]>
git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/evp/encode.c
17198ff6bebeb74a3f882f0f1c0f972f5c2d7cdc
2 * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the OpenSSL license (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
12 #include "internal/cryptlib.h"
13 #include <openssl/evp.h>
16 static unsigned char conv_ascii2bin(unsigned char a
);
17 #ifndef CHARSET_EBCDIC
18 # define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f])
21 * We assume that PEM encoded files are EBCDIC files (i.e., printable text
22 * files). Convert them here while decoding. When encoding, output is EBCDIC
23 * (text) format again. (No need for conversion in the conv_bin2ascii macro,
24 * as the underlying textstring data_bin2ascii[] is already EBCDIC)
26 # define conv_bin2ascii(a) (data_bin2ascii[(a)&0x3f])
32 * left over chars are set to =
37 #define BIN_PER_LINE (64/4*3)
38 #define CHUNKS_PER_LINE (64/4)
39 #define CHAR_PER_LINE (64+1)
41 static const unsigned char data_bin2ascii
[65] = "ABCDEFGHIJKLMNOPQRSTUVWXYZ\
42 abcdefghijklmnopqrstuvwxyz0123456789+/";
46 * 0xF1 is ignore but next needs to be 0xF0 (for \r\n processing).
48 * 0xE0 is ignore at start of line.
56 #define B64_ERROR 0xFF
57 #define B64_NOT_BASE64(a) (((a)|0x13) == 0xF3)
58 #define B64_BASE64(a) (!B64_NOT_BASE64(a))
60 static const unsigned char data_ascii2bin
[128] = {
61 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
62 0xFF, 0xE0, 0xF0, 0xFF, 0xFF, 0xF1, 0xFF, 0xFF,
63 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
64 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
65 0xE0, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
66 0xFF, 0xFF, 0xFF, 0x3E, 0xFF, 0xF2, 0xFF, 0x3F,
67 0x34, 0x35, 0x36, 0x37, 0x38, 0x39, 0x3A, 0x3B,
68 0x3C, 0x3D, 0xFF, 0xFF, 0xFF, 0x00, 0xFF, 0xFF,
69 0xFF, 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06,
70 0x07, 0x08, 0x09, 0x0A, 0x0B, 0x0C, 0x0D, 0x0E,
71 0x0F, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16,
72 0x17, 0x18, 0x19, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
73 0xFF, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x20,
74 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28,
75 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x30,
76 0x31, 0x32, 0x33, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF,
79 #ifndef CHARSET_EBCDIC
80 static unsigned char conv_ascii2bin(unsigned char a
)
84 return data_ascii2bin
[a
];
87 static unsigned char conv_ascii2bin(unsigned char a
)
92 return data_ascii2bin
[a
];
96 EVP_ENCODE_CTX
*EVP_ENCODE_CTX_new(void)
98 return OPENSSL_zalloc(sizeof(EVP_ENCODE_CTX
));
101 void EVP_ENCODE_CTX_free(EVP_ENCODE_CTX
*ctx
)
106 int EVP_ENCODE_CTX_copy(EVP_ENCODE_CTX
*dctx
, EVP_ENCODE_CTX
*sctx
)
108 memcpy(dctx
, sctx
, sizeof(EVP_ENCODE_CTX
));
113 int EVP_ENCODE_CTX_num(EVP_ENCODE_CTX
*ctx
)
118 void EVP_EncodeInit(EVP_ENCODE_CTX
*ctx
)
125 int EVP_EncodeUpdate(EVP_ENCODE_CTX
*ctx
, unsigned char *out
, int *outl
,
126 const unsigned char *in
, int inl
)
134 OPENSSL_assert(ctx
->length
<= (int)sizeof(ctx
->enc_data
));
135 if (ctx
->length
- ctx
->num
> inl
) {
136 memcpy(&(ctx
->enc_data
[ctx
->num
]), in
, inl
);
141 i
= ctx
->length
- ctx
->num
;
142 memcpy(&(ctx
->enc_data
[ctx
->num
]), in
, i
);
145 j
= EVP_EncodeBlock(out
, ctx
->enc_data
, ctx
->length
);
152 while (inl
>= ctx
->length
&& total
<= INT_MAX
) {
153 j
= EVP_EncodeBlock(out
, in
, ctx
->length
);
161 if (total
> INT_MAX
) {
162 /* Too much output data! */
167 memcpy(&(ctx
->enc_data
[0]), in
, inl
);
174 void EVP_EncodeFinal(EVP_ENCODE_CTX
*ctx
, unsigned char *out
, int *outl
)
176 unsigned int ret
= 0;
179 ret
= EVP_EncodeBlock(out
, ctx
->enc_data
, ctx
->num
);
187 int EVP_EncodeBlock(unsigned char *t
, const unsigned char *f
, int dlen
)
192 for (i
= dlen
; i
> 0; i
-= 3) {
194 l
= (((unsigned long)f
[0]) << 16L) |
195 (((unsigned long)f
[1]) << 8L) | f
[2];
196 *(t
++) = conv_bin2ascii(l
>> 18L);
197 *(t
++) = conv_bin2ascii(l
>> 12L);
198 *(t
++) = conv_bin2ascii(l
>> 6L);
199 *(t
++) = conv_bin2ascii(l
);
201 l
= ((unsigned long)f
[0]) << 16L;
203 l
|= ((unsigned long)f
[1] << 8L);
205 *(t
++) = conv_bin2ascii(l
>> 18L);
206 *(t
++) = conv_bin2ascii(l
>> 12L);
207 *(t
++) = (i
== 1) ? '=' : conv_bin2ascii(l
>> 6L);
218 void EVP_DecodeInit(EVP_ENCODE_CTX
*ctx
)
220 /* Only ctx->num is used during decoding. */
232 * Note: even though EVP_DecodeUpdate attempts to detect and report end of
233 * content, the context doesn't currently remember it and will accept more data
234 * in the next call. Therefore, the caller is responsible for checking and
235 * rejecting a 0 return value in the middle of content.
237 * Note: even though EVP_DecodeUpdate has historically tried to detect end of
238 * content based on line length, this has never worked properly. Therefore,
239 * we now return 0 when one of the following is true:
240 * - Padding or B64_EOF was detected and the last block is complete.
241 * - Input has zero-length.
243 * - Invalid characters are detected.
244 * - There is extra trailing padding, or data after padding.
245 * - B64_EOF is detected after an incomplete base64 block.
247 int EVP_DecodeUpdate(EVP_ENCODE_CTX
*ctx
, unsigned char *out
, int *outl
,
248 const unsigned char *in
, int inl
)
250 int seof
= 0, eof
= 0, rv
= -1, ret
= 0, i
, v
, tmp
, n
, decoded_len
;
256 if (n
> 0 && d
[n
- 1] == '=') {
258 if (n
> 1 && d
[n
- 2] == '=')
262 /* Legacy behaviour: an empty input chunk signals end of input. */
268 for (i
= 0; i
< inl
; i
++) {
270 v
= conv_ascii2bin(tmp
);
271 if (v
== B64_ERROR
) {
278 } else if (eof
> 0 && B64_BASE64(v
)) {
279 /* More data after padding. */
294 /* Only save valid base64 characters. */
298 * We increment n once per loop, and empty the buffer as soon as
299 * we reach 64 characters, so this can only happen if someone's
300 * manually messed with the ctx. Refuse to write any more data.
305 OPENSSL_assert(n
< (int)sizeof(ctx
->enc_data
));
310 decoded_len
= EVP_DecodeBlock(out
, d
, n
);
312 if (decoded_len
< 0 || eof
> decoded_len
) {
316 ret
+= decoded_len
- eof
;
317 out
+= decoded_len
- eof
;
322 * Legacy behaviour: if the current line is a full base64-block (i.e., has
323 * 0 mod 4 base64 characters), it is processed immediately. We keep this
324 * behaviour as applications may not be calling EVP_DecodeFinal properly.
329 decoded_len
= EVP_DecodeBlock(out
, d
, n
);
331 if (decoded_len
< 0 || eof
> decoded_len
) {
335 ret
+= (decoded_len
- eof
);
337 /* EOF in the middle of a base64 block. */
343 rv
= seof
|| (n
== 0 && eof
) ? 0 : 1;
345 /* Legacy behaviour. This should probably rather be zeroed on error. */
351 int EVP_DecodeBlock(unsigned char *t
, const unsigned char *f
, int n
)
353 int i
, ret
= 0, a
, b
, c
, d
;
356 /* trim white space from the start of the line. */
357 while ((conv_ascii2bin(*f
) == B64_WS
) && (n
> 0)) {
363 * strip off stuff at the end of the line ascii2bin values B64_WS,
364 * B64_EOLN, B64_EOLN and B64_EOF
366 while ((n
> 3) && (B64_NOT_BASE64(conv_ascii2bin(f
[n
- 1]))))
372 for (i
= 0; i
< n
; i
+= 4) {
373 a
= conv_ascii2bin(*(f
++));
374 b
= conv_ascii2bin(*(f
++));
375 c
= conv_ascii2bin(*(f
++));
376 d
= conv_ascii2bin(*(f
++));
377 if ((a
& 0x80) || (b
& 0x80) || (c
& 0x80) || (d
& 0x80))
379 l
= ((((unsigned long)a
) << 18L) |
380 (((unsigned long)b
) << 12L) |
381 (((unsigned long)c
) << 6L) | (((unsigned long)d
)));
382 *(t
++) = (unsigned char)(l
>> 16L) & 0xff;
383 *(t
++) = (unsigned char)(l
>> 8L) & 0xff;
384 *(t
++) = (unsigned char)(l
) & 0xff;
390 int EVP_DecodeFinal(EVP_ENCODE_CTX
*ctx
, unsigned char *out
, int *outl
)
396 i
= EVP_DecodeBlock(out
, ctx
->enc_data
, ctx
->num
);