OLD | NEW |
| (Empty) |
1 /* crypto/pkcs7/pk7_doit.c */ | |
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | |
3 * All rights reserved. | |
4 * | |
5 * This package is an SSL implementation written | |
6 * by Eric Young (eay@cryptsoft.com). | |
7 * The implementation was written so as to conform with Netscapes SSL. | |
8 * | |
9 * This library is free for commercial and non-commercial use as long as | |
10 * the following conditions are aheared to. The following conditions | |
11 * apply to all code found in this distribution, be it the RC4, RSA, | |
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 * included with this distribution is covered by the same copyright terms | |
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 * | |
16 * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 * the code are not to be removed. | |
18 * If this package is used in a product, Eric Young should be given attribution | |
19 * as the author of the parts of the library used. | |
20 * This can be in the form of a textual message at program startup or | |
21 * in documentation (online or textual) provided with the package. | |
22 * | |
23 * Redistribution and use in source and binary forms, with or without | |
24 * modification, are permitted provided that the following conditions | |
25 * are met: | |
26 * 1. Redistributions of source code must retain the copyright | |
27 * notice, this list of conditions and the following disclaimer. | |
28 * 2. Redistributions in binary form must reproduce the above copyright | |
29 * notice, this list of conditions and the following disclaimer in the | |
30 * documentation and/or other materials provided with the distribution. | |
31 * 3. All advertising materials mentioning features or use of this software | |
32 * must display the following acknowledgement: | |
33 * "This product includes cryptographic software written by | |
34 * Eric Young (eay@cryptsoft.com)" | |
35 * The word 'cryptographic' can be left out if the rouines from the library | |
36 * being used are not cryptographic related :-). | |
37 * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 * the apps directory (application code) you must include an acknowledgement: | |
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 * | |
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 * SUCH DAMAGE. | |
52 * | |
53 * The licence and distribution terms for any publically available version or | |
54 * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 * copied and put under another distribution licence | |
56 * [including the GNU Public Licence.] | |
57 */ | |
58 | |
59 #include <stdio.h> | |
60 #include "cryptlib.h" | |
61 #include <openssl/rand.h> | |
62 #include <openssl/objects.h> | |
63 #include <openssl/x509.h> | |
64 #include <openssl/x509v3.h> | |
65 #include <openssl/err.h> | |
66 | |
67 static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype, | |
68 void *value); | |
69 static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid); | |
70 | |
71 static int PKCS7_type_is_other(PKCS7* p7) | |
72 { | |
73 int isOther=1; | |
74 | |
75 int nid=OBJ_obj2nid(p7->type); | |
76 | |
77 switch( nid ) | |
78 { | |
79 case NID_pkcs7_data: | |
80 case NID_pkcs7_signed: | |
81 case NID_pkcs7_enveloped: | |
82 case NID_pkcs7_signedAndEnveloped: | |
83 case NID_pkcs7_digest: | |
84 case NID_pkcs7_encrypted: | |
85 isOther=0; | |
86 break; | |
87 default: | |
88 isOther=1; | |
89 } | |
90 | |
91 return isOther; | |
92 | |
93 } | |
94 | |
95 static ASN1_OCTET_STRING *PKCS7_get_octet_string(PKCS7 *p7) | |
96 { | |
97 if ( PKCS7_type_is_data(p7)) | |
98 return p7->d.data; | |
99 if ( PKCS7_type_is_other(p7) && p7->d.other | |
100 && (p7->d.other->type == V_ASN1_OCTET_STRING)) | |
101 return p7->d.other->value.octet_string; | |
102 return NULL; | |
103 } | |
104 | |
105 static int PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg) | |
106 { | |
107 BIO *btmp; | |
108 const EVP_MD *md; | |
109 if ((btmp=BIO_new(BIO_f_md())) == NULL) | |
110 { | |
111 PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST,ERR_R_BIO_LIB); | |
112 goto err; | |
113 } | |
114 | |
115 md=EVP_get_digestbyobj(alg->algorithm); | |
116 if (md == NULL) | |
117 { | |
118 PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST,PKCS7_R_UNKNOWN_DIGEST_TYP
E); | |
119 goto err; | |
120 } | |
121 | |
122 BIO_set_md(btmp,md); | |
123 if (*pbio == NULL) | |
124 *pbio=btmp; | |
125 else if (!BIO_push(*pbio,btmp)) | |
126 { | |
127 PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST,ERR_R_BIO_LIB); | |
128 goto err; | |
129 } | |
130 btmp=NULL; | |
131 | |
132 return 1; | |
133 | |
134 err: | |
135 if (btmp) | |
136 BIO_free(btmp); | |
137 return 0; | |
138 | |
139 } | |
140 | |
141 static int pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, | |
142 unsigned char *key, int keylen) | |
143 { | |
144 EVP_PKEY_CTX *pctx = NULL; | |
145 EVP_PKEY *pkey = NULL; | |
146 unsigned char *ek = NULL; | |
147 int ret = 0; | |
148 size_t eklen; | |
149 | |
150 pkey = X509_get_pubkey(ri->cert); | |
151 | |
152 if (!pkey) | |
153 return 0; | |
154 | |
155 pctx = EVP_PKEY_CTX_new(pkey, NULL); | |
156 if (!pctx) | |
157 return 0; | |
158 | |
159 if (EVP_PKEY_encrypt_init(pctx) <= 0) | |
160 goto err; | |
161 | |
162 if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_ENCRYPT, | |
163 EVP_PKEY_CTRL_PKCS7_ENCRYPT, 0, ri) <= 0) | |
164 { | |
165 PKCS7err(PKCS7_F_PKCS7_ENCODE_RINFO, PKCS7_R_CTRL_ERROR); | |
166 goto err; | |
167 } | |
168 | |
169 if (EVP_PKEY_encrypt(pctx, NULL, &eklen, key, keylen) <= 0) | |
170 goto err; | |
171 | |
172 ek = OPENSSL_malloc(eklen); | |
173 | |
174 if (ek == NULL) | |
175 { | |
176 PKCS7err(PKCS7_F_PKCS7_ENCODE_RINFO, ERR_R_MALLOC_FAILURE); | |
177 goto err; | |
178 } | |
179 | |
180 if (EVP_PKEY_encrypt(pctx, ek, &eklen, key, keylen) <= 0) | |
181 goto err; | |
182 | |
183 ASN1_STRING_set0(ri->enc_key, ek, eklen); | |
184 ek = NULL; | |
185 | |
186 ret = 1; | |
187 | |
188 err: | |
189 if (pkey) | |
190 EVP_PKEY_free(pkey); | |
191 if (pctx) | |
192 EVP_PKEY_CTX_free(pctx); | |
193 if (ek) | |
194 OPENSSL_free(ek); | |
195 return ret; | |
196 | |
197 } | |
198 | |
199 | |
200 static int pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, | |
201 PKCS7_RECIP_INFO *ri, EVP_PKEY *pkey) | |
202 { | |
203 EVP_PKEY_CTX *pctx = NULL; | |
204 unsigned char *ek = NULL; | |
205 size_t eklen; | |
206 | |
207 int ret = -1; | |
208 | |
209 pctx = EVP_PKEY_CTX_new(pkey, NULL); | |
210 if (!pctx) | |
211 return -1; | |
212 | |
213 if (EVP_PKEY_decrypt_init(pctx) <= 0) | |
214 goto err; | |
215 | |
216 if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_DECRYPT, | |
217 EVP_PKEY_CTRL_PKCS7_DECRYPT, 0, ri) <= 0) | |
218 { | |
219 PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, PKCS7_R_CTRL_ERROR); | |
220 goto err; | |
221 } | |
222 | |
223 if (EVP_PKEY_decrypt(pctx, NULL, &eklen, | |
224 ri->enc_key->data, ri->enc_key->length) <= 0) | |
225 goto err; | |
226 | |
227 ek = OPENSSL_malloc(eklen); | |
228 | |
229 if (ek == NULL) | |
230 { | |
231 PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, ERR_R_MALLOC_FAILURE); | |
232 goto err; | |
233 } | |
234 | |
235 if (EVP_PKEY_decrypt(pctx, ek, &eklen, | |
236 ri->enc_key->data, ri->enc_key->length) <= 0) | |
237 { | |
238 ret = 0; | |
239 PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, ERR_R_EVP_LIB); | |
240 goto err; | |
241 } | |
242 | |
243 ret = 1; | |
244 | |
245 if (*pek) | |
246 { | |
247 OPENSSL_cleanse(*pek, *peklen); | |
248 OPENSSL_free(*pek); | |
249 } | |
250 | |
251 *pek = ek; | |
252 *peklen = eklen; | |
253 | |
254 err: | |
255 if (pctx) | |
256 EVP_PKEY_CTX_free(pctx); | |
257 if (!ret && ek) | |
258 OPENSSL_free(ek); | |
259 | |
260 return ret; | |
261 } | |
262 | |
263 BIO *PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |
264 { | |
265 int i; | |
266 BIO *out=NULL,*btmp=NULL; | |
267 X509_ALGOR *xa = NULL; | |
268 const EVP_CIPHER *evp_cipher=NULL; | |
269 STACK_OF(X509_ALGOR) *md_sk=NULL; | |
270 STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL; | |
271 X509_ALGOR *xalg=NULL; | |
272 PKCS7_RECIP_INFO *ri=NULL; | |
273 ASN1_OCTET_STRING *os=NULL; | |
274 | |
275 i=OBJ_obj2nid(p7->type); | |
276 p7->state=PKCS7_S_HEADER; | |
277 | |
278 switch (i) | |
279 { | |
280 case NID_pkcs7_signed: | |
281 md_sk=p7->d.sign->md_algs; | |
282 os = PKCS7_get_octet_string(p7->d.sign->contents); | |
283 break; | |
284 case NID_pkcs7_signedAndEnveloped: | |
285 rsk=p7->d.signed_and_enveloped->recipientinfo; | |
286 md_sk=p7->d.signed_and_enveloped->md_algs; | |
287 xalg=p7->d.signed_and_enveloped->enc_data->algorithm; | |
288 evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher; | |
289 if (evp_cipher == NULL) | |
290 { | |
291 PKCS7err(PKCS7_F_PKCS7_DATAINIT, | |
292 PKCS7_R_CIPHER_NOT_INITIALIZED); | |
293 goto err; | |
294 } | |
295 break; | |
296 case NID_pkcs7_enveloped: | |
297 rsk=p7->d.enveloped->recipientinfo; | |
298 xalg=p7->d.enveloped->enc_data->algorithm; | |
299 evp_cipher=p7->d.enveloped->enc_data->cipher; | |
300 if (evp_cipher == NULL) | |
301 { | |
302 PKCS7err(PKCS7_F_PKCS7_DATAINIT, | |
303 PKCS7_R_CIPHER_NOT_INITIALIZED); | |
304 goto err; | |
305 } | |
306 break; | |
307 case NID_pkcs7_digest: | |
308 xa = p7->d.digest->md; | |
309 os = PKCS7_get_octet_string(p7->d.digest->contents); | |
310 break; | |
311 case NID_pkcs7_data: | |
312 break; | |
313 default: | |
314 PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNSUPPORTED_CONTENT_TYPE
); | |
315 goto err; | |
316 } | |
317 | |
318 for (i=0; i<sk_X509_ALGOR_num(md_sk); i++) | |
319 if (!PKCS7_bio_add_digest(&out, sk_X509_ALGOR_value(md_sk, i))) | |
320 goto err; | |
321 | |
322 if (xa && !PKCS7_bio_add_digest(&out, xa)) | |
323 goto err; | |
324 | |
325 if (evp_cipher != NULL) | |
326 { | |
327 unsigned char key[EVP_MAX_KEY_LENGTH]; | |
328 unsigned char iv[EVP_MAX_IV_LENGTH]; | |
329 int keylen,ivlen; | |
330 EVP_CIPHER_CTX *ctx; | |
331 | |
332 if ((btmp=BIO_new(BIO_f_cipher())) == NULL) | |
333 { | |
334 PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_BIO_LIB); | |
335 goto err; | |
336 } | |
337 BIO_get_cipher_ctx(btmp, &ctx); | |
338 keylen=EVP_CIPHER_key_length(evp_cipher); | |
339 ivlen=EVP_CIPHER_iv_length(evp_cipher); | |
340 xalg->algorithm = OBJ_nid2obj(EVP_CIPHER_type(evp_cipher)); | |
341 if (ivlen > 0) | |
342 if (RAND_pseudo_bytes(iv,ivlen) <= 0) | |
343 goto err; | |
344 if (EVP_CipherInit_ex(ctx, evp_cipher, NULL, NULL, NULL, 1)<=0) | |
345 goto err; | |
346 if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0) | |
347 goto err; | |
348 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0) | |
349 goto err; | |
350 | |
351 if (ivlen > 0) { | |
352 if (xalg->parameter == NULL) { | |
353 xalg->parameter = ASN1_TYPE_new(); | |
354 if (xalg->parameter == NULL) | |
355 goto err; | |
356 } | |
357 if(EVP_CIPHER_param_to_asn1(ctx, xalg->parameter) < 0) | |
358 goto err; | |
359 } | |
360 | |
361 /* Lets do the pub key stuff :-) */ | |
362 for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++) | |
363 { | |
364 ri=sk_PKCS7_RECIP_INFO_value(rsk,i); | |
365 if (pkcs7_encode_rinfo(ri, key, keylen) <= 0) | |
366 goto err; | |
367 } | |
368 OPENSSL_cleanse(key, keylen); | |
369 | |
370 if (out == NULL) | |
371 out=btmp; | |
372 else | |
373 BIO_push(out,btmp); | |
374 btmp=NULL; | |
375 } | |
376 | |
377 if (bio == NULL) | |
378 { | |
379 if (PKCS7_is_detached(p7)) | |
380 bio=BIO_new(BIO_s_null()); | |
381 else if (os && os->length > 0) | |
382 bio = BIO_new_mem_buf(os->data, os->length); | |
383 if(bio == NULL) | |
384 { | |
385 bio=BIO_new(BIO_s_mem()); | |
386 if (bio == NULL) | |
387 goto err; | |
388 BIO_set_mem_eof_return(bio,0); | |
389 } | |
390 } | |
391 if (out) | |
392 BIO_push(out,bio); | |
393 else | |
394 out = bio; | |
395 bio=NULL; | |
396 if (0) | |
397 { | |
398 err: | |
399 if (out != NULL) | |
400 BIO_free_all(out); | |
401 if (btmp != NULL) | |
402 BIO_free_all(btmp); | |
403 out=NULL; | |
404 } | |
405 return(out); | |
406 } | |
407 | |
408 static int pkcs7_cmp_ri(PKCS7_RECIP_INFO *ri, X509 *pcert) | |
409 { | |
410 int ret; | |
411 ret = X509_NAME_cmp(ri->issuer_and_serial->issuer, | |
412 pcert->cert_info->issuer); | |
413 if (ret) | |
414 return ret; | |
415 return M_ASN1_INTEGER_cmp(pcert->cert_info->serialNumber, | |
416 ri->issuer_and_serial->serial); | |
417 } | |
418 | |
419 /* int */ | |
420 BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |
421 { | |
422 int i,j; | |
423 BIO *out=NULL,*btmp=NULL,*etmp=NULL,*bio=NULL; | |
424 X509_ALGOR *xa; | |
425 ASN1_OCTET_STRING *data_body=NULL; | |
426 const EVP_MD *evp_md; | |
427 const EVP_CIPHER *evp_cipher=NULL; | |
428 EVP_CIPHER_CTX *evp_ctx=NULL; | |
429 X509_ALGOR *enc_alg=NULL; | |
430 STACK_OF(X509_ALGOR) *md_sk=NULL; | |
431 STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL; | |
432 PKCS7_RECIP_INFO *ri=NULL; | |
433 unsigned char *ek = NULL, *tkey = NULL; | |
434 int eklen = 0, tkeylen = 0; | |
435 | |
436 i=OBJ_obj2nid(p7->type); | |
437 p7->state=PKCS7_S_HEADER; | |
438 | |
439 switch (i) | |
440 { | |
441 case NID_pkcs7_signed: | |
442 data_body=PKCS7_get_octet_string(p7->d.sign->contents); | |
443 md_sk=p7->d.sign->md_algs; | |
444 break; | |
445 case NID_pkcs7_signedAndEnveloped: | |
446 rsk=p7->d.signed_and_enveloped->recipientinfo; | |
447 md_sk=p7->d.signed_and_enveloped->md_algs; | |
448 data_body=p7->d.signed_and_enveloped->enc_data->enc_data; | |
449 enc_alg=p7->d.signed_and_enveloped->enc_data->algorithm; | |
450 evp_cipher=EVP_get_cipherbyobj(enc_alg->algorithm); | |
451 if (evp_cipher == NULL) | |
452 { | |
453 PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CI
PHER_TYPE); | |
454 goto err; | |
455 } | |
456 break; | |
457 case NID_pkcs7_enveloped: | |
458 rsk=p7->d.enveloped->recipientinfo; | |
459 enc_alg=p7->d.enveloped->enc_data->algorithm; | |
460 data_body=p7->d.enveloped->enc_data->enc_data; | |
461 evp_cipher=EVP_get_cipherbyobj(enc_alg->algorithm); | |
462 if (evp_cipher == NULL) | |
463 { | |
464 PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CI
PHER_TYPE); | |
465 goto err; | |
466 } | |
467 break; | |
468 default: | |
469 PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CONTENT_TY
PE); | |
470 goto err; | |
471 } | |
472 | |
473 /* We will be checking the signature */ | |
474 if (md_sk != NULL) | |
475 { | |
476 for (i=0; i<sk_X509_ALGOR_num(md_sk); i++) | |
477 { | |
478 xa=sk_X509_ALGOR_value(md_sk,i); | |
479 if ((btmp=BIO_new(BIO_f_md())) == NULL) | |
480 { | |
481 PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB)
; | |
482 goto err; | |
483 } | |
484 | |
485 j=OBJ_obj2nid(xa->algorithm); | |
486 evp_md=EVP_get_digestbynid(j); | |
487 if (evp_md == NULL) | |
488 { | |
489 PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNKNOW
N_DIGEST_TYPE); | |
490 goto err; | |
491 } | |
492 | |
493 BIO_set_md(btmp,evp_md); | |
494 if (out == NULL) | |
495 out=btmp; | |
496 else | |
497 BIO_push(out,btmp); | |
498 btmp=NULL; | |
499 } | |
500 } | |
501 | |
502 if (evp_cipher != NULL) | |
503 { | |
504 #if 0 | |
505 unsigned char key[EVP_MAX_KEY_LENGTH]; | |
506 unsigned char iv[EVP_MAX_IV_LENGTH]; | |
507 unsigned char *p; | |
508 int keylen,ivlen; | |
509 int max; | |
510 X509_OBJECT ret; | |
511 #endif | |
512 | |
513 if ((etmp=BIO_new(BIO_f_cipher())) == NULL) | |
514 { | |
515 PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB); | |
516 goto err; | |
517 } | |
518 | |
519 /* It was encrypted, we need to decrypt the secret key | |
520 * with the private key */ | |
521 | |
522 /* Find the recipientInfo which matches the passed certificate | |
523 * (if any) | |
524 */ | |
525 | |
526 if (pcert) | |
527 { | |
528 for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++) | |
529 { | |
530 ri=sk_PKCS7_RECIP_INFO_value(rsk,i); | |
531 if (!pkcs7_cmp_ri(ri, pcert)) | |
532 break; | |
533 ri=NULL; | |
534 } | |
535 if (ri == NULL) | |
536 { | |
537 PKCS7err(PKCS7_F_PKCS7_DATADECODE, | |
538 PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE); | |
539 goto err; | |
540 } | |
541 } | |
542 | |
543 /* If we haven't got a certificate try each ri in turn */ | |
544 if (pcert == NULL) | |
545 { | |
546 /* Always attempt to decrypt all rinfo even | |
547 * after sucess as a defence against MMA timing | |
548 * attacks. | |
549 */ | |
550 for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++) | |
551 { | |
552 ri=sk_PKCS7_RECIP_INFO_value(rsk,i); | |
553 | |
554 if (pkcs7_decrypt_rinfo(&ek, &eklen, | |
555 ri, pkey) < 0) | |
556 goto err; | |
557 ERR_clear_error(); | |
558 } | |
559 } | |
560 else | |
561 { | |
562 /* Only exit on fatal errors, not decrypt failure */ | |
563 if (pkcs7_decrypt_rinfo(&ek, &eklen, ri, pkey) < 0) | |
564 goto err; | |
565 ERR_clear_error(); | |
566 } | |
567 | |
568 evp_ctx=NULL; | |
569 BIO_get_cipher_ctx(etmp,&evp_ctx); | |
570 if (EVP_CipherInit_ex(evp_ctx,evp_cipher,NULL,NULL,NULL,0) <= 0) | |
571 goto err; | |
572 if (EVP_CIPHER_asn1_to_param(evp_ctx,enc_alg->parameter) < 0) | |
573 goto err; | |
574 /* Generate random key as MMA defence */ | |
575 tkeylen = EVP_CIPHER_CTX_key_length(evp_ctx); | |
576 tkey = OPENSSL_malloc(tkeylen); | |
577 if (!tkey) | |
578 goto err; | |
579 if (EVP_CIPHER_CTX_rand_key(evp_ctx, tkey) <= 0) | |
580 goto err; | |
581 if (ek == NULL) | |
582 { | |
583 ek = tkey; | |
584 eklen = tkeylen; | |
585 tkey = NULL; | |
586 } | |
587 | |
588 if (eklen != EVP_CIPHER_CTX_key_length(evp_ctx)) { | |
589 /* Some S/MIME clients don't use the same key | |
590 * and effective key length. The key length is | |
591 * determined by the size of the decrypted RSA key. | |
592 */ | |
593 if(!EVP_CIPHER_CTX_set_key_length(evp_ctx, eklen)) | |
594 { | |
595 /* Use random key as MMA defence */ | |
596 OPENSSL_cleanse(ek, eklen); | |
597 OPENSSL_free(ek); | |
598 ek = tkey; | |
599 eklen = tkeylen; | |
600 tkey = NULL; | |
601 } | |
602 } | |
603 /* Clear errors so we don't leak information useful in MMA */ | |
604 ERR_clear_error(); | |
605 if (EVP_CipherInit_ex(evp_ctx,NULL,NULL,ek,NULL,0) <= 0) | |
606 goto err; | |
607 | |
608 if (ek) | |
609 { | |
610 OPENSSL_cleanse(ek,eklen); | |
611 OPENSSL_free(ek); | |
612 ek = NULL; | |
613 } | |
614 if (tkey) | |
615 { | |
616 OPENSSL_cleanse(tkey,tkeylen); | |
617 OPENSSL_free(tkey); | |
618 tkey = NULL; | |
619 } | |
620 | |
621 if (out == NULL) | |
622 out=etmp; | |
623 else | |
624 BIO_push(out,etmp); | |
625 etmp=NULL; | |
626 } | |
627 | |
628 #if 1 | |
629 if (PKCS7_is_detached(p7) || (in_bio != NULL)) | |
630 { | |
631 bio=in_bio; | |
632 } | |
633 else | |
634 { | |
635 #if 0 | |
636 bio=BIO_new(BIO_s_mem()); | |
637 /* We need to set this so that when we have read all | |
638 * the data, the encrypt BIO, if present, will read | |
639 * EOF and encode the last few bytes */ | |
640 BIO_set_mem_eof_return(bio,0); | |
641 | |
642 if (data_body->length > 0) | |
643 BIO_write(bio,(char *)data_body->data,data_body->length)
; | |
644 #else | |
645 if (data_body->length > 0) | |
646 bio = BIO_new_mem_buf(data_body->data,data_body->length); | |
647 else { | |
648 bio=BIO_new(BIO_s_mem()); | |
649 BIO_set_mem_eof_return(bio,0); | |
650 } | |
651 if (bio == NULL) | |
652 goto err; | |
653 #endif | |
654 } | |
655 BIO_push(out,bio); | |
656 bio=NULL; | |
657 #endif | |
658 if (0) | |
659 { | |
660 err: | |
661 if (ek) | |
662 { | |
663 OPENSSL_cleanse(ek,eklen); | |
664 OPENSSL_free(ek); | |
665 } | |
666 if (tkey) | |
667 { | |
668 OPENSSL_cleanse(tkey,tkeylen); | |
669 OPENSSL_free(tkey); | |
670 } | |
671 if (out != NULL) BIO_free_all(out); | |
672 if (btmp != NULL) BIO_free_all(btmp); | |
673 if (etmp != NULL) BIO_free_all(etmp); | |
674 if (bio != NULL) BIO_free_all(bio); | |
675 out=NULL; | |
676 } | |
677 return(out); | |
678 } | |
679 | |
680 static BIO *PKCS7_find_digest(EVP_MD_CTX **pmd, BIO *bio, int nid) | |
681 { | |
682 for (;;) | |
683 { | |
684 bio=BIO_find_type(bio,BIO_TYPE_MD); | |
685 if (bio == NULL) | |
686 { | |
687 PKCS7err(PKCS7_F_PKCS7_FIND_DIGEST,PKCS7_R_UNABLE_TO_FIN
D_MESSAGE_DIGEST); | |
688 return NULL; | |
689 } | |
690 BIO_get_md_ctx(bio,pmd); | |
691 if (*pmd == NULL) | |
692 { | |
693 PKCS7err(PKCS7_F_PKCS7_FIND_DIGEST,ERR_R_INTERNAL_ERROR)
; | |
694 return NULL; | |
695 } | |
696 if (EVP_MD_CTX_type(*pmd) == nid) | |
697 return bio; | |
698 bio=BIO_next(bio); | |
699 } | |
700 return NULL; | |
701 } | |
702 | |
703 static int do_pkcs7_signed_attrib(PKCS7_SIGNER_INFO *si, EVP_MD_CTX *mctx) | |
704 { | |
705 unsigned char md_data[EVP_MAX_MD_SIZE]; | |
706 unsigned int md_len; | |
707 | |
708 /* Add signing time if not already present */ | |
709 if (!PKCS7_get_signed_attribute(si, NID_pkcs9_signingTime)) | |
710 { | |
711 if (!PKCS7_add0_attrib_signing_time(si, NULL)) | |
712 { | |
713 PKCS7err(PKCS7_F_DO_PKCS7_SIGNED_ATTRIB, | |
714 ERR_R_MALLOC_FAILURE); | |
715 return 0; | |
716 } | |
717 } | |
718 | |
719 /* Add digest */ | |
720 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len)) | |
721 { | |
722 PKCS7err(PKCS7_F_DO_PKCS7_SIGNED_ATTRIB, ERR_R_EVP_LIB); | |
723 return 0; | |
724 } | |
725 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) | |
726 { | |
727 PKCS7err(PKCS7_F_DO_PKCS7_SIGNED_ATTRIB, ERR_R_MALLOC_FAILURE); | |
728 return 0; | |
729 } | |
730 | |
731 /* Now sign the attributes */ | |
732 if (!PKCS7_SIGNER_INFO_sign(si)) | |
733 return 0; | |
734 | |
735 return 1; | |
736 } | |
737 | |
738 | |
739 int PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |
740 { | |
741 int ret=0; | |
742 int i,j; | |
743 BIO *btmp; | |
744 PKCS7_SIGNER_INFO *si; | |
745 EVP_MD_CTX *mdc,ctx_tmp; | |
746 STACK_OF(X509_ATTRIBUTE) *sk; | |
747 STACK_OF(PKCS7_SIGNER_INFO) *si_sk=NULL; | |
748 ASN1_OCTET_STRING *os=NULL; | |
749 | |
750 EVP_MD_CTX_init(&ctx_tmp); | |
751 i=OBJ_obj2nid(p7->type); | |
752 p7->state=PKCS7_S_HEADER; | |
753 | |
754 switch (i) | |
755 { | |
756 case NID_pkcs7_data: | |
757 os = p7->d.data; | |
758 break; | |
759 case NID_pkcs7_signedAndEnveloped: | |
760 /* XXXXXXXXXXXXXXXX */ | |
761 si_sk=p7->d.signed_and_enveloped->signer_info; | |
762 os = p7->d.signed_and_enveloped->enc_data->enc_data; | |
763 if (!os) | |
764 { | |
765 os=M_ASN1_OCTET_STRING_new(); | |
766 if (!os) | |
767 { | |
768 PKCS7err(PKCS7_F_PKCS7_DATAFINAL,ERR_R_MALLOC_FA
ILURE); | |
769 goto err; | |
770 } | |
771 p7->d.signed_and_enveloped->enc_data->enc_data=os; | |
772 } | |
773 break; | |
774 case NID_pkcs7_enveloped: | |
775 /* XXXXXXXXXXXXXXXX */ | |
776 os = p7->d.enveloped->enc_data->enc_data; | |
777 if (!os) | |
778 { | |
779 os=M_ASN1_OCTET_STRING_new(); | |
780 if (!os) | |
781 { | |
782 PKCS7err(PKCS7_F_PKCS7_DATAFINAL,ERR_R_MALLOC_FA
ILURE); | |
783 goto err; | |
784 } | |
785 p7->d.enveloped->enc_data->enc_data=os; | |
786 } | |
787 break; | |
788 case NID_pkcs7_signed: | |
789 si_sk=p7->d.sign->signer_info; | |
790 os=PKCS7_get_octet_string(p7->d.sign->contents); | |
791 /* If detached data then the content is excluded */ | |
792 if(PKCS7_type_is_data(p7->d.sign->contents) && p7->detached) { | |
793 M_ASN1_OCTET_STRING_free(os); | |
794 p7->d.sign->contents->d.data = NULL; | |
795 } | |
796 break; | |
797 | |
798 case NID_pkcs7_digest: | |
799 os=PKCS7_get_octet_string(p7->d.digest->contents); | |
800 /* If detached data then the content is excluded */ | |
801 if(PKCS7_type_is_data(p7->d.digest->contents) && p7->detached) | |
802 { | |
803 M_ASN1_OCTET_STRING_free(os); | |
804 p7->d.digest->contents->d.data = NULL; | |
805 } | |
806 break; | |
807 | |
808 default: | |
809 PKCS7err(PKCS7_F_PKCS7_DATAFINAL,PKCS7_R_UNSUPPORTED_CONTENT_TYP
E); | |
810 goto err; | |
811 } | |
812 | |
813 if (si_sk != NULL) | |
814 { | |
815 for (i=0; i<sk_PKCS7_SIGNER_INFO_num(si_sk); i++) | |
816 { | |
817 si=sk_PKCS7_SIGNER_INFO_value(si_sk,i); | |
818 if (si->pkey == NULL) | |
819 continue; | |
820 | |
821 j = OBJ_obj2nid(si->digest_alg->algorithm); | |
822 | |
823 btmp=bio; | |
824 | |
825 btmp = PKCS7_find_digest(&mdc, btmp, j); | |
826 | |
827 if (btmp == NULL) | |
828 goto err; | |
829 | |
830 /* We now have the EVP_MD_CTX, lets do the | |
831 * signing. */ | |
832 if (!EVP_MD_CTX_copy_ex(&ctx_tmp,mdc)) | |
833 goto err; | |
834 | |
835 sk=si->auth_attr; | |
836 | |
837 /* If there are attributes, we add the digest | |
838 * attribute and only sign the attributes */ | |
839 if (sk_X509_ATTRIBUTE_num(sk) > 0) | |
840 { | |
841 if (!do_pkcs7_signed_attrib(si, &ctx_tmp)) | |
842 goto err; | |
843 } | |
844 else | |
845 { | |
846 unsigned char *abuf = NULL; | |
847 unsigned int abuflen; | |
848 abuflen = EVP_PKEY_size(si->pkey); | |
849 abuf = OPENSSL_malloc(abuflen); | |
850 if (!abuf) | |
851 goto err; | |
852 | |
853 if (!EVP_SignFinal(&ctx_tmp, abuf, &abuflen, | |
854 si->pkey)) | |
855 { | |
856 PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | |
857 ERR_R_EVP_LIB); | |
858 goto err; | |
859 } | |
860 ASN1_STRING_set0(si->enc_digest, abuf, abuflen); | |
861 } | |
862 } | |
863 } | |
864 else if (i == NID_pkcs7_digest) | |
865 { | |
866 unsigned char md_data[EVP_MAX_MD_SIZE]; | |
867 unsigned int md_len; | |
868 if (!PKCS7_find_digest(&mdc, bio, | |
869 OBJ_obj2nid(p7->d.digest->md->algorithm))) | |
870 goto err; | |
871 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len)) | |
872 goto err; | |
873 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len); | |
874 } | |
875 | |
876 if (!PKCS7_is_detached(p7) && !(os->flags & ASN1_STRING_FLAG_NDEF)) | |
877 { | |
878 char *cont; | |
879 long contlen; | |
880 btmp=BIO_find_type(bio,BIO_TYPE_MEM); | |
881 if (btmp == NULL) | |
882 { | |
883 PKCS7err(PKCS7_F_PKCS7_DATAFINAL,PKCS7_R_UNABLE_TO_FIND_
MEM_BIO); | |
884 goto err; | |
885 } | |
886 contlen = BIO_get_mem_data(btmp, &cont); | |
887 /* Mark the BIO read only then we can use its copy of the data | |
888 * instead of making an extra copy. | |
889 */ | |
890 BIO_set_flags(btmp, BIO_FLAGS_MEM_RDONLY); | |
891 BIO_set_mem_eof_return(btmp, 0); | |
892 ASN1_STRING_set0(os, (unsigned char *)cont, contlen); | |
893 } | |
894 ret=1; | |
895 err: | |
896 EVP_MD_CTX_cleanup(&ctx_tmp); | |
897 return(ret); | |
898 } | |
899 | |
900 int PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) | |
901 { | |
902 EVP_MD_CTX mctx; | |
903 EVP_PKEY_CTX *pctx; | |
904 unsigned char *abuf = NULL; | |
905 int alen; | |
906 size_t siglen; | |
907 const EVP_MD *md = NULL; | |
908 | |
909 md = EVP_get_digestbyobj(si->digest_alg->algorithm); | |
910 if (md == NULL) | |
911 return 0; | |
912 | |
913 EVP_MD_CTX_init(&mctx); | |
914 if (EVP_DigestSignInit(&mctx, &pctx, md,NULL, si->pkey) <= 0) | |
915 goto err; | |
916 | |
917 if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN, | |
918 EVP_PKEY_CTRL_PKCS7_SIGN, 0, si) <= 0) | |
919 { | |
920 PKCS7err(PKCS7_F_PKCS7_SIGNER_INFO_SIGN, PKCS7_R_CTRL_ERROR); | |
921 goto err; | |
922 } | |
923 | |
924 alen = ASN1_item_i2d((ASN1_VALUE *)si->auth_attr,&abuf, | |
925 ASN1_ITEM_rptr(PKCS7_ATTR_SIGN)); | |
926 if(!abuf) | |
927 goto err; | |
928 if (EVP_DigestSignUpdate(&mctx,abuf,alen) <= 0) | |
929 goto err; | |
930 OPENSSL_free(abuf); | |
931 abuf = NULL; | |
932 if (EVP_DigestSignFinal(&mctx, NULL, &siglen) <= 0) | |
933 goto err; | |
934 abuf = OPENSSL_malloc(siglen); | |
935 if(!abuf) | |
936 goto err; | |
937 if (EVP_DigestSignFinal(&mctx, abuf, &siglen) <= 0) | |
938 goto err; | |
939 | |
940 if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN, | |
941 EVP_PKEY_CTRL_PKCS7_SIGN, 1, si) <= 0) | |
942 { | |
943 PKCS7err(PKCS7_F_PKCS7_SIGNER_INFO_SIGN, PKCS7_R_CTRL_ERROR); | |
944 goto err; | |
945 } | |
946 | |
947 EVP_MD_CTX_cleanup(&mctx); | |
948 | |
949 ASN1_STRING_set0(si->enc_digest, abuf, siglen); | |
950 | |
951 return 1; | |
952 | |
953 err: | |
954 if (abuf) | |
955 OPENSSL_free(abuf); | |
956 EVP_MD_CTX_cleanup(&mctx); | |
957 return 0; | |
958 | |
959 } | |
960 | |
961 int PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, | |
962 PKCS7 *p7, PKCS7_SIGNER_INFO *si) | |
963 { | |
964 PKCS7_ISSUER_AND_SERIAL *ias; | |
965 int ret=0,i; | |
966 STACK_OF(X509) *cert; | |
967 X509 *x509; | |
968 | |
969 if (PKCS7_type_is_signed(p7)) | |
970 { | |
971 cert=p7->d.sign->cert; | |
972 } | |
973 else if (PKCS7_type_is_signedAndEnveloped(p7)) | |
974 { | |
975 cert=p7->d.signed_and_enveloped->cert; | |
976 } | |
977 else | |
978 { | |
979 PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_WRONG_PKCS7_TYPE); | |
980 goto err; | |
981 } | |
982 /* XXXXXXXXXXXXXXXXXXXXXXX */ | |
983 ias=si->issuer_and_serial; | |
984 | |
985 x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial); | |
986 | |
987 /* were we able to find the cert in passed to us */ | |
988 if (x509 == NULL) | |
989 { | |
990 PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_UNABLE_TO_FIND_CERTIFI
CATE); | |
991 goto err; | |
992 } | |
993 | |
994 /* Lets verify */ | |
995 if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert)) | |
996 { | |
997 PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,ERR_R_X509_LIB); | |
998 goto err; | |
999 } | |
1000 X509_STORE_CTX_set_purpose(ctx, X509_PURPOSE_SMIME_SIGN); | |
1001 i=X509_verify_cert(ctx); | |
1002 if (i <= 0) | |
1003 { | |
1004 PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,ERR_R_X509_LIB); | |
1005 X509_STORE_CTX_cleanup(ctx); | |
1006 goto err; | |
1007 } | |
1008 X509_STORE_CTX_cleanup(ctx); | |
1009 | |
1010 return PKCS7_signatureVerify(bio, p7, si, x509); | |
1011 err: | |
1012 return ret; | |
1013 } | |
1014 | |
1015 int PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, | |
1016 X509 *x509) | |
1017 { | |
1018 ASN1_OCTET_STRING *os; | |
1019 EVP_MD_CTX mdc_tmp,*mdc; | |
1020 int ret=0,i; | |
1021 int md_type; | |
1022 STACK_OF(X509_ATTRIBUTE) *sk; | |
1023 BIO *btmp; | |
1024 EVP_PKEY *pkey; | |
1025 | |
1026 EVP_MD_CTX_init(&mdc_tmp); | |
1027 | |
1028 if (!PKCS7_type_is_signed(p7) && | |
1029 !PKCS7_type_is_signedAndEnveloped(p7)) { | |
1030 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | |
1031 PKCS7_R_WRONG_PKCS7_TYPE); | |
1032 goto err; | |
1033 } | |
1034 | |
1035 md_type=OBJ_obj2nid(si->digest_alg->algorithm); | |
1036 | |
1037 btmp=bio; | |
1038 for (;;) | |
1039 { | |
1040 if ((btmp == NULL) || | |
1041 ((btmp=BIO_find_type(btmp,BIO_TYPE_MD)) == NULL)) | |
1042 { | |
1043 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | |
1044 PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); | |
1045 goto err; | |
1046 } | |
1047 BIO_get_md_ctx(btmp,&mdc); | |
1048 if (mdc == NULL) | |
1049 { | |
1050 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | |
1051 ERR_R_INTERNAL_ERROR); | |
1052 goto err; | |
1053 } | |
1054 if (EVP_MD_CTX_type(mdc) == md_type) | |
1055 break; | |
1056 /* Workaround for some broken clients that put the signature | |
1057 * OID instead of the digest OID in digest_alg->algorithm | |
1058 */ | |
1059 if (EVP_MD_pkey_type(EVP_MD_CTX_md(mdc)) == md_type) | |
1060 break; | |
1061 btmp=BIO_next(btmp); | |
1062 } | |
1063 | |
1064 /* mdc is the digest ctx that we want, unless there are attributes, | |
1065 * in which case the digest is the signed attributes */ | |
1066 if (!EVP_MD_CTX_copy_ex(&mdc_tmp,mdc)) | |
1067 goto err; | |
1068 | |
1069 sk=si->auth_attr; | |
1070 if ((sk != NULL) && (sk_X509_ATTRIBUTE_num(sk) != 0)) | |
1071 { | |
1072 unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL; | |
1073 unsigned int md_len; | |
1074 int alen; | |
1075 ASN1_OCTET_STRING *message_digest; | |
1076 | |
1077 if (!EVP_DigestFinal_ex(&mdc_tmp,md_dat,&md_len)) | |
1078 goto err; | |
1079 message_digest=PKCS7_digest_from_attributes(sk); | |
1080 if (!message_digest) | |
1081 { | |
1082 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | |
1083 PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); | |
1084 goto err; | |
1085 } | |
1086 if ((message_digest->length != (int)md_len) || | |
1087 (memcmp(message_digest->data,md_dat,md_len))) | |
1088 { | |
1089 #if 0 | |
1090 { | |
1091 int ii; | |
1092 for (ii=0; ii<message_digest->length; ii++) | |
1093 printf("%02X",message_digest->data[ii]); printf(" sent\n"); | |
1094 for (ii=0; ii<md_len; ii++) printf("%02X",md_dat[ii]); printf(" calc\n"); | |
1095 } | |
1096 #endif | |
1097 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | |
1098 PKCS7_R_DIGEST_FAILURE); | |
1099 ret= -1; | |
1100 goto err; | |
1101 } | |
1102 | |
1103 if (!EVP_VerifyInit_ex(&mdc_tmp,EVP_get_digestbynid(md_type), NU
LL)) | |
1104 goto err; | |
1105 | |
1106 alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf, | |
1107 ASN1_ITEM_rptr(PKCS7_ATTR_VERIFY
)); | |
1108 if (alen <= 0) | |
1109 { | |
1110 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,ERR_R_ASN1_LIB); | |
1111 ret = -1; | |
1112 goto err; | |
1113 } | |
1114 if (!EVP_VerifyUpdate(&mdc_tmp, abuf, alen)) | |
1115 goto err; | |
1116 | |
1117 OPENSSL_free(abuf); | |
1118 } | |
1119 | |
1120 os=si->enc_digest; | |
1121 pkey = X509_get_pubkey(x509); | |
1122 if (!pkey) | |
1123 { | |
1124 ret = -1; | |
1125 goto err; | |
1126 } | |
1127 | |
1128 i=EVP_VerifyFinal(&mdc_tmp,os->data,os->length, pkey); | |
1129 EVP_PKEY_free(pkey); | |
1130 if (i <= 0) | |
1131 { | |
1132 PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | |
1133 PKCS7_R_SIGNATURE_FAILURE); | |
1134 ret= -1; | |
1135 goto err; | |
1136 } | |
1137 else | |
1138 ret=1; | |
1139 err: | |
1140 EVP_MD_CTX_cleanup(&mdc_tmp); | |
1141 return(ret); | |
1142 } | |
1143 | |
1144 PKCS7_ISSUER_AND_SERIAL *PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx) | |
1145 { | |
1146 STACK_OF(PKCS7_RECIP_INFO) *rsk; | |
1147 PKCS7_RECIP_INFO *ri; | |
1148 int i; | |
1149 | |
1150 i=OBJ_obj2nid(p7->type); | |
1151 if (i != NID_pkcs7_signedAndEnveloped) | |
1152 return NULL; | |
1153 if (p7->d.signed_and_enveloped == NULL) | |
1154 return NULL; | |
1155 rsk=p7->d.signed_and_enveloped->recipientinfo; | |
1156 if (rsk == NULL) | |
1157 return NULL; | |
1158 ri=sk_PKCS7_RECIP_INFO_value(rsk,0); | |
1159 if (sk_PKCS7_RECIP_INFO_num(rsk) <= idx) return(NULL); | |
1160 ri=sk_PKCS7_RECIP_INFO_value(rsk,idx); | |
1161 return(ri->issuer_and_serial); | |
1162 } | |
1163 | |
1164 ASN1_TYPE *PKCS7_get_signed_attribute(PKCS7_SIGNER_INFO *si, int nid) | |
1165 { | |
1166 return(get_attribute(si->auth_attr,nid)); | |
1167 } | |
1168 | |
1169 ASN1_TYPE *PKCS7_get_attribute(PKCS7_SIGNER_INFO *si, int nid) | |
1170 { | |
1171 return(get_attribute(si->unauth_attr,nid)); | |
1172 } | |
1173 | |
1174 static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid) | |
1175 { | |
1176 int i; | |
1177 X509_ATTRIBUTE *xa; | |
1178 ASN1_OBJECT *o; | |
1179 | |
1180 o=OBJ_nid2obj(nid); | |
1181 if (!o || !sk) return(NULL); | |
1182 for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++) | |
1183 { | |
1184 xa=sk_X509_ATTRIBUTE_value(sk,i); | |
1185 if (OBJ_cmp(xa->object,o) == 0) | |
1186 { | |
1187 if (!xa->single && sk_ASN1_TYPE_num(xa->value.set)) | |
1188 return(sk_ASN1_TYPE_value(xa->value.set,0)); | |
1189 else | |
1190 return(NULL); | |
1191 } | |
1192 } | |
1193 return(NULL); | |
1194 } | |
1195 | |
1196 ASN1_OCTET_STRING *PKCS7_digest_from_attributes(STACK_OF(X509_ATTRIBUTE) *sk) | |
1197 { | |
1198 ASN1_TYPE *astype; | |
1199 if(!(astype = get_attribute(sk, NID_pkcs9_messageDigest))) return NULL; | |
1200 return astype->value.octet_string; | |
1201 } | |
1202 | |
1203 int PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si, | |
1204 STACK_OF(X509_ATTRIBUTE) *sk) | |
1205 { | |
1206 int i; | |
1207 | |
1208 if (p7si->auth_attr != NULL) | |
1209 sk_X509_ATTRIBUTE_pop_free(p7si->auth_attr,X509_ATTRIBUTE_free); | |
1210 p7si->auth_attr=sk_X509_ATTRIBUTE_dup(sk); | |
1211 if (p7si->auth_attr == NULL) | |
1212 return 0; | |
1213 for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++) | |
1214 { | |
1215 if ((sk_X509_ATTRIBUTE_set(p7si->auth_attr,i, | |
1216 X509_ATTRIBUTE_dup(sk_X509_ATTRIBUTE_value(sk,i)))) | |
1217 == NULL) | |
1218 return(0); | |
1219 } | |
1220 return(1); | |
1221 } | |
1222 | |
1223 int PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk) | |
1224 { | |
1225 int i; | |
1226 | |
1227 if (p7si->unauth_attr != NULL) | |
1228 sk_X509_ATTRIBUTE_pop_free(p7si->unauth_attr, | |
1229 X509_ATTRIBUTE_free); | |
1230 p7si->unauth_attr=sk_X509_ATTRIBUTE_dup(sk); | |
1231 if (p7si->unauth_attr == NULL) | |
1232 return 0; | |
1233 for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++) | |
1234 { | |
1235 if ((sk_X509_ATTRIBUTE_set(p7si->unauth_attr,i, | |
1236 X509_ATTRIBUTE_dup(sk_X509_ATTRIBUTE_value(sk,i)))) | |
1237 == NULL) | |
1238 return(0); | |
1239 } | |
1240 return(1); | |
1241 } | |
1242 | |
1243 int PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, | |
1244 void *value) | |
1245 { | |
1246 return(add_attribute(&(p7si->auth_attr),nid,atrtype,value)); | |
1247 } | |
1248 | |
1249 int PKCS7_add_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype, | |
1250 void *value) | |
1251 { | |
1252 return(add_attribute(&(p7si->unauth_attr),nid,atrtype,value)); | |
1253 } | |
1254 | |
1255 static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype, | |
1256 void *value) | |
1257 { | |
1258 X509_ATTRIBUTE *attr=NULL; | |
1259 | |
1260 if (*sk == NULL) | |
1261 { | |
1262 *sk = sk_X509_ATTRIBUTE_new_null(); | |
1263 if (*sk == NULL) | |
1264 return 0; | |
1265 new_attrib: | |
1266 if (!(attr=X509_ATTRIBUTE_create(nid,atrtype,value))) | |
1267 return 0; | |
1268 if (!sk_X509_ATTRIBUTE_push(*sk,attr)) | |
1269 { | |
1270 X509_ATTRIBUTE_free(attr); | |
1271 return 0; | |
1272 } | |
1273 } | |
1274 else | |
1275 { | |
1276 int i; | |
1277 | |
1278 for (i=0; i<sk_X509_ATTRIBUTE_num(*sk); i++) | |
1279 { | |
1280 attr=sk_X509_ATTRIBUTE_value(*sk,i); | |
1281 if (OBJ_obj2nid(attr->object) == nid) | |
1282 { | |
1283 X509_ATTRIBUTE_free(attr); | |
1284 attr=X509_ATTRIBUTE_create(nid,atrtype,value); | |
1285 if (attr == NULL) | |
1286 return 0; | |
1287 if (!sk_X509_ATTRIBUTE_set(*sk,i,attr)) | |
1288 { | |
1289 X509_ATTRIBUTE_free(attr); | |
1290 return 0; | |
1291 } | |
1292 goto end; | |
1293 } | |
1294 } | |
1295 goto new_attrib; | |
1296 } | |
1297 end: | |
1298 return(1); | |
1299 } | |
1300 | |
OLD | NEW |