MagickCore  6.9.13-47
Convert, Edit, Or Compose Bitmap Images
policy.c
1 /*
2 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
3 % %
4 % %
5 % PPPP OOO L IIIII CCCC Y Y %
6 % P P O O L I C Y Y %
7 % PPPP O O L I C Y %
8 % P O O L I C Y %
9 % P OOO LLLLL IIIII CCCC Y %
10 % %
11 % %
12 % MagickCore Policy Methods %
13 % %
14 % Software Design %
15 % Cristy %
16 % July 1992 %
17 % %
18 % %
19 % Copyright 1999 ImageMagick Studio LLC, a non-profit organization %
20 % dedicated to making software imaging solutions freely available. %
21 % %
22 % You may not use this file except in compliance with the License. You may %
23 % obtain a copy of the License at %
24 % %
25 % https://imagemagick.org/license/ %
26 % %
27 % Unless required by applicable law or agreed to in writing, software %
28 % distributed under the License is distributed on an "AS IS" BASIS, %
29 % WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. %
30 % See the License for the specific language governing permissions and %
31 % limitations under the License. %
32 % %
33 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
34 %
35 */
36 ␌
37 /*
38  Include declarations.
39 */
40 #include "magick/studio.h"
41 #include "magick/cache-private.h"
42 #include "magick/client.h"
43 #include "magick/configure.h"
44 #include "magick/exception.h"
45 #include "magick/exception-private.h"
46 #include "magick/hashmap-private.h"
47 #include "magick/locale_.h"
48 #include "magick/magick-private.h"
49 #include "magick/memory_.h"
50 #include "magick/memory-private.h"
51 #include "magick/monitor.h"
52 #include "magick/monitor-private.h"
53 #include "magick/option.h"
54 #include "magick/policy.h"
55 #include "magick/policy-private.h"
56 #include "magick/resource_.h"
57 #include "magick/semaphore.h"
58 #include "magick/stream-private.h"
59 #include "magick/string_.h"
60 #include "magick/string-private.h"
61 #include "magick/timer-private.h"
62 #include "magick/token.h"
63 #include "magick/utility.h"
64 #include "magick/utility-private.h"
65 #include "magick/xml-tree.h"
66 #include "magick/xml-tree-private.h"
67 #if defined(MAGICKCORE_XML_DELEGATE)
68 # include <libxml/parser.h>
69 # include <libxml/tree.h>
70 #endif
71 ␌
72 /*
73  Define declarations.
74 */
75 #define PolicyFilename "policy.xml"
76 ␌
77 /*
78  Typedef declarations.
79 */
81 {
82  char
83  *path;
84 
85  PolicyDomain
86  domain;
87 
88  PolicyRights
89  rights;
90 
91  char
92  *name,
93  *pattern,
94  *value;
95 
96  MagickBooleanType
97  exempt,
98  stealth,
99  debug;
100 
102  *semaphore;
103 
104  size_t
105  signature;
106 };
107 
108 typedef struct _PolicyMapInfo
109 {
110  const PolicyDomain
111  domain;
112 
113  const PolicyRights
114  rights;
115 
116  const char
117  *name,
118  *pattern,
119  *value;
120 } PolicyMapInfo;
121 ␌
122 /*
123  Static declarations.
124 */
125 static const PolicyMapInfo
126  PolicyMap[] =
127  {
128  { UndefinedPolicyDomain, UndefinedPolicyRights, (const char *) NULL,
129  (const char *) NULL, (const char *) NULL }
130  };
131 
132 static LinkedListInfo
133  *policy_cache = (LinkedListInfo *) NULL;
134 
135 static SemaphoreInfo
136  *policy_semaphore = (SemaphoreInfo *) NULL;
137 ␌
138 /*
139  Forward declarations.
140 */
141 static MagickBooleanType
142  IsPolicyCacheInstantiated(ExceptionInfo *),
143  LoadPolicyCache(LinkedListInfo *,const char *,const char *,const size_t,
144  ExceptionInfo *),
145  SetMagickSecurityPolicyValue(const PolicyDomain,const char *,const char *,
146  ExceptionInfo *);
147 ␌
148 /*
149 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
150 % %
151 % %
152 % %
153 % A c q u i r e P o l i c y C a c h e %
154 % %
155 % %
156 % %
157 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
158 %
159 % AcquirePolicyCache() caches one or more policy configurations which provides
160 % a mapping between policy attributes and a policy name.
161 %
162 % The format of the AcquirePolicyCache method is:
163 %
164 % LinkedListInfo *AcquirePolicyCache(const char *filename,
165 % ExceptionInfo *exception)
166 %
167 % A description of each parameter follows:
168 %
169 % o filename: the policy configuration file name.
170 %
171 % o exception: return any errors or warnings in this structure.
172 %
173 */
174 static LinkedListInfo *AcquirePolicyCache(const char *filename,
175  ExceptionInfo *exception)
176 {
178  *cache;
179 
180  MagickStatusType
181  status;
182 
183  ssize_t
184  i;
185 
186  /*
187  Load external policy map.
188  */
189  cache=NewLinkedList(0);
190  if (cache == (LinkedListInfo *) NULL)
191  ThrowFatalException(ResourceLimitFatalError,"MemoryAllocationFailed");
192  status=MagickTrue;
193 #if MAGICKCORE_ZERO_CONFIGURATION_SUPPORT
194  magick_unreferenced(filename);
195  status=LoadPolicyCache(cache,ZeroConfigurationPolicy,"[zero-configuration]",0,
196  exception);
197  if (status == MagickFalse)
198  CatchException(exception);
199 #else
200  {
201  const StringInfo
202  *option;
203 
205  *options;
206 
207  options=GetConfigureOptions(filename,exception);
208  option=(const StringInfo *) GetNextValueInLinkedList(options);
209  while (option != (const StringInfo *) NULL)
210  {
211  status&=LoadPolicyCache(cache,(const char *) GetStringInfoDatum(option),
212  GetStringInfoPath(option),0,exception);
213  if (status == MagickFalse)
214  CatchException(exception);
215  option=(const StringInfo *) GetNextValueInLinkedList(options);
216  }
217  options=DestroyConfigureOptions(options);
218  }
219 #endif
220  /*
221  Load built-in policy map.
222  */
223  for (i=0; i < (ssize_t) (sizeof(PolicyMap)/sizeof(*PolicyMap)); i++)
224  {
225  const PolicyMapInfo
226  *p;
227 
228  PolicyInfo
229  *policy_info;
230 
231  p=PolicyMap+i;
232  policy_info=(PolicyInfo *) AcquireMagickMemory(sizeof(*policy_info));
233  if (policy_info == (PolicyInfo *) NULL)
234  {
235  (void) ThrowMagickException(exception,GetMagickModule(),
236  ResourceLimitError,"MemoryAllocationFailed","`%s'",
237  p->name == (char *) NULL ? "" : p->name);
238  CatchException(exception);
239  status=MagickFalse;
240  continue;
241  }
242  (void) memset(policy_info,0,sizeof(*policy_info));
243  policy_info->path=(char *) "[built-in]";
244  policy_info->domain=p->domain;
245  policy_info->rights=p->rights;
246  policy_info->name=(char *) p->name;
247  policy_info->pattern=(char *) p->pattern;
248  policy_info->value=(char *) p->value;
249  policy_info->exempt=MagickTrue;
250  policy_info->signature=MagickCoreSignature;
251  status&=AppendValueToLinkedList(cache,policy_info);
252  if (status == MagickFalse)
253  {
254  (void) ThrowMagickException(exception,GetMagickModule(),
255  ResourceLimitError,"MemoryAllocationFailed","`%s'",
256  p->name == (char *) NULL ? "" : p->name);
257  CatchException(exception);
258  }
259  }
260  if (status == MagickFalse)
261  CatchException(exception);
262  return(cache);
263 }
264 ␌
265 /*
266 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
267 % %
268 % %
269 % %
270 + G e t P o l i c y I n f o %
271 % %
272 % %
273 % %
274 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
275 %
276 % GetPolicyInfo() searches the policy list for the specified name and if found
277 % returns attributes for that policy.
278 %
279 % The format of the GetPolicyInfo method is:
280 %
281 % PolicyInfo *GetPolicyInfo(const char *name,ExceptionInfo *exception)
282 %
283 % A description of each parameter follows:
284 %
285 % o name: the policy name.
286 %
287 % o exception: return any errors or warnings in this structure.
288 %
289 */
290 static PolicyInfo *GetPolicyInfo(const char *name,ExceptionInfo *exception)
291 {
292  char
293  policyname[MagickPathExtent],
294  *q;
295 
297  *p;
298 
299  PolicyDomain
300  domain;
301 
302  PolicyInfo
303  *policy;
304 
305  assert(exception != (ExceptionInfo *) NULL);
306  if (IsPolicyCacheInstantiated(exception) == MagickFalse)
307  return((PolicyInfo *) NULL);
308  /*
309  Strip names of whitespace.
310  */
311  *policyname='\0';
312  if (name != (const char *) NULL)
313  (void) CopyMagickString(policyname,name,MagickPathExtent);
314  for (q=policyname; *q != '\0'; q++)
315  {
316  if (isspace((int) ((unsigned char) *q)) == 0)
317  continue;
318  (void) CopyMagickString(q,q+1,MagickPathExtent);
319  q--;
320  }
321  /*
322  Strip domain from policy name (e.g. resource:map).
323  */
324  domain=UndefinedPolicyDomain;
325  for (q=policyname; *q != '\0'; q++)
326  {
327  if (*q != ':')
328  continue;
329  *q='\0';
330  domain=(PolicyDomain) ParseCommandOption(MagickPolicyDomainOptions,
331  MagickTrue,policyname);
332  (void) CopyMagickString(policyname,q+1,MagickPathExtent);
333  break;
334  }
335  /*
336  Search for policy tag.
337  */
338  policy=(PolicyInfo *) NULL;
339  LockSemaphoreInfo(policy_semaphore);
340  ResetLinkedListIterator(policy_cache);
341  p=GetHeadElementInLinkedList(policy_cache);
342  if ((name == (const char *) NULL) || (LocaleCompare(name,"*") == 0))
343  {
344  UnlockSemaphoreInfo(policy_semaphore);
345  if (p != (ElementInfo *) NULL)
346  policy=(PolicyInfo *) p->value;
347  return(policy);
348  }
349  while (p != (ElementInfo *) NULL)
350  {
351  policy=(PolicyInfo *) p->value;
352  if ((domain == UndefinedPolicyDomain) || (policy->domain == domain))
353  if (LocaleCompare(policyname,policy->name) == 0)
354  break;
355  p=p->next;
356  }
357  if (p == (ElementInfo *) NULL)
358  policy=(PolicyInfo *) NULL;
359  else
360  (void) SetHeadElementInLinkedList(policy_cache,p);
361  UnlockSemaphoreInfo(policy_semaphore);
362  return(policy);
363 }
364 ␌
365 /*
366 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
367 % %
368 % %
369 % %
370 % G e t P o l i c y I n f o L i s t %
371 % %
372 % %
373 % %
374 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
375 %
376 % GetPolicyInfoList() returns any policies that match the specified pattern.
377 %
378 % The format of the GetPolicyInfoList function is:
379 %
380 % const PolicyInfo **GetPolicyInfoList(const char *pattern,
381 % size_t *number_policies,ExceptionInfo *exception)
382 %
383 % A description of each parameter follows:
384 %
385 % o pattern: Specifies a pointer to a text string containing a pattern.
386 %
387 % o number_policies: returns the number of policies in the list.
388 %
389 % o exception: return any errors or warnings in this structure.
390 %
391 */
392 MagickExport const PolicyInfo **GetPolicyInfoList(const char *pattern,
393  size_t *number_policies,ExceptionInfo *exception)
394 {
395  const PolicyInfo
396  **policies;
397 
398  const PolicyInfo
399  *p;
400 
401  ssize_t
402  i;
403 
404  /*
405  Allocate policy list.
406  */
407  assert(pattern != (char *) NULL);
408  assert(number_policies != (size_t *) NULL);
409  if (IsEventLogging() != MagickFalse)
410  (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",pattern);
411  *number_policies=0;
412  p=GetPolicyInfo("*",exception);
413  if (p == (const PolicyInfo *) NULL)
414  return((const PolicyInfo **) NULL);
415  policies=(const PolicyInfo **) AcquireQuantumMemory((size_t)
416  GetNumberOfElementsInLinkedList(policy_cache)+1UL,sizeof(*policies));
417  if (policies == (const PolicyInfo **) NULL)
418  return((const PolicyInfo **) NULL);
419  /*
420  Generate policy list.
421  */
422  LockSemaphoreInfo(policy_semaphore);
423  ResetLinkedListIterator(policy_cache);
424  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
425  for (i=0; p != (const PolicyInfo *) NULL; )
426  {
427  if ((p->stealth == MagickFalse) &&
428  (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
429  policies[i++]=p;
430  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
431  }
432  UnlockSemaphoreInfo(policy_semaphore);
433  policies[i]=(PolicyInfo *) NULL;
434  *number_policies=(size_t) i;
435  return(policies);
436 }
437 ␌
438 /*
439 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
440 % %
441 % %
442 % %
443 % G e t P o l i c y L i s t %
444 % %
445 % %
446 % %
447 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
448 %
449 % GetPolicyList() returns any policies that match the specified pattern.
450 %
451 % The format of the GetPolicyList function is:
452 %
453 % char **GetPolicyList(const char *pattern,size_t *number_policies,
454 % ExceptionInfo *exception)
455 %
456 % A description of each parameter follows:
457 %
458 % o pattern: a pointer to a text string containing a pattern.
459 %
460 % o number_policies: returns the number of policies in the list.
461 %
462 % o exception: return any errors or warnings in this structure.
463 %
464 */
465 
466 static char *AcquirePolicyString(const char *source,const size_t pad)
467 {
468  char
469  *destination;
470 
471  size_t
472  length;
473 
474  length=0;
475  if (source != (char *) NULL)
476  length+=strlen(source);
477  destination=(char *) NULL;
478  if (~length >= pad)
479  destination=(char *) AcquireMagickMemory((length+pad)*sizeof(*destination));
480  if (destination == (char *) NULL)
481  ThrowFatalException(ResourceLimitFatalError,"UnableToAcquireString");
482  if (source != (char *) NULL)
483  (void) memcpy(destination,source,length*sizeof(*destination));
484  destination[length]='\0';
485  return(destination);
486 }
487 
488 MagickExport char **GetPolicyList(const char *pattern,size_t *number_policies,
489  ExceptionInfo *exception)
490 {
491  char
492  **policies;
493 
494  const PolicyInfo
495  *p;
496 
497  ssize_t
498  i;
499 
500  /*
501  Allocate policy list.
502  */
503  assert(pattern != (char *) NULL);
504  assert(number_policies != (size_t *) NULL);
505  if (IsEventLogging() != MagickFalse)
506  (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",pattern);
507  *number_policies=0;
508  p=GetPolicyInfo("*",exception);
509  if (p == (const PolicyInfo *) NULL)
510  return((char **) NULL);
511  policies=(char **) AcquireQuantumMemory((size_t)
512  GetNumberOfElementsInLinkedList(policy_cache)+1UL,sizeof(*policies));
513  if (policies == (char **) NULL)
514  return((char **) NULL);
515  /*
516  Generate policy list.
517  */
518  LockSemaphoreInfo(policy_semaphore);
519  ResetLinkedListIterator(policy_cache);
520  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
521  for (i=0; p != (const PolicyInfo *) NULL; )
522  {
523  if ((p->stealth == MagickFalse) &&
524  (GlobExpression(p->name,pattern,MagickFalse) != MagickFalse))
525  policies[i++]=AcquirePolicyString(p->name,1);
526  p=(const PolicyInfo *) GetNextValueInLinkedList(policy_cache);
527  }
528  UnlockSemaphoreInfo(policy_semaphore);
529  policies[i]=(char *) NULL;
530  *number_policies=(size_t) i;
531  return(policies);
532 }
533 ␌
534 /*
535 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
536 % %
537 % %
538 % %
539 % G e t P o l i c y V a l u e %
540 % %
541 % %
542 % %
543 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
544 %
545 % GetPolicyValue() returns the value associated with the named policy.
546 %
547 % The format of the GetPolicyValue method is:
548 %
549 % char *GetPolicyValue(const char *name)
550 %
551 % A description of each parameter follows:
552 %
553 % o policy_info: The policy info.
554 %
555 */
556 MagickExport char *GetPolicyValue(const char *name)
557 {
558  const char
559  *value;
560 
561  const PolicyInfo
562  *policy_info;
563 
565  *exception;
566 
567  assert(name != (const char *) NULL);
568  if (IsEventLogging() != MagickFalse)
569  (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",name);
570  exception=AcquireExceptionInfo();
571  policy_info=GetPolicyInfo(name,exception);
572  exception=DestroyExceptionInfo(exception);
573  if (policy_info == (PolicyInfo *) NULL)
574  return((char *) NULL);
575  value=policy_info->value;
576  if ((value == (const char *) NULL) || (*value == '\0'))
577  return((char *) NULL);
578  return(AcquirePolicyString(value,1));
579 }
580 ␌
581 /*
582 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
583 % %
584 % %
585 % %
586 + I s P o l i c y C a c h e I n s t a n t i a t e d %
587 % %
588 % %
589 % %
590 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
591 %
592 % IsPolicyCacheInstantiated() determines if the policy list is instantiated.
593 % If not, it instantiates the list and returns it.
594 %
595 % The format of the IsPolicyInstantiated method is:
596 %
597 % MagickBooleanType IsPolicyCacheInstantiated(ExceptionInfo *exception)
598 %
599 % A description of each parameter follows.
600 %
601 % o exception: return any errors or warnings in this structure.
602 %
603 */
604 static MagickBooleanType IsPolicyCacheInstantiated(ExceptionInfo *exception)
605 {
606  if (policy_cache == (LinkedListInfo *) NULL)
607  {
608  GetMaxMemoryRequest(); /* avoid OMP deadlock */
609  if (policy_semaphore == (SemaphoreInfo *) NULL)
610  ActivateSemaphoreInfo(&policy_semaphore);
611  LockSemaphoreInfo(policy_semaphore);
612  if (policy_cache == (LinkedListInfo *) NULL)
613  policy_cache=AcquirePolicyCache(PolicyFilename,exception);
614  UnlockSemaphoreInfo(policy_semaphore);
615  }
616  return(policy_cache != (LinkedListInfo *) NULL ? MagickTrue : MagickFalse);
617 }
618 ␌
619 /*
620 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
621 % %
622 % %
623 % %
624 % I s R i g h t s A u t h o r i z e d %
625 % %
626 % %
627 % %
628 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
629 %
630 % IsRightsAuthorized() returns MagickTrue if the policy authorizes the
631 % requested rights for the specified domain.
632 %
633 % The format of the IsRightsAuthorized method is:
634 %
635 % MagickBooleanType IsRightsAuthorized(const PolicyDomain domain,
636 % const PolicyRights rights,const char *qualified_pattern)
637 %
638 % A description of each parameter follows:
639 %
640 % o domain: the policy domain.
641 %
642 % o rights: the policy rights.
643 %
644 % o qualified_pattern: the pattern.
645 %
646 */
647 
648 static inline MagickBooleanType ParseNamespace(const char *qualified_pattern,
649  char **name,char **pattern)
650 {
651  const char
652  *p,
653  *separator;
654 
655  size_t
656  length;
657 
658  if ((qualified_pattern == (const char *) NULL) || (name == (char **) NULL) ||
659  (pattern == (char **) NULL))
660  return(MagickFalse);
661  *name=(char *) NULL;
662  *pattern=(char *) NULL;
663  separator=strstr(qualified_pattern,"::");
664  if (separator == (const char *) NULL)
665  {
666  *pattern=AcquireString(qualified_pattern);
667  return(*pattern != (char *) NULL ? MagickTrue : MagickFalse);
668  }
669  length=(size_t) (separator-qualified_pattern);
670  *name=(char *) AcquireQuantumMemory(length+1,sizeof(char));
671  if (*name == (char *) NULL)
672  return(MagickFalse);
673  (void) CopyMagickString(*name,qualified_pattern,length+1);
674  p=separator+2;
675  *pattern=AcquireString(p);
676  if (*pattern == (char *) NULL)
677  {
678  *name=DestroyString(*name);
679  *name=(char *) NULL;
680  return(MagickFalse);
681  }
682  return(MagickTrue);
683 }
684 
685 MagickExport MagickBooleanType IsRightsAuthorized(const PolicyDomain domain,
686  const PolicyRights rights,const char *qualified_pattern)
687 {
688  char
689  *name = (char *) NULL,
690  *pattern = (char *) NULL,
691  *real_pattern = (char *) NULL;
692 
693  const PolicyInfo
694  **policies = (const PolicyInfo **) NULL;
695 
697  *exception;
698 
699  MagickBooleanType
700  matched_any = MagickFalse;
701 
702  PolicyRights
703  effective_rights = AllPolicyRights; /* rights authorized unless denied */
704 
705  size_t
706  count = 0;
707 
708  ssize_t
709  i;
710 
711  if ((GetLogEventMask() & PolicyEvent) != 0)
712  (void) LogMagickEvent(PolicyEvent,GetMagickModule(),
713  "Domain: %s; rights=%s; pattern=\"%s\" ...",
714  CommandOptionToMnemonic(MagickPolicyDomainOptions,domain),
715  CommandOptionToMnemonic(MagickPolicyRightsOptions,rights),
716  qualified_pattern);
717  /*
718  Load policies.
719  */
720  exception=AcquireExceptionInfo();
721  policies=GetPolicyInfoList("*",&count,exception);
722  exception=DestroyExceptionInfo(exception);
723  if (policies == (const PolicyInfo **) NULL)
724  return(MagickTrue);
725  if (ParseNamespace(qualified_pattern,&name,&pattern) == MagickFalse)
726  {
727  policies=(const PolicyInfo **) RelinquishMagickMemory((void *) policies);
728  return(MagickFalse);
729  }
730  /*
731  Evaluate policies in order; last match wins.
732  */
733  for (i=0; i < (ssize_t) count; i++)
734  {
735  const PolicyInfo
736  *policy = policies[i];
737 
738  MagickBooleanType
739  match;
740 
741  if (policy->domain != domain)
742  continue;
743  if ((name != (char *) NULL) && (LocaleCompare(name,policy->name) != 0))
744  continue;
745  if ((policy->domain == PathPolicyDomain) &&
746  (real_pattern == (const char *) NULL))
747  real_pattern=realpath_utf8(pattern);
748  match=GlobExpression(real_pattern != (char*) NULL ? real_pattern : pattern,
749  policy->pattern,MagickFalse);
750  if (match == MagickFalse)
751  continue;
752  matched_any=MagickTrue;
753  effective_rights=policy->rights;
754  }
755  policies=(const PolicyInfo **) RelinquishMagickMemory((void *) policies);
756  if (pattern != (char *) NULL)
757  pattern=DestroyString(pattern);
758  if (name != (char *) NULL)
759  name=DestroyString(name);
760  if (real_pattern != (char *) NULL)
761  real_pattern=DestroyString(real_pattern);
762  /*
763  Is rights authorized?
764  */
765  if (matched_any == MagickFalse)
766  return(MagickTrue);
767  if ((rights & ReadPolicyRights) &&
768  !(effective_rights & ReadPolicyRights))
769  return(MagickFalse);
770  if ((rights & WritePolicyRights) &&
771  !(effective_rights & WritePolicyRights))
772  return(MagickFalse);
773  if ((rights & ExecutePolicyRights) &&
774  !(effective_rights & ExecutePolicyRights))
775  return(MagickFalse);
776  return(MagickTrue);
777 }
778 ␌
779 /*
780 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
781 % %
782 % %
783 % %
784 % L i s t P o l i c y I n f o %
785 % %
786 % %
787 % %
788 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
789 %
790 % ListPolicyInfo() lists policies to the specified file.
791 %
792 % The format of the ListPolicyInfo method is:
793 %
794 % MagickBooleanType ListPolicyInfo(FILE *file,ExceptionInfo *exception)
795 %
796 % A description of each parameter follows.
797 %
798 % o file: List policy names to this file handle.
799 %
800 % o exception: return any errors or warnings in this structure.
801 %
802 */
803 MagickExport MagickBooleanType ListPolicyInfo(FILE *file,
804  ExceptionInfo *exception)
805 {
806  const char
807  *path,
808  *domain;
809 
810  const PolicyInfo
811  **policy_info;
812 
813  ssize_t
814  i;
815 
816  size_t
817  number_policies;
818 
819  /*
820  List name and attributes of each policy in the list.
821  */
822  if (file == (const FILE *) NULL)
823  file=stdout;
824  policy_info=GetPolicyInfoList("*",&number_policies,exception);
825  if (policy_info == (const PolicyInfo **) NULL)
826  return(MagickFalse);
827  path=(const char *) NULL;
828  for (i=0; i < (ssize_t) number_policies; i++)
829  {
830  if (policy_info[i]->stealth != MagickFalse)
831  continue;
832  if (((path == (const char *) NULL) ||
833  (LocaleCompare(path,policy_info[i]->path) != 0)) &&
834  (policy_info[i]->path != (char *) NULL))
835  (void) FormatLocaleFile(file,"\nPath: %s\n",policy_info[i]->path);
836  path=policy_info[i]->path;
837  domain=CommandOptionToMnemonic(MagickPolicyDomainOptions,
838  policy_info[i]->domain);
839  (void) FormatLocaleFile(file," Policy: %s\n",domain);
840  if ((policy_info[i]->domain == CachePolicyDomain) ||
841  (policy_info[i]->domain == ResourcePolicyDomain) ||
842  (policy_info[i]->domain == SystemPolicyDomain))
843  {
844  if (policy_info[i]->name != (char *) NULL)
845  (void) FormatLocaleFile(file," name: %s\n",policy_info[i]->name);
846  if (policy_info[i]->value != (char *) NULL)
847  (void) FormatLocaleFile(file," value: %s\n",policy_info[i]->value);
848  }
849  else
850  {
851  (void) FormatLocaleFile(file," rights: ");
852  if (policy_info[i]->rights == NoPolicyRights)
853  (void) FormatLocaleFile(file,"None ");
854  if ((policy_info[i]->rights & ReadPolicyRights) != 0)
855  (void) FormatLocaleFile(file,"Read ");
856  if ((policy_info[i]->rights & WritePolicyRights) != 0)
857  (void) FormatLocaleFile(file,"Write ");
858  if ((policy_info[i]->rights & ExecutePolicyRights) != 0)
859  (void) FormatLocaleFile(file,"Execute ");
860  (void) FormatLocaleFile(file,"\n");
861  if (policy_info[i]->pattern != (char *) NULL)
862  (void) FormatLocaleFile(file," pattern: %s\n",
863  policy_info[i]->pattern);
864  }
865  }
866  policy_info=(const PolicyInfo **) RelinquishMagickMemory((void *)
867  policy_info);
868  (void) fflush(file);
869  return(MagickTrue);
870 }
871 ␌
872 /*
873 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
874 % %
875 % %
876 % %
877 + L o a d P o l i c y C a c h e %
878 % %
879 % %
880 % %
881 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
882 %
883 % LoadPolicyCache() loads the policy configurations which provides a mapping
884 % between policy attributes and a policy domain.
885 %
886 % The format of the LoadPolicyCache method is:
887 %
888 % MagickBooleanType LoadPolicyCache(LinkedListInfo *cache,const char *xml,
889 % const char *filename,const size_t depth,ExceptionInfo *exception)
890 %
891 % A description of each parameter follows:
892 %
893 % o xml: The policy list in XML format.
894 %
895 % o filename: The policy list filename.
896 %
897 % o depth: depth of <include /> statements.
898 %
899 % o exception: return any errors or warnings in this structure.
900 %
901 */
902 static MagickBooleanType LoadPolicyCache(LinkedListInfo *cache,const char *xml,
903  const char *filename,const size_t depth,ExceptionInfo *exception)
904 {
905  char
906  keyword[MagickPathExtent],
907  *token;
908 
909  const char
910  *q;
911 
912  MagickStatusType
913  status;
914 
915  PolicyInfo
916  *policy_info;
917 
918  size_t
919  extent;
920 
921  /*
922  Load the policy map file.
923  */
924  (void) LogMagickEvent(ConfigureEvent,GetMagickModule(),
925  "Loading policy file \"%s\" ...",filename);
926  if (xml == (char *) NULL)
927  return(MagickFalse);
928  status=MagickTrue;
929  policy_info=(PolicyInfo *) NULL;
930  token=AcquirePolicyString(xml,MagickPathExtent);
931  extent=strlen(token)+MagickPathExtent;
932  for (q=(const char *) xml; *q != '\0'; )
933  {
934  /*
935  Interpret XML.
936  */
937  (void) GetNextToken(q,&q,extent,token);
938  if (*token == '\0')
939  break;
940  (void) CopyMagickString(keyword,token,MagickPathExtent);
941  if (LocaleNCompare(keyword,"<!DOCTYPE",9) == 0)
942  {
943  /*
944  Docdomain element.
945  */
946  while ((LocaleNCompare(q,"]>",2) != 0) && (*q != '\0'))
947  (void) GetNextToken(q,&q,extent,token);
948  continue;
949  }
950  if (LocaleNCompare(keyword,"<!--",4) == 0)
951  {
952  /*
953  Comment element.
954  */
955  while ((LocaleNCompare(q,"->",2) != 0) && (*q != '\0'))
956  (void) GetNextToken(q,&q,extent,token);
957  continue;
958  }
959  if (LocaleCompare(keyword,"<include") == 0)
960  {
961  /*
962  Include element.
963  */
964  while (((*token != '/') && (*(token+1) != '>')) && (*q != '\0'))
965  {
966  (void) CopyMagickString(keyword,token,MagickPathExtent);
967  (void) GetNextToken(q,&q,extent,token);
968  if (*token != '=')
969  continue;
970  (void) GetNextToken(q,&q,extent,token);
971  if (LocaleCompare(keyword,"file") == 0)
972  {
973  if (depth > MagickMaxRecursionDepth)
974  (void) ThrowMagickException(exception,GetMagickModule(),
975  ConfigureError,"IncludeElementNestedTooDeeply","`%s'",token);
976  else
977  {
978  char
979  path[MagickPathExtent],
980  *xml;
981 
982  GetPathComponent(filename,HeadPath,path);
983  if (*path != '\0')
984  (void) ConcatenateMagickString(path,DirectorySeparator,
985  MagickPathExtent);
986  if (*token == *DirectorySeparator)
987  (void) CopyMagickString(path,token,MagickPathExtent);
988  else
989  (void) ConcatenateMagickString(path,token,MagickPathExtent);
990  xml=FileToXML(path,~0UL);
991  if (xml != (char *) NULL)
992  {
993  status&=LoadPolicyCache(cache,xml,path,depth+1,
994  exception);
995  xml=(char *) RelinquishMagickMemory(xml);
996  }
997  }
998  }
999  }
1000  continue;
1001  }
1002  if (LocaleCompare(keyword,"<policy") == 0)
1003  {
1004  /*
1005  Policy element.
1006  */
1007  policy_info=(PolicyInfo *) AcquireMagickMemory(sizeof(*policy_info));
1008  if (policy_info == (PolicyInfo *) NULL)
1009  ThrowFatalException(ResourceLimitFatalError,"MemoryAllocationFailed");
1010  (void) memset(policy_info,0,sizeof(*policy_info));
1011  policy_info->path=AcquirePolicyString(filename,1);
1012  policy_info->exempt=MagickFalse;
1013  policy_info->signature=MagickCoreSignature;
1014  continue;
1015  }
1016  if (policy_info == (PolicyInfo *) NULL)
1017  continue;
1018  if ((LocaleCompare(keyword,"/>") == 0) ||
1019  (LocaleCompare(keyword,"</policy>") == 0))
1020  {
1021  status=AppendValueToLinkedList(cache,policy_info);
1022  if (status == MagickFalse)
1023  (void) ThrowMagickException(exception,GetMagickModule(),
1024  ResourceLimitError,"MemoryAllocationFailed","`%s'",
1025  policy_info->name);
1026  policy_info=(PolicyInfo *) NULL;
1027  continue;
1028  }
1029  (void) GetNextToken(q,(const char **) NULL,extent,token);
1030  if (*token != '=')
1031  continue;
1032  (void) GetNextToken(q,&q,extent,token);
1033  (void) GetNextToken(q,&q,extent,token);
1034  switch (*keyword)
1035  {
1036  case 'D':
1037  case 'd':
1038  {
1039  if (LocaleCompare((char *) keyword,"domain") == 0)
1040  {
1041  policy_info->domain=(PolicyDomain) ParseCommandOption(
1042  MagickPolicyDomainOptions,MagickTrue,token);
1043  break;
1044  }
1045  break;
1046  }
1047  case 'N':
1048  case 'n':
1049  {
1050  if (LocaleCompare((char *) keyword,"name") == 0)
1051  {
1052  policy_info->name=AcquirePolicyString(token,1);
1053  break;
1054  }
1055  break;
1056  }
1057  case 'P':
1058  case 'p':
1059  {
1060  if (LocaleCompare((char *) keyword,"pattern") == 0)
1061  {
1062  policy_info->pattern=AcquirePolicyString(token,1);
1063  break;
1064  }
1065  break;
1066  }
1067  case 'R':
1068  case 'r':
1069  {
1070  if (LocaleCompare((char *) keyword,"rights") == 0)
1071  {
1072  policy_info->rights=(PolicyRights) ParseCommandOption(
1073  MagickPolicyRightsOptions,MagickTrue,token);
1074  break;
1075  }
1076  break;
1077  }
1078  case 'S':
1079  case 's':
1080  {
1081  if (LocaleCompare((char *) keyword,"stealth") == 0)
1082  {
1083  policy_info->stealth=IsMagickTrue(token);
1084  break;
1085  }
1086  break;
1087  }
1088  case 'V':
1089  case 'v':
1090  {
1091  if (LocaleCompare((char *) keyword,"value") == 0)
1092  {
1093  policy_info->value=AcquirePolicyString(token,1);
1094  break;
1095  }
1096  break;
1097  }
1098  default:
1099  break;
1100  }
1101  }
1102  token=(char *) RelinquishMagickMemory(token);
1103  if (status == MagickFalse)
1104  CatchException(exception);
1105  return(status != 0 ? MagickTrue : MagickFalse);
1106 }
1107 ␌
1108 /*
1109 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1110 % %
1111 % %
1112 % %
1113 + P o l i c y C o m p o n e n t G e n e s i s %
1114 % %
1115 % %
1116 % %
1117 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1118 %
1119 % PolicyComponentGenesis() instantiates the policy component.
1120 %
1121 % The format of the PolicyComponentGenesis method is:
1122 %
1123 % MagickBooleanType PolicyComponentGenesis(void)
1124 %
1125 */
1126 MagickExport MagickBooleanType PolicyComponentGenesis(void)
1127 {
1128  if (policy_semaphore == (SemaphoreInfo *) NULL)
1129  policy_semaphore=AllocateSemaphoreInfo();
1130  return(MagickTrue);
1131 }
1132 ␌
1133 /*
1134 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1135 % %
1136 % %
1137 % %
1138 + P o l i c y C o m p o n e n t T e r m i n u s %
1139 % %
1140 % %
1141 % %
1142 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1143 %
1144 % PolicyComponentTerminus() destroys the policy component.
1145 %
1146 % The format of the PolicyComponentTerminus method is:
1147 %
1148 % PolicyComponentTerminus(void)
1149 %
1150 */
1151 
1152 static void *DestroyPolicyElement(void *policy_info)
1153 {
1154  PolicyInfo
1155  *p;
1156 
1157  p=(PolicyInfo *) policy_info;
1158  if (p->exempt == MagickFalse)
1159  {
1160  if (p->value != (char *) NULL)
1161  p->value=DestroyString(p->value);
1162  if (p->pattern != (char *) NULL)
1163  p->pattern=DestroyString(p->pattern);
1164  if (p->name != (char *) NULL)
1165  p->name=DestroyString(p->name);
1166  if (p->path != (char *) NULL)
1167  p->path=DestroyString(p->path);
1168  }
1169  p=(PolicyInfo *) RelinquishMagickMemory(p);
1170  return((void *) NULL);
1171 }
1172 
1173 MagickExport void PolicyComponentTerminus(void)
1174 {
1175  if (policy_semaphore == (SemaphoreInfo *) NULL)
1176  ActivateSemaphoreInfo(&policy_semaphore);
1177  LockSemaphoreInfo(policy_semaphore);
1178  if (policy_cache != (LinkedListInfo *) NULL)
1179  policy_cache=DestroyLinkedList(policy_cache,DestroyPolicyElement);
1180  UnlockSemaphoreInfo(policy_semaphore);
1181  DestroySemaphoreInfo(&policy_semaphore);
1182 }
1183 ␌
1184 /*
1185 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1186 % %
1187 % %
1188 % %
1189 % S e t M a g i c k S e c u r i t y P o l i c y %
1190 % %
1191 % %
1192 % %
1193 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1194 %
1195 % SetMagickSecurityPolicy() sets or restricts the ImageMagick security policy.
1196 % It returns MagickFalse if the policy the policy does not parse.
1197 %
1198 % The format of the SetMagickSecurityPolicy method is:
1199 %
1200 % MagickBooleanType SetMagickSecurityPolicy(const char *policy,
1201 % ExceptionInfo *exception)
1202 %
1203 % A description of each parameter follows:
1204 %
1205 % o policy: the security policy in the XML format.
1206 %
1207 % o exception: return any errors or warnings in this structure.
1208 %
1209 */
1210 
1211 static MagickBooleanType ValidateSecurityPolicy(const char *policy,
1212  const char *url,ExceptionInfo *exception)
1213 {
1214 #if defined(MAGICKCORE_XML_DELEGATE)
1215  xmlDocPtr
1216  document;
1217 
1218  /*
1219  Parse security policy.
1220  */
1221  document=xmlReadMemory(policy,(int) strlen(policy),url,NULL,
1222  XML_PARSE_NOERROR | XML_PARSE_NOWARNING);
1223  if (document == (xmlDocPtr) NULL)
1224  {
1225  (void) ThrowMagickException(exception,GetMagickModule(),ConfigureError,
1226  "PolicyValidationException","'%s'",url);
1227  return(MagickFalse);
1228  }
1229  xmlFreeDoc(document);
1230 #else
1231  (void) policy;
1232  (void) url;
1233  (void) exception;
1234 #endif
1235  return(MagickTrue);
1236 }
1237 
1238 MagickExport MagickBooleanType SetMagickSecurityPolicy(const char *policy,
1239  ExceptionInfo *exception)
1240 {
1241  MagickBooleanType
1242  status;
1243 
1245  *user_policies;
1246 
1247  PolicyInfo
1248  *p;
1249 
1250  /*
1251  Load user policies.
1252  */
1253  assert(exception != (ExceptionInfo *) NULL);
1254  if (policy == (const char *) NULL)
1255  return(MagickFalse);
1256  if (ValidateSecurityPolicy(policy,PolicyFilename,exception) == MagickFalse)
1257  return(MagickFalse);
1258  status=LoadPolicyCache(policy_cache,policy,"[user-policy]",0,exception);
1259  if (status == MagickFalse)
1260  return(status);
1261  /*
1262  Synchronize user policies.
1263  */
1264  user_policies=NewLinkedList(0);
1265  status=LoadPolicyCache(user_policies,policy,"[user-policy]",0,exception);
1266  if (status == MagickFalse)
1267  {
1268  user_policies=DestroyLinkedList(user_policies,DestroyPolicyElement);
1269  return(MagickFalse);
1270  }
1271  ResetLinkedListIterator(user_policies);
1272  p=(PolicyInfo *) GetNextValueInLinkedList(user_policies);
1273  while (p != (PolicyInfo *) NULL)
1274  {
1275  if ((p->name != (char *) NULL) && (p->value != (char *) NULL))
1276  (void) SetMagickSecurityPolicyValue(p->domain,p->name,p->value,exception);
1277  p=(PolicyInfo *) GetNextValueInLinkedList(user_policies);
1278  }
1279  user_policies=DestroyLinkedList(user_policies,DestroyPolicyElement);
1280  return(status);
1281 }
1282 ␌
1283 /*
1284 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1285 % %
1286 % %
1287 % %
1288 % S e t M a g i c k S e c u r i t y P o l i c y V a l u e %
1289 % %
1290 % %
1291 % %
1292 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
1293 %
1294 % SetMagickSecurityPolicyValue() sets a value associated with an ImageMagick
1295 % security policy. For most policies, the value must be less than any value
1296 % set by the security policy configuration file (i.e. policy.xml). It returns
1297 % MagickFalse if the policy cannot be modified or if the policy does not parse.
1298 %
1299 % The format of the SetMagickSecurityPolicyValue method is:
1300 %
1301 % MagickBooleanType SetMagickSecurityPolicyValue(
1302 % const PolicyDomain domain,const char *name,const char *value,
1303 % ExceptionInfo *exception)
1304 %
1305 % A description of each parameter follows:
1306 %
1307 % o domain: the domain of the policy (e.g. system, resource).
1308 %
1309 % o name: the name of the policy.
1310 %
1311 % o value: the value to set the policy to.
1312 %
1313 % o exception: return any errors or warnings in this structure.
1314 %
1315 */
1316 static MagickBooleanType SetMagickSecurityPolicyValue(const PolicyDomain domain,
1317  const char *name,const char *value,ExceptionInfo *exception)
1318 {
1319  magick_unreferenced(exception);
1320  assert(exception != (ExceptionInfo *) NULL);
1321  if ((name == (const char *) NULL) || (value == (const char *) NULL))
1322  return(MagickFalse);
1323  switch (domain)
1324  {
1325  case CachePolicyDomain:
1326  {
1327  if (LocaleCompare(name,"memory-map") == 0)
1328  {
1329  if (LocaleCompare(value,"anonymous") != 0)
1330  return(MagickFalse);
1331  ResetCacheAnonymousMemory();
1332  ResetStreamAnonymousMemory();
1333  return(MagickTrue);
1334  }
1335  break;
1336  }
1337  case ResourcePolicyDomain:
1338  {
1339  ssize_t
1340  type;
1341 
1342  type=ParseCommandOption(MagickResourceOptions,MagickFalse,name);
1343  if (type >= 0)
1344  {
1345  MagickSizeType
1346  limit;
1347 
1348  limit=MagickResourceInfinity;
1349  if (LocaleCompare("unlimited",value) != 0)
1350  limit=StringToMagickSizeType(value,100.0);
1351  if ((ResourceType) type == TimeResource)
1352  limit=(MagickSizeType) ParseMagickTimeToLive(value);
1353  return(SetMagickResourceLimit((ResourceType) type,limit));
1354  }
1355  break;
1356  }
1357  case SystemPolicyDomain:
1358  {
1359  if (LocaleCompare(name,"max-memory-request") == 0)
1360  {
1361  MagickSizeType
1362  limit;
1363 
1364  limit=MagickResourceInfinity;
1365  if (LocaleCompare("unlimited",value) != 0)
1366  limit=StringToMagickSizeType(value,100.0);
1367  SetMaxMemoryRequest(limit);
1368  return(MagickTrue);
1369  }
1370  if (LocaleCompare(name,"memory-map") == 0)
1371  {
1372  if (LocaleCompare(value,"anonymous") != 0)
1373  return(MagickFalse);
1374  ResetVirtualAnonymousMemory();
1375  return(MagickTrue);
1376  }
1377  if (LocaleCompare(name,"precision") == 0)
1378  {
1379  int
1380  limit;
1381 
1382  limit=StringToInteger(value);
1383  SetMagickPrecision(limit);
1384  return(MagickTrue);
1385  }
1386  break;
1387  }
1388  case CoderPolicyDomain:
1389  case DelegatePolicyDomain:
1390  case FilterPolicyDomain:
1391  case ModulePolicyDomain:
1392  case PathPolicyDomain:
1393  default:
1394  break;
1395  }
1396  return(MagickFalse);
1397 }