diff options
author | tb <> | 2023-04-26 21:35:22 +0000 |
---|---|---|
committer | tb <> | 2023-04-26 21:35:22 +0000 |
commit | 8abf9aa21fadc95679e23cec76adedbda7a3a294 (patch) | |
tree | f98e17846142fa0fb5e2a6bd52a6fafd02e1db6a /src | |
parent | 13cdd464cde839e4504655869d912e9913c00a18 (diff) | |
download | openbsd-8abf9aa21fadc95679e23cec76adedbda7a3a294.tar.gz openbsd-8abf9aa21fadc95679e23cec76adedbda7a3a294.tar.bz2 openbsd-8abf9aa21fadc95679e23cec76adedbda7a3a294.zip |
Turn C++ comments into C comments and minor KNF fixups
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libcrypto/x509/x509_policy.c | 434 |
1 files changed, 264 insertions, 170 deletions
diff --git a/src/lib/libcrypto/x509/x509_policy.c b/src/lib/libcrypto/x509/x509_policy.c index 6005acd4fb..4a3fb84f53 100644 --- a/src/lib/libcrypto/x509/x509_policy.c +++ b/src/lib/libcrypto/x509/x509_policy.c | |||
@@ -1,5 +1,6 @@ | |||
1 | /* $OpenBSD: x509_policy.c,v 1.10 2023/04/26 21:07:32 tb Exp $ */ | 1 | /* $OpenBSD: x509_policy.c,v 1.11 2023/04/26 21:35:22 tb Exp $ */ |
2 | /* Copyright (c) 2022, Google Inc. | 2 | /* |
3 | * Copyright (c) 2022, Google Inc. | ||
3 | * | 4 | * |
4 | * Permission to use, copy, modify, and/or distribute this software for any | 5 | * Permission to use, copy, modify, and/or distribute this software for any |
5 | * purpose with or without fee is hereby granted, provided that the above | 6 | * purpose with or without fee is hereby granted, provided that the above |
@@ -11,7 +12,8 @@ | |||
11 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | 12 | * SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
12 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION | 13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION |
13 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN | 14 | * OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN |
14 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ | 15 | * CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
16 | */ | ||
15 | 17 | ||
16 | #include <openssl/x509.h> | 18 | #include <openssl/x509.h> |
17 | 19 | ||
@@ -31,53 +33,64 @@ | |||
31 | /* XXX move to proper place */ | 33 | /* XXX move to proper place */ |
32 | #define X509_R_INVALID_POLICY_EXTENSION 201 | 34 | #define X509_R_INVALID_POLICY_EXTENSION 201 |
33 | 35 | ||
34 | // This file computes the X.509 policy tree, as described in RFC 5280, section | 36 | /* |
35 | // 6.1. It differs in that: | 37 | * This file computes the X.509 policy tree, as described in RFC 5280, section |
36 | // | 38 | * 6.1. It differs in that: |
37 | // (1) It does not track "qualifier_set". This is not needed as it is not | 39 | * |
38 | // output by this implementation. | 40 | * (1) It does not track "qualifier_set". This is not needed as it is not |
39 | // | 41 | * output by this implementation. |
40 | // (2) It builds a directed acyclic graph, rather than a tree. When a given | 42 | * |
41 | // policy matches multiple parents, RFC 5280 makes a separate node for | 43 | * (2) It builds a directed acyclic graph, rather than a tree. When a given |
42 | // each parent. This representation condenses them into one node with | 44 | * policy matches multiple parents, RFC 5280 makes a separate node for |
43 | // multiple parents. Thus we refer to this structure as a "policy graph", | 45 | * each parent. This representation condenses them into one node with |
44 | // rather than a "policy tree". | 46 | * multiple parents. Thus we refer to this structure as a "policy graph", |
45 | // | 47 | * rather than a "policy tree". |
46 | // (3) "expected_policy_set" is not tracked explicitly and built temporarily | 48 | * |
47 | // as part of building the graph. | 49 | * (3) "expected_policy_set" is not tracked explicitly and built temporarily |
48 | // | 50 | * as part of building the graph. |
49 | // (4) anyPolicy nodes are not tracked explicitly. | 51 | * |
50 | // | 52 | * (4) anyPolicy nodes are not tracked explicitly. |
51 | // (5) Some pruning steps are deferred to when policies are evaluated, as a | 53 | * |
52 | // reachability pass. | 54 | * (5) Some pruning steps are deferred to when policies are evaluated, as a |
53 | 55 | * reachability pass. | |
54 | // An X509_POLICY_NODE is a node in the policy graph. It corresponds to a node | 56 | */ |
55 | // from RFC 5280, section 6.1.2, step (a), but we store some fields differently. | 57 | |
58 | /* | ||
59 | * An X509_POLICY_NODE is a node in the policy graph. It corresponds to a node | ||
60 | * from RFC 5280, section 6.1.2, step (a), but we store some fields differently. | ||
61 | */ | ||
56 | typedef struct x509_policy_node_st { | 62 | typedef struct x509_policy_node_st { |
57 | // policy is the "valid_policy" field from RFC 5280. | 63 | /* policy is the "valid_policy" field from RFC 5280. */ |
58 | ASN1_OBJECT *policy; | 64 | ASN1_OBJECT *policy; |
59 | 65 | ||
60 | // parent_policies, if non-empty, is the list of "valid_policy" values for all | 66 | /* |
61 | // nodes which are a parent of this node. In this case, no entry in this list | 67 | * parent_policies, if non-empty, is the list of "valid_policy" values |
62 | // will be anyPolicy. This list is in no particular order and may contain | 68 | * for all nodes which are a parent of this node. In this case, no entry |
63 | // duplicates if the corresponding certificate had duplicate mappings. | 69 | * in this list will be anyPolicy. This list is in no particular order |
64 | // | 70 | * and may contain duplicates if the corresponding certificate had |
65 | // If empty, this node has a single parent, anyPolicy. The node is then a root | 71 | * duplicate mappings. |
66 | // policies, and is in authorities-constrained-policy-set if it has a path to | 72 | * |
67 | // a leaf node. | 73 | * If empty, this node has a single parent, anyPolicy. The node is then |
68 | // | 74 | * a root policies, and is in authorities-constrained-policy-set if it |
69 | // Note it is not possible for a policy to have both anyPolicy and a | 75 | * has a path to a leaf node. |
70 | // concrete policy as a parent. Section 6.1.3, step (d.1.ii) only runs if | 76 | * |
71 | // there was no match in step (d.1.i). We do not need to represent a parent | 77 | * Note it is not possible for a policy to have both anyPolicy and a |
72 | // list of, say, {anyPolicy, OID1, OID2}. | 78 | * concrete policy as a parent. Section 6.1.3, step (d.1.ii) only runs |
79 | * if there was no match in step (d.1.i). We do not need to represent a | ||
80 | * parent list of, say, {anyPolicy, OID1, OID2}. | ||
81 | */ | ||
73 | STACK_OF(ASN1_OBJECT) *parent_policies; | 82 | STACK_OF(ASN1_OBJECT) *parent_policies; |
74 | 83 | ||
75 | // mapped is one if this node matches a policy mapping in the certificate and | 84 | /* |
76 | // zero otherwise. | 85 | * mapped is one if this node matches a policy mapping in the |
86 | * certificate and zero otherwise. | ||
87 | */ | ||
77 | int mapped; | 88 | int mapped; |
78 | 89 | ||
79 | // reachable is one if this node is reachable from some valid policy in the | 90 | /* |
80 | // end-entity certificate. It is computed during |has_explicit_policy|. | 91 | * reachable is one if this node is reachable from some valid policy in |
92 | * the end-entity certificate. It is computed during |has_explicit_policy|. | ||
93 | */ | ||
81 | int reachable; | 94 | int reachable; |
82 | } X509_POLICY_NODE; | 95 | } X509_POLICY_NODE; |
83 | 96 | ||
@@ -105,16 +118,22 @@ DECLARE_STACK_OF(X509_POLICY_NODE) | |||
105 | #define sk_X509_POLICY_NODE_sort(st) SKM_sk_sort(X509_POLICY_NODE, (st)) | 118 | #define sk_X509_POLICY_NODE_sort(st) SKM_sk_sort(X509_POLICY_NODE, (st)) |
106 | #define sk_X509_POLICY_NODE_is_sorted(st) SKM_sk_is_sorted(X509_POLICY_NODE, (st)) | 119 | #define sk_X509_POLICY_NODE_is_sorted(st) SKM_sk_is_sorted(X509_POLICY_NODE, (st)) |
107 | 120 | ||
108 | // An X509_POLICY_LEVEL is the collection of nodes at the same depth in the | 121 | /* |
109 | // policy graph. This structure can also be used to represent a level's | 122 | * An X509_POLICY_LEVEL is the collection of nodes at the same depth in the |
110 | // "expected_policy_set" values. See |process_policy_mappings|. | 123 | * policy graph. This structure can also be used to represent a level's |
124 | * "expected_policy_set" values. See |process_policy_mappings|. | ||
125 | */ | ||
111 | typedef struct x509_policy_level_st { | 126 | typedef struct x509_policy_level_st { |
112 | // nodes is the list of nodes at this depth, except for the anyPolicy node, if | 127 | /* |
113 | // any. This list is sorted by policy OID for efficient lookup. | 128 | * nodes is the list of nodes at this depth, except for the anyPolicy |
129 | * node, if any. This list is sorted by policy OID for efficient lookup. | ||
130 | */ | ||
114 | STACK_OF(X509_POLICY_NODE) *nodes; | 131 | STACK_OF(X509_POLICY_NODE) *nodes; |
115 | 132 | ||
116 | // has_any_policy is one if there is an anyPolicy node at this depth, and zero | 133 | /* |
117 | // otherwise. | 134 | * has_any_policy is one if there is an anyPolicy node at this depth, |
135 | * and zero otherwise. | ||
136 | */ | ||
118 | int has_any_policy; | 137 | int has_any_policy; |
119 | } X509_POLICY_LEVEL; | 138 | } X509_POLICY_LEVEL; |
120 | 139 | ||
@@ -251,8 +270,10 @@ x509_policy_level_clear(X509_POLICY_LEVEL *level) | |||
251 | sk_X509_POLICY_NODE_zero(level->nodes); | 270 | sk_X509_POLICY_NODE_zero(level->nodes); |
252 | } | 271 | } |
253 | 272 | ||
254 | // x509_policy_level_find returns the node in |level| corresponding to |policy|, | 273 | /* |
255 | // or NULL if none exists. | 274 | * x509_policy_level_find returns the node in |level| corresponding to |policy|, |
275 | * or NULL if none exists. | ||
276 | */ | ||
256 | static X509_POLICY_NODE * | 277 | static X509_POLICY_NODE * |
257 | x509_policy_level_find(X509_POLICY_LEVEL *level, | 278 | x509_policy_level_find(X509_POLICY_LEVEL *level, |
258 | const ASN1_OBJECT *policy) | 279 | const ASN1_OBJECT *policy) |
@@ -267,13 +288,15 @@ x509_policy_level_find(X509_POLICY_LEVEL *level, | |||
267 | return sk_X509_POLICY_NODE_value(level->nodes, idx); | 288 | return sk_X509_POLICY_NODE_value(level->nodes, idx); |
268 | } | 289 | } |
269 | 290 | ||
270 | // x509_policy_level_add_nodes adds the nodes in |nodes| to |level|. It returns | 291 | /* |
271 | // one on success and zero on error. No policy in |nodes| may already be present | 292 | * x509_policy_level_add_nodes adds the nodes in |nodes| to |level|. It returns |
272 | // in |level|. This function modifies |nodes| to avoid making a copy, but the | 293 | * one on success and zero on error. No policy in |nodes| may already be present |
273 | // caller is still responsible for releasing |nodes| itself. | 294 | * in |level|. This function modifies |nodes| to avoid making a copy, but the |
274 | // | 295 | * caller is still responsible for releasing |nodes| itself. |
275 | // This function is used to add nodes to |level| in bulk, and avoid resorting | 296 | * |
276 | // |level| after each addition. | 297 | * This function is used to add nodes to |level| in bulk, and avoid resorting |
298 | * |level| after each addition. | ||
299 | */ | ||
277 | static int | 300 | static int |
278 | x509_policy_level_add_nodes(X509_POLICY_LEVEL *level, | 301 | x509_policy_level_add_nodes(X509_POLICY_LEVEL *level, |
279 | STACK_OF(X509_POLICY_NODE) *nodes) | 302 | STACK_OF(X509_POLICY_NODE) *nodes) |
@@ -288,7 +311,7 @@ x509_policy_level_add_nodes(X509_POLICY_LEVEL *level, | |||
288 | sk_X509_POLICY_NODE_sort(level->nodes); | 311 | sk_X509_POLICY_NODE_sort(level->nodes); |
289 | 312 | ||
290 | #if !defined(NDEBUG) | 313 | #if !defined(NDEBUG) |
291 | // There should be no duplicate nodes. | 314 | /* There should be no duplicate nodes. */ |
292 | for (size_t i = 1; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { | 315 | for (size_t i = 1; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { |
293 | assert( | 316 | assert( |
294 | OBJ_cmp( | 317 | OBJ_cmp( |
@@ -320,13 +343,15 @@ delete_if_not_in_policies(X509_POLICY_NODE *node, void *data) | |||
320 | return 1; | 343 | return 1; |
321 | } | 344 | } |
322 | 345 | ||
323 | // process_certificate_policies updates |level| to incorporate |x509|'s | 346 | /* |
324 | // certificate policies extension. This implements steps (d) and (e) of RFC | 347 | * process_certificate_policies updates |level| to incorporate |x509|'s |
325 | // 5280, section 6.1.3. |level| must contain the previous level's | 348 | * certificate policies extension. This implements steps (d) and (e) of RFC |
326 | // "expected_policy_set" information. For all but the top-most level, this is | 349 | * 5280, section 6.1.3. |level| must contain the previous level's |
327 | // the output of |process_policy_mappings|. |any_policy_allowed| specifies | 350 | * "expected_policy_set" information. For all but the top-most level, this is |
328 | // whether anyPolicy is allowed or inhibited, taking into account the exception | 351 | * the output of |process_policy_mappings|. |any_policy_allowed| specifies |
329 | // for self-issued certificates. | 352 | * whether anyPolicy is allowed or inhibited, taking into account the exception |
353 | * for self-issued certificates. | ||
354 | */ | ||
330 | static int | 355 | static int |
331 | process_certificate_policies(const X509 *x509, | 356 | process_certificate_policies(const X509 *x509, |
332 | X509_POLICY_LEVEL *level, | 357 | X509_POLICY_LEVEL *level, |
@@ -339,16 +364,18 @@ process_certificate_policies(const X509 *x509, | |||
339 | X509_get_ext_d2i(x509, NID_certificate_policies, &critical, NULL); | 364 | X509_get_ext_d2i(x509, NID_certificate_policies, &critical, NULL); |
340 | if (policies == NULL) { | 365 | if (policies == NULL) { |
341 | if (critical != -1) { | 366 | if (critical != -1) { |
342 | return 0; // Syntax error in the extension. | 367 | return 0; /* Syntax error in the extension. */ |
343 | } | 368 | } |
344 | 369 | ||
345 | // RFC 5280, section 6.1.3, step (e). | 370 | /* RFC 5280, section 6.1.3, step (e). */ |
346 | x509_policy_level_clear(level); | 371 | x509_policy_level_clear(level); |
347 | return 1; | 372 | return 1; |
348 | } | 373 | } |
349 | 374 | ||
350 | // certificatePolicies may not be empty. See RFC 5280, section 4.2.1.4. | 375 | /* |
351 | // TODO(https://crbug.com/boringssl/443): Move this check into the parser. | 376 | * certificatePolicies may not be empty. See RFC 5280, section 4.2.1.4. |
377 | * TODO(https://crbug.com/boringssl/443): Move this check into the parser. | ||
378 | */ | ||
352 | if (sk_POLICYINFO_num(policies) == 0) { | 379 | if (sk_POLICYINFO_num(policies) == 0) { |
353 | X509error(X509_R_INVALID_POLICY_EXTENSION); | 380 | X509error(X509_R_INVALID_POLICY_EXTENSION); |
354 | goto err; | 381 | goto err; |
@@ -365,27 +392,38 @@ process_certificate_policies(const X509 *x509, | |||
365 | if (i > 0 && | 392 | if (i > 0 && |
366 | OBJ_cmp(sk_POLICYINFO_value(policies, i - 1)->policyid, | 393 | OBJ_cmp(sk_POLICYINFO_value(policies, i - 1)->policyid, |
367 | policy->policyid) == 0) { | 394 | policy->policyid) == 0) { |
368 | // Per RFC 5280, section 4.2.1.4, |policies| may not have duplicates. | 395 | /* |
396 | * Per RFC 5280, section 4.2.1.4, |policies| may not | ||
397 | * have duplicates. | ||
398 | */ | ||
369 | X509error(X509_R_INVALID_POLICY_EXTENSION); | 399 | X509error(X509_R_INVALID_POLICY_EXTENSION); |
370 | goto err; | 400 | goto err; |
371 | } | 401 | } |
372 | } | 402 | } |
373 | 403 | ||
374 | // This does the same thing as RFC 5280, section 6.1.3, step (d), though in | 404 | /* |
375 | // a slighty different order. |level| currently contains "expected_policy_set" | 405 | * This does the same thing as RFC 5280, section 6.1.3, step (d), |
376 | // values of the previous level. See |process_policy_mappings| for details. | 406 | * though in a slighty different order. |level| currently contains |
407 | * "expected_policy_set" values of the previous level. | ||
408 | * See |process_policy_mappings| for details. | ||
409 | */ | ||
377 | const int previous_level_has_any_policy = level->has_any_policy; | 410 | const int previous_level_has_any_policy = level->has_any_policy; |
378 | 411 | ||
379 | // First, we handle steps (d.1.i) and (d.2). The net effect of these two steps | 412 | /* |
380 | // is to intersect |level| with |policies|, ignoring anyPolicy if it is | 413 | * First, we handle steps (d.1.i) and (d.2). The net effect of these |
381 | // inhibited. | 414 | * two steps is to intersect |level| with |policies|, ignoring |
415 | * anyPolicy if it is inhibited. | ||
416 | */ | ||
382 | if (!cert_has_any_policy || !any_policy_allowed) { | 417 | if (!cert_has_any_policy || !any_policy_allowed) { |
383 | sk_X509_POLICY_NODE_delete_if(level->nodes, | 418 | sk_X509_POLICY_NODE_delete_if(level->nodes, |
384 | delete_if_not_in_policies, policies); | 419 | delete_if_not_in_policies, policies); |
385 | level->has_any_policy = 0; | 420 | level->has_any_policy = 0; |
386 | } | 421 | } |
387 | 422 | ||
388 | // Step (d.1.ii) may attach new nodes to the previous level's anyPolicy node. | 423 | /* |
424 | * Step (d.1.ii) may attach new nodes to the previous level's anyPolicy | ||
425 | * node. | ||
426 | */ | ||
389 | if (previous_level_has_any_policy) { | 427 | if (previous_level_has_any_policy) { |
390 | new_nodes = sk_X509_POLICY_NODE_new_null(); | 428 | new_nodes = sk_X509_POLICY_NODE_new_null(); |
391 | if (new_nodes == NULL) { | 429 | if (new_nodes == NULL) { |
@@ -394,14 +432,17 @@ process_certificate_policies(const X509 *x509, | |||
394 | for (size_t i = 0; i < sk_POLICYINFO_num(policies); i++) { | 432 | for (size_t i = 0; i < sk_POLICYINFO_num(policies); i++) { |
395 | const POLICYINFO *policy = sk_POLICYINFO_value(policies, | 433 | const POLICYINFO *policy = sk_POLICYINFO_value(policies, |
396 | i); | 434 | i); |
397 | // Though we've reordered the steps slightly, |policy| is in |level| if | 435 | /* |
398 | // and only if it would have been a match in step (d.1.ii). | 436 | * Though we've reordered the steps slightly, |policy| |
437 | * is in |level| if and only if it would have been a | ||
438 | * match in step (d.1.ii). | ||
439 | */ | ||
399 | if (!is_any_policy(policy->policyid) && | 440 | if (!is_any_policy(policy->policyid) && |
400 | x509_policy_level_find(level, policy->policyid) == | 441 | x509_policy_level_find(level, policy->policyid) == |
401 | NULL) { | 442 | NULL) { |
402 | X509_POLICY_NODE *node = x509_policy_node_new( | 443 | X509_POLICY_NODE *node = x509_policy_node_new( |
403 | policy->policyid); | 444 | policy->policyid); |
404 | if (node == NULL || // | 445 | if (node == NULL || |
405 | !sk_X509_POLICY_NODE_push(new_nodes, | 446 | !sk_X509_POLICY_NODE_push(new_nodes, |
406 | node)) { | 447 | node)) { |
407 | x509_policy_node_free(node); | 448 | x509_policy_node_free(node); |
@@ -440,7 +481,7 @@ static int | |||
440 | delete_if_mapped(X509_POLICY_NODE *node, void *data) | 481 | delete_if_mapped(X509_POLICY_NODE *node, void *data) |
441 | { | 482 | { |
442 | const POLICY_MAPPINGS *mappings = data; | 483 | const POLICY_MAPPINGS *mappings = data; |
443 | // |mappings| must have been sorted by |compare_issuer_policy|. | 484 | /* |mappings| must have been sorted by |compare_issuer_policy|. */ |
444 | assert(sk_POLICY_MAPPING_is_sorted(mappings)); | 485 | assert(sk_POLICY_MAPPING_is_sorted(mappings)); |
445 | POLICY_MAPPING mapping; | 486 | POLICY_MAPPING mapping; |
446 | mapping.issuerDomainPolicy = node->policy; | 487 | mapping.issuerDomainPolicy = node->policy; |
@@ -451,22 +492,24 @@ delete_if_mapped(X509_POLICY_NODE *node, void *data) | |||
451 | return 1; | 492 | return 1; |
452 | } | 493 | } |
453 | 494 | ||
454 | // process_policy_mappings processes the policy mappings extension of |cert|, | 495 | /* |
455 | // whose corresponding graph level is |level|. |mapping_allowed| specifies | 496 | * process_policy_mappings processes the policy mappings extension of |cert|, |
456 | // whether policy mapping is inhibited at this point. On success, it returns an | 497 | * whose corresponding graph level is |level|. |mapping_allowed| specifies |
457 | // |X509_POLICY_LEVEL| containing the "expected_policy_set" for |level|. On | 498 | * whether policy mapping is inhibited at this point. On success, it returns an |
458 | // error, it returns NULL. This implements steps (a) and (b) of RFC 5280, | 499 | * |X509_POLICY_LEVEL| containing the "expected_policy_set" for |level|. On |
459 | // section 6.1.4. | 500 | * error, it returns NULL. This implements steps (a) and (b) of RFC 5280, |
460 | // | 501 | * section 6.1.4. |
461 | // We represent the "expected_policy_set" as an |X509_POLICY_LEVEL|. | 502 | * |
462 | // |has_any_policy| indicates whether there is an anyPolicy node with | 503 | * We represent the "expected_policy_set" as an |X509_POLICY_LEVEL|. |
463 | // "expected_policy_set" of {anyPolicy}. If a node with policy oid P1 contains | 504 | * |has_any_policy| indicates whether there is an anyPolicy node with |
464 | // P2 in its "expected_policy_set", the level will contain a node of policy P2 | 505 | * "expected_policy_set" of {anyPolicy}. If a node with policy oid P1 contains |
465 | // with P1 in |parent_policies|. | 506 | * P2 in its "expected_policy_set", the level will contain a node of policy P2 |
466 | // | 507 | * with P1 in |parent_policies|. |
467 | // This is equivalent to the |X509_POLICY_LEVEL| that would result if the next | 508 | * |
468 | // certificats contained anyPolicy. |process_certificate_policies| will filter | 509 | * This is equivalent to the |X509_POLICY_LEVEL| that would result if the next |
469 | // this result down to compute the actual level. | 510 | * certificats contained anyPolicy. |process_certificate_policies| will filter |
511 | * this result down to compute the actual level. | ||
512 | */ | ||
470 | static X509_POLICY_LEVEL * | 513 | static X509_POLICY_LEVEL * |
471 | process_policy_mappings(const X509 *cert, | 514 | process_policy_mappings(const X509 *cert, |
472 | X509_POLICY_LEVEL *level, | 515 | X509_POLICY_LEVEL *level, |
@@ -479,35 +522,40 @@ process_policy_mappings(const X509 *cert, | |||
479 | POLICY_MAPPINGS *mappings = | 522 | POLICY_MAPPINGS *mappings = |
480 | X509_get_ext_d2i(cert, NID_policy_mappings, &critical, NULL); | 523 | X509_get_ext_d2i(cert, NID_policy_mappings, &critical, NULL); |
481 | if (mappings == NULL && critical != -1) { | 524 | if (mappings == NULL && critical != -1) { |
482 | // Syntax error in the policy mappings extension. | 525 | /* Syntax error in the policy mappings extension. */ |
483 | goto err; | 526 | goto err; |
484 | } | 527 | } |
485 | 528 | ||
486 | if (mappings != NULL) { | 529 | if (mappings != NULL) { |
487 | // PolicyMappings may not be empty. See RFC 5280, section 4.2.1.5. | 530 | /* |
488 | // TODO(https://crbug.com/boringssl/443): Move this check into the parser. | 531 | * PolicyMappings may not be empty. See RFC 5280, section 4.2.1.5. |
532 | * TODO(https://crbug.com/boringssl/443): Move this check into | ||
533 | * the parser. | ||
534 | */ | ||
489 | if (sk_POLICY_MAPPING_num(mappings) == 0) { | 535 | if (sk_POLICY_MAPPING_num(mappings) == 0) { |
490 | X509error(X509_R_INVALID_POLICY_EXTENSION); | 536 | X509error(X509_R_INVALID_POLICY_EXTENSION); |
491 | goto err; | 537 | goto err; |
492 | } | 538 | } |
493 | 539 | ||
494 | // RFC 5280, section 6.1.4, step (a). | 540 | /* RFC 5280, section 6.1.4, step (a). */ |
495 | for (size_t i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) { | 541 | for (size_t i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) { |
496 | POLICY_MAPPING *mapping = sk_POLICY_MAPPING_value(mappings, | 542 | POLICY_MAPPING *mapping = sk_POLICY_MAPPING_value(mappings, i); |
497 | i); | ||
498 | if (is_any_policy(mapping->issuerDomainPolicy) || | 543 | if (is_any_policy(mapping->issuerDomainPolicy) || |
499 | is_any_policy(mapping->subjectDomainPolicy)) { | 544 | is_any_policy(mapping->subjectDomainPolicy)) { |
500 | goto err; | 545 | goto err; |
501 | } | 546 | } |
502 | } | 547 | } |
503 | 548 | ||
504 | // Sort to group by issuerDomainPolicy. | 549 | /* Sort to group by issuerDomainPolicy. */ |
505 | sk_POLICY_MAPPING_set_cmp_func(mappings, compare_issuer_policy); | 550 | sk_POLICY_MAPPING_set_cmp_func(mappings, compare_issuer_policy); |
506 | sk_POLICY_MAPPING_sort(mappings); | 551 | sk_POLICY_MAPPING_sort(mappings); |
507 | 552 | ||
508 | if (mapping_allowed) { | 553 | if (mapping_allowed) { |
509 | // Mark nodes as mapped, and add any nodes to |level| which may be needed | 554 | /* |
510 | // as part of RFC 5280, section 6.1.4, step (b.1). | 555 | * Mark nodes as mapped, and add any nodes to |level| |
556 | * which may be needed as part of RFC 5280, | ||
557 | * section 6.1.4, step (b.1). | ||
558 | */ | ||
511 | new_nodes = sk_X509_POLICY_NODE_new_null(); | 559 | new_nodes = sk_X509_POLICY_NODE_new_null(); |
512 | if (new_nodes == NULL) { | 560 | if (new_nodes == NULL) { |
513 | goto err; | 561 | goto err; |
@@ -517,7 +565,10 @@ process_policy_mappings(const X509 *cert, | |||
517 | i++) { | 565 | i++) { |
518 | const POLICY_MAPPING *mapping = sk_POLICY_MAPPING_value(mappings, | 566 | const POLICY_MAPPING *mapping = sk_POLICY_MAPPING_value(mappings, |
519 | i); | 567 | i); |
520 | // There may be multiple mappings with the same |issuerDomainPolicy|. | 568 | /* |
569 | * There may be multiple mappings with the same | ||
570 | * |issuerDomainPolicy|. | ||
571 | */ | ||
521 | if (last_policy != NULL && | 572 | if (last_policy != NULL && |
522 | OBJ_cmp(mapping->issuerDomainPolicy, | 573 | OBJ_cmp(mapping->issuerDomainPolicy, |
523 | last_policy) == 0) { | 574 | last_policy) == 0) { |
@@ -534,7 +585,7 @@ process_policy_mappings(const X509 *cert, | |||
534 | } | 585 | } |
535 | node = x509_policy_node_new( | 586 | node = x509_policy_node_new( |
536 | mapping->issuerDomainPolicy); | 587 | mapping->issuerDomainPolicy); |
537 | if (node == NULL || // | 588 | if (node == NULL || |
538 | !sk_X509_POLICY_NODE_push(new_nodes, | 589 | !sk_X509_POLICY_NODE_push(new_nodes, |
539 | node)) { | 590 | node)) { |
540 | x509_policy_node_free(node); | 591 | x509_policy_node_free(node); |
@@ -547,8 +598,10 @@ process_policy_mappings(const X509 *cert, | |||
547 | goto err; | 598 | goto err; |
548 | } | 599 | } |
549 | } else { | 600 | } else { |
550 | // RFC 5280, section 6.1.4, step (b.2). If mapping is inhibited, delete | 601 | /* |
551 | // all mapped nodes. | 602 | * RFC 5280, section 6.1.4, step (b.2). If mapping is |
603 | * inhibited, delete all mapped nodes. | ||
604 | */ | ||
552 | sk_X509_POLICY_NODE_delete_if(level->nodes, | 605 | sk_X509_POLICY_NODE_delete_if(level->nodes, |
553 | delete_if_mapped, mappings); | 606 | delete_if_mapped, mappings); |
554 | sk_POLICY_MAPPING_pop_free(mappings, | 607 | sk_POLICY_MAPPING_pop_free(mappings, |
@@ -557,8 +610,10 @@ process_policy_mappings(const X509 *cert, | |||
557 | } | 610 | } |
558 | } | 611 | } |
559 | 612 | ||
560 | // If a node was not mapped, it retains the original "explicit_policy_set" | 613 | /* |
561 | // value, itself. Add those to |mappings|. | 614 | * If a node was not mapped, it retains the original "explicit_policy_set" |
615 | * value, itself. Add those to |mappings|. | ||
616 | */ | ||
562 | if (mappings == NULL) { | 617 | if (mappings == NULL) { |
563 | mappings = sk_POLICY_MAPPING_new_null(); | 618 | mappings = sk_POLICY_MAPPING_new_null(); |
564 | if (mappings == NULL) { | 619 | if (mappings == NULL) { |
@@ -584,11 +639,11 @@ process_policy_mappings(const X509 *cert, | |||
584 | } | 639 | } |
585 | } | 640 | } |
586 | 641 | ||
587 | // Sort to group by subjectDomainPolicy. | 642 | /* Sort to group by subjectDomainPolicy. */ |
588 | sk_POLICY_MAPPING_set_cmp_func(mappings, compare_subject_policy); | 643 | sk_POLICY_MAPPING_set_cmp_func(mappings, compare_subject_policy); |
589 | sk_POLICY_MAPPING_sort(mappings); | 644 | sk_POLICY_MAPPING_sort(mappings); |
590 | 645 | ||
591 | // Convert |mappings| to our "expected_policy_set" representation. | 646 | /* Convert |mappings| to our "expected_policy_set" representation. */ |
592 | next = x509_policy_level_new(); | 647 | next = x509_policy_level_new(); |
593 | if (next == NULL) { | 648 | if (next == NULL) { |
594 | goto err; | 649 | goto err; |
@@ -598,7 +653,10 @@ process_policy_mappings(const X509 *cert, | |||
598 | X509_POLICY_NODE *last_node = NULL; | 653 | X509_POLICY_NODE *last_node = NULL; |
599 | for (size_t i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) { | 654 | for (size_t i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) { |
600 | POLICY_MAPPING *mapping = sk_POLICY_MAPPING_value(mappings, i); | 655 | POLICY_MAPPING *mapping = sk_POLICY_MAPPING_value(mappings, i); |
601 | // Skip mappings where |issuerDomainPolicy| does not appear in the graph. | 656 | /* |
657 | * Skip mappings where |issuerDomainPolicy| does not appear in | ||
658 | * the graph. | ||
659 | */ | ||
602 | if (!level->has_any_policy && | 660 | if (!level->has_any_policy && |
603 | x509_policy_level_find(level, | 661 | x509_policy_level_find(level, |
604 | mapping->issuerDomainPolicy) == NULL) { | 662 | mapping->issuerDomainPolicy) == NULL) { |
@@ -638,9 +696,11 @@ err: | |||
638 | return next; | 696 | return next; |
639 | } | 697 | } |
640 | 698 | ||
641 | // apply_skip_certs, if |skip_certs| is non-NULL, sets |*value| to the minimum | 699 | /* |
642 | // of its current value and |skip_certs|. It returns one on success and zero if | 700 | * apply_skip_certs, if |skip_certs| is non-NULL, sets |*value| to the minimum |
643 | // |skip_certs| is negative. | 701 | * of its current value and |skip_certs|. It returns one on success and zero if |
702 | * |skip_certs| is negative. | ||
703 | */ | ||
644 | static int | 704 | static int |
645 | apply_skip_certs(const ASN1_INTEGER *skip_certs, size_t *value) | 705 | apply_skip_certs(const ASN1_INTEGER *skip_certs, size_t *value) |
646 | { | 706 | { |
@@ -648,13 +708,13 @@ apply_skip_certs(const ASN1_INTEGER *skip_certs, size_t *value) | |||
648 | return 1; | 708 | return 1; |
649 | } | 709 | } |
650 | 710 | ||
651 | // TODO(https://crbug.com/boringssl/443): Move this check into the parser. | 711 | /* TODO(https://crbug.com/boringssl/443): Move this check into the parser. */ |
652 | if (skip_certs->type & V_ASN1_NEG) { | 712 | if (skip_certs->type & V_ASN1_NEG) { |
653 | X509error(X509_R_INVALID_POLICY_EXTENSION); | 713 | X509error(X509_R_INVALID_POLICY_EXTENSION); |
654 | return 0; | 714 | return 0; |
655 | } | 715 | } |
656 | 716 | ||
657 | // If |skip_certs| does not fit in |uint64_t|, it must exceed |*value|. | 717 | /* If |skip_certs| does not fit in |uint64_t|, it must exceed |*value|. */ |
658 | uint64_t u64; | 718 | uint64_t u64; |
659 | if (ASN1_INTEGER_get_uint64(&u64, skip_certs) && u64 < *value) { | 719 | if (ASN1_INTEGER_get_uint64(&u64, skip_certs) && u64 < *value) { |
660 | *value = (size_t)u64; | 720 | *value = (size_t)u64; |
@@ -663,10 +723,12 @@ apply_skip_certs(const ASN1_INTEGER *skip_certs, size_t *value) | |||
663 | return 1; | 723 | return 1; |
664 | } | 724 | } |
665 | 725 | ||
666 | // process_policy_constraints updates |*explicit_policy|, |*policy_mapping|, and | 726 | /* |
667 | // |*inhibit_any_policy| according to |x509|'s policy constraints and inhibit | 727 | * process_policy_constraints updates |*explicit_policy|, |*policy_mapping|, and |
668 | // anyPolicy extensions. It returns one on success and zero on error. This | 728 | * |*inhibit_any_policy| according to |x509|'s policy constraints and inhibit |
669 | // implements steps (i) and (j) of RFC 5280, section 6.1.4. | 729 | * anyPolicy extensions. It returns one on success and zero on error. This |
730 | * implements steps (i) and (j) of RFC 5280, section 6.1.4. | ||
731 | */ | ||
670 | static int | 732 | static int |
671 | process_policy_constraints(const X509 *x509, size_t *explicit_policy, | 733 | process_policy_constraints(const X509 *x509, size_t *explicit_policy, |
672 | size_t *policy_mapping, | 734 | size_t *policy_mapping, |
@@ -681,8 +743,10 @@ process_policy_constraints(const X509 *x509, size_t *explicit_policy, | |||
681 | if (constraints != NULL) { | 743 | if (constraints != NULL) { |
682 | if (constraints->requireExplicitPolicy == NULL && | 744 | if (constraints->requireExplicitPolicy == NULL && |
683 | constraints->inhibitPolicyMapping == NULL) { | 745 | constraints->inhibitPolicyMapping == NULL) { |
684 | // Per RFC 5280, section 4.2.1.11, at least one of the fields must be | 746 | /* |
685 | // present. | 747 | * Per RFC 5280, section 4.2.1.11, at least one of the |
748 | * fields must be | ||
749 | */ | ||
686 | X509error(X509_R_INVALID_POLICY_EXTENSION); | 750 | X509error(X509_R_INVALID_POLICY_EXTENSION); |
687 | POLICY_CONSTRAINTS_free(constraints); | 751 | POLICY_CONSTRAINTS_free(constraints); |
688 | return 0; | 752 | return 0; |
@@ -708,11 +772,13 @@ process_policy_constraints(const X509 *x509, size_t *explicit_policy, | |||
708 | return ok; | 772 | return ok; |
709 | } | 773 | } |
710 | 774 | ||
711 | // has_explicit_policy returns one if the set of authority-space policy OIDs | 775 | /* |
712 | // |levels| has some non-empty intersection with |user_policies|, and zero | 776 | * has_explicit_policy returns one if the set of authority-space policy OIDs |
713 | // otherwise. This mirrors the logic in RFC 5280, section 6.1.5, step (g). This | 777 | * |levels| has some non-empty intersection with |user_policies|, and zero |
714 | // function modifies |levels| and should only be called at the end of policy | 778 | * otherwise. This mirrors the logic in RFC 5280, section 6.1.5, step (g). This |
715 | // evaluation. | 779 | * function modifies |levels| and should only be called at the end of policy |
780 | * evaluation. | ||
781 | */ | ||
716 | static int | 782 | static int |
717 | has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, | 783 | has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, |
718 | const STACK_OF(ASN1_OBJECT) *user_policies) | 784 | const STACK_OF(ASN1_OBJECT) *user_policies) |
@@ -720,7 +786,7 @@ has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, | |||
720 | assert(user_policies == NULL || | 786 | assert(user_policies == NULL || |
721 | sk_ASN1_OBJECT_is_sorted(user_policies)); | 787 | sk_ASN1_OBJECT_is_sorted(user_policies)); |
722 | 788 | ||
723 | // Step (g.i). If the policy graph is empty, the intersection is empty. | 789 | /* Step (g.i). If the policy graph is empty, the intersection is empty. */ |
724 | size_t num_levels = sk_X509_POLICY_LEVEL_num(levels); | 790 | size_t num_levels = sk_X509_POLICY_LEVEL_num(levels); |
725 | X509_POLICY_LEVEL *level = sk_X509_POLICY_LEVEL_value(levels, | 791 | X509_POLICY_LEVEL *level = sk_X509_POLICY_LEVEL_value(levels, |
726 | num_levels - 1); | 792 | num_levels - 1); |
@@ -728,8 +794,11 @@ has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, | |||
728 | return 0; | 794 | return 0; |
729 | } | 795 | } |
730 | 796 | ||
731 | // If |user_policies| is empty, we interpret it as having a single anyPolicy | 797 | /* |
732 | // value. The caller may also have supplied anyPolicy explicitly. | 798 | * If |user_policies| is empty, we interpret it as having a single |
799 | * anyPolicy value. The caller may also have supplied anyPolicy | ||
800 | * explicitly. | ||
801 | */ | ||
733 | int user_has_any_policy = sk_ASN1_OBJECT_num(user_policies) == 0; | 802 | int user_has_any_policy = sk_ASN1_OBJECT_num(user_policies) == 0; |
734 | for (size_t i = 0; i < sk_ASN1_OBJECT_num(user_policies); i++) { | 803 | for (size_t i = 0; i < sk_ASN1_OBJECT_num(user_policies); i++) { |
735 | if (is_any_policy(sk_ASN1_OBJECT_value(user_policies, i))) { | 804 | if (is_any_policy(sk_ASN1_OBJECT_value(user_policies, i))) { |
@@ -738,23 +807,29 @@ has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, | |||
738 | } | 807 | } |
739 | } | 808 | } |
740 | 809 | ||
741 | // Step (g.ii). If the policy graph is not empty and the user set contains | 810 | /* |
742 | // anyPolicy, the intersection is the entire (non-empty) graph. | 811 | * Step (g.ii). If the policy graph is not empty and the user set |
812 | * contains anyPolicy, the intersection is the entire (non-empty) graph. | ||
813 | */ | ||
743 | if (user_has_any_policy) { | 814 | if (user_has_any_policy) { |
744 | return 1; | 815 | return 1; |
745 | } | 816 | } |
746 | 817 | ||
747 | // Step (g.iii) does not delete anyPolicy nodes, so if the graph has | 818 | /* |
748 | // anyPolicy, some explicit policy will survive. The actual intersection may | 819 | * Step (g.iii) does not delete anyPolicy nodes, so if the graph has |
749 | // synthesize some nodes in step (g.iii.3), but we do not return the policy | 820 | * anyPolicy, some explicit policy will survive. The actual intersection |
750 | // list itself, so we skip actually computing this. | 821 | * may synthesize some nodes in step (g.iii.3), but we do not return the |
822 | * policy list itself, so we skip actually computing this. | ||
823 | */ | ||
751 | if (level->has_any_policy) { | 824 | if (level->has_any_policy) { |
752 | return 1; | 825 | return 1; |
753 | } | 826 | } |
754 | 827 | ||
755 | // We defer pruning the tree, so as we look for nodes with parent anyPolicy, | 828 | /* |
756 | // step (g.iii.1), we must limit to nodes reachable from the bottommost level. | 829 | * We defer pruning the tree, so as we look for nodes with parent |
757 | // Start by marking each of those nodes as reachable. | 830 | * anyPolicy, step (g.iii.1), we must limit to nodes reachable from the |
831 | * bottommost level. Start by marking each of those nodes as reachable. | ||
832 | */ | ||
758 | for (size_t i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { | 833 | for (size_t i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) { |
759 | sk_X509_POLICY_NODE_value(level->nodes, i)->reachable = 1; | 834 | sk_X509_POLICY_NODE_value(level->nodes, i)->reachable = 1; |
760 | } | 835 | } |
@@ -769,16 +844,21 @@ has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, | |||
769 | continue; | 844 | continue; |
770 | } | 845 | } |
771 | if (sk_ASN1_OBJECT_num(node->parent_policies) == 0) { | 846 | if (sk_ASN1_OBJECT_num(node->parent_policies) == 0) { |
772 | // |node|'s parent is anyPolicy and is part of "valid_policy_node_set". | 847 | /* |
773 | // If it exists in |user_policies|, the intersection is non-empty and we | 848 | * |node|'s parent is anyPolicy and is part of |
774 | // can return immediately. | 849 | * "valid_policy_node_set". If it exists in |
850 | * |user_policies|, the intersection is | ||
851 | * non-empty and we * can return immediately. | ||
852 | */ | ||
775 | if (sk_ASN1_OBJECT_find(user_policies, | 853 | if (sk_ASN1_OBJECT_find(user_policies, |
776 | node->policy) >= 0) { | 854 | node->policy) >= 0) { |
777 | return 1; | 855 | return 1; |
778 | } | 856 | } |
779 | } else if (i > 0) { | 857 | } else if (i > 0) { |
780 | // |node|'s parents are concrete policies. Mark the parents reachable, | 858 | /* |node|'s parents are concrete policies. Mark |
781 | // to be inspected by the next loop iteration. | 859 | * the parents reachable, to be inspected by the |
860 | * next loop iteration. | ||
861 | */ | ||
782 | X509_POLICY_LEVEL *prev = sk_X509_POLICY_LEVEL_value(levels, | 862 | X509_POLICY_LEVEL *prev = sk_X509_POLICY_LEVEL_value(levels, |
783 | i - 1); | 863 | i - 1); |
784 | for (size_t k = 0; k < | 864 | for (size_t k = 0; k < |
@@ -787,8 +867,7 @@ has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels, | |||
787 | X509_POLICY_NODE *parent = x509_policy_level_find( | 867 | X509_POLICY_NODE *parent = x509_policy_level_find( |
788 | prev, | 868 | prev, |
789 | 869 | ||
790 | sk_ASN1_OBJECT_value(node->parent_policies, | 870 | sk_ASN1_OBJECT_value(node->parent_policies, k)); |
791 | k)); | ||
792 | if (parent != NULL) { | 871 | if (parent != NULL) { |
793 | parent->reachable = 1; | 872 | parent->reachable = 1; |
794 | } | 873 | } |
@@ -819,12 +898,12 @@ X509_policy_check(const STACK_OF(X509) *certs, | |||
819 | STACK_OF(ASN1_OBJECT) *user_policies_sorted = NULL; | 898 | STACK_OF(ASN1_OBJECT) *user_policies_sorted = NULL; |
820 | size_t num_certs = sk_X509_num(certs); | 899 | size_t num_certs = sk_X509_num(certs); |
821 | 900 | ||
822 | // Skip policy checking if the chain is just the trust anchor. | 901 | /* Skip policy checking if the chain is just the trust anchor. */ |
823 | if (num_certs <= 1) { | 902 | if (num_certs <= 1) { |
824 | return X509_V_OK; | 903 | return X509_V_OK; |
825 | } | 904 | } |
826 | 905 | ||
827 | // See RFC 5280, section 6.1.2, steps (d) through (f). | 906 | /* See RFC 5280, section 6.1.2, steps (d) through (f). */ |
828 | size_t explicit_policy = | 907 | size_t explicit_policy = |
829 | (flags & X509_V_FLAG_EXPLICIT_POLICY) ? 0 : num_certs + 1; | 908 | (flags & X509_V_FLAG_EXPLICIT_POLICY) ? 0 : num_certs + 1; |
830 | size_t inhibit_any_policy = | 909 | size_t inhibit_any_policy = |
@@ -853,8 +932,10 @@ X509_policy_check(const STACK_OF(X509) *certs, | |||
853 | level->has_any_policy = 1; | 932 | level->has_any_policy = 1; |
854 | } | 933 | } |
855 | 934 | ||
856 | // RFC 5280, section 6.1.3, steps (d) and (e). |any_policy_allowed| is | 935 | /* |
857 | // computed as in step (d.2). | 936 | * RFC 5280, section 6.1.3, steps (d) and (e). |any_policy_allowed| |
937 | * is computed as in step (d.2). | ||
938 | */ | ||
858 | const int any_policy_allowed = | 939 | const int any_policy_allowed = |
859 | inhibit_any_policy > 0 || (i > 0 && is_self_issued); | 940 | inhibit_any_policy > 0 || (i > 0 && is_self_issued); |
860 | if (!process_certificate_policies(cert, level, | 941 | if (!process_certificate_policies(cert, level, |
@@ -864,23 +945,25 @@ X509_policy_check(const STACK_OF(X509) *certs, | |||
864 | goto err; | 945 | goto err; |
865 | } | 946 | } |
866 | 947 | ||
867 | // RFC 5280, section 6.1.3, step (f). | 948 | /* RFC 5280, section 6.1.3, step (f). */ |
868 | if (explicit_policy == 0 && x509_policy_level_is_empty(level)) { | 949 | if (explicit_policy == 0 && x509_policy_level_is_empty(level)) { |
869 | ret = X509_V_ERR_NO_EXPLICIT_POLICY; | 950 | ret = X509_V_ERR_NO_EXPLICIT_POLICY; |
870 | goto err; | 951 | goto err; |
871 | } | 952 | } |
872 | 953 | ||
873 | // Insert into the list. | 954 | /* Insert into the list. */ |
874 | if (!sk_X509_POLICY_LEVEL_push(levels, level)) { | 955 | if (!sk_X509_POLICY_LEVEL_push(levels, level)) { |
875 | goto err; | 956 | goto err; |
876 | } | 957 | } |
877 | X509_POLICY_LEVEL *current_level = level; | 958 | X509_POLICY_LEVEL *current_level = level; |
878 | level = NULL; | 959 | level = NULL; |
879 | 960 | ||
880 | // If this is not the leaf certificate, we go to section 6.1.4. If it | 961 | /* |
881 | // is the leaf certificate, we go to section 6.1.5 instead. | 962 | * If this is not the leaf certificate, we go to section 6.1.4. |
963 | * If it is the leaf certificate, we go to section 6.1.5 instead. | ||
964 | */ | ||
882 | if (i != 0) { | 965 | if (i != 0) { |
883 | // RFC 5280, section 6.1.4, steps (a) and (b). | 966 | /* RFC 5280, section 6.1.4, steps (a) and (b). */ |
884 | level = process_policy_mappings(cert, current_level, | 967 | level = process_policy_mappings(cert, current_level, |
885 | policy_mapping > 0); | 968 | policy_mapping > 0); |
886 | if (level == NULL) { | 969 | if (level == NULL) { |
@@ -890,10 +973,13 @@ X509_policy_check(const STACK_OF(X509) *certs, | |||
890 | } | 973 | } |
891 | } | 974 | } |
892 | 975 | ||
893 | // RFC 5280, section 6.1.4, step (h-j) for non-leaves, and section 6.1.5, | 976 | /* |
894 | // step (a-b) for leaves. In the leaf case, RFC 5280 says only to update | 977 | * RFC 5280, section 6.1.4, step (h-j) for non-leaves, and |
895 | // |explicit_policy|, but |policy_mapping| and |inhibit_any_policy| are no | 978 | * section 6.1.5, step (a-b) for leaves. In the leaf case, |
896 | // longer read at this point, so we use the same process. | 979 | * RFC 5280 says only to update |explicit_policy|, but |
980 | * |policy_mapping| and |inhibit_any_policy| are no | ||
981 | * longer read at this point, so we use the same process. | ||
982 | */ | ||
897 | if (i == 0 || !is_self_issued) { | 983 | if (i == 0 || !is_self_issued) { |
898 | if (explicit_policy > 0) { | 984 | if (explicit_policy > 0) { |
899 | explicit_policy--; | 985 | explicit_policy--; |
@@ -913,10 +999,16 @@ X509_policy_check(const STACK_OF(X509) *certs, | |||
913 | } | 999 | } |
914 | } | 1000 | } |
915 | 1001 | ||
916 | // RFC 5280, section 6.1.5, step (g). We do not output the policy set, so it | 1002 | /* |
917 | // is only necessary to check if the user-constrained-policy-set is not empty. | 1003 | * RFC 5280, section 6.1.5, step (g). We do not output the policy set, |
1004 | * so it is only necessary to check if the user-constrained-policy-set | ||
1005 | * is not empty. | ||
1006 | */ | ||
918 | if (explicit_policy == 0) { | 1007 | if (explicit_policy == 0) { |
919 | // Build a sorted copy of |user_policies| for more efficient lookup. | 1008 | /* |
1009 | * Build a sorted copy of |user_policies| for more efficient | ||
1010 | * lookup. | ||
1011 | */ | ||
920 | if (user_policies != NULL) { | 1012 | if (user_policies != NULL) { |
921 | user_policies_sorted = sk_ASN1_OBJECT_dup( | 1013 | user_policies_sorted = sk_ASN1_OBJECT_dup( |
922 | user_policies); | 1014 | user_policies); |
@@ -938,8 +1030,10 @@ X509_policy_check(const STACK_OF(X509) *certs, | |||
938 | 1030 | ||
939 | err: | 1031 | err: |
940 | x509_policy_level_free(level); | 1032 | x509_policy_level_free(level); |
941 | // |user_policies_sorted|'s contents are owned by |user_policies|, so we do | 1033 | /* |
942 | // not use |sk_ASN1_OBJECT_pop_free|. | 1034 | * |user_policies_sorted|'s contents are owned by |user_policies|, so |
1035 | * we do not use |sk_ASN1_OBJECT_pop_free|. | ||
1036 | */ | ||
943 | sk_ASN1_OBJECT_free(user_policies_sorted); | 1037 | sk_ASN1_OBJECT_free(user_policies_sorted); |
944 | sk_X509_POLICY_LEVEL_pop_free(levels, x509_policy_level_free); | 1038 | sk_X509_POLICY_LEVEL_pop_free(levels, x509_policy_level_free); |
945 | return ret; | 1039 | return ret; |