xref: /freebsd/crypto/openssl/crypto/ct/ct_log.c (revision b077aed3)
1e71b7053SJung-uk Kim /*
2*b077aed3SPierre Pronchery  * Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved.
3e71b7053SJung-uk Kim  *
4*b077aed3SPierre Pronchery  * Licensed under the Apache License 2.0 (the "License").  You may not use
5e71b7053SJung-uk Kim  * this file except in compliance with the License.  You can obtain a copy
6e71b7053SJung-uk Kim  * in the file LICENSE in the source distribution or at
7e71b7053SJung-uk Kim  * https://www.openssl.org/source/license.html
8e71b7053SJung-uk Kim  */
9e71b7053SJung-uk Kim 
10e71b7053SJung-uk Kim #include <stdlib.h>
11e71b7053SJung-uk Kim #include <string.h>
12e71b7053SJung-uk Kim 
13e71b7053SJung-uk Kim #include <openssl/conf.h>
14e71b7053SJung-uk Kim #include <openssl/ct.h>
15e71b7053SJung-uk Kim #include <openssl/err.h>
16e71b7053SJung-uk Kim #include <openssl/evp.h>
17e71b7053SJung-uk Kim #include <openssl/safestack.h>
18e71b7053SJung-uk Kim 
19e71b7053SJung-uk Kim #include "internal/cryptlib.h"
20e71b7053SJung-uk Kim 
21e71b7053SJung-uk Kim /*
22e71b7053SJung-uk Kim  * Information about a CT log server.
23e71b7053SJung-uk Kim  */
24e71b7053SJung-uk Kim struct ctlog_st {
25*b077aed3SPierre Pronchery     OSSL_LIB_CTX *libctx;
26*b077aed3SPierre Pronchery     char *propq;
27e71b7053SJung-uk Kim     char *name;
28e71b7053SJung-uk Kim     uint8_t log_id[CT_V1_HASHLEN];
29e71b7053SJung-uk Kim     EVP_PKEY *public_key;
30e71b7053SJung-uk Kim };
31e71b7053SJung-uk Kim 
32e71b7053SJung-uk Kim /*
33e71b7053SJung-uk Kim  * A store for multiple CTLOG instances.
34e71b7053SJung-uk Kim  * It takes ownership of any CTLOG instances added to it.
35e71b7053SJung-uk Kim  */
36e71b7053SJung-uk Kim struct ctlog_store_st {
37*b077aed3SPierre Pronchery     OSSL_LIB_CTX *libctx;
38*b077aed3SPierre Pronchery     char *propq;
39e71b7053SJung-uk Kim     STACK_OF(CTLOG) *logs;
40e71b7053SJung-uk Kim };
41e71b7053SJung-uk Kim 
42e71b7053SJung-uk Kim /* The context when loading a CT log list from a CONF file. */
43e71b7053SJung-uk Kim typedef struct ctlog_store_load_ctx_st {
44e71b7053SJung-uk Kim     CTLOG_STORE *log_store;
45e71b7053SJung-uk Kim     CONF *conf;
46e71b7053SJung-uk Kim     size_t invalid_log_entries;
47e71b7053SJung-uk Kim } CTLOG_STORE_LOAD_CTX;
48e71b7053SJung-uk Kim 
49e71b7053SJung-uk Kim /*
50e71b7053SJung-uk Kim  * Creates an empty context for loading a CT log store.
51e71b7053SJung-uk Kim  * It should be populated before use.
52e71b7053SJung-uk Kim  */
53e71b7053SJung-uk Kim static CTLOG_STORE_LOAD_CTX *ctlog_store_load_ctx_new(void);
54e71b7053SJung-uk Kim 
55e71b7053SJung-uk Kim /*
56e71b7053SJung-uk Kim  * Deletes a CT log store load context.
57e71b7053SJung-uk Kim  * Does not delete any of the fields.
58e71b7053SJung-uk Kim  */
59e71b7053SJung-uk Kim static void ctlog_store_load_ctx_free(CTLOG_STORE_LOAD_CTX* ctx);
60e71b7053SJung-uk Kim 
ctlog_store_load_ctx_new(void)61e71b7053SJung-uk Kim static CTLOG_STORE_LOAD_CTX *ctlog_store_load_ctx_new(void)
62e71b7053SJung-uk Kim {
63e71b7053SJung-uk Kim     CTLOG_STORE_LOAD_CTX *ctx = OPENSSL_zalloc(sizeof(*ctx));
64e71b7053SJung-uk Kim 
65e71b7053SJung-uk Kim     if (ctx == NULL)
66*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
67e71b7053SJung-uk Kim 
68e71b7053SJung-uk Kim     return ctx;
69e71b7053SJung-uk Kim }
70e71b7053SJung-uk Kim 
ctlog_store_load_ctx_free(CTLOG_STORE_LOAD_CTX * ctx)71e71b7053SJung-uk Kim static void ctlog_store_load_ctx_free(CTLOG_STORE_LOAD_CTX* ctx)
72e71b7053SJung-uk Kim {
73e71b7053SJung-uk Kim     OPENSSL_free(ctx);
74e71b7053SJung-uk Kim }
75e71b7053SJung-uk Kim 
76e71b7053SJung-uk Kim /* Converts a log's public key into a SHA256 log ID */
ct_v1_log_id_from_pkey(CTLOG * log,EVP_PKEY * pkey)77*b077aed3SPierre Pronchery static int ct_v1_log_id_from_pkey(CTLOG *log, EVP_PKEY *pkey)
78e71b7053SJung-uk Kim {
79e71b7053SJung-uk Kim     int ret = 0;
80e71b7053SJung-uk Kim     unsigned char *pkey_der = NULL;
81e71b7053SJung-uk Kim     int pkey_der_len = i2d_PUBKEY(pkey, &pkey_der);
82*b077aed3SPierre Pronchery     unsigned int len;
83*b077aed3SPierre Pronchery     EVP_MD *sha256 = NULL;
84e71b7053SJung-uk Kim 
85e71b7053SJung-uk Kim     if (pkey_der_len <= 0) {
86*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, CT_R_LOG_KEY_INVALID);
87*b077aed3SPierre Pronchery         goto err;
88*b077aed3SPierre Pronchery     }
89*b077aed3SPierre Pronchery     sha256 = EVP_MD_fetch(log->libctx, "SHA2-256", log->propq);
90*b077aed3SPierre Pronchery     if (sha256 == NULL) {
91*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_EVP_LIB);
92e71b7053SJung-uk Kim         goto err;
93e71b7053SJung-uk Kim     }
94e71b7053SJung-uk Kim 
95*b077aed3SPierre Pronchery     ret = EVP_Digest(pkey_der, pkey_der_len, log->log_id, &len, sha256,
96*b077aed3SPierre Pronchery                      NULL);
97e71b7053SJung-uk Kim err:
98*b077aed3SPierre Pronchery     EVP_MD_free(sha256);
99e71b7053SJung-uk Kim     OPENSSL_free(pkey_der);
100e71b7053SJung-uk Kim     return ret;
101e71b7053SJung-uk Kim }
102e71b7053SJung-uk Kim 
CTLOG_STORE_new_ex(OSSL_LIB_CTX * libctx,const char * propq)103*b077aed3SPierre Pronchery CTLOG_STORE *CTLOG_STORE_new_ex(OSSL_LIB_CTX *libctx, const char *propq)
104e71b7053SJung-uk Kim {
105e71b7053SJung-uk Kim     CTLOG_STORE *ret = OPENSSL_zalloc(sizeof(*ret));
106e71b7053SJung-uk Kim 
107e71b7053SJung-uk Kim     if (ret == NULL) {
108*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
109e71b7053SJung-uk Kim         return NULL;
110e71b7053SJung-uk Kim     }
111e71b7053SJung-uk Kim 
112*b077aed3SPierre Pronchery     ret->libctx = libctx;
113*b077aed3SPierre Pronchery     if (propq != NULL) {
114*b077aed3SPierre Pronchery         ret->propq = OPENSSL_strdup(propq);
115*b077aed3SPierre Pronchery         if (ret->propq == NULL) {
116*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
117e71b7053SJung-uk Kim             goto err;
118*b077aed3SPierre Pronchery         }
119*b077aed3SPierre Pronchery     }
120*b077aed3SPierre Pronchery 
121*b077aed3SPierre Pronchery     ret->logs = sk_CTLOG_new_null();
122*b077aed3SPierre Pronchery     if (ret->logs == NULL) {
123*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
124*b077aed3SPierre Pronchery         goto err;
125*b077aed3SPierre Pronchery     }
126e71b7053SJung-uk Kim 
127e71b7053SJung-uk Kim     return ret;
128e71b7053SJung-uk Kim err:
129*b077aed3SPierre Pronchery     CTLOG_STORE_free(ret);
130e71b7053SJung-uk Kim     return NULL;
131e71b7053SJung-uk Kim }
132e71b7053SJung-uk Kim 
CTLOG_STORE_new(void)133*b077aed3SPierre Pronchery CTLOG_STORE *CTLOG_STORE_new(void)
134*b077aed3SPierre Pronchery {
135*b077aed3SPierre Pronchery     return CTLOG_STORE_new_ex(NULL, NULL);
136*b077aed3SPierre Pronchery }
137*b077aed3SPierre Pronchery 
CTLOG_STORE_free(CTLOG_STORE * store)138e71b7053SJung-uk Kim void CTLOG_STORE_free(CTLOG_STORE *store)
139e71b7053SJung-uk Kim {
140e71b7053SJung-uk Kim     if (store != NULL) {
141*b077aed3SPierre Pronchery         OPENSSL_free(store->propq);
142e71b7053SJung-uk Kim         sk_CTLOG_pop_free(store->logs, CTLOG_free);
143e71b7053SJung-uk Kim         OPENSSL_free(store);
144e71b7053SJung-uk Kim     }
145e71b7053SJung-uk Kim }
146e71b7053SJung-uk Kim 
ctlog_new_from_conf(CTLOG_STORE * store,CTLOG ** ct_log,const CONF * conf,const char * section)147*b077aed3SPierre Pronchery static int ctlog_new_from_conf(CTLOG_STORE *store, CTLOG **ct_log,
148*b077aed3SPierre Pronchery                                const CONF *conf, const char *section)
149e71b7053SJung-uk Kim {
150e71b7053SJung-uk Kim     const char *description = NCONF_get_string(conf, section, "description");
151e71b7053SJung-uk Kim     char *pkey_base64;
152e71b7053SJung-uk Kim 
153e71b7053SJung-uk Kim     if (description == NULL) {
154*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, CT_R_LOG_CONF_MISSING_DESCRIPTION);
155e71b7053SJung-uk Kim         return 0;
156e71b7053SJung-uk Kim     }
157e71b7053SJung-uk Kim 
158e71b7053SJung-uk Kim     pkey_base64 = NCONF_get_string(conf, section, "key");
159e71b7053SJung-uk Kim     if (pkey_base64 == NULL) {
160*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, CT_R_LOG_CONF_MISSING_KEY);
161e71b7053SJung-uk Kim         return 0;
162e71b7053SJung-uk Kim     }
163e71b7053SJung-uk Kim 
164*b077aed3SPierre Pronchery     return CTLOG_new_from_base64_ex(ct_log, pkey_base64, description,
165*b077aed3SPierre Pronchery                                     store->libctx, store->propq);
166e71b7053SJung-uk Kim }
167e71b7053SJung-uk Kim 
CTLOG_STORE_load_default_file(CTLOG_STORE * store)168e71b7053SJung-uk Kim int CTLOG_STORE_load_default_file(CTLOG_STORE *store)
169e71b7053SJung-uk Kim {
170c9cf7b5cSJung-uk Kim     const char *fpath = ossl_safe_getenv(CTLOG_FILE_EVP);
171e71b7053SJung-uk Kim 
172e71b7053SJung-uk Kim     if (fpath == NULL)
173e71b7053SJung-uk Kim       fpath = CTLOG_FILE;
174e71b7053SJung-uk Kim 
175e71b7053SJung-uk Kim     return CTLOG_STORE_load_file(store, fpath);
176e71b7053SJung-uk Kim }
177e71b7053SJung-uk Kim 
178e71b7053SJung-uk Kim /*
179e71b7053SJung-uk Kim  * Called by CONF_parse_list, which stops if this returns <= 0,
180e71b7053SJung-uk Kim  * Otherwise, one bad log entry would stop loading of any of
181e71b7053SJung-uk Kim  * the following log entries.
182e71b7053SJung-uk Kim  * It may stop parsing and returns -1 on any internal (malloc) error.
183e71b7053SJung-uk Kim  */
ctlog_store_load_log(const char * log_name,int log_name_len,void * arg)184e71b7053SJung-uk Kim static int ctlog_store_load_log(const char *log_name, int log_name_len,
185e71b7053SJung-uk Kim                                 void *arg)
186e71b7053SJung-uk Kim {
187e71b7053SJung-uk Kim     CTLOG_STORE_LOAD_CTX *load_ctx = arg;
188e71b7053SJung-uk Kim     CTLOG *ct_log = NULL;
189e71b7053SJung-uk Kim     /* log_name may not be null-terminated, so fix that before using it */
190e71b7053SJung-uk Kim     char *tmp;
191e71b7053SJung-uk Kim     int ret = 0;
192e71b7053SJung-uk Kim 
193e71b7053SJung-uk Kim     /* log_name will be NULL for empty list entries */
194e71b7053SJung-uk Kim     if (log_name == NULL)
195e71b7053SJung-uk Kim         return 1;
196e71b7053SJung-uk Kim 
197e71b7053SJung-uk Kim     tmp = OPENSSL_strndup(log_name, log_name_len);
198e71b7053SJung-uk Kim     if (tmp == NULL)
199e71b7053SJung-uk Kim         goto mem_err;
200e71b7053SJung-uk Kim 
201*b077aed3SPierre Pronchery     ret = ctlog_new_from_conf(load_ctx->log_store, &ct_log, load_ctx->conf, tmp);
202e71b7053SJung-uk Kim     OPENSSL_free(tmp);
203e71b7053SJung-uk Kim 
204e71b7053SJung-uk Kim     if (ret < 0) {
205e71b7053SJung-uk Kim         /* Propagate any internal error */
206e71b7053SJung-uk Kim         return ret;
207e71b7053SJung-uk Kim     }
208e71b7053SJung-uk Kim     if (ret == 0) {
209e71b7053SJung-uk Kim         /* If we can't load this log, record that fact and skip it */
210e71b7053SJung-uk Kim         ++load_ctx->invalid_log_entries;
211e71b7053SJung-uk Kim         return 1;
212e71b7053SJung-uk Kim     }
213e71b7053SJung-uk Kim 
214e71b7053SJung-uk Kim     if (!sk_CTLOG_push(load_ctx->log_store->logs, ct_log)) {
215e71b7053SJung-uk Kim         goto mem_err;
216e71b7053SJung-uk Kim     }
217e71b7053SJung-uk Kim     return 1;
218e71b7053SJung-uk Kim 
219e71b7053SJung-uk Kim mem_err:
220e71b7053SJung-uk Kim     CTLOG_free(ct_log);
221*b077aed3SPierre Pronchery     ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
222e71b7053SJung-uk Kim     return -1;
223e71b7053SJung-uk Kim }
224e71b7053SJung-uk Kim 
CTLOG_STORE_load_file(CTLOG_STORE * store,const char * file)225e71b7053SJung-uk Kim int CTLOG_STORE_load_file(CTLOG_STORE *store, const char *file)
226e71b7053SJung-uk Kim {
227e71b7053SJung-uk Kim     int ret = 0;
228e71b7053SJung-uk Kim     char *enabled_logs;
229e71b7053SJung-uk Kim     CTLOG_STORE_LOAD_CTX* load_ctx = ctlog_store_load_ctx_new();
230e71b7053SJung-uk Kim 
231e71b7053SJung-uk Kim     if (load_ctx == NULL)
232e71b7053SJung-uk Kim         return 0;
233e71b7053SJung-uk Kim     load_ctx->log_store = store;
234e71b7053SJung-uk Kim     load_ctx->conf = NCONF_new(NULL);
235e71b7053SJung-uk Kim     if (load_ctx->conf == NULL)
236e71b7053SJung-uk Kim         goto end;
237e71b7053SJung-uk Kim 
238e71b7053SJung-uk Kim     if (NCONF_load(load_ctx->conf, file, NULL) <= 0) {
239*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, CT_R_LOG_CONF_INVALID);
240e71b7053SJung-uk Kim         goto end;
241e71b7053SJung-uk Kim     }
242e71b7053SJung-uk Kim 
243e71b7053SJung-uk Kim     enabled_logs = NCONF_get_string(load_ctx->conf, NULL, "enabled_logs");
244e71b7053SJung-uk Kim     if (enabled_logs == NULL) {
245*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, CT_R_LOG_CONF_INVALID);
246e71b7053SJung-uk Kim         goto end;
247e71b7053SJung-uk Kim     }
248e71b7053SJung-uk Kim 
249e71b7053SJung-uk Kim     if (!CONF_parse_list(enabled_logs, ',', 1, ctlog_store_load_log, load_ctx) ||
250e71b7053SJung-uk Kim         load_ctx->invalid_log_entries > 0) {
251*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, CT_R_LOG_CONF_INVALID);
252e71b7053SJung-uk Kim         goto end;
253e71b7053SJung-uk Kim     }
254e71b7053SJung-uk Kim 
255e71b7053SJung-uk Kim     ret = 1;
256e71b7053SJung-uk Kim end:
257e71b7053SJung-uk Kim     NCONF_free(load_ctx->conf);
258e71b7053SJung-uk Kim     ctlog_store_load_ctx_free(load_ctx);
259e71b7053SJung-uk Kim     return ret;
260e71b7053SJung-uk Kim }
261e71b7053SJung-uk Kim 
262e71b7053SJung-uk Kim /*
263e71b7053SJung-uk Kim  * Initialize a new CTLOG object.
264e71b7053SJung-uk Kim  * Takes ownership of the public key.
265e71b7053SJung-uk Kim  * Copies the name.
266e71b7053SJung-uk Kim  */
CTLOG_new_ex(EVP_PKEY * public_key,const char * name,OSSL_LIB_CTX * libctx,const char * propq)267*b077aed3SPierre Pronchery CTLOG *CTLOG_new_ex(EVP_PKEY *public_key, const char *name, OSSL_LIB_CTX *libctx,
268*b077aed3SPierre Pronchery                     const char *propq)
269e71b7053SJung-uk Kim {
270e71b7053SJung-uk Kim     CTLOG *ret = OPENSSL_zalloc(sizeof(*ret));
271e71b7053SJung-uk Kim 
272e71b7053SJung-uk Kim     if (ret == NULL) {
273*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
274e71b7053SJung-uk Kim         return NULL;
275e71b7053SJung-uk Kim     }
276e71b7053SJung-uk Kim 
277*b077aed3SPierre Pronchery     ret->libctx = libctx;
278*b077aed3SPierre Pronchery     if (propq != NULL) {
279*b077aed3SPierre Pronchery         ret->propq = OPENSSL_strdup(propq);
280*b077aed3SPierre Pronchery         if (ret->propq == NULL) {
281*b077aed3SPierre Pronchery             ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
282*b077aed3SPierre Pronchery             goto err;
283*b077aed3SPierre Pronchery         }
284*b077aed3SPierre Pronchery     }
285*b077aed3SPierre Pronchery 
286e71b7053SJung-uk Kim     ret->name = OPENSSL_strdup(name);
287e71b7053SJung-uk Kim     if (ret->name == NULL) {
288*b077aed3SPierre Pronchery         ERR_raise(ERR_LIB_CT, ERR_R_MALLOC_FAILURE);
289e71b7053SJung-uk Kim         goto err;
290e71b7053SJung-uk Kim     }
291e71b7053SJung-uk Kim 
292*b077aed3SPierre Pronchery     if (ct_v1_log_id_from_pkey(ret, public_key) != 1)
293e71b7053SJung-uk Kim         goto err;
294e71b7053SJung-uk Kim 
295e71b7053SJung-uk Kim     ret->public_key = public_key;
296e71b7053SJung-uk Kim     return ret;
297e71b7053SJung-uk Kim err:
298e71b7053SJung-uk Kim     CTLOG_free(ret);
299e71b7053SJung-uk Kim     return NULL;
300e71b7053SJung-uk Kim }
301e71b7053SJung-uk Kim 
CTLOG_new(EVP_PKEY * public_key,const char * name)302*b077aed3SPierre Pronchery CTLOG *CTLOG_new(EVP_PKEY *public_key, const char *name)
303*b077aed3SPierre Pronchery {
304*b077aed3SPierre Pronchery     return CTLOG_new_ex(public_key, name, NULL, NULL);
305*b077aed3SPierre Pronchery }
306*b077aed3SPierre Pronchery 
307e71b7053SJung-uk Kim /* Frees CT log and associated structures */
CTLOG_free(CTLOG * log)308e71b7053SJung-uk Kim void CTLOG_free(CTLOG *log)
309e71b7053SJung-uk Kim {
310e71b7053SJung-uk Kim     if (log != NULL) {
311e71b7053SJung-uk Kim         OPENSSL_free(log->name);
312e71b7053SJung-uk Kim         EVP_PKEY_free(log->public_key);
313*b077aed3SPierre Pronchery         OPENSSL_free(log->propq);
314e71b7053SJung-uk Kim         OPENSSL_free(log);
315e71b7053SJung-uk Kim     }
316e71b7053SJung-uk Kim }
317e71b7053SJung-uk Kim 
CTLOG_get0_name(const CTLOG * log)318e71b7053SJung-uk Kim const char *CTLOG_get0_name(const CTLOG *log)
319e71b7053SJung-uk Kim {
320e71b7053SJung-uk Kim     return log->name;
321e71b7053SJung-uk Kim }
322e71b7053SJung-uk Kim 
CTLOG_get0_log_id(const CTLOG * log,const uint8_t ** log_id,size_t * log_id_len)323e71b7053SJung-uk Kim void CTLOG_get0_log_id(const CTLOG *log, const uint8_t **log_id,
324e71b7053SJung-uk Kim                        size_t *log_id_len)
325e71b7053SJung-uk Kim {
326e71b7053SJung-uk Kim     *log_id = log->log_id;
327e71b7053SJung-uk Kim     *log_id_len = CT_V1_HASHLEN;
328e71b7053SJung-uk Kim }
329e71b7053SJung-uk Kim 
CTLOG_get0_public_key(const CTLOG * log)330e71b7053SJung-uk Kim EVP_PKEY *CTLOG_get0_public_key(const CTLOG *log)
331e71b7053SJung-uk Kim {
332e71b7053SJung-uk Kim     return log->public_key;
333e71b7053SJung-uk Kim }
334e71b7053SJung-uk Kim 
335e71b7053SJung-uk Kim /*
336e71b7053SJung-uk Kim  * Given a log ID, finds the matching log.
337e71b7053SJung-uk Kim  * Returns NULL if no match found.
338e71b7053SJung-uk Kim  */
CTLOG_STORE_get0_log_by_id(const CTLOG_STORE * store,const uint8_t * log_id,size_t log_id_len)339e71b7053SJung-uk Kim const CTLOG *CTLOG_STORE_get0_log_by_id(const CTLOG_STORE *store,
340e71b7053SJung-uk Kim                                         const uint8_t *log_id,
341e71b7053SJung-uk Kim                                         size_t log_id_len)
342e71b7053SJung-uk Kim {
343e71b7053SJung-uk Kim     int i;
344e71b7053SJung-uk Kim 
345e71b7053SJung-uk Kim     for (i = 0; i < sk_CTLOG_num(store->logs); ++i) {
346e71b7053SJung-uk Kim         const CTLOG *log = sk_CTLOG_value(store->logs, i);
347e71b7053SJung-uk Kim         if (memcmp(log->log_id, log_id, log_id_len) == 0)
348e71b7053SJung-uk Kim             return log;
349e71b7053SJung-uk Kim     }
350e71b7053SJung-uk Kim 
351e71b7053SJung-uk Kim     return NULL;
352e71b7053SJung-uk Kim }
353