1 /* $OpenBSD: x509_pmaps.c,v 1.6 2024/08/31 10:03:03 tb Exp $ */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project.
4 */
5 /* ====================================================================
6 * Copyright (c) 2003 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
18 * distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 * acknowledgment:
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59
60 #include <stdio.h>
61
62 #include <openssl/asn1t.h>
63 #include <openssl/conf.h>
64 #include <openssl/err.h>
65 #include <openssl/x509v3.h>
66
67 #include "x509_local.h"
68
69 static void *v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method,
70 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval);
71 static STACK_OF(CONF_VALUE) *i2v_POLICY_MAPPINGS(
72 const X509V3_EXT_METHOD *method, void *pmps, STACK_OF(CONF_VALUE) *extlist);
73
74 static const X509V3_EXT_METHOD x509v3_ext_policy_mappings = {
75 .ext_nid = NID_policy_mappings,
76 .ext_flags = 0,
77 .it = &POLICY_MAPPINGS_it,
78 .ext_new = NULL,
79 .ext_free = NULL,
80 .d2i = NULL,
81 .i2d = NULL,
82 .i2s = NULL,
83 .s2i = NULL,
84 .i2v = i2v_POLICY_MAPPINGS,
85 .v2i = v2i_POLICY_MAPPINGS,
86 .i2r = NULL,
87 .r2i = NULL,
88 .usr_data = NULL,
89 };
90
91 const X509V3_EXT_METHOD *
x509v3_ext_method_policy_mappings(void)92 x509v3_ext_method_policy_mappings(void)
93 {
94 return &x509v3_ext_policy_mappings;
95 }
96
97 static const ASN1_TEMPLATE POLICY_MAPPING_seq_tt[] = {
98 {
99 .flags = 0,
100 .tag = 0,
101 .offset = offsetof(POLICY_MAPPING, issuerDomainPolicy),
102 .field_name = "issuerDomainPolicy",
103 .item = &ASN1_OBJECT_it,
104 },
105 {
106 .flags = 0,
107 .tag = 0,
108 .offset = offsetof(POLICY_MAPPING, subjectDomainPolicy),
109 .field_name = "subjectDomainPolicy",
110 .item = &ASN1_OBJECT_it,
111 },
112 };
113
114 const ASN1_ITEM POLICY_MAPPING_it = {
115 .itype = ASN1_ITYPE_SEQUENCE,
116 .utype = V_ASN1_SEQUENCE,
117 .templates = POLICY_MAPPING_seq_tt,
118 .tcount = sizeof(POLICY_MAPPING_seq_tt) / sizeof(ASN1_TEMPLATE),
119 .funcs = NULL,
120 .size = sizeof(POLICY_MAPPING),
121 .sname = "POLICY_MAPPING",
122 };
123 LCRYPTO_ALIAS(POLICY_MAPPING_it);
124
125 static const ASN1_TEMPLATE POLICY_MAPPINGS_item_tt = {
126 .flags = ASN1_TFLG_SEQUENCE_OF,
127 .tag = 0,
128 .offset = 0,
129 .field_name = "POLICY_MAPPINGS",
130 .item = &POLICY_MAPPING_it,
131 };
132
133 const ASN1_ITEM POLICY_MAPPINGS_it = {
134 .itype = ASN1_ITYPE_PRIMITIVE,
135 .utype = -1,
136 .templates = &POLICY_MAPPINGS_item_tt,
137 .tcount = 0,
138 .funcs = NULL,
139 .size = 0,
140 .sname = "POLICY_MAPPINGS",
141 };
142 LCRYPTO_ALIAS(POLICY_MAPPINGS_it);
143
144
145 POLICY_MAPPING *
POLICY_MAPPING_new(void)146 POLICY_MAPPING_new(void)
147 {
148 return (POLICY_MAPPING*)ASN1_item_new(&POLICY_MAPPING_it);
149 }
150 LCRYPTO_ALIAS(POLICY_MAPPING_new);
151
152 void
POLICY_MAPPING_free(POLICY_MAPPING * a)153 POLICY_MAPPING_free(POLICY_MAPPING *a)
154 {
155 ASN1_item_free((ASN1_VALUE *)a, &POLICY_MAPPING_it);
156 }
157 LCRYPTO_ALIAS(POLICY_MAPPING_free);
158
STACK_OF(CONF_VALUE)159 static STACK_OF(CONF_VALUE) *
160 i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, void *a,
161 STACK_OF(CONF_VALUE) *extlist)
162 {
163 STACK_OF(CONF_VALUE) *free_extlist = NULL;
164 POLICY_MAPPINGS *pmaps = a;
165 POLICY_MAPPING *pmap;
166 char issuer[80], subject[80];
167 int i;
168
169 if (extlist == NULL) {
170 if ((free_extlist = extlist = sk_CONF_VALUE_new_null()) == NULL)
171 return NULL;
172 }
173
174 for (i = 0; i < sk_POLICY_MAPPING_num(pmaps); i++) {
175 if ((pmap = sk_POLICY_MAPPING_value(pmaps, i)) == NULL)
176 goto err;
177 if (!i2t_ASN1_OBJECT(issuer, sizeof issuer,
178 pmap->issuerDomainPolicy))
179 goto err;
180 if (!i2t_ASN1_OBJECT(subject, sizeof subject,
181 pmap->subjectDomainPolicy))
182 goto err;
183 if (!X509V3_add_value(issuer, subject, &extlist))
184 goto err;
185 }
186
187 return extlist;
188
189 err:
190 sk_CONF_VALUE_pop_free(free_extlist, X509V3_conf_free);
191
192 return NULL;
193 }
194
195 static void *
v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD * method,X509V3_CTX * ctx,STACK_OF (CONF_VALUE)* nval)196 v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx,
197 STACK_OF(CONF_VALUE) *nval)
198 {
199 POLICY_MAPPINGS *pmaps = NULL;
200 POLICY_MAPPING *pmap = NULL;
201 ASN1_OBJECT *obj1 = NULL, *obj2 = NULL;
202 CONF_VALUE *val;
203 int i, rc;
204
205 if (!(pmaps = sk_POLICY_MAPPING_new_null())) {
206 X509V3error(ERR_R_MALLOC_FAILURE);
207 return NULL;
208 }
209
210 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) {
211 val = sk_CONF_VALUE_value(nval, i);
212 if (!val->value || !val->name) {
213 rc = X509V3_R_INVALID_OBJECT_IDENTIFIER;
214 goto err;
215 }
216 obj1 = OBJ_txt2obj(val->name, 0);
217 obj2 = OBJ_txt2obj(val->value, 0);
218 if (!obj1 || !obj2) {
219 rc = X509V3_R_INVALID_OBJECT_IDENTIFIER;
220 goto err;
221 }
222 pmap = POLICY_MAPPING_new();
223 if (!pmap) {
224 rc = ERR_R_MALLOC_FAILURE;
225 goto err;
226 }
227 pmap->issuerDomainPolicy = obj1;
228 pmap->subjectDomainPolicy = obj2;
229 obj1 = obj2 = NULL;
230 if (sk_POLICY_MAPPING_push(pmaps, pmap) == 0) {
231 rc = ERR_R_MALLOC_FAILURE;
232 goto err;
233 }
234 pmap = NULL;
235 }
236 return pmaps;
237
238 err:
239 sk_POLICY_MAPPING_pop_free(pmaps, POLICY_MAPPING_free);
240 X509V3error(rc);
241 if (rc == X509V3_R_INVALID_OBJECT_IDENTIFIER)
242 X509V3_conf_err(val);
243 ASN1_OBJECT_free(obj1);
244 ASN1_OBJECT_free(obj2);
245 POLICY_MAPPING_free(pmap);
246 return NULL;
247 }
248