1 /* v3_alt.c */
2 /*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
4 * project.
5 */
6 /* ====================================================================
7 * Copyright (c) 1999-2003 The OpenSSL Project. All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in
18 * the documentation and/or other materials provided with the
19 * distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 * software must display the following acknowledgment:
23 * "This product includes software developed by the OpenSSL Project
24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 * endorse or promote products derived from this software without
28 * prior written permission. For written permission, please contact
29 * licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 * nor may "OpenSSL" appear in their names without prior written
33 * permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 * acknowledgment:
37 * "This product includes software developed by the OpenSSL Project
38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com). This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com). */
57
58 #include <stdio.h>
59 #include <string.h>
60
61 #include <openssl/conf.h>
62 #include <openssl/err.h>
63 #include <openssl/mem.h>
64 #include <openssl/obj.h>
65 #include <openssl/x509v3.h>
66
67 static GENERAL_NAMES *v2i_subject_alt(X509V3_EXT_METHOD *method,
68 X509V3_CTX *ctx,
69 STACK_OF(CONF_VALUE) *nval);
70 static GENERAL_NAMES *v2i_issuer_alt(X509V3_EXT_METHOD *method,
71 X509V3_CTX *ctx,
72 STACK_OF(CONF_VALUE) *nval);
73 static int copy_email(X509V3_CTX *ctx, GENERAL_NAMES *gens, int move_p);
74 static int copy_issuer(X509V3_CTX *ctx, GENERAL_NAMES *gens);
75 static int do_othername(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx);
76 static int do_dirname(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx);
77
78 const X509V3_EXT_METHOD v3_alt[] = {
79 {NID_subject_alt_name, 0, ASN1_ITEM_ref(GENERAL_NAMES),
80 0, 0, 0, 0,
81 0, 0,
82 (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
83 (X509V3_EXT_V2I)v2i_subject_alt,
84 NULL, NULL, NULL},
85
86 {NID_issuer_alt_name, 0, ASN1_ITEM_ref(GENERAL_NAMES),
87 0, 0, 0, 0,
88 0, 0,
89 (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
90 (X509V3_EXT_V2I)v2i_issuer_alt,
91 NULL, NULL, NULL},
92
93 {NID_certificate_issuer, 0, ASN1_ITEM_ref(GENERAL_NAMES),
94 0, 0, 0, 0,
95 0, 0,
96 (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
97 NULL, NULL, NULL, NULL},
98 };
99
STACK_OF(CONF_VALUE)100 STACK_OF(CONF_VALUE) *i2v_GENERAL_NAMES(X509V3_EXT_METHOD *method,
101 GENERAL_NAMES *gens,
102 STACK_OF(CONF_VALUE) *ret)
103 {
104 size_t i;
105 GENERAL_NAME *gen;
106 for (i = 0; i < sk_GENERAL_NAME_num(gens); i++) {
107 gen = sk_GENERAL_NAME_value(gens, i);
108 ret = i2v_GENERAL_NAME(method, gen, ret);
109 }
110 if (!ret)
111 return sk_CONF_VALUE_new_null();
112 return ret;
113 }
114
STACK_OF(CONF_VALUE)115 STACK_OF(CONF_VALUE) *i2v_GENERAL_NAME(X509V3_EXT_METHOD *method,
116 GENERAL_NAME *gen,
117 STACK_OF(CONF_VALUE) *ret)
118 {
119 unsigned char *p;
120 char oline[256], htmp[5];
121 int i;
122 switch (gen->type) {
123 case GEN_OTHERNAME:
124 if (!X509V3_add_value("othername", "<unsupported>", &ret))
125 return NULL;
126 break;
127
128 case GEN_X400:
129 if (!X509V3_add_value("X400Name", "<unsupported>", &ret))
130 return NULL;
131 break;
132
133 case GEN_EDIPARTY:
134 if (!X509V3_add_value("EdiPartyName", "<unsupported>", &ret))
135 return NULL;
136 break;
137
138 case GEN_EMAIL:
139 if (!X509V3_add_value_uchar("email", gen->d.ia5->data, &ret))
140 return NULL;
141 break;
142
143 case GEN_DNS:
144 if (!X509V3_add_value_uchar("DNS", gen->d.ia5->data, &ret))
145 return NULL;
146 break;
147
148 case GEN_URI:
149 if (!X509V3_add_value_uchar("URI", gen->d.ia5->data, &ret))
150 return NULL;
151 break;
152
153 case GEN_DIRNAME:
154 if (X509_NAME_oneline(gen->d.dirn, oline, 256) == NULL
155 || !X509V3_add_value("DirName", oline, &ret))
156 return NULL;
157 break;
158
159 case GEN_IPADD:
160 p = gen->d.ip->data;
161 if (gen->d.ip->length == 4)
162 BIO_snprintf(oline, sizeof oline,
163 "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
164 else if (gen->d.ip->length == 16) {
165 oline[0] = 0;
166 for (i = 0; i < 8; i++) {
167 BIO_snprintf(htmp, sizeof htmp, "%X", p[0] << 8 | p[1]);
168 p += 2;
169 strcat(oline, htmp);
170 if (i != 7)
171 strcat(oline, ":");
172 }
173 } else {
174 if (!X509V3_add_value("IP Address", "<invalid>", &ret))
175 return NULL;
176 break;
177 }
178 if (!X509V3_add_value("IP Address", oline, &ret))
179 return NULL;
180 break;
181
182 case GEN_RID:
183 i2t_ASN1_OBJECT(oline, 256, gen->d.rid);
184 if (!X509V3_add_value("Registered ID", oline, &ret))
185 return NULL;
186 break;
187 }
188 return ret;
189 }
190
GENERAL_NAME_print(BIO * out,GENERAL_NAME * gen)191 int GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen)
192 {
193 unsigned char *p;
194 int i;
195 switch (gen->type) {
196 case GEN_OTHERNAME:
197 BIO_printf(out, "othername:<unsupported>");
198 break;
199
200 case GEN_X400:
201 BIO_printf(out, "X400Name:<unsupported>");
202 break;
203
204 case GEN_EDIPARTY:
205 /* Maybe fix this: it is supported now */
206 BIO_printf(out, "EdiPartyName:<unsupported>");
207 break;
208
209 case GEN_EMAIL:
210 BIO_printf(out, "email:%s", gen->d.ia5->data);
211 break;
212
213 case GEN_DNS:
214 BIO_printf(out, "DNS:%s", gen->d.ia5->data);
215 break;
216
217 case GEN_URI:
218 BIO_printf(out, "URI:%s", gen->d.ia5->data);
219 break;
220
221 case GEN_DIRNAME:
222 BIO_printf(out, "DirName: ");
223 X509_NAME_print_ex(out, gen->d.dirn, 0, XN_FLAG_ONELINE);
224 break;
225
226 case GEN_IPADD:
227 p = gen->d.ip->data;
228 if (gen->d.ip->length == 4)
229 BIO_printf(out, "IP Address:%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
230 else if (gen->d.ip->length == 16) {
231 BIO_printf(out, "IP Address");
232 for (i = 0; i < 8; i++) {
233 BIO_printf(out, ":%X", p[0] << 8 | p[1]);
234 p += 2;
235 }
236 BIO_puts(out, "\n");
237 } else {
238 BIO_printf(out, "IP Address:<invalid>");
239 break;
240 }
241 break;
242
243 case GEN_RID:
244 BIO_printf(out, "Registered ID");
245 i2a_ASN1_OBJECT(out, gen->d.rid);
246 break;
247 }
248 return 1;
249 }
250
v2i_issuer_alt(X509V3_EXT_METHOD * method,X509V3_CTX * ctx,STACK_OF (CONF_VALUE)* nval)251 static GENERAL_NAMES *v2i_issuer_alt(X509V3_EXT_METHOD *method,
252 X509V3_CTX *ctx,
253 STACK_OF(CONF_VALUE) *nval)
254 {
255 GENERAL_NAMES *gens = NULL;
256 CONF_VALUE *cnf;
257 size_t i;
258 if (!(gens = sk_GENERAL_NAME_new_null())) {
259 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
260 return NULL;
261 }
262 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
263 cnf = sk_CONF_VALUE_value(nval, i);
264 if (!name_cmp(cnf->name, "issuer") && cnf->value &&
265 !strcmp(cnf->value, "copy")) {
266 if (!copy_issuer(ctx, gens))
267 goto err;
268 } else {
269 GENERAL_NAME *gen;
270 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
271 goto err;
272 sk_GENERAL_NAME_push(gens, gen);
273 }
274 }
275 return gens;
276 err:
277 sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
278 return NULL;
279 }
280
281 /* Append subject altname of issuer to issuer alt name of subject */
282
copy_issuer(X509V3_CTX * ctx,GENERAL_NAMES * gens)283 static int copy_issuer(X509V3_CTX *ctx, GENERAL_NAMES *gens)
284 {
285 GENERAL_NAMES *ialt;
286 GENERAL_NAME *gen;
287 X509_EXTENSION *ext;
288 int i;
289 size_t j;
290 if (ctx && (ctx->flags == CTX_TEST))
291 return 1;
292 if (!ctx || !ctx->issuer_cert) {
293 OPENSSL_PUT_ERROR(X509V3, X509V3_R_NO_ISSUER_DETAILS);
294 goto err;
295 }
296 i = X509_get_ext_by_NID(ctx->issuer_cert, NID_subject_alt_name, -1);
297 if (i < 0)
298 return 1;
299 if (!(ext = X509_get_ext(ctx->issuer_cert, i)) ||
300 !(ialt = X509V3_EXT_d2i(ext))) {
301 OPENSSL_PUT_ERROR(X509V3, X509V3_R_ISSUER_DECODE_ERROR);
302 goto err;
303 }
304
305 for (j = 0; j < sk_GENERAL_NAME_num(ialt); j++) {
306 gen = sk_GENERAL_NAME_value(ialt, j);
307 if (!sk_GENERAL_NAME_push(gens, gen)) {
308 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
309 goto err;
310 }
311 }
312 sk_GENERAL_NAME_free(ialt);
313
314 return 1;
315
316 err:
317 return 0;
318
319 }
320
v2i_subject_alt(X509V3_EXT_METHOD * method,X509V3_CTX * ctx,STACK_OF (CONF_VALUE)* nval)321 static GENERAL_NAMES *v2i_subject_alt(X509V3_EXT_METHOD *method,
322 X509V3_CTX *ctx,
323 STACK_OF(CONF_VALUE) *nval)
324 {
325 GENERAL_NAMES *gens = NULL;
326 CONF_VALUE *cnf;
327 size_t i;
328 if (!(gens = sk_GENERAL_NAME_new_null())) {
329 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
330 return NULL;
331 }
332 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
333 cnf = sk_CONF_VALUE_value(nval, i);
334 if (!name_cmp(cnf->name, "email") && cnf->value &&
335 !strcmp(cnf->value, "copy")) {
336 if (!copy_email(ctx, gens, 0))
337 goto err;
338 } else if (!name_cmp(cnf->name, "email") && cnf->value &&
339 !strcmp(cnf->value, "move")) {
340 if (!copy_email(ctx, gens, 1))
341 goto err;
342 } else {
343 GENERAL_NAME *gen;
344 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
345 goto err;
346 sk_GENERAL_NAME_push(gens, gen);
347 }
348 }
349 return gens;
350 err:
351 sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
352 return NULL;
353 }
354
355 /*
356 * Copy any email addresses in a certificate or request to GENERAL_NAMES
357 */
358
copy_email(X509V3_CTX * ctx,GENERAL_NAMES * gens,int move_p)359 static int copy_email(X509V3_CTX *ctx, GENERAL_NAMES *gens, int move_p)
360 {
361 X509_NAME *nm;
362 ASN1_IA5STRING *email = NULL;
363 X509_NAME_ENTRY *ne;
364 GENERAL_NAME *gen = NULL;
365 int i;
366 if (ctx != NULL && ctx->flags == CTX_TEST)
367 return 1;
368 if (!ctx || (!ctx->subject_cert && !ctx->subject_req)) {
369 OPENSSL_PUT_ERROR(X509V3, X509V3_R_NO_SUBJECT_DETAILS);
370 goto err;
371 }
372 /* Find the subject name */
373 if (ctx->subject_cert)
374 nm = X509_get_subject_name(ctx->subject_cert);
375 else
376 nm = X509_REQ_get_subject_name(ctx->subject_req);
377
378 /* Now add any email address(es) to STACK */
379 i = -1;
380 while ((i = X509_NAME_get_index_by_NID(nm,
381 NID_pkcs9_emailAddress, i)) >= 0) {
382 ne = X509_NAME_get_entry(nm, i);
383 email = M_ASN1_IA5STRING_dup(X509_NAME_ENTRY_get_data(ne));
384 if (move_p) {
385 X509_NAME_delete_entry(nm, i);
386 X509_NAME_ENTRY_free(ne);
387 i--;
388 }
389 if (!email || !(gen = GENERAL_NAME_new())) {
390 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
391 goto err;
392 }
393 gen->d.ia5 = email;
394 email = NULL;
395 gen->type = GEN_EMAIL;
396 if (!sk_GENERAL_NAME_push(gens, gen)) {
397 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
398 goto err;
399 }
400 gen = NULL;
401 }
402
403 return 1;
404
405 err:
406 GENERAL_NAME_free(gen);
407 M_ASN1_IA5STRING_free(email);
408 return 0;
409
410 }
411
v2i_GENERAL_NAMES(const X509V3_EXT_METHOD * method,X509V3_CTX * ctx,STACK_OF (CONF_VALUE)* nval)412 GENERAL_NAMES *v2i_GENERAL_NAMES(const X509V3_EXT_METHOD *method,
413 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
414 {
415 GENERAL_NAME *gen;
416 GENERAL_NAMES *gens = NULL;
417 CONF_VALUE *cnf;
418 size_t i;
419 if (!(gens = sk_GENERAL_NAME_new_null())) {
420 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
421 return NULL;
422 }
423 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
424 cnf = sk_CONF_VALUE_value(nval, i);
425 if (!(gen = v2i_GENERAL_NAME(method, ctx, cnf)))
426 goto err;
427 sk_GENERAL_NAME_push(gens, gen);
428 }
429 return gens;
430 err:
431 sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
432 return NULL;
433 }
434
v2i_GENERAL_NAME(const X509V3_EXT_METHOD * method,X509V3_CTX * ctx,CONF_VALUE * cnf)435 GENERAL_NAME *v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method,
436 X509V3_CTX *ctx, CONF_VALUE *cnf)
437 {
438 return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0);
439 }
440
a2i_GENERAL_NAME(GENERAL_NAME * out,const X509V3_EXT_METHOD * method,X509V3_CTX * ctx,int gen_type,char * value,int is_nc)441 GENERAL_NAME *a2i_GENERAL_NAME(GENERAL_NAME *out,
442 const X509V3_EXT_METHOD *method,
443 X509V3_CTX *ctx, int gen_type, char *value,
444 int is_nc)
445 {
446 char is_string = 0;
447 GENERAL_NAME *gen = NULL;
448
449 if (!value) {
450 OPENSSL_PUT_ERROR(X509V3, X509V3_R_MISSING_VALUE);
451 return NULL;
452 }
453
454 if (out)
455 gen = out;
456 else {
457 gen = GENERAL_NAME_new();
458 if (gen == NULL) {
459 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
460 return NULL;
461 }
462 }
463
464 switch (gen_type) {
465 case GEN_URI:
466 case GEN_EMAIL:
467 case GEN_DNS:
468 is_string = 1;
469 break;
470
471 case GEN_RID:
472 {
473 ASN1_OBJECT *obj;
474 if (!(obj = OBJ_txt2obj(value, 0))) {
475 OPENSSL_PUT_ERROR(X509V3, X509V3_R_BAD_OBJECT);
476 ERR_add_error_data(2, "value=", value);
477 goto err;
478 }
479 gen->d.rid = obj;
480 }
481 break;
482
483 case GEN_IPADD:
484 if (is_nc)
485 gen->d.ip = a2i_IPADDRESS_NC(value);
486 else
487 gen->d.ip = a2i_IPADDRESS(value);
488 if (gen->d.ip == NULL) {
489 OPENSSL_PUT_ERROR(X509V3, X509V3_R_BAD_IP_ADDRESS);
490 ERR_add_error_data(2, "value=", value);
491 goto err;
492 }
493 break;
494
495 case GEN_DIRNAME:
496 if (!do_dirname(gen, value, ctx)) {
497 OPENSSL_PUT_ERROR(X509V3, X509V3_R_DIRNAME_ERROR);
498 goto err;
499 }
500 break;
501
502 case GEN_OTHERNAME:
503 if (!do_othername(gen, value, ctx)) {
504 OPENSSL_PUT_ERROR(X509V3, X509V3_R_OTHERNAME_ERROR);
505 goto err;
506 }
507 break;
508 default:
509 OPENSSL_PUT_ERROR(X509V3, X509V3_R_UNSUPPORTED_TYPE);
510 goto err;
511 }
512
513 if (is_string) {
514 if (!(gen->d.ia5 = M_ASN1_IA5STRING_new()) ||
515 !ASN1_STRING_set(gen->d.ia5, (unsigned char *)value,
516 strlen(value))) {
517 OPENSSL_PUT_ERROR(X509V3, ERR_R_MALLOC_FAILURE);
518 goto err;
519 }
520 }
521
522 gen->type = gen_type;
523
524 return gen;
525
526 err:
527 if (!out)
528 GENERAL_NAME_free(gen);
529 return NULL;
530 }
531
v2i_GENERAL_NAME_ex(GENERAL_NAME * out,const X509V3_EXT_METHOD * method,X509V3_CTX * ctx,CONF_VALUE * cnf,int is_nc)532 GENERAL_NAME *v2i_GENERAL_NAME_ex(GENERAL_NAME *out,
533 const X509V3_EXT_METHOD *method,
534 X509V3_CTX *ctx, CONF_VALUE *cnf, int is_nc)
535 {
536 int type;
537
538 char *name, *value;
539
540 name = cnf->name;
541 value = cnf->value;
542
543 if (!value) {
544 OPENSSL_PUT_ERROR(X509V3, X509V3_R_MISSING_VALUE);
545 return NULL;
546 }
547
548 if (!name_cmp(name, "email"))
549 type = GEN_EMAIL;
550 else if (!name_cmp(name, "URI"))
551 type = GEN_URI;
552 else if (!name_cmp(name, "DNS"))
553 type = GEN_DNS;
554 else if (!name_cmp(name, "RID"))
555 type = GEN_RID;
556 else if (!name_cmp(name, "IP"))
557 type = GEN_IPADD;
558 else if (!name_cmp(name, "dirName"))
559 type = GEN_DIRNAME;
560 else if (!name_cmp(name, "otherName"))
561 type = GEN_OTHERNAME;
562 else {
563 OPENSSL_PUT_ERROR(X509V3, X509V3_R_UNSUPPORTED_OPTION);
564 ERR_add_error_data(2, "name=", name);
565 return NULL;
566 }
567
568 return a2i_GENERAL_NAME(out, method, ctx, type, value, is_nc);
569
570 }
571
do_othername(GENERAL_NAME * gen,char * value,X509V3_CTX * ctx)572 static int do_othername(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx)
573 {
574 char *objtmp = NULL, *p;
575 int objlen;
576 if (!(p = strchr(value, ';')))
577 return 0;
578 if (!(gen->d.otherName = OTHERNAME_new()))
579 return 0;
580 /*
581 * Free this up because we will overwrite it. no need to free type_id
582 * because it is static
583 */
584 ASN1_TYPE_free(gen->d.otherName->value);
585 if (!(gen->d.otherName->value = ASN1_generate_v3(p + 1, ctx)))
586 return 0;
587 objlen = p - value;
588 objtmp = OPENSSL_malloc(objlen + 1);
589 if (objtmp == NULL)
590 return 0;
591 strncpy(objtmp, value, objlen);
592 objtmp[objlen] = 0;
593 gen->d.otherName->type_id = OBJ_txt2obj(objtmp, 0);
594 OPENSSL_free(objtmp);
595 if (!gen->d.otherName->type_id)
596 return 0;
597 return 1;
598 }
599
do_dirname(GENERAL_NAME * gen,char * value,X509V3_CTX * ctx)600 static int do_dirname(GENERAL_NAME *gen, char *value, X509V3_CTX *ctx)
601 {
602 int ret = 0;
603 STACK_OF(CONF_VALUE) *sk = NULL;
604 X509_NAME *nm = X509_NAME_new();
605 if (nm == NULL)
606 goto err;
607 sk = X509V3_get_section(ctx, value);
608 if (sk == NULL) {
609 OPENSSL_PUT_ERROR(X509V3, X509V3_R_SECTION_NOT_FOUND);
610 ERR_add_error_data(2, "section=", value);
611 goto err;
612 }
613 /* FIXME: should allow other character types... */
614 if (!X509V3_NAME_from_section(nm, sk, MBSTRING_ASC))
615 goto err;
616 gen->d.dirn = nm;
617 ret = 1;
618
619 err:
620 if (!ret)
621 X509_NAME_free(nm);
622 X509V3_section_free(ctx, sk);
623 return ret;
624 }
625