asn1_gen.c revision 280304
1/* asn1_gen.c */ 2/* 3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project 4 * 2002. 5 */ 6/* ==================================================================== 7 * Copyright (c) 2002 The OpenSSL Project. All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in 18 * the documentation and/or other materials provided with the 19 * distribution. 20 * 21 * 3. All advertising materials mentioning features or use of this 22 * software must display the following acknowledgment: 23 * "This product includes software developed by the OpenSSL Project 24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 25 * 26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 27 * endorse or promote products derived from this software without 28 * prior written permission. For written permission, please contact 29 * licensing@OpenSSL.org. 30 * 31 * 5. Products derived from this software may not be called "OpenSSL" 32 * nor may "OpenSSL" appear in their names without prior written 33 * permission of the OpenSSL Project. 34 * 35 * 6. Redistributions of any form whatsoever must retain the following 36 * acknowledgment: 37 * "This product includes software developed by the OpenSSL Project 38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 51 * OF THE POSSIBILITY OF SUCH DAMAGE. 52 * ==================================================================== 53 * 54 * This product includes cryptographic software written by Eric Young 55 * (eay@cryptsoft.com). This product includes software written by Tim 56 * Hudson (tjh@cryptsoft.com). 57 * 58 */ 59 60#include "cryptlib.h" 61#include <openssl/asn1.h> 62#include <openssl/x509v3.h> 63 64#define ASN1_GEN_FLAG 0x10000 65#define ASN1_GEN_FLAG_IMP (ASN1_GEN_FLAG|1) 66#define ASN1_GEN_FLAG_EXP (ASN1_GEN_FLAG|2) 67#define ASN1_GEN_FLAG_TAG (ASN1_GEN_FLAG|3) 68#define ASN1_GEN_FLAG_BITWRAP (ASN1_GEN_FLAG|4) 69#define ASN1_GEN_FLAG_OCTWRAP (ASN1_GEN_FLAG|5) 70#define ASN1_GEN_FLAG_SEQWRAP (ASN1_GEN_FLAG|6) 71#define ASN1_GEN_FLAG_SETWRAP (ASN1_GEN_FLAG|7) 72#define ASN1_GEN_FLAG_FORMAT (ASN1_GEN_FLAG|8) 73 74#define ASN1_GEN_STR(str,val) {str, sizeof(str) - 1, val} 75 76#define ASN1_FLAG_EXP_MAX 20 77 78/* Input formats */ 79 80/* ASCII: default */ 81#define ASN1_GEN_FORMAT_ASCII 1 82/* UTF8 */ 83#define ASN1_GEN_FORMAT_UTF8 2 84/* Hex */ 85#define ASN1_GEN_FORMAT_HEX 3 86/* List of bits */ 87#define ASN1_GEN_FORMAT_BITLIST 4 88 89struct tag_name_st { 90 const char *strnam; 91 int len; 92 int tag; 93}; 94 95typedef struct { 96 int exp_tag; 97 int exp_class; 98 int exp_constructed; 99 int exp_pad; 100 long exp_len; 101} tag_exp_type; 102 103typedef struct { 104 int imp_tag; 105 int imp_class; 106 int utype; 107 int format; 108 const char *str; 109 tag_exp_type exp_list[ASN1_FLAG_EXP_MAX]; 110 int exp_count; 111} tag_exp_arg; 112 113static int bitstr_cb(const char *elem, int len, void *bitstr); 114static int asn1_cb(const char *elem, int len, void *bitstr); 115static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class, 116 int exp_constructed, int exp_pad, int imp_ok); 117static int parse_tagging(const char *vstart, int vlen, int *ptag, 118 int *pclass); 119static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf); 120static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype); 121static int asn1_str2tag(const char *tagstr, int len); 122 123ASN1_TYPE *ASN1_generate_nconf(char *str, CONF *nconf) 124{ 125 X509V3_CTX cnf; 126 127 if (!nconf) 128 return ASN1_generate_v3(str, NULL); 129 130 X509V3_set_nconf(&cnf, nconf); 131 return ASN1_generate_v3(str, &cnf); 132} 133 134ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf) 135{ 136 ASN1_TYPE *ret; 137 tag_exp_arg asn1_tags; 138 tag_exp_type *etmp; 139 140 int i, len; 141 142 unsigned char *orig_der = NULL, *new_der = NULL; 143 const unsigned char *cpy_start; 144 unsigned char *p; 145 const unsigned char *cp; 146 int cpy_len; 147 long hdr_len; 148 int hdr_constructed = 0, hdr_tag, hdr_class; 149 int r; 150 151 asn1_tags.imp_tag = -1; 152 asn1_tags.imp_class = -1; 153 asn1_tags.format = ASN1_GEN_FORMAT_ASCII; 154 asn1_tags.exp_count = 0; 155 if (CONF_parse_list(str, ',', 1, asn1_cb, &asn1_tags) != 0) 156 return NULL; 157 158 if ((asn1_tags.utype == V_ASN1_SEQUENCE) 159 || (asn1_tags.utype == V_ASN1_SET)) { 160 if (!cnf) { 161 ASN1err(ASN1_F_ASN1_GENERATE_V3, 162 ASN1_R_SEQUENCE_OR_SET_NEEDS_CONFIG); 163 return NULL; 164 } 165 ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf); 166 } else 167 ret = asn1_str2type(asn1_tags.str, asn1_tags.format, asn1_tags.utype); 168 169 if (!ret) 170 return NULL; 171 172 /* If no tagging return base type */ 173 if ((asn1_tags.imp_tag == -1) && (asn1_tags.exp_count == 0)) 174 return ret; 175 176 /* Generate the encoding */ 177 cpy_len = i2d_ASN1_TYPE(ret, &orig_der); 178 ASN1_TYPE_free(ret); 179 ret = NULL; 180 /* Set point to start copying for modified encoding */ 181 cpy_start = orig_der; 182 183 /* Do we need IMPLICIT tagging? */ 184 if (asn1_tags.imp_tag != -1) { 185 /* If IMPLICIT we will replace the underlying tag */ 186 /* Skip existing tag+len */ 187 r = ASN1_get_object(&cpy_start, &hdr_len, &hdr_tag, &hdr_class, 188 cpy_len); 189 if (r & 0x80) 190 goto err; 191 /* Update copy length */ 192 cpy_len -= cpy_start - orig_der; 193 /* 194 * For IMPLICIT tagging the length should match the original length 195 * and constructed flag should be consistent. 196 */ 197 if (r & 0x1) { 198 /* Indefinite length constructed */ 199 hdr_constructed = 2; 200 hdr_len = 0; 201 } else 202 /* Just retain constructed flag */ 203 hdr_constructed = r & V_ASN1_CONSTRUCTED; 204 /* 205 * Work out new length with IMPLICIT tag: ignore constructed because 206 * it will mess up if indefinite length 207 */ 208 len = ASN1_object_size(0, hdr_len, asn1_tags.imp_tag); 209 } else 210 len = cpy_len; 211 212 /* Work out length in any EXPLICIT, starting from end */ 213 214 for (i = 0, etmp = asn1_tags.exp_list + asn1_tags.exp_count - 1; 215 i < asn1_tags.exp_count; i++, etmp--) { 216 /* Content length: number of content octets + any padding */ 217 len += etmp->exp_pad; 218 etmp->exp_len = len; 219 /* Total object length: length including new header */ 220 len = ASN1_object_size(0, len, etmp->exp_tag); 221 } 222 223 /* Allocate buffer for new encoding */ 224 225 new_der = OPENSSL_malloc(len); 226 if (!new_der) 227 goto err; 228 229 /* Generate tagged encoding */ 230 231 p = new_der; 232 233 /* Output explicit tags first */ 234 235 for (i = 0, etmp = asn1_tags.exp_list; i < asn1_tags.exp_count; 236 i++, etmp++) { 237 ASN1_put_object(&p, etmp->exp_constructed, etmp->exp_len, 238 etmp->exp_tag, etmp->exp_class); 239 if (etmp->exp_pad) 240 *p++ = 0; 241 } 242 243 /* If IMPLICIT, output tag */ 244 245 if (asn1_tags.imp_tag != -1) { 246 if (asn1_tags.imp_class == V_ASN1_UNIVERSAL 247 && (asn1_tags.imp_tag == V_ASN1_SEQUENCE 248 || asn1_tags.imp_tag == V_ASN1_SET)) 249 hdr_constructed = V_ASN1_CONSTRUCTED; 250 ASN1_put_object(&p, hdr_constructed, hdr_len, 251 asn1_tags.imp_tag, asn1_tags.imp_class); 252 } 253 254 /* Copy across original encoding */ 255 memcpy(p, cpy_start, cpy_len); 256 257 cp = new_der; 258 259 /* Obtain new ASN1_TYPE structure */ 260 ret = d2i_ASN1_TYPE(NULL, &cp, len); 261 262 err: 263 if (orig_der) 264 OPENSSL_free(orig_der); 265 if (new_der) 266 OPENSSL_free(new_der); 267 268 return ret; 269 270} 271 272static int asn1_cb(const char *elem, int len, void *bitstr) 273{ 274 tag_exp_arg *arg = bitstr; 275 int i; 276 int utype; 277 int vlen = 0; 278 const char *p, *vstart = NULL; 279 280 int tmp_tag, tmp_class; 281 282 if (elem == NULL) 283 return 0; 284 285 for (i = 0, p = elem; i < len; p++, i++) { 286 /* Look for the ':' in name value pairs */ 287 if (*p == ':') { 288 vstart = p + 1; 289 vlen = len - (vstart - elem); 290 len = p - elem; 291 break; 292 } 293 } 294 295 utype = asn1_str2tag(elem, len); 296 297 if (utype == -1) { 298 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKNOWN_TAG); 299 ERR_add_error_data(2, "tag=", elem); 300 return -1; 301 } 302 303 /* If this is not a modifier mark end of string and exit */ 304 if (!(utype & ASN1_GEN_FLAG)) { 305 arg->utype = utype; 306 arg->str = vstart; 307 /* If no value and not end of string, error */ 308 if (!vstart && elem[len]) { 309 ASN1err(ASN1_F_ASN1_CB, ASN1_R_MISSING_VALUE); 310 return -1; 311 } 312 return 0; 313 } 314 315 switch (utype) { 316 317 case ASN1_GEN_FLAG_IMP: 318 /* Check for illegal multiple IMPLICIT tagging */ 319 if (arg->imp_tag != -1) { 320 ASN1err(ASN1_F_ASN1_CB, ASN1_R_ILLEGAL_NESTED_TAGGING); 321 return -1; 322 } 323 if (!parse_tagging(vstart, vlen, &arg->imp_tag, &arg->imp_class)) 324 return -1; 325 break; 326 327 case ASN1_GEN_FLAG_EXP: 328 329 if (!parse_tagging(vstart, vlen, &tmp_tag, &tmp_class)) 330 return -1; 331 if (!append_exp(arg, tmp_tag, tmp_class, 1, 0, 0)) 332 return -1; 333 break; 334 335 case ASN1_GEN_FLAG_SEQWRAP: 336 if (!append_exp(arg, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL, 1, 0, 1)) 337 return -1; 338 break; 339 340 case ASN1_GEN_FLAG_SETWRAP: 341 if (!append_exp(arg, V_ASN1_SET, V_ASN1_UNIVERSAL, 1, 0, 1)) 342 return -1; 343 break; 344 345 case ASN1_GEN_FLAG_BITWRAP: 346 if (!append_exp(arg, V_ASN1_BIT_STRING, V_ASN1_UNIVERSAL, 0, 1, 1)) 347 return -1; 348 break; 349 350 case ASN1_GEN_FLAG_OCTWRAP: 351 if (!append_exp(arg, V_ASN1_OCTET_STRING, V_ASN1_UNIVERSAL, 0, 0, 1)) 352 return -1; 353 break; 354 355 case ASN1_GEN_FLAG_FORMAT: 356 if(!vstart) { 357 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKNOWN_FORMAT); 358 return -1; 359 } 360 if (!strncmp(vstart, "ASCII", 5)) 361 arg->format = ASN1_GEN_FORMAT_ASCII; 362 else if (!strncmp(vstart, "UTF8", 4)) 363 arg->format = ASN1_GEN_FORMAT_UTF8; 364 else if (!strncmp(vstart, "HEX", 3)) 365 arg->format = ASN1_GEN_FORMAT_HEX; 366 else if (!strncmp(vstart, "BITLIST", 7)) 367 arg->format = ASN1_GEN_FORMAT_BITLIST; 368 else { 369 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKOWN_FORMAT); 370 return -1; 371 } 372 break; 373 374 } 375 376 return 1; 377 378} 379 380static int parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass) 381{ 382 char erch[2]; 383 long tag_num; 384 char *eptr; 385 if (!vstart) 386 return 0; 387 tag_num = strtoul(vstart, &eptr, 10); 388 /* Check we haven't gone past max length: should be impossible */ 389 if (eptr && *eptr && (eptr > vstart + vlen)) 390 return 0; 391 if (tag_num < 0) { 392 ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_NUMBER); 393 return 0; 394 } 395 *ptag = tag_num; 396 /* If we have non numeric characters, parse them */ 397 if (eptr) 398 vlen -= eptr - vstart; 399 else 400 vlen = 0; 401 if (vlen) { 402 switch (*eptr) { 403 404 case 'U': 405 *pclass = V_ASN1_UNIVERSAL; 406 break; 407 408 case 'A': 409 *pclass = V_ASN1_APPLICATION; 410 break; 411 412 case 'P': 413 *pclass = V_ASN1_PRIVATE; 414 break; 415 416 case 'C': 417 *pclass = V_ASN1_CONTEXT_SPECIFIC; 418 break; 419 420 default: 421 erch[0] = *eptr; 422 erch[1] = 0; 423 ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_MODIFIER); 424 ERR_add_error_data(2, "Char=", erch); 425 return 0; 426 break; 427 428 } 429 } else 430 *pclass = V_ASN1_CONTEXT_SPECIFIC; 431 432 return 1; 433 434} 435 436/* Handle multiple types: SET and SEQUENCE */ 437 438static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf) 439{ 440 ASN1_TYPE *ret = NULL; 441 STACK_OF(ASN1_TYPE) *sk = NULL; 442 STACK_OF(CONF_VALUE) *sect = NULL; 443 unsigned char *der = NULL; 444 int derlen; 445 int i; 446 sk = sk_ASN1_TYPE_new_null(); 447 if (!sk) 448 goto bad; 449 if (section) { 450 if (!cnf) 451 goto bad; 452 sect = X509V3_get_section(cnf, (char *)section); 453 if (!sect) 454 goto bad; 455 for (i = 0; i < sk_CONF_VALUE_num(sect); i++) { 456 ASN1_TYPE *typ = 457 ASN1_generate_v3(sk_CONF_VALUE_value(sect, i)->value, cnf); 458 if (!typ) 459 goto bad; 460 if (!sk_ASN1_TYPE_push(sk, typ)) 461 goto bad; 462 } 463 } 464 465 /* 466 * Now we has a STACK of the components, convert to the correct form 467 */ 468 469 if (utype == V_ASN1_SET) 470 derlen = i2d_ASN1_SET_ANY(sk, &der); 471 else 472 derlen = i2d_ASN1_SEQUENCE_ANY(sk, &der); 473 474 if (derlen < 0) 475 goto bad; 476 477 if (!(ret = ASN1_TYPE_new())) 478 goto bad; 479 480 if (!(ret->value.asn1_string = ASN1_STRING_type_new(utype))) 481 goto bad; 482 483 ret->type = utype; 484 485 ret->value.asn1_string->data = der; 486 ret->value.asn1_string->length = derlen; 487 488 der = NULL; 489 490 bad: 491 492 if (der) 493 OPENSSL_free(der); 494 495 if (sk) 496 sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free); 497 if (sect) 498 X509V3_section_free(cnf, sect); 499 500 return ret; 501} 502 503static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class, 504 int exp_constructed, int exp_pad, int imp_ok) 505{ 506 tag_exp_type *exp_tmp; 507 /* Can only have IMPLICIT if permitted */ 508 if ((arg->imp_tag != -1) && !imp_ok) { 509 ASN1err(ASN1_F_APPEND_EXP, ASN1_R_ILLEGAL_IMPLICIT_TAG); 510 return 0; 511 } 512 513 if (arg->exp_count == ASN1_FLAG_EXP_MAX) { 514 ASN1err(ASN1_F_APPEND_EXP, ASN1_R_DEPTH_EXCEEDED); 515 return 0; 516 } 517 518 exp_tmp = &arg->exp_list[arg->exp_count++]; 519 520 /* 521 * If IMPLICIT set tag to implicit value then reset implicit tag since it 522 * has been used. 523 */ 524 if (arg->imp_tag != -1) { 525 exp_tmp->exp_tag = arg->imp_tag; 526 exp_tmp->exp_class = arg->imp_class; 527 arg->imp_tag = -1; 528 arg->imp_class = -1; 529 } else { 530 exp_tmp->exp_tag = exp_tag; 531 exp_tmp->exp_class = exp_class; 532 } 533 exp_tmp->exp_constructed = exp_constructed; 534 exp_tmp->exp_pad = exp_pad; 535 536 return 1; 537} 538 539static int asn1_str2tag(const char *tagstr, int len) 540{ 541 unsigned int i; 542 static const struct tag_name_st *tntmp, tnst[] = { 543 ASN1_GEN_STR("BOOL", V_ASN1_BOOLEAN), 544 ASN1_GEN_STR("BOOLEAN", V_ASN1_BOOLEAN), 545 ASN1_GEN_STR("NULL", V_ASN1_NULL), 546 ASN1_GEN_STR("INT", V_ASN1_INTEGER), 547 ASN1_GEN_STR("INTEGER", V_ASN1_INTEGER), 548 ASN1_GEN_STR("ENUM", V_ASN1_ENUMERATED), 549 ASN1_GEN_STR("ENUMERATED", V_ASN1_ENUMERATED), 550 ASN1_GEN_STR("OID", V_ASN1_OBJECT), 551 ASN1_GEN_STR("OBJECT", V_ASN1_OBJECT), 552 ASN1_GEN_STR("UTCTIME", V_ASN1_UTCTIME), 553 ASN1_GEN_STR("UTC", V_ASN1_UTCTIME), 554 ASN1_GEN_STR("GENERALIZEDTIME", V_ASN1_GENERALIZEDTIME), 555 ASN1_GEN_STR("GENTIME", V_ASN1_GENERALIZEDTIME), 556 ASN1_GEN_STR("OCT", V_ASN1_OCTET_STRING), 557 ASN1_GEN_STR("OCTETSTRING", V_ASN1_OCTET_STRING), 558 ASN1_GEN_STR("BITSTR", V_ASN1_BIT_STRING), 559 ASN1_GEN_STR("BITSTRING", V_ASN1_BIT_STRING), 560 ASN1_GEN_STR("UNIVERSALSTRING", V_ASN1_UNIVERSALSTRING), 561 ASN1_GEN_STR("UNIV", V_ASN1_UNIVERSALSTRING), 562 ASN1_GEN_STR("IA5", V_ASN1_IA5STRING), 563 ASN1_GEN_STR("IA5STRING", V_ASN1_IA5STRING), 564 ASN1_GEN_STR("UTF8", V_ASN1_UTF8STRING), 565 ASN1_GEN_STR("UTF8String", V_ASN1_UTF8STRING), 566 ASN1_GEN_STR("BMP", V_ASN1_BMPSTRING), 567 ASN1_GEN_STR("BMPSTRING", V_ASN1_BMPSTRING), 568 ASN1_GEN_STR("VISIBLESTRING", V_ASN1_VISIBLESTRING), 569 ASN1_GEN_STR("VISIBLE", V_ASN1_VISIBLESTRING), 570 ASN1_GEN_STR("PRINTABLESTRING", V_ASN1_PRINTABLESTRING), 571 ASN1_GEN_STR("PRINTABLE", V_ASN1_PRINTABLESTRING), 572 ASN1_GEN_STR("T61", V_ASN1_T61STRING), 573 ASN1_GEN_STR("T61STRING", V_ASN1_T61STRING), 574 ASN1_GEN_STR("TELETEXSTRING", V_ASN1_T61STRING), 575 ASN1_GEN_STR("GeneralString", V_ASN1_GENERALSTRING), 576 ASN1_GEN_STR("GENSTR", V_ASN1_GENERALSTRING), 577 ASN1_GEN_STR("NUMERIC", V_ASN1_NUMERICSTRING), 578 ASN1_GEN_STR("NUMERICSTRING", V_ASN1_NUMERICSTRING), 579 580 /* Special cases */ 581 ASN1_GEN_STR("SEQUENCE", V_ASN1_SEQUENCE), 582 ASN1_GEN_STR("SEQ", V_ASN1_SEQUENCE), 583 ASN1_GEN_STR("SET", V_ASN1_SET), 584 /* type modifiers */ 585 /* Explicit tag */ 586 ASN1_GEN_STR("EXP", ASN1_GEN_FLAG_EXP), 587 ASN1_GEN_STR("EXPLICIT", ASN1_GEN_FLAG_EXP), 588 /* Implicit tag */ 589 ASN1_GEN_STR("IMP", ASN1_GEN_FLAG_IMP), 590 ASN1_GEN_STR("IMPLICIT", ASN1_GEN_FLAG_IMP), 591 /* OCTET STRING wrapper */ 592 ASN1_GEN_STR("OCTWRAP", ASN1_GEN_FLAG_OCTWRAP), 593 /* SEQUENCE wrapper */ 594 ASN1_GEN_STR("SEQWRAP", ASN1_GEN_FLAG_SEQWRAP), 595 /* SET wrapper */ 596 ASN1_GEN_STR("SETWRAP", ASN1_GEN_FLAG_SETWRAP), 597 /* BIT STRING wrapper */ 598 ASN1_GEN_STR("BITWRAP", ASN1_GEN_FLAG_BITWRAP), 599 ASN1_GEN_STR("FORM", ASN1_GEN_FLAG_FORMAT), 600 ASN1_GEN_STR("FORMAT", ASN1_GEN_FLAG_FORMAT), 601 }; 602 603 if (len == -1) 604 len = strlen(tagstr); 605 606 tntmp = tnst; 607 for (i = 0; i < sizeof(tnst) / sizeof(struct tag_name_st); i++, tntmp++) { 608 if ((len == tntmp->len) && !strncmp(tntmp->strnam, tagstr, len)) 609 return tntmp->tag; 610 } 611 612 return -1; 613} 614 615static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype) 616{ 617 ASN1_TYPE *atmp = NULL; 618 619 CONF_VALUE vtmp; 620 621 unsigned char *rdata; 622 long rdlen; 623 624 int no_unused = 1; 625 626 if (!(atmp = ASN1_TYPE_new())) { 627 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE); 628 return NULL; 629 } 630 631 if (!str) 632 str = ""; 633 634 switch (utype) { 635 636 case V_ASN1_NULL: 637 if (str && *str) { 638 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_NULL_VALUE); 639 goto bad_form; 640 } 641 break; 642 643 case V_ASN1_BOOLEAN: 644 if (format != ASN1_GEN_FORMAT_ASCII) { 645 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_NOT_ASCII_FORMAT); 646 goto bad_form; 647 } 648 vtmp.name = NULL; 649 vtmp.section = NULL; 650 vtmp.value = (char *)str; 651 if (!X509V3_get_value_bool(&vtmp, &atmp->value.boolean)) { 652 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_BOOLEAN); 653 goto bad_str; 654 } 655 break; 656 657 case V_ASN1_INTEGER: 658 case V_ASN1_ENUMERATED: 659 if (format != ASN1_GEN_FORMAT_ASCII) { 660 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_INTEGER_NOT_ASCII_FORMAT); 661 goto bad_form; 662 } 663 if (!(atmp->value.integer = s2i_ASN1_INTEGER(NULL, (char *)str))) { 664 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_INTEGER); 665 goto bad_str; 666 } 667 break; 668 669 case V_ASN1_OBJECT: 670 if (format != ASN1_GEN_FORMAT_ASCII) { 671 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_OBJECT_NOT_ASCII_FORMAT); 672 goto bad_form; 673 } 674 if (!(atmp->value.object = OBJ_txt2obj(str, 0))) { 675 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_OBJECT); 676 goto bad_str; 677 } 678 break; 679 680 case V_ASN1_UTCTIME: 681 case V_ASN1_GENERALIZEDTIME: 682 if (format != ASN1_GEN_FORMAT_ASCII) { 683 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_TIME_NOT_ASCII_FORMAT); 684 goto bad_form; 685 } 686 if (!(atmp->value.asn1_string = ASN1_STRING_new())) { 687 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE); 688 goto bad_str; 689 } 690 if (!ASN1_STRING_set(atmp->value.asn1_string, str, -1)) { 691 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE); 692 goto bad_str; 693 } 694 atmp->value.asn1_string->type = utype; 695 if (!ASN1_TIME_check(atmp->value.asn1_string)) { 696 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_TIME_VALUE); 697 goto bad_str; 698 } 699 700 break; 701 702 case V_ASN1_BMPSTRING: 703 case V_ASN1_PRINTABLESTRING: 704 case V_ASN1_IA5STRING: 705 case V_ASN1_T61STRING: 706 case V_ASN1_UTF8STRING: 707 case V_ASN1_VISIBLESTRING: 708 case V_ASN1_UNIVERSALSTRING: 709 case V_ASN1_GENERALSTRING: 710 case V_ASN1_NUMERICSTRING: 711 712 if (format == ASN1_GEN_FORMAT_ASCII) 713 format = MBSTRING_ASC; 714 else if (format == ASN1_GEN_FORMAT_UTF8) 715 format = MBSTRING_UTF8; 716 else { 717 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_FORMAT); 718 goto bad_form; 719 } 720 721 if (ASN1_mbstring_copy(&atmp->value.asn1_string, (unsigned char *)str, 722 -1, format, ASN1_tag2bit(utype)) <= 0) { 723 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE); 724 goto bad_str; 725 } 726 727 break; 728 729 case V_ASN1_BIT_STRING: 730 731 case V_ASN1_OCTET_STRING: 732 733 if (!(atmp->value.asn1_string = ASN1_STRING_new())) { 734 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE); 735 goto bad_form; 736 } 737 738 if (format == ASN1_GEN_FORMAT_HEX) { 739 740 if (!(rdata = string_to_hex((char *)str, &rdlen))) { 741 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_HEX); 742 goto bad_str; 743 } 744 745 atmp->value.asn1_string->data = rdata; 746 atmp->value.asn1_string->length = rdlen; 747 atmp->value.asn1_string->type = utype; 748 749 } else if (format == ASN1_GEN_FORMAT_ASCII) 750 ASN1_STRING_set(atmp->value.asn1_string, str, -1); 751 else if ((format == ASN1_GEN_FORMAT_BITLIST) 752 && (utype == V_ASN1_BIT_STRING)) { 753 if (!CONF_parse_list 754 (str, ',', 1, bitstr_cb, atmp->value.bit_string)) { 755 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_LIST_ERROR); 756 goto bad_str; 757 } 758 no_unused = 0; 759 760 } else { 761 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_BITSTRING_FORMAT); 762 goto bad_form; 763 } 764 765 if ((utype == V_ASN1_BIT_STRING) && no_unused) { 766 atmp->value.asn1_string->flags 767 &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 768 atmp->value.asn1_string->flags |= ASN1_STRING_FLAG_BITS_LEFT; 769 } 770 771 break; 772 773 default: 774 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_UNSUPPORTED_TYPE); 775 goto bad_str; 776 break; 777 } 778 779 atmp->type = utype; 780 return atmp; 781 782 bad_str: 783 ERR_add_error_data(2, "string=", str); 784 bad_form: 785 786 ASN1_TYPE_free(atmp); 787 return NULL; 788 789} 790 791static int bitstr_cb(const char *elem, int len, void *bitstr) 792{ 793 long bitnum; 794 char *eptr; 795 if (!elem) 796 return 0; 797 bitnum = strtoul(elem, &eptr, 10); 798 if (eptr && *eptr && (eptr != elem + len)) 799 return 0; 800 if (bitnum < 0) { 801 ASN1err(ASN1_F_BITSTR_CB, ASN1_R_INVALID_NUMBER); 802 return 0; 803 } 804 if (!ASN1_BIT_STRING_set_bit(bitstr, bitnum, 1)) { 805 ASN1err(ASN1_F_BITSTR_CB, ERR_R_MALLOC_FAILURE); 806 return 0; 807 } 808 return 1; 809} 810