Absolute File Name: | /home/opencoverage/opencoverage/guest-scripts/libressl/src/crypto/rsa/rsa_asn1.c |
Source code | Switch to Preprocessed file |
Line | Source | Count | ||||||
---|---|---|---|---|---|---|---|---|
1 | /* $OpenBSD: rsa_asn1.c,v 1.13 2016/12/30 15:47:07 jsing Exp $ */ | - | ||||||
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | - | ||||||
3 | * project 2000. | - | ||||||
4 | */ | - | ||||||
5 | /* ==================================================================== | - | ||||||
6 | * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved. | - | ||||||
7 | * | - | ||||||
8 | * Redistribution and use in source and binary forms, with or without | - | ||||||
9 | * modification, are permitted provided that the following conditions | - | ||||||
10 | * are met: | - | ||||||
11 | * | - | ||||||
12 | * 1. Redistributions of source code must retain the above copyright | - | ||||||
13 | * notice, this list of conditions and the following disclaimer. | - | ||||||
14 | * | - | ||||||
15 | * 2. Redistributions in binary form must reproduce the above copyright | - | ||||||
16 | * notice, this list of conditions and the following disclaimer in | - | ||||||
17 | * the documentation and/or other materials provided with the | - | ||||||
18 | * distribution. | - | ||||||
19 | * | - | ||||||
20 | * 3. All advertising materials mentioning features or use of this | - | ||||||
21 | * software must display the following acknowledgment: | - | ||||||
22 | * "This product includes software developed by the OpenSSL Project | - | ||||||
23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | - | ||||||
24 | * | - | ||||||
25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | - | ||||||
26 | * endorse or promote products derived from this software without | - | ||||||
27 | * prior written permission. For written permission, please contact | - | ||||||
28 | * licensing@OpenSSL.org. | - | ||||||
29 | * | - | ||||||
30 | * 5. Products derived from this software may not be called "OpenSSL" | - | ||||||
31 | * nor may "OpenSSL" appear in their names without prior written | - | ||||||
32 | * permission of the OpenSSL Project. | - | ||||||
33 | * | - | ||||||
34 | * 6. Redistributions of any form whatsoever must retain the following | - | ||||||
35 | * acknowledgment: | - | ||||||
36 | * "This product includes software developed by the OpenSSL Project | - | ||||||
37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | - | ||||||
38 | * | - | ||||||
39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | - | ||||||
40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | - | ||||||
41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | - | ||||||
42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | - | ||||||
43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | - | ||||||
44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | - | ||||||
45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | - | ||||||
46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | - | ||||||
47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | - | ||||||
48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | - | ||||||
49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | - | ||||||
50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | - | ||||||
51 | * ==================================================================== | - | ||||||
52 | * | - | ||||||
53 | * This product includes cryptographic software written by Eric Young | - | ||||||
54 | * (eay@cryptsoft.com). This product includes software written by Tim | - | ||||||
55 | * Hudson (tjh@cryptsoft.com). | - | ||||||
56 | * | - | ||||||
57 | */ | - | ||||||
58 | - | |||||||
59 | #include <stdio.h> | - | ||||||
60 | - | |||||||
61 | #include <openssl/asn1t.h> | - | ||||||
62 | #include <openssl/bn.h> | - | ||||||
63 | #include <openssl/rsa.h> | - | ||||||
64 | #include <openssl/x509.h> | - | ||||||
65 | - | |||||||
66 | /* Override the default free and new methods */ | - | ||||||
67 | static int | - | ||||||
68 | rsa_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg) | - | ||||||
69 | { | - | ||||||
70 | if (operation == ASN1_OP_NEW_PRE) {
| 252-513 | ||||||
71 | *pval = (ASN1_VALUE *)RSA_new(); | - | ||||||
72 | if (*pval)
| 0-252 | ||||||
73 | return 2; executed 252 times by 5 tests: return 2; Executed by:
| 252 | ||||||
74 | return 0; never executed: return 0; | 0 | ||||||
75 | } else if (operation == ASN1_OP_FREE_PRE) {
| 0-513 | ||||||
76 | RSA_free((RSA *)*pval); | - | ||||||
77 | *pval = NULL; | - | ||||||
78 | return 2; never executed: return 2; | 0 | ||||||
79 | } | - | ||||||
80 | return 1; executed 513 times by 5 tests: return 1; Executed by:
| 513 | ||||||
81 | } | - | ||||||
82 | - | |||||||
83 | static const ASN1_AUX RSAPrivateKey_aux = { | - | ||||||
84 | .app_data = NULL, | - | ||||||
85 | .flags = 0, | - | ||||||
86 | .ref_offset = 0, | - | ||||||
87 | .ref_lock = 0, | - | ||||||
88 | .asn1_cb = rsa_cb, | - | ||||||
89 | .enc_offset = 0, | - | ||||||
90 | }; | - | ||||||
91 | static const ASN1_TEMPLATE RSAPrivateKey_seq_tt[] = { | - | ||||||
92 | { | - | ||||||
93 | .flags = 0, | - | ||||||
94 | .tag = 0, | - | ||||||
95 | .offset = offsetof(RSA, version), | - | ||||||
96 | .field_name = "version", | - | ||||||
97 | .item = &LONG_it, | - | ||||||
98 | }, | - | ||||||
99 | { | - | ||||||
100 | .flags = 0, | - | ||||||
101 | .tag = 0, | - | ||||||
102 | .offset = offsetof(RSA, n), | - | ||||||
103 | .field_name = "n", | - | ||||||
104 | .item = &BIGNUM_it, | - | ||||||
105 | }, | - | ||||||
106 | { | - | ||||||
107 | .flags = 0, | - | ||||||
108 | .tag = 0, | - | ||||||
109 | .offset = offsetof(RSA, e), | - | ||||||
110 | .field_name = "e", | - | ||||||
111 | .item = &BIGNUM_it, | - | ||||||
112 | }, | - | ||||||
113 | { | - | ||||||
114 | .flags = 0, | - | ||||||
115 | .tag = 0, | - | ||||||
116 | .offset = offsetof(RSA, d), | - | ||||||
117 | .field_name = "d", | - | ||||||
118 | .item = &BIGNUM_it, | - | ||||||
119 | }, | - | ||||||
120 | { | - | ||||||
121 | .flags = 0, | - | ||||||
122 | .tag = 0, | - | ||||||
123 | .offset = offsetof(RSA, p), | - | ||||||
124 | .field_name = "p", | - | ||||||
125 | .item = &BIGNUM_it, | - | ||||||
126 | }, | - | ||||||
127 | { | - | ||||||
128 | .flags = 0, | - | ||||||
129 | .tag = 0, | - | ||||||
130 | .offset = offsetof(RSA, q), | - | ||||||
131 | .field_name = "q", | - | ||||||
132 | .item = &BIGNUM_it, | - | ||||||
133 | }, | - | ||||||
134 | { | - | ||||||
135 | .flags = 0, | - | ||||||
136 | .tag = 0, | - | ||||||
137 | .offset = offsetof(RSA, dmp1), | - | ||||||
138 | .field_name = "dmp1", | - | ||||||
139 | .item = &BIGNUM_it, | - | ||||||
140 | }, | - | ||||||
141 | { | - | ||||||
142 | .flags = 0, | - | ||||||
143 | .tag = 0, | - | ||||||
144 | .offset = offsetof(RSA, dmq1), | - | ||||||
145 | .field_name = "dmq1", | - | ||||||
146 | .item = &BIGNUM_it, | - | ||||||
147 | }, | - | ||||||
148 | { | - | ||||||
149 | .flags = 0, | - | ||||||
150 | .tag = 0, | - | ||||||
151 | .offset = offsetof(RSA, iqmp), | - | ||||||
152 | .field_name = "iqmp", | - | ||||||
153 | .item = &BIGNUM_it, | - | ||||||
154 | }, | - | ||||||
155 | }; | - | ||||||
156 | - | |||||||
157 | const ASN1_ITEM RSAPrivateKey_it = { | - | ||||||
158 | .itype = ASN1_ITYPE_SEQUENCE, | - | ||||||
159 | .utype = V_ASN1_SEQUENCE, | - | ||||||
160 | .templates = RSAPrivateKey_seq_tt, | - | ||||||
161 | .tcount = sizeof(RSAPrivateKey_seq_tt) / sizeof(ASN1_TEMPLATE), | - | ||||||
162 | .funcs = &RSAPrivateKey_aux, | - | ||||||
163 | .size = sizeof(RSA), | - | ||||||
164 | .sname = "RSA", | - | ||||||
165 | }; | - | ||||||
166 | - | |||||||
167 | - | |||||||
168 | static const ASN1_AUX RSAPublicKey_aux = { | - | ||||||
169 | .app_data = NULL, | - | ||||||
170 | .flags = 0, | - | ||||||
171 | .ref_offset = 0, | - | ||||||
172 | .ref_lock = 0, | - | ||||||
173 | .asn1_cb = rsa_cb, | - | ||||||
174 | .enc_offset = 0, | - | ||||||
175 | }; | - | ||||||
176 | static const ASN1_TEMPLATE RSAPublicKey_seq_tt[] = { | - | ||||||
177 | { | - | ||||||
178 | .flags = 0, | - | ||||||
179 | .tag = 0, | - | ||||||
180 | .offset = offsetof(RSA, n), | - | ||||||
181 | .field_name = "n", | - | ||||||
182 | .item = &BIGNUM_it, | - | ||||||
183 | }, | - | ||||||
184 | { | - | ||||||
185 | .flags = 0, | - | ||||||
186 | .tag = 0, | - | ||||||
187 | .offset = offsetof(RSA, e), | - | ||||||
188 | .field_name = "e", | - | ||||||
189 | .item = &BIGNUM_it, | - | ||||||
190 | }, | - | ||||||
191 | }; | - | ||||||
192 | - | |||||||
193 | const ASN1_ITEM RSAPublicKey_it = { | - | ||||||
194 | .itype = ASN1_ITYPE_SEQUENCE, | - | ||||||
195 | .utype = V_ASN1_SEQUENCE, | - | ||||||
196 | .templates = RSAPublicKey_seq_tt, | - | ||||||
197 | .tcount = sizeof(RSAPublicKey_seq_tt) / sizeof(ASN1_TEMPLATE), | - | ||||||
198 | .funcs = &RSAPublicKey_aux, | - | ||||||
199 | .size = sizeof(RSA), | - | ||||||
200 | .sname = "RSA", | - | ||||||
201 | }; | - | ||||||
202 | - | |||||||
203 | static const ASN1_TEMPLATE RSA_PSS_PARAMS_seq_tt[] = { | - | ||||||
204 | { | - | ||||||
205 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | - | ||||||
206 | .tag = 0, | - | ||||||
207 | .offset = offsetof(RSA_PSS_PARAMS, hashAlgorithm), | - | ||||||
208 | .field_name = "hashAlgorithm", | - | ||||||
209 | .item = &X509_ALGOR_it, | - | ||||||
210 | }, | - | ||||||
211 | { | - | ||||||
212 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | - | ||||||
213 | .tag = 1, | - | ||||||
214 | .offset = offsetof(RSA_PSS_PARAMS, maskGenAlgorithm), | - | ||||||
215 | .field_name = "maskGenAlgorithm", | - | ||||||
216 | .item = &X509_ALGOR_it, | - | ||||||
217 | }, | - | ||||||
218 | { | - | ||||||
219 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | - | ||||||
220 | .tag = 2, | - | ||||||
221 | .offset = offsetof(RSA_PSS_PARAMS, saltLength), | - | ||||||
222 | .field_name = "saltLength", | - | ||||||
223 | .item = &ASN1_INTEGER_it, | - | ||||||
224 | }, | - | ||||||
225 | { | - | ||||||
226 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL, | - | ||||||
227 | .tag = 3, | - | ||||||
228 | .offset = offsetof(RSA_PSS_PARAMS, trailerField), | - | ||||||
229 | .field_name = "trailerField", | - | ||||||
230 | .item = &ASN1_INTEGER_it, | - | ||||||
231 | }, | - | ||||||
232 | }; | - | ||||||
233 | - | |||||||
234 | const ASN1_ITEM RSA_PSS_PARAMS_it = { | - | ||||||
235 | .itype = ASN1_ITYPE_SEQUENCE, | - | ||||||
236 | .utype = V_ASN1_SEQUENCE, | - | ||||||
237 | .templates = RSA_PSS_PARAMS_seq_tt, | - | ||||||
238 | .tcount = sizeof(RSA_PSS_PARAMS_seq_tt) / sizeof(ASN1_TEMPLATE), | - | ||||||
239 | .funcs = NULL, | - | ||||||
240 | .size = sizeof(RSA_PSS_PARAMS), | - | ||||||
241 | .sname = "RSA_PSS_PARAMS", | - | ||||||
242 | }; | - | ||||||
243 | - | |||||||
244 | - | |||||||
245 | RSA_PSS_PARAMS * | - | ||||||
246 | d2i_RSA_PSS_PARAMS(RSA_PSS_PARAMS **a, const unsigned char **in, long len) | - | ||||||
247 | { | - | ||||||
248 | return (RSA_PSS_PARAMS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, never executed: return (RSA_PSS_PARAMS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSA_PSS_PARAMS_it); | 0 | ||||||
249 | &RSA_PSS_PARAMS_it); never executed: return (RSA_PSS_PARAMS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSA_PSS_PARAMS_it); | 0 | ||||||
250 | } | - | ||||||
251 | - | |||||||
252 | int | - | ||||||
253 | i2d_RSA_PSS_PARAMS(RSA_PSS_PARAMS *a, unsigned char **out) | - | ||||||
254 | { | - | ||||||
255 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSA_PSS_PARAMS_it); never executed: return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSA_PSS_PARAMS_it); | 0 | ||||||
256 | } | - | ||||||
257 | - | |||||||
258 | RSA_PSS_PARAMS * | - | ||||||
259 | RSA_PSS_PARAMS_new(void) | - | ||||||
260 | { | - | ||||||
261 | return (RSA_PSS_PARAMS *)ASN1_item_new(&RSA_PSS_PARAMS_it); never executed: return (RSA_PSS_PARAMS *)ASN1_item_new(&RSA_PSS_PARAMS_it); | 0 | ||||||
262 | } | - | ||||||
263 | - | |||||||
264 | void | - | ||||||
265 | RSA_PSS_PARAMS_free(RSA_PSS_PARAMS *a) | - | ||||||
266 | { | - | ||||||
267 | ASN1_item_free((ASN1_VALUE *)a, &RSA_PSS_PARAMS_it); | - | ||||||
268 | } executed 1 time by 1 test: end of block Executed by:
| 1 | ||||||
269 | - | |||||||
270 | - | |||||||
271 | RSA * | - | ||||||
272 | d2i_RSAPrivateKey(RSA **a, const unsigned char **in, long len) | - | ||||||
273 | { | - | ||||||
274 | return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, executed 65 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPrivateKey_it); Executed by:
| 65 | ||||||
275 | &RSAPrivateKey_it); executed 65 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPrivateKey_it); Executed by:
| 65 | ||||||
276 | } | - | ||||||
277 | - | |||||||
278 | int | - | ||||||
279 | i2d_RSAPrivateKey(const RSA *a, unsigned char **out) | - | ||||||
280 | { | - | ||||||
281 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPrivateKey_it); executed 2 times by 1 test: return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPrivateKey_it); Executed by:
| 2 | ||||||
282 | } | - | ||||||
283 | - | |||||||
284 | - | |||||||
285 | RSA * | - | ||||||
286 | d2i_RSAPublicKey(RSA **a, const unsigned char **in, long len) | - | ||||||
287 | { | - | ||||||
288 | return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, executed 187 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPublicKey_it); Executed by:
| 187 | ||||||
289 | &RSAPublicKey_it); executed 187 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPublicKey_it); Executed by:
| 187 | ||||||
290 | } | - | ||||||
291 | - | |||||||
292 | int | - | ||||||
293 | i2d_RSAPublicKey(const RSA *a, unsigned char **out) | - | ||||||
294 | { | - | ||||||
295 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPublicKey_it); executed 2 times by 1 test: return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPublicKey_it); Executed by:
| 2 | ||||||
296 | } | - | ||||||
297 | - | |||||||
298 | RSA * | - | ||||||
299 | RSAPublicKey_dup(RSA *rsa) | - | ||||||
300 | { | - | ||||||
301 | return ASN1_item_dup(&RSAPublicKey_it, rsa); never executed: return ASN1_item_dup(&RSAPublicKey_it, rsa); | 0 | ||||||
302 | } | - | ||||||
303 | - | |||||||
304 | RSA * | - | ||||||
305 | RSAPrivateKey_dup(RSA *rsa) | - | ||||||
306 | { | - | ||||||
307 | return ASN1_item_dup(&RSAPrivateKey_it, rsa); never executed: return ASN1_item_dup(&RSAPrivateKey_it, rsa); | 0 | ||||||
308 | } | - | ||||||
Source code | Switch to Preprocessed file |