| /* |
| * Copyright 1999-2016 The OpenSSL Project Authors. All Rights Reserved. |
| * |
| * Licensed under the OpenSSL license (the "License"). You may not use |
| * this file except in compliance with the License. You can obtain a copy |
| * in the file LICENSE in the source distribution or at |
| * https://www.openssl.org/source/license.html |
| */ |
| |
| #include <openssl/asn1.h> |
| |
| #include <limits.h> |
| #include <string.h> |
| |
| #include <openssl/bytestring.h> |
| #include <openssl/err.h> |
| #include <openssl/mem.h> |
| |
| #include "../bytestring/internal.h" |
| #include "internal.h" |
| |
| // These functions take a string in UTF8, ASCII or multibyte form and a mask |
| // of permissible ASN1 string types. It then works out the minimal type |
| // (using the order Printable < IA5 < T61 < BMP < Universal < UTF8) and |
| // creates a string of the correct type with the supplied data. Yes this is |
| // horrible: it has to be :-( The 'ncopy' form checks minimum and maximum |
| // size limits too. |
| |
| int ASN1_mbstring_copy(ASN1_STRING **out, const unsigned char *in, |
| ossl_ssize_t len, int inform, unsigned long mask) { |
| return ASN1_mbstring_ncopy(out, in, len, inform, mask, /*minsize=*/0, |
| /*maxsize=*/0); |
| } |
| |
| OPENSSL_DECLARE_ERROR_REASON(ASN1, INVALID_BMPSTRING) |
| OPENSSL_DECLARE_ERROR_REASON(ASN1, INVALID_UNIVERSALSTRING) |
| OPENSSL_DECLARE_ERROR_REASON(ASN1, INVALID_UTF8STRING) |
| |
| int ASN1_mbstring_ncopy(ASN1_STRING **out, const unsigned char *in, |
| ossl_ssize_t len, int inform, unsigned long mask, |
| ossl_ssize_t minsize, ossl_ssize_t maxsize) { |
| if (len == -1) { |
| len = strlen((const char *)in); |
| } |
| if (!mask) { |
| mask = DIRSTRING_TYPE; |
| } |
| |
| int (*decode_func)(CBS *, uint32_t *); |
| int error; |
| switch (inform) { |
| case MBSTRING_BMP: |
| decode_func = CBS_get_ucs2_be; |
| error = ASN1_R_INVALID_BMPSTRING; |
| break; |
| |
| case MBSTRING_UNIV: |
| decode_func = CBS_get_utf32_be; |
| error = ASN1_R_INVALID_UNIVERSALSTRING; |
| break; |
| |
| case MBSTRING_UTF8: |
| decode_func = CBS_get_utf8; |
| error = ASN1_R_INVALID_UTF8STRING; |
| break; |
| |
| case MBSTRING_ASC: |
| decode_func = CBS_get_latin1; |
| error = ERR_R_INTERNAL_ERROR; // Latin-1 inputs are never invalid. |
| break; |
| |
| default: |
| OPENSSL_PUT_ERROR(ASN1, ASN1_R_UNKNOWN_FORMAT); |
| return -1; |
| } |
| |
| // Check |minsize| and |maxsize| and work out the minimal type, if any. |
| CBS cbs; |
| CBS_init(&cbs, in, len); |
| size_t utf8_len = 0, nchar = 0; |
| while (CBS_len(&cbs) != 0) { |
| uint32_t c; |
| if (!decode_func(&cbs, &c)) { |
| OPENSSL_PUT_ERROR(ASN1, error); |
| return -1; |
| } |
| if (nchar == 0 && (inform == MBSTRING_BMP || inform == MBSTRING_UNIV) && |
| c == 0xfeff) { |
| // Reject byte-order mark. We could drop it but that would mean |
| // adding ambiguity around whether a BOM was included or not when |
| // matching strings. |
| // |
| // For a little-endian UCS-2 string, the BOM will appear as 0xfffe |
| // and will be rejected as noncharacter, below. |
| OPENSSL_PUT_ERROR(ASN1, ASN1_R_ILLEGAL_CHARACTERS); |
| return -1; |
| } |
| |
| // Update which output formats are still possible. |
| if ((mask & B_ASN1_PRINTABLESTRING) && !asn1_is_printable(c)) { |
| mask &= ~B_ASN1_PRINTABLESTRING; |
| } |
| if ((mask & B_ASN1_IA5STRING) && (c > 127)) { |
| mask &= ~B_ASN1_IA5STRING; |
| } |
| if ((mask & B_ASN1_T61STRING) && (c > 0xff)) { |
| mask &= ~B_ASN1_T61STRING; |
| } |
| if ((mask & B_ASN1_BMPSTRING) && (c > 0xffff)) { |
| mask &= ~B_ASN1_BMPSTRING; |
| } |
| if (!mask) { |
| OPENSSL_PUT_ERROR(ASN1, ASN1_R_ILLEGAL_CHARACTERS); |
| return -1; |
| } |
| |
| nchar++; |
| utf8_len += CBB_get_utf8_len(c); |
| if (maxsize > 0 && nchar > (size_t)maxsize) { |
| OPENSSL_PUT_ERROR(ASN1, ASN1_R_STRING_TOO_LONG); |
| ERR_add_error_dataf("maxsize=%zu", (size_t)maxsize); |
| return -1; |
| } |
| } |
| |
| if (minsize > 0 && nchar < (size_t)minsize) { |
| OPENSSL_PUT_ERROR(ASN1, ASN1_R_STRING_TOO_SHORT); |
| ERR_add_error_dataf("minsize=%zu", (size_t)minsize); |
| return -1; |
| } |
| |
| // Now work out output format and string type |
| int str_type; |
| int (*encode_func)(CBB *, uint32_t) = CBB_add_latin1; |
| size_t size_estimate = nchar; |
| int outform = MBSTRING_ASC; |
| if (mask & B_ASN1_PRINTABLESTRING) { |
| str_type = V_ASN1_PRINTABLESTRING; |
| } else if (mask & B_ASN1_IA5STRING) { |
| str_type = V_ASN1_IA5STRING; |
| } else if (mask & B_ASN1_T61STRING) { |
| str_type = V_ASN1_T61STRING; |
| } else if (mask & B_ASN1_BMPSTRING) { |
| str_type = V_ASN1_BMPSTRING; |
| outform = MBSTRING_BMP; |
| encode_func = CBB_add_ucs2_be; |
| size_estimate = 2 * nchar; |
| } else if (mask & B_ASN1_UNIVERSALSTRING) { |
| str_type = V_ASN1_UNIVERSALSTRING; |
| encode_func = CBB_add_utf32_be; |
| size_estimate = 4 * nchar; |
| outform = MBSTRING_UNIV; |
| } else if (mask & B_ASN1_UTF8STRING) { |
| str_type = V_ASN1_UTF8STRING; |
| outform = MBSTRING_UTF8; |
| encode_func = CBB_add_utf8; |
| size_estimate = utf8_len; |
| } else { |
| OPENSSL_PUT_ERROR(ASN1, ASN1_R_ILLEGAL_CHARACTERS); |
| return -1; |
| } |
| |
| if (!out) { |
| return str_type; |
| } |
| |
| int free_dest = 0; |
| ASN1_STRING *dest; |
| if (*out) { |
| dest = *out; |
| } else { |
| free_dest = 1; |
| dest = ASN1_STRING_type_new(str_type); |
| if (!dest) { |
| return -1; |
| } |
| } |
| |
| CBB cbb; |
| CBB_zero(&cbb); |
| // If both the same type just copy across |
| uint8_t *data = NULL; |
| size_t data_len = 0; |
| if (inform == outform) { |
| if (!ASN1_STRING_set(dest, in, len)) { |
| goto err; |
| } |
| dest->type = str_type; |
| *out = dest; |
| return str_type; |
| } |
| if (!CBB_init(&cbb, size_estimate + 1)) { |
| goto err; |
| } |
| CBS_init(&cbs, in, len); |
| while (CBS_len(&cbs) != 0) { |
| uint32_t c; |
| if (!decode_func(&cbs, &c) || !encode_func(&cbb, c)) { |
| OPENSSL_PUT_ERROR(ASN1, ERR_R_INTERNAL_ERROR); |
| goto err; |
| } |
| } |
| if (/* OpenSSL historically NUL-terminated this value with a single byte, |
| * even for |MBSTRING_BMP| and |MBSTRING_UNIV|. */ |
| !CBB_add_u8(&cbb, 0) || // |
| !CBB_finish(&cbb, &data, &data_len) || // |
| data_len < 1 || // |
| data_len > INT_MAX) { |
| OPENSSL_PUT_ERROR(ASN1, ERR_R_INTERNAL_ERROR); |
| OPENSSL_free(data); |
| goto err; |
| } |
| dest->type = str_type; |
| ASN1_STRING_set0(dest, data, (int)data_len - 1); |
| *out = dest; |
| return str_type; |
| |
| err: |
| if (free_dest) { |
| ASN1_STRING_free(dest); |
| } |
| CBB_cleanup(&cbb); |
| return -1; |
| } |
| |
| int asn1_is_printable(uint32_t value) { |
| if (value > 0x7f) { |
| return 0; |
| } |
| return OPENSSL_isalnum(value) || // |
| value == ' ' || value == '\'' || value == '(' || value == ')' || |
| value == '+' || value == ',' || value == '-' || value == '.' || |
| value == '/' || value == ':' || value == '=' || value == '?'; |
| } |