1 | /*
|
---|
2 | * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
|
---|
3 | *
|
---|
4 | * Licensed under the OpenSSL license (the "License"). You may not use
|
---|
5 | * this file except in compliance with the License. You can obtain a copy
|
---|
6 | * in the file LICENSE in the source distribution or at
|
---|
7 | * https://www.openssl.org/source/license.html
|
---|
8 | */
|
---|
9 |
|
---|
10 | /*
|
---|
11 | * A nice addition from Dr Stephen Henson <steve@openssl.org> to add the
|
---|
12 | * -strparse option which parses nested binary structures
|
---|
13 | */
|
---|
14 |
|
---|
15 | #include <stdio.h>
|
---|
16 | #include <stdlib.h>
|
---|
17 | #include <string.h>
|
---|
18 | #include "apps.h"
|
---|
19 | #include <openssl/err.h>
|
---|
20 | #include <openssl/evp.h>
|
---|
21 | #include <openssl/x509.h>
|
---|
22 | #include <openssl/pem.h>
|
---|
23 |
|
---|
24 | typedef enum OPTION_choice {
|
---|
25 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
|
---|
26 | OPT_INFORM, OPT_IN, OPT_OUT, OPT_INDENT, OPT_NOOUT,
|
---|
27 | OPT_OID, OPT_OFFSET, OPT_LENGTH, OPT_DUMP, OPT_DLIMIT,
|
---|
28 | OPT_STRPARSE, OPT_GENSTR, OPT_GENCONF, OPT_STRICTPEM
|
---|
29 | } OPTION_CHOICE;
|
---|
30 |
|
---|
31 | OPTIONS asn1parse_options[] = {
|
---|
32 | {"help", OPT_HELP, '-', "Display this summary"},
|
---|
33 | {"inform", OPT_INFORM, 'F', "input format - one of DER PEM"},
|
---|
34 | {"in", OPT_IN, '<', "input file"},
|
---|
35 | {"out", OPT_OUT, '>', "output file (output format is always DER)"},
|
---|
36 | {"i", OPT_INDENT, 0, "indents the output"},
|
---|
37 | {"noout", OPT_NOOUT, 0, "do not produce any output"},
|
---|
38 | {"offset", OPT_OFFSET, 'p', "offset into file"},
|
---|
39 | {"length", OPT_LENGTH, 'p', "length of section in file"},
|
---|
40 | {"oid", OPT_OID, '<', "file of extra oid definitions"},
|
---|
41 | {"dump", OPT_DUMP, 0, "unknown data in hex form"},
|
---|
42 | {"dlimit", OPT_DLIMIT, 'p',
|
---|
43 | "dump the first arg bytes of unknown data in hex form"},
|
---|
44 | {"strparse", OPT_STRPARSE, 's',
|
---|
45 | "offset; a series of these can be used to 'dig'"},
|
---|
46 | {OPT_MORE_STR, 0, 0, "into multiple ASN1 blob wrappings"},
|
---|
47 | {"genstr", OPT_GENSTR, 's', "string to generate ASN1 structure from"},
|
---|
48 | {"genconf", OPT_GENCONF, 's', "file to generate ASN1 structure from"},
|
---|
49 | {OPT_MORE_STR, 0, 0, "(-inform will be ignored)"},
|
---|
50 | {"strictpem", OPT_STRICTPEM, 0,
|
---|
51 | "do not attempt base64 decode outside PEM markers"},
|
---|
52 | {NULL}
|
---|
53 | };
|
---|
54 |
|
---|
55 | static int do_generate(char *genstr, const char *genconf, BUF_MEM *buf);
|
---|
56 |
|
---|
57 | int asn1parse_main(int argc, char **argv)
|
---|
58 | {
|
---|
59 | ASN1_TYPE *at = NULL;
|
---|
60 | BIO *in = NULL, *b64 = NULL, *derout = NULL;
|
---|
61 | BUF_MEM *buf = NULL;
|
---|
62 | STACK_OF(OPENSSL_STRING) *osk = NULL;
|
---|
63 | char *genstr = NULL, *genconf = NULL;
|
---|
64 | char *infile = NULL, *oidfile = NULL, *derfile = NULL;
|
---|
65 | unsigned char *str = NULL;
|
---|
66 | char *name = NULL, *header = NULL, *prog;
|
---|
67 | const unsigned char *ctmpbuf;
|
---|
68 | int indent = 0, noout = 0, dump = 0, strictpem = 0, informat = FORMAT_PEM;
|
---|
69 | int offset = 0, ret = 1, i, j;
|
---|
70 | long num, tmplen;
|
---|
71 | unsigned char *tmpbuf;
|
---|
72 | unsigned int length = 0;
|
---|
73 | OPTION_CHOICE o;
|
---|
74 |
|
---|
75 | prog = opt_init(argc, argv, asn1parse_options);
|
---|
76 |
|
---|
77 | if ((osk = sk_OPENSSL_STRING_new_null()) == NULL) {
|
---|
78 | BIO_printf(bio_err, "%s: Memory allocation failure\n", prog);
|
---|
79 | goto end;
|
---|
80 | }
|
---|
81 |
|
---|
82 | while ((o = opt_next()) != OPT_EOF) {
|
---|
83 | switch (o) {
|
---|
84 | case OPT_EOF:
|
---|
85 | case OPT_ERR:
|
---|
86 | opthelp:
|
---|
87 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
|
---|
88 | goto end;
|
---|
89 | case OPT_HELP:
|
---|
90 | opt_help(asn1parse_options);
|
---|
91 | ret = 0;
|
---|
92 | goto end;
|
---|
93 | case OPT_INFORM:
|
---|
94 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat))
|
---|
95 | goto opthelp;
|
---|
96 | break;
|
---|
97 | case OPT_IN:
|
---|
98 | infile = opt_arg();
|
---|
99 | break;
|
---|
100 | case OPT_OUT:
|
---|
101 | derfile = opt_arg();
|
---|
102 | break;
|
---|
103 | case OPT_INDENT:
|
---|
104 | indent = 1;
|
---|
105 | break;
|
---|
106 | case OPT_NOOUT:
|
---|
107 | noout = 1;
|
---|
108 | break;
|
---|
109 | case OPT_OID:
|
---|
110 | oidfile = opt_arg();
|
---|
111 | break;
|
---|
112 | case OPT_OFFSET:
|
---|
113 | offset = strtol(opt_arg(), NULL, 0);
|
---|
114 | break;
|
---|
115 | case OPT_LENGTH:
|
---|
116 | length = atoi(opt_arg());
|
---|
117 | break;
|
---|
118 | case OPT_DUMP:
|
---|
119 | dump = -1;
|
---|
120 | break;
|
---|
121 | case OPT_DLIMIT:
|
---|
122 | dump = atoi(opt_arg());
|
---|
123 | break;
|
---|
124 | case OPT_STRPARSE:
|
---|
125 | sk_OPENSSL_STRING_push(osk, opt_arg());
|
---|
126 | break;
|
---|
127 | case OPT_GENSTR:
|
---|
128 | genstr = opt_arg();
|
---|
129 | break;
|
---|
130 | case OPT_GENCONF:
|
---|
131 | genconf = opt_arg();
|
---|
132 | break;
|
---|
133 | case OPT_STRICTPEM:
|
---|
134 | strictpem = 1;
|
---|
135 | informat = FORMAT_PEM;
|
---|
136 | break;
|
---|
137 | }
|
---|
138 | }
|
---|
139 | argc = opt_num_rest();
|
---|
140 | if (argc != 0)
|
---|
141 | goto opthelp;
|
---|
142 |
|
---|
143 | if (oidfile != NULL) {
|
---|
144 | in = bio_open_default(oidfile, 'r', FORMAT_TEXT);
|
---|
145 | if (in == NULL)
|
---|
146 | goto end;
|
---|
147 | OBJ_create_objects(in);
|
---|
148 | BIO_free(in);
|
---|
149 | }
|
---|
150 |
|
---|
151 | if ((in = bio_open_default(infile, 'r', informat)) == NULL)
|
---|
152 | goto end;
|
---|
153 |
|
---|
154 | if (derfile && (derout = bio_open_default(derfile, 'w', FORMAT_ASN1)) == NULL)
|
---|
155 | goto end;
|
---|
156 |
|
---|
157 | if (strictpem) {
|
---|
158 | if (PEM_read_bio(in, &name, &header, &str, &num) !=
|
---|
159 | 1) {
|
---|
160 | BIO_printf(bio_err, "Error reading PEM file\n");
|
---|
161 | ERR_print_errors(bio_err);
|
---|
162 | goto end;
|
---|
163 | }
|
---|
164 | } else {
|
---|
165 |
|
---|
166 | if ((buf = BUF_MEM_new()) == NULL)
|
---|
167 | goto end;
|
---|
168 | if (!BUF_MEM_grow(buf, BUFSIZ * 8))
|
---|
169 | goto end; /* Pre-allocate :-) */
|
---|
170 |
|
---|
171 | if (genstr || genconf) {
|
---|
172 | num = do_generate(genstr, genconf, buf);
|
---|
173 | if (num < 0) {
|
---|
174 | ERR_print_errors(bio_err);
|
---|
175 | goto end;
|
---|
176 | }
|
---|
177 | }
|
---|
178 |
|
---|
179 | else {
|
---|
180 |
|
---|
181 | if (informat == FORMAT_PEM) {
|
---|
182 | BIO *tmp;
|
---|
183 |
|
---|
184 | if ((b64 = BIO_new(BIO_f_base64())) == NULL)
|
---|
185 | goto end;
|
---|
186 | BIO_push(b64, in);
|
---|
187 | tmp = in;
|
---|
188 | in = b64;
|
---|
189 | b64 = tmp;
|
---|
190 | }
|
---|
191 |
|
---|
192 | num = 0;
|
---|
193 | for (;;) {
|
---|
194 | if (!BUF_MEM_grow(buf, (int)num + BUFSIZ))
|
---|
195 | goto end;
|
---|
196 | i = BIO_read(in, &(buf->data[num]), BUFSIZ);
|
---|
197 | if (i <= 0)
|
---|
198 | break;
|
---|
199 | num += i;
|
---|
200 | }
|
---|
201 | }
|
---|
202 | str = (unsigned char *)buf->data;
|
---|
203 |
|
---|
204 | }
|
---|
205 |
|
---|
206 | /* If any structs to parse go through in sequence */
|
---|
207 |
|
---|
208 | if (sk_OPENSSL_STRING_num(osk)) {
|
---|
209 | tmpbuf = str;
|
---|
210 | tmplen = num;
|
---|
211 | for (i = 0; i < sk_OPENSSL_STRING_num(osk); i++) {
|
---|
212 | ASN1_TYPE *atmp;
|
---|
213 | int typ;
|
---|
214 | j = atoi(sk_OPENSSL_STRING_value(osk, i));
|
---|
215 | if (j == 0) {
|
---|
216 | BIO_printf(bio_err, "'%s' is an invalid number\n",
|
---|
217 | sk_OPENSSL_STRING_value(osk, i));
|
---|
218 | continue;
|
---|
219 | }
|
---|
220 | tmpbuf += j;
|
---|
221 | tmplen -= j;
|
---|
222 | atmp = at;
|
---|
223 | ctmpbuf = tmpbuf;
|
---|
224 | at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen);
|
---|
225 | ASN1_TYPE_free(atmp);
|
---|
226 | if (!at) {
|
---|
227 | BIO_printf(bio_err, "Error parsing structure\n");
|
---|
228 | ERR_print_errors(bio_err);
|
---|
229 | goto end;
|
---|
230 | }
|
---|
231 | typ = ASN1_TYPE_get(at);
|
---|
232 | if ((typ == V_ASN1_OBJECT)
|
---|
233 | || (typ == V_ASN1_BOOLEAN)
|
---|
234 | || (typ == V_ASN1_NULL)) {
|
---|
235 | BIO_printf(bio_err, "Can't parse %s type\n", ASN1_tag2str(typ));
|
---|
236 | ERR_print_errors(bio_err);
|
---|
237 | goto end;
|
---|
238 | }
|
---|
239 | /* hmm... this is a little evil but it works */
|
---|
240 | tmpbuf = at->value.asn1_string->data;
|
---|
241 | tmplen = at->value.asn1_string->length;
|
---|
242 | }
|
---|
243 | str = tmpbuf;
|
---|
244 | num = tmplen;
|
---|
245 | }
|
---|
246 |
|
---|
247 | if (offset >= num) {
|
---|
248 | BIO_printf(bio_err, "Error: offset too large\n");
|
---|
249 | goto end;
|
---|
250 | }
|
---|
251 |
|
---|
252 | num -= offset;
|
---|
253 |
|
---|
254 | if ((length == 0) || ((long)length > num))
|
---|
255 | length = (unsigned int)num;
|
---|
256 | if (derout) {
|
---|
257 | if (BIO_write(derout, str + offset, length) != (int)length) {
|
---|
258 | BIO_printf(bio_err, "Error writing output\n");
|
---|
259 | ERR_print_errors(bio_err);
|
---|
260 | goto end;
|
---|
261 | }
|
---|
262 | }
|
---|
263 | if (!noout &&
|
---|
264 | !ASN1_parse_dump(bio_out, &(str[offset]), length,
|
---|
265 | indent, dump)) {
|
---|
266 | ERR_print_errors(bio_err);
|
---|
267 | goto end;
|
---|
268 | }
|
---|
269 | ret = 0;
|
---|
270 | end:
|
---|
271 | BIO_free(derout);
|
---|
272 | BIO_free(in);
|
---|
273 | BIO_free(b64);
|
---|
274 | if (ret != 0)
|
---|
275 | ERR_print_errors(bio_err);
|
---|
276 | BUF_MEM_free(buf);
|
---|
277 | OPENSSL_free(name);
|
---|
278 | OPENSSL_free(header);
|
---|
279 | if (strictpem)
|
---|
280 | OPENSSL_free(str);
|
---|
281 | ASN1_TYPE_free(at);
|
---|
282 | sk_OPENSSL_STRING_free(osk);
|
---|
283 | return (ret);
|
---|
284 | }
|
---|
285 |
|
---|
286 | static int do_generate(char *genstr, const char *genconf, BUF_MEM *buf)
|
---|
287 | {
|
---|
288 | CONF *cnf = NULL;
|
---|
289 | int len;
|
---|
290 | unsigned char *p;
|
---|
291 | ASN1_TYPE *atyp = NULL;
|
---|
292 |
|
---|
293 | if (genconf) {
|
---|
294 | if ((cnf = app_load_config(genconf)) == NULL)
|
---|
295 | goto err;
|
---|
296 | if (!genstr)
|
---|
297 | genstr = NCONF_get_string(cnf, "default", "asn1");
|
---|
298 | if (!genstr) {
|
---|
299 | BIO_printf(bio_err, "Can't find 'asn1' in '%s'\n", genconf);
|
---|
300 | goto err;
|
---|
301 | }
|
---|
302 | }
|
---|
303 |
|
---|
304 | atyp = ASN1_generate_nconf(genstr, cnf);
|
---|
305 | NCONF_free(cnf);
|
---|
306 | cnf = NULL;
|
---|
307 |
|
---|
308 | if (!atyp)
|
---|
309 | return -1;
|
---|
310 |
|
---|
311 | len = i2d_ASN1_TYPE(atyp, NULL);
|
---|
312 |
|
---|
313 | if (len <= 0)
|
---|
314 | goto err;
|
---|
315 |
|
---|
316 | if (!BUF_MEM_grow(buf, len))
|
---|
317 | goto err;
|
---|
318 |
|
---|
319 | p = (unsigned char *)buf->data;
|
---|
320 |
|
---|
321 | i2d_ASN1_TYPE(atyp, &p);
|
---|
322 |
|
---|
323 | ASN1_TYPE_free(atyp);
|
---|
324 | return len;
|
---|
325 |
|
---|
326 | err:
|
---|
327 | NCONF_free(cnf);
|
---|
328 | ASN1_TYPE_free(atyp);
|
---|
329 | return -1;
|
---|
330 | }
|
---|