|  | // Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include <openssl/asn1.h> | 
|  |  | 
|  | #include <assert.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <openssl/asn1t.h> | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/mem.h> | 
|  | #include <openssl/obj.h> | 
|  | #include <openssl/pool.h> | 
|  | #include <openssl/thread.h> | 
|  |  | 
|  | #include "../internal.h" | 
|  | #include "internal.h" | 
|  |  | 
|  |  | 
|  | // Utility functions for manipulating fields and offsets | 
|  |  | 
|  | // Add 'offset' to 'addr' | 
|  | #define offset2ptr(addr, offset) (void *)(((char *)(addr)) + (offset)) | 
|  |  | 
|  | // Given an ASN1_ITEM CHOICE type return the selector value | 
|  | int asn1_get_choice_selector(ASN1_VALUE **pval, const ASN1_ITEM *it) { | 
|  | int *sel = reinterpret_cast<int *>(offset2ptr(*pval, it->utype)); | 
|  | return *sel; | 
|  | } | 
|  |  | 
|  | // Given an ASN1_ITEM CHOICE type set the selector value, return old value. | 
|  | int asn1_set_choice_selector(ASN1_VALUE **pval, int value, | 
|  | const ASN1_ITEM *it) { | 
|  | int *sel, ret; | 
|  | sel = reinterpret_cast<int *>(offset2ptr(*pval, it->utype)); | 
|  | ret = *sel; | 
|  | *sel = value; | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static CRYPTO_refcount_t *asn1_get_references(ASN1_VALUE **pval, | 
|  | const ASN1_ITEM *it) { | 
|  | if (it->itype != ASN1_ITYPE_SEQUENCE) { | 
|  | return NULL; | 
|  | } | 
|  | const ASN1_AUX *aux = reinterpret_cast<const ASN1_AUX *>(it->funcs); | 
|  | if (!aux || !(aux->flags & ASN1_AFLG_REFCOUNT)) { | 
|  | return NULL; | 
|  | } | 
|  | return reinterpret_cast<CRYPTO_refcount_t *>( | 
|  | offset2ptr(*pval, aux->ref_offset)); | 
|  | } | 
|  |  | 
|  | void asn1_refcount_set_one(ASN1_VALUE **pval, const ASN1_ITEM *it) { | 
|  | CRYPTO_refcount_t *references = asn1_get_references(pval, it); | 
|  | if (references != NULL) { | 
|  | *references = 1; | 
|  | } | 
|  | } | 
|  |  | 
|  | int asn1_refcount_dec_and_test_zero(ASN1_VALUE **pval, const ASN1_ITEM *it) { | 
|  | CRYPTO_refcount_t *references = asn1_get_references(pval, it); | 
|  | if (references != NULL) { | 
|  | return CRYPTO_refcount_dec_and_test_zero(references); | 
|  | } | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | static ASN1_ENCODING *asn1_get_enc_ptr(ASN1_VALUE **pval, const ASN1_ITEM *it) { | 
|  | assert(it->itype == ASN1_ITYPE_SEQUENCE); | 
|  | const ASN1_AUX *aux; | 
|  | if (!pval || !*pval) { | 
|  | return NULL; | 
|  | } | 
|  | aux = reinterpret_cast<const ASN1_AUX *>(it->funcs); | 
|  | if (!aux || !(aux->flags & ASN1_AFLG_ENCODING)) { | 
|  | return NULL; | 
|  | } | 
|  | return reinterpret_cast<ASN1_ENCODING *>(offset2ptr(*pval, aux->enc_offset)); | 
|  | } | 
|  |  | 
|  | void asn1_enc_init(ASN1_VALUE **pval, const ASN1_ITEM *it) { | 
|  | ASN1_ENCODING *enc = asn1_get_enc_ptr(pval, it); | 
|  | if (enc) { | 
|  | enc->enc = NULL; | 
|  | enc->len = 0; | 
|  | enc->buf = NULL; | 
|  | } | 
|  | } | 
|  |  | 
|  | void asn1_enc_free(ASN1_VALUE **pval, const ASN1_ITEM *it) { | 
|  | ASN1_ENCODING *enc = asn1_get_enc_ptr(pval, it); | 
|  | if (enc) { | 
|  | asn1_encoding_clear(enc); | 
|  | } | 
|  | } | 
|  |  | 
|  | int asn1_enc_save(ASN1_VALUE **pval, const uint8_t *in, size_t in_len, | 
|  | const ASN1_ITEM *it, CRYPTO_BUFFER *buf) { | 
|  | ASN1_ENCODING *enc; | 
|  | enc = asn1_get_enc_ptr(pval, it); | 
|  | if (!enc) { | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | asn1_encoding_clear(enc); | 
|  | if (buf != NULL) { | 
|  | assert(CRYPTO_BUFFER_data(buf) <= in && | 
|  | in + in_len <= CRYPTO_BUFFER_data(buf) + CRYPTO_BUFFER_len(buf)); | 
|  | CRYPTO_BUFFER_up_ref(buf); | 
|  | enc->buf = buf; | 
|  | enc->enc = (uint8_t *)in; | 
|  | } else { | 
|  | enc->enc = reinterpret_cast<uint8_t *>(OPENSSL_memdup(in, in_len)); | 
|  | if (!enc->enc) { | 
|  | return 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | enc->len = in_len; | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | void asn1_encoding_clear(ASN1_ENCODING *enc) { | 
|  | if (enc->buf != NULL) { | 
|  | CRYPTO_BUFFER_free(enc->buf); | 
|  | } else { | 
|  | OPENSSL_free(enc->enc); | 
|  | } | 
|  | enc->enc = NULL; | 
|  | enc->len = 0; | 
|  | enc->buf = NULL; | 
|  | } | 
|  |  | 
|  | int asn1_enc_restore(int *len, unsigned char **out, ASN1_VALUE **pval, | 
|  | const ASN1_ITEM *it) { | 
|  | ASN1_ENCODING *enc = asn1_get_enc_ptr(pval, it); | 
|  | if (!enc || enc->len == 0) { | 
|  | return 0; | 
|  | } | 
|  | if (out) { | 
|  | OPENSSL_memcpy(*out, enc->enc, enc->len); | 
|  | *out += enc->len; | 
|  | } | 
|  | if (len) { | 
|  | *len = enc->len; | 
|  | } | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | // Given an ASN1_TEMPLATE get a pointer to a field | 
|  | ASN1_VALUE **asn1_get_field_ptr(ASN1_VALUE **pval, const ASN1_TEMPLATE *tt) { | 
|  | ASN1_VALUE **pvaltmp = | 
|  | reinterpret_cast<ASN1_VALUE **>(offset2ptr(*pval, tt->offset)); | 
|  | // NOTE for BOOLEAN types the field is just a plain int so we can't return | 
|  | // int **, so settle for (int *). | 
|  | return pvaltmp; | 
|  | } | 
|  |  | 
|  | // Handle ANY DEFINED BY template, find the selector, look up the relevant | 
|  | // ASN1_TEMPLATE in the table and return it. | 
|  | const ASN1_TEMPLATE *asn1_do_adb(ASN1_VALUE **pval, const ASN1_TEMPLATE *tt, | 
|  | int nullerr) { | 
|  | const ASN1_ADB *adb; | 
|  | const ASN1_ADB_TABLE *atbl; | 
|  | ASN1_VALUE **sfld; | 
|  | int i; | 
|  | if (!(tt->flags & ASN1_TFLG_ADB_MASK)) { | 
|  | return tt; | 
|  | } | 
|  |  | 
|  | // Else ANY DEFINED BY ... get the table | 
|  | adb = ASN1_ADB_ptr(tt->item); | 
|  |  | 
|  | // Get the selector field | 
|  | sfld = reinterpret_cast<ASN1_VALUE **>(offset2ptr(*pval, adb->offset)); | 
|  |  | 
|  | // Check if NULL | 
|  | int selector; | 
|  | if (*sfld == NULL) { | 
|  | if (!adb->null_tt) { | 
|  | goto err; | 
|  | } | 
|  | return adb->null_tt; | 
|  | } | 
|  |  | 
|  | // Convert type to a NID: | 
|  | // NB: don't check for NID_undef here because it | 
|  | // might be a legitimate value in the table | 
|  | assert(tt->flags & ASN1_TFLG_ADB_OID); | 
|  | selector = OBJ_obj2nid((ASN1_OBJECT *)*sfld); | 
|  |  | 
|  | // Try to find matching entry in table Maybe should check application types | 
|  | // first to allow application override? Might also be useful to have a flag | 
|  | // which indicates table is sorted and we can do a binary search. For now | 
|  | // stick to a linear search. | 
|  |  | 
|  | for (atbl = adb->tbl, i = 0; i < adb->tblcount; i++, atbl++) { | 
|  | if (atbl->value == selector) { | 
|  | return &atbl->tt; | 
|  | } | 
|  | } | 
|  |  | 
|  | // FIXME: need to search application table too | 
|  |  | 
|  | // No match, return default type | 
|  | if (!adb->default_tt) { | 
|  | goto err; | 
|  | } | 
|  | return adb->default_tt; | 
|  |  | 
|  | err: | 
|  | // FIXME: should log the value or OID of unsupported type | 
|  | if (nullerr) { | 
|  | OPENSSL_PUT_ERROR(ASN1, ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE); | 
|  | } | 
|  | return NULL; | 
|  | } |