OLD | NEW |
| (Empty) |
1 /* crypto/evp/bio_ber.c */ | |
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
3 * All rights reserved. | |
4 * | |
5 * This package is an SSL implementation written | |
6 * by Eric Young (eay@cryptsoft.com). | |
7 * The implementation was written so as to conform with Netscapes SSL. | |
8 * | |
9 * This library is free for commercial and non-commercial use as long as | |
10 * the following conditions are aheared to. The following conditions | |
11 * apply to all code found in this distribution, be it the RC4, RSA, | |
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 * included with this distribution is covered by the same copyright terms | |
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 * | |
16 * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 * the code are not to be removed. | |
18 * If this package is used in a product, Eric Young should be given attribution | |
19 * as the author of the parts of the library used. | |
20 * This can be in the form of a textual message at program startup or | |
21 * in documentation (online or textual) provided with the package. | |
22 * | |
23 * Redistribution and use in source and binary forms, with or without | |
24 * modification, are permitted provided that the following conditions | |
25 * are met: | |
26 * 1. Redistributions of source code must retain the copyright | |
27 * notice, this list of conditions and the following disclaimer. | |
28 * 2. Redistributions in binary form must reproduce the above copyright | |
29 * notice, this list of conditions and the following disclaimer in the | |
30 * documentation and/or other materials provided with the distribution. | |
31 * 3. All advertising materials mentioning features or use of this software | |
32 * must display the following acknowledgement: | |
33 * "This product includes cryptographic software written by | |
34 * Eric Young (eay@cryptsoft.com)" | |
35 * The word 'cryptographic' can be left out if the rouines from the library | |
36 * being used are not cryptographic related :-). | |
37 * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 * the apps directory (application code) you must include an acknowledgement: | |
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 * | |
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 * SUCH DAMAGE. | |
52 * | |
53 * The licence and distribution terms for any publically available version or | |
54 * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 * copied and put under another distribution licence | |
56 * [including the GNU Public Licence.] | |
57 */ | |
58 | |
59 #include <stdio.h> | |
60 #include <errno.h> | |
61 #include "cryptlib.h" | |
62 #include <openssl/buffer.h> | |
63 #include <openssl/evp.h> | |
64 | |
65 static int ber_write(BIO *h,char *buf,int num); | |
66 static int ber_read(BIO *h,char *buf,int size); | |
67 /*static int ber_puts(BIO *h,char *str); */ | |
68 /*static int ber_gets(BIO *h,char *str,int size); */ | |
69 static long ber_ctrl(BIO *h,int cmd,long arg1,char *arg2); | |
70 static int ber_new(BIO *h); | |
71 static int ber_free(BIO *data); | |
72 static long ber_callback_ctrl(BIO *h,int cmd,void *(*fp)()); | |
73 #define BER_BUF_SIZE (32) | |
74 | |
75 /* This is used to hold the state of the BER objects being read. */ | |
76 typedef struct ber_struct | |
77 { | |
78 int tag; | |
79 int class; | |
80 long length; | |
81 int inf; | |
82 int num_left; | |
83 int depth; | |
84 } BER_CTX; | |
85 | |
86 typedef struct bio_ber_struct | |
87 { | |
88 int tag; | |
89 int class; | |
90 long length; | |
91 int inf; | |
92 | |
93 /* most of the following are used when doing non-blocking IO */ | |
94 /* reading */ | |
95 long num_left; /* number of bytes still to read/write in block */ | |
96 int depth; /* used with indefinite encoding. */ | |
97 int finished; /* No more read data */ | |
98 | |
99 /* writting */ | |
100 char *w_addr; | |
101 int w_offset; | |
102 int w_left; | |
103 | |
104 int buf_len; | |
105 int buf_off; | |
106 unsigned char buf[BER_BUF_SIZE]; | |
107 } BIO_BER_CTX; | |
108 | |
109 static BIO_METHOD methods_ber= | |
110 { | |
111 BIO_TYPE_CIPHER,"cipher", | |
112 ber_write, | |
113 ber_read, | |
114 NULL, /* ber_puts, */ | |
115 NULL, /* ber_gets, */ | |
116 ber_ctrl, | |
117 ber_new, | |
118 ber_free, | |
119 ber_callback_ctrl, | |
120 }; | |
121 | |
122 BIO_METHOD *BIO_f_ber(void) | |
123 { | |
124 return(&methods_ber); | |
125 } | |
126 | |
127 static int ber_new(BIO *bi) | |
128 { | |
129 BIO_BER_CTX *ctx; | |
130 | |
131 ctx=(BIO_BER_CTX *)OPENSSL_malloc(sizeof(BIO_BER_CTX)); | |
132 if (ctx == NULL) return(0); | |
133 | |
134 memset((char *)ctx,0,sizeof(BIO_BER_CTX)); | |
135 | |
136 bi->init=0; | |
137 bi->ptr=(char *)ctx; | |
138 bi->flags=0; | |
139 return(1); | |
140 } | |
141 | |
142 static int ber_free(BIO *a) | |
143 { | |
144 BIO_BER_CTX *b; | |
145 | |
146 if (a == NULL) return(0); | |
147 b=(BIO_BER_CTX *)a->ptr; | |
148 OPENSSL_cleanse(a->ptr,sizeof(BIO_BER_CTX)); | |
149 OPENSSL_free(a->ptr); | |
150 a->ptr=NULL; | |
151 a->init=0; | |
152 a->flags=0; | |
153 return(1); | |
154 } | |
155 | |
156 int bio_ber_get_header(BIO *bio, BIO_BER_CTX *ctx) | |
157 { | |
158 char buf[64]; | |
159 int i,j,n; | |
160 int ret; | |
161 unsigned char *p; | |
162 unsigned long length | |
163 int tag; | |
164 int class; | |
165 long max; | |
166 | |
167 BIO_clear_retry_flags(b); | |
168 | |
169 /* Pack the buffer down if there is a hole at the front */ | |
170 if (ctx->buf_off != 0) | |
171 { | |
172 p=ctx->buf; | |
173 j=ctx->buf_off; | |
174 n=ctx->buf_len-j; | |
175 for (i=0; i<n; i++) | |
176 { | |
177 p[0]=p[j]; | |
178 p++; | |
179 } | |
180 ctx->buf_len-j; | |
181 ctx->buf_off=0; | |
182 } | |
183 | |
184 /* If there is more room, read some more data */ | |
185 i=BER_BUF_SIZE-ctx->buf_len; | |
186 if (i) | |
187 { | |
188 i=BIO_read(bio->next_bio,&(ctx->buf[ctx->buf_len]),i); | |
189 if (i <= 0) | |
190 { | |
191 BIO_copy_next_retry(b); | |
192 return(i); | |
193 } | |
194 else | |
195 ctx->buf_len+=i; | |
196 } | |
197 | |
198 max=ctx->buf_len; | |
199 p=ctx->buf; | |
200 ret=ASN1_get_object(&p,&length,&tag,&class,max); | |
201 | |
202 if (ret & 0x80) | |
203 { | |
204 if ((ctx->buf_len < BER_BUF_SIZE) && | |
205 (ERR_GET_REASON(ERR_peek_error()) == ASN1_R_TOO_LONG)) | |
206 { | |
207 ERR_clear_error(); /* clear the error */ | |
208 BIO_set_retry_read(b); | |
209 } | |
210 return(-1); | |
211 } | |
212 | |
213 /* We have no error, we have a header, so make use of it */ | |
214 | |
215 if ((ctx->tag >= 0) && (ctx->tag != tag)) | |
216 { | |
217 BIOerr(BIO_F_BIO_BER_GET_HEADER,BIO_R_TAG_MISMATCH); | |
218 sprintf(buf,"tag=%d, got %d",ctx->tag,tag); | |
219 ERR_add_error_data(1,buf); | |
220 return(-1); | |
221 } | |
222 if (ret & 0x01) | |
223 if (ret & V_ASN1_CONSTRUCTED) | |
224 } | |
225 | |
226 static int ber_read(BIO *b, char *out, int outl) | |
227 { | |
228 int ret=0,i,n; | |
229 BIO_BER_CTX *ctx; | |
230 | |
231 BIO_clear_retry_flags(b); | |
232 | |
233 if (out == NULL) return(0); | |
234 ctx=(BIO_BER_CTX *)b->ptr; | |
235 | |
236 if ((ctx == NULL) || (b->next_bio == NULL)) return(0); | |
237 | |
238 if (ctx->finished) return(0); | |
239 | |
240 again: | |
241 /* First see if we are half way through reading a block */ | |
242 if (ctx->num_left > 0) | |
243 { | |
244 if (ctx->num_left < outl) | |
245 n=ctx->num_left; | |
246 else | |
247 n=outl; | |
248 i=BIO_read(b->next_bio,out,n); | |
249 if (i <= 0) | |
250 { | |
251 BIO_copy_next_retry(b); | |
252 return(i); | |
253 } | |
254 ctx->num_left-=i; | |
255 outl-=i; | |
256 ret+=i; | |
257 if (ctx->num_left <= 0) | |
258 { | |
259 ctx->depth--; | |
260 if (ctx->depth <= 0) | |
261 ctx->finished=1; | |
262 } | |
263 if (outl <= 0) | |
264 return(ret); | |
265 else | |
266 goto again; | |
267 } | |
268 else /* we need to read another BER header */ | |
269 { | |
270 } | |
271 } | |
272 | |
273 static int ber_write(BIO *b, char *in, int inl) | |
274 { | |
275 int ret=0,n,i; | |
276 BIO_ENC_CTX *ctx; | |
277 | |
278 ctx=(BIO_ENC_CTX *)b->ptr; | |
279 ret=inl; | |
280 | |
281 BIO_clear_retry_flags(b); | |
282 n=ctx->buf_len-ctx->buf_off; | |
283 while (n > 0) | |
284 { | |
285 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n); | |
286 if (i <= 0) | |
287 { | |
288 BIO_copy_next_retry(b); | |
289 return(i); | |
290 } | |
291 ctx->buf_off+=i; | |
292 n-=i; | |
293 } | |
294 /* at this point all pending data has been written */ | |
295 | |
296 if ((in == NULL) || (inl <= 0)) return(0); | |
297 | |
298 ctx->buf_off=0; | |
299 while (inl > 0) | |
300 { | |
301 n=(inl > ENC_BLOCK_SIZE)?ENC_BLOCK_SIZE:inl; | |
302 EVP_CipherUpdate(&(ctx->cipher), | |
303 (unsigned char *)ctx->buf,&ctx->buf_len, | |
304 (unsigned char *)in,n); | |
305 inl-=n; | |
306 in+=n; | |
307 | |
308 ctx->buf_off=0; | |
309 n=ctx->buf_len; | |
310 while (n > 0) | |
311 { | |
312 i=BIO_write(b->next_bio,&(ctx->buf[ctx->buf_off]),n); | |
313 if (i <= 0) | |
314 { | |
315 BIO_copy_next_retry(b); | |
316 return(i); | |
317 } | |
318 n-=i; | |
319 ctx->buf_off+=i; | |
320 } | |
321 ctx->buf_len=0; | |
322 ctx->buf_off=0; | |
323 } | |
324 BIO_copy_next_retry(b); | |
325 return(ret); | |
326 } | |
327 | |
328 static long ber_ctrl(BIO *b, int cmd, long num, char *ptr) | |
329 { | |
330 BIO *dbio; | |
331 BIO_ENC_CTX *ctx,*dctx; | |
332 long ret=1; | |
333 int i; | |
334 | |
335 ctx=(BIO_ENC_CTX *)b->ptr; | |
336 | |
337 switch (cmd) | |
338 { | |
339 case BIO_CTRL_RESET: | |
340 ctx->ok=1; | |
341 ctx->finished=0; | |
342 EVP_CipherInit_ex(&(ctx->cipher),NULL,NULL,NULL,NULL, | |
343 ctx->cipher.berrypt); | |
344 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
345 break; | |
346 case BIO_CTRL_EOF: /* More to read */ | |
347 if (ctx->cont <= 0) | |
348 ret=1; | |
349 else | |
350 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
351 break; | |
352 case BIO_CTRL_WPENDING: | |
353 ret=ctx->buf_len-ctx->buf_off; | |
354 if (ret <= 0) | |
355 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
356 break; | |
357 case BIO_CTRL_PENDING: /* More to read in buffer */ | |
358 ret=ctx->buf_len-ctx->buf_off; | |
359 if (ret <= 0) | |
360 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
361 break; | |
362 case BIO_CTRL_FLUSH: | |
363 /* do a final write */ | |
364 again: | |
365 while (ctx->buf_len != ctx->buf_off) | |
366 { | |
367 i=ber_write(b,NULL,0); | |
368 if (i < 0) | |
369 { | |
370 ret=i; | |
371 break; | |
372 } | |
373 } | |
374 | |
375 if (!ctx->finished) | |
376 { | |
377 ctx->finished=1; | |
378 ctx->buf_off=0; | |
379 ret=EVP_CipherFinal_ex(&(ctx->cipher), | |
380 (unsigned char *)ctx->buf, | |
381 &(ctx->buf_len)); | |
382 ctx->ok=(int)ret; | |
383 if (ret <= 0) break; | |
384 | |
385 /* push out the bytes */ | |
386 goto again; | |
387 } | |
388 | |
389 /* Finally flush the underlying BIO */ | |
390 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
391 break; | |
392 case BIO_C_GET_CIPHER_STATUS: | |
393 ret=(long)ctx->ok; | |
394 break; | |
395 case BIO_C_DO_STATE_MACHINE: | |
396 BIO_clear_retry_flags(b); | |
397 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
398 BIO_copy_next_retry(b); | |
399 break; | |
400 | |
401 case BIO_CTRL_DUP: | |
402 dbio=(BIO *)ptr; | |
403 dctx=(BIO_ENC_CTX *)dbio->ptr; | |
404 memcpy(&(dctx->cipher),&(ctx->cipher),sizeof(ctx->cipher)); | |
405 dbio->init=1; | |
406 break; | |
407 default: | |
408 ret=BIO_ctrl(b->next_bio,cmd,num,ptr); | |
409 break; | |
410 } | |
411 return(ret); | |
412 } | |
413 | |
414 static long ber_callback_ctrl(BIO *b, int cmd, void *(*fp)()) | |
415 { | |
416 long ret=1; | |
417 | |
418 if (b->next_bio == NULL) return(0); | |
419 switch (cmd) | |
420 { | |
421 default: | |
422 ret=BIO_callback_ctrl(b->next_bio,cmd,fp); | |
423 break; | |
424 } | |
425 return(ret); | |
426 } | |
427 | |
428 /* | |
429 void BIO_set_cipher_ctx(b,c) | |
430 BIO *b; | |
431 EVP_CIPHER_ctx *c; | |
432 { | |
433 if (b == NULL) return; | |
434 | |
435 if ((b->callback != NULL) && | |
436 (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0)) | |
437 return; | |
438 | |
439 b->init=1; | |
440 ctx=(BIO_ENC_CTX *)b->ptr; | |
441 memcpy(ctx->cipher,c,sizeof(EVP_CIPHER_CTX)); | |
442 | |
443 if (b->callback != NULL) | |
444 b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L); | |
445 } | |
446 */ | |
447 | |
448 void BIO_set_cipher(BIO *b, EVP_CIPHER *c, unsigned char *k, unsigned char *i, | |
449 int e) | |
450 { | |
451 BIO_ENC_CTX *ctx; | |
452 | |
453 if (b == NULL) return; | |
454 | |
455 if ((b->callback != NULL) && | |
456 (b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,0L) <= 0)) | |
457 return; | |
458 | |
459 b->init=1; | |
460 ctx=(BIO_ENC_CTX *)b->ptr; | |
461 EVP_CipherInit_ex(&(ctx->cipher),c,NULL,k,i,e); | |
462 | |
463 if (b->callback != NULL) | |
464 b->callback(b,BIO_CB_CTRL,(char *)c,BIO_CTRL_SET,e,1L); | |
465 } | |
466 | |
OLD | NEW |