mirror of https://github.com/openssl/openssl.git
				
				
				
			Fix i2d_X509_AUX, update docs and add tests
When *pp is NULL, don't write garbage, return an unexpected pointer or leak memory on error. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
This commit is contained in:
		
							parent
							
								
									9b5164ce77
								
							
						
					
					
						commit
						fde2257f05
					
				|  | @ -181,12 +181,26 @@ X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, long length) | |||
|     return NULL; | ||||
| } | ||||
| 
 | ||||
| int i2d_X509_AUX(X509 *a, unsigned char **pp) | ||||
| /*
 | ||||
|  * Serialize trusted certificate to *pp or just return the required buffer | ||||
|  * length if pp == NULL.  We ultimately want to avoid modifying *pp in the | ||||
|  * error path, but that depends on similar hygiene in lower-level functions. | ||||
|  * Here we avoid compounding the problem. | ||||
|  */ | ||||
| static int i2d_x509_aux_internal(X509 *a, unsigned char **pp) | ||||
| { | ||||
|     int length, tmplen; | ||||
|     unsigned char *start = pp != NULL ? *pp : NULL; | ||||
| 
 | ||||
|     OPENSSL_assert(pp == NULL || *pp != NULL); | ||||
| 
 | ||||
|     /*
 | ||||
|      * This might perturb *pp on error, but fixing that belongs in i2d_X509() | ||||
|      * not here.  It should be that if a == NULL length is zero, but we check | ||||
|      * both just in case. | ||||
|      */ | ||||
|     length = i2d_X509(a, pp); | ||||
|     if (length < 0 || a == NULL) | ||||
|     if (length <= 0 || a == NULL) | ||||
|         return length; | ||||
| 
 | ||||
|     tmplen = i2d_X509_CERT_AUX(a->aux, pp); | ||||
|  | @ -200,6 +214,42 @@ int i2d_X509_AUX(X509 *a, unsigned char **pp) | |||
|     return length; | ||||
| } | ||||
| 
 | ||||
| /*
 | ||||
|  * Serialize trusted certificate to *pp, or just return the required buffer | ||||
|  * length if pp == NULL. | ||||
|  * | ||||
|  * When pp is not NULL, but *pp == NULL, we allocate the buffer, but since | ||||
|  * we're writing two ASN.1 objects back to back, we can't have i2d_X509() do | ||||
|  * the allocation, nor can we allow i2d_X509_CERT_AUX() to increment the | ||||
|  * allocated buffer. | ||||
|  */ | ||||
| int i2d_X509_AUX(X509 *a, unsigned char **pp) | ||||
| { | ||||
|     int length; | ||||
|     unsigned char *tmp; | ||||
| 
 | ||||
|     /* Buffer provided by caller */ | ||||
|     if (pp == NULL || *pp != NULL) | ||||
|         return i2d_x509_aux_internal(a, pp); | ||||
| 
 | ||||
|     /* Obtain the combined length */ | ||||
|     if ((length = i2d_x509_aux_internal(a, NULL)) <= 0) | ||||
|         return length; | ||||
| 
 | ||||
|     /* Allocate requisite combined storage */ | ||||
|     *pp = tmp = OPENSSL_malloc(length); | ||||
|     if (tmp == NULL) | ||||
|         return -1; /* Push error onto error stack? */ | ||||
| 
 | ||||
|     /* Encode, but keep *pp at the originally malloced pointer */ | ||||
|     length = i2d_x509_aux_internal(a, &tmp); | ||||
|     if (length <= 0) { | ||||
|         OPENSSL_free(*pp); | ||||
|         *pp = NULL; | ||||
|     } | ||||
|     return length; | ||||
| } | ||||
| 
 | ||||
| int i2d_re_X509_tbs(X509 *x, unsigned char **pp) | ||||
| { | ||||
|     x->cert_info.enc.modified = 1; | ||||
|  |  | |||
|  | @ -9,8 +9,10 @@ i2d_X509_fp - X509 encode and decode functions | |||
| 
 | ||||
|  #include <openssl/x509.h> | ||||
| 
 | ||||
|  X509 *d2i_X509(X509 **px, const unsigned char **in, int len); | ||||
|  X509 *d2i_X509(X509 **px, const unsigned char **in, long len); | ||||
|  X509 *d2i_X509_AUX(X509 **px, const unsigned char **in, long len); | ||||
|  int i2d_X509(X509 *x, unsigned char **out); | ||||
|  int i2d_X509_AUX(X509 *x, unsigned char **out); | ||||
| 
 | ||||
|  X509 *d2i_X509_bio(BIO *bp, X509 **x); | ||||
|  X509 *d2i_X509_fp(FILE *fp, X509 **x); | ||||
|  | @ -37,6 +39,11 @@ below, and the discussion in the RETURN VALUES section). | |||
| If the call is successful B<*in> is incremented to the byte following the | ||||
| parsed data. | ||||
| 
 | ||||
| d2i_X509_AUX() is similar to d2i_X509() but the input is expected to consist of | ||||
| an X509 certificate followed by auxiliary trust information. | ||||
| This is used by the PEM routines to read "TRUSTED CERTIFICATE" objects. | ||||
| This function should not be called on untrusted input. | ||||
| 
 | ||||
| i2d_X509() encodes the structure pointed to by B<x> into DER format. | ||||
| If B<out> is not B<NULL> is writes the DER encoded data to the buffer | ||||
| at B<*out>, and increments it to point after the data just written. | ||||
|  | @ -48,6 +55,11 @@ allocated for a buffer and the encoded data written to it. In this | |||
| case B<*out> is not incremented and it points to the start of the | ||||
| data just written. | ||||
| 
 | ||||
| i2d_X509_AUX() is similar to i2d_X509(), but the encoded output contains both | ||||
| the certificate and any auxiliary trust information. | ||||
| This is used by the PEM routines to write "TRUSTED CERTIFICATE" objects. | ||||
| Note, this is a non-standard OpenSSL-specific data format. | ||||
| 
 | ||||
| d2i_X509_bio() is similar to d2i_X509() except it attempts | ||||
| to parse data from BIO B<bp>. | ||||
| 
 | ||||
|  |  | |||
|  | @ -16,7 +16,7 @@ IF[{- !$disabled{tests} -}] | |||
|           constant_time_test verify_extra_test clienthellotest \ | ||||
|           packettest asynctest secmemtest srptest memleaktest \ | ||||
|           dtlsv1listentest ct_test threadstest afalgtest d2i_test \ | ||||
|           ssl_test_ctx_test ssl_test | ||||
|           ssl_test_ctx_test ssl_test x509aux | ||||
| 
 | ||||
|   SOURCE[aborttest]=aborttest.c | ||||
|   INCLUDE[aborttest]={- rel2abs(catdir($builddir,"../include")) -} ../include | ||||
|  | @ -237,4 +237,8 @@ IF[{- !$disabled{tests} -}] | |||
|   INCLUDE[testutil.o]=.. | ||||
|   INCLUDE[ssl_test_ctx.o]={- rel2abs(catdir($builddir,"../include")) -} ../include | ||||
|   INCLUDE[handshake_helper.o]={- rel2abs(catdir($builddir,"../include")) -} ../include | ||||
| 
 | ||||
|   SOURCE[x509aux]=x509aux.c | ||||
|   INCLUDE[x509aux]={- rel2abs(catdir($builddir,"../include")) -} ../include | ||||
|   DEPEND[x509aux]=../libcrypto | ||||
| ENDIF | ||||
|  |  | |||
|  | @ -475,7 +475,7 @@ int main(int argc, char *argv[]) | |||
|     progname = argv[0]; | ||||
|     if (argc != 4) { | ||||
|         test_usage(); | ||||
|         EXIT(1); | ||||
|         EXIT(ret); | ||||
|     } | ||||
|     basedomain = argv[1]; | ||||
|     CAfile = argv[2]; | ||||
|  | @ -492,10 +492,9 @@ int main(int argc, char *argv[]) | |||
|     if (f == NULL) { | ||||
|         fprintf(stderr, "%s: Error opening tlsa record file: '%s': %s\n", | ||||
|                 progname, tlsafile, strerror(errno)); | ||||
|         return 0; | ||||
|         EXIT(ret); | ||||
|     } | ||||
| 
 | ||||
| 
 | ||||
|     ctx = SSL_CTX_new(TLS_client_method()); | ||||
|     if (SSL_CTX_dane_enable(ctx) <= 0) { | ||||
|         print_errors(); | ||||
|  |  | |||
|  | @ -0,0 +1,27 @@ | |||
| #! /usr/bin/env perl | ||||
| # Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved. | ||||
| # | ||||
| # Licensed under the OpenSSL license (the "License").  You may not use | ||||
| # this file except in compliance with the License.  You can obtain a copy | ||||
| # in the file LICENSE in the source distribution or at | ||||
| # https://www.openssl.org/source/license.html | ||||
| 
 | ||||
| 
 | ||||
| use strict; | ||||
| use warnings; | ||||
| use OpenSSL::Test qw/:DEFAULT srctop_file/; | ||||
| use OpenSSL::Test::Utils; | ||||
| 
 | ||||
| setup("test_x509aux"); | ||||
| 
 | ||||
| plan skip_all => "test_dane uses ec which is not supported by this OpenSSL build" | ||||
|     if disabled("ec"); | ||||
| 
 | ||||
| plan tests => 1;                # The number of tests being performed | ||||
| 
 | ||||
| ok(run(test(["x509aux",  | ||||
|                 srctop_file("test", "certs", "roots.pem"), | ||||
|                 srctop_file("test", "certs", "root+anyEKU.pem"), | ||||
|                 srctop_file("test", "certs", "root-anyEKU.pem"), | ||||
|                 srctop_file("test", "certs", "root-cert.pem")] | ||||
|         )), "x509aux tests"); | ||||
|  | @ -0,0 +1,226 @@ | |||
| /*
 | ||||
|  * Copyright 2016 The OpenSSL Project Authors. All Rights Reserved. | ||||
|  * | ||||
|  * Licensed under the OpenSSL licenses, (the "License"); | ||||
|  * you may not use this file except in compliance with the License. | ||||
|  * You may obtain a copy of the License at | ||||
|  * https://www.openssl.org/source/license.html
 | ||||
|  * or in the file LICENSE in the source distribution. | ||||
|  */ | ||||
| 
 | ||||
| #include <stdio.h> | ||||
| #include <string.h> | ||||
| #include <errno.h> | ||||
| 
 | ||||
| #include <openssl/x509.h> | ||||
| #include <openssl/pem.h> | ||||
| #include <openssl/conf.h> | ||||
| #include <openssl/err.h> | ||||
| 
 | ||||
| #include "../e_os.h" | ||||
| 
 | ||||
| static const char *progname; | ||||
| 
 | ||||
| static void test_usage(void) | ||||
| { | ||||
|     fprintf(stderr, "usage: %s certfile\n", progname); | ||||
| } | ||||
| 
 | ||||
| static void print_errors(void) | ||||
| { | ||||
|     unsigned long err; | ||||
|     char buffer[1024]; | ||||
|     const char *file; | ||||
|     const char *data; | ||||
|     int line; | ||||
|     int flags; | ||||
| 
 | ||||
|     while ((err = ERR_get_error_line_data(&file, &line, &data, &flags)) != 0) { | ||||
|         ERR_error_string_n(err, buffer, sizeof(buffer)); | ||||
|         if (flags & ERR_TXT_STRING) | ||||
|             fprintf(stderr, "Error: %s:%s:%d:%s\n", buffer, file, line, data); | ||||
|         else | ||||
|             fprintf(stderr, "Error: %s:%s:%d\n", buffer, file, line); | ||||
|     } | ||||
| } | ||||
| 
 | ||||
| static int test_certs(BIO *fp) | ||||
| { | ||||
|     int count; | ||||
|     char *name = 0; | ||||
|     char *header = 0; | ||||
|     unsigned char *data = 0; | ||||
|     long len; | ||||
|     typedef X509 *(*d2i_X509_t)(X509 **, const unsigned char **, long); | ||||
|     typedef int (*i2d_X509_t)(X509 *, unsigned char **); | ||||
|     int err = 0; | ||||
| 
 | ||||
|     for (count = 0; | ||||
|          !err && PEM_read_bio(fp, &name, &header, &data, &len); | ||||
| 	 ++count) { | ||||
|         int trusted = strcmp(name, PEM_STRING_X509_TRUSTED) == 0; | ||||
|         d2i_X509_t d2i = trusted ? d2i_X509_AUX : d2i_X509; | ||||
|         i2d_X509_t i2d = trusted ? i2d_X509_AUX : i2d_X509; | ||||
|         X509 *cert = NULL; | ||||
| 	const unsigned char *p = data; | ||||
|         unsigned char *buf = NULL; | ||||
|         unsigned char *bufp; | ||||
|         long enclen; | ||||
| 
 | ||||
| 	if (!trusted | ||||
|             && strcmp(name, PEM_STRING_X509) != 0 | ||||
| 	    && strcmp(name, PEM_STRING_X509_OLD) != 0) { | ||||
| 	    fprintf(stderr, "unexpected PEM object: %s\n", name); | ||||
|             err = 1; | ||||
| 	    goto next; | ||||
|         } | ||||
|         cert = d2i(NULL, &p, len); | ||||
| 
 | ||||
|         if (cert == NULL || (p - data) != len) { | ||||
| 	    fprintf(stderr, "error parsing input %s\n", name); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
| 
 | ||||
|         /* Test traditional 2-pass encoding into caller allocated buffer */ | ||||
|         enclen = i2d(cert, NULL); | ||||
|         if (len != enclen) { | ||||
| 	    fprintf(stderr, "encoded length %ld of %s != input length %ld\n", | ||||
|                     enclen, name, len); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
|         if ((buf = bufp = OPENSSL_malloc(len)) == NULL) { | ||||
|             perror("malloc"); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
|         enclen = i2d(cert, &bufp); | ||||
|         if (len != enclen) { | ||||
| 	    fprintf(stderr, "encoded length %ld of %s != input length %ld\n", | ||||
|                     enclen, name, len); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
|         enclen = (long) (bufp - buf); | ||||
|         if (enclen != len) { | ||||
| 	    fprintf(stderr, "unexpected buffer position after encoding %s\n", | ||||
|                     name); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
|         if (memcmp(buf, data, len) != 0) { | ||||
| 	    fprintf(stderr, "encoded content of %s does not match input\n", | ||||
|                     name); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
|         OPENSSL_free(buf); | ||||
|         buf = NULL; | ||||
| 
 | ||||
|         /* Test 1-pass encoding into library allocated buffer */ | ||||
|         enclen = i2d(cert, &buf); | ||||
|         if (len != enclen) { | ||||
| 	    fprintf(stderr, "encoded length %ld of %s != input length %ld\n", | ||||
|                     enclen, name, len); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
|         if (memcmp(buf, data, len) != 0) { | ||||
| 	    fprintf(stderr, "encoded content of %s does not match input\n", | ||||
|                     name); | ||||
|             err = 1; | ||||
|             goto next; | ||||
|         } | ||||
| 
 | ||||
|         if (trusted) { | ||||
|             /* Encode just the cert and compare with initial encoding */ | ||||
|             OPENSSL_free(buf); | ||||
|             buf = NULL; | ||||
| 
 | ||||
|             /* Test 1-pass encoding into library allocated buffer */ | ||||
|             enclen = i2d(cert, &buf); | ||||
|             if (enclen > len) { | ||||
|                 fprintf(stderr, "encoded length %ld of %s > input length %ld\n", | ||||
|                         enclen, name, len); | ||||
|                 err = 1; | ||||
|                 goto next; | ||||
|             } | ||||
|             if (memcmp(buf, data, enclen) != 0) { | ||||
|                 fprintf(stderr, "encoded cert content does not match input\n"); | ||||
|                 err = 1; | ||||
|                 goto next; | ||||
|             } | ||||
|         } | ||||
| 
 | ||||
| 	/*
 | ||||
| 	 * If any of these were null, PEM_read() would have failed. | ||||
| 	 */ | ||||
|     next: | ||||
|         X509_free(cert); | ||||
|         OPENSSL_free(buf); | ||||
| 	OPENSSL_free(name); | ||||
| 	OPENSSL_free(header); | ||||
| 	OPENSSL_free(data); | ||||
|     } | ||||
| 
 | ||||
|     if (ERR_GET_REASON(ERR_peek_last_error()) == PEM_R_NO_START_LINE) { | ||||
|         /* Reached end of PEM file */ | ||||
|         if (count > 0) { | ||||
|             ERR_clear_error(); | ||||
|             return 1; | ||||
|         } | ||||
|     } | ||||
| 
 | ||||
|     /* Some other PEM read error */ | ||||
|     print_errors(); | ||||
|     return 0; | ||||
| } | ||||
| 
 | ||||
| int main(int argc, char *argv[]) | ||||
| { | ||||
|     BIO *bio_err; | ||||
|     const char *certfile; | ||||
|     const char *p; | ||||
|     int ret = 1; | ||||
| 
 | ||||
|     progname = argv[0]; | ||||
|     if (argc < 2) { | ||||
|         test_usage(); | ||||
|         EXIT(ret); | ||||
|     } | ||||
| 
 | ||||
|     bio_err = BIO_new_fp(stderr, BIO_NOCLOSE | BIO_FP_TEXT); | ||||
| 
 | ||||
|     p = getenv("OPENSSL_DEBUG_MEMORY"); | ||||
|     if (p != NULL && strcmp(p, "on") == 0) | ||||
|         CRYPTO_set_mem_debug(1); | ||||
|     CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON); | ||||
| 
 | ||||
|     while ((certfile = *++argv) != NULL) { | ||||
|         BIO *f = BIO_new_file(certfile, "r"); | ||||
|         int ok; | ||||
| 
 | ||||
|         if (f == NULL) { | ||||
|             fprintf(stderr, "%s: Error opening cert file: '%s': %s\n", | ||||
|                     progname, certfile, strerror(errno)); | ||||
|             EXIT(ret); | ||||
|         } | ||||
|         ret = !(ok = test_certs(f)); | ||||
|         BIO_free(f); | ||||
| 
 | ||||
|         if (!ok) { | ||||
|             printf("%s ERROR\n", certfile); | ||||
|             ret = 1; | ||||
|             break; | ||||
|         } | ||||
|         printf("%s OK\n", certfile); | ||||
|     } | ||||
| 
 | ||||
| #ifndef OPENSSL_NO_CRYPTO_MDEBUG | ||||
|     if (CRYPTO_mem_leaks(bio_err) <= 0) | ||||
|         ret = 1; | ||||
| #endif | ||||
|     BIO_free(bio_err); | ||||
|     EXIT(ret); | ||||
| } | ||||
		Loading…
	
		Reference in New Issue