electrum

Electrum Bitcoin wallet
git clone https://git.parazyd.org/electrum
Log | Files | Refs | Submodules

commit 10701d72c948b1c77c304036311534177548057b
parent f97fdf3ba81d481f67bdb78bfccb011eb53d2133
Author: ThomasV <thomasv@electrum.org>
Date:   Tue, 23 Feb 2016 11:35:08 +0100

New class for decoding asn1 structures

Diffstat:
Dlib/asn1tinydecoder.py | 170-------------------------------------------------------------------------------
Mlib/x509.py | 235++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++-----------------
2 files changed, 185 insertions(+), 220 deletions(-)

diff --git a/lib/asn1tinydecoder.py b/lib/asn1tinydecoder.py @@ -1,170 +0,0 @@ -# This program is free software; you can redistribute it and/or modify -# it under the terms of the GNU General Public License as published by -# the Free Software Foundation; either version 2 of the License, or -# (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU General Public License for more details. -# -# You should have received a copy of the GNU General Public License -# along with this program; if not, write to the Free Software -# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, -# MA 02110-1301, USA. - - -# This is a simple and fast ASN1 decoder without external libraries. -# -# In order to browse through the ASN1 structure you need only 3 -# functions allowing you to navigate: -# asn1_node_root(...), asn1_node_next(...) and asn1_node_first_child(...) -# -####################### BEGIN ASN1 DECODER ############################ - -# Author: Jens Getreu, 8.11.2014 - -##### NAVIGATE - -# The following 4 functions are all you need to parse an ASN1 structure - -# gets the first ASN1 structure in der -def asn1_node_root(der): - return asn1_read_length(der,0) - -# gets the next ASN1 structure following (ixs,ixf,ixl) -def asn1_node_next(der, (ixs,ixf,ixl)): - return asn1_read_length(der,ixl+1) - -# opens the container (ixs,ixf,ixl) and returns the first ASN1 inside -def asn1_node_first_child(der, (ixs,ixf,ixl)): - if ord(der[ixs]) & 0x20 != 0x20: - raise ValueError('Error: can only open constructed types. ' - +'Found type: 0x'+der[ixs].encode("hex")) - return asn1_read_length(der,ixf) - -# is true if one ASN1 chunk is inside another chunk. -def asn1_node_is_child_of((ixs,ixf,ixl), (jxs,jxf,jxl)): - return ( (ixf <= jxs ) and (jxl <= ixl) ) or \ - ( (jxf <= ixs ) and (ixl <= jxl) ) - -##### END NAVIGATE - - - -##### ACCESS PRIMITIVES - -# get content and verify type byte -def asn1_get_value_of_type(der,(ixs,ixf,ixl),asn1_type): - asn1_type_table = { - 'BOOLEAN': 0x01, 'INTEGER': 0x02, - 'BIT STRING': 0x03, 'OCTET STRING': 0x04, - 'NULL': 0x05, 'OBJECT IDENTIFIER': 0x06, - 'SEQUENCE': 0x70, 'SET': 0x71, - 'PrintableString': 0x13, 'IA5String': 0x16, - 'UTCTime': 0x17, 'ENUMERATED': 0x0A, - 'UTF8String': 0x0C, 'PrintableString': 0x13, - } - if asn1_type_table[asn1_type] != ord(der[ixs]): - raise ValueError('Error: Expected type was: '+ - hex(asn1_type_table[asn1_type])+ - ' Found: 0x'+der[ixs].encode('hex')) - return der[ixf:ixl+1] - -# get value -def asn1_get_value(der,(ixs,ixf,ixl)): - return der[ixf:ixl+1] - -# get type+length+value -def asn1_get_all(der,(ixs,ixf,ixl)): - return der[ixs:ixl+1] - -##### END ACCESS PRIMITIVES - - - -##### HELPER FUNCTIONS - -# converter -def bitstr_to_bytestr(bitstr): - if bitstr[0] != '\x00': - raise ValueError('Error: only 00 padded bitstr can be converted to bytestr!') - return bitstr[1:] - -# converter -def bytestr_to_int(s): - # converts bytestring to integer - i = 0 - for char in s: - i <<= 8 - i |= ord(char) - return i - -# ix points to the first byte of the asn1 structure -# Returns first byte pointer, first content byte pointer and last. -def asn1_read_length(der,ix): - first= ord(der[ix+1]) - if (ord(der[ix+1]) & 0x80) == 0: - length = first - ix_first_content_byte = ix+2 - ix_last_content_byte = ix_first_content_byte + length -1 - else: - lengthbytes = first & 0x7F - length = bytestr_to_int(der[ix+2:ix+2+lengthbytes]) - ix_first_content_byte = ix+2+lengthbytes - ix_last_content_byte = ix_first_content_byte + length -1 - return (ix,ix_first_content_byte,ix_last_content_byte) - -##### END HELPER FUNCTIONS - - -####################### END ASN1 DECODER ############################ - - -def decode_OID(s): - s = map(ord, s) - r = [] - r.append(s[0] / 40) - r.append(s[0] % 40) - k = 0 - for i in s[1:]: - if i < 128: - r.append(i + 128*k) - k = 0 - else: - k = (i - 128) + 128*k - return '.'.join(map(str, r)) - -def encode_OID(oid): - x = map(int, oid.split('.')) - s = chr(x[0]*40 + x[1]) - for i in x[2:]: - ss = chr(i % 128) - while i > 128: - i = i / 128 - ss = chr(128 + i % 128) + ss - s += ss - return s - -def asn1_get_children(der, i): - nodes = [] - ii = asn1_node_first_child(der,i) - nodes.append(ii) - while ii[2]<i[2]: - ii = asn1_node_next(der,ii) - nodes.append(ii) - return nodes - -def asn1_get_sequence(s): - return map(lambda j: asn1_get_value(s, j), asn1_get_children(s, asn1_node_root(s))) - -def asn1_get_dict(der, i): - p = {} - for ii in asn1_get_children(der, i): - for iii in asn1_get_children(der, ii): - iiii = asn1_node_first_child(der, iii) - oid = decode_OID(asn1_get_value_of_type(der, iiii, 'OBJECT IDENTIFIER')) - iiii = asn1_node_next(der, iiii) - value = asn1_get_value(der, iiii) - p[oid] = value - return p diff --git a/lib/x509.py b/lib/x509.py @@ -19,11 +19,8 @@ from datetime import datetime import sys - import util from util import profiler, print_error - -from asn1tinydecoder import * import ecdsa import hashlib @@ -40,11 +37,142 @@ PREFIX_RSA_SHA256 = bytearray([0x30,0x31,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01 PREFIX_RSA_SHA384 = bytearray([0x30,0x41,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x02,0x05,0x00,0x04,0x30]) PREFIX_RSA_SHA512 = bytearray([0x30,0x51,0x30,0x0d,0x06,0x09,0x60,0x86,0x48,0x01,0x65,0x03,0x04,0x02,0x03,0x05,0x00,0x04,0x40]) +# types used in ASN1 structured data +ASN1_TYPES = { + 'BOOLEAN': 0x01, + 'INTEGER': 0x02, + 'BIT STRING': 0x03, + 'OCTET STRING': 0x04, + 'NULL': 0x05, + 'OBJECT IDENTIFIER': 0x06, + 'SEQUENCE': 0x70, + 'SET': 0x71, + 'PrintableString': 0x13, + 'IA5String': 0x16, + 'UTCTime': 0x17, + 'ENUMERATED': 0x0A, + 'UTF8String': 0x0C, + 'PrintableString': 0x13, +} class CertificateError(Exception): pass - +# helper functions + +def bitstr_to_bytestr(s): + if s[0] != '\x00': + raise BaseException('no padding') + return s[1:] + +def bytestr_to_int(s): + i = 0 + for char in s: + i <<= 8 + i |= ord(char) + return i + +def decode_OID(s): + s = map(ord, s) + r = [] + r.append(s[0] / 40) + r.append(s[0] % 40) + k = 0 + for i in s[1:]: + if i < 128: + r.append(i + 128*k) + k = 0 + else: + k = (i - 128) + 128*k + return '.'.join(map(str, r)) + + +def encode_OID(oid): + x = map(int, oid.split('.')) + s = chr(x[0]*40 + x[1]) + for i in x[2:]: + ss = chr(i % 128) + while i > 128: + i = i / 128 + ss = chr(128 + i % 128) + ss + s += ss + return s + + + + +class ASN1_Node(str): + + def get_node(self, ix): + # return index of first byte, first content byte and last byte. + first = ord(self[ix+1]) + if (ord(self[ix+1]) & 0x80) == 0: + length = first + ixf = ix + 2 + ixl = ixf + length - 1 + else: + lengthbytes = first & 0x7F + length = bytestr_to_int(self[ix+2:ix+2+lengthbytes]) + ixf = ix + 2 + lengthbytes + ixl = ixf + length -1 + return (ix, ixf, ixl) + + def root(self): + return self.get_node(0) + + def next_node(self, node): + ixs, ixf, ixl = node + return self.get_node(ixl + 1) + + def first_child(self, node): + ixs, ixf, ixl = node + if ord(self[ixs]) & 0x20 != 0x20: + raise BaseException('Can only open constructed types.', hex(ord(self[ixs]))) + return self.get_node(ixf) + + def is_child_of(node1, node2): + ixs, ixf, ixl = node1 + jxs, jxf, jxl = node2 + return ( (ixf <= jxs) and (jxl <= ixl) ) or ( (jxf <= ixs) and (ixl <= jxl) ) + + def get_all(self, node): + # return type + length + value + ixs, ixf, ixl = node + return self[ixs:ixl+1] + + def get_value_of_type(self, node, asn1_type): + # verify type byte and return content + ixs, ixf, ixl = node + if ASN1_TYPES[asn1_type] != ord(self[ixs]): + raise BaseException('Wrong type:', hex(ord(self[ixs])), hex(ASN1_TYPES[asn1_type]) ) + return self[ixf:ixl+1] + + def get_value(self, node): + ixs, ixf, ixl = node + return self[ixf:ixl+1] + + def get_children(self, node): + nodes = [] + ii = self.first_child(node) + nodes.append(ii) + while ii[2] < node[2]: + ii = self.next_node(ii) + nodes.append(ii) + return nodes + + def get_sequence(self): + return map(lambda j: self.get_value(j), self.get_children(self.root())) + + def get_dict(self, node): + p = {} + for ii in self.get_children(node): + for iii in self.get_children(ii): + iiii = self.first_child(iii) + oid = decode_OID(self.get_value_of_type(iiii, 'OBJECT IDENTIFIER')) + iiii = self.next_node(iiii) + value = self.get_value(iiii) + p[oid] = value + return p class X509(object): @@ -53,55 +181,53 @@ class X509(object): self.bytes = bytearray(b) - der = str(b) - root = asn1_node_root(der) - cert = asn1_node_first_child(der, root) + der = ASN1_Node(str(b)) + root = der.root() + cert = der.first_child(root) # data for signature - self.data = asn1_get_all(der, cert) + self.data = der.get_all(cert) # optional version field - if asn1_get_value(der, cert)[0] == chr(0xa0): - version = asn1_node_first_child(der, cert) - serial_number = asn1_node_next(der, version) + if der.get_value(cert)[0] == chr(0xa0): + version = der.first_child(cert) + serial_number = der.next_node(version) else: - serial_number = asn1_node_first_child(der, cert) - self.serial_number = bytestr_to_int(asn1_get_value_of_type(der, serial_number, 'INTEGER')) + serial_number = der.first_child(cert) + self.serial_number = bytestr_to_int(der.get_value_of_type(serial_number, 'INTEGER')) # signature algorithm - sig_algo = asn1_node_next(der, serial_number) - ii = asn1_node_first_child(der, sig_algo) - self.sig_algo = decode_OID(asn1_get_value_of_type(der, ii, 'OBJECT IDENTIFIER')) + sig_algo = der.next_node(serial_number) + ii = der.first_child(sig_algo) + self.sig_algo = decode_OID(der.get_value_of_type(ii, 'OBJECT IDENTIFIER')) # issuer - issuer = asn1_node_next(der, sig_algo) - self.issuer = asn1_get_dict(der, issuer) + issuer = der.next_node(sig_algo) + self.issuer = der.get_dict(issuer) # validity - validity = asn1_node_next(der, issuer) - ii = asn1_node_first_child(der, validity) - self.notBefore = asn1_get_value_of_type(der, ii, 'UTCTime') - ii = asn1_node_next(der,ii) - self.notAfter = asn1_get_value_of_type(der, ii, 'UTCTime') + validity = der.next_node(issuer) + ii = der.first_child(validity) + self.notBefore = der.get_value_of_type(ii, 'UTCTime') + ii = der.next_node(ii) + self.notAfter = der.get_value_of_type(ii, 'UTCTime') # subject - subject = asn1_node_next(der, validity) - self.subject = asn1_get_dict(der, subject) - - subject_pki = asn1_node_next(der, subject) - - public_key_algo = asn1_node_first_child(der, subject_pki) - ii = asn1_node_first_child(der, public_key_algo) - self.public_key_algo = decode_OID(asn1_get_value_of_type(der, ii, 'OBJECT IDENTIFIER')) + subject = der.next_node(validity) + self.subject = der.get_dict(subject) + subject_pki = der.next_node(subject) + public_key_algo = der.first_child(subject_pki) + ii = der.first_child(public_key_algo) + self.public_key_algo = decode_OID(der.get_value_of_type(ii, 'OBJECT IDENTIFIER')) # pubkey modulus and exponent - subject_public_key = asn1_node_next(der, public_key_algo) - spk = asn1_get_value_of_type(der, subject_public_key, 'BIT STRING') - spk = bitstr_to_bytestr(spk) - r = asn1_node_root(spk) - modulus = asn1_node_first_child(spk, r) - exponent = asn1_node_next(spk, modulus) - rsa_n = asn1_get_value_of_type(spk, modulus, 'INTEGER') - rsa_e = asn1_get_value_of_type(spk, exponent, 'INTEGER') + subject_public_key = der.next_node(public_key_algo) + spk = der.get_value_of_type(subject_public_key, 'BIT STRING') + spk = ASN1_Node(bitstr_to_bytestr(spk)) + r = spk.root() + modulus = spk.first_child(r) + exponent = spk.next_node(modulus) + rsa_n = spk.get_value_of_type(modulus, 'INTEGER') + rsa_e = spk.get_value_of_type(exponent, 'INTEGER') self.modulus = ecdsa.util.string_to_number(rsa_n) self.exponent = ecdsa.util.string_to_number(rsa_e) @@ -111,30 +237,31 @@ class X509(object): self.SKI = None i = subject_pki while i[2] < cert[2]: - i = asn1_node_next(der, i) - d = asn1_get_dict(der, i) + i = der.next_node(i) + d = der.get_dict(i) for oid, value in d.items(): + value = ASN1_Node(value) if oid == '2.5.29.19': # Basic Constraints self.CA = bool(value) elif oid == '2.5.29.14': # Subject Key Identifier - r = asn1_node_root(value) - value = asn1_get_value_of_type(value, r, 'OCTET STRING') + r = value.root() + value = value.get_value_of_type(r, 'OCTET STRING') self.SKI = value.encode('hex') elif oid == '2.5.29.35': # Authority Key Identifier - self.AKI = asn1_get_sequence(value)[0].encode('hex') + self.AKI = value.get_sequence()[0].encode('hex') else: pass # cert signature - cert_sig_algo = asn1_node_next(der, cert) - ii = asn1_node_first_child(der, cert_sig_algo) - self.cert_sig_algo = decode_OID(asn1_get_value_of_type(der, ii, 'OBJECT IDENTIFIER')) - cert_sig = asn1_node_next(der, cert_sig_algo) - self.signature = asn1_get_value(der, cert_sig)[1:] - + cert_sig_algo = der.next_node(cert) + ii = der.first_child(cert_sig_algo) + self.cert_sig_algo = decode_OID(der.get_value_of_type(ii, 'OBJECT IDENTIFIER')) + cert_sig = der.next_node(cert_sig_algo) + self.signature = der.get_value(cert_sig)[1:] + def get_keyID(self): # http://security.stackexchange.com/questions/72077/validating-an-ssl-certificate-chain-according-to-rfc-5280-am-i-understanding-th return self.SKI if self.SKI else repr(self.subject) @@ -190,3 +317,11 @@ def load_certificates(ca_path): ca_keyID[x.get_keyID()] = fp return ca_list, ca_keyID + + +if __name__ == "__main__": + import requests + util.set_verbosity(True) + ca_path = requests.certs.where() + ca_list, ca_keyID = load_certificates(ca_path) +