Coverage Report

Created: 2025-12-10 06:24

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl/crypto/asn1/tasn_dec.c
Line
Count
Source
1
/*
2
 * Copyright 2000-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <stddef.h>
11
#include <string.h>
12
#include <openssl/asn1.h>
13
#include <openssl/asn1t.h>
14
#include <openssl/objects.h>
15
#include <openssl/buffer.h>
16
#include <openssl/err.h>
17
#include "crypto/asn1.h"
18
#include "internal/numbers.h"
19
#include "asn1_local.h"
20
21
/*
22
 * Constructed types with a recursive definition (such as can be found in PKCS7)
23
 * could eventually exceed the stack given malicious input with excessive
24
 * recursion. Therefore we limit the stack depth. This is the maximum number of
25
 * recursive invocations of asn1_item_embed_d2i().
26
 */
27
0
#define ASN1_MAX_CONSTRUCTED_NEST 30
28
29
static int asn1_check_eoc(const unsigned char **in, long len);
30
static int asn1_find_end(const unsigned char **in, long len, char inf);
31
32
static int asn1_collect(BUF_MEM *buf, const unsigned char **in, long len,
33
    char inf, int tag, int aclass, int depth);
34
35
static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen);
36
37
static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass,
38
    char *inf, char *cst,
39
    const unsigned char **in, long len,
40
    int exptag, int expclass, char opt, ASN1_TLC *ctx);
41
42
static int asn1_template_ex_d2i(ASN1_VALUE **pval,
43
    const unsigned char **in, long len,
44
    const ASN1_TEMPLATE *tt, char opt,
45
    ASN1_TLC *ctx, int depth, OSSL_LIB_CTX *libctx,
46
    const char *propq);
47
static int asn1_template_noexp_d2i(ASN1_VALUE **val,
48
    const unsigned char **in, long len,
49
    const ASN1_TEMPLATE *tt, char opt,
50
    ASN1_TLC *ctx, int depth,
51
    OSSL_LIB_CTX *libctx, const char *propq);
52
static int asn1_d2i_ex_primitive(ASN1_VALUE **pval,
53
    const unsigned char **in, long len,
54
    const ASN1_ITEM *it,
55
    int tag, int aclass, char opt,
56
    ASN1_TLC *ctx);
57
static int asn1_ex_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len,
58
    int utype, char *free_cont, const ASN1_ITEM *it);
59
60
/* Table to convert tags to bit values, used for MSTRING type */
61
static const unsigned long tag2bit[32] = {
62
    /* tags  0 -  3 */
63
    0,
64
    0,
65
    0,
66
    B_ASN1_BIT_STRING,
67
    /* tags  4- 7 */
68
    B_ASN1_OCTET_STRING,
69
    0,
70
    0,
71
    B_ASN1_UNKNOWN,
72
    /* tags  8-11 */
73
    B_ASN1_UNKNOWN,
74
    B_ASN1_UNKNOWN,
75
    0,
76
    B_ASN1_UNKNOWN,
77
    /* tags 12-15 */
78
    B_ASN1_UTF8STRING,
79
    B_ASN1_UNKNOWN,
80
    B_ASN1_UNKNOWN,
81
    B_ASN1_UNKNOWN,
82
    /* tags 16-19 */
83
    B_ASN1_SEQUENCE,
84
    0,
85
    B_ASN1_NUMERICSTRING,
86
    B_ASN1_PRINTABLESTRING,
87
    /* tags 20-22 */
88
    B_ASN1_T61STRING,
89
    B_ASN1_VIDEOTEXSTRING,
90
    B_ASN1_IA5STRING,
91
    /* tags 23-24 */
92
    B_ASN1_UTCTIME,
93
    B_ASN1_GENERALIZEDTIME,
94
    /* tags 25-27 */
95
    B_ASN1_GRAPHICSTRING,
96
    B_ASN1_ISO64STRING,
97
    B_ASN1_GENERALSTRING,
98
    /* tags 28-31 */
99
    B_ASN1_UNIVERSALSTRING,
100
    B_ASN1_UNKNOWN,
101
    B_ASN1_BMPSTRING,
102
    B_ASN1_UNKNOWN,
103
};
104
105
unsigned long ASN1_tag2bit(int tag)
106
0
{
107
0
    if ((tag < 0) || (tag > 30))
108
0
        return 0;
109
0
    return tag2bit[tag];
110
0
}
111
112
/* Macro to initialize and invalidate the cache */
113
114
#define asn1_tlc_clear(c)   \
115
0
    do {                    \
116
0
        if ((c) != NULL)    \
117
0
            (c)->valid = 0; \
118
0
    } while (0)
119
/* Version to avoid compiler warning about 'c' always non-NULL */
120
#define asn1_tlc_clear_nc(c) \
121
0
    do {                     \
122
0
        (c)->valid = 0;      \
123
0
    } while (0)
124
125
/*
126
 * Decode an ASN1 item, this currently behaves just like a standard 'd2i'
127
 * function. 'in' points to a buffer to read the data from, in future we
128
 * will have more advanced versions that can input data a piece at a time and
129
 * this will simply be a special case.
130
 */
131
132
static int asn1_item_ex_d2i_intern(ASN1_VALUE **pval, const unsigned char **in,
133
    long len, const ASN1_ITEM *it, int tag,
134
    int aclass, char opt, ASN1_TLC *ctx,
135
    OSSL_LIB_CTX *libctx, const char *propq)
136
0
{
137
0
    int rv;
138
139
0
    if (pval == NULL || it == NULL) {
140
0
        ERR_raise(ERR_LIB_ASN1, ERR_R_PASSED_NULL_PARAMETER);
141
0
        return 0;
142
0
    }
143
0
    rv = asn1_item_embed_d2i(pval, in, len, it, tag, aclass, opt, ctx, 0,
144
0
        libctx, propq);
145
0
    if (rv <= 0)
146
0
        ASN1_item_ex_free(pval, it);
147
0
    return rv;
148
0
}
149
150
int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
151
    const ASN1_ITEM *it,
152
    int tag, int aclass, char opt, ASN1_TLC *ctx)
153
0
{
154
0
    return asn1_item_ex_d2i_intern(pval, in, len, it, tag, aclass, opt, ctx,
155
0
        NULL, NULL);
156
0
}
157
158
ASN1_VALUE *ASN1_item_d2i_ex(ASN1_VALUE **pval,
159
    const unsigned char **in, long len,
160
    const ASN1_ITEM *it, OSSL_LIB_CTX *libctx,
161
    const char *propq)
162
0
{
163
0
    ASN1_TLC c;
164
0
    ASN1_VALUE *ptmpval = NULL;
165
166
0
    if (pval == NULL)
167
0
        pval = &ptmpval;
168
0
    asn1_tlc_clear_nc(&c);
169
0
    if (asn1_item_ex_d2i_intern(pval, in, len, it, -1, 0, 0, &c, libctx,
170
0
            propq)
171
0
        > 0)
172
0
        return *pval;
173
0
    return NULL;
174
0
}
175
176
ASN1_VALUE *ASN1_item_d2i(ASN1_VALUE **pval,
177
    const unsigned char **in, long len,
178
    const ASN1_ITEM *it)
179
0
{
180
0
    return ASN1_item_d2i_ex(pval, in, len, it, NULL, NULL);
181
0
}
182
183
/*
184
 * Decode an item, taking care of IMPLICIT tagging, if any. If 'opt' set and
185
 * tag mismatch return -1 to handle OPTIONAL
186
 */
187
188
int asn1_item_embed_d2i(ASN1_VALUE **pval, const unsigned char **in,
189
    long len, const ASN1_ITEM *it,
190
    int tag, int aclass, char opt, ASN1_TLC *ctx,
191
    int depth, OSSL_LIB_CTX *libctx,
192
    const char *propq)
193
0
{
194
0
    const ASN1_TEMPLATE *tt, *errtt = NULL;
195
0
    const ASN1_EXTERN_FUNCS *ef;
196
0
    const ASN1_AUX *aux;
197
0
    ASN1_aux_cb *asn1_cb;
198
0
    const unsigned char *p = NULL, *q;
199
0
    unsigned char oclass;
200
0
    char seq_eoc, seq_nolen, cst, isopt;
201
0
    long tmplen;
202
0
    int i;
203
0
    int otag;
204
0
    int ret = 0;
205
0
    ASN1_VALUE **pchptr;
206
207
0
    if (pval == NULL || it == NULL) {
208
0
        ERR_raise(ERR_LIB_ASN1, ERR_R_PASSED_NULL_PARAMETER);
209
0
        return 0;
210
0
    }
211
0
    if (len <= 0) {
212
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_TOO_SMALL);
213
0
        return 0;
214
0
    }
215
0
    aux = it->funcs;
216
0
    if (aux && aux->asn1_cb)
217
0
        asn1_cb = aux->asn1_cb;
218
0
    else
219
0
        asn1_cb = 0;
220
221
0
    if (++depth > ASN1_MAX_CONSTRUCTED_NEST) {
222
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_NESTED_TOO_DEEP);
223
0
        goto err;
224
0
    }
225
226
0
    switch (it->itype) {
227
0
    case ASN1_ITYPE_PRIMITIVE:
228
0
        if (it->templates) {
229
            /*
230
             * tagging or OPTIONAL is currently illegal on an item template
231
             * because the flags can't get passed down. In practice this
232
             * isn't a problem: we include the relevant flags from the item
233
             * template in the template itself.
234
             */
235
0
            if ((tag != -1) || opt) {
236
0
                ERR_raise(ERR_LIB_ASN1,
237
0
                    ASN1_R_ILLEGAL_OPTIONS_ON_ITEM_TEMPLATE);
238
0
                goto err;
239
0
            }
240
0
            return asn1_template_ex_d2i(pval, in, len, it->templates, opt, ctx,
241
0
                depth, libctx, propq);
242
0
        }
243
0
        return asn1_d2i_ex_primitive(pval, in, len, it,
244
0
            tag, aclass, opt, ctx);
245
246
0
    case ASN1_ITYPE_MSTRING:
247
        /*
248
         * It never makes sense for multi-strings to have implicit tagging, so
249
         * if tag != -1, then this looks like an error in the template.
250
         */
251
0
        if (tag != -1) {
252
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_BAD_TEMPLATE);
253
0
            goto err;
254
0
        }
255
256
0
        p = *in;
257
        /* Just read in tag and class */
258
0
        ret = asn1_check_tlen(NULL, &otag, &oclass, NULL, NULL,
259
0
            &p, len, -1, 0, 1, ctx);
260
0
        if (!ret) {
261
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
262
0
            goto err;
263
0
        }
264
265
        /* Must be UNIVERSAL class */
266
0
        if (oclass != V_ASN1_UNIVERSAL) {
267
            /* If OPTIONAL, assume this is OK */
268
0
            if (opt)
269
0
                return -1;
270
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_MSTRING_NOT_UNIVERSAL);
271
0
            goto err;
272
0
        }
273
274
        /* Check tag matches bit map */
275
0
        if (!(ASN1_tag2bit(otag) & it->utype)) {
276
            /* If OPTIONAL, assume this is OK */
277
0
            if (opt)
278
0
                return -1;
279
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_MSTRING_WRONG_TAG);
280
0
            goto err;
281
0
        }
282
0
        return asn1_d2i_ex_primitive(pval, in, len, it, otag, 0, 0, ctx);
283
284
0
    case ASN1_ITYPE_EXTERN:
285
        /* Use new style d2i */
286
0
        ef = it->funcs;
287
0
        if (ef->asn1_ex_d2i_ex != NULL)
288
0
            return ef->asn1_ex_d2i_ex(pval, in, len, it, tag, aclass, opt, ctx,
289
0
                libctx, propq);
290
0
        return ef->asn1_ex_d2i(pval, in, len, it, tag, aclass, opt, ctx);
291
292
0
    case ASN1_ITYPE_CHOICE:
293
        /*
294
         * It never makes sense for CHOICE types to have implicit tagging, so
295
         * if tag != -1, then this looks like an error in the template.
296
         */
297
0
        if (tag != -1) {
298
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_BAD_TEMPLATE);
299
0
            goto err;
300
0
        }
301
302
0
        if (asn1_cb && !asn1_cb(ASN1_OP_D2I_PRE, pval, it, NULL))
303
0
            goto auxerr;
304
0
        if (*pval) {
305
            /* Free up and zero CHOICE value if initialised */
306
0
            i = ossl_asn1_get_choice_selector(pval, it);
307
0
            if ((i >= 0) && (i < it->tcount)) {
308
0
                tt = it->templates + i;
309
0
                pchptr = ossl_asn1_get_field_ptr(pval, tt);
310
0
                ossl_asn1_template_free(pchptr, tt);
311
0
                ossl_asn1_set_choice_selector(pval, -1, it);
312
0
            }
313
0
        } else if (!ossl_asn1_item_ex_new_intern(pval, it, libctx, propq)) {
314
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
315
0
            goto err;
316
0
        }
317
        /* CHOICE type, try each possibility in turn */
318
0
        p = *in;
319
0
        for (i = 0, tt = it->templates; i < it->tcount; i++, tt++) {
320
0
            pchptr = ossl_asn1_get_field_ptr(pval, tt);
321
            /*
322
             * We mark field as OPTIONAL so its absence can be recognised.
323
             */
324
0
            ret = asn1_template_ex_d2i(pchptr, &p, len, tt, 1, ctx, depth,
325
0
                libctx, propq);
326
            /* If field not present, try the next one */
327
0
            if (ret == -1)
328
0
                continue;
329
            /* If positive return, read OK, break loop */
330
0
            if (ret > 0)
331
0
                break;
332
            /*
333
             * Must be an ASN1 parsing error.
334
             * Free up any partial choice value
335
             */
336
0
            ossl_asn1_template_free(pchptr, tt);
337
0
            errtt = tt;
338
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
339
0
            goto err;
340
0
        }
341
342
        /* Did we fall off the end without reading anything? */
343
0
        if (i == it->tcount) {
344
            /* If OPTIONAL, this is OK */
345
0
            if (opt) {
346
                /* Free and zero it */
347
0
                ASN1_item_ex_free(pval, it);
348
0
                return -1;
349
0
            }
350
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_NO_MATCHING_CHOICE_TYPE);
351
0
            goto err;
352
0
        }
353
354
0
        ossl_asn1_set_choice_selector(pval, i, it);
355
356
0
        if (asn1_cb && !asn1_cb(ASN1_OP_D2I_POST, pval, it, NULL))
357
0
            goto auxerr;
358
0
        *in = p;
359
0
        return 1;
360
361
0
    case ASN1_ITYPE_NDEF_SEQUENCE:
362
0
    case ASN1_ITYPE_SEQUENCE:
363
0
        p = *in;
364
0
        tmplen = len;
365
366
        /* If no IMPLICIT tagging set to SEQUENCE, UNIVERSAL */
367
0
        if (tag == -1) {
368
0
            tag = V_ASN1_SEQUENCE;
369
0
            aclass = V_ASN1_UNIVERSAL;
370
0
        }
371
        /* Get SEQUENCE length and update len, p */
372
0
        ret = asn1_check_tlen(&len, NULL, NULL, &seq_eoc, &cst,
373
0
            &p, len, tag, aclass, opt, ctx);
374
0
        if (!ret) {
375
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
376
0
            goto err;
377
0
        } else if (ret == -1)
378
0
            return -1;
379
0
        if (aux && (aux->flags & ASN1_AFLG_BROKEN)) {
380
0
            len = tmplen - (long)(p - *in);
381
0
            seq_nolen = 1;
382
0
        }
383
        /* If indefinite we don't do a length check */
384
0
        else
385
0
            seq_nolen = seq_eoc;
386
0
        if (!cst) {
387
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_SEQUENCE_NOT_CONSTRUCTED);
388
0
            goto err;
389
0
        }
390
391
0
        if (*pval == NULL
392
0
            && !ossl_asn1_item_ex_new_intern(pval, it, libctx, propq)) {
393
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
394
0
            goto err;
395
0
        }
396
397
0
        if (asn1_cb && !asn1_cb(ASN1_OP_D2I_PRE, pval, it, NULL))
398
0
            goto auxerr;
399
400
        /* Free up and zero any ADB found */
401
0
        for (i = 0, tt = it->templates; i < it->tcount; i++, tt++) {
402
0
            if (tt->flags & ASN1_TFLG_ADB_MASK) {
403
0
                const ASN1_TEMPLATE *seqtt;
404
0
                ASN1_VALUE **pseqval;
405
0
                seqtt = ossl_asn1_do_adb(*pval, tt, 0);
406
0
                if (seqtt == NULL)
407
0
                    continue;
408
0
                pseqval = ossl_asn1_get_field_ptr(pval, seqtt);
409
0
                ossl_asn1_template_free(pseqval, seqtt);
410
0
            }
411
0
        }
412
413
        /* Get each field entry */
414
0
        for (i = 0, tt = it->templates; i < it->tcount; i++, tt++) {
415
0
            const ASN1_TEMPLATE *seqtt;
416
0
            ASN1_VALUE **pseqval;
417
0
            seqtt = ossl_asn1_do_adb(*pval, tt, 1);
418
0
            if (seqtt == NULL)
419
0
                goto err;
420
0
            pseqval = ossl_asn1_get_field_ptr(pval, seqtt);
421
            /* Have we ran out of data? */
422
0
            if (!len)
423
0
                break;
424
0
            q = p;
425
0
            if (asn1_check_eoc(&p, len)) {
426
0
                if (!seq_eoc) {
427
0
                    ERR_raise(ERR_LIB_ASN1, ASN1_R_UNEXPECTED_EOC);
428
0
                    goto err;
429
0
                }
430
0
                len -= (long)(p - q);
431
0
                seq_eoc = 0;
432
0
                break;
433
0
            }
434
            /*
435
             * This determines the OPTIONAL flag value. The field cannot be
436
             * omitted if it is the last of a SEQUENCE and there is still
437
             * data to be read. This isn't strictly necessary but it
438
             * increases efficiency in some cases.
439
             */
440
0
            if (i == (it->tcount - 1))
441
0
                isopt = 0;
442
0
            else
443
0
                isopt = (char)(seqtt->flags & ASN1_TFLG_OPTIONAL);
444
            /*
445
             * attempt to read in field, allowing each to be OPTIONAL
446
             */
447
448
0
            ret = asn1_template_ex_d2i(pseqval, &p, len, seqtt, isopt, ctx,
449
0
                depth, libctx, propq);
450
0
            if (!ret) {
451
0
                errtt = seqtt;
452
0
                goto err;
453
0
            } else if (ret == -1) {
454
                /*
455
                 * OPTIONAL component absent. Free and zero the field.
456
                 */
457
0
                ossl_asn1_template_free(pseqval, seqtt);
458
0
                continue;
459
0
            }
460
            /* Update length */
461
0
            len -= (long)(p - q);
462
0
        }
463
464
        /* Check for EOC if expecting one */
465
0
        if (seq_eoc && !asn1_check_eoc(&p, len)) {
466
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_MISSING_EOC);
467
0
            goto err;
468
0
        }
469
        /* Check all data read */
470
0
        if (!seq_nolen && len) {
471
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_SEQUENCE_LENGTH_MISMATCH);
472
0
            goto err;
473
0
        }
474
475
        /*
476
         * If we get here we've got no more data in the SEQUENCE, however we
477
         * may not have read all fields so check all remaining are OPTIONAL
478
         * and clear any that are.
479
         */
480
0
        for (; i < it->tcount; tt++, i++) {
481
0
            const ASN1_TEMPLATE *seqtt;
482
0
            seqtt = ossl_asn1_do_adb(*pval, tt, 1);
483
0
            if (seqtt == NULL)
484
0
                goto err;
485
0
            if (seqtt->flags & ASN1_TFLG_OPTIONAL) {
486
0
                ASN1_VALUE **pseqval;
487
0
                pseqval = ossl_asn1_get_field_ptr(pval, seqtt);
488
0
                ossl_asn1_template_free(pseqval, seqtt);
489
0
            } else {
490
0
                errtt = seqtt;
491
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_FIELD_MISSING);
492
0
                goto err;
493
0
            }
494
0
        }
495
        /* Save encoding */
496
0
        if (!ossl_asn1_enc_save(pval, *in, (long)(p - *in), it))
497
0
            goto auxerr;
498
0
        if (asn1_cb && !asn1_cb(ASN1_OP_D2I_POST, pval, it, NULL))
499
0
            goto auxerr;
500
0
        *in = p;
501
0
        return 1;
502
503
0
    default:
504
0
        return 0;
505
0
    }
506
0
auxerr:
507
0
    ERR_raise(ERR_LIB_ASN1, ASN1_R_AUX_ERROR);
508
0
err:
509
0
    if (errtt)
510
0
        ERR_add_error_data(4, "Field=", errtt->field_name,
511
0
            ", Type=", it->sname);
512
0
    else
513
0
        ERR_add_error_data(2, "Type=", it->sname);
514
0
    return 0;
515
0
}
516
517
/*
518
 * Templates are handled with two separate functions. One handles any
519
 * EXPLICIT tag and the other handles the rest.
520
 */
521
522
static int asn1_template_ex_d2i(ASN1_VALUE **val,
523
    const unsigned char **in, long inlen,
524
    const ASN1_TEMPLATE *tt, char opt,
525
    ASN1_TLC *ctx, int depth,
526
    OSSL_LIB_CTX *libctx, const char *propq)
527
0
{
528
0
    int flags, aclass;
529
0
    int ret;
530
0
    long len;
531
0
    const unsigned char *p, *q;
532
0
    char exp_eoc;
533
0
    if (!val)
534
0
        return 0;
535
0
    flags = tt->flags;
536
0
    aclass = flags & ASN1_TFLG_TAG_CLASS;
537
538
0
    p = *in;
539
540
    /* Check if EXPLICIT tag expected */
541
0
    if (flags & ASN1_TFLG_EXPTAG) {
542
0
        char cst;
543
        /*
544
         * Need to work out amount of data available to the inner content and
545
         * where it starts: so read in EXPLICIT header to get the info.
546
         */
547
0
        ret = asn1_check_tlen(&len, NULL, NULL, &exp_eoc, &cst,
548
0
            &p, inlen, tt->tag, aclass, opt, ctx);
549
0
        q = p;
550
0
        if (!ret) {
551
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
552
0
            return 0;
553
0
        } else if (ret == -1)
554
0
            return -1;
555
0
        if (!cst) {
556
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_EXPLICIT_TAG_NOT_CONSTRUCTED);
557
0
            return 0;
558
0
        }
559
        /* We've found the field so it can't be OPTIONAL now */
560
0
        ret = asn1_template_noexp_d2i(val, &p, len, tt, 0, ctx, depth, libctx,
561
0
            propq);
562
0
        if (!ret) {
563
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
564
0
            return 0;
565
0
        }
566
        /* We read the field in OK so update length */
567
0
        len -= (long)(p - q);
568
0
        if (exp_eoc) {
569
            /* If NDEF we must have an EOC here */
570
0
            if (!asn1_check_eoc(&p, len)) {
571
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_MISSING_EOC);
572
0
                goto err;
573
0
            }
574
0
        } else {
575
            /*
576
             * Otherwise we must hit the EXPLICIT tag end or its an error
577
             */
578
0
            if (len) {
579
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_EXPLICIT_LENGTH_MISMATCH);
580
0
                goto err;
581
0
            }
582
0
        }
583
0
    } else
584
0
        return asn1_template_noexp_d2i(val, in, inlen, tt, opt, ctx, depth,
585
0
            libctx, propq);
586
587
0
    *in = p;
588
0
    return 1;
589
590
0
err:
591
0
    return 0;
592
0
}
593
594
static int asn1_template_noexp_d2i(ASN1_VALUE **val,
595
    const unsigned char **in, long len,
596
    const ASN1_TEMPLATE *tt, char opt,
597
    ASN1_TLC *ctx, int depth,
598
    OSSL_LIB_CTX *libctx, const char *propq)
599
0
{
600
0
    int flags, aclass;
601
0
    int ret;
602
0
    ASN1_VALUE *tval;
603
0
    const unsigned char *p, *q;
604
0
    if (!val)
605
0
        return 0;
606
0
    flags = tt->flags;
607
0
    aclass = flags & ASN1_TFLG_TAG_CLASS;
608
609
0
    p = *in;
610
611
    /*
612
     * If field is embedded then val needs fixing so it is a pointer to
613
     * a pointer to a field.
614
     */
615
0
    if (tt->flags & ASN1_TFLG_EMBED) {
616
0
        tval = (ASN1_VALUE *)val;
617
0
        val = &tval;
618
0
    }
619
620
0
    if (flags & ASN1_TFLG_SK_MASK) {
621
        /* SET OF, SEQUENCE OF */
622
0
        int sktag, skaclass;
623
0
        char sk_eoc;
624
        /* First work out expected inner tag value */
625
0
        if (flags & ASN1_TFLG_IMPTAG) {
626
0
            sktag = tt->tag;
627
0
            skaclass = aclass;
628
0
        } else {
629
0
            skaclass = V_ASN1_UNIVERSAL;
630
0
            if (flags & ASN1_TFLG_SET_OF)
631
0
                sktag = V_ASN1_SET;
632
0
            else
633
0
                sktag = V_ASN1_SEQUENCE;
634
0
        }
635
        /* Get the tag */
636
0
        ret = asn1_check_tlen(&len, NULL, NULL, &sk_eoc, NULL,
637
0
            &p, len, sktag, skaclass, opt, ctx);
638
0
        if (!ret) {
639
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
640
0
            return 0;
641
0
        } else if (ret == -1)
642
0
            return -1;
643
0
        if (*val == NULL)
644
0
            *val = (ASN1_VALUE *)sk_ASN1_VALUE_new_null();
645
0
        else {
646
            /*
647
             * We've got a valid STACK: free up any items present
648
             */
649
0
            STACK_OF(ASN1_VALUE) *sktmp = (STACK_OF(ASN1_VALUE) *)*val;
650
0
            ASN1_VALUE *vtmp;
651
0
            while (sk_ASN1_VALUE_num(sktmp) > 0) {
652
0
                vtmp = sk_ASN1_VALUE_pop(sktmp);
653
0
                ASN1_item_ex_free(&vtmp, ASN1_ITEM_ptr(tt->item));
654
0
            }
655
0
        }
656
657
0
        if (*val == NULL) {
658
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_CRYPTO_LIB);
659
0
            goto err;
660
0
        }
661
662
        /* Read as many items as we can */
663
0
        while (len > 0) {
664
0
            ASN1_VALUE *skfield;
665
0
            q = p;
666
            /* See if EOC found */
667
0
            if (asn1_check_eoc(&p, len)) {
668
0
                if (!sk_eoc) {
669
0
                    ERR_raise(ERR_LIB_ASN1, ASN1_R_UNEXPECTED_EOC);
670
0
                    goto err;
671
0
                }
672
0
                len -= (long)(p - q);
673
0
                sk_eoc = 0;
674
0
                break;
675
0
            }
676
0
            skfield = NULL;
677
0
            if (asn1_item_embed_d2i(&skfield, &p, len,
678
0
                    ASN1_ITEM_ptr(tt->item), -1, 0, 0, ctx,
679
0
                    depth, libctx, propq)
680
0
                <= 0) {
681
0
                ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
682
                /* |skfield| may be partially allocated despite failure. */
683
0
                ASN1_item_free(skfield, ASN1_ITEM_ptr(tt->item));
684
0
                goto err;
685
0
            }
686
0
            len -= (long)(p - q);
687
0
            if (!sk_ASN1_VALUE_push((STACK_OF(ASN1_VALUE) *)*val, skfield)) {
688
0
                ERR_raise(ERR_LIB_ASN1, ERR_R_CRYPTO_LIB);
689
0
                ASN1_item_free(skfield, ASN1_ITEM_ptr(tt->item));
690
0
                goto err;
691
0
            }
692
0
        }
693
0
        if (sk_eoc) {
694
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_MISSING_EOC);
695
0
            goto err;
696
0
        }
697
0
    } else if (flags & ASN1_TFLG_IMPTAG) {
698
        /* IMPLICIT tagging */
699
0
        ret = asn1_item_embed_d2i(val, &p, len,
700
0
            ASN1_ITEM_ptr(tt->item), tt->tag, aclass, opt,
701
0
            ctx, depth, libctx, propq);
702
0
        if (!ret) {
703
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
704
0
            goto err;
705
0
        } else if (ret == -1)
706
0
            return -1;
707
0
    } else {
708
        /* Nothing special */
709
0
        ret = asn1_item_embed_d2i(val, &p, len, ASN1_ITEM_ptr(tt->item),
710
0
            -1, 0, opt, ctx, depth, libctx, propq);
711
0
        if (!ret) {
712
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
713
0
            goto err;
714
0
        } else if (ret == -1)
715
0
            return -1;
716
0
    }
717
718
0
    *in = p;
719
0
    return 1;
720
721
0
err:
722
0
    return 0;
723
0
}
724
725
static int asn1_d2i_ex_primitive(ASN1_VALUE **pval,
726
    const unsigned char **in, long inlen,
727
    const ASN1_ITEM *it,
728
    int tag, int aclass, char opt, ASN1_TLC *ctx)
729
0
{
730
0
    int ret = 0, utype;
731
0
    long plen;
732
0
    char cst, inf, free_cont = 0;
733
0
    const unsigned char *p;
734
0
    BUF_MEM buf = { 0, NULL, 0, 0 };
735
0
    const unsigned char *cont = NULL;
736
0
    long len;
737
738
0
    if (pval == NULL) {
739
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_NULL);
740
0
        return 0; /* Should never happen */
741
0
    }
742
743
0
    if (it->itype == ASN1_ITYPE_MSTRING) {
744
0
        utype = tag;
745
0
        tag = -1;
746
0
    } else
747
0
        utype = it->utype;
748
749
0
    if (utype == V_ASN1_ANY) {
750
        /* If type is ANY need to figure out type from tag */
751
0
        unsigned char oclass;
752
0
        if (tag >= 0) {
753
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_TAGGED_ANY);
754
0
            return 0;
755
0
        }
756
0
        if (opt) {
757
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_OPTIONAL_ANY);
758
0
            return 0;
759
0
        }
760
0
        p = *in;
761
0
        ret = asn1_check_tlen(NULL, &utype, &oclass, NULL, NULL,
762
0
            &p, inlen, -1, 0, 0, ctx);
763
0
        if (!ret) {
764
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
765
0
            return 0;
766
0
        }
767
0
        if (oclass != V_ASN1_UNIVERSAL)
768
0
            utype = V_ASN1_OTHER;
769
0
    }
770
0
    if (tag == -1) {
771
0
        tag = utype;
772
0
        aclass = V_ASN1_UNIVERSAL;
773
0
    }
774
0
    p = *in;
775
    /* Check header */
776
0
    ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst,
777
0
        &p, inlen, tag, aclass, opt, ctx);
778
0
    if (!ret) {
779
0
        ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
780
0
        return 0;
781
0
    } else if (ret == -1)
782
0
        return -1;
783
0
    ret = 0;
784
    /* SEQUENCE, SET and "OTHER" are left in encoded form */
785
0
    if ((utype == V_ASN1_SEQUENCE)
786
0
        || (utype == V_ASN1_SET) || (utype == V_ASN1_OTHER)) {
787
        /*
788
         * Clear context cache for type OTHER because the auto clear when we
789
         * have a exact match won't work
790
         */
791
0
        if (utype == V_ASN1_OTHER) {
792
0
            asn1_tlc_clear(ctx);
793
0
        }
794
        /* SEQUENCE and SET must be constructed */
795
0
        else if (!cst) {
796
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_TYPE_NOT_CONSTRUCTED);
797
0
            return 0;
798
0
        }
799
800
0
        cont = *in;
801
        /* If indefinite length constructed find the real end */
802
0
        if (inf) {
803
0
            if (!asn1_find_end(&p, plen, inf))
804
0
                goto err;
805
0
            len = (long)(p - cont);
806
0
        } else {
807
0
            len = (long)(p - cont) + plen;
808
0
            p += plen;
809
0
        }
810
0
    } else if (cst) {
811
0
        if (utype == V_ASN1_NULL || utype == V_ASN1_BOOLEAN
812
0
            || utype == V_ASN1_OBJECT || utype == V_ASN1_INTEGER
813
0
            || utype == V_ASN1_ENUMERATED) {
814
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_TYPE_NOT_PRIMITIVE);
815
0
            return 0;
816
0
        }
817
818
        /* Free any returned 'buf' content */
819
0
        free_cont = 1;
820
        /*
821
         * Should really check the internal tags are correct but some things
822
         * may get this wrong. The relevant specs say that constructed string
823
         * types should be OCTET STRINGs internally irrespective of the type.
824
         * So instead just check for UNIVERSAL class and ignore the tag.
825
         */
826
0
        if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0)) {
827
0
            goto err;
828
0
        }
829
0
        len = (long)buf.length;
830
        /* Append a final null to string */
831
0
        if (!BUF_MEM_grow_clean(&buf, len + 1)) {
832
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_BUF_LIB);
833
0
            goto err;
834
0
        }
835
0
        buf.data[len] = 0;
836
0
        cont = (const unsigned char *)buf.data;
837
0
    } else {
838
0
        cont = p;
839
0
        len = plen;
840
0
        p += plen;
841
0
    }
842
843
    /* We now have content length and type: translate into a structure */
844
    /* asn1_ex_c2i may reuse allocated buffer, and so sets free_cont to 0 */
845
0
    if (!asn1_ex_c2i(pval, cont, len, utype, &free_cont, it))
846
0
        goto err;
847
848
0
    *in = p;
849
0
    ret = 1;
850
0
err:
851
0
    if (free_cont)
852
0
        OPENSSL_free(buf.data);
853
0
    return ret;
854
0
}
855
856
/* Translate ASN1 content octets into a structure */
857
858
static int asn1_ex_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len,
859
    int utype, char *free_cont, const ASN1_ITEM *it)
860
0
{
861
0
    ASN1_VALUE **opval = NULL;
862
0
    ASN1_STRING *stmp;
863
0
    ASN1_TYPE *typ = NULL;
864
0
    int ret = 0;
865
0
    const ASN1_PRIMITIVE_FUNCS *pf;
866
0
    ASN1_INTEGER **tint;
867
0
    pf = it->funcs;
868
869
0
    if (pf && pf->prim_c2i)
870
0
        return pf->prim_c2i(pval, cont, len, utype, free_cont, it);
871
    /* If ANY type clear type and set pointer to internal value */
872
0
    if (it->utype == V_ASN1_ANY) {
873
0
        if (*pval == NULL) {
874
0
            typ = ASN1_TYPE_new();
875
0
            if (typ == NULL)
876
0
                goto err;
877
0
            *pval = (ASN1_VALUE *)typ;
878
0
        } else
879
0
            typ = (ASN1_TYPE *)*pval;
880
881
0
        if (utype != typ->type)
882
0
            ASN1_TYPE_set(typ, utype, NULL);
883
0
        opval = pval;
884
0
        pval = &typ->value.asn1_value;
885
0
    }
886
0
    switch (utype) {
887
0
    case V_ASN1_OBJECT:
888
0
        if (!ossl_c2i_ASN1_OBJECT((ASN1_OBJECT **)pval, &cont, len))
889
0
            goto err;
890
0
        break;
891
892
0
    case V_ASN1_NULL:
893
0
        if (len) {
894
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_NULL_IS_WRONG_LENGTH);
895
0
            goto err;
896
0
        }
897
0
        *pval = (ASN1_VALUE *)1;
898
0
        break;
899
900
0
    case V_ASN1_BOOLEAN:
901
0
        if (len != 1) {
902
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_BOOLEAN_IS_WRONG_LENGTH);
903
0
            goto err;
904
0
        } else {
905
0
            ASN1_BOOLEAN *tbool;
906
0
            tbool = (ASN1_BOOLEAN *)pval;
907
0
            *tbool = *cont;
908
0
        }
909
0
        break;
910
911
0
    case V_ASN1_BIT_STRING:
912
0
        if (!ossl_c2i_ASN1_BIT_STRING((ASN1_BIT_STRING **)pval, &cont, len))
913
0
            goto err;
914
0
        break;
915
916
0
    case V_ASN1_INTEGER:
917
0
    case V_ASN1_ENUMERATED:
918
0
        tint = (ASN1_INTEGER **)pval;
919
0
        if (!ossl_c2i_ASN1_INTEGER(tint, &cont, len))
920
0
            goto err;
921
        /* Fixup type to match the expected form */
922
0
        (*tint)->type = utype | ((*tint)->type & V_ASN1_NEG);
923
0
        break;
924
925
0
    case V_ASN1_OCTET_STRING:
926
0
    case V_ASN1_NUMERICSTRING:
927
0
    case V_ASN1_PRINTABLESTRING:
928
0
    case V_ASN1_T61STRING:
929
0
    case V_ASN1_VIDEOTEXSTRING:
930
0
    case V_ASN1_IA5STRING:
931
0
    case V_ASN1_UTCTIME:
932
0
    case V_ASN1_GENERALIZEDTIME:
933
0
    case V_ASN1_GRAPHICSTRING:
934
0
    case V_ASN1_VISIBLESTRING:
935
0
    case V_ASN1_GENERALSTRING:
936
0
    case V_ASN1_UNIVERSALSTRING:
937
0
    case V_ASN1_BMPSTRING:
938
0
    case V_ASN1_UTF8STRING:
939
0
    case V_ASN1_OTHER:
940
0
    case V_ASN1_SET:
941
0
    case V_ASN1_SEQUENCE:
942
0
    default:
943
0
        if (utype == V_ASN1_BMPSTRING && (len & 1)) {
944
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_BMPSTRING_IS_WRONG_LENGTH);
945
0
            goto err;
946
0
        }
947
0
        if (utype == V_ASN1_UNIVERSALSTRING && (len & 3)) {
948
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_UNIVERSALSTRING_IS_WRONG_LENGTH);
949
0
            goto err;
950
0
        }
951
0
        if (utype == V_ASN1_GENERALIZEDTIME && (len < 15)) {
952
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_GENERALIZEDTIME_IS_TOO_SHORT);
953
0
            goto err;
954
0
        }
955
0
        if (utype == V_ASN1_UTCTIME && (len < 13)) {
956
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_UTCTIME_IS_TOO_SHORT);
957
0
            goto err;
958
0
        }
959
        /* All based on ASN1_STRING and handled the same */
960
0
        if (*pval == NULL) {
961
0
            stmp = ASN1_STRING_type_new(utype);
962
0
            if (stmp == NULL) {
963
0
                ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
964
0
                goto err;
965
0
            }
966
0
            *pval = (ASN1_VALUE *)stmp;
967
0
        } else {
968
0
            stmp = (ASN1_STRING *)*pval;
969
0
            stmp->type = utype;
970
0
        }
971
        /* If we've already allocated a buffer use it */
972
0
        if (*free_cont) {
973
0
            ASN1_STRING_set0(stmp, (unsigned char *)cont /* UGLY CAST! */, len);
974
0
            *free_cont = 0;
975
0
        } else {
976
0
            if (!ASN1_STRING_set(stmp, cont, len)) {
977
0
                ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
978
0
                ASN1_STRING_free(stmp);
979
0
                *pval = NULL;
980
0
                goto err;
981
0
            }
982
0
        }
983
0
        break;
984
0
    }
985
    /* If ASN1_ANY and NULL type fix up value */
986
0
    if (typ && (utype == V_ASN1_NULL))
987
0
        typ->value.ptr = NULL;
988
989
0
    ret = 1;
990
0
err:
991
0
    if (!ret) {
992
0
        ASN1_TYPE_free(typ);
993
0
        if (opval)
994
0
            *opval = NULL;
995
0
    }
996
0
    return ret;
997
0
}
998
999
/*
1000
 * This function finds the end of an ASN1 structure when passed its maximum
1001
 * length, whether it is indefinite length and a pointer to the content. This
1002
 * is more efficient than calling asn1_collect because it does not recurse on
1003
 * each indefinite length header.
1004
 */
1005
1006
static int asn1_find_end(const unsigned char **in, long len, char inf)
1007
0
{
1008
0
    uint32_t expected_eoc;
1009
0
    long plen;
1010
0
    const unsigned char *p = *in, *q;
1011
    /* If not indefinite length constructed just add length */
1012
0
    if (inf == 0) {
1013
0
        *in += len;
1014
0
        return 1;
1015
0
    }
1016
0
    expected_eoc = 1;
1017
    /*
1018
     * Indefinite length constructed form. Find the end when enough EOCs are
1019
     * found. If more indefinite length constructed headers are encountered
1020
     * increment the expected eoc count otherwise just skip to the end of the
1021
     * data.
1022
     */
1023
0
    while (len > 0) {
1024
0
        if (asn1_check_eoc(&p, len)) {
1025
0
            expected_eoc--;
1026
0
            if (expected_eoc == 0)
1027
0
                break;
1028
0
            len -= 2;
1029
0
            continue;
1030
0
        }
1031
0
        q = p;
1032
        /* Just read in a header: only care about the length */
1033
0
        if (!asn1_check_tlen(&plen, NULL, NULL, &inf, NULL, &p, len,
1034
0
                -1, 0, 0, NULL)) {
1035
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
1036
0
            return 0;
1037
0
        }
1038
0
        if (inf) {
1039
0
            if (expected_eoc == UINT32_MAX) {
1040
0
                ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
1041
0
                return 0;
1042
0
            }
1043
0
            expected_eoc++;
1044
0
        } else {
1045
0
            p += plen;
1046
0
        }
1047
0
        len -= (long)(p - q);
1048
0
    }
1049
0
    if (expected_eoc) {
1050
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_MISSING_EOC);
1051
0
        return 0;
1052
0
    }
1053
0
    *in = p;
1054
0
    return 1;
1055
0
}
1056
1057
/*
1058
 * This function collects the asn1 data from a constructed string type into
1059
 * a buffer. The values of 'in' and 'len' should refer to the contents of the
1060
 * constructed type and 'inf' should be set if it is indefinite length.
1061
 */
1062
1063
#ifndef ASN1_MAX_STRING_NEST
1064
/*
1065
 * This determines how many levels of recursion are permitted in ASN1 string
1066
 * types. If it is not limited stack overflows can occur. If set to zero no
1067
 * recursion is allowed at all. Although zero should be adequate examples
1068
 * exist that require a value of 1. So 5 should be more than enough.
1069
 */
1070
0
#define ASN1_MAX_STRING_NEST 5
1071
#endif
1072
1073
static int asn1_collect(BUF_MEM *buf, const unsigned char **in, long len,
1074
    char inf, int tag, int aclass, int depth)
1075
0
{
1076
0
    const unsigned char *p, *q;
1077
0
    long plen;
1078
0
    char cst, ininf;
1079
0
    p = *in;
1080
0
    inf &= 1;
1081
    /*
1082
     * If no buffer and not indefinite length constructed just pass over the
1083
     * encoded data
1084
     */
1085
0
    if (!buf && !inf) {
1086
0
        *in += len;
1087
0
        return 1;
1088
0
    }
1089
0
    while (len > 0) {
1090
0
        q = p;
1091
        /* Check for EOC */
1092
0
        if (asn1_check_eoc(&p, len)) {
1093
            /*
1094
             * EOC is illegal outside indefinite length constructed form
1095
             */
1096
0
            if (!inf) {
1097
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_UNEXPECTED_EOC);
1098
0
                return 0;
1099
0
            }
1100
0
            inf = 0;
1101
0
            break;
1102
0
        }
1103
1104
0
        if (!asn1_check_tlen(&plen, NULL, NULL, &ininf, &cst, &p,
1105
0
                len, tag, aclass, 0, NULL)) {
1106
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_NESTED_ASN1_ERROR);
1107
0
            return 0;
1108
0
        }
1109
1110
        /* If indefinite length constructed update max length */
1111
0
        if (cst) {
1112
0
            if (depth >= ASN1_MAX_STRING_NEST) {
1113
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_NESTED_ASN1_STRING);
1114
0
                return 0;
1115
0
            }
1116
0
            if (!asn1_collect(buf, &p, plen, ininf, tag, aclass, depth + 1))
1117
0
                return 0;
1118
0
        } else if (plen && !collect_data(buf, &p, plen))
1119
0
            return 0;
1120
0
        len -= (long)(p - q);
1121
0
    }
1122
0
    if (inf) {
1123
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_MISSING_EOC);
1124
0
        return 0;
1125
0
    }
1126
0
    *in = p;
1127
0
    return 1;
1128
0
}
1129
1130
static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen)
1131
0
{
1132
0
    long len;
1133
0
    if (buf) {
1134
0
        len = (long)buf->length;
1135
0
        if (len + plen < 0) {
1136
            /* resulting buffer length will not fit into long */
1137
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_LENGTH_TOO_LONG);
1138
0
            return 0;
1139
0
        }
1140
0
        if (!BUF_MEM_grow_clean(buf, len + plen)) {
1141
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_BUF_LIB);
1142
0
            return 0;
1143
0
        }
1144
0
        memcpy(buf->data + len, *p, plen);
1145
0
    }
1146
0
    *p += plen;
1147
0
    return 1;
1148
0
}
1149
1150
/* Check for ASN1 EOC and swallow it if found */
1151
1152
static int asn1_check_eoc(const unsigned char **in, long len)
1153
0
{
1154
0
    const unsigned char *p;
1155
1156
0
    if (len < 2)
1157
0
        return 0;
1158
0
    p = *in;
1159
0
    if (p[0] == '\0' && p[1] == '\0') {
1160
0
        *in += 2;
1161
0
        return 1;
1162
0
    }
1163
0
    return 0;
1164
0
}
1165
1166
/*
1167
 * Check an ASN1 tag and length: a bit like ASN1_get_object but it sets the
1168
 * length for indefinite length constructed form, we don't know the exact
1169
 * length but we can set an upper bound to the amount of data available minus
1170
 * the header length just read.
1171
 */
1172
1173
static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass,
1174
    char *inf, char *cst,
1175
    const unsigned char **in, long len,
1176
    int exptag, int expclass, char opt, ASN1_TLC *ctx)
1177
0
{
1178
0
    int i;
1179
0
    int ptag, pclass;
1180
0
    long plen;
1181
0
    const unsigned char *p, *q;
1182
0
    p = *in;
1183
0
    q = p;
1184
1185
0
    if (len <= 0) {
1186
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_TOO_SMALL);
1187
0
        goto err;
1188
0
    }
1189
0
    if (ctx != NULL && ctx->valid) {
1190
0
        i = ctx->ret;
1191
0
        plen = ctx->plen;
1192
0
        pclass = ctx->pclass;
1193
0
        ptag = ctx->ptag;
1194
0
        p += ctx->hdrlen;
1195
0
    } else {
1196
0
        i = ASN1_get_object(&p, &plen, &ptag, &pclass, len);
1197
0
        if (ctx != NULL) {
1198
0
            ctx->ret = i;
1199
0
            ctx->plen = plen;
1200
0
            ctx->pclass = pclass;
1201
0
            ctx->ptag = ptag;
1202
0
            ctx->hdrlen = (int)(p - q);
1203
0
            ctx->valid = 1;
1204
            /*
1205
             * If definite length, and no error, length + header can't exceed
1206
             * total amount of data available.
1207
             */
1208
0
            if ((i & 0x81) == 0 && (plen + ctx->hdrlen) > len) {
1209
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_TOO_LONG);
1210
0
                goto err;
1211
0
            }
1212
0
        }
1213
0
    }
1214
1215
0
    if ((i & 0x80) != 0) {
1216
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_BAD_OBJECT_HEADER);
1217
0
        goto err;
1218
0
    }
1219
0
    if (exptag >= 0) {
1220
0
        if (exptag != ptag || expclass != pclass) {
1221
            /*
1222
             * If type is OPTIONAL, not an error: indicate missing type.
1223
             */
1224
0
            if (opt != 0)
1225
0
                return -1;
1226
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_WRONG_TAG);
1227
0
            goto err;
1228
0
        }
1229
        /*
1230
         * We have a tag and class match: assume we are going to do something
1231
         * with it
1232
         */
1233
0
        asn1_tlc_clear(ctx);
1234
0
    }
1235
1236
0
    if ((i & 1) != 0)
1237
0
        plen = len - (long)(p - q);
1238
1239
0
    if (inf != NULL)
1240
0
        *inf = i & 1;
1241
1242
0
    if (cst != NULL)
1243
0
        *cst = i & V_ASN1_CONSTRUCTED;
1244
1245
0
    if (olen != NULL)
1246
0
        *olen = plen;
1247
1248
0
    if (oclass != NULL)
1249
0
        *oclass = pclass;
1250
1251
0
    if (otag != NULL)
1252
0
        *otag = ptag;
1253
1254
0
    *in = p;
1255
0
    return 1;
1256
1257
0
err:
1258
    asn1_tlc_clear(ctx);
1259
0
    return 0;
1260
0
}