diff options
author | 2015-06-15 07:35:49 +0000 | |
---|---|---|
committer | 2015-06-15 07:35:49 +0000 | |
commit | 0870ee343aa39b66a4b36e75c03c2379b807e74d (patch) | |
tree | 7bbaa6609ad459ad7c3619435f3259785f24eee4 /lib/libssl/bytestring.h | |
parent | turn SSH1 back on to match src/usr.bin/ssh being tested (diff) | |
download | wireguard-openbsd-0870ee343aa39b66a4b36e75c03c2379b807e74d.tar.xz wireguard-openbsd-0870ee343aa39b66a4b36e75c03c2379b807e74d.zip |
Make CBS_get_any_asn1_element() more compliant with DER encoding.
CBS_get_any_asn1_element violates DER encoding by allowing indefinite
form. All callers except bs_ber.c expect DER encoding. The callers
must check to see if it was indefinite or not.
Rather than exposing all callers to this behavior,
cbs_get_any_asn1_element_internal() allows specifying whether you want to
allow the normally forbidden indefinite form. This is used by
CBS_get_any_asn1_element() for strict DER encoding and by a new static
function in bs_ber.c for the relaxed version.
While I was here, I added comments to differentiate between ASN.1
restrictions and CBS limitations.
ok miod@
Diffstat (limited to 'lib/libssl/bytestring.h')
-rw-r--r-- | lib/libssl/bytestring.h | 20 |
1 files changed, 16 insertions, 4 deletions
diff --git a/lib/libssl/bytestring.h b/lib/libssl/bytestring.h index b98c930da56..d66ab65b919 100644 --- a/lib/libssl/bytestring.h +++ b/lib/libssl/bytestring.h @@ -1,4 +1,4 @@ -/* $OpenBSD: bytestring.h,v 1.6 2015/06/13 09:02:45 doug Exp $ */ +/* $OpenBSD: bytestring.h,v 1.7 2015/06/15 07:35:49 doug Exp $ */ /* * Copyright (c) 2014, Google Inc. * @@ -223,9 +223,8 @@ int CBS_peek_asn1_tag(const CBS *cbs, unsigned tag_value); /* * CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from * |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to - * the tag number and |*out_header_len| to the length of the ASN.1 header. If - * the element has indefinite length then |*out| will only contain the - * header. Each of |out|, |out_tag|, and |out_header_len| may be NULL to ignore + * the tag number and |*out_header_len| to the length of the ASN.1 header. + * Each of |out|, |out_tag|, and |out_header_len| may be NULL to ignore * the value. * * Tag numbers greater than 30 are not supported (i.e. short form only). @@ -452,6 +451,19 @@ int CBB_add_asn1_uint64(CBB *cbb, uint64_t value); #ifdef LIBRESSL_INTERNAL /* + * CBS_get_any_asn1_element sets |*out| to contain the next ASN.1 element from + * |*cbs| (including header bytes) and advances |*cbs|. It sets |*out_tag| to + * the tag number and |*out_header_len| to the length of the ASN.1 header. If + * strict mode is disabled and the element has indefinite length then |*out| + * will only contain the header. Each of |out|, |out_tag|, and + * |out_header_len| may be NULL to ignore the value. + * + * Tag numbers greater than 30 are not supported (i.e. short form only). + */ +int cbs_get_any_asn1_element_internal(CBS *cbs, CBS *out, unsigned *out_tag, + size_t *out_header_len, int strict); + +/* * CBS_asn1_ber_to_der reads an ASN.1 structure from |in|. If it finds * indefinite-length elements then it attempts to convert the BER data to DER * and sets |*out| and |*out_length| to describe a malloced buffer containing |