blob: 8506b49ae6fd91d1140ffee486adc964f07874d3 [file] [log] [blame]
Paul Bakkerefc30292011-11-10 14:43:23 +00001/*
2 * Generic ASN.1 parsing
3 *
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02004 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakkerefc30292011-11-10 14:43:23 +000018 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000019 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakkerefc30292011-11-10 14:43:23 +000020 */
21
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#if !defined(MBEDTLS_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000023#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020024#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020025#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020026#endif
Paul Bakkerefc30292011-11-10 14:43:23 +000027
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020028#if defined(MBEDTLS_ASN1_PARSE_C)
Paul Bakkerefc30292011-11-10 14:43:23 +000029
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000030#include "mbedtls/asn1.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050031#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000032#include "mbedtls/error.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000033
Rich Evans00ab4702015-02-06 13:43:58 +000034#include <string.h>
35
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020036#if defined(MBEDTLS_BIGNUM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000037#include "mbedtls/bignum.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000038#endif
39
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020040#if defined(MBEDTLS_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000041#include "mbedtls/platform.h"
Paul Bakker6e339b52013-07-03 13:37:05 +020042#else
Rich Evans00ab4702015-02-06 13:43:58 +000043#include <stdlib.h>
Manuel Pégourié-Gonnard7551cb92015-05-26 16:04:06 +020044#define mbedtls_calloc calloc
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020045#define mbedtls_free free
Paul Bakker6e339b52013-07-03 13:37:05 +020046#endif
47
Paul Bakkerefc30292011-11-10 14:43:23 +000048/*
49 * ASN.1 DER decoding routines
50 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020051int mbedtls_asn1_get_len( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +000052 const unsigned char *end,
53 size_t *len )
54{
55 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020056 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000057
58 if( ( **p & 0x80 ) == 0 )
59 *len = *(*p)++;
60 else
61 {
62 switch( **p & 0x7F )
63 {
64 case 1:
65 if( ( end - *p ) < 2 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020066 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000067
68 *len = (*p)[1];
69 (*p) += 2;
70 break;
71
72 case 2:
73 if( ( end - *p ) < 3 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000075
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000076 *len = ( (size_t)(*p)[1] << 8 ) | (*p)[2];
Paul Bakkerefc30292011-11-10 14:43:23 +000077 (*p) += 3;
78 break;
79
80 case 3:
81 if( ( end - *p ) < 4 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020082 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000083
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000084 *len = ( (size_t)(*p)[1] << 16 ) |
85 ( (size_t)(*p)[2] << 8 ) | (*p)[3];
Paul Bakkerefc30292011-11-10 14:43:23 +000086 (*p) += 4;
87 break;
88
89 case 4:
90 if( ( end - *p ) < 5 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020091 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000092
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000093 *len = ( (size_t)(*p)[1] << 24 ) | ( (size_t)(*p)[2] << 16 ) |
94 ( (size_t)(*p)[3] << 8 ) | (*p)[4];
Paul Bakkerefc30292011-11-10 14:43:23 +000095 (*p) += 5;
96 break;
97
98 default:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020099 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000100 }
101 }
102
103 if( *len > (size_t) ( end - *p ) )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200104 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000105
106 return( 0 );
107}
108
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200109int mbedtls_asn1_get_tag( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000110 const unsigned char *end,
111 size_t *len, int tag )
112{
113 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200114 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000115
116 if( **p != tag )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200117 return( MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakkerefc30292011-11-10 14:43:23 +0000118
119 (*p)++;
120
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200121 return( mbedtls_asn1_get_len( p, end, len ) );
Paul Bakkerefc30292011-11-10 14:43:23 +0000122}
123
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200124int mbedtls_asn1_get_bool( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000125 const unsigned char *end,
126 int *val )
127{
Janos Follath24eed8d2019-11-22 13:21:35 +0000128 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000129 size_t len;
130
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200131 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_BOOLEAN ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000132 return( ret );
133
134 if( len != 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200135 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000136
137 *val = ( **p != 0 ) ? 1 : 0;
138 (*p)++;
139
140 return( 0 );
141}
142
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200143static int asn1_get_tagged_int( unsigned char **p,
144 const unsigned char *end,
145 int tag, int *val )
Paul Bakkerefc30292011-11-10 14:43:23 +0000146{
Janos Follath24eed8d2019-11-22 13:21:35 +0000147 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000148 size_t len;
149
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200150 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, tag ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000151 return( ret );
152
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200153 /*
154 * len==0 is malformed (0 must be represented as 020100 for INTEGER,
155 * or 0A0100 for ENUMERATED tags
156 */
Gilles Peskine9fd97942019-10-10 19:27:53 +0200157 if( len == 0 )
158 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
159 /* This is a cryptography library. Reject negative integers. */
160 if( ( **p & 0x80 ) != 0 )
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100161 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
162
Gilles Peskine9fd97942019-10-10 19:27:53 +0200163 /* Skip leading zeros. */
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100164 while( len > 0 && **p == 0 )
165 {
166 ++( *p );
167 --len;
168 }
Gilles Peskine9fd97942019-10-10 19:27:53 +0200169
170 /* Reject integers that don't fit in an int. This code assumes that
171 * the int type has no padding bit. */
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100172 if( len > sizeof( int ) )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200173 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Gilles Peskine37570e82019-10-10 19:29:27 +0200174 if( len == sizeof( int ) && ( **p & 0x80 ) != 0 )
175 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000176
177 *val = 0;
Paul Bakkerefc30292011-11-10 14:43:23 +0000178 while( len-- > 0 )
179 {
180 *val = ( *val << 8 ) | **p;
181 (*p)++;
182 }
183
184 return( 0 );
185}
186
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200187int mbedtls_asn1_get_int( unsigned char **p,
188 const unsigned char *end,
189 int *val )
190{
191 return( asn1_get_tagged_int( p, end, MBEDTLS_ASN1_INTEGER, val) );
192}
193
194int mbedtls_asn1_get_enum( unsigned char **p,
195 const unsigned char *end,
196 int *val )
197{
198 return( asn1_get_tagged_int( p, end, MBEDTLS_ASN1_ENUMERATED, val) );
199}
200
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200201#if defined(MBEDTLS_BIGNUM_C)
202int mbedtls_asn1_get_mpi( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000203 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200204 mbedtls_mpi *X )
Paul Bakkerefc30292011-11-10 14:43:23 +0000205{
Janos Follath24eed8d2019-11-22 13:21:35 +0000206 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000207 size_t len;
208
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200209 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_INTEGER ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000210 return( ret );
211
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200212 ret = mbedtls_mpi_read_binary( X, *p, len );
Paul Bakkerefc30292011-11-10 14:43:23 +0000213
214 *p += len;
215
216 return( ret );
217}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200218#endif /* MBEDTLS_BIGNUM_C */
Paul Bakkerefc30292011-11-10 14:43:23 +0000219
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200220int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end,
221 mbedtls_asn1_bitstring *bs)
Paul Bakkerefc30292011-11-10 14:43:23 +0000222{
Janos Follath24eed8d2019-11-22 13:21:35 +0000223 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000224
225 /* Certificate type is a single byte bitstring */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200226 if( ( ret = mbedtls_asn1_get_tag( p, end, &bs->len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000227 return( ret );
228
229 /* Check length, subtract one for actual bit string length */
Paul Bakker66d5d072014-06-17 16:39:18 +0200230 if( bs->len < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000232 bs->len -= 1;
233
234 /* Get number of unused bits, ensure unused bits <= 7 */
235 bs->unused_bits = **p;
236 if( bs->unused_bits > 7 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200237 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000238 (*p)++;
239
240 /* Get actual bitstring */
241 bs->p = *p;
242 *p += bs->len;
243
244 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200245 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000246
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200247 return( 0 );
Paul Bakkerefc30292011-11-10 14:43:23 +0000248}
249
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200250/*
Hanno Becker199b7092019-09-11 14:21:26 +0100251 * Traverse an ASN.1 "SEQUENCE OF <tag>"
252 * and call a callback for each entry found.
253 */
254int mbedtls_asn1_traverse_sequence_of(
255 unsigned char **p,
256 const unsigned char *end,
257 uint8_t tag_must_mask, uint8_t tag_must_val,
258 uint8_t tag_may_mask, uint8_t tag_may_val,
259 int (*cb)( void *ctx, int tag,
260 unsigned char *start, size_t len ),
261 void *ctx )
262{
263 int ret;
264 size_t len;
265
266 /* Get main sequence tag */
267 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
268 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
269 {
270 return( ret );
271 }
272
273 if( *p + len != end )
274 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
275
276 while( *p < end )
277 {
278 unsigned char const tag = *(*p)++;
279
280 if( ( tag & tag_must_mask ) != tag_must_val )
281 return( MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
282
283 if( ( ret = mbedtls_asn1_get_len( p, end, &len ) ) != 0 )
284 return( ret );
285
286 if( ( tag & tag_may_mask ) == tag_may_val )
287 {
288 if( cb != NULL )
289 {
290 ret = cb( ctx, tag, *p, len );
291 if( ret != 0 )
292 return( ret );
293 }
294 }
295
296 *p += len;
297 }
298
299 return( 0 );
300}
301
302/*
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200303 * Get a bit string without unused bits
304 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200305int mbedtls_asn1_get_bitstring_null( unsigned char **p, const unsigned char *end,
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200306 size_t *len )
307{
Janos Follath24eed8d2019-11-22 13:21:35 +0000308 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200309
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200310 if( ( ret = mbedtls_asn1_get_tag( p, end, len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200311 return( ret );
312
Gilles Peskinee40d1202019-03-01 18:08:35 +0100313 if( *len == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200314 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
Gilles Peskinee40d1202019-03-01 18:08:35 +0100315 --( *len );
316
317 if( **p != 0 )
318 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
319 ++( *p );
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200320
321 return( 0 );
322}
323
Hanno Becker12ae27d2019-09-11 14:20:09 +0100324void mbedtls_asn1_sequence_free( mbedtls_asn1_sequence *seq )
325{
326 while( seq != NULL )
327 {
328 mbedtls_asn1_sequence *next = seq->next;
329 mbedtls_platform_zeroize( seq, sizeof( *seq ) );
330 mbedtls_free( seq );
331 seq = next;
332 }
333}
Paul Bakkerefc30292011-11-10 14:43:23 +0000334
335/*
336 * Parses and splits an ASN.1 "SEQUENCE OF <tag>"
337 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200338int mbedtls_asn1_get_sequence_of( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000339 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200340 mbedtls_asn1_sequence *cur,
Paul Bakkerefc30292011-11-10 14:43:23 +0000341 int tag)
342{
Janos Follath24eed8d2019-11-22 13:21:35 +0000343 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000344 size_t len;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200345 mbedtls_asn1_buf *buf;
Paul Bakkerefc30292011-11-10 14:43:23 +0000346
347 /* Get main sequence tag */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200348 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
349 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000350 return( ret );
351
352 if( *p + len != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200353 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000354
355 while( *p < end )
356 {
357 buf = &(cur->buf);
358 buf->tag = **p;
359
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200360 if( ( ret = mbedtls_asn1_get_tag( p, end, &buf->len, tag ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000361 return( ret );
362
363 buf->p = *p;
364 *p += buf->len;
365
366 /* Allocate and assign next pointer */
Paul Bakker66d5d072014-06-17 16:39:18 +0200367 if( *p < end )
Paul Bakkerefc30292011-11-10 14:43:23 +0000368 {
Simon Butcher29176892016-05-20 00:19:09 +0100369 cur->next = (mbedtls_asn1_sequence*)mbedtls_calloc( 1,
370 sizeof( mbedtls_asn1_sequence ) );
Paul Bakkerefc30292011-11-10 14:43:23 +0000371
372 if( cur->next == NULL )
Manuel Pégourié-Gonnard6a8ca332015-05-28 09:33:39 +0200373 return( MBEDTLS_ERR_ASN1_ALLOC_FAILED );
Paul Bakkerefc30292011-11-10 14:43:23 +0000374
375 cur = cur->next;
376 }
377 }
378
379 /* Set final sequence entry's next pointer to NULL */
380 cur->next = NULL;
381
382 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200383 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000384
385 return( 0 );
386}
387
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200388int mbedtls_asn1_get_alg( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200389 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200390 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200391{
Janos Follath24eed8d2019-11-22 13:21:35 +0000392 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200393 size_t len;
394
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200395 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
396 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200397 return( ret );
398
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200399 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200400 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200401
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200402 alg->tag = **p;
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200403 end = *p + len;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200404
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200405 if( ( ret = mbedtls_asn1_get_tag( p, end, &alg->len, MBEDTLS_ASN1_OID ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200406 return( ret );
407
408 alg->p = *p;
409 *p += alg->len;
410
411 if( *p == end )
412 {
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -0500413 mbedtls_platform_zeroize( params, sizeof(mbedtls_asn1_buf) );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200414 return( 0 );
415 }
416
417 params->tag = **p;
418 (*p)++;
419
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200420 if( ( ret = mbedtls_asn1_get_len( p, end, &params->len ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200421 return( ret );
422
423 params->p = *p;
424 *p += params->len;
425
426 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200427 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200428
429 return( 0 );
430}
431
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200432int mbedtls_asn1_get_alg_null( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200433 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200434 mbedtls_asn1_buf *alg )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200435{
Janos Follath24eed8d2019-11-22 13:21:35 +0000436 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200437 mbedtls_asn1_buf params;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200438
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200439 memset( &params, 0, sizeof(mbedtls_asn1_buf) );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200440
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200441 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, &params ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200442 return( ret );
443
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200444 if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 )
445 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200446
447 return( 0 );
448}
449
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200450void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *cur )
Paul Bakkere5eae762013-08-26 12:05:14 +0200451{
452 if( cur == NULL )
453 return;
454
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200455 mbedtls_free( cur->oid.p );
456 mbedtls_free( cur->val.p );
Paul Bakkere5eae762013-08-26 12:05:14 +0200457
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -0500458 mbedtls_platform_zeroize( cur, sizeof( mbedtls_asn1_named_data ) );
Paul Bakkere5eae762013-08-26 12:05:14 +0200459}
460
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200461void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head )
Paul Bakkerc547cc92013-09-09 12:01:23 +0200462{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200463 mbedtls_asn1_named_data *cur;
Paul Bakkerc547cc92013-09-09 12:01:23 +0200464
465 while( ( cur = *head ) != NULL )
466 {
467 *head = cur->next;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200468 mbedtls_asn1_free_named_data( cur );
469 mbedtls_free( cur );
Paul Bakkerc547cc92013-09-09 12:01:23 +0200470 }
471}
472
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200473mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( mbedtls_asn1_named_data *list,
Paul Bakkere5eae762013-08-26 12:05:14 +0200474 const char *oid, size_t len )
475{
476 while( list != NULL )
477 {
478 if( list->oid.len == len &&
479 memcmp( list->oid.p, oid, len ) == 0 )
480 {
481 break;
482 }
483
484 list = list->next;
485 }
486
487 return( list );
488}
489
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200490#endif /* MBEDTLS_ASN1_PARSE_C */