Coverage Report

Created: 2018-08-29 13:53

/src/openssl/crypto/asn1/a_d2i_fp.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the OpenSSL license (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <stdio.h>
11
#include <limits.h>
12
#include "internal/cryptlib.h"
13
#include "internal/numbers.h"
14
#include <openssl/buffer.h>
15
#include <openssl/asn1.h>
16
#include "internal/asn1_int.h"
17
18
#ifndef NO_OLD_ASN1
19
# ifndef OPENSSL_NO_STDIO
20
21
void *ASN1_d2i_fp(void *(*xnew) (void), d2i_of_void *d2i, FILE *in, void **x)
22
0
{
23
0
    BIO *b;
24
0
    void *ret;
25
0
26
0
    if ((b = BIO_new(BIO_s_file())) == NULL) {
27
0
        ASN1err(ASN1_F_ASN1_D2I_FP, ERR_R_BUF_LIB);
28
0
        return NULL;
29
0
    }
30
0
    BIO_set_fp(b, in, BIO_NOCLOSE);
31
0
    ret = ASN1_d2i_bio(xnew, d2i, b, x);
32
0
    BIO_free(b);
33
0
    return ret;
34
0
}
35
# endif
36
37
void *ASN1_d2i_bio(void *(*xnew) (void), d2i_of_void *d2i, BIO *in, void **x)
38
0
{
39
0
    BUF_MEM *b = NULL;
40
0
    const unsigned char *p;
41
0
    void *ret = NULL;
42
0
    int len;
43
0
44
0
    len = asn1_d2i_read_bio(in, &b);
45
0
    if (len < 0)
46
0
        goto err;
47
0
48
0
    p = (unsigned char *)b->data;
49
0
    ret = d2i(x, &p, len);
50
0
 err:
51
0
    BUF_MEM_free(b);
52
0
    return ret;
53
0
}
54
55
#endif
56
57
void *ASN1_item_d2i_bio(const ASN1_ITEM *it, BIO *in, void *x)
58
0
{
59
0
    BUF_MEM *b = NULL;
60
0
    const unsigned char *p;
61
0
    void *ret = NULL;
62
0
    int len;
63
0
64
0
    len = asn1_d2i_read_bio(in, &b);
65
0
    if (len < 0)
66
0
        goto err;
67
0
68
0
    p = (const unsigned char *)b->data;
69
0
    ret = ASN1_item_d2i(x, &p, len, it);
70
0
 err:
71
0
    BUF_MEM_free(b);
72
0
    return ret;
73
0
}
74
75
#ifndef OPENSSL_NO_STDIO
76
void *ASN1_item_d2i_fp(const ASN1_ITEM *it, FILE *in, void *x)
77
0
{
78
0
    BIO *b;
79
0
    char *ret;
80
0
81
0
    if ((b = BIO_new(BIO_s_file())) == NULL) {
82
0
        ASN1err(ASN1_F_ASN1_ITEM_D2I_FP, ERR_R_BUF_LIB);
83
0
        return NULL;
84
0
    }
85
0
    BIO_set_fp(b, in, BIO_NOCLOSE);
86
0
    ret = ASN1_item_d2i_bio(it, b, x);
87
0
    BIO_free(b);
88
0
    return ret;
89
0
}
90
#endif
91
92
0
#define HEADER_SIZE   8
93
0
#define ASN1_CHUNK_INITIAL_SIZE (16 * 1024)
94
int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
95
0
{
96
0
    BUF_MEM *b;
97
0
    unsigned char *p;
98
0
    int i;
99
0
    size_t want = HEADER_SIZE;
100
0
    uint32_t eos = 0;
101
0
    size_t off = 0;
102
0
    size_t len = 0;
103
0
104
0
    const unsigned char *q;
105
0
    long slen;
106
0
    int inf, tag, xclass;
107
0
108
0
    b = BUF_MEM_new();
109
0
    if (b == NULL) {
110
0
        ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ERR_R_MALLOC_FAILURE);
111
0
        return -1;
112
0
    }
113
0
114
0
    ERR_clear_error();
115
0
    for (;;) {
116
0
        if (want >= (len - off)) {
117
0
            want -= (len - off);
118
0
119
0
            if (len + want < len || !BUF_MEM_grow_clean(b, len + want)) {
120
0
                ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ERR_R_MALLOC_FAILURE);
121
0
                goto err;
122
0
            }
123
0
            i = BIO_read(in, &(b->data[len]), want);
124
0
            if ((i < 0) && ((len - off) == 0)) {
125
0
                ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_NOT_ENOUGH_DATA);
126
0
                goto err;
127
0
            }
128
0
            if (i > 0) {
129
0
                if (len + i < len) {
130
0
                    ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
131
0
                    goto err;
132
0
                }
133
0
                len += i;
134
0
            }
135
0
        }
136
0
        /* else data already loaded */
137
0
138
0
        p = (unsigned char *)&(b->data[off]);
139
0
        q = p;
140
0
        inf = ASN1_get_object(&q, &slen, &tag, &xclass, len - off);
141
0
        if (inf & 0x80) {
142
0
            unsigned long e;
143
0
144
0
            e = ERR_GET_REASON(ERR_peek_error());
145
0
            if (e != ASN1_R_TOO_LONG)
146
0
                goto err;
147
0
            else
148
0
                ERR_clear_error(); /* clear error */
149
0
        }
150
0
        i = q - p;            /* header length */
151
0
        off += i;               /* end of data */
152
0
153
0
        if (inf & 1) {
154
0
            /* no data body so go round again */
155
0
            if (eos == UINT32_MAX) {
156
0
                ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_HEADER_TOO_LONG);
157
0
                goto err;
158
0
            }
159
0
            eos++;
160
0
            want = HEADER_SIZE;
161
0
        } else if (eos && (slen == 0) && (tag == V_ASN1_EOC)) {
162
0
            /* eos value, so go back and read another header */
163
0
            eos--;
164
0
            if (eos == 0)
165
0
                break;
166
0
            else
167
0
                want = HEADER_SIZE;
168
0
        } else {
169
0
            /* suck in slen bytes of data */
170
0
            want = slen;
171
0
            if (want > (len - off)) {
172
0
                size_t chunk_max = ASN1_CHUNK_INITIAL_SIZE;
173
0
174
0
                want -= (len - off);
175
0
                if (want > INT_MAX /* BIO_read takes an int length */  ||
176
0
                    len + want < len) {
177
0
                    ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
178
0
                    goto err;
179
0
                }
180
0
                while (want > 0) {
181
0
                    /*
182
0
                     * Read content in chunks of increasing size
183
0
                     * so we can return an error for EOF without
184
0
                     * having to allocate the entire content length
185
0
                     * in one go.
186
0
                     */
187
0
                    size_t chunk = want > chunk_max ? chunk_max : want;
188
0
189
0
                    if (!BUF_MEM_grow_clean(b, len + chunk)) {
190
0
                        ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ERR_R_MALLOC_FAILURE);
191
0
                        goto err;
192
0
                    }
193
0
                    want -= chunk;
194
0
                    while (chunk > 0) {
195
0
                        i = BIO_read(in, &(b->data[len]), chunk);
196
0
                        if (i <= 0) {
197
0
                            ASN1err(ASN1_F_ASN1_D2I_READ_BIO,
198
0
                                    ASN1_R_NOT_ENOUGH_DATA);
199
0
                            goto err;
200
0
                        }
201
0
                    /*
202
0
                     * This can't overflow because |len+want| didn't
203
0
                     * overflow.
204
0
                     */
205
0
                        len += i;
206
0
                        chunk -= i;
207
0
                    }
208
0
                    if (chunk_max < INT_MAX/2)
209
0
                        chunk_max *= 2;
210
0
                }
211
0
            }
212
0
            if (off + slen < off) {
213
0
                ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
214
0
                goto err;
215
0
            }
216
0
            off += slen;
217
0
            if (eos == 0) {
218
0
                break;
219
0
            } else
220
0
                want = HEADER_SIZE;
221
0
        }
222
0
    }
223
0
224
0
    if (off > INT_MAX) {
225
0
        ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
226
0
        goto err;
227
0
    }
228
0
229
0
    *pb = b;
230
0
    return off;
231
0
 err:
232
0
    BUF_MEM_free(b);
233
0
    return -1;
234
0
}