mirror of
https://github.com/openssl/openssl.git
synced 2024-12-15 06:01:37 +08:00
26a7d938c9
Since return is inconsistent, I removed unnecessary parentheses and unified them. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/4541)
157 lines
3.9 KiB
C
157 lines
3.9 KiB
C
/*
|
|
* Copyright 1995-2017 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the OpenSSL license (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include "internal/ctype.h"
|
|
#include "internal/cryptlib.h"
|
|
#include <openssl/buffer.h>
|
|
#include <openssl/asn1.h>
|
|
|
|
int i2a_ASN1_INTEGER(BIO *bp, const ASN1_INTEGER *a)
|
|
{
|
|
int i, n = 0;
|
|
static const char *h = "0123456789ABCDEF";
|
|
char buf[2];
|
|
|
|
if (a == NULL)
|
|
return 0;
|
|
|
|
if (a->type & V_ASN1_NEG) {
|
|
if (BIO_write(bp, "-", 1) != 1)
|
|
goto err;
|
|
n = 1;
|
|
}
|
|
|
|
if (a->length == 0) {
|
|
if (BIO_write(bp, "00", 2) != 2)
|
|
goto err;
|
|
n += 2;
|
|
} else {
|
|
for (i = 0; i < a->length; i++) {
|
|
if ((i != 0) && (i % 35 == 0)) {
|
|
if (BIO_write(bp, "\\\n", 2) != 2)
|
|
goto err;
|
|
n += 2;
|
|
}
|
|
buf[0] = h[((unsigned char)a->data[i] >> 4) & 0x0f];
|
|
buf[1] = h[((unsigned char)a->data[i]) & 0x0f];
|
|
if (BIO_write(bp, buf, 2) != 2)
|
|
goto err;
|
|
n += 2;
|
|
}
|
|
}
|
|
return n;
|
|
err:
|
|
return -1;
|
|
}
|
|
|
|
int a2i_ASN1_INTEGER(BIO *bp, ASN1_INTEGER *bs, char *buf, int size)
|
|
{
|
|
int i, j, k, m, n, again, bufsize;
|
|
unsigned char *s = NULL, *sp;
|
|
unsigned char *bufp;
|
|
int num = 0, slen = 0, first = 1;
|
|
|
|
bs->type = V_ASN1_INTEGER;
|
|
|
|
bufsize = BIO_gets(bp, buf, size);
|
|
for (;;) {
|
|
if (bufsize < 1)
|
|
goto err;
|
|
i = bufsize;
|
|
if (buf[i - 1] == '\n')
|
|
buf[--i] = '\0';
|
|
if (i == 0)
|
|
goto err;
|
|
if (buf[i - 1] == '\r')
|
|
buf[--i] = '\0';
|
|
if (i == 0)
|
|
goto err;
|
|
again = (buf[i - 1] == '\\');
|
|
|
|
for (j = 0; j < i; j++) {
|
|
if (!ossl_isxdigit(buf[j]))
|
|
{
|
|
i = j;
|
|
break;
|
|
}
|
|
}
|
|
buf[i] = '\0';
|
|
/*
|
|
* We have now cleared all the crap off the end of the line
|
|
*/
|
|
if (i < 2)
|
|
goto err;
|
|
|
|
bufp = (unsigned char *)buf;
|
|
if (first) {
|
|
first = 0;
|
|
if ((bufp[0] == '0') && (bufp[1] == '0')) {
|
|
bufp += 2;
|
|
i -= 2;
|
|
}
|
|
}
|
|
k = 0;
|
|
i -= again;
|
|
if (i % 2 != 0) {
|
|
ASN1err(ASN1_F_A2I_ASN1_INTEGER, ASN1_R_ODD_NUMBER_OF_CHARS);
|
|
OPENSSL_free(s);
|
|
return 0;
|
|
}
|
|
i /= 2;
|
|
if (num + i > slen) {
|
|
sp = OPENSSL_clear_realloc(s, slen, num + i * 2);
|
|
if (sp == NULL) {
|
|
ASN1err(ASN1_F_A2I_ASN1_INTEGER, ERR_R_MALLOC_FAILURE);
|
|
OPENSSL_free(s);
|
|
return 0;
|
|
}
|
|
s = sp;
|
|
slen = num + i * 2;
|
|
}
|
|
for (j = 0; j < i; j++, k += 2) {
|
|
for (n = 0; n < 2; n++) {
|
|
m = OPENSSL_hexchar2int(bufp[k + n]);
|
|
if (m < 0) {
|
|
ASN1err(ASN1_F_A2I_ASN1_INTEGER,
|
|
ASN1_R_NON_HEX_CHARACTERS);
|
|
goto err;
|
|
}
|
|
s[num + j] <<= 4;
|
|
s[num + j] |= m;
|
|
}
|
|
}
|
|
num += i;
|
|
if (again)
|
|
bufsize = BIO_gets(bp, buf, size);
|
|
else
|
|
break;
|
|
}
|
|
bs->length = num;
|
|
bs->data = s;
|
|
return 1;
|
|
err:
|
|
ASN1err(ASN1_F_A2I_ASN1_INTEGER, ASN1_R_SHORT_LINE);
|
|
OPENSSL_free(s);
|
|
return 0;
|
|
}
|
|
|
|
int i2a_ASN1_ENUMERATED(BIO *bp, const ASN1_ENUMERATED *a)
|
|
{
|
|
return i2a_ASN1_INTEGER(bp, a);
|
|
}
|
|
|
|
int a2i_ASN1_ENUMERATED(BIO *bp, ASN1_ENUMERATED *bs, char *buf, int size)
|
|
{
|
|
int rv = a2i_ASN1_INTEGER(bp, bs, buf, size);
|
|
if (rv == 1)
|
|
bs->type = V_ASN1_INTEGER | (bs->type & V_ASN1_NEG);
|
|
return rv;
|
|
}
|