openssl3.2 - 官方demo学习 - pkcs12 - pkread.c

文章目录

    • openssl3.2 - 官方demo学习 - pkcs12 - pkread.c
    • 概述
    • 笔记
    • END

openssl3.2 - 官方demo学习 - pkcs12 - pkread.c

概述

openssl3.2 - 官方demo学习 - 索引贴
将官方demos的pkread.c 过了一下.
只要有正确的.P12证书和导出口令, 这个实验做起来很快.

程序功能, 读.P12文件(需要给出导出口令), 将证书的友好名称, 私钥, 可信任证书都导出到指定的输出文件.

笔记

/*!
\file pkread.c
\note 
openssl3.2 - 官方demo学习 - pkcs12 - pkread.c

*/

/*
 * Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
 *
 * Licensed under the Apache License 2.0 (the "License").  You may not use
 * this file except in compliance with the License.  You can obtain a copy
 * in the file LICENSE in the source distribution or at
 * https://www.openssl.org/source/license.html
 */

#include 
#include 
#include 
#include 
#include 

#include "my_openSSL_lib.h"

 /* Simple PKCS#12 file reader */

static char* find_friendly_name(PKCS12* p12)
{
	STACK_OF(PKCS7)* safes;
	int n, m;
	char* name = NULL;
	PKCS7* safe;
	STACK_OF(PKCS12_SAFEBAG)* bags;
	PKCS12_SAFEBAG* bag;

	if ((safes = PKCS12_unpack_authsafes(p12)) == NULL)
		return NULL;

	for (n = 0; n < sk_PKCS7_num(safes) && name == NULL; n++) {
		safe = sk_PKCS7_value(safes, n);
		if (OBJ_obj2nid(safe->type) != NID_pkcs7_data
			|| (bags = PKCS12_unpack_p7data(safe)) == NULL)
			continue;

		for (m = 0; m < sk_PKCS12_SAFEBAG_num(bags) && name == NULL; m++) {
			bag = sk_PKCS12_SAFEBAG_value(bags, m);
			name = PKCS12_get_friendlyname(bag);
		}
		sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
	}

	sk_PKCS7_pop_free(safes, PKCS7_free);

	return name;
}

/*!
* 程序功能, 读.P12文件(需要给出导出口令), 将证书的友好名称, 私钥, 可信任证书都导出到指定的输出文件.  
*/
int main(int argc, char** argv)
{
	FILE* fp;
	EVP_PKEY* pkey = NULL;
	X509* cert = NULL;
	STACK_OF(X509)* ca = NULL;
	PKCS12* p12 = NULL;
	char* name = NULL;
	int i, ret = EXIT_FAILURE;

	const char* psz_p12file = NULL;
	const char* psz_pwd = NULL;
	const char* psz_opfile = NULL;

	if (argc != 4) {
		// pkread p12file password opfile
		//        my_server.p12 pwd_my_server out.pem      
		fprintf(stderr, "Usage: pkread p12file password opfile\n");
		exit(EXIT_FAILURE);
	}

	psz_p12file = argv[1];
	psz_pwd = argv[2];
	psz_opfile = argv[3];

	if ((fp = fopen(psz_p12file, "rb")) == NULL) {
		fprintf(stderr, "Error opening file %s\n", psz_p12file);
		exit(EXIT_FAILURE);
	}
	p12 = d2i_PKCS12_fp(fp, NULL);
	fclose(fp);
	if (p12 == NULL) {
		fprintf(stderr, "Error reading PKCS#12 file\n");
		ERR_print_errors_fp(stderr);
		goto err;
	}
	if (!PKCS12_parse(p12, psz_pwd, &pkey, &cert, &ca)) {
		fprintf(stderr, "Error parsing PKCS#12 file\n");
		ERR_print_errors_fp(stderr);
		goto err;
	}
	name = find_friendly_name(p12);
	PKCS12_free(p12);
	if ((fp = fopen(psz_opfile, "w")) == NULL) {
		fprintf(stderr, "Error opening file %s\n", psz_opfile);
		goto err;
	}
	if (name != NULL)
		fprintf(fp, "***Friendly Name***\n%s\n", name);
	if (pkey != NULL) {
		fprintf(fp, "***Private Key***\n");
		PEM_write_PrivateKey(fp, pkey, NULL, NULL, 0, NULL, NULL);
	}
	if (cert != NULL) {
		fprintf(fp, "***User Certificate***\n");
		PEM_write_X509_AUX(fp, cert);
	}
	if (ca != NULL && sk_X509_num(ca) > 0) {
		fprintf(fp, "***Other Certificates***\n");
		for (i = 0; i < sk_X509_num(ca); i++)
			PEM_write_X509_AUX(fp, sk_X509_value(ca, i));
	}
	fclose(fp);

	ret = EXIT_SUCCESS;

err:
	OPENSSL_free(name);
	X509_free(cert);
	EVP_PKEY_free(pkey);
	OSSL_STACK_OF_X509_free(ca);

	return ret;
}

END

你可能感兴趣的:(openSSL,openSSL)