lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame^] | 1 | /* |
| 2 | * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved. |
| 3 | * |
| 4 | * Licensed under the OpenSSL license (the "License"). You may not use |
| 5 | * this file except in compliance with the License. You can obtain a copy |
| 6 | * in the file LICENSE in the source distribution or at |
| 7 | * https://www.openssl.org/source/license.html |
| 8 | */ |
| 9 | |
| 10 | #include <stdio.h> |
| 11 | #include <stdlib.h> |
| 12 | #include <string.h> |
| 13 | #include "apps.h" |
| 14 | #include "progs.h" |
| 15 | #include <openssl/err.h> |
| 16 | #include <openssl/evp.h> |
| 17 | #include <openssl/x509.h> |
| 18 | #include <openssl/pem.h> |
| 19 | #include <openssl/asn1t.h> |
| 20 | |
| 21 | typedef enum OPTION_choice { |
| 22 | OPT_ERR = -1, OPT_EOF = 0, OPT_HELP, |
| 23 | OPT_INFORM, OPT_IN, OPT_OUT, OPT_INDENT, OPT_NOOUT, |
| 24 | OPT_OID, OPT_OFFSET, OPT_LENGTH, OPT_DUMP, OPT_DLIMIT, |
| 25 | OPT_STRPARSE, OPT_GENSTR, OPT_GENCONF, OPT_STRICTPEM, |
| 26 | OPT_ITEM |
| 27 | } OPTION_CHOICE; |
| 28 | |
| 29 | const OPTIONS asn1parse_options[] = { |
| 30 | {"help", OPT_HELP, '-', "Display this summary"}, |
| 31 | {"inform", OPT_INFORM, 'F', "input format - one of DER PEM"}, |
| 32 | {"in", OPT_IN, '<', "input file"}, |
| 33 | {"out", OPT_OUT, '>', "output file (output format is always DER)"}, |
| 34 | {"i", OPT_INDENT, 0, "indents the output"}, |
| 35 | {"noout", OPT_NOOUT, 0, "do not produce any output"}, |
| 36 | {"offset", OPT_OFFSET, 'p', "offset into file"}, |
| 37 | {"length", OPT_LENGTH, 'p', "length of section in file"}, |
| 38 | {"oid", OPT_OID, '<', "file of extra oid definitions"}, |
| 39 | {"dump", OPT_DUMP, 0, "unknown data in hex form"}, |
| 40 | {"dlimit", OPT_DLIMIT, 'p', |
| 41 | "dump the first arg bytes of unknown data in hex form"}, |
| 42 | {"strparse", OPT_STRPARSE, 'p', |
| 43 | "offset; a series of these can be used to 'dig'"}, |
| 44 | {OPT_MORE_STR, 0, 0, "into multiple ASN1 blob wrappings"}, |
| 45 | {"genstr", OPT_GENSTR, 's', "string to generate ASN1 structure from"}, |
| 46 | {"genconf", OPT_GENCONF, 's', "file to generate ASN1 structure from"}, |
| 47 | {OPT_MORE_STR, 0, 0, "(-inform will be ignored)"}, |
| 48 | {"strictpem", OPT_STRICTPEM, 0, |
| 49 | "do not attempt base64 decode outside PEM markers"}, |
| 50 | {"item", OPT_ITEM, 's', "item to parse and print"}, |
| 51 | {NULL} |
| 52 | }; |
| 53 | |
| 54 | static int do_generate(char *genstr, const char *genconf, BUF_MEM *buf); |
| 55 | |
| 56 | int asn1parse_main(int argc, char **argv) |
| 57 | { |
| 58 | ASN1_TYPE *at = NULL; |
| 59 | BIO *in = NULL, *b64 = NULL, *derout = NULL; |
| 60 | BUF_MEM *buf = NULL; |
| 61 | STACK_OF(OPENSSL_STRING) *osk = NULL; |
| 62 | char *genstr = NULL, *genconf = NULL; |
| 63 | char *infile = NULL, *oidfile = NULL, *derfile = NULL; |
| 64 | unsigned char *str = NULL; |
| 65 | char *name = NULL, *header = NULL, *prog; |
| 66 | const unsigned char *ctmpbuf; |
| 67 | int indent = 0, noout = 0, dump = 0, strictpem = 0, informat = FORMAT_PEM; |
| 68 | int offset = 0, ret = 1, i, j; |
| 69 | long num, tmplen; |
| 70 | unsigned char *tmpbuf; |
| 71 | unsigned int length = 0; |
| 72 | OPTION_CHOICE o; |
| 73 | const ASN1_ITEM *it = NULL; |
| 74 | |
| 75 | prog = opt_init(argc, argv, asn1parse_options); |
| 76 | |
| 77 | if ((osk = sk_OPENSSL_STRING_new_null()) == NULL) { |
| 78 | BIO_printf(bio_err, "%s: Memory allocation failure\n", prog); |
| 79 | goto end; |
| 80 | } |
| 81 | |
| 82 | while ((o = opt_next()) != OPT_EOF) { |
| 83 | switch (o) { |
| 84 | case OPT_EOF: |
| 85 | case OPT_ERR: |
| 86 | opthelp: |
| 87 | BIO_printf(bio_err, "%s: Use -help for summary.\n", prog); |
| 88 | goto end; |
| 89 | case OPT_HELP: |
| 90 | opt_help(asn1parse_options); |
| 91 | ret = 0; |
| 92 | goto end; |
| 93 | case OPT_INFORM: |
| 94 | if (!opt_format(opt_arg(), OPT_FMT_PEMDER, &informat)) |
| 95 | goto opthelp; |
| 96 | break; |
| 97 | case OPT_IN: |
| 98 | infile = opt_arg(); |
| 99 | break; |
| 100 | case OPT_OUT: |
| 101 | derfile = opt_arg(); |
| 102 | break; |
| 103 | case OPT_INDENT: |
| 104 | indent = 1; |
| 105 | break; |
| 106 | case OPT_NOOUT: |
| 107 | noout = 1; |
| 108 | break; |
| 109 | case OPT_OID: |
| 110 | oidfile = opt_arg(); |
| 111 | break; |
| 112 | case OPT_OFFSET: |
| 113 | offset = strtol(opt_arg(), NULL, 0); |
| 114 | break; |
| 115 | case OPT_LENGTH: |
| 116 | length = strtol(opt_arg(), NULL, 0); |
| 117 | break; |
| 118 | case OPT_DUMP: |
| 119 | dump = -1; |
| 120 | break; |
| 121 | case OPT_DLIMIT: |
| 122 | dump = strtol(opt_arg(), NULL, 0); |
| 123 | break; |
| 124 | case OPT_STRPARSE: |
| 125 | sk_OPENSSL_STRING_push(osk, opt_arg()); |
| 126 | break; |
| 127 | case OPT_GENSTR: |
| 128 | genstr = opt_arg(); |
| 129 | break; |
| 130 | case OPT_GENCONF: |
| 131 | genconf = opt_arg(); |
| 132 | break; |
| 133 | case OPT_STRICTPEM: |
| 134 | strictpem = 1; |
| 135 | informat = FORMAT_PEM; |
| 136 | break; |
| 137 | case OPT_ITEM: |
| 138 | it = ASN1_ITEM_lookup(opt_arg()); |
| 139 | if (it == NULL) { |
| 140 | size_t tmp; |
| 141 | |
| 142 | BIO_printf(bio_err, "Unknown item name %s\n", opt_arg()); |
| 143 | BIO_puts(bio_err, "Supported types:\n"); |
| 144 | for (tmp = 0;; tmp++) { |
| 145 | it = ASN1_ITEM_get(tmp); |
| 146 | if (it == NULL) |
| 147 | break; |
| 148 | BIO_printf(bio_err, " %s\n", it->sname); |
| 149 | } |
| 150 | goto end; |
| 151 | } |
| 152 | break; |
| 153 | } |
| 154 | } |
| 155 | argc = opt_num_rest(); |
| 156 | if (argc != 0) |
| 157 | goto opthelp; |
| 158 | |
| 159 | if (oidfile != NULL) { |
| 160 | in = bio_open_default(oidfile, 'r', FORMAT_TEXT); |
| 161 | if (in == NULL) |
| 162 | goto end; |
| 163 | OBJ_create_objects(in); |
| 164 | BIO_free(in); |
| 165 | } |
| 166 | |
| 167 | if ((in = bio_open_default(infile, 'r', informat)) == NULL) |
| 168 | goto end; |
| 169 | |
| 170 | if (derfile && (derout = bio_open_default(derfile, 'w', FORMAT_ASN1)) == NULL) |
| 171 | goto end; |
| 172 | |
| 173 | if ((buf = BUF_MEM_new()) == NULL) |
| 174 | goto end; |
| 175 | if (strictpem) { |
| 176 | if (PEM_read_bio(in, &name, &header, &str, &num) != 1) { |
| 177 | BIO_printf(bio_err, "Error reading PEM file\n"); |
| 178 | ERR_print_errors(bio_err); |
| 179 | goto end; |
| 180 | } |
| 181 | buf->data = (char *)str; |
| 182 | buf->length = buf->max = num; |
| 183 | } else { |
| 184 | if (!BUF_MEM_grow(buf, BUFSIZ * 8)) |
| 185 | goto end; /* Pre-allocate :-) */ |
| 186 | |
| 187 | if (genstr || genconf) { |
| 188 | num = do_generate(genstr, genconf, buf); |
| 189 | if (num < 0) { |
| 190 | ERR_print_errors(bio_err); |
| 191 | goto end; |
| 192 | } |
| 193 | } else { |
| 194 | |
| 195 | if (informat == FORMAT_PEM) { |
| 196 | BIO *tmp; |
| 197 | |
| 198 | if ((b64 = BIO_new(BIO_f_base64())) == NULL) |
| 199 | goto end; |
| 200 | BIO_push(b64, in); |
| 201 | tmp = in; |
| 202 | in = b64; |
| 203 | b64 = tmp; |
| 204 | } |
| 205 | |
| 206 | num = 0; |
| 207 | for (;;) { |
| 208 | if (!BUF_MEM_grow(buf, num + BUFSIZ)) |
| 209 | goto end; |
| 210 | i = BIO_read(in, &(buf->data[num]), BUFSIZ); |
| 211 | if (i <= 0) |
| 212 | break; |
| 213 | num += i; |
| 214 | } |
| 215 | } |
| 216 | str = (unsigned char *)buf->data; |
| 217 | |
| 218 | } |
| 219 | |
| 220 | /* If any structs to parse go through in sequence */ |
| 221 | |
| 222 | if (sk_OPENSSL_STRING_num(osk)) { |
| 223 | tmpbuf = str; |
| 224 | tmplen = num; |
| 225 | for (i = 0; i < sk_OPENSSL_STRING_num(osk); i++) { |
| 226 | ASN1_TYPE *atmp; |
| 227 | int typ; |
| 228 | j = strtol(sk_OPENSSL_STRING_value(osk, i), NULL, 0); |
| 229 | if (j <= 0 || j >= tmplen) { |
| 230 | BIO_printf(bio_err, "'%s' is out of range\n", |
| 231 | sk_OPENSSL_STRING_value(osk, i)); |
| 232 | continue; |
| 233 | } |
| 234 | tmpbuf += j; |
| 235 | tmplen -= j; |
| 236 | atmp = at; |
| 237 | ctmpbuf = tmpbuf; |
| 238 | at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen); |
| 239 | ASN1_TYPE_free(atmp); |
| 240 | if (!at) { |
| 241 | BIO_printf(bio_err, "Error parsing structure\n"); |
| 242 | ERR_print_errors(bio_err); |
| 243 | goto end; |
| 244 | } |
| 245 | typ = ASN1_TYPE_get(at); |
| 246 | if ((typ == V_ASN1_OBJECT) |
| 247 | || (typ == V_ASN1_BOOLEAN) |
| 248 | || (typ == V_ASN1_NULL)) { |
| 249 | BIO_printf(bio_err, "Can't parse %s type\n", ASN1_tag2str(typ)); |
| 250 | ERR_print_errors(bio_err); |
| 251 | goto end; |
| 252 | } |
| 253 | /* hmm... this is a little evil but it works */ |
| 254 | tmpbuf = at->value.asn1_string->data; |
| 255 | tmplen = at->value.asn1_string->length; |
| 256 | } |
| 257 | str = tmpbuf; |
| 258 | num = tmplen; |
| 259 | } |
| 260 | |
| 261 | if (offset < 0 || offset >= num) { |
| 262 | BIO_printf(bio_err, "Error: offset out of range\n"); |
| 263 | goto end; |
| 264 | } |
| 265 | |
| 266 | num -= offset; |
| 267 | |
| 268 | if (length == 0 || length > (unsigned int)num) |
| 269 | length = (unsigned int)num; |
| 270 | if (derout != NULL) { |
| 271 | if (BIO_write(derout, str + offset, length) != (int)length) { |
| 272 | BIO_printf(bio_err, "Error writing output\n"); |
| 273 | ERR_print_errors(bio_err); |
| 274 | goto end; |
| 275 | } |
| 276 | } |
| 277 | if (!noout) { |
| 278 | const unsigned char *p = str + offset; |
| 279 | |
| 280 | if (it != NULL) { |
| 281 | ASN1_VALUE *value = ASN1_item_d2i(NULL, &p, length, it); |
| 282 | if (value == NULL) { |
| 283 | BIO_printf(bio_err, "Error parsing item %s\n", it->sname); |
| 284 | ERR_print_errors(bio_err); |
| 285 | goto end; |
| 286 | } |
| 287 | ASN1_item_print(bio_out, value, 0, it, NULL); |
| 288 | ASN1_item_free(value, it); |
| 289 | } else { |
| 290 | if (!ASN1_parse_dump(bio_out, p, length, indent, dump)) { |
| 291 | ERR_print_errors(bio_err); |
| 292 | goto end; |
| 293 | } |
| 294 | } |
| 295 | } |
| 296 | ret = 0; |
| 297 | end: |
| 298 | BIO_free(derout); |
| 299 | BIO_free(in); |
| 300 | BIO_free(b64); |
| 301 | if (ret != 0) |
| 302 | ERR_print_errors(bio_err); |
| 303 | BUF_MEM_free(buf); |
| 304 | OPENSSL_free(name); |
| 305 | OPENSSL_free(header); |
| 306 | ASN1_TYPE_free(at); |
| 307 | sk_OPENSSL_STRING_free(osk); |
| 308 | return ret; |
| 309 | } |
| 310 | |
| 311 | static int do_generate(char *genstr, const char *genconf, BUF_MEM *buf) |
| 312 | { |
| 313 | CONF *cnf = NULL; |
| 314 | int len; |
| 315 | unsigned char *p; |
| 316 | ASN1_TYPE *atyp = NULL; |
| 317 | |
| 318 | if (genconf != NULL) { |
| 319 | if ((cnf = app_load_config(genconf)) == NULL) |
| 320 | goto err; |
| 321 | if (genstr == NULL) |
| 322 | genstr = NCONF_get_string(cnf, "default", "asn1"); |
| 323 | if (genstr == NULL) { |
| 324 | BIO_printf(bio_err, "Can't find 'asn1' in '%s'\n", genconf); |
| 325 | goto err; |
| 326 | } |
| 327 | } |
| 328 | |
| 329 | atyp = ASN1_generate_nconf(genstr, cnf); |
| 330 | NCONF_free(cnf); |
| 331 | cnf = NULL; |
| 332 | |
| 333 | if (atyp == NULL) |
| 334 | return -1; |
| 335 | |
| 336 | len = i2d_ASN1_TYPE(atyp, NULL); |
| 337 | |
| 338 | if (len <= 0) |
| 339 | goto err; |
| 340 | |
| 341 | if (!BUF_MEM_grow(buf, len)) |
| 342 | goto err; |
| 343 | |
| 344 | p = (unsigned char *)buf->data; |
| 345 | |
| 346 | i2d_ASN1_TYPE(atyp, &p); |
| 347 | |
| 348 | ASN1_TYPE_free(atyp); |
| 349 | return len; |
| 350 | |
| 351 | err: |
| 352 | NCONF_free(cnf); |
| 353 | ASN1_TYPE_free(atyp); |
| 354 | return -1; |
| 355 | } |