Skip to content
Snippets Groups Projects
s_client.c 63 KiB
Newer Older
  • Learn to ignore specific revisions
  • /* apps/s_client.c */
    
    /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
    
     * All rights reserved.
     *
     * This package is an SSL implementation written
     * by Eric Young (eay@cryptsoft.com).
     * The implementation was written so as to conform with Netscapes SSL.
     * 
     * This library is free for commercial and non-commercial use as long as
     * the following conditions are aheared to.  The following conditions
     * apply to all code found in this distribution, be it the RC4, RSA,
     * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
     * included with this distribution is covered by the same copyright terms
     * except that the holder is Tim Hudson (tjh@cryptsoft.com).
     * 
     * Copyright remains Eric Young's, and as such any Copyright notices in
     * the code are not to be removed.
     * If this package is used in a product, Eric Young should be given attribution
     * as the author of the parts of the library used.
     * This can be in the form of a textual message at program startup or
     * in documentation (online or textual) provided with the package.
     * 
     * Redistribution and use in source and binary forms, with or without
     * modification, are permitted provided that the following conditions
     * are met:
     * 1. Redistributions of source code must retain the copyright
     *    notice, this list of conditions and the following disclaimer.
     * 2. Redistributions in binary form must reproduce the above copyright
     *    notice, this list of conditions and the following disclaimer in the
     *    documentation and/or other materials provided with the distribution.
     * 3. All advertising materials mentioning features or use of this software
     *    must display the following acknowledgement:
     *    "This product includes cryptographic software written by
     *     Eric Young (eay@cryptsoft.com)"
     *    The word 'cryptographic' can be left out if the rouines from the library
     *    being used are not cryptographic related :-).
     * 4. If you include any Windows specific code (or a derivative thereof) from 
     *    the apps directory (application code) you must include an acknowledgement:
     *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
     * 
     * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
     * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
     * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     * SUCH DAMAGE.
     * 
     * The licence and distribution terms for any publically available version or
     * derivative of this code cannot be changed.  i.e. this code cannot simply be
     * copied and put under another distribution licence
     * [including the GNU Public Licence.]
     */
    
    /* ====================================================================
    
    Bodo Möller's avatar
    Bodo Möller committed
     * Copyright (c) 1998-2006 The OpenSSL Project.  All rights reserved.
    
     *
     * Redistribution and use in source and binary forms, with or without
     * modification, are permitted provided that the following conditions
     * are met:
     *
     * 1. Redistributions of source code must retain the above copyright
     *    notice, this list of conditions and the following disclaimer. 
     *
     * 2. Redistributions in binary form must reproduce the above copyright
     *    notice, this list of conditions and the following disclaimer in
     *    the documentation and/or other materials provided with the
     *    distribution.
     *
     * 3. All advertising materials mentioning features or use of this
     *    software must display the following acknowledgment:
     *    "This product includes software developed by the OpenSSL Project
     *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
     *
     * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
     *    endorse or promote products derived from this software without
     *    prior written permission. For written permission, please contact
     *    openssl-core@openssl.org.
     *
     * 5. Products derived from this software may not be called "OpenSSL"
     *    nor may "OpenSSL" appear in their names without prior written
     *    permission of the OpenSSL Project.
     *
     * 6. Redistributions of any form whatsoever must retain the following
     *    acknowledgment:
     *    "This product includes software developed by the OpenSSL Project
     *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
     *
     * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
     * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
     * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
     * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
     * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
     * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
     * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
     * OF THE POSSIBILITY OF SUCH DAMAGE.
     * ====================================================================
     *
     * This product includes cryptographic software written by Eric Young
     * (eay@cryptsoft.com).  This product includes software written by Tim
     * Hudson (tjh@cryptsoft.com).
     *
     */
    
    /* ====================================================================
     * Copyright 2005 Nokia. All rights reserved.
     *
     * The portions of the attached software ("Contribution") is developed by
     * Nokia Corporation and is licensed pursuant to the OpenSSL open source
     * license.
     *
     * The Contribution, originally written by Mika Kousa and Pasi Eronen of
     * Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
     * support (see RFC 4279) to OpenSSL.
     *
     * No patent licenses or other rights except those expressly stated in
     * the OpenSSL open source license shall be deemed granted or received
     * expressly, by implication, estoppel, or otherwise.
     *
     * No assurances are provided by Nokia that the Contribution does not
     * infringe the patent or other intellectual property rights of any third
     * party or that the license provides you with all the necessary rights
     * to make use of the Contribution.
     *
     * THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
     * ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
     * SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
     * OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
     * OTHERWISE.
     */
    
    Bodo Möller's avatar
    Bodo Möller committed
    #include <assert.h>
    
    Ulf Möller's avatar
    Ulf Möller committed
    #include <stdio.h>
    #include <stdlib.h>
    #include <string.h>
    
    #include <openssl/e_os2.h>
    
    Ulf Möller's avatar
    Ulf Möller committed
    #define APPS_WIN16
    #endif
    
    
    Ulf Möller's avatar
    Ulf Möller committed
    /* With IPv6, it looks like Digital has mixed up the proper order of
       recursive header file inclusion, resulting in the compiler complaining
       that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
       is needed to have fileno() declared correctly...  So let's define u_int */
    
    #if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
    
    Ulf Möller's avatar
    Ulf Möller committed
    #define __U_INT
    typedef unsigned int u_int;
    #endif
    
    
    #define USE_SOCKETS
    #include "apps.h"
    
    #include <openssl/x509.h>
    #include <openssl/ssl.h>
    #include <openssl/err.h>
    #include <openssl/pem.h>
    
    #include <openssl/rand.h>
    
    #include <openssl/ocsp.h>
    
    Ben Laurie's avatar
    Ben Laurie committed
    #ifndef OPENSSL_NO_SRP
    #include <openssl/srp.h>
    #endif
    
    #include "s_apps.h"
    
    Ben Laurie's avatar
    Ben Laurie committed
    #include "timeouts.h"
    
    #if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
    
    Ulf Möller's avatar
    Ulf Möller committed
    /* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
    
    Ulf Möller's avatar
    Ulf Möller committed
    #undef FIONBIO
    #endif
    
    
    #undef PROG
    #define PROG	s_client_main
    
    /*#define SSL_HOST_NAME	"www.netscape.com" */
    /*#define SSL_HOST_NAME	"193.118.187.102" */
    #define SSL_HOST_NAME	"localhost"
    
    /*#define TEST_CERT "client.pem" */ /* no default cert. */
    
    #undef BUFSIZZ
    #define BUFSIZZ 1024*8
    
    extern int verify_depth;
    extern int verify_error;
    
    extern int verify_return_error;
    
    
    #ifdef FIONBIO
    static int c_nbio=0;
    #endif
    static int c_Pause=0;
    static int c_debug=0;
    
    #ifndef OPENSSL_NO_TLSEXT
    static int c_tlsextdebug=0;
    
    static int c_status_req=0;
    
    static int c_msg=0;
    
    static int c_showcerts=0;
    
    Ben Laurie's avatar
    Ben Laurie committed
    static char *keymatexportlabel=NULL;
    static int keymatexportlen=20;
    
    
    static void sc_usage(void);
    static void print_stuff(BIO *berr,SSL *con,int full);
    
    #ifndef OPENSSL_NO_TLSEXT
    
    static int ocsp_resp_cb(SSL *s, void *arg);
    
    #endif
    
    static BIO *bio_c_out=NULL;
    
    static int c_quiet=0;
    
    #ifndef OPENSSL_NO_PSK
    /* Default PSK identity and key */
    static char *psk_identity="Client_identity";
    
    /*char *psk_key=NULL;  by default PSK is not used */
    
    
    static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
    	unsigned int max_identity_len, unsigned char *psk,
    	unsigned int max_psk_len)
    	{
    	unsigned int psk_len = 0;
    	int ret;
            BIGNUM *bn=NULL;
    
    	if (c_debug)
    		BIO_printf(bio_c_out, "psk_client_cb\n");
    	if (!hint)
                    {
                    /* no ServerKeyExchange message*/
    		if (c_debug)
    			BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n");
                    }
            else if (c_debug)
    		BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint);
    
    	/* lookup PSK identity and PSK key based on the given identity hint here */
    
    	ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity);
    
    	if (ret < 0 || (unsigned int)ret > max_identity_len)
    
    		goto out_err;
    	if (c_debug)
    		BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, ret);
            ret=BN_hex2bn(&bn, psk_key);
            if (!ret)
                    {
                    BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
                    if (bn)
                            BN_free(bn);
                    return 0;
                    }
    
    
            if ((unsigned int)BN_num_bytes(bn) > max_psk_len)
    
                    {
                    BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
                            max_psk_len, BN_num_bytes(bn));
                    BN_free(bn);
                    return 0;
                    }
    
            psk_len=BN_bn2bin(bn, psk);
            BN_free(bn);
            if (psk_len == 0)
                    goto out_err;
    
    	if (c_debug)
    		BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len);
    
            return psk_len;
     out_err:
    	if (c_debug)
    		BIO_printf(bio_err, "Error in PSK client callback\n");
            return 0;
    	}
    #endif
    
    
    Ulf Möller's avatar
    Ulf Möller committed
    static void sc_usage(void)
    
    	BIO_printf(bio_err,"usage: s_client args\n");
    
    	BIO_printf(bio_err,"\n");
    	BIO_printf(bio_err," -host host     - use -connect instead\n");
    	BIO_printf(bio_err," -port port     - use -connect instead\n");
    
    	BIO_printf(bio_err," -connect host:port - connect over TCP/IP (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
    	BIO_printf(bio_err," -unix path    - connect over unix domain sockets\n");
    
    	BIO_printf(bio_err," -verify arg   - turn on peer certificate verification\n");
    
    	BIO_printf(bio_err," -verify_return_error - return verification errors\n");
    
    	BIO_printf(bio_err," -cert arg     - certificate file to use, PEM format assumed\n");
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
    	BIO_printf(bio_err," -key arg      - Private key file to use, in cert file if\n");
    
    	BIO_printf(bio_err,"                 not specified but cert file is.\n");
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	BIO_printf(bio_err," -keyform arg  - key format (PEM or DER) PEM default\n");
    	BIO_printf(bio_err," -pass arg     - private key file pass phrase source\n");
    
    	BIO_printf(bio_err," -CApath arg   - PEM format directory of CA's\n");
    	BIO_printf(bio_err," -CAfile arg   - PEM format file of CA's\n");
    
    	BIO_printf(bio_err," -trusted_first - Use local CA's first when building trust chain\n");
    
    	BIO_printf(bio_err," -reconnect    - Drop and re-make the connection with the same Session-ID\n");
    	BIO_printf(bio_err," -pause        - sleep(1) after each read(2) and write(2) system call\n");
    
    	BIO_printf(bio_err," -prexit       - print session information even on connection failure\n");
    
    	BIO_printf(bio_err," -showcerts    - show all certificates in the chain\n");
    
    	BIO_printf(bio_err," -debug        - extra output\n");
    
    #ifdef WATT32
    	BIO_printf(bio_err," -wdebug       - WATT-32 tcp debugging\n");
    #endif
    
    	BIO_printf(bio_err," -msg          - Show protocol messages\n");
    
    	BIO_printf(bio_err," -nbio_test    - more ssl protocol testing\n");
    	BIO_printf(bio_err," -state        - print the 'ssl' states\n");
    #ifdef FIONBIO
    	BIO_printf(bio_err," -nbio         - Run with non-blocking IO\n");
    
    #endif
    	BIO_printf(bio_err," -crlf         - convert LF from terminal into CRLF\n");
    
    	BIO_printf(bio_err," -quiet        - no s_client output\n");
    
    	BIO_printf(bio_err," -ign_eof      - ignore input eof (default when -quiet)\n");
    
    	BIO_printf(bio_err," -no_ign_eof   - don't ignore input eof\n");
    
    #ifndef OPENSSL_NO_PSK
    	BIO_printf(bio_err," -psk_identity arg - PSK identity\n");
    	BIO_printf(bio_err," -psk arg      - PSK in hex (without 0x)\n");
    
    # ifndef OPENSSL_NO_JPAKE
    
    	BIO_printf(bio_err," -jpake arg    - JPAKE secret to use\n");
    # endif
    
    Ben Laurie's avatar
    Ben Laurie committed
    #endif
    #ifndef OPENSSL_NO_SRP
    	BIO_printf(bio_err," -srpuser user     - SRP authentification for 'user'\n");
    	BIO_printf(bio_err," -srppass arg      - password for 'user'\n");
    	BIO_printf(bio_err," -srp_lateuser     - SRP username into second ClientHello message\n");
    	BIO_printf(bio_err," -srp_moregroups   - Tolerate other than the known g N values.\n");
    
    Dominik Neubauer's avatar
    Dominik Neubauer committed
    	BIO_printf(bio_err," -srp_strength int - minimal length in bits for N (default %d).\n",SRP_MINIMAL_N);
    
    #ifndef OPENSSL_NO_SSL3_METHOD
    
    	BIO_printf(bio_err," -ssl3         - just use SSLv3\n");
    
    	BIO_printf(bio_err," -tls1_2       - just use TLSv1.2\n");
    
    	BIO_printf(bio_err," -tls1_1       - just use TLSv1.1\n");
    
    	BIO_printf(bio_err," -tls1         - just use TLSv1\n");
    
    Ben Laurie's avatar
    Ben Laurie committed
    	BIO_printf(bio_err," -dtls1        - just use DTLSv1\n");    
    
    Bodo Moeller's avatar
    Bodo Moeller committed
    	BIO_printf(bio_err," -fallback_scsv - send TLS_FALLBACK_SCSV\n");
    
    	BIO_printf(bio_err," -mtu          - set the link layer MTU\n");
    
    Kurt Roeckx's avatar
    Kurt Roeckx committed
    	BIO_printf(bio_err," -no_tls1_2/-no_tls1_1/-no_tls1/-no_ssl3 - turn off that protocol\n");
    
    	BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
    
    	BIO_printf(bio_err," -cipher       - preferred cipher to use, use the 'openssl ciphers'\n");
    
    	BIO_printf(bio_err,"                 command to see what is available\n");
    
    	BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
    	BIO_printf(bio_err,"                 for those protocols that support it, where\n");
    	BIO_printf(bio_err,"                 'prot' defines which one to assume.  Currently,\n");
    
    Ben Laurie's avatar
    Ben Laurie committed
    	BIO_printf(bio_err,"                 only \"smtp\", \"pop3\", \"imap\", \"ftp\" and \"xmpp\"\n");
    	BIO_printf(bio_err,"                 are supported.\n");
    
    	BIO_printf(bio_err," -xmpphost host - When used with \"-starttls xmpp\" specifies the virtual host.\n");
    
    	BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
    
    	BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
    
    	BIO_printf(bio_err," -sess_out arg - file to write SSL session to\n");
    	BIO_printf(bio_err," -sess_in arg  - file to read SSL session from\n");
    
    #ifndef OPENSSL_NO_TLSEXT
    	BIO_printf(bio_err," -servername host  - Set TLS extension servername in ClientHello\n");
    
    	BIO_printf(bio_err," -tlsextdebug      - hex dump of all TLS extensions received\n");
    
    	BIO_printf(bio_err," -status           - request certificate status from server\n");
    
    	BIO_printf(bio_err," -no_ticket        - disable use of RFC4507bis session tickets\n");
    
    	BIO_printf(bio_err," -serverinfo types - send empty ClientHello extensions (comma-separated numbers)\n");
    
    # ifndef OPENSSL_NO_NEXTPROTONEG
    
    	BIO_printf(bio_err," -nextprotoneg arg - enable NPN extension, considering named protocols supported (comma-separated list)\n");
    # endif
    
    	BIO_printf(bio_err," -alpn arg         - enable ALPN extension, considering named protocols supported (comma-separated list)\n");
    
    	BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	BIO_printf(bio_err," -use_srtp profiles - Offer SRTP key management with a colon-separated profile list\n");
    
    Ben Laurie's avatar
    Ben Laurie committed
     	BIO_printf(bio_err," -keymatexport label   - Export keying material using label\n");
     	BIO_printf(bio_err," -keymatexportlen len  - Export len bytes of keying material (default 20)\n");
    
    #ifndef OPENSSL_NO_TLSEXT
    
    /* This is a context that we pass to callbacks */
    typedef struct tlsextctx_st {
       BIO * biodebug;
       int ack;
    } tlsextctx;
    
    
    
    Bodo Möller's avatar
    Bodo Möller committed
    static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
    	{
    
    	tlsextctx * p = (tlsextctx *) arg;
    
    	const char * hn= SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
    
    	if (SSL_get_servername_type(s) != -1) 
     	        p->ack = !SSL_session_reused(s) && hn != NULL;
    	else 
    
    		BIO_printf(bio_err,"Can't use SSL_get_servername\n");
    
    	return SSL_TLSEXT_ERR_OK;
    
    Bodo Möller's avatar
    Bodo Möller committed
    	}
    
    Ben Laurie's avatar
    Ben Laurie committed
    #ifndef OPENSSL_NO_SRP
    
    /* This is a context that we pass to all callbacks */
    typedef struct srp_arg_st
    	{
    	char *srppassin;
    	char *srplogin;
    	int msg;   /* copy from c_msg */
    	int debug; /* copy from c_debug */
    	int amp;   /* allow more groups */
    	int strength /* minimal size for N */ ;
    	} SRP_ARG;
    
    #define SRP_NUMBER_ITERATIONS_FOR_PRIME 64
    
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    static int srp_Verify_N_and_g(const BIGNUM *N, const BIGNUM *g)
    
    Ben Laurie's avatar
    Ben Laurie committed
    	{
    	BN_CTX *bn_ctx = BN_CTX_new();
    	BIGNUM *p = BN_new();
    	BIGNUM *r = BN_new();
    	int ret =
    		g != NULL && N != NULL && bn_ctx != NULL && BN_is_odd(N) &&
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    		BN_is_prime_ex(N, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
    
    Ben Laurie's avatar
    Ben Laurie committed
    		p != NULL && BN_rshift1(p, N) &&
    
    		/* p = (N-1)/2 */
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    		BN_is_prime_ex(p, SRP_NUMBER_ITERATIONS_FOR_PRIME, bn_ctx, NULL) &&
    
    Ben Laurie's avatar
    Ben Laurie committed
    		r != NULL &&
    
    		/* verify g^((N-1)/2) == -1 (mod N) */
    		BN_mod_exp(r, g, p, N, bn_ctx) &&
    		BN_add_word(r, 1) &&
    		BN_cmp(r, N) == 0;
    
    	if(r)
    		BN_free(r);
    	if(p)
    		BN_free(p);
    	if(bn_ctx)
    		BN_CTX_free(bn_ctx);
    	return ret;
    	}
    
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    /* This callback is used here for two purposes:
       - extended debugging
       - making some primality tests for unknown groups
       The callback is only called for a non default group.
    
       An application does not need the call back at all if
       only the stanard groups are used.  In real life situations, 
       client and server already share well known groups, 
       thus there is no need to verify them. 
       Furthermore, in case that a server actually proposes a group that
       is not one of those defined in RFC 5054, it is more appropriate 
       to add the group to a static list and then compare since 
       primality tests are rather cpu consuming.
    */
    
    
    Ben Laurie's avatar
    Ben Laurie committed
    static int MS_CALLBACK ssl_srp_verify_param_cb(SSL *s, void *arg)
    	{
    	SRP_ARG *srp_arg = (SRP_ARG *)arg;
    	BIGNUM *N = NULL, *g = NULL;
    	if (!(N = SSL_get_srp_N(s)) || !(g = SSL_get_srp_g(s)))
    		return 0;
    	if (srp_arg->debug || srp_arg->msg || srp_arg->amp == 1)
    		{
        		BIO_printf(bio_err, "SRP parameters:\n"); 
    		BIO_printf(bio_err,"\tN="); BN_print(bio_err,N);
    		BIO_printf(bio_err,"\n\tg="); BN_print(bio_err,g);
    		BIO_printf(bio_err,"\n");
    		}
    
    	if (SRP_check_known_gN_param(g,N))
    		return 1;
    
    	if (srp_arg->amp == 1)
    		{
    		if (srp_arg->debug)
    			BIO_printf(bio_err, "SRP param N and g are not known params, going to check deeper.\n");
    
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    /* The srp_moregroups is a real debugging feature.
    
    Ben Laurie's avatar
    Ben Laurie committed
       Implementors should rather add the value to the known ones.
       The minimal size has already been tested.
    */
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    		if (BN_num_bits(g) <= BN_BITS && srp_Verify_N_and_g(N,g))
    
    Ben Laurie's avatar
    Ben Laurie committed
    			return 1;
    		}	
    	BIO_printf(bio_err, "SRP param N and g rejected.\n");
    	return 0;
    	}
    
    #define PWD_STRLEN 1024
    
    static char * MS_CALLBACK ssl_give_srp_client_pwd_cb(SSL *s, void *arg)
    	{
    	SRP_ARG *srp_arg = (SRP_ARG *)arg;
    	char *pass = (char *)OPENSSL_malloc(PWD_STRLEN+1);
    	PW_CB_DATA cb_tmp;
    	int l;
    
    	cb_tmp.password = (char *)srp_arg->srppassin;
    	cb_tmp.prompt_info = "SRP user";
    	if ((l = password_callback(pass, PWD_STRLEN, 0, &cb_tmp))<0)
    		{
    		BIO_printf (bio_err, "Can't read Password\n");
    		OPENSSL_free(pass);
    		return NULL;
    		}
    	*(pass+l)= '\0';
    
    	return pass;
    	}
    
    #endif
    
    Ben Laurie's avatar
    Ben Laurie committed
    	char *srtp_profiles = NULL;
    
    Ben Laurie's avatar
    Ben Laurie committed
    
    
    # ifndef OPENSSL_NO_NEXTPROTONEG
    
    /* This the context that we pass to next_proto_cb */
    typedef struct tlsextnextprotoctx_st {
    	unsigned char *data;
    	unsigned short len;
    	int status;
    } tlsextnextprotoctx;
    
    static tlsextnextprotoctx next_proto;
    
    static int next_proto_cb(SSL *s, unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg)
    	{
    	tlsextnextprotoctx *ctx = arg;
    
    	if (!c_quiet)
    		{
    		/* We can assume that |in| is syntactically valid. */
    		unsigned i;
    		BIO_printf(bio_c_out, "Protocols advertised by server: ");
    		for (i = 0; i < inlen; )
    			{
    			if (i)
    				BIO_write(bio_c_out, ", ", 2);
    			BIO_write(bio_c_out, &in[i + 1], in[i]);
    			i += in[i] + 1;
    			}
    		BIO_write(bio_c_out, "\n", 1);
    		}
    
    	ctx->status = SSL_select_next_proto(out, outlen, in, inlen, ctx->data, ctx->len);
    	return SSL_TLSEXT_ERR_OK;
    	}
    
    # endif  /* ndef OPENSSL_NO_NEXTPROTONEG */
    
    static int serverinfo_cli_parse_cb(SSL* s, unsigned int ext_type,
    				   const unsigned char* in, size_t inlen, 
    				   int* al, void* arg)
    
    	{
    	char pem_name[100];
    	unsigned char ext_buf[4 + 65536];
    
    	/* Reconstruct the type/len fields prior to extension data */
    	ext_buf[0] = ext_type >> 8;
    	ext_buf[1] = ext_type & 0xFF;
    	ext_buf[2] = inlen >> 8;
    	ext_buf[3] = inlen & 0xFF;
    	memcpy(ext_buf+4, in, inlen);
    
    
    	BIO_snprintf(pem_name, sizeof(pem_name), "SERVERINFO FOR EXTENSION %d",
    		     ext_type);
    
    	PEM_write_bio(bio_c_out, pem_name, "", ext_buf, 4 + inlen);
    	return 1;
    	}
    
    
    enum
    {
    	PROTO_OFF	= 0,
    	PROTO_SMTP,
    	PROTO_POP3,
    	PROTO_IMAP,
    
    Ben Laurie's avatar
    Ben Laurie committed
    	PROTO_FTP,
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	PROTO_XMPP
    
    Ulf Möller's avatar
    Ulf Möller committed
    int MAIN(int argc, char **argv)
    
    #ifndef OPENSSL_NO_KRB5
    	KSSL_CTX *kctx;
    #endif
    
    	int s,k,width,state=0;
    
    	char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
    
    	int cbuf_len,cbuf_off;
    	int sbuf_len,sbuf_off;
    	fd_set readfds,writefds;
    	short port=PORT;
    	int full_log=1;
    	char *host=SSL_HOST_NAME;
    
    	const char *unix_path = NULL;
    
    	char *xmpphost = NULL;
    
    	char *cert_file=NULL,*key_file=NULL,*chain_file=NULL;
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	int cert_format = FORMAT_PEM, key_format = FORMAT_PEM;
    	char *passarg = NULL, *pass = NULL;
    	X509 *cert = NULL;
    	EVP_PKEY *key = NULL;
    
    	STACK_OF(X509) *chain = NULL;
    
    	char *chCApath=NULL,*chCAfile=NULL;
    	char *vfyCApath=NULL,*vfyCAfile=NULL;
    
    	int reconnect=0,badop=0,verify=SSL_VERIFY_NONE;
    
    	int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
    
    	SSL_CTX *ctx=NULL;
    	int ret=1,in_init=1,i,nbio_test=0;
    
    	int starttls_proto = PROTO_OFF;
    
    	int prexit = 0;
    	X509_VERIFY_PARAM *vpm = NULL;
    	int badarg = 0;
    
    	const SSL_METHOD *meth=NULL;
    
    Bodo Möller's avatar
    Bodo Möller committed
    	int socket_type=SOCK_STREAM;
    
    	char *inrand=NULL;
    
    	int mbuf_len=0;
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	struct timeval timeout, *timeoutp;
    
    	char *ssl_client_engine_id=NULL;
    
    	ENGINE *ssl_client_engine=NULL;
    
    	ENGINE *e=NULL;
    
    #if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE)
    
    #ifndef OPENSSL_NO_TLSEXT
    	char *servername = NULL; 
            tlsextctx tlsextcbp = 
            {NULL,0};
    
    # ifndef OPENSSL_NO_NEXTPROTONEG
    
    	const char *next_proto_neg_in = NULL;
    # endif
    
    	const char *alpn_in = NULL;
    
    # define MAX_SI_TYPES 100
    	unsigned short serverinfo_types[MAX_SI_TYPES];
    	int serverinfo_types_count = 0;
    
    	char *sess_in = NULL;
    	char *sess_out = NULL;
    
    Ben Laurie's avatar
    Ben Laurie committed
    	struct sockaddr peer;
    
    	int peerlen = sizeof(peer);
    
    Bodo Moeller's avatar
    Bodo Moeller committed
    	int fallback_scsv = 0;
    
    Ben Laurie's avatar
    Ben Laurie committed
    	int enable_timeouts = 0 ;
    
    Bodo Möller's avatar
    Bodo Möller committed
    	long socket_mtu = 0;
    
    #ifndef OPENSSL_NO_JPAKE
    
    static char *jpake_secret = NULL;
    #define no_jpake !jpake_secret
    #else
    #define no_jpake 1
    
    Ben Laurie's avatar
    Ben Laurie committed
    #ifndef OPENSSL_NO_SRP
    	char * srppass = NULL;
    	int srp_lateuser = 0;
    	SRP_ARG srp_arg = {NULL,NULL,0,0,0,1024};
    #endif
    
    Ben Laurie's avatar
    Ben Laurie committed
    
    
    	SSL_CONF_CTX *cctx = NULL;
    	STACK_OF(OPENSSL_STRING) *ssl_args = NULL;
    
    	char *crl_file = NULL;
    	int crl_format = FORMAT_PEM;
    
    	STACK_OF(X509_CRL) *crls = NULL;
    
    	int sdebug = 0;
    
    	meth=SSLv23_client_method();
    
    	apps_startup();
    
    	c_showcerts=0;
    
    
    	if (bio_err == NULL)
    		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
    
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    	if (!load_config(bio_err, NULL))
    		goto end;
    
    	cctx = SSL_CONF_CTX_new();
    	if (!cctx)
    		goto end;
    	SSL_CONF_CTX_set_flags(cctx, SSL_CONF_FLAG_CLIENT);
    	SSL_CONF_CTX_set_flags(cctx, SSL_CONF_FLAG_CMDLINE);
    
    	if (	((cbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
    
    		((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
    		((mbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
    
    		{
    		BIO_printf(bio_err,"out of memory\n");
    		goto end;
    		}
    
    	verify_depth=0;
    	verify_error=X509_V_OK;
    #ifdef FIONBIO
    	c_nbio=0;
    #endif
    
    	argc--;
    	argv++;
    	while (argc >= 1)
    		{
    		if	(strcmp(*argv,"-host") == 0)
    			{
    			if (--argc < 1) goto bad;
    			host= *(++argv);
    			}
    		else if	(strcmp(*argv,"-port") == 0)
    			{
    			if (--argc < 1) goto bad;
    			port=atoi(*(++argv));
    			if (port == 0) goto bad;
    			}
    		else if (strcmp(*argv,"-connect") == 0)
    			{
    			if (--argc < 1) goto bad;
    			if (!extract_host_port(*(++argv),&host,NULL,&port))
    				goto bad;
    			}
    
    		else if (strcmp(*argv,"-unix") == 0)
    			{
    			if (--argc < 1) goto bad;
    			unix_path = *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-xmpphost") == 0)
    			{
    			if (--argc < 1) goto bad;
    			xmpphost= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-verify") == 0)
    			{
    			verify=SSL_VERIFY_PEER;
    			if (--argc < 1) goto bad;
    			verify_depth=atoi(*(++argv));
    
    			if (!c_quiet)
    				BIO_printf(bio_err,"verify depth is %d\n",verify_depth);
    
    			}
    		else if	(strcmp(*argv,"-cert") == 0)
    			{
    			if (--argc < 1) goto bad;
    			cert_file= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-CRL") == 0)
    			{
    			if (--argc < 1) goto bad;
    			crl_file= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-crl_download") == 0)
    			crl_download = 1;
    
    		else if	(strcmp(*argv,"-sess_out") == 0)
    			{
    			if (--argc < 1) goto bad;
    			sess_out = *(++argv);
    			}
    		else if	(strcmp(*argv,"-sess_in") == 0)
    			{
    			if (--argc < 1) goto bad;
    			sess_in = *(++argv);
    			}
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    		else if	(strcmp(*argv,"-certform") == 0)
    			{
    			if (--argc < 1) goto bad;
    			cert_format = str2fmt(*(++argv));
    			}
    
    		else if	(strcmp(*argv,"-CRLform") == 0)
    			{
    			if (--argc < 1) goto bad;
    			crl_format = str2fmt(*(++argv));
    			}
    
    		else if (args_verify(&argv, &argc, &badarg, bio_err, &vpm))
    			{
    			if (badarg)
    				goto bad;
    			continue;
    			}
    
    		else if (strcmp(*argv,"-verify_return_error") == 0)
    			verify_return_error = 1;
    
    		else if (strcmp(*argv,"-verify_quiet") == 0)
    			verify_quiet = 1;
    		else if (strcmp(*argv,"-brief") == 0)
    			{
    			c_brief = 1;
    			verify_quiet = 1;
    			c_quiet = 1;
    			}
    
    		else if (args_excert(&argv, &argc, &badarg, bio_err, &exc))
    			{
    			if (badarg)
    				goto bad;
    			continue;
    			}
    
    		else if (args_ssl(&argv, &argc, cctx, &badarg, bio_err, &ssl_args))
    			{
    			if (badarg)
    				goto bad;
    			continue;
    			}
    
    		else if	(strcmp(*argv,"-prexit") == 0)
    			prexit=1;
    
    		else if	(strcmp(*argv,"-crlf") == 0)
    			crlf=1;
    
    		else if	(strcmp(*argv,"-quiet") == 0)
    
    			c_ign_eof=1;
    			}
    		else if	(strcmp(*argv,"-ign_eof") == 0)
    			c_ign_eof=1;
    
    		else if	(strcmp(*argv,"-no_ign_eof") == 0)
    			c_ign_eof=0;
    
    		else if	(strcmp(*argv,"-pause") == 0)
    			c_Pause=1;
    		else if	(strcmp(*argv,"-debug") == 0)
    			c_debug=1;
    
    #ifndef OPENSSL_NO_TLSEXT
    		else if	(strcmp(*argv,"-tlsextdebug") == 0)
    			c_tlsextdebug=1;
    
    		else if	(strcmp(*argv,"-status") == 0)
    			c_status_req=1;
    
    #endif
    #ifdef WATT32
    		else if (strcmp(*argv,"-wdebug") == 0)
    			dbug_init();
    
    Andy Polyakov's avatar
    Andy Polyakov committed
    #endif
    
    		else if	(strcmp(*argv,"-msg") == 0)
    			c_msg=1;
    
    		else if	(strcmp(*argv,"-msgfile") == 0)
    			{
    			if (--argc < 1) goto bad;
    			bio_c_msg = BIO_new_file(*(++argv), "w");
    			}
    #ifndef OPENSSL_NO_SSL_TRACE
    		else if	(strcmp(*argv,"-trace") == 0)
    			c_msg=2;
    #endif
    
    		else if	(strcmp(*argv,"-security_debug") == 0)
    			{ sdebug=1; }
    		else if	(strcmp(*argv,"-security_debug_verbose") == 0)
    			{ sdebug=2; }
    
    		else if	(strcmp(*argv,"-showcerts") == 0)
    			c_showcerts=1;
    
    		else if	(strcmp(*argv,"-nbio_test") == 0)
    			nbio_test=1;
    		else if	(strcmp(*argv,"-state") == 0)
    			state=1;
    
    #ifndef OPENSSL_NO_PSK
                    else if (strcmp(*argv,"-psk_identity") == 0)
    			{
    			if (--argc < 1) goto bad;
    			psk_identity=*(++argv);
    			}
                    else if (strcmp(*argv,"-psk") == 0)
    			{
                            size_t j;
    
    			if (--argc < 1) goto bad;
    			psk_key=*(++argv);
    			for (j = 0; j < strlen(psk_key); j++)
                                    {
    
                                    if (isxdigit((unsigned char)psk_key[j]))
    
                                            continue;
                                    BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
                                    goto bad;
                                    }
    			}
    #endif
    
    Ben Laurie's avatar
    Ben Laurie committed
    #ifndef OPENSSL_NO_SRP
    		else if (strcmp(*argv,"-srpuser") == 0)
    			{
    			if (--argc < 1) goto bad;
    			srp_arg.srplogin= *(++argv);
    			meth=TLSv1_client_method();
    			}
    		else if (strcmp(*argv,"-srppass") == 0)
    			{
    			if (--argc < 1) goto bad;
    			srppass= *(++argv);
    			meth=TLSv1_client_method();
    			}
    		else if (strcmp(*argv,"-srp_strength") == 0)
    			{
    			if (--argc < 1) goto bad;
    			srp_arg.strength=atoi(*(++argv));
    			BIO_printf(bio_err,"SRP minimal length for N is %d\n",srp_arg.strength);
    			meth=TLSv1_client_method();
    			}
    		else if (strcmp(*argv,"-srp_lateuser") == 0)
    			{
    			srp_lateuser= 1;
    			meth=TLSv1_client_method();
    			}
    		else if	(strcmp(*argv,"-srp_moregroups") == 0)
    			{
    			srp_arg.amp=1;
    			meth=TLSv1_client_method();
    			}
    #endif
    
    #ifndef OPENSSL_NO_SSL3_METHOD
    
    		else if	(strcmp(*argv,"-ssl3") == 0)
    			meth=SSLv3_client_method();
    
    		else if	(strcmp(*argv,"-tls1_2") == 0)
    			meth=TLSv1_2_client_method();
    
    		else if	(strcmp(*argv,"-tls1_1") == 0)
    			meth=TLSv1_1_client_method();
    
    		else if	(strcmp(*argv,"-tls1") == 0)
    			meth=TLSv1_client_method();
    
    Ben Laurie's avatar
    Ben Laurie committed
    #endif
    #ifndef OPENSSL_NO_DTLS1
    
    		else if	(strcmp(*argv,"-dtls") == 0)
    			{
    			meth=DTLS_client_method();
    			socket_type=SOCK_DGRAM;
    			}
    
    Ben Laurie's avatar
    Ben Laurie committed
    		else if	(strcmp(*argv,"-dtls1") == 0)
    			{
    			meth=DTLSv1_client_method();
    
    Bodo Möller's avatar
    Bodo Möller committed
    			socket_type=SOCK_DGRAM;
    
    Ben Laurie's avatar
    Ben Laurie committed
    			}
    
    		else if	(strcmp(*argv,"-dtls1_2") == 0)
    			{
    			meth=DTLSv1_2_client_method();
    			socket_type=SOCK_DGRAM;
    			}
    
    Ben Laurie's avatar
    Ben Laurie committed
    		else if (strcmp(*argv,"-timeout") == 0)
    			enable_timeouts=1;
    		else if (strcmp(*argv,"-mtu") == 0)
    			{
    			if (--argc < 1) goto bad;
    
    Bodo Möller's avatar
    Bodo Möller committed
    			socket_mtu = atol(*(++argv));
    
    Ben Laurie's avatar
    Ben Laurie committed
    			}
    
    		else if (strcmp(*argv,"-fallback_scsv") == 0)
    			{
    			fallback_scsv = 1;
    			}
    
    Dr. Stephen Henson's avatar
    Dr. Stephen Henson committed
    		else if	(strcmp(*argv,"-keyform") == 0)
    			{
    			if (--argc < 1) goto bad;
    			key_format = str2fmt(*(++argv));
    			}
    		else if	(strcmp(*argv,"-pass") == 0)
    			{
    			if (--argc < 1) goto bad;
    			passarg = *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-cert_chain") == 0)
    			{
    			if (--argc < 1) goto bad;
    			chain_file= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-key") == 0)
    			{
    			if (--argc < 1) goto bad;
    			key_file= *(++argv);
    			}
    		else if	(strcmp(*argv,"-reconnect") == 0)
    			{
    			reconnect=5;
    			}
    		else if	(strcmp(*argv,"-CApath") == 0)
    			{
    			if (--argc < 1) goto bad;
    			CApath= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-chainCApath") == 0)
    			{
    			if (--argc < 1) goto bad;
    			chCApath= *(++argv);
    			}
    		else if	(strcmp(*argv,"-verifyCApath") == 0)
    			{
    			if (--argc < 1) goto bad;
    			vfyCApath= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-build_chain") == 0)
    			build_chain = 1;
    
    		else if	(strcmp(*argv,"-CAfile") == 0)
    			{
    			if (--argc < 1) goto bad;
    			CAfile= *(++argv);
    			}
    
    		else if	(strcmp(*argv,"-chainCAfile") == 0)
    			{
    			if (--argc < 1) goto bad;
    			chCAfile= *(++argv);
    			}
    		else if	(strcmp(*argv,"-verifyCAfile") == 0)
    			{
    			if (--argc < 1) goto bad;
    			vfyCAfile= *(++argv);