ssl/libcrypto/src/crypto/pkcs7/bio_ber.c
changeset 0 e4d67989cc36
equal deleted inserted replaced
-1:000000000000 0:e4d67989cc36
       
     1 /* crypto/evp/bio_ber.c */
       
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
       
     3  * All rights reserved.
       
     4  *
       
     5  * This package is an SSL implementation written
       
     6  * by Eric Young (eay@cryptsoft.com).
       
     7  * The implementation was written so as to conform with Netscapes SSL.
       
     8  * 
       
     9  * This library is free for commercial and non-commercial use as long as
       
    10  * the following conditions are aheared to.  The following conditions
       
    11  * apply to all code found in this distribution, be it the RC4, RSA,
       
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
       
    13  * included with this distribution is covered by the same copyright terms
       
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
       
    15  * 
       
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
       
    17  * the code are not to be removed.
       
    18  * If this package is used in a product, Eric Young should be given attribution
       
    19  * as the author of the parts of the library used.
       
    20  * This can be in the form of a textual message at program startup or
       
    21  * in documentation (online or textual) provided with the package.
       
    22  * 
       
    23  * Redistribution and use in source and binary forms, with or without
       
    24  * modification, are permitted provided that the following conditions
       
    25  * are met:
       
    26  * 1. Redistributions of source code must retain the copyright
       
    27  *    notice, this list of conditions and the following disclaimer.
       
    28  * 2. Redistributions in binary form must reproduce the above copyright
       
    29  *    notice, this list of conditions and the following disclaimer in the
       
    30  *    documentation and/or other materials provided with the distribution.
       
    31  * 3. All advertising materials mentioning features or use of this software
       
    32  *    must display the following acknowledgement:
       
    33  *    "This product includes cryptographic software written by
       
    34  *     Eric Young (eay@cryptsoft.com)"
       
    35  *    The word 'cryptographic' can be left out if the rouines from the library
       
    36  *    being used are not cryptographic related :-).
       
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
       
    38  *    the apps directory (application code) you must include an acknowledgement:
       
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
       
    40  * 
       
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
       
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
       
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
       
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
       
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
       
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
       
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
       
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
       
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
       
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
       
    51  * SUCH DAMAGE.
       
    52  * 
       
    53  * The licence and distribution terms for any publically available version or
       
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
       
    55  * copied and put under another distribution licence
       
    56  * [including the GNU Public Licence.]
       
    57  */
       
    58 
       
    59 #include <stdio.h>
       
    60 #include <errno.h>
       
    61 #include "cryptlib.h"
       
    62 #include <openssl/buffer.h>
       
    63 #include <openssl/evp.h>
       
    64 
       
    65 static int ber_write(BIO *h,char *buf,int num);
       
    66 static int ber_read(BIO *h,char *buf,int size);
       
    67 /*static int ber_puts(BIO *h,char *str); */
       
    68 /*static int ber_gets(BIO *h,char *str,int size); */
       
    69 static long ber_ctrl(BIO *h,int cmd,long arg1,char *arg2);
       
    70 static int ber_new(BIO *h);
       
    71 static int ber_free(BIO *data);
       
    72 static long ber_callback_ctrl(BIO *h,int cmd,void *(*fp)());
       
    73 #define BER_BUF_SIZE	(32)
       
    74 
       
    75 /* This is used to hold the state of the BER objects being read. */
       
    76 typedef struct ber_struct
       
    77 	{
       
    78 	int tag;
       
    79 	int class;
       
    80 	long length;
       
    81 	int inf;
       
    82 	int num_left;
       
    83 	int depth;
       
    84 	} BER_CTX;
       
    85 
       
    86 typedef struct bio_ber_struct
       
    87 	{
       
    88 	int tag;
       
    89 	int class;
       
    90 	long length;
       
    91 	int inf;
       
    92 
       
    93 	/* most of the following are used when doing non-blocking IO */
       
    94 	/* reading */
       
    95 	long num_left;	/* number of bytes still to read/write in block */
       
    96 	int depth;	/* used with indefinite encoding. */
       
    97 	int finished;	/* No more read data */
       
    98 
       
    99 	/* writting */ 
       
   100 	char *w_addr;
       
   101 	int w_offset;
       
   102 	int w_left;
       
   103 
       
   104 	int buf_len;
       
   105 	int buf_off;
       
   106 	unsigned char buf[BER_BUF_SIZE];
       
   107 	} BIO_BER_CTX;
       
   108 
       
   109 static BIO_METHOD methods_ber=
       
   110 	{
       
   111 	BIO_TYPE_CIPHER,"cipher",
       
   112 	ber_write,
       
   113 	ber_read,
       
   114 	NULL, /* ber_puts, */
       
   115 	NULL, /* ber_gets, */
       
   116 	ber_ctrl,
       
   117 	ber_new,
       
   118 	ber_free,
       
   119 	ber_callback_ctrl,
       
   120 	};
       
   121 
       
   122 BIO_METHOD *BIO_f_ber(void)
       
   123 	{
       
   124 	return(&methods_ber);
       
   125 	}
       
   126 
       
   127 static int ber_new(BIO *bi)
       
   128 	{
       
   129 	BIO_BER_CTX *ctx;
       
   130 
       
   131 	ctx=(BIO_BER_CTX *)OPENSSL_malloc(sizeof(BIO_BER_CTX));
       
   132 	if (ctx == NULL) return(0);
       
   133 
       
   134 	memset((char *)ctx,0,sizeof(BIO_BER_CTX));
       
   135 
       
   136 	bi->init=0;
       
   137 	bi->ptr=(char *)ctx;
       
   138 	bi->flags=0;
       
   139 	return(1);
       
   140 	}
       
   141 
       
   142 static int ber_free(BIO *a)
       
   143 	{
       
   144 	BIO_BER_CTX *b;
       
   145 
       
   146 	if (a == NULL) return(0);
       
   147 	b=(BIO_BER_CTX *)a->ptr;
       
   148 	OPENSSL_cleanse(a->ptr,sizeof(BIO_BER_CTX));
       
   149 	OPENSSL_free(a->ptr);
       
   150 	a->ptr=NULL;
       
   151 	a->init=0;
       
   152 	a->flags=0;
       
   153 	return(1);
       
   154 	}
       
   155 
       
   156 int bio_ber_get_header(BIO *bio, BIO_BER_CTX *ctx)
       
   157 	{
       
   158 	char buf[64];
       
   159 	int i,j,n;
       
   160 	int ret;
       
   161 	unsigned char *p;
       
   162 	unsigned long length
       
   163 	int tag;
       
   164 	int class;
       
   165 	long max;
       
   166 
       
   167 	BIO_clear_retry_flags(b);
       
   168 
       
   169 	/* Pack the buffer down if there is a hole at the front */
       
   170 	if (ctx->buf_off != 0)
       
   171 		{
       
   172 		p=ctx->buf;
       
   173 		j=ctx->buf_off;
       
   174 		n=ctx->buf_len-j;
       
   175 		for (i=0; i<n; i++)
       
   176 			{
       
   177 			p[0]=p[j];
       
   178 			p++;
       
   179 			}
       
   180 		ctx->buf_len-j;
       
   181 		ctx->buf_off=0;
       
   182 		}
       
   183 
       
   184 	/* If there is more room, read some more data */
       
   185 	i=BER_BUF_SIZE-ctx->buf_len;
       
   186 	if (i)
       
   187 		{
       
   188 		i=BIO_read(bio->next_bio,&(ctx->buf[ctx->buf_len]),i);
       
   189 		if (i <= 0)
       
   190 			{
       
   191 			BIO_copy_next_retry(b);
       
   192 			return(i);
       
   193 			}
       
   194 		else
       
   195 			ctx->buf_len+=i;
       
   196 		}
       
   197 
       
   198 	max=ctx->buf_len;
       
   199 	p=ctx->buf;
       
   200 	ret=ASN1_get_object(&p,&length,&tag,&class,max);
       
   201 
       
   202 	if (ret & 0x80)
       
   203 		{
       
   204 		if ((ctx->buf_len < BER_BUF_SIZE) &&
       
   205 			(ERR_GET_REASON(ERR_peek_error()) == ASN1_R_TOO_LONG))
       
   206 			{
       
   207 			ERR_clear_error(); /* clear the error */
       
   208 			BIO_set_retry_read(b);
       
   209 			}
       
   210 		return(-1);
       
   211 		}
       
   212 
       
   213 	/* We have no error, we have a header, so make use of it */
       
   214 
       
   215 	if ((ctx->tag  >= 0) && (ctx->tag != tag))
       
   216 		{
       
   217 		BIOerr(BIO_F_BIO_BER_GET_HEADER,BIO_R_TAG_MISMATCH);
       
   218 		sprintf(buf,"tag=%d, got %d",ctx->tag,tag);
       
   219 		ERR_add_error_data(1,buf);
       
   220 		return(-1);
       
   221 		}
       
   222 	if (ret & 0x01)
       
   223 	if (ret & V_ASN1_CONSTRUCTED)
       
   224 	}
       
   225 	
       
   226 static int ber_read(BIO *b, char *out, int outl)
       
   227 	{
       
   228 	int ret=0,i,n;
       
   229 	BIO_BER_CTX *ctx;
       
   230 
       
   231 	BIO_clear_retry_flags(b);
       
   232 
       
   233 	if (out == NULL) return(0);
       
   234 	ctx=(BIO_BER_CTX *)b->ptr;
       
   235 
       
   236 	if ((ctx == NULL) || (b->next_bio == NULL)) return(0);
       
   237 
       
   238 	if (ctx->finished) return(0);
       
   239 
       
   240 again:
       
   241 	/* First see if we are half way through reading a block */
       
   242 	if (ctx->num_left > 0)
       
   243 		{
       
   244 		if (ctx->num_left < outl)
       
   245 			n=ctx->num_left;
       
   246 		else
       
   247 			n=outl;
       
   248 		i=BIO_read(b->next_bio,out,n);
       
   249 		if (i <= 0)
       
   250 			{
       
   251 			BIO_copy_next_retry(b);
       
   252 			return(i);
       
   253 			}
       
   254 		ctx->num_left-=i;
       
   255 		outl-=i;
       
   256 		ret+=i;
       
   257 		if (ctx->num_left <= 0)
       
   258 			{
       
   259 			ctx->depth--;
       
   260 			if (ctx->depth <= 0)
       
   261 				ctx->finished=1;
       
   262 			}
       
   263 		if (outl <= 0)
       
   264 			return(ret);
       
   265 		else
       
   266 			goto again;
       
   267 		}
       
   268 	else	/* we need to read another BER header */
       
   269 		{
       
   270 		}
       
   271 	}
       
   272 
       
   273 static int ber_write(BIO *b, char *in, int inl)
       
   274 	{
       
   275 	int ret=0,n,i;
       
   276 	BIO_ENC_CTX *ctx;
       
   277 
       
   278 	ctx=(BIO_ENC_CTX *)b->ptr;
       
   279 	ret=inl;
       
   280 
       
   281 	BIO_clear_retry_flags(b);
       
   282 	n=ctx->buf_len-ctx->buf_off;
       
   283 	while (n > 0)
       
   284 		{
       
   285 		i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
       
   286 		if (i <= 0)
       
   287 			{
       
   288 			BIO_copy_next_retry(b);
       
   289 			return(i);
       
   290 			}
       
   291 		ctx->buf_off+=i;
       
   292 		n-=i;
       
   293 		}
       
   294 	/* at this point all pending data has been written */
       
   295 
       
   296 	if ((in == NULL) || (inl <= 0)) return(0);
       
   297 
       
   298 	ctx->buf_off=0;
       
   299 	while (inl > 0)
       
   300 		{
       
   301 		n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl;
       
   302 		EVP_CipherUpdate(&(ctx->cipher),
       
   303 			(unsigned char *)ctx->buf,&ctx->buf_len,
       
   304 			(unsigned char *)in,n);
       
   305 		inl-=n;
       
   306 		in+=n;
       
   307 
       
   308 		ctx->buf_off=0;
       
   309 		n=ctx->buf_len;
       
   310 		while (n > 0)
       
   311 			{
       
   312 			i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
       
   313 			if (i <= 0)
       
   314 				{
       
   315 				BIO_copy_next_retry(b);
       
   316 				return(i);
       
   317 				}
       
   318 			n-=i;
       
   319 			ctx->buf_off+=i;
       
   320 			}
       
   321 		ctx->buf_len=0;
       
   322 		ctx->buf_off=0;
       
   323 		}
       
   324 	BIO_copy_next_retry(b);
       
   325 	return(ret);
       
   326 	}
       
   327 
       
   328 static long ber_ctrl(BIO *b, int cmd, long num, char *ptr)
       
   329 	{
       
   330 	BIO *dbio;
       
   331 	BIO_ENC_CTX *ctx,*dctx;
       
   332 	long ret=1;
       
   333 	int i;
       
   334 
       
   335 	ctx=(BIO_ENC_CTX *)b->ptr;
       
   336 
       
   337 	switch (cmd)
       
   338 		{
       
   339 	case BIO_CTRL_RESET:
       
   340 		ctx->ok=1;
       
   341 		ctx->finished=0;
       
   342 		EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
       
   343 			ctx->cipher.berrypt);
       
   344 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   345 		break;
       
   346 	case BIO_CTRL_EOF:	/* More to read */
       
   347 		if (ctx->cont <= 0)
       
   348 			ret=1;
       
   349 		else
       
   350 			ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   351 		break;
       
   352 	case BIO_CTRL_WPENDING:
       
   353 		ret=ctx->buf_len-ctx->buf_off;
       
   354 		if (ret <= 0)
       
   355 			ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   356 		break;
       
   357 	case BIO_CTRL_PENDING: /* More to read in buffer */
       
   358 		ret=ctx->buf_len-ctx->buf_off;
       
   359 		if (ret <= 0)
       
   360 			ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   361 		break;
       
   362 	case BIO_CTRL_FLUSH:
       
   363 		/* do a final write */
       
   364 again:
       
   365 		while (ctx->buf_len != ctx->buf_off)
       
   366 			{
       
   367 			i=ber_write(b,NULL,0);
       
   368 			if (i < 0)
       
   369 				{
       
   370 				ret=i;
       
   371 				break;
       
   372 				}
       
   373 			}
       
   374 
       
   375 		if (!ctx->finished)
       
   376 			{
       
   377 			ctx->finished=1;
       
   378 			ctx->buf_off=0;
       
   379 			ret=EVP_CipherFinal_ex(&(ctx->cipher),
       
   380 				(unsigned char *)ctx->buf,
       
   381 				&(ctx->buf_len));
       
   382 			ctx->ok=(int)ret;
       
   383 			if (ret <= 0) break;
       
   384 
       
   385 			/* push out the bytes */
       
   386 			goto again;
       
   387 			}
       
   388 		
       
   389 		/* Finally flush the underlying BIO */
       
   390 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   391 		break;
       
   392 	case BIO_C_GET_CIPHER_STATUS:
       
   393 		ret=(long)ctx->ok;
       
   394 		break;
       
   395 	case BIO_C_DO_STATE_MACHINE:
       
   396 		BIO_clear_retry_flags(b);
       
   397 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   398 		BIO_copy_next_retry(b);
       
   399 		break;
       
   400 
       
   401 	case BIO_CTRL_DUP:
       
   402 		dbio=(BIO *)ptr;
       
   403 		dctx=(BIO_ENC_CTX *)dbio->ptr;
       
   404 		memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher));
       
   405 		dbio->init=1;
       
   406 		break;
       
   407 	default:
       
   408 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
       
   409 		break;
       
   410 		}
       
   411 	return(ret);
       
   412 	}
       
   413 
       
   414 static long ber_callback_ctrl(BIO *b, int cmd, void *(*fp)())
       
   415 	{
       
   416 	long ret=1;
       
   417 
       
   418 	if (b->next_bio == NULL) return(0);
       
   419 	switch (cmd)
       
   420 		{
       
   421 	default:
       
   422 		ret=BIO_callback_ctrl(b->next_bio,cmd,fp);
       
   423 		break;
       
   424 		}
       
   425 	return(ret);
       
   426 	}
       
   427 
       
   428 /*
       
   429 void BIO_set_cipher_ctx(b,c)
       
   430 BIO *b;
       
   431 EVP_CIPHER_ctx *c;
       
   432 	{
       
   433 	if (b == NULL) return;
       
   434 
       
   435 	if ((b->callback != NULL) &&
       
   436 		(b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
       
   437 		return;
       
   438 
       
   439 	b->init=1;
       
   440 	ctx=(BIO_ENC_CTX *)b->ptr;
       
   441 	memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX));
       
   442 	
       
   443 	if (b->callback != NULL)
       
   444 		b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
       
   445 	}
       
   446 */
       
   447 
       
   448 void BIO_set_cipher(BIO *b, EVP_CIPHER *c, unsigned char *k, unsigned char *i,
       
   449 	     int e)
       
   450 	{
       
   451 	BIO_ENC_CTX *ctx;
       
   452 
       
   453 	if (b == NULL) return;
       
   454 
       
   455 	if ((b->callback != NULL) &&
       
   456 		(b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
       
   457 		return;
       
   458 
       
   459 	b->init=1;
       
   460 	ctx=(BIO_ENC_CTX *)b->ptr;
       
   461 	EVP_CipherInit_ex(&(ctx->cipher),c,NULL,k,i,e);
       
   462 	
       
   463 	if (b->callback != NULL)
       
   464 		b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
       
   465 	}
       
   466