1998-12-21 10:52:47 +00:00
|
|
|
/* apps/s_client.c */
|
1998-12-21 10:56:39 +00:00
|
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
1998-12-21 10:52:47 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This package is an SSL implementation written
|
|
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
|
|
|
*
|
|
|
|
* This library is free for commercial and non-commercial use as long as
|
|
|
|
* the following conditions are aheared to. The following conditions
|
|
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
|
|
* included with this distribution is covered by the same copyright terms
|
|
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
|
|
* the code are not to be removed.
|
|
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
|
|
* as the author of the parts of the library used.
|
|
|
|
* This can be in the form of a textual message at program startup or
|
|
|
|
* in documentation (online or textual) provided with the package.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* "This product includes cryptographic software written by
|
|
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
|
|
* being used are not cryptographic related :-).
|
|
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* The licence and distribution terms for any publically available version or
|
|
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
|
|
* copied and put under another distribution licence
|
|
|
|
* [including the GNU Public Licence.]
|
|
|
|
*/
|
2001-10-20 17:56:36 +00:00
|
|
|
/* ====================================================================
|
2006-01-02 23:29:12 +00:00
|
|
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
2001-10-20 17:56:36 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* 3. All advertising materials mentioning features or use of this
|
|
|
|
* software must display the following acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
|
|
* endorse or promote products derived from this software without
|
|
|
|
* prior written permission. For written permission, please contact
|
|
|
|
* openssl-core@openssl.org.
|
|
|
|
*
|
|
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
|
|
* permission of the OpenSSL Project.
|
|
|
|
*
|
|
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
|
|
* acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
* ====================================================================
|
|
|
|
*
|
|
|
|
* This product includes cryptographic software written by Eric Young
|
|
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
|
|
* Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
*/
|
2006-03-10 23:06:27 +00:00
|
|
|
/* ====================================================================
|
|
|
|
* Copyright 2005 Nokia. All rights reserved.
|
|
|
|
*
|
|
|
|
* The portions of the attached software ("Contribution") is developed by
|
|
|
|
* Nokia Corporation and is licensed pursuant to the OpenSSL open source
|
|
|
|
* license.
|
|
|
|
*
|
|
|
|
* The Contribution, originally written by Mika Kousa and Pasi Eronen of
|
|
|
|
* Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
|
|
|
|
* support (see RFC 4279) to OpenSSL.
|
|
|
|
*
|
|
|
|
* No patent licenses or other rights except those expressly stated in
|
|
|
|
* the OpenSSL open source license shall be deemed granted or received
|
|
|
|
* expressly, by implication, estoppel, or otherwise.
|
|
|
|
*
|
|
|
|
* No assurances are provided by Nokia that the Contribution does not
|
|
|
|
* infringe the patent or other intellectual property rights of any third
|
|
|
|
* party or that the license provides you with all the necessary rights
|
|
|
|
* to make use of the Contribution.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
|
|
|
|
* ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
|
|
|
|
* SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
|
|
|
|
* OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
|
|
|
|
* OTHERWISE.
|
|
|
|
*/
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-08-09 13:01:48 +00:00
|
|
|
#include <assert.h>
|
2006-03-10 23:06:27 +00:00
|
|
|
#include <ctype.h>
|
1999-07-28 23:25:59 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2001-02-20 14:07:03 +00:00
|
|
|
#include <openssl/e_os2.h>
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifdef OPENSSL_NO_STDIO
|
1999-07-28 23:25:59 +00:00
|
|
|
#define APPS_WIN16
|
|
|
|
#endif
|
|
|
|
|
1999-05-13 11:37:32 +00:00
|
|
|
/* With IPv6, it looks like Digital has mixed up the proper order of
|
|
|
|
recursive header file inclusion, resulting in the compiler complaining
|
|
|
|
that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
|
|
|
|
is needed to have fileno() declared correctly... So let's define u_int */
|
2001-02-20 08:13:47 +00:00
|
|
|
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
|
1999-05-13 11:37:32 +00:00
|
|
|
#define __U_INT
|
|
|
|
typedef unsigned int u_int;
|
|
|
|
#endif
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
#define USE_SOCKETS
|
|
|
|
#include "apps.h"
|
1999-04-23 22:13:45 +00:00
|
|
|
#include <openssl/x509.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/pem.h>
|
2001-09-12 02:39:06 +00:00
|
|
|
#include <openssl/rand.h>
|
2007-09-26 21:56:59 +00:00
|
|
|
#include <openssl/ocsp.h>
|
2008-03-16 21:05:46 +00:00
|
|
|
#include <openssl/bn.h>
|
1998-12-21 10:52:47 +00:00
|
|
|
#include "s_apps.h"
|
2005-04-26 16:02:40 +00:00
|
|
|
#include "timeouts.h"
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2001-02-20 08:13:47 +00:00
|
|
|
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
1999-05-13 13:21:17 +00:00
|
|
|
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
1999-05-13 11:37:32 +00:00
|
|
|
#undef FIONBIO
|
|
|
|
#endif
|
|
|
|
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
#include <fcntl.h>
|
|
|
|
#endif
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
#undef PROG
|
|
|
|
#define PROG s_client_main
|
|
|
|
|
|
|
|
/*#define SSL_HOST_NAME "www.netscape.com" */
|
|
|
|
/*#define SSL_HOST_NAME "193.118.187.102" */
|
|
|
|
#define SSL_HOST_NAME "localhost"
|
|
|
|
|
|
|
|
/*#define TEST_CERT "client.pem" */ /* no default cert. */
|
|
|
|
|
|
|
|
#undef BUFSIZZ
|
|
|
|
#define BUFSIZZ 1024*8
|
|
|
|
|
|
|
|
extern int verify_depth;
|
|
|
|
extern int verify_error;
|
2006-09-17 17:16:28 +00:00
|
|
|
extern int verify_return_error;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
#ifdef FIONBIO
|
|
|
|
static int c_nbio=0;
|
|
|
|
#endif
|
|
|
|
static int c_Pause=0;
|
|
|
|
static int c_debug=0;
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
static int c_tlsextdebug=0;
|
2007-09-26 21:56:59 +00:00
|
|
|
static int c_status_req=0;
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
2001-10-20 17:56:36 +00:00
|
|
|
static int c_msg=0;
|
1999-03-31 12:06:30 +00:00
|
|
|
static int c_showcerts=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
static void sc_usage(void);
|
|
|
|
static void print_stuff(BIO *berr,SSL *con,int full);
|
2008-09-03 12:29:57 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2007-09-26 21:56:59 +00:00
|
|
|
static int ocsp_resp_cb(SSL *s, void *arg);
|
2008-09-03 12:29:57 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
static BIO *bio_c_out=NULL;
|
|
|
|
static int c_quiet=0;
|
2000-03-10 12:18:28 +00:00
|
|
|
static int c_ign_eof=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
/* Default PSK identity and key */
|
|
|
|
static char *psk_identity="Client_identity";
|
2008-11-16 12:47:12 +00:00
|
|
|
/*char *psk_key=NULL; by default PSK is not used */
|
2006-03-10 23:06:27 +00:00
|
|
|
|
|
|
|
static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
|
|
|
|
unsigned int max_identity_len, unsigned char *psk,
|
|
|
|
unsigned int max_psk_len)
|
|
|
|
{
|
|
|
|
unsigned int psk_len = 0;
|
|
|
|
int ret;
|
|
|
|
BIGNUM *bn=NULL;
|
|
|
|
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "psk_client_cb\n");
|
|
|
|
if (!hint)
|
|
|
|
{
|
|
|
|
/* no ServerKeyExchange message*/
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n");
|
|
|
|
}
|
|
|
|
else if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint);
|
|
|
|
|
|
|
|
/* lookup PSK identity and PSK key based on the given identity hint here */
|
2009-02-15 15:29:59 +00:00
|
|
|
ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity);
|
2006-03-11 12:18:11 +00:00
|
|
|
if (ret < 0 || (unsigned int)ret > max_identity_len)
|
2006-03-10 23:06:27 +00:00
|
|
|
goto out_err;
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, ret);
|
|
|
|
ret=BN_hex2bn(&bn, psk_key);
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
|
|
|
|
if (bn)
|
|
|
|
BN_free(bn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-03-11 12:18:11 +00:00
|
|
|
if ((unsigned int)BN_num_bytes(bn) > max_psk_len)
|
2006-03-10 23:06:27 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
|
|
|
|
max_psk_len, BN_num_bytes(bn));
|
|
|
|
BN_free(bn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
psk_len=BN_bn2bin(bn, psk);
|
|
|
|
BN_free(bn);
|
|
|
|
if (psk_len == 0)
|
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len);
|
|
|
|
|
|
|
|
return psk_len;
|
|
|
|
out_err:
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_err, "Error in PSK client callback\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
static void sc_usage(void)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-01-28 14:44:08 +00:00
|
|
|
BIO_printf(bio_err,"usage: s_client args\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err,"\n");
|
|
|
|
BIO_printf(bio_err," -host host - use -connect instead\n");
|
|
|
|
BIO_printf(bio_err," -port port - use -connect instead\n");
|
|
|
|
BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
|
|
|
|
|
|
|
|
BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
|
|
|
|
BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
|
2004-11-16 17:30:59 +00:00
|
|
|
BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
|
|
|
|
BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," not specified but cert file is.\n");
|
2004-11-16 17:30:59 +00:00
|
|
|
BIO_printf(bio_err," -keyform arg - key format (PEM or DER) PEM default\n");
|
|
|
|
BIO_printf(bio_err," -pass arg - private key file pass phrase source\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n");
|
|
|
|
BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n");
|
|
|
|
BIO_printf(bio_err," -reconnect - Drop and re-make the connection with the same Session-ID\n");
|
|
|
|
BIO_printf(bio_err," -pause - sleep(1) after each read(2) and write(2) system call\n");
|
1999-03-31 12:06:30 +00:00
|
|
|
BIO_printf(bio_err," -showcerts - show all certificates in the chain\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -debug - extra output\n");
|
2005-01-04 10:28:38 +00:00
|
|
|
#ifdef WATT32
|
|
|
|
BIO_printf(bio_err," -wdebug - WATT-32 tcp debugging\n");
|
|
|
|
#endif
|
2001-10-20 17:56:36 +00:00
|
|
|
BIO_printf(bio_err," -msg - Show protocol messages\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -nbio_test - more ssl protocol testing\n");
|
|
|
|
BIO_printf(bio_err," -state - print the 'ssl' states\n");
|
|
|
|
#ifdef FIONBIO
|
|
|
|
BIO_printf(bio_err," -nbio - Run with non-blocking IO\n");
|
1999-08-07 02:51:10 +00:00
|
|
|
#endif
|
|
|
|
BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -quiet - no s_client output\n");
|
2000-03-10 12:18:28 +00:00
|
|
|
BIO_printf(bio_err," -ign_eof - ignore input eof (default when -quiet)\n");
|
2008-10-22 06:46:14 +00:00
|
|
|
BIO_printf(bio_err," -no_ign_eof - don't ignore input eof\n");
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
BIO_printf(bio_err," -psk_identity arg - PSK identity\n");
|
|
|
|
BIO_printf(bio_err," -psk arg - PSK in hex (without 0x)\n");
|
2008-11-24 17:27:08 +00:00
|
|
|
# ifndef OPENSSL_NO_JPAKE
|
2008-11-16 12:47:12 +00:00
|
|
|
BIO_printf(bio_err," -jpake arg - JPAKE secret to use\n");
|
|
|
|
# endif
|
2006-03-10 23:06:27 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -ssl2 - just use SSLv2\n");
|
|
|
|
BIO_printf(bio_err," -ssl3 - just use SSLv3\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio_err," -tls1 - just use TLSv1\n");
|
2005-04-26 16:02:40 +00:00
|
|
|
BIO_printf(bio_err," -dtls1 - just use DTLSv1\n");
|
2009-05-17 16:04:21 +00:00
|
|
|
BIO_printf(bio_err," -mtu - set the link layer MTU\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -bugs - Switch on all SSL implementation bug workarounds\n");
|
2001-02-09 19:56:31 +00:00
|
|
|
BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
|
2000-02-03 23:23:24 +00:00
|
|
|
BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
|
1998-12-21 11:00:56 +00:00
|
|
|
BIO_printf(bio_err," command to see what is available\n");
|
2001-11-14 13:57:52 +00:00
|
|
|
BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
|
|
|
|
BIO_printf(bio_err," for those protocols that support it, where\n");
|
|
|
|
BIO_printf(bio_err," 'prot' defines which one to assume. Currently,\n");
|
2008-10-14 19:11:26 +00:00
|
|
|
BIO_printf(bio_err," only \"smtp\", \"pop3\", \"imap\", \"ftp\" and \"xmpp\"\n");
|
|
|
|
BIO_printf(bio_err," are supported.\n");
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2000-10-26 21:07:28 +00:00
|
|
|
BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2001-02-15 10:22:07 +00:00
|
|
|
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
2007-08-23 12:20:36 +00:00
|
|
|
BIO_printf(bio_err," -sess_out arg - file to write SSL session to\n");
|
|
|
|
BIO_printf(bio_err," -sess_in arg - file to read SSL session from\n");
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
BIO_printf(bio_err," -servername host - Set TLS extension servername in ClientHello\n");
|
2007-08-23 11:34:48 +00:00
|
|
|
BIO_printf(bio_err," -tlsextdebug - hex dump of all TLS extensions received\n");
|
2007-09-26 21:56:59 +00:00
|
|
|
BIO_printf(bio_err," -status - request certificate status from server\n");
|
2007-08-23 11:34:48 +00:00
|
|
|
BIO_printf(bio_err," -no_ticket - disable use of RFC4507bis session tickets\n");
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
|
|
|
|
/* This is a context that we pass to callbacks */
|
|
|
|
typedef struct tlsextctx_st {
|
|
|
|
BIO * biodebug;
|
|
|
|
int ack;
|
|
|
|
} tlsextctx;
|
|
|
|
|
|
|
|
|
2006-01-02 23:29:12 +00:00
|
|
|
static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
|
|
|
|
{
|
2006-01-02 23:14:37 +00:00
|
|
|
tlsextctx * p = (tlsextctx *) arg;
|
2006-01-04 12:02:43 +00:00
|
|
|
const char * hn= SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
|
2006-01-02 23:14:37 +00:00
|
|
|
if (SSL_get_servername_type(s) != -1)
|
|
|
|
p->ack = !SSL_session_reused(s) && hn != NULL;
|
|
|
|
else
|
2006-01-03 03:27:19 +00:00
|
|
|
BIO_printf(bio_err,"Can't use SSL_get_servername\n");
|
2006-01-02 23:14:37 +00:00
|
|
|
|
2006-01-11 06:10:40 +00:00
|
|
|
return SSL_TLSEXT_ERR_OK;
|
2006-01-02 23:29:12 +00:00
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
|
|
|
|
2007-02-16 18:12:16 +00:00
|
|
|
enum
|
|
|
|
{
|
|
|
|
PROTO_OFF = 0,
|
|
|
|
PROTO_SMTP,
|
|
|
|
PROTO_POP3,
|
|
|
|
PROTO_IMAP,
|
2008-10-14 19:11:26 +00:00
|
|
|
PROTO_FTP,
|
2008-10-19 17:22:34 +00:00
|
|
|
PROTO_XMPP
|
2007-02-16 18:12:16 +00:00
|
|
|
};
|
|
|
|
|
2000-02-11 09:47:18 +00:00
|
|
|
int MAIN(int, char **);
|
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
int MAIN(int argc, char **argv)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
int off=0;
|
2006-03-15 17:45:43 +00:00
|
|
|
SSL *con=NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
int s,k,width,state=0;
|
2001-11-14 13:57:52 +00:00
|
|
|
char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
int cbuf_len,cbuf_off;
|
|
|
|
int sbuf_len,sbuf_off;
|
|
|
|
fd_set readfds,writefds;
|
|
|
|
short port=PORT;
|
|
|
|
int full_log=1;
|
|
|
|
char *host=SSL_HOST_NAME;
|
|
|
|
char *cert_file=NULL,*key_file=NULL;
|
2004-11-16 17:30:59 +00:00
|
|
|
int cert_format = FORMAT_PEM, key_format = FORMAT_PEM;
|
|
|
|
char *passarg = NULL, *pass = NULL;
|
|
|
|
X509 *cert = NULL;
|
|
|
|
EVP_PKEY *key = NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
|
|
|
|
int reconnect=0,badop=0,verify=SSL_VERIFY_NONE,bugs=0;
|
1999-08-07 02:51:10 +00:00
|
|
|
int crlf=0;
|
1999-04-09 20:54:25 +00:00
|
|
|
int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_CTX *ctx=NULL;
|
|
|
|
int ret=1,in_init=1,i,nbio_test=0;
|
2007-02-16 18:12:16 +00:00
|
|
|
int starttls_proto = PROTO_OFF;
|
2009-06-30 16:10:24 +00:00
|
|
|
int prexit = 0;
|
|
|
|
X509_VERIFY_PARAM *vpm = NULL;
|
|
|
|
int badarg = 0;
|
2005-08-14 21:48:33 +00:00
|
|
|
const SSL_METHOD *meth=NULL;
|
2006-01-02 23:29:12 +00:00
|
|
|
int socket_type=SOCK_STREAM;
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO *sbio;
|
2001-02-15 10:22:07 +00:00
|
|
|
char *inrand=NULL;
|
2007-02-16 18:12:16 +00:00
|
|
|
int mbuf_len=0;
|
2009-08-12 13:21:26 +00:00
|
|
|
struct timeval timeout, *timeoutp;
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2000-10-26 21:07:28 +00:00
|
|
|
char *engine_id=NULL;
|
2008-06-03 11:26:27 +00:00
|
|
|
char *ssl_client_engine_id=NULL;
|
2008-12-20 17:04:40 +00:00
|
|
|
ENGINE *ssl_client_engine=NULL;
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2008-12-20 17:04:40 +00:00
|
|
|
ENGINE *e=NULL;
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
1999-09-20 22:09:17 +00:00
|
|
|
struct timeval tv;
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
int stdin_set = 0;
|
|
|
|
#endif
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
char *servername = NULL;
|
|
|
|
tlsextctx tlsextcbp =
|
|
|
|
{NULL,0};
|
|
|
|
#endif
|
2007-08-11 23:18:29 +00:00
|
|
|
char *sess_in = NULL;
|
|
|
|
char *sess_out = NULL;
|
2005-04-26 16:02:40 +00:00
|
|
|
struct sockaddr peer;
|
2005-04-27 16:27:14 +00:00
|
|
|
int peerlen = sizeof(peer);
|
2005-04-26 16:02:40 +00:00
|
|
|
int enable_timeouts = 0 ;
|
2006-01-02 23:29:12 +00:00
|
|
|
long socket_mtu = 0;
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
2008-10-26 18:40:52 +00:00
|
|
|
char *jpake_secret = NULL;
|
2008-11-12 17:28:18 +00:00
|
|
|
#endif
|
2005-04-26 16:02:40 +00:00
|
|
|
|
2001-02-19 16:06:34 +00:00
|
|
|
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
1998-12-21 10:52:47 +00:00
|
|
|
meth=SSLv23_client_method();
|
2001-02-19 16:06:34 +00:00
|
|
|
#elif !defined(OPENSSL_NO_SSL3)
|
1998-12-21 10:52:47 +00:00
|
|
|
meth=SSLv3_client_method();
|
2001-02-19 16:06:34 +00:00
|
|
|
#elif !defined(OPENSSL_NO_SSL2)
|
1998-12-21 10:52:47 +00:00
|
|
|
meth=SSLv2_client_method();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
apps_startup();
|
1998-12-21 10:56:39 +00:00
|
|
|
c_Pause=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
c_quiet=0;
|
2000-03-10 12:18:28 +00:00
|
|
|
c_ign_eof=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
c_debug=0;
|
2001-10-20 17:56:36 +00:00
|
|
|
c_msg=0;
|
1999-03-31 12:06:30 +00:00
|
|
|
c_showcerts=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (bio_err == NULL)
|
|
|
|
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
|
|
|
|
2002-02-22 14:01:21 +00:00
|
|
|
if (!load_config(bio_err, NULL))
|
|
|
|
goto end;
|
|
|
|
|
2000-06-01 22:19:21 +00:00
|
|
|
if ( ((cbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
|
2001-11-14 13:57:52 +00:00
|
|
|
((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
|
|
|
|
((mbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"out of memory\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
verify_depth=0;
|
|
|
|
verify_error=X509_V_OK;
|
|
|
|
#ifdef FIONBIO
|
|
|
|
c_nbio=0;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
while (argc >= 1)
|
|
|
|
{
|
|
|
|
if (strcmp(*argv,"-host") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
host= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-port") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
port=atoi(*(++argv));
|
|
|
|
if (port == 0) goto bad;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-connect") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
if (!extract_host_port(*(++argv),&host,NULL,&port))
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-verify") == 0)
|
|
|
|
{
|
|
|
|
verify=SSL_VERIFY_PEER;
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
verify_depth=atoi(*(++argv));
|
|
|
|
BIO_printf(bio_err,"verify depth is %d\n",verify_depth);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-cert") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
cert_file= *(++argv);
|
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
else if (strcmp(*argv,"-sess_out") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
sess_out = *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-sess_in") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
sess_in = *(++argv);
|
|
|
|
}
|
2004-11-16 17:30:59 +00:00
|
|
|
else if (strcmp(*argv,"-certform") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
cert_format = str2fmt(*(++argv));
|
|
|
|
}
|
2009-06-30 16:10:24 +00:00
|
|
|
else if (args_verify(&argv, &argc, &badarg, bio_err, &vpm))
|
|
|
|
{
|
|
|
|
if (badarg)
|
|
|
|
goto bad;
|
|
|
|
continue;
|
|
|
|
}
|
2006-09-17 17:16:28 +00:00
|
|
|
else if (strcmp(*argv,"-verify_return_error") == 0)
|
|
|
|
verify_return_error = 1;
|
2000-01-08 19:05:47 +00:00
|
|
|
else if (strcmp(*argv,"-prexit") == 0)
|
|
|
|
prexit=1;
|
1999-08-07 02:51:10 +00:00
|
|
|
else if (strcmp(*argv,"-crlf") == 0)
|
|
|
|
crlf=1;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-quiet") == 0)
|
2000-03-10 12:18:28 +00:00
|
|
|
{
|
1998-12-21 10:52:47 +00:00
|
|
|
c_quiet=1;
|
2000-03-10 12:18:28 +00:00
|
|
|
c_ign_eof=1;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-ign_eof") == 0)
|
|
|
|
c_ign_eof=1;
|
2008-10-22 06:46:14 +00:00
|
|
|
else if (strcmp(*argv,"-no_ign_eof") == 0)
|
|
|
|
c_ign_eof=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-pause") == 0)
|
|
|
|
c_Pause=1;
|
|
|
|
else if (strcmp(*argv,"-debug") == 0)
|
|
|
|
c_debug=1;
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
else if (strcmp(*argv,"-tlsextdebug") == 0)
|
|
|
|
c_tlsextdebug=1;
|
2007-09-26 21:56:59 +00:00
|
|
|
else if (strcmp(*argv,"-status") == 0)
|
|
|
|
c_status_req=1;
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
2005-01-04 10:28:38 +00:00
|
|
|
#ifdef WATT32
|
|
|
|
else if (strcmp(*argv,"-wdebug") == 0)
|
|
|
|
dbug_init();
|
|
|
|
#endif
|
2001-10-20 17:56:36 +00:00
|
|
|
else if (strcmp(*argv,"-msg") == 0)
|
|
|
|
c_msg=1;
|
1999-03-31 12:06:30 +00:00
|
|
|
else if (strcmp(*argv,"-showcerts") == 0)
|
|
|
|
c_showcerts=1;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-nbio_test") == 0)
|
|
|
|
nbio_test=1;
|
|
|
|
else if (strcmp(*argv,"-state") == 0)
|
|
|
|
state=1;
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
else if (strcmp(*argv,"-psk_identity") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
psk_identity=*(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-psk") == 0)
|
|
|
|
{
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
psk_key=*(++argv);
|
|
|
|
for (j = 0; j < strlen(psk_key); j++)
|
|
|
|
{
|
|
|
|
if (isxdigit((int)psk_key[j]))
|
|
|
|
continue;
|
|
|
|
BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_SSL2
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-ssl2") == 0)
|
|
|
|
meth=SSLv2_client_method();
|
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_SSL3
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-ssl3") == 0)
|
|
|
|
meth=SSLv3_client_method();
|
1998-12-21 10:56:39 +00:00
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_TLS1
|
1998-12-21 10:56:39 +00:00
|
|
|
else if (strcmp(*argv,"-tls1") == 0)
|
|
|
|
meth=TLSv1_client_method();
|
2005-04-26 16:02:40 +00:00
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_DTLS1
|
|
|
|
else if (strcmp(*argv,"-dtls1") == 0)
|
|
|
|
{
|
|
|
|
meth=DTLSv1_client_method();
|
2006-01-02 23:29:12 +00:00
|
|
|
socket_type=SOCK_DGRAM;
|
2005-04-26 16:02:40 +00:00
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-timeout") == 0)
|
|
|
|
enable_timeouts=1;
|
|
|
|
else if (strcmp(*argv,"-mtu") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
2006-01-02 23:29:12 +00:00
|
|
|
socket_mtu = atol(*(++argv));
|
2005-04-26 16:02:40 +00:00
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
#endif
|
|
|
|
else if (strcmp(*argv,"-bugs") == 0)
|
|
|
|
bugs=1;
|
2004-11-16 17:30:59 +00:00
|
|
|
else if (strcmp(*argv,"-keyform") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
key_format = str2fmt(*(++argv));
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-pass") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
passarg = *(++argv);
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-key") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
key_file= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-reconnect") == 0)
|
|
|
|
{
|
|
|
|
reconnect=5;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-CApath") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
CApath= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-CAfile") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
CAfile= *(++argv);
|
|
|
|
}
|
1998-12-21 10:56:39 +00:00
|
|
|
else if (strcmp(*argv,"-no_tls1") == 0)
|
|
|
|
off|=SSL_OP_NO_TLSv1;
|
|
|
|
else if (strcmp(*argv,"-no_ssl3") == 0)
|
|
|
|
off|=SSL_OP_NO_SSLv3;
|
|
|
|
else if (strcmp(*argv,"-no_ssl2") == 0)
|
|
|
|
off|=SSL_OP_NO_SSLv2;
|
2005-10-08 00:18:53 +00:00
|
|
|
else if (strcmp(*argv,"-no_comp") == 0)
|
|
|
|
{ off|=SSL_OP_NO_COMPRESSION; }
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
else if (strcmp(*argv,"-no_ticket") == 0)
|
|
|
|
{ off|=SSL_OP_NO_TICKET; }
|
|
|
|
#endif
|
2001-02-09 19:56:31 +00:00
|
|
|
else if (strcmp(*argv,"-serverpref") == 0)
|
|
|
|
off|=SSL_OP_CIPHER_SERVER_PREFERENCE;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-cipher") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
cipher= *(++argv);
|
|
|
|
}
|
|
|
|
#ifdef FIONBIO
|
|
|
|
else if (strcmp(*argv,"-nbio") == 0)
|
|
|
|
{ c_nbio=1; }
|
|
|
|
#endif
|
2001-11-14 13:57:52 +00:00
|
|
|
else if (strcmp(*argv,"-starttls") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
++argv;
|
|
|
|
if (strcmp(*argv,"smtp") == 0)
|
2007-02-16 18:12:16 +00:00
|
|
|
starttls_proto = PROTO_SMTP;
|
2003-05-28 20:24:57 +00:00
|
|
|
else if (strcmp(*argv,"pop3") == 0)
|
2007-02-16 18:12:16 +00:00
|
|
|
starttls_proto = PROTO_POP3;
|
|
|
|
else if (strcmp(*argv,"imap") == 0)
|
|
|
|
starttls_proto = PROTO_IMAP;
|
|
|
|
else if (strcmp(*argv,"ftp") == 0)
|
|
|
|
starttls_proto = PROTO_FTP;
|
2008-10-14 19:11:26 +00:00
|
|
|
else if (strcmp(*argv, "xmpp") == 0)
|
|
|
|
starttls_proto = PROTO_XMPP;
|
2001-11-14 13:57:52 +00:00
|
|
|
else
|
|
|
|
goto bad;
|
|
|
|
}
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2000-10-26 21:07:28 +00:00
|
|
|
else if (strcmp(*argv,"-engine") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
engine_id = *(++argv);
|
|
|
|
}
|
2008-06-03 11:26:27 +00:00
|
|
|
else if (strcmp(*argv,"-ssl_client_engine") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
ssl_client_engine_id = *(++argv);
|
|
|
|
}
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2001-02-15 10:22:07 +00:00
|
|
|
else if (strcmp(*argv,"-rand") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
inrand= *(++argv);
|
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
else if (strcmp(*argv,"-servername") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
servername= *(++argv);
|
|
|
|
/* meth=TLSv1_client_method(); */
|
|
|
|
}
|
|
|
|
#endif
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
2008-10-26 18:40:52 +00:00
|
|
|
else if (strcmp(*argv,"-jpake") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
jpake_secret = *++argv;
|
|
|
|
}
|
2008-11-12 17:28:18 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
|
|
badop=1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
if (badop)
|
|
|
|
{
|
|
|
|
bad:
|
|
|
|
sc_usage();
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2008-11-24 17:27:08 +00:00
|
|
|
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
|
2008-11-16 12:47:12 +00:00
|
|
|
if (jpake_secret)
|
|
|
|
{
|
|
|
|
if (psk_key)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"Can't use JPAKE and PSK together\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
psk_identity = "JPAKE";
|
|
|
|
}
|
|
|
|
|
|
|
|
if (cipher)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
cipher = "PSK";
|
|
|
|
#endif
|
|
|
|
|
2002-07-16 06:52:03 +00:00
|
|
|
OpenSSL_add_ssl_algorithms();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2002-07-16 06:52:03 +00:00
|
|
|
e = setup_engine(bio_err, engine_id, 1);
|
2008-06-03 11:26:27 +00:00
|
|
|
if (ssl_client_engine_id)
|
|
|
|
{
|
|
|
|
ssl_client_engine = ENGINE_by_id(ssl_client_engine_id);
|
|
|
|
if (!ssl_client_engine)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"Error getting client auth engine\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2004-11-16 17:30:59 +00:00
|
|
|
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Error getting password\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (key_file == NULL)
|
|
|
|
key_file = cert_file;
|
|
|
|
|
2004-12-13 18:02:23 +00:00
|
|
|
|
|
|
|
if (key_file)
|
|
|
|
|
2004-11-16 17:30:59 +00:00
|
|
|
{
|
2004-12-13 18:02:23 +00:00
|
|
|
|
|
|
|
key = load_key(bio_err, key_file, key_format, 0, pass, e,
|
|
|
|
"client certificate private key file");
|
|
|
|
if (!key)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2004-11-16 17:30:59 +00:00
|
|
|
}
|
|
|
|
|
2004-12-13 18:02:23 +00:00
|
|
|
if (cert_file)
|
2004-11-16 17:30:59 +00:00
|
|
|
|
|
|
|
{
|
2004-12-13 18:02:23 +00:00
|
|
|
cert = load_cert(bio_err,cert_file,cert_format,
|
|
|
|
NULL, e, "client certificate file");
|
|
|
|
|
|
|
|
if (!cert)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
2004-11-16 17:30:59 +00:00
|
|
|
}
|
2002-07-16 06:52:03 +00:00
|
|
|
|
2001-02-15 10:22:07 +00:00
|
|
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
|
|
|
&& !RAND_status())
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
|
|
|
}
|
|
|
|
if (inrand != NULL)
|
|
|
|
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
|
|
app_RAND_load_files(inrand));
|
1999-10-26 01:56:29 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (bio_c_out == NULL)
|
|
|
|
{
|
2001-10-20 17:56:36 +00:00
|
|
|
if (c_quiet && !c_debug && !c_msg)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
bio_c_out=BIO_new(BIO_s_null());
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (bio_c_out == NULL)
|
|
|
|
bio_c_out=BIO_new_fp(stdout,BIO_NOCLOSE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx=SSL_CTX_new(meth);
|
|
|
|
if (ctx == NULL)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2009-06-30 16:10:24 +00:00
|
|
|
if (vpm)
|
|
|
|
SSL_CTX_set1_param(ctx, vpm);
|
|
|
|
|
2008-06-03 11:26:27 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
|
|
if (ssl_client_engine)
|
|
|
|
{
|
|
|
|
if (!SSL_CTX_set_client_cert_engine(ctx, ssl_client_engine))
|
|
|
|
{
|
|
|
|
BIO_puts(bio_err, "Error setting client auth engine\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
ENGINE_free(ssl_client_engine);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
ENGINE_free(ssl_client_engine);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifdef OPENSSL_NO_JPAKE
|
|
|
|
if (psk_key != NULL)
|
|
|
|
#else
|
2008-11-16 12:47:12 +00:00
|
|
|
if (psk_key != NULL || jpake_secret)
|
2008-11-24 17:27:08 +00:00
|
|
|
#endif
|
2006-03-10 23:06:27 +00:00
|
|
|
{
|
|
|
|
if (c_debug)
|
2008-11-16 12:47:12 +00:00
|
|
|
BIO_printf(bio_c_out, "PSK key given or JPAKE in use, setting client callback\n");
|
2006-03-10 23:06:27 +00:00
|
|
|
SSL_CTX_set_psk_client_callback(ctx, psk_client_cb);
|
|
|
|
}
|
|
|
|
#endif
|
1998-12-21 10:56:39 +00:00
|
|
|
if (bugs)
|
|
|
|
SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
|
|
|
|
else
|
|
|
|
SSL_CTX_set_options(ctx,off);
|
2005-04-26 16:02:40 +00:00
|
|
|
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
|
|
|
* Setting read ahead solves this problem.
|
|
|
|
*/
|
2006-01-02 23:29:12 +00:00
|
|
|
if (socket_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx, 1);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
|
|
|
|
if (cipher != NULL)
|
2000-01-23 02:28:08 +00:00
|
|
|
if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
|
2000-02-03 23:23:24 +00:00
|
|
|
BIO_printf(bio_err,"error setting cipher list\n");
|
2000-01-23 02:28:08 +00:00
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
#if 0
|
|
|
|
else
|
|
|
|
SSL_CTX_set_cipher_list(ctx,getenv("SSL_CIPHER"));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
SSL_CTX_set_verify(ctx,verify,verify_callback);
|
2004-11-16 17:30:59 +00:00
|
|
|
if (!set_cert_key_stuff(ctx,cert,key))
|
1998-12-21 10:52:47 +00:00
|
|
|
goto end;
|
|
|
|
|
|
|
|
if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
|
|
|
(!SSL_CTX_set_default_verify_paths(ctx)))
|
|
|
|
{
|
2000-02-03 23:23:24 +00:00
|
|
|
/* BIO_printf(bio_err,"error setting default verify locations\n"); */
|
1998-12-21 10:52:47 +00:00
|
|
|
ERR_print_errors(bio_err);
|
1998-12-21 10:56:39 +00:00
|
|
|
/* goto end; */
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2006-01-02 23:29:12 +00:00
|
|
|
if (servername != NULL)
|
|
|
|
{
|
2006-01-02 23:14:37 +00:00
|
|
|
tlsextcbp.biodebug = bio_err;
|
|
|
|
SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
|
|
|
|
SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
|
2006-01-02 23:29:12 +00:00
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2000-02-03 02:56:48 +00:00
|
|
|
con=SSL_new(ctx);
|
2007-08-11 23:18:29 +00:00
|
|
|
if (sess_in)
|
|
|
|
{
|
|
|
|
SSL_SESSION *sess;
|
|
|
|
BIO *stmp = BIO_new_file(sess_in, "r");
|
|
|
|
if (!stmp)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Can't open session file %s\n",
|
|
|
|
sess_in);
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL);
|
|
|
|
BIO_free(stmp);
|
|
|
|
if (!sess)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Can't open session file %s\n",
|
|
|
|
sess_in);
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
SSL_set_session(con, sess);
|
|
|
|
SSL_SESSION_free(sess);
|
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2006-01-02 23:29:12 +00:00
|
|
|
if (servername != NULL)
|
|
|
|
{
|
2006-01-09 19:49:05 +00:00
|
|
|
if (!SSL_set_tlsext_host_name(con,servername))
|
2006-01-02 23:29:12 +00:00
|
|
|
{
|
2006-01-02 23:14:37 +00:00
|
|
|
BIO_printf(bio_err,"Unable to set TLS servername extension.\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
2006-01-02 23:29:12 +00:00
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
}
|
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_KRB5
|
2000-11-30 22:53:34 +00:00
|
|
|
if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL)
|
|
|
|
{
|
|
|
|
kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host);
|
|
|
|
}
|
2001-02-19 16:06:34 +00:00
|
|
|
#endif /* OPENSSL_NO_KRB5 */
|
1998-12-21 10:56:39 +00:00
|
|
|
/* SSL_set_cipher_list(con,"RC4-MD5"); */
|
2007-09-21 06:54:24 +00:00
|
|
|
#if 0
|
|
|
|
#ifdef TLSEXT_TYPE_opaque_prf_input
|
2007-09-23 11:08:59 +00:00
|
|
|
SSL_set_tlsext_opaque_prf_input(con, "Test client", 11);
|
2007-09-21 06:54:24 +00:00
|
|
|
#endif
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
re_start:
|
|
|
|
|
2006-01-02 23:29:12 +00:00
|
|
|
if (init_client(&s,host,port,socket_type) == 0)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error());
|
1998-12-21 10:52:47 +00:00
|
|
|
SHUTDOWN(s);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
BIO_printf(bio_c_out,"CONNECTED(%08X)\n",s);
|
|
|
|
|
|
|
|
#ifdef FIONBIO
|
|
|
|
if (c_nbio)
|
|
|
|
{
|
|
|
|
unsigned long l=1;
|
|
|
|
BIO_printf(bio_c_out,"turning on non blocking io\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
if (BIO_socket_ioctl(s,FIONBIO,&l) < 0)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
if (c_Pause & 0x01) con->debug=1;
|
2005-04-26 16:02:40 +00:00
|
|
|
|
|
|
|
if ( SSL_version(con) == DTLS1_VERSION)
|
|
|
|
{
|
|
|
|
|
|
|
|
sbio=BIO_new_dgram(s,BIO_NOCLOSE);
|
2005-04-27 16:27:14 +00:00
|
|
|
if (getsockname(s, &peer, (void *)&peerlen) < 0)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "getsockname:errno=%d\n",
|
|
|
|
get_last_socket_error());
|
|
|
|
SHUTDOWN(s);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_ctrl_set_connected(sbio, 1, &peer);
|
2005-04-26 16:02:40 +00:00
|
|
|
|
2006-01-02 23:29:12 +00:00
|
|
|
if (enable_timeouts)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
timeout.tv_sec = 0;
|
|
|
|
timeout.tv_usec = DGRAM_RCV_TIMEOUT;
|
|
|
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_RECV_TIMEOUT, 0, &timeout);
|
|
|
|
|
|
|
|
timeout.tv_sec = 0;
|
|
|
|
timeout.tv_usec = DGRAM_SND_TIMEOUT;
|
|
|
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
|
|
|
|
}
|
|
|
|
|
2009-05-17 16:04:21 +00:00
|
|
|
if (socket_mtu > 28)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
|
2009-05-17 16:04:21 +00:00
|
|
|
SSL_set_mtu(con, socket_mtu - 28);
|
2005-04-26 16:02:40 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
/* want to do MTU discovery */
|
|
|
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_MTU_DISCOVER, 0, NULL);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
sbio=BIO_new_socket(s,BIO_NOCLOSE);
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (nbio_test)
|
|
|
|
{
|
|
|
|
BIO *test;
|
|
|
|
|
|
|
|
test=BIO_new(BIO_f_nbio_test());
|
|
|
|
sbio=BIO_push(test,sbio);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (c_debug)
|
|
|
|
{
|
|
|
|
con->debug=1;
|
2004-08-12 08:58:55 +00:00
|
|
|
BIO_set_callback(sbio,bio_dump_callback);
|
2006-11-29 20:54:57 +00:00
|
|
|
BIO_set_callback_arg(sbio,(char *)bio_c_out);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
2001-10-20 17:56:36 +00:00
|
|
|
if (c_msg)
|
|
|
|
{
|
|
|
|
SSL_set_msg_callback(con, msg_cb);
|
|
|
|
SSL_set_msg_callback_arg(con, bio_c_out);
|
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
if (c_tlsextdebug)
|
|
|
|
{
|
|
|
|
SSL_set_tlsext_debug_callback(con, tlsext_cb);
|
|
|
|
SSL_set_tlsext_debug_arg(con, bio_c_out);
|
|
|
|
}
|
2007-09-26 21:56:59 +00:00
|
|
|
if (c_status_req)
|
|
|
|
{
|
|
|
|
SSL_set_tlsext_status_type(con, TLSEXT_STATUSTYPE_ocsp);
|
|
|
|
SSL_CTX_set_tlsext_status_cb(ctx, ocsp_resp_cb);
|
|
|
|
SSL_CTX_set_tlsext_status_arg(ctx, bio_c_out);
|
|
|
|
#if 0
|
|
|
|
{
|
|
|
|
STACK_OF(OCSP_RESPID) *ids = sk_OCSP_RESPID_new_null();
|
|
|
|
OCSP_RESPID *id = OCSP_RESPID_new();
|
|
|
|
id->value.byKey = ASN1_OCTET_STRING_new();
|
|
|
|
id->type = V_OCSP_RESPID_KEY;
|
|
|
|
ASN1_STRING_set(id->value.byKey, "Hello World", -1);
|
|
|
|
sk_OCSP_RESPID_push(ids, id);
|
|
|
|
SSL_set_tlsext_status_ids(con, ids);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
2008-10-26 18:40:52 +00:00
|
|
|
if (jpake_secret)
|
|
|
|
jpake_client_auth(bio_c_out, sbio, jpake_secret);
|
2008-11-12 17:28:18 +00:00
|
|
|
#endif
|
2008-10-26 18:40:52 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_set_bio(con,sbio,sbio);
|
|
|
|
SSL_set_connect_state(con);
|
|
|
|
|
|
|
|
/* ok, lets connect */
|
|
|
|
width=SSL_get_fd(con)+1;
|
|
|
|
|
|
|
|
read_tty=1;
|
|
|
|
write_tty=0;
|
|
|
|
tty_on=0;
|
|
|
|
read_ssl=1;
|
|
|
|
write_ssl=1;
|
|
|
|
|
|
|
|
cbuf_len=0;
|
|
|
|
cbuf_off=0;
|
|
|
|
sbuf_len=0;
|
|
|
|
sbuf_off=0;
|
|
|
|
|
2001-11-14 13:57:52 +00:00
|
|
|
/* This is an ugly hack that does a lot of assumptions */
|
2007-02-22 17:39:47 +00:00
|
|
|
/* We do have to handle multi-line responses which may come
|
|
|
|
in a single packet or not. We therefore have to use
|
|
|
|
BIO_gets() which does need a buffering BIO. So during
|
|
|
|
the initial chitchat we do push a buffering BIO into the
|
|
|
|
chain that is removed again later on to not disturb the
|
|
|
|
rest of the s_client operation. */
|
2007-02-16 18:12:16 +00:00
|
|
|
if (starttls_proto == PROTO_SMTP)
|
2001-11-14 13:57:52 +00:00
|
|
|
{
|
2007-02-21 18:20:41 +00:00
|
|
|
int foundit=0;
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO *fbio = BIO_new(BIO_f_buffer());
|
|
|
|
BIO_push(fbio, sbio);
|
2007-02-16 18:12:16 +00:00
|
|
|
/* wait for multi-line response to end from SMTP */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-16 18:12:16 +00:00
|
|
|
}
|
|
|
|
while (mbuf_len>3 && mbuf[3]=='-');
|
2007-02-21 18:20:41 +00:00
|
|
|
/* STARTTLS command requires EHLO... */
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_printf(fbio,"EHLO openssl.client.net\r\n");
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
/* wait for multi-line response to end EHLO SMTP response */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (strstr(mbuf,"STARTTLS"))
|
|
|
|
foundit=1;
|
|
|
|
}
|
|
|
|
while (mbuf_len>3 && mbuf[3]=='-');
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_pop(fbio);
|
|
|
|
BIO_free(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (!foundit)
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"didn't found starttls in server response,"
|
|
|
|
" try anyway...\n");
|
2001-11-14 13:57:52 +00:00
|
|
|
BIO_printf(sbio,"STARTTLS\r\n");
|
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
2007-02-16 18:12:16 +00:00
|
|
|
else if (starttls_proto == PROTO_POP3)
|
2003-05-28 20:24:57 +00:00
|
|
|
{
|
|
|
|
BIO_read(sbio,mbuf,BUFSIZZ);
|
|
|
|
BIO_printf(sbio,"STLS\r\n");
|
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
2007-02-16 18:12:16 +00:00
|
|
|
else if (starttls_proto == PROTO_IMAP)
|
|
|
|
{
|
2007-02-21 18:20:41 +00:00
|
|
|
int foundit=0;
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO *fbio = BIO_new(BIO_f_buffer());
|
|
|
|
BIO_push(fbio, sbio);
|
|
|
|
BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-21 18:20:41 +00:00
|
|
|
/* STARTTLS command requires CAPABILITY... */
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_printf(fbio,". CAPABILITY\r\n");
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
/* wait for multi-line CAPABILITY response */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (strstr(mbuf,"STARTTLS"))
|
|
|
|
foundit=1;
|
|
|
|
}
|
2007-02-22 17:39:47 +00:00
|
|
|
while (mbuf_len>3 && mbuf[0]!='.');
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_pop(fbio);
|
|
|
|
BIO_free(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (!foundit)
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"didn't found STARTTLS in server response,"
|
|
|
|
" try anyway...\n");
|
|
|
|
BIO_printf(sbio,". STARTTLS\r\n");
|
2007-02-16 18:12:16 +00:00
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
|
|
|
else if (starttls_proto == PROTO_FTP)
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO *fbio = BIO_new(BIO_f_buffer());
|
|
|
|
BIO_push(fbio, sbio);
|
2007-02-16 18:12:16 +00:00
|
|
|
/* wait for multi-line response to end from FTP */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-16 18:12:16 +00:00
|
|
|
}
|
|
|
|
while (mbuf_len>3 && mbuf[3]=='-');
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_pop(fbio);
|
|
|
|
BIO_free(fbio);
|
2007-02-16 18:12:16 +00:00
|
|
|
BIO_printf(sbio,"AUTH TLS\r\n");
|
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
2008-10-14 19:11:26 +00:00
|
|
|
if (starttls_proto == PROTO_XMPP)
|
|
|
|
{
|
|
|
|
int seen = 0;
|
|
|
|
BIO_printf(sbio,"<stream:stream "
|
|
|
|
"xmlns:stream='http://etherx.jabber.org/streams' "
|
|
|
|
"xmlns='jabber:client' to='%s' version='1.0'>", host);
|
|
|
|
seen = BIO_read(sbio,mbuf,BUFSIZZ);
|
|
|
|
mbuf[seen] = 0;
|
|
|
|
while (!strstr(mbuf, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'"))
|
|
|
|
{
|
|
|
|
if (strstr(mbuf, "/stream:features>"))
|
|
|
|
goto shut;
|
|
|
|
seen = BIO_read(sbio,mbuf,BUFSIZZ);
|
|
|
|
mbuf[seen] = 0;
|
|
|
|
}
|
|
|
|
BIO_printf(sbio, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>");
|
|
|
|
seen = BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
sbuf[seen] = 0;
|
|
|
|
if (!strstr(sbuf, "<proceed"))
|
|
|
|
goto shut;
|
|
|
|
mbuf[0] = 0;
|
|
|
|
}
|
2001-11-14 13:57:52 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
FD_ZERO(&readfds);
|
|
|
|
FD_ZERO(&writefds);
|
|
|
|
|
2009-08-12 13:21:26 +00:00
|
|
|
if ((SSL_version(con) == DTLS1_VERSION) &&
|
|
|
|
DTLSv1_get_timeout(con, &timeout))
|
|
|
|
timeoutp = &timeout;
|
|
|
|
else
|
|
|
|
timeoutp = NULL;
|
|
|
|
|
1998-12-21 10:56:39 +00:00
|
|
|
if (SSL_in_init(con) && !SSL_total_renegotiations(con))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
in_init=1;
|
|
|
|
tty_on=0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
tty_on=1;
|
|
|
|
if (in_init)
|
|
|
|
{
|
|
|
|
in_init=0;
|
2007-09-21 06:54:24 +00:00
|
|
|
#if 0 /* This test doesn't really work as intended (needs to be fixed) */
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2006-06-15 19:00:34 +00:00
|
|
|
if (servername != NULL && !SSL_session_reused(con))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_c_out,"Server did %sacknowledge servername extension.\n",tlsextcbp.ack?"":"not ");
|
|
|
|
}
|
2007-09-21 06:54:24 +00:00
|
|
|
#endif
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
2007-08-11 23:18:29 +00:00
|
|
|
if (sess_out)
|
|
|
|
{
|
|
|
|
BIO *stmp = BIO_new_file(sess_out, "w");
|
|
|
|
if (stmp)
|
|
|
|
{
|
|
|
|
PEM_write_bio_SSL_SESSION(stmp, SSL_get_session(con));
|
|
|
|
BIO_free(stmp);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
BIO_printf(bio_err, "Error writing session file %s\n", sess_out);
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
print_stuff(bio_c_out,con,full_log);
|
|
|
|
if (full_log > 0) full_log--;
|
|
|
|
|
2003-05-28 20:24:57 +00:00
|
|
|
if (starttls_proto)
|
2001-11-14 13:57:52 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"%s",mbuf);
|
|
|
|
/* We don't need to know any more */
|
2007-02-16 18:12:16 +00:00
|
|
|
starttls_proto = PROTO_OFF;
|
2001-11-14 13:57:52 +00:00
|
|
|
}
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (reconnect)
|
|
|
|
{
|
|
|
|
reconnect--;
|
|
|
|
BIO_printf(bio_c_out,"drop connection and then reconnect\n");
|
|
|
|
SSL_shutdown(con);
|
|
|
|
SSL_set_connect_state(con);
|
|
|
|
SHUTDOWN(SSL_get_fd(con));
|
|
|
|
goto re_start;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-04-09 20:54:25 +00:00
|
|
|
ssl_pending = read_ssl && SSL_pending(con);
|
|
|
|
|
|
|
|
if (!ssl_pending)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
2006-04-11 21:34:21 +00:00
|
|
|
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE) && !defined (OPENSSL_SYS_BEOS_R5)
|
1999-04-09 20:54:25 +00:00
|
|
|
if (tty_on)
|
|
|
|
{
|
2006-04-17 12:22:13 +00:00
|
|
|
if (read_tty) openssl_fdset(fileno(stdin),&readfds);
|
|
|
|
if (write_tty) openssl_fdset(fileno(stdout),&writefds);
|
1999-04-09 20:54:25 +00:00
|
|
|
}
|
|
|
|
if (read_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&readfds);
|
1999-04-09 20:54:25 +00:00
|
|
|
if (write_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&writefds);
|
1999-09-20 22:09:17 +00:00
|
|
|
#else
|
|
|
|
if(!tty_on || !write_tty) {
|
|
|
|
if (read_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&readfds);
|
1999-09-20 22:09:17 +00:00
|
|
|
if (write_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&writefds);
|
1999-09-20 22:09:17 +00:00
|
|
|
}
|
|
|
|
#endif
|
1999-04-09 20:54:25 +00:00
|
|
|
/* printf("mode tty(%d %d%d) ssl(%d%d)\n",
|
|
|
|
tty_on,read_tty,write_tty,read_ssl,write_ssl);*/
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-05-13 13:21:17 +00:00
|
|
|
/* Note: under VMS with SOCKETSHR the second parameter
|
1999-05-13 11:37:32 +00:00
|
|
|
* is currently of type (int *) whereas under other
|
|
|
|
* systems it is (void *) if you don't have a cast it
|
|
|
|
* will choke the compiler: if you do have a cast then
|
|
|
|
* you can either go for (int *) or (void *).
|
|
|
|
*/
|
2003-09-27 21:56:08 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
|
|
|
/* Under Windows/DOS we make the assumption that we can
|
1999-09-20 22:09:17 +00:00
|
|
|
* always write to the tty: therefore if we need to
|
|
|
|
* write to the tty we just fall through. Otherwise
|
|
|
|
* we timeout the select every second and see if there
|
|
|
|
* are any keypresses. Note: this is a hack, in a proper
|
|
|
|
* Windows application we wouldn't do this.
|
|
|
|
*/
|
2000-02-20 20:59:21 +00:00
|
|
|
i=0;
|
1999-09-20 22:09:17 +00:00
|
|
|
if(!write_tty) {
|
|
|
|
if(read_tty) {
|
|
|
|
tv.tv_sec = 1;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
|
|
|
NULL,&tv);
|
2003-09-27 21:56:08 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
|
2002-11-15 22:37:18 +00:00
|
|
|
if(!i && (!_kbhit() || !read_tty) ) continue;
|
|
|
|
#else
|
2000-06-01 11:23:20 +00:00
|
|
|
if(!i && (!((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || !read_tty) ) continue;
|
2002-11-15 22:37:18 +00:00
|
|
|
#endif
|
1999-09-20 22:09:17 +00:00
|
|
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:21:26 +00:00
|
|
|
NULL,timeoutp);
|
1999-09-20 22:09:17 +00:00
|
|
|
}
|
2004-06-28 11:55:28 +00:00
|
|
|
#elif defined(OPENSSL_SYS_NETWARE)
|
|
|
|
if(!write_tty) {
|
|
|
|
if(read_tty) {
|
|
|
|
tv.tv_sec = 1;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
|
|
|
NULL,&tv);
|
|
|
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:21:26 +00:00
|
|
|
NULL,timeoutp);
|
2004-06-28 11:55:28 +00:00
|
|
|
}
|
2006-04-11 21:34:21 +00:00
|
|
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
/* Under BeOS-R5 the situation is similar to DOS */
|
|
|
|
i=0;
|
|
|
|
stdin_set = 0;
|
|
|
|
(void)fcntl(fileno(stdin), F_SETFL, O_NONBLOCK);
|
|
|
|
if(!write_tty) {
|
|
|
|
if(read_tty) {
|
|
|
|
tv.tv_sec = 1;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
|
|
|
NULL,&tv);
|
|
|
|
if (read(fileno(stdin), sbuf, 0) >= 0)
|
|
|
|
stdin_set = 1;
|
|
|
|
if (!i && (stdin_set != 1 || !read_tty))
|
|
|
|
continue;
|
|
|
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:21:26 +00:00
|
|
|
NULL,timeoutp);
|
2006-04-11 21:34:21 +00:00
|
|
|
}
|
|
|
|
(void)fcntl(fileno(stdin), F_SETFL, 0);
|
1999-09-20 22:09:17 +00:00
|
|
|
#else
|
1999-05-13 11:37:32 +00:00
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:21:26 +00:00
|
|
|
NULL,timeoutp);
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
1999-04-09 20:54:25 +00:00
|
|
|
if ( i < 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"bad select %d\n",
|
1998-12-21 10:56:39 +00:00
|
|
|
get_last_socket_error());
|
1999-04-09 20:54:25 +00:00
|
|
|
goto shut;
|
|
|
|
/* goto end; */
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2009-08-12 13:21:26 +00:00
|
|
|
if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"TIMEOUT occured\n");
|
|
|
|
}
|
|
|
|
|
1999-04-09 20:54:25 +00:00
|
|
|
if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
k=SSL_write(con,&(cbuf[cbuf_off]),
|
|
|
|
(unsigned int)cbuf_len);
|
|
|
|
switch (SSL_get_error(con,k))
|
|
|
|
{
|
|
|
|
case SSL_ERROR_NONE:
|
|
|
|
cbuf_off+=k;
|
|
|
|
cbuf_len-=k;
|
|
|
|
if (k <= 0) goto end;
|
|
|
|
/* we have done a write(con,NULL,0); */
|
|
|
|
if (cbuf_len <= 0)
|
|
|
|
{
|
|
|
|
read_tty=1;
|
|
|
|
write_ssl=0;
|
|
|
|
}
|
|
|
|
else /* if (cbuf_len > 0) */
|
|
|
|
{
|
|
|
|
read_tty=0;
|
|
|
|
write_ssl=1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
BIO_printf(bio_c_out,"write W BLOCK\n");
|
|
|
|
write_ssl=1;
|
|
|
|
read_tty=0;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
BIO_printf(bio_c_out,"write R BLOCK\n");
|
|
|
|
write_tty=0;
|
|
|
|
read_ssl=1;
|
|
|
|
write_ssl=0;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
|
|
BIO_printf(bio_c_out,"write X BLOCK\n");
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
|
|
if (cbuf_len != 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_c_out,"shutdown\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret = 0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
read_tty=1;
|
|
|
|
write_ssl=0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case SSL_ERROR_SYSCALL:
|
|
|
|
if ((k != 0) || (cbuf_len != 0))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"write:errno=%d\n",
|
1998-12-21 10:56:39 +00:00
|
|
|
get_last_socket_error());
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
read_tty=1;
|
|
|
|
write_ssl=0;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_SSL:
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
}
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
/* Assume Windows/DOS/BeOS can always write */
|
1999-09-20 22:09:17 +00:00
|
|
|
else if (!ssl_pending && write_tty)
|
|
|
|
#else
|
1999-04-09 20:54:25 +00:00
|
|
|
else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-06-04 21:35:58 +00:00
|
|
|
#ifdef CHARSET_EBCDIC
|
|
|
|
ascii2ebcdic(&(sbuf[sbuf_off]),&(sbuf[sbuf_off]),sbuf_len);
|
|
|
|
#endif
|
2005-11-04 09:30:55 +00:00
|
|
|
i=raw_write_stdout(&(sbuf[sbuf_off]),sbuf_len);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (i <= 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_c_out,"DONE\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret = 0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
/* goto end; */
|
|
|
|
}
|
|
|
|
|
|
|
|
sbuf_len-=i;;
|
|
|
|
sbuf_off+=i;
|
|
|
|
if (sbuf_len <= 0)
|
|
|
|
{
|
|
|
|
read_ssl=1;
|
|
|
|
write_tty=0;
|
|
|
|
}
|
|
|
|
}
|
1999-04-09 20:54:25 +00:00
|
|
|
else if (ssl_pending || FD_ISSET(SSL_get_fd(con),&readfds))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
#ifdef RENEG
|
|
|
|
{ static int iiii; if (++iiii == 52) { SSL_renegotiate(con); iiii=0; } }
|
|
|
|
#endif
|
1998-12-21 11:00:56 +00:00
|
|
|
#if 1
|
1998-12-21 10:56:39 +00:00
|
|
|
k=SSL_read(con,sbuf,1024 /* BUFSIZZ */ );
|
1998-12-21 11:00:56 +00:00
|
|
|
#else
|
|
|
|
/* Demo for pending and peek :-) */
|
|
|
|
k=SSL_read(con,sbuf,16);
|
|
|
|
{ char zbuf[10240];
|
|
|
|
printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240));
|
|
|
|
}
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
switch (SSL_get_error(con,k))
|
|
|
|
{
|
|
|
|
case SSL_ERROR_NONE:
|
|
|
|
if (k <= 0)
|
|
|
|
goto end;
|
|
|
|
sbuf_off=0;
|
|
|
|
sbuf_len=k;
|
|
|
|
|
|
|
|
read_ssl=0;
|
|
|
|
write_tty=1;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
BIO_printf(bio_c_out,"read W BLOCK\n");
|
|
|
|
write_ssl=1;
|
|
|
|
read_tty=0;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
BIO_printf(bio_c_out,"read R BLOCK\n");
|
|
|
|
write_tty=0;
|
|
|
|
read_ssl=1;
|
|
|
|
if ((read_tty == 0) && (write_ssl == 0))
|
|
|
|
write_ssl=1;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
|
|
BIO_printf(bio_c_out,"read X BLOCK\n");
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_SYSCALL:
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret=get_last_socket_error();
|
|
|
|
BIO_printf(bio_err,"read:errno=%d\n",ret);
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
|
|
BIO_printf(bio_c_out,"closed\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
case SSL_ERROR_SSL:
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto shut;
|
1998-12-21 11:00:56 +00:00
|
|
|
/* break; */
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-09-27 21:56:08 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
|
|
|
#if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
|
2002-11-15 22:37:18 +00:00
|
|
|
else if (_kbhit())
|
|
|
|
#else
|
2000-06-01 11:23:20 +00:00
|
|
|
else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
|
2002-11-15 22:37:18 +00:00
|
|
|
#endif
|
2003-11-28 13:10:58 +00:00
|
|
|
#elif defined (OPENSSL_SYS_NETWARE)
|
2005-11-04 09:30:55 +00:00
|
|
|
else if (_kbhit())
|
2006-04-11 21:34:21 +00:00
|
|
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
else if (stdin_set)
|
1999-09-20 22:09:17 +00:00
|
|
|
#else
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (FD_ISSET(fileno(stdin),&readfds))
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-08-07 02:51:10 +00:00
|
|
|
if (crlf)
|
|
|
|
{
|
|
|
|
int j, lf_num;
|
|
|
|
|
2005-11-04 09:30:55 +00:00
|
|
|
i=raw_read_stdin(cbuf,BUFSIZZ/2);
|
1999-08-07 02:51:10 +00:00
|
|
|
lf_num = 0;
|
|
|
|
/* both loops are skipped when i <= 0 */
|
|
|
|
for (j = 0; j < i; j++)
|
|
|
|
if (cbuf[j] == '\n')
|
|
|
|
lf_num++;
|
|
|
|
for (j = i-1; j >= 0; j--)
|
|
|
|
{
|
|
|
|
cbuf[j+lf_num] = cbuf[j];
|
|
|
|
if (cbuf[j] == '\n')
|
|
|
|
{
|
|
|
|
lf_num--;
|
|
|
|
i++;
|
|
|
|
cbuf[j+lf_num] = '\r';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
assert(lf_num == 0);
|
|
|
|
}
|
|
|
|
else
|
2005-11-04 09:30:55 +00:00
|
|
|
i=raw_read_stdin(cbuf,BUFSIZZ);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2000-03-10 12:18:28 +00:00
|
|
|
if ((!c_ign_eof) && ((i <= 0) || (cbuf[0] == 'Q')))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"DONE\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
|
2000-03-10 12:18:28 +00:00
|
|
|
if ((!c_ign_eof) && (cbuf[0] == 'R'))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-04-10 12:08:46 +00:00
|
|
|
BIO_printf(bio_err,"RENEGOTIATING\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_renegotiate(con);
|
1999-04-10 12:08:46 +00:00
|
|
|
cbuf_len=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
cbuf_len=i;
|
|
|
|
cbuf_off=0;
|
1999-06-04 21:35:58 +00:00
|
|
|
#ifdef CHARSET_EBCDIC
|
|
|
|
ebcdic2ascii(cbuf, cbuf, i);
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
write_ssl=1;
|
1999-04-10 12:08:46 +00:00
|
|
|
read_tty=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
}
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
|
|
|
|
ret=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
shut:
|
2006-06-15 19:00:34 +00:00
|
|
|
if (in_init)
|
|
|
|
print_stuff(bio_c_out,con,full_log);
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_shutdown(con);
|
|
|
|
SHUTDOWN(SSL_get_fd(con));
|
|
|
|
end:
|
2006-03-18 14:24:02 +00:00
|
|
|
if (con != NULL)
|
|
|
|
{
|
|
|
|
if (prexit != 0)
|
|
|
|
print_stuff(bio_c_out,con,1);
|
|
|
|
SSL_free(con);
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
if (ctx != NULL) SSL_CTX_free(ctx);
|
2004-11-16 17:30:59 +00:00
|
|
|
if (cert)
|
|
|
|
X509_free(cert);
|
|
|
|
if (key)
|
|
|
|
EVP_PKEY_free(key);
|
|
|
|
if (pass)
|
|
|
|
OPENSSL_free(pass);
|
2002-11-28 08:04:36 +00:00
|
|
|
if (cbuf != NULL) { OPENSSL_cleanse(cbuf,BUFSIZZ); OPENSSL_free(cbuf); }
|
|
|
|
if (sbuf != NULL) { OPENSSL_cleanse(sbuf,BUFSIZZ); OPENSSL_free(sbuf); }
|
|
|
|
if (mbuf != NULL) { OPENSSL_cleanse(mbuf,BUFSIZZ); OPENSSL_free(mbuf); }
|
1998-12-21 10:52:47 +00:00
|
|
|
if (bio_c_out != NULL)
|
|
|
|
{
|
|
|
|
BIO_free(bio_c_out);
|
|
|
|
bio_c_out=NULL;
|
|
|
|
}
|
2001-06-23 16:37:32 +00:00
|
|
|
apps_shutdown();
|
2002-12-03 16:33:03 +00:00
|
|
|
OPENSSL_EXIT(ret);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
static void print_stuff(BIO *bio, SSL *s, int full)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
X509 *peer=NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
char *p;
|
2005-04-05 19:11:19 +00:00
|
|
|
static const char *space=" ";
|
1998-12-21 10:52:47 +00:00
|
|
|
char buf[BUFSIZ];
|
1999-04-12 17:23:57 +00:00
|
|
|
STACK_OF(X509) *sk;
|
|
|
|
STACK_OF(X509_NAME) *sk2;
|
2008-10-12 14:32:47 +00:00
|
|
|
const SSL_CIPHER *c;
|
1998-12-21 10:52:47 +00:00
|
|
|
X509_NAME *xn;
|
|
|
|
int j,i;
|
2005-09-30 23:35:33 +00:00
|
|
|
#ifndef OPENSSL_NO_COMP
|
2003-11-04 00:51:32 +00:00
|
|
|
const COMP_METHOD *comp, *expansion;
|
2005-09-30 23:35:33 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (full)
|
|
|
|
{
|
1999-05-17 20:46:43 +00:00
|
|
|
int got_a_chain = 0;
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
sk=SSL_get_peer_cert_chain(s);
|
|
|
|
if (sk != NULL)
|
|
|
|
{
|
1999-05-17 20:46:43 +00:00
|
|
|
got_a_chain = 1; /* we don't have it for SSL2 (yet) */
|
|
|
|
|
1998-12-21 11:00:56 +00:00
|
|
|
BIO_printf(bio,"---\nCertificate chain\n");
|
1999-04-12 17:23:57 +00:00
|
|
|
for (i=0; i<sk_X509_num(sk); i++)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-04-12 17:23:57 +00:00
|
|
|
X509_NAME_oneline(X509_get_subject_name(
|
2002-11-13 15:43:43 +00:00
|
|
|
sk_X509_value(sk,i)),buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"%2d s:%s\n",i,buf);
|
1999-04-12 17:23:57 +00:00
|
|
|
X509_NAME_oneline(X509_get_issuer_name(
|
2002-11-13 15:43:43 +00:00
|
|
|
sk_X509_value(sk,i)),buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio," i:%s\n",buf);
|
1999-03-31 12:06:30 +00:00
|
|
|
if (c_showcerts)
|
1999-04-12 17:23:57 +00:00
|
|
|
PEM_write_bio_X509(bio,sk_X509_value(sk,i));
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
BIO_printf(bio,"---\n");
|
|
|
|
peer=SSL_get_peer_certificate(s);
|
|
|
|
if (peer != NULL)
|
|
|
|
{
|
|
|
|
BIO_printf(bio,"Server certificate\n");
|
1999-05-17 20:46:43 +00:00
|
|
|
if (!(c_showcerts && got_a_chain)) /* Redundant if we showed the whole chain */
|
1999-03-31 12:06:30 +00:00
|
|
|
PEM_write_bio_X509(bio,peer);
|
1998-12-21 10:52:47 +00:00
|
|
|
X509_NAME_oneline(X509_get_subject_name(peer),
|
2002-11-13 15:43:43 +00:00
|
|
|
buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"subject=%s\n",buf);
|
|
|
|
X509_NAME_oneline(X509_get_issuer_name(peer),
|
2002-11-13 15:43:43 +00:00
|
|
|
buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"issuer=%s\n",buf);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
BIO_printf(bio,"no peer certificate available\n");
|
|
|
|
|
1999-04-12 17:23:57 +00:00
|
|
|
sk2=SSL_get_client_CA_list(s);
|
1999-04-14 23:10:11 +00:00
|
|
|
if ((sk2 != NULL) && (sk_X509_NAME_num(sk2) > 0))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio,"---\nAcceptable client certificate CA names\n");
|
1999-04-12 17:23:57 +00:00
|
|
|
for (i=0; i<sk_X509_NAME_num(sk2); i++)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-04-12 17:23:57 +00:00
|
|
|
xn=sk_X509_NAME_value(sk2,i);
|
1998-12-21 10:52:47 +00:00
|
|
|
X509_NAME_oneline(xn,buf,sizeof(buf));
|
|
|
|
BIO_write(bio,buf,strlen(buf));
|
|
|
|
BIO_write(bio,"\n",1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_printf(bio,"---\nNo client certificate CA names sent\n");
|
|
|
|
}
|
2002-11-13 15:43:43 +00:00
|
|
|
p=SSL_get_shared_ciphers(s,buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
if (p != NULL)
|
|
|
|
{
|
1999-04-27 16:48:06 +00:00
|
|
|
/* This works only for SSL 2. In later protocol
|
|
|
|
* versions, the client does not know what other
|
|
|
|
* ciphers (in addition to the one to be used
|
|
|
|
* in the current connection) the server supports. */
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"---\nCiphers common between both SSL endpoints:\n");
|
|
|
|
j=i=0;
|
|
|
|
while (*p)
|
|
|
|
{
|
|
|
|
if (*p == ':')
|
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_write(bio,space,15-j%25);
|
1998-12-21 10:52:47 +00:00
|
|
|
i++;
|
|
|
|
j=0;
|
|
|
|
BIO_write(bio,((i%3)?" ":"\n"),1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_write(bio,p,1);
|
|
|
|
j++;
|
|
|
|
}
|
|
|
|
p++;
|
|
|
|
}
|
|
|
|
BIO_write(bio,"\n",1);
|
|
|
|
}
|
|
|
|
|
|
|
|
BIO_printf(bio,"---\nSSL handshake has read %ld bytes and written %ld bytes\n",
|
|
|
|
BIO_number_read(SSL_get_rbio(s)),
|
|
|
|
BIO_number_written(SSL_get_wbio(s)));
|
|
|
|
}
|
|
|
|
BIO_printf(bio,((s->hit)?"---\nReused, ":"---\nNew, "));
|
|
|
|
c=SSL_get_current_cipher(s);
|
|
|
|
BIO_printf(bio,"%s, Cipher is %s\n",
|
|
|
|
SSL_CIPHER_get_version(c),
|
|
|
|
SSL_CIPHER_get_name(c));
|
1999-02-15 21:05:21 +00:00
|
|
|
if (peer != NULL) {
|
|
|
|
EVP_PKEY *pktmp;
|
|
|
|
pktmp = X509_get_pubkey(peer);
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio,"Server public key is %d bit\n",
|
1999-02-15 21:05:21 +00:00
|
|
|
EVP_PKEY_bits(pktmp));
|
|
|
|
EVP_PKEY_free(pktmp);
|
|
|
|
}
|
2005-09-30 23:35:33 +00:00
|
|
|
#ifndef OPENSSL_NO_COMP
|
2003-10-06 12:19:38 +00:00
|
|
|
comp=SSL_get_current_compression(s);
|
2003-11-04 00:51:32 +00:00
|
|
|
expansion=SSL_get_current_expansion(s);
|
2003-10-06 12:19:38 +00:00
|
|
|
BIO_printf(bio,"Compression: %s\n",
|
|
|
|
comp ? SSL_COMP_get_name(comp) : "NONE");
|
|
|
|
BIO_printf(bio,"Expansion: %s\n",
|
2003-11-04 00:51:32 +00:00
|
|
|
expansion ? SSL_COMP_get_name(expansion) : "NONE");
|
2005-09-30 23:35:33 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_SESSION_print(bio,SSL_get_session(s));
|
|
|
|
BIO_printf(bio,"---\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
if (peer != NULL)
|
|
|
|
X509_free(peer);
|
2001-10-16 14:24:46 +00:00
|
|
|
/* flush, or debugging output gets mixed with http response */
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(bio);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2008-09-03 12:29:57 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
|
2007-09-26 21:56:59 +00:00
|
|
|
static int ocsp_resp_cb(SSL *s, void *arg)
|
|
|
|
{
|
|
|
|
const unsigned char *p;
|
|
|
|
int len;
|
|
|
|
OCSP_RESPONSE *rsp;
|
|
|
|
len = SSL_get_tlsext_status_ocsp_resp(s, &p);
|
|
|
|
BIO_puts(arg, "OCSP response: ");
|
|
|
|
if (!p)
|
|
|
|
{
|
|
|
|
BIO_puts(arg, "no response sent\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
rsp = d2i_OCSP_RESPONSE(NULL, &p, len);
|
|
|
|
if (!rsp)
|
|
|
|
{
|
|
|
|
BIO_puts(arg, "response parse error\n");
|
|
|
|
BIO_dump_indent(arg, (char *)p, len, 4);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BIO_puts(arg, "\n======================================\n");
|
|
|
|
OCSP_RESPONSE_print(arg, rsp, 0);
|
|
|
|
BIO_puts(arg, "======================================\n");
|
|
|
|
OCSP_RESPONSE_free(rsp);
|
|
|
|
return 1;
|
|
|
|
}
|
2008-09-03 12:29:57 +00:00
|
|
|
|
|
|
|
#endif
|