Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 1 | /** |
| 2 | * \file asn1.h |
| 3 | * |
| 4 | * \brief Generic ASN.1 parsing |
Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 5 | */ |
| 6 | /* |
Bence Szépkúti | 1e14827 | 2020-08-07 13:07:28 +0200 | [diff] [blame] | 7 | * Copyright The Mbed TLS Contributors |
Dave Rodgman | 16799db | 2023-11-02 19:47:20 +0000 | [diff] [blame] | 8 | * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 9 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 10 | #ifndef MBEDTLS_ASN1_H |
| 11 | #define MBEDTLS_ASN1_H |
Mateusz Starzyk | 846f021 | 2021-05-19 19:44:07 +0200 | [diff] [blame] | 12 | #include "mbedtls/private_access.h" |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 13 | |
Bence Szépkúti | c662b36 | 2021-05-27 11:25:03 +0200 | [diff] [blame] | 14 | #include "mbedtls/build_info.h" |
Glenn Strauss | 82ba274 | 2022-11-04 04:01:23 -0400 | [diff] [blame] | 15 | #include "mbedtls/platform_util.h" |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 16 | |
Rich Evans | 00ab470 | 2015-02-06 13:43:58 +0000 | [diff] [blame] | 17 | #include <stddef.h> |
| 18 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 19 | #if defined(MBEDTLS_BIGNUM_C) |
Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 20 | #include "mbedtls/bignum.h" |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 21 | #endif |
| 22 | |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 23 | /** |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 24 | * \addtogroup asn1_module |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 25 | * \{ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 26 | */ |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 27 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 28 | /** |
| 29 | * \name ASN1 Error codes |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 30 | * These error codes are combined with other error codes for |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 31 | * higher error granularity. |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 32 | * e.g. X.509 and PKCS #7 error codes |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 33 | * ASN1 is a standard to specify data structures. |
| 34 | * \{ |
| 35 | */ |
Gilles Peskine | d297157 | 2021-07-26 18:48:10 +0200 | [diff] [blame] | 36 | /** Out of data when parsing an ASN1 data structure. */ |
| 37 | #define MBEDTLS_ERR_ASN1_OUT_OF_DATA -0x0060 |
| 38 | /** ASN1 tag was of an unexpected value. */ |
| 39 | #define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG -0x0062 |
| 40 | /** Error when trying to determine the length or invalid length. */ |
| 41 | #define MBEDTLS_ERR_ASN1_INVALID_LENGTH -0x0064 |
| 42 | /** Actual length differs from expected length. */ |
| 43 | #define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH -0x0066 |
| 44 | /** Data is invalid. */ |
| 45 | #define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068 |
| 46 | /** Memory allocation failed */ |
| 47 | #define MBEDTLS_ERR_ASN1_ALLOC_FAILED -0x006A |
| 48 | /** Buffer too small when writing ASN.1 data structure. */ |
| 49 | #define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL -0x006C |
Paul Bakker | 0588815 | 2012-02-16 10:26:57 +0000 | [diff] [blame] | 50 | |
Andrzej Kurek | 38d4fdd | 2021-12-28 16:22:52 +0100 | [diff] [blame] | 51 | /** \} name ASN1 Error codes */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 52 | |
| 53 | /** |
| 54 | * \name DER constants |
Andres Amaya Garcia | 9fb0205 | 2017-08-25 17:24:44 +0100 | [diff] [blame] | 55 | * These constants comply with the DER encoded ASN.1 type tags. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 56 | * DER encoding uses hexadecimal representation. |
| 57 | * An example DER sequence is:\n |
| 58 | * - 0x02 -- tag indicating INTEGER |
| 59 | * - 0x01 -- length in octets |
| 60 | * - 0x05 -- value |
Gilles Peskine | 96ddb0a | 2020-02-26 19:50:01 +0100 | [diff] [blame] | 61 | * Such sequences are typically read into \c ::mbedtls_x509_buf. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 62 | * \{ |
| 63 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 64 | #define MBEDTLS_ASN1_BOOLEAN 0x01 |
| 65 | #define MBEDTLS_ASN1_INTEGER 0x02 |
| 66 | #define MBEDTLS_ASN1_BIT_STRING 0x03 |
| 67 | #define MBEDTLS_ASN1_OCTET_STRING 0x04 |
| 68 | #define MBEDTLS_ASN1_NULL 0x05 |
| 69 | #define MBEDTLS_ASN1_OID 0x06 |
Mykhailo Sopiha | 20180ca | 2019-10-29 15:58:10 +0200 | [diff] [blame] | 70 | #define MBEDTLS_ASN1_ENUMERATED 0x0A |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 71 | #define MBEDTLS_ASN1_UTF8_STRING 0x0C |
| 72 | #define MBEDTLS_ASN1_SEQUENCE 0x10 |
| 73 | #define MBEDTLS_ASN1_SET 0x11 |
| 74 | #define MBEDTLS_ASN1_PRINTABLE_STRING 0x13 |
| 75 | #define MBEDTLS_ASN1_T61_STRING 0x14 |
| 76 | #define MBEDTLS_ASN1_IA5_STRING 0x16 |
| 77 | #define MBEDTLS_ASN1_UTC_TIME 0x17 |
| 78 | #define MBEDTLS_ASN1_GENERALIZED_TIME 0x18 |
| 79 | #define MBEDTLS_ASN1_UNIVERSAL_STRING 0x1C |
| 80 | #define MBEDTLS_ASN1_BMP_STRING 0x1E |
| 81 | #define MBEDTLS_ASN1_PRIMITIVE 0x00 |
| 82 | #define MBEDTLS_ASN1_CONSTRUCTED 0x20 |
| 83 | #define MBEDTLS_ASN1_CONTEXT_SPECIFIC 0x80 |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 84 | |
Hanno Becker | cba7122 | 2019-09-11 14:15:10 +0100 | [diff] [blame] | 85 | /* Slightly smaller way to check if tag is a string tag |
| 86 | * compared to canonical implementation. */ |
Agathiyan Bragadeesh | 52af0d0 | 2023-08-30 16:22:54 +0100 | [diff] [blame] | 87 | #define MBEDTLS_ASN1_IS_STRING_TAG(tag) \ |
| 88 | ((unsigned int) (tag) < 32u && ( \ |
| 89 | ((1u << (tag)) & ((1u << MBEDTLS_ASN1_BMP_STRING) | \ |
| 90 | (1u << MBEDTLS_ASN1_UTF8_STRING) | \ |
| 91 | (1u << MBEDTLS_ASN1_T61_STRING) | \ |
| 92 | (1u << MBEDTLS_ASN1_IA5_STRING) | \ |
| 93 | (1u << MBEDTLS_ASN1_UNIVERSAL_STRING) | \ |
| 94 | (1u << MBEDTLS_ASN1_PRINTABLE_STRING))) != 0)) |
Hanno Becker | cba7122 | 2019-09-11 14:15:10 +0100 | [diff] [blame] | 95 | |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 96 | /* |
| 97 | * Bit masks for each of the components of an ASN.1 tag as specified in |
Gilles Peskine | 1ed45ea | 2018-03-08 18:16:45 +0100 | [diff] [blame] | 98 | * ITU X.690 (08/2015), section 8.1 "General rules for encoding", |
| 99 | * paragraph 8.1.2.2: |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 100 | * |
| 101 | * Bit 8 7 6 5 1 |
| 102 | * +-------+-----+------------+ |
| 103 | * | Class | P/C | Tag number | |
| 104 | * +-------+-----+------------+ |
| 105 | */ |
Andres Amaya Garcia | 7786abc | 2017-11-07 20:21:56 +0000 | [diff] [blame] | 106 | #define MBEDTLS_ASN1_TAG_CLASS_MASK 0xC0 |
| 107 | #define MBEDTLS_ASN1_TAG_PC_MASK 0x20 |
| 108 | #define MBEDTLS_ASN1_TAG_VALUE_MASK 0x1F |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 109 | |
Andrzej Kurek | 38d4fdd | 2021-12-28 16:22:52 +0100 | [diff] [blame] | 110 | /** \} name DER constants */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 111 | |
| 112 | /** Returns the size of the binary string, without the trailing \\0 */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 113 | #define MBEDTLS_OID_SIZE(x) (sizeof(x) - 1) |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 114 | |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 115 | /** |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 116 | * Compares an mbedtls_asn1_buf structure to a reference OID. |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 117 | * |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 118 | * Only works for 'defined' oid_str values (MBEDTLS_OID_HMAC_SHA1), you cannot use a |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 119 | * 'unsigned char *oid' here! |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 120 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 121 | #define MBEDTLS_OID_CMP(oid_str, oid_buf) \ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 122 | ((MBEDTLS_OID_SIZE(oid_str) != (oid_buf)->len) || \ |
| 123 | memcmp((oid_str), (oid_buf)->p, (oid_buf)->len) != 0) |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 124 | |
Hanno Becker | 63e38fe | 2019-09-11 14:16:40 +0100 | [diff] [blame] | 125 | #define MBEDTLS_OID_CMP_RAW(oid_str, oid_buf, oid_buf_len) \ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 126 | ((MBEDTLS_OID_SIZE(oid_str) != (oid_buf_len)) || \ |
| 127 | memcmp((oid_str), (oid_buf), (oid_buf_len)) != 0) |
Hanno Becker | 63e38fe | 2019-09-11 14:16:40 +0100 | [diff] [blame] | 128 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 129 | #ifdef __cplusplus |
| 130 | extern "C" { |
| 131 | #endif |
| 132 | |
| 133 | /** |
| 134 | * \name Functions to parse ASN.1 data structures |
| 135 | * \{ |
| 136 | */ |
| 137 | |
| 138 | /** |
| 139 | * Type-length-value structure that allows for ASN1 using DER. |
| 140 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 141 | typedef struct mbedtls_asn1_buf { |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 142 | int tag; /**< ASN1 type, e.g. MBEDTLS_ASN1_UTF8_STRING. */ |
| 143 | size_t len; /**< ASN1 length, in octets. */ |
| 144 | unsigned char *p; /**< ASN1 data, e.g. in ASCII. */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 145 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 146 | mbedtls_asn1_buf; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 147 | |
| 148 | /** |
| 149 | * Container for ASN1 bit strings. |
| 150 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 151 | typedef struct mbedtls_asn1_bitstring { |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 152 | size_t len; /**< ASN1 length, in octets. */ |
| 153 | unsigned char unused_bits; /**< Number of unused bits at the end of the string */ |
| 154 | unsigned char *p; /**< Raw ASN1 data for the bit string */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 155 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 156 | mbedtls_asn1_bitstring; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 157 | |
| 158 | /** |
| 159 | * Container for a sequence of ASN.1 items |
| 160 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 161 | typedef struct mbedtls_asn1_sequence { |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 162 | mbedtls_asn1_buf buf; /**< Buffer containing the given ASN.1 item. */ |
| 163 | |
| 164 | /** The next entry in the sequence. |
| 165 | * |
Gilles Peskine | 44ffc79 | 2021-08-31 22:59:35 +0200 | [diff] [blame] | 166 | * The details of memory management for sequences are not documented and |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 167 | * may change in future versions. Set this field to \p NULL when |
Gilles Peskine | 44ffc79 | 2021-08-31 22:59:35 +0200 | [diff] [blame] | 168 | * initializing a structure, and do not modify it except via Mbed TLS |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 169 | * library functions. |
| 170 | */ |
| 171 | struct mbedtls_asn1_sequence *next; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 172 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 173 | mbedtls_asn1_sequence; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 174 | |
| 175 | /** |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 176 | * Container for a sequence or list of 'named' ASN.1 data items |
| 177 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 178 | typedef struct mbedtls_asn1_named_data { |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 179 | mbedtls_asn1_buf oid; /**< The object identifier. */ |
| 180 | mbedtls_asn1_buf val; /**< The named value. */ |
| 181 | |
| 182 | /** The next entry in the sequence. |
| 183 | * |
Gilles Peskine | 44ffc79 | 2021-08-31 22:59:35 +0200 | [diff] [blame] | 184 | * The details of memory management for named data sequences are not |
| 185 | * documented and may change in future versions. Set this field to \p NULL |
| 186 | * when initializing a structure, and do not modify it except via Mbed TLS |
Gilles Peskine | b89d9c0 | 2021-08-04 20:55:33 +0200 | [diff] [blame] | 187 | * library functions. |
| 188 | */ |
| 189 | struct mbedtls_asn1_named_data *next; |
| 190 | |
| 191 | /** Merge next item into the current one? |
| 192 | * |
| 193 | * This field exists for the sake of Mbed TLS's X.509 certificate parsing |
| 194 | * code and may change in future versions of the library. |
| 195 | */ |
| 196 | unsigned char MBEDTLS_PRIVATE(next_merged); |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 197 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 198 | mbedtls_asn1_named_data; |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 199 | |
Valerio Setti | 688f795 | 2024-01-16 09:18:40 +0100 | [diff] [blame] | 200 | #if defined(MBEDTLS_ASN1_PARSE_C) || defined(MBEDTLS_X509_CREATE_C) || \ |
Valerio Setti | b1f6d2a | 2024-02-08 17:41:45 +0100 | [diff] [blame] | 201 | defined(MBEDTLS_PSA_UTIL_HAVE_ECDSA) || defined(MBEDTLS_PEM_PARSE_C) |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 202 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 203 | * \brief Get the length of an ASN.1 element. |
| 204 | * Updates the pointer to immediately behind the length. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 205 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 206 | * \param p On entry, \c *p points to the first byte of the length, |
| 207 | * i.e. immediately after the tag. |
| 208 | * On successful completion, \c *p points to the first byte |
| 209 | * after the length, i.e. the first byte of the content. |
| 210 | * On error, the value of \c *p is undefined. |
| 211 | * \param end End of data. |
Gilles Peskine | dc2db48 | 2019-09-20 21:06:01 +0200 | [diff] [blame] | 212 | * \param len On successful completion, \c *len contains the length |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 213 | * read from the ASN.1 input. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 214 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 215 | * \return 0 if successful. |
| 216 | * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element |
| 217 | * would end beyond \p end. |
Andrzej Kurek | 5c65c57 | 2022-04-13 14:28:52 -0400 | [diff] [blame] | 218 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 219 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 220 | int mbedtls_asn1_get_len(unsigned char **p, |
| 221 | const unsigned char *end, |
| 222 | size_t *len); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 223 | |
| 224 | /** |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 225 | * \brief Get the tag and length of the element. |
| 226 | * Check for the requested tag. |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 227 | * Updates the pointer to immediately behind the tag and length. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 228 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 229 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 230 | * On successful completion, \c *p points to the first byte |
| 231 | * after the length, i.e. the first byte of the content. |
| 232 | * On error, the value of \c *p is undefined. |
| 233 | * \param end End of data. |
Gilles Peskine | dc2db48 | 2019-09-20 21:06:01 +0200 | [diff] [blame] | 234 | * \param len On successful completion, \c *len contains the length |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 235 | * read from the ASN.1 input. |
| 236 | * \param tag The expected tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 237 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 238 | * \return 0 if successful. |
| 239 | * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the data does not start |
| 240 | * with the requested tag. |
| 241 | * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element |
| 242 | * would end beyond \p end. |
Shaun Case | 8b0ecbc | 2021-12-20 21:14:10 -0800 | [diff] [blame] | 243 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 244 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 245 | int mbedtls_asn1_get_tag(unsigned char **p, |
| 246 | const unsigned char *end, |
| 247 | size_t *len, int tag); |
Valerio Setti | b1f6d2a | 2024-02-08 17:41:45 +0100 | [diff] [blame] | 248 | #endif /* MBEDTLS_ASN1_PARSE_C || MBEDTLS_X509_CREATE_C || |
| 249 | MBEDTLS_PSA_UTIL_HAVE_ECDSA || MBEDTLS_PEM_PARSE_C */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 250 | |
Agathiyan Bragadeesh | d34c426 | 2023-09-08 11:09:50 +0100 | [diff] [blame] | 251 | #if defined(MBEDTLS_ASN1_PARSE_C) |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 252 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 253 | * \brief Retrieve a boolean ASN.1 tag and its value. |
| 254 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 255 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 256 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 257 | * On successful completion, \c *p points to the first byte |
| 258 | * beyond the ASN.1 element. |
| 259 | * On error, the value of \c *p is undefined. |
| 260 | * \param end End of data. |
| 261 | * \param val On success, the parsed value (\c 0 or \c 1). |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 262 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 263 | * \return 0 if successful. |
| 264 | * \return An ASN.1 error code if the input does not start with |
| 265 | * a valid ASN.1 BOOLEAN. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 266 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 267 | int mbedtls_asn1_get_bool(unsigned char **p, |
| 268 | const unsigned char *end, |
| 269 | int *val); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 270 | |
| 271 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 272 | * \brief Retrieve an integer ASN.1 tag and its value. |
| 273 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 274 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 275 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 276 | * On successful completion, \c *p points to the first byte |
| 277 | * beyond the ASN.1 element. |
| 278 | * On error, the value of \c *p is undefined. |
| 279 | * \param end End of data. |
| 280 | * \param val On success, the parsed value. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 281 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 282 | * \return 0 if successful. |
| 283 | * \return An ASN.1 error code if the input does not start with |
| 284 | * a valid ASN.1 INTEGER. |
| 285 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does |
| 286 | * not fit in an \c int. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 287 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 288 | int mbedtls_asn1_get_int(unsigned char **p, |
| 289 | const unsigned char *end, |
| 290 | int *val); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 291 | |
| 292 | /** |
Mykhailo Sopiha | 20180ca | 2019-10-29 15:58:10 +0200 | [diff] [blame] | 293 | * \brief Retrieve an enumerated ASN.1 tag and its value. |
| 294 | * Updates the pointer to immediately behind the full tag. |
| 295 | * |
| 296 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 297 | * On successful completion, \c *p points to the first byte |
| 298 | * beyond the ASN.1 element. |
| 299 | * On error, the value of \c *p is undefined. |
| 300 | * \param end End of data. |
| 301 | * \param val On success, the parsed value. |
| 302 | * |
| 303 | * \return 0 if successful. |
| 304 | * \return An ASN.1 error code if the input does not start with |
| 305 | * a valid ASN.1 ENUMERATED. |
| 306 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does |
| 307 | * not fit in an \c int. |
| 308 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 309 | int mbedtls_asn1_get_enum(unsigned char **p, |
| 310 | const unsigned char *end, |
| 311 | int *val); |
Mykhailo Sopiha | 20180ca | 2019-10-29 15:58:10 +0200 | [diff] [blame] | 312 | |
| 313 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 314 | * \brief Retrieve a bitstring ASN.1 tag and its value. |
| 315 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 316 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 317 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 318 | * On successful completion, \c *p is equal to \p end. |
| 319 | * On error, the value of \c *p is undefined. |
| 320 | * \param end End of data. |
| 321 | * \param bs On success, ::mbedtls_asn1_bitstring information about |
| 322 | * the parsed value. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 323 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 324 | * \return 0 if successful. |
| 325 | * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains |
| 326 | * extra data after a valid BIT STRING. |
| 327 | * \return An ASN.1 error code if the input does not start with |
| 328 | * a valid ASN.1 BIT STRING. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 329 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 330 | int mbedtls_asn1_get_bitstring(unsigned char **p, const unsigned char *end, |
| 331 | mbedtls_asn1_bitstring *bs); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 332 | |
| 333 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 334 | * \brief Retrieve a bitstring ASN.1 tag without unused bits and its |
| 335 | * value. |
| 336 | * Updates the pointer to the beginning of the bit/octet string. |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 337 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 338 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 339 | * On successful completion, \c *p points to the first byte |
| 340 | * of the content of the BIT STRING. |
| 341 | * On error, the value of \c *p is undefined. |
| 342 | * \param end End of data. |
| 343 | * \param len On success, \c *len is the length of the content in bytes. |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 344 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 345 | * \return 0 if successful. |
| 346 | * \return #MBEDTLS_ERR_ASN1_INVALID_DATA if the input starts with |
| 347 | * a valid BIT STRING with a nonzero number of unused bits. |
| 348 | * \return An ASN.1 error code if the input does not start with |
| 349 | * a valid ASN.1 BIT STRING. |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 350 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 351 | int mbedtls_asn1_get_bitstring_null(unsigned char **p, |
| 352 | const unsigned char *end, |
| 353 | size_t *len); |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 354 | |
| 355 | /** |
Gilles Peskine | dc2db48 | 2019-09-20 21:06:01 +0200 | [diff] [blame] | 356 | * \brief Parses and splits an ASN.1 "SEQUENCE OF <tag>". |
| 357 | * Updates the pointer to immediately behind the full sequence tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 358 | * |
Hanno Becker | 12ae27d | 2019-09-11 14:20:09 +0100 | [diff] [blame] | 359 | * This function allocates memory for the sequence elements. You can free |
| 360 | * the allocated memory with mbedtls_asn1_sequence_free(). |
| 361 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 362 | * \note On error, this function may return a partial list in \p cur. |
| 363 | * You must set `cur->next = NULL` before calling this function! |
| 364 | * Otherwise it is impossible to distinguish a previously non-null |
| 365 | * pointer from a pointer to an object allocated by this function. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 366 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 367 | * \note If the sequence is empty, this function does not modify |
| 368 | * \c *cur. If the sequence is valid and non-empty, this |
| 369 | * function sets `cur->buf.tag` to \p tag. This allows |
| 370 | * callers to distinguish between an empty sequence and |
| 371 | * a one-element sequence. |
| 372 | * |
| 373 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 374 | * On successful completion, \c *p is equal to \p end. |
| 375 | * On error, the value of \c *p is undefined. |
| 376 | * \param end End of data. |
| 377 | * \param cur A ::mbedtls_asn1_sequence which this function fills. |
| 378 | * When this function returns, \c *cur is the head of a linked |
| 379 | * list. Each node in this list is allocated with |
| 380 | * mbedtls_calloc() apart from \p cur itself, and should |
| 381 | * therefore be freed with mbedtls_free(). |
| 382 | * The list describes the content of the sequence. |
| 383 | * The head of the list (i.e. \c *cur itself) describes the |
| 384 | * first element, `*cur->next` describes the second element, etc. |
| 385 | * For each element, `buf.tag == tag`, `buf.len` is the length |
| 386 | * of the content of the content of the element, and `buf.p` |
| 387 | * points to the first byte of the content (i.e. immediately |
| 388 | * past the length of the element). |
| 389 | * Note that list elements may be allocated even on error. |
| 390 | * \param tag Each element of the sequence must have this tag. |
| 391 | * |
| 392 | * \return 0 if successful. |
| 393 | * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains |
| 394 | * extra data after a valid SEQUENCE OF \p tag. |
Gilles Peskine | b5c74a5 | 2019-10-30 17:07:02 +0100 | [diff] [blame] | 395 | * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the input starts with |
| 396 | * an ASN.1 SEQUENCE in which an element has a tag that |
| 397 | * is different from \p tag. |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 398 | * \return #MBEDTLS_ERR_ASN1_ALLOC_FAILED if a memory allocation failed. |
| 399 | * \return An ASN.1 error code if the input does not start with |
Gilles Peskine | b5c74a5 | 2019-10-30 17:07:02 +0100 | [diff] [blame] | 400 | * a valid ASN.1 SEQUENCE. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 401 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 402 | int mbedtls_asn1_get_sequence_of(unsigned char **p, |
| 403 | const unsigned char *end, |
| 404 | mbedtls_asn1_sequence *cur, |
| 405 | int tag); |
Hanno Becker | 12ae27d | 2019-09-11 14:20:09 +0100 | [diff] [blame] | 406 | /** |
| 407 | * \brief Free a heap-allocated linked list presentation of |
| 408 | * an ASN.1 sequence, including the first element. |
| 409 | * |
| 410 | * There are two common ways to manage the memory used for the representation |
| 411 | * of a parsed ASN.1 sequence: |
| 412 | * - Allocate a head node `mbedtls_asn1_sequence *head` with mbedtls_calloc(). |
| 413 | * Pass this node as the `cur` argument to mbedtls_asn1_get_sequence_of(). |
| 414 | * When you have finished processing the sequence, |
| 415 | * call mbedtls_asn1_sequence_free() on `head`. |
| 416 | * - Allocate a head node `mbedtls_asn1_sequence *head` in any manner, |
| 417 | * for example on the stack. Make sure that `head->next == NULL`. |
| 418 | * Pass `head` as the `cur` argument to mbedtls_asn1_get_sequence_of(). |
| 419 | * When you have finished processing the sequence, |
| 420 | * call mbedtls_asn1_sequence_free() on `head->cur`, |
| 421 | * then free `head` itself in the appropriate manner. |
| 422 | * |
| 423 | * \param seq The address of the first sequence component. This may |
| 424 | * be \c NULL, in which case this functions returns |
| 425 | * immediately. |
| 426 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 427 | void mbedtls_asn1_sequence_free(mbedtls_asn1_sequence *seq); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 428 | |
Hanno Becker | 199b709 | 2019-09-11 14:21:26 +0100 | [diff] [blame] | 429 | /** |
| 430 | * \brief Traverse an ASN.1 SEQUENCE container and |
| 431 | * call a callback for each entry. |
| 432 | * |
| 433 | * This function checks that the input is a SEQUENCE of elements that |
| 434 | * each have a "must" tag, and calls a callback function on the elements |
| 435 | * that have a "may" tag. |
| 436 | * |
| 437 | * For example, to validate that the input is a SEQUENCE of `tag1` and call |
| 438 | * `cb` on each element, use |
| 439 | * ``` |
| 440 | * mbedtls_asn1_traverse_sequence_of(&p, end, 0xff, tag1, 0, 0, cb, ctx); |
| 441 | * ``` |
| 442 | * |
| 443 | * To validate that the input is a SEQUENCE of ANY and call `cb` on |
| 444 | * each element, use |
| 445 | * ``` |
| 446 | * mbedtls_asn1_traverse_sequence_of(&p, end, 0, 0, 0, 0, cb, ctx); |
| 447 | * ``` |
| 448 | * |
| 449 | * To validate that the input is a SEQUENCE of CHOICE {NULL, OCTET STRING} |
| 450 | * and call `cb` on each element that is an OCTET STRING, use |
| 451 | * ``` |
| 452 | * mbedtls_asn1_traverse_sequence_of(&p, end, 0xfe, 0x04, 0xff, 0x04, cb, ctx); |
| 453 | * ``` |
| 454 | * |
| 455 | * The callback is called on the elements with a "may" tag from left to |
| 456 | * right. If the input is not a valid SEQUENCE of elements with a "must" tag, |
| 457 | * the callback is called on the elements up to the leftmost point where |
| 458 | * the input is invalid. |
| 459 | * |
| 460 | * \warning This function is still experimental and may change |
| 461 | * at any time. |
| 462 | * |
| 463 | * \param p The address of the pointer to the beginning of |
| 464 | * the ASN.1 SEQUENCE header. This is updated to |
| 465 | * point to the end of the ASN.1 SEQUENCE container |
| 466 | * on a successful invocation. |
| 467 | * \param end The end of the ASN.1 SEQUENCE container. |
| 468 | * \param tag_must_mask A mask to be applied to the ASN.1 tags found within |
Andrzej Kurek | 69ed8c4 | 2022-02-17 10:06:44 -0500 | [diff] [blame] | 469 | * the SEQUENCE before comparing to \p tag_must_val. |
Hanno Becker | 199b709 | 2019-09-11 14:21:26 +0100 | [diff] [blame] | 470 | * \param tag_must_val The required value of each ASN.1 tag found in the |
| 471 | * SEQUENCE, after masking with \p tag_must_mask. |
| 472 | * Mismatching tags lead to an error. |
| 473 | * For example, a value of \c 0 for both \p tag_must_mask |
| 474 | * and \p tag_must_val means that every tag is allowed, |
| 475 | * while a value of \c 0xFF for \p tag_must_mask means |
| 476 | * that \p tag_must_val is the only allowed tag. |
| 477 | * \param tag_may_mask A mask to be applied to the ASN.1 tags found within |
Andrzej Kurek | 69ed8c4 | 2022-02-17 10:06:44 -0500 | [diff] [blame] | 478 | * the SEQUENCE before comparing to \p tag_may_val. |
Hanno Becker | 199b709 | 2019-09-11 14:21:26 +0100 | [diff] [blame] | 479 | * \param tag_may_val The desired value of each ASN.1 tag found in the |
| 480 | * SEQUENCE, after masking with \p tag_may_mask. |
| 481 | * Mismatching tags will be silently ignored. |
| 482 | * For example, a value of \c 0 for \p tag_may_mask and |
| 483 | * \p tag_may_val means that any tag will be considered, |
| 484 | * while a value of \c 0xFF for \p tag_may_mask means |
| 485 | * that all tags with value different from \p tag_may_val |
| 486 | * will be ignored. |
| 487 | * \param cb The callback to trigger for each component |
| 488 | * in the ASN.1 SEQUENCE that matches \p tag_may_val. |
| 489 | * The callback function is called with the following |
| 490 | * parameters: |
| 491 | * - \p ctx. |
| 492 | * - The tag of the current element. |
| 493 | * - A pointer to the start of the current element's |
| 494 | * content inside the input. |
| 495 | * - The length of the content of the current element. |
| 496 | * If the callback returns a non-zero value, |
| 497 | * the function stops immediately, |
| 498 | * forwarding the callback's return value. |
| 499 | * \param ctx The context to be passed to the callback \p cb. |
| 500 | * |
| 501 | * \return \c 0 if successful the entire ASN.1 SEQUENCE |
| 502 | * was traversed without parsing or callback errors. |
| 503 | * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input |
| 504 | * contains extra data after a valid SEQUENCE |
| 505 | * of elements with an accepted tag. |
| 506 | * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the input starts |
| 507 | * with an ASN.1 SEQUENCE in which an element has a tag |
| 508 | * that is not accepted. |
| 509 | * \return An ASN.1 error code if the input does not start with |
| 510 | * a valid ASN.1 SEQUENCE. |
| 511 | * \return A non-zero error code forwarded from the callback |
| 512 | * \p cb in case the latter returns a non-zero value. |
| 513 | */ |
| 514 | int mbedtls_asn1_traverse_sequence_of( |
| 515 | unsigned char **p, |
| 516 | const unsigned char *end, |
Hanno Becker | 34aada2 | 2020-02-03 10:39:55 +0000 | [diff] [blame] | 517 | unsigned char tag_must_mask, unsigned char tag_must_val, |
| 518 | unsigned char tag_may_mask, unsigned char tag_may_val, |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 519 | int (*cb)(void *ctx, int tag, |
| 520 | unsigned char *start, size_t len), |
| 521 | void *ctx); |
Hanno Becker | 199b709 | 2019-09-11 14:21:26 +0100 | [diff] [blame] | 522 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 523 | #if defined(MBEDTLS_BIGNUM_C) |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 524 | /** |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 525 | * \brief Retrieve an integer ASN.1 tag and its value. |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 526 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 527 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 528 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 529 | * On successful completion, \c *p points to the first byte |
| 530 | * beyond the ASN.1 element. |
| 531 | * On error, the value of \c *p is undefined. |
| 532 | * \param end End of data. |
| 533 | * \param X On success, the parsed value. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 534 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 535 | * \return 0 if successful. |
| 536 | * \return An ASN.1 error code if the input does not start with |
| 537 | * a valid ASN.1 INTEGER. |
| 538 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does |
| 539 | * not fit in an \c int. |
| 540 | * \return An MPI error code if the parsed value is too large. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 541 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 542 | int mbedtls_asn1_get_mpi(unsigned char **p, |
| 543 | const unsigned char *end, |
| 544 | mbedtls_mpi *X); |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 545 | #endif /* MBEDTLS_BIGNUM_C */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 546 | |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 547 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 548 | * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence. |
| 549 | * Updates the pointer to immediately behind the full |
| 550 | * AlgorithmIdentifier. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 551 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 552 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 553 | * On successful completion, \c *p points to the first byte |
| 554 | * beyond the AlgorithmIdentifier element. |
| 555 | * On error, the value of \c *p is undefined. |
| 556 | * \param end End of data. |
| 557 | * \param alg The buffer to receive the OID. |
| 558 | * \param params The buffer to receive the parameters. |
| 559 | * This is zeroized if there are no parameters. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 560 | * |
| 561 | * \return 0 if successful or a specific ASN.1 or MPI error code. |
| 562 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 563 | int mbedtls_asn1_get_alg(unsigned char **p, |
| 564 | const unsigned char *end, |
| 565 | mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params); |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 566 | |
| 567 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 568 | * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence with NULL or no |
| 569 | * params. |
| 570 | * Updates the pointer to immediately behind the full |
| 571 | * AlgorithmIdentifier. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 572 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 573 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 574 | * On successful completion, \c *p points to the first byte |
| 575 | * beyond the AlgorithmIdentifier element. |
| 576 | * On error, the value of \c *p is undefined. |
| 577 | * \param end End of data. |
| 578 | * \param alg The buffer to receive the OID. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 579 | * |
| 580 | * \return 0 if successful or a specific ASN.1 or MPI error code. |
| 581 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 582 | int mbedtls_asn1_get_alg_null(unsigned char **p, |
| 583 | const unsigned char *end, |
| 584 | mbedtls_asn1_buf *alg); |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 585 | |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 586 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 587 | * \brief Find a specific named_data entry in a sequence or list based on |
| 588 | * the OID. |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 589 | * |
| 590 | * \param list The list to seek through |
| 591 | * \param oid The OID to look for |
| 592 | * \param len Size of the OID |
| 593 | * |
| 594 | * \return NULL if not found, or a pointer to the existing entry. |
| 595 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 596 | const mbedtls_asn1_named_data *mbedtls_asn1_find_named_data(const mbedtls_asn1_named_data *list, |
| 597 | const char *oid, size_t len); |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 598 | |
Glenn Strauss | 82ba274 | 2022-11-04 04:01:23 -0400 | [diff] [blame] | 599 | #if !defined(MBEDTLS_DEPRECATED_REMOVED) |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 600 | /** |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 601 | * \brief Free a mbedtls_asn1_named_data entry |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 602 | * |
Glenn Strauss | 82ba274 | 2022-11-04 04:01:23 -0400 | [diff] [blame] | 603 | * \deprecated This function is deprecated and will be removed in a |
| 604 | * future version of the library. |
| 605 | * Please use mbedtls_asn1_free_named_data_list() |
| 606 | * or mbedtls_asn1_free_named_data_list_shallow(). |
| 607 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 608 | * \param entry The named data entry to free. |
| 609 | * This function calls mbedtls_free() on |
| 610 | * `entry->oid.p` and `entry->val.p`. |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 611 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 612 | void MBEDTLS_DEPRECATED mbedtls_asn1_free_named_data(mbedtls_asn1_named_data *entry); |
Glenn Strauss | 82ba274 | 2022-11-04 04:01:23 -0400 | [diff] [blame] | 613 | #endif /* MBEDTLS_DEPRECATED_REMOVED */ |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 614 | |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 615 | /** |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 616 | * \brief Free all entries in a mbedtls_asn1_named_data list. |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 617 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 618 | * \param head Pointer to the head of the list of named data entries to free. |
Glenn Strauss | 82ba274 | 2022-11-04 04:01:23 -0400 | [diff] [blame] | 619 | * This function calls mbedtls_free() on |
| 620 | * `entry->oid.p` and `entry->val.p` and then on `entry` |
| 621 | * for each list entry, and sets \c *head to \c NULL. |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 622 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 623 | void mbedtls_asn1_free_named_data_list(mbedtls_asn1_named_data **head); |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 624 | |
Glenn Strauss | a4b4041 | 2022-06-26 19:32:09 -0400 | [diff] [blame] | 625 | /** |
| 626 | * \brief Free all shallow entries in a mbedtls_asn1_named_data list, |
| 627 | * but do not free internal pointer targets. |
| 628 | * |
| 629 | * \param name Head of the list of named data entries to free. |
| 630 | * This function calls mbedtls_free() on each list element. |
| 631 | */ |
Gilles Peskine | 449bd83 | 2023-01-11 14:50:10 +0100 | [diff] [blame] | 632 | void mbedtls_asn1_free_named_data_list_shallow(mbedtls_asn1_named_data *name); |
Glenn Strauss | a4b4041 | 2022-06-26 19:32:09 -0400 | [diff] [blame] | 633 | |
Andrzej Kurek | 38d4fdd | 2021-12-28 16:22:52 +0100 | [diff] [blame] | 634 | /** \} name Functions to parse ASN.1 data structures */ |
Andrzej Kurek | a0defed | 2021-12-30 12:33:31 +0100 | [diff] [blame] | 635 | /** \} addtogroup asn1_module */ |
Andrzej Kurek | 38d4fdd | 2021-12-28 16:22:52 +0100 | [diff] [blame] | 636 | |
Jan Bruckner | 946720a | 2023-10-09 16:26:35 +0200 | [diff] [blame] | 637 | #endif /* MBEDTLS_ASN1_PARSE_C */ |
| 638 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 639 | #ifdef __cplusplus |
| 640 | } |
| 641 | #endif |
| 642 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 643 | #endif /* asn1.h */ |