OpenSSL: update to 1.0.1m
[tomato.git] / release / src / router / openssl / crypto / asn1 / asn1_gen.c
blob11b582dd3744c305be2c7de8e58dd474b89eaa27
1 /* asn1_gen.c */
2 /*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 2002.
5 */
6 /* ====================================================================
7 * Copyright (c) 2002 The OpenSSL Project. All rights reserved.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in
18 * the documentation and/or other materials provided with the
19 * distribution.
21 * 3. All advertising materials mentioning features or use of this
22 * software must display the following acknowledgment:
23 * "This product includes software developed by the OpenSSL Project
24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 * endorse or promote products derived from this software without
28 * prior written permission. For written permission, please contact
29 * licensing@OpenSSL.org.
31 * 5. Products derived from this software may not be called "OpenSSL"
32 * nor may "OpenSSL" appear in their names without prior written
33 * permission of the OpenSSL Project.
35 * 6. Redistributions of any form whatsoever must retain the following
36 * acknowledgment:
37 * "This product includes software developed by the OpenSSL Project
38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com). This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com).
60 #include "cryptlib.h"
61 #include <openssl/asn1.h>
62 #include <openssl/x509v3.h>
64 #define ASN1_GEN_FLAG 0x10000
65 #define ASN1_GEN_FLAG_IMP (ASN1_GEN_FLAG|1)
66 #define ASN1_GEN_FLAG_EXP (ASN1_GEN_FLAG|2)
67 #define ASN1_GEN_FLAG_TAG (ASN1_GEN_FLAG|3)
68 #define ASN1_GEN_FLAG_BITWRAP (ASN1_GEN_FLAG|4)
69 #define ASN1_GEN_FLAG_OCTWRAP (ASN1_GEN_FLAG|5)
70 #define ASN1_GEN_FLAG_SEQWRAP (ASN1_GEN_FLAG|6)
71 #define ASN1_GEN_FLAG_SETWRAP (ASN1_GEN_FLAG|7)
72 #define ASN1_GEN_FLAG_FORMAT (ASN1_GEN_FLAG|8)
74 #define ASN1_GEN_STR(str,val) {str, sizeof(str) - 1, val}
76 #define ASN1_FLAG_EXP_MAX 20
78 /* Input formats */
80 /* ASCII: default */
81 #define ASN1_GEN_FORMAT_ASCII 1
82 /* UTF8 */
83 #define ASN1_GEN_FORMAT_UTF8 2
84 /* Hex */
85 #define ASN1_GEN_FORMAT_HEX 3
86 /* List of bits */
87 #define ASN1_GEN_FORMAT_BITLIST 4
89 struct tag_name_st {
90 const char *strnam;
91 int len;
92 int tag;
95 typedef struct {
96 int exp_tag;
97 int exp_class;
98 int exp_constructed;
99 int exp_pad;
100 long exp_len;
101 } tag_exp_type;
103 typedef struct {
104 int imp_tag;
105 int imp_class;
106 int utype;
107 int format;
108 const char *str;
109 tag_exp_type exp_list[ASN1_FLAG_EXP_MAX];
110 int exp_count;
111 } tag_exp_arg;
113 static int bitstr_cb(const char *elem, int len, void *bitstr);
114 static int asn1_cb(const char *elem, int len, void *bitstr);
115 static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class,
116 int exp_constructed, int exp_pad, int imp_ok);
117 static int parse_tagging(const char *vstart, int vlen, int *ptag,
118 int *pclass);
119 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf);
120 static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype);
121 static int asn1_str2tag(const char *tagstr, int len);
123 ASN1_TYPE *ASN1_generate_nconf(char *str, CONF *nconf)
125 X509V3_CTX cnf;
127 if (!nconf)
128 return ASN1_generate_v3(str, NULL);
130 X509V3_set_nconf(&cnf, nconf);
131 return ASN1_generate_v3(str, &cnf);
134 ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf)
136 ASN1_TYPE *ret;
137 tag_exp_arg asn1_tags;
138 tag_exp_type *etmp;
140 int i, len;
142 unsigned char *orig_der = NULL, *new_der = NULL;
143 const unsigned char *cpy_start;
144 unsigned char *p;
145 const unsigned char *cp;
146 int cpy_len;
147 long hdr_len;
148 int hdr_constructed = 0, hdr_tag, hdr_class;
149 int r;
151 asn1_tags.imp_tag = -1;
152 asn1_tags.imp_class = -1;
153 asn1_tags.format = ASN1_GEN_FORMAT_ASCII;
154 asn1_tags.exp_count = 0;
155 if (CONF_parse_list(str, ',', 1, asn1_cb, &asn1_tags) != 0)
156 return NULL;
158 if ((asn1_tags.utype == V_ASN1_SEQUENCE)
159 || (asn1_tags.utype == V_ASN1_SET)) {
160 if (!cnf) {
161 ASN1err(ASN1_F_ASN1_GENERATE_V3,
162 ASN1_R_SEQUENCE_OR_SET_NEEDS_CONFIG);
163 return NULL;
165 ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf);
166 } else
167 ret = asn1_str2type(asn1_tags.str, asn1_tags.format, asn1_tags.utype);
169 if (!ret)
170 return NULL;
172 /* If no tagging return base type */
173 if ((asn1_tags.imp_tag == -1) && (asn1_tags.exp_count == 0))
174 return ret;
176 /* Generate the encoding */
177 cpy_len = i2d_ASN1_TYPE(ret, &orig_der);
178 ASN1_TYPE_free(ret);
179 ret = NULL;
180 /* Set point to start copying for modified encoding */
181 cpy_start = orig_der;
183 /* Do we need IMPLICIT tagging? */
184 if (asn1_tags.imp_tag != -1) {
185 /* If IMPLICIT we will replace the underlying tag */
186 /* Skip existing tag+len */
187 r = ASN1_get_object(&cpy_start, &hdr_len, &hdr_tag, &hdr_class,
188 cpy_len);
189 if (r & 0x80)
190 goto err;
191 /* Update copy length */
192 cpy_len -= cpy_start - orig_der;
194 * For IMPLICIT tagging the length should match the original length
195 * and constructed flag should be consistent.
197 if (r & 0x1) {
198 /* Indefinite length constructed */
199 hdr_constructed = 2;
200 hdr_len = 0;
201 } else
202 /* Just retain constructed flag */
203 hdr_constructed = r & V_ASN1_CONSTRUCTED;
205 * Work out new length with IMPLICIT tag: ignore constructed because
206 * it will mess up if indefinite length
208 len = ASN1_object_size(0, hdr_len, asn1_tags.imp_tag);
209 } else
210 len = cpy_len;
212 /* Work out length in any EXPLICIT, starting from end */
214 for (i = 0, etmp = asn1_tags.exp_list + asn1_tags.exp_count - 1;
215 i < asn1_tags.exp_count; i++, etmp--) {
216 /* Content length: number of content octets + any padding */
217 len += etmp->exp_pad;
218 etmp->exp_len = len;
219 /* Total object length: length including new header */
220 len = ASN1_object_size(0, len, etmp->exp_tag);
223 /* Allocate buffer for new encoding */
225 new_der = OPENSSL_malloc(len);
226 if (!new_der)
227 goto err;
229 /* Generate tagged encoding */
231 p = new_der;
233 /* Output explicit tags first */
235 for (i = 0, etmp = asn1_tags.exp_list; i < asn1_tags.exp_count;
236 i++, etmp++) {
237 ASN1_put_object(&p, etmp->exp_constructed, etmp->exp_len,
238 etmp->exp_tag, etmp->exp_class);
239 if (etmp->exp_pad)
240 *p++ = 0;
243 /* If IMPLICIT, output tag */
245 if (asn1_tags.imp_tag != -1) {
246 if (asn1_tags.imp_class == V_ASN1_UNIVERSAL
247 && (asn1_tags.imp_tag == V_ASN1_SEQUENCE
248 || asn1_tags.imp_tag == V_ASN1_SET))
249 hdr_constructed = V_ASN1_CONSTRUCTED;
250 ASN1_put_object(&p, hdr_constructed, hdr_len,
251 asn1_tags.imp_tag, asn1_tags.imp_class);
254 /* Copy across original encoding */
255 memcpy(p, cpy_start, cpy_len);
257 cp = new_der;
259 /* Obtain new ASN1_TYPE structure */
260 ret = d2i_ASN1_TYPE(NULL, &cp, len);
262 err:
263 if (orig_der)
264 OPENSSL_free(orig_der);
265 if (new_der)
266 OPENSSL_free(new_der);
268 return ret;
272 static int asn1_cb(const char *elem, int len, void *bitstr)
274 tag_exp_arg *arg = bitstr;
275 int i;
276 int utype;
277 int vlen = 0;
278 const char *p, *vstart = NULL;
280 int tmp_tag, tmp_class;
282 if (elem == NULL)
283 return 0;
285 for (i = 0, p = elem; i < len; p++, i++) {
286 /* Look for the ':' in name value pairs */
287 if (*p == ':') {
288 vstart = p + 1;
289 vlen = len - (vstart - elem);
290 len = p - elem;
291 break;
295 utype = asn1_str2tag(elem, len);
297 if (utype == -1) {
298 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKNOWN_TAG);
299 ERR_add_error_data(2, "tag=", elem);
300 return -1;
303 /* If this is not a modifier mark end of string and exit */
304 if (!(utype & ASN1_GEN_FLAG)) {
305 arg->utype = utype;
306 arg->str = vstart;
307 /* If no value and not end of string, error */
308 if (!vstart && elem[len]) {
309 ASN1err(ASN1_F_ASN1_CB, ASN1_R_MISSING_VALUE);
310 return -1;
312 return 0;
315 switch (utype) {
317 case ASN1_GEN_FLAG_IMP:
318 /* Check for illegal multiple IMPLICIT tagging */
319 if (arg->imp_tag != -1) {
320 ASN1err(ASN1_F_ASN1_CB, ASN1_R_ILLEGAL_NESTED_TAGGING);
321 return -1;
323 if (!parse_tagging(vstart, vlen, &arg->imp_tag, &arg->imp_class))
324 return -1;
325 break;
327 case ASN1_GEN_FLAG_EXP:
329 if (!parse_tagging(vstart, vlen, &tmp_tag, &tmp_class))
330 return -1;
331 if (!append_exp(arg, tmp_tag, tmp_class, 1, 0, 0))
332 return -1;
333 break;
335 case ASN1_GEN_FLAG_SEQWRAP:
336 if (!append_exp(arg, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL, 1, 0, 1))
337 return -1;
338 break;
340 case ASN1_GEN_FLAG_SETWRAP:
341 if (!append_exp(arg, V_ASN1_SET, V_ASN1_UNIVERSAL, 1, 0, 1))
342 return -1;
343 break;
345 case ASN1_GEN_FLAG_BITWRAP:
346 if (!append_exp(arg, V_ASN1_BIT_STRING, V_ASN1_UNIVERSAL, 0, 1, 1))
347 return -1;
348 break;
350 case ASN1_GEN_FLAG_OCTWRAP:
351 if (!append_exp(arg, V_ASN1_OCTET_STRING, V_ASN1_UNIVERSAL, 0, 0, 1))
352 return -1;
353 break;
355 case ASN1_GEN_FLAG_FORMAT:
356 if(!vstart) {
357 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKNOWN_FORMAT);
358 return -1;
360 if (!strncmp(vstart, "ASCII", 5))
361 arg->format = ASN1_GEN_FORMAT_ASCII;
362 else if (!strncmp(vstart, "UTF8", 4))
363 arg->format = ASN1_GEN_FORMAT_UTF8;
364 else if (!strncmp(vstart, "HEX", 3))
365 arg->format = ASN1_GEN_FORMAT_HEX;
366 else if (!strncmp(vstart, "BITLIST", 7))
367 arg->format = ASN1_GEN_FORMAT_BITLIST;
368 else {
369 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKOWN_FORMAT);
370 return -1;
372 break;
376 return 1;
380 static int parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass)
382 char erch[2];
383 long tag_num;
384 char *eptr;
385 if (!vstart)
386 return 0;
387 tag_num = strtoul(vstart, &eptr, 10);
388 /* Check we haven't gone past max length: should be impossible */
389 if (eptr && *eptr && (eptr > vstart + vlen))
390 return 0;
391 if (tag_num < 0) {
392 ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_NUMBER);
393 return 0;
395 *ptag = tag_num;
396 /* If we have non numeric characters, parse them */
397 if (eptr)
398 vlen -= eptr - vstart;
399 else
400 vlen = 0;
401 if (vlen) {
402 switch (*eptr) {
404 case 'U':
405 *pclass = V_ASN1_UNIVERSAL;
406 break;
408 case 'A':
409 *pclass = V_ASN1_APPLICATION;
410 break;
412 case 'P':
413 *pclass = V_ASN1_PRIVATE;
414 break;
416 case 'C':
417 *pclass = V_ASN1_CONTEXT_SPECIFIC;
418 break;
420 default:
421 erch[0] = *eptr;
422 erch[1] = 0;
423 ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_MODIFIER);
424 ERR_add_error_data(2, "Char=", erch);
425 return 0;
426 break;
429 } else
430 *pclass = V_ASN1_CONTEXT_SPECIFIC;
432 return 1;
436 /* Handle multiple types: SET and SEQUENCE */
438 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf)
440 ASN1_TYPE *ret = NULL;
441 STACK_OF(ASN1_TYPE) *sk = NULL;
442 STACK_OF(CONF_VALUE) *sect = NULL;
443 unsigned char *der = NULL;
444 int derlen;
445 int i;
446 sk = sk_ASN1_TYPE_new_null();
447 if (!sk)
448 goto bad;
449 if (section) {
450 if (!cnf)
451 goto bad;
452 sect = X509V3_get_section(cnf, (char *)section);
453 if (!sect)
454 goto bad;
455 for (i = 0; i < sk_CONF_VALUE_num(sect); i++) {
456 ASN1_TYPE *typ =
457 ASN1_generate_v3(sk_CONF_VALUE_value(sect, i)->value, cnf);
458 if (!typ)
459 goto bad;
460 if (!sk_ASN1_TYPE_push(sk, typ))
461 goto bad;
466 * Now we has a STACK of the components, convert to the correct form
469 if (utype == V_ASN1_SET)
470 derlen = i2d_ASN1_SET_ANY(sk, &der);
471 else
472 derlen = i2d_ASN1_SEQUENCE_ANY(sk, &der);
474 if (derlen < 0)
475 goto bad;
477 if (!(ret = ASN1_TYPE_new()))
478 goto bad;
480 if (!(ret->value.asn1_string = ASN1_STRING_type_new(utype)))
481 goto bad;
483 ret->type = utype;
485 ret->value.asn1_string->data = der;
486 ret->value.asn1_string->length = derlen;
488 der = NULL;
490 bad:
492 if (der)
493 OPENSSL_free(der);
495 if (sk)
496 sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free);
497 if (sect)
498 X509V3_section_free(cnf, sect);
500 return ret;
503 static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class,
504 int exp_constructed, int exp_pad, int imp_ok)
506 tag_exp_type *exp_tmp;
507 /* Can only have IMPLICIT if permitted */
508 if ((arg->imp_tag != -1) && !imp_ok) {
509 ASN1err(ASN1_F_APPEND_EXP, ASN1_R_ILLEGAL_IMPLICIT_TAG);
510 return 0;
513 if (arg->exp_count == ASN1_FLAG_EXP_MAX) {
514 ASN1err(ASN1_F_APPEND_EXP, ASN1_R_DEPTH_EXCEEDED);
515 return 0;
518 exp_tmp = &arg->exp_list[arg->exp_count++];
521 * If IMPLICIT set tag to implicit value then reset implicit tag since it
522 * has been used.
524 if (arg->imp_tag != -1) {
525 exp_tmp->exp_tag = arg->imp_tag;
526 exp_tmp->exp_class = arg->imp_class;
527 arg->imp_tag = -1;
528 arg->imp_class = -1;
529 } else {
530 exp_tmp->exp_tag = exp_tag;
531 exp_tmp->exp_class = exp_class;
533 exp_tmp->exp_constructed = exp_constructed;
534 exp_tmp->exp_pad = exp_pad;
536 return 1;
539 static int asn1_str2tag(const char *tagstr, int len)
541 unsigned int i;
542 static const struct tag_name_st *tntmp, tnst[] = {
543 ASN1_GEN_STR("BOOL", V_ASN1_BOOLEAN),
544 ASN1_GEN_STR("BOOLEAN", V_ASN1_BOOLEAN),
545 ASN1_GEN_STR("NULL", V_ASN1_NULL),
546 ASN1_GEN_STR("INT", V_ASN1_INTEGER),
547 ASN1_GEN_STR("INTEGER", V_ASN1_INTEGER),
548 ASN1_GEN_STR("ENUM", V_ASN1_ENUMERATED),
549 ASN1_GEN_STR("ENUMERATED", V_ASN1_ENUMERATED),
550 ASN1_GEN_STR("OID", V_ASN1_OBJECT),
551 ASN1_GEN_STR("OBJECT", V_ASN1_OBJECT),
552 ASN1_GEN_STR("UTCTIME", V_ASN1_UTCTIME),
553 ASN1_GEN_STR("UTC", V_ASN1_UTCTIME),
554 ASN1_GEN_STR("GENERALIZEDTIME", V_ASN1_GENERALIZEDTIME),
555 ASN1_GEN_STR("GENTIME", V_ASN1_GENERALIZEDTIME),
556 ASN1_GEN_STR("OCT", V_ASN1_OCTET_STRING),
557 ASN1_GEN_STR("OCTETSTRING", V_ASN1_OCTET_STRING),
558 ASN1_GEN_STR("BITSTR", V_ASN1_BIT_STRING),
559 ASN1_GEN_STR("BITSTRING", V_ASN1_BIT_STRING),
560 ASN1_GEN_STR("UNIVERSALSTRING", V_ASN1_UNIVERSALSTRING),
561 ASN1_GEN_STR("UNIV", V_ASN1_UNIVERSALSTRING),
562 ASN1_GEN_STR("IA5", V_ASN1_IA5STRING),
563 ASN1_GEN_STR("IA5STRING", V_ASN1_IA5STRING),
564 ASN1_GEN_STR("UTF8", V_ASN1_UTF8STRING),
565 ASN1_GEN_STR("UTF8String", V_ASN1_UTF8STRING),
566 ASN1_GEN_STR("BMP", V_ASN1_BMPSTRING),
567 ASN1_GEN_STR("BMPSTRING", V_ASN1_BMPSTRING),
568 ASN1_GEN_STR("VISIBLESTRING", V_ASN1_VISIBLESTRING),
569 ASN1_GEN_STR("VISIBLE", V_ASN1_VISIBLESTRING),
570 ASN1_GEN_STR("PRINTABLESTRING", V_ASN1_PRINTABLESTRING),
571 ASN1_GEN_STR("PRINTABLE", V_ASN1_PRINTABLESTRING),
572 ASN1_GEN_STR("T61", V_ASN1_T61STRING),
573 ASN1_GEN_STR("T61STRING", V_ASN1_T61STRING),
574 ASN1_GEN_STR("TELETEXSTRING", V_ASN1_T61STRING),
575 ASN1_GEN_STR("GeneralString", V_ASN1_GENERALSTRING),
576 ASN1_GEN_STR("GENSTR", V_ASN1_GENERALSTRING),
577 ASN1_GEN_STR("NUMERIC", V_ASN1_NUMERICSTRING),
578 ASN1_GEN_STR("NUMERICSTRING", V_ASN1_NUMERICSTRING),
580 /* Special cases */
581 ASN1_GEN_STR("SEQUENCE", V_ASN1_SEQUENCE),
582 ASN1_GEN_STR("SEQ", V_ASN1_SEQUENCE),
583 ASN1_GEN_STR("SET", V_ASN1_SET),
584 /* type modifiers */
585 /* Explicit tag */
586 ASN1_GEN_STR("EXP", ASN1_GEN_FLAG_EXP),
587 ASN1_GEN_STR("EXPLICIT", ASN1_GEN_FLAG_EXP),
588 /* Implicit tag */
589 ASN1_GEN_STR("IMP", ASN1_GEN_FLAG_IMP),
590 ASN1_GEN_STR("IMPLICIT", ASN1_GEN_FLAG_IMP),
591 /* OCTET STRING wrapper */
592 ASN1_GEN_STR("OCTWRAP", ASN1_GEN_FLAG_OCTWRAP),
593 /* SEQUENCE wrapper */
594 ASN1_GEN_STR("SEQWRAP", ASN1_GEN_FLAG_SEQWRAP),
595 /* SET wrapper */
596 ASN1_GEN_STR("SETWRAP", ASN1_GEN_FLAG_SETWRAP),
597 /* BIT STRING wrapper */
598 ASN1_GEN_STR("BITWRAP", ASN1_GEN_FLAG_BITWRAP),
599 ASN1_GEN_STR("FORM", ASN1_GEN_FLAG_FORMAT),
600 ASN1_GEN_STR("FORMAT", ASN1_GEN_FLAG_FORMAT),
603 if (len == -1)
604 len = strlen(tagstr);
606 tntmp = tnst;
607 for (i = 0; i < sizeof(tnst) / sizeof(struct tag_name_st); i++, tntmp++) {
608 if ((len == tntmp->len) && !strncmp(tntmp->strnam, tagstr, len))
609 return tntmp->tag;
612 return -1;
615 static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype)
617 ASN1_TYPE *atmp = NULL;
619 CONF_VALUE vtmp;
621 unsigned char *rdata;
622 long rdlen;
624 int no_unused = 1;
626 if (!(atmp = ASN1_TYPE_new())) {
627 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
628 return NULL;
631 if (!str)
632 str = "";
634 switch (utype) {
636 case V_ASN1_NULL:
637 if (str && *str) {
638 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_NULL_VALUE);
639 goto bad_form;
641 break;
643 case V_ASN1_BOOLEAN:
644 if (format != ASN1_GEN_FORMAT_ASCII) {
645 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_NOT_ASCII_FORMAT);
646 goto bad_form;
648 vtmp.name = NULL;
649 vtmp.section = NULL;
650 vtmp.value = (char *)str;
651 if (!X509V3_get_value_bool(&vtmp, &atmp->value.boolean)) {
652 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_BOOLEAN);
653 goto bad_str;
655 break;
657 case V_ASN1_INTEGER:
658 case V_ASN1_ENUMERATED:
659 if (format != ASN1_GEN_FORMAT_ASCII) {
660 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_INTEGER_NOT_ASCII_FORMAT);
661 goto bad_form;
663 if (!(atmp->value.integer = s2i_ASN1_INTEGER(NULL, (char *)str))) {
664 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_INTEGER);
665 goto bad_str;
667 break;
669 case V_ASN1_OBJECT:
670 if (format != ASN1_GEN_FORMAT_ASCII) {
671 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_OBJECT_NOT_ASCII_FORMAT);
672 goto bad_form;
674 if (!(atmp->value.object = OBJ_txt2obj(str, 0))) {
675 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_OBJECT);
676 goto bad_str;
678 break;
680 case V_ASN1_UTCTIME:
681 case V_ASN1_GENERALIZEDTIME:
682 if (format != ASN1_GEN_FORMAT_ASCII) {
683 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_TIME_NOT_ASCII_FORMAT);
684 goto bad_form;
686 if (!(atmp->value.asn1_string = ASN1_STRING_new())) {
687 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
688 goto bad_str;
690 if (!ASN1_STRING_set(atmp->value.asn1_string, str, -1)) {
691 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
692 goto bad_str;
694 atmp->value.asn1_string->type = utype;
695 if (!ASN1_TIME_check(atmp->value.asn1_string)) {
696 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_TIME_VALUE);
697 goto bad_str;
700 break;
702 case V_ASN1_BMPSTRING:
703 case V_ASN1_PRINTABLESTRING:
704 case V_ASN1_IA5STRING:
705 case V_ASN1_T61STRING:
706 case V_ASN1_UTF8STRING:
707 case V_ASN1_VISIBLESTRING:
708 case V_ASN1_UNIVERSALSTRING:
709 case V_ASN1_GENERALSTRING:
710 case V_ASN1_NUMERICSTRING:
712 if (format == ASN1_GEN_FORMAT_ASCII)
713 format = MBSTRING_ASC;
714 else if (format == ASN1_GEN_FORMAT_UTF8)
715 format = MBSTRING_UTF8;
716 else {
717 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_FORMAT);
718 goto bad_form;
721 if (ASN1_mbstring_copy(&atmp->value.asn1_string, (unsigned char *)str,
722 -1, format, ASN1_tag2bit(utype)) <= 0) {
723 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
724 goto bad_str;
727 break;
729 case V_ASN1_BIT_STRING:
731 case V_ASN1_OCTET_STRING:
733 if (!(atmp->value.asn1_string = ASN1_STRING_new())) {
734 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
735 goto bad_form;
738 if (format == ASN1_GEN_FORMAT_HEX) {
740 if (!(rdata = string_to_hex((char *)str, &rdlen))) {
741 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_HEX);
742 goto bad_str;
745 atmp->value.asn1_string->data = rdata;
746 atmp->value.asn1_string->length = rdlen;
747 atmp->value.asn1_string->type = utype;
749 } else if (format == ASN1_GEN_FORMAT_ASCII)
750 ASN1_STRING_set(atmp->value.asn1_string, str, -1);
751 else if ((format == ASN1_GEN_FORMAT_BITLIST)
752 && (utype == V_ASN1_BIT_STRING)) {
753 if (!CONF_parse_list
754 (str, ',', 1, bitstr_cb, atmp->value.bit_string)) {
755 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_LIST_ERROR);
756 goto bad_str;
758 no_unused = 0;
760 } else {
761 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_BITSTRING_FORMAT);
762 goto bad_form;
765 if ((utype == V_ASN1_BIT_STRING) && no_unused) {
766 atmp->value.asn1_string->flags
767 &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
768 atmp->value.asn1_string->flags |= ASN1_STRING_FLAG_BITS_LEFT;
771 break;
773 default:
774 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_UNSUPPORTED_TYPE);
775 goto bad_str;
776 break;
779 atmp->type = utype;
780 return atmp;
782 bad_str:
783 ERR_add_error_data(2, "string=", str);
784 bad_form:
786 ASN1_TYPE_free(atmp);
787 return NULL;
791 static int bitstr_cb(const char *elem, int len, void *bitstr)
793 long bitnum;
794 char *eptr;
795 if (!elem)
796 return 0;
797 bitnum = strtoul(elem, &eptr, 10);
798 if (eptr && *eptr && (eptr != elem + len))
799 return 0;
800 if (bitnum < 0) {
801 ASN1err(ASN1_F_BITSTR_CB, ASN1_R_INVALID_NUMBER);
802 return 0;
804 if (!ASN1_BIT_STRING_set_bit(bitstr, bitnum, 1)) {
805 ASN1err(ASN1_F_BITSTR_CB, ERR_R_MALLOC_FAILURE);
806 return 0;
808 return 1;