blob: be2cae7b5aa99c54a42c8b2dd6db88437c596398 [file] [log] [blame]
Paul Bakkerefc30292011-11-10 14:43:23 +00001/**
2 * \file asn1.h
3 *
4 * \brief Generic ASN.1 parsing
Darryl Greena40a1012018-01-05 15:33:17 +00005 */
6/*
Bence Szépkúti1e148272020-08-07 13:07:28 +02007 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02008 * SPDX-License-Identifier: Apache-2.0
9 *
10 * Licensed under the Apache License, Version 2.0 (the "License"); you may
11 * not use this file except in compliance with the License.
12 * You may obtain a copy of the License at
13 *
14 * http://www.apache.org/licenses/LICENSE-2.0
15 *
16 * Unless required by applicable law or agreed to in writing, software
17 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
18 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
19 * See the License for the specific language governing permissions and
20 * limitations under the License.
Paul Bakkerefc30292011-11-10 14:43:23 +000021 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#ifndef MBEDTLS_ASN1_H
23#define MBEDTLS_ASN1_H
Mateusz Starzyk846f0212021-05-19 19:44:07 +020024#include "mbedtls/private_access.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000025
Bence Szépkútic662b362021-05-27 11:25:03 +020026#include "mbedtls/build_info.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000027
Rich Evans00ab4702015-02-06 13:43:58 +000028#include <stddef.h>
29
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020030#if defined(MBEDTLS_BIGNUM_C)
Jaeden Ameroc49fbbf2019-07-04 20:01:14 +010031#include "mbedtls/bignum.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000032#endif
33
Paul Bakker9af723c2014-05-01 13:03:14 +020034/**
Paul Bakkerefc30292011-11-10 14:43:23 +000035 * \addtogroup asn1_module
Paul Bakker9af723c2014-05-01 13:03:14 +020036 * \{
Paul Bakkerefc30292011-11-10 14:43:23 +000037 */
Paul Bakker9af723c2014-05-01 13:03:14 +020038
Paul Bakkerefc30292011-11-10 14:43:23 +000039/**
40 * \name ASN1 Error codes
41 * These error codes are OR'ed to X509 error codes for
Paul Bakker9af723c2014-05-01 13:03:14 +020042 * higher error granularity.
Paul Bakkerefc30292011-11-10 14:43:23 +000043 * ASN1 is a standard to specify data structures.
44 * \{
45 */
Gilles Peskined2971572021-07-26 18:48:10 +020046/** Out of data when parsing an ASN1 data structure. */
47#define MBEDTLS_ERR_ASN1_OUT_OF_DATA -0x0060
48/** ASN1 tag was of an unexpected value. */
49#define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG -0x0062
50/** Error when trying to determine the length or invalid length. */
51#define MBEDTLS_ERR_ASN1_INVALID_LENGTH -0x0064
52/** Actual length differs from expected length. */
53#define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH -0x0066
54/** Data is invalid. */
55#define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068
56/** Memory allocation failed */
57#define MBEDTLS_ERR_ASN1_ALLOC_FAILED -0x006A
58/** Buffer too small when writing ASN.1 data structure. */
59#define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL -0x006C
Paul Bakker05888152012-02-16 10:26:57 +000060
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +010061/** \} name ASN1 Error codes */
Paul Bakkerefc30292011-11-10 14:43:23 +000062
63/**
64 * \name DER constants
Andres Amaya Garcia9fb02052017-08-25 17:24:44 +010065 * These constants comply with the DER encoded ASN.1 type tags.
Paul Bakkerefc30292011-11-10 14:43:23 +000066 * DER encoding uses hexadecimal representation.
67 * An example DER sequence is:\n
68 * - 0x02 -- tag indicating INTEGER
69 * - 0x01 -- length in octets
70 * - 0x05 -- value
Gilles Peskine96ddb0a2020-02-26 19:50:01 +010071 * Such sequences are typically read into \c ::mbedtls_x509_buf.
Paul Bakkerefc30292011-11-10 14:43:23 +000072 * \{
73 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020074#define MBEDTLS_ASN1_BOOLEAN 0x01
75#define MBEDTLS_ASN1_INTEGER 0x02
76#define MBEDTLS_ASN1_BIT_STRING 0x03
77#define MBEDTLS_ASN1_OCTET_STRING 0x04
78#define MBEDTLS_ASN1_NULL 0x05
79#define MBEDTLS_ASN1_OID 0x06
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +020080#define MBEDTLS_ASN1_ENUMERATED 0x0A
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020081#define MBEDTLS_ASN1_UTF8_STRING 0x0C
82#define MBEDTLS_ASN1_SEQUENCE 0x10
83#define MBEDTLS_ASN1_SET 0x11
84#define MBEDTLS_ASN1_PRINTABLE_STRING 0x13
85#define MBEDTLS_ASN1_T61_STRING 0x14
86#define MBEDTLS_ASN1_IA5_STRING 0x16
87#define MBEDTLS_ASN1_UTC_TIME 0x17
88#define MBEDTLS_ASN1_GENERALIZED_TIME 0x18
89#define MBEDTLS_ASN1_UNIVERSAL_STRING 0x1C
90#define MBEDTLS_ASN1_BMP_STRING 0x1E
91#define MBEDTLS_ASN1_PRIMITIVE 0x00
92#define MBEDTLS_ASN1_CONSTRUCTED 0x20
93#define MBEDTLS_ASN1_CONTEXT_SPECIFIC 0x80
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +010094
Hanno Beckercba71222019-09-11 14:15:10 +010095/* Slightly smaller way to check if tag is a string tag
96 * compared to canonical implementation. */
97#define MBEDTLS_ASN1_IS_STRING_TAG( tag ) \
98 ( ( tag ) < 32u && ( \
99 ( ( 1u << ( tag ) ) & ( ( 1u << MBEDTLS_ASN1_BMP_STRING ) | \
100 ( 1u << MBEDTLS_ASN1_UTF8_STRING ) | \
101 ( 1u << MBEDTLS_ASN1_T61_STRING ) | \
102 ( 1u << MBEDTLS_ASN1_IA5_STRING ) | \
103 ( 1u << MBEDTLS_ASN1_UNIVERSAL_STRING ) | \
104 ( 1u << MBEDTLS_ASN1_PRINTABLE_STRING ) | \
105 ( 1u << MBEDTLS_ASN1_BIT_STRING ) ) ) != 0 ) )
106
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +0100107/*
108 * Bit masks for each of the components of an ASN.1 tag as specified in
Gilles Peskine1ed45ea2018-03-08 18:16:45 +0100109 * ITU X.690 (08/2015), section 8.1 "General rules for encoding",
110 * paragraph 8.1.2.2:
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +0100111 *
112 * Bit 8 7 6 5 1
113 * +-------+-----+------------+
114 * | Class | P/C | Tag number |
115 * +-------+-----+------------+
116 */
Andres Amaya Garcia7786abc2017-11-07 20:21:56 +0000117#define MBEDTLS_ASN1_TAG_CLASS_MASK 0xC0
118#define MBEDTLS_ASN1_TAG_PC_MASK 0x20
119#define MBEDTLS_ASN1_TAG_VALUE_MASK 0x1F
Andres Amaya Garcia7512bf72017-08-25 17:12:11 +0100120
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +0100121/** \} name DER constants */
Paul Bakkerefc30292011-11-10 14:43:23 +0000122
123/** Returns the size of the binary string, without the trailing \\0 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200124#define MBEDTLS_OID_SIZE(x) (sizeof(x) - 1)
Paul Bakkerefc30292011-11-10 14:43:23 +0000125
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +0100126/**
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200127 * Compares an mbedtls_asn1_buf structure to a reference OID.
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +0100128 *
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200129 * Only works for 'defined' oid_str values (MBEDTLS_OID_HMAC_SHA1), you cannot use a
Manuel Pégourié-Gonnarde76b7502014-01-23 19:15:29 +0100130 * 'unsigned char *oid' here!
Paul Bakkere5eae762013-08-26 12:05:14 +0200131 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200132#define MBEDTLS_OID_CMP(oid_str, oid_buf) \
133 ( ( MBEDTLS_OID_SIZE(oid_str) != (oid_buf)->len ) || \
Manuel Pégourié-Gonnard6e064372015-03-19 16:54:56 +0000134 memcmp( (oid_str), (oid_buf)->p, (oid_buf)->len) != 0 )
Paul Bakkerc70b9822013-04-07 22:00:46 +0200135
Hanno Becker63e38fe2019-09-11 14:16:40 +0100136#define MBEDTLS_OID_CMP_RAW(oid_str, oid_buf, oid_buf_len) \
137 ( ( MBEDTLS_OID_SIZE(oid_str) != (oid_buf_len) ) || \
138 memcmp( (oid_str), (oid_buf), (oid_buf_len) ) != 0 )
139
Paul Bakkerefc30292011-11-10 14:43:23 +0000140#ifdef __cplusplus
141extern "C" {
142#endif
143
144/**
145 * \name Functions to parse ASN.1 data structures
146 * \{
147 */
148
149/**
150 * Type-length-value structure that allows for ASN1 using DER.
151 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200152typedef struct mbedtls_asn1_buf
Paul Bakkerefc30292011-11-10 14:43:23 +0000153{
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200154 int tag; /**< ASN1 type, e.g. MBEDTLS_ASN1_UTF8_STRING. */
155 size_t len; /**< ASN1 length, in octets. */
156 unsigned char *p; /**< ASN1 data, e.g. in ASCII. */
Paul Bakkerefc30292011-11-10 14:43:23 +0000157}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200158mbedtls_asn1_buf;
Paul Bakkerefc30292011-11-10 14:43:23 +0000159
160/**
161 * Container for ASN1 bit strings.
162 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200163typedef struct mbedtls_asn1_bitstring
Paul Bakkerefc30292011-11-10 14:43:23 +0000164{
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200165 size_t len; /**< ASN1 length, in octets. */
166 unsigned char unused_bits; /**< Number of unused bits at the end of the string */
167 unsigned char *p; /**< Raw ASN1 data for the bit string */
Paul Bakkerefc30292011-11-10 14:43:23 +0000168}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200169mbedtls_asn1_bitstring;
Paul Bakkerefc30292011-11-10 14:43:23 +0000170
171/**
172 * Container for a sequence of ASN.1 items
173 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200174typedef struct mbedtls_asn1_sequence
Paul Bakkerefc30292011-11-10 14:43:23 +0000175{
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200176 mbedtls_asn1_buf buf; /**< Buffer containing the given ASN.1 item. */
177
178 /** The next entry in the sequence.
179 *
Gilles Peskine44ffc792021-08-31 22:59:35 +0200180 * The details of memory management for sequences are not documented and
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200181 * may change in future versions. Set this field to \p NULL when
Gilles Peskine44ffc792021-08-31 22:59:35 +0200182 * initializing a structure, and do not modify it except via Mbed TLS
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200183 * library functions.
184 */
185 struct mbedtls_asn1_sequence *next;
Paul Bakkerefc30292011-11-10 14:43:23 +0000186}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200187mbedtls_asn1_sequence;
Paul Bakkerefc30292011-11-10 14:43:23 +0000188
189/**
Paul Bakkere5eae762013-08-26 12:05:14 +0200190 * Container for a sequence or list of 'named' ASN.1 data items
191 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200192typedef struct mbedtls_asn1_named_data
Paul Bakkere5eae762013-08-26 12:05:14 +0200193{
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200194 mbedtls_asn1_buf oid; /**< The object identifier. */
195 mbedtls_asn1_buf val; /**< The named value. */
196
197 /** The next entry in the sequence.
198 *
Gilles Peskine44ffc792021-08-31 22:59:35 +0200199 * The details of memory management for named data sequences are not
200 * documented and may change in future versions. Set this field to \p NULL
201 * when initializing a structure, and do not modify it except via Mbed TLS
Gilles Peskineb89d9c02021-08-04 20:55:33 +0200202 * library functions.
203 */
204 struct mbedtls_asn1_named_data *next;
205
206 /** Merge next item into the current one?
207 *
208 * This field exists for the sake of Mbed TLS's X.509 certificate parsing
209 * code and may change in future versions of the library.
210 */
211 unsigned char MBEDTLS_PRIVATE(next_merged);
Paul Bakkere5eae762013-08-26 12:05:14 +0200212}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200213mbedtls_asn1_named_data;
Paul Bakkere5eae762013-08-26 12:05:14 +0200214
215/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200216 * \brief Get the length of an ASN.1 element.
217 * Updates the pointer to immediately behind the length.
Paul Bakkerefc30292011-11-10 14:43:23 +0000218 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100219 * \param p On entry, \c *p points to the first byte of the length,
220 * i.e. immediately after the tag.
221 * On successful completion, \c *p points to the first byte
222 * after the length, i.e. the first byte of the content.
223 * On error, the value of \c *p is undefined.
224 * \param end End of data.
Gilles Peskinedc2db482019-09-20 21:06:01 +0200225 * \param len On successful completion, \c *len contains the length
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100226 * read from the ASN.1 input.
Paul Bakkerefc30292011-11-10 14:43:23 +0000227 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100228 * \return 0 if successful.
229 * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element
230 * would end beyond \p end.
Andrzej Kurek5c65c572022-04-13 14:28:52 -0400231 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable.
Paul Bakkerefc30292011-11-10 14:43:23 +0000232 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200233int mbedtls_asn1_get_len( unsigned char **p,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100234 const unsigned char *end,
235 size_t *len );
Paul Bakkerefc30292011-11-10 14:43:23 +0000236
237/**
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100238 * \brief Get the tag and length of the element.
239 * Check for the requested tag.
Paul Bakkercdda0972013-09-09 12:51:29 +0200240 * Updates the pointer to immediately behind the tag and length.
Paul Bakkerefc30292011-11-10 14:43:23 +0000241 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100242 * \param p On entry, \c *p points to the start of the ASN.1 element.
243 * On successful completion, \c *p points to the first byte
244 * after the length, i.e. the first byte of the content.
245 * On error, the value of \c *p is undefined.
246 * \param end End of data.
Gilles Peskinedc2db482019-09-20 21:06:01 +0200247 * \param len On successful completion, \c *len contains the length
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100248 * read from the ASN.1 input.
249 * \param tag The expected tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000250 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100251 * \return 0 if successful.
252 * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the data does not start
253 * with the requested tag.
254 * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element
255 * would end beyond \p end.
Shaun Case8b0ecbc2021-12-20 21:14:10 -0800256 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparsable.
Paul Bakkerefc30292011-11-10 14:43:23 +0000257 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200258int mbedtls_asn1_get_tag( unsigned char **p,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100259 const unsigned char *end,
260 size_t *len, int tag );
Paul Bakkerefc30292011-11-10 14:43:23 +0000261
262/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200263 * \brief Retrieve a boolean ASN.1 tag and its value.
264 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000265 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100266 * \param p On entry, \c *p points to the start of the ASN.1 element.
267 * On successful completion, \c *p points to the first byte
268 * beyond the ASN.1 element.
269 * On error, the value of \c *p is undefined.
270 * \param end End of data.
271 * \param val On success, the parsed value (\c 0 or \c 1).
Paul Bakkerefc30292011-11-10 14:43:23 +0000272 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100273 * \return 0 if successful.
274 * \return An ASN.1 error code if the input does not start with
275 * a valid ASN.1 BOOLEAN.
Paul Bakkerefc30292011-11-10 14:43:23 +0000276 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200277int mbedtls_asn1_get_bool( unsigned char **p,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100278 const unsigned char *end,
279 int *val );
Paul Bakkerefc30292011-11-10 14:43:23 +0000280
281/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200282 * \brief Retrieve an integer ASN.1 tag and its value.
283 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000284 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100285 * \param p On entry, \c *p points to the start of the ASN.1 element.
286 * On successful completion, \c *p points to the first byte
287 * beyond the ASN.1 element.
288 * On error, the value of \c *p is undefined.
289 * \param end End of data.
290 * \param val On success, the parsed value.
Paul Bakkerefc30292011-11-10 14:43:23 +0000291 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100292 * \return 0 if successful.
293 * \return An ASN.1 error code if the input does not start with
294 * a valid ASN.1 INTEGER.
295 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does
296 * not fit in an \c int.
Paul Bakkerefc30292011-11-10 14:43:23 +0000297 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200298int mbedtls_asn1_get_int( unsigned char **p,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100299 const unsigned char *end,
300 int *val );
Paul Bakkerefc30292011-11-10 14:43:23 +0000301
302/**
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200303 * \brief Retrieve an enumerated ASN.1 tag and its value.
304 * Updates the pointer to immediately behind the full tag.
305 *
306 * \param p On entry, \c *p points to the start of the ASN.1 element.
307 * On successful completion, \c *p points to the first byte
308 * beyond the ASN.1 element.
309 * On error, the value of \c *p is undefined.
310 * \param end End of data.
311 * \param val On success, the parsed value.
312 *
313 * \return 0 if successful.
314 * \return An ASN.1 error code if the input does not start with
315 * a valid ASN.1 ENUMERATED.
316 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does
317 * not fit in an \c int.
318 */
319int mbedtls_asn1_get_enum( unsigned char **p,
320 const unsigned char *end,
321 int *val );
322
323/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200324 * \brief Retrieve a bitstring ASN.1 tag and its value.
325 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000326 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100327 * \param p On entry, \c *p points to the start of the ASN.1 element.
328 * On successful completion, \c *p is equal to \p end.
329 * On error, the value of \c *p is undefined.
330 * \param end End of data.
331 * \param bs On success, ::mbedtls_asn1_bitstring information about
332 * the parsed value.
Paul Bakkerefc30292011-11-10 14:43:23 +0000333 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100334 * \return 0 if successful.
335 * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains
336 * extra data after a valid BIT STRING.
337 * \return An ASN.1 error code if the input does not start with
338 * a valid ASN.1 BIT STRING.
Paul Bakkerefc30292011-11-10 14:43:23 +0000339 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200340int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100341 mbedtls_asn1_bitstring *bs );
Paul Bakkerefc30292011-11-10 14:43:23 +0000342
343/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200344 * \brief Retrieve a bitstring ASN.1 tag without unused bits and its
345 * value.
346 * Updates the pointer to the beginning of the bit/octet string.
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200347 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100348 * \param p On entry, \c *p points to the start of the ASN.1 element.
349 * On successful completion, \c *p points to the first byte
350 * of the content of the BIT STRING.
351 * On error, the value of \c *p is undefined.
352 * \param end End of data.
353 * \param len On success, \c *len is the length of the content in bytes.
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200354 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100355 * \return 0 if successful.
356 * \return #MBEDTLS_ERR_ASN1_INVALID_DATA if the input starts with
357 * a valid BIT STRING with a nonzero number of unused bits.
358 * \return An ASN.1 error code if the input does not start with
359 * a valid ASN.1 BIT STRING.
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200360 */
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100361int mbedtls_asn1_get_bitstring_null( unsigned char **p,
362 const unsigned char *end,
363 size_t *len );
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200364
365/**
Gilles Peskinedc2db482019-09-20 21:06:01 +0200366 * \brief Parses and splits an ASN.1 "SEQUENCE OF <tag>".
367 * Updates the pointer to immediately behind the full sequence tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000368 *
Hanno Becker12ae27d2019-09-11 14:20:09 +0100369 * This function allocates memory for the sequence elements. You can free
370 * the allocated memory with mbedtls_asn1_sequence_free().
371 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100372 * \note On error, this function may return a partial list in \p cur.
373 * You must set `cur->next = NULL` before calling this function!
374 * Otherwise it is impossible to distinguish a previously non-null
375 * pointer from a pointer to an object allocated by this function.
Paul Bakkerefc30292011-11-10 14:43:23 +0000376 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100377 * \note If the sequence is empty, this function does not modify
378 * \c *cur. If the sequence is valid and non-empty, this
379 * function sets `cur->buf.tag` to \p tag. This allows
380 * callers to distinguish between an empty sequence and
381 * a one-element sequence.
382 *
383 * \param p On entry, \c *p points to the start of the ASN.1 element.
384 * On successful completion, \c *p is equal to \p end.
385 * On error, the value of \c *p is undefined.
386 * \param end End of data.
387 * \param cur A ::mbedtls_asn1_sequence which this function fills.
388 * When this function returns, \c *cur is the head of a linked
389 * list. Each node in this list is allocated with
390 * mbedtls_calloc() apart from \p cur itself, and should
391 * therefore be freed with mbedtls_free().
392 * The list describes the content of the sequence.
393 * The head of the list (i.e. \c *cur itself) describes the
394 * first element, `*cur->next` describes the second element, etc.
395 * For each element, `buf.tag == tag`, `buf.len` is the length
396 * of the content of the content of the element, and `buf.p`
397 * points to the first byte of the content (i.e. immediately
398 * past the length of the element).
399 * Note that list elements may be allocated even on error.
400 * \param tag Each element of the sequence must have this tag.
401 *
402 * \return 0 if successful.
403 * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains
404 * extra data after a valid SEQUENCE OF \p tag.
Gilles Peskineb5c74a52019-10-30 17:07:02 +0100405 * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the input starts with
406 * an ASN.1 SEQUENCE in which an element has a tag that
407 * is different from \p tag.
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100408 * \return #MBEDTLS_ERR_ASN1_ALLOC_FAILED if a memory allocation failed.
409 * \return An ASN.1 error code if the input does not start with
Gilles Peskineb5c74a52019-10-30 17:07:02 +0100410 * a valid ASN.1 SEQUENCE.
Paul Bakkerefc30292011-11-10 14:43:23 +0000411 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200412int mbedtls_asn1_get_sequence_of( unsigned char **p,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100413 const unsigned char *end,
414 mbedtls_asn1_sequence *cur,
415 int tag );
Hanno Becker12ae27d2019-09-11 14:20:09 +0100416/**
417 * \brief Free a heap-allocated linked list presentation of
418 * an ASN.1 sequence, including the first element.
419 *
420 * There are two common ways to manage the memory used for the representation
421 * of a parsed ASN.1 sequence:
422 * - Allocate a head node `mbedtls_asn1_sequence *head` with mbedtls_calloc().
423 * Pass this node as the `cur` argument to mbedtls_asn1_get_sequence_of().
424 * When you have finished processing the sequence,
425 * call mbedtls_asn1_sequence_free() on `head`.
426 * - Allocate a head node `mbedtls_asn1_sequence *head` in any manner,
427 * for example on the stack. Make sure that `head->next == NULL`.
428 * Pass `head` as the `cur` argument to mbedtls_asn1_get_sequence_of().
429 * When you have finished processing the sequence,
430 * call mbedtls_asn1_sequence_free() on `head->cur`,
431 * then free `head` itself in the appropriate manner.
432 *
433 * \param seq The address of the first sequence component. This may
434 * be \c NULL, in which case this functions returns
435 * immediately.
436 */
437void mbedtls_asn1_sequence_free( mbedtls_asn1_sequence *seq );
Paul Bakkerefc30292011-11-10 14:43:23 +0000438
Hanno Becker199b7092019-09-11 14:21:26 +0100439/**
440 * \brief Traverse an ASN.1 SEQUENCE container and
441 * call a callback for each entry.
442 *
443 * This function checks that the input is a SEQUENCE of elements that
444 * each have a "must" tag, and calls a callback function on the elements
445 * that have a "may" tag.
446 *
447 * For example, to validate that the input is a SEQUENCE of `tag1` and call
448 * `cb` on each element, use
449 * ```
450 * mbedtls_asn1_traverse_sequence_of(&p, end, 0xff, tag1, 0, 0, cb, ctx);
451 * ```
452 *
453 * To validate that the input is a SEQUENCE of ANY and call `cb` on
454 * each element, use
455 * ```
456 * mbedtls_asn1_traverse_sequence_of(&p, end, 0, 0, 0, 0, cb, ctx);
457 * ```
458 *
459 * To validate that the input is a SEQUENCE of CHOICE {NULL, OCTET STRING}
460 * and call `cb` on each element that is an OCTET STRING, use
461 * ```
462 * mbedtls_asn1_traverse_sequence_of(&p, end, 0xfe, 0x04, 0xff, 0x04, cb, ctx);
463 * ```
464 *
465 * The callback is called on the elements with a "may" tag from left to
466 * right. If the input is not a valid SEQUENCE of elements with a "must" tag,
467 * the callback is called on the elements up to the leftmost point where
468 * the input is invalid.
469 *
470 * \warning This function is still experimental and may change
471 * at any time.
472 *
473 * \param p The address of the pointer to the beginning of
474 * the ASN.1 SEQUENCE header. This is updated to
475 * point to the end of the ASN.1 SEQUENCE container
476 * on a successful invocation.
477 * \param end The end of the ASN.1 SEQUENCE container.
478 * \param tag_must_mask A mask to be applied to the ASN.1 tags found within
479 * the SEQUENCE before comparing to \p tag_must_value.
480 * \param tag_must_val The required value of each ASN.1 tag found in the
481 * SEQUENCE, after masking with \p tag_must_mask.
482 * Mismatching tags lead to an error.
483 * For example, a value of \c 0 for both \p tag_must_mask
484 * and \p tag_must_val means that every tag is allowed,
485 * while a value of \c 0xFF for \p tag_must_mask means
486 * that \p tag_must_val is the only allowed tag.
487 * \param tag_may_mask A mask to be applied to the ASN.1 tags found within
488 * the SEQUENCE before comparing to \p tag_may_value.
489 * \param tag_may_val The desired value of each ASN.1 tag found in the
490 * SEQUENCE, after masking with \p tag_may_mask.
491 * Mismatching tags will be silently ignored.
492 * For example, a value of \c 0 for \p tag_may_mask and
493 * \p tag_may_val means that any tag will be considered,
494 * while a value of \c 0xFF for \p tag_may_mask means
495 * that all tags with value different from \p tag_may_val
496 * will be ignored.
497 * \param cb The callback to trigger for each component
498 * in the ASN.1 SEQUENCE that matches \p tag_may_val.
499 * The callback function is called with the following
500 * parameters:
501 * - \p ctx.
502 * - The tag of the current element.
503 * - A pointer to the start of the current element's
504 * content inside the input.
505 * - The length of the content of the current element.
506 * If the callback returns a non-zero value,
507 * the function stops immediately,
508 * forwarding the callback's return value.
509 * \param ctx The context to be passed to the callback \p cb.
510 *
511 * \return \c 0 if successful the entire ASN.1 SEQUENCE
512 * was traversed without parsing or callback errors.
513 * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input
514 * contains extra data after a valid SEQUENCE
515 * of elements with an accepted tag.
516 * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the input starts
517 * with an ASN.1 SEQUENCE in which an element has a tag
518 * that is not accepted.
519 * \return An ASN.1 error code if the input does not start with
520 * a valid ASN.1 SEQUENCE.
521 * \return A non-zero error code forwarded from the callback
522 * \p cb in case the latter returns a non-zero value.
523 */
524int mbedtls_asn1_traverse_sequence_of(
525 unsigned char **p,
526 const unsigned char *end,
Hanno Becker34aada22020-02-03 10:39:55 +0000527 unsigned char tag_must_mask, unsigned char tag_must_val,
528 unsigned char tag_may_mask, unsigned char tag_may_val,
Hanno Becker199b7092019-09-11 14:21:26 +0100529 int (*cb)( void *ctx, int tag,
530 unsigned char* start, size_t len ),
531 void *ctx );
532
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200533#if defined(MBEDTLS_BIGNUM_C)
Paul Bakkerefc30292011-11-10 14:43:23 +0000534/**
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100535 * \brief Retrieve an integer ASN.1 tag and its value.
Paul Bakkercdda0972013-09-09 12:51:29 +0200536 * Updates the pointer to immediately behind the full tag.
Paul Bakkerefc30292011-11-10 14:43:23 +0000537 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100538 * \param p On entry, \c *p points to the start of the ASN.1 element.
539 * On successful completion, \c *p points to the first byte
540 * beyond the ASN.1 element.
541 * On error, the value of \c *p is undefined.
542 * \param end End of data.
543 * \param X On success, the parsed value.
Paul Bakkerefc30292011-11-10 14:43:23 +0000544 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100545 * \return 0 if successful.
546 * \return An ASN.1 error code if the input does not start with
547 * a valid ASN.1 INTEGER.
548 * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does
549 * not fit in an \c int.
550 * \return An MPI error code if the parsed value is too large.
Paul Bakkerefc30292011-11-10 14:43:23 +0000551 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200552int mbedtls_asn1_get_mpi( unsigned char **p,
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100553 const unsigned char *end,
554 mbedtls_mpi *X );
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200555#endif /* MBEDTLS_BIGNUM_C */
Paul Bakkerefc30292011-11-10 14:43:23 +0000556
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200557/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200558 * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence.
559 * Updates the pointer to immediately behind the full
560 * AlgorithmIdentifier.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200561 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100562 * \param p On entry, \c *p points to the start of the ASN.1 element.
563 * On successful completion, \c *p points to the first byte
564 * beyond the AlgorithmIdentifier element.
565 * On error, the value of \c *p is undefined.
566 * \param end End of data.
567 * \param alg The buffer to receive the OID.
568 * \param params The buffer to receive the parameters.
569 * This is zeroized if there are no parameters.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200570 *
571 * \return 0 if successful or a specific ASN.1 or MPI error code.
572 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200573int mbedtls_asn1_get_alg( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200574 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200575 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200576
577/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200578 * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence with NULL or no
579 * params.
580 * Updates the pointer to immediately behind the full
581 * AlgorithmIdentifier.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200582 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100583 * \param p On entry, \c *p points to the start of the ASN.1 element.
584 * On successful completion, \c *p points to the first byte
585 * beyond the AlgorithmIdentifier element.
586 * On error, the value of \c *p is undefined.
587 * \param end End of data.
588 * \param alg The buffer to receive the OID.
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200589 *
590 * \return 0 if successful or a specific ASN.1 or MPI error code.
591 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200592int mbedtls_asn1_get_alg_null( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200593 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200594 mbedtls_asn1_buf *alg );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200595
Paul Bakkere5eae762013-08-26 12:05:14 +0200596/**
Paul Bakkercdda0972013-09-09 12:51:29 +0200597 * \brief Find a specific named_data entry in a sequence or list based on
598 * the OID.
Paul Bakkere5eae762013-08-26 12:05:14 +0200599 *
600 * \param list The list to seek through
601 * \param oid The OID to look for
602 * \param len Size of the OID
603 *
604 * \return NULL if not found, or a pointer to the existing entry.
605 */
Mateusz Starzyk59961cf2021-01-26 13:57:43 +0100606const mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( const mbedtls_asn1_named_data *list,
Paul Bakkere5eae762013-08-26 12:05:14 +0200607 const char *oid, size_t len );
608
609/**
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200610 * \brief Free a mbedtls_asn1_named_data entry
Paul Bakkere5eae762013-08-26 12:05:14 +0200611 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100612 * \param entry The named data entry to free.
613 * This function calls mbedtls_free() on
614 * `entry->oid.p` and `entry->val.p`.
Paul Bakkere5eae762013-08-26 12:05:14 +0200615 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200616void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *entry );
Paul Bakkere5eae762013-08-26 12:05:14 +0200617
Paul Bakkerc547cc92013-09-09 12:01:23 +0200618/**
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100619 * \brief Free all entries in a mbedtls_asn1_named_data list.
Paul Bakkerc547cc92013-09-09 12:01:23 +0200620 *
Gilles Peskinebcbe1df2019-03-01 17:57:43 +0100621 * \param head Pointer to the head of the list of named data entries to free.
622 * This function calls mbedtls_asn1_free_named_data() and
623 * mbedtls_free() on each list element and
624 * sets \c *head to \c NULL.
Paul Bakkerc547cc92013-09-09 12:01:23 +0200625 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200626void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head );
Paul Bakkerc547cc92013-09-09 12:01:23 +0200627
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +0100628/** \} name Functions to parse ASN.1 data structures */
Andrzej Kureka0defed2021-12-30 12:33:31 +0100629/** \} addtogroup asn1_module */
Andrzej Kurek38d4fdd2021-12-28 16:22:52 +0100630
Paul Bakkerefc30292011-11-10 14:43:23 +0000631#ifdef __cplusplus
632}
633#endif
634
635#endif /* asn1.h */