1998-12-21 10:52:47 +00:00
|
|
|
/* apps/s_client.c */
|
1998-12-21 10:56:39 +00:00
|
|
|
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
1998-12-21 10:52:47 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* This package is an SSL implementation written
|
|
|
|
* by Eric Young (eay@cryptsoft.com).
|
|
|
|
* The implementation was written so as to conform with Netscapes SSL.
|
|
|
|
*
|
|
|
|
* This library is free for commercial and non-commercial use as long as
|
|
|
|
* the following conditions are aheared to. The following conditions
|
|
|
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
|
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
|
|
* included with this distribution is covered by the same copyright terms
|
|
|
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
|
|
* the code are not to be removed.
|
|
|
|
* If this package is used in a product, Eric Young should be given attribution
|
|
|
|
* as the author of the parts of the library used.
|
|
|
|
* This can be in the form of a textual message at program startup or
|
|
|
|
* in documentation (online or textual) provided with the package.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* "This product includes cryptographic software written by
|
|
|
|
* Eric Young (eay@cryptsoft.com)"
|
|
|
|
* The word 'cryptographic' can be left out if the rouines from the library
|
|
|
|
* being used are not cryptographic related :-).
|
|
|
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
|
|
* the apps directory (application code) you must include an acknowledgement:
|
|
|
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* The licence and distribution terms for any publically available version or
|
|
|
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
|
|
* copied and put under another distribution licence
|
|
|
|
* [including the GNU Public Licence.]
|
|
|
|
*/
|
2001-10-20 17:56:36 +00:00
|
|
|
/* ====================================================================
|
2006-01-02 23:29:12 +00:00
|
|
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
2001-10-20 17:56:36 +00:00
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
*
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in
|
|
|
|
* the documentation and/or other materials provided with the
|
|
|
|
* distribution.
|
|
|
|
*
|
|
|
|
* 3. All advertising materials mentioning features or use of this
|
|
|
|
* software must display the following acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
|
|
* endorse or promote products derived from this software without
|
|
|
|
* prior written permission. For written permission, please contact
|
|
|
|
* openssl-core@openssl.org.
|
|
|
|
*
|
|
|
|
* 5. Products derived from this software may not be called "OpenSSL"
|
|
|
|
* nor may "OpenSSL" appear in their names without prior written
|
|
|
|
* permission of the OpenSSL Project.
|
|
|
|
*
|
|
|
|
* 6. Redistributions of any form whatsoever must retain the following
|
|
|
|
* acknowledgment:
|
|
|
|
* "This product includes software developed by the OpenSSL Project
|
|
|
|
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
|
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
|
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
|
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
|
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
|
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
|
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
* ====================================================================
|
|
|
|
*
|
|
|
|
* This product includes cryptographic software written by Eric Young
|
|
|
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
|
|
* Hudson (tjh@cryptsoft.com).
|
|
|
|
*
|
|
|
|
*/
|
2006-03-10 23:06:27 +00:00
|
|
|
/* ====================================================================
|
|
|
|
* Copyright 2005 Nokia. All rights reserved.
|
|
|
|
*
|
|
|
|
* The portions of the attached software ("Contribution") is developed by
|
|
|
|
* Nokia Corporation and is licensed pursuant to the OpenSSL open source
|
|
|
|
* license.
|
|
|
|
*
|
|
|
|
* The Contribution, originally written by Mika Kousa and Pasi Eronen of
|
|
|
|
* Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
|
|
|
|
* support (see RFC 4279) to OpenSSL.
|
|
|
|
*
|
|
|
|
* No patent licenses or other rights except those expressly stated in
|
|
|
|
* the OpenSSL open source license shall be deemed granted or received
|
|
|
|
* expressly, by implication, estoppel, or otherwise.
|
|
|
|
*
|
|
|
|
* No assurances are provided by Nokia that the Contribution does not
|
|
|
|
* infringe the patent or other intellectual property rights of any third
|
|
|
|
* party or that the license provides you with all the necessary rights
|
|
|
|
* to make use of the Contribution.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
|
|
|
|
* ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
|
|
|
|
* SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
|
|
|
|
* OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
|
|
|
|
* OTHERWISE.
|
|
|
|
*/
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-08-09 13:01:48 +00:00
|
|
|
#include <assert.h>
|
2006-03-10 23:06:27 +00:00
|
|
|
#include <ctype.h>
|
1999-07-28 23:25:59 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
2001-02-20 14:07:03 +00:00
|
|
|
#include <openssl/e_os2.h>
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifdef OPENSSL_NO_STDIO
|
1999-07-28 23:25:59 +00:00
|
|
|
#define APPS_WIN16
|
|
|
|
#endif
|
|
|
|
|
1999-05-13 11:37:32 +00:00
|
|
|
/* With IPv6, it looks like Digital has mixed up the proper order of
|
|
|
|
recursive header file inclusion, resulting in the compiler complaining
|
|
|
|
that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
|
|
|
|
is needed to have fileno() declared correctly... So let's define u_int */
|
2001-02-20 08:13:47 +00:00
|
|
|
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
|
1999-05-13 11:37:32 +00:00
|
|
|
#define __U_INT
|
|
|
|
typedef unsigned int u_int;
|
|
|
|
#endif
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
#define USE_SOCKETS
|
|
|
|
#include "apps.h"
|
1999-04-23 22:13:45 +00:00
|
|
|
#include <openssl/x509.h>
|
|
|
|
#include <openssl/ssl.h>
|
|
|
|
#include <openssl/err.h>
|
|
|
|
#include <openssl/pem.h>
|
2001-09-12 02:39:06 +00:00
|
|
|
#include <openssl/rand.h>
|
2007-09-26 21:56:59 +00:00
|
|
|
#include <openssl/ocsp.h>
|
2008-03-16 21:05:46 +00:00
|
|
|
#include <openssl/bn.h>
|
2011-03-12 17:01:19 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
#include <openssl/srp.h>
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
#include "s_apps.h"
|
2005-04-26 16:02:40 +00:00
|
|
|
#include "timeouts.h"
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2001-02-20 08:13:47 +00:00
|
|
|
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
1999-05-13 13:21:17 +00:00
|
|
|
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
1999-05-13 11:37:32 +00:00
|
|
|
#undef FIONBIO
|
|
|
|
#endif
|
|
|
|
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
#include <fcntl.h>
|
|
|
|
#endif
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
#undef PROG
|
|
|
|
#define PROG s_client_main
|
|
|
|
|
|
|
|
/*#define SSL_HOST_NAME "www.netscape.com" */
|
|
|
|
/*#define SSL_HOST_NAME "193.118.187.102" */
|
|
|
|
#define SSL_HOST_NAME "localhost"
|
|
|
|
|
|
|
|
/*#define TEST_CERT "client.pem" */ /* no default cert. */
|
|
|
|
|
|
|
|
#undef BUFSIZZ
|
|
|
|
#define BUFSIZZ 1024*8
|
|
|
|
|
|
|
|
extern int verify_depth;
|
|
|
|
extern int verify_error;
|
2006-09-17 17:16:28 +00:00
|
|
|
extern int verify_return_error;
|
2012-09-12 23:14:28 +00:00
|
|
|
extern int verify_quiet;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
#ifdef FIONBIO
|
|
|
|
static int c_nbio=0;
|
|
|
|
#endif
|
|
|
|
static int c_Pause=0;
|
|
|
|
static int c_debug=0;
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
static int c_tlsextdebug=0;
|
2007-09-26 21:56:59 +00:00
|
|
|
static int c_status_req=0;
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
2001-10-20 17:56:36 +00:00
|
|
|
static int c_msg=0;
|
1999-03-31 12:06:30 +00:00
|
|
|
static int c_showcerts=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2011-11-15 23:50:52 +00:00
|
|
|
static char *keymatexportlabel=NULL;
|
|
|
|
static int keymatexportlen=20;
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
static void sc_usage(void);
|
|
|
|
static void print_stuff(BIO *berr,SSL *con,int full);
|
2008-09-03 12:29:57 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2007-09-26 21:56:59 +00:00
|
|
|
static int ocsp_resp_cb(SSL *s, void *arg);
|
2008-09-03 12:29:57 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
static BIO *bio_c_out=NULL;
|
2012-06-15 12:46:09 +00:00
|
|
|
static BIO *bio_c_msg=NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
static int c_quiet=0;
|
2000-03-10 12:18:28 +00:00
|
|
|
static int c_ign_eof=0;
|
2012-09-12 23:14:28 +00:00
|
|
|
static int c_brief=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
/* Default PSK identity and key */
|
|
|
|
static char *psk_identity="Client_identity";
|
2008-11-16 12:47:12 +00:00
|
|
|
/*char *psk_key=NULL; by default PSK is not used */
|
2006-03-10 23:06:27 +00:00
|
|
|
|
|
|
|
static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
|
|
|
|
unsigned int max_identity_len, unsigned char *psk,
|
|
|
|
unsigned int max_psk_len)
|
|
|
|
{
|
|
|
|
unsigned int psk_len = 0;
|
|
|
|
int ret;
|
|
|
|
BIGNUM *bn=NULL;
|
|
|
|
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "psk_client_cb\n");
|
|
|
|
if (!hint)
|
|
|
|
{
|
|
|
|
/* no ServerKeyExchange message*/
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n");
|
|
|
|
}
|
|
|
|
else if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint);
|
|
|
|
|
|
|
|
/* lookup PSK identity and PSK key based on the given identity hint here */
|
2009-02-15 15:29:59 +00:00
|
|
|
ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity);
|
2006-03-11 12:18:11 +00:00
|
|
|
if (ret < 0 || (unsigned int)ret > max_identity_len)
|
2006-03-10 23:06:27 +00:00
|
|
|
goto out_err;
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, ret);
|
|
|
|
ret=BN_hex2bn(&bn, psk_key);
|
|
|
|
if (!ret)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
|
|
|
|
if (bn)
|
|
|
|
BN_free(bn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-03-11 12:18:11 +00:00
|
|
|
if ((unsigned int)BN_num_bytes(bn) > max_psk_len)
|
2006-03-10 23:06:27 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
|
|
|
|
max_psk_len, BN_num_bytes(bn));
|
|
|
|
BN_free(bn);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
psk_len=BN_bn2bin(bn, psk);
|
|
|
|
BN_free(bn);
|
|
|
|
if (psk_len == 0)
|
|
|
|
goto out_err;
|
|
|
|
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len);
|
|
|
|
|
|
|
|
return psk_len;
|
|
|
|
out_err:
|
|
|
|
if (c_debug)
|
|
|
|
BIO_printf(bio_err, "Error in PSK client callback\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
static void sc_usage(void)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-01-28 14:44:08 +00:00
|
|
|
BIO_printf(bio_err,"usage: s_client args\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err,"\n");
|
|
|
|
BIO_printf(bio_err," -host host - use -connect instead\n");
|
|
|
|
BIO_printf(bio_err," -port port - use -connect instead\n");
|
s_client/s_server: support unix domain sockets
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-04-26 05:22:54 +00:00
|
|
|
BIO_printf(bio_err," -connect host:port - connect over TCP/IP (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
|
|
|
|
BIO_printf(bio_err," -unix path - connect over unix domain sockets\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
|
|
|
|
BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
|
2004-11-16 17:30:59 +00:00
|
|
|
BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
|
|
|
|
BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," not specified but cert file is.\n");
|
2004-11-16 17:30:59 +00:00
|
|
|
BIO_printf(bio_err," -keyform arg - key format (PEM or DER) PEM default\n");
|
|
|
|
BIO_printf(bio_err," -pass arg - private key file pass phrase source\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -CApath arg - PEM format directory of CA's\n");
|
|
|
|
BIO_printf(bio_err," -CAfile arg - PEM format file of CA's\n");
|
2014-06-18 17:55:03 +00:00
|
|
|
BIO_printf(bio_err," -trusted_first - Use local CA's first when building trust chain\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -reconnect - Drop and re-make the connection with the same Session-ID\n");
|
|
|
|
BIO_printf(bio_err," -pause - sleep(1) after each read(2) and write(2) system call\n");
|
1999-03-31 12:06:30 +00:00
|
|
|
BIO_printf(bio_err," -showcerts - show all certificates in the chain\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -debug - extra output\n");
|
2005-01-04 10:28:38 +00:00
|
|
|
#ifdef WATT32
|
|
|
|
BIO_printf(bio_err," -wdebug - WATT-32 tcp debugging\n");
|
|
|
|
#endif
|
2001-10-20 17:56:36 +00:00
|
|
|
BIO_printf(bio_err," -msg - Show protocol messages\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -nbio_test - more ssl protocol testing\n");
|
|
|
|
BIO_printf(bio_err," -state - print the 'ssl' states\n");
|
|
|
|
#ifdef FIONBIO
|
|
|
|
BIO_printf(bio_err," -nbio - Run with non-blocking IO\n");
|
1999-08-07 02:51:10 +00:00
|
|
|
#endif
|
|
|
|
BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -quiet - no s_client output\n");
|
2000-03-10 12:18:28 +00:00
|
|
|
BIO_printf(bio_err," -ign_eof - ignore input eof (default when -quiet)\n");
|
2008-10-22 06:46:14 +00:00
|
|
|
BIO_printf(bio_err," -no_ign_eof - don't ignore input eof\n");
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
BIO_printf(bio_err," -psk_identity arg - PSK identity\n");
|
|
|
|
BIO_printf(bio_err," -psk arg - PSK in hex (without 0x)\n");
|
2008-11-24 17:27:08 +00:00
|
|
|
# ifndef OPENSSL_NO_JPAKE
|
2008-11-16 12:47:12 +00:00
|
|
|
BIO_printf(bio_err," -jpake arg - JPAKE secret to use\n");
|
|
|
|
# endif
|
2011-03-12 17:01:19 +00:00
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
BIO_printf(bio_err," -srpuser user - SRP authentification for 'user'\n");
|
|
|
|
BIO_printf(bio_err," -srppass arg - password for 'user'\n");
|
|
|
|
BIO_printf(bio_err," -srp_lateuser - SRP username into second ClientHello message\n");
|
|
|
|
BIO_printf(bio_err," -srp_moregroups - Tolerate other than the known g N values.\n");
|
|
|
|
BIO_printf(bio_err," -srp_strength int - minimal mength in bits for N (default %d).\n",SRP_MINIMAL_N);
|
2006-03-10 23:06:27 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -ssl2 - just use SSLv2\n");
|
|
|
|
BIO_printf(bio_err," -ssl3 - just use SSLv3\n");
|
2011-04-29 22:56:51 +00:00
|
|
|
BIO_printf(bio_err," -tls1_2 - just use TLSv1.2\n");
|
2009-12-07 13:31:02 +00:00
|
|
|
BIO_printf(bio_err," -tls1_1 - just use TLSv1.1\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio_err," -tls1 - just use TLSv1\n");
|
2005-04-26 16:02:40 +00:00
|
|
|
BIO_printf(bio_err," -dtls1 - just use DTLSv1\n");
|
2009-05-17 16:04:58 +00:00
|
|
|
BIO_printf(bio_err," -mtu - set the link layer MTU\n");
|
2011-04-29 22:56:51 +00:00
|
|
|
BIO_printf(bio_err," -no_tls1_2/-no_tls1_1/-no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio_err," -bugs - Switch on all SSL implementation bug workarounds\n");
|
2001-02-09 19:56:31 +00:00
|
|
|
BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
|
2000-02-03 23:23:24 +00:00
|
|
|
BIO_printf(bio_err," -cipher - preferred cipher to use, use the 'openssl ciphers'\n");
|
1998-12-21 11:00:56 +00:00
|
|
|
BIO_printf(bio_err," command to see what is available\n");
|
2001-11-14 13:57:52 +00:00
|
|
|
BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
|
|
|
|
BIO_printf(bio_err," for those protocols that support it, where\n");
|
|
|
|
BIO_printf(bio_err," 'prot' defines which one to assume. Currently,\n");
|
2008-10-14 19:11:26 +00:00
|
|
|
BIO_printf(bio_err," only \"smtp\", \"pop3\", \"imap\", \"ftp\" and \"xmpp\"\n");
|
|
|
|
BIO_printf(bio_err," are supported.\n");
|
2012-08-06 00:24:51 +00:00
|
|
|
BIO_printf(bio_err," -xmpphost host - When used with \"-starttls xmpp\" specifies the virtual host.\n");
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2000-10-26 21:07:28 +00:00
|
|
|
BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2001-02-15 10:22:07 +00:00
|
|
|
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
2007-08-23 12:20:36 +00:00
|
|
|
BIO_printf(bio_err," -sess_out arg - file to write SSL session to\n");
|
|
|
|
BIO_printf(bio_err," -sess_in arg - file to read SSL session from\n");
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
BIO_printf(bio_err," -servername host - Set TLS extension servername in ClientHello\n");
|
2007-08-23 11:34:48 +00:00
|
|
|
BIO_printf(bio_err," -tlsextdebug - hex dump of all TLS extensions received\n");
|
2007-09-26 21:56:59 +00:00
|
|
|
BIO_printf(bio_err," -status - request certificate status from server\n");
|
2007-08-23 11:34:48 +00:00
|
|
|
BIO_printf(bio_err," -no_ticket - disable use of RFC4507bis session tickets\n");
|
2013-06-18 21:34:38 +00:00
|
|
|
BIO_printf(bio_err," -serverinfo types - send empty ClientHello extensions (comma-separated numbers)\n");
|
2010-09-05 17:14:01 +00:00
|
|
|
# ifndef OPENSSL_NO_NEXTPROTONEG
|
2010-07-28 10:06:55 +00:00
|
|
|
BIO_printf(bio_err," -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n");
|
|
|
|
# endif
|
2013-11-13 23:20:22 +00:00
|
|
|
BIO_printf(bio_err," -alpn arg - enable ALPN extension, considering named protocols supported (comma-separated list)\n");
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
2009-11-11 14:10:24 +00:00
|
|
|
BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
|
2012-02-11 23:20:53 +00:00
|
|
|
BIO_printf(bio_err," -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n");
|
2011-11-15 23:50:52 +00:00
|
|
|
BIO_printf(bio_err," -keymatexport label - Export keying material using label\n");
|
|
|
|
BIO_printf(bio_err," -keymatexportlen len - Export len bytes of keying material (default 20)\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
|
|
|
|
/* This is a context that we pass to callbacks */
|
|
|
|
typedef struct tlsextctx_st {
|
|
|
|
BIO * biodebug;
|
|
|
|
int ack;
|
|
|
|
} tlsextctx;
|
|
|
|
|
|
|
|
|
2006-01-02 23:29:12 +00:00
|
|
|
static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
|
|
|
|
{
|
2006-01-02 23:14:37 +00:00
|
|
|
tlsextctx * p = (tlsextctx *) arg;
|
2006-01-04 12:02:43 +00:00
|
|
|
const char * hn= SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
|
2006-01-02 23:14:37 +00:00
|
|
|
if (SSL_get_servername_type(s) != -1)
|
|
|
|
p->ack = !SSL_session_reused(s) && hn != NULL;
|
|
|
|
else
|
2006-01-03 03:27:19 +00:00
|
|
|
BIO_printf(bio_err,"Can't use SSL_get_servername\n");
|
2006-01-02 23:14:37 +00:00
|
|
|
|
2006-01-11 06:10:40 +00:00
|
|
|
return SSL_TLSEXT_ERR_OK;
|
2006-01-02 23:29:12 +00:00
|
|
|
}
|
2010-07-28 10:06:55 +00:00
|
|
|
|
2011-03-12 17:01:19 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
|
|
|
|
/* This is a context that we pass to all callbacks */
|
|
|
|
typedef struct srp_arg_st
|
|
|
|
{
|
|
|
|
char *srppassin;
|
|
|
|
char *srplogin;
|
|
|
|
int msg; /* copy from c_msg */
|
|
|
|
int debug; /* copy from c_debug */
|
|
|
|
int amp; /* allow more groups */
|
|
|
|
int strength /* minimal size for N */ ;
|
|
|
|
} SRP_ARG;
|
|
|
|
|
|
|
|
#define SRP_NUMBER_ITERATIONS_FOR_PRIME 64
|
|
|
|
|
2011-12-14 22:17:06 +00:00
|
|
|
static int srp_Verify_N_and_g(const BIGNUM *N, const BIGNUM *g)
|
2011-03-12 17:01:19 +00:00
|
|
|
{
|
|
|
|
BN_CTX *bn_ctx = BN_CTX_new();
|
|
|
|
BIGNUM *p = BN_new();
|
|
|
|
BIGNUM *r = BN_new();
|
|
|
|
int ret =
|
|
|
|
g != NULL && N != NULL && bn_ctx != NULL && BN_is_odd(N) &&
|
2011-12-14 22:17:06 +00:00
|
|
|
BN_is_prime_ex(N, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
|
2011-03-12 17:01:19 +00:00
|
|
|
p != NULL && BN_rshift1(p, N) &&
|
|
|
|
|
|
|
|
/* p = (N-1)/2 */
|
2011-12-14 22:17:06 +00:00
|
|
|
BN_is_prime_ex(p, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
|
2011-03-12 17:01:19 +00:00
|
|
|
r != NULL &&
|
|
|
|
|
|
|
|
/* verify g^((N-1)/2) == -1 (mod N) */
|
|
|
|
BN_mod_exp(r, g, p, N, bn_ctx) &&
|
|
|
|
BN_add_word(r, 1) &&
|
|
|
|
BN_cmp(r, N) == 0;
|
|
|
|
|
|
|
|
if(r)
|
|
|
|
BN_free(r);
|
|
|
|
if(p)
|
|
|
|
BN_free(p);
|
|
|
|
if(bn_ctx)
|
|
|
|
BN_CTX_free(bn_ctx);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-12-14 22:17:06 +00:00
|
|
|
/* This callback is used here for two purposes:
|
|
|
|
- extended debugging
|
|
|
|
- making some primality tests for unknown groups
|
|
|
|
The callback is only called for a non default group.
|
|
|
|
|
|
|
|
An application does not need the call back at all if
|
|
|
|
only the stanard groups are used. In real life situations,
|
|
|
|
client and server already share well known groups,
|
|
|
|
thus there is no need to verify them.
|
|
|
|
Furthermore, in case that a server actually proposes a group that
|
|
|
|
is not one of those defined in RFC 5054, it is more appropriate
|
|
|
|
to add the group to a static list and then compare since
|
|
|
|
primality tests are rather cpu consuming.
|
|
|
|
*/
|
|
|
|
|
2011-03-12 17:01:19 +00:00
|
|
|
static int MS_CALLBACK ssl_srp_verify_param_cb(SSL *s, void *arg)
|
|
|
|
{
|
|
|
|
SRP_ARG *srp_arg = (SRP_ARG *)arg;
|
|
|
|
BIGNUM *N = NULL, *g = NULL;
|
|
|
|
if (!(N = SSL_get_srp_N(s)) || !(g = SSL_get_srp_g(s)))
|
|
|
|
return 0;
|
|
|
|
if (srp_arg->debug || srp_arg->msg || srp_arg->amp == 1)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "SRP parameters:\n");
|
|
|
|
BIO_printf(bio_err,"\tN="); BN_print(bio_err,N);
|
|
|
|
BIO_printf(bio_err,"\n\tg="); BN_print(bio_err,g);
|
|
|
|
BIO_printf(bio_err,"\n");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (SRP_check_known_gN_param(g,N))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
if (srp_arg->amp == 1)
|
|
|
|
{
|
|
|
|
if (srp_arg->debug)
|
|
|
|
BIO_printf(bio_err, "SRP param N and g are not known params, going to check deeper.\n");
|
|
|
|
|
2011-12-14 22:17:06 +00:00
|
|
|
/* The srp_moregroups is a real debugging feature.
|
2011-03-12 17:01:19 +00:00
|
|
|
Implementors should rather add the value to the known ones.
|
|
|
|
The minimal size has already been tested.
|
|
|
|
*/
|
2011-12-14 22:17:06 +00:00
|
|
|
if (BN_num_bits(g) <= BN_BITS && srp_Verify_N_and_g(N,g))
|
2011-03-12 17:01:19 +00:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
BIO_printf(bio_err, "SRP param N and g rejected.\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define PWD_STRLEN 1024
|
|
|
|
|
|
|
|
static char * MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
|
|
|
|
{
|
|
|
|
SRP_ARG *srp_arg = (SRP_ARG *)arg;
|
|
|
|
char *pass = (char *)OPENSSL_malloc(PWD_STRLEN+1);
|
|
|
|
PW_CB_DATA cb_tmp;
|
|
|
|
int l;
|
|
|
|
|
|
|
|
cb_tmp.password = (char *)srp_arg->srppassin;
|
|
|
|
cb_tmp.prompt_info = "SRP user";
|
|
|
|
if ((l = password_callback(pass, PWD_STRLEN, 0, &cb_tmp))<0)
|
|
|
|
{
|
|
|
|
BIO_printf (bio_err, "Can't read Password\n");
|
|
|
|
OPENSSL_free(pass);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
*(pass+l)= '\0';
|
|
|
|
|
|
|
|
return pass;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
2011-11-15 22:59:20 +00:00
|
|
|
char *srtp_profiles = NULL;
|
2011-03-12 17:01:19 +00:00
|
|
|
|
2010-09-05 17:14:01 +00:00
|
|
|
# ifndef OPENSSL_NO_NEXTPROTONEG
|
2010-07-28 10:06:55 +00:00
|
|
|
/* This the context that we pass to next_proto_cb */
|
|
|
|
typedef struct tlsextnextprotoctx_st {
|
|
|
|
unsigned char *data;
|
|
|
|
unsigned short len;
|
|
|
|
int status;
|
|
|
|
} tlsextnextprotoctx;
|
|
|
|
|
|
|
|
static tlsextnextprotoctx next_proto;
|
|
|
|
|
|
|
|
static int next_proto_cb(SSL *s, unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg)
|
|
|
|
{
|
|
|
|
tlsextnextprotoctx *ctx = arg;
|
|
|
|
|
|
|
|
if (!c_quiet)
|
|
|
|
{
|
|
|
|
/* We can assume that |in| is syntactically valid. */
|
|
|
|
unsigned i;
|
|
|
|
BIO_printf(bio_c_out, "Protocols advertised by server: ");
|
|
|
|
for (i = 0; i < inlen; )
|
|
|
|
{
|
|
|
|
if (i)
|
|
|
|
BIO_write(bio_c_out, ", ", 2);
|
|
|
|
BIO_write(bio_c_out, &in[i + 1], in[i]);
|
|
|
|
i += in[i] + 1;
|
|
|
|
}
|
|
|
|
BIO_write(bio_c_out, "\n", 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
ctx->status = SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len);
|
|
|
|
return SSL_TLSEXT_ERR_OK;
|
|
|
|
}
|
2010-09-05 17:14:01 +00:00
|
|
|
# endif /* ndef OPENSSL_NO_NEXTPROTONEG */
|
2013-05-13 01:55:27 +00:00
|
|
|
|
|
|
|
static int serverinfo_cli_cb(SSL* s, unsigned short ext_type,
|
|
|
|
const unsigned char* in, unsigned short inlen,
|
|
|
|
int* al, void* arg)
|
|
|
|
{
|
|
|
|
char pem_name[100];
|
|
|
|
unsigned char ext_buf[4 + 65536];
|
|
|
|
|
|
|
|
/* Reconstruct the type/len fields prior to extension data */
|
|
|
|
ext_buf[0] = ext_type >> 8;
|
|
|
|
ext_buf[1] = ext_type & 0xFF;
|
|
|
|
ext_buf[2] = inlen >> 8;
|
|
|
|
ext_buf[3] = inlen & 0xFF;
|
|
|
|
memcpy(ext_buf+4, in, inlen);
|
|
|
|
|
2013-09-25 12:55:06 +00:00
|
|
|
BIO_snprintf(pem_name, sizeof(pem_name), "SERVERINFO FOR EXTENSION %d",
|
|
|
|
ext_type);
|
2013-05-13 01:55:27 +00:00
|
|
|
PEM_write_bio(bio_c_out, pem_name, "", ext_buf, 4 + inlen);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
|
|
|
|
2007-02-16 18:12:16 +00:00
|
|
|
enum
|
|
|
|
{
|
|
|
|
PROTO_OFF = 0,
|
|
|
|
PROTO_SMTP,
|
|
|
|
PROTO_POP3,
|
|
|
|
PROTO_IMAP,
|
2008-10-14 19:11:26 +00:00
|
|
|
PROTO_FTP,
|
2008-10-19 17:22:34 +00:00
|
|
|
PROTO_XMPP
|
2007-02-16 18:12:16 +00:00
|
|
|
};
|
|
|
|
|
2000-02-11 09:47:18 +00:00
|
|
|
int MAIN(int, char **);
|
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
int MAIN(int argc, char **argv)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
2012-07-23 23:34:28 +00:00
|
|
|
int build_chain = 0;
|
2006-03-15 17:45:43 +00:00
|
|
|
SSL *con=NULL;
|
2011-05-11 22:50:18 +00:00
|
|
|
#ifndef OPENSSL_NO_KRB5
|
|
|
|
KSSL_CTX *kctx;
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
int s,k,width,state=0;
|
2001-11-14 13:57:52 +00:00
|
|
|
char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
int cbuf_len,cbuf_off;
|
|
|
|
int sbuf_len,sbuf_off;
|
|
|
|
fd_set readfds,writefds;
|
|
|
|
short port=PORT;
|
|
|
|
int full_log=1;
|
|
|
|
char *host=SSL_HOST_NAME;
|
s_client/s_server: support unix domain sockets
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-04-26 05:22:54 +00:00
|
|
|
const char *unix_path = NULL;
|
2012-08-06 00:24:51 +00:00
|
|
|
char *xmpphost = NULL;
|
2012-12-12 00:50:26 +00:00
|
|
|
char *cert_file=NULL,*key_file=NULL,*chain_file=NULL;
|
2004-11-16 17:30:59 +00:00
|
|
|
int cert_format = FORMAT_PEM, key_format = FORMAT_PEM;
|
|
|
|
char *passarg = NULL, *pass = NULL;
|
|
|
|
X509 *cert = NULL;
|
|
|
|
EVP_PKEY *key = NULL;
|
2012-12-12 00:50:26 +00:00
|
|
|
STACK_OF(X509) *chain = NULL;
|
2012-11-17 14:42:22 +00:00
|
|
|
char *CApath=NULL,*CAfile=NULL;
|
2012-11-23 18:56:25 +00:00
|
|
|
char *chCApath=NULL,*chCAfile=NULL;
|
|
|
|
char *vfyCApath=NULL,*vfyCAfile=NULL;
|
2012-11-17 14:42:22 +00:00
|
|
|
int reconnect=0,badop=0,verify=SSL_VERIFY_NONE;
|
1999-08-07 02:51:10 +00:00
|
|
|
int crlf=0;
|
1999-04-09 20:54:25 +00:00
|
|
|
int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_CTX *ctx=NULL;
|
|
|
|
int ret=1,in_init=1,i,nbio_test=0;
|
2007-02-16 18:12:16 +00:00
|
|
|
int starttls_proto = PROTO_OFF;
|
2009-06-30 15:56:35 +00:00
|
|
|
int prexit = 0;
|
|
|
|
X509_VERIFY_PARAM *vpm = NULL;
|
|
|
|
int badarg = 0;
|
2005-08-14 21:48:33 +00:00
|
|
|
const SSL_METHOD *meth=NULL;
|
2006-01-02 23:29:12 +00:00
|
|
|
int socket_type=SOCK_STREAM;
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO *sbio;
|
2001-02-15 10:22:07 +00:00
|
|
|
char *inrand=NULL;
|
2007-02-16 18:12:16 +00:00
|
|
|
int mbuf_len=0;
|
2009-08-12 13:19:54 +00:00
|
|
|
struct timeval timeout, *timeoutp;
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2000-10-26 21:07:28 +00:00
|
|
|
char *engine_id=NULL;
|
2008-06-03 11:26:27 +00:00
|
|
|
char *ssl_client_engine_id=NULL;
|
2008-12-20 17:04:40 +00:00
|
|
|
ENGINE *ssl_client_engine=NULL;
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2008-12-20 17:04:40 +00:00
|
|
|
ENGINE *e=NULL;
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
1999-09-20 22:09:17 +00:00
|
|
|
struct timeval tv;
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
int stdin_set = 0;
|
|
|
|
#endif
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
char *servername = NULL;
|
|
|
|
tlsextctx tlsextcbp =
|
|
|
|
{NULL,0};
|
2010-09-05 17:14:01 +00:00
|
|
|
# ifndef OPENSSL_NO_NEXTPROTONEG
|
2010-07-28 10:06:55 +00:00
|
|
|
const char *next_proto_neg_in = NULL;
|
|
|
|
# endif
|
2013-11-13 23:20:22 +00:00
|
|
|
const char *alpn_in = NULL;
|
2013-05-13 01:55:27 +00:00
|
|
|
# define MAX_SI_TYPES 100
|
|
|
|
unsigned short serverinfo_types[MAX_SI_TYPES];
|
|
|
|
int serverinfo_types_count = 0;
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
2007-08-11 23:18:29 +00:00
|
|
|
char *sess_in = NULL;
|
|
|
|
char *sess_out = NULL;
|
2005-04-26 16:02:40 +00:00
|
|
|
struct sockaddr peer;
|
2005-04-27 16:27:14 +00:00
|
|
|
int peerlen = sizeof(peer);
|
2005-04-26 16:02:40 +00:00
|
|
|
int enable_timeouts = 0 ;
|
2006-01-02 23:29:12 +00:00
|
|
|
long socket_mtu = 0;
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
2012-12-29 23:38:20 +00:00
|
|
|
static char *jpake_secret = NULL;
|
|
|
|
#define no_jpake !jpake_secret
|
|
|
|
#else
|
|
|
|
#define no_jpake 1
|
2008-11-12 17:28:18 +00:00
|
|
|
#endif
|
2011-03-12 17:01:19 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
char * srppass = NULL;
|
|
|
|
int srp_lateuser = 0;
|
|
|
|
SRP_ARG srp_arg = {NULL,NULL,0,0,0,1024};
|
|
|
|
#endif
|
2012-07-03 14:53:27 +00:00
|
|
|
SSL_EXCERT *exc = NULL;
|
2005-04-26 16:02:40 +00:00
|
|
|
|
2012-11-17 14:42:22 +00:00
|
|
|
SSL_CONF_CTX *cctx = NULL;
|
|
|
|
STACK_OF(OPENSSL_STRING) *ssl_args = NULL;
|
2012-10-08 15:10:07 +00:00
|
|
|
|
2012-12-02 16:16:28 +00:00
|
|
|
char *crl_file = NULL;
|
|
|
|
int crl_format = FORMAT_PEM;
|
2012-12-06 18:43:40 +00:00
|
|
|
int crl_download = 0;
|
2012-12-02 16:16:28 +00:00
|
|
|
STACK_OF(X509_CRL) *crls = NULL;
|
2014-02-17 00:10:00 +00:00
|
|
|
int sdebug = 0;
|
2012-12-02 16:16:28 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
meth=SSLv23_client_method();
|
|
|
|
|
|
|
|
apps_startup();
|
1998-12-21 10:56:39 +00:00
|
|
|
c_Pause=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
c_quiet=0;
|
2000-03-10 12:18:28 +00:00
|
|
|
c_ign_eof=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
c_debug=0;
|
2001-10-20 17:56:36 +00:00
|
|
|
c_msg=0;
|
1999-03-31 12:06:30 +00:00
|
|
|
c_showcerts=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (bio_err == NULL)
|
|
|
|
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
|
|
|
|
2002-02-22 14:01:21 +00:00
|
|
|
if (!load_config(bio_err, NULL))
|
|
|
|
goto end;
|
2012-11-17 14:42:22 +00:00
|
|
|
cctx = SSL_CONF_CTX_new();
|
|
|
|
if (!cctx)
|
|
|
|
goto end;
|
|
|
|
SSL_CONF_CTX_set_flags(cctx, SSL_CONF_FLAG_CLIENT);
|
|
|
|
SSL_CONF_CTX_set_flags(cctx, SSL_CONF_FLAG_CMDLINE);
|
2002-02-22 14:01:21 +00:00
|
|
|
|
2000-06-01 22:19:21 +00:00
|
|
|
if ( ((cbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
|
2001-11-14 13:57:52 +00:00
|
|
|
((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
|
|
|
|
((mbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"out of memory\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
verify_depth=0;
|
|
|
|
verify_error=X509_V_OK;
|
|
|
|
#ifdef FIONBIO
|
|
|
|
c_nbio=0;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
while (argc >= 1)
|
|
|
|
{
|
|
|
|
if (strcmp(*argv,"-host") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
host= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-port") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
port=atoi(*(++argv));
|
|
|
|
if (port == 0) goto bad;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-connect") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
if (!extract_host_port(*(++argv),&host,NULL,&port))
|
|
|
|
goto bad;
|
|
|
|
}
|
s_client/s_server: support unix domain sockets
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-04-26 05:22:54 +00:00
|
|
|
else if (strcmp(*argv,"-unix") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
unix_path = *(++argv);
|
|
|
|
}
|
2012-08-06 00:24:51 +00:00
|
|
|
else if (strcmp(*argv,"-xmpphost") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
xmpphost= *(++argv);
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-verify") == 0)
|
|
|
|
{
|
|
|
|
verify=SSL_VERIFY_PEER;
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
verify_depth=atoi(*(++argv));
|
2012-09-12 23:14:28 +00:00
|
|
|
if (!c_quiet)
|
|
|
|
BIO_printf(bio_err,"verify depth is %d\n",verify_depth);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-cert") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
cert_file= *(++argv);
|
|
|
|
}
|
2012-12-02 16:16:28 +00:00
|
|
|
else if (strcmp(*argv,"-CRL") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
crl_file= *(++argv);
|
|
|
|
}
|
2012-12-06 18:43:40 +00:00
|
|
|
else if (strcmp(*argv,"-crl_download") == 0)
|
|
|
|
crl_download = 1;
|
2007-08-11 23:18:29 +00:00
|
|
|
else if (strcmp(*argv,"-sess_out") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
sess_out = *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-sess_in") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
sess_in = *(++argv);
|
|
|
|
}
|
2004-11-16 17:30:59 +00:00
|
|
|
else if (strcmp(*argv,"-certform") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
cert_format = str2fmt(*(++argv));
|
|
|
|
}
|
2012-12-02 16:16:28 +00:00
|
|
|
else if (strcmp(*argv,"-CRLform") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
crl_format = str2fmt(*(++argv));
|
|
|
|
}
|
2009-06-30 15:56:35 +00:00
|
|
|
else if (args_verify(&argv, &argc, &badarg, bio_err, &vpm))
|
|
|
|
{
|
|
|
|
if (badarg)
|
|
|
|
goto bad;
|
|
|
|
continue;
|
|
|
|
}
|
2006-09-17 17:16:28 +00:00
|
|
|
else if (strcmp(*argv,"-verify_return_error") == 0)
|
|
|
|
verify_return_error = 1;
|
2012-09-12 23:14:28 +00:00
|
|
|
else if (strcmp(*argv,"-verify_quiet") == 0)
|
|
|
|
verify_quiet = 1;
|
|
|
|
else if (strcmp(*argv,"-brief") == 0)
|
|
|
|
{
|
|
|
|
c_brief = 1;
|
|
|
|
verify_quiet = 1;
|
|
|
|
c_quiet = 1;
|
|
|
|
}
|
2012-07-03 14:53:27 +00:00
|
|
|
else if (args_excert(&argv, &argc, &badarg, bio_err, &exc))
|
|
|
|
{
|
|
|
|
if (badarg)
|
|
|
|
goto bad;
|
|
|
|
continue;
|
|
|
|
}
|
2012-11-17 14:42:22 +00:00
|
|
|
else if (args_ssl(&argv, &argc, cctx, &badarg, bio_err, &ssl_args))
|
|
|
|
{
|
|
|
|
if (badarg)
|
|
|
|
goto bad;
|
|
|
|
continue;
|
|
|
|
}
|
2000-01-08 19:05:47 +00:00
|
|
|
else if (strcmp(*argv,"-prexit") == 0)
|
|
|
|
prexit=1;
|
1999-08-07 02:51:10 +00:00
|
|
|
else if (strcmp(*argv,"-crlf") == 0)
|
|
|
|
crlf=1;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-quiet") == 0)
|
2000-03-10 12:18:28 +00:00
|
|
|
{
|
1998-12-21 10:52:47 +00:00
|
|
|
c_quiet=1;
|
2000-03-10 12:18:28 +00:00
|
|
|
c_ign_eof=1;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-ign_eof") == 0)
|
|
|
|
c_ign_eof=1;
|
2008-10-22 06:46:14 +00:00
|
|
|
else if (strcmp(*argv,"-no_ign_eof") == 0)
|
|
|
|
c_ign_eof=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-pause") == 0)
|
|
|
|
c_Pause=1;
|
|
|
|
else if (strcmp(*argv,"-debug") == 0)
|
|
|
|
c_debug=1;
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
else if (strcmp(*argv,"-tlsextdebug") == 0)
|
|
|
|
c_tlsextdebug=1;
|
2007-09-26 21:56:59 +00:00
|
|
|
else if (strcmp(*argv,"-status") == 0)
|
|
|
|
c_status_req=1;
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
2005-01-04 10:28:38 +00:00
|
|
|
#ifdef WATT32
|
|
|
|
else if (strcmp(*argv,"-wdebug") == 0)
|
|
|
|
dbug_init();
|
|
|
|
#endif
|
2001-10-20 17:56:36 +00:00
|
|
|
else if (strcmp(*argv,"-msg") == 0)
|
|
|
|
c_msg=1;
|
2012-06-15 12:46:09 +00:00
|
|
|
else if (strcmp(*argv,"-msgfile") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
bio_c_msg = BIO_new_file(*(++argv), "w");
|
|
|
|
}
|
|
|
|
#ifndef OPENSSL_NO_SSL_TRACE
|
|
|
|
else if (strcmp(*argv,"-trace") == 0)
|
|
|
|
c_msg=2;
|
|
|
|
#endif
|
2014-02-17 00:10:00 +00:00
|
|
|
else if (strcmp(*argv,"-security_debug") == 0)
|
|
|
|
{ sdebug=1; }
|
|
|
|
else if (strcmp(*argv,"-security_debug_verbose") == 0)
|
|
|
|
{ sdebug=2; }
|
1999-03-31 12:06:30 +00:00
|
|
|
else if (strcmp(*argv,"-showcerts") == 0)
|
|
|
|
c_showcerts=1;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-nbio_test") == 0)
|
|
|
|
nbio_test=1;
|
|
|
|
else if (strcmp(*argv,"-state") == 0)
|
|
|
|
state=1;
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
|
|
|
else if (strcmp(*argv,"-psk_identity") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
psk_identity=*(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-psk") == 0)
|
|
|
|
{
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
psk_key=*(++argv);
|
|
|
|
for (j = 0; j < strlen(psk_key); j++)
|
|
|
|
{
|
2012-01-12 16:21:35 +00:00
|
|
|
if (isxdigit((unsigned char)psk_key[j]))
|
2006-03-10 23:06:27 +00:00
|
|
|
continue;
|
|
|
|
BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
|
|
|
|
goto bad;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2011-03-12 17:01:19 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
else if (strcmp(*argv,"-srpuser") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
srp_arg.srplogin= *(++argv);
|
|
|
|
meth=TLSv1_client_method();
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-srppass") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
srppass= *(++argv);
|
|
|
|
meth=TLSv1_client_method();
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-srp_strength") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
srp_arg.strength=atoi(*(++argv));
|
|
|
|
BIO_printf(bio_err,"SRP minimal length for N is %d\n",srp_arg.strength);
|
|
|
|
meth=TLSv1_client_method();
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-srp_lateuser") == 0)
|
|
|
|
{
|
|
|
|
srp_lateuser= 1;
|
|
|
|
meth=TLSv1_client_method();
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-srp_moregroups") == 0)
|
|
|
|
{
|
|
|
|
srp_arg.amp=1;
|
|
|
|
meth=TLSv1_client_method();
|
|
|
|
}
|
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_SSL2
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-ssl2") == 0)
|
|
|
|
meth=SSLv2_client_method();
|
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_SSL3
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-ssl3") == 0)
|
|
|
|
meth=SSLv3_client_method();
|
1998-12-21 10:56:39 +00:00
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_TLS1
|
2011-04-29 22:56:51 +00:00
|
|
|
else if (strcmp(*argv,"-tls1_2") == 0)
|
|
|
|
meth=TLSv1_2_client_method();
|
2009-12-07 13:31:02 +00:00
|
|
|
else if (strcmp(*argv,"-tls1_1") == 0)
|
|
|
|
meth=TLSv1_1_client_method();
|
1998-12-21 10:56:39 +00:00
|
|
|
else if (strcmp(*argv,"-tls1") == 0)
|
|
|
|
meth=TLSv1_client_method();
|
2005-04-26 16:02:40 +00:00
|
|
|
#endif
|
|
|
|
#ifndef OPENSSL_NO_DTLS1
|
2013-04-06 14:50:12 +00:00
|
|
|
else if (strcmp(*argv,"-dtls") == 0)
|
|
|
|
{
|
|
|
|
meth=DTLS_client_method();
|
|
|
|
socket_type=SOCK_DGRAM;
|
|
|
|
}
|
2005-04-26 16:02:40 +00:00
|
|
|
else if (strcmp(*argv,"-dtls1") == 0)
|
|
|
|
{
|
|
|
|
meth=DTLSv1_client_method();
|
2006-01-02 23:29:12 +00:00
|
|
|
socket_type=SOCK_DGRAM;
|
2005-04-26 16:02:40 +00:00
|
|
|
}
|
2013-03-20 15:49:14 +00:00
|
|
|
else if (strcmp(*argv,"-dtls1_2") == 0)
|
|
|
|
{
|
|
|
|
meth=DTLSv1_2_client_method();
|
|
|
|
socket_type=SOCK_DGRAM;
|
|
|
|
}
|
2005-04-26 16:02:40 +00:00
|
|
|
else if (strcmp(*argv,"-timeout") == 0)
|
|
|
|
enable_timeouts=1;
|
|
|
|
else if (strcmp(*argv,"-mtu") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
2006-01-02 23:29:12 +00:00
|
|
|
socket_mtu = atol(*(++argv));
|
2005-04-26 16:02:40 +00:00
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
#endif
|
2004-11-16 17:30:59 +00:00
|
|
|
else if (strcmp(*argv,"-keyform") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
key_format = str2fmt(*(++argv));
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-pass") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
passarg = *(++argv);
|
|
|
|
}
|
2012-12-12 00:50:26 +00:00
|
|
|
else if (strcmp(*argv,"-cert_chain") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
chain_file= *(++argv);
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-key") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
key_file= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-reconnect") == 0)
|
|
|
|
{
|
|
|
|
reconnect=5;
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-CApath") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
CApath= *(++argv);
|
|
|
|
}
|
2012-11-23 18:56:25 +00:00
|
|
|
else if (strcmp(*argv,"-chainCApath") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
chCApath= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-verifyCApath") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
vfyCApath= *(++argv);
|
|
|
|
}
|
2012-07-23 23:34:28 +00:00
|
|
|
else if (strcmp(*argv,"-build_chain") == 0)
|
|
|
|
build_chain = 1;
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (strcmp(*argv,"-CAfile") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
CAfile= *(++argv);
|
|
|
|
}
|
2012-11-23 18:56:25 +00:00
|
|
|
else if (strcmp(*argv,"-chainCAfile") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
chCAfile= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-verifyCAfile") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
vfyCAfile= *(++argv);
|
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2010-09-05 17:14:01 +00:00
|
|
|
# ifndef OPENSSL_NO_NEXTPROTONEG
|
2010-07-28 10:06:55 +00:00
|
|
|
else if (strcmp(*argv,"-nextprotoneg") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
next_proto_neg_in = *(++argv);
|
|
|
|
}
|
2013-11-13 23:20:22 +00:00
|
|
|
# endif
|
2013-04-15 22:07:47 +00:00
|
|
|
else if (strcmp(*argv,"-alpn") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
alpn_in = *(++argv);
|
|
|
|
}
|
2013-05-13 01:55:27 +00:00
|
|
|
else if (strcmp(*argv,"-serverinfo") == 0)
|
|
|
|
{
|
|
|
|
char *c;
|
|
|
|
int start = 0;
|
|
|
|
int len;
|
|
|
|
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
c = *(++argv);
|
|
|
|
serverinfo_types_count = 0;
|
|
|
|
len = strlen(c);
|
|
|
|
for (i = 0; i <= len; ++i)
|
|
|
|
{
|
|
|
|
if (i == len || c[i] == ',')
|
|
|
|
{
|
|
|
|
serverinfo_types[serverinfo_types_count]
|
|
|
|
= atoi(c+start);
|
|
|
|
serverinfo_types_count++;
|
|
|
|
start = i+1;
|
|
|
|
}
|
|
|
|
if (serverinfo_types_count == MAX_SI_TYPES)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
#ifdef FIONBIO
|
|
|
|
else if (strcmp(*argv,"-nbio") == 0)
|
|
|
|
{ c_nbio=1; }
|
|
|
|
#endif
|
2001-11-14 13:57:52 +00:00
|
|
|
else if (strcmp(*argv,"-starttls") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
++argv;
|
|
|
|
if (strcmp(*argv,"smtp") == 0)
|
2007-02-16 18:12:16 +00:00
|
|
|
starttls_proto = PROTO_SMTP;
|
2003-05-28 20:24:57 +00:00
|
|
|
else if (strcmp(*argv,"pop3") == 0)
|
2007-02-16 18:12:16 +00:00
|
|
|
starttls_proto = PROTO_POP3;
|
|
|
|
else if (strcmp(*argv,"imap") == 0)
|
|
|
|
starttls_proto = PROTO_IMAP;
|
|
|
|
else if (strcmp(*argv,"ftp") == 0)
|
|
|
|
starttls_proto = PROTO_FTP;
|
2008-10-14 19:11:26 +00:00
|
|
|
else if (strcmp(*argv, "xmpp") == 0)
|
|
|
|
starttls_proto = PROTO_XMPP;
|
2001-11-14 13:57:52 +00:00
|
|
|
else
|
|
|
|
goto bad;
|
|
|
|
}
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2000-10-26 21:07:28 +00:00
|
|
|
else if (strcmp(*argv,"-engine") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
engine_id = *(++argv);
|
|
|
|
}
|
2008-06-03 11:26:27 +00:00
|
|
|
else if (strcmp(*argv,"-ssl_client_engine") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
ssl_client_engine_id = *(++argv);
|
|
|
|
}
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2001-02-15 10:22:07 +00:00
|
|
|
else if (strcmp(*argv,"-rand") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
inrand= *(++argv);
|
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
else if (strcmp(*argv,"-servername") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
servername= *(++argv);
|
|
|
|
/* meth=TLSv1_client_method(); */
|
|
|
|
}
|
|
|
|
#endif
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
2008-10-26 18:40:52 +00:00
|
|
|
else if (strcmp(*argv,"-jpake") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
jpake_secret = *++argv;
|
|
|
|
}
|
2008-11-12 17:28:18 +00:00
|
|
|
#endif
|
2011-11-15 22:59:20 +00:00
|
|
|
else if (strcmp(*argv,"-use_srtp") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
srtp_profiles = *(++argv);
|
|
|
|
}
|
2011-11-15 23:50:52 +00:00
|
|
|
else if (strcmp(*argv,"-keymatexport") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
keymatexportlabel= *(++argv);
|
|
|
|
}
|
|
|
|
else if (strcmp(*argv,"-keymatexportlen") == 0)
|
|
|
|
{
|
|
|
|
if (--argc < 1) goto bad;
|
|
|
|
keymatexportlen=atoi(*(++argv));
|
|
|
|
if (keymatexportlen == 0) goto bad;
|
|
|
|
}
|
2011-11-15 22:59:20 +00:00
|
|
|
else
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
|
|
badop=1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
argc--;
|
|
|
|
argv++;
|
|
|
|
}
|
|
|
|
if (badop)
|
|
|
|
{
|
|
|
|
bad:
|
|
|
|
sc_usage();
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
s_client/s_server: support unix domain sockets
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-04-26 05:22:54 +00:00
|
|
|
if (unix_path && (socket_type != SOCK_STREAM))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Can't use unix sockets and datagrams together\n");
|
|
|
|
goto end;
|
|
|
|
}
|
2008-11-24 17:27:08 +00:00
|
|
|
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
|
2008-11-16 12:47:12 +00:00
|
|
|
if (jpake_secret)
|
|
|
|
{
|
|
|
|
if (psk_key)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"Can't use JPAKE and PSK together\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
psk_identity = "JPAKE";
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2002-07-16 06:52:03 +00:00
|
|
|
OpenSSL_add_ssl_algorithms();
|
|
|
|
SSL_load_error_strings();
|
|
|
|
|
2010-09-05 17:14:01 +00:00
|
|
|
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
|
2010-07-28 10:06:55 +00:00
|
|
|
next_proto.status = -1;
|
|
|
|
if (next_proto_neg_in)
|
|
|
|
{
|
|
|
|
next_proto.data = next_protos_parse(&next_proto.len, next_proto_neg_in);
|
|
|
|
if (next_proto.data == NULL)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Error parsing -nextprotoneg argument\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
next_proto.data = NULL;
|
|
|
|
#endif
|
|
|
|
|
2003-01-30 17:39:26 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
2002-07-16 06:52:03 +00:00
|
|
|
e = setup_engine(bio_err, engine_id, 1);
|
2008-06-03 11:26:27 +00:00
|
|
|
if (ssl_client_engine_id)
|
|
|
|
{
|
|
|
|
ssl_client_engine = ENGINE_by_id(ssl_client_engine_id);
|
|
|
|
if (!ssl_client_engine)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"Error getting client auth engine\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-01-30 17:39:26 +00:00
|
|
|
#endif
|
2004-11-16 17:30:59 +00:00
|
|
|
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Error getting password\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (key_file == NULL)
|
|
|
|
key_file = cert_file;
|
|
|
|
|
2004-12-13 18:02:23 +00:00
|
|
|
|
|
|
|
if (key_file)
|
|
|
|
|
2004-11-16 17:30:59 +00:00
|
|
|
{
|
2004-12-13 18:02:23 +00:00
|
|
|
|
|
|
|
key = load_key(bio_err, key_file, key_format, 0, pass, e,
|
|
|
|
"client certificate private key file");
|
|
|
|
if (!key)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2004-11-16 17:30:59 +00:00
|
|
|
}
|
|
|
|
|
2004-12-13 18:02:23 +00:00
|
|
|
if (cert_file)
|
2004-11-16 17:30:59 +00:00
|
|
|
|
|
|
|
{
|
2004-12-13 18:02:23 +00:00
|
|
|
cert = load_cert(bio_err,cert_file,cert_format,
|
|
|
|
NULL, e, "client certificate file");
|
|
|
|
|
|
|
|
if (!cert)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
2004-11-16 17:30:59 +00:00
|
|
|
}
|
2002-07-16 06:52:03 +00:00
|
|
|
|
2012-12-12 00:50:26 +00:00
|
|
|
if (chain_file)
|
|
|
|
{
|
|
|
|
chain = load_certs(bio_err, chain_file,FORMAT_PEM,
|
|
|
|
NULL, e, "client certificate chain");
|
|
|
|
if (!chain)
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2012-12-02 16:16:28 +00:00
|
|
|
if (crl_file)
|
|
|
|
{
|
|
|
|
X509_CRL *crl;
|
|
|
|
crl = load_crl(crl_file, crl_format);
|
|
|
|
if (!crl)
|
|
|
|
{
|
|
|
|
BIO_puts(bio_err, "Error loading CRL\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
crls = sk_X509_CRL_new_null();
|
|
|
|
if (!crls || !sk_X509_CRL_push(crls, crl))
|
|
|
|
{
|
|
|
|
BIO_puts(bio_err, "Error adding CRL\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
X509_CRL_free(crl);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-03 14:53:27 +00:00
|
|
|
if (!load_excert(&exc, bio_err))
|
|
|
|
goto end;
|
|
|
|
|
2001-02-15 10:22:07 +00:00
|
|
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
|
|
|
&& !RAND_status())
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
|
|
|
}
|
|
|
|
if (inrand != NULL)
|
|
|
|
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
|
|
app_RAND_load_files(inrand));
|
1999-10-26 01:56:29 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (bio_c_out == NULL)
|
|
|
|
{
|
2012-11-21 17:11:42 +00:00
|
|
|
if (c_quiet && !c_debug)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
bio_c_out=BIO_new(BIO_s_null());
|
2012-11-21 17:11:42 +00:00
|
|
|
if (c_msg && !bio_c_msg)
|
|
|
|
bio_c_msg=BIO_new_fp(stdout,BIO_NOCLOSE);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
if (bio_c_out == NULL)
|
|
|
|
bio_c_out=BIO_new_fp(stdout,BIO_NOCLOSE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-03-12 17:01:19 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
if(!app_passwd(bio_err, srppass, NULL, &srp_arg.srppassin, NULL))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Error getting password\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
ctx=SSL_CTX_new(meth);
|
|
|
|
if (ctx == NULL)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2014-02-17 00:10:00 +00:00
|
|
|
if (sdebug)
|
|
|
|
ssl_ctx_security_debug(ctx, bio_err, sdebug);
|
|
|
|
|
2009-06-30 15:56:35 +00:00
|
|
|
if (vpm)
|
|
|
|
SSL_CTX_set1_param(ctx, vpm);
|
|
|
|
|
2012-12-29 23:38:20 +00:00
|
|
|
if (!args_ssl_call(ctx, bio_err, cctx, ssl_args, 1, no_jpake))
|
2012-11-17 14:42:22 +00:00
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2012-12-06 18:43:40 +00:00
|
|
|
if (!ssl_load_stores(ctx, vfyCApath, vfyCAfile, chCApath, chCAfile,
|
|
|
|
crls, crl_download))
|
2012-11-23 18:56:25 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Error loading store locations\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2008-06-03 11:26:27 +00:00
|
|
|
#ifndef OPENSSL_NO_ENGINE
|
|
|
|
if (ssl_client_engine)
|
|
|
|
{
|
|
|
|
if (!SSL_CTX_set_client_cert_engine(ctx, ssl_client_engine))
|
|
|
|
{
|
|
|
|
BIO_puts(bio_err, "Error setting client auth engine\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
ENGINE_free(ssl_client_engine);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
ENGINE_free(ssl_client_engine);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2006-03-10 23:06:27 +00:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifdef OPENSSL_NO_JPAKE
|
|
|
|
if (psk_key != NULL)
|
|
|
|
#else
|
2008-11-16 12:47:12 +00:00
|
|
|
if (psk_key != NULL || jpake_secret)
|
2008-11-24 17:27:08 +00:00
|
|
|
#endif
|
2006-03-10 23:06:27 +00:00
|
|
|
{
|
|
|
|
if (c_debug)
|
2008-11-16 12:47:12 +00:00
|
|
|
BIO_printf(bio_c_out, "PSK key given or JPAKE in use, setting client callback\n");
|
2006-03-10 23:06:27 +00:00
|
|
|
SSL_CTX_set_psk_client_callback(ctx, psk_client_cb);
|
|
|
|
}
|
2011-11-15 22:59:20 +00:00
|
|
|
if (srtp_profiles != NULL)
|
|
|
|
SSL_CTX_set_tlsext_use_srtp(ctx, srtp_profiles);
|
2006-03-10 23:06:27 +00:00
|
|
|
#endif
|
2012-07-03 14:53:27 +00:00
|
|
|
if (exc) ssl_ctx_set_excert(ctx, exc);
|
2005-04-26 16:02:40 +00:00
|
|
|
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
|
|
|
* Setting read ahead solves this problem.
|
|
|
|
*/
|
2006-01-02 23:29:12 +00:00
|
|
|
if (socket_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx, 1);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2013-04-15 22:07:47 +00:00
|
|
|
#if !defined(OPENSSL_NO_TLSEXT)
|
|
|
|
# if !defined(OPENSSL_NO_NEXTPROTONEG)
|
2010-07-28 10:06:55 +00:00
|
|
|
if (next_proto.data)
|
|
|
|
SSL_CTX_set_next_proto_select_cb(ctx, next_proto_cb, &next_proto);
|
2013-04-15 22:07:47 +00:00
|
|
|
# endif
|
|
|
|
if (alpn_in)
|
|
|
|
{
|
|
|
|
unsigned short alpn_len;
|
|
|
|
unsigned char *alpn = next_protos_parse(&alpn_len, alpn_in);
|
|
|
|
|
|
|
|
if (alpn == NULL)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Error parsing -alpn argument\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
SSL_CTX_set_alpn_protos(ctx, alpn, alpn_len);
|
2013-07-15 19:57:16 +00:00
|
|
|
OPENSSL_free(alpn);
|
2013-04-15 22:07:47 +00:00
|
|
|
}
|
2010-07-28 10:06:55 +00:00
|
|
|
#endif
|
2013-05-13 01:55:27 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
if (serverinfo_types_count)
|
|
|
|
{
|
|
|
|
for (i = 0; i < serverinfo_types_count; i++)
|
|
|
|
{
|
|
|
|
SSL_CTX_set_custom_cli_ext(ctx,
|
|
|
|
serverinfo_types[i],
|
|
|
|
NULL,
|
|
|
|
serverinfo_cli_cb,
|
|
|
|
NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2010-07-28 10:06:55 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
|
|
|
|
#if 0
|
|
|
|
else
|
|
|
|
SSL_CTX_set_cipher_list(ctx,getenv("SSL_CIPHER"));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
SSL_CTX_set_verify(ctx,verify,verify_callback);
|
|
|
|
|
|
|
|
if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
|
|
|
|
(!SSL_CTX_set_default_verify_paths(ctx)))
|
|
|
|
{
|
2000-02-03 23:23:24 +00:00
|
|
|
/* BIO_printf(bio_err,"error setting default verify locations\n"); */
|
1998-12-21 10:52:47 +00:00
|
|
|
ERR_print_errors(bio_err);
|
1998-12-21 10:56:39 +00:00
|
|
|
/* goto end; */
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2012-12-06 18:43:40 +00:00
|
|
|
ssl_ctx_add_crls(ctx, crls, crl_download);
|
2012-12-02 16:16:28 +00:00
|
|
|
|
2012-12-12 00:50:26 +00:00
|
|
|
if (!set_cert_key_stuff(ctx,cert,key,chain,build_chain))
|
2012-07-23 23:34:28 +00:00
|
|
|
goto end;
|
|
|
|
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2006-01-02 23:29:12 +00:00
|
|
|
if (servername != NULL)
|
|
|
|
{
|
2006-01-02 23:14:37 +00:00
|
|
|
tlsextcbp.biodebug = bio_err;
|
|
|
|
SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
|
|
|
|
SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
|
2006-01-02 23:29:12 +00:00
|
|
|
}
|
2011-03-12 17:01:19 +00:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
|
|
|
if (srp_arg.srplogin)
|
|
|
|
{
|
2011-12-14 22:17:06 +00:00
|
|
|
if (!srp_lateuser && !SSL_CTX_set_srp_username(ctx, srp_arg.srplogin))
|
2011-03-12 17:01:19 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"Unable to set SRP username\n");
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
srp_arg.msg = c_msg;
|
|
|
|
srp_arg.debug = c_debug ;
|
|
|
|
SSL_CTX_set_srp_cb_arg(ctx,&srp_arg);
|
|
|
|
SSL_CTX_set_srp_client_pwd_callback(ctx, ssl_give_srp_client_pwd_cb);
|
|
|
|
SSL_CTX_set_srp_strength(ctx, srp_arg.strength);
|
|
|
|
if (c_msg || c_debug || srp_arg.amp == 0)
|
|
|
|
SSL_CTX_set_srp_verify_param_callback(ctx, ssl_srp_verify_param_cb);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2000-02-03 02:56:48 +00:00
|
|
|
con=SSL_new(ctx);
|
2007-08-11 23:18:29 +00:00
|
|
|
if (sess_in)
|
|
|
|
{
|
|
|
|
SSL_SESSION *sess;
|
|
|
|
BIO *stmp = BIO_new_file(sess_in, "r");
|
|
|
|
if (!stmp)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Can't open session file %s\n",
|
|
|
|
sess_in);
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL);
|
|
|
|
BIO_free(stmp);
|
|
|
|
if (!sess)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "Can't open session file %s\n",
|
|
|
|
sess_in);
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
SSL_set_session(con, sess);
|
|
|
|
SSL_SESSION_free(sess);
|
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2006-01-02 23:29:12 +00:00
|
|
|
if (servername != NULL)
|
|
|
|
{
|
2006-01-09 19:49:05 +00:00
|
|
|
if (!SSL_set_tlsext_host_name(con,servername))
|
2006-01-02 23:29:12 +00:00
|
|
|
{
|
2006-01-02 23:14:37 +00:00
|
|
|
BIO_printf(bio_err,"Unable to set TLS servername extension.\n");
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
2006-01-02 23:29:12 +00:00
|
|
|
}
|
2006-01-02 23:14:37 +00:00
|
|
|
}
|
|
|
|
#endif
|
2001-02-19 16:06:34 +00:00
|
|
|
#ifndef OPENSSL_NO_KRB5
|
2011-05-11 22:50:18 +00:00
|
|
|
if (con && (kctx = kssl_ctx_new()) != NULL)
|
2000-11-30 22:53:34 +00:00
|
|
|
{
|
2011-05-11 22:50:18 +00:00
|
|
|
SSL_set0_kssl_ctx(con, kctx);
|
|
|
|
kssl_ctx_setstring(kctx, KSSL_SERVER, host);
|
2000-11-30 22:53:34 +00:00
|
|
|
}
|
2001-02-19 16:06:34 +00:00
|
|
|
#endif /* OPENSSL_NO_KRB5 */
|
1998-12-21 10:56:39 +00:00
|
|
|
/* SSL_set_cipher_list(con,"RC4-MD5"); */
|
2007-09-21 06:54:24 +00:00
|
|
|
#if 0
|
|
|
|
#ifdef TLSEXT_TYPE_opaque_prf_input
|
2007-09-23 11:08:59 +00:00
|
|
|
SSL_set_tlsext_opaque_prf_input(con, "Test client", 11);
|
2007-09-21 06:54:24 +00:00
|
|
|
#endif
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
re_start:
|
2014-07-01 11:44:00 +00:00
|
|
|
#ifdef NO_SYS_UN_H
|
|
|
|
if (init_client(&s,host,port,socket_type) == 0)
|
|
|
|
#else
|
s_client/s_server: support unix domain sockets
The "-unix <path>" argument allows s_server and s_client to use a unix
domain socket in the filesystem instead of IPv4 ("-connect", "-port",
"-accept", etc). If s_server exits gracefully, such as when "-naccept"
is used and the requested number of SSL/TLS connections have occurred,
then the domain socket file is removed. On ctrl-C, it is likely that
the stale socket file will be left over, such that s_server would
normally fail to restart with the same arguments. For this reason,
s_server also supports an "-unlink" option, which will clean up any
stale socket file before starting.
If you have any reason to want encrypted IPC within an O/S instance,
this concept might come in handy. Otherwise it just demonstrates that
there is nothing about SSL/TLS that limits it to TCP/IP in any way.
(There might also be benchmarking and profiling use in this path, as
unix domain sockets are much lower overhead than connecting over local
IP addresses).
Signed-off-by: Geoff Thorpe <geoff@openssl.org>
2014-04-26 05:22:54 +00:00
|
|
|
if ((!unix_path && (init_client(&s,host,port,socket_type) == 0)) ||
|
|
|
|
(unix_path && (init_client_unix(&s,unix_path) == 0)))
|
2014-07-01 11:44:00 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error());
|
1998-12-21 10:52:47 +00:00
|
|
|
SHUTDOWN(s);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
BIO_printf(bio_c_out,"CONNECTED(%08X)\n",s);
|
|
|
|
|
|
|
|
#ifdef FIONBIO
|
|
|
|
if (c_nbio)
|
|
|
|
{
|
|
|
|
unsigned long l=1;
|
|
|
|
BIO_printf(bio_c_out,"turning on non blocking io\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
if (BIO_socket_ioctl(s,FIONBIO,&l) < 0)
|
|
|
|
{
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto end;
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
#endif
|
2011-04-29 22:37:12 +00:00
|
|
|
if (c_Pause & 0x01) SSL_set_debug(con, 1);
|
2005-04-26 16:02:40 +00:00
|
|
|
|
2013-03-20 15:49:14 +00:00
|
|
|
if (socket_type == SOCK_DGRAM)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
|
|
|
|
sbio=BIO_new_dgram(s,BIO_NOCLOSE);
|
2005-04-27 16:27:14 +00:00
|
|
|
if (getsockname(s, &peer, (void *)&peerlen) < 0)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err, "getsockname:errno=%d\n",
|
|
|
|
get_last_socket_error());
|
|
|
|
SHUTDOWN(s);
|
|
|
|
goto end;
|
|
|
|
}
|
|
|
|
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_ctrl_set_connected(sbio, 1, &peer);
|
2005-04-26 16:02:40 +00:00
|
|
|
|
2006-01-02 23:29:12 +00:00
|
|
|
if (enable_timeouts)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
timeout.tv_sec = 0;
|
|
|
|
timeout.tv_usec = DGRAM_RCV_TIMEOUT;
|
|
|
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_RECV_TIMEOUT, 0, &timeout);
|
|
|
|
|
|
|
|
timeout.tv_sec = 0;
|
|
|
|
timeout.tv_usec = DGRAM_SND_TIMEOUT;
|
|
|
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
|
|
|
|
}
|
|
|
|
|
2009-05-17 16:04:58 +00:00
|
|
|
if (socket_mtu > 28)
|
2005-04-26 16:02:40 +00:00
|
|
|
{
|
|
|
|
SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
|
2009-05-17 16:04:58 +00:00
|
|
|
SSL_set_mtu(con, socket_mtu - 28);
|
2005-04-26 16:02:40 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
/* want to do MTU discovery */
|
|
|
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_MTU_DISCOVER, 0, NULL);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
sbio=BIO_new_socket(s,BIO_NOCLOSE);
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (nbio_test)
|
|
|
|
{
|
|
|
|
BIO *test;
|
|
|
|
|
|
|
|
test=BIO_new(BIO_f_nbio_test());
|
|
|
|
sbio=BIO_push(test,sbio);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (c_debug)
|
|
|
|
{
|
2011-04-29 22:37:12 +00:00
|
|
|
SSL_set_debug(con, 1);
|
2004-08-12 08:58:55 +00:00
|
|
|
BIO_set_callback(sbio,bio_dump_callback);
|
2006-11-29 20:54:57 +00:00
|
|
|
BIO_set_callback_arg(sbio,(char *)bio_c_out);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
2001-10-20 17:56:36 +00:00
|
|
|
if (c_msg)
|
|
|
|
{
|
2012-06-15 12:46:09 +00:00
|
|
|
#ifndef OPENSSL_NO_SSL_TRACE
|
|
|
|
if (c_msg == 2)
|
|
|
|
SSL_set_msg_callback(con, SSL_trace);
|
|
|
|
else
|
|
|
|
#endif
|
|
|
|
SSL_set_msg_callback(con, msg_cb);
|
|
|
|
SSL_set_msg_callback_arg(con, bio_c_msg ? bio_c_msg : bio_c_out);
|
2001-10-20 17:56:36 +00:00
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
if (c_tlsextdebug)
|
|
|
|
{
|
|
|
|
SSL_set_tlsext_debug_callback(con, tlsext_cb);
|
|
|
|
SSL_set_tlsext_debug_arg(con, bio_c_out);
|
|
|
|
}
|
2007-09-26 21:56:59 +00:00
|
|
|
if (c_status_req)
|
|
|
|
{
|
|
|
|
SSL_set_tlsext_status_type(con, TLSEXT_STATUSTYPE_ocsp);
|
|
|
|
SSL_CTX_set_tlsext_status_cb(ctx, ocsp_resp_cb);
|
|
|
|
SSL_CTX_set_tlsext_status_arg(ctx, bio_c_out);
|
|
|
|
#if 0
|
|
|
|
{
|
|
|
|
STACK_OF(OCSP_RESPID) *ids = sk_OCSP_RESPID_new_null();
|
|
|
|
OCSP_RESPID *id = OCSP_RESPID_new();
|
|
|
|
id->value.byKey = ASN1_OCTET_STRING_new();
|
|
|
|
id->type = V_OCSP_RESPID_KEY;
|
|
|
|
ASN1_STRING_set(id->value.byKey, "Hello World", -1);
|
|
|
|
sk_OCSP_RESPID_push(ids, id);
|
|
|
|
SSL_set_tlsext_status_ids(con, ids);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
2007-08-11 23:18:29 +00:00
|
|
|
#endif
|
2008-11-24 17:27:08 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
2008-10-26 18:40:52 +00:00
|
|
|
if (jpake_secret)
|
|
|
|
jpake_client_auth(bio_c_out, sbio, jpake_secret);
|
2008-11-12 17:28:18 +00:00
|
|
|
#endif
|
2008-10-26 18:40:52 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_set_bio(con,sbio,sbio);
|
|
|
|
SSL_set_connect_state(con);
|
|
|
|
|
|
|
|
/* ok, lets connect */
|
|
|
|
width=SSL_get_fd(con)+1;
|
|
|
|
|
|
|
|
read_tty=1;
|
|
|
|
write_tty=0;
|
|
|
|
tty_on=0;
|
|
|
|
read_ssl=1;
|
|
|
|
write_ssl=1;
|
|
|
|
|
|
|
|
cbuf_len=0;
|
|
|
|
cbuf_off=0;
|
|
|
|
sbuf_len=0;
|
|
|
|
sbuf_off=0;
|
|
|
|
|
2001-11-14 13:57:52 +00:00
|
|
|
/* This is an ugly hack that does a lot of assumptions */
|
2007-02-22 17:39:47 +00:00
|
|
|
/* We do have to handle multi-line responses which may come
|
|
|
|
in a single packet or not. We therefore have to use
|
|
|
|
BIO_gets() which does need a buffering BIO. So during
|
|
|
|
the initial chitchat we do push a buffering BIO into the
|
|
|
|
chain that is removed again later on to not disturb the
|
|
|
|
rest of the s_client operation. */
|
2007-02-16 18:12:16 +00:00
|
|
|
if (starttls_proto == PROTO_SMTP)
|
2001-11-14 13:57:52 +00:00
|
|
|
{
|
2007-02-21 18:20:41 +00:00
|
|
|
int foundit=0;
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO *fbio = BIO_new(BIO_f_buffer());
|
|
|
|
BIO_push(fbio, sbio);
|
2007-02-16 18:12:16 +00:00
|
|
|
/* wait for multi-line response to end from SMTP */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-16 18:12:16 +00:00
|
|
|
}
|
|
|
|
while (mbuf_len>3 && mbuf[3]=='-');
|
2007-02-21 18:20:41 +00:00
|
|
|
/* STARTTLS command requires EHLO... */
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_printf(fbio,"EHLO openssl.client.net\r\n");
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
/* wait for multi-line response to end EHLO SMTP response */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (strstr(mbuf,"STARTTLS"))
|
|
|
|
foundit=1;
|
|
|
|
}
|
|
|
|
while (mbuf_len>3 && mbuf[3]=='-');
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_pop(fbio);
|
|
|
|
BIO_free(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (!foundit)
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"didn't found starttls in server response,"
|
|
|
|
" try anyway...\n");
|
2001-11-14 13:57:52 +00:00
|
|
|
BIO_printf(sbio,"STARTTLS\r\n");
|
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
2007-02-16 18:12:16 +00:00
|
|
|
else if (starttls_proto == PROTO_POP3)
|
2003-05-28 20:24:57 +00:00
|
|
|
{
|
|
|
|
BIO_read(sbio,mbuf,BUFSIZZ);
|
|
|
|
BIO_printf(sbio,"STLS\r\n");
|
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
2007-02-16 18:12:16 +00:00
|
|
|
else if (starttls_proto == PROTO_IMAP)
|
|
|
|
{
|
2007-02-21 18:20:41 +00:00
|
|
|
int foundit=0;
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO *fbio = BIO_new(BIO_f_buffer());
|
|
|
|
BIO_push(fbio, sbio);
|
|
|
|
BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-21 18:20:41 +00:00
|
|
|
/* STARTTLS command requires CAPABILITY... */
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_printf(fbio,". CAPABILITY\r\n");
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
/* wait for multi-line CAPABILITY response */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (strstr(mbuf,"STARTTLS"))
|
|
|
|
foundit=1;
|
|
|
|
}
|
2007-02-22 17:39:47 +00:00
|
|
|
while (mbuf_len>3 && mbuf[0]!='.');
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_pop(fbio);
|
|
|
|
BIO_free(fbio);
|
2007-02-21 18:20:41 +00:00
|
|
|
if (!foundit)
|
|
|
|
BIO_printf(bio_err,
|
|
|
|
"didn't found STARTTLS in server response,"
|
|
|
|
" try anyway...\n");
|
|
|
|
BIO_printf(sbio,". STARTTLS\r\n");
|
2007-02-16 18:12:16 +00:00
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
|
|
|
else if (starttls_proto == PROTO_FTP)
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO *fbio = BIO_new(BIO_f_buffer());
|
|
|
|
BIO_push(fbio, sbio);
|
2007-02-16 18:12:16 +00:00
|
|
|
/* wait for multi-line response to end from FTP */
|
|
|
|
do
|
|
|
|
{
|
2007-02-22 17:39:47 +00:00
|
|
|
mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
|
2007-02-16 18:12:16 +00:00
|
|
|
}
|
|
|
|
while (mbuf_len>3 && mbuf[3]=='-');
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(fbio);
|
2007-02-22 17:39:47 +00:00
|
|
|
BIO_pop(fbio);
|
|
|
|
BIO_free(fbio);
|
2007-02-16 18:12:16 +00:00
|
|
|
BIO_printf(sbio,"AUTH TLS\r\n");
|
|
|
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
}
|
2008-10-14 19:11:26 +00:00
|
|
|
if (starttls_proto == PROTO_XMPP)
|
|
|
|
{
|
|
|
|
int seen = 0;
|
|
|
|
BIO_printf(sbio,"<stream:stream "
|
|
|
|
"xmlns:stream='http://etherx.jabber.org/streams' "
|
2013-09-05 16:28:05 +00:00
|
|
|
"xmlns='jabber:client' to='%s' version='1.0'>", xmpphost ?
|
|
|
|
xmpphost : host);
|
2008-10-14 19:11:26 +00:00
|
|
|
seen = BIO_read(sbio,mbuf,BUFSIZZ);
|
|
|
|
mbuf[seen] = 0;
|
2012-08-05 23:45:51 +00:00
|
|
|
while (!strstr(mbuf, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'") &&
|
|
|
|
!strstr(mbuf, "<starttls xmlns=\"urn:ietf:params:xml:ns:xmpp-tls\""))
|
2008-10-14 19:11:26 +00:00
|
|
|
{
|
|
|
|
seen = BIO_read(sbio,mbuf,BUFSIZZ);
|
2012-08-06 00:00:07 +00:00
|
|
|
|
|
|
|
if (seen <= 0)
|
|
|
|
goto shut;
|
|
|
|
|
2008-10-14 19:11:26 +00:00
|
|
|
mbuf[seen] = 0;
|
|
|
|
}
|
|
|
|
BIO_printf(sbio, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>");
|
|
|
|
seen = BIO_read(sbio,sbuf,BUFSIZZ);
|
|
|
|
sbuf[seen] = 0;
|
|
|
|
if (!strstr(sbuf, "<proceed"))
|
|
|
|
goto shut;
|
|
|
|
mbuf[0] = 0;
|
|
|
|
}
|
2001-11-14 13:57:52 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
for (;;)
|
|
|
|
{
|
|
|
|
FD_ZERO(&readfds);
|
|
|
|
FD_ZERO(&writefds);
|
|
|
|
|
2009-08-12 13:19:54 +00:00
|
|
|
if ((SSL_version(con) == DTLS1_VERSION) &&
|
|
|
|
DTLSv1_get_timeout(con, &timeout))
|
|
|
|
timeoutp = &timeout;
|
|
|
|
else
|
|
|
|
timeoutp = NULL;
|
|
|
|
|
1998-12-21 10:56:39 +00:00
|
|
|
if (SSL_in_init(con) && !SSL_total_renegotiations(con))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
in_init=1;
|
|
|
|
tty_on=0;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
tty_on=1;
|
|
|
|
if (in_init)
|
|
|
|
{
|
|
|
|
in_init=0;
|
2007-09-21 06:54:24 +00:00
|
|
|
#if 0 /* This test doesn't really work as intended (needs to be fixed) */
|
2006-01-02 23:14:37 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
2006-06-15 19:00:34 +00:00
|
|
|
if (servername != NULL && !SSL_session_reused(con))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_c_out,"Server did %sacknowledge servername extension.\n",tlsextcbp.ack?"":"not ");
|
|
|
|
}
|
2007-09-21 06:54:24 +00:00
|
|
|
#endif
|
2006-01-02 23:14:37 +00:00
|
|
|
#endif
|
2007-08-11 23:18:29 +00:00
|
|
|
if (sess_out)
|
|
|
|
{
|
|
|
|
BIO *stmp = BIO_new_file(sess_out, "w");
|
|
|
|
if (stmp)
|
|
|
|
{
|
|
|
|
PEM_write_bio_SSL_SESSION(stmp, SSL_get_session(con));
|
|
|
|
BIO_free(stmp);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
BIO_printf(bio_err, "Error writing session file %s\n", sess_out);
|
|
|
|
}
|
2012-09-12 23:14:28 +00:00
|
|
|
if (c_brief)
|
|
|
|
{
|
|
|
|
BIO_puts(bio_err,
|
|
|
|
"CONNECTION ESTABLISHED\n");
|
|
|
|
print_ssl_summary(bio_err, con);
|
|
|
|
}
|
2013-08-01 18:54:09 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
print_stuff(bio_c_out,con,full_log);
|
|
|
|
if (full_log > 0) full_log--;
|
|
|
|
|
2003-05-28 20:24:57 +00:00
|
|
|
if (starttls_proto)
|
2001-11-14 13:57:52 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"%s",mbuf);
|
|
|
|
/* We don't need to know any more */
|
2007-02-16 18:12:16 +00:00
|
|
|
starttls_proto = PROTO_OFF;
|
2001-11-14 13:57:52 +00:00
|
|
|
}
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
if (reconnect)
|
|
|
|
{
|
|
|
|
reconnect--;
|
|
|
|
BIO_printf(bio_c_out,"drop connection and then reconnect\n");
|
|
|
|
SSL_shutdown(con);
|
|
|
|
SSL_set_connect_state(con);
|
|
|
|
SHUTDOWN(SSL_get_fd(con));
|
|
|
|
goto re_start;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-04-09 20:54:25 +00:00
|
|
|
ssl_pending = read_ssl && SSL_pending(con);
|
|
|
|
|
|
|
|
if (!ssl_pending)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
2006-04-11 21:34:21 +00:00
|
|
|
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE) && !defined (OPENSSL_SYS_BEOS_R5)
|
1999-04-09 20:54:25 +00:00
|
|
|
if (tty_on)
|
|
|
|
{
|
2006-04-17 12:22:13 +00:00
|
|
|
if (read_tty) openssl_fdset(fileno(stdin),&readfds);
|
|
|
|
if (write_tty) openssl_fdset(fileno(stdout),&writefds);
|
1999-04-09 20:54:25 +00:00
|
|
|
}
|
|
|
|
if (read_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&readfds);
|
1999-04-09 20:54:25 +00:00
|
|
|
if (write_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&writefds);
|
1999-09-20 22:09:17 +00:00
|
|
|
#else
|
|
|
|
if(!tty_on || !write_tty) {
|
|
|
|
if (read_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&readfds);
|
1999-09-20 22:09:17 +00:00
|
|
|
if (write_ssl)
|
2006-04-17 12:22:13 +00:00
|
|
|
openssl_fdset(SSL_get_fd(con),&writefds);
|
1999-09-20 22:09:17 +00:00
|
|
|
}
|
|
|
|
#endif
|
1999-04-09 20:54:25 +00:00
|
|
|
/* printf("mode tty(%d %d%d) ssl(%d%d)\n",
|
|
|
|
tty_on,read_tty,write_tty,read_ssl,write_ssl);*/
|
1998-12-21 10:52:47 +00:00
|
|
|
|
1999-05-13 13:21:17 +00:00
|
|
|
/* Note: under VMS with SOCKETSHR the second parameter
|
1999-05-13 11:37:32 +00:00
|
|
|
* is currently of type (int *) whereas under other
|
|
|
|
* systems it is (void *) if you don't have a cast it
|
|
|
|
* will choke the compiler: if you do have a cast then
|
|
|
|
* you can either go for (int *) or (void *).
|
|
|
|
*/
|
2003-09-27 21:56:08 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
|
|
|
/* Under Windows/DOS we make the assumption that we can
|
1999-09-20 22:09:17 +00:00
|
|
|
* always write to the tty: therefore if we need to
|
|
|
|
* write to the tty we just fall through. Otherwise
|
|
|
|
* we timeout the select every second and see if there
|
|
|
|
* are any keypresses. Note: this is a hack, in a proper
|
|
|
|
* Windows application we wouldn't do this.
|
|
|
|
*/
|
2000-02-20 20:59:21 +00:00
|
|
|
i=0;
|
1999-09-20 22:09:17 +00:00
|
|
|
if(!write_tty) {
|
|
|
|
if(read_tty) {
|
|
|
|
tv.tv_sec = 1;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
|
|
|
NULL,&tv);
|
2003-09-27 21:56:08 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
|
2002-11-15 22:37:18 +00:00
|
|
|
if(!i && (!_kbhit() || !read_tty) ) continue;
|
|
|
|
#else
|
2000-06-01 11:23:20 +00:00
|
|
|
if(!i && (!((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || !read_tty) ) continue;
|
2002-11-15 22:37:18 +00:00
|
|
|
#endif
|
1999-09-20 22:09:17 +00:00
|
|
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:19:54 +00:00
|
|
|
NULL,timeoutp);
|
1999-09-20 22:09:17 +00:00
|
|
|
}
|
2004-06-28 11:55:28 +00:00
|
|
|
#elif defined(OPENSSL_SYS_NETWARE)
|
|
|
|
if(!write_tty) {
|
|
|
|
if(read_tty) {
|
|
|
|
tv.tv_sec = 1;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
|
|
|
NULL,&tv);
|
|
|
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:19:54 +00:00
|
|
|
NULL,timeoutp);
|
2004-06-28 11:55:28 +00:00
|
|
|
}
|
2006-04-11 21:34:21 +00:00
|
|
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
/* Under BeOS-R5 the situation is similar to DOS */
|
|
|
|
i=0;
|
|
|
|
stdin_set = 0;
|
|
|
|
(void)fcntl(fileno(stdin), F_SETFL, O_NONBLOCK);
|
|
|
|
if(!write_tty) {
|
|
|
|
if(read_tty) {
|
|
|
|
tv.tv_sec = 1;
|
|
|
|
tv.tv_usec = 0;
|
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
|
|
|
NULL,&tv);
|
|
|
|
if (read(fileno(stdin), sbuf, 0) >= 0)
|
|
|
|
stdin_set = 1;
|
|
|
|
if (!i && (stdin_set != 1 || !read_tty))
|
|
|
|
continue;
|
|
|
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:19:54 +00:00
|
|
|
NULL,timeoutp);
|
2006-04-11 21:34:21 +00:00
|
|
|
}
|
|
|
|
(void)fcntl(fileno(stdin), F_SETFL, 0);
|
1999-09-20 22:09:17 +00:00
|
|
|
#else
|
1999-05-13 11:37:32 +00:00
|
|
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
2009-08-12 13:19:54 +00:00
|
|
|
NULL,timeoutp);
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
1999-04-09 20:54:25 +00:00
|
|
|
if ( i < 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"bad select %d\n",
|
1998-12-21 10:56:39 +00:00
|
|
|
get_last_socket_error());
|
1999-04-09 20:54:25 +00:00
|
|
|
goto shut;
|
|
|
|
/* goto end; */
|
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2009-08-12 13:19:54 +00:00
|
|
|
if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0)
|
|
|
|
{
|
2013-06-12 23:22:32 +00:00
|
|
|
BIO_printf(bio_err,"TIMEOUT occurred\n");
|
2009-08-12 13:19:54 +00:00
|
|
|
}
|
|
|
|
|
1999-04-09 20:54:25 +00:00
|
|
|
if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
k=SSL_write(con,&(cbuf[cbuf_off]),
|
|
|
|
(unsigned int)cbuf_len);
|
|
|
|
switch (SSL_get_error(con,k))
|
|
|
|
{
|
|
|
|
case SSL_ERROR_NONE:
|
|
|
|
cbuf_off+=k;
|
|
|
|
cbuf_len-=k;
|
|
|
|
if (k <= 0) goto end;
|
|
|
|
/* we have done a write(con,NULL,0); */
|
|
|
|
if (cbuf_len <= 0)
|
|
|
|
{
|
|
|
|
read_tty=1;
|
|
|
|
write_ssl=0;
|
|
|
|
}
|
|
|
|
else /* if (cbuf_len > 0) */
|
|
|
|
{
|
|
|
|
read_tty=0;
|
|
|
|
write_ssl=1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
BIO_printf(bio_c_out,"write W BLOCK\n");
|
|
|
|
write_ssl=1;
|
|
|
|
read_tty=0;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
BIO_printf(bio_c_out,"write R BLOCK\n");
|
|
|
|
write_tty=0;
|
|
|
|
read_ssl=1;
|
|
|
|
write_ssl=0;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
|
|
BIO_printf(bio_c_out,"write X BLOCK\n");
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
|
|
if (cbuf_len != 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_c_out,"shutdown\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret = 0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
read_tty=1;
|
|
|
|
write_ssl=0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case SSL_ERROR_SYSCALL:
|
|
|
|
if ((k != 0) || (cbuf_len != 0))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"write:errno=%d\n",
|
1998-12-21 10:56:39 +00:00
|
|
|
get_last_socket_error());
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
read_tty=1;
|
|
|
|
write_ssl=0;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_SSL:
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
}
|
2006-04-11 21:34:21 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
/* Assume Windows/DOS/BeOS can always write */
|
1999-09-20 22:09:17 +00:00
|
|
|
else if (!ssl_pending && write_tty)
|
|
|
|
#else
|
1999-04-09 20:54:25 +00:00
|
|
|
else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-06-04 21:35:58 +00:00
|
|
|
#ifdef CHARSET_EBCDIC
|
|
|
|
ascii2ebcdic(&(sbuf[sbuf_off]),&(sbuf[sbuf_off]),sbuf_len);
|
|
|
|
#endif
|
2005-11-04 09:30:55 +00:00
|
|
|
i=raw_write_stdout(&(sbuf[sbuf_off]),sbuf_len);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (i <= 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio_c_out,"DONE\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret = 0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
/* goto end; */
|
|
|
|
}
|
|
|
|
|
|
|
|
sbuf_len-=i;;
|
|
|
|
sbuf_off+=i;
|
|
|
|
if (sbuf_len <= 0)
|
|
|
|
{
|
|
|
|
read_ssl=1;
|
|
|
|
write_tty=0;
|
|
|
|
}
|
|
|
|
}
|
1999-04-09 20:54:25 +00:00
|
|
|
else if (ssl_pending || FD_ISSET(SSL_get_fd(con),&readfds))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
#ifdef RENEG
|
|
|
|
{ static int iiii; if (++iiii == 52) { SSL_renegotiate(con); iiii=0; } }
|
|
|
|
#endif
|
1998-12-21 11:00:56 +00:00
|
|
|
#if 1
|
1998-12-21 10:56:39 +00:00
|
|
|
k=SSL_read(con,sbuf,1024 /* BUFSIZZ */ );
|
1998-12-21 11:00:56 +00:00
|
|
|
#else
|
|
|
|
/* Demo for pending and peek :-) */
|
|
|
|
k=SSL_read(con,sbuf,16);
|
|
|
|
{ char zbuf[10240];
|
|
|
|
printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240));
|
|
|
|
}
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
switch (SSL_get_error(con,k))
|
|
|
|
{
|
|
|
|
case SSL_ERROR_NONE:
|
|
|
|
if (k <= 0)
|
|
|
|
goto end;
|
|
|
|
sbuf_off=0;
|
|
|
|
sbuf_len=k;
|
|
|
|
|
|
|
|
read_ssl=0;
|
|
|
|
write_tty=1;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_WRITE:
|
|
|
|
BIO_printf(bio_c_out,"read W BLOCK\n");
|
|
|
|
write_ssl=1;
|
|
|
|
read_tty=0;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_READ:
|
|
|
|
BIO_printf(bio_c_out,"read R BLOCK\n");
|
|
|
|
write_tty=0;
|
|
|
|
read_ssl=1;
|
|
|
|
if ((read_tty == 0) && (write_ssl == 0))
|
|
|
|
write_ssl=1;
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_WANT_X509_LOOKUP:
|
|
|
|
BIO_printf(bio_c_out,"read X BLOCK\n");
|
|
|
|
break;
|
|
|
|
case SSL_ERROR_SYSCALL:
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret=get_last_socket_error();
|
2012-12-03 03:40:57 +00:00
|
|
|
if (c_brief)
|
2012-12-03 03:33:44 +00:00
|
|
|
BIO_puts(bio_err, "CONNECTION CLOSED BY SERVER\n");
|
|
|
|
else
|
|
|
|
BIO_printf(bio_err,"read:errno=%d\n",ret);
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
case SSL_ERROR_ZERO_RETURN:
|
|
|
|
BIO_printf(bio_c_out,"closed\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
case SSL_ERROR_SSL:
|
|
|
|
ERR_print_errors(bio_err);
|
|
|
|
goto shut;
|
1998-12-21 11:00:56 +00:00
|
|
|
/* break; */
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2003-09-27 21:56:08 +00:00
|
|
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
|
|
|
#if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
|
2002-11-15 22:37:18 +00:00
|
|
|
else if (_kbhit())
|
|
|
|
#else
|
2000-06-01 11:23:20 +00:00
|
|
|
else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
|
2002-11-15 22:37:18 +00:00
|
|
|
#endif
|
2003-11-28 13:10:58 +00:00
|
|
|
#elif defined (OPENSSL_SYS_NETWARE)
|
2005-11-04 09:30:55 +00:00
|
|
|
else if (_kbhit())
|
2006-04-11 21:34:21 +00:00
|
|
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
|
|
|
else if (stdin_set)
|
1999-09-20 22:09:17 +00:00
|
|
|
#else
|
1998-12-21 10:52:47 +00:00
|
|
|
else if (FD_ISSET(fileno(stdin),&readfds))
|
1999-09-20 22:09:17 +00:00
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-08-07 02:51:10 +00:00
|
|
|
if (crlf)
|
|
|
|
{
|
|
|
|
int j, lf_num;
|
|
|
|
|
2005-11-04 09:30:55 +00:00
|
|
|
i=raw_read_stdin(cbuf,BUFSIZZ/2);
|
1999-08-07 02:51:10 +00:00
|
|
|
lf_num = 0;
|
|
|
|
/* both loops are skipped when i <= 0 */
|
|
|
|
for (j = 0; j < i; j++)
|
|
|
|
if (cbuf[j] == '\n')
|
|
|
|
lf_num++;
|
|
|
|
for (j = i-1; j >= 0; j--)
|
|
|
|
{
|
|
|
|
cbuf[j+lf_num] = cbuf[j];
|
|
|
|
if (cbuf[j] == '\n')
|
|
|
|
{
|
|
|
|
lf_num--;
|
|
|
|
i++;
|
|
|
|
cbuf[j+lf_num] = '\r';
|
|
|
|
}
|
|
|
|
}
|
|
|
|
assert(lf_num == 0);
|
|
|
|
}
|
|
|
|
else
|
2005-11-04 09:30:55 +00:00
|
|
|
i=raw_read_stdin(cbuf,BUFSIZZ);
|
1998-12-21 10:52:47 +00:00
|
|
|
|
2000-03-10 12:18:28 +00:00
|
|
|
if ((!c_ign_eof) && ((i <= 0) || (cbuf[0] == 'Q')))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"DONE\n");
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
ret=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
goto shut;
|
|
|
|
}
|
|
|
|
|
2000-03-10 12:18:28 +00:00
|
|
|
if ((!c_ign_eof) && (cbuf[0] == 'R'))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-04-10 12:08:46 +00:00
|
|
|
BIO_printf(bio_err,"RENEGOTIATING\n");
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_renegotiate(con);
|
1999-04-10 12:08:46 +00:00
|
|
|
cbuf_len=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
2011-12-31 22:59:57 +00:00
|
|
|
#ifndef OPENSSL_NO_HEARTBEATS
|
|
|
|
else if ((!c_ign_eof) && (cbuf[0] == 'B'))
|
|
|
|
{
|
|
|
|
BIO_printf(bio_err,"HEARTBEATING\n");
|
|
|
|
SSL_heartbeat(con);
|
|
|
|
cbuf_len=0;
|
|
|
|
}
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
cbuf_len=i;
|
|
|
|
cbuf_off=0;
|
1999-06-04 21:35:58 +00:00
|
|
|
#ifdef CHARSET_EBCDIC
|
|
|
|
ebcdic2ascii(cbuf, cbuf, i);
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
write_ssl=1;
|
1999-04-10 12:08:46 +00:00
|
|
|
read_tty=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
}
|
1. Changes for s_client.c to make it return non-zero exit code in case
of handshake failure
2. Changes to x509_certificate_type function (crypto/x509/x509type.c) to
make it recognize GOST certificates as EVP_PKT_SIGN|EVP_PKT_EXCH
(required for s3_srvr to accept GOST client certificates).
3. Changes to EVP
- adding of function EVP_PKEY_CTX_get0_peerkey
- Make function EVP_PKEY_derive_set_peerkey work for context with
ENCRYPT operation, because we use peerkey field in the context to
pass non-ephemeral secret key to GOST encrypt operation.
- added EVP_PKEY_CTRL_SET_IV control command. It is really
GOST-specific, but it is used in SSL code, so it has to go
in some header file, available during libssl compilation
4. Fix to HMAC to avoid call of OPENSSL_cleanse on undefined data
5. Include des.h if KSSL_DEBUG is defined into some libssl files, to
make debugging output which depends on constants defined there, work
and other KSSL_DEBUG output fixes
6. Declaration of real GOST ciphersuites, two authentication methods
SSL_aGOST94 and SSL_aGOST2001 and one key exchange method SSL_kGOST
7. Implementation of these methods.
8. Support for sending unsolicited serverhello extension if GOST
ciphersuite is selected. It is require for interoperability with
CryptoPro CSP 3.0 and 3.6 and controlled by
SSL_OP_CRYPTOPRO_TLSEXT_BUG constant.
This constant is added to SSL_OP_ALL, because it does nothing, if
non-GOST ciphersuite is selected, and all implementation of GOST
include compatibility with CryptoPro.
9. Support for CertificateVerify message without length field. It is
another CryptoPro bug, but support is made unconditional, because it
does no harm for draft-conforming implementation.
10. In tls1_mac extra copy of stream mac context is no more done.
When I've written currently commited code I haven't read
EVP_DigestSignFinal manual carefully enough and haven't noticed that
it does an internal digest ctx copying.
This implementation was tested against
1. CryptoPro CSP 3.6 client and server
2. Cryptopro CSP 3.0 server
2007-10-26 12:06:36 +00:00
|
|
|
|
|
|
|
ret=0;
|
1998-12-21 10:52:47 +00:00
|
|
|
shut:
|
2006-06-15 19:00:34 +00:00
|
|
|
if (in_init)
|
|
|
|
print_stuff(bio_c_out,con,full_log);
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_shutdown(con);
|
|
|
|
SHUTDOWN(SSL_get_fd(con));
|
|
|
|
end:
|
2006-03-18 14:24:02 +00:00
|
|
|
if (con != NULL)
|
|
|
|
{
|
|
|
|
if (prexit != 0)
|
|
|
|
print_stuff(bio_c_out,con,1);
|
|
|
|
SSL_free(con);
|
|
|
|
}
|
2012-07-03 16:37:50 +00:00
|
|
|
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
|
|
|
|
if (next_proto.data)
|
|
|
|
OPENSSL_free(next_proto.data);
|
|
|
|
#endif
|
1998-12-21 10:52:47 +00:00
|
|
|
if (ctx != NULL) SSL_CTX_free(ctx);
|
2004-11-16 17:30:59 +00:00
|
|
|
if (cert)
|
|
|
|
X509_free(cert);
|
2012-12-02 16:16:28 +00:00
|
|
|
if (crls)
|
|
|
|
sk_X509_CRL_pop_free(crls, X509_CRL_free);
|
2004-11-16 17:30:59 +00:00
|
|
|
if (key)
|
|
|
|
EVP_PKEY_free(key);
|
2012-12-12 00:50:26 +00:00
|
|
|
if (chain)
|
|
|
|
sk_X509_pop_free(chain, X509_free);
|
2004-11-16 17:30:59 +00:00
|
|
|
if (pass)
|
|
|
|
OPENSSL_free(pass);
|
2012-11-20 00:24:52 +00:00
|
|
|
if (vpm)
|
|
|
|
X509_VERIFY_PARAM_free(vpm);
|
2012-07-03 14:53:27 +00:00
|
|
|
ssl_excert_free(exc);
|
2012-11-17 14:42:22 +00:00
|
|
|
if (ssl_args)
|
|
|
|
sk_OPENSSL_STRING_free(ssl_args);
|
|
|
|
if (cctx)
|
|
|
|
SSL_CONF_CTX_free(cctx);
|
2012-12-29 23:38:20 +00:00
|
|
|
#ifndef OPENSSL_NO_JPAKE
|
|
|
|
if (jpake_secret && psk_key)
|
|
|
|
OPENSSL_free(psk_key);
|
|
|
|
#endif
|
2002-11-28 08:04:36 +00:00
|
|
|
if (cbuf != NULL) { OPENSSL_cleanse(cbuf,BUFSIZZ); OPENSSL_free(cbuf); }
|
|
|
|
if (sbuf != NULL) { OPENSSL_cleanse(sbuf,BUFSIZZ); OPENSSL_free(sbuf); }
|
|
|
|
if (mbuf != NULL) { OPENSSL_cleanse(mbuf,BUFSIZZ); OPENSSL_free(mbuf); }
|
1998-12-21 10:52:47 +00:00
|
|
|
if (bio_c_out != NULL)
|
|
|
|
{
|
|
|
|
BIO_free(bio_c_out);
|
|
|
|
bio_c_out=NULL;
|
|
|
|
}
|
2012-06-15 12:46:09 +00:00
|
|
|
if (bio_c_msg != NULL)
|
|
|
|
{
|
|
|
|
BIO_free(bio_c_msg);
|
|
|
|
bio_c_msg=NULL;
|
|
|
|
}
|
2001-06-23 16:37:32 +00:00
|
|
|
apps_shutdown();
|
2002-12-03 16:33:03 +00:00
|
|
|
OPENSSL_EXIT(ret);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
1999-04-19 21:31:43 +00:00
|
|
|
static void print_stuff(BIO *bio, SSL *s, int full)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
X509 *peer=NULL;
|
1998-12-21 10:52:47 +00:00
|
|
|
char *p;
|
2005-04-05 19:11:19 +00:00
|
|
|
static const char *space=" ";
|
1998-12-21 10:52:47 +00:00
|
|
|
char buf[BUFSIZ];
|
1999-04-12 17:23:57 +00:00
|
|
|
STACK_OF(X509) *sk;
|
|
|
|
STACK_OF(X509_NAME) *sk2;
|
2008-10-12 14:32:47 +00:00
|
|
|
const SSL_CIPHER *c;
|
1998-12-21 10:52:47 +00:00
|
|
|
X509_NAME *xn;
|
|
|
|
int j,i;
|
2005-09-30 23:35:33 +00:00
|
|
|
#ifndef OPENSSL_NO_COMP
|
2003-11-04 00:51:32 +00:00
|
|
|
const COMP_METHOD *comp, *expansion;
|
2005-09-30 23:35:33 +00:00
|
|
|
#endif
|
2011-11-15 23:50:52 +00:00
|
|
|
unsigned char *exportedkeymat;
|
1998-12-21 10:52:47 +00:00
|
|
|
|
|
|
|
if (full)
|
|
|
|
{
|
1999-05-17 20:46:43 +00:00
|
|
|
int got_a_chain = 0;
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
sk=SSL_get_peer_cert_chain(s);
|
|
|
|
if (sk != NULL)
|
|
|
|
{
|
1999-05-17 20:46:43 +00:00
|
|
|
got_a_chain = 1; /* we don't have it for SSL2 (yet) */
|
|
|
|
|
1998-12-21 11:00:56 +00:00
|
|
|
BIO_printf(bio,"---\nCertificate chain\n");
|
1999-04-12 17:23:57 +00:00
|
|
|
for (i=0; i<sk_X509_num(sk); i++)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-04-12 17:23:57 +00:00
|
|
|
X509_NAME_oneline(X509_get_subject_name(
|
2002-11-13 15:43:43 +00:00
|
|
|
sk_X509_value(sk,i)),buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"%2d s:%s\n",i,buf);
|
1999-04-12 17:23:57 +00:00
|
|
|
X509_NAME_oneline(X509_get_issuer_name(
|
2002-11-13 15:43:43 +00:00
|
|
|
sk_X509_value(sk,i)),buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio," i:%s\n",buf);
|
1999-03-31 12:06:30 +00:00
|
|
|
if (c_showcerts)
|
1999-04-12 17:23:57 +00:00
|
|
|
PEM_write_bio_X509(bio,sk_X509_value(sk,i));
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
BIO_printf(bio,"---\n");
|
|
|
|
peer=SSL_get_peer_certificate(s);
|
|
|
|
if (peer != NULL)
|
|
|
|
{
|
|
|
|
BIO_printf(bio,"Server certificate\n");
|
1999-05-17 20:46:43 +00:00
|
|
|
if (!(c_showcerts && got_a_chain)) /* Redundant if we showed the whole chain */
|
1999-03-31 12:06:30 +00:00
|
|
|
PEM_write_bio_X509(bio,peer);
|
1998-12-21 10:52:47 +00:00
|
|
|
X509_NAME_oneline(X509_get_subject_name(peer),
|
2002-11-13 15:43:43 +00:00
|
|
|
buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"subject=%s\n",buf);
|
|
|
|
X509_NAME_oneline(X509_get_issuer_name(peer),
|
2002-11-13 15:43:43 +00:00
|
|
|
buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"issuer=%s\n",buf);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
BIO_printf(bio,"no peer certificate available\n");
|
|
|
|
|
1999-04-12 17:23:57 +00:00
|
|
|
sk2=SSL_get_client_CA_list(s);
|
1999-04-14 23:10:11 +00:00
|
|
|
if ((sk2 != NULL) && (sk_X509_NAME_num(sk2) > 0))
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
|
|
|
BIO_printf(bio,"---\nAcceptable client certificate CA names\n");
|
1999-04-12 17:23:57 +00:00
|
|
|
for (i=0; i<sk_X509_NAME_num(sk2); i++)
|
1998-12-21 10:52:47 +00:00
|
|
|
{
|
1999-04-12 17:23:57 +00:00
|
|
|
xn=sk_X509_NAME_value(sk2,i);
|
1998-12-21 10:52:47 +00:00
|
|
|
X509_NAME_oneline(xn,buf,sizeof(buf));
|
|
|
|
BIO_write(bio,buf,strlen(buf));
|
|
|
|
BIO_write(bio,"\n",1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_printf(bio,"---\nNo client certificate CA names sent\n");
|
|
|
|
}
|
2002-11-13 15:43:43 +00:00
|
|
|
p=SSL_get_shared_ciphers(s,buf,sizeof buf);
|
1998-12-21 10:52:47 +00:00
|
|
|
if (p != NULL)
|
|
|
|
{
|
1999-04-27 16:48:06 +00:00
|
|
|
/* This works only for SSL 2. In later protocol
|
|
|
|
* versions, the client does not know what other
|
|
|
|
* ciphers (in addition to the one to be used
|
|
|
|
* in the current connection) the server supports. */
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"---\nCiphers common between both SSL endpoints:\n");
|
|
|
|
j=i=0;
|
|
|
|
while (*p)
|
|
|
|
{
|
|
|
|
if (*p == ':')
|
|
|
|
{
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_write(bio,space,15-j%25);
|
1998-12-21 10:52:47 +00:00
|
|
|
i++;
|
|
|
|
j=0;
|
|
|
|
BIO_write(bio,((i%3)?" ":"\n"),1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
BIO_write(bio,p,1);
|
|
|
|
j++;
|
|
|
|
}
|
|
|
|
p++;
|
|
|
|
}
|
|
|
|
BIO_write(bio,"\n",1);
|
|
|
|
}
|
|
|
|
|
2012-07-08 14:22:45 +00:00
|
|
|
ssl_print_sigalgs(bio, s);
|
2012-09-08 13:59:51 +00:00
|
|
|
ssl_print_tmp_key(bio, s);
|
2012-03-06 14:28:21 +00:00
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"---\nSSL handshake has read %ld bytes and written %ld bytes\n",
|
|
|
|
BIO_number_read(SSL_get_rbio(s)),
|
|
|
|
BIO_number_written(SSL_get_wbio(s)));
|
|
|
|
}
|
2011-04-29 22:37:12 +00:00
|
|
|
BIO_printf(bio,(SSL_cache_hit(s)?"---\nReused, ":"---\nNew, "));
|
1998-12-21 10:52:47 +00:00
|
|
|
c=SSL_get_current_cipher(s);
|
|
|
|
BIO_printf(bio,"%s, Cipher is %s\n",
|
|
|
|
SSL_CIPHER_get_version(c),
|
|
|
|
SSL_CIPHER_get_name(c));
|
1999-02-15 21:05:21 +00:00
|
|
|
if (peer != NULL) {
|
|
|
|
EVP_PKEY *pktmp;
|
|
|
|
pktmp = X509_get_pubkey(peer);
|
1998-12-21 10:56:39 +00:00
|
|
|
BIO_printf(bio,"Server public key is %d bit\n",
|
1999-02-15 21:05:21 +00:00
|
|
|
EVP_PKEY_bits(pktmp));
|
|
|
|
EVP_PKEY_free(pktmp);
|
|
|
|
}
|
2009-12-08 13:42:08 +00:00
|
|
|
BIO_printf(bio, "Secure Renegotiation IS%s supported\n",
|
|
|
|
SSL_get_secure_renegotiation_support(s) ? "" : " NOT");
|
2005-09-30 23:35:33 +00:00
|
|
|
#ifndef OPENSSL_NO_COMP
|
2003-10-06 12:19:38 +00:00
|
|
|
comp=SSL_get_current_compression(s);
|
2003-11-04 00:51:32 +00:00
|
|
|
expansion=SSL_get_current_expansion(s);
|
2003-10-06 12:19:38 +00:00
|
|
|
BIO_printf(bio,"Compression: %s\n",
|
|
|
|
comp ? SSL_COMP_get_name(comp) : "NONE");
|
|
|
|
BIO_printf(bio,"Expansion: %s\n",
|
2003-11-04 00:51:32 +00:00
|
|
|
expansion ? SSL_COMP_get_name(expansion) : "NONE");
|
2005-09-30 23:35:33 +00:00
|
|
|
#endif
|
2012-06-03 22:00:21 +00:00
|
|
|
|
2012-02-09 15:43:58 +00:00
|
|
|
#ifdef SSL_DEBUG
|
2011-05-09 15:44:01 +00:00
|
|
|
{
|
|
|
|
/* Print out local port of connection: useful for debugging */
|
|
|
|
int sock;
|
|
|
|
struct sockaddr_in ladd;
|
|
|
|
socklen_t ladd_size = sizeof(ladd);
|
|
|
|
sock = SSL_get_fd(s);
|
|
|
|
getsockname(sock, (struct sockaddr *)&ladd, &ladd_size);
|
|
|
|
BIO_printf(bio_c_out, "LOCAL PORT is %u\n", ntohs(ladd.sin_port));
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-04-15 22:07:47 +00:00
|
|
|
#if !defined(OPENSSL_NO_TLSEXT)
|
|
|
|
# if !defined(OPENSSL_NO_NEXTPROTONEG)
|
2012-06-03 22:00:21 +00:00
|
|
|
if (next_proto.status != -1) {
|
|
|
|
const unsigned char *proto;
|
|
|
|
unsigned int proto_len;
|
|
|
|
SSL_get0_next_proto_negotiated(s, &proto, &proto_len);
|
|
|
|
BIO_printf(bio, "Next protocol: (%d) ", next_proto.status);
|
|
|
|
BIO_write(bio, proto, proto_len);
|
|
|
|
BIO_write(bio, "\n", 1);
|
|
|
|
}
|
2013-11-13 23:20:22 +00:00
|
|
|
# endif
|
2013-04-15 22:07:47 +00:00
|
|
|
{
|
|
|
|
const unsigned char *proto;
|
|
|
|
unsigned int proto_len;
|
|
|
|
SSL_get0_alpn_selected(s, &proto, &proto_len);
|
|
|
|
if (proto_len > 0)
|
|
|
|
{
|
|
|
|
BIO_printf(bio, "ALPN protocol: ");
|
|
|
|
BIO_write(bio, proto, proto_len);
|
|
|
|
BIO_write(bio, "\n", 1);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
BIO_printf(bio, "No ALPN negotiated\n");
|
|
|
|
}
|
2012-06-03 22:00:21 +00:00
|
|
|
#endif
|
|
|
|
|
2011-11-15 22:59:20 +00:00
|
|
|
{
|
|
|
|
SRTP_PROTECTION_PROFILE *srtp_profile=SSL_get_selected_srtp_profile(s);
|
|
|
|
|
|
|
|
if(srtp_profile)
|
|
|
|
BIO_printf(bio,"SRTP Extension negotiated, profile=%s\n",
|
|
|
|
srtp_profile->name);
|
|
|
|
}
|
|
|
|
|
1998-12-21 10:52:47 +00:00
|
|
|
SSL_SESSION_print(bio,SSL_get_session(s));
|
2012-02-11 23:20:53 +00:00
|
|
|
if (keymatexportlabel != NULL)
|
|
|
|
{
|
2011-11-15 23:50:52 +00:00
|
|
|
BIO_printf(bio, "Keying material exporter:\n");
|
|
|
|
BIO_printf(bio, " Label: '%s'\n", keymatexportlabel);
|
|
|
|
BIO_printf(bio, " Length: %i bytes\n", keymatexportlen);
|
|
|
|
exportedkeymat = OPENSSL_malloc(keymatexportlen);
|
2012-02-11 23:20:53 +00:00
|
|
|
if (exportedkeymat != NULL)
|
|
|
|
{
|
|
|
|
if (!SSL_export_keying_material(s, exportedkeymat,
|
|
|
|
keymatexportlen,
|
|
|
|
keymatexportlabel,
|
|
|
|
strlen(keymatexportlabel),
|
|
|
|
NULL, 0, 0))
|
|
|
|
{
|
|
|
|
BIO_printf(bio, " Error\n");
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2011-11-15 23:50:52 +00:00
|
|
|
BIO_printf(bio, " Keying material: ");
|
|
|
|
for (i=0; i<keymatexportlen; i++)
|
|
|
|
BIO_printf(bio, "%02X",
|
|
|
|
exportedkeymat[i]);
|
|
|
|
BIO_printf(bio, "\n");
|
2012-02-11 23:20:53 +00:00
|
|
|
}
|
2011-11-15 23:50:52 +00:00
|
|
|
OPENSSL_free(exportedkeymat);
|
2012-02-11 23:20:53 +00:00
|
|
|
}
|
2011-11-15 23:50:52 +00:00
|
|
|
}
|
1998-12-21 10:52:47 +00:00
|
|
|
BIO_printf(bio,"---\n");
|
1998-12-21 10:56:39 +00:00
|
|
|
if (peer != NULL)
|
|
|
|
X509_free(peer);
|
2001-10-16 14:24:46 +00:00
|
|
|
/* flush, or debugging output gets mixed with http response */
|
2007-08-12 17:44:32 +00:00
|
|
|
(void)BIO_flush(bio);
|
1998-12-21 10:52:47 +00:00
|
|
|
}
|
|
|
|
|
2008-09-03 12:29:57 +00:00
|
|
|
#ifndef OPENSSL_NO_TLSEXT
|
|
|
|
|
2007-09-26 21:56:59 +00:00
|
|
|
static int ocsp_resp_cb(SSL *s, void *arg)
|
|
|
|
{
|
|
|
|
const unsigned char *p;
|
|
|
|
int len;
|
|
|
|
OCSP_RESPONSE *rsp;
|
|
|
|
len = SSL_get_tlsext_status_ocsp_resp(s, &p);
|
|
|
|
BIO_puts(arg, "OCSP response: ");
|
|
|
|
if (!p)
|
|
|
|
{
|
|
|
|
BIO_puts(arg, "no response sent\n");
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
rsp = d2i_OCSP_RESPONSE(NULL, &p, len);
|
|
|
|
if (!rsp)
|
|
|
|
{
|
|
|
|
BIO_puts(arg, "response parse error\n");
|
|
|
|
BIO_dump_indent(arg, (char *)p, len, 4);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
BIO_puts(arg, "\n======================================\n");
|
|
|
|
OCSP_RESPONSE_print(arg, rsp, 0);
|
|
|
|
BIO_puts(arg, "======================================\n");
|
|
|
|
OCSP_RESPONSE_free(rsp);
|
|
|
|
return 1;
|
|
|
|
}
|
2008-09-03 12:29:57 +00:00
|
|
|
|
|
|
|
#endif
|