blob: 83c7c58a12f4ad234916855fee635fecf9799f22 [file] [log] [blame]
Paul Bakkerefc30292011-11-10 14:43:23 +00001/*
2 * Generic ASN.1 parsing
3 *
Bence Szépkúti1e148272020-08-07 13:07:28 +02004 * Copyright The Mbed TLS Contributors
Manuel Pégourié-Gonnard37ff1402015-09-04 14:21:07 +02005 * SPDX-License-Identifier: Apache-2.0
6 *
7 * Licensed under the Apache License, Version 2.0 (the "License"); you may
8 * not use this file except in compliance with the License.
9 * You may obtain a copy of the License at
10 *
11 * http://www.apache.org/licenses/LICENSE-2.0
12 *
13 * Unless required by applicable law or agreed to in writing, software
14 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
15 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
16 * See the License for the specific language governing permissions and
17 * limitations under the License.
Paul Bakkerefc30292011-11-10 14:43:23 +000018 */
19
Gilles Peskinedb09ef62020-06-03 01:43:33 +020020#include "common.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000021
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020022#if defined(MBEDTLS_ASN1_PARSE_C)
Paul Bakkerefc30292011-11-10 14:43:23 +000023
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000024#include "mbedtls/asn1.h"
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -050025#include "mbedtls/platform_util.h"
Janos Follath24eed8d2019-11-22 13:21:35 +000026#include "mbedtls/error.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000027
Rich Evans00ab4702015-02-06 13:43:58 +000028#include <string.h>
29
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020030#if defined(MBEDTLS_BIGNUM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000031#include "mbedtls/bignum.h"
Paul Bakkerefc30292011-11-10 14:43:23 +000032#endif
33
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020034#if defined(MBEDTLS_PLATFORM_C)
Manuel Pégourié-Gonnard7f809972015-03-09 17:05:11 +000035#include "mbedtls/platform.h"
Paul Bakker6e339b52013-07-03 13:37:05 +020036#else
Rich Evans00ab4702015-02-06 13:43:58 +000037#include <stdlib.h>
Manuel Pégourié-Gonnard7551cb92015-05-26 16:04:06 +020038#define mbedtls_calloc calloc
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020039#define mbedtls_free free
Paul Bakker6e339b52013-07-03 13:37:05 +020040#endif
41
Paul Bakkerefc30292011-11-10 14:43:23 +000042/*
43 * ASN.1 DER decoding routines
44 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020045int mbedtls_asn1_get_len( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +000046 const unsigned char *end,
47 size_t *len )
48{
49 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020050 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000051
52 if( ( **p & 0x80 ) == 0 )
53 *len = *(*p)++;
54 else
55 {
56 switch( **p & 0x7F )
57 {
58 case 1:
59 if( ( end - *p ) < 2 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020060 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000061
62 *len = (*p)[1];
63 (*p) += 2;
64 break;
65
66 case 2:
67 if( ( end - *p ) < 3 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020068 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000069
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000070 *len = ( (size_t)(*p)[1] << 8 ) | (*p)[2];
Paul Bakkerefc30292011-11-10 14:43:23 +000071 (*p) += 3;
72 break;
73
74 case 3:
75 if( ( end - *p ) < 4 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020076 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000077
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000078 *len = ( (size_t)(*p)[1] << 16 ) |
79 ( (size_t)(*p)[2] << 8 ) | (*p)[3];
Paul Bakkerefc30292011-11-10 14:43:23 +000080 (*p) += 4;
81 break;
82
83 case 4:
84 if( ( end - *p ) < 5 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020085 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000086
Manuel Pégourié-Gonnard6fdc4ca2015-02-13 17:15:18 +000087 *len = ( (size_t)(*p)[1] << 24 ) | ( (size_t)(*p)[2] << 16 ) |
88 ( (size_t)(*p)[3] << 8 ) | (*p)[4];
Paul Bakkerefc30292011-11-10 14:43:23 +000089 (*p) += 5;
90 break;
91
92 default:
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020093 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +000094 }
95 }
96
97 if( *len > (size_t) ( end - *p ) )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +020098 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +000099
100 return( 0 );
101}
102
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200103int mbedtls_asn1_get_tag( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000104 const unsigned char *end,
105 size_t *len, int tag )
106{
107 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200108 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000109
110 if( **p != tag )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200111 return( MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
Paul Bakkerefc30292011-11-10 14:43:23 +0000112
113 (*p)++;
114
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200115 return( mbedtls_asn1_get_len( p, end, len ) );
Paul Bakkerefc30292011-11-10 14:43:23 +0000116}
117
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200118int mbedtls_asn1_get_bool( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000119 const unsigned char *end,
120 int *val )
121{
Janos Follath24eed8d2019-11-22 13:21:35 +0000122 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000123 size_t len;
124
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200125 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_BOOLEAN ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000126 return( ret );
127
128 if( len != 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200129 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000130
131 *val = ( **p != 0 ) ? 1 : 0;
132 (*p)++;
133
134 return( 0 );
135}
136
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200137static int asn1_get_tagged_int( unsigned char **p,
138 const unsigned char *end,
139 int tag, int *val )
Paul Bakkerefc30292011-11-10 14:43:23 +0000140{
Janos Follath24eed8d2019-11-22 13:21:35 +0000141 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000142 size_t len;
143
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200144 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, tag ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000145 return( ret );
146
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200147 /*
148 * len==0 is malformed (0 must be represented as 020100 for INTEGER,
149 * or 0A0100 for ENUMERATED tags
150 */
Gilles Peskine9fd97942019-10-10 19:27:53 +0200151 if( len == 0 )
152 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
153 /* This is a cryptography library. Reject negative integers. */
154 if( ( **p & 0x80 ) != 0 )
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100155 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
156
Gilles Peskine9fd97942019-10-10 19:27:53 +0200157 /* Skip leading zeros. */
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100158 while( len > 0 && **p == 0 )
159 {
160 ++( *p );
161 --len;
162 }
Gilles Peskine9fd97942019-10-10 19:27:53 +0200163
164 /* Reject integers that don't fit in an int. This code assumes that
165 * the int type has no padding bit. */
Gilles Peskinef7d6acd2019-03-01 18:06:08 +0100166 if( len > sizeof( int ) )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200167 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Gilles Peskine37570e82019-10-10 19:29:27 +0200168 if( len == sizeof( int ) && ( **p & 0x80 ) != 0 )
169 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000170
171 *val = 0;
Paul Bakkerefc30292011-11-10 14:43:23 +0000172 while( len-- > 0 )
173 {
174 *val = ( *val << 8 ) | **p;
175 (*p)++;
176 }
177
178 return( 0 );
179}
180
Mykhailo Sopiha20180ca2019-10-29 15:58:10 +0200181int mbedtls_asn1_get_int( unsigned char **p,
182 const unsigned char *end,
183 int *val )
184{
185 return( asn1_get_tagged_int( p, end, MBEDTLS_ASN1_INTEGER, val) );
186}
187
188int mbedtls_asn1_get_enum( unsigned char **p,
189 const unsigned char *end,
190 int *val )
191{
192 return( asn1_get_tagged_int( p, end, MBEDTLS_ASN1_ENUMERATED, val) );
193}
194
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200195#if defined(MBEDTLS_BIGNUM_C)
196int mbedtls_asn1_get_mpi( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000197 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200198 mbedtls_mpi *X )
Paul Bakkerefc30292011-11-10 14:43:23 +0000199{
Janos Follath24eed8d2019-11-22 13:21:35 +0000200 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000201 size_t len;
202
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200203 if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_INTEGER ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000204 return( ret );
205
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200206 ret = mbedtls_mpi_read_binary( X, *p, len );
Paul Bakkerefc30292011-11-10 14:43:23 +0000207
208 *p += len;
209
210 return( ret );
211}
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200212#endif /* MBEDTLS_BIGNUM_C */
Paul Bakkerefc30292011-11-10 14:43:23 +0000213
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200214int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end,
215 mbedtls_asn1_bitstring *bs)
Paul Bakkerefc30292011-11-10 14:43:23 +0000216{
Janos Follath24eed8d2019-11-22 13:21:35 +0000217 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerefc30292011-11-10 14:43:23 +0000218
219 /* Certificate type is a single byte bitstring */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200220 if( ( ret = mbedtls_asn1_get_tag( p, end, &bs->len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
Paul Bakkerefc30292011-11-10 14:43:23 +0000221 return( ret );
222
223 /* Check length, subtract one for actual bit string length */
Paul Bakker66d5d072014-06-17 16:39:18 +0200224 if( bs->len < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200225 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Paul Bakkerefc30292011-11-10 14:43:23 +0000226 bs->len -= 1;
227
228 /* Get number of unused bits, ensure unused bits <= 7 */
229 bs->unused_bits = **p;
230 if( bs->unused_bits > 7 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200231 return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000232 (*p)++;
233
234 /* Get actual bitstring */
235 bs->p = *p;
236 *p += bs->len;
237
238 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200239 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerefc30292011-11-10 14:43:23 +0000240
Paul Bakkerd8bb8262014-06-17 14:06:49 +0200241 return( 0 );
Paul Bakkerefc30292011-11-10 14:43:23 +0000242}
243
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200244/*
Hanno Becker199b7092019-09-11 14:21:26 +0100245 * Traverse an ASN.1 "SEQUENCE OF <tag>"
246 * and call a callback for each entry found.
247 */
248int mbedtls_asn1_traverse_sequence_of(
249 unsigned char **p,
250 const unsigned char *end,
Hanno Becker34aada22020-02-03 10:39:55 +0000251 unsigned char tag_must_mask, unsigned char tag_must_val,
252 unsigned char tag_may_mask, unsigned char tag_may_val,
Hanno Becker199b7092019-09-11 14:21:26 +0100253 int (*cb)( void *ctx, int tag,
254 unsigned char *start, size_t len ),
255 void *ctx )
256{
257 int ret;
258 size_t len;
259
260 /* Get main sequence tag */
261 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
262 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
263 {
264 return( ret );
265 }
266
267 if( *p + len != end )
268 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
269
270 while( *p < end )
271 {
272 unsigned char const tag = *(*p)++;
273
274 if( ( tag & tag_must_mask ) != tag_must_val )
275 return( MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
276
277 if( ( ret = mbedtls_asn1_get_len( p, end, &len ) ) != 0 )
278 return( ret );
279
280 if( ( tag & tag_may_mask ) == tag_may_val )
281 {
282 if( cb != NULL )
283 {
284 ret = cb( ctx, tag, *p, len );
285 if( ret != 0 )
286 return( ret );
287 }
288 }
289
290 *p += len;
291 }
292
293 return( 0 );
294}
295
296/*
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200297 * Get a bit string without unused bits
298 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200299int mbedtls_asn1_get_bitstring_null( unsigned char **p, const unsigned char *end,
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200300 size_t *len )
301{
Janos Follath24eed8d2019-11-22 13:21:35 +0000302 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200303
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200304 if( ( ret = mbedtls_asn1_get_tag( p, end, len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200305 return( ret );
306
Gilles Peskinee40d1202019-03-01 18:08:35 +0100307 if( *len == 0 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200308 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
Gilles Peskinee40d1202019-03-01 18:08:35 +0100309 --( *len );
310
311 if( **p != 0 )
312 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
313 ++( *p );
Manuel Pégourié-Gonnarda2d4e642013-07-11 13:59:02 +0200314
315 return( 0 );
316}
317
Hanno Becker12ae27d2019-09-11 14:20:09 +0100318void mbedtls_asn1_sequence_free( mbedtls_asn1_sequence *seq )
319{
320 while( seq != NULL )
321 {
322 mbedtls_asn1_sequence *next = seq->next;
323 mbedtls_platform_zeroize( seq, sizeof( *seq ) );
324 mbedtls_free( seq );
325 seq = next;
326 }
327}
Paul Bakkerefc30292011-11-10 14:43:23 +0000328
Hanno Becker1505f632019-09-11 14:25:26 +0100329typedef struct
330{
331 int tag;
332 mbedtls_asn1_sequence *cur;
333} asn1_get_sequence_of_cb_ctx_t;
334
335static int asn1_get_sequence_of_cb( void *ctx,
336 int tag,
337 unsigned char *start,
338 size_t len )
339{
340 asn1_get_sequence_of_cb_ctx_t *cb_ctx =
341 (asn1_get_sequence_of_cb_ctx_t *) ctx;
342 mbedtls_asn1_sequence *cur =
343 cb_ctx->cur;
344
345 if( cur->buf.p != NULL )
346 {
347 cur->next =
348 mbedtls_calloc( 1, sizeof( mbedtls_asn1_sequence ) );
349
350 if( cur->next == NULL )
351 return( MBEDTLS_ERR_ASN1_ALLOC_FAILED );
352
353 cur = cur->next;
354 }
355
356 cur->buf.p = start;
357 cur->buf.len = len;
358 cur->buf.tag = tag;
359
360 cb_ctx->cur = cur;
361 return( 0 );
362}
363
Paul Bakkerefc30292011-11-10 14:43:23 +0000364/*
365 * Parses and splits an ASN.1 "SEQUENCE OF <tag>"
366 */
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200367int mbedtls_asn1_get_sequence_of( unsigned char **p,
Paul Bakkerefc30292011-11-10 14:43:23 +0000368 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200369 mbedtls_asn1_sequence *cur,
Paul Bakkerefc30292011-11-10 14:43:23 +0000370 int tag)
371{
Hanno Becker1505f632019-09-11 14:25:26 +0100372 asn1_get_sequence_of_cb_ctx_t cb_ctx = { tag, cur };
373 memset( cur, 0, sizeof( mbedtls_asn1_sequence ) );
374 return( mbedtls_asn1_traverse_sequence_of(
375 p, end, 0xFF, tag, 0, 0,
376 asn1_get_sequence_of_cb, &cb_ctx ) );
Paul Bakkerefc30292011-11-10 14:43:23 +0000377}
378
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200379int mbedtls_asn1_get_alg( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200380 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200381 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200382{
Janos Follath24eed8d2019-11-22 13:21:35 +0000383 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200384 size_t len;
385
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200386 if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
387 MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200388 return( ret );
389
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200390 if( ( end - *p ) < 1 )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200391 return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200392
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200393 alg->tag = **p;
Manuel Pégourié-Gonnardba77bbf2013-08-15 13:38:13 +0200394 end = *p + len;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200395
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200396 if( ( ret = mbedtls_asn1_get_tag( p, end, &alg->len, MBEDTLS_ASN1_OID ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200397 return( ret );
398
399 alg->p = *p;
400 *p += alg->len;
401
402 if( *p == end )
403 {
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -0500404 mbedtls_platform_zeroize( params, sizeof(mbedtls_asn1_buf) );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200405 return( 0 );
406 }
407
408 params->tag = **p;
409 (*p)++;
410
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200411 if( ( ret = mbedtls_asn1_get_len( p, end, &params->len ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200412 return( ret );
413
414 params->p = *p;
415 *p += params->len;
416
417 if( *p != end )
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200418 return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200419
420 return( 0 );
421}
422
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200423int mbedtls_asn1_get_alg_null( unsigned char **p,
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200424 const unsigned char *end,
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200425 mbedtls_asn1_buf *alg )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200426{
Janos Follath24eed8d2019-11-22 13:21:35 +0000427 int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200428 mbedtls_asn1_buf params;
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200429
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200430 memset( &params, 0, sizeof(mbedtls_asn1_buf) );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200431
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200432 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, &params ) ) != 0 )
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200433 return( ret );
434
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200435 if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 )
436 return( MBEDTLS_ERR_ASN1_INVALID_DATA );
Paul Bakkerf8d018a2013-06-29 12:16:17 +0200437
438 return( 0 );
439}
440
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200441void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *cur )
Paul Bakkere5eae762013-08-26 12:05:14 +0200442{
443 if( cur == NULL )
444 return;
445
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200446 mbedtls_free( cur->oid.p );
447 mbedtls_free( cur->val.p );
Paul Bakkere5eae762013-08-26 12:05:14 +0200448
Andres Amaya Garcia1f6301b2018-04-17 09:51:09 -0500449 mbedtls_platform_zeroize( cur, sizeof( mbedtls_asn1_named_data ) );
Paul Bakkere5eae762013-08-26 12:05:14 +0200450}
451
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200452void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head )
Paul Bakkerc547cc92013-09-09 12:01:23 +0200453{
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200454 mbedtls_asn1_named_data *cur;
Paul Bakkerc547cc92013-09-09 12:01:23 +0200455
456 while( ( cur = *head ) != NULL )
457 {
458 *head = cur->next;
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200459 mbedtls_asn1_free_named_data( cur );
460 mbedtls_free( cur );
Paul Bakkerc547cc92013-09-09 12:01:23 +0200461 }
462}
463
Mateusz Starzyk59961cf2021-01-26 13:57:43 +0100464const mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( const mbedtls_asn1_named_data *list,
Paul Bakkere5eae762013-08-26 12:05:14 +0200465 const char *oid, size_t len )
466{
467 while( list != NULL )
468 {
469 if( list->oid.len == len &&
470 memcmp( list->oid.p, oid, len ) == 0 )
471 {
472 break;
473 }
474
475 list = list->next;
476 }
477
478 return( list );
479}
480
Manuel Pégourié-Gonnard2cf5a7c2015-04-08 12:49:31 +0200481#endif /* MBEDTLS_ASN1_PARSE_C */