Coverage Report

Created: 2025-06-10 07:26

/src/ghostpdl/base/saes.c
Line
Count
Source (jump to first uncovered line)
1
/* Copyright (C) 2001-2023 Artifex Software, Inc.
2
   All Rights Reserved.
3
4
   This software is provided AS-IS with no warranty, either express or
5
   implied.
6
7
   This software is distributed under license and may not be copied,
8
   modified or distributed except as expressly authorized under the terms
9
   of the license contained in the file LICENSE in this distribution.
10
11
   Refer to licensing information at http://www.artifex.com or contact
12
   Artifex Software, Inc.,  39 Mesa Street, Suite 108A, San Francisco,
13
   CA 94129, USA, for further information.
14
*/
15
16
17
18
/* AES filter implementation */
19
20
#include "memory_.h"
21
#include "gserrors.h"
22
#include "strimpl.h"
23
#include "saes.h"
24
25
/* stream implementation */
26
27
private_st_aes_state(); /* creates a gc object for our state,
28
                           defined in saes.h */
29
30
/* Store a key in our crypt context */
31
int
32
s_aes_set_key(stream_aes_state * state, const unsigned char *key,
33
                  int keylength)
34
3.34k
{
35
3.34k
    int code = 0;
36
37
3.34k
    if ( (keylength < 1) || (keylength > SAES_MAX_KEYLENGTH) )
38
0
        return_error(gs_error_rangecheck);
39
3.34k
    if (key == NULL)
40
0
        return_error(gs_error_invalidaccess);
41
42
    /* we can't set the key here because the interpreter's
43
       filter implementation wants to duplicate our state
44
       after the zfaes.c binding calls us. So stash it now
45
       and handle it in our process method. */
46
3.34k
    memcpy(state->key, key, keylength);
47
3.34k
    state->keylength = keylength;
48
49
3.34k
    if (code) {
50
0
      return gs_throw(gs_error_rangecheck, "could not set AES key");
51
0
    }
52
53
    /* return successfully */
54
3.34k
    return 0;
55
3.34k
}
56
57
/* Specify whether the plaintext stream uses RFC 1423-style padding
58
 * (allowing it to be an arbitrary length), or is unpadded (and must
59
 * therefore be a multiple of 16 bytes long). */
60
void
61
s_aes_set_padding(stream_aes_state *state, int use_padding)
62
3.34k
{
63
3.34k
    state->use_padding = use_padding;
64
3.34k
}
65
66
/* initialize our state object. */
67
static int
68
s_aes_init(stream_state *ss)
69
3.34k
{
70
3.34k
    stream_aes_state *const state = (stream_aes_state *) ss;
71
72
    /* clear the flags so we know we're at the start of a stream */
73
3.34k
    state->initialized = 0;
74
3.34k
    state->ctx = NULL;
75
76
3.34k
    return 0;
77
3.34k
}
78
79
/* release our private storage */
80
static void
81
s_aes_release(stream_state *ss)
82
3.34k
{
83
3.34k
    stream_aes_state *const state = (stream_aes_state *) ss;
84
85
3.34k
    if (state->ctx != NULL)
86
3.33k
        gs_free_object(state->memory, state->ctx, "aes context structure");
87
3.34k
}
88
89
/* (de)crypt a section of text--the procedure is the same
90
 * in each direction. see strimpl.h for return codes.
91
 */
92
static int
93
s_aes_process(stream_state * ss, stream_cursor_read * pr,
94
                  stream_cursor_write * pw, bool last)
95
12.2k
{
96
12.2k
    stream_aes_state *const state = (stream_aes_state *) ss;
97
12.2k
    const unsigned char *limit;
98
12.2k
    const long in_size = pr->limit - pr->ptr;
99
12.2k
    const long out_size = pw->limit - pw->ptr;
100
12.2k
    unsigned char temp[16];
101
12.2k
    int status = 0;
102
103
    /* figure out if we're going to run out of space */
104
12.2k
    if (in_size > out_size) {
105
3.80k
        limit = pr->ptr + out_size;
106
3.80k
        status = 1; /* need more output space */
107
8.43k
    } else {
108
8.43k
        limit = pr->limit;
109
8.43k
        status = last ? EOFC : 0; /* need more input */
110
8.43k
    }
111
112
    /* set up state and context */
113
12.2k
    if (state->ctx == NULL) {
114
      /* allocate the aes context. this is a public struct but it
115
         contains internal pointers, so we need to store it separately
116
         in immovable memory like any opaque structure. */
117
3.33k
      state->ctx = (aes_context *)gs_alloc_bytes_immovable(state->memory,
118
3.33k
                sizeof(aes_context), "aes context structure");
119
3.33k
      if (state->ctx == NULL) {
120
0
        gs_throw(gs_error_VMerror, "could not allocate aes context");
121
0
        return ERRC;
122
0
      }
123
3.33k
      memset(state->ctx, 0x00, sizeof(aes_context));
124
3.33k
      if (state->keylength < 1 || state->keylength > SAES_MAX_KEYLENGTH) {
125
0
        gs_throw1(gs_error_rangecheck, "invalid aes key length (%d bytes)",
126
0
                state->keylength);
127
0
        return ERRC;
128
0
      }
129
3.33k
      aes_setkey_dec(state->ctx, state->key, state->keylength * 8);
130
3.33k
    }
131
12.2k
    if (!state->initialized) {
132
        /* read the initialization vector from the first 16 bytes */
133
5.84k
        if (in_size < 16) return 0; /* get more data */
134
3.33k
        memcpy(state->iv, pr->ptr + 1, 16);
135
3.33k
        state->initialized = 1;
136
3.33k
        pr->ptr += 16;
137
3.33k
    }
138
139
    /* decrypt available blocks */
140
548k
    while (pr->ptr + 16 <= limit) {
141
541k
      aes_crypt_cbc(state->ctx, AES_DECRYPT, 16, state->iv,
142
541k
                                pr->ptr + 1, temp);
143
541k
      pr->ptr += 16;
144
541k
      if (last && pr->ptr == pr->limit) {
145
        /* we're on the last block; unpad if necessary */
146
1.90k
        int pad;
147
148
1.90k
        if (state->use_padding) {
149
          /* we are using RFC 1423-style padding, so the last byte of the
150
             plaintext gives the number of bytes to discard */
151
1.90k
          pad = temp[15];
152
1.90k
          if (pad < 1 || pad > 16) {
153
            /* Bug 692343 - don't error here, just warn. Take padding to be
154
             * zero. This may give us a stream that's too long - preferable
155
             * to the alternatives. */
156
143
            gs_warn1("invalid aes padding byte (0x%02x)",
157
143
                     (unsigned char)pad);
158
143
            pad = 0;
159
143
          }
160
1.90k
        } else {
161
          /* not using padding */
162
0
          pad = 0;
163
0
        }
164
165
1.90k
        memcpy(pw->ptr + 1, temp, 16 - pad);
166
1.90k
        pw->ptr +=  16 - pad;
167
1.90k
        return EOFC;
168
1.90k
      }
169
539k
      memcpy(pw->ptr + 1, temp, 16);
170
539k
      pw->ptr += 16;
171
539k
    }
172
173
    /* if we got to the end of the file without triggering the padding
174
       check, the input must not have been a multiple of 16 bytes long.
175
       complain. */
176
7.81k
    if (status == EOFC) {
177
255
      gs_throw(gs_error_rangecheck, "aes stream isn't a multiple of 16 bytes");
178
255
      return 0;
179
255
    }
180
181
7.56k
    return status;
182
7.81k
}
183
184
/* stream template */
185
const stream_template s_aes_template = {
186
    &st_aes_state, s_aes_init,
187
    s_aes_process, 16, 16,
188
    s_aes_release
189
};