Fix warnings.
[openssl.git] / crypto / asn1 / tasn_dec.c
1 /* tasn_dec.c */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3  * project 2000.
4  */
5 /* ====================================================================
6  * Copyright (c) 2000-2005 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer. 
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com).
56  *
57  */
58
59
60 #include <stddef.h>
61 #include <string.h>
62 #include <openssl/asn1.h>
63 #include <openssl/asn1t.h>
64 #include <openssl/objects.h>
65 #include <openssl/buffer.h>
66 #include <openssl/err.h>
67
68 static int asn1_check_eoc(const unsigned char **in, long len);
69 static int asn1_find_end(const unsigned char **in, long len, char inf);
70
71 static int asn1_collect(BUF_MEM *buf, const unsigned char **in, long len,
72                         char inf, int tag, int aclass, int depth);
73
74 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen);
75
76 static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass,
77                                 char *inf, char *cst,
78                                 const unsigned char **in, long len,
79                                 int exptag, int expclass, char opt,
80                                 ASN1_TLC *ctx);
81
82 static int asn1_template_ex_d2i(ASN1_VALUE **pval,
83                                 const unsigned char **in, long len,
84                                 const ASN1_TEMPLATE *tt, char opt,
85                                 ASN1_TLC *ctx);
86 static int asn1_template_noexp_d2i(ASN1_VALUE **val,
87                                 const unsigned char **in, long len,
88                                 const ASN1_TEMPLATE *tt, char opt,
89                                 ASN1_TLC *ctx);
90 static int asn1_d2i_ex_primitive(ASN1_VALUE **pval,
91                                 const unsigned char **in, long len,
92                                 const ASN1_ITEM *it,
93                                 int tag, int aclass, char opt, ASN1_TLC *ctx);
94
95 /* Table to convert tags to bit values, used for MSTRING type */
96 static const unsigned long tag2bit[32] = {
97 0,      0,      0,      B_ASN1_BIT_STRING,      /* tags  0 -  3 */
98 B_ASN1_OCTET_STRING,    0,      0,              B_ASN1_UNKNOWN,/* tags  4- 7 */
99 B_ASN1_UNKNOWN, B_ASN1_UNKNOWN, B_ASN1_UNKNOWN, B_ASN1_UNKNOWN,/* tags  8-11 */
100 B_ASN1_UTF8STRING,B_ASN1_UNKNOWN,B_ASN1_UNKNOWN,B_ASN1_UNKNOWN,/* tags 12-15 */
101 B_ASN1_SEQUENCE,0,B_ASN1_NUMERICSTRING,B_ASN1_PRINTABLESTRING, /* tags 16-19 */
102 B_ASN1_T61STRING,B_ASN1_VIDEOTEXSTRING,B_ASN1_IA5STRING,       /* tags 20-22 */
103 B_ASN1_UTCTIME, B_ASN1_GENERALIZEDTIME,                        /* tags 23-24 */ 
104 B_ASN1_GRAPHICSTRING,B_ASN1_ISO64STRING,B_ASN1_GENERALSTRING,  /* tags 25-27 */
105 B_ASN1_UNIVERSALSTRING,B_ASN1_UNKNOWN,B_ASN1_BMPSTRING,B_ASN1_UNKNOWN, /* tags 28-31 */
106         };
107
108 unsigned long ASN1_tag2bit(int tag)
109         {
110         if ((tag < 0) || (tag > 30)) return 0;
111         return tag2bit[tag];
112         }
113
114 /* Macro to initialize and invalidate the cache */
115
116 #define asn1_tlc_clear(c)       if (c) (c)->valid = 0
117 /* Version to avoid compiler warning about 'c' always non-NULL */
118 #define asn1_tlc_clear_nc(c)    (c)->valid = 0
119
120 /* Decode an ASN1 item, this currently behaves just 
121  * like a standard 'd2i' function. 'in' points to 
122  * a buffer to read the data from, in future we will
123  * have more advanced versions that can input data
124  * a piece at a time and this will simply be a special
125  * case.
126  */
127
128 ASN1_VALUE *ASN1_item_d2i(ASN1_VALUE **pval,
129                 const unsigned char **in, long len, const ASN1_ITEM *it)
130         {
131         ASN1_TLC c;
132         ASN1_VALUE *ptmpval = NULL;
133         if (!pval)
134                 pval = &ptmpval;
135         asn1_tlc_clear_nc(&c);
136         if (ASN1_item_ex_d2i(pval, in, len, it, -1, 0, 0, &c) > 0) 
137                 return *pval;
138         return NULL;
139         }
140
141 int ASN1_template_d2i(ASN1_VALUE **pval,
142                 const unsigned char **in, long len, const ASN1_TEMPLATE *tt)
143         {
144         ASN1_TLC c;
145         asn1_tlc_clear_nc(&c);
146         return asn1_template_ex_d2i(pval, in, len, tt, 0, &c);
147         }
148
149
150 /* Decode an item, taking care of IMPLICIT tagging, if any.
151  * If 'opt' set and tag mismatch return -1 to handle OPTIONAL
152  */
153
154 int ASN1_item_ex_d2i(ASN1_VALUE **pval, const unsigned char **in, long len,
155                         const ASN1_ITEM *it,
156                         int tag, int aclass, char opt, ASN1_TLC *ctx)
157         {
158         const ASN1_TEMPLATE *tt, *errtt = NULL;
159         const ASN1_COMPAT_FUNCS *cf;
160         const ASN1_EXTERN_FUNCS *ef;
161         const ASN1_AUX *aux = it->funcs;
162         ASN1_aux_cb *asn1_cb;
163         const unsigned char *p = NULL, *q;
164         unsigned char *wp=NULL; /* BIG FAT WARNING!  BREAKS CONST WHERE USED */
165         unsigned char imphack = 0, oclass;
166         char seq_eoc, seq_nolen, cst, isopt;
167         long tmplen;
168         int i;
169         int otag;
170         int ret = 0;
171         ASN1_VALUE **pchptr, *ptmpval;
172         if (!pval)
173                 return 0;
174         if (aux && aux->asn1_cb)
175                 asn1_cb = aux->asn1_cb;
176         else asn1_cb = 0;
177
178         switch(it->itype)
179                 {
180                 case ASN1_ITYPE_PRIMITIVE:
181                 if (it->templates)
182                         {
183                         /* tagging or OPTIONAL is currently illegal on an item
184                          * template because the flags can't get passed down.
185                          * In practice this isn't a problem: we include the
186                          * relevant flags from the item template in the
187                          * template itself.
188                          */
189                         if ((tag != -1) || opt)
190                                 {
191                                 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
192                                 ASN1_R_ILLEGAL_OPTIONS_ON_ITEM_TEMPLATE);
193                                 goto err;
194                                 }
195                         return asn1_template_ex_d2i(pval, in, len,
196                                         it->templates, opt, ctx);
197                 }
198                 return asn1_d2i_ex_primitive(pval, in, len, it,
199                                                 tag, aclass, opt, ctx);
200                 break;
201
202                 case ASN1_ITYPE_MSTRING:
203                 p = *in;
204                 /* Just read in tag and class */
205                 ret = asn1_check_tlen(NULL, &otag, &oclass, NULL, NULL,
206                                                 &p, len, -1, 0, 1, ctx);
207                 if (!ret)
208                         {
209                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
210                                         ERR_R_NESTED_ASN1_ERROR);
211                         goto err;
212                         }
213
214                 /* Must be UNIVERSAL class */
215                 if (oclass != V_ASN1_UNIVERSAL)
216                         {
217                         /* If OPTIONAL, assume this is OK */
218                         if (opt) return -1;
219                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
220                                         ASN1_R_MSTRING_NOT_UNIVERSAL);
221                         goto err;
222                         }
223                 /* Check tag matches bit map */
224                 if (!(ASN1_tag2bit(otag) & it->utype))
225                         {
226                         /* If OPTIONAL, assume this is OK */
227                         if (opt)
228                                 return -1;
229                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
230                                         ASN1_R_MSTRING_WRONG_TAG);
231                         goto err;
232                         }
233                 return asn1_d2i_ex_primitive(pval, in, len,
234                                                 it, otag, 0, 0, ctx);
235
236                 case ASN1_ITYPE_EXTERN:
237                 /* Use new style d2i */
238                 ef = it->funcs;
239                 return ef->asn1_ex_d2i(pval, in, len,
240                                                 it, tag, aclass, opt, ctx);
241
242                 case ASN1_ITYPE_COMPAT:
243                 /* we must resort to old style evil hackery */
244                 cf = it->funcs;
245
246                 /* If OPTIONAL see if it is there */
247                 if (opt)
248                         {
249                         int exptag;
250                         p = *in;
251                         if (tag == -1)
252                                 exptag = it->utype;
253                         else exptag = tag;
254                         /* Don't care about anything other than presence
255                          * of expected tag */
256
257                         ret = asn1_check_tlen(NULL, NULL, NULL, NULL, NULL,
258                                         &p, len, exptag, aclass, 1, ctx);
259                         if (!ret)
260                                 {
261                                 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
262                                         ERR_R_NESTED_ASN1_ERROR);
263                                 goto err;
264                                 }
265                         if (ret == -1)
266                                 return -1;
267                         }
268
269                 /* This is the old style evil hack IMPLICIT handling:
270                  * since the underlying code is expecting a tag and
271                  * class other than the one present we change the
272                  * buffer temporarily then change it back afterwards.
273                  * This doesn't and never did work for tags > 30.
274                  *
275                  * Yes this is *horrible* but it is only needed for
276                  * old style d2i which will hopefully not be around
277                  * for much longer.
278                  * FIXME: should copy the buffer then modify it so
279                  * the input buffer can be const: we should *always*
280                  * copy because the old style d2i might modify the
281                  * buffer.
282                  */
283
284                 if (tag != -1)
285                         {
286                         wp = *(unsigned char **)in;
287                         imphack = *wp;
288                         if (p == NULL)
289                                 {
290                                 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
291                                         ERR_R_NESTED_ASN1_ERROR);
292                                 goto err;
293                                 }
294                         *wp = (unsigned char)((*p & V_ASN1_CONSTRUCTED)
295                                                                 | it->utype);
296                         }
297
298                 ptmpval = cf->asn1_d2i(pval, in, len);
299
300                 if (tag != -1)
301                         *wp = imphack;
302
303                 if (ptmpval)
304                         return 1;
305
306                 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ERR_R_NESTED_ASN1_ERROR);
307                 goto err;
308
309
310                 case ASN1_ITYPE_CHOICE:
311                 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_PRE, pval, it, NULL))
312                                 goto auxerr;
313
314                 /* Allocate structure */
315                 if (!*pval && !ASN1_item_ex_new(pval, it))
316                         {
317                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
318                                                 ERR_R_NESTED_ASN1_ERROR);
319                         goto err;
320                         }
321                 /* CHOICE type, try each possibility in turn */
322                 p = *in;
323                 for (i = 0, tt=it->templates; i < it->tcount; i++, tt++)
324                         {
325                         pchptr = asn1_get_field_ptr(pval, tt);
326                         /* We mark field as OPTIONAL so its absence
327                          * can be recognised.
328                          */
329                         ret = asn1_template_ex_d2i(pchptr, &p, len, tt, 1, ctx);
330                         /* If field not present, try the next one */
331                         if (ret == -1)
332                                 continue;
333                         /* If positive return, read OK, break loop */
334                         if (ret > 0)
335                                 break;
336                         /* Otherwise must be an ASN1 parsing error */
337                         errtt = tt;
338                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
339                                                 ERR_R_NESTED_ASN1_ERROR);
340                         goto err;
341                         }
342
343                 /* Did we fall off the end without reading anything? */
344                 if (i == it->tcount)
345                         {
346                         /* If OPTIONAL, this is OK */
347                         if (opt)
348                                 {
349                                 /* Free and zero it */
350                                 ASN1_item_ex_free(pval, it);
351                                 return -1;
352                                 }
353                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
354                                         ASN1_R_NO_MATCHING_CHOICE_TYPE);
355                         goto err;
356                         }
357
358                 asn1_set_choice_selector(pval, i, it);
359                 *in = p;
360                 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_POST, pval, it, NULL))
361                                 goto auxerr;
362                 return 1;
363
364                 case ASN1_ITYPE_NDEF_SEQUENCE:
365                 case ASN1_ITYPE_SEQUENCE:
366                 p = *in;
367                 tmplen = len;
368
369                 /* If no IMPLICIT tagging set to SEQUENCE, UNIVERSAL */
370                 if (tag == -1)
371                         {
372                         tag = V_ASN1_SEQUENCE;
373                         aclass = V_ASN1_UNIVERSAL;
374                         }
375                 /* Get SEQUENCE length and update len, p */
376                 ret = asn1_check_tlen(&len, NULL, NULL, &seq_eoc, &cst,
377                                         &p, len, tag, aclass, opt, ctx);
378                 if (!ret)
379                         {
380                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
381                                         ERR_R_NESTED_ASN1_ERROR);
382                         goto err;
383                         }
384                 else if (ret == -1)
385                         return -1;
386                 if (aux && (aux->flags & ASN1_AFLG_BROKEN))
387                         {
388                         len = tmplen - (p - *in);
389                         seq_nolen = 1;
390                         }
391                 /* If indefinite we don't do a length check */
392                 else seq_nolen = seq_eoc;
393                 if (!cst)
394                         {
395                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
396                                 ASN1_R_SEQUENCE_NOT_CONSTRUCTED);
397                         goto err;
398                         }
399
400                 if (!*pval && !ASN1_item_ex_new(pval, it))
401                         {
402                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
403                                 ERR_R_NESTED_ASN1_ERROR);
404                         goto err;
405                         }
406
407                 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_PRE, pval, it, NULL))
408                                 goto auxerr;
409
410                 /* Get each field entry */
411                 for (i = 0, tt = it->templates; i < it->tcount; i++, tt++)
412                         {
413                         const ASN1_TEMPLATE *seqtt;
414                         ASN1_VALUE **pseqval;
415                         seqtt = asn1_do_adb(pval, tt, 1);
416                         if (!seqtt)
417                                 goto err;
418                         pseqval = asn1_get_field_ptr(pval, seqtt);
419                         /* Have we ran out of data? */
420                         if (!len)
421                                 break;
422                         q = p;
423                         if (asn1_check_eoc(&p, len))
424                                 {
425                                 if (!seq_eoc)
426                                         {
427                                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
428                                                         ASN1_R_UNEXPECTED_EOC);
429                                         goto err;
430                                         }
431                                 len -= p - q;
432                                 seq_eoc = 0;
433                                 q = p;
434                                 break;
435                                 }
436                         /* This determines the OPTIONAL flag value. The field
437                          * cannot be omitted if it is the last of a SEQUENCE
438                          * and there is still data to be read. This isn't
439                          * strictly necessary but it increases efficiency in
440                          * some cases.
441                          */
442                         if (i == (it->tcount - 1))
443                                 isopt = 0;
444                         else isopt = (char)(seqtt->flags & ASN1_TFLG_OPTIONAL);
445                         /* attempt to read in field, allowing each to be
446                          * OPTIONAL */
447
448                         ret = asn1_template_ex_d2i(pseqval, &p, len,
449                                                         seqtt, isopt, ctx);
450                         if (!ret)
451                                 {
452                                 errtt = seqtt;
453                                 goto err;
454                                 }
455                         else if (ret == -1)
456                                 {
457                                 /* OPTIONAL component absent.
458                                  * Free and zero the field.
459                                  */
460                                 ASN1_template_free(pseqval, seqtt);
461                                 continue;
462                                 }
463                         /* Update length */
464                         len -= p - q;
465                         }
466
467                 /* Check for EOC if expecting one */
468                 if (seq_eoc && !asn1_check_eoc(&p, len))
469                         {
470                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_MISSING_EOC);
471                         goto err;
472                         }
473                 /* Check all data read */
474                 if (!seq_nolen && len)
475                         {
476                         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
477                                         ASN1_R_SEQUENCE_LENGTH_MISMATCH);
478                         goto err;
479                         }
480
481                 /* If we get here we've got no more data in the SEQUENCE,
482                  * however we may not have read all fields so check all
483                  * remaining are OPTIONAL and clear any that are.
484                  */
485                 for (; i < it->tcount; tt++, i++)
486                         {
487                         const ASN1_TEMPLATE *seqtt;
488                         seqtt = asn1_do_adb(pval, tt, 1);
489                         if (!seqtt)
490                                 goto err;
491                         if (seqtt->flags & ASN1_TFLG_OPTIONAL)
492                                 {
493                                 ASN1_VALUE **pseqval;
494                                 pseqval = asn1_get_field_ptr(pval, seqtt);
495                                 ASN1_template_free(pseqval, seqtt);
496                                 }
497                         else
498                                 {
499                                 errtt = seqtt;
500                                 ASN1err(ASN1_F_ASN1_ITEM_EX_D2I,
501                                                         ASN1_R_FIELD_MISSING);
502                                 goto err;
503                                 }
504                         }
505                 /* Save encoding */
506                 if (!asn1_enc_save(pval, *in, p - *in, it))
507                         goto auxerr;
508                 *in = p;
509                 if (asn1_cb && !asn1_cb(ASN1_OP_D2I_POST, pval, it, NULL))
510                                 goto auxerr;
511                 return 1;
512
513                 default:
514                 return 0;
515                 }
516         auxerr:
517         ASN1err(ASN1_F_ASN1_ITEM_EX_D2I, ASN1_R_AUX_ERROR);
518         err:
519         ASN1_item_ex_free(pval, it);
520         if (errtt)
521                 ERR_add_error_data(4, "Field=", errtt->field_name,
522                                         ", Type=", it->sname);
523         else
524                 ERR_add_error_data(2, "Type=", it->sname);
525         return 0;
526         }
527
528 /* Templates are handled with two separate functions.
529  * One handles any EXPLICIT tag and the other handles the rest.
530  */
531
532 static int asn1_template_ex_d2i(ASN1_VALUE **val,
533                                 const unsigned char **in, long inlen,
534                                 const ASN1_TEMPLATE *tt, char opt,
535                                                         ASN1_TLC *ctx)
536         {
537         int flags, aclass;
538         int ret;
539         long len;
540         const unsigned char *p, *q;
541         char exp_eoc;
542         if (!val)
543                 return 0;
544         flags = tt->flags;
545         aclass = flags & ASN1_TFLG_TAG_CLASS;
546
547         p = *in;
548
549         /* Check if EXPLICIT tag expected */
550         if (flags & ASN1_TFLG_EXPTAG)
551                 {
552                 char cst;
553                 /* Need to work out amount of data available to the inner
554                  * content and where it starts: so read in EXPLICIT header to
555                  * get the info.
556                  */
557                 ret = asn1_check_tlen(&len, NULL, NULL, &exp_eoc, &cst,
558                                         &p, inlen, tt->tag, aclass, opt, ctx);
559                 q = p;
560                 if (!ret)
561                         {
562                         ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I,
563                                         ERR_R_NESTED_ASN1_ERROR);
564                         return 0;
565                         }
566                 else if (ret == -1)
567                         return -1;
568                 if (!cst)
569                         {
570                         ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I,
571                                         ASN1_R_EXPLICIT_TAG_NOT_CONSTRUCTED);
572                         return 0;
573                         }
574                 /* We've found the field so it can't be OPTIONAL now */
575                 ret = asn1_template_noexp_d2i(val, &p, len, tt, 0, ctx);
576                 if (!ret)
577                         {
578                         ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I,
579                                         ERR_R_NESTED_ASN1_ERROR);
580                         return 0;
581                         }
582                 /* We read the field in OK so update length */
583                 len -= p - q;
584                 if (exp_eoc)
585                         {
586                         /* If NDEF we must have an EOC here */
587                         if (!asn1_check_eoc(&p, len))
588                                 {
589                                 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I,
590                                                 ASN1_R_MISSING_EOC);
591                                 goto err;
592                                 }
593                         }
594                 else
595                         {
596                         /* Otherwise we must hit the EXPLICIT tag end or its
597                          * an error */
598                         if (len)
599                                 {
600                                 ASN1err(ASN1_F_ASN1_TEMPLATE_EX_D2I,
601                                         ASN1_R_EXPLICIT_LENGTH_MISMATCH);
602                                 goto err;
603                                 }
604                         }
605                 }
606                 else 
607                         return asn1_template_noexp_d2i(val, in, inlen,
608                                                                 tt, opt, ctx);
609
610         *in = p;
611         return 1;
612
613         err:
614         ASN1_template_free(val, tt);
615         return 0;
616         }
617
618 static int asn1_template_noexp_d2i(ASN1_VALUE **val,
619                                 const unsigned char **in, long len,
620                                 const ASN1_TEMPLATE *tt, char opt,
621                                 ASN1_TLC *ctx)
622         {
623         int flags, aclass;
624         int ret;
625         const unsigned char *p, *q;
626         if (!val)
627                 return 0;
628         flags = tt->flags;
629         aclass = flags & ASN1_TFLG_TAG_CLASS;
630
631         p = *in;
632         q = p;
633
634         if (flags & ASN1_TFLG_SK_MASK)
635                 {
636                 /* SET OF, SEQUENCE OF */
637                 int sktag, skaclass;
638                 char sk_eoc;
639                 /* First work out expected inner tag value */
640                 if (flags & ASN1_TFLG_IMPTAG)
641                         {
642                         sktag = tt->tag;
643                         skaclass = aclass;
644                         }
645                 else
646                         {
647                         skaclass = V_ASN1_UNIVERSAL;
648                         if (flags & ASN1_TFLG_SET_OF)
649                                 sktag = V_ASN1_SET;
650                         else
651                                 sktag = V_ASN1_SEQUENCE;
652                         }
653                 /* Get the tag */
654                 ret = asn1_check_tlen(&len, NULL, NULL, &sk_eoc, NULL,
655                                         &p, len, sktag, skaclass, opt, ctx);
656                 if (!ret)
657                         {
658                         ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
659                                                 ERR_R_NESTED_ASN1_ERROR);
660                         return 0;
661                         }
662                 else if (ret == -1)
663                         return -1;
664                 if (!*val)
665                         *val = (ASN1_VALUE *)sk_new_null();
666                 else
667                         {
668                         /* We've got a valid STACK: free up any items present */
669                         STACK_OF(ASN1_VALUE) *sktmp
670                             = (STACK_OF(ASN1_VALUE) *)*val;
671                         ASN1_VALUE *vtmp;
672                         while(sk_ASN1_VALUE_num(sktmp) > 0)
673                                 {
674                                 vtmp = sk_ASN1_VALUE_pop(sktmp);
675                                 ASN1_item_ex_free(&vtmp,
676                                                 ASN1_ITEM_ptr(tt->item));
677                                 }
678                         }
679                                 
680                 if (!*val)
681                         {
682                         ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
683                                                 ERR_R_MALLOC_FAILURE);
684                         goto err;
685                         }
686
687                 /* Read as many items as we can */
688                 while(len > 0)
689                         {
690                         ASN1_VALUE *skfield;
691                         q = p;
692                         /* See if EOC found */
693                         if (asn1_check_eoc(&p, len))
694                                 {
695                                 if (!sk_eoc)
696                                         {
697                                         ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
698                                                         ASN1_R_UNEXPECTED_EOC);
699                                         goto err;
700                                         }
701                                 len -= p - q;
702                                 sk_eoc = 0;
703                                 break;
704                                 }
705                         skfield = NULL;
706                         if (!ASN1_item_ex_d2i(&skfield, &p, len,
707                                                 ASN1_ITEM_ptr(tt->item),
708                                                 -1, 0, 0, ctx))
709                                 {
710                                 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
711                                         ERR_R_NESTED_ASN1_ERROR);
712                                 goto err;
713                                 }
714                         len -= p - q;
715                         if (!sk_ASN1_VALUE_push((STACK_OF(ASN1_VALUE) *)*val,
716                                                 skfield))
717                                 {
718                                 ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
719                                                 ERR_R_MALLOC_FAILURE);
720                                 goto err;
721                                 }
722                         }
723                 if (sk_eoc)
724                         {
725                         ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I, ASN1_R_MISSING_EOC);
726                         goto err;
727                         }
728                 }
729         else if (flags & ASN1_TFLG_IMPTAG)
730                 {
731                 /* IMPLICIT tagging */
732                 ret = ASN1_item_ex_d2i(val, &p, len,
733                         ASN1_ITEM_ptr(tt->item), tt->tag, aclass, opt, ctx);
734                 if (!ret)
735                         {
736                         ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
737                                                 ERR_R_NESTED_ASN1_ERROR);
738                         goto err;
739                         }
740                 else if (ret == -1)
741                         return -1;
742                 }
743         else
744                 {
745                 /* Nothing special */
746                 ret = ASN1_item_ex_d2i(val, &p, len, ASN1_ITEM_ptr(tt->item),
747                                                         -1, 0, opt, ctx);
748                 if (!ret)
749                         {
750                         ASN1err(ASN1_F_ASN1_TEMPLATE_NOEXP_D2I,
751                                         ERR_R_NESTED_ASN1_ERROR);
752                         goto err;
753                         }
754                 else if (ret == -1)
755                         return -1;
756                 }
757
758         *in = p;
759         return 1;
760
761         err:
762         ASN1_template_free(val, tt);
763         return 0;
764         }
765
766 static int asn1_d2i_ex_primitive(ASN1_VALUE **pval,
767                                 const unsigned char **in, long inlen, 
768                                 const ASN1_ITEM *it,
769                                 int tag, int aclass, char opt, ASN1_TLC *ctx)
770         {
771         int ret = 0, utype;
772         long plen;
773         char cst, inf, free_cont = 0;
774         const unsigned char *p;
775         BUF_MEM buf;
776         const unsigned char *cont = NULL;
777         long len; 
778         if (!pval)
779                 {
780                 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, ASN1_R_ILLEGAL_NULL);
781                 return 0; /* Should never happen */
782                 }
783
784         if (it->itype == ASN1_ITYPE_MSTRING)
785                 {
786                 utype = tag;
787                 tag = -1;
788                 }
789         else
790                 utype = it->utype;
791
792         if (utype == V_ASN1_ANY)
793                 {
794                 /* If type is ANY need to figure out type from tag */
795                 unsigned char oclass;
796                 if (tag >= 0)
797                         {
798                         ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE,
799                                         ASN1_R_ILLEGAL_TAGGED_ANY);
800                         return 0;
801                         }
802                 if (opt)
803                         {
804                         ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE,
805                                         ASN1_R_ILLEGAL_OPTIONAL_ANY);
806                         return 0;
807                         }
808                 p = *in;
809                 ret = asn1_check_tlen(NULL, &utype, &oclass, NULL, NULL,
810                                         &p, inlen, -1, 0, 0, ctx);
811                 if (!ret)
812                         {
813                         ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE,
814                                         ERR_R_NESTED_ASN1_ERROR);
815                         return 0;
816                         }
817                 if (oclass != V_ASN1_UNIVERSAL)
818                         utype = V_ASN1_OTHER;
819                 }
820         if (tag == -1)
821                 {
822                 tag = utype;
823                 aclass = V_ASN1_UNIVERSAL;
824                 }
825         p = *in;
826         /* Check header */
827         ret = asn1_check_tlen(&plen, NULL, NULL, &inf, &cst,
828                                 &p, inlen, tag, aclass, opt, ctx);
829         if (!ret)
830                 {
831                 ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE, ERR_R_NESTED_ASN1_ERROR);
832                 return 0;
833                 }
834         else if (ret == -1)
835                 return -1;
836         ret = 0;
837         /* SEQUENCE, SET and "OTHER" are left in encoded form */
838         if ((utype == V_ASN1_SEQUENCE)
839                 || (utype == V_ASN1_SET) || (utype == V_ASN1_OTHER))
840                 {
841                 /* Clear context cache for type OTHER because the auto clear
842                  * when we have a exact match wont work
843                  */
844                 if (utype == V_ASN1_OTHER)
845                         {
846                         asn1_tlc_clear(ctx);
847                         }
848                 /* SEQUENCE and SET must be constructed */
849                 else if (!cst)
850                         {
851                         ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE,
852                                 ASN1_R_TYPE_NOT_CONSTRUCTED);
853                         return 0;
854                         }
855
856                 cont = *in;
857                 /* If indefinite length constructed find the real end */
858                 if (inf)
859                         {
860                         if (!asn1_find_end(&p, plen, inf))
861                                  goto err;
862                         len = p - cont;
863                         }
864                 else
865                         {
866                         len = p - cont + plen;
867                         p += plen;
868                         buf.data = NULL;
869                         }
870                 }
871         else if (cst)
872                 {
873                 buf.length = 0;
874                 buf.max = 0;
875                 buf.data = NULL;
876                 /* Should really check the internal tags are correct but
877                  * some things may get this wrong. The relevant specs
878                  * say that constructed string types should be OCTET STRINGs
879                  * internally irrespective of the type. So instead just check
880                  * for UNIVERSAL class and ignore the tag.
881                  */
882                 if (!asn1_collect(&buf, &p, plen, inf, -1, V_ASN1_UNIVERSAL, 0))
883                         {
884                         free_cont = 1;
885                         goto err;
886                         }
887                 len = buf.length;
888                 /* Append a final null to string */
889                 if (!BUF_MEM_grow_clean(&buf, len + 1))
890                         {
891                         ASN1err(ASN1_F_ASN1_D2I_EX_PRIMITIVE,
892                                                 ERR_R_MALLOC_FAILURE);
893                         return 0;
894                         }
895                 buf.data[len] = 0;
896                 cont = (const unsigned char *)buf.data;
897                 free_cont = 1;
898                 }
899         else
900                 {
901                 cont = p;
902                 len = plen;
903                 p += plen;
904                 }
905
906         /* We now have content length and type: translate into a structure */
907         if (!asn1_ex_c2i(pval, cont, len, utype, &free_cont, it))
908                 goto err;
909
910         *in = p;
911         ret = 1;
912         err:
913         if (free_cont && buf.data) OPENSSL_free(buf.data);
914         return ret;
915         }
916
917 /* Translate ASN1 content octets into a structure */
918
919 int asn1_ex_c2i(ASN1_VALUE **pval, const unsigned char *cont, int len,
920                         int utype, char *free_cont, const ASN1_ITEM *it)
921         {
922         ASN1_VALUE **opval = NULL;
923         ASN1_STRING *stmp;
924         ASN1_TYPE *typ = NULL;
925         int ret = 0;
926         const ASN1_PRIMITIVE_FUNCS *pf;
927         ASN1_INTEGER **tint;
928         pf = it->funcs;
929
930         if (pf && pf->prim_c2i)
931                 return pf->prim_c2i(pval, cont, len, utype, free_cont, it);
932         /* If ANY type clear type and set pointer to internal value */
933         if (it->utype == V_ASN1_ANY)
934                 {
935                 if (!*pval)
936                         {
937                         typ = ASN1_TYPE_new();
938                         if (typ == NULL)
939                                 goto err;
940                         *pval = (ASN1_VALUE *)typ;
941                         }
942                 else
943                         typ = (ASN1_TYPE *)*pval;
944
945                 if (utype != typ->type)
946                         ASN1_TYPE_set(typ, utype, NULL);
947                 opval = pval;
948                 pval = &typ->value.asn1_value;
949                 }
950         switch(utype)
951                 {
952                 case V_ASN1_OBJECT:
953                 if (!c2i_ASN1_OBJECT((ASN1_OBJECT **)pval, &cont, len))
954                         goto err;
955                 break;
956
957                 case V_ASN1_NULL:
958                 if (len)
959                         {
960                         ASN1err(ASN1_F_ASN1_EX_C2I,
961                                                 ASN1_R_NULL_IS_WRONG_LENGTH);
962                         goto err;
963                         }
964                 *pval = (ASN1_VALUE *)1;
965                 break;
966
967                 case V_ASN1_BOOLEAN:
968                 if (len != 1)
969                         {
970                         ASN1err(ASN1_F_ASN1_EX_C2I,
971                                                 ASN1_R_BOOLEAN_IS_WRONG_LENGTH);
972                         goto err;
973                         }
974                 else
975                         {
976                         ASN1_BOOLEAN *tbool;
977                         tbool = (ASN1_BOOLEAN *)pval;
978                         *tbool = *cont;
979                         }
980                 break;
981
982                 case V_ASN1_BIT_STRING:
983                 if (!c2i_ASN1_BIT_STRING((ASN1_BIT_STRING **)pval, &cont, len))
984                         goto err;
985                 break;
986
987                 case V_ASN1_INTEGER:
988                 case V_ASN1_NEG_INTEGER:
989                 case V_ASN1_ENUMERATED:
990                 case V_ASN1_NEG_ENUMERATED:
991                 tint = (ASN1_INTEGER **)pval;
992                 if (!c2i_ASN1_INTEGER(tint, &cont, len))
993                         goto err;
994                 /* Fixup type to match the expected form */
995                 (*tint)->type = utype | ((*tint)->type & V_ASN1_NEG);
996                 break;
997
998                 case V_ASN1_OCTET_STRING:
999                 case V_ASN1_NUMERICSTRING:
1000                 case V_ASN1_PRINTABLESTRING:
1001                 case V_ASN1_T61STRING:
1002                 case V_ASN1_VIDEOTEXSTRING:
1003                 case V_ASN1_IA5STRING:
1004                 case V_ASN1_UTCTIME:
1005                 case V_ASN1_GENERALIZEDTIME:
1006                 case V_ASN1_GRAPHICSTRING:
1007                 case V_ASN1_VISIBLESTRING:
1008                 case V_ASN1_GENERALSTRING:
1009                 case V_ASN1_UNIVERSALSTRING:
1010                 case V_ASN1_BMPSTRING:
1011                 case V_ASN1_UTF8STRING:
1012                 case V_ASN1_OTHER:
1013                 case V_ASN1_SET:
1014                 case V_ASN1_SEQUENCE:
1015                 default:
1016                 if (utype == V_ASN1_BMPSTRING && (len & 1))
1017                         {
1018                         ASN1err(ASN1_F_ASN1_EX_C2I,
1019                                         ASN1_R_BMPSTRING_IS_WRONG_LENGTH);
1020                         goto err;
1021                         }
1022                 if (utype == V_ASN1_UNIVERSALSTRING && (len & 3))
1023                         {
1024                         ASN1err(ASN1_F_ASN1_EX_C2I,
1025                                         ASN1_R_UNIVERSALSTRING_IS_WRONG_LENGTH);
1026                         goto err;
1027                         }
1028                 /* All based on ASN1_STRING and handled the same */
1029                 if (!*pval)
1030                         {
1031                         stmp = ASN1_STRING_type_new(utype);
1032                         if (!stmp)
1033                                 {
1034                                 ASN1err(ASN1_F_ASN1_EX_C2I,
1035                                                         ERR_R_MALLOC_FAILURE);
1036                                 goto err;
1037                                 }
1038                         *pval = (ASN1_VALUE *)stmp;
1039                         }
1040                 else
1041                         {
1042                         stmp = (ASN1_STRING *)*pval;
1043                         stmp->type = utype;
1044                         }
1045                 /* If we've already allocated a buffer use it */
1046                 if (*free_cont)
1047                         {
1048                         if (stmp->data)
1049                                 OPENSSL_free(stmp->data);
1050                         stmp->data = (unsigned char *)cont; /* UGLY CAST! RL */
1051                         stmp->length = len;
1052                         *free_cont = 0;
1053                         }
1054                 else
1055                         {
1056                         if (!ASN1_STRING_set(stmp, cont, len))
1057                                 {
1058                                 ASN1err(ASN1_F_ASN1_EX_C2I,
1059                                                         ERR_R_MALLOC_FAILURE);
1060                                 ASN1_STRING_free(stmp); 
1061                                 *pval = NULL;
1062                                 goto err;
1063                                 }
1064                         }
1065                 break;
1066                 }
1067         /* If ASN1_ANY and NULL type fix up value */
1068         if (typ && (utype == V_ASN1_NULL))
1069                  typ->value.ptr = NULL;
1070
1071         ret = 1;
1072         err:
1073         if (!ret)
1074                 {
1075                 ASN1_TYPE_free(typ);
1076                 if (opval)
1077                         *opval = NULL;
1078                 }
1079         return ret;
1080         }
1081
1082
1083 /* This function finds the end of an ASN1 structure when passed its maximum
1084  * length, whether it is indefinite length and a pointer to the content.
1085  * This is more efficient than calling asn1_collect because it does not
1086  * recurse on each indefinite length header.
1087  */
1088
1089 static int asn1_find_end(const unsigned char **in, long len, char inf)
1090         {
1091         int expected_eoc;
1092         long plen;
1093         const unsigned char *p = *in, *q;
1094         /* If not indefinite length constructed just add length */
1095         if (inf == 0)
1096                 {
1097                 *in += len;
1098                 return 1;
1099                 }
1100         expected_eoc = 1;
1101         /* Indefinite length constructed form. Find the end when enough EOCs
1102          * are found. If more indefinite length constructed headers
1103          * are encountered increment the expected eoc count otherwise just
1104          * skip to the end of the data.
1105          */
1106         while (len > 0)
1107                 {
1108                 if(asn1_check_eoc(&p, len))
1109                         {
1110                         expected_eoc--;
1111                         if (expected_eoc == 0)
1112                                 break;
1113                         len -= 2;
1114                         continue;
1115                         }
1116                 q = p;
1117                 /* Just read in a header: only care about the length */
1118                 if(!asn1_check_tlen(&plen, NULL, NULL, &inf, NULL, &p, len,
1119                                 -1, 0, 0, NULL))
1120                         {
1121                         ASN1err(ASN1_F_ASN1_FIND_END, ERR_R_NESTED_ASN1_ERROR);
1122                         return 0;
1123                         }
1124                 if (inf)
1125                         expected_eoc++;
1126                 else
1127                         p += plen;
1128                 len -= p - q;
1129                 }
1130         if (expected_eoc)
1131                 {
1132                 ASN1err(ASN1_F_ASN1_FIND_END, ASN1_R_MISSING_EOC);
1133                 return 0;
1134                 }
1135         *in = p;
1136         return 1;
1137         }
1138 /* This function collects the asn1 data from a constructred string
1139  * type into a buffer. The values of 'in' and 'len' should refer
1140  * to the contents of the constructed type and 'inf' should be set
1141  * if it is indefinite length.
1142  */
1143
1144 #ifndef ASN1_MAX_STRING_NEST
1145 /* This determines how many levels of recursion are permitted in ASN1
1146  * string types. If it is not limited stack overflows can occur. If set
1147  * to zero no recursion is allowed at all. Although zero should be adequate
1148  * examples exist that require a value of 1. So 5 should be more than enough.
1149  */
1150 #define ASN1_MAX_STRING_NEST 5
1151 #endif
1152
1153
1154 static int asn1_collect(BUF_MEM *buf, const unsigned char **in, long len,
1155                         char inf, int tag, int aclass, int depth)
1156         {
1157         const unsigned char *p, *q;
1158         long plen;
1159         char cst, ininf;
1160         p = *in;
1161         inf &= 1;
1162         /* If no buffer and not indefinite length constructed just pass over
1163          * the encoded data */
1164         if (!buf && !inf)
1165                 {
1166                 *in += len;
1167                 return 1;
1168                 }
1169         while(len > 0)
1170                 {
1171                 q = p;
1172                 /* Check for EOC */
1173                 if (asn1_check_eoc(&p, len))
1174                         {
1175                         /* EOC is illegal outside indefinite length
1176                          * constructed form */
1177                         if (!inf)
1178                                 {
1179                                 ASN1err(ASN1_F_ASN1_COLLECT,
1180                                         ASN1_R_UNEXPECTED_EOC);
1181                                 return 0;
1182                                 }
1183                         inf = 0;
1184                         break;
1185                         }
1186
1187                 if (!asn1_check_tlen(&plen, NULL, NULL, &ininf, &cst, &p,
1188                                         len, tag, aclass, 0, NULL))
1189                         {
1190                         ASN1err(ASN1_F_ASN1_COLLECT, ERR_R_NESTED_ASN1_ERROR);
1191                         return 0;
1192                         }
1193
1194                 /* If indefinite length constructed update max length */
1195                 if (cst)
1196                         {
1197                         if (depth >= ASN1_MAX_STRING_NEST)
1198                                 {
1199                                 ASN1err(ASN1_F_ASN1_COLLECT,
1200                                         ASN1_R_NESTED_ASN1_STRING);
1201                                 return 0;
1202                                 }
1203                         if (!asn1_collect(buf, &p, plen, ininf, tag, aclass,
1204                                                 depth + 1))
1205                                 return 0;
1206                         }
1207                 else if (plen && !collect_data(buf, &p, plen))
1208                         return 0;
1209                 len -= p - q;
1210                 }
1211         if (inf)
1212                 {
1213                 ASN1err(ASN1_F_ASN1_COLLECT, ASN1_R_MISSING_EOC);
1214                 return 0;
1215                 }
1216         *in = p;
1217         return 1;
1218         }
1219
1220 static int collect_data(BUF_MEM *buf, const unsigned char **p, long plen)
1221         {
1222         int len;
1223         if (buf)
1224                 {
1225                 len = buf->length;
1226                 if (!BUF_MEM_grow_clean(buf, len + plen))
1227                         {
1228                         ASN1err(ASN1_F_COLLECT_DATA, ERR_R_MALLOC_FAILURE);
1229                         return 0;
1230                         }
1231                 memcpy(buf->data + len, *p, plen);
1232                 }
1233         *p += plen;
1234         return 1;
1235         }
1236
1237 /* Check for ASN1 EOC and swallow it if found */
1238
1239 static int asn1_check_eoc(const unsigned char **in, long len)
1240         {
1241         const unsigned char *p;
1242         if (len < 2) return 0;
1243         p = *in;
1244         if (!p[0] && !p[1])
1245                 {
1246                 *in += 2;
1247                 return 1;
1248                 }
1249         return 0;
1250         }
1251
1252 /* Check an ASN1 tag and length: a bit like ASN1_get_object
1253  * but it sets the length for indefinite length constructed
1254  * form, we don't know the exact length but we can set an
1255  * upper bound to the amount of data available minus the
1256  * header length just read.
1257  */
1258
1259 static int asn1_check_tlen(long *olen, int *otag, unsigned char *oclass,
1260                                 char *inf, char *cst,
1261                                 const unsigned char **in, long len,
1262                                 int exptag, int expclass, char opt,
1263                                 ASN1_TLC *ctx)
1264         {
1265         int i;
1266         int ptag, pclass;
1267         long plen;
1268         const unsigned char *p, *q;
1269         p = *in;
1270         q = p;
1271
1272         if (ctx && ctx->valid)
1273                 {
1274                 i = ctx->ret;
1275                 plen = ctx->plen;
1276                 pclass = ctx->pclass;
1277                 ptag = ctx->ptag;
1278                 p += ctx->hdrlen;
1279                 }
1280         else
1281                 {
1282                 i = ASN1_get_object(&p, &plen, &ptag, &pclass, len);
1283                 if (ctx)
1284                         {
1285                         ctx->ret = i;
1286                         ctx->plen = plen;
1287                         ctx->pclass = pclass;
1288                         ctx->ptag = ptag;
1289                         ctx->hdrlen = p - q;
1290                         ctx->valid = 1;
1291                         /* If definite length, and no error, length +
1292                          * header can't exceed total amount of data available. 
1293                          */
1294                         if (!(i & 0x81) && ((plen + ctx->hdrlen) > len))
1295                                 {
1296                                 ASN1err(ASN1_F_ASN1_CHECK_TLEN,
1297                                                         ASN1_R_TOO_LONG);
1298                                 asn1_tlc_clear(ctx);
1299                                 return 0;
1300                                 }
1301                         }
1302                 }
1303
1304         if (i & 0x80)
1305                 {
1306                 ASN1err(ASN1_F_ASN1_CHECK_TLEN, ASN1_R_BAD_OBJECT_HEADER);
1307                 asn1_tlc_clear(ctx);
1308                 return 0;
1309                 }
1310         if (exptag >= 0)
1311                 {
1312                 if ((exptag != ptag) || (expclass != pclass))
1313                         {
1314                         /* If type is OPTIONAL, not an error:
1315                          * indicate missing type.
1316                          */
1317                         if (opt) return -1;
1318                         asn1_tlc_clear(ctx);
1319                         ASN1err(ASN1_F_ASN1_CHECK_TLEN, ASN1_R_WRONG_TAG);
1320                         return 0;
1321                         }
1322                 /* We have a tag and class match:
1323                  * assume we are going to do something with it */
1324                 asn1_tlc_clear(ctx);
1325                 }
1326
1327         if (i & 1)
1328                 plen = len - (p - q);
1329
1330         if (inf)
1331                 *inf = i & 1;
1332
1333         if (cst)
1334                 *cst = i & V_ASN1_CONSTRUCTED;
1335
1336         if (olen)
1337                 *olen = plen;
1338
1339         if (oclass)
1340                 *oclass = pclass;
1341
1342         if (otag)
1343                 *otag = ptag;
1344
1345         *in = p;
1346         return 1;
1347         }