]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/x509/v3_info.c
Fix safestack issues in conf.h
[thirdparty/openssl.git] / crypto / x509 / v3_info.c
CommitLineData
0f113f3e 1/*
454afd98 2 * Copyright 1999-2020 The OpenSSL Project Authors. All Rights Reserved.
6d3724d3 3 *
4286ca47 4 * Licensed under the Apache License 2.0 (the "License"). You may not use
d2e9e320
RS
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
6d3724d3
DSH
8 */
9
10#include <stdio.h>
b39fc560 11#include "internal/cryptlib.h"
6d3724d3
DSH
12#include <openssl/conf.h>
13#include <openssl/asn1.h>
9d6b1ce6 14#include <openssl/asn1t.h>
6d3724d3 15#include <openssl/x509v3.h>
df2ee0e2 16#include "ext_dat.h"
6d3724d3 17
0f113f3e
MC
18static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD
19 *method, AUTHORITY_INFO_ACCESS
20 *ainfo, STACK_OF(CONF_VALUE)
21 *ret);
22static AUTHORITY_INFO_ACCESS *v2i_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD
23 *method,
24 X509V3_CTX *ctx,
25 STACK_OF(CONF_VALUE)
26 *nval);
6d3724d3 27
0f113f3e
MC
28const X509V3_EXT_METHOD v3_info = { NID_info_access, X509V3_EXT_MULTILINE,
29 ASN1_ITEM_ref(AUTHORITY_INFO_ACCESS),
30 0, 0, 0, 0,
31 0, 0,
32 (X509V3_EXT_I2V) i2v_AUTHORITY_INFO_ACCESS,
33 (X509V3_EXT_V2I)v2i_AUTHORITY_INFO_ACCESS,
34 0, 0,
35 NULL
36};
7d5b04db 37
0f113f3e
MC
38const X509V3_EXT_METHOD v3_sinfo = { NID_sinfo_access, X509V3_EXT_MULTILINE,
39 ASN1_ITEM_ref(AUTHORITY_INFO_ACCESS),
40 0, 0, 0, 0,
41 0, 0,
42 (X509V3_EXT_I2V) i2v_AUTHORITY_INFO_ACCESS,
43 (X509V3_EXT_V2I)v2i_AUTHORITY_INFO_ACCESS,
44 0, 0,
45 NULL
46};
6d3724d3 47
9d6b1ce6 48ASN1_SEQUENCE(ACCESS_DESCRIPTION) = {
0f113f3e
MC
49 ASN1_SIMPLE(ACCESS_DESCRIPTION, method, ASN1_OBJECT),
50 ASN1_SIMPLE(ACCESS_DESCRIPTION, location, GENERAL_NAME)
d339187b 51} ASN1_SEQUENCE_END(ACCESS_DESCRIPTION)
9d6b1ce6
DSH
52
53IMPLEMENT_ASN1_FUNCTIONS(ACCESS_DESCRIPTION)
54
0f113f3e
MC
55ASN1_ITEM_TEMPLATE(AUTHORITY_INFO_ACCESS) =
56 ASN1_EX_TEMPLATE_TYPE(ASN1_TFLG_SEQUENCE_OF, 0, GeneralNames, ACCESS_DESCRIPTION)
d339187b 57ASN1_ITEM_TEMPLATE_END(AUTHORITY_INFO_ACCESS)
9d6b1ce6
DSH
58
59IMPLEMENT_ASN1_FUNCTIONS(AUTHORITY_INFO_ACCESS)
60
75a3e392
MC
61static STACK_OF(CONF_VALUE) *i2v_AUTHORITY_INFO_ACCESS(
62 X509V3_EXT_METHOD *method, AUTHORITY_INFO_ACCESS *ainfo,
63 STACK_OF(CONF_VALUE) *ret)
6d3724d3 64{
0f113f3e
MC
65 ACCESS_DESCRIPTION *desc;
66 int i, nlen;
67 char objtmp[80], *ntmp;
68 CONF_VALUE *vtmp;
75a3e392
MC
69 STACK_OF(CONF_VALUE) *tret = ret;
70
0f113f3e 71 for (i = 0; i < sk_ACCESS_DESCRIPTION_num(ainfo); i++) {
75a3e392
MC
72 STACK_OF(CONF_VALUE) *tmp;
73
0f113f3e 74 desc = sk_ACCESS_DESCRIPTION_value(ainfo, i);
75a3e392
MC
75 tmp = i2v_GENERAL_NAME(method, desc->location, tret);
76 if (tmp == NULL)
77 goto err;
78 tret = tmp;
79 vtmp = sk_CONF_VALUE_value(tret, i);
cbe29648 80 i2t_ASN1_OBJECT(objtmp, sizeof(objtmp), desc->method);
0904e79a 81 nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1;
0f113f3e 82 ntmp = OPENSSL_malloc(nlen);
75a3e392
MC
83 if (ntmp == NULL)
84 goto err;
a2371fa9 85 BIO_snprintf(ntmp, nlen, "%s - %s", objtmp, vtmp->name);
0f113f3e
MC
86 OPENSSL_free(vtmp->name);
87 vtmp->name = ntmp;
0f113f3e 88 }
75a3e392 89 if (ret == NULL && tret == NULL)
0f113f3e 90 return sk_CONF_VALUE_new_null();
75a3e392
MC
91
92 return tret;
93 err:
94 X509V3err(X509V3_F_I2V_AUTHORITY_INFO_ACCESS, ERR_R_MALLOC_FAILURE);
95 if (ret == NULL && tret != NULL)
96 sk_CONF_VALUE_pop_free(tret, X509V3_conf_free);
97 return NULL;
6d3724d3
DSH
98}
99
0f113f3e
MC
100static AUTHORITY_INFO_ACCESS *v2i_AUTHORITY_INFO_ACCESS(X509V3_EXT_METHOD
101 *method,
102 X509V3_CTX *ctx,
103 STACK_OF(CONF_VALUE)
104 *nval)
6d3724d3 105{
0f113f3e
MC
106 AUTHORITY_INFO_ACCESS *ainfo = NULL;
107 CONF_VALUE *cnf, ctmp;
108 ACCESS_DESCRIPTION *acc;
109 int i, objlen;
e431363f 110 const int num = sk_CONF_VALUE_num(nval);
0f113f3e 111 char *objtmp, *ptmp;
75ebbd9a 112
7a908204 113 if ((ainfo = sk_ACCESS_DESCRIPTION_new_reserve(NULL, num)) == NULL) {
0f113f3e
MC
114 X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS, ERR_R_MALLOC_FAILURE);
115 return NULL;
116 }
e431363f 117 for (i = 0; i < num; i++) {
0f113f3e 118 cnf = sk_CONF_VALUE_value(nval, i);
e431363f 119 if ((acc = ACCESS_DESCRIPTION_new()) == NULL) {
0f113f3e
MC
120 X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,
121 ERR_R_MALLOC_FAILURE);
122 goto err;
123 }
e431363f 124 sk_ACCESS_DESCRIPTION_push(ainfo, acc); /* Cannot fail due to reserve */
0f113f3e 125 ptmp = strchr(cnf->name, ';');
12a765a5 126 if (ptmp == NULL) {
0f113f3e
MC
127 X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,
128 X509V3_R_INVALID_SYNTAX);
129 goto err;
130 }
131 objlen = ptmp - cnf->name;
132 ctmp.name = ptmp + 1;
133 ctmp.value = cnf->value;
134 if (!v2i_GENERAL_NAME_ex(acc->location, method, ctx, &ctmp, 0))
135 goto err;
5e04cfde 136 if ((objtmp = OPENSSL_strndup(cnf->name, objlen)) == NULL) {
0f113f3e
MC
137 X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,
138 ERR_R_MALLOC_FAILURE);
139 goto err;
140 }
0f113f3e
MC
141 acc->method = OBJ_txt2obj(objtmp, 0);
142 if (!acc->method) {
143 X509V3err(X509V3_F_V2I_AUTHORITY_INFO_ACCESS,
144 X509V3_R_BAD_OBJECT);
145 ERR_add_error_data(2, "value=", objtmp);
146 OPENSSL_free(objtmp);
147 goto err;
148 }
149 OPENSSL_free(objtmp);
6d3724d3 150
0f113f3e
MC
151 }
152 return ainfo;
153 err:
154 sk_ACCESS_DESCRIPTION_pop_free(ainfo, ACCESS_DESCRIPTION_free);
155 return NULL;
6d3724d3
DSH
156}
157
095d2f0f 158int i2a_ACCESS_DESCRIPTION(BIO *bp, const ACCESS_DESCRIPTION *a)
0f113f3e
MC
159{
160 i2a_ASN1_OBJECT(bp, a->method);
0f113f3e
MC
161 return 2;
162}