pcy_node.c 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. /* pcy_node.c */
  2. /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
  3. * project 2004.
  4. */
  5. /* ====================================================================
  6. * Copyright (c) 2004 The OpenSSL Project. All rights reserved.
  7. *
  8. * Redistribution and use in source and binary forms, with or without
  9. * modification, are permitted provided that the following conditions
  10. * are met:
  11. *
  12. * 1. Redistributions of source code must retain the above copyright
  13. * notice, this list of conditions and the following disclaimer.
  14. *
  15. * 2. Redistributions in binary form must reproduce the above copyright
  16. * notice, this list of conditions and the following disclaimer in
  17. * the documentation and/or other materials provided with the
  18. * distribution.
  19. *
  20. * 3. All advertising materials mentioning features or use of this
  21. * software must display the following acknowledgment:
  22. * "This product includes software developed by the OpenSSL Project
  23. * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
  24. *
  25. * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
  26. * endorse or promote products derived from this software without
  27. * prior written permission. For written permission, please contact
  28. * licensing@OpenSSL.org.
  29. *
  30. * 5. Products derived from this software may not be called "OpenSSL"
  31. * nor may "OpenSSL" appear in their names without prior written
  32. * permission of the OpenSSL Project.
  33. *
  34. * 6. Redistributions of any form whatsoever must retain the following
  35. * acknowledgment:
  36. * "This product includes software developed by the OpenSSL Project
  37. * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
  38. *
  39. * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
  40. * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  41. * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
  42. * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
  43. * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
  44. * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
  45. * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
  46. * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  47. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  48. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  49. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  50. * OF THE POSSIBILITY OF SUCH DAMAGE.
  51. * ====================================================================
  52. *
  53. * This product includes cryptographic software written by Eric Young
  54. * (eay@cryptsoft.com). This product includes software written by Tim
  55. * Hudson (tjh@cryptsoft.com).
  56. *
  57. */
  58. #include <openssl/asn1.h>
  59. #include <openssl/x509.h>
  60. #include <openssl/x509v3.h>
  61. #include "pcy_int.h"
  62. static int node_cmp(const X509_POLICY_NODE * const *a,
  63. const X509_POLICY_NODE * const *b)
  64. {
  65. return OBJ_cmp((*a)->data->valid_policy, (*b)->data->valid_policy);
  66. }
  67. STACK_OF(X509_POLICY_NODE) *policy_node_cmp_new(void)
  68. {
  69. return sk_X509_POLICY_NODE_new(node_cmp);
  70. }
  71. X509_POLICY_NODE *tree_find_sk(STACK_OF(X509_POLICY_NODE) *nodes,
  72. const ASN1_OBJECT *id)
  73. {
  74. X509_POLICY_DATA n;
  75. X509_POLICY_NODE l;
  76. int idx;
  77. n.valid_policy = (ASN1_OBJECT *)id;
  78. l.data = &n;
  79. idx = sk_X509_POLICY_NODE_find(nodes, &l);
  80. if (idx == -1)
  81. return NULL;
  82. return sk_X509_POLICY_NODE_value(nodes, idx);
  83. }
  84. X509_POLICY_NODE *level_find_node(const X509_POLICY_LEVEL *level,
  85. const X509_POLICY_NODE *parent,
  86. const ASN1_OBJECT *id)
  87. {
  88. X509_POLICY_NODE *node;
  89. int i;
  90. for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++)
  91. {
  92. node = sk_X509_POLICY_NODE_value(level->nodes, i);
  93. if (node->parent == parent)
  94. {
  95. if (!OBJ_cmp(node->data->valid_policy, id))
  96. return node;
  97. }
  98. }
  99. return NULL;
  100. }
  101. X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level,
  102. const X509_POLICY_DATA *data,
  103. X509_POLICY_NODE *parent,
  104. X509_POLICY_TREE *tree)
  105. {
  106. X509_POLICY_NODE *node;
  107. node = OPENSSL_malloc(sizeof(X509_POLICY_NODE));
  108. if (!node)
  109. return NULL;
  110. node->data = data;
  111. node->parent = parent;
  112. node->nchild = 0;
  113. if (level)
  114. {
  115. if (OBJ_obj2nid(data->valid_policy) == NID_any_policy)
  116. {
  117. if (level->anyPolicy)
  118. goto node_error;
  119. level->anyPolicy = node;
  120. }
  121. else
  122. {
  123. if (!level->nodes)
  124. level->nodes = policy_node_cmp_new();
  125. if (!level->nodes)
  126. goto node_error;
  127. if (!sk_X509_POLICY_NODE_push(level->nodes, node))
  128. goto node_error;
  129. }
  130. }
  131. if (tree)
  132. {
  133. if (!tree->extra_data)
  134. tree->extra_data = sk_X509_POLICY_DATA_new_null();
  135. if (!tree->extra_data)
  136. goto node_error;
  137. if (!sk_X509_POLICY_DATA_push(tree->extra_data, data))
  138. goto node_error;
  139. }
  140. if (parent)
  141. parent->nchild++;
  142. return node;
  143. node_error:
  144. policy_node_free(node);
  145. return 0;
  146. }
  147. void policy_node_free(X509_POLICY_NODE *node)
  148. {
  149. OPENSSL_free(node);
  150. }
  151. /* See if a policy node matches a policy OID. If mapping enabled look through
  152. * expected policy set otherwise just valid policy.
  153. */
  154. int policy_node_match(const X509_POLICY_LEVEL *lvl,
  155. const X509_POLICY_NODE *node, const ASN1_OBJECT *oid)
  156. {
  157. int i;
  158. ASN1_OBJECT *policy_oid;
  159. const X509_POLICY_DATA *x = node->data;
  160. if ( (lvl->flags & X509_V_FLAG_INHIBIT_MAP)
  161. || !(x->flags & POLICY_DATA_FLAG_MAP_MASK))
  162. {
  163. if (!OBJ_cmp(x->valid_policy, oid))
  164. return 1;
  165. return 0;
  166. }
  167. for (i = 0; i < sk_ASN1_OBJECT_num(x->expected_policy_set); i++)
  168. {
  169. policy_oid = sk_ASN1_OBJECT_value(x->expected_policy_set, i);
  170. if (!OBJ_cmp(policy_oid, oid))
  171. return 1;
  172. }
  173. return 0;
  174. }