/src/openssl/crypto/x509/v3_pci.c
Line | Count | Source |
1 | | /* |
2 | | * Copyright 2004-2025 The OpenSSL Project Authors. All Rights Reserved. |
3 | | * |
4 | | * Licensed under the Apache License 2.0 (the "License"). You may not use |
5 | | * this file except in compliance with the License. You can obtain a copy |
6 | | * in the file LICENSE in the source distribution or at |
7 | | * https://www.openssl.org/source/license.html |
8 | | */ |
9 | | |
10 | | /* |
11 | | * This file is dual-licensed and is also available under the following |
12 | | * terms: |
13 | | * |
14 | | * Copyright (c) 2004 Kungliga Tekniska Högskolan |
15 | | * (Royal Institute of Technology, Stockholm, Sweden). |
16 | | * All rights reserved. |
17 | | * |
18 | | * Redistribution and use in source and binary forms, with or without |
19 | | * modification, are permitted provided that the following conditions |
20 | | * are met: |
21 | | * |
22 | | * 1. Redistributions of source code must retain the above copyright |
23 | | * notice, this list of conditions and the following disclaimer. |
24 | | * |
25 | | * 2. Redistributions in binary form must reproduce the above copyright |
26 | | * notice, this list of conditions and the following disclaimer in the |
27 | | * documentation and/or other materials provided with the distribution. |
28 | | * |
29 | | * 3. Neither the name of the Institute nor the names of its contributors |
30 | | * may be used to endorse or promote products derived from this software |
31 | | * without specific prior written permission. |
32 | | * |
33 | | * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND |
34 | | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
35 | | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
36 | | * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE |
37 | | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
38 | | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
39 | | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
40 | | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
41 | | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
42 | | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
43 | | * SUCH DAMAGE. |
44 | | */ |
45 | | |
46 | | #include <stdio.h> |
47 | | #include "internal/cryptlib.h" |
48 | | #include <openssl/conf.h> |
49 | | #include <openssl/x509v3.h> |
50 | | #include "ext_dat.h" |
51 | | |
52 | | #include <crypto/asn1.h> |
53 | | |
54 | | static int i2r_pci(X509V3_EXT_METHOD *method, PROXY_CERT_INFO_EXTENSION *ext, |
55 | | BIO *out, int indent); |
56 | | static PROXY_CERT_INFO_EXTENSION *r2i_pci(X509V3_EXT_METHOD *method, |
57 | | X509V3_CTX *ctx, char *str); |
58 | | |
59 | | const X509V3_EXT_METHOD ossl_v3_pci = { |
60 | | NID_proxyCertInfo, |
61 | | 0, |
62 | | ASN1_ITEM_ref(PROXY_CERT_INFO_EXTENSION), |
63 | | 0, |
64 | | 0, |
65 | | 0, |
66 | | 0, |
67 | | 0, |
68 | | 0, |
69 | | NULL, |
70 | | NULL, |
71 | | (X509V3_EXT_I2R)i2r_pci, |
72 | | (X509V3_EXT_R2I)r2i_pci, |
73 | | NULL, |
74 | | }; |
75 | | |
76 | | static int i2r_pci(X509V3_EXT_METHOD *method, PROXY_CERT_INFO_EXTENSION *pci, |
77 | | BIO *out, int indent) |
78 | 0 | { |
79 | 0 | BIO_printf(out, "%*sPath Length Constraint: ", indent, ""); |
80 | 0 | if (pci->pcPathLengthConstraint) |
81 | 0 | i2a_ASN1_INTEGER(out, pci->pcPathLengthConstraint); |
82 | 0 | else |
83 | 0 | BIO_printf(out, "infinite"); |
84 | 0 | BIO_puts(out, "\n"); |
85 | 0 | BIO_printf(out, "%*sPolicy Language: ", indent, ""); |
86 | 0 | i2a_ASN1_OBJECT(out, pci->proxyPolicy->policyLanguage); |
87 | 0 | if (pci->proxyPolicy->policy && pci->proxyPolicy->policy->data) |
88 | 0 | BIO_printf(out, "\n%*sPolicy Text: %.*s", indent, "", |
89 | 0 | pci->proxyPolicy->policy->length, |
90 | 0 | pci->proxyPolicy->policy->data); |
91 | 0 | return 1; |
92 | 0 | } |
93 | | |
94 | | static int process_pci_value(CONF_VALUE *val, |
95 | | ASN1_OBJECT **language, ASN1_INTEGER **pathlen, |
96 | | ASN1_OCTET_STRING **policy) |
97 | 0 | { |
98 | 0 | int free_policy = 0; |
99 | |
|
100 | 0 | if (strcmp(val->name, "language") == 0) { |
101 | 0 | if (*language) { |
102 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_POLICY_LANGUAGE_ALREADY_DEFINED); |
103 | 0 | X509V3_conf_err(val); |
104 | 0 | return 0; |
105 | 0 | } |
106 | 0 | if ((*language = OBJ_txt2obj(val->value, 0)) == NULL) { |
107 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_INVALID_OBJECT_IDENTIFIER); |
108 | 0 | X509V3_conf_err(val); |
109 | 0 | return 0; |
110 | 0 | } |
111 | 0 | } else if (strcmp(val->name, "pathlen") == 0) { |
112 | 0 | if (*pathlen) { |
113 | 0 | ERR_raise(ERR_LIB_X509V3, |
114 | 0 | X509V3_R_POLICY_PATH_LENGTH_ALREADY_DEFINED); |
115 | 0 | X509V3_conf_err(val); |
116 | 0 | return 0; |
117 | 0 | } |
118 | 0 | if (!X509V3_get_value_int(val, pathlen)) { |
119 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_POLICY_PATH_LENGTH); |
120 | 0 | X509V3_conf_err(val); |
121 | 0 | return 0; |
122 | 0 | } |
123 | 0 | } else if (strcmp(val->name, "policy") == 0) { |
124 | 0 | char *valp = val->value; |
125 | 0 | unsigned char *tmp_data = NULL; |
126 | 0 | long val_len; |
127 | |
|
128 | 0 | if (*policy == NULL) { |
129 | 0 | *policy = ASN1_OCTET_STRING_new(); |
130 | 0 | if (*policy == NULL) { |
131 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
132 | 0 | X509V3_conf_err(val); |
133 | 0 | return 0; |
134 | 0 | } |
135 | 0 | free_policy = 1; |
136 | 0 | } |
137 | 0 | if (CHECK_AND_SKIP_PREFIX(valp, "hex:")) { |
138 | 0 | unsigned char *tmp_data2 = OPENSSL_hexstr2buf(valp, &val_len); |
139 | |
|
140 | 0 | if (!tmp_data2) { |
141 | 0 | X509V3_conf_err(val); |
142 | 0 | goto err; |
143 | 0 | } |
144 | | |
145 | 0 | tmp_data = OPENSSL_realloc((*policy)->data, |
146 | 0 | (*policy)->length + val_len + 1); |
147 | 0 | if (tmp_data) { |
148 | 0 | (*policy)->data = tmp_data; |
149 | 0 | memcpy(&(*policy)->data[(*policy)->length], |
150 | 0 | tmp_data2, val_len); |
151 | 0 | (*policy)->length += val_len; |
152 | 0 | (*policy)->data[(*policy)->length] = '\0'; |
153 | 0 | } else { |
154 | 0 | OPENSSL_free(tmp_data2); |
155 | | /* |
156 | | * realloc failure implies the original data space is b0rked |
157 | | * too! |
158 | | */ |
159 | 0 | OPENSSL_free((*policy)->data); |
160 | 0 | (*policy)->data = NULL; |
161 | 0 | (*policy)->length = 0; |
162 | 0 | X509V3_conf_err(val); |
163 | 0 | goto err; |
164 | 0 | } |
165 | 0 | OPENSSL_free(tmp_data2); |
166 | 0 | } else if (CHECK_AND_SKIP_PREFIX(valp, "file:")) { |
167 | 0 | unsigned char buf[2048]; |
168 | 0 | int n; |
169 | 0 | BIO *b = BIO_new_file(valp, "r"); |
170 | 0 | if (!b) { |
171 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_BIO_LIB); |
172 | 0 | X509V3_conf_err(val); |
173 | 0 | goto err; |
174 | 0 | } |
175 | 0 | while ((n = BIO_read(b, buf, sizeof(buf))) > 0 |
176 | 0 | || (n == 0 && BIO_should_retry(b))) { |
177 | 0 | if (!n) |
178 | 0 | continue; |
179 | | |
180 | 0 | tmp_data = OPENSSL_realloc((*policy)->data, |
181 | 0 | (*policy)->length + n + 1); |
182 | |
|
183 | 0 | if (!tmp_data) { |
184 | 0 | OPENSSL_free((*policy)->data); |
185 | 0 | (*policy)->data = NULL; |
186 | 0 | (*policy)->length = 0; |
187 | 0 | X509V3_conf_err(val); |
188 | 0 | BIO_free_all(b); |
189 | 0 | goto err; |
190 | 0 | } |
191 | | |
192 | 0 | (*policy)->data = tmp_data; |
193 | 0 | memcpy(&(*policy)->data[(*policy)->length], buf, n); |
194 | 0 | (*policy)->length += n; |
195 | 0 | (*policy)->data[(*policy)->length] = '\0'; |
196 | 0 | } |
197 | 0 | BIO_free_all(b); |
198 | |
|
199 | 0 | if (n < 0) { |
200 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_BIO_LIB); |
201 | 0 | X509V3_conf_err(val); |
202 | 0 | goto err; |
203 | 0 | } |
204 | 0 | } else if (CHECK_AND_SKIP_PREFIX(valp, "text:")) { |
205 | 0 | val_len = (int)strlen(valp); |
206 | 0 | tmp_data = OPENSSL_realloc((*policy)->data, |
207 | 0 | (*policy)->length + val_len + 1); |
208 | 0 | if (tmp_data) { |
209 | 0 | (*policy)->data = tmp_data; |
210 | 0 | memcpy(&(*policy)->data[(*policy)->length], |
211 | 0 | val->value + 5, val_len); |
212 | 0 | (*policy)->length += val_len; |
213 | 0 | (*policy)->data[(*policy)->length] = '\0'; |
214 | 0 | } else { |
215 | | /* |
216 | | * realloc failure implies the original data space is b0rked |
217 | | * too! |
218 | | */ |
219 | 0 | OPENSSL_free((*policy)->data); |
220 | 0 | (*policy)->data = NULL; |
221 | 0 | (*policy)->length = 0; |
222 | 0 | X509V3_conf_err(val); |
223 | 0 | goto err; |
224 | 0 | } |
225 | 0 | } else { |
226 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_INCORRECT_POLICY_SYNTAX_TAG); |
227 | 0 | X509V3_conf_err(val); |
228 | 0 | goto err; |
229 | 0 | } |
230 | 0 | if (!tmp_data) { |
231 | 0 | X509V3_conf_err(val); |
232 | 0 | goto err; |
233 | 0 | } |
234 | 0 | } |
235 | 0 | return 1; |
236 | 0 | err: |
237 | 0 | if (free_policy) { |
238 | 0 | ASN1_OCTET_STRING_free(*policy); |
239 | 0 | *policy = NULL; |
240 | 0 | } |
241 | 0 | return 0; |
242 | 0 | } |
243 | | |
244 | | static PROXY_CERT_INFO_EXTENSION *r2i_pci(X509V3_EXT_METHOD *method, |
245 | | X509V3_CTX *ctx, char *value) |
246 | 0 | { |
247 | 0 | PROXY_CERT_INFO_EXTENSION *pci = NULL; |
248 | 0 | STACK_OF(CONF_VALUE) *vals; |
249 | 0 | ASN1_OBJECT *language = NULL; |
250 | 0 | ASN1_INTEGER *pathlen = NULL; |
251 | 0 | ASN1_OCTET_STRING *policy = NULL; |
252 | 0 | int i, j; |
253 | |
|
254 | 0 | vals = X509V3_parse_list(value); |
255 | 0 | for (i = 0; i < sk_CONF_VALUE_num(vals); i++) { |
256 | 0 | CONF_VALUE *cnf = sk_CONF_VALUE_value(vals, i); |
257 | |
|
258 | 0 | if (!cnf->name || (*cnf->name != '@' && !cnf->value)) { |
259 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_INVALID_PROXY_POLICY_SETTING); |
260 | 0 | X509V3_conf_err(cnf); |
261 | 0 | goto err; |
262 | 0 | } |
263 | 0 | if (*cnf->name == '@') { |
264 | 0 | STACK_OF(CONF_VALUE) *sect; |
265 | 0 | int success_p = 1; |
266 | |
|
267 | 0 | sect = X509V3_get_section(ctx, cnf->name + 1); |
268 | 0 | if (!sect) { |
269 | 0 | ERR_raise(ERR_LIB_X509V3, X509V3_R_INVALID_SECTION); |
270 | 0 | X509V3_conf_err(cnf); |
271 | 0 | goto err; |
272 | 0 | } |
273 | 0 | for (j = 0; success_p && j < sk_CONF_VALUE_num(sect); j++) { |
274 | 0 | success_p = process_pci_value(sk_CONF_VALUE_value(sect, j), |
275 | 0 | &language, &pathlen, &policy); |
276 | 0 | } |
277 | 0 | X509V3_section_free(ctx, sect); |
278 | 0 | if (!success_p) |
279 | 0 | goto err; |
280 | 0 | } else { |
281 | 0 | if (!process_pci_value(cnf, &language, &pathlen, &policy)) { |
282 | 0 | X509V3_conf_err(cnf); |
283 | 0 | goto err; |
284 | 0 | } |
285 | 0 | } |
286 | 0 | } |
287 | | |
288 | | /* Language is mandatory */ |
289 | 0 | if (!language) { |
290 | 0 | ERR_raise(ERR_LIB_X509V3, |
291 | 0 | X509V3_R_NO_PROXY_CERT_POLICY_LANGUAGE_DEFINED); |
292 | 0 | goto err; |
293 | 0 | } |
294 | 0 | i = OBJ_obj2nid(language); |
295 | 0 | if ((i == NID_Independent || i == NID_id_ppl_inheritAll) && policy) { |
296 | 0 | ERR_raise(ERR_LIB_X509V3, |
297 | 0 | X509V3_R_POLICY_WHEN_PROXY_LANGUAGE_REQUIRES_NO_POLICY); |
298 | 0 | goto err; |
299 | 0 | } |
300 | | |
301 | 0 | pci = PROXY_CERT_INFO_EXTENSION_new(); |
302 | 0 | if (pci == NULL) { |
303 | 0 | ERR_raise(ERR_LIB_X509V3, ERR_R_ASN1_LIB); |
304 | 0 | goto err; |
305 | 0 | } |
306 | | |
307 | 0 | pci->proxyPolicy->policyLanguage = language; |
308 | 0 | language = NULL; |
309 | 0 | pci->proxyPolicy->policy = policy; |
310 | 0 | policy = NULL; |
311 | 0 | pci->pcPathLengthConstraint = pathlen; |
312 | 0 | pathlen = NULL; |
313 | 0 | goto end; |
314 | 0 | err: |
315 | 0 | ASN1_OBJECT_free(language); |
316 | 0 | ASN1_INTEGER_free(pathlen); |
317 | 0 | pathlen = NULL; |
318 | 0 | ASN1_OCTET_STRING_free(policy); |
319 | 0 | policy = NULL; |
320 | 0 | PROXY_CERT_INFO_EXTENSION_free(pci); |
321 | 0 | pci = NULL; |
322 | 0 | end: |
323 | 0 | sk_CONF_VALUE_pop_free(vals, X509V3_conf_free); |
324 | 0 | return pci; |
325 | 0 | } |