| 1 | // Copyright 2015 Brian Smith. |
| 2 | // |
| 3 | // Permission to use, copy, modify, and/or distribute this software for any |
| 4 | // purpose with or without fee is hereby granted, provided that the above |
| 5 | // copyright notice and this permission notice appear in all copies. |
| 6 | // |
| 7 | // THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES |
| 8 | // WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| 9 | // MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR |
| 10 | // ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| 11 | // WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
| 12 | // ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| 13 | // OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| 14 | |
| 15 | #[cfg (feature = "alloc" )] |
| 16 | use alloc::vec::Vec; |
| 17 | use core::marker::PhantomData; |
| 18 | |
| 19 | use crate::{Error, error::DerTypeId}; |
| 20 | |
| 21 | #[derive (Debug)] |
| 22 | pub struct DerIterator<'a, T> { |
| 23 | reader: untrusted::Reader<'a>, |
| 24 | marker: PhantomData<T>, |
| 25 | } |
| 26 | |
| 27 | impl<'a, T> DerIterator<'a, T> { |
| 28 | /// [`DerIterator`] will consume all of the bytes in `input` reading values of type `T`. |
| 29 | pub(crate) fn new(input: untrusted::Input<'a>) -> Self { |
| 30 | Self { |
| 31 | reader: untrusted::Reader::new(input), |
| 32 | marker: PhantomData, |
| 33 | } |
| 34 | } |
| 35 | } |
| 36 | |
| 37 | impl<'a, T: FromDer<'a>> Iterator for DerIterator<'a, T> { |
| 38 | type Item = Result<T, Error>; |
| 39 | |
| 40 | fn next(&mut self) -> Option<Self::Item> { |
| 41 | (!self.reader.at_end()).then(|| T::from_der(&mut self.reader)) |
| 42 | } |
| 43 | } |
| 44 | |
| 45 | pub(crate) trait FromDer<'a>: Sized + 'a { |
| 46 | /// Parse a value of type `Self` from the given DER-encoded input. |
| 47 | fn from_der(reader: &mut untrusted::Reader<'a>) -> Result<Self, Error>; |
| 48 | |
| 49 | const TYPE_ID: DerTypeId; |
| 50 | } |
| 51 | |
| 52 | pub(crate) fn read_all<'a, T: FromDer<'a>>(input: untrusted::Input<'a>) -> Result<T, Error> { |
| 53 | input.read_all(incomplete_read:Error::TrailingData(T::TYPE_ID), T::from_der) |
| 54 | } |
| 55 | |
| 56 | // Copied (and extended) from ring's src/der.rs |
| 57 | #[allow (clippy::upper_case_acronyms)] |
| 58 | #[derive (Clone, Copy, Eq, PartialEq)] |
| 59 | #[repr (u8)] |
| 60 | pub(crate) enum Tag { |
| 61 | Boolean = 0x01, |
| 62 | Integer = 0x02, |
| 63 | BitString = 0x03, |
| 64 | OctetString = 0x04, |
| 65 | OID = 0x06, |
| 66 | Enum = 0x0A, |
| 67 | Sequence = CONSTRUCTED | 0x10, // 0x30 |
| 68 | UTCTime = 0x17, |
| 69 | GeneralizedTime = 0x18, |
| 70 | |
| 71 | #[allow (clippy::identity_op)] |
| 72 | ContextSpecificConstructed0 = CONTEXT_SPECIFIC | CONSTRUCTED | 0, |
| 73 | ContextSpecificConstructed1 = CONTEXT_SPECIFIC | CONSTRUCTED | 1, |
| 74 | ContextSpecificConstructed3 = CONTEXT_SPECIFIC | CONSTRUCTED | 3, |
| 75 | } |
| 76 | |
| 77 | pub(crate) const CONSTRUCTED: u8 = 0x20; |
| 78 | pub(crate) const CONTEXT_SPECIFIC: u8 = 0x80; |
| 79 | |
| 80 | impl From<Tag> for usize { |
| 81 | #[allow (clippy::as_conversions)] |
| 82 | fn from(tag: Tag) -> Self { |
| 83 | tag as Self |
| 84 | } |
| 85 | } |
| 86 | |
| 87 | impl From<Tag> for u8 { |
| 88 | #[allow (clippy::as_conversions)] |
| 89 | fn from(tag: Tag) -> Self { |
| 90 | tag as Self |
| 91 | } // XXX: narrowing conversion. |
| 92 | } |
| 93 | |
| 94 | #[inline (always)] |
| 95 | pub(crate) fn expect_tag_and_get_value_limited<'a>( |
| 96 | input: &mut untrusted::Reader<'a>, |
| 97 | tag: Tag, |
| 98 | size_limit: usize, |
| 99 | ) -> Result<untrusted::Input<'a>, Error> { |
| 100 | let (actual_tag: u8, inner: Input<'_>) = read_tag_and_get_value_limited(input, size_limit)?; |
| 101 | if usize::from(tag) != usize::from(actual_tag) { |
| 102 | return Err(Error::BadDer); |
| 103 | } |
| 104 | Ok(inner) |
| 105 | } |
| 106 | |
| 107 | pub(crate) fn nested_limited<'a, R>( |
| 108 | input: &mut untrusted::Reader<'a>, |
| 109 | tag: Tag, |
| 110 | error: Error, |
| 111 | decoder: impl FnOnce(&mut untrusted::Reader<'a>) -> Result<R, Error>, |
| 112 | size_limit: usize, |
| 113 | ) -> Result<R, Error> { |
| 114 | match expect_tag_and_get_value_limited(input, tag, size_limit) { |
| 115 | Ok(value: Input<'_>) => value.read_all(incomplete_read:error, read:decoder), |
| 116 | Err(_) => Err(error), |
| 117 | } |
| 118 | } |
| 119 | |
| 120 | // TODO: investigate taking decoder as a reference to reduce generated code |
| 121 | // size. |
| 122 | pub(crate) fn nested<'a, R>( |
| 123 | input: &mut untrusted::Reader<'a>, |
| 124 | tag: Tag, |
| 125 | error: Error, |
| 126 | decoder: impl FnOnce(&mut untrusted::Reader<'a>) -> Result<R, Error>, |
| 127 | ) -> Result<R, Error> { |
| 128 | nested_limited(input, tag, error, decoder, TWO_BYTE_DER_SIZE) |
| 129 | } |
| 130 | |
| 131 | pub(crate) fn expect_tag<'a>( |
| 132 | input: &mut untrusted::Reader<'a>, |
| 133 | tag: Tag, |
| 134 | ) -> Result<untrusted::Input<'a>, Error> { |
| 135 | let (actual_tag: u8, value: Input<'_>) = read_tag_and_get_value_limited(input, TWO_BYTE_DER_SIZE)?; |
| 136 | if usize::from(tag) != usize::from(actual_tag) { |
| 137 | return Err(Error::BadDer); |
| 138 | } |
| 139 | |
| 140 | Ok(value) |
| 141 | } |
| 142 | |
| 143 | #[inline (always)] |
| 144 | pub(crate) fn read_tag_and_get_value<'a>( |
| 145 | input: &mut untrusted::Reader<'a>, |
| 146 | ) -> Result<(u8, untrusted::Input<'a>), Error> { |
| 147 | read_tag_and_get_value_limited(input, TWO_BYTE_DER_SIZE) |
| 148 | } |
| 149 | |
| 150 | #[inline (always)] |
| 151 | pub(crate) fn read_tag_and_get_value_limited<'a>( |
| 152 | input: &mut untrusted::Reader<'a>, |
| 153 | size_limit: usize, |
| 154 | ) -> Result<(u8, untrusted::Input<'a>), Error> { |
| 155 | let tag = input.read_byte().map_err(end_of_input_err)?; |
| 156 | if (tag & HIGH_TAG_RANGE_START) == HIGH_TAG_RANGE_START { |
| 157 | return Err(Error::BadDer); // High tag number form is not allowed. |
| 158 | } |
| 159 | |
| 160 | // If the high order bit of the first byte is set to zero then the length |
| 161 | // is encoded in the seven remaining bits of that byte. Otherwise, those |
| 162 | // seven bits represent the number of bytes used to encode the length. |
| 163 | let length = match input.read_byte().map_err(end_of_input_err)? { |
| 164 | n if (n & SHORT_FORM_LEN_MAX) == 0 => usize::from(n), |
| 165 | LONG_FORM_LEN_ONE_BYTE => { |
| 166 | let length_byte = input.read_byte().map_err(end_of_input_err)?; |
| 167 | if length_byte < SHORT_FORM_LEN_MAX { |
| 168 | return Err(Error::BadDer); // Not the canonical encoding. |
| 169 | } |
| 170 | usize::from(length_byte) |
| 171 | } |
| 172 | LONG_FORM_LEN_TWO_BYTES => { |
| 173 | let length_byte_one = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 174 | let length_byte_two = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 175 | let combined = (length_byte_one << 8) | length_byte_two; |
| 176 | if combined <= LONG_FORM_LEN_ONE_BYTE_MAX { |
| 177 | return Err(Error::BadDer); // Not the canonical encoding. |
| 178 | } |
| 179 | combined |
| 180 | } |
| 181 | LONG_FORM_LEN_THREE_BYTES => { |
| 182 | let length_byte_one = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 183 | let length_byte_two = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 184 | let length_byte_three = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 185 | let combined = (length_byte_one << 16) | (length_byte_two << 8) | length_byte_three; |
| 186 | if combined <= LONG_FORM_LEN_TWO_BYTES_MAX { |
| 187 | return Err(Error::BadDer); // Not the canonical encoding. |
| 188 | } |
| 189 | combined |
| 190 | } |
| 191 | LONG_FORM_LEN_FOUR_BYTES => { |
| 192 | let length_byte_one = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 193 | let length_byte_two = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 194 | let length_byte_three = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 195 | let length_byte_four = usize::from(input.read_byte().map_err(end_of_input_err)?); |
| 196 | let combined = (length_byte_one << 24) |
| 197 | | (length_byte_two << 16) |
| 198 | | (length_byte_three << 8) |
| 199 | | length_byte_four; |
| 200 | if combined <= LONG_FORM_LEN_THREE_BYTES_MAX { |
| 201 | return Err(Error::BadDer); // Not the canonical encoding. |
| 202 | } |
| 203 | combined |
| 204 | } |
| 205 | _ => { |
| 206 | return Err(Error::BadDer); // We don't support longer lengths. |
| 207 | } |
| 208 | }; |
| 209 | |
| 210 | if length >= size_limit { |
| 211 | return Err(Error::BadDer); // The length is larger than the caller accepts. |
| 212 | } |
| 213 | |
| 214 | let inner = input.read_bytes(length).map_err(end_of_input_err)?; |
| 215 | Ok((tag, inner)) |
| 216 | } |
| 217 | |
| 218 | /// Prepend `bytes` with the given ASN.1 [`Tag`] and appropriately encoded length byte(s). |
| 219 | /// Useful for "adding back" ASN.1 bytes to parsed content. |
| 220 | #[cfg (feature = "alloc" )] |
| 221 | #[allow (clippy::as_conversions)] |
| 222 | pub(crate) fn asn1_wrap(tag: Tag, bytes: &[u8]) -> Vec<u8> { |
| 223 | let len = bytes.len(); |
| 224 | // The length is encoded differently depending on how many bytes there are |
| 225 | if len < usize::from(SHORT_FORM_LEN_MAX) { |
| 226 | // Short form: the length is encoded using a single byte |
| 227 | // Contents: Tag byte, single length byte, and passed bytes |
| 228 | let mut ret = Vec::with_capacity(2 + len); |
| 229 | ret.push(tag.into()); // Tag byte |
| 230 | ret.push(len as u8); // Single length byte |
| 231 | ret.extend_from_slice(bytes); // Passed bytes |
| 232 | ret |
| 233 | } else { |
| 234 | // Long form: The length is encoded using multiple bytes |
| 235 | // Contents: Tag byte, number-of-length-bytes byte, length bytes, and passed bytes |
| 236 | // The first byte indicates how many more bytes will be used to encode the length |
| 237 | // First, get a big-endian representation of the byte slice's length |
| 238 | let size = len.to_be_bytes(); |
| 239 | // Find the number of leading empty bytes in that representation |
| 240 | // This will determine the smallest number of bytes we need to encode the length |
| 241 | let leading_zero_bytes = size |
| 242 | .iter() |
| 243 | .position(|&byte| byte != 0) |
| 244 | .unwrap_or(size.len()); |
| 245 | assert!(leading_zero_bytes < size.len()); |
| 246 | // Number of bytes used - number of not needed bytes = smallest number needed |
| 247 | let encoded_bytes = size.len() - leading_zero_bytes; |
| 248 | let mut ret = Vec::with_capacity(2 + encoded_bytes + len); |
| 249 | // Indicate this is a number-of-length-bytes byte by setting the high order bit |
| 250 | let number_of_length_bytes_byte = SHORT_FORM_LEN_MAX + encoded_bytes as u8; |
| 251 | ret.push(tag.into()); // Tag byte |
| 252 | ret.push(number_of_length_bytes_byte); // Number-of-length-bytes byte |
| 253 | ret.extend_from_slice(&size[leading_zero_bytes..]); // Length bytes |
| 254 | ret.extend_from_slice(bytes); // Passed bytes |
| 255 | ret |
| 256 | } |
| 257 | } |
| 258 | |
| 259 | // Long-form DER encoded lengths of two bytes can express lengths up to the following limit. |
| 260 | // |
| 261 | // The upstream ring::io::der::read_tag_and_get_value() function limits itself to up to two byte |
| 262 | // long-form DER lengths, and so this limit represents the maximum length that was possible to |
| 263 | // read before the introduction of the read_tag_and_get_value_limited function. |
| 264 | pub(crate) const TWO_BYTE_DER_SIZE: usize = LONG_FORM_LEN_TWO_BYTES_MAX; |
| 265 | |
| 266 | // The maximum size of a DER value that Webpki can support reading. |
| 267 | // |
| 268 | // Webpki limits itself to four byte long-form DER lengths, and so this limit represents |
| 269 | // the maximum size tagged DER value that can be read for any purpose. |
| 270 | pub(crate) const MAX_DER_SIZE: usize = LONG_FORM_LEN_FOUR_BYTES_MAX; |
| 271 | |
| 272 | // DER Tag identifiers have two forms: |
| 273 | // * Low tag number form (for tags values in the range [0..30] |
| 274 | // * High tag number form (for tag values in the range [31..] |
| 275 | // We only support low tag number form. |
| 276 | const HIGH_TAG_RANGE_START: u8 = 31; |
| 277 | |
| 278 | // DER length octets have two forms: |
| 279 | // * Short form: 1 octet supporting lengths between 0 and 127. |
| 280 | // * Long definite form: 2 to 127 octets, number of octets encoded into first octet. |
| 281 | const SHORT_FORM_LEN_MAX: u8 = 128; |
| 282 | |
| 283 | // Leading octet for long definite form DER length expressed in second byte. |
| 284 | const LONG_FORM_LEN_ONE_BYTE: u8 = 0x81; |
| 285 | |
| 286 | // Maximum size that can be expressed in a one byte long form len. |
| 287 | const LONG_FORM_LEN_ONE_BYTE_MAX: usize = 0xff; |
| 288 | |
| 289 | // Leading octet for long definite form DER length expressed in subsequent two bytes. |
| 290 | const LONG_FORM_LEN_TWO_BYTES: u8 = 0x82; |
| 291 | |
| 292 | // Maximum size that can be expressed in a two byte long form len. |
| 293 | const LONG_FORM_LEN_TWO_BYTES_MAX: usize = 0xff_ff; |
| 294 | |
| 295 | // Leading octet for long definite form DER length expressed in subsequent three bytes. |
| 296 | const LONG_FORM_LEN_THREE_BYTES: u8 = 0x83; |
| 297 | |
| 298 | // Maximum size that can be expressed in a three byte long form len. |
| 299 | const LONG_FORM_LEN_THREE_BYTES_MAX: usize = 0xff_ff_ff; |
| 300 | |
| 301 | // Leading octet for long definite form DER length expressed in subsequent four bytes. |
| 302 | const LONG_FORM_LEN_FOUR_BYTES: u8 = 0x84; |
| 303 | |
| 304 | // Maximum size that can be expressed in a four byte long form der len. |
| 305 | const LONG_FORM_LEN_FOUR_BYTES_MAX: usize = 0xff_ff_ff_ff; |
| 306 | |
| 307 | // TODO: investigate taking decoder as a reference to reduce generated code |
| 308 | // size. |
| 309 | pub(crate) fn nested_of_mut<'a>( |
| 310 | input: &mut untrusted::Reader<'a>, |
| 311 | outer_tag: Tag, |
| 312 | inner_tag: Tag, |
| 313 | error: Error, |
| 314 | mut decoder: impl FnMut(&mut untrusted::Reader<'a>) -> Result<(), Error>, |
| 315 | ) -> Result<(), Error> { |
| 316 | nested(input, outer_tag, error.clone(), |outer: &mut Reader<'_>| { |
| 317 | loop { |
| 318 | nested(input:outer, inner_tag, error.clone(), |inner: &mut Reader<'_>| decoder(inner))?; |
| 319 | if outer.at_end() { |
| 320 | break; |
| 321 | } |
| 322 | } |
| 323 | Ok(()) |
| 324 | }) |
| 325 | } |
| 326 | |
| 327 | pub(crate) fn bit_string_with_no_unused_bits<'a>( |
| 328 | input: &mut untrusted::Reader<'a>, |
| 329 | ) -> Result<untrusted::Input<'a>, Error> { |
| 330 | nested( |
| 331 | input, |
| 332 | Tag::BitString, |
| 333 | Error::TrailingData(DerTypeId::BitString), |
| 334 | |value: &mut Reader<'_>| { |
| 335 | let unused_bits_at_end: u8 = value.read_byte().map_err(|_| Error::BadDer)?; |
| 336 | if unused_bits_at_end != 0 { |
| 337 | return Err(Error::BadDer); |
| 338 | } |
| 339 | Ok(value.read_bytes_to_end()) |
| 340 | }, |
| 341 | ) |
| 342 | } |
| 343 | |
| 344 | pub(crate) struct BitStringFlags<'a> { |
| 345 | raw_bits: &'a [u8], |
| 346 | } |
| 347 | |
| 348 | impl BitStringFlags<'_> { |
| 349 | pub(crate) fn bit_set(&self, bit: usize) -> bool { |
| 350 | let byte_index: usize = bit / 8; |
| 351 | let bit_shift: usize = 7 - (bit % 8); |
| 352 | |
| 353 | if self.raw_bits.len() < (byte_index + 1) { |
| 354 | false |
| 355 | } else { |
| 356 | ((self.raw_bits[byte_index] >> bit_shift) & 1) != 0 |
| 357 | } |
| 358 | } |
| 359 | } |
| 360 | |
| 361 | // ASN.1 BIT STRING fields for sets of flags are encoded in DER with some peculiar details related |
| 362 | // to padding. Notably this means we expect an indicator of the number of bits of padding, and then |
| 363 | // the actual bit values. See this Stack Overflow discussion[0], and ITU X690-0207[1] Section 8.6 |
| 364 | // and Section 11.2 for more information. |
| 365 | // |
| 366 | // [0]: https://security.stackexchange.com/a/10396 |
| 367 | // [1]: https://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf |
| 368 | pub(crate) fn bit_string_flags(input: untrusted::Input<'_>) -> Result<BitStringFlags<'_>, Error> { |
| 369 | input.read_all(Error::BadDer, |bit_string| { |
| 370 | // ITU X690-0207 11.2: |
| 371 | // "The initial octet shall encode, as an unsigned binary integer with bit 1 as the least |
| 372 | // significant bit, the number of unused bits in the final subsequent octet. |
| 373 | // The number shall be in the range zero to seven" |
| 374 | let padding_bits = bit_string.read_byte().map_err(|_| Error::BadDer)?; |
| 375 | let raw_bits = bit_string.read_bytes_to_end().as_slice_less_safe(); |
| 376 | |
| 377 | // It's illegal to have more than 7 bits of padding. Similarly, if the raw bitflags |
| 378 | // are empty there should be no padding. |
| 379 | if padding_bits > 7 || (raw_bits.is_empty() && padding_bits != 0) { |
| 380 | return Err(Error::BadDer); |
| 381 | } |
| 382 | |
| 383 | // If there are padding bits then the last bit of the last raw byte must be 0 or the |
| 384 | // distinguished encoding rules are not being followed. |
| 385 | let last_byte = raw_bits[raw_bits.len() - 1]; |
| 386 | let padding_mask = (1 << padding_bits) - 1; |
| 387 | |
| 388 | match padding_bits > 0 && (last_byte & padding_mask) != 0 { |
| 389 | true => Err(Error::BadDer), |
| 390 | false => Ok(BitStringFlags { raw_bits }), |
| 391 | } |
| 392 | }) |
| 393 | } |
| 394 | |
| 395 | impl<'a> FromDer<'a> for u8 { |
| 396 | fn from_der(reader: &mut untrusted::Reader<'a>) -> Result<Self, Error> { |
| 397 | match *nonnegative_integer(input:reader)?.as_slice_less_safe() { |
| 398 | [b: u8] => Ok(b), |
| 399 | _ => Err(Error::BadDer), |
| 400 | } |
| 401 | } |
| 402 | |
| 403 | const TYPE_ID: DerTypeId = DerTypeId::U8; |
| 404 | } |
| 405 | |
| 406 | pub(crate) fn nonnegative_integer<'a>( |
| 407 | input: &mut untrusted::Reader<'a>, |
| 408 | ) -> Result<untrusted::Input<'a>, Error> { |
| 409 | let value: Input<'_> = expect_tag(input, Tag::Integer)?; |
| 410 | match value |
| 411 | .as_slice_less_safe() |
| 412 | .split_first() |
| 413 | .ok_or(err:Error::BadDer)? |
| 414 | { |
| 415 | // Zero or leading zero. |
| 416 | (0, rest: &[u8]) => { |
| 417 | match rest.first() { |
| 418 | // Zero |
| 419 | None => Ok(value), |
| 420 | // Necessary leading zero. |
| 421 | Some(&second: u8) if second & 0x80 == 0x80 => Ok(untrusted::Input::from(bytes:rest)), |
| 422 | // Unnecessary leading zero. |
| 423 | _ => Err(Error::BadDer), |
| 424 | } |
| 425 | } |
| 426 | // Positive value with no leading zero. |
| 427 | (first: &u8, _) if first & 0x80 == 0x00 => Ok(value), |
| 428 | // Negative value. |
| 429 | (_, _) => Err(Error::BadDer), |
| 430 | } |
| 431 | } |
| 432 | |
| 433 | pub(crate) fn end_of_input_err(_: untrusted::EndOfInput) -> Error { |
| 434 | Error::BadDer |
| 435 | } |
| 436 | |
| 437 | // Like mozilla::pkix, we accept the nonconformant explicit encoding of |
| 438 | // the default value (false) for compatibility with real-world certificates. |
| 439 | impl<'a> FromDer<'a> for bool { |
| 440 | fn from_der(reader: &mut untrusted::Reader<'a>) -> Result<Self, Error> { |
| 441 | if !reader.peek(Tag::Boolean.into()) { |
| 442 | return Ok(false); |
| 443 | } |
| 444 | |
| 445 | nested( |
| 446 | input:reader, |
| 447 | Tag::Boolean, |
| 448 | Error::TrailingData(Self::TYPE_ID), |
| 449 | |input: &mut Reader<'_>| match input.read_byte() { |
| 450 | Ok(0xff) => Ok(true), |
| 451 | Ok(0x00) => Ok(false), |
| 452 | _ => Err(Error::BadDer), |
| 453 | }, |
| 454 | ) |
| 455 | } |
| 456 | |
| 457 | const TYPE_ID: DerTypeId = DerTypeId::Bool; |
| 458 | } |
| 459 | |
| 460 | macro_rules! oid { |
| 461 | ( $first:expr, $second:expr, $( $tail:expr ),* ) => |
| 462 | ( |
| 463 | [(40 * $first) + $second, $( $tail ),*] |
| 464 | ) |
| 465 | } |
| 466 | |
| 467 | #[cfg (test)] |
| 468 | mod tests { |
| 469 | use super::DerTypeId; |
| 470 | use std::prelude::v1::*; |
| 471 | |
| 472 | #[cfg (feature = "alloc" )] |
| 473 | #[test ] |
| 474 | fn test_asn1_wrap() { |
| 475 | // Prepend stuff to `bytes` to put it in a DER SEQUENCE. |
| 476 | let wrap_in_sequence = |bytes: &[u8]| super::asn1_wrap(super::Tag::Sequence, bytes); |
| 477 | |
| 478 | // Empty slice |
| 479 | assert_eq!(vec![0x30, 0x00], wrap_in_sequence(&[])); |
| 480 | |
| 481 | // Small size |
| 482 | assert_eq!( |
| 483 | vec![0x30, 0x04, 0x00, 0x11, 0x22, 0x33], |
| 484 | wrap_in_sequence(&[0x00, 0x11, 0x22, 0x33]) |
| 485 | ); |
| 486 | |
| 487 | // Medium size |
| 488 | let mut val = Vec::new(); |
| 489 | val.resize(255, 0x12); |
| 490 | assert_eq!( |
| 491 | vec![0x30, 0x81, 0xff, 0x12, 0x12, 0x12], |
| 492 | wrap_in_sequence(&val)[..6] |
| 493 | ); |
| 494 | |
| 495 | // Large size |
| 496 | let mut val = Vec::new(); |
| 497 | val.resize(4660, 0x12); |
| 498 | wrap_in_sequence(&val); |
| 499 | assert_eq!( |
| 500 | vec![0x30, 0x82, 0x12, 0x34, 0x12, 0x12], |
| 501 | wrap_in_sequence(&val)[..6] |
| 502 | ); |
| 503 | |
| 504 | // Huge size |
| 505 | let mut val = Vec::new(); |
| 506 | val.resize(0xffff, 0x12); |
| 507 | let result = wrap_in_sequence(&val); |
| 508 | assert_eq!(vec![0x30, 0x82, 0xff, 0xff, 0x12, 0x12], result[..6]); |
| 509 | assert_eq!(result.len(), 0xffff + 4); |
| 510 | |
| 511 | // Gigantic size |
| 512 | let mut val = Vec::new(); |
| 513 | val.resize(0x100000, 0x12); |
| 514 | let result = wrap_in_sequence(&val); |
| 515 | assert_eq!(vec![0x30, 0x83, 0x10, 0x00, 0x00, 0x12, 0x12], result[..7]); |
| 516 | assert_eq!(result.len(), 0x100000 + 5); |
| 517 | |
| 518 | // Ludicrous size |
| 519 | let mut val = Vec::new(); |
| 520 | val.resize(0x1000000, 0x12); |
| 521 | let result = wrap_in_sequence(&val); |
| 522 | assert_eq!( |
| 523 | vec![0x30, 0x84, 0x01, 0x00, 0x00, 0x00, 0x12, 0x12], |
| 524 | result[..8] |
| 525 | ); |
| 526 | assert_eq!(result.len(), 0x1000000 + 6); |
| 527 | } |
| 528 | |
| 529 | #[test ] |
| 530 | fn test_optional_boolean() { |
| 531 | use super::{Error, FromDer}; |
| 532 | |
| 533 | // Empty input results in false |
| 534 | assert!(!bool::from_der(&mut bytes_reader(&[])).unwrap()); |
| 535 | |
| 536 | // Optional, so another data type results in false |
| 537 | assert!(!bool::from_der(&mut bytes_reader(&[0x05, 0x00])).unwrap()); |
| 538 | |
| 539 | // Only 0x00 and 0xff are accepted values |
| 540 | assert_eq!( |
| 541 | Err(Error::BadDer), |
| 542 | bool::from_der(&mut bytes_reader(&[0x01, 0x01, 0x42])) |
| 543 | ); |
| 544 | |
| 545 | // True |
| 546 | assert!(bool::from_der(&mut bytes_reader(&[0x01, 0x01, 0xff])).unwrap()); |
| 547 | |
| 548 | // False |
| 549 | assert!(!bool::from_der(&mut bytes_reader(&[0x01, 0x01, 0x00])).unwrap()); |
| 550 | } |
| 551 | |
| 552 | #[test ] |
| 553 | fn test_bit_string_with_no_unused_bits() { |
| 554 | use super::{Error, bit_string_with_no_unused_bits}; |
| 555 | |
| 556 | // Unexpected type |
| 557 | assert_eq!( |
| 558 | bit_string_with_no_unused_bits(&mut bytes_reader(&[0x01, 0x01, 0xff])).unwrap_err(), |
| 559 | Error::TrailingData(DerTypeId::BitString), |
| 560 | ); |
| 561 | |
| 562 | // Unexpected nonexistent type |
| 563 | assert_eq!( |
| 564 | bit_string_with_no_unused_bits(&mut bytes_reader(&[0x42, 0xff, 0xff])).unwrap_err(), |
| 565 | Error::TrailingData(DerTypeId::BitString), |
| 566 | ); |
| 567 | |
| 568 | // Unexpected empty input |
| 569 | assert_eq!( |
| 570 | bit_string_with_no_unused_bits(&mut bytes_reader(&[])).unwrap_err(), |
| 571 | Error::TrailingData(DerTypeId::BitString), |
| 572 | ); |
| 573 | |
| 574 | // Valid input with non-zero unused bits |
| 575 | assert_eq!( |
| 576 | bit_string_with_no_unused_bits(&mut bytes_reader(&[0x03, 0x03, 0x04, 0x12, 0x34])) |
| 577 | .unwrap_err(), |
| 578 | Error::BadDer, |
| 579 | ); |
| 580 | |
| 581 | // Valid input |
| 582 | assert_eq!( |
| 583 | bit_string_with_no_unused_bits(&mut bytes_reader(&[0x03, 0x03, 0x00, 0x12, 0x34])) |
| 584 | .unwrap() |
| 585 | .as_slice_less_safe(), |
| 586 | &[0x12, 0x34], |
| 587 | ); |
| 588 | } |
| 589 | |
| 590 | fn bytes_reader(bytes: &[u8]) -> untrusted::Reader<'_> { |
| 591 | untrusted::Reader::new(untrusted::Input::from(bytes)) |
| 592 | } |
| 593 | |
| 594 | #[test ] |
| 595 | fn read_tag_and_get_value_default_limit() { |
| 596 | use super::{Error, read_tag_and_get_value}; |
| 597 | |
| 598 | let inputs = &[ |
| 599 | // DER with short-form length encoded as three bytes. |
| 600 | &[EXAMPLE_TAG, 0x83, 0xFF, 0xFF, 0xFF].as_slice(), |
| 601 | // DER with short-form length encoded as four bytes. |
| 602 | &[EXAMPLE_TAG, 0x84, 0xFF, 0xFF, 0xFF, 0xFF].as_slice(), |
| 603 | ]; |
| 604 | |
| 605 | for input in inputs { |
| 606 | let mut bytes = untrusted::Reader::new(untrusted::Input::from(input)); |
| 607 | // read_tag_and_get_value should reject DER with encoded lengths larger than two |
| 608 | // bytes as BadDer. |
| 609 | assert!(matches!( |
| 610 | read_tag_and_get_value(&mut bytes), |
| 611 | Err(Error::BadDer) |
| 612 | )); |
| 613 | } |
| 614 | } |
| 615 | |
| 616 | #[test ] |
| 617 | fn read_tag_and_get_value_limited_high_form() { |
| 618 | use super::{Error, LONG_FORM_LEN_TWO_BYTES_MAX, read_tag_and_get_value_limited}; |
| 619 | |
| 620 | let mut bytes = untrusted::Reader::new(untrusted::Input::from(&[0xFF])); |
| 621 | // read_tag_and_get_value_limited_high_form should reject DER with "high tag number form" tags. |
| 622 | assert!(matches!( |
| 623 | read_tag_and_get_value_limited(&mut bytes, LONG_FORM_LEN_TWO_BYTES_MAX), |
| 624 | Err(Error::BadDer) |
| 625 | )); |
| 626 | } |
| 627 | |
| 628 | #[test ] |
| 629 | fn read_tag_and_get_value_limited_non_canonical() { |
| 630 | use super::{Error, LONG_FORM_LEN_TWO_BYTES_MAX, read_tag_and_get_value_limited}; |
| 631 | |
| 632 | let inputs = &[ |
| 633 | // Two byte length, with expressed length < 128. |
| 634 | &[EXAMPLE_TAG, 0x81, 0x01].as_slice(), |
| 635 | // Three byte length, with expressed length < 256. |
| 636 | &[EXAMPLE_TAG, 0x82, 0x00, 0x01].as_slice(), |
| 637 | // Four byte length, with expressed length, < 65536. |
| 638 | &[EXAMPLE_TAG, 0x83, 0x00, 0x00, 0x01].as_slice(), |
| 639 | // Five byte length, with expressed length < 16777216. |
| 640 | &[EXAMPLE_TAG, 0x84, 0x00, 0x00, 0x00, 0x01].as_slice(), |
| 641 | ]; |
| 642 | |
| 643 | for input in inputs { |
| 644 | let mut bytes = untrusted::Reader::new(untrusted::Input::from(input)); |
| 645 | // read_tag_and_get_value_limited should reject DER with non-canonical lengths. |
| 646 | assert!(matches!( |
| 647 | read_tag_and_get_value_limited(&mut bytes, LONG_FORM_LEN_TWO_BYTES_MAX), |
| 648 | Err(Error::BadDer) |
| 649 | )); |
| 650 | } |
| 651 | } |
| 652 | |
| 653 | #[test ] |
| 654 | #[cfg (feature = "alloc" )] |
| 655 | fn read_tag_and_get_value_limited_limits() { |
| 656 | use super::{Error, read_tag_and_get_value_limited}; |
| 657 | |
| 658 | let short_input = &[0xFF]; |
| 659 | let short_input_encoded = &[ |
| 660 | &[EXAMPLE_TAG], |
| 661 | der_encode_length(short_input.len()).as_slice(), |
| 662 | short_input, |
| 663 | ] |
| 664 | .concat(); |
| 665 | |
| 666 | let long_input = &[1_u8; 65537]; |
| 667 | let long_input_encoded = &[ |
| 668 | &[EXAMPLE_TAG], |
| 669 | der_encode_length(long_input.len()).as_slice(), |
| 670 | long_input, |
| 671 | ] |
| 672 | .concat(); |
| 673 | |
| 674 | struct Testcase<'a> { |
| 675 | input: &'a [u8], |
| 676 | limit: usize, |
| 677 | err: Option<Error>, |
| 678 | } |
| 679 | |
| 680 | let testcases = &[ |
| 681 | Testcase { |
| 682 | input: short_input_encoded, |
| 683 | limit: 1, |
| 684 | err: Some(Error::BadDer), |
| 685 | }, |
| 686 | Testcase { |
| 687 | input: short_input_encoded, |
| 688 | limit: short_input_encoded.len() + 1, |
| 689 | err: None, |
| 690 | }, |
| 691 | Testcase { |
| 692 | input: long_input_encoded, |
| 693 | limit: long_input.len(), |
| 694 | err: Some(Error::BadDer), |
| 695 | }, |
| 696 | Testcase { |
| 697 | input: long_input_encoded, |
| 698 | limit: long_input.len() + 1, |
| 699 | err: None, |
| 700 | }, |
| 701 | ]; |
| 702 | |
| 703 | for tc in testcases { |
| 704 | let mut bytes = untrusted::Reader::new(untrusted::Input::from(tc.input)); |
| 705 | |
| 706 | let res = read_tag_and_get_value_limited(&mut bytes, tc.limit); |
| 707 | match &tc.err { |
| 708 | None => assert!(res.is_ok()), |
| 709 | Some(e) => { |
| 710 | let actual = res.unwrap_err(); |
| 711 | assert_eq!(&actual, e) |
| 712 | } |
| 713 | } |
| 714 | } |
| 715 | } |
| 716 | |
| 717 | #[allow (clippy::as_conversions)] // infallible. |
| 718 | const EXAMPLE_TAG: u8 = super::Tag::Sequence as u8; |
| 719 | |
| 720 | #[cfg (feature = "alloc" )] |
| 721 | #[allow (clippy::as_conversions)] // test code. |
| 722 | fn der_encode_length(length: usize) -> Vec<u8> { |
| 723 | if length < 128 { |
| 724 | vec![length as u8] |
| 725 | } else { |
| 726 | let mut encoded: Vec<u8> = Vec::new(); |
| 727 | let mut remaining_length = length; |
| 728 | |
| 729 | while remaining_length > 0 { |
| 730 | let byte = (remaining_length & 0xFF) as u8; |
| 731 | encoded.insert(0, byte); |
| 732 | remaining_length >>= 8; |
| 733 | } |
| 734 | |
| 735 | let length_octet = encoded.len() as u8 | 0x80; |
| 736 | encoded.insert(0, length_octet); |
| 737 | |
| 738 | encoded |
| 739 | } |
| 740 | } |
| 741 | |
| 742 | #[test ] |
| 743 | fn misencoded_bit_string_flags() { |
| 744 | use super::{Error, bit_string_flags}; |
| 745 | |
| 746 | let bad_padding_example = untrusted::Input::from(&[ |
| 747 | 0x08, // 8 bit of padding (illegal!). |
| 748 | 0x06, // 1 byte of bit flags asserting bits 5 and 6. |
| 749 | ]); |
| 750 | assert!(matches!( |
| 751 | bit_string_flags(bad_padding_example), |
| 752 | Err(Error::BadDer) |
| 753 | )); |
| 754 | |
| 755 | let bad_padding_example = untrusted::Input::from(&[ |
| 756 | 0x01, // 1 bit of padding. |
| 757 | // No flags value (illegal with padding!). |
| 758 | ]); |
| 759 | assert!(matches!( |
| 760 | bit_string_flags(bad_padding_example), |
| 761 | Err(Error::BadDer) |
| 762 | )); |
| 763 | } |
| 764 | |
| 765 | #[test ] |
| 766 | fn valid_bit_string_flags() { |
| 767 | use super::bit_string_flags; |
| 768 | |
| 769 | let example_key_usage = untrusted::Input::from(&[ |
| 770 | 0x01, // 1 bit of padding. |
| 771 | 0x06, // 1 byte of bit flags asserting bits 5 and 6. |
| 772 | ]); |
| 773 | let res = bit_string_flags(example_key_usage).unwrap(); |
| 774 | |
| 775 | assert!(!res.bit_set(0)); |
| 776 | assert!(!res.bit_set(1)); |
| 777 | assert!(!res.bit_set(2)); |
| 778 | assert!(!res.bit_set(3)); |
| 779 | assert!(!res.bit_set(4)); |
| 780 | // NB: Bits 5 and 6 should be set. |
| 781 | assert!(res.bit_set(5)); |
| 782 | assert!(res.bit_set(6)); |
| 783 | assert!(!res.bit_set(7)); |
| 784 | assert!(!res.bit_set(8)); |
| 785 | // Bits outside the range of values shouldn't be considered set. |
| 786 | assert!(!res.bit_set(256)); |
| 787 | } |
| 788 | |
| 789 | #[test ] |
| 790 | fn test_small_nonnegative_integer() { |
| 791 | use super::{Error, FromDer, Tag}; |
| 792 | |
| 793 | for value in 0..=127 { |
| 794 | let data = [Tag::Integer.into(), 1, value]; |
| 795 | let mut rd = untrusted::Reader::new(untrusted::Input::from(&data)); |
| 796 | assert_eq!(u8::from_der(&mut rd), Ok(value),); |
| 797 | } |
| 798 | |
| 799 | for value in 128..=255 { |
| 800 | let data = [Tag::Integer.into(), 2, 0x00, value]; |
| 801 | let mut rd = untrusted::Reader::new(untrusted::Input::from(&data)); |
| 802 | assert_eq!(u8::from_der(&mut rd), Ok(value),); |
| 803 | } |
| 804 | |
| 805 | // not an integer |
| 806 | assert_eq!( |
| 807 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 808 | Tag::Sequence.into(), |
| 809 | 1, |
| 810 | 1 |
| 811 | ]))), |
| 812 | Err(Error::BadDer) |
| 813 | ); |
| 814 | |
| 815 | // negative |
| 816 | assert_eq!( |
| 817 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 818 | Tag::Integer.into(), |
| 819 | 1, |
| 820 | 0xff |
| 821 | ]))), |
| 822 | Err(Error::BadDer) |
| 823 | ); |
| 824 | |
| 825 | // positive but too large |
| 826 | assert_eq!( |
| 827 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 828 | Tag::Integer.into(), |
| 829 | 2, |
| 830 | 0x01, |
| 831 | 0x00 |
| 832 | ]))), |
| 833 | Err(Error::BadDer) |
| 834 | ); |
| 835 | |
| 836 | // unnecessary leading zero |
| 837 | assert_eq!( |
| 838 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 839 | Tag::Integer.into(), |
| 840 | 2, |
| 841 | 0x00, |
| 842 | 0x05 |
| 843 | ]))), |
| 844 | Err(Error::BadDer) |
| 845 | ); |
| 846 | |
| 847 | // truncations |
| 848 | assert_eq!( |
| 849 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[]))), |
| 850 | Err(Error::BadDer) |
| 851 | ); |
| 852 | |
| 853 | assert_eq!( |
| 854 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 855 | Tag::Integer.into(), |
| 856 | ]))), |
| 857 | Err(Error::BadDer) |
| 858 | ); |
| 859 | |
| 860 | assert_eq!( |
| 861 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 862 | Tag::Integer.into(), |
| 863 | 1, |
| 864 | ]))), |
| 865 | Err(Error::BadDer) |
| 866 | ); |
| 867 | |
| 868 | assert_eq!( |
| 869 | u8::from_der(&mut untrusted::Reader::new(untrusted::Input::from(&[ |
| 870 | Tag::Integer.into(), |
| 871 | 2, |
| 872 | 0 |
| 873 | ]))), |
| 874 | Err(Error::BadDer) |
| 875 | ); |
| 876 | } |
| 877 | } |
| 878 | |