1 /* $OpenBSD: asn1_gen.c,v 1.17 2018/04/25 11:48:21 tb Exp $ */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3  * project 2002.
4  */
5 /* ====================================================================
6  * Copyright (c) 2002 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com).
56  *
57  */
58 
59 #include <string.h>
60 
61 #include <openssl/asn1.h>
62 #include <openssl/err.h>
63 #include <openssl/x509v3.h>
64 
65 #define ASN1_GEN_FLAG		0x10000
66 #define ASN1_GEN_FLAG_IMP	(ASN1_GEN_FLAG|1)
67 #define ASN1_GEN_FLAG_EXP	(ASN1_GEN_FLAG|2)
68 #define ASN1_GEN_FLAG_TAG	(ASN1_GEN_FLAG|3)
69 #define ASN1_GEN_FLAG_BITWRAP	(ASN1_GEN_FLAG|4)
70 #define ASN1_GEN_FLAG_OCTWRAP	(ASN1_GEN_FLAG|5)
71 #define ASN1_GEN_FLAG_SEQWRAP	(ASN1_GEN_FLAG|6)
72 #define ASN1_GEN_FLAG_SETWRAP	(ASN1_GEN_FLAG|7)
73 #define ASN1_GEN_FLAG_FORMAT	(ASN1_GEN_FLAG|8)
74 
75 #define ASN1_GEN_STR(str,val){str, sizeof(str) - 1, val}
76 
77 #define ASN1_FLAG_EXP_MAX	20
78 
79 /* Input formats */
80 
81 /* ASCII: default */
82 #define ASN1_GEN_FORMAT_ASCII	1
83 /* UTF8 */
84 #define ASN1_GEN_FORMAT_UTF8	2
85 /* Hex */
86 #define ASN1_GEN_FORMAT_HEX	3
87 /* List of bits */
88 #define ASN1_GEN_FORMAT_BITLIST	4
89 
90 struct tag_name_st {
91 	const char *strnam;
92 	int len;
93 	int tag;
94 };
95 
96 typedef struct {
97 	int exp_tag;
98 	int exp_class;
99 	int exp_constructed;
100 	int exp_pad;
101 	long exp_len;
102 } tag_exp_type;
103 
104 typedef struct {
105 	int imp_tag;
106 	int imp_class;
107 	int utype;
108 	int format;
109 	const char *str;
110 	tag_exp_type exp_list[ASN1_FLAG_EXP_MAX];
111 	int exp_count;
112 } tag_exp_arg;
113 
114 static int bitstr_cb(const char *elem, int len, void *bitstr);
115 static int asn1_cb(const char *elem, int len, void *bitstr);
116 static int append_exp(tag_exp_arg *arg, int exp_tag, int exp_class,
117     int exp_constructed, int exp_pad, int imp_ok);
118 static int parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass);
119 static ASN1_TYPE *asn1_multi(int utype, const char *section, X509V3_CTX *cnf);
120 static ASN1_TYPE *asn1_str2type(const char *str, int format, int utype);
121 static int asn1_str2tag(const char *tagstr, int len);
122 
123 ASN1_TYPE *
124 ASN1_generate_nconf(const char *str, CONF *nconf)
125 {
126 	X509V3_CTX cnf;
127 
128 	if (!nconf)
129 		return ASN1_generate_v3(str, NULL);
130 
131 	X509V3_set_nconf(&cnf, nconf);
132 	return ASN1_generate_v3(str, &cnf);
133 }
134 
135 ASN1_TYPE *
136 ASN1_generate_v3(const char *str, X509V3_CTX *cnf)
137 {
138 	ASN1_TYPE *ret;
139 	tag_exp_arg asn1_tags;
140 	tag_exp_type *etmp;
141 
142 	int i, len;
143 
144 	unsigned char *orig_der = NULL, *new_der = NULL;
145 	const unsigned char *cpy_start;
146 	unsigned char *p;
147 	const unsigned char *cp;
148 	int cpy_len;
149 	long hdr_len = 0;
150 	int hdr_constructed = 0, hdr_tag, hdr_class;
151 	int r;
152 
153 	asn1_tags.imp_tag = -1;
154 	asn1_tags.imp_class = -1;
155 	asn1_tags.format = ASN1_GEN_FORMAT_ASCII;
156 	asn1_tags.exp_count = 0;
157 	if (CONF_parse_list(str, ',', 1, asn1_cb, &asn1_tags) != 0)
158 		return NULL;
159 
160 	if ((asn1_tags.utype == V_ASN1_SEQUENCE) ||
161 	    (asn1_tags.utype == V_ASN1_SET)) {
162 		if (!cnf) {
163 			ASN1error(ASN1_R_SEQUENCE_OR_SET_NEEDS_CONFIG);
164 			return NULL;
165 		}
166 		ret = asn1_multi(asn1_tags.utype, asn1_tags.str, cnf);
167 	} else
168 		ret = asn1_str2type(asn1_tags.str, asn1_tags.format,
169 		    asn1_tags.utype);
170 
171 	if (!ret)
172 		return NULL;
173 
174 	/* If no tagging return base type */
175 	if ((asn1_tags.imp_tag == -1) && (asn1_tags.exp_count == 0))
176 		return ret;
177 
178 	/* Generate the encoding */
179 	cpy_len = i2d_ASN1_TYPE(ret, &orig_der);
180 	ASN1_TYPE_free(ret);
181 	ret = NULL;
182 	/* Set point to start copying for modified encoding */
183 	cpy_start = orig_der;
184 
185 	/* Do we need IMPLICIT tagging? */
186 	if (asn1_tags.imp_tag != -1) {
187 		/* If IMPLICIT we will replace the underlying tag */
188 		/* Skip existing tag+len */
189 		r = ASN1_get_object(&cpy_start, &hdr_len, &hdr_tag,
190 		    &hdr_class, cpy_len);
191 		if (r & 0x80)
192 			goto err;
193 		/* Update copy length */
194 		cpy_len -= cpy_start - orig_der;
195 		/* For IMPLICIT tagging the length should match the
196 		 * original length and constructed flag should be
197 		 * consistent.
198 		 */
199 		if (r & 0x1) {
200 			/* Indefinite length constructed */
201 			hdr_constructed = 2;
202 			hdr_len = 0;
203 		} else
204 			/* Just retain constructed flag */
205 			hdr_constructed = r & V_ASN1_CONSTRUCTED;
206 		/* Work out new length with IMPLICIT tag: ignore constructed
207 		 * because it will mess up if indefinite length
208 		 */
209 		len = ASN1_object_size(0, hdr_len, asn1_tags.imp_tag);
210 	} else
211 		len = cpy_len;
212 
213 	/* Work out length in any EXPLICIT, starting from end */
214 
215 	for (i = 0, etmp = asn1_tags.exp_list + asn1_tags.exp_count - 1;
216 	    i < asn1_tags.exp_count; i++, etmp--) {
217 		/* Content length: number of content octets + any padding */
218 		len += etmp->exp_pad;
219 		etmp->exp_len = len;
220 		/* Total object length: length including new header */
221 		len = ASN1_object_size(0, len, etmp->exp_tag);
222 	}
223 
224 	/* Allocate buffer for new encoding */
225 
226 	new_der = malloc(len);
227 	if (!new_der)
228 		goto err;
229 
230 	/* Generate tagged encoding */
231 	p = new_der;
232 
233 	/* Output explicit tags first */
234 	for (i = 0, etmp = asn1_tags.exp_list; i < asn1_tags.exp_count;
235 	    i++, etmp++) {
236 		ASN1_put_object(&p, etmp->exp_constructed, etmp->exp_len,
237 		    etmp->exp_tag, etmp->exp_class);
238 		if (etmp->exp_pad)
239 			*p++ = 0;
240 	}
241 
242 	/* If IMPLICIT, output tag */
243 
244 	if (asn1_tags.imp_tag != -1) {
245 		if (asn1_tags.imp_class == V_ASN1_UNIVERSAL &&
246 		    (asn1_tags.imp_tag == V_ASN1_SEQUENCE ||
247 		    asn1_tags.imp_tag == V_ASN1_SET))
248 			hdr_constructed = V_ASN1_CONSTRUCTED;
249 		ASN1_put_object(&p, hdr_constructed, hdr_len,
250 		    asn1_tags.imp_tag, asn1_tags.imp_class);
251 	}
252 
253 	/* Copy across original encoding */
254 	memcpy(p, cpy_start, cpy_len);
255 
256 	cp = new_der;
257 
258 	/* Obtain new ASN1_TYPE structure */
259 	ret = d2i_ASN1_TYPE(NULL, &cp, len);
260 
261 err:
262 	free(orig_der);
263 	free(new_der);
264 
265 	return ret;
266 }
267 
268 static int
269 asn1_cb(const char *elem, int len, void *bitstr)
270 {
271 	tag_exp_arg *arg = bitstr;
272 	int i;
273 	int utype;
274 	int vlen = 0;
275 	const char *p, *vstart = NULL;
276 
277 	int tmp_tag, tmp_class;
278 
279 	for (i = 0, p = elem; i < len; p++, i++) {
280 		/* Look for the ':' in name value pairs */
281 		if (*p == ':') {
282 			vstart = p + 1;
283 			vlen = len - (vstart - elem);
284 			len = p - elem;
285 			break;
286 		}
287 	}
288 
289 	utype = asn1_str2tag(elem, len);
290 
291 	if (utype == -1) {
292 		ASN1error(ASN1_R_UNKNOWN_TAG);
293 		ERR_asprintf_error_data("tag=%s", elem);
294 		return -1;
295 	}
296 
297 	/* If this is not a modifier mark end of string and exit */
298 	if (!(utype & ASN1_GEN_FLAG)) {
299 		arg->utype = utype;
300 		arg->str = vstart;
301 		/* If no value and not end of string, error */
302 		if (!vstart && elem[len]) {
303 			ASN1error(ASN1_R_MISSING_VALUE);
304 			return -1;
305 		}
306 		return 0;
307 	}
308 
309 	switch (utype) {
310 
311 	case ASN1_GEN_FLAG_IMP:
312 		/* Check for illegal multiple IMPLICIT tagging */
313 		if (arg->imp_tag != -1) {
314 			ASN1error(ASN1_R_ILLEGAL_NESTED_TAGGING);
315 			return -1;
316 		}
317 		if (!parse_tagging(vstart, vlen, &arg->imp_tag,
318 		    &arg->imp_class))
319 			return -1;
320 		break;
321 
322 	case ASN1_GEN_FLAG_EXP:
323 		if (!parse_tagging(vstart, vlen, &tmp_tag, &tmp_class))
324 			return -1;
325 		if (!append_exp(arg, tmp_tag, tmp_class, 1, 0, 0))
326 			return -1;
327 		break;
328 
329 	case ASN1_GEN_FLAG_SEQWRAP:
330 		if (!append_exp(arg, V_ASN1_SEQUENCE, V_ASN1_UNIVERSAL, 1, 0, 1))
331 			return -1;
332 		break;
333 
334 	case ASN1_GEN_FLAG_SETWRAP:
335 		if (!append_exp(arg, V_ASN1_SET, V_ASN1_UNIVERSAL, 1, 0, 1))
336 			return -1;
337 		break;
338 
339 	case ASN1_GEN_FLAG_BITWRAP:
340 		if (!append_exp(arg, V_ASN1_BIT_STRING, V_ASN1_UNIVERSAL, 0, 1, 1))
341 			return -1;
342 		break;
343 
344 	case ASN1_GEN_FLAG_OCTWRAP:
345 		if (!append_exp(arg, V_ASN1_OCTET_STRING, V_ASN1_UNIVERSAL, 0, 0, 1))
346 			return -1;
347 		break;
348 
349 	case ASN1_GEN_FLAG_FORMAT:
350 		if (vstart == NULL) {
351 			ASN1error(ASN1_R_ILLEGAL_FORMAT);
352 			return -1;
353 		}
354 		if (!strncmp(vstart, "ASCII", 5))
355 			arg->format = ASN1_GEN_FORMAT_ASCII;
356 		else if (!strncmp(vstart, "UTF8", 4))
357 			arg->format = ASN1_GEN_FORMAT_UTF8;
358 		else if (!strncmp(vstart, "HEX", 3))
359 			arg->format = ASN1_GEN_FORMAT_HEX;
360 		else if (!strncmp(vstart, "BITLIST", 7))
361 			arg->format = ASN1_GEN_FORMAT_BITLIST;
362 		else {
363 			ASN1error(ASN1_R_UNKOWN_FORMAT);
364 			return -1;
365 		}
366 		break;
367 
368 	}
369 
370 	return 1;
371 }
372 
373 static int
374 parse_tagging(const char *vstart, int vlen, int *ptag, int *pclass)
375 {
376 	long tag_num;
377 	char *eptr;
378 
379 	if (!vstart)
380 		return 0;
381 	tag_num = strtoul(vstart, &eptr, 10);
382 	/* Check we haven't gone past max length: should be impossible */
383 	if (eptr && *eptr && (eptr > vstart + vlen))
384 		return 0;
385 	if (tag_num < 0) {
386 		ASN1error(ASN1_R_INVALID_NUMBER);
387 		return 0;
388 	}
389 	*ptag = tag_num;
390 	/* If we have non numeric characters, parse them */
391 	if (eptr)
392 		vlen -= eptr - vstart;
393 	else
394 		vlen = 0;
395 	if (vlen) {
396 		switch (*eptr) {
397 
398 		case 'U':
399 			*pclass = V_ASN1_UNIVERSAL;
400 			break;
401 
402 		case 'A':
403 			*pclass = V_ASN1_APPLICATION;
404 			break;
405 
406 		case 'P':
407 			*pclass = V_ASN1_PRIVATE;
408 			break;
409 
410 		case 'C':
411 			*pclass = V_ASN1_CONTEXT_SPECIFIC;
412 			break;
413 
414 		default:
415 			ASN1error(ASN1_R_INVALID_MODIFIER);
416 			ERR_asprintf_error_data("Char=%c", *eptr);
417 			return 0;
418 			break;
419 
420 		}
421 	} else
422 		*pclass = V_ASN1_CONTEXT_SPECIFIC;
423 
424 	return 1;
425 
426 }
427 
428 /* Handle multiple types: SET and SEQUENCE */
429 
430 static ASN1_TYPE *
431 asn1_multi(int utype, const char *section, X509V3_CTX *cnf)
432 {
433 	ASN1_TYPE *ret = NULL;
434 	STACK_OF(ASN1_TYPE) *sk = NULL;
435 	STACK_OF(CONF_VALUE) *sect = NULL;
436 	unsigned char *der = NULL;
437 	int derlen;
438 	int i;
439 	sk = sk_ASN1_TYPE_new_null();
440 	if (!sk)
441 		goto bad;
442 	if (section) {
443 		if (!cnf)
444 			goto bad;
445 		sect = X509V3_get_section(cnf, (char *)section);
446 		if (!sect)
447 			goto bad;
448 		for (i = 0; i < sk_CONF_VALUE_num(sect); i++) {
449 			ASN1_TYPE *typ = ASN1_generate_v3(
450 			    sk_CONF_VALUE_value(sect, i)->value, cnf);
451 			if (!typ)
452 				goto bad;
453 			if (!sk_ASN1_TYPE_push(sk, typ))
454 				goto bad;
455 		}
456 	}
457 
458 	/* Now we has a STACK of the components, convert to the correct form */
459 
460 	if (utype == V_ASN1_SET)
461 		derlen = i2d_ASN1_SET_ANY(sk, &der);
462 	else
463 		derlen = i2d_ASN1_SEQUENCE_ANY(sk, &der);
464 
465 	if (derlen < 0)
466 		goto bad;
467 
468 	if (!(ret = ASN1_TYPE_new()))
469 		goto bad;
470 
471 	if (!(ret->value.asn1_string = ASN1_STRING_type_new(utype)))
472 		goto bad;
473 
474 	ret->type = utype;
475 
476 	ret->value.asn1_string->data = der;
477 	ret->value.asn1_string->length = derlen;
478 
479 	der = NULL;
480 
481 bad:
482 	free(der);
483 	if (sk)
484 		sk_ASN1_TYPE_pop_free(sk, ASN1_TYPE_free);
485 	if (sect)
486 		X509V3_section_free(cnf, sect);
487 
488 	return ret;
489 }
490 
491 static int
492 append_exp(tag_exp_arg *arg, int exp_tag, int exp_class, int exp_constructed,
493     int exp_pad, int imp_ok)
494 {
495 	tag_exp_type *exp_tmp;
496 
497 	/* Can only have IMPLICIT if permitted */
498 	if ((arg->imp_tag != -1) && !imp_ok) {
499 		ASN1error(ASN1_R_ILLEGAL_IMPLICIT_TAG);
500 		return 0;
501 	}
502 
503 	if (arg->exp_count == ASN1_FLAG_EXP_MAX) {
504 		ASN1error(ASN1_R_DEPTH_EXCEEDED);
505 		return 0;
506 	}
507 
508 	exp_tmp = &arg->exp_list[arg->exp_count++];
509 
510 	/* If IMPLICIT set tag to implicit value then
511 	 * reset implicit tag since it has been used.
512 	 */
513 	if (arg->imp_tag != -1) {
514 		exp_tmp->exp_tag = arg->imp_tag;
515 		exp_tmp->exp_class = arg->imp_class;
516 		arg->imp_tag = -1;
517 		arg->imp_class = -1;
518 	} else {
519 		exp_tmp->exp_tag = exp_tag;
520 		exp_tmp->exp_class = exp_class;
521 	}
522 	exp_tmp->exp_constructed = exp_constructed;
523 	exp_tmp->exp_pad = exp_pad;
524 
525 	return 1;
526 }
527 
528 static int
529 asn1_str2tag(const char *tagstr, int len)
530 {
531 	unsigned int i;
532 	static const struct tag_name_st *tntmp, tnst [] = {
533 		ASN1_GEN_STR("BOOL", V_ASN1_BOOLEAN),
534 		ASN1_GEN_STR("BOOLEAN", V_ASN1_BOOLEAN),
535 		ASN1_GEN_STR("NULL", V_ASN1_NULL),
536 		ASN1_GEN_STR("INT", V_ASN1_INTEGER),
537 		ASN1_GEN_STR("INTEGER", V_ASN1_INTEGER),
538 		ASN1_GEN_STR("ENUM", V_ASN1_ENUMERATED),
539 		ASN1_GEN_STR("ENUMERATED", V_ASN1_ENUMERATED),
540 		ASN1_GEN_STR("OID", V_ASN1_OBJECT),
541 		ASN1_GEN_STR("OBJECT", V_ASN1_OBJECT),
542 		ASN1_GEN_STR("UTCTIME", V_ASN1_UTCTIME),
543 		ASN1_GEN_STR("UTC", V_ASN1_UTCTIME),
544 		ASN1_GEN_STR("GENERALIZEDTIME", V_ASN1_GENERALIZEDTIME),
545 		ASN1_GEN_STR("GENTIME", V_ASN1_GENERALIZEDTIME),
546 		ASN1_GEN_STR("OCT", V_ASN1_OCTET_STRING),
547 		ASN1_GEN_STR("OCTETSTRING", V_ASN1_OCTET_STRING),
548 		ASN1_GEN_STR("BITSTR", V_ASN1_BIT_STRING),
549 		ASN1_GEN_STR("BITSTRING", V_ASN1_BIT_STRING),
550 		ASN1_GEN_STR("UNIVERSALSTRING", V_ASN1_UNIVERSALSTRING),
551 		ASN1_GEN_STR("UNIV", V_ASN1_UNIVERSALSTRING),
552 		ASN1_GEN_STR("IA5", V_ASN1_IA5STRING),
553 		ASN1_GEN_STR("IA5STRING", V_ASN1_IA5STRING),
554 		ASN1_GEN_STR("UTF8", V_ASN1_UTF8STRING),
555 		ASN1_GEN_STR("UTF8String", V_ASN1_UTF8STRING),
556 		ASN1_GEN_STR("BMP", V_ASN1_BMPSTRING),
557 		ASN1_GEN_STR("BMPSTRING", V_ASN1_BMPSTRING),
558 		ASN1_GEN_STR("VISIBLESTRING", V_ASN1_VISIBLESTRING),
559 		ASN1_GEN_STR("VISIBLE", V_ASN1_VISIBLESTRING),
560 		ASN1_GEN_STR("PRINTABLESTRING", V_ASN1_PRINTABLESTRING),
561 		ASN1_GEN_STR("PRINTABLE", V_ASN1_PRINTABLESTRING),
562 		ASN1_GEN_STR("T61", V_ASN1_T61STRING),
563 		ASN1_GEN_STR("T61STRING", V_ASN1_T61STRING),
564 		ASN1_GEN_STR("TELETEXSTRING", V_ASN1_T61STRING),
565 		ASN1_GEN_STR("GeneralString", V_ASN1_GENERALSTRING),
566 		ASN1_GEN_STR("GENSTR", V_ASN1_GENERALSTRING),
567 		ASN1_GEN_STR("NUMERIC", V_ASN1_NUMERICSTRING),
568 		ASN1_GEN_STR("NUMERICSTRING", V_ASN1_NUMERICSTRING),
569 
570 		/* Special cases */
571 		ASN1_GEN_STR("SEQUENCE", V_ASN1_SEQUENCE),
572 		ASN1_GEN_STR("SEQ", V_ASN1_SEQUENCE),
573 		ASN1_GEN_STR("SET", V_ASN1_SET),
574 		/* type modifiers */
575 		/* Explicit tag */
576 		ASN1_GEN_STR("EXP", ASN1_GEN_FLAG_EXP),
577 		ASN1_GEN_STR("EXPLICIT", ASN1_GEN_FLAG_EXP),
578 		/* Implicit tag */
579 		ASN1_GEN_STR("IMP", ASN1_GEN_FLAG_IMP),
580 		ASN1_GEN_STR("IMPLICIT", ASN1_GEN_FLAG_IMP),
581 		/* OCTET STRING wrapper */
582 		ASN1_GEN_STR("OCTWRAP", ASN1_GEN_FLAG_OCTWRAP),
583 		/* SEQUENCE wrapper */
584 		ASN1_GEN_STR("SEQWRAP", ASN1_GEN_FLAG_SEQWRAP),
585 		/* SET wrapper */
586 		ASN1_GEN_STR("SETWRAP", ASN1_GEN_FLAG_SETWRAP),
587 		/* BIT STRING wrapper */
588 		ASN1_GEN_STR("BITWRAP", ASN1_GEN_FLAG_BITWRAP),
589 		ASN1_GEN_STR("FORM", ASN1_GEN_FLAG_FORMAT),
590 		ASN1_GEN_STR("FORMAT", ASN1_GEN_FLAG_FORMAT),
591 	};
592 
593 	if (len == -1)
594 		len = strlen(tagstr);
595 
596 	tntmp = tnst;
597 	for (i = 0; i < sizeof(tnst) / sizeof(struct tag_name_st);
598 	    i++, tntmp++) {
599 		if ((len == tntmp->len) && !strncmp(tntmp->strnam, tagstr, len))
600 			return tntmp->tag;
601 	}
602 
603 	return -1;
604 }
605 
606 static ASN1_TYPE *
607 asn1_str2type(const char *str, int format, int utype)
608 {
609 	ASN1_TYPE *atmp = NULL;
610 	CONF_VALUE vtmp;
611 	unsigned char *rdata;
612 	long rdlen;
613 	int no_unused = 1;
614 
615 	if (!(atmp = ASN1_TYPE_new())) {
616 		ASN1error(ERR_R_MALLOC_FAILURE);
617 		return NULL;
618 	}
619 
620 	if (!str)
621 		str = "";
622 
623 	switch (utype) {
624 
625 	case V_ASN1_NULL:
626 		if (str && *str) {
627 			ASN1error(ASN1_R_ILLEGAL_NULL_VALUE);
628 			goto bad_form;
629 		}
630 		break;
631 
632 	case V_ASN1_BOOLEAN:
633 		if (format != ASN1_GEN_FORMAT_ASCII) {
634 			ASN1error(ASN1_R_NOT_ASCII_FORMAT);
635 			goto bad_form;
636 		}
637 		vtmp.name = NULL;
638 		vtmp.section = NULL;
639 		vtmp.value = (char *)str;
640 		if (!X509V3_get_value_bool(&vtmp, &atmp->value.boolean)) {
641 			ASN1error(ASN1_R_ILLEGAL_BOOLEAN);
642 			goto bad_str;
643 		}
644 		break;
645 
646 	case V_ASN1_INTEGER:
647 	case V_ASN1_ENUMERATED:
648 		if (format != ASN1_GEN_FORMAT_ASCII) {
649 			ASN1error(ASN1_R_INTEGER_NOT_ASCII_FORMAT);
650 			goto bad_form;
651 		}
652 		if (!(atmp->value.integer =
653 		    s2i_ASN1_INTEGER(NULL, (char *)str))) {
654 			ASN1error(ASN1_R_ILLEGAL_INTEGER);
655 			goto bad_str;
656 		}
657 		break;
658 
659 	case V_ASN1_OBJECT:
660 		if (format != ASN1_GEN_FORMAT_ASCII) {
661 			ASN1error(ASN1_R_OBJECT_NOT_ASCII_FORMAT);
662 			goto bad_form;
663 		}
664 		if (!(atmp->value.object = OBJ_txt2obj(str, 0))) {
665 			ASN1error(ASN1_R_ILLEGAL_OBJECT);
666 			goto bad_str;
667 		}
668 		break;
669 
670 	case V_ASN1_UTCTIME:
671 	case V_ASN1_GENERALIZEDTIME:
672 		if (format != ASN1_GEN_FORMAT_ASCII) {
673 			ASN1error(ASN1_R_TIME_NOT_ASCII_FORMAT);
674 			goto bad_form;
675 		}
676 		if (!(atmp->value.asn1_string = ASN1_STRING_new())) {
677 			ASN1error(ERR_R_MALLOC_FAILURE);
678 			goto bad_str;
679 		}
680 		if (!ASN1_STRING_set(atmp->value.asn1_string, str, -1)) {
681 			ASN1error(ERR_R_MALLOC_FAILURE);
682 			goto bad_str;
683 		}
684 		atmp->value.asn1_string->type = utype;
685 		if (!ASN1_TIME_check(atmp->value.asn1_string)) {
686 			ASN1error(ASN1_R_ILLEGAL_TIME_VALUE);
687 			goto bad_str;
688 		}
689 		break;
690 
691 	case V_ASN1_BMPSTRING:
692 	case V_ASN1_PRINTABLESTRING:
693 	case V_ASN1_IA5STRING:
694 	case V_ASN1_T61STRING:
695 	case V_ASN1_UTF8STRING:
696 	case V_ASN1_VISIBLESTRING:
697 	case V_ASN1_UNIVERSALSTRING:
698 	case V_ASN1_GENERALSTRING:
699 	case V_ASN1_NUMERICSTRING:
700 
701 		if (format == ASN1_GEN_FORMAT_ASCII)
702 			format = MBSTRING_ASC;
703 		else if (format == ASN1_GEN_FORMAT_UTF8)
704 			format = MBSTRING_UTF8;
705 		else {
706 			ASN1error(ASN1_R_ILLEGAL_FORMAT);
707 			goto bad_form;
708 		}
709 
710 		if (ASN1_mbstring_copy(&atmp->value.asn1_string,
711 		    (unsigned char *)str, -1, format,
712 		    ASN1_tag2bit(utype)) <= 0) {
713 			ASN1error(ERR_R_MALLOC_FAILURE);
714 			goto bad_str;
715 		}
716 		break;
717 
718 	case V_ASN1_BIT_STRING:
719 	case V_ASN1_OCTET_STRING:
720 		if (!(atmp->value.asn1_string = ASN1_STRING_new())) {
721 			ASN1error(ERR_R_MALLOC_FAILURE);
722 			goto bad_form;
723 		}
724 
725 		if (format == ASN1_GEN_FORMAT_HEX) {
726 
727 			if (!(rdata = string_to_hex((char *)str, &rdlen))) {
728 				ASN1error(ASN1_R_ILLEGAL_HEX);
729 				goto bad_str;
730 			}
731 
732 			atmp->value.asn1_string->data = rdata;
733 			atmp->value.asn1_string->length = rdlen;
734 			atmp->value.asn1_string->type = utype;
735 
736 		} else if (format == ASN1_GEN_FORMAT_ASCII) {
737 			if (ASN1_STRING_set(atmp->value.asn1_string, str,
738 			    -1) == 0) {
739 				ASN1error(ERR_R_MALLOC_FAILURE);
740 				goto bad_str;
741 			}
742 		} else if ((format == ASN1_GEN_FORMAT_BITLIST) &&
743 		    (utype == V_ASN1_BIT_STRING)) {
744 			if (!CONF_parse_list(str, ',', 1, bitstr_cb,
745 			    atmp->value.bit_string)) {
746 				ASN1error(ASN1_R_LIST_ERROR);
747 				goto bad_str;
748 			}
749 			no_unused = 0;
750 
751 		} else {
752 			ASN1error(ASN1_R_ILLEGAL_BITSTRING_FORMAT);
753 			goto bad_form;
754 		}
755 
756 		if ((utype == V_ASN1_BIT_STRING) && no_unused) {
757 			atmp->value.asn1_string->flags &=
758 			    ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07);
759 			atmp->value.asn1_string->flags |=
760 			    ASN1_STRING_FLAG_BITS_LEFT;
761 		}
762 
763 		break;
764 
765 	default:
766 		ASN1error(ASN1_R_UNSUPPORTED_TYPE);
767 		goto bad_str;
768 		break;
769 	}
770 
771 	atmp->type = utype;
772 	return atmp;
773 
774 bad_str:
775 	ERR_asprintf_error_data("string=%s", str);
776 bad_form:
777 	ASN1_TYPE_free(atmp);
778 	return NULL;
779 }
780 
781 static int
782 bitstr_cb(const char *elem, int len, void *bitstr)
783 {
784 	long bitnum;
785 	char *eptr;
786 
787 	if (!elem)
788 		return 0;
789 	bitnum = strtoul(elem, &eptr, 10);
790 	if (eptr && *eptr && (eptr != elem + len))
791 		return 0;
792 	if (bitnum < 0) {
793 		ASN1error(ASN1_R_INVALID_NUMBER);
794 		return 0;
795 	}
796 	if (!ASN1_BIT_STRING_set_bit(bitstr, bitnum, 1)) {
797 		ASN1error(ERR_R_MALLOC_FAILURE);
798 		return 0;
799 	}
800 	return 1;
801 }
802