summaryrefslogtreecommitdiff
path: root/deleted_files/usr/src/cmd/cmd-crypto/pktool/derparse.c
diff options
context:
space:
mode:
Diffstat (limited to 'deleted_files/usr/src/cmd/cmd-crypto/pktool/derparse.c')
-rw-r--r--deleted_files/usr/src/cmd/cmd-crypto/pktool/derparse.c371
1 files changed, 371 insertions, 0 deletions
diff --git a/deleted_files/usr/src/cmd/cmd-crypto/pktool/derparse.c b/deleted_files/usr/src/cmd/cmd-crypto/pktool/derparse.c
new file mode 100644
index 0000000000..cec607220a
--- /dev/null
+++ b/deleted_files/usr/src/cmd/cmd-crypto/pktool/derparse.c
@@ -0,0 +1,371 @@
+/*
+ * CDDL HEADER START
+ *
+ * The contents of this file are subject to the terms of the
+ * Common Development and Distribution License, Version 1.0 only
+ * (the "License"). You may not use this file except in compliance
+ * with the License.
+ *
+ * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
+ * or http://www.opensolaris.org/os/licensing.
+ * See the License for the specific language governing permissions
+ * and limitations under the License.
+ *
+ * When distributing Covered Code, include this CDDL HEADER in each
+ * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
+ * If applicable, add the following below this CDDL HEADER, with the
+ * fields enclosed by brackets "[]" replaced with your own identifying
+ * information: Portions Copyright [yyyy] [name of copyright owner]
+ *
+ * CDDL HEADER END
+ */
+/*
+ * Copyright 2005 Sun Microsystems, Inc. All rights reserved.
+ * Use is subject to license terms.
+ */
+
+#pragma ident "%Z%%M% %I% %E% SMI"
+
+/*
+ * derparse.c - Functions for parsing DER-encoded data
+ *
+ * NOTE: This code was originally written by Cryptographic Products
+ * Group at Sun Microsystems for the SCA 1000 "realmparse" program.
+ * It is mostly intact except for necessary adaptaions to allow it to
+ * compile in this environment.
+ */
+
+#include <errno.h>
+#include <fcntl.h>
+#include <lber.h>
+#include <limits.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <strings.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+#include <cryptoutil.h>
+#include "derparse.h"
+
+/* I18N helpers. */
+#include <libintl.h>
+#include <locale.h>
+
+/*
+ * Some types that we need below.
+ */
+typedef struct oidinfo {
+ uint8_t *value; /* OID value in bytes */
+ size_t length; /* Length of OID */
+ char *strval; /* String rep. for OID in RDN */
+} oidinfo_t;
+
+/*
+ * X.509 Issuer OIDs as recommended by RFC 3280
+ * We might see these in certificates in their subject an issuer names.
+ */
+static uint8_t common_name_oid[] = {0x55, 0x04, 0x03};
+static uint8_t surname_oid[] = {0x55, 0x04, 0x04};
+static uint8_t serial_number_oid[] = {0x55, 0x04, 0x05};
+static uint8_t country_name_oid[] = {0x55, 0x04, 0x06};
+static uint8_t locality_name_oid[] = {0x55, 0x04, 0x07};
+static uint8_t state_name_oid[] = {0x55, 0x04, 0x08};
+static uint8_t org_name_oid[] = {0x55, 0x04, 0x0a};
+static uint8_t org_unit_name_oid[] = {0x55, 0x04, 0x0b};
+static uint8_t title_oid[] = {0x55, 0x04, 0x0c};
+static uint8_t name_oid[] = {0x55, 0x04, 0x29};
+static uint8_t given_name_oid[] = {0x55, 0x04, 0x2a};
+static uint8_t initials_oid[] = {0x55, 0x04, 0x2b};
+static uint8_t gen_qual_oid[] = {0x55, 0x04, 0x2c};
+static uint8_t dn_qual_oid[] = {0x55, 0x04, 0x2e};
+static uint8_t pseudonym_oid[] = {0x55, 0x04, 0x31};
+static uint8_t uid_oid[] =
+ {0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x01, 0x01};
+static uint8_t domain_comp_oid[] =
+ {0x09, 0x92, 0x26, 0x89, 0x93, 0xf2, 0x2c, 0x64, 0x01, 0x19};
+static uint8_t email_addr_oid[] =
+ {0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x09, 0x01};
+
+/* Define this structure so we can match on a given oid */
+static oidinfo_t oids[] = {
+ {common_name_oid, sizeof (common_name_oid), "CN"},
+ {surname_oid, sizeof (surname_oid), "SN"},
+ {serial_number_oid, sizeof (serial_number_oid), "SerialNum"},
+ {country_name_oid, sizeof (country_name_oid), "C"},
+ {locality_name_oid, sizeof (locality_name_oid), "L"},
+ {state_name_oid, sizeof (state_name_oid), "ST"},
+ {org_name_oid, sizeof (org_name_oid), "O"},
+ {org_unit_name_oid, sizeof (org_unit_name_oid), "OU"},
+ {title_oid, sizeof (title_oid), "Title"},
+ {name_oid, sizeof (name_oid), "Name"},
+ {given_name_oid, sizeof (given_name_oid), "GN"},
+ {initials_oid, sizeof (initials_oid), "Initials"},
+ {gen_qual_oid, sizeof (gen_qual_oid), "GenQual"},
+ {dn_qual_oid, sizeof (dn_qual_oid), "DNQual"},
+ {pseudonym_oid, sizeof (pseudonym_oid), "Pseudonym"},
+ {uid_oid, sizeof (uid_oid), "UID"},
+ {domain_comp_oid, sizeof (domain_comp_oid), "DC"},
+ {email_addr_oid, sizeof (email_addr_oid), "E"}
+};
+static int oidblocklen = sizeof (oids) / sizeof (oidinfo_t);
+
+/* Local functions */
+static int oid_to_str(uint8_t *, size_t, char *, size_t);
+static int get_oid_type(char *);
+
+/*
+ * An RDNSequence is what is handed to us when we get attributes like
+ * CKA_ISSUER and CKA_SUBJECT_NAME. This function will take in a buffer
+ * with the DER encoded bytes of an RDNSequence and print out the components.
+ *
+ * RDNSequence ::= SEQUENCE OF RelativeDistinguishedName
+ *
+ * RelativeDistinguishedName ::= SET OF AttributeTypeAndValue
+ *
+ * AttributeTypeAndValue ::= SEQUENCE {
+ * type AttributeType,
+ * value AttributeValue
+ * }
+ *
+ * AttributeType ::= OBJECT IDENTIFIER
+ *
+ * AttributeValue ::= ANY DEFINED BY AttributeType
+ */
+void
+rdnseq_to_str(uchar_t *derdata, size_t dersz, char *out, size_t outsz)
+{
+#define PKTOOL_LINEMAX 1024
+ char oidout[PKTOOL_LINEMAX];
+ BerElement *ber = NULL;
+ BerValue ber_rdns;
+ int tag;
+ ber_len_t size;
+ char *atv_type = NULL; /* Attribute Type */
+ ber_len_t atv_type_size;
+ char *atv_value = NULL; /* Attribute Value */
+ ber_len_t atv_value_size;
+ char *cookie = NULL;
+ int idx;
+ char *prndata = NULL;
+ int prnsz;
+ int offset = 0;
+ boolean_t first = B_TRUE;
+
+ cryptodebug("inside rdnseq_to_str");
+
+ if (derdata == NULL || dersz == 0) {
+ cryptodebug("nothing to parse");
+ return;
+ }
+
+ /* Take the raw bytes and stuff them into a BerValue structure */
+ ber_rdns.bv_val = (char *)derdata;
+ ber_rdns.bv_len = dersz;
+
+ /* Allocate the BerElement */
+ if ((ber = ber_init(&ber_rdns)) == NULLBER) {
+ cryptodebug("ber_init failed to return ber element");
+ cryptoerror(LOG_STDERR, gettext(
+ "Unable to begin parsing RDNSequence."));
+ return;
+ }
+
+ /* Begin by parsing out the outer sequence */
+ tag = ber_next_element(ber, &size, cookie);
+ if (tag != LBER_SEQUENCE) {
+ cryptodebug("ber_next_element tag is not SEQUENCE");
+ cryptoerror(LOG_STDERR, gettext(
+ "Expected RDNSequence SEQUENCE object, got tag [%02x]."),
+ tag);
+ return;
+ }
+ tag = ber_scanf(ber, "{");
+
+ /* Parse the sequence of RelativeDistinguishedName objects */
+ while ((tag = ber_next_element(ber, &size, cookie)) != -1) {
+ if (tag != LBER_SET) {
+ cryptodebug("ber_next_element tag is not SET");
+ cryptoerror(LOG_STDERR, gettext(
+ "Expected RelativeDistinguishedName SET object, "
+ "got tag [%02x]."), tag);
+ return;
+ }
+ tag = ber_scanf(ber, "[");
+
+ /* AttributeTypeAndValue */
+ tag = ber_next_element(ber, &size, cookie);
+ if (tag != LBER_SEQUENCE) {
+ cryptodebug("ber_next_element tag is not SEQUENCE");
+ cryptoerror(LOG_STDERR, gettext(
+ "Expected AttributeTypeAndValue SEQUENCE object, "
+ "got tag [%02x]."), tag);
+ return;
+ }
+ tag = ber_scanf(ber, "{");
+
+ /* AttributeType OID */
+ tag = ber_next_element(ber, &atv_type_size, cookie);
+ atv_type_size++; /* Add room for null terminator */
+ if (tag != LBER_OID) {
+ cryptodebug("ber_next_element tag is not OID");
+ cryptoerror(LOG_STDERR, gettext(
+ "Expected an OID, got tag [%02x]."), tag);
+ return;
+ }
+ /* Note: ber_scanf() allocates memory here for "a". */
+ tag = ber_scanf(ber, "a", &atv_type, &atv_type_size);
+
+ /* AttributeValue */
+ tag = ber_next_element(ber, &atv_value_size, cookie);
+ atv_value_size++;
+ if ((tag != LBER_PRINTABLE_STRING) && (tag != LBER_IA5STRING)) {
+ cryptodebug("ber_next_element tag is not "
+ "PRINTABLE_STRING/IA5STRING");
+ cryptoerror(LOG_STDERR, gettext("Expected a STRING, "
+ "got tag [%02x]."), tag);
+ free(atv_type);
+ return;
+ }
+ /* Note: ber_scanf() allocates memory here for "a". */
+ tag = ber_scanf(ber, "a", &atv_value, &atv_value_size);
+
+ /*
+ * Now go and turn the attribute type and value into
+ * some kind of meaningful output.
+ */
+ if ((idx = get_oid_type(atv_type)) == -1) {
+ if (oid_to_str((uint8_t *)atv_type, strlen(atv_type),
+ oidout, sizeof (oidout)) < 0) {
+ cryptodebug("oid_to_str failed");
+ cryptoerror(LOG_STDERR, gettext(
+ "Unable to convert OID to string."));
+ free(atv_type);
+ free(atv_value);
+ return;
+ }
+ prndata = oidout;
+ } else {
+ prndata = oids[idx].strval;
+ }
+
+ if (!first)
+ prnsz = snprintf(out + offset, outsz - offset,
+ ", %s = %s", prndata, atv_value);
+ else {
+ prnsz = snprintf(out + offset, outsz - offset,
+ "%s = %s", prndata, atv_value);
+ first = B_FALSE;
+ }
+
+ free(atv_type);
+ free(atv_value);
+ atv_type = NULL;
+ atv_value = NULL;
+
+ offset += prnsz;
+ if (offset >= outsz)
+ break;
+ }
+}
+
+/*
+ * Convert OID to dotted notation string.
+ */
+static int
+oid_to_str(uint8_t *oid, size_t oidlen, char *oidout, size_t oidout_len)
+{
+ int count = 0;
+ int offset = 0;
+ int prnsz;
+ uint_t firstnum;
+ uint_t secondnum;
+ uint64_t nextnum = 0;
+
+ cryptodebug("inside oid_to_str");
+
+ if (oidlen == 0)
+ return (-1);
+
+ /*
+ * The first octet has a value of (40 x oidnum1) + oidnum2. We
+ * will deconstruct it here and sanity check the result. According
+ * to X.690, oidnum1 should never be more than 2 and oidnum2
+ * shouldn't be greater than 39 when oidnum1 = 0 or 1.
+ */
+ firstnum = oid[count] / 40;
+ if (firstnum > 2) /* force remainder to be > 39 */
+ firstnum = 2;
+ secondnum = oid[count] - (firstnum * 40);
+
+ (void) memset(oidout, 0, oidout_len);
+
+ prnsz = snprintf(oidout, oidout_len, "%d.%d", firstnum, secondnum);
+ offset += prnsz;
+ if (offset >= oidout_len)
+ return (0);
+
+ /* Start at the second byte and move our way forward */
+ for (count = 1; count < oidlen; count++) {
+ /* ORIGINAL COMMENT */
+ /*
+ * Each oid byte is taken as a 7-bit number. If bit 8 is
+ * set, it means the next octet and this one are to be
+ * chained together as a single bit string, and so forth.
+ * We need to mask of bit 8, then shift over 7 bits in the
+ * resulting integer, and then stuff the new 7 bits in
+ * the low order byte, all the while making sure we don't
+ * stomp bit 1 from the previous octet.
+ * See X.690 or the layman's guide to ASN.1 for more.
+ */
+
+ /*
+ * String together as many of the next octets if each of
+ * their high order bits is set to 1. For example,
+ * 1 1010111, 1 0010100, 1 0010110, 0 1101111, ...
+ * (3 8-bit octets)
+ * becomes
+ * 1010111 0010100 0010110, 1101111, ...
+ * (one 21 bit integer)
+ * The high order bit functions as a "link" between octets.
+ * Note that if there are more than 9 octets with their
+ * high order bits set, it will overflow a 64-bit integer.
+ */
+ for (nextnum = 0; (oid[count] & 0x80) && (count < oidlen);
+ count++) {
+ nextnum <<= 7;
+ nextnum |= (oid[count] & 0x7f);
+ }
+ if (count == oidlen) /* last number not terminated? */
+ return (-1);
+
+ /* We're done with this oid number, write it and move on */
+ prnsz = snprintf(oidout + offset, oidout_len - offset,
+ ".%lld", nextnum);
+ offset += prnsz;
+ if (offset >= oidout_len)
+ return (0);
+ }
+
+ return (0);
+}
+
+/*
+ * Returns the index in the oids[] array that matches the input type,
+ * or -1 if it could not find a match.
+ */
+static int
+get_oid_type(char *type)
+{
+ int count;
+
+ cryptodebug("inside get_oid_type");
+
+ for (count = 0; count < oidblocklen; count++) {
+ if (memcmp(oids[count].value, type, oids[count].length) == 0) {
+ return (count);
+ }
+ }
+
+ /* If we get here, we haven't found a match, so return -1 */
+ return (-1);
+}