1 /* $OpenBSD: x509_pcons.c,v 1.6 2024/08/31 10:03:03 tb Exp $ */ 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 3 * project. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 2003 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 #include <stdio.h> 60 #include <string.h> 61 62 #include <openssl/asn1.h> 63 #include <openssl/asn1t.h> 64 #include <openssl/conf.h> 65 #include <openssl/err.h> 66 #include <openssl/x509v3.h> 67 68 #include "x509_local.h" 69 70 static STACK_OF(CONF_VALUE) * 71 i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *bcons, 72 STACK_OF(CONF_VALUE) *extlist); 73 static void *v2i_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, 74 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *values); 75 76 static const X509V3_EXT_METHOD x509v3_ext_policy_constraints = { 77 .ext_nid = NID_policy_constraints, 78 .ext_flags = 0, 79 .it = &POLICY_CONSTRAINTS_it, 80 .ext_new = NULL, 81 .ext_free = NULL, 82 .d2i = NULL, 83 .i2d = NULL, 84 .i2s = NULL, 85 .s2i = NULL, 86 .i2v = i2v_POLICY_CONSTRAINTS, 87 .v2i = v2i_POLICY_CONSTRAINTS, 88 .i2r = NULL, 89 .r2i = NULL, 90 .usr_data = NULL, 91 }; 92 93 const X509V3_EXT_METHOD * 94 x509v3_ext_method_policy_constraints(void) 95 { 96 return &x509v3_ext_policy_constraints; 97 } 98 99 static const ASN1_TEMPLATE POLICY_CONSTRAINTS_seq_tt[] = { 100 { 101 .flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL, 102 .tag = 0, 103 .offset = offsetof(POLICY_CONSTRAINTS, requireExplicitPolicy), 104 .field_name = "requireExplicitPolicy", 105 .item = &ASN1_INTEGER_it, 106 }, 107 { 108 .flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL, 109 .tag = 1, 110 .offset = offsetof(POLICY_CONSTRAINTS, inhibitPolicyMapping), 111 .field_name = "inhibitPolicyMapping", 112 .item = &ASN1_INTEGER_it, 113 }, 114 }; 115 116 const ASN1_ITEM POLICY_CONSTRAINTS_it = { 117 .itype = ASN1_ITYPE_SEQUENCE, 118 .utype = V_ASN1_SEQUENCE, 119 .templates = POLICY_CONSTRAINTS_seq_tt, 120 .tcount = sizeof(POLICY_CONSTRAINTS_seq_tt) / sizeof(ASN1_TEMPLATE), 121 .funcs = NULL, 122 .size = sizeof(POLICY_CONSTRAINTS), 123 .sname = "POLICY_CONSTRAINTS", 124 }; 125 LCRYPTO_ALIAS(POLICY_CONSTRAINTS_it); 126 127 128 POLICY_CONSTRAINTS * 129 POLICY_CONSTRAINTS_new(void) 130 { 131 return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); 132 } 133 LCRYPTO_ALIAS(POLICY_CONSTRAINTS_new); 134 135 void 136 POLICY_CONSTRAINTS_free(POLICY_CONSTRAINTS *a) 137 { 138 ASN1_item_free((ASN1_VALUE *)a, &POLICY_CONSTRAINTS_it); 139 } 140 LCRYPTO_ALIAS(POLICY_CONSTRAINTS_free); 141 142 static STACK_OF(CONF_VALUE) * 143 i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, 144 STACK_OF(CONF_VALUE) *extlist) 145 { 146 POLICY_CONSTRAINTS *pcons = a; 147 STACK_OF(CONF_VALUE) *free_extlist = NULL; 148 149 if (extlist == NULL) { 150 if ((free_extlist = extlist = sk_CONF_VALUE_new_null()) == NULL) 151 return NULL; 152 } 153 154 if (!X509V3_add_value_int("Require Explicit Policy", 155 pcons->requireExplicitPolicy, &extlist)) 156 goto err; 157 if (!X509V3_add_value_int("Inhibit Policy Mapping", 158 pcons->inhibitPolicyMapping, &extlist)) 159 goto err; 160 161 return extlist; 162 163 err: 164 sk_CONF_VALUE_pop_free(free_extlist, X509V3_conf_free); 165 166 return NULL; 167 } 168 169 static void * 170 v2i_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, 171 STACK_OF(CONF_VALUE) *values) 172 { 173 POLICY_CONSTRAINTS *pcons = NULL; 174 CONF_VALUE *val; 175 int i; 176 177 if (!(pcons = POLICY_CONSTRAINTS_new())) { 178 X509V3error(ERR_R_MALLOC_FAILURE); 179 return NULL; 180 } 181 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { 182 val = sk_CONF_VALUE_value(values, i); 183 if (!strcmp(val->name, "requireExplicitPolicy")) { 184 if (!X509V3_get_value_int(val, 185 &pcons->requireExplicitPolicy)) goto err; 186 } else if (!strcmp(val->name, "inhibitPolicyMapping")) { 187 if (!X509V3_get_value_int(val, 188 &pcons->inhibitPolicyMapping)) goto err; 189 } else { 190 X509V3error(X509V3_R_INVALID_NAME); 191 X509V3_conf_err(val); 192 goto err; 193 } 194 } 195 if (!pcons->inhibitPolicyMapping && !pcons->requireExplicitPolicy) { 196 X509V3error(X509V3_R_ILLEGAL_EMPTY_EXTENSION); 197 goto err; 198 } 199 200 return pcons; 201 202 err: 203 POLICY_CONSTRAINTS_free(pcons); 204 return NULL; 205 } 206