I added functionality to get the RSSI, BER, and Cell Neighbor for reporting connection issues to M2X
Dependencies: WncControllerK64F
mbedtls/source/x509.c@16:8a4105d407d3, 2016-11-14 (annotated)
- Committer:
- JMF
- Date:
- Mon Nov 14 21:15:42 2016 +0000
- Revision:
- 16:8a4105d407d3
- Parent:
- 12:0071cb144c7a
updated to ensure it builds with TLS by correcting config defaults.
Who changed what in which revision?
User | Revision | Line number | New contents of line |
---|---|---|---|
JMF | 12:0071cb144c7a | 1 | /* |
JMF | 12:0071cb144c7a | 2 | * X.509 common functions for parsing and verification |
JMF | 12:0071cb144c7a | 3 | * |
JMF | 12:0071cb144c7a | 4 | * Copyright (C) 2006-2015, ARM Limited, All Rights Reserved |
JMF | 12:0071cb144c7a | 5 | * SPDX-License-Identifier: Apache-2.0 |
JMF | 12:0071cb144c7a | 6 | * |
JMF | 12:0071cb144c7a | 7 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
JMF | 12:0071cb144c7a | 8 | * not use this file except in compliance with the License. |
JMF | 12:0071cb144c7a | 9 | * You may obtain a copy of the License at |
JMF | 12:0071cb144c7a | 10 | * |
JMF | 12:0071cb144c7a | 11 | * http://www.apache.org/licenses/LICENSE-2.0 |
JMF | 12:0071cb144c7a | 12 | * |
JMF | 12:0071cb144c7a | 13 | * Unless required by applicable law or agreed to in writing, software |
JMF | 12:0071cb144c7a | 14 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
JMF | 12:0071cb144c7a | 15 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
JMF | 12:0071cb144c7a | 16 | * See the License for the specific language governing permissions and |
JMF | 12:0071cb144c7a | 17 | * limitations under the License. |
JMF | 12:0071cb144c7a | 18 | * |
JMF | 12:0071cb144c7a | 19 | * This file is part of mbed TLS (https://tls.mbed.org) |
JMF | 12:0071cb144c7a | 20 | */ |
JMF | 12:0071cb144c7a | 21 | /* |
JMF | 12:0071cb144c7a | 22 | * The ITU-T X.509 standard defines a certificate format for PKI. |
JMF | 12:0071cb144c7a | 23 | * |
JMF | 12:0071cb144c7a | 24 | * http://www.ietf.org/rfc/rfc5280.txt (Certificates and CRLs) |
JMF | 12:0071cb144c7a | 25 | * http://www.ietf.org/rfc/rfc3279.txt (Alg IDs for CRLs) |
JMF | 12:0071cb144c7a | 26 | * http://www.ietf.org/rfc/rfc2986.txt (CSRs, aka PKCS#10) |
JMF | 12:0071cb144c7a | 27 | * |
JMF | 12:0071cb144c7a | 28 | * http://www.itu.int/ITU-T/studygroups/com17/languages/X.680-0207.pdf |
JMF | 12:0071cb144c7a | 29 | * http://www.itu.int/ITU-T/studygroups/com17/languages/X.690-0207.pdf |
JMF | 12:0071cb144c7a | 30 | */ |
JMF | 12:0071cb144c7a | 31 | |
JMF | 12:0071cb144c7a | 32 | #if !defined(MBEDTLS_CONFIG_FILE) |
JMF | 12:0071cb144c7a | 33 | #include "mbedtls/config.h" |
JMF | 12:0071cb144c7a | 34 | #else |
JMF | 12:0071cb144c7a | 35 | #include MBEDTLS_CONFIG_FILE |
JMF | 12:0071cb144c7a | 36 | #endif |
JMF | 12:0071cb144c7a | 37 | |
JMF | 12:0071cb144c7a | 38 | #if defined(MBEDTLS_X509_USE_C) |
JMF | 12:0071cb144c7a | 39 | |
JMF | 12:0071cb144c7a | 40 | #include "mbedtls/x509.h" |
JMF | 12:0071cb144c7a | 41 | #include "mbedtls/asn1.h" |
JMF | 12:0071cb144c7a | 42 | #include "mbedtls/oid.h" |
JMF | 12:0071cb144c7a | 43 | |
JMF | 12:0071cb144c7a | 44 | #include <stdio.h> |
JMF | 12:0071cb144c7a | 45 | #include <string.h> |
JMF | 12:0071cb144c7a | 46 | |
JMF | 12:0071cb144c7a | 47 | #if defined(MBEDTLS_PEM_PARSE_C) |
JMF | 12:0071cb144c7a | 48 | #include "mbedtls/pem.h" |
JMF | 12:0071cb144c7a | 49 | #endif |
JMF | 12:0071cb144c7a | 50 | |
JMF | 12:0071cb144c7a | 51 | #if defined(MBEDTLS_PLATFORM_C) |
JMF | 12:0071cb144c7a | 52 | #include "mbedtls/platform.h" |
JMF | 12:0071cb144c7a | 53 | #else |
JMF | 12:0071cb144c7a | 54 | #include <stdio.h> |
JMF | 12:0071cb144c7a | 55 | #include <stdlib.h> |
JMF | 12:0071cb144c7a | 56 | #define mbedtls_free free |
JMF | 12:0071cb144c7a | 57 | #define mbedtls_calloc calloc |
JMF | 12:0071cb144c7a | 58 | #define mbedtls_printf printf |
JMF | 12:0071cb144c7a | 59 | #define mbedtls_snprintf snprintf |
JMF | 12:0071cb144c7a | 60 | #endif |
JMF | 12:0071cb144c7a | 61 | |
JMF | 12:0071cb144c7a | 62 | |
JMF | 12:0071cb144c7a | 63 | #if defined(MBEDTLS_HAVE_TIME) |
JMF | 12:0071cb144c7a | 64 | #include "mbedtls/platform_time.h" |
JMF | 12:0071cb144c7a | 65 | #endif |
JMF | 12:0071cb144c7a | 66 | |
JMF | 12:0071cb144c7a | 67 | #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) |
JMF | 12:0071cb144c7a | 68 | #include <windows.h> |
JMF | 12:0071cb144c7a | 69 | #else |
JMF | 12:0071cb144c7a | 70 | #include <time.h> |
JMF | 12:0071cb144c7a | 71 | #endif |
JMF | 12:0071cb144c7a | 72 | |
JMF | 12:0071cb144c7a | 73 | #if defined(MBEDTLS_FS_IO) |
JMF | 12:0071cb144c7a | 74 | #include <stdio.h> |
JMF | 12:0071cb144c7a | 75 | #if !defined(_WIN32) |
JMF | 12:0071cb144c7a | 76 | #include <sys/types.h> |
JMF | 12:0071cb144c7a | 77 | #include <sys/stat.h> |
JMF | 12:0071cb144c7a | 78 | #include <dirent.h> |
JMF | 12:0071cb144c7a | 79 | #endif |
JMF | 12:0071cb144c7a | 80 | #endif |
JMF | 12:0071cb144c7a | 81 | |
JMF | 12:0071cb144c7a | 82 | #define CHECK(code) if( ( ret = code ) != 0 ){ return( ret ); } |
JMF | 12:0071cb144c7a | 83 | |
JMF | 12:0071cb144c7a | 84 | /* |
JMF | 12:0071cb144c7a | 85 | * CertificateSerialNumber ::= INTEGER |
JMF | 12:0071cb144c7a | 86 | */ |
JMF | 12:0071cb144c7a | 87 | int mbedtls_x509_get_serial( unsigned char **p, const unsigned char *end, |
JMF | 12:0071cb144c7a | 88 | mbedtls_x509_buf *serial ) |
JMF | 12:0071cb144c7a | 89 | { |
JMF | 12:0071cb144c7a | 90 | int ret; |
JMF | 12:0071cb144c7a | 91 | |
JMF | 12:0071cb144c7a | 92 | if( ( end - *p ) < 1 ) |
JMF | 12:0071cb144c7a | 93 | return( MBEDTLS_ERR_X509_INVALID_SERIAL + |
JMF | 12:0071cb144c7a | 94 | MBEDTLS_ERR_ASN1_OUT_OF_DATA ); |
JMF | 12:0071cb144c7a | 95 | |
JMF | 12:0071cb144c7a | 96 | if( **p != ( MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_PRIMITIVE | 2 ) && |
JMF | 12:0071cb144c7a | 97 | **p != MBEDTLS_ASN1_INTEGER ) |
JMF | 12:0071cb144c7a | 98 | return( MBEDTLS_ERR_X509_INVALID_SERIAL + |
JMF | 12:0071cb144c7a | 99 | MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ); |
JMF | 12:0071cb144c7a | 100 | |
JMF | 12:0071cb144c7a | 101 | serial->tag = *(*p)++; |
JMF | 12:0071cb144c7a | 102 | |
JMF | 12:0071cb144c7a | 103 | if( ( ret = mbedtls_asn1_get_len( p, end, &serial->len ) ) != 0 ) |
JMF | 12:0071cb144c7a | 104 | return( MBEDTLS_ERR_X509_INVALID_SERIAL + ret ); |
JMF | 12:0071cb144c7a | 105 | |
JMF | 12:0071cb144c7a | 106 | serial->p = *p; |
JMF | 12:0071cb144c7a | 107 | *p += serial->len; |
JMF | 12:0071cb144c7a | 108 | |
JMF | 12:0071cb144c7a | 109 | return( 0 ); |
JMF | 12:0071cb144c7a | 110 | } |
JMF | 12:0071cb144c7a | 111 | |
JMF | 12:0071cb144c7a | 112 | /* Get an algorithm identifier without parameters (eg for signatures) |
JMF | 12:0071cb144c7a | 113 | * |
JMF | 12:0071cb144c7a | 114 | * AlgorithmIdentifier ::= SEQUENCE { |
JMF | 12:0071cb144c7a | 115 | * algorithm OBJECT IDENTIFIER, |
JMF | 12:0071cb144c7a | 116 | * parameters ANY DEFINED BY algorithm OPTIONAL } |
JMF | 12:0071cb144c7a | 117 | */ |
JMF | 12:0071cb144c7a | 118 | int mbedtls_x509_get_alg_null( unsigned char **p, const unsigned char *end, |
JMF | 12:0071cb144c7a | 119 | mbedtls_x509_buf *alg ) |
JMF | 12:0071cb144c7a | 120 | { |
JMF | 12:0071cb144c7a | 121 | int ret; |
JMF | 12:0071cb144c7a | 122 | |
JMF | 12:0071cb144c7a | 123 | if( ( ret = mbedtls_asn1_get_alg_null( p, end, alg ) ) != 0 ) |
JMF | 12:0071cb144c7a | 124 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 125 | |
JMF | 12:0071cb144c7a | 126 | return( 0 ); |
JMF | 12:0071cb144c7a | 127 | } |
JMF | 12:0071cb144c7a | 128 | |
JMF | 12:0071cb144c7a | 129 | /* |
JMF | 12:0071cb144c7a | 130 | * Parse an algorithm identifier with (optional) paramaters |
JMF | 12:0071cb144c7a | 131 | */ |
JMF | 12:0071cb144c7a | 132 | int mbedtls_x509_get_alg( unsigned char **p, const unsigned char *end, |
JMF | 12:0071cb144c7a | 133 | mbedtls_x509_buf *alg, mbedtls_x509_buf *params ) |
JMF | 12:0071cb144c7a | 134 | { |
JMF | 12:0071cb144c7a | 135 | int ret; |
JMF | 12:0071cb144c7a | 136 | |
JMF | 12:0071cb144c7a | 137 | if( ( ret = mbedtls_asn1_get_alg( p, end, alg, params ) ) != 0 ) |
JMF | 12:0071cb144c7a | 138 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 139 | |
JMF | 12:0071cb144c7a | 140 | return( 0 ); |
JMF | 12:0071cb144c7a | 141 | } |
JMF | 12:0071cb144c7a | 142 | |
JMF | 12:0071cb144c7a | 143 | #if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT) |
JMF | 12:0071cb144c7a | 144 | /* |
JMF | 12:0071cb144c7a | 145 | * HashAlgorithm ::= AlgorithmIdentifier |
JMF | 12:0071cb144c7a | 146 | * |
JMF | 12:0071cb144c7a | 147 | * AlgorithmIdentifier ::= SEQUENCE { |
JMF | 12:0071cb144c7a | 148 | * algorithm OBJECT IDENTIFIER, |
JMF | 12:0071cb144c7a | 149 | * parameters ANY DEFINED BY algorithm OPTIONAL } |
JMF | 12:0071cb144c7a | 150 | * |
JMF | 12:0071cb144c7a | 151 | * For HashAlgorithm, parameters MUST be NULL or absent. |
JMF | 12:0071cb144c7a | 152 | */ |
JMF | 12:0071cb144c7a | 153 | static int x509_get_hash_alg( const mbedtls_x509_buf *alg, mbedtls_md_type_t *md_alg ) |
JMF | 12:0071cb144c7a | 154 | { |
JMF | 12:0071cb144c7a | 155 | int ret; |
JMF | 12:0071cb144c7a | 156 | unsigned char *p; |
JMF | 12:0071cb144c7a | 157 | const unsigned char *end; |
JMF | 12:0071cb144c7a | 158 | mbedtls_x509_buf md_oid; |
JMF | 12:0071cb144c7a | 159 | size_t len; |
JMF | 12:0071cb144c7a | 160 | |
JMF | 12:0071cb144c7a | 161 | /* Make sure we got a SEQUENCE and setup bounds */ |
JMF | 12:0071cb144c7a | 162 | if( alg->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) |
JMF | 12:0071cb144c7a | 163 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 164 | MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ); |
JMF | 12:0071cb144c7a | 165 | |
JMF | 12:0071cb144c7a | 166 | p = (unsigned char *) alg->p; |
JMF | 12:0071cb144c7a | 167 | end = p + alg->len; |
JMF | 12:0071cb144c7a | 168 | |
JMF | 12:0071cb144c7a | 169 | if( p >= end ) |
JMF | 12:0071cb144c7a | 170 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 171 | MBEDTLS_ERR_ASN1_OUT_OF_DATA ); |
JMF | 12:0071cb144c7a | 172 | |
JMF | 12:0071cb144c7a | 173 | /* Parse md_oid */ |
JMF | 12:0071cb144c7a | 174 | md_oid.tag = *p; |
JMF | 12:0071cb144c7a | 175 | |
JMF | 12:0071cb144c7a | 176 | if( ( ret = mbedtls_asn1_get_tag( &p, end, &md_oid.len, MBEDTLS_ASN1_OID ) ) != 0 ) |
JMF | 12:0071cb144c7a | 177 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 178 | |
JMF | 12:0071cb144c7a | 179 | md_oid.p = p; |
JMF | 12:0071cb144c7a | 180 | p += md_oid.len; |
JMF | 12:0071cb144c7a | 181 | |
JMF | 12:0071cb144c7a | 182 | /* Get md_alg from md_oid */ |
JMF | 12:0071cb144c7a | 183 | if( ( ret = mbedtls_oid_get_md_alg( &md_oid, md_alg ) ) != 0 ) |
JMF | 12:0071cb144c7a | 184 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 185 | |
JMF | 12:0071cb144c7a | 186 | /* Make sure params is absent of NULL */ |
JMF | 12:0071cb144c7a | 187 | if( p == end ) |
JMF | 12:0071cb144c7a | 188 | return( 0 ); |
JMF | 12:0071cb144c7a | 189 | |
JMF | 12:0071cb144c7a | 190 | if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, MBEDTLS_ASN1_NULL ) ) != 0 || len != 0 ) |
JMF | 12:0071cb144c7a | 191 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 192 | |
JMF | 12:0071cb144c7a | 193 | if( p != end ) |
JMF | 12:0071cb144c7a | 194 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 195 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 196 | |
JMF | 12:0071cb144c7a | 197 | return( 0 ); |
JMF | 12:0071cb144c7a | 198 | } |
JMF | 12:0071cb144c7a | 199 | |
JMF | 12:0071cb144c7a | 200 | /* |
JMF | 12:0071cb144c7a | 201 | * RSASSA-PSS-params ::= SEQUENCE { |
JMF | 12:0071cb144c7a | 202 | * hashAlgorithm [0] HashAlgorithm DEFAULT sha1Identifier, |
JMF | 12:0071cb144c7a | 203 | * maskGenAlgorithm [1] MaskGenAlgorithm DEFAULT mgf1SHA1Identifier, |
JMF | 12:0071cb144c7a | 204 | * saltLength [2] INTEGER DEFAULT 20, |
JMF | 12:0071cb144c7a | 205 | * trailerField [3] INTEGER DEFAULT 1 } |
JMF | 12:0071cb144c7a | 206 | * -- Note that the tags in this Sequence are explicit. |
JMF | 12:0071cb144c7a | 207 | * |
JMF | 12:0071cb144c7a | 208 | * RFC 4055 (which defines use of RSASSA-PSS in PKIX) states that the value |
JMF | 12:0071cb144c7a | 209 | * of trailerField MUST be 1, and PKCS#1 v2.2 doesn't even define any other |
JMF | 12:0071cb144c7a | 210 | * option. Enfore this at parsing time. |
JMF | 12:0071cb144c7a | 211 | */ |
JMF | 12:0071cb144c7a | 212 | int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params, |
JMF | 12:0071cb144c7a | 213 | mbedtls_md_type_t *md_alg, mbedtls_md_type_t *mgf_md, |
JMF | 12:0071cb144c7a | 214 | int *salt_len ) |
JMF | 12:0071cb144c7a | 215 | { |
JMF | 12:0071cb144c7a | 216 | int ret; |
JMF | 12:0071cb144c7a | 217 | unsigned char *p; |
JMF | 12:0071cb144c7a | 218 | const unsigned char *end, *end2; |
JMF | 12:0071cb144c7a | 219 | size_t len; |
JMF | 12:0071cb144c7a | 220 | mbedtls_x509_buf alg_id, alg_params; |
JMF | 12:0071cb144c7a | 221 | |
JMF | 12:0071cb144c7a | 222 | /* First set everything to defaults */ |
JMF | 12:0071cb144c7a | 223 | *md_alg = MBEDTLS_MD_SHA1; |
JMF | 12:0071cb144c7a | 224 | *mgf_md = MBEDTLS_MD_SHA1; |
JMF | 12:0071cb144c7a | 225 | *salt_len = 20; |
JMF | 12:0071cb144c7a | 226 | |
JMF | 12:0071cb144c7a | 227 | /* Make sure params is a SEQUENCE and setup bounds */ |
JMF | 12:0071cb144c7a | 228 | if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) |
JMF | 12:0071cb144c7a | 229 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 230 | MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ); |
JMF | 12:0071cb144c7a | 231 | |
JMF | 12:0071cb144c7a | 232 | p = (unsigned char *) params->p; |
JMF | 12:0071cb144c7a | 233 | end = p + params->len; |
JMF | 12:0071cb144c7a | 234 | |
JMF | 12:0071cb144c7a | 235 | if( p == end ) |
JMF | 12:0071cb144c7a | 236 | return( 0 ); |
JMF | 12:0071cb144c7a | 237 | |
JMF | 12:0071cb144c7a | 238 | /* |
JMF | 12:0071cb144c7a | 239 | * HashAlgorithm |
JMF | 12:0071cb144c7a | 240 | */ |
JMF | 12:0071cb144c7a | 241 | if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, |
JMF | 12:0071cb144c7a | 242 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 0 ) ) == 0 ) |
JMF | 12:0071cb144c7a | 243 | { |
JMF | 12:0071cb144c7a | 244 | end2 = p + len; |
JMF | 12:0071cb144c7a | 245 | |
JMF | 12:0071cb144c7a | 246 | /* HashAlgorithm ::= AlgorithmIdentifier (without parameters) */ |
JMF | 12:0071cb144c7a | 247 | if( ( ret = mbedtls_x509_get_alg_null( &p, end2, &alg_id ) ) != 0 ) |
JMF | 12:0071cb144c7a | 248 | return( ret ); |
JMF | 12:0071cb144c7a | 249 | |
JMF | 12:0071cb144c7a | 250 | if( ( ret = mbedtls_oid_get_md_alg( &alg_id, md_alg ) ) != 0 ) |
JMF | 12:0071cb144c7a | 251 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 252 | |
JMF | 12:0071cb144c7a | 253 | if( p != end2 ) |
JMF | 12:0071cb144c7a | 254 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 255 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 256 | } |
JMF | 12:0071cb144c7a | 257 | else if( ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ) |
JMF | 12:0071cb144c7a | 258 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 259 | |
JMF | 12:0071cb144c7a | 260 | if( p == end ) |
JMF | 12:0071cb144c7a | 261 | return( 0 ); |
JMF | 12:0071cb144c7a | 262 | |
JMF | 12:0071cb144c7a | 263 | /* |
JMF | 12:0071cb144c7a | 264 | * MaskGenAlgorithm |
JMF | 12:0071cb144c7a | 265 | */ |
JMF | 12:0071cb144c7a | 266 | if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, |
JMF | 12:0071cb144c7a | 267 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 1 ) ) == 0 ) |
JMF | 12:0071cb144c7a | 268 | { |
JMF | 12:0071cb144c7a | 269 | end2 = p + len; |
JMF | 12:0071cb144c7a | 270 | |
JMF | 12:0071cb144c7a | 271 | /* MaskGenAlgorithm ::= AlgorithmIdentifier (params = HashAlgorithm) */ |
JMF | 12:0071cb144c7a | 272 | if( ( ret = mbedtls_x509_get_alg( &p, end2, &alg_id, &alg_params ) ) != 0 ) |
JMF | 12:0071cb144c7a | 273 | return( ret ); |
JMF | 12:0071cb144c7a | 274 | |
JMF | 12:0071cb144c7a | 275 | /* Only MFG1 is recognised for now */ |
JMF | 12:0071cb144c7a | 276 | if( MBEDTLS_OID_CMP( MBEDTLS_OID_MGF1, &alg_id ) != 0 ) |
JMF | 12:0071cb144c7a | 277 | return( MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE + |
JMF | 12:0071cb144c7a | 278 | MBEDTLS_ERR_OID_NOT_FOUND ); |
JMF | 12:0071cb144c7a | 279 | |
JMF | 12:0071cb144c7a | 280 | /* Parse HashAlgorithm */ |
JMF | 12:0071cb144c7a | 281 | if( ( ret = x509_get_hash_alg( &alg_params, mgf_md ) ) != 0 ) |
JMF | 12:0071cb144c7a | 282 | return( ret ); |
JMF | 12:0071cb144c7a | 283 | |
JMF | 12:0071cb144c7a | 284 | if( p != end2 ) |
JMF | 12:0071cb144c7a | 285 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 286 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 287 | } |
JMF | 12:0071cb144c7a | 288 | else if( ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ) |
JMF | 12:0071cb144c7a | 289 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 290 | |
JMF | 12:0071cb144c7a | 291 | if( p == end ) |
JMF | 12:0071cb144c7a | 292 | return( 0 ); |
JMF | 12:0071cb144c7a | 293 | |
JMF | 12:0071cb144c7a | 294 | /* |
JMF | 12:0071cb144c7a | 295 | * salt_len |
JMF | 12:0071cb144c7a | 296 | */ |
JMF | 12:0071cb144c7a | 297 | if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, |
JMF | 12:0071cb144c7a | 298 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 2 ) ) == 0 ) |
JMF | 12:0071cb144c7a | 299 | { |
JMF | 12:0071cb144c7a | 300 | end2 = p + len; |
JMF | 12:0071cb144c7a | 301 | |
JMF | 12:0071cb144c7a | 302 | if( ( ret = mbedtls_asn1_get_int( &p, end2, salt_len ) ) != 0 ) |
JMF | 12:0071cb144c7a | 303 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 304 | |
JMF | 12:0071cb144c7a | 305 | if( p != end2 ) |
JMF | 12:0071cb144c7a | 306 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 307 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 308 | } |
JMF | 12:0071cb144c7a | 309 | else if( ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ) |
JMF | 12:0071cb144c7a | 310 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 311 | |
JMF | 12:0071cb144c7a | 312 | if( p == end ) |
JMF | 12:0071cb144c7a | 313 | return( 0 ); |
JMF | 12:0071cb144c7a | 314 | |
JMF | 12:0071cb144c7a | 315 | /* |
JMF | 12:0071cb144c7a | 316 | * trailer_field (if present, must be 1) |
JMF | 12:0071cb144c7a | 317 | */ |
JMF | 12:0071cb144c7a | 318 | if( ( ret = mbedtls_asn1_get_tag( &p, end, &len, |
JMF | 12:0071cb144c7a | 319 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | 3 ) ) == 0 ) |
JMF | 12:0071cb144c7a | 320 | { |
JMF | 12:0071cb144c7a | 321 | int trailer_field; |
JMF | 12:0071cb144c7a | 322 | |
JMF | 12:0071cb144c7a | 323 | end2 = p + len; |
JMF | 12:0071cb144c7a | 324 | |
JMF | 12:0071cb144c7a | 325 | if( ( ret = mbedtls_asn1_get_int( &p, end2, &trailer_field ) ) != 0 ) |
JMF | 12:0071cb144c7a | 326 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 327 | |
JMF | 12:0071cb144c7a | 328 | if( p != end2 ) |
JMF | 12:0071cb144c7a | 329 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 330 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 331 | |
JMF | 12:0071cb144c7a | 332 | if( trailer_field != 1 ) |
JMF | 12:0071cb144c7a | 333 | return( MBEDTLS_ERR_X509_INVALID_ALG ); |
JMF | 12:0071cb144c7a | 334 | } |
JMF | 12:0071cb144c7a | 335 | else if( ret != MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ) |
JMF | 12:0071cb144c7a | 336 | return( MBEDTLS_ERR_X509_INVALID_ALG + ret ); |
JMF | 12:0071cb144c7a | 337 | |
JMF | 12:0071cb144c7a | 338 | if( p != end ) |
JMF | 12:0071cb144c7a | 339 | return( MBEDTLS_ERR_X509_INVALID_ALG + |
JMF | 12:0071cb144c7a | 340 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 341 | |
JMF | 12:0071cb144c7a | 342 | return( 0 ); |
JMF | 12:0071cb144c7a | 343 | } |
JMF | 12:0071cb144c7a | 344 | #endif /* MBEDTLS_X509_RSASSA_PSS_SUPPORT */ |
JMF | 12:0071cb144c7a | 345 | |
JMF | 12:0071cb144c7a | 346 | /* |
JMF | 12:0071cb144c7a | 347 | * AttributeTypeAndValue ::= SEQUENCE { |
JMF | 12:0071cb144c7a | 348 | * type AttributeType, |
JMF | 12:0071cb144c7a | 349 | * value AttributeValue } |
JMF | 12:0071cb144c7a | 350 | * |
JMF | 12:0071cb144c7a | 351 | * AttributeType ::= OBJECT IDENTIFIER |
JMF | 12:0071cb144c7a | 352 | * |
JMF | 12:0071cb144c7a | 353 | * AttributeValue ::= ANY DEFINED BY AttributeType |
JMF | 12:0071cb144c7a | 354 | */ |
JMF | 12:0071cb144c7a | 355 | static int x509_get_attr_type_value( unsigned char **p, |
JMF | 12:0071cb144c7a | 356 | const unsigned char *end, |
JMF | 12:0071cb144c7a | 357 | mbedtls_x509_name *cur ) |
JMF | 12:0071cb144c7a | 358 | { |
JMF | 12:0071cb144c7a | 359 | int ret; |
JMF | 12:0071cb144c7a | 360 | size_t len; |
JMF | 12:0071cb144c7a | 361 | mbedtls_x509_buf *oid; |
JMF | 12:0071cb144c7a | 362 | mbedtls_x509_buf *val; |
JMF | 12:0071cb144c7a | 363 | |
JMF | 12:0071cb144c7a | 364 | if( ( ret = mbedtls_asn1_get_tag( p, end, &len, |
JMF | 12:0071cb144c7a | 365 | MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 ) |
JMF | 12:0071cb144c7a | 366 | return( MBEDTLS_ERR_X509_INVALID_NAME + ret ); |
JMF | 12:0071cb144c7a | 367 | |
JMF | 12:0071cb144c7a | 368 | if( ( end - *p ) < 1 ) |
JMF | 12:0071cb144c7a | 369 | return( MBEDTLS_ERR_X509_INVALID_NAME + |
JMF | 12:0071cb144c7a | 370 | MBEDTLS_ERR_ASN1_OUT_OF_DATA ); |
JMF | 12:0071cb144c7a | 371 | |
JMF | 12:0071cb144c7a | 372 | oid = &cur->oid; |
JMF | 12:0071cb144c7a | 373 | oid->tag = **p; |
JMF | 12:0071cb144c7a | 374 | |
JMF | 12:0071cb144c7a | 375 | if( ( ret = mbedtls_asn1_get_tag( p, end, &oid->len, MBEDTLS_ASN1_OID ) ) != 0 ) |
JMF | 12:0071cb144c7a | 376 | return( MBEDTLS_ERR_X509_INVALID_NAME + ret ); |
JMF | 12:0071cb144c7a | 377 | |
JMF | 12:0071cb144c7a | 378 | oid->p = *p; |
JMF | 12:0071cb144c7a | 379 | *p += oid->len; |
JMF | 12:0071cb144c7a | 380 | |
JMF | 12:0071cb144c7a | 381 | if( ( end - *p ) < 1 ) |
JMF | 12:0071cb144c7a | 382 | return( MBEDTLS_ERR_X509_INVALID_NAME + |
JMF | 12:0071cb144c7a | 383 | MBEDTLS_ERR_ASN1_OUT_OF_DATA ); |
JMF | 12:0071cb144c7a | 384 | |
JMF | 12:0071cb144c7a | 385 | if( **p != MBEDTLS_ASN1_BMP_STRING && **p != MBEDTLS_ASN1_UTF8_STRING && |
JMF | 12:0071cb144c7a | 386 | **p != MBEDTLS_ASN1_T61_STRING && **p != MBEDTLS_ASN1_PRINTABLE_STRING && |
JMF | 12:0071cb144c7a | 387 | **p != MBEDTLS_ASN1_IA5_STRING && **p != MBEDTLS_ASN1_UNIVERSAL_STRING && |
JMF | 12:0071cb144c7a | 388 | **p != MBEDTLS_ASN1_BIT_STRING ) |
JMF | 12:0071cb144c7a | 389 | return( MBEDTLS_ERR_X509_INVALID_NAME + |
JMF | 12:0071cb144c7a | 390 | MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ); |
JMF | 12:0071cb144c7a | 391 | |
JMF | 12:0071cb144c7a | 392 | val = &cur->val; |
JMF | 12:0071cb144c7a | 393 | val->tag = *(*p)++; |
JMF | 12:0071cb144c7a | 394 | |
JMF | 12:0071cb144c7a | 395 | if( ( ret = mbedtls_asn1_get_len( p, end, &val->len ) ) != 0 ) |
JMF | 12:0071cb144c7a | 396 | return( MBEDTLS_ERR_X509_INVALID_NAME + ret ); |
JMF | 12:0071cb144c7a | 397 | |
JMF | 12:0071cb144c7a | 398 | val->p = *p; |
JMF | 12:0071cb144c7a | 399 | *p += val->len; |
JMF | 12:0071cb144c7a | 400 | |
JMF | 12:0071cb144c7a | 401 | cur->next = NULL; |
JMF | 12:0071cb144c7a | 402 | |
JMF | 12:0071cb144c7a | 403 | return( 0 ); |
JMF | 12:0071cb144c7a | 404 | } |
JMF | 12:0071cb144c7a | 405 | |
JMF | 12:0071cb144c7a | 406 | /* |
JMF | 12:0071cb144c7a | 407 | * Name ::= CHOICE { -- only one possibility for now -- |
JMF | 12:0071cb144c7a | 408 | * rdnSequence RDNSequence } |
JMF | 12:0071cb144c7a | 409 | * |
JMF | 12:0071cb144c7a | 410 | * RDNSequence ::= SEQUENCE OF RelativeDistinguishedName |
JMF | 12:0071cb144c7a | 411 | * |
JMF | 12:0071cb144c7a | 412 | * RelativeDistinguishedName ::= |
JMF | 12:0071cb144c7a | 413 | * SET OF AttributeTypeAndValue |
JMF | 12:0071cb144c7a | 414 | * |
JMF | 12:0071cb144c7a | 415 | * AttributeTypeAndValue ::= SEQUENCE { |
JMF | 12:0071cb144c7a | 416 | * type AttributeType, |
JMF | 12:0071cb144c7a | 417 | * value AttributeValue } |
JMF | 12:0071cb144c7a | 418 | * |
JMF | 12:0071cb144c7a | 419 | * AttributeType ::= OBJECT IDENTIFIER |
JMF | 12:0071cb144c7a | 420 | * |
JMF | 12:0071cb144c7a | 421 | * AttributeValue ::= ANY DEFINED BY AttributeType |
JMF | 12:0071cb144c7a | 422 | * |
JMF | 12:0071cb144c7a | 423 | * The data structure is optimized for the common case where each RDN has only |
JMF | 12:0071cb144c7a | 424 | * one element, which is represented as a list of AttributeTypeAndValue. |
JMF | 12:0071cb144c7a | 425 | * For the general case we still use a flat list, but we mark elements of the |
JMF | 12:0071cb144c7a | 426 | * same set so that they are "merged" together in the functions that consume |
JMF | 12:0071cb144c7a | 427 | * this list, eg mbedtls_x509_dn_gets(). |
JMF | 12:0071cb144c7a | 428 | */ |
JMF | 12:0071cb144c7a | 429 | int mbedtls_x509_get_name( unsigned char **p, const unsigned char *end, |
JMF | 12:0071cb144c7a | 430 | mbedtls_x509_name *cur ) |
JMF | 12:0071cb144c7a | 431 | { |
JMF | 12:0071cb144c7a | 432 | int ret; |
JMF | 12:0071cb144c7a | 433 | size_t set_len; |
JMF | 12:0071cb144c7a | 434 | const unsigned char *end_set; |
JMF | 12:0071cb144c7a | 435 | |
JMF | 12:0071cb144c7a | 436 | /* don't use recursion, we'd risk stack overflow if not optimized */ |
JMF | 12:0071cb144c7a | 437 | while( 1 ) |
JMF | 12:0071cb144c7a | 438 | { |
JMF | 12:0071cb144c7a | 439 | /* |
JMF | 12:0071cb144c7a | 440 | * parse SET |
JMF | 12:0071cb144c7a | 441 | */ |
JMF | 12:0071cb144c7a | 442 | if( ( ret = mbedtls_asn1_get_tag( p, end, &set_len, |
JMF | 12:0071cb144c7a | 443 | MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SET ) ) != 0 ) |
JMF | 12:0071cb144c7a | 444 | return( MBEDTLS_ERR_X509_INVALID_NAME + ret ); |
JMF | 12:0071cb144c7a | 445 | |
JMF | 12:0071cb144c7a | 446 | end_set = *p + set_len; |
JMF | 12:0071cb144c7a | 447 | |
JMF | 12:0071cb144c7a | 448 | while( 1 ) |
JMF | 12:0071cb144c7a | 449 | { |
JMF | 12:0071cb144c7a | 450 | if( ( ret = x509_get_attr_type_value( p, end_set, cur ) ) != 0 ) |
JMF | 12:0071cb144c7a | 451 | return( ret ); |
JMF | 12:0071cb144c7a | 452 | |
JMF | 12:0071cb144c7a | 453 | if( *p == end_set ) |
JMF | 12:0071cb144c7a | 454 | break; |
JMF | 12:0071cb144c7a | 455 | |
JMF | 12:0071cb144c7a | 456 | /* Mark this item as being no the only one in a set */ |
JMF | 12:0071cb144c7a | 457 | cur->next_merged = 1; |
JMF | 12:0071cb144c7a | 458 | |
JMF | 12:0071cb144c7a | 459 | cur->next = mbedtls_calloc( 1, sizeof( mbedtls_x509_name ) ); |
JMF | 12:0071cb144c7a | 460 | |
JMF | 12:0071cb144c7a | 461 | if( cur->next == NULL ) |
JMF | 12:0071cb144c7a | 462 | return( MBEDTLS_ERR_X509_ALLOC_FAILED ); |
JMF | 12:0071cb144c7a | 463 | |
JMF | 12:0071cb144c7a | 464 | cur = cur->next; |
JMF | 12:0071cb144c7a | 465 | } |
JMF | 12:0071cb144c7a | 466 | |
JMF | 12:0071cb144c7a | 467 | /* |
JMF | 12:0071cb144c7a | 468 | * continue until end of SEQUENCE is reached |
JMF | 12:0071cb144c7a | 469 | */ |
JMF | 12:0071cb144c7a | 470 | if( *p == end ) |
JMF | 12:0071cb144c7a | 471 | return( 0 ); |
JMF | 12:0071cb144c7a | 472 | |
JMF | 12:0071cb144c7a | 473 | cur->next = mbedtls_calloc( 1, sizeof( mbedtls_x509_name ) ); |
JMF | 12:0071cb144c7a | 474 | |
JMF | 12:0071cb144c7a | 475 | if( cur->next == NULL ) |
JMF | 12:0071cb144c7a | 476 | return( MBEDTLS_ERR_X509_ALLOC_FAILED ); |
JMF | 12:0071cb144c7a | 477 | |
JMF | 12:0071cb144c7a | 478 | cur = cur->next; |
JMF | 12:0071cb144c7a | 479 | } |
JMF | 12:0071cb144c7a | 480 | } |
JMF | 12:0071cb144c7a | 481 | |
JMF | 12:0071cb144c7a | 482 | static int x509_parse_int(unsigned char **p, unsigned n, int *res){ |
JMF | 12:0071cb144c7a | 483 | *res = 0; |
JMF | 12:0071cb144c7a | 484 | for( ; n > 0; --n ){ |
JMF | 12:0071cb144c7a | 485 | if( ( **p < '0') || ( **p > '9' ) ) return MBEDTLS_ERR_X509_INVALID_DATE; |
JMF | 12:0071cb144c7a | 486 | *res *= 10; |
JMF | 12:0071cb144c7a | 487 | *res += (*(*p)++ - '0'); |
JMF | 12:0071cb144c7a | 488 | } |
JMF | 12:0071cb144c7a | 489 | return 0; |
JMF | 12:0071cb144c7a | 490 | } |
JMF | 12:0071cb144c7a | 491 | |
JMF | 12:0071cb144c7a | 492 | /* |
JMF | 12:0071cb144c7a | 493 | * Time ::= CHOICE { |
JMF | 12:0071cb144c7a | 494 | * utcTime UTCTime, |
JMF | 12:0071cb144c7a | 495 | * generalTime GeneralizedTime } |
JMF | 12:0071cb144c7a | 496 | */ |
JMF | 12:0071cb144c7a | 497 | int mbedtls_x509_get_time( unsigned char **p, const unsigned char *end, |
JMF | 12:0071cb144c7a | 498 | mbedtls_x509_time *time ) |
JMF | 12:0071cb144c7a | 499 | { |
JMF | 12:0071cb144c7a | 500 | int ret; |
JMF | 12:0071cb144c7a | 501 | size_t len; |
JMF | 12:0071cb144c7a | 502 | unsigned char tag; |
JMF | 12:0071cb144c7a | 503 | |
JMF | 12:0071cb144c7a | 504 | if( ( end - *p ) < 1 ) |
JMF | 12:0071cb144c7a | 505 | return( MBEDTLS_ERR_X509_INVALID_DATE + |
JMF | 12:0071cb144c7a | 506 | MBEDTLS_ERR_ASN1_OUT_OF_DATA ); |
JMF | 12:0071cb144c7a | 507 | |
JMF | 12:0071cb144c7a | 508 | tag = **p; |
JMF | 12:0071cb144c7a | 509 | |
JMF | 12:0071cb144c7a | 510 | if( tag == MBEDTLS_ASN1_UTC_TIME ) |
JMF | 12:0071cb144c7a | 511 | { |
JMF | 12:0071cb144c7a | 512 | (*p)++; |
JMF | 12:0071cb144c7a | 513 | ret = mbedtls_asn1_get_len( p, end, &len ); |
JMF | 12:0071cb144c7a | 514 | |
JMF | 12:0071cb144c7a | 515 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 516 | return( MBEDTLS_ERR_X509_INVALID_DATE + ret ); |
JMF | 12:0071cb144c7a | 517 | |
JMF | 12:0071cb144c7a | 518 | CHECK( x509_parse_int( p, 2, &time->year ) ); |
JMF | 12:0071cb144c7a | 519 | CHECK( x509_parse_int( p, 2, &time->mon ) ); |
JMF | 12:0071cb144c7a | 520 | CHECK( x509_parse_int( p, 2, &time->day ) ); |
JMF | 12:0071cb144c7a | 521 | CHECK( x509_parse_int( p, 2, &time->hour ) ); |
JMF | 12:0071cb144c7a | 522 | CHECK( x509_parse_int( p, 2, &time->min ) ); |
JMF | 12:0071cb144c7a | 523 | if( len > 10 ) |
JMF | 12:0071cb144c7a | 524 | CHECK( x509_parse_int( p, 2, &time->sec ) ); |
JMF | 12:0071cb144c7a | 525 | if( len > 12 && *(*p)++ != 'Z' ) |
JMF | 12:0071cb144c7a | 526 | return( MBEDTLS_ERR_X509_INVALID_DATE ); |
JMF | 12:0071cb144c7a | 527 | |
JMF | 12:0071cb144c7a | 528 | time->year += 100 * ( time->year < 50 ); |
JMF | 12:0071cb144c7a | 529 | time->year += 1900; |
JMF | 12:0071cb144c7a | 530 | |
JMF | 12:0071cb144c7a | 531 | return( 0 ); |
JMF | 12:0071cb144c7a | 532 | } |
JMF | 12:0071cb144c7a | 533 | else if( tag == MBEDTLS_ASN1_GENERALIZED_TIME ) |
JMF | 12:0071cb144c7a | 534 | { |
JMF | 12:0071cb144c7a | 535 | (*p)++; |
JMF | 12:0071cb144c7a | 536 | ret = mbedtls_asn1_get_len( p, end, &len ); |
JMF | 12:0071cb144c7a | 537 | |
JMF | 12:0071cb144c7a | 538 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 539 | return( MBEDTLS_ERR_X509_INVALID_DATE + ret ); |
JMF | 12:0071cb144c7a | 540 | |
JMF | 12:0071cb144c7a | 541 | CHECK( x509_parse_int( p, 4, &time->year ) ); |
JMF | 12:0071cb144c7a | 542 | CHECK( x509_parse_int( p, 2, &time->mon ) ); |
JMF | 12:0071cb144c7a | 543 | CHECK( x509_parse_int( p, 2, &time->day ) ); |
JMF | 12:0071cb144c7a | 544 | CHECK( x509_parse_int( p, 2, &time->hour ) ); |
JMF | 12:0071cb144c7a | 545 | CHECK( x509_parse_int( p, 2, &time->min ) ); |
JMF | 12:0071cb144c7a | 546 | if( len > 12 ) |
JMF | 12:0071cb144c7a | 547 | CHECK( x509_parse_int( p, 2, &time->sec ) ); |
JMF | 12:0071cb144c7a | 548 | if( len > 14 && *(*p)++ != 'Z' ) |
JMF | 12:0071cb144c7a | 549 | return( MBEDTLS_ERR_X509_INVALID_DATE ); |
JMF | 12:0071cb144c7a | 550 | |
JMF | 12:0071cb144c7a | 551 | return( 0 ); |
JMF | 12:0071cb144c7a | 552 | } |
JMF | 12:0071cb144c7a | 553 | else |
JMF | 12:0071cb144c7a | 554 | return( MBEDTLS_ERR_X509_INVALID_DATE + |
JMF | 12:0071cb144c7a | 555 | MBEDTLS_ERR_ASN1_UNEXPECTED_TAG ); |
JMF | 12:0071cb144c7a | 556 | } |
JMF | 12:0071cb144c7a | 557 | |
JMF | 12:0071cb144c7a | 558 | int mbedtls_x509_get_sig( unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig ) |
JMF | 12:0071cb144c7a | 559 | { |
JMF | 12:0071cb144c7a | 560 | int ret; |
JMF | 12:0071cb144c7a | 561 | size_t len; |
JMF | 12:0071cb144c7a | 562 | |
JMF | 12:0071cb144c7a | 563 | if( ( end - *p ) < 1 ) |
JMF | 12:0071cb144c7a | 564 | return( MBEDTLS_ERR_X509_INVALID_SIGNATURE + |
JMF | 12:0071cb144c7a | 565 | MBEDTLS_ERR_ASN1_OUT_OF_DATA ); |
JMF | 12:0071cb144c7a | 566 | |
JMF | 12:0071cb144c7a | 567 | sig->tag = **p; |
JMF | 12:0071cb144c7a | 568 | |
JMF | 12:0071cb144c7a | 569 | if( ( ret = mbedtls_asn1_get_bitstring_null( p, end, &len ) ) != 0 ) |
JMF | 12:0071cb144c7a | 570 | return( MBEDTLS_ERR_X509_INVALID_SIGNATURE + ret ); |
JMF | 12:0071cb144c7a | 571 | |
JMF | 12:0071cb144c7a | 572 | sig->len = len; |
JMF | 12:0071cb144c7a | 573 | sig->p = *p; |
JMF | 12:0071cb144c7a | 574 | |
JMF | 12:0071cb144c7a | 575 | *p += len; |
JMF | 12:0071cb144c7a | 576 | |
JMF | 12:0071cb144c7a | 577 | return( 0 ); |
JMF | 12:0071cb144c7a | 578 | } |
JMF | 12:0071cb144c7a | 579 | |
JMF | 12:0071cb144c7a | 580 | /* |
JMF | 12:0071cb144c7a | 581 | * Get signature algorithm from alg OID and optional parameters |
JMF | 12:0071cb144c7a | 582 | */ |
JMF | 12:0071cb144c7a | 583 | int mbedtls_x509_get_sig_alg( const mbedtls_x509_buf *sig_oid, const mbedtls_x509_buf *sig_params, |
JMF | 12:0071cb144c7a | 584 | mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg, |
JMF | 12:0071cb144c7a | 585 | void **sig_opts ) |
JMF | 12:0071cb144c7a | 586 | { |
JMF | 12:0071cb144c7a | 587 | int ret; |
JMF | 12:0071cb144c7a | 588 | |
JMF | 12:0071cb144c7a | 589 | if( *sig_opts != NULL ) |
JMF | 12:0071cb144c7a | 590 | return( MBEDTLS_ERR_X509_BAD_INPUT_DATA ); |
JMF | 12:0071cb144c7a | 591 | |
JMF | 12:0071cb144c7a | 592 | if( ( ret = mbedtls_oid_get_sig_alg( sig_oid, md_alg, pk_alg ) ) != 0 ) |
JMF | 12:0071cb144c7a | 593 | return( MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG + ret ); |
JMF | 12:0071cb144c7a | 594 | |
JMF | 12:0071cb144c7a | 595 | #if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT) |
JMF | 12:0071cb144c7a | 596 | if( *pk_alg == MBEDTLS_PK_RSASSA_PSS ) |
JMF | 12:0071cb144c7a | 597 | { |
JMF | 12:0071cb144c7a | 598 | mbedtls_pk_rsassa_pss_options *pss_opts; |
JMF | 12:0071cb144c7a | 599 | |
JMF | 12:0071cb144c7a | 600 | pss_opts = mbedtls_calloc( 1, sizeof( mbedtls_pk_rsassa_pss_options ) ); |
JMF | 12:0071cb144c7a | 601 | if( pss_opts == NULL ) |
JMF | 12:0071cb144c7a | 602 | return( MBEDTLS_ERR_X509_ALLOC_FAILED ); |
JMF | 12:0071cb144c7a | 603 | |
JMF | 12:0071cb144c7a | 604 | ret = mbedtls_x509_get_rsassa_pss_params( sig_params, |
JMF | 12:0071cb144c7a | 605 | md_alg, |
JMF | 12:0071cb144c7a | 606 | &pss_opts->mgf1_hash_id, |
JMF | 12:0071cb144c7a | 607 | &pss_opts->expected_salt_len ); |
JMF | 12:0071cb144c7a | 608 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 609 | { |
JMF | 12:0071cb144c7a | 610 | mbedtls_free( pss_opts ); |
JMF | 12:0071cb144c7a | 611 | return( ret ); |
JMF | 12:0071cb144c7a | 612 | } |
JMF | 12:0071cb144c7a | 613 | |
JMF | 12:0071cb144c7a | 614 | *sig_opts = (void *) pss_opts; |
JMF | 12:0071cb144c7a | 615 | } |
JMF | 12:0071cb144c7a | 616 | else |
JMF | 12:0071cb144c7a | 617 | #endif /* MBEDTLS_X509_RSASSA_PSS_SUPPORT */ |
JMF | 12:0071cb144c7a | 618 | { |
JMF | 12:0071cb144c7a | 619 | /* Make sure parameters are absent or NULL */ |
JMF | 12:0071cb144c7a | 620 | if( ( sig_params->tag != MBEDTLS_ASN1_NULL && sig_params->tag != 0 ) || |
JMF | 12:0071cb144c7a | 621 | sig_params->len != 0 ) |
JMF | 12:0071cb144c7a | 622 | return( MBEDTLS_ERR_X509_INVALID_ALG ); |
JMF | 12:0071cb144c7a | 623 | } |
JMF | 12:0071cb144c7a | 624 | |
JMF | 12:0071cb144c7a | 625 | return( 0 ); |
JMF | 12:0071cb144c7a | 626 | } |
JMF | 12:0071cb144c7a | 627 | |
JMF | 12:0071cb144c7a | 628 | /* |
JMF | 12:0071cb144c7a | 629 | * X.509 Extensions (No parsing of extensions, pointer should |
JMF | 12:0071cb144c7a | 630 | * be either manually updated or extensions should be parsed! |
JMF | 12:0071cb144c7a | 631 | */ |
JMF | 12:0071cb144c7a | 632 | int mbedtls_x509_get_ext( unsigned char **p, const unsigned char *end, |
JMF | 12:0071cb144c7a | 633 | mbedtls_x509_buf *ext, int tag ) |
JMF | 12:0071cb144c7a | 634 | { |
JMF | 12:0071cb144c7a | 635 | int ret; |
JMF | 12:0071cb144c7a | 636 | size_t len; |
JMF | 12:0071cb144c7a | 637 | |
JMF | 12:0071cb144c7a | 638 | if( *p == end ) |
JMF | 12:0071cb144c7a | 639 | return( 0 ); |
JMF | 12:0071cb144c7a | 640 | |
JMF | 12:0071cb144c7a | 641 | ext->tag = **p; |
JMF | 12:0071cb144c7a | 642 | |
JMF | 12:0071cb144c7a | 643 | if( ( ret = mbedtls_asn1_get_tag( p, end, &ext->len, |
JMF | 12:0071cb144c7a | 644 | MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | tag ) ) != 0 ) |
JMF | 12:0071cb144c7a | 645 | return( ret ); |
JMF | 12:0071cb144c7a | 646 | |
JMF | 12:0071cb144c7a | 647 | ext->p = *p; |
JMF | 12:0071cb144c7a | 648 | end = *p + ext->len; |
JMF | 12:0071cb144c7a | 649 | |
JMF | 12:0071cb144c7a | 650 | /* |
JMF | 12:0071cb144c7a | 651 | * Extensions ::= SEQUENCE SIZE (1..MAX) OF Extension |
JMF | 12:0071cb144c7a | 652 | * |
JMF | 12:0071cb144c7a | 653 | * Extension ::= SEQUENCE { |
JMF | 12:0071cb144c7a | 654 | * extnID OBJECT IDENTIFIER, |
JMF | 12:0071cb144c7a | 655 | * critical BOOLEAN DEFAULT FALSE, |
JMF | 12:0071cb144c7a | 656 | * extnValue OCTET STRING } |
JMF | 12:0071cb144c7a | 657 | */ |
JMF | 12:0071cb144c7a | 658 | if( ( ret = mbedtls_asn1_get_tag( p, end, &len, |
JMF | 12:0071cb144c7a | 659 | MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) != 0 ) |
JMF | 12:0071cb144c7a | 660 | return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + ret ); |
JMF | 12:0071cb144c7a | 661 | |
JMF | 12:0071cb144c7a | 662 | if( end != *p + len ) |
JMF | 12:0071cb144c7a | 663 | return( MBEDTLS_ERR_X509_INVALID_EXTENSIONS + |
JMF | 12:0071cb144c7a | 664 | MBEDTLS_ERR_ASN1_LENGTH_MISMATCH ); |
JMF | 12:0071cb144c7a | 665 | |
JMF | 12:0071cb144c7a | 666 | return( 0 ); |
JMF | 12:0071cb144c7a | 667 | } |
JMF | 12:0071cb144c7a | 668 | |
JMF | 12:0071cb144c7a | 669 | /* |
JMF | 12:0071cb144c7a | 670 | * Store the name in printable form into buf; no more |
JMF | 12:0071cb144c7a | 671 | * than size characters will be written |
JMF | 12:0071cb144c7a | 672 | */ |
JMF | 12:0071cb144c7a | 673 | int mbedtls_x509_dn_gets( char *buf, size_t size, const mbedtls_x509_name *dn ) |
JMF | 12:0071cb144c7a | 674 | { |
JMF | 12:0071cb144c7a | 675 | int ret; |
JMF | 12:0071cb144c7a | 676 | size_t i, n; |
JMF | 12:0071cb144c7a | 677 | unsigned char c, merge = 0; |
JMF | 12:0071cb144c7a | 678 | const mbedtls_x509_name *name; |
JMF | 12:0071cb144c7a | 679 | const char *short_name = NULL; |
JMF | 12:0071cb144c7a | 680 | char s[MBEDTLS_X509_MAX_DN_NAME_SIZE], *p; |
JMF | 12:0071cb144c7a | 681 | |
JMF | 12:0071cb144c7a | 682 | memset( s, 0, sizeof( s ) ); |
JMF | 12:0071cb144c7a | 683 | |
JMF | 12:0071cb144c7a | 684 | name = dn; |
JMF | 12:0071cb144c7a | 685 | p = buf; |
JMF | 12:0071cb144c7a | 686 | n = size; |
JMF | 12:0071cb144c7a | 687 | |
JMF | 12:0071cb144c7a | 688 | while( name != NULL ) |
JMF | 12:0071cb144c7a | 689 | { |
JMF | 12:0071cb144c7a | 690 | if( !name->oid.p ) |
JMF | 12:0071cb144c7a | 691 | { |
JMF | 12:0071cb144c7a | 692 | name = name->next; |
JMF | 12:0071cb144c7a | 693 | continue; |
JMF | 12:0071cb144c7a | 694 | } |
JMF | 12:0071cb144c7a | 695 | |
JMF | 12:0071cb144c7a | 696 | if( name != dn ) |
JMF | 12:0071cb144c7a | 697 | { |
JMF | 12:0071cb144c7a | 698 | ret = mbedtls_snprintf( p, n, merge ? " + " : ", " ); |
JMF | 12:0071cb144c7a | 699 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 700 | } |
JMF | 12:0071cb144c7a | 701 | |
JMF | 12:0071cb144c7a | 702 | ret = mbedtls_oid_get_attr_short_name( &name->oid, &short_name ); |
JMF | 12:0071cb144c7a | 703 | |
JMF | 12:0071cb144c7a | 704 | if( ret == 0 ) |
JMF | 12:0071cb144c7a | 705 | ret = mbedtls_snprintf( p, n, "%s=", short_name ); |
JMF | 12:0071cb144c7a | 706 | else |
JMF | 12:0071cb144c7a | 707 | ret = mbedtls_snprintf( p, n, "\?\?=" ); |
JMF | 12:0071cb144c7a | 708 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 709 | |
JMF | 12:0071cb144c7a | 710 | for( i = 0; i < name->val.len; i++ ) |
JMF | 12:0071cb144c7a | 711 | { |
JMF | 12:0071cb144c7a | 712 | if( i >= sizeof( s ) - 1 ) |
JMF | 12:0071cb144c7a | 713 | break; |
JMF | 12:0071cb144c7a | 714 | |
JMF | 12:0071cb144c7a | 715 | c = name->val.p[i]; |
JMF | 12:0071cb144c7a | 716 | if( c < 32 || c == 127 || ( c > 128 && c < 160 ) ) |
JMF | 12:0071cb144c7a | 717 | s[i] = '?'; |
JMF | 12:0071cb144c7a | 718 | else s[i] = c; |
JMF | 12:0071cb144c7a | 719 | } |
JMF | 12:0071cb144c7a | 720 | s[i] = '\0'; |
JMF | 12:0071cb144c7a | 721 | ret = mbedtls_snprintf( p, n, "%s", s ); |
JMF | 12:0071cb144c7a | 722 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 723 | |
JMF | 12:0071cb144c7a | 724 | merge = name->next_merged; |
JMF | 12:0071cb144c7a | 725 | name = name->next; |
JMF | 12:0071cb144c7a | 726 | } |
JMF | 12:0071cb144c7a | 727 | |
JMF | 12:0071cb144c7a | 728 | return( (int) ( size - n ) ); |
JMF | 12:0071cb144c7a | 729 | } |
JMF | 12:0071cb144c7a | 730 | |
JMF | 12:0071cb144c7a | 731 | /* |
JMF | 12:0071cb144c7a | 732 | * Store the serial in printable form into buf; no more |
JMF | 12:0071cb144c7a | 733 | * than size characters will be written |
JMF | 12:0071cb144c7a | 734 | */ |
JMF | 12:0071cb144c7a | 735 | int mbedtls_x509_serial_gets( char *buf, size_t size, const mbedtls_x509_buf *serial ) |
JMF | 12:0071cb144c7a | 736 | { |
JMF | 12:0071cb144c7a | 737 | int ret; |
JMF | 12:0071cb144c7a | 738 | size_t i, n, nr; |
JMF | 12:0071cb144c7a | 739 | char *p; |
JMF | 12:0071cb144c7a | 740 | |
JMF | 12:0071cb144c7a | 741 | p = buf; |
JMF | 12:0071cb144c7a | 742 | n = size; |
JMF | 12:0071cb144c7a | 743 | |
JMF | 12:0071cb144c7a | 744 | nr = ( serial->len <= 32 ) |
JMF | 12:0071cb144c7a | 745 | ? serial->len : 28; |
JMF | 12:0071cb144c7a | 746 | |
JMF | 12:0071cb144c7a | 747 | for( i = 0; i < nr; i++ ) |
JMF | 12:0071cb144c7a | 748 | { |
JMF | 12:0071cb144c7a | 749 | if( i == 0 && nr > 1 && serial->p[i] == 0x0 ) |
JMF | 12:0071cb144c7a | 750 | continue; |
JMF | 12:0071cb144c7a | 751 | |
JMF | 12:0071cb144c7a | 752 | ret = mbedtls_snprintf( p, n, "%02X%s", |
JMF | 12:0071cb144c7a | 753 | serial->p[i], ( i < nr - 1 ) ? ":" : "" ); |
JMF | 12:0071cb144c7a | 754 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 755 | } |
JMF | 12:0071cb144c7a | 756 | |
JMF | 12:0071cb144c7a | 757 | if( nr != serial->len ) |
JMF | 12:0071cb144c7a | 758 | { |
JMF | 12:0071cb144c7a | 759 | ret = mbedtls_snprintf( p, n, "...." ); |
JMF | 12:0071cb144c7a | 760 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 761 | } |
JMF | 12:0071cb144c7a | 762 | |
JMF | 12:0071cb144c7a | 763 | return( (int) ( size - n ) ); |
JMF | 12:0071cb144c7a | 764 | } |
JMF | 12:0071cb144c7a | 765 | |
JMF | 12:0071cb144c7a | 766 | /* |
JMF | 12:0071cb144c7a | 767 | * Helper for writing signature algorithms |
JMF | 12:0071cb144c7a | 768 | */ |
JMF | 12:0071cb144c7a | 769 | int mbedtls_x509_sig_alg_gets( char *buf, size_t size, const mbedtls_x509_buf *sig_oid, |
JMF | 12:0071cb144c7a | 770 | mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, |
JMF | 12:0071cb144c7a | 771 | const void *sig_opts ) |
JMF | 12:0071cb144c7a | 772 | { |
JMF | 12:0071cb144c7a | 773 | int ret; |
JMF | 12:0071cb144c7a | 774 | char *p = buf; |
JMF | 12:0071cb144c7a | 775 | size_t n = size; |
JMF | 12:0071cb144c7a | 776 | const char *desc = NULL; |
JMF | 12:0071cb144c7a | 777 | |
JMF | 12:0071cb144c7a | 778 | ret = mbedtls_oid_get_sig_alg_desc( sig_oid, &desc ); |
JMF | 12:0071cb144c7a | 779 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 780 | ret = mbedtls_snprintf( p, n, "???" ); |
JMF | 12:0071cb144c7a | 781 | else |
JMF | 12:0071cb144c7a | 782 | ret = mbedtls_snprintf( p, n, "%s", desc ); |
JMF | 12:0071cb144c7a | 783 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 784 | |
JMF | 12:0071cb144c7a | 785 | #if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT) |
JMF | 12:0071cb144c7a | 786 | if( pk_alg == MBEDTLS_PK_RSASSA_PSS ) |
JMF | 12:0071cb144c7a | 787 | { |
JMF | 12:0071cb144c7a | 788 | const mbedtls_pk_rsassa_pss_options *pss_opts; |
JMF | 12:0071cb144c7a | 789 | const mbedtls_md_info_t *md_info, *mgf_md_info; |
JMF | 12:0071cb144c7a | 790 | |
JMF | 12:0071cb144c7a | 791 | pss_opts = (const mbedtls_pk_rsassa_pss_options *) sig_opts; |
JMF | 12:0071cb144c7a | 792 | |
JMF | 12:0071cb144c7a | 793 | md_info = mbedtls_md_info_from_type( md_alg ); |
JMF | 12:0071cb144c7a | 794 | mgf_md_info = mbedtls_md_info_from_type( pss_opts->mgf1_hash_id ); |
JMF | 12:0071cb144c7a | 795 | |
JMF | 12:0071cb144c7a | 796 | ret = mbedtls_snprintf( p, n, " (%s, MGF1-%s, 0x%02X)", |
JMF | 12:0071cb144c7a | 797 | md_info ? mbedtls_md_get_name( md_info ) : "???", |
JMF | 12:0071cb144c7a | 798 | mgf_md_info ? mbedtls_md_get_name( mgf_md_info ) : "???", |
JMF | 12:0071cb144c7a | 799 | pss_opts->expected_salt_len ); |
JMF | 12:0071cb144c7a | 800 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 801 | } |
JMF | 12:0071cb144c7a | 802 | #else |
JMF | 12:0071cb144c7a | 803 | ((void) pk_alg); |
JMF | 12:0071cb144c7a | 804 | ((void) md_alg); |
JMF | 12:0071cb144c7a | 805 | ((void) sig_opts); |
JMF | 12:0071cb144c7a | 806 | #endif /* MBEDTLS_X509_RSASSA_PSS_SUPPORT */ |
JMF | 12:0071cb144c7a | 807 | |
JMF | 12:0071cb144c7a | 808 | return( (int)( size - n ) ); |
JMF | 12:0071cb144c7a | 809 | } |
JMF | 12:0071cb144c7a | 810 | |
JMF | 12:0071cb144c7a | 811 | /* |
JMF | 12:0071cb144c7a | 812 | * Helper for writing "RSA key size", "EC key size", etc |
JMF | 12:0071cb144c7a | 813 | */ |
JMF | 12:0071cb144c7a | 814 | int mbedtls_x509_key_size_helper( char *buf, size_t buf_size, const char *name ) |
JMF | 12:0071cb144c7a | 815 | { |
JMF | 12:0071cb144c7a | 816 | char *p = buf; |
JMF | 12:0071cb144c7a | 817 | size_t n = buf_size; |
JMF | 12:0071cb144c7a | 818 | int ret; |
JMF | 12:0071cb144c7a | 819 | |
JMF | 12:0071cb144c7a | 820 | ret = mbedtls_snprintf( p, n, "%s key size", name ); |
JMF | 12:0071cb144c7a | 821 | MBEDTLS_X509_SAFE_SNPRINTF; |
JMF | 12:0071cb144c7a | 822 | |
JMF | 12:0071cb144c7a | 823 | return( 0 ); |
JMF | 12:0071cb144c7a | 824 | } |
JMF | 12:0071cb144c7a | 825 | |
JMF | 12:0071cb144c7a | 826 | #if defined(MBEDTLS_HAVE_TIME_DATE) |
JMF | 12:0071cb144c7a | 827 | /* |
JMF | 12:0071cb144c7a | 828 | * Set the time structure to the current time. |
JMF | 12:0071cb144c7a | 829 | * Return 0 on success, non-zero on failure. |
JMF | 12:0071cb144c7a | 830 | */ |
JMF | 12:0071cb144c7a | 831 | #if defined(_WIN32) && !defined(EFIX64) && !defined(EFI32) |
JMF | 12:0071cb144c7a | 832 | static int x509_get_current_time( mbedtls_x509_time *now ) |
JMF | 12:0071cb144c7a | 833 | { |
JMF | 12:0071cb144c7a | 834 | SYSTEMTIME st; |
JMF | 12:0071cb144c7a | 835 | |
JMF | 12:0071cb144c7a | 836 | GetSystemTime( &st ); |
JMF | 12:0071cb144c7a | 837 | |
JMF | 12:0071cb144c7a | 838 | now->year = st.wYear; |
JMF | 12:0071cb144c7a | 839 | now->mon = st.wMonth; |
JMF | 12:0071cb144c7a | 840 | now->day = st.wDay; |
JMF | 12:0071cb144c7a | 841 | now->hour = st.wHour; |
JMF | 12:0071cb144c7a | 842 | now->min = st.wMinute; |
JMF | 12:0071cb144c7a | 843 | now->sec = st.wSecond; |
JMF | 12:0071cb144c7a | 844 | |
JMF | 12:0071cb144c7a | 845 | return( 0 ); |
JMF | 12:0071cb144c7a | 846 | } |
JMF | 12:0071cb144c7a | 847 | #else |
JMF | 12:0071cb144c7a | 848 | static int x509_get_current_time( mbedtls_x509_time *now ) |
JMF | 12:0071cb144c7a | 849 | { |
JMF | 12:0071cb144c7a | 850 | struct tm *lt; |
JMF | 12:0071cb144c7a | 851 | mbedtls_time_t tt; |
JMF | 12:0071cb144c7a | 852 | int ret = 0; |
JMF | 12:0071cb144c7a | 853 | |
JMF | 12:0071cb144c7a | 854 | #if defined(MBEDTLS_THREADING_C) |
JMF | 12:0071cb144c7a | 855 | if( mbedtls_mutex_lock( &mbedtls_threading_gmtime_mutex ) != 0 ) |
JMF | 12:0071cb144c7a | 856 | return( MBEDTLS_ERR_THREADING_MUTEX_ERROR ); |
JMF | 12:0071cb144c7a | 857 | #endif |
JMF | 12:0071cb144c7a | 858 | |
JMF | 12:0071cb144c7a | 859 | tt = mbedtls_time( NULL ); |
JMF | 12:0071cb144c7a | 860 | lt = gmtime( &tt ); |
JMF | 12:0071cb144c7a | 861 | |
JMF | 12:0071cb144c7a | 862 | if( lt == NULL ) |
JMF | 12:0071cb144c7a | 863 | ret = -1; |
JMF | 12:0071cb144c7a | 864 | else |
JMF | 12:0071cb144c7a | 865 | { |
JMF | 12:0071cb144c7a | 866 | now->year = lt->tm_year + 1900; |
JMF | 12:0071cb144c7a | 867 | now->mon = lt->tm_mon + 1; |
JMF | 12:0071cb144c7a | 868 | now->day = lt->tm_mday; |
JMF | 12:0071cb144c7a | 869 | now->hour = lt->tm_hour; |
JMF | 12:0071cb144c7a | 870 | now->min = lt->tm_min; |
JMF | 12:0071cb144c7a | 871 | now->sec = lt->tm_sec; |
JMF | 12:0071cb144c7a | 872 | } |
JMF | 12:0071cb144c7a | 873 | |
JMF | 12:0071cb144c7a | 874 | #if defined(MBEDTLS_THREADING_C) |
JMF | 12:0071cb144c7a | 875 | if( mbedtls_mutex_unlock( &mbedtls_threading_gmtime_mutex ) != 0 ) |
JMF | 12:0071cb144c7a | 876 | return( MBEDTLS_ERR_THREADING_MUTEX_ERROR ); |
JMF | 12:0071cb144c7a | 877 | #endif |
JMF | 12:0071cb144c7a | 878 | |
JMF | 12:0071cb144c7a | 879 | return( ret ); |
JMF | 12:0071cb144c7a | 880 | } |
JMF | 12:0071cb144c7a | 881 | #endif /* _WIN32 && !EFIX64 && !EFI32 */ |
JMF | 12:0071cb144c7a | 882 | |
JMF | 12:0071cb144c7a | 883 | /* |
JMF | 12:0071cb144c7a | 884 | * Return 0 if before <= after, 1 otherwise |
JMF | 12:0071cb144c7a | 885 | */ |
JMF | 12:0071cb144c7a | 886 | static int x509_check_time( const mbedtls_x509_time *before, const mbedtls_x509_time *after ) |
JMF | 12:0071cb144c7a | 887 | { |
JMF | 12:0071cb144c7a | 888 | if( before->year > after->year ) |
JMF | 12:0071cb144c7a | 889 | return( 1 ); |
JMF | 12:0071cb144c7a | 890 | |
JMF | 12:0071cb144c7a | 891 | if( before->year == after->year && |
JMF | 12:0071cb144c7a | 892 | before->mon > after->mon ) |
JMF | 12:0071cb144c7a | 893 | return( 1 ); |
JMF | 12:0071cb144c7a | 894 | |
JMF | 12:0071cb144c7a | 895 | if( before->year == after->year && |
JMF | 12:0071cb144c7a | 896 | before->mon == after->mon && |
JMF | 12:0071cb144c7a | 897 | before->day > after->day ) |
JMF | 12:0071cb144c7a | 898 | return( 1 ); |
JMF | 12:0071cb144c7a | 899 | |
JMF | 12:0071cb144c7a | 900 | if( before->year == after->year && |
JMF | 12:0071cb144c7a | 901 | before->mon == after->mon && |
JMF | 12:0071cb144c7a | 902 | before->day == after->day && |
JMF | 12:0071cb144c7a | 903 | before->hour > after->hour ) |
JMF | 12:0071cb144c7a | 904 | return( 1 ); |
JMF | 12:0071cb144c7a | 905 | |
JMF | 12:0071cb144c7a | 906 | if( before->year == after->year && |
JMF | 12:0071cb144c7a | 907 | before->mon == after->mon && |
JMF | 12:0071cb144c7a | 908 | before->day == after->day && |
JMF | 12:0071cb144c7a | 909 | before->hour == after->hour && |
JMF | 12:0071cb144c7a | 910 | before->min > after->min ) |
JMF | 12:0071cb144c7a | 911 | return( 1 ); |
JMF | 12:0071cb144c7a | 912 | |
JMF | 12:0071cb144c7a | 913 | if( before->year == after->year && |
JMF | 12:0071cb144c7a | 914 | before->mon == after->mon && |
JMF | 12:0071cb144c7a | 915 | before->day == after->day && |
JMF | 12:0071cb144c7a | 916 | before->hour == after->hour && |
JMF | 12:0071cb144c7a | 917 | before->min == after->min && |
JMF | 12:0071cb144c7a | 918 | before->sec > after->sec ) |
JMF | 12:0071cb144c7a | 919 | return( 1 ); |
JMF | 12:0071cb144c7a | 920 | |
JMF | 12:0071cb144c7a | 921 | return( 0 ); |
JMF | 12:0071cb144c7a | 922 | } |
JMF | 12:0071cb144c7a | 923 | |
JMF | 12:0071cb144c7a | 924 | int mbedtls_x509_time_is_past( const mbedtls_x509_time *to ) |
JMF | 12:0071cb144c7a | 925 | { |
JMF | 12:0071cb144c7a | 926 | mbedtls_x509_time now; |
JMF | 12:0071cb144c7a | 927 | |
JMF | 12:0071cb144c7a | 928 | if( x509_get_current_time( &now ) != 0 ) |
JMF | 12:0071cb144c7a | 929 | return( 1 ); |
JMF | 12:0071cb144c7a | 930 | |
JMF | 12:0071cb144c7a | 931 | return( x509_check_time( &now, to ) ); |
JMF | 12:0071cb144c7a | 932 | } |
JMF | 12:0071cb144c7a | 933 | |
JMF | 12:0071cb144c7a | 934 | int mbedtls_x509_time_is_future( const mbedtls_x509_time *from ) |
JMF | 12:0071cb144c7a | 935 | { |
JMF | 12:0071cb144c7a | 936 | mbedtls_x509_time now; |
JMF | 12:0071cb144c7a | 937 | |
JMF | 12:0071cb144c7a | 938 | if( x509_get_current_time( &now ) != 0 ) |
JMF | 12:0071cb144c7a | 939 | return( 1 ); |
JMF | 12:0071cb144c7a | 940 | |
JMF | 12:0071cb144c7a | 941 | return( x509_check_time( from, &now ) ); |
JMF | 12:0071cb144c7a | 942 | } |
JMF | 12:0071cb144c7a | 943 | |
JMF | 12:0071cb144c7a | 944 | #else /* MBEDTLS_HAVE_TIME_DATE */ |
JMF | 12:0071cb144c7a | 945 | |
JMF | 12:0071cb144c7a | 946 | int mbedtls_x509_time_is_past( const mbedtls_x509_time *to ) |
JMF | 12:0071cb144c7a | 947 | { |
JMF | 12:0071cb144c7a | 948 | ((void) to); |
JMF | 12:0071cb144c7a | 949 | return( 0 ); |
JMF | 12:0071cb144c7a | 950 | } |
JMF | 12:0071cb144c7a | 951 | |
JMF | 12:0071cb144c7a | 952 | int mbedtls_x509_time_is_future( const mbedtls_x509_time *from ) |
JMF | 12:0071cb144c7a | 953 | { |
JMF | 12:0071cb144c7a | 954 | ((void) from); |
JMF | 12:0071cb144c7a | 955 | return( 0 ); |
JMF | 12:0071cb144c7a | 956 | } |
JMF | 12:0071cb144c7a | 957 | #endif /* MBEDTLS_HAVE_TIME_DATE */ |
JMF | 12:0071cb144c7a | 958 | |
JMF | 12:0071cb144c7a | 959 | #if defined(MBEDTLS_SELF_TEST) |
JMF | 12:0071cb144c7a | 960 | |
JMF | 12:0071cb144c7a | 961 | #include "mbedtls/x509_crt.h" |
JMF | 12:0071cb144c7a | 962 | #include "mbedtls/certs.h" |
JMF | 12:0071cb144c7a | 963 | |
JMF | 12:0071cb144c7a | 964 | /* |
JMF | 12:0071cb144c7a | 965 | * Checkup routine |
JMF | 12:0071cb144c7a | 966 | */ |
JMF | 12:0071cb144c7a | 967 | int mbedtls_x509_self_test( int verbose ) |
JMF | 12:0071cb144c7a | 968 | { |
JMF | 12:0071cb144c7a | 969 | #if defined(MBEDTLS_CERTS_C) && defined(MBEDTLS_SHA1_C) |
JMF | 12:0071cb144c7a | 970 | int ret; |
JMF | 12:0071cb144c7a | 971 | uint32_t flags; |
JMF | 12:0071cb144c7a | 972 | mbedtls_x509_crt cacert; |
JMF | 12:0071cb144c7a | 973 | mbedtls_x509_crt clicert; |
JMF | 12:0071cb144c7a | 974 | |
JMF | 12:0071cb144c7a | 975 | if( verbose != 0 ) |
JMF | 12:0071cb144c7a | 976 | mbedtls_printf( " X.509 certificate load: " ); |
JMF | 12:0071cb144c7a | 977 | |
JMF | 12:0071cb144c7a | 978 | mbedtls_x509_crt_init( &clicert ); |
JMF | 12:0071cb144c7a | 979 | |
JMF | 12:0071cb144c7a | 980 | ret = mbedtls_x509_crt_parse( &clicert, (const unsigned char *) mbedtls_test_cli_crt, |
JMF | 12:0071cb144c7a | 981 | mbedtls_test_cli_crt_len ); |
JMF | 12:0071cb144c7a | 982 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 983 | { |
JMF | 12:0071cb144c7a | 984 | if( verbose != 0 ) |
JMF | 12:0071cb144c7a | 985 | mbedtls_printf( "failed\n" ); |
JMF | 12:0071cb144c7a | 986 | |
JMF | 12:0071cb144c7a | 987 | return( ret ); |
JMF | 12:0071cb144c7a | 988 | } |
JMF | 12:0071cb144c7a | 989 | |
JMF | 12:0071cb144c7a | 990 | mbedtls_x509_crt_init( &cacert ); |
JMF | 12:0071cb144c7a | 991 | |
JMF | 12:0071cb144c7a | 992 | ret = mbedtls_x509_crt_parse( &cacert, (const unsigned char *) mbedtls_test_ca_crt, |
JMF | 12:0071cb144c7a | 993 | mbedtls_test_ca_crt_len ); |
JMF | 12:0071cb144c7a | 994 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 995 | { |
JMF | 12:0071cb144c7a | 996 | if( verbose != 0 ) |
JMF | 12:0071cb144c7a | 997 | mbedtls_printf( "failed\n" ); |
JMF | 12:0071cb144c7a | 998 | |
JMF | 12:0071cb144c7a | 999 | return( ret ); |
JMF | 12:0071cb144c7a | 1000 | } |
JMF | 12:0071cb144c7a | 1001 | |
JMF | 12:0071cb144c7a | 1002 | if( verbose != 0 ) |
JMF | 12:0071cb144c7a | 1003 | mbedtls_printf( "passed\n X.509 signature verify: "); |
JMF | 12:0071cb144c7a | 1004 | |
JMF | 12:0071cb144c7a | 1005 | ret = mbedtls_x509_crt_verify( &clicert, &cacert, NULL, NULL, &flags, NULL, NULL ); |
JMF | 12:0071cb144c7a | 1006 | if( ret != 0 ) |
JMF | 12:0071cb144c7a | 1007 | { |
JMF | 12:0071cb144c7a | 1008 | if( verbose != 0 ) |
JMF | 12:0071cb144c7a | 1009 | mbedtls_printf( "failed\n" ); |
JMF | 12:0071cb144c7a | 1010 | |
JMF | 12:0071cb144c7a | 1011 | return( ret ); |
JMF | 12:0071cb144c7a | 1012 | } |
JMF | 12:0071cb144c7a | 1013 | |
JMF | 12:0071cb144c7a | 1014 | if( verbose != 0 ) |
JMF | 12:0071cb144c7a | 1015 | mbedtls_printf( "passed\n\n"); |
JMF | 12:0071cb144c7a | 1016 | |
JMF | 12:0071cb144c7a | 1017 | mbedtls_x509_crt_free( &cacert ); |
JMF | 12:0071cb144c7a | 1018 | mbedtls_x509_crt_free( &clicert ); |
JMF | 12:0071cb144c7a | 1019 | |
JMF | 12:0071cb144c7a | 1020 | return( 0 ); |
JMF | 12:0071cb144c7a | 1021 | #else |
JMF | 12:0071cb144c7a | 1022 | ((void) verbose); |
JMF | 12:0071cb144c7a | 1023 | return( 0 ); |
JMF | 12:0071cb144c7a | 1024 | #endif /* MBEDTLS_CERTS_C && MBEDTLS_SHA1_C */ |
JMF | 12:0071cb144c7a | 1025 | } |
JMF | 12:0071cb144c7a | 1026 | |
JMF | 12:0071cb144c7a | 1027 | #endif /* MBEDTLS_SELF_TEST */ |
JMF | 12:0071cb144c7a | 1028 | |
JMF | 12:0071cb144c7a | 1029 | #endif /* MBEDTLS_X509_USE_C */ |