2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
5 /* ====================================================================
6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
34 * 6. Redistributions of any form whatsoever must retain the following
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
58 /* config file utilities */
68 X509_EXTENSION *X509V3_EXT_conf(conf, ctx, name, value)
69 LHASH *conf; /* Config file */
71 char *name; /* Name */
72 char *value; /* Value */
74 return X509V3_EXT_conf_nid(conf, ctx, OBJ_sn2nid(name), value);
78 X509_EXTENSION *X509V3_EXT_conf_nid(conf, ctx, ext_nid, value)
79 LHASH *conf; /* Config file */
82 char *value; /* Value */
84 X509_EXTENSION *ext = NULL;
85 X509V3_EXT_METHOD *method;
91 ASN1_OCTET_STRING *ext_oct;
92 if(ext_nid == NID_undef) return NULL;
93 if(!(method = X509V3_EXT_get_nid(ext_nid))) {
94 /* Add generic extension support here */
97 /* Check for critical */
98 if((strlen(value) >= 9) && !strncmp(value, "critical,", 9)) {
102 /* Skip over spaces */
103 while(isspace(*value)) value++;
104 /* Now get internal extension representation based on type */
106 if(*value == '@') nval = CONF_get_section(conf, value + 1);
107 else nval = X509V3_parse_list(value);
109 X509V3err(X509V3_F_X509V3_EXT_CONF,X509V3_R_INVALID_EXTENSION_STRING);
110 ERR_add_error_data(4, "name=", OBJ_nid2sn(ext_nid), ",section=", value);
113 ext_struc = method->v2i(method, ctx, nval);
114 if(*value != '@') sk_pop_free(nval, X509V3_conf_free);
115 if(!ext_struc) return NULL;
116 } else if(method->s2i) {
117 if(!(ext_struc = method->s2i(method, ctx, value))) return NULL;
119 X509V3err(X509V3_F_X509V3_EXT_CONF,X509V3_R_EXTENSION_SETTING_NOT_SUPPORTED);
120 ERR_add_error_data(2, "name=", OBJ_nid2sn(ext_nid));
124 /* We've now got the internal representation: convert to DER */
125 ext_len = method->i2d(ext_struc, NULL);
126 ext_der = Malloc(ext_len);
128 method->i2d(ext_struc, &p);
129 method->ext_free(ext_struc);
130 ext_oct = ASN1_OCTET_STRING_new();
131 ext_oct->data = ext_der;
132 ext_oct->length = ext_len;
134 ext = X509_EXTENSION_create_by_NID(NULL, ext_nid, crit, ext_oct);
135 ASN1_OCTET_STRING_free(ext_oct);
141 /* This is the main function: add a bunch of extensions based on a config file
145 int X509V3_EXT_add_conf(conf, ctx, section, cert)
155 if(!(nval = CONF_get_section(conf, section))) return 0;
156 for(i = 0; i < sk_num(nval); i++) {
157 val = (CONF_VALUE *)sk_value(nval, i);
158 if(!(ext = X509V3_EXT_conf(conf, ctx, val->name, val->value)))
160 if(cert) X509_add_ext(cert, ext, -1);
161 X509_EXTENSION_free(ext);