Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 1 | /** |
| 2 | * \file asn1.h |
| 3 | * |
| 4 | * \brief Generic ASN.1 parsing |
Darryl Green | a40a101 | 2018-01-05 15:33:17 +0000 | [diff] [blame] | 5 | */ |
| 6 | /* |
Manuel Pégourié-Gonnard | 6fb8187 | 2015-07-27 11:11:48 +0200 | [diff] [blame] | 7 | * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved |
Manuel Pégourié-Gonnard | 37ff140 | 2015-09-04 14:21:07 +0200 | [diff] [blame] | 8 | * SPDX-License-Identifier: Apache-2.0 |
| 9 | * |
| 10 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 11 | * not use this file except in compliance with the License. |
| 12 | * You may obtain a copy of the License at |
| 13 | * |
| 14 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 15 | * |
| 16 | * Unless required by applicable law or agreed to in writing, software |
| 17 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 18 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 19 | * See the License for the specific language governing permissions and |
| 20 | * limitations under the License. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 21 | * |
Manuel Pégourié-Gonnard | fe44643 | 2015-03-06 13:17:10 +0000 | [diff] [blame] | 22 | * This file is part of mbed TLS (https://tls.mbed.org) |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 23 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 24 | #ifndef MBEDTLS_ASN1_H |
| 25 | #define MBEDTLS_ASN1_H |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 26 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 27 | #if !defined(MBEDTLS_CONFIG_FILE) |
Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 28 | #include "mbedtls/config.h" |
Manuel Pégourié-Gonnard | cef4ad2 | 2014-04-29 12:39:06 +0200 | [diff] [blame] | 29 | #else |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 30 | #include MBEDTLS_CONFIG_FILE |
Manuel Pégourié-Gonnard | cef4ad2 | 2014-04-29 12:39:06 +0200 | [diff] [blame] | 31 | #endif |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 32 | |
Rich Evans | 00ab470 | 2015-02-06 13:43:58 +0000 | [diff] [blame] | 33 | #include <stddef.h> |
| 34 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 35 | #if defined(MBEDTLS_BIGNUM_C) |
Jaeden Amero | c49fbbf | 2019-07-04 20:01:14 +0100 | [diff] [blame] | 36 | #include "mbedtls/bignum.h" |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 37 | #endif |
| 38 | |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 39 | /** |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 40 | * \addtogroup asn1_module |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 41 | * \{ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 42 | */ |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 43 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 44 | /** |
| 45 | * \name ASN1 Error codes |
| 46 | * These error codes are OR'ed to X509 error codes for |
Paul Bakker | 9af723c | 2014-05-01 13:03:14 +0200 | [diff] [blame] | 47 | * higher error granularity. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 48 | * ASN1 is a standard to specify data structures. |
| 49 | * \{ |
| 50 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 51 | #define MBEDTLS_ERR_ASN1_OUT_OF_DATA -0x0060 /**< Out of data when parsing an ASN1 data structure. */ |
| 52 | #define MBEDTLS_ERR_ASN1_UNEXPECTED_TAG -0x0062 /**< ASN1 tag was of an unexpected value. */ |
| 53 | #define MBEDTLS_ERR_ASN1_INVALID_LENGTH -0x0064 /**< Error when trying to determine the length or invalid length. */ |
| 54 | #define MBEDTLS_ERR_ASN1_LENGTH_MISMATCH -0x0066 /**< Actual length differs from expected length. */ |
Gilles Peskine | aac3853 | 2019-09-11 16:52:01 +0200 | [diff] [blame] | 55 | #define MBEDTLS_ERR_ASN1_INVALID_DATA -0x0068 /**< Data is invalid. */ |
Manuel Pégourié-Gonnard | 6a8ca33 | 2015-05-28 09:33:39 +0200 | [diff] [blame] | 56 | #define MBEDTLS_ERR_ASN1_ALLOC_FAILED -0x006A /**< Memory allocation failed */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 57 | #define MBEDTLS_ERR_ASN1_BUF_TOO_SMALL -0x006C /**< Buffer too small when writing ASN.1 data structure. */ |
Paul Bakker | 0588815 | 2012-02-16 10:26:57 +0000 | [diff] [blame] | 58 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 59 | /* \} name */ |
| 60 | |
| 61 | /** |
| 62 | * \name DER constants |
Andres Amaya Garcia | 9fb0205 | 2017-08-25 17:24:44 +0100 | [diff] [blame] | 63 | * These constants comply with the DER encoded ASN.1 type tags. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 64 | * DER encoding uses hexadecimal representation. |
| 65 | * An example DER sequence is:\n |
| 66 | * - 0x02 -- tag indicating INTEGER |
| 67 | * - 0x01 -- length in octets |
| 68 | * - 0x05 -- value |
Jaeden Amero | d808771 | 2018-11-05 14:24:29 +0000 | [diff] [blame] | 69 | * Such sequences are typically read into Mbed TLS's \c mbedtls_x509_buf. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 70 | * \{ |
| 71 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 72 | #define MBEDTLS_ASN1_BOOLEAN 0x01 |
| 73 | #define MBEDTLS_ASN1_INTEGER 0x02 |
| 74 | #define MBEDTLS_ASN1_BIT_STRING 0x03 |
| 75 | #define MBEDTLS_ASN1_OCTET_STRING 0x04 |
| 76 | #define MBEDTLS_ASN1_NULL 0x05 |
| 77 | #define MBEDTLS_ASN1_OID 0x06 |
Mykhailo Sopiha | 20180ca | 2019-10-29 15:58:10 +0200 | [diff] [blame^] | 78 | #define MBEDTLS_ASN1_ENUMERATED 0x0A |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 79 | #define MBEDTLS_ASN1_UTF8_STRING 0x0C |
| 80 | #define MBEDTLS_ASN1_SEQUENCE 0x10 |
| 81 | #define MBEDTLS_ASN1_SET 0x11 |
| 82 | #define MBEDTLS_ASN1_PRINTABLE_STRING 0x13 |
| 83 | #define MBEDTLS_ASN1_T61_STRING 0x14 |
| 84 | #define MBEDTLS_ASN1_IA5_STRING 0x16 |
| 85 | #define MBEDTLS_ASN1_UTC_TIME 0x17 |
| 86 | #define MBEDTLS_ASN1_GENERALIZED_TIME 0x18 |
| 87 | #define MBEDTLS_ASN1_UNIVERSAL_STRING 0x1C |
| 88 | #define MBEDTLS_ASN1_BMP_STRING 0x1E |
| 89 | #define MBEDTLS_ASN1_PRIMITIVE 0x00 |
| 90 | #define MBEDTLS_ASN1_CONSTRUCTED 0x20 |
| 91 | #define MBEDTLS_ASN1_CONTEXT_SPECIFIC 0x80 |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 92 | |
| 93 | /* |
| 94 | * Bit masks for each of the components of an ASN.1 tag as specified in |
Gilles Peskine | 1ed45ea | 2018-03-08 18:16:45 +0100 | [diff] [blame] | 95 | * ITU X.690 (08/2015), section 8.1 "General rules for encoding", |
| 96 | * paragraph 8.1.2.2: |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 97 | * |
| 98 | * Bit 8 7 6 5 1 |
| 99 | * +-------+-----+------------+ |
| 100 | * | Class | P/C | Tag number | |
| 101 | * +-------+-----+------------+ |
| 102 | */ |
Andres Amaya Garcia | 7786abc | 2017-11-07 20:21:56 +0000 | [diff] [blame] | 103 | #define MBEDTLS_ASN1_TAG_CLASS_MASK 0xC0 |
| 104 | #define MBEDTLS_ASN1_TAG_PC_MASK 0x20 |
| 105 | #define MBEDTLS_ASN1_TAG_VALUE_MASK 0x1F |
Andres Amaya Garcia | 7512bf7 | 2017-08-25 17:12:11 +0100 | [diff] [blame] | 106 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 107 | /* \} name */ |
| 108 | /* \} addtogroup asn1_module */ |
| 109 | |
| 110 | /** Returns the size of the binary string, without the trailing \\0 */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 111 | #define MBEDTLS_OID_SIZE(x) (sizeof(x) - 1) |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 112 | |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 113 | /** |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 114 | * Compares an mbedtls_asn1_buf structure to a reference OID. |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 115 | * |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 116 | * Only works for 'defined' oid_str values (MBEDTLS_OID_HMAC_SHA1), you cannot use a |
Manuel Pégourié-Gonnard | e76b750 | 2014-01-23 19:15:29 +0100 | [diff] [blame] | 117 | * 'unsigned char *oid' here! |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 118 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 119 | #define MBEDTLS_OID_CMP(oid_str, oid_buf) \ |
| 120 | ( ( MBEDTLS_OID_SIZE(oid_str) != (oid_buf)->len ) || \ |
Manuel Pégourié-Gonnard | 6e06437 | 2015-03-19 16:54:56 +0000 | [diff] [blame] | 121 | memcmp( (oid_str), (oid_buf)->p, (oid_buf)->len) != 0 ) |
Paul Bakker | c70b982 | 2013-04-07 22:00:46 +0200 | [diff] [blame] | 122 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 123 | #ifdef __cplusplus |
| 124 | extern "C" { |
| 125 | #endif |
| 126 | |
| 127 | /** |
| 128 | * \name Functions to parse ASN.1 data structures |
| 129 | * \{ |
| 130 | */ |
| 131 | |
| 132 | /** |
| 133 | * Type-length-value structure that allows for ASN1 using DER. |
| 134 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 135 | typedef struct mbedtls_asn1_buf |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 136 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 137 | int tag; /**< ASN1 type, e.g. MBEDTLS_ASN1_UTF8_STRING. */ |
Manuel Pégourié-Gonnard | b8186a5 | 2015-06-18 14:58:58 +0200 | [diff] [blame] | 138 | size_t len; /**< ASN1 length, in octets. */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 139 | unsigned char *p; /**< ASN1 data, e.g. in ASCII. */ |
| 140 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 141 | mbedtls_asn1_buf; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 142 | |
| 143 | /** |
| 144 | * Container for ASN1 bit strings. |
| 145 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 146 | typedef struct mbedtls_asn1_bitstring |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 147 | { |
Manuel Pégourié-Gonnard | b8186a5 | 2015-06-18 14:58:58 +0200 | [diff] [blame] | 148 | size_t len; /**< ASN1 length, in octets. */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 149 | unsigned char unused_bits; /**< Number of unused bits at the end of the string */ |
| 150 | unsigned char *p; /**< Raw ASN1 data for the bit string */ |
| 151 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 152 | mbedtls_asn1_bitstring; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 153 | |
| 154 | /** |
| 155 | * Container for a sequence of ASN.1 items |
| 156 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 157 | typedef struct mbedtls_asn1_sequence |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 158 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 159 | mbedtls_asn1_buf buf; /**< Buffer containing the given ASN.1 item. */ |
| 160 | struct mbedtls_asn1_sequence *next; /**< The next entry in the sequence. */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 161 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 162 | mbedtls_asn1_sequence; |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 163 | |
| 164 | /** |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 165 | * Container for a sequence or list of 'named' ASN.1 data items |
| 166 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 167 | typedef struct mbedtls_asn1_named_data |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 168 | { |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 169 | mbedtls_asn1_buf oid; /**< The object identifier. */ |
| 170 | mbedtls_asn1_buf val; /**< The named value. */ |
| 171 | struct mbedtls_asn1_named_data *next; /**< The next entry in the sequence. */ |
Manuel Pégourié-Gonnard | 555fbf8 | 2015-02-04 17:11:55 +0000 | [diff] [blame] | 172 | unsigned char next_merged; /**< Merge next item into the current one? */ |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 173 | } |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 174 | mbedtls_asn1_named_data; |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 175 | |
| 176 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 177 | * \brief Get the length of an ASN.1 element. |
| 178 | * Updates the pointer to immediately behind the length. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 179 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 180 | * \param p On entry, \c *p points to the first byte of the length, |
| 181 | * i.e. immediately after the tag. |
| 182 | * On successful completion, \c *p points to the first byte |
| 183 | * after the length, i.e. the first byte of the content. |
| 184 | * On error, the value of \c *p is undefined. |
| 185 | * \param end End of data. |
Gilles Peskine | dc2db48 | 2019-09-20 21:06:01 +0200 | [diff] [blame] | 186 | * \param len On successful completion, \c *len contains the length |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 187 | * read from the ASN.1 input. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 188 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 189 | * \return 0 if successful. |
| 190 | * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element |
| 191 | * would end beyond \p end. |
| 192 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparseable. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 193 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 194 | int mbedtls_asn1_get_len( unsigned char **p, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 195 | const unsigned char *end, |
| 196 | size_t *len ); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 197 | |
| 198 | /** |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 199 | * \brief Get the tag and length of the element. |
| 200 | * Check for the requested tag. |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 201 | * Updates the pointer to immediately behind the tag and length. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 202 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 203 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 204 | * On successful completion, \c *p points to the first byte |
| 205 | * after the length, i.e. the first byte of the content. |
| 206 | * On error, the value of \c *p is undefined. |
| 207 | * \param end End of data. |
Gilles Peskine | dc2db48 | 2019-09-20 21:06:01 +0200 | [diff] [blame] | 208 | * \param len On successful completion, \c *len contains the length |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 209 | * read from the ASN.1 input. |
| 210 | * \param tag The expected tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 211 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 212 | * \return 0 if successful. |
| 213 | * \return #MBEDTLS_ERR_ASN1_UNEXPECTED_TAG if the data does not start |
| 214 | * with the requested tag. |
| 215 | * \return #MBEDTLS_ERR_ASN1_OUT_OF_DATA if the ASN.1 element |
| 216 | * would end beyond \p end. |
| 217 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the length is unparseable. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 218 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 219 | int mbedtls_asn1_get_tag( unsigned char **p, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 220 | const unsigned char *end, |
| 221 | size_t *len, int tag ); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 222 | |
| 223 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 224 | * \brief Retrieve a boolean ASN.1 tag and its value. |
| 225 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 226 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 227 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 228 | * On successful completion, \c *p points to the first byte |
| 229 | * beyond the ASN.1 element. |
| 230 | * On error, the value of \c *p is undefined. |
| 231 | * \param end End of data. |
| 232 | * \param val On success, the parsed value (\c 0 or \c 1). |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 233 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 234 | * \return 0 if successful. |
| 235 | * \return An ASN.1 error code if the input does not start with |
| 236 | * a valid ASN.1 BOOLEAN. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 237 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 238 | int mbedtls_asn1_get_bool( unsigned char **p, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 239 | const unsigned char *end, |
| 240 | int *val ); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 241 | |
| 242 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 243 | * \brief Retrieve an integer ASN.1 tag and its value. |
| 244 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 245 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 246 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 247 | * On successful completion, \c *p points to the first byte |
| 248 | * beyond the ASN.1 element. |
| 249 | * On error, the value of \c *p is undefined. |
| 250 | * \param end End of data. |
| 251 | * \param val On success, the parsed value. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 252 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 253 | * \return 0 if successful. |
| 254 | * \return An ASN.1 error code if the input does not start with |
| 255 | * a valid ASN.1 INTEGER. |
| 256 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does |
| 257 | * not fit in an \c int. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 258 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 259 | int mbedtls_asn1_get_int( unsigned char **p, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 260 | const unsigned char *end, |
| 261 | int *val ); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 262 | |
| 263 | /** |
Mykhailo Sopiha | 20180ca | 2019-10-29 15:58:10 +0200 | [diff] [blame^] | 264 | * \brief Retrieve an enumerated ASN.1 tag and its value. |
| 265 | * Updates the pointer to immediately behind the full tag. |
| 266 | * |
| 267 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 268 | * On successful completion, \c *p points to the first byte |
| 269 | * beyond the ASN.1 element. |
| 270 | * On error, the value of \c *p is undefined. |
| 271 | * \param end End of data. |
| 272 | * \param val On success, the parsed value. |
| 273 | * |
| 274 | * \return 0 if successful. |
| 275 | * \return An ASN.1 error code if the input does not start with |
| 276 | * a valid ASN.1 ENUMERATED. |
| 277 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does |
| 278 | * not fit in an \c int. |
| 279 | */ |
| 280 | int mbedtls_asn1_get_enum( unsigned char **p, |
| 281 | const unsigned char *end, |
| 282 | int *val ); |
| 283 | |
| 284 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 285 | * \brief Retrieve a bitstring ASN.1 tag and its value. |
| 286 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 287 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 288 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 289 | * On successful completion, \c *p is equal to \p end. |
| 290 | * On error, the value of \c *p is undefined. |
| 291 | * \param end End of data. |
| 292 | * \param bs On success, ::mbedtls_asn1_bitstring information about |
| 293 | * the parsed value. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 294 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 295 | * \return 0 if successful. |
| 296 | * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains |
| 297 | * extra data after a valid BIT STRING. |
| 298 | * \return An ASN.1 error code if the input does not start with |
| 299 | * a valid ASN.1 BIT STRING. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 300 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 301 | int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 302 | mbedtls_asn1_bitstring *bs ); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 303 | |
| 304 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 305 | * \brief Retrieve a bitstring ASN.1 tag without unused bits and its |
| 306 | * value. |
| 307 | * Updates the pointer to the beginning of the bit/octet string. |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 308 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 309 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 310 | * On successful completion, \c *p points to the first byte |
| 311 | * of the content of the BIT STRING. |
| 312 | * On error, the value of \c *p is undefined. |
| 313 | * \param end End of data. |
| 314 | * \param len On success, \c *len is the length of the content in bytes. |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 315 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 316 | * \return 0 if successful. |
| 317 | * \return #MBEDTLS_ERR_ASN1_INVALID_DATA if the input starts with |
| 318 | * a valid BIT STRING with a nonzero number of unused bits. |
| 319 | * \return An ASN.1 error code if the input does not start with |
| 320 | * a valid ASN.1 BIT STRING. |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 321 | */ |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 322 | int mbedtls_asn1_get_bitstring_null( unsigned char **p, |
| 323 | const unsigned char *end, |
| 324 | size_t *len ); |
Manuel Pégourié-Gonnard | a2d4e64 | 2013-07-11 13:59:02 +0200 | [diff] [blame] | 325 | |
| 326 | /** |
Gilles Peskine | dc2db48 | 2019-09-20 21:06:01 +0200 | [diff] [blame] | 327 | * \brief Parses and splits an ASN.1 "SEQUENCE OF <tag>". |
| 328 | * Updates the pointer to immediately behind the full sequence tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 329 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 330 | * \note On error, this function may return a partial list in \p cur. |
| 331 | * You must set `cur->next = NULL` before calling this function! |
| 332 | * Otherwise it is impossible to distinguish a previously non-null |
| 333 | * pointer from a pointer to an object allocated by this function. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 334 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 335 | * \note If the sequence is empty, this function does not modify |
| 336 | * \c *cur. If the sequence is valid and non-empty, this |
| 337 | * function sets `cur->buf.tag` to \p tag. This allows |
| 338 | * callers to distinguish between an empty sequence and |
| 339 | * a one-element sequence. |
| 340 | * |
| 341 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 342 | * On successful completion, \c *p is equal to \p end. |
| 343 | * On error, the value of \c *p is undefined. |
| 344 | * \param end End of data. |
| 345 | * \param cur A ::mbedtls_asn1_sequence which this function fills. |
| 346 | * When this function returns, \c *cur is the head of a linked |
| 347 | * list. Each node in this list is allocated with |
| 348 | * mbedtls_calloc() apart from \p cur itself, and should |
| 349 | * therefore be freed with mbedtls_free(). |
| 350 | * The list describes the content of the sequence. |
| 351 | * The head of the list (i.e. \c *cur itself) describes the |
| 352 | * first element, `*cur->next` describes the second element, etc. |
| 353 | * For each element, `buf.tag == tag`, `buf.len` is the length |
| 354 | * of the content of the content of the element, and `buf.p` |
| 355 | * points to the first byte of the content (i.e. immediately |
| 356 | * past the length of the element). |
| 357 | * Note that list elements may be allocated even on error. |
| 358 | * \param tag Each element of the sequence must have this tag. |
| 359 | * |
| 360 | * \return 0 if successful. |
| 361 | * \return #MBEDTLS_ERR_ASN1_LENGTH_MISMATCH if the input contains |
| 362 | * extra data after a valid SEQUENCE OF \p tag. |
| 363 | * \return #MBEDTLS_ERR_ASN1_ALLOC_FAILED if a memory allocation failed. |
| 364 | * \return An ASN.1 error code if the input does not start with |
| 365 | * a valid ASN.1 BIT STRING. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 366 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 367 | int mbedtls_asn1_get_sequence_of( unsigned char **p, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 368 | const unsigned char *end, |
| 369 | mbedtls_asn1_sequence *cur, |
| 370 | int tag ); |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 371 | |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 372 | #if defined(MBEDTLS_BIGNUM_C) |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 373 | /** |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 374 | * \brief Retrieve an integer ASN.1 tag and its value. |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 375 | * Updates the pointer to immediately behind the full tag. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 376 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 377 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 378 | * On successful completion, \c *p points to the first byte |
| 379 | * beyond the ASN.1 element. |
| 380 | * On error, the value of \c *p is undefined. |
| 381 | * \param end End of data. |
| 382 | * \param X On success, the parsed value. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 383 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 384 | * \return 0 if successful. |
| 385 | * \return An ASN.1 error code if the input does not start with |
| 386 | * a valid ASN.1 INTEGER. |
| 387 | * \return #MBEDTLS_ERR_ASN1_INVALID_LENGTH if the parsed value does |
| 388 | * not fit in an \c int. |
| 389 | * \return An MPI error code if the parsed value is too large. |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 390 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 391 | int mbedtls_asn1_get_mpi( unsigned char **p, |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 392 | const unsigned char *end, |
| 393 | mbedtls_mpi *X ); |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 394 | #endif /* MBEDTLS_BIGNUM_C */ |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 395 | |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 396 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 397 | * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence. |
| 398 | * Updates the pointer to immediately behind the full |
| 399 | * AlgorithmIdentifier. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 400 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 401 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 402 | * On successful completion, \c *p points to the first byte |
| 403 | * beyond the AlgorithmIdentifier element. |
| 404 | * On error, the value of \c *p is undefined. |
| 405 | * \param end End of data. |
| 406 | * \param alg The buffer to receive the OID. |
| 407 | * \param params The buffer to receive the parameters. |
| 408 | * This is zeroized if there are no parameters. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 409 | * |
| 410 | * \return 0 if successful or a specific ASN.1 or MPI error code. |
| 411 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 412 | int mbedtls_asn1_get_alg( unsigned char **p, |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 413 | const unsigned char *end, |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 414 | mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params ); |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 415 | |
| 416 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 417 | * \brief Retrieve an AlgorithmIdentifier ASN.1 sequence with NULL or no |
| 418 | * params. |
| 419 | * Updates the pointer to immediately behind the full |
| 420 | * AlgorithmIdentifier. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 421 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 422 | * \param p On entry, \c *p points to the start of the ASN.1 element. |
| 423 | * On successful completion, \c *p points to the first byte |
| 424 | * beyond the AlgorithmIdentifier element. |
| 425 | * On error, the value of \c *p is undefined. |
| 426 | * \param end End of data. |
| 427 | * \param alg The buffer to receive the OID. |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 428 | * |
| 429 | * \return 0 if successful or a specific ASN.1 or MPI error code. |
| 430 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 431 | int mbedtls_asn1_get_alg_null( unsigned char **p, |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 432 | const unsigned char *end, |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 433 | mbedtls_asn1_buf *alg ); |
Paul Bakker | f8d018a | 2013-06-29 12:16:17 +0200 | [diff] [blame] | 434 | |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 435 | /** |
Paul Bakker | cdda097 | 2013-09-09 12:51:29 +0200 | [diff] [blame] | 436 | * \brief Find a specific named_data entry in a sequence or list based on |
| 437 | * the OID. |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 438 | * |
| 439 | * \param list The list to seek through |
| 440 | * \param oid The OID to look for |
| 441 | * \param len Size of the OID |
| 442 | * |
| 443 | * \return NULL if not found, or a pointer to the existing entry. |
| 444 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 445 | mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( mbedtls_asn1_named_data *list, |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 446 | const char *oid, size_t len ); |
| 447 | |
| 448 | /** |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 449 | * \brief Free a mbedtls_asn1_named_data entry |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 450 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 451 | * \param entry The named data entry to free. |
| 452 | * This function calls mbedtls_free() on |
| 453 | * `entry->oid.p` and `entry->val.p`. |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 454 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 455 | void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *entry ); |
Paul Bakker | e5eae76 | 2013-08-26 12:05:14 +0200 | [diff] [blame] | 456 | |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 457 | /** |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 458 | * \brief Free all entries in a mbedtls_asn1_named_data list. |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 459 | * |
Gilles Peskine | bcbe1df | 2019-03-01 17:57:43 +0100 | [diff] [blame] | 460 | * \param head Pointer to the head of the list of named data entries to free. |
| 461 | * This function calls mbedtls_asn1_free_named_data() and |
| 462 | * mbedtls_free() on each list element and |
| 463 | * sets \c *head to \c NULL. |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 464 | */ |
Manuel Pégourié-Gonnard | 2cf5a7c | 2015-04-08 12:49:31 +0200 | [diff] [blame] | 465 | void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head ); |
Paul Bakker | c547cc9 | 2013-09-09 12:01:23 +0200 | [diff] [blame] | 466 | |
Paul Bakker | efc3029 | 2011-11-10 14:43:23 +0000 | [diff] [blame] | 467 | #ifdef __cplusplus |
| 468 | } |
| 469 | #endif |
| 470 | |
| 471 | #endif /* asn1.h */ |