| // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
 | // | 
 | // Licensed under the Apache License, Version 2.0 (the "License"); | 
 | // you may not use this file except in compliance with the License. | 
 | // You may obtain a copy of the License at | 
 | // | 
 | //     https://www.apache.org/licenses/LICENSE-2.0 | 
 | // | 
 | // Unless required by applicable law or agreed to in writing, software | 
 | // distributed under the License is distributed on an "AS IS" BASIS, | 
 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
 | // See the License for the specific language governing permissions and | 
 | // limitations under the License. | 
 |  | 
 | #include <openssl/asn1.h> | 
 | #include <openssl/digest.h> | 
 | #include <openssl/err.h> | 
 | #include <openssl/evp.h> | 
 | #include <openssl/mem.h> | 
 | #include <openssl/obj.h> | 
 | #include <openssl/x509.h> | 
 |  | 
 | #include <limits.h> | 
 |  | 
 | #include "internal.h" | 
 |  | 
 | int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, | 
 |                    ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, | 
 |                    const EVP_MD *type) { | 
 |   if (signature->type != V_ASN1_BIT_STRING) { | 
 |     OPENSSL_PUT_ERROR(ASN1, ASN1_R_WRONG_TYPE); | 
 |     return 0; | 
 |   } | 
 |   bssl::ScopedEVP_MD_CTX ctx; | 
 |   if (!EVP_DigestSignInit(ctx.get(), nullptr, type, nullptr, pkey)) { | 
 |     return 0; | 
 |   } | 
 |   return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, ctx.get()); | 
 | } | 
 |  | 
 | int ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, | 
 |                        X509_ALGOR *algor2, ASN1_BIT_STRING *signature, | 
 |                        void *asn, EVP_MD_CTX *ctx) { | 
 |   int ret = 0; | 
 |   uint8_t *in = NULL, *out = NULL; | 
 |  | 
 |   { | 
 |     if (signature->type != V_ASN1_BIT_STRING) { | 
 |       OPENSSL_PUT_ERROR(ASN1, ASN1_R_WRONG_TYPE); | 
 |       goto err; | 
 |     } | 
 |  | 
 |     // Write out the requested copies of the AlgorithmIdentifier. | 
 |     if (algor1 && !x509_digest_sign_algorithm(ctx, algor1)) { | 
 |       goto err; | 
 |     } | 
 |     if (algor2 && !x509_digest_sign_algorithm(ctx, algor2)) { | 
 |       goto err; | 
 |     } | 
 |  | 
 |     int in_len = ASN1_item_i2d(reinterpret_cast<ASN1_VALUE *>(asn), &in, it); | 
 |     if (in_len < 0) { | 
 |       goto err; | 
 |     } | 
 |  | 
 |     EVP_PKEY *pkey = EVP_PKEY_CTX_get0_pkey(ctx->pctx); | 
 |     size_t out_len = EVP_PKEY_size(pkey); | 
 |     if (out_len > INT_MAX) { | 
 |       OPENSSL_PUT_ERROR(X509, ERR_R_OVERFLOW); | 
 |       goto err; | 
 |     } | 
 |  | 
 |     out = reinterpret_cast<uint8_t *>(OPENSSL_malloc(out_len)); | 
 |     if (out == NULL) { | 
 |       goto err; | 
 |     } | 
 |  | 
 |     if (!EVP_DigestSign(ctx, out, &out_len, in, in_len)) { | 
 |       OPENSSL_PUT_ERROR(X509, ERR_R_EVP_LIB); | 
 |       goto err; | 
 |     } | 
 |  | 
 |     ASN1_STRING_set0(signature, out, (int)out_len); | 
 |     out = NULL; | 
 |     signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); | 
 |     signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; | 
 |     ret = (int)out_len; | 
 |   } | 
 |  | 
 | err: | 
 |   EVP_MD_CTX_cleanup(ctx); | 
 |   OPENSSL_free(in); | 
 |   OPENSSL_free(out); | 
 |   return ret; | 
 | } |