id(char *infile, int format) | 
|  | 171 | { | 
|  | 172 | SSL_SESSION *x = NULL; | 
|  | 173 | BIO *in = NULL; | 
|  | 174 |  | 
|  | 175 | in = bio_open_default(infile, 'r', format); | 
|  | 176 | if (in == NULL) | 
|  | 177 | goto end; | 
|  | 178 | if (format == FORMAT_ASN1) | 
|  | 179 | x = d2i_SSL_SESSION_bio(in, NULL); | 
|  | 180 | else | 
|  | 181 | x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL); | 
|  | 182 | if (x == NULL) { | 
|  | 183 | BIO_printf(bio_err, "unable to load SSL_SESSION\n"); | 
|  | 184 | ERR_print_errors(bio_err); | 
|  | 185 | goto end; | 
|  | 186 | } | 
|  | 187 |  | 
|  | 188 | end: | 
|  | 189 | BIO_free(in); | 
|  | 190 | return x; | 
|  | 191 | } |