OpenCoverage

rsa_asn1.c

Absolute File Name:/home/opencoverage/opencoverage/guest-scripts/libressl/src/crypto/rsa/rsa_asn1.c
Source codeSwitch to Preprocessed file
LineSourceCount
1/* $OpenBSD: rsa_asn1.c,v 1.13 2016/12/30 15:47:07 jsing Exp $ */-
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL-
3 * project 2000.-
4 */-
5/* ====================================================================-
6 * Copyright (c) 2000-2005 The OpenSSL Project. All rights reserved.-
7 *-
8 * Redistribution and use in source and binary forms, with or without-
9 * modification, are permitted provided that the following conditions-
10 * are met:-
11 *-
12 * 1. Redistributions of source code must retain the above copyright-
13 * notice, this list of conditions and the following disclaimer.-
14 *-
15 * 2. Redistributions in binary form must reproduce the above copyright-
16 * notice, this list of conditions and the following disclaimer in-
17 * the documentation and/or other materials provided with the-
18 * distribution.-
19 *-
20 * 3. All advertising materials mentioning features or use of this-
21 * software must display the following acknowledgment:-
22 * "This product includes software developed by the OpenSSL Project-
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"-
24 *-
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to-
26 * endorse or promote products derived from this software without-
27 * prior written permission. For written permission, please contact-
28 * licensing@OpenSSL.org.-
29 *-
30 * 5. Products derived from this software may not be called "OpenSSL"-
31 * nor may "OpenSSL" appear in their names without prior written-
32 * permission of the OpenSSL Project.-
33 *-
34 * 6. Redistributions of any form whatsoever must retain the following-
35 * acknowledgment:-
36 * "This product includes software developed by the OpenSSL Project-
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"-
38 *-
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY-
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE-
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR-
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR-
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,-
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT-
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;-
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)-
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,-
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)-
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED-
50 * OF THE POSSIBILITY OF SUCH DAMAGE.-
51 * ====================================================================-
52 *-
53 * This product includes cryptographic software written by Eric Young-
54 * (eay@cryptsoft.com). This product includes software written by Tim-
55 * Hudson (tjh@cryptsoft.com).-
56 *-
57 */-
58-
59#include <stdio.h>-
60-
61#include <openssl/asn1t.h>-
62#include <openssl/bn.h>-
63#include <openssl/rsa.h>-
64#include <openssl/x509.h>-
65-
66/* Override the default free and new methods */-
67static int-
68rsa_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg)-
69{-
70 if (operation == ASN1_OP_NEW_PRE) {
operation == 0Description
TRUEevaluated 252 times by 5 tests
Evaluated by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
FALSEevaluated 513 times by 5 tests
Evaluated by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
252-513
71 *pval = (ASN1_VALUE *)RSA_new();-
72 if (*pval)
*pvalDescription
TRUEevaluated 252 times by 5 tests
Evaluated by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
FALSEnever evaluated
0-252
73 return 2;
executed 252 times by 5 tests: return 2;
Executed by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
252
74 return 0;
never executed: return 0;
0
75 } else if (operation == ASN1_OP_FREE_PRE) {
operation == 2Description
TRUEnever evaluated
FALSEevaluated 513 times by 5 tests
Evaluated by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
0-513
76 RSA_free((RSA *)*pval);-
77 *pval = NULL;-
78 return 2;
never executed: return 2;
0
79 }-
80 return 1;
executed 513 times by 5 tests: return 1;
Executed by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
513
81}-
82-
83static const ASN1_AUX RSAPrivateKey_aux = {-
84 .app_data = NULL,-
85 .flags = 0,-
86 .ref_offset = 0,-
87 .ref_lock = 0,-
88 .asn1_cb = rsa_cb,-
89 .enc_offset = 0,-
90};-
91static const ASN1_TEMPLATE RSAPrivateKey_seq_tt[] = {-
92 {-
93 .flags = 0,-
94 .tag = 0,-
95 .offset = offsetof(RSA, version),-
96 .field_name = "version",-
97 .item = &LONG_it,-
98 },-
99 {-
100 .flags = 0,-
101 .tag = 0,-
102 .offset = offsetof(RSA, n),-
103 .field_name = "n",-
104 .item = &BIGNUM_it,-
105 },-
106 {-
107 .flags = 0,-
108 .tag = 0,-
109 .offset = offsetof(RSA, e),-
110 .field_name = "e",-
111 .item = &BIGNUM_it,-
112 },-
113 {-
114 .flags = 0,-
115 .tag = 0,-
116 .offset = offsetof(RSA, d),-
117 .field_name = "d",-
118 .item = &BIGNUM_it,-
119 },-
120 {-
121 .flags = 0,-
122 .tag = 0,-
123 .offset = offsetof(RSA, p),-
124 .field_name = "p",-
125 .item = &BIGNUM_it,-
126 },-
127 {-
128 .flags = 0,-
129 .tag = 0,-
130 .offset = offsetof(RSA, q),-
131 .field_name = "q",-
132 .item = &BIGNUM_it,-
133 },-
134 {-
135 .flags = 0,-
136 .tag = 0,-
137 .offset = offsetof(RSA, dmp1),-
138 .field_name = "dmp1",-
139 .item = &BIGNUM_it,-
140 },-
141 {-
142 .flags = 0,-
143 .tag = 0,-
144 .offset = offsetof(RSA, dmq1),-
145 .field_name = "dmq1",-
146 .item = &BIGNUM_it,-
147 },-
148 {-
149 .flags = 0,-
150 .tag = 0,-
151 .offset = offsetof(RSA, iqmp),-
152 .field_name = "iqmp",-
153 .item = &BIGNUM_it,-
154 },-
155};-
156-
157const ASN1_ITEM RSAPrivateKey_it = {-
158 .itype = ASN1_ITYPE_SEQUENCE,-
159 .utype = V_ASN1_SEQUENCE,-
160 .templates = RSAPrivateKey_seq_tt,-
161 .tcount = sizeof(RSAPrivateKey_seq_tt) / sizeof(ASN1_TEMPLATE),-
162 .funcs = &RSAPrivateKey_aux,-
163 .size = sizeof(RSA),-
164 .sname = "RSA",-
165};-
166-
167-
168static const ASN1_AUX RSAPublicKey_aux = {-
169 .app_data = NULL,-
170 .flags = 0,-
171 .ref_offset = 0,-
172 .ref_lock = 0,-
173 .asn1_cb = rsa_cb,-
174 .enc_offset = 0,-
175};-
176static const ASN1_TEMPLATE RSAPublicKey_seq_tt[] = {-
177 {-
178 .flags = 0,-
179 .tag = 0,-
180 .offset = offsetof(RSA, n),-
181 .field_name = "n",-
182 .item = &BIGNUM_it,-
183 },-
184 {-
185 .flags = 0,-
186 .tag = 0,-
187 .offset = offsetof(RSA, e),-
188 .field_name = "e",-
189 .item = &BIGNUM_it,-
190 },-
191};-
192-
193const ASN1_ITEM RSAPublicKey_it = {-
194 .itype = ASN1_ITYPE_SEQUENCE,-
195 .utype = V_ASN1_SEQUENCE,-
196 .templates = RSAPublicKey_seq_tt,-
197 .tcount = sizeof(RSAPublicKey_seq_tt) / sizeof(ASN1_TEMPLATE),-
198 .funcs = &RSAPublicKey_aux,-
199 .size = sizeof(RSA),-
200 .sname = "RSA",-
201};-
202-
203static const ASN1_TEMPLATE RSA_PSS_PARAMS_seq_tt[] = {-
204 {-
205 .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,-
206 .tag = 0,-
207 .offset = offsetof(RSA_PSS_PARAMS, hashAlgorithm),-
208 .field_name = "hashAlgorithm",-
209 .item = &X509_ALGOR_it,-
210 },-
211 {-
212 .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,-
213 .tag = 1,-
214 .offset = offsetof(RSA_PSS_PARAMS, maskGenAlgorithm),-
215 .field_name = "maskGenAlgorithm",-
216 .item = &X509_ALGOR_it,-
217 },-
218 {-
219 .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,-
220 .tag = 2,-
221 .offset = offsetof(RSA_PSS_PARAMS, saltLength),-
222 .field_name = "saltLength",-
223 .item = &ASN1_INTEGER_it,-
224 },-
225 {-
226 .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,-
227 .tag = 3,-
228 .offset = offsetof(RSA_PSS_PARAMS, trailerField),-
229 .field_name = "trailerField",-
230 .item = &ASN1_INTEGER_it,-
231 },-
232};-
233-
234const ASN1_ITEM RSA_PSS_PARAMS_it = {-
235 .itype = ASN1_ITYPE_SEQUENCE,-
236 .utype = V_ASN1_SEQUENCE,-
237 .templates = RSA_PSS_PARAMS_seq_tt,-
238 .tcount = sizeof(RSA_PSS_PARAMS_seq_tt) / sizeof(ASN1_TEMPLATE),-
239 .funcs = NULL,-
240 .size = sizeof(RSA_PSS_PARAMS),-
241 .sname = "RSA_PSS_PARAMS",-
242};-
243-
244-
245RSA_PSS_PARAMS *-
246d2i_RSA_PSS_PARAMS(RSA_PSS_PARAMS **a, const unsigned char **in, long len)-
247{-
248 return (RSA_PSS_PARAMS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len,
never executed: return (RSA_PSS_PARAMS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSA_PSS_PARAMS_it);
0
249 &RSA_PSS_PARAMS_it);
never executed: return (RSA_PSS_PARAMS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSA_PSS_PARAMS_it);
0
250}-
251-
252int-
253i2d_RSA_PSS_PARAMS(RSA_PSS_PARAMS *a, unsigned char **out)-
254{-
255 return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSA_PSS_PARAMS_it);
never executed: return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSA_PSS_PARAMS_it);
0
256}-
257-
258RSA_PSS_PARAMS *-
259RSA_PSS_PARAMS_new(void)-
260{-
261 return (RSA_PSS_PARAMS *)ASN1_item_new(&RSA_PSS_PARAMS_it);
never executed: return (RSA_PSS_PARAMS *)ASN1_item_new(&RSA_PSS_PARAMS_it);
0
262}-
263-
264void-
265RSA_PSS_PARAMS_free(RSA_PSS_PARAMS *a)-
266{-
267 ASN1_item_free((ASN1_VALUE *)a, &RSA_PSS_PARAMS_it);-
268}
executed 1 time by 1 test: end of block
Executed by:
  • freenull
1
269-
270-
271RSA *-
272d2i_RSAPrivateKey(RSA **a, const unsigned char **in, long len)-
273{-
274 return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len,
executed 65 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPrivateKey_it);
Executed by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
65
275 &RSAPrivateKey_it);
executed 65 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPrivateKey_it);
Executed by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
65
276}-
277-
278int-
279i2d_RSAPrivateKey(const RSA *a, unsigned char **out)-
280{-
281 return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPrivateKey_it);
executed 2 times by 1 test: return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPrivateKey_it);
Executed by:
  • libcrypto.so.44.0.1
2
282}-
283-
284-
285RSA *-
286d2i_RSAPublicKey(RSA **a, const unsigned char **in, long len)-
287{-
288 return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len,
executed 187 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPublicKey_it);
Executed by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
187
289 &RSAPublicKey_it);
executed 187 times by 5 tests: return (RSA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, &RSAPublicKey_it);
Executed by:
  • libcrypto.so.44.0.1
  • pkcs7test
  • servertest
  • ssltest
  • tlstest
187
290}-
291-
292int-
293i2d_RSAPublicKey(const RSA *a, unsigned char **out)-
294{-
295 return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPublicKey_it);
executed 2 times by 1 test: return ASN1_item_i2d((ASN1_VALUE *)a, out, &RSAPublicKey_it);
Executed by:
  • libcrypto.so.44.0.1
2
296}-
297-
298RSA *-
299RSAPublicKey_dup(RSA *rsa)-
300{-
301 return ASN1_item_dup(&RSAPublicKey_it, rsa);
never executed: return ASN1_item_dup(&RSAPublicKey_it, rsa);
0
302}-
303-
304RSA *-
305RSAPrivateKey_dup(RSA *rsa)-
306{-
307 return ASN1_item_dup(&RSAPrivateKey_it, rsa);
never executed: return ASN1_item_dup(&RSAPrivateKey_it, rsa);
0
308}-
Source codeSwitch to Preprocessed file

Generated by Squish Coco 4.2.2