Coverage Report

Created: 2025-06-13 06:55

/src/openssl/crypto/asn1/asn1_gen.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2002-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <openssl/asn1.h>
11
#include <openssl/x509v3.h>
12
#include "internal/cryptlib.h"
13
#include "crypto/asn1.h"
14
15
0
#define ASN1_GEN_FLAG           0x10000
16
0
#define ASN1_GEN_FLAG_IMP       (ASN1_GEN_FLAG|1)
17
0
#define ASN1_GEN_FLAG_EXP       (ASN1_GEN_FLAG|2)
18
#define ASN1_GEN_FLAG_TAG       (ASN1_GEN_FLAG|3)
19
0
#define ASN1_GEN_FLAG_BITWRAP   (ASN1_GEN_FLAG|4)
20
0
#define ASN1_GEN_FLAG_OCTWRAP   (ASN1_GEN_FLAG|5)
21
0
#define ASN1_GEN_FLAG_SEQWRAP   (ASN1_GEN_FLAG|6)
22
0
#define ASN1_GEN_FLAG_SETWRAP   (ASN1_GEN_FLAG|7)
23
0
#define ASN1_GEN_FLAG_FORMAT    (ASN1_GEN_FLAG|8)
24
25
0
#define ASN1_GEN_STR(str,val)   {str, sizeof(str) - 1, val}
26
27
0
#define ASN1_FLAG_EXP_MAX       20
28
/* Maximum number of nested sequences */
29
0
#define ASN1_GEN_SEQ_MAX_DEPTH  50
30
31
/* Input formats */
32
33
/* ASCII: default */
34
0
#define ASN1_GEN_FORMAT_ASCII   1
35
/* UTF8 */
36
0
#define ASN1_GEN_FORMAT_UTF8    2
37
/* Hex */
38
0
#define ASN1_GEN_FORMAT_HEX     3
39
/* List of bits */
40
0
#define ASN1_GEN_FORMAT_BITLIST 4
41
42
struct tag_name_st {
43
    const char *strnam;
44
    int len;
45
    int tag;
46
};
47
48
typedef struct {
49
    int exp_tag;
50
    int exp_class;
51
    int exp_constructed;
52
    int exp_pad;
53
    long exp_len;
54
} tag_exp_type;
55
56
typedef struct {
57
    int imp_tag;
58
    int imp_class;
59
    int utype;
60
    int format;
61
    const char *str;
62
    tag_exp_type exp_list[ASN1_FLAG_EXP_MAX];
63
    int exp_count;
64
} tag_exp_arg;
65
66
static ASN1_TYPE *generate_v3(const char *str, X509V3_CTX *cnf, int depth,
67
                              int *perr);
68
static int bitstr_cb(const char *elem, int len, void *bitstr);
69
static int asn1_cb(const char *elem, int len, void *bitstr);
70
static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class,
71
                      int exp_constructed, int exp_pad, int imp_ok);
72
static int parse_tagging(const char *vstart, int vlen, int *ptag,
73
                         int *pclass);
74
static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf,
75
                             int depth, int *perr);
76
static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype);
77
static int asn1_str2tag(const char *tagstr, int len);
78
79
ASN1_TYPE *ASN1_generate_nconf(const char *str, CONF *nconf)
80
0
{
81
0
    X509V3_CTX cnf;
82
83
0
    if (!nconf)
84
0
        return ASN1_generate_v3(str, NULL);
85
86
0
    X509V3_set_nconf(&cnf, nconf);
87
0
    return ASN1_generate_v3(str, &cnf);
88
0
}
89
90
ASN1_TYPE *ASN1_generate_v3(const char *str, X509V3_CTX *cnf)
91
0
{
92
0
    int err = 0;
93
0
    ASN1_TYPE *ret = generate_v3(str, cnf, 0, &err);
94
0
    if (err)
95
0
        ERR_raise(ERR_LIB_ASN1, err);
96
0
    return ret;
97
0
}
98
99
static ASN1_TYPE *generate_v3(const char *str, X509V3_CTX *cnf, int depth,
100
                              int *perr)
101
0
{
102
0
    ASN1_TYPE *ret;
103
0
    tag_exp_arg asn1_tags;
104
0
    tag_exp_type *etmp;
105
106
0
    int i, len;
107
108
0
    unsigned char *orig_der = NULL, *new_der = NULL;
109
0
    const unsigned char *cpy_start;
110
0
    unsigned char *p;
111
0
    const unsigned char *cp;
112
0
    int cpy_len;
113
0
    long hdr_len = 0;
114
0
    int hdr_constructed = 0, hdr_tag, hdr_class;
115
0
    int r;
116
117
0
    asn1_tags.imp_tag = -1;
118
0
    asn1_tags.imp_class = -1;
119
0
    asn1_tags.format = ASN1_GEN_FORMAT_ASCII;
120
0
    asn1_tags.exp_count = 0;
121
0
    if (CONF_parse_list(str, ',', 1, asn1_cb, &asn1_tags) != 0) {
122
0
        *perr = ASN1_R_UNKNOWN_TAG;
123
0
        return NULL;
124
0
    }
125
126
0
    if ((asn1_tags.utype == V_ASN1_SEQUENCE)
127
0
        || (asn1_tags.utype == V_ASN1_SET)) {
128
0
        if (!cnf) {
129
0
            *perr = ASN1_R_SEQUENCE_OR_SET_NEEDS_CONFIG;
130
0
            return NULL;
131
0
        }
132
0
        if (depth >= ASN1_GEN_SEQ_MAX_DEPTH) {
133
0
            *perr = ASN1_R_ILLEGAL_NESTED_TAGGING;
134
0
            return NULL;
135
0
        }
136
0
        ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf, depth, perr);
137
0
    } else
138
0
        ret = asn1_str2type(asn1_tags.str, asn1_tags.format, asn1_tags.utype);
139
140
0
    if (!ret)
141
0
        return NULL;
142
143
    /* If no tagging return base type */
144
0
    if ((asn1_tags.imp_tag == -1) && (asn1_tags.exp_count == 0))
145
0
        return ret;
146
147
    /* Generate the encoding */
148
0
    cpy_len = i2d_ASN1_TYPE(ret, &orig_der);
149
0
    ASN1_TYPE_free(ret);
150
0
    ret = NULL;
151
    /* Set point to start copying for modified encoding */
152
0
    cpy_start = orig_der;
153
154
    /* Do we need IMPLICIT tagging? */
155
0
    if (asn1_tags.imp_tag != -1) {
156
        /* If IMPLICIT we will replace the underlying tag */
157
        /* Skip existing tag+len */
158
0
        r = ASN1_get_object(&cpy_start, &hdr_len, &hdr_tag, &hdr_class,
159
0
                            cpy_len);
160
0
        if (r & 0x80)
161
0
            goto err;
162
        /* Update copy length */
163
0
        cpy_len -= cpy_start - orig_der;
164
        /*
165
         * For IMPLICIT tagging the length should match the original length
166
         * and constructed flag should be consistent.
167
         */
168
0
        if (r & 0x1) {
169
            /* Indefinite length constructed */
170
0
            hdr_constructed = 2;
171
0
            hdr_len = 0;
172
0
        } else
173
            /* Just retain constructed flag */
174
0
            hdr_constructed = r & V_ASN1_CONSTRUCTED;
175
        /*
176
         * Work out new length with IMPLICIT tag: ignore constructed because
177
         * it will mess up if indefinite length
178
         */
179
0
        len = ASN1_object_size(0, hdr_len, asn1_tags.imp_tag);
180
0
    } else
181
0
        len = cpy_len;
182
183
    /* Work out length in any EXPLICIT, starting from end */
184
185
0
    for (i = 0, etmp = asn1_tags.exp_list + asn1_tags.exp_count - 1;
186
0
         i < asn1_tags.exp_count; i++, etmp--) {
187
        /* Content length: number of content octets + any padding */
188
0
        len += etmp->exp_pad;
189
0
        etmp->exp_len = len;
190
        /* Total object length: length including new header */
191
0
        len = ASN1_object_size(0, len, etmp->exp_tag);
192
0
    }
193
194
    /* Allocate buffer for new encoding */
195
196
0
    new_der = OPENSSL_malloc(len);
197
0
    if (new_der == NULL)
198
0
        goto err;
199
200
    /* Generate tagged encoding */
201
202
0
    p = new_der;
203
204
    /* Output explicit tags first */
205
206
0
    for (i = 0, etmp = asn1_tags.exp_list; i < asn1_tags.exp_count;
207
0
         i++, etmp++) {
208
0
        ASN1_put_object(&p, etmp->exp_constructed, etmp->exp_len,
209
0
                        etmp->exp_tag, etmp->exp_class);
210
0
        if (etmp->exp_pad)
211
0
            *p++ = 0;
212
0
    }
213
214
    /* If IMPLICIT, output tag */
215
216
0
    if (asn1_tags.imp_tag != -1) {
217
0
        if (asn1_tags.imp_class == V_ASN1_UNIVERSAL
218
0
            && (asn1_tags.imp_tag == V_ASN1_SEQUENCE
219
0
                || asn1_tags.imp_tag == V_ASN1_SET))
220
0
            hdr_constructed = V_ASN1_CONSTRUCTED;
221
0
        ASN1_put_object(&p, hdr_constructed, hdr_len,
222
0
                        asn1_tags.imp_tag, asn1_tags.imp_class);
223
0
    }
224
225
    /* Copy across original encoding */
226
0
    memcpy(p, cpy_start, cpy_len);
227
228
0
    cp = new_der;
229
230
    /* Obtain new ASN1_TYPE structure */
231
0
    ret = d2i_ASN1_TYPE(NULL, &cp, len);
232
233
0
 err:
234
0
    OPENSSL_free(orig_der);
235
0
    OPENSSL_free(new_der);
236
237
0
    return ret;
238
239
0
}
240
241
static int asn1_cb(const char *elem, int len, void *bitstr)
242
0
{
243
0
    tag_exp_arg *arg = bitstr;
244
0
    int i;
245
0
    int utype;
246
0
    int vlen = 0;
247
0
    const char *p, *vstart = NULL;
248
249
0
    int tmp_tag, tmp_class;
250
251
0
    if (elem == NULL)
252
0
        return -1;
253
254
0
    for (i = 0, p = elem; i < len; p++, i++) {
255
        /* Look for the ':' in name value pairs */
256
0
        if (*p == ':') {
257
0
            vstart = p + 1;
258
0
            vlen = len - (vstart - elem);
259
0
            len = p - elem;
260
0
            break;
261
0
        }
262
0
    }
263
264
0
    utype = asn1_str2tag(elem, len);
265
266
0
    if (utype == -1) {
267
0
        ERR_raise_data(ERR_LIB_ASN1, ASN1_R_UNKNOWN_TAG, "tag=%s", elem);
268
0
        return -1;
269
0
    }
270
271
    /* If this is not a modifier mark end of string and exit */
272
0
    if (!(utype & ASN1_GEN_FLAG)) {
273
0
        arg->utype = utype;
274
0
        arg->str = vstart;
275
        /* If no value and not end of string, error */
276
0
        if (!vstart && elem[len]) {
277
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_MISSING_VALUE);
278
0
            return -1;
279
0
        }
280
0
        return 0;
281
0
    }
282
283
0
    switch (utype) {
284
285
0
    case ASN1_GEN_FLAG_IMP:
286
        /* Check for illegal multiple IMPLICIT tagging */
287
0
        if (arg->imp_tag != -1) {
288
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_NESTED_TAGGING);
289
0
            return -1;
290
0
        }
291
0
        if (!parse_tagging(vstart, vlen, &arg->imp_tag, &arg->imp_class))
292
0
            return -1;
293
0
        break;
294
295
0
    case ASN1_GEN_FLAG_EXP:
296
297
0
        if (!parse_tagging(vstart, vlen, &tmp_tag, &tmp_class))
298
0
            return -1;
299
0
        if (!append_exp(arg, tmp_tag, tmp_class, 1, 0, 0))
300
0
            return -1;
301
0
        break;
302
303
0
    case ASN1_GEN_FLAG_SEQWRAP:
304
0
        if (!append_exp(arg, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL, 1, 0, 1))
305
0
            return -1;
306
0
        break;
307
308
0
    case ASN1_GEN_FLAG_SETWRAP:
309
0
        if (!append_exp(arg, V_ASN1_SET, V_ASN1_UNIVERSAL, 1, 0, 1))
310
0
            return -1;
311
0
        break;
312
313
0
    case ASN1_GEN_FLAG_BITWRAP:
314
0
        if (!append_exp(arg, V_ASN1_BIT_STRING, V_ASN1_UNIVERSAL, 0, 1, 1))
315
0
            return -1;
316
0
        break;
317
318
0
    case ASN1_GEN_FLAG_OCTWRAP:
319
0
        if (!append_exp(arg, V_ASN1_OCTET_STRING, V_ASN1_UNIVERSAL, 0, 0, 1))
320
0
            return -1;
321
0
        break;
322
323
0
    case ASN1_GEN_FLAG_FORMAT:
324
0
        if (!vstart) {
325
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_UNKNOWN_FORMAT);
326
0
            return -1;
327
0
        }
328
0
        if (HAS_PREFIX(vstart, "ASCII"))
329
0
            arg->format = ASN1_GEN_FORMAT_ASCII;
330
0
        else if (HAS_PREFIX(vstart, "UTF8"))
331
0
            arg->format = ASN1_GEN_FORMAT_UTF8;
332
0
        else if (HAS_PREFIX(vstart, "HEX"))
333
0
            arg->format = ASN1_GEN_FORMAT_HEX;
334
0
        else if (HAS_PREFIX(vstart, "BITLIST"))
335
0
            arg->format = ASN1_GEN_FORMAT_BITLIST;
336
0
        else {
337
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_UNKNOWN_FORMAT);
338
0
            return -1;
339
0
        }
340
0
        break;
341
342
0
    }
343
344
0
    return 1;
345
346
0
}
347
348
static int parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass)
349
0
{
350
0
    long tag_num;
351
0
    char *eptr;
352
0
    if (!vstart)
353
0
        return 0;
354
0
    tag_num = strtoul(vstart, &eptr, 10);
355
    /* Check we haven't gone past max length: should be impossible */
356
0
    if (eptr && *eptr && (eptr > vstart + vlen))
357
0
        return 0;
358
0
    if (tag_num < 0) {
359
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_INVALID_NUMBER);
360
0
        return 0;
361
0
    }
362
0
    *ptag = tag_num;
363
    /* If we have non numeric characters, parse them */
364
0
    if (eptr)
365
0
        vlen -= eptr - vstart;
366
0
    else
367
0
        vlen = 0;
368
0
    if (vlen) {
369
0
        switch (*eptr) {
370
371
0
        case 'U':
372
0
            *pclass = V_ASN1_UNIVERSAL;
373
0
            break;
374
375
0
        case 'A':
376
0
            *pclass = V_ASN1_APPLICATION;
377
0
            break;
378
379
0
        case 'P':
380
0
            *pclass = V_ASN1_PRIVATE;
381
0
            break;
382
383
0
        case 'C':
384
0
            *pclass = V_ASN1_CONTEXT_SPECIFIC;
385
0
            break;
386
387
0
        default:
388
0
            ERR_raise_data(ERR_LIB_ASN1, ASN1_R_INVALID_MODIFIER,
389
0
                           "Char=%c", *eptr);
390
0
            return 0;
391
392
0
        }
393
0
    } else
394
0
        *pclass = V_ASN1_CONTEXT_SPECIFIC;
395
396
0
    return 1;
397
398
0
}
399
400
/* Handle multiple types: SET and SEQUENCE */
401
402
static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf,
403
                             int depth, int *perr)
404
0
{
405
0
    ASN1_TYPE *ret = NULL;
406
0
    STACK_OF(ASN1_TYPE) *sk = NULL;
407
0
    STACK_OF(CONF_VALUE) *sect = NULL;
408
0
    unsigned char *der = NULL;
409
0
    int derlen;
410
0
    int i;
411
0
    sk = sk_ASN1_TYPE_new_null();
412
0
    if (!sk)
413
0
        goto bad;
414
0
    if (section) {
415
0
        if (!cnf)
416
0
            goto bad;
417
0
        sect = X509V3_get_section(cnf, (char *)section);
418
0
        if (!sect)
419
0
            goto bad;
420
0
        for (i = 0; i < sk_CONF_VALUE_num(sect); i++) {
421
0
            ASN1_TYPE *typ =
422
0
                generate_v3(sk_CONF_VALUE_value(sect, i)->value, cnf,
423
0
                            depth + 1, perr);
424
0
            if (!typ)
425
0
                goto bad;
426
0
            if (!sk_ASN1_TYPE_push(sk, typ))
427
0
                goto bad;
428
0
        }
429
0
    }
430
431
    /*
432
     * Now we has a STACK of the components, convert to the correct form
433
     */
434
435
0
    if (utype == V_ASN1_SET)
436
0
        derlen = i2d_ASN1_SET_ANY(sk, &der);
437
0
    else
438
0
        derlen = i2d_ASN1_SEQUENCE_ANY(sk, &der);
439
440
0
    if (derlen < 0)
441
0
        goto bad;
442
0
    if ((ret = ASN1_TYPE_new()) == NULL)
443
0
        goto bad;
444
0
    if ((ret->value.asn1_string = ASN1_STRING_type_new(utype)) == NULL)
445
0
        goto bad;
446
447
0
    ret->type = utype;
448
0
    ret->value.asn1_string->data = der;
449
0
    ret->value.asn1_string->length = derlen;
450
451
0
    der = NULL;
452
453
0
 bad:
454
455
0
    OPENSSL_free(der);
456
457
0
    sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free);
458
0
    X509V3_section_free(cnf, sect);
459
460
0
    return ret;
461
0
}
462
463
static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class,
464
                      int exp_constructed, int exp_pad, int imp_ok)
465
0
{
466
0
    tag_exp_type *exp_tmp;
467
    /* Can only have IMPLICIT if permitted */
468
0
    if ((arg->imp_tag != -1) && !imp_ok) {
469
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_IMPLICIT_TAG);
470
0
        return 0;
471
0
    }
472
473
0
    if (arg->exp_count == ASN1_FLAG_EXP_MAX) {
474
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_DEPTH_EXCEEDED);
475
0
        return 0;
476
0
    }
477
478
0
    exp_tmp = &arg->exp_list[arg->exp_count++];
479
480
    /*
481
     * If IMPLICIT set tag to implicit value then reset implicit tag since it
482
     * has been used.
483
     */
484
0
    if (arg->imp_tag != -1) {
485
0
        exp_tmp->exp_tag = arg->imp_tag;
486
0
        exp_tmp->exp_class = arg->imp_class;
487
0
        arg->imp_tag = -1;
488
0
        arg->imp_class = -1;
489
0
    } else {
490
0
        exp_tmp->exp_tag = exp_tag;
491
0
        exp_tmp->exp_class = exp_class;
492
0
    }
493
0
    exp_tmp->exp_constructed = exp_constructed;
494
0
    exp_tmp->exp_pad = exp_pad;
495
496
0
    return 1;
497
0
}
498
499
static int asn1_str2tag(const char *tagstr, int len)
500
0
{
501
0
    unsigned int i;
502
0
    const struct tag_name_st *tntmp;
503
0
    static const struct tag_name_st tnst[] = {
504
0
        ASN1_GEN_STR("BOOL", V_ASN1_BOOLEAN),
505
0
        ASN1_GEN_STR("BOOLEAN", V_ASN1_BOOLEAN),
506
0
        ASN1_GEN_STR("NULL", V_ASN1_NULL),
507
0
        ASN1_GEN_STR("INT", V_ASN1_INTEGER),
508
0
        ASN1_GEN_STR("INTEGER", V_ASN1_INTEGER),
509
0
        ASN1_GEN_STR("ENUM", V_ASN1_ENUMERATED),
510
0
        ASN1_GEN_STR("ENUMERATED", V_ASN1_ENUMERATED),
511
0
        ASN1_GEN_STR("OID", V_ASN1_OBJECT),
512
0
        ASN1_GEN_STR("OBJECT", V_ASN1_OBJECT),
513
0
        ASN1_GEN_STR("UTCTIME", V_ASN1_UTCTIME),
514
0
        ASN1_GEN_STR("UTC", V_ASN1_UTCTIME),
515
0
        ASN1_GEN_STR("GENERALIZEDTIME", V_ASN1_GENERALIZEDTIME),
516
0
        ASN1_GEN_STR("GENTIME", V_ASN1_GENERALIZEDTIME),
517
0
        ASN1_GEN_STR("OCT", V_ASN1_OCTET_STRING),
518
0
        ASN1_GEN_STR("OCTETSTRING", V_ASN1_OCTET_STRING),
519
0
        ASN1_GEN_STR("BITSTR", V_ASN1_BIT_STRING),
520
0
        ASN1_GEN_STR("BITSTRING", V_ASN1_BIT_STRING),
521
0
        ASN1_GEN_STR("UNIVERSALSTRING", V_ASN1_UNIVERSALSTRING),
522
0
        ASN1_GEN_STR("UNIV", V_ASN1_UNIVERSALSTRING),
523
0
        ASN1_GEN_STR("IA5", V_ASN1_IA5STRING),
524
0
        ASN1_GEN_STR("IA5STRING", V_ASN1_IA5STRING),
525
0
        ASN1_GEN_STR("UTF8", V_ASN1_UTF8STRING),
526
0
        ASN1_GEN_STR("UTF8String", V_ASN1_UTF8STRING),
527
0
        ASN1_GEN_STR("BMP", V_ASN1_BMPSTRING),
528
0
        ASN1_GEN_STR("BMPSTRING", V_ASN1_BMPSTRING),
529
0
        ASN1_GEN_STR("VISIBLESTRING", V_ASN1_VISIBLESTRING),
530
0
        ASN1_GEN_STR("VISIBLE", V_ASN1_VISIBLESTRING),
531
0
        ASN1_GEN_STR("PRINTABLESTRING", V_ASN1_PRINTABLESTRING),
532
0
        ASN1_GEN_STR("PRINTABLE", V_ASN1_PRINTABLESTRING),
533
0
        ASN1_GEN_STR("T61", V_ASN1_T61STRING),
534
0
        ASN1_GEN_STR("T61STRING", V_ASN1_T61STRING),
535
0
        ASN1_GEN_STR("TELETEXSTRING", V_ASN1_T61STRING),
536
0
        ASN1_GEN_STR("GeneralString", V_ASN1_GENERALSTRING),
537
0
        ASN1_GEN_STR("GENSTR", V_ASN1_GENERALSTRING),
538
0
        ASN1_GEN_STR("NUMERIC", V_ASN1_NUMERICSTRING),
539
0
        ASN1_GEN_STR("NUMERICSTRING", V_ASN1_NUMERICSTRING),
540
541
        /* Special cases */
542
0
        ASN1_GEN_STR("SEQUENCE", V_ASN1_SEQUENCE),
543
0
        ASN1_GEN_STR("SEQ", V_ASN1_SEQUENCE),
544
0
        ASN1_GEN_STR("SET", V_ASN1_SET),
545
        /* type modifiers */
546
        /* Explicit tag */
547
0
        ASN1_GEN_STR("EXP", ASN1_GEN_FLAG_EXP),
548
0
        ASN1_GEN_STR("EXPLICIT", ASN1_GEN_FLAG_EXP),
549
        /* Implicit tag */
550
0
        ASN1_GEN_STR("IMP", ASN1_GEN_FLAG_IMP),
551
0
        ASN1_GEN_STR("IMPLICIT", ASN1_GEN_FLAG_IMP),
552
        /* OCTET STRING wrapper */
553
0
        ASN1_GEN_STR("OCTWRAP", ASN1_GEN_FLAG_OCTWRAP),
554
        /* SEQUENCE wrapper */
555
0
        ASN1_GEN_STR("SEQWRAP", ASN1_GEN_FLAG_SEQWRAP),
556
        /* SET wrapper */
557
0
        ASN1_GEN_STR("SETWRAP", ASN1_GEN_FLAG_SETWRAP),
558
        /* BIT STRING wrapper */
559
0
        ASN1_GEN_STR("BITWRAP", ASN1_GEN_FLAG_BITWRAP),
560
0
        ASN1_GEN_STR("FORM", ASN1_GEN_FLAG_FORMAT),
561
0
        ASN1_GEN_STR("FORMAT", ASN1_GEN_FLAG_FORMAT),
562
0
    };
563
564
0
    if (len == -1)
565
0
        len = strlen(tagstr);
566
567
0
    tntmp = tnst;
568
0
    for (i = 0; i < OSSL_NELEM(tnst); i++, tntmp++) {
569
0
        if ((len == tntmp->len)
570
0
            && (OPENSSL_strncasecmp(tntmp->strnam, tagstr, len) == 0))
571
0
            return tntmp->tag;
572
0
    }
573
574
0
    return -1;
575
0
}
576
577
static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype)
578
0
{
579
0
    ASN1_TYPE *atmp = NULL;
580
0
    CONF_VALUE vtmp;
581
0
    unsigned char *rdata;
582
0
    long rdlen;
583
0
    int no_unused = 1;
584
585
0
    if ((atmp = ASN1_TYPE_new()) == NULL) {
586
0
        ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
587
0
        return NULL;
588
0
    }
589
590
0
    if (!str)
591
0
        str = "";
592
593
0
    switch (utype) {
594
595
0
    case V_ASN1_NULL:
596
0
        if (str && *str) {
597
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_NULL_VALUE);
598
0
            goto bad_form;
599
0
        }
600
0
        break;
601
602
0
    case V_ASN1_BOOLEAN:
603
0
        if (format != ASN1_GEN_FORMAT_ASCII) {
604
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_NOT_ASCII_FORMAT);
605
0
            goto bad_form;
606
0
        }
607
0
        vtmp.name = NULL;
608
0
        vtmp.section = NULL;
609
0
        vtmp.value = (char *)str;
610
0
        if (!X509V3_get_value_bool(&vtmp, &atmp->value.boolean)) {
611
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_BOOLEAN);
612
0
            goto bad_str;
613
0
        }
614
0
        break;
615
616
0
    case V_ASN1_INTEGER:
617
0
    case V_ASN1_ENUMERATED:
618
0
        if (format != ASN1_GEN_FORMAT_ASCII) {
619
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_INTEGER_NOT_ASCII_FORMAT);
620
0
            goto bad_form;
621
0
        }
622
0
        if ((atmp->value.integer
623
0
                    = s2i_ASN1_INTEGER(NULL, str)) == NULL) {
624
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_INTEGER);
625
0
            goto bad_str;
626
0
        }
627
0
        break;
628
629
0
    case V_ASN1_OBJECT:
630
0
        if (format != ASN1_GEN_FORMAT_ASCII) {
631
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_OBJECT_NOT_ASCII_FORMAT);
632
0
            goto bad_form;
633
0
        }
634
0
        if ((atmp->value.object = OBJ_txt2obj(str, 0)) == NULL) {
635
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_OBJECT);
636
0
            goto bad_str;
637
0
        }
638
0
        break;
639
640
0
    case V_ASN1_UTCTIME:
641
0
    case V_ASN1_GENERALIZEDTIME:
642
0
        if (format != ASN1_GEN_FORMAT_ASCII) {
643
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_TIME_NOT_ASCII_FORMAT);
644
0
            goto bad_form;
645
0
        }
646
0
        if ((atmp->value.asn1_string = ASN1_STRING_new()) == NULL) {
647
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
648
0
            goto bad_str;
649
0
        }
650
0
        if (!ASN1_STRING_set(atmp->value.asn1_string, str, -1)) {
651
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
652
0
            goto bad_str;
653
0
        }
654
0
        atmp->value.asn1_string->type = utype;
655
0
        if (!ASN1_TIME_check(atmp->value.asn1_string)) {
656
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_TIME_VALUE);
657
0
            goto bad_str;
658
0
        }
659
660
0
        break;
661
662
0
    case V_ASN1_BMPSTRING:
663
0
    case V_ASN1_PRINTABLESTRING:
664
0
    case V_ASN1_IA5STRING:
665
0
    case V_ASN1_T61STRING:
666
0
    case V_ASN1_UTF8STRING:
667
0
    case V_ASN1_VISIBLESTRING:
668
0
    case V_ASN1_UNIVERSALSTRING:
669
0
    case V_ASN1_GENERALSTRING:
670
0
    case V_ASN1_NUMERICSTRING:
671
0
        if (format == ASN1_GEN_FORMAT_ASCII)
672
0
            format = MBSTRING_ASC;
673
0
        else if (format == ASN1_GEN_FORMAT_UTF8)
674
0
            format = MBSTRING_UTF8;
675
0
        else {
676
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_FORMAT);
677
0
            goto bad_form;
678
0
        }
679
680
0
        if (ASN1_mbstring_copy(&atmp->value.asn1_string, (unsigned char *)str,
681
0
                               -1, format, ASN1_tag2bit(utype)) <= 0) {
682
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
683
0
            goto bad_str;
684
0
        }
685
686
0
        break;
687
688
0
    case V_ASN1_BIT_STRING:
689
0
    case V_ASN1_OCTET_STRING:
690
0
        if ((atmp->value.asn1_string = ASN1_STRING_new()) == NULL) {
691
0
            ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
692
0
            goto bad_form;
693
0
        }
694
695
0
        if (format == ASN1_GEN_FORMAT_HEX) {
696
0
            if ((rdata = OPENSSL_hexstr2buf(str, &rdlen)) == NULL) {
697
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_HEX);
698
0
                goto bad_str;
699
0
            }
700
0
            atmp->value.asn1_string->data = rdata;
701
0
            atmp->value.asn1_string->length = rdlen;
702
0
            atmp->value.asn1_string->type = utype;
703
0
        } else if (format == ASN1_GEN_FORMAT_ASCII) {
704
0
            if (!ASN1_STRING_set(atmp->value.asn1_string, str, -1)) {
705
0
                ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
706
0
                goto bad_str;
707
0
            }
708
0
        } else if ((format == ASN1_GEN_FORMAT_BITLIST)
709
0
                 && (utype == V_ASN1_BIT_STRING)) {
710
0
            if (!CONF_parse_list
711
0
                (str, ',', 1, bitstr_cb, atmp->value.bit_string)) {
712
0
                ERR_raise(ERR_LIB_ASN1, ASN1_R_LIST_ERROR);
713
0
                goto bad_str;
714
0
            }
715
0
            no_unused = 0;
716
717
0
        } else {
718
0
            ERR_raise(ERR_LIB_ASN1, ASN1_R_ILLEGAL_BITSTRING_FORMAT);
719
0
            goto bad_form;
720
0
        }
721
722
0
        if ((utype == V_ASN1_BIT_STRING) && no_unused)
723
0
            ossl_asn1_string_set_bits_left(atmp->value.asn1_string, 0);
724
725
0
        break;
726
727
0
    default:
728
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_UNSUPPORTED_TYPE);
729
0
        goto bad_str;
730
0
    }
731
732
0
    atmp->type = utype;
733
0
    return atmp;
734
735
0
 bad_str:
736
0
    ERR_add_error_data(2, "string=", str);
737
0
 bad_form:
738
739
0
    ASN1_TYPE_free(atmp);
740
0
    return NULL;
741
742
0
}
743
744
static int bitstr_cb(const char *elem, int len, void *bitstr)
745
0
{
746
0
    long bitnum;
747
0
    char *eptr;
748
0
    if (!elem)
749
0
        return 0;
750
0
    bitnum = strtoul(elem, &eptr, 10);
751
0
    if (eptr && *eptr && (eptr != elem + len))
752
0
        return 0;
753
0
    if (bitnum < 0) {
754
0
        ERR_raise(ERR_LIB_ASN1, ASN1_R_INVALID_NUMBER);
755
0
        return 0;
756
0
    }
757
0
    if (!ASN1_BIT_STRING_set_bit(bitstr, bitnum, 1)) {
758
0
        ERR_raise(ERR_LIB_ASN1, ERR_R_ASN1_LIB);
759
0
        return 0;
760
0
    }
761
0
    return 1;
762
0
}
763
764
static int mask_cb(const char *elem, int len, void *arg)
765
0
{
766
0
    unsigned long *pmask = arg, tmpmask;
767
0
    int tag;
768
0
    if (elem == NULL)
769
0
        return 0;
770
0
    if (len == 3 && HAS_PREFIX(elem, "DIR")) {
771
0
        *pmask |= B_ASN1_DIRECTORYSTRING;
772
0
        return 1;
773
0
    }
774
0
    tag = asn1_str2tag(elem, len);
775
0
    if (!tag || (tag & ASN1_GEN_FLAG))
776
0
        return 0;
777
0
    tmpmask = ASN1_tag2bit(tag);
778
0
    if (!tmpmask)
779
0
        return 0;
780
0
    *pmask |= tmpmask;
781
0
    return 1;
782
0
}
783
784
int ASN1_str2mask(const char *str, unsigned long *pmask)
785
0
{
786
0
    *pmask = 0;
787
0
    return CONF_parse_list(str, '|', 1, mask_cb, pmask);
788
0
}