123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227 |
- /*
- * Copyright 2014-2023 The GmSSL Project. All Rights Reserved.
- *
- * Licensed under the Apache License, Version 2.0 (the License); you may
- * not use this file except in compliance with the License.
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- */
- #include <stdio.h>
- #include <string.h>
- #include <stdlib.h>
- extern int version_main(int argc, char **argv);
- extern int rand_main(int argc, char **argv);
- extern int certgen_main(int argc, char **argv);
- extern int certparse_main(int argc, char **argv);
- extern int certverify_main(int argc, char **argv);
- extern int certrevoke_main(int argc, char **argv);
- extern int crlget_main(int argc, char **argv);
- extern int crlgen_main(int argc, char **argv);
- extern int crlparse_main(int argc, char **argv);
- extern int crlverify_main(int argc, char **argv);
- extern int pbkdf2_main(int argc, char **argv);
- extern int reqgen_main(int argc, char **argv);
- extern int reqparse_main(int argc, char **argv);
- extern int reqsign_main(int argc, char **argv);
- extern int sm2keygen_main(int argc, char **argv);
- extern int sm2sign_main(int argc, char **argv);
- extern int sm2verify_main(int argc, char **argv);
- extern int sm2encrypt_main(int argc, char **argv);
- extern int sm2decrypt_main(int argc, char **argv);
- extern int sm3_main(int argc, char **argv);
- extern int sm3hmac_main(int argc, char **argv);
- extern int sm4_main(int argc, char **argv);
- extern int zuc_main(int argc, char **argv);
- extern int sm9setup_main(int argc, char **argv);
- extern int sm9keygen_main(int argc, char **argv);
- extern int sm9sign_main(int argc, char **argv);
- extern int sm9verify_main(int argc, char **argv);
- extern int sm9encrypt_main(int argc, char **argv);
- extern int sm9decrypt_main(int argc, char **argv);
- extern int cmsparse_main(int argc, char **argv);
- extern int cmsencrypt_main(int argc, char **argv);
- extern int cmsdecrypt_main(int argc, char **argv);
- extern int cmssign_main(int argc, char **argv);
- extern int cmsverify_main(int argc, char **argv);
- extern int tlcp_client_main(int argc, char **argv);
- extern int tlcp_server_main(int argc, char **argv);
- extern int tls12_client_main(int argc, char **argv);
- extern int tls12_server_main(int argc, char **argv);
- extern int tls13_client_main(int argc, char **argv);
- extern int tls13_server_main(int argc, char **argv);
- extern int sdfutil_main(int argc, char **argv);
- extern int skfutil_main(int argc, char **argv);
- static const char *options =
- "command [options]\n"
- "command -help\n"
- "\n"
- "Commands:\n"
- " help Print this help message\n"
- " version Print version\n"
- " rand Generate random bytes\n"
- " sm2keygen Generate SM2 keypair\n"
- " sm2sign Generate SM2 signature\n"
- " sm2verify Verify SM2 signature\n"
- " sm2encrypt Encrypt with SM2 public key\n"
- " sm2decrypt Decrypt with SM2 private key\n"
- " sm3 Generate SM3 hash\n"
- " sm3hmac Generate SM3 HMAC tag\n"
- " sm4 Encrypt or decrypt with SM4\n"
- " zuc Encrypt or decrypt with ZUC\n"
- " sm9setup Generate SM9 master secret\n"
- " sm9keygen Generate SM9 private key\n"
- " sm9sign Generate SM9 signature\n"
- " sm9verify Verify SM9 signature\n"
- " sm9encrypt SM9 public key encryption\n"
- " sm9decrypt SM9 decryption\n"
- " pbkdf2 Generate key from password\n"
- " reqgen Generate certificate signing request (CSR)\n"
- " reqsign Generate certificate from CSR\n"
- " reqparse Parse and print a CSR\n"
- " crlget Download the CRL of given certificate\n"
- " crlgen Sign a CRL with CA certificate and private key\n"
- " crlverify Verify a CRL with issuer's certificate\n"
- " crlparse Parse and print CRL\n"
- " certgen Generate a self-signed certificate\n"
- " certparse Parse and print certificates\n"
- " certverify Verify certificate chain\n"
- " certrevoke Revoke certificate and output RevokedCertificate record\n"
- " cmsparse Parse CMS (cryptographic message syntax) file\n"
- " cmsencrypt Generate CMS EnvelopedData\n"
- " cmsdecrypt Decrypt CMS EnvelopedData\n"
- " cmssign Generate CMS SignedData\n"
- " cmsverify Verify CMS SignedData\n"
- " sdfutil SDF crypto device utility\n"
- " skfutil SKF crypto device utility\n"
- " tlcp_client TLCP client\n"
- " tlcp_server TLCP server\n"
- " tls12_client TLS 1.2 client\n"
- " tls12_server TLS 1.2 server\n"
- " tls13_client TLS 1.3 client\n"
- " tls13_server TLS 1.3 server\n"
- "\n"
- "run `gmssl <command> -help` to print help of the given command\n"
- "\n";
- int main(int argc, char **argv)
- {
- int ret = 1;
- char *prog = argv[0];
- argc--;
- argv++;
- if (argc < 1) {
- printf("Usage: %s %s\n", prog, options);
- return 1;
- }
- while (argc > 0) {
- if (!strcmp(*argv, "help")) {
- printf("usage: %s %s\n", prog, options);
- return 0;
- } else if (!strcmp(*argv, "version")) {
- return version_main(argc, argv);
- } else if (!strcmp(*argv, "rand")) {
- return rand_main(argc, argv);
- } else if (!strcmp(*argv, "certgen")) {
- return certgen_main(argc, argv);
- } else if (!strcmp(*argv, "certparse")) {
- return certparse_main(argc, argv);
- } else if (!strcmp(*argv, "certverify")) {
- return certverify_main(argc, argv);
- } else if (!strcmp(*argv, "certrevoke")) {
- return certrevoke_main(argc, argv);
- } else if (!strcmp(*argv, "crlget")) {
- return crlget_main(argc, argv);
- } else if (!strcmp(*argv, "crlgen")) {
- return crlgen_main(argc, argv);
- } else if (!strcmp(*argv, "crlparse")) {
- return crlparse_main(argc, argv);
- } else if (!strcmp(*argv, "crlverify")) {
- return crlverify_main(argc, argv);
- } else if (!strcmp(*argv, "reqgen")) {
- return reqgen_main(argc, argv);
- } else if (!strcmp(*argv, "reqparse")) {
- return reqparse_main(argc, argv);
- } else if (!strcmp(*argv, "reqsign")) {
- return reqsign_main(argc, argv);
- } else if (!strcmp(*argv, "pbkdf2")) {
- return pbkdf2_main(argc, argv);
- } else if (!strcmp(*argv, "sm2keygen")) {
- return sm2keygen_main(argc, argv);
- } else if (!strcmp(*argv, "sm2sign")) {
- return sm2sign_main(argc, argv);
- } else if (!strcmp(*argv, "sm2verify")) {
- return sm2verify_main(argc, argv);
- } else if (!strcmp(*argv, "sm2encrypt")) {
- return sm2encrypt_main(argc, argv);
- } else if (!strcmp(*argv, "sm2decrypt")) {
- return sm2decrypt_main(argc, argv);
- } else if (!strcmp(*argv, "sm3")) {
- return sm3_main(argc, argv);
- } else if (!strcmp(*argv, "sm3hmac")) {
- return sm3hmac_main(argc, argv);
- } else if (!strcmp(*argv, "sm4")) {
- return sm4_main(argc, argv);
- } else if (!strcmp(*argv, "zuc")) {
- return zuc_main(argc, argv);
- } else if (!strcmp(*argv, "sm9setup")) {
- return sm9setup_main(argc, argv);
- } else if (!strcmp(*argv, "sm9keygen")) {
- return sm9keygen_main(argc, argv);
- } else if (!strcmp(*argv, "sm9sign")) {
- return sm9sign_main(argc, argv);
- } else if (!strcmp(*argv, "sm9verify")) {
- return sm9verify_main(argc, argv);
- } else if (!strcmp(*argv, "sm9encrypt")) {
- return sm9encrypt_main(argc, argv);
- } else if (!strcmp(*argv, "sm9decrypt")) {
- return sm9decrypt_main(argc, argv);
- } else if (!strcmp(*argv, "cmsparse")) {
- return cmsparse_main(argc, argv);
- } else if (!strcmp(*argv, "cmsencrypt")) {
- return cmsencrypt_main(argc, argv);
- } else if (!strcmp(*argv, "cmsdecrypt")) {
- return cmsdecrypt_main(argc, argv);
- } else if (!strcmp(*argv, "cmssign")) {
- return cmssign_main(argc, argv);
- } else if (!strcmp(*argv, "cmsverify")) {
- return cmsverify_main(argc, argv);
- } else if (!strcmp(*argv, "tlcp_client")) {
- return tlcp_client_main(argc, argv);
- } else if (!strcmp(*argv, "tlcp_server")) {
- return tlcp_server_main(argc, argv);
- } else if (!strcmp(*argv, "tls12_client")) {
- return tls12_client_main(argc, argv);
- } else if (!strcmp(*argv, "tls12_server")) {
- return tls12_server_main(argc, argv);
- } else if (!strcmp(*argv, "tls13_client")) {
- return tls13_client_main(argc, argv);
- } else if (!strcmp(*argv, "tls13_server")) {
- return tls13_server_main(argc, argv);
- #ifndef WIN32
- } else if (!strcmp(*argv, "sdfutil")) {
- return sdfutil_main(argc, argv);
- } else if (!strcmp(*argv, "skfutil")) {
- return skfutil_main(argc, argv);
- #endif
- } else {
- fprintf(stderr, "%s: illegal option '%s'\n", prog, *argv);
- fprintf(stderr, "usage: %s %s\n", prog, options);
- return 1;
- }
- argc--;
- argv++;
- }
- return ret;
- }
|