]> git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/x509v3/v3_alt.c
9b627e071c6f29f40ddc8ce6b05e4f8df1c4794b
[thirdparty/openssl.git] / crypto / x509v3 / v3_alt.c
1 /*
2 * Copyright 1999-2017 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include "internal/cryptlib.h"
12 #include <openssl/conf.h>
13 #include <openssl/x509v3.h>
14 #include "ext_dat.h"
15
16 static GENERAL_NAMES *v2i_subject_alt(X509V3_EXT_METHOD *method,
17 X509V3_CTX *ctx,
18 STACK_OF(CONF_VALUE) *nval);
19 static GENERAL_NAMES *v2i_issuer_alt(X509V3_EXT_METHOD *method,
20 X509V3_CTX *ctx,
21 STACK_OF(CONF_VALUE) *nval);
22 static int copy_email(X509V3_CTX *ctx, GENERAL_NAMES *gens, int move_p);
23 static int copy_issuer(X509V3_CTX *ctx, GENERAL_NAMES *gens);
24 static int do_othername(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx);
25 static int do_dirname(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx);
26
27 const X509V3_EXT_METHOD v3_alt[3] = {
28 {NID_subject_alt_name, 0, ASN1_ITEM_ref(GENERAL_NAMES),
29 0, 0, 0, 0,
30 0, 0,
31 (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
32 (X509V3_EXT_V2I)v2i_subject_alt,
33 NULL, NULL, NULL},
34
35 {NID_issuer_alt_name, 0, ASN1_ITEM_ref(GENERAL_NAMES),
36 0, 0, 0, 0,
37 0, 0,
38 (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
39 (X509V3_EXT_V2I)v2i_issuer_alt,
40 NULL, NULL, NULL},
41
42 {NID_certificate_issuer, 0, ASN1_ITEM_ref(GENERAL_NAMES),
43 0, 0, 0, 0,
44 0, 0,
45 (X509V3_EXT_I2V) i2v_GENERAL_NAMES,
46 NULL, NULL, NULL, NULL},
47 };
48
49 STACK_OF(CONF_VALUE) *i2v_GENERAL_NAMES(X509V3_EXT_METHOD *method,
50 GENERAL_NAMES *gens,
51 STACK_OF(CONF_VALUE) *ret)
52 {
53 int i;
54 GENERAL_NAME *gen;
55 for (i = 0; i < sk_GENERAL_NAME_num(gens); i++) {
56 gen = sk_GENERAL_NAME_value(gens, i);
57 ret = i2v_GENERAL_NAME(method, gen, ret);
58 }
59 if (!ret)
60 return sk_CONF_VALUE_new_null();
61 return ret;
62 }
63
64 STACK_OF(CONF_VALUE) *i2v_GENERAL_NAME(X509V3_EXT_METHOD *method,
65 GENERAL_NAME *gen,
66 STACK_OF(CONF_VALUE) *ret)
67 {
68 unsigned char *p;
69 char oline[256], htmp[5];
70 int i;
71
72 switch (gen->type) {
73 case GEN_OTHERNAME:
74 if (!X509V3_add_value("othername", "<unsupported>", &ret))
75 return NULL;
76 break;
77
78 case GEN_X400:
79 if (!X509V3_add_value("X400Name", "<unsupported>", &ret))
80 return NULL;
81 break;
82
83 case GEN_EDIPARTY:
84 if (!X509V3_add_value("EdiPartyName", "<unsupported>", &ret))
85 return NULL;
86 break;
87
88 case GEN_EMAIL:
89 if (!X509V3_add_value_uchar("email", gen->d.ia5->data, &ret))
90 return NULL;
91 break;
92
93 case GEN_DNS:
94 if (!X509V3_add_value_uchar("DNS", gen->d.ia5->data, &ret))
95 return NULL;
96 break;
97
98 case GEN_URI:
99 if (!X509V3_add_value_uchar("URI", gen->d.ia5->data, &ret))
100 return NULL;
101 break;
102
103 case GEN_DIRNAME:
104 if (X509_NAME_oneline(gen->d.dirn, oline, sizeof(oline)) == NULL
105 || !X509V3_add_value("DirName", oline, &ret))
106 return NULL;
107 break;
108
109 case GEN_IPADD:
110 p = gen->d.ip->data;
111 if (gen->d.ip->length == 4)
112 BIO_snprintf(oline, sizeof(oline), "%d.%d.%d.%d",
113 p[0], p[1], p[2], p[3]);
114 else if (gen->d.ip->length == 16) {
115 oline[0] = 0;
116 for (i = 0; i < 8; i++) {
117 BIO_snprintf(htmp, sizeof(htmp), "%X", p[0] << 8 | p[1]);
118 p += 2;
119 strcat(oline, htmp);
120 if (i != 7)
121 strcat(oline, ":");
122 }
123 } else {
124 if (!X509V3_add_value("IP Address", "<invalid>", &ret))
125 return NULL;
126 break;
127 }
128 if (!X509V3_add_value("IP Address", oline, &ret))
129 return NULL;
130 break;
131
132 case GEN_RID:
133 i2t_ASN1_OBJECT(oline, 256, gen->d.rid);
134 if (!X509V3_add_value("Registered ID", oline, &ret))
135 return NULL;
136 break;
137 }
138 return ret;
139 }
140
141 int GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen)
142 {
143 unsigned char *p;
144 int i;
145 switch (gen->type) {
146 case GEN_OTHERNAME:
147 BIO_printf(out, "othername:<unsupported>");
148 break;
149
150 case GEN_X400:
151 BIO_printf(out, "X400Name:<unsupported>");
152 break;
153
154 case GEN_EDIPARTY:
155 /* Maybe fix this: it is supported now */
156 BIO_printf(out, "EdiPartyName:<unsupported>");
157 break;
158
159 case GEN_EMAIL:
160 BIO_printf(out, "email:%s", gen->d.ia5->data);
161 break;
162
163 case GEN_DNS:
164 BIO_printf(out, "DNS:%s", gen->d.ia5->data);
165 break;
166
167 case GEN_URI:
168 BIO_printf(out, "URI:%s", gen->d.ia5->data);
169 break;
170
171 case GEN_DIRNAME:
172 BIO_printf(out, "DirName:");
173 X509_NAME_print_ex(out, gen->d.dirn, 0, XN_FLAG_ONELINE);
174 break;
175
176 case GEN_IPADD:
177 p = gen->d.ip->data;
178 if (gen->d.ip->length == 4)
179 BIO_printf(out, "IP Address:%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
180 else if (gen->d.ip->length == 16) {
181 BIO_printf(out, "IP Address");
182 for (i = 0; i < 8; i++) {
183 BIO_printf(out, ":%X", p[0] << 8 | p[1]);
184 p += 2;
185 }
186 } else {
187 BIO_printf(out, "IP Address:<invalid>");
188 break;
189 }
190 break;
191
192 case GEN_RID:
193 BIO_printf(out, "Registered ID:");
194 i2a_ASN1_OBJECT(out, gen->d.rid);
195 break;
196 }
197 return 1;
198 }
199
200 static GENERAL_NAMES *v2i_issuer_alt(X509V3_EXT_METHOD *method,
201 X509V3_CTX *ctx,
202 STACK_OF(CONF_VALUE) *nval)
203 {
204 const int num = sk_CONF_VALUE_num(nval);
205 GENERAL_NAMES *gens = sk_GENERAL_NAME_new_reserve(NULL, num);
206 int i;
207
208 if (gens == NULL) {
209 X509V3err(X509V3_F_V2I_ISSUER_ALT, ERR_R_MALLOC_FAILURE);
210 sk_GENERAL_NAME_free(gens);
211 return NULL;
212 }
213 for (i = 0; i < num; i++) {
214 CONF_VALUE *cnf = sk_CONF_VALUE_value(nval, i);
215
216 if (!name_cmp(cnf->name, "issuer")
217 && cnf->value && strcmp(cnf->value, "copy") == 0) {
218 if (!copy_issuer(ctx, gens))
219 goto err;
220 } else {
221 GENERAL_NAME *gen = v2i_GENERAL_NAME(method, ctx, cnf);
222
223 if (gen == NULL)
224 goto err;
225 sk_GENERAL_NAME_push(gens, gen); /* no failure as it was reserved */
226 }
227 }
228 return gens;
229 err:
230 sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
231 return NULL;
232 }
233
234 /* Append subject altname of issuer to issuer alt name of subject */
235
236 static int copy_issuer(X509V3_CTX *ctx, GENERAL_NAMES *gens)
237 {
238 GENERAL_NAMES *ialt;
239 GENERAL_NAME *gen;
240 X509_EXTENSION *ext;
241 int i, num;
242
243 if (ctx && (ctx->flags == CTX_TEST))
244 return 1;
245 if (!ctx || !ctx->issuer_cert) {
246 X509V3err(X509V3_F_COPY_ISSUER, X509V3_R_NO_ISSUER_DETAILS);
247 goto err;
248 }
249 i = X509_get_ext_by_NID(ctx->issuer_cert, NID_subject_alt_name, -1);
250 if (i < 0)
251 return 1;
252 if ((ext = X509_get_ext(ctx->issuer_cert, i)) == NULL
253 || (ialt = X509V3_EXT_d2i(ext)) == NULL) {
254 X509V3err(X509V3_F_COPY_ISSUER, X509V3_R_ISSUER_DECODE_ERROR);
255 goto err;
256 }
257
258 num = sk_GENERAL_NAME_num(ialt);
259 if (!sk_GENERAL_NAME_reserve(gens, num)) {
260 X509V3err(X509V3_F_COPY_ISSUER, ERR_R_MALLOC_FAILURE);
261 goto err;
262 }
263
264 for (i = 0; i < num; i++) {
265 gen = sk_GENERAL_NAME_value(ialt, i);
266 sk_GENERAL_NAME_push(gens, gen); /* no failure as it was reserved */
267 }
268 sk_GENERAL_NAME_free(ialt);
269
270 return 1;
271
272 err:
273 return 0;
274
275 }
276
277 static GENERAL_NAMES *v2i_subject_alt(X509V3_EXT_METHOD *method,
278 X509V3_CTX *ctx,
279 STACK_OF(CONF_VALUE) *nval)
280 {
281 GENERAL_NAMES *gens;
282 CONF_VALUE *cnf;
283 const int num = sk_CONF_VALUE_num(nval);
284 int i;
285
286 gens = sk_GENERAL_NAME_new_reserve(NULL, num);
287 if (gens == NULL) {
288 X509V3err(X509V3_F_V2I_SUBJECT_ALT, ERR_R_MALLOC_FAILURE);
289 sk_GENERAL_NAME_free(gens);
290 return NULL;
291 }
292
293 for (i = 0; i < num; i++) {
294 cnf = sk_CONF_VALUE_value(nval, i);
295 if (!name_cmp(cnf->name, "email")
296 && cnf->value && strcmp(cnf->value, "copy") == 0) {
297 if (!copy_email(ctx, gens, 0))
298 goto err;
299 } else if (!name_cmp(cnf->name, "email")
300 && cnf->value && strcmp(cnf->value, "move") == 0) {
301 if (!copy_email(ctx, gens, 1))
302 goto err;
303 } else {
304 GENERAL_NAME *gen;
305 if ((gen = v2i_GENERAL_NAME(method, ctx, cnf)) == NULL)
306 goto err;
307 sk_GENERAL_NAME_push(gens, gen); /* no failure as it was reserved */
308 }
309 }
310 return gens;
311 err:
312 sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
313 return NULL;
314 }
315
316 /*
317 * Copy any email addresses in a certificate or request to GENERAL_NAMES
318 */
319
320 static int copy_email(X509V3_CTX *ctx, GENERAL_NAMES *gens, int move_p)
321 {
322 X509_NAME *nm;
323 ASN1_IA5STRING *email = NULL;
324 X509_NAME_ENTRY *ne;
325 GENERAL_NAME *gen = NULL;
326 int i = -1;
327
328 if (ctx != NULL && ctx->flags == CTX_TEST)
329 return 1;
330 if (ctx == NULL
331 || (ctx->subject_cert == NULL && ctx->subject_req == NULL)) {
332 X509V3err(X509V3_F_COPY_EMAIL, X509V3_R_NO_SUBJECT_DETAILS);
333 goto err;
334 }
335 /* Find the subject name */
336 if (ctx->subject_cert)
337 nm = X509_get_subject_name(ctx->subject_cert);
338 else
339 nm = X509_REQ_get_subject_name(ctx->subject_req);
340
341 /* Now add any email address(es) to STACK */
342 while ((i = X509_NAME_get_index_by_NID(nm,
343 NID_pkcs9_emailAddress, i)) >= 0) {
344 ne = X509_NAME_get_entry(nm, i);
345 email = ASN1_STRING_dup(X509_NAME_ENTRY_get_data(ne));
346 if (move_p) {
347 X509_NAME_delete_entry(nm, i);
348 X509_NAME_ENTRY_free(ne);
349 i--;
350 }
351 if (email == NULL || (gen = GENERAL_NAME_new()) == NULL) {
352 X509V3err(X509V3_F_COPY_EMAIL, ERR_R_MALLOC_FAILURE);
353 goto err;
354 }
355 gen->d.ia5 = email;
356 email = NULL;
357 gen->type = GEN_EMAIL;
358 if (!sk_GENERAL_NAME_push(gens, gen)) {
359 X509V3err(X509V3_F_COPY_EMAIL, ERR_R_MALLOC_FAILURE);
360 goto err;
361 }
362 gen = NULL;
363 }
364
365 return 1;
366
367 err:
368 GENERAL_NAME_free(gen);
369 ASN1_IA5STRING_free(email);
370 return 0;
371
372 }
373
374 GENERAL_NAMES *v2i_GENERAL_NAMES(const X509V3_EXT_METHOD *method,
375 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
376 {
377 GENERAL_NAME *gen;
378 GENERAL_NAMES *gens;
379 CONF_VALUE *cnf;
380 const int num = sk_CONF_VALUE_num(nval);
381 int i;
382
383 gens = sk_GENERAL_NAME_new_reserve(NULL, num);
384 if (gens == NULL) {
385 X509V3err(X509V3_F_V2I_GENERAL_NAMES, ERR_R_MALLOC_FAILURE);
386 sk_GENERAL_NAME_free(gens);
387 return NULL;
388 }
389
390 for (i = 0; i < num; i++) {
391 cnf = sk_CONF_VALUE_value(nval, i);
392 if ((gen = v2i_GENERAL_NAME(method, ctx, cnf)) == NULL)
393 goto err;
394 sk_GENERAL_NAME_push(gens, gen); /* no failure as it was reserved */
395 }
396 return gens;
397 err:
398 sk_GENERAL_NAME_pop_free(gens, GENERAL_NAME_free);
399 return NULL;
400 }
401
402 GENERAL_NAME *v2i_GENERAL_NAME(const X509V3_EXT_METHOD *method,
403 X509V3_CTX *ctx, CONF_VALUE *cnf)
404 {
405 return v2i_GENERAL_NAME_ex(NULL, method, ctx, cnf, 0);
406 }
407
408 GENERAL_NAME *a2i_GENERAL_NAME(GENERAL_NAME *out,
409 const X509V3_EXT_METHOD *method,
410 X509V3_CTX *ctx, int gen_type, const char *value,
411 int is_nc)
412 {
413 char is_string = 0;
414 GENERAL_NAME *gen = NULL;
415
416 if (!value) {
417 X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_MISSING_VALUE);
418 return NULL;
419 }
420
421 if (out)
422 gen = out;
423 else {
424 gen = GENERAL_NAME_new();
425 if (gen == NULL) {
426 X509V3err(X509V3_F_A2I_GENERAL_NAME, ERR_R_MALLOC_FAILURE);
427 return NULL;
428 }
429 }
430
431 switch (gen_type) {
432 case GEN_URI:
433 case GEN_EMAIL:
434 case GEN_DNS:
435 is_string = 1;
436 break;
437
438 case GEN_RID:
439 {
440 ASN1_OBJECT *obj;
441 if ((obj = OBJ_txt2obj(value, 0)) == NULL) {
442 X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_BAD_OBJECT);
443 ERR_add_error_data(2, "value=", value);
444 goto err;
445 }
446 gen->d.rid = obj;
447 }
448 break;
449
450 case GEN_IPADD:
451 if (is_nc)
452 gen->d.ip = a2i_IPADDRESS_NC(value);
453 else
454 gen->d.ip = a2i_IPADDRESS(value);
455 if (gen->d.ip == NULL) {
456 X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_BAD_IP_ADDRESS);
457 ERR_add_error_data(2, "value=", value);
458 goto err;
459 }
460 break;
461
462 case GEN_DIRNAME:
463 if (!do_dirname(gen, value, ctx)) {
464 X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_DIRNAME_ERROR);
465 goto err;
466 }
467 break;
468
469 case GEN_OTHERNAME:
470 if (!do_othername(gen, value, ctx)) {
471 X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_OTHERNAME_ERROR);
472 goto err;
473 }
474 break;
475 default:
476 X509V3err(X509V3_F_A2I_GENERAL_NAME, X509V3_R_UNSUPPORTED_TYPE);
477 goto err;
478 }
479
480 if (is_string) {
481 if ((gen->d.ia5 = ASN1_IA5STRING_new()) == NULL ||
482 !ASN1_STRING_set(gen->d.ia5, (unsigned char *)value,
483 strlen(value))) {
484 X509V3err(X509V3_F_A2I_GENERAL_NAME, ERR_R_MALLOC_FAILURE);
485 goto err;
486 }
487 }
488
489 gen->type = gen_type;
490
491 return gen;
492
493 err:
494 if (!out)
495 GENERAL_NAME_free(gen);
496 return NULL;
497 }
498
499 GENERAL_NAME *v2i_GENERAL_NAME_ex(GENERAL_NAME *out,
500 const X509V3_EXT_METHOD *method,
501 X509V3_CTX *ctx, CONF_VALUE *cnf, int is_nc)
502 {
503 int type;
504
505 char *name, *value;
506
507 name = cnf->name;
508 value = cnf->value;
509
510 if (!value) {
511 X509V3err(X509V3_F_V2I_GENERAL_NAME_EX, X509V3_R_MISSING_VALUE);
512 return NULL;
513 }
514
515 if (!name_cmp(name, "email"))
516 type = GEN_EMAIL;
517 else if (!name_cmp(name, "URI"))
518 type = GEN_URI;
519 else if (!name_cmp(name, "DNS"))
520 type = GEN_DNS;
521 else if (!name_cmp(name, "RID"))
522 type = GEN_RID;
523 else if (!name_cmp(name, "IP"))
524 type = GEN_IPADD;
525 else if (!name_cmp(name, "dirName"))
526 type = GEN_DIRNAME;
527 else if (!name_cmp(name, "otherName"))
528 type = GEN_OTHERNAME;
529 else {
530 X509V3err(X509V3_F_V2I_GENERAL_NAME_EX, X509V3_R_UNSUPPORTED_OPTION);
531 ERR_add_error_data(2, "name=", name);
532 return NULL;
533 }
534
535 return a2i_GENERAL_NAME(out, method, ctx, type, value, is_nc);
536
537 }
538
539 static int do_othername(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx)
540 {
541 char *objtmp = NULL, *p;
542 int objlen;
543
544 if ((p = strchr(value, ';')) == NULL)
545 return 0;
546 if ((gen->d.otherName = OTHERNAME_new()) == NULL)
547 return 0;
548 /*
549 * Free this up because we will overwrite it. no need to free type_id
550 * because it is static
551 */
552 ASN1_TYPE_free(gen->d.otherName->value);
553 if ((gen->d.otherName->value = ASN1_generate_v3(p + 1, ctx)) == NULL)
554 return 0;
555 objlen = p - value;
556 objtmp = OPENSSL_strndup(value, objlen);
557 if (objtmp == NULL)
558 return 0;
559 gen->d.otherName->type_id = OBJ_txt2obj(objtmp, 0);
560 OPENSSL_free(objtmp);
561 if (!gen->d.otherName->type_id)
562 return 0;
563 return 1;
564 }
565
566 static int do_dirname(GENERAL_NAME *gen, const char *value, X509V3_CTX *ctx)
567 {
568 int ret = 0;
569 STACK_OF(CONF_VALUE) *sk = NULL;
570 X509_NAME *nm;
571
572 if ((nm = X509_NAME_new()) == NULL)
573 goto err;
574 sk = X509V3_get_section(ctx, value);
575 if (!sk) {
576 X509V3err(X509V3_F_DO_DIRNAME, X509V3_R_SECTION_NOT_FOUND);
577 ERR_add_error_data(2, "section=", value);
578 goto err;
579 }
580 /* FIXME: should allow other character types... */
581 ret = X509V3_NAME_from_section(nm, sk, MBSTRING_ASC);
582 if (!ret)
583 goto err;
584 gen->d.dirn = nm;
585
586 err:
587 if (ret == 0)
588 X509_NAME_free(nm);
589 X509V3_section_free(ctx, sk);
590 return ret;
591 }