|  | // Copyright 1995-2016 The OpenSSL Project Authors. All Rights Reserved. | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     https://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | #include <inttypes.h> | 
|  | #include <string.h> | 
|  |  | 
|  | #include <openssl/buf.h> | 
|  | #include <openssl/err.h> | 
|  | #include <openssl/mem.h> | 
|  | #include <openssl/thread.h> | 
|  | #include <openssl/x509.h> | 
|  |  | 
|  | #include "../internal.h" | 
|  | #include "internal.h" | 
|  |  | 
|  | typedef struct lookup_dir_hashes_st { | 
|  | uint32_t hash; | 
|  | int suffix; | 
|  | } BY_DIR_HASH; | 
|  |  | 
|  | typedef struct lookup_dir_entry_st { | 
|  | CRYPTO_MUTEX lock; | 
|  | char *dir; | 
|  | int dir_type; | 
|  | STACK_OF(BY_DIR_HASH) *hashes; | 
|  | } BY_DIR_ENTRY; | 
|  |  | 
|  | typedef struct lookup_dir_st { | 
|  | STACK_OF(BY_DIR_ENTRY) *dirs; | 
|  | } BY_DIR; | 
|  |  | 
|  | DEFINE_STACK_OF(BY_DIR_HASH) | 
|  | DEFINE_STACK_OF(BY_DIR_ENTRY) | 
|  |  | 
|  | static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | 
|  | char **ret); | 
|  | static int new_dir(X509_LOOKUP *lu); | 
|  | static void free_dir(X509_LOOKUP *lu); | 
|  | static int add_cert_dir(BY_DIR *ctx, const char *dir, int type); | 
|  | static int get_cert_by_subject(X509_LOOKUP *xl, int type, X509_NAME *name, | 
|  | X509_OBJECT *ret); | 
|  | static const X509_LOOKUP_METHOD x509_dir_lookup = { | 
|  | new_dir,              // new | 
|  | free_dir,             // free | 
|  | dir_ctrl,             // ctrl | 
|  | get_cert_by_subject,  // get_by_subject | 
|  | }; | 
|  |  | 
|  | const X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void) { | 
|  | return &x509_dir_lookup; | 
|  | } | 
|  |  | 
|  | static int dir_ctrl(X509_LOOKUP *ctx, int cmd, const char *argp, long argl, | 
|  | char **retp) { | 
|  | int ret = 0; | 
|  | char *dir = NULL; | 
|  |  | 
|  | BY_DIR *ld = reinterpret_cast<BY_DIR *>(ctx->method_data); | 
|  |  | 
|  | switch (cmd) { | 
|  | case X509_L_ADD_DIR: | 
|  | if (argl == X509_FILETYPE_DEFAULT) { | 
|  | dir = (char *)getenv(X509_get_default_cert_dir_env()); | 
|  | if (dir) { | 
|  | ret = add_cert_dir(ld, dir, X509_FILETYPE_PEM); | 
|  | } else { | 
|  | ret = | 
|  | add_cert_dir(ld, X509_get_default_cert_dir(), X509_FILETYPE_PEM); | 
|  | } | 
|  | if (!ret) { | 
|  | OPENSSL_PUT_ERROR(X509, X509_R_LOADING_CERT_DIR); | 
|  | } | 
|  | } else { | 
|  | ret = add_cert_dir(ld, argp, (int)argl); | 
|  | } | 
|  | break; | 
|  | } | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | static int new_dir(X509_LOOKUP *lu) { | 
|  | BY_DIR *a; | 
|  |  | 
|  | if ((a = (BY_DIR *)OPENSSL_malloc(sizeof(BY_DIR))) == NULL) { | 
|  | return 0; | 
|  | } | 
|  | a->dirs = NULL; | 
|  | lu->method_data = a; | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | static void by_dir_hash_free(BY_DIR_HASH *hash) { OPENSSL_free(hash); } | 
|  |  | 
|  | static int by_dir_hash_cmp(const BY_DIR_HASH *const *a, | 
|  | const BY_DIR_HASH *const *b) { | 
|  | if ((*a)->hash > (*b)->hash) { | 
|  | return 1; | 
|  | } | 
|  | if ((*a)->hash < (*b)->hash) { | 
|  | return -1; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void by_dir_entry_free(BY_DIR_ENTRY *ent) { | 
|  | if (ent != NULL) { | 
|  | CRYPTO_MUTEX_cleanup(&ent->lock); | 
|  | OPENSSL_free(ent->dir); | 
|  | sk_BY_DIR_HASH_pop_free(ent->hashes, by_dir_hash_free); | 
|  | OPENSSL_free(ent); | 
|  | } | 
|  | } | 
|  |  | 
|  | static void free_dir(X509_LOOKUP *lu) { | 
|  | BY_DIR *a = reinterpret_cast<BY_DIR *>(lu->method_data); | 
|  | if (a != NULL) { | 
|  | sk_BY_DIR_ENTRY_pop_free(a->dirs, by_dir_entry_free); | 
|  | OPENSSL_free(a); | 
|  | } | 
|  | } | 
|  |  | 
|  | #if defined(OPENSSL_WINDOWS) | 
|  | #define DIR_HASH_SEPARATOR ';' | 
|  | #else | 
|  | #define DIR_HASH_SEPARATOR ':' | 
|  | #endif | 
|  |  | 
|  | static int add_cert_dir(BY_DIR *ctx, const char *dir, int type) { | 
|  | size_t j, len; | 
|  | const char *s, *ss, *p; | 
|  |  | 
|  | if (dir == NULL || !*dir) { | 
|  | OPENSSL_PUT_ERROR(X509, X509_R_INVALID_DIRECTORY); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | s = dir; | 
|  | p = s; | 
|  | do { | 
|  | if (*p == DIR_HASH_SEPARATOR || *p == '\0') { | 
|  | BY_DIR_ENTRY *ent; | 
|  | ss = s; | 
|  | s = p + 1; | 
|  | len = p - ss; | 
|  | if (len == 0) { | 
|  | continue; | 
|  | } | 
|  | for (j = 0; j < sk_BY_DIR_ENTRY_num(ctx->dirs); j++) { | 
|  | ent = sk_BY_DIR_ENTRY_value(ctx->dirs, j); | 
|  | if (strlen(ent->dir) == len && strncmp(ent->dir, ss, len) == 0) { | 
|  | break; | 
|  | } | 
|  | } | 
|  | if (j < sk_BY_DIR_ENTRY_num(ctx->dirs)) { | 
|  | continue; | 
|  | } | 
|  | if (ctx->dirs == NULL) { | 
|  | ctx->dirs = sk_BY_DIR_ENTRY_new_null(); | 
|  | if (!ctx->dirs) { | 
|  | return 0; | 
|  | } | 
|  | } | 
|  | ent = reinterpret_cast<BY_DIR_ENTRY *>( | 
|  | OPENSSL_malloc(sizeof(BY_DIR_ENTRY))); | 
|  | if (!ent) { | 
|  | return 0; | 
|  | } | 
|  | CRYPTO_MUTEX_init(&ent->lock); | 
|  | ent->dir_type = type; | 
|  | ent->hashes = sk_BY_DIR_HASH_new(by_dir_hash_cmp); | 
|  | ent->dir = OPENSSL_strndup(ss, len); | 
|  | if (ent->dir == NULL || ent->hashes == NULL || | 
|  | !sk_BY_DIR_ENTRY_push(ctx->dirs, ent)) { | 
|  | by_dir_entry_free(ent); | 
|  | return 0; | 
|  | } | 
|  | } | 
|  | } while (*p++ != '\0'); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | static int get_cert_by_subject(X509_LOOKUP *xl, int type, X509_NAME *name, | 
|  | X509_OBJECT *ret) { | 
|  | union { | 
|  | struct { | 
|  | X509 st_x509; | 
|  | X509_CINF st_x509_cinf; | 
|  | } x509; | 
|  | struct { | 
|  | X509_CRL st_crl; | 
|  | X509_CRL_INFO st_crl_info; | 
|  | } crl; | 
|  | } data; | 
|  | int ok = 0; | 
|  | size_t i; | 
|  | int k; | 
|  | uint32_t h; | 
|  | uint32_t hash_array[2]; | 
|  | int hash_index; | 
|  | char *b = NULL; | 
|  | X509_OBJECT stmp, *tmp; | 
|  | const char *postfix = ""; | 
|  |  | 
|  | if (name == NULL) { | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | stmp.type = type; | 
|  | BY_DIR *ctx = reinterpret_cast<BY_DIR *>(xl->method_data); | 
|  | if (type == X509_LU_X509) { | 
|  | data.x509.st_x509.cert_info = &data.x509.st_x509_cinf; | 
|  | data.x509.st_x509_cinf.subject = name; | 
|  | stmp.data.x509 = &data.x509.st_x509; | 
|  | postfix = ""; | 
|  | } else if (type == X509_LU_CRL) { | 
|  | data.crl.st_crl.crl = &data.crl.st_crl_info; | 
|  | data.crl.st_crl_info.issuer = name; | 
|  | stmp.data.crl = &data.crl.st_crl; | 
|  | postfix = "r"; | 
|  | } else { | 
|  | OPENSSL_PUT_ERROR(X509, X509_R_WRONG_LOOKUP_TYPE); | 
|  | goto finish; | 
|  | } | 
|  |  | 
|  | hash_array[0] = X509_NAME_hash(name); | 
|  | hash_array[1] = X509_NAME_hash_old(name); | 
|  | for (hash_index = 0; hash_index < 2; ++hash_index) { | 
|  | h = hash_array[hash_index]; | 
|  | for (i = 0; i < sk_BY_DIR_ENTRY_num(ctx->dirs); i++) { | 
|  | BY_DIR_ENTRY *ent; | 
|  | size_t idx; | 
|  | BY_DIR_HASH htmp, *hent; | 
|  | ent = sk_BY_DIR_ENTRY_value(ctx->dirs, i); | 
|  | if (type == X509_LU_CRL && ent->hashes) { | 
|  | htmp.hash = h; | 
|  | CRYPTO_MUTEX_lock_read(&ent->lock); | 
|  | if (sk_BY_DIR_HASH_find(ent->hashes, &idx, &htmp)) { | 
|  | hent = sk_BY_DIR_HASH_value(ent->hashes, idx); | 
|  | k = hent->suffix; | 
|  | } else { | 
|  | hent = NULL; | 
|  | k = 0; | 
|  | } | 
|  | CRYPTO_MUTEX_unlock_read(&ent->lock); | 
|  | } else { | 
|  | k = 0; | 
|  | hent = NULL; | 
|  | } | 
|  | for (;;) { | 
|  | OPENSSL_free(b); | 
|  | if (OPENSSL_asprintf(&b, "%s/%08" PRIx32 ".%s%d", ent->dir, h, postfix, | 
|  | k) == -1) { | 
|  | OPENSSL_PUT_ERROR(X509, ERR_R_BUF_LIB); | 
|  | b = nullptr; | 
|  | goto finish; | 
|  | } | 
|  | if (type == X509_LU_X509) { | 
|  | if ((X509_load_cert_file(xl, b, ent->dir_type)) == 0) { | 
|  | // Don't expose the lower level error, All of these boil | 
|  | // down to "we could not find a CA". | 
|  | ERR_clear_error(); | 
|  | break; | 
|  | } | 
|  | } else if (type == X509_LU_CRL) { | 
|  | if ((X509_load_crl_file(xl, b, ent->dir_type)) == 0) { | 
|  | // Don't expose the lower level error, All of these boil | 
|  | // down to "we could not find a CRL". | 
|  | ERR_clear_error(); | 
|  | break; | 
|  | } | 
|  | } | 
|  | // The lack of a CA or CRL will be caught higher up | 
|  | k++; | 
|  | } | 
|  |  | 
|  | // we have added it to the cache so now pull it out again | 
|  | CRYPTO_MUTEX_lock_write(&xl->store_ctx->objs_lock); | 
|  | tmp = NULL; | 
|  | sk_X509_OBJECT_sort(xl->store_ctx->objs); | 
|  | if (sk_X509_OBJECT_find(xl->store_ctx->objs, &idx, &stmp)) { | 
|  | tmp = sk_X509_OBJECT_value(xl->store_ctx->objs, idx); | 
|  | } | 
|  | CRYPTO_MUTEX_unlock_write(&xl->store_ctx->objs_lock); | 
|  |  | 
|  | // If a CRL, update the last file suffix added for this | 
|  |  | 
|  | if (type == X509_LU_CRL) { | 
|  | CRYPTO_MUTEX_lock_write(&ent->lock); | 
|  | // Look for entry again in case another thread added an entry | 
|  | // first. | 
|  | if (!hent) { | 
|  | htmp.hash = h; | 
|  | sk_BY_DIR_HASH_sort(ent->hashes); | 
|  | if (sk_BY_DIR_HASH_find(ent->hashes, &idx, &htmp)) { | 
|  | hent = sk_BY_DIR_HASH_value(ent->hashes, idx); | 
|  | } | 
|  | } | 
|  | if (!hent) { | 
|  | hent = reinterpret_cast<BY_DIR_HASH *>( | 
|  | OPENSSL_malloc(sizeof(BY_DIR_HASH))); | 
|  | if (hent == NULL) { | 
|  | CRYPTO_MUTEX_unlock_write(&ent->lock); | 
|  | ok = 0; | 
|  | goto finish; | 
|  | } | 
|  | hent->hash = h; | 
|  | hent->suffix = k; | 
|  | if (!sk_BY_DIR_HASH_push(ent->hashes, hent)) { | 
|  | CRYPTO_MUTEX_unlock_write(&ent->lock); | 
|  | OPENSSL_free(hent); | 
|  | ok = 0; | 
|  | goto finish; | 
|  | } | 
|  | sk_BY_DIR_HASH_sort(ent->hashes); | 
|  | } else if (hent->suffix < k) { | 
|  | hent->suffix = k; | 
|  | } | 
|  |  | 
|  | CRYPTO_MUTEX_unlock_write(&ent->lock); | 
|  | } | 
|  |  | 
|  | if (tmp != NULL) { | 
|  | ok = 1; | 
|  | ret->type = tmp->type; | 
|  | OPENSSL_memcpy(&ret->data, &tmp->data, sizeof(ret->data)); | 
|  |  | 
|  | // Clear any errors that might have been raised processing empty | 
|  | // or malformed files. | 
|  | ERR_clear_error(); | 
|  |  | 
|  | // If we were going to up the reference count, we would need | 
|  | // to do it on a perl 'type' basis | 
|  | goto finish; | 
|  | } | 
|  | } | 
|  | } | 
|  | finish: | 
|  | OPENSSL_free(b); | 
|  | return ok; | 
|  | } | 
|  |  | 
|  | int X509_LOOKUP_add_dir(X509_LOOKUP *lookup, const char *name, int type) { | 
|  | return X509_LOOKUP_ctrl(lookup, X509_L_ADD_DIR, name, type, NULL); | 
|  | } |