Fixes for BOOL handling: produce errors for invalid string for mini-compiler,
[openssl.git] / crypto / asn1 / asn1_gen.c
1 /* asn1_gen.c */
2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3  * project 2002.
4  */
5 /* ====================================================================
6  * Copyright (c) 2002 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer. 
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com).
56  *
57  */
58
59 #include "cryptlib.h"
60 #include <openssl/asn1.h>
61 #include <openssl/x509v3.h>
62
63 #define ASN1_GEN_FLAG           0x10000
64 #define ASN1_GEN_FLAG_IMP       (ASN1_GEN_FLAG|1)
65 #define ASN1_GEN_FLAG_EXP       (ASN1_GEN_FLAG|2)
66 #define ASN1_GEN_FLAG_TAG       (ASN1_GEN_FLAG|3)
67 #define ASN1_GEN_FLAG_BITWRAP   (ASN1_GEN_FLAG|4)
68 #define ASN1_GEN_FLAG_OCTWRAP   (ASN1_GEN_FLAG|5)
69 #define ASN1_GEN_FLAG_SEQWRAP   (ASN1_GEN_FLAG|6)
70 #define ASN1_GEN_FLAG_SETWRAP   (ASN1_GEN_FLAG|7)
71 #define ASN1_GEN_FLAG_FORMAT    (ASN1_GEN_FLAG|8)
72
73 #define ASN1_GEN_STR(str,val)   {str, sizeof(str) - 1, val}
74
75 #define ASN1_FLAG_EXP_MAX       20
76
77 /* Input formats */
78
79 /* ASCII: default */
80 #define ASN1_GEN_FORMAT_ASCII   1
81 /* UTF8 */
82 #define ASN1_GEN_FORMAT_UTF8    2
83 /* Hex */
84 #define ASN1_GEN_FORMAT_HEX     3
85 /* List of bits */
86 #define ASN1_GEN_FORMAT_BITLIST 4
87
88
89 struct tag_name_st
90         {
91         const char *strnam;
92         int len;
93         int tag;
94         };
95
96 typedef struct
97         {
98         int exp_tag;
99         int exp_class;
100         int exp_constructed;
101         int exp_pad;
102         long exp_len;
103         } tag_exp_type;
104
105 typedef struct
106         {
107         int imp_tag;
108         int imp_class;
109         int utype;
110         int format;
111         const char *str;
112         tag_exp_type exp_list[ASN1_FLAG_EXP_MAX];
113         int exp_count;
114         } tag_exp_arg;
115
116 static int bitstr_cb(const char *elem, int len, void *bitstr);
117 static int asn1_cb(const char *elem, int len, void *bitstr);
118 static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class, int exp_constructed, int exp_pad, int imp_ok);
119 static int parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass);
120 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf);
121 static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype);
122 static int asn1_str2tag(const char *tagstr, int len);
123
124 ASN1_TYPE *ASN1_generate_nconf(char *str, CONF *nconf)
125         {
126         X509V3_CTX cnf;
127
128         if (!nconf)
129                 return ASN1_generate_v3(str, NULL);
130
131         X509V3_set_nconf(&cnf, nconf);
132         return ASN1_generate_v3(str, &cnf);
133         }
134
135 ASN1_TYPE *ASN1_generate_v3(char *str, X509V3_CTX *cnf)
136         {
137         ASN1_TYPE *ret;
138         tag_exp_arg asn1_tags;
139         tag_exp_type *etmp;
140
141         int i, len;
142
143         unsigned char *orig_der = NULL, *new_der = NULL;
144         const unsigned char *cpy_start;
145         unsigned char *p;
146         const unsigned char *cp;
147         int cpy_len;
148         long hdr_len;
149         int hdr_constructed = 0, hdr_tag, hdr_class;
150         int r;
151
152         asn1_tags.imp_tag = -1;
153         asn1_tags.imp_class = -1;
154         asn1_tags.format = ASN1_GEN_FORMAT_ASCII;
155         asn1_tags.exp_count = 0;
156         if (CONF_parse_list(str, ',', 1, asn1_cb, &asn1_tags) != 0)
157                 return NULL;
158
159         if ((asn1_tags.utype == V_ASN1_SEQUENCE) || (asn1_tags.utype == V_ASN1_SET))
160                 {
161                 if (!cnf)
162                         {
163                         ASN1err(ASN1_F_ASN1_GENERATE_V3, ASN1_R_SEQUENCE_OR_SET_NEEDS_CONFIG);
164                         return NULL;
165                         }
166                 ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf);
167                 }
168         else
169                 ret = asn1_str2type(asn1_tags.str, asn1_tags.format, asn1_tags.utype);
170
171         if (!ret)
172                 return NULL;
173
174         /* If no tagging return base type */
175         if ((asn1_tags.imp_tag == -1) && (asn1_tags.exp_count == 0))
176                 return ret;
177
178         /* Generate the encoding */
179         cpy_len = i2d_ASN1_TYPE(ret, &orig_der);
180         ASN1_TYPE_free(ret);
181         ret = NULL;
182         /* Set point to start copying for modified encoding */
183         cpy_start = orig_der;
184
185         /* Do we need IMPLICIT tagging? */
186         if (asn1_tags.imp_tag != -1)
187                 {
188                 /* If IMPLICIT we will replace the underlying tag */
189                 /* Skip existing tag+len */
190                 r = ASN1_get_object(&cpy_start, &hdr_len, &hdr_tag, &hdr_class, cpy_len);
191                 if (r & 0x80)
192                         goto err;
193                 /* Update copy length */
194                 cpy_len -= cpy_start - orig_der;
195                 /* For IMPLICIT tagging the length should match the
196                  * original length and constructed flag should be
197                  * consistent.
198                  */
199                 if (r & 0x1)
200                         {
201                         /* Indefinite length constructed */
202                         hdr_constructed = 2;
203                         hdr_len = 0;
204                         }
205                 else
206                         /* Just retain constructed flag */
207                         hdr_constructed = r & V_ASN1_CONSTRUCTED;
208                 /* Work out new length with IMPLICIT tag: ignore constructed
209                  * because it will mess up if indefinite length
210                  */
211                 len = ASN1_object_size(0, hdr_len, asn1_tags.imp_tag);
212                 }
213         else
214                 len = cpy_len;
215
216         /* Work out length in any EXPLICIT, starting from end */
217
218         for(i = 0, etmp = asn1_tags.exp_list + asn1_tags.exp_count - 1; i < asn1_tags.exp_count; i++, etmp--)
219                 {
220                 /* Content length: number of content octets + any padding */
221                 len += etmp->exp_pad;
222                 etmp->exp_len = len;
223                 /* Total object length: length including new header */
224                 len = ASN1_object_size(0, len, etmp->exp_tag);
225                 }
226
227         /* Allocate buffer for new encoding */
228
229         new_der = OPENSSL_malloc(len);
230
231         /* Generate tagged encoding */
232
233         p = new_der;
234
235         /* Output explicit tags first */
236
237         for (i = 0, etmp = asn1_tags.exp_list; i < asn1_tags.exp_count; i++, etmp++)
238                 {
239                 ASN1_put_object(&p, etmp->exp_constructed, etmp->exp_len,
240                                         etmp->exp_tag, etmp->exp_class);
241                 if (etmp->exp_pad)
242                         *p++ = 0;
243                 }
244
245         /* If IMPLICIT, output tag */
246
247         if (asn1_tags.imp_tag != -1)
248                 ASN1_put_object(&p, hdr_constructed, hdr_len,
249                                         asn1_tags.imp_tag, asn1_tags.imp_class);
250
251         /* Copy across original encoding */
252         memcpy(p, cpy_start, cpy_len);
253
254         cp = new_der;
255
256         /* Obtain new ASN1_TYPE structure */
257         ret = d2i_ASN1_TYPE(NULL, &cp, len);
258
259         err:
260         if (orig_der)
261                 OPENSSL_free(orig_der);
262         if (new_der)
263                 OPENSSL_free(new_der);
264
265         return ret;
266
267         }
268
269 static int asn1_cb(const char *elem, int len, void *bitstr)
270         {
271         tag_exp_arg *arg = bitstr;
272         int i;
273         int utype;
274         int vlen = 0;
275         const char *p, *vstart = NULL;
276
277         int tmp_tag, tmp_class;
278
279         for(i = 0, p = elem; i < len; p++, i++)
280                 {
281                 /* Look for the ':' in name value pairs */
282                 if (*p == ':')
283                         {
284                         vstart = p + 1;
285                         vlen = len - (vstart - elem);
286                         len = p - elem;
287                         break;
288                         }
289                 }
290
291         utype = asn1_str2tag(elem, len);
292
293         if (utype == -1)
294                 {
295                 ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKNOWN_TAG);
296                 ERR_add_error_data(2, "tag=", elem);
297                 return -1;
298                 }
299
300         /* If this is not a modifier mark end of string and exit */
301         if (!(utype & ASN1_GEN_FLAG))
302                 {
303                 arg->utype = utype;
304                 arg->str = vstart;
305                 /* If no value and not end of string, error */
306                 if (!vstart && elem[len])
307                         {
308                         ASN1err(ASN1_F_ASN1_CB, ASN1_R_MISSING_VALUE);
309                         return -1;
310                         }
311                 return 0;
312                 }
313
314         switch(utype)
315                 {
316
317                 case ASN1_GEN_FLAG_IMP:
318                 /* Check for illegal multiple IMPLICIT tagging */
319                 if (arg->imp_tag != -1)
320                         {
321                         ASN1err(ASN1_F_ASN1_CB, ASN1_R_ILLEGAL_NESTED_TAGGING);
322                         return -1;
323                         }
324                 if (!parse_tagging(vstart, vlen, &arg->imp_tag, &arg->imp_class))
325                         return -1;
326                 break;
327
328                 case ASN1_GEN_FLAG_EXP:
329
330                 if (!parse_tagging(vstart, vlen, &tmp_tag, &tmp_class))
331                         return -1;
332                 if (!append_exp(arg, tmp_tag, tmp_class, 1, 0, 0))
333                         return -1;
334                 break;
335
336                 case ASN1_GEN_FLAG_SEQWRAP:
337                 if (!append_exp(arg, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL, 1, 0, 1))
338                         return -1;
339                 break;
340
341                 case ASN1_GEN_FLAG_SETWRAP:
342                 if (!append_exp(arg, V_ASN1_SET, V_ASN1_UNIVERSAL, 1, 0, 1))
343                         return -1;
344                 break;
345
346                 case ASN1_GEN_FLAG_BITWRAP:
347                 if (!append_exp(arg, V_ASN1_BIT_STRING, V_ASN1_UNIVERSAL, 0, 1, 1))
348                         return -1;
349                 break;
350
351                 case ASN1_GEN_FLAG_OCTWRAP:
352                 if (!append_exp(arg, V_ASN1_OCTET_STRING, V_ASN1_UNIVERSAL, 0, 0, 1))
353                         return -1;
354                 break;
355
356                 case ASN1_GEN_FLAG_FORMAT:
357                 if (!strncmp(vstart, "ASCII", 5))
358                         arg->format = ASN1_GEN_FORMAT_ASCII;
359                 else if (!strncmp(vstart, "UTF8", 4))
360                         arg->format = ASN1_GEN_FORMAT_UTF8;
361                 else if (!strncmp(vstart, "HEX", 3))
362                         arg->format = ASN1_GEN_FORMAT_HEX;
363                 else if (!strncmp(vstart, "BITLIST", 3))
364                         arg->format = ASN1_GEN_FORMAT_BITLIST;
365                 else
366                         {
367                         ASN1err(ASN1_F_ASN1_CB, ASN1_R_UNKOWN_FORMAT);
368                         return -1;
369                         }
370                 break;
371
372                 }
373
374         return 1;
375
376         }
377
378 static int parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass)
379         {
380         char erch[2];
381         long tag_num;
382         char *eptr;
383         if (!vstart)
384                 return 0;
385         tag_num = strtoul(vstart, &eptr, 10);
386         /* Check we haven't gone past max length: should be impossible */
387         if (eptr && *eptr && (eptr > vstart + vlen))
388                 return 0;
389         if (tag_num < 0)
390                 {
391                 ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_NUMBER);
392                 return 0;
393                 }
394         *ptag = tag_num;
395         /* If we have non numeric characters, parse them */
396         if (eptr)
397                 vlen -= eptr - vstart;
398         else 
399                 vlen = 0;
400         if (vlen)
401                 {
402                 switch (*eptr)
403                         {
404
405                         case 'U':
406                         *pclass = V_ASN1_UNIVERSAL;
407                         break;
408
409                         case 'A':
410                         *pclass = V_ASN1_APPLICATION;
411                         break;
412
413                         case 'P':
414                         *pclass = V_ASN1_PRIVATE;
415                         break;
416
417                         case 'C':
418                         *pclass = V_ASN1_CONTEXT_SPECIFIC;
419                         break;
420
421                         default:
422                         erch[0] = *eptr;
423                         erch[1] = 0;
424                         ASN1err(ASN1_F_PARSE_TAGGING, ASN1_R_INVALID_MODIFIER);
425                         ERR_add_error_data(2, "Char=", erch);
426                         return 0;
427                         break;
428
429                         }
430                 }
431         else
432                 *pclass = V_ASN1_CONTEXT_SPECIFIC;
433
434         return 1;
435
436         }
437
438 /* Handle multiple types: SET and SEQUENCE */
439
440 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf)
441         {
442         ASN1_TYPE *ret = NULL, *typ = NULL;
443         STACK_OF(ASN1_TYPE) *sk = NULL;
444         STACK_OF(CONF_VALUE) *sect = NULL;
445         unsigned char *der = NULL, *p;
446         int derlen;
447         int i, is_set;
448         sk = sk_ASN1_TYPE_new_null();
449         if (section)
450                 {
451                 if (!cnf)
452                         goto bad;
453                 sect = X509V3_get_section(cnf, (char *)section);
454                 if (!sect)
455                         goto bad;
456                 for (i = 0; i < sk_CONF_VALUE_num(sect); i++)
457                         {
458                         typ = ASN1_generate_v3(sk_CONF_VALUE_value(sect, i)->value, cnf);
459                         if (!typ)
460                                 goto bad;
461                         sk_ASN1_TYPE_push(sk, typ);
462                         typ = NULL;
463                         }
464                 }
465
466         /* Now we has a STACK of the components, convert to the correct form */
467
468         if (utype == V_ASN1_SET)
469                 is_set = 1;
470         else
471                 is_set = 0;
472
473
474         derlen = i2d_ASN1_SET_OF_ASN1_TYPE(sk, NULL, i2d_ASN1_TYPE, utype,
475                                            V_ASN1_UNIVERSAL, is_set);
476         der = OPENSSL_malloc(derlen);
477         p = der;
478         i2d_ASN1_SET_OF_ASN1_TYPE(sk, &p, i2d_ASN1_TYPE, utype,
479                                   V_ASN1_UNIVERSAL, is_set);
480
481         if (!(ret = ASN1_TYPE_new()))
482                 goto bad;
483
484         if (!(ret->value.asn1_string = ASN1_STRING_type_new(utype)))
485                 goto bad;
486
487         ret->type = utype;
488
489         ret->value.asn1_string->data = der;
490         ret->value.asn1_string->length = derlen;
491
492         der = NULL;
493
494         bad:
495
496         if (der)
497                 OPENSSL_free(der);
498
499         if (sk)
500                 sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free);
501         if (typ)
502                 ASN1_TYPE_free(typ);
503         if (sect)
504                 X509V3_section_free(cnf, sect);
505
506         return ret;
507         }
508
509 static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class, int exp_constructed, int exp_pad, int imp_ok)
510         {
511         tag_exp_type *exp_tmp;
512         /* Can only have IMPLICIT if permitted */
513         if ((arg->imp_tag != -1) && !imp_ok)
514                 {
515                 ASN1err(ASN1_F_APPEND_EXP, ASN1_R_ILLEGAL_IMPLICIT_TAG);
516                 return 0;
517                 }
518
519         if (arg->exp_count == ASN1_FLAG_EXP_MAX)
520                 {
521                 ASN1err(ASN1_F_APPEND_EXP, ASN1_R_DEPTH_EXCEEDED);
522                 return 0;
523                 }
524
525         exp_tmp = &arg->exp_list[arg->exp_count++];
526
527         /* If IMPLICIT set tag to implicit value then
528          * reset implicit tag since it has been used.
529          */
530         if (arg->imp_tag != -1)
531                 {
532                 exp_tmp->exp_tag = arg->imp_tag;
533                 exp_tmp->exp_class = arg->imp_class;
534                 arg->imp_tag = -1;
535                 arg->imp_class = -1;
536                 }
537         else
538                 {
539                 exp_tmp->exp_tag = exp_tag;
540                 exp_tmp->exp_class = exp_class;
541                 }
542         exp_tmp->exp_constructed = exp_constructed;
543         exp_tmp->exp_pad = exp_pad;
544
545         return 1;
546         }
547
548
549 static int asn1_str2tag(const char *tagstr, int len)
550         {
551         unsigned int i;
552         static struct tag_name_st *tntmp, tnst [] = {
553                 ASN1_GEN_STR("BOOL", V_ASN1_BOOLEAN),
554                 ASN1_GEN_STR("BOOLEAN", V_ASN1_BOOLEAN),
555                 ASN1_GEN_STR("NULL", V_ASN1_NULL),
556                 ASN1_GEN_STR("INT", V_ASN1_INTEGER),
557                 ASN1_GEN_STR("INTEGER", V_ASN1_INTEGER),
558                 ASN1_GEN_STR("ENUM", V_ASN1_ENUMERATED),
559                 ASN1_GEN_STR("ENUMERATED", V_ASN1_ENUMERATED),
560                 ASN1_GEN_STR("OID", V_ASN1_OBJECT),
561                 ASN1_GEN_STR("OBJECT", V_ASN1_OBJECT),
562                 ASN1_GEN_STR("UTCTIME", V_ASN1_UTCTIME),
563                 ASN1_GEN_STR("UTC", V_ASN1_UTCTIME),
564                 ASN1_GEN_STR("GENERALIZEDTIME", V_ASN1_GENERALIZEDTIME),
565                 ASN1_GEN_STR("GENTIME", V_ASN1_GENERALIZEDTIME),
566                 ASN1_GEN_STR("OCT", V_ASN1_OCTET_STRING),
567                 ASN1_GEN_STR("OCTETSTRING", V_ASN1_OCTET_STRING),
568                 ASN1_GEN_STR("BITSTR", V_ASN1_BIT_STRING),
569                 ASN1_GEN_STR("BITSTRING", V_ASN1_BIT_STRING),
570                 ASN1_GEN_STR("UNIVERSALSTRING", V_ASN1_UNIVERSALSTRING),
571                 ASN1_GEN_STR("UNIV", V_ASN1_UNIVERSALSTRING),
572                 ASN1_GEN_STR("IA5", V_ASN1_IA5STRING),
573                 ASN1_GEN_STR("IA5STRING", V_ASN1_IA5STRING),
574                 ASN1_GEN_STR("UTF8", V_ASN1_UTF8STRING),
575                 ASN1_GEN_STR("UTF8String", V_ASN1_UTF8STRING),
576                 ASN1_GEN_STR("BMP", V_ASN1_BMPSTRING),
577                 ASN1_GEN_STR("BMPSTRING", V_ASN1_BMPSTRING),
578                 ASN1_GEN_STR("VISIBLESTRING", V_ASN1_VISIBLESTRING),
579                 ASN1_GEN_STR("VISIBLE", V_ASN1_VISIBLESTRING),
580                 ASN1_GEN_STR("PRINTABLESTRING", V_ASN1_PRINTABLESTRING),
581                 ASN1_GEN_STR("PRINTABLE", V_ASN1_PRINTABLESTRING),
582                 ASN1_GEN_STR("T61", V_ASN1_T61STRING),
583                 ASN1_GEN_STR("T61STRING", V_ASN1_T61STRING),
584                 ASN1_GEN_STR("TELETEXSTRING", V_ASN1_T61STRING),
585                 ASN1_GEN_STR("GeneralString", V_ASN1_GENERALSTRING),
586                 ASN1_GEN_STR("GENSTR", V_ASN1_GENERALSTRING),
587                 ASN1_GEN_STR("NUMERIC", V_ASN1_NUMERICSTRING),
588                 ASN1_GEN_STR("NUMERICSTRING", V_ASN1_NUMERICSTRING),
589
590                 /* Special cases */
591                 ASN1_GEN_STR("SEQUENCE", V_ASN1_SEQUENCE),
592                 ASN1_GEN_STR("SEQ", V_ASN1_SEQUENCE),
593                 ASN1_GEN_STR("SET", V_ASN1_SET),
594                 /* type modifiers */
595                 /* Explicit tag */
596                 ASN1_GEN_STR("EXP", ASN1_GEN_FLAG_EXP),
597                 ASN1_GEN_STR("EXPLICIT", ASN1_GEN_FLAG_EXP),
598                 /* Implicit tag */
599                 ASN1_GEN_STR("IMP", ASN1_GEN_FLAG_IMP),
600                 ASN1_GEN_STR("IMPLICIT", ASN1_GEN_FLAG_IMP),
601                 /* OCTET STRING wrapper */
602                 ASN1_GEN_STR("OCTWRAP", ASN1_GEN_FLAG_OCTWRAP),
603                 /* SEQUENCE wrapper */
604                 ASN1_GEN_STR("SEQWRAP", ASN1_GEN_FLAG_SEQWRAP),
605                 /* SET wrapper */
606                 ASN1_GEN_STR("SETWRAP", ASN1_GEN_FLAG_SETWRAP),
607                 /* BIT STRING wrapper */
608                 ASN1_GEN_STR("BITWRAP", ASN1_GEN_FLAG_BITWRAP),
609                 ASN1_GEN_STR("FORM", ASN1_GEN_FLAG_FORMAT),
610                 ASN1_GEN_STR("FORMAT", ASN1_GEN_FLAG_FORMAT),
611         };
612
613         if (len == -1)
614                 len = strlen(tagstr);
615         
616         tntmp = tnst;   
617         for (i = 0; i < sizeof(tnst) / sizeof(struct tag_name_st); i++, tntmp++)
618                 {
619                 if ((len == tntmp->len) && !strncmp(tntmp->strnam, tagstr, len))
620                         return tntmp->tag;
621                 }
622         
623         return -1;
624         }
625
626 static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype)
627         {
628         ASN1_TYPE *atmp = NULL;
629
630         CONF_VALUE vtmp;
631
632         unsigned char *rdata;
633         long rdlen;
634
635         int no_unused = 1;
636
637         if (!(atmp = ASN1_TYPE_new()))
638                 {
639                 ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
640                 return NULL;
641                 }
642
643         if (!str)
644                 str = "";
645
646         switch(utype)
647                 {
648
649                 case V_ASN1_NULL:
650                 if (str && *str)
651                         {
652                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_NULL_VALUE);
653                         goto bad_form;
654                         }
655                 break;
656                 
657                 case V_ASN1_BOOLEAN:
658                 if (format != ASN1_GEN_FORMAT_ASCII)
659                         {
660                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_NOT_ASCII_FORMAT);
661                         goto bad_form;
662                         }
663                 vtmp.name = NULL;
664                 vtmp.section = NULL;
665                 vtmp.value = (char *)str;
666                 if (!X509V3_get_value_bool(&vtmp, &atmp->value.boolean))
667                         {
668                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_BOOLEAN);
669                         goto bad_str;
670                         }
671                 break;
672
673                 case V_ASN1_INTEGER:
674                 case V_ASN1_ENUMERATED:
675                 if (format != ASN1_GEN_FORMAT_ASCII)
676                         {
677                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_INTEGER_NOT_ASCII_FORMAT);
678                         goto bad_form;
679                         }
680                 if (!(atmp->value.integer = s2i_ASN1_INTEGER(NULL, (char *)str)))
681                         {
682                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_INTEGER);
683                         goto bad_str;
684                         }
685                 break;
686
687                 case V_ASN1_OBJECT:
688                 if (format != ASN1_GEN_FORMAT_ASCII)
689                         {
690                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_OBJECT_NOT_ASCII_FORMAT);
691                         goto bad_form;
692                         }
693                 if (!(atmp->value.object = OBJ_txt2obj(str, 0)))
694                         {
695                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_OBJECT);
696                         goto bad_str;
697                         }
698                 break;
699
700                 case V_ASN1_UTCTIME:
701                 case V_ASN1_GENERALIZEDTIME:
702                 if (format != ASN1_GEN_FORMAT_ASCII)
703                         {
704                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_TIME_NOT_ASCII_FORMAT);
705                         goto bad_form;
706                         }
707                 if (!(atmp->value.asn1_string = ASN1_STRING_new()))
708                         {
709                         ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
710                         goto bad_str;
711                         }
712                 if (!ASN1_STRING_set(atmp->value.asn1_string, str, -1))
713                         {
714                         ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
715                         goto bad_str;
716                         }
717                 atmp->value.asn1_string->type = utype;
718                 if (!ASN1_TIME_check(atmp->value.asn1_string))
719                         {
720                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_TIME_VALUE);
721                         goto bad_str;
722                         }
723
724                 break;
725
726                 case V_ASN1_BMPSTRING:
727                 case V_ASN1_PRINTABLESTRING:
728                 case V_ASN1_IA5STRING:
729                 case V_ASN1_T61STRING:
730                 case V_ASN1_UTF8STRING:
731                 case V_ASN1_VISIBLESTRING:
732                 case V_ASN1_UNIVERSALSTRING:
733                 case V_ASN1_GENERALSTRING:
734                 case V_ASN1_NUMERICSTRING:
735
736                 if (format == ASN1_GEN_FORMAT_ASCII)
737                         format = MBSTRING_ASC;
738                 else if (format == ASN1_GEN_FORMAT_UTF8)
739                         format = MBSTRING_UTF8;
740                 else
741                         {
742                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_FORMAT);
743                         goto bad_form;
744                         }
745
746
747                 if (ASN1_mbstring_copy(&atmp->value.asn1_string, (unsigned char *)str,
748                                                 -1, format, ASN1_tag2bit(utype)) <= 0)
749                         {
750                         ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
751                         goto bad_str;
752                         }
753                 
754
755                 break;
756
757                 case V_ASN1_BIT_STRING:
758
759                 case V_ASN1_OCTET_STRING:
760
761                 if (!(atmp->value.asn1_string = ASN1_STRING_new()))
762                         {
763                         ASN1err(ASN1_F_ASN1_STR2TYPE, ERR_R_MALLOC_FAILURE);
764                         goto bad_form;
765                         }
766
767                 if (format == ASN1_GEN_FORMAT_HEX)
768                         {
769
770                         if (!(rdata = string_to_hex((char *)str, &rdlen)))
771                                 {
772                                 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_HEX);
773                                 goto bad_str;
774                                 }
775
776                         atmp->value.asn1_string->data = rdata;
777                         atmp->value.asn1_string->length = rdlen;
778                         atmp->value.asn1_string->type = utype;
779
780                         }
781                 else if (format == ASN1_GEN_FORMAT_ASCII)
782                         ASN1_STRING_set(atmp->value.asn1_string, str, -1);
783                 else if ((format == ASN1_GEN_FORMAT_BITLIST) && (utype == V_ASN1_BIT_STRING))
784                         {
785                         if (!CONF_parse_list(str, ',', 1, bitstr_cb, atmp->value.bit_string))
786                                 {
787                                 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_LIST_ERROR);
788                                 goto bad_str;
789                                 }
790                         no_unused = 0;
791                         
792                         }
793                 else 
794                         {
795                         ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_ILLEGAL_BITSTRING_FORMAT);
796                         goto bad_form;
797                         }
798
799                 if ((utype == V_ASN1_BIT_STRING) && no_unused)
800                         {
801                         atmp->value.asn1_string->flags
802                                 &= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07);
803                         atmp->value.asn1_string->flags
804                                 |= ASN1_STRING_FLAG_BITS_LEFT;
805                         }
806
807
808                 break;
809
810                 default:
811                 ASN1err(ASN1_F_ASN1_STR2TYPE, ASN1_R_UNSUPPORTED_TYPE);
812                 goto bad_str;
813                 break;
814                 }
815
816
817         atmp->type = utype;
818         return atmp;
819
820
821         bad_str:
822         ERR_add_error_data(2, "string=", str);
823         bad_form:
824
825         ASN1_TYPE_free(atmp);
826         return NULL;
827
828         }
829
830 static int bitstr_cb(const char *elem, int len, void *bitstr)
831         {
832         long bitnum;
833         char *eptr;
834         if (!elem)
835                 return 0;
836         bitnum = strtoul(elem, &eptr, 10);
837         if (eptr && *eptr && (eptr != elem + len))
838                 return 0;
839         if (bitnum < 0)
840                 {
841                 ASN1err(ASN1_F_BITSTR_CB, ASN1_R_INVALID_NUMBER);
842                 return 0;
843                 }
844         if (!ASN1_BIT_STRING_set_bit(bitstr, bitnum, 1))
845                 {
846                 ASN1err(ASN1_F_BITSTR_CB, ERR_R_MALLOC_FAILURE);
847                 return 0;
848                 }
849         return 1;
850         }
851