-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathget_certs.c
174 lines (153 loc) · 3.82 KB
/
get_certs.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
#include <stdio.h>
#include <string.h>
#include <openssl/ssl.h>
#include <openssl/bio.h>
#include <openssl/err.h>
#include <stdio.h>
#include <fcntl.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <unistd.h>
#include <sys/io.h>
#include <sys/mman.h>
int get_certs(SSL_CTX *ctx) {
#ifdef TEST
static const char *FNAME = "rootca.pem";
#else
static const char *FNAME = "/obi/rootca.pem";
#endif
int count = 0;
int err_count = 0;
int fd = open(FNAME, O_RDONLY);
if (!fd) {
#ifdef TEST
printf("GET_CERTS: cannot open %s\n", FNAME);
#endif
goto err;
}
struct stat s;
if (fstat(fd, &s)) {
printf("ERR\n"); // <-- no room for pretty strings
goto err;
}
off_t len = s.st_size;
void* buf = mmap(0, len, PROT_READ, MAP_PRIVATE, fd, 0);
if (!buf) {
#ifdef TEST
printf("GET_CERTS: cannot mmap len %d\n", len);
#endif
goto err;
}
X509_STORE* store = (X509_STORE*) SSL_CTX_get_cert_store(ctx);
BIO* bio = BIO_new_mem_buf(buf,len);
X509* x509;
while ( (x509 = (X509*)PEM_read_bio_X509_AUX(bio,NULL,NULL,NULL)) != NULL) {
if (X509_STORE_add_cert(store,x509) != 0) {
count++;
}
else {
#ifdef TEST
char name[0x400];
memset(name,0,0x400);
X509_NAME* x509_name = X509_get_subject_name(x509);
X509_NAME_get_text_by_NID(x509_name,0xd,name,0x400);
printf("error loading cert: %s\n",name);
#endif
err_count++;
}
X509_free(x509);
}
//yes im leaking this fd, but just to save space in binary
//close(fd);
err:
printf("GET_CERTS: %d (%d)\n", count, err_count);
return count;
}
#ifdef TEST
void print_error_string(unsigned long err, const char* const label)
{
const char* const str = ERR_reason_error_string(err);
if(str)
fprintf(stderr, "%s\n", str);
else
fprintf(stderr, "%s failed: %lu (0x%lx)\n", label, err, err);
}
int verify_callback(int preverify, X509_STORE_CTX* x509_ctx)
{
uint uVar1;
int bVar2;
if (preverify != 0) {
return preverify;
}
uVar1 = X509_STORE_CTX_get_error(x509_ctx);
bVar2 = 8 < uVar1;
if (uVar1 != 9) {
bVar2 = uVar1 != 0xd;
}
if ((bVar2 && (uVar1 != 9 && uVar1 != 0xe)) && (uVar1 != 10)) {
printf("BASESSL:verifing:%d\n",uVar1);
return 0;
}
return 1;
}
int main(int argc, char** argv)
{
SSL_library_init();
SSL_load_error_strings();
SSL_CTX* ctx = SSL_CTX_new(SSLv23_method());
if (!ctx) {
ERR_print_errors_fp(stdout);
} else {
get_certs(ctx);
}
int uVar6 = SSL_CTX_ctrl(ctx,0x20,0,(void *)0x0);
SSL_CTX_ctrl(ctx,0x20,uVar6 | 0x40000,(void *)0x0);
SSL_CTX_set_verify(ctx,3,verify_callback);
SSL_CTX_set_verify_depth(ctx,0xf);
SSL_CTX_ctrl(ctx,0x2a,5,(void *)0x0);
SSL_CTX_use_certificate_file(ctx, "client.crt", SSL_FILETYPE_PEM);
SSL_CTX_use_PrivateKey_file(ctx, "client.key", SSL_FILETYPE_PEM);
BIO* bio = BIO_new_ssl_connect(ctx);
int ssl_err = ERR_get_error();
if(!(bio != NULL))
{
print_error_string(ssl_err, "BIO_new_ssl_connect");
return 0;
}
char host_and_port[100];
snprintf(host_and_port, 99, "%s:%s", argv[1], argv[2]);
printf("%s\n", host_and_port);
int res = BIO_set_conn_hostname(bio, host_and_port);
ssl_err = ERR_get_error();
if(!(1 == res))
{
print_error_string(ssl_err, "BIO_set_conn_hostname");
return 0;
}
SSL* ssl;
BIO_get_ssl(bio, &ssl);
ssl_err = ERR_get_error();
SSL_set_tlsext_host_name(ssl, argv[1]);
res = BIO_do_connect(bio);
ssl_err = ERR_get_error();
if(!(1 == res))
{
print_error_string(ssl_err, "BIO_do_connect");
return 0;
}
res = BIO_do_handshake(bio);
if (!(1 == res)) {
printf("handshake failed\n");
return 0;
}
res = SSL_get_verify_result(ssl);
if(!(X509_V_OK == res))
{
print_error_string((unsigned long)res, "SSL_get_verify_results");
return 0;
} else {
printf("SUCCESS!\n");
}
return 1;
}
#endif