#include <string.h>
#include <openssl/objects.h>
#include <openssl/stack.h>
#include <openssl/x509.h>
#include <openssl/x509v3.h>
#include "err_local.h"
#include "stack_local.h"
#include "x509_internal.h"
#include "x509_local.h"
typedef struct x509_policy_node_st {
ASN1_OBJECT *policy;
STACK_OF(ASN1_OBJECT) *parent_policies;
int mapped;
int reachable;
} X509_POLICY_NODE;
DECLARE_STACK_OF(X509_POLICY_NODE)
#define sk_X509_POLICY_NODE_new(cmp) SKM_sk_new(X509_POLICY_NODE, (cmp))
#define sk_X509_POLICY_NODE_new_null() SKM_sk_new_null(X509_POLICY_NODE)
#define sk_X509_POLICY_NODE_free(st) SKM_sk_free(X509_POLICY_NODE, (st))
#define sk_X509_POLICY_NODE_num(st) SKM_sk_num(X509_POLICY_NODE, (st))
#define sk_X509_POLICY_NODE_value(st, i) SKM_sk_value(X509_POLICY_NODE, (st), (i))
#define sk_X509_POLICY_NODE_set(st, i, val) SKM_sk_set(X509_POLICY_NODE, (st), (i), (val))
#define sk_X509_POLICY_NODE_zero(st) SKM_sk_zero(X509_POLICY_NODE, (st))
#define sk_X509_POLICY_NODE_push(st, val) SKM_sk_push(X509_POLICY_NODE, (st), (val))
#define sk_X509_POLICY_NODE_unshift(st, val) SKM_sk_unshift(X509_POLICY_NODE, (st), (val))
#define sk_X509_POLICY_NODE_find(st, val) SKM_sk_find(X509_POLICY_NODE, (st), (val))
#define sk_X509_POLICY_NODE_delete(st, i) SKM_sk_delete(X509_POLICY_NODE, (st), (i))
#define sk_X509_POLICY_NODE_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_POLICY_NODE, (st), (ptr))
#define sk_X509_POLICY_NODE_insert(st, val, i) SKM_sk_insert(X509_POLICY_NODE, (st), (val), (i))
#define sk_X509_POLICY_NODE_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_POLICY_NODE, (st), (cmp))
#define sk_X509_POLICY_NODE_dup(st) SKM_sk_dup(X509_POLICY_NODE, st)
#define sk_X509_POLICY_NODE_pop_free(st, free_func) SKM_sk_pop_free(X509_POLICY_NODE, (st), (free_func))
#define sk_X509_POLICY_NODE_shift(st) SKM_sk_shift(X509_POLICY_NODE, (st))
#define sk_X509_POLICY_NODE_pop(st) SKM_sk_pop(X509_POLICY_NODE, (st))
#define sk_X509_POLICY_NODE_sort(st) SKM_sk_sort(X509_POLICY_NODE, (st))
#define sk_X509_POLICY_NODE_is_sorted(st) SKM_sk_is_sorted(X509_POLICY_NODE, (st))
typedef struct x509_policy_level_st {
STACK_OF(X509_POLICY_NODE) *nodes;
int has_any_policy;
} X509_POLICY_LEVEL;
DECLARE_STACK_OF(X509_POLICY_LEVEL)
#define sk_X509_POLICY_LEVEL_new(cmp) SKM_sk_new(X509_POLICY_LEVEL, (cmp))
#define sk_X509_POLICY_LEVEL_new_null() SKM_sk_new_null(X509_POLICY_LEVEL)
#define sk_X509_POLICY_LEVEL_free(st) SKM_sk_free(X509_POLICY_LEVEL, (st))
#define sk_X509_POLICY_LEVEL_num(st) SKM_sk_num(X509_POLICY_LEVEL, (st))
#define sk_X509_POLICY_LEVEL_value(st, i) SKM_sk_value(X509_POLICY_LEVEL, (st), (i))
#define sk_X509_POLICY_LEVEL_set(st, i, val) SKM_sk_set(X509_POLICY_LEVEL, (st), (i), (val))
#define sk_X509_POLICY_LEVEL_zero(st) SKM_sk_zero(X509_POLICY_LEVEL, (st))
#define sk_X509_POLICY_LEVEL_push(st, val) SKM_sk_push(X509_POLICY_LEVEL, (st), (val))
#define sk_X509_POLICY_LEVEL_unshift(st, val) SKM_sk_unshift(X509_POLICY_LEVEL, (st), (val))
#define sk_X509_POLICY_LEVEL_find(st, val) SKM_sk_find(X509_POLICY_LEVEL, (st), (val))
#define sk_X509_POLICY_LEVEL_delete(st, i) SKM_sk_delete(X509_POLICY_LEVEL, (st), (i))
#define sk_X509_POLICY_LEVEL_delete_ptr(st, ptr) SKM_sk_delete_ptr(X509_POLICY_LEVEL, (st), (ptr))
#define sk_X509_POLICY_LEVEL_insert(st, val, i) SKM_sk_insert(X509_POLICY_LEVEL, (st), (val), (i))
#define sk_X509_POLICY_LEVEL_set_cmp_func(st, cmp) SKM_sk_set_cmp_func(X509_POLICY_LEVEL, (st), (cmp))
#define sk_X509_POLICY_LEVEL_dup(st) SKM_sk_dup(X509_POLICY_LEVEL, st)
#define sk_X509_POLICY_LEVEL_pop_free(st, free_func) SKM_sk_pop_free(X509_POLICY_LEVEL, (st), (free_func))
#define sk_X509_POLICY_LEVEL_shift(st) SKM_sk_shift(X509_POLICY_LEVEL, (st))
#define sk_X509_POLICY_LEVEL_pop(st) SKM_sk_pop(X509_POLICY_LEVEL, (st))
#define sk_X509_POLICY_LEVEL_sort(st) SKM_sk_sort(X509_POLICY_LEVEL, (st))
#define sk_X509_POLICY_LEVEL_is_sorted(st) SKM_sk_is_sorted(X509_POLICY_LEVEL, (st))
void
sk_X509_POLICY_NODE_delete_if(STACK_OF(X509_POLICY_NODE) *nodes,
int (*delete_if)(X509_POLICY_NODE *, void *), void *data)
{
_STACK *sk = (_STACK *)nodes;
X509_POLICY_NODE *node;
int new_num = 0;
int i;
for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++) {
node = sk_X509_POLICY_NODE_value(nodes, i);
if (!delete_if(node, data))
sk->data[new_num++] = (char *)node;
}
sk->num = new_num;
}
static int
is_any_policy(const ASN1_OBJECT *obj)
{
return OBJ_obj2nid(obj) == NID_any_policy;
}
static void
x509_policy_node_free(X509_POLICY_NODE *node)
{
if (node == NULL)
return;
ASN1_OBJECT_free(node->policy);
sk_ASN1_OBJECT_pop_free(node->parent_policies, ASN1_OBJECT_free);
free(node);
}
static X509_POLICY_NODE *
x509_policy_node_new(const ASN1_OBJECT *policy)
{
X509_POLICY_NODE *node = NULL;
if (is_any_policy(policy))
goto err;
if ((node = calloc(1, sizeof(*node))) == NULL)
goto err;
if ((node->policy = OBJ_dup(policy)) == NULL)
goto err;
if ((node->parent_policies = sk_ASN1_OBJECT_new_null()) == NULL)
goto err;
return node;
err:
x509_policy_node_free(node);
return NULL;
}
static int
x509_policy_node_cmp(const X509_POLICY_NODE *const *a,
const X509_POLICY_NODE *const *b)
{
return OBJ_cmp((*a)->policy, (*b)->policy);
}
static void
x509_policy_level_free(X509_POLICY_LEVEL *level)
{
if (level == NULL)
return;
sk_X509_POLICY_NODE_pop_free(level->nodes, x509_policy_node_free);
free(level);
}
static X509_POLICY_LEVEL *
x509_policy_level_new(void)
{
X509_POLICY_LEVEL *level;
if ((level = calloc(1, sizeof(*level))) == NULL)
goto err;
level->nodes = sk_X509_POLICY_NODE_new(x509_policy_node_cmp);
if (level->nodes == NULL)
goto err;
return level;
err:
x509_policy_level_free(level);
return NULL;
}
static int
x509_policy_level_is_empty(const X509_POLICY_LEVEL *level)
{
if (level->has_any_policy)
return 0;
return sk_X509_POLICY_NODE_num(level->nodes) == 0;
}
static void
x509_policy_level_clear(X509_POLICY_LEVEL *level)
{
X509_POLICY_NODE *node;
int i;
level->has_any_policy = 0;
for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) {
node = sk_X509_POLICY_NODE_value(level->nodes, i);
x509_policy_node_free(node);
}
sk_X509_POLICY_NODE_zero(level->nodes);
}
static X509_POLICY_NODE *
x509_policy_level_find(X509_POLICY_LEVEL *level, const ASN1_OBJECT *policy)
{
X509_POLICY_NODE node;
node.policy = (ASN1_OBJECT *)policy;
int idx;
if ((idx = sk_X509_POLICY_NODE_find(level->nodes, &node)) < 0)
return NULL;
return sk_X509_POLICY_NODE_value(level->nodes, idx);
}
static int
x509_policy_level_add_nodes(X509_POLICY_LEVEL *level,
STACK_OF(X509_POLICY_NODE) *nodes)
{
int i;
for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++) {
X509_POLICY_NODE *node = sk_X509_POLICY_NODE_value(nodes, i);
if (!sk_X509_POLICY_NODE_push(level->nodes, node))
return 0;
sk_X509_POLICY_NODE_set(nodes, i, NULL);
}
sk_X509_POLICY_NODE_sort(level->nodes);
return 1;
}
static int
policyinfo_cmp(const POLICYINFO *const *a,
const POLICYINFO *const *b)
{
return OBJ_cmp((*a)->policyid, (*b)->policyid);
}
static int
delete_if_not_in_policies(X509_POLICY_NODE *node, void *data)
{
const CERTIFICATEPOLICIES *policies = data;
POLICYINFO info;
info.policyid = node->policy;
if (sk_POLICYINFO_find(policies, &info) >= 0)
return 0;
x509_policy_node_free(node);
return 1;
}
static int
process_certificate_policies(const X509 *x509, X509_POLICY_LEVEL *level,
int any_policy_allowed)
{
STACK_OF(X509_POLICY_NODE) *new_nodes = NULL;
CERTIFICATEPOLICIES *policies;
const POLICYINFO *policy;
X509_POLICY_NODE *node;
int cert_has_any_policy, critical, i, previous_level_has_any_policy;
int ret = 0;
policies = X509_get_ext_d2i(x509, NID_certificate_policies, &critical,
NULL);
if (policies == NULL) {
if (critical != -1)
return 0;
x509_policy_level_clear(level);
return 1;
}
if (sk_POLICYINFO_num(policies) == 0) {
X509error(X509_R_INVALID_POLICY_EXTENSION);
goto err;
}
(void)sk_POLICYINFO_set_cmp_func(policies, policyinfo_cmp);
sk_POLICYINFO_sort(policies);
cert_has_any_policy = 0;
for (i = 0; i < sk_POLICYINFO_num(policies); i++) {
policy = sk_POLICYINFO_value(policies, i);
if (is_any_policy(policy->policyid))
cert_has_any_policy = 1;
if (i > 0 &&
OBJ_cmp(sk_POLICYINFO_value(policies, i - 1)->policyid,
policy->policyid) == 0) {
X509error(X509_R_INVALID_POLICY_EXTENSION);
goto err;
}
}
previous_level_has_any_policy = level->has_any_policy;
if (!cert_has_any_policy || !any_policy_allowed) {
if (!sk_POLICYINFO_is_sorted(policies))
goto err;
sk_X509_POLICY_NODE_delete_if(level->nodes,
delete_if_not_in_policies, policies);
level->has_any_policy = 0;
}
if (previous_level_has_any_policy) {
new_nodes = sk_X509_POLICY_NODE_new_null();
if (new_nodes == NULL)
goto err;
for (i = 0; i < sk_POLICYINFO_num(policies); i++) {
policy = sk_POLICYINFO_value(policies, i);
if (is_any_policy(policy->policyid))
continue;
if (!sk_X509_POLICY_NODE_is_sorted(level->nodes))
goto err;
if (x509_policy_level_find(level, policy->policyid) != NULL)
continue;
node = x509_policy_node_new(policy->policyid);
if (node == NULL ||
!sk_X509_POLICY_NODE_push(new_nodes, node)) {
x509_policy_node_free(node);
goto err;
}
}
if (!x509_policy_level_add_nodes(level, new_nodes))
goto err;
}
ret = 1;
err:
sk_X509_POLICY_NODE_pop_free(new_nodes, x509_policy_node_free);
CERTIFICATEPOLICIES_free(policies);
return ret;
}
static int
compare_issuer_policy(const POLICY_MAPPING *const *a,
const POLICY_MAPPING *const *b)
{
return OBJ_cmp((*a)->issuerDomainPolicy, (*b)->issuerDomainPolicy);
}
static int
compare_subject_policy(const POLICY_MAPPING *const *a,
const POLICY_MAPPING *const *b)
{
return OBJ_cmp((*a)->subjectDomainPolicy, (*b)->subjectDomainPolicy);
}
static int
delete_if_mapped(X509_POLICY_NODE *node, void *data)
{
const POLICY_MAPPINGS *mappings = data;
POLICY_MAPPING mapping;
mapping.issuerDomainPolicy = node->policy;
if (sk_POLICY_MAPPING_find(mappings, &mapping) < 0)
return 0;
x509_policy_node_free(node);
return 1;
}
static X509_POLICY_LEVEL *
process_policy_mappings(const X509 *cert,
X509_POLICY_LEVEL *level,
int mapping_allowed)
{
STACK_OF(X509_POLICY_NODE) *new_nodes = NULL;
POLICY_MAPPINGS *mappings;
const ASN1_OBJECT *last_policy;
POLICY_MAPPING *mapping;
X509_POLICY_LEVEL *next = NULL;
X509_POLICY_NODE *node;
int critical, i;
int ok = 0;
mappings = X509_get_ext_d2i(cert, NID_policy_mappings, &critical, NULL);
if (mappings == NULL && critical != -1) {
goto err;
}
if (mappings != NULL) {
if (sk_POLICY_MAPPING_num(mappings) == 0) {
X509error(X509_R_INVALID_POLICY_EXTENSION);
goto err;
}
for (i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) {
mapping = sk_POLICY_MAPPING_value(mappings, i);
if (is_any_policy(mapping->issuerDomainPolicy) ||
is_any_policy(mapping->subjectDomainPolicy))
goto err;
}
(void)sk_POLICY_MAPPING_set_cmp_func(mappings,
compare_issuer_policy);
sk_POLICY_MAPPING_sort(mappings);
if (mapping_allowed) {
new_nodes = sk_X509_POLICY_NODE_new_null();
if (new_nodes == NULL)
goto err;
last_policy = NULL;
for (i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) {
mapping = sk_POLICY_MAPPING_value(mappings, i);
if (last_policy != NULL &&
OBJ_cmp(mapping->issuerDomainPolicy,
last_policy) == 0)
continue;
last_policy = mapping->issuerDomainPolicy;
if (!sk_X509_POLICY_NODE_is_sorted(level->nodes))
goto err;
node = x509_policy_level_find(level,
mapping->issuerDomainPolicy);
if (node == NULL) {
if (!level->has_any_policy)
continue;
node = x509_policy_node_new(
mapping->issuerDomainPolicy);
if (node == NULL ||
!sk_X509_POLICY_NODE_push(new_nodes,
node)) {
x509_policy_node_free(node);
goto err;
}
}
node->mapped = 1;
}
if (!x509_policy_level_add_nodes(level, new_nodes))
goto err;
} else {
if (!sk_POLICY_MAPPING_is_sorted(mappings))
goto err;
sk_X509_POLICY_NODE_delete_if(level->nodes,
delete_if_mapped, mappings);
sk_POLICY_MAPPING_pop_free(mappings,
POLICY_MAPPING_free);
mappings = NULL;
}
}
if (mappings == NULL) {
mappings = sk_POLICY_MAPPING_new_null();
if (mappings == NULL)
goto err;
}
for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++) {
node = sk_X509_POLICY_NODE_value(level->nodes, i);
if (!node->mapped) {
mapping = POLICY_MAPPING_new();
if (mapping == NULL)
goto err;
mapping->issuerDomainPolicy = OBJ_dup(node->policy);
mapping->subjectDomainPolicy = OBJ_dup(node->policy);
if (mapping->issuerDomainPolicy == NULL ||
mapping->subjectDomainPolicy == NULL ||
!sk_POLICY_MAPPING_push(mappings, mapping)) {
POLICY_MAPPING_free(mapping);
goto err;
}
}
}
(void)sk_POLICY_MAPPING_set_cmp_func(mappings, compare_subject_policy);
sk_POLICY_MAPPING_sort(mappings);
next = x509_policy_level_new();
if (next == NULL)
goto err;
next->has_any_policy = level->has_any_policy;
X509_POLICY_NODE *last_node = NULL;
for (i = 0; i < sk_POLICY_MAPPING_num(mappings); i++) {
mapping = sk_POLICY_MAPPING_value(mappings, i);
if (!level->has_any_policy) {
if (!sk_X509_POLICY_NODE_is_sorted(level->nodes))
goto err;
if (x509_policy_level_find(level,
mapping->issuerDomainPolicy) == NULL)
continue;
}
if (last_node == NULL ||
OBJ_cmp(last_node->policy, mapping->subjectDomainPolicy) !=
0) {
last_node = x509_policy_node_new(
mapping->subjectDomainPolicy);
if (last_node == NULL ||
!sk_X509_POLICY_NODE_push(next->nodes, last_node)) {
x509_policy_node_free(last_node);
goto err;
}
}
if (!sk_ASN1_OBJECT_push(last_node->parent_policies,
mapping->issuerDomainPolicy))
goto err;
mapping->issuerDomainPolicy = NULL;
}
sk_X509_POLICY_NODE_sort(next->nodes);
ok = 1;
err:
if (!ok) {
x509_policy_level_free(next);
next = NULL;
}
sk_POLICY_MAPPING_pop_free(mappings, POLICY_MAPPING_free);
sk_X509_POLICY_NODE_pop_free(new_nodes, x509_policy_node_free);
return next;
}
static int
apply_skip_certs(const ASN1_INTEGER *skip_certs, size_t *value)
{
if (skip_certs == NULL)
return 1;
if (skip_certs->type & V_ASN1_NEG) {
X509error(X509_R_INVALID_POLICY_EXTENSION);
return 0;
}
uint64_t u64;
if (ASN1_INTEGER_get_uint64(&u64, skip_certs) && u64 < *value)
*value = (size_t)u64;
ERR_clear_error();
return 1;
}
static int
process_policy_constraints(const X509 *x509, size_t *explicit_policy,
size_t *policy_mapping,
size_t *inhibit_any_policy)
{
ASN1_INTEGER *inhibit_any_policy_ext;
POLICY_CONSTRAINTS *constraints;
int critical;
int ok = 0;
constraints = X509_get_ext_d2i(x509, NID_policy_constraints, &critical,
NULL);
if (constraints == NULL && critical != -1)
return 0;
if (constraints != NULL) {
if (constraints->requireExplicitPolicy == NULL &&
constraints->inhibitPolicyMapping == NULL) {
X509error(X509_R_INVALID_POLICY_EXTENSION);
POLICY_CONSTRAINTS_free(constraints);
return 0;
}
ok = apply_skip_certs(constraints->requireExplicitPolicy,
explicit_policy) &&
apply_skip_certs(constraints->inhibitPolicyMapping,
policy_mapping);
POLICY_CONSTRAINTS_free(constraints);
if (!ok)
return 0;
}
inhibit_any_policy_ext = X509_get_ext_d2i(x509, NID_inhibit_any_policy,
&critical, NULL);
if (inhibit_any_policy_ext == NULL && critical != -1)
return 0;
ok = apply_skip_certs(inhibit_any_policy_ext, inhibit_any_policy);
ASN1_INTEGER_free(inhibit_any_policy_ext);
return ok;
}
static int
has_explicit_policy(STACK_OF(X509_POLICY_LEVEL) *levels,
const STACK_OF(ASN1_OBJECT) *user_policies)
{
X509_POLICY_LEVEL *level, *prev;
X509_POLICY_NODE *node, *parent;
int num_levels, user_has_any_policy;
int i, j, k;
if (!sk_ASN1_OBJECT_is_sorted(user_policies))
return 0;
num_levels = sk_X509_POLICY_LEVEL_num(levels);
level = sk_X509_POLICY_LEVEL_value(levels, num_levels - 1);
if (x509_policy_level_is_empty(level))
return 0;
user_has_any_policy = sk_ASN1_OBJECT_num(user_policies) <= 0;
for (i = 0; i < sk_ASN1_OBJECT_num(user_policies); i++) {
if (is_any_policy(sk_ASN1_OBJECT_value(user_policies, i))) {
user_has_any_policy = 1;
break;
}
}
if (user_has_any_policy)
return 1;
if (level->has_any_policy)
return 1;
for (i = 0; i < sk_X509_POLICY_NODE_num(level->nodes); i++)
sk_X509_POLICY_NODE_value(level->nodes, i)->reachable = 1;
for (i = num_levels - 1; i >= 0; i--) {
level = sk_X509_POLICY_LEVEL_value(levels, i);
for (j = 0; j < sk_X509_POLICY_NODE_num(level->nodes); j++) {
node = sk_X509_POLICY_NODE_value(level->nodes, j);
if (!node->reachable)
continue;
if (sk_ASN1_OBJECT_num(node->parent_policies) == 0) {
if (sk_ASN1_OBJECT_find(user_policies,
node->policy) >= 0)
return 1;
} else if (i > 0) {
int num_parent_policies =
sk_ASN1_OBJECT_num(node->parent_policies);
prev = sk_X509_POLICY_LEVEL_value(levels, i - 1);
for (k = 0; k < num_parent_policies; k++) {
if (!sk_X509_POLICY_NODE_is_sorted(prev->nodes))
return 0;
parent = x509_policy_level_find(prev,
sk_ASN1_OBJECT_value(node->parent_policies,
k));
if (parent != NULL)
parent->reachable = 1;
}
}
}
}
return 0;
}
static int
asn1_object_cmp(const ASN1_OBJECT *const *a, const ASN1_OBJECT *const *b)
{
return OBJ_cmp(*a, *b);
}
int
X509_policy_check(const STACK_OF(X509) *certs,
const STACK_OF(ASN1_OBJECT) *user_policies,
unsigned long flags, X509 **out_current_cert)
{
*out_current_cert = NULL;
int ret = X509_V_ERR_OUT_OF_MEM;
X509 *cert;
X509_POLICY_LEVEL *level = NULL;
X509_POLICY_LEVEL *current_level;
STACK_OF(X509_POLICY_LEVEL) *levels = NULL;
STACK_OF(ASN1_OBJECT) *user_policies_sorted = NULL;
int num_certs = sk_X509_num(certs);
int is_self_issued, any_policy_allowed;
int i;
if (num_certs <= 1)
return X509_V_OK;
size_t explicit_policy =
(flags & X509_V_FLAG_EXPLICIT_POLICY) ? 0 : num_certs + 1;
size_t inhibit_any_policy =
(flags & X509_V_FLAG_INHIBIT_ANY) ? 0 : num_certs + 1;
size_t policy_mapping =
(flags & X509_V_FLAG_INHIBIT_MAP) ? 0 : num_certs + 1;
levels = sk_X509_POLICY_LEVEL_new_null();
if (levels == NULL)
goto err;
for (i = num_certs - 2; i >= 0; i--) {
cert = sk_X509_value(certs, i);
if (!x509v3_cache_extensions(cert))
goto err;
is_self_issued = (cert->ex_flags & EXFLAG_SI) != 0;
if (level == NULL) {
if (i != num_certs - 2)
goto err;
level = x509_policy_level_new();
if (level == NULL)
goto err;
level->has_any_policy = 1;
}
any_policy_allowed =
inhibit_any_policy > 0 || (i > 0 && is_self_issued);
if (!process_certificate_policies(cert, level,
any_policy_allowed)) {
ret = X509_V_ERR_INVALID_POLICY_EXTENSION;
*out_current_cert = cert;
goto err;
}
if (explicit_policy == 0 && x509_policy_level_is_empty(level)) {
ret = X509_V_ERR_NO_EXPLICIT_POLICY;
goto err;
}
if (!sk_X509_POLICY_LEVEL_push(levels, level))
goto err;
current_level = level;
level = NULL;
if (i != 0) {
level = process_policy_mappings(cert, current_level,
policy_mapping > 0);
if (level == NULL) {
ret = X509_V_ERR_INVALID_POLICY_EXTENSION;
*out_current_cert = cert;
goto err;
}
}
if (i == 0 || !is_self_issued) {
if (explicit_policy > 0)
explicit_policy--;
if (policy_mapping > 0)
policy_mapping--;
if (inhibit_any_policy > 0)
inhibit_any_policy--;
}
if (!process_policy_constraints(cert, &explicit_policy,
&policy_mapping, &inhibit_any_policy)) {
ret = X509_V_ERR_INVALID_POLICY_EXTENSION;
*out_current_cert = cert;
goto err;
}
}
if (explicit_policy == 0) {
if (user_policies != NULL) {
user_policies_sorted = sk_ASN1_OBJECT_dup(
user_policies);
if (user_policies_sorted == NULL)
goto err;
(void)sk_ASN1_OBJECT_set_cmp_func(user_policies_sorted,
asn1_object_cmp);
sk_ASN1_OBJECT_sort(user_policies_sorted);
}
if (!has_explicit_policy(levels, user_policies_sorted)) {
ret = X509_V_ERR_NO_EXPLICIT_POLICY;
goto err;
}
}
ret = X509_V_OK;
err:
x509_policy_level_free(level);
sk_ASN1_OBJECT_free(user_policies_sorted);
sk_X509_POLICY_LEVEL_pop_free(levels, x509_policy_level_free);
return ret;
}