Coverage Report

Created: 2024-11-25 06:30

/src/libtasn1/lib/decoding.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (C) 2002-2024 Free Software Foundation, Inc.
3
 *
4
 * This file is part of LIBTASN1.
5
 *
6
 * The LIBTASN1 library is free software; you can redistribute it
7
 * and/or modify it under the terms of the GNU Lesser General Public
8
 * License as published by the Free Software Foundation; either
9
 * version 2.1 of the License, or (at your option) any later version.
10
 *
11
 * This library is distributed in the hope that it will be useful, but
12
 * WITHOUT ANY WARRANTY; without even the implied warranty of
13
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
 * Lesser General Public License for more details.
15
 *
16
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library; if not, write to the Free Software
18
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19
 * 02110-1301, USA
20
 */
21
22
23
/*****************************************************/
24
/* File: decoding.c                                  */
25
/* Description: Functions to manage DER decoding     */
26
/*****************************************************/
27
28
#include <int.h>
29
#include <parser_aux.h>
30
#include <gstr.h>
31
#include <structure.h>
32
#include <element.h>
33
#include <limits.h>
34
#include <intprops.h>
35
#include "c-ctype.h"
36
37
#ifdef DEBUG
38
# define warn() fprintf(stderr, "%s: %d\n", __func__, __LINE__)
39
#else
40
# define warn()
41
#endif
42
43
410k
#define IS_ERR(len, flags) (len < -1 || ((flags & ASN1_DECODE_FLAG_STRICT_DER) && len < 0))
44
45
0
#define HAVE_TWO(x) (x>=2?1:0)
46
47
/* Decoding flags (dflags) used in several decoding functions.
48
 *  DECODE_FLAG_HAVE_TAG: The provided buffer includes a tag
49
 *  DECODE_FLAG_CONSTRUCTED: The provided buffer is of indefinite encoding (useful
50
 *                           when no tags are present).
51
 *  DECODE_FLAG_LEVEL1: Internal flag to indicate a level of recursion for BER strings.
52
 *  DECODE_FLAG_LEVEL2: Internal flag to indicate two levels of recursion for BER strings.
53
 *  DECODE_FLAG_LEVEL3: Internal flag to indicate three levels of recursion for BER strings.
54
 *                      This is the maximum levels of recursion possible to prevent stack
55
 *                      exhaustion.
56
 */
57
58
20.3k
#define DECODE_FLAG_HAVE_TAG 1
59
6.78k
#define DECODE_FLAG_CONSTRUCTED (1<<1)
60
0
#define DECODE_FLAG_LEVEL1 (1<<2)
61
0
#define DECODE_FLAG_LEVEL2 (1<<3)
62
0
#define DECODE_FLAG_LEVEL3 (1<<4)
63
64
3.15M
#define DECR_LEN(l, s) do { \
65
3.15M
    l -= s; \
66
3.15M
    if (l < 0) { \
67
0
      warn(); \
68
0
      result = ASN1_DER_ERROR; \
69
0
      goto cleanup; \
70
0
    } \
71
3.15M
  } while (0)
72
73
static int
74
_asn1_get_indefinite_length_string (const unsigned char *der, int der_len,
75
            int *len);
76
77
static int
78
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
79
       unsigned int _der_len, unsigned char **str,
80
       unsigned int *str_len, unsigned int *ber_len,
81
       unsigned dflags);
82
83
static int
84
_asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
85
       unsigned int _der_len, const unsigned char **str,
86
       unsigned int *str_len, unsigned dflags);
87
88
static void
89
_asn1_error_description_tag_error (asn1_node node, char *ErrorDescription)
90
0
{
91
92
0
  Estrcpy (ErrorDescription, ":: tag error near element '");
93
0
  _asn1_hierarchical_name (node, ErrorDescription + strlen (ErrorDescription),
94
0
         ASN1_MAX_ERROR_DESCRIPTION_SIZE - 40);
95
0
  Estrcat (ErrorDescription, "'");
96
97
0
}
98
99
/**
100
 * asn1_get_length_der:
101
 * @der: DER data to decode.
102
 * @der_len: Length of DER data to decode.
103
 * @len: Output variable containing the length of the DER length field.
104
 *
105
 * Extract a length field from DER data.
106
 *
107
 * Returns: Return the decoded length value, or -1 on indefinite
108
 *   length, or -2 when the value was too big to fit in a int, or -4
109
 *   when the decoded length value plus @len would exceed @der_len.
110
 **/
111
long
112
asn1_get_length_der (const unsigned char *der, int der_len, int *len)
113
1.27M
{
114
1.27M
  unsigned int ans;
115
1.27M
  int k, punt, sum;
116
117
1.27M
  *len = 0;
118
1.27M
  if (der_len <= 0)
119
0
    return 0;
120
121
1.27M
  if (!(der[0] & 128))
122
1.10M
    {
123
      /* short form */
124
1.10M
      *len = 1;
125
1.10M
      ans = der[0];
126
1.10M
    }
127
173k
  else
128
173k
    {
129
      /* Long form */
130
173k
      k = der[0] & 0x7F;
131
173k
      punt = 1;
132
173k
      if (k)
133
173k
  {     /* definite length method */
134
173k
    ans = 0;
135
454k
    while (punt <= k && punt < der_len)
136
281k
      {
137
281k
        if (INT_MULTIPLY_OVERFLOW (ans, 256))
138
0
    return -2;
139
281k
        ans *= 256;
140
141
281k
        if (INT_ADD_OVERFLOW (ans, ((unsigned) der[punt])))
142
0
    return -2;
143
281k
        ans += der[punt];
144
281k
        punt++;
145
281k
      }
146
173k
  }
147
0
      else
148
0
  {     /* indefinite length method */
149
0
    *len = punt;
150
0
    return -1;
151
0
  }
152
153
173k
      *len = punt;
154
173k
    }
155
156
1.27M
  sum = ans;
157
1.27M
  if (ans >= INT_MAX || INT_ADD_OVERFLOW (sum, (*len)))
158
0
    return -2;
159
1.27M
  sum += *len;
160
161
1.27M
  if (sum > der_len)
162
0
    return -4;
163
164
1.27M
  return ans;
165
1.27M
}
166
167
/**
168
 * asn1_get_tag_der:
169
 * @der: DER data to decode.
170
 * @der_len: Length of DER data to decode.
171
 * @cls: Output variable containing decoded class.
172
 * @len: Output variable containing the length of the DER TAG data.
173
 * @tag: Output variable containing the decoded tag (may be %NULL).
174
 *
175
 * Decode the class and TAG from DER code.
176
 *
177
 * Returns: Returns %ASN1_SUCCESS on success, or an error.
178
 **/
179
int
180
asn1_get_tag_der (const unsigned char *der, int der_len,
181
      unsigned char *cls, int *len, unsigned long *tag)
182
1.29M
{
183
1.29M
  unsigned int ris;
184
1.29M
  int punt;
185
186
1.29M
  if (der == NULL || der_len < 2 || len == NULL)
187
0
    return ASN1_DER_ERROR;
188
189
1.29M
  *cls = der[0] & 0xE0;
190
1.29M
  if ((der[0] & 0x1F) != 0x1F)
191
1.29M
    {
192
      /* short form */
193
1.29M
      *len = 1;
194
1.29M
      ris = der[0] & 0x1F;
195
1.29M
    }
196
0
  else
197
0
    {
198
      /* Long form */
199
0
      punt = 1;
200
0
      ris = 0;
201
0
      while (punt < der_len && der[punt] & 128)
202
0
  {
203
204
0
    if (INT_MULTIPLY_OVERFLOW (ris, 128))
205
0
      return ASN1_DER_ERROR;
206
0
    ris *= 128;
207
208
0
    if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
209
0
      return ASN1_DER_ERROR;
210
0
    ris += (der[punt] & 0x7F);
211
0
    punt++;
212
0
  }
213
214
0
      if (punt >= der_len)
215
0
  return ASN1_DER_ERROR;
216
217
0
      if (INT_MULTIPLY_OVERFLOW (ris, 128))
218
0
  return ASN1_DER_ERROR;
219
0
      ris *= 128;
220
221
0
      if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
222
0
  return ASN1_DER_ERROR;
223
0
      ris += (der[punt] & 0x7F);
224
0
      punt++;
225
226
0
      *len = punt;
227
0
    }
228
229
1.29M
  if (tag)
230
1.29M
    *tag = ris;
231
1.29M
  return ASN1_SUCCESS;
232
1.29M
}
233
234
/**
235
 * asn1_get_length_ber:
236
 * @ber: BER data to decode.
237
 * @ber_len: Length of BER data to decode.
238
 * @len: Output variable containing the length of the BER length field.
239
 *
240
 * Extract a length field from BER data.  The difference to
241
 * asn1_get_length_der() is that this function will return a length
242
 * even if the value has indefinite encoding.
243
 *
244
 * Returns: Return the decoded length value, or negative value when
245
 *   the value was too big.
246
 *
247
 * Since: 2.0
248
 **/
249
long
250
asn1_get_length_ber (const unsigned char *ber, int ber_len, int *len)
251
6.78k
{
252
6.78k
  int ret;
253
6.78k
  long err;
254
255
6.78k
  ret = asn1_get_length_der (ber, ber_len, len);
256
257
6.78k
  if (ret == -1 && ber_len > 1)
258
0
    {       /* indefinite length method */
259
0
      err = _asn1_get_indefinite_length_string (ber + 1, ber_len - 1, &ret);
260
0
      if (err != ASN1_SUCCESS)
261
0
  return -3;
262
0
    }
263
264
6.78k
  return ret;
265
6.78k
}
266
267
/**
268
 * asn1_get_octet_der:
269
 * @der: DER data to decode containing the OCTET SEQUENCE.
270
 * @der_len: The length of the @der data to decode.
271
 * @ret_len: Output variable containing the encoded length of the DER data.
272
 * @str: Pre-allocated output buffer to put decoded OCTET SEQUENCE in.
273
 * @str_size: Length of pre-allocated output buffer.
274
 * @str_len: Output variable containing the length of the contents of the OCTET SEQUENCE.
275
 *
276
 * Extract an OCTET SEQUENCE from DER data. Note that this function
277
 * expects the DER data past the tag field, i.e., the length and
278
 * content octets.
279
 *
280
 * Returns: Returns %ASN1_SUCCESS on success, or an error.
281
 **/
282
int
283
asn1_get_octet_der (const unsigned char *der, int der_len,
284
        int *ret_len, unsigned char *str, int str_size,
285
        int *str_len)
286
210k
{
287
210k
  int len_len = 0;
288
289
210k
  if (der_len <= 0)
290
0
    return ASN1_GENERIC_ERROR;
291
292
210k
  *str_len = asn1_get_length_der (der, der_len, &len_len);
293
294
210k
  if (*str_len < 0)
295
0
    return ASN1_DER_ERROR;
296
297
210k
  *ret_len = *str_len + len_len;
298
210k
  if (str_size >= *str_len)
299
112k
    {
300
112k
      if (*str_len > 0 && str != NULL)
301
112k
  memcpy (str, der + len_len, *str_len);
302
112k
    }
303
98.4k
  else
304
98.4k
    {
305
98.4k
      return ASN1_MEM_ERROR;
306
98.4k
    }
307
308
112k
  return ASN1_SUCCESS;
309
210k
}
310
311
312
/*-
313
 * _asn1_get_time_der:
314
 * @type: %ASN1_ETYPE_GENERALIZED_TIME or %ASN1_ETYPE_UTC_TIME
315
 * @der: DER data to decode containing the time
316
 * @der_len: Length of DER data to decode.
317
 * @ret_len: Output variable containing the length of the DER data.
318
 * @str: Pre-allocated output buffer to put the textual time in.
319
 * @str_size: Length of pre-allocated output buffer.
320
 * @flags: Zero or %ASN1_DECODE_FLAG_STRICT_DER
321
 *
322
 * Performs basic checks in the DER encoded time object and returns its textual form.
323
 * The textual form will be in the YYYYMMDD000000Z format for GeneralizedTime
324
 * and YYMMDD000000Z for UTCTime.
325
 *
326
 * Returns: %ASN1_SUCCESS on success, or an error.
327
 -*/
328
static int
329
_asn1_get_time_der (unsigned type, const unsigned char *der, int der_len,
330
        int *ret_len, char *str, int str_size, unsigned flags)
331
27.1k
{
332
27.1k
  int len_len, str_len;
333
27.1k
  unsigned i;
334
27.1k
  unsigned sign_count = 0;
335
27.1k
  unsigned dot_count = 0;
336
27.1k
  const unsigned char *p;
337
338
27.1k
  if (der_len <= 0 || str == NULL)
339
0
    return ASN1_DER_ERROR;
340
341
27.1k
  str_len = asn1_get_length_der (der, der_len, &len_len);
342
27.1k
  if (str_len <= 0 || str_size < str_len)
343
0
    return ASN1_DER_ERROR;
344
345
  /* perform some sanity checks on the data */
346
27.1k
  if (str_len < 8)
347
0
    {
348
0
      warn ();
349
0
      return ASN1_TIME_ENCODING_ERROR;
350
0
    }
351
352
27.1k
  if ((flags & ASN1_DECODE_FLAG_STRICT_DER)
353
27.1k
      && !(flags & ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME))
354
27.1k
    {
355
27.1k
      p = &der[len_len];
356
380k
      for (i = 0; i < (unsigned) (str_len - 1); i++)
357
352k
  {
358
352k
    if (c_isdigit (p[i]) == 0)
359
0
      {
360
0
        if (type == ASN1_ETYPE_GENERALIZED_TIME)
361
0
    {
362
      /* tolerate lax encodings */
363
0
      if (p[i] == '.' && dot_count == 0)
364
0
        {
365
0
          dot_count++;
366
0
          continue;
367
0
        }
368
369
      /* This is not really valid DER, but there are
370
       * structures using that */
371
0
      if (!(flags & ASN1_DECODE_FLAG_STRICT_DER) &&
372
0
          (p[i] == '+' || p[i] == '-') && sign_count == 0)
373
0
        {
374
0
          sign_count++;
375
0
          continue;
376
0
        }
377
0
    }
378
379
0
        warn ();
380
0
        return ASN1_TIME_ENCODING_ERROR;
381
0
      }
382
352k
  }
383
384
27.1k
      if (sign_count == 0 && p[str_len - 1] != 'Z')
385
0
  {
386
0
    warn ();
387
0
    return ASN1_TIME_ENCODING_ERROR;
388
0
  }
389
27.1k
    }
390
27.1k
  memcpy (str, der + len_len, str_len);
391
27.1k
  str[str_len] = 0;
392
27.1k
  *ret_len = str_len + len_len;
393
394
27.1k
  return ASN1_SUCCESS;
395
27.1k
}
396
397
/**
398
 * asn1_get_object_id_der:
399
 * @der: DER data to decode containing the OBJECT IDENTIFIER
400
 * @der_len: Length of DER data to decode.
401
 * @ret_len: Output variable containing the length of the DER data.
402
 * @str: Pre-allocated output buffer to put the textual object id in.
403
 * @str_size: Length of pre-allocated output buffer.
404
 *
405
 * Converts a DER encoded object identifier to its textual form. This
406
 * function expects the DER object identifier without the tag.
407
 *
408
 * Returns: %ASN1_SUCCESS on success, or an error.
409
 **/
410
int
411
asn1_get_object_id_der (const unsigned char *der, int der_len, int *ret_len,
412
      char *str, int str_size)
413
162k
{
414
162k
  int len_len, len, k;
415
162k
  int leading, parsed;
416
162k
  char temp[LTOSTR_MAX_SIZE];
417
162k
  uint64_t val, val1, val0;
418
419
162k
  *ret_len = 0;
420
162k
  if (str && str_size > 0)
421
162k
    str[0] = 0;     /* no oid */
422
423
162k
  if (str == NULL || der_len <= 0)
424
0
    return ASN1_GENERIC_ERROR;
425
426
162k
  len = asn1_get_length_der (der, der_len, &len_len);
427
428
162k
  if (len <= 0 || len + len_len > der_len)
429
0
    return ASN1_DER_ERROR;
430
431
  /* leading octet can never be 0x80 */
432
162k
  if (der[len_len] == 0x80)
433
0
    return ASN1_DER_ERROR;
434
435
162k
  val0 = 0;
436
437
162k
  for (k = 0; k < len; k++)
438
162k
    {
439
162k
      if (INT_LEFT_SHIFT_OVERFLOW (val0, 7))
440
0
  return ASN1_DER_ERROR;
441
442
162k
      val0 <<= 7;
443
162k
      val0 |= der[len_len + k] & 0x7F;
444
162k
      if (!(der[len_len + k] & 0x80))
445
162k
  break;
446
162k
    }
447
162k
  parsed = ++k;
448
449
  /* val0 = (X*40) + Y, X={0,1,2}, Y<=39 when X={0,1} */
450
  /* X = val, Y = val1 */
451
452
  /* check if X == 0  */
453
162k
  val = 0;
454
162k
  val1 = val0;
455
162k
  if (val1 > 39)
456
162k
    {
457
162k
      val = 1;
458
162k
      val1 = val0 - 40;
459
162k
      if (val1 > 39)
460
105k
  {
461
105k
    val = 2;
462
105k
    val1 = val0 - 80;
463
105k
  }
464
162k
    }
465
466
162k
  _asn1_str_cpy (str, str_size, _asn1_ltostr (val, temp));
467
162k
  _asn1_str_cat (str, str_size, ".");
468
162k
  _asn1_str_cat (str, str_size, _asn1_ltostr (val1, temp));
469
470
162k
  val = 0;
471
162k
  leading = 1;
472
729k
  for (k = parsed; k < len; k++)
473
566k
    {
474
      /* X.690 mandates that the leading byte must never be 0x80
475
       */
476
566k
      if (leading != 0 && der[len_len + k] == 0x80)
477
0
  return ASN1_DER_ERROR;
478
566k
      leading = 0;
479
480
      /* check for wrap around */
481
566k
      if (INT_LEFT_SHIFT_OVERFLOW (val, 7))
482
0
  return ASN1_DER_ERROR;
483
484
566k
      val = val << 7;
485
566k
      val |= der[len_len + k] & 0x7F;
486
487
566k
      if (!(der[len_len + k] & 0x80))
488
454k
  {
489
454k
    _asn1_str_cat (str, str_size, ".");
490
454k
    _asn1_str_cat (str, str_size, _asn1_ltostr (val, temp));
491
454k
    val = 0;
492
454k
    leading = 1;
493
454k
  }
494
566k
    }
495
496
162k
  if (INT_ADD_OVERFLOW (len, len_len))
497
0
    return ASN1_DER_ERROR;
498
499
162k
  *ret_len = len + len_len;
500
501
162k
  return ASN1_SUCCESS;
502
162k
}
503
504
/**
505
 * asn1_get_bit_der:
506
 * @der: DER data to decode containing the BIT SEQUENCE.
507
 * @der_len: Length of DER data to decode.
508
 * @ret_len: Output variable containing the length of the DER data.
509
 * @str: Pre-allocated output buffer to put decoded BIT SEQUENCE in.
510
 * @str_size: Length of pre-allocated output buffer.
511
 * @bit_len: Output variable containing the size of the BIT SEQUENCE.
512
 *
513
 * Extract a BIT SEQUENCE from DER data.
514
 *
515
 * Returns: %ASN1_SUCCESS on success, or an error.
516
 **/
517
int
518
asn1_get_bit_der (const unsigned char *der, int der_len,
519
      int *ret_len, unsigned char *str, int str_size,
520
      int *bit_len)
521
61.0k
{
522
61.0k
  int len_len = 0, len_byte;
523
524
61.0k
  if (der_len <= 0)
525
0
    return ASN1_GENERIC_ERROR;
526
527
61.0k
  len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
528
61.0k
  if (len_byte < 0)
529
0
    return ASN1_DER_ERROR;
530
531
61.0k
  *ret_len = len_byte + len_len + 1;
532
61.0k
  *bit_len = len_byte * 8 - der[len_len];
533
534
61.0k
  if (*bit_len < 0)
535
0
    return ASN1_DER_ERROR;
536
537
61.0k
  if (str_size >= len_byte)
538
37.3k
    {
539
37.3k
      if (len_byte > 0 && str)
540
37.3k
  memcpy (str, der + len_len + 1, len_byte);
541
37.3k
    }
542
23.7k
  else
543
23.7k
    {
544
23.7k
      return ASN1_MEM_ERROR;
545
23.7k
    }
546
547
37.3k
  return ASN1_SUCCESS;
548
61.0k
}
549
550
/* tag_len: the total tag length (explicit+inner)
551
 * inner_tag_len: the inner_tag length
552
 */
553
static int
554
_asn1_extract_tag_der (asn1_node node, const unsigned char *der, int der_len,
555
           int *tag_len, int *inner_tag_len, unsigned flags)
556
1.16M
{
557
1.16M
  asn1_node p;
558
1.16M
  int counter, len2, len3, is_tag_implicit;
559
1.16M
  int result;
560
1.16M
  unsigned long tag, tag_implicit = 0;
561
1.16M
  unsigned char class, class2, class_implicit = 0;
562
563
1.16M
  if (der_len <= 0)
564
0
    return ASN1_GENERIC_ERROR;
565
566
1.16M
  counter = is_tag_implicit = 0;
567
568
1.16M
  if (node->type & CONST_TAG)
569
118k
    {
570
118k
      p = node->down;
571
285k
      while (p)
572
166k
  {
573
166k
    if (type_field (p->type) == ASN1_ETYPE_TAG)
574
118k
      {
575
118k
        if (p->type & CONST_APPLICATION)
576
0
    class2 = ASN1_CLASS_APPLICATION;
577
118k
        else if (p->type & CONST_UNIVERSAL)
578
0
    class2 = ASN1_CLASS_UNIVERSAL;
579
118k
        else if (p->type & CONST_PRIVATE)
580
0
    class2 = ASN1_CLASS_PRIVATE;
581
118k
        else
582
118k
    class2 = ASN1_CLASS_CONTEXT_SPECIFIC;
583
584
118k
        if (p->type & CONST_EXPLICIT)
585
40.7k
    {
586
40.7k
      if (asn1_get_tag_der
587
40.7k
          (der + counter, der_len, &class, &len2,
588
40.7k
           &tag) != ASN1_SUCCESS)
589
0
        return ASN1_DER_ERROR;
590
591
40.7k
      DECR_LEN (der_len, len2);
592
40.7k
      counter += len2;
593
594
40.7k
      if (flags & ASN1_DECODE_FLAG_STRICT_DER)
595
40.7k
        len3 =
596
40.7k
          asn1_get_length_der (der + counter, der_len, &len2);
597
0
      else
598
0
        len3 =
599
0
          asn1_get_length_ber (der + counter, der_len, &len2);
600
40.7k
      if (len3 < 0)
601
0
        return ASN1_DER_ERROR;
602
603
40.7k
      DECR_LEN (der_len, len2);
604
40.7k
      counter += len2;
605
606
40.7k
      if (!is_tag_implicit)
607
40.7k
        {
608
40.7k
          if ((class != (class2 | ASN1_CLASS_STRUCTURED)) ||
609
40.7k
        (tag != strtoul ((char *) p->value, NULL, 10)))
610
0
      return ASN1_TAG_ERROR;
611
40.7k
        }
612
0
      else
613
0
        {   /* ASN1_TAG_IMPLICIT */
614
0
          if ((class != class_implicit) || (tag != tag_implicit))
615
0
      return ASN1_TAG_ERROR;
616
0
        }
617
40.7k
      is_tag_implicit = 0;
618
40.7k
    }
619
78.0k
        else
620
78.0k
    {   /* ASN1_TAG_IMPLICIT */
621
78.0k
      if (!is_tag_implicit)
622
78.0k
        {
623
78.0k
          if ((type_field (node->type) == ASN1_ETYPE_SEQUENCE) ||
624
78.0k
        (type_field (node->type) == ASN1_ETYPE_SEQUENCE_OF)
625
78.0k
        || (type_field (node->type) == ASN1_ETYPE_SET)
626
78.0k
        || (type_field (node->type) == ASN1_ETYPE_SET_OF))
627
10.1k
      class2 |= ASN1_CLASS_STRUCTURED;
628
78.0k
          class_implicit = class2;
629
78.0k
          tag_implicit = strtoul ((char *) p->value, NULL, 10);
630
78.0k
          is_tag_implicit = 1;
631
78.0k
        }
632
78.0k
    }
633
118k
      }
634
166k
    p = p->right;
635
166k
  }
636
118k
    }
637
638
1.16M
  if (is_tag_implicit)
639
78.0k
    {
640
78.0k
      if (asn1_get_tag_der
641
78.0k
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
642
0
  return ASN1_DER_ERROR;
643
644
78.0k
      DECR_LEN (der_len, len2);
645
646
78.0k
      if ((class != class_implicit) || (tag != tag_implicit))
647
47.5k
  {
648
47.5k
    if (type_field (node->type) == ASN1_ETYPE_OCTET_STRING)
649
0
      {
650
0
        class_implicit |= ASN1_CLASS_STRUCTURED;
651
0
        if ((class != class_implicit) || (tag != tag_implicit))
652
0
    return ASN1_TAG_ERROR;
653
0
      }
654
47.5k
    else
655
47.5k
      return ASN1_TAG_ERROR;
656
47.5k
  }
657
78.0k
    }
658
1.08M
  else
659
1.08M
    {
660
1.08M
      unsigned type = type_field (node->type);
661
1.08M
      if (type == ASN1_ETYPE_TAG)
662
0
  {
663
0
    *tag_len = 0;
664
0
    if (inner_tag_len)
665
0
      *inner_tag_len = 0;
666
0
    return ASN1_SUCCESS;
667
0
  }
668
669
1.08M
      if (asn1_get_tag_der
670
1.08M
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
671
0
  return ASN1_DER_ERROR;
672
673
1.08M
      DECR_LEN (der_len, len2);
674
675
1.08M
      switch (type)
676
1.08M
  {
677
0
  case ASN1_ETYPE_NULL:
678
67.8k
  case ASN1_ETYPE_BOOLEAN:
679
203k
  case ASN1_ETYPE_INTEGER:
680
203k
  case ASN1_ETYPE_ENUMERATED:
681
386k
  case ASN1_ETYPE_OBJECT_ID:
682
386k
  case ASN1_ETYPE_GENERALSTRING:
683
386k
  case ASN1_ETYPE_NUMERIC_STRING:
684
386k
  case ASN1_ETYPE_IA5_STRING:
685
390k
  case ASN1_ETYPE_TELETEX_STRING:
686
400k
  case ASN1_ETYPE_PRINTABLE_STRING:
687
400k
  case ASN1_ETYPE_UNIVERSAL_STRING:
688
400k
  case ASN1_ETYPE_BMP_STRING:
689
400k
  case ASN1_ETYPE_UTF8_STRING:
690
400k
  case ASN1_ETYPE_VISIBLE_STRING:
691
444k
  case ASN1_ETYPE_BIT_STRING:
692
702k
  case ASN1_ETYPE_SEQUENCE:
693
807k
  case ASN1_ETYPE_SEQUENCE_OF:
694
807k
  case ASN1_ETYPE_SET:
695
845k
  case ASN1_ETYPE_SET_OF:
696
885k
  case ASN1_ETYPE_GENERALIZED_TIME:
697
940k
  case ASN1_ETYPE_UTC_TIME:
698
940k
    if ((class != _asn1_tags[type].class)
699
940k
        || (tag != _asn1_tags[type].tag))
700
78.0k
      return ASN1_DER_ERROR;
701
862k
    break;
702
703
862k
  case ASN1_ETYPE_OCTET_STRING:
704
    /* OCTET STRING is handled differently to allow
705
     * BER encodings (structured class). */
706
84.8k
    if (((class != ASN1_CLASS_UNIVERSAL)
707
84.8k
         && (class != (ASN1_CLASS_UNIVERSAL | ASN1_CLASS_STRUCTURED)))
708
84.8k
        || (tag != ASN1_TAG_OCTET_STRING))
709
6.78k
      return ASN1_DER_ERROR;
710
78.0k
    break;
711
78.0k
  case ASN1_ETYPE_ANY:
712
64.4k
    counter -= len2;
713
64.4k
    break;
714
0
  case ASN1_ETYPE_CHOICE:
715
0
    counter -= len2;
716
0
    break;
717
0
  default:
718
0
    return ASN1_DER_ERROR;
719
0
    break;
720
1.08M
  }
721
1.08M
    }
722
723
1.03M
  counter += len2;
724
1.03M
  *tag_len = counter;
725
1.03M
  if (inner_tag_len)
726
957k
    *inner_tag_len = len2;
727
1.03M
  return ASN1_SUCCESS;
728
729
0
cleanup:
730
0
  return result;
731
1.16M
}
732
733
static int
734
extract_tag_der_recursive (asn1_node node, const unsigned char *der,
735
         int der_len, int *ret_len, int *inner_len,
736
         unsigned flags)
737
1.16M
{
738
1.16M
  asn1_node p;
739
1.16M
  int ris = ASN1_DER_ERROR;
740
741
1.16M
  if (type_field (node->type) == ASN1_ETYPE_CHOICE)
742
78.0k
    {
743
78.0k
      p = node->down;
744
78.0k
      while (p)
745
78.0k
  {
746
78.0k
    ris =
747
78.0k
      _asn1_extract_tag_der (p, der, der_len, ret_len, inner_len,
748
78.0k
           flags);
749
78.0k
    if (ris == ASN1_SUCCESS)
750
78.0k
      break;
751
0
    p = p->right;
752
0
  }
753
754
78.0k
      *ret_len = 0;
755
78.0k
      return ris;
756
78.0k
    }
757
1.08M
  else
758
1.08M
    return _asn1_extract_tag_der (node, der, der_len, ret_len, inner_len,
759
1.08M
          flags);
760
1.16M
}
761
762
static int
763
_asn1_delete_not_used (asn1_node node)
764
71.2k
{
765
71.2k
  asn1_node p, p2;
766
767
71.2k
  if (node == NULL)
768
0
    return ASN1_ELEMENT_NOT_FOUND;
769
770
71.2k
  p = node;
771
1.86M
  while (p)
772
1.79M
    {
773
1.79M
      if (p->type & CONST_NOT_USED)
774
27.1k
  {
775
27.1k
    p2 = NULL;
776
27.1k
    if (p != node)
777
27.1k
      {
778
27.1k
        p2 = _asn1_find_left (p);
779
27.1k
        if (!p2)
780
0
    p2 = _asn1_find_up (p);
781
27.1k
      }
782
27.1k
    asn1_delete_structure (&p);
783
27.1k
    p = p2;
784
27.1k
  }
785
786
1.79M
      if (!p)
787
0
  break;     /* reach node */
788
789
1.79M
      if (p->down)
790
841k
  {
791
841k
    p = p->down;
792
841k
  }
793
953k
      else
794
953k
  {
795
953k
    if (p == node)
796
13.5k
      p = NULL;
797
940k
    else if (p->right)
798
366k
      p = p->right;
799
573k
    else
800
573k
      {
801
841k
        while (1)
802
841k
    {
803
841k
      p = _asn1_find_up (p);
804
841k
      if (p == node)
805
57.6k
        {
806
57.6k
          p = NULL;
807
57.6k
          break;
808
57.6k
        }
809
784k
      if (p->right)
810
515k
        {
811
515k
          p = p->right;
812
515k
          break;
813
515k
        }
814
784k
    }
815
573k
      }
816
953k
  }
817
1.79M
    }
818
71.2k
  return ASN1_SUCCESS;
819
71.2k
}
820
821
static int
822
_asn1_get_indefinite_length_string (const unsigned char *der,
823
            int der_len, int *len)
824
0
{
825
0
  int len2, len3, counter, indefinite;
826
0
  int result;
827
0
  unsigned long tag;
828
0
  unsigned char class;
829
830
0
  counter = indefinite = 0;
831
832
0
  while (1)
833
0
    {
834
0
      if (HAVE_TWO (der_len) && (der[counter] == 0)
835
0
    && (der[counter + 1] == 0))
836
0
  {
837
0
    counter += 2;
838
0
    DECR_LEN (der_len, 2);
839
840
0
    indefinite--;
841
0
    if (indefinite <= 0)
842
0
      break;
843
0
    else
844
0
      continue;
845
0
  }
846
847
0
      if (asn1_get_tag_der
848
0
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
849
0
  return ASN1_DER_ERROR;
850
851
0
      DECR_LEN (der_len, len2);
852
0
      counter += len2;
853
854
0
      len2 = asn1_get_length_der (der + counter, der_len, &len3);
855
0
      if (len2 < -1)
856
0
  return ASN1_DER_ERROR;
857
858
0
      if (len2 == -1)
859
0
  {
860
0
    indefinite++;
861
0
    counter += 1;
862
0
    DECR_LEN (der_len, 1);
863
0
  }
864
0
      else
865
0
  {
866
0
    counter += len2 + len3;
867
0
    DECR_LEN (der_len, len2 + len3);
868
0
  }
869
0
    }
870
871
0
  *len = counter;
872
0
  return ASN1_SUCCESS;
873
874
0
cleanup:
875
0
  return result;
876
0
}
877
878
static void
879
delete_unneeded_choice_fields (asn1_node p)
880
78.0k
{
881
78.0k
  asn1_node p2;
882
883
162k
  while (p->right)
884
84.8k
    {
885
84.8k
      p2 = p->right;
886
84.8k
      asn1_delete_structure (&p2);
887
84.8k
    }
888
78.0k
}
889
890
891
/**
892
 * asn1_der_decoding2
893
 * @element: pointer to an ASN1 structure.
894
 * @ider: vector that contains the DER encoding.
895
 * @max_ider_len: pointer to an integer giving the information about the
896
 *   maximal number of bytes occupied by *@ider. The real size of the DER
897
 *   encoding is returned through this pointer.
898
 * @flags: flags controlling the behaviour of the function.
899
 * @errorDescription: null-terminated string contains details when an
900
 *   error occurred.
901
 *
902
 * Fill the structure *@element with values of a DER encoding string. The
903
 * structure must just be created with function asn1_create_element().
904
 *
905
 * If %ASN1_DECODE_FLAG_ALLOW_PADDING flag is set then the function will ignore
906
 * padding after the decoded DER data. Upon a successful return the value of
907
 * *@max_ider_len will be set to the number of bytes decoded.
908
 *
909
 * If %ASN1_DECODE_FLAG_STRICT_DER flag is set then the function will
910
 * not decode any BER-encoded elements.
911
 *
912
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
913
 *   if @ELEMENT is %NULL, and %ASN1_TAG_ERROR or
914
 *   %ASN1_DER_ERROR if the der encoding doesn't match the structure
915
 *   name (*@ELEMENT deleted).
916
 **/
917
int
918
asn1_der_decoding2 (asn1_node *element, const void *ider, int *max_ider_len,
919
        unsigned int flags, char *errorDescription)
920
98.4k
{
921
98.4k
  asn1_node node, p, p2, p3;
922
98.4k
  char temp[128];
923
98.4k
  int counter, len2, len3, len4, move, ris, tlen;
924
98.4k
  struct node_tail_cache_st tcache = { NULL, NULL };
925
98.4k
  unsigned char class;
926
98.4k
  unsigned long tag;
927
98.4k
  int tag_len;
928
98.4k
  int indefinite, result, total_len = *max_ider_len, ider_len = *max_ider_len;
929
98.4k
  int inner_tag_len;
930
98.4k
  unsigned char *ptmp;
931
98.4k
  const unsigned char *ptag;
932
98.4k
  const unsigned char *der = ider;
933
934
98.4k
  node = *element;
935
936
98.4k
  if (errorDescription != NULL)
937
3.39k
    errorDescription[0] = 0;
938
939
98.4k
  if (node == NULL)
940
0
    return ASN1_ELEMENT_NOT_FOUND;
941
942
98.4k
  if (node->type & CONST_OPTION)
943
0
    {
944
0
      result = ASN1_GENERIC_ERROR;
945
0
      warn ();
946
0
      goto cleanup;
947
0
    }
948
949
98.4k
  counter = 0;
950
98.4k
  move = DOWN;
951
98.4k
  p = node;
952
1.54M
  while (1)
953
1.54M
    {
954
1.54M
      tag_len = 0;
955
1.54M
      inner_tag_len = 0;
956
1.54M
      ris = ASN1_SUCCESS;
957
1.54M
      if (move != UP)
958
1.08M
  {
959
1.08M
    if (p->type & CONST_SET)
960
0
      {
961
0
        p2 = _asn1_find_up (p);
962
0
        len2 = p2->tmp_ival;
963
0
        if (len2 == -1)
964
0
    {
965
0
      if (HAVE_TWO (ider_len) && !der[counter]
966
0
          && !der[counter + 1])
967
0
        {
968
0
          p = p2;
969
0
          move = UP;
970
0
          counter += 2;
971
0
          DECR_LEN (ider_len, 2);
972
0
          continue;
973
0
        }
974
0
    }
975
0
        else if (counter == len2)
976
0
    {
977
0
      p = p2;
978
0
      move = UP;
979
0
      continue;
980
0
    }
981
0
        else if (counter > len2)
982
0
    {
983
0
      result = ASN1_DER_ERROR;
984
0
      warn ();
985
0
      goto cleanup;
986
0
    }
987
0
        p2 = p2->down;
988
0
        while (p2)
989
0
    {
990
0
      if ((p2->type & CONST_SET) && (p2->type & CONST_NOT_USED))
991
0
        {
992
0
          ris =
993
0
      extract_tag_der_recursive (p2, der + counter,
994
0
               ider_len, &len2, NULL,
995
0
               flags);
996
0
          if (ris == ASN1_SUCCESS)
997
0
      {
998
0
        p2->type &= ~CONST_NOT_USED;
999
0
        p = p2;
1000
0
        break;
1001
0
      }
1002
0
        }
1003
0
      p2 = p2->right;
1004
0
    }
1005
0
        if (p2 == NULL)
1006
0
    {
1007
0
      result = ASN1_DER_ERROR;
1008
0
      warn ();
1009
0
      goto cleanup;
1010
0
    }
1011
0
      }
1012
1013
    /* the position in the DER structure this starts */
1014
1.08M
    p->start = counter;
1015
1.08M
    p->end = total_len - 1;
1016
1017
1.08M
    if ((p->type & CONST_OPTION) || (p->type & CONST_DEFAULT))
1018
186k
      {
1019
186k
        p2 = _asn1_find_up (p);
1020
186k
        len2 = p2->tmp_ival;
1021
186k
        if (counter == len2)
1022
30.5k
    {
1023
30.5k
      if (p->right)
1024
0
        {
1025
0
          p2 = p->right;
1026
0
          move = RIGHT;
1027
0
        }
1028
30.5k
      else
1029
30.5k
        move = UP;
1030
1031
30.5k
      if (p->type & CONST_OPTION)
1032
30.5k
        asn1_delete_structure (&p);
1033
1034
30.5k
      p = p2;
1035
30.5k
      continue;
1036
30.5k
    }
1037
186k
      }
1038
1039
1.05M
    if (type_field (p->type) == ASN1_ETYPE_CHOICE)
1040
78.0k
      {
1041
115k
        while (p->down)
1042
115k
    {
1043
115k
      ris =
1044
115k
        extract_tag_der_recursive (p->down, der + counter,
1045
115k
                 ider_len, &len2, NULL, flags);
1046
1047
115k
      if (ris == ASN1_SUCCESS)
1048
78.0k
        {
1049
78.0k
          delete_unneeded_choice_fields (p->down);
1050
78.0k
          break;
1051
78.0k
        }
1052
37.3k
      else if (ris == ASN1_ERROR_TYPE_ANY)
1053
0
        {
1054
0
          result = ASN1_ERROR_TYPE_ANY;
1055
0
          warn ();
1056
0
          goto cleanup;
1057
0
        }
1058
37.3k
      else
1059
37.3k
        {
1060
37.3k
          p2 = p->down;
1061
37.3k
          asn1_delete_structure (&p2);
1062
37.3k
        }
1063
115k
    }
1064
1065
78.0k
        if (p->down == NULL)
1066
0
    {
1067
0
      if (!(p->type & CONST_OPTION))
1068
0
        {
1069
0
          result = ASN1_DER_ERROR;
1070
0
          warn ();
1071
0
          goto cleanup;
1072
0
        }
1073
0
    }
1074
78.0k
        else if (type_field (p->type) != ASN1_ETYPE_CHOICE)
1075
0
    p = p->down;
1076
1077
78.0k
        p->start = counter;
1078
78.0k
      }
1079
1080
1.05M
    if ((p->type & CONST_OPTION) || (p->type & CONST_DEFAULT))
1081
156k
      {
1082
156k
        p2 = _asn1_find_up (p);
1083
156k
        len2 = p2->tmp_ival;
1084
1085
156k
        if ((len2 != -1) && (counter > len2))
1086
0
    ris = ASN1_TAG_ERROR;
1087
156k
      }
1088
1089
1.05M
    if (ris == ASN1_SUCCESS)
1090
1.05M
      ris =
1091
1.05M
        extract_tag_der_recursive (p, der + counter, ider_len,
1092
1.05M
           &tag_len, &inner_tag_len, flags);
1093
1094
1.05M
    if (ris != ASN1_SUCCESS)
1095
95.0k
      {
1096
95.0k
        if (p->type & CONST_OPTION)
1097
27.1k
    {
1098
27.1k
      p->type |= CONST_NOT_USED;
1099
27.1k
      move = RIGHT;
1100
27.1k
    }
1101
67.8k
        else if (p->type & CONST_DEFAULT)
1102
40.7k
    {
1103
40.7k
      _asn1_set_value (p, NULL, 0);
1104
40.7k
      move = RIGHT;
1105
40.7k
    }
1106
27.1k
        else
1107
27.1k
    {
1108
27.1k
      if (errorDescription != NULL)
1109
0
        _asn1_error_description_tag_error (p, errorDescription);
1110
1111
27.1k
      result = ASN1_TAG_ERROR;
1112
27.1k
      warn ();
1113
27.1k
      goto cleanup;
1114
27.1k
    }
1115
95.0k
      }
1116
957k
    else
1117
957k
      {
1118
957k
        DECR_LEN (ider_len, tag_len);
1119
957k
        counter += tag_len;
1120
957k
      }
1121
1.05M
  }
1122
1123
1.48M
      if (ris == ASN1_SUCCESS)
1124
1.41M
  {
1125
1.41M
    switch (type_field (p->type))
1126
1.41M
      {
1127
0
      case ASN1_ETYPE_NULL:
1128
0
        DECR_LEN (ider_len, 1);
1129
0
        if (der[counter])
1130
0
    {
1131
0
      result = ASN1_DER_ERROR;
1132
0
      warn ();
1133
0
      goto cleanup;
1134
0
    }
1135
0
        counter++;
1136
0
        move = RIGHT;
1137
0
        break;
1138
27.1k
      case ASN1_ETYPE_BOOLEAN:
1139
27.1k
        DECR_LEN (ider_len, 2);
1140
1141
27.1k
        if (der[counter++] != 1)
1142
0
    {
1143
0
      result = ASN1_DER_ERROR;
1144
0
      warn ();
1145
0
      goto cleanup;
1146
0
    }
1147
27.1k
        if (der[counter++] == 0)
1148
0
    _asn1_set_value (p, "F", 1);
1149
27.1k
        else
1150
27.1k
    _asn1_set_value (p, "T", 1);
1151
27.1k
        move = RIGHT;
1152
27.1k
        break;
1153
115k
      case ASN1_ETYPE_INTEGER:
1154
115k
      case ASN1_ETYPE_ENUMERATED:
1155
115k
        len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1156
115k
        if (len2 < 0)
1157
0
    {
1158
0
      result = ASN1_DER_ERROR;
1159
0
      warn ();
1160
0
      goto cleanup;
1161
0
    }
1162
1163
115k
        DECR_LEN (ider_len, len3 + len2);
1164
1165
115k
        _asn1_set_value (p, der + counter, len3 + len2);
1166
115k
        counter += len3 + len2;
1167
115k
        move = RIGHT;
1168
115k
        break;
1169
162k
      case ASN1_ETYPE_OBJECT_ID:
1170
162k
        result =
1171
162k
    asn1_get_object_id_der (der + counter, ider_len, &len2,
1172
162k
          temp, sizeof (temp));
1173
162k
        if (result != ASN1_SUCCESS)
1174
0
    {
1175
0
      warn ();
1176
0
      goto cleanup;
1177
0
    }
1178
1179
162k
        DECR_LEN (ider_len, len2);
1180
1181
162k
        tlen = strlen (temp);
1182
162k
        if (tlen > 0)
1183
162k
    _asn1_set_value (p, temp, tlen + 1);
1184
1185
162k
        counter += len2;
1186
162k
        move = RIGHT;
1187
162k
        break;
1188
13.5k
      case ASN1_ETYPE_GENERALIZED_TIME:
1189
27.1k
      case ASN1_ETYPE_UTC_TIME:
1190
27.1k
        result =
1191
27.1k
    _asn1_get_time_der (type_field (p->type), der + counter,
1192
27.1k
            ider_len, &len2, temp, sizeof (temp) - 1,
1193
27.1k
            flags);
1194
27.1k
        if (result != ASN1_SUCCESS)
1195
0
    {
1196
0
      warn ();
1197
0
      goto cleanup;
1198
0
    }
1199
1200
27.1k
        DECR_LEN (ider_len, len2);
1201
1202
27.1k
        tlen = strlen (temp);
1203
27.1k
        if (tlen > 0)
1204
27.1k
    _asn1_set_value (p, temp, tlen);
1205
1206
27.1k
        counter += len2;
1207
27.1k
        move = RIGHT;
1208
27.1k
        break;
1209
78.0k
      case ASN1_ETYPE_OCTET_STRING:
1210
78.0k
        if (counter < inner_tag_len)
1211
0
    {
1212
0
      result = ASN1_DER_ERROR;
1213
0
      warn ();
1214
0
      goto cleanup;
1215
0
    }
1216
1217
78.0k
        ptag = der + counter - inner_tag_len;
1218
78.0k
        if ((flags & ASN1_DECODE_FLAG_STRICT_DER)
1219
78.0k
      || !(ptag[0] & ASN1_CLASS_STRUCTURED))
1220
78.0k
    {
1221
78.0k
      if (ptag[0] & ASN1_CLASS_STRUCTURED)
1222
0
        {
1223
0
          result = ASN1_DER_ERROR;
1224
0
          warn ();
1225
0
          goto cleanup;
1226
0
        }
1227
1228
78.0k
      len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1229
78.0k
      if (len2 < 0)
1230
0
        {
1231
0
          result = ASN1_DER_ERROR;
1232
0
          warn ();
1233
0
          goto cleanup;
1234
0
        }
1235
1236
78.0k
      DECR_LEN (ider_len, len3 + len2);
1237
1238
78.0k
      _asn1_set_value (p, der + counter, len3 + len2);
1239
78.0k
      counter += len3 + len2;
1240
78.0k
    }
1241
0
        else
1242
0
    {
1243
0
      unsigned dflags = 0, vlen, ber_len;
1244
1245
0
      if (ptag[0] & ASN1_CLASS_STRUCTURED)
1246
0
        dflags |= DECODE_FLAG_CONSTRUCTED;
1247
1248
0
      result =
1249
0
        _asn1_decode_simple_ber (type_field (p->type),
1250
0
               der + counter, ider_len, &ptmp,
1251
0
               &vlen, &ber_len, dflags);
1252
0
      if (result != ASN1_SUCCESS)
1253
0
        {
1254
0
          warn ();
1255
0
          goto cleanup;
1256
0
        }
1257
1258
0
      DECR_LEN (ider_len, ber_len);
1259
1260
0
      _asn1_set_value_lv (p, ptmp, vlen);
1261
1262
0
      counter += ber_len;
1263
0
      free (ptmp);
1264
0
    }
1265
78.0k
        move = RIGHT;
1266
78.0k
        break;
1267
0
      case ASN1_ETYPE_GENERALSTRING:
1268
0
      case ASN1_ETYPE_NUMERIC_STRING:
1269
10.1k
      case ASN1_ETYPE_IA5_STRING:
1270
10.1k
      case ASN1_ETYPE_TELETEX_STRING:
1271
13.5k
      case ASN1_ETYPE_PRINTABLE_STRING:
1272
13.5k
      case ASN1_ETYPE_UNIVERSAL_STRING:
1273
13.5k
      case ASN1_ETYPE_BMP_STRING:
1274
13.5k
      case ASN1_ETYPE_UTF8_STRING:
1275
13.5k
      case ASN1_ETYPE_VISIBLE_STRING:
1276
57.6k
      case ASN1_ETYPE_BIT_STRING:
1277
57.6k
        len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1278
57.6k
        if (len2 < 0)
1279
0
    {
1280
0
      result = ASN1_DER_ERROR;
1281
0
      warn ();
1282
0
      goto cleanup;
1283
0
    }
1284
1285
57.6k
        DECR_LEN (ider_len, len3 + len2);
1286
1287
57.6k
        _asn1_set_value (p, der + counter, len3 + len2);
1288
57.6k
        counter += len3 + len2;
1289
57.6k
        move = RIGHT;
1290
57.6k
        break;
1291
488k
      case ASN1_ETYPE_SEQUENCE:
1292
488k
      case ASN1_ETYPE_SET:
1293
488k
        if (move == UP)
1294
230k
    {
1295
230k
      len2 = p->tmp_ival;
1296
230k
      p->tmp_ival = 0;
1297
230k
      if (len2 == -1)
1298
0
        {   /* indefinite length method */
1299
0
          DECR_LEN (ider_len, 2);
1300
0
          if ((der[counter]) || der[counter + 1])
1301
0
      {
1302
0
        result = ASN1_DER_ERROR;
1303
0
        warn ();
1304
0
        goto cleanup;
1305
0
      }
1306
0
          counter += 2;
1307
0
        }
1308
230k
      else
1309
230k
        {   /* definite length method */
1310
230k
          if (len2 != counter)
1311
0
      {
1312
0
        result = ASN1_DER_ERROR;
1313
0
        warn ();
1314
0
        goto cleanup;
1315
0
      }
1316
230k
        }
1317
230k
      move = RIGHT;
1318
230k
    }
1319
257k
        else
1320
257k
    {   /* move==DOWN || move==RIGHT */
1321
257k
      len3 = asn1_get_length_der (der + counter, ider_len, &len2);
1322
257k
      if (IS_ERR (len3, flags))
1323
0
        {
1324
0
          result = ASN1_DER_ERROR;
1325
0
          warn ();
1326
0
          goto cleanup;
1327
0
        }
1328
1329
257k
      DECR_LEN (ider_len, len2);
1330
257k
      counter += len2;
1331
1332
257k
      if (len3 > 0)
1333
257k
        {
1334
257k
          p->tmp_ival = counter + len3;
1335
257k
          move = DOWN;
1336
257k
        }
1337
0
      else if (len3 == 0)
1338
0
        {
1339
0
          p2 = p->down;
1340
0
          while (p2)
1341
0
      {
1342
0
        if (type_field (p2->type) != ASN1_ETYPE_TAG)
1343
0
          {
1344
0
            p3 = p2->right;
1345
0
            asn1_delete_structure (&p2);
1346
0
            p2 = p3;
1347
0
          }
1348
0
        else
1349
0
          p2 = p2->right;
1350
0
      }
1351
0
          move = RIGHT;
1352
0
        }
1353
0
      else
1354
0
        {   /* indefinite length method */
1355
0
          p->tmp_ival = -1;
1356
0
          move = DOWN;
1357
0
        }
1358
257k
    }
1359
488k
        break;
1360
488k
      case ASN1_ETYPE_SEQUENCE_OF:
1361
240k
      case ASN1_ETYPE_SET_OF:
1362
240k
        if (move == UP)
1363
152k
    {
1364
152k
      len2 = p->tmp_ival;
1365
152k
      if (len2 == -1)
1366
0
        {   /* indefinite length method */
1367
0
          if (!HAVE_TWO (ider_len)
1368
0
        || ((der[counter]) || der[counter + 1]))
1369
0
      {
1370
0
        result = _asn1_append_sequence_set (p, &tcache);
1371
0
        if (result != 0)
1372
0
          {
1373
0
            warn ();
1374
0
            goto cleanup;
1375
0
          }
1376
0
        p = tcache.tail;
1377
0
        move = RIGHT;
1378
0
        continue;
1379
0
      }
1380
1381
0
          p->tmp_ival = 0;
1382
0
          tcache.tail = NULL; /* finished decoding this structure */
1383
0
          tcache.head = NULL;
1384
0
          DECR_LEN (ider_len, 2);
1385
0
          counter += 2;
1386
0
        }
1387
152k
      else
1388
152k
        {   /* definite length method */
1389
152k
          if (len2 > counter)
1390
67.8k
      {
1391
67.8k
        result = _asn1_append_sequence_set (p, &tcache);
1392
67.8k
        if (result != 0)
1393
0
          {
1394
0
            warn ();
1395
0
            goto cleanup;
1396
0
          }
1397
67.8k
        p = tcache.tail;
1398
67.8k
        move = RIGHT;
1399
67.8k
        continue;
1400
67.8k
      }
1401
1402
84.8k
          p->tmp_ival = 0;
1403
84.8k
          tcache.tail = NULL; /* finished decoding this structure */
1404
84.8k
          tcache.head = NULL;
1405
1406
84.8k
          if (len2 != counter)
1407
0
      {
1408
0
        result = ASN1_DER_ERROR;
1409
0
        warn ();
1410
0
        goto cleanup;
1411
0
      }
1412
84.8k
        }
1413
152k
    }
1414
88.2k
        else
1415
88.2k
    {   /* move==DOWN || move==RIGHT */
1416
88.2k
      len3 = asn1_get_length_der (der + counter, ider_len, &len2);
1417
88.2k
      if (IS_ERR (len3, flags))
1418
0
        {
1419
0
          result = ASN1_DER_ERROR;
1420
0
          warn ();
1421
0
          goto cleanup;
1422
0
        }
1423
1424
88.2k
      DECR_LEN (ider_len, len2);
1425
88.2k
      counter += len2;
1426
88.2k
      if (len3)
1427
84.8k
        {
1428
84.8k
          if (len3 > 0)
1429
84.8k
      { /* definite length method */
1430
84.8k
        p->tmp_ival = counter + len3;
1431
84.8k
      }
1432
0
          else
1433
0
      { /* indefinite length method */
1434
0
        p->tmp_ival = -1;
1435
0
      }
1436
1437
84.8k
          p2 = p->down;
1438
84.8k
          if (p2 == NULL)
1439
0
      {
1440
0
        result = ASN1_DER_ERROR;
1441
0
        warn ();
1442
0
        goto cleanup;
1443
0
      }
1444
1445
98.4k
          while ((type_field (p2->type) == ASN1_ETYPE_TAG)
1446
98.4k
           || (type_field (p2->type) == ASN1_ETYPE_SIZE))
1447
13.5k
      p2 = p2->right;
1448
84.8k
          if (p2->right == NULL)
1449
84.8k
      {
1450
84.8k
        result = _asn1_append_sequence_set (p, &tcache);
1451
84.8k
        if (result != 0)
1452
0
          {
1453
0
            warn ();
1454
0
            goto cleanup;
1455
0
          }
1456
84.8k
      }
1457
84.8k
          p = p2;
1458
84.8k
        }
1459
88.2k
    }
1460
173k
        move = RIGHT;
1461
173k
        break;
1462
64.4k
      case ASN1_ETYPE_ANY:
1463
        /* Check indefinite length method in an EXPLICIT TAG */
1464
1465
64.4k
        if (!(flags & ASN1_DECODE_FLAG_STRICT_DER)
1466
64.4k
      && (p->type & CONST_TAG) && tag_len == 2
1467
64.4k
      && (der[counter - 1] == 0x80))
1468
0
    indefinite = 1;
1469
64.4k
        else
1470
64.4k
    indefinite = 0;
1471
1472
64.4k
        if (asn1_get_tag_der
1473
64.4k
      (der + counter, ider_len, &class, &len2,
1474
64.4k
       &tag) != ASN1_SUCCESS)
1475
0
    {
1476
0
      result = ASN1_DER_ERROR;
1477
0
      warn ();
1478
0
      goto cleanup;
1479
0
    }
1480
1481
64.4k
        DECR_LEN (ider_len, len2);
1482
1483
64.4k
        len4 =
1484
64.4k
    asn1_get_length_der (der + counter + len2, ider_len, &len3);
1485
64.4k
        if (IS_ERR (len4, flags))
1486
0
    {
1487
0
      result = ASN1_DER_ERROR;
1488
0
      warn ();
1489
0
      goto cleanup;
1490
0
    }
1491
64.4k
        if (len4 != -1) /* definite */
1492
64.4k
    {
1493
64.4k
      len2 += len4;
1494
1495
64.4k
      DECR_LEN (ider_len, len4 + len3);
1496
64.4k
      _asn1_set_value_lv (p, der + counter, len2 + len3);
1497
64.4k
      counter += len2 + len3;
1498
64.4k
    }
1499
0
        else    /* == -1 */
1500
0
    {   /* indefinite length */
1501
0
      ider_len += len2; /* undo DECR_LEN */
1502
1503
0
      if (counter == 0)
1504
0
        {
1505
0
          result = ASN1_DER_ERROR;
1506
0
          warn ();
1507
0
          goto cleanup;
1508
0
        }
1509
1510
0
      result =
1511
0
        _asn1_get_indefinite_length_string (der + counter,
1512
0
              ider_len, &len2);
1513
0
      if (result != ASN1_SUCCESS)
1514
0
        {
1515
0
          warn ();
1516
0
          goto cleanup;
1517
0
        }
1518
1519
0
      DECR_LEN (ider_len, len2);
1520
0
      _asn1_set_value_lv (p, der + counter, len2);
1521
0
      counter += len2;
1522
1523
0
    }
1524
1525
        /* Check if a couple of 0x00 are present due to an EXPLICIT TAG with
1526
           an indefinite length method. */
1527
64.4k
        if (indefinite)
1528
0
    {
1529
0
      DECR_LEN (ider_len, 2);
1530
0
      if (!der[counter] && !der[counter + 1])
1531
0
        {
1532
0
          counter += 2;
1533
0
        }
1534
0
      else
1535
0
        {
1536
0
          result = ASN1_DER_ERROR;
1537
0
          warn ();
1538
0
          goto cleanup;
1539
0
        }
1540
0
    }
1541
1542
64.4k
        move = RIGHT;
1543
64.4k
        break;
1544
156k
      default:
1545
156k
        move = (move == UP) ? RIGHT : DOWN;
1546
156k
        break;
1547
1.41M
      }
1548
1.41M
  }
1549
1550
1.41M
      if (p)
1551
1.41M
  {
1552
1.41M
    p->end = counter - 1;
1553
1.41M
  }
1554
1555
1.41M
      if (p == node && move != DOWN)
1556
71.2k
  break;
1557
1558
1.34M
      if (move == DOWN)
1559
336k
  {
1560
336k
    if (p->down)
1561
336k
      p = p->down;
1562
0
    else
1563
0
      move = RIGHT;
1564
336k
  }
1565
1.34M
      if ((move == RIGHT) && !(p->type & CONST_SET))
1566
1.01M
  {
1567
1.01M
    if (p->right)
1568
580k
      p = p->right;
1569
431k
    else
1570
431k
      move = UP;
1571
1.01M
  }
1572
1.34M
      if (move == UP)
1573
431k
  p = _asn1_find_up (p);
1574
1.34M
    }
1575
1576
71.2k
  _asn1_delete_not_used (*element);
1577
1578
71.2k
  if ((ider_len < 0) ||
1579
71.2k
      (!(flags & ASN1_DECODE_FLAG_ALLOW_PADDING) && (ider_len != 0)))
1580
0
    {
1581
0
      warn ();
1582
0
      result = ASN1_DER_ERROR;
1583
0
      goto cleanup;
1584
0
    }
1585
1586
71.2k
  *max_ider_len = total_len - ider_len;
1587
1588
71.2k
  return ASN1_SUCCESS;
1589
1590
27.1k
cleanup:
1591
27.1k
  asn1_delete_structure (element);
1592
27.1k
  return result;
1593
71.2k
}
1594
1595
1596
/**
1597
 * asn1_der_decoding:
1598
 * @element: pointer to an ASN1 structure.
1599
 * @ider: vector that contains the DER encoding.
1600
 * @ider_len: number of bytes of *@ider: @ider[0]..@ider[len-1].
1601
 * @errorDescription: null-terminated string contains details when an
1602
 *   error occurred.
1603
 *
1604
 * Fill the structure *@element with values of a DER encoding
1605
 * string. The structure must just be created with function
1606
 * asn1_create_element().
1607
 *
1608
 * Note that the *@element variable is provided as a pointer for
1609
 * historical reasons.
1610
 *
1611
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1612
 *   if @ELEMENT is %NULL, and %ASN1_TAG_ERROR or
1613
 *   %ASN1_DER_ERROR if the der encoding doesn't match the structure
1614
 *   name (*@ELEMENT deleted).
1615
 **/
1616
int
1617
asn1_der_decoding (asn1_node *element, const void *ider, int ider_len,
1618
       char *errorDescription)
1619
16.9k
{
1620
16.9k
  return asn1_der_decoding2 (element, ider, &ider_len, 0, errorDescription);
1621
16.9k
}
1622
1623
/**
1624
 * asn1_der_decoding_element:
1625
 * @structure: pointer to an ASN1 structure
1626
 * @elementName: name of the element to fill
1627
 * @ider: vector that contains the DER encoding of the whole structure.
1628
 * @len: number of bytes of *der: der[0]..der[len-1]
1629
 * @errorDescription: null-terminated string contains details when an
1630
 *   error occurred.
1631
 *
1632
 * Fill the element named @ELEMENTNAME with values of a DER encoding
1633
 * string.  The structure must just be created with function
1634
 * asn1_create_element().  The DER vector must contain the encoding
1635
 * string of the whole @STRUCTURE.  If an error occurs during the
1636
 * decoding procedure, the *@STRUCTURE is deleted and set equal to
1637
 * %NULL.
1638
 *
1639
 * This function is deprecated and may just be an alias to asn1_der_decoding
1640
 * in future versions. Use asn1_der_decoding() instead.
1641
 *
1642
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1643
 *   if ELEMENT is %NULL or @elementName == NULL, and
1644
 *   %ASN1_TAG_ERROR or %ASN1_DER_ERROR if the der encoding doesn't
1645
 *   match the structure @structure (*ELEMENT deleted).
1646
 **/
1647
int
1648
asn1_der_decoding_element (asn1_node *structure, const char *elementName,
1649
         const void *ider, int len, char *errorDescription)
1650
0
{
1651
0
  return asn1_der_decoding (structure, ider, len, errorDescription);
1652
0
}
1653
1654
/**
1655
 * asn1_der_decoding_startEnd:
1656
 * @element: pointer to an ASN1 element
1657
 * @ider: vector that contains the DER encoding.
1658
 * @ider_len: number of bytes of *@ider: @ider[0]..@ider[len-1]
1659
 * @name_element: an element of NAME structure.
1660
 * @start: the position of the first byte of NAME_ELEMENT decoding
1661
 *   (@ider[*start])
1662
 * @end: the position of the last byte of NAME_ELEMENT decoding
1663
 *  (@ider[*end])
1664
 *
1665
 * Find the start and end point of an element in a DER encoding
1666
 * string. I mean that if you have a der encoding and you have already
1667
 * used the function asn1_der_decoding() to fill a structure, it may
1668
 * happen that you want to find the piece of string concerning an
1669
 * element of the structure.
1670
 *
1671
 * One example is the sequence "tbsCertificate" inside an X509
1672
 * certificate.
1673
 *
1674
 * Note that since libtasn1 3.7 the @ider and @ider_len parameters
1675
 * can be omitted, if the element is already decoded using asn1_der_decoding().
1676
 *
1677
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1678
 *   if ELEMENT is %asn1_node EMPTY or @name_element is not a valid
1679
 *   element, %ASN1_TAG_ERROR or %ASN1_DER_ERROR if the der encoding
1680
 *   doesn't match the structure ELEMENT.
1681
 **/
1682
int
1683
asn1_der_decoding_startEnd (asn1_node element, const void *ider, int ider_len,
1684
          const char *name_element, int *start, int *end)
1685
40.7k
{
1686
40.7k
  asn1_node node, node_to_find;
1687
40.7k
  int result = ASN1_DER_ERROR;
1688
1689
40.7k
  node = element;
1690
1691
40.7k
  if (node == NULL)
1692
0
    return ASN1_ELEMENT_NOT_FOUND;
1693
1694
40.7k
  node_to_find = asn1_find_node (node, name_element);
1695
1696
40.7k
  if (node_to_find == NULL)
1697
0
    return ASN1_ELEMENT_NOT_FOUND;
1698
1699
40.7k
  *start = node_to_find->start;
1700
40.7k
  *end = node_to_find->end;
1701
1702
40.7k
  if (*start == 0 && *end == 0)
1703
0
    {
1704
0
      if (ider == NULL || ider_len == 0)
1705
0
  return ASN1_GENERIC_ERROR;
1706
1707
      /* it seems asn1_der_decoding() wasn't called before. Do it now */
1708
0
      result = asn1_der_decoding (&node, ider, ider_len, NULL);
1709
0
      if (result != ASN1_SUCCESS)
1710
0
  {
1711
0
    warn ();
1712
0
    return result;
1713
0
  }
1714
1715
0
      node_to_find = asn1_find_node (node, name_element);
1716
0
      if (node_to_find == NULL)
1717
0
  return ASN1_ELEMENT_NOT_FOUND;
1718
1719
0
      *start = node_to_find->start;
1720
0
      *end = node_to_find->end;
1721
0
    }
1722
1723
40.7k
  if (*end < *start)
1724
0
    return ASN1_GENERIC_ERROR;
1725
1726
40.7k
  return ASN1_SUCCESS;
1727
40.7k
}
1728
1729
/**
1730
 * asn1_expand_any_defined_by:
1731
 * @definitions: ASN1 definitions
1732
 * @element: pointer to an ASN1 structure
1733
 *
1734
 * Expands every "ANY DEFINED BY" element of a structure created from
1735
 * a DER decoding process (asn1_der_decoding function). The element
1736
 * ANY must be defined by an OBJECT IDENTIFIER. The type used to
1737
 * expand the element ANY is the first one following the definition of
1738
 * the actual value of the OBJECT IDENTIFIER.
1739
 *
1740
 * Returns: %ASN1_SUCCESS if Substitution OK, %ASN1_ERROR_TYPE_ANY if
1741
 *   some "ANY DEFINED BY" element couldn't be expanded due to a
1742
 *   problem in OBJECT_ID -> TYPE association, or other error codes
1743
 *   depending on DER decoding.
1744
 **/
1745
int
1746
asn1_expand_any_defined_by (asn1_node_const definitions, asn1_node *element)
1747
0
{
1748
0
  char name[2 * ASN1_MAX_NAME_SIZE + 2], value[ASN1_MAX_NAME_SIZE];
1749
0
  int retCode = ASN1_SUCCESS, result;
1750
0
  int len, len2, len3;
1751
0
  asn1_node_const p2;
1752
0
  asn1_node p, p3, aux = NULL;
1753
0
  char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
1754
0
  const char *definitionsName;
1755
1756
0
  if ((definitions == NULL) || (*element == NULL))
1757
0
    return ASN1_ELEMENT_NOT_FOUND;
1758
1759
0
  definitionsName = definitions->name;
1760
1761
0
  p = *element;
1762
0
  while (p)
1763
0
    {
1764
1765
0
      switch (type_field (p->type))
1766
0
  {
1767
0
  case ASN1_ETYPE_ANY:
1768
0
    if ((p->type & CONST_DEFINED_BY) && (p->value))
1769
0
      {
1770
        /* search the "DEF_BY" element */
1771
0
        p2 = p->down;
1772
0
        while ((p2) && (type_field (p2->type) != ASN1_ETYPE_CONSTANT))
1773
0
    p2 = p2->right;
1774
1775
0
        if (!p2)
1776
0
    {
1777
0
      retCode = ASN1_ERROR_TYPE_ANY;
1778
0
      break;
1779
0
    }
1780
1781
0
        p3 = _asn1_find_up (p);
1782
1783
0
        if (!p3)
1784
0
    {
1785
0
      retCode = ASN1_ERROR_TYPE_ANY;
1786
0
      break;
1787
0
    }
1788
1789
0
        p3 = p3->down;
1790
0
        while (p3)
1791
0
    {
1792
0
      if (!(strcmp (p3->name, p2->name)))
1793
0
        break;
1794
0
      p3 = p3->right;
1795
0
    }
1796
1797
0
        if ((!p3) || (type_field (p3->type) != ASN1_ETYPE_OBJECT_ID) ||
1798
0
      (p3->value == NULL))
1799
0
    {
1800
1801
0
      p3 = _asn1_find_up (p);
1802
0
      p3 = _asn1_find_up (p3);
1803
1804
0
      if (!p3)
1805
0
        {
1806
0
          retCode = ASN1_ERROR_TYPE_ANY;
1807
0
          break;
1808
0
        }
1809
1810
0
      p3 = p3->down;
1811
1812
0
      while (p3)
1813
0
        {
1814
0
          if (!(strcmp (p3->name, p2->name)))
1815
0
      break;
1816
0
          p3 = p3->right;
1817
0
        }
1818
1819
0
      if ((!p3) || (type_field (p3->type) != ASN1_ETYPE_OBJECT_ID)
1820
0
          || (p3->value == NULL))
1821
0
        {
1822
0
          retCode = ASN1_ERROR_TYPE_ANY;
1823
0
          break;
1824
0
        }
1825
0
    }
1826
1827
        /* search the OBJECT_ID into definitions */
1828
0
        p2 = definitions->down;
1829
0
        while (p2)
1830
0
    {
1831
0
      if ((type_field (p2->type) == ASN1_ETYPE_OBJECT_ID) &&
1832
0
          (p2->type & CONST_ASSIGN))
1833
0
        {
1834
0
          snprintf (name, sizeof (name), "%s.%s", definitionsName,
1835
0
        p2->name);
1836
1837
0
          len = ASN1_MAX_NAME_SIZE;
1838
0
          result =
1839
0
      asn1_read_value (definitions, name, value, &len);
1840
1841
0
          if ((result == ASN1_SUCCESS)
1842
0
        && (!_asn1_strcmp (p3->value, value)))
1843
0
      {
1844
0
        p2 = p2->right; /* pointer to the structure to
1845
               use for expansion */
1846
0
        while ((p2) && (p2->type & CONST_ASSIGN))
1847
0
          p2 = p2->right;
1848
1849
0
        if (p2)
1850
0
          {
1851
0
            snprintf (name, sizeof (name), "%s.%s",
1852
0
          definitionsName, p2->name);
1853
1854
0
            result =
1855
0
        asn1_create_element (definitions, name, &aux);
1856
0
            if (result == ASN1_SUCCESS)
1857
0
        {
1858
0
          _asn1_cpy_name (aux, p);
1859
0
          len2 =
1860
0
            asn1_get_length_der (p->value,
1861
0
               p->value_len, &len3);
1862
0
          if (len2 < 0)
1863
0
            return ASN1_DER_ERROR;
1864
1865
0
          result =
1866
0
            asn1_der_decoding (&aux, p->value + len3,
1867
0
                   len2,
1868
0
                   errorDescription);
1869
0
          if (result == ASN1_SUCCESS)
1870
0
            {
1871
1872
0
              _asn1_set_right (aux, p->right);
1873
0
              _asn1_set_right (p, aux);
1874
1875
0
              result = asn1_delete_structure (&p);
1876
0
              if (result == ASN1_SUCCESS)
1877
0
          {
1878
0
            p = aux;
1879
0
            aux = NULL;
1880
0
            break;
1881
0
          }
1882
0
              else
1883
0
          { /* error with asn1_delete_structure */
1884
0
            asn1_delete_structure (&aux);
1885
0
            retCode = result;
1886
0
            break;
1887
0
          }
1888
0
            }
1889
0
          else
1890
0
            { /* error with asn1_der_decoding */
1891
0
              retCode = result;
1892
0
              break;
1893
0
            }
1894
0
        }
1895
0
            else
1896
0
        { /* error with asn1_create_element */
1897
0
          retCode = result;
1898
0
          break;
1899
0
        }
1900
0
          }
1901
0
        else
1902
0
          { /* error with the pointer to the structure to expand */
1903
0
            retCode = ASN1_ERROR_TYPE_ANY;
1904
0
            break;
1905
0
          }
1906
0
      }
1907
0
        }
1908
0
      p2 = p2->right;
1909
0
    }    /* end while */
1910
1911
0
        if (!p2)
1912
0
    {
1913
0
      retCode = ASN1_ERROR_TYPE_ANY;
1914
0
      break;
1915
0
    }
1916
1917
0
      }
1918
0
    break;
1919
0
  default:
1920
0
    break;
1921
0
  }
1922
1923
1924
0
      if (p->down)
1925
0
  {
1926
0
    p = p->down;
1927
0
  }
1928
0
      else if (p == *element)
1929
0
  {
1930
0
    p = NULL;
1931
0
    break;
1932
0
  }
1933
0
      else if (p->right)
1934
0
  p = p->right;
1935
0
      else
1936
0
  {
1937
0
    while (1)
1938
0
      {
1939
0
        p = _asn1_find_up (p);
1940
0
        if (p == *element)
1941
0
    {
1942
0
      p = NULL;
1943
0
      break;
1944
0
    }
1945
0
        if (p->right)
1946
0
    {
1947
0
      p = p->right;
1948
0
      break;
1949
0
    }
1950
0
      }
1951
0
  }
1952
0
    }
1953
1954
0
  return retCode;
1955
0
}
1956
1957
/**
1958
 * asn1_expand_octet_string:
1959
 * @definitions: ASN1 definitions
1960
 * @element: pointer to an ASN1 structure
1961
 * @octetName: name of the OCTET STRING field to expand.
1962
 * @objectName: name of the OBJECT IDENTIFIER field to use to define
1963
 *    the type for expansion.
1964
 *
1965
 * Expands an "OCTET STRING" element of a structure created from a DER
1966
 * decoding process (the asn1_der_decoding() function).  The type used
1967
 * for expansion is the first one following the definition of the
1968
 * actual value of the OBJECT IDENTIFIER indicated by OBJECTNAME.
1969
 *
1970
 * Returns: %ASN1_SUCCESS if substitution OK, %ASN1_ELEMENT_NOT_FOUND
1971
 *   if @objectName or @octetName are not correct,
1972
 *   %ASN1_VALUE_NOT_VALID if it wasn't possible to find the type to
1973
 *   use for expansion, or other errors depending on DER decoding.
1974
 **/
1975
int
1976
asn1_expand_octet_string (asn1_node_const definitions, asn1_node *element,
1977
        const char *octetName, const char *objectName)
1978
0
{
1979
0
  char name[2 * ASN1_MAX_NAME_SIZE + 1], value[ASN1_MAX_NAME_SIZE];
1980
0
  int retCode = ASN1_SUCCESS, result;
1981
0
  int len, len2, len3;
1982
0
  asn1_node_const p2;
1983
0
  asn1_node aux = NULL;
1984
0
  asn1_node octetNode = NULL, objectNode = NULL;
1985
0
  char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
1986
1987
0
  if ((definitions == NULL) || (*element == NULL))
1988
0
    return ASN1_ELEMENT_NOT_FOUND;
1989
1990
0
  octetNode = asn1_find_node (*element, octetName);
1991
0
  if (octetNode == NULL)
1992
0
    return ASN1_ELEMENT_NOT_FOUND;
1993
0
  if (type_field (octetNode->type) != ASN1_ETYPE_OCTET_STRING)
1994
0
    return ASN1_ELEMENT_NOT_FOUND;
1995
0
  if (octetNode->value == NULL)
1996
0
    return ASN1_VALUE_NOT_FOUND;
1997
1998
0
  objectNode = asn1_find_node (*element, objectName);
1999
0
  if (objectNode == NULL)
2000
0
    return ASN1_ELEMENT_NOT_FOUND;
2001
2002
0
  if (type_field (objectNode->type) != ASN1_ETYPE_OBJECT_ID)
2003
0
    return ASN1_ELEMENT_NOT_FOUND;
2004
2005
0
  if (objectNode->value == NULL)
2006
0
    return ASN1_VALUE_NOT_FOUND;
2007
2008
2009
  /* search the OBJECT_ID into definitions */
2010
0
  p2 = definitions->down;
2011
0
  while (p2)
2012
0
    {
2013
0
      if ((type_field (p2->type) == ASN1_ETYPE_OBJECT_ID) &&
2014
0
    (p2->type & CONST_ASSIGN))
2015
0
  {
2016
0
    strcpy (name, definitions->name);
2017
0
    strcat (name, ".");
2018
0
    strcat (name, p2->name);
2019
2020
0
    len = sizeof (value);
2021
0
    result = asn1_read_value (definitions, name, value, &len);
2022
2023
0
    if ((result == ASN1_SUCCESS)
2024
0
        && (!_asn1_strcmp (objectNode->value, value)))
2025
0
      {
2026
2027
0
        p2 = p2->right; /* pointer to the structure to
2028
           use for expansion */
2029
0
        while ((p2) && (p2->type & CONST_ASSIGN))
2030
0
    p2 = p2->right;
2031
2032
0
        if (p2)
2033
0
    {
2034
0
      strcpy (name, definitions->name);
2035
0
      strcat (name, ".");
2036
0
      strcat (name, p2->name);
2037
2038
0
      result = asn1_create_element (definitions, name, &aux);
2039
0
      if (result == ASN1_SUCCESS)
2040
0
        {
2041
0
          _asn1_cpy_name (aux, octetNode);
2042
0
          len2 =
2043
0
      asn1_get_length_der (octetNode->value,
2044
0
               octetNode->value_len, &len3);
2045
0
          if (len2 < 0)
2046
0
      return ASN1_DER_ERROR;
2047
2048
0
          result =
2049
0
      asn1_der_decoding (&aux, octetNode->value + len3,
2050
0
             len2, errorDescription);
2051
0
          if (result == ASN1_SUCCESS)
2052
0
      {
2053
2054
0
        _asn1_set_right (aux, octetNode->right);
2055
0
        _asn1_set_right (octetNode, aux);
2056
2057
0
        result = asn1_delete_structure (&octetNode);
2058
0
        if (result == ASN1_SUCCESS)
2059
0
          {
2060
0
            aux = NULL;
2061
0
            break;
2062
0
          }
2063
0
        else
2064
0
          { /* error with asn1_delete_structure */
2065
0
            asn1_delete_structure (&aux);
2066
0
            retCode = result;
2067
0
            break;
2068
0
          }
2069
0
      }
2070
0
          else
2071
0
      { /* error with asn1_der_decoding */
2072
0
        retCode = result;
2073
0
        break;
2074
0
      }
2075
0
        }
2076
0
      else
2077
0
        {   /* error with asn1_create_element */
2078
0
          retCode = result;
2079
0
          break;
2080
0
        }
2081
0
    }
2082
0
        else
2083
0
    {   /* error with the pointer to the structure to expand */
2084
0
      retCode = ASN1_VALUE_NOT_VALID;
2085
0
      break;
2086
0
    }
2087
0
      }
2088
0
  }
2089
2090
0
      p2 = p2->right;
2091
2092
0
    }
2093
2094
0
  if (!p2)
2095
0
    retCode = ASN1_VALUE_NOT_VALID;
2096
2097
0
  return retCode;
2098
0
}
2099
2100
/*-
2101
 * _asn1_decode_simple_der:
2102
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2103
 * @der: the encoded string
2104
 * @_der_len: the bytes of the encoded string
2105
 * @str: a pointer to the data
2106
 * @str_len: the length of the data
2107
 * @dflags: DECODE_FLAG_*
2108
 *
2109
 * Decodes a simple DER encoded type (e.g. a string, which is not constructed).
2110
 * The output is a pointer inside the @der.
2111
 *
2112
 * Returns: %ASN1_SUCCESS if successful or an error value.
2113
 -*/
2114
static int
2115
_asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
2116
       unsigned int _der_len, const unsigned char **str,
2117
       unsigned int *str_len, unsigned dflags)
2118
6.78k
{
2119
6.78k
  int tag_len, len_len;
2120
6.78k
  const unsigned char *p;
2121
6.78k
  int der_len = _der_len;
2122
6.78k
  unsigned char class;
2123
6.78k
  unsigned long tag;
2124
6.78k
  long ret;
2125
2126
6.78k
  if (der == NULL || der_len == 0)
2127
0
    return ASN1_VALUE_NOT_VALID;
2128
2129
6.78k
  if (ETYPE_OK (etype) == 0 || ETYPE_IS_STRING (etype) == 0)
2130
0
    return ASN1_VALUE_NOT_VALID;
2131
2132
  /* doesn't handle constructed classes */
2133
6.78k
  class = ETYPE_CLASS (etype);
2134
6.78k
  if (class != ASN1_CLASS_UNIVERSAL)
2135
0
    return ASN1_VALUE_NOT_VALID;
2136
2137
6.78k
  p = der;
2138
2139
6.78k
  if (dflags & DECODE_FLAG_HAVE_TAG)
2140
6.78k
    {
2141
6.78k
      ret = asn1_get_tag_der (p, der_len, &class, &tag_len, &tag);
2142
6.78k
      if (ret != ASN1_SUCCESS)
2143
0
  return ret;
2144
2145
6.78k
      if (class != ETYPE_CLASS (etype) || tag != ETYPE_TAG (etype))
2146
0
  {
2147
0
    warn ();
2148
0
    return ASN1_DER_ERROR;
2149
0
  }
2150
2151
6.78k
      p += tag_len;
2152
6.78k
      der_len -= tag_len;
2153
6.78k
      if (der_len <= 0)
2154
0
  return ASN1_DER_ERROR;
2155
6.78k
    }
2156
2157
6.78k
  ret = asn1_get_length_der (p, der_len, &len_len);
2158
6.78k
  if (ret < 0)
2159
0
    return ASN1_DER_ERROR;
2160
2161
6.78k
  p += len_len;
2162
6.78k
  der_len -= len_len;
2163
6.78k
  if (der_len <= 0)
2164
0
    return ASN1_DER_ERROR;
2165
2166
6.78k
  *str_len = ret;
2167
6.78k
  *str = p;
2168
2169
6.78k
  return ASN1_SUCCESS;
2170
6.78k
}
2171
2172
/**
2173
 * asn1_decode_simple_der:
2174
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2175
 * @der: the encoded string
2176
 * @_der_len: the bytes of the encoded string
2177
 * @str: a pointer to the data
2178
 * @str_len: the length of the data
2179
 *
2180
 * Decodes a simple DER encoded type (e.g. a string, which is not constructed).
2181
 * The output is a pointer inside the @der.
2182
 *
2183
 * Returns: %ASN1_SUCCESS if successful or an error value.
2184
 **/
2185
int
2186
asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
2187
      unsigned int _der_len, const unsigned char **str,
2188
      unsigned int *str_len)
2189
0
{
2190
0
  return _asn1_decode_simple_der (etype, der, _der_len, str, str_len,
2191
0
          DECODE_FLAG_HAVE_TAG);
2192
0
}
2193
2194
static int
2195
append (uint8_t **dst, unsigned *dst_size, const unsigned char *src,
2196
  unsigned src_size)
2197
6.78k
{
2198
6.78k
  if (src_size == 0)
2199
0
    return ASN1_SUCCESS;
2200
2201
6.78k
  *dst = _asn1_realloc (*dst, *dst_size + src_size);
2202
6.78k
  if (*dst == NULL)
2203
0
    return ASN1_MEM_ALLOC_ERROR;
2204
6.78k
  memcpy (*dst + *dst_size, src, src_size);
2205
6.78k
  *dst_size += src_size;
2206
6.78k
  return ASN1_SUCCESS;
2207
6.78k
}
2208
2209
/*-
2210
 * _asn1_decode_simple_ber:
2211
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2212
 * @der: the encoded string
2213
 * @_der_len: the bytes of the encoded string
2214
 * @str: a pointer to the data
2215
 * @str_len: the length of the data
2216
 * @ber_len: the total length occupied by BER (may be %NULL)
2217
 * @have_tag: whether a DER tag is included
2218
 *
2219
 * Decodes a BER encoded type. The output is an allocated value
2220
 * of the data. This decodes BER STRINGS only. Other types are
2221
 * decoded as DER.
2222
 *
2223
 * Returns: %ASN1_SUCCESS if successful or an error value.
2224
 -*/
2225
static int
2226
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
2227
       unsigned int _der_len, unsigned char **str,
2228
       unsigned int *str_len, unsigned int *ber_len,
2229
       unsigned dflags)
2230
6.78k
{
2231
6.78k
  int tag_len, len_len;
2232
6.78k
  const unsigned char *p;
2233
6.78k
  int der_len = _der_len;
2234
6.78k
  uint8_t *total = NULL;
2235
6.78k
  unsigned total_size = 0;
2236
6.78k
  unsigned char class;
2237
6.78k
  unsigned long tag;
2238
6.78k
  unsigned char *out = NULL;
2239
6.78k
  const unsigned char *cout = NULL;
2240
6.78k
  unsigned out_len;
2241
6.78k
  long result;
2242
2243
6.78k
  if (ber_len)
2244
0
    *ber_len = 0;
2245
2246
6.78k
  if (der == NULL || der_len == 0)
2247
0
    {
2248
0
      warn ();
2249
0
      return ASN1_VALUE_NOT_VALID;
2250
0
    }
2251
2252
6.78k
  if (ETYPE_OK (etype) == 0)
2253
0
    {
2254
0
      warn ();
2255
0
      return ASN1_VALUE_NOT_VALID;
2256
0
    }
2257
2258
  /* doesn't handle constructed + definite classes */
2259
6.78k
  class = ETYPE_CLASS (etype);
2260
6.78k
  if (class != ASN1_CLASS_UNIVERSAL)
2261
0
    {
2262
0
      warn ();
2263
0
      return ASN1_VALUE_NOT_VALID;
2264
0
    }
2265
2266
6.78k
  p = der;
2267
2268
6.78k
  if (dflags & DECODE_FLAG_HAVE_TAG)
2269
6.78k
    {
2270
6.78k
      result = asn1_get_tag_der (p, der_len, &class, &tag_len, &tag);
2271
6.78k
      if (result != ASN1_SUCCESS)
2272
0
  {
2273
0
    warn ();
2274
0
    return result;
2275
0
  }
2276
2277
6.78k
      if (tag != ETYPE_TAG (etype))
2278
0
  {
2279
0
    warn ();
2280
0
    return ASN1_DER_ERROR;
2281
0
  }
2282
2283
6.78k
      p += tag_len;
2284
2285
6.78k
      DECR_LEN (der_len, tag_len);
2286
2287
6.78k
      if (ber_len)
2288
0
  *ber_len += tag_len;
2289
6.78k
    }
2290
2291
  /* indefinite constructed */
2292
6.78k
  if ((((dflags & DECODE_FLAG_CONSTRUCTED) || class == ASN1_CLASS_STRUCTURED)
2293
6.78k
       && ETYPE_IS_STRING (etype)) && !(dflags & DECODE_FLAG_LEVEL3))
2294
0
    {
2295
0
      if (der_len == 0)
2296
0
  {
2297
0
    warn ();
2298
0
    result = ASN1_DER_ERROR;
2299
0
    goto cleanup;
2300
0
  }
2301
2302
0
      if (der_len > 0 && p[0] == 0x80) /* indefinite */
2303
0
  {
2304
0
    len_len = 1;
2305
0
    DECR_LEN (der_len, len_len);
2306
0
    p += len_len;
2307
2308
0
    if (ber_len)
2309
0
      *ber_len += len_len;
2310
2311
    /* decode the available octet strings */
2312
0
    do
2313
0
      {
2314
0
        unsigned tmp_len;
2315
0
        unsigned flags = DECODE_FLAG_HAVE_TAG;
2316
2317
0
        if (dflags & DECODE_FLAG_LEVEL1)
2318
0
    flags |= DECODE_FLAG_LEVEL2;
2319
0
        else if (dflags & DECODE_FLAG_LEVEL2)
2320
0
    flags |= DECODE_FLAG_LEVEL3;
2321
0
        else
2322
0
    flags |= DECODE_FLAG_LEVEL1;
2323
2324
0
        result =
2325
0
    _asn1_decode_simple_ber (etype, p, der_len, &out, &out_len,
2326
0
           &tmp_len, flags);
2327
0
        if (result != ASN1_SUCCESS)
2328
0
    {
2329
0
      warn ();
2330
0
      goto cleanup;
2331
0
    }
2332
2333
0
        p += tmp_len;
2334
0
        DECR_LEN (der_len, tmp_len);
2335
2336
0
        if (ber_len)
2337
0
    *ber_len += tmp_len;
2338
2339
0
        DECR_LEN (der_len, 2);  /* we need the EOC */
2340
2341
0
        result = append (&total, &total_size, out, out_len);
2342
0
        if (result != ASN1_SUCCESS)
2343
0
    {
2344
0
      warn ();
2345
0
      goto cleanup;
2346
0
    }
2347
2348
0
        free (out);
2349
0
        out = NULL;
2350
2351
0
        if (p[0] == 0 && p[1] == 0) /* EOC */
2352
0
    {
2353
0
      if (ber_len)
2354
0
        *ber_len += 2;
2355
0
      break;
2356
0
    }
2357
2358
        /* no EOC */
2359
0
        der_len += 2;
2360
2361
0
        if (der_len == 2)
2362
0
    {
2363
0
      warn ();
2364
0
      result = ASN1_DER_ERROR;
2365
0
      goto cleanup;
2366
0
    }
2367
0
      }
2368
0
    while (1);
2369
0
  }
2370
0
      else      /* constructed */
2371
0
  {
2372
0
    long const_len;
2373
2374
0
    result = asn1_get_length_ber (p, der_len, &len_len);
2375
0
    if (result < 0)
2376
0
      {
2377
0
        warn ();
2378
0
        result = ASN1_DER_ERROR;
2379
0
        goto cleanup;
2380
0
      }
2381
2382
0
    DECR_LEN (der_len, len_len);
2383
0
    p += len_len;
2384
2385
0
    const_len = result;
2386
2387
0
    if (ber_len)
2388
0
      *ber_len += len_len;
2389
2390
    /* decode the available octet strings */
2391
0
    while (const_len > 0)
2392
0
      {
2393
0
        unsigned tmp_len;
2394
0
        unsigned flags = DECODE_FLAG_HAVE_TAG;
2395
2396
0
        if (dflags & DECODE_FLAG_LEVEL1)
2397
0
    flags |= DECODE_FLAG_LEVEL2;
2398
0
        else if (dflags & DECODE_FLAG_LEVEL2)
2399
0
    flags |= DECODE_FLAG_LEVEL3;
2400
0
        else
2401
0
    flags |= DECODE_FLAG_LEVEL1;
2402
2403
0
        result =
2404
0
    _asn1_decode_simple_ber (etype, p, der_len, &out, &out_len,
2405
0
           &tmp_len, flags);
2406
0
        if (result != ASN1_SUCCESS)
2407
0
    {
2408
0
      warn ();
2409
0
      goto cleanup;
2410
0
    }
2411
2412
0
        p += tmp_len;
2413
0
        DECR_LEN (der_len, tmp_len);
2414
0
        DECR_LEN (const_len, tmp_len);
2415
2416
0
        if (ber_len)
2417
0
    *ber_len += tmp_len;
2418
2419
0
        result = append (&total, &total_size, out, out_len);
2420
0
        if (result != ASN1_SUCCESS)
2421
0
    {
2422
0
      warn ();
2423
0
      goto cleanup;
2424
0
    }
2425
2426
0
        free (out);
2427
0
        out = NULL;
2428
0
      }
2429
0
  }
2430
0
    }
2431
6.78k
  else if (class == ETYPE_CLASS (etype))
2432
6.78k
    {
2433
6.78k
      if (ber_len)
2434
0
  {
2435
0
    result = asn1_get_length_der (p, der_len, &len_len);
2436
0
    if (result < 0)
2437
0
      {
2438
0
        warn ();
2439
0
        result = ASN1_DER_ERROR;
2440
0
        goto cleanup;
2441
0
      }
2442
0
    *ber_len += result + len_len;
2443
0
  }
2444
2445
      /* non-string values are decoded as DER */
2446
6.78k
      result =
2447
6.78k
  _asn1_decode_simple_der (etype, der, _der_len, &cout, &out_len,
2448
6.78k
         dflags);
2449
6.78k
      if (result != ASN1_SUCCESS)
2450
0
  {
2451
0
    warn ();
2452
0
    goto cleanup;
2453
0
  }
2454
2455
6.78k
      result = append (&total, &total_size, cout, out_len);
2456
6.78k
      if (result != ASN1_SUCCESS)
2457
0
  {
2458
0
    warn ();
2459
0
    goto cleanup;
2460
0
  }
2461
6.78k
    }
2462
0
  else
2463
0
    {
2464
0
      warn ();
2465
0
      result = ASN1_DER_ERROR;
2466
0
      goto cleanup;
2467
0
    }
2468
2469
6.78k
  *str = total;
2470
6.78k
  *str_len = total_size;
2471
2472
6.78k
  return ASN1_SUCCESS;
2473
0
cleanup:
2474
0
  free (out);
2475
0
  free (total);
2476
0
  return result;
2477
6.78k
}
2478
2479
/**
2480
 * asn1_decode_simple_ber:
2481
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2482
 * @der: the encoded string
2483
 * @_der_len: the bytes of the encoded string
2484
 * @str: a pointer to the data
2485
 * @str_len: the length of the data
2486
 * @ber_len: the total length occupied by BER (may be %NULL)
2487
 *
2488
 * Decodes a BER encoded type. The output is an allocated value
2489
 * of the data. This decodes BER STRINGS only. Other types are
2490
 * decoded as DER.
2491
 *
2492
 * Returns: %ASN1_SUCCESS if successful or an error value.
2493
 **/
2494
int
2495
asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
2496
      unsigned int _der_len, unsigned char **str,
2497
      unsigned int *str_len, unsigned int *ber_len)
2498
6.78k
{
2499
6.78k
  return _asn1_decode_simple_ber (etype, der, _der_len, str, str_len, ber_len,
2500
6.78k
          DECODE_FLAG_HAVE_TAG);
2501
6.78k
}