1 /* tasn_dec.c */ 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 3 * project 2000. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 60 #include <stddef.h> 61 #include <string.h> 62 #include <openssl/asn1.h> 63 #include <openssl/asn1t.h> 64 #include <openssl/objects.h> 65 #include <openssl/buffer.h> 66 #include <openssl/err.h> 67 68 static int asn1_check_eoc(const unsigned char **in, long len); 69 static int asn1_find_end(const unsigned char **in, long len, char inf); 70 71 static int asn1_collect(BUF_MEM *buf, const unsigned char **in, long len, 72 char inf, int tag, int aclass, int depth); 73 74 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen); 75 76 static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass, 77 char *inf, char *cst, 78 const unsigned char **in, long len, 79 int exptag, int expclass, char opt, 80 ASN1_TLC *ctx); 81 82 static int asn1_template_ex_d2i(ASN1_VALUE **pval, 83 const unsigned char **in, long len, 84 const ASN1_TEMPLATE *tt, char opt, 85 ASN1_TLC *ctx); 86 static int asn1_template_noexp_d2i(ASN1_VALUE **val, 87 const unsigned char **in, long len, 88 const ASN1_TEMPLATE *tt, char opt, 89 ASN1_TLC *ctx); 90 static int asn1_d2i_ex_primitive(ASN1_VALUE **pval, 91 const unsigned char **in, long len, 92 const ASN1_ITEM *it, 93 int tag, int aclass, char opt, ASN1_TLC *ctx); 94 95 /* Table to convert tags to bit values, used for MSTRING type */ 96 static const unsigned long tag2bit[32] = { 97 0, 0, 0, B_ASN1_BIT_STRING, /* tags 0 - 3 */ 98 B_ASN1_OCTET_STRING, 0, 0, B_ASN1_UNKNOWN,/* tags 4- 7 */ 99 B_ASN1_UNKNOWN, B_ASN1_UNKNOWN, B_ASN1_UNKNOWN, B_ASN1_UNKNOWN,/* tags 8-11 */ 100 B_ASN1_UTF8STRING,B_ASN1_UNKNOWN,B_ASN1_UNKNOWN,B_ASN1_UNKNOWN,/* tags 12-15 */ 101 B_ASN1_SEQUENCE,0,B_ASN1_NUMERICSTRING,B_ASN1_PRINTABLESTRING, /* tags 16-19 */ 102 B_ASN1_T61STRING,B_ASN1_VIDEOTEXSTRING,B_ASN1_IA5STRING, /* tags 20-22 */ 103 B_ASN1_UTCTIME, B_ASN1_GENERALIZEDTIME, /* tags 23-24 */ 104 B_ASN1_GRAPHICSTRING,B_ASN1_ISO64STRING,B_ASN1_GENERALSTRING, /* tags 25-27 */ 105 B_ASN1_UNIVERSALSTRING,B_ASN1_UNKNOWN,B_ASN1_BMPSTRING,B_ASN1_UNKNOWN, /* tags 28-31 */ 106 }; 107 108 unsigned long ASN1_tag2bit(int tag) 109 { 110 if ((tag < 0) || (tag > 30)) return 0; 111 return tag2bit[tag]; 112 } 113 114 /* Macro to initialize and invalidate the cache */ 115 116 #define asn1_tlc_clear(c) if (c) (c)->valid = 0 117 /* Version to avoid compiler warning about 'c' always non-NULL */ 118 #define asn1_tlc_clear_nc(c) (c)->valid = 0 119 120 /* Decode an ASN1 item, this currently behaves just 121 * like a standard 'd2i' function. 'in' points to 122 * a buffer to read the data from, in future we will 123 * have more advanced versions that can input data 124 * a piece at a time and this will simply be a special 125 * case. 126 */ 127 128 ASN1_VALUE *ASN1_item_d2i(ASN1_VALUE **pval, 129 const unsigned char **in, long len, const ASN1_ITEM *it) 130 { 131 ASN1_TLC c; 132 ASN1_VALUE *ptmpval = NULL; 133 if (!pval) 134 pval = &ptmpval; 135 asn1_tlc_clear_nc(&c); 136 if (ASN1_item_ex_d2i(pval, in, len, it, -1, 0, 0, &c) > 0) 137 return *pval; 138 return NULL; 139 } 140 141 int ASN1_template_d2i(ASN1_VALUE **pval, 142 const unsigned char **in, long len, const ASN1_TEMPLATE *tt) 143 { 144 ASN1_TLC c; 145 asn1_tlc_clear_nc(&c); 146 return asn1_template_ex_d2i(pval, in, len, tt, 0, &c); 147 } 148 149 150 /* Decode an item, taking care of IMPLICIT tagging, if any. 151 * If 'opt' set and tag mismatch return -1 to handle OPTIONAL 152 */ 153 154 int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len, 155 const ASN1_ITEM *it, 156 int tag, int aclass, char opt, ASN1_TLC *ctx) 157 { 158 const ASN1_TEMPLATE *tt, *errtt = NULL; 159 const ASN1_COMPAT_FUNCS *cf; 160 const ASN1_EXTERN_FUNCS *ef; 161 const ASN1_AUX *aux = it->funcs; 162 ASN1_aux_cb *asn1_cb; 163 const unsigned char *p = NULL, *q; 164 unsigned char *wp=NULL; /* BIG FAT WARNING! BREAKS CONST WHERE USED */ 165 unsigned char imphack = 0, oclass; 166 char seq_eoc, seq_nolen, cst, isopt; 167 long tmplen; 168 int i; 169 int otag; 170 int ret = 0; 171 ASN1_VALUE **pchptr, *ptmpval; 172 if (!pval) 173 return 0; 174 if (aux && aux->asn1_cb) 175 asn1_cb = aux->asn1_cb; 176 else asn1_cb = 0; 177 178 switch(it->itype) 179 { 180 case ASN1_ITYPE_PRIMITIVE: 181 if (it->templates) 182 { 183 /* tagging or OPTIONAL is currently illegal on an item 184 * template because the flags can't get passed down. 185 * In practice this isn't a problem: we include the 186 * relevant flags from the item template in the 187 * template itself. 188 */ 189 if ((tag != -1) || opt) 190 { 191 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 192 ASN1_R_ILLEGAL_OPTIONS_ON_ITEM_TEMPLATE); 193 goto err; 194 } 195 return asn1_template_ex_d2i(pval, in, len, 196 it->templates, opt, ctx); 197 } 198 return asn1_d2i_ex_primitive(pval, in, len, it, 199 tag, aclass, opt, ctx); 200 break; 201 202 case ASN1_ITYPE_MSTRING: 203 p = *in; 204 /* Just read in tag and class */ 205 ret = asn1_check_tlen(NULL, &otag, &oclass, NULL, NULL, 206 &p, len, -1, 0, 1, ctx); 207 if (!ret) 208 { 209 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 210 ERR_R_NESTED_ASN1_ERROR); 211 goto err; 212 } 213 214 /* Must be UNIVERSAL class */ 215 if (oclass != V_ASN1_UNIVERSAL) 216 { 217 /* If OPTIONAL, assume this is OK */ 218 if (opt) return -1; 219 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 220 ASN1_R_MSTRING_NOT_UNIVERSAL); 221 goto err; 222 } 223 /* Check tag matches bit map */ 224 if (!(ASN1_tag2bit(otag) & it->utype)) 225 { 226 /* If OPTIONAL, assume this is OK */ 227 if (opt) 228 return -1; 229 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 230 ASN1_R_MSTRING_WRONG_TAG); 231 goto err; 232 } 233 return asn1_d2i_ex_primitive(pval, in, len, 234 it, otag, 0, 0, ctx); 235 236 case ASN1_ITYPE_EXTERN: 237 /* Use new style d2i */ 238 ef = it->funcs; 239 return ef->asn1_ex_d2i(pval, in, len, 240 it, tag, aclass, opt, ctx); 241 242 case ASN1_ITYPE_COMPAT: 243 /* we must resort to old style evil hackery */ 244 cf = it->funcs; 245 246 /* If OPTIONAL see if it is there */ 247 if (opt) 248 { 249 int exptag; 250 p = *in; 251 if (tag == -1) 252 exptag = it->utype; 253 else exptag = tag; 254 /* Don't care about anything other than presence 255 * of expected tag */ 256 257 ret = asn1_check_tlen(NULL, NULL, NULL, NULL, NULL, 258 &p, len, exptag, aclass, 1, ctx); 259 if (!ret) 260 { 261 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 262 ERR_R_NESTED_ASN1_ERROR); 263 goto err; 264 } 265 if (ret == -1) 266 return -1; 267 } 268 269 /* This is the old style evil hack IMPLICIT handling: 270 * since the underlying code is expecting a tag and 271 * class other than the one present we change the 272 * buffer temporarily then change it back afterwards. 273 * This doesn't and never did work for tags > 30. 274 * 275 * Yes this is *horrible* but it is only needed for 276 * old style d2i which will hopefully not be around 277 * for much longer. 278 * FIXME: should copy the buffer then modify it so 279 * the input buffer can be const: we should *always* 280 * copy because the old style d2i might modify the 281 * buffer. 282 */ 283 284 if (tag != -1) 285 { 286 wp = *(unsigned char **)in; 287 imphack = *wp; 288 if (p == NULL) 289 { 290 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 291 ERR_R_NESTED_ASN1_ERROR); 292 goto err; 293 } 294 *wp = (unsigned char)((*p & V_ASN1_CONSTRUCTED) 295 | it->utype); 296 } 297 298 ptmpval = cf->asn1_d2i(pval, in, len); 299 300 if (tag != -1) 301 *wp = imphack; 302 303 if (ptmpval) 304 return 1; 305 306 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ERR_R_NESTED_ASN1_ERROR); 307 goto err; 308 309 310 case ASN1_ITYPE_CHOICE: 311 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_PRE, pval, it, NULL)) 312 goto auxerr; 313 314 /* Allocate structure */ 315 if (!*pval && !ASN1_item_ex_new(pval, it)) 316 { 317 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 318 ERR_R_NESTED_ASN1_ERROR); 319 goto err; 320 } 321 /* CHOICE type, try each possibility in turn */ 322 p = *in; 323 for (i = 0, tt=it->templates; i < it->tcount; i++, tt++) 324 { 325 pchptr = asn1_get_field_ptr(pval, tt); 326 /* We mark field as OPTIONAL so its absence 327 * can be recognised. 328 */ 329 ret = asn1_template_ex_d2i(pchptr, &p, len, tt, 1, ctx); 330 /* If field not present, try the next one */ 331 if (ret == -1) 332 continue; 333 /* If positive return, read OK, break loop */ 334 if (ret > 0) 335 break; 336 /* Otherwise must be an ASN1 parsing error */ 337 errtt = tt; 338 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 339 ERR_R_NESTED_ASN1_ERROR); 340 goto err; 341 } 342 343 /* Did we fall off the end without reading anything? */ 344 if (i == it->tcount) 345 { 346 /* If OPTIONAL, this is OK */ 347 if (opt) 348 { 349 /* Free and zero it */ 350 ASN1_item_ex_free(pval, it); 351 return -1; 352 } 353 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 354 ASN1_R_NO_MATCHING_CHOICE_TYPE); 355 goto err; 356 } 357 358 asn1_set_choice_selector(pval, i, it); 359 *in = p; 360 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_POST, pval, it, NULL)) 361 goto auxerr; 362 return 1; 363 364 case ASN1_ITYPE_NDEF_SEQUENCE: 365 case ASN1_ITYPE_SEQUENCE: 366 p = *in; 367 tmplen = len; 368 369 /* If no IMPLICIT tagging set to SEQUENCE, UNIVERSAL */ 370 if (tag == -1) 371 { 372 tag = V_ASN1_SEQUENCE; 373 aclass = V_ASN1_UNIVERSAL; 374 } 375 /* Get SEQUENCE length and update len, p */ 376 ret = asn1_check_tlen(&len, NULL, NULL, &seq_eoc, &cst, 377 &p, len, tag, aclass, opt, ctx); 378 if (!ret) 379 { 380 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 381 ERR_R_NESTED_ASN1_ERROR); 382 goto err; 383 } 384 else if (ret == -1) 385 return -1; 386 if (aux && (aux->flags & ASN1_AFLG_BROKEN)) 387 { 388 len = tmplen - (p - *in); 389 seq_nolen = 1; 390 } 391 /* If indefinite we don't do a length check */ 392 else seq_nolen = seq_eoc; 393 if (!cst) 394 { 395 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 396 ASN1_R_SEQUENCE_NOT_CONSTRUCTED); 397 goto err; 398 } 399 400 if (!*pval && !ASN1_item_ex_new(pval, it)) 401 { 402 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 403 ERR_R_NESTED_ASN1_ERROR); 404 goto err; 405 } 406 407 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_PRE, pval, it, NULL)) 408 goto auxerr; 409 410 /* Get each field entry */ 411 for (i = 0, tt = it->templates; i < it->tcount; i++, tt++) 412 { 413 const ASN1_TEMPLATE *seqtt; 414 ASN1_VALUE **pseqval; 415 seqtt = asn1_do_adb(pval, tt, 1); 416 if (!seqtt) 417 goto err; 418 pseqval = asn1_get_field_ptr(pval, seqtt); 419 /* Have we ran out of data? */ 420 if (!len) 421 break; 422 q = p; 423 if (asn1_check_eoc(&p, len)) 424 { 425 if (!seq_eoc) 426 { 427 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 428 ASN1_R_UNEXPECTED_EOC); 429 goto err; 430 } 431 len -= p - q; 432 seq_eoc = 0; 433 q = p; 434 break; 435 } 436 /* This determines the OPTIONAL flag value. The field 437 * cannot be omitted if it is the last of a SEQUENCE 438 * and there is still data to be read. This isn't 439 * strictly necessary but it increases efficiency in 440 * some cases. 441 */ 442 if (i == (it->tcount - 1)) 443 isopt = 0; 444 else isopt = (char)(seqtt->flags & ASN1_TFLG_OPTIONAL); 445 /* attempt to read in field, allowing each to be 446 * OPTIONAL */ 447 448 ret = asn1_template_ex_d2i(pseqval, &p, len, 449 seqtt, isopt, ctx); 450 if (!ret) 451 { 452 errtt = seqtt; 453 goto err; 454 } 455 else if (ret == -1) 456 { 457 /* OPTIONAL component absent. 458 * Free and zero the field. 459 */ 460 ASN1_template_free(pseqval, seqtt); 461 continue; 462 } 463 /* Update length */ 464 len -= p - q; 465 } 466 467 /* Check for EOC if expecting one */ 468 if (seq_eoc && !asn1_check_eoc(&p, len)) 469 { 470 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_MISSING_EOC); 471 goto err; 472 } 473 /* Check all data read */ 474 if (!seq_nolen && len) 475 { 476 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 477 ASN1_R_SEQUENCE_LENGTH_MISMATCH); 478 goto err; 479 } 480 481 /* If we get here we've got no more data in the SEQUENCE, 482 * however we may not have read all fields so check all 483 * remaining are OPTIONAL and clear any that are. 484 */ 485 for (; i < it->tcount; tt++, i++) 486 { 487 const ASN1_TEMPLATE *seqtt; 488 seqtt = asn1_do_adb(pval, tt, 1); 489 if (!seqtt) 490 goto err; 491 if (seqtt->flags & ASN1_TFLG_OPTIONAL) 492 { 493 ASN1_VALUE **pseqval; 494 pseqval = asn1_get_field_ptr(pval, seqtt); 495 ASN1_template_free(pseqval, seqtt); 496 } 497 else 498 { 499 errtt = seqtt; 500 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, 501 ASN1_R_FIELD_MISSING); 502 goto err; 503 } 504 } 505 /* Save encoding */ 506 if (!asn1_enc_save(pval, *in, p - *in, it)) 507 goto auxerr; 508 *in = p; 509 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_POST, pval, it, NULL)) 510 goto auxerr; 511 return 1; 512 513 default: 514 return 0; 515 } 516 auxerr: 517 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_AUX_ERROR); 518 err: 519 ASN1_item_ex_free(pval, it); 520 if (errtt) 521 ERR_add_error_data(4, "Field=", errtt->field_name, 522 ", Type=", it->sname); 523 else 524 ERR_add_error_data(2, "Type=", it->sname); 525 return 0; 526 } 527 528 /* Templates are handled with two separate functions. 529 * One handles any EXPLICIT tag and the other handles the rest. 530 */ 531 532 static int asn1_template_ex_d2i(ASN1_VALUE **val, 533 const unsigned char **in, long inlen, 534 const ASN1_TEMPLATE *tt, char opt, 535 ASN1_TLC *ctx) 536 { 537 int flags, aclass; 538 int ret; 539 long len; 540 const unsigned char *p, *q; 541 char exp_eoc; 542 if (!val) 543 return 0; 544 flags = tt->flags; 545 aclass = flags & ASN1_TFLG_TAG_CLASS; 546 547 p = *in; 548 549 /* Check if EXPLICIT tag expected */ 550 if (flags & ASN1_TFLG_EXPTAG) 551 { 552 char cst; 553 /* Need to work out amount of data available to the inner 554 * content and where it starts: so read in EXPLICIT header to 555 * get the info. 556 */ 557 ret = asn1_check_tlen(&len, NULL, NULL, &exp_eoc, &cst, 558 &p, inlen, tt->tag, aclass, opt, ctx); 559 q = p; 560 if (!ret) 561 { 562 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I, 563 ERR_R_NESTED_ASN1_ERROR); 564 return 0; 565 } 566 else if (ret == -1) 567 return -1; 568 if (!cst) 569 { 570 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I, 571 ASN1_R_EXPLICIT_TAG_NOT_CONSTRUCTED); 572 return 0; 573 } 574 /* We've found the field so it can't be OPTIONAL now */ 575 ret = asn1_template_noexp_d2i(val, &p, len, tt, 0, ctx); 576 if (!ret) 577 { 578 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I, 579 ERR_R_NESTED_ASN1_ERROR); 580 return 0; 581 } 582 /* We read the field in OK so update length */ 583 len -= p - q; 584 if (exp_eoc) 585 { 586 /* If NDEF we must have an EOC here */ 587 if (!asn1_check_eoc(&p, len)) 588 { 589 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I, 590 ASN1_R_MISSING_EOC); 591 goto err; 592 } 593 } 594 else 595 { 596 /* Otherwise we must hit the EXPLICIT tag end or its 597 * an error */ 598 if (len) 599 { 600 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I, 601 ASN1_R_EXPLICIT_LENGTH_MISMATCH); 602 goto err; 603 } 604 } 605 } 606 else 607 return asn1_template_noexp_d2i(val, in, inlen, 608 tt, opt, ctx); 609 610 *in = p; 611 return 1; 612 613 err: 614 ASN1_template_free(val, tt); 615 return 0; 616 } 617 618 static int asn1_template_noexp_d2i(ASN1_VALUE **val, 619 const unsigned char **in, long len, 620 const ASN1_TEMPLATE *tt, char opt, 621 ASN1_TLC *ctx) 622 { 623 int flags, aclass; 624 int ret; 625 const unsigned char *p, *q; 626 if (!val) 627 return 0; 628 flags = tt->flags; 629 aclass = flags & ASN1_TFLG_TAG_CLASS; 630 631 p = *in; 632 q = p; 633 634 if (flags & ASN1_TFLG_SK_MASK) 635 { 636 /* SET OF, SEQUENCE OF */ 637 int sktag, skaclass; 638 char sk_eoc; 639 /* First work out expected inner tag value */ 640 if (flags & ASN1_TFLG_IMPTAG) 641 { 642 sktag = tt->tag; 643 skaclass = aclass; 644 } 645 else 646 { 647 skaclass = V_ASN1_UNIVERSAL; 648 if (flags & ASN1_TFLG_SET_OF) 649 sktag = V_ASN1_SET; 650 else 651 sktag = V_ASN1_SEQUENCE; 652 } 653 /* Get the tag */ 654 ret = asn1_check_tlen(&len, NULL, NULL, &sk_eoc, NULL, 655 &p, len, sktag, skaclass, opt, ctx); 656 if (!ret) 657 { 658 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 659 ERR_R_NESTED_ASN1_ERROR); 660 return 0; 661 } 662 else if (ret == -1) 663 return -1; 664 if (!*val) 665 *val = (ASN1_VALUE *)sk_new_null(); 666 else 667 { 668 /* We've got a valid STACK: free up any items present */ 669 STACK_OF(ASN1_VALUE) *sktmp 670 = (STACK_OF(ASN1_VALUE) *)*val; 671 ASN1_VALUE *vtmp; 672 while(sk_ASN1_VALUE_num(sktmp) > 0) 673 { 674 vtmp = sk_ASN1_VALUE_pop(sktmp); 675 ASN1_item_ex_free(&vtmp, 676 ASN1_ITEM_ptr(tt->item)); 677 } 678 } 679 680 if (!*val) 681 { 682 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 683 ERR_R_MALLOC_FAILURE); 684 goto err; 685 } 686 687 /* Read as many items as we can */ 688 while(len > 0) 689 { 690 ASN1_VALUE *skfield; 691 q = p; 692 /* See if EOC found */ 693 if (asn1_check_eoc(&p, len)) 694 { 695 if (!sk_eoc) 696 { 697 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 698 ASN1_R_UNEXPECTED_EOC); 699 goto err; 700 } 701 len -= p - q; 702 sk_eoc = 0; 703 break; 704 } 705 skfield = NULL; 706 if (!ASN1_item_ex_d2i(&skfield, &p, len, 707 ASN1_ITEM_ptr(tt->item), 708 -1, 0, 0, ctx)) 709 { 710 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 711 ERR_R_NESTED_ASN1_ERROR); 712 goto err; 713 } 714 len -= p - q; 715 if (!sk_ASN1_VALUE_push((STACK_OF(ASN1_VALUE) *)*val, 716 skfield)) 717 { 718 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 719 ERR_R_MALLOC_FAILURE); 720 goto err; 721 } 722 } 723 if (sk_eoc) 724 { 725 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, ASN1_R_MISSING_EOC); 726 goto err; 727 } 728 } 729 else if (flags & ASN1_TFLG_IMPTAG) 730 { 731 /* IMPLICIT tagging */ 732 ret = ASN1_item_ex_d2i(val, &p, len, 733 ASN1_ITEM_ptr(tt->item), tt->tag, aclass, opt, ctx); 734 if (!ret) 735 { 736 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 737 ERR_R_NESTED_ASN1_ERROR); 738 goto err; 739 } 740 else if (ret == -1) 741 return -1; 742 } 743 else 744 { 745 /* Nothing special */ 746 ret = ASN1_item_ex_d2i(val, &p, len, ASN1_ITEM_ptr(tt->item), 747 -1, 0, opt, ctx); 748 if (!ret) 749 { 750 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, 751 ERR_R_NESTED_ASN1_ERROR); 752 goto err; 753 } 754 else if (ret == -1) 755 return -1; 756 } 757 758 *in = p; 759 return 1; 760 761 err: 762 ASN1_template_free(val, tt); 763 return 0; 764 } 765 766 static int asn1_d2i_ex_primitive(ASN1_VALUE **pval, 767 const unsigned char **in, long inlen, 768 const ASN1_ITEM *it, 769 int tag, int aclass, char opt, ASN1_TLC *ctx) 770 { 771 int ret = 0, utype; 772 long plen; 773 char cst, inf, free_cont = 0; 774 const unsigned char *p; 775 BUF_MEM buf; 776 const unsigned char *cont = NULL; 777 long len; 778 if (!pval) 779 { 780 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, ASN1_R_ILLEGAL_NULL); 781 return 0; /* Should never happen */ 782 } 783 784 if (it->itype == ASN1_ITYPE_MSTRING) 785 { 786 utype = tag; 787 tag = -1; 788 } 789 else 790 utype = it->utype; 791 792 if (utype == V_ASN1_ANY) 793 { 794 /* If type is ANY need to figure out type from tag */ 795 unsigned char oclass; 796 if (tag >= 0) 797 { 798 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, 799 ASN1_R_ILLEGAL_TAGGED_ANY); 800 return 0; 801 } 802 if (opt) 803 { 804 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, 805 ASN1_R_ILLEGAL_OPTIONAL_ANY); 806 return 0; 807 } 808 p = *in; 809 ret = asn1_check_tlen(NULL, &utype, &oclass, NULL, NULL, 810 &p, inlen, -1, 0, 0, ctx); 811 if (!ret) 812 { 813 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, 814 ERR_R_NESTED_ASN1_ERROR); 815 return 0; 816 } 817 if (oclass != V_ASN1_UNIVERSAL) 818 utype = V_ASN1_OTHER; 819 } 820 if (tag == -1) 821 { 822 tag = utype; 823 aclass = V_ASN1_UNIVERSAL; 824 } 825 p = *in; 826 /* Check header */ 827 ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst, 828 &p, inlen, tag, aclass, opt, ctx); 829 if (!ret) 830 { 831 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, ERR_R_NESTED_ASN1_ERROR); 832 return 0; 833 } 834 else if (ret == -1) 835 return -1; 836 ret = 0; 837 /* SEQUENCE, SET and "OTHER" are left in encoded form */ 838 if ((utype == V_ASN1_SEQUENCE) 839 || (utype == V_ASN1_SET) || (utype == V_ASN1_OTHER)) 840 { 841 /* Clear context cache for type OTHER because the auto clear 842 * when we have a exact match wont work 843 */ 844 if (utype == V_ASN1_OTHER) 845 { 846 asn1_tlc_clear(ctx); 847 } 848 /* SEQUENCE and SET must be constructed */ 849 else if (!cst) 850 { 851 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, 852 ASN1_R_TYPE_NOT_CONSTRUCTED); 853 return 0; 854 } 855 856 cont = *in; 857 /* If indefinite length constructed find the real end */ 858 if (inf) 859 { 860 if (!asn1_find_end(&p, plen, inf)) 861 goto err; 862 len = p - cont; 863 } 864 else 865 { 866 len = p - cont + plen; 867 p += plen; 868 buf.data = NULL; 869 } 870 } 871 else if (cst) 872 { 873 buf.length = 0; 874 buf.max = 0; 875 buf.data = NULL; 876 /* Should really check the internal tags are correct but 877 * some things may get this wrong. The relevant specs 878 * say that constructed string types should be OCTET STRINGs 879 * internally irrespective of the type. So instead just check 880 * for UNIVERSAL class and ignore the tag. 881 */ 882 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0)) 883 { 884 free_cont = 1; 885 goto err; 886 } 887 len = buf.length; 888 /* Append a final null to string */ 889 if (!BUF_MEM_grow_clean(&buf, len + 1)) 890 { 891 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, 892 ERR_R_MALLOC_FAILURE); 893 return 0; 894 } 895 buf.data[len] = 0; 896 cont = (const unsigned char *)buf.data; 897 free_cont = 1; 898 } 899 else 900 { 901 cont = p; 902 len = plen; 903 p += plen; 904 } 905 906 /* We now have content length and type: translate into a structure */ 907 if (!asn1_ex_c2i(pval, cont, len, utype, &free_cont, it)) 908 goto err; 909 910 *in = p; 911 ret = 1; 912 err: 913 if (free_cont && buf.data) OPENSSL_free(buf.data); 914 return ret; 915 } 916 917 /* Translate ASN1 content octets into a structure */ 918 919 int asn1_ex_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len, 920 int utype, char *free_cont, const ASN1_ITEM *it) 921 { 922 ASN1_VALUE **opval = NULL; 923 ASN1_STRING *stmp; 924 ASN1_TYPE *typ = NULL; 925 int ret = 0; 926 const ASN1_PRIMITIVE_FUNCS *pf; 927 ASN1_INTEGER **tint; 928 pf = it->funcs; 929 930 if (pf && pf->prim_c2i) 931 return pf->prim_c2i(pval, cont, len, utype, free_cont, it); 932 /* If ANY type clear type and set pointer to internal value */ 933 if (it->utype == V_ASN1_ANY) 934 { 935 if (!*pval) 936 { 937 typ = ASN1_TYPE_new(); 938 if (typ == NULL) 939 goto err; 940 *pval = (ASN1_VALUE *)typ; 941 } 942 else 943 typ = (ASN1_TYPE *)*pval; 944 945 if (utype != typ->type) 946 ASN1_TYPE_set(typ, utype, NULL); 947 opval = pval; 948 pval = &typ->value.asn1_value; 949 } 950 switch(utype) 951 { 952 case V_ASN1_OBJECT: 953 if (!c2i_ASN1_OBJECT((ASN1_OBJECT **)pval, &cont, len)) 954 goto err; 955 break; 956 957 case V_ASN1_NULL: 958 if (len) 959 { 960 ASN1err(ASN1_F_ASN1_EX_C2I, 961 ASN1_R_NULL_IS_WRONG_LENGTH); 962 goto err; 963 } 964 *pval = (ASN1_VALUE *)1; 965 break; 966 967 case V_ASN1_BOOLEAN: 968 if (len != 1) 969 { 970 ASN1err(ASN1_F_ASN1_EX_C2I, 971 ASN1_R_BOOLEAN_IS_WRONG_LENGTH); 972 goto err; 973 } 974 else 975 { 976 ASN1_BOOLEAN *tbool; 977 tbool = (ASN1_BOOLEAN *)pval; 978 *tbool = *cont; 979 } 980 break; 981 982 case V_ASN1_BIT_STRING: 983 if (!c2i_ASN1_BIT_STRING((ASN1_BIT_STRING **)pval, &cont, len)) 984 goto err; 985 break; 986 987 case V_ASN1_INTEGER: 988 case V_ASN1_NEG_INTEGER: 989 case V_ASN1_ENUMERATED: 990 case V_ASN1_NEG_ENUMERATED: 991 tint = (ASN1_INTEGER **)pval; 992 if (!c2i_ASN1_INTEGER(tint, &cont, len)) 993 goto err; 994 /* Fixup type to match the expected form */ 995 (*tint)->type = utype | ((*tint)->type & V_ASN1_NEG); 996 break; 997 998 case V_ASN1_OCTET_STRING: 999 case V_ASN1_NUMERICSTRING: 1000 case V_ASN1_PRINTABLESTRING: 1001 case V_ASN1_T61STRING: 1002 case V_ASN1_VIDEOTEXSTRING: 1003 case V_ASN1_IA5STRING: 1004 case V_ASN1_UTCTIME: 1005 case V_ASN1_GENERALIZEDTIME: 1006 case V_ASN1_GRAPHICSTRING: 1007 case V_ASN1_VISIBLESTRING: 1008 case V_ASN1_GENERALSTRING: 1009 case V_ASN1_UNIVERSALSTRING: 1010 case V_ASN1_BMPSTRING: 1011 case V_ASN1_UTF8STRING: 1012 case V_ASN1_OTHER: 1013 case V_ASN1_SET: 1014 case V_ASN1_SEQUENCE: 1015 default: 1016 if (utype == V_ASN1_BMPSTRING && (len & 1)) 1017 { 1018 ASN1err(ASN1_F_ASN1_EX_C2I, 1019 ASN1_R_BMPSTRING_IS_WRONG_LENGTH); 1020 goto err; 1021 } 1022 if (utype == V_ASN1_UNIVERSALSTRING && (len & 3)) 1023 { 1024 ASN1err(ASN1_F_ASN1_EX_C2I, 1025 ASN1_R_UNIVERSALSTRING_IS_WRONG_LENGTH); 1026 goto err; 1027 } 1028 /* All based on ASN1_STRING and handled the same */ 1029 if (!*pval) 1030 { 1031 stmp = ASN1_STRING_type_new(utype); 1032 if (!stmp) 1033 { 1034 ASN1err(ASN1_F_ASN1_EX_C2I, 1035 ERR_R_MALLOC_FAILURE); 1036 goto err; 1037 } 1038 *pval = (ASN1_VALUE *)stmp; 1039 } 1040 else 1041 { 1042 stmp = (ASN1_STRING *)*pval; 1043 stmp->type = utype; 1044 } 1045 /* If we've already allocated a buffer use it */ 1046 if (*free_cont) 1047 { 1048 if (stmp->data) 1049 OPENSSL_free(stmp->data); 1050 stmp->data = (unsigned char *)cont; /* UGLY CAST! RL */ 1051 stmp->length = len; 1052 *free_cont = 0; 1053 } 1054 else 1055 { 1056 if (!ASN1_STRING_set(stmp, cont, len)) 1057 { 1058 ASN1err(ASN1_F_ASN1_EX_C2I, 1059 ERR_R_MALLOC_FAILURE); 1060 ASN1_STRING_free(stmp); 1061 *pval = NULL; 1062 goto err; 1063 } 1064 } 1065 break; 1066 } 1067 /* If ASN1_ANY and NULL type fix up value */ 1068 if (typ && (utype == V_ASN1_NULL)) 1069 typ->value.ptr = NULL; 1070 1071 ret = 1; 1072 err: 1073 if (!ret) 1074 { 1075 ASN1_TYPE_free(typ); 1076 if (opval) 1077 *opval = NULL; 1078 } 1079 return ret; 1080 } 1081 1082 1083 /* This function finds the end of an ASN1 structure when passed its maximum 1084 * length, whether it is indefinite length and a pointer to the content. 1085 * This is more efficient than calling asn1_collect because it does not 1086 * recurse on each indefinite length header. 1087 */ 1088 1089 static int asn1_find_end(const unsigned char **in, long len, char inf) 1090 { 1091 int expected_eoc; 1092 long plen; 1093 const unsigned char *p = *in, *q; 1094 /* If not indefinite length constructed just add length */ 1095 if (inf == 0) 1096 { 1097 *in += len; 1098 return 1; 1099 } 1100 expected_eoc = 1; 1101 /* Indefinite length constructed form. Find the end when enough EOCs 1102 * are found. If more indefinite length constructed headers 1103 * are encountered increment the expected eoc count otherwise just 1104 * skip to the end of the data. 1105 */ 1106 while (len > 0) 1107 { 1108 if(asn1_check_eoc(&p, len)) 1109 { 1110 expected_eoc--; 1111 if (expected_eoc == 0) 1112 break; 1113 len -= 2; 1114 continue; 1115 } 1116 q = p; 1117 /* Just read in a header: only care about the length */ 1118 if(!asn1_check_tlen(&plen, NULL, NULL, &inf, NULL, &p, len, 1119 -1, 0, 0, NULL)) 1120 { 1121 ASN1err(ASN1_F_ASN1_FIND_END, ERR_R_NESTED_ASN1_ERROR); 1122 return 0; 1123 } 1124 if (inf) 1125 expected_eoc++; 1126 else 1127 p += plen; 1128 len -= p - q; 1129 } 1130 if (expected_eoc) 1131 { 1132 ASN1err(ASN1_F_ASN1_FIND_END, ASN1_R_MISSING_EOC); 1133 return 0; 1134 } 1135 *in = p; 1136 return 1; 1137 } 1138 /* This function collects the asn1 data from a constructred string 1139 * type into a buffer. The values of 'in' and 'len' should refer 1140 * to the contents of the constructed type and 'inf' should be set 1141 * if it is indefinite length. 1142 */ 1143 1144 #ifndef ASN1_MAX_STRING_NEST 1145 /* This determines how many levels of recursion are permitted in ASN1 1146 * string types. If it is not limited stack overflows can occur. If set 1147 * to zero no recursion is allowed at all. Although zero should be adequate 1148 * examples exist that require a value of 1. So 5 should be more than enough. 1149 */ 1150 #define ASN1_MAX_STRING_NEST 5 1151 #endif 1152 1153 1154 static int asn1_collect(BUF_MEM *buf, const unsigned char **in, long len, 1155 char inf, int tag, int aclass, int depth) 1156 { 1157 const unsigned char *p, *q; 1158 long plen; 1159 char cst, ininf; 1160 p = *in; 1161 inf &= 1; 1162 /* If no buffer and not indefinite length constructed just pass over 1163 * the encoded data */ 1164 if (!buf && !inf) 1165 { 1166 *in += len; 1167 return 1; 1168 } 1169 while(len > 0) 1170 { 1171 q = p; 1172 /* Check for EOC */ 1173 if (asn1_check_eoc(&p, len)) 1174 { 1175 /* EOC is illegal outside indefinite length 1176 * constructed form */ 1177 if (!inf) 1178 { 1179 ASN1err(ASN1_F_ASN1_COLLECT, 1180 ASN1_R_UNEXPECTED_EOC); 1181 return 0; 1182 } 1183 inf = 0; 1184 break; 1185 } 1186 1187 if (!asn1_check_tlen(&plen, NULL, NULL, &ininf, &cst, &p, 1188 len, tag, aclass, 0, NULL)) 1189 { 1190 ASN1err(ASN1_F_ASN1_COLLECT, ERR_R_NESTED_ASN1_ERROR); 1191 return 0; 1192 } 1193 1194 /* If indefinite length constructed update max length */ 1195 if (cst) 1196 { 1197 if (depth >= ASN1_MAX_STRING_NEST) 1198 { 1199 ASN1err(ASN1_F_ASN1_COLLECT, 1200 ASN1_R_NESTED_ASN1_STRING); 1201 return 0; 1202 } 1203 if (!asn1_collect(buf, &p, plen, ininf, tag, aclass, 1204 depth + 1)) 1205 return 0; 1206 } 1207 else if (plen && !collect_data(buf, &p, plen)) 1208 return 0; 1209 len -= p - q; 1210 } 1211 if (inf) 1212 { 1213 ASN1err(ASN1_F_ASN1_COLLECT, ASN1_R_MISSING_EOC); 1214 return 0; 1215 } 1216 *in = p; 1217 return 1; 1218 } 1219 1220 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen) 1221 { 1222 int len; 1223 if (buf) 1224 { 1225 len = buf->length; 1226 if (!BUF_MEM_grow_clean(buf, len + plen)) 1227 { 1228 ASN1err(ASN1_F_COLLECT_DATA, ERR_R_MALLOC_FAILURE); 1229 return 0; 1230 } 1231 memcpy(buf->data + len, *p, plen); 1232 } 1233 *p += plen; 1234 return 1; 1235 } 1236 1237 /* Check for ASN1 EOC and swallow it if found */ 1238 1239 static int asn1_check_eoc(const unsigned char **in, long len) 1240 { 1241 const unsigned char *p; 1242 if (len < 2) return 0; 1243 p = *in; 1244 if (!p[0] && !p[1]) 1245 { 1246 *in += 2; 1247 return 1; 1248 } 1249 return 0; 1250 } 1251 1252 /* Check an ASN1 tag and length: a bit like ASN1_get_object 1253 * but it sets the length for indefinite length constructed 1254 * form, we don't know the exact length but we can set an 1255 * upper bound to the amount of data available minus the 1256 * header length just read. 1257 */ 1258 1259 static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass, 1260 char *inf, char *cst, 1261 const unsigned char **in, long len, 1262 int exptag, int expclass, char opt, 1263 ASN1_TLC *ctx) 1264 { 1265 int i; 1266 int ptag, pclass; 1267 long plen; 1268 const unsigned char *p, *q; 1269 p = *in; 1270 q = p; 1271 1272 if (ctx && ctx->valid) 1273 { 1274 i = ctx->ret; 1275 plen = ctx->plen; 1276 pclass = ctx->pclass; 1277 ptag = ctx->ptag; 1278 p += ctx->hdrlen; 1279 } 1280 else 1281 { 1282 i = ASN1_get_object(&p, &plen, &ptag, &pclass, len); 1283 if (ctx) 1284 { 1285 ctx->ret = i; 1286 ctx->plen = plen; 1287 ctx->pclass = pclass; 1288 ctx->ptag = ptag; 1289 ctx->hdrlen = p - q; 1290 ctx->valid = 1; 1291 /* If definite length, and no error, length + 1292 * header can't exceed total amount of data available. 1293 */ 1294 if (!(i & 0x81) && ((plen + ctx->hdrlen) > len)) 1295 { 1296 ASN1err(ASN1_F_ASN1_CHECK_TLEN, 1297 ASN1_R_TOO_LONG); 1298 asn1_tlc_clear(ctx); 1299 return 0; 1300 } 1301 } 1302 } 1303 1304 if (i & 0x80) 1305 { 1306 ASN1err(ASN1_F_ASN1_CHECK_TLEN, ASN1_R_BAD_OBJECT_HEADER); 1307 asn1_tlc_clear(ctx); 1308 return 0; 1309 } 1310 if (exptag >= 0) 1311 { 1312 if ((exptag != ptag) || (expclass != pclass)) 1313 { 1314 /* If type is OPTIONAL, not an error: 1315 * indicate missing type. 1316 */ 1317 if (opt) return -1; 1318 asn1_tlc_clear(ctx); 1319 ASN1err(ASN1_F_ASN1_CHECK_TLEN, ASN1_R_WRONG_TAG); 1320 return 0; 1321 } 1322 /* We have a tag and class match: 1323 * assume we are going to do something with it */ 1324 asn1_tlc_clear(ctx); 1325 } 1326 1327 if (i & 1) 1328 plen = len - (p - q); 1329 1330 if (inf) 1331 *inf = i & 1; 1332 1333 if (cst) 1334 *cst = i & V_ASN1_CONSTRUCTED; 1335 1336 if (olen) 1337 *olen = plen; 1338 1339 if (oclass) 1340 *oclass = pclass; 1341 1342 if (otag) 1343 *otag = ptag; 1344 1345 *in = p; 1346 return 1; 1347 } 1348