ViewVC Help
View File | Revision Log | Show Annotations | Download File
/cvs/Convert-BER-XS/XS.xs
(Generate patch)

Comparing Convert-BER-XS/XS.xs (file contents):
Revision 1.19 by root, Sat Apr 20 16:34:34 2019 UTC vs.
Revision 1.23 by root, Sun Apr 21 01:51:12 2019 UTC

58 ASN_CLASS_SHIFT = 6, 58 ASN_CLASS_SHIFT = 6,
59 59
60 // ASN_APPLICATION SNMP 60 // ASN_APPLICATION SNMP
61 SNMP_IPADDRESS = 0x00, 61 SNMP_IPADDRESS = 0x00,
62 SNMP_COUNTER32 = 0x01, 62 SNMP_COUNTER32 = 0x01,
63 SNMP_GAUGE32 = 0x02,
63 SNMP_UNSIGNED32 = 0x02, 64 SNMP_UNSIGNED32 = 0x02,
64 SNMP_TIMETICKS = 0x03, 65 SNMP_TIMETICKS = 0x03,
65 SNMP_OPAQUE = 0x04, 66 SNMP_OPAQUE = 0x04,
66 SNMP_COUNTER64 = 0x06, 67 SNMP_COUNTER64 = 0x06,
67}; 68};
252// get ber-encoded integer (i.e. pack "w") 253// get ber-encoded integer (i.e. pack "w")
253static UV 254static UV
254get_w (void) 255get_w (void)
255{ 256{
256 UV res = 0; 257 UV res = 0;
258 U8 c = get_u8 ();
259
260 if (expect_false (c == 0x80))
261 error ("illegal BER padding (X.690 8.1.2.4.2, 8.19.2)");
257 262
258 for (;;) 263 for (;;)
259 { 264 {
260 U8 c = get_u8 (); 265 if (expect_false (res >> UVSIZE * 8 - 7))
266 error ("BER variable integer overflow");
267
261 res = (res << 7) | (c & 0x7f); 268 res = (res << 7) | (c & 0x7f);
262 269
263 if (!(c & 0x80)) 270 if (!(c & 0x80))
264 return res; 271 return res;
265 }
266}
267 272
268// get_w, but disallow padding 273 c = get_u8 ();
269static UV 274 }
270get_w_nopad (void)
271{
272 U8 first = get_u8 ();
273
274 if (first == 0x80)
275 error ("illegal BER padding");
276
277 --cur;
278
279 return get_w ();
280} 275}
281 276
282static UV 277static UV
283get_length (void) 278get_length (void)
284{ 279{
291 286
292 switch (cnt) 287 switch (cnt)
293 { 288 {
294 case 0: 289 case 0:
295 error ("indefinite ASN.1 lengths not supported"); 290 error ("indefinite ASN.1 lengths not supported");
296 return 0;
297 291
298 //case 0x80: // indefinite length 292 case 0x7f:
293 error ("ASN.1 reserved value in length (X.690 8.1.3.5)");
299 294
300 //case 0xff: reserved
301 default: 295 default:
302 error ("ASN.1 length too long"); 296 error ("ASN.1 length too long (only up to 2**64 octets supported)");
303 return 0;
304 297
305 case 8: res = (res << 8) | get_u8 (); 298 case 8: res = (res << 8) | get_u8 ();
306 case 7: res = (res << 8) | get_u8 (); 299 case 7: res = (res << 8) | get_u8 ();
307 case 6: res = (res << 8) | get_u8 (); 300 case 6: res = (res << 8) | get_u8 ();
308 case 5: res = (res << 8) | get_u8 (); 301 case 5: res = (res << 8) | get_u8 ();
320decode_int (void) 313decode_int (void)
321{ 314{
322 UV len = get_length (); 315 UV len = get_length ();
323 316
324 if (!len) 317 if (!len)
325 {
326 error ("invalid integer length equal to zero"); 318 error ("invalid integer length equal to zero (X.690 8.3.1)");
327 return 0;
328 }
329 319
330 U8 *data = get_n (len); 320 U8 *data = get_n (len);
331 321
322 if (expect_false (len > 1))
323 {
324 U16 mask = (data [0] << 8) | data [1] & 0xff80;
325
326 if (expect_false (mask == 0xff80 || mask == 0x0000))
327 error ("illegal padding in integer (X.690 8.3.2)");
328 }
329
332 int negative = data [0] & 0x80; 330 int negative = data [0] & 0x80;
333 331
334 UV val = negative ? -1 : 0; // copy signbit to all bits 332 UV val = negative ? -1 : 0; // copy signbit to all bits
333
334 if (len > UVSIZE + (!negative && !*data))
335 //printf ("len %d > %d + (!%d && !%d) = %d\n", len, UVSIZE, negative, *data, UVSIZE + (!negative && !*data));//D
336 error ("INTEGER overflow");
335 337
336 do 338 do
337 val = (val << 8) | *data++; 339 val = (val << 8) | *data++;
338 while (--len); 340 while (--len);
339 341
392 error ("OBJECT IDENTIFIER length equal to zero"); 394 error ("OBJECT IDENTIFIER length equal to zero");
393 return &PL_sv_undef; 395 return &PL_sv_undef;
394 } 396 }
395 397
396 U8 *end = cur + len; 398 U8 *end = cur + len;
397 UV w = get_w_nopad (); 399 UV w = get_w ();
398 400
399 static char oid[MAX_OID_STRLEN]; // static, becaueds too large for stack 401 static char oid[MAX_OID_STRLEN]; // static, because too large for stack
400 char *app = oid; 402 char *app = oid;
401 403
402 if (relative) 404 if (relative)
403 app = write_uv (app, w); 405 app = write_uv (app, w);
404 else if (w < 2 * 40) 406 else if (w < 2 * 40)
418 { 420 {
419 // we assume an oid component is never > 64 digits 421 // we assume an oid component is never > 64 digits
420 if (oid + sizeof (oid) - app < 64) 422 if (oid + sizeof (oid) - app < 64)
421 croak ("BER_TYPE_OID to long to decode"); 423 croak ("BER_TYPE_OID to long to decode");
422 424
423 w = get_w_nopad (); 425 w = get_w ();
424 *app++ = '.'; 426 *app++ = '.';
425 app = write_uv (app, w); 427 app = write_uv (app, w);
426 } 428 }
427 429
428 return newSVpvn (oid, app - oid); 430 return newSVpvn (oid, app - oid);
476 int tag = identifier & ASN_TAG_MASK; 478 int tag = identifier & ASN_TAG_MASK;
477 479
478 if (tag == ASN_TAG_BER) 480 if (tag == ASN_TAG_BER)
479 tag = get_w (); 481 tag = get_w ();
480 482
481 if (tag == ASN_TAG_BER)
482 tag = get_w ();
483
484 if (constructed) 483 if (constructed)
485 { 484 {
486 UV len = get_length (); 485 UV len = get_length ();
487 UV seqend = (cur - buf) + len; 486 UV seqend = (cur - buf) + len;
488 AV *av = (AV *)sv_2mortal ((SV *)newAV ()); 487 AV *av = (AV *)sv_2mortal ((SV *)newAV ());
489 488
490 while (cur < buf + seqend) 489 while (cur < buf + seqend)
491 av_push (av, decode_ber ()); 490 av_push (av, decode_ber ());
492 491
493 if (cur > buf + seqend) 492 if (cur > buf + seqend)
494 croak ("constructed type %02x overflow (%x %x)\n", identifier, cur - buf, seqend); 493 croak ("constructed type %02x length overflow (0x%x 0x%x)\n", identifier, (int)(cur - buf), (int)seqend);
495 494
496 res = newRV_inc ((SV *)av); 495 res = newRV_inc ((SV *)av);
497 } 496 }
498 else 497 else
499 switch (profile_lookup (cur_profile, klass, tag)) 498 switch (profile_lookup (cur_profile, klass, tag))
501 case BER_TYPE_NULL: 500 case BER_TYPE_NULL:
502 { 501 {
503 UV len = get_length (); 502 UV len = get_length ();
504 503
505 if (len) 504 if (len)
506 croak ("BER_TYPE_NULL value with non-zero length %d encountered", len); 505 croak ("BER_TYPE_NULL value with non-zero length %d encountered (X.690 8.8.2)", len);
507 506
508 res = &PL_sv_undef; 507 res = &PL_sv_undef;
509 } 508 }
510 break; 509 break;
511 510
512 case BER_TYPE_BOOL: 511 case BER_TYPE_BOOL:
513 { 512 {
514 UV len = get_length (); 513 UV len = get_length ();
515 514
516 if (len != 1) 515 if (len != 1)
517 croak ("BER_TYPE_BOOLEAN value with invalid length %d encountered", len); 516 croak ("BER_TYPE_BOOLEAN value with invalid length %d encountered (X.690 8.2.1)", len);
518 517
519 res = newSVcacheint (!!get_u8 ()); 518 res = newSVcacheint (!!get_u8 ());
520 } 519 }
521 break; 520 break;
522 521
544 case BER_TYPE_IPADDRESS: 543 case BER_TYPE_IPADDRESS:
545 { 544 {
546 UV len = get_length (); 545 UV len = get_length ();
547 546
548 if (len != 4) 547 if (len != 4)
549 croak ("BER_TYPE_IPADDRESS type with invalid length %d encountered", len); 548 croak ("BER_TYPE_IPADDRESS type with invalid length %d encountered (RFC 2578 7.1.5)", len);
550 549
551 U8 c1 = get_u8 (); 550 U8 c1 = get_u8 ();
552 U8 c2 = get_u8 (); 551 U8 c2 = get_u8 ();
553 U8 c3 = get_u8 (); 552 U8 c3 = get_u8 ();
554 U8 c4 = get_u8 (); 553 U8 c4 = get_u8 ();
589strlen_sum (STRLEN l1, STRLEN l2) 588strlen_sum (STRLEN l1, STRLEN l2)
590{ 589{
591 size_t sum = l1 + l2; 590 size_t sum = l1 + l2;
592 591
593 if (sum < (size_t)l2 || sum != (size_t)(STRLEN)sum) 592 if (sum < (size_t)l2 || sum != (size_t)(STRLEN)sum)
594 croak ("JSON::XS: string size overflow"); 593 croak ("Convert::BER::XS: string size overflow");
595 594
596 return sum; 595 return sum;
597} 596}
598 597
599static void 598static void
1078 const_iv (BER_TYPE_IPADDRESS) 1077 const_iv (BER_TYPE_IPADDRESS)
1079 const_iv (BER_TYPE_CROAK) 1078 const_iv (BER_TYPE_CROAK)
1080 1079
1081 const_iv (SNMP_IPADDRESS) 1080 const_iv (SNMP_IPADDRESS)
1082 const_iv (SNMP_COUNTER32) 1081 const_iv (SNMP_COUNTER32)
1082 const_iv (SNMP_GAUGE32)
1083 const_iv (SNMP_UNSIGNED32) 1083 const_iv (SNMP_UNSIGNED32)
1084 const_iv (SNMP_TIMETICKS) 1084 const_iv (SNMP_TIMETICKS)
1085 const_iv (SNMP_OPAQUE) 1085 const_iv (SNMP_OPAQUE)
1086 const_iv (SNMP_COUNTER64) 1086 const_iv (SNMP_COUNTER64)
1087 }; 1087 };
1088 1088
1089 for (civ = const_iv + sizeof (const_iv) / sizeof (const_iv [0]); civ > const_iv; civ--) 1089 for (civ = const_iv + sizeof (const_iv) / sizeof (const_iv [0]); civ > const_iv; civ--)
1090 newCONSTSUB (stash, (char *)civ[-1].name, newSViv (civ[-1].iv)); 1090 newCONSTSUB (stash, (char *)civ[-1].name, newSViv (civ[-1].iv));
1091} 1091}
1092 1092
1093SV * 1093void
1094ber_decode (SV *ber, SV *profile = &PL_sv_undef) 1094ber_decode (SV *ber, SV *profile = &PL_sv_undef)
1095 ALIAS:
1096 ber_decode_prefix = 1
1095 CODE: 1097 PPCODE:
1096{ 1098{
1097 cur_profile = SvPROFILE (profile); 1099 cur_profile = SvPROFILE (profile);
1098 STRLEN len; 1100 STRLEN len;
1099 buf = (U8 *)SvPVbyte (ber, len); 1101 buf = (U8 *)SvPVbyte (ber, len);
1100 cur = buf; 1102 cur = buf;
1101 end = buf + len; 1103 end = buf + len;
1102 1104
1103 RETVAL = decode_ber (); 1105 SV *tuple = decode_ber ();
1106
1107 EXTEND (SP, 2);
1108 PUSHs (sv_2mortal (tuple));
1109
1110 if (ix)
1111 PUSHs (sv_2mortal (newSViv (cur - buf)));
1112 else if (cur != end)
1113 error ("trailing garbage after BER data");
1104} 1114}
1105 OUTPUT: RETVAL
1106 1115
1107void 1116void
1108ber_is (SV *tuple, SV *klass = &PL_sv_undef, SV *tag = &PL_sv_undef, SV *flags = &PL_sv_undef, SV *data = &PL_sv_undef) 1117ber_is (SV *tuple, SV *klass = &PL_sv_undef, SV *tag = &PL_sv_undef, SV *flags = &PL_sv_undef, SV *data = &PL_sv_undef)
1109 PPCODE: 1118 PPCODE:
1110{ 1119{

Diff Legend

Removed lines
+ Added lines
< Changed lines
> Changed lines