mirror of
https://github.com/openssl/openssl.git
synced 2024-12-09 05:51:54 +08:00
852c2ed260
... and only *define* them in the source files that need them. Use DEFINE_OR_DECLARE which is set appropriately for internal builds and not non-deprecated builds. Deprecate stack-of-block Better documentation Move some ASN1 struct typedefs to types.h Update ParseC to handle this. Most of all, ParseC needed to be more consistent. The handlers are "recursive", in so far that they are called again and again until they terminate, which depends entirely on what the "massager" returns. There's a comment at the beginning of ParseC that explains how that works. {Richard Levtte} Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org> (Merged from https://github.com/openssl/openssl/pull/10669)
494 lines
16 KiB
C
494 lines
16 KiB
C
/*
|
|
* Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/opensslconf.h>
|
|
|
|
#include "apps.h"
|
|
#include "progs.h"
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <string.h>
|
|
#include <openssl/err.h>
|
|
#include <openssl/engine.h>
|
|
#include <openssl/ssl.h>
|
|
#include <openssl/store.h>
|
|
|
|
DEFINE_STACK_OF_STRING()
|
|
DEFINE_STACK_OF_CSTRING()
|
|
|
|
typedef enum OPTION_choice {
|
|
OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
|
|
OPT_C, OPT_T, OPT_TT, OPT_PRE, OPT_POST,
|
|
OPT_V = 100, OPT_VV, OPT_VVV, OPT_VVVV
|
|
} OPTION_CHOICE;
|
|
|
|
const OPTIONS engine_options[] = {
|
|
{OPT_HELP_STR, 1, '-', "Usage: %s [options] engine...\n"},
|
|
|
|
OPT_SECTION("General"),
|
|
{"help", OPT_HELP, '-', "Display this summary"},
|
|
{"t", OPT_T, '-', "Check that specified engine is available"},
|
|
{"pre", OPT_PRE, 's', "Run command against the ENGINE before loading it"},
|
|
{"post", OPT_POST, 's', "Run command against the ENGINE after loading it"},
|
|
|
|
OPT_SECTION("Output"),
|
|
{"v", OPT_V, '-', "List 'control commands' For each specified engine"},
|
|
{"vv", OPT_VV, '-', "Also display each command's description"},
|
|
{"vvv", OPT_VVV, '-', "Also add the input flags for each command"},
|
|
{"vvvv", OPT_VVVV, '-', "Also show internal input flags"},
|
|
{"c", OPT_C, '-', "List the capabilities of specified engine"},
|
|
{"tt", OPT_TT, '-', "Display error trace for unavailable engines"},
|
|
{OPT_MORE_STR, OPT_EOF, 1,
|
|
"Commands are like \"SO_PATH:/lib/libdriver.so\""},
|
|
|
|
OPT_PARAMETERS(),
|
|
{"engine", 0, 0, "ID of engine(s) to load"},
|
|
{NULL}
|
|
};
|
|
|
|
static int append_buf(char **buf, int *size, const char *s)
|
|
{
|
|
const int expand = 256;
|
|
int len = strlen(s) + 1;
|
|
char *p = *buf;
|
|
|
|
if (p == NULL) {
|
|
*size = ((len + expand - 1) / expand) * expand;
|
|
p = *buf = app_malloc(*size, "engine buffer");
|
|
} else {
|
|
const int blen = strlen(p);
|
|
|
|
if (blen > 0)
|
|
len += 2 + blen;
|
|
|
|
if (len > *size) {
|
|
*size = ((len + expand - 1) / expand) * expand;
|
|
p = OPENSSL_realloc(p, *size);
|
|
if (p == NULL) {
|
|
OPENSSL_free(*buf);
|
|
*buf = NULL;
|
|
return 0;
|
|
}
|
|
*buf = p;
|
|
}
|
|
|
|
if (blen > 0) {
|
|
p += blen;
|
|
*p++ = ',';
|
|
*p++ = ' ';
|
|
}
|
|
}
|
|
|
|
strcpy(p, s);
|
|
return 1;
|
|
}
|
|
|
|
static int util_flags(BIO *out, unsigned int flags, const char *indent)
|
|
{
|
|
int started = 0, err = 0;
|
|
/* Indent before displaying input flags */
|
|
BIO_printf(out, "%s%s(input flags): ", indent, indent);
|
|
if (flags == 0) {
|
|
BIO_printf(out, "<no flags>\n");
|
|
return 1;
|
|
}
|
|
/*
|
|
* If the object is internal, mark it in a way that shows instead of
|
|
* having it part of all the other flags, even if it really is.
|
|
*/
|
|
if (flags & ENGINE_CMD_FLAG_INTERNAL) {
|
|
BIO_printf(out, "[Internal] ");
|
|
}
|
|
|
|
if (flags & ENGINE_CMD_FLAG_NUMERIC) {
|
|
BIO_printf(out, "NUMERIC");
|
|
started = 1;
|
|
}
|
|
/*
|
|
* Now we check that no combinations of the mutually exclusive NUMERIC,
|
|
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
|
* OR'd together with these would need to added after these to preserve
|
|
* the testing logic.
|
|
*/
|
|
if (flags & ENGINE_CMD_FLAG_STRING) {
|
|
if (started) {
|
|
BIO_printf(out, "|");
|
|
err = 1;
|
|
}
|
|
BIO_printf(out, "STRING");
|
|
started = 1;
|
|
}
|
|
if (flags & ENGINE_CMD_FLAG_NO_INPUT) {
|
|
if (started) {
|
|
BIO_printf(out, "|");
|
|
err = 1;
|
|
}
|
|
BIO_printf(out, "NO_INPUT");
|
|
started = 1;
|
|
}
|
|
/* Check for unknown flags */
|
|
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
|
~ENGINE_CMD_FLAG_STRING &
|
|
~ENGINE_CMD_FLAG_NO_INPUT & ~ENGINE_CMD_FLAG_INTERNAL;
|
|
if (flags) {
|
|
if (started)
|
|
BIO_printf(out, "|");
|
|
BIO_printf(out, "<0x%04X>", flags);
|
|
}
|
|
if (err)
|
|
BIO_printf(out, " <illegal flags!>");
|
|
BIO_printf(out, "\n");
|
|
return 1;
|
|
}
|
|
|
|
static int util_verbose(ENGINE *e, int verbose, BIO *out, const char *indent)
|
|
{
|
|
static const int line_wrap = 78;
|
|
int num;
|
|
int ret = 0;
|
|
char *name = NULL;
|
|
char *desc = NULL;
|
|
int flags;
|
|
int xpos = 0;
|
|
STACK_OF(OPENSSL_STRING) *cmds = NULL;
|
|
if (!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
|
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
|
0, NULL, NULL)) <= 0)) {
|
|
return 1;
|
|
}
|
|
|
|
cmds = sk_OPENSSL_STRING_new_null();
|
|
if (cmds == NULL)
|
|
goto err;
|
|
|
|
do {
|
|
int len;
|
|
/* Get the command input flags */
|
|
if ((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
|
NULL, NULL)) < 0)
|
|
goto err;
|
|
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4) {
|
|
/* Get the command name */
|
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
|
NULL, NULL)) <= 0)
|
|
goto err;
|
|
name = app_malloc(len + 1, "name buffer");
|
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
|
NULL) <= 0)
|
|
goto err;
|
|
/* Get the command description */
|
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
|
NULL, NULL)) < 0)
|
|
goto err;
|
|
if (len > 0) {
|
|
desc = app_malloc(len + 1, "description buffer");
|
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
|
NULL) <= 0)
|
|
goto err;
|
|
}
|
|
/* Now decide on the output */
|
|
if (xpos == 0)
|
|
/* Do an indent */
|
|
xpos = BIO_puts(out, indent);
|
|
else
|
|
/* Otherwise prepend a ", " */
|
|
xpos += BIO_printf(out, ", ");
|
|
if (verbose == 1) {
|
|
/*
|
|
* We're just listing names, comma-delimited
|
|
*/
|
|
if ((xpos > (int)strlen(indent)) &&
|
|
(xpos + (int)strlen(name) > line_wrap)) {
|
|
BIO_printf(out, "\n");
|
|
xpos = BIO_puts(out, indent);
|
|
}
|
|
xpos += BIO_printf(out, "%s", name);
|
|
} else {
|
|
/* We're listing names plus descriptions */
|
|
BIO_printf(out, "%s: %s\n", name,
|
|
(desc == NULL) ? "<no description>" : desc);
|
|
/* ... and sometimes input flags */
|
|
if ((verbose >= 3) && !util_flags(out, flags, indent))
|
|
goto err;
|
|
xpos = 0;
|
|
}
|
|
}
|
|
OPENSSL_free(name);
|
|
name = NULL;
|
|
OPENSSL_free(desc);
|
|
desc = NULL;
|
|
/* Move to the next command */
|
|
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE, num, NULL, NULL);
|
|
} while (num > 0);
|
|
if (xpos > 0)
|
|
BIO_printf(out, "\n");
|
|
ret = 1;
|
|
err:
|
|
sk_OPENSSL_STRING_free(cmds);
|
|
OPENSSL_free(name);
|
|
OPENSSL_free(desc);
|
|
return ret;
|
|
}
|
|
|
|
static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
|
|
BIO *out, const char *indent)
|
|
{
|
|
int loop, res, num = sk_OPENSSL_STRING_num(cmds);
|
|
|
|
if (num < 0) {
|
|
BIO_printf(out, "[Error]: internal stack error\n");
|
|
return;
|
|
}
|
|
for (loop = 0; loop < num; loop++) {
|
|
char buf[256];
|
|
const char *cmd, *arg;
|
|
cmd = sk_OPENSSL_STRING_value(cmds, loop);
|
|
res = 1; /* assume success */
|
|
/* Check if this command has no ":arg" */
|
|
if ((arg = strstr(cmd, ":")) == NULL) {
|
|
if (!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
|
res = 0;
|
|
} else {
|
|
if ((int)(arg - cmd) > 254) {
|
|
BIO_printf(out, "[Error]: command name too long\n");
|
|
return;
|
|
}
|
|
memcpy(buf, cmd, (int)(arg - cmd));
|
|
buf[arg - cmd] = '\0';
|
|
arg++; /* Move past the ":" */
|
|
/* Call the command with the argument */
|
|
if (!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
|
res = 0;
|
|
}
|
|
if (res) {
|
|
BIO_printf(out, "[Success]: %s\n", cmd);
|
|
} else {
|
|
BIO_printf(out, "[Failure]: %s\n", cmd);
|
|
ERR_print_errors(out);
|
|
}
|
|
}
|
|
}
|
|
|
|
struct util_store_cap_data {
|
|
ENGINE *engine;
|
|
char **cap_buf;
|
|
int *cap_size;
|
|
int ok;
|
|
};
|
|
static void util_store_cap(const OSSL_STORE_LOADER *loader, void *arg)
|
|
{
|
|
struct util_store_cap_data *ctx = arg;
|
|
|
|
if (OSSL_STORE_LOADER_get0_engine(loader) == ctx->engine) {
|
|
char buf[256];
|
|
BIO_snprintf(buf, sizeof(buf), "STORE(%s)",
|
|
OSSL_STORE_LOADER_get0_scheme(loader));
|
|
if (!append_buf(ctx->cap_buf, ctx->cap_size, buf))
|
|
ctx->ok = 0;
|
|
}
|
|
}
|
|
|
|
int engine_main(int argc, char **argv)
|
|
{
|
|
int ret = 1, i;
|
|
int verbose = 0, list_cap = 0, test_avail = 0, test_avail_noise = 0;
|
|
ENGINE *e;
|
|
STACK_OF(OPENSSL_CSTRING) *engines = sk_OPENSSL_CSTRING_new_null();
|
|
STACK_OF(OPENSSL_STRING) *pre_cmds = sk_OPENSSL_STRING_new_null();
|
|
STACK_OF(OPENSSL_STRING) *post_cmds = sk_OPENSSL_STRING_new_null();
|
|
BIO *out;
|
|
const char *indent = " ";
|
|
OPTION_CHOICE o;
|
|
char *prog;
|
|
char *argv1;
|
|
|
|
out = dup_bio_out(FORMAT_TEXT);
|
|
if (engines == NULL || pre_cmds == NULL || post_cmds == NULL)
|
|
goto end;
|
|
|
|
/* Remember the original command name, parse/skip any leading engine
|
|
* names, and then setup to parse the rest of the line as flags. */
|
|
prog = argv[0];
|
|
while ((argv1 = argv[1]) != NULL && *argv1 != '-') {
|
|
sk_OPENSSL_CSTRING_push(engines, argv1);
|
|
argc--;
|
|
argv++;
|
|
}
|
|
argv[0] = prog;
|
|
opt_init(argc, argv, engine_options);
|
|
|
|
while ((o = opt_next()) != OPT_EOF) {
|
|
switch (o) {
|
|
case OPT_EOF:
|
|
case OPT_ERR:
|
|
BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
|
|
goto end;
|
|
case OPT_HELP:
|
|
opt_help(engine_options);
|
|
ret = 0;
|
|
goto end;
|
|
case OPT_VVVV:
|
|
case OPT_VVV:
|
|
case OPT_VV:
|
|
case OPT_V:
|
|
/* Convert to an integer from one to four. */
|
|
i = (int)(o - OPT_V) + 1;
|
|
if (verbose < i)
|
|
verbose = i;
|
|
break;
|
|
case OPT_C:
|
|
list_cap = 1;
|
|
break;
|
|
case OPT_TT:
|
|
test_avail_noise++;
|
|
/* fall thru */
|
|
case OPT_T:
|
|
test_avail++;
|
|
break;
|
|
case OPT_PRE:
|
|
sk_OPENSSL_STRING_push(pre_cmds, opt_arg());
|
|
break;
|
|
case OPT_POST:
|
|
sk_OPENSSL_STRING_push(post_cmds, opt_arg());
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Allow any trailing parameters as engine names. */
|
|
argc = opt_num_rest();
|
|
argv = opt_rest();
|
|
for ( ; *argv; argv++) {
|
|
if (**argv == '-') {
|
|
BIO_printf(bio_err, "%s: Cannot mix flags and engine names.\n",
|
|
prog);
|
|
BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
|
|
goto end;
|
|
}
|
|
sk_OPENSSL_CSTRING_push(engines, *argv);
|
|
}
|
|
|
|
if (sk_OPENSSL_CSTRING_num(engines) == 0) {
|
|
for (e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e)) {
|
|
sk_OPENSSL_CSTRING_push(engines, ENGINE_get_id(e));
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
for (i = 0; i < sk_OPENSSL_CSTRING_num(engines); i++) {
|
|
const char *id = sk_OPENSSL_CSTRING_value(engines, i);
|
|
if ((e = ENGINE_by_id(id)) != NULL) {
|
|
const char *name = ENGINE_get_name(e);
|
|
/*
|
|
* Do "id" first, then "name". Easier to auto-parse.
|
|
*/
|
|
BIO_printf(out, "(%s) %s\n", id, name);
|
|
util_do_cmds(e, pre_cmds, out, indent);
|
|
if (strcmp(ENGINE_get_id(e), id) != 0) {
|
|
BIO_printf(out, "Loaded: (%s) %s\n",
|
|
ENGINE_get_id(e), ENGINE_get_name(e));
|
|
}
|
|
if (list_cap) {
|
|
int cap_size = 256;
|
|
char *cap_buf = NULL;
|
|
int k, n;
|
|
const int *nids;
|
|
ENGINE_CIPHERS_PTR fn_c;
|
|
ENGINE_DIGESTS_PTR fn_d;
|
|
ENGINE_PKEY_METHS_PTR fn_pk;
|
|
|
|
if (ENGINE_get_RSA(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "RSA"))
|
|
goto end;
|
|
if (ENGINE_get_DSA(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "DSA"))
|
|
goto end;
|
|
if (ENGINE_get_DH(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "DH"))
|
|
goto end;
|
|
if (ENGINE_get_RAND(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "RAND"))
|
|
goto end;
|
|
|
|
fn_c = ENGINE_get_ciphers(e);
|
|
if (fn_c == NULL)
|
|
goto skip_ciphers;
|
|
n = fn_c(e, NULL, &nids, 0);
|
|
for (k = 0; k < n; ++k)
|
|
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
|
|
goto end;
|
|
|
|
skip_ciphers:
|
|
fn_d = ENGINE_get_digests(e);
|
|
if (fn_d == NULL)
|
|
goto skip_digests;
|
|
n = fn_d(e, NULL, &nids, 0);
|
|
for (k = 0; k < n; ++k)
|
|
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
|
|
goto end;
|
|
|
|
skip_digests:
|
|
fn_pk = ENGINE_get_pkey_meths(e);
|
|
if (fn_pk == NULL)
|
|
goto skip_pmeths;
|
|
n = fn_pk(e, NULL, &nids, 0);
|
|
for (k = 0; k < n; ++k)
|
|
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
|
|
goto end;
|
|
skip_pmeths:
|
|
{
|
|
struct util_store_cap_data store_ctx;
|
|
|
|
store_ctx.engine = e;
|
|
store_ctx.cap_buf = &cap_buf;
|
|
store_ctx.cap_size = &cap_size;
|
|
store_ctx.ok = 1;
|
|
|
|
OSSL_STORE_do_all_loaders(util_store_cap, &store_ctx);
|
|
if (!store_ctx.ok)
|
|
goto end;
|
|
}
|
|
if (cap_buf != NULL && (*cap_buf != '\0'))
|
|
BIO_printf(out, " [%s]\n", cap_buf);
|
|
|
|
OPENSSL_free(cap_buf);
|
|
}
|
|
if (test_avail) {
|
|
BIO_printf(out, "%s", indent);
|
|
if (ENGINE_init(e)) {
|
|
BIO_printf(out, "[ available ]\n");
|
|
util_do_cmds(e, post_cmds, out, indent);
|
|
ENGINE_finish(e);
|
|
} else {
|
|
BIO_printf(out, "[ unavailable ]\n");
|
|
if (test_avail_noise)
|
|
ERR_print_errors_fp(stdout);
|
|
ERR_clear_error();
|
|
}
|
|
}
|
|
if ((verbose > 0) && !util_verbose(e, verbose, out, indent))
|
|
goto end;
|
|
ENGINE_free(e);
|
|
} else {
|
|
ERR_print_errors(bio_err);
|
|
/* because exit codes above 127 have special meaning on Unix */
|
|
if (++ret > 127)
|
|
ret = 127;
|
|
}
|
|
}
|
|
|
|
end:
|
|
|
|
ERR_print_errors(bio_err);
|
|
sk_OPENSSL_CSTRING_free(engines);
|
|
sk_OPENSSL_STRING_free(pre_cmds);
|
|
sk_OPENSSL_STRING_free(post_cmds);
|
|
BIO_free_all(out);
|
|
return ret;
|
|
}
|