1 /* crypto/x509/by_dir.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved.
4 *
5 * This package is an SSL implementation written
6 * by Eric Young (eay@cryptsoft.com).
7 * The implementation was written so as to conform with Netscapes SSL.
8 *
9 * This library is free for commercial and non-commercial use as long as
10 * the following conditions are aheared to. The following conditions
11 * apply to all code found in this distribution, be it the RC4, RSA,
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13 * included with this distribution is covered by the same copyright terms
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15 *
16 * Copyright remains Eric Young's, and as such any Copyright notices in
17 * the code are not to be removed.
18 * If this package is used in a product, Eric Young should be given attribution
19 * as the author of the parts of the library used.
20 * This can be in the form of a textual message at program startup or
21 * in documentation (online or textual) provided with the package.
22 *
23 * Redistribution and use in source and binary forms, with or without
24 * modification, are permitted provided that the following conditions
25 * are met:
26 * 1. Redistributions of source code must retain the copyright
27 * notice, this list of conditions and the following disclaimer.
28 * 2. Redistributions in binary form must reproduce the above copyright
29 * notice, this list of conditions and the following disclaimer in the
30 * documentation and/or other materials provided with the distribution.
31 * 3. All advertising materials mentioning features or use of this software
32 * must display the following acknowledgement:
33 * "This product includes cryptographic software written by
34 * Eric Young (eay@cryptsoft.com)"
35 * The word 'cryptographic' can be left out if the rouines from the library
36 * being used are not cryptographic related :-).
37 * 4. If you include any Windows specific code (or a derivative thereof) from
38 * the apps directory (application code) you must include an acknowledgement:
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40 *
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51 * SUCH DAMAGE.
52 *
53 * The licence and distribution terms for any publically available version or
54 * derivative of this code cannot be changed. i.e. this code cannot simply be
55 * copied and put under another distribution licence
56 * [including the GNU Public Licence.] */
57
58 #include <string.h>
59 #include <sys/stat.h>
60 #include <sys/types.h>
61
62 #include <openssl/buf.h>
63 #include <openssl/err.h>
64 #include <openssl/lhash.h>
65 #include <openssl/mem.h>
66 #include <openssl/thread.h>
67 #include <openssl/x509.h>
68
69 #include "../internal.h"
70
71
72 typedef struct lookup_dir_hashes_st
73 {
74 unsigned long hash;
75 int suffix;
76 } BY_DIR_HASH;
77
78 typedef struct lookup_dir_entry_st
79 {
80 char *dir;
81 int dir_type;
82 STACK_OF(BY_DIR_HASH) *hashes;
83 } BY_DIR_ENTRY;
84
85 typedef struct lookup_dir_st
86 {
87 BUF_MEM *buffer;
88 STACK_OF(BY_DIR_ENTRY) *dirs;
89 } BY_DIR;
90
91 DECLARE_STACK_OF(BY_DIR_HASH)
92 DECLARE_STACK_OF(BY_DIR_ENTRY)
93
94 static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl,
95 char **ret);
96 static int new_dir(X509_LOOKUP *lu);
97 static void free_dir(X509_LOOKUP *lu);
98 static int add_cert_dir(BY_DIR *ctx,const char *dir,int type);
99 static int get_cert_by_subject(X509_LOOKUP *xl,int type,X509_NAME *name,
100 X509_OBJECT *ret);
101 static X509_LOOKUP_METHOD x509_dir_lookup=
102 {
103 "Load certs from files in a directory",
104 new_dir, /* new */
105 free_dir, /* free */
106 NULL, /* init */
107 NULL, /* shutdown */
108 dir_ctrl, /* ctrl */
109 get_cert_by_subject, /* get_by_subject */
110 NULL, /* get_by_issuer_serial */
111 NULL, /* get_by_fingerprint */
112 NULL, /* get_by_alias */
113 };
114
X509_LOOKUP_hash_dir(void)115 X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void)
116 {
117 return(&x509_dir_lookup);
118 }
119
dir_ctrl(X509_LOOKUP * ctx,int cmd,const char * argp,long argl,char ** retp)120 static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl,
121 char **retp)
122 {
123 int ret=0;
124 BY_DIR *ld;
125 char *dir = NULL;
126
127 ld=(BY_DIR *)ctx->method_data;
128
129 switch (cmd)
130 {
131 case X509_L_ADD_DIR:
132 if (argl == X509_FILETYPE_DEFAULT)
133 {
134 dir=(char *)getenv(X509_get_default_cert_dir_env());
135 if (dir)
136 ret=add_cert_dir(ld,dir,X509_FILETYPE_PEM);
137 else
138 ret=add_cert_dir(ld,X509_get_default_cert_dir(),
139 X509_FILETYPE_PEM);
140 if (!ret)
141 {
142 OPENSSL_PUT_ERROR(X509, X509_R_LOADING_CERT_DIR);
143 }
144 }
145 else
146 ret=add_cert_dir(ld,argp,(int)argl);
147 break;
148 }
149 return(ret);
150 }
151
new_dir(X509_LOOKUP * lu)152 static int new_dir(X509_LOOKUP *lu)
153 {
154 BY_DIR *a;
155
156 if ((a=(BY_DIR *)OPENSSL_malloc(sizeof(BY_DIR))) == NULL)
157 return(0);
158 if ((a->buffer=BUF_MEM_new()) == NULL)
159 {
160 OPENSSL_free(a);
161 return(0);
162 }
163 a->dirs=NULL;
164 lu->method_data=(char *)a;
165 return(1);
166 }
167
by_dir_hash_free(BY_DIR_HASH * hash)168 static void by_dir_hash_free(BY_DIR_HASH *hash)
169 {
170 OPENSSL_free(hash);
171 }
172
by_dir_hash_cmp(const BY_DIR_HASH ** a,const BY_DIR_HASH ** b)173 static int by_dir_hash_cmp(const BY_DIR_HASH **a,
174 const BY_DIR_HASH **b)
175 {
176 if ((*a)->hash > (*b)->hash)
177 return 1;
178 if ((*a)->hash < (*b)->hash)
179 return -1;
180 return 0;
181 }
182
by_dir_entry_free(BY_DIR_ENTRY * ent)183 static void by_dir_entry_free(BY_DIR_ENTRY *ent)
184 {
185 if (ent->dir)
186 OPENSSL_free(ent->dir);
187 if (ent->hashes)
188 sk_BY_DIR_HASH_pop_free(ent->hashes, by_dir_hash_free);
189 OPENSSL_free(ent);
190 }
191
free_dir(X509_LOOKUP * lu)192 static void free_dir(X509_LOOKUP *lu)
193 {
194 BY_DIR *a;
195
196 a=(BY_DIR *)lu->method_data;
197 if (a->dirs != NULL)
198 sk_BY_DIR_ENTRY_pop_free(a->dirs, by_dir_entry_free);
199 if (a->buffer != NULL)
200 BUF_MEM_free(a->buffer);
201 OPENSSL_free(a);
202 }
203
add_cert_dir(BY_DIR * ctx,const char * dir,int type)204 static int add_cert_dir(BY_DIR *ctx, const char *dir, int type)
205 {
206 size_t j,len;
207 const char *s,*ss,*p;
208
209 if (dir == NULL || !*dir)
210 {
211 OPENSSL_PUT_ERROR(X509, X509_R_INVALID_DIRECTORY);
212 return 0;
213 }
214
215 s=dir;
216 p=s;
217 do
218 {
219 if ((*p == ':') || (*p == '\0'))
220 {
221 BY_DIR_ENTRY *ent;
222 ss=s;
223 s=p+1;
224 len=p-ss;
225 if (len == 0) continue;
226 for (j=0; j < sk_BY_DIR_ENTRY_num(ctx->dirs); j++)
227 {
228 ent = sk_BY_DIR_ENTRY_value(ctx->dirs, j);
229 if (strlen(ent->dir) == len &&
230 strncmp(ent->dir,ss,len) == 0)
231 break;
232 }
233 if (j < sk_BY_DIR_ENTRY_num(ctx->dirs))
234 continue;
235 if (ctx->dirs == NULL)
236 {
237 ctx->dirs = sk_BY_DIR_ENTRY_new_null();
238 if (!ctx->dirs)
239 {
240 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
241 return 0;
242 }
243 }
244 ent = OPENSSL_malloc(sizeof(BY_DIR_ENTRY));
245 if (!ent)
246 return 0;
247 ent->dir_type = type;
248 ent->hashes = sk_BY_DIR_HASH_new(by_dir_hash_cmp);
249 ent->dir = OPENSSL_malloc(len+1);
250 if (!ent->dir || !ent->hashes)
251 {
252 by_dir_entry_free(ent);
253 return 0;
254 }
255 strncpy(ent->dir,ss,len);
256 ent->dir[len] = '\0';
257 if (!sk_BY_DIR_ENTRY_push(ctx->dirs, ent))
258 {
259 by_dir_entry_free(ent);
260 return 0;
261 }
262 }
263 } while (*p++ != '\0');
264 return 1;
265 }
266
267 /* g_ent_hashes_lock protects the |hashes| member of all |BY_DIR_ENTRY|
268 * objects. */
269 static struct CRYPTO_STATIC_MUTEX g_ent_hashes_lock = CRYPTO_STATIC_MUTEX_INIT;
270
get_cert_by_subject(X509_LOOKUP * xl,int type,X509_NAME * name,X509_OBJECT * ret)271 static int get_cert_by_subject(X509_LOOKUP *xl, int type, X509_NAME *name,
272 X509_OBJECT *ret)
273 {
274 BY_DIR *ctx;
275 union {
276 struct {
277 X509 st_x509;
278 X509_CINF st_x509_cinf;
279 } x509;
280 struct {
281 X509_CRL st_crl;
282 X509_CRL_INFO st_crl_info;
283 } crl;
284 } data;
285 int ok=0;
286 size_t i;
287 int j,k;
288 unsigned long h;
289 unsigned long hash_array[2];
290 int hash_index;
291 BUF_MEM *b=NULL;
292 X509_OBJECT stmp,*tmp;
293 const char *postfix="";
294
295 if (name == NULL) return(0);
296
297 stmp.type=type;
298 if (type == X509_LU_X509)
299 {
300 data.x509.st_x509.cert_info= &data.x509.st_x509_cinf;
301 data.x509.st_x509_cinf.subject=name;
302 stmp.data.x509= &data.x509.st_x509;
303 postfix="";
304 }
305 else if (type == X509_LU_CRL)
306 {
307 data.crl.st_crl.crl= &data.crl.st_crl_info;
308 data.crl.st_crl_info.issuer=name;
309 stmp.data.crl= &data.crl.st_crl;
310 postfix="r";
311 }
312 else
313 {
314 OPENSSL_PUT_ERROR(X509, X509_R_WRONG_LOOKUP_TYPE);
315 goto finish;
316 }
317
318 if ((b=BUF_MEM_new()) == NULL)
319 {
320 OPENSSL_PUT_ERROR(X509, ERR_R_BUF_LIB);
321 goto finish;
322 }
323
324 ctx=(BY_DIR *)xl->method_data;
325
326 hash_array[0]=X509_NAME_hash(name);
327 hash_array[1]=X509_NAME_hash_old(name);
328 for (hash_index=0; hash_index < 2; ++hash_index)
329 {
330 h=hash_array[hash_index];
331 for (i=0; i < sk_BY_DIR_ENTRY_num(ctx->dirs); i++)
332 {
333 BY_DIR_ENTRY *ent;
334 size_t idx;
335 BY_DIR_HASH htmp, *hent;
336 ent = sk_BY_DIR_ENTRY_value(ctx->dirs, i);
337 j=strlen(ent->dir)+1+8+6+1+1;
338 if (!BUF_MEM_grow(b,j))
339 {
340 OPENSSL_PUT_ERROR(X509, ERR_R_MALLOC_FAILURE);
341 goto finish;
342 }
343 if (type == X509_LU_CRL && ent->hashes)
344 {
345 htmp.hash = h;
346 CRYPTO_STATIC_MUTEX_lock_read(&g_ent_hashes_lock);
347 if (sk_BY_DIR_HASH_find(ent->hashes, &idx, &htmp))
348 {
349 hent = sk_BY_DIR_HASH_value(ent->hashes, idx);
350 k = hent->suffix;
351 }
352 else
353 {
354 hent = NULL;
355 k=0;
356 }
357 CRYPTO_STATIC_MUTEX_unlock(&g_ent_hashes_lock);
358 }
359 else
360 {
361 k = 0;
362 hent = NULL;
363 }
364 for (;;)
365 {
366 char c = '/';
367 #ifdef OPENSSL_SYS_VMS
368 c = ent->dir[strlen(ent->dir)-1];
369 if (c != ':' && c != '>' && c != ']')
370 {
371 /* If no separator is present, we assume the
372 directory specifier is a logical name, and
373 add a colon. We really should use better
374 VMS routines for merging things like this,
375 but this will do for now...
376 -- Richard Levitte */
377 c = ':';
378 }
379 else
380 {
381 c = '\0';
382 }
383 #endif
384 if (c == '\0')
385 {
386 /* This is special. When c == '\0', no
387 directory separator should be added. */
388 BIO_snprintf(b->data,b->max,
389 "%s%08lx.%s%d",ent->dir,h,
390 postfix,k);
391 }
392 else
393 {
394 BIO_snprintf(b->data,b->max,
395 "%s%c%08lx.%s%d",ent->dir,c,h,
396 postfix,k);
397 }
398 #ifndef OPENSSL_NO_POSIX_IO
399 #ifdef _WIN32
400 #define stat _stat
401 #endif
402 {
403 struct stat st;
404 if (stat(b->data,&st) < 0)
405 break;
406 }
407 #endif
408 /* found one. */
409 if (type == X509_LU_X509)
410 {
411 if ((X509_load_cert_file(xl,b->data,
412 ent->dir_type)) == 0)
413 break;
414 }
415 else if (type == X509_LU_CRL)
416 {
417 if ((X509_load_crl_file(xl,b->data,
418 ent->dir_type)) == 0)
419 break;
420 }
421 /* else case will caught higher up */
422 k++;
423 }
424
425 /* we have added it to the cache so now pull
426 * it out again */
427 CRYPTO_MUTEX_lock_write(&xl->store_ctx->objs_lock);
428 tmp = NULL;
429 if (sk_X509_OBJECT_find(xl->store_ctx->objs, &idx, &stmp)) {
430 tmp=sk_X509_OBJECT_value(xl->store_ctx->objs,idx);
431 }
432 CRYPTO_MUTEX_unlock(&xl->store_ctx->objs_lock);
433
434
435 /* If a CRL, update the last file suffix added for this */
436
437 if (type == X509_LU_CRL)
438 {
439 CRYPTO_STATIC_MUTEX_lock_write(&g_ent_hashes_lock);
440 /* Look for entry again in case another thread added
441 * an entry first.
442 */
443 if (!hent)
444 {
445 htmp.hash = h;
446 if (sk_BY_DIR_HASH_find(ent->hashes, &idx, &htmp))
447 hent = sk_BY_DIR_HASH_value(ent->hashes, idx);
448 }
449 if (!hent)
450 {
451 hent = OPENSSL_malloc(sizeof(BY_DIR_HASH));
452 if (hent == NULL)
453 {
454 CRYPTO_STATIC_MUTEX_unlock(&g_ent_hashes_lock);
455 ok = 0;
456 goto finish;
457 }
458 hent->hash = h;
459 hent->suffix = k;
460 if (!sk_BY_DIR_HASH_push(ent->hashes, hent))
461 {
462 CRYPTO_STATIC_MUTEX_unlock(&g_ent_hashes_lock);
463 OPENSSL_free(hent);
464 ok = 0;
465 goto finish;
466 }
467 }
468 else if (hent->suffix < k)
469 hent->suffix = k;
470
471 CRYPTO_STATIC_MUTEX_unlock(&g_ent_hashes_lock);
472 }
473
474 if (tmp != NULL)
475 {
476 ok=1;
477 ret->type=tmp->type;
478 memcpy(&ret->data,&tmp->data,sizeof(ret->data));
479 /* If we were going to up the reference count,
480 * we would need to do it on a perl 'type'
481 * basis */
482 /* CRYPTO_add(&tmp->data.x509->references,1,
483 CRYPTO_LOCK_X509);*/
484 goto finish;
485 }
486 }
487 }
488 finish:
489 if (b != NULL) BUF_MEM_free(b);
490 return(ok);
491 }
492