1 /* crypto/x509/by_dir.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.] */
57
58 #include <string.h>
59 #include <sys/stat.h>
60 #include <sys/types.h>
61
62 #include <openssl/buf.h>
63 #include <openssl/err.h>
64 #include <openssl/mem.h>
65 #include <openssl/thread.h>
66 #include <openssl/x509.h>
67
68 #include "../internal.h"
69
70 typedef struct lookup_dir_hashes_st {
71 unsigned long hash;
72 int suffix;
73 } BY_DIR_HASH;
74
75 typedef struct lookup_dir_entry_st {
76 char *dir;
77 int dir_type;
78 STACK_OF(BY_DIR_HASH) *hashes;
79 } BY_DIR_ENTRY;
80
81 typedef struct lookup_dir_st {
82 BUF_MEM *buffer;
83 STACK_OF(BY_DIR_ENTRY) *dirs;
84 } BY_DIR;
85
86 DEFINE_STACK_OF(BY_DIR_HASH)
87 DEFINE_STACK_OF(BY_DIR_ENTRY)
88
89 static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl,
90 char **ret);
91 static int new_dir(X509_LOOKUP *lu);
92 static void free_dir(X509_LOOKUP *lu);
93 static int add_cert_dir(BY_DIR *ctx, const char *dir, int type);
94 static int get_cert_by_subject(X509_LOOKUP *xl, int type, X509_NAME *name,
95 X509_OBJECT *ret);
96 static X509_LOOKUP_METHOD x509_dir_lookup = {
97 "Load certs from files in a directory",
98 new_dir, /* new */
99 free_dir, /* free */
100 NULL, /* init */
101 NULL, /* shutdown */
102 dir_ctrl, /* ctrl */
103 get_cert_by_subject, /* get_by_subject */
104 NULL, /* get_by_issuer_serial */
105 NULL, /* get_by_fingerprint */
106 NULL, /* get_by_alias */
107 };
108
X509_LOOKUP_hash_dir(void)109 X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void)
110 {
111 return (&x509_dir_lookup);
112 }
113
dir_ctrl(X509_LOOKUP * ctx,int cmd,const char * argp,long argl,char ** retp)114 static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl,
115 char **retp)
116 {
117 int ret = 0;
118 BY_DIR *ld;
119 char *dir = NULL;
120
121 ld = (BY_DIR *)ctx->method_data;
122
123 switch (cmd) {
124 case X509_L_ADD_DIR:
125 if (argl == X509_FILETYPE_DEFAULT) {
126 dir = (char *)getenv(X509_get_default_cert_dir_env());
127 if (dir)
128 ret = add_cert_dir(ld, dir, X509_FILETYPE_PEM);
129 else
130 ret = add_cert_dir(ld, X509_get_default_cert_dir(),
131 X509_FILETYPE_PEM);
132 if (!ret) {
133 OPENSSL_PUT_ERROR(X509, X509_R_LOADING_CERT_DIR);
134 }
135 } else
136 ret = add_cert_dir(ld, argp, (int)argl);
137 break;
138 }
139 return (ret);
140 }
141
new_dir(X509_LOOKUP * lu)142 static int new_dir(X509_LOOKUP *lu)
143 {
144 BY_DIR *a;
145
146 if ((a = (BY_DIR *)OPENSSL_malloc(sizeof(BY_DIR))) == NULL)
147 return (0);
148 if ((a->buffer = BUF_MEM_new()) == NULL) {
149 OPENSSL_free(a);
150 return (0);
151 }
152 a->dirs = NULL;
153 lu->method_data = (char *)a;
154 return (1);
155 }
156
by_dir_hash_free(BY_DIR_HASH * hash)157 static void by_dir_hash_free(BY_DIR_HASH *hash)
158 {
159 OPENSSL_free(hash);
160 }
161
by_dir_hash_cmp(const BY_DIR_HASH ** a,const BY_DIR_HASH ** b)162 static int by_dir_hash_cmp(const BY_DIR_HASH **a, const BY_DIR_HASH **b)
163 {
164 if ((*a)->hash > (*b)->hash)
165 return 1;
166 if ((*a)->hash < (*b)->hash)
167 return -1;
168 return 0;
169 }
170
by_dir_entry_free(BY_DIR_ENTRY * ent)171 static void by_dir_entry_free(BY_DIR_ENTRY *ent)
172 {
173 if (ent->dir)
174 OPENSSL_free(ent->dir);
175 if (ent->hashes)
176 sk_BY_DIR_HASH_pop_free(ent->hashes, by_dir_hash_free);
177 OPENSSL_free(ent);
178 }
179
free_dir(X509_LOOKUP * lu)180 static void free_dir(X509_LOOKUP *lu)
181 {
182 BY_DIR *a;
183
184 a = (BY_DIR *)lu->method_data;
185 if (a->dirs != NULL)
186 sk_BY_DIR_ENTRY_pop_free(a->dirs, by_dir_entry_free);
187 if (a->buffer != NULL)
188 BUF_MEM_free(a->buffer);
189 OPENSSL_free(a);
190 }
191
add_cert_dir(BY_DIR * ctx,const char * dir,int type)192 static int add_cert_dir(BY_DIR *ctx, const char *dir, int type)
193 {
194 size_t j, len;
195 const char *s, *ss, *p;
196
197 if (dir == NULL || !*dir) {
198 OPENSSL_PUT_ERROR(X509, X509_R_INVALID_DIRECTORY);
199 return 0;
200 }
201
202 s = dir;
203 p = s;
204 do {
205 if ((*p == ':') || (*p == '\0')) {
206 BY_DIR_ENTRY *ent;
207 ss = s;
208 s = p + 1;
209 len = p - ss;
210 if (len == 0)
211 continue;
212 for (j = 0; j < sk_BY_DIR_ENTRY_num(ctx->dirs); j++) {
213 ent = sk_BY_DIR_ENTRY_value(ctx->dirs, j);
214 if (strlen(ent->dir) == len &&
215 strncmp(ent->dir, ss, len) == 0)
216 break;
217 }
218 if (j < sk_BY_DIR_ENTRY_num(ctx->dirs))
219 continue;
220 if (ctx->dirs == NULL) {
221 ctx->dirs = sk_BY_DIR_ENTRY_new_null();
222 if (!ctx->dirs) {
223 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
224 return 0;
225 }
226 }
227 ent = OPENSSL_malloc(sizeof(BY_DIR_ENTRY));
228 if (!ent)
229 return 0;
230 ent->dir_type = type;
231 ent->hashes = sk_BY_DIR_HASH_new(by_dir_hash_cmp);
232 ent->dir = OPENSSL_malloc(len + 1);
233 if (!ent->dir || !ent->hashes) {
234 by_dir_entry_free(ent);
235 return 0;
236 }
237 BUF_strlcpy(ent->dir, ss, len + 1);
238 if (!sk_BY_DIR_ENTRY_push(ctx->dirs, ent)) {
239 by_dir_entry_free(ent);
240 return 0;
241 }
242 }
243 } while (*p++ != '\0');
244 return 1;
245 }
246
247 /*
248 * g_ent_hashes_lock protects the |hashes| member of all |BY_DIR_ENTRY|
249 * objects.
250 */
251 static struct CRYPTO_STATIC_MUTEX g_ent_hashes_lock =
252 CRYPTO_STATIC_MUTEX_INIT;
253
get_cert_by_subject(X509_LOOKUP * xl,int type,X509_NAME * name,X509_OBJECT * ret)254 static int get_cert_by_subject(X509_LOOKUP *xl, int type, X509_NAME *name,
255 X509_OBJECT *ret)
256 {
257 BY_DIR *ctx;
258 union {
259 struct {
260 X509 st_x509;
261 X509_CINF st_x509_cinf;
262 } x509;
263 struct {
264 X509_CRL st_crl;
265 X509_CRL_INFO st_crl_info;
266 } crl;
267 } data;
268 int ok = 0;
269 size_t i;
270 int j, k;
271 unsigned long h;
272 unsigned long hash_array[2];
273 int hash_index;
274 BUF_MEM *b = NULL;
275 X509_OBJECT stmp, *tmp;
276 const char *postfix = "";
277
278 if (name == NULL)
279 return (0);
280
281 stmp.type = type;
282 if (type == X509_LU_X509) {
283 data.x509.st_x509.cert_info = &data.x509.st_x509_cinf;
284 data.x509.st_x509_cinf.subject = name;
285 stmp.data.x509 = &data.x509.st_x509;
286 postfix = "";
287 } else if (type == X509_LU_CRL) {
288 data.crl.st_crl.crl = &data.crl.st_crl_info;
289 data.crl.st_crl_info.issuer = name;
290 stmp.data.crl = &data.crl.st_crl;
291 postfix = "r";
292 } else {
293 OPENSSL_PUT_ERROR(X509, X509_R_WRONG_LOOKUP_TYPE);
294 goto finish;
295 }
296
297 if ((b = BUF_MEM_new()) == NULL) {
298 OPENSSL_PUT_ERROR(X509, ERR_R_BUF_LIB);
299 goto finish;
300 }
301
302 ctx = (BY_DIR *)xl->method_data;
303
304 hash_array[0] = X509_NAME_hash(name);
305 hash_array[1] = X509_NAME_hash_old(name);
306 for (hash_index = 0; hash_index < 2; ++hash_index) {
307 h = hash_array[hash_index];
308 for (i = 0; i < sk_BY_DIR_ENTRY_num(ctx->dirs); i++) {
309 BY_DIR_ENTRY *ent;
310 size_t idx;
311 BY_DIR_HASH htmp, *hent;
312 ent = sk_BY_DIR_ENTRY_value(ctx->dirs, i);
313 j = strlen(ent->dir) + 1 + 8 + 6 + 1 + 1;
314 if (!BUF_MEM_grow(b, j)) {
315 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
316 goto finish;
317 }
318 if (type == X509_LU_CRL && ent->hashes) {
319 htmp.hash = h;
320 CRYPTO_STATIC_MUTEX_lock_read(&g_ent_hashes_lock);
321 if (sk_BY_DIR_HASH_find(ent->hashes, &idx, &htmp)) {
322 hent = sk_BY_DIR_HASH_value(ent->hashes, idx);
323 k = hent->suffix;
324 } else {
325 hent = NULL;
326 k = 0;
327 }
328 CRYPTO_STATIC_MUTEX_unlock_read(&g_ent_hashes_lock);
329 } else {
330 k = 0;
331 hent = NULL;
332 }
333 for (;;) {
334 char c = '/';
335 #ifdef OPENSSL_SYS_VMS
336 c = ent->dir[strlen(ent->dir) - 1];
337 if (c != ':' && c != '>' && c != ']') {
338 /*
339 * If no separator is present, we assume the directory
340 * specifier is a logical name, and add a colon. We
341 * really should use better VMS routines for merging
342 * things like this, but this will do for now... --
343 * Richard Levitte
344 */
345 c = ':';
346 } else {
347 c = '\0';
348 }
349 #endif
350 if (c == '\0') {
351 /*
352 * This is special. When c == '\0', no directory
353 * separator should be added.
354 */
355 BIO_snprintf(b->data, b->max,
356 "%s%08lx.%s%d", ent->dir, h, postfix, k);
357 } else {
358 BIO_snprintf(b->data, b->max,
359 "%s%c%08lx.%s%d", ent->dir, c, h,
360 postfix, k);
361 }
362 #ifndef OPENSSL_NO_POSIX_IO
363 # if defined(_WIN32) && !defined(stat)
364 # define stat _stat
365 # endif
366 {
367 struct stat st;
368 if (stat(b->data, &st) < 0)
369 break;
370 }
371 #endif
372 /* found one. */
373 if (type == X509_LU_X509) {
374 if ((X509_load_cert_file(xl, b->data,
375 ent->dir_type)) == 0)
376 break;
377 } else if (type == X509_LU_CRL) {
378 if ((X509_load_crl_file(xl, b->data, ent->dir_type)) == 0)
379 break;
380 }
381 /* else case will caught higher up */
382 k++;
383 }
384
385 /*
386 * we have added it to the cache so now pull it out again
387 */
388 CRYPTO_MUTEX_lock_write(&xl->store_ctx->objs_lock);
389 tmp = NULL;
390 if (sk_X509_OBJECT_find(xl->store_ctx->objs, &idx, &stmp)) {
391 tmp = sk_X509_OBJECT_value(xl->store_ctx->objs, idx);
392 }
393 CRYPTO_MUTEX_unlock_write(&xl->store_ctx->objs_lock);
394
395 /*
396 * If a CRL, update the last file suffix added for this
397 */
398
399 if (type == X509_LU_CRL) {
400 CRYPTO_STATIC_MUTEX_lock_write(&g_ent_hashes_lock);
401 /*
402 * Look for entry again in case another thread added an entry
403 * first.
404 */
405 if (!hent) {
406 htmp.hash = h;
407 if (sk_BY_DIR_HASH_find(ent->hashes, &idx, &htmp))
408 hent = sk_BY_DIR_HASH_value(ent->hashes, idx);
409 }
410 if (!hent) {
411 hent = OPENSSL_malloc(sizeof(BY_DIR_HASH));
412 if (hent == NULL) {
413 CRYPTO_STATIC_MUTEX_unlock_write(&g_ent_hashes_lock);
414 ok = 0;
415 goto finish;
416 }
417 hent->hash = h;
418 hent->suffix = k;
419 if (!sk_BY_DIR_HASH_push(ent->hashes, hent)) {
420 CRYPTO_STATIC_MUTEX_unlock_write(&g_ent_hashes_lock);
421 OPENSSL_free(hent);
422 ok = 0;
423 goto finish;
424 }
425 } else if (hent->suffix < k)
426 hent->suffix = k;
427
428 CRYPTO_STATIC_MUTEX_unlock_write(&g_ent_hashes_lock);
429 }
430
431 if (tmp != NULL) {
432 ok = 1;
433 ret->type = tmp->type;
434 OPENSSL_memcpy(&ret->data, &tmp->data, sizeof(ret->data));
435 /*
436 * If we were going to up the reference count, we would need
437 * to do it on a perl 'type' basis
438 */
439 /*
440 * CRYPTO_add(&tmp->data.x509->references,1,
441 * CRYPTO_LOCK_X509);
442 */
443 goto finish;
444 }
445 }
446 }
447 finish:
448 if (b != NULL)
449 BUF_MEM_free(b);
450 return (ok);
451 }
452