mirror of
				https://github.com/ossrs/srs.git
				synced 2025-03-09 15:49:59 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			234 lines
		
	
	
	
		
			6.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			234 lines
		
	
	
	
		
			6.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved.
 | |
|  *
 | |
|  * Licensed under the OpenSSL license (the "License").  You may not use
 | |
|  * this file except in compliance with the License.  You can obtain a copy
 | |
|  * in the file LICENSE in the source distribution or at
 | |
|  * https://www.openssl.org/source/license.html
 | |
|  */
 | |
| 
 | |
| #include <stdio.h>
 | |
| #include <limits.h>
 | |
| #include "internal/cryptlib.h"
 | |
| #include "internal/numbers.h"
 | |
| #include <openssl/buffer.h>
 | |
| #include <openssl/asn1.h>
 | |
| #include "crypto/asn1.h"
 | |
| 
 | |
| #ifndef NO_OLD_ASN1
 | |
| # ifndef OPENSSL_NO_STDIO
 | |
| 
 | |
| void *ASN1_d2i_fp(void *(*xnew) (void), d2i_of_void *d2i, FILE *in, void **x)
 | |
| {
 | |
|     BIO *b;
 | |
|     void *ret;
 | |
| 
 | |
|     if ((b = BIO_new(BIO_s_file())) == NULL) {
 | |
|         ASN1err(ASN1_F_ASN1_D2I_FP, ERR_R_BUF_LIB);
 | |
|         return NULL;
 | |
|     }
 | |
|     BIO_set_fp(b, in, BIO_NOCLOSE);
 | |
|     ret = ASN1_d2i_bio(xnew, d2i, b, x);
 | |
|     BIO_free(b);
 | |
|     return ret;
 | |
| }
 | |
| # endif
 | |
| 
 | |
| void *ASN1_d2i_bio(void *(*xnew) (void), d2i_of_void *d2i, BIO *in, void **x)
 | |
| {
 | |
|     BUF_MEM *b = NULL;
 | |
|     const unsigned char *p;
 | |
|     void *ret = NULL;
 | |
|     int len;
 | |
| 
 | |
|     len = asn1_d2i_read_bio(in, &b);
 | |
|     if (len < 0)
 | |
|         goto err;
 | |
| 
 | |
|     p = (unsigned char *)b->data;
 | |
|     ret = d2i(x, &p, len);
 | |
|  err:
 | |
|     BUF_MEM_free(b);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| #endif
 | |
| 
 | |
| void *ASN1_item_d2i_bio(const ASN1_ITEM *it, BIO *in, void *x)
 | |
| {
 | |
|     BUF_MEM *b = NULL;
 | |
|     const unsigned char *p;
 | |
|     void *ret = NULL;
 | |
|     int len;
 | |
| 
 | |
|     len = asn1_d2i_read_bio(in, &b);
 | |
|     if (len < 0)
 | |
|         goto err;
 | |
| 
 | |
|     p = (const unsigned char *)b->data;
 | |
|     ret = ASN1_item_d2i(x, &p, len, it);
 | |
|  err:
 | |
|     BUF_MEM_free(b);
 | |
|     return ret;
 | |
| }
 | |
| 
 | |
| #ifndef OPENSSL_NO_STDIO
 | |
| void *ASN1_item_d2i_fp(const ASN1_ITEM *it, FILE *in, void *x)
 | |
| {
 | |
|     BIO *b;
 | |
|     char *ret;
 | |
| 
 | |
|     if ((b = BIO_new(BIO_s_file())) == NULL) {
 | |
|         ASN1err(ASN1_F_ASN1_ITEM_D2I_FP, ERR_R_BUF_LIB);
 | |
|         return NULL;
 | |
|     }
 | |
|     BIO_set_fp(b, in, BIO_NOCLOSE);
 | |
|     ret = ASN1_item_d2i_bio(it, b, x);
 | |
|     BIO_free(b);
 | |
|     return ret;
 | |
| }
 | |
| #endif
 | |
| 
 | |
| #define HEADER_SIZE   8
 | |
| #define ASN1_CHUNK_INITIAL_SIZE (16 * 1024)
 | |
| int asn1_d2i_read_bio(BIO *in, BUF_MEM **pb)
 | |
| {
 | |
|     BUF_MEM *b;
 | |
|     unsigned char *p;
 | |
|     int i;
 | |
|     size_t want = HEADER_SIZE;
 | |
|     uint32_t eos = 0;
 | |
|     size_t off = 0;
 | |
|     size_t len = 0;
 | |
| 
 | |
|     const unsigned char *q;
 | |
|     long slen;
 | |
|     int inf, tag, xclass;
 | |
| 
 | |
|     b = BUF_MEM_new();
 | |
|     if (b == NULL) {
 | |
|         ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ERR_R_MALLOC_FAILURE);
 | |
|         return -1;
 | |
|     }
 | |
| 
 | |
|     ERR_clear_error();
 | |
|     for (;;) {
 | |
|         if (want >= (len - off)) {
 | |
|             want -= (len - off);
 | |
| 
 | |
|             if (len + want < len || !BUF_MEM_grow_clean(b, len + want)) {
 | |
|                 ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ERR_R_MALLOC_FAILURE);
 | |
|                 goto err;
 | |
|             }
 | |
|             i = BIO_read(in, &(b->data[len]), want);
 | |
|             if ((i < 0) && ((len - off) == 0)) {
 | |
|                 ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_NOT_ENOUGH_DATA);
 | |
|                 goto err;
 | |
|             }
 | |
|             if (i > 0) {
 | |
|                 if (len + i < len) {
 | |
|                     ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
 | |
|                     goto err;
 | |
|                 }
 | |
|                 len += i;
 | |
|             }
 | |
|         }
 | |
|         /* else data already loaded */
 | |
| 
 | |
|         p = (unsigned char *)&(b->data[off]);
 | |
|         q = p;
 | |
|         inf = ASN1_get_object(&q, &slen, &tag, &xclass, len - off);
 | |
|         if (inf & 0x80) {
 | |
|             unsigned long e;
 | |
| 
 | |
|             e = ERR_GET_REASON(ERR_peek_error());
 | |
|             if (e != ASN1_R_TOO_LONG)
 | |
|                 goto err;
 | |
|             else
 | |
|                 ERR_clear_error(); /* clear error */
 | |
|         }
 | |
|         i = q - p;            /* header length */
 | |
|         off += i;               /* end of data */
 | |
| 
 | |
|         if (inf & 1) {
 | |
|             /* no data body so go round again */
 | |
|             if (eos == UINT32_MAX) {
 | |
|                 ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_HEADER_TOO_LONG);
 | |
|                 goto err;
 | |
|             }
 | |
|             eos++;
 | |
|             want = HEADER_SIZE;
 | |
|         } else if (eos && (slen == 0) && (tag == V_ASN1_EOC)) {
 | |
|             /* eos value, so go back and read another header */
 | |
|             eos--;
 | |
|             if (eos == 0)
 | |
|                 break;
 | |
|             else
 | |
|                 want = HEADER_SIZE;
 | |
|         } else {
 | |
|             /* suck in slen bytes of data */
 | |
|             want = slen;
 | |
|             if (want > (len - off)) {
 | |
|                 size_t chunk_max = ASN1_CHUNK_INITIAL_SIZE;
 | |
| 
 | |
|                 want -= (len - off);
 | |
|                 if (want > INT_MAX /* BIO_read takes an int length */  ||
 | |
|                     len + want < len) {
 | |
|                     ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
 | |
|                     goto err;
 | |
|                 }
 | |
|                 while (want > 0) {
 | |
|                     /*
 | |
|                      * Read content in chunks of increasing size
 | |
|                      * so we can return an error for EOF without
 | |
|                      * having to allocate the entire content length
 | |
|                      * in one go.
 | |
|                      */
 | |
|                     size_t chunk = want > chunk_max ? chunk_max : want;
 | |
| 
 | |
|                     if (!BUF_MEM_grow_clean(b, len + chunk)) {
 | |
|                         ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ERR_R_MALLOC_FAILURE);
 | |
|                         goto err;
 | |
|                     }
 | |
|                     want -= chunk;
 | |
|                     while (chunk > 0) {
 | |
|                         i = BIO_read(in, &(b->data[len]), chunk);
 | |
|                         if (i <= 0) {
 | |
|                             ASN1err(ASN1_F_ASN1_D2I_READ_BIO,
 | |
|                                     ASN1_R_NOT_ENOUGH_DATA);
 | |
|                             goto err;
 | |
|                         }
 | |
|                     /*
 | |
|                      * This can't overflow because |len+want| didn't
 | |
|                      * overflow.
 | |
|                      */
 | |
|                         len += i;
 | |
|                         chunk -= i;
 | |
|                     }
 | |
|                     if (chunk_max < INT_MAX/2)
 | |
|                         chunk_max *= 2;
 | |
|                 }
 | |
|             }
 | |
|             if (off + slen < off) {
 | |
|                 ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
 | |
|                 goto err;
 | |
|             }
 | |
|             off += slen;
 | |
|             if (eos == 0) {
 | |
|                 break;
 | |
|             } else
 | |
|                 want = HEADER_SIZE;
 | |
|         }
 | |
|     }
 | |
| 
 | |
|     if (off > INT_MAX) {
 | |
|         ASN1err(ASN1_F_ASN1_D2I_READ_BIO, ASN1_R_TOO_LONG);
 | |
|         goto err;
 | |
|     }
 | |
| 
 | |
|     *pb = b;
 | |
|     return off;
 | |
|  err:
 | |
|     BUF_MEM_free(b);
 | |
|     return -1;
 | |
| }
 |