Botan 3.12.0
Crypto and TLS for C&
certstor_flatfile.cpp
Go to the documentation of this file.
1/*
2* Certificate Store
3* (C) 1999-2019 Jack Lloyd
4* (C) 2019 Patrick Schmidt
5*
6* Botan is released under the Simplified BSD License (see license.txt)
7*/
8
9#include <botan/certstor_flatfile.h>
10
11#include <botan/assert.h>
12#include <botan/data_src.h>
13#include <botan/pem.h>
14#include <botan/pkix_types.h>
15#include <algorithm>
16
17namespace Botan {
18
19namespace {
20
21std::vector<std::vector<uint8_t>> decode_all_certificates(DataSource& source) {
22 std::vector<std::vector<uint8_t>> pems;
23
24 while(!source.end_of_data()) {
25 std::string label;
26 std::vector<uint8_t> cert;
27 try {
28 cert = unlock(PEM_Code::decode(source, label));
29
30 if(label == "CERTIFICATE" || label == "X509 CERTIFICATE" || label == "TRUSTED CERTIFICATE") {
31 pems.push_back(cert);
32 }
33 } catch(const Decoding_Error&) {}
34 }
35
36 return pems;
37}
38
39} // namespace
40
41Flatfile_Certificate_Store::Flatfile_Certificate_Store(std::string_view file, bool ignore_non_ca) {
42 if(file.empty()) {
43 throw Invalid_Argument("Flatfile_Certificate_Store::Flatfile_Certificate_Store invalid file path");
44 }
45
46 DataSource_Stream file_stream(file);
47
48 for(const std::vector<uint8_t>& der : decode_all_certificates(file_stream)) {
49 X509_Certificate cert(der);
50
51 /*
52 * Various weird or misconfigured system roots include intermediate certificates,
53 * or even stranger certificates which are not valid for cert issuance at all.
54 * Previously this code would error on such cases as an obvious misconfiguration,
55 * but we cannot fix the trust store. So instead just ignore any such certificate.
56 */
57 if(cert.is_self_signed() && cert.is_CA_cert()) {
58 const auto tag = cert.tag();
59
60 // dedup
61 if(!m_cert_tags.contains(tag)) {
62 m_cert_tags.insert(tag);
63 m_all_subjects.push_back(cert.subject_dn());
64 m_dn_to_cert[cert.subject_dn()].push_back(cert);
65 m_pubkey_sha1_to_cert.emplace(cert.subject_public_key_bitstring_sha1(), cert);
66 m_subject_dn_sha256_to_cert.emplace(cert.raw_subject_dn_sha256(), cert);
67 m_issuer_dn_to_cert[cert.issuer_dn()].push_back(cert);
68 }
69 } else if(!ignore_non_ca) {
70 throw Invalid_Argument("Flatfile_Certificate_Store received non CA cert " + cert.subject_dn().to_string());
71 }
72 }
73
74 if(m_all_subjects.empty()) {
75 throw Invalid_Argument("Flatfile_Certificate_Store::Flatfile_Certificate_Store cert file is empty");
76 }
77}
78
79std::vector<X509_DN> Flatfile_Certificate_Store::all_subjects() const {
80 return m_all_subjects;
81}
82
84 return m_cert_tags.contains(cert.tag());
85}
86
87std::vector<X509_Certificate> Flatfile_Certificate_Store::find_all_certs(const X509_DN& subject_dn,
88 const std::vector<uint8_t>& key_id) const {
89 if(!m_dn_to_cert.contains(subject_dn)) {
90 return {};
91 }
92
93 const auto& certs = m_dn_to_cert.at(subject_dn);
94
95 std::vector<X509_Certificate> found_certs;
96 for(const auto& cert : certs) {
97 if(!key_id.empty()) {
98 const std::vector<uint8_t>& skid = cert.subject_key_id();
99 if(!skid.empty() && skid != key_id) {
100 continue;
101 }
102 }
103 found_certs.push_back(cert);
104 }
105
106 return found_certs;
107}
108
110 const std::vector<uint8_t>& key_hash) const {
111 if(key_hash.size() != 20) {
112 throw Invalid_Argument("Flatfile_Certificate_Store::find_cert_by_pubkey_sha1 invalid hash");
113 }
114
115 auto found_cert = m_pubkey_sha1_to_cert.find(key_hash);
116
117 if(found_cert != m_pubkey_sha1_to_cert.end()) {
118 return found_cert->second;
119 }
120
121 return std::nullopt;
122}
123
125 const std::vector<uint8_t>& subject_hash) const {
126 if(subject_hash.size() != 32) {
127 throw Invalid_Argument("Flatfile_Certificate_Store::find_cert_by_raw_subject_dn_sha256 invalid hash");
128 }
129
130 auto found_cert = m_subject_dn_sha256_to_cert.find(subject_hash);
131
132 if(found_cert != m_subject_dn_sha256_to_cert.end()) {
133 return found_cert->second;
134 }
135
136 return std::nullopt;
137}
138
140 const X509_DN& issuer_dn, std::span<const uint8_t> serial_number) const {
141 if(!m_issuer_dn_to_cert.contains(issuer_dn)) {
142 return std::nullopt;
143 }
144
145 const auto& certs = m_issuer_dn_to_cert.at(issuer_dn);
146
147 for(const auto& cert : certs) {
148 if(std::ranges::equal(cert.serial_number(), serial_number)) {
149 return cert;
150 }
151 }
152
153 return std::nullopt;
154}
155
156std::optional<X509_CRL> Flatfile_Certificate_Store::find_crl_for(const X509_Certificate& subject) const {
157 BOTAN_UNUSED(subject);
158 return {};
159}
160
161} // namespace Botan
#define BOTAN_UNUSED
Definition assert.h:144
bool contains(const X509_Certificate &cert) const override
std::optional< X509_CRL > find_crl_for(const X509_Certificate &subject) const override
std::vector< X509_DN > all_subjects() const override
std::optional< X509_Certificate > find_cert_by_raw_subject_dn_sha256(const std::vector< uint8_t > &subject_hash) const override
std::vector< X509_Certificate > find_all_certs(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const override
std::optional< X509_Certificate > find_cert_by_pubkey_sha1(const std::vector< uint8_t > &key_hash) const override
std::optional< X509_Certificate > find_cert_by_issuer_dn_and_serial_number(const X509_DN &issuer_dn, std::span< const uint8_t > serial_number) const override
BOTAN_FUTURE_EXPLICIT Flatfile_Certificate_Store(std::string_view file, bool ignore_non_ca=false)
bool is_CA_cert() const
Definition x509cert.cpp:441
const X509_DN & subject_dn() const
Definition x509cert.cpp:418
const std::vector< uint8_t > & subject_public_key_bitstring_sha1() const
Definition x509cert.cpp:390
const X509_DN & issuer_dn() const
Definition x509cert.cpp:414
const std::vector< uint8_t > & raw_subject_dn_sha256() const
Definition x509cert.cpp:678
bool is_self_signed() const
Definition x509cert.cpp:354
std::string to_string() const
Definition x509_dn.cpp:393
secure_vector< uint8_t > decode(DataSource &source, std::string &label)
Definition pem.cpp:62
std::vector< T > unlock(const secure_vector< T > &in)
Definition secmem.h:85