From b5a11ab80b04c13c33318473b5c5b403abb0b586 Mon Sep 17 00:00:00 2001 From: Paul Bakker Date: Wed, 12 Oct 2011 09:58:41 +0000 Subject: [PATCH] - Added a separate CRL entry extension parsing function --- ChangeLog | 1 + library/x509parse.c | 62 ++++++++++++++++++++++++++++++++++++++++++--- 2 files changed, 60 insertions(+), 3 deletions(-) diff --git a/ChangeLog b/ChangeLog index df7283ef7..0ae3e351f 100644 --- a/ChangeLog +++ b/ChangeLog @@ -15,6 +15,7 @@ Changes encryption and private key for decryption. (Closes ticket #34) * Inceased maximum size of ASN1 length reads to 32-bits. * Added an EXPLICIT tag number parameter to x509_get_ext() + * Added a separate CRL entry extension parsing function Bugfix * Fixed faulty HMAC-MD2 implementation. Found by dibac. (Closes diff --git a/library/x509parse.c b/library/x509parse.c index 5f1bdbddc..31ec3461a 100644 --- a/library/x509parse.c +++ b/library/x509parse.c @@ -827,6 +827,60 @@ static int x509_get_crl_ext( unsigned char **p, return( 0 ); } +/* + * X.509 CRL v2 entry extensions (no extensions parsed yet.) + */ +static int x509_get_crl_entry_ext( unsigned char **p, + const unsigned char *end, + x509_buf *ext ) +{ + int ret; + size_t len = 0; + + /* OPTIONAL */ + if (end <= *p) + return( 0 ); + + ext->tag = **p; + ext->p = *p; + + /* + * Get CRL-entry extension sequence header + * crlEntryExtensions Extensions OPTIONAL -- if present, MUST be v2 + */ + if( ( ret = asn1_get_tag( p, end, &ext->len, + ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) + { + if( ret == POLARSSL_ERR_ASN1_UNEXPECTED_TAG ) + { + ext->p = NULL; + return( 0 ); + } + return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS + ret ); + } + + end = *p + ext->len; + + if( end != *p + ext->len ) + return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS + + POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); + + while( *p < end ) + { + if( ( ret = asn1_get_tag( p, end, &len, + ASN1_CONSTRUCTED | ASN1_SEQUENCE ) ) != 0 ) + return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS + ret ); + + *p += len; + } + + if( *p != end ) + return( POLARSSL_ERR_X509_CERT_INVALID_EXTENSIONS + + POLARSSL_ERR_ASN1_LENGTH_MISMATCH ); + + return( 0 ); +} + static int x509_get_basic_constraints( unsigned char **p, const unsigned char *end, int *ca_istrue, @@ -1096,6 +1150,7 @@ static int x509_get_entries( unsigned char **p, while( *p < end ) { size_t len2; + const unsigned char *end2; if( ( ret = asn1_get_tag( p, end, &len2, ASN1_SEQUENCE | ASN1_CONSTRUCTED ) ) != 0 ) @@ -1106,14 +1161,15 @@ static int x509_get_entries( unsigned char **p, cur_entry->raw.tag = **p; cur_entry->raw.p = *p; cur_entry->raw.len = len2; + end2 = *p + len2; - if( ( ret = x509_get_serial( p, end, &cur_entry->serial ) ) != 0 ) + if( ( ret = x509_get_serial( p, end2, &cur_entry->serial ) ) != 0 ) return( ret ); - if( ( ret = x509_get_time( p, end, &cur_entry->revocation_date ) ) != 0 ) + if( ( ret = x509_get_time( p, end2, &cur_entry->revocation_date ) ) != 0 ) return( ret ); - if( ( ret = x509_get_crl_ext( p, end, &cur_entry->entry_ext ) ) != 0 ) + if( ( ret = x509_get_crl_entry_ext( p, end2, &cur_entry->entry_ext ) ) != 0 ) return( ret ); if ( *p < end )