1*2139Sjp161948 /* pcy_cache.c */
2*2139Sjp161948 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3*2139Sjp161948 * project 2004.
4*2139Sjp161948 */
5*2139Sjp161948 /* ====================================================================
6*2139Sjp161948 * Copyright (c) 2004 The OpenSSL Project. All rights reserved.
7*2139Sjp161948 *
8*2139Sjp161948 * Redistribution and use in source and binary forms, with or without
9*2139Sjp161948 * modification, are permitted provided that the following conditions
10*2139Sjp161948 * are met:
11*2139Sjp161948 *
12*2139Sjp161948 * 1. Redistributions of source code must retain the above copyright
13*2139Sjp161948 * notice, this list of conditions and the following disclaimer.
14*2139Sjp161948 *
15*2139Sjp161948 * 2. Redistributions in binary form must reproduce the above copyright
16*2139Sjp161948 * notice, this list of conditions and the following disclaimer in
17*2139Sjp161948 * the documentation and/or other materials provided with the
18*2139Sjp161948 * distribution.
19*2139Sjp161948 *
20*2139Sjp161948 * 3. All advertising materials mentioning features or use of this
21*2139Sjp161948 * software must display the following acknowledgment:
22*2139Sjp161948 * "This product includes software developed by the OpenSSL Project
23*2139Sjp161948 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24*2139Sjp161948 *
25*2139Sjp161948 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26*2139Sjp161948 * endorse or promote products derived from this software without
27*2139Sjp161948 * prior written permission. For written permission, please contact
28*2139Sjp161948 * licensing@OpenSSL.org.
29*2139Sjp161948 *
30*2139Sjp161948 * 5. Products derived from this software may not be called "OpenSSL"
31*2139Sjp161948 * nor may "OpenSSL" appear in their names without prior written
32*2139Sjp161948 * permission of the OpenSSL Project.
33*2139Sjp161948 *
34*2139Sjp161948 * 6. Redistributions of any form whatsoever must retain the following
35*2139Sjp161948 * acknowledgment:
36*2139Sjp161948 * "This product includes software developed by the OpenSSL Project
37*2139Sjp161948 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38*2139Sjp161948 *
39*2139Sjp161948 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40*2139Sjp161948 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41*2139Sjp161948 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42*2139Sjp161948 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43*2139Sjp161948 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44*2139Sjp161948 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45*2139Sjp161948 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46*2139Sjp161948 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47*2139Sjp161948 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48*2139Sjp161948 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49*2139Sjp161948 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50*2139Sjp161948 * OF THE POSSIBILITY OF SUCH DAMAGE.
51*2139Sjp161948 * ====================================================================
52*2139Sjp161948 *
53*2139Sjp161948 * This product includes cryptographic software written by Eric Young
54*2139Sjp161948 * (eay@cryptsoft.com). This product includes software written by Tim
55*2139Sjp161948 * Hudson (tjh@cryptsoft.com).
56*2139Sjp161948 *
57*2139Sjp161948 */
58*2139Sjp161948
59*2139Sjp161948 #include "cryptlib.h"
60*2139Sjp161948 #include <openssl/x509.h>
61*2139Sjp161948 #include <openssl/x509v3.h>
62*2139Sjp161948
63*2139Sjp161948 #include "pcy_int.h"
64*2139Sjp161948
65*2139Sjp161948 static int policy_data_cmp(const X509_POLICY_DATA * const *a,
66*2139Sjp161948 const X509_POLICY_DATA * const *b);
67*2139Sjp161948 static int policy_cache_set_int(long *out, ASN1_INTEGER *value);
68*2139Sjp161948
69*2139Sjp161948 /* Set cache entry according to CertificatePolicies extension.
70*2139Sjp161948 * Note: this destroys the passed CERTIFICATEPOLICIES structure.
71*2139Sjp161948 */
72*2139Sjp161948
policy_cache_create(X509 * x,CERTIFICATEPOLICIES * policies,int crit)73*2139Sjp161948 static int policy_cache_create(X509 *x,
74*2139Sjp161948 CERTIFICATEPOLICIES *policies, int crit)
75*2139Sjp161948 {
76*2139Sjp161948 int i;
77*2139Sjp161948 int ret = 0;
78*2139Sjp161948 X509_POLICY_CACHE *cache = x->policy_cache;
79*2139Sjp161948 X509_POLICY_DATA *data = NULL;
80*2139Sjp161948 POLICYINFO *policy;
81*2139Sjp161948 if (sk_POLICYINFO_num(policies) == 0)
82*2139Sjp161948 goto bad_policy;
83*2139Sjp161948 cache->data = sk_X509_POLICY_DATA_new(policy_data_cmp);
84*2139Sjp161948 if (!cache->data)
85*2139Sjp161948 goto bad_policy;
86*2139Sjp161948 for (i = 0; i < sk_POLICYINFO_num(policies); i++)
87*2139Sjp161948 {
88*2139Sjp161948 policy = sk_POLICYINFO_value(policies, i);
89*2139Sjp161948 data = policy_data_new(policy, NULL, crit);
90*2139Sjp161948 if (!data)
91*2139Sjp161948 goto bad_policy;
92*2139Sjp161948 /* Duplicate policy OIDs are illegal: reject if matches
93*2139Sjp161948 * found.
94*2139Sjp161948 */
95*2139Sjp161948 if (OBJ_obj2nid(data->valid_policy) == NID_any_policy)
96*2139Sjp161948 {
97*2139Sjp161948 if (cache->anyPolicy)
98*2139Sjp161948 {
99*2139Sjp161948 ret = -1;
100*2139Sjp161948 goto bad_policy;
101*2139Sjp161948 }
102*2139Sjp161948 cache->anyPolicy = data;
103*2139Sjp161948 }
104*2139Sjp161948 else if (sk_X509_POLICY_DATA_find(cache->data, data) != -1)
105*2139Sjp161948 {
106*2139Sjp161948 ret = -1;
107*2139Sjp161948 goto bad_policy;
108*2139Sjp161948 }
109*2139Sjp161948 else if (!sk_X509_POLICY_DATA_push(cache->data, data))
110*2139Sjp161948 goto bad_policy;
111*2139Sjp161948 data = NULL;
112*2139Sjp161948 }
113*2139Sjp161948 ret = 1;
114*2139Sjp161948 bad_policy:
115*2139Sjp161948 if (ret == -1)
116*2139Sjp161948 x->ex_flags |= EXFLAG_INVALID_POLICY;
117*2139Sjp161948 if (data)
118*2139Sjp161948 policy_data_free(data);
119*2139Sjp161948 sk_POLICYINFO_pop_free(policies, POLICYINFO_free);
120*2139Sjp161948 if (ret <= 0)
121*2139Sjp161948 {
122*2139Sjp161948 sk_X509_POLICY_DATA_pop_free(cache->data, policy_data_free);
123*2139Sjp161948 cache->data = NULL;
124*2139Sjp161948 }
125*2139Sjp161948 return ret;
126*2139Sjp161948 }
127*2139Sjp161948
128*2139Sjp161948
policy_cache_new(X509 * x)129*2139Sjp161948 static int policy_cache_new(X509 *x)
130*2139Sjp161948 {
131*2139Sjp161948 X509_POLICY_CACHE *cache;
132*2139Sjp161948 ASN1_INTEGER *ext_any = NULL;
133*2139Sjp161948 POLICY_CONSTRAINTS *ext_pcons = NULL;
134*2139Sjp161948 CERTIFICATEPOLICIES *ext_cpols = NULL;
135*2139Sjp161948 POLICY_MAPPINGS *ext_pmaps = NULL;
136*2139Sjp161948 int i;
137*2139Sjp161948 cache = OPENSSL_malloc(sizeof(X509_POLICY_CACHE));
138*2139Sjp161948 if (!cache)
139*2139Sjp161948 return 0;
140*2139Sjp161948 cache->anyPolicy = NULL;
141*2139Sjp161948 cache->data = NULL;
142*2139Sjp161948 cache->maps = NULL;
143*2139Sjp161948 cache->any_skip = -1;
144*2139Sjp161948 cache->explicit_skip = -1;
145*2139Sjp161948 cache->map_skip = -1;
146*2139Sjp161948
147*2139Sjp161948 x->policy_cache = cache;
148*2139Sjp161948
149*2139Sjp161948 /* Handle requireExplicitPolicy *first*. Need to process this
150*2139Sjp161948 * even if we don't have any policies.
151*2139Sjp161948 */
152*2139Sjp161948 ext_pcons = X509_get_ext_d2i(x, NID_policy_constraints, &i, NULL);
153*2139Sjp161948
154*2139Sjp161948 if (!ext_pcons)
155*2139Sjp161948 {
156*2139Sjp161948 if (i != -1)
157*2139Sjp161948 goto bad_cache;
158*2139Sjp161948 }
159*2139Sjp161948 else
160*2139Sjp161948 {
161*2139Sjp161948 if (!ext_pcons->requireExplicitPolicy
162*2139Sjp161948 && !ext_pcons->inhibitPolicyMapping)
163*2139Sjp161948 goto bad_cache;
164*2139Sjp161948 if (!policy_cache_set_int(&cache->explicit_skip,
165*2139Sjp161948 ext_pcons->requireExplicitPolicy))
166*2139Sjp161948 goto bad_cache;
167*2139Sjp161948 if (!policy_cache_set_int(&cache->map_skip,
168*2139Sjp161948 ext_pcons->inhibitPolicyMapping))
169*2139Sjp161948 goto bad_cache;
170*2139Sjp161948 }
171*2139Sjp161948
172*2139Sjp161948 /* Process CertificatePolicies */
173*2139Sjp161948
174*2139Sjp161948 ext_cpols = X509_get_ext_d2i(x, NID_certificate_policies, &i, NULL);
175*2139Sjp161948 /* If no CertificatePolicies extension or problem decoding then
176*2139Sjp161948 * there is no point continuing because the valid policies will be
177*2139Sjp161948 * NULL.
178*2139Sjp161948 */
179*2139Sjp161948 if (!ext_cpols)
180*2139Sjp161948 {
181*2139Sjp161948 /* If not absent some problem with extension */
182*2139Sjp161948 if (i != -1)
183*2139Sjp161948 goto bad_cache;
184*2139Sjp161948 return 1;
185*2139Sjp161948 }
186*2139Sjp161948
187*2139Sjp161948 i = policy_cache_create(x, ext_cpols, i);
188*2139Sjp161948
189*2139Sjp161948 /* NB: ext_cpols freed by policy_cache_set_policies */
190*2139Sjp161948
191*2139Sjp161948 if (i <= 0)
192*2139Sjp161948 return i;
193*2139Sjp161948
194*2139Sjp161948 ext_pmaps = X509_get_ext_d2i(x, NID_policy_mappings, &i, NULL);
195*2139Sjp161948
196*2139Sjp161948 if (!ext_pmaps)
197*2139Sjp161948 {
198*2139Sjp161948 /* If not absent some problem with extension */
199*2139Sjp161948 if (i != -1)
200*2139Sjp161948 goto bad_cache;
201*2139Sjp161948 }
202*2139Sjp161948 else
203*2139Sjp161948 {
204*2139Sjp161948 i = policy_cache_set_mapping(x, ext_pmaps);
205*2139Sjp161948 if (i <= 0)
206*2139Sjp161948 goto bad_cache;
207*2139Sjp161948 }
208*2139Sjp161948
209*2139Sjp161948 ext_any = X509_get_ext_d2i(x, NID_inhibit_any_policy, &i, NULL);
210*2139Sjp161948
211*2139Sjp161948 if (!ext_any)
212*2139Sjp161948 {
213*2139Sjp161948 if (i != -1)
214*2139Sjp161948 goto bad_cache;
215*2139Sjp161948 }
216*2139Sjp161948 else if (!policy_cache_set_int(&cache->any_skip, ext_any))
217*2139Sjp161948 goto bad_cache;
218*2139Sjp161948
219*2139Sjp161948 if (0)
220*2139Sjp161948 {
221*2139Sjp161948 bad_cache:
222*2139Sjp161948 x->ex_flags |= EXFLAG_INVALID_POLICY;
223*2139Sjp161948 }
224*2139Sjp161948
225*2139Sjp161948 if(ext_pcons)
226*2139Sjp161948 POLICY_CONSTRAINTS_free(ext_pcons);
227*2139Sjp161948
228*2139Sjp161948 if (ext_any)
229*2139Sjp161948 ASN1_INTEGER_free(ext_any);
230*2139Sjp161948
231*2139Sjp161948 return 1;
232*2139Sjp161948
233*2139Sjp161948
234*2139Sjp161948 }
235*2139Sjp161948
policy_cache_free(X509_POLICY_CACHE * cache)236*2139Sjp161948 void policy_cache_free(X509_POLICY_CACHE *cache)
237*2139Sjp161948 {
238*2139Sjp161948 if (!cache)
239*2139Sjp161948 return;
240*2139Sjp161948 if (cache->anyPolicy)
241*2139Sjp161948 policy_data_free(cache->anyPolicy);
242*2139Sjp161948 if (cache->data)
243*2139Sjp161948 sk_X509_POLICY_DATA_pop_free(cache->data, policy_data_free);
244*2139Sjp161948 OPENSSL_free(cache);
245*2139Sjp161948 }
246*2139Sjp161948
policy_cache_set(X509 * x)247*2139Sjp161948 const X509_POLICY_CACHE *policy_cache_set(X509 *x)
248*2139Sjp161948 {
249*2139Sjp161948
250*2139Sjp161948 if (x->policy_cache == NULL)
251*2139Sjp161948 {
252*2139Sjp161948 CRYPTO_w_lock(CRYPTO_LOCK_X509);
253*2139Sjp161948 policy_cache_new(x);
254*2139Sjp161948 CRYPTO_w_unlock(CRYPTO_LOCK_X509);
255*2139Sjp161948 }
256*2139Sjp161948
257*2139Sjp161948 return x->policy_cache;
258*2139Sjp161948
259*2139Sjp161948 }
260*2139Sjp161948
policy_cache_find_data(const X509_POLICY_CACHE * cache,const ASN1_OBJECT * id)261*2139Sjp161948 X509_POLICY_DATA *policy_cache_find_data(const X509_POLICY_CACHE *cache,
262*2139Sjp161948 const ASN1_OBJECT *id)
263*2139Sjp161948 {
264*2139Sjp161948 int idx;
265*2139Sjp161948 X509_POLICY_DATA tmp;
266*2139Sjp161948 tmp.valid_policy = (ASN1_OBJECT *)id;
267*2139Sjp161948 idx = sk_X509_POLICY_DATA_find(cache->data, &tmp);
268*2139Sjp161948 if (idx == -1)
269*2139Sjp161948 return NULL;
270*2139Sjp161948 return sk_X509_POLICY_DATA_value(cache->data, idx);
271*2139Sjp161948 }
272*2139Sjp161948
policy_data_cmp(const X509_POLICY_DATA * const * a,const X509_POLICY_DATA * const * b)273*2139Sjp161948 static int policy_data_cmp(const X509_POLICY_DATA * const *a,
274*2139Sjp161948 const X509_POLICY_DATA * const *b)
275*2139Sjp161948 {
276*2139Sjp161948 return OBJ_cmp((*a)->valid_policy, (*b)->valid_policy);
277*2139Sjp161948 }
278*2139Sjp161948
policy_cache_set_int(long * out,ASN1_INTEGER * value)279*2139Sjp161948 static int policy_cache_set_int(long *out, ASN1_INTEGER *value)
280*2139Sjp161948 {
281*2139Sjp161948 if (value == NULL)
282*2139Sjp161948 return 1;
283*2139Sjp161948 if (value->type == V_ASN1_NEG_INTEGER)
284*2139Sjp161948 return 0;
285*2139Sjp161948 *out = ASN1_INTEGER_get(value);
286*2139Sjp161948 return 1;
287*2139Sjp161948 }
288