/src/openssl30/crypto/x509/v3_pmaps.c
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | /* | 
| 2 |  |  * Copyright 2003-2021 The OpenSSL Project Authors. All Rights Reserved. | 
| 3 |  |  * | 
| 4 |  |  * Licensed under the Apache License 2.0 (the "License").  You may not use | 
| 5 |  |  * this file except in compliance with the License.  You can obtain a copy | 
| 6 |  |  * in the file LICENSE in the source distribution or at | 
| 7 |  |  * https://www.openssl.org/source/license.html | 
| 8 |  |  */ | 
| 9 |  |  | 
| 10 |  | #include <stdio.h> | 
| 11 |  | #include "internal/cryptlib.h" | 
| 12 |  | #include <openssl/asn1t.h> | 
| 13 |  | #include <openssl/conf.h> | 
| 14 |  | #include <openssl/x509v3.h> | 
| 15 |  | #include "ext_dat.h" | 
| 16 |  |  | 
| 17 |  | static void *v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, | 
| 18 |  |                                  X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval); | 
| 19 |  | static STACK_OF(CONF_VALUE) *i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD | 
| 20 |  |                                                  *method, void *pmps, STACK_OF(CONF_VALUE) | 
| 21 |  |                                                  *extlist); | 
| 22 |  |  | 
| 23 |  | const X509V3_EXT_METHOD ossl_v3_policy_mappings = { | 
| 24 |  |     NID_policy_mappings, 0, | 
| 25 |  |     ASN1_ITEM_ref(POLICY_MAPPINGS), | 
| 26 |  |     0, 0, 0, 0, | 
| 27 |  |     0, 0, | 
| 28 |  |     i2v_POLICY_MAPPINGS, | 
| 29 |  |     v2i_POLICY_MAPPINGS, | 
| 30 |  |     0, 0, | 
| 31 |  |     NULL | 
| 32 |  | }; | 
| 33 |  |  | 
| 34 |  | ASN1_SEQUENCE(POLICY_MAPPING) = { | 
| 35 |  |         ASN1_SIMPLE(POLICY_MAPPING, issuerDomainPolicy, ASN1_OBJECT), | 
| 36 |  |         ASN1_SIMPLE(POLICY_MAPPING, subjectDomainPolicy, ASN1_OBJECT) | 
| 37 |  | } ASN1_SEQUENCE_END(POLICY_MAPPING) | 
| 38 |  |  | 
| 39 |  | ASN1_ITEM_TEMPLATE(POLICY_MAPPINGS) = | 
| 40 |  |         ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, POLICY_MAPPINGS, | 
| 41 |  |                                                                 POLICY_MAPPING) | 
| 42 |  | ASN1_ITEM_TEMPLATE_END(POLICY_MAPPINGS) | 
| 43 |  |  | 
| 44 |  | IMPLEMENT_ASN1_ALLOC_FUNCTIONS(POLICY_MAPPING) | 
| 45 |  |  | 
| 46 |  | static STACK_OF(CONF_VALUE) *i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD | 
| 47 |  |                                                  *method, void *a, STACK_OF(CONF_VALUE) | 
| 48 |  |                                                  *ext_list) | 
| 49 | 0 | { | 
| 50 | 0 |     POLICY_MAPPINGS *pmaps = a; | 
| 51 | 0 |     POLICY_MAPPING *pmap; | 
| 52 | 0 |     int i; | 
| 53 | 0 |     char obj_tmp1[80]; | 
| 54 | 0 |     char obj_tmp2[80]; | 
| 55 |  | 
 | 
| 56 | 0 |     for (i = 0; i < sk_POLICY_MAPPING_num(pmaps); i++) { | 
| 57 | 0 |         pmap = sk_POLICY_MAPPING_value(pmaps, i); | 
| 58 | 0 |         i2t_ASN1_OBJECT(obj_tmp1, 80, pmap->issuerDomainPolicy); | 
| 59 | 0 |         i2t_ASN1_OBJECT(obj_tmp2, 80, pmap->subjectDomainPolicy); | 
| 60 | 0 |         X509V3_add_value(obj_tmp1, obj_tmp2, &ext_list); | 
| 61 | 0 |     } | 
| 62 | 0 |     return ext_list; | 
| 63 | 0 | } | 
| 64 |  |  | 
| 65 |  | static void *v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method, | 
| 66 |  |                                  X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval) | 
| 67 | 0 | { | 
| 68 | 0 |     POLICY_MAPPING *pmap = NULL; | 
| 69 | 0 |     ASN1_OBJECT *obj1 = NULL, *obj2 = NULL; | 
| 70 | 0 |     CONF_VALUE *val; | 
| 71 | 0 |     POLICY_MAPPINGS *pmaps; | 
| 72 | 0 |     const int num = sk_CONF_VALUE_num(nval); | 
| 73 | 0 |     int i; | 
| 74 |  | 
 | 
| 75 | 0 |     if ((pmaps = sk_POLICY_MAPPING_new_reserve(NULL, num)) == NULL) { | 
| 76 | 0 |         ERR_raise(ERR_LIB_X509V3, ERR_R_MALLOC_FAILURE); | 
| 77 | 0 |         return NULL; | 
| 78 | 0 |     } | 
| 79 |  |  | 
| 80 | 0 |     for (i = 0; i < num; i++) { | 
| 81 | 0 |         val = sk_CONF_VALUE_value(nval, i); | 
| 82 | 0 |         if (!val->value || !val->name) { | 
| 83 | 0 |             ERR_raise_data(ERR_LIB_X509V3, X509V3_R_INVALID_OBJECT_IDENTIFIER, | 
| 84 | 0 |                            "%s", val->name); | 
| 85 | 0 |             goto err; | 
| 86 | 0 |         } | 
| 87 | 0 |         obj1 = OBJ_txt2obj(val->name, 0); | 
| 88 | 0 |         obj2 = OBJ_txt2obj(val->value, 0); | 
| 89 | 0 |         if (!obj1 || !obj2) { | 
| 90 | 0 |             ERR_raise_data(ERR_LIB_X509V3, X509V3_R_INVALID_OBJECT_IDENTIFIER, | 
| 91 | 0 |                            "%s", val->name); | 
| 92 | 0 |             goto err; | 
| 93 | 0 |         } | 
| 94 | 0 |         pmap = POLICY_MAPPING_new(); | 
| 95 | 0 |         if (pmap == NULL) { | 
| 96 | 0 |             ERR_raise(ERR_LIB_X509V3, ERR_R_MALLOC_FAILURE); | 
| 97 | 0 |             goto err; | 
| 98 | 0 |         } | 
| 99 | 0 |         pmap->issuerDomainPolicy = obj1; | 
| 100 | 0 |         pmap->subjectDomainPolicy = obj2; | 
| 101 | 0 |         obj1 = obj2 = NULL; | 
| 102 | 0 |         sk_POLICY_MAPPING_push(pmaps, pmap); /* no failure as it was reserved */ | 
| 103 | 0 |     } | 
| 104 | 0 |     return pmaps; | 
| 105 | 0 |  err: | 
| 106 | 0 |     ASN1_OBJECT_free(obj1); | 
| 107 | 0 |     ASN1_OBJECT_free(obj2); | 
| 108 | 0 |     sk_POLICY_MAPPING_pop_free(pmaps, POLICY_MAPPING_free); | 
| 109 | 0 |     return NULL; | 
| 110 | 0 | } |