2011-11-10 15:43:23 +01:00
|
|
|
/*
|
|
|
|
* Generic ASN.1 parsing
|
|
|
|
*
|
2015-07-27 11:11:48 +02:00
|
|
|
* Copyright (C) 2006-2015, ARM Limited, All Rights Reserved
|
2015-09-04 14:21:07 +02:00
|
|
|
* SPDX-License-Identifier: Apache-2.0
|
2011-11-10 15:43:23 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
|
|
* not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
2011-11-10 15:43:23 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
2011-11-10 15:43:23 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
2011-11-10 15:43:23 +01:00
|
|
|
*
|
2015-09-04 14:21:07 +02:00
|
|
|
* This file is part of mbed TLS (https://tls.mbed.org)
|
2011-11-10 15:43:23 +01:00
|
|
|
*/
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if !defined(MBEDTLS_CONFIG_FILE)
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/config.h"
|
2014-04-29 12:39:06 +02:00
|
|
|
#else
|
2015-04-08 12:49:31 +02:00
|
|
|
#include MBEDTLS_CONFIG_FILE
|
2014-04-29 12:39:06 +02:00
|
|
|
#endif
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_ASN1_PARSE_C)
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/asn1.h"
|
2018-04-17 16:51:09 +02:00
|
|
|
#include "mbedtls/platform_util.h"
|
2019-11-22 14:21:35 +01:00
|
|
|
#include "mbedtls/error.h"
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-02-06 14:43:58 +01:00
|
|
|
#include <string.h>
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_BIGNUM_C)
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/bignum.h"
|
2011-11-10 15:43:23 +01:00
|
|
|
#endif
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_PLATFORM_C)
|
2015-03-09 18:05:11 +01:00
|
|
|
#include "mbedtls/platform.h"
|
2013-07-03 13:37:05 +02:00
|
|
|
#else
|
2015-02-06 14:43:58 +01:00
|
|
|
#include <stdlib.h>
|
2015-05-26 16:04:06 +02:00
|
|
|
#define mbedtls_calloc calloc
|
2015-04-08 12:49:31 +02:00
|
|
|
#define mbedtls_free free
|
2013-07-03 13:37:05 +02:00
|
|
|
#endif
|
|
|
|
|
2011-11-10 15:43:23 +01:00
|
|
|
/*
|
|
|
|
* ASN.1 DER decoding routines
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_len( unsigned char **p,
|
2011-11-10 15:43:23 +01:00
|
|
|
const unsigned char *end,
|
|
|
|
size_t *len )
|
|
|
|
{
|
|
|
|
if( ( end - *p ) < 1 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
if( ( **p & 0x80 ) == 0 )
|
|
|
|
*len = *(*p)++;
|
|
|
|
else
|
|
|
|
{
|
|
|
|
switch( **p & 0x7F )
|
|
|
|
{
|
|
|
|
case 1:
|
|
|
|
if( ( end - *p ) < 2 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
*len = (*p)[1];
|
|
|
|
(*p) += 2;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 2:
|
|
|
|
if( ( end - *p ) < 3 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-02-13 18:15:18 +01:00
|
|
|
*len = ( (size_t)(*p)[1] << 8 ) | (*p)[2];
|
2011-11-10 15:43:23 +01:00
|
|
|
(*p) += 3;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 3:
|
|
|
|
if( ( end - *p ) < 4 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-02-13 18:15:18 +01:00
|
|
|
*len = ( (size_t)(*p)[1] << 16 ) |
|
|
|
|
( (size_t)(*p)[2] << 8 ) | (*p)[3];
|
2011-11-10 15:43:23 +01:00
|
|
|
(*p) += 4;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 4:
|
|
|
|
if( ( end - *p ) < 5 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-02-13 18:15:18 +01:00
|
|
|
*len = ( (size_t)(*p)[1] << 24 ) | ( (size_t)(*p)[2] << 16 ) |
|
|
|
|
( (size_t)(*p)[3] << 8 ) | (*p)[4];
|
2011-11-10 15:43:23 +01:00
|
|
|
(*p) += 5;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default:
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
2011-11-10 15:43:23 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if( *len > (size_t) ( end - *p ) )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_tag( unsigned char **p,
|
2011-11-10 15:43:23 +01:00
|
|
|
const unsigned char *end,
|
|
|
|
size_t *len, int tag )
|
|
|
|
{
|
|
|
|
if( ( end - *p ) < 1 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
if( **p != tag )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_UNEXPECTED_TAG );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
(*p)++;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
return( mbedtls_asn1_get_len( p, end, len ) );
|
2011-11-10 15:43:23 +01:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_bool( unsigned char **p,
|
2011-11-10 15:43:23 +01:00
|
|
|
const unsigned char *end,
|
|
|
|
int *val )
|
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2011-11-10 15:43:23 +01:00
|
|
|
size_t len;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_BOOLEAN ) ) != 0 )
|
2011-11-10 15:43:23 +01:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
if( len != 1 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
*val = ( **p != 0 ) ? 1 : 0;
|
|
|
|
(*p)++;
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2019-10-29 14:58:10 +01:00
|
|
|
static int asn1_get_tagged_int( unsigned char **p,
|
|
|
|
const unsigned char *end,
|
|
|
|
int tag, int *val )
|
2011-11-10 15:43:23 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2011-11-10 15:43:23 +01:00
|
|
|
size_t len;
|
|
|
|
|
2019-10-29 14:58:10 +01:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &len, tag ) ) != 0 )
|
2011-11-10 15:43:23 +01:00
|
|
|
return( ret );
|
|
|
|
|
2019-10-29 14:58:10 +01:00
|
|
|
/*
|
|
|
|
* len==0 is malformed (0 must be represented as 020100 for INTEGER,
|
|
|
|
* or 0A0100 for ENUMERATED tags
|
|
|
|
*/
|
2019-10-10 19:27:53 +02:00
|
|
|
if( len == 0 )
|
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
|
|
|
/* This is a cryptography library. Reject negative integers. */
|
|
|
|
if( ( **p & 0x80 ) != 0 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2019-10-10 19:27:53 +02:00
|
|
|
/* Skip leading zeros. */
|
2019-03-01 18:06:08 +01:00
|
|
|
while( len > 0 && **p == 0 )
|
|
|
|
{
|
|
|
|
++( *p );
|
|
|
|
--len;
|
|
|
|
}
|
2019-10-10 19:27:53 +02:00
|
|
|
|
|
|
|
/* Reject integers that don't fit in an int. This code assumes that
|
|
|
|
* the int type has no padding bit. */
|
2019-03-01 18:06:08 +01:00
|
|
|
if( len > sizeof( int ) )
|
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
2019-10-10 19:29:27 +02:00
|
|
|
if( len == sizeof( int ) && ( **p & 0x80 ) != 0 )
|
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2019-03-01 18:06:08 +01:00
|
|
|
*val = 0;
|
2011-11-10 15:43:23 +01:00
|
|
|
while( len-- > 0 )
|
|
|
|
{
|
|
|
|
*val = ( *val << 8 ) | **p;
|
|
|
|
(*p)++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2019-10-29 14:58:10 +01:00
|
|
|
int mbedtls_asn1_get_int( unsigned char **p,
|
|
|
|
const unsigned char *end,
|
|
|
|
int *val )
|
|
|
|
{
|
|
|
|
return( asn1_get_tagged_int( p, end, MBEDTLS_ASN1_INTEGER, val) );
|
|
|
|
}
|
|
|
|
|
|
|
|
int mbedtls_asn1_get_enum( unsigned char **p,
|
|
|
|
const unsigned char *end,
|
|
|
|
int *val )
|
|
|
|
{
|
|
|
|
return( asn1_get_tagged_int( p, end, MBEDTLS_ASN1_ENUMERATED, val) );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#if defined(MBEDTLS_BIGNUM_C)
|
|
|
|
int mbedtls_asn1_get_mpi( unsigned char **p,
|
2011-11-10 15:43:23 +01:00
|
|
|
const unsigned char *end,
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_mpi *X )
|
2011-11-10 15:43:23 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2011-11-10 15:43:23 +01:00
|
|
|
size_t len;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &len, MBEDTLS_ASN1_INTEGER ) ) != 0 )
|
2011-11-10 15:43:23 +01:00
|
|
|
return( ret );
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
ret = mbedtls_mpi_read_binary( X, *p, len );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
*p += len;
|
|
|
|
|
|
|
|
return( ret );
|
|
|
|
}
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_BIGNUM_C */
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_bitstring( unsigned char **p, const unsigned char *end,
|
|
|
|
mbedtls_asn1_bitstring *bs)
|
2011-11-10 15:43:23 +01:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
/* Certificate type is a single byte bitstring */
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &bs->len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
|
2011-11-10 15:43:23 +01:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
/* Check length, subtract one for actual bit string length */
|
2014-06-17 16:39:18 +02:00
|
|
|
if( bs->len < 1 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2011-11-10 15:43:23 +01:00
|
|
|
bs->len -= 1;
|
|
|
|
|
|
|
|
/* Get number of unused bits, ensure unused bits <= 7 */
|
|
|
|
bs->unused_bits = **p;
|
|
|
|
if( bs->unused_bits > 7 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_LENGTH );
|
2011-11-10 15:43:23 +01:00
|
|
|
(*p)++;
|
|
|
|
|
|
|
|
/* Get actual bitstring */
|
|
|
|
bs->p = *p;
|
|
|
|
*p += bs->len;
|
|
|
|
|
|
|
|
if( *p != end )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
2014-06-17 14:06:49 +02:00
|
|
|
return( 0 );
|
2011-11-10 15:43:23 +01:00
|
|
|
}
|
|
|
|
|
2013-07-11 13:59:02 +02:00
|
|
|
/*
|
|
|
|
* Get a bit string without unused bits
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_bitstring_null( unsigned char **p, const unsigned char *end,
|
2013-07-11 13:59:02 +02:00
|
|
|
size_t *len )
|
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2013-07-11 13:59:02 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, len, MBEDTLS_ASN1_BIT_STRING ) ) != 0 )
|
2013-07-11 13:59:02 +02:00
|
|
|
return( ret );
|
|
|
|
|
2019-03-01 18:08:35 +01:00
|
|
|
if( *len == 0 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_DATA );
|
2019-03-01 18:08:35 +01:00
|
|
|
--( *len );
|
|
|
|
|
|
|
|
if( **p != 0 )
|
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_DATA );
|
|
|
|
++( *p );
|
2013-07-11 13:59:02 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Parses and splits an ASN.1 "SEQUENCE OF <tag>"
|
|
|
|
*/
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_sequence_of( unsigned char **p,
|
2011-11-10 15:43:23 +01:00
|
|
|
const unsigned char *end,
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_sequence *cur,
|
2011-11-10 15:43:23 +01:00
|
|
|
int tag)
|
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2011-11-10 15:43:23 +01:00
|
|
|
size_t len;
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_buf *buf;
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
/* Get main sequence tag */
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
|
|
|
|
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
|
2011-11-10 15:43:23 +01:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
if( *p + len != end )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
while( *p < end )
|
|
|
|
{
|
|
|
|
buf = &(cur->buf);
|
|
|
|
buf->tag = **p;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &buf->len, tag ) ) != 0 )
|
2011-11-10 15:43:23 +01:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
buf->p = *p;
|
|
|
|
*p += buf->len;
|
|
|
|
|
|
|
|
/* Allocate and assign next pointer */
|
2014-06-17 16:39:18 +02:00
|
|
|
if( *p < end )
|
2011-11-10 15:43:23 +01:00
|
|
|
{
|
2016-05-20 01:19:09 +02:00
|
|
|
cur->next = (mbedtls_asn1_sequence*)mbedtls_calloc( 1,
|
|
|
|
sizeof( mbedtls_asn1_sequence ) );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
if( cur->next == NULL )
|
2015-05-28 09:33:39 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_ALLOC_FAILED );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
cur = cur->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Set final sequence entry's next pointer to NULL */
|
|
|
|
cur->next = NULL;
|
|
|
|
|
|
|
|
if( *p != end )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
|
2011-11-10 15:43:23 +01:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_alg( unsigned char **p,
|
2013-06-29 12:16:17 +02:00
|
|
|
const unsigned char *end,
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params )
|
2013-06-29 12:16:17 +02:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2013-06-29 12:16:17 +02:00
|
|
|
size_t len;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &len,
|
|
|
|
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 )
|
2013-06-29 12:16:17 +02:00
|
|
|
return( ret );
|
|
|
|
|
2013-08-15 13:38:13 +02:00
|
|
|
if( ( end - *p ) < 1 )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_OUT_OF_DATA );
|
2013-08-15 13:38:13 +02:00
|
|
|
|
2013-06-29 12:16:17 +02:00
|
|
|
alg->tag = **p;
|
2013-08-15 13:38:13 +02:00
|
|
|
end = *p + len;
|
2013-06-29 12:16:17 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_tag( p, end, &alg->len, MBEDTLS_ASN1_OID ) ) != 0 )
|
2013-06-29 12:16:17 +02:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
alg->p = *p;
|
|
|
|
*p += alg->len;
|
|
|
|
|
|
|
|
if( *p == end )
|
|
|
|
{
|
2018-04-17 16:51:09 +02:00
|
|
|
mbedtls_platform_zeroize( params, sizeof(mbedtls_asn1_buf) );
|
2013-06-29 12:16:17 +02:00
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
|
|
|
params->tag = **p;
|
|
|
|
(*p)++;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_len( p, end, ¶ms->len ) ) != 0 )
|
2013-06-29 12:16:17 +02:00
|
|
|
return( ret );
|
|
|
|
|
|
|
|
params->p = *p;
|
|
|
|
*p += params->len;
|
|
|
|
|
|
|
|
if( *p != end )
|
2015-04-08 12:49:31 +02:00
|
|
|
return( MBEDTLS_ERR_ASN1_LENGTH_MISMATCH );
|
2013-06-29 12:16:17 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
int mbedtls_asn1_get_alg_null( unsigned char **p,
|
2013-06-29 12:16:17 +02:00
|
|
|
const unsigned char *end,
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_buf *alg )
|
2013-06-29 12:16:17 +02:00
|
|
|
{
|
2019-11-22 14:21:35 +01:00
|
|
|
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_buf params;
|
2013-06-29 12:16:17 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
memset( ¶ms, 0, sizeof(mbedtls_asn1_buf) );
|
2013-06-29 12:16:17 +02:00
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( ret = mbedtls_asn1_get_alg( p, end, alg, ¶ms ) ) != 0 )
|
2013-06-29 12:16:17 +02:00
|
|
|
return( ret );
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 )
|
|
|
|
return( MBEDTLS_ERR_ASN1_INVALID_DATA );
|
2013-06-29 12:16:17 +02:00
|
|
|
|
|
|
|
return( 0 );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
void mbedtls_asn1_free_named_data( mbedtls_asn1_named_data *cur )
|
2013-08-26 12:05:14 +02:00
|
|
|
{
|
|
|
|
if( cur == NULL )
|
|
|
|
return;
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_free( cur->oid.p );
|
|
|
|
mbedtls_free( cur->val.p );
|
2013-08-26 12:05:14 +02:00
|
|
|
|
2018-04-17 16:51:09 +02:00
|
|
|
mbedtls_platform_zeroize( cur, sizeof( mbedtls_asn1_named_data ) );
|
2013-08-26 12:05:14 +02:00
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
void mbedtls_asn1_free_named_data_list( mbedtls_asn1_named_data **head )
|
2013-09-09 12:01:23 +02:00
|
|
|
{
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_named_data *cur;
|
2013-09-09 12:01:23 +02:00
|
|
|
|
|
|
|
while( ( cur = *head ) != NULL )
|
|
|
|
{
|
|
|
|
*head = cur->next;
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_free_named_data( cur );
|
|
|
|
mbedtls_free( cur );
|
2013-09-09 12:01:23 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
mbedtls_asn1_named_data *mbedtls_asn1_find_named_data( mbedtls_asn1_named_data *list,
|
2013-08-26 12:05:14 +02:00
|
|
|
const char *oid, size_t len )
|
|
|
|
{
|
|
|
|
while( list != NULL )
|
|
|
|
{
|
|
|
|
if( list->oid.len == len &&
|
|
|
|
memcmp( list->oid.p, oid, len ) == 0 )
|
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
list = list->next;
|
|
|
|
}
|
|
|
|
|
|
|
|
return( list );
|
|
|
|
}
|
|
|
|
|
2015-04-08 12:49:31 +02:00
|
|
|
#endif /* MBEDTLS_ASN1_PARSE_C */
|