sm: Another partly rewrite of minip12.c

* sm/minip12.c (struct tlv_ctx_s): Add origbuffer and origbufsize.
Remove pop_count.  Rename offset to length.
(dump_tag_info, _dump_tag_info): Rewrite.
(dump_tlv_ctx, _dump_tlv_ctx): Rewrite.
(tlv_new): Init origbuffer.
(_tlv_peek): Add arg ti.
(tlv_peek): New.
(tlv_peek_null): New.
(_tlv_push): Rewrite.
(_tlv_pop): Rewrite.
(tlv_next): New macro.  Move old code to ...
(_tlv_next): this.  Add arg lno.  Pop remaining end tags.
(tlv_popped): Remove.
(tlv_expect_object): Handle ndef.
(tlv_expect_octet_string): Ditto.
(parse_bag_encrypted_data): Use nesting level to control the inner
loop.
(parse_shrouded_key_bag): Likewise.
(parse_bag_data): Handle surplus octet strings.
(p12_parse): Ditto.

* sm/minip12.c (decrypt_block): Strip the padding.
(tlv_expect_top_sequence): Remove.  Replace callers by
tlv_expect_sequence.

* tests/cms/samplekeys/t6752-ov-user-ff.p12: New sample key.
* tests/cms/samplekeys/Description-p12: Add its description
--

This patch improves the BER parser by simplifying it.  Now tlv_next
pops off and thus closes all containers regardless on whether they are
length bounded or ndef.  tlv_set_pending is now always used to undo
the effect of a tlv_next in a loop condition which was terminated by a
nesting level change.

Instead of using the length as seen in the decrypted container we now
remove the padding and let the BER parser do its work.  This might
have a negative effect on pkcs#12 objects which are not correctly
padded but we don't have any example of such broken objects.

GnuPG-bug-id: 6752
This commit is contained in:
Werner Koch 2023-10-24 09:22:13 +02:00
parent 873b2b0da1
commit 7661d2fbc6
No known key found for this signature in database
GPG Key ID: E3FDFF218E45B72B
3 changed files with 325 additions and 182 deletions

View File

@ -174,11 +174,14 @@ struct bufferlist_s
/* An object to control the ASN.1 parsing. */ /* An object to control the ASN.1 parsing. */
struct tlv_ctx_s struct tlv_ctx_s
{ {
/* The orginal buffer with the entire pkcs#12 object and its length. */
const unsigned char *origbuffer;
size_t origbufsize;
/* The current buffer we are working on and its length. */ /* The current buffer we are working on and its length. */
const unsigned char *buffer; const unsigned char *buffer;
size_t bufsize; size_t bufsize;
size_t offset; /* The current offset into this buffer. */
int in_ndef; /* Flag indicating that we are in a NDEF. */ int in_ndef; /* Flag indicating that we are in a NDEF. */
int pending; /* The last tlv_next has not yet been processed. */ int pending; /* The last tlv_next has not yet been processed. */
@ -186,15 +189,14 @@ struct tlv_ctx_s
gpg_error_t lasterr; /* Last error from tlv function. */ gpg_error_t lasterr; /* Last error from tlv function. */
const char *lastfunc;/* Name of last called function. */ const char *lastfunc;/* Name of last called function. */
struct bufferlist_s *bufferlist; /* To keep track of amlloced buffers. */ struct bufferlist_s *bufferlist; /* To keep track of malloced buffers. */
unsigned int pop_count;/* Number of pops by tlv_next. */
unsigned int stacklen; /* Used size of the stack. */ unsigned int stacklen; /* Used size of the stack. */
struct { struct {
const unsigned char *buffer; /* Saved value of BUFFER. */ const unsigned char *buffer; /* Saved value of BUFFER. */
size_t bufsize; /* Saved value of BUFSIZE. */ size_t bufsize; /* Saved value of BUFSIZE. */
size_t offset; /* Saved value of OFFSET. */ size_t length; /* Length of the container (ti.length). */
int in_ndef; /* Saved IN_NDEF flag. */ int in_ndef; /* Saved IN_NDEF flag (ti.ndef). */
} stack[TLV_MAX_DEPTH]; } stack[TLV_MAX_DEPTH];
}; };
@ -240,8 +242,9 @@ p12_set_verbosity (int verbose, int debug)
} }
#define dump_tag_info(a,b) _dump_tag_info ((a),__LINE__,(b))
static void static void
dump_tag_info (const char *text, struct tlv_ctx_s *tlv) _dump_tag_info (const char *text, int lno, struct tlv_ctx_s *tlv)
{ {
struct tag_info *ti; struct tag_info *ti;
@ -249,13 +252,31 @@ dump_tag_info (const char *text, struct tlv_ctx_s *tlv)
return; return;
ti = &tlv->ti; ti = &tlv->ti;
log_debug ("p12_parse(%s): ti.class=%-2d tag=%-2lu len=%-4zu nhdr=%zu %s %s"
" (%u:%zu.%zu)\n", log_debug ("p12_parse:%s:%d: @%04zu class=%d tag=%lu len=%zu nhdr=%zu %s%s\n",
text, text, lno,
(size_t)(tlv->buffer - tlv->origbuffer) - ti->nhdr,
ti->class, ti->tag, ti->length, ti->nhdr, ti->class, ti->tag, ti->length, ti->nhdr,
ti->is_constructed?"cons":" ", ti->is_constructed?" cons":"",
ti->ndef?"ndef":" ", ti->ndef?" ndef":"");
tlv->stacklen, tlv->bufsize, tlv->offset); }
#define dump_tlv_ctx(a,b,c) _dump_tlv_ctx ((a),(b),__LINE__,(c))
static void
_dump_tlv_ctx (const char *text, const char *text2,
int lno, struct tlv_ctx_s *tlv)
{
if (opt_verbose < 2)
return;
log_debug ("p12_parse:%s%s%s:%d: @%04zu lvl=%u %s\n",
text,
text2? "/":"", text2? text2:"",
lno,
(size_t)(tlv->buffer - tlv->origbuffer),
tlv->stacklen,
tlv->in_ndef? " in-ndef":"");
} }
@ -413,6 +434,8 @@ tlv_new (const unsigned char *buffer, size_t bufsize)
tlv = xtrycalloc (1, sizeof *tlv); tlv = xtrycalloc (1, sizeof *tlv);
if (tlv) if (tlv)
{ {
tlv->origbuffer = buffer;
tlv->origbufsize = bufsize;
tlv->buffer = buffer; tlv->buffer = buffer;
tlv->bufsize = bufsize; tlv->bufsize = bufsize;
} }
@ -454,17 +477,45 @@ tlv_release (struct tlv_ctx_s *tlv)
} }
/* Helper for tlv_next and tlv_peek. */ /* Helper for the tlv_peek functions. */
static gpg_error_t static gpg_error_t
_tlv_peek (struct tlv_ctx_s *tlv, size_t *r_n) _tlv_peek (struct tlv_ctx_s *tlv, struct tag_info *ti)
{ {
const unsigned char *p; const unsigned char *p;
size_t n;
if (tlv->offset > tlv->bufsize) /* Note that we want to peek ahead of any current container but of
* course not beyond our entire buffer. */
p = tlv->buffer;
if ((p - tlv->origbuffer) > tlv->origbufsize)
return gpg_error (GPG_ERR_BUG); return gpg_error (GPG_ERR_BUG);
p = tlv->buffer + tlv->offset; n = tlv->origbufsize - (p - tlv->origbuffer);
*r_n = tlv->bufsize - tlv->offset; return parse_tag (&p, &n, ti);
return parse_tag (&p, r_n, &tlv->ti); }
/* Look for the next tag and return true if it matches CLASS and TAG.
* Otherwise return false. No state is changed. */
static int
tlv_peek (struct tlv_ctx_s *tlv, int class, int tag)
{
struct tag_info ti;
return (!_tlv_peek (tlv, &ti)
&& ti.class == class && ti.tag == tag);
}
/* Look for the next tag and return true if it is the Null tag.
* Otherwise return false. No state is changed. */
static int
tlv_peek_null (struct tlv_ctx_s *tlv)
{
struct tag_info ti;
return (!_tlv_peek (tlv, &ti)
&& ti.class == CLASS_UNIVERSAL && ti.tag == TAG_NULL
&& !ti.is_constructed && !ti.length);
} }
@ -472,23 +523,30 @@ _tlv_peek (struct tlv_ctx_s *tlv, size_t *r_n)
static gpg_error_t static gpg_error_t
_tlv_push (struct tlv_ctx_s *tlv) _tlv_push (struct tlv_ctx_s *tlv)
{ {
/* Right now our pointer is at the value of the current container.
* We push that info onto the stack. */
if (tlv->stacklen >= TLV_MAX_DEPTH) if (tlv->stacklen >= TLV_MAX_DEPTH)
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_MANY)); return (tlv->lasterr = gpg_error (GPG_ERR_TOO_MANY));
tlv->stack[tlv->stacklen].buffer = tlv->buffer; tlv->stack[tlv->stacklen].buffer = tlv->buffer;
tlv->stack[tlv->stacklen].bufsize = tlv->bufsize; tlv->stack[tlv->stacklen].bufsize = tlv->bufsize;
tlv->stack[tlv->stacklen].offset = tlv->offset;
tlv->stack[tlv->stacklen].in_ndef = tlv->in_ndef; tlv->stack[tlv->stacklen].in_ndef = tlv->in_ndef;
tlv->stack[tlv->stacklen].length = tlv->ti.length;
tlv->stacklen++; tlv->stacklen++;
tlv->buffer += tlv->offset;
if (tlv->ti.ndef) tlv->in_ndef = tlv->ti.ndef;
/* We set the size of the buffer to the TLV length if it is known or
* else to the size of the remaining entire buffer. */
if (tlv->in_ndef)
{ {
log_assert (tlv->bufsize >= tlv->offset); if ((tlv->buffer - tlv->origbuffer) > tlv->origbufsize)
tlv->bufsize -= tlv->offset; return (tlv->lasterr = gpg_error (GPG_ERR_BUG));
tlv->bufsize = tlv->origbufsize - (tlv->buffer - tlv->origbuffer);
} }
else else
tlv->bufsize = tlv->ti.length; tlv->bufsize = tlv->ti.length;
tlv->offset = 0;
tlv->in_ndef = tlv->ti.ndef; dump_tlv_ctx (__func__, NULL, tlv);
return 0; return 0;
} }
@ -497,74 +555,102 @@ _tlv_push (struct tlv_ctx_s *tlv)
static gpg_error_t static gpg_error_t
_tlv_pop (struct tlv_ctx_s *tlv) _tlv_pop (struct tlv_ctx_s *tlv)
{ {
size_t saveoff; size_t lastlen;
/* We reached the end of a container, either due to the size limit
* or due to an end tag. Now we pop the last container so that we
* are positioned at the value of the last container. */
if (!tlv->stacklen) if (!tlv->stacklen)
return gpg_error (GPG_ERR_EOF); return gpg_error (GPG_ERR_EOF);
saveoff = tlv->offset;
tlv->stacklen--; tlv->stacklen--;
tlv->buffer = tlv->stack[tlv->stacklen].buffer;
tlv->bufsize = tlv->stack[tlv->stacklen].bufsize;
tlv->offset = tlv->stack[tlv->stacklen].offset;
tlv->in_ndef = tlv->stack[tlv->stacklen].in_ndef; tlv->in_ndef = tlv->stack[tlv->stacklen].in_ndef;
if (tlv->in_ndef)
{
/* We keep buffer but adjust bufsize to the end of the origbuffer. */
if ((tlv->buffer - tlv->origbuffer) > tlv->origbufsize)
return (tlv->lasterr = gpg_error (GPG_ERR_BUG));
tlv->bufsize = tlv->origbufsize - (tlv->buffer - tlv->origbuffer);
}
else
{
lastlen = tlv->stack[tlv->stacklen].length;
tlv->buffer = tlv->stack[tlv->stacklen].buffer;
tlv->bufsize = tlv->stack[tlv->stacklen].bufsize;
if (lastlen > tlv->bufsize)
{
log_debug ("%s: container length larger than buffer (%zu/%zu)\n",
__func__, lastlen, tlv->bufsize);
return gpg_error (GPG_ERR_INV_BER);
}
tlv->buffer += lastlen;
tlv->bufsize -= lastlen;
}
/* Move offset of the container to the end of the container. */ dump_tlv_ctx (__func__, NULL, tlv);
tlv->offset += saveoff;
if (tlv->offset > tlv->bufsize)
return gpg_error (GPG_ERR_INV_BER);
tlv->pop_count++;
return 0; return 0;
} }
/* Parse the next tag and value. Also detect the end of a container; /* Parse the next tag and value. Also detect the end of a
* tlv_popped() can be used to detect this. */ * container. */
#define tlv_next(a) _tlv_next ((a), __LINE__)
static gpg_error_t static gpg_error_t
tlv_next (struct tlv_ctx_s *tlv) _tlv_next (struct tlv_ctx_s *tlv, int lno)
{ {
gpg_error_t err; gpg_error_t err;
size_t n;
tlv->pop_count = 0;
tlv->lasterr = 0; tlv->lasterr = 0;
tlv->lastfunc = __func__; tlv->lastfunc = __func__;
if (tlv->pending) if (tlv->pending)
{ {
tlv->pending = 0; tlv->pending = 0;
if (opt_verbose > 1)
log_debug ("%s: tlv_next skipped\n", __func__);
return 0; return 0;
} }
if (!tlv->in_ndef && tlv->offset == tlv->bufsize) if (opt_verbose > 1)
log_debug ("%s: tlv_next called\n", __func__);
/* If we are at the end of an ndef container pop the stack. */
if (!tlv->in_ndef && !tlv->bufsize)
{ {
/* We are at the end of a container. Pop the stack. */
do do
err = _tlv_pop (tlv); err = _tlv_pop (tlv);
while (!err && !tlv->in_ndef && tlv->offset == tlv->bufsize); while (!err && !tlv->in_ndef && !tlv->bufsize);
if (err) if (err)
return (tlv->lasterr = err); return (tlv->lasterr = err);
if (opt_verbose > 1)
log_debug ("%s: container(s) closed due to size\n", __func__);
} }
err = _tlv_peek (tlv, &n); again:
/* Get the next tag. */
err = parse_tag (&tlv->buffer, &tlv->bufsize, &tlv->ti);
if (err) if (err)
return err; {
if (opt_verbose > 1)
log_debug ("%s: reading tag returned err=%d\n", __func__, err);
return err;
}
/* If there is an end tag in an ndef container pop the stack. Also
* pop other containers which are fully consumed. */
if (tlv->in_ndef && (tlv->ti.class == CLASS_UNIVERSAL if (tlv->in_ndef && (tlv->ti.class == CLASS_UNIVERSAL
&& !tlv->ti.tag && !tlv->ti.is_constructed)) && !tlv->ti.tag && !tlv->ti.is_constructed))
{ {
/* End tag while in ndef container. Skip the tag, and pop. */ do
tlv->offset += n - (tlv->bufsize - tlv->offset); err = _tlv_pop (tlv);
err = _tlv_pop (tlv); while (!err && !tlv->in_ndef && !tlv->bufsize);
/* FIXME: We need to peek whether there is another end tag and
* pop again. We can't modify the TLV object, though. */
if (err) if (err)
return (tlv->lasterr = err); return (tlv->lasterr = err);
if (opt_verbose > 1)
log_debug ("%s: container(s) closed due to end tag\n", __func__);
goto again;
} }
/* Set offset to the value of the TLV. */ _dump_tag_info (__func__, lno, tlv);
tlv->offset += tlv->bufsize - tlv->offset - n;
dump_tag_info ("tlv_next", tlv);
return 0; return 0;
} }
@ -577,15 +663,6 @@ tlv_level (struct tlv_ctx_s *tlv)
} }
/* If called right after tlv_next the number of container levels
* popped are returned. */
static unsigned int
tlv_popped (struct tlv_ctx_s *tlv)
{
return tlv->pop_count;
}
/* Set a flag to indicate that the last tlv_next has not yet been /* Set a flag to indicate that the last tlv_next has not yet been
* consumed. */ * consumed. */
static void static void
@ -595,12 +672,15 @@ tlv_set_pending (struct tlv_ctx_s *tlv)
} }
/* Skip over the value of the current tag. */ /* Skip over the value of the current tag. Does not yet work for ndef
* containers. */
static void static void
tlv_skip (struct tlv_ctx_s *tlv) tlv_skip (struct tlv_ctx_s *tlv)
{ {
tlv->lastfunc = __func__; tlv->lastfunc = __func__;
tlv->offset += tlv->ti.length; log_assert (tlv->bufsize >= tlv->ti.length);
tlv->buffer += tlv->ti.length;
tlv->bufsize -= tlv->ti.length;
} }
@ -616,19 +696,6 @@ tlv_expect_sequence (struct tlv_ctx_s *tlv)
return _tlv_push (tlv); return _tlv_push (tlv);
} }
/* Variant of tlv_expect_sequence to be used for the outer sequence
* of an object which might have padding after the ASN.1 data. */
static gpg_error_t
tlv_expect_top_sequence (struct tlv_ctx_s *tlv)
{
tlv->lastfunc = __func__;
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_SEQUENCE
&& tlv->ti.is_constructed))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
tlv->bufsize = tlv->ti.nhdr + tlv->ti.length;
return _tlv_push (tlv);
}
/* Expect that the current tag is a context tag and setup the context /* Expect that the current tag is a context tag and setup the context
* for processing. The tag of the context is returned at R_TAG. */ * for processing. The tag of the context is returned at R_TAG. */
@ -666,20 +733,28 @@ tlv_expect_object (struct tlv_ctx_s *tlv, int class, int tag,
{ {
gpg_error_t err; gpg_error_t err;
const unsigned char *p; const unsigned char *p;
size_t n;
int needpush = 0;
tlv->lastfunc = __func__; tlv->lastfunc = __func__;
if (!(tlv->ti.class == class && tlv->ti.tag == tag)) if (!(tlv->ti.class == class && tlv->ti.tag == tag))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ)); return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
p = tlv->buffer + tlv->offset; p = tlv->buffer;
if (!tlv->ti.length) n = tlv->ti.length;
if (!n && tlv->ti.ndef)
{
n = tlv->bufsize;
needpush = 1;
}
else if (!tlv->ti.length)
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT)); return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
if (class == CLASS_CONTEXT && tag == 0 && tlv->ti.is_constructed if (class == CLASS_CONTEXT && tag == 0 && tlv->ti.is_constructed
&& need_octet_string_cramming (p, tlv->ti.length)) && need_octet_string_cramming (p, n))
{ {
char *newbuffer; char *newbuffer;
newbuffer = cram_octet_string (p, tlv->ti.length, r_datalen); newbuffer = cram_octet_string (p, n, r_datalen);
if (!newbuffer) if (!newbuffer)
return (tlv->lasterr = gpg_error (GPG_ERR_BAD_BER)); return (tlv->lasterr = gpg_error (GPG_ERR_BAD_BER));
err = tlv_register_buffer (tlv, newbuffer); err = tlv_register_buffer (tlv, newbuffer);
@ -693,10 +768,15 @@ tlv_expect_object (struct tlv_ctx_s *tlv, int class, int tag,
else else
{ {
*r_data = p; *r_data = p;
*r_datalen = tlv->ti.length; *r_datalen = n;
} }
if (needpush)
return _tlv_push (tlv);
tlv->offset += tlv->ti.length; if (!(tlv->bufsize >= tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
tlv->buffer += tlv->ti.length;
tlv->bufsize -= tlv->ti.length;
return 0; return 0;
} }
@ -718,7 +798,7 @@ tlv_expect_octet_string (struct tlv_ctx_s *tlv, int encapsulates,
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_OCTET_STRING if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_OCTET_STRING
&& (!tlv->ti.is_constructed || encapsulates))) && (!tlv->ti.is_constructed || encapsulates)))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ)); return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
p = tlv->buffer + tlv->offset; p = tlv->buffer;
if (!(n=tlv->ti.length) && !tlv->ti.ndef) if (!(n=tlv->ti.length) && !tlv->ti.ndef)
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT)); return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
@ -748,19 +828,10 @@ tlv_expect_octet_string (struct tlv_ctx_s *tlv, int encapsulates,
if (encapsulates) if (encapsulates)
return _tlv_push (tlv); return _tlv_push (tlv);
tlv->offset += tlv->ti.length; if (!(tlv->bufsize >= tlv->ti.length))
return 0; return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
} tlv->buffer += tlv->ti.length;
tlv->bufsize -= tlv->ti.length;
/* Expect a NULL tag. */
static gpg_error_t
tlv_expect_null (struct tlv_ctx_s *tlv)
{
tlv->lastfunc = __func__;
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_NULL
&& !tlv->ti.is_constructed && !tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
return 0; return 0;
} }
@ -778,7 +849,7 @@ tlv_expect_integer (struct tlv_ctx_s *tlv, int *r_value)
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_INTEGER if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_INTEGER
&& !tlv->ti.is_constructed)) && !tlv->ti.is_constructed))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ)); return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
p = tlv->buffer + tlv->offset; p = tlv->buffer;
if (!(n=tlv->ti.length)) if (!(n=tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT)); return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
@ -794,7 +865,10 @@ tlv_expect_integer (struct tlv_ctx_s *tlv, int *r_value)
return (tlv->lasterr = gpg_error (GPG_ERR_EOVERFLOW)); return (tlv->lasterr = gpg_error (GPG_ERR_EOVERFLOW));
} }
*r_value = value; *r_value = value;
tlv->offset += tlv->ti.length; if (!(tlv->bufsize >= tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
tlv->buffer += tlv->ti.length;
tlv->bufsize -= tlv->ti.length;
return 0; return 0;
} }
@ -816,11 +890,14 @@ tlv_expect_mpinteger (struct tlv_ctx_s *tlv, int ignore_zero,
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_INTEGER if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_INTEGER
&& !tlv->ti.is_constructed)) && !tlv->ti.is_constructed))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ)); return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
p = tlv->buffer + tlv->offset; p = tlv->buffer;
if (!(n=tlv->ti.length)) if (!(n=tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT)); return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
tlv->offset += tlv->ti.length; if (!(tlv->bufsize >= tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
tlv->buffer += tlv->ti.length;
tlv->bufsize -= tlv->ti.length;
if (ignore_zero && n == 1 && !*p) if (ignore_zero && n == 1 && !*p)
return gpg_error (GPG_ERR_FALSE); return gpg_error (GPG_ERR_FALSE);
@ -842,13 +919,16 @@ tlv_expect_object_id (struct tlv_ctx_s *tlv,
if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_OBJECT_ID if (!(tlv->ti.class == CLASS_UNIVERSAL && tlv->ti.tag == TAG_OBJECT_ID
&& !tlv->ti.is_constructed)) && !tlv->ti.is_constructed))
return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ)); return (tlv->lasterr = gpg_error (GPG_ERR_INV_OBJ));
p = tlv->buffer + tlv->offset; p = tlv->buffer;
if (!(n=tlv->ti.length)) if (!(n=tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT)); return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
*r_oid = p; *r_oid = p;
*r_oidlen = tlv->ti.length; *r_oidlen = tlv->ti.length;
tlv->offset += tlv->ti.length; if (!(tlv->bufsize >= tlv->ti.length))
return (tlv->lasterr = gpg_error (GPG_ERR_TOO_SHORT));
tlv->buffer += tlv->ti.length;
tlv->bufsize -= tlv->ti.length;
return 0; return 0;
} }
@ -1171,9 +1251,9 @@ crypt_block (unsigned char *buffer, size_t length, char *salt, size_t saltlen,
and CIPHER_ALGO is the algorithm id to use. CHECK_FNC is a and CIPHER_ALGO is the algorithm id to use. CHECK_FNC is a
function called with the plaintext and used to check whether the function called with the plaintext and used to check whether the
decryption succeeded; i.e. that a correct passphrase has been decryption succeeded; i.e. that a correct passphrase has been
given. That function shall return true if the decryption has likely given. The function returns the length of the unpadded plaintext
succeeded. */ or 0 on error. */
static void static size_t
decrypt_block (const void *ciphertext, unsigned char *plaintext, size_t length, decrypt_block (const void *ciphertext, unsigned char *plaintext, size_t length,
char *salt, size_t saltlen, char *salt, size_t saltlen,
int iter, const void *iv, size_t ivlen, int iter, const void *iv, size_t ivlen,
@ -1202,6 +1282,7 @@ decrypt_block (const void *ciphertext, unsigned char *plaintext, size_t length,
int charsetidx = 0; int charsetidx = 0;
char *convertedpw = NULL; /* Malloced and converted password or NULL. */ char *convertedpw = NULL; /* Malloced and converted password or NULL. */
size_t convertedpwsize = 0; /* Allocated length. */ size_t convertedpwsize = 0; /* Allocated length. */
size_t plainlen = 0;
for (charsetidx=0; charsets[charsetidx]; charsetidx++) for (charsetidx=0; charsets[charsetidx]; charsetidx++)
{ {
@ -1251,9 +1332,31 @@ decrypt_block (const void *ciphertext, unsigned char *plaintext, size_t length,
crypt_block (plaintext, length, salt, saltlen, iter, iv, ivlen, crypt_block (plaintext, length, salt, saltlen, iter, iv, ivlen,
convertedpw? convertedpw:pw, cipher_algo, digest_algo, 0); convertedpw? convertedpw:pw, cipher_algo, digest_algo, 0);
if (check_fnc (plaintext, length)) if (check_fnc (plaintext, length))
break; /* Decryption succeeded. */ {
/* Strip the pkcs#7 padding. */
if (length)
{
int n, i;
n = plaintext[length-1];
if (n >= length || n > 16)
log_info ("decryption failed; invalid padding size\n");
else
{
for (i=1; i < n; i++)
if (plaintext[length-i-1] != n)
break;
if (i < n)
log_info ("decryption failed; invalid padding octet\n");
else
plainlen = length - n;
}
}
break; /* Decryption probably succeeded. */
}
} }
gcry_free (convertedpw); gcry_free (convertedpw);
return plainlen;
} }
@ -1308,7 +1411,7 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
int keyelem_count; int keyelem_count;
int renewed_tlv = 0; int renewed_tlv = 0;
int loopcount; int loopcount;
unsigned int startlevel; unsigned int startlevel, startlevel2;
int digest_algo = GCRY_MD_SHA1; int digest_algo = GCRY_MD_SHA1;
where = "bag.encryptedData"; where = "bag.encryptedData";
@ -1455,10 +1558,12 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
if (opt_verbose > 1) if (opt_verbose > 1)
log_debug ("kdf digest algo = %d\n", digest_algo); log_debug ("kdf digest algo = %d\n", digest_algo);
if (tlv_next (tlv)) if (tlv_peek_null (tlv))
goto bailout; {
if (tlv_expect_null (tlv)) /* Read the optional Null tag. */
tlv_set_pending (tlv); /* NULL tag missing - ignore this. */ if (tlv_next (tlv))
goto bailout;
}
} }
else else
digest_algo = GCRY_MD_SHA1; digest_algo = GCRY_MD_SHA1;
@ -1548,12 +1653,17 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
log_error ("error allocating decryption buffer\n"); log_error ("error allocating decryption buffer\n");
goto bailout; goto bailout;
} }
decrypt_block (data, plain, datalen, salt, saltlen, iter, datalen = decrypt_block (data, plain, datalen, salt, saltlen, iter,
iv, is_pbes2?16:0, ctx->password, iv, is_pbes2?16:0, ctx->password,
is_pbes2 ? (is_aes256?GCRY_CIPHER_AES256:GCRY_CIPHER_AES128) : is_pbes2 ? (is_aes256?GCRY_CIPHER_AES256:GCRY_CIPHER_AES128) :
is_3des ? GCRY_CIPHER_3DES : GCRY_CIPHER_RFC2268_40, is_3des ? GCRY_CIPHER_3DES : GCRY_CIPHER_RFC2268_40,
digest_algo, digest_algo,
bag_decrypted_data_p); bag_decrypted_data_p);
if (!datalen)
{
err = gpg_error (GPG_ERR_DECRYPT_FAILED);
goto bailout;
}
/* We do not need the TLV anymore and allocated a new one. */ /* We do not need the TLV anymore and allocated a new one. */
where = "bag.encryptedData.decrypted-text"; where = "bag.encryptedData.decrypted-text";
@ -1570,7 +1680,7 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
ctx->badpass = 1; ctx->badpass = 1;
goto bailout; goto bailout;
} }
if (tlv_expect_top_sequence (tlv)) if (tlv_expect_sequence (tlv))
{ {
ctx->badpass = 1; ctx->badpass = 1;
goto bailout; goto bailout;
@ -1692,7 +1802,8 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
where = "reading.keybag.key-parameters"; where = "reading.keybag.key-parameters";
keyelem_count = 0; keyelem_count = 0;
while (!(err = tlv_next (tlv)) && !tlv_popped (tlv)) startlevel2 = tlv_level (tlv);
while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel2)
{ {
if (keyelem_count >= 9) if (keyelem_count >= 9)
{ {
@ -1714,7 +1825,9 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
log_debug ("RSA key parameter %d found\n", keyelem_count); log_debug ("RSA key parameter %d found\n", keyelem_count);
keyelem_count++; keyelem_count++;
} }
if (err && gpg_err_code (err) != GPG_ERR_EOF) if (!err)
tlv_set_pending (tlv);
else if (err && gpg_err_code (err) != GPG_ERR_EOF)
goto bailout; goto bailout;
err = 0; err = 0;
} }
@ -1763,24 +1876,21 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
/* Skip the optional SET with the pkcs12 cert attributes. */ /* Skip the optional SET with the pkcs12 cert attributes. */
where = "bag.attribute_set"; where = "bag.attribute_set";
err = tlv_next (tlv); if (tlv_peek (tlv, CLASS_UNIVERSAL, TAG_SET))
if (gpg_err_code (err) == GPG_ERR_EOF) {
break; if (tlv_next (tlv))
if (err) goto bailout;
goto bailout; err = tlv_expect_set (tlv);
err = tlv_expect_set (tlv); if (err)
if (!err) goto bailout;
{ /* This is the optional set of attributes. Skip it. */
tlv_skip (tlv); tlv_skip (tlv);
if (opt_verbose) if (opt_verbose)
log_info ("skipping bag.attribute_set\n"); log_info ("skipping %s\n", where);
} }
else if (gpg_err_code (err) == GPG_ERR_INV_OBJ)
tlv_set_pending (tlv); /* The next tlv_next will be skipped. */
else
goto bailout;
} }
if (err && gpg_err_code (err) != GPG_ERR_EOF) if (!err)
tlv_set_pending (tlv);
else if (err && gpg_err_code (err) != GPG_ERR_EOF)
{ {
if (!loopcount) /* The first while(tlv_next) failed. */ if (!loopcount) /* The first while(tlv_next) failed. */
ctx->badpass = 1; ctx->badpass = 1;
@ -1804,10 +1914,9 @@ parse_bag_encrypted_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
bailout: bailout:
if (!err) if (!err)
err = gpg_error (GPG_ERR_GENERAL); err = gpg_error (GPG_ERR_GENERAL);
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n", log_error ("%s(%s): lvl=%u (%s): %s - %s\n",
__func__, where, __func__, where,
tlv? tlv->stacklen : 0, tlv? tlv->stacklen : 0,
tlv? tlv->offset : 0,
tlv? tlv->lastfunc : "", tlv? tlv->lastfunc : "",
tlv ? gpg_strerror (tlv->lasterr) : "init failed", tlv ? gpg_strerror (tlv->lasterr) : "init failed",
gpg_strerror (err)); gpg_strerror (err));
@ -1978,10 +2087,12 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
if (opt_verbose > 1) if (opt_verbose > 1)
log_debug ("kdf digest algo = %d\n", digest_algo); log_debug ("kdf digest algo = %d\n", digest_algo);
if (tlv_next (tlv)) if (tlv_peek_null (tlv))
goto bailout; {
if (tlv_expect_null (tlv)) /* Read the optional Null tag. */
tlv_set_pending (tlv); /* NULL tag missing - ignore this. */ if (tlv_next (tlv))
goto bailout;
}
} }
else else
digest_algo = GCRY_MD_SHA1; digest_algo = GCRY_MD_SHA1;
@ -2067,13 +2178,17 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
log_error ("error allocating decryption buffer\n"); log_error ("error allocating decryption buffer\n");
goto bailout; goto bailout;
} }
decrypt_block (data, plain, datalen, salt, saltlen, iter, datalen = decrypt_block (data, plain, datalen, salt, saltlen, iter,
iv, is_pbes2? 16:0, ctx->password, iv, is_pbes2? 16:0, ctx->password,
is_pbes2 ? (is_aes256?GCRY_CIPHER_AES256:GCRY_CIPHER_AES128) is_pbes2 ? (is_aes256?GCRY_CIPHER_AES256:GCRY_CIPHER_AES128)
: GCRY_CIPHER_3DES, : GCRY_CIPHER_3DES,
digest_algo, digest_algo,
bag_data_p); bag_data_p);
if (!datalen)
{
err = gpg_error (GPG_ERR_DECRYPT_FAILED);
goto bailout;
}
/* We do not need the TLV anymore and allocated a new one. */ /* We do not need the TLV anymore and allocated a new one. */
where = "shrouded_key_bag.decrypted-text"; where = "shrouded_key_bag.decrypted-text";
@ -2093,7 +2208,7 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
ctx->badpass = 1; ctx->badpass = 1;
goto bailout; goto bailout;
} }
if (tlv_expect_top_sequence (tlv)) if (tlv_expect_sequence (tlv))
{ {
ctx->badpass = 1; ctx->badpass = 1;
goto bailout; goto bailout;
@ -2130,10 +2245,13 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
{ {
if (opt_verbose > 1) if (opt_verbose > 1)
log_debug ("RSA parameters\n"); log_debug ("RSA parameters\n");
if (tlv_next (tlv))
goto bailout; if (tlv_peek_null (tlv))
if (tlv_expect_null (tlv)) {
tlv_set_pending (tlv); /* NULL tag missing - ignore this. */ /* Read the optional Null tag. */
if (tlv_next (tlv))
goto bailout;
}
} }
else if (oidlen == DIM(oid_pcPublicKey) else if (oidlen == DIM(oid_pcPublicKey)
&& !memcmp (oid, oid_pcPublicKey, oidlen)) && !memcmp (oid, oid_pcPublicKey, oidlen))
@ -2218,8 +2336,9 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
{ {
int keyelem_count = 0; int keyelem_count = 0;
int firstparam = 1; int firstparam = 1;
unsigned int startlevel = tlv_level (tlv);
while (!(err = tlv_next (tlv)) && !tlv_popped (tlv)) while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel)
{ {
if (keyelem_count >= 9) if (keyelem_count >= 9)
{ {
@ -2245,7 +2364,9 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
} }
firstparam = 0; firstparam = 0;
} }
if (err && gpg_err_code (err) != GPG_ERR_EOF) if (!err)
tlv_set_pending (tlv);
else if (err && gpg_err_code (err) != GPG_ERR_EOF)
goto bailout; goto bailout;
err = 0; err = 0;
} }
@ -2257,22 +2378,18 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
tlv = saved_tlv; tlv = saved_tlv;
where = "shrouded_key_bag.attribute_set"; where = "shrouded_key_bag.attribute_set";
err = tlv_next (tlv); /* Check for an optional set of attributes. */
if (gpg_err_code (err) == GPG_ERR_EOF) if (tlv_peek (tlv, CLASS_UNIVERSAL, TAG_SET))
goto leave; {
if (err) if (tlv_next (tlv))
goto bailout; goto bailout;
err = tlv_expect_set (tlv); err = tlv_expect_set (tlv);
if (!err) if (err)
{ /* This is the optional set of attributes. Skip it. */ goto bailout;
tlv_skip (tlv); tlv_skip (tlv);
if (opt_verbose) if (opt_verbose)
log_info ("skipping %s\n", where); log_info ("skipping %s\n", where);
} }
else if (gpg_err_code (err) == GPG_ERR_INV_OBJ)
tlv_set_pending (tlv); /* The next tlv_next will be skipped. */
else /* Other error. */
goto bailout;
leave: leave:
@ -2288,10 +2405,9 @@ parse_shrouded_key_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
bailout: bailout:
if (!err) if (!err)
err = gpg_error (GPG_ERR_GENERAL); err = gpg_error (GPG_ERR_GENERAL);
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n", log_error ("%s(%s): lvl=%d (%s): %s - %s\n",
__func__, where, __func__, where,
tlv? tlv->stacklen : 0, tlv? tlv->stacklen : 0,
tlv? tlv->offset : 0,
tlv? tlv->lastfunc : "", tlv? tlv->lastfunc : "",
tlv ? gpg_strerror (tlv->lasterr) : "init failed", tlv ? gpg_strerror (tlv->lasterr) : "init failed",
gpg_strerror (err)); gpg_strerror (err));
@ -2367,28 +2483,27 @@ parse_cert_bag (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
* SEQUENCE -- we actually ignore this. * SEQUENCE -- we actually ignore this.
*/ */
where = "certbag.attribute_set"; where = "certbag.attribute_set";
if (tlv_next (tlv)) /* Check for an optional set of attributes. */
goto bailout; if (tlv_peek (tlv, CLASS_UNIVERSAL, TAG_SET))
err = tlv_expect_set (tlv); {
if (!err) if (tlv_next (tlv))
{ /* This is the optional set of attributes. Skip it. */ goto bailout;
err = tlv_expect_set (tlv);
if (err)
goto bailout;
tlv_skip (tlv); tlv_skip (tlv);
if (opt_verbose) if (opt_verbose)
log_info ("skipping certbag.attribute_set\n"); log_info ("skipping %s\n", where);
} }
else if (gpg_err_code (err) == GPG_ERR_INV_OBJ)
tlv_set_pending (tlv); /* The next tlv_next will be skipped. */
else
goto bailout;
leave: leave:
return err; return err;
bailout: bailout:
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n", log_error ("%s(%s): lvl=%u (%s): %s - %s\n",
__func__, where, __func__, where,
tlv? tlv->stacklen : 0, tlv? tlv->stacklen : 0,
tlv? tlv->offset : 0,
tlv? tlv->lastfunc : "", tlv? tlv->lastfunc : "",
tlv ? gpg_strerror (tlv->lasterr) : "init failed", tlv ? gpg_strerror (tlv->lasterr) : "init failed",
gpg_strerror (err)); gpg_strerror (err));
@ -2426,6 +2541,14 @@ parse_bag_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
if (tlv_expect_octet_string (tlv, 1, NULL, NULL)) if (tlv_expect_octet_string (tlv, 1, NULL, NULL))
goto bailout; goto bailout;
if (tlv_peek (tlv, CLASS_UNIVERSAL, TAG_OCTET_STRING))
{
if (tlv_next (tlv))
goto bailout;
err = tlv_expect_octet_string (tlv, 1, NULL, NULL);
if (err)
goto bailout;
}
/* Expect: /* Expect:
* SEQUENCE * SEQUENCE
@ -2437,6 +2560,7 @@ parse_bag_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
goto bailout; goto bailout;
startlevel = tlv_level (tlv); startlevel = tlv_level (tlv);
dump_tlv_ctx ("data.outerseqs", "beginloop", tlv);
while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel) while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel)
{ {
/* Expect: /* Expect:
@ -2475,11 +2599,12 @@ parse_bag_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
log_info ("unknown inner data type - skipped\n"); log_info ("unknown inner data type - skipped\n");
} }
} }
if (err && gpg_err_code (err) != GPG_ERR_EOF) dump_tlv_ctx ("data.outerseqs", "endloop", tlv);
if (!err)
tlv_set_pending (tlv);
else if (err && gpg_err_code (err) != GPG_ERR_EOF)
goto bailout; goto bailout;
err = 0; err = 0;
if (tlv_popped (tlv))
tlv_set_pending (tlv);
leave: leave:
return err; return err;
@ -2487,10 +2612,9 @@ parse_bag_data (struct p12_parse_ctx_s *ctx, struct tlv_ctx_s *tlv)
bailout: bailout:
if (!err) if (!err)
err = gpg_error (GPG_ERR_GENERAL); err = gpg_error (GPG_ERR_GENERAL);
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n", log_error ("%s(%s): lvl=%d (%s): %s - %s\n",
__func__, where, __func__, where,
tlv? tlv->stacklen : 0, tlv? tlv->stacklen : 0,
tlv? tlv->offset : 0,
tlv? tlv->lastfunc : "", tlv? tlv->lastfunc : "",
tlv ? gpg_strerror (tlv->lasterr) : "init failed", tlv ? gpg_strerror (tlv->lasterr) : "init failed",
gpg_strerror (err)); gpg_strerror (err));
@ -2567,6 +2691,14 @@ p12_parse (const unsigned char *buffer, size_t length, const char *pw,
if (tlv_expect_octet_string (tlv, 1, NULL, NULL)) if (tlv_expect_octet_string (tlv, 1, NULL, NULL))
goto bailout; goto bailout;
if (tlv_peek (tlv, CLASS_UNIVERSAL, TAG_OCTET_STRING))
{
if (tlv_next (tlv))
goto bailout;
err = tlv_expect_octet_string (tlv, 1, NULL, NULL);
if (err)
goto bailout;
}
where = "bags"; where = "bags";
if (tlv_next (tlv)) if (tlv_next (tlv))
@ -2575,9 +2707,11 @@ p12_parse (const unsigned char *buffer, size_t length, const char *pw,
goto bailout; goto bailout;
startlevel = tlv_level (tlv); startlevel = tlv_level (tlv);
dump_tlv_ctx ("bags", "beginloop", tlv);
while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel) while (!(err = tlv_next (tlv)) && tlv_level (tlv) == startlevel)
{ {
where = "bag-sequence"; where = "bag-sequence";
dump_tlv_ctx (where, NULL, tlv);
if (tlv_expect_sequence (tlv)) if (tlv_expect_sequence (tlv))
goto bailout; goto bailout;
@ -2614,7 +2748,10 @@ p12_parse (const unsigned char *buffer, size_t length, const char *pw,
log_info ("unknown outer bag type - skipped\n"); log_info ("unknown outer bag type - skipped\n");
} }
} }
if (err && gpg_err_code (err) != GPG_ERR_EOF) dump_tlv_ctx ("bags", "endloop", tlv);
if (!err)
tlv_set_pending (tlv);
else if (err && gpg_err_code (err) != GPG_ERR_EOF)
goto bailout; goto bailout;
err = 0; err = 0;
@ -2628,12 +2765,12 @@ p12_parse (const unsigned char *buffer, size_t length, const char *pw,
bailout: bailout:
*r_badpass = ctx.badpass; *r_badpass = ctx.badpass;
log_error ("%s(%s): offset %u.%zu (%s): %s - %s\n", log_error ("%s(%s): @%04zu lvl=%u %s: %s - %s\n",
__func__, where, __func__, where,
tlv? (size_t)(tlv->buffer - tlv->origbuffer):0,
tlv? tlv->stacklen : 0, tlv? tlv->stacklen : 0,
tlv? tlv->offset : 0,
tlv? tlv->lastfunc : "", tlv? tlv->lastfunc : "",
tlv ? gpg_strerror (tlv->lasterr) : "init failed", tlv? gpg_strerror (tlv->lasterr) : "init failed",
gpg_strerror (err)); gpg_strerror (err));
if (ctx.privatekey) if (ctx.privatekey)
{ {

View File

@ -45,4 +45,10 @@ Pass: abc
Cert: 5cea0c5bf09ccd92535267c662fc098f6c81c27e Cert: 5cea0c5bf09ccd92535267c662fc098f6c81c27e
Key: 3cb2fba95d1976df69eb7aa8c65ac5354e15af32 Key: 3cb2fba95d1976df69eb7aa8c65ac5354e15af32
Name: t6752-ov-user-ff.p12
Desc: Mozilla generated with a surplus octet string container
Pass: start
Cert: 4753a910e0c8b4caa8663ca0e4273a884eb5397d
Key: 93be89edd11214ab74280d988a665b6beef876c5
# eof # # eof #

Binary file not shown.