VirtualBox

source: vbox/trunk/src/libs/openssl-3.1.7/crypto/encode_decode/decoder_lib.c@ 106601

Last change on this file since 106601 was 104078, checked in by vboxsync, 11 months ago

openssl-3.1.5: Applied and adjusted our OpenSSL changes to 3.1.4. bugref:10638

File size: 34.3 KB
Line 
1/*
2 * Copyright 2020-2023 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10#include <openssl/core_names.h>
11#include <openssl/bio.h>
12#include <openssl/params.h>
13#include <openssl/provider.h>
14#include <openssl/evperr.h>
15#include <openssl/ecerr.h>
16#include <openssl/pkcs12err.h>
17#include <openssl/x509err.h>
18#include <openssl/trace.h>
19#include "internal/bio.h"
20#include "internal/provider.h"
21#include "internal/namemap.h"
22#include "crypto/decoder.h"
23#include "encoder_local.h"
24#include "internal/e_os.h"
25
26struct decoder_process_data_st {
27 OSSL_DECODER_CTX *ctx;
28
29 /* Current BIO */
30 BIO *bio;
31
32 /* Index of the current decoder instance to be processed */
33 size_t current_decoder_inst_index;
34 /* For tracing, count recursion level */
35 size_t recursion;
36
37 /*-
38 * Flags
39 */
40 unsigned int flag_next_level_called : 1;
41 unsigned int flag_construct_called : 1;
42 unsigned int flag_input_structure_checked : 1;
43};
44
45static int decoder_process(const OSSL_PARAM params[], void *arg);
46
47int OSSL_DECODER_from_bio(OSSL_DECODER_CTX *ctx, BIO *in)
48{
49 struct decoder_process_data_st data;
50 int ok = 0;
51 BIO *new_bio = NULL;
52 unsigned long lasterr;
53
54 if (in == NULL) {
55 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
56 return 0;
57 }
58
59 if (OSSL_DECODER_CTX_get_num_decoders(ctx) == 0) {
60 ERR_raise_data(ERR_LIB_OSSL_DECODER, OSSL_DECODER_R_DECODER_NOT_FOUND,
61 "No decoders were found. For standard decoders you need "
62 "at least one of the default or base providers "
63 "available. Did you forget to load them?");
64 return 0;
65 }
66
67 lasterr = ERR_peek_last_error();
68
69 if (BIO_tell(in) < 0) {
70 new_bio = BIO_new(BIO_f_readbuffer());
71 if (new_bio == NULL)
72 return 0;
73 in = BIO_push(new_bio, in);
74 }
75 memset(&data, 0, sizeof(data));
76 data.ctx = ctx;
77 data.bio = in;
78
79 /* Enable passphrase caching */
80 (void)ossl_pw_enable_passphrase_caching(&ctx->pwdata);
81
82 ok = decoder_process(NULL, &data);
83
84 if (!data.flag_construct_called) {
85 const char *spaces
86 = ctx->start_input_type != NULL && ctx->input_structure != NULL
87 ? " " : "";
88 const char *input_type_label
89 = ctx->start_input_type != NULL ? "Input type: " : "";
90 const char *input_structure_label
91 = ctx->input_structure != NULL ? "Input structure: " : "";
92 const char *comma
93 = ctx->start_input_type != NULL && ctx->input_structure != NULL
94 ? ", " : "";
95 const char *input_type
96 = ctx->start_input_type != NULL ? ctx->start_input_type : "";
97 const char *input_structure
98 = ctx->input_structure != NULL ? ctx->input_structure : "";
99
100 if (ERR_peek_last_error() == lasterr || ERR_peek_error() == 0)
101 /* Prevent spurious decoding error but add at least something */
102 ERR_raise_data(ERR_LIB_OSSL_DECODER, ERR_R_UNSUPPORTED,
103 "No supported data to decode. %s%s%s%s%s%s",
104 spaces, input_type_label, input_type, comma,
105 input_structure_label, input_structure);
106 ok = 0;
107 }
108
109 /* Clear any internally cached passphrase */
110 (void)ossl_pw_clear_passphrase_cache(&ctx->pwdata);
111
112 if (new_bio != NULL) {
113 BIO_pop(new_bio);
114 BIO_free(new_bio);
115 }
116 return ok;
117}
118
119#ifndef OPENSSL_NO_STDIO
120static BIO *bio_from_file(FILE *fp)
121{
122 BIO *b;
123
124 if ((b = BIO_new(BIO_s_file())) == NULL) {
125 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_BIO_LIB);
126 return NULL;
127 }
128 BIO_set_fp(b, fp, BIO_NOCLOSE);
129 return b;
130}
131
132int OSSL_DECODER_from_fp(OSSL_DECODER_CTX *ctx, FILE *fp)
133{
134 BIO *b = bio_from_file(fp);
135 int ret = 0;
136
137 if (b != NULL)
138 ret = OSSL_DECODER_from_bio(ctx, b);
139
140 BIO_free(b);
141 return ret;
142}
143#endif
144
145int OSSL_DECODER_from_data(OSSL_DECODER_CTX *ctx, const unsigned char **pdata,
146 size_t *pdata_len)
147{
148 BIO *membio;
149 int ret = 0;
150
151 if (pdata == NULL || *pdata == NULL || pdata_len == NULL) {
152 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
153 return 0;
154 }
155
156 membio = BIO_new_mem_buf(*pdata, (int)*pdata_len);
157 if (OSSL_DECODER_from_bio(ctx, membio)) {
158 *pdata_len = (size_t)BIO_get_mem_data(membio, pdata);
159 ret = 1;
160 }
161 BIO_free(membio);
162
163 return ret;
164}
165
166int OSSL_DECODER_CTX_set_selection(OSSL_DECODER_CTX *ctx, int selection)
167{
168 if (!ossl_assert(ctx != NULL)) {
169 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
170 return 0;
171 }
172
173 /*
174 * 0 is a valid selection, and means that the caller leaves
175 * it to code to discover what the selection is.
176 */
177 ctx->selection = selection;
178 return 1;
179}
180
181int OSSL_DECODER_CTX_set_input_type(OSSL_DECODER_CTX *ctx,
182 const char *input_type)
183{
184 if (!ossl_assert(ctx != NULL)) {
185 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
186 return 0;
187 }
188
189 /*
190 * NULL is a valid starting input type, and means that the caller leaves
191 * it to code to discover what the starting input type is.
192 */
193 ctx->start_input_type = input_type;
194 return 1;
195}
196
197int OSSL_DECODER_CTX_set_input_structure(OSSL_DECODER_CTX *ctx,
198 const char *input_structure)
199{
200 if (!ossl_assert(ctx != NULL)) {
201 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
202 return 0;
203 }
204
205 /*
206 * NULL is a valid starting input structure, and means that the caller
207 * leaves it to code to discover what the starting input structure is.
208 */
209 ctx->input_structure = input_structure;
210 return 1;
211}
212
213OSSL_DECODER_INSTANCE *ossl_decoder_instance_new(OSSL_DECODER *decoder,
214 void *decoderctx)
215{
216 OSSL_DECODER_INSTANCE *decoder_inst = NULL;
217 const OSSL_PROVIDER *prov;
218 OSSL_LIB_CTX *libctx;
219 const OSSL_PROPERTY_LIST *props;
220 const OSSL_PROPERTY_DEFINITION *prop;
221
222 if (!ossl_assert(decoder != NULL)) {
223 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
224 return 0;
225 }
226
227 if ((decoder_inst = OPENSSL_zalloc(sizeof(*decoder_inst))) == NULL) {
228 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_MALLOC_FAILURE);
229 return 0;
230 }
231
232 prov = OSSL_DECODER_get0_provider(decoder);
233 libctx = ossl_provider_libctx(prov);
234 props = ossl_decoder_parsed_properties(decoder);
235 if (props == NULL) {
236 ERR_raise_data(ERR_LIB_OSSL_DECODER, ERR_R_INVALID_PROPERTY_DEFINITION,
237 "there are no property definitions with decoder %s",
238 OSSL_DECODER_get0_name(decoder));
239 goto err;
240 }
241
242 /* The "input" property is mandatory */
243 prop = ossl_property_find_property(props, libctx, "input");
244 decoder_inst->input_type = ossl_property_get_string_value(libctx, prop);
245 decoder_inst->input_type_id = 0;
246 if (decoder_inst->input_type == NULL) {
247 ERR_raise_data(ERR_LIB_OSSL_DECODER, ERR_R_INVALID_PROPERTY_DEFINITION,
248 "the mandatory 'input' property is missing "
249 "for decoder %s (properties: %s)",
250 OSSL_DECODER_get0_name(decoder),
251 OSSL_DECODER_get0_properties(decoder));
252 goto err;
253 }
254
255 /* The "structure" property is optional */
256 prop = ossl_property_find_property(props, libctx, "structure");
257 if (prop != NULL) {
258 decoder_inst->input_structure
259 = ossl_property_get_string_value(libctx, prop);
260 }
261
262 if (!OSSL_DECODER_up_ref(decoder)) {
263 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_INTERNAL_ERROR);
264 goto err;
265 }
266 decoder_inst->decoder = decoder;
267 decoder_inst->decoderctx = decoderctx;
268 return decoder_inst;
269 err:
270 ossl_decoder_instance_free(decoder_inst);
271 return NULL;
272}
273
274void ossl_decoder_instance_free(OSSL_DECODER_INSTANCE *decoder_inst)
275{
276 if (decoder_inst != NULL) {
277 if (decoder_inst->decoder != NULL)
278 decoder_inst->decoder->freectx(decoder_inst->decoderctx);
279 decoder_inst->decoderctx = NULL;
280 OSSL_DECODER_free(decoder_inst->decoder);
281 decoder_inst->decoder = NULL;
282 OPENSSL_free(decoder_inst);
283 }
284}
285
286int ossl_decoder_ctx_add_decoder_inst(OSSL_DECODER_CTX *ctx,
287 OSSL_DECODER_INSTANCE *di)
288{
289 int ok;
290
291 if (ctx->decoder_insts == NULL
292 && (ctx->decoder_insts =
293 sk_OSSL_DECODER_INSTANCE_new_null()) == NULL) {
294 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_MALLOC_FAILURE);
295 return 0;
296 }
297
298 ok = (sk_OSSL_DECODER_INSTANCE_push(ctx->decoder_insts, di) > 0);
299 if (ok) {
300 OSSL_TRACE_BEGIN(DECODER) {
301 BIO_printf(trc_out,
302 "(ctx %p) Added decoder instance %p for decoder %p\n"
303 " %s with %s\n",
304 (void *)ctx, (void *)di, (void *)di->decoder,
305 OSSL_DECODER_get0_name(di->decoder),
306 OSSL_DECODER_get0_properties(di->decoder));
307 } OSSL_TRACE_END(DECODER);
308 }
309 return ok;
310}
311
312int OSSL_DECODER_CTX_add_decoder(OSSL_DECODER_CTX *ctx, OSSL_DECODER *decoder)
313{
314 OSSL_DECODER_INSTANCE *decoder_inst = NULL;
315 const OSSL_PROVIDER *prov = NULL;
316 void *decoderctx = NULL;
317 void *provctx = NULL;
318
319 if (!ossl_assert(ctx != NULL) || !ossl_assert(decoder != NULL)) {
320 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
321 return 0;
322 }
323
324 prov = OSSL_DECODER_get0_provider(decoder);
325 provctx = OSSL_PROVIDER_get0_provider_ctx(prov);
326
327 if ((decoderctx = decoder->newctx(provctx)) == NULL
328 || (decoder_inst =
329 ossl_decoder_instance_new(decoder, decoderctx)) == NULL)
330 goto err;
331 /* Avoid double free of decoderctx on further errors */
332 decoderctx = NULL;
333
334 if (!ossl_decoder_ctx_add_decoder_inst(ctx, decoder_inst))
335 goto err;
336
337 return 1;
338 err:
339 ossl_decoder_instance_free(decoder_inst);
340 if (decoderctx != NULL)
341 decoder->freectx(decoderctx);
342 return 0;
343}
344
345struct collect_extra_decoder_data_st {
346 OSSL_DECODER_CTX *ctx;
347 const char *output_type;
348 int output_type_id;
349
350 /*
351 * 0 to check that the decoder's input type is the same as the decoder name
352 * 1 to check that the decoder's input type differs from the decoder name
353 */
354 enum { IS_SAME = 0, IS_DIFFERENT = 1 } type_check;
355 size_t w_prev_start, w_prev_end; /* "previous" decoders */
356 size_t w_new_start, w_new_end; /* "new" decoders */
357};
358
359DEFINE_STACK_OF(OSSL_DECODER)
360
361static void collect_all_decoders(OSSL_DECODER *decoder, void *arg)
362{
363 STACK_OF(OSSL_DECODER) *skdecoders = arg;
364
365 if (OSSL_DECODER_up_ref(decoder)
366 && !sk_OSSL_DECODER_push(skdecoders, decoder))
367 OSSL_DECODER_free(decoder);
368}
369
370static void collect_extra_decoder(OSSL_DECODER *decoder, void *arg)
371{
372 struct collect_extra_decoder_data_st *data = arg;
373 size_t j;
374 const OSSL_PROVIDER *prov = OSSL_DECODER_get0_provider(decoder);
375 void *provctx = OSSL_PROVIDER_get0_provider_ctx(prov);
376
377 if (ossl_decoder_fast_is_a(decoder, data->output_type, &data->output_type_id)) {
378 void *decoderctx = NULL;
379 OSSL_DECODER_INSTANCE *di = NULL;
380
381 OSSL_TRACE_BEGIN(DECODER) {
382 BIO_printf(trc_out,
383 "(ctx %p) [%d] Checking out decoder %p:\n"
384 " %s with %s\n",
385 (void *)data->ctx, data->type_check, (void *)decoder,
386 OSSL_DECODER_get0_name(decoder),
387 OSSL_DECODER_get0_properties(decoder));
388 } OSSL_TRACE_END(DECODER);
389
390 /*
391 * Check that we don't already have this decoder in our stack,
392 * starting with the previous windows but also looking at what
393 * we have added in the current window.
394 */
395 for (j = data->w_prev_start; j < data->w_new_end; j++) {
396 OSSL_DECODER_INSTANCE *check_inst =
397 sk_OSSL_DECODER_INSTANCE_value(data->ctx->decoder_insts, j);
398
399 if (decoder->base.algodef == check_inst->decoder->base.algodef) {
400 /* We found it, so don't do anything more */
401 OSSL_TRACE_BEGIN(DECODER) {
402 BIO_printf(trc_out,
403 " REJECTED: already exists in the chain\n");
404 } OSSL_TRACE_END(DECODER);
405 return;
406 }
407 }
408
409 if ((decoderctx = decoder->newctx(provctx)) == NULL)
410 return;
411
412 if ((di = ossl_decoder_instance_new(decoder, decoderctx)) == NULL) {
413 decoder->freectx(decoderctx);
414 return;
415 }
416
417 switch (data->type_check) {
418 case IS_SAME:
419 /* If it differs, this is not a decoder to add for now. */
420 if (!ossl_decoder_fast_is_a(decoder,
421 OSSL_DECODER_INSTANCE_get_input_type(di),
422 &di->input_type_id)) {
423 ossl_decoder_instance_free(di);
424 OSSL_TRACE_BEGIN(DECODER) {
425 BIO_printf(trc_out,
426 " REJECTED: input type doesn't match output type\n");
427 } OSSL_TRACE_END(DECODER);
428 return;
429 }
430 break;
431 case IS_DIFFERENT:
432 /* If it's the same, this is not a decoder to add for now. */
433 if (ossl_decoder_fast_is_a(decoder,
434 OSSL_DECODER_INSTANCE_get_input_type(di),
435 &di->input_type_id)) {
436 ossl_decoder_instance_free(di);
437 OSSL_TRACE_BEGIN(DECODER) {
438 BIO_printf(trc_out,
439 " REJECTED: input type matches output type\n");
440 } OSSL_TRACE_END(DECODER);
441 return;
442 }
443 break;
444 }
445
446 /*
447 * Apart from keeping w_new_end up to date, We don't care about
448 * errors here. If it doesn't collect, then it doesn't...
449 */
450 if (!ossl_decoder_ctx_add_decoder_inst(data->ctx, di)) {
451 ossl_decoder_instance_free(di);
452 return;
453 }
454
455 data->w_new_end++;
456 }
457}
458
459int OSSL_DECODER_CTX_add_extra(OSSL_DECODER_CTX *ctx,
460 OSSL_LIB_CTX *libctx, const char *propq)
461{
462 /*
463 * This function goes through existing decoder methods in
464 * |ctx->decoder_insts|, and tries to fetch new decoders that produce
465 * what the existing ones want as input, and push those newly fetched
466 * decoders on top of the same stack.
467 * Then it does the same again, but looping over the newly fetched
468 * decoders, until there are no more decoders to be fetched, or
469 * when we have done this 10 times.
470 *
471 * we do this with sliding windows on the stack by keeping track of indexes
472 * and of the end.
473 *
474 * +----------------+
475 * | DER to RSA | <--- w_prev_start
476 * +----------------+
477 * | DER to DSA |
478 * +----------------+
479 * | DER to DH |
480 * +----------------+
481 * | PEM to DER | <--- w_prev_end, w_new_start
482 * +----------------+
483 * <--- w_new_end
484 */
485 struct collect_extra_decoder_data_st data;
486 size_t depth = 0; /* Counts the number of iterations */
487 size_t count; /* Calculates how many were added in each iteration */
488 size_t numdecoders;
489 STACK_OF(OSSL_DECODER) *skdecoders;
490
491 if (!ossl_assert(ctx != NULL)) {
492 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
493 return 0;
494 }
495
496 /*
497 * If there is no stack of OSSL_DECODER_INSTANCE, we have nothing
498 * more to add. That's fine.
499 */
500 if (ctx->decoder_insts == NULL)
501 return 1;
502
503 OSSL_TRACE_BEGIN(DECODER) {
504 BIO_printf(trc_out, "(ctx %p) Looking for extra decoders\n",
505 (void *)ctx);
506 } OSSL_TRACE_END(DECODER);
507
508
509 skdecoders = sk_OSSL_DECODER_new_null();
510 if (skdecoders == NULL) {
511 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_MALLOC_FAILURE);
512 return 0;
513 }
514 OSSL_DECODER_do_all_provided(libctx, collect_all_decoders, skdecoders);
515 numdecoders = sk_OSSL_DECODER_num(skdecoders);
516
517 memset(&data, 0, sizeof(data));
518 data.ctx = ctx;
519 data.w_prev_start = 0;
520 data.w_prev_end = sk_OSSL_DECODER_INSTANCE_num(ctx->decoder_insts);
521 do {
522 size_t i, j;
523
524 data.w_new_start = data.w_new_end = data.w_prev_end;
525
526 /*
527 * Two iterations:
528 * 0. All decoders that have the same name as their input type.
529 * This allows for decoders that unwrap some data in a specific
530 * encoding, and pass the result on with the same encoding.
531 * 1. All decoders that a different name than their input type.
532 */
533 for (data.type_check = IS_SAME;
534 data.type_check <= IS_DIFFERENT;
535 data.type_check++) {
536 for (i = data.w_prev_start; i < data.w_prev_end; i++) {
537 OSSL_DECODER_INSTANCE *decoder_inst =
538 sk_OSSL_DECODER_INSTANCE_value(ctx->decoder_insts, i);
539
540 data.output_type
541 = OSSL_DECODER_INSTANCE_get_input_type(decoder_inst);
542
543 data.output_type_id = 0;
544
545 for (j = 0; j < numdecoders; j++)
546 collect_extra_decoder(sk_OSSL_DECODER_value(skdecoders, j),
547 &data);
548 }
549 }
550 /* How many were added in this iteration */
551 count = data.w_new_end - data.w_new_start;
552
553 /* Slide the "previous decoder" windows */
554 data.w_prev_start = data.w_new_start;
555 data.w_prev_end = data.w_new_end;
556
557 depth++;
558 } while (count != 0 && depth <= 10);
559
560 sk_OSSL_DECODER_pop_free(skdecoders, OSSL_DECODER_free);
561 return 1;
562}
563
564int OSSL_DECODER_CTX_get_num_decoders(OSSL_DECODER_CTX *ctx)
565{
566 if (ctx == NULL || ctx->decoder_insts == NULL)
567 return 0;
568 return sk_OSSL_DECODER_INSTANCE_num(ctx->decoder_insts);
569}
570
571int OSSL_DECODER_CTX_set_construct(OSSL_DECODER_CTX *ctx,
572 OSSL_DECODER_CONSTRUCT *construct)
573{
574 if (!ossl_assert(ctx != NULL)) {
575 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
576 return 0;
577 }
578 ctx->construct = construct;
579 return 1;
580}
581
582int OSSL_DECODER_CTX_set_construct_data(OSSL_DECODER_CTX *ctx,
583 void *construct_data)
584{
585 if (!ossl_assert(ctx != NULL)) {
586 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
587 return 0;
588 }
589 ctx->construct_data = construct_data;
590 return 1;
591}
592
593int OSSL_DECODER_CTX_set_cleanup(OSSL_DECODER_CTX *ctx,
594 OSSL_DECODER_CLEANUP *cleanup)
595{
596 if (!ossl_assert(ctx != NULL)) {
597 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
598 return 0;
599 }
600 ctx->cleanup = cleanup;
601 return 1;
602}
603
604OSSL_DECODER_CONSTRUCT *
605OSSL_DECODER_CTX_get_construct(OSSL_DECODER_CTX *ctx)
606{
607 if (ctx == NULL)
608 return NULL;
609 return ctx->construct;
610}
611
612void *OSSL_DECODER_CTX_get_construct_data(OSSL_DECODER_CTX *ctx)
613{
614 if (ctx == NULL)
615 return NULL;
616 return ctx->construct_data;
617}
618
619OSSL_DECODER_CLEANUP *
620OSSL_DECODER_CTX_get_cleanup(OSSL_DECODER_CTX *ctx)
621{
622 if (ctx == NULL)
623 return NULL;
624 return ctx->cleanup;
625}
626
627int OSSL_DECODER_export(OSSL_DECODER_INSTANCE *decoder_inst,
628 void *reference, size_t reference_sz,
629 OSSL_CALLBACK *export_cb, void *export_cbarg)
630{
631 OSSL_DECODER *decoder = NULL;
632 void *decoderctx = NULL;
633
634 if (!(ossl_assert(decoder_inst != NULL)
635 && ossl_assert(reference != NULL)
636 && ossl_assert(export_cb != NULL)
637 && ossl_assert(export_cbarg != NULL))) {
638 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_PASSED_NULL_PARAMETER);
639 return 0;
640 }
641
642 decoder = OSSL_DECODER_INSTANCE_get_decoder(decoder_inst);
643 decoderctx = OSSL_DECODER_INSTANCE_get_decoder_ctx(decoder_inst);
644 return decoder->export_object(decoderctx, reference, reference_sz,
645 export_cb, export_cbarg);
646}
647
648OSSL_DECODER *
649OSSL_DECODER_INSTANCE_get_decoder(OSSL_DECODER_INSTANCE *decoder_inst)
650{
651 if (decoder_inst == NULL)
652 return NULL;
653 return decoder_inst->decoder;
654}
655
656void *
657OSSL_DECODER_INSTANCE_get_decoder_ctx(OSSL_DECODER_INSTANCE *decoder_inst)
658{
659 if (decoder_inst == NULL)
660 return NULL;
661 return decoder_inst->decoderctx;
662}
663
664const char *
665OSSL_DECODER_INSTANCE_get_input_type(OSSL_DECODER_INSTANCE *decoder_inst)
666{
667 if (decoder_inst == NULL)
668 return NULL;
669 return decoder_inst->input_type;
670}
671
672const char *
673OSSL_DECODER_INSTANCE_get_input_structure(OSSL_DECODER_INSTANCE *decoder_inst,
674 int *was_set)
675{
676 if (decoder_inst == NULL)
677 return NULL;
678 *was_set = decoder_inst->flag_input_structure_was_set;
679 return decoder_inst->input_structure;
680}
681
682static int decoder_process(const OSSL_PARAM params[], void *arg)
683{
684 struct decoder_process_data_st *data = arg;
685 OSSL_DECODER_CTX *ctx = data->ctx;
686 OSSL_DECODER_INSTANCE *decoder_inst = NULL;
687 OSSL_DECODER *decoder = NULL;
688 OSSL_CORE_BIO *cbio = NULL;
689 BIO *bio = data->bio;
690 long loc;
691 size_t i;
692 int ok = 0;
693 /* For recursions */
694 struct decoder_process_data_st new_data;
695 const char *data_type = NULL;
696 const char *data_structure = NULL;
697
698 /*
699 * This is an indicator up the call stack that something was indeed
700 * decoded, leading to a recursive call of this function.
701 */
702 data->flag_next_level_called = 1;
703
704 memset(&new_data, 0, sizeof(new_data));
705 new_data.ctx = data->ctx;
706 new_data.recursion = data->recursion + 1;
707
708#define LEVEL_STR ">>>>>>>>>>>>>>>>"
709#define LEVEL (new_data.recursion < sizeof(LEVEL_STR) \
710 ? &LEVEL_STR[sizeof(LEVEL_STR) - new_data.recursion - 1] \
711 : LEVEL_STR "...")
712
713 if (params == NULL) {
714 /* First iteration, where we prepare for what is to come */
715
716 OSSL_TRACE_BEGIN(DECODER) {
717 BIO_printf(trc_out,
718 "(ctx %p) starting to walk the decoder chain\n",
719 (void *)new_data.ctx);
720 } OSSL_TRACE_END(DECODER);
721
722 data->current_decoder_inst_index =
723 OSSL_DECODER_CTX_get_num_decoders(ctx);
724
725 bio = data->bio;
726 } else {
727 const OSSL_PARAM *p;
728 const char *trace_data_structure;
729
730 decoder_inst =
731 sk_OSSL_DECODER_INSTANCE_value(ctx->decoder_insts,
732 data->current_decoder_inst_index);
733 decoder = OSSL_DECODER_INSTANCE_get_decoder(decoder_inst);
734
735 data->flag_construct_called = 0;
736 if (ctx->construct != NULL) {
737 int rv;
738
739 OSSL_TRACE_BEGIN(DECODER) {
740 BIO_printf(trc_out,
741 "(ctx %p) %s Running constructor\n",
742 (void *)new_data.ctx, LEVEL);
743 } OSSL_TRACE_END(DECODER);
744
745 rv = ctx->construct(decoder_inst, params, ctx->construct_data);
746
747 OSSL_TRACE_BEGIN(DECODER) {
748 BIO_printf(trc_out,
749 "(ctx %p) %s Running constructor => %d\n",
750 (void *)new_data.ctx, LEVEL, rv);
751 } OSSL_TRACE_END(DECODER);
752
753 ok = (rv > 0);
754 if (ok) {
755 data->flag_construct_called = 1;
756 goto end;
757 }
758 }
759
760 /* The constructor didn't return success */
761
762 /*
763 * so we try to use the object we got and feed it to any next
764 * decoder that will take it. Object references are not
765 * allowed for this.
766 * If this data isn't present, decoding has failed.
767 */
768
769 p = OSSL_PARAM_locate_const(params, OSSL_OBJECT_PARAM_DATA);
770 if (p == NULL || p->data_type != OSSL_PARAM_OCTET_STRING)
771 goto end;
772 new_data.bio = BIO_new_mem_buf(p->data, (int)p->data_size);
773 if (new_data.bio == NULL)
774 goto end;
775 bio = new_data.bio;
776
777 /* Get the data type if there is one */
778 p = OSSL_PARAM_locate_const(params, OSSL_OBJECT_PARAM_DATA_TYPE);
779 if (p != NULL && !OSSL_PARAM_get_utf8_string_ptr(p, &data_type))
780 goto end;
781
782 /* Get the data structure if there is one */
783 p = OSSL_PARAM_locate_const(params, OSSL_OBJECT_PARAM_DATA_STRUCTURE);
784 if (p != NULL && !OSSL_PARAM_get_utf8_string_ptr(p, &data_structure))
785 goto end;
786
787 /*
788 * If the data structure is "type-specific" and the data type is
789 * given, we drop the data structure. The reasoning is that the
790 * data type is already enough to find the applicable next decoder,
791 * so an additional "type-specific" data structure is extraneous.
792 *
793 * Furthermore, if the OSSL_DECODER caller asked for a type specific
794 * structure under another name, such as "DH", we get a mismatch
795 * if the data structure we just received is "type-specific".
796 * There's only so much you can do without infusing this code with
797 * too special knowledge.
798 */
799 trace_data_structure = data_structure;
800 if (data_type != NULL && data_structure != NULL
801 && OPENSSL_strcasecmp(data_structure, "type-specific") == 0)
802 data_structure = NULL;
803
804 OSSL_TRACE_BEGIN(DECODER) {
805 BIO_printf(trc_out,
806 "(ctx %p) %s incoming from previous decoder (%p):\n"
807 " data type: %s, data structure: %s%s\n",
808 (void *)new_data.ctx, LEVEL, (void *)decoder,
809 data_type, trace_data_structure,
810 (trace_data_structure == data_structure
811 ? "" : " (dropped)"));
812 } OSSL_TRACE_END(DECODER);
813 }
814
815 /*
816 * If we have no more decoders to look through at this point,
817 * we failed
818 */
819 if (data->current_decoder_inst_index == 0)
820 goto end;
821
822 if ((loc = BIO_tell(bio)) < 0) {
823 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_BIO_LIB);
824 goto end;
825 }
826
827 if ((cbio = ossl_core_bio_new_from_bio(bio)) == NULL) {
828 ERR_raise(ERR_LIB_OSSL_DECODER, ERR_R_MALLOC_FAILURE);
829 goto end;
830 }
831
832 for (i = data->current_decoder_inst_index; i-- > 0;) {
833 OSSL_DECODER_INSTANCE *new_decoder_inst =
834 sk_OSSL_DECODER_INSTANCE_value(ctx->decoder_insts, i);
835 OSSL_DECODER *new_decoder =
836 OSSL_DECODER_INSTANCE_get_decoder(new_decoder_inst);
837 void *new_decoderctx =
838 OSSL_DECODER_INSTANCE_get_decoder_ctx(new_decoder_inst);
839 const char *new_input_type =
840 OSSL_DECODER_INSTANCE_get_input_type(new_decoder_inst);
841 int n_i_s_was_set = 0; /* We don't care here */
842 const char *new_input_structure =
843 OSSL_DECODER_INSTANCE_get_input_structure(new_decoder_inst,
844 &n_i_s_was_set);
845
846 OSSL_TRACE_BEGIN(DECODER) {
847 BIO_printf(trc_out,
848 "(ctx %p) %s [%u] Considering decoder instance %p (decoder %p):\n"
849 " %s with %s\n",
850 (void *)new_data.ctx, LEVEL, (unsigned int)i,
851 (void *)new_decoder_inst, (void *)new_decoder,
852 OSSL_DECODER_get0_name(new_decoder),
853 OSSL_DECODER_get0_properties(new_decoder));
854 } OSSL_TRACE_END(DECODER);
855
856 /*
857 * If |decoder| is NULL, it means we've just started, and the caller
858 * may have specified what it expects the initial input to be. If
859 * that's the case, we do this extra check.
860 */
861 if (decoder == NULL && ctx->start_input_type != NULL
862 && OPENSSL_strcasecmp(ctx->start_input_type, new_input_type) != 0) {
863 OSSL_TRACE_BEGIN(DECODER) {
864 BIO_printf(trc_out,
865 "(ctx %p) %s [%u] the start input type '%s' doesn't match the input type of the considered decoder, skipping...\n",
866 (void *)new_data.ctx, LEVEL, (unsigned int)i,
867 ctx->start_input_type);
868 } OSSL_TRACE_END(DECODER);
869 continue;
870 }
871
872 /*
873 * If we have a previous decoder, we check that the input type
874 * of the next to be used matches the type of this previous one.
875 * |new_input_type| holds the value of the "input-type" parameter
876 * for the decoder we're currently considering.
877 */
878 if (decoder != NULL && !ossl_decoder_fast_is_a(decoder, new_input_type,
879 &new_decoder_inst->input_type_id)) {
880 OSSL_TRACE_BEGIN(DECODER) {
881 BIO_printf(trc_out,
882 "(ctx %p) %s [%u] the input type doesn't match the name of the previous decoder (%p), skipping...\n",
883 (void *)new_data.ctx, LEVEL, (unsigned int)i,
884 (void *)decoder);
885 } OSSL_TRACE_END(DECODER);
886 continue;
887 }
888
889 /*
890 * If the previous decoder gave us a data type, we check to see
891 * if that matches the decoder we're currently considering.
892 */
893 if (data_type != NULL && !OSSL_DECODER_is_a(new_decoder, data_type)) {
894 OSSL_TRACE_BEGIN(DECODER) {
895 BIO_printf(trc_out,
896 "(ctx %p) %s [%u] the previous decoder's data type doesn't match the name of the considered decoder, skipping...\n",
897 (void *)new_data.ctx, LEVEL, (unsigned int)i);
898 } OSSL_TRACE_END(DECODER);
899 continue;
900 }
901
902 /*
903 * If the previous decoder gave us a data structure name, we check
904 * to see that it matches the input data structure of the decoder
905 * we're currently considering.
906 */
907 if (data_structure != NULL
908 && (new_input_structure == NULL
909 || OPENSSL_strcasecmp(data_structure,
910 new_input_structure) != 0)) {
911 OSSL_TRACE_BEGIN(DECODER) {
912 BIO_printf(trc_out,
913 "(ctx %p) %s [%u] the previous decoder's data structure doesn't match the input structure of the considered decoder, skipping...\n",
914 (void *)new_data.ctx, LEVEL, (unsigned int)i);
915 } OSSL_TRACE_END(DECODER);
916 continue;
917 }
918
919 /*
920 * If the decoder we're currently considering specifies a structure,
921 * and this check hasn't already been done earlier in this chain of
922 * decoder_process() calls, check that it matches the user provided
923 * input structure, if one is given.
924 */
925 if (!data->flag_input_structure_checked
926 && ctx->input_structure != NULL
927 && new_input_structure != NULL) {
928 data->flag_input_structure_checked = 1;
929 if (OPENSSL_strcasecmp(new_input_structure,
930 ctx->input_structure) != 0) {
931 OSSL_TRACE_BEGIN(DECODER) {
932 BIO_printf(trc_out,
933 "(ctx %p) %s [%u] the previous decoder's data structure doesn't match the input structure given by the user, skipping...\n",
934 (void *)new_data.ctx, LEVEL, (unsigned int)i);
935 } OSSL_TRACE_END(DECODER);
936 continue;
937 }
938 }
939
940 /*
941 * Checking the return value of BIO_reset() or BIO_seek() is unsafe.
942 * Furthermore, BIO_reset() is unsafe to use if the source BIO happens
943 * to be a BIO_s_mem(), because the earlier BIO_tell() gives us zero
944 * no matter where we are in the underlying buffer we're reading from.
945 *
946 * So, we simply do a BIO_seek(), and use BIO_tell() that we're back
947 * at the same position. This is a best effort attempt, but BIO_seek()
948 * and BIO_tell() should come as a pair...
949 */
950 (void)BIO_seek(bio, loc);
951 if (BIO_tell(bio) != loc)
952 goto end;
953
954 /* Recurse */
955 OSSL_TRACE_BEGIN(DECODER) {
956 BIO_printf(trc_out,
957 "(ctx %p) %s [%u] Running decoder instance %p\n",
958 (void *)new_data.ctx, LEVEL, (unsigned int)i,
959 (void *)new_decoder_inst);
960 } OSSL_TRACE_END(DECODER);
961
962 /*
963 * We only care about errors reported from decoder implementations
964 * if it returns false (i.e. there was a fatal error).
965 */
966 ERR_set_mark();
967
968 new_data.current_decoder_inst_index = i;
969 new_data.flag_input_structure_checked
970 = data->flag_input_structure_checked;
971 ok = new_decoder->decode(new_decoderctx, cbio,
972 new_data.ctx->selection,
973 decoder_process, &new_data,
974 ossl_pw_passphrase_callback_dec,
975 &new_data.ctx->pwdata);
976
977 OSSL_TRACE_BEGIN(DECODER) {
978 BIO_printf(trc_out,
979 "(ctx %p) %s [%u] Running decoder instance %p => %d"
980 " (recursed further: %s, construct called: %s)\n",
981 (void *)new_data.ctx, LEVEL, (unsigned int)i,
982 (void *)new_decoder_inst, ok,
983 new_data.flag_next_level_called ? "yes" : "no",
984 new_data.flag_construct_called ? "yes" : "no");
985 } OSSL_TRACE_END(DECODER);
986
987 data->flag_construct_called = new_data.flag_construct_called;
988
989 /* Break on error or if we tried to construct an object already */
990 if (!ok || data->flag_construct_called) {
991 ERR_clear_last_mark();
992 break;
993 }
994 ERR_pop_to_mark();
995
996 /*
997 * Break if the decoder implementation that we called recursed, since
998 * that indicates that it successfully decoded something.
999 */
1000 if (new_data.flag_next_level_called)
1001 break;
1002 }
1003
1004 end:
1005 ossl_core_bio_free(cbio);
1006 BIO_free(new_data.bio);
1007 return ok;
1008}
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette