pcy_int.h revision 296465
1/* pcy_int.h */ 2/* 3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project 4 * 2004. 5 */ 6/* ==================================================================== 7 * Copyright (c) 2004 The OpenSSL Project. All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 16 * 2. Redistributions in binary form must reproduce the above copyright 17 * notice, this list of conditions and the following disclaimer in 18 * the documentation and/or other materials provided with the 19 * distribution. 20 * 21 * 3. All advertising materials mentioning features or use of this 22 * software must display the following acknowledgment: 23 * "This product includes software developed by the OpenSSL Project 24 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 25 * 26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 27 * endorse or promote products derived from this software without 28 * prior written permission. For written permission, please contact 29 * licensing@OpenSSL.org. 30 * 31 * 5. Products derived from this software may not be called "OpenSSL" 32 * nor may "OpenSSL" appear in their names without prior written 33 * permission of the OpenSSL Project. 34 * 35 * 6. Redistributions of any form whatsoever must retain the following 36 * acknowledgment: 37 * "This product includes software developed by the OpenSSL Project 38 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 39 * 40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 43 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 51 * OF THE POSSIBILITY OF SUCH DAMAGE. 52 * ==================================================================== 53 * 54 * This product includes cryptographic software written by Eric Young 55 * (eay@cryptsoft.com). This product includes software written by Tim 56 * Hudson (tjh@cryptsoft.com). 57 * 58 */ 59 60DECLARE_STACK_OF(X509_POLICY_DATA) 61DECLARE_STACK_OF(X509_POLICY_REF) 62DECLARE_STACK_OF(X509_POLICY_NODE) 63 64typedef struct X509_POLICY_DATA_st X509_POLICY_DATA; 65typedef struct X509_POLICY_REF_st X509_POLICY_REF; 66 67/* Internal structures */ 68 69/* 70 * This structure and the field names correspond to the Policy 'node' of 71 * RFC3280. NB this structure contains no pointers to parent or child data: 72 * X509_POLICY_NODE contains that. This means that the main policy data can 73 * be kept static and cached with the certificate. 74 */ 75 76struct X509_POLICY_DATA_st { 77 unsigned int flags; 78 /* Policy OID and qualifiers for this data */ 79 ASN1_OBJECT *valid_policy; 80 STACK_OF(POLICYQUALINFO) *qualifier_set; 81 STACK_OF(ASN1_OBJECT) *expected_policy_set; 82}; 83 84/* X509_POLICY_DATA flags values */ 85 86/* 87 * This flag indicates the structure has been mapped using a policy mapping 88 * extension. If policy mapping is not active its references get deleted. 89 */ 90 91#define POLICY_DATA_FLAG_MAPPED 0x1 92 93/* 94 * This flag indicates the data doesn't correspond to a policy in Certificate 95 * Policies: it has been mapped to any policy. 96 */ 97 98#define POLICY_DATA_FLAG_MAPPED_ANY 0x2 99 100/* AND with flags to see if any mapping has occurred */ 101 102#define POLICY_DATA_FLAG_MAP_MASK 0x3 103 104/* qualifiers are shared and shouldn't be freed */ 105 106#define POLICY_DATA_FLAG_SHARED_QUALIFIERS 0x4 107 108/* Parent node is an extra node and should be freed */ 109 110#define POLICY_DATA_FLAG_EXTRA_NODE 0x8 111 112/* Corresponding CertificatePolicies is critical */ 113 114#define POLICY_DATA_FLAG_CRITICAL 0x10 115 116/* 117 * This structure is an entry from a table of mapped policies which cross 118 * reference the policy it refers to. 119 */ 120 121struct X509_POLICY_REF_st { 122 ASN1_OBJECT *subjectDomainPolicy; 123 const X509_POLICY_DATA *data; 124}; 125 126/* This structure is cached with a certificate */ 127 128struct X509_POLICY_CACHE_st { 129 /* anyPolicy data or NULL if no anyPolicy */ 130 X509_POLICY_DATA *anyPolicy; 131 /* other policy data */ 132 STACK_OF(X509_POLICY_DATA) *data; 133 /* If policyMappings extension present a table of mapped policies */ 134 STACK_OF(X509_POLICY_REF) *maps; 135 /* If InhibitAnyPolicy present this is its value or -1 if absent. */ 136 long any_skip; 137 /* 138 * If policyConstraints and requireExplicitPolicy present this is its 139 * value or -1 if absent. 140 */ 141 long explicit_skip; 142 /* 143 * If policyConstraints and policyMapping present this is its value or -1 144 * if absent. 145 */ 146 long map_skip; 147}; 148 149/* 150 * #define POLICY_CACHE_FLAG_CRITICAL POLICY_DATA_FLAG_CRITICAL 151 */ 152 153/* This structure represents the relationship between nodes */ 154 155struct X509_POLICY_NODE_st { 156 /* node data this refers to */ 157 const X509_POLICY_DATA *data; 158 /* Parent node */ 159 X509_POLICY_NODE *parent; 160 /* Number of child nodes */ 161 int nchild; 162}; 163 164struct X509_POLICY_LEVEL_st { 165 /* Cert for this level */ 166 X509 *cert; 167 /* nodes at this level */ 168 STACK_OF(X509_POLICY_NODE) *nodes; 169 /* anyPolicy node */ 170 X509_POLICY_NODE *anyPolicy; 171 /* Extra data */ 172 /* 173 * STACK_OF(X509_POLICY_DATA) *extra_data; 174 */ 175 unsigned int flags; 176}; 177 178struct X509_POLICY_TREE_st { 179 /* This is the tree 'level' data */ 180 X509_POLICY_LEVEL *levels; 181 int nlevel; 182 /* 183 * Extra policy data when additional nodes (not from the certificate) are 184 * required. 185 */ 186 STACK_OF(X509_POLICY_DATA) *extra_data; 187 /* This is the authority constained policy set */ 188 STACK_OF(X509_POLICY_NODE) *auth_policies; 189 STACK_OF(X509_POLICY_NODE) *user_policies; 190 unsigned int flags; 191}; 192 193/* Set if anyPolicy present in user policies */ 194#define POLICY_FLAG_ANY_POLICY 0x2 195 196/* Useful macros */ 197 198#define node_data_critical(data) (data->flags & POLICY_DATA_FLAG_CRITICAL) 199#define node_critical(node) node_data_critical(node->data) 200 201/* Internal functions */ 202 203X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, ASN1_OBJECT *id, 204 int crit); 205void policy_data_free(X509_POLICY_DATA *data); 206 207X509_POLICY_DATA *policy_cache_find_data(const X509_POLICY_CACHE *cache, 208 const ASN1_OBJECT *id); 209int policy_cache_set_mapping(X509 *x, POLICY_MAPPINGS *maps); 210 211STACK_OF(X509_POLICY_NODE) *policy_node_cmp_new(void); 212 213void policy_cache_init(void); 214 215void policy_cache_free(X509_POLICY_CACHE *cache); 216 217X509_POLICY_NODE *level_find_node(const X509_POLICY_LEVEL *level, 218 const ASN1_OBJECT *id); 219 220X509_POLICY_NODE *tree_find_sk(STACK_OF(X509_POLICY_NODE) *sk, 221 const ASN1_OBJECT *id); 222 223X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level, 224 X509_POLICY_DATA *data, 225 X509_POLICY_NODE *parent, 226 X509_POLICY_TREE *tree); 227void policy_node_free(X509_POLICY_NODE *node); 228 229const X509_POLICY_CACHE *policy_cache_set(X509 *x); 230