blob: d8ee46930890537a1af160bf12b04b76b39217c9 [file] [log] [blame]
Paul Bakkerefc30292011-11-10 14:43:23 +00001/**
2 * \file asn1.h
3 *
4 * \brief Generic ASN.1 parsing
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Dave Rodgman16799db2023-11-02 19:47:20 +00008 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
Paul Bakkerefc30292011-11-10 14:43:23 +00009 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020010#ifndef MBEDTLS_ASN1_H
11#define MBEDTLS_ASN1_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020012#include "mbedtls/private_access.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000013
Bence Szépkútic662b362021-05-27 11:25:03 +020014#include "mbedtls/build_info.h"
Glenn Strauss82ba2742022-11-04 04:01:23 -040015#include "mbedtls/platform_util.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000016
Rich Evans00ab4702015-02-06 13:43:58 +000017#include <stddef.h>
18
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020019#if defined(MBEDTLS_BIGNUM_C)
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010020#include "mbedtls/bignum.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000021#endif
22
Paul Bakker9af723c2014-05-01 13:03:14 +020023/**
Paul Bakkerefc30292011-11-10 14:43:23 +000024 * \addtogroup asn1_module
Paul Bakker9af723c2014-05-01 13:03:14 +020025 * \{
Paul Bakkerefc30292011-11-10 14:43:23 +000026 */
Paul Bakker9af723c2014-05-01 13:03:14 +020027
Paul Bakkerefc30292011-11-10 14:43:23 +000028/**
29 * \name ASN1 Error codes
Nayna Jainc9deb182020-11-16 19:03:12 +000030 * These error codes are combined with other error codes for
Paul Bakker9af723c2014-05-01 13:03:14 +020031 * higher error granularity.
Nayna Jainc9deb182020-11-16 19:03:12 +000032 * e.g. X.509 and PKCS #7 error codes
Paul Bakkerefc30292011-11-10 14:43:23 +000033 * ASN1 is a standard to specify data structures.
34 * \{
35 */
Gilles Peskined2971572021-07-26 18:48:10 +020036/** Out of data when parsing an ASN1 data structure. */
37#define MBEDTLS_ERR_ASN1_OUT_OF_DATA -0x0060
38/** ASN1 tag was of an unexpected value. */
39#define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG -0x0062
40/** Error when trying to determine the length or invalid length. */
41#define MBEDTLS_ERR_ASN1_INVALID_LENGTH -0x0064
42/** Actual length differs from expected length. */
43#define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH -0x0066
44/** Data is invalid. */
45#define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068
46/** Memory allocation failed */
47#define MBEDTLS_ERR_ASN1_ALLOC_FAILED -0x006A
48/** Buffer too small when writing ASN.1 data structure. */
49#define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL -0x006C
Paul Bakker05888152012-02-16 10:26:57 +000050
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +010051/** \} name ASN1 Error codes */
Paul Bakkerefc30292011-11-10 14:43:23 +000052
53/**
54 * \name DER constants
Andres Amaya Garcia9fb02052017-08-25 17:24:44 +010055 * These constants comply with the DER encoded ASN.1 type tags.
Paul Bakkerefc30292011-11-10 14:43:23 +000056 * DER encoding uses hexadecimal representation.
57 * An example DER sequence is:\n
58 * - 0x02 -- tag indicating INTEGER
59 * - 0x01 -- length in octets
60 * - 0x05 -- value
Gilles Peskine96ddb0a2020-02-26 19:50:01 +010061 * Such sequences are typically read into \c ::mbedtls_x509_buf.
Paul Bakkerefc30292011-11-10 14:43:23 +000062 * \{
63 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020064#define MBEDTLS_ASN1_BOOLEAN 0x01
65#define MBEDTLS_ASN1_INTEGER 0x02
66#define MBEDTLS_ASN1_BIT_STRING 0x03
67#define MBEDTLS_ASN1_OCTET_STRING 0x04
68#define MBEDTLS_ASN1_NULL 0x05
69#define MBEDTLS_ASN1_OID 0x06
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +020070#define MBEDTLS_ASN1_ENUMERATED 0x0A
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020071#define MBEDTLS_ASN1_UTF8_STRING 0x0C
72#define MBEDTLS_ASN1_SEQUENCE 0x10
73#define MBEDTLS_ASN1_SET 0x11
74#define MBEDTLS_ASN1_PRINTABLE_STRING 0x13
75#define MBEDTLS_ASN1_T61_STRING 0x14
76#define MBEDTLS_ASN1_IA5_STRING 0x16
77#define MBEDTLS_ASN1_UTC_TIME 0x17
78#define MBEDTLS_ASN1_GENERALIZED_TIME 0x18
79#define MBEDTLS_ASN1_UNIVERSAL_STRING 0x1C
80#define MBEDTLS_ASN1_BMP_STRING 0x1E
81#define MBEDTLS_ASN1_PRIMITIVE 0x00
82#define MBEDTLS_ASN1_CONSTRUCTED 0x20
83#define MBEDTLS_ASN1_CONTEXT_SPECIFIC 0x80
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +010084
Hanno Beckercba71222019-09-11 14:15:10 +010085/* Slightly smaller way to check if tag is a string tag
86 * compared to canonical implementation. */
Agathiyan Bragadeesh52af0d02023-08-30 16:22:54 +010087#define MBEDTLS_ASN1_IS_STRING_TAG(tag) \
88 ((unsigned int) (tag) < 32u && ( \
89 ((1u << (tag)) & ((1u << MBEDTLS_ASN1_BMP_STRING) | \
90 (1u << MBEDTLS_ASN1_UTF8_STRING) | \
91 (1u << MBEDTLS_ASN1_T61_STRING) | \
92 (1u << MBEDTLS_ASN1_IA5_STRING) | \
93 (1u << MBEDTLS_ASN1_UNIVERSAL_STRING) | \
94 (1u << MBEDTLS_ASN1_PRINTABLE_STRING))) != 0))
Hanno Beckercba71222019-09-11 14:15:10 +010095
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +010096/*
97 * Bit masks for each of the components of an ASN.1 tag as specified in
Gilles Peskine1ed45ea2018-03-08 18:16:45 +010098 * ITU X.690 (08/2015), section 8.1 "General rules for encoding",
99 * paragraph 8.1.2.2:
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +0100100 *
101 * Bit 8 7 6 5 1
102 * +-------+-----+------------+
103 * | Class | P/C | Tag number |
104 * +-------+-----+------------+
105 */
Andres Amaya Garcia7786abc2017-11-07 20:21:56 +0000106#define MBEDTLS_ASN1_TAG_CLASS_MASK 0xC0
107#define MBEDTLS_ASN1_TAG_PC_MASK 0x20
108#define MBEDTLS_ASN1_TAG_VALUE_MASK 0x1F
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +0100109
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +0100110/** \} name DER constants */
Paul Bakkerefc30292011-11-10 14:43:23 +0000111
112/** Returns the size of the binary string, without the trailing \\0 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200113#define MBEDTLS_OID_SIZE(x) (sizeof(x) - 1)
Paul Bakkerefc30292011-11-10 14:43:23 +0000114
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +0100115/**
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200116 * Compares an mbedtls_asn1_buf structure to a reference OID.
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +0100117 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200118 * Only works for 'defined' oid_str values (MBEDTLS_OID_HMAC_SHA1), you cannot use a
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +0100119 * 'unsigned char *oid' here!
Paul Bakkere5eae762013-08-26 12:05:14 +0200120 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200121#define MBEDTLS_OID_CMP(oid_str, oid_buf) \
Gilles Peskine449bd832023-01-11 14:50:10 +0100122 ((MBEDTLS_OID_SIZE(oid_str) != (oid_buf)->len) || \
123 memcmp((oid_str), (oid_buf)->p, (oid_buf)->len) != 0)
Paul Bakkerc70b9822013-04-07 22:00:46 +0200124
Hanno Becker63e38fe2019-09-11 14:16:40 +0100125#define MBEDTLS_OID_CMP_RAW(oid_str, oid_buf, oid_buf_len) \
Gilles Peskine449bd832023-01-11 14:50:10 +0100126 ((MBEDTLS_OID_SIZE(oid_str) != (oid_buf_len)) || \
127 memcmp((oid_str), (oid_buf), (oid_buf_len)) != 0)
Hanno Becker63e38fe2019-09-11 14:16:40 +0100128
Paul Bakkerefc30292011-11-10 14:43:23 +0000129#ifdef __cplusplus
130extern "C" {
131#endif
132
133/**
134 * \name Functions to parse ASN.1 data structures
135 * \{
136 */
137
138/**
139 * Type-length-value structure that allows for ASN1 using DER.
140 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100141typedef struct mbedtls_asn1_buf {
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200142 int tag; /**< ASN1 type, e.g. MBEDTLS_ASN1_UTF8_STRING. */
143 size_t len; /**< ASN1 length, in octets. */
144 unsigned char *p; /**< ASN1 data, e.g. in ASCII. */
Paul Bakkerefc30292011-11-10 14:43:23 +0000145}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200146mbedtls_asn1_buf;
Paul Bakkerefc30292011-11-10 14:43:23 +0000147
148/**
149 * Container for ASN1 bit strings.
150 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100151typedef struct mbedtls_asn1_bitstring {
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200152 size_t len; /**< ASN1 length, in octets. */
153 unsigned char unused_bits; /**< Number of unused bits at the end of the string */
154 unsigned char *p; /**< Raw ASN1 data for the bit string */
Paul Bakkerefc30292011-11-10 14:43:23 +0000155}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200156mbedtls_asn1_bitstring;
Paul Bakkerefc30292011-11-10 14:43:23 +0000157
158/**
159 * Container for a sequence of ASN.1 items
160 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100161typedef struct mbedtls_asn1_sequence {
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200162 mbedtls_asn1_buf buf; /**< Buffer containing the given ASN.1 item. */
163
164 /** The next entry in the sequence.
165 *
Gilles Peskine44ffc792021-08-31 22:59:35 +0200166 * The details of memory management for sequences are not documented and
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200167 * may change in future versions. Set this field to \p NULL when
Gilles Peskine44ffc792021-08-31 22:59:35 +0200168 * initializing a structure, and do not modify it except via Mbed TLS
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200169 * library functions.
170 */
171 struct mbedtls_asn1_sequence *next;
Paul Bakkerefc30292011-11-10 14:43:23 +0000172}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200173mbedtls_asn1_sequence;
Paul Bakkerefc30292011-11-10 14:43:23 +0000174
175/**
Paul Bakkere5eae762013-08-26 12:05:14 +0200176 * Container for a sequence or list of 'named' ASN.1 data items
177 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100178typedef struct mbedtls_asn1_named_data {
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200179 mbedtls_asn1_buf oid; /**< The object identifier. */
180 mbedtls_asn1_buf val; /**< The named value. */
181
182 /** The next entry in the sequence.
183 *
Gilles Peskine44ffc792021-08-31 22:59:35 +0200184 * The details of memory management for named data sequences are not
185 * documented and may change in future versions. Set this field to \p NULL
186 * when initializing a structure, and do not modify it except via Mbed TLS
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200187 * library functions.
188 */
189 struct mbedtls_asn1_named_data *next;
190
191 /** Merge next item into the current one?
192 *
193 * This field exists for the sake of Mbed TLS's X.509 certificate parsing
194 * code and may change in future versions of the library.
195 */
196 unsigned char MBEDTLS_PRIVATE(next_merged);
Paul Bakkere5eae762013-08-26 12:05:14 +0200197}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200198mbedtls_asn1_named_data;
Paul Bakkere5eae762013-08-26 12:05:14 +0200199
Valerio Setti688f7952024-01-16 09:18:40 +0100200#if defined(MBEDTLS_ASN1_PARSE_C) || defined(MBEDTLS_X509_CREATE_C) || \
Valerio Settib1f6d2a2024-02-08 17:41:45 +0100201 defined(MBEDTLS_PSA_UTIL_HAVE_ECDSA) || defined(MBEDTLS_PEM_PARSE_C)
Paul Bakkere5eae762013-08-26 12:05:14 +0200202/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200203 * \brief Get the length of an ASN.1 element.
204 * Updates the pointer to immediately behind the length.
Paul Bakkerefc30292011-11-10 14:43:23 +0000205 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100206 * \param p On entry, \c *p points to the first byte of the length,
207 * i.e. immediately after the tag.
208 * On successful completion, \c *p points to the first byte
209 * after the length, i.e. the first byte of the content.
210 * On error, the value of \c *p is undefined.
211 * \param end End of data.
Gilles Peskinedc2db482019-09-20 21:06:01 +0200212 * \param len On successful completion, \c *len contains the length
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100213 * read from the ASN.1 input.
Paul Bakkerefc30292011-11-10 14:43:23 +0000214 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100215 * \return 0 if successful.
216 * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element
217 * would end beyond \p end.
Andrzej Kurek5c65c572022-04-13 14:28:52 -0400218 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable.
Paul Bakkerefc30292011-11-10 14:43:23 +0000219 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100220int mbedtls_asn1_get_len(unsigned char **p,
221 const unsigned char *end,
222 size_t *len);
Paul Bakkerefc30292011-11-10 14:43:23 +0000223
224/**
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100225 * \brief Get the tag and length of the element.
226 * Check for the requested tag.
Paul Bakkercdda0972013-09-09 12:51:29 +0200227 * Updates the pointer to immediately behind the tag and length.
Paul Bakkerefc30292011-11-10 14:43:23 +0000228 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100229 * \param p On entry, \c *p points to the start of the ASN.1 element.
230 * On successful completion, \c *p points to the first byte
231 * after the length, i.e. the first byte of the content.
232 * On error, the value of \c *p is undefined.
233 * \param end End of data.
Gilles Peskinedc2db482019-09-20 21:06:01 +0200234 * \param len On successful completion, \c *len contains the length
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100235 * read from the ASN.1 input.
236 * \param tag The expected tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000237 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100238 * \return 0 if successful.
239 * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the data does not start
240 * with the requested tag.
241 * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element
242 * would end beyond \p end.
Shaun Case8b0ecbc2021-12-20 21:14:10 -0800243 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable.
Paul Bakkerefc30292011-11-10 14:43:23 +0000244 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100245int mbedtls_asn1_get_tag(unsigned char **p,
246 const unsigned char *end,
247 size_t *len, int tag);
Valerio Settib1f6d2a2024-02-08 17:41:45 +0100248#endif /* MBEDTLS_ASN1_PARSE_C || MBEDTLS_X509_CREATE_C ||
249 MBEDTLS_PSA_UTIL_HAVE_ECDSA || MBEDTLS_PEM_PARSE_C */
Paul Bakkerefc30292011-11-10 14:43:23 +0000250
Agathiyan Bragadeeshd34c4262023-09-08 11:09:50 +0100251#if defined(MBEDTLS_ASN1_PARSE_C)
Paul Bakkerefc30292011-11-10 14:43:23 +0000252/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200253 * \brief Retrieve a boolean ASN.1 tag and its value.
254 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000255 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100256 * \param p On entry, \c *p points to the start of the ASN.1 element.
257 * On successful completion, \c *p points to the first byte
258 * beyond the ASN.1 element.
259 * On error, the value of \c *p is undefined.
260 * \param end End of data.
261 * \param val On success, the parsed value (\c 0 or \c 1).
Paul Bakkerefc30292011-11-10 14:43:23 +0000262 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100263 * \return 0 if successful.
264 * \return An ASN.1 error code if the input does not start with
265 * a valid ASN.1 BOOLEAN.
Paul Bakkerefc30292011-11-10 14:43:23 +0000266 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100267int mbedtls_asn1_get_bool(unsigned char **p,
268 const unsigned char *end,
269 int *val);
Paul Bakkerefc30292011-11-10 14:43:23 +0000270
271/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200272 * \brief Retrieve an integer ASN.1 tag and its value.
273 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000274 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100275 * \param p On entry, \c *p points to the start of the ASN.1 element.
276 * On successful completion, \c *p points to the first byte
277 * beyond the ASN.1 element.
278 * On error, the value of \c *p is undefined.
279 * \param end End of data.
280 * \param val On success, the parsed value.
Paul Bakkerefc30292011-11-10 14:43:23 +0000281 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100282 * \return 0 if successful.
283 * \return An ASN.1 error code if the input does not start with
284 * a valid ASN.1 INTEGER.
285 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does
286 * not fit in an \c int.
Paul Bakkerefc30292011-11-10 14:43:23 +0000287 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100288int mbedtls_asn1_get_int(unsigned char **p,
289 const unsigned char *end,
290 int *val);
Paul Bakkerefc30292011-11-10 14:43:23 +0000291
292/**
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200293 * \brief Retrieve an enumerated ASN.1 tag and its value.
294 * Updates the pointer to immediately behind the full tag.
295 *
296 * \param p On entry, \c *p points to the start of the ASN.1 element.
297 * On successful completion, \c *p points to the first byte
298 * beyond the ASN.1 element.
299 * On error, the value of \c *p is undefined.
300 * \param end End of data.
301 * \param val On success, the parsed value.
302 *
303 * \return 0 if successful.
304 * \return An ASN.1 error code if the input does not start with
305 * a valid ASN.1 ENUMERATED.
306 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does
307 * not fit in an \c int.
308 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100309int mbedtls_asn1_get_enum(unsigned char **p,
310 const unsigned char *end,
311 int *val);
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200312
313/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200314 * \brief Retrieve a bitstring ASN.1 tag and its value.
315 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000316 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100317 * \param p On entry, \c *p points to the start of the ASN.1 element.
318 * On successful completion, \c *p is equal to \p end.
319 * On error, the value of \c *p is undefined.
320 * \param end End of data.
321 * \param bs On success, ::mbedtls_asn1_bitstring information about
322 * the parsed value.
Paul Bakkerefc30292011-11-10 14:43:23 +0000323 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100324 * \return 0 if successful.
325 * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains
326 * extra data after a valid BIT STRING.
327 * \return An ASN.1 error code if the input does not start with
328 * a valid ASN.1 BIT STRING.
Paul Bakkerefc30292011-11-10 14:43:23 +0000329 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100330int mbedtls_asn1_get_bitstring(unsigned char **p, const unsigned char *end,
331 mbedtls_asn1_bitstring *bs);
Paul Bakkerefc30292011-11-10 14:43:23 +0000332
333/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200334 * \brief Retrieve a bitstring ASN.1 tag without unused bits and its
335 * value.
336 * Updates the pointer to the beginning of the bit/octet string.
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200337 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100338 * \param p On entry, \c *p points to the start of the ASN.1 element.
339 * On successful completion, \c *p points to the first byte
340 * of the content of the BIT STRING.
341 * On error, the value of \c *p is undefined.
342 * \param end End of data.
343 * \param len On success, \c *len is the length of the content in bytes.
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200344 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100345 * \return 0 if successful.
346 * \return #MBEDTLS_ERR_ASN1_INVALID_DATA if the input starts with
347 * a valid BIT STRING with a nonzero number of unused bits.
348 * \return An ASN.1 error code if the input does not start with
349 * a valid ASN.1 BIT STRING.
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200350 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100351int mbedtls_asn1_get_bitstring_null(unsigned char **p,
352 const unsigned char *end,
353 size_t *len);
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200354
355/**
Gilles Peskinedc2db482019-09-20 21:06:01 +0200356 * \brief Parses and splits an ASN.1 "SEQUENCE OF <tag>".
357 * Updates the pointer to immediately behind the full sequence tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000358 *
Hanno Becker12ae27d2019-09-11 14:20:09 +0100359 * This function allocates memory for the sequence elements. You can free
360 * the allocated memory with mbedtls_asn1_sequence_free().
361 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100362 * \note On error, this function may return a partial list in \p cur.
363 * You must set `cur->next = NULL` before calling this function!
364 * Otherwise it is impossible to distinguish a previously non-null
365 * pointer from a pointer to an object allocated by this function.
Paul Bakkerefc30292011-11-10 14:43:23 +0000366 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100367 * \note If the sequence is empty, this function does not modify
368 * \c *cur. If the sequence is valid and non-empty, this
369 * function sets `cur->buf.tag` to \p tag. This allows
370 * callers to distinguish between an empty sequence and
371 * a one-element sequence.
372 *
373 * \param p On entry, \c *p points to the start of the ASN.1 element.
374 * On successful completion, \c *p is equal to \p end.
375 * On error, the value of \c *p is undefined.
376 * \param end End of data.
377 * \param cur A ::mbedtls_asn1_sequence which this function fills.
378 * When this function returns, \c *cur is the head of a linked
379 * list. Each node in this list is allocated with
380 * mbedtls_calloc() apart from \p cur itself, and should
381 * therefore be freed with mbedtls_free().
382 * The list describes the content of the sequence.
383 * The head of the list (i.e. \c *cur itself) describes the
384 * first element, `*cur->next` describes the second element, etc.
385 * For each element, `buf.tag == tag`, `buf.len` is the length
386 * of the content of the content of the element, and `buf.p`
387 * points to the first byte of the content (i.e. immediately
388 * past the length of the element).
389 * Note that list elements may be allocated even on error.
390 * \param tag Each element of the sequence must have this tag.
391 *
392 * \return 0 if successful.
393 * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains
394 * extra data after a valid SEQUENCE OF \p tag.
Gilles Peskineb5c74a52019-10-30 17:07:02 +0100395 * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the input starts with
396 * an ASN.1 SEQUENCE in which an element has a tag that
397 * is different from \p tag.
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100398 * \return #MBEDTLS_ERR_ASN1_ALLOC_FAILED if a memory allocation failed.
399 * \return An ASN.1 error code if the input does not start with
Gilles Peskineb5c74a52019-10-30 17:07:02 +0100400 * a valid ASN.1 SEQUENCE.
Paul Bakkerefc30292011-11-10 14:43:23 +0000401 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100402int mbedtls_asn1_get_sequence_of(unsigned char **p,
403 const unsigned char *end,
404 mbedtls_asn1_sequence *cur,
405 int tag);
Hanno Becker12ae27d2019-09-11 14:20:09 +0100406/**
407 * \brief Free a heap-allocated linked list presentation of
408 * an ASN.1 sequence, including the first element.
409 *
410 * There are two common ways to manage the memory used for the representation
411 * of a parsed ASN.1 sequence:
412 * - Allocate a head node `mbedtls_asn1_sequence *head` with mbedtls_calloc().
413 * Pass this node as the `cur` argument to mbedtls_asn1_get_sequence_of().
414 * When you have finished processing the sequence,
415 * call mbedtls_asn1_sequence_free() on `head`.
416 * - Allocate a head node `mbedtls_asn1_sequence *head` in any manner,
417 * for example on the stack. Make sure that `head->next == NULL`.
418 * Pass `head` as the `cur` argument to mbedtls_asn1_get_sequence_of().
419 * When you have finished processing the sequence,
420 * call mbedtls_asn1_sequence_free() on `head->cur`,
421 * then free `head` itself in the appropriate manner.
422 *
423 * \param seq The address of the first sequence component. This may
424 * be \c NULL, in which case this functions returns
425 * immediately.
426 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100427void mbedtls_asn1_sequence_free(mbedtls_asn1_sequence *seq);
Paul Bakkerefc30292011-11-10 14:43:23 +0000428
Hanno Becker199b7092019-09-11 14:21:26 +0100429/**
430 * \brief Traverse an ASN.1 SEQUENCE container and
431 * call a callback for each entry.
432 *
433 * This function checks that the input is a SEQUENCE of elements that
434 * each have a "must" tag, and calls a callback function on the elements
435 * that have a "may" tag.
436 *
437 * For example, to validate that the input is a SEQUENCE of `tag1` and call
438 * `cb` on each element, use
439 * ```
440 * mbedtls_asn1_traverse_sequence_of(&p, end, 0xff, tag1, 0, 0, cb, ctx);
441 * ```
442 *
443 * To validate that the input is a SEQUENCE of ANY and call `cb` on
444 * each element, use
445 * ```
446 * mbedtls_asn1_traverse_sequence_of(&p, end, 0, 0, 0, 0, cb, ctx);
447 * ```
448 *
449 * To validate that the input is a SEQUENCE of CHOICE {NULL, OCTET STRING}
450 * and call `cb` on each element that is an OCTET STRING, use
451 * ```
452 * mbedtls_asn1_traverse_sequence_of(&p, end, 0xfe, 0x04, 0xff, 0x04, cb, ctx);
453 * ```
454 *
455 * The callback is called on the elements with a "may" tag from left to
456 * right. If the input is not a valid SEQUENCE of elements with a "must" tag,
457 * the callback is called on the elements up to the leftmost point where
458 * the input is invalid.
459 *
460 * \warning This function is still experimental and may change
461 * at any time.
462 *
463 * \param p The address of the pointer to the beginning of
464 * the ASN.1 SEQUENCE header. This is updated to
465 * point to the end of the ASN.1 SEQUENCE container
466 * on a successful invocation.
467 * \param end The end of the ASN.1 SEQUENCE container.
468 * \param tag_must_mask A mask to be applied to the ASN.1 tags found within
Andrzej Kurek69ed8c42022-02-17 10:06:44 -0500469 * the SEQUENCE before comparing to \p tag_must_val.
Hanno Becker199b7092019-09-11 14:21:26 +0100470 * \param tag_must_val The required value of each ASN.1 tag found in the
471 * SEQUENCE, after masking with \p tag_must_mask.
472 * Mismatching tags lead to an error.
473 * For example, a value of \c 0 for both \p tag_must_mask
474 * and \p tag_must_val means that every tag is allowed,
475 * while a value of \c 0xFF for \p tag_must_mask means
476 * that \p tag_must_val is the only allowed tag.
477 * \param tag_may_mask A mask to be applied to the ASN.1 tags found within
Andrzej Kurek69ed8c42022-02-17 10:06:44 -0500478 * the SEQUENCE before comparing to \p tag_may_val.
Hanno Becker199b7092019-09-11 14:21:26 +0100479 * \param tag_may_val The desired value of each ASN.1 tag found in the
480 * SEQUENCE, after masking with \p tag_may_mask.
481 * Mismatching tags will be silently ignored.
482 * For example, a value of \c 0 for \p tag_may_mask and
483 * \p tag_may_val means that any tag will be considered,
484 * while a value of \c 0xFF for \p tag_may_mask means
485 * that all tags with value different from \p tag_may_val
486 * will be ignored.
487 * \param cb The callback to trigger for each component
488 * in the ASN.1 SEQUENCE that matches \p tag_may_val.
489 * The callback function is called with the following
490 * parameters:
491 * - \p ctx.
492 * - The tag of the current element.
493 * - A pointer to the start of the current element's
494 * content inside the input.
495 * - The length of the content of the current element.
496 * If the callback returns a non-zero value,
497 * the function stops immediately,
498 * forwarding the callback's return value.
499 * \param ctx The context to be passed to the callback \p cb.
500 *
501 * \return \c 0 if successful the entire ASN.1 SEQUENCE
502 * was traversed without parsing or callback errors.
503 * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input
504 * contains extra data after a valid SEQUENCE
505 * of elements with an accepted tag.
506 * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the input starts
507 * with an ASN.1 SEQUENCE in which an element has a tag
508 * that is not accepted.
509 * \return An ASN.1 error code if the input does not start with
510 * a valid ASN.1 SEQUENCE.
511 * \return A non-zero error code forwarded from the callback
512 * \p cb in case the latter returns a non-zero value.
513 */
514int mbedtls_asn1_traverse_sequence_of(
515 unsigned char **p,
516 const unsigned char *end,
Hanno Becker34aada22020-02-03 10:39:55 +0000517 unsigned char tag_must_mask, unsigned char tag_must_val,
518 unsigned char tag_may_mask, unsigned char tag_may_val,
Gilles Peskine449bd832023-01-11 14:50:10 +0100519 int (*cb)(void *ctx, int tag,
520 unsigned char *start, size_t len),
521 void *ctx);
Hanno Becker199b7092019-09-11 14:21:26 +0100522
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200523#if defined(MBEDTLS_BIGNUM_C)
Paul Bakkerefc30292011-11-10 14:43:23 +0000524/**
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100525 * \brief Retrieve an integer ASN.1 tag and its value.
Paul Bakkercdda0972013-09-09 12:51:29 +0200526 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000527 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100528 * \param p On entry, \c *p points to the start of the ASN.1 element.
529 * On successful completion, \c *p points to the first byte
530 * beyond the ASN.1 element.
531 * On error, the value of \c *p is undefined.
532 * \param end End of data.
533 * \param X On success, the parsed value.
Paul Bakkerefc30292011-11-10 14:43:23 +0000534 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100535 * \return 0 if successful.
536 * \return An ASN.1 error code if the input does not start with
537 * a valid ASN.1 INTEGER.
538 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does
539 * not fit in an \c int.
540 * \return An MPI error code if the parsed value is too large.
Paul Bakkerefc30292011-11-10 14:43:23 +0000541 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100542int mbedtls_asn1_get_mpi(unsigned char **p,
543 const unsigned char *end,
544 mbedtls_mpi *X);
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200545#endif /* MBEDTLS_BIGNUM_C */
Paul Bakkerefc30292011-11-10 14:43:23 +0000546
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200547/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200548 * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence.
549 * Updates the pointer to immediately behind the full
550 * AlgorithmIdentifier.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200551 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100552 * \param p On entry, \c *p points to the start of the ASN.1 element.
553 * On successful completion, \c *p points to the first byte
554 * beyond the AlgorithmIdentifier element.
555 * On error, the value of \c *p is undefined.
556 * \param end End of data.
557 * \param alg The buffer to receive the OID.
558 * \param params The buffer to receive the parameters.
559 * This is zeroized if there are no parameters.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200560 *
561 * \return 0 if successful or a specific ASN.1 or MPI error code.
562 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100563int mbedtls_asn1_get_alg(unsigned char **p,
564 const unsigned char *end,
565 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params);
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200566
567/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200568 * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence with NULL or no
569 * params.
570 * Updates the pointer to immediately behind the full
571 * AlgorithmIdentifier.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200572 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100573 * \param p On entry, \c *p points to the start of the ASN.1 element.
574 * On successful completion, \c *p points to the first byte
575 * beyond the AlgorithmIdentifier element.
576 * On error, the value of \c *p is undefined.
577 * \param end End of data.
578 * \param alg The buffer to receive the OID.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200579 *
580 * \return 0 if successful or a specific ASN.1 or MPI error code.
581 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100582int mbedtls_asn1_get_alg_null(unsigned char **p,
583 const unsigned char *end,
584 mbedtls_asn1_buf *alg);
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200585
Paul Bakkere5eae762013-08-26 12:05:14 +0200586/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200587 * \brief Find a specific named_data entry in a sequence or list based on
588 * the OID.
Paul Bakkere5eae762013-08-26 12:05:14 +0200589 *
590 * \param list The list to seek through
591 * \param oid The OID to look for
592 * \param len Size of the OID
593 *
594 * \return NULL if not found, or a pointer to the existing entry.
595 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100596const mbedtls_asn1_named_data *mbedtls_asn1_find_named_data(const mbedtls_asn1_named_data *list,
597 const char *oid, size_t len);
Paul Bakkere5eae762013-08-26 12:05:14 +0200598
Glenn Strauss82ba2742022-11-04 04:01:23 -0400599#if !defined(MBEDTLS_DEPRECATED_REMOVED)
Paul Bakkere5eae762013-08-26 12:05:14 +0200600/**
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200601 * \brief Free a mbedtls_asn1_named_data entry
Paul Bakkere5eae762013-08-26 12:05:14 +0200602 *
Glenn Strauss82ba2742022-11-04 04:01:23 -0400603 * \deprecated This function is deprecated and will be removed in a
604 * future version of the library.
605 * Please use mbedtls_asn1_free_named_data_list()
606 * or mbedtls_asn1_free_named_data_list_shallow().
607 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100608 * \param entry The named data entry to free.
609 * This function calls mbedtls_free() on
610 * `entry->oid.p` and `entry->val.p`.
Paul Bakkere5eae762013-08-26 12:05:14 +0200611 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100612void MBEDTLS_DEPRECATED mbedtls_asn1_free_named_data(mbedtls_asn1_named_data *entry);
Glenn Strauss82ba2742022-11-04 04:01:23 -0400613#endif /* MBEDTLS_DEPRECATED_REMOVED */
Paul Bakkere5eae762013-08-26 12:05:14 +0200614
Paul Bakkerc547cc92013-09-09 12:01:23 +0200615/**
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100616 * \brief Free all entries in a mbedtls_asn1_named_data list.
Paul Bakkerc547cc92013-09-09 12:01:23 +0200617 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100618 * \param head Pointer to the head of the list of named data entries to free.
Glenn Strauss82ba2742022-11-04 04:01:23 -0400619 * This function calls mbedtls_free() on
620 * `entry->oid.p` and `entry->val.p` and then on `entry`
621 * for each list entry, and sets \c *head to \c NULL.
Paul Bakkerc547cc92013-09-09 12:01:23 +0200622 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100623void mbedtls_asn1_free_named_data_list(mbedtls_asn1_named_data **head);
Paul Bakkerc547cc92013-09-09 12:01:23 +0200624
Glenn Straussa4b40412022-06-26 19:32:09 -0400625/**
626 * \brief Free all shallow entries in a mbedtls_asn1_named_data list,
627 * but do not free internal pointer targets.
628 *
629 * \param name Head of the list of named data entries to free.
630 * This function calls mbedtls_free() on each list element.
631 */
Gilles Peskine449bd832023-01-11 14:50:10 +0100632void mbedtls_asn1_free_named_data_list_shallow(mbedtls_asn1_named_data *name);
Glenn Straussa4b40412022-06-26 19:32:09 -0400633
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +0100634/** \} name Functions to parse ASN.1 data structures */
Andrzej Kureka0defed2021-12-30 12:33:31 +0100635/** \} addtogroup asn1_module */
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +0100636
Jan Bruckner946720a2023-10-09 16:26:35 +0200637#endif /* MBEDTLS_ASN1_PARSE_C */
638
Paul Bakkerefc30292011-11-10 14:43:23 +0000639#ifdef __cplusplus
640}
641#endif
642
Paul Bakkerefc30292011-11-10 14:43:23 +0000643#endif /* asn1.h */