]>
Commit | Line | Data |
---|---|---|
0f113f3e | 1 | /* |
d2e9e320 | 2 | * Copyright 2003-2016 The OpenSSL Project Authors. All Rights Reserved. |
f80153e2 | 3 | * |
4286ca47 | 4 | * Licensed under the Apache License 2.0 (the "License"). You may not use |
d2e9e320 RS |
5 | * this file except in compliance with the License. You can obtain a copy |
6 | * in the file LICENSE in the source distribution or at | |
7 | * https://www.openssl.org/source/license.html | |
f80153e2 DSH |
8 | */ |
9 | ||
f80153e2 | 10 | #include <stdio.h> |
b39fc560 | 11 | #include "internal/cryptlib.h" |
f80153e2 DSH |
12 | #include <openssl/asn1.h> |
13 | #include <openssl/asn1t.h> | |
14 | #include <openssl/conf.h> | |
15 | #include <openssl/x509v3.h> | |
df2ee0e2 | 16 | #include "ext_dat.h" |
f80153e2 | 17 | |
0f113f3e MC |
18 | static STACK_OF(CONF_VALUE) *i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD |
19 | *method, void *bcons, STACK_OF(CONF_VALUE) | |
20 | *extlist); | |
babb3798 | 21 | static void *v2i_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, |
0f113f3e MC |
22 | X509V3_CTX *ctx, |
23 | STACK_OF(CONF_VALUE) *values); | |
f80153e2 | 24 | |
560b79cb | 25 | const X509V3_EXT_METHOD v3_policy_constraints = { |
0f113f3e MC |
26 | NID_policy_constraints, 0, |
27 | ASN1_ITEM_ref(POLICY_CONSTRAINTS), | |
28 | 0, 0, 0, 0, | |
29 | 0, 0, | |
30 | i2v_POLICY_CONSTRAINTS, | |
31 | v2i_POLICY_CONSTRAINTS, | |
32 | NULL, NULL, | |
33 | NULL | |
f80153e2 DSH |
34 | }; |
35 | ||
36 | ASN1_SEQUENCE(POLICY_CONSTRAINTS) = { | |
0f113f3e MC |
37 | ASN1_IMP_OPT(POLICY_CONSTRAINTS, requireExplicitPolicy, ASN1_INTEGER,0), |
38 | ASN1_IMP_OPT(POLICY_CONSTRAINTS, inhibitPolicyMapping, ASN1_INTEGER,1) | |
f80153e2 DSH |
39 | } ASN1_SEQUENCE_END(POLICY_CONSTRAINTS) |
40 | ||
41 | IMPLEMENT_ASN1_ALLOC_FUNCTIONS(POLICY_CONSTRAINTS) | |
42 | ||
0f113f3e MC |
43 | static STACK_OF(CONF_VALUE) *i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD |
44 | *method, void *a, STACK_OF(CONF_VALUE) | |
45 | *extlist) | |
f80153e2 | 46 | { |
0f113f3e MC |
47 | POLICY_CONSTRAINTS *pcons = a; |
48 | X509V3_add_value_int("Require Explicit Policy", | |
49 | pcons->requireExplicitPolicy, &extlist); | |
50 | X509V3_add_value_int("Inhibit Policy Mapping", | |
51 | pcons->inhibitPolicyMapping, &extlist); | |
52 | return extlist; | |
f80153e2 DSH |
53 | } |
54 | ||
babb3798 | 55 | static void *v2i_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, |
0f113f3e MC |
56 | X509V3_CTX *ctx, |
57 | STACK_OF(CONF_VALUE) *values) | |
f80153e2 | 58 | { |
0f113f3e MC |
59 | POLICY_CONSTRAINTS *pcons = NULL; |
60 | CONF_VALUE *val; | |
61 | int i; | |
75ebbd9a RS |
62 | |
63 | if ((pcons = POLICY_CONSTRAINTS_new()) == NULL) { | |
0f113f3e MC |
64 | X509V3err(X509V3_F_V2I_POLICY_CONSTRAINTS, ERR_R_MALLOC_FAILURE); |
65 | return NULL; | |
66 | } | |
67 | for (i = 0; i < sk_CONF_VALUE_num(values); i++) { | |
68 | val = sk_CONF_VALUE_value(values, i); | |
86885c28 | 69 | if (strcmp(val->name, "requireExplicitPolicy") == 0) { |
0f113f3e MC |
70 | if (!X509V3_get_value_int(val, &pcons->requireExplicitPolicy)) |
71 | goto err; | |
86885c28 | 72 | } else if (strcmp(val->name, "inhibitPolicyMapping") == 0) { |
0f113f3e MC |
73 | if (!X509V3_get_value_int(val, &pcons->inhibitPolicyMapping)) |
74 | goto err; | |
75 | } else { | |
76 | X509V3err(X509V3_F_V2I_POLICY_CONSTRAINTS, X509V3_R_INVALID_NAME); | |
77 | X509V3_conf_err(val); | |
78 | goto err; | |
79 | } | |
80 | } | |
81 | if (!pcons->inhibitPolicyMapping && !pcons->requireExplicitPolicy) { | |
82 | X509V3err(X509V3_F_V2I_POLICY_CONSTRAINTS, | |
83 | X509V3_R_ILLEGAL_EMPTY_EXTENSION); | |
84 | goto err; | |
85 | } | |
f80153e2 | 86 | |
0f113f3e MC |
87 | return pcons; |
88 | err: | |
89 | POLICY_CONSTRAINTS_free(pcons); | |
90 | return NULL; | |
f80153e2 | 91 | } |