コード例 #1
0
ファイル: test_rfc2437.py プロジェクト: hugovk/pyasn1-modules
 def setUp(self):
     self.asn1Spec = rfc2437.RSAPrivateKey()
コード例 #2
0
import sys

if len(sys.argv) != 1:
    print("""Usage:
$ cat rsakey.pem | %s""" % sys.argv[0])
    sys.exit(-1)
    
cnt = 0

while 1:
    idx, substrate = pem.readPemBlocksFromFile(sys.stdin, ('-----BEGIN RSA PRIVATE KEY-----', '-----END RSA PRIVATE KEY-----'), ('-----BEGIN DSA PRIVATE KEY-----', '-----END DSA PRIVATE KEY-----') )
    if not substrate:
        break

    if idx == 0:
        asn1Spec = rfc2437.RSAPrivateKey()
    elif idx == 1:
        asn1Spec = rfc2459.DSAPrivateKey()
    else:
        break

    key, rest = decoder.decode(substrate, asn1Spec=asn1Spec)

    if rest: substrate = substrate[:-len(rest)]
        
    print(key.prettyPrint())

    assert encoder.encode(key, defMode=False) == substrate or \
           encoder.encode(key, defMode=True) == substrate, \
           'pkcs8 recode fails'
        
コード例 #3
0
class ActionScrape(BaseAction):
	_DERHandler = collections.namedtuple("DERHandler", [ "asn1_spec", "data_type", "extension", "pem_marker", "sanity_check_fn", "precedence" ])
	_PEM_BEGIN = re.compile("^-----BEGIN (?P<marker>[ A-Za-z0-9]+)-----")
	_MARKERS = {
		"CERTIFICATE":				"crt",
		"OPENSSH PRIVATE KEY":		"openssh_key",
		"DSA PRIVATE KEY":			"dsa_key",
		"RSA PRIVATE KEY":			"rsa_key",
		"EC PRIVATE KEY":			"ec_key",
		"PUBLIC KEY":				"pubkey",
		"X509 CRL":					"crl",
		"CERTIFICATE REQUEST":		"csr",
		"NEW CERTIFICATE REQUEST":	"csr",
	}
	_DER_CLASSES = {
		handler_class.data_type: handler_class for handler_class in (
			_DERHandler(asn1_spec = rfc2459.Certificate(), data_type = "crt", extension = "der", pem_marker = "CERTIFICATE", sanity_check_fn = None, precedence = 10),
			_DERHandler(asn1_spec = rfc2437.RSAPrivateKey(), data_type = "rsa_key", extension = "der", pem_marker = "RSA PRIVATE KEY", sanity_check_fn = _DERSanityCheck.check_rsa_key, precedence = 20),
			_DERHandler(asn1_spec = rfc2459.DSAPrivateKey(), data_type = "dsa_key", extension = "der", pem_marker = "DSA PRIVATE KEY", sanity_check_fn = None, precedence = 20),
			_DERHandler(asn1_spec = rfc2459.SubjectPublicKeyInfo(), data_type = "pubkey", extension = "der", pem_marker = "PUBLIC KEY", sanity_check_fn = None, precedence = 30),
			_DERHandler(asn1_spec = x509sak.ASN1Models.ECPrivateKey(), data_type = "ec_key", extension = "der", pem_marker = "EC PRIVATE KEY", sanity_check_fn = _DERSanityCheck.check_ec_key, precedence = 20),
			_DERHandler(asn1_spec = x509sak.ASN1Models.PFX(), data_type = "pkcs12", extension = "p12", pem_marker = None, sanity_check_fn = None, precedence = 0),
			_DERHandler(asn1_spec = x509sak.ASN1Models.DSASignature(), data_type = "dsa_sig", extension = "der", pem_marker = None, sanity_check_fn = _DERSanityCheck.check_dsa_sig, precedence = 40),
	)}
	handler_classes = sorted(list(_DER_CLASSES.keys()))

	def __init__(self, cmdname, args):
		BaseAction.__init__(self, cmdname, args)

		# Plausibilize input parameters
		kwargs_checker = KwargsChecker(optional_arguments = set(self._DER_CLASSES.keys()))
		kwargs_checker.check(self._args.include_dertype, hint = "DER classes to be included")
		kwargs_checker.check(self._args.exclude_dertype, hint = "DER classes to be excluded")

		# Plausibilize output directory
		if os.path.exists(self._args.outdir) and (not self._args.force):
			raise Exception("Directory %s already exists. Remove it first or use --force." % (self._args.outdir))
		try:
			os.makedirs(self._args.outdir)
		except FileExistsError:
			pass

		# Determine active DERHandler classes
		if len(self._args.include_dertype) == 0:
			active_der_types = set(self._DER_CLASSES.keys())
		else:
			active_der_types = set(self._args.include_dertype)
		active_der_types -= set(self._args.exclude_dertype)
		self._active_der_types = [ self._DER_CLASSES[class_name] for class_name in active_der_types ]
		self._active_der_types.sort(key = lambda handler: (handler.precedence, handler.data_type))

		self._stats = ActionScrapeStats(self._args)
		self._stats.set_active_der_types([ handler_class.data_type for handler_class in self._active_der_types ])

		self._matches = Intervals()
		self._hashes = set()
		engine = ScrapeEngine(self._args.filename)
		if not self._args.no_pem:
			engine.search(self._find_pem, b"-----BEGIN ", min_length = 52, max_length = 32 * 1024)
		if (not self._args.no_der) and (len(self._active_der_types) > 0):
			self._log.debug("Looking for %d DER type(s): %s", len(self._active_der_types), ", ".join(handler.data_type for handler in self._active_der_types))
			engine.search(self._find_der, bytes.fromhex("30"), min_length = 2, max_length = 32 * 1024)
		end_offset = engine.commence(start_offset = self._args.seek_offset, length = self._args.analysis_length, progress_callback = self._progress_callback)
		self._stats.finish(end_offset)
		self._stats.dump()
		if self._args.write_json is not None:
			JSONTools.write_to_file(self._stats.as_dict(), self._args.write_json)

	def _progress_callback(self, position, total_length, elapsed_secs):
		self._log.debug("Scan at %.0f MiB of %.0f MiB, %.1f%%. Average speed %.1f MiB/sec", position / 1024 / 1024, total_length / 1024 / 1024, position / total_length * 100, position / 1024 / 1024 / elapsed_secs)

	def _is_nested_match(self, offset, length):
		if self._args.extract_nested:
			# Completely disregard if we've already captured this.
			return False
		interval = Interval.begin_length(offset, length)
		if self._matches.fully_contained_in_subinterval(interval):
			# We already have this match.
			return True
		else:
			self._matches.add(interval)
			return False

	def _is_known_blob(self, data):
		if self._args.allow_non_unique_blobs:
			# We record the exact same file twice, always.
			return False
		blob_hash = hashlib.sha256(data).digest()
		if blob_hash in self._hashes:
			return True
		else:
			self._hashes.add(blob_hash)
			return False

	def _record_finding(self, offset, data_type, extension, data, encode_pem_marker = None, orig_extension = None):
		if orig_extension is None:
			orig_extension = data_type

		if len(data) == 0:
			self._stats.record_finding(offset, len(data), data_type, orig_extension, "discard:zero_length")
			return

		if self._is_nested_match(offset, len(data)):
			self._stats.record_finding(offset, len(data), data_type, orig_extension, "discard:nested")
			self._log.debug("Found %s/%s at offset 0x%x, length %d bytes, not recording nested match.", data_type, orig_extension, offset, len(data))
			return

		if self._is_known_blob(data):
			self._stats.record_finding(offset, len(data), data_type, orig_extension, "discard:non-unique")
			self._log.debug("Found %s/%s at offset 0x%x, length %d bytes, not recording non-unique match.", data_type, orig_extension, offset, len(data))
			return

		filename_args = {
			"otype":	orig_extension,
			"type":		data_type,
			"offset":	offset,
			"ext":		extension,
		}
		filename = self._args.outdir + "/" + (self._args.outmask % filename_args)
		self._stats.record_finding(offset, len(data), data_type, orig_extension, "written", filename)
		self._log.info("Found %s/%s at offset 0x%x, length %d bytes, saved as %s", data_type, orig_extension, offset, len(data), filename)

		if encode_pem_marker is not None:
			output_data = (PEMDataTools.data2pem(data, encode_pem_marker) + "\n").encode()
		else:
			output_data = data
		with open(filename, "wb") as f:
			f.write(output_data)

	def _find_pem(self, offset, data):
		self._stats.pem_potential_match()
		textdata = data.decode("ascii", errors = "ignore")
		result = self._PEM_BEGIN.match(textdata)
		if result is None:
			return
		result = result.groupdict()
		marker = result["marker"]
		full_re = re.compile("-----BEGIN %s-----(?P<pem_data>.*?)-----END %s-----" % (marker, marker), flags = re.DOTALL | re.MULTILINE)
		result = full_re.match(textdata)
		if result is None:
			return
		result = result.groupdict()
		pem_data = result["pem_data"]
		pem_data = pem_data.replace("\r", "")
		pem_data = pem_data.replace("\n", "")
		pem_data = pem_data.replace("\t", "")
		pem_data = pem_data.replace(" ", "")
		der_data = base64.b64decode(pem_data)

		self._stats.pem_successful_decode()
		data_type = self._MARKERS.get(marker, "unknown")
		self._record_finding(offset = offset, data_type = data_type, extension = "pem", data = der_data, encode_pem_marker = marker)

	def _find_der(self, offset, data):
		self._stats.der_potential_match()

		for der_candidate in self._active_der_types:
			try:
				self._stats.der_attempt_decode()
				(asn1, tail) = pyasn1.codec.der.decoder.decode(data, asn1Spec = der_candidate.asn1_spec)
				if len(tail) == 0:
					asn1_data = data
				else:
					asn1_data = data[:-len(tail)]
				self._stats.der_successful_decode()

				if (not self._args.disable_der_sanity_checks) and (der_candidate.sanity_check_fn is not None):
					# We want sanity checks enabled and for the successfully
					# deserialized ASN.1 blob there is a handler registered.
					# Execute it (it'll throw an exception on failure, which
					# we'll catch).
					der_candidate.sanity_check_fn(asn1)
				self._stats.der_passed_plausibility()

				if self._args.keep_original_der or (der_candidate.pem_marker is None):
					# Should not or cannot re-encode as PEM, write DER file
					self._record_finding(offset = offset, data_type = der_candidate.data_type, extension = der_candidate.extension, data = asn1_data)
				else:
					self._record_finding(offset = offset, data_type = der_candidate.data_type, extension = "pem", data = asn1_data, encode_pem_marker = der_candidate.pem_marker, orig_extension = der_candidate.extension)

			except pyasn1.error.PyAsn1Error as e:
				pass
			except _DERSanityCheck.SanityCheckFailedException as e:
				self._log.debug("Potential %s blob encountered at offset 0x%x, but failed sanity check: %s", der_candidate.data_type, offset, str(e))
				self._stats.der_failed_plausibility()