003 File Manager
Current Path:
/usr/src/contrib/wpa/src/tls
usr
/
src
/
contrib
/
wpa
/
src
/
tls
/
📁
..
📄
asn1.c
(5.23 KB)
📄
asn1.h
(2.36 KB)
📄
bignum.c
(5.36 KB)
📄
bignum.h
(1.13 KB)
📄
libtommath.c
(76.2 KB)
📄
pkcs1.c
(7.28 KB)
📄
pkcs1.h
(872 B)
📄
pkcs5.c
(16.32 KB)
📄
pkcs5.h
(404 B)
📄
pkcs8.c
(5.09 KB)
📄
pkcs8.h
(436 B)
📄
rsa.c
(8.76 KB)
📄
rsa.h
(770 B)
📄
tlsv1_client.c
(23.34 KB)
📄
tlsv1_client.h
(2.39 KB)
📄
tlsv1_client_i.h
(2.73 KB)
📄
tlsv1_client_ocsp.c
(23.12 KB)
📄
tlsv1_client_read.c
(39.87 KB)
📄
tlsv1_client_write.c
(25.62 KB)
📄
tlsv1_common.c
(14.73 KB)
📄
tlsv1_common.h
(9.52 KB)
📄
tlsv1_cred.c
(32.12 KB)
📄
tlsv1_cred.h
(1.36 KB)
📄
tlsv1_record.c
(13.41 KB)
📄
tlsv1_record.h
(1.89 KB)
📄
tlsv1_server.c
(23.52 KB)
📄
tlsv1_server.h
(2.23 KB)
📄
tlsv1_server_i.h
(2.29 KB)
📄
tlsv1_server_read.c
(34.19 KB)
📄
tlsv1_server_write.c
(27.71 KB)
📄
x509v3.c
(53.69 KB)
📄
x509v3.h
(4.73 KB)
Editing: asn1.c
/* * ASN.1 DER parsing * Copyright (c) 2006-2014, Jouni Malinen <j@w1.fi> * * This software may be distributed under the terms of the BSD license. * See README for more details. */ #include "includes.h" #include "common.h" #include "asn1.h" struct asn1_oid asn1_sha1_oid = { .oid = { 1, 3, 14, 3, 2, 26 }, .len = 6 }; struct asn1_oid asn1_sha256_oid = { .oid = { 2, 16, 840, 1, 101, 3, 4, 2, 1 }, .len = 9 }; static int asn1_valid_der_boolean(struct asn1_hdr *hdr) { /* Enforce DER requirements for a single way of encoding a BOOLEAN */ if (hdr->length != 1) { wpa_printf(MSG_DEBUG, "ASN.1: Unexpected BOOLEAN length (%u)", hdr->length); return 0; } if (hdr->payload[0] != 0 && hdr->payload[0] != 0xff) { wpa_printf(MSG_DEBUG, "ASN.1: Invalid BOOLEAN value 0x%x (DER requires 0 or 0xff)", hdr->payload[0]); return 0; } return 1; } static int asn1_valid_der(struct asn1_hdr *hdr) { if (hdr->class != ASN1_CLASS_UNIVERSAL) return 1; if (hdr->tag == ASN1_TAG_BOOLEAN && !asn1_valid_der_boolean(hdr)) return 0; return 1; } int asn1_get_next(const u8 *buf, size_t len, struct asn1_hdr *hdr) { const u8 *pos, *end; u8 tmp; os_memset(hdr, 0, sizeof(*hdr)); pos = buf; end = buf + len; if (pos >= end) { wpa_printf(MSG_DEBUG, "ASN.1: No room for Identifier"); return -1; } hdr->identifier = *pos++; hdr->class = hdr->identifier >> 6; hdr->constructed = !!(hdr->identifier & (1 << 5)); if ((hdr->identifier & 0x1f) == 0x1f) { hdr->tag = 0; do { if (pos >= end) { wpa_printf(MSG_DEBUG, "ASN.1: Identifier " "underflow"); return -1; } tmp = *pos++; wpa_printf(MSG_MSGDUMP, "ASN.1: Extended tag data: " "0x%02x", tmp); hdr->tag = (hdr->tag << 7) | (tmp & 0x7f); } while (tmp & 0x80); } else hdr->tag = hdr->identifier & 0x1f; if (pos >= end) { wpa_printf(MSG_DEBUG, "ASN.1: No room for Length"); return -1; } tmp = *pos++; if (tmp & 0x80) { if (tmp == 0xff) { wpa_printf(MSG_DEBUG, "ASN.1: Reserved length " "value 0xff used"); return -1; } tmp &= 0x7f; /* number of subsequent octets */ hdr->length = 0; if (tmp > 4) { wpa_printf(MSG_DEBUG, "ASN.1: Too long length field"); return -1; } while (tmp--) { if (pos >= end) { wpa_printf(MSG_DEBUG, "ASN.1: Length " "underflow"); return -1; } hdr->length = (hdr->length << 8) | *pos++; } } else { /* Short form - length 0..127 in one octet */ hdr->length = tmp; } if (end < pos || hdr->length > (unsigned int) (end - pos)) { wpa_printf(MSG_DEBUG, "ASN.1: Contents underflow"); return -1; } hdr->payload = pos; return asn1_valid_der(hdr) ? 0 : -1; } int asn1_parse_oid(const u8 *buf, size_t len, struct asn1_oid *oid) { const u8 *pos, *end; unsigned long val; u8 tmp; os_memset(oid, 0, sizeof(*oid)); pos = buf; end = buf + len; while (pos < end) { val = 0; do { if (pos >= end) return -1; tmp = *pos++; val = (val << 7) | (tmp & 0x7f); } while (tmp & 0x80); if (oid->len >= ASN1_MAX_OID_LEN) { wpa_printf(MSG_DEBUG, "ASN.1: Too long OID value"); return -1; } if (oid->len == 0) { /* * The first octet encodes the first two object * identifier components in (X*40) + Y formula. * X = 0..2. */ oid->oid[0] = val / 40; if (oid->oid[0] > 2) oid->oid[0] = 2; oid->oid[1] = val - oid->oid[0] * 40; oid->len = 2; } else oid->oid[oid->len++] = val; } return 0; } int asn1_get_oid(const u8 *buf, size_t len, struct asn1_oid *oid, const u8 **next) { struct asn1_hdr hdr; if (asn1_get_next(buf, len, &hdr) < 0 || hdr.length == 0) return -1; if (hdr.class != ASN1_CLASS_UNIVERSAL || hdr.tag != ASN1_TAG_OID) { wpa_printf(MSG_DEBUG, "ASN.1: Expected OID - found class %d " "tag 0x%x", hdr.class, hdr.tag); return -1; } *next = hdr.payload + hdr.length; return asn1_parse_oid(hdr.payload, hdr.length, oid); } void asn1_oid_to_str(const struct asn1_oid *oid, char *buf, size_t len) { char *pos = buf; size_t i; int ret; if (len == 0) return; buf[0] = '\0'; for (i = 0; i < oid->len; i++) { ret = os_snprintf(pos, buf + len - pos, "%s%lu", i == 0 ? "" : ".", oid->oid[i]); if (os_snprintf_error(buf + len - pos, ret)) break; pos += ret; } buf[len - 1] = '\0'; } static u8 rotate_bits(u8 octet) { int i; u8 res; res = 0; for (i = 0; i < 8; i++) { res <<= 1; if (octet & 1) res |= 1; octet >>= 1; } return res; } unsigned long asn1_bit_string_to_long(const u8 *buf, size_t len) { unsigned long val = 0; const u8 *pos = buf; /* BER requires that unused bits are zero, so we can ignore the number * of unused bits */ pos++; if (len >= 2) val |= rotate_bits(*pos++); if (len >= 3) val |= ((unsigned long) rotate_bits(*pos++)) << 8; if (len >= 4) val |= ((unsigned long) rotate_bits(*pos++)) << 16; if (len >= 5) val |= ((unsigned long) rotate_bits(*pos++)) << 24; if (len >= 6) wpa_printf(MSG_DEBUG, "X509: %s - some bits ignored " "(BIT STRING length %lu)", __func__, (unsigned long) len); return val; } int asn1_oid_equal(const struct asn1_oid *a, const struct asn1_oid *b) { size_t i; if (a->len != b->len) return 0; for (i = 0; i < a->len; i++) { if (a->oid[i] != b->oid[i]) return 0; } return 1; }
Upload File
Create Folder