pcy_map.c revision 296465
1/* pcy_map.c */
2/*
3 * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
4 * 2004.
5 */
6/* ====================================================================
7 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
8 *
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
12 *
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 *
16 * 2. Redistributions in binary form must reproduce the above copyright
17 *    notice, this list of conditions and the following disclaimer in
18 *    the documentation and/or other materials provided with the
19 *    distribution.
20 *
21 * 3. All advertising materials mentioning features or use of this
22 *    software must display the following acknowledgment:
23 *    "This product includes software developed by the OpenSSL Project
24 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
25 *
26 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
27 *    endorse or promote products derived from this software without
28 *    prior written permission. For written permission, please contact
29 *    licensing@OpenSSL.org.
30 *
31 * 5. Products derived from this software may not be called "OpenSSL"
32 *    nor may "OpenSSL" appear in their names without prior written
33 *    permission of the OpenSSL Project.
34 *
35 * 6. Redistributions of any form whatsoever must retain the following
36 *    acknowledgment:
37 *    "This product includes software developed by the OpenSSL Project
38 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
39 *
40 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
41 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
42 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
43 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
44 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
45 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
46 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
47 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
49 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
50 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
51 * OF THE POSSIBILITY OF SUCH DAMAGE.
52 * ====================================================================
53 *
54 * This product includes cryptographic software written by Eric Young
55 * (eay@cryptsoft.com).  This product includes software written by Tim
56 * Hudson (tjh@cryptsoft.com).
57 *
58 */
59
60#include "cryptlib.h"
61#include <openssl/x509.h>
62#include <openssl/x509v3.h>
63
64#include "pcy_int.h"
65
66static int ref_cmp(const X509_POLICY_REF * const *a,
67                   const X509_POLICY_REF * const *b)
68{
69    return OBJ_cmp((*a)->subjectDomainPolicy, (*b)->subjectDomainPolicy);
70}
71
72static void policy_map_free(X509_POLICY_REF * map)
73{
74    OPENSSL_free(map);
75}
76
77static X509_POLICY_REF *policy_map_find(X509_POLICY_CACHE *cache,
78                                        ASN1_OBJECT *id)
79{
80    X509_POLICY_REF tmp;
81    int idx;
82    tmp.subjectDomainPolicy = id;
83
84    idx = sk_X509_POLICY_REF_find(cache->maps, &tmp);
85    if (idx == -1)
86        return NULL;
87    return sk_X509_POLICY_REF_value(cache->maps, idx);
88}
89
90/*
91 * Set policy mapping entries in cache. Note: this modifies the passed
92 * POLICY_MAPPINGS structure
93 */
94
95int policy_cache_set_mapping(X509 *x, POLICY_MAPPINGS *maps)
96{
97    POLICY_MAPPING *map;
98    X509_POLICY_REF *ref = NULL;
99    ASN1_OBJECT *subjectDomainPolicyRef;
100    X509_POLICY_DATA *data;
101    X509_POLICY_CACHE *cache = x->policy_cache;
102    int i;
103    int ret = 0;
104    if (sk_POLICY_MAPPING_num(maps) == 0) {
105        ret = -1;
106        goto bad_mapping;
107    }
108    cache->maps = sk_X509_POLICY_REF_new(ref_cmp);
109    for (i = 0; i < sk_POLICY_MAPPING_num(maps); i++) {
110        map = sk_POLICY_MAPPING_value(maps, i);
111        /* Reject if map to or from anyPolicy */
112        if ((OBJ_obj2nid(map->subjectDomainPolicy) == NID_any_policy)
113            || (OBJ_obj2nid(map->issuerDomainPolicy) == NID_any_policy)) {
114            ret = -1;
115            goto bad_mapping;
116        }
117
118        /* If we've already mapped from this OID bad mapping */
119        if (policy_map_find(cache, map->subjectDomainPolicy) != NULL) {
120            ret = -1;
121            goto bad_mapping;
122        }
123
124        /* Attempt to find matching policy data */
125        data = policy_cache_find_data(cache, map->issuerDomainPolicy);
126        /* If we don't have anyPolicy can't map */
127        if (!data && !cache->anyPolicy)
128            continue;
129
130        /* Create a NODE from anyPolicy */
131        if (!data) {
132            data = policy_data_new(NULL, map->issuerDomainPolicy,
133                                   cache->anyPolicy->flags
134                                   & POLICY_DATA_FLAG_CRITICAL);
135            if (!data)
136                goto bad_mapping;
137            data->qualifier_set = cache->anyPolicy->qualifier_set;
138            map->issuerDomainPolicy = NULL;
139            data->flags |= POLICY_DATA_FLAG_MAPPED_ANY;
140            data->flags |= POLICY_DATA_FLAG_SHARED_QUALIFIERS;
141            if (!sk_X509_POLICY_DATA_push(cache->data, data)) {
142                policy_data_free(data);
143                goto bad_mapping;
144            }
145        } else
146            data->flags |= POLICY_DATA_FLAG_MAPPED;
147
148        if (!sk_ASN1_OBJECT_push(data->expected_policy_set,
149                                 map->subjectDomainPolicy))
150            goto bad_mapping;
151        /*
152         * map->subjectDomainPolicy will be freed when cache->data is freed.
153         * Set it to NULL to avoid double-free.
154         */
155        subjectDomainPolicyRef = map->subjectDomainPolicy;
156        map->subjectDomainPolicy = NULL;
157
158        ref = OPENSSL_malloc(sizeof(X509_POLICY_REF));
159        if (!ref)
160            goto bad_mapping;
161
162        ref->subjectDomainPolicy = subjectDomainPolicyRef;
163        ref->data = data;
164
165        if (!sk_X509_POLICY_REF_push(cache->maps, ref))
166            goto bad_mapping;
167
168        ref = NULL;
169
170    }
171
172    ret = 1;
173 bad_mapping:
174    if (ret == -1)
175        x->ex_flags |= EXFLAG_INVALID_POLICY;
176    if (ref)
177        policy_map_free(ref);
178    if (ret <= 0) {
179        sk_X509_POLICY_REF_pop_free(cache->maps, policy_map_free);
180        cache->maps = NULL;
181    }
182    sk_POLICY_MAPPING_pop_free(maps, POLICY_MAPPING_free);
183    return ret;
184
185}
186