Coverage Report

Created: 2018-08-29 13:53

/src/openssl/crypto/x509v3/v3_pmaps.c
Line
Count
Source (jump to first uncovered line)
1
/*
2
 * Copyright 2003-2016 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the OpenSSL license (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <stdio.h>
11
#include "internal/cryptlib.h"
12
#include <openssl/asn1t.h>
13
#include <openssl/conf.h>
14
#include <openssl/x509v3.h>
15
#include "ext_dat.h"
16
17
static void *v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method,
18
                                 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval);
19
static STACK_OF(CONF_VALUE) *i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD
20
                                                 *method, void *pmps, STACK_OF(CONF_VALUE)
21
                                                 *extlist);
22
23
const X509V3_EXT_METHOD v3_policy_mappings = {
24
    NID_policy_mappings, 0,
25
    ASN1_ITEM_ref(POLICY_MAPPINGS),
26
    0, 0, 0, 0,
27
    0, 0,
28
    i2v_POLICY_MAPPINGS,
29
    v2i_POLICY_MAPPINGS,
30
    0, 0,
31
    NULL
32
};
33
34
ASN1_SEQUENCE(POLICY_MAPPING) = {
35
        ASN1_SIMPLE(POLICY_MAPPING, issuerDomainPolicy, ASN1_OBJECT),
36
        ASN1_SIMPLE(POLICY_MAPPING, subjectDomainPolicy, ASN1_OBJECT)
37
} ASN1_SEQUENCE_END(POLICY_MAPPING)
38
39
ASN1_ITEM_TEMPLATE(POLICY_MAPPINGS) =
40
        ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, POLICY_MAPPINGS,
41
                                                                POLICY_MAPPING)
42
ASN1_ITEM_TEMPLATE_END(POLICY_MAPPINGS)
43
44
IMPLEMENT_ASN1_ALLOC_FUNCTIONS(POLICY_MAPPING)
45
46
static STACK_OF(CONF_VALUE) *i2v_POLICY_MAPPINGS(const X509V3_EXT_METHOD
47
                                                 *method, void *a, STACK_OF(CONF_VALUE)
48
                                                 *ext_list)
49
0
{
50
0
    POLICY_MAPPINGS *pmaps = a;
51
0
    POLICY_MAPPING *pmap;
52
0
    int i;
53
0
    char obj_tmp1[80];
54
0
    char obj_tmp2[80];
55
0
56
0
    for (i = 0; i < sk_POLICY_MAPPING_num(pmaps); i++) {
57
0
        pmap = sk_POLICY_MAPPING_value(pmaps, i);
58
0
        i2t_ASN1_OBJECT(obj_tmp1, 80, pmap->issuerDomainPolicy);
59
0
        i2t_ASN1_OBJECT(obj_tmp2, 80, pmap->subjectDomainPolicy);
60
0
        X509V3_add_value(obj_tmp1, obj_tmp2, &ext_list);
61
0
    }
62
0
    return ext_list;
63
0
}
64
65
static void *v2i_POLICY_MAPPINGS(const X509V3_EXT_METHOD *method,
66
                                 X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *nval)
67
0
{
68
0
    POLICY_MAPPING *pmap = NULL;
69
0
    ASN1_OBJECT *obj1 = NULL, *obj2 = NULL;
70
0
    CONF_VALUE *val;
71
0
    POLICY_MAPPINGS *pmaps;
72
0
    const int num = sk_CONF_VALUE_num(nval);
73
0
    int i;
74
0
75
0
    if ((pmaps = sk_POLICY_MAPPING_new_reserve(NULL, num)) == NULL) {
76
0
        X509V3err(X509V3_F_V2I_POLICY_MAPPINGS, ERR_R_MALLOC_FAILURE);
77
0
        return NULL;
78
0
    }
79
0
80
0
    for (i = 0; i < num; i++) {
81
0
        val = sk_CONF_VALUE_value(nval, i);
82
0
        if (!val->value || !val->name) {
83
0
            X509V3err(X509V3_F_V2I_POLICY_MAPPINGS,
84
0
                      X509V3_R_INVALID_OBJECT_IDENTIFIER);
85
0
            X509V3_conf_err(val);
86
0
            goto err;
87
0
        }
88
0
        obj1 = OBJ_txt2obj(val->name, 0);
89
0
        obj2 = OBJ_txt2obj(val->value, 0);
90
0
        if (!obj1 || !obj2) {
91
0
            X509V3err(X509V3_F_V2I_POLICY_MAPPINGS,
92
0
                      X509V3_R_INVALID_OBJECT_IDENTIFIER);
93
0
            X509V3_conf_err(val);
94
0
            goto err;
95
0
        }
96
0
        pmap = POLICY_MAPPING_new();
97
0
        if (pmap == NULL) {
98
0
            X509V3err(X509V3_F_V2I_POLICY_MAPPINGS, ERR_R_MALLOC_FAILURE);
99
0
            goto err;
100
0
        }
101
0
        pmap->issuerDomainPolicy = obj1;
102
0
        pmap->subjectDomainPolicy = obj2;
103
0
        obj1 = obj2 = NULL;
104
0
        sk_POLICY_MAPPING_push(pmaps, pmap); /* no failure as it was reserved */
105
0
    }
106
0
    return pmaps;
107
0
 err:
108
0
    ASN1_OBJECT_free(obj1);
109
0
    ASN1_OBJECT_free(obj2);
110
0
    sk_POLICY_MAPPING_pop_free(pmaps, POLICY_MAPPING_free);
111
0
    return NULL;
112
0
}