#include <wolfssl/wolfcrypt/libwolfssl_sources.h>
#include <wolfssl/internal.h>
#ifndef WC_NO_RNG
#include <wolfssl/wolfcrypt/random.h>
#endif
#if !defined(WOLFSSL_SSL_ASN1_INCLUDED)
#ifndef WOLFSSL_IGNORE_FILE_WARN
#warning ssl_asn1.c does not need to be compiled separately from ssl.c
#endif
#else
#ifndef NO_ASN
#ifdef OPENSSL_EXTRA
#ifdef OPENSSL_ALL
#define asn1Mem(obj, offset) (*(void**)(((byte*)(obj)) + (offset)))
#define asn1Type(obj, offset) (*(int*)(((byte*)(obj)) + (offset)))
static void* asn1_new_tpl(const WOLFSSL_ASN1_TEMPLATE *mem)
{
if (mem->sequence)
return wolfSSL_sk_new_null();
else
return mem->new_func();
}
static void* asn1_item_alloc(const WOLFSSL_ASN1_ITEM* item)
{
void* ret = NULL;
switch (item->type) {
case WOLFSSL_ASN1_SEQUENCE:
case WOLFSSL_ASN1_CHOICE:
ret = (void *)XMALLOC(item->size, NULL, DYNAMIC_TYPE_OPENSSL);
if (ret != NULL)
XMEMSET(ret, 0, item->size);
break;
case WOLFSSL_ASN1_OBJECT_TYPE:
if (item->mcount != 1 || item->members->offset) {
WOLFSSL_MSG("incorrect member count or offset");
return NULL;
}
ret = asn1_new_tpl(item->members);
break;
default:
WOLFSSL_MSG("ASN1 type not implemented");
return NULL;
}
return ret;
}
static int asn1_item_init(void* obj, const WOLFSSL_ASN1_ITEM* item)
{
const WOLFSSL_ASN1_TEMPLATE *mem = NULL;
size_t i;
int ret = 0;
switch (item->type) {
case WOLFSSL_ASN1_SEQUENCE:
for (mem = item->members, i = 0; i < item->mcount; mem++, i++) {
asn1Mem(obj, mem->offset) = asn1_new_tpl(mem);
if (asn1Mem(obj, mem->offset) == NULL) {
ret = WOLFSSL_FATAL_ERROR;
break;
}
}
break;
case WOLFSSL_ASN1_OBJECT_TYPE:
break;
case WOLFSSL_ASN1_CHOICE:
asn1Type(obj, item->toffset) = -1;
break;
default:
WOLFSSL_MSG("ASN1 type not implemented");
ret = WOLFSSL_FATAL_ERROR;
break;
}
return ret;
}
void* wolfSSL_ASN1_item_new(const WOLFSSL_ASN1_ITEM* item)
{
void* ret = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_item_new");
if (item == NULL)
return NULL;
ret = asn1_item_alloc(item);
if (ret == NULL)
return NULL;
if (asn1_item_init(ret, item) != 0) {
wolfSSL_ASN1_item_free(ret, item);
ret = NULL;
}
return ret;
}
static void asn1_free_tpl(void *obj, const WOLFSSL_ASN1_TEMPLATE *mem)
{
if (obj != NULL) {
if (mem->sequence)
wolfSSL_sk_pop_free((WOLFSSL_STACK *)obj, mem->free_func);
else
mem->free_func(obj);
}
}
void wolfSSL_ASN1_item_free(void *obj, const WOLFSSL_ASN1_ITEM *item)
{
const WOLFSSL_ASN1_TEMPLATE *mem = NULL;
size_t i;
WOLFSSL_ENTER("wolfSSL_ASN1_item_free");
if (obj != NULL) {
switch (item->type) {
case WOLFSSL_ASN1_SEQUENCE:
for (mem = item->members, i = 0; i < item->mcount; mem++, i++)
asn1_free_tpl(asn1Mem(obj, mem->offset), mem);
XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
break;
case WOLFSSL_ASN1_CHOICE:
if (asn1Type(obj, item->toffset) < 0)
break;
for (mem = item->members, i = 0; i < item->mcount; mem++, i++) {
if (asn1Type(obj, item->toffset) == mem->tag) {
asn1_free_tpl(asn1Mem(obj, mem->offset), mem);
break;
}
}
XFREE(obj, NULL, DYNAMIC_TYPE_OPENSSL);
break;
case WOLFSSL_ASN1_OBJECT_TYPE:
asn1_free_tpl(obj, item->members);
break;
default:
WOLFSSL_MSG("ASN1 type not implemented");
break;
}
}
}
static int i2d_asn1_items(const void* obj, byte** buf,
const WOLFSSL_ASN1_TEMPLATE* mem)
{
int len = 0;
int ret = 0;
if (mem->sequence) {
const WOLFSSL_STACK* sk = (WOLFSSL_STACK *)asn1Mem(obj, mem->offset);
int ski;
int innerLen = 0;
for (ski = 0; ski < wolfSSL_sk_num(sk); ski++) {
ret = mem->i2d_func(wolfSSL_sk_value(sk, ski), NULL);
if (ret <= 0)
break;
innerLen += ret;
}
if (ret <= 0)
return 0;
if (buf != NULL && *buf != NULL) {
int writeLen = 0;
*buf += SetSequence((word32)innerLen, *buf);
for (ski = 0; ski < wolfSSL_sk_num(sk); ski++) {
ret = mem->i2d_func(wolfSSL_sk_value(sk, ski), buf);
if (ret <= 0)
break;
writeLen += ret;
}
if (ret <= 0 || writeLen != innerLen)
return 0;
}
len = (int)SetSequence((word32)innerLen, NULL) + innerLen;
}
else {
ret = mem->i2d_func(asn1Mem(obj, mem->offset),
buf != NULL && *buf != NULL ? buf : NULL);
if (ret <= 0)
return 0;
len = ret;
}
return len;
}
static int wolfssl_i2d_asn1_items(const void* obj, byte* buf,
const WOLFSSL_ASN1_TEMPLATE* members, size_t mcount)
{
const WOLFSSL_ASN1_TEMPLATE* mem = NULL;
int len = 0;
int ret;
size_t i;
WOLFSSL_ENTER("wolfssl_i2d_asn1_items");
for (mem = members, i = 0; i < mcount; mem++, i++) {
byte* tmp = buf;
if (mem->ex && mem->tag >= 0) {
int innerLen = 0;
int hdrLen = 0;
ret = i2d_asn1_items(obj, NULL, mem);
if (ret <= 0) {
len = 0;
break;
}
innerLen = ret;
hdrLen = SetExplicit((byte)mem->tag, (word32)innerLen, buf, 0);
len += hdrLen;
if (buf != NULL)
buf += hdrLen;
}
ret = i2d_asn1_items(obj, &buf, mem);
if (ret <= 0) {
len = 0;
break;
}
if (buf != NULL && tmp != NULL && !mem->ex && mem->tag >= 0) {
byte imp[ASN_TAG_SZ + MAX_LENGTH_SZ];
SetImplicit(tmp[0], (byte)(mem->tag), 0, imp, 0);
tmp[0] = imp[0];
}
len += ret;
}
WOLFSSL_LEAVE("wolfssl_i2d_asn1_items", len);
return len;
}
static int i2d_ASN_SEQUENCE(const void* obj, byte* buf,
const WOLFSSL_ASN1_ITEM* item)
{
word32 seq_len;
word32 len = 0;
seq_len = (word32)wolfssl_i2d_asn1_items(obj, NULL, item->members,
item->mcount);
if (seq_len != 0) {
len = SetSequence(seq_len, buf);
if (buf != NULL) {
if (wolfssl_i2d_asn1_items(obj, buf + len, item->members,
item->mcount) > 0)
len += seq_len;
else
len = 0;
}
else
len += seq_len;
}
return (int)len;
}
static int i2d_ASN_CHOICE(const void* obj, byte* buf,
const WOLFSSL_ASN1_ITEM* item)
{
const WOLFSSL_ASN1_TEMPLATE* mem = NULL;
size_t i;
if (asn1Type(obj, item->toffset) < 0)
return 0;
for (mem = item->members, i = 0; i < item->mcount; mem++, i++) {
if (asn1Type(obj, item->toffset) == mem->tag) {
return wolfssl_i2d_asn1_items(obj, buf, mem, 1);
}
}
return 0;
}
static int i2d_ASN_OBJECT_TYPE(const void* obj, byte* buf,
const WOLFSSL_ASN1_ITEM* item)
{
const void ** obj_pp = &obj;
return wolfssl_i2d_asn1_items(obj_pp, buf, item->members, item->mcount);
}
static int wolfssl_asn1_item_encode(const void* obj, byte* buf,
const WOLFSSL_ASN1_ITEM* item)
{
int len;
switch (item->type) {
case WOLFSSL_ASN1_SEQUENCE:
len = i2d_ASN_SEQUENCE(obj, buf, item);
break;
case WOLFSSL_ASN1_OBJECT_TYPE:
len = i2d_ASN_OBJECT_TYPE(obj, buf, item);
break;
case WOLFSSL_ASN1_CHOICE:
len = i2d_ASN_CHOICE(obj, buf, item);
break;
default:
WOLFSSL_MSG("Type not supported in wolfSSL_ASN1_item_i2d");
len = 0;
}
return len;
}
int wolfSSL_ASN1_item_i2d(const void* obj, byte** dest,
const WOLFSSL_ASN1_ITEM* item)
{
int ret = 1;
int len = 0;
WOLFSSL_ENTER("wolfSSL_ASN1_item_i2d");
if ((obj == NULL) || (item == NULL)) {
ret = 0;
}
if ((ret == 1) && ((len = wolfssl_asn1_item_encode(obj, NULL, item)) == 0))
ret = 0;
if ((ret == 1) && (dest != NULL)) {
byte* buf = NULL;
if (*dest == NULL) {
buf = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_ASN1);
if (buf == NULL)
ret = 0;
}
else
buf = *dest;
if (ret == 1) {
len = wolfssl_asn1_item_encode(obj, buf, item);
if (len <= 0)
ret = 0;
}
if (ret == 1) {
if (*dest == NULL)
*dest = buf;
else
*dest += len;
}
if (ret == 0 && *dest == NULL)
XFREE(buf, NULL, DYNAMIC_TYPE_ASN1);
}
if (ret == 0) {
len = WOLFSSL_FATAL_ERROR;
}
WOLFSSL_LEAVE("wolfSSL_ASN1_item_i2d", len);
return len;
}
static void* d2i_obj(const WOLFSSL_ASN1_TEMPLATE* mem, const byte** src,
long* len)
{
void* ret;
const byte* tmp = *src;
ret = mem->d2i_func(NULL, &tmp, *len);
if (ret == NULL) {
WOLFSSL_MSG("d2i error");
return NULL;
}
if (tmp <= *src) {
WOLFSSL_MSG("ptr not advanced");
mem->free_func(ret);
return NULL;
}
*len -= (long)(tmp - *src);
*src = tmp;
return ret;
}
static void* d2i_generic_obj(const WOLFSSL_ASN1_TEMPLATE* mem, const byte** src,
long* len)
{
void* ret = NULL;
if (mem->sequence) {
long skl = 0;
int slen = 0;
WOLFSSL_STACK* sk = NULL;
word32 idx = 0;
const byte* tmp = *src;
if (GetSequence(tmp, &idx, &slen, (word32)*len) < 0)
goto error;
skl = (long)slen;
tmp += idx;
ret = sk = wolfSSL_sk_new_null();
while (skl > 0) {
void* new_obj = d2i_obj(mem, &tmp, &skl);
if (new_obj == NULL) {
WOLFSSL_MSG("d2i_obj failed");
goto error;
}
if (wolfSSL_sk_insert(sk, new_obj, -1) <= 0) {
mem->free_func(new_obj);
WOLFSSL_MSG("push failed");
goto error;
}
}
if (skl != 0) {
WOLFSSL_MSG("l not zero after sequence");
goto error;
}
*len -= (long)slen;
*src = tmp;
}
else {
ret = d2i_obj(mem, src, len);
}
return ret;
error:
asn1_free_tpl(ret, mem);
return NULL;
}
static int d2i_handle_tags(const WOLFSSL_ASN1_TEMPLATE* mem, const byte** src,
long* len, byte** impBuf, int* asnLen)
{
if (mem->tag >= 0) {
byte tag = 0;
word32 idx = 0;
if (mem->ex) {
if (GetASNTag(*src, &idx, &tag, (word32)*len) < 0 ||
(byte)(ASN_CONTEXT_SPECIFIC | ASN_CONSTRUCTED | mem->tag)
!= tag ||
GetLength(*src, &idx, asnLen, (word32)*len) < 0) {
WOLFSSL_MSG("asn tag error");
return WOLFSSL_FATAL_ERROR;
}
*len -= idx;
*src += idx;
}
else {
if (mem->first_byte == 0) {
WOLFSSL_MSG("first byte not set");
return WOLFSSL_FATAL_ERROR;
}
if (GetASNTag(*src, &idx, &tag, (word32)*len) < 0 ||
(byte)mem->tag != (tag & ASN_TYPE_MASK) ||
GetLength(*src, &idx, asnLen, (word32)*len) < 0) {
WOLFSSL_MSG("asn tag error");
return WOLFSSL_FATAL_ERROR;
}
*asnLen += idx;
*impBuf = (byte*)XMALLOC(*asnLen, NULL,
DYNAMIC_TYPE_TMP_BUFFER);
if (*impBuf == NULL) {
WOLFSSL_MSG("malloc error");
return WOLFSSL_FATAL_ERROR;
}
XMEMCPY(*impBuf, *src, *asnLen);
(*impBuf)[0] = mem->first_byte;
}
}
return 0;
}
static void* d2i_generic(const WOLFSSL_ASN1_TEMPLATE* mem,
const byte** src, long* len)
{
int asnLen = -1;
const byte *tmp = NULL;
void* ret = NULL;
byte* impBuf = NULL;
long l;
if (*len <= 0) {
WOLFSSL_MSG("buffer too short");
return NULL;
}
if (d2i_handle_tags(mem, src, len, &impBuf, &asnLen) != 0) {
WOLFSSL_MSG("tags error");
goto error;
}
if (impBuf != NULL)
tmp = impBuf;
else
tmp = *src;
l = (long)(asnLen >= 0 ? asnLen : *len);
ret = d2i_generic_obj(mem, &tmp, &l);
if (l < 0) {
WOLFSSL_MSG("ptr advanced too far");
goto error;
}
if (impBuf != NULL) {
tmp = *src + (tmp - impBuf);
XFREE(impBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
impBuf = NULL;
}
if (asnLen >= 0 && (int)(tmp - *src) != asnLen) {
WOLFSSL_MSG("ptr not advanced enough");
goto error;
}
*len -= (long)(tmp - *src);
*src = tmp;
return ret;
error:
asn1_free_tpl(ret, mem);
if (impBuf != NULL)
XFREE(impBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
return NULL;
}
static int d2i_ASN_SEQUENCE(void* obj, const byte **src, long len,
const WOLFSSL_ASN1_ITEM* item)
{
const WOLFSSL_ASN1_TEMPLATE* mem = NULL;
int err;
word32 idx = 0;
int slen = 0;
size_t i;
const byte* s = *src;
err = GetSequence(s, &idx, &slen, (word32)len);
if (err <= 0) {
WOLFSSL_MSG("GetSequence error");
return WOLFSSL_FATAL_ERROR;
}
s += idx;
len -= idx;
for (mem = item->members, i = 0; i < item->mcount; mem++, i++) {
asn1Mem(obj, mem->offset) = d2i_generic(mem, &s, &len);
if (asn1Mem(obj, mem->offset) == NULL) {
WOLFSSL_MSG("d2i error");
return WOLFSSL_FATAL_ERROR;
}
}
*src = s;
return 0;
}
static int d2i_ASN_CHOICE(void* obj, const byte **src, long len,
const WOLFSSL_ASN1_ITEM* item)
{
const WOLFSSL_ASN1_TEMPLATE* mem = NULL;
size_t i;
for (mem = item->members, i = 0; i < item->mcount; mem++, i++) {
asn1Mem(obj, mem->offset) = d2i_generic(mem, src, &len);
if (asn1Mem(obj, mem->offset) != NULL) {
asn1Type(obj, item->toffset) = mem->tag;
return 0;
}
}
WOLFSSL_MSG("der does not decode with any CHOICE");
return WOLFSSL_FATAL_ERROR;
}
static void* d2i_ASN_OBJECT_TYPE(const byte **src, long len,
const WOLFSSL_ASN1_ITEM* item)
{
return d2i_generic(item->members, src, &len);
}
void* wolfSSL_ASN1_item_d2i(void** dst, const byte **src, long len,
const WOLFSSL_ASN1_ITEM* item)
{
void* obj = NULL;
int err = 0;
const byte *tmp;
WOLFSSL_ENTER("wolfSSL_ASN1_item_d2i");
if (src == NULL || *src == NULL || len <= 0 || item == NULL) {
WOLFSSL_LEAVE("wolfSSL_ASN1_item_d2i", 0);
return NULL;
}
tmp = *src;
switch (item->type) {
case WOLFSSL_ASN1_SEQUENCE:
case WOLFSSL_ASN1_CHOICE:
obj = asn1_item_alloc(item);
if (obj == NULL)
return NULL;
break;
case WOLFSSL_ASN1_OBJECT_TYPE:
break;
default:
WOLFSSL_MSG("Type not supported in wolfSSL_ASN1_item_d2i");
return NULL;
}
switch (item->type) {
case WOLFSSL_ASN1_SEQUENCE:
err = d2i_ASN_SEQUENCE(obj, &tmp, len, item);
break;
case WOLFSSL_ASN1_CHOICE:
err = d2i_ASN_CHOICE(obj, &tmp, len, item);
break;
case WOLFSSL_ASN1_OBJECT_TYPE:
obj = d2i_ASN_OBJECT_TYPE(&tmp, len, item);
if (obj == NULL)
err = WOLFSSL_FATAL_ERROR;
break;
default:
WOLFSSL_MSG("Type not supported in wolfSSL_ASN1_item_d2i");
err = WOLFSSL_FATAL_ERROR;
break;
}
if (err == 0)
*src = tmp;
else {
wolfSSL_ASN1_item_free(obj, item);
obj = NULL;
}
if (dst != NULL && obj != NULL) {
if (*dst != NULL)
wolfSSL_ASN1_item_free(*dst, item);
*dst = obj;
}
WOLFSSL_LEAVE("wolfSSL_ASN1_item_d2i", obj != NULL);
return obj;
}
#endif
#endif
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL) || \
defined(WOLFSSL_WPAS_SMALL)
WOLFSSL_ASN1_BIT_STRING* wolfSSL_ASN1_BIT_STRING_new(void)
{
WOLFSSL_ASN1_BIT_STRING* bitStr;
bitStr = (WOLFSSL_ASN1_BIT_STRING*)XMALLOC(sizeof(WOLFSSL_ASN1_BIT_STRING),
NULL, DYNAMIC_TYPE_OPENSSL);
if (bitStr) {
XMEMSET(bitStr, 0, sizeof(WOLFSSL_ASN1_BIT_STRING));
}
return bitStr;
}
void wolfSSL_ASN1_BIT_STRING_free(WOLFSSL_ASN1_BIT_STRING* bitStr)
{
if (bitStr != NULL) {
XFREE(bitStr->data, NULL, DYNAMIC_TYPE_OPENSSL);
}
XFREE(bitStr, NULL, DYNAMIC_TYPE_OPENSSL);
}
int wolfSSL_ASN1_BIT_STRING_get_bit(const WOLFSSL_ASN1_BIT_STRING* bitStr,
int i)
{
int bit = 0;
if ((bitStr != NULL) && (bitStr->data != NULL) && (i >= 0) &&
(bitStr->length > (i / 8))) {
bit = (bitStr->data[i / 8] & (1 << (7 - (i % 8)))) ? 1 : 0;
}
return bit;
}
static int wolfssl_asn1_bit_string_grow(WOLFSSL_ASN1_BIT_STRING* bitStr,
int len)
{
int ret = 1;
byte* tmp;
#ifdef WOLFSSL_NO_REALLOC
tmp = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_OPENSSL);
if (tmp != NULL && bitStr->data != NULL) {
XMEMCPY(tmp, bitStr->data, bitStr->length);
XFREE(bitStr->data, NULL, DYNAMIC_TYPE_OPENSSL);
bitStr->data = NULL;
}
#else
tmp = (byte*)XREALLOC(bitStr->data, (size_t)len, NULL,
DYNAMIC_TYPE_OPENSSL);
#endif
if (tmp == NULL) {
ret = 0;
}
else {
if (len > bitStr->length)
XMEMSET(tmp + bitStr->length, 0, (size_t)(len - bitStr->length));
bitStr->data = tmp;
bitStr->length = len;
}
return ret;
}
int wolfSSL_ASN1_BIT_STRING_set_bit(WOLFSSL_ASN1_BIT_STRING* bitStr, int idx,
int val)
{
int ret = 1;
int i = 0;
if ((bitStr == NULL) || (idx < 0) || ((val != 0) && (val != 1))) {
ret = 0;
}
if (ret == 1) {
i = idx / 8;
if ((i >= bitStr->length) && (val != 0)) {
ret = wolfssl_asn1_bit_string_grow(bitStr, i + 1);
}
}
if ((ret == 1) && (i < bitStr->length)) {
byte bit = 1 << (7 - (idx % 8));
bitStr->data[i] &= ~bit;
bitStr->data[i] |= bit & (byte)(0 - val);
}
return ret;
}
int wolfSSL_i2d_ASN1_BIT_STRING(const WOLFSSL_ASN1_BIT_STRING* bstr,
unsigned char** pp)
{
int len;
unsigned char* buf;
if (bstr == NULL || (bstr->data == NULL && bstr->length != 0))
return WOLFSSL_FATAL_ERROR;
len = (int)SetBitString((word32)bstr->length, 0, NULL) + bstr->length;
if (pp != NULL) {
word32 idx;
if (*pp != NULL)
buf = *pp;
else {
buf = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_ASN1);
if (buf == NULL)
return WOLFSSL_FATAL_ERROR;
}
idx = SetBitString((word32)bstr->length, 0, buf);
if (bstr->length > 0)
XMEMCPY(buf + idx, bstr->data, (size_t)bstr->length);
if (*pp != NULL)
*pp += len;
else
*pp = buf;
}
return len;
}
WOLFSSL_ASN1_BIT_STRING* wolfSSL_d2i_ASN1_BIT_STRING(
WOLFSSL_ASN1_BIT_STRING** out, const byte** src, long len)
{
WOLFSSL_ASN1_BIT_STRING* ret = NULL;
#ifdef WOLFSSL_ASN_TEMPLATE
word32 idx = 0;
byte tag = 0;
int length = 0;
WOLFSSL_ENTER("wolfSSL_d2i_ASN1_BIT_STRING");
if (src == NULL || *src == NULL || len == 0)
return NULL;
if (GetASNTag(*src, &idx, &tag, (word32)len) < 0)
return NULL;
if (tag != ASN_BIT_STRING)
return NULL;
if (GetLength(*src, &idx, &length, (word32)len) < 0)
return NULL;
if (GetASN_BitString(*src, idx, length) != 0)
return NULL;
idx++;
length--;
ret = wolfSSL_ASN1_BIT_STRING_new();
if (ret == NULL)
return NULL;
if (wolfssl_asn1_bit_string_grow(ret, length) != 1) {
wolfSSL_ASN1_BIT_STRING_free(ret);
return NULL;
}
XMEMCPY(ret->data, *src + idx, length);
*src += idx + (word32)length;
if (out != NULL) {
if (*out != NULL)
wolfSSL_ASN1_BIT_STRING_free(*out);
*out = ret;
}
#else
WOLFSSL_MSG("d2i_ASN1_BIT_STRING needs --enable-asn=template");
(void)out;
(void)src;
(void)len;
#endif
return ret;
}
#endif
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
WOLFSSL_ASN1_INTEGER* wolfSSL_ASN1_INTEGER_new(void)
{
WOLFSSL_ASN1_INTEGER* a;
a = (WOLFSSL_ASN1_INTEGER*)XMALLOC(sizeof(WOLFSSL_ASN1_INTEGER), NULL,
DYNAMIC_TYPE_OPENSSL);
if (a != NULL) {
XMEMSET(a, 0, sizeof(WOLFSSL_ASN1_INTEGER));
a->data = a->intData;
a->isDynamic = 0;
a->dataMax = WOLFSSL_ASN1_INTEGER_MAX;
a->length = 0;
}
return a;
}
void wolfSSL_ASN1_INTEGER_free(WOLFSSL_ASN1_INTEGER* in)
{
if ((in != NULL) && (in->isDynamic)) {
XFREE(in->data, NULL, DYNAMIC_TYPE_OPENSSL);
}
XFREE(in, NULL, DYNAMIC_TYPE_OPENSSL);
}
int wolfSSL_ASN1_INTEGER_get_length(const WOLFSSL_ASN1_INTEGER* ai)
{
if (ai == NULL || ai->data == NULL || ai->length <= 0) {
return 0;
}
if (ai->data[0] == ASN_INTEGER) {
word32 idx = 1;
int len = 0;
if (GetLength(ai->data, &idx, &len, (word32)ai->length) >= 0 &&
idx + (word32)len == (word32)ai->length) {
return len;
}
}
return ai->length;
}
const unsigned char* wolfSSL_ASN1_INTEGER_get0_data(const WOLFSSL_ASN1_INTEGER* ai)
{
if (ai == NULL || ai->data == NULL || ai->length <= 0) {
return NULL;
}
if (ai->data[0] == ASN_INTEGER) {
word32 idx = 1;
int len = 0;
if (GetLength(ai->data, &idx, &len, (word32)ai->length) >= 0 &&
idx + (word32)len == (word32)ai->length) {
return ai->data + idx;
}
}
return ai->data;
}
#if defined(OPENSSL_EXTRA)
static void wolfssl_asn1_integer_reset_data(WOLFSSL_ASN1_INTEGER* a)
{
if (a->isDynamic) {
unsigned char* data = a->data;
a->isDynamic = 0;
a->data = a->intData;
a->dataMax = (unsigned int)sizeof(a->intData);
XFREE(data, NULL, DYNAMIC_TYPE_OPENSSL);
}
XMEMSET(a->intData, 0, sizeof(a->intData));
a->length = 0;
a->negative = 0;
a->type = WOLFSSL_V_ASN1_INTEGER;
}
#endif
static int wolfssl_asn1_integer_require_len(WOLFSSL_ASN1_INTEGER* a, int len,
int keepOldData)
{
int ret = 1;
byte* data;
byte* oldData = a->intData;
if (a->isDynamic && (len > (int)a->dataMax)) {
oldData = a->data;
a->isDynamic = 0;
a->data = a->intData;
a->dataMax = (unsigned int)sizeof(a->intData);
}
if ((!a->isDynamic) && (len > (int)a->dataMax)) {
data = (byte*)XMALLOC((size_t)len, NULL, DYNAMIC_TYPE_OPENSSL);
if (data == NULL) {
ret = 0;
}
else {
a->isDynamic = 1;
a->data = data;
a->dataMax = (word32)len;
}
}
if (keepOldData) {
if (oldData != a->data) {
XMEMCPY(a->data, oldData, (size_t)a->length);
}
} else {
a->length = 0;
}
if (oldData != a->intData) {
XFREE(oldData, NULL, DYNAMIC_TYPE_OPENSSL);
}
return ret;
}
WOLFSSL_ASN1_INTEGER* wolfSSL_ASN1_INTEGER_dup(const WOLFSSL_ASN1_INTEGER* src)
{
WOLFSSL_ASN1_INTEGER* dst = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_INTEGER_dup");
if (src != NULL) {
dst = wolfSSL_ASN1_INTEGER_new();
}
if (dst != NULL) {
dst->length = src->length;
dst->negative = src->negative;
dst->type = src->type;
if (!src->isDynamic) {
XMEMCPY(dst->intData, src->intData, WOLFSSL_ASN1_INTEGER_MAX);
}
else if (wolfssl_asn1_integer_require_len(dst, src->length, 0) == 0) {
wolfSSL_ASN1_INTEGER_free(dst);
dst = NULL;
}
else {
XMEMCPY(dst->data, src->data, (size_t)src->length);
}
}
return dst;
}
#endif
#if defined(OPENSSL_EXTRA)
int wolfSSL_ASN1_INTEGER_cmp(const WOLFSSL_ASN1_INTEGER* a,
const WOLFSSL_ASN1_INTEGER* b)
{
int ret = 0;
WOLFSSL_ENTER("wolfSSL_ASN1_INTEGER_cmp");
if ((a == NULL) || (b == NULL)) {
WOLFSSL_MSG("Bad parameter.");
ret = WOLFSSL_FATAL_ERROR;
}
else if (a->negative && !b->negative) {
ret = -2;
}
else if (!a->negative && b->negative) {
ret = 1;
}
else {
if (a->length != b->length) {
ret = a->length - b->length;
}
else {
ret = XMEMCMP(a->data, b->data, (size_t)a->length);
}
if (a->negative) {
ret = -ret;
}
}
WOLFSSL_LEAVE("wolfSSL_ASN1_INTEGER_cmp", ret);
return ret;
}
static void wolfssl_twos_compl(byte* data, int length)
{
int i;
for (i = 0; i < length; ++i) {
data[i] = ~data[i];
}
for (i = length - 1; (++data[i]) == 0; --i) {
}
}
static int wolfssl_asn1_int_twos_compl(byte* data, int length, byte* neg)
{
int ret = 0;
word32 idx = 1;
int len;
if (GetLength(data, &idx, &len, (word32)length) < 0) {
ret = WOLFSSL_FATAL_ERROR;
}
else {
if (neg != NULL) {
*neg = data[idx] & 0x80;
}
if ((neg == NULL) || (*neg != 0)) {
wolfssl_twos_compl(data + idx, length - (int)idx);
}
}
return ret;
}
int wolfSSL_i2d_ASN1_INTEGER(const WOLFSSL_ASN1_INTEGER* a, unsigned char** pp)
{
WOLFSSL_ENTER("wolfSSL_i2d_ASN1_INTEGER");
if (a == NULL || a->data == NULL || a->length <= 0) {
WOLFSSL_MSG("Bad parameter.");
return WOLFSSL_FATAL_ERROR;
}
if (pp != NULL) {
byte* buf;
if (*pp != NULL)
buf = *pp;
else {
buf = (byte*)XMALLOC((size_t)a->length, NULL, DYNAMIC_TYPE_ASN1);
if (buf == NULL)
return WOLFSSL_FATAL_ERROR;
}
XMEMCPY(buf, a->data, (size_t)a->length);
if (a->negative &&
wolfssl_asn1_int_twos_compl(buf, a->length, NULL) != 0) {
if (*pp == NULL)
XFREE(buf, NULL, DYNAMIC_TYPE_ASN1);
return WOLFSSL_FATAL_ERROR;
}
if (*pp != NULL)
*pp += a->length;
else
*pp = buf;
}
return a->length;
}
WOLFSSL_ASN1_INTEGER* wolfSSL_d2i_ASN1_INTEGER(WOLFSSL_ASN1_INTEGER** a,
const unsigned char** in, long inSz)
{
WOLFSSL_ASN1_INTEGER* ret = NULL;
int err = 0;
word32 idx = 1;
int len = 0;
WOLFSSL_ENTER("wolfSSL_d2i_ASN1_INTEGER");
if ((in == NULL) || (*in == NULL) || (inSz <= 2)) {
WOLFSSL_MSG("Bad parameter");
err = 1;
}
if ((!err) && (*in)[0] != ASN_INTEGER) {
WOLFSSL_MSG("Tag doesn't indicate integer type.");
err = 1;
}
if ((!err) && (GetLength(*in, &idx, &len, (word32)inSz) <= 0)) {
WOLFSSL_MSG("ASN.1 length not valid.");
err = 1;
}
if ((!err) && ((ret = wolfSSL_ASN1_INTEGER_new()) == NULL)) {
err = 1;
}
if ((!err) && (wolfssl_asn1_integer_require_len(ret, (int)idx + len, 0) !=
1)) {
err = 1;
}
if (!err) {
ret->type = WOLFSSL_V_ASN1_INTEGER;
XMEMCPY(ret->data, *in, (size_t)(idx + (word32)len));
ret->length = (int)idx + len;
if (wolfssl_asn1_int_twos_compl(ret->data, ret->length, &ret->negative)
!= 0) {
err = 1;
}
}
if ((!err) && ret->negative) {
ret->type |= WOLFSSL_V_ASN1_NEG_INTEGER;
}
if (err) {
wolfSSL_ASN1_INTEGER_free(ret);
ret = NULL;
}
else {
if (a != NULL) {
*a = ret;
}
*in += ret->length;
}
return ret;
}
#ifndef NO_BIO
static int wolfssl_a2i_asn1_integer_clear_to_eol(char* str, int len, int* cont)
{
byte num;
word32 nLen;
int i;
while ((len > 0) && ((str[len - 1] == '\n') || (str[len - 1] == '\r'))) {
len--;
}
if ((len > 0) && (str[len - 1] == '\\')) {
*cont = 1;
len--;
}
else {
*cont = 0;
}
nLen = 1;
for (i = 0; i < len; i++) {
if (Base16_Decode((const byte*)str + i, 1, &num, &nLen) ==
WC_NO_ERR_TRACE(ASN_INPUT_E))
{
len = i;
break;
}
}
return len;
}
int wolfSSL_a2i_ASN1_INTEGER(WOLFSSL_BIO *bio, WOLFSSL_ASN1_INTEGER *asn1,
char *buf, int size)
{
int ret = 1;
int readNextLine = 1;
int len;
word32 outLen = 0;
const int hdrSz = 1 + MAX_LENGTH_SZ;
WOLFSSL_ENTER("wolfSSL_a2i_ASN1_INTEGER");
if ((bio == NULL) || (asn1 == NULL) || (buf == NULL) || (size <= 0)) {
WOLFSSL_MSG("Bad parameter");
ret = 0;
}
while ((ret == 1) && readNextLine) {
int lineLen;
readNextLine = 0;
lineLen = wolfSSL_BIO_gets(bio, buf, size);
if (lineLen <= 0) {
WOLFSSL_MSG("wolfSSL_BIO_gets error");
ret = 0;
}
if (ret == 1) {
lineLen = wolfssl_a2i_asn1_integer_clear_to_eol(buf, lineLen,
&readNextLine);
if ((lineLen == 0) || ((lineLen % 2) != 0)) {
WOLFSSL_MSG("Invalid line length");
ret = 0;
}
}
if (ret == 1) {
len = asn1->length + (lineLen / 2);
if (wolfssl_asn1_integer_require_len(asn1, len + hdrSz, outLen != 0)
!= 1) {
ret = 0;
}
}
if (ret == 1) {
outLen = (word32)(lineLen / 2);
(void)Base16_Decode((byte*)buf, (word32)lineLen,
asn1->data + asn1->length, &outLen);
asn1->length += (int)outLen;
}
}
if (ret == 1) {
int idx;
idx = SetASNInt(asn1->length, asn1->data[0], NULL);
XMEMMOVE(asn1->data + idx, asn1->data, (size_t)asn1->length);
SetASNInt(asn1->length, asn1->data[idx], asn1->data);
asn1->length += idx;
}
return ret;
}
int wolfSSL_i2a_ASN1_INTEGER(WOLFSSL_BIO *bp, const WOLFSSL_ASN1_INTEGER *a)
{
int err = 0;
word32 idx = 1;
int len = 0;
byte buf[WOLFSSL_ASN1_INTEGER_MAX * 2 + 1];
word32 bufLen;
WOLFSSL_ENTER("wolfSSL_i2a_ASN1_INTEGER");
if ((bp == NULL) || (a == NULL)) {
err = 1;
}
if (!err) {
if (GetLength(a->data, &idx, &len, (word32)a->length) <= 0) {
err = 1;
}
}
while ((!err) && (idx < (word32)a->length)) {
int encLen = a->length - (int)idx;
if (encLen > (int)sizeof(buf) / 2) {
encLen = (int)sizeof(buf) / 2;
}
bufLen = (int)sizeof(buf);
(void)Base16_Encode(a->data + idx, (word32)encLen, buf, &bufLen);
idx += (word32)encLen;
if (wolfSSL_BIO_write(bp, buf, (int)bufLen - 1) != (int)(bufLen - 1)) {
err = 1;
}
}
if (err) {
len = 0;
}
return len * 2;
}
#endif
#ifndef NO_ASN
static void wolfssl_asn1_integer_pad(unsigned char* data, int len,
unsigned char* neg, char* pad, unsigned char* padVal)
{
if (len == 0) {
*pad = 1;
*padVal = 0x00;
*neg = 0;
}
else {
unsigned char firstByte = data[0];
if ((len == 1) && (firstByte == 0x00)) {
*neg = 0;
}
if ((!*neg) && (firstByte >= 0x80)) {
*pad = 1;
*padVal = 0x00;
}
else if (*neg && (firstByte > 0x80)) {
*pad = 1;
*padVal = 0xff;
}
else if (*neg && (firstByte == 0x80)) {
int i;
for (i = 1; i < len; i++) {
if (data[i] != 0x00) {
*pad = 1;
*padVal = 0xff;
break;
}
}
}
}
}
int wolfSSL_i2c_ASN1_INTEGER(WOLFSSL_ASN1_INTEGER *a, unsigned char **pp)
{
int err = 0;
int len = 0;
char pad = 0;
unsigned char padVal = 0;
word32 idx = 1;
WOLFSSL_ENTER("wolfSSL_i2c_ASN1_INTEGER");
if ((a == NULL) || ((pp != NULL) && (*pp == NULL))) {
err = 1;
}
if ((!err) && (GetLength_ex(a->data, &idx, &len, a->dataMax, 0) < 0)) {
err = 1;
}
if (!err) {
wolfssl_asn1_integer_pad(a->data + idx, len, &a->negative, &pad,
&padVal);
len += (int)pad;
}
if ((!err) && (pp != NULL)) {
if (pad) {
(*pp)[0] = padVal;
}
XMEMCPY(*pp + pad, a->data + idx, (size_t)(len - pad));
if (a->negative) {
wolfssl_twos_compl(*pp + pad, len - pad);
}
*pp += len;
}
return len;
}
WOLFSSL_BIGNUM *wolfSSL_ASN1_INTEGER_to_BN(const WOLFSSL_ASN1_INTEGER *ai,
WOLFSSL_BIGNUM *bn)
{
int err = 0;
word32 idx = 1;
int len = 0;
WOLFSSL_BIGNUM* ret = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_INTEGER_to_BN");
if (ai == NULL) {
err = 1;
}
if (!err) {
if ((ai->data[0] != ASN_INTEGER) || (GetLength(ai->data, &idx, &len,
(word32)ai->length) <= 0)) {
#if defined(WOLFSSL_QT) || defined(WOLFSSL_HAPROXY)
idx = 0;
len = ai->length;
#else
WOLFSSL_MSG("Data in WOLFSSL_ASN1_INTEGER not DER encoded");
err = 1;
#endif
}
}
if (!err) {
ret = wolfSSL_BN_bin2bn(ai->data + idx, len, bn);
if (ret != NULL) {
(void)wolfssl_bn_set_neg(ret, ai->negative);
}
}
return ret;
}
#endif
WOLFSSL_ASN1_INTEGER* wolfSSL_BN_to_ASN1_INTEGER(const WOLFSSL_BIGNUM *bn,
WOLFSSL_ASN1_INTEGER *ai)
{
int err = 0;
WOLFSSL_ASN1_INTEGER* a = NULL;
int len = 0;
int numBits = 0;
byte firstByte = 0;
WOLFSSL_ENTER("wolfSSL_BN_to_ASN1_INTEGER");
if (bn == NULL) {
err = 1;
}
else if (ai != NULL) {
a = ai;
}
else {
a = wolfSSL_ASN1_INTEGER_new();
if (a == NULL) {
err = 1;
}
}
if (!err) {
int length;
a->type = WOLFSSL_V_ASN1_INTEGER;
if (wolfSSL_BN_is_negative(bn) && !wolfSSL_BN_is_zero(bn)) {
a->negative = 1;
a->type |= WOLFSSL_V_ASN1_NEG_INTEGER;
}
len = wolfSSL_BN_num_bytes(bn);
if (len == 0) {
len = 1;
}
numBits = wolfSSL_BN_num_bits(bn);
if ((numBits > 0) && (numBits % 8) == 0) {
firstByte = 0x80;
}
length = SetASNInt(len, firstByte, NULL);
length += len;
if (wolfssl_asn1_integer_require_len(a, length, 0) != 1) {
err = 1;
}
}
if (!err) {
int idx = SetASNInt(len, firstByte, a->data);
if (numBits == 0) {
a->data[idx] = 0;
}
else {
len = wolfSSL_BN_bn2bin(bn, a->data + idx);
if (len < 0) {
err = 1;
}
}
a->length = idx + len;
}
if (err) {
if (a != ai) {
wolfSSL_ASN1_INTEGER_free(a);
}
a = NULL;
}
return a;
}
long wolfSSL_ASN1_INTEGER_get(const WOLFSSL_ASN1_INTEGER* a)
{
long ret = 1;
WOLFSSL_BIGNUM* bn = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_INTEGER_get");
if (a == NULL) {
ret = 0;
}
if (ret > 0) {
bn = wolfSSL_ASN1_INTEGER_to_BN(a, NULL);
if (bn == NULL) {
ret = WOLFSSL_FATAL_ERROR;
}
}
if (ret > 0) {
ret = (long)wolfSSL_BN_get_word(bn);
if (a->negative == 1) {
ret = -ret;
}
}
if (bn != NULL) {
wolfSSL_BN_free(bn);
}
WOLFSSL_LEAVE("wolfSSL_ASN1_INTEGER_get", (int)ret);
return ret;
}
int wolfSSL_ASN1_INTEGER_set(WOLFSSL_ASN1_INTEGER *a, long v)
{
int ret = 1;
if (a == NULL) {
ret = 0;
}
if (ret == 1) {
byte j;
unsigned int i = 0;
byte tmp[sizeof(long)];
byte pad = 0;
wolfssl_asn1_integer_reset_data(a);
if (v < 0) {
a->negative = 1;
a->type |= WOLFSSL_V_ASN1_NEG;
v = -v;
}
tmp[0] = (byte)(v & 0xff);
v >>= 8;
for (j = 1; j < (byte)sizeof(long); j++) {
if (v == 0) {
break;
}
tmp[j] = (byte)(v & 0xff);
v >>= 8;
}
if ((!a->negative) && (tmp[j-1] & 0x80)) {
pad = 1;
}
a->data[i++] = ASN_INTEGER;
a->data[i++] = pad + j;
a->length = 2 + pad + j;
if (pad == 1) {
a->data[i++] = 0;
}
for (; j > 0; j--) {
a->data[i++] = tmp[j-1];
}
}
return ret;
}
#endif
#if !defined(NO_ASN)
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
WOLFSSL_ASN1_OBJECT* wolfSSL_ASN1_OBJECT_new(void)
{
WOLFSSL_ASN1_OBJECT* obj;
obj = (WOLFSSL_ASN1_OBJECT*)XMALLOC(sizeof(WOLFSSL_ASN1_OBJECT), NULL,
DYNAMIC_TYPE_ASN1);
if (obj != NULL) {
XMEMSET(obj, 0, sizeof(WOLFSSL_ASN1_OBJECT));
obj->d.ia5 = &(obj->d.ia5_internal);
#if defined(OPENSSL_ALL)
obj->d.iPAddress = &(obj->d.iPAddress_internal);
#endif
obj->dynamic |= WOLFSSL_ASN1_DYNAMIC;
}
return obj;
}
void wolfSSL_ASN1_OBJECT_free(WOLFSSL_ASN1_OBJECT* obj)
{
if (obj != NULL) {
if ((obj->dynamic & WOLFSSL_ASN1_DYNAMIC_DATA) != 0) {
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_MSG("Freeing ASN1 data");
#endif
XFREE((void*)obj->obj, obj->heap, DYNAMIC_TYPE_ASN1);
obj->obj = NULL;
}
#if defined(OPENSSL_EXTRA)
if (obj->pathlen != NULL) {
wolfSSL_ASN1_INTEGER_free(obj->pathlen);
obj->pathlen = NULL;
}
#endif
if ((obj->dynamic & WOLFSSL_ASN1_DYNAMIC) != 0) {
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_MSG("Freeing ASN1 OBJECT");
#endif
XFREE(obj, NULL, DYNAMIC_TYPE_ASN1);
}
}
}
WOLFSSL_ASN1_OBJECT* wolfSSL_ASN1_OBJECT_dup(WOLFSSL_ASN1_OBJECT* obj)
{
WOLFSSL_ASN1_OBJECT* dupl = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_OBJECT_dup");
if (obj == NULL) {
WOLFSSL_MSG("Bad parameter");
}
else if ((dupl = wolfSSL_ASN1_OBJECT_new()) == NULL) {
WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new error");
}
if (dupl != NULL) {
XMEMCPY(dupl->sName, obj->sName, WOLFSSL_MAX_SNAME);
dupl->type = obj->type;
dupl->grp = obj->grp;
dupl->nid = obj->nid;
dupl->objSz = obj->objSz;
#ifdef OPENSSL_EXTRA
dupl->ca = obj->ca;
if (obj->pathlen != NULL) {
dupl->pathlen = wolfSSL_ASN1_INTEGER_dup(obj->pathlen);
if (dupl->pathlen == NULL) {
WOLFSSL_MSG("ASN1 pathlen alloc error");
wolfSSL_ASN1_OBJECT_free(dupl);
dupl = NULL;
}
}
#endif
if (dupl != NULL && obj->obj) {
dupl->obj = (const unsigned char*)XMALLOC(obj->objSz, NULL,
DYNAMIC_TYPE_ASN1);
if (dupl->obj == NULL) {
WOLFSSL_MSG("ASN1 obj malloc error");
wolfSSL_ASN1_OBJECT_free(dupl);
dupl = NULL;
}
else {
dupl->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
XMEMCPY((byte*)dupl->obj, obj->obj, obj->objSz);
}
}
}
return dupl;
}
#endif
#endif
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
int wolfSSL_ASN1_get_object(const unsigned char **in, long *len, int *tag,
int *cls, long inLen)
{
int err = 0;
word32 inOutIdx = 0;
int l = 0;
byte t = 0;
int ret = 0x80;
WOLFSSL_ENTER("wolfSSL_ASN1_get_object");
if ((in == NULL) || (*in == NULL) || (len == NULL) || (tag == NULL) ||
(cls == NULL) || (inLen <= 0)) {
WOLFSSL_MSG("Bad parameter");
err = 1;
}
if (!err) {
err = GetASNTag(*in, &inOutIdx, &t, (word32)inLen);
if (!err){
if (GetLength_ex(*in, &inOutIdx, &l, (word32)inLen, 0) < 0) {
WOLFSSL_MSG("GetLength error");
err = 1;
}
}
}
if (!err) {
*tag = t & ASN_TYPE_MASK;
*cls = t & ASN_CLASS_MASK;
*len = l;
ret = t & ASN_CONSTRUCTED;
if (l > (int)(inLen - inOutIdx)) {
ret |= 0x80;
}
*in += inOutIdx;
}
return ret;
}
int wolfssl_asn1_obj_set(WOLFSSL_ASN1_OBJECT* obj, const byte* der, word32 len,
int addHdr)
{
word32 idx = 0;
if (obj == NULL || der == NULL || len == 0)
return WOLFSSL_FAILURE;
if (addHdr)
idx = SetHeader(ASN_OBJECT_ID, (word32)len, NULL, 0);
if (obj->obj != NULL) {
XFREE((void*)obj->obj, obj->heap, DYNAMIC_TYPE_ASN1);
obj->obj = NULL;
obj->dynamic &= ~WOLFSSL_ASN1_DYNAMIC_DATA;
}
obj->obj =(unsigned char*)XMALLOC(idx + len, obj->heap, DYNAMIC_TYPE_ASN1);
if (obj->obj == NULL)
return WOLFSSL_FAILURE;
if (addHdr)
SetHeader(ASN_OBJECT_ID, (word32)len, (byte*)obj->obj, 0);
XMEMCPY((byte*)obj->obj + idx, der, len);
obj->objSz = (unsigned int)(idx + len);
obj->dynamic |= WOLFSSL_ASN1_DYNAMIC_DATA;
return WOLFSSL_SUCCESS;
}
WOLFSSL_ASN1_OBJECT *wolfSSL_d2i_ASN1_OBJECT(WOLFSSL_ASN1_OBJECT **a,
const unsigned char **der, long length)
{
WOLFSSL_ASN1_OBJECT* ret = NULL;
int len = 0;
word32 idx = 0;
WOLFSSL_ENTER("wolfSSL_d2i_ASN1_OBJECT");
if ((der == NULL) || (*der == NULL) || (length <= 0)) {
WOLFSSL_MSG("Bad parameter");
return NULL;
}
if (GetASNHeader(*der, ASN_OBJECT_ID, &idx, &len, (word32)length) < 0) {
WOLFSSL_MSG("error getting tag");
return NULL;
}
if (len <= 0) {
WOLFSSL_MSG("zero length");
return NULL;
}
ret = wolfSSL_ASN1_OBJECT_new();
if (ret == NULL) {
WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new error");
return NULL;
}
if (wolfssl_asn1_obj_set(ret, *der, idx + len, 0) != WOLFSSL_SUCCESS) {
wolfSSL_ASN1_OBJECT_free(ret);
return NULL;
}
*der += idx + len;
if (a != NULL) {
if (*a != NULL)
wolfSSL_ASN1_OBJECT_free(*a);
*a = ret;
}
return ret;
}
int wolfSSL_i2d_ASN1_OBJECT(WOLFSSL_ASN1_OBJECT *a, unsigned char **pp)
{
int len = 0;
WOLFSSL_ENTER("wolfSSL_i2d_ASN1_OBJECT");
if ((a == NULL) || (a->obj == NULL)) {
WOLFSSL_MSG("Bad parameters");
}
else if (pp == NULL) {
len = (int)a->objSz;
}
else {
byte *p = NULL;
if (*pp == NULL) {
p = (byte*)XMALLOC(a->objSz, NULL, DYNAMIC_TYPE_OPENSSL);
if (p == NULL) {
WOLFSSL_MSG("Bad malloc");
}
else {
*pp = p;
}
}
if (*pp != NULL) {
XMEMCPY(*pp, a->obj, a->objSz);
if (p == NULL) {
*pp += a->objSz;
}
len = (int)a->objSz;
}
}
return len;
}
WOLFSSL_ASN1_OBJECT *wolfSSL_c2i_ASN1_OBJECT(WOLFSSL_ASN1_OBJECT **a,
const unsigned char **pp, long len)
{
WOLFSSL_ASN1_OBJECT* ret = NULL;
WOLFSSL_ENTER("wolfSSL_c2i_ASN1_OBJECT");
if ((pp == NULL) || (*pp == NULL) || (len <= 0)) {
WOLFSSL_MSG("Bad parameter");
return NULL;
}
ret = wolfSSL_ASN1_OBJECT_new();
if (ret == NULL) {
WOLFSSL_MSG("wolfSSL_ASN1_OBJECT_new error");
return NULL;
}
if (wolfssl_asn1_obj_set(ret, *pp, (word32)len, 1) != WOLFSSL_SUCCESS) {
WOLFSSL_MSG("wolfssl_asn1_obj_set error");
wolfSSL_ASN1_OBJECT_free(ret);
return NULL;
}
*pp += len;
if (a != NULL) {
if (*a != NULL)
wolfSSL_ASN1_OBJECT_free(*a);
*a = ret;
}
return ret;
}
#endif
#ifdef OPENSSL_EXTRA
int wolfSSL_i2t_ASN1_OBJECT(char *buf, int buf_len, WOLFSSL_ASN1_OBJECT *a)
{
WOLFSSL_ENTER("wolfSSL_i2t_ASN1_OBJECT");
return wolfSSL_OBJ_obj2txt(buf, buf_len, a, 0);
}
#ifndef NO_BIO
int wolfSSL_i2a_ASN1_OBJECT(WOLFSSL_BIO *bp, WOLFSSL_ASN1_OBJECT *a)
{
int length = 0;
int cLen = 0;
word32 idx = 0;
const char null_str[] = "NULL";
const char invalid_str[] = "<INVALID>";
char buf[80];
WOLFSSL_ENTER("wolfSSL_i2a_ASN1_OBJECT");
if (bp == NULL) {
}
else if (a == NULL) {
length = wolfSSL_BIO_write(bp, null_str, (int)XSTRLEN(null_str));
}
else if ((length = wolfSSL_i2t_ASN1_OBJECT(buf, sizeof(buf), a)) > 0) {
length = wolfSSL_BIO_write(bp, buf, length);
}
else if ((a->obj == NULL) || (a->obj[idx++] != ASN_OBJECT_ID)) {
WOLFSSL_MSG("Bad ASN1 Object");
}
else if (GetLength((const byte*)a->obj, &idx, &cLen, a->objSz) < 0) {
length = 0;
}
else {
length = wolfSSL_BIO_write(bp, invalid_str, (int)XSTRLEN(invalid_str));
length += wolfSSL_BIO_dump(bp, (const char*)(a->obj + idx), cLen);
}
return length;
}
#endif
#endif
#if (defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)) && !defined(NO_ASN)
WOLFSSL_STACK* wolfSSL_sk_new_asn1_obj(void)
{
WOLFSSL_ENTER("wolfSSL_sk_new_asn1_obj");
return wolfssl_sk_new_type(STACK_TYPE_OBJ);
}
void wolfSSL_sk_ASN1_OBJECT_free(WOLF_STACK_OF(WOLFSSL_ASN1_OBJECT)* sk)
{
wolfSSL_sk_free(sk);
}
void wolfSSL_sk_ASN1_OBJECT_pop_free(WOLF_STACK_OF(WOLFSSL_ASN1_OBJECT)* sk,
void (*f) (WOLFSSL_ASN1_OBJECT*))
{
WOLFSSL_ENTER("wolfSSL_sk_ASN1_OBJECT_pop_free");
wolfSSL_sk_pop_free(sk, (wolfSSL_sk_freefunc)f);
}
int wolfSSL_sk_ASN1_OBJECT_push(WOLF_STACK_OF(WOLFSSL_ASN1_OBJECT)* sk,
WOLFSSL_ASN1_OBJECT* obj)
{
WOLFSSL_ENTER("wolfSSL_sk_ASN1_OBJECT_push");
return wolfSSL_sk_push(sk, obj);
}
WOLFSSL_ASN1_OBJECT* wolfSSL_sk_ASN1_OBJECT_pop(
WOLF_STACK_OF(WOLFSSL_ASN1_OBJECT)* sk)
{
return (WOLFSSL_ASN1_OBJECT*)wolfssl_sk_pop_type(sk, STACK_TYPE_OBJ);
}
#endif
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
WOLFSSL_ASN1_STRING* wolfSSL_ASN1_STRING_new(void)
{
WOLFSSL_ASN1_STRING* asn1;
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_new");
#endif
asn1 = (WOLFSSL_ASN1_STRING*)XMALLOC(sizeof(WOLFSSL_ASN1_STRING), NULL,
DYNAMIC_TYPE_OPENSSL);
if (asn1 != NULL) {
XMEMSET(asn1, 0, sizeof(WOLFSSL_ASN1_STRING));
}
return asn1;
}
WOLFSSL_ASN1_STRING* wolfSSL_ASN1_STRING_type_new(int type)
{
WOLFSSL_ASN1_STRING* asn1;
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_type_new");
#endif
asn1 = wolfSSL_ASN1_STRING_new();
if (asn1 != NULL) {
asn1->type = type;
}
return asn1;
}
void wolfSSL_ASN1_STRING_free(WOLFSSL_ASN1_STRING* asn1)
{
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_free");
#endif
if (asn1 != NULL) {
if ((asn1->length > 0) && asn1->isDynamic) {
XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
}
}
XFREE(asn1, NULL, DYNAMIC_TYPE_OPENSSL);
}
int wolfSSL_ASN1_STRING_copy(WOLFSSL_ASN1_STRING* dest,
const WOLFSSL_ASN1_STRING* src)
{
int ret = 1;
if ((src == NULL) || (dest == NULL)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_ASN1_STRING_set(dest, src->data, src->length) !=
1)) {
ret = 0;
}
if (ret == 1) {
dest->type = src->type;
dest->flags = src->flags;
}
return ret;
}
WOLFSSL_ASN1_STRING* wolfSSL_ASN1_STRING_dup(WOLFSSL_ASN1_STRING* asn1)
{
WOLFSSL_ASN1_STRING* dupl = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_dup");
if (asn1 == NULL) {
WOLFSSL_MSG("Bad parameter");
}
else {
dupl = wolfSSL_ASN1_STRING_new();
if (dupl == NULL) {
WOLFSSL_MSG("wolfSSL_ASN1_STRING_new error");
}
}
if (dupl != NULL) {
if (wolfSSL_ASN1_STRING_copy(dupl, asn1) != 1) {
WOLFSSL_MSG("wolfSSL_ASN1_STRING_copy error");
wolfSSL_ASN1_STRING_free(dupl);
dupl = NULL;
}
}
return dupl;
}
int wolfSSL_ASN1_STRING_cmp(const WOLFSSL_ASN1_STRING *a,
const WOLFSSL_ASN1_STRING *b)
{
int ret;
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_cmp");
if ((a == NULL) || (b == NULL)) {
ret = WOLFSSL_FATAL_ERROR;
}
else if (a->length != b->length) {
ret = a->length - b->length;
}
else if ((ret = XMEMCMP(a->data, b->data, (size_t)a->length)) == 0) {
ret = a->type - b->type;
}
return ret;
}
#endif
#if defined(OPENSSL_EXTRA)
#if !defined(NO_CERTS)
#ifndef NO_WOLFSSL_STUB
WOLFSSL_ASN1_STRING* wolfSSL_d2i_DISPLAYTEXT(WOLFSSL_ASN1_STRING **asn,
const unsigned char **in, long len)
{
WOLFSSL_STUB("d2i_DISPLAYTEXT");
(void)asn;
(void)in;
(void)len;
return NULL;
}
#endif
#endif
#endif
#ifndef NO_ASN
#if defined(OPENSSL_EXTRA)
int wolfSSL_ASN1_UNIVERSALSTRING_to_string(WOLFSSL_ASN1_STRING *s)
{
int ret = 1;
char* p;
WOLFSSL_ENTER("wolfSSL_ASN1_UNIVERSALSTRING_to_string");
if (s == NULL) {
WOLFSSL_MSG("Bad parameter");
ret = 0;
}
if ((ret == 1) && (s->type != WOLFSSL_V_ASN1_UNIVERSALSTRING)) {
WOLFSSL_MSG("Input is not a universal string");
ret = 0;
}
if ((ret == 1) && ((s->length % 4) != 0)) {
WOLFSSL_MSG("Input string must be divisible by 4");
ret = 0;
}
if (ret == 1) {
for (p = s->data; p < s->data + s->length; p += 4)
if ((p[0] != '\0') || (p[1] != '\0') || (p[2] != '\0'))
break;
if (p != s->data + s->length) {
WOLFSSL_MSG("Wrong string format");
ret = 0;
}
}
if (ret == 1) {
char* copy;
for (copy = p = s->data; p < s->data + s->length; p += 4) {
*copy++ = p[3];
}
*copy = '\0';
s->length /= 4;
s->type = WOLFSSL_V_ASN1_PRINTABLESTRING;
}
return ret;
}
#endif
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
int wolfSSL_ASN1_STRING_to_UTF8(unsigned char **out, WOLFSSL_ASN1_STRING *asn1)
{
unsigned char* buf = NULL;
unsigned char* data = NULL;
int len = -1;
if ((out != NULL) && (asn1 != NULL)) {
data = wolfSSL_ASN1_STRING_data(asn1);
len = wolfSSL_ASN1_STRING_length(asn1);
if ((data == NULL) || (len < 0)) {
len = WOLFSSL_FATAL_ERROR;
}
}
if (len != -1) {
buf = (unsigned char*)XMALLOC((size_t)(len + 1), NULL,
DYNAMIC_TYPE_OPENSSL);
if (buf == NULL) {
len = WOLFSSL_FATAL_ERROR;
}
}
if (len != -1) {
XMEMCPY(buf, data, (size_t)(len + 1));
*out = buf;
}
return len;
}
#endif
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
static char* wolfssl_asn1_string_to_hex_chars(const WOLFSSL_ASN1_STRING *s)
{
char* tmp;
int tmpSz = s->length * 3;
tmp = (char*)XMALLOC((size_t)tmpSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (tmp == NULL) {
WOLFSSL_MSG("Memory Error");
}
else {
int i;
unsigned char* str = (unsigned char*)s->data;
for (i = 0; i < s->length; i++) {
ByteToHexStr(str[i], tmp + i * 3);
if (i < s->length - 1) {
tmp[i * 3 + 2] = ':';
}
else {
tmp[i * 3 + 2] = '\0';
}
}
}
return tmp;
}
char* wolfSSL_i2s_ASN1_STRING(WOLFSSL_v3_ext_method *method,
const WOLFSSL_ASN1_STRING *s)
{
char* ret = NULL;
WOLFSSL_ENTER("wolfSSL_i2s_ASN1_STRING");
(void)method;
if ((s == NULL) || (s->data == NULL)) {
WOLFSSL_MSG("Bad Function Argument");
}
else if (s->length == 0) {
ret = (char *)XMALLOC(1, NULL, DYNAMIC_TYPE_TMP_BUFFER);
if (ret != NULL) {
ret[0] = '\0';
}
}
else {
ret = wolfssl_asn1_string_to_hex_chars(s);
}
return ret;
}
static int i2d_ASN1_STRING(WOLFSSL_ASN1_STRING* s,
unsigned char **pp, byte tag)
{
int idx;
int len;
unsigned char* out;
if (s == NULL || s->data == NULL || s->length == 0)
return WOLFSSL_FATAL_ERROR;
len = SetHeader(tag, s->length, NULL, 0) + s->length;
if (pp == NULL)
return len;
if (*pp == NULL) {
out = (unsigned char*)XMALLOC(len, NULL, DYNAMIC_TYPE_ASN1);
if (out == NULL)
return WOLFSSL_FATAL_ERROR;
}
else {
out = *pp;
}
idx = (int)SetHeader(tag, s->length, out, 0);
XMEMCPY(out + idx, s->data, s->length);
if (*pp == NULL)
*pp = out;
else
*pp += len;
return len;
}
int wolfSSL_i2d_ASN1_GENERALSTRING(WOLFSSL_ASN1_STRING* s, unsigned char **pp)
{
WOLFSSL_ENTER("wolfSSL_i2d_ASN1_GENERALSTRING");
return i2d_ASN1_STRING(s, pp, ASN_GENERALSTRING);
}
int wolfSSL_i2d_ASN1_OCTET_STRING(WOLFSSL_ASN1_STRING* s, unsigned char **pp)
{
WOLFSSL_ENTER("wolfSSL_i2d_ASN1_OCTET_STRING");
return i2d_ASN1_STRING(s, pp, ASN_OCTET_STRING);
}
int wolfSSL_i2d_ASN1_UTF8STRING(WOLFSSL_ASN1_STRING* s, unsigned char **pp)
{
WOLFSSL_ENTER("wolfSSL_i2d_ASN1_UTF8STRING");
return i2d_ASN1_STRING(s, pp, ASN_UTF8STRING);
}
int wolfSSL_i2d_ASN1_SEQUENCE(WOLFSSL_ASN1_STRING* s,
unsigned char **pp)
{
unsigned char* out;
if (s == NULL || s->data == NULL || s->length == 0)
return WOLFSSL_FATAL_ERROR;
if (pp == NULL)
return s->length;
if (*pp == NULL) {
out = (unsigned char*)XMALLOC(s->length, NULL, DYNAMIC_TYPE_ASN1);
if (out == NULL)
return WOLFSSL_FATAL_ERROR;
}
else {
out = *pp;
}
XMEMCPY(out, s->data, s->length);
if (*pp == NULL)
*pp = out;
else
*pp += s->length;
return s->length;
}
static WOLFSSL_ASN1_STRING* d2i_ASN1_STRING(WOLFSSL_ASN1_STRING** out,
const byte** src, long len, byte expTag)
{
WOLFSSL_ASN1_STRING* ret = NULL;
word32 idx = 0;
byte tag = 0;
int length = 0;
WOLFSSL_ENTER("d2i_ASN1_STRING");
if (src == NULL || *src == NULL || len == 0)
return NULL;
if (GetASNTag(*src, &idx, &tag, (word32)len) < 0)
return NULL;
if (tag != expTag)
return NULL;
if (GetLength(*src, &idx, &length, (word32)len) < 0)
return NULL;
ret = wolfSSL_ASN1_STRING_new();
if (ret == NULL)
return NULL;
if (wolfSSL_ASN1_STRING_set(ret, *src + idx, length) != 1) {
wolfSSL_ASN1_STRING_free(ret);
return NULL;
}
if (out != NULL) {
if (*out != NULL)
wolfSSL_ASN1_STRING_free(*out);
*out = ret;
}
*src += idx + length;
return ret;
}
WOLFSSL_ASN1_STRING* wolfSSL_d2i_ASN1_GENERALSTRING(WOLFSSL_ASN1_STRING** out,
const byte** src, long len)
{
WOLFSSL_ENTER("wolfSSL_d2i_ASN1_GENERALSTRING");
return d2i_ASN1_STRING(out, src, len, ASN_GENERALSTRING);
}
WOLFSSL_ASN1_STRING* wolfSSL_d2i_ASN1_OCTET_STRING(WOLFSSL_ASN1_STRING** out,
const byte** src, long len)
{
WOLFSSL_ENTER("wolfSSL_d2i_ASN1_OCTET_STRING");
return d2i_ASN1_STRING(out, src, len, ASN_OCTET_STRING);
}
WOLFSSL_ASN1_STRING* wolfSSL_d2i_ASN1_UTF8STRING(WOLFSSL_ASN1_STRING** out,
const byte** src, long len)
{
WOLFSSL_ENTER("wolfSSL_d2i_ASN1_UTF8STRING");
return d2i_ASN1_STRING(out, src, len, ASN_UTF8STRING);
}
#endif
#endif
#if defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)
int wolfSSL_ASN1_STRING_type(const WOLFSSL_ASN1_STRING* asn1)
{
int type = 0;
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_type");
#endif
if (asn1 != NULL) {
type = asn1->type;
}
return type;
}
#ifndef NO_CERTS
const unsigned char* wolfSSL_ASN1_STRING_get0_data(
const WOLFSSL_ASN1_STRING* asn)
{
char* data = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_get0_data");
if (asn != NULL) {
data = asn->data;
}
return (const unsigned char*)data;
}
unsigned char* wolfSSL_ASN1_STRING_data(WOLFSSL_ASN1_STRING* asn)
{
char* data = NULL;
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_data");
#endif
if (asn != NULL) {
data = asn->data;
}
return (unsigned char*)data;
}
int wolfSSL_ASN1_STRING_length(const WOLFSSL_ASN1_STRING* asn)
{
int len = 0;
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_length");
#endif
if (asn) {
len = asn->length;
}
return len;
}
#endif
int wolfSSL_ASN1_STRING_set(WOLFSSL_ASN1_STRING* asn1, const void* data, int sz)
{
int ret = 1;
#ifdef WOLFSSL_DEBUG_OPENSSL
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_set");
#endif
if ((asn1 == NULL) || ((data == NULL) && (sz != 0))) {
ret = 0;
}
if ((ret == 1) && (sz < 0)) {
sz = (int)XSTRLEN((const char*)data);
if (sz < 0) {
ret = 0;
}
}
if (ret == 1) {
if (asn1->isDynamic) {
XFREE(asn1->data, NULL, DYNAMIC_TYPE_OPENSSL);
asn1->data = NULL;
}
if (sz + 1 > CTC_NAME_SIZE) {
asn1->data = (char*)XMALLOC((size_t)(sz + 1), NULL,
DYNAMIC_TYPE_OPENSSL);
if (asn1->data == NULL) {
ret = 0;
}
else {
asn1->isDynamic = 1;
}
}
else {
XMEMSET(asn1->strData, 0, CTC_NAME_SIZE);
asn1->data = asn1->strData;
asn1->isDynamic = 0;
}
}
if (ret == 1) {
if (data != NULL) {
XMEMCPY(asn1->data, data, (size_t)sz);
asn1->data[sz] = '\0';
}
asn1->length = sz;
}
return ret;
}
#endif
#if (defined(OPENSSL_EXTRA) || defined(OPENSSL_EXTRA_X509_SMALL)) && \
!defined(WOLFCRYPT_ONLY)
#ifndef NO_CERTS
static void wolfssl_asn1_string_canonicalize(WOLFSSL_ASN1_STRING* asn)
{
char* src = asn->data;
char* p = asn->data + asn->length - 1;
int len = asn->length;
int i;
for (; (len > 0) && (XISSPACE((unsigned char)*p)); len--) {
p--;
}
if (len > 0) {
for (; XISSPACE((unsigned char)*src); len--) {
src++;
}
}
p = asn->data;
for (i = 0; i < len; p++, i++) {
if (!XISASCII(*src)) {
*p = *src++;
}
else if (XISSPACE((unsigned char)*src)) {
*p = 0x20;
while (XISSPACE((unsigned char)*++src)) {
i++;
}
}
else {
*p = (char)XTOLOWER((unsigned char)*src++);
}
}
asn->length = (int)(p - asn->data);
}
int wolfSSL_ASN1_STRING_canon(WOLFSSL_ASN1_STRING* asn_out,
const WOLFSSL_ASN1_STRING* asn_in)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_canon");
if ((asn_out == NULL) || (asn_in == NULL)) {
WOLFSSL_MSG("invalid function arguments");
ret = BAD_FUNC_ARG;
}
if (ret == 1) {
switch (asn_in->type) {
case WOLFSSL_MBSTRING_UTF8:
case WOLFSSL_V_ASN1_PRINTABLESTRING:
asn_out->type = WOLFSSL_MBSTRING_UTF8;
if (asn_out->isDynamic) {
XFREE(asn_out->data, NULL, DYNAMIC_TYPE_OPENSSL);
asn_out->data = NULL;
}
asn_out->length = wolfSSL_ASN1_STRING_to_UTF8(
(unsigned char**)&asn_out->data,
(WOLFSSL_ASN1_STRING*)asn_in);
if (asn_out->length < 0) {
ret = 0;
}
else {
asn_out->isDynamic = 1;
wolfssl_asn1_string_canonicalize(asn_out);
if (asn_out->length == 0) {
XFREE(asn_out->data, NULL, DYNAMIC_TYPE_OPENSSL);
asn_out->data = NULL;
asn_out->isDynamic = 0;
}
}
break;
default:
WOLFSSL_MSG("just copy string");
ret = wolfSSL_ASN1_STRING_copy(asn_out, asn_in);
}
}
return ret;
}
#endif
#endif
#if defined(OPENSSL_EXTRA)
#if !defined(NO_ASN)
#ifndef NO_BIO
static int wolfssl_unprintable_char(char c)
{
const unsigned char last_unprintable = 31;
const unsigned char LF = 10;
const unsigned char CR = 13;
return (c <= last_unprintable) && (c != LF) && (c != CR);
}
int wolfSSL_ASN1_STRING_print(WOLFSSL_BIO *bio, WOLFSSL_ASN1_STRING *str)
{
int len = 0;
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_print");
if ((bio != NULL) && (str != NULL)) {
int i;
len = str->length;
for (i = 0; i < len; i++) {
if (wolfssl_unprintable_char(str->data[i])) {
str->data[i] = '.';
}
}
if (wolfSSL_BIO_write(bio, str->data, len) != len) {
len = 0;
}
}
return len;
}
#endif
#endif
const char* wolfSSL_ASN1_tag2str(int tag)
{
static const char *const tag_label[31] = {
"EOC", "BOOLEAN", "INTEGER", "BIT STRING", "OCTET STRING", "NULL",
"OBJECT", "OBJECT DESCRIPTOR", "EXTERNAL", "REAL", "ENUMERATED",
"<ASN1 11>", "UTF8STRING", "<ASN1 13>", "<ASN1 14>", "<ASN1 15>",
"SEQUENCE", "SET", "NUMERICSTRING", "PRINTABLESTRING", "T61STRING",
"VIDEOTEXTSTRING", "IA5STRING", "UTCTIME", "GENERALIZEDTIME",
"GRAPHICSTRING", "VISIBLESTRING", "GENERALSTRING", "UNIVERSALSTRING",
"<ASN1 29>", "BMPSTRING"
};
const char* str = "(unknown)";
if ((tag == WOLFSSL_V_ASN1_NEG_INTEGER) ||
(tag == WOLFSSL_V_ASN1_NEG_ENUMERATED)) {
tag &= ~WOLFSSL_V_ASN1_NEG;
}
if ((tag >= 0) && (tag <= 30)) {
str = tag_label[tag];
}
return str;
}
#ifndef NO_BIO
static int wolfssl_string_print_type(WOLFSSL_BIO *bio, WOLFSSL_ASN1_STRING *str)
{
int type_len;
const char *tag;
tag = wolfSSL_ASN1_tag2str(str->type);
type_len = (int)XSTRLEN(tag);
if (wolfSSL_BIO_write(bio, tag, type_len) != type_len){
type_len = 0;
}
else if (wolfSSL_BIO_write(bio, ":", 1) != 1) {
type_len = 0;
}
else {
type_len++;
}
return type_len;
}
static int wolfssl_asn1_string_dump_hex(WOLFSSL_BIO *bio,
WOLFSSL_ASN1_STRING *str, int asDer)
{
const char* hash="#";
char hex_tmp[4];
int str_len = 1;
if (wolfSSL_BIO_write(bio, hash, 1) != 1) {
str_len = WOLFSSL_FATAL_ERROR;
}
else {
if (asDer) {
ByteToHexStr((byte)str->type, &hex_tmp[0]);
ByteToHexStr((byte)str->length, &hex_tmp[2]);
str_len += 4;
if (wolfSSL_BIO_write(bio, hex_tmp, 4) != 4) {
str_len = WOLFSSL_FATAL_ERROR;
}
}
}
if (str_len != -1) {
char* p;
char* end;
end = str->data + str->length - 1;
for (p = str->data; p <= end; p++) {
ByteToHexStr((byte)*p, hex_tmp);
str_len += 2;
if (wolfSSL_BIO_write(bio, hex_tmp, 2) != 2) {
str_len = WOLFSSL_FATAL_ERROR;
break;
}
}
}
return str_len;
}
static int wolfssl_check_esc_char(char c)
{
int ret = 0;
const char esc_ch[] = "+;<>\\";
const char* p = esc_ch;
for (; (*p) != '\0'; p++) {
if (c == (*p)) {
ret = 1;
break;
}
}
return ret;
}
static int wolfssl_asn1_string_print_esc_2253(WOLFSSL_BIO *bio,
WOLFSSL_ASN1_STRING *str)
{
char* p;
int str_len = 0;
for (p = str->data; (*p) != '\0'; p++) {
if (wolfssl_check_esc_char(*p)){
str_len++;
if (wolfSSL_BIO_write(bio,"\\", 1) != 1) {
str_len = WOLFSSL_FATAL_ERROR;
break;
}
}
str_len++;
if (wolfSSL_BIO_write(bio, p, 1) != 1) {
str_len = WOLFSSL_FATAL_ERROR;
break;
}
}
return str_len;
}
int wolfSSL_ASN1_STRING_print_ex(WOLFSSL_BIO *bio, WOLFSSL_ASN1_STRING *str,
unsigned long flags)
{
int err = 0;
int str_len = -1;
int type_len = 0;
WOLFSSL_ENTER("wolfSSL_ASN1_STRING_PRINT_ex");
if ((bio == NULL) || (str == NULL)) {
err = 1;
}
if ((!err) && (flags & WOLFSSL_ASN1_STRFLGS_SHOW_TYPE)) {
type_len = wolfssl_string_print_type(bio, str);
if (type_len == 0) {
err = 1;
}
}
if (!err) {
if (flags & WOLFSSL_ASN1_STRFLGS_DUMP_ALL) {
str_len = wolfssl_asn1_string_dump_hex(bio, str,
flags & WOLFSSL_ASN1_STRFLGS_DUMP_DER);
}
else if (flags & WOLFSSL_ASN1_STRFLGS_ESC_2253) {
str_len = wolfssl_asn1_string_print_esc_2253(bio, str);
}
else {
str_len = str->length;
if (wolfSSL_BIO_write(bio, str->data, str_len) != str_len) {
err = 1;
}
}
}
if ((!err) && (str_len >= 0)) {
str_len += type_len;
}
else {
str_len = 0;
}
return str_len;
}
#endif
#endif
#ifdef OPENSSL_EXTRA
void wolfSSL_ASN1_GENERALIZEDTIME_free(WOLFSSL_ASN1_TIME* asn1Time)
{
WOLFSSL_ENTER("wolfSSL_ASN1_GENERALIZEDTIME_free");
XFREE(asn1Time, NULL, DYNAMIC_TYPE_OPENSSL);
}
#ifndef NO_BIO
static WC_INLINE const char* MonthStr(const char* n)
{
static const char monthStr[12][4] = {
"Jan", "Feb", "Mar", "Apr", "May", "Jun",
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec" };
const char* month = "BAD";
int i;
i = (n[0] - '0') * 10 + (n[1] - '0') - 1;
if ((i >= 0) && (i < 12)) {
month = monthStr[i];
}
return month;
}
int wolfSSL_ASN1_GENERALIZEDTIME_print(WOLFSSL_BIO* bio,
const WOLFSSL_ASN1_GENERALIZEDTIME* asnTime)
{
int ret = 1;
const char* p = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_GENERALIZEDTIME_print");
if ((bio == NULL) || (asnTime == NULL)) {
ret = BAD_FUNC_ARG;
}
if ((ret == 1) && (asnTime->type != WOLFSSL_V_ASN1_GENERALIZEDTIME)) {
WOLFSSL_MSG("Error, not GENERALIZED_TIME");
ret = 0;
}
if (ret == 1) {
p = (const char *)(asnTime->data);
if (wolfSSL_BIO_write(bio, MonthStr(p + 4), 3) != 3) {
ret = 0;
}
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, " ", 1) != 1)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, p + 6, 2) != 2)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, " ", 1) != 1)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, p + 8, 2) != 2)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, ":", 1) != 1)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, p + 10, 2) != 2)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, ":", 1) != 1)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, p + 12, 2) != 2)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, " ", 1) != 1)) {
ret = 0;
}
if ((ret == 1) && (wolfSSL_BIO_write(bio, p, 4) != 4)) {
ret = 0;
}
return ret;
}
#endif
#endif
#ifndef NO_ASN_TIME
#ifdef OPENSSL_EXTRA
WOLFSSL_ASN1_TIME* wolfSSL_ASN1_TIME_new(void)
{
WOLFSSL_ASN1_TIME* ret;
ret = (WOLFSSL_ASN1_TIME*)XMALLOC(sizeof(WOLFSSL_ASN1_TIME), NULL,
DYNAMIC_TYPE_OPENSSL);
if (ret != NULL) {
XMEMSET(ret, 0, sizeof(WOLFSSL_ASN1_TIME));
}
return ret;
}
void wolfSSL_ASN1_TIME_free(WOLFSSL_ASN1_TIME* t)
{
XFREE(t, NULL, DYNAMIC_TYPE_OPENSSL);
}
#ifndef NO_WOLFSSL_STUB
WOLFSSL_ASN1_TIME *wolfSSL_ASN1_TIME_set(WOLFSSL_ASN1_TIME *a, time_t t)
{
WOLFSSL_STUB("wolfSSL_ASN1_TIME_set");
(void)a;
(void)t;
return a;
}
#endif
static long long wolfssl_time_to_unix_time(int sec, int minute, int hour,
int mday, int mon, int year)
{
static const int monthDaysCumulative [12] = {
0, 31, 59, 90, 120, 151, 181, 212, 243, 273, 304, 334
};
int leapDays = year;
if (mon <= 1) {
--leapDays;
}
leapDays = leapDays / 4 - leapDays / 100 + leapDays / 400 - 1969 / 4 +
1969 / 100 - 1969 / 400;
return ((((long long) (year - 1970) * 365 + leapDays +
monthDaysCumulative[mon] + mday - 1) * 24 + hour) * 60 + minute) *
60 + sec;
}
static int wolfssl_asn1_time_to_secs(const WOLFSSL_ASN1_TIME* t,
long long* secs)
{
int ret = 1;
struct tm tm_s;
struct tm *tmGmt = &tm_s;
ret = wolfSSL_ASN1_TIME_to_tm(t, tmGmt);
if (ret != 1) {
WOLFSSL_MSG("Failed to convert from time to struct tm.");
}
else {
*secs = wolfssl_time_to_unix_time(tmGmt->tm_sec, tmGmt->tm_min,
tmGmt->tm_hour, tmGmt->tm_mday, tmGmt->tm_mon,
tmGmt->tm_year + 1900);
}
return ret;
}
int wolfSSL_ASN1_TIME_diff(int *days, int *secs, const WOLFSSL_ASN1_TIME *from,
const WOLFSSL_ASN1_TIME *to)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_diff");
if ((from == NULL) && (to == NULL)) {
if (days != NULL) {
*days = 0;
}
if (secs != NULL) {
*secs = 0;
}
}
else {
const long long SECS_PER_DAY = 24 * 60 * 60;
long long fromSecs;
long long toSecs = 0;
ret = wolfssl_asn1_time_to_secs(from, &fromSecs);
if (ret == 1) {
ret = wolfssl_asn1_time_to_secs(to, &toSecs);
}
if (ret == 1) {
long long diffSecs = toSecs - fromSecs;
if (days != NULL) {
*days = (int) (diffSecs / SECS_PER_DAY);
}
if (secs != NULL) {
*secs = (int) (diffSecs -
((long long)(diffSecs / SECS_PER_DAY) * SECS_PER_DAY));
}
}
}
return ret;
}
int wolfSSL_ASN1_TIME_compare(const WOLFSSL_ASN1_TIME *a,
const WOLFSSL_ASN1_TIME *b)
{
int ret;
int days;
int secs;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_compare");
if (wolfSSL_ASN1_TIME_diff(&days, &secs, a, b) != 1) {
WOLFSSL_MSG("Failed to get time difference.");
ret = -2;
}
else if (days == 0 && secs == 0) {
ret = 0;
}
else if (days >= 0 && secs >= 0) {
ret = -1;
}
else {
ret = 1;
}
WOLFSSL_LEAVE("wolfSSL_ASN1_TIME_compare", ret);
return ret;
}
#if !defined(USER_TIME) && !defined(TIME_OVERRIDES)
WOLFSSL_ASN1_TIME* wolfSSL_ASN1_TIME_adj(WOLFSSL_ASN1_TIME* a, time_t t,
int offset_day, long offset_sec)
{
WOLFSSL_ASN1_TIME* ret = NULL;
const time_t sec_per_day = 24*60*60;
int time_get;
char time_str[MAX_TIME_STRING_SZ];
time_t offset_day_sec = offset_day * sec_per_day;
time_t t_adj = t + offset_day_sec + offset_sec;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_adj");
time_get = GetFormattedTime(&t_adj, (byte*)time_str, MAX_TIME_STRING_SZ);
if (time_get > 0) {
ret = a;
if (ret == NULL) {
ret = wolfSSL_ASN1_TIME_new();
}
if ((wolfSSL_ASN1_TIME_set_string(ret, time_str) != 1) && (ret != a)) {
wolfSSL_ASN1_TIME_free(ret);
ret = NULL;
}
}
return ret;
}
#endif
int wolfSSL_ASN1_TIME_get_length(const WOLFSSL_ASN1_TIME *t)
{
int len = 0;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_get_length");
if (t != NULL) {
len = t->length;
}
return len;
}
unsigned char* wolfSSL_ASN1_TIME_get_data(const WOLFSSL_ASN1_TIME *t)
{
unsigned char* data = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_get_data");
if (t != NULL) {
data = (unsigned char*)t->data;
}
return data;
}
int wolfSSL_ASN1_TIME_check(const WOLFSSL_ASN1_TIME* a)
{
int ret = WOLFSSL_SUCCESS;
char buf[MAX_TIME_STRING_SZ];
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_check");
if (wolfSSL_ASN1_TIME_to_string((WOLFSSL_ASN1_TIME*)a, buf,
MAX_TIME_STRING_SZ) == NULL) {
ret = WOLFSSL_FAILURE;
}
return ret;
}
int wolfSSL_ASN1_TIME_set_string(WOLFSSL_ASN1_TIME *t, const char *str)
{
int ret = WOLFSSL_SUCCESS;
int slen = 0;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_set_string");
if (str == NULL) {
WOLFSSL_MSG("Bad parameter");
ret = 0;
}
if (ret == WOLFSSL_SUCCESS) {
slen = (int)XSTRLEN(str) + 1;
if (slen > CTC_DATE_SIZE) {
WOLFSSL_MSG("Date string too long");
ret = WOLFSSL_FAILURE;
}
}
if ((ret == WOLFSSL_SUCCESS) && (t != NULL)) {
XMEMCPY(t->data, str, (size_t)slen);
t->length = slen - 1;
t->type = ((slen == ASN_UTC_TIME_SIZE) ? WOLFSSL_V_ASN1_UTCTIME :
WOLFSSL_V_ASN1_GENERALIZEDTIME);
}
return ret;
}
int wolfSSL_ASN1_TIME_set_string_X509(WOLFSSL_ASN1_TIME *t, const char *str)
{
int ret = WOLFSSL_SUCCESS;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_set_string_X509");
if (t == NULL)
ret = WOLFSSL_FAILURE;
if (ret == WOLFSSL_SUCCESS)
ret = wolfSSL_ASN1_TIME_set_string(t, str);
if (ret == WOLFSSL_SUCCESS)
ret = wolfSSL_ASN1_TIME_check(t);
return ret;
}
WOLFSSL_ASN1_TIME* wolfSSL_ASN1_TIME_to_generalizedtime(WOLFSSL_ASN1_TIME *t,
WOLFSSL_ASN1_TIME **out)
{
WOLFSSL_ASN1_TIME *ret = NULL;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_to_generalizedtime");
if (t == NULL) {
WOLFSSL_MSG("Invalid ASN_TIME value");
}
else if ((t->type != WOLFSSL_V_ASN1_UTCTIME) &&
(t->type != WOLFSSL_V_ASN1_GENERALIZEDTIME)) {
WOLFSSL_MSG("Invalid ASN_TIME type.");
}
else if ((out != NULL) && (*out != NULL)) {
ret = *out;
}
else {
ret = wolfSSL_ASN1_TIME_new();
if (ret == NULL) {
WOLFSSL_MSG("memory alloc failed.");
}
}
if (ret != NULL) {
ret->type = WOLFSSL_V_ASN1_GENERALIZEDTIME;
if (t->type == WOLFSSL_V_ASN1_GENERALIZEDTIME) {
ret->length = ASN_GENERALIZED_TIME_SIZE;
XMEMCPY(ret->data, t->data, ASN_GENERALIZED_TIME_SIZE);
}
else {
ret->length = t->length + 2;
if (t->data[0] >= '5') {
ret->data[0] = '1'; ret->data[1] = '9';
}
else {
ret->data[0] = '2'; ret->data[1] = '0';
}
XMEMCPY(&ret->data[2], t->data, t->length);
}
if (out != NULL) {
*out = ret;
}
}
return ret;
}
#if !defined(USER_TIME) && !defined(TIME_OVERRIDES)
WOLFSSL_ASN1_TIME* wolfSSL_ASN1_UTCTIME_set(WOLFSSL_ASN1_TIME *s, time_t t)
{
WOLFSSL_ASN1_TIME* ret = s;
WOLFSSL_ENTER("wolfSSL_ASN1_UTCTIME_set");
if (ret == NULL) {
ret = wolfSSL_ASN1_TIME_new();
if (ret == NULL)
return NULL;
}
ret->length = GetFormattedTime(&t, ret->data, sizeof(ret->data));
if (ret->length + 1 != ASN_UTC_TIME_SIZE) {
if (ret != s)
wolfSSL_ASN1_TIME_free(ret);
ret = NULL;
}
else {
ret->type = WOLFSSL_V_ASN1_UTCTIME;
}
return ret;
}
#endif
#endif
#if defined(WOLFSSL_MYSQL_COMPATIBLE) || defined(OPENSSL_EXTRA)
char* wolfSSL_ASN1_TIME_to_string(WOLFSSL_ASN1_TIME* t, char* buf, int len)
{
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_to_string");
if ((t == NULL) || (buf == NULL) || (len < 5)) {
WOLFSSL_MSG("Bad argument");
buf = NULL;
}
if ((buf != NULL) && (t->length > len)) {
WOLFSSL_MSG("Length of date is longer then buffer");
buf = NULL;
}
if ((buf != NULL) && !GetTimeString(t->data, t->type, buf, len,
t->length)) {
buf = NULL;
}
return buf;
}
#define UTCTIME_LEN 13
static int wolfssl_utctime_year(const unsigned char* str, int len, int* year)
{
int ret = 1;
if (len < UTCTIME_LEN) {
WOLFSSL_MSG("WOLFSSL_ASN1_TIME buffer length is invalid.");
ret = 0;
}
if ((ret == 1) && (str[UTCTIME_LEN - 1] != 'Z')) {
WOLFSSL_MSG("Expecting UTC time.");
ret = 0;
}
if (ret == 1) {
int tm_year;
tm_year = (str[0] - '0') * 10;
tm_year += str[1] - '0';
if (tm_year < 50) {
tm_year += 100;
}
*year = tm_year;
}
return ret;
}
#define GENTIME_LEN 15
static int wolfssl_gentime_year(const unsigned char* str, int len, int* year)
{
int ret = 1;
if (len < GENTIME_LEN) {
WOLFSSL_MSG("WOLFSSL_ASN1_TIME buffer length is invalid.");
ret = 0;
}
if ((ret == 1) && (str[GENTIME_LEN - 1] != 'Z')) {
WOLFSSL_MSG("Expecting Generalized time.");
ret = 0;
}
if (ret == 1) {
int tm_year;
tm_year = (str[0] - '0') * 1000;
tm_year += (str[1] - '0') * 100;
tm_year += (str[2] - '0') * 10;
tm_year += str[3] - '0';
tm_year -= 1900;
*year = tm_year;
}
return ret;
}
static int wolfssl_asn1_time_to_tm(const WOLFSSL_ASN1_TIME* asnTime,
struct tm* tm)
{
int ret = 1;
const unsigned char* asn1TimeBuf;
int asn1TimeBufLen;
int i = 0;
#ifdef XMKTIME
struct tm localTm;
XMEMSET(&localTm, 0, sizeof localTm);
#endif
asn1TimeBuf = wolfSSL_ASN1_TIME_get_data(asnTime);
asn1TimeBufLen = wolfSSL_ASN1_TIME_get_length(asnTime);
if (asn1TimeBufLen <= 0) {
WOLFSSL_MSG("Failed to get WOLFSSL_ASN1_TIME buffer length.");
ret = 0;
}
if (ret == 1) {
XMEMSET(tm, 0, sizeof(struct tm));
if (asnTime->type == WOLFSSL_V_ASN1_UTCTIME) {
int tm_year;
if ((ret = wolfssl_utctime_year(asn1TimeBuf, asn1TimeBufLen,
&tm_year)) == 1) {
tm->tm_year = tm_year;
i = 2;
}
}
else if (asnTime->type == WOLFSSL_V_ASN1_GENERALIZEDTIME) {
int tm_year;
if ((ret = wolfssl_gentime_year(asn1TimeBuf, asn1TimeBufLen,
&tm_year)) == 1) {
tm->tm_year = tm_year;
i = 4;
}
}
else {
WOLFSSL_MSG("asnTime->type is invalid.");
ret = 0;
}
}
if (ret == 1) {
tm->tm_mon = (asn1TimeBuf[i] - '0') * 10; i++;
tm->tm_mon += (asn1TimeBuf[i] - '0') - 1; i++;
tm->tm_mday = (asn1TimeBuf[i] - '0') * 10; i++;
tm->tm_mday += (asn1TimeBuf[i] - '0'); i++;
tm->tm_hour = (asn1TimeBuf[i] - '0') * 10; i++;
tm->tm_hour += (asn1TimeBuf[i] - '0'); i++;
tm->tm_min = (asn1TimeBuf[i] - '0') * 10; i++;
tm->tm_min += (asn1TimeBuf[i] - '0'); i++;
tm->tm_sec = (asn1TimeBuf[i] - '0') * 10; i++;
tm->tm_sec += (asn1TimeBuf[i] - '0');
#ifdef XMKTIME
XMEMCPY(&localTm, tm, sizeof(struct tm));
XMKTIME(&localTm);
tm->tm_wday = localTm.tm_wday;
tm->tm_yday = localTm.tm_yday;
#endif
}
return ret;
}
static int wolfssl_get_current_time_tm(struct tm* tm)
{
int ret = 1;
time_t currentTime;
struct tm *tmpTs;
#if defined(NEED_TMP_TIME)
struct tm tmpTimeStorage;
tmpTs = &tmpTimeStorage;
#else
tmpTs = NULL;
#endif
(void)tmpTs;
if (tm == NULL) {
WOLFSSL_MSG("asnTime and tm are both NULL");
ret = 0;
}
if (ret == 1) {
currentTime = wc_Time(0);
if (currentTime <= 0) {
WOLFSSL_MSG("Failed to get current time.");
ret = 0;
}
}
if (ret == 1) {
tmpTs = XGMTIME(¤tTime, tmpTs);
if (tmpTs == NULL) {
WOLFSSL_MSG("Failed to convert current time to UTC.");
ret = 0;
}
}
if (ret == 1) {
XMEMCPY(tm, tmpTs, sizeof(*tm));
}
return ret;
}
int wolfSSL_ASN1_TIME_to_tm(const WOLFSSL_ASN1_TIME* asnTime, struct tm* tm)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_to_tm");
if (asnTime == NULL) {
ret = wolfssl_get_current_time_tm(tm);
}
else if (tm == NULL) {
ret = wolfSSL_ASN1_TIME_check(asnTime);
}
else {
ret = wolfssl_asn1_time_to_tm(asnTime, tm);
}
return ret;
}
#ifndef NO_BIO
int wolfSSL_ASN1_TIME_print(WOLFSSL_BIO* bio, const WOLFSSL_ASN1_TIME* asnTime)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_ASN1_TIME_print");
if ((bio == NULL) || (asnTime == NULL)) {
WOLFSSL_MSG("NULL function argument");
ret = 0;
}
if (ret == 1) {
char buf[MAX_TIME_STRING_SZ];
int len;
if (wolfSSL_ASN1_TIME_to_string((WOLFSSL_ASN1_TIME*)asnTime, buf,
sizeof(buf)) == NULL) {
XMEMSET(buf, 0, MAX_TIME_STRING_SZ);
XSTRNCPY(buf, "Bad time value", sizeof(buf)-1);
ret = 0;
}
len = (int)XSTRLEN(buf);
if (wolfSSL_BIO_write(bio, buf, len) != len) {
WOLFSSL_MSG("Unable to write to bio");
ret = 0;
}
}
return ret;
}
#endif
#endif
#ifdef OPENSSL_EXTRA
#ifndef NO_BIO
int wolfSSL_ASN1_UTCTIME_print(WOLFSSL_BIO* bio, const WOLFSSL_ASN1_UTCTIME* a)
{
int ret = 1;
WOLFSSL_ENTER("wolfSSL_ASN1_UTCTIME_print");
if ((bio == NULL) || (a == NULL)) {
ret = 0;
}
if ((ret == 1) && (a->type != WOLFSSL_V_ASN1_UTCTIME)) {
WOLFSSL_MSG("Error, not UTC_TIME");
ret = 0;
}
if (ret == 1) {
ret = wolfSSL_ASN1_TIME_print(bio, a);
}
return ret;
}
#endif
#endif
#endif
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
WOLFSSL_ASN1_TYPE* wolfSSL_ASN1_TYPE_new(void)
{
WOLFSSL_ASN1_TYPE* ret;
ret = (WOLFSSL_ASN1_TYPE*)XMALLOC(sizeof(WOLFSSL_ASN1_TYPE), NULL,
DYNAMIC_TYPE_OPENSSL);
if (ret != NULL) {
XMEMSET(ret, 0, sizeof(WOLFSSL_ASN1_TYPE));
}
return ret;
}
static void wolfssl_asn1_type_free_value(WOLFSSL_ASN1_TYPE* at)
{
switch (at->type) {
case WOLFSSL_V_ASN1_NULL:
break;
case WOLFSSL_V_ASN1_OBJECT:
wolfSSL_ASN1_OBJECT_free(at->value.object);
break;
case WOLFSSL_V_ASN1_UTCTIME:
#if !defined(NO_ASN_TIME) && defined(OPENSSL_EXTRA)
wolfSSL_ASN1_TIME_free(at->value.utctime);
#endif
break;
case WOLFSSL_V_ASN1_GENERALIZEDTIME:
#if !defined(NO_ASN_TIME) && defined(OPENSSL_EXTRA)
wolfSSL_ASN1_TIME_free(at->value.generalizedtime);
#endif
break;
case WOLFSSL_V_ASN1_UTF8STRING:
case WOLFSSL_V_ASN1_OCTET_STRING:
case WOLFSSL_V_ASN1_PRINTABLESTRING:
case WOLFSSL_V_ASN1_T61STRING:
case WOLFSSL_V_ASN1_IA5STRING:
case WOLFSSL_V_ASN1_UNIVERSALSTRING:
case WOLFSSL_V_ASN1_SEQUENCE:
wolfSSL_ASN1_STRING_free(at->value.asn1_string);
break;
default:
break;
}
}
void wolfSSL_ASN1_TYPE_free(WOLFSSL_ASN1_TYPE* at)
{
if (at != NULL) {
wolfssl_asn1_type_free_value(at);
}
XFREE(at, NULL, DYNAMIC_TYPE_OPENSSL);
}
#endif
#if defined(OPENSSL_EXTRA) || defined(WOLFSSL_WPAS_SMALL)
int wolfSSL_i2d_ASN1_TYPE(WOLFSSL_ASN1_TYPE* at, unsigned char** pp)
{
int ret = WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR);
if (at == NULL)
return WOLFSSL_FATAL_ERROR;
switch (at->type) {
case WOLFSSL_V_ASN1_NULL:
break;
case WOLFSSL_V_ASN1_OBJECT:
ret = wolfSSL_i2d_ASN1_OBJECT(at->value.object, pp);
break;
case WOLFSSL_V_ASN1_UTF8STRING:
ret = wolfSSL_i2d_ASN1_UTF8STRING(at->value.utf8string, pp);
break;
case WOLFSSL_V_ASN1_GENERALIZEDTIME:
ret = wolfSSL_i2d_ASN1_GENERALSTRING(at->value.utf8string, pp);
break;
case WOLFSSL_V_ASN1_SEQUENCE:
ret = wolfSSL_i2d_ASN1_SEQUENCE(at->value.sequence, pp);
break;
case WOLFSSL_V_ASN1_UTCTIME:
case WOLFSSL_V_ASN1_PRINTABLESTRING:
case WOLFSSL_V_ASN1_T61STRING:
case WOLFSSL_V_ASN1_IA5STRING:
case WOLFSSL_V_ASN1_UNIVERSALSTRING:
default:
WOLFSSL_MSG("asn1 i2d type not supported");
break;
}
return ret;
}
#endif
#if defined(OPENSSL_ALL) || defined(OPENSSL_EXTRA) || \
defined(OPENSSL_EXTRA_X509_SMALL) || defined(WOLFSSL_WPAS_SMALL)
void wolfSSL_ASN1_TYPE_set(WOLFSSL_ASN1_TYPE *a, int type, void *value)
{
if (a != NULL) {
switch (type) {
case WOLFSSL_V_ASN1_NULL:
if (value != NULL) {
WOLFSSL_MSG("NULL tag meant to be always empty!");
}
FALL_THROUGH;
case WOLFSSL_V_ASN1_OBJECT:
case WOLFSSL_V_ASN1_UTCTIME:
case WOLFSSL_V_ASN1_GENERALIZEDTIME:
case WOLFSSL_V_ASN1_UTF8STRING:
case WOLFSSL_V_ASN1_OCTET_STRING:
case WOLFSSL_V_ASN1_PRINTABLESTRING:
case WOLFSSL_V_ASN1_T61STRING:
case WOLFSSL_V_ASN1_IA5STRING:
case WOLFSSL_V_ASN1_UNIVERSALSTRING:
case WOLFSSL_V_ASN1_SEQUENCE:
wolfssl_asn1_type_free_value(a);
a->value.ptr = (char *)value;
a->type = type;
break;
default:
WOLFSSL_MSG("Unknown or unsupported ASN1_TYPE");
}
}
}
int wolfSSL_ASN1_TYPE_get(const WOLFSSL_ASN1_TYPE *a)
{
if (a != NULL && (a->type == WOLFSSL_V_ASN1_BOOLEAN ||
a->type == WOLFSSL_V_ASN1_NULL ||
a->value.ptr != NULL)) {
return a->type;
}
return 0;
}
#endif
#endif
#endif