blob: 412259e358e3b3c8e137d081c7dedc050f2c91ef [file] [log] [blame]
Paul Bakkerefc30292011-11-10 14:43:23 +00001/*
2 * Generic ASN.1 parsing
3 *
Manuel Pégourié-Gonnard6fb81872015-07-27 11:11:48 +02004 * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakkerefc30292011-11-10 14:43:23 +000018 *
Manuel Pégourié-Gonnardfe446432015-03-06 13:17:10 +000019 * This file is part of mbed TLS (https://tls.mbed.org)
Paul Bakkerefc30292011-11-10 14:43:23 +000020 */
21
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#if !defined(MBEDTLS_CONFIG_FILE)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000023#include "mbedtls/config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020024#else
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020025#include MBEDTLS_CONFIG_FILE
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020026#endif
Paul Bakkerefc30292011-11-10 14:43:23 +000027
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020028#if defined(MBEDTLS_ASN1_PARSE_C)
Paul Bakkerefc30292011-11-10 14:43:23 +000029
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000030#include "mbedtls/asn1.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050031#include "mbedtls/platform_util.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000032
Rich Evans00ab4702015-02-06 13:43:58 +000033#include <string.h>
34
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020035#if defined(MBEDTLS_BIGNUM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000036#include "mbedtls/bignum.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000037#endif
38
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020039#if defined(MBEDTLS_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000040#include "mbedtls/platform.h"
Paul Bakker6e339b52013-07-03 13:37:05 +020041#else
Rich Evans00ab4702015-02-06 13:43:58 +000042#include <stdlib.h>
Manuel Pégourié-Gonnard7551cb92015-05-26 16:04:06 +020043#define mbedtls_calloc calloc
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020044#define mbedtls_free free
Paul Bakker6e339b52013-07-03 13:37:05 +020045#endif
46
Paul Bakkerefc30292011-11-10 14:43:23 +000047/*
48 * ASN.1 DER decoding routines
49 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020050int mbedtls_asn1_get_len( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +000051 const unsigned char *end,
52 size_t *len )
53{
54 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020055 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000056
57 if( ( **p & 0x80 ) == 0 )
58 *len = *(*p)++;
59 else
60 {
61 switch( **p & 0x7F )
62 {
63 case 1:
64 if( ( end - *p ) < 2 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020065 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000066
67 *len = (*p)[1];
68 (*p) += 2;
69 break;
70
71 case 2:
72 if( ( end - *p ) < 3 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020073 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000074
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000075 *len = ( (size_t)(*p)[1] << 8 ) | (*p)[2];
Paul Bakkerefc30292011-11-10 14:43:23 +000076 (*p) += 3;
77 break;
78
79 case 3:
80 if( ( end - *p ) < 4 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020081 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000082
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000083 *len = ( (size_t)(*p)[1] << 16 ) |
84 ( (size_t)(*p)[2] << 8 ) | (*p)[3];
Paul Bakkerefc30292011-11-10 14:43:23 +000085 (*p) += 4;
86 break;
87
88 case 4:
89 if( ( end - *p ) < 5 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020090 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000091
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000092 *len = ( (size_t)(*p)[1] << 24 ) | ( (size_t)(*p)[2] << 16 ) |
93 ( (size_t)(*p)[3] << 8 ) | (*p)[4];
Paul Bakkerefc30292011-11-10 14:43:23 +000094 (*p) += 5;
95 break;
96
97 default:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020098 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +000099 }
100 }
101
102 if( *len > (size_t) ( end - *p ) )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200103 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000104
105 return( 0 );
106}
107
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200108int mbedtls_asn1_get_tag( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000109 const unsigned char *end,
110 size_t *len, int tag )
111{
112 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200113 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000114
115 if( **p != tag )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200116 return( MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakkerefc30292011-11-10 14:43:23 +0000117
118 (*p)++;
119
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200120 return( mbedtls_asn1_get_len( p, end, len ) );
Paul Bakkerefc30292011-11-10 14:43:23 +0000121}
122
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200123int mbedtls_asn1_get_bool( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000124 const unsigned char *end,
125 int *val )
126{
127 int ret;
128 size_t len;
129
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200130 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_BOOLEAN ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000131 return( ret );
132
133 if( len != 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200134 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000135
136 *val = ( **p != 0 ) ? 1 : 0;
137 (*p)++;
138
139 return( 0 );
140}
141
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200142int mbedtls_asn1_get_int( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000143 const unsigned char *end,
144 int *val )
145{
146 int ret;
147 size_t len;
148
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200149 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_INTEGER ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000150 return( ret );
151
Gilles Peskine9fd97942019-10-10 19:27:53 +0200152 /* len==0 is malformed (0 must be represented as 020100). */
153 if( len == 0 )
154 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
155 /* This is a cryptography library. Reject negative integers. */
156 if( ( **p & 0x80 ) != 0 )
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100157 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
158
Gilles Peskine9fd97942019-10-10 19:27:53 +0200159 /* Skip leading zeros. */
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100160 while( len > 0 && **p == 0 )
161 {
162 ++( *p );
163 --len;
164 }
Gilles Peskine9fd97942019-10-10 19:27:53 +0200165
166 /* Reject integers that don't fit in an int. This code assumes that
167 * the int type has no padding bit. */
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100168 if( len > sizeof( int ) )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200169 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Gilles Peskine37570e82019-10-10 19:29:27 +0200170 if( len == sizeof( int ) && ( **p & 0x80 ) != 0 )
171 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000172
173 *val = 0;
Paul Bakkerefc30292011-11-10 14:43:23 +0000174 while( len-- > 0 )
175 {
176 *val = ( *val << 8 ) | **p;
177 (*p)++;
178 }
179
180 return( 0 );
181}
182
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200183#if defined(MBEDTLS_BIGNUM_C)
184int mbedtls_asn1_get_mpi( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000185 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200186 mbedtls_mpi *X )
Paul Bakkerefc30292011-11-10 14:43:23 +0000187{
188 int ret;
189 size_t len;
190
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200191 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_INTEGER ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000192 return( ret );
193
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200194 ret = mbedtls_mpi_read_binary( X, *p, len );
Paul Bakkerefc30292011-11-10 14:43:23 +0000195
196 *p += len;
197
198 return( ret );
199}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200200#endif /* MBEDTLS_BIGNUM_C */
Paul Bakkerefc30292011-11-10 14:43:23 +0000201
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200202int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end,
203 mbedtls_asn1_bitstring *bs)
Paul Bakkerefc30292011-11-10 14:43:23 +0000204{
205 int ret;
206
207 /* Certificate type is a single byte bitstring */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200208 if( ( ret = mbedtls_asn1_get_tag( p, end, &bs->len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000209 return( ret );
210
211 /* Check length, subtract one for actual bit string length */
Paul Bakker66d5d072014-06-17 16:39:18 +0200212 if( bs->len < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200213 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000214 bs->len -= 1;
215
216 /* Get number of unused bits, ensure unused bits <= 7 */
217 bs->unused_bits = **p;
218 if( bs->unused_bits > 7 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200219 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000220 (*p)++;
221
222 /* Get actual bitstring */
223 bs->p = *p;
224 *p += bs->len;
225
226 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200227 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000228
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200229 return( 0 );
Paul Bakkerefc30292011-11-10 14:43:23 +0000230}
231
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200232/*
233 * Get a bit string without unused bits
234 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200235int mbedtls_asn1_get_bitstring_null( unsigned char **p, const unsigned char *end,
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200236 size_t *len )
237{
238 int ret;
239
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200240 if( ( ret = mbedtls_asn1_get_tag( p, end, len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200241 return( ret );
242
Gilles Peskinee40d1202019-03-01 18:08:35 +0100243 if( *len == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200244 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
Gilles Peskinee40d1202019-03-01 18:08:35 +0100245 --( *len );
246
247 if( **p != 0 )
248 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
249 ++( *p );
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200250
251 return( 0 );
252}
253
254
Paul Bakkerefc30292011-11-10 14:43:23 +0000255
256/*
257 * Parses and splits an ASN.1 "SEQUENCE OF <tag>"
258 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200259int mbedtls_asn1_get_sequence_of( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000260 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200261 mbedtls_asn1_sequence *cur,
Paul Bakkerefc30292011-11-10 14:43:23 +0000262 int tag)
263{
264 int ret;
265 size_t len;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200266 mbedtls_asn1_buf *buf;
Paul Bakkerefc30292011-11-10 14:43:23 +0000267
268 /* Get main sequence tag */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200269 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
270 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000271 return( ret );
272
273 if( *p + len != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200274 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000275
276 while( *p < end )
277 {
278 buf = &(cur->buf);
279 buf->tag = **p;
280
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200281 if( ( ret = mbedtls_asn1_get_tag( p, end, &buf->len, tag ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000282 return( ret );
283
284 buf->p = *p;
285 *p += buf->len;
286
287 /* Allocate and assign next pointer */
Paul Bakker66d5d072014-06-17 16:39:18 +0200288 if( *p < end )
Paul Bakkerefc30292011-11-10 14:43:23 +0000289 {
Simon Butcher29176892016-05-20 00:19:09 +0100290 cur->next = (mbedtls_asn1_sequence*)mbedtls_calloc( 1,
291 sizeof( mbedtls_asn1_sequence ) );
Paul Bakkerefc30292011-11-10 14:43:23 +0000292
293 if( cur->next == NULL )
Manuel Pégourié-Gonnard6a8ca332015-05-28 09:33:39 +0200294 return( MBEDTLS_ERR_ASN1_ALLOC_FAILED );
Paul Bakkerefc30292011-11-10 14:43:23 +0000295
296 cur = cur->next;
297 }
298 }
299
300 /* Set final sequence entry's next pointer to NULL */
301 cur->next = NULL;
302
303 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200304 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000305
306 return( 0 );
307}
308
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200309int mbedtls_asn1_get_alg( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200310 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200311 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200312{
313 int ret;
314 size_t len;
315
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200316 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
317 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200318 return( ret );
319
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200320 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200321 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200322
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200323 alg->tag = **p;
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200324 end = *p + len;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200325
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200326 if( ( ret = mbedtls_asn1_get_tag( p, end, &alg->len, MBEDTLS_ASN1_OID ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200327 return( ret );
328
329 alg->p = *p;
330 *p += alg->len;
331
332 if( *p == end )
333 {
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -0500334 mbedtls_platform_zeroize( params, sizeof(mbedtls_asn1_buf) );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200335 return( 0 );
336 }
337
338 params->tag = **p;
339 (*p)++;
340
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200341 if( ( ret = mbedtls_asn1_get_len( p, end, &params->len ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200342 return( ret );
343
344 params->p = *p;
345 *p += params->len;
346
347 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200348 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200349
350 return( 0 );
351}
352
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200353int mbedtls_asn1_get_alg_null( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200354 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200355 mbedtls_asn1_buf *alg )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200356{
357 int ret;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200358 mbedtls_asn1_buf params;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200359
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200360 memset( &params, 0, sizeof(mbedtls_asn1_buf) );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200361
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200362 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, &params ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200363 return( ret );
364
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200365 if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 )
366 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200367
368 return( 0 );
369}
370
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200371void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *cur )
Paul Bakkere5eae762013-08-26 12:05:14 +0200372{
373 if( cur == NULL )
374 return;
375
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200376 mbedtls_free( cur->oid.p );
377 mbedtls_free( cur->val.p );
Paul Bakkere5eae762013-08-26 12:05:14 +0200378
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -0500379 mbedtls_platform_zeroize( cur, sizeof( mbedtls_asn1_named_data ) );
Paul Bakkere5eae762013-08-26 12:05:14 +0200380}
381
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200382void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head )
Paul Bakkerc547cc92013-09-09 12:01:23 +0200383{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200384 mbedtls_asn1_named_data *cur;
Paul Bakkerc547cc92013-09-09 12:01:23 +0200385
386 while( ( cur = *head ) != NULL )
387 {
388 *head = cur->next;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200389 mbedtls_asn1_free_named_data( cur );
390 mbedtls_free( cur );
Paul Bakkerc547cc92013-09-09 12:01:23 +0200391 }
392}
393
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200394mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( mbedtls_asn1_named_data *list,
Paul Bakkere5eae762013-08-26 12:05:14 +0200395 const char *oid, size_t len )
396{
397 while( list != NULL )
398 {
399 if( list->oid.len == len &&
400 memcmp( list->oid.p, oid, len ) == 0 )
401 {
402 break;
403 }
404
405 list = list->next;
406 }
407
408 return( list );
409}
410
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200411#endif /* MBEDTLS_ASN1_PARSE_C */