Mirror of BoringSSL (grpc依赖)
https://boringssl.googlesource.com/boringssl
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
292 lines
10 KiB
292 lines
10 KiB
/* |
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project |
|
* 2004. |
|
*/ |
|
/* ==================================================================== |
|
* Copyright (c) 2004 The OpenSSL Project. All rights reserved. |
|
* |
|
* Redistribution and use in source and binary forms, with or without |
|
* modification, are permitted provided that the following conditions |
|
* are met: |
|
* |
|
* 1. Redistributions of source code must retain the above copyright |
|
* notice, this list of conditions and the following disclaimer. |
|
* |
|
* 2. Redistributions in binary form must reproduce the above copyright |
|
* notice, this list of conditions and the following disclaimer in |
|
* the documentation and/or other materials provided with the |
|
* distribution. |
|
* |
|
* 3. All advertising materials mentioning features or use of this |
|
* software must display the following acknowledgment: |
|
* "This product includes software developed by the OpenSSL Project |
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" |
|
* |
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to |
|
* endorse or promote products derived from this software without |
|
* prior written permission. For written permission, please contact |
|
* licensing@OpenSSL.org. |
|
* |
|
* 5. Products derived from this software may not be called "OpenSSL" |
|
* nor may "OpenSSL" appear in their names without prior written |
|
* permission of the OpenSSL Project. |
|
* |
|
* 6. Redistributions of any form whatsoever must retain the following |
|
* acknowledgment: |
|
* "This product includes software developed by the OpenSSL Project |
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" |
|
* |
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY |
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR |
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR |
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, |
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
|
* OF THE POSSIBILITY OF SUCH DAMAGE. |
|
* ==================================================================== |
|
* |
|
* This product includes cryptographic software written by Eric Young |
|
* (eay@cryptsoft.com). This product includes software written by Tim |
|
* Hudson (tjh@cryptsoft.com). |
|
* |
|
*/ |
|
|
|
#ifndef OPENSSL_HEADER_X509V3_INTERNAL_H |
|
#define OPENSSL_HEADER_X509V3_INTERNAL_H |
|
|
|
#include <openssl/base.h> |
|
|
|
#include <openssl/conf.h> |
|
#include <openssl/stack.h> |
|
#include <openssl/x509v3.h> |
|
|
|
// TODO(davidben): Merge x509 and x509v3. This include is needed because some |
|
// internal typedefs are shared between the two, but the two modules depend on |
|
// each other circularly. |
|
#include "../x509/internal.h" |
|
|
|
#if defined(__cplusplus) |
|
extern "C" { |
|
#endif |
|
|
|
|
|
// x509v3_bytes_to_hex encodes |len| bytes from |in| to hex and returns a |
|
// newly-allocated NUL-terminated string containing the result, or NULL on |
|
// allocation error. |
|
// |
|
// This function was historically named |hex_to_string| in OpenSSL. Despite the |
|
// name, |hex_to_string| converted to hex. |
|
OPENSSL_EXPORT char *x509v3_bytes_to_hex(const uint8_t *in, size_t len); |
|
|
|
// x509v3_hex_string_to_bytes decodes |str| in hex and returns a newly-allocated |
|
// array containing the result, or NULL on error. On success, it sets |*len| to |
|
// the length of the result. Colon separators between bytes in the input are |
|
// allowed and ignored. |
|
// |
|
// This function was historically named |string_to_hex| in OpenSSL. Despite the |
|
// name, |string_to_hex| converted from hex. |
|
unsigned char *x509v3_hex_to_bytes(const char *str, long *len); |
|
|
|
// x509v3_name_cmp returns zero if |name| is equal to |cmp| or begins with |cmp| |
|
// followed by '.'. Otherwise, it returns a non-zero number. |
|
int x509v3_name_cmp(const char *name, const char *cmp); |
|
|
|
// x509v3_looks_like_dns_name returns one if |in| looks like a DNS name and zero |
|
// otherwise. |
|
OPENSSL_EXPORT int x509v3_looks_like_dns_name(const unsigned char *in, |
|
size_t len); |
|
|
|
// x509v3_cache_extensions fills in a number of fields relating to X.509 |
|
// extensions in |x|. It returns one on success and zero if some extensions were |
|
// invalid. |
|
int x509v3_cache_extensions(X509 *x); |
|
|
|
// x509v3_a2i_ipadd decodes |ipasc| as an IPv4 or IPv6 address. IPv6 addresses |
|
// use colon-separated syntax while IPv4 addresses use dotted decimal syntax. If |
|
// it decodes an IPv4 address, it writes the result to the first four bytes of |
|
// |ipout| and returns four. If it decodes an IPv6 address, it writes the result |
|
// to all 16 bytes of |ipout| and returns 16. Otherwise, it returns zero. |
|
int x509v3_a2i_ipadd(unsigned char ipout[16], const char *ipasc); |
|
|
|
// A |BIT_STRING_BITNAME| is used to contain a list of bit names. |
|
typedef struct { |
|
int bitnum; |
|
const char *lname; |
|
const char *sname; |
|
} BIT_STRING_BITNAME; |
|
|
|
// x509V3_add_value_asn1_string appends a |CONF_VALUE| with the specified name |
|
// and value to |*extlist|. if |*extlist| is NULL, it sets |*extlist| to a |
|
// newly-allocated |STACK_OF(CONF_VALUE)| first. It returns one on success and |
|
// zero on error. |
|
int x509V3_add_value_asn1_string(const char *name, const ASN1_STRING *value, |
|
STACK_OF(CONF_VALUE) **extlist); |
|
|
|
|
|
// Internal structures |
|
|
|
// This structure and the field names correspond to the Policy 'node' of |
|
// RFC 3280. NB this structure contains no pointers to parent or child data: |
|
// X509_POLICY_NODE contains that. This means that the main policy data can |
|
// be kept static and cached with the certificate. |
|
|
|
typedef struct X509_POLICY_DATA_st X509_POLICY_DATA; |
|
typedef struct X509_POLICY_LEVEL_st X509_POLICY_LEVEL; |
|
typedef struct X509_POLICY_NODE_st X509_POLICY_NODE; |
|
|
|
DEFINE_STACK_OF(X509_POLICY_DATA) |
|
|
|
struct X509_POLICY_DATA_st { |
|
unsigned int flags; |
|
// Policy OID and qualifiers for this data |
|
ASN1_OBJECT *valid_policy; |
|
STACK_OF(POLICYQUALINFO) *qualifier_set; |
|
STACK_OF(ASN1_OBJECT) *expected_policy_set; |
|
}; |
|
|
|
// X509_POLICY_DATA flags values |
|
|
|
// This flag indicates the structure has been mapped using a policy mapping |
|
// extension. If policy mapping is not active its references get deleted. |
|
|
|
#define POLICY_DATA_FLAG_MAPPED 0x1 |
|
|
|
// This flag indicates the data doesn't correspond to a policy in Certificate |
|
// Policies: it has been mapped to any policy. |
|
|
|
#define POLICY_DATA_FLAG_MAPPED_ANY 0x2 |
|
|
|
// AND with flags to see if any mapping has occurred |
|
|
|
#define POLICY_DATA_FLAG_MAP_MASK 0x3 |
|
|
|
// qualifiers are shared and shouldn't be freed |
|
|
|
#define POLICY_DATA_FLAG_SHARED_QUALIFIERS 0x4 |
|
|
|
// Parent node is an extra node and should be freed |
|
|
|
#define POLICY_DATA_FLAG_EXTRA_NODE 0x8 |
|
|
|
// Corresponding CertificatePolicies is critical |
|
|
|
#define POLICY_DATA_FLAG_CRITICAL 0x10 |
|
|
|
// This structure is cached with a certificate |
|
|
|
struct X509_POLICY_CACHE_st { |
|
// anyPolicy data or NULL if no anyPolicy |
|
X509_POLICY_DATA *anyPolicy; |
|
// other policy data |
|
STACK_OF(X509_POLICY_DATA) *data; |
|
// If InhibitAnyPolicy present this is its value or -1 if absent. |
|
long any_skip; |
|
// If policyConstraints and requireExplicitPolicy present this is its |
|
// value or -1 if absent. |
|
long explicit_skip; |
|
// If policyConstraints and policyMapping present this is its value or -1 |
|
// if absent. |
|
long map_skip; |
|
}; |
|
|
|
// #define POLICY_CACHE_FLAG_CRITICAL POLICY_DATA_FLAG_CRITICAL |
|
|
|
// This structure represents the relationship between nodes |
|
|
|
struct X509_POLICY_NODE_st { |
|
// node data this refers to |
|
const X509_POLICY_DATA *data; |
|
// Parent node |
|
X509_POLICY_NODE *parent; |
|
// Number of child nodes |
|
int nchild; |
|
}; |
|
|
|
DEFINE_STACK_OF(X509_POLICY_NODE) |
|
|
|
struct X509_POLICY_LEVEL_st { |
|
// Cert for this level |
|
X509 *cert; |
|
// nodes at this level |
|
STACK_OF(X509_POLICY_NODE) *nodes; |
|
// anyPolicy node |
|
X509_POLICY_NODE *anyPolicy; |
|
// Extra data |
|
// |
|
// STACK_OF(X509_POLICY_DATA) *extra_data; |
|
unsigned int flags; |
|
}; |
|
|
|
struct X509_POLICY_TREE_st { |
|
// This is the tree 'level' data |
|
X509_POLICY_LEVEL *levels; |
|
int nlevel; |
|
// Extra policy data when additional nodes (not from the certificate) are |
|
// required. |
|
STACK_OF(X509_POLICY_DATA) *extra_data; |
|
// This is the authority constained policy set |
|
STACK_OF(X509_POLICY_NODE) *auth_policies; |
|
STACK_OF(X509_POLICY_NODE) *user_policies; |
|
unsigned int flags; |
|
}; |
|
|
|
// Set if anyPolicy present in user policies |
|
#define POLICY_FLAG_ANY_POLICY 0x2 |
|
|
|
// Useful macros |
|
|
|
#define node_data_critical(data) ((data)->flags & POLICY_DATA_FLAG_CRITICAL) |
|
#define node_critical(node) node_data_critical((node)->data) |
|
|
|
// Internal functions |
|
|
|
void X509_POLICY_NODE_print(BIO *out, X509_POLICY_NODE *node, int indent); |
|
|
|
int X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, |
|
STACK_OF(X509) *certs, STACK_OF(ASN1_OBJECT) *policy_oids, |
|
unsigned int flags); |
|
|
|
void X509_policy_tree_free(X509_POLICY_TREE *tree); |
|
|
|
X509_POLICY_DATA *policy_data_new(POLICYINFO *policy, const ASN1_OBJECT *id, |
|
int crit); |
|
void policy_data_free(X509_POLICY_DATA *data); |
|
|
|
X509_POLICY_DATA *policy_cache_find_data(const X509_POLICY_CACHE *cache, |
|
const ASN1_OBJECT *id); |
|
int policy_cache_set_mapping(X509 *x, POLICY_MAPPINGS *maps); |
|
|
|
STACK_OF(X509_POLICY_NODE) *policy_node_cmp_new(void); |
|
|
|
void policy_cache_init(void); |
|
|
|
void policy_cache_free(X509_POLICY_CACHE *cache); |
|
|
|
X509_POLICY_NODE *level_find_node(const X509_POLICY_LEVEL *level, |
|
const X509_POLICY_NODE *parent, |
|
const ASN1_OBJECT *id); |
|
|
|
X509_POLICY_NODE *tree_find_sk(STACK_OF(X509_POLICY_NODE) *sk, |
|
const ASN1_OBJECT *id); |
|
|
|
X509_POLICY_NODE *level_add_node(X509_POLICY_LEVEL *level, |
|
X509_POLICY_DATA *data, |
|
X509_POLICY_NODE *parent, |
|
X509_POLICY_TREE *tree); |
|
void policy_node_free(X509_POLICY_NODE *node); |
|
int policy_node_match(const X509_POLICY_LEVEL *lvl, |
|
const X509_POLICY_NODE *node, const ASN1_OBJECT *oid); |
|
|
|
const X509_POLICY_CACHE *policy_cache_set(X509 *x); |
|
|
|
|
|
#if defined(__cplusplus) |
|
} // extern C |
|
#endif |
|
|
|
#endif // OPENSSL_HEADER_X509V3_INTERNAL_H
|
|
|