| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227 | /* *  Copyright 2014-2023 The GmSSL Project. All Rights Reserved. * *  Licensed under the Apache License, Version 2.0 (the License); you may *  not use this file except in compliance with the License. * *  http://www.apache.org/licenses/LICENSE-2.0 */#include <stdio.h>#include <string.h>#include <stdlib.h>extern int version_main(int argc, char **argv);extern int rand_main(int argc, char **argv);extern int certgen_main(int argc, char **argv);extern int certparse_main(int argc, char **argv);extern int certverify_main(int argc, char **argv);extern int certrevoke_main(int argc, char **argv);extern int crlget_main(int argc, char **argv);extern int crlgen_main(int argc, char **argv);extern int crlparse_main(int argc, char **argv);extern int crlverify_main(int argc, char **argv);extern int pbkdf2_main(int argc, char **argv);extern int reqgen_main(int argc, char **argv);extern int reqparse_main(int argc, char **argv);extern int reqsign_main(int argc, char **argv);extern int sm2keygen_main(int argc, char **argv);extern int sm2sign_main(int argc, char **argv);extern int sm2verify_main(int argc, char **argv);extern int sm2encrypt_main(int argc, char **argv);extern int sm2decrypt_main(int argc, char **argv);extern int sm3_main(int argc, char **argv);extern int sm3hmac_main(int argc, char **argv);extern int sm4_main(int argc, char **argv);extern int zuc_main(int argc, char **argv);extern int sm9setup_main(int argc, char **argv);extern int sm9keygen_main(int argc, char **argv);extern int sm9sign_main(int argc, char **argv);extern int sm9verify_main(int argc, char **argv);extern int sm9encrypt_main(int argc, char **argv);extern int sm9decrypt_main(int argc, char **argv);extern int cmsparse_main(int argc, char **argv);extern int cmsencrypt_main(int argc, char **argv);extern int cmsdecrypt_main(int argc, char **argv);extern int cmssign_main(int argc, char **argv);extern int cmsverify_main(int argc, char **argv);extern int tlcp_client_main(int argc, char **argv);extern int tlcp_server_main(int argc, char **argv);extern int tls12_client_main(int argc, char **argv);extern int tls12_server_main(int argc, char **argv);extern int tls13_client_main(int argc, char **argv);extern int tls13_server_main(int argc, char **argv);extern int sdfutil_main(int argc, char **argv);extern int skfutil_main(int argc, char **argv);static const char *options =	"command [options]\n"	"command -help\n"	"\n"	"Commands:\n"	"  help            Print this help message\n"	"  version         Print version\n"	"  rand            Generate random bytes\n"	"  sm2keygen       Generate SM2 keypair\n"	"  sm2sign         Generate SM2 signature\n"	"  sm2verify       Verify SM2 signature\n"	"  sm2encrypt      Encrypt with SM2 public key\n"	"  sm2decrypt      Decrypt with SM2 private key\n"	"  sm3             Generate SM3 hash\n"	"  sm3hmac         Generate SM3 HMAC tag\n"	"  sm4             Encrypt or decrypt with SM4\n"	"  zuc             Encrypt or decrypt with ZUC\n"	"  sm9setup        Generate SM9 master secret\n"	"  sm9keygen       Generate SM9 private key\n"	"  sm9sign         Generate SM9 signature\n"	"  sm9verify       Verify SM9 signature\n"	"  sm9encrypt      SM9 public key encryption\n"	"  sm9decrypt      SM9 decryption\n"	"  pbkdf2          Generate key from password\n"	"  reqgen          Generate certificate signing request (CSR)\n"	"  reqsign         Generate certificate from CSR\n"	"  reqparse        Parse and print a CSR\n"	"  crlget          Download the CRL of given certificate\n"	"  crlgen          Sign a CRL with CA certificate and private key\n"	"  crlverify       Verify a CRL with issuer's certificate\n"	"  crlparse        Parse and print CRL\n"	"  certgen         Generate a self-signed certificate\n"	"  certparse       Parse and print certificates\n"	"  certverify      Verify certificate chain\n"	"  certrevoke      Revoke certificate and output RevokedCertificate record\n"	"  cmsparse        Parse CMS (cryptographic message syntax) file\n"	"  cmsencrypt      Generate CMS EnvelopedData\n"	"  cmsdecrypt      Decrypt CMS EnvelopedData\n"	"  cmssign         Generate CMS SignedData\n"	"  cmsverify       Verify CMS SignedData\n"	"  sdfutil         SDF crypto device utility\n"	"  skfutil         SKF crypto device utility\n"	"  tlcp_client     TLCP client\n"	"  tlcp_server     TLCP server\n"	"  tls12_client    TLS 1.2 client\n"	"  tls12_server    TLS 1.2 server\n"	"  tls13_client    TLS 1.3 client\n"	"  tls13_server    TLS 1.3 server\n"	"\n"	"run `gmssl <command> -help` to print help of the given command\n"	"\n";int main(int argc, char **argv){	int ret = 1;	char *prog = argv[0];	argc--;	argv++;	if (argc < 1) {		printf("Usage: %s %s\n", prog, options);		return 1;	}	while (argc > 0) {		if (!strcmp(*argv, "help")) {			printf("usage: %s %s\n", prog, options);			return 0;		} else if (!strcmp(*argv, "version")) {			return version_main(argc, argv);		} else if (!strcmp(*argv, "rand")) {			return rand_main(argc, argv);		} else if (!strcmp(*argv, "certgen")) {			return certgen_main(argc, argv);		} else if (!strcmp(*argv, "certparse")) {			return certparse_main(argc, argv);		} else if (!strcmp(*argv, "certverify")) {			return certverify_main(argc, argv);		} else if (!strcmp(*argv, "certrevoke")) {			return certrevoke_main(argc, argv);		} else if (!strcmp(*argv, "crlget")) {			return crlget_main(argc, argv);		} else if (!strcmp(*argv, "crlgen")) {			return crlgen_main(argc, argv);		} else if (!strcmp(*argv, "crlparse")) {			return crlparse_main(argc, argv);		} else if (!strcmp(*argv, "crlverify")) {			return crlverify_main(argc, argv);		} else if (!strcmp(*argv, "reqgen")) {			return reqgen_main(argc, argv);		} else if (!strcmp(*argv, "reqparse")) {			return reqparse_main(argc, argv);		} else if (!strcmp(*argv, "reqsign")) {			return reqsign_main(argc, argv);		} else if (!strcmp(*argv, "pbkdf2")) {			return pbkdf2_main(argc, argv);		} else if (!strcmp(*argv, "sm2keygen")) {			return sm2keygen_main(argc, argv);		} else if (!strcmp(*argv, "sm2sign")) {			return sm2sign_main(argc, argv);		} else if (!strcmp(*argv, "sm2verify")) {			return sm2verify_main(argc, argv);		} else if (!strcmp(*argv, "sm2encrypt")) {			return sm2encrypt_main(argc, argv);		} else if (!strcmp(*argv, "sm2decrypt")) {			return sm2decrypt_main(argc, argv);		} else if (!strcmp(*argv, "sm3")) {			return sm3_main(argc, argv);		} else if (!strcmp(*argv, "sm3hmac")) {			return sm3hmac_main(argc, argv);		} else if (!strcmp(*argv, "sm4")) {			return sm4_main(argc, argv);		} else if (!strcmp(*argv, "zuc")) {			return zuc_main(argc, argv);		} else if (!strcmp(*argv, "sm9setup")) {			return sm9setup_main(argc, argv);		} else if (!strcmp(*argv, "sm9keygen")) {			return sm9keygen_main(argc, argv);		} else if (!strcmp(*argv, "sm9sign")) {			return sm9sign_main(argc, argv);		} else if (!strcmp(*argv, "sm9verify")) {			return sm9verify_main(argc, argv);		} else if (!strcmp(*argv, "sm9encrypt")) {			return sm9encrypt_main(argc, argv);		} else if (!strcmp(*argv, "sm9decrypt")) {			return sm9decrypt_main(argc, argv);		} else if (!strcmp(*argv, "cmsparse")) {			return cmsparse_main(argc, argv);		} else if (!strcmp(*argv, "cmsencrypt")) {			return cmsencrypt_main(argc, argv);		} else if (!strcmp(*argv, "cmsdecrypt")) {			return cmsdecrypt_main(argc, argv);		} else if (!strcmp(*argv, "cmssign")) {			return cmssign_main(argc, argv);		} else if (!strcmp(*argv, "cmsverify")) {			return cmsverify_main(argc, argv);		} else if (!strcmp(*argv, "tlcp_client")) {			return tlcp_client_main(argc, argv);		} else if (!strcmp(*argv, "tlcp_server")) {			return tlcp_server_main(argc, argv);		} else if (!strcmp(*argv, "tls12_client")) {			return tls12_client_main(argc, argv);		} else if (!strcmp(*argv, "tls12_server")) {			return tls12_server_main(argc, argv);		} else if (!strcmp(*argv, "tls13_client")) {			return tls13_client_main(argc, argv);		} else if (!strcmp(*argv, "tls13_server")) {			return tls13_server_main(argc, argv);#ifndef WIN32		} else if (!strcmp(*argv, "sdfutil")) {			return sdfutil_main(argc, argv);		} else if (!strcmp(*argv, "skfutil")) {			return skfutil_main(argc, argv);#endif		} else {			fprintf(stderr, "%s: illegal option '%s'\n", prog, *argv);			fprintf(stderr, "usage: %s %s\n", prog, options);			return 1;		}		argc--;		argv++;	}	return ret;}
 |