2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.]
63 #include <openssl/bio.h>
64 #include <openssl/err.h>
65 #include <openssl/x509.h>
66 #include <openssl/pem.h>
67 #include <openssl/ssl.h>
70 #define PROG sess_id_main
72 static const char *sess_id_usage[] = {
73 "usage: sess_id args\n",
75 " -inform arg - input format - default PEM (DER or PEM)\n",
76 " -outform arg - output format - default PEM\n",
77 " -in arg - input file - default stdin\n",
78 " -out arg - output file - default stdout\n",
79 " -text - print ssl session id details\n",
80 " -cert - output certificate \n",
81 " -noout - no CRL output\n",
82 " -context arg - set the session ID context\n",
86 static SSL_SESSION *load_sess_id(char *file, int format);
88 int MAIN(int, char **);
90 int MAIN(int argc, char **argv)
92 SSL_SESSION *x = NULL;
93 int ret = 1, i, num, badops = 0;
95 int informat, outformat;
96 char *infile = NULL, *outfile = NULL, *context = NULL;
97 int cert = 0, noout = 0, text = 0;
103 if ((bio_err = BIO_new(BIO_s_file())) != NULL)
104 BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
106 informat = FORMAT_PEM;
107 outformat = FORMAT_PEM;
113 if (strcmp(*argv, "-inform") == 0) {
116 informat = str2fmt(*(++argv));
117 } else if (strcmp(*argv, "-outform") == 0) {
120 outformat = str2fmt(*(++argv));
121 } else if (strcmp(*argv, "-in") == 0) {
125 } else if (strcmp(*argv, "-out") == 0) {
129 } else if (strcmp(*argv, "-text") == 0)
131 else if (strcmp(*argv, "-cert") == 0)
133 else if (strcmp(*argv, "-noout") == 0)
135 else if (strcmp(*argv, "-context") == 0) {
140 BIO_printf(bio_err, "unknown option %s\n", *argv);
150 for (pp = sess_id_usage; (*pp != NULL); pp++)
151 BIO_printf(bio_err, "%s", *pp);
155 ERR_load_crypto_strings();
156 x = load_sess_id(infile, informat);
162 x->sid_ctx_length = strlen(context);
163 if (x->sid_ctx_length > SSL_MAX_SID_CTX_LENGTH) {
164 BIO_printf(bio_err, "Context too long\n");
167 memcpy(x->sid_ctx, context, x->sid_ctx_length);
170 /* just testing for memory leaks :-) */
173 char buf[1024 * 10], *p;
176 s = SSL_SESSION_new();
179 i = i2d_SSL_SESSION(x, &p);
181 d2i_SSL_SESSION(&s, &p, (long)i);
183 d2i_SSL_SESSION(&s, &p, (long)i);
185 d2i_SSL_SESSION(&s, &p, (long)i);
190 if (!noout || text) {
191 out = BIO_new(BIO_s_file());
193 ERR_print_errors(bio_err);
197 if (outfile == NULL) {
198 BIO_set_fp(out, stdout, BIO_NOCLOSE);
199 #ifdef OPENSSL_SYS_VMS
201 BIO *tmpbio = BIO_new(BIO_f_linebuffer());
202 out = BIO_push(tmpbio, out);
206 if (BIO_write_filename(out, outfile) <= 0) {
214 SSL_SESSION_print(out, x);
218 BIO_puts(out, "No certificate present\n");
220 X509_print(out, x->peer);
224 if (!noout && !cert) {
225 if (outformat == FORMAT_ASN1)
226 i = i2d_SSL_SESSION_bio(out, x);
227 else if (outformat == FORMAT_PEM)
228 i = PEM_write_bio_SSL_SESSION(out, x);
230 BIO_printf(bio_err, "bad output format specified for outfile\n");
234 BIO_printf(bio_err, "unable to write SSL_SESSION\n");
237 } else if (!noout && (x->peer != NULL)) { /* just print the certificate */
238 if (outformat == FORMAT_ASN1)
239 i = (int)i2d_X509_bio(out, x->peer);
240 else if (outformat == FORMAT_PEM)
241 i = PEM_write_bio_X509(out, x->peer);
243 BIO_printf(bio_err, "bad output format specified for outfile\n");
247 BIO_printf(bio_err, "unable to write X509\n");
261 static SSL_SESSION *load_sess_id(char *infile, int format)
263 SSL_SESSION *x = NULL;
266 in = BIO_new(BIO_s_file());
268 ERR_print_errors(bio_err);
273 BIO_set_fp(in, stdin, BIO_NOCLOSE);
275 if (BIO_read_filename(in, infile) <= 0) {
280 if (format == FORMAT_ASN1)
281 x = d2i_SSL_SESSION_bio(in, NULL);
282 else if (format == FORMAT_PEM)
283 x = PEM_read_bio_SSL_SESSION(in, NULL, NULL, NULL);
285 BIO_printf(bio_err, "bad input format specified for input crl\n");
289 BIO_printf(bio_err, "unable to load SSL_SESSION\n");
290 ERR_print_errors(bio_err);