2016-05-18 02:18:30 +08:00
|
|
|
/*
|
2020-04-23 20:55:52 +08:00
|
|
|
* Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2017-06-20 22:14:36 +08:00
|
|
|
* Copyright 2005 Nokia. All rights reserved.
|
1998-12-21 18:52:47 +08:00
|
|
|
*
|
2018-12-06 20:08:51 +08:00
|
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 02:18:30 +08:00
|
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
|
|
* in the file LICENSE in the source distribution or at
|
|
|
|
* https://www.openssl.org/source/license.html
|
1998-12-21 18:52:47 +08:00
|
|
|
*/
|
2016-05-18 02:18:30 +08:00
|
|
|
|
1998-12-21 18:52:47 +08:00
|
|
|
#include <stdio.h>
|
1999-04-24 06:13:45 +08:00
|
|
|
#include <openssl/buffer.h>
|
2019-09-28 06:45:40 +08:00
|
|
|
#include "ssl_local.h"
|
1998-12-21 18:52:47 +08:00
|
|
|
|
2015-01-15 04:57:28 +08:00
|
|
|
#ifndef OPENSSL_NO_STDIO
|
2005-03-30 18:26:02 +08:00
|
|
|
int SSL_SESSION_print_fp(FILE *fp, const SSL_SESSION *x)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
|
|
|
BIO *b;
|
|
|
|
int ret;
|
1998-12-21 18:52:47 +08:00
|
|
|
|
2015-10-01 02:32:49 +08:00
|
|
|
if ((b = BIO_new(BIO_s_file())) == NULL) {
|
2020-11-04 19:18:33 +08:00
|
|
|
ERR_raise(ERR_LIB_SSL, ERR_R_BUF_LIB);
|
2017-10-17 22:04:09 +08:00
|
|
|
return 0;
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
|
|
|
BIO_set_fp(b, fp, BIO_NOCLOSE);
|
|
|
|
ret = SSL_SESSION_print(b, x);
|
|
|
|
BIO_free(b);
|
2017-10-17 22:04:09 +08:00
|
|
|
return ret;
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
1998-12-21 18:52:47 +08:00
|
|
|
#endif
|
|
|
|
|
2005-03-30 18:26:02 +08:00
|
|
|
int SSL_SESSION_print(BIO *bp, const SSL_SESSION *x)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
2016-10-05 03:31:19 +08:00
|
|
|
size_t i;
|
2015-01-22 11:40:55 +08:00
|
|
|
const char *s;
|
2018-07-02 01:49:24 +08:00
|
|
|
int istls13;
|
1998-12-21 18:52:47 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if (x == NULL)
|
|
|
|
goto err;
|
2018-07-02 01:49:24 +08:00
|
|
|
istls13 = (x->ssl_version == TLS1_3_VERSION);
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_puts(bp, "SSL-Session:\n") <= 0)
|
|
|
|
goto err;
|
2016-02-08 03:17:07 +08:00
|
|
|
s = ssl_protocol_to_string(x->ssl_version);
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_printf(bp, " Protocol : %s\n", s) <= 0)
|
|
|
|
goto err;
|
1998-12-21 18:56:39 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if (x->cipher == NULL) {
|
|
|
|
if (((x->cipher_id) & 0xff000000) == 0x02000000) {
|
2018-05-17 19:04:31 +08:00
|
|
|
if (BIO_printf(bp, " Cipher : %06lX\n",
|
|
|
|
x->cipher_id & 0xffffff) <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
} else {
|
2018-05-17 19:04:31 +08:00
|
|
|
if (BIO_printf(bp, " Cipher : %04lX\n",
|
|
|
|
x->cipher_id & 0xffff) <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
2018-05-17 19:04:31 +08:00
|
|
|
if (BIO_printf(bp, " Cipher : %s\n",
|
|
|
|
((x->cipher->name == NULL) ? "unknown"
|
|
|
|
: x->cipher->name)) <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (BIO_puts(bp, " Session-ID: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
for (i = 0; i < x->session_id_length; i++) {
|
|
|
|
if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (BIO_puts(bp, "\n Session-ID-ctx: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
for (i = 0; i < x->sid_ctx_length; i++) {
|
|
|
|
if (BIO_printf(bp, "%02X", x->sid_ctx[i]) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
2018-06-26 00:52:01 +08:00
|
|
|
if (istls13) {
|
|
|
|
if (BIO_puts(bp, "\n Resumption PSK: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
} else if (BIO_puts(bp, "\n Master-Key: ") <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
2016-10-05 03:31:19 +08:00
|
|
|
for (i = 0; i < x->master_key_length; i++) {
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
2006-03-11 07:06:27 +08:00
|
|
|
#ifndef OPENSSL_NO_PSK
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_puts(bp, "\n PSK identity: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
if (BIO_printf(bp, "%s", x->psk_identity ? x->psk_identity : "None") <= 0)
|
|
|
|
goto err;
|
|
|
|
if (BIO_puts(bp, "\n PSK identity hint: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
if (BIO_printf
|
|
|
|
(bp, "%s", x->psk_identity_hint ? x->psk_identity_hint : "None") <= 0)
|
|
|
|
goto err;
|
2006-03-11 07:06:27 +08:00
|
|
|
#endif
|
2011-03-13 01:01:19 +08:00
|
|
|
#ifndef OPENSSL_NO_SRP
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_puts(bp, "\n SRP username: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
if (BIO_printf(bp, "%s", x->srp_username ? x->srp_username : "None") <= 0)
|
|
|
|
goto err;
|
2011-03-13 01:01:19 +08:00
|
|
|
#endif
|
2016-12-09 03:18:40 +08:00
|
|
|
if (x->ext.tick_lifetime_hint) {
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_printf(bp,
|
|
|
|
"\n TLS session ticket lifetime hint: %ld (seconds)",
|
2016-12-09 03:18:40 +08:00
|
|
|
x->ext.tick_lifetime_hint) <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
}
|
2016-12-09 03:18:40 +08:00
|
|
|
if (x->ext.tick) {
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_puts(bp, "\n TLS session ticket:\n") <= 0)
|
|
|
|
goto err;
|
2016-10-19 22:11:24 +08:00
|
|
|
/* TODO(size_t): Convert this call */
|
2016-08-06 01:03:17 +08:00
|
|
|
if (BIO_dump_indent
|
2016-12-09 03:18:40 +08:00
|
|
|
(bp, (const char *)x->ext.tick, (int)x->ext.ticklen, 4)
|
2015-01-22 11:40:55 +08:00
|
|
|
<= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
2005-10-01 07:35:33 +08:00
|
|
|
#ifndef OPENSSL_NO_COMP
|
2015-01-22 11:40:55 +08:00
|
|
|
if (x->compress_meth != 0) {
|
|
|
|
SSL_COMP *comp = NULL;
|
Updates to the new SSL compression code
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
Fix so that the version number in the master secret, when passed
via RSA, checks that if TLS was proposed, but we roll back to SSLv3
(because the server will not accept higher), that the version number
is 0x03,0x01, not 0x03,0x00
[Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)]
Submitted by:
Reviewed by:
PR:
1999-02-16 17:22:21 +08:00
|
|
|
|
2020-01-16 20:14:27 +08:00
|
|
|
if (!ssl_cipher_get_evp(NULL, x, NULL, NULL, NULL, NULL, &comp, 0))
|
2015-03-06 22:37:17 +08:00
|
|
|
goto err;
|
2015-01-22 11:40:55 +08:00
|
|
|
if (comp == NULL) {
|
2016-08-06 01:03:17 +08:00
|
|
|
if (BIO_printf(bp, "\n Compression: %d", x->compress_meth) <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
} else {
|
2015-05-09 00:05:36 +08:00
|
|
|
if (BIO_printf(bp, "\n Compression: %d (%s)", comp->id,
|
2016-08-06 01:03:17 +08:00
|
|
|
comp->name) <= 0)
|
2015-01-22 11:40:55 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
}
|
2005-10-01 07:35:33 +08:00
|
|
|
#endif
|
2015-01-22 11:40:55 +08:00
|
|
|
if (x->time != 0L) {
|
|
|
|
if (BIO_printf(bp, "\n Start Time: %ld", x->time) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (x->timeout != 0L) {
|
|
|
|
if (BIO_printf(bp, "\n Timeout : %ld (sec)", x->timeout) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (BIO_puts(bp, "\n") <= 0)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (BIO_puts(bp, " Verify return code: ") <= 0)
|
|
|
|
goto err;
|
|
|
|
if (BIO_printf(bp, "%ld (%s)\n", x->verify_result,
|
|
|
|
X509_verify_cert_error_string(x->verify_result)) <= 0)
|
|
|
|
goto err;
|
2000-01-09 22:21:40 +08:00
|
|
|
|
2015-01-23 10:45:13 +08:00
|
|
|
if (BIO_printf(bp, " Extended master secret: %s\n",
|
|
|
|
x->flags & SSL_SESS_FLAG_EXTMS ? "yes" : "no") <= 0)
|
|
|
|
goto err;
|
|
|
|
|
2018-06-26 00:52:01 +08:00
|
|
|
if (istls13) {
|
|
|
|
if (BIO_printf(bp, " Max Early Data: %u\n",
|
|
|
|
x->ext.max_early_data) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2017-10-09 19:05:58 +08:00
|
|
|
return 1;
|
2015-01-22 11:40:55 +08:00
|
|
|
err:
|
2017-10-17 22:04:09 +08:00
|
|
|
return 0;
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|
1998-12-21 18:52:47 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* print session id and master key in NSS keylog format (RSA
|
|
|
|
* Session-ID:<session id> Master-Key:<master key>)
|
|
|
|
*/
|
2014-05-24 07:02:24 +08:00
|
|
|
int SSL_SESSION_print_keylog(BIO *bp, const SSL_SESSION *x)
|
2015-01-22 11:40:55 +08:00
|
|
|
{
|
2016-10-05 03:31:19 +08:00
|
|
|
size_t i;
|
2014-05-24 07:02:24 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if (x == NULL)
|
|
|
|
goto err;
|
|
|
|
if (x->session_id_length == 0 || x->master_key_length == 0)
|
|
|
|
goto err;
|
2014-05-24 07:02:24 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
/*
|
|
|
|
* the RSA prefix is required by the format's definition although there's
|
2016-03-11 04:34:48 +08:00
|
|
|
* nothing RSA-specific in the output, therefore, we don't have to check if
|
2015-01-22 11:40:55 +08:00
|
|
|
* the cipher suite is based on RSA
|
|
|
|
*/
|
|
|
|
if (BIO_puts(bp, "RSA ") <= 0)
|
|
|
|
goto err;
|
2014-05-24 07:02:24 +08:00
|
|
|
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_puts(bp, "Session-ID:") <= 0)
|
|
|
|
goto err;
|
|
|
|
for (i = 0; i < x->session_id_length; i++) {
|
|
|
|
if (BIO_printf(bp, "%02X", x->session_id[i]) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (BIO_puts(bp, " Master-Key:") <= 0)
|
|
|
|
goto err;
|
2016-10-05 03:31:19 +08:00
|
|
|
for (i = 0; i < x->master_key_length; i++) {
|
2015-01-22 11:40:55 +08:00
|
|
|
if (BIO_printf(bp, "%02X", x->master_key[i]) <= 0)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
if (BIO_puts(bp, "\n") <= 0)
|
|
|
|
goto err;
|
2014-05-24 07:02:24 +08:00
|
|
|
|
2017-10-09 19:05:58 +08:00
|
|
|
return 1;
|
2015-01-22 11:40:55 +08:00
|
|
|
err:
|
2017-10-17 22:04:09 +08:00
|
|
|
return 0;
|
2015-01-22 11:40:55 +08:00
|
|
|
}
|