• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /* crypto/x509/by_dir.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  *
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  *
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  *
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  *
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  *
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58 
59 #include <stdio.h>
60 #include <time.h>
61 #include <errno.h>
62 
63 #include "cryptlib.h"
64 
65 #ifndef NO_SYS_TYPES_H
66 # include <sys/types.h>
67 #endif
68 #ifndef OPENSSL_NO_POSIX_IO
69 # include <sys/stat.h>
70 #endif
71 
72 #include <openssl/lhash.h>
73 #include <openssl/x509.h>
74 
75 
76 typedef struct lookup_dir_hashes_st
77 	{
78 	unsigned long hash;
79 	int suffix;
80 	} BY_DIR_HASH;
81 
82 typedef struct lookup_dir_entry_st
83 	{
84 	char *dir;
85 	int dir_type;
86 	STACK_OF(BY_DIR_HASH) *hashes;
87 	} BY_DIR_ENTRY;
88 
89 typedef struct lookup_dir_st
90 	{
91 	BUF_MEM *buffer;
92 	STACK_OF(BY_DIR_ENTRY) *dirs;
93 	} BY_DIR;
94 
95 DECLARE_STACK_OF(BY_DIR_HASH)
96 DECLARE_STACK_OF(BY_DIR_ENTRY)
97 
98 static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl,
99 	char **ret);
100 static int new_dir(X509_LOOKUP *lu);
101 static void free_dir(X509_LOOKUP *lu);
102 static int add_cert_dir(BY_DIR *ctx,const char *dir,int type);
103 static int get_cert_by_subject(X509_LOOKUP *xl,int type,X509_NAME *name,
104 	X509_OBJECT *ret);
105 X509_LOOKUP_METHOD x509_dir_lookup=
106 	{
107 	"Load certs from files in a directory",
108 	new_dir,		/* new */
109 	free_dir,		/* free */
110 	NULL, 			/* init */
111 	NULL,			/* shutdown */
112 	dir_ctrl,		/* ctrl */
113 	get_cert_by_subject,	/* get_by_subject */
114 	NULL,			/* get_by_issuer_serial */
115 	NULL,			/* get_by_fingerprint */
116 	NULL,			/* get_by_alias */
117 	};
118 
X509_LOOKUP_hash_dir(void)119 X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void)
120 	{
121 	return(&x509_dir_lookup);
122 	}
123 
dir_ctrl(X509_LOOKUP * ctx,int cmd,const char * argp,long argl,char ** retp)124 static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl,
125 	     char **retp)
126 	{
127 	int ret=0;
128 	BY_DIR *ld;
129 	char *dir = NULL;
130 
131 	ld=(BY_DIR *)ctx->method_data;
132 
133 	switch (cmd)
134 		{
135 	case X509_L_ADD_DIR:
136 		if (argl == X509_FILETYPE_DEFAULT)
137 			{
138 			dir=(char *)getenv(X509_get_default_cert_dir_env());
139 			if (dir)
140 				ret=add_cert_dir(ld,dir,X509_FILETYPE_PEM);
141 			else
142 				ret=add_cert_dir(ld,X509_get_default_cert_dir(),
143 					X509_FILETYPE_PEM);
144 			if (!ret)
145 				{
146 				X509err(X509_F_DIR_CTRL,X509_R_LOADING_CERT_DIR);
147 				}
148 			}
149 		else
150 			ret=add_cert_dir(ld,argp,(int)argl);
151 		break;
152 		}
153 	return(ret);
154 	}
155 
new_dir(X509_LOOKUP * lu)156 static int new_dir(X509_LOOKUP *lu)
157 	{
158 	BY_DIR *a;
159 
160 	if ((a=(BY_DIR *)OPENSSL_malloc(sizeof(BY_DIR))) == NULL)
161 		return(0);
162 	if ((a->buffer=BUF_MEM_new()) == NULL)
163 		{
164 		OPENSSL_free(a);
165 		return(0);
166 		}
167 	a->dirs=NULL;
168 	lu->method_data=(char *)a;
169 	return(1);
170 	}
171 
by_dir_hash_free(BY_DIR_HASH * hash)172 static void by_dir_hash_free(BY_DIR_HASH *hash)
173 	{
174 	OPENSSL_free(hash);
175 	}
176 
by_dir_hash_cmp(const BY_DIR_HASH * const * a,const BY_DIR_HASH * const * b)177 static int by_dir_hash_cmp(const BY_DIR_HASH * const *a,
178 			const BY_DIR_HASH * const *b)
179 	{
180 	if ((*a)->hash > (*b)->hash)
181 		return 1;
182 	if ((*a)->hash < (*b)->hash)
183 		return -1;
184 	return 0;
185 	}
186 
by_dir_entry_free(BY_DIR_ENTRY * ent)187 static void by_dir_entry_free(BY_DIR_ENTRY *ent)
188 	{
189 	if (ent->dir)
190 		OPENSSL_free(ent->dir);
191 	if (ent->hashes)
192 		sk_BY_DIR_HASH_pop_free(ent->hashes, by_dir_hash_free);
193 	OPENSSL_free(ent);
194 	}
195 
free_dir(X509_LOOKUP * lu)196 static void free_dir(X509_LOOKUP *lu)
197 	{
198 	BY_DIR *a;
199 
200 	a=(BY_DIR *)lu->method_data;
201 	if (a->dirs != NULL)
202 		sk_BY_DIR_ENTRY_pop_free(a->dirs, by_dir_entry_free);
203 	if (a->buffer != NULL)
204 		BUF_MEM_free(a->buffer);
205 	OPENSSL_free(a);
206 	}
207 
add_cert_dir(BY_DIR * ctx,const char * dir,int type)208 static int add_cert_dir(BY_DIR *ctx, const char *dir, int type)
209 	{
210 	int j,len;
211 	const char *s,*ss,*p;
212 
213 	if (dir == NULL || !*dir)
214 	    {
215 	    X509err(X509_F_ADD_CERT_DIR,X509_R_INVALID_DIRECTORY);
216 	    return 0;
217 	    }
218 
219 	s=dir;
220 	p=s;
221 	for (;;p++)
222 		{
223 		if ((*p == LIST_SEPARATOR_CHAR) || (*p == '\0'))
224 			{
225 			BY_DIR_ENTRY *ent;
226 			ss=s;
227 			s=p+1;
228 			len=(int)(p-ss);
229 			if (len == 0) continue;
230 			for (j=0; j < sk_BY_DIR_ENTRY_num(ctx->dirs); j++)
231 				{
232 				ent = sk_BY_DIR_ENTRY_value(ctx->dirs, j);
233 				if (strlen(ent->dir) == (size_t)len &&
234 				    strncmp(ent->dir,ss,(unsigned int)len) == 0)
235 					break;
236 				}
237 			if (j < sk_BY_DIR_ENTRY_num(ctx->dirs))
238 				continue;
239 			if (ctx->dirs == NULL)
240 				{
241 				ctx->dirs = sk_BY_DIR_ENTRY_new_null();
242 				if (!ctx->dirs)
243 					{
244 					X509err(X509_F_ADD_CERT_DIR,ERR_R_MALLOC_FAILURE);
245 					return 0;
246 					}
247 				}
248 			ent = OPENSSL_malloc(sizeof(BY_DIR_ENTRY));
249 			if (!ent)
250 				return 0;
251 			ent->dir_type = type;
252 			ent->hashes = sk_BY_DIR_HASH_new(by_dir_hash_cmp);
253 			ent->dir = OPENSSL_malloc((unsigned int)len+1);
254 			if (!ent->dir || !ent->hashes)
255 				{
256 				by_dir_entry_free(ent);
257 				return 0;
258 				}
259 			strncpy(ent->dir,ss,(unsigned int)len);
260 			ent->dir[len] = '\0';
261 			if (!sk_BY_DIR_ENTRY_push(ctx->dirs, ent))
262 				{
263 				by_dir_entry_free(ent);
264 				return 0;
265 				}
266 			}
267 		if (*p == '\0')
268 			break;
269 		}
270 	return 1;
271 	}
272 
get_cert_by_subject(X509_LOOKUP * xl,int type,X509_NAME * name,X509_OBJECT * ret)273 static int get_cert_by_subject(X509_LOOKUP *xl, int type, X509_NAME *name,
274 	     X509_OBJECT *ret)
275 	{
276 	BY_DIR *ctx;
277 	union	{
278 		struct	{
279 			X509 st_x509;
280 			X509_CINF st_x509_cinf;
281 			} x509;
282 		struct	{
283 			X509_CRL st_crl;
284 			X509_CRL_INFO st_crl_info;
285 			} crl;
286 		} data;
287 	int ok=0;
288 	int i,j,k;
289 	unsigned long h;
290 	BUF_MEM *b=NULL;
291 	X509_OBJECT stmp,*tmp;
292 	const char *postfix="";
293 
294 	if (name == NULL) return(0);
295 
296 	stmp.type=type;
297 	if (type == X509_LU_X509)
298 		{
299 		data.x509.st_x509.cert_info= &data.x509.st_x509_cinf;
300 		data.x509.st_x509_cinf.subject=name;
301 		stmp.data.x509= &data.x509.st_x509;
302 		postfix="";
303 		}
304 	else if (type == X509_LU_CRL)
305 		{
306 		data.crl.st_crl.crl= &data.crl.st_crl_info;
307 		data.crl.st_crl_info.issuer=name;
308 		stmp.data.crl= &data.crl.st_crl;
309 		postfix="r";
310 		}
311 	else
312 		{
313 		X509err(X509_F_GET_CERT_BY_SUBJECT,X509_R_WRONG_LOOKUP_TYPE);
314 		goto finish;
315 		}
316 
317 	if ((b=BUF_MEM_new()) == NULL)
318 		{
319 		X509err(X509_F_GET_CERT_BY_SUBJECT,ERR_R_BUF_LIB);
320 		goto finish;
321 		}
322 
323 	ctx=(BY_DIR *)xl->method_data;
324 
325 	h=X509_NAME_hash(name);
326 	for (i=0; i < sk_BY_DIR_ENTRY_num(ctx->dirs); i++)
327 		{
328 		BY_DIR_ENTRY *ent;
329 		int idx;
330 		BY_DIR_HASH htmp, *hent;
331 		ent = sk_BY_DIR_ENTRY_value(ctx->dirs, i);
332 		j=strlen(ent->dir)+1+8+6+1+1;
333 		if (!BUF_MEM_grow(b,j))
334 			{
335 			X509err(X509_F_GET_CERT_BY_SUBJECT,ERR_R_MALLOC_FAILURE);
336 			goto finish;
337 			}
338 		if (type == X509_LU_CRL && ent->hashes)
339 			{
340 			htmp.hash = h;
341 			CRYPTO_r_lock(CRYPTO_LOCK_X509_STORE);
342 			idx = sk_BY_DIR_HASH_find(ent->hashes, &htmp);
343 			if (idx >= 0)
344 				{
345 				hent = sk_BY_DIR_HASH_value(ent->hashes, idx);
346 				k = hent->suffix;
347 				}
348 			else
349 				{
350 				hent = NULL;
351 				k=0;
352 				}
353 			CRYPTO_r_unlock(CRYPTO_LOCK_X509_STORE);
354 			}
355 		else
356 			{
357 			k = 0;
358 			hent = NULL;
359 			}
360 		for (;;)
361 			{
362 			char c = '/';
363 #ifdef OPENSSL_SYS_VMS
364 			c = ent->dir[strlen(ent->dir)-1];
365 			if (c != ':' && c != '>' && c != ']')
366 				{
367 				/* If no separator is present, we assume the
368 				   directory specifier is a logical name, and
369 				   add a colon.  We really should use better
370 				   VMS routines for merging things like this,
371 				   but this will do for now...
372 				   -- Richard Levitte */
373 				c = ':';
374 				}
375 			else
376 				{
377 				c = '\0';
378 				}
379 #endif
380 			if (c == '\0')
381 				{
382 				/* This is special.  When c == '\0', no
383 				   directory separator should be added. */
384 				BIO_snprintf(b->data,b->max,
385 					"%s%08lx.%s%d",ent->dir,h,
386 					postfix,k);
387 				}
388 			else
389 				{
390 				BIO_snprintf(b->data,b->max,
391 					"%s%c%08lx.%s%d",ent->dir,c,h,
392 					postfix,k);
393 				}
394 #ifndef OPENSSL_NO_POSIX_IO
395 #ifdef _WIN32
396 #define stat _stat
397 #endif
398 			{
399 			struct stat st;
400 			if (stat(b->data,&st) < 0)
401 				break;
402 			}
403 #endif
404 			/* found one. */
405 			if (type == X509_LU_X509)
406 				{
407 				if ((X509_load_cert_file(xl,b->data,
408 					ent->dir_type)) == 0)
409 					break;
410 				}
411 			else if (type == X509_LU_CRL)
412 				{
413 				if ((X509_load_crl_file(xl,b->data,
414 					ent->dir_type)) == 0)
415 					break;
416 				}
417 			/* else case will caught higher up */
418 			k++;
419 			}
420 
421 		/* we have added it to the cache so now pull
422 		 * it out again */
423 		CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE);
424 		j = sk_X509_OBJECT_find(xl->store_ctx->objs,&stmp);
425 		if(j != -1) tmp=sk_X509_OBJECT_value(xl->store_ctx->objs,j);
426 		else tmp = NULL;
427 		CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE);
428 
429 
430 		/* If a CRL, update the last file suffix added for this */
431 
432 		if (type == X509_LU_CRL)
433 			{
434 			CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE);
435 			/* Look for entry again in case another thread added
436 			 * an entry first.
437 			 */
438 			if (!hent)
439 				{
440 				htmp.hash = h;
441 				idx = sk_BY_DIR_HASH_find(ent->hashes, &htmp);
442 				if (idx >= 0)
443 					hent =
444 					 sk_BY_DIR_HASH_value(ent->hashes, idx);
445 				}
446 			if (!hent)
447 				{
448 				hent = OPENSSL_malloc(sizeof(BY_DIR_HASH));
449 				hent->hash = h;
450 				hent->suffix = k;
451 				if (!sk_BY_DIR_HASH_push(ent->hashes, hent))
452 					{
453 					CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE);
454 					OPENSSL_free(hent);
455 					ok = 0;
456 					goto finish;
457 					}
458 				}
459 			else if (hent->suffix < k)
460 				hent->suffix = k;
461 
462 			CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE);
463 
464 			}
465 
466 		if (tmp != NULL)
467 			{
468 			ok=1;
469 			ret->type=tmp->type;
470 			memcpy(&ret->data,&tmp->data,sizeof(ret->data));
471 			/* If we were going to up the reference count,
472 			 * we would need to do it on a perl 'type'
473 			 * basis */
474 	/*		CRYPTO_add(&tmp->data.x509->references,1,
475 				CRYPTO_LOCK_X509);*/
476 			goto finish;
477 			}
478 		}
479 finish:
480 	if (b != NULL) BUF_MEM_free(b);
481 	return(ok);
482 	}
483