]>
Commit | Line | Data |
---|---|---|
dfeab068 RE |
1 | /* crypto/evp/bio_ber.c */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
3 | * All rights reserved. | |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
8 | * | |
9 | * This library is free for commercial and non-commercial use as long as | |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 | * | |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
22 | * | |
23 | * Redistribution and use in source and binary forms, with or without | |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 | * the apps directory (application code) you must include an acknowledgement: | |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 | * | |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
52 | * | |
53 | * The licence and distribution terms for any publically available version or | |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
58 | ||
59 | #include <stdio.h> | |
60 | #include <errno.h> | |
61 | #include "cryptlib.h" | |
ec577822 BM |
62 | #include <openssl/buffer.h> |
63 | #include <openssl/evp.h> | |
dfeab068 | 64 | |
dfeab068 RE |
65 | static int ber_write(BIO *h,char *buf,int num); |
66 | static int ber_read(BIO *h,char *buf,int size); | |
67 | /*static int ber_puts(BIO *h,char *str); */ | |
68 | /*static int ber_gets(BIO *h,char *str,int size); */ | |
69 | static long ber_ctrl(BIO *h,int cmd,long arg1,char *arg2); | |
70 | static int ber_new(BIO *h); | |
71 | static int ber_free(BIO *data); | |
d3442bc7 | 72 | static long ber_callback_ctrl(BIO *h,int cmd,void *(*fp)()); |
dfeab068 RE |
73 | #define BER_BUF_SIZE (32) |
74 | ||
75 | /* This is used to hold the state of the BER objects being read. */ | |
76 | typedef struct ber_struct | |
77 | { | |
78 | int tag; | |
79 | int class; | |
80 | long length; | |
81 | int inf; | |
82 | int num_left; | |
83 | int depth; | |
84 | } BER_CTX; | |
85 | ||
86 | typedef struct bio_ber_struct | |
87 | { | |
88 | int tag; | |
89 | int class; | |
90 | long length; | |
91 | int inf; | |
92 | ||
93 | /* most of the following are used when doing non-blocking IO */ | |
94 | /* reading */ | |
95 | long num_left; /* number of bytes still to read/write in block */ | |
657e60fa | 96 | int depth; /* used with indefinite encoding. */ |
dfeab068 RE |
97 | int finished; /* No more read data */ |
98 | ||
99 | /* writting */ | |
100 | char *w_addr; | |
101 | int w_offset; | |
102 | int w_left; | |
103 | ||
104 | int buf_len; | |
105 | int buf_off; | |
106 | unsigned char buf[BER_BUF_SIZE]; | |
107 | } BIO_BER_CTX; | |
108 | ||
109 | static BIO_METHOD methods_ber= | |
110 | { | |
111 | BIO_TYPE_CIPHER,"cipher", | |
112 | ber_write, | |
113 | ber_read, | |
114 | NULL, /* ber_puts, */ | |
115 | NULL, /* ber_gets, */ | |
116 | ber_ctrl, | |
117 | ber_new, | |
118 | ber_free, | |
d3442bc7 | 119 | ber_callback_ctrl, |
dfeab068 RE |
120 | }; |
121 | ||
6b691a5c | 122 | BIO_METHOD *BIO_f_ber(void) |
dfeab068 RE |
123 | { |
124 | return(&methods_ber); | |
125 | } | |
126 | ||
6b691a5c | 127 | static int ber_new(BIO *bi) |
dfeab068 RE |
128 | { |
129 | BIO_BER_CTX *ctx; | |
130 | ||
26a3a48d | 131 | ctx=(BIO_BER_CTX *)OPENSSL_malloc(sizeof(BIO_BER_CTX)); |
dfeab068 RE |
132 | if (ctx == NULL) return(0); |
133 | ||
134 | memset((char *)ctx,0,sizeof(BIO_BER_CTX)); | |
135 | ||
136 | bi->init=0; | |
137 | bi->ptr=(char *)ctx; | |
138 | bi->flags=0; | |
139 | return(1); | |
140 | } | |
141 | ||
6b691a5c | 142 | static int ber_free(BIO *a) |
dfeab068 RE |
143 | { |
144 | BIO_BER_CTX *b; | |
145 | ||
146 | if (a == NULL) return(0); | |
147 | b=(BIO_BER_CTX *)a->ptr; | |
148 | memset(a->ptr,0,sizeof(BIO_BER_CTX)); | |
26a3a48d | 149 | OPENSSL_free(a->ptr); |
dfeab068 RE |
150 | a->ptr=NULL; |
151 | a->init=0; | |
152 | a->flags=0; | |
153 | return(1); | |
154 | } | |
155 | ||
6b691a5c | 156 | int bio_ber_get_header(BIO *bio, BIO_BER_CTX *ctx) |
dfeab068 RE |
157 | { |
158 | char buf[64]; | |
159 | int i,j,n; | |
160 | int ret; | |
161 | unsigned char *p; | |
162 | unsigned long length | |
163 | int tag; | |
164 | int class; | |
165 | long max; | |
166 | ||
167 | BIO_clear_retry_flags(b); | |
168 | ||
169 | /* Pack the buffer down if there is a hole at the front */ | |
170 | if (ctx->buf_off != 0) | |
171 | { | |
172 | p=ctx->buf; | |
173 | j=ctx->buf_off; | |
174 | n=ctx->buf_len-j; | |
175 | for (i=0; i<n; i++) | |
176 | { | |
177 | p[0]=p[j]; | |
178 | p++; | |
179 | } | |
180 | ctx->buf_len-j; | |
181 | ctx->buf_off=0; | |
182 | } | |
183 | ||
184 | /* If there is more room, read some more data */ | |
185 | i=BER_BUF_SIZE-ctx->buf_len; | |
186 | if (i) | |
187 | { | |
188 | i=BIO_read(bio->next_bio,&(ctx->buf[ctx->buf_len]),i); | |
189 | if (i <= 0) | |
190 | { | |
191 | BIO_copy_next_retry(b); | |
192 | return(i); | |
193 | } | |
194 | else | |
195 | ctx->buf_len+=i; | |
196 | } | |
197 | ||
198 | max=ctx->buf_len; | |
199 | p=ctx->buf; | |
200 | ret=ASN1_get_object(&p,&length,&tag,&class,max); | |
201 | ||
202 | if (ret & 0x80) | |
203 | { | |
204 | if ((ctx->buf_len < BER_BUF_SIZE) && | |
205 | (ERR_GET_REASON(ERR_peek_error()) == ASN1_R_TOO_LONG)) | |
206 | { | |
207 | ERR_get_error(); /* clear the error */ | |
208 | BIO_set_retry_read(b); | |
209 | } | |
210 | return(-1); | |
211 | } | |
212 | ||
213 | /* We have no error, we have a header, so make use of it */ | |
214 | ||
215 | if ((ctx->tag >= 0) && (ctx->tag != tag)) | |
216 | { | |
217 | BIOerr(BIO_F_BIO_BER_GET_HEADER,BIO_R_TAG_MISMATCH); | |
218 | sprintf(buf,"tag=%d, got %d",ctx->tag,tag); | |
219 | ERR_add_error_data(1,buf); | |
220 | return(-1); | |
221 | } | |
222 | if (ret & 0x01) | |
223 | if (ret & V_ASN1_CONSTRUCTED) | |
224 | } | |
225 | ||
6b691a5c | 226 | static int ber_read(BIO *b, char *out, int outl) |
dfeab068 RE |
227 | { |
228 | int ret=0,i,n; | |
229 | BIO_BER_CTX *ctx; | |
230 | ||
231 | BIO_clear_retry_flags(b); | |
232 | ||
233 | if (out == NULL) return(0); | |
234 | ctx=(BIO_BER_CTX *)b->ptr; | |
235 | ||
236 | if ((ctx == NULL) || (b->next_bio == NULL)) return(0); | |
237 | ||
238 | if (ctx->finished) return(0); | |
239 | ||
240 | again: | |
241 | /* First see if we are half way through reading a block */ | |
242 | if (ctx->num_left > 0) | |
243 | { | |
244 | if (ctx->num_left < outl) | |
245 | n=ctx->num_left; | |
246 | else | |
247 | n=outl; | |
248 | i=BIO_read(b->next_bio,out,n); | |
249 | if (i <= 0) | |
250 | { | |
251 | BIO_copy_next_retry(b); | |
252 | return(i); | |
253 | } | |
254 | ctx->num_left-=i; | |
255 | outl-=i; | |
256 | ret+=i; | |
257 | if (ctx->num_left <= 0) | |
258 | { | |
259 | ctx->depth--; | |
260 | if (ctx->depth <= 0) | |
261 | ctx->finished=1; | |
262 | } | |
263 | if (outl <= 0) | |
264 | return(ret); | |
265 | else | |
266 | goto again; | |
267 | } | |
268 | else /* we need to read another BER header */ | |
269 | { | |
270 | } | |
271 | } | |
272 | ||
6b691a5c | 273 | static int ber_write(BIO *b, char *in, int inl) |
dfeab068 RE |
274 | { |
275 | int ret=0,n,i; | |
276 | BIO_ENC_CTX *ctx; | |
277 | ||
278 | ctx=(BIO_ENC_CTX *)b->ptr; | |
279 | ret=inl; | |
280 | ||
281 | BIO_clear_retry_flags(b); | |
282 | n=ctx->buf_len-ctx->buf_off; | |
283 | while (n > 0) | |
284 | { | |
285 | i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n); | |
286 | if (i <= 0) | |
287 | { | |
288 | BIO_copy_next_retry(b); | |
289 | return(i); | |
290 | } | |
291 | ctx->buf_off+=i; | |
292 | n-=i; | |
293 | } | |
294 | /* at this point all pending data has been written */ | |
295 | ||
296 | if ((in == NULL) || (inl <= 0)) return(0); | |
297 | ||
298 | ctx->buf_off=0; | |
299 | while (inl > 0) | |
300 | { | |
301 | n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl; | |
302 | EVP_CipherUpdate(&(ctx->cipher), | |
303 | (unsigned char *)ctx->buf,&ctx->buf_len, | |
304 | (unsigned char *)in,n); | |
305 | inl-=n; | |
306 | in+=n; | |
307 | ||
308 | ctx->buf_off=0; | |
309 | n=ctx->buf_len; | |
310 | while (n > 0) | |
311 | { | |
312 | i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n); | |
313 | if (i <= 0) | |
314 | { | |
315 | BIO_copy_next_retry(b); | |
316 | return(i); | |
317 | } | |
318 | n-=i; | |
319 | ctx->buf_off+=i; | |
320 | } | |
321 | ctx->buf_len=0; | |
322 | ctx->buf_off=0; | |
323 | } | |
324 | BIO_copy_next_retry(b); | |
325 | return(ret); | |
326 | } | |
327 | ||
6b691a5c | 328 | static long ber_ctrl(BIO *b, int cmd, long num, char *ptr) |
dfeab068 RE |
329 | { |
330 | BIO *dbio; | |
331 | BIO_ENC_CTX *ctx,*dctx; | |
332 | long ret=1; | |
333 | int i; | |
334 | ||
335 | ctx=(BIO_ENC_CTX *)b->ptr; | |
336 | ||
337 | switch (cmd) | |
338 | { | |
339 | case BIO_CTRL_RESET: | |
340 | ctx->ok=1; | |
341 | ctx->finished=0; | |
342 | EVP_CipherInit(&(ctx->cipher),NULL,NULL,NULL, | |
343 | ctx->cipher.berrypt); | |
344 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
345 | break; | |
346 | case BIO_CTRL_EOF: /* More to read */ | |
347 | if (ctx->cont <= 0) | |
348 | ret=1; | |
349 | else | |
350 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
351 | break; | |
352 | case BIO_CTRL_WPENDING: | |
353 | ret=ctx->buf_len-ctx->buf_off; | |
354 | if (ret <= 0) | |
355 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
356 | break; | |
357 | case BIO_CTRL_PENDING: /* More to read in buffer */ | |
358 | ret=ctx->buf_len-ctx->buf_off; | |
359 | if (ret <= 0) | |
360 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
361 | break; | |
362 | case BIO_CTRL_FLUSH: | |
363 | /* do a final write */ | |
364 | again: | |
365 | while (ctx->buf_len != ctx->buf_off) | |
366 | { | |
367 | i=ber_write(b,NULL,0); | |
368 | if (i < 0) | |
369 | { | |
370 | ret=i; | |
371 | break; | |
372 | } | |
373 | } | |
374 | ||
375 | if (!ctx->finished) | |
376 | { | |
377 | ctx->finished=1; | |
378 | ctx->buf_off=0; | |
379 | ret=EVP_CipherFinal(&(ctx->cipher), | |
380 | (unsigned char *)ctx->buf, | |
381 | &(ctx->buf_len)); | |
382 | ctx->ok=(int)ret; | |
383 | if (ret <= 0) break; | |
384 | ||
385 | /* push out the bytes */ | |
386 | goto again; | |
387 | } | |
388 | ||
389 | /* Finally flush the underlying BIO */ | |
390 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
391 | break; | |
392 | case BIO_C_GET_CIPHER_STATUS: | |
393 | ret=(long)ctx->ok; | |
394 | break; | |
395 | case BIO_C_DO_STATE_MACHINE: | |
396 | BIO_clear_retry_flags(b); | |
397 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
398 | BIO_copy_next_retry(b); | |
399 | break; | |
400 | ||
401 | case BIO_CTRL_DUP: | |
402 | dbio=(BIO *)ptr; | |
403 | dctx=(BIO_ENC_CTX *)dbio->ptr; | |
404 | memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); | |
405 | dbio->init=1; | |
406 | break; | |
407 | default: | |
408 | ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
409 | break; | |
410 | } | |
411 | return(ret); | |
412 | } | |
413 | ||
d3442bc7 RL |
414 | static long ber_callback_ctrl(BIO *b, int cmd, void *(*fp)()) |
415 | { | |
416 | long ret=1; | |
417 | ||
418 | if (b->next_bio == NULL) return(0); | |
419 | switch (cmd) | |
420 | { | |
421 | default: | |
422 | ret=BIO_callback_ctrl(b->next_bio,cmd,fp); | |
423 | break; | |
424 | } | |
425 | return(ret); | |
426 | } | |
427 | ||
dfeab068 RE |
428 | /* |
429 | void BIO_set_cipher_ctx(b,c) | |
430 | BIO *b; | |
431 | EVP_CIPHER_ctx *c; | |
432 | { | |
433 | if (b == NULL) return; | |
434 | ||
435 | if ((b->callback != NULL) && | |
436 | (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0)) | |
437 | return; | |
438 | ||
439 | b->init=1; | |
440 | ctx=(BIO_ENC_CTX *)b->ptr; | |
441 | memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); | |
442 | ||
443 | if (b->callback != NULL) | |
444 | b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L); | |
445 | } | |
446 | */ | |
447 | ||
6b691a5c UM |
448 | void BIO_set_cipher(BIO *b, EVP_CIPHER *c, unsigned char *k, unsigned char *i, |
449 | int e) | |
dfeab068 RE |
450 | { |
451 | BIO_ENC_CTX *ctx; | |
452 | ||
453 | if (b == NULL) return; | |
454 | ||
455 | if ((b->callback != NULL) && | |
456 | (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0)) | |
457 | return; | |
458 | ||
459 | b->init=1; | |
460 | ctx=(BIO_ENC_CTX *)b->ptr; | |
461 | EVP_CipherInit(&(ctx->cipher),c,k,i,e); | |
462 | ||
463 | if (b->callback != NULL) | |
464 | b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L); | |
465 | } | |
466 |