C OpenSSL调试-如何在OpenSSL中转储中间ASN.1?

C OpenSSL调试-如何在OpenSSL中转储中间ASN.1?,c,encryption,openssl,pkcs#12,openssl-engine,C,Encryption,Openssl,Pkcs#12,Openssl Engine,我有一个PKCS#12测试文件,其中有一个使用PBES2(PBEWithHmacSHA256AndAESĀu 256)加密的条目,该条目在OpenSSL中不起作用(但在其他地方也起作用) 因此,我试图找出我的文件是否已损坏,或者OpenSSL是否无法正确处理PBES2 文件已附加:(pass:test) openssl pkcs12(v.1.0.2p-dev)的输出为: 因此我的主要问题是:进一步调试的最佳方法是什么? 我一直在考虑两种方法: 在ASN1\u item\u unpack() 获取

我有一个PKCS#12测试文件,其中有一个使用PBES2(PBEWithHmacSHA256AndAESĀu 256)加密的条目,该条目在OpenSSL中不起作用(但在其他地方也起作用)

因此,我试图找出我的文件是否已损坏,或者OpenSSL是否无法正确处理PBES2

文件已附加:(
pass:test

openssl pkcs12(v.1.0.2p-dev)的输出为:

因此我的主要问题是:进一步调试的最佳方法是什么?

我一直在考虑两种方法:

  • ASN1\u item\u unpack()
  • 获取解密的PKCS#12流并在其上运行
    asn1parse
    (如何?)

  • TLDR:您的文件已损坏。

    由于错误,您无法解密文件的该部分,但您不需要解密,因为加密参数未加密,正是因为解密程序需要在解密之前解析它们,我们可以使用命令行
    asn1parse
    模拟这一点。首先解析外部结构:

    $ openssl asn1parse -in test.p12 -inform der -i 
        0:d=0  hl=4 l=2450 cons: SEQUENCE
        4:d=1  hl=2 l=   1 prim:  INTEGER           :03
        7:d=1  hl=4 l=2379 cons:  SEQUENCE
       11:d=2  hl=2 l=   9 prim:   OBJECT            :pkcs7-data
       22:d=2  hl=4 l=2364 cons:   cont [ 0 ]
       26:d=3  hl=4 l=2360 prim:    OCTET STRING      [HEX DUMP]:308209343[REDACTED]
     2390:d=1  hl=2 l=  62 cons:  SEQUENCE
     2392:d=2  hl=2 l=  33 cons:   SEQUENCE
     2394:d=3  hl=2 l=   9 cons:    SEQUENCE
     2396:d=4  hl=2 l=   5 prim:     OBJECT            :sha1
     2403:d=4  hl=2 l=   0 prim:     NULL
     2405:d=3  hl=2 l=  20 prim:    OCTET STRING      [HEX DUMP]:17774B593A099F0332A817D2510FE15A0C699159
     2427:d=2  hl=2 l=  20 prim:   OCTET STRING      [HEX DUMP]:814F2DB1C2EBCB64D38CD56881BC9AC2FD2936FB
     2449:d=2  hl=2 l=   3 prim:   INTEGER           :0186A0
    
    正确匹配的。所有有用的内容都在contentinfo中,26+4=30,因此分析:

    $ openssl asn1parse -in test.p12 -inform der -i -strparse 30
        0:d=0  hl=4 l=2356 cons: SEQUENCE
        4:d=1  hl=4 l=1464 cons:  SEQUENCE
        8:d=2  hl=2 l=   9 prim:   OBJECT            :pkcs7-data
       19:d=2  hl=4 l=1449 cons:   cont [ 0 ]
       23:d=3  hl=4 l=1445 prim:    OCTET STRING      [HEX DUMP]:308205A1[REDACTED]
     1472:d=1  hl=4 l= 884 cons:  SEQUENCE
     1476:d=2  hl=2 l=   9 prim:   OBJECT            :pkcs7-encryptedData
     1487:d=2  hl=4 l= 869 cons:   cont [ 0 ]
     1491:d=3  hl=4 l= 865 cons:    SEQUENCE
     1495:d=4  hl=2 l=   1 prim:     INTEGER           :00
     1498:d=4  hl=4 l= 858 cons:     SEQUENCE
     1502:d=5  hl=2 l=   9 prim:      OBJECT            :pkcs7-data
     1513:d=5  hl=2 l=  41 cons:      SEQUENCE
     1515:d=6  hl=2 l=  10 prim:       OBJECT            :pbeWithSHA1And40BitRC2-CBC
     1527:d=6  hl=2 l=  27 cons:       SEQUENCE
     1529:d=7  hl=2 l=  20 prim:        OCTET STRING      [HEX DUMP]:B74DD380AAF9CBE6A327F74BC93C688A5E690AC2
     1551:d=7  hl=2 l=   3 prim:        INTEGER           :C350
     1556:d=5  hl=4 l= 800 prim:      cont [ 0 ]
    
    这有两个“包”:30+4处的数据实际上包含CovertedKeyBag,30+1472处的EncryptedData是cert包,这是标准的,我忽略了。分解带护罩的钥匙袋:

    $ openssl asn1parse -in test.p12 -inform der -i -strparse 57
        0:d=0  hl=4 l=1441 cons: SEQUENCE
        4:d=1  hl=4 l=1437 cons:  SEQUENCE
        8:d=2  hl=2 l=  11 prim:   OBJECT            :pkcs8ShroudedKeyBag
       21:d=2  hl=4 l=1358 cons:   cont [ 0 ]
       25:d=3  hl=4 l=1354 cons:    SEQUENCE
       29:d=4  hl=2 l= 116 cons:     SEQUENCE
       31:d=5  hl=2 l=   9 prim:      OBJECT            :PBES2
       42:d=5  hl=2 l= 103 cons:      SEQUENCE
       44:d=6  hl=2 l=   9 prim:       OBJECT            :PBES2
       55:d=6  hl=2 l=  90 cons:       SEQUENCE
       57:d=7  hl=2 l=  57 cons:        SEQUENCE
       59:d=8  hl=2 l=   9 prim:         OBJECT            :PBKDF2
       70:d=8  hl=2 l=  44 cons:         SEQUENCE
       72:d=9  hl=2 l=  20 prim:          OCTET STRING      [HEX DUMP]:547DFCB4975830F2A455BE611128B2188BB237E
       94:d=9  hl=2 l=   3 prim:          INTEGER           :0186A0
       99:d=9  hl=2 l=   1 prim:          INTEGER           :20
      102:d=9  hl=2 l=  12 cons:          SEQUENCE
      104:d=10 hl=2 l=   8 prim:           OBJECT            :hmacWithSHA256
      114:d=10 hl=2 l=   0 prim:           NULL
      116:d=7  hl=2 l=  29 cons:        SEQUENCE
      118:d=8  hl=2 l=   9 prim:         OBJECT            :aes-256-cbc
      129:d=8  hl=2 l=  16 prim:         OCTET STRING      [HEX DUMP]:12A6696B879EFB885F7C979904314FC
      147:d=4  hl=4 l=1232 prim:     OCTET STRING      [HEX DUMP]:[REDACTED]
     1383:d=2  hl=2 l=  60 cons:   SET
     1385:d=3  hl=2 l=  23 cons:    SEQUENCE
     1387:d=4  hl=2 l=   9 prim:     OBJECT            :friendlyName
     1398:d=4  hl=2 l=  10 cons:     SET
     1400:d=5  hl=2 l=   8 prim:      BMPSTRING
     1410:d=3  hl=2 l=  33 cons:    SEQUENCE
     1412:d=4  hl=2 l=   9 prim:     OBJECT            :localKeyID
     1423:d=4  hl=2 l=  20 cons:     SET
     1425:d=5  hl=2 l=  18 prim:      OCTET STRING      :Time 1530821849299
    
    CovertedKeyBag(4.2和4.2.2)的值(忽略属性,看起来没问题)应该是PKCS8 EncryptedPrivateKeyInfo:

    由于识别出的算法为PBES2,其30+27+42处的参数应为PBES2参数,从:

    但是,您可以看到实际存在的内容—有一个序列包含(OID)PBES2和正确的PBES2参数结构,即它嵌套的级别太深。似乎有什么东西构造了PBES2算法识别器,然后将其用作第二个PBES2算法识别器的参数,这是错误的

    然而,由于意图明确,我们可以(手动)计算PBKDF2 salt=547DFCB49758030F2A455BE611128B2188BB237E iter=100000 size=32 alg=hmacSHA256 of pass=test giving key 2E896C4F2D9549FD D2BE8B8F895D7C56 DD9008A6D7B7196E 1A30000F7F45B37,并将其与AES-256-CBC一起使用(带PKCS7padding)IV=12A6696B879EFCB885F7C979904314FC解密RSA密钥:

    $ dd if=test.p12 bs=1 skip=208 count=1232 | \
    > openssl aes-256-cbc -d -K 2E896C4F2D9549FDD2BE8B8F895D7C56DD9008A6D7B7196E1A30000F7F545B37 -iv 12A6696B879EFCB885F7C979904314FC >test.out
    $ openssl pkey -in test.out -inform der -text -noout 
    Private-Key: (2048 bit)
    modulus:
        00:d5:a7:ef:74:dd:ab:60:12:69:0d:dd:29:61:f7:
        0b:46:27:8d:c6:c3:5c:a6:b0:0e:59:01:d3:ff:65:
    [rest redacted]
    
    由于证书包已正确格式化(并加密),因此可以通过以下方式读取:

    $ openssl pkcs12 -in test.p12 -passin pass:test -nokeys
    MAC verified OK
    Bag Attributes
        friendlyName: test
        localKeyID: 54 69 6D 65 20 31 35 33 30 38 32 31 38 34 39 32 39 39
    subject=/CN=test
    issuer=/CN=test
    -----BEGIN CERTIFICATE-----
    MIICrDCCAZSgAwIBAgIBATANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0
    MB4XDTE4MDcwNTIwMTcyOVoXDTE5MDcwNTIwMTcyOVowDzENMAsGA1UEAwwEdGVz
    dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANWn73Tdq2ASaQ3dKWH3
    C0YnjcbDXKawDlkB0/9l53T4kQgy/CCsCPbv+LpcOLWIw61rPVzjlWTmg384GqAF
    s7Ewn98v8JsxKw7HXeYCvw+li2x3Y+DVtkqWchnsJWnmksXAynQnrhb2ayczM+YR
    OGli0Yvs6pQKNDuRKXrL2/cX212wFC42QE0NxfSblUdxrl2x4INqg9ME0fsHc2TO
    lt3JItxGK7vQkU/tNIOlhKOWUxt9lVPNaIGFW0w2CkGxV1HYGRy8VCDqAfsI4x18
    4WJTPTXjQ+EMl1yu5jPuRNdt7Gzvhll9O6LRUsJ2fNXAeQl7wOG/xZ9Rf73q1aTp
    CBECAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEA
    UL2dfILp69CBPF8DD8Pzso6QIcMDtBltXumv2/NL/YO1SXY3Rt3LZ4EJtrYvb/H3
    E3fH8qT9Yhfcrz+0F1aFt0WCdcOWDtZ5s7pn36a3Wye9LoBjPcB36BttzaBku+49
    PIOQwQGjc6vg3prFS/OBOpWsa94GZemI4xpfwHE2EXANKN4ufb9fyPRyrXGR8SQD
    3EdejRwLuICvxS/u8wO4+SfiHGLuR/i+w74nQeMsyrphWtPs9cDe4NMMN0I6WGKA
    u9XeWzxSmEswYmmm2y/KX+fVmeNoKbht5Oiaej9aVFS77hT/OdjO281R/1osIdPi
    8EJw1sCq5Tk7jkWxxZh+6Q==
    -----END CERTIFICATE-----
    

    QEF.

    谢谢!是的,我昨天意识到p12本身没有加密,所以
    asn1parse
    仍然有效。还发现了JDK中双PBES2的问题。
      EncryptedPrivateKeyInfo ::= SEQUENCE {
        encryptionAlgorithm  EncryptionAlgorithmIdentifier,
        encryptedData        EncryptedData }
      EncryptionAlgorithmIdentifier ::= AlgorithmIdentifier
      EncryptedData ::= OCTET STRING
    
    PBES2-params ::= SEQUENCE {
       keyDerivationFunc AlgorithmIdentifier {{PBES2-KDFs}},
       encryptionScheme AlgorithmIdentifier {{PBES2-Encs}} }
    
    $ dd if=test.p12 bs=1 skip=208 count=1232 | \
    > openssl aes-256-cbc -d -K 2E896C4F2D9549FDD2BE8B8F895D7C56DD9008A6D7B7196E1A30000F7F545B37 -iv 12A6696B879EFCB885F7C979904314FC >test.out
    $ openssl pkey -in test.out -inform der -text -noout 
    Private-Key: (2048 bit)
    modulus:
        00:d5:a7:ef:74:dd:ab:60:12:69:0d:dd:29:61:f7:
        0b:46:27:8d:c6:c3:5c:a6:b0:0e:59:01:d3:ff:65:
    [rest redacted]
    
    $ openssl pkcs12 -in test.p12 -passin pass:test -nokeys
    MAC verified OK
    Bag Attributes
        friendlyName: test
        localKeyID: 54 69 6D 65 20 31 35 33 30 38 32 31 38 34 39 32 39 39
    subject=/CN=test
    issuer=/CN=test
    -----BEGIN CERTIFICATE-----
    MIICrDCCAZSgAwIBAgIBATANBgkqhkiG9w0BAQsFADAPMQ0wCwYDVQQDDAR0ZXN0
    MB4XDTE4MDcwNTIwMTcyOVoXDTE5MDcwNTIwMTcyOVowDzENMAsGA1UEAwwEdGVz
    dDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANWn73Tdq2ASaQ3dKWH3
    C0YnjcbDXKawDlkB0/9l53T4kQgy/CCsCPbv+LpcOLWIw61rPVzjlWTmg384GqAF
    s7Ewn98v8JsxKw7HXeYCvw+li2x3Y+DVtkqWchnsJWnmksXAynQnrhb2ayczM+YR
    OGli0Yvs6pQKNDuRKXrL2/cX212wFC42QE0NxfSblUdxrl2x4INqg9ME0fsHc2TO
    lt3JItxGK7vQkU/tNIOlhKOWUxt9lVPNaIGFW0w2CkGxV1HYGRy8VCDqAfsI4x18
    4WJTPTXjQ+EMl1yu5jPuRNdt7Gzvhll9O6LRUsJ2fNXAeQl7wOG/xZ9Rf73q1aTp
    CBECAwEAAaMTMBEwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEA
    UL2dfILp69CBPF8DD8Pzso6QIcMDtBltXumv2/NL/YO1SXY3Rt3LZ4EJtrYvb/H3
    E3fH8qT9Yhfcrz+0F1aFt0WCdcOWDtZ5s7pn36a3Wye9LoBjPcB36BttzaBku+49
    PIOQwQGjc6vg3prFS/OBOpWsa94GZemI4xpfwHE2EXANKN4ufb9fyPRyrXGR8SQD
    3EdejRwLuICvxS/u8wO4+SfiHGLuR/i+w74nQeMsyrphWtPs9cDe4NMMN0I6WGKA
    u9XeWzxSmEswYmmm2y/KX+fVmeNoKbht5Oiaej9aVFS77hT/OdjO281R/1osIdPi
    8EJw1sCq5Tk7jkWxxZh+6Q==
    -----END CERTIFICATE-----