import libcrypto (LibreSSL 2.5.2)
[unleashed.git] / lib / libcrypto / x509v3 / v3_pci.c
blobdd015452d0f330101d7a6a4ce6feaf0653c80069
1 /* $OpenBSD: v3_pci.c,v 1.12 2017/01/29 17:49:23 beck Exp $ */
2 /* Contributed to the OpenSSL Project 2004
3 * by Richard Levitte (richard@levitte.org)
4 */
5 /* Copyright (c) 2004 Kungliga Tekniska Högskolan
6 * (Royal Institute of Technology, Stockholm, Sweden).
7 * All rights reserved.
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
11 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
16 * 2. Redistributions in binary form must reproduce the above copyright
17 * notice, this list of conditions and the following disclaimer in the
18 * documentation and/or other materials provided with the distribution.
20 * 3. Neither the name of the Institute nor the names of its contributors
21 * may be used to endorse or promote products derived from this software
22 * without specific prior written permission.
24 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * SUCH DAMAGE.
37 #include <stdio.h>
38 #include <string.h>
40 #include <openssl/conf.h>
41 #include <openssl/err.h>
42 #include <openssl/x509v3.h>
44 static int i2r_pci(X509V3_EXT_METHOD *method, PROXY_CERT_INFO_EXTENSION *ext,
45 BIO *out, int indent);
46 static PROXY_CERT_INFO_EXTENSION *r2i_pci(X509V3_EXT_METHOD *method,
47 X509V3_CTX *ctx, char *str);
49 const X509V3_EXT_METHOD v3_pci = {
50 .ext_nid = NID_proxyCertInfo,
51 .ext_flags = 0,
52 .it = &PROXY_CERT_INFO_EXTENSION_it,
53 .ext_new = NULL,
54 .ext_free = NULL,
55 .d2i = NULL,
56 .i2d = NULL,
57 .i2s = NULL,
58 .s2i = NULL,
59 .i2v = NULL,
60 .v2i = NULL,
61 .i2r = (X509V3_EXT_I2R)i2r_pci,
62 .r2i = (X509V3_EXT_R2I)r2i_pci,
63 .usr_data = NULL,
66 static int
67 i2r_pci(X509V3_EXT_METHOD *method, PROXY_CERT_INFO_EXTENSION *pci, BIO *out,
68 int indent)
70 BIO_printf(out, "%*sPath Length Constraint: ", indent, "");
71 if (pci->pcPathLengthConstraint)
72 i2a_ASN1_INTEGER(out, pci->pcPathLengthConstraint);
73 else
74 BIO_printf(out, "infinite");
75 BIO_puts(out, "\n");
76 BIO_printf(out, "%*sPolicy Language: ", indent, "");
77 i2a_ASN1_OBJECT(out, pci->proxyPolicy->policyLanguage);
78 BIO_puts(out, "\n");
79 if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data)
80 BIO_printf(out, "%*sPolicy Text: %s\n", indent, "",
81 pci->proxyPolicy->policy->data);
82 return 1;
85 static int
86 process_pci_value(CONF_VALUE *val, ASN1_OBJECT **language,
87 ASN1_INTEGER **pathlen, ASN1_OCTET_STRING **policy)
89 int free_policy = 0;
91 if (strcmp(val->name, "language") == 0) {
92 if (*language) {
93 X509V3error(X509V3_R_POLICY_LANGUAGE_ALREADY_DEFINED);
94 X509V3_conf_err(val);
95 return 0;
97 if (!(*language = OBJ_txt2obj(val->value, 0))) {
98 X509V3error(X509V3_R_INVALID_OBJECT_IDENTIFIER);
99 X509V3_conf_err(val);
100 return 0;
103 else if (strcmp(val->name, "pathlen") == 0) {
104 if (*pathlen) {
105 X509V3error(X509V3_R_POLICY_PATH_LENGTH_ALREADY_DEFINED);
106 X509V3_conf_err(val);
107 return 0;
109 if (!X509V3_get_value_int(val, pathlen)) {
110 X509V3error(X509V3_R_POLICY_PATH_LENGTH);
111 X509V3_conf_err(val);
112 return 0;
115 else if (strcmp(val->name, "policy") == 0) {
116 unsigned char *tmp_data = NULL;
117 long val_len;
118 if (!*policy) {
119 *policy = ASN1_OCTET_STRING_new();
120 if (!*policy) {
121 X509V3error(ERR_R_MALLOC_FAILURE);
122 X509V3_conf_err(val);
123 return 0;
125 free_policy = 1;
127 if (strncmp(val->value, "hex:", 4) == 0) {
128 unsigned char *tmp_data2 =
129 string_to_hex(val->value + 4, &val_len);
131 if (!tmp_data2) {
132 X509V3error(X509V3_R_ILLEGAL_HEX_DIGIT);
133 X509V3_conf_err(val);
134 goto err;
137 tmp_data = realloc((*policy)->data,
138 (*policy)->length + val_len + 1);
139 if (tmp_data) {
140 (*policy)->data = tmp_data;
141 memcpy(&(*policy)->data[(*policy)->length],
142 tmp_data2, val_len);
143 (*policy)->length += val_len;
144 (*policy)->data[(*policy)->length] = '\0';
145 } else {
146 free(tmp_data2);
147 free((*policy)->data);
148 (*policy)->data = NULL;
149 (*policy)->length = 0;
150 X509V3error(ERR_R_MALLOC_FAILURE);
151 X509V3_conf_err(val);
152 goto err;
154 free(tmp_data2);
156 else if (strncmp(val->value, "file:", 5) == 0) {
157 unsigned char buf[2048];
158 int n;
159 BIO *b = BIO_new_file(val->value + 5, "r");
160 if (!b) {
161 X509V3error(ERR_R_BIO_LIB);
162 X509V3_conf_err(val);
163 goto err;
165 while ((n = BIO_read(b, buf, sizeof(buf))) > 0 ||
166 (n == 0 && BIO_should_retry(b))) {
167 if (!n)
168 continue;
170 tmp_data = realloc((*policy)->data,
171 (*policy)->length + n + 1);
173 if (!tmp_data)
174 break;
176 (*policy)->data = tmp_data;
177 memcpy(&(*policy)->data[(*policy)->length],
178 buf, n);
179 (*policy)->length += n;
180 (*policy)->data[(*policy)->length] = '\0';
182 BIO_free_all(b);
184 if (n < 0) {
185 X509V3error(ERR_R_BIO_LIB);
186 X509V3_conf_err(val);
187 goto err;
190 else if (strncmp(val->value, "text:", 5) == 0) {
191 val_len = strlen(val->value + 5);
192 tmp_data = realloc((*policy)->data,
193 (*policy)->length + val_len + 1);
194 if (tmp_data) {
195 (*policy)->data = tmp_data;
196 memcpy(&(*policy)->data[(*policy)->length],
197 val->value + 5, val_len);
198 (*policy)->length += val_len;
199 (*policy)->data[(*policy)->length] = '\0';
200 } else {
201 free((*policy)->data);
202 (*policy)->data = NULL;
203 (*policy)->length = 0;
204 X509V3error(ERR_R_MALLOC_FAILURE);
205 X509V3_conf_err(val);
206 goto err;
208 } else {
209 X509V3error(X509V3_R_INCORRECT_POLICY_SYNTAX_TAG);
210 X509V3_conf_err(val);
211 goto err;
213 if (!tmp_data) {
214 X509V3error(ERR_R_MALLOC_FAILURE);
215 X509V3_conf_err(val);
216 goto err;
219 return 1;
221 err:
222 if (free_policy) {
223 ASN1_OCTET_STRING_free(*policy);
224 *policy = NULL;
226 return 0;
229 static PROXY_CERT_INFO_EXTENSION *
230 r2i_pci(X509V3_EXT_METHOD *method, X509V3_CTX *ctx, char *value)
232 PROXY_CERT_INFO_EXTENSION *pci = NULL;
233 STACK_OF(CONF_VALUE) *vals;
234 ASN1_OBJECT *language = NULL;
235 ASN1_INTEGER *pathlen = NULL;
236 ASN1_OCTET_STRING *policy = NULL;
237 int i, j;
239 vals = X509V3_parse_list(value);
240 for (i = 0; i < sk_CONF_VALUE_num(vals); i++) {
241 CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i);
242 if (!cnf->name || (*cnf->name != '@' && !cnf->value)) {
243 X509V3error(X509V3_R_INVALID_PROXY_POLICY_SETTING);
244 X509V3_conf_err(cnf);
245 goto err;
247 if (*cnf->name == '@') {
248 STACK_OF(CONF_VALUE) *sect;
249 int success_p = 1;
251 sect = X509V3_get_section(ctx, cnf->name + 1);
252 if (!sect) {
253 X509V3error(X509V3_R_INVALID_SECTION);
254 X509V3_conf_err(cnf);
255 goto err;
257 for (j = 0; success_p &&
258 j < sk_CONF_VALUE_num(sect); j++) {
259 success_p = process_pci_value(
260 sk_CONF_VALUE_value(sect, j),
261 &language, &pathlen, &policy);
263 X509V3_section_free(ctx, sect);
264 if (!success_p)
265 goto err;
266 } else {
267 if (!process_pci_value(cnf,
268 &language, &pathlen, &policy)) {
269 X509V3_conf_err(cnf);
270 goto err;
275 /* Language is mandatory */
276 if (!language) {
277 X509V3error(X509V3_R_NO_PROXY_CERT_POLICY_LANGUAGE_DEFINED);
278 goto err;
280 i = OBJ_obj2nid(language);
281 if ((i == NID_Independent || i == NID_id_ppl_inheritAll) && policy) {
282 X509V3error(X509V3_R_POLICY_WHEN_PROXY_LANGUAGE_REQUIRES_NO_POLICY);
283 goto err;
286 pci = PROXY_CERT_INFO_EXTENSION_new();
287 if (!pci) {
288 X509V3error(ERR_R_MALLOC_FAILURE);
289 goto err;
292 pci->proxyPolicy->policyLanguage = language;
293 language = NULL;
294 pci->proxyPolicy->policy = policy;
295 policy = NULL;
296 pci->pcPathLengthConstraint = pathlen;
297 pathlen = NULL;
298 goto end;
300 err:
301 if (language) {
302 ASN1_OBJECT_free(language);
303 language = NULL;
305 if (pathlen) {
306 ASN1_INTEGER_free(pathlen);
307 pathlen = NULL;
309 if (policy) {
310 ASN1_OCTET_STRING_free(policy);
311 policy = NULL;
313 end:
314 sk_CONF_VALUE_pop_free(vals, X509V3_conf_free);
315 return pci;