Coverage Report

Created: 2023-03-26 07:33

/src/gnutls/lib/minitasn1/decoding.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright (C) 2002-2022 Free Software Foundation, Inc.
3
 *
4
 * This file is part of LIBTASN1.
5
 *
6
 * The LIBTASN1 library is free software; you can redistribute it
7
 * and/or modify it under the terms of the GNU Lesser General Public
8
 * License as published by the Free Software Foundation; either
9
 * version 2.1 of the License, or (at your option) any later version.
10
 *
11
 * This library is distributed in the hope that it will be useful, but
12
 * WITHOUT ANY WARRANTY; without even the implied warranty of
13
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14
 * Lesser General Public License for more details.
15
 *
16
 * You should have received a copy of the GNU Lesser General Public
17
 * License along with this library; if not, write to the Free Software
18
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19
 * 02110-1301, USA
20
 */
21
22
23
/*****************************************************/
24
/* File: decoding.c                                  */
25
/* Description: Functions to manage DER decoding     */
26
/*****************************************************/
27
28
#include <int.h>
29
#include <parser_aux.h>
30
#include <gstr.h>
31
#include <structure.h>
32
#include <element.h>
33
#include <limits.h>
34
#include <intprops.h>
35
#include "c-ctype.h"
36
37
#ifdef DEBUG
38
# define warn() fprintf(stderr, "%s: %d\n", __func__, __LINE__)
39
#else
40
# define warn()
41
#endif
42
43
0
#define IS_ERR(len, flags) (len < -1 || ((flags & ASN1_DECODE_FLAG_STRICT_DER) && len < 0))
44
45
0
#define HAVE_TWO(x) (x>=2?1:0)
46
47
/* Decoding flags (dflags) used in several decoding functions.
48
 *  DECODE_FLAG_HAVE_TAG: The provided buffer includes a tag
49
 *  DECODE_FLAG_CONSTRUCTED: The provided buffer is of indefinite encoding (useful
50
 *                           when no tags are present).
51
 *  DECODE_FLAG_LEVEL1: Internal flag to indicate a level of recursion for BER strings.
52
 *  DECODE_FLAG_LEVEL2: Internal flag to indicate two levels of recursion for BER strings.
53
 *  DECODE_FLAG_LEVEL3: Internal flag to indicate three levels of recursion for BER strings.
54
 *                      This is the maximum levels of recursion possible to prevent stack
55
 *                      exhaustion.
56
 */
57
58
0
#define DECODE_FLAG_HAVE_TAG 1
59
0
#define DECODE_FLAG_CONSTRUCTED (1<<1)
60
0
#define DECODE_FLAG_LEVEL1 (1<<2)
61
0
#define DECODE_FLAG_LEVEL2 (1<<3)
62
0
#define DECODE_FLAG_LEVEL3 (1<<4)
63
64
0
#define DECR_LEN(l, s) do { \
65
0
    l -= s; \
66
0
    if (l < 0) { \
67
0
      warn(); \
68
0
      result = ASN1_DER_ERROR; \
69
0
      goto cleanup; \
70
0
    } \
71
0
  } while (0)
72
73
static int
74
_asn1_get_indefinite_length_string (const unsigned char *der, int der_len,
75
            int *len);
76
77
static int
78
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
79
       unsigned int _der_len, unsigned char **str,
80
       unsigned int *str_len, unsigned int *ber_len,
81
       unsigned dflags);
82
83
static int
84
_asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
85
       unsigned int _der_len, const unsigned char **str,
86
       unsigned int *str_len, unsigned dflags);
87
88
static void
89
_asn1_error_description_tag_error (asn1_node node, char *ErrorDescription)
90
0
{
91
92
0
  Estrcpy (ErrorDescription, ":: tag error near element '");
93
0
  _asn1_hierarchical_name (node, ErrorDescription + strlen (ErrorDescription),
94
0
         ASN1_MAX_ERROR_DESCRIPTION_SIZE - 40);
95
0
  Estrcat (ErrorDescription, "'");
96
97
0
}
98
99
/**
100
 * asn1_get_length_der:
101
 * @der: DER data to decode.
102
 * @der_len: Length of DER data to decode.
103
 * @len: Output variable containing the length of the DER length field.
104
 *
105
 * Extract a length field from DER data.
106
 *
107
 * Returns: Return the decoded length value, or -1 on indefinite
108
 *   length, or -2 when the value was too big to fit in a int, or -4
109
 *   when the decoded length value plus @len would exceed @der_len.
110
 **/
111
long
112
asn1_get_length_der (const unsigned char *der, int der_len, int *len)
113
0
{
114
0
  unsigned int ans;
115
0
  int k, punt, sum;
116
117
0
  *len = 0;
118
0
  if (der_len <= 0)
119
0
    return 0;
120
121
0
  if (!(der[0] & 128))
122
0
    {
123
      /* short form */
124
0
      *len = 1;
125
0
      ans = der[0];
126
0
    }
127
0
  else
128
0
    {
129
      /* Long form */
130
0
      k = der[0] & 0x7F;
131
0
      punt = 1;
132
0
      if (k)
133
0
  {     /* definite length method */
134
0
    ans = 0;
135
0
    while (punt <= k && punt < der_len)
136
0
      {
137
0
        if (INT_MULTIPLY_OVERFLOW (ans, 256))
138
0
    return -2;
139
0
        ans *= 256;
140
141
0
        if (INT_ADD_OVERFLOW (ans, ((unsigned) der[punt])))
142
0
    return -2;
143
0
        ans += der[punt];
144
0
        punt++;
145
0
      }
146
0
  }
147
0
      else
148
0
  {     /* indefinite length method */
149
0
    *len = punt;
150
0
    return -1;
151
0
  }
152
153
0
      *len = punt;
154
0
    }
155
156
0
  sum = ans;
157
0
  if (ans >= INT_MAX || INT_ADD_OVERFLOW (sum, (*len)))
158
0
    return -2;
159
0
  sum += *len;
160
161
0
  if (sum > der_len)
162
0
    return -4;
163
164
0
  return ans;
165
0
}
166
167
/**
168
 * asn1_get_tag_der:
169
 * @der: DER data to decode.
170
 * @der_len: Length of DER data to decode.
171
 * @cls: Output variable containing decoded class.
172
 * @len: Output variable containing the length of the DER TAG data.
173
 * @tag: Output variable containing the decoded tag (may be %NULL).
174
 *
175
 * Decode the class and TAG from DER code.
176
 *
177
 * Returns: Returns %ASN1_SUCCESS on success, or an error.
178
 **/
179
int
180
asn1_get_tag_der (const unsigned char *der, int der_len,
181
      unsigned char *cls, int *len, unsigned long *tag)
182
0
{
183
0
  unsigned int ris;
184
0
  int punt;
185
186
0
  if (der == NULL || der_len < 2 || len == NULL)
187
0
    return ASN1_DER_ERROR;
188
189
0
  *cls = der[0] & 0xE0;
190
0
  if ((der[0] & 0x1F) != 0x1F)
191
0
    {
192
      /* short form */
193
0
      *len = 1;
194
0
      ris = der[0] & 0x1F;
195
0
    }
196
0
  else
197
0
    {
198
      /* Long form */
199
0
      punt = 1;
200
0
      ris = 0;
201
0
      while (punt < der_len && der[punt] & 128)
202
0
  {
203
204
0
    if (INT_MULTIPLY_OVERFLOW (ris, 128))
205
0
      return ASN1_DER_ERROR;
206
0
    ris *= 128;
207
208
0
    if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
209
0
      return ASN1_DER_ERROR;
210
0
    ris += (der[punt] & 0x7F);
211
0
    punt++;
212
0
  }
213
214
0
      if (punt >= der_len)
215
0
  return ASN1_DER_ERROR;
216
217
0
      if (INT_MULTIPLY_OVERFLOW (ris, 128))
218
0
  return ASN1_DER_ERROR;
219
0
      ris *= 128;
220
221
0
      if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
222
0
  return ASN1_DER_ERROR;
223
0
      ris += (der[punt] & 0x7F);
224
0
      punt++;
225
226
0
      *len = punt;
227
0
    }
228
229
0
  if (tag)
230
0
    *tag = ris;
231
0
  return ASN1_SUCCESS;
232
0
}
233
234
/**
235
 * asn1_get_length_ber:
236
 * @ber: BER data to decode.
237
 * @ber_len: Length of BER data to decode.
238
 * @len: Output variable containing the length of the BER length field.
239
 *
240
 * Extract a length field from BER data.  The difference to
241
 * asn1_get_length_der() is that this function will return a length
242
 * even if the value has indefinite encoding.
243
 *
244
 * Returns: Return the decoded length value, or negative value when
245
 *   the value was too big.
246
 *
247
 * Since: 2.0
248
 **/
249
long
250
asn1_get_length_ber (const unsigned char *ber, int ber_len, int *len)
251
0
{
252
0
  int ret;
253
0
  long err;
254
255
0
  ret = asn1_get_length_der (ber, ber_len, len);
256
257
0
  if (ret == -1 && ber_len > 1)
258
0
    {       /* indefinite length method */
259
0
      err = _asn1_get_indefinite_length_string (ber + 1, ber_len - 1, &ret);
260
0
      if (err != ASN1_SUCCESS)
261
0
  return -3;
262
0
    }
263
264
0
  return ret;
265
0
}
266
267
/**
268
 * asn1_get_octet_der:
269
 * @der: DER data to decode containing the OCTET SEQUENCE.
270
 * @der_len: The length of the @der data to decode.
271
 * @ret_len: Output variable containing the encoded length of the DER data.
272
 * @str: Pre-allocated output buffer to put decoded OCTET SEQUENCE in.
273
 * @str_size: Length of pre-allocated output buffer.
274
 * @str_len: Output variable containing the length of the contents of the OCTET SEQUENCE.
275
 *
276
 * Extract an OCTET SEQUENCE from DER data. Note that this function
277
 * expects the DER data past the tag field, i.e., the length and
278
 * content octets.
279
 *
280
 * Returns: Returns %ASN1_SUCCESS on success, or an error.
281
 **/
282
int
283
asn1_get_octet_der (const unsigned char *der, int der_len,
284
        int *ret_len, unsigned char *str, int str_size,
285
        int *str_len)
286
0
{
287
0
  int len_len = 0;
288
289
0
  if (der_len <= 0)
290
0
    return ASN1_GENERIC_ERROR;
291
292
0
  *str_len = asn1_get_length_der (der, der_len, &len_len);
293
294
0
  if (*str_len < 0)
295
0
    return ASN1_DER_ERROR;
296
297
0
  *ret_len = *str_len + len_len;
298
0
  if (str_size >= *str_len)
299
0
    {
300
0
      if (*str_len > 0 && str != NULL)
301
0
  memcpy (str, der + len_len, *str_len);
302
0
    }
303
0
  else
304
0
    {
305
0
      return ASN1_MEM_ERROR;
306
0
    }
307
308
0
  return ASN1_SUCCESS;
309
0
}
310
311
312
/*-
313
 * _asn1_get_time_der:
314
 * @type: %ASN1_ETYPE_GENERALIZED_TIME or %ASN1_ETYPE_UTC_TIME
315
 * @der: DER data to decode containing the time
316
 * @der_len: Length of DER data to decode.
317
 * @ret_len: Output variable containing the length of the DER data.
318
 * @str: Pre-allocated output buffer to put the textual time in.
319
 * @str_size: Length of pre-allocated output buffer.
320
 * @flags: Zero or %ASN1_DECODE_FLAG_STRICT_DER
321
 *
322
 * Performs basic checks in the DER encoded time object and returns its textual form.
323
 * The textual form will be in the YYYYMMDD000000Z format for GeneralizedTime
324
 * and YYMMDD000000Z for UTCTime.
325
 *
326
 * Returns: %ASN1_SUCCESS on success, or an error.
327
 -*/
328
static int
329
_asn1_get_time_der (unsigned type, const unsigned char *der, int der_len,
330
        int *ret_len, char *str, int str_size, unsigned flags)
331
0
{
332
0
  int len_len, str_len;
333
0
  unsigned i;
334
0
  unsigned sign_count = 0;
335
0
  unsigned dot_count = 0;
336
0
  const unsigned char *p;
337
338
0
  if (der_len <= 0 || str == NULL)
339
0
    return ASN1_DER_ERROR;
340
341
0
  str_len = asn1_get_length_der (der, der_len, &len_len);
342
0
  if (str_len <= 0 || str_size < str_len)
343
0
    return ASN1_DER_ERROR;
344
345
  /* perform some sanity checks on the data */
346
0
  if (str_len < 8)
347
0
    {
348
0
      warn ();
349
0
      return ASN1_TIME_ENCODING_ERROR;
350
0
    }
351
352
0
  if ((flags & ASN1_DECODE_FLAG_STRICT_DER)
353
0
      && !(flags & ASN1_DECODE_FLAG_ALLOW_INCORRECT_TIME))
354
0
    {
355
0
      p = &der[len_len];
356
0
      for (i = 0; i < (unsigned) (str_len - 1); i++)
357
0
  {
358
0
    if (c_isdigit (p[i]) == 0)
359
0
      {
360
0
        if (type == ASN1_ETYPE_GENERALIZED_TIME)
361
0
    {
362
      /* tolerate lax encodings */
363
0
      if (p[i] == '.' && dot_count == 0)
364
0
        {
365
0
          dot_count++;
366
0
          continue;
367
0
        }
368
369
      /* This is not really valid DER, but there are
370
       * structures using that */
371
0
      if (!(flags & ASN1_DECODE_FLAG_STRICT_DER) &&
372
0
          (p[i] == '+' || p[i] == '-') && sign_count == 0)
373
0
        {
374
0
          sign_count++;
375
0
          continue;
376
0
        }
377
0
    }
378
379
0
        warn ();
380
0
        return ASN1_TIME_ENCODING_ERROR;
381
0
      }
382
0
  }
383
384
0
      if (sign_count == 0 && p[str_len - 1] != 'Z')
385
0
  {
386
0
    warn ();
387
0
    return ASN1_TIME_ENCODING_ERROR;
388
0
  }
389
0
    }
390
0
  memcpy (str, der + len_len, str_len);
391
0
  str[str_len] = 0;
392
0
  *ret_len = str_len + len_len;
393
394
0
  return ASN1_SUCCESS;
395
0
}
396
397
/**
398
 * asn1_get_object_id_der:
399
 * @der: DER data to decode containing the OBJECT IDENTIFIER
400
 * @der_len: Length of DER data to decode.
401
 * @ret_len: Output variable containing the length of the DER data.
402
 * @str: Pre-allocated output buffer to put the textual object id in.
403
 * @str_size: Length of pre-allocated output buffer.
404
 *
405
 * Converts a DER encoded object identifier to its textual form. This
406
 * function expects the DER object identifier without the tag.
407
 *
408
 * Returns: %ASN1_SUCCESS on success, or an error.
409
 **/
410
int
411
asn1_get_object_id_der (const unsigned char *der, int der_len, int *ret_len,
412
      char *str, int str_size)
413
0
{
414
0
  int len_len, len, k;
415
0
  int leading, parsed;
416
0
  char temp[LTOSTR_MAX_SIZE];
417
0
  uint64_t val, val1, val0;
418
419
0
  *ret_len = 0;
420
0
  if (str && str_size > 0)
421
0
    str[0] = 0;     /* no oid */
422
423
0
  if (str == NULL || der_len <= 0)
424
0
    return ASN1_GENERIC_ERROR;
425
426
0
  len = asn1_get_length_der (der, der_len, &len_len);
427
428
0
  if (len <= 0 || len + len_len > der_len)
429
0
    return ASN1_DER_ERROR;
430
431
  /* leading octet can never be 0x80 */
432
0
  if (der[len_len] == 0x80)
433
0
    return ASN1_DER_ERROR;
434
435
0
  val0 = 0;
436
437
0
  for (k = 0; k < len; k++)
438
0
    {
439
0
      if (INT_LEFT_SHIFT_OVERFLOW (val0, 7))
440
0
  return ASN1_DER_ERROR;
441
442
0
      val0 <<= 7;
443
0
      val0 |= der[len_len + k] & 0x7F;
444
0
      if (!(der[len_len + k] & 0x80))
445
0
  break;
446
0
    }
447
0
  parsed = ++k;
448
449
  /* val0 = (X*40) + Y, X={0,1,2}, Y<=39 when X={0,1} */
450
  /* X = val, Y = val1 */
451
452
  /* check if X == 0  */
453
0
  val = 0;
454
0
  val1 = val0;
455
0
  if (val1 > 39)
456
0
    {
457
0
      val = 1;
458
0
      val1 = val0 - 40;
459
0
      if (val1 > 39)
460
0
  {
461
0
    val = 2;
462
0
    val1 = val0 - 80;
463
0
  }
464
0
    }
465
466
0
  _asn1_str_cpy (str, str_size, _asn1_ltostr (val, temp));
467
0
  _asn1_str_cat (str, str_size, ".");
468
0
  _asn1_str_cat (str, str_size, _asn1_ltostr (val1, temp));
469
470
0
  val = 0;
471
0
  leading = 1;
472
0
  for (k = parsed; k < len; k++)
473
0
    {
474
      /* X.690 mandates that the leading byte must never be 0x80
475
       */
476
0
      if (leading != 0 && der[len_len + k] == 0x80)
477
0
  return ASN1_DER_ERROR;
478
0
      leading = 0;
479
480
      /* check for wrap around */
481
0
      if (INT_LEFT_SHIFT_OVERFLOW (val, 7))
482
0
  return ASN1_DER_ERROR;
483
484
0
      val = val << 7;
485
0
      val |= der[len_len + k] & 0x7F;
486
487
0
      if (!(der[len_len + k] & 0x80))
488
0
  {
489
0
    _asn1_str_cat (str, str_size, ".");
490
0
    _asn1_str_cat (str, str_size, _asn1_ltostr (val, temp));
491
0
    val = 0;
492
0
    leading = 1;
493
0
  }
494
0
    }
495
496
0
  if (INT_ADD_OVERFLOW (len, len_len))
497
0
    return ASN1_DER_ERROR;
498
499
0
  *ret_len = len + len_len;
500
501
0
  return ASN1_SUCCESS;
502
0
}
503
504
/**
505
 * asn1_get_bit_der:
506
 * @der: DER data to decode containing the BIT SEQUENCE.
507
 * @der_len: Length of DER data to decode.
508
 * @ret_len: Output variable containing the length of the DER data.
509
 * @str: Pre-allocated output buffer to put decoded BIT SEQUENCE in.
510
 * @str_size: Length of pre-allocated output buffer.
511
 * @bit_len: Output variable containing the size of the BIT SEQUENCE.
512
 *
513
 * Extract a BIT SEQUENCE from DER data.
514
 *
515
 * Returns: %ASN1_SUCCESS on success, or an error.
516
 **/
517
int
518
asn1_get_bit_der (const unsigned char *der, int der_len,
519
      int *ret_len, unsigned char *str, int str_size,
520
      int *bit_len)
521
0
{
522
0
  int len_len = 0, len_byte;
523
524
0
  if (der_len <= 0)
525
0
    return ASN1_GENERIC_ERROR;
526
527
0
  len_byte = asn1_get_length_der (der, der_len, &len_len) - 1;
528
0
  if (len_byte < 0)
529
0
    return ASN1_DER_ERROR;
530
531
0
  *ret_len = len_byte + len_len + 1;
532
0
  *bit_len = len_byte * 8 - der[len_len];
533
534
0
  if (*bit_len < 0)
535
0
    return ASN1_DER_ERROR;
536
537
0
  if (str_size >= len_byte)
538
0
    {
539
0
      if (len_byte > 0 && str)
540
0
  memcpy (str, der + len_len + 1, len_byte);
541
0
    }
542
0
  else
543
0
    {
544
0
      return ASN1_MEM_ERROR;
545
0
    }
546
547
0
  return ASN1_SUCCESS;
548
0
}
549
550
/* tag_len: the total tag length (explicit+inner)
551
 * inner_tag_len: the inner_tag length
552
 */
553
static int
554
_asn1_extract_tag_der (asn1_node node, const unsigned char *der, int der_len,
555
           int *tag_len, int *inner_tag_len, unsigned flags)
556
0
{
557
0
  asn1_node p;
558
0
  int counter, len2, len3, is_tag_implicit;
559
0
  int result;
560
0
  unsigned long tag, tag_implicit = 0;
561
0
  unsigned char class, class2, class_implicit = 0;
562
563
0
  if (der_len <= 0)
564
0
    return ASN1_GENERIC_ERROR;
565
566
0
  counter = is_tag_implicit = 0;
567
568
0
  if (node->type & CONST_TAG)
569
0
    {
570
0
      p = node->down;
571
0
      while (p)
572
0
  {
573
0
    if (type_field (p->type) == ASN1_ETYPE_TAG)
574
0
      {
575
0
        if (p->type & CONST_APPLICATION)
576
0
    class2 = ASN1_CLASS_APPLICATION;
577
0
        else if (p->type & CONST_UNIVERSAL)
578
0
    class2 = ASN1_CLASS_UNIVERSAL;
579
0
        else if (p->type & CONST_PRIVATE)
580
0
    class2 = ASN1_CLASS_PRIVATE;
581
0
        else
582
0
    class2 = ASN1_CLASS_CONTEXT_SPECIFIC;
583
584
0
        if (p->type & CONST_EXPLICIT)
585
0
    {
586
0
      if (asn1_get_tag_der
587
0
          (der + counter, der_len, &class, &len2,
588
0
           &tag) != ASN1_SUCCESS)
589
0
        return ASN1_DER_ERROR;
590
591
0
      DECR_LEN (der_len, len2);
592
0
      counter += len2;
593
594
0
      if (flags & ASN1_DECODE_FLAG_STRICT_DER)
595
0
        len3 =
596
0
          asn1_get_length_der (der + counter, der_len, &len2);
597
0
      else
598
0
        len3 =
599
0
          asn1_get_length_ber (der + counter, der_len, &len2);
600
0
      if (len3 < 0)
601
0
        return ASN1_DER_ERROR;
602
603
0
      DECR_LEN (der_len, len2);
604
0
      counter += len2;
605
606
0
      if (!is_tag_implicit)
607
0
        {
608
0
          if ((class != (class2 | ASN1_CLASS_STRUCTURED)) ||
609
0
        (tag != strtoul ((char *) p->value, NULL, 10)))
610
0
      return ASN1_TAG_ERROR;
611
0
        }
612
0
      else
613
0
        {   /* ASN1_TAG_IMPLICIT */
614
0
          if ((class != class_implicit) || (tag != tag_implicit))
615
0
      return ASN1_TAG_ERROR;
616
0
        }
617
0
      is_tag_implicit = 0;
618
0
    }
619
0
        else
620
0
    {   /* ASN1_TAG_IMPLICIT */
621
0
      if (!is_tag_implicit)
622
0
        {
623
0
          if ((type_field (node->type) == ASN1_ETYPE_SEQUENCE) ||
624
0
        (type_field (node->type) == ASN1_ETYPE_SEQUENCE_OF)
625
0
        || (type_field (node->type) == ASN1_ETYPE_SET)
626
0
        || (type_field (node->type) == ASN1_ETYPE_SET_OF))
627
0
      class2 |= ASN1_CLASS_STRUCTURED;
628
0
          class_implicit = class2;
629
0
          tag_implicit = strtoul ((char *) p->value, NULL, 10);
630
0
          is_tag_implicit = 1;
631
0
        }
632
0
    }
633
0
      }
634
0
    p = p->right;
635
0
  }
636
0
    }
637
638
0
  if (is_tag_implicit)
639
0
    {
640
0
      if (asn1_get_tag_der
641
0
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
642
0
  return ASN1_DER_ERROR;
643
644
0
      DECR_LEN (der_len, len2);
645
646
0
      if ((class != class_implicit) || (tag != tag_implicit))
647
0
  {
648
0
    if (type_field (node->type) == ASN1_ETYPE_OCTET_STRING)
649
0
      {
650
0
        class_implicit |= ASN1_CLASS_STRUCTURED;
651
0
        if ((class != class_implicit) || (tag != tag_implicit))
652
0
    return ASN1_TAG_ERROR;
653
0
      }
654
0
    else
655
0
      return ASN1_TAG_ERROR;
656
0
  }
657
0
    }
658
0
  else
659
0
    {
660
0
      unsigned type = type_field (node->type);
661
0
      if (type == ASN1_ETYPE_TAG)
662
0
  {
663
0
    *tag_len = 0;
664
0
    if (inner_tag_len)
665
0
      *inner_tag_len = 0;
666
0
    return ASN1_SUCCESS;
667
0
  }
668
669
0
      if (asn1_get_tag_der
670
0
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
671
0
  return ASN1_DER_ERROR;
672
673
0
      DECR_LEN (der_len, len2);
674
675
0
      switch (type)
676
0
  {
677
0
  case ASN1_ETYPE_NULL:
678
0
  case ASN1_ETYPE_BOOLEAN:
679
0
  case ASN1_ETYPE_INTEGER:
680
0
  case ASN1_ETYPE_ENUMERATED:
681
0
  case ASN1_ETYPE_OBJECT_ID:
682
0
  case ASN1_ETYPE_GENERALSTRING:
683
0
  case ASN1_ETYPE_NUMERIC_STRING:
684
0
  case ASN1_ETYPE_IA5_STRING:
685
0
  case ASN1_ETYPE_TELETEX_STRING:
686
0
  case ASN1_ETYPE_PRINTABLE_STRING:
687
0
  case ASN1_ETYPE_UNIVERSAL_STRING:
688
0
  case ASN1_ETYPE_BMP_STRING:
689
0
  case ASN1_ETYPE_UTF8_STRING:
690
0
  case ASN1_ETYPE_VISIBLE_STRING:
691
0
  case ASN1_ETYPE_BIT_STRING:
692
0
  case ASN1_ETYPE_SEQUENCE:
693
0
  case ASN1_ETYPE_SEQUENCE_OF:
694
0
  case ASN1_ETYPE_SET:
695
0
  case ASN1_ETYPE_SET_OF:
696
0
  case ASN1_ETYPE_GENERALIZED_TIME:
697
0
  case ASN1_ETYPE_UTC_TIME:
698
0
    if ((class != _asn1_tags[type].class)
699
0
        || (tag != _asn1_tags[type].tag))
700
0
      return ASN1_DER_ERROR;
701
0
    break;
702
703
0
  case ASN1_ETYPE_OCTET_STRING:
704
    /* OCTET STRING is handled differently to allow
705
     * BER encodings (structured class). */
706
0
    if (((class != ASN1_CLASS_UNIVERSAL)
707
0
         && (class != (ASN1_CLASS_UNIVERSAL | ASN1_CLASS_STRUCTURED)))
708
0
        || (tag != ASN1_TAG_OCTET_STRING))
709
0
      return ASN1_DER_ERROR;
710
0
    break;
711
0
  case ASN1_ETYPE_ANY:
712
0
    counter -= len2;
713
0
    break;
714
0
  case ASN1_ETYPE_CHOICE:
715
0
    counter -= len2;
716
0
    break;
717
0
  default:
718
0
    return ASN1_DER_ERROR;
719
0
    break;
720
0
  }
721
0
    }
722
723
0
  counter += len2;
724
0
  *tag_len = counter;
725
0
  if (inner_tag_len)
726
0
    *inner_tag_len = len2;
727
0
  return ASN1_SUCCESS;
728
729
0
cleanup:
730
0
  return result;
731
0
}
732
733
static int
734
extract_tag_der_recursive (asn1_node node, const unsigned char *der,
735
         int der_len, int *ret_len, int *inner_len,
736
         unsigned flags)
737
0
{
738
0
  asn1_node p;
739
0
  int ris = ASN1_DER_ERROR;
740
741
0
  if (type_field (node->type) == ASN1_ETYPE_CHOICE)
742
0
    {
743
0
      p = node->down;
744
0
      while (p)
745
0
  {
746
0
    ris =
747
0
      _asn1_extract_tag_der (p, der, der_len, ret_len, inner_len,
748
0
           flags);
749
0
    if (ris == ASN1_SUCCESS)
750
0
      break;
751
0
    p = p->right;
752
0
  }
753
754
0
      *ret_len = 0;
755
0
      return ris;
756
0
    }
757
0
  else
758
0
    return _asn1_extract_tag_der (node, der, der_len, ret_len, inner_len,
759
0
          flags);
760
0
}
761
762
static int
763
_asn1_delete_not_used (asn1_node node)
764
0
{
765
0
  asn1_node p, p2;
766
767
0
  if (node == NULL)
768
0
    return ASN1_ELEMENT_NOT_FOUND;
769
770
0
  p = node;
771
0
  while (p)
772
0
    {
773
0
      if (p->type & CONST_NOT_USED)
774
0
  {
775
0
    p2 = NULL;
776
0
    if (p != node)
777
0
      {
778
0
        p2 = _asn1_find_left (p);
779
0
        if (!p2)
780
0
    p2 = _asn1_find_up (p);
781
0
      }
782
0
    asn1_delete_structure (&p);
783
0
    p = p2;
784
0
  }
785
786
0
      if (!p)
787
0
  break;     /* reach node */
788
789
0
      if (p->down)
790
0
  {
791
0
    p = p->down;
792
0
  }
793
0
      else
794
0
  {
795
0
    if (p == node)
796
0
      p = NULL;
797
0
    else if (p->right)
798
0
      p = p->right;
799
0
    else
800
0
      {
801
0
        while (1)
802
0
    {
803
0
      p = _asn1_find_up (p);
804
0
      if (p == node)
805
0
        {
806
0
          p = NULL;
807
0
          break;
808
0
        }
809
0
      if (p->right)
810
0
        {
811
0
          p = p->right;
812
0
          break;
813
0
        }
814
0
    }
815
0
      }
816
0
  }
817
0
    }
818
0
  return ASN1_SUCCESS;
819
0
}
820
821
static int
822
_asn1_get_indefinite_length_string (const unsigned char *der,
823
            int der_len, int *len)
824
0
{
825
0
  int len2, len3, counter, indefinite;
826
0
  int result;
827
0
  unsigned long tag;
828
0
  unsigned char class;
829
830
0
  counter = indefinite = 0;
831
832
0
  while (1)
833
0
    {
834
0
      if (HAVE_TWO (der_len) && (der[counter] == 0)
835
0
    && (der[counter + 1] == 0))
836
0
  {
837
0
    counter += 2;
838
0
    DECR_LEN (der_len, 2);
839
840
0
    indefinite--;
841
0
    if (indefinite <= 0)
842
0
      break;
843
0
    else
844
0
      continue;
845
0
  }
846
847
0
      if (asn1_get_tag_der
848
0
    (der + counter, der_len, &class, &len2, &tag) != ASN1_SUCCESS)
849
0
  return ASN1_DER_ERROR;
850
851
0
      DECR_LEN (der_len, len2);
852
0
      counter += len2;
853
854
0
      len2 = asn1_get_length_der (der + counter, der_len, &len3);
855
0
      if (len2 < -1)
856
0
  return ASN1_DER_ERROR;
857
858
0
      if (len2 == -1)
859
0
  {
860
0
    indefinite++;
861
0
    counter += 1;
862
0
    DECR_LEN (der_len, 1);
863
0
  }
864
0
      else
865
0
  {
866
0
    counter += len2 + len3;
867
0
    DECR_LEN (der_len, len2 + len3);
868
0
  }
869
0
    }
870
871
0
  *len = counter;
872
0
  return ASN1_SUCCESS;
873
874
0
cleanup:
875
0
  return result;
876
0
}
877
878
static void
879
delete_unneeded_choice_fields (asn1_node p)
880
0
{
881
0
  asn1_node p2;
882
883
0
  while (p->right)
884
0
    {
885
0
      p2 = p->right;
886
0
      asn1_delete_structure (&p2);
887
0
    }
888
0
}
889
890
891
/**
892
 * asn1_der_decoding2
893
 * @element: pointer to an ASN1 structure.
894
 * @ider: vector that contains the DER encoding.
895
 * @max_ider_len: pointer to an integer giving the information about the
896
 *   maximal number of bytes occupied by *@ider. The real size of the DER
897
 *   encoding is returned through this pointer.
898
 * @flags: flags controlling the behaviour of the function.
899
 * @errorDescription: null-terminated string contains details when an
900
 *   error occurred.
901
 *
902
 * Fill the structure *@element with values of a DER encoding string. The
903
 * structure must just be created with function asn1_create_element().
904
 *
905
 * If %ASN1_DECODE_FLAG_ALLOW_PADDING flag is set then the function will ignore
906
 * padding after the decoded DER data. Upon a successful return the value of
907
 * *@max_ider_len will be set to the number of bytes decoded.
908
 *
909
 * If %ASN1_DECODE_FLAG_STRICT_DER flag is set then the function will
910
 * not decode any BER-encoded elements.
911
 *
912
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
913
 *   if @ELEMENT is %NULL, and %ASN1_TAG_ERROR or
914
 *   %ASN1_DER_ERROR if the der encoding doesn't match the structure
915
 *   name (*@ELEMENT deleted).
916
 **/
917
int
918
asn1_der_decoding2 (asn1_node * element, const void *ider, int *max_ider_len,
919
        unsigned int flags, char *errorDescription)
920
0
{
921
0
  asn1_node node, p, p2, p3;
922
0
  char temp[128];
923
0
  int counter, len2, len3, len4, move, ris, tlen;
924
0
  struct node_tail_cache_st tcache = { NULL, NULL };
925
0
  unsigned char class;
926
0
  unsigned long tag;
927
0
  int tag_len;
928
0
  int indefinite, result, total_len = *max_ider_len, ider_len = *max_ider_len;
929
0
  int inner_tag_len;
930
0
  unsigned char *ptmp;
931
0
  const unsigned char *ptag;
932
0
  const unsigned char *der = ider;
933
934
0
  node = *element;
935
936
0
  if (errorDescription != NULL)
937
0
    errorDescription[0] = 0;
938
939
0
  if (node == NULL)
940
0
    return ASN1_ELEMENT_NOT_FOUND;
941
942
0
  if (node->type & CONST_OPTION)
943
0
    {
944
0
      result = ASN1_GENERIC_ERROR;
945
0
      warn ();
946
0
      goto cleanup;
947
0
    }
948
949
0
  counter = 0;
950
0
  move = DOWN;
951
0
  p = node;
952
0
  while (1)
953
0
    {
954
0
      tag_len = 0;
955
0
      inner_tag_len = 0;
956
0
      ris = ASN1_SUCCESS;
957
0
      if (move != UP)
958
0
  {
959
0
    if (p->type & CONST_SET)
960
0
      {
961
0
        p2 = _asn1_find_up (p);
962
0
        len2 = p2->tmp_ival;
963
0
        if (len2 == -1)
964
0
    {
965
0
      if (HAVE_TWO (ider_len) && !der[counter]
966
0
          && !der[counter + 1])
967
0
        {
968
0
          p = p2;
969
0
          move = UP;
970
0
          counter += 2;
971
0
          DECR_LEN (ider_len, 2);
972
0
          continue;
973
0
        }
974
0
    }
975
0
        else if (counter == len2)
976
0
    {
977
0
      p = p2;
978
0
      move = UP;
979
0
      continue;
980
0
    }
981
0
        else if (counter > len2)
982
0
    {
983
0
      result = ASN1_DER_ERROR;
984
0
      warn ();
985
0
      goto cleanup;
986
0
    }
987
0
        p2 = p2->down;
988
0
        while (p2)
989
0
    {
990
0
      if ((p2->type & CONST_SET) && (p2->type & CONST_NOT_USED))
991
0
        {
992
0
          ris =
993
0
      extract_tag_der_recursive (p2, der + counter,
994
0
               ider_len, &len2, NULL,
995
0
               flags);
996
0
          if (ris == ASN1_SUCCESS)
997
0
      {
998
0
        p2->type &= ~CONST_NOT_USED;
999
0
        p = p2;
1000
0
        break;
1001
0
      }
1002
0
        }
1003
0
      p2 = p2->right;
1004
0
    }
1005
0
        if (p2 == NULL)
1006
0
    {
1007
0
      result = ASN1_DER_ERROR;
1008
0
      warn ();
1009
0
      goto cleanup;
1010
0
    }
1011
0
      }
1012
1013
    /* the position in the DER structure this starts */
1014
0
    p->start = counter;
1015
0
    p->end = total_len - 1;
1016
1017
0
    if ((p->type & CONST_OPTION) || (p->type & CONST_DEFAULT))
1018
0
      {
1019
0
        p2 = _asn1_find_up (p);
1020
0
        len2 = p2->tmp_ival;
1021
0
        if (counter == len2)
1022
0
    {
1023
0
      if (p->right)
1024
0
        {
1025
0
          p2 = p->right;
1026
0
          move = RIGHT;
1027
0
        }
1028
0
      else
1029
0
        move = UP;
1030
1031
0
      if (p->type & CONST_OPTION)
1032
0
        asn1_delete_structure (&p);
1033
1034
0
      p = p2;
1035
0
      continue;
1036
0
    }
1037
0
      }
1038
1039
0
    if (type_field (p->type) == ASN1_ETYPE_CHOICE)
1040
0
      {
1041
0
        while (p->down)
1042
0
    {
1043
0
      ris =
1044
0
        extract_tag_der_recursive (p->down, der + counter,
1045
0
                 ider_len, &len2, NULL, flags);
1046
1047
0
      if (ris == ASN1_SUCCESS)
1048
0
        {
1049
0
          delete_unneeded_choice_fields (p->down);
1050
0
          break;
1051
0
        }
1052
0
      else if (ris == ASN1_ERROR_TYPE_ANY)
1053
0
        {
1054
0
          result = ASN1_ERROR_TYPE_ANY;
1055
0
          warn ();
1056
0
          goto cleanup;
1057
0
        }
1058
0
      else
1059
0
        {
1060
0
          p2 = p->down;
1061
0
          asn1_delete_structure (&p2);
1062
0
        }
1063
0
    }
1064
1065
0
        if (p->down == NULL)
1066
0
    {
1067
0
      if (!(p->type & CONST_OPTION))
1068
0
        {
1069
0
          result = ASN1_DER_ERROR;
1070
0
          warn ();
1071
0
          goto cleanup;
1072
0
        }
1073
0
    }
1074
0
        else if (type_field (p->type) != ASN1_ETYPE_CHOICE)
1075
0
    p = p->down;
1076
1077
0
        p->start = counter;
1078
0
      }
1079
1080
0
    if ((p->type & CONST_OPTION) || (p->type & CONST_DEFAULT))
1081
0
      {
1082
0
        p2 = _asn1_find_up (p);
1083
0
        len2 = p2->tmp_ival;
1084
1085
0
        if ((len2 != -1) && (counter > len2))
1086
0
    ris = ASN1_TAG_ERROR;
1087
0
      }
1088
1089
0
    if (ris == ASN1_SUCCESS)
1090
0
      ris =
1091
0
        extract_tag_der_recursive (p, der + counter, ider_len,
1092
0
           &tag_len, &inner_tag_len, flags);
1093
1094
0
    if (ris != ASN1_SUCCESS)
1095
0
      {
1096
0
        if (p->type & CONST_OPTION)
1097
0
    {
1098
0
      p->type |= CONST_NOT_USED;
1099
0
      move = RIGHT;
1100
0
    }
1101
0
        else if (p->type & CONST_DEFAULT)
1102
0
    {
1103
0
      _asn1_set_value (p, NULL, 0);
1104
0
      move = RIGHT;
1105
0
    }
1106
0
        else
1107
0
    {
1108
0
      if (errorDescription != NULL)
1109
0
        _asn1_error_description_tag_error (p, errorDescription);
1110
1111
0
      result = ASN1_TAG_ERROR;
1112
0
      warn ();
1113
0
      goto cleanup;
1114
0
    }
1115
0
      }
1116
0
    else
1117
0
      {
1118
0
        DECR_LEN (ider_len, tag_len);
1119
0
        counter += tag_len;
1120
0
      }
1121
0
  }
1122
1123
0
      if (ris == ASN1_SUCCESS)
1124
0
  {
1125
0
    switch (type_field (p->type))
1126
0
      {
1127
0
      case ASN1_ETYPE_NULL:
1128
0
        DECR_LEN (ider_len, 1);
1129
0
        if (der[counter])
1130
0
    {
1131
0
      result = ASN1_DER_ERROR;
1132
0
      warn ();
1133
0
      goto cleanup;
1134
0
    }
1135
0
        counter++;
1136
0
        move = RIGHT;
1137
0
        break;
1138
0
      case ASN1_ETYPE_BOOLEAN:
1139
0
        DECR_LEN (ider_len, 2);
1140
1141
0
        if (der[counter++] != 1)
1142
0
    {
1143
0
      result = ASN1_DER_ERROR;
1144
0
      warn ();
1145
0
      goto cleanup;
1146
0
    }
1147
0
        if (der[counter++] == 0)
1148
0
    _asn1_set_value (p, "F", 1);
1149
0
        else
1150
0
    _asn1_set_value (p, "T", 1);
1151
0
        move = RIGHT;
1152
0
        break;
1153
0
      case ASN1_ETYPE_INTEGER:
1154
0
      case ASN1_ETYPE_ENUMERATED:
1155
0
        len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1156
0
        if (len2 < 0)
1157
0
    {
1158
0
      result = ASN1_DER_ERROR;
1159
0
      warn ();
1160
0
      goto cleanup;
1161
0
    }
1162
1163
0
        DECR_LEN (ider_len, len3 + len2);
1164
1165
0
        _asn1_set_value (p, der + counter, len3 + len2);
1166
0
        counter += len3 + len2;
1167
0
        move = RIGHT;
1168
0
        break;
1169
0
      case ASN1_ETYPE_OBJECT_ID:
1170
0
        result =
1171
0
    asn1_get_object_id_der (der + counter, ider_len, &len2,
1172
0
          temp, sizeof (temp));
1173
0
        if (result != ASN1_SUCCESS)
1174
0
    {
1175
0
      warn ();
1176
0
      goto cleanup;
1177
0
    }
1178
1179
0
        DECR_LEN (ider_len, len2);
1180
1181
0
        tlen = strlen (temp);
1182
0
        if (tlen > 0)
1183
0
    _asn1_set_value (p, temp, tlen + 1);
1184
1185
0
        counter += len2;
1186
0
        move = RIGHT;
1187
0
        break;
1188
0
      case ASN1_ETYPE_GENERALIZED_TIME:
1189
0
      case ASN1_ETYPE_UTC_TIME:
1190
0
        result =
1191
0
    _asn1_get_time_der (type_field (p->type), der + counter,
1192
0
            ider_len, &len2, temp, sizeof (temp) - 1,
1193
0
            flags);
1194
0
        if (result != ASN1_SUCCESS)
1195
0
    {
1196
0
      warn ();
1197
0
      goto cleanup;
1198
0
    }
1199
1200
0
        DECR_LEN (ider_len, len2);
1201
1202
0
        tlen = strlen (temp);
1203
0
        if (tlen > 0)
1204
0
    _asn1_set_value (p, temp, tlen);
1205
1206
0
        counter += len2;
1207
0
        move = RIGHT;
1208
0
        break;
1209
0
      case ASN1_ETYPE_OCTET_STRING:
1210
0
        if (counter < inner_tag_len)
1211
0
    {
1212
0
      result = ASN1_DER_ERROR;
1213
0
      warn ();
1214
0
      goto cleanup;
1215
0
    }
1216
1217
0
        ptag = der + counter - inner_tag_len;
1218
0
        if ((flags & ASN1_DECODE_FLAG_STRICT_DER)
1219
0
      || !(ptag[0] & ASN1_CLASS_STRUCTURED))
1220
0
    {
1221
0
      if (ptag[0] & ASN1_CLASS_STRUCTURED)
1222
0
        {
1223
0
          result = ASN1_DER_ERROR;
1224
0
          warn ();
1225
0
          goto cleanup;
1226
0
        }
1227
1228
0
      len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1229
0
      if (len2 < 0)
1230
0
        {
1231
0
          result = ASN1_DER_ERROR;
1232
0
          warn ();
1233
0
          goto cleanup;
1234
0
        }
1235
1236
0
      DECR_LEN (ider_len, len3 + len2);
1237
1238
0
      _asn1_set_value (p, der + counter, len3 + len2);
1239
0
      counter += len3 + len2;
1240
0
    }
1241
0
        else
1242
0
    {
1243
0
      unsigned dflags = 0, vlen, ber_len;
1244
1245
0
      if (ptag[0] & ASN1_CLASS_STRUCTURED)
1246
0
        dflags |= DECODE_FLAG_CONSTRUCTED;
1247
1248
0
      result =
1249
0
        _asn1_decode_simple_ber (type_field (p->type),
1250
0
               der + counter, ider_len, &ptmp,
1251
0
               &vlen, &ber_len, dflags);
1252
0
      if (result != ASN1_SUCCESS)
1253
0
        {
1254
0
          warn ();
1255
0
          goto cleanup;
1256
0
        }
1257
1258
0
      DECR_LEN (ider_len, ber_len);
1259
1260
0
      _asn1_set_value_lv (p, ptmp, vlen);
1261
1262
0
      counter += ber_len;
1263
0
      free (ptmp);
1264
0
    }
1265
0
        move = RIGHT;
1266
0
        break;
1267
0
      case ASN1_ETYPE_GENERALSTRING:
1268
0
      case ASN1_ETYPE_NUMERIC_STRING:
1269
0
      case ASN1_ETYPE_IA5_STRING:
1270
0
      case ASN1_ETYPE_TELETEX_STRING:
1271
0
      case ASN1_ETYPE_PRINTABLE_STRING:
1272
0
      case ASN1_ETYPE_UNIVERSAL_STRING:
1273
0
      case ASN1_ETYPE_BMP_STRING:
1274
0
      case ASN1_ETYPE_UTF8_STRING:
1275
0
      case ASN1_ETYPE_VISIBLE_STRING:
1276
0
      case ASN1_ETYPE_BIT_STRING:
1277
0
        len2 = asn1_get_length_der (der + counter, ider_len, &len3);
1278
0
        if (len2 < 0)
1279
0
    {
1280
0
      result = ASN1_DER_ERROR;
1281
0
      warn ();
1282
0
      goto cleanup;
1283
0
    }
1284
1285
0
        DECR_LEN (ider_len, len3 + len2);
1286
1287
0
        _asn1_set_value (p, der + counter, len3 + len2);
1288
0
        counter += len3 + len2;
1289
0
        move = RIGHT;
1290
0
        break;
1291
0
      case ASN1_ETYPE_SEQUENCE:
1292
0
      case ASN1_ETYPE_SET:
1293
0
        if (move == UP)
1294
0
    {
1295
0
      len2 = p->tmp_ival;
1296
0
      p->tmp_ival = 0;
1297
0
      if (len2 == -1)
1298
0
        {   /* indefinite length method */
1299
0
          DECR_LEN (ider_len, 2);
1300
0
          if ((der[counter]) || der[counter + 1])
1301
0
      {
1302
0
        result = ASN1_DER_ERROR;
1303
0
        warn ();
1304
0
        goto cleanup;
1305
0
      }
1306
0
          counter += 2;
1307
0
        }
1308
0
      else
1309
0
        {   /* definite length method */
1310
0
          if (len2 != counter)
1311
0
      {
1312
0
        result = ASN1_DER_ERROR;
1313
0
        warn ();
1314
0
        goto cleanup;
1315
0
      }
1316
0
        }
1317
0
      move = RIGHT;
1318
0
    }
1319
0
        else
1320
0
    {   /* move==DOWN || move==RIGHT */
1321
0
      len3 = asn1_get_length_der (der + counter, ider_len, &len2);
1322
0
      if (IS_ERR (len3, flags))
1323
0
        {
1324
0
          result = ASN1_DER_ERROR;
1325
0
          warn ();
1326
0
          goto cleanup;
1327
0
        }
1328
1329
0
      DECR_LEN (ider_len, len2);
1330
0
      counter += len2;
1331
1332
0
      if (len3 > 0)
1333
0
        {
1334
0
          p->tmp_ival = counter + len3;
1335
0
          move = DOWN;
1336
0
        }
1337
0
      else if (len3 == 0)
1338
0
        {
1339
0
          p2 = p->down;
1340
0
          while (p2)
1341
0
      {
1342
0
        if (type_field (p2->type) != ASN1_ETYPE_TAG)
1343
0
          {
1344
0
            p3 = p2->right;
1345
0
            asn1_delete_structure (&p2);
1346
0
            p2 = p3;
1347
0
          }
1348
0
        else
1349
0
          p2 = p2->right;
1350
0
      }
1351
0
          move = RIGHT;
1352
0
        }
1353
0
      else
1354
0
        {   /* indefinite length method */
1355
0
          p->tmp_ival = -1;
1356
0
          move = DOWN;
1357
0
        }
1358
0
    }
1359
0
        break;
1360
0
      case ASN1_ETYPE_SEQUENCE_OF:
1361
0
      case ASN1_ETYPE_SET_OF:
1362
0
        if (move == UP)
1363
0
    {
1364
0
      len2 = p->tmp_ival;
1365
0
      if (len2 == -1)
1366
0
        {   /* indefinite length method */
1367
0
          if (!HAVE_TWO (ider_len)
1368
0
        || ((der[counter]) || der[counter + 1]))
1369
0
      {
1370
0
        result = _asn1_append_sequence_set (p, &tcache);
1371
0
        if (result != 0)
1372
0
          {
1373
0
            warn ();
1374
0
            goto cleanup;
1375
0
          }
1376
0
        p = tcache.tail;
1377
0
        move = RIGHT;
1378
0
        continue;
1379
0
      }
1380
1381
0
          p->tmp_ival = 0;
1382
0
          tcache.tail = NULL; /* finished decoding this structure */
1383
0
          tcache.head = NULL;
1384
0
          DECR_LEN (ider_len, 2);
1385
0
          counter += 2;
1386
0
        }
1387
0
      else
1388
0
        {   /* definite length method */
1389
0
          if (len2 > counter)
1390
0
      {
1391
0
        result = _asn1_append_sequence_set (p, &tcache);
1392
0
        if (result != 0)
1393
0
          {
1394
0
            warn ();
1395
0
            goto cleanup;
1396
0
          }
1397
0
        p = tcache.tail;
1398
0
        move = RIGHT;
1399
0
        continue;
1400
0
      }
1401
1402
0
          p->tmp_ival = 0;
1403
0
          tcache.tail = NULL; /* finished decoding this structure */
1404
0
          tcache.head = NULL;
1405
1406
0
          if (len2 != counter)
1407
0
      {
1408
0
        result = ASN1_DER_ERROR;
1409
0
        warn ();
1410
0
        goto cleanup;
1411
0
      }
1412
0
        }
1413
0
    }
1414
0
        else
1415
0
    {   /* move==DOWN || move==RIGHT */
1416
0
      len3 = asn1_get_length_der (der + counter, ider_len, &len2);
1417
0
      if (IS_ERR (len3, flags))
1418
0
        {
1419
0
          result = ASN1_DER_ERROR;
1420
0
          warn ();
1421
0
          goto cleanup;
1422
0
        }
1423
1424
0
      DECR_LEN (ider_len, len2);
1425
0
      counter += len2;
1426
0
      if (len3)
1427
0
        {
1428
0
          if (len3 > 0)
1429
0
      { /* definite length method */
1430
0
        p->tmp_ival = counter + len3;
1431
0
      }
1432
0
          else
1433
0
      { /* indefinite length method */
1434
0
        p->tmp_ival = -1;
1435
0
      }
1436
1437
0
          p2 = p->down;
1438
0
          if (p2 == NULL)
1439
0
      {
1440
0
        result = ASN1_DER_ERROR;
1441
0
        warn ();
1442
0
        goto cleanup;
1443
0
      }
1444
1445
0
          while ((type_field (p2->type) == ASN1_ETYPE_TAG)
1446
0
           || (type_field (p2->type) == ASN1_ETYPE_SIZE))
1447
0
      p2 = p2->right;
1448
0
          if (p2->right == NULL)
1449
0
      {
1450
0
        result = _asn1_append_sequence_set (p, &tcache);
1451
0
        if (result != 0)
1452
0
          {
1453
0
            warn ();
1454
0
            goto cleanup;
1455
0
          }
1456
0
      }
1457
0
          p = p2;
1458
0
        }
1459
0
    }
1460
0
        move = RIGHT;
1461
0
        break;
1462
0
      case ASN1_ETYPE_ANY:
1463
        /* Check indefinite lenth method in an EXPLICIT TAG */
1464
1465
0
        if (!(flags & ASN1_DECODE_FLAG_STRICT_DER)
1466
0
      && (p->type & CONST_TAG) && tag_len == 2
1467
0
      && (der[counter - 1] == 0x80))
1468
0
    indefinite = 1;
1469
0
        else
1470
0
    indefinite = 0;
1471
1472
0
        if (asn1_get_tag_der
1473
0
      (der + counter, ider_len, &class, &len2,
1474
0
       &tag) != ASN1_SUCCESS)
1475
0
    {
1476
0
      result = ASN1_DER_ERROR;
1477
0
      warn ();
1478
0
      goto cleanup;
1479
0
    }
1480
1481
0
        DECR_LEN (ider_len, len2);
1482
1483
0
        len4 =
1484
0
    asn1_get_length_der (der + counter + len2, ider_len, &len3);
1485
0
        if (IS_ERR (len4, flags))
1486
0
    {
1487
0
      result = ASN1_DER_ERROR;
1488
0
      warn ();
1489
0
      goto cleanup;
1490
0
    }
1491
0
        if (len4 != -1) /* definite */
1492
0
    {
1493
0
      len2 += len4;
1494
1495
0
      DECR_LEN (ider_len, len4 + len3);
1496
0
      _asn1_set_value_lv (p, der + counter, len2 + len3);
1497
0
      counter += len2 + len3;
1498
0
    }
1499
0
        else    /* == -1 */
1500
0
    {   /* indefinite length */
1501
0
      ider_len += len2; /* undo DECR_LEN */
1502
1503
0
      if (counter == 0)
1504
0
        {
1505
0
          result = ASN1_DER_ERROR;
1506
0
          warn ();
1507
0
          goto cleanup;
1508
0
        }
1509
1510
0
      result =
1511
0
        _asn1_get_indefinite_length_string (der + counter,
1512
0
              ider_len, &len2);
1513
0
      if (result != ASN1_SUCCESS)
1514
0
        {
1515
0
          warn ();
1516
0
          goto cleanup;
1517
0
        }
1518
1519
0
      DECR_LEN (ider_len, len2);
1520
0
      _asn1_set_value_lv (p, der + counter, len2);
1521
0
      counter += len2;
1522
1523
0
    }
1524
1525
        /* Check if a couple of 0x00 are present due to an EXPLICIT TAG with
1526
           an indefinite length method. */
1527
0
        if (indefinite)
1528
0
    {
1529
0
      DECR_LEN (ider_len, 2);
1530
0
      if (!der[counter] && !der[counter + 1])
1531
0
        {
1532
0
          counter += 2;
1533
0
        }
1534
0
      else
1535
0
        {
1536
0
          result = ASN1_DER_ERROR;
1537
0
          warn ();
1538
0
          goto cleanup;
1539
0
        }
1540
0
    }
1541
1542
0
        move = RIGHT;
1543
0
        break;
1544
0
      default:
1545
0
        move = (move == UP) ? RIGHT : DOWN;
1546
0
        break;
1547
0
      }
1548
0
  }
1549
1550
0
      if (p)
1551
0
  {
1552
0
    p->end = counter - 1;
1553
0
  }
1554
1555
0
      if (p == node && move != DOWN)
1556
0
  break;
1557
1558
0
      if (move == DOWN)
1559
0
  {
1560
0
    if (p->down)
1561
0
      p = p->down;
1562
0
    else
1563
0
      move = RIGHT;
1564
0
  }
1565
0
      if ((move == RIGHT) && !(p->type & CONST_SET))
1566
0
  {
1567
0
    if (p->right)
1568
0
      p = p->right;
1569
0
    else
1570
0
      move = UP;
1571
0
  }
1572
0
      if (move == UP)
1573
0
  p = _asn1_find_up (p);
1574
0
    }
1575
1576
0
  _asn1_delete_not_used (*element);
1577
1578
0
  if ((ider_len < 0) ||
1579
0
      (!(flags & ASN1_DECODE_FLAG_ALLOW_PADDING) && (ider_len != 0)))
1580
0
    {
1581
0
      warn ();
1582
0
      result = ASN1_DER_ERROR;
1583
0
      goto cleanup;
1584
0
    }
1585
1586
0
  *max_ider_len = total_len - ider_len;
1587
1588
0
  return ASN1_SUCCESS;
1589
1590
0
cleanup:
1591
0
  asn1_delete_structure (element);
1592
0
  return result;
1593
0
}
1594
1595
1596
/**
1597
 * asn1_der_decoding:
1598
 * @element: pointer to an ASN1 structure.
1599
 * @ider: vector that contains the DER encoding.
1600
 * @ider_len: number of bytes of *@ider: @ider[0]..@ider[len-1].
1601
 * @errorDescription: null-terminated string contains details when an
1602
 *   error occurred.
1603
 *
1604
 * Fill the structure *@element with values of a DER encoding
1605
 * string. The structure must just be created with function
1606
 * asn1_create_element().
1607
 *
1608
 * Note that the *@element variable is provided as a pointer for
1609
 * historical reasons.
1610
 *
1611
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1612
 *   if @ELEMENT is %NULL, and %ASN1_TAG_ERROR or
1613
 *   %ASN1_DER_ERROR if the der encoding doesn't match the structure
1614
 *   name (*@ELEMENT deleted).
1615
 **/
1616
int
1617
asn1_der_decoding (asn1_node * element, const void *ider, int ider_len,
1618
       char *errorDescription)
1619
0
{
1620
0
  return asn1_der_decoding2 (element, ider, &ider_len, 0, errorDescription);
1621
0
}
1622
1623
/**
1624
 * asn1_der_decoding_element:
1625
 * @structure: pointer to an ASN1 structure
1626
 * @elementName: name of the element to fill
1627
 * @ider: vector that contains the DER encoding of the whole structure.
1628
 * @len: number of bytes of *der: der[0]..der[len-1]
1629
 * @errorDescription: null-terminated string contains details when an
1630
 *   error occurred.
1631
 *
1632
 * Fill the element named @ELEMENTNAME with values of a DER encoding
1633
 * string.  The structure must just be created with function
1634
 * asn1_create_element().  The DER vector must contain the encoding
1635
 * string of the whole @STRUCTURE.  If an error occurs during the
1636
 * decoding procedure, the *@STRUCTURE is deleted and set equal to
1637
 * %NULL.
1638
 *
1639
 * This function is deprecated and may just be an alias to asn1_der_decoding
1640
 * in future versions. Use asn1_der_decoding() instead.
1641
 *
1642
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1643
 *   if ELEMENT is %NULL or @elementName == NULL, and
1644
 *   %ASN1_TAG_ERROR or %ASN1_DER_ERROR if the der encoding doesn't
1645
 *   match the structure @structure (*ELEMENT deleted).
1646
 **/
1647
int
1648
asn1_der_decoding_element (asn1_node * structure, const char *elementName,
1649
         const void *ider, int len, char *errorDescription)
1650
0
{
1651
0
  return asn1_der_decoding (structure, ider, len, errorDescription);
1652
0
}
1653
1654
/**
1655
 * asn1_der_decoding_startEnd:
1656
 * @element: pointer to an ASN1 element
1657
 * @ider: vector that contains the DER encoding.
1658
 * @ider_len: number of bytes of *@ider: @ider[0]..@ider[len-1]
1659
 * @name_element: an element of NAME structure.
1660
 * @start: the position of the first byte of NAME_ELEMENT decoding
1661
 *   (@ider[*start])
1662
 * @end: the position of the last byte of NAME_ELEMENT decoding
1663
 *  (@ider[*end])
1664
 *
1665
 * Find the start and end point of an element in a DER encoding
1666
 * string. I mean that if you have a der encoding and you have already
1667
 * used the function asn1_der_decoding() to fill a structure, it may
1668
 * happen that you want to find the piece of string concerning an
1669
 * element of the structure.
1670
 *
1671
 * One example is the sequence "tbsCertificate" inside an X509
1672
 * certificate.
1673
 *
1674
 * Note that since libtasn1 3.7 the @ider and @ider_len parameters
1675
 * can be omitted, if the element is already decoded using asn1_der_decoding().
1676
 *
1677
 * Returns: %ASN1_SUCCESS if DER encoding OK, %ASN1_ELEMENT_NOT_FOUND
1678
 *   if ELEMENT is %asn1_node EMPTY or @name_element is not a valid
1679
 *   element, %ASN1_TAG_ERROR or %ASN1_DER_ERROR if the der encoding
1680
 *   doesn't match the structure ELEMENT.
1681
 **/
1682
int
1683
asn1_der_decoding_startEnd (asn1_node element, const void *ider, int ider_len,
1684
          const char *name_element, int *start, int *end)
1685
0
{
1686
0
  asn1_node node, node_to_find;
1687
0
  int result = ASN1_DER_ERROR;
1688
1689
0
  node = element;
1690
1691
0
  if (node == NULL)
1692
0
    return ASN1_ELEMENT_NOT_FOUND;
1693
1694
0
  node_to_find = asn1_find_node (node, name_element);
1695
1696
0
  if (node_to_find == NULL)
1697
0
    return ASN1_ELEMENT_NOT_FOUND;
1698
1699
0
  *start = node_to_find->start;
1700
0
  *end = node_to_find->end;
1701
1702
0
  if (*start == 0 && *end == 0)
1703
0
    {
1704
0
      if (ider == NULL || ider_len == 0)
1705
0
  return ASN1_GENERIC_ERROR;
1706
1707
      /* it seems asn1_der_decoding() wasn't called before. Do it now */
1708
0
      result = asn1_der_decoding (&node, ider, ider_len, NULL);
1709
0
      if (result != ASN1_SUCCESS)
1710
0
  {
1711
0
    warn ();
1712
0
    return result;
1713
0
  }
1714
1715
0
      node_to_find = asn1_find_node (node, name_element);
1716
0
      if (node_to_find == NULL)
1717
0
  return ASN1_ELEMENT_NOT_FOUND;
1718
1719
0
      *start = node_to_find->start;
1720
0
      *end = node_to_find->end;
1721
0
    }
1722
1723
0
  if (*end < *start)
1724
0
    return ASN1_GENERIC_ERROR;
1725
1726
0
  return ASN1_SUCCESS;
1727
0
}
1728
1729
/**
1730
 * asn1_expand_any_defined_by:
1731
 * @definitions: ASN1 definitions
1732
 * @element: pointer to an ASN1 structure
1733
 *
1734
 * Expands every "ANY DEFINED BY" element of a structure created from
1735
 * a DER decoding process (asn1_der_decoding function). The element
1736
 * ANY must be defined by an OBJECT IDENTIFIER. The type used to
1737
 * expand the element ANY is the first one following the definition of
1738
 * the actual value of the OBJECT IDENTIFIER.
1739
 *
1740
 * Returns: %ASN1_SUCCESS if Substitution OK, %ASN1_ERROR_TYPE_ANY if
1741
 *   some "ANY DEFINED BY" element couldn't be expanded due to a
1742
 *   problem in OBJECT_ID -> TYPE association, or other error codes
1743
 *   depending on DER decoding.
1744
 **/
1745
int
1746
asn1_expand_any_defined_by (asn1_node_const definitions, asn1_node * element)
1747
0
{
1748
0
  char name[2 * ASN1_MAX_NAME_SIZE + 2], value[ASN1_MAX_NAME_SIZE];
1749
0
  int retCode = ASN1_SUCCESS, result;
1750
0
  int len, len2, len3;
1751
0
  asn1_node_const p2;
1752
0
  asn1_node p, p3, aux = NULL;
1753
0
  char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
1754
0
  const char *definitionsName;
1755
1756
0
  if ((definitions == NULL) || (*element == NULL))
1757
0
    return ASN1_ELEMENT_NOT_FOUND;
1758
1759
0
  definitionsName = definitions->name;
1760
1761
0
  p = *element;
1762
0
  while (p)
1763
0
    {
1764
1765
0
      switch (type_field (p->type))
1766
0
  {
1767
0
  case ASN1_ETYPE_ANY:
1768
0
    if ((p->type & CONST_DEFINED_BY) && (p->value))
1769
0
      {
1770
        /* search the "DEF_BY" element */
1771
0
        p2 = p->down;
1772
0
        while ((p2) && (type_field (p2->type) != ASN1_ETYPE_CONSTANT))
1773
0
    p2 = p2->right;
1774
1775
0
        if (!p2)
1776
0
    {
1777
0
      retCode = ASN1_ERROR_TYPE_ANY;
1778
0
      break;
1779
0
    }
1780
1781
0
        p3 = _asn1_find_up (p);
1782
1783
0
        if (!p3)
1784
0
    {
1785
0
      retCode = ASN1_ERROR_TYPE_ANY;
1786
0
      break;
1787
0
    }
1788
1789
0
        p3 = p3->down;
1790
0
        while (p3)
1791
0
    {
1792
0
      if (!(strcmp (p3->name, p2->name)))
1793
0
        break;
1794
0
      p3 = p3->right;
1795
0
    }
1796
1797
0
        if ((!p3) || (type_field (p3->type) != ASN1_ETYPE_OBJECT_ID) ||
1798
0
      (p3->value == NULL))
1799
0
    {
1800
1801
0
      p3 = _asn1_find_up (p);
1802
0
      p3 = _asn1_find_up (p3);
1803
1804
0
      if (!p3)
1805
0
        {
1806
0
          retCode = ASN1_ERROR_TYPE_ANY;
1807
0
          break;
1808
0
        }
1809
1810
0
      p3 = p3->down;
1811
1812
0
      while (p3)
1813
0
        {
1814
0
          if (!(strcmp (p3->name, p2->name)))
1815
0
      break;
1816
0
          p3 = p3->right;
1817
0
        }
1818
1819
0
      if ((!p3) || (type_field (p3->type) != ASN1_ETYPE_OBJECT_ID)
1820
0
          || (p3->value == NULL))
1821
0
        {
1822
0
          retCode = ASN1_ERROR_TYPE_ANY;
1823
0
          break;
1824
0
        }
1825
0
    }
1826
1827
        /* search the OBJECT_ID into definitions */
1828
0
        p2 = definitions->down;
1829
0
        while (p2)
1830
0
    {
1831
0
      if ((type_field (p2->type) == ASN1_ETYPE_OBJECT_ID) &&
1832
0
          (p2->type & CONST_ASSIGN))
1833
0
        {
1834
0
          snprintf (name, sizeof (name), "%s.%s", definitionsName,
1835
0
        p2->name);
1836
1837
0
          len = ASN1_MAX_NAME_SIZE;
1838
0
          result =
1839
0
      asn1_read_value (definitions, name, value, &len);
1840
1841
0
          if ((result == ASN1_SUCCESS)
1842
0
        && (!_asn1_strcmp (p3->value, value)))
1843
0
      {
1844
0
        p2 = p2->right; /* pointer to the structure to
1845
               use for expansion */
1846
0
        while ((p2) && (p2->type & CONST_ASSIGN))
1847
0
          p2 = p2->right;
1848
1849
0
        if (p2)
1850
0
          {
1851
0
            snprintf (name, sizeof (name), "%s.%s",
1852
0
          definitionsName, p2->name);
1853
1854
0
            result =
1855
0
        asn1_create_element (definitions, name, &aux);
1856
0
            if (result == ASN1_SUCCESS)
1857
0
        {
1858
0
          _asn1_cpy_name (aux, p);
1859
0
          len2 =
1860
0
            asn1_get_length_der (p->value,
1861
0
               p->value_len, &len3);
1862
0
          if (len2 < 0)
1863
0
            return ASN1_DER_ERROR;
1864
1865
0
          result =
1866
0
            asn1_der_decoding (&aux, p->value + len3,
1867
0
                   len2,
1868
0
                   errorDescription);
1869
0
          if (result == ASN1_SUCCESS)
1870
0
            {
1871
1872
0
              _asn1_set_right (aux, p->right);
1873
0
              _asn1_set_right (p, aux);
1874
1875
0
              result = asn1_delete_structure (&p);
1876
0
              if (result == ASN1_SUCCESS)
1877
0
          {
1878
0
            p = aux;
1879
0
            aux = NULL;
1880
0
            break;
1881
0
          }
1882
0
              else
1883
0
          { /* error with asn1_delete_structure */
1884
0
            asn1_delete_structure (&aux);
1885
0
            retCode = result;
1886
0
            break;
1887
0
          }
1888
0
            }
1889
0
          else
1890
0
            { /* error with asn1_der_decoding */
1891
0
              retCode = result;
1892
0
              break;
1893
0
            }
1894
0
        }
1895
0
            else
1896
0
        { /* error with asn1_create_element */
1897
0
          retCode = result;
1898
0
          break;
1899
0
        }
1900
0
          }
1901
0
        else
1902
0
          { /* error with the pointer to the structure to exapand */
1903
0
            retCode = ASN1_ERROR_TYPE_ANY;
1904
0
            break;
1905
0
          }
1906
0
      }
1907
0
        }
1908
0
      p2 = p2->right;
1909
0
    }    /* end while */
1910
1911
0
        if (!p2)
1912
0
    {
1913
0
      retCode = ASN1_ERROR_TYPE_ANY;
1914
0
      break;
1915
0
    }
1916
1917
0
      }
1918
0
    break;
1919
0
  default:
1920
0
    break;
1921
0
  }
1922
1923
1924
0
      if (p->down)
1925
0
  {
1926
0
    p = p->down;
1927
0
  }
1928
0
      else if (p == *element)
1929
0
  {
1930
0
    p = NULL;
1931
0
    break;
1932
0
  }
1933
0
      else if (p->right)
1934
0
  p = p->right;
1935
0
      else
1936
0
  {
1937
0
    while (1)
1938
0
      {
1939
0
        p = _asn1_find_up (p);
1940
0
        if (p == *element)
1941
0
    {
1942
0
      p = NULL;
1943
0
      break;
1944
0
    }
1945
0
        if (p->right)
1946
0
    {
1947
0
      p = p->right;
1948
0
      break;
1949
0
    }
1950
0
      }
1951
0
  }
1952
0
    }
1953
1954
0
  return retCode;
1955
0
}
1956
1957
/**
1958
 * asn1_expand_octet_string:
1959
 * @definitions: ASN1 definitions
1960
 * @element: pointer to an ASN1 structure
1961
 * @octetName: name of the OCTECT STRING field to expand.
1962
 * @objectName: name of the OBJECT IDENTIFIER field to use to define
1963
 *    the type for expansion.
1964
 *
1965
 * Expands an "OCTET STRING" element of a structure created from a DER
1966
 * decoding process (the asn1_der_decoding() function).  The type used
1967
 * for expansion is the first one following the definition of the
1968
 * actual value of the OBJECT IDENTIFIER indicated by OBJECTNAME.
1969
 *
1970
 * Returns: %ASN1_SUCCESS if substitution OK, %ASN1_ELEMENT_NOT_FOUND
1971
 *   if @objectName or @octetName are not correct,
1972
 *   %ASN1_VALUE_NOT_VALID if it wasn't possible to find the type to
1973
 *   use for expansion, or other errors depending on DER decoding.
1974
 **/
1975
int
1976
asn1_expand_octet_string (asn1_node_const definitions, asn1_node * element,
1977
        const char *octetName, const char *objectName)
1978
0
{
1979
0
  char name[2 * ASN1_MAX_NAME_SIZE + 1], value[ASN1_MAX_NAME_SIZE];
1980
0
  int retCode = ASN1_SUCCESS, result;
1981
0
  int len, len2, len3;
1982
0
  asn1_node_const p2;
1983
0
  asn1_node aux = NULL;
1984
0
  asn1_node octetNode = NULL, objectNode = NULL;
1985
0
  char errorDescription[ASN1_MAX_ERROR_DESCRIPTION_SIZE];
1986
1987
0
  if ((definitions == NULL) || (*element == NULL))
1988
0
    return ASN1_ELEMENT_NOT_FOUND;
1989
1990
0
  octetNode = asn1_find_node (*element, octetName);
1991
0
  if (octetNode == NULL)
1992
0
    return ASN1_ELEMENT_NOT_FOUND;
1993
0
  if (type_field (octetNode->type) != ASN1_ETYPE_OCTET_STRING)
1994
0
    return ASN1_ELEMENT_NOT_FOUND;
1995
0
  if (octetNode->value == NULL)
1996
0
    return ASN1_VALUE_NOT_FOUND;
1997
1998
0
  objectNode = asn1_find_node (*element, objectName);
1999
0
  if (objectNode == NULL)
2000
0
    return ASN1_ELEMENT_NOT_FOUND;
2001
2002
0
  if (type_field (objectNode->type) != ASN1_ETYPE_OBJECT_ID)
2003
0
    return ASN1_ELEMENT_NOT_FOUND;
2004
2005
0
  if (objectNode->value == NULL)
2006
0
    return ASN1_VALUE_NOT_FOUND;
2007
2008
2009
  /* search the OBJECT_ID into definitions */
2010
0
  p2 = definitions->down;
2011
0
  while (p2)
2012
0
    {
2013
0
      if ((type_field (p2->type) == ASN1_ETYPE_OBJECT_ID) &&
2014
0
    (p2->type & CONST_ASSIGN))
2015
0
  {
2016
0
    strcpy (name, definitions->name);
2017
0
    strcat (name, ".");
2018
0
    strcat (name, p2->name);
2019
2020
0
    len = sizeof (value);
2021
0
    result = asn1_read_value (definitions, name, value, &len);
2022
2023
0
    if ((result == ASN1_SUCCESS)
2024
0
        && (!_asn1_strcmp (objectNode->value, value)))
2025
0
      {
2026
2027
0
        p2 = p2->right; /* pointer to the structure to
2028
           use for expansion */
2029
0
        while ((p2) && (p2->type & CONST_ASSIGN))
2030
0
    p2 = p2->right;
2031
2032
0
        if (p2)
2033
0
    {
2034
0
      strcpy (name, definitions->name);
2035
0
      strcat (name, ".");
2036
0
      strcat (name, p2->name);
2037
2038
0
      result = asn1_create_element (definitions, name, &aux);
2039
0
      if (result == ASN1_SUCCESS)
2040
0
        {
2041
0
          _asn1_cpy_name (aux, octetNode);
2042
0
          len2 =
2043
0
      asn1_get_length_der (octetNode->value,
2044
0
               octetNode->value_len, &len3);
2045
0
          if (len2 < 0)
2046
0
      return ASN1_DER_ERROR;
2047
2048
0
          result =
2049
0
      asn1_der_decoding (&aux, octetNode->value + len3,
2050
0
             len2, errorDescription);
2051
0
          if (result == ASN1_SUCCESS)
2052
0
      {
2053
2054
0
        _asn1_set_right (aux, octetNode->right);
2055
0
        _asn1_set_right (octetNode, aux);
2056
2057
0
        result = asn1_delete_structure (&octetNode);
2058
0
        if (result == ASN1_SUCCESS)
2059
0
          {
2060
0
            aux = NULL;
2061
0
            break;
2062
0
          }
2063
0
        else
2064
0
          { /* error with asn1_delete_structure */
2065
0
            asn1_delete_structure (&aux);
2066
0
            retCode = result;
2067
0
            break;
2068
0
          }
2069
0
      }
2070
0
          else
2071
0
      { /* error with asn1_der_decoding */
2072
0
        retCode = result;
2073
0
        break;
2074
0
      }
2075
0
        }
2076
0
      else
2077
0
        {   /* error with asn1_create_element */
2078
0
          retCode = result;
2079
0
          break;
2080
0
        }
2081
0
    }
2082
0
        else
2083
0
    {   /* error with the pointer to the structure to exapand */
2084
0
      retCode = ASN1_VALUE_NOT_VALID;
2085
0
      break;
2086
0
    }
2087
0
      }
2088
0
  }
2089
2090
0
      p2 = p2->right;
2091
2092
0
    }
2093
2094
0
  if (!p2)
2095
0
    retCode = ASN1_VALUE_NOT_VALID;
2096
2097
0
  return retCode;
2098
0
}
2099
2100
/*-
2101
 * _asn1_decode_simple_der:
2102
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2103
 * @der: the encoded string
2104
 * @_der_len: the bytes of the encoded string
2105
 * @str: a pointer to the data
2106
 * @str_len: the length of the data
2107
 * @dflags: DECODE_FLAG_*
2108
 *
2109
 * Decodes a simple DER encoded type (e.g. a string, which is not constructed).
2110
 * The output is a pointer inside the @der.
2111
 *
2112
 * Returns: %ASN1_SUCCESS if successful or an error value.
2113
 -*/
2114
static int
2115
_asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
2116
       unsigned int _der_len, const unsigned char **str,
2117
       unsigned int *str_len, unsigned dflags)
2118
0
{
2119
0
  int tag_len, len_len;
2120
0
  const unsigned char *p;
2121
0
  int der_len = _der_len;
2122
0
  unsigned char class;
2123
0
  unsigned long tag;
2124
0
  long ret;
2125
2126
0
  if (der == NULL || der_len == 0)
2127
0
    return ASN1_VALUE_NOT_VALID;
2128
2129
0
  if (ETYPE_OK (etype) == 0 || ETYPE_IS_STRING (etype) == 0)
2130
0
    return ASN1_VALUE_NOT_VALID;
2131
2132
  /* doesn't handle constructed classes */
2133
0
  class = ETYPE_CLASS (etype);
2134
0
  if (class != ASN1_CLASS_UNIVERSAL)
2135
0
    return ASN1_VALUE_NOT_VALID;
2136
2137
0
  p = der;
2138
2139
0
  if (dflags & DECODE_FLAG_HAVE_TAG)
2140
0
    {
2141
0
      ret = asn1_get_tag_der (p, der_len, &class, &tag_len, &tag);
2142
0
      if (ret != ASN1_SUCCESS)
2143
0
  return ret;
2144
2145
0
      if (class != ETYPE_CLASS (etype) || tag != ETYPE_TAG (etype))
2146
0
  {
2147
0
    warn ();
2148
0
    return ASN1_DER_ERROR;
2149
0
  }
2150
2151
0
      p += tag_len;
2152
0
      der_len -= tag_len;
2153
0
      if (der_len <= 0)
2154
0
  return ASN1_DER_ERROR;
2155
0
    }
2156
2157
0
  ret = asn1_get_length_der (p, der_len, &len_len);
2158
0
  if (ret < 0)
2159
0
    return ASN1_DER_ERROR;
2160
2161
0
  p += len_len;
2162
0
  der_len -= len_len;
2163
0
  if (der_len <= 0)
2164
0
    return ASN1_DER_ERROR;
2165
2166
0
  *str_len = ret;
2167
0
  *str = p;
2168
2169
0
  return ASN1_SUCCESS;
2170
0
}
2171
2172
/**
2173
 * asn1_decode_simple_der:
2174
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2175
 * @der: the encoded string
2176
 * @_der_len: the bytes of the encoded string
2177
 * @str: a pointer to the data
2178
 * @str_len: the length of the data
2179
 *
2180
 * Decodes a simple DER encoded type (e.g. a string, which is not constructed).
2181
 * The output is a pointer inside the @der.
2182
 *
2183
 * Returns: %ASN1_SUCCESS if successful or an error value.
2184
 **/
2185
int
2186
asn1_decode_simple_der (unsigned int etype, const unsigned char *der,
2187
      unsigned int _der_len, const unsigned char **str,
2188
      unsigned int *str_len)
2189
0
{
2190
0
  return _asn1_decode_simple_der (etype, der, _der_len, str, str_len,
2191
0
          DECODE_FLAG_HAVE_TAG);
2192
0
}
2193
2194
static int
2195
append (uint8_t ** dst, unsigned *dst_size, const unsigned char *src,
2196
  unsigned src_size)
2197
0
{
2198
0
  if (src_size == 0)
2199
0
    return ASN1_SUCCESS;
2200
2201
0
  *dst = _asn1_realloc (*dst, *dst_size + src_size);
2202
0
  if (*dst == NULL)
2203
0
    return ASN1_MEM_ALLOC_ERROR;
2204
0
  memcpy (*dst + *dst_size, src, src_size);
2205
0
  *dst_size += src_size;
2206
0
  return ASN1_SUCCESS;
2207
0
}
2208
2209
/*-
2210
 * _asn1_decode_simple_ber:
2211
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2212
 * @der: the encoded string
2213
 * @_der_len: the bytes of the encoded string
2214
 * @str: a pointer to the data
2215
 * @str_len: the length of the data
2216
 * @ber_len: the total length occupied by BER (may be %NULL)
2217
 * @have_tag: whether a DER tag is included
2218
 *
2219
 * Decodes a BER encoded type. The output is an allocated value
2220
 * of the data. This decodes BER STRINGS only. Other types are
2221
 * decoded as DER.
2222
 *
2223
 * Returns: %ASN1_SUCCESS if successful or an error value.
2224
 -*/
2225
static int
2226
_asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
2227
       unsigned int _der_len, unsigned char **str,
2228
       unsigned int *str_len, unsigned int *ber_len,
2229
       unsigned dflags)
2230
0
{
2231
0
  int tag_len, len_len;
2232
0
  const unsigned char *p;
2233
0
  int der_len = _der_len;
2234
0
  uint8_t *total = NULL;
2235
0
  unsigned total_size = 0;
2236
0
  unsigned char class;
2237
0
  unsigned long tag;
2238
0
  unsigned char *out = NULL;
2239
0
  const unsigned char *cout = NULL;
2240
0
  unsigned out_len;
2241
0
  long result;
2242
2243
0
  if (ber_len)
2244
0
    *ber_len = 0;
2245
2246
0
  if (der == NULL || der_len == 0)
2247
0
    {
2248
0
      warn ();
2249
0
      return ASN1_VALUE_NOT_VALID;
2250
0
    }
2251
2252
0
  if (ETYPE_OK (etype) == 0)
2253
0
    {
2254
0
      warn ();
2255
0
      return ASN1_VALUE_NOT_VALID;
2256
0
    }
2257
2258
  /* doesn't handle constructed + definite classes */
2259
0
  class = ETYPE_CLASS (etype);
2260
0
  if (class != ASN1_CLASS_UNIVERSAL)
2261
0
    {
2262
0
      warn ();
2263
0
      return ASN1_VALUE_NOT_VALID;
2264
0
    }
2265
2266
0
  p = der;
2267
2268
0
  if (dflags & DECODE_FLAG_HAVE_TAG)
2269
0
    {
2270
0
      result = asn1_get_tag_der (p, der_len, &class, &tag_len, &tag);
2271
0
      if (result != ASN1_SUCCESS)
2272
0
  {
2273
0
    warn ();
2274
0
    return result;
2275
0
  }
2276
2277
0
      if (tag != ETYPE_TAG (etype))
2278
0
  {
2279
0
    warn ();
2280
0
    return ASN1_DER_ERROR;
2281
0
  }
2282
2283
0
      p += tag_len;
2284
2285
0
      DECR_LEN (der_len, tag_len);
2286
2287
0
      if (ber_len)
2288
0
  *ber_len += tag_len;
2289
0
    }
2290
2291
  /* indefinite constructed */
2292
0
  if ((((dflags & DECODE_FLAG_CONSTRUCTED) || class == ASN1_CLASS_STRUCTURED)
2293
0
       && ETYPE_IS_STRING (etype)) && !(dflags & DECODE_FLAG_LEVEL3))
2294
0
    {
2295
0
      if (der_len == 0)
2296
0
  {
2297
0
    warn ();
2298
0
    result = ASN1_DER_ERROR;
2299
0
    goto cleanup;
2300
0
  }
2301
2302
0
      if (der_len > 0 && p[0] == 0x80) /* indefinite */
2303
0
  {
2304
0
    len_len = 1;
2305
0
    DECR_LEN (der_len, len_len);
2306
0
    p += len_len;
2307
2308
0
    if (ber_len)
2309
0
      *ber_len += len_len;
2310
2311
    /* decode the available octet strings */
2312
0
    do
2313
0
      {
2314
0
        unsigned tmp_len;
2315
0
        unsigned flags = DECODE_FLAG_HAVE_TAG;
2316
2317
0
        if (dflags & DECODE_FLAG_LEVEL1)
2318
0
    flags |= DECODE_FLAG_LEVEL2;
2319
0
        else if (dflags & DECODE_FLAG_LEVEL2)
2320
0
    flags |= DECODE_FLAG_LEVEL3;
2321
0
        else
2322
0
    flags |= DECODE_FLAG_LEVEL1;
2323
2324
0
        result =
2325
0
    _asn1_decode_simple_ber (etype, p, der_len, &out, &out_len,
2326
0
           &tmp_len, flags);
2327
0
        if (result != ASN1_SUCCESS)
2328
0
    {
2329
0
      warn ();
2330
0
      goto cleanup;
2331
0
    }
2332
2333
0
        p += tmp_len;
2334
0
        DECR_LEN (der_len, tmp_len);
2335
2336
0
        if (ber_len)
2337
0
    *ber_len += tmp_len;
2338
2339
0
        DECR_LEN (der_len, 2);  /* we need the EOC */
2340
2341
0
        result = append (&total, &total_size, out, out_len);
2342
0
        if (result != ASN1_SUCCESS)
2343
0
    {
2344
0
      warn ();
2345
0
      goto cleanup;
2346
0
    }
2347
2348
0
        free (out);
2349
0
        out = NULL;
2350
2351
0
        if (p[0] == 0 && p[1] == 0) /* EOC */
2352
0
    {
2353
0
      if (ber_len)
2354
0
        *ber_len += 2;
2355
0
      break;
2356
0
    }
2357
2358
        /* no EOC */
2359
0
        der_len += 2;
2360
2361
0
        if (der_len == 2)
2362
0
    {
2363
0
      warn ();
2364
0
      result = ASN1_DER_ERROR;
2365
0
      goto cleanup;
2366
0
    }
2367
0
      }
2368
0
    while (1);
2369
0
  }
2370
0
      else      /* constructed */
2371
0
  {
2372
0
    long const_len;
2373
2374
0
    result = asn1_get_length_ber (p, der_len, &len_len);
2375
0
    if (result < 0)
2376
0
      {
2377
0
        warn ();
2378
0
        result = ASN1_DER_ERROR;
2379
0
        goto cleanup;
2380
0
      }
2381
2382
0
    DECR_LEN (der_len, len_len);
2383
0
    p += len_len;
2384
2385
0
    const_len = result;
2386
2387
0
    if (ber_len)
2388
0
      *ber_len += len_len;
2389
2390
    /* decode the available octet strings */
2391
0
    while (const_len > 0)
2392
0
      {
2393
0
        unsigned tmp_len;
2394
0
        unsigned flags = DECODE_FLAG_HAVE_TAG;
2395
2396
0
        if (dflags & DECODE_FLAG_LEVEL1)
2397
0
    flags |= DECODE_FLAG_LEVEL2;
2398
0
        else if (dflags & DECODE_FLAG_LEVEL2)
2399
0
    flags |= DECODE_FLAG_LEVEL3;
2400
0
        else
2401
0
    flags |= DECODE_FLAG_LEVEL1;
2402
2403
0
        result =
2404
0
    _asn1_decode_simple_ber (etype, p, der_len, &out, &out_len,
2405
0
           &tmp_len, flags);
2406
0
        if (result != ASN1_SUCCESS)
2407
0
    {
2408
0
      warn ();
2409
0
      goto cleanup;
2410
0
    }
2411
2412
0
        p += tmp_len;
2413
0
        DECR_LEN (der_len, tmp_len);
2414
0
        DECR_LEN (const_len, tmp_len);
2415
2416
0
        if (ber_len)
2417
0
    *ber_len += tmp_len;
2418
2419
0
        result = append (&total, &total_size, out, out_len);
2420
0
        if (result != ASN1_SUCCESS)
2421
0
    {
2422
0
      warn ();
2423
0
      goto cleanup;
2424
0
    }
2425
2426
0
        free (out);
2427
0
        out = NULL;
2428
0
      }
2429
0
  }
2430
0
    }
2431
0
  else if (class == ETYPE_CLASS (etype))
2432
0
    {
2433
0
      if (ber_len)
2434
0
  {
2435
0
    result = asn1_get_length_der (p, der_len, &len_len);
2436
0
    if (result < 0)
2437
0
      {
2438
0
        warn ();
2439
0
        result = ASN1_DER_ERROR;
2440
0
        goto cleanup;
2441
0
      }
2442
0
    *ber_len += result + len_len;
2443
0
  }
2444
2445
      /* non-string values are decoded as DER */
2446
0
      result =
2447
0
  _asn1_decode_simple_der (etype, der, _der_len, &cout, &out_len,
2448
0
         dflags);
2449
0
      if (result != ASN1_SUCCESS)
2450
0
  {
2451
0
    warn ();
2452
0
    goto cleanup;
2453
0
  }
2454
2455
0
      result = append (&total, &total_size, cout, out_len);
2456
0
      if (result != ASN1_SUCCESS)
2457
0
  {
2458
0
    warn ();
2459
0
    goto cleanup;
2460
0
  }
2461
0
    }
2462
0
  else
2463
0
    {
2464
0
      warn ();
2465
0
      result = ASN1_DER_ERROR;
2466
0
      goto cleanup;
2467
0
    }
2468
2469
0
  *str = total;
2470
0
  *str_len = total_size;
2471
2472
0
  return ASN1_SUCCESS;
2473
0
cleanup:
2474
0
  free (out);
2475
0
  free (total);
2476
0
  return result;
2477
0
}
2478
2479
/**
2480
 * asn1_decode_simple_ber:
2481
 * @etype: The type of the string to be encoded (ASN1_ETYPE_)
2482
 * @der: the encoded string
2483
 * @_der_len: the bytes of the encoded string
2484
 * @str: a pointer to the data
2485
 * @str_len: the length of the data
2486
 * @ber_len: the total length occupied by BER (may be %NULL)
2487
 *
2488
 * Decodes a BER encoded type. The output is an allocated value
2489
 * of the data. This decodes BER STRINGS only. Other types are
2490
 * decoded as DER.
2491
 *
2492
 * Returns: %ASN1_SUCCESS if successful or an error value.
2493
 **/
2494
int
2495
asn1_decode_simple_ber (unsigned int etype, const unsigned char *der,
2496
      unsigned int _der_len, unsigned char **str,
2497
      unsigned int *str_len, unsigned int *ber_len)
2498
0
{
2499
0
  return _asn1_decode_simple_ber (etype, der, _der_len, str, str_len, ber_len,
2500
0
          DECODE_FLAG_HAVE_TAG);
2501
0
}