v3_alt.c revision 284285
190792Sgshapiro/* v3_alt.c */
2261194Sgshapiro/*
390792Sgshapiro * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
490792Sgshapiro * project.
590792Sgshapiro */
690792Sgshapiro/* ====================================================================
790792Sgshapiro * Copyright (c) 1999-2003 The OpenSSL Project.  All rights reserved.
890792Sgshapiro *
9363466Sgshapiro * Redistribution and use in source and binary forms, with or without
1090792Sgshapiro * modification, are permitted provided that the following conditions
1190792Sgshapiro * are met:
1290792Sgshapiro *
1390792Sgshapiro * 1. Redistributions of source code must retain the above copyright
1490792Sgshapiro *    notice, this list of conditions and the following disclaimer.
1590792Sgshapiro *
1690792Sgshapiro * 2. Redistributions in binary form must reproduce the above copyright
1790792Sgshapiro *    notice, this list of conditions and the following disclaimer in
1890792Sgshapiro *    the documentation and/or other materials provided with the
1990792Sgshapiro *    distribution.
2090792Sgshapiro *
2190792Sgshapiro * 3. All advertising materials mentioning features or use of this
2290792Sgshapiro *    software must display the following acknowledgment:
2390792Sgshapiro *    "This product includes software developed by the OpenSSL Project
2490792Sgshapiro *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
2590792Sgshapiro *
2690792Sgshapiro * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
2790792Sgshapiro *    endorse or promote products derived from this software without
2890792Sgshapiro *    prior written permission. For written permission, please contact
2990792Sgshapiro *    licensing@OpenSSL.org.
30363466Sgshapiro *
3190792Sgshapiro * 5. Products derived from this software may not be called "OpenSSL"
3290792Sgshapiro *    nor may "OpenSSL" appear in their names without prior written
3390792Sgshapiro *    permission of the OpenSSL Project.
3490792Sgshapiro *
3590792Sgshapiro * 6. Redistributions of any form whatsoever must retain the following
3690792Sgshapiro *    acknowledgment:
3790792Sgshapiro *    "This product includes software developed by the OpenSSL Project
3890792Sgshapiro *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
3990792Sgshapiro *
4090792Sgshapiro * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
4190792Sgshapiro * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
4290792Sgshapiro * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
4390792Sgshapiro * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
4490792Sgshapiro * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
4590792Sgshapiro * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
4694334Sgshapiro * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
4794334Sgshapiro * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
4894334Sgshapiro * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
4990792Sgshapiro * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
5090792Sgshapiro * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
5190792Sgshapiro * OF THE POSSIBILITY OF SUCH DAMAGE.
5290792Sgshapiro * ====================================================================
5390792Sgshapiro *
5490792Sgshapiro * This product includes cryptographic software written by Eric Young
5590792Sgshapiro * (eay@cryptsoft.com).  This product includes software written by Tim
5690792Sgshapiro * Hudson (tjh@cryptsoft.com).
5790792Sgshapiro *
5890792Sgshapiro */
5990792Sgshapiro
6090792Sgshapiro#include <stdio.h>
6190792Sgshapiro#include "cryptlib.h"
6290792Sgshapiro#include <openssl/conf.h>
6390792Sgshapiro#include <openssl/x509v3.h>
6490792Sgshapiro
6590792Sgshapirostatic GENERAL_NAMES *v2i_subject_alt(X509V3_EXT_METHOD *method,
6690792Sgshapiro                                      X509V3_CTX *ctx,
6790792Sgshapiro                                      STACK_OF(CONF_VALUE) *nval);
6890792Sgshapirostatic GENERAL_NAMES *v2i_issuer_alt(X509V3_EXT_METHOD *method,
6990792Sgshapiro                                     X509V3_CTX *ctx,
70125820Sgshapiro                                     STACK_OF(CONF_VALUE) *nval);
7190792Sgshapirostatic int copy_email(X509V3_CTX *ctx, GENERAL_NAMES *gens, int move_p);
7290792Sgshapirostatic int copy_issuer(X509V3_CTX *ctx, GENERAL_NAMES *gens);
73125820Sgshapirostatic int do_othername(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx);
7490792Sgshapirostatic int do_dirname(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx);
7590792Sgshapiro
7690792Sgshapiroconst X509V3_EXT_METHOD v3_alt[] = {
77125820Sgshapiro    {NID_subject_alt_name, 0, ASN1_ITEM_ref(GENERAL_NAMES),
7890792Sgshapiro     0, 0, 0, 0,
7990792Sgshapiro     0, 0,
8090792Sgshapiro     (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
8190792Sgshapiro     (X509V3_EXT_V2I)v2i_subject_alt,
8290792Sgshapiro     NULL, NULL, NULL},
8390792Sgshapiro
8490792Sgshapiro    {NID_issuer_alt_name, 0, ASN1_ITEM_ref(GENERAL_NAMES),
8590792Sgshapiro     0, 0, 0, 0,
8690792Sgshapiro     0, 0,
8790792Sgshapiro     (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
8890792Sgshapiro     (X509V3_EXT_V2I)v2i_issuer_alt,
89363466Sgshapiro     NULL, NULL, NULL},
9090792Sgshapiro
91363466Sgshapiro    {NID_certificate_issuer, 0, ASN1_ITEM_ref(GENERAL_NAMES),
9290792Sgshapiro     0, 0, 0, 0,
9390792Sgshapiro     0, 0,
9490792Sgshapiro     (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
9590792Sgshapiro     NULL, NULL, NULL, NULL},
9690792Sgshapiro};
9790792Sgshapiro
9890792SgshapiroSTACK_OF(CONF_VALUE) *i2v_GENERAL_NAMES(X509V3_EXT_METHOD *method,
9990792Sgshapiro                                        GENERAL_NAMES *gens,
10090792Sgshapiro                                        STACK_OF(CONF_VALUE) *ret)
10190792Sgshapiro{
10290792Sgshapiro    int i;
10390792Sgshapiro    GENERAL_NAME *gen;
10490792Sgshapiro    for (i = 0; i < sk_GENERAL_NAME_num(gens); i++) {
10590792Sgshapiro        gen = sk_GENERAL_NAME_value(gens, i);
10690792Sgshapiro        ret = i2v_GENERAL_NAME(method, gen, ret);
10790792Sgshapiro    }
10890792Sgshapiro    if (!ret)
10990792Sgshapiro        return sk_CONF_VALUE_new_null();
11090792Sgshapiro    return ret;
11190792Sgshapiro}
11290792Sgshapiro
11390792SgshapiroSTACK_OF(CONF_VALUE) *i2v_GENERAL_NAME(X509V3_EXT_METHOD *method,
11490792Sgshapiro                                       GENERAL_NAME *gen,
115363466Sgshapiro                                       STACK_OF(CONF_VALUE) *ret)
11690792Sgshapiro{
117363466Sgshapiro    unsigned char *p;
11890792Sgshapiro    char oline[256], htmp[5];
11990792Sgshapiro    int i;
12090792Sgshapiro    switch (gen->type) {
12190792Sgshapiro    case GEN_OTHERNAME:
12290792Sgshapiro        X509V3_add_value("othername", "<unsupported>", &ret);
12390792Sgshapiro        break;
124285229Sgshapiro
12590792Sgshapiro    case GEN_X400:
126285229Sgshapiro        X509V3_add_value("X400Name", "<unsupported>", &ret);
12790792Sgshapiro        break;
128285229Sgshapiro
12990792Sgshapiro    case GEN_EDIPARTY:
13090792Sgshapiro        X509V3_add_value("EdiPartyName", "<unsupported>", &ret);
13190792Sgshapiro        break;
13290792Sgshapiro
13390792Sgshapiro    case GEN_EMAIL:
134363466Sgshapiro        X509V3_add_value_uchar("email", gen->d.ia5->data, &ret);
13590792Sgshapiro        break;
136363466Sgshapiro
13790792Sgshapiro    case GEN_DNS:
13890792Sgshapiro        X509V3_add_value_uchar("DNS", gen->d.ia5->data, &ret);
13990792Sgshapiro        break;
14090792Sgshapiro
14190792Sgshapiro    case GEN_URI:
142363466Sgshapiro        X509V3_add_value_uchar("URI", gen->d.ia5->data, &ret);
14390792Sgshapiro        break;
144363466Sgshapiro
14590792Sgshapiro    case GEN_DIRNAME:
14690792Sgshapiro        X509_NAME_oneline(gen->d.dirn, oline, 256);
14790792Sgshapiro        X509V3_add_value("DirName", oline, &ret);
148        break;
149
150    case GEN_IPADD:
151        p = gen->d.ip->data;
152        if (gen->d.ip->length == 4)
153            BIO_snprintf(oline, sizeof oline,
154                         "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
155        else if (gen->d.ip->length == 16) {
156            oline[0] = 0;
157            for (i = 0; i < 8; i++) {
158                BIO_snprintf(htmp, sizeof htmp, "%X", p[0] << 8 | p[1]);
159                p += 2;
160                strcat(oline, htmp);
161                if (i != 7)
162                    strcat(oline, ":");
163            }
164        } else {
165            X509V3_add_value("IP Address", "<invalid>", &ret);
166            break;
167        }
168        X509V3_add_value("IP Address", oline, &ret);
169        break;
170
171    case GEN_RID:
172        i2t_ASN1_OBJECT(oline, 256, gen->d.rid);
173        X509V3_add_value("Registered ID", oline, &ret);
174        break;
175    }
176    return ret;
177}
178
179int GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen)
180{
181    unsigned char *p;
182    int i;
183    switch (gen->type) {
184    case GEN_OTHERNAME:
185        BIO_printf(out, "othername:<unsupported>");
186        break;
187
188    case GEN_X400:
189        BIO_printf(out, "X400Name:<unsupported>");
190        break;
191
192    case GEN_EDIPARTY:
193        /* Maybe fix this: it is supported now */
194        BIO_printf(out, "EdiPartyName:<unsupported>");
195        break;
196
197    case GEN_EMAIL:
198        BIO_printf(out, "email:%s", gen->d.ia5->data);
199        break;
200
201    case GEN_DNS:
202        BIO_printf(out, "DNS:%s", gen->d.ia5->data);
203        break;
204
205    case GEN_URI:
206        BIO_printf(out, "URI:%s", gen->d.ia5->data);
207        break;
208
209    case GEN_DIRNAME:
210        BIO_printf(out, "DirName: ");
211        X509_NAME_print_ex(out, gen->d.dirn, 0, XN_FLAG_ONELINE);
212        break;
213
214    case GEN_IPADD:
215        p = gen->d.ip->data;
216        if (gen->d.ip->length == 4)
217            BIO_printf(out, "IP Address:%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
218        else if (gen->d.ip->length == 16) {
219            BIO_printf(out, "IP Address");
220            for (i = 0; i < 8; i++) {
221                BIO_printf(out, ":%X", p[0] << 8 | p[1]);
222                p += 2;
223            }
224            BIO_puts(out, "\n");
225        } else {
226            BIO_printf(out, "IP Address:<invalid>");
227            break;
228        }
229        break;
230
231    case GEN_RID:
232        BIO_printf(out, "Registered ID");
233        i2a_ASN1_OBJECT(out, gen->d.rid);
234        break;
235    }
236    return 1;
237}
238
239static GENERAL_NAMES *v2i_issuer_alt(X509V3_EXT_METHOD *method,
240                                     X509V3_CTX *ctx,
241                                     STACK_OF(CONF_VALUE) *nval)
242{
243    GENERAL_NAMES *gens = NULL;
244    CONF_VALUE *cnf;
245    int i;
246    if (!(gens = sk_GENERAL_NAME_new_null())) {
247        X509V3err(X509V3_F_V2I_ISSUER_ALT, ERR_R_MALLOC_FAILURE);
248        return NULL;
249    }
250    for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
251        cnf = sk_CONF_VALUE_value(nval, i);
252        if (!name_cmp(cnf->name, "issuer") && cnf->value &&
253            !strcmp(cnf->value, "copy")) {
254            if (!copy_issuer(ctx, gens))
255                goto err;
256        } else {
257            GENERAL_NAME *gen;
258            if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
259                goto err;
260            sk_GENERAL_NAME_push(gens, gen);
261        }
262    }
263    return gens;
264 err:
265    sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
266    return NULL;
267}
268
269/* Append subject altname of issuer to issuer alt name of subject */
270
271static int copy_issuer(X509V3_CTX *ctx, GENERAL_NAMES *gens)
272{
273    GENERAL_NAMES *ialt;
274    GENERAL_NAME *gen;
275    X509_EXTENSION *ext;
276    int i;
277    if (ctx && (ctx->flags == CTX_TEST))
278        return 1;
279    if (!ctx || !ctx->issuer_cert) {
280        X509V3err(X509V3_F_COPY_ISSUER, X509V3_R_NO_ISSUER_DETAILS);
281        goto err;
282    }
283    i = X509_get_ext_by_NID(ctx->issuer_cert, NID_subject_alt_name, -1);
284    if (i < 0)
285        return 1;
286    if (!(ext = X509_get_ext(ctx->issuer_cert, i)) ||
287        !(ialt = X509V3_EXT_d2i(ext))) {
288        X509V3err(X509V3_F_COPY_ISSUER, X509V3_R_ISSUER_DECODE_ERROR);
289        goto err;
290    }
291
292    for (i = 0; i < sk_GENERAL_NAME_num(ialt); i++) {
293        gen = sk_GENERAL_NAME_value(ialt, i);
294        if (!sk_GENERAL_NAME_push(gens, gen)) {
295            X509V3err(X509V3_F_COPY_ISSUER, ERR_R_MALLOC_FAILURE);
296            goto err;
297        }
298    }
299    sk_GENERAL_NAME_free(ialt);
300
301    return 1;
302
303 err:
304    return 0;
305
306}
307
308static GENERAL_NAMES *v2i_subject_alt(X509V3_EXT_METHOD *method,
309                                      X509V3_CTX *ctx,
310                                      STACK_OF(CONF_VALUE) *nval)
311{
312    GENERAL_NAMES *gens = NULL;
313    CONF_VALUE *cnf;
314    int i;
315    if (!(gens = sk_GENERAL_NAME_new_null())) {
316        X509V3err(X509V3_F_V2I_SUBJECT_ALT, ERR_R_MALLOC_FAILURE);
317        return NULL;
318    }
319    for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
320        cnf = sk_CONF_VALUE_value(nval, i);
321        if (!name_cmp(cnf->name, "email") && cnf->value &&
322            !strcmp(cnf->value, "copy")) {
323            if (!copy_email(ctx, gens, 0))
324                goto err;
325        } else if (!name_cmp(cnf->name, "email") && cnf->value &&
326                   !strcmp(cnf->value, "move")) {
327            if (!copy_email(ctx, gens, 1))
328                goto err;
329        } else {
330            GENERAL_NAME *gen;
331            if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
332                goto err;
333            sk_GENERAL_NAME_push(gens, gen);
334        }
335    }
336    return gens;
337 err:
338    sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
339    return NULL;
340}
341
342/*
343 * Copy any email addresses in a certificate or request to GENERAL_NAMES
344 */
345
346static int copy_email(X509V3_CTX *ctx, GENERAL_NAMES *gens, int move_p)
347{
348    X509_NAME *nm;
349    ASN1_IA5STRING *email = NULL;
350    X509_NAME_ENTRY *ne;
351    GENERAL_NAME *gen = NULL;
352    int i;
353    if (ctx != NULL && ctx->flags == CTX_TEST)
354        return 1;
355    if (!ctx || (!ctx->subject_cert && !ctx->subject_req)) {
356        X509V3err(X509V3_F_COPY_EMAIL, X509V3_R_NO_SUBJECT_DETAILS);
357        goto err;
358    }
359    /* Find the subject name */
360    if (ctx->subject_cert)
361        nm = X509_get_subject_name(ctx->subject_cert);
362    else
363        nm = X509_REQ_get_subject_name(ctx->subject_req);
364
365    /* Now add any email address(es) to STACK */
366    i = -1;
367    while ((i = X509_NAME_get_index_by_NID(nm,
368                                           NID_pkcs9_emailAddress, i)) >= 0) {
369        ne = X509_NAME_get_entry(nm, i);
370        email = M_ASN1_IA5STRING_dup(X509_NAME_ENTRY_get_data(ne));
371        if (move_p) {
372            X509_NAME_delete_entry(nm, i);
373            X509_NAME_ENTRY_free(ne);
374            i--;
375        }
376        if (!email || !(gen = GENERAL_NAME_new())) {
377            X509V3err(X509V3_F_COPY_EMAIL, ERR_R_MALLOC_FAILURE);
378            goto err;
379        }
380        gen->d.ia5 = email;
381        email = NULL;
382        gen->type = GEN_EMAIL;
383        if (!sk_GENERAL_NAME_push(gens, gen)) {
384            X509V3err(X509V3_F_COPY_EMAIL, ERR_R_MALLOC_FAILURE);
385            goto err;
386        }
387        gen = NULL;
388    }
389
390    return 1;
391
392 err:
393    GENERAL_NAME_free(gen);
394    M_ASN1_IA5STRING_free(email);
395    return 0;
396
397}
398
399GENERAL_NAMES *v2i_GENERAL_NAMES(const X509V3_EXT_METHOD *method,
400                                 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
401{
402    GENERAL_NAME *gen;
403    GENERAL_NAMES *gens = NULL;
404    CONF_VALUE *cnf;
405    int i;
406    if (!(gens = sk_GENERAL_NAME_new_null())) {
407        X509V3err(X509V3_F_V2I_GENERAL_NAMES, ERR_R_MALLOC_FAILURE);
408        return NULL;
409    }
410    for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
411        cnf = sk_CONF_VALUE_value(nval, i);
412        if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
413            goto err;
414        sk_GENERAL_NAME_push(gens, gen);
415    }
416    return gens;
417 err:
418    sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
419    return NULL;
420}
421
422GENERAL_NAME *v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method,
423                               X509V3_CTX *ctx, CONF_VALUE *cnf)
424{
425    return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0);
426}
427
428GENERAL_NAME *a2i_GENERAL_NAME(GENERAL_NAME *out,
429                               const X509V3_EXT_METHOD *method,
430                               X509V3_CTX *ctx, int gen_type, char *value,
431                               int is_nc)
432{
433    char is_string = 0;
434    GENERAL_NAME *gen = NULL;
435
436    if (!value) {
437        X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_MISSING_VALUE);
438        return NULL;
439    }
440
441    if (out)
442        gen = out;
443    else {
444        gen = GENERAL_NAME_new();
445        if (gen == NULL) {
446            X509V3err(X509V3_F_A2I_GENERAL_NAME, ERR_R_MALLOC_FAILURE);
447            return NULL;
448        }
449    }
450
451    switch (gen_type) {
452    case GEN_URI:
453    case GEN_EMAIL:
454    case GEN_DNS:
455        is_string = 1;
456        break;
457
458    case GEN_RID:
459        {
460            ASN1_OBJECT *obj;
461            if (!(obj = OBJ_txt2obj(value, 0))) {
462                X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_BAD_OBJECT);
463                ERR_add_error_data(2, "value=", value);
464                goto err;
465            }
466            gen->d.rid = obj;
467        }
468        break;
469
470    case GEN_IPADD:
471        if (is_nc)
472            gen->d.ip = a2i_IPADDRESS_NC(value);
473        else
474            gen->d.ip = a2i_IPADDRESS(value);
475        if (gen->d.ip == NULL) {
476            X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_BAD_IP_ADDRESS);
477            ERR_add_error_data(2, "value=", value);
478            goto err;
479        }
480        break;
481
482    case GEN_DIRNAME:
483        if (!do_dirname(gen, value, ctx)) {
484            X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_DIRNAME_ERROR);
485            goto err;
486        }
487        break;
488
489    case GEN_OTHERNAME:
490        if (!do_othername(gen, value, ctx)) {
491            X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_OTHERNAME_ERROR);
492            goto err;
493        }
494        break;
495    default:
496        X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_UNSUPPORTED_TYPE);
497        goto err;
498    }
499
500    if (is_string) {
501        if (!(gen->d.ia5 = M_ASN1_IA5STRING_new()) ||
502            !ASN1_STRING_set(gen->d.ia5, (unsigned char *)value,
503                             strlen(value))) {
504            X509V3err(X509V3_F_A2I_GENERAL_NAME, ERR_R_MALLOC_FAILURE);
505            goto err;
506        }
507    }
508
509    gen->type = gen_type;
510
511    return gen;
512
513 err:
514    if (!out)
515        GENERAL_NAME_free(gen);
516    return NULL;
517}
518
519GENERAL_NAME *v2i_GENERAL_NAME_ex(GENERAL_NAME *out,
520                                  const X509V3_EXT_METHOD *method,
521                                  X509V3_CTX *ctx, CONF_VALUE *cnf, int is_nc)
522{
523    int type;
524
525    char *name, *value;
526
527    name = cnf->name;
528    value = cnf->value;
529
530    if (!value) {
531        X509V3err(X509V3_F_V2I_GENERAL_NAME_EX, X509V3_R_MISSING_VALUE);
532        return NULL;
533    }
534
535    if (!name_cmp(name, "email"))
536        type = GEN_EMAIL;
537    else if (!name_cmp(name, "URI"))
538        type = GEN_URI;
539    else if (!name_cmp(name, "DNS"))
540        type = GEN_DNS;
541    else if (!name_cmp(name, "RID"))
542        type = GEN_RID;
543    else if (!name_cmp(name, "IP"))
544        type = GEN_IPADD;
545    else if (!name_cmp(name, "dirName"))
546        type = GEN_DIRNAME;
547    else if (!name_cmp(name, "otherName"))
548        type = GEN_OTHERNAME;
549    else {
550        X509V3err(X509V3_F_V2I_GENERAL_NAME_EX, X509V3_R_UNSUPPORTED_OPTION);
551        ERR_add_error_data(2, "name=", name);
552        return NULL;
553    }
554
555    return a2i_GENERAL_NAME(out, method, ctx, type, value, is_nc);
556
557}
558
559static int do_othername(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx)
560{
561    char *objtmp = NULL, *p;
562    int objlen;
563    if (!(p = strchr(value, ';')))
564        return 0;
565    if (!(gen->d.otherName = OTHERNAME_new()))
566        return 0;
567    /*
568     * Free this up because we will overwrite it. no need to free type_id
569     * because it is static
570     */
571    ASN1_TYPE_free(gen->d.otherName->value);
572    if (!(gen->d.otherName->value = ASN1_generate_v3(p + 1, ctx)))
573        return 0;
574    objlen = p - value;
575    objtmp = OPENSSL_malloc(objlen + 1);
576    strncpy(objtmp, value, objlen);
577    objtmp[objlen] = 0;
578    gen->d.otherName->type_id = OBJ_txt2obj(objtmp, 0);
579    OPENSSL_free(objtmp);
580    if (!gen->d.otherName->type_id)
581        return 0;
582    return 1;
583}
584
585static int do_dirname(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx)
586{
587    int ret = 0;
588    STACK_OF(CONF_VALUE) *sk = NULL;
589    X509_NAME *nm = NULL;
590    if (!(nm = X509_NAME_new()))
591        goto err;
592    sk = X509V3_get_section(ctx, value);
593    if (!sk) {
594        X509V3err(X509V3_F_DO_DIRNAME, X509V3_R_SECTION_NOT_FOUND);
595        ERR_add_error_data(2, "section=", value);
596        goto err;
597    }
598    /* FIXME: should allow other character types... */
599    ret = X509V3_NAME_from_section(nm, sk, MBSTRING_ASC);
600    if (!ret)
601        goto err;
602    gen->d.dirn = nm;
603
604err:
605    if (ret == 0)
606        X509_NAME_free(nm);
607    X509V3_section_free(ctx, sk);
608    return ret;
609}
610