diff options
author | Joel Sing <jsing@cvs.openbsd.org> | 2022-05-07 10:13:57 +0000 |
---|---|---|
committer | Joel Sing <jsing@cvs.openbsd.org> | 2022-05-07 10:13:57 +0000 |
commit | 6865c793f13f0a5c041a69c4546a1d5935ca15d7 (patch) | |
tree | e4eb03bc4814a2aec6329f2f8faa9e6fac3a7b04 /lib | |
parent | 76eb184132ca75d35c2dd7fc1e6d2726f6998502 (diff) |
Rewrite asn1_d2i_ex_primitive() with CBS.
ok tb@
Diffstat (limited to 'lib')
-rw-r--r-- | lib/libcrypto/asn1/tasn_dec.c | 158 |
1 files changed, 86 insertions, 72 deletions
diff --git a/lib/libcrypto/asn1/tasn_dec.c b/lib/libcrypto/asn1/tasn_dec.c index f04ec66bc74..3cc2146e45a 100644 --- a/lib/libcrypto/asn1/tasn_dec.c +++ b/lib/libcrypto/asn1/tasn_dec.c @@ -1,4 +1,4 @@ -/* $OpenBSD: tasn_dec.c,v 1.59 2022/05/07 10:03:49 jsing Exp $ */ +/* $OpenBSD: tasn_dec.c,v 1.60 2022/05/07 10:13:56 jsing Exp $ */ /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL * project 2000. */ @@ -645,86 +645,89 @@ asn1_template_noexp_d2i(ASN1_VALUE **val, const unsigned char **in, long len, } static int -asn1_d2i_ex_primitive(ASN1_VALUE **pval, const unsigned char **in, long inlen, - const ASN1_ITEM *it, int tag, int aclass, char opt) +asn1_d2i_ex_primitive_cbs(ASN1_VALUE **pval, CBS *cbs, const ASN1_ITEM *it, + int tag_number, int tag_class, char optional) { - int ret = 0, utype; - long plen; - char cst, inf; - const unsigned char *p; - const unsigned char *content = NULL; + CBS cbs_any, cbs_content, cbs_object, cbs_initial; + char constructed, indefinite; uint8_t *data = NULL; size_t data_len = 0; - CBS cbs; + int utype = it->utype; + unsigned char oclass; + size_t length; CBB cbb; - long len; + int tag_ret; + int ret = 0; memset(&cbb, 0, sizeof(cbb)); - if (!pval) { + CBS_dup(cbs, &cbs_initial); + CBS_init(&cbs_content, NULL, 0); + CBS_init(&cbs_object, CBS_data(cbs), CBS_len(cbs)); + + if (pval == NULL) { ASN1error(ASN1_R_ILLEGAL_NULL); - return 0; /* Should never happen */ + goto err; } if (it->itype == ASN1_ITYPE_MSTRING) { - utype = tag; - tag = -1; - } else - utype = it->utype; + utype = tag_number; + tag_number = -1; + } if (utype == V_ASN1_ANY) { - /* If type is ANY need to figure out type from tag */ - unsigned char oclass; - if (tag >= 0) { + /* Determine type from ASN.1 tag. */ + if (tag_number >= 0) { ASN1error(ASN1_R_ILLEGAL_TAGGED_ANY); - return 0; + goto err; } - if (opt) { + if (optional) { ASN1error(ASN1_R_ILLEGAL_OPTIONAL_ANY); - return 0; + goto err; } - p = *in; - ret = asn1_check_tag(NULL, &utype, &oclass, NULL, NULL, &p, - inlen, -1, 0, 0); - if (!ret) { + /* XXX - avoid reading the header twice for ANY. */ + CBS_dup(&cbs_object, &cbs_any); + tag_ret = asn1_check_tag_cbs(&cbs_any, NULL, &utype, &oclass, + NULL, NULL, -1, 0, 0); + if (tag_ret != 1) { ASN1error(ERR_R_NESTED_ASN1_ERROR); - return 0; + goto err; } if (oclass != V_ASN1_UNIVERSAL) utype = V_ASN1_OTHER; } - if (tag == -1) { - tag = utype; - aclass = V_ASN1_UNIVERSAL; + + if (tag_number == -1) { + tag_number = utype; + tag_class = V_ASN1_UNIVERSAL; } - p = *in; - /* Check header */ - ret = asn1_check_tag(&plen, NULL, NULL, &inf, &cst, &p, inlen, tag, - aclass, opt); - if (!ret) { + + tag_ret = asn1_check_tag_cbs(&cbs_object, &length, NULL, NULL, &indefinite, + &constructed, tag_number, tag_class, optional); + if (tag_ret == -1) { + ret = -1; + goto err; + } + if (tag_ret != 1) { ASN1error(ERR_R_NESTED_ASN1_ERROR); - return 0; - } else if (ret == -1) - return -1; - ret = 0; - /* SEQUENCE, SET and "OTHER" are left in encoded form */ - if ((utype == V_ASN1_SEQUENCE) || (utype == V_ASN1_SET) || - (utype == V_ASN1_OTHER)) { - if (utype != V_ASN1_OTHER && !cst) { - /* SEQUENCE and SET must be constructed */ - ASN1error(ASN1_R_TYPE_NOT_CONSTRUCTED); - return 0; - } + goto err; + } + + /* SEQUENCE and SET must be constructed. */ + if ((utype == V_ASN1_SEQUENCE || utype == V_ASN1_SET) && !constructed) { + ASN1error(ASN1_R_TYPE_NOT_CONSTRUCTED); + goto err; + } - content = *in; - if (plen < 0) + /* SEQUENCE, SET and "OTHER" are left in encoded form. */ + if (utype == V_ASN1_SEQUENCE || utype == V_ASN1_SET || + utype == V_ASN1_OTHER) { + if (!asn1_find_end(&cbs_object, length, indefinite)) goto err; - CBS_init(&cbs, p, plen); - if (!asn1_find_end(&cbs, plen, inf)) + if (!CBS_get_bytes(&cbs_initial, &cbs_content, + CBS_offset(&cbs_object))) goto err; - p = CBS_data(&cbs); - len = p - content; - } else if (cst) { + } else if (constructed) { /* * Should really check the internal tags are correct but * some things may get this wrong. The relevant specs @@ -734,34 +737,24 @@ asn1_d2i_ex_primitive(ASN1_VALUE **pval, const unsigned char **in, long inlen, */ if (!CBB_init(&cbb, 0)) goto err; - if (plen < 0) + if (!asn1_collect(&cbb, &cbs_object, indefinite, -1, + V_ASN1_UNIVERSAL, 0)) goto err; - CBS_init(&cbs, p, plen); - if (!asn1_collect(&cbb, &cbs, inf, -1, V_ASN1_UNIVERSAL, 0)) - goto err; - p = CBS_data(&cbs); if (!CBB_finish(&cbb, &data, &data_len)) goto err; - if (data_len > LONG_MAX) - goto err; - - content = data; - len = data_len; + CBS_init(&cbs_content, data, data_len); } else { - content = p; - len = plen; - p += plen; + if (!CBS_get_bytes(&cbs_object, &cbs_content, length)) + goto err; } - /* We now have content length and type: translate into a structure */ - if (len < 0) + if (!asn1_ex_c2i(pval, &cbs_content, utype, it)) goto err; - CBS_init(&cbs, content, len); - if (!asn1_ex_c2i(pval, &cbs, utype, it)) + + if (!CBS_skip(cbs, CBS_offset(&cbs_object))) goto err; - *in = p; ret = 1; err: @@ -772,6 +765,27 @@ asn1_d2i_ex_primitive(ASN1_VALUE **pval, const unsigned char **in, long inlen, } static int +asn1_d2i_ex_primitive(ASN1_VALUE **pval, const unsigned char **in, long inlen, + const ASN1_ITEM *it, int tag_number, int tag_class, char optional) +{ + CBS cbs; + int ret; + + if (inlen < 0) + return 0; + + CBS_init(&cbs, *in, inlen); + + ret = asn1_d2i_ex_primitive_cbs(pval, &cbs, it, tag_number, tag_class, + optional); + + if (ret == 1) + *in = CBS_data(&cbs); + + return ret; +} + +static int asn1_ex_c2i_primitive(ASN1_VALUE **pval, CBS *content, int utype, const ASN1_ITEM *it) { ASN1_STRING *stmp; |