mirror of
https://github.com/openssl/openssl.git
synced 2024-11-21 01:15:20 +08:00
6738bf1417
Reviewed-by: Richard Levitte <levitte@openssl.org>
490 lines
16 KiB
C
490 lines
16 KiB
C
/*
|
|
* Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <openssl/opensslconf.h>
|
|
#ifdef OPENSSL_NO_ENGINE
|
|
NON_EMPTY_TRANSLATION_UNIT
|
|
#else
|
|
|
|
# include "apps.h"
|
|
# include "progs.h"
|
|
# include <stdio.h>
|
|
# include <stdlib.h>
|
|
# include <string.h>
|
|
# include <openssl/err.h>
|
|
# include <openssl/engine.h>
|
|
# include <openssl/ssl.h>
|
|
# include <openssl/store.h>
|
|
|
|
typedef enum OPTION_choice {
|
|
OPT_ERR = -1, OPT_EOF = 0, OPT_HELP,
|
|
OPT_C, OPT_T, OPT_TT, OPT_PRE, OPT_POST,
|
|
OPT_V = 100, OPT_VV, OPT_VVV, OPT_VVVV
|
|
} OPTION_CHOICE;
|
|
|
|
const OPTIONS engine_options[] = {
|
|
{OPT_HELP_STR, 1, '-', "Usage: %s [options] engine...\n"},
|
|
{OPT_HELP_STR, 1, '-',
|
|
" engine... Engines to load\n"},
|
|
{"help", OPT_HELP, '-', "Display this summary"},
|
|
{"v", OPT_V, '-', "List 'control commands' For each specified engine"},
|
|
{"vv", OPT_VV, '-', "Also display each command's description"},
|
|
{"vvv", OPT_VVV, '-', "Also add the input flags for each command"},
|
|
{"vvvv", OPT_VVVV, '-', "Also show internal input flags"},
|
|
{"c", OPT_C, '-', "List the capabilities of specified engine"},
|
|
{"t", OPT_T, '-', "Check that specified engine is available"},
|
|
{"tt", OPT_TT, '-', "Display error trace for unavailable engines"},
|
|
{"pre", OPT_PRE, 's', "Run command against the ENGINE before loading it"},
|
|
{"post", OPT_POST, 's', "Run command against the ENGINE after loading it"},
|
|
{OPT_MORE_STR, OPT_EOF, 1,
|
|
"Commands are like \"SO_PATH:/lib/libdriver.so\""},
|
|
{NULL}
|
|
};
|
|
|
|
static int append_buf(char **buf, int *size, const char *s)
|
|
{
|
|
const int expand = 256;
|
|
int len = strlen(s) + 1;
|
|
char *p = *buf;
|
|
|
|
if (p == NULL) {
|
|
*size = ((len + expand - 1) / expand) * expand;
|
|
p = *buf = app_malloc(*size, "engine buffer");
|
|
} else {
|
|
const int blen = strlen(p);
|
|
|
|
if (blen > 0)
|
|
len += 2 + blen;
|
|
|
|
if (len > *size) {
|
|
*size = ((len + expand - 1) / expand) * expand;
|
|
p = OPENSSL_realloc(p, *size);
|
|
if (p == NULL) {
|
|
OPENSSL_free(*buf);
|
|
*buf = NULL;
|
|
return 0;
|
|
}
|
|
*buf = p;
|
|
}
|
|
|
|
if (blen > 0) {
|
|
p += blen;
|
|
*p++ = ',';
|
|
*p++ = ' ';
|
|
}
|
|
}
|
|
|
|
strcpy(p, s);
|
|
return 1;
|
|
}
|
|
|
|
static int util_flags(BIO *out, unsigned int flags, const char *indent)
|
|
{
|
|
int started = 0, err = 0;
|
|
/* Indent before displaying input flags */
|
|
BIO_printf(out, "%s%s(input flags): ", indent, indent);
|
|
if (flags == 0) {
|
|
BIO_printf(out, "<no flags>\n");
|
|
return 1;
|
|
}
|
|
/*
|
|
* If the object is internal, mark it in a way that shows instead of
|
|
* having it part of all the other flags, even if it really is.
|
|
*/
|
|
if (flags & ENGINE_CMD_FLAG_INTERNAL) {
|
|
BIO_printf(out, "[Internal] ");
|
|
}
|
|
|
|
if (flags & ENGINE_CMD_FLAG_NUMERIC) {
|
|
BIO_printf(out, "NUMERIC");
|
|
started = 1;
|
|
}
|
|
/*
|
|
* Now we check that no combinations of the mutually exclusive NUMERIC,
|
|
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
|
* OR'd together with these would need to added after these to preserve
|
|
* the testing logic.
|
|
*/
|
|
if (flags & ENGINE_CMD_FLAG_STRING) {
|
|
if (started) {
|
|
BIO_printf(out, "|");
|
|
err = 1;
|
|
}
|
|
BIO_printf(out, "STRING");
|
|
started = 1;
|
|
}
|
|
if (flags & ENGINE_CMD_FLAG_NO_INPUT) {
|
|
if (started) {
|
|
BIO_printf(out, "|");
|
|
err = 1;
|
|
}
|
|
BIO_printf(out, "NO_INPUT");
|
|
started = 1;
|
|
}
|
|
/* Check for unknown flags */
|
|
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
|
~ENGINE_CMD_FLAG_STRING &
|
|
~ENGINE_CMD_FLAG_NO_INPUT & ~ENGINE_CMD_FLAG_INTERNAL;
|
|
if (flags) {
|
|
if (started)
|
|
BIO_printf(out, "|");
|
|
BIO_printf(out, "<0x%04X>", flags);
|
|
}
|
|
if (err)
|
|
BIO_printf(out, " <illegal flags!>");
|
|
BIO_printf(out, "\n");
|
|
return 1;
|
|
}
|
|
|
|
static int util_verbose(ENGINE *e, int verbose, BIO *out, const char *indent)
|
|
{
|
|
static const int line_wrap = 78;
|
|
int num;
|
|
int ret = 0;
|
|
char *name = NULL;
|
|
char *desc = NULL;
|
|
int flags;
|
|
int xpos = 0;
|
|
STACK_OF(OPENSSL_STRING) *cmds = NULL;
|
|
if (!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
|
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
|
0, NULL, NULL)) <= 0)) {
|
|
return 1;
|
|
}
|
|
|
|
cmds = sk_OPENSSL_STRING_new_null();
|
|
if (cmds == NULL)
|
|
goto err;
|
|
|
|
do {
|
|
int len;
|
|
/* Get the command input flags */
|
|
if ((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
|
NULL, NULL)) < 0)
|
|
goto err;
|
|
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4) {
|
|
/* Get the command name */
|
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
|
NULL, NULL)) <= 0)
|
|
goto err;
|
|
name = app_malloc(len + 1, "name buffer");
|
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
|
NULL) <= 0)
|
|
goto err;
|
|
/* Get the command description */
|
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
|
NULL, NULL)) < 0)
|
|
goto err;
|
|
if (len > 0) {
|
|
desc = app_malloc(len + 1, "description buffer");
|
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
|
NULL) <= 0)
|
|
goto err;
|
|
}
|
|
/* Now decide on the output */
|
|
if (xpos == 0)
|
|
/* Do an indent */
|
|
xpos = BIO_puts(out, indent);
|
|
else
|
|
/* Otherwise prepend a ", " */
|
|
xpos += BIO_printf(out, ", ");
|
|
if (verbose == 1) {
|
|
/*
|
|
* We're just listing names, comma-delimited
|
|
*/
|
|
if ((xpos > (int)strlen(indent)) &&
|
|
(xpos + (int)strlen(name) > line_wrap)) {
|
|
BIO_printf(out, "\n");
|
|
xpos = BIO_puts(out, indent);
|
|
}
|
|
xpos += BIO_printf(out, "%s", name);
|
|
} else {
|
|
/* We're listing names plus descriptions */
|
|
BIO_printf(out, "%s: %s\n", name,
|
|
(desc == NULL) ? "<no description>" : desc);
|
|
/* ... and sometimes input flags */
|
|
if ((verbose >= 3) && !util_flags(out, flags, indent))
|
|
goto err;
|
|
xpos = 0;
|
|
}
|
|
}
|
|
OPENSSL_free(name);
|
|
name = NULL;
|
|
OPENSSL_free(desc);
|
|
desc = NULL;
|
|
/* Move to the next command */
|
|
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE, num, NULL, NULL);
|
|
} while (num > 0);
|
|
if (xpos > 0)
|
|
BIO_printf(out, "\n");
|
|
ret = 1;
|
|
err:
|
|
sk_OPENSSL_STRING_free(cmds);
|
|
OPENSSL_free(name);
|
|
OPENSSL_free(desc);
|
|
return ret;
|
|
}
|
|
|
|
static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
|
|
BIO *out, const char *indent)
|
|
{
|
|
int loop, res, num = sk_OPENSSL_STRING_num(cmds);
|
|
|
|
if (num < 0) {
|
|
BIO_printf(out, "[Error]: internal stack error\n");
|
|
return;
|
|
}
|
|
for (loop = 0; loop < num; loop++) {
|
|
char buf[256];
|
|
const char *cmd, *arg;
|
|
cmd = sk_OPENSSL_STRING_value(cmds, loop);
|
|
res = 1; /* assume success */
|
|
/* Check if this command has no ":arg" */
|
|
if ((arg = strstr(cmd, ":")) == NULL) {
|
|
if (!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
|
res = 0;
|
|
} else {
|
|
if ((int)(arg - cmd) > 254) {
|
|
BIO_printf(out, "[Error]: command name too long\n");
|
|
return;
|
|
}
|
|
memcpy(buf, cmd, (int)(arg - cmd));
|
|
buf[arg - cmd] = '\0';
|
|
arg++; /* Move past the ":" */
|
|
/* Call the command with the argument */
|
|
if (!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
|
res = 0;
|
|
}
|
|
if (res) {
|
|
BIO_printf(out, "[Success]: %s\n", cmd);
|
|
} else {
|
|
BIO_printf(out, "[Failure]: %s\n", cmd);
|
|
ERR_print_errors(out);
|
|
}
|
|
}
|
|
}
|
|
|
|
struct util_store_cap_data {
|
|
ENGINE *engine;
|
|
char **cap_buf;
|
|
int *cap_size;
|
|
int ok;
|
|
};
|
|
static void util_store_cap(const OSSL_STORE_LOADER *loader, void *arg)
|
|
{
|
|
struct util_store_cap_data *ctx = arg;
|
|
|
|
if (OSSL_STORE_LOADER_get0_engine(loader) == ctx->engine) {
|
|
char buf[256];
|
|
BIO_snprintf(buf, sizeof(buf), "STORE(%s)",
|
|
OSSL_STORE_LOADER_get0_scheme(loader));
|
|
if (!append_buf(ctx->cap_buf, ctx->cap_size, buf))
|
|
ctx->ok = 0;
|
|
}
|
|
}
|
|
|
|
int engine_main(int argc, char **argv)
|
|
{
|
|
int ret = 1, i;
|
|
int verbose = 0, list_cap = 0, test_avail = 0, test_avail_noise = 0;
|
|
ENGINE *e;
|
|
STACK_OF(OPENSSL_CSTRING) *engines = sk_OPENSSL_CSTRING_new_null();
|
|
STACK_OF(OPENSSL_STRING) *pre_cmds = sk_OPENSSL_STRING_new_null();
|
|
STACK_OF(OPENSSL_STRING) *post_cmds = sk_OPENSSL_STRING_new_null();
|
|
BIO *out;
|
|
const char *indent = " ";
|
|
OPTION_CHOICE o;
|
|
char *prog;
|
|
char *argv1;
|
|
|
|
out = dup_bio_out(FORMAT_TEXT);
|
|
if (engines == NULL || pre_cmds == NULL || post_cmds == NULL)
|
|
goto end;
|
|
|
|
/* Remember the original command name, parse/skip any leading engine
|
|
* names, and then setup to parse the rest of the line as flags. */
|
|
prog = argv[0];
|
|
while ((argv1 = argv[1]) != NULL && *argv1 != '-') {
|
|
sk_OPENSSL_CSTRING_push(engines, argv1);
|
|
argc--;
|
|
argv++;
|
|
}
|
|
argv[0] = prog;
|
|
opt_init(argc, argv, engine_options);
|
|
|
|
while ((o = opt_next()) != OPT_EOF) {
|
|
switch (o) {
|
|
case OPT_EOF:
|
|
case OPT_ERR:
|
|
BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
|
|
goto end;
|
|
case OPT_HELP:
|
|
opt_help(engine_options);
|
|
ret = 0;
|
|
goto end;
|
|
case OPT_VVVV:
|
|
case OPT_VVV:
|
|
case OPT_VV:
|
|
case OPT_V:
|
|
/* Convert to an integer from one to four. */
|
|
i = (int)(o - OPT_V) + 1;
|
|
if (verbose < i)
|
|
verbose = i;
|
|
break;
|
|
case OPT_C:
|
|
list_cap = 1;
|
|
break;
|
|
case OPT_TT:
|
|
test_avail_noise++;
|
|
/* fall thru */
|
|
case OPT_T:
|
|
test_avail++;
|
|
break;
|
|
case OPT_PRE:
|
|
sk_OPENSSL_STRING_push(pre_cmds, opt_arg());
|
|
break;
|
|
case OPT_POST:
|
|
sk_OPENSSL_STRING_push(post_cmds, opt_arg());
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Allow any trailing parameters as engine names. */
|
|
argc = opt_num_rest();
|
|
argv = opt_rest();
|
|
for ( ; *argv; argv++) {
|
|
if (**argv == '-') {
|
|
BIO_printf(bio_err, "%s: Cannot mix flags and engine names.\n",
|
|
prog);
|
|
BIO_printf(bio_err, "%s: Use -help for summary.\n", prog);
|
|
goto end;
|
|
}
|
|
sk_OPENSSL_CSTRING_push(engines, *argv);
|
|
}
|
|
|
|
if (sk_OPENSSL_CSTRING_num(engines) == 0) {
|
|
for (e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e)) {
|
|
sk_OPENSSL_CSTRING_push(engines, ENGINE_get_id(e));
|
|
}
|
|
}
|
|
|
|
ret = 0;
|
|
for (i = 0; i < sk_OPENSSL_CSTRING_num(engines); i++) {
|
|
const char *id = sk_OPENSSL_CSTRING_value(engines, i);
|
|
if ((e = ENGINE_by_id(id)) != NULL) {
|
|
const char *name = ENGINE_get_name(e);
|
|
/*
|
|
* Do "id" first, then "name". Easier to auto-parse.
|
|
*/
|
|
BIO_printf(out, "(%s) %s\n", id, name);
|
|
util_do_cmds(e, pre_cmds, out, indent);
|
|
if (strcmp(ENGINE_get_id(e), id) != 0) {
|
|
BIO_printf(out, "Loaded: (%s) %s\n",
|
|
ENGINE_get_id(e), ENGINE_get_name(e));
|
|
}
|
|
if (list_cap) {
|
|
int cap_size = 256;
|
|
char *cap_buf = NULL;
|
|
int k, n;
|
|
const int *nids;
|
|
ENGINE_CIPHERS_PTR fn_c;
|
|
ENGINE_DIGESTS_PTR fn_d;
|
|
ENGINE_PKEY_METHS_PTR fn_pk;
|
|
|
|
if (ENGINE_get_RSA(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "RSA"))
|
|
goto end;
|
|
if (ENGINE_get_DSA(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "DSA"))
|
|
goto end;
|
|
if (ENGINE_get_DH(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "DH"))
|
|
goto end;
|
|
if (ENGINE_get_RAND(e) != NULL
|
|
&& !append_buf(&cap_buf, &cap_size, "RAND"))
|
|
goto end;
|
|
|
|
fn_c = ENGINE_get_ciphers(e);
|
|
if (fn_c == NULL)
|
|
goto skip_ciphers;
|
|
n = fn_c(e, NULL, &nids, 0);
|
|
for (k = 0; k < n; ++k)
|
|
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
|
|
goto end;
|
|
|
|
skip_ciphers:
|
|
fn_d = ENGINE_get_digests(e);
|
|
if (fn_d == NULL)
|
|
goto skip_digests;
|
|
n = fn_d(e, NULL, &nids, 0);
|
|
for (k = 0; k < n; ++k)
|
|
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
|
|
goto end;
|
|
|
|
skip_digests:
|
|
fn_pk = ENGINE_get_pkey_meths(e);
|
|
if (fn_pk == NULL)
|
|
goto skip_pmeths;
|
|
n = fn_pk(e, NULL, &nids, 0);
|
|
for (k = 0; k < n; ++k)
|
|
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
|
|
goto end;
|
|
skip_pmeths:
|
|
{
|
|
struct util_store_cap_data store_ctx;
|
|
|
|
store_ctx.engine = e;
|
|
store_ctx.cap_buf = &cap_buf;
|
|
store_ctx.cap_size = &cap_size;
|
|
store_ctx.ok = 1;
|
|
|
|
OSSL_STORE_do_all_loaders(util_store_cap, &store_ctx);
|
|
if (!store_ctx.ok)
|
|
goto end;
|
|
}
|
|
if (cap_buf != NULL && (*cap_buf != '\0'))
|
|
BIO_printf(out, " [%s]\n", cap_buf);
|
|
|
|
OPENSSL_free(cap_buf);
|
|
}
|
|
if (test_avail) {
|
|
BIO_printf(out, "%s", indent);
|
|
if (ENGINE_init(e)) {
|
|
BIO_printf(out, "[ available ]\n");
|
|
util_do_cmds(e, post_cmds, out, indent);
|
|
ENGINE_finish(e);
|
|
} else {
|
|
BIO_printf(out, "[ unavailable ]\n");
|
|
if (test_avail_noise)
|
|
ERR_print_errors_fp(stdout);
|
|
ERR_clear_error();
|
|
}
|
|
}
|
|
if ((verbose > 0) && !util_verbose(e, verbose, out, indent))
|
|
goto end;
|
|
ENGINE_free(e);
|
|
} else {
|
|
ERR_print_errors(bio_err);
|
|
/* because exit codes above 127 have special meaning on Unix */
|
|
if (++ret > 127)
|
|
ret = 127;
|
|
}
|
|
}
|
|
|
|
end:
|
|
|
|
ERR_print_errors(bio_err);
|
|
sk_OPENSSL_CSTRING_free(engines);
|
|
sk_OPENSSL_STRING_free(pre_cmds);
|
|
sk_OPENSSL_STRING_free(post_cmds);
|
|
BIO_free_all(out);
|
|
return ret;
|
|
}
|
|
#endif
|