int ASN1_INTEGER_set_uint64(ASN1_INTEGER *out, uint64_t v) { uint8_t *const newdata = OPENSSL_malloc(sizeof(uint64_t)); if (newdata == NULL) { OPENSSL_PUT_ERROR(ASN1, ERR_R_MALLOC_FAILURE); return 0; } OPENSSL_free(out->data); out->data = newdata; v = CRYPTO_bswap8(v); memcpy(out->data, &v, sizeof(v)); out->type = V_ASN1_INTEGER; size_t leading_zeros; for (leading_zeros = 0; leading_zeros < sizeof(uint64_t) - 1; leading_zeros++) { if (out->data[leading_zeros] != 0) { break; } } out->length = sizeof(uint64_t) - leading_zeros; OPENSSL_memmove(out->data, out->data + leading_zeros, out->length); return 1; }
void *sk_delete(_STACK *sk, size_t where) { void *ret; if (!sk || where >= sk->num) { return NULL; } ret = sk->data[where]; if (where != sk->num - 1) { OPENSSL_memmove(&sk->data[where], &sk->data[where + 1], sizeof(void *) * (sk->num - where - 1)); } sk->num--; return ret; }
size_t sk_insert(_STACK *sk, void *p, size_t where) { if (sk == NULL) { return 0; } if (sk->num_alloc <= sk->num + 1) { // Attempt to double the size of the array. size_t new_alloc = sk->num_alloc << 1; size_t alloc_size = new_alloc * sizeof(void *); void **data; // If the doubling overflowed, try to increment. if (new_alloc < sk->num_alloc || alloc_size / sizeof(void *) != new_alloc) { new_alloc = sk->num_alloc + 1; alloc_size = new_alloc * sizeof(void *); } // If the increment also overflowed, fail. if (new_alloc < sk->num_alloc || alloc_size / sizeof(void *) != new_alloc) { return 0; } data = OPENSSL_realloc(sk->data, alloc_size); if (data == NULL) { return 0; } sk->data = data; sk->num_alloc = new_alloc; } if (where >= sk->num) { sk->data[sk->num] = p; } else { OPENSSL_memmove(&sk->data[where + 1], &sk->data[where], sizeof(void *) * (sk->num - where)); sk->data[where] = p; } sk->num++; sk->sorted = 0; return sk->num; }
void DES_ede3_cfb_encrypt(const uint8_t *in, uint8_t *out, int numbits, long length, DES_key_schedule *ks1, DES_key_schedule *ks2, DES_key_schedule *ks3, DES_cblock *ivec, int enc) { uint32_t d0, d1, v0, v1; unsigned long l = length, n = ((unsigned int)numbits + 7) / 8; int num = numbits, i; uint32_t ti[2]; uint8_t *iv; uint8_t ovec[16]; if (num > 64) { return; }; iv = ivec->bytes; c2l(iv, v0); c2l(iv, v1); if (enc) { while (l >= n) { l -= n; ti[0] = v0; ti[1] = v1; DES_encrypt3(ti, ks1, ks2, ks3); c2ln(in, d0, d1, n); in += n; d0 ^= ti[0]; d1 ^= ti[1]; l2cn(d0, d1, out, n); out += n; /* 30-08-94 - eay - changed because l>>32 and l<<32 are bad under * gcc :-( */ if (num == 32) { v0 = v1; v1 = d0; } else if (num == 64) { v0 = d0; v1 = d1; } else { iv = &ovec[0]; l2c(v0, iv); l2c(v1, iv); l2c(d0, iv); l2c(d1, iv); /* shift ovec left most of the bits... */ OPENSSL_memmove(ovec, ovec + num / 8, 8 + (num % 8 ? 1 : 0)); /* now the remaining bits */ if (num % 8 != 0) { for (i = 0; i < 8; ++i) { ovec[i] <<= num % 8; ovec[i] |= ovec[i + 1] >> (8 - num % 8); } } iv = &ovec[0]; c2l(iv, v0); c2l(iv, v1); } } } else { while (l >= n) {
static int b64_read(BIO *b, char *out, int outl) { int ret = 0, i, ii, j, k, x, n, num, ret_code = 0; BIO_B64_CTX *ctx; uint8_t *p, *q; if (out == NULL) { return 0; } ctx = (BIO_B64_CTX *) b->ptr; if (ctx == NULL || b->next_bio == NULL) { return 0; } BIO_clear_retry_flags(b); if (ctx->encode != B64_DECODE) { ctx->encode = B64_DECODE; ctx->buf_len = 0; ctx->buf_off = 0; ctx->tmp_len = 0; EVP_DecodeInit(&ctx->base64); } // First check if there are bytes decoded/encoded if (ctx->buf_len > 0) { assert(ctx->buf_len >= ctx->buf_off); i = ctx->buf_len - ctx->buf_off; if (i > outl) { i = outl; } assert(ctx->buf_off + i < (int)sizeof(ctx->buf)); OPENSSL_memcpy(out, &ctx->buf[ctx->buf_off], i); ret = i; out += i; outl -= i; ctx->buf_off += i; if (ctx->buf_len == ctx->buf_off) { ctx->buf_len = 0; ctx->buf_off = 0; } } // At this point, we have room of outl bytes and an empty buffer, so we // should read in some more. ret_code = 0; while (outl > 0) { if (ctx->cont <= 0) { break; } i = BIO_read(b->next_bio, &(ctx->tmp[ctx->tmp_len]), B64_BLOCK_SIZE - ctx->tmp_len); if (i <= 0) { ret_code = i; // Should we continue next time we are called? if (!BIO_should_retry(b->next_bio)) { ctx->cont = i; // If buffer empty break if (ctx->tmp_len == 0) { break; } else { // Fall through and process what we have i = 0; } } else { // else we retry and add more data to buffer break; } } i += ctx->tmp_len; ctx->tmp_len = i; // We need to scan, a line at a time until we have a valid line if we are // starting. if (ctx->start && (BIO_test_flags(b, BIO_FLAGS_BASE64_NO_NL))) { // ctx->start = 1; ctx->tmp_len = 0; } else if (ctx->start) { q = p = (uint8_t *)ctx->tmp; num = 0; for (j = 0; j < i; j++) { if (*(q++) != '\n') { continue; } // due to a previous very long line, we need to keep on scanning for a // '\n' before we even start looking for base64 encoded stuff. if (ctx->tmp_nl) { p = q; ctx->tmp_nl = 0; continue; } k = EVP_DecodeUpdate(&(ctx->base64), (uint8_t *)ctx->buf, &num, p, q - p); if (k <= 0 && num == 0 && ctx->start) { EVP_DecodeInit(&ctx->base64); } else { if (p != (uint8_t *)&(ctx->tmp[0])) { i -= (p - (uint8_t *)&(ctx->tmp[0])); for (x = 0; x < i; x++) { ctx->tmp[x] = p[x]; } } EVP_DecodeInit(&ctx->base64); ctx->start = 0; break; } p = q; } // we fell off the end without starting if (j == i && num == 0) { // Is this is one long chunk?, if so, keep on reading until a new // line. if (p == (uint8_t *)&(ctx->tmp[0])) { // Check buffer full if (i == B64_BLOCK_SIZE) { ctx->tmp_nl = 1; ctx->tmp_len = 0; } } else if (p != q) { // finished on a '\n' n = q - p; for (ii = 0; ii < n; ii++) { ctx->tmp[ii] = p[ii]; } ctx->tmp_len = n; } // else finished on a '\n' continue; } else { ctx->tmp_len = 0; } } else if (i < B64_BLOCK_SIZE && ctx->cont > 0) { // If buffer isn't full and we can retry then restart to read in more // data. continue; } if (BIO_test_flags(b, BIO_FLAGS_BASE64_NO_NL)) { int z, jj; jj = i & ~3; // process per 4 z = EVP_DecodeBlock((uint8_t *)ctx->buf, (uint8_t *)ctx->tmp, jj); if (jj > 2) { if (ctx->tmp[jj - 1] == '=') { z--; if (ctx->tmp[jj - 2] == '=') { z--; } } } // z is now number of output bytes and jj is the number consumed. if (jj != i) { OPENSSL_memmove(ctx->tmp, &ctx->tmp[jj], i - jj); ctx->tmp_len = i - jj; } ctx->buf_len = 0; if (z > 0) { ctx->buf_len = z; } i = z; } else { i = EVP_DecodeUpdate(&(ctx->base64), (uint8_t *)ctx->buf, &ctx->buf_len, (uint8_t *)ctx->tmp, i); ctx->tmp_len = 0; } ctx->buf_off = 0; if (i < 0) { ret_code = 0; ctx->buf_len = 0; break; } if (ctx->buf_len <= outl) { i = ctx->buf_len; } else { i = outl; } OPENSSL_memcpy(out, ctx->buf, i); ret += i; ctx->buf_off = i; if (ctx->buf_off == ctx->buf_len) { ctx->buf_len = 0; ctx->buf_off = 0; } outl -= i; out += i; } BIO_copy_next_retry(b); return ret == 0 ? ret_code : ret; }