OpenSSL  1.0.1c
 All Classes Files Functions Variables Typedefs Enumerations Enumerator Macros
sess_id.c
Go to the documentation of this file.
1 /* apps/sess_id.c */
2 /* Copyright (C) 1995-1998 Eric Young ([email protected])
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young ([email protected]).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to. The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson ([email protected]).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  * notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  * notice, this list of conditions and the following disclaimer in the
30  * documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  * must display the following acknowledgement:
33  * "This product includes cryptographic software written by
34  * Eric Young ([email protected])"
35  * The word 'cryptographic' can be left out if the rouines from the library
36  * being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  * the apps directory (application code) you must include an acknowledgement:
39  * "This product includes software written by Tim Hudson ([email protected])"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed. i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include "apps.h"
63 #include <openssl/bio.h>
64 #include <openssl/err.h>
65 #include <openssl/x509.h>
66 #include <openssl/pem.h>
67 #include <openssl/ssl.h>
68 
69 #undef PROG
70 #define PROG sess_id_main
71 
72 static const char *sess_id_usage[]={
73 "usage: sess_id args\n",
74 "\n",
75 " -inform arg - input format - default PEM (DER or PEM)\n",
76 " -outform arg - output format - default PEM\n",
77 " -in arg - input file - default stdin\n",
78 " -out arg - output file - default stdout\n",
79 " -text - print ssl session id details\n",
80 " -cert - output certificate \n",
81 " -noout - no CRL output\n",
82 " -context arg - set the session ID context\n",
83 NULL
84 };
85 
86 static SSL_SESSION *load_sess_id(char *file, int format);
87 
88 int MAIN(int, char **);
89 
90 int MAIN(int argc, char **argv)
91  {
92  SSL_SESSION *x=NULL;
93  X509 *peer = NULL;
94  int ret=1,i,num,badops=0;
95  BIO *out=NULL;
96  int informat,outformat;
97  char *infile=NULL,*outfile=NULL,*context=NULL;
98  int cert=0,noout=0,text=0;
99  const char **pp;
100 
101  apps_startup();
102 
103  if (bio_err == NULL)
104  if ((bio_err=BIO_new(BIO_s_file())) != NULL)
106 
107  informat=FORMAT_PEM;
108  outformat=FORMAT_PEM;
109 
110  argc--;
111  argv++;
112  num=0;
113  while (argc >= 1)
114  {
115  if (strcmp(*argv,"-inform") == 0)
116  {
117  if (--argc < 1) goto bad;
118  informat=str2fmt(*(++argv));
119  }
120  else if (strcmp(*argv,"-outform") == 0)
121  {
122  if (--argc < 1) goto bad;
123  outformat=str2fmt(*(++argv));
124  }
125  else if (strcmp(*argv,"-in") == 0)
126  {
127  if (--argc < 1) goto bad;
128  infile= *(++argv);
129  }
130  else if (strcmp(*argv,"-out") == 0)
131  {
132  if (--argc < 1) goto bad;
133  outfile= *(++argv);
134  }
135  else if (strcmp(*argv,"-text") == 0)
136  text= ++num;
137  else if (strcmp(*argv,"-cert") == 0)
138  cert= ++num;
139  else if (strcmp(*argv,"-noout") == 0)
140  noout= ++num;
141  else if (strcmp(*argv,"-context") == 0)
142  {
143  if(--argc < 1) goto bad;
144  context=*++argv;
145  }
146  else
147  {
148  BIO_printf(bio_err,"unknown option %s\n",*argv);
149  badops=1;
150  break;
151  }
152  argc--;
153  argv++;
154  }
155 
156  if (badops)
157  {
158 bad:
159  for (pp=sess_id_usage; (*pp != NULL); pp++)
160  BIO_printf(bio_err,"%s",*pp);
161  goto end;
162  }
163 
165  x=load_sess_id(infile,informat);
166  if (x == NULL) { goto end; }
167  peer = SSL_SESSION_get0_peer(x);
168 
169  if(context)
170  {
171  size_t ctx_len = strlen(context);
172  if(ctx_len > SSL_MAX_SID_CTX_LENGTH)
173  {
174  BIO_printf(bio_err,"Context too long\n");
175  goto end;
176  }
177  SSL_SESSION_set1_id_context(x, (unsigned char *)context, ctx_len);
178  }
179 
180 #ifdef undef
181  /* just testing for memory leaks :-) */
182  {
183  SSL_SESSION *s;
184  char buf[1024*10],*p;
185  int i;
186 
187  s=SSL_SESSION_new();
188 
189  p= &buf;
190  i=i2d_SSL_SESSION(x,&p);
191  p= &buf;
192  d2i_SSL_SESSION(&s,&p,(long)i);
193  p= &buf;
194  d2i_SSL_SESSION(&s,&p,(long)i);
195  p= &buf;
196  d2i_SSL_SESSION(&s,&p,(long)i);
197  SSL_SESSION_free(s);
198  }
199 #endif
200 
201  if (!noout || text)
202  {
203  out=BIO_new(BIO_s_file());
204  if (out == NULL)
205  {
207  goto end;
208  }
209 
210  if (outfile == NULL)
211  {
212  BIO_set_fp(out,stdout,BIO_NOCLOSE);
213 #ifdef OPENSSL_SYS_VMS
214  {
215  BIO *tmpbio = BIO_new(BIO_f_linebuffer());
216  out = BIO_push(tmpbio, out);
217  }
218 #endif
219  }
220  else
221  {
222  if (BIO_write_filename(out,outfile) <= 0)
223  {
224  perror(outfile);
225  goto end;
226  }
227  }
228  }
229 
230  if (text)
231  {
232  SSL_SESSION_print(out,x);
233 
234  if (cert)
235  {
236  if (peer == NULL)
237  BIO_puts(out,"No certificate present\n");
238  else
239  X509_print(out,peer);
240  }
241  }
242 
243  if (!noout && !cert)
244  {
245  if (outformat == FORMAT_ASN1)
246  i=i2d_SSL_SESSION_bio(out,x);
247  else if (outformat == FORMAT_PEM)
248  i=PEM_write_bio_SSL_SESSION(out,x);
249  else {
250  BIO_printf(bio_err,"bad output format specified for outfile\n");
251  goto end;
252  }
253  if (!i) {
254  BIO_printf(bio_err,"unable to write SSL_SESSION\n");
255  goto end;
256  }
257  }
258  else if (!noout && (peer != NULL)) /* just print the certificate */
259  {
260  if (outformat == FORMAT_ASN1)
261  i=(int)i2d_X509_bio(out,peer);
262  else if (outformat == FORMAT_PEM)
263  i=PEM_write_bio_X509(out,peer);
264  else {
265  BIO_printf(bio_err,"bad output format specified for outfile\n");
266  goto end;
267  }
268  if (!i) {
269  BIO_printf(bio_err,"unable to write X509\n");
270  goto end;
271  }
272  }
273  ret=0;
274 end:
275  if (out != NULL) BIO_free_all(out);
276  if (x != NULL) SSL_SESSION_free(x);
277  apps_shutdown();
278  OPENSSL_EXIT(ret);
279  }
280 
281 static SSL_SESSION *load_sess_id(char *infile, int format)
282  {
283  SSL_SESSION *x=NULL;
284  BIO *in=NULL;
285 
286  in=BIO_new(BIO_s_file());
287  if (in == NULL)
288  {
290  goto end;
291  }
292 
293  if (infile == NULL)
294  BIO_set_fp(in,stdin,BIO_NOCLOSE);
295  else
296  {
297  if (BIO_read_filename(in,infile) <= 0)
298  {
299  perror(infile);
300  goto end;
301  }
302  }
303  if (format == FORMAT_ASN1)
304  x=d2i_SSL_SESSION_bio(in,NULL);
305  else if (format == FORMAT_PEM)
306  x=PEM_read_bio_SSL_SESSION(in,NULL,NULL,NULL);
307  else {
308  BIO_printf(bio_err,"bad input format specified for input crl\n");
309  goto end;
310  }
311  if (x == NULL)
312  {
313  BIO_printf(bio_err,"unable to load SSL_SESSION\n");
315  goto end;
316  }
317 
318 end:
319  if (in != NULL) BIO_free(in);
320  return(x);
321  }
322