1 /* $OpenBSD: x509_pmaps.c,v 1.3 2023/02/16 08:38:17 tb Exp $ */ 2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 3 * project. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 2003 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 60 #include <stdio.h> 61 62 #include <openssl/asn1t.h> 63 #include <openssl/conf.h> 64 #include <openssl/err.h> 65 #include <openssl/x509v3.h> 66 67 static void *v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, 68 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); 69 static STACK_OF(CONF_VALUE) *i2v_POLICY_MAPPINGS( 70 const X509V3_EXT_METHOD *method, void *pmps, STACK_OF(CONF_VALUE) *extlist); 71 72 const X509V3_EXT_METHOD v3_policy_mappings = { 73 .ext_nid = NID_policy_mappings, 74 .ext_flags = 0, 75 .it = &POLICY_MAPPINGS_it, 76 .ext_new = NULL, 77 .ext_free = NULL, 78 .d2i = NULL, 79 .i2d = NULL, 80 .i2s = NULL, 81 .s2i = NULL, 82 .i2v = i2v_POLICY_MAPPINGS, 83 .v2i = v2i_POLICY_MAPPINGS, 84 .i2r = NULL, 85 .r2i = NULL, 86 .usr_data = NULL, 87 }; 88 89 static const ASN1_TEMPLATE POLICY_MAPPING_seq_tt[] = { 90 { 91 .flags = 0, 92 .tag = 0, 93 .offset = offsetof(POLICY_MAPPING, issuerDomainPolicy), 94 .field_name = "issuerDomainPolicy", 95 .item = &ASN1_OBJECT_it, 96 }, 97 { 98 .flags = 0, 99 .tag = 0, 100 .offset = offsetof(POLICY_MAPPING, subjectDomainPolicy), 101 .field_name = "subjectDomainPolicy", 102 .item = &ASN1_OBJECT_it, 103 }, 104 }; 105 106 const ASN1_ITEM POLICY_MAPPING_it = { 107 .itype = ASN1_ITYPE_SEQUENCE, 108 .utype = V_ASN1_SEQUENCE, 109 .templates = POLICY_MAPPING_seq_tt, 110 .tcount = sizeof(POLICY_MAPPING_seq_tt) / sizeof(ASN1_TEMPLATE), 111 .funcs = NULL, 112 .size = sizeof(POLICY_MAPPING), 113 .sname = "POLICY_MAPPING", 114 }; 115 116 static const ASN1_TEMPLATE POLICY_MAPPINGS_item_tt = { 117 .flags = ASN1_TFLG_SEQUENCE_OF, 118 .tag = 0, 119 .offset = 0, 120 .field_name = "POLICY_MAPPINGS", 121 .item = &POLICY_MAPPING_it, 122 }; 123 124 const ASN1_ITEM POLICY_MAPPINGS_it = { 125 .itype = ASN1_ITYPE_PRIMITIVE, 126 .utype = -1, 127 .templates = &POLICY_MAPPINGS_item_tt, 128 .tcount = 0, 129 .funcs = NULL, 130 .size = 0, 131 .sname = "POLICY_MAPPINGS", 132 }; 133 134 135 POLICY_MAPPING * 136 POLICY_MAPPING_new(void) 137 { 138 return (POLICY_MAPPING*)ASN1_item_new(&POLICY_MAPPING_it); 139 } 140 LCRYPTO_ALIAS(POLICY_MAPPING_new); 141 142 void 143 POLICY_MAPPING_free(POLICY_MAPPING *a) 144 { 145 ASN1_item_free((ASN1_VALUE *)a, &POLICY_MAPPING_it); 146 } 147 LCRYPTO_ALIAS(POLICY_MAPPING_free); 148 149 static STACK_OF(CONF_VALUE) * 150 i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, void *a, 151 STACK_OF(CONF_VALUE) *extlist) 152 { 153 STACK_OF(CONF_VALUE) *free_extlist = NULL; 154 POLICY_MAPPINGS *pmaps = a; 155 POLICY_MAPPING *pmap; 156 char issuer[80], subject[80]; 157 int i; 158 159 if (extlist == NULL) { 160 if ((free_extlist = extlist = sk_CONF_VALUE_new_null()) == NULL) 161 return NULL; 162 } 163 164 for (i = 0; i < sk_POLICY_MAPPING_num(pmaps); i++) { 165 if ((pmap = sk_POLICY_MAPPING_value(pmaps, i)) == NULL) 166 goto err; 167 if (!i2t_ASN1_OBJECT(issuer, sizeof issuer, 168 pmap->issuerDomainPolicy)) 169 goto err; 170 if (!i2t_ASN1_OBJECT(subject, sizeof subject, 171 pmap->subjectDomainPolicy)) 172 goto err; 173 if (!X509V3_add_value(issuer, subject, &extlist)) 174 goto err; 175 } 176 177 return extlist; 178 179 err: 180 sk_CONF_VALUE_pop_free(free_extlist, X509V3_conf_free); 181 182 return NULL; 183 } 184 185 static void * 186 v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, 187 STACK_OF(CONF_VALUE) *nval) 188 { 189 POLICY_MAPPINGS *pmaps = NULL; 190 POLICY_MAPPING *pmap = NULL; 191 ASN1_OBJECT *obj1 = NULL, *obj2 = NULL; 192 CONF_VALUE *val; 193 int i, rc; 194 195 if (!(pmaps = sk_POLICY_MAPPING_new_null())) { 196 X509V3error(ERR_R_MALLOC_FAILURE); 197 return NULL; 198 } 199 200 for (i = 0; i < sk_CONF_VALUE_num(nval); i++) { 201 val = sk_CONF_VALUE_value(nval, i); 202 if (!val->value || !val->name) { 203 rc = X509V3_R_INVALID_OBJECT_IDENTIFIER; 204 goto err; 205 } 206 obj1 = OBJ_txt2obj(val->name, 0); 207 obj2 = OBJ_txt2obj(val->value, 0); 208 if (!obj1 || !obj2) { 209 rc = X509V3_R_INVALID_OBJECT_IDENTIFIER; 210 goto err; 211 } 212 pmap = POLICY_MAPPING_new(); 213 if (!pmap) { 214 rc = ERR_R_MALLOC_FAILURE; 215 goto err; 216 } 217 pmap->issuerDomainPolicy = obj1; 218 pmap->subjectDomainPolicy = obj2; 219 obj1 = obj2 = NULL; 220 if (sk_POLICY_MAPPING_push(pmaps, pmap) == 0) { 221 rc = ERR_R_MALLOC_FAILURE; 222 goto err; 223 } 224 pmap = NULL; 225 } 226 return pmaps; 227 228 err: 229 sk_POLICY_MAPPING_pop_free(pmaps, POLICY_MAPPING_free); 230 X509V3error(rc); 231 if (rc == X509V3_R_INVALID_OBJECT_IDENTIFIER) 232 X509V3_conf_err(val); 233 ASN1_OBJECT_free(obj1); 234 ASN1_OBJECT_free(obj2); 235 POLICY_MAPPING_free(pmap); 236 return NULL; 237 } 238