blob: 08efa4fab2447ed9c6627f85f7c245b6ddaa6a6a [file] [log] [blame]
/*
* Abstract Syntax Notation One, ASN.1
* As defined in ISO/IS 8824 and ISO/IS 8825
* This implements a subset of the above International Standards that
* is sufficient to implement SNMP.
*
* Encodes abstract data types into a machine independent stream of bytes.
*
*/
/**********************************************************************
Copyright 1988, 1989, 1991, 1992 by Carnegie Mellon University
All Rights Reserved
Permission to use, copy, modify, and distribute this software and its
documentation for any purpose and without fee is hereby granted,
provided that the above copyright notice appear in all copies and that
both that copyright notice and this permission notice appear in
supporting documentation, and that the name of CMU not be
used in advertising or publicity pertaining to distribution of the
software without specific, written prior permission.
CMU DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING
ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL
CMU BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS,
WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION,
ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
SOFTWARE.
******************************************************************/
/**
* @defgroup asn1_packet_parse asn1 parsing and datatype manipulation routines.
* @ingroup library
*
* @{
*
* Note on
*
* Re-allocating reverse ASN.1 encoder functions. Synopsis:
*
* \code
*
* u_char *buf = (u_char*)malloc(100);
* u_char type = (ASN_UNIVERSAL | ASN_PRIMITIVE | ASN_INTEGER);
* size_t buf_len = 100, offset = 0;
* long data = 12345;
* int allow_realloc = 1;
*
* if (asn_realloc_rbuild_int(&buf, &buf_len, &offset, allow_realloc,
* type, &data, sizeof(long)) == 0) {
* error;
* }
*
* \endcode
*
* NOTE WELL: after calling one of these functions with allow_realloc
* non-zero, buf might have moved, buf_len might have grown and
* offset will have increased by the size of the encoded data.
* You should **NEVER** do something like this:
*
* \code
*
* u_char *buf = (u_char *)malloc(100), *ptr;
* u_char type = (ASN_UNIVERSAL | ASN_PRIMITIVE | ASN_INTEGER);
* size_t buf_len = 100, offset = 0;
* long data1 = 1234, data2 = 5678;
* int rc = 0, allow_realloc = 1;
*
* rc = asn_realloc_rbuild_int(&buf, &buf_len, &offset, allow_realloc,
* type, &data1, sizeof(long));
* ptr = buf[buf_len - offset]; / * points at encoding of data1 * /
* if (rc == 0) {
* error;
* }
* rc = asn_realloc_rbuild_int(&buf, &buf_len, &offset, allow_realloc,
* type, &data2, sizeof(long));
* make use of ptr here;
*
* \endcode
*
* ptr is **INVALID** at this point. In general, you should store the
* offset value and compute pointers when you need them:
*
*
* \code
*
* u_char *buf = (u_char *)malloc(100), *ptr;
* u_char type = (ASN_UNIVERSAL | ASN_PRIMITIVE | ASN_INTEGER);
* size_t buf_len = 100, offset = 0, ptr_offset;
* long data1 = 1234, data2 = 5678;
* int rc = 0, allow_realloc = 1;
*
* rc = asn_realloc_rbuild_int(&buf, &buf_len, &offset, allow_realloc,
* type, &data1, sizeof(long));
* ptr_offset = offset;
* if (rc == 0) {
* error;
* }
* rc = asn_realloc_rbuild_int(&buf, &buf_len, &offset, allow_realloc,
* type, &data2, sizeof(long));
* ptr = buf + buf_len - ptr_offset
* make use of ptr here;
*
* \endcode
*
*
* Here, you can see that ptr will be a valid pointer even if the block of
* memory has been moved, as it may well have been. Plenty of examples of
* usage all over asn1.c, snmp_api.c, snmpusm.c.
*
* The other thing you should **NEVER** do is to pass a pointer to a buffer
* on the stack as the first argument when allow_realloc is non-zero, unless
* you really know what you are doing and your machine/compiler allows you to
* free non-heap memory. There are rumours that such things exist, but many
* consider them no more than the wild tales of a fool.
*
* Of course, you can pass allow_realloc as zero, to indicate that you do not
* wish the packet buffer to be reallocated for some reason; perhaps because
* it is on the stack. This may be useful to emulate the functionality of
* the old API:
*
* \code
*
* u_char my_static_buffer[100], *cp = NULL;
* size_t my_static_buffer_len = 100;
* float my_pi = (float)22/(float)7;
*
* cp = asn_rbuild_float(my_static_buffer, &my_static_buffer_len,
* ASN_OPAQUE_FLOAT, &my_pi, sizeof(float));
* if (cp == NULL) {
* error;
* }
*
* \endcode
*
* IS EQUIVALENT TO:
*
* \code
*
* u_char my_static_buffer[100];
* size_t my_static_buffer_len = 100, my_offset = 0;
* float my_pi = (float)22/(float)7;
* int rc = 0;
*
* rc = asn_realloc_rbuild_float(&my_static_buffer, &my_static_buffer_len,
* &my_offset, 0,
* ASN_OPAQUE_FLOAT, &my_pi, sizeof(float));
* if (rc == 0) {
* error;
* }
* \endcode
*
*/
#include <net-snmp/net-snmp-config.h>
#ifdef KINETICS
#include "gw.h"
#endif
#if HAVE_STRING_H
#include <string.h>
#else
#include <strings.h>
#endif
#include <sys/types.h>
#include <stdio.h>
#ifdef HAVE_STDLIB_H
#include <stdlib.h>
#endif
#if HAVE_NETINET_IN_H
#include <netinet/in.h>
#endif
#ifdef vms
#include <in.h>
#endif
#if HAVE_DMALLOC_H
#include <dmalloc.h>
#endif
#include <net-snmp/output_api.h>
#include <net-snmp/utilities.h>
#include <net-snmp/library/asn1.h>
#include <net-snmp/library/int64.h>
#include <net-snmp/library/mib.h>
#ifndef NULL
#define NULL 0
#endif
#include <net-snmp/library/snmp_api.h>
#ifndef INT32_MAX
# define INT32_MAX 2147483647
#endif
#ifndef INT32_MIN
# define INT32_MIN (0 - INT32_MAX - 1)
#endif
#if SIZEOF_LONG == 4
# define CHECK_OVERFLOW_S(x,y)
# define CHECK_OVERFLOW_U(x,y)
#else
# define CHECK_OVERFLOW_S(x,y) do { \
if (x > INT32_MAX) { \
DEBUGMSG(("asn","truncating signed value %ld to 32 bits (%d)\n",(long)(x),y)); \
x &= 0xffffffff; \
} else if (x < INT32_MIN) { \
DEBUGMSG(("asn","truncating signed value %ld to 32 bits (%d)\n",(long)(x),y)); \
x = 0 - (x & 0xffffffff); \
} \
} while(0)
# define CHECK_OVERFLOW_U(x,y) do { \
if (x > UINT32_MAX) { \
x &= 0xffffffff; \
DEBUGMSG(("asn","truncating unsigned value to 32 bits (%d)\n",y)); \
} \
} while(0)
#endif
/**
* @internal
* output an error for a wrong size
*
* @param str error string
* @param wrongsize wrong size
* @param rightsize expected size
*/
static
void
_asn_size_err(const char *str, size_t wrongsize, size_t rightsize)
{
char ebuf[128];
snprintf(ebuf, sizeof(ebuf),
"%s size %lu: s/b %lu", str,
(unsigned long)wrongsize, (unsigned long)rightsize);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
}
/**
* @internal
* output an error for a wrong type
*
* @param str error string
* @param wrongtype wrong type
*/
static
void
_asn_type_err(const char *str, int wrongtype)
{
char ebuf[128];
snprintf(ebuf, sizeof(ebuf), "%s type %d", str, wrongtype);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
}
/**
* @internal
* output an error for a wrong length
*
* @param str error string
* @param wrongsize wrong length
* @param rightsize expected length
*/
static
void
_asn_length_err(const char *str, size_t wrongsize, size_t rightsize)
{
char ebuf[128];
snprintf(ebuf, sizeof(ebuf),
"%s length %lu too large: exceeds %lu", str,
(unsigned long)wrongsize, (unsigned long)rightsize);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
}
/**
* @internal
* call after asn_parse_length to verify result.
*
* @param str error string
* @param bufp start of buffer
* @param data start of data
* @param plen ?
* @param dlen ?
*
* @return 1 on error 0 on success
*/
static
int
_asn_parse_length_check(const char *str,
const u_char * bufp, const u_char * data,
u_long plen, size_t dlen)
{
char ebuf[128];
size_t header_len;
if (bufp == NULL) {
/*
* error message is set
*/
return 1;
}
header_len = bufp - data;
if (plen > 0x7fffffff || header_len > 0x7fffffff ||
((size_t) plen + header_len) > dlen) {
snprintf(ebuf, sizeof(ebuf),
"%s: message overflow: %d len + %d delta > %d len",
str, (int) plen, (int) header_len, (int) dlen);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 1;
}
return 0;
}
/**
* @internal
* call after asn_build_header to verify result.
*
* @param str error string to output
* @param data data pointer to verify (NULL => error )
* @param datalen data len to check
* @param typedlen type length
*
* @return 0 on success, 1 on error
*/
static
int
_asn_build_header_check(const char *str, const u_char * data,
size_t datalen, size_t typedlen)
{
char ebuf[128];
if (data == NULL) {
/*
* error message is set
*/
return 1;
}
if (datalen < typedlen) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad header, length too short: %lu < %lu", str,
(unsigned long)datalen, (unsigned long)typedlen);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 1;
}
return 0;
}
/**
* @internal
* call after asn_build_header to verify result.
*
* @param str error string
* @param pkt packet to check
* @param pkt_len length of the packet
* @param typedlen length of the type
*
* @return 0 on success 1 on error
*/
static
int
_asn_realloc_build_header_check(const char *str,
u_char ** pkt,
const size_t * pkt_len, size_t typedlen)
{
char ebuf[128];
if (pkt == NULL || *pkt == NULL) {
/*
* Error message is set.
*/
return 1;
}
if (*pkt_len < typedlen) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad header, length too short: %lu < %lu", str,
(unsigned long)*pkt_len, (unsigned long)typedlen);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 1;
}
return 0;
}
/**
* @internal
* checks the incoming packet for validity and returns its size or 0
*
* @param pkt The packet
* @param len The length to check
*
* @return The size of the packet if valid; 0 otherwise
*/
int
asn_check_packet(u_char * pkt, size_t len)
{
u_long asn_length;
if (len < 2)
return 0; /* always too short */
if (*pkt != (u_char) (ASN_SEQUENCE | ASN_CONSTRUCTOR))
return -1; /* wrong type */
if (*(pkt + 1) & 0x80) {
/*
* long length
*/
if ((int) len < (int) (*(pkt + 1) & ~0x80) + 2)
return 0; /* still to short, incomplete length */
asn_parse_length(pkt + 1, &asn_length);
return (asn_length + 2 + (*(pkt + 1) & ~0x80));
} else {
/*
* short length
*/
return (*(pkt + 1) + 2);
}
}
static
int
_asn_bitstring_check(const char *str, size_t asn_length, u_char datum)
{
char ebuf[128];
if (asn_length < 1) {
snprintf(ebuf, sizeof(ebuf),
"%s: length %d too small", str, (int) asn_length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 1;
}
/*
* if (datum > 7){
* sprintf(ebuf,"%s: datum %d >7: too large", str, (int)(datum));
* ERROR_MSG(ebuf);
* return 1;
* }
*/
return 0;
}
/**
* @internal
* asn_parse_int - pulls a long out of an int type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param intp IN/OUT - pointer to start of output buffer
* @param intsize IN - size of output buffer
*
* @return pointer to the first byte past the end
* of this object (i.e. the start of the next object) Returns NULL on any error
*/
u_char *
asn_parse_int(u_char * data,
size_t * datalength,
u_char * type, long *intp, size_t intsize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
static const char *errpre = "parse int";
register u_char *bufp = data;
u_long asn_length;
register long value = 0;
if (intsize != sizeof(long)) {
_asn_size_err(errpre, intsize, sizeof(long));
return NULL;
}
*type = *bufp++;
if (*type != ASN_INTEGER) {
_asn_type_err(errpre, *type);
return NULL;
}
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check
(errpre, bufp, data, asn_length, *datalength))
return NULL;
if ((size_t) asn_length > intsize || (int) asn_length == 0) {
_asn_length_err(errpre, (size_t) asn_length, intsize);
return NULL;
}
*datalength -= (int) asn_length + (bufp - data);
if (*bufp & 0x80)
value = -1; /* integer is negative */
DEBUGDUMPSETUP("recv", data, bufp - data + asn_length);
while (asn_length--)
value = (value << 8) | *bufp++;
CHECK_OVERFLOW_S(value,1);
DEBUGMSG(("dumpv_recv", " Integer:\t%ld (0x%.2lX)\n", value, value));
*intp = value;
return bufp;
}
/**
* @internal
* asn_parse_unsigned_int - pulls an unsigned long out of an ASN int type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param intp IN/OUT - pointer to start of output buffer
* @param intsize IN - size of output buffer
*
* @return pointer to the first byte past the end
* of this object (i.e. the start of the next object) Returns NULL on any error
*/
u_char *
asn_parse_unsigned_int(u_char * data,
size_t * datalength,
u_char * type, u_long * intp, size_t intsize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
static const char *errpre = "parse uint";
register u_char *bufp = data;
u_long asn_length;
register u_long value = 0;
if (intsize != sizeof(long)) {
_asn_size_err(errpre, intsize, sizeof(long));
return NULL;
}
*type = *bufp++;
if (*type != ASN_COUNTER && *type != ASN_GAUGE && *type != ASN_TIMETICKS
&& *type != ASN_UINTEGER) {
_asn_type_err(errpre, *type);
return NULL;
}
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check
(errpre, bufp, data, asn_length, *datalength))
return NULL;
if ((asn_length > (intsize + 1)) || ((int) asn_length == 0) ||
((asn_length == intsize + 1) && *bufp != 0x00)) {
_asn_length_err(errpre, (size_t) asn_length, intsize);
return NULL;
}
*datalength -= (int) asn_length + (bufp - data);
if (*bufp & 0x80)
value = ~value; /* integer is negative */
DEBUGDUMPSETUP("recv", data, bufp - data + asn_length);
while (asn_length--)
value = (value << 8) | *bufp++;
CHECK_OVERFLOW_U(value,2);
DEBUGMSG(("dumpv_recv", " UInteger:\t%ld (0x%.2lX)\n", value, value));
*intp = value;
return bufp;
}
/**
* @internal
* asn_build_int - builds an ASN object containing an integer.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
*
* @param data IN - pointer to start of output buffer
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of objec
* @param intp IN - pointer to start of long integer
* @param intsize IN - size of input buffer
*
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_int(u_char * data,
size_t * datalength, u_char type, const long *intp, size_t intsize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
static const char *errpre = "build int";
register long integer;
register u_long mask;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
if (intsize != sizeof(long)) {
_asn_size_err(errpre, intsize, sizeof(long));
return NULL;
}
integer = *intp;
CHECK_OVERFLOW_S(integer,3);
/*
* Truncate "unnecessary" bytes off of the most significant end of this
* 2's complement integer. There should be no sequence of 9
* consecutive 1's or 0's at the most significant end of the
* integer.
*/
mask = ((u_long) 0x1FF) << ((8 * (sizeof(long) - 1)) - 1);
/*
* mask is 0xFF800000 on a big-endian machine
*/
while ((((integer & mask) == 0) || ((integer & mask) == mask))
&& intsize > 1) {
intsize--;
integer <<= 8;
}
data = asn_build_header(data, datalength, type, intsize);
if (_asn_build_header_check(errpre, data, *datalength, intsize))
return NULL;
*datalength -= intsize;
mask = ((u_long) 0xFF) << (8 * (sizeof(long) - 1));
/*
* mask is 0xFF000000 on a big-endian machine
*/
while (intsize--) {
*data++ = (u_char) ((integer & mask) >> (8 * (sizeof(long) - 1)));
integer <<= 8;
}
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGMSG(("dumpv_send", " Integer:\t%ld (0x%.2lX)\n", *intp, *intp));
return data;
}
/**
* @internal
* asn_build_unsigned_int - builds an ASN object containing an integer.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
*
* @param data IN - pointer to start of output buffer
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of objec
* @param intp IN - pointer to start of long integer
* @param intsize IN - size of input buffer
*
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_unsigned_int(u_char * data,
size_t * datalength,
u_char type, const u_long * intp, size_t intsize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
static const char *errpre = "build uint";
register u_long integer;
register u_long mask;
int add_null_byte = 0;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
if (intsize != sizeof(long)) {
_asn_size_err(errpre, intsize, sizeof(long));
return NULL;
}
integer = *intp;
CHECK_OVERFLOW_U(integer,4);
mask = ((u_long) 0xFF) << (8 * (sizeof(long) - 1));
/*
* mask is 0xFF000000 on a big-endian machine
*/
if ((u_char) ((integer & mask) >> (8 * (sizeof(long) - 1))) & 0x80) {
/*
* if MSB is set
*/
add_null_byte = 1;
intsize++;
} else {
/*
* Truncate "unnecessary" bytes off of the most significant end of this 2's complement integer.
* There should be no sequence of 9 consecutive 1's or 0's at the most significant end of the
* integer.
*/
mask = ((u_long) 0x1FF) << ((8 * (sizeof(long) - 1)) - 1);
/*
* mask is 0xFF800000 on a big-endian machine
*/
while ((((integer & mask) == 0) || ((integer & mask) == mask))
&& intsize > 1) {
intsize--;
integer <<= 8;
}
}
data = asn_build_header(data, datalength, type, intsize);
if (_asn_build_header_check(errpre, data, *datalength, intsize))
return NULL;
*datalength -= intsize;
if (add_null_byte == 1) {
*data++ = '\0';
intsize--;
}
mask = ((u_long) 0xFF) << (8 * (sizeof(long) - 1));
/*
* mask is 0xFF000000 on a big-endian machine
*/
while (intsize--) {
*data++ = (u_char) ((integer & mask) >> (8 * (sizeof(long) - 1)));
integer <<= 8;
}
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGMSG(("dumpv_send", " UInteger:\t%ld (0x%.2lX)\n", *intp, *intp));
return data;
}
/**
* @internal
* asn_parse_string - pulls an octet string out of an ASN octet string type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* "string" is filled with the octet string.
* ASN.1 octet string ::= primstring | cmpdstring
* primstring ::= 0x04 asnlength byte {byte}*
* cmpdstring ::= 0x24 asnlength string {string}*
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param string IN/OUT - pointer to start of output buffer
* @param strlength IN/OUT - size of output buffer
*
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_string(u_char * data,
size_t * datalength,
u_char * type, u_char * str, size_t * strlength)
{
static const char *errpre = "parse string";
u_char *bufp = data;
u_long asn_length;
*type = *bufp++;
if (*type != ASN_OCTET_STR && *type != ASN_IPADDRESS && *type != ASN_OPAQUE
&& *type != ASN_NSAP) {
_asn_type_err(errpre, *type);
return NULL;
}
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check
(errpre, bufp, data, asn_length, *datalength)) {
return NULL;
}
if (asn_length > *strlength) {
_asn_length_err(errpre, (size_t) asn_length, *strlength);
return NULL;
}
DEBUGDUMPSETUP("recv", data, bufp - data + asn_length);
memmove(str, bufp, asn_length);
if (*strlength > asn_length)
str[asn_length] = 0;
*strlength = asn_length;
*datalength -= asn_length + (bufp - data);
DEBUGIF("dumpv_recv") {
u_char *buf = (u_char *) malloc(1 + asn_length);
size_t l = (buf != NULL) ? (1 + asn_length) : 0, ol = 0;
if (sprint_realloc_asciistring
(&buf, &l, &ol, 1, str, asn_length)) {
DEBUGMSG(("dumpv_recv", " String:\t%s\n", buf));
} else {
if (buf == NULL) {
DEBUGMSG(("dumpv_recv", " String:\t[TRUNCATED]\n"));
} else {
DEBUGMSG(("dumpv_recv", " String:\t%s [TRUNCATED]\n",
buf));
}
}
if (buf != NULL) {
free(buf);
}
}
return bufp + asn_length;
}
/**
* @internal
* asn_build_string - Builds an ASN octet string object containing the input string.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param string IN - pointer to start of input buffer
* @param strlength IN - size of input buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_string(u_char * data,
size_t * datalength,
u_char type, const u_char * str, size_t strlength)
{
/*
* ASN.1 octet string ::= primstring | cmpdstring
* primstring ::= 0x04 asnlength byte {byte}*
* cmpdstring ::= 0x24 asnlength string {string}*
* This code will never send a compound string.
*/
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
data = asn_build_header(data, datalength, type, strlength);
if (_asn_build_header_check
("build string", data, *datalength, strlength))
return NULL;
if (strlength) {
if (str == NULL) {
memset(data, 0, strlength);
} else {
memmove(data, str, strlength);
}
}
*datalength -= strlength;
DEBUGDUMPSETUP("send", initdatap, data - initdatap + strlength);
DEBUGIF("dumpv_send") {
u_char *buf = (u_char *) malloc(1 + strlength);
size_t l = (buf != NULL) ? (1 + strlength) : 0, ol = 0;
if (sprint_realloc_asciistring
(&buf, &l, &ol, 1, str, strlength)) {
DEBUGMSG(("dumpv_send", " String:\t%s\n", buf));
} else {
if (buf == NULL) {
DEBUGMSG(("dumpv_send", " String:\t[TRUNCATED]\n"));
} else {
DEBUGMSG(("dumpv_send", " String:\t%s [TRUNCATED]\n",
buf));
}
}
if (buf != NULL) {
free(buf);
}
}
return data + strlength;
}
/**
* @internal
* asn_parse_header - interprets the ID and length of the current object.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* in this object following the id and length.
*
* Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @return Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*
*/
u_char *
asn_parse_header(u_char * data, size_t * datalength, u_char * type)
{
register u_char *bufp;
u_long asn_length;
if (!data || !datalength || !type) {
ERROR_MSG("parse header: NULL pointer");
return NULL;
}
bufp = data;
/*
* this only works on data types < 30, i.e. no extension octets
*/
if (IS_EXTENSION_ID(*bufp)) {
ERROR_MSG("can't process ID >= 30");
return NULL;
}
*type = *bufp;
bufp = asn_parse_length(bufp + 1, &asn_length);
if (_asn_parse_length_check
("parse header", bufp, data, asn_length, *datalength))
return NULL;
#ifdef DUMP_PRINT_HEADERS
DEBUGDUMPSETUP("recv", data, (bufp - data));
DEBUGMSG(("dumpv_recv", " Header: 0x%.2X, len = %d (0x%X)\n", *data,
asn_length, asn_length));
#else
/*
* DEBUGMSGHEXTLI(("recv",data,(bufp-data)));
* DEBUGMSG(("dumpH_recv","\n"));
*/
#endif
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
if ((*type == ASN_OPAQUE) && (*bufp == ASN_OPAQUE_TAG1)) {
/*
* check if 64-but counter
*/
switch (*(bufp + 1)) {
case ASN_OPAQUE_COUNTER64:
case ASN_OPAQUE_U64:
case ASN_OPAQUE_FLOAT:
case ASN_OPAQUE_DOUBLE:
case ASN_OPAQUE_I64:
*type = *(bufp + 1);
break;
default:
/*
* just an Opaque
*/
*datalength = (int) asn_length;
return bufp;
}
/*
* value is encoded as special format
*/
bufp = asn_parse_length(bufp + 2, &asn_length);
if (_asn_parse_length_check("parse opaque header", bufp, data,
asn_length, *datalength))
return NULL;
}
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
*datalength = (int) asn_length;
return bufp;
}
/**
* @internal
* same as asn_parse_header with test for expected type
*
* @see asn_parse_header
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param expected_type IN expected type
* @return Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*
*/
u_char *
asn_parse_sequence(u_char * data, size_t * datalength, u_char * type, u_char expected_type, /* must be this type */
const char *estr)
{ /* error message prefix */
data = asn_parse_header(data, datalength, type);
if (data && (*type != expected_type)) {
char ebuf[128];
snprintf(ebuf, sizeof(ebuf),
"%s header type %02X: s/b %02X", estr,
(u_char) * type, (u_char) expected_type);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
return data;
}
/**
* @internal
* asn_build_header - builds an ASN header for an object with the ID and
* length specified.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* in this object following the id and length.
*
* This only works on data types < 30, i.e. no extension octets.
* The maximum length is 0xFFFF;
*
* Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param length IN - length of object
* @return Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*/
u_char *
asn_build_header(u_char * data,
size_t * datalength, u_char type, size_t length)
{
char ebuf[128];
if (*datalength < 1) {
snprintf(ebuf, sizeof(ebuf),
"bad header length < 1 :%lu, %lu",
(unsigned long)*datalength, (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
*data++ = type;
(*datalength)--;
return asn_build_length(data, datalength, length);
}
/**
* @internal
* asn_build_sequence - builds an ASN header for a sequence with the ID and
*
* length specified.
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* in this object following the id and length.
*
* This only works on data types < 30, i.e. no extension octets.
* The maximum length is 0xFFFF;
*
* Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param length IN - length of object
*
* @return Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*/
u_char *
asn_build_sequence(u_char * data,
size_t * datalength, u_char type, size_t length)
{
static const char *errpre = "build seq";
char ebuf[128];
if (*datalength < 4) {
snprintf(ebuf, sizeof(ebuf),
"%s: length %d < 4: PUNT", errpre,
(int) *datalength);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
*datalength -= 4;
*data++ = type;
*data++ = (u_char) (0x02 | ASN_LONG_LEN);
*data++ = (u_char) ((length >> 8) & 0xFF);
*data++ = (u_char) (length & 0xFF);
return data;
}
/**
* @internal
* asn_parse_length - interprets the length of the current object.
*
* On exit, length contains the value of this length field.
*
* Returns a pointer to the first byte after this length
* field (aka: the start of the data field).
* Returns NULL on any error.
*
* @param data IN - pointer to start of length field
* @param length OUT - value of length field
*
* @return Returns a pointer to the first byte after this length
* field (aka: the start of the data field).
* Returns NULL on any error.
*/
u_char *
asn_parse_length(u_char * data, u_long * length)
{
static const char *errpre = "parse length";
char ebuf[128];
register u_char lengthbyte;
if (!data || !length) {
ERROR_MSG("parse length: NULL pointer");
return NULL;
}
lengthbyte = *data;
if (lengthbyte & ASN_LONG_LEN) {
lengthbyte &= ~ASN_LONG_LEN; /* turn MSb off */
if (lengthbyte == 0) {
snprintf(ebuf, sizeof(ebuf),
"%s: indefinite length not supported", errpre);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
if (lengthbyte > sizeof(long)) {
snprintf(ebuf, sizeof(ebuf),
"%s: data length %d > %lu not supported", errpre,
lengthbyte, (unsigned long)sizeof(long));
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
data++;
*length = 0; /* protect against short lengths */
while (lengthbyte--) {
*length <<= 8;
*length |= *data++;
}
if ((long) *length < 0) {
snprintf(ebuf, sizeof(ebuf),
"%s: negative data length %ld\n", errpre,
(long) *length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
return data;
} else { /* short asnlength */
*length = (long) lengthbyte;
return data + 1;
}
}
/**
* @internal
* asn_build_length - builds an ASN header for a length with
* length specified.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* in this object following the length.
*
*
* Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param length IN - length of object
*
* @return Returns a pointer to the first byte of the contents of this object.
* Returns NULL on any error.
*/
u_char *
asn_build_length(u_char * data, size_t * datalength, size_t length)
{
static const char *errpre = "build length";
char ebuf[128];
u_char *start_data = data;
/*
* no indefinite lengths sent
*/
if (length < 0x80) {
if (*datalength < 1) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad length < 1 :%lu, %lu", errpre,
(unsigned long)*datalength, (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
*data++ = (u_char) length;
} else if (length <= 0xFF) {
if (*datalength < 2) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad length < 2 :%lu, %lu", errpre,
(unsigned long)*datalength, (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
*data++ = (u_char) (0x01 | ASN_LONG_LEN);
*data++ = (u_char) length;
} else { /* 0xFF < length <= 0xFFFF */
if (*datalength < 3) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad length < 3 :%lu, %lu", errpre,
(unsigned long)*datalength, (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
*data++ = (u_char) (0x02 | ASN_LONG_LEN);
*data++ = (u_char) ((length >> 8) & 0xFF);
*data++ = (u_char) (length & 0xFF);
}
*datalength -= (data - start_data);
return data;
}
/**
* @internal
* asn_parse_objid - pulls an object indentifier out of an ASN object identifier type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* "objid" is filled with the object identifier.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param objid IN/OUT - pointer to start of output buffer
* @param objidlength IN/OUT - number of sub-id's in objid
*
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
*/
u_char *
asn_parse_objid(u_char * data,
size_t * datalength,
u_char * type, oid * objid, size_t * objidlength)
{
static const char *errpre = "parse objid";
/*
* ASN.1 objid ::= 0x06 asnlength subidentifier {subidentifier}*
* subidentifier ::= {leadingbyte}* lastbyte
* leadingbyte ::= 1 7bitvalue
* lastbyte ::= 0 7bitvalue
*/
register u_char *bufp = data;
register oid *oidp = objid + 1;
register u_long subidentifier;
register long length;
u_long asn_length;
size_t original_length = *objidlength;
*type = *bufp++;
if (*type != ASN_OBJECT_ID) {
_asn_type_err(errpre, *type);
return NULL;
}
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check("parse objid", bufp, data,
asn_length, *datalength))
return NULL;
*datalength -= (int) asn_length + (bufp - data);
DEBUGDUMPSETUP("recv", data, bufp - data + asn_length);
/*
* Handle invalid object identifier encodings of the form 06 00 robustly
*/
if (asn_length == 0)
objid[0] = objid[1] = 0;
length = asn_length;
(*objidlength)--; /* account for expansion of first byte */
while (length > 0 && (*objidlength)-- > 0) {
subidentifier = 0;
do { /* shift and add in low order 7 bits */
subidentifier =
(subidentifier << 7) + (*(u_char *) bufp & ~ASN_BIT8);
length--;
} while ((*(u_char *) bufp++ & ASN_BIT8) && (length > 0)); /* last byte has high bit clear */
if (length == 0) {
u_char *last_byte = bufp - 1;
if (*last_byte & ASN_BIT8) {
/* last byte has high bit set -> wrong BER encoded OID */
ERROR_MSG("subidentifier syntax error");
return NULL;
}
}
#if defined(EIGHTBIT_SUBIDS) || (SIZEOF_LONG != 4)
if (subidentifier > MAX_SUBID) {
ERROR_MSG("subidentifier too large");
return NULL;
}
#endif
*oidp++ = (oid) subidentifier;
}
if (0 != length) {
ERROR_MSG("OID length exceeds buffer size");
*objidlength = original_length;
return NULL;
}
/*
* The first two subidentifiers are encoded into the first component
* with the value (X * 40) + Y, where:
* X is the value of the first subidentifier.
* Y is the value of the second subidentifier.
*/
subidentifier = (u_long) objid[1];
if (subidentifier == 0x2B) {
objid[0] = 1;
objid[1] = 3;
} else {
if (subidentifier < 40) {
objid[0] = 0;
objid[1] = subidentifier;
} else if (subidentifier < 80) {
objid[0] = 1;
objid[1] = subidentifier - 40;
} else {
objid[0] = 2;
objid[1] = subidentifier - 80;
}
}
*objidlength = (int) (oidp - objid);
DEBUGMSG(("dumpv_recv", " ObjID: "));
DEBUGMSGOID(("dumpv_recv", objid, *objidlength));
DEBUGMSG(("dumpv_recv", "\n"));
return bufp;
}
/**
* @internal
* asn_build_objid - Builds an ASN object identifier object containing the
* input string.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param objid IN - pointer to start of input buffer
* @param objidlength IN - number of sub-id's in objid
*
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_objid(u_char * data,
size_t * datalength,
u_char type, oid * objid, size_t objidlength)
{
/*
* ASN.1 objid ::= 0x06 asnlength subidentifier {subidentifier}*
* subidentifier ::= {leadingbyte}* lastbyte
* leadingbyte ::= 1 7bitvalue
* lastbyte ::= 0 7bitvalue
*/
size_t asnlength;
register oid *op = objid;
u_char objid_size[MAX_OID_LEN];
register u_long objid_val;
u_long first_objid_val;
register int i;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
/*
* check if there are at least 2 sub-identifiers
*/
if (objidlength == 0) {
/*
* there are not, so make OID have two with value of zero
*/
objid_val = 0;
objidlength = 2;
} else if (objid[0] > 2) {
ERROR_MSG("build objid: bad first subidentifier");
return NULL;
} else if (objidlength == 1) {
/*
* encode the first value
*/
objid_val = (op[0] * 40);
objidlength = 2;
op++;
} else {
/*
* combine the first two values
*/
if ((op[1] > 40) &&
(op[0] < 2)) {
ERROR_MSG("build objid: bad second subidentifier");
return NULL;
}
objid_val = (op[0] * 40) + op[1];
op += 2;
}
first_objid_val = objid_val;
/*
* ditch illegal calls now
*/
if (objidlength > MAX_OID_LEN)
return NULL;
/*
* calculate the number of bytes needed to store the encoded value
*/
for (i = 1, asnlength = 0;;) {
CHECK_OVERFLOW_U(objid_val,5);
if (objid_val < (unsigned) 0x80) {
objid_size[i] = 1;
asnlength += 1;
} else if (objid_val < (unsigned) 0x4000) {
objid_size[i] = 2;
asnlength += 2;
} else if (objid_val < (unsigned) 0x200000) {
objid_size[i] = 3;
asnlength += 3;
} else if (objid_val < (unsigned) 0x10000000) {
objid_size[i] = 4;
asnlength += 4;
} else {
objid_size[i] = 5;
asnlength += 5;
}
i++;
if (i >= (int) objidlength)
break;
objid_val = *op++; /* XXX - doesn't handle 2.X (X > 40) */
}
/*
* store the ASN.1 tag and length
*/
data = asn_build_header(data, datalength, type, asnlength);
if (_asn_build_header_check
("build objid", data, *datalength, asnlength))
return NULL;
/*
* store the encoded OID value
*/
for (i = 1, objid_val = first_objid_val, op = objid + 2;
i < (int) objidlength; i++) {
if (i != 1)
objid_val = (uint32_t)(*op++); /* already logged warning above */
switch (objid_size[i]) {
case 1:
*data++ = (u_char) objid_val;
break;
case 2:
*data++ = (u_char) ((objid_val >> 7) | 0x80);
*data++ = (u_char) (objid_val & 0x07f);
break;
case 3:
*data++ = (u_char) ((objid_val >> 14) | 0x80);
*data++ = (u_char) ((objid_val >> 7 & 0x7f) | 0x80);
*data++ = (u_char) (objid_val & 0x07f);
break;
case 4:
*data++ = (u_char) ((objid_val >> 21) | 0x80);
*data++ = (u_char) ((objid_val >> 14 & 0x7f) | 0x80);
*data++ = (u_char) ((objid_val >> 7 & 0x7f) | 0x80);
*data++ = (u_char) (objid_val & 0x07f);
break;
case 5:
*data++ = (u_char) ((objid_val >> 28) | 0x80);
*data++ = (u_char) ((objid_val >> 21 & 0x7f) | 0x80);
*data++ = (u_char) ((objid_val >> 14 & 0x7f) | 0x80);
*data++ = (u_char) ((objid_val >> 7 & 0x7f) | 0x80);
*data++ = (u_char) (objid_val & 0x07f);
break;
}
}
/*
* return the length and data ptr
*/
*datalength -= asnlength;
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGMSG(("dumpv_send", " ObjID: "));
DEBUGMSGOID(("dumpv_send", objid, objidlength));
DEBUGMSG(("dumpv_send", "\n"));
return data;
}
/**
* @internal
* asn_parse_null - Interprets an ASN null type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_null(u_char * data, size_t * datalength, u_char * type)
{
/*
* ASN.1 null ::= 0x05 0x00
*/
register u_char *bufp = data;
u_long asn_length;
*type = *bufp++;
bufp = asn_parse_length(bufp, &asn_length);
if (bufp == NULL) {
ERROR_MSG("parse null: bad length");
return NULL;
}
if (asn_length != 0) {
ERROR_MSG("parse null: malformed ASN.1 null");
return NULL;
}
*datalength -= (bufp - data);
DEBUGDUMPSETUP("recv", data, bufp - data);
DEBUGMSG(("dumpv_recv", " NULL\n"));
return bufp + asn_length;
}
/**
* @internal
* asn_build_null - Builds an ASN null object.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @retun Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
*/
u_char *
asn_build_null(u_char * data, size_t * datalength, u_char type)
{
/*
* ASN.1 null ::= 0x05 0x00
*/
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
data = asn_build_header(data, datalength, type, 0);
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGMSG(("dumpv_send", " NULL\n"));
return data;
}
/**
* @internal
* asn_parse_bitstring - pulls a bitstring out of an ASN bitstring type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* "string" is filled with the bit string.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param string IN/OUT - pointer to start of output buffer
* @param strlength IN/OUT - size of output buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_bitstring(u_char * data,
size_t * datalength,
u_char * type, u_char * str, size_t * strlength)
{
/*
* bitstring ::= 0x03 asnlength unused {byte}*
*/
static const char *errpre = "parse bitstring";
register u_char *bufp = data;
u_long asn_length;
*type = *bufp++;
if (*type != ASN_BIT_STR) {
_asn_type_err(errpre, *type);
return NULL;
}
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check(errpre, bufp, data,
asn_length, *datalength))
return NULL;
if ((size_t) asn_length > *strlength) {
_asn_length_err(errpre, (size_t) asn_length, *strlength);
return NULL;
}
if (_asn_bitstring_check(errpre, asn_length, *bufp))
return NULL;
DEBUGDUMPSETUP("recv", data, bufp - data);
DEBUGMSG(("dumpv_recv", " Bitstring: "));
DEBUGMSGHEX(("dumpv_recv", data, asn_length));
DEBUGMSG(("dumpv_recv", "\n"));
memmove(str, bufp, asn_length);
*strlength = (int) asn_length;
*datalength -= (int) asn_length + (bufp - data);
return bufp + asn_length;
}
/**
* @internal
* asn_build_bitstring - Builds an ASN bit string object containing the
* input string.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the beginning of the next object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param string IN - pointer to start of input buffer
* @param strlength IN - size of input buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_bitstring(u_char * data,
size_t * datalength,
u_char type, const u_char * str, size_t strlength)
{
/*
* ASN.1 bit string ::= 0x03 asnlength unused {byte}*
*/
static const char *errpre = "build bitstring";
if (_asn_bitstring_check
(errpre, strlength, (u_char)((str) ? *str : 0)))
return NULL;
data = asn_build_header(data, datalength, type, strlength);
if (_asn_build_header_check(errpre, data, *datalength, strlength))
return NULL;
if (strlength > 0 && str)
memmove(data, str, strlength);
else if (strlength > 0 && !str) {
ERROR_MSG("no string passed into asn_build_bitstring\n");
return NULL;
}
*datalength -= strlength;
DEBUGDUMPSETUP("send", data, strlength);
DEBUGMSG(("dumpv_send", " Bitstring: "));
DEBUGMSGHEX(("dumpv_send", data, strlength));
DEBUGMSG(("dumpv_send", "\n"));
return data + strlength;
}
/**
* @internal
* asn_parse_unsigned_int64 - pulls a 64 bit unsigned long out of an ASN int
* type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param cp IN/OUT - pointer to counter struct
* @param countersize IN - size of output buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_unsigned_int64(u_char * data,
size_t * datalength,
u_char * type,
struct counter64 * cp, size_t countersize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
static const char *errpre = "parse uint64";
const int uint64sizelimit = (4 * 2) + 1;
register u_char *bufp = data;
u_long asn_length;
register u_long low = 0, high = 0;
if (countersize != sizeof(struct counter64)) {
_asn_size_err(errpre, countersize, sizeof(struct counter64));
return NULL;
}
*type = *bufp++;
if (*type != ASN_COUNTER64
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
&& *type != ASN_OPAQUE_COUNTER64 && *type != ASN_OPAQUE_U64
#endif
) {
_asn_type_err(errpre, *type);
return NULL;
}
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check
(errpre, bufp, data, asn_length, *datalength))
return NULL;
DEBUGDUMPSETUP("recv", data, bufp - data);
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
/*
* 64 bit counters as opaque
*/
if ((*type == ASN_OPAQUE) &&
(asn_length <= ASN_OPAQUE_COUNTER64_MX_BER_LEN) &&
(*bufp == ASN_OPAQUE_TAG1) &&
((*(bufp + 1) == ASN_OPAQUE_COUNTER64) ||
(*(bufp + 1) == ASN_OPAQUE_U64))) {
/*
* change type to Counter64 or U64
*/
*type = *(bufp + 1);
/*
* value is encoded as special format
*/
bufp = asn_parse_length(bufp + 2, &asn_length);
if (_asn_parse_length_check("parse opaque uint64", bufp, data,
asn_length, *datalength))
return NULL;
}
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
if (((int) asn_length > uint64sizelimit) ||
(((int) asn_length == uint64sizelimit) && *bufp != 0x00)) {
_asn_length_err(errpre, (size_t) asn_length, uint64sizelimit);
return NULL;
}
*datalength -= (int) asn_length + (bufp - data);
while (asn_length--) {
high = ((0x00FFFFFF & high) << 8) | ((low & 0xFF000000U) >> 24);
low = ((low & 0x00FFFFFF) << 8) | *bufp++;
}
CHECK_OVERFLOW_U(high,6);
CHECK_OVERFLOW_U(low,6);
cp->low = low;
cp->high = high;
DEBUGIF("dumpv_recv") {
char i64buf[I64CHARSZ + 1];
printU64(i64buf, cp);
DEBUGMSG(("dumpv_recv", "Counter64: %s\n", i64buf));
}
return bufp;
}
/**
* @internal
* asn_build_unsigned_int64 - builds an ASN object containing a 64 bit integer.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of output buffer
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param cp IN - pointer to counter struct
* @param countersize IN - size of input buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_unsigned_int64(u_char * data,
size_t * datalength,
u_char type,
const struct counter64 * cp, size_t countersize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
register u_long low, high;
register u_long mask, mask2;
int add_null_byte = 0;
size_t intsize;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
if (countersize != sizeof(struct counter64)) {
_asn_size_err("build uint64", countersize,
sizeof(struct counter64));
return NULL;
}
intsize = 8;
low = cp->low;
high = cp->high;
CHECK_OVERFLOW_U(high,7);
CHECK_OVERFLOW_U(low,7);
mask = 0xff000000U;
if (high & 0x80000000U) {
/*
* if MSB is set
*/
add_null_byte = 1;
intsize++;
} else {
/*
* Truncate "unnecessary" bytes off of the most significant end of this 2's
* complement integer.
* There should be no sequence of 9 consecutive 1's or 0's at the most
* significant end of the integer.
*/
mask2 = 0xff800000U;
while ((((high & mask2) == 0) || ((high & mask2) == mask2))
&& intsize > 1) {
intsize--;
high = ((high & 0x00ffffffu) << 8) | ((low & mask) >> 24);
low = (low & 0x00ffffffu) << 8;
}
}
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
/*
* encode a Counter64 as an opaque (it also works in SNMPv1)
*/
/*
* turn into Opaque holding special tagged value
*/
if (type == ASN_OPAQUE_COUNTER64) {
/*
* put the tag and length for the Opaque wrapper
*/
data = asn_build_header(data, datalength, ASN_OPAQUE, intsize + 3);
if (_asn_build_header_check
("build counter u64", data, *datalength, intsize + 3))
return NULL;
/*
* put the special tag and length
*/
*data++ = ASN_OPAQUE_TAG1;
*data++ = ASN_OPAQUE_COUNTER64;
*data++ = (u_char) intsize;
*datalength = *datalength - 3;
} else
/*
* Encode the Unsigned int64 in an opaque
*/
/*
* turn into Opaque holding special tagged value
*/
if (type == ASN_OPAQUE_U64) {
/*
* put the tag and length for the Opaque wrapper
*/
data = asn_build_header(data, datalength, ASN_OPAQUE, intsize + 3);
if (_asn_build_header_check
("build opaque u64", data, *datalength, intsize + 3))
return NULL;
/*
* put the special tag and length
*/
*data++ = ASN_OPAQUE_TAG1;
*data++ = ASN_OPAQUE_U64;
*data++ = (u_char) intsize;
*datalength = *datalength - 3;
} else {
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
data = asn_build_header(data, datalength, type, intsize);
if (_asn_build_header_check
("build uint64", data, *datalength, intsize))
return NULL;
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
}
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
*datalength -= intsize;
if (add_null_byte == 1) {
*data++ = '\0';
intsize--;
}
while (intsize--) {
*data++ = (u_char) (high >> 24);
high = ((high & 0x00ffffff) << 8) | ((low & mask) >> 24);
low = (low & 0x00ffffff) << 8;
}
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGIF("dumpv_send") {
char i64buf[I64CHARSZ + 1];
printU64(i64buf, cp);
DEBUGMSG(("dumpv_send", "%s", i64buf));
}
return data;
}
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
/**
* @internal
* asn_parse_signed_int64 - pulls a 64 bit signed long out of an ASN int
* type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param cp IN/OUT - pointer to counter struct
* @param countersize IN - size of output buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_signed_int64(u_char * data,
size_t * datalength,
u_char * type,
struct counter64 * cp, size_t countersize)
{
static const char *errpre = "parse int64";
const int int64sizelimit = (4 * 2) + 1;
char ebuf[128];
register u_char *bufp = data;
u_long asn_length;
register u_int low = 0, high = 0;
if (countersize != sizeof(struct counter64)) {
_asn_size_err(errpre, countersize, sizeof(struct counter64));
return NULL;
}
*type = *bufp++;
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check
(errpre, bufp, data, asn_length, *datalength))
return NULL;
DEBUGDUMPSETUP("recv", data, bufp - data);
if ((*type == ASN_OPAQUE) &&
(asn_length <= ASN_OPAQUE_COUNTER64_MX_BER_LEN) &&
(*bufp == ASN_OPAQUE_TAG1) && (*(bufp + 1) == ASN_OPAQUE_I64)) {
/*
* change type to Int64
*/
*type = *(bufp + 1);
/*
* value is encoded as special format
*/
bufp = asn_parse_length(bufp + 2, &asn_length);
if (_asn_parse_length_check("parse opaque int64", bufp, data,
asn_length, *datalength))
return NULL;
}
/*
* this should always have been true until snmp gets int64 PDU types
*/
else {
snprintf(ebuf, sizeof(ebuf),
"%s: wrong type: %d, len %d, buf bytes (%02X,%02X)",
errpre, *type, (int) asn_length, *bufp, *(bufp + 1));
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return NULL;
}
if (((int) asn_length > int64sizelimit) ||
(((int) asn_length == int64sizelimit) && *bufp != 0x00)) {
_asn_length_err(errpre, (size_t) asn_length, int64sizelimit);
return NULL;
}
*datalength -= (int) asn_length + (bufp - data);
if (*bufp & 0x80) {
low = 0xFFFFFFFFU; /* first byte bit 1 means start the data with 1s */
high = 0xFFFFFF;
}
while (asn_length--) {
high = ((0x00FFFFFF & high) << 8) | ((low & 0xFF000000U) >> 24);
low = ((low & 0x00FFFFFF) << 8) | *bufp++;
}
CHECK_OVERFLOW_U(high,8);
CHECK_OVERFLOW_U(low,8);
cp->low = low;
cp->high = high;
DEBUGIF("dumpv_recv") {
char i64buf[I64CHARSZ + 1];
printI64(i64buf, cp);
DEBUGMSG(("dumpv_recv", "Integer64: %s\n", i64buf));
}
return bufp;
}
/**
* @internal
* asn_build_signed_int64 - builds an ASN object containing a 64 bit integer.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of output buffer
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param cp IN - pointer to counter struct
* @param countersize IN - size of input buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_signed_int64(u_char * data,
size_t * datalength,
u_char type,
const struct counter64 * cp, size_t countersize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
register u_int mask, mask2;
u_long low;
long high; /* MUST be signed because of CHECK_OVERFLOW_S(). */
size_t intsize;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
if (countersize != sizeof(struct counter64)) {
_asn_size_err("build int64", countersize,
sizeof(struct counter64));
return NULL;
}
intsize = 8;
low = cp->low;
high = cp->high; /* unsigned to signed conversion */
CHECK_OVERFLOW_S(high,9);
CHECK_OVERFLOW_U(low,9);
/*
* Truncate "unnecessary" bytes off of the most significant end of this
* 2's complement integer. There should be no sequence of 9
* consecutive 1's or 0's at the most significant end of the
* integer.
*/
mask = 0xFF000000U;
mask2 = 0xFF800000U;
while ((((high & mask2) == 0) || ((high & mask2) == mask2))
&& intsize > 1) {
intsize--;
high = ((high & 0x00ffffff) << 8) | ((low & mask) >> 24);
low = (low & 0x00ffffff) << 8;
}
/*
* until a real int64 gets incorperated into SNMP, we are going to
* encode it as an opaque instead. First, we build the opaque
* header and then the int64 tag type we use to mark it as an
* int64 in the opaque string.
*/
data = asn_build_header(data, datalength, ASN_OPAQUE, intsize + 3);
if (_asn_build_header_check
("build int64", data, *datalength, intsize + 3))
return NULL;
*data++ = ASN_OPAQUE_TAG1;
*data++ = ASN_OPAQUE_I64;
*data++ = (u_char) intsize;
*datalength -= (3 + intsize);
while (intsize--) {
*data++ = (u_char) (high >> 24);
high = ((high & 0x00ffffff) << 8) | ((low & mask) >> 24);
low = (low & 0x00ffffff) << 8;
}
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGIF("dumpv_send") {
char i64buf[I64CHARSZ + 1];
printU64(i64buf, cp);
DEBUGMSG(("dumpv_send", "%s\n", i64buf));
}
return data;
}
/**
* @internal
* asn_parse_float - pulls a single precision floating-point out of an opaque type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param floatp IN/OUT - pointer to float
* @param floatsize IN - size of output buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_float(u_char * data,
size_t * datalength,
u_char * type, float *floatp, size_t floatsize)
{
static const char *errpre = "parse float";
register u_char *bufp = data;
u_long asn_length;
union {
float floatVal;
long longVal;
u_char c[sizeof(float)];
} fu;
if (floatsize != sizeof(float)) {
_asn_size_err("parse float", floatsize, sizeof(float));
return NULL;
}
*type = *bufp++;
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check("parse float", bufp, data,
asn_length, *datalength))
return NULL;
DEBUGDUMPSETUP("recv", data, bufp - data + asn_length);
/*
* the float is encoded as an opaque
*/
if ((*type == ASN_OPAQUE) &&
(asn_length == ASN_OPAQUE_FLOAT_BER_LEN) &&
(*bufp == ASN_OPAQUE_TAG1) && (*(bufp + 1) == ASN_OPAQUE_FLOAT)) {
/*
* value is encoded as special format
*/
bufp = asn_parse_length(bufp + 2, &asn_length);
if (_asn_parse_length_check("parse opaque float", bufp, data,
asn_length, *datalength))
return NULL;
/*
* change type to Float
*/
*type = ASN_OPAQUE_FLOAT;
}
if (*type != ASN_OPAQUE_FLOAT) {
_asn_type_err(errpre, *type);
return NULL;
}
if (asn_length != sizeof(float)) {
_asn_size_err("parse seq float", asn_length, sizeof(float));
return NULL;
}
*datalength -= (int) asn_length + (bufp - data);
memcpy(&fu.c[0], bufp, asn_length);
/*
* correct for endian differences
*/
fu.longVal = ntohl(fu.longVal);
*floatp = fu.floatVal;
DEBUGMSG(("dumpv_recv", "Opaque float: %f\n", *floatp));
return bufp;
}
/**
* @internal
* asn_build_float - builds an ASN object containing a single precision floating-point
* number in an Opaque value.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param floatp IN - pointer to float
* @param floatsize IN - size of input buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_float(u_char * data,
size_t * datalength,
u_char type, const float *floatp, size_t floatsize)
{
union {
float floatVal;
int intVal;
u_char c[sizeof(float)];
} fu;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
if (floatsize != sizeof(float)) {
_asn_size_err("build float", floatsize, sizeof(float));
return NULL;
}
/*
* encode the float as an opaque
*/
/*
* turn into Opaque holding special tagged value
*/
/*
* put the tag and length for the Opaque wrapper
*/
data = asn_build_header(data, datalength, ASN_OPAQUE, floatsize + 3);
if (_asn_build_header_check
("build float", data, *datalength, (floatsize + 3)))
return NULL;
/*
* put the special tag and length
*/
*data++ = ASN_OPAQUE_TAG1;
*data++ = ASN_OPAQUE_FLOAT;
*data++ = (u_char) floatsize;
*datalength = *datalength - 3;
fu.floatVal = *floatp;
/*
* correct for endian differences
*/
fu.intVal = htonl(fu.intVal);
*datalength -= floatsize;
memcpy(data, &fu.c[0], floatsize);
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGMSG(("dumpv_send", "Opaque float: %f\n", *floatp));
data += floatsize;
return data;
}
/**
* @internal
* asn_parse_double - pulls a double out of an opaque type.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type OUT - asn type of object
* @param doublep IN/OUT - pointer to double
* @param doublesize IN - size of output buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_parse_double(u_char * data,
size_t * datalength,
u_char * type, double *doublep, size_t doublesize)
{
static const char *errpre = "parse double";
register u_char *bufp = data;
u_long asn_length;
long tmp;
union {
double doubleVal;
int intVal[2];
u_char c[sizeof(double)];
} fu;
if (doublesize != sizeof(double)) {
_asn_size_err("parse double", doublesize, sizeof(double));
return NULL;
}
*type = *bufp++;
bufp = asn_parse_length(bufp, &asn_length);
if (_asn_parse_length_check("parse double", bufp, data,
asn_length, *datalength))
return NULL;
DEBUGDUMPSETUP("recv", data, bufp - data + asn_length);
/*
* the double is encoded as an opaque
*/
if ((*type == ASN_OPAQUE) &&
(asn_length == ASN_OPAQUE_DOUBLE_BER_LEN) &&
(*bufp == ASN_OPAQUE_TAG1) && (*(bufp + 1) == ASN_OPAQUE_DOUBLE)) {
/*
* value is encoded as special format
*/
bufp = asn_parse_length(bufp + 2, &asn_length);
if (_asn_parse_length_check("parse opaque double", bufp, data,
asn_length, *datalength))
return NULL;
/*
* change type to Double
*/
*type = ASN_OPAQUE_DOUBLE;
}
if (*type != ASN_OPAQUE_DOUBLE) {
_asn_type_err(errpre, *type);
return NULL;
}
if (asn_length != sizeof(double)) {
_asn_size_err("parse seq double", asn_length, sizeof(double));
return NULL;
}
*datalength -= (int) asn_length + (bufp - data);
memcpy(&fu.c[0], bufp, asn_length);
/*
* correct for endian differences
*/
tmp = ntohl(fu.intVal[0]);
fu.intVal[0] = ntohl(fu.intVal[1]);
fu.intVal[1] = tmp;
*doublep = fu.doubleVal;
DEBUGMSG(("dumpv_recv", " Opaque Double:\t%f\n", *doublep));
return bufp;
}
/**
* @internal
* asn_build_double - builds an ASN object containing a double
* number in an Opaque value.
*
* On entry, datalength is input as the number of valid bytes following
* "data". On exit, it is returned as the number of valid bytes
* following the end of this object.
*
* Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*
* @param data IN - pointer to start of object
* @param datalength IN/OUT - number of valid bytes left in buffer
* @param type IN - asn type of object
* @param doublep IN - pointer to double
* @param doublesize IN - size of input buffer
* @return Returns a pointer to the first byte past the end
* of this object (i.e. the start of the next object).
* Returns NULL on any error.
*/
u_char *
asn_build_double(u_char * data,
size_t * datalength,
u_char type, const double *doublep, size_t doublesize)
{
long tmp;
union {
double doubleVal;
int intVal[2];
u_char c[sizeof(double)];
} fu;
#ifndef NETSNMP_NO_DEBUGGING
u_char *initdatap = data;
#endif
if (doublesize != sizeof(double)) {
_asn_size_err("build double", doublesize, sizeof(double));
return NULL;
}
/*
* encode the double as an opaque
*/
/*
* turn into Opaque holding special tagged value
*/
/*
* put the tag and length for the Opaque wrapper
*/
data = asn_build_header(data, datalength, ASN_OPAQUE, doublesize + 3);
if (_asn_build_header_check
("build double", data, *datalength, doublesize + 3))
return NULL;
/*
* put the special tag and length
*/
*data++ = ASN_OPAQUE_TAG1;
*data++ = ASN_OPAQUE_DOUBLE;
*data++ = (u_char) doublesize;
*datalength = *datalength - 3;
fu.doubleVal = *doublep;
/*
* correct for endian differences
*/
tmp = htonl(fu.intVal[0]);
fu.intVal[0] = htonl(fu.intVal[1]);
fu.intVal[1] = tmp;
*datalength -= doublesize;
memcpy(data, &fu.c[0], doublesize);
data += doublesize;
DEBUGDUMPSETUP("send", initdatap, data - initdatap);
DEBUGMSG(("dumpv_send", " Opaque double: %f\n", *doublep));
return data;
}
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
/**
* @internal
* This function increases the size of the buffer pointed to by *pkt, which
* is initially of size *pkt_len. Contents are preserved **AT THE TOP END OF
* THE BUFFER** (hence making this function useful for reverse encoding).
* You can change the reallocation scheme, but you **MUST** guarantee to
* allocate **AT LEAST** one extra byte. If memory cannot be reallocated,
* then return 0; otherwise return 1.
*
* @param pkt buffer to increase
* @param pkt_len initial buffer size
*
* @return 1 on success 0 on error (memory cannot be reallocated)
*/
int
asn_realloc(u_char ** pkt, size_t * pkt_len)
{
if (pkt != NULL && pkt_len != NULL) {
size_t old_pkt_len = *pkt_len;
DEBUGMSGTL(("asn_realloc", " old_pkt %8p, old_pkt_len %lu\n",
*pkt, (unsigned long)old_pkt_len));
if (snmp_realloc(pkt, pkt_len)) {
DEBUGMSGTL(("asn_realloc", " new_pkt %8p, new_pkt_len %lu\n",
*pkt, (unsigned long)*pkt_len));
DEBUGMSGTL(("asn_realloc",
" memmove(%8p + %08x, %8p, %08x)\n",
*pkt, (unsigned)(*pkt_len - old_pkt_len),
*pkt, (unsigned)old_pkt_len));
memmove(*pkt + (*pkt_len - old_pkt_len), *pkt, old_pkt_len);
memset(*pkt, (int) ' ', *pkt_len - old_pkt_len);
return 1;
} else {
DEBUGMSG(("asn_realloc", " CANNOT REALLOC()\n"));
}
}
return 0;
}
#ifdef NETSNMP_USE_REVERSE_ASNENCODING
/**
* @internal
* reverse builds an ASN header for a length with
* length specified.
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param length IN - length of object
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_length(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r, size_t length)
{
static const char *errpre = "build length";
char ebuf[128];
int tmp_int;
size_t start_offset = *offset;
if (length <= 0x7f) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad length < 1 :%ld, %lu", errpre,
(long)(*pkt_len - *offset), (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = length;
} else {
while (length > 0xff) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad length < 1 :%ld, %lu", errpre,
(long)(*pkt_len - *offset), (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = length & 0xff;
length >>= 8;
}
while ((*pkt_len - *offset) < 2) {
if (!(r && asn_realloc(pkt, pkt_len))) {
snprintf(ebuf, sizeof(ebuf),
"%s: bad length < 1 :%ld, %lu", errpre,
(long)(*pkt_len - *offset), (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 0;
}
}
*(*pkt + *pkt_len - (++*offset)) = length & 0xff;
tmp_int = *offset - start_offset;
*(*pkt + *pkt_len - (++*offset)) = tmp_int | 0x80;
}
return 1;
}
/**
* @internal
* builds an ASN header for an object with the ID and
* length specified.
*
* @see asn_build_header
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param length IN - length of object
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_header(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type, size_t length)
{
char ebuf[128];
if (asn_realloc_rbuild_length(pkt, pkt_len, offset, r, length)) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
snprintf(ebuf, sizeof(ebuf),
"bad header length < 1 :%ld, %lu",
(long)(*pkt_len - *offset), (unsigned long)length);
ebuf[ sizeof(ebuf)-1 ] = 0;
ERROR_MSG(ebuf);
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = type;
return 1;
}
return 0;
}
/**
* @internal
* builds an ASN object containing an int.
*
* @see asn_build_int
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param intp IN - pointer to start of long integer
* @param intsize IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_int(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type, const long *intp, size_t intsize)
{
static const char *errpre = "build int";
register long integer = *intp;
int testvalue;
size_t start_offset = *offset;
if (intsize != sizeof(long)) {
_asn_size_err(errpre, intsize, sizeof(long));
return 0;
}
CHECK_OVERFLOW_S(integer,10);
testvalue = (integer < 0) ? -1 : 0;
if (((*pkt_len - *offset) < 1) && !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) integer;
integer >>= 8;
while (integer != testvalue) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) integer;
integer >>= 8;
}
if ((*(*pkt + *pkt_len - *offset) & 0x80) != (testvalue & 0x80)) {
/*
* Make sure left most bit is representational of the rest of the bits
* that aren't encoded.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = testvalue & 0xff;
}
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r, type,
(*offset - start_offset))) {
if (_asn_realloc_build_header_check(errpre, pkt, pkt_len,
(*offset - start_offset))) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
(*offset - start_offset));
DEBUGMSG(("dumpv_send", " Integer:\t%ld (0x%.2lX)\n", *intp,
*intp));
return 1;
}
}
return 0;
}
/**
* @internal
* builds an ASN object containing an string.
*
* @see asn_build_string
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param string IN - pointer to start of the string
* @param strlength IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_string(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type,
const u_char * str, size_t strlength)
{
static const char *errpre = "build string";
size_t start_offset = *offset;
while ((*pkt_len - *offset) < strlength) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
*offset += strlength;
memcpy(*pkt + *pkt_len - *offset, str, strlength);
if (asn_realloc_rbuild_header
(pkt, pkt_len, offset, r, type, strlength)) {
if (_asn_realloc_build_header_check
(errpre, pkt, pkt_len, strlength)) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
*offset - start_offset);
DEBUGIF("dumpv_send") {
if (strlength == 0) {
DEBUGMSG(("dumpv_send", " String: [NULL]\n"));
} else {
u_char *buf = (u_char *) malloc(2 * strlength);
size_t l =
(buf != NULL) ? (2 * strlength) : 0, ol = 0;
if (sprint_realloc_asciistring
(&buf, &l, &ol, 1, str, strlength)) {
DEBUGMSG(("dumpv_send", " String:\t%s\n", buf));
} else {
if (buf == NULL) {
DEBUGMSG(("dumpv_send",
" String:\t[TRUNCATED]\n"));
} else {
DEBUGMSG(("dumpv_send",
" String:\t%s [TRUNCATED]\n", buf));
}
}
if (buf != NULL) {
free(buf);
}
}
}
}
return 1;
}
return 0;
}
/**
* @internal
* builds an ASN object containing an unsigned int.
*
* @see asn_build_unsigned_int
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param intp IN - pointer to start of unsigned int
* @param intsize IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_unsigned_int(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type, const u_long * intp, size_t intsize)
{
static const char *errpre = "build uint";
register u_long integer = *intp;
size_t start_offset = *offset;
if (intsize != sizeof(unsigned long)) {
_asn_size_err(errpre, intsize, sizeof(unsigned long));
return 0;
}
CHECK_OVERFLOW_U(integer,11);
if (((*pkt_len - *offset) < 1) && !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) integer;
integer >>= 8;
while (integer != 0) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) integer;
integer >>= 8;
}
if ((*(*pkt + *pkt_len - *offset) & 0x80) != (0 & 0x80)) {
/*
* Make sure left most bit is representational of the rest of the bits
* that aren't encoded.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = 0;
}
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r, type,
(*offset - start_offset))) {
if (_asn_realloc_build_header_check(errpre, pkt, pkt_len,
(*offset - start_offset))) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
(*offset - start_offset));
DEBUGMSG(("dumpv_send", " UInteger:\t%lu (0x%.2lX)\n", *intp,
*intp));
return 1;
}
}
return 0;
}
/**
* @internal
* builds an ASN object containing an sequence.
*
* @see asn_build_sequence
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param length IN - length of object
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_sequence(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type, size_t length)
{
return asn_realloc_rbuild_header(pkt, pkt_len, offset, r, type,
length);
}
/**
* @internal
* builds an ASN object containing an objid.
*
* @see asn_build_objid
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param objid IN - pointer to the object id
* @param objidlength IN - length of the input
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_objid(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type,
const oid * objid, size_t objidlength)
{
/*
* ASN.1 objid ::= 0x06 asnlength subidentifier {subidentifier}*
* subidentifier ::= {leadingbyte}* lastbyte
* leadingbyte ::= 1 7bitvalue
* lastbyte ::= 0 7bitvalue
*/
register size_t i;
register oid tmpint;
size_t start_offset = *offset;
const char *errpre = "build objid";
/*
* Check if there are at least 2 sub-identifiers.
*/
if (objidlength == 0) {
/*
* There are not, so make OID have two with value of zero.
*/
while ((*pkt_len - *offset) < 2) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
*(*pkt + *pkt_len - (++*offset)) = 0;
*(*pkt + *pkt_len - (++*offset)) = 0;
} else if (objid[0] > 2) {
ERROR_MSG("build objid: bad first subidentifier");
return 0;
} else if (objidlength == 1) {
/*
* Encode the first value.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) objid[0];
} else {
for (i = objidlength; i > 2; i--) {
tmpint = objid[i - 1];
CHECK_OVERFLOW_U(tmpint,12);
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) tmpint & 0x7f;
tmpint >>= 7;
while (tmpint > 0) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) =
(u_char) ((tmpint & 0x7f) | 0x80);
tmpint >>= 7;
}
}
/*
* Combine the first two values.
*/
if ((objid[1] > 40) &&
(objid[0] < 2)) {
ERROR_MSG("build objid: bad second subidentifier");
return 0;
}
tmpint = ((objid[0] * 40) + objid[1]);
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) tmpint & 0x7f;
tmpint >>= 7;
while (tmpint > 0) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) =
(u_char) ((tmpint & 0x7f) | 0x80);
tmpint >>= 7;
}
}
tmpint = *offset - start_offset;
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r, type,
(*offset - start_offset))) {
if (_asn_realloc_build_header_check(errpre, pkt, pkt_len,
(*offset - start_offset))) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
(*offset - start_offset));
DEBUGMSG(("dumpv_send", " ObjID: "));
DEBUGMSGOID(("dumpv_send", objid, objidlength));
DEBUGMSG(("dumpv_send", "\n"));
return 1;
}
}
return 0;
}
/**
* @internal
* builds an ASN object containing an null object.
*
* @see asn_build_null
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_null(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r, u_char type)
{
/*
* ASN.1 null ::= 0x05 0x00
*/
size_t start_offset = *offset;
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r, type, 0)) {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
(*offset - start_offset));
DEBUGMSG(("dumpv_send", " NULL\n"));
return 1;
} else {
return 0;
}
}
/**
* @internal
* builds an ASN object containing an bitstring.
*
* @see asn_build_bitstring
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param string IN - pointer to the string
* @param strlength IN - length of the input
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_bitstring(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type,
const u_char * str, size_t strlength)
{
/*
* ASN.1 bit string ::= 0x03 asnlength unused {byte}*
*/
static const char *errpre = "build bitstring";
size_t start_offset = *offset;
while ((*pkt_len - *offset) < strlength) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
*offset += strlength;
memcpy(*pkt + *pkt_len - *offset, str, strlength);
if (asn_realloc_rbuild_header
(pkt, pkt_len, offset, r, type, strlength)) {
if (_asn_realloc_build_header_check
(errpre, pkt, pkt_len, strlength)) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
*offset - start_offset);
DEBUGIF("dumpv_send") {
if (strlength == 0) {
DEBUGMSG(("dumpv_send", " Bitstring: [NULL]\n"));
} else {
u_char *buf = (u_char *) malloc(2 * strlength);
size_t l =
(buf != NULL) ? (2 * strlength) : 0, ol = 0;
if (sprint_realloc_asciistring
(&buf, &l, &ol, 1, str, strlength)) {
DEBUGMSG(("dumpv_send", " Bitstring:\t%s\n",
buf));
} else {
if (buf == NULL) {
DEBUGMSG(("dumpv_send",
" Bitstring:\t[TRUNCATED]\n"));
} else {
DEBUGMSG(("dumpv_send",
" Bitstring:\t%s [TRUNCATED]\n",
buf));
}
}
if (buf != NULL) {
free(buf);
}
}
}
}
return 1;
}
return 0;
}
/**
* @internal
* builds an ASN object containing an unsigned int64.
*
* @see asn_build_unsigned_int64
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param cp IN - pointer to counter struct
* @param countersize IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_unsigned_int64(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type,
const struct counter64 *cp, size_t countersize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
register u_long low = cp->low, high = cp->high;
size_t intsize, start_offset = *offset;
int count;
if (countersize != sizeof(struct counter64)) {
_asn_size_err("build uint64", countersize,
sizeof(struct counter64));
return 0;
}
CHECK_OVERFLOW_U(high,13);
CHECK_OVERFLOW_U(low,13);
/*
* Encode the low 4 bytes first.
*/
if (((*pkt_len - *offset) < 1) && !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) low;
low >>= 8;
count = 1;
while (low != 0) {
count++;
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) low;
low >>= 8;
}
/*
* Then the high byte if present.
*/
if (high) {
/*
* Do the rest of the low byte.
*/
for (; count < 4; count++) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = 0;
}
/*
* Do high byte.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) high;
high >>= 8;
while (high != 0) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) high;
high >>= 8;
}
}
if ((*(*pkt + *pkt_len - *offset) & 0x80) != (0 & 0x80)) {
/*
* Make sure left most bit is representational of the rest of the bits
* that aren't encoded.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = 0;
}
intsize = *offset - start_offset;
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
/*
* Encode a Counter64 as an opaque (it also works in SNMPv1).
*/
if (type == ASN_OPAQUE_COUNTER64) {
while ((*pkt_len - *offset) < 5) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) intsize;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_COUNTER64;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_TAG1;
/*
* Put the tag and length for the Opaque wrapper.
*/
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r,
ASN_OPAQUE, intsize + 3)) {
if (_asn_realloc_build_header_check
("build counter u64", pkt, pkt_len, intsize + 3)) {
return 0;
}
} else {
return 0;
}
} else if (type == ASN_OPAQUE_U64) {
/*
* Encode the Unsigned int64 in an opaque.
*/
while ((*pkt_len - *offset) < 5) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) intsize;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_U64;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_TAG1;
/*
* Put the tag and length for the Opaque wrapper.
*/
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r,
ASN_OPAQUE, intsize + 3)) {
if (_asn_realloc_build_header_check
("build counter u64", pkt, pkt_len, intsize + 3)) {
return 0;
}
} else {
return 0;
}
} else {
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
if (asn_realloc_rbuild_header
(pkt, pkt_len, offset, r, type, intsize)) {
if (_asn_realloc_build_header_check
("build uint64", pkt, pkt_len, intsize)) {
return 0;
}
} else {
return 0;
}
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
}
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset), intsize);
DEBUGMSG(("dumpv_send", " U64:\t%lu %lu\n", cp->high, cp->low));
return 1;
}
#ifdef NETSNMP_WITH_OPAQUE_SPECIAL_TYPES
/**
* @internal
* builds an ASN object containing an signed int64.
*
* @see asn_build_signed_int64
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param cp IN - pointer to counter struct
* @param countersize IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_signed_int64(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type,
const struct counter64 *cp, size_t countersize)
{
/*
* ASN.1 integer ::= 0x02 asnlength byte {byte}*
*/
register long low = cp->low, high = cp->high;
size_t intsize, start_offset = *offset;
int count, testvalue = (high & 0x80000000) ? -1 : 0;
if (countersize != sizeof(struct counter64)) {
_asn_size_err("build uint64", countersize,
sizeof(struct counter64));
return 0;
}
CHECK_OVERFLOW_S(high,14);
CHECK_OVERFLOW_U(low,14);
/*
* Encode the low 4 bytes first.
*/
if (((*pkt_len - *offset) < 1) && !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) low;
low >>= 8;
count = 1;
while ((int) low != testvalue && count < 4) {
count++;
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) low;
low >>= 8;
}
/*
* Then the high byte if present.
*/
if (high != testvalue) {
/*
* Do the rest of the low byte.
*/
for (; count < 4; count++) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (testvalue == 0) ? 0 : 0xff;
}
/*
* Do high byte.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) high;
high >>= 8;
while ((int) high != testvalue) {
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) high;
high >>= 8;
}
}
if ((*(*pkt + *pkt_len - *offset) & 0x80) != (testvalue & 0x80)) {
/*
* Make sure left most bit is representational of the rest of the bits
* that aren't encoded.
*/
if (((*pkt_len - *offset) < 1)
&& !(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
*(*pkt + *pkt_len - (++*offset)) = (testvalue == 0) ? 0 : 0xff;
}
intsize = *offset - start_offset;
while ((*pkt_len - *offset) < 5) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
*(*pkt + *pkt_len - (++*offset)) = (u_char) intsize;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_I64;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_TAG1;
/*
* Put the tag and length for the Opaque wrapper.
*/
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r,
ASN_OPAQUE, intsize + 3)) {
if (_asn_realloc_build_header_check
("build counter u64", pkt, pkt_len, intsize + 3)) {
return 0;
}
} else {
return 0;
}
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset), intsize);
DEBUGMSG(("dumpv_send", " UInt64:\t%lu %lu\n", cp->high, cp->low));
return 1;
}
/**
* @internal
* builds an ASN object containing an float.
*
* @see asn_build_float
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param floatp IN - pointer to the float
* @param floatsize IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_float(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type, const float *floatp, size_t floatsize)
{
size_t start_offset = *offset;
union {
float floatVal;
int intVal;
u_char c[sizeof(float)];
} fu;
/*
* Floatsize better not be larger than realistic.
*/
if (floatsize != sizeof(float) || floatsize > 122) {
return 0;
}
while ((*pkt_len - *offset) < floatsize + 3) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
/*
* Correct for endian differences and copy value.
*/
fu.floatVal = *floatp;
fu.intVal = htonl(fu.intVal);
*offset += floatsize;
memcpy(*pkt + *pkt_len - *offset, &(fu.c[0]), floatsize);
/*
* Put the special tag and length (3 bytes).
*/
*(*pkt + *pkt_len - (++*offset)) = (u_char) floatsize;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_FLOAT;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_TAG1;
/*
* Put the tag and length for the Opaque wrapper.
*/
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r,
ASN_OPAQUE, floatsize + 3)) {
if (_asn_realloc_build_header_check("build float", pkt, pkt_len,
floatsize + 3)) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
*offset - start_offset);
DEBUGMSG(("dumpv_send", "Opaque Float:\t%f\n", *floatp));
return 1;
}
}
return 0;
}
/**
* @internal
* builds an ASN object containing an double.
*
* @see asn_build_double
*
* @param pkt IN/OUT address of the begining of the buffer.
* @param pkt_len IN/OUT address to an integer containing the size of pkt.
* @param offset IN/OUT offset to the start of the buffer where to write
* @param r IN if not zero reallocate the buffer to fit the
* needed size.
* @param type IN - type of object
* @param doublep IN - pointer to double
* @param doublesize IN - size of input buffer
*
* @return 1 on success, 0 on error
*/
int
asn_realloc_rbuild_double(u_char ** pkt, size_t * pkt_len,
size_t * offset, int r,
u_char type, const double *doublep, size_t doublesize)
{
size_t start_offset = *offset;
long tmp;
union {
double doubleVal;
int intVal[2];
u_char c[sizeof(double)];
} fu;
/*
* Doublesize better not be larger than realistic.
*/
if (doublesize != sizeof(double) || doublesize > 122) {
return 0;
}
while ((*pkt_len - *offset) < doublesize + 3) {
if (!(r && asn_realloc(pkt, pkt_len))) {
return 0;
}
}
/*
* Correct for endian differences and copy value.
*/
fu.doubleVal = *doublep;
tmp = htonl(fu.intVal[0]);
fu.intVal[0] = htonl(fu.intVal[1]);
fu.intVal[1] = tmp;
*offset += doublesize;
memcpy(*pkt + *pkt_len - *offset, &(fu.c[0]), doublesize);
/*
* Put the special tag and length (3 bytes).
*/
*(*pkt + *pkt_len - (++*offset)) = (u_char) doublesize;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_DOUBLE;
*(*pkt + *pkt_len - (++*offset)) = ASN_OPAQUE_TAG1;
/*
* Put the tag and length for the Opaque wrapper.
*/
if (asn_realloc_rbuild_header(pkt, pkt_len, offset, r,
ASN_OPAQUE, doublesize + 3)) {
if (_asn_realloc_build_header_check("build float", pkt, pkt_len,
doublesize + 3)) {
return 0;
} else {
DEBUGDUMPSETUP("send", (*pkt + *pkt_len - *offset),
*offset - start_offset);
DEBUGMSG(("dumpv_send", " Opaque Double:\t%f\n", *doublep));
return 1;
}
}
return 0;
}
#endif /* NETSNMP_WITH_OPAQUE_SPECIAL_TYPES */
#endif /* NETSNMP_USE_REVERSE_ASNENCODING */
/**
* @}
*/