gmssl.c 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227
  1. /*
  2. * Copyright 2014-2023 The GmSSL Project. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the License); you may
  5. * not use this file except in compliance with the License.
  6. *
  7. * http://www.apache.org/licenses/LICENSE-2.0
  8. */
  9. #include <stdio.h>
  10. #include <string.h>
  11. #include <stdlib.h>
  12. extern int version_main(int argc, char **argv);
  13. extern int rand_main(int argc, char **argv);
  14. extern int certgen_main(int argc, char **argv);
  15. extern int certparse_main(int argc, char **argv);
  16. extern int certverify_main(int argc, char **argv);
  17. extern int certrevoke_main(int argc, char **argv);
  18. extern int crlget_main(int argc, char **argv);
  19. extern int crlgen_main(int argc, char **argv);
  20. extern int crlparse_main(int argc, char **argv);
  21. extern int crlverify_main(int argc, char **argv);
  22. extern int pbkdf2_main(int argc, char **argv);
  23. extern int reqgen_main(int argc, char **argv);
  24. extern int reqparse_main(int argc, char **argv);
  25. extern int reqsign_main(int argc, char **argv);
  26. extern int sm2keygen_main(int argc, char **argv);
  27. extern int sm2sign_main(int argc, char **argv);
  28. extern int sm2verify_main(int argc, char **argv);
  29. extern int sm2encrypt_main(int argc, char **argv);
  30. extern int sm2decrypt_main(int argc, char **argv);
  31. extern int sm3_main(int argc, char **argv);
  32. extern int sm3hmac_main(int argc, char **argv);
  33. extern int sm4_main(int argc, char **argv);
  34. extern int zuc_main(int argc, char **argv);
  35. extern int sm9setup_main(int argc, char **argv);
  36. extern int sm9keygen_main(int argc, char **argv);
  37. extern int sm9sign_main(int argc, char **argv);
  38. extern int sm9verify_main(int argc, char **argv);
  39. extern int sm9encrypt_main(int argc, char **argv);
  40. extern int sm9decrypt_main(int argc, char **argv);
  41. extern int cmsparse_main(int argc, char **argv);
  42. extern int cmsencrypt_main(int argc, char **argv);
  43. extern int cmsdecrypt_main(int argc, char **argv);
  44. extern int cmssign_main(int argc, char **argv);
  45. extern int cmsverify_main(int argc, char **argv);
  46. extern int tlcp_client_main(int argc, char **argv);
  47. extern int tlcp_server_main(int argc, char **argv);
  48. extern int tls12_client_main(int argc, char **argv);
  49. extern int tls12_server_main(int argc, char **argv);
  50. extern int tls13_client_main(int argc, char **argv);
  51. extern int tls13_server_main(int argc, char **argv);
  52. extern int sdfutil_main(int argc, char **argv);
  53. extern int skfutil_main(int argc, char **argv);
  54. static const char *options =
  55. "command [options]\n"
  56. "command -help\n"
  57. "\n"
  58. "Commands:\n"
  59. " help Print this help message\n"
  60. " version Print version\n"
  61. " rand Generate random bytes\n"
  62. " sm2keygen Generate SM2 keypair\n"
  63. " sm2sign Generate SM2 signature\n"
  64. " sm2verify Verify SM2 signature\n"
  65. " sm2encrypt Encrypt with SM2 public key\n"
  66. " sm2decrypt Decrypt with SM2 private key\n"
  67. " sm3 Generate SM3 hash\n"
  68. " sm3hmac Generate SM3 HMAC tag\n"
  69. " sm4 Encrypt or decrypt with SM4\n"
  70. " zuc Encrypt or decrypt with ZUC\n"
  71. " sm9setup Generate SM9 master secret\n"
  72. " sm9keygen Generate SM9 private key\n"
  73. " sm9sign Generate SM9 signature\n"
  74. " sm9verify Verify SM9 signature\n"
  75. " sm9encrypt SM9 public key encryption\n"
  76. " sm9decrypt SM9 decryption\n"
  77. " pbkdf2 Generate key from password\n"
  78. " reqgen Generate certificate signing request (CSR)\n"
  79. " reqsign Generate certificate from CSR\n"
  80. " reqparse Parse and print a CSR\n"
  81. " crlget Download the CRL of given certificate\n"
  82. " crlgen Sign a CRL with CA certificate and private key\n"
  83. " crlverify Verify a CRL with issuer's certificate\n"
  84. " crlparse Parse and print CRL\n"
  85. " certgen Generate a self-signed certificate\n"
  86. " certparse Parse and print certificates\n"
  87. " certverify Verify certificate chain\n"
  88. " certrevoke Revoke certificate and output RevokedCertificate record\n"
  89. " cmsparse Parse CMS (cryptographic message syntax) file\n"
  90. " cmsencrypt Generate CMS EnvelopedData\n"
  91. " cmsdecrypt Decrypt CMS EnvelopedData\n"
  92. " cmssign Generate CMS SignedData\n"
  93. " cmsverify Verify CMS SignedData\n"
  94. " sdfutil SDF crypto device utility\n"
  95. " skfutil SKF crypto device utility\n"
  96. " tlcp_client TLCP client\n"
  97. " tlcp_server TLCP server\n"
  98. " tls12_client TLS 1.2 client\n"
  99. " tls12_server TLS 1.2 server\n"
  100. " tls13_client TLS 1.3 client\n"
  101. " tls13_server TLS 1.3 server\n"
  102. "\n"
  103. "run `gmssl <command> -help` to print help of the given command\n"
  104. "\n";
  105. int main(int argc, char **argv)
  106. {
  107. int ret = 1;
  108. char *prog = argv[0];
  109. argc--;
  110. argv++;
  111. if (argc < 1) {
  112. printf("Usage: %s %s\n", prog, options);
  113. return 1;
  114. }
  115. while (argc > 0) {
  116. if (!strcmp(*argv, "help")) {
  117. printf("usage: %s %s\n", prog, options);
  118. return 0;
  119. } else if (!strcmp(*argv, "version")) {
  120. return version_main(argc, argv);
  121. } else if (!strcmp(*argv, "rand")) {
  122. return rand_main(argc, argv);
  123. } else if (!strcmp(*argv, "certgen")) {
  124. return certgen_main(argc, argv);
  125. } else if (!strcmp(*argv, "certparse")) {
  126. return certparse_main(argc, argv);
  127. } else if (!strcmp(*argv, "certverify")) {
  128. return certverify_main(argc, argv);
  129. } else if (!strcmp(*argv, "certrevoke")) {
  130. return certrevoke_main(argc, argv);
  131. } else if (!strcmp(*argv, "crlget")) {
  132. return crlget_main(argc, argv);
  133. } else if (!strcmp(*argv, "crlgen")) {
  134. return crlgen_main(argc, argv);
  135. } else if (!strcmp(*argv, "crlparse")) {
  136. return crlparse_main(argc, argv);
  137. } else if (!strcmp(*argv, "crlverify")) {
  138. return crlverify_main(argc, argv);
  139. } else if (!strcmp(*argv, "reqgen")) {
  140. return reqgen_main(argc, argv);
  141. } else if (!strcmp(*argv, "reqparse")) {
  142. return reqparse_main(argc, argv);
  143. } else if (!strcmp(*argv, "reqsign")) {
  144. return reqsign_main(argc, argv);
  145. } else if (!strcmp(*argv, "pbkdf2")) {
  146. return pbkdf2_main(argc, argv);
  147. } else if (!strcmp(*argv, "sm2keygen")) {
  148. return sm2keygen_main(argc, argv);
  149. } else if (!strcmp(*argv, "sm2sign")) {
  150. return sm2sign_main(argc, argv);
  151. } else if (!strcmp(*argv, "sm2verify")) {
  152. return sm2verify_main(argc, argv);
  153. } else if (!strcmp(*argv, "sm2encrypt")) {
  154. return sm2encrypt_main(argc, argv);
  155. } else if (!strcmp(*argv, "sm2decrypt")) {
  156. return sm2decrypt_main(argc, argv);
  157. } else if (!strcmp(*argv, "sm3")) {
  158. return sm3_main(argc, argv);
  159. } else if (!strcmp(*argv, "sm3hmac")) {
  160. return sm3hmac_main(argc, argv);
  161. } else if (!strcmp(*argv, "sm4")) {
  162. return sm4_main(argc, argv);
  163. } else if (!strcmp(*argv, "zuc")) {
  164. return zuc_main(argc, argv);
  165. } else if (!strcmp(*argv, "sm9setup")) {
  166. return sm9setup_main(argc, argv);
  167. } else if (!strcmp(*argv, "sm9keygen")) {
  168. return sm9keygen_main(argc, argv);
  169. } else if (!strcmp(*argv, "sm9sign")) {
  170. return sm9sign_main(argc, argv);
  171. } else if (!strcmp(*argv, "sm9verify")) {
  172. return sm9verify_main(argc, argv);
  173. } else if (!strcmp(*argv, "sm9encrypt")) {
  174. return sm9encrypt_main(argc, argv);
  175. } else if (!strcmp(*argv, "sm9decrypt")) {
  176. return sm9decrypt_main(argc, argv);
  177. } else if (!strcmp(*argv, "cmsparse")) {
  178. return cmsparse_main(argc, argv);
  179. } else if (!strcmp(*argv, "cmsencrypt")) {
  180. return cmsencrypt_main(argc, argv);
  181. } else if (!strcmp(*argv, "cmsdecrypt")) {
  182. return cmsdecrypt_main(argc, argv);
  183. } else if (!strcmp(*argv, "cmssign")) {
  184. return cmssign_main(argc, argv);
  185. } else if (!strcmp(*argv, "cmsverify")) {
  186. return cmsverify_main(argc, argv);
  187. } else if (!strcmp(*argv, "tlcp_client")) {
  188. return tlcp_client_main(argc, argv);
  189. } else if (!strcmp(*argv, "tlcp_server")) {
  190. return tlcp_server_main(argc, argv);
  191. } else if (!strcmp(*argv, "tls12_client")) {
  192. return tls12_client_main(argc, argv);
  193. } else if (!strcmp(*argv, "tls12_server")) {
  194. return tls12_server_main(argc, argv);
  195. } else if (!strcmp(*argv, "tls13_client")) {
  196. return tls13_client_main(argc, argv);
  197. } else if (!strcmp(*argv, "tls13_server")) {
  198. return tls13_server_main(argc, argv);
  199. #ifndef WIN32
  200. } else if (!strcmp(*argv, "sdfutil")) {
  201. return sdfutil_main(argc, argv);
  202. } else if (!strcmp(*argv, "skfutil")) {
  203. return skfutil_main(argc, argv);
  204. #endif
  205. } else {
  206. fprintf(stderr, "%s: illegal option '%s'\n", prog, *argv);
  207. fprintf(stderr, "usage: %s %s\n", prog, options);
  208. return 1;
  209. }
  210. argc--;
  211. argv++;
  212. }
  213. return ret;
  214. }