• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* crypto/evp/bio_ber.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <errno.h>
61 #include "cryptlib.h"
62 #include <openssl/buffer.h>
63 #include <openssl/evp.h>
64 
65 static int ber_write(BIO *h,char *buf,int num);
66 static int ber_read(BIO *h,char *buf,int size);
67 /*static int ber_puts(BIO *h,char *str); */
68 /*static int ber_gets(BIO *h,char *str,int size); */
69 static long ber_ctrl(BIO *h,int cmd,long arg1,char *arg2);
70 static int ber_new(BIO *h);
71 static int ber_free(BIO *data);
72 static long ber_callback_ctrl(BIO *h,int cmd,void *(*fp)());
73 #define BER_BUF_SIZE	(32)
74 
75 /* This is used to hold the state of the BER objects being read. */
76 typedef struct ber_struct
77 	{
78 	int tag;
79 	int class;
80 	long length;
81 	int inf;
82 	int num_left;
83 	int depth;
84 	} BER_CTX;
85 
86 typedef struct bio_ber_struct
87 	{
88 	int tag;
89 	int class;
90 	long length;
91 	int inf;
92 
93 	/* most of the following are used when doing non-blocking IO */
94 	/* reading */
95 	long num_left;	/* number of bytes still to read/write in block */
96 	int depth;	/* used with indefinite encoding. */
97 	int finished;	/* No more read data */
98 
99 	/* writting */
100 	char *w_addr;
101 	int w_offset;
102 	int w_left;
103 
104 	int buf_len;
105 	int buf_off;
106 	unsigned char buf[BER_BUF_SIZE];
107 	} BIO_BER_CTX;
108 
109 static BIO_METHOD methods_ber=
110 	{
111 	BIO_TYPE_CIPHER,"cipher",
112 	ber_write,
113 	ber_read,
114 	NULL, /* ber_puts, */
115 	NULL, /* ber_gets, */
116 	ber_ctrl,
117 	ber_new,
118 	ber_free,
119 	ber_callback_ctrl,
120 	};
121 
BIO_f_ber(void)122 BIO_METHOD *BIO_f_ber(void)
123 	{
124 	return(&methods_ber);
125 	}
126 
ber_new(BIO * bi)127 static int ber_new(BIO *bi)
128 	{
129 	BIO_BER_CTX *ctx;
130 
131 	ctx=(BIO_BER_CTX *)OPENSSL_malloc(sizeof(BIO_BER_CTX));
132 	if (ctx == NULL) return(0);
133 
134 	memset((char *)ctx,0,sizeof(BIO_BER_CTX));
135 
136 	bi->init=0;
137 	bi->ptr=(char *)ctx;
138 	bi->flags=0;
139 	return(1);
140 	}
141 
ber_free(BIO * a)142 static int ber_free(BIO *a)
143 	{
144 	BIO_BER_CTX *b;
145 
146 	if (a == NULL) return(0);
147 	b=(BIO_BER_CTX *)a->ptr;
148 	OPENSSL_cleanse(a->ptr,sizeof(BIO_BER_CTX));
149 	OPENSSL_free(a->ptr);
150 	a->ptr=NULL;
151 	a->init=0;
152 	a->flags=0;
153 	return(1);
154 	}
155 
bio_ber_get_header(BIO * bio,BIO_BER_CTX * ctx)156 int bio_ber_get_header(BIO *bio, BIO_BER_CTX *ctx)
157 	{
158 	char buf[64];
159 	int i,j,n;
160 	int ret;
161 	unsigned char *p;
162 	unsigned long length
163 	int tag;
164 	int class;
165 	long max;
166 
167 	BIO_clear_retry_flags(b);
168 
169 	/* Pack the buffer down if there is a hole at the front */
170 	if (ctx->buf_off != 0)
171 		{
172 		p=ctx->buf;
173 		j=ctx->buf_off;
174 		n=ctx->buf_len-j;
175 		for (i=0; i<n; i++)
176 			{
177 			p[0]=p[j];
178 			p++;
179 			}
180 		ctx->buf_len-j;
181 		ctx->buf_off=0;
182 		}
183 
184 	/* If there is more room, read some more data */
185 	i=BER_BUF_SIZE-ctx->buf_len;
186 	if (i)
187 		{
188 		i=BIO_read(bio->next_bio,&(ctx->buf[ctx->buf_len]),i);
189 		if (i <= 0)
190 			{
191 			BIO_copy_next_retry(b);
192 			return(i);
193 			}
194 		else
195 			ctx->buf_len+=i;
196 		}
197 
198 	max=ctx->buf_len;
199 	p=ctx->buf;
200 	ret=ASN1_get_object(&p,&length,&tag,&class,max);
201 
202 	if (ret & 0x80)
203 		{
204 		if ((ctx->buf_len < BER_BUF_SIZE) &&
205 			(ERR_GET_REASON(ERR_peek_error()) == ASN1_R_TOO_LONG))
206 			{
207 			ERR_clear_error(); /* clear the error */
208 			BIO_set_retry_read(b);
209 			}
210 		return(-1);
211 		}
212 
213 	/* We have no error, we have a header, so make use of it */
214 
215 	if ((ctx->tag  >= 0) && (ctx->tag != tag))
216 		{
217 		BIOerr(BIO_F_BIO_BER_GET_HEADER,BIO_R_TAG_MISMATCH);
218 		sprintf(buf,"tag=%d, got %d",ctx->tag,tag);
219 		ERR_add_error_data(1,buf);
220 		return(-1);
221 		}
222 	if (ret & 0x01)
223 	if (ret & V_ASN1_CONSTRUCTED)
224 	}
225 
ber_read(BIO * b,char * out,int outl)226 static int ber_read(BIO *b, char *out, int outl)
227 	{
228 	int ret=0,i,n;
229 	BIO_BER_CTX *ctx;
230 
231 	BIO_clear_retry_flags(b);
232 
233 	if (out == NULL) return(0);
234 	ctx=(BIO_BER_CTX *)b->ptr;
235 
236 	if ((ctx == NULL) || (b->next_bio == NULL)) return(0);
237 
238 	if (ctx->finished) return(0);
239 
240 again:
241 	/* First see if we are half way through reading a block */
242 	if (ctx->num_left > 0)
243 		{
244 		if (ctx->num_left < outl)
245 			n=ctx->num_left;
246 		else
247 			n=outl;
248 		i=BIO_read(b->next_bio,out,n);
249 		if (i <= 0)
250 			{
251 			BIO_copy_next_retry(b);
252 			return(i);
253 			}
254 		ctx->num_left-=i;
255 		outl-=i;
256 		ret+=i;
257 		if (ctx->num_left <= 0)
258 			{
259 			ctx->depth--;
260 			if (ctx->depth <= 0)
261 				ctx->finished=1;
262 			}
263 		if (outl <= 0)
264 			return(ret);
265 		else
266 			goto again;
267 		}
268 	else	/* we need to read another BER header */
269 		{
270 		}
271 	}
272 
ber_write(BIO * b,char * in,int inl)273 static int ber_write(BIO *b, char *in, int inl)
274 	{
275 	int ret=0,n,i;
276 	BIO_ENC_CTX *ctx;
277 
278 	ctx=(BIO_ENC_CTX *)b->ptr;
279 	ret=inl;
280 
281 	BIO_clear_retry_flags(b);
282 	n=ctx->buf_len-ctx->buf_off;
283 	while (n > 0)
284 		{
285 		i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
286 		if (i <= 0)
287 			{
288 			BIO_copy_next_retry(b);
289 			return(i);
290 			}
291 		ctx->buf_off+=i;
292 		n-=i;
293 		}
294 	/* at this point all pending data has been written */
295 
296 	if ((in == NULL) || (inl <= 0)) return(0);
297 
298 	ctx->buf_off=0;
299 	while (inl > 0)
300 		{
301 		n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl;
302 		EVP_CipherUpdate(&(ctx->cipher),
303 			(unsigned char *)ctx->buf,&ctx->buf_len,
304 			(unsigned char *)in,n);
305 		inl-=n;
306 		in+=n;
307 
308 		ctx->buf_off=0;
309 		n=ctx->buf_len;
310 		while (n > 0)
311 			{
312 			i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n);
313 			if (i <= 0)
314 				{
315 				BIO_copy_next_retry(b);
316 				return(i);
317 				}
318 			n-=i;
319 			ctx->buf_off+=i;
320 			}
321 		ctx->buf_len=0;
322 		ctx->buf_off=0;
323 		}
324 	BIO_copy_next_retry(b);
325 	return(ret);
326 	}
327 
ber_ctrl(BIO * b,int cmd,long num,char * ptr)328 static long ber_ctrl(BIO *b, int cmd, long num, char *ptr)
329 	{
330 	BIO *dbio;
331 	BIO_ENC_CTX *ctx,*dctx;
332 	long ret=1;
333 	int i;
334 
335 	ctx=(BIO_ENC_CTX *)b->ptr;
336 
337 	switch (cmd)
338 		{
339 	case BIO_CTRL_RESET:
340 		ctx->ok=1;
341 		ctx->finished=0;
342 		EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL,
343 			ctx->cipher.berrypt);
344 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
345 		break;
346 	case BIO_CTRL_EOF:	/* More to read */
347 		if (ctx->cont <= 0)
348 			ret=1;
349 		else
350 			ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
351 		break;
352 	case BIO_CTRL_WPENDING:
353 		ret=ctx->buf_len-ctx->buf_off;
354 		if (ret <= 0)
355 			ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
356 		break;
357 	case BIO_CTRL_PENDING: /* More to read in buffer */
358 		ret=ctx->buf_len-ctx->buf_off;
359 		if (ret <= 0)
360 			ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
361 		break;
362 	case BIO_CTRL_FLUSH:
363 		/* do a final write */
364 again:
365 		while (ctx->buf_len != ctx->buf_off)
366 			{
367 			i=ber_write(b,NULL,0);
368 			if (i < 0)
369 				{
370 				ret=i;
371 				break;
372 				}
373 			}
374 
375 		if (!ctx->finished)
376 			{
377 			ctx->finished=1;
378 			ctx->buf_off=0;
379 			ret=EVP_CipherFinal_ex(&(ctx->cipher),
380 				(unsigned char *)ctx->buf,
381 				&(ctx->buf_len));
382 			ctx->ok=(int)ret;
383 			if (ret <= 0) break;
384 
385 			/* push out the bytes */
386 			goto again;
387 			}
388 
389 		/* Finally flush the underlying BIO */
390 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
391 		break;
392 	case BIO_C_GET_CIPHER_STATUS:
393 		ret=(long)ctx->ok;
394 		break;
395 	case BIO_C_DO_STATE_MACHINE:
396 		BIO_clear_retry_flags(b);
397 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
398 		BIO_copy_next_retry(b);
399 		break;
400 
401 	case BIO_CTRL_DUP:
402 		dbio=(BIO *)ptr;
403 		dctx=(BIO_ENC_CTX *)dbio->ptr;
404 		memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher));
405 		dbio->init=1;
406 		break;
407 	default:
408 		ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
409 		break;
410 		}
411 	return(ret);
412 	}
413 
ber_callback_ctrl(BIO * b,int cmd,void * (* fp)())414 static long ber_callback_ctrl(BIO *b, int cmd, void *(*fp)())
415 	{
416 	long ret=1;
417 
418 	if (b->next_bio == NULL) return(0);
419 	switch (cmd)
420 		{
421 	default:
422 		ret=BIO_callback_ctrl(b->next_bio,cmd,fp);
423 		break;
424 		}
425 	return(ret);
426 	}
427 
428 /*
429 void BIO_set_cipher_ctx(b,c)
430 BIO *b;
431 EVP_CIPHER_ctx *c;
432 	{
433 	if (b == NULL) return;
434 
435 	if ((b->callback != NULL) &&
436 		(b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
437 		return;
438 
439 	b->init=1;
440 	ctx=(BIO_ENC_CTX *)b->ptr;
441 	memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX));
442 
443 	if (b->callback != NULL)
444 		b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
445 	}
446 */
447 
BIO_set_cipher(BIO * b,EVP_CIPHER * c,unsigned char * k,unsigned char * i,int e)448 void BIO_set_cipher(BIO *b, EVP_CIPHER *c, unsigned char *k, unsigned char *i,
449 	     int e)
450 	{
451 	BIO_ENC_CTX *ctx;
452 
453 	if (b == NULL) return;
454 
455 	if ((b->callback != NULL) &&
456 		(b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0))
457 		return;
458 
459 	b->init=1;
460 	ctx=(BIO_ENC_CTX *)b->ptr;
461 	EVP_CipherInit_ex(&(ctx->cipher),c,NULL,k,i,e);
462 
463 	if (b->callback != NULL)
464 		b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L);
465 	}
466 
467