Coverage Report

Created: 2026-02-14 06:49

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/libtasn1/lib/decoding.c
Line
Count
Source
1
/*
2
 * Copyright (C) 2002-2025 Free Software Foundation, Inc.
3
 *
4
 * This file is part of LIBTASN1.
5
 *
6
 * The LIBTASN1 library is free software; you can redistribute it
7
 * and/or modify it under the terms of the GNU Lesser General Public
8
 * License as published by the Free Software Foundation; either
9
 * version 2.1 of the License, or (at your option) any later version.
10
 *
11
 * This library is distributed in the hope that it will be useful, but
12
 * WITHOUT ANY WARRANTY; without even the implied warranty of
13
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
 * Lesser General Public License for more details.
15
 *
16
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library; if not, see
18
 * <https://www.gnu.org/licenses/>.
19
 */
20
21
#include <config.h>
22
23
/*****************************************************/
24
/* File: decoding.c                                  */
25
/* Description: Functions to manage DER decoding     */
26
/*****************************************************/
27
28
#include <int.h>
29
#include <parser_aux.h>
30
#include <gstr.h>
31
#include <structure.h>
32
#include <element.h>
33
#include <limits.h>
34
#include <intprops.h>
35
#include "c-ctype.h"
36
37
#ifdef DEBUG
38
# define warn() fprintf(stderr, "%s: %d\n", __func__, __LINE__)
39
#else
40
# define warn()
41
#endif
42
43
7.00M
#define IS_ERR(len, flags) (len < -1 || ((flags & ASN1_DECODE_FLAG_STRICT_DER) && len < 0))
44
45
11.0M
#define HAVE_TWO(x) (x>=2?1:0)
46
47
/* Decoding flags (dflags) used in several decoding functions.
48
 *  DECODE_FLAG_HAVE_TAG: The provided buffer includes a tag
49
 *  DECODE_FLAG_CONSTRUCTED: The provided buffer is of indefinite encoding (useful
50
 *                           when no tags are present).
51
 *  DECODE_FLAG_LEVEL1: Internal flag to indicate a level of recursion for BER strings.
52
 *  DECODE_FLAG_LEVEL2: Internal flag to indicate two levels of recursion for BER strings.
53
 *  DECODE_FLAG_LEVEL3: Internal flag to indicate three levels of recursion for BER strings.
54
 *                      This is the maximum levels of recursion possible to prevent stack
55
 *                      exhaustion.
56
 */
57
58
410k
#define DECODE_FLAG_HAVE_TAG 1
59
136k
#define DECODE_FLAG_CONSTRUCTED (1<<1)
60
158k
#define DECODE_FLAG_LEVEL1 (1<<2)
61
85.6k
#define DECODE_FLAG_LEVEL2 (1<<3)
62
16.4k
#define DECODE_FLAG_LEVEL3 (1<<4)
63
64
51.3M
#define DECR_LEN(l, s) do { \
65
51.3M
    l -= s; \
66
51.3M
    if (l < 0) { \
67
573
      warn(); \
68
573
      result = ASN1_DER_ERROR; \
69
573
      goto cleanup; \
70
573
    } \
71
51.3M
  } while (0)
72
73
static int
74
_asn1_get_indefinite_length_string (const unsigned char *der, int der_len,
75
            int *len);
76
77
static int
78
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
79
       unsigned int _der_len, unsigned char **str,
80
       unsigned int *str_len, unsigned int *ber_len,
81
       unsigned dflags);
82
83
static int
84
_asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
85
       unsigned int _der_len, const unsigned char **str,
86
       unsigned int *str_len, unsigned dflags);
87
88
static void
89
_asn1_error_description_tag_error (asn1_node node, char *ErrorDescription)
90
1.90k
{
91
92
1.90k
  Estrcpy (ErrorDescription, ":: tag error near element '");
93
1.90k
  _asn1_hierarchical_name (node, ErrorDescription + strlen (ErrorDescription),
94
1.90k
         ASN1_MAX_ERROR_DESCRIPTION_SIZE - 40);
95
1.90k
  Estrcat (ErrorDescription, "'");
96
97
1.90k
}
98
99
/**
100
 * asn1_get_length_der:
101
 * @der: DER data to decode.
102
 * @der_len: Length of DER data to decode.
103
 * @len: Output variable containing the length of the DER length field.
104
 *
105
 * Extract a length field from DER data.
106
 *
107
 * Returns: Return the decoded length value, or -1 on indefinite
108
 *   length, or -2 when the value was too big to fit in a int, or -4
109
 *   when the decoded length value plus @len would exceed @der_len.
110
 **/
111
long
112
asn1_get_length_der (const unsigned char *der, int der_len, int *len)
113
19.7M
{
114
19.7M
  unsigned int ans;
115
19.7M
  int k, punt, sum;
116
117
19.7M
  *len = 0;
118
19.7M
  if (der_len <= 0)
119
9.14k
    return 0;
120
121
19.7M
  if (!(der[0] & 128))
122
16.3M
    {
123
      /* short form */
124
16.3M
      *len = 1;
125
16.3M
      ans = der[0];
126
16.3M
    }
127
3.34M
  else
128
3.34M
    {
129
      /* Long form */
130
3.34M
      k = der[0] & 0x7F;
131
3.34M
      punt = 1;
132
3.34M
      if (k)
133
3.23M
  {     /* definite length method */
134
3.23M
    ans = 0;
135
9.63M
    while (punt <= k && punt < der_len)
136
6.40M
      {
137
6.40M
        if (INT_MULTIPLY_OVERFLOW (ans, 256))
138
2.83k
    return -2;
139
6.40M
        ans *= 256;
140
141
6.40M
        if (INT_ADD_OVERFLOW (ans, ((unsigned) der[punt])))
142
0
    return -2;
143
6.40M
        ans += der[punt];
144
6.40M
        punt++;
145
6.40M
      }
146
3.23M
  }
147
117k
      else
148
117k
  {     /* indefinite length method */
149
117k
    *len = punt;
150
117k
    return -1;
151
117k
  }
152
153
3.22M
      *len = punt;
154
3.22M
    }
155
156
19.6M
  sum = ans;
157
19.6M
  if (ans >= INT_MAX || INT_ADD_OVERFLOW (sum, (*len)))
158
2.76k
    return -2;
159
19.6M
  sum += *len;
160
161
19.6M
  if (sum > der_len)
162
17.5k
    return -4;
163
164
19.5M
  return ans;
165
19.6M
}
166
167
/**
168
 * asn1_get_tag_der:
169
 * @der: DER data to decode.
170
 * @der_len: Length of DER data to decode.
171
 * @cls: Output variable containing decoded class.
172
 * @len: Output variable containing the length of the DER TAG data.
173
 * @tag: Output variable containing the decoded tag (may be %NULL).
174
 *
175
 * Decode the class and TAG from DER code.
176
 *
177
 * Returns: Returns %ASN1_SUCCESS on success, or an error.
178
 **/
179
int
180
asn1_get_tag_der (const unsigned char *der, int der_len,
181
      unsigned char *cls, int *len, unsigned long *tag)
182
23.9M
{
183
23.9M
  unsigned int ris;
184
23.9M
  int punt;
185
186
23.9M
  if (der == NULL || der_len < 2 || len == NULL)
187
2.76k
    return ASN1_DER_ERROR;
188
189
23.9M
  *cls = der[0] & 0xE0;
190
23.9M
  if ((der[0] & 0x1F) != 0x1F)
191
23.5M
    {
192
      /* short form */
193
23.5M
      *len = 1;
194
23.5M
      ris = der[0] & 0x1F;
195
23.5M
    }
196
335k
  else
197
335k
    {
198
      /* Long form */
199
335k
      punt = 1;
200
335k
      ris = 0;
201
323M
      while (punt < der_len && der[punt] & 128)
202
323M
  {
203
204
323M
    if (INT_MULTIPLY_OVERFLOW (ris, 128))
205
1.22k
      return ASN1_DER_ERROR;
206
323M
    ris *= 128;
207
208
323M
    if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
209
0
      return ASN1_DER_ERROR;
210
323M
    ris += (der[punt] & 0x7F);
211
323M
    punt++;
212
323M
  }
213
214
334k
      if (punt >= der_len)
215
1.63k
  return ASN1_DER_ERROR;
216
217
333k
      if (INT_MULTIPLY_OVERFLOW (ris, 128))
218
1.86k
  return ASN1_DER_ERROR;
219
331k
      ris *= 128;
220
221
331k
      if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
222
0
  return ASN1_DER_ERROR;
223
331k
      ris += (der[punt] & 0x7F);
224
331k
      punt++;
225
226
331k
      *len = punt;
227
331k
    }
228
229
23.9M
  if (tag)
230
23.8M
    *tag = ris;
231
23.9M
  return ASN1_SUCCESS;
232
23.9M
}
233
234
/**
235
 * asn1_get_length_ber:
236
 * @ber: BER data to decode.
237
 * @ber_len: Length of BER data to decode.
238
 * @len: Output variable containing the length of the BER length field.
239
 *
240
 * Extract a length field from BER data.  The difference to
241
 * asn1_get_length_der() is that this function will return a length
242
 * even if the value has indefinite encoding.
243
 *
244
 * Returns: Return the decoded length value, or negative value when
245
 *   the value was too big.
246
 *
247
 * Since: 2.0
248
 **/
249
long
250
asn1_get_length_ber (const unsigned char *ber, int ber_len, int *len)
251
105k
{
252
105k
  int ret;
253
105k
  long err;
254
255
105k
  ret = asn1_get_length_der (ber, ber_len, len);
256
257
105k
  if (ret == -1 && ber_len > 1)
258
3.97k
    {       /* indefinite length method */
259
3.97k
      err = _asn1_get_indefinite_length_string (ber + 1, ber_len - 1, &ret);
260
3.97k
      if (err != ASN1_SUCCESS)
261
1.93k
  return -3;
262
3.97k
    }
263
264
103k
  return ret;
265
105k
}
266
267
/**
268
 * asn1_get_octet_der:
269
 * @der: DER data to decode containing the OCTET SEQUENCE.
270
 * @der_len: The length of the @der data to decode.
271
 * @ret_len: Output variable containing the encoded length of the DER data.
272
 * @str: Pre-allocated output buffer to put decoded OCTET SEQUENCE in.
273
 * @str_size: Length of pre-allocated output buffer.
274
 * @str_len: Output variable containing the length of the contents of the OCTET SEQUENCE.
275
 *
276
 * Extract an OCTET SEQUENCE from DER data. Note that this function
277
 * expects the DER data past the tag field, i.e., the length and
278
 * content octets.
279
 *
280
 * Returns: Returns %ASN1_SUCCESS on success, or an error.
281
 **/
282
int
283
asn1_get_octet_der (const unsigned char *der, int der_len,
284
        int *ret_len, unsigned char *str, int str_size,
285
        int *str_len)
286
1.67M
{
287
1.67M
  int len_len = 0;
288
289
1.67M
  if (der_len <= 0)
290
0
    return ASN1_GENERIC_ERROR;
291
292
1.67M
  *str_len = asn1_get_length_der (der, der_len, &len_len);
293
294
1.67M
  if (*str_len < 0)
295
0
    return ASN1_DER_ERROR;
296
297
1.67M
  *ret_len = *str_len + len_len;
298
1.67M
  if (str_size >= *str_len)
299
920k
    {
300
920k
      if (*str_len > 0 && str != NULL)
301
913k
  memcpy (str, der + len_len, *str_len);
302
920k
    }
303
756k
  else
304
756k
    {
305
756k
      return ASN1_MEM_ERROR;
306
756k
    }
307
308
920k
  return ASN1_SUCCESS;
309
1.67M
}
310
311
312
/*-
313
 * _asn1_get_time_der:
314
 * @type: %ASN1_ETYPE_GENERALIZED_TIME or %ASN1_ETYPE_UTC_TIME
315
 * @der: DER data to decode containing the time
316
 * @der_len: Length of DER data to decode.
317
 * @ret_len: Output variable containing the length of the DER data.
318
 * @str: Pre-allocated output buffer to put the textual time in.
319
 * @str_size: Length of pre-allocated output buffer.
320
 * @flags: Zero or %ASN1_DECODE_FLAG_STRICT_DER
321
 *
322
 * Performs basic checks in the DER encoded time object and returns its textual form.
323
 * The textual form will be in the YYYYMMDD000000Z format for GeneralizedTime
324
 * and YYMMDD000000Z for UTCTime.
325
 *
326
 * Returns: %ASN1_SUCCESS on success, or an error.
327
 -*/
328
static int
329
_asn1_get_time_der (unsigned type, const unsigned char *der, int der_len,
330
        int *ret_len, char *str, int str_size, unsigned flags)
331
200k
{
332
200k
  int len_len, str_len;
333
200k
  unsigned i;
334
200k
  unsigned sign_count = 0;
335
200k
  unsigned dot_count = 0;
336
200k
  const unsigned char *p;
337
338
200k
  if (der_len <= 0 || str == NULL)
339
26
    return ASN1_DER_ERROR;
340
341
200k
  str_len = asn1_get_length_der (der, der_len, &len_len);
342
200k
  if (str_len <= 0 || str_size < str_len)
343
1.09k
    return ASN1_DER_ERROR;
344
345
  /* perform some sanity checks on the data */
346
199k
  if (str_len < 8)
347
75
    {
348
75
      warn ();
349
75
      return ASN1_TIME_ENCODING_ERROR;
350
75
    }
351
352
199k
  if ((flags & ASN1_DECODE_FLAG_STRICT_DER)
353
199k
      && !(flags & ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME))
354
199k
    {
355
199k
      p = &der[len_len];
356
2.67M
      for (i = 0; i < (unsigned) (str_len - 1); i++)
357
2.47M
  {
358
2.47M
    if (c_isdigit (p[i]) == 0)
359
2.77k
      {
360
2.77k
        if (type == ASN1_ETYPE_GENERALIZED_TIME)
361
2.69k
    {
362
      /* tolerate lax encodings */
363
2.69k
      if (p[i] == '.' && dot_count == 0)
364
2.47k
        {
365
2.47k
          dot_count++;
366
2.47k
          continue;
367
2.47k
        }
368
369
      /* This is not really valid DER, but there are
370
       * structures using that */
371
216
      if (!(flags & ASN1_DECODE_FLAG_STRICT_DER) &&
372
0
          (p[i] == '+' || p[i] == '-') && sign_count == 0)
373
0
        {
374
0
          sign_count++;
375
0
          continue;
376
0
        }
377
216
    }
378
379
301
        warn ();
380
301
        return ASN1_TIME_ENCODING_ERROR;
381
2.77k
      }
382
2.47M
  }
383
384
199k
      if (sign_count == 0 && p[str_len - 1] != 'Z')
385
121
  {
386
121
    warn ();
387
121
    return ASN1_TIME_ENCODING_ERROR;
388
121
  }
389
199k
    }
390
198k
  memcpy (str, der + len_len, str_len);
391
198k
  str[str_len] = 0;
392
198k
  *ret_len = str_len + len_len;
393
394
198k
  return ASN1_SUCCESS;
395
199k
}
396
397
/**
398
 * asn1_get_object_id_der:
399
 * @der: DER data to decode containing the OBJECT IDENTIFIER
400
 * @der_len: Length of DER data to decode.
401
 * @ret_len: Output variable containing the length of the DER data.
402
 * @str: Pre-allocated output buffer to put the textual object id in.
403
 * @str_size: Length of pre-allocated output buffer.
404
 *
405
 * Converts a DER encoded object identifier to its textual form. This
406
 * function expects the DER object identifier without the tag.
407
 *
408
 * Returns: %ASN1_SUCCESS on success, or an error.
409
 **/
410
int
411
asn1_get_object_id_der (const unsigned char *der, int der_len, int *ret_len,
412
      char *str, int str_size)
413
1.42M
{
414
1.42M
  int len_len, len, k;
415
1.42M
  int leading, parsed;
416
1.42M
  char temp[LTOSTR_MAX_SIZE];
417
1.42M
  uint64_t val, val1, val0;
418
419
1.42M
  *ret_len = 0;
420
1.42M
  if (str && str_size > 0)
421
1.42M
    str[0] = 0;     /* no oid */
422
423
1.42M
  if (str == NULL || der_len <= 0)
424
61
    return ASN1_GENERIC_ERROR;
425
426
1.42M
  len = asn1_get_length_der (der, der_len, &len_len);
427
428
1.42M
  if (len <= 0 || len + len_len > der_len)
429
1.87k
    return ASN1_DER_ERROR;
430
431
  /* leading octet can never be 0x80 */
432
1.41M
  if (der[len_len] == 0x80)
433
68
    return ASN1_DER_ERROR;
434
435
1.41M
  val0 = 0;
436
437
1.60M
  for (k = 0; k < len; k++)
438
1.57M
    {
439
1.57M
      if (INT_LEFT_SHIFT_OVERFLOW (val0, 7))
440
179
  return ASN1_DER_ERROR;
441
442
1.57M
      val0 <<= 7;
443
1.57M
      val0 |= der[len_len + k] & 0x7F;
444
1.57M
      if (!(der[len_len + k] & 0x80))
445
1.39M
  break;
446
1.57M
    }
447
1.41M
  parsed = ++k;
448
449
  /* val0 = (X*40) + Y, X={0,1,2}, Y<=39 when X={0,1} */
450
  /* X = val, Y = val1 */
451
452
  /* check if X == 0  */
453
1.41M
  val = 0;
454
1.41M
  val1 = val0;
455
1.41M
  if (val1 > 39)
456
1.35M
    {
457
1.35M
      val = 1;
458
1.35M
      val1 = val0 - 40;
459
1.35M
      if (val1 > 39)
460
859k
  {
461
859k
    val = 2;
462
859k
    val1 = val0 - 80;
463
859k
  }
464
1.35M
    }
465
466
1.41M
  _asn1_str_cpy (str, str_size, _asn1_ltostr (val, temp));
467
1.41M
  _asn1_str_cat (str, str_size, ".");
468
1.41M
  _asn1_str_cat (str, str_size, _asn1_ltostr (val1, temp));
469
470
1.41M
  val = 0;
471
1.41M
  leading = 1;
472
17.3M
  for (k = parsed; k < len; k++)
473
15.9M
    {
474
      /* X.690 mandates that the leading byte must never be 0x80
475
       */
476
15.9M
      if (leading != 0 && der[len_len + k] == 0x80)
477
133
  return ASN1_DER_ERROR;
478
15.9M
      leading = 0;
479
480
      /* check for wrap around */
481
15.9M
      if (INT_LEFT_SHIFT_OVERFLOW (val, 7))
482
331
  return ASN1_DER_ERROR;
483
484
15.9M
      val = val << 7;
485
15.9M
      val |= der[len_len + k] & 0x7F;
486
487
15.9M
      if (!(der[len_len + k] & 0x80))
488
14.4M
  {
489
14.4M
    _asn1_str_cat (str, str_size, ".");
490
14.4M
    _asn1_str_cat (str, str_size, _asn1_ltostr (val, temp));
491
14.4M
    val = 0;
492
14.4M
    leading = 1;
493
14.4M
  }
494
15.9M
    }
495
496
1.41M
  if (INT_ADD_OVERFLOW (len, len_len))
497
0
    return ASN1_DER_ERROR;
498
499
1.41M
  *ret_len = len + len_len;
500
501
1.41M
  return ASN1_SUCCESS;
502
1.41M
}
503
504
/**
505
 * asn1_get_bit_der:
506
 * @der: DER data to decode containing the BIT SEQUENCE.
507
 * @der_len: Length of DER data to decode.
508
 * @ret_len: Output variable containing the length of the DER data.
509
 * @str: Pre-allocated output buffer to put decoded BIT SEQUENCE in.
510
 * @str_size: Length of pre-allocated output buffer.
511
 * @bit_len: Output variable containing the size of the BIT SEQUENCE.
512
 *
513
 * Extract a BIT SEQUENCE from DER data.
514
 *
515
 * Returns: %ASN1_SUCCESS on success, or an error.
516
 **/
517
int
518
asn1_get_bit_der (const unsigned char *der, int der_len,
519
      int *ret_len, unsigned char *str, int str_size,
520
      int *bit_len)
521
261k
{
522
261k
  int len_len = 0, len_byte;
523
524
261k
  if (der_len <= 0)
525
0
    return ASN1_GENERIC_ERROR;
526
527
261k
  len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
528
261k
  if (len_byte < 0)
529
2.47k
    return ASN1_DER_ERROR;
530
531
258k
  *ret_len = len_byte + len_len + 1;
532
258k
  *bit_len = len_byte * 8 - der[len_len];
533
534
258k
  if (*bit_len < 0)
535
728
    return ASN1_DER_ERROR;
536
537
258k
  if (str_size >= len_byte)
538
142k
    {
539
142k
      if (len_byte > 0 && str)
540
142k
  memcpy (str, der + len_len + 1, len_byte);
541
142k
    }
542
115k
  else
543
115k
    {
544
115k
      return ASN1_MEM_ERROR;
545
115k
    }
546
547
142k
  return ASN1_SUCCESS;
548
258k
}
549
550
/* tag_len: the total tag length (explicit+inner)
551
 * inner_tag_len: the inner_tag length
552
 */
553
static int
554
_asn1_extract_tag_der (asn1_node node, const unsigned char *der, int der_len,
555
           int *tag_len, int *inner_tag_len, unsigned flags)
556
15.4M
{
557
15.4M
  asn1_node p;
558
15.4M
  int counter, len2, len3, is_tag_implicit;
559
15.4M
  int result;
560
15.4M
  unsigned long tag, tag_implicit = 0;
561
15.4M
  unsigned char class, class2, class_implicit = 0;
562
563
15.4M
  if (der_len <= 0)
564
4.14k
    return ASN1_GENERIC_ERROR;
565
566
15.4M
  counter = is_tag_implicit = 0;
567
568
15.4M
  if (node->type & CONST_TAG)
569
1.46M
    {
570
1.46M
      p = node->down;
571
3.54M
      while (p)
572
2.15M
  {
573
2.15M
    if (type_field (p->type) == ASN1_ETYPE_TAG)
574
1.48M
      {
575
1.48M
        if (p->type & CONST_APPLICATION)
576
0
    class2 = ASN1_CLASS_APPLICATION;
577
1.48M
        else if (p->type & CONST_UNIVERSAL)
578
0
    class2 = ASN1_CLASS_UNIVERSAL;
579
1.48M
        else if (p->type & CONST_PRIVATE)
580
0
    class2 = ASN1_CLASS_PRIVATE;
581
1.48M
        else
582
1.48M
    class2 = ASN1_CLASS_CONTEXT_SPECIFIC;
583
584
1.48M
        if (p->type & CONST_EXPLICIT)
585
372k
    {
586
372k
      if (asn1_get_tag_der
587
372k
          (der + counter, der_len, &class, &len2,
588
372k
           &tag) != ASN1_SUCCESS)
589
1.26k
        return ASN1_DER_ERROR;
590
591
371k
      DECR_LEN (der_len, len2);
592
371k
      counter += len2;
593
594
371k
      if (flags & ASN1_DECODE_FLAG_STRICT_DER)
595
321k
        len3 =
596
321k
          asn1_get_length_der (der + counter, der_len, &len2);
597
49.7k
      else
598
49.7k
        len3 =
599
49.7k
          asn1_get_length_ber (der + counter, der_len, &len2);
600
371k
      if (len3 < 0)
601
8.65k
        return ASN1_DER_ERROR;
602
603
362k
      DECR_LEN (der_len, len2);
604
362k
      counter += len2;
605
606
362k
      if (!is_tag_implicit)
607
362k
        {
608
362k
          if ((class != (class2 | ASN1_CLASS_STRUCTURED)) ||
609
299k
        (tag != strtoul ((char *) p->value, NULL, 10)))
610
70.0k
      return ASN1_TAG_ERROR;
611
362k
        }
612
0
      else
613
0
        {   /* ASN1_TAG_IMPLICIT */
614
0
          if ((class != class_implicit) || (tag != tag_implicit))
615
0
      return ASN1_TAG_ERROR;
616
0
        }
617
292k
      is_tag_implicit = 0;
618
292k
    }
619
1.10M
        else
620
1.10M
    {   /* ASN1_TAG_IMPLICIT */
621
1.10M
      if (!is_tag_implicit)
622
1.10M
        {
623
1.10M
          if ((type_field (node->type) == ASN1_ETYPE_SEQUENCE) ||
624
918k
        (type_field (node->type) == ASN1_ETYPE_SEQUENCE_OF)
625
914k
        || (type_field (node->type) == ASN1_ETYPE_SET)
626
914k
        || (type_field (node->type) == ASN1_ETYPE_SET_OF))
627
227k
      class2 |= ASN1_CLASS_STRUCTURED;
628
1.10M
          class_implicit = class2;
629
1.10M
          tag_implicit = strtoul ((char *) p->value, NULL, 10);
630
1.10M
          is_tag_implicit = 1;
631
1.10M
        }
632
1.10M
    }
633
1.48M
      }
634
2.07M
    p = p->right;
635
2.07M
  }
636
1.46M
    }
637
638
15.3M
  if (is_tag_implicit)
639
1.10M
    {
640
1.10M
      if (asn1_get_tag_der
641
1.10M
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
642
2.42k
  return ASN1_DER_ERROR;
643
644
1.10M
      DECR_LEN (der_len, len2);
645
646
1.10M
      if ((class != class_implicit) || (tag != tag_implicit))
647
650k
  {
648
650k
    if (type_field (node->type) == ASN1_ETYPE_OCTET_STRING)
649
25.4k
      {
650
25.4k
        class_implicit |= ASN1_CLASS_STRUCTURED;
651
25.4k
        if ((class != class_implicit) || (tag != tag_implicit))
652
20.0k
    return ASN1_TAG_ERROR;
653
25.4k
      }
654
625k
    else
655
625k
      return ASN1_TAG_ERROR;
656
650k
  }
657
1.10M
    }
658
14.2M
  else
659
14.2M
    {
660
14.2M
      unsigned type = type_field (node->type);
661
14.2M
      if (type == ASN1_ETYPE_TAG)
662
21.3k
  {
663
21.3k
    *tag_len = 0;
664
21.3k
    if (inner_tag_len)
665
21.3k
      *inner_tag_len = 0;
666
21.3k
    return ASN1_SUCCESS;
667
21.3k
  }
668
669
14.2M
      if (asn1_get_tag_der
670
14.2M
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
671
2.30k
  return ASN1_DER_ERROR;
672
673
14.2M
      DECR_LEN (der_len, len2);
674
675
14.2M
      switch (type)
676
14.2M
  {
677
0
  case ASN1_ETYPE_NULL:
678
482k
  case ASN1_ETYPE_BOOLEAN:
679
1.34M
  case ASN1_ETYPE_INTEGER:
680
1.34M
  case ASN1_ETYPE_ENUMERATED:
681
2.81M
  case ASN1_ETYPE_OBJECT_ID:
682
2.81M
  case ASN1_ETYPE_GENERALSTRING:
683
2.81M
  case ASN1_ETYPE_NUMERIC_STRING:
684
2.81M
  case ASN1_ETYPE_IA5_STRING:
685
2.90M
  case ASN1_ETYPE_TELETEX_STRING:
686
3.04M
  case ASN1_ETYPE_PRINTABLE_STRING:
687
3.10M
  case ASN1_ETYPE_UNIVERSAL_STRING:
688
3.18M
  case ASN1_ETYPE_BMP_STRING:
689
3.23M
  case ASN1_ETYPE_UTF8_STRING:
690
3.23M
  case ASN1_ETYPE_VISIBLE_STRING:
691
3.42M
  case ASN1_ETYPE_BIT_STRING:
692
5.76M
  case ASN1_ETYPE_SEQUENCE:
693
6.46M
  case ASN1_ETYPE_SEQUENCE_OF:
694
6.46M
  case ASN1_ETYPE_SET:
695
7.17M
  case ASN1_ETYPE_SET_OF:
696
7.34M
  case ASN1_ETYPE_GENERALIZED_TIME:
697
7.81M
  case ASN1_ETYPE_UTC_TIME:
698
7.81M
    if ((class != _asn1_tags[type].class)
699
7.70M
        || (tag != _asn1_tags[type].tag))
700
688k
      return ASN1_DER_ERROR;
701
7.12M
    break;
702
703
7.12M
  case ASN1_ETYPE_OCTET_STRING:
704
    /* OCTET STRING is handled differently to allow
705
     * BER encodings (structured class). */
706
616k
    if (((class != ASN1_CLASS_UNIVERSAL)
707
23.6k
         && (class != (ASN1_CLASS_UNIVERSAL | ASN1_CLASS_STRUCTURED)))
708
616k
        || (tag != ASN1_TAG_OCTET_STRING))
709
21.6k
      return ASN1_DER_ERROR;
710
595k
    break;
711
5.82M
  case ASN1_ETYPE_ANY:
712
5.82M
    counter -= len2;
713
5.82M
    break;
714
0
  case ASN1_ETYPE_CHOICE:
715
0
    counter -= len2;
716
0
    break;
717
0
  default:
718
0
    return ASN1_DER_ERROR;
719
0
    break;
720
14.2M
  }
721
14.2M
    }
722
723
14.0M
  counter += len2;
724
14.0M
  *tag_len = counter;
725
14.0M
  if (inner_tag_len)
726
12.2M
    *inner_tag_len = len2;
727
14.0M
  return ASN1_SUCCESS;
728
729
0
cleanup:
730
0
  return result;
731
15.3M
}
732
733
static int
734
extract_tag_der_recursive (asn1_node node, const unsigned char *der,
735
         int der_len, int *ret_len, int *inner_len,
736
         unsigned flags)
737
15.4M
{
738
15.4M
  asn1_node p;
739
15.4M
  int ris = ASN1_DER_ERROR;
740
741
15.4M
  if (type_field (node->type) == ASN1_ETYPE_CHOICE)
742
1.73M
    {
743
1.73M
      p = node->down;
744
1.73M
      while (p)
745
1.73M
  {
746
1.73M
    ris =
747
1.73M
      _asn1_extract_tag_der (p, der, der_len, ret_len, inner_len,
748
1.73M
           flags);
749
1.73M
    if (ris == ASN1_SUCCESS)
750
1.73M
      break;
751
0
    p = p->right;
752
0
  }
753
754
1.73M
      *ret_len = 0;
755
1.73M
      return ris;
756
1.73M
    }
757
13.7M
  else
758
13.7M
    return _asn1_extract_tag_der (node, der, der_len, ret_len, inner_len,
759
13.7M
          flags);
760
15.4M
}
761
762
static int
763
_asn1_delete_not_used (asn1_node node)
764
513k
{
765
513k
  asn1_node p, p2;
766
767
513k
  if (node == NULL)
768
0
    return ASN1_ELEMENT_NOT_FOUND;
769
770
513k
  p = node;
771
16.8M
  while (p)
772
16.2M
    {
773
16.2M
      if (p->type & CONST_NOT_USED)
774
157k
  {
775
157k
    p2 = NULL;
776
157k
    if (p != node)
777
157k
      {
778
157k
        p2 = _asn1_find_left (p);
779
157k
        if (!p2)
780
1.79k
    p2 = _asn1_find_up (p);
781
157k
      }
782
157k
    asn1_delete_structure (&p);
783
157k
    p = p2;
784
157k
  }
785
786
16.2M
      if (!p)
787
0
  break;     /* reach node */
788
789
16.2M
      if (p->down)
790
7.54M
  {
791
7.54M
    p = p->down;
792
7.54M
  }
793
8.75M
      else
794
8.75M
  {
795
8.75M
    if (p == node)
796
47.9k
      p = NULL;
797
8.70M
    else if (p->right)
798
3.39M
      p = p->right;
799
5.30M
    else
800
5.30M
      {
801
7.53M
        while (1)
802
7.53M
    {
803
7.53M
      p = _asn1_find_up (p);
804
7.53M
      if (p == node)
805
465k
        {
806
465k
          p = NULL;
807
465k
          break;
808
465k
        }
809
7.07M
      if (p->right)
810
4.84M
        {
811
4.84M
          p = p->right;
812
4.84M
          break;
813
4.84M
        }
814
7.07M
    }
815
5.30M
      }
816
8.75M
  }
817
16.2M
    }
818
513k
  return ASN1_SUCCESS;
819
513k
}
820
821
static int
822
_asn1_get_indefinite_length_string (const unsigned char *der,
823
            int der_len, int *len)
824
13.7k
{
825
13.7k
  int len2, len3, counter, indefinite;
826
13.7k
  int result;
827
13.7k
  unsigned long tag;
828
13.7k
  unsigned char class;
829
830
13.7k
  counter = indefinite = 0;
831
832
4.21M
  while (1)
833
4.21M
    {
834
4.21M
      if (HAVE_TWO (der_len) && (der[counter] == 0)
835
148k
    && (der[counter + 1] == 0))
836
34.6k
  {
837
34.6k
    counter += 2;
838
34.6k
    DECR_LEN (der_len, 2);
839
840
34.6k
    indefinite--;
841
34.6k
    if (indefinite <= 0)
842
11.7k
      break;
843
22.8k
    else
844
22.8k
      continue;
845
34.6k
  }
846
847
4.18M
      if (asn1_get_tag_der
848
4.18M
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
849
861
  return ASN1_DER_ERROR;
850
851
4.18M
      DECR_LEN (der_len, len2);
852
4.18M
      counter += len2;
853
854
4.18M
      len2 = asn1_get_length_der (der + counter, der_len, &len3);
855
4.18M
      if (len2 < -1)
856
1.14k
  return ASN1_DER_ERROR;
857
858
4.18M
      if (len2 == -1)
859
58.6k
  {
860
58.6k
    indefinite++;
861
58.6k
    counter += 1;
862
58.6k
    DECR_LEN (der_len, 1);
863
58.6k
  }
864
4.12M
      else
865
4.12M
  {
866
4.12M
    counter += len2 + len3;
867
4.12M
    DECR_LEN (der_len, len2 + len3);
868
4.12M
  }
869
4.18M
    }
870
871
11.7k
  *len = counter;
872
11.7k
  return ASN1_SUCCESS;
873
874
0
cleanup:
875
0
  return result;
876
13.7k
}
877
878
static void
879
delete_unneeded_choice_fields (asn1_node p)
880
1.73M
{
881
1.73M
  asn1_node p2;
882
883
2.72M
  while (p->right)
884
991k
    {
885
991k
      p2 = p->right;
886
991k
      asn1_delete_structure (&p2);
887
991k
    }
888
1.73M
}
889
890
891
/**
892
 * asn1_der_decoding2
893
 * @element: pointer to an ASN1 structure.
894
 * @ider: vector that contains the DER encoding.
895
 * @max_ider_len: pointer to an integer giving the information about the
896
 *   maximal number of bytes occupied by *@ider. The real size of the DER
897
 *   encoding is returned through this pointer.
898
 * @flags: flags controlling the behaviour of the function.
899
 * @errorDescription: null-terminated string contains details when an
900
 *   error occurred.
901
 *
902
 * Fill the structure *@element with values of a DER encoding string. The
903
 * structure must just be created with function asn1_create_element().
904
 *
905
 * If %ASN1_DECODE_FLAG_ALLOW_PADDING flag is set then the function will ignore
906
 * padding after the decoded DER data. Upon a successful return the value of
907
 * *@max_ider_len will be set to the number of bytes decoded.
908
 *
909
 * If %ASN1_DECODE_FLAG_STRICT_DER flag is set then the function will
910
 * not decode any BER-encoded elements.
911
 *
912
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
913
 *   if @ELEMENT is %NULL, and %ASN1_TAG_ERROR or
914
 *   %ASN1_DER_ERROR if the der encoding doesn't match the structure
915
 *   name (*@ELEMENT deleted).
916
 **/
917
int
918
asn1_der_decoding2 (asn1_node *element, const void *ider, int *max_ider_len,
919
        unsigned int flags, char *errorDescription)
920
656k
{
921
656k
  asn1_node node, p, p2, p3;
922
656k
  char temp[128];
923
656k
  int counter, len2, len3, len4, move, ris, tlen;
924
656k
  struct node_tail_cache_st tcache = { NULL, NULL };
925
656k
  unsigned char class;
926
656k
  unsigned long tag;
927
656k
  int tag_len;
928
656k
  int indefinite, result, total_len = *max_ider_len, ider_len = *max_ider_len;
929
656k
  int inner_tag_len;
930
656k
  unsigned char *ptmp;
931
656k
  const unsigned char *ptag;
932
656k
  const unsigned char *der = ider;
933
934
656k
  node = *element;
935
936
656k
  if (errorDescription != NULL)
937
121k
    errorDescription[0] = 0;
938
939
656k
  if (node == NULL)
940
0
    return ASN1_ELEMENT_NOT_FOUND;
941
942
656k
  if (node->type & CONST_OPTION)
943
0
    {
944
0
      result = ASN1_GENERIC_ERROR;
945
0
      warn ();
946
0
      goto cleanup;
947
0
    }
948
949
656k
  counter = 0;
950
656k
  move = DOWN;
951
656k
  p = node;
952
21.8M
  while (1)
953
21.8M
    {
954
21.8M
      tag_len = 0;
955
21.8M
      inner_tag_len = 0;
956
21.8M
      ris = ASN1_SUCCESS;
957
21.8M
      if (move != UP)
958
13.2M
  {
959
13.2M
    if (p->type & CONST_SET)
960
0
      {
961
0
        p2 = _asn1_find_up (p);
962
0
        len2 = p2->tmp_ival;
963
0
        if (len2 == -1)
964
0
    {
965
0
      if (HAVE_TWO (ider_len) && !der[counter]
966
0
          && !der[counter + 1])
967
0
        {
968
0
          p = p2;
969
0
          move = UP;
970
0
          counter += 2;
971
0
          DECR_LEN (ider_len, 2);
972
0
          continue;
973
0
        }
974
0
    }
975
0
        else if (counter == len2)
976
0
    {
977
0
      p = p2;
978
0
      move = UP;
979
0
      continue;
980
0
    }
981
0
        else if (counter > len2)
982
0
    {
983
0
      result = ASN1_DER_ERROR;
984
0
      warn ();
985
0
      goto cleanup;
986
0
    }
987
0
        p2 = p2->down;
988
0
        while (p2)
989
0
    {
990
0
      if ((p2->type & CONST_SET) && (p2->type & CONST_NOT_USED))
991
0
        {
992
0
          ris =
993
0
      extract_tag_der_recursive (p2, der + counter,
994
0
               ider_len, &len2, NULL,
995
0
               flags);
996
0
          if (ris == ASN1_SUCCESS)
997
0
      {
998
0
        p2->type &= ~CONST_NOT_USED;
999
0
        p = p2;
1000
0
        break;
1001
0
      }
1002
0
        }
1003
0
      p2 = p2->right;
1004
0
    }
1005
0
        if (p2 == NULL)
1006
0
    {
1007
0
      result = ASN1_DER_ERROR;
1008
0
      warn ();
1009
0
      goto cleanup;
1010
0
    }
1011
0
      }
1012
1013
    /* the position in the DER structure this starts */
1014
13.2M
    p->start = counter;
1015
13.2M
    p->end = total_len - 1;
1016
1017
13.2M
    if ((p->type & CONST_OPTION) || (p->type & CONST_DEFAULT))
1018
1.34M
      {
1019
1.34M
        p2 = _asn1_find_up (p);
1020
1.34M
        len2 = p2->tmp_ival;
1021
1.34M
        if (counter == len2)
1022
269k
    {
1023
269k
      if (p->right)
1024
44.0k
        {
1025
44.0k
          p2 = p->right;
1026
44.0k
          move = RIGHT;
1027
44.0k
        }
1028
225k
      else
1029
225k
        move = UP;
1030
1031
269k
      if (p->type & CONST_OPTION)
1032
266k
        asn1_delete_structure (&p);
1033
1034
269k
      p = p2;
1035
269k
      continue;
1036
269k
    }
1037
1.34M
      }
1038
1039
12.9M
    if (type_field (p->type) == ASN1_ETYPE_CHOICE)
1040
1.75M
      {
1041
2.57M
        while (p->down)
1042
2.56M
    {
1043
2.56M
      ris =
1044
2.56M
        extract_tag_der_recursive (p->down, der + counter,
1045
2.56M
                 ider_len, &len2, NULL, flags);
1046
1047
2.56M
      if (ris == ASN1_SUCCESS)
1048
1.73M
        {
1049
1.73M
          delete_unneeded_choice_fields (p->down);
1050
1.73M
          break;
1051
1.73M
        }
1052
823k
      else if (ris == ASN1_ERROR_TYPE_ANY)
1053
0
        {
1054
0
          result = ASN1_ERROR_TYPE_ANY;
1055
0
          warn ();
1056
0
          goto cleanup;
1057
0
        }
1058
823k
      else
1059
823k
        {
1060
823k
          p2 = p->down;
1061
823k
          asn1_delete_structure (&p2);
1062
823k
        }
1063
2.56M
    }
1064
1065
1.75M
        if (p->down == NULL)
1066
16.6k
    {
1067
16.6k
      if (!(p->type & CONST_OPTION))
1068
13.6k
        {
1069
13.6k
          result = ASN1_DER_ERROR;
1070
13.6k
          warn ();
1071
13.6k
          goto cleanup;
1072
13.6k
        }
1073
16.6k
    }
1074
1.73M
        else if (type_field (p->type) != ASN1_ETYPE_CHOICE)
1075
0
    p = p->down;
1076
1077
1.74M
        p->start = counter;
1078
1.74M
      }
1079
1080
12.9M
    if ((p->type & CONST_OPTION) || (p->type & CONST_DEFAULT))
1081
1.07M
      {
1082
1.07M
        p2 = _asn1_find_up (p);
1083
1.07M
        len2 = p2->tmp_ival;
1084
1085
1.07M
        if ((len2 != -1) && (counter > len2))
1086
3.16k
    ris = ASN1_TAG_ERROR;
1087
1.07M
      }
1088
1089
12.9M
    if (ris == ASN1_SUCCESS)
1090
12.9M
      ris =
1091
12.9M
        extract_tag_der_recursive (p, der + counter, ider_len,
1092
12.9M
           &tag_len, &inner_tag_len, flags);
1093
1094
12.9M
    if (ris != ASN1_SUCCESS)
1095
626k
      {
1096
626k
        if (p->type & CONST_OPTION)
1097
179k
    {
1098
179k
      p->type |= CONST_NOT_USED;
1099
179k
      move = RIGHT;
1100
179k
    }
1101
447k
        else if (p->type & CONST_DEFAULT)
1102
345k
    {
1103
345k
      _asn1_set_value (p, NULL, 0);
1104
345k
      move = RIGHT;
1105
345k
    }
1106
102k
        else
1107
102k
    {
1108
102k
      if (errorDescription != NULL)
1109
1.90k
        _asn1_error_description_tag_error (p, errorDescription);
1110
1111
102k
      result = ASN1_TAG_ERROR;
1112
102k
      warn ();
1113
102k
      goto cleanup;
1114
102k
    }
1115
626k
      }
1116
12.2M
    else
1117
12.2M
      {
1118
12.2M
        DECR_LEN (ider_len, tag_len);
1119
12.2M
        counter += tag_len;
1120
12.2M
      }
1121
12.9M
  }
1122
1123
21.4M
      if (ris == ASN1_SUCCESS)
1124
20.9M
  {
1125
20.9M
    switch (type_field (p->type))
1126
20.9M
      {
1127
1.78k
      case ASN1_ETYPE_NULL:
1128
1.78k
        DECR_LEN (ider_len, 1);
1129
1.78k
        if (der[counter])
1130
3
    {
1131
3
      result = ASN1_DER_ERROR;
1132
3
      warn ();
1133
3
      goto cleanup;
1134
3
    }
1135
1.78k
        counter++;
1136
1.78k
        move = RIGHT;
1137
1.78k
        break;
1138
148k
      case ASN1_ETYPE_BOOLEAN:
1139
148k
        DECR_LEN (ider_len, 2);
1140
1141
148k
        if (der[counter++] != 1)
1142
87
    {
1143
87
      result = ASN1_DER_ERROR;
1144
87
      warn ();
1145
87
      goto cleanup;
1146
87
    }
1147
147k
        if (der[counter++] == 0)
1148
9.63k
    _asn1_set_value (p, "F", 1);
1149
138k
        else
1150
138k
    _asn1_set_value (p, "T", 1);
1151
147k
        move = RIGHT;
1152
147k
        break;
1153
796k
      case ASN1_ETYPE_INTEGER:
1154
800k
      case ASN1_ETYPE_ENUMERATED:
1155
800k
        len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1156
800k
        if (len2 < 0)
1157
1.82k
    {
1158
1.82k
      result = ASN1_DER_ERROR;
1159
1.82k
      warn ();
1160
1.82k
      goto cleanup;
1161
1.82k
    }
1162
1163
798k
        DECR_LEN (ider_len, len3 + len2);
1164
1165
798k
        _asn1_set_value (p, der + counter, len3 + len2);
1166
798k
        counter += len3 + len2;
1167
798k
        move = RIGHT;
1168
798k
        break;
1169
1.42M
      case ASN1_ETYPE_OBJECT_ID:
1170
1.42M
        result =
1171
1.42M
    asn1_get_object_id_der (der + counter, ider_len, &len2,
1172
1.42M
          temp, sizeof (temp));
1173
1.42M
        if (result != ASN1_SUCCESS)
1174
2.64k
    {
1175
2.64k
      warn ();
1176
2.64k
      goto cleanup;
1177
2.64k
    }
1178
1179
1.41M
        DECR_LEN (ider_len, len2);
1180
1181
1.41M
        tlen = strlen (temp);
1182
1.41M
        if (tlen > 0)
1183
1.41M
    _asn1_set_value (p, temp, tlen + 1);
1184
1185
1.41M
        counter += len2;
1186
1.41M
        move = RIGHT;
1187
1.41M
        break;
1188
60.0k
      case ASN1_ETYPE_GENERALIZED_TIME:
1189
200k
      case ASN1_ETYPE_UTC_TIME:
1190
200k
        result =
1191
200k
    _asn1_get_time_der (type_field (p->type), der + counter,
1192
200k
            ider_len, &len2, temp, sizeof (temp) - 1,
1193
200k
            flags);
1194
200k
        if (result != ASN1_SUCCESS)
1195
1.61k
    {
1196
1.61k
      warn ();
1197
1.61k
      goto cleanup;
1198
1.61k
    }
1199
1200
198k
        DECR_LEN (ider_len, len2);
1201
1202
198k
        tlen = strlen (temp);
1203
198k
        if (tlen > 0)
1204
198k
    _asn1_set_value (p, temp, tlen);
1205
1206
198k
        counter += len2;
1207
198k
        move = RIGHT;
1208
198k
        break;
1209
606k
      case ASN1_ETYPE_OCTET_STRING:
1210
606k
        if (counter < inner_tag_len)
1211
0
    {
1212
0
      result = ASN1_DER_ERROR;
1213
0
      warn ();
1214
0
      goto cleanup;
1215
0
    }
1216
1217
606k
        ptag = der + counter - inner_tag_len;
1218
606k
        if ((flags & ASN1_DECODE_FLAG_STRICT_DER)
1219
24.4k
      || !(ptag[0] & ASN1_CLASS_STRUCTURED))
1220
602k
    {
1221
602k
      if (ptag[0] & ASN1_CLASS_STRUCTURED)
1222
132
        {
1223
132
          result = ASN1_DER_ERROR;
1224
132
          warn ();
1225
132
          goto cleanup;
1226
132
        }
1227
1228
602k
      len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1229
602k
      if (len2 < 0)
1230
1.66k
        {
1231
1.66k
          result = ASN1_DER_ERROR;
1232
1.66k
          warn ();
1233
1.66k
          goto cleanup;
1234
1.66k
        }
1235
1236
600k
      DECR_LEN (ider_len, len3 + len2);
1237
1238
600k
      _asn1_set_value (p, der + counter, len3 + len2);
1239
600k
      counter += len3 + len2;
1240
600k
    }
1241
4.09k
        else
1242
4.09k
    {
1243
4.09k
      unsigned dflags = 0, vlen, ber_len;
1244
1245
4.09k
      if (ptag[0] & ASN1_CLASS_STRUCTURED)
1246
4.09k
        dflags |= DECODE_FLAG_CONSTRUCTED;
1247
1248
4.09k
      result =
1249
4.09k
        _asn1_decode_simple_ber (type_field (p->type),
1250
4.09k
               der + counter, ider_len, &ptmp,
1251
4.09k
               &vlen, &ber_len, dflags);
1252
4.09k
      if (result != ASN1_SUCCESS)
1253
1.18k
        {
1254
1.18k
          warn ();
1255
1.18k
          goto cleanup;
1256
1.18k
        }
1257
1258
2.91k
      DECR_LEN (ider_len, ber_len);
1259
1260
2.91k
      _asn1_set_value_lv (p, ptmp, vlen);
1261
1262
2.91k
      counter += ber_len;
1263
2.91k
      free (ptmp);
1264
2.91k
    }
1265
603k
        move = RIGHT;
1266
603k
        break;
1267
153
      case ASN1_ETYPE_GENERALSTRING:
1268
153
      case ASN1_ETYPE_NUMERIC_STRING:
1269
85.7k
      case ASN1_ETYPE_IA5_STRING:
1270
92.7k
      case ASN1_ETYPE_TELETEX_STRING:
1271
123k
      case ASN1_ETYPE_PRINTABLE_STRING:
1272
129k
      case ASN1_ETYPE_UNIVERSAL_STRING:
1273
153k
      case ASN1_ETYPE_BMP_STRING:
1274
157k
      case ASN1_ETYPE_UTF8_STRING:
1275
157k
      case ASN1_ETYPE_VISIBLE_STRING:
1276
353k
      case ASN1_ETYPE_BIT_STRING:
1277
353k
        len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1278
353k
        if (len2 < 0)
1279
1.84k
    {
1280
1.84k
      result = ASN1_DER_ERROR;
1281
1.84k
      warn ();
1282
1.84k
      goto cleanup;
1283
1.84k
    }
1284
1285
351k
        DECR_LEN (ider_len, len3 + len2);
1286
1287
351k
        _asn1_set_value (p, der + counter, len3 + len2);
1288
351k
        counter += len3 + len2;
1289
351k
        move = RIGHT;
1290
351k
        break;
1291
4.24M
      case ASN1_ETYPE_SEQUENCE:
1292
4.24M
      case ASN1_ETYPE_SET:
1293
4.24M
        if (move == UP)
1294
1.92M
    {
1295
1.92M
      len2 = p->tmp_ival;
1296
1.92M
      p->tmp_ival = 0;
1297
1.92M
      if (len2 == -1)
1298
27.1k
        {   /* indefinite length method */
1299
27.1k
          DECR_LEN (ider_len, 2);
1300
26.8k
          if ((der[counter]) || der[counter + 1])
1301
211
      {
1302
211
        result = ASN1_DER_ERROR;
1303
211
        warn ();
1304
211
        goto cleanup;
1305
211
      }
1306
26.6k
          counter += 2;
1307
26.6k
        }
1308
1.89M
      else
1309
1.89M
        {   /* definite length method */
1310
1.89M
          if (len2 != counter)
1311
7.58k
      {
1312
7.58k
        result = ASN1_DER_ERROR;
1313
7.58k
        warn ();
1314
7.58k
        goto cleanup;
1315
7.58k
      }
1316
1.89M
        }
1317
1.91M
      move = RIGHT;
1318
1.91M
    }
1319
2.31M
        else
1320
2.31M
    {   /* move==DOWN || move==RIGHT */
1321
2.31M
      len3 = asn1_get_length_der (der + counter, ider_len, &len2);
1322
2.31M
      if (IS_ERR (len3, flags))
1323
2.59k
        {
1324
2.59k
          result = ASN1_DER_ERROR;
1325
2.59k
          warn ();
1326
2.59k
          goto cleanup;
1327
2.59k
        }
1328
1329
2.31M
      DECR_LEN (ider_len, len2);
1330
2.31M
      counter += len2;
1331
1332
2.31M
      if (len3 > 0)
1333
2.03M
        {
1334
2.03M
          p->tmp_ival = counter + len3;
1335
2.03M
          move = DOWN;
1336
2.03M
        }
1337
284k
      else if (len3 == 0)
1338
251k
        {
1339
251k
          p2 = p->down;
1340
917k
          while (p2)
1341
665k
      {
1342
665k
        if (type_field (p2->type) != ASN1_ETYPE_TAG)
1343
665k
          {
1344
665k
            p3 = p2->right;
1345
665k
            asn1_delete_structure (&p2);
1346
665k
            p2 = p3;
1347
665k
          }
1348
761
        else
1349
761
          p2 = p2->right;
1350
665k
      }
1351
251k
          move = RIGHT;
1352
251k
        }
1353
32.9k
      else
1354
32.9k
        {   /* indefinite length method */
1355
32.9k
          p->tmp_ival = -1;
1356
32.9k
          move = DOWN;
1357
32.9k
        }
1358
2.31M
    }
1359
4.23M
        break;
1360
4.23M
      case ASN1_ETYPE_SEQUENCE_OF:
1361
6.05M
      case ASN1_ETYPE_SET_OF:
1362
6.05M
        if (move == UP)
1363
5.00M
    {
1364
5.00M
      len2 = p->tmp_ival;
1365
5.00M
      if (len2 == -1)
1366
1.30M
        {   /* indefinite length method */
1367
1.30M
          if (!HAVE_TWO (ider_len)
1368
1.29M
        || ((der[counter]) || der[counter + 1]))
1369
1.29M
      {
1370
1.29M
        result = _asn1_append_sequence_set (p, &tcache);
1371
1.29M
        if (result != 0)
1372
0
          {
1373
0
            warn ();
1374
0
            goto cleanup;
1375
0
          }
1376
1.29M
        p = tcache.tail;
1377
1.29M
        move = RIGHT;
1378
1.29M
        continue;
1379
1.29M
      }
1380
1381
9.51k
          p->tmp_ival = 0;
1382
9.51k
          tcache.tail = NULL; /* finished decoding this structure */
1383
9.51k
          tcache.head = NULL;
1384
9.51k
          DECR_LEN (ider_len, 2);
1385
9.51k
          counter += 2;
1386
9.51k
        }
1387
3.70M
      else
1388
3.70M
        {   /* definite length method */
1389
3.70M
          if (len2 > counter)
1390
2.88M
      {
1391
2.88M
        result = _asn1_append_sequence_set (p, &tcache);
1392
2.88M
        if (result != 0)
1393
0
          {
1394
0
            warn ();
1395
0
            goto cleanup;
1396
0
          }
1397
2.88M
        p = tcache.tail;
1398
2.88M
        move = RIGHT;
1399
2.88M
        continue;
1400
2.88M
      }
1401
1402
818k
          p->tmp_ival = 0;
1403
818k
          tcache.tail = NULL; /* finished decoding this structure */
1404
818k
          tcache.head = NULL;
1405
1406
818k
          if (len2 != counter)
1407
788
      {
1408
788
        result = ASN1_DER_ERROR;
1409
788
        warn ();
1410
788
        goto cleanup;
1411
788
      }
1412
818k
        }
1413
5.00M
    }
1414
1.05M
        else
1415
1.05M
    {   /* move==DOWN || move==RIGHT */
1416
1.05M
      len3 = asn1_get_length_der (der + counter, ider_len, &len2);
1417
1.05M
      if (IS_ERR (len3, flags))
1418
1.77k
        {
1419
1.77k
          result = ASN1_DER_ERROR;
1420
1.77k
          warn ();
1421
1.77k
          goto cleanup;
1422
1.77k
        }
1423
1424
1.04M
      DECR_LEN (ider_len, len2);
1425
1.04M
      counter += len2;
1426
1.04M
      if (len3)
1427
839k
        {
1428
839k
          if (len3 > 0)
1429
829k
      { /* definite length method */
1430
829k
        p->tmp_ival = counter + len3;
1431
829k
      }
1432
10.4k
          else
1433
10.4k
      { /* indefinite length method */
1434
10.4k
        p->tmp_ival = -1;
1435
10.4k
      }
1436
1437
839k
          p2 = p->down;
1438
839k
          if (p2 == NULL)
1439
0
      {
1440
0
        result = ASN1_DER_ERROR;
1441
0
        warn ();
1442
0
        goto cleanup;
1443
0
      }
1444
1445
925k
          while ((type_field (p2->type) == ASN1_ETYPE_TAG)
1446
839k
           || (type_field (p2->type) == ASN1_ETYPE_SIZE))
1447
85.5k
      p2 = p2->right;
1448
839k
          if (p2->right == NULL)
1449
839k
      {
1450
839k
        result = _asn1_append_sequence_set (p, &tcache);
1451
839k
        if (result != 0)
1452
0
          {
1453
0
            warn ();
1454
0
            goto cleanup;
1455
0
          }
1456
839k
      }
1457
839k
          p = p2;
1458
839k
        }
1459
1.04M
    }
1460
1.87M
        move = RIGHT;
1461
1.87M
        break;
1462
3.63M
      case ASN1_ETYPE_ANY:
1463
        /* Check indefinite length method in an EXPLICIT TAG */
1464
1465
3.63M
        if (!(flags & ASN1_DECODE_FLAG_STRICT_DER)
1466
1.34M
      && (p->type & CONST_TAG) && tag_len == 2
1467
9.15k
      && (der[counter - 1] == 0x80))
1468
1.39k
    indefinite = 1;
1469
3.63M
        else
1470
3.63M
    indefinite = 0;
1471
1472
3.63M
        if (asn1_get_tag_der
1473
3.63M
      (der + counter, ider_len, &class, &len2,
1474
3.63M
       &tag) != ASN1_SUCCESS)
1475
204
    {
1476
204
      result = ASN1_DER_ERROR;
1477
204
      warn ();
1478
204
      goto cleanup;
1479
204
    }
1480
1481
3.63M
        DECR_LEN (ider_len, len2);
1482
1483
3.63M
        len4 =
1484
3.63M
    asn1_get_length_der (der + counter + len2, ider_len, &len3);
1485
3.63M
        if (IS_ERR (len4, flags))
1486
1.93k
    {
1487
1.93k
      result = ASN1_DER_ERROR;
1488
1.93k
      warn ();
1489
1.93k
      goto cleanup;
1490
1.93k
    }
1491
3.63M
        if (len4 != -1)  /* definite */
1492
3.62M
    {
1493
3.62M
      len2 += len4;
1494
1495
3.62M
      DECR_LEN (ider_len, len4 + len3);
1496
3.62M
      _asn1_set_value_lv (p, der + counter, len2 + len3);
1497
3.62M
      counter += len2 + len3;
1498
3.62M
    }
1499
9.81k
        else    /* == -1 */
1500
9.81k
    {   /* indefinite length */
1501
9.81k
      ider_len += len2; /* undo DECR_LEN */
1502
1503
9.81k
      if (counter == 0)
1504
0
        {
1505
0
          result = ASN1_DER_ERROR;
1506
0
          warn ();
1507
0
          goto cleanup;
1508
0
        }
1509
1510
9.81k
      result =
1511
9.81k
        _asn1_get_indefinite_length_string (der + counter,
1512
9.81k
              ider_len, &len2);
1513
9.81k
      if (result != ASN1_SUCCESS)
1514
65
        {
1515
65
          warn ();
1516
65
          goto cleanup;
1517
65
        }
1518
1519
9.75k
      DECR_LEN (ider_len, len2);
1520
9.75k
      _asn1_set_value_lv (p, der + counter, len2);
1521
9.75k
      counter += len2;
1522
1523
9.75k
    }
1524
1525
        /* Check if a couple of 0x00 are present due to an EXPLICIT TAG with
1526
           an indefinite length method. */
1527
3.63M
        if (indefinite)
1528
1.39k
    {
1529
1.39k
      DECR_LEN (ider_len, 2);
1530
1.31k
      if (!der[counter] && !der[counter + 1])
1531
1.17k
        {
1532
1.17k
          counter += 2;
1533
1.17k
        }
1534
143
      else
1535
143
        {
1536
143
          result = ASN1_DER_ERROR;
1537
143
          warn ();
1538
143
          goto cleanup;
1539
143
        }
1540
1.31k
    }
1541
1542
3.63M
        move = RIGHT;
1543
3.63M
        break;
1544
3.48M
      default:
1545
3.48M
        move = (move == UP) ? RIGHT : DOWN;
1546
3.48M
        break;
1547
20.9M
      }
1548
20.9M
  }
1549
1550
17.2M
      if (p)
1551
17.2M
  {
1552
17.2M
    p->end = counter - 1;
1553
17.2M
  }
1554
1555
17.2M
      if (p == node && move != DOWN)
1556
513k
  break;
1557
1558
16.7M
      if (move == DOWN)
1559
3.82M
  {
1560
3.82M
    if (p->down)
1561
3.80M
      p = p->down;
1562
21.3k
    else
1563
21.3k
      move = RIGHT;
1564
3.82M
  }
1565
16.7M
      if ((move == RIGHT) && !(p->type & CONST_SET))
1566
12.9M
  {
1567
12.9M
    if (p->right)
1568
4.53M
      p = p->right;
1569
8.43M
    else
1570
8.43M
      move = UP;
1571
12.9M
  }
1572
16.7M
      if (move == UP)
1573
8.43M
  {
1574
    /* If we are parsing a sequence or set and p is a direct
1575
       child of it, no need to traverse the list back to the leftmost node. */
1576
8.43M
    if (tcache.tail == p)
1577
4.46M
      p = tcache.head;
1578
3.96M
    else
1579
3.96M
      p = _asn1_find_up (p);
1580
8.43M
  }
1581
16.7M
    }
1582
1583
513k
  _asn1_delete_not_used (*element);
1584
1585
513k
  if ((ider_len < 0) ||
1586
513k
      (!(flags & ASN1_DECODE_FLAG_ALLOW_PADDING) && (ider_len != 0)))
1587
847
    {
1588
847
      warn ();
1589
847
      result = ASN1_DER_ERROR;
1590
847
      goto cleanup;
1591
847
    }
1592
1593
512k
  *max_ider_len = total_len - ider_len;
1594
1595
512k
  return ASN1_SUCCESS;
1596
1597
143k
cleanup:
1598
143k
  asn1_delete_structure (element);
1599
143k
  return result;
1600
513k
}
1601
1602
1603
/**
1604
 * asn1_der_decoding:
1605
 * @element: pointer to an ASN1 structure.
1606
 * @ider: vector that contains the DER encoding.
1607
 * @ider_len: number of bytes of *@ider: @ider[0]..@ider[len-1].
1608
 * @errorDescription: null-terminated string contains details when an
1609
 *   error occurred.
1610
 *
1611
 * Fill the structure *@element with values of a DER encoding
1612
 * string. The structure must just be created with function
1613
 * asn1_create_element().
1614
 *
1615
 * Note that the *@element variable is provided as a pointer for
1616
 * historical reasons.
1617
 *
1618
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1619
 *   if @ELEMENT is %NULL, and %ASN1_TAG_ERROR or
1620
 *   %ASN1_DER_ERROR if the der encoding doesn't match the structure
1621
 *   name (*@ELEMENT deleted).
1622
 **/
1623
int
1624
asn1_der_decoding (asn1_node *element, const void *ider, int ider_len,
1625
       char *errorDescription)
1626
134k
{
1627
134k
  return asn1_der_decoding2 (element, ider, &ider_len, 0, errorDescription);
1628
134k
}
1629
1630
/**
1631
 * asn1_der_decoding_element:
1632
 * @structure: pointer to an ASN1 structure
1633
 * @elementName: name of the element to fill
1634
 * @ider: vector that contains the DER encoding of the whole structure.
1635
 * @len: number of bytes of *der: der[0]..der[len-1]
1636
 * @errorDescription: null-terminated string contains details when an
1637
 *   error occurred.
1638
 *
1639
 * Fill the element named @ELEMENTNAME with values of a DER encoding
1640
 * string.  The structure must just be created with function
1641
 * asn1_create_element().  The DER vector must contain the encoding
1642
 * string of the whole @STRUCTURE.  If an error occurs during the
1643
 * decoding procedure, the *@STRUCTURE is deleted and set equal to
1644
 * %NULL.
1645
 *
1646
 * This function is deprecated and may just be an alias to asn1_der_decoding
1647
 * in future versions. Use asn1_der_decoding() instead.
1648
 *
1649
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1650
 *   if ELEMENT is %NULL or @elementName == NULL, and
1651
 *   %ASN1_TAG_ERROR or %ASN1_DER_ERROR if the der encoding doesn't
1652
 *   match the structure @structure (*ELEMENT deleted).
1653
 **/
1654
int
1655
asn1_der_decoding_element (asn1_node *structure, const char *elementName,
1656
         const void *ider, int len, char *errorDescription)
1657
0
{
1658
0
  return asn1_der_decoding (structure, ider, len, errorDescription);
1659
0
}
1660
1661
/**
1662
 * asn1_der_decoding_startEnd:
1663
 * @element: pointer to an ASN1 element
1664
 * @ider: vector that contains the DER encoding.
1665
 * @ider_len: number of bytes of *@ider: @ider[0]..@ider[len-1]
1666
 * @name_element: an element of NAME structure.
1667
 * @start: the position of the first byte of NAME_ELEMENT decoding
1668
 *   (@ider[*start])
1669
 * @end: the position of the last byte of NAME_ELEMENT decoding
1670
 *  (@ider[*end])
1671
 *
1672
 * Find the start and end point of an element in a DER encoding
1673
 * string. I mean that if you have a der encoding and you have already
1674
 * used the function asn1_der_decoding() to fill a structure, it may
1675
 * happen that you want to find the piece of string concerning an
1676
 * element of the structure.
1677
 *
1678
 * One example is the sequence "tbsCertificate" inside an X509
1679
 * certificate.
1680
 *
1681
 * Note that since libtasn1 3.7 the @ider and @ider_len parameters
1682
 * can be omitted, if the element is already decoded using asn1_der_decoding().
1683
 *
1684
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1685
 *   if ELEMENT is %asn1_node EMPTY or @name_element is not a valid
1686
 *   element, %ASN1_TAG_ERROR or %ASN1_DER_ERROR if the der encoding
1687
 *   doesn't match the structure ELEMENT.
1688
 **/
1689
int
1690
asn1_der_decoding_startEnd (asn1_node element, const void *ider, int ider_len,
1691
          const char *name_element, int *start, int *end)
1692
742k
{
1693
742k
  asn1_node node, node_to_find;
1694
742k
  int result = ASN1_DER_ERROR;
1695
1696
742k
  node = element;
1697
1698
742k
  if (node == NULL)
1699
0
    return ASN1_ELEMENT_NOT_FOUND;
1700
1701
742k
  node_to_find = asn1_find_node (node, name_element);
1702
1703
742k
  if (node_to_find == NULL)
1704
881
    return ASN1_ELEMENT_NOT_FOUND;
1705
1706
741k
  *start = node_to_find->start;
1707
741k
  *end = node_to_find->end;
1708
1709
741k
  if (*start == 0 && *end == 0)
1710
0
    {
1711
0
      if (ider == NULL || ider_len == 0)
1712
0
  return ASN1_GENERIC_ERROR;
1713
1714
      /* it seems asn1_der_decoding() wasn't called before. Do it now */
1715
0
      result = asn1_der_decoding (&node, ider, ider_len, NULL);
1716
0
      if (result != ASN1_SUCCESS)
1717
0
  {
1718
0
    warn ();
1719
0
    return result;
1720
0
  }
1721
1722
0
      node_to_find = asn1_find_node (node, name_element);
1723
0
      if (node_to_find == NULL)
1724
0
  return ASN1_ELEMENT_NOT_FOUND;
1725
1726
0
      *start = node_to_find->start;
1727
0
      *end = node_to_find->end;
1728
0
    }
1729
1730
741k
  if (*end < *start)
1731
0
    return ASN1_GENERIC_ERROR;
1732
1733
741k
  return ASN1_SUCCESS;
1734
741k
}
1735
1736
/**
1737
 * asn1_expand_any_defined_by:
1738
 * @definitions: ASN1 definitions
1739
 * @element: pointer to an ASN1 structure
1740
 *
1741
 * Expands every "ANY DEFINED BY" element of a structure created from
1742
 * a DER decoding process (asn1_der_decoding function). The element
1743
 * ANY must be defined by an OBJECT IDENTIFIER. The type used to
1744
 * expand the element ANY is the first one following the definition of
1745
 * the actual value of the OBJECT IDENTIFIER.
1746
 *
1747
 * Returns: %ASN1_SUCCESS if Substitution OK, %ASN1_ERROR_TYPE_ANY if
1748
 *   some "ANY DEFINED BY" element couldn't be expanded due to a
1749
 *   problem in OBJECT_ID -> TYPE association, or other error codes
1750
 *   depending on DER decoding.
1751
 **/
1752
int
1753
asn1_expand_any_defined_by (asn1_node_const definitions, asn1_node *element)
1754
0
{
1755
0
  char name[2 * ASN1_MAX_NAME_SIZE + 2], value[ASN1_MAX_NAME_SIZE];
1756
0
  int retCode = ASN1_SUCCESS, result;
1757
0
  int len, len2, len3;
1758
0
  asn1_node_const p2;
1759
0
  asn1_node p, p3, aux = NULL;
1760
0
  char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
1761
0
  const char *definitionsName;
1762
1763
0
  if ((definitions == NULL) || (*element == NULL))
1764
0
    return ASN1_ELEMENT_NOT_FOUND;
1765
1766
0
  definitionsName = definitions->name;
1767
1768
0
  p = *element;
1769
0
  while (p)
1770
0
    {
1771
1772
0
      switch (type_field (p->type))
1773
0
  {
1774
0
  case ASN1_ETYPE_ANY:
1775
0
    if ((p->type & CONST_DEFINED_BY) && (p->value))
1776
0
      {
1777
        /* search the "DEF_BY" element */
1778
0
        p2 = p->down;
1779
0
        while ((p2) && (type_field (p2->type) != ASN1_ETYPE_CONSTANT))
1780
0
    p2 = p2->right;
1781
1782
0
        if (!p2)
1783
0
    {
1784
0
      retCode = ASN1_ERROR_TYPE_ANY;
1785
0
      break;
1786
0
    }
1787
1788
0
        p3 = _asn1_find_up (p);
1789
1790
0
        if (!p3)
1791
0
    {
1792
0
      retCode = ASN1_ERROR_TYPE_ANY;
1793
0
      break;
1794
0
    }
1795
1796
0
        p3 = p3->down;
1797
0
        while (p3)
1798
0
    {
1799
0
      if (!(strcmp (p3->name, p2->name)))
1800
0
        break;
1801
0
      p3 = p3->right;
1802
0
    }
1803
1804
0
        if ((!p3) || (type_field (p3->type) != ASN1_ETYPE_OBJECT_ID) ||
1805
0
      (p3->value == NULL))
1806
0
    {
1807
1808
0
      p3 = _asn1_find_up (p);
1809
0
      p3 = _asn1_find_up (p3);
1810
1811
0
      if (!p3)
1812
0
        {
1813
0
          retCode = ASN1_ERROR_TYPE_ANY;
1814
0
          break;
1815
0
        }
1816
1817
0
      p3 = p3->down;
1818
1819
0
      while (p3)
1820
0
        {
1821
0
          if (!(strcmp (p3->name, p2->name)))
1822
0
      break;
1823
0
          p3 = p3->right;
1824
0
        }
1825
1826
0
      if ((!p3) || (type_field (p3->type) != ASN1_ETYPE_OBJECT_ID)
1827
0
          || (p3->value == NULL))
1828
0
        {
1829
0
          retCode = ASN1_ERROR_TYPE_ANY;
1830
0
          break;
1831
0
        }
1832
0
    }
1833
1834
        /* search the OBJECT_ID into definitions */
1835
0
        p2 = definitions->down;
1836
0
        while (p2)
1837
0
    {
1838
0
      if ((type_field (p2->type) == ASN1_ETYPE_OBJECT_ID) &&
1839
0
          (p2->type & CONST_ASSIGN))
1840
0
        {
1841
0
          snprintf (name, sizeof (name), "%s.%s", definitionsName,
1842
0
        p2->name);
1843
1844
0
          len = ASN1_MAX_NAME_SIZE;
1845
0
          result =
1846
0
      asn1_read_value (definitions, name, value, &len);
1847
1848
0
          if ((result == ASN1_SUCCESS)
1849
0
        && (!_asn1_strcmp (p3->value, value)))
1850
0
      {
1851
0
        p2 = p2->right; /* pointer to the structure to
1852
               use for expansion */
1853
0
        while ((p2) && (p2->type & CONST_ASSIGN))
1854
0
          p2 = p2->right;
1855
1856
0
        if (p2)
1857
0
          {
1858
0
            snprintf (name, sizeof (name), "%s.%s",
1859
0
          definitionsName, p2->name);
1860
1861
0
            result =
1862
0
        asn1_create_element (definitions, name, &aux);
1863
0
            if (result == ASN1_SUCCESS)
1864
0
        {
1865
0
          _asn1_cpy_name (aux, p);
1866
0
          len2 =
1867
0
            asn1_get_length_der (p->value,
1868
0
               p->value_len, &len3);
1869
0
          if (len2 < 0)
1870
0
            return ASN1_DER_ERROR;
1871
1872
0
          result =
1873
0
            asn1_der_decoding (&aux, p->value + len3,
1874
0
                   len2,
1875
0
                   errorDescription);
1876
0
          if (result == ASN1_SUCCESS)
1877
0
            {
1878
1879
0
              _asn1_set_right (aux, p->right);
1880
0
              _asn1_set_right (p, aux);
1881
1882
0
              result = asn1_delete_structure (&p);
1883
0
              if (result == ASN1_SUCCESS)
1884
0
          {
1885
0
            p = aux;
1886
0
            aux = NULL;
1887
0
            break;
1888
0
          }
1889
0
              else
1890
0
          { /* error with asn1_delete_structure */
1891
0
            asn1_delete_structure (&aux);
1892
0
            retCode = result;
1893
0
            break;
1894
0
          }
1895
0
            }
1896
0
          else
1897
0
            { /* error with asn1_der_decoding */
1898
0
              retCode = result;
1899
0
              break;
1900
0
            }
1901
0
        }
1902
0
            else
1903
0
        { /* error with asn1_create_element */
1904
0
          retCode = result;
1905
0
          break;
1906
0
        }
1907
0
          }
1908
0
        else
1909
0
          { /* error with the pointer to the structure to expand */
1910
0
            retCode = ASN1_ERROR_TYPE_ANY;
1911
0
            break;
1912
0
          }
1913
0
      }
1914
0
        }
1915
0
      p2 = p2->right;
1916
0
    }    /* end while */
1917
1918
0
        if (!p2)
1919
0
    {
1920
0
      retCode = ASN1_ERROR_TYPE_ANY;
1921
0
      break;
1922
0
    }
1923
1924
0
      }
1925
0
    break;
1926
0
  default:
1927
0
    break;
1928
0
  }
1929
1930
1931
0
      if (p->down)
1932
0
  {
1933
0
    p = p->down;
1934
0
  }
1935
0
      else if (p == *element)
1936
0
  {
1937
0
    p = NULL;
1938
0
    break;
1939
0
  }
1940
0
      else if (p->right)
1941
0
  p = p->right;
1942
0
      else
1943
0
  {
1944
0
    while (1)
1945
0
      {
1946
0
        p = _asn1_find_up (p);
1947
0
        if (p == *element)
1948
0
    {
1949
0
      p = NULL;
1950
0
      break;
1951
0
    }
1952
0
        if (p->right)
1953
0
    {
1954
0
      p = p->right;
1955
0
      break;
1956
0
    }
1957
0
      }
1958
0
  }
1959
0
    }
1960
1961
0
  return retCode;
1962
0
}
1963
1964
/**
1965
 * asn1_expand_octet_string:
1966
 * @definitions: ASN1 definitions
1967
 * @element: pointer to an ASN1 structure
1968
 * @octetName: name of the OCTET STRING field to expand.
1969
 * @objectName: name of the OBJECT IDENTIFIER field to use to define
1970
 *    the type for expansion.
1971
 *
1972
 * Expands an "OCTET STRING" element of a structure created from a DER
1973
 * decoding process (the asn1_der_decoding() function).  The type used
1974
 * for expansion is the first one following the definition of the
1975
 * actual value of the OBJECT IDENTIFIER indicated by OBJECTNAME.
1976
 *
1977
 * Returns: %ASN1_SUCCESS if substitution OK, %ASN1_ELEMENT_NOT_FOUND
1978
 *   if @objectName or @octetName are not correct,
1979
 *   %ASN1_VALUE_NOT_VALID if it wasn't possible to find the type to
1980
 *   use for expansion, or other errors depending on DER decoding.
1981
 **/
1982
int
1983
asn1_expand_octet_string (asn1_node_const definitions, asn1_node *element,
1984
        const char *octetName, const char *objectName)
1985
0
{
1986
0
  char name[2 * ASN1_MAX_NAME_SIZE + 1], value[ASN1_MAX_NAME_SIZE];
1987
0
  int retCode = ASN1_SUCCESS, result;
1988
0
  int len, len2, len3;
1989
0
  asn1_node_const p2;
1990
0
  asn1_node aux = NULL;
1991
0
  asn1_node octetNode = NULL, objectNode = NULL;
1992
0
  char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
1993
1994
0
  if ((definitions == NULL) || (*element == NULL))
1995
0
    return ASN1_ELEMENT_NOT_FOUND;
1996
1997
0
  octetNode = asn1_find_node (*element, octetName);
1998
0
  if (octetNode == NULL)
1999
0
    return ASN1_ELEMENT_NOT_FOUND;
2000
0
  if (type_field (octetNode->type) != ASN1_ETYPE_OCTET_STRING)
2001
0
    return ASN1_ELEMENT_NOT_FOUND;
2002
0
  if (octetNode->value == NULL)
2003
0
    return ASN1_VALUE_NOT_FOUND;
2004
2005
0
  objectNode = asn1_find_node (*element, objectName);
2006
0
  if (objectNode == NULL)
2007
0
    return ASN1_ELEMENT_NOT_FOUND;
2008
2009
0
  if (type_field (objectNode->type) != ASN1_ETYPE_OBJECT_ID)
2010
0
    return ASN1_ELEMENT_NOT_FOUND;
2011
2012
0
  if (objectNode->value == NULL)
2013
0
    return ASN1_VALUE_NOT_FOUND;
2014
2015
2016
  /* search the OBJECT_ID into definitions */
2017
0
  p2 = definitions->down;
2018
0
  while (p2)
2019
0
    {
2020
0
      if ((type_field (p2->type) == ASN1_ETYPE_OBJECT_ID) &&
2021
0
    (p2->type & CONST_ASSIGN))
2022
0
  {
2023
0
    strcpy (name, definitions->name);
2024
0
    strcat (name, ".");
2025
0
    strcat (name, p2->name);
2026
2027
0
    len = sizeof (value);
2028
0
    result = asn1_read_value (definitions, name, value, &len);
2029
2030
0
    if ((result == ASN1_SUCCESS)
2031
0
        && (!_asn1_strcmp (objectNode->value, value)))
2032
0
      {
2033
2034
0
        p2 = p2->right; /* pointer to the structure to
2035
           use for expansion */
2036
0
        while ((p2) && (p2->type & CONST_ASSIGN))
2037
0
    p2 = p2->right;
2038
2039
0
        if (p2)
2040
0
    {
2041
0
      strcpy (name, definitions->name);
2042
0
      strcat (name, ".");
2043
0
      strcat (name, p2->name);
2044
2045
0
      result = asn1_create_element (definitions, name, &aux);
2046
0
      if (result == ASN1_SUCCESS)
2047
0
        {
2048
0
          _asn1_cpy_name (aux, octetNode);
2049
0
          len2 =
2050
0
      asn1_get_length_der (octetNode->value,
2051
0
               octetNode->value_len, &len3);
2052
0
          if (len2 < 0)
2053
0
      return ASN1_DER_ERROR;
2054
2055
0
          result =
2056
0
      asn1_der_decoding (&aux, octetNode->value + len3,
2057
0
             len2, errorDescription);
2058
0
          if (result == ASN1_SUCCESS)
2059
0
      {
2060
2061
0
        _asn1_set_right (aux, octetNode->right);
2062
0
        _asn1_set_right (octetNode, aux);
2063
2064
0
        result = asn1_delete_structure (&octetNode);
2065
0
        if (result == ASN1_SUCCESS)
2066
0
          {
2067
0
            aux = NULL;
2068
0
            break;
2069
0
          }
2070
0
        else
2071
0
          { /* error with asn1_delete_structure */
2072
0
            asn1_delete_structure (&aux);
2073
0
            retCode = result;
2074
0
            break;
2075
0
          }
2076
0
      }
2077
0
          else
2078
0
      { /* error with asn1_der_decoding */
2079
0
        retCode = result;
2080
0
        break;
2081
0
      }
2082
0
        }
2083
0
      else
2084
0
        {   /* error with asn1_create_element */
2085
0
          retCode = result;
2086
0
          break;
2087
0
        }
2088
0
    }
2089
0
        else
2090
0
    {   /* error with the pointer to the structure to expand */
2091
0
      retCode = ASN1_VALUE_NOT_VALID;
2092
0
      break;
2093
0
    }
2094
0
      }
2095
0
  }
2096
2097
0
      p2 = p2->right;
2098
2099
0
    }
2100
2101
0
  if (!p2)
2102
0
    retCode = ASN1_VALUE_NOT_VALID;
2103
2104
0
  return retCode;
2105
0
}
2106
2107
/*-
2108
 * _asn1_decode_simple_der:
2109
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2110
 * @der: the encoded string
2111
 * @_der_len: the bytes of the encoded string
2112
 * @str: a pointer to the data
2113
 * @str_len: the length of the data
2114
 * @dflags: DECODE_FLAG_*
2115
 *
2116
 * Decodes a simple DER encoded type (e.g. a string, which is not constructed).
2117
 * The output is a pointer inside the @der.
2118
 *
2119
 * Returns: %ASN1_SUCCESS if successful or an error value.
2120
 -*/
2121
static int
2122
_asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
2123
       unsigned int _der_len, const unsigned char **str,
2124
       unsigned int *str_len, unsigned dflags)
2125
132k
{
2126
132k
  int tag_len, len_len;
2127
132k
  const unsigned char *p;
2128
132k
  int der_len = _der_len;
2129
132k
  unsigned char class;
2130
132k
  unsigned long tag;
2131
132k
  long ret;
2132
2133
132k
  if (der == NULL || der_len == 0)
2134
0
    return ASN1_VALUE_NOT_VALID;
2135
2136
132k
  if (ETYPE_OK (etype) == 0 || ETYPE_IS_STRING (etype) == 0)
2137
0
    return ASN1_VALUE_NOT_VALID;
2138
2139
  /* doesn't handle constructed classes */
2140
132k
  class = ETYPE_CLASS (etype);
2141
132k
  if (class != ASN1_CLASS_UNIVERSAL)
2142
0
    return ASN1_VALUE_NOT_VALID;
2143
2144
132k
  p = der;
2145
2146
132k
  if (dflags & DECODE_FLAG_HAVE_TAG)
2147
132k
    {
2148
132k
      ret = asn1_get_tag_der (p, der_len, &class, &tag_len, &tag);
2149
132k
      if (ret != ASN1_SUCCESS)
2150
0
  return ret;
2151
2152
132k
      if (class != ETYPE_CLASS (etype) || tag != ETYPE_TAG (etype))
2153
6.84k
  {
2154
6.84k
    warn ();
2155
6.84k
    return ASN1_DER_ERROR;
2156
6.84k
  }
2157
2158
125k
      p += tag_len;
2159
125k
      der_len -= tag_len;
2160
125k
      if (der_len <= 0)
2161
25
  return ASN1_DER_ERROR;
2162
125k
    }
2163
2164
125k
  ret = asn1_get_length_der (p, der_len, &len_len);
2165
125k
  if (ret < 0)
2166
342
    return ASN1_DER_ERROR;
2167
2168
125k
  p += len_len;
2169
125k
  der_len -= len_len;
2170
125k
  if (der_len <= 0)
2171
81
    return ASN1_DER_ERROR;
2172
2173
125k
  *str_len = ret;
2174
125k
  *str = p;
2175
2176
125k
  return ASN1_SUCCESS;
2177
125k
}
2178
2179
/**
2180
 * asn1_decode_simple_der:
2181
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2182
 * @der: the encoded string
2183
 * @_der_len: the bytes of the encoded string
2184
 * @str: a pointer to the data
2185
 * @str_len: the length of the data
2186
 *
2187
 * Decodes a simple DER encoded type (e.g. a string, which is not constructed).
2188
 * The output is a pointer inside the @der.
2189
 *
2190
 * Returns: %ASN1_SUCCESS if successful or an error value.
2191
 **/
2192
int
2193
asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
2194
      unsigned int _der_len, const unsigned char **str,
2195
      unsigned int *str_len)
2196
15.1k
{
2197
15.1k
  return _asn1_decode_simple_der (etype, der, _der_len, str, str_len,
2198
15.1k
          DECODE_FLAG_HAVE_TAG);
2199
15.1k
}
2200
2201
static int
2202
append (uint8_t **dst, unsigned *dst_size, const unsigned char *src,
2203
  unsigned src_size)
2204
200k
{
2205
200k
  if (src_size == 0)
2206
30.4k
    return ASN1_SUCCESS;
2207
2208
170k
  *dst = _asn1_realloc (*dst, *dst_size + src_size);
2209
170k
  if (*dst == NULL)
2210
0
    return ASN1_MEM_ALLOC_ERROR;
2211
170k
  memcpy (*dst + *dst_size, src, src_size);
2212
170k
  *dst_size += src_size;
2213
170k
  return ASN1_SUCCESS;
2214
170k
}
2215
2216
/*-
2217
 * _asn1_decode_simple_ber:
2218
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2219
 * @der: the encoded string
2220
 * @_der_len: the bytes of the encoded string
2221
 * @str: a pointer to the data
2222
 * @str_len: the length of the data
2223
 * @ber_len: the total length occupied by BER (may be %NULL)
2224
 * @have_tag: whether a DER tag is included
2225
 *
2226
 * Decodes a BER encoded type. The output is an allocated value
2227
 * of the data. This decodes BER STRINGS only. Other types are
2228
 * decoded as DER.
2229
 *
2230
 * Returns: %ASN1_SUCCESS if successful or an error value.
2231
 -*/
2232
static int
2233
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
2234
       unsigned int _der_len, unsigned char **str,
2235
       unsigned int *str_len, unsigned int *ber_len,
2236
       unsigned dflags)
2237
133k
{
2238
133k
  int tag_len, len_len;
2239
133k
  const unsigned char *p;
2240
133k
  int der_len = _der_len;
2241
133k
  uint8_t *total = NULL;
2242
133k
  unsigned total_size = 0;
2243
133k
  unsigned char class;
2244
133k
  unsigned long tag;
2245
133k
  unsigned char *out = NULL;
2246
133k
  const unsigned char *cout = NULL;
2247
133k
  unsigned out_len;
2248
133k
  long result;
2249
2250
133k
  if (ber_len)
2251
89.7k
    *ber_len = 0;
2252
2253
133k
  if (der == NULL || der_len == 0)
2254
34
    {
2255
34
      warn ();
2256
34
      return ASN1_VALUE_NOT_VALID;
2257
34
    }
2258
2259
133k
  if (ETYPE_OK (etype) == 0)
2260
0
    {
2261
0
      warn ();
2262
0
      return ASN1_VALUE_NOT_VALID;
2263
0
    }
2264
2265
  /* doesn't handle constructed + definite classes */
2266
133k
  class = ETYPE_CLASS (etype);
2267
133k
  if (class != ASN1_CLASS_UNIVERSAL)
2268
0
    {
2269
0
      warn ();
2270
0
      return ASN1_VALUE_NOT_VALID;
2271
0
    }
2272
2273
133k
  p = der;
2274
2275
133k
  if (dflags & DECODE_FLAG_HAVE_TAG)
2276
129k
    {
2277
129k
      result = asn1_get_tag_der (p, der_len, &class, &tag_len, &tag);
2278
129k
      if (result != ASN1_SUCCESS)
2279
146
  {
2280
146
    warn ();
2281
146
    return result;
2282
146
  }
2283
2284
129k
      if (tag != ETYPE_TAG (etype))
2285
979
  {
2286
979
    warn ();
2287
979
    return ASN1_DER_ERROR;
2288
979
  }
2289
2290
128k
      p += tag_len;
2291
2292
128k
      DECR_LEN (der_len, tag_len);
2293
2294
128k
      if (ber_len)
2295
84.8k
  *ber_len += tag_len;
2296
128k
    }
2297
2298
  /* indefinite constructed */
2299
132k
  if ((((dflags & DECODE_FLAG_CONSTRUCTED) || class == ASN1_CLASS_STRUCTURED)
2300
14.3k
       && ETYPE_IS_STRING (etype)) && !(dflags & DECODE_FLAG_LEVEL3))
2301
14.3k
    {
2302
14.3k
      if (der_len == 0)
2303
8
  {
2304
8
    warn ();
2305
8
    result = ASN1_DER_ERROR;
2306
8
    goto cleanup;
2307
8
  }
2308
2309
14.3k
      if (der_len > 0 && p[0] == 0x80)  /* indefinite */
2310
2.37k
  {
2311
2.37k
    len_len = 1;
2312
2.37k
    DECR_LEN (der_len, len_len);
2313
2.37k
    p += len_len;
2314
2315
2.37k
    if (ber_len)
2316
1.61k
      *ber_len += len_len;
2317
2318
    /* decode the available octet strings */
2319
2.37k
    do
2320
79.2k
      {
2321
79.2k
        unsigned tmp_len;
2322
79.2k
        unsigned flags = DECODE_FLAG_HAVE_TAG;
2323
2324
79.2k
        if (dflags & DECODE_FLAG_LEVEL1)
2325
8.02k
    flags |= DECODE_FLAG_LEVEL2;
2326
71.2k
        else if (dflags & DECODE_FLAG_LEVEL2)
2327
1.23k
    flags |= DECODE_FLAG_LEVEL3;
2328
69.9k
        else
2329
69.9k
    flags |= DECODE_FLAG_LEVEL1;
2330
2331
79.2k
        result =
2332
79.2k
    _asn1_decode_simple_ber (etype, p, der_len, &out, &out_len,
2333
79.2k
           &tmp_len, flags);
2334
79.2k
        if (result != ASN1_SUCCESS)
2335
1.04k
    {
2336
1.04k
      warn ();
2337
1.04k
      goto cleanup;
2338
1.04k
    }
2339
2340
78.1k
        p += tmp_len;
2341
78.1k
        DECR_LEN (der_len, tmp_len);
2342
2343
78.1k
        if (ber_len)
2344
63.0k
    *ber_len += tmp_len;
2345
2346
78.1k
        DECR_LEN (der_len, 2); /* we need the EOC */
2347
2348
78.1k
        result = append (&total, &total_size, out, out_len);
2349
78.1k
        if (result != ASN1_SUCCESS)
2350
0
    {
2351
0
      warn ();
2352
0
      goto cleanup;
2353
0
    }
2354
2355
78.1k
        free (out);
2356
78.1k
        out = NULL;
2357
2358
78.1k
        if (p[0] == 0 && p[1] == 0)  /* EOC */
2359
1.19k
    {
2360
1.19k
      if (ber_len)
2361
892
        *ber_len += 2;
2362
1.19k
      break;
2363
1.19k
    }
2364
2365
        /* no EOC */
2366
76.9k
        der_len += 2;
2367
2368
76.9k
        if (der_len == 2)
2369
66
    {
2370
66
      warn ();
2371
66
      result = ASN1_DER_ERROR;
2372
66
      goto cleanup;
2373
66
    }
2374
76.9k
      }
2375
76.8k
    while (1);
2376
2.37k
  }
2377
11.9k
      else      /* constructed */
2378
11.9k
  {
2379
11.9k
    long const_len;
2380
2381
11.9k
    result = asn1_get_length_ber (p, der_len, &len_len);
2382
11.9k
    if (result < 0)
2383
331
      {
2384
331
        warn ();
2385
331
        result = ASN1_DER_ERROR;
2386
331
        goto cleanup;
2387
331
      }
2388
2389
11.6k
    DECR_LEN (der_len, len_len);
2390
11.6k
    p += len_len;
2391
2392
11.6k
    const_len = result;
2393
2394
11.6k
    if (ber_len)
2395
11.3k
      *ber_len += len_len;
2396
2397
    /* decode the available octet strings */
2398
17.0k
    while (const_len > 0)
2399
6.39k
      {
2400
6.39k
        unsigned tmp_len;
2401
6.39k
        unsigned flags = DECODE_FLAG_HAVE_TAG;
2402
2403
6.39k
        if (dflags & DECODE_FLAG_LEVEL1)
2404
2.96k
    flags |= DECODE_FLAG_LEVEL2;
2405
3.42k
        else if (dflags & DECODE_FLAG_LEVEL2)
2406
831
    flags |= DECODE_FLAG_LEVEL3;
2407
2.59k
        else
2408
2.59k
    flags |= DECODE_FLAG_LEVEL1;
2409
2410
6.39k
        result =
2411
6.39k
    _asn1_decode_simple_ber (etype, p, der_len, &out, &out_len,
2412
6.39k
           &tmp_len, flags);
2413
6.39k
        if (result != ASN1_SUCCESS)
2414
832
    {
2415
832
      warn ();
2416
832
      goto cleanup;
2417
832
    }
2418
2419
5.55k
        p += tmp_len;
2420
5.55k
        DECR_LEN (der_len, tmp_len);
2421
5.55k
        DECR_LEN (const_len, tmp_len);
2422
2423
5.40k
        if (ber_len)
2424
4.56k
    *ber_len += tmp_len;
2425
2426
5.40k
        result = append (&total, &total_size, out, out_len);
2427
5.40k
        if (result != ASN1_SUCCESS)
2428
0
    {
2429
0
      warn ();
2430
0
      goto cleanup;
2431
0
    }
2432
2433
5.40k
        free (out);
2434
5.40k
        out = NULL;
2435
5.40k
      }
2436
11.6k
  }
2437
14.3k
    }
2438
117k
  else if (class == ETYPE_CLASS (etype))
2439
117k
    {
2440
117k
      if (ber_len)
2441
75.6k
  {
2442
75.6k
    result = asn1_get_length_der (p, der_len, &len_len);
2443
75.6k
    if (result < 0)
2444
333
      {
2445
333
        warn ();
2446
333
        result = ASN1_DER_ERROR;
2447
333
        goto cleanup;
2448
333
      }
2449
75.2k
    *ber_len += result + len_len;
2450
75.2k
  }
2451
2452
      /* non-string values are decoded as DER */
2453
117k
      result =
2454
117k
  _asn1_decode_simple_der (etype, der, _der_len, &cout, &out_len,
2455
117k
         dflags);
2456
117k
      if (result != ASN1_SUCCESS)
2457
257
  {
2458
257
    warn ();
2459
257
    goto cleanup;
2460
257
  }
2461
2462
117k
      result = append (&total, &total_size, cout, out_len);
2463
117k
      if (result != ASN1_SUCCESS)
2464
0
  {
2465
0
    warn ();
2466
0
    goto cleanup;
2467
0
  }
2468
117k
    }
2469
172
  else
2470
172
    {
2471
172
      warn ();
2472
172
      result = ASN1_DER_ERROR;
2473
172
      goto cleanup;
2474
172
    }
2475
2476
128k
  *str = total;
2477
128k
  *str_len = total_size;
2478
2479
128k
  return ASN1_SUCCESS;
2480
3.26k
cleanup:
2481
3.26k
  free (out);
2482
3.26k
  free (total);
2483
3.26k
  return result;
2484
132k
}
2485
2486
/**
2487
 * asn1_decode_simple_ber:
2488
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2489
 * @der: the encoded string
2490
 * @_der_len: the bytes of the encoded string
2491
 * @str: a pointer to the data
2492
 * @str_len: the length of the data
2493
 * @ber_len: the total length occupied by BER (may be %NULL)
2494
 *
2495
 * Decodes a BER encoded type. The output is an allocated value
2496
 * of the data. This decodes BER STRINGS only. Other types are
2497
 * decoded as DER.
2498
 *
2499
 * Returns: %ASN1_SUCCESS if successful or an error value.
2500
 **/
2501
int
2502
asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
2503
      unsigned int _der_len, unsigned char **str,
2504
      unsigned int *str_len, unsigned int *ber_len)
2505
43.6k
{
2506
43.6k
  return _asn1_decode_simple_ber (etype, der, _der_len, str, str_len, ber_len,
2507
43.6k
          DECODE_FLAG_HAVE_TAG);
2508
43.6k
}