Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-cw
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-cw
Commits
d494c3ab
Commit
d494c3ab
authored
Jun 29, 2005
by
Juan Lang
Committed by
Alexandre Julliard
Jun 29, 2005
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
- fix decoding of long-form data lengths
- use exception handling in decoding - tests for these changes
parent
6737d969
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
1196 additions
and
909 deletions
+1196
-909
encode.c
dlls/crypt32/encode.c
+1154
-899
encode.c
dlls/crypt32/tests/encode.c
+42
-10
No files found.
dlls/crypt32/encode.c
View file @
d494c3ab
...
@@ -43,6 +43,9 @@
...
@@ -43,6 +43,9 @@
#include "wine/debug.h"
#include "wine/debug.h"
#include "wine/exception.h"
#include "wine/exception.h"
/* This is a bit arbitrary, but to set some limit: */
#define MAX_ENCODED_LEN 0x02000000
/* a few asn.1 tags we need */
/* a few asn.1 tags we need */
#define ASN_BOOL (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x01)
#define ASN_BOOL (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x01)
#define ASN_BITSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x03)
#define ASN_BITSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x03)
...
@@ -1553,7 +1556,7 @@ static BOOL WINAPI CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded,
...
@@ -1553,7 +1556,7 @@ static BOOL WINAPI CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded,
{
{
BYTE
lenLen
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
BYTE
lenLen
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
if
(
lenLen
>
sizeof
(
DWORD
))
if
(
lenLen
>
sizeof
(
DWORD
)
+
1
)
{
{
SetLastError
(
CRYPT_E_ASN1_LARGE
);
SetLastError
(
CRYPT_E_ASN1_LARGE
);
ret
=
FALSE
;
ret
=
FALSE
;
...
@@ -1568,7 +1571,7 @@ static BOOL WINAPI CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded,
...
@@ -1568,7 +1571,7 @@ static BOOL WINAPI CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded,
DWORD
out
=
0
;
DWORD
out
=
0
;
pbEncoded
+=
2
;
pbEncoded
+=
2
;
while
(
lenLen
--
)
while
(
--
lenLen
)
{
{
out
<<=
8
;
out
<<=
8
;
out
|=
*
pbEncoded
++
;
out
|=
*
pbEncoded
++
;
...
@@ -1625,90 +1628,109 @@ static BOOL WINAPI CRYPT_AsnDecodeOid(DWORD dwCertEncodingType,
...
@@ -1625,90 +1628,109 @@ static BOOL WINAPI CRYPT_AsnDecodeOid(DWORD dwCertEncodingType,
DWORD
*
pcbObjId
)
DWORD
*
pcbObjId
)
{
{
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
DWORD
bytesNeeded
,
dataLen
;
BYTE
lenBytes
;
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
__TRY
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
ASN_OBJECTIDENTIFIER
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
if
(
dataLen
)
{
{
/* The largest possible string for the first two components is 2.175
if
(
pbEncoded
[
0
]
==
ASN_OBJECTIDENTIFIER
)
* (= 2 * 40 + 175 = 255), so this is big enough.
*/
char
firstTwo
[
6
];
const
BYTE
*
ptr
;
snprintf
(
firstTwo
,
sizeof
(
firstTwo
),
"%d.%d"
,
pbEncoded
[
1
+
lenBytes
]
/
40
,
pbEncoded
[
1
+
lenBytes
]
-
(
pbEncoded
[
1
+
lenBytes
]
/
40
)
*
40
);
bytesNeeded
=
strlen
(
firstTwo
)
+
1
;
for
(
ptr
=
pbEncoded
+
2
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
{
/* large enough for ".4000000" */
DWORD
dataLen
;
char
str
[
9
];
int
val
=
0
;
while
(
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
&&
(
*
ptr
&
0x80
))
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
{
val
<<=
7
;
val
|=
*
ptr
&
0x7f
;
ptr
++
;
}
if
(
ptr
-
pbEncoded
-
1
-
lenBytes
>=
dataLen
||
(
*
ptr
&
0x80
))
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
{
{
val
<<=
7
;
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
val
|=
*
ptr
++
;
DWORD
bytesNeeded
;
snprintf
(
str
,
sizeof
(
str
),
".%d"
,
val
);
bytesNeeded
+=
strlen
(
str
);
}
}
if
(
!
pszObjId
)
*
pcbObjId
=
bytesNeeded
;
else
if
(
*
pcbObjId
<
bytesNeeded
)
{
*
pcbObjId
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
ret
=
FALSE
;
}
else
{
sprintf
(
pszObjId
,
"%d.%d"
,
pbEncoded
[
1
+
lenBytes
]
/
40
,
pbEncoded
[
1
+
lenBytes
]
-
(
pbEncoded
[
1
+
lenBytes
]
/
40
)
*
40
);
pszObjId
+=
strlen
(
pszObjId
);
for
(
ptr
=
pbEncoded
+
2
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
int
val
=
0
;
while
(
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
&&
if
(
dataLen
)
(
*
ptr
&
0x80
))
{
{
val
<<=
7
;
/* The largest possible string for the first two components
val
|=
*
ptr
&
0x7f
;
* is 2.175 (= 2 * 40 + 175 = 255), so this is big enough.
ptr
++
;
*/
char
firstTwo
[
6
];
const
BYTE
*
ptr
;
snprintf
(
firstTwo
,
sizeof
(
firstTwo
),
"%d.%d"
,
pbEncoded
[
1
+
lenBytes
]
/
40
,
pbEncoded
[
1
+
lenBytes
]
-
(
pbEncoded
[
1
+
lenBytes
]
/
40
)
*
40
);
bytesNeeded
=
strlen
(
firstTwo
)
+
1
;
for
(
ptr
=
pbEncoded
+
2
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
/* large enough for ".4000000" */
char
str
[
9
];
int
val
=
0
;
while
(
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
&&
(
*
ptr
&
0x80
))
{
val
<<=
7
;
val
|=
*
ptr
&
0x7f
;
ptr
++
;
}
if
(
ptr
-
pbEncoded
-
1
-
lenBytes
>=
dataLen
||
(
*
ptr
&
0x80
))
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
{
val
<<=
7
;
val
|=
*
ptr
++
;
snprintf
(
str
,
sizeof
(
str
),
".%d"
,
val
);
bytesNeeded
+=
strlen
(
str
);
}
}
if
(
!
pszObjId
)
*
pcbObjId
=
bytesNeeded
;
else
if
(
*
pcbObjId
<
bytesNeeded
)
{
*
pcbObjId
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
ret
=
FALSE
;
}
else
{
sprintf
(
pszObjId
,
"%d.%d"
,
pbEncoded
[
1
+
lenBytes
]
/
40
,
pbEncoded
[
1
+
lenBytes
]
-
(
pbEncoded
[
1
+
lenBytes
]
/
40
)
*
40
);
pszObjId
+=
strlen
(
pszObjId
);
for
(
ptr
=
pbEncoded
+
2
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
int
val
=
0
;
while
(
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
&&
(
*
ptr
&
0x80
))
{
val
<<=
7
;
val
|=
*
ptr
&
0x7f
;
ptr
++
;
}
val
<<=
7
;
val
|=
*
ptr
++
;
sprintf
(
pszObjId
,
".%d"
,
val
);
pszObjId
+=
strlen
(
pszObjId
);
}
}
}
}
val
<<=
7
;
else
val
|=
*
ptr
++
;
bytesNeeded
=
0
;
sprintf
(
pszObjId
,
".%d"
,
val
);
*
pcbObjId
=
bytesNeeded
;
pszObjId
+=
strlen
(
pszObjId
);
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
else
__EXCEPT
(
page_fault
)
bytesNeeded
=
0
;
{
*
pcbObjId
=
bytesNeeded
;
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -1720,90 +1742,103 @@ static BOOL WINAPI CRYPT_AsnDecodeNameValue(DWORD dwCertEncodingType,
...
@@ -1720,90 +1742,103 @@ static BOOL WINAPI CRYPT_AsnDecodeNameValue(DWORD dwCertEncodingType,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
CERT_NAME_VALUE
*
value
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
CERT_NAME_VALUE
*
value
,
DWORD
*
pcbValue
)
DWORD
*
pcbValue
)
{
{
DWORD
bytesNeeded
,
dataLen
;
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
BYTE
lenBytes
;
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
__TRY
return
FALSE
;
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
switch
(
pbEncoded
[
0
])
{
case
ASN_NUMERICSTRING
:
case
ASN_PRINTABLESTRING
:
case
ASN_IA5STRING
:
break
;
default:
FIXME
(
"Unimplemented string type %02x
\n
"
,
pbEncoded
[
0
]);
SetLastError
(
OSS_UNIMPLEMENTED
);
return
FALSE
;
}
bytesNeeded
=
sizeof
(
CERT_NAME_VALUE
);
if
(
dataLen
)
{
switch
(
pbEncoded
[
0
])
{
case
ASN_NUMERICSTRING
:
case
ASN_PRINTABLESTRING
:
case
ASN_IA5STRING
:
if
(
!
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
))
bytesNeeded
+=
dataLen
;
break
;
}
}
if
(
!
value
)
{
*
pcbValue
=
bytesNeeded
;
return
TRUE
;
}
if
(
*
pcbValue
<
bytesNeeded
)
{
*
pcbValue
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
return
FALSE
;
}
*
pcbValue
=
bytesNeeded
;
switch
(
pbEncoded
[
0
])
{
case
ASN_NUMERICSTRING
:
value
->
dwValueType
=
CERT_RDN_NUMERIC_STRING
;
break
;
case
ASN_PRINTABLESTRING
:
value
->
dwValueType
=
CERT_RDN_PRINTABLE_STRING
;
break
;
case
ASN_IA5STRING
:
value
->
dwValueType
=
CERT_RDN_IA5_STRING
;
break
;
}
if
(
dataLen
)
{
{
switch
(
pbEncoded
[
0
])
DWORD
dataLen
;
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
{
{
case
ASN_NUMERICSTRING
:
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
case
ASN_PRINTABLESTRING
:
case
ASN_IA5STRING
:
switch
(
pbEncoded
[
0
])
value
->
Value
.
cbData
=
dataLen
;
{
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
case
ASN_NUMERICSTRING
:
value
->
Value
.
pbData
=
(
BYTE
*
)
pbEncoded
+
1
+
lenBytes
;
case
ASN_PRINTABLESTRING
:
else
case
ASN_IA5STRING
:
break
;
default:
FIXME
(
"Unimplemented string type %02x
\n
"
,
pbEncoded
[
0
]);
SetLastError
(
OSS_UNIMPLEMENTED
);
ret
=
FALSE
;
}
if
(
ret
)
{
{
if
(
!
value
->
Value
.
pbData
)
DWORD
bytesNeeded
=
sizeof
(
CERT_NAME_VALUE
);
switch
(
pbEncoded
[
0
])
{
case
ASN_NUMERICSTRING
:
case
ASN_PRINTABLESTRING
:
case
ASN_IA5STRING
:
if
(
!
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
))
bytesNeeded
+=
dataLen
;
break
;
}
if
(
!
value
)
*
pcbValue
=
bytesNeeded
;
else
if
(
*
pcbValue
<
bytesNeeded
)
{
{
SetLastError
(
CRYPT_E_ASN1_INTERNAL
);
*
pcbValue
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
ret
=
FALSE
;
ret
=
FALSE
;
}
}
else
else
memcpy
(
value
->
Value
.
pbData
,
pbEncoded
+
1
+
lenBytes
,
{
dataLen
);
*
pcbValue
=
bytesNeeded
;
switch
(
pbEncoded
[
0
])
{
case
ASN_NUMERICSTRING
:
value
->
dwValueType
=
CERT_RDN_NUMERIC_STRING
;
break
;
case
ASN_PRINTABLESTRING
:
value
->
dwValueType
=
CERT_RDN_PRINTABLE_STRING
;
break
;
case
ASN_IA5STRING
:
value
->
dwValueType
=
CERT_RDN_IA5_STRING
;
break
;
}
if
(
dataLen
)
{
switch
(
pbEncoded
[
0
])
{
case
ASN_NUMERICSTRING
:
case
ASN_PRINTABLESTRING
:
case
ASN_IA5STRING
:
value
->
Value
.
cbData
=
dataLen
;
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
value
->
Value
.
pbData
=
(
BYTE
*
)
pbEncoded
+
1
+
lenBytes
;
else
{
if
(
!
value
->
Value
.
pbData
)
{
SetLastError
(
CRYPT_E_ASN1_INTERNAL
);
ret
=
FALSE
;
}
else
memcpy
(
value
->
Value
.
pbData
,
pbEncoded
+
1
+
lenBytes
,
dataLen
);
}
break
;
}
}
else
{
value
->
Value
.
cbData
=
0
;
value
->
Value
.
pbData
=
NULL
;
}
}
}
}
break
;
}
}
}
}
else
__EXCEPT
(
page_fault
)
{
{
value
->
Value
.
cbData
=
0
;
SetLastError
(
STATUS_ACCESS_VIOLATION
)
;
value
->
Value
.
pbData
=
NULL
;
ret
=
FALSE
;
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -1811,200 +1846,254 @@ static BOOL WINAPI CRYPT_AsnDecodeRdnAttr(DWORD dwCertEncodingType,
...
@@ -1811,200 +1846,254 @@ static BOOL WINAPI CRYPT_AsnDecodeRdnAttr(DWORD dwCertEncodingType,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
CERT_RDN_ATTR
*
attr
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
CERT_RDN_ATTR
*
attr
,
DWORD
*
pcbAttr
)
DWORD
*
pcbAttr
)
{
{
BOOL
ret
=
TRUE
;
BOOL
ret
;
DWORD
bytesNeeded
,
dataLen
,
size
;
BYTE
lenBytes
;
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
__TRY
return
FALSE
;
/* The data length must be at least 4, two for the tag and length for the
* OID, and two for the string (assuming both have short-form lengths.)
*/
if
(
dataLen
<
4
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
pbEncoded
[
0
]
!=
(
ASN_CONSTRUCTOR
|
ASN_SEQUENCE
))
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
bytesNeeded
=
sizeof
(
CERT_RDN_ATTR
);
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
ret
=
CRYPT_AsnDecodeOid
(
dwCertEncodingType
,
pbEncoded
+
1
+
lenBytes
,
cbEncoded
-
1
-
lenBytes
,
dwFlags
,
NULL
,
&
size
);
if
(
ret
)
{
{
/* ugly: need to know the size of the next element of the sequence,
if
(
pbEncoded
[
0
]
==
(
ASN_CONSTRUCTOR
|
ASN_SEQUENCE
))
* so get it directly
*/
DWORD
objIdOfset
=
1
+
lenBytes
,
objIdLen
,
nameValueOffset
=
0
;
ret
=
CRYPT_GetLen
(
pbEncoded
+
objIdOfset
,
cbEncoded
-
objIdOfset
,
&
objIdLen
);
bytesNeeded
+=
size
;
/* hack: like encoding, this takes advantage of the fact that the rest
* of the structure is identical to a CERT_NAME_VALUE.
*/
if
(
ret
)
{
nameValueOffset
=
objIdOfset
+
objIdLen
+
1
+
GET_LEN_BYTES
(
pbEncoded
[
objIdOfset
]);
ret
=
CRYPT_AsnDecodeNameValue
(
dwCertEncodingType
,
pbEncoded
+
nameValueOffset
,
cbEncoded
-
nameValueOffset
,
dwFlags
,
NULL
,
&
size
);
}
if
(
ret
)
{
{
bytesNeeded
+=
size
;
DWORD
bytesNeeded
,
dataLen
,
size
;
if
(
!
attr
)
BYTE
lenBytes
;
*
pcbAttr
=
bytesNeeded
;
else
if
(
*
pcbAttr
<
bytesNeeded
)
{
*
pcbAttr
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
ret
=
FALSE
;
}
else
{
BYTE
*
originalData
=
attr
->
Value
.
pbData
;
*
pcbAttr
=
bytesNeeded
;
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
/* strange: decode the value first, because it has a counted
{
* size, and we can store the OID after it. Keep track of the
/* The data length must be at least 4, two for the tag and
*
original data pointer, we'll need to know whether it was
*
length for the OID, and two for the string (assuming both
*
changed.
*
have short-form lengths.)
*/
*/
size
=
bytesNeeded
;
if
(
dataLen
<
4
)
ret
=
CRYPT_AsnDecodeNameValue
(
dwCertEncodingType
,
{
pbEncoded
+
nameValueOffset
,
cbEncoded
-
nameValueOffset
,
SetLastError
(
CRYPT_E_ASN1_EOD
);
dwFlags
,
(
CERT_NAME_VALUE
*
)
&
attr
->
dwValueType
,
&
size
);
ret
=
FALSE
;
if
(
ret
)
}
else
{
{
if
(
objIdLen
)
bytesNeeded
=
sizeof
(
CERT_RDN_ATTR
);
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
ret
=
CRYPT_AsnDecodeOid
(
dwCertEncodingType
,
pbEncoded
+
1
+
lenBytes
,
cbEncoded
-
1
-
lenBytes
,
dwFlags
,
NULL
,
&
size
);
if
(
ret
)
{
{
/* if the data were copied to the original location,
/* ugly: need to know the size of the next element of
* the OID goes after. Otherwise it goes in the
* the sequence, so get it directly
* spot originally reserved for the data.
*/
*/
if
(
attr
->
Value
.
pbData
==
originalData
)
DWORD
objIdOfset
=
1
+
lenBytes
,
objIdLen
,
attr
->
pszObjId
=
(
LPSTR
)(
attr
->
Value
.
pbData
+
nameValueOffset
=
0
;
attr
->
Value
.
cbData
);
else
ret
=
CRYPT_GetLen
(
pbEncoded
+
objIdOfset
,
attr
->
pszObjId
=
originalData
;
cbEncoded
-
objIdOfset
,
&
objIdLen
);
size
=
bytesNeeded
-
size
;
bytesNeeded
+=
size
;
ret
=
CRYPT_AsnDecodeOid
(
dwCertEncodingType
,
/* hack: like encoding, this takes advantage of the
pbEncoded
+
objIdOfset
,
cbEncoded
-
objIdOfset
,
* fact that the rest of the structure is identical to
dwFlags
,
attr
->
pszObjId
,
&
size
);
* a CERT_NAME_VALUE.
*/
if
(
ret
)
{
nameValueOffset
=
objIdOfset
+
objIdLen
+
1
+
GET_LEN_BYTES
(
pbEncoded
[
objIdOfset
]);
ret
=
CRYPT_AsnDecodeNameValue
(
dwCertEncodingType
,
pbEncoded
+
nameValueOffset
,
cbEncoded
-
nameValueOffset
,
dwFlags
,
NULL
,
&
size
);
}
if
(
ret
)
{
bytesNeeded
+=
size
;
if
(
!
attr
)
*
pcbAttr
=
bytesNeeded
;
else
if
(
*
pcbAttr
<
bytesNeeded
)
{
*
pcbAttr
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
ret
=
FALSE
;
}
else
{
BYTE
*
originalData
=
attr
->
Value
.
pbData
;
*
pcbAttr
=
bytesNeeded
;
/* strange: decode the value first, because it
* has a counted size, and we can store the OID
* after it. Keep track of the original data
* pointer, we'll need to know whether it was
* changed.
*/
size
=
bytesNeeded
;
ret
=
CRYPT_AsnDecodeNameValue
(
dwCertEncodingType
,
pbEncoded
+
nameValueOffset
,
cbEncoded
-
nameValueOffset
,
dwFlags
,
(
CERT_NAME_VALUE
*
)
&
attr
->
dwValueType
,
&
size
);
if
(
ret
)
{
if
(
objIdLen
)
{
/* if the data were copied to the
* original location, the OID goes
* after. Otherwise it goes in the
* spot originally reserved for the
* data.
*/
if
(
attr
->
Value
.
pbData
==
originalData
)
attr
->
pszObjId
=
(
LPSTR
)(
attr
->
Value
.
pbData
+
attr
->
Value
.
cbData
);
else
attr
->
pszObjId
=
originalData
;
size
=
bytesNeeded
-
size
;
ret
=
CRYPT_AsnDecodeOid
(
dwCertEncodingType
,
pbEncoded
+
objIdOfset
,
cbEncoded
-
objIdOfset
,
dwFlags
,
attr
->
pszObjId
,
&
size
);
}
else
attr
->
pszObjId
=
NULL
;
}
}
}
}
}
else
attr
->
pszObjId
=
NULL
;
}
}
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
/* FIXME: this is indenting-happy, try to break it up */
static
BOOL
WINAPI
CRYPT_AsnDecodeRdn
(
DWORD
dwCertEncodingType
,
static
BOOL
WINAPI
CRYPT_AsnDecodeRdn
(
DWORD
dwCertEncodingType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
CERT_RDN
*
rdn
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
CERT_RDN
*
rdn
,
DWORD
*
pcbRdn
)
DWORD
*
pcbRdn
)
{
{
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
DWORD
bytesNeeded
,
dataLen
,
cRDNAttr
=
0
;
BYTE
lenBytes
;
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
__TRY
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
(
ASN_CONSTRUCTOR
|
ASN_SETOF
))
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
sizeof
(
CERT_RDN
);
if
(
dataLen
)
{
{
const
BYTE
*
ptr
;
if
(
pbEncoded
[
0
]
==
(
ASN_CONSTRUCTOR
|
ASN_SETOF
))
DWORD
size
;
for
(
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
{
ret
=
CRYPT_AsnDecodeRdnAttr
(
dwCertEncodingType
,
ptr
,
DWORD
dataLen
;
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
NULL
,
&
size
);
if
(
ret
)
if
(
(
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
)
{
{
DWORD
nextLen
;
DWORD
bytesNeeded
,
cRDNAttr
=
0
;
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
cRDNAttr
++
;
bytesNeeded
=
sizeof
(
CERT_RDN
);
bytesNeeded
+=
size
;
if
(
dataLen
)
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
{
&
nextLen
);
const
BYTE
*
ptr
;
if
(
ret
)
DWORD
size
;
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
}
}
}
if
(
ret
)
{
if
(
!
rdn
)
{
*
pcbRdn
=
bytesNeeded
;
return
TRUE
;
}
if
(
*
pcbRdn
<
bytesNeeded
)
{
*
pcbRdn
=
bytesNeeded
;
SetLastError
(
ERROR_MORE_DATA
);
return
FALSE
;
}
*
pcbRdn
=
bytesNeeded
;
rdn
->
cRDNAttr
=
cRDNAttr
;
if
(
rdn
->
cRDNAttr
==
0
)
rdn
->
rgRDNAttr
=
NULL
;
else
{
DWORD
size
,
i
;
BYTE
*
nextData
;
const
BYTE
*
ptr
;
rdn
->
rgRDNAttr
=
(
CERT_RDN_ATTR
*
)((
BYTE
*
)
rdn
+
sizeof
(
CERT_RDN
));
for
(
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
nextData
=
(
BYTE
*
)
rdn
->
rgRDNAttr
+
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
rdn
->
cRDNAttr
*
sizeof
(
CERT_RDN_ATTR
);
{
for
(
i
=
0
,
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
i
<
cRDNAttr
&&
ret
=
CRYPT_AsnDecodeRdnAttr
(
dwCertEncodingType
,
ptr
,
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
i
++
)
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
NULL
,
&
size
);
{
if
(
ret
)
rdn
->
rgRDNAttr
[
i
].
Value
.
pbData
=
nextData
;
{
size
=
bytesNeeded
;
DWORD
nextLen
;
ret
=
CRYPT_AsnDecodeRdnAttr
(
dwCertEncodingType
,
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
&
rdn
->
rgRDNAttr
[
i
],
cRDNAttr
++
;
&
size
);
bytesNeeded
+=
size
;
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
&
nextLen
);
if
(
ret
)
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
}
}
}
if
(
ret
)
if
(
ret
)
{
{
DWORD
nextLen
;
if
(
!
rdn
)
*
pcbRdn
=
bytesNeeded
;
bytesNeeded
-=
size
;
else
if
(
*
pcbRdn
<
bytesNeeded
)
/* If dwFlags & CRYPT_DECODE_NOCOPY_FLAG, the data may not
{
* have been copied.
*
pcbRdn
=
bytesNeeded
;
*/
SetLastError
(
ERROR_MORE_DATA
);
if
(
rdn
->
rgRDNAttr
[
i
].
Value
.
pbData
==
nextData
)
ret
=
FALSE
;
nextData
+=
rdn
->
rgRDNAttr
[
i
].
Value
.
cbData
;
}
/* Ugly: the OID, if copied, is stored in memory after the
else
* value, so increment by its string length if it's set and
{
* points here.
*
pcbRdn
=
bytesNeeded
;
*/
rdn
->
cRDNAttr
=
cRDNAttr
;
if
((
const
BYTE
*
)
rdn
->
rgRDNAttr
[
i
].
pszObjId
==
nextData
)
if
(
rdn
->
cRDNAttr
==
0
)
nextData
+=
strlen
(
rdn
->
rgRDNAttr
[
i
].
pszObjId
)
+
1
;
rdn
->
rgRDNAttr
=
NULL
;
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
else
&
nextLen
);
{
if
(
ret
)
DWORD
size
,
i
;
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
BYTE
*
nextData
;
const
BYTE
*
ptr
;
rdn
->
rgRDNAttr
=
(
CERT_RDN_ATTR
*
)((
BYTE
*
)
rdn
+
sizeof
(
CERT_RDN
));
nextData
=
(
BYTE
*
)
rdn
->
rgRDNAttr
+
rdn
->
cRDNAttr
*
sizeof
(
CERT_RDN_ATTR
);
for
(
i
=
0
,
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
i
<
cRDNAttr
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
i
++
)
{
rdn
->
rgRDNAttr
[
i
].
Value
.
pbData
=
nextData
;
size
=
bytesNeeded
;
ret
=
CRYPT_AsnDecodeRdnAttr
(
dwCertEncodingType
,
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
&
rdn
->
rgRDNAttr
[
i
],
&
size
);
if
(
ret
)
{
DWORD
nextLen
;
bytesNeeded
-=
size
;
/* If dwFlags & CRYPT_DECODE_NOCOPY_FLAG,
* the data may not have been copied.
*/
if
(
rdn
->
rgRDNAttr
[
i
].
Value
.
pbData
==
nextData
)
nextData
+=
rdn
->
rgRDNAttr
[
i
].
Value
.
cbData
;
/* Ugly: the OID, if copied, is stored in
* memory after the value, so increment by
* its string length if it's set and points
* here.
*/
if
((
const
BYTE
*
)
rdn
->
rgRDNAttr
[
i
].
pszObjId
==
nextData
)
nextData
+=
strlen
(
rdn
->
rgRDNAttr
[
i
].
pszObjId
)
+
1
;
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
&
nextLen
);
if
(
ret
)
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
}
}
}
}
}
}
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2013,95 +2102,108 @@ static BOOL WINAPI CRYPT_AsnDecodeName(DWORD dwCertEncodingType,
...
@@ -2013,95 +2102,108 @@ static BOOL WINAPI CRYPT_AsnDecodeName(DWORD dwCertEncodingType,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
DWORD
bytesNeeded
,
dataLen
,
cRDN
=
0
;
BYTE
lenBytes
;
if
(
!
pbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
(
ASN_CONSTRUCTOR
|
ASN_SEQUENCEOF
))
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
sizeof
(
CERT_NAME_INFO
);
if
(
dataLen
)
{
{
const
BYTE
*
ptr
;
if
(
pbEncoded
[
0
]
==
(
ASN_CONSTRUCTOR
|
ASN_SEQUENCEOF
))
DWORD
size
;
for
(
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
{
ret
=
CRYPT_AsnDecodeRdn
(
dwCertEncodingType
,
ptr
,
DWORD
dataLen
;
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
NULL
,
&
size
);
if
(
ret
)
if
(
(
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
)
{
{
DWORD
nextLen
;
DWORD
bytesNeeded
,
cRDN
=
0
;
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
cRDN
++
;
bytesNeeded
=
sizeof
(
CERT_NAME_INFO
);
bytesNeeded
+=
size
;
if
(
dataLen
)
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
{
&
nextLen
);
const
BYTE
*
ptr
;
for
(
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
)
{
DWORD
size
;
ret
=
CRYPT_AsnDecodeRdn
(
dwCertEncodingType
,
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
NULL
,
&
size
);
if
(
ret
)
{
DWORD
nextLen
;
cRDN
++
;
bytesNeeded
+=
size
;
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
&
nextLen
);
if
(
ret
)
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
}
}
}
if
(
ret
)
if
(
ret
)
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
{
if
(
!
pvStructInfo
)
*
pcbStructInfo
=
bytesNeeded
;
else
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
CERT_NAME_INFO
*
info
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
info
=
(
CERT_NAME_INFO
*
)
pvStructInfo
;
info
->
cRDN
=
cRDN
;
if
(
info
->
cRDN
==
0
)
info
->
rgRDN
=
NULL
;
else
{
DWORD
size
,
i
;
BYTE
*
nextData
;
const
BYTE
*
ptr
;
info
->
rgRDN
=
(
CERT_RDN
*
)((
BYTE
*
)
pvStructInfo
+
sizeof
(
CERT_NAME_INFO
));
nextData
=
(
BYTE
*
)
info
->
rgRDN
+
info
->
cRDN
*
sizeof
(
CERT_RDN
);
for
(
i
=
0
,
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
i
<
cRDN
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
i
++
)
{
info
->
rgRDN
[
i
].
rgRDNAttr
=
(
CERT_RDN_ATTR
*
)
nextData
;
size
=
bytesNeeded
;
ret
=
CRYPT_AsnDecodeRdn
(
dwCertEncodingType
,
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
&
info
->
rgRDN
[
i
],
&
size
);
if
(
ret
)
{
DWORD
nextLen
;
nextData
+=
size
;
bytesNeeded
-=
size
;
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
&
nextLen
);
if
(
ret
)
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
}
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
}
}
}
}
if
(
re
t
)
__EXCEPT
(
page_faul
t
)
{
{
CERT_NAME_INFO
*
info
;
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
if
(
!
pvStructInfo
)
{
*
pcbStructInfo
=
bytesNeeded
;
return
TRUE
;
}
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
info
=
(
CERT_NAME_INFO
*
)
pvStructInfo
;
info
->
cRDN
=
cRDN
;
if
(
info
->
cRDN
==
0
)
info
->
rgRDN
=
NULL
;
else
{
DWORD
size
,
i
;
BYTE
*
nextData
;
const
BYTE
*
ptr
;
info
->
rgRDN
=
(
CERT_RDN
*
)((
BYTE
*
)
pvStructInfo
+
sizeof
(
CERT_NAME_INFO
));
nextData
=
(
BYTE
*
)
info
->
rgRDN
+
info
->
cRDN
*
sizeof
(
CERT_RDN
);
for
(
i
=
0
,
ptr
=
pbEncoded
+
1
+
lenBytes
;
ret
&&
i
<
cRDN
&&
ptr
-
pbEncoded
-
1
-
lenBytes
<
dataLen
;
i
++
)
{
info
->
rgRDN
[
i
].
rgRDNAttr
=
(
CERT_RDN_ATTR
*
)
nextData
;
size
=
bytesNeeded
;
ret
=
CRYPT_AsnDecodeRdn
(
dwCertEncodingType
,
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
dwFlags
,
&
info
->
rgRDN
[
i
],
&
size
);
if
(
ret
)
{
DWORD
nextLen
;
nextData
+=
size
;
bytesNeeded
-=
size
;
ret
=
CRYPT_GetLen
(
ptr
,
cbEncoded
-
(
ptr
-
pbEncoded
),
&
nextLen
);
if
(
ret
)
ptr
+=
nextLen
+
1
+
GET_LEN_BYTES
(
ptr
[
1
]);
}
}
}
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2136,85 +2238,100 @@ static BOOL WINAPI CRYPT_AsnDecodeBasicConstraints2(DWORD dwCertEncodingType,
...
@@ -2136,85 +2238,100 @@ static BOOL WINAPI CRYPT_AsnDecodeBasicConstraints2(DWORD dwCertEncodingType,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
DWORD
bytesNeeded
,
dataLen
;
BOOL
ret
;
BYTE
lenBytes
;
CERT_BASIC_CONSTRAINTS2_INFO
info
=
{
0
};
BOOL
ret
=
TRUE
;
if
(
!
pbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
/* sanity-check length, space enough for 7 bytes of integer and 3 bytes of
* bool
*/
if
(
dataLen
>
10
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
return
FALSE
;
}
if
(
pbEncoded
[
0
]
!=
ASN_SEQUENCE
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
sizeof
(
CERT_BASIC_CONSTRAINTS2_INFO
);
if
(
!
pvStructInfo
)
{
*
pcbStructInfo
=
bytesNeeded
;
return
TRUE
;
}
pbEncoded
+=
1
+
lenBytes
;
cbEncoded
-=
1
+
lenBytes
;
if
(
cbEncoded
)
{
{
DWORD
size
;
if
(
pbEncoded
[
0
]
==
ASN_SEQUENCE
)
if
(
pbEncoded
[
0
]
==
ASN_BOOL
)
{
{
ret
=
CRYPT_DecodeBool
(
pbEncoded
,
cbEncoded
,
&
info
.
fCA
);
DWORD
dataLen
;
if
(
ret
)
{
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
cbEncoded
-=
2
+
pbEncoded
[
1
];
pbEncoded
+=
2
+
pbEncoded
[
1
];
}
}
if
(
ret
&&
cbEncoded
&&
pbEncoded
[
0
]
==
ASN_INTEGER
)
{
size
=
sizeof
(
info
.
dwPathLenConstraint
);
ret
=
CRYPT_AsnDecodeInt
(
dwCertEncodingType
,
X509_INTEGER
,
pbEncoded
,
cbEncoded
,
0
,
NULL
,
&
info
.
dwPathLenConstraint
,
&
size
);
if
(
ret
)
{
{
cbEncoded
-=
2
+
pbEncoded
[
1
];
/* sanity-check length, space enough for 7 bytes of integer and
pbEncoded
+=
2
+
pbEncoded
[
1
];
* 3 bytes of bool
if
(
cbEncoded
)
*/
if
(
dataLen
>
10
)
{
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
ret
=
FALSE
;
}
}
else
else
info
.
fPathLenConstraint
=
TRUE
;
{
DWORD
bytesNeeded
=
sizeof
(
CERT_BASIC_CONSTRAINTS2_INFO
);
if
(
!
pvStructInfo
)
*
pcbStructInfo
=
bytesNeeded
;
else
{
BYTE
lenBytes
;
CERT_BASIC_CONSTRAINTS2_INFO
info
=
{
0
};
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
pbEncoded
+=
1
+
lenBytes
;
cbEncoded
-=
1
+
lenBytes
;
if
(
cbEncoded
)
{
DWORD
size
;
if
(
pbEncoded
[
0
]
==
ASN_BOOL
)
{
ret
=
CRYPT_DecodeBool
(
pbEncoded
,
cbEncoded
,
&
info
.
fCA
);
if
(
ret
)
{
cbEncoded
-=
2
+
pbEncoded
[
1
];
pbEncoded
+=
2
+
pbEncoded
[
1
];
}
}
if
(
ret
&&
cbEncoded
&&
pbEncoded
[
0
]
==
ASN_INTEGER
)
{
size
=
sizeof
(
info
.
dwPathLenConstraint
);
ret
=
CRYPT_AsnDecodeInt
(
dwCertEncodingType
,
X509_INTEGER
,
pbEncoded
,
cbEncoded
,
0
,
NULL
,
&
info
.
dwPathLenConstraint
,
&
size
);
if
(
ret
)
{
cbEncoded
-=
2
+
pbEncoded
[
1
];
pbEncoded
+=
2
+
pbEncoded
[
1
];
if
(
cbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
info
.
fPathLenConstraint
=
TRUE
;
}
}
}
if
(
ret
)
{
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
memcpy
(
pvStructInfo
,
&
info
,
sizeof
(
CERT_BASIC_CONSTRAINTS2_INFO
));
}
}
}
}
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
if
(
re
t
)
__EXCEPT
(
page_faul
t
)
{
{
CERT_BASIC_CONSTRAINTS2_INFO
*
out
;
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
out
=
(
CERT_BASIC_CONSTRAINTS2_INFO
*
)
pvStructInfo
;
memcpy
(
out
,
&
info
,
sizeof
(
*
out
));
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2222,150 +2339,178 @@ static BOOL WINAPI CRYPT_AsnDecodeOctets(DWORD dwCertEncodingType,
...
@@ -2222,150 +2339,178 @@ static BOOL WINAPI CRYPT_AsnDecodeOctets(DWORD dwCertEncodingType,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
CRYPT_DATA_BLOB
*
blob
;
BOOL
ret
;
DWORD
bytesNeeded
,
dataLen
;
if
(
!
pbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
ASN_OCTETSTRING
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
bytesNeeded
=
sizeof
(
CRYPT_DATA_BLOB
);
else
bytesNeeded
=
dataLen
+
sizeof
(
CRYPT_DATA_BLOB
);
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
bytesNeeded
;
if
(
pbEncoded
[
0
]
==
ASN_OCTETSTRING
)
return
TRUE
;
{
DWORD
bytesNeeded
,
dataLen
;
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
{
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
bytesNeeded
=
sizeof
(
CRYPT_DATA_BLOB
);
else
bytesNeeded
=
dataLen
+
sizeof
(
CRYPT_DATA_BLOB
);
if
(
!
pvStructInfo
)
*
pcbStructInfo
=
bytesNeeded
;
else
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
CRYPT_DATA_BLOB
*
blob
;
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_DATA_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
;
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
blob
->
pbData
=
(
BYTE
*
)
pbEncoded
+
1
+
lenBytes
;
else
{
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_DATA_BLOB
);
if
(
blob
->
cbData
)
memcpy
(
blob
->
pbData
,
pbEncoded
+
1
+
lenBytes
,
blob
->
cbData
);
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
__EXCEPT
(
page_fault
)
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_DATA_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
;
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
blob
->
pbData
=
(
BYTE
*
)
pbEncoded
+
1
+
GET_LEN_BYTES
(
pbEncoded
[
1
]);
else
{
{
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_DATA_BLOB
);
SetLastError
(
STATUS_ACCESS_VIOLATION
);
if
(
blob
->
cbData
)
ret
=
FALSE
;
memcpy
(
blob
->
pbData
,
pbEncoded
+
1
+
GET_LEN_BYTES
(
pbEncoded
[
1
]),
blob
->
cbData
);
}
}
return
TRUE
;
__ENDTRY
return
ret
;
}
}
static
BOOL
WINAPI
CRYPT_AsnDecodeBits
(
DWORD
dwCertEncodingType
,
static
BOOL
WINAPI
CRYPT_AsnDecodeBits
(
DWORD
dwCertEncodingType
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
CRYPT_BIT_BLOB
*
blob
;
BOOL
ret
;
DWORD
bytesNeeded
,
dataLen
;
if
(
!
pbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
ASN_BITSTRING
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
bytesNeeded
=
sizeof
(
CRYPT_BIT_BLOB
);
else
bytesNeeded
=
dataLen
-
1
+
sizeof
(
CRYPT_BIT_BLOB
);
if
(
!
pvStructInfo
)
{
*
pcbStructInfo
=
bytesNeeded
;
return
TRUE
;
}
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_BIT_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
-
1
;
blob
->
cUnusedBits
=
*
(
pbEncoded
+
1
+
GET_LEN_BYTES
(
pbEncoded
[
1
]));
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
blob
->
pbData
=
(
BYTE
*
)
pbEncoded
+
2
+
GET_LEN_BYTES
(
pbEncoded
[
1
]);
else
{
{
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_BIT_BLOB
);
if
(
pbEncoded
[
0
]
==
ASN_BITSTRING
)
if
(
blob
->
cbData
)
{
{
BYTE
mask
=
0xff
<<
blob
->
cUnusedBits
;
DWORD
bytesNeeded
,
dataLen
;
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
{
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
bytesNeeded
=
sizeof
(
CRYPT_BIT_BLOB
);
else
bytesNeeded
=
dataLen
-
1
+
sizeof
(
CRYPT_BIT_BLOB
);
if
(
!
pvStructInfo
)
*
pcbStructInfo
=
bytesNeeded
;
else
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
CRYPT_BIT_BLOB
*
blob
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_BIT_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
-
1
;
blob
->
cUnusedBits
=
*
(
pbEncoded
+
1
+
GET_LEN_BYTES
(
pbEncoded
[
1
]));
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
blob
->
pbData
=
(
BYTE
*
)
pbEncoded
+
2
+
GET_LEN_BYTES
(
pbEncoded
[
1
]);
else
{
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_BIT_BLOB
);
if
(
blob
->
cbData
)
{
BYTE
mask
=
0xff
<<
blob
->
cUnusedBits
;
memcpy
(
blob
->
pbData
,
pbEncoded
+
2
+
GET_LEN_BYTES
(
pbEncoded
[
1
]),
memcpy
(
blob
->
pbData
,
pbEncoded
+
2
+
blob
->
cbData
);
GET_LEN_BYTES
(
pbEncoded
[
1
]),
blob
->
cbData
);
blob
->
pbData
[
blob
->
cbData
-
1
]
&=
mask
;
blob
->
pbData
[
blob
->
cbData
-
1
]
&=
mask
;
}
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
}
return
TRUE
;
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
__ENDTRY
return
ret
;
}
}
static
BOOL
WINAPI
CRYPT_AsnDecodeInt
(
DWORD
dwCertEncodingType
,
static
BOOL
WINAPI
CRYPT_AsnDecodeInt
(
DWORD
dwCertEncodingType
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
BYTE
buf
[
sizeof
(
CRYPT_INTEGER_BLOB
)
+
sizeof
(
int
)];
DWORD
size
=
sizeof
(
buf
);
BOOL
ret
;
BOOL
ret
;
if
(
!
pbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
pvStructInfo
)
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
sizeof
(
int
);
*
pcbStructInfo
=
sizeof
(
int
);
return
TRUE
;
return
TRUE
;
}
}
ret
=
CRYPT_AsnDecodeInteger
(
dwCertEncodingType
,
X509_MULTI_BYTE_INTEGER
,
__TRY
pbEncoded
,
cbEncoded
,
0
,
NULL
,
&
buf
,
&
size
);
if
(
ret
)
{
{
CRYPT_INTEGER_BLOB
*
blob
=
(
CRYPT_INTEGER_BLOB
*
)
buf
;
BYTE
buf
[
sizeof
(
CRYPT_INTEGER_BLOB
)
+
sizeof
(
int
)];
DWORD
size
=
sizeof
(
buf
);
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
ret
=
CRYPT_AsnDecodeInteger
(
dwCertEncodingType
,
pvStructInfo
,
pcbStructInfo
,
sizeof
(
int
))))
X509_MULTI_BYTE_INTEGER
,
pbEncoded
,
cbEncoded
,
0
,
NULL
,
&
buf
,
&
size
);
if
(
ret
)
{
{
int
val
,
i
;
CRYPT_INTEGER_BLOB
*
blob
=
(
CRYPT_INTEGER_BLOB
*
)
buf
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
pvStructInfo
,
pcbStructInfo
,
sizeof
(
int
))))
if
(
blob
->
pbData
[
blob
->
cbData
-
1
]
&
0x80
)
{
{
/* initialize to a negative value to sign-extend */
int
val
,
i
;
val
=
-
1
;
}
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
else
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
val
=
0
;
if
(
blob
->
pbData
[
blob
->
cbData
-
1
]
&
0x80
)
for
(
i
=
0
;
i
<
blob
->
cbData
;
i
++
)
{
{
/* initialize to a negative value to sign-extend */
val
<<=
8
;
val
=
-
1
;
val
|=
blob
->
pbData
[
blob
->
cbData
-
i
-
1
];
}
else
val
=
0
;
for
(
i
=
0
;
i
<
blob
->
cbData
;
i
++
)
{
val
<<=
8
;
val
|=
blob
->
pbData
[
blob
->
cbData
-
i
-
1
];
}
memcpy
(
pvStructInfo
,
&
val
,
sizeof
(
int
));
}
}
memcpy
(
pvStructInfo
,
&
val
,
sizeof
(
int
));
}
}
else
if
(
GetLastError
()
==
ERROR_MORE_DATA
)
SetLastError
(
CRYPT_E_ASN1_LARGE
);
}
}
else
if
(
GetLastError
()
==
ERROR_MORE_DATA
)
__EXCEPT
(
page_fault
)
SetLastError
(
CRYPT_E_ASN1_LARGE
);
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2373,153 +2518,190 @@ static BOOL WINAPI CRYPT_AsnDecodeInteger(DWORD dwCertEncodingType,
...
@@ -2373,153 +2518,190 @@ static BOOL WINAPI CRYPT_AsnDecodeInteger(DWORD dwCertEncodingType,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
DWORD
bytesNeeded
,
dataLen
;
BOOL
ret
;
BYTE
lenBytes
;
CRYPT_INTEGER_BLOB
*
blob
;
if
(
!
pbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
ASN_INTEGER
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
dataLen
+
sizeof
(
CRYPT_INTEGER_BLOB
);
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
bytesNeeded
;
if
(
pbEncoded
[
0
]
==
ASN_INTEGER
)
return
TRUE
;
{
DWORD
bytesNeeded
,
dataLen
;
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
{
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
dataLen
+
sizeof
(
CRYPT_INTEGER_BLOB
);
if
(
!
pvStructInfo
)
*
pcbStructInfo
=
bytesNeeded
;
else
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
CRYPT_INTEGER_BLOB
*
blob
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_INTEGER_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
;
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_INTEGER_BLOB
);
if
(
blob
->
cbData
)
{
DWORD
i
;
for
(
i
=
0
;
i
<
blob
->
cbData
;
i
++
)
blob
->
pbData
[
i
]
=
*
(
pbEncoded
+
1
+
lenBytes
+
dataLen
-
i
-
1
);
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
__EXCEPT
(
page_fault
)
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_INTEGER_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
;
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_INTEGER_BLOB
);
if
(
blob
->
cbData
)
{
{
DWORD
i
;
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
for
(
i
=
0
;
i
<
blob
->
cbData
;
i
++
)
blob
->
pbData
[
i
]
=
*
(
pbEncoded
+
1
+
lenBytes
+
dataLen
-
i
-
1
);
}
}
return
TRUE
;
__ENDTRY
return
ret
;
}
}
static
BOOL
WINAPI
CRYPT_AsnDecodeUnsignedInteger
(
DWORD
dwCertEncodingType
,
static
BOOL
WINAPI
CRYPT_AsnDecodeUnsignedInteger
(
DWORD
dwCertEncodingType
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
DWORD
bytesNeeded
,
dataLen
;
BOOL
ret
;
BYTE
lenBytes
;
CRYPT_INTEGER_BLOB
*
blob
;
if
(
!
pbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
if
(
pbEncoded
[
0
]
!=
ASN_INTEGER
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
dataLen
+
sizeof
(
CRYPT_INTEGER_BLOB
);
if
(
!
pvStructInfo
)
{
*
pcbStructInfo
=
bytesNeeded
;
return
TRUE
;
}
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_INTEGER_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
;
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_INTEGER_BLOB
);
/* remove leading zero byte if it exists */
if
(
blob
->
cbData
&&
*
(
pbEncoded
+
1
+
lenBytes
)
==
0
)
{
{
blob
->
cbData
--
;
if
(
pbEncoded
[
0
]
==
ASN_INTEGER
)
blob
->
pbData
++
;
{
DWORD
bytesNeeded
,
dataLen
;
CRYPT_INTEGER_BLOB
*
blob
;
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
{
bytesNeeded
=
dataLen
+
sizeof
(
CRYPT_INTEGER_BLOB
);
if
(
!
pvStructInfo
)
*
pcbStructInfo
=
bytesNeeded
;
else
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
BYTE
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
blob
=
(
CRYPT_INTEGER_BLOB
*
)
pvStructInfo
;
blob
->
cbData
=
dataLen
;
blob
->
pbData
=
(
BYTE
*
)
pvStructInfo
+
sizeof
(
CRYPT_INTEGER_BLOB
);
/* remove leading zero byte if it exists */
if
(
blob
->
cbData
&&
*
(
pbEncoded
+
1
+
lenBytes
)
==
0
)
{
blob
->
cbData
--
;
blob
->
pbData
++
;
}
if
(
blob
->
cbData
)
{
DWORD
i
;
for
(
i
=
0
;
i
<
blob
->
cbData
;
i
++
)
blob
->
pbData
[
i
]
=
*
(
pbEncoded
+
1
+
lenBytes
+
pbEncoded
[
1
]
-
i
-
1
);
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
if
(
blob
->
cbData
)
__EXCEPT
(
page_fault
)
{
{
DWORD
i
;
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
for
(
i
=
0
;
i
<
blob
->
cbData
;
i
++
)
blob
->
pbData
[
i
]
=
*
(
pbEncoded
+
1
+
lenBytes
+
pbEncoded
[
1
]
-
i
-
1
);
}
}
return
TRUE
;
__ENDTRY
return
ret
;
}
}
static
BOOL
WINAPI
CRYPT_AsnDecodeEnumerated
(
DWORD
dwCertEncodingType
,
static
BOOL
WINAPI
CRYPT_AsnDecodeEnumerated
(
DWORD
dwCertEncodingType
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
unsigned
int
val
=
0
,
i
;
BOOL
ret
;
if
(
!
pbEncoded
||
!
cbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
pvStructInfo
)
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
sizeof
(
int
);
*
pcbStructInfo
=
sizeof
(
int
);
return
TRUE
;
return
TRUE
;
}
}
if
(
pbEncoded
[
0
]
!=
ASN_ENUMERATED
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
if
(
cbEncoded
<=
1
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
pbEncoded
[
1
]
==
0
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
return
FALSE
;
}
/* A little strange looking, but we have to accept a sign byte: 0xffffffff
* gets encoded as 0a 05 00 ff ff ff ff. Also, assuming a small length is
* okay here, it has to be in short form.
*/
if
(
pbEncoded
[
1
]
>
sizeof
(
unsigned
int
)
+
1
)
{
{
SetLastError
(
CRYPT_E_ASN1_LARGE
);
if
(
pbEncoded
[
0
]
==
ASN_ENUMERATED
)
return
FALSE
;
{
unsigned
int
val
=
0
,
i
;
if
(
cbEncoded
<=
1
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
ret
=
FALSE
;
}
else
if
(
pbEncoded
[
1
]
==
0
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
{
/* A little strange looking, but we have to accept a sign byte:
* 0xffffffff gets encoded as 0a 05 00 ff ff ff ff. Also,
* assuming a small length is okay here, it has to be in short
* form.
*/
if
(
pbEncoded
[
1
]
>
sizeof
(
unsigned
int
)
+
1
)
{
SetLastError
(
CRYPT_E_ASN1_LARGE
);
return
FALSE
;
}
for
(
i
=
0
;
i
<
pbEncoded
[
1
];
i
++
)
{
val
<<=
8
;
val
|=
pbEncoded
[
2
+
i
];
}
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
sizeof
(
unsigned
int
))))
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
memcpy
(
pvStructInfo
,
&
val
,
sizeof
(
unsigned
int
));
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
}
for
(
i
=
0
;
i
<
pbEncoded
[
1
];
i
++
)
__EXCEPT
(
page_fault
)
{
{
val
<<=
8
;
SetLastError
(
STATUS_ACCESS_VIOLATION
)
;
val
|=
pbEncoded
[
2
+
i
]
;
ret
=
FALSE
;
}
}
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
__ENDTRY
pcbStructInfo
,
sizeof
(
unsigned
int
)))
return
ret
;
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
memcpy
(
pvStructInfo
,
&
val
,
sizeof
(
unsigned
int
));
return
TRUE
;
}
}
/* Modifies word, pbEncoded, and len, and magically sets a value ret to FALSE
* if it fails.
*/
#define CRYPT_TIME_GET_DIGITS(pbEncoded, len, numDigits, word) \
#define CRYPT_TIME_GET_DIGITS(pbEncoded, len, numDigits, word) \
do { \
do { \
BYTE i; \
BYTE i; \
...
@@ -2530,10 +2712,13 @@ static BOOL WINAPI CRYPT_AsnDecodeEnumerated(DWORD dwCertEncodingType,
...
@@ -2530,10 +2712,13 @@ static BOOL WINAPI CRYPT_AsnDecodeEnumerated(DWORD dwCertEncodingType,
if (!isdigit(*(pbEncoded))) \
if (!isdigit(*(pbEncoded))) \
{ \
{ \
SetLastError(CRYPT_E_ASN1_CORRUPT); \
SetLastError(CRYPT_E_ASN1_CORRUPT); \
return FALSE; \
ret = FALSE; \
} \
else \
{ \
(word) *= 10; \
(word) += *(pbEncoded)++ - '0'; \
} \
} \
(word) *= 10; \
(word) += *(pbEncoded)++ - '0'; \
} \
} \
} while (0)
} while (0)
...
@@ -2542,53 +2727,62 @@ static BOOL CRYPT_AsnDecodeTimeZone(const BYTE *pbEncoded, DWORD len,
...
@@ -2542,53 +2727,62 @@ static BOOL CRYPT_AsnDecodeTimeZone(const BYTE *pbEncoded, DWORD len,
{
{
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
if
(
len
>=
3
&&
(
*
pbEncoded
==
'+'
||
*
pbEncoded
==
'-'
))
__TRY
{
{
WORD
hours
,
minutes
=
0
;
if
(
len
>=
3
&&
(
*
pbEncoded
==
'+'
||
*
pbEncoded
==
'-'
))
BYTE
sign
=
*
pbEncoded
++
;
len
--
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
hours
);
if
(
hours
>=
24
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
goto
end
;
}
if
(
len
>=
2
)
{
{
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
minutes
);
WORD
hours
,
minutes
=
0
;
if
(
minutes
>=
60
)
BYTE
sign
=
*
pbEncoded
++
;
len
--
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
hours
);
if
(
ret
&&
hours
>=
24
)
{
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
ret
=
FALSE
;
goto
end
;
}
}
}
else
if
(
len
>=
2
)
if
(
sign
==
'+'
)
{
sysTime
->
wHour
+=
hours
;
sysTime
->
wMinute
+=
minutes
;
}
else
{
if
(
hours
>
sysTime
->
wHour
)
{
{
sysTime
->
wDay
--
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
minutes
);
sysTime
->
wHour
=
24
-
(
hours
-
sysTime
->
wHour
);
if
(
ret
&&
minutes
>=
60
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
}
}
else
if
(
ret
)
sysTime
->
wHour
-=
hours
;
if
(
minutes
>
sysTime
->
wMinute
)
{
{
sysTime
->
wHour
--
;
if
(
sign
==
'+'
)
sysTime
->
wMinute
=
60
-
(
minutes
-
sysTime
->
wMinute
);
{
sysTime
->
wHour
+=
hours
;
sysTime
->
wMinute
+=
minutes
;
}
else
{
if
(
hours
>
sysTime
->
wHour
)
{
sysTime
->
wDay
--
;
sysTime
->
wHour
=
24
-
(
hours
-
sysTime
->
wHour
);
}
else
sysTime
->
wHour
-=
hours
;
if
(
minutes
>
sysTime
->
wMinute
)
{
sysTime
->
wHour
--
;
sysTime
->
wMinute
=
60
-
(
minutes
-
sysTime
->
wMinute
);
}
else
sysTime
->
wMinute
-=
minutes
;
}
}
}
else
sysTime
->
wMinute
-=
minutes
;
}
}
}
}
end:
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2598,72 +2792,87 @@ static BOOL WINAPI CRYPT_AsnDecodeUtcTime(DWORD dwCertEncodingType,
...
@@ -2598,72 +2792,87 @@ static BOOL WINAPI CRYPT_AsnDecodeUtcTime(DWORD dwCertEncodingType,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
SYSTEMTIME
sysTime
=
{
0
};
BYTE
len
;
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
if
(
!
pbEncoded
||
!
cbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
pvStructInfo
)
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
sizeof
(
FILETIME
);
*
pcbStructInfo
=
sizeof
(
FILETIME
);
return
TRUE
;
return
TRUE
;
}
}
if
(
pbEncoded
[
0
]
!=
ASN_UTCTIME
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
if
(
cbEncoded
<=
1
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
pbEncoded
[
1
]
>
0x7f
)
{
/* long-form date strings really can't be valid */
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
return
FALSE
;
}
len
=
pbEncoded
[
1
];
if
(
len
<
MIN_ENCODED_TIME_LENGTH
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
return
FALSE
;
}
pbEncoded
+=
2
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wYear
);
if
(
sysTime
.
wYear
>=
50
)
sysTime
.
wYear
+=
1900
;
else
sysTime
.
wYear
+=
2000
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMonth
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wDay
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wHour
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMinute
);
if
(
len
>
0
)
{
if
(
len
>=
2
&&
isdigit
(
*
pbEncoded
)
&&
isdigit
(
*
(
pbEncoded
+
1
)))
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wSecond
);
else
if
(
isdigit
(
*
pbEncoded
))
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
1
,
sysTime
.
wSecond
);
ret
=
CRYPT_AsnDecodeTimeZone
(
pbEncoded
,
len
,
&
sysTime
);
}
if
(
ret
)
{
{
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
if
(
pbEncoded
[
0
]
==
ASN_UTCTIME
)
pcbStructInfo
,
sizeof
(
FILETIME
)))
{
ret
=
FALSE
;
if
(
cbEncoded
<=
1
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
ret
=
FALSE
;
}
else
if
(
pbEncoded
[
1
]
>
0x7f
)
{
/* long-form date strings really can't be valid */
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
{
SYSTEMTIME
sysTime
=
{
0
};
BYTE
len
=
pbEncoded
[
1
];
if
(
len
<
MIN_ENCODED_TIME_LENGTH
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
{
pbEncoded
+=
2
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wYear
);
if
(
sysTime
.
wYear
>=
50
)
sysTime
.
wYear
+=
1900
;
else
sysTime
.
wYear
+=
2000
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMonth
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wDay
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wHour
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMinute
);
if
(
ret
&&
len
>
0
)
{
if
(
len
>=
2
&&
isdigit
(
*
pbEncoded
)
&&
isdigit
(
*
(
pbEncoded
+
1
)))
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wSecond
);
else
if
(
isdigit
(
*
pbEncoded
))
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
1
,
sysTime
.
wSecond
);
if
(
ret
)
ret
=
CRYPT_AsnDecodeTimeZone
(
pbEncoded
,
len
,
&
sysTime
);
}
if
(
ret
&&
(
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
sizeof
(
FILETIME
))))
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
ret
=
SystemTimeToFileTime
(
&
sysTime
,
(
FILETIME
*
)
pvStructInfo
);
}
}
}
}
else
else
{
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
ret
=
FALSE
;
ret
=
SystemTimeToFileTime
(
&
sysTime
,
(
FILETIME
*
)
pvStructInfo
);
}
}
}
}
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2671,76 +2880,93 @@ static BOOL WINAPI CRYPT_AsnDecodeGeneralizedTime(DWORD dwCertEncodingType,
...
@@ -2671,76 +2880,93 @@ static BOOL WINAPI CRYPT_AsnDecodeGeneralizedTime(DWORD dwCertEncodingType,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
SYSTEMTIME
sysTime
=
{
0
};
BYTE
len
;
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
if
(
!
pbEncoded
||
!
cbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
pvStructInfo
)
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
sizeof
(
FILETIME
);
*
pcbStructInfo
=
sizeof
(
FILETIME
);
return
TRUE
;
return
TRUE
;
}
}
if
(
pbEncoded
[
0
]
!=
ASN_GENERALTIME
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
if
(
cbEncoded
<=
1
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
pbEncoded
[
1
]
>
0x7f
)
{
/* long-form date strings really can't be valid */
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
return
FALSE
;
}
len
=
pbEncoded
[
1
];
if
(
len
<
MIN_ENCODED_TIME_LENGTH
)
{
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
return
FALSE
;
}
pbEncoded
+=
2
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
4
,
sysTime
.
wYear
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMonth
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wDay
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wHour
);
if
(
len
>
0
)
{
{
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMinute
);
if
(
pbEncoded
[
0
]
==
ASN_GENERALTIME
)
if
(
len
>
0
)
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wSecond
);
if
(
len
>
0
&&
(
*
pbEncoded
==
'.'
||
*
pbEncoded
==
','
))
{
{
BYTE
digits
;
if
(
cbEncoded
<=
1
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
ret
=
FALSE
;
}
else
if
(
pbEncoded
[
1
]
>
0x7f
)
{
/* long-form date strings really can't be valid */
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
ret
=
FALSE
;
}
else
{
BYTE
len
=
pbEncoded
[
1
];
pbEncoded
++
;
if
(
len
<
MIN_ENCODED_TIME_LENGTH
)
len
--
;
{
digits
=
min
(
len
,
3
);
/* workaround macro weirdness */
SetLastError
(
CRYPT_E_ASN1_CORRUPT
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
digits
,
ret
=
FALSE
;
sysTime
.
wMilliseconds
);
}
else
{
SYSTEMTIME
sysTime
=
{
0
};
pbEncoded
+=
2
;
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
4
,
sysTime
.
wYear
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMonth
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wDay
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wHour
);
if
(
ret
&&
len
>
0
)
{
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wMinute
);
if
(
ret
&&
len
>
0
)
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
2
,
sysTime
.
wSecond
);
if
(
ret
&&
len
>
0
&&
(
*
pbEncoded
==
'.'
||
*
pbEncoded
==
','
))
{
BYTE
digits
;
pbEncoded
++
;
len
--
;
/* workaround macro weirdness */
digits
=
min
(
len
,
3
);
CRYPT_TIME_GET_DIGITS
(
pbEncoded
,
len
,
digits
,
sysTime
.
wMilliseconds
);
}
if
(
ret
)
ret
=
CRYPT_AsnDecodeTimeZone
(
pbEncoded
,
len
,
&
sysTime
);
}
if
(
ret
&&
(
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
sizeof
(
FILETIME
))))
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
ret
=
SystemTimeToFileTime
(
&
sysTime
,
(
FILETIME
*
)
pvStructInfo
);
}
}
}
}
}
ret
=
CRYPT_AsnDecodeTimeZone
(
pbEncoded
,
len
,
&
sysTime
);
}
if
(
ret
)
{
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
sizeof
(
FILETIME
)))
ret
=
FALSE
;
else
else
{
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
ret
=
FALSE
;
ret
=
SystemTimeToFileTime
(
&
sysTime
,
(
FILETIME
*
)
pvStructInfo
);
}
}
}
}
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2750,30 +2976,34 @@ static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
...
@@ -2750,30 +2976,34 @@ static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
{
{
BOOL
ret
;
BOOL
ret
;
if
(
!
pbEncoded
||
!
cbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
!
pvStructInfo
)
if
(
!
pvStructInfo
)
{
{
*
pcbStructInfo
=
sizeof
(
FILETIME
);
*
pcbStructInfo
=
sizeof
(
FILETIME
);
return
TRUE
;
return
TRUE
;
}
}
if
(
pbEncoded
[
0
]
==
ASN_UTCTIME
)
__TRY
ret
=
CRYPT_AsnDecodeUtcTime
(
dwCertEncodingType
,
lpszStructType
,
pbEncoded
,
cbEncoded
,
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
);
else
if
(
pbEncoded
[
0
]
==
ASN_GENERALTIME
)
ret
=
CRYPT_AsnDecodeGeneralizedTime
(
dwCertEncodingType
,
lpszStructType
,
pbEncoded
,
cbEncoded
,
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
);
else
{
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
if
(
pbEncoded
[
0
]
==
ASN_UTCTIME
)
ret
=
CRYPT_AsnDecodeUtcTime
(
dwCertEncodingType
,
lpszStructType
,
pbEncoded
,
cbEncoded
,
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
);
else
if
(
pbEncoded
[
0
]
==
ASN_GENERALTIME
)
ret
=
CRYPT_AsnDecodeGeneralizedTime
(
dwCertEncodingType
,
lpszStructType
,
pbEncoded
,
cbEncoded
,
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
);
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
ret
=
FALSE
;
}
}
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
ret
=
FALSE
;
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2781,87 +3011,102 @@ static BOOL WINAPI CRYPT_AsnDecodeSequenceOfAny(DWORD dwCertEncodingType,
...
@@ -2781,87 +3011,102 @@ static BOOL WINAPI CRYPT_AsnDecodeSequenceOfAny(DWORD dwCertEncodingType,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
LPCSTR
lpszStructType
,
const
BYTE
*
pbEncoded
,
DWORD
cbEncoded
,
DWORD
dwFlags
,
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
PCRYPT_DECODE_PARA
pDecodePara
,
void
*
pvStructInfo
,
DWORD
*
pcbStructInfo
)
{
{
DWORD
bytesNeeded
,
dataLen
,
remainingLen
,
cValue
;
BYTE
lenBytes
;
BOOL
ret
=
TRUE
;
BOOL
ret
=
TRUE
;
const
BYTE
*
ptr
;
if
(
!
pbEncoded
||
!
cbEncoded
)
__TRY
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
pbEncoded
[
0
]
!=
ASN_SEQUENCEOF
)
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
if
(
!
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
))
return
FALSE
;
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
sizeof
(
CRYPT_SEQUENCE_OF_ANY
);
cValue
=
0
;
ptr
=
pbEncoded
+
1
+
lenBytes
;
remainingLen
=
dataLen
;
while
(
ret
&&
remainingLen
)
{
{
DWORD
nextLen
;
if
(
pbEncoded
[
0
]
==
ASN_SEQUENCEOF
)
ret
=
CRYPT_GetLen
(
ptr
,
remainingLen
,
&
nextLen
);
if
(
ret
)
{
{
DWORD
nextLenBytes
=
GET_LEN_BYTES
(
ptr
[
1
]);
DWORD
bytesNeeded
,
dataLen
,
remainingLen
,
cValue
;
remainingLen
-=
1
+
nextLenBytes
+
nextLen
;
ptr
+=
1
+
nextLenBytes
+
nextLen
;
bytesNeeded
+=
sizeof
(
CRYPT_DER_BLOB
);
if
(
!
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
))
bytesNeeded
+=
1
+
nextLenBytes
+
nextLen
;
cValue
++
;
}
}
if
(
ret
)
{
CRYPT_SEQUENCE_OF_ANY
*
seq
;
BYTE
*
nextPtr
;
DWORD
i
;
if
(
!
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
if
((
ret
=
CRYPT_GetLen
(
pbEncoded
,
cbEncoded
,
&
dataLen
)))
pcbStructInfo
,
bytesNeeded
))
return
FALSE
;
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
seq
=
(
CRYPT_SEQUENCE_OF_ANY
*
)
pvStructInfo
;
seq
->
cValue
=
cValue
;
seq
->
rgValue
=
(
CRYPT_DER_BLOB
*
)((
BYTE
*
)
seq
+
sizeof
(
*
seq
));
nextPtr
=
(
BYTE
*
)
seq
->
rgValue
+
cValue
*
sizeof
(
CRYPT_DER_BLOB
);
ptr
=
pbEncoded
+
1
+
lenBytes
;
remainingLen
=
dataLen
;
i
=
0
;
while
(
ret
&&
remainingLen
)
{
DWORD
nextLen
;
ret
=
CRYPT_GetLen
(
ptr
,
remainingLen
,
&
nextLen
);
if
(
ret
)
{
{
DWORD
nextLenBytes
=
GET_LEN_BYTES
(
ptr
[
1
]);
BYTE
lenBytes
;
const
BYTE
*
ptr
;
lenBytes
=
GET_LEN_BYTES
(
pbEncoded
[
1
]);
bytesNeeded
=
sizeof
(
CRYPT_SEQUENCE_OF_ANY
);
cValue
=
0
;
ptr
=
pbEncoded
+
1
+
lenBytes
;
remainingLen
=
dataLen
;
while
(
ret
&&
remainingLen
)
{
DWORD
nextLen
;
seq
->
rgValue
[
i
].
cbData
=
1
+
nextLenBytes
+
nextLen
;
ret
=
CRYPT_GetLen
(
ptr
,
remainingLen
,
&
nextLen
);
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
if
(
ret
)
seq
->
rgValue
[
i
].
pbData
=
(
BYTE
*
)
ptr
;
{
else
DWORD
nextLenBytes
=
GET_LEN_BYTES
(
ptr
[
1
]);
remainingLen
-=
1
+
nextLenBytes
+
nextLen
;
ptr
+=
1
+
nextLenBytes
+
nextLen
;
bytesNeeded
+=
sizeof
(
CRYPT_DER_BLOB
);
if
(
!
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
))
bytesNeeded
+=
1
+
nextLenBytes
+
nextLen
;
cValue
++
;
}
}
if
(
ret
)
{
{
seq
->
rgValue
[
i
].
pbData
=
nextPtr
;
CRYPT_SEQUENCE_OF_ANY
*
seq
;
memcpy
(
nextPtr
,
ptr
,
1
+
nextLenBytes
+
nextLen
);
BYTE
*
nextPtr
;
nextPtr
+=
1
+
nextLenBytes
+
nextLen
;
DWORD
i
;
if
((
ret
=
CRYPT_DecodeEnsureSpace
(
dwFlags
,
pDecodePara
,
pvStructInfo
,
pcbStructInfo
,
bytesNeeded
)))
{
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
)
pvStructInfo
=
*
(
BYTE
**
)
pvStructInfo
;
seq
=
(
CRYPT_SEQUENCE_OF_ANY
*
)
pvStructInfo
;
seq
->
cValue
=
cValue
;
seq
->
rgValue
=
(
CRYPT_DER_BLOB
*
)((
BYTE
*
)
seq
+
sizeof
(
*
seq
));
nextPtr
=
(
BYTE
*
)
seq
->
rgValue
+
cValue
*
sizeof
(
CRYPT_DER_BLOB
);
ptr
=
pbEncoded
+
1
+
lenBytes
;
remainingLen
=
dataLen
;
i
=
0
;
while
(
ret
&&
remainingLen
)
{
DWORD
nextLen
;
ret
=
CRYPT_GetLen
(
ptr
,
remainingLen
,
&
nextLen
);
if
(
ret
)
{
DWORD
nextLenBytes
=
GET_LEN_BYTES
(
ptr
[
1
]);
seq
->
rgValue
[
i
].
cbData
=
1
+
nextLenBytes
+
nextLen
;
if
(
dwFlags
&
CRYPT_DECODE_NOCOPY_FLAG
)
seq
->
rgValue
[
i
].
pbData
=
(
BYTE
*
)
ptr
;
else
{
seq
->
rgValue
[
i
].
pbData
=
nextPtr
;
memcpy
(
nextPtr
,
ptr
,
1
+
nextLenBytes
+
nextLen
);
nextPtr
+=
1
+
nextLenBytes
+
nextLen
;
}
remainingLen
-=
1
+
nextLenBytes
+
nextLen
;
ptr
+=
1
+
nextLenBytes
+
nextLen
;
i
++
;
}
}
}
}
}
remainingLen
-=
1
+
nextLenBytes
+
nextLen
;
ptr
+=
1
+
nextLenBytes
+
nextLen
;
i
++
;
}
}
}
}
else
{
SetLastError
(
CRYPT_E_ASN1_BADTAG
);
return
FALSE
;
}
}
__EXCEPT
(
page_fault
)
{
SetLastError
(
STATUS_ACCESS_VIOLATION
);
ret
=
FALSE
;
}
}
__ENDTRY
return
ret
;
return
ret
;
}
}
...
@@ -2892,6 +3137,16 @@ BOOL WINAPI CryptDecodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
...
@@ -2892,6 +3137,16 @@ BOOL WINAPI CryptDecodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
SetLastError
(
ERROR_FILE_NOT_FOUND
);
SetLastError
(
ERROR_FILE_NOT_FOUND
);
return
FALSE
;
return
FALSE
;
}
}
if
(
!
pbEncoded
||
!
cbEncoded
)
{
SetLastError
(
CRYPT_E_ASN1_EOD
);
return
FALSE
;
}
if
(
cbEncoded
>
MAX_ENCODED_LEN
)
{
SetLastError
(
CRYPT_E_ASN1_LARGE
);
return
FALSE
;
}
SetLastError
(
NOERROR
);
SetLastError
(
NOERROR
);
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
&&
pvStructInfo
)
if
(
dwFlags
&
CRYPT_DECODE_ALLOC_FLAG
&&
pvStructInfo
)
...
...
dlls/crypt32/tests/encode.c
View file @
d494c3ab
...
@@ -29,7 +29,7 @@
...
@@ -29,7 +29,7 @@
struct
encodedInt
struct
encodedInt
{
{
int
val
;
int
val
;
BYTE
*
encoded
;
const
BYTE
*
encoded
;
};
};
static
const
struct
encodedInt
ints
[]
=
{
static
const
struct
encodedInt
ints
[]
=
{
...
@@ -44,9 +44,9 @@ static const struct encodedInt ints[] = {
...
@@ -44,9 +44,9 @@ static const struct encodedInt ints[] = {
struct
encodedBigInt
struct
encodedBigInt
{
{
BYTE
*
val
;
const
BYTE
*
val
;
BYTE
*
encoded
;
const
BYTE
*
encoded
;
BYTE
*
decoded
;
const
BYTE
*
decoded
;
};
};
static
const
struct
encodedBigInt
bigInts
[]
=
{
static
const
struct
encodedBigInt
bigInts
[]
=
{
...
@@ -103,6 +103,8 @@ static void test_encodeInt(DWORD dwEncoding)
...
@@ -103,6 +103,8 @@ static void test_encodeInt(DWORD dwEncoding)
{
{
ok
(
buf
[
0
]
==
2
,
"Got unexpected type %d for integer (expected 2)
\n
"
,
ok
(
buf
[
0
]
==
2
,
"Got unexpected type %d for integer (expected 2)
\n
"
,
buf
[
0
]);
buf
[
0
]);
ok
(
buf
[
1
]
==
ints
[
i
].
encoded
[
1
],
"Got length %d, expected %d
\n
"
,
buf
[
1
],
ints
[
i
].
encoded
[
1
]);
ok
(
!
memcmp
(
buf
+
1
,
ints
[
i
].
encoded
+
1
,
ints
[
i
].
encoded
[
1
]
+
1
),
ok
(
!
memcmp
(
buf
+
1
,
ints
[
i
].
encoded
+
1
,
ints
[
i
].
encoded
[
1
]
+
1
),
"Encoded value of 0x%08x didn't match expected
\n
"
,
ints
[
i
].
val
);
"Encoded value of 0x%08x didn't match expected
\n
"
,
ints
[
i
].
val
);
LocalFree
(
buf
);
LocalFree
(
buf
);
...
@@ -181,6 +183,9 @@ static void test_decodeInt(DWORD dwEncoding)
...
@@ -181,6 +183,9 @@ static void test_decodeInt(DWORD dwEncoding)
{
{
static
const
char
bigInt
[]
=
{
2
,
5
,
0xff
,
0xfe
,
0xff
,
0xfe
,
0xff
};
static
const
char
bigInt
[]
=
{
2
,
5
,
0xff
,
0xfe
,
0xff
,
0xfe
,
0xff
};
static
const
char
testStr
[]
=
{
0x16
,
4
,
't'
,
'e'
,
's'
,
't'
};
static
const
char
testStr
[]
=
{
0x16
,
4
,
't'
,
'e'
,
's'
,
't'
};
static
const
BYTE
longForm
[]
=
{
2
,
0x81
,
0x01
,
0x01
};
static
const
BYTE
tooBig
[]
=
{
0x02
,
0x84
,
0xff
,
0xff
,
0xff
,
0xff
};
static
const
BYTE
bigBogus
[]
=
{
0x02
,
0x84
,
0x01
,
0xff
,
0xff
,
0xf9
};
BYTE
*
buf
=
NULL
;
BYTE
*
buf
=
NULL
;
DWORD
bufSize
=
0
;
DWORD
bufSize
=
0
;
int
i
;
int
i
;
...
@@ -287,6 +292,33 @@ static void test_decodeInt(DWORD dwEncoding)
...
@@ -287,6 +292,33 @@ static void test_decodeInt(DWORD dwEncoding)
LocalFree
(
buf
);
LocalFree
(
buf
);
}
}
}
}
/* Decode the value 1 with long-form length */
ret
=
CryptDecodeObjectEx
(
dwEncoding
,
X509_MULTI_BYTE_INTEGER
,
longForm
,
sizeof
(
longForm
),
CRYPT_DECODE_ALLOC_FLAG
,
NULL
,
(
BYTE
*
)
&
buf
,
&
bufSize
);
ok
(
ret
,
"CryptDecodeObjectEx failed: %08lx
\n
"
,
GetLastError
());
if
(
buf
)
{
ok
(
*
(
int
*
)
buf
==
1
,
"Expected 1, got %d
\n
"
,
*
(
int
*
)
buf
);
LocalFree
(
buf
);
}
/* Try to decode some bogus large items */
/* The buffer size is smaller than the encoded length, so this should fail
* with CRYPT_E_ASN1_EOD if it's being decoded. It's failing with
* CRYPT_E_ASN1_LARGE, meaning there's a limit on the size decoded.
* The magic limit under XP seems to be 0x061a8000 bytes--more than this
* fails with CRYPT_E_ASN1_LARGE.
*/
ret
=
CryptDecodeObjectEx
(
dwEncoding
,
X509_MULTI_BYTE_INTEGER
,
tooBig
,
0x7fffffff
,
CRYPT_DECODE_ALLOC_FLAG
,
NULL
,
(
BYTE
*
)
&
buf
,
&
bufSize
);
ok
(
!
ret
&&
GetLastError
()
==
CRYPT_E_ASN1_LARGE
,
"Expected CRYPT_E_ASN1_LARGE, got %08lx
\n
"
,
GetLastError
());
/* This will try to decode the buffer and overflow it, check that it's
* caught.
*/
ret
=
CryptDecodeObjectEx
(
dwEncoding
,
X509_MULTI_BYTE_INTEGER
,
bigBogus
,
0x01ffffff
,
CRYPT_DECODE_ALLOC_FLAG
,
NULL
,
(
BYTE
*
)
&
buf
,
&
bufSize
);
ok
(
!
ret
&&
GetLastError
()
==
STATUS_ACCESS_VIOLATION
,
"Expected STATUS_ACCESS_VIOLATION, got %08lx
\n
"
,
GetLastError
());
}
}
/* These are always encoded unsigned, and aren't constrained to be any
/* These are always encoded unsigned, and aren't constrained to be any
...
@@ -516,7 +548,7 @@ static void test_decodeFiletime(DWORD dwEncoding)
...
@@ -516,7 +548,7 @@ static void test_decodeFiletime(DWORD dwEncoding)
struct
EncodedName
struct
EncodedName
{
{
CERT_RDN_ATTR
attr
;
CERT_RDN_ATTR
attr
;
BYTE
*
encoded
;
const
BYTE
*
encoded
;
};
};
static
const
char
commonName
[]
=
"Juan Lang"
;
static
const
char
commonName
[]
=
"Juan Lang"
;
...
@@ -804,8 +836,8 @@ static void test_decodeName(DWORD dwEncoding)
...
@@ -804,8 +836,8 @@ static void test_decodeName(DWORD dwEncoding)
struct
encodedOctets
struct
encodedOctets
{
{
BYTE
*
val
;
const
BYTE
*
val
;
BYTE
*
encoded
;
const
BYTE
*
encoded
;
};
};
static
const
struct
encodedOctets
octets
[]
=
{
static
const
struct
encodedOctets
octets
[]
=
{
...
@@ -878,9 +910,9 @@ static const BYTE bytesToEncode[] = { 0xff, 0xff };
...
@@ -878,9 +910,9 @@ static const BYTE bytesToEncode[] = { 0xff, 0xff };
struct
encodedBits
struct
encodedBits
{
{
DWORD
cUnusedBits
;
DWORD
cUnusedBits
;
BYTE
*
encoded
;
const
BYTE
*
encoded
;
DWORD
cbDecoded
;
DWORD
cbDecoded
;
BYTE
*
decoded
;
const
BYTE
*
decoded
;
};
};
static
const
struct
encodedBits
bits
[]
=
{
static
const
struct
encodedBits
bits
[]
=
{
...
@@ -1101,7 +1133,7 @@ static void test_encodeSequenceOfAny(DWORD dwEncoding)
...
@@ -1101,7 +1133,7 @@ static void test_encodeSequenceOfAny(DWORD dwEncoding)
for
(
i
=
0
;
i
<
sizeof
(
ints
)
/
sizeof
(
ints
[
0
]);
i
++
)
for
(
i
=
0
;
i
<
sizeof
(
ints
)
/
sizeof
(
ints
[
0
]);
i
++
)
{
{
blobs
[
i
].
cbData
=
ints
[
i
].
encoded
[
1
]
+
2
;
blobs
[
i
].
cbData
=
ints
[
i
].
encoded
[
1
]
+
2
;
blobs
[
i
].
pbData
=
ints
[
i
].
encoded
;
blobs
[
i
].
pbData
=
(
BYTE
*
)
ints
[
i
].
encoded
;
}
}
seq
.
cValue
=
sizeof
(
ints
)
/
sizeof
(
ints
[
0
]);
seq
.
cValue
=
sizeof
(
ints
)
/
sizeof
(
ints
[
0
]);
seq
.
rgValue
=
blobs
;
seq
.
rgValue
=
blobs
;
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment