| /* | |
| * Copyright (c) 1996, 1998 by Internet Software Consortium. | |
| * | |
| * Permission to use, copy, modify, and distribute this software for any | |
| * purpose with or without fee is hereby granted, provided that the above | |
| * copyright notice and this permission notice appear in all copies. | |
| * | |
| * THE SOFTWARE IS PROVIDED "AS IS" AND INTERNET SOFTWARE CONSORTIUM DISCLAIMS | |
| * ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES | |
| * OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL INTERNET SOFTWARE | |
| * CONSORTIUM BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL | |
| * DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR | |
| * PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS | |
| * ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS | |
| * SOFTWARE. | |
| */ | |
| /* | |
| * Portions Copyright (c) 1995 by International Business Machines, Inc. | |
| * | |
| * International Business Machines, Inc. (hereinafter called IBM) grants | |
| * permission under its copyrights to use, copy, modify, and distribute this | |
| * Software with or without fee, provided that the above copyright notice and | |
| * all paragraphs of this notice appear in all copies, and that the name of IBM | |
| * not be used in connection with the marketing of any product incorporating | |
| * the Software or modifications thereof, without specific, written prior | |
| * permission. | |
| * | |
| * To the extent it has a right to do so, IBM grants an immunity from suit | |
| * under its patents, if any, for the use, sale or manufacture of products to | |
| * the extent that such products are used for performing Domain Name System | |
| * dynamic updates in TCP/IP networks by means of the Software. No immunity is | |
| * granted for any product per se or for any other function of any product. | |
| * | |
| * THE SOFTWARE IS PROVIDED "AS IS", AND IBM DISCLAIMS ALL WARRANTIES, | |
| * INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A | |
| * PARTICULAR PURPOSE. IN NO EVENT SHALL IBM BE LIABLE FOR ANY SPECIAL, | |
| * DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER ARISING | |
| * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE, EVEN | |
| * IF IBM IS APPRISED OF THE POSSIBILITY OF SUCH DAMAGES. | |
| */ | |
| /* | |
| * Portions copyright (c) 1999, 2000 | |
| * Intel Corporation. | |
| * All rights reserved. | |
| * | |
| * Redistribution and use in source and binary forms, with or without | |
| * modification, are permitted provided that the following conditions | |
| * are met: | |
| * | |
| * 1. Redistributions of source code must retain the above copyright | |
| * notice, this list of conditions and the following disclaimer. | |
| * | |
| * 2. Redistributions in binary form must reproduce the above copyright | |
| * notice, this list of conditions and the following disclaimer in the | |
| * documentation and/or other materials provided with the distribution. | |
| * | |
| * 3. All advertising materials mentioning features or use of this software | |
| * must display the following acknowledgement: | |
| * | |
| * This product includes software developed by Intel Corporation and | |
| * its contributors. | |
| * | |
| * 4. Neither the name of Intel Corporation or its contributors may be | |
| * used to endorse or promote products derived from this software | |
| * without specific prior written permission. | |
| * | |
| * THIS SOFTWARE IS PROVIDED BY INTEL CORPORATION AND CONTRIBUTORS ``AS IS'' | |
| * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
| * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
| * ARE DISCLAIMED. IN NO EVENT SHALL INTEL CORPORATION OR CONTRIBUTORS BE | |
| * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
| * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
| * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS | |
| * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN | |
| * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | |
| * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF | |
| * THE POSSIBILITY OF SUCH DAMAGE. | |
| * | |
| base64.c,v 1.1.1.1 2003/11/19 01:51:25 kyu3 Exp | |
| */ | |
| #include <sys/types.h> | |
| #include <sys/param.h> | |
| #include <sys/socket.h> | |
| #include <netinet/in.h> | |
| #include <arpa/inet.h> | |
| #include <arpa/nameser.h> | |
| #include <ctype.h> | |
| #include <resolv.h> | |
| #include <stdio.h> | |
| #include <stdlib.h> | |
| #include <string.h> | |
| #define Assert(Cond) if (!(Cond)) abort() | |
| static const char Base64[] = | |
| "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; | |
| static const char Pad64 = '='; | |
| /* (From RFC1521 and draft-ietf-dnssec-secext-03.txt) | |
| The following encoding technique is taken from RFC 1521 by Borenstein | |
| and Freed. It is reproduced here in a slightly edited form for | |
| convenience. | |
| A 65-character subset of US-ASCII is used, enabling 6 bits to be | |
| represented per printable character. (The extra 65th character, "=", | |
| is used to signify a special processing function.) | |
| The encoding process represents 24-bit groups of input bits as output | |
| strings of 4 encoded characters. Proceeding from left to right, a | |
| 24-bit input group is formed by concatenating 3 8-bit input groups. | |
| These 24 bits are then treated as 4 concatenated 6-bit groups, each | |
| of which is translated into a single digit in the base64 alphabet. | |
| Each 6-bit group is used as an index into an array of 64 printable | |
| characters. The character referenced by the index is placed in the | |
| output string. | |
| Table 1: The Base64 Alphabet | |
| Value Encoding Value Encoding Value Encoding Value Encoding | |
| 0 A 17 R 34 i 51 z | |
| 1 B 18 S 35 j 52 0 | |
| 2 C 19 T 36 k 53 1 | |
| 3 D 20 U 37 l 54 2 | |
| 4 E 21 V 38 m 55 3 | |
| 5 F 22 W 39 n 56 4 | |
| 6 G 23 X 40 o 57 5 | |
| 7 H 24 Y 41 p 58 6 | |
| 8 I 25 Z 42 q 59 7 | |
| 9 J 26 a 43 r 60 8 | |
| 10 K 27 b 44 s 61 9 | |
| 11 L 28 c 45 t 62 + | |
| 12 M 29 d 46 u 63 / | |
| 13 N 30 e 47 v | |
| 14 O 31 f 48 w (pad) = | |
| 15 P 32 g 49 x | |
| 16 Q 33 h 50 y | |
| Special processing is performed if fewer than 24 bits are available | |
| at the end of the data being encoded. A full encoding quantum is | |
| always completed at the end of a quantity. When fewer than 24 input | |
| bits are available in an input group, zero bits are added (on the | |
| right) to form an integral number of 6-bit groups. Padding at the | |
| end of the data is performed using the '=' character. | |
| Since all base64 input is an integral number of octets, only the | |
| ------------------------------------------------- | |
| following cases can arise: | |
| (1) the final quantum of encoding input is an integral | |
| multiple of 24 bits; here, the final unit of encoded | |
| output will be an integral multiple of 4 characters | |
| with no "=" padding, | |
| (2) the final quantum of encoding input is exactly 8 bits; | |
| here, the final unit of encoded output will be two | |
| characters followed by two "=" padding characters, or | |
| (3) the final quantum of encoding input is exactly 16 bits; | |
| here, the final unit of encoded output will be three | |
| characters followed by one "=" padding character. | |
| */ | |
| int | |
| b64_ntop(u_char const *src, size_t srclength, char *target, size_t targsize) { | |
| size_t datalength = 0; | |
| u_char input[3]; | |
| u_char output[4]; | |
| size_t i; | |
| input[0] = input[1] = input[2] = '\0'; | |
| while (2 < srclength) { | |
| input[0] = *src++; | |
| input[1] = *src++; | |
| input[2] = *src++; | |
| srclength -= 3; | |
| output[0] = input[0] >> 2; | |
| output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4); | |
| output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6); | |
| output[3] = input[2] & 0x3f; | |
| Assert(output[0] < 64); | |
| Assert(output[1] < 64); | |
| Assert(output[2] < 64); | |
| Assert(output[3] < 64); | |
| if (datalength + 4 > targsize) | |
| return (-1); | |
| target[datalength++] = Base64[output[0]]; | |
| target[datalength++] = Base64[output[1]]; | |
| target[datalength++] = Base64[output[2]]; | |
| target[datalength++] = Base64[output[3]]; | |
| } | |
| /* Now we worry about padding. */ | |
| if (0 != srclength) { | |
| /* Get what's left. */ | |
| input[0] = input[1] = input[2] = '\0'; | |
| for (i = 0; i < srclength; i++) | |
| input[i] = *src++; | |
| output[0] = input[0] >> 2; | |
| output[1] = ((input[0] & 0x03) << 4) + (input[1] >> 4); | |
| output[2] = ((input[1] & 0x0f) << 2) + (input[2] >> 6); | |
| Assert(output[0] < 64); | |
| Assert(output[1] < 64); | |
| Assert(output[2] < 64); | |
| if (datalength + 4 > targsize) | |
| return (-1); | |
| target[datalength++] = Base64[output[0]]; | |
| target[datalength++] = Base64[output[1]]; | |
| if (srclength == 1) | |
| target[datalength++] = Pad64; | |
| else | |
| target[datalength++] = Base64[output[2]]; | |
| target[datalength++] = Pad64; | |
| } | |
| if (datalength >= targsize) | |
| return (-1); | |
| target[datalength] = '\0'; /* Returned value doesn't count \0. */ | |
| return ((int)datalength); | |
| } | |
| /* skips all whitespace anywhere. | |
| converts characters, four at a time, starting at (or after) | |
| src from base - 64 numbers into three 8 bit bytes in the target area. | |
| it returns the number of data bytes stored at the target, or -1 on error. | |
| */ | |
| int | |
| b64_pton( | |
| char const *src, | |
| u_char *target, | |
| size_t targsize | |
| ) | |
| { | |
| int tarindex, state, ch; | |
| char *pos; | |
| state = 0; | |
| tarindex = 0; | |
| while ((ch = *src++) != '\0') { | |
| if (isspace(ch)) /* Skip whitespace anywhere. */ | |
| continue; | |
| if (ch == Pad64) | |
| break; | |
| pos = strchr(Base64, ch); | |
| if (pos == 0) /* A non-base64 character. */ | |
| return (-1); | |
| switch (state) { | |
| case 0: | |
| if (target) { | |
| if ((size_t)tarindex >= targsize) | |
| return (-1); | |
| target[tarindex] = (u_char)((pos - Base64) << 2); | |
| } | |
| state = 1; | |
| break; | |
| case 1: | |
| if (target) { | |
| if ((size_t)tarindex + 1 >= targsize) | |
| return (-1); | |
| target[tarindex] |= (u_char)((pos - Base64) >> 4); | |
| target[tarindex+1] = (u_char)(((pos - Base64) & 0x0f) | |
| << 4) ; | |
| } | |
| tarindex++; | |
| state = 2; | |
| break; | |
| case 2: | |
| if (target) { | |
| if ((size_t)tarindex + 1 >= targsize) | |
| return (-1); | |
| target[tarindex] |= (u_char)((pos - Base64) >> 2); | |
| target[tarindex+1] = (u_char)(((pos - Base64) & 0x03) | |
| << 6); | |
| } | |
| tarindex++; | |
| state = 3; | |
| break; | |
| case 3: | |
| if (target) { | |
| if ((size_t)tarindex >= targsize) | |
| return (-1); | |
| target[tarindex] |= (u_char)(pos - Base64); | |
| } | |
| tarindex++; | |
| state = 0; | |
| break; | |
| default: | |
| abort(); | |
| } | |
| } | |
| /* | |
| * We are done decoding Base-64 chars. Let's see if we ended | |
| * on a byte boundary, and/or with erroneous trailing characters. | |
| */ | |
| if (ch == Pad64) { /* We got a pad char. */ | |
| ch = *src++; /* Skip it, get next. */ | |
| switch (state) { | |
| case 0: /* Invalid = in first position */ | |
| case 1: /* Invalid = in second position */ | |
| return (-1); | |
| case 2: /* Valid, means one byte of info */ | |
| /* Skip any number of spaces. */ | |
| for ((void)NULL; ch != '\0'; ch = *src++) | |
| if (!isspace(ch)) | |
| break; | |
| /* Make sure there is another trailing = sign. */ | |
| if (ch != Pad64) | |
| return (-1); | |
| ch = *src++; /* Skip the = */ | |
| /* Fall through to "single trailing =" case. */ | |
| /* FALLTHROUGH */ | |
| case 3: /* Valid, means two bytes of info */ | |
| /* | |
| * We know this char is an =. Is there anything but | |
| * whitespace after it? | |
| */ | |
| for ((void)NULL; ch != '\0'; ch = *src++) | |
| if (!isspace(ch)) | |
| return (-1); | |
| /* | |
| * Now make sure for cases 2 and 3 that the "extra" | |
| * bits that slopped past the last full byte were | |
| * zeros. If we don't check them, they become a | |
| * subliminal channel. | |
| */ | |
| if (target && target[tarindex] != 0) | |
| return (-1); | |
| } | |
| } else { | |
| /* | |
| * We ended by seeing the end of the string. Make sure we | |
| * have no partial bytes lying around. | |
| */ | |
| if (state != 0) | |
| return (-1); | |
| } | |
| return (tarindex); | |
| } |