ed25519_cert.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889
  1. /* ed25519_cert.c -- generated by Trunnel v1.4.6.
  2. * https://gitweb.torproject.org/trunnel.git
  3. * You probably shouldn't edit this file.
  4. */
  5. #include <stdlib.h>
  6. #include "trunnel-impl.h"
  7. #include "ed25519_cert.h"
  8. #define TRUNNEL_SET_ERROR_CODE(obj) \
  9. do { \
  10. (obj)->trunnel_error_code_ = 1; \
  11. } while (0)
  12. #if defined(__COVERITY__) || defined(__clang_analyzer__)
  13. /* If we're runnning a static analysis tool, we don't want it to complain
  14. * that some of our remaining-bytes checks are dead-code. */
  15. int edcert_deadcode_dummy__ = 0;
  16. #define OR_DEADCODE_DUMMY || edcert_deadcode_dummy__
  17. #else
  18. #define OR_DEADCODE_DUMMY
  19. #endif
  20. #define CHECK_REMAINING(nbytes, label) \
  21. do { \
  22. if (remaining < (nbytes) OR_DEADCODE_DUMMY) { \
  23. goto label; \
  24. } \
  25. } while (0)
  26. ed25519_cert_extension_t *
  27. ed25519_cert_extension_new(void)
  28. {
  29. ed25519_cert_extension_t *val = trunnel_calloc(1, sizeof(ed25519_cert_extension_t));
  30. if (NULL == val)
  31. return NULL;
  32. return val;
  33. }
  34. /** Release all storage held inside 'obj', but do not free 'obj'.
  35. */
  36. static void
  37. ed25519_cert_extension_clear(ed25519_cert_extension_t *obj)
  38. {
  39. (void) obj;
  40. TRUNNEL_DYNARRAY_WIPE(&obj->un_unparsed);
  41. TRUNNEL_DYNARRAY_CLEAR(&obj->un_unparsed);
  42. }
  43. void
  44. ed25519_cert_extension_free(ed25519_cert_extension_t *obj)
  45. {
  46. if (obj == NULL)
  47. return;
  48. ed25519_cert_extension_clear(obj);
  49. trunnel_memwipe(obj, sizeof(ed25519_cert_extension_t));
  50. trunnel_free_(obj);
  51. }
  52. uint16_t
  53. ed25519_cert_extension_get_ext_length(ed25519_cert_extension_t *inp)
  54. {
  55. return inp->ext_length;
  56. }
  57. int
  58. ed25519_cert_extension_set_ext_length(ed25519_cert_extension_t *inp, uint16_t val)
  59. {
  60. inp->ext_length = val;
  61. return 0;
  62. }
  63. uint8_t
  64. ed25519_cert_extension_get_ext_type(ed25519_cert_extension_t *inp)
  65. {
  66. return inp->ext_type;
  67. }
  68. int
  69. ed25519_cert_extension_set_ext_type(ed25519_cert_extension_t *inp, uint8_t val)
  70. {
  71. inp->ext_type = val;
  72. return 0;
  73. }
  74. uint8_t
  75. ed25519_cert_extension_get_ext_flags(ed25519_cert_extension_t *inp)
  76. {
  77. return inp->ext_flags;
  78. }
  79. int
  80. ed25519_cert_extension_set_ext_flags(ed25519_cert_extension_t *inp, uint8_t val)
  81. {
  82. inp->ext_flags = val;
  83. return 0;
  84. }
  85. size_t
  86. ed25519_cert_extension_getlen_un_signing_key(const ed25519_cert_extension_t *inp)
  87. {
  88. (void)inp; return 32;
  89. }
  90. uint8_t
  91. ed25519_cert_extension_get_un_signing_key(const ed25519_cert_extension_t *inp, size_t idx)
  92. {
  93. trunnel_assert(idx < 32);
  94. return inp->un_signing_key[idx];
  95. }
  96. int
  97. ed25519_cert_extension_set_un_signing_key(ed25519_cert_extension_t *inp, size_t idx, uint8_t elt)
  98. {
  99. trunnel_assert(idx < 32);
  100. inp->un_signing_key[idx] = elt;
  101. return 0;
  102. }
  103. uint8_t *
  104. ed25519_cert_extension_getarray_un_signing_key(ed25519_cert_extension_t *inp)
  105. {
  106. return inp->un_signing_key;
  107. }
  108. size_t
  109. ed25519_cert_extension_getlen_un_unparsed(const ed25519_cert_extension_t *inp)
  110. {
  111. return TRUNNEL_DYNARRAY_LEN(&inp->un_unparsed);
  112. }
  113. uint8_t
  114. ed25519_cert_extension_get_un_unparsed(ed25519_cert_extension_t *inp, size_t idx)
  115. {
  116. return TRUNNEL_DYNARRAY_GET(&inp->un_unparsed, idx);
  117. }
  118. int
  119. ed25519_cert_extension_set_un_unparsed(ed25519_cert_extension_t *inp, size_t idx, uint8_t elt)
  120. {
  121. TRUNNEL_DYNARRAY_SET(&inp->un_unparsed, idx, elt);
  122. return 0;
  123. }
  124. int
  125. ed25519_cert_extension_add_un_unparsed(ed25519_cert_extension_t *inp, uint8_t elt)
  126. {
  127. TRUNNEL_DYNARRAY_ADD(uint8_t, &inp->un_unparsed, elt, {});
  128. return 0;
  129. trunnel_alloc_failed:
  130. TRUNNEL_SET_ERROR_CODE(inp);
  131. return -1;
  132. }
  133. uint8_t *
  134. ed25519_cert_extension_getarray_un_unparsed(ed25519_cert_extension_t *inp)
  135. {
  136. return inp->un_unparsed.elts_;
  137. }
  138. int
  139. ed25519_cert_extension_setlen_un_unparsed(ed25519_cert_extension_t *inp, size_t newlen)
  140. {
  141. uint8_t *newptr;
  142. newptr = trunnel_dynarray_setlen(&inp->un_unparsed.allocated_,
  143. &inp->un_unparsed.n_, inp->un_unparsed.elts_, newlen,
  144. sizeof(inp->un_unparsed.elts_[0]), (trunnel_free_fn_t) NULL,
  145. &inp->trunnel_error_code_);
  146. if (newlen != 0 && newptr == NULL)
  147. goto trunnel_alloc_failed;
  148. inp->un_unparsed.elts_ = newptr;
  149. return 0;
  150. trunnel_alloc_failed:
  151. TRUNNEL_SET_ERROR_CODE(inp);
  152. return -1;
  153. }
  154. const char *
  155. ed25519_cert_extension_check(const ed25519_cert_extension_t *obj)
  156. {
  157. if (obj == NULL)
  158. return "Object was NULL";
  159. if (obj->trunnel_error_code_)
  160. return "A set function failed on this object";
  161. switch (obj->ext_type) {
  162. case CERTEXT_SIGNED_WITH_KEY:
  163. break;
  164. default:
  165. break;
  166. }
  167. return NULL;
  168. }
  169. ssize_t
  170. ed25519_cert_extension_encoded_len(const ed25519_cert_extension_t *obj)
  171. {
  172. ssize_t result = 0;
  173. if (NULL != ed25519_cert_extension_check(obj))
  174. return -1;
  175. /* Length of u16 ext_length */
  176. result += 2;
  177. /* Length of u8 ext_type */
  178. result += 1;
  179. /* Length of u8 ext_flags */
  180. result += 1;
  181. switch (obj->ext_type) {
  182. case CERTEXT_SIGNED_WITH_KEY:
  183. /* Length of u8 un_signing_key[32] */
  184. result += 32;
  185. break;
  186. default:
  187. /* Length of u8 un_unparsed[] */
  188. result += TRUNNEL_DYNARRAY_LEN(&obj->un_unparsed);
  189. break;
  190. }
  191. return result;
  192. }
  193. int
  194. ed25519_cert_extension_clear_errors(ed25519_cert_extension_t *obj)
  195. {
  196. int r = obj->trunnel_error_code_;
  197. obj->trunnel_error_code_ = 0;
  198. return r;
  199. }
  200. ssize_t
  201. ed25519_cert_extension_encode(uint8_t *output, const size_t avail, const ed25519_cert_extension_t *obj)
  202. {
  203. ssize_t result = 0;
  204. size_t written = 0;
  205. uint8_t *ptr = output;
  206. const char *msg;
  207. #ifdef TRUNNEL_CHECK_ENCODED_LEN
  208. const ssize_t encoded_len = ed25519_cert_extension_encoded_len(obj);
  209. #endif
  210. uint8_t *backptr_ext_length = NULL;
  211. if (NULL != (msg = ed25519_cert_extension_check(obj)))
  212. goto check_failed;
  213. #ifdef TRUNNEL_CHECK_ENCODED_LEN
  214. trunnel_assert(encoded_len >= 0);
  215. #endif
  216. /* Encode u16 ext_length */
  217. backptr_ext_length = ptr;
  218. trunnel_assert(written <= avail);
  219. if (avail - written < 2)
  220. goto truncated;
  221. trunnel_set_uint16(ptr, trunnel_htons(obj->ext_length));
  222. written += 2; ptr += 2;
  223. /* Encode u8 ext_type */
  224. trunnel_assert(written <= avail);
  225. if (avail - written < 1)
  226. goto truncated;
  227. trunnel_set_uint8(ptr, (obj->ext_type));
  228. written += 1; ptr += 1;
  229. /* Encode u8 ext_flags */
  230. trunnel_assert(written <= avail);
  231. if (avail - written < 1)
  232. goto truncated;
  233. trunnel_set_uint8(ptr, (obj->ext_flags));
  234. written += 1; ptr += 1;
  235. {
  236. size_t written_before_union = written;
  237. /* Encode union un[ext_type] */
  238. trunnel_assert(written <= avail);
  239. switch (obj->ext_type) {
  240. case CERTEXT_SIGNED_WITH_KEY:
  241. /* Encode u8 un_signing_key[32] */
  242. trunnel_assert(written <= avail);
  243. if (avail - written < 32)
  244. goto truncated;
  245. memcpy(ptr, obj->un_signing_key, 32);
  246. written += 32; ptr += 32;
  247. break;
  248. default:
  249. /* Encode u8 un_unparsed[] */
  250. {
  251. size_t elt_len = TRUNNEL_DYNARRAY_LEN(&obj->un_unparsed);
  252. trunnel_assert(written <= avail);
  253. if (avail - written < elt_len)
  254. goto truncated;
  255. if (elt_len)
  256. memcpy(ptr, obj->un_unparsed.elts_, elt_len);
  257. written += elt_len; ptr += elt_len;
  258. }
  259. break;
  260. }
  261. /* Write the length field back to ext_length */
  262. trunnel_assert(written >= written_before_union);
  263. #if UINT16_MAX < SIZE_MAX
  264. if (written - written_before_union > UINT16_MAX)
  265. goto check_failed;
  266. #endif
  267. trunnel_set_uint16(backptr_ext_length, trunnel_htons(written - written_before_union));
  268. }
  269. trunnel_assert(ptr == output + written);
  270. #ifdef TRUNNEL_CHECK_ENCODED_LEN
  271. {
  272. trunnel_assert(encoded_len >= 0);
  273. trunnel_assert((size_t)encoded_len == written);
  274. }
  275. #endif
  276. return written;
  277. truncated:
  278. result = -2;
  279. goto fail;
  280. check_failed:
  281. (void)msg;
  282. result = -1;
  283. goto fail;
  284. fail:
  285. trunnel_assert(result < 0);
  286. return result;
  287. }
  288. /** As ed25519_cert_extension_parse(), but do not allocate the output
  289. * object.
  290. */
  291. static ssize_t
  292. ed25519_cert_extension_parse_into(ed25519_cert_extension_t *obj, const uint8_t *input, const size_t len_in)
  293. {
  294. const uint8_t *ptr = input;
  295. size_t remaining = len_in;
  296. ssize_t result = 0;
  297. (void)result;
  298. /* Parse u16 ext_length */
  299. CHECK_REMAINING(2, truncated);
  300. obj->ext_length = trunnel_ntohs(trunnel_get_uint16(ptr));
  301. remaining -= 2; ptr += 2;
  302. /* Parse u8 ext_type */
  303. CHECK_REMAINING(1, truncated);
  304. obj->ext_type = (trunnel_get_uint8(ptr));
  305. remaining -= 1; ptr += 1;
  306. /* Parse u8 ext_flags */
  307. CHECK_REMAINING(1, truncated);
  308. obj->ext_flags = (trunnel_get_uint8(ptr));
  309. remaining -= 1; ptr += 1;
  310. {
  311. size_t remaining_after;
  312. CHECK_REMAINING(obj->ext_length, truncated);
  313. remaining_after = remaining - obj->ext_length;
  314. remaining = obj->ext_length;
  315. /* Parse union un[ext_type] */
  316. switch (obj->ext_type) {
  317. case CERTEXT_SIGNED_WITH_KEY:
  318. /* Parse u8 un_signing_key[32] */
  319. CHECK_REMAINING(32, fail);
  320. memcpy(obj->un_signing_key, ptr, 32);
  321. remaining -= 32; ptr += 32;
  322. break;
  323. default:
  324. /* Parse u8 un_unparsed[] */
  325. TRUNNEL_DYNARRAY_EXPAND(uint8_t, &obj->un_unparsed, remaining, {});
  326. obj->un_unparsed.n_ = remaining;
  327. if (remaining)
  328. memcpy(obj->un_unparsed.elts_, ptr, remaining);
  329. ptr += remaining; remaining -= remaining;
  330. break;
  331. }
  332. if (remaining != 0)
  333. goto fail;
  334. remaining = remaining_after;
  335. }
  336. trunnel_assert(ptr + remaining == input + len_in);
  337. return len_in - remaining;
  338. truncated:
  339. return -2;
  340. trunnel_alloc_failed:
  341. return -1;
  342. fail:
  343. result = -1;
  344. return result;
  345. }
  346. ssize_t
  347. ed25519_cert_extension_parse(ed25519_cert_extension_t **output, const uint8_t *input, const size_t len_in)
  348. {
  349. ssize_t result;
  350. *output = ed25519_cert_extension_new();
  351. if (NULL == *output)
  352. return -1;
  353. result = ed25519_cert_extension_parse_into(*output, input, len_in);
  354. if (result < 0) {
  355. ed25519_cert_extension_free(*output);
  356. *output = NULL;
  357. }
  358. return result;
  359. }
  360. ed25519_cert_t *
  361. ed25519_cert_new(void)
  362. {
  363. ed25519_cert_t *val = trunnel_calloc(1, sizeof(ed25519_cert_t));
  364. if (NULL == val)
  365. return NULL;
  366. val->version = 1;
  367. return val;
  368. }
  369. /** Release all storage held inside 'obj', but do not free 'obj'.
  370. */
  371. static void
  372. ed25519_cert_clear(ed25519_cert_t *obj)
  373. {
  374. (void) obj;
  375. {
  376. unsigned idx;
  377. for (idx = 0; idx < TRUNNEL_DYNARRAY_LEN(&obj->ext); ++idx) {
  378. ed25519_cert_extension_free(TRUNNEL_DYNARRAY_GET(&obj->ext, idx));
  379. }
  380. }
  381. TRUNNEL_DYNARRAY_WIPE(&obj->ext);
  382. TRUNNEL_DYNARRAY_CLEAR(&obj->ext);
  383. }
  384. void
  385. ed25519_cert_free(ed25519_cert_t *obj)
  386. {
  387. if (obj == NULL)
  388. return;
  389. ed25519_cert_clear(obj);
  390. trunnel_memwipe(obj, sizeof(ed25519_cert_t));
  391. trunnel_free_(obj);
  392. }
  393. uint8_t
  394. ed25519_cert_get_version(ed25519_cert_t *inp)
  395. {
  396. return inp->version;
  397. }
  398. int
  399. ed25519_cert_set_version(ed25519_cert_t *inp, uint8_t val)
  400. {
  401. if (! ((val == 1))) {
  402. TRUNNEL_SET_ERROR_CODE(inp);
  403. return -1;
  404. }
  405. inp->version = val;
  406. return 0;
  407. }
  408. uint8_t
  409. ed25519_cert_get_cert_type(ed25519_cert_t *inp)
  410. {
  411. return inp->cert_type;
  412. }
  413. int
  414. ed25519_cert_set_cert_type(ed25519_cert_t *inp, uint8_t val)
  415. {
  416. inp->cert_type = val;
  417. return 0;
  418. }
  419. uint32_t
  420. ed25519_cert_get_exp_field(ed25519_cert_t *inp)
  421. {
  422. return inp->exp_field;
  423. }
  424. int
  425. ed25519_cert_set_exp_field(ed25519_cert_t *inp, uint32_t val)
  426. {
  427. inp->exp_field = val;
  428. return 0;
  429. }
  430. uint8_t
  431. ed25519_cert_get_cert_key_type(ed25519_cert_t *inp)
  432. {
  433. return inp->cert_key_type;
  434. }
  435. int
  436. ed25519_cert_set_cert_key_type(ed25519_cert_t *inp, uint8_t val)
  437. {
  438. inp->cert_key_type = val;
  439. return 0;
  440. }
  441. size_t
  442. ed25519_cert_getlen_certified_key(const ed25519_cert_t *inp)
  443. {
  444. (void)inp; return 32;
  445. }
  446. uint8_t
  447. ed25519_cert_get_certified_key(const ed25519_cert_t *inp, size_t idx)
  448. {
  449. trunnel_assert(idx < 32);
  450. return inp->certified_key[idx];
  451. }
  452. int
  453. ed25519_cert_set_certified_key(ed25519_cert_t *inp, size_t idx, uint8_t elt)
  454. {
  455. trunnel_assert(idx < 32);
  456. inp->certified_key[idx] = elt;
  457. return 0;
  458. }
  459. uint8_t *
  460. ed25519_cert_getarray_certified_key(ed25519_cert_t *inp)
  461. {
  462. return inp->certified_key;
  463. }
  464. uint8_t
  465. ed25519_cert_get_n_extensions(ed25519_cert_t *inp)
  466. {
  467. return inp->n_extensions;
  468. }
  469. int
  470. ed25519_cert_set_n_extensions(ed25519_cert_t *inp, uint8_t val)
  471. {
  472. inp->n_extensions = val;
  473. return 0;
  474. }
  475. size_t
  476. ed25519_cert_getlen_ext(const ed25519_cert_t *inp)
  477. {
  478. return TRUNNEL_DYNARRAY_LEN(&inp->ext);
  479. }
  480. struct ed25519_cert_extension_st *
  481. ed25519_cert_get_ext(ed25519_cert_t *inp, size_t idx)
  482. {
  483. return TRUNNEL_DYNARRAY_GET(&inp->ext, idx);
  484. }
  485. int
  486. ed25519_cert_set_ext(ed25519_cert_t *inp, size_t idx, struct ed25519_cert_extension_st * elt)
  487. {
  488. ed25519_cert_extension_t *oldval = TRUNNEL_DYNARRAY_GET(&inp->ext, idx);
  489. if (oldval && oldval != elt)
  490. ed25519_cert_extension_free(oldval);
  491. return ed25519_cert_set0_ext(inp, idx, elt);
  492. }
  493. int
  494. ed25519_cert_set0_ext(ed25519_cert_t *inp, size_t idx, struct ed25519_cert_extension_st * elt)
  495. {
  496. TRUNNEL_DYNARRAY_SET(&inp->ext, idx, elt);
  497. return 0;
  498. }
  499. int
  500. ed25519_cert_add_ext(ed25519_cert_t *inp, struct ed25519_cert_extension_st * elt)
  501. {
  502. #if SIZE_MAX >= UINT8_MAX
  503. if (inp->ext.n_ == UINT8_MAX)
  504. goto trunnel_alloc_failed;
  505. #endif
  506. TRUNNEL_DYNARRAY_ADD(struct ed25519_cert_extension_st *, &inp->ext, elt, {});
  507. return 0;
  508. trunnel_alloc_failed:
  509. TRUNNEL_SET_ERROR_CODE(inp);
  510. return -1;
  511. }
  512. struct ed25519_cert_extension_st * *
  513. ed25519_cert_getarray_ext(ed25519_cert_t *inp)
  514. {
  515. return inp->ext.elts_;
  516. }
  517. int
  518. ed25519_cert_setlen_ext(ed25519_cert_t *inp, size_t newlen)
  519. {
  520. struct ed25519_cert_extension_st * *newptr;
  521. #if UINT8_MAX < SIZE_MAX
  522. if (newlen > UINT8_MAX)
  523. goto trunnel_alloc_failed;
  524. #endif
  525. newptr = trunnel_dynarray_setlen(&inp->ext.allocated_,
  526. &inp->ext.n_, inp->ext.elts_, newlen,
  527. sizeof(inp->ext.elts_[0]), (trunnel_free_fn_t) ed25519_cert_extension_free,
  528. &inp->trunnel_error_code_);
  529. if (newlen != 0 && newptr == NULL)
  530. goto trunnel_alloc_failed;
  531. inp->ext.elts_ = newptr;
  532. return 0;
  533. trunnel_alloc_failed:
  534. TRUNNEL_SET_ERROR_CODE(inp);
  535. return -1;
  536. }
  537. size_t
  538. ed25519_cert_getlen_signature(const ed25519_cert_t *inp)
  539. {
  540. (void)inp; return 64;
  541. }
  542. uint8_t
  543. ed25519_cert_get_signature(const ed25519_cert_t *inp, size_t idx)
  544. {
  545. trunnel_assert(idx < 64);
  546. return inp->signature[idx];
  547. }
  548. int
  549. ed25519_cert_set_signature(ed25519_cert_t *inp, size_t idx, uint8_t elt)
  550. {
  551. trunnel_assert(idx < 64);
  552. inp->signature[idx] = elt;
  553. return 0;
  554. }
  555. uint8_t *
  556. ed25519_cert_getarray_signature(ed25519_cert_t *inp)
  557. {
  558. return inp->signature;
  559. }
  560. const char *
  561. ed25519_cert_check(const ed25519_cert_t *obj)
  562. {
  563. if (obj == NULL)
  564. return "Object was NULL";
  565. if (obj->trunnel_error_code_)
  566. return "A set function failed on this object";
  567. if (! (obj->version == 1))
  568. return "Integer out of bounds";
  569. {
  570. const char *msg;
  571. unsigned idx;
  572. for (idx = 0; idx < TRUNNEL_DYNARRAY_LEN(&obj->ext); ++idx) {
  573. if (NULL != (msg = ed25519_cert_extension_check(TRUNNEL_DYNARRAY_GET(&obj->ext, idx))))
  574. return msg;
  575. }
  576. }
  577. if (TRUNNEL_DYNARRAY_LEN(&obj->ext) != obj->n_extensions)
  578. return "Length mismatch for ext";
  579. return NULL;
  580. }
  581. ssize_t
  582. ed25519_cert_encoded_len(const ed25519_cert_t *obj)
  583. {
  584. ssize_t result = 0;
  585. if (NULL != ed25519_cert_check(obj))
  586. return -1;
  587. /* Length of u8 version IN [1] */
  588. result += 1;
  589. /* Length of u8 cert_type */
  590. result += 1;
  591. /* Length of u32 exp_field */
  592. result += 4;
  593. /* Length of u8 cert_key_type */
  594. result += 1;
  595. /* Length of u8 certified_key[32] */
  596. result += 32;
  597. /* Length of u8 n_extensions */
  598. result += 1;
  599. /* Length of struct ed25519_cert_extension ext[n_extensions] */
  600. {
  601. unsigned idx;
  602. for (idx = 0; idx < TRUNNEL_DYNARRAY_LEN(&obj->ext); ++idx) {
  603. result += ed25519_cert_extension_encoded_len(TRUNNEL_DYNARRAY_GET(&obj->ext, idx));
  604. }
  605. }
  606. /* Length of u8 signature[64] */
  607. result += 64;
  608. return result;
  609. }
  610. int
  611. ed25519_cert_clear_errors(ed25519_cert_t *obj)
  612. {
  613. int r = obj->trunnel_error_code_;
  614. obj->trunnel_error_code_ = 0;
  615. return r;
  616. }
  617. ssize_t
  618. ed25519_cert_encode(uint8_t *output, const size_t avail, const ed25519_cert_t *obj)
  619. {
  620. ssize_t result = 0;
  621. size_t written = 0;
  622. uint8_t *ptr = output;
  623. const char *msg;
  624. #ifdef TRUNNEL_CHECK_ENCODED_LEN
  625. const ssize_t encoded_len = ed25519_cert_encoded_len(obj);
  626. #endif
  627. if (NULL != (msg = ed25519_cert_check(obj)))
  628. goto check_failed;
  629. #ifdef TRUNNEL_CHECK_ENCODED_LEN
  630. trunnel_assert(encoded_len >= 0);
  631. #endif
  632. /* Encode u8 version IN [1] */
  633. trunnel_assert(written <= avail);
  634. if (avail - written < 1)
  635. goto truncated;
  636. trunnel_set_uint8(ptr, (obj->version));
  637. written += 1; ptr += 1;
  638. /* Encode u8 cert_type */
  639. trunnel_assert(written <= avail);
  640. if (avail - written < 1)
  641. goto truncated;
  642. trunnel_set_uint8(ptr, (obj->cert_type));
  643. written += 1; ptr += 1;
  644. /* Encode u32 exp_field */
  645. trunnel_assert(written <= avail);
  646. if (avail - written < 4)
  647. goto truncated;
  648. trunnel_set_uint32(ptr, trunnel_htonl(obj->exp_field));
  649. written += 4; ptr += 4;
  650. /* Encode u8 cert_key_type */
  651. trunnel_assert(written <= avail);
  652. if (avail - written < 1)
  653. goto truncated;
  654. trunnel_set_uint8(ptr, (obj->cert_key_type));
  655. written += 1; ptr += 1;
  656. /* Encode u8 certified_key[32] */
  657. trunnel_assert(written <= avail);
  658. if (avail - written < 32)
  659. goto truncated;
  660. memcpy(ptr, obj->certified_key, 32);
  661. written += 32; ptr += 32;
  662. /* Encode u8 n_extensions */
  663. trunnel_assert(written <= avail);
  664. if (avail - written < 1)
  665. goto truncated;
  666. trunnel_set_uint8(ptr, (obj->n_extensions));
  667. written += 1; ptr += 1;
  668. /* Encode struct ed25519_cert_extension ext[n_extensions] */
  669. {
  670. unsigned idx;
  671. for (idx = 0; idx < TRUNNEL_DYNARRAY_LEN(&obj->ext); ++idx) {
  672. trunnel_assert(written <= avail);
  673. result = ed25519_cert_extension_encode(ptr, avail - written, TRUNNEL_DYNARRAY_GET(&obj->ext, idx));
  674. if (result < 0)
  675. goto fail; /* XXXXXXX !*/
  676. written += result; ptr += result;
  677. }
  678. }
  679. /* Encode u8 signature[64] */
  680. trunnel_assert(written <= avail);
  681. if (avail - written < 64)
  682. goto truncated;
  683. memcpy(ptr, obj->signature, 64);
  684. written += 64; ptr += 64;
  685. trunnel_assert(ptr == output + written);
  686. #ifdef TRUNNEL_CHECK_ENCODED_LEN
  687. {
  688. trunnel_assert(encoded_len >= 0);
  689. trunnel_assert((size_t)encoded_len == written);
  690. }
  691. #endif
  692. return written;
  693. truncated:
  694. result = -2;
  695. goto fail;
  696. check_failed:
  697. (void)msg;
  698. result = -1;
  699. goto fail;
  700. fail:
  701. trunnel_assert(result < 0);
  702. return result;
  703. }
  704. /** As ed25519_cert_parse(), but do not allocate the output object.
  705. */
  706. static ssize_t
  707. ed25519_cert_parse_into(ed25519_cert_t *obj, const uint8_t *input, const size_t len_in)
  708. {
  709. const uint8_t *ptr = input;
  710. size_t remaining = len_in;
  711. ssize_t result = 0;
  712. (void)result;
  713. /* Parse u8 version IN [1] */
  714. CHECK_REMAINING(1, truncated);
  715. obj->version = (trunnel_get_uint8(ptr));
  716. remaining -= 1; ptr += 1;
  717. if (! (obj->version == 1))
  718. goto fail;
  719. /* Parse u8 cert_type */
  720. CHECK_REMAINING(1, truncated);
  721. obj->cert_type = (trunnel_get_uint8(ptr));
  722. remaining -= 1; ptr += 1;
  723. /* Parse u32 exp_field */
  724. CHECK_REMAINING(4, truncated);
  725. obj->exp_field = trunnel_ntohl(trunnel_get_uint32(ptr));
  726. remaining -= 4; ptr += 4;
  727. /* Parse u8 cert_key_type */
  728. CHECK_REMAINING(1, truncated);
  729. obj->cert_key_type = (trunnel_get_uint8(ptr));
  730. remaining -= 1; ptr += 1;
  731. /* Parse u8 certified_key[32] */
  732. CHECK_REMAINING(32, truncated);
  733. memcpy(obj->certified_key, ptr, 32);
  734. remaining -= 32; ptr += 32;
  735. /* Parse u8 n_extensions */
  736. CHECK_REMAINING(1, truncated);
  737. obj->n_extensions = (trunnel_get_uint8(ptr));
  738. remaining -= 1; ptr += 1;
  739. /* Parse struct ed25519_cert_extension ext[n_extensions] */
  740. TRUNNEL_DYNARRAY_EXPAND(ed25519_cert_extension_t *, &obj->ext, obj->n_extensions, {});
  741. {
  742. ed25519_cert_extension_t * elt;
  743. unsigned idx;
  744. for (idx = 0; idx < obj->n_extensions; ++idx) {
  745. result = ed25519_cert_extension_parse(&elt, ptr, remaining);
  746. if (result < 0)
  747. goto relay_fail;
  748. trunnel_assert((size_t)result <= remaining);
  749. remaining -= result; ptr += result;
  750. TRUNNEL_DYNARRAY_ADD(ed25519_cert_extension_t *, &obj->ext, elt, {ed25519_cert_extension_free(elt);});
  751. }
  752. }
  753. /* Parse u8 signature[64] */
  754. CHECK_REMAINING(64, truncated);
  755. memcpy(obj->signature, ptr, 64);
  756. remaining -= 64; ptr += 64;
  757. trunnel_assert(ptr + remaining == input + len_in);
  758. return len_in - remaining;
  759. truncated:
  760. return -2;
  761. relay_fail:
  762. trunnel_assert(result < 0);
  763. return result;
  764. trunnel_alloc_failed:
  765. return -1;
  766. fail:
  767. result = -1;
  768. return result;
  769. }
  770. ssize_t
  771. ed25519_cert_parse(ed25519_cert_t **output, const uint8_t *input, const size_t len_in)
  772. {
  773. ssize_t result;
  774. *output = ed25519_cert_new();
  775. if (NULL == *output)
  776. return -1;
  777. result = ed25519_cert_parse_into(*output, input, len_in);
  778. if (result < 0) {
  779. ed25519_cert_free(*output);
  780. *output = NULL;
  781. }
  782. return result;
  783. }