Merge #10874: [RPC] getblockchaininfo: Loop through the bip9 soft fork deployments...
[bitcoinplatinum.git] / src / secp256k1 / contrib / lax_der_parsing.c
blob5b141a99481c71f18bffe38e71a763443b14ef4e
1 /**********************************************************************
2 * Copyright (c) 2015 Pieter Wuille *
3 * Distributed under the MIT software license, see the accompanying *
4 * file COPYING or http://www.opensource.org/licenses/mit-license.php.*
5 **********************************************************************/
7 #include <string.h>
8 #include <secp256k1.h>
10 #include "lax_der_parsing.h"
12 int ecdsa_signature_parse_der_lax(const secp256k1_context* ctx, secp256k1_ecdsa_signature* sig, const unsigned char *input, size_t inputlen) {
13 size_t rpos, rlen, spos, slen;
14 size_t pos = 0;
15 size_t lenbyte;
16 unsigned char tmpsig[64] = {0};
17 int overflow = 0;
19 /* Hack to initialize sig with a correctly-parsed but invalid signature. */
20 secp256k1_ecdsa_signature_parse_compact(ctx, sig, tmpsig);
22 /* Sequence tag byte */
23 if (pos == inputlen || input[pos] != 0x30) {
24 return 0;
26 pos++;
28 /* Sequence length bytes */
29 if (pos == inputlen) {
30 return 0;
32 lenbyte = input[pos++];
33 if (lenbyte & 0x80) {
34 lenbyte -= 0x80;
35 if (pos + lenbyte > inputlen) {
36 return 0;
38 pos += lenbyte;
41 /* Integer tag byte for R */
42 if (pos == inputlen || input[pos] != 0x02) {
43 return 0;
45 pos++;
47 /* Integer length for R */
48 if (pos == inputlen) {
49 return 0;
51 lenbyte = input[pos++];
52 if (lenbyte & 0x80) {
53 lenbyte -= 0x80;
54 if (pos + lenbyte > inputlen) {
55 return 0;
57 while (lenbyte > 0 && input[pos] == 0) {
58 pos++;
59 lenbyte--;
61 if (lenbyte >= sizeof(size_t)) {
62 return 0;
64 rlen = 0;
65 while (lenbyte > 0) {
66 rlen = (rlen << 8) + input[pos];
67 pos++;
68 lenbyte--;
70 } else {
71 rlen = lenbyte;
73 if (rlen > inputlen - pos) {
74 return 0;
76 rpos = pos;
77 pos += rlen;
79 /* Integer tag byte for S */
80 if (pos == inputlen || input[pos] != 0x02) {
81 return 0;
83 pos++;
85 /* Integer length for S */
86 if (pos == inputlen) {
87 return 0;
89 lenbyte = input[pos++];
90 if (lenbyte & 0x80) {
91 lenbyte -= 0x80;
92 if (pos + lenbyte > inputlen) {
93 return 0;
95 while (lenbyte > 0 && input[pos] == 0) {
96 pos++;
97 lenbyte--;
99 if (lenbyte >= sizeof(size_t)) {
100 return 0;
102 slen = 0;
103 while (lenbyte > 0) {
104 slen = (slen << 8) + input[pos];
105 pos++;
106 lenbyte--;
108 } else {
109 slen = lenbyte;
111 if (slen > inputlen - pos) {
112 return 0;
114 spos = pos;
115 pos += slen;
117 /* Ignore leading zeroes in R */
118 while (rlen > 0 && input[rpos] == 0) {
119 rlen--;
120 rpos++;
122 /* Copy R value */
123 if (rlen > 32) {
124 overflow = 1;
125 } else {
126 memcpy(tmpsig + 32 - rlen, input + rpos, rlen);
129 /* Ignore leading zeroes in S */
130 while (slen > 0 && input[spos] == 0) {
131 slen--;
132 spos++;
134 /* Copy S value */
135 if (slen > 32) {
136 overflow = 1;
137 } else {
138 memcpy(tmpsig + 64 - slen, input + spos, slen);
141 if (!overflow) {
142 overflow = !secp256k1_ecdsa_signature_parse_compact(ctx, sig, tmpsig);
144 if (overflow) {
145 memset(tmpsig, 0, 64);
146 secp256k1_ecdsa_signature_parse_compact(ctx, sig, tmpsig);
148 return 1;