mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
0f113f3ee4
Reviewed-by: Tim Hudson <tjh@openssl.org>
62 lines
1.5 KiB
C
62 lines
1.5 KiB
C
/* pkread.c */
|
|
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <openssl/pem.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/pkcs12.h>
|
|
|
|
/* Simple PKCS#12 file reader */
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
FILE *fp;
|
|
EVP_PKEY *pkey;
|
|
X509 *cert;
|
|
STACK_OF(X509) *ca = NULL;
|
|
PKCS12 *p12;
|
|
int i;
|
|
if (argc != 4) {
|
|
fprintf(stderr, "Usage: pkread p12file password opfile\n");
|
|
exit(1);
|
|
}
|
|
OpenSSL_add_all_algorithms();
|
|
ERR_load_crypto_strings();
|
|
if (!(fp = fopen(argv[1], "rb"))) {
|
|
fprintf(stderr, "Error opening file %s\n", argv[1]);
|
|
exit(1);
|
|
}
|
|
p12 = d2i_PKCS12_fp(fp, NULL);
|
|
fclose(fp);
|
|
if (!p12) {
|
|
fprintf(stderr, "Error reading PKCS#12 file\n");
|
|
ERR_print_errors_fp(stderr);
|
|
exit(1);
|
|
}
|
|
if (!PKCS12_parse(p12, argv[2], &pkey, &cert, &ca)) {
|
|
fprintf(stderr, "Error parsing PKCS#12 file\n");
|
|
ERR_print_errors_fp(stderr);
|
|
exit(1);
|
|
}
|
|
PKCS12_free(p12);
|
|
if (!(fp = fopen(argv[3], "w"))) {
|
|
fprintf(stderr, "Error opening file %s\n", argv[1]);
|
|
exit(1);
|
|
}
|
|
if (pkey) {
|
|
fprintf(fp, "***Private Key***\n");
|
|
PEM_write_PrivateKey(fp, pkey, NULL, NULL, 0, NULL, NULL);
|
|
}
|
|
if (cert) {
|
|
fprintf(fp, "***User Certificate***\n");
|
|
PEM_write_X509_AUX(fp, cert);
|
|
}
|
|
if (ca && sk_X509_num(ca)) {
|
|
fprintf(fp, "***Other Certificates***\n");
|
|
for (i = 0; i < sk_X509_num(ca); i++)
|
|
PEM_write_X509_AUX(fp, sk_X509_value(ca, i));
|
|
}
|
|
fclose(fp);
|
|
return 0;
|
|
}
|