X509_LOOKUP_hash_dir.pod 6.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165
  1. =pod
  2. =head1 NAME
  3. X509_LOOKUP_hash_dir, X509_LOOKUP_file, X509_LOOKUP_store,
  4. X509_load_cert_file_ex, X509_load_cert_file,
  5. X509_load_crl_file,
  6. X509_load_cert_crl_file_ex, X509_load_cert_crl_file
  7. - Default OpenSSL certificate lookup methods
  8. =head1 SYNOPSIS
  9. #include <openssl/x509_vfy.h>
  10. X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void);
  11. X509_LOOKUP_METHOD *X509_LOOKUP_file(void);
  12. X509_LOOKUP_METHOD *X509_LOOKUP_store(void);
  13. int X509_load_cert_file_ex(X509_LOOKUP *ctx, const char *file, int type,
  14. OSSL_LIB_CTX *libctx, const char *propq);
  15. int X509_load_cert_file(X509_LOOKUP *ctx, const char *file, int type);
  16. int X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type);
  17. int X509_load_cert_crl_file_ex(X509_LOOKUP *ctx, const char *file, int type,
  18. OSSL_LIB_CTX *libctx, const char *propq);
  19. int X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type);
  20. =head1 DESCRIPTION
  21. B<X509_LOOKUP_hash_dir> and B<X509_LOOKUP_file> are two certificate
  22. lookup methods to use with B<X509_STORE>, provided by OpenSSL library.
  23. Users of the library typically do not need to create instances of these
  24. methods manually, they would be created automatically by
  25. L<X509_STORE_load_locations(3)> or
  26. L<SSL_CTX_load_verify_locations(3)>
  27. functions.
  28. Internally loading of certificates and CRLs is implemented via functions
  29. B<X509_load_cert_crl_file>, B<X509_load_cert_file> and
  30. B<X509_load_crl_file>. These functions support parameter I<type>, which
  31. can be one of constants B<FILETYPE_PEM>, B<FILETYPE_ASN1> and
  32. B<FILETYPE_DEFAULT>. They load certificates and/or CRLs from specified
  33. file into memory cache of B<X509_STORE> objects which given B<ctx>
  34. parameter is associated with.
  35. Functions B<X509_load_cert_file> and
  36. B<X509_load_crl_file> can load both PEM and DER formats depending of
  37. type value. Because DER format cannot contain more than one certificate
  38. or CRL object (while PEM can contain several concatenated PEM objects)
  39. B<X509_load_cert_crl_file> with B<FILETYPE_ASN1> is equivalent to
  40. B<X509_load_cert_file>.
  41. Constant B<FILETYPE_DEFAULT> with NULL filename causes these functions
  42. to load default certificate store file (see
  43. L<X509_STORE_set_default_paths(3)>.
  44. Functions return number of objects loaded from file or 0 in case of
  45. error.
  46. Both methods support adding several certificate locations into one
  47. B<X509_STORE>.
  48. This page documents certificate store formats used by these methods and
  49. caching policy.
  50. =head2 File Method
  51. The B<X509_LOOKUP_file> method loads all the certificates or CRLs
  52. present in a file into memory at the time the file is added as a
  53. lookup source.
  54. File format is ASCII text which contains concatenated PEM certificates
  55. and CRLs.
  56. This method should be used by applications which work with a small
  57. set of CAs.
  58. =head2 Hashed Directory Method
  59. B<X509_LOOKUP_hash_dir> is a more advanced method, which loads
  60. certificates and CRLs on demand, and caches them in memory once
  61. they are loaded. As of OpenSSL 1.0.0, it also checks for newer CRLs
  62. upon each lookup, so that newer CRLs are as soon as they appear in
  63. the directory.
  64. The directory should contain one certificate or CRL per file in PEM format,
  65. with a filename of the form I<hash>.I<N> for a certificate, or
  66. I<hash>.B<r>I<N> for a CRL.
  67. The I<hash> is the value returned by the L<X509_NAME_hash_ex(3)> function
  68. applied to the subject name for certificates or issuer name for CRLs.
  69. The hash can also be obtained via the B<-hash> option of the
  70. L<openssl-x509(1)> or L<openssl-crl(1)> commands.
  71. The .I<N> or .B<r>I<N> suffix is a sequence number that starts at zero, and is
  72. incremented consecutively for each certificate or CRL with the same I<hash>
  73. value.
  74. Gaps in the sequence numbers are not supported, it is assumed that there are no
  75. more objects with the same hash beyond the first missing number in the
  76. sequence.
  77. Sequence numbers make it possible for the directory to contain multiple
  78. certificates with same subject name hash value.
  79. For example, it is possible to have in the store several certificates with same
  80. subject or several CRLs with same issuer (and, for example, different validity
  81. period).
  82. When checking for new CRLs once one CRL for given hash value is
  83. loaded, hash_dir lookup method checks only for certificates with
  84. sequence number greater than that of the already cached CRL.
  85. Note that the hash algorithm used for subject name hashing changed in OpenSSL
  86. 1.0.0, and all certificate stores have to be rehashed when moving from OpenSSL
  87. 0.9.8 to 1.0.0.
  88. OpenSSL includes a L<openssl-rehash(1)> utility which creates symlinks with
  89. hashed names for all files with F<.pem> suffix in a given directory.
  90. =head2 OSSL_STORE Method
  91. B<X509_LOOKUP_store> is a method that allows access to any store of
  92. certificates and CRLs through any loader supported by
  93. L<ossl_store(7)>.
  94. It works with the help of URIs, which can be direct references to
  95. certificates or CRLs, but can also be references to catalogues of such
  96. objects (that behave like directories).
  97. This method overlaps the L</File Method> and L</Hashed Directory Method>
  98. because of the 'file:' scheme loader.
  99. It does no caching of its own, but can use a caching L<ossl_store(7)>
  100. loader, and therefore depends on the loader's capability.
  101. =head1 RETURN VALUES
  102. X509_LOOKUP_hash_dir(), X509_LOOKUP_file() and X509_LOOKUP_store()
  103. always return a valid B<X509_LOOKUP_METHOD> structure.
  104. X509_load_cert_file(), X509_load_crl_file() and X509_load_cert_crl_file() return
  105. the number of loaded objects or 0 on error.
  106. =head1 SEE ALSO
  107. L<PEM_read_PrivateKey(3)>,
  108. L<X509_STORE_load_locations(3)>,
  109. L<X509_store_add_lookup(3)>,
  110. L<SSL_CTX_load_verify_locations(3)>,
  111. L<X509_LOOKUP_meth_new(3)>,
  112. L<ossl_store(7)>
  113. =head1 HISTORY
  114. The functions X509_load_cert_file_ex(),
  115. X509_load_cert_crl_file_ex() and X509_LOOKUP_store() were added in
  116. OpenSSL 3.0.
  117. =head1 COPYRIGHT
  118. Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.
  119. Licensed under the Apache License 2.0 (the "License"). You may not use
  120. this file except in compliance with the License. You can obtain a copy
  121. in the file LICENSE in the source distribution or at
  122. L<https://www.openssl.org/source/license.html>.
  123. =cut