os/ossrv/ssl/libcrypto/src/crypto/x509v3/pcy_map.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* pcy_map.c */
sl@0
     2
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
sl@0
     3
 * project 2004.
sl@0
     4
 */
sl@0
     5
/* ====================================================================
sl@0
     6
 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
sl@0
     7
 *
sl@0
     8
 * Redistribution and use in source and binary forms, with or without
sl@0
     9
 * modification, are permitted provided that the following conditions
sl@0
    10
 * are met:
sl@0
    11
 *
sl@0
    12
 * 1. Redistributions of source code must retain the above copyright
sl@0
    13
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    14
 *
sl@0
    15
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    16
 *    notice, this list of conditions and the following disclaimer in
sl@0
    17
 *    the documentation and/or other materials provided with the
sl@0
    18
 *    distribution.
sl@0
    19
 *
sl@0
    20
 * 3. All advertising materials mentioning features or use of this
sl@0
    21
 *    software must display the following acknowledgment:
sl@0
    22
 *    "This product includes software developed by the OpenSSL Project
sl@0
    23
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
sl@0
    24
 *
sl@0
    25
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
    26
 *    endorse or promote products derived from this software without
sl@0
    27
 *    prior written permission. For written permission, please contact
sl@0
    28
 *    licensing@OpenSSL.org.
sl@0
    29
 *
sl@0
    30
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
    31
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
    32
 *    permission of the OpenSSL Project.
sl@0
    33
 *
sl@0
    34
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
    35
 *    acknowledgment:
sl@0
    36
 *    "This product includes software developed by the OpenSSL Project
sl@0
    37
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
sl@0
    38
 *
sl@0
    39
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
    40
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    41
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
    42
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
    43
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
    44
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
    45
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
    46
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    47
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
    48
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
    49
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
    50
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
    51
 * ====================================================================
sl@0
    52
 *
sl@0
    53
 * This product includes cryptographic software written by Eric Young
sl@0
    54
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
    55
 * Hudson (tjh@cryptsoft.com).
sl@0
    56
 *
sl@0
    57
 */
sl@0
    58
sl@0
    59
#include "cryptlib.h"
sl@0
    60
#include <openssl/x509.h>
sl@0
    61
#include <openssl/x509v3.h>
sl@0
    62
sl@0
    63
#include "pcy_int.h"
sl@0
    64
sl@0
    65
static int ref_cmp(const X509_POLICY_REF * const *a,
sl@0
    66
			const X509_POLICY_REF * const *b)
sl@0
    67
	{
sl@0
    68
	return OBJ_cmp((*a)->subjectDomainPolicy, (*b)->subjectDomainPolicy);
sl@0
    69
	}
sl@0
    70
sl@0
    71
static void policy_map_free(X509_POLICY_REF *map)
sl@0
    72
	{
sl@0
    73
	if (map->subjectDomainPolicy)
sl@0
    74
		ASN1_OBJECT_free(map->subjectDomainPolicy);
sl@0
    75
	OPENSSL_free(map);
sl@0
    76
	}
sl@0
    77
sl@0
    78
static X509_POLICY_REF *policy_map_find(X509_POLICY_CACHE *cache, ASN1_OBJECT *id)
sl@0
    79
	{
sl@0
    80
	X509_POLICY_REF tmp;
sl@0
    81
	int idx;
sl@0
    82
	tmp.subjectDomainPolicy = id;
sl@0
    83
sl@0
    84
	idx = sk_X509_POLICY_REF_find(cache->maps, &tmp);
sl@0
    85
	if (idx == -1)
sl@0
    86
		return NULL;
sl@0
    87
	return sk_X509_POLICY_REF_value(cache->maps, idx);
sl@0
    88
	}
sl@0
    89
sl@0
    90
/* Set policy mapping entries in cache.
sl@0
    91
 * Note: this modifies the passed POLICY_MAPPINGS structure
sl@0
    92
 */
sl@0
    93
sl@0
    94
EXPORT_C int policy_cache_set_mapping(X509 *x, POLICY_MAPPINGS *maps)
sl@0
    95
	{
sl@0
    96
	POLICY_MAPPING *map;
sl@0
    97
	X509_POLICY_REF *ref = NULL;
sl@0
    98
	X509_POLICY_DATA *data;
sl@0
    99
	X509_POLICY_CACHE *cache = x->policy_cache;
sl@0
   100
	int i;
sl@0
   101
	int ret = 0;
sl@0
   102
	if (sk_POLICY_MAPPING_num(maps) == 0)
sl@0
   103
		{
sl@0
   104
		ret = -1;
sl@0
   105
		goto bad_mapping;
sl@0
   106
		}
sl@0
   107
	cache->maps = sk_X509_POLICY_REF_new(ref_cmp);
sl@0
   108
	for (i = 0; i < sk_POLICY_MAPPING_num(maps); i++)
sl@0
   109
		{
sl@0
   110
		map = sk_POLICY_MAPPING_value(maps, i);
sl@0
   111
		/* Reject if map to or from anyPolicy */
sl@0
   112
		if ((OBJ_obj2nid(map->subjectDomainPolicy) == NID_any_policy)
sl@0
   113
		   || (OBJ_obj2nid(map->issuerDomainPolicy) == NID_any_policy))
sl@0
   114
			{
sl@0
   115
			ret = -1;
sl@0
   116
			goto bad_mapping;
sl@0
   117
			}
sl@0
   118
sl@0
   119
		/* If we've already mapped from this OID bad mapping */
sl@0
   120
		if (policy_map_find(cache, map->subjectDomainPolicy) != NULL)
sl@0
   121
			{
sl@0
   122
			ret = -1;
sl@0
   123
			goto bad_mapping;
sl@0
   124
			}
sl@0
   125
sl@0
   126
		/* Attempt to find matching policy data */
sl@0
   127
		data = policy_cache_find_data(cache, map->issuerDomainPolicy);
sl@0
   128
		/* If we don't have anyPolicy can't map */
sl@0
   129
		if (!data && !cache->anyPolicy)
sl@0
   130
			continue;
sl@0
   131
sl@0
   132
		/* Create a NODE from anyPolicy */
sl@0
   133
		if (!data)
sl@0
   134
			{
sl@0
   135
			data = policy_data_new(NULL, map->issuerDomainPolicy,
sl@0
   136
					cache->anyPolicy->flags
sl@0
   137
						& POLICY_DATA_FLAG_CRITICAL);
sl@0
   138
			if (!data)
sl@0
   139
				goto bad_mapping;
sl@0
   140
			data->qualifier_set = cache->anyPolicy->qualifier_set;
sl@0
   141
			map->issuerDomainPolicy = NULL;
sl@0
   142
			data->flags |= POLICY_DATA_FLAG_MAPPED_ANY;
sl@0
   143
			data->flags |= POLICY_DATA_FLAG_SHARED_QUALIFIERS;
sl@0
   144
			if (!sk_X509_POLICY_DATA_push(cache->data, data))
sl@0
   145
				{
sl@0
   146
				policy_data_free(data);
sl@0
   147
				goto bad_mapping;
sl@0
   148
				}
sl@0
   149
			}
sl@0
   150
		else
sl@0
   151
			data->flags |= POLICY_DATA_FLAG_MAPPED;
sl@0
   152
sl@0
   153
		if (!sk_ASN1_OBJECT_push(data->expected_policy_set, 
sl@0
   154
						map->subjectDomainPolicy))
sl@0
   155
			goto bad_mapping;
sl@0
   156
		
sl@0
   157
		ref = OPENSSL_malloc(sizeof(X509_POLICY_REF));
sl@0
   158
		if (!ref)
sl@0
   159
			goto bad_mapping;
sl@0
   160
sl@0
   161
		ref->subjectDomainPolicy = map->subjectDomainPolicy;
sl@0
   162
		map->subjectDomainPolicy = NULL;
sl@0
   163
		ref->data = data;
sl@0
   164
sl@0
   165
		if (!sk_X509_POLICY_REF_push(cache->maps, ref))
sl@0
   166
			goto bad_mapping;
sl@0
   167
sl@0
   168
		ref = NULL;
sl@0
   169
sl@0
   170
		}
sl@0
   171
sl@0
   172
	ret = 1;
sl@0
   173
	bad_mapping:
sl@0
   174
	if (ret == -1)
sl@0
   175
		x->ex_flags |= EXFLAG_INVALID_POLICY;
sl@0
   176
	if (ref)
sl@0
   177
		policy_map_free(ref);
sl@0
   178
	if (ret <= 0)
sl@0
   179
		{
sl@0
   180
		sk_X509_POLICY_REF_pop_free(cache->maps, policy_map_free);
sl@0
   181
		cache->maps = NULL;
sl@0
   182
		}
sl@0
   183
	sk_POLICY_MAPPING_pop_free(maps, POLICY_MAPPING_free);
sl@0
   184
	return ret;
sl@0
   185
sl@0
   186
	}