os/ossrv/ssl/libcrypto/src/crypto/x509/x509_lu.c
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 /* crypto/x509/x509_lu.c */
     2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
     3  * All rights reserved.
     4  *
     5  * This package is an SSL implementation written
     6  * by Eric Young (eay@cryptsoft.com).
     7  * The implementation was written so as to conform with Netscapes SSL.
     8  * 
     9  * This library is free for commercial and non-commercial use as long as
    10  * the following conditions are aheared to.  The following conditions
    11  * apply to all code found in this distribution, be it the RC4, RSA,
    12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
    13  * included with this distribution is covered by the same copyright terms
    14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
    15  * 
    16  * Copyright remains Eric Young's, and as such any Copyright notices in
    17  * the code are not to be removed.
    18  * If this package is used in a product, Eric Young should be given attribution
    19  * as the author of the parts of the library used.
    20  * This can be in the form of a textual message at program startup or
    21  * in documentation (online or textual) provided with the package.
    22  * 
    23  * Redistribution and use in source and binary forms, with or without
    24  * modification, are permitted provided that the following conditions
    25  * are met:
    26  * 1. Redistributions of source code must retain the copyright
    27  *    notice, this list of conditions and the following disclaimer.
    28  * 2. Redistributions in binary form must reproduce the above copyright
    29  *    notice, this list of conditions and the following disclaimer in the
    30  *    documentation and/or other materials provided with the distribution.
    31  * 3. All advertising materials mentioning features or use of this software
    32  *    must display the following acknowledgement:
    33  *    "This product includes cryptographic software written by
    34  *     Eric Young (eay@cryptsoft.com)"
    35  *    The word 'cryptographic' can be left out if the rouines from the library
    36  *    being used are not cryptographic related :-).
    37  * 4. If you include any Windows specific code (or a derivative thereof) from 
    38  *    the apps directory (application code) you must include an acknowledgement:
    39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
    40  * 
    41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
    42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
    43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
    44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
    45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
    46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
    47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
    48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
    49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
    50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
    51  * SUCH DAMAGE.
    52  * 
    53  * The licence and distribution terms for any publically available version or
    54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
    55  * copied and put under another distribution licence
    56  * [including the GNU Public Licence.]
    57  */
    58 
    59 #include <stdio.h>
    60 #include "cryptlib.h"
    61 #include <openssl/lhash.h>
    62 #include <openssl/x509.h>
    63 #include <openssl/x509v3.h>
    64 
    65 EXPORT_C X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method)
    66 	{
    67 	X509_LOOKUP *ret;
    68 
    69 	ret=(X509_LOOKUP *)OPENSSL_malloc(sizeof(X509_LOOKUP));
    70 	if (ret == NULL) return NULL;
    71 
    72 	ret->init=0;
    73 	ret->skip=0;
    74 	ret->method=method;
    75 	ret->method_data=NULL;
    76 	ret->store_ctx=NULL;
    77 	if ((method->new_item != NULL) && !method->new_item(ret))
    78 		{
    79 		OPENSSL_free(ret);
    80 		return NULL;
    81 		}
    82 	return ret;
    83 	}
    84 
    85 EXPORT_C void X509_LOOKUP_free(X509_LOOKUP *ctx)
    86 	{
    87 	if (ctx == NULL) return;
    88 	if (	(ctx->method != NULL) &&
    89 		(ctx->method->free != NULL))
    90 		ctx->method->free(ctx);
    91 	OPENSSL_free(ctx);
    92 	}
    93 
    94 EXPORT_C int X509_LOOKUP_init(X509_LOOKUP *ctx)
    95 	{
    96 	if (ctx->method == NULL) return 0;
    97 	if (ctx->method->init != NULL)
    98 		return ctx->method->init(ctx);
    99 	else
   100 		return 1;
   101 	}
   102 
   103 EXPORT_C int X509_LOOKUP_shutdown(X509_LOOKUP *ctx)
   104 	{
   105 	if (ctx->method == NULL) return 0;
   106 	if (ctx->method->shutdown != NULL)
   107 		return ctx->method->shutdown(ctx);
   108 	else
   109 		return 1;
   110 	}
   111 
   112 EXPORT_C int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, long argl,
   113 	     char **ret)
   114 	{
   115 	if (ctx->method == NULL) return -1;
   116 	if (ctx->method->ctrl != NULL)
   117 		return ctx->method->ctrl(ctx,cmd,argc,argl,ret);
   118 	else
   119 		return 1;
   120 	}
   121 
   122 EXPORT_C int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name,
   123 	     X509_OBJECT *ret)
   124 	{
   125 	if ((ctx->method == NULL) || (ctx->method->get_by_subject == NULL))
   126 		return X509_LU_FAIL;
   127 	if (ctx->skip) return 0;
   128 	return ctx->method->get_by_subject(ctx,type,name,ret);
   129 	}
   130 
   131 EXPORT_C int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, int type, X509_NAME *name,
   132 	     ASN1_INTEGER *serial, X509_OBJECT *ret)
   133 	{
   134 	if ((ctx->method == NULL) ||
   135 		(ctx->method->get_by_issuer_serial == NULL))
   136 		return X509_LU_FAIL;
   137 	return ctx->method->get_by_issuer_serial(ctx,type,name,serial,ret);
   138 	}
   139 
   140 EXPORT_C int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, int type,
   141 	     unsigned char *bytes, int len, X509_OBJECT *ret)
   142 	{
   143 	if ((ctx->method == NULL) || (ctx->method->get_by_fingerprint == NULL))
   144 		return X509_LU_FAIL;
   145 	return ctx->method->get_by_fingerprint(ctx,type,bytes,len,ret);
   146 	}
   147 
   148 EXPORT_C int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, int type, char *str, int len,
   149 	     X509_OBJECT *ret)
   150 	{
   151 	if ((ctx->method == NULL) || (ctx->method->get_by_alias == NULL))
   152 		return X509_LU_FAIL;
   153 	return ctx->method->get_by_alias(ctx,type,str,len,ret);
   154 	}
   155 
   156   
   157 static int x509_object_cmp(const X509_OBJECT * const *a, const X509_OBJECT * const *b)
   158   	{
   159  	int ret;
   160 
   161  	ret=((*a)->type - (*b)->type);
   162  	if (ret) return ret;
   163  	switch ((*a)->type)
   164  		{
   165  	case X509_LU_X509:
   166  		ret=X509_subject_name_cmp((*a)->data.x509,(*b)->data.x509);
   167  		break;
   168  	case X509_LU_CRL:
   169  		ret=X509_CRL_cmp((*a)->data.crl,(*b)->data.crl);
   170  		break;
   171 	default:
   172 		/* abort(); */
   173 		return 0;
   174 		}
   175 	return ret;
   176 	}
   177 
   178 EXPORT_C X509_STORE *X509_STORE_new(void)
   179 	{
   180 	X509_STORE *ret;
   181 
   182 	if ((ret=(X509_STORE *)OPENSSL_malloc(sizeof(X509_STORE))) == NULL)
   183 		return NULL;
   184 	ret->objs = sk_X509_OBJECT_new(x509_object_cmp);
   185 	ret->cache=1;
   186 	ret->get_cert_methods=sk_X509_LOOKUP_new_null();
   187 	ret->verify=0;
   188 	ret->verify_cb=0;
   189 
   190 	if ((ret->param = X509_VERIFY_PARAM_new()) == NULL)
   191 		return NULL;
   192 
   193 	ret->get_issuer = 0;
   194 	ret->check_issued = 0;
   195 	ret->check_revocation = 0;
   196 	ret->get_crl = 0;
   197 	ret->check_crl = 0;
   198 	ret->cert_crl = 0;
   199 	ret->cleanup = 0;
   200 
   201 	CRYPTO_new_ex_data(CRYPTO_EX_INDEX_X509_STORE, ret, &ret->ex_data);
   202 	ret->references=1;
   203 	return ret;
   204 	}
   205 
   206 static void cleanup(X509_OBJECT *a)
   207 	{
   208 	if (a->type == X509_LU_X509)
   209 		{
   210 		X509_free(a->data.x509);
   211 		}
   212 	else if (a->type == X509_LU_CRL)
   213 		{
   214 		X509_CRL_free(a->data.crl);
   215 		}
   216 	else
   217 		{
   218 		/* abort(); */
   219 		}
   220 
   221 	OPENSSL_free(a);
   222 	}
   223 
   224 EXPORT_C void X509_STORE_free(X509_STORE *vfy)
   225 	{
   226 	int i;
   227 	STACK_OF(X509_LOOKUP) *sk;
   228 	X509_LOOKUP *lu;
   229 
   230 	if (vfy == NULL)
   231 	    return;
   232 
   233 	sk=vfy->get_cert_methods;
   234 	for (i=0; i<sk_X509_LOOKUP_num(sk); i++)
   235 		{
   236 		lu=sk_X509_LOOKUP_value(sk,i);
   237 		X509_LOOKUP_shutdown(lu);
   238 		X509_LOOKUP_free(lu);
   239 		}
   240 	sk_X509_LOOKUP_free(sk);
   241 	sk_X509_OBJECT_pop_free(vfy->objs, cleanup);
   242 
   243 	CRYPTO_free_ex_data(CRYPTO_EX_INDEX_X509_STORE, vfy, &vfy->ex_data);
   244 	if (vfy->param)
   245 		X509_VERIFY_PARAM_free(vfy->param);
   246 	OPENSSL_free(vfy);
   247 	}
   248 
   249 EXPORT_C X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m)
   250 	{
   251 	int i;
   252 	STACK_OF(X509_LOOKUP) *sk;
   253 	X509_LOOKUP *lu;
   254 
   255 	sk=v->get_cert_methods;
   256 	for (i=0; i<sk_X509_LOOKUP_num(sk); i++)
   257 		{
   258 		lu=sk_X509_LOOKUP_value(sk,i);
   259 		if (m == lu->method)
   260 			{
   261 			return lu;
   262 			}
   263 		}
   264 	/* a new one */
   265 	lu=X509_LOOKUP_new(m);
   266 	if (lu == NULL)
   267 		return NULL;
   268 	else
   269 		{
   270 		lu->store_ctx=v;
   271 		if (sk_X509_LOOKUP_push(v->get_cert_methods,lu))
   272 			return lu;
   273 		else
   274 			{
   275 			X509_LOOKUP_free(lu);
   276 			return NULL;
   277 			}
   278 		}
   279 	}
   280 
   281 EXPORT_C int X509_STORE_get_by_subject(X509_STORE_CTX *vs, int type, X509_NAME *name,
   282 	     X509_OBJECT *ret)
   283 	{
   284 	X509_STORE *ctx=vs->ctx;
   285 	X509_LOOKUP *lu;
   286 	X509_OBJECT stmp,*tmp;
   287 	int i,j;
   288 
   289 	tmp=X509_OBJECT_retrieve_by_subject(ctx->objs,type,name);
   290 
   291 	if (tmp == NULL)
   292 		{
   293 		for (i=vs->current_method; i<sk_X509_LOOKUP_num(ctx->get_cert_methods); i++)
   294 			{
   295 			lu=sk_X509_LOOKUP_value(ctx->get_cert_methods,i);
   296 			j=X509_LOOKUP_by_subject(lu,type,name,&stmp);
   297 			if (j < 0)
   298 				{
   299 				vs->current_method=j;
   300 				return j;
   301 				}
   302 			else if (j)
   303 				{
   304 				tmp= &stmp;
   305 				break;
   306 				}
   307 			}
   308 		vs->current_method=0;
   309 		if (tmp == NULL)
   310 			return 0;
   311 		}
   312 
   313 /*	if (ret->data.ptr != NULL)
   314 		X509_OBJECT_free_contents(ret); */
   315 
   316 	ret->type=tmp->type;
   317 	ret->data.ptr=tmp->data.ptr;
   318 
   319 	X509_OBJECT_up_ref_count(ret);
   320 
   321 	return 1;
   322 	}
   323 
   324 EXPORT_C int X509_STORE_add_cert(X509_STORE *ctx, X509 *x)
   325 	{
   326 	X509_OBJECT *obj;
   327 	int ret=1;
   328 
   329 	if (x == NULL) return 0;
   330 	obj=(X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT));
   331 	if (obj == NULL)
   332 		{
   333 		X509err(X509_F_X509_STORE_ADD_CERT,ERR_R_MALLOC_FAILURE);
   334 		return 0;
   335 		}
   336 	obj->type=X509_LU_X509;
   337 	obj->data.x509=x;
   338 
   339 	CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE);
   340 
   341 	X509_OBJECT_up_ref_count(obj);
   342 
   343 
   344 	if (X509_OBJECT_retrieve_match(ctx->objs, obj))
   345 		{
   346 		X509_OBJECT_free_contents(obj);
   347 		OPENSSL_free(obj);
   348 		X509err(X509_F_X509_STORE_ADD_CERT,X509_R_CERT_ALREADY_IN_HASH_TABLE);
   349 		ret=0;
   350 		} 
   351 	else sk_X509_OBJECT_push(ctx->objs, obj);
   352 
   353 	CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE);
   354 
   355 	return ret;
   356 	}
   357 
   358 EXPORT_C int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x)
   359 	{
   360 	X509_OBJECT *obj;
   361 	int ret=1;
   362 
   363 	if (x == NULL) return 0;
   364 	obj=(X509_OBJECT *)OPENSSL_malloc(sizeof(X509_OBJECT));
   365 	if (obj == NULL)
   366 		{
   367 		X509err(X509_F_X509_STORE_ADD_CRL,ERR_R_MALLOC_FAILURE);
   368 		return 0;
   369 		}
   370 	obj->type=X509_LU_CRL;
   371 	obj->data.crl=x;
   372 
   373 	CRYPTO_w_lock(CRYPTO_LOCK_X509_STORE);
   374 
   375 	X509_OBJECT_up_ref_count(obj);
   376 
   377 	if (X509_OBJECT_retrieve_match(ctx->objs, obj))
   378 		{
   379 		X509_OBJECT_free_contents(obj);
   380 		OPENSSL_free(obj);
   381 		X509err(X509_F_X509_STORE_ADD_CRL,X509_R_CERT_ALREADY_IN_HASH_TABLE);
   382 		ret=0;
   383 		}
   384 	else sk_X509_OBJECT_push(ctx->objs, obj);
   385 
   386 	CRYPTO_w_unlock(CRYPTO_LOCK_X509_STORE);
   387 
   388 	return ret;
   389 	}
   390 
   391 EXPORT_C void X509_OBJECT_up_ref_count(X509_OBJECT *a)
   392 	{
   393 	switch (a->type)
   394 		{
   395 	case X509_LU_X509:
   396 		CRYPTO_add(&a->data.x509->references,1,CRYPTO_LOCK_X509);
   397 		break;
   398 	case X509_LU_CRL:
   399 		CRYPTO_add(&a->data.crl->references,1,CRYPTO_LOCK_X509_CRL);
   400 		break;
   401 		}
   402 	}
   403 
   404 EXPORT_C void X509_OBJECT_free_contents(X509_OBJECT *a)
   405 	{
   406 	switch (a->type)
   407 		{
   408 	case X509_LU_X509:
   409 		X509_free(a->data.x509);
   410 		break;
   411 	case X509_LU_CRL:
   412 		X509_CRL_free(a->data.crl);
   413 		break;
   414 		}
   415 	}
   416 
   417 EXPORT_C int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type,
   418 	     X509_NAME *name)
   419 	{
   420 	X509_OBJECT stmp;
   421 	X509 x509_s;
   422 	X509_CINF cinf_s;
   423 	X509_CRL crl_s;
   424 	X509_CRL_INFO crl_info_s;
   425 
   426 	stmp.type=type;
   427 	switch (type)
   428 		{
   429 	case X509_LU_X509:
   430 		stmp.data.x509= &x509_s;
   431 		x509_s.cert_info= &cinf_s;
   432 		cinf_s.subject=name;
   433 		break;
   434 	case X509_LU_CRL:
   435 		stmp.data.crl= &crl_s;
   436 		crl_s.crl= &crl_info_s;
   437 		crl_info_s.issuer=name;
   438 		break;
   439 	default:
   440 		/* abort(); */
   441 		return -1;
   442 		}
   443 
   444 	return sk_X509_OBJECT_find(h,&stmp);
   445 	}
   446 
   447 EXPORT_C X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, int type,
   448 	     X509_NAME *name)
   449 {
   450 	int idx;
   451 	idx = X509_OBJECT_idx_by_subject(h, type, name);
   452 	if (idx==-1) return NULL;
   453 	return sk_X509_OBJECT_value(h, idx);
   454 }
   455 
   456 EXPORT_C X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, X509_OBJECT *x)
   457 {
   458 	int idx, i;
   459 	X509_OBJECT *obj;
   460 	idx = sk_X509_OBJECT_find(h, x);
   461 	if (idx == -1) return NULL;
   462 	if (x->type != X509_LU_X509) return sk_X509_OBJECT_value(h, idx);
   463 	for (i = idx; i < sk_X509_OBJECT_num(h); i++)
   464 		{
   465 		obj = sk_X509_OBJECT_value(h, i);
   466 		if (x509_object_cmp((const X509_OBJECT **)&obj, (const X509_OBJECT **)&x))
   467 			return NULL;
   468 		if ((x->type != X509_LU_X509) || !X509_cmp(obj->data.x509, x->data.x509))
   469 			return obj;
   470 		}
   471 	return NULL;
   472 }
   473 
   474 
   475 /* Try to get issuer certificate from store. Due to limitations
   476  * of the API this can only retrieve a single certificate matching
   477  * a given subject name. However it will fill the cache with all
   478  * matching certificates, so we can examine the cache for all 
   479  * matches.
   480  *
   481  * Return values are:
   482  *  1 lookup successful.
   483  *  0 certificate not found.
   484  * -1 some other error.
   485  */
   486 
   487 
   488 EXPORT_C int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x)
   489 {
   490 	X509_NAME *xn;
   491 	X509_OBJECT obj, *pobj;
   492 	int i, ok, idx;
   493 	xn=X509_get_issuer_name(x);
   494 	ok=X509_STORE_get_by_subject(ctx,X509_LU_X509,xn,&obj);
   495 	if (ok != X509_LU_X509)
   496 		{
   497 		if (ok == X509_LU_RETRY)
   498 			{
   499 			X509_OBJECT_free_contents(&obj);
   500 			X509err(X509_F_X509_STORE_CTX_GET1_ISSUER,X509_R_SHOULD_RETRY);
   501 			return -1;
   502 			}
   503 		else if (ok != X509_LU_FAIL)
   504 			{
   505 			X509_OBJECT_free_contents(&obj);
   506 			/* not good :-(, break anyway */
   507 			return -1;
   508 			}
   509 		return 0;
   510 		}
   511 	/* If certificate matches all OK */
   512 	if (ctx->check_issued(ctx, x, obj.data.x509))
   513 		{
   514 		*issuer = obj.data.x509;
   515 		return 1;
   516 		}
   517 	X509_OBJECT_free_contents(&obj);
   518 	/* Else find index of first matching cert */
   519 	idx = X509_OBJECT_idx_by_subject(ctx->ctx->objs, X509_LU_X509, xn);
   520 	/* This shouldn't normally happen since we already have one match */
   521 	if (idx == -1) return 0;
   522 
   523 	/* Look through all matching certificates for a suitable issuer */
   524 	for (i = idx; i < sk_X509_OBJECT_num(ctx->ctx->objs); i++)
   525 		{
   526 		pobj = sk_X509_OBJECT_value(ctx->ctx->objs, i);
   527 		/* See if we've ran out of matches */
   528 		if (pobj->type != X509_LU_X509) return 0;
   529 		if (X509_NAME_cmp(xn, X509_get_subject_name(pobj->data.x509))) return 0;
   530 		if (ctx->check_issued(ctx, x, pobj->data.x509))
   531 			{
   532 			*issuer = pobj->data.x509;
   533 			X509_OBJECT_up_ref_count(pobj);
   534 			return 1;
   535 			}
   536 		}
   537 	return 0;
   538 }
   539 
   540 EXPORT_C int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags)
   541 	{
   542 	return X509_VERIFY_PARAM_set_flags(ctx->param, flags);
   543 	}
   544 
   545 EXPORT_C int X509_STORE_set_depth(X509_STORE *ctx, int depth)
   546 	{
   547 	X509_VERIFY_PARAM_set_depth(ctx->param, depth);
   548 	return 1;
   549 	}
   550 
   551 EXPORT_C int X509_STORE_set_purpose(X509_STORE *ctx, int purpose)
   552 	{
   553 	return X509_VERIFY_PARAM_set_purpose(ctx->param, purpose);
   554 	}
   555 
   556 EXPORT_C int X509_STORE_set_trust(X509_STORE *ctx, int trust)
   557 	{
   558 	return X509_VERIFY_PARAM_set_trust(ctx->param, trust);
   559 	}
   560 
   561 EXPORT_C int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *param)
   562 	{
   563 	return X509_VERIFY_PARAM_set1(ctx->param, param);
   564 	}
   565 
   566 IMPLEMENT_STACK_OF(X509_LOOKUP)
   567 IMPLEMENT_STACK_OF(X509_OBJECT)