2
0

asn1parse.pod 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. =pod
  2. =head1 NAME
  3. asn1parse - ASN.1 parsing tool
  4. =head1 SYNOPSIS
  5. B<openssl> B<asn1parse>
  6. [B<-inform PEM|DER>]
  7. [B<-in filename>]
  8. [B<-out filename>]
  9. [B<-noout>]
  10. [B<-offset number>]
  11. [B<-length number>]
  12. [B<-i>]
  13. [B<-oid filename>]
  14. [B<-dump>]
  15. [B<-dlimit num>]
  16. [B<-strparse offset>]
  17. [B<-genstr string>]
  18. [B<-genconf file>]
  19. =head1 DESCRIPTION
  20. The B<asn1parse> command is a diagnostic utility that can parse ASN.1
  21. structures. It can also be used to extract data from ASN.1 formatted data.
  22. =head1 OPTIONS
  23. =over 4
  24. =item B<-inform> B<DER|PEM>
  25. the input format. B<DER> is binary format and B<PEM> (the default) is base64
  26. encoded.
  27. =item B<-in filename>
  28. the input file, default is standard input
  29. =item B<-out filename>
  30. output file to place the DER encoded data into. If this
  31. option is not present then no data will be output. This is most useful when
  32. combined with the B<-strparse> option.
  33. =item B<-noout>
  34. don't output the parsed version of the input file.
  35. =item B<-offset number>
  36. starting offset to begin parsing, default is start of file.
  37. =item B<-length number>
  38. number of bytes to parse, default is until end of file.
  39. =item B<-i>
  40. indents the output according to the "depth" of the structures.
  41. =item B<-oid filename>
  42. a file containing additional OBJECT IDENTIFIERs (OIDs). The format of this
  43. file is described in the NOTES section below.
  44. =item B<-dump>
  45. dump unknown data in hex format.
  46. =item B<-dlimit num>
  47. like B<-dump>, but only the first B<num> bytes are output.
  48. =item B<-strparse offset>
  49. parse the contents octets of the ASN.1 object starting at B<offset>. This
  50. option can be used multiple times to "drill down" into a nested structure.
  51. =item B<-genstr string>, B<-genconf file>
  52. generate encoded data based on B<string>, B<file> or both using
  53. L<ASN1_generate_nconf(3)|ASN1_generate_nconf(3)> format. If B<file> only is
  54. present then the string is obtained from the default section using the name
  55. B<asn1>. The encoded data is passed through the ASN1 parser and printed out as
  56. though it came from a file, the contents can thus be examined and written to a
  57. file using the B<out> option.
  58. =back
  59. =head2 OUTPUT
  60. The output will typically contain lines like this:
  61. 0:d=0 hl=4 l= 681 cons: SEQUENCE
  62. .....
  63. 229:d=3 hl=3 l= 141 prim: BIT STRING
  64. 373:d=2 hl=3 l= 162 cons: cont [ 3 ]
  65. 376:d=3 hl=3 l= 159 cons: SEQUENCE
  66. 379:d=4 hl=2 l= 29 cons: SEQUENCE
  67. 381:d=5 hl=2 l= 3 prim: OBJECT :X509v3 Subject Key Identifier
  68. 386:d=5 hl=2 l= 22 prim: OCTET STRING
  69. 410:d=4 hl=2 l= 112 cons: SEQUENCE
  70. 412:d=5 hl=2 l= 3 prim: OBJECT :X509v3 Authority Key Identifier
  71. 417:d=5 hl=2 l= 105 prim: OCTET STRING
  72. 524:d=4 hl=2 l= 12 cons: SEQUENCE
  73. .....
  74. This example is part of a self signed certificate. Each line starts with the
  75. offset in decimal. B<d=XX> specifies the current depth. The depth is increased
  76. within the scope of any SET or SEQUENCE. B<hl=XX> gives the header length
  77. (tag and length octets) of the current type. B<l=XX> gives the length of
  78. the contents octets.
  79. The B<-i> option can be used to make the output more readable.
  80. Some knowledge of the ASN.1 structure is needed to interpret the output.
  81. In this example the BIT STRING at offset 229 is the certificate public key.
  82. The contents octets of this will contain the public key information. This can
  83. be examined using the option B<-strparse 229> to yield:
  84. 0:d=0 hl=3 l= 137 cons: SEQUENCE
  85. 3:d=1 hl=3 l= 129 prim: INTEGER :E5D21E1F5C8D208EA7A2166C7FAF9F6BDF2059669C60876DDB70840F1A5AAFA59699FE471F379F1DD6A487E7D5409AB6A88D4A9746E24B91D8CF55DB3521015460C8EDE44EE8A4189F7A7BE77D6CD3A9AF2696F486855CF58BF0EDF2B4068058C7A947F52548DDF7E15E96B385F86422BEA9064A3EE9E1158A56E4A6F47E5897
  86. 135:d=1 hl=2 l= 3 prim: INTEGER :010001
  87. =head1 NOTES
  88. If an OID is not part of OpenSSL's internal table it will be represented in
  89. numerical form (for example 1.2.3.4). The file passed to the B<-oid> option
  90. allows additional OIDs to be included. Each line consists of three columns,
  91. the first column is the OID in numerical format and should be followed by white
  92. space. The second column is the "short name" which is a single word followed
  93. by white space. The final column is the rest of the line and is the
  94. "long name". B<asn1parse> displays the long name. Example:
  95. C<1.2.3.4 shortName A long name>
  96. =head1 EXAMPLES
  97. Parse a file:
  98. openssl asn1parse -in file.pem
  99. Parse a DER file:
  100. openssl asn1parse -inform DER -in file.der
  101. Generate a simple UTF8String:
  102. openssl asn1parse -genstr 'UTF8:Hello World'
  103. Generate and write out a UTF8String, don't print parsed output:
  104. openssl asn1parse -genstr 'UTF8:Hello World' -noout -out utf8.der
  105. Generate using a config file:
  106. openssl asn1parse -genconf asn1.cnf -noout -out asn1.der
  107. Example config file:
  108. asn1=SEQUENCE:seq_sect
  109. [seq_sect]
  110. field1=BOOL:TRUE
  111. field2=EXP:0, UTF8:some random string
  112. =head1 BUGS
  113. There should be options to change the format of output lines. The output of some
  114. ASN.1 types is not well handled (if at all).
  115. =head1 SEE ALSO
  116. L<ASN1_generate_nconf(3)|ASN1_generate_nconf(3)>
  117. =cut