proxmark3/common/mbedtls/asn1parse.c

449 lines
12 KiB
C
Raw Normal View History

2018-11-08 00:05:02 +08:00
/*
* Generic ASN.1 parsing
*
2021-05-14 15:53:00 +08:00
* Copyright The Mbed TLS Contributors
* SPDX-License-Identifier: Apache-2.0
2018-11-08 00:05:02 +08:00
*
2021-05-14 15:53:00 +08:00
* Licensed under the Apache License, Version 2.0 (the "License"); you may
* not use this file except in compliance with the License.
* You may obtain a copy of the License at
2018-11-08 00:05:02 +08:00
*
2021-05-14 15:53:00 +08:00
* http://www.apache.org/licenses/LICENSE-2.0
2018-11-08 00:05:02 +08:00
*
2021-05-14 15:53:00 +08:00
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
2018-11-08 00:05:02 +08:00
*/
2021-05-14 15:53:00 +08:00
#include "common.h"
2018-11-08 00:05:02 +08:00
#if defined(MBEDTLS_ASN1_PARSE_C)
#include "mbedtls/asn1.h"
#include "mbedtls/platform_util.h"
2021-05-14 15:53:00 +08:00
#include "mbedtls/error.h"
2018-11-08 00:05:02 +08:00
#include <string.h>
#if defined(MBEDTLS_BIGNUM_C)
#include "mbedtls/bignum.h"
#endif
#if defined(MBEDTLS_PLATFORM_C)
#include "mbedtls/platform.h"
#else
#include <stdlib.h>
#define mbedtls_calloc calloc
#define mbedtls_free free
#endif
/*
* ASN.1 DER decoding routines
*/
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_len(unsigned char **p,
const unsigned char *end,
size_t *len) {
if ((end - *p) < 1)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
2021-05-14 15:53:00 +08:00
2021-05-14 17:00:46 +08:00
if ((**p & 0x80) == 0)
*len = *(*p)++;
else {
switch (**p & 0x7F) {
case 1:
if ((end - *p) < 2)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
*len = (*p)[1];
(*p) += 2;
break;
case 2:
if ((end - *p) < 3)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
*len = ((size_t)(*p)[1] << 8) | (*p)[2];
(*p) += 3;
break;
case 3:
if ((end - *p) < 4)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
*len = ((size_t)(*p)[1] << 16) |
((size_t)(*p)[2] << 8) | (*p)[3];
(*p) += 4;
break;
case 4:
if ((end - *p) < 5)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
*len = ((size_t)(*p)[1] << 24) | ((size_t)(*p)[2] << 16) |
((size_t)(*p)[3] << 8) | (*p)[4];
(*p) += 5;
break;
default:
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
2018-11-08 00:05:02 +08:00
}
}
2021-05-14 17:00:46 +08:00
if (*len > (size_t)(end - *p))
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
return (0);
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_tag(unsigned char **p,
const unsigned char *end,
size_t *len, int tag) {
if ((end - *p) < 1)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if (**p != tag)
return (MBEDTLS_ERR_ASN1_UNEXPECTED_TAG);
2018-11-08 00:05:02 +08:00
(*p)++;
2021-05-14 17:00:46 +08:00
return (mbedtls_asn1_get_len(p, end, len));
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_bool(unsigned char **p,
const unsigned char *end,
int *val) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
size_t len;
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_BOOLEAN)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if (len != 1)
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
*val = (**p != 0) ? 1 : 0;
2018-11-08 00:05:02 +08:00
(*p)++;
2021-05-14 17:00:46 +08:00
return (0);
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
static int asn1_get_tagged_int(unsigned char **p,
const unsigned char *end,
int tag, int *val) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
size_t len;
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &len, tag)) != 0)
return (ret);
2021-05-14 15:53:00 +08:00
/*
* len==0 is malformed (0 must be represented as 020100 for INTEGER,
* or 0A0100 for ENUMERATED tags
*/
2021-05-14 17:00:46 +08:00
if (len == 0)
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
2021-05-14 15:53:00 +08:00
/* This is a cryptography library. Reject negative integers. */
2021-05-14 17:00:46 +08:00
if ((**p & 0x80) != 0)
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
2021-05-14 15:53:00 +08:00
/* Skip leading zeros. */
2021-05-14 17:00:46 +08:00
while (len > 0 && **p == 0) {
++(*p);
2021-05-14 15:53:00 +08:00
--len;
}
2018-11-08 00:05:02 +08:00
2021-05-14 15:53:00 +08:00
/* Reject integers that don't fit in an int. This code assumes that
* the int type has no padding bit. */
2021-05-14 17:00:46 +08:00
if (len > sizeof(int))
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
if (len == sizeof(int) && (**p & 0x80) != 0)
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
2018-11-08 00:05:02 +08:00
*val = 0;
2021-05-14 17:00:46 +08:00
while (len-- > 0) {
*val = (*val << 8) | **p;
2018-11-08 00:05:02 +08:00
(*p)++;
}
2021-05-14 17:00:46 +08:00
return (0);
2021-05-14 15:53:00 +08:00
}
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_int(unsigned char **p,
const unsigned char *end,
int *val) {
return (asn1_get_tagged_int(p, end, MBEDTLS_ASN1_INTEGER, val));
2021-05-14 15:53:00 +08:00
}
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_enum(unsigned char **p,
const unsigned char *end,
int *val) {
return (asn1_get_tagged_int(p, end, MBEDTLS_ASN1_ENUMERATED, val));
2018-11-08 00:05:02 +08:00
}
#if defined(MBEDTLS_BIGNUM_C)
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_mpi(unsigned char **p,
const unsigned char *end,
mbedtls_mpi *X) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
size_t len;
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &len, MBEDTLS_ASN1_INTEGER)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
ret = mbedtls_mpi_read_binary(X, *p, len);
2018-11-08 00:05:02 +08:00
*p += len;
2021-05-14 17:00:46 +08:00
return (ret);
2018-11-08 00:05:02 +08:00
}
#endif /* MBEDTLS_BIGNUM_C */
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_bitstring(unsigned char **p, const unsigned char *end,
mbedtls_asn1_bitstring *bs) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
/* Certificate type is a single byte bitstring */
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &bs->len, MBEDTLS_ASN1_BIT_STRING)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
/* Check length, subtract one for actual bit string length */
2021-05-14 17:00:46 +08:00
if (bs->len < 1)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
2018-11-08 00:05:02 +08:00
bs->len -= 1;
/* Get number of unused bits, ensure unused bits <= 7 */
bs->unused_bits = **p;
2021-05-14 17:00:46 +08:00
if (bs->unused_bits > 7)
return (MBEDTLS_ERR_ASN1_INVALID_LENGTH);
2018-11-08 00:05:02 +08:00
(*p)++;
/* Get actual bitstring */
bs->p = *p;
*p += bs->len;
2021-05-14 17:00:46 +08:00
if (*p != end)
return (MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
return (0);
2018-11-08 00:05:02 +08:00
}
/*
2021-05-14 15:53:00 +08:00
* Traverse an ASN.1 "SEQUENCE OF <tag>"
* and call a callback for each entry found.
2018-11-08 00:05:02 +08:00
*/
2021-05-14 15:53:00 +08:00
int mbedtls_asn1_traverse_sequence_of(
unsigned char **p,
const unsigned char *end,
unsigned char tag_must_mask, unsigned char tag_must_val,
unsigned char tag_may_mask, unsigned char tag_may_val,
2021-05-14 17:00:46 +08:00
int (*cb)(void *ctx, int tag,
unsigned char *start, size_t len),
void *ctx) {
2018-11-08 00:05:02 +08:00
int ret;
2021-05-14 15:53:00 +08:00
size_t len;
2018-11-08 00:05:02 +08:00
2021-05-14 15:53:00 +08:00
/* Get main sequence tag */
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &len,
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0) {
return (ret);
2021-05-14 15:53:00 +08:00
}
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if (*p + len != end)
return (MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
while (*p < end) {
2021-05-14 15:53:00 +08:00
unsigned char const tag = *(*p)++;
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((tag & tag_must_mask) != tag_must_val)
return (MBEDTLS_ERR_ASN1_UNEXPECTED_TAG);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_len(p, end, &len)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((tag & tag_may_mask) == tag_may_val) {
if (cb != NULL) {
ret = cb(ctx, tag, *p, len);
if (ret != 0)
return (ret);
2021-05-14 15:53:00 +08:00
}
}
2018-11-08 00:05:02 +08:00
2021-05-14 15:53:00 +08:00
*p += len;
}
2021-05-14 17:00:46 +08:00
return (0);
2021-05-14 15:53:00 +08:00
}
2018-11-08 00:05:02 +08:00
2021-05-14 15:53:00 +08:00
/*
* Get a bit string without unused bits
*/
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_bitstring_null(unsigned char **p, const unsigned char *end,
size_t *len) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, len, MBEDTLS_ASN1_BIT_STRING)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if (*len == 0)
return (MBEDTLS_ERR_ASN1_INVALID_DATA);
--(*len);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if (**p != 0)
return (MBEDTLS_ERR_ASN1_INVALID_DATA);
++(*p);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
return (0);
2021-05-14 15:53:00 +08:00
}
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
void mbedtls_asn1_sequence_free(mbedtls_asn1_sequence *seq) {
while (seq != NULL) {
2021-05-14 15:53:00 +08:00
mbedtls_asn1_sequence *next = seq->next;
2021-05-14 17:00:46 +08:00
mbedtls_platform_zeroize(seq, sizeof(*seq));
mbedtls_free(seq);
2021-05-14 15:53:00 +08:00
seq = next;
}
}
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
typedef struct {
2021-05-14 15:53:00 +08:00
int tag;
mbedtls_asn1_sequence *cur;
} asn1_get_sequence_of_cb_ctx_t;
2021-05-14 17:00:46 +08:00
static int asn1_get_sequence_of_cb(void *ctx,
int tag,
unsigned char *start,
size_t len) {
2021-05-14 15:53:00 +08:00
asn1_get_sequence_of_cb_ctx_t *cb_ctx =
(asn1_get_sequence_of_cb_ctx_t *) ctx;
mbedtls_asn1_sequence *cur =
cb_ctx->cur;
2021-05-14 17:00:46 +08:00
if (cur->buf.p != NULL) {
2021-05-14 15:53:00 +08:00
cur->next =
2021-05-14 17:00:46 +08:00
mbedtls_calloc(1, sizeof(mbedtls_asn1_sequence));
2021-05-14 15:53:00 +08:00
2021-05-14 17:00:46 +08:00
if (cur->next == NULL)
return (MBEDTLS_ERR_ASN1_ALLOC_FAILED);
2021-05-14 15:53:00 +08:00
cur = cur->next;
2018-11-08 00:05:02 +08:00
}
2021-05-14 15:53:00 +08:00
cur->buf.p = start;
cur->buf.len = len;
cur->buf.tag = tag;
2018-11-08 00:05:02 +08:00
2021-05-14 15:53:00 +08:00
cb_ctx->cur = cur;
2021-05-14 17:00:46 +08:00
return (0);
2021-05-14 15:53:00 +08:00
}
2018-11-08 00:05:02 +08:00
2021-05-14 15:53:00 +08:00
/*
* Parses and splits an ASN.1 "SEQUENCE OF <tag>"
*/
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_sequence_of(unsigned char **p,
const unsigned char *end,
mbedtls_asn1_sequence *cur,
int tag) {
2021-05-14 15:53:00 +08:00
asn1_get_sequence_of_cb_ctx_t cb_ctx = { tag, cur };
2021-05-14 17:00:46 +08:00
memset(cur, 0, sizeof(mbedtls_asn1_sequence));
return (mbedtls_asn1_traverse_sequence_of(
2021-05-14 15:53:00 +08:00
p, end, 0xFF, tag, 0, 0,
2021-05-14 17:00:46 +08:00
asn1_get_sequence_of_cb, &cb_ctx));
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_alg(unsigned char **p,
const unsigned char *end,
mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
size_t len;
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &len,
MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((end - *p) < 1)
return (MBEDTLS_ERR_ASN1_OUT_OF_DATA);
2018-11-08 00:05:02 +08:00
alg->tag = **p;
end = *p + len;
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_tag(p, end, &alg->len, MBEDTLS_ASN1_OID)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
alg->p = *p;
*p += alg->len;
2021-05-14 17:00:46 +08:00
if (*p == end) {
mbedtls_platform_zeroize(params, sizeof(mbedtls_asn1_buf));
return (0);
2018-11-08 00:05:02 +08:00
}
params->tag = **p;
(*p)++;
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_len(p, end, &params->len)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
params->p = *p;
*p += params->len;
2021-05-14 17:00:46 +08:00
if (*p != end)
return (MBEDTLS_ERR_ASN1_LENGTH_MISMATCH);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
return (0);
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
int mbedtls_asn1_get_alg_null(unsigned char **p,
const unsigned char *end,
mbedtls_asn1_buf *alg) {
2021-05-14 15:53:00 +08:00
int ret = MBEDTLS_ERR_ERROR_CORRUPTION_DETECTED;
2018-11-08 00:05:02 +08:00
mbedtls_asn1_buf params;
2021-05-14 17:00:46 +08:00
memset(&params, 0, sizeof(mbedtls_asn1_buf));
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((ret = mbedtls_asn1_get_alg(p, end, alg, &params)) != 0)
return (ret);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
if ((params.tag != MBEDTLS_ASN1_NULL && params.tag != 0) || params.len != 0)
return (MBEDTLS_ERR_ASN1_INVALID_DATA);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
return (0);
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
void mbedtls_asn1_free_named_data(mbedtls_asn1_named_data *cur) {
if (cur == NULL)
2018-11-08 00:05:02 +08:00
return;
2021-05-14 17:00:46 +08:00
mbedtls_free(cur->oid.p);
mbedtls_free(cur->val.p);
2018-11-08 00:05:02 +08:00
2021-05-14 17:00:46 +08:00
mbedtls_platform_zeroize(cur, sizeof(mbedtls_asn1_named_data));
2018-11-08 00:05:02 +08:00
}
2021-05-14 17:00:46 +08:00
void mbedtls_asn1_free_named_data_list(mbedtls_asn1_named_data **head) {
2018-11-08 00:05:02 +08:00
mbedtls_asn1_named_data *cur;
2021-05-14 17:00:46 +08:00
while ((cur = *head) != NULL) {
2018-11-08 00:05:02 +08:00
*head = cur->next;
2021-05-14 17:00:46 +08:00
mbedtls_asn1_free_named_data(cur);
mbedtls_free(cur);
2018-11-08 00:05:02 +08:00
}
}
2021-05-14 17:00:46 +08:00
mbedtls_asn1_named_data *mbedtls_asn1_find_named_data(mbedtls_asn1_named_data *list,
const char *oid, size_t len) {
while (list != NULL) {
if (list->oid.len == len &&
memcmp(list->oid.p, oid, len) == 0) {
2018-11-08 00:05:02 +08:00
break;
}
list = list->next;
}
2021-05-14 17:00:46 +08:00
return (list);
2018-11-08 00:05:02 +08:00
}
#endif /* MBEDTLS_ASN1_PARSE_C */