f_string.c 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209
  1. /* crypto/asn1/f_string.c */
  2. /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
  3. * All rights reserved.
  4. *
  5. * This package is an SSL implementation written
  6. * by Eric Young (eay@cryptsoft.com).
  7. * The implementation was written so as to conform with Netscapes SSL.
  8. *
  9. * This library is free for commercial and non-commercial use as long as
  10. * the following conditions are aheared to. The following conditions
  11. * apply to all code found in this distribution, be it the RC4, RSA,
  12. * lhash, DES, etc., code; not just the SSL code. The SSL documentation
  13. * included with this distribution is covered by the same copyright terms
  14. * except that the holder is Tim Hudson (tjh@cryptsoft.com).
  15. *
  16. * Copyright remains Eric Young's, and as such any Copyright notices in
  17. * the code are not to be removed.
  18. * If this package is used in a product, Eric Young should be given attribution
  19. * as the author of the parts of the library used.
  20. * This can be in the form of a textual message at program startup or
  21. * in documentation (online or textual) provided with the package.
  22. *
  23. * Redistribution and use in source and binary forms, with or without
  24. * modification, are permitted provided that the following conditions
  25. * are met:
  26. * 1. Redistributions of source code must retain the copyright
  27. * notice, this list of conditions and the following disclaimer.
  28. * 2. Redistributions in binary form must reproduce the above copyright
  29. * notice, this list of conditions and the following disclaimer in the
  30. * documentation and/or other materials provided with the distribution.
  31. * 3. All advertising materials mentioning features or use of this software
  32. * must display the following acknowledgement:
  33. * "This product includes cryptographic software written by
  34. * Eric Young (eay@cryptsoft.com)"
  35. * The word 'cryptographic' can be left out if the rouines from the library
  36. * being used are not cryptographic related :-).
  37. * 4. If you include any Windows specific code (or a derivative thereof) from
  38. * the apps directory (application code) you must include an acknowledgement:
  39. * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
  40. *
  41. * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
  42. * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  43. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  44. * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
  45. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  46. * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  47. * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  48. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  49. * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  50. * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  51. * SUCH DAMAGE.
  52. *
  53. * The licence and distribution terms for any publically available version or
  54. * derivative of this code cannot be changed. i.e. this code cannot simply be
  55. * copied and put under another distribution licence
  56. * [including the GNU Public Licence.]
  57. */
  58. #include <stdio.h>
  59. #include "cryptlib.h"
  60. #include <openssl/buffer.h>
  61. #include <openssl/asn1.h>
  62. int i2a_ASN1_STRING(BIO *bp, ASN1_STRING *a, int type)
  63. {
  64. int i, n = 0;
  65. static const char *h = "0123456789ABCDEF";
  66. char buf[2];
  67. if (a == NULL)
  68. return (0);
  69. if (a->length == 0) {
  70. if (BIO_write(bp, "0", 1) != 1)
  71. goto err;
  72. n = 1;
  73. } else {
  74. for (i = 0; i < a->length; i++) {
  75. if ((i != 0) && (i % 35 == 0)) {
  76. if (BIO_write(bp, "\\\n", 2) != 2)
  77. goto err;
  78. n += 2;
  79. }
  80. buf[0] = h[((unsigned char)a->data[i] >> 4) & 0x0f];
  81. buf[1] = h[((unsigned char)a->data[i]) & 0x0f];
  82. if (BIO_write(bp, buf, 2) != 2)
  83. goto err;
  84. n += 2;
  85. }
  86. }
  87. return (n);
  88. err:
  89. return (-1);
  90. }
  91. int a2i_ASN1_STRING(BIO *bp, ASN1_STRING *bs, char *buf, int size)
  92. {
  93. int ret = 0;
  94. int i, j, k, m, n, again, bufsize;
  95. unsigned char *s = NULL, *sp;
  96. unsigned char *bufp;
  97. int num = 0, slen = 0, first = 1;
  98. bufsize = BIO_gets(bp, buf, size);
  99. for (;;) {
  100. if (bufsize < 1) {
  101. if (first)
  102. break;
  103. else
  104. goto err_sl;
  105. }
  106. first = 0;
  107. i = bufsize;
  108. if (buf[i - 1] == '\n')
  109. buf[--i] = '\0';
  110. if (i == 0)
  111. goto err_sl;
  112. if (buf[i - 1] == '\r')
  113. buf[--i] = '\0';
  114. if (i == 0)
  115. goto err_sl;
  116. again = (buf[i - 1] == '\\');
  117. for (j = i - 1; j > 0; j--) {
  118. #ifndef CHARSET_EBCDIC
  119. if (!(((buf[j] >= '0') && (buf[j] <= '9')) ||
  120. ((buf[j] >= 'a') && (buf[j] <= 'f')) ||
  121. ((buf[j] >= 'A') && (buf[j] <= 'F'))))
  122. #else
  123. /*
  124. * This #ifdef is not strictly necessary, since the characters
  125. * A...F a...f 0...9 are contiguous (yes, even in EBCDIC - but
  126. * not the whole alphabet). Nevertheless, isxdigit() is faster.
  127. */
  128. if (!isxdigit(buf[j]))
  129. #endif
  130. {
  131. i = j;
  132. break;
  133. }
  134. }
  135. buf[i] = '\0';
  136. /*
  137. * We have now cleared all the crap off the end of the line
  138. */
  139. if (i < 2)
  140. goto err_sl;
  141. bufp = (unsigned char *)buf;
  142. k = 0;
  143. i -= again;
  144. if (i % 2 != 0) {
  145. ASN1err(ASN1_F_A2I_ASN1_STRING, ASN1_R_ODD_NUMBER_OF_CHARS);
  146. goto err;
  147. }
  148. i /= 2;
  149. if (num + i > slen) {
  150. if (s == NULL)
  151. sp = (unsigned char *)OPENSSL_malloc((unsigned int)num +
  152. i * 2);
  153. else
  154. sp = (unsigned char *)OPENSSL_realloc(s,
  155. (unsigned int)num +
  156. i * 2);
  157. if (sp == NULL) {
  158. ASN1err(ASN1_F_A2I_ASN1_STRING, ERR_R_MALLOC_FAILURE);
  159. goto err;
  160. }
  161. s = sp;
  162. slen = num + i * 2;
  163. }
  164. for (j = 0; j < i; j++, k += 2) {
  165. for (n = 0; n < 2; n++) {
  166. m = bufp[k + n];
  167. if ((m >= '0') && (m <= '9'))
  168. m -= '0';
  169. else if ((m >= 'a') && (m <= 'f'))
  170. m = m - 'a' + 10;
  171. else if ((m >= 'A') && (m <= 'F'))
  172. m = m - 'A' + 10;
  173. else {
  174. ASN1err(ASN1_F_A2I_ASN1_STRING,
  175. ASN1_R_NON_HEX_CHARACTERS);
  176. goto err;
  177. }
  178. s[num + j] <<= 4;
  179. s[num + j] |= m;
  180. }
  181. }
  182. num += i;
  183. if (again)
  184. bufsize = BIO_gets(bp, buf, size);
  185. else
  186. break;
  187. }
  188. bs->length = num;
  189. bs->data = s;
  190. ret = 1;
  191. err:
  192. if (0) {
  193. err_sl:
  194. ASN1err(ASN1_F_A2I_ASN1_STRING, ASN1_R_SHORT_LINE);
  195. }
  196. if (ret != 1)
  197. OPENSSL_free(s);
  198. return (ret);
  199. }