Line | Source | Count |
1 | | - |
2 | | - |
3 | | - |
4 | | - |
5 | | - |
6 | | - |
7 | | - |
8 | | - |
9 | | - |
10 | | - |
11 | | - |
12 | | - |
13 | | - |
14 | | - |
15 | | - |
16 | | - |
17 | | - |
18 | | - |
19 | | - |
20 | | - |
21 | | - |
22 | | - |
23 | | - |
24 | | - |
25 | | - |
26 | | - |
27 | | - |
28 | | - |
29 | | - |
30 | | - |
31 | | - |
32 | | - |
33 | | - |
34 | | - |
35 | | - |
36 | | - |
37 | | - |
38 | | - |
39 | | - |
40 | | - |
41 | | - |
42 | | - |
43 | | - |
44 | | - |
45 | | - |
46 | | - |
47 | | - |
48 | | - |
49 | | - |
50 | | - |
51 | | - |
52 | | - |
53 | | - |
54 | | - |
55 | | - |
56 | | - |
57 | | - |
58 | | - |
59 | #include <stdio.h> | - |
60 | #include <string.h> | - |
61 | | - |
62 | #include <openssl/asn1.h> | - |
63 | #include <openssl/asn1t.h> | - |
64 | #include <openssl/conf.h> | - |
65 | #include <openssl/err.h> | - |
66 | #include <openssl/x509v3.h> | - |
67 | | - |
68 | static STACK_OF(CONF_VALUE) * | - |
69 | i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *bcons, | - |
70 | STACK_OF(CONF_VALUE) *extlist); | - |
71 | static void *v2i_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, | - |
72 | X509V3_CTX *ctx, STACK_OF(CONF_VALUE) *values); | - |
73 | | - |
74 | const X509V3_EXT_METHOD v3_policy_constraints = { | - |
75 | .ext_nid = NID_policy_constraints, | - |
76 | .ext_flags = 0, | - |
77 | .it = &POLICY_CONSTRAINTS_it, | - |
78 | .ext_new = NULL, | - |
79 | .ext_free = NULL, | - |
80 | .d2i = NULL, | - |
81 | .i2d = NULL, | - |
82 | .i2s = NULL, | - |
83 | .s2i = NULL, | - |
84 | .i2v = i2v_POLICY_CONSTRAINTS, | - |
85 | .v2i = v2i_POLICY_CONSTRAINTS, | - |
86 | .i2r = NULL, | - |
87 | .r2i = NULL, | - |
88 | .usr_data = NULL, | - |
89 | }; | - |
90 | | - |
91 | static const ASN1_TEMPLATE POLICY_CONSTRAINTS_seq_tt[] = { | - |
92 | { | - |
93 | .flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL, | - |
94 | .tag = 0, | - |
95 | .offset = offsetof(POLICY_CONSTRAINTS, requireExplicitPolicy), | - |
96 | .field_name = "requireExplicitPolicy", | - |
97 | .item = &ASN1_INTEGER_it, | - |
98 | }, | - |
99 | { | - |
100 | .flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL, | - |
101 | .tag = 1, | - |
102 | .offset = offsetof(POLICY_CONSTRAINTS, inhibitPolicyMapping), | - |
103 | .field_name = "inhibitPolicyMapping", | - |
104 | .item = &ASN1_INTEGER_it, | - |
105 | }, | - |
106 | }; | - |
107 | | - |
108 | const ASN1_ITEM POLICY_CONSTRAINTS_it = { | - |
109 | .itype = ASN1_ITYPE_SEQUENCE, | - |
110 | .utype = V_ASN1_SEQUENCE, | - |
111 | .templates = POLICY_CONSTRAINTS_seq_tt, | - |
112 | .tcount = sizeof(POLICY_CONSTRAINTS_seq_tt) / sizeof(ASN1_TEMPLATE), | - |
113 | .funcs = NULL, | - |
114 | .size = sizeof(POLICY_CONSTRAINTS), | - |
115 | .sname = "POLICY_CONSTRAINTS", | - |
116 | }; | - |
117 | | - |
118 | | - |
119 | POLICY_CONSTRAINTS * | - |
120 | POLICY_CONSTRAINTS_new(void) | - |
121 | { | - |
122 | return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); never executed: return (POLICY_CONSTRAINTS*)ASN1_item_new(&POLICY_CONSTRAINTS_it); | 0 |
123 | } | - |
124 | | - |
125 | void | - |
126 | POLICY_CONSTRAINTS_free(POLICY_CONSTRAINTS *a) | - |
127 | { | - |
128 | ASN1_item_free((ASN1_VALUE *)a, &POLICY_CONSTRAINTS_it); | - |
129 | }executed 1 time by 1 test: end of block | 1 |
130 | | - |
131 | static STACK_OF(CONF_VALUE) * | - |
132 | i2v_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, void *a, | - |
133 | STACK_OF(CONF_VALUE) *extlist) | - |
134 | { | - |
135 | POLICY_CONSTRAINTS *pcons = a; | - |
136 | | - |
137 | X509V3_add_value_int("Require Explicit Policy", | - |
138 | pcons->requireExplicitPolicy, &extlist); | - |
139 | X509V3_add_value_int("Inhibit Policy Mapping", | - |
140 | pcons->inhibitPolicyMapping, &extlist); | - |
141 | return extlist; never executed: return extlist; | 0 |
142 | } | - |
143 | | - |
144 | static void * | - |
145 | v2i_POLICY_CONSTRAINTS(const X509V3_EXT_METHOD *method, X509V3_CTX *ctx, | - |
146 | STACK_OF(CONF_VALUE) *values) | - |
147 | { | - |
148 | POLICY_CONSTRAINTS *pcons = NULL; | - |
149 | CONF_VALUE *val; | - |
150 | int i; | - |
151 | | - |
152 | if (!(pcons = POLICY_CONSTRAINTS_new())) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
153 | X509V3error(ERR_R_MALLOC_FAILURE); | - |
154 | return NULL; never executed: return ((void *)0) ; | 0 |
155 | } | - |
156 | for (i = 0; i < sk_CONF_VALUE_num(values); i++) {TRUE | never evaluated | FALSE | never evaluated |
| 0 |
157 | val = sk_CONF_VALUE_value(values, i); | - |
158 | if (!strcmp(val->name, "requireExplicitPolicy")) { never executed: __result = (((const unsigned char *) (const char *) ( val->name ))[3] - __s2[3]); never executed: end of block never executed: end of block never executed: __result = (((const unsigned char *) (const char *) ( "requireExplicitPolicy" ))[3] - __s2[3]); never executed: end of block never executed: end of block TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
| 0 |
159 | if (!X509V3_get_value_int(val,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
160 | &pcons->requireExplicitPolicy)) goto err; never executed: goto err; TRUE | never evaluated | FALSE | never evaluated |
| 0 |
161 | } else if (!strcmp(val->name, "inhibitPolicyMapping")) { never executed: end of block never executed: __result = (((const unsigned char *) (const char *) ( val->name ))[3] - __s2[3]); never executed: end of block never executed: end of block never executed: __result = (((const unsigned char *) (const char *) ( "inhibitPolicyMapping" ))[3] - __s2[3]); never executed: end of block never executed: end of block TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
| 0 |
162 | if (!X509V3_get_value_int(val,TRUE | never evaluated | FALSE | never evaluated |
| 0 |
163 | &pcons->inhibitPolicyMapping)) goto err; never executed: goto err; TRUE | never evaluated | FALSE | never evaluated |
| 0 |
164 | } else { never executed: end of block | 0 |
165 | X509V3error(X509V3_R_INVALID_NAME); | - |
166 | X509V3_conf_err(val); | - |
167 | goto err; never executed: goto err; | 0 |
168 | } | - |
169 | } | - |
170 | if (!pcons->inhibitPolicyMapping && !pcons->requireExplicitPolicy) {TRUE | never evaluated | FALSE | never evaluated |
TRUE | never evaluated | FALSE | never evaluated |
| 0 |
171 | X509V3error(X509V3_R_ILLEGAL_EMPTY_EXTENSION); | - |
172 | goto err; never executed: goto err; | 0 |
173 | } | - |
174 | | - |
175 | return pcons; never executed: return pcons; | 0 |
176 | | - |
177 | err: | - |
178 | POLICY_CONSTRAINTS_free(pcons); | - |
179 | return NULL; never executed: return ((void *)0) ; | 0 |
180 | } | - |
| | |