📄 cryptenv.c
字号:
if( envelopeInfoPtr->buffer == NULL )
{
/* Allocate the envelope buffer */
if( ( envelopeInfoPtr->buffer = \
clAlloc( "deenvelopePush", \
envelopeInfoPtr->bufSize ) ) == NULL )
return( CRYPT_ERROR_MEMORY );
memset( envelopeInfoPtr->buffer, 0, envelopeInfoPtr->bufSize );
#ifdef USE_PGP
/* Try and determine what the data format being used is. If it
looks like PGP data, try and process it as such, otherwise
default to PKCS #7/CMS/S/MIME */
if( length && ( bufPtr[ 0 ] & 0x80 ) )
{
/* When we initially created the envelope we defaulted to CMS
formatting, so we first switch to PGP enveloping to
override the CMS default and then finally select PGP de-
enveloping */
envelopeInfoPtr->type = CRYPT_FORMAT_PGP;
initPGPEnveloping( envelopeInfoPtr );
initPGPDeenveloping( envelopeInfoPtr );
}
#endif /* USE_PGP */
}
/* Since we're processing out-of-band information, just copy it in
directly */
if( bytesIn )
{
int bytesToCopy = min( envelopeInfoPtr->bufSize - envelopeInfoPtr->bufPos,
bytesIn );
if( bytesToCopy )
{
memcpy( envelopeInfoPtr->buffer + envelopeInfoPtr->bufPos,
bufPtr, bytesToCopy );
envelopeInfoPtr->bufPos += bytesToCopy;
bytesIn -= bytesToCopy;
*bytesCopied = bytesToCopy;
bufPtr += bytesToCopy;
}
}
/* Process the preamble */
status = envelopeInfoPtr->processPreambleFunction( envelopeInfoPtr );
if( cryptStatusError( status ) )
{
if( !isRecoverableError( status ) )
envelopeInfoPtr->errorState = status;
return( status );
}
/* The envelope is ready to process data, move it into the high
state */
krnlSendMessage( envelopeInfoPtr->objectHandle, IMESSAGE_SETATTRIBUTE,
MESSAGE_VALUE_UNUSED, CRYPT_IATTRIBUTE_INITIALISED );
/* Move on to the data-processing state */
envelopeInfoPtr->state = STATE_DATA;
}
/* If we're in the main data processing state, add the data and perform
any necessary actions on it */
if( envelopeInfoPtr->state == STATE_DATA )
{
/* If there's data to be copied, copy it into the envelope. If we've
come from the predata state, we may have zero bytes to copy if
everything was consumed by the preamble processing, or there may
be room to copy more in now if the preamble processing consumed
some of what was present */
if( bytesIn )
{
/* Copy the data to the envelope */
const int byteCount = \
envelopeInfoPtr->copyToEnvelopeFunction( envelopeInfoPtr,
bufPtr, bytesIn );
if( cryptStatusError( byteCount ) )
{
if( !isRecoverableError( byteCount ) )
envelopeInfoPtr->errorState = byteCount;
return( byteCount );
}
*bytesCopied += byteCount;
bytesIn -= byteCount;
bufPtr += byteCount;
}
/* If we've reached the end of the payload (either by having seen the
EOC octets with the indefinite encoding, by having reached the end
of the single segment with the definite encoding, or through an
explicit flush for unknown-length data), move on to the postdata
state */
if( ( envelopeInfoPtr->dataFlags & ENVDATA_ENDOFCONTENTS ) || \
( envelopeInfoPtr->payloadSize != CRYPT_UNUSED && \
envelopeInfoPtr->segmentSize <= 0 ) || \
( envelopeInfoPtr->payloadSize == CRYPT_UNUSED && \
envelopeInfoPtr->segmentSize == CRYPT_UNUSED && length <= 0 ) )
{
envelopeInfoPtr->state = STATE_POSTDATA;
envelopeInfoPtr->deenvState = DEENVSTATE_NONE;
}
}
/* If we're past the main data-processing state, process the postamble */
if( envelopeInfoPtr->state == STATE_POSTDATA )
{
/* Since we're processing trailer information, just copy it in
directly */
if( bytesIn )
{
/* The handling of EOC information in all situations is very tricky. With
PKCS #5 padded data the contents look like:
dataLeft bufPos
v v
[ data ][ pad ][ EOC / EOC ]
The previous processEOC() would leave bufPos as above, the new version
moves it down to the same location as dataLeft so that after further
copying it becomes:
dataLeft = bufPos
v
[ data ][ EOC ]
ie it adjusts both dataLeft and bufPos for padding rather than just
dataLeft. For the original version of processEOC(), the two code
alternatives below produced the following results
- 230K encrypted data, indefinite: Second alternative
- 230K signed data, indefinite: First alternative and second alternative
- Short signed data, n-4 bytes, then 4 bytes: First alternative
The new version works with all self-tests and also with large data amounts.
This comment has been retained in case a situation is found where it
doesn't work - 20/09/99 */
#if 1
const int bytesToCopy = \
min( envelopeInfoPtr->bufSize - envelopeInfoPtr->bufPos,
bytesIn );
if( bytesToCopy )
{
memcpy( envelopeInfoPtr->buffer + envelopeInfoPtr->bufPos,
bufPtr, bytesToCopy );
envelopeInfoPtr->bufPos += bytesToCopy;
*bytesCopied += bytesToCopy;
}
#else
const int bytesToCopy = \
min( envelopeInfoPtr->bufSize - envelopeInfoPtr->dataLeft,
bytesIn );
if( bytesToCopy )
{
memcpy( envelopeInfoPtr->buffer + envelopeInfoPtr->dataLeft,
bufPtr, bytesToCopy );
envelopeInfoPtr->bufPos = envelopeInfoPtr->dataLeft + \
bytesToCopy;
*bytesCopied += bytesToCopy;
}
#endif /* 1 */
}
/* Process the postamble. During this processing we can encounter
two special types of recoverable error, CRYPT_ERROR_UNDERFLOW (we
need more data to continue) or OK_SPECIAL (we processed all the
data, but there's out-of-band information still to go), if it's
one of these we don't treat it as a standard error */
status = envelopeInfoPtr->processPostambleFunction( envelopeInfoPtr );
if( cryptStatusError( status ) && status != OK_SPECIAL )
{
if( !isRecoverableError( status ) )
envelopeInfoPtr->errorState = status;
return( status );
}
/* If the routine returns OK_SPECIAL then it's processed enough of
the postamble for the caller to continue, but there's more to go
so we shouldn't change the overall state yet */
if( status == OK_SPECIAL )
status = CRYPT_OK;
else
/* We've processed all data, we're done unless it's a detached
sig with the data supplied out-of-band */
envelopeInfoPtr->state = \
( envelopeInfoPtr->flags & ENVELOPE_DETACHED_SIG ) ? \
STATE_EXTRADATA : STATE_FINISHED;
/* At this point we always exit since the out-of-band data has to be
processed in a separate push */
return( status );
}
/* If there's extra out-of-band data present, process it separately.
This is slightly complicated by the fact that the single envelope is
being used to process two independent lots of data, so we have to be
careful to distinguish between handling of the main payload data and
handling of this additional out-of-band data */
if( envelopeInfoPtr->state == STATE_EXTRADATA )
{
/* We pass this point twice, the first time round we check the state
and if it's DEENVSTATE_DONE (set when processing of the main data
was completed) we reset it to DEENVSTATE_NONE and make sure that
it's a flush */
if( envelopeInfoPtr->deenvState == DEENVSTATE_DONE )
{
/* We've finished with the main payload data, reset the state for
the additional out-of-band data. Normally we exit here since
it's a flush, however if the hash value was supplied
externally (which means hashing was never active, since it was
done by the caller), we drop through to the wrap-up, since
there's no second flush of payload data to be performed and so
the flush applies to both sets of data */
envelopeInfoPtr->deenvState = DEENVSTATE_NONE;
if( envelopeInfoPtr->dataFlags & ENVDATA_HASHACTIONSACTIVE )
return( length ? CRYPT_ERROR_BADDATA : CRYPT_OK );
}
/* This is just raw additional data so we feed it directly to the
processing function */
status = envelopeInfoPtr->processExtraData( envelopeInfoPtr, buffer,
length );
if( cryptStatusOK( status ) )
{
*bytesCopied = length;
if( !length )
envelopeInfoPtr->state = STATE_FINISHED;
}
}
return( status );
}
/* Pop data from an envelope */
static int envelopePop( ENVELOPE_INFO *envelopeInfoPtr, void *buffer,
const int length, int *bytesCopied )
{
int status;
/* Copy the data from the envelope to the output */
status = envelopeInfoPtr->copyFromEnvelopeFunction( envelopeInfoPtr,
buffer, length );
if( cryptStatusError( status ) )
{
envelopeInfoPtr->errorState = status;
return( status );
}
*bytesCopied = status;
return( CRYPT_OK );
}
static int deenvelopePop( ENVELOPE_INFO *envelopeInfoPtr, void *buffer,
const int length, int *bytesCopied )
{
int status;
/* If we haven't reached the data yet force a flush to try and get to the
data. We can end up with this condition if the caller pushes in
deenveloping information and then immediately tries to pop data
without an intervening flush (or implicit flush on the initial push) to
resolve the state of the data in the envelope */
if( envelopeInfoPtr->state == STATE_PREDATA )
{
int dummy;
status = deenvelopePush( envelopeInfoPtr, NULL, 0, &dummy );
if( cryptStatusError( status ) )
return( status );
/* If we still haven't got anywhere, return an underflow error */
if( envelopeInfoPtr->state == STATE_PREDATA )
return( CRYPT_ERROR_UNDERFLOW );
}
/* Copy the data from the envelope to the output */
status = envelopeInfoPtr->copyFromEnvelopeFunction( envelopeInfoPtr,
buffer, length );
if( cryptStatusError( status ) )
{
if( !isRecoverableError( status ) )
envelopeInfoPtr->errorState = status;
return( status );
}
*bytesCopied = status;
return( CRYPT_OK );
}
/****************************************************************************
* *
* Envelope Message Handler *
* *
****************************************************************************/
/* Handle a message sent to an envelope */
static int envelopeMessageFunction( const void *objectInfoPtr,
const MESSAGE_TYPE message,
void *messageDataPtr,
const int messageValue )
{
ENVELOPE_INFO *envelopeInfoPtr = ( ENVELOPE_INFO * ) objectInfoPtr;
/* Process destroy object messages */
if( message == MESSAGE_DESTROY )
{
int status = CRYPT_OK;
/* Check to see whether the envelope still needs operations performed
on it to resolve the state of the data within it (for example if
the caller pushes data but doesn't flush it, there will be a few
bytes left that can't be popped). For enveloping, destroying the
envelope while it's in any state other than STATE_PREDATA or
STATE_FINISHED is regarded as an error. For de-enveloping we have
to be more careful, since deenveloping information required to
resolve the envelope state could be unavailable, so we shouldn't
return an error if something like a signature check remains to be
done. What we therefore do is check to see whether we've processed
any data yet and report an error if there's any data left in the
envelope or if we destroy it in the middle of processing data */
if( envelopeInfoPtr->flags & ENVELOPE_ISDEENVELOPE )
{
/* If we've got to the point of processing data in the envelope
and there's either more to come or some left to pop, we
shouldn't be destroying it yet */
if( envelopeInfoPtr->state == STATE_DATA || \
( ( envelopeInfoPtr->state == STATE_POSTDATA || \
envelopeInfoPtr->state == STATE_FINISHED ) && \
envelopeInfoPtr->dataLeft > 0 ) )
status = CRYPT_ERROR_INCOMPLETE;
}
else
/* If we're in the middle of processing data, we shouldn't be
destroying the envelope yet */
if( envelopeInfoPtr->state != STATE_PREDATA && \
envelopeInfoPtr->state != STATE_FINISHED )
status = CRYPT_ERROR_INCOMPLETE;
/* Delete the action and content lists */
deleteActionList( envelopeInfoPtr->memPoolState,
envelopeInfoPtr->preActionList );
deleteActionList( envelopeInf
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -