Windows does not know of strigs.h or strcasecmp, so when in Windows,
[openssl.git] / apps / apps.c
1 /* apps/apps.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58
59 #include <stdio.h>
60 #include <stdlib.h>
61 #include <string.h>
62 #include <sys/types.h>
63 #include <sys/stat.h>
64 #define NON_MAIN
65 #include "apps.h"
66 #undef NON_MAIN
67 #include <openssl/err.h>
68 #include <openssl/x509.h>
69 #include <openssl/pem.h>
70 #include <openssl/pkcs12.h>
71 #include <openssl/safestack.h>
72
73 #ifdef OPENSSL_SYS_WINDOWS
74 #define strcasecmp _stricmp
75 #else
76 #include <strings.h>
77 #endif
78
79 #ifdef OPENSSL_SYS_WINDOWS
80 #  include "bss_file.c"
81 #endif
82
83 typedef struct {
84         char *name;
85         unsigned long flag;
86         unsigned long mask;
87 } NAME_EX_TBL;
88
89 static int set_table_opts(unsigned long *flags, const char *arg, const NAME_EX_TBL *in_tbl);
90
91 int app_init(long mesgwin);
92 #ifdef undef /* never finished - probably never will be :-) */
93 int args_from_file(char *file, int *argc, char **argv[])
94         {
95         FILE *fp;
96         int num,i;
97         unsigned int len;
98         static char *buf=NULL;
99         static char **arg=NULL;
100         char *p;
101         struct stat stbuf;
102
103         if (stat(file,&stbuf) < 0) return(0);
104
105         fp=fopen(file,"r");
106         if (fp == NULL)
107                 return(0);
108
109         *argc=0;
110         *argv=NULL;
111
112         len=(unsigned int)stbuf.st_size;
113         if (buf != NULL) OPENSSL_free(buf);
114         buf=(char *)OPENSSL_malloc(len+1);
115         if (buf == NULL) return(0);
116
117         len=fread(buf,1,len,fp);
118         if (len <= 1) return(0);
119         buf[len]='\0';
120
121         i=0;
122         for (p=buf; *p; p++)
123                 if (*p == '\n') i++;
124         if (arg != NULL) OPENSSL_free(arg);
125         arg=(char **)OPENSSL_malloc(sizeof(char *)*(i*2));
126
127         *argv=arg;
128         num=0;
129         p=buf;
130         for (;;)
131                 {
132                 if (!*p) break;
133                 if (*p == '#') /* comment line */
134                         {
135                         while (*p && (*p != '\n')) p++;
136                         continue;
137                         }
138                 /* else we have a line */
139                 *(arg++)=p;
140                 num++;
141                 while (*p && ((*p != ' ') && (*p != '\t') && (*p != '\n')))
142                         p++;
143                 if (!*p) break;
144                 if (*p == '\n')
145                         {
146                         *(p++)='\0';
147                         continue;
148                         }
149                 /* else it is a tab or space */
150                 p++;
151                 while (*p && ((*p == ' ') || (*p == '\t') || (*p == '\n')))
152                         p++;
153                 if (!*p) break;
154                 if (*p == '\n')
155                         {
156                         p++;
157                         continue;
158                         }
159                 *(arg++)=p++;
160                 num++;
161                 while (*p && (*p != '\n')) p++;
162                 if (!*p) break;
163                 /* else *p == '\n' */
164                 *(p++)='\0';
165                 }
166         *argc=num;
167         return(1);
168         }
169 #endif
170
171 int str2fmt(char *s)
172         {
173         if      ((*s == 'D') || (*s == 'd'))
174                 return(FORMAT_ASN1);
175         else if ((*s == 'T') || (*s == 't'))
176                 return(FORMAT_TEXT);
177         else if ((*s == 'P') || (*s == 'p'))
178                 return(FORMAT_PEM);
179         else if ((*s == 'N') || (*s == 'n'))
180                 return(FORMAT_NETSCAPE);
181         else if ((*s == 'S') || (*s == 's'))
182                 return(FORMAT_SMIME);
183         else if ((*s == '1')
184                 || (strcmp(s,"PKCS12") == 0) || (strcmp(s,"pkcs12") == 0)
185                 || (strcmp(s,"P12") == 0) || (strcmp(s,"p12") == 0))
186                 return(FORMAT_PKCS12);
187         else if ((*s == 'E') || (*s == 'e'))
188                 return(FORMAT_ENGINE);
189         else
190                 return(FORMAT_UNDEF);
191         }
192
193 #if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16)
194 void program_name(char *in, char *out, int size)
195         {
196         int i,n;
197         char *p=NULL;
198
199         n=strlen(in);
200         /* find the last '/', '\' or ':' */
201         for (i=n-1; i>0; i--)
202                 {
203                 if ((in[i] == '/') || (in[i] == '\\') || (in[i] == ':'))
204                         {
205                         p= &(in[i+1]);
206                         break;
207                         }
208                 }
209         if (p == NULL)
210                 p=in;
211         n=strlen(p);
212         /* strip off trailing .exe if present. */
213         if ((n > 4) && (p[n-4] == '.') &&
214                 ((p[n-3] == 'e') || (p[n-3] == 'E')) &&
215                 ((p[n-2] == 'x') || (p[n-2] == 'X')) &&
216                 ((p[n-1] == 'e') || (p[n-1] == 'E')))
217                 n-=4;
218         if (n > size-1)
219                 n=size-1;
220
221         for (i=0; i<n; i++)
222                 {
223                 if ((p[i] >= 'A') && (p[i] <= 'Z'))
224                         out[i]=p[i]-'A'+'a';
225                 else
226                         out[i]=p[i];
227                 }
228         out[n]='\0';
229         }
230 #else
231 #ifdef OPENSSL_SYS_VMS
232 void program_name(char *in, char *out, int size)
233         {
234         char *p=in, *q;
235         char *chars=":]>";
236
237         while(*chars != '\0')
238                 {
239                 q=strrchr(p,*chars);
240                 if (q > p)
241                         p = q + 1;
242                 chars++;
243                 }
244
245         q=strrchr(p,'.');
246         if (q == NULL)
247                 q = in+size;
248         strncpy(out,p,q-p);
249         out[q-p]='\0';
250         }
251 #else
252 void program_name(char *in, char *out, int size)
253         {
254         char *p;
255
256         p=strrchr(in,'/');
257         if (p != NULL)
258                 p++;
259         else
260                 p=in;
261         strncpy(out,p,size-1);
262         out[size-1]='\0';
263         }
264 #endif
265 #endif
266
267 #ifdef OPENSSL_SYS_WIN32
268 int WIN32_rename(char *from, char *to)
269         {
270 #ifdef OPENSSL_SYS_WINNT
271         int ret;
272 /* Note: MoveFileEx() doesn't work under Win95, Win98 */
273
274         ret=MoveFileEx(from,to,MOVEFILE_REPLACE_EXISTING|MOVEFILE_COPY_ALLOWED);
275         return(ret?0:-1);
276 #else
277         unlink(to);
278         return MoveFile(from, to);
279 #endif
280         }
281 #endif
282
283 int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
284         {
285         int num,len,i;
286         char *p;
287
288         *argc=0;
289         *argv=NULL;
290
291         len=strlen(buf);
292         i=0;
293         if (arg->count == 0)
294                 {
295                 arg->count=20;
296                 arg->data=(char **)OPENSSL_malloc(sizeof(char *)*arg->count);
297                 }
298         for (i=0; i<arg->count; i++)
299                 arg->data[i]=NULL;
300
301         num=0;
302         p=buf;
303         for (;;)
304                 {
305                 /* first scan over white space */
306                 if (!*p) break;
307                 while (*p && ((*p == ' ') || (*p == '\t') || (*p == '\n')))
308                         p++;
309                 if (!*p) break;
310
311                 /* The start of something good :-) */
312                 if (num >= arg->count)
313                         {
314                         arg->count+=20;
315                         arg->data=(char **)OPENSSL_realloc(arg->data,
316                                 sizeof(char *)*arg->count);
317                         if (argc == 0) return(0);
318                         }
319                 arg->data[num++]=p;
320
321                 /* now look for the end of this */
322                 if ((*p == '\'') || (*p == '\"')) /* scan for closing quote */
323                         {
324                         i= *(p++);
325                         arg->data[num-1]++; /* jump over quote */
326                         while (*p && (*p != i))
327                                 p++;
328                         *p='\0';
329                         }
330                 else
331                         {
332                         while (*p && ((*p != ' ') &&
333                                 (*p != '\t') && (*p != '\n')))
334                                 p++;
335
336                         if (*p == '\0')
337                                 p--;
338                         else
339                                 *p='\0';
340                         }
341                 p++;
342                 }
343         *argc=num;
344         *argv=arg->data;
345         return(1);
346         }
347
348 #ifndef APP_INIT
349 int app_init(long mesgwin)
350         {
351         return(1);
352         }
353 #endif
354
355
356 int dump_cert_text (BIO *out, X509 *x)
357 {
358         char buf[256];
359         X509_NAME_oneline(X509_get_subject_name(x),buf,256);
360         BIO_puts(out,"subject=");
361         BIO_puts(out,buf);
362
363         X509_NAME_oneline(X509_get_issuer_name(x),buf,256);
364         BIO_puts(out,"\nissuer= ");
365         BIO_puts(out,buf);
366         BIO_puts(out,"\n");
367         return 0;
368 }
369
370 static char *app_get_pass(BIO *err, char *arg, int keepbio);
371
372 int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2)
373 {
374         int same;
375         if(!arg2 || !arg1 || strcmp(arg1, arg2)) same = 0;
376         else same = 1;
377         if(arg1) {
378                 *pass1 = app_get_pass(err, arg1, same);
379                 if(!*pass1) return 0;
380         } else if(pass1) *pass1 = NULL;
381         if(arg2) {
382                 *pass2 = app_get_pass(err, arg2, same ? 2 : 0);
383                 if(!*pass2) return 0;
384         } else if(pass2) *pass2 = NULL;
385         return 1;
386 }
387
388 static char *app_get_pass(BIO *err, char *arg, int keepbio)
389 {
390         char *tmp, tpass[APP_PASS_LEN];
391         static BIO *pwdbio = NULL;
392         int i;
393         if(!strncmp(arg, "pass:", 5)) return BUF_strdup(arg + 5);
394         if(!strncmp(arg, "env:", 4)) {
395                 tmp = getenv(arg + 4);
396                 if(!tmp) {
397                         BIO_printf(err, "Can't read environment variable %s\n", arg + 4);
398                         return NULL;
399                 }
400                 return BUF_strdup(tmp);
401         }
402         if(!keepbio || !pwdbio) {
403                 if(!strncmp(arg, "file:", 5)) {
404                         pwdbio = BIO_new_file(arg + 5, "r");
405                         if(!pwdbio) {
406                                 BIO_printf(err, "Can't open file %s\n", arg + 5);
407                                 return NULL;
408                         }
409                 } else if(!strncmp(arg, "fd:", 3)) {
410                         BIO *btmp;
411                         i = atoi(arg + 3);
412                         if(i >= 0) pwdbio = BIO_new_fd(i, BIO_NOCLOSE);
413                         if((i < 0) || !pwdbio) {
414                                 BIO_printf(err, "Can't access file descriptor %s\n", arg + 3);
415                                 return NULL;
416                         }
417                         /* Can't do BIO_gets on an fd BIO so add a buffering BIO */
418                         btmp = BIO_new(BIO_f_buffer());
419                         pwdbio = BIO_push(btmp, pwdbio);
420                 } else if(!strcmp(arg, "stdin")) {
421                         pwdbio = BIO_new_fp(stdin, BIO_NOCLOSE);
422                         if(!pwdbio) {
423                                 BIO_printf(err, "Can't open BIO for stdin\n");
424                                 return NULL;
425                         }
426                 } else {
427                         BIO_printf(err, "Invalid password argument \"%s\"\n", arg);
428                         return NULL;
429                 }
430         }
431         i = BIO_gets(pwdbio, tpass, APP_PASS_LEN);
432         if(keepbio != 1) {
433                 BIO_free_all(pwdbio);
434                 pwdbio = NULL;
435         }
436         if(i <= 0) {
437                 BIO_printf(err, "Error reading password from BIO\n");
438                 return NULL;
439         }
440         tmp = strchr(tpass, '\n');
441         if(tmp) *tmp = 0;
442         return BUF_strdup(tpass);
443 }
444
445 int add_oid_section(BIO *err, LHASH *conf)
446 {       
447         char *p;
448         STACK_OF(CONF_VALUE) *sktmp;
449         CONF_VALUE *cnf;
450         int i;
451         if(!(p=CONF_get_string(conf,NULL,"oid_section")))
452                 {
453                 ERR_clear_error();
454                 return 1;
455                 }
456         if(!(sktmp = CONF_get_section(conf, p))) {
457                 BIO_printf(err, "problem loading oid section %s\n", p);
458                 return 0;
459         }
460         for(i = 0; i < sk_CONF_VALUE_num(sktmp); i++) {
461                 cnf = sk_CONF_VALUE_value(sktmp, i);
462                 if(OBJ_create(cnf->value, cnf->name, cnf->name) == NID_undef) {
463                         BIO_printf(err, "problem creating object %s=%s\n",
464                                                          cnf->name, cnf->value);
465                         return 0;
466                 }
467         }
468         return 1;
469 }
470
471 X509 *load_cert(BIO *err, char *file, int format)
472         {
473         ASN1_HEADER *ah=NULL;
474         BUF_MEM *buf=NULL;
475         X509 *x=NULL;
476         BIO *cert;
477
478         if ((cert=BIO_new(BIO_s_file())) == NULL)
479                 {
480                 ERR_print_errors(err);
481                 goto end;
482                 }
483
484         if (file == NULL)
485                 {
486                 setvbuf(stdin, NULL, _IONBF, 0);
487                 BIO_set_fp(cert,stdin,BIO_NOCLOSE);
488                 }
489         else
490                 {
491                 if (BIO_read_filename(cert,file) <= 0)
492                         {
493                         perror(file);
494                         goto end;
495                         }
496                 }
497
498         if      (format == FORMAT_ASN1)
499                 x=d2i_X509_bio(cert,NULL);
500         else if (format == FORMAT_NETSCAPE)
501                 {
502                 unsigned char *p,*op;
503                 int size=0,i;
504
505                 /* We sort of have to do it this way because it is sort of nice
506                  * to read the header first and check it, then
507                  * try to read the certificate */
508                 buf=BUF_MEM_new();
509                 for (;;)
510                         {
511                         if ((buf == NULL) || (!BUF_MEM_grow(buf,size+1024*10)))
512                                 goto end;
513                         i=BIO_read(cert,&(buf->data[size]),1024*10);
514                         size+=i;
515                         if (i == 0) break;
516                         if (i < 0)
517                                 {
518                                 perror("reading certificate");
519                                 goto end;
520                                 }
521                         }
522                 p=(unsigned char *)buf->data;
523                 op=p;
524
525                 /* First load the header */
526                 if ((ah=d2i_ASN1_HEADER(NULL,&p,(long)size)) == NULL)
527                         goto end;
528                 if ((ah->header == NULL) || (ah->header->data == NULL) ||
529                         (strncmp(NETSCAPE_CERT_HDR,(char *)ah->header->data,
530                         ah->header->length) != 0))
531                         {
532                         BIO_printf(err,"Error reading header on certificate\n");
533                         goto end;
534                         }
535                 /* header is ok, so now read the object */
536                 p=op;
537                 ah->meth=X509_asn1_meth();
538                 if ((ah=d2i_ASN1_HEADER(&ah,&p,(long)size)) == NULL)
539                         goto end;
540                 x=(X509 *)ah->data;
541                 ah->data=NULL;
542                 }
543         else if (format == FORMAT_PEM)
544                 x=PEM_read_bio_X509_AUX(cert,NULL,NULL,NULL);
545         else if (format == FORMAT_PKCS12)
546                 {
547                 PKCS12 *p12 = d2i_PKCS12_bio(cert, NULL);
548
549                 PKCS12_parse(p12, NULL, NULL, &x, NULL);
550                 PKCS12_free(p12);
551                 p12 = NULL;
552                 }
553         else    {
554                 BIO_printf(err,"bad input format specified for input cert\n");
555                 goto end;
556                 }
557 end:
558         if (x == NULL)
559                 {
560                 BIO_printf(err,"unable to load certificate\n");
561                 ERR_print_errors(err);
562                 }
563         if (ah != NULL) ASN1_HEADER_free(ah);
564         if (cert != NULL) BIO_free(cert);
565         if (buf != NULL) BUF_MEM_free(buf);
566         return(x);
567         }
568
569 EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass, ENGINE *e)
570         {
571         BIO *key=NULL;
572         EVP_PKEY *pkey=NULL;
573
574         if (file == NULL)
575                 {
576                 BIO_printf(err,"no keyfile specified\n");
577                 goto end;
578                 }
579         if (format == FORMAT_ENGINE)
580                 {
581                 if (!e)
582                         BIO_printf(bio_err,"no engine specified\n");
583                 else
584                         pkey = ENGINE_load_private_key(e, file, pass);
585                 goto end;
586                 }
587         key=BIO_new(BIO_s_file());
588         if (key == NULL)
589                 {
590                 ERR_print_errors(err);
591                 goto end;
592                 }
593         if (BIO_read_filename(key,file) <= 0)
594                 {
595                 perror(file);
596                 goto end;
597                 }
598         if (format == FORMAT_ASN1)
599                 {
600                 pkey=d2i_PrivateKey_bio(key, NULL);
601                 }
602         else if (format == FORMAT_PEM)
603                 {
604                 pkey=PEM_read_bio_PrivateKey(key,NULL,NULL,pass);
605                 }
606         else if (format == FORMAT_PKCS12)
607                 {
608                 PKCS12 *p12 = d2i_PKCS12_bio(key, NULL);
609
610                 PKCS12_parse(p12, pass, &pkey, NULL, NULL);
611                 PKCS12_free(p12);
612                 p12 = NULL;
613                 }
614         else
615                 {
616                 BIO_printf(err,"bad input format specified for key\n");
617                 goto end;
618                 }
619  end:
620         if (key != NULL) BIO_free(key);
621         if (pkey == NULL)
622                 BIO_printf(err,"unable to load Private Key\n");
623         return(pkey);
624         }
625
626 EVP_PKEY *load_pubkey(BIO *err, char *file, int format, ENGINE *e)
627         {
628         BIO *key=NULL;
629         EVP_PKEY *pkey=NULL;
630
631         if (file == NULL)
632                 {
633                 BIO_printf(err,"no keyfile specified\n");
634                 goto end;
635                 }
636         if (format == FORMAT_ENGINE)
637                 {
638                 if (!e)
639                         BIO_printf(bio_err,"no engine specified\n");
640                 else
641                         pkey = ENGINE_load_public_key(e, file, NULL);
642                 goto end;
643                 }
644         key=BIO_new(BIO_s_file());
645         if (key == NULL)
646                 {
647                 ERR_print_errors(err);
648                 goto end;
649                 }
650         if (BIO_read_filename(key,file) <= 0)
651                 {
652                 perror(file);
653                 goto end;
654                 }
655         if (format == FORMAT_ASN1)
656                 {
657                 pkey=d2i_PUBKEY_bio(key, NULL);
658                 }
659         else if (format == FORMAT_PEM)
660                 {
661                 pkey=PEM_read_bio_PUBKEY(key,NULL,NULL,NULL);
662                 }
663         else
664                 {
665                 BIO_printf(err,"bad input format specified for key\n");
666                 goto end;
667                 }
668  end:
669         if (key != NULL) BIO_free(key);
670         if (pkey == NULL)
671                 BIO_printf(err,"unable to load Public Key\n");
672         return(pkey);
673         }
674
675 STACK_OF(X509) *load_certs(BIO *err, char *file, int format)
676         {
677         BIO *certs;
678         int i;
679         STACK_OF(X509) *othercerts = NULL;
680         STACK_OF(X509_INFO) *allcerts = NULL;
681         X509_INFO *xi;
682
683         if((certs = BIO_new(BIO_s_file())) == NULL)
684                 {
685                 ERR_print_errors(err);
686                 goto end;
687                 }
688
689         if (file == NULL)
690                 BIO_set_fp(certs,stdin,BIO_NOCLOSE);
691         else
692                 {
693                 if (BIO_read_filename(certs,file) <= 0)
694                         {
695                         perror(file);
696                         goto end;
697                         }
698                 }
699
700         if      (format == FORMAT_PEM)
701                 {
702                 othercerts = sk_X509_new_null();
703                 if(!othercerts)
704                         {
705                         sk_X509_free(othercerts);
706                         othercerts = NULL;
707                         goto end;
708                         }
709                 allcerts = PEM_X509_INFO_read_bio(certs, NULL, NULL, NULL);
710                 for(i = 0; i < sk_X509_INFO_num(allcerts); i++)
711                         {
712                         xi = sk_X509_INFO_value (allcerts, i);
713                         if (xi->x509)
714                                 {
715                                 sk_X509_push(othercerts, xi->x509);
716                                 xi->x509 = NULL;
717                                 }
718                         }
719                 goto end;
720                 }
721         else    {
722                 BIO_printf(err,"bad input format specified for input cert\n");
723                 goto end;
724                 }
725 end:
726         if (othercerts == NULL)
727                 {
728                 BIO_printf(err,"unable to load certificates\n");
729                 ERR_print_errors(err);
730                 }
731         if (allcerts) sk_X509_INFO_pop_free(allcerts, X509_INFO_free);
732         if (certs != NULL) BIO_free(certs);
733         return(othercerts);
734         }
735
736
737 #define X509V3_EXT_UNKNOWN_MASK         (0xfL << 16)
738 /* Return error for unknown extensions */
739 #define X509V3_EXT_DEFAULT              0
740 /* Print error for unknown extensions */
741 #define X509V3_EXT_ERROR_UNKNOWN        (1L << 16)
742 /* ASN1 parse unknown extensions */
743 #define X509V3_EXT_PARSE_UNKNOWN        (2L << 16)
744 /* BIO_dump unknown extensions */
745 #define X509V3_EXT_DUMP_UNKNOWN         (3L << 16)
746
747 int set_cert_ex(unsigned long *flags, const char *arg)
748 {
749         static const NAME_EX_TBL cert_tbl[] = {
750                 { "compatible", X509_FLAG_COMPAT, 0xffffffffl},
751                 { "no_header", X509_FLAG_NO_HEADER, 0},
752                 { "no_version", X509_FLAG_NO_VERSION, 0},
753                 { "no_serial", X509_FLAG_NO_SERIAL, 0},
754                 { "no_signame", X509_FLAG_NO_SIGNAME, 0},
755                 { "no_validity", X509_FLAG_NO_VALIDITY, 0},
756                 { "no_subject", X509_FLAG_NO_SUBJECT, 0},
757                 { "no_pubkey", X509_FLAG_NO_PUBKEY, 0},
758                 { "no_extensions", X509_FLAG_NO_EXTENSIONS, 0},
759                 { "no_sigdump", X509_FLAG_NO_SIGDUMP, 0},
760                 { "no_aux", X509_FLAG_NO_AUX, 0},
761                 { "ext_default", X509V3_EXT_DEFAULT, X509V3_EXT_UNKNOWN_MASK},
762                 { "ext_error", X509V3_EXT_ERROR_UNKNOWN, X509V3_EXT_UNKNOWN_MASK},
763                 { "ext_parse", X509V3_EXT_PARSE_UNKNOWN, X509V3_EXT_UNKNOWN_MASK},
764                 { "ext_dump", X509V3_EXT_DUMP_UNKNOWN, X509V3_EXT_UNKNOWN_MASK},
765                 { NULL, 0, 0}
766         };
767         return set_table_opts(flags, arg, cert_tbl);
768 }
769
770 int set_name_ex(unsigned long *flags, const char *arg)
771 {
772         static const NAME_EX_TBL ex_tbl[] = {
773                 { "esc_2253", ASN1_STRFLGS_ESC_2253, 0},
774                 { "esc_ctrl", ASN1_STRFLGS_ESC_CTRL, 0},
775                 { "esc_msb", ASN1_STRFLGS_ESC_MSB, 0},
776                 { "use_quote", ASN1_STRFLGS_ESC_QUOTE, 0},
777                 { "utf8", ASN1_STRFLGS_UTF8_CONVERT, 0},
778                 { "ignore_type", ASN1_STRFLGS_IGNORE_TYPE, 0},
779                 { "show_type", ASN1_STRFLGS_SHOW_TYPE, 0},
780                 { "dump_all", ASN1_STRFLGS_DUMP_ALL, 0},
781                 { "dump_nostr", ASN1_STRFLGS_DUMP_UNKNOWN, 0},
782                 { "dump_der", ASN1_STRFLGS_DUMP_DER, 0},
783                 { "compat", XN_FLAG_COMPAT, 0xffffffffL},
784                 { "sep_comma_plus", XN_FLAG_SEP_COMMA_PLUS, XN_FLAG_SEP_MASK},
785                 { "sep_comma_plus_space", XN_FLAG_SEP_CPLUS_SPC, XN_FLAG_SEP_MASK},
786                 { "sep_semi_plus_space", XN_FLAG_SEP_SPLUS_SPC, XN_FLAG_SEP_MASK},
787                 { "sep_multiline", XN_FLAG_SEP_MULTILINE, XN_FLAG_SEP_MASK},
788                 { "dn_rev", XN_FLAG_DN_REV, 0},
789                 { "nofname", XN_FLAG_FN_NONE, XN_FLAG_FN_MASK},
790                 { "sname", XN_FLAG_FN_SN, XN_FLAG_FN_MASK},
791                 { "lname", XN_FLAG_FN_LN, XN_FLAG_FN_MASK},
792                 { "oid", XN_FLAG_FN_OID, XN_FLAG_FN_MASK},
793                 { "space_eq", XN_FLAG_SPC_EQ, 0},
794                 { "dump_unknown", XN_FLAG_DUMP_UNKNOWN_FIELDS, 0},
795                 { "RFC2253", XN_FLAG_RFC2253, 0xffffffffL},
796                 { "oneline", XN_FLAG_ONELINE, 0xffffffffL},
797                 { "multiline", XN_FLAG_MULTILINE, 0xffffffffL},
798                 { NULL, 0, 0}
799         };
800         return set_table_opts(flags, arg, ex_tbl);
801 }
802
803 static int set_table_opts(unsigned long *flags, const char *arg, const NAME_EX_TBL *in_tbl)
804 {
805         char c;
806         const NAME_EX_TBL *ptbl;
807         c = arg[0];
808
809         if(c == '-') {
810                 c = 0;
811                 arg++;
812         } else if (c == '+') {
813                 c = 1;
814                 arg++;
815         } else c = 1;
816
817         for(ptbl = in_tbl; ptbl->name; ptbl++) {
818                 if(!strcasecmp(arg, ptbl->name)) {
819                         *flags &= ~ptbl->mask;
820                         if(c) *flags |= ptbl->flag;
821                         else *flags &= ~ptbl->flag;
822                         return 1;
823                 }
824         }
825         return 0;
826 }
827
828 void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags)
829 {
830         char buf[256];
831         char mline = 0;
832         int indent = 0;
833         if(title) BIO_puts(out, title);
834         if((lflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
835                 mline = 1;
836                 indent = 4;
837         }
838         if(lflags == XN_FLAG_COMPAT) {
839                 X509_NAME_oneline(nm,buf,256);
840                 BIO_puts(out,buf);
841                 BIO_puts(out, "\n");
842         } else {
843                 if(mline) BIO_puts(out, "\n");
844                 X509_NAME_print_ex(out, nm, indent, lflags);
845                 BIO_puts(out, "\n");
846         }
847 }
848
849 X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath)
850 {
851         X509_STORE *store;
852         X509_LOOKUP *lookup;
853         if(!(store = X509_STORE_new())) goto end;
854         lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
855         if (lookup == NULL) goto end;
856         if (CAfile) {
857                 if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) {
858                         BIO_printf(bp, "Error loading file %s\n", CAfile);
859                         goto end;
860                 }
861         } else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
862                 
863         lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
864         if (lookup == NULL) goto end;
865         if (CApath) {
866                 if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) {
867                         BIO_printf(bp, "Error loading directory %s\n", CApath);
868                         goto end;
869                 }
870         } else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
871
872         ERR_clear_error();
873         return store;
874         end:
875         X509_STORE_free(store);
876         return NULL;
877 }