Coverage Report

Created: 2025-12-31 06:58

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/openssl33/crypto/x509/by_store.c
Line
Count
Source
1
/*
2
 * Copyright 2018-2025 The OpenSSL Project Authors. All Rights Reserved.
3
 *
4
 * Licensed under the Apache License 2.0 (the "License").  You may not use
5
 * this file except in compliance with the License.  You can obtain a copy
6
 * in the file LICENSE in the source distribution or at
7
 * https://www.openssl.org/source/license.html
8
 */
9
10
#include <openssl/safestack.h>
11
#include <openssl/store.h>
12
#include "internal/cryptlib.h"
13
#include "crypto/x509.h"
14
#include "x509_local.h"
15
16
typedef struct cached_store_st {
17
    char *uri;
18
    OSSL_LIB_CTX *libctx;
19
    char *propq;
20
} CACHED_STORE;
21
22
DEFINE_STACK_OF(CACHED_STORE)
23
24
/* Generic object loader, given expected type and criterion */
25
static int cache_objects(X509_LOOKUP *lctx, CACHED_STORE *store,
26
    const OSSL_STORE_SEARCH *criterion, int depth)
27
0
{
28
0
    int ok = 0;
29
0
    OSSL_STORE_CTX *ctx;
30
0
    X509_STORE *xstore = X509_LOOKUP_get_store(lctx);
31
32
0
    if ((ctx = OSSL_STORE_open_ex(store->uri, store->libctx, store->propq,
33
0
             NULL, NULL, NULL, NULL, NULL))
34
0
        == NULL)
35
0
        return 0;
36
37
    /*
38
     * We try to set the criterion, but don't care if it was valid or not.
39
     * For an OSSL_STORE, it merely serves as an optimization, the expectation
40
     * being that if the criterion couldn't be used, we will get *everything*
41
     * from the container that the URI represents rather than the subset that
42
     * the criterion indicates, so the biggest harm is that we cache more
43
     * objects certs and CRLs than we may expect, but that's ok.
44
     *
45
     * Specifically for OpenSSL's own file: scheme, the only workable
46
     * criterion is the BY_NAME one, which it can only apply on directories,
47
     * but it's possible that the URI is a single file rather than a directory,
48
     * and in that case, the BY_NAME criterion is pointless.
49
     *
50
     * We could very simply not apply any criterion at all here, and just let
51
     * the code that selects certs and CRLs from the cached objects do its job,
52
     * but it's a nice optimization when it can be applied (such as on an
53
     * actual directory with a thousand CA certs).
54
     */
55
0
    if (criterion != NULL)
56
0
        OSSL_STORE_find(ctx, criterion);
57
58
0
    for (;;) {
59
0
        OSSL_STORE_INFO *info = OSSL_STORE_load(ctx);
60
0
        int infotype;
61
62
        /* NULL means error or "end of file".  Either way, we break. */
63
0
        if (info == NULL)
64
0
            break;
65
66
0
        infotype = OSSL_STORE_INFO_get_type(info);
67
0
        ok = 0;
68
69
0
        if (infotype == OSSL_STORE_INFO_NAME) {
70
            /*
71
             * This is an entry in the "directory" represented by the current
72
             * uri.  if |depth| allows, dive into it.
73
             */
74
0
            if (depth > 0) {
75
0
                CACHED_STORE substore;
76
77
0
                substore.uri = (char *)OSSL_STORE_INFO_get0_NAME(info);
78
0
                substore.libctx = store->libctx;
79
0
                substore.propq = store->propq;
80
0
                ok = cache_objects(lctx, &substore, criterion, depth - 1);
81
0
            }
82
0
        } else {
83
            /*
84
             * We know that X509_STORE_add_{cert|crl} increments the object's
85
             * refcount, so we can safely use OSSL_STORE_INFO_get0_{cert,crl}
86
             * to get them.
87
             */
88
0
            switch (infotype) {
89
0
            case OSSL_STORE_INFO_CERT:
90
0
                ok = X509_STORE_add_cert(xstore,
91
0
                    OSSL_STORE_INFO_get0_CERT(info));
92
0
                break;
93
0
            case OSSL_STORE_INFO_CRL:
94
0
                ok = X509_STORE_add_crl(xstore,
95
0
                    OSSL_STORE_INFO_get0_CRL(info));
96
0
                break;
97
0
            }
98
0
        }
99
100
0
        OSSL_STORE_INFO_free(info);
101
0
        if (!ok)
102
0
            break;
103
0
    }
104
0
    OSSL_STORE_close(ctx);
105
106
0
    return ok;
107
0
}
108
109
static void free_store(CACHED_STORE *store)
110
0
{
111
0
    if (store != NULL) {
112
0
        OPENSSL_free(store->uri);
113
0
        OPENSSL_free(store->propq);
114
0
        OPENSSL_free(store);
115
0
    }
116
0
}
117
118
static void by_store_free(X509_LOOKUP *ctx)
119
0
{
120
0
    STACK_OF(CACHED_STORE) *stores = X509_LOOKUP_get_method_data(ctx);
121
0
    sk_CACHED_STORE_pop_free(stores, free_store);
122
0
}
123
124
static int by_store_ctrl_ex(X509_LOOKUP *ctx, int cmd, const char *argp,
125
    long argl, char **retp, OSSL_LIB_CTX *libctx,
126
    const char *propq)
127
0
{
128
    /*
129
     * In some cases below, failing to use the defaults shouldn't result in
130
     * an error.  |use_default| is used as the return code in those cases.
131
     */
132
0
    int use_default = argp == NULL;
133
134
0
    switch (cmd) {
135
0
    case X509_L_ADD_STORE:
136
        /* If no URI is given, use the default cert dir as default URI */
137
0
        if (argp == NULL)
138
0
            argp = ossl_safe_getenv(X509_get_default_cert_dir_env());
139
140
0
        if (argp == NULL)
141
0
            argp = X509_get_default_cert_dir();
142
143
0
        {
144
0
            STACK_OF(CACHED_STORE) *stores = X509_LOOKUP_get_method_data(ctx);
145
0
            CACHED_STORE *store = OPENSSL_zalloc(sizeof(*store));
146
0
            OSSL_STORE_CTX *sctx;
147
148
0
            if (store == NULL) {
149
0
                return 0;
150
0
            }
151
152
0
            store->uri = OPENSSL_strdup(argp);
153
0
            store->libctx = libctx;
154
0
            if (propq != NULL)
155
0
                store->propq = OPENSSL_strdup(propq);
156
            /*
157
             * We open this to check for errors now - so we can report those
158
             * errors early.
159
             */
160
0
            sctx = OSSL_STORE_open_ex(argp, libctx, propq, NULL, NULL,
161
0
                NULL, NULL, NULL);
162
0
            if (sctx == NULL
163
0
                || (propq != NULL && store->propq == NULL)
164
0
                || store->uri == NULL) {
165
0
                OSSL_STORE_close(sctx);
166
0
                free_store(store);
167
0
                return use_default;
168
0
            }
169
0
            OSSL_STORE_close(sctx);
170
171
0
            if (stores == NULL) {
172
0
                stores = sk_CACHED_STORE_new_null();
173
0
                if (stores != NULL)
174
0
                    X509_LOOKUP_set_method_data(ctx, stores);
175
0
            }
176
0
            if (stores == NULL || sk_CACHED_STORE_push(stores, store) <= 0) {
177
0
                free_store(store);
178
0
                return 0;
179
0
            }
180
0
            return 1;
181
0
        }
182
0
    case X509_L_LOAD_STORE: {
183
        /* This is a shortcut for quick loading of specific containers */
184
0
        CACHED_STORE store;
185
186
0
        store.uri = (char *)argp;
187
0
        store.libctx = libctx;
188
0
        store.propq = (char *)propq;
189
0
        return cache_objects(ctx, &store, NULL, 0);
190
0
    }
191
0
    default:
192
        /* Unsupported command */
193
0
        return 0;
194
0
    }
195
196
0
    return 0;
197
0
}
198
199
static int by_store_ctrl(X509_LOOKUP *ctx, int cmd,
200
    const char *argp, long argl, char **retp)
201
0
{
202
0
    return by_store_ctrl_ex(ctx, cmd, argp, argl, retp, NULL, NULL);
203
0
}
204
205
static int by_store(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
206
    const OSSL_STORE_SEARCH *criterion, X509_OBJECT *ret)
207
0
{
208
0
    STACK_OF(CACHED_STORE) *stores = X509_LOOKUP_get_method_data(ctx);
209
0
    int i;
210
0
    int ok = 0;
211
212
0
    for (i = 0; i < sk_CACHED_STORE_num(stores); i++) {
213
0
        ok = cache_objects(ctx, sk_CACHED_STORE_value(stores, i), criterion,
214
0
            1 /* depth */);
215
216
0
        if (ok)
217
0
            break;
218
0
    }
219
0
    return ok;
220
0
}
221
222
static int by_store_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type,
223
    const X509_NAME *name, X509_OBJECT *ret)
224
0
{
225
0
    OSSL_STORE_SEARCH *criterion = OSSL_STORE_SEARCH_by_name((X509_NAME *)name); /* won't modify it */
226
0
    int ok = by_store(ctx, type, criterion, ret);
227
0
    STACK_OF(X509_OBJECT) *store_objects = X509_STORE_get0_objects(X509_LOOKUP_get_store(ctx));
228
0
    X509_OBJECT *tmp = NULL;
229
230
0
    OSSL_STORE_SEARCH_free(criterion);
231
232
0
    if (ok) {
233
0
        X509_STORE *store = X509_LOOKUP_get_store(ctx);
234
235
0
        if (!ossl_x509_store_read_lock(store))
236
0
            return 0;
237
0
        tmp = X509_OBJECT_retrieve_by_subject(store_objects, type, name);
238
0
        X509_STORE_unlock(store);
239
0
    }
240
241
0
    ok = 0;
242
0
    if (tmp != NULL) {
243
        /*
244
         * This could also be done like this:
245
         *
246
         *     if (tmp != NULL) {
247
         *         *ret = *tmp;
248
         *         ok = 1;
249
         *     }
250
         *
251
         * However, we want to exercise the documented API to the max, so
252
         * we do it the hard way.
253
         *
254
         * To be noted is that X509_OBJECT_set1_* increment the refcount,
255
         * but so does X509_STORE_CTX_get_by_subject upon return of this
256
         * function, so we must ensure the refcount is decremented
257
         * before we return, or we will get a refcount leak.  We cannot do
258
         * this with X509_OBJECT_free(), though, as that will free a bit
259
         * too much.
260
         */
261
0
        switch (type) {
262
0
        case X509_LU_X509:
263
0
            ok = X509_OBJECT_set1_X509(ret, tmp->data.x509);
264
0
            if (ok)
265
0
                X509_free(tmp->data.x509);
266
0
            break;
267
0
        case X509_LU_CRL:
268
0
            ok = X509_OBJECT_set1_X509_CRL(ret, tmp->data.crl);
269
0
            if (ok)
270
0
                X509_CRL_free(tmp->data.crl);
271
0
            break;
272
0
        case X509_LU_NONE:
273
0
            break;
274
0
        }
275
0
    }
276
0
    return ok;
277
0
}
278
279
/*
280
 * We lack the implementations for get_by_issuer_serial, get_by_fingerprint
281
 * and get_by_alias.  There's simply not enough support in the X509_LOOKUP
282
 * or X509_STORE APIs.
283
 */
284
285
static X509_LOOKUP_METHOD x509_store_lookup = {
286
    "Load certs from STORE URIs",
287
    NULL, /* new_item */
288
    by_store_free, /* free */
289
    NULL, /* init */
290
    NULL, /* shutdown */
291
    by_store_ctrl, /* ctrl */
292
    by_store_subject, /* get_by_subject */
293
    NULL, /* get_by_issuer_serial */
294
    NULL, /* get_by_fingerprint */
295
    NULL, /* get_by_alias */
296
    NULL, /* get_by_subject_ex */
297
    by_store_ctrl_ex
298
};
299
300
X509_LOOKUP_METHOD *X509_LOOKUP_store(void)
301
0
{
302
0
    return &x509_store_lookup;
303
0
}