/src/openssl31/crypto/asn1/tasn_enc.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* |
2 | | * Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | #include <stddef.h> |
11 | | #include <string.h> |
12 | | #include "internal/cryptlib.h" |
13 | | #include <openssl/asn1.h> |
14 | | #include <openssl/asn1t.h> |
15 | | #include <openssl/objects.h> |
16 | | #include "crypto/asn1.h" |
17 | | #include "asn1_local.h" |
18 | | |
19 | | static int asn1_i2d_ex_primitive(const ASN1_VALUE **pval, unsigned char **out, |
20 | | const ASN1_ITEM *it, int tag, int aclass); |
21 | | static int asn1_set_seq_out(STACK_OF(const_ASN1_VALUE) *sk, |
22 | | unsigned char **out, |
23 | | int skcontlen, const ASN1_ITEM *item, |
24 | | int do_sort, int iclass); |
25 | | static int asn1_template_ex_i2d(const ASN1_VALUE **pval, unsigned char **out, |
26 | | const ASN1_TEMPLATE *tt, int tag, int aclass); |
27 | | static int asn1_item_flags_i2d(const ASN1_VALUE *val, unsigned char **out, |
28 | | const ASN1_ITEM *it, int flags); |
29 | | static int asn1_ex_i2c(const ASN1_VALUE **pval, unsigned char *cout, int *putype, |
30 | | const ASN1_ITEM *it); |
31 | | |
32 | | /* |
33 | | * Top level i2d equivalents: the 'ndef' variant instructs the encoder to use |
34 | | * indefinite length constructed encoding, where appropriate |
35 | | */ |
36 | | |
37 | | int ASN1_item_ndef_i2d(const ASN1_VALUE *val, unsigned char **out, |
38 | | const ASN1_ITEM *it) |
39 | 0 | { |
40 | 0 | return asn1_item_flags_i2d(val, out, it, ASN1_TFLG_NDEF); |
41 | 0 | } |
42 | | |
43 | | int ASN1_item_i2d(const ASN1_VALUE *val, unsigned char **out, const ASN1_ITEM *it) |
44 | 903k | { |
45 | 903k | return asn1_item_flags_i2d(val, out, it, 0); |
46 | 903k | } |
47 | | |
48 | | /* |
49 | | * Encode an ASN1 item, this is use by the standard 'i2d' function. 'out' |
50 | | * points to a buffer to output the data to. The new i2d has one additional |
51 | | * feature. If the output buffer is NULL (i.e. *out == NULL) then a buffer is |
52 | | * allocated and populated with the encoding. |
53 | | */ |
54 | | |
55 | | static int asn1_item_flags_i2d(const ASN1_VALUE *val, unsigned char **out, |
56 | | const ASN1_ITEM *it, int flags) |
57 | 903k | { |
58 | 903k | if (out != NULL && *out == NULL) { |
59 | 708k | unsigned char *p, *buf; |
60 | 708k | int len; |
61 | | |
62 | 708k | len = ASN1_item_ex_i2d(&val, NULL, it, -1, flags); |
63 | 708k | if (len <= 0) |
64 | 76 | return len; |
65 | 708k | if ((buf = OPENSSL_malloc(len)) == NULL) { |
66 | 0 | ERR_raise(ERR_LIB_ASN1, ERR_R_MALLOC_FAILURE); |
67 | 0 | return -1; |
68 | 0 | } |
69 | 708k | p = buf; |
70 | 708k | ASN1_item_ex_i2d(&val, &p, it, -1, flags); |
71 | 708k | *out = buf; |
72 | 708k | return len; |
73 | 708k | } |
74 | | |
75 | 195k | return ASN1_item_ex_i2d(&val, out, it, -1, flags); |
76 | 903k | } |
77 | | |
78 | | /* |
79 | | * Encode an item, taking care of IMPLICIT tagging (if any). This function |
80 | | * performs the normal item handling: it can be used in external types. |
81 | | */ |
82 | | |
83 | | int ASN1_item_ex_i2d(const ASN1_VALUE **pval, unsigned char **out, |
84 | | const ASN1_ITEM *it, int tag, int aclass) |
85 | 435M | { |
86 | 435M | const ASN1_TEMPLATE *tt = NULL; |
87 | 435M | int i, seqcontlen, seqlen, ndef = 1; |
88 | 435M | const ASN1_EXTERN_FUNCS *ef; |
89 | 435M | const ASN1_AUX *aux = it->funcs; |
90 | 435M | ASN1_aux_const_cb *asn1_cb = NULL; |
91 | | |
92 | 435M | if ((it->itype != ASN1_ITYPE_PRIMITIVE) && *pval == NULL) |
93 | 4.58M | return 0; |
94 | | |
95 | 431M | if (aux != NULL) { |
96 | 7.01M | asn1_cb = ((aux->flags & ASN1_AFLG_CONST_CB) != 0) ? aux->asn1_const_cb |
97 | 7.01M | : (ASN1_aux_const_cb *)aux->asn1_cb; /* backward compatibility */ |
98 | 7.01M | } |
99 | | |
100 | 431M | switch (it->itype) { |
101 | | |
102 | 223M | case ASN1_ITYPE_PRIMITIVE: |
103 | 223M | if (it->templates) |
104 | 16.2M | return asn1_template_ex_i2d(pval, out, it->templates, |
105 | 16.2M | tag, aclass); |
106 | 207M | return asn1_i2d_ex_primitive(pval, out, it, tag, aclass); |
107 | | |
108 | 102M | case ASN1_ITYPE_MSTRING: |
109 | | /* |
110 | | * It never makes sense for multi-strings to have implicit tagging, so |
111 | | * if tag != -1, then this looks like an error in the template. |
112 | | */ |
113 | 102M | if (tag != -1) { |
114 | 0 | ERR_raise(ERR_LIB_ASN1, ASN1_R_BAD_TEMPLATE); |
115 | 0 | return -1; |
116 | 0 | } |
117 | 102M | return asn1_i2d_ex_primitive(pval, out, it, -1, aclass); |
118 | | |
119 | 16.7M | case ASN1_ITYPE_CHOICE: |
120 | | /* |
121 | | * It never makes sense for CHOICE types to have implicit tagging, so |
122 | | * if tag != -1, then this looks like an error in the template. |
123 | | */ |
124 | 16.7M | if (tag != -1) { |
125 | 0 | ERR_raise(ERR_LIB_ASN1, ASN1_R_BAD_TEMPLATE); |
126 | 0 | return -1; |
127 | 0 | } |
128 | 16.7M | if (asn1_cb && !asn1_cb(ASN1_OP_I2D_PRE, pval, it, NULL)) |
129 | 0 | return 0; |
130 | 16.7M | i = ossl_asn1_get_choice_selector_const(pval, it); |
131 | 16.7M | if ((i >= 0) && (i < it->tcount)) { |
132 | 16.7M | const ASN1_VALUE **pchval; |
133 | 16.7M | const ASN1_TEMPLATE *chtt; |
134 | 16.7M | chtt = it->templates + i; |
135 | 16.7M | pchval = ossl_asn1_get_const_field_ptr(pval, chtt); |
136 | 16.7M | return asn1_template_ex_i2d(pchval, out, chtt, -1, aclass); |
137 | 16.7M | } |
138 | | /* Fixme: error condition if selector out of range */ |
139 | 0 | if (asn1_cb && !asn1_cb(ASN1_OP_I2D_POST, pval, it, NULL)) |
140 | 0 | return 0; |
141 | 0 | break; |
142 | | |
143 | 1.28M | case ASN1_ITYPE_EXTERN: |
144 | | /* If new style i2d it does all the work */ |
145 | 1.28M | ef = it->funcs; |
146 | 1.28M | return ef->asn1_ex_i2d(pval, out, it, tag, aclass); |
147 | | |
148 | 82.6k | case ASN1_ITYPE_NDEF_SEQUENCE: |
149 | | /* Use indefinite length constructed if requested */ |
150 | 82.6k | if (aclass & ASN1_TFLG_NDEF) |
151 | 0 | ndef = 2; |
152 | | /* fall through */ |
153 | | |
154 | 87.5M | case ASN1_ITYPE_SEQUENCE: |
155 | 87.5M | i = ossl_asn1_enc_restore(&seqcontlen, out, pval, it); |
156 | | /* An error occurred */ |
157 | 87.5M | if (i < 0) |
158 | 0 | return 0; |
159 | | /* We have a valid cached encoding... */ |
160 | 87.5M | if (i > 0) |
161 | 1.20M | return seqcontlen; |
162 | | /* Otherwise carry on */ |
163 | 86.3M | seqcontlen = 0; |
164 | | /* If no IMPLICIT tagging set to SEQUENCE, UNIVERSAL */ |
165 | 86.3M | if (tag == -1) { |
166 | 85.4M | tag = V_ASN1_SEQUENCE; |
167 | | /* Retain any other flags in aclass */ |
168 | 85.4M | aclass = (aclass & ~ASN1_TFLG_TAG_CLASS) |
169 | 85.4M | | V_ASN1_UNIVERSAL; |
170 | 85.4M | } |
171 | 86.3M | if (asn1_cb && !asn1_cb(ASN1_OP_I2D_PRE, pval, it, NULL)) |
172 | 0 | return 0; |
173 | | /* First work out sequence content length */ |
174 | 274M | for (i = 0, tt = it->templates; i < it->tcount; tt++, i++) { |
175 | 188M | const ASN1_TEMPLATE *seqtt; |
176 | 188M | const ASN1_VALUE **pseqval; |
177 | 188M | int tmplen; |
178 | 188M | seqtt = ossl_asn1_do_adb(*pval, tt, 1); |
179 | 188M | if (!seqtt) |
180 | 0 | return 0; |
181 | 188M | pseqval = ossl_asn1_get_const_field_ptr(pval, seqtt); |
182 | 188M | tmplen = asn1_template_ex_i2d(pseqval, NULL, seqtt, -1, aclass); |
183 | 188M | if (tmplen == -1 || (tmplen > INT_MAX - seqcontlen)) |
184 | 0 | return -1; |
185 | 188M | seqcontlen += tmplen; |
186 | 188M | } |
187 | | |
188 | 86.3M | seqlen = ASN1_object_size(ndef, seqcontlen, tag); |
189 | 86.3M | if (!out || seqlen == -1) |
190 | 59.9M | return seqlen; |
191 | | /* Output SEQUENCE header */ |
192 | 26.4M | ASN1_put_object(out, ndef, seqcontlen, tag, aclass); |
193 | 82.1M | for (i = 0, tt = it->templates; i < it->tcount; tt++, i++) { |
194 | 55.7M | const ASN1_TEMPLATE *seqtt; |
195 | 55.7M | const ASN1_VALUE **pseqval; |
196 | 55.7M | seqtt = ossl_asn1_do_adb(*pval, tt, 1); |
197 | 55.7M | if (!seqtt) |
198 | 0 | return 0; |
199 | 55.7M | pseqval = ossl_asn1_get_const_field_ptr(pval, seqtt); |
200 | | /* FIXME: check for errors in enhanced version */ |
201 | 55.7M | asn1_template_ex_i2d(pseqval, out, seqtt, -1, aclass); |
202 | 55.7M | } |
203 | 26.4M | if (ndef == 2) |
204 | 0 | ASN1_put_eoc(out); |
205 | 26.4M | if (asn1_cb && !asn1_cb(ASN1_OP_I2D_POST, pval, it, NULL)) |
206 | 0 | return 0; |
207 | 26.4M | return seqlen; |
208 | | |
209 | 0 | default: |
210 | 0 | return 0; |
211 | | |
212 | 431M | } |
213 | 0 | return 0; |
214 | 431M | } |
215 | | |
216 | | static int asn1_template_ex_i2d(const ASN1_VALUE **pval, unsigned char **out, |
217 | | const ASN1_TEMPLATE *tt, int tag, int iclass) |
218 | 276M | { |
219 | 276M | const int flags = tt->flags; |
220 | 276M | int i, ret, ttag, tclass, ndef, len; |
221 | 276M | const ASN1_VALUE *tval; |
222 | | |
223 | | /* |
224 | | * If field is embedded then val needs fixing so it is a pointer to |
225 | | * a pointer to a field. |
226 | | */ |
227 | 276M | if (flags & ASN1_TFLG_EMBED) { |
228 | 4.69M | tval = (ASN1_VALUE *)pval; |
229 | 4.69M | pval = &tval; |
230 | 4.69M | } |
231 | | /* |
232 | | * Work out tag and class to use: tagging may come either from the |
233 | | * template or the arguments, not both because this would create |
234 | | * ambiguity. Additionally the iclass argument may contain some |
235 | | * additional flags which should be noted and passed down to other |
236 | | * levels. |
237 | | */ |
238 | 276M | if (flags & ASN1_TFLG_TAG_MASK) { |
239 | | /* Error if argument and template tagging */ |
240 | 32.7M | if (tag != -1) |
241 | | /* FIXME: error code here */ |
242 | 0 | return -1; |
243 | | /* Get tagging from template */ |
244 | 32.7M | ttag = tt->tag; |
245 | 32.7M | tclass = flags & ASN1_TFLG_TAG_CLASS; |
246 | 244M | } else if (tag != -1) { |
247 | | /* No template tagging, get from arguments */ |
248 | 0 | ttag = tag; |
249 | 0 | tclass = iclass & ASN1_TFLG_TAG_CLASS; |
250 | 244M | } else { |
251 | 244M | ttag = -1; |
252 | 244M | tclass = 0; |
253 | 244M | } |
254 | | /* |
255 | | * Remove any class mask from iflag. |
256 | | */ |
257 | 276M | iclass &= ~ASN1_TFLG_TAG_CLASS; |
258 | | |
259 | | /* |
260 | | * At this point 'ttag' contains the outer tag to use, 'tclass' is the |
261 | | * class and iclass is any flags passed to this function. |
262 | | */ |
263 | | |
264 | | /* if template and arguments require ndef, use it */ |
265 | 276M | if ((flags & ASN1_TFLG_NDEF) && (iclass & ASN1_TFLG_NDEF)) |
266 | 0 | ndef = 2; |
267 | 276M | else |
268 | 276M | ndef = 1; |
269 | | |
270 | 276M | if (flags & ASN1_TFLG_SK_MASK) { |
271 | | /* SET OF, SEQUENCE OF */ |
272 | 19.8M | STACK_OF(const_ASN1_VALUE) *sk = (STACK_OF(const_ASN1_VALUE) *)*pval; |
273 | 19.8M | int isset, sktag, skaclass; |
274 | 19.8M | int skcontlen, sklen; |
275 | 19.8M | const ASN1_VALUE *skitem; |
276 | | |
277 | 19.8M | if (*pval == NULL) |
278 | 3.66M | return 0; |
279 | | |
280 | 16.2M | if (flags & ASN1_TFLG_SET_OF) { |
281 | 15.2M | isset = 1; |
282 | | /* 2 means we reorder */ |
283 | 15.2M | if (flags & ASN1_TFLG_SEQUENCE_OF) |
284 | 932 | isset = 2; |
285 | 15.2M | } else |
286 | 940k | isset = 0; |
287 | | |
288 | | /* |
289 | | * Work out inner tag value: if EXPLICIT or no tagging use underlying |
290 | | * type. |
291 | | */ |
292 | 16.2M | if ((ttag != -1) && !(flags & ASN1_TFLG_EXPTAG)) { |
293 | 102k | sktag = ttag; |
294 | 102k | skaclass = tclass; |
295 | 16.1M | } else { |
296 | 16.1M | skaclass = V_ASN1_UNIVERSAL; |
297 | 16.1M | if (isset) |
298 | 15.2M | sktag = V_ASN1_SET; |
299 | 864k | else |
300 | 864k | sktag = V_ASN1_SEQUENCE; |
301 | 16.1M | } |
302 | | |
303 | | /* Determine total length of items */ |
304 | 16.2M | skcontlen = 0; |
305 | 141M | for (i = 0; i < sk_const_ASN1_VALUE_num(sk); i++) { |
306 | 125M | skitem = sk_const_ASN1_VALUE_value(sk, i); |
307 | 125M | len = ASN1_item_ex_i2d(&skitem, NULL, ASN1_ITEM_ptr(tt->item), |
308 | 125M | -1, iclass); |
309 | 125M | if (len == -1 || (skcontlen > INT_MAX - len)) |
310 | 0 | return -1; |
311 | 125M | if (len == 0 && (tt->flags & ASN1_TFLG_OPTIONAL) == 0) { |
312 | 0 | ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_ZERO_CONTENT); |
313 | 0 | return -1; |
314 | 0 | } |
315 | 125M | skcontlen += len; |
316 | 125M | } |
317 | 16.2M | sklen = ASN1_object_size(ndef, skcontlen, sktag); |
318 | 16.2M | if (sklen == -1) |
319 | 0 | return -1; |
320 | | /* If EXPLICIT need length of surrounding tag */ |
321 | 16.2M | if (flags & ASN1_TFLG_EXPTAG) |
322 | 78.4k | ret = ASN1_object_size(ndef, sklen, ttag); |
323 | 16.1M | else |
324 | 16.1M | ret = sklen; |
325 | | |
326 | 16.2M | if (!out || ret == -1) |
327 | 9.15M | return ret; |
328 | | |
329 | | /* Now encode this lot... */ |
330 | | /* EXPLICIT tag */ |
331 | 7.07M | if (flags & ASN1_TFLG_EXPTAG) |
332 | 7.02k | ASN1_put_object(out, ndef, sklen, ttag, tclass); |
333 | | /* SET or SEQUENCE and IMPLICIT tag */ |
334 | 7.07M | ASN1_put_object(out, ndef, skcontlen, sktag, skaclass); |
335 | | /* And the stuff itself */ |
336 | 7.07M | asn1_set_seq_out(sk, out, skcontlen, ASN1_ITEM_ptr(tt->item), |
337 | 7.07M | isset, iclass); |
338 | 7.07M | if (ndef == 2) { |
339 | 0 | ASN1_put_eoc(out); |
340 | 0 | if (flags & ASN1_TFLG_EXPTAG) |
341 | 0 | ASN1_put_eoc(out); |
342 | 0 | } |
343 | | |
344 | 7.07M | return ret; |
345 | 16.2M | } |
346 | | |
347 | 256M | if (flags & ASN1_TFLG_EXPTAG) { |
348 | | /* EXPLICIT tagging */ |
349 | | /* Find length of tagged item */ |
350 | 7.50M | i = ASN1_item_ex_i2d(pval, NULL, ASN1_ITEM_ptr(tt->item), -1, iclass); |
351 | 7.50M | if (i == 0) { |
352 | 6.27M | if ((tt->flags & ASN1_TFLG_OPTIONAL) == 0) { |
353 | 0 | ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_ZERO_CONTENT); |
354 | 0 | return -1; |
355 | 0 | } |
356 | 6.27M | return 0; |
357 | 6.27M | } |
358 | | /* Find length of EXPLICIT tag */ |
359 | 1.22M | ret = ASN1_object_size(ndef, i, ttag); |
360 | 1.22M | if (out && ret != -1) { |
361 | | /* Output tag and item */ |
362 | 193k | ASN1_put_object(out, ndef, i, ttag, tclass); |
363 | 193k | ASN1_item_ex_i2d(pval, out, ASN1_ITEM_ptr(tt->item), -1, iclass); |
364 | 193k | if (ndef == 2) |
365 | 0 | ASN1_put_eoc(out); |
366 | 193k | } |
367 | 1.22M | return ret; |
368 | 7.50M | } |
369 | | |
370 | | /* Either normal or IMPLICIT tagging: combine class and flags */ |
371 | 249M | len = ASN1_item_ex_i2d(pval, out, ASN1_ITEM_ptr(tt->item), |
372 | 249M | ttag, tclass | iclass); |
373 | 249M | if (len == 0 && (tt->flags & ASN1_TFLG_OPTIONAL) == 0) { |
374 | 0 | ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_ZERO_CONTENT); |
375 | 0 | return -1; |
376 | 0 | } |
377 | 249M | return len; |
378 | 249M | } |
379 | | |
380 | | /* Temporary structure used to hold DER encoding of items for SET OF */ |
381 | | |
382 | | typedef struct { |
383 | | unsigned char *data; |
384 | | int length; |
385 | | const ASN1_VALUE *field; |
386 | | } DER_ENC; |
387 | | |
388 | | static int der_cmp(const void *a, const void *b) |
389 | 316M | { |
390 | 316M | const DER_ENC *d1 = a, *d2 = b; |
391 | 316M | int cmplen, i; |
392 | 316M | cmplen = (d1->length < d2->length) ? d1->length : d2->length; |
393 | 316M | i = memcmp(d1->data, d2->data, cmplen); |
394 | 316M | if (i) |
395 | 132M | return i; |
396 | 184M | return d1->length - d2->length; |
397 | 316M | } |
398 | | |
399 | | /* Output the content octets of SET OF or SEQUENCE OF */ |
400 | | |
401 | | static int asn1_set_seq_out(STACK_OF(const_ASN1_VALUE) *sk, |
402 | | unsigned char **out, |
403 | | int skcontlen, const ASN1_ITEM *item, |
404 | | int do_sort, int iclass) |
405 | 7.07M | { |
406 | 7.07M | int i, ret = 0; |
407 | 7.07M | const ASN1_VALUE *skitem; |
408 | 7.07M | unsigned char *tmpdat = NULL, *p = NULL; |
409 | 7.07M | DER_ENC *derlst = NULL, *tder; |
410 | | |
411 | 7.07M | if (do_sort) { |
412 | | /* Don't need to sort less than 2 items */ |
413 | 6.87M | if (sk_const_ASN1_VALUE_num(sk) < 2) |
414 | 6.53M | do_sort = 0; |
415 | 337k | else { |
416 | 337k | derlst = OPENSSL_malloc(sk_const_ASN1_VALUE_num(sk) |
417 | 337k | * sizeof(*derlst)); |
418 | 337k | if (derlst == NULL) { |
419 | 0 | ERR_raise(ERR_LIB_ASN1, ERR_R_MALLOC_FAILURE); |
420 | 0 | return 0; |
421 | 0 | } |
422 | 337k | tmpdat = OPENSSL_malloc(skcontlen); |
423 | 337k | if (tmpdat == NULL) { |
424 | 0 | ERR_raise(ERR_LIB_ASN1, ERR_R_MALLOC_FAILURE); |
425 | 0 | goto err; |
426 | 0 | } |
427 | 337k | } |
428 | 6.87M | } |
429 | | /* If not sorting just output each item */ |
430 | 7.07M | if (!do_sort) { |
431 | 19.6M | for (i = 0; i < sk_const_ASN1_VALUE_num(sk); i++) { |
432 | 12.9M | skitem = sk_const_ASN1_VALUE_value(sk, i); |
433 | 12.9M | ASN1_item_ex_i2d(&skitem, out, item, -1, iclass); |
434 | 12.9M | } |
435 | 6.73M | return 1; |
436 | 6.73M | } |
437 | 337k | p = tmpdat; |
438 | | |
439 | | /* Doing sort: build up a list of each member's DER encoding */ |
440 | 27.4M | for (i = 0, tder = derlst; i < sk_const_ASN1_VALUE_num(sk); i++, tder++) { |
441 | 27.1M | skitem = sk_const_ASN1_VALUE_value(sk, i); |
442 | 27.1M | tder->data = p; |
443 | 27.1M | tder->length = ASN1_item_ex_i2d(&skitem, &p, item, -1, iclass); |
444 | 27.1M | tder->field = skitem; |
445 | 27.1M | } |
446 | | |
447 | | /* Now sort them */ |
448 | 337k | qsort(derlst, sk_const_ASN1_VALUE_num(sk), sizeof(*derlst), der_cmp); |
449 | | /* Output sorted DER encoding */ |
450 | 337k | p = *out; |
451 | 27.4M | for (i = 0, tder = derlst; i < sk_const_ASN1_VALUE_num(sk); i++, tder++) { |
452 | 27.1M | memcpy(p, tder->data, tder->length); |
453 | 27.1M | p += tder->length; |
454 | 27.1M | } |
455 | 337k | *out = p; |
456 | | /* If do_sort is 2 then reorder the STACK */ |
457 | 337k | if (do_sort == 2) { |
458 | 2.29k | for (i = 0, tder = derlst; i < sk_const_ASN1_VALUE_num(sk); i++, tder++) |
459 | 2.20k | (void)sk_const_ASN1_VALUE_set(sk, i, tder->field); |
460 | 97 | } |
461 | 337k | ret = 1; |
462 | 337k | err: |
463 | 337k | OPENSSL_free(derlst); |
464 | 337k | OPENSSL_free(tmpdat); |
465 | 337k | return ret; |
466 | 337k | } |
467 | | |
468 | | static int asn1_i2d_ex_primitive(const ASN1_VALUE **pval, unsigned char **out, |
469 | | const ASN1_ITEM *it, int tag, int aclass) |
470 | 309M | { |
471 | 309M | int len; |
472 | 309M | int utype; |
473 | 309M | int usetag; |
474 | 309M | int ndef = 0; |
475 | | |
476 | 309M | utype = it->utype; |
477 | | |
478 | | /* |
479 | | * Get length of content octets and maybe find out the underlying type. |
480 | | */ |
481 | | |
482 | 309M | len = asn1_ex_i2c(pval, NULL, &utype, it); |
483 | | |
484 | | /* |
485 | | * If SEQUENCE, SET or OTHER then header is included in pseudo content |
486 | | * octets so don't include tag+length. We need to check here because the |
487 | | * call to asn1_ex_i2c() could change utype. |
488 | | */ |
489 | 309M | if ((utype == V_ASN1_SEQUENCE) || (utype == V_ASN1_SET) || |
490 | 309M | (utype == V_ASN1_OTHER)) |
491 | 73.9M | usetag = 0; |
492 | 235M | else |
493 | 235M | usetag = 1; |
494 | | |
495 | | /* -1 means omit type */ |
496 | | |
497 | 309M | if (len == -1) |
498 | 9.83M | return 0; |
499 | | |
500 | | /* -2 return is special meaning use ndef */ |
501 | 299M | if (len == -2) { |
502 | 0 | ndef = 2; |
503 | 0 | len = 0; |
504 | 0 | } |
505 | | |
506 | | /* If not implicitly tagged get tag from underlying type */ |
507 | 299M | if (tag == -1) |
508 | 283M | tag = utype; |
509 | | |
510 | | /* Output tag+length followed by content octets */ |
511 | 299M | if (out) { |
512 | 65.4M | if (usetag) |
513 | 52.1M | ASN1_put_object(out, ndef, len, tag, aclass); |
514 | 65.4M | asn1_ex_i2c(pval, *out, &utype, it); |
515 | 65.4M | if (ndef) |
516 | 0 | ASN1_put_eoc(out); |
517 | 65.4M | else |
518 | 65.4M | *out += len; |
519 | 65.4M | } |
520 | | |
521 | 299M | if (usetag) |
522 | 225M | return ASN1_object_size(ndef, len, tag); |
523 | 73.9M | return len; |
524 | 299M | } |
525 | | |
526 | | /* Produce content octets from a structure */ |
527 | | |
528 | | static int asn1_ex_i2c(const ASN1_VALUE **pval, unsigned char *cout, int *putype, |
529 | | const ASN1_ITEM *it) |
530 | 109M | { |
531 | 109M | ASN1_BOOLEAN *tbool = NULL; |
532 | 109M | ASN1_STRING *strtmp; |
533 | 109M | ASN1_OBJECT *otmp; |
534 | 109M | int utype; |
535 | 109M | const unsigned char *cont; |
536 | 109M | unsigned char c; |
537 | 109M | int len; |
538 | 109M | const ASN1_PRIMITIVE_FUNCS *pf; |
539 | 109M | pf = it->funcs; |
540 | 109M | if (pf && pf->prim_i2c) |
541 | 1.04M | return pf->prim_i2c(pval, cout, putype, it); |
542 | | |
543 | | /* Should type be omitted? */ |
544 | 108M | if ((it->itype != ASN1_ITYPE_PRIMITIVE) |
545 | 108M | || (it->utype != V_ASN1_BOOLEAN)) { |
546 | 108M | if (*pval == NULL) |
547 | 1.82M | return -1; |
548 | 108M | } |
549 | | |
550 | 106M | if (it->itype == ASN1_ITYPE_MSTRING) { |
551 | | /* If MSTRING type set the underlying type */ |
552 | 37.0M | strtmp = (ASN1_STRING *)*pval; |
553 | 37.0M | utype = strtmp->type; |
554 | 37.0M | *putype = utype; |
555 | 69.3M | } else if (it->utype == V_ASN1_ANY) { |
556 | | /* If ANY set type and pointer to value */ |
557 | 13.6M | ASN1_TYPE *typ; |
558 | 13.6M | typ = (ASN1_TYPE *)*pval; |
559 | 13.6M | utype = typ->type; |
560 | 13.6M | *putype = utype; |
561 | 13.6M | pval = (const ASN1_VALUE **)&typ->value.asn1_value; /* actually is const */ |
562 | 13.6M | } else |
563 | 55.7M | utype = *putype; |
564 | | |
565 | 106M | switch (utype) { |
566 | 38.4M | case V_ASN1_OBJECT: |
567 | 38.4M | otmp = (ASN1_OBJECT *)*pval; |
568 | 38.4M | cont = otmp->data; |
569 | 38.4M | len = otmp->length; |
570 | 38.4M | if (cont == NULL || len == 0) |
571 | 0 | return -1; |
572 | 38.4M | break; |
573 | | |
574 | 38.4M | case V_ASN1_NULL: |
575 | 206k | cont = NULL; |
576 | 206k | len = 0; |
577 | 206k | break; |
578 | | |
579 | 181k | case V_ASN1_BOOLEAN: |
580 | 181k | tbool = (ASN1_BOOLEAN *)pval; |
581 | 181k | if (*tbool == -1) |
582 | 127k | return -1; |
583 | 53.8k | if (it->utype != V_ASN1_ANY) { |
584 | | /* |
585 | | * Default handling if value == size field then omit |
586 | | */ |
587 | 13.1k | if (*tbool && (it->size > 0)) |
588 | 8 | return -1; |
589 | 13.1k | if (!*tbool && !it->size) |
590 | 5.19k | return -1; |
591 | 13.1k | } |
592 | 48.6k | c = (unsigned char)*tbool; |
593 | 48.6k | cont = &c; |
594 | 48.6k | len = 1; |
595 | 48.6k | break; |
596 | | |
597 | 3.71M | case V_ASN1_BIT_STRING: |
598 | 3.71M | return ossl_i2c_ASN1_BIT_STRING((ASN1_BIT_STRING *)*pval, |
599 | 3.71M | cout ? &cout : NULL); |
600 | | |
601 | 2.51M | case V_ASN1_INTEGER: |
602 | 2.52M | case V_ASN1_ENUMERATED: |
603 | | /* |
604 | | * These are all have the same content format as ASN1_INTEGER |
605 | | */ |
606 | 2.52M | return ossl_i2c_ASN1_INTEGER((ASN1_INTEGER *)*pval, cout ? &cout : NULL); |
607 | | |
608 | 487k | case V_ASN1_OCTET_STRING: |
609 | 671k | case V_ASN1_NUMERICSTRING: |
610 | 1.33M | case V_ASN1_PRINTABLESTRING: |
611 | 1.70M | case V_ASN1_T61STRING: |
612 | 1.70M | case V_ASN1_VIDEOTEXSTRING: |
613 | 3.60M | case V_ASN1_IA5STRING: |
614 | 3.62M | case V_ASN1_UTCTIME: |
615 | 3.65M | case V_ASN1_GENERALIZEDTIME: |
616 | 3.66M | case V_ASN1_GRAPHICSTRING: |
617 | 3.66M | case V_ASN1_VISIBLESTRING: |
618 | 3.66M | case V_ASN1_GENERALSTRING: |
619 | 4.36M | case V_ASN1_UNIVERSALSTRING: |
620 | 5.48M | case V_ASN1_BMPSTRING: |
621 | 23.5M | case V_ASN1_UTF8STRING: |
622 | 38.6M | case V_ASN1_SEQUENCE: |
623 | 50.9M | case V_ASN1_SET: |
624 | 61.3M | default: |
625 | | /* All based on ASN1_STRING and handled the same */ |
626 | 61.3M | strtmp = (ASN1_STRING *)*pval; |
627 | | /* Special handling for NDEF */ |
628 | 61.3M | if ((it->size == ASN1_TFLG_NDEF) |
629 | 61.3M | && (strtmp->flags & ASN1_STRING_FLAG_NDEF)) { |
630 | 0 | if (cout) { |
631 | 0 | strtmp->data = cout; |
632 | 0 | strtmp->length = 0; |
633 | 0 | } |
634 | | /* Special return code */ |
635 | 0 | return -2; |
636 | 0 | } |
637 | 61.3M | cont = strtmp->data; |
638 | 61.3M | len = strtmp->length; |
639 | | |
640 | 61.3M | break; |
641 | | |
642 | 106M | } |
643 | 100M | if (cout && len) |
644 | 11.7M | memcpy(cout, cont, len); |
645 | 100M | return len; |
646 | 106M | } |