| OLD | NEW |
| (Empty) | |
| 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
| 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
| 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
| 4 |
| 5 #include "pkcs12.h" |
| 6 #include "plarena.h" |
| 7 #include "secpkcs7.h" |
| 8 #include "p12local.h" |
| 9 #include "secoid.h" |
| 10 #include "secitem.h" |
| 11 #include "secport.h" |
| 12 #include "secasn1.h" |
| 13 #include "secder.h" |
| 14 #include "secerr.h" |
| 15 #include "cert.h" |
| 16 #include "certdb.h" |
| 17 #include "p12plcy.h" |
| 18 #include "p12.h" |
| 19 #include "secpkcs5.h" |
| 20 |
| 21 /* PFX extraction and validation routines */ |
| 22 |
| 23 /* decode the DER encoded PFX item. if unable to decode, check to see if it |
| 24 * is an older PFX item. If that fails, assume the file was not a valid |
| 25 * pfx file. |
| 26 * the returned pfx structure should be destroyed using SEC_PKCS12DestroyPFX |
| 27 */ |
| 28 static SEC_PKCS12PFXItem * |
| 29 sec_pkcs12_decode_pfx(SECItem *der_pfx) |
| 30 { |
| 31 SEC_PKCS12PFXItem *pfx; |
| 32 SECStatus rv; |
| 33 |
| 34 if(der_pfx == NULL) { |
| 35 return NULL; |
| 36 } |
| 37 |
| 38 /* allocate the space for a new PFX item */ |
| 39 pfx = sec_pkcs12_new_pfx(); |
| 40 if(pfx == NULL) { |
| 41 return NULL; |
| 42 } |
| 43 |
| 44 rv = SEC_ASN1DecodeItem(pfx->poolp, pfx, SEC_PKCS12PFXItemTemplate, |
| 45 der_pfx); |
| 46 |
| 47 /* if a failure occurred, check for older version... |
| 48 * we also get rid of the old pfx structure, because we don't |
| 49 * know where it failed and what data in may contain |
| 50 */ |
| 51 if(rv != SECSuccess) { |
| 52 SEC_PKCS12DestroyPFX(pfx); |
| 53 pfx = sec_pkcs12_new_pfx(); |
| 54 if(pfx == NULL) { |
| 55 return NULL; |
| 56 } |
| 57 rv = SEC_ASN1DecodeItem(pfx->poolp, pfx, SEC_PKCS12PFXItemTemplate_OLD, |
| 58 der_pfx); |
| 59 if(rv != SECSuccess) { |
| 60 PORT_SetError(SEC_ERROR_PKCS12_DECODING_PFX); |
| 61 PORT_FreeArena(pfx->poolp, PR_TRUE); |
| 62 return NULL; |
| 63 } |
| 64 pfx->old = PR_TRUE; |
| 65 SGN_CopyDigestInfo(pfx->poolp, &pfx->macData.safeMac, &pfx->old_safeMac)
; |
| 66 SECITEM_CopyItem(pfx->poolp, &pfx->macData.macSalt, &pfx->old_macSalt); |
| 67 } else { |
| 68 pfx->old = PR_FALSE; |
| 69 } |
| 70 |
| 71 /* convert bit string from bits to bytes */ |
| 72 pfx->macData.macSalt.len /= 8; |
| 73 |
| 74 return pfx; |
| 75 } |
| 76 |
| 77 /* validate the integrity MAC used in the PFX. The MAC is generated |
| 78 * per the PKCS 12 document. If the MAC is incorrect, it is most likely |
| 79 * due to an invalid password. |
| 80 * pwitem is the integrity password |
| 81 * pfx is the decoded pfx item |
| 82 */ |
| 83 static PRBool |
| 84 sec_pkcs12_check_pfx_mac(SEC_PKCS12PFXItem *pfx, |
| 85 SECItem *pwitem) |
| 86 { |
| 87 SECItem *key = NULL, *mac = NULL, *data = NULL; |
| 88 SECItem *vpwd = NULL; |
| 89 SECOidTag algorithm; |
| 90 PRBool ret = PR_FALSE; |
| 91 |
| 92 if(pfx == NULL) { |
| 93 return PR_FALSE; |
| 94 } |
| 95 |
| 96 algorithm = SECOID_GetAlgorithmTag(&pfx->macData.safeMac.digestAlgorithm); |
| 97 switch(algorithm) { |
| 98 /* only SHA1 hashing supported as a MACing algorithm */ |
| 99 case SEC_OID_SHA1: |
| 100 if(pfx->old == PR_FALSE) { |
| 101 pfx->swapUnicode = PR_FALSE; |
| 102 } |
| 103 |
| 104 recheckUnicodePassword: |
| 105 vpwd = sec_pkcs12_create_virtual_password(pwitem, |
| 106 &pfx->macData.macSalt, |
| 107 pfx->swapUnicode); |
| 108 if(vpwd == NULL) { |
| 109 return PR_FALSE; |
| 110 } |
| 111 |
| 112 key = sec_pkcs12_generate_key_from_password(algorithm, |
| 113 &pfx->macData.macSalt, |
| 114 (pfx->old ? pwitem : vpwd)); |
| 115 /* free vpwd only for newer PFX */ |
| 116 if(vpwd) { |
| 117 SECITEM_ZfreeItem(vpwd, PR_TRUE); |
| 118 } |
| 119 if(key == NULL) { |
| 120 return PR_FALSE; |
| 121 } |
| 122 |
| 123 data = SEC_PKCS7GetContent(&pfx->authSafe); |
| 124 if(data == NULL) { |
| 125 break; |
| 126 } |
| 127 |
| 128 /* check MAC */ |
| 129 mac = sec_pkcs12_generate_mac(key, data, pfx->old); |
| 130 ret = PR_TRUE; |
| 131 if(mac) { |
| 132 SECItem *safeMac = &pfx->macData.safeMac.digest; |
| 133 if(SECITEM_CompareItem(mac, safeMac) != SECEqual) { |
| 134 |
| 135 /* if we encounter an invalid mac, lets invert the |
| 136 * password in case of unicode changes |
| 137 */ |
| 138 if(((!pfx->old) && pfx->swapUnicode) || (pfx->old)){ |
| 139 PORT_SetError(SEC_ERROR_PKCS12_INVALID_MAC); |
| 140 ret = PR_FALSE; |
| 141 } else { |
| 142 SECITEM_ZfreeItem(mac, PR_TRUE); |
| 143 pfx->swapUnicode = PR_TRUE; |
| 144 goto recheckUnicodePassword; |
| 145 } |
| 146 } |
| 147 SECITEM_ZfreeItem(mac, PR_TRUE); |
| 148 } else { |
| 149 ret = PR_FALSE; |
| 150 } |
| 151 break; |
| 152 default: |
| 153 PORT_SetError(SEC_ERROR_PKCS12_UNSUPPORTED_MAC_ALGORITHM); |
| 154 ret = PR_FALSE; |
| 155 break; |
| 156 } |
| 157 |
| 158 /* let success fall through */ |
| 159 if(key != NULL) |
| 160 SECITEM_ZfreeItem(key, PR_TRUE); |
| 161 |
| 162 return ret; |
| 163 } |
| 164 |
| 165 /* check the validity of the pfx structure. we currently only support |
| 166 * password integrity mode, so we check the MAC. |
| 167 */ |
| 168 static PRBool |
| 169 sec_pkcs12_validate_pfx(SEC_PKCS12PFXItem *pfx, |
| 170 SECItem *pwitem) |
| 171 { |
| 172 SECOidTag contentType; |
| 173 |
| 174 contentType = SEC_PKCS7ContentType(&pfx->authSafe); |
| 175 switch(contentType) |
| 176 { |
| 177 case SEC_OID_PKCS7_DATA: |
| 178 return sec_pkcs12_check_pfx_mac(pfx, pwitem); |
| 179 break; |
| 180 case SEC_OID_PKCS7_SIGNED_DATA: |
| 181 default: |
| 182 PORT_SetError(SEC_ERROR_PKCS12_UNSUPPORTED_TRANSPORT_MODE); |
| 183 break; |
| 184 } |
| 185 |
| 186 return PR_FALSE; |
| 187 } |
| 188 |
| 189 /* decode and return the valid PFX. if the PFX item is not valid, |
| 190 * NULL is returned. |
| 191 */ |
| 192 static SEC_PKCS12PFXItem * |
| 193 sec_pkcs12_get_pfx(SECItem *pfx_data, |
| 194 SECItem *pwitem) |
| 195 { |
| 196 SEC_PKCS12PFXItem *pfx; |
| 197 PRBool valid_pfx; |
| 198 |
| 199 if((pfx_data == NULL) || (pwitem == NULL)) { |
| 200 return NULL; |
| 201 } |
| 202 |
| 203 pfx = sec_pkcs12_decode_pfx(pfx_data); |
| 204 if(pfx == NULL) { |
| 205 return NULL; |
| 206 } |
| 207 |
| 208 valid_pfx = sec_pkcs12_validate_pfx(pfx, pwitem); |
| 209 if(valid_pfx != PR_TRUE) { |
| 210 SEC_PKCS12DestroyPFX(pfx); |
| 211 pfx = NULL; |
| 212 } |
| 213 |
| 214 return pfx; |
| 215 } |
| 216 |
| 217 /* authenticated safe decoding, validation, and access routines |
| 218 */ |
| 219 |
| 220 /* convert dogbert beta 3 authenticated safe structure to a post |
| 221 * beta three structure, so that we don't have to change more routines. |
| 222 */ |
| 223 static SECStatus |
| 224 sec_pkcs12_convert_old_auth_safe(SEC_PKCS12AuthenticatedSafe *asafe) |
| 225 { |
| 226 SEC_PKCS12Baggage *baggage; |
| 227 SEC_PKCS12BaggageItem *bag; |
| 228 SECStatus rv = SECSuccess; |
| 229 |
| 230 if(asafe->old_baggage.espvks == NULL) { |
| 231 /* XXX should the ASN1 engine produce a single NULL element list |
| 232 * rather than setting the pointer to NULL? |
| 233 * There is no need to return an error -- assume that the list |
| 234 * was empty. |
| 235 */ |
| 236 return SECSuccess; |
| 237 } |
| 238 |
| 239 baggage = sec_pkcs12_create_baggage(asafe->poolp); |
| 240 if(!baggage) { |
| 241 return SECFailure; |
| 242 } |
| 243 bag = sec_pkcs12_create_external_bag(baggage); |
| 244 if(!bag) { |
| 245 return SECFailure; |
| 246 } |
| 247 |
| 248 PORT_Memcpy(&asafe->baggage, baggage, sizeof(SEC_PKCS12Baggage)); |
| 249 |
| 250 /* if there are shrouded keys, append them to the bag */ |
| 251 rv = SECSuccess; |
| 252 if(asafe->old_baggage.espvks[0] != NULL) { |
| 253 int nEspvk = 0; |
| 254 rv = SECSuccess; |
| 255 while((asafe->old_baggage.espvks[nEspvk] != NULL) && |
| 256 (rv == SECSuccess)) { |
| 257 rv = sec_pkcs12_append_shrouded_key(bag, |
| 258 asafe->old_baggage.espvks[nEspvk]); |
| 259 nEspvk++; |
| 260 } |
| 261 } |
| 262 |
| 263 return rv; |
| 264 } |
| 265 |
| 266 /* decodes the authenticated safe item. a return of NULL indicates |
| 267 * an error. however, the error will have occurred either in memory |
| 268 * allocation or in decoding the authenticated safe. |
| 269 * |
| 270 * if an old PFX item has been found, we want to convert the |
| 271 * old authenticated safe to the new one. |
| 272 */ |
| 273 static SEC_PKCS12AuthenticatedSafe * |
| 274 sec_pkcs12_decode_authenticated_safe(SEC_PKCS12PFXItem *pfx) |
| 275 { |
| 276 SECItem *der_asafe = NULL; |
| 277 SEC_PKCS12AuthenticatedSafe *asafe = NULL; |
| 278 SECStatus rv; |
| 279 |
| 280 if(pfx == NULL) { |
| 281 return NULL; |
| 282 } |
| 283 |
| 284 der_asafe = SEC_PKCS7GetContent(&pfx->authSafe); |
| 285 if(der_asafe == NULL) { |
| 286 /* XXX set error ? */ |
| 287 goto loser; |
| 288 } |
| 289 |
| 290 asafe = sec_pkcs12_new_asafe(pfx->poolp); |
| 291 if(asafe == NULL) { |
| 292 goto loser; |
| 293 } |
| 294 |
| 295 if(pfx->old == PR_FALSE) { |
| 296 rv = SEC_ASN1DecodeItem(pfx->poolp, asafe, |
| 297 SEC_PKCS12AuthenticatedSafeTemplate, |
| 298 der_asafe); |
| 299 asafe->old = PR_FALSE; |
| 300 asafe->swapUnicode = pfx->swapUnicode; |
| 301 } else { |
| 302 /* handle beta exported files */ |
| 303 rv = SEC_ASN1DecodeItem(pfx->poolp, asafe, |
| 304 SEC_PKCS12AuthenticatedSafeTemplate_OLD, |
| 305 der_asafe); |
| 306 asafe->safe = &(asafe->old_safe); |
| 307 rv = sec_pkcs12_convert_old_auth_safe(asafe); |
| 308 asafe->old = PR_TRUE; |
| 309 } |
| 310 |
| 311 if(rv != SECSuccess) { |
| 312 goto loser; |
| 313 } |
| 314 |
| 315 asafe->poolp = pfx->poolp; |
| 316 |
| 317 return asafe; |
| 318 |
| 319 loser: |
| 320 return NULL; |
| 321 } |
| 322 |
| 323 /* validates the safe within the authenticated safe item. |
| 324 * in order to be valid: |
| 325 * 1. the privacy salt must be present |
| 326 * 2. the encryption algorithm must be supported (including |
| 327 * export policy) |
| 328 * PR_FALSE indicates an error, PR_TRUE indicates a valid safe |
| 329 */ |
| 330 static PRBool |
| 331 sec_pkcs12_validate_encrypted_safe(SEC_PKCS12AuthenticatedSafe *asafe) |
| 332 { |
| 333 PRBool valid = PR_FALSE; |
| 334 SECAlgorithmID *algid; |
| 335 |
| 336 if(asafe == NULL) { |
| 337 return PR_FALSE; |
| 338 } |
| 339 |
| 340 /* if mode is password privacy, then privacySalt is assumed |
| 341 * to be non-zero. |
| 342 */ |
| 343 if(asafe->privacySalt.len != 0) { |
| 344 valid = PR_TRUE; |
| 345 asafe->privacySalt.len /= 8; |
| 346 } else { |
| 347 PORT_SetError(SEC_ERROR_PKCS12_CORRUPT_PFX_STRUCTURE); |
| 348 return PR_FALSE; |
| 349 } |
| 350 |
| 351 /* until spec changes, content will have between 2 and 8 bytes depending |
| 352 * upon the algorithm used if certs are unencrypted... |
| 353 * also want to support case where content is empty -- which we produce |
| 354 */ |
| 355 if(SEC_PKCS7IsContentEmpty(asafe->safe, 8) == PR_TRUE) { |
| 356 asafe->emptySafe = PR_TRUE; |
| 357 return PR_TRUE; |
| 358 } |
| 359 |
| 360 asafe->emptySafe = PR_FALSE; |
| 361 |
| 362 /* make sure that a pbe algorithm is being used */ |
| 363 algid = SEC_PKCS7GetEncryptionAlgorithm(asafe->safe); |
| 364 if(algid != NULL) { |
| 365 if(SEC_PKCS5IsAlgorithmPBEAlg(algid)) { |
| 366 valid = SEC_PKCS12DecryptionAllowed(algid); |
| 367 |
| 368 if(valid == PR_FALSE) { |
| 369 PORT_SetError(SEC_ERROR_BAD_EXPORT_ALGORITHM); |
| 370 } |
| 371 } else { |
| 372 PORT_SetError(SEC_ERROR_PKCS12_UNSUPPORTED_PBE_ALGORITHM); |
| 373 valid = PR_FALSE; |
| 374 } |
| 375 } else { |
| 376 valid = PR_FALSE; |
| 377 PORT_SetError(SEC_ERROR_PKCS12_UNSUPPORTED_PBE_ALGORITHM); |
| 378 } |
| 379 |
| 380 return valid; |
| 381 } |
| 382 |
| 383 /* validates authenticates safe: |
| 384 * 1. checks that the version is supported |
| 385 * 2. checks that only password privacy mode is used (currently) |
| 386 * 3. further, makes sure safe has appropriate policies per above function |
| 387 * PR_FALSE indicates failure. |
| 388 */ |
| 389 static PRBool |
| 390 sec_pkcs12_validate_auth_safe(SEC_PKCS12AuthenticatedSafe *asafe) |
| 391 { |
| 392 PRBool valid = PR_TRUE; |
| 393 SECOidTag safe_type; |
| 394 int version; |
| 395 |
| 396 if(asafe == NULL) { |
| 397 return PR_FALSE; |
| 398 } |
| 399 |
| 400 /* check version, since it is default it may not be present. |
| 401 * therefore, assume ok |
| 402 */ |
| 403 if((asafe->version.len > 0) && (asafe->old == PR_FALSE)) { |
| 404 version = DER_GetInteger(&asafe->version); |
| 405 if(version > SEC_PKCS12_PFX_VERSION) { |
| 406 PORT_SetError(SEC_ERROR_PKCS12_UNSUPPORTED_VERSION); |
| 407 return PR_FALSE; |
| 408 } |
| 409 } |
| 410 |
| 411 /* validate password mode is being used */ |
| 412 safe_type = SEC_PKCS7ContentType(asafe->safe); |
| 413 switch(safe_type) |
| 414 { |
| 415 case SEC_OID_PKCS7_ENCRYPTED_DATA: |
| 416 valid = sec_pkcs12_validate_encrypted_safe(asafe); |
| 417 break; |
| 418 case SEC_OID_PKCS7_ENVELOPED_DATA: |
| 419 default: |
| 420 PORT_SetError(SEC_ERROR_PKCS12_UNSUPPORTED_TRANSPORT_MODE); |
| 421 valid = PR_FALSE; |
| 422 break; |
| 423 } |
| 424 |
| 425 return valid; |
| 426 } |
| 427 |
| 428 /* retrieves the authenticated safe item from the PFX item |
| 429 * before returning the authenticated safe, the validity of the |
| 430 * authenticated safe is checked and if valid, returned. |
| 431 * a return of NULL indicates that an error occurred. |
| 432 */ |
| 433 static SEC_PKCS12AuthenticatedSafe * |
| 434 sec_pkcs12_get_auth_safe(SEC_PKCS12PFXItem *pfx) |
| 435 { |
| 436 SEC_PKCS12AuthenticatedSafe *asafe; |
| 437 PRBool valid_safe; |
| 438 |
| 439 if(pfx == NULL) { |
| 440 return NULL; |
| 441 } |
| 442 |
| 443 asafe = sec_pkcs12_decode_authenticated_safe(pfx); |
| 444 if(asafe == NULL) { |
| 445 return NULL; |
| 446 } |
| 447 |
| 448 valid_safe = sec_pkcs12_validate_auth_safe(asafe); |
| 449 if(valid_safe != PR_TRUE) { |
| 450 asafe = NULL; |
| 451 } else if(asafe) { |
| 452 asafe->baggage.poolp = asafe->poolp; |
| 453 } |
| 454 |
| 455 return asafe; |
| 456 } |
| 457 |
| 458 /* decrypts the authenticated safe. |
| 459 * a return of anything but SECSuccess indicates an error. the |
| 460 * password is not known to be valid until the call to the |
| 461 * function sec_pkcs12_get_safe_contents. If decoding the safe |
| 462 * fails, it is assumed the password was incorrect and the error |
| 463 * is set then. any failure here is assumed to be due to |
| 464 * internal problems in SEC_PKCS7DecryptContents or below. |
| 465 */ |
| 466 static SECStatus |
| 467 sec_pkcs12_decrypt_auth_safe(SEC_PKCS12AuthenticatedSafe *asafe, |
| 468 SECItem *pwitem, |
| 469 void *wincx) |
| 470 { |
| 471 SECStatus rv = SECFailure; |
| 472 SECItem *vpwd = NULL; |
| 473 |
| 474 if((asafe == NULL) || (pwitem == NULL)) { |
| 475 return SECFailure; |
| 476 } |
| 477 |
| 478 if(asafe->old == PR_FALSE) { |
| 479 vpwd = sec_pkcs12_create_virtual_password(pwitem, &asafe->privacySalt, |
| 480 asafe->swapUnicode); |
| 481 if(vpwd == NULL) { |
| 482 return SECFailure; |
| 483 } |
| 484 } |
| 485 |
| 486 rv = SEC_PKCS7DecryptContents(asafe->poolp, asafe->safe, |
| 487 (asafe->old ? pwitem : vpwd), wincx); |
| 488 |
| 489 if(asafe->old == PR_FALSE) { |
| 490 SECITEM_ZfreeItem(vpwd, PR_TRUE); |
| 491 } |
| 492 |
| 493 return rv; |
| 494 } |
| 495 |
| 496 /* extract the safe from the authenticated safe. |
| 497 * if we are unable to decode the safe, then it is likely that the |
| 498 * safe has not been decrypted or the password used to decrypt |
| 499 * the safe was invalid. we assume that the password was invalid and |
| 500 * set an error accordingly. |
| 501 * a return of NULL indicates that an error occurred. |
| 502 */ |
| 503 static SEC_PKCS12SafeContents * |
| 504 sec_pkcs12_get_safe_contents(SEC_PKCS12AuthenticatedSafe *asafe) |
| 505 { |
| 506 SECItem *src = NULL; |
| 507 SEC_PKCS12SafeContents *safe = NULL; |
| 508 SECStatus rv = SECFailure; |
| 509 |
| 510 if(asafe == NULL) { |
| 511 return NULL; |
| 512 } |
| 513 |
| 514 safe = (SEC_PKCS12SafeContents *)PORT_ArenaZAlloc(asafe->poolp, |
| 515 sizeof(SEC_PKCS12SafeContents)); |
| 516 if(safe == NULL) { |
| 517 return NULL; |
| 518 } |
| 519 safe->poolp = asafe->poolp; |
| 520 safe->old = asafe->old; |
| 521 safe->swapUnicode = asafe->swapUnicode; |
| 522 |
| 523 src = SEC_PKCS7GetContent(asafe->safe); |
| 524 if(src != NULL) { |
| 525 const SEC_ASN1Template *theTemplate; |
| 526 if(asafe->old != PR_TRUE) { |
| 527 theTemplate = SEC_PKCS12SafeContentsTemplate; |
| 528 } else { |
| 529 theTemplate = SEC_PKCS12SafeContentsTemplate_OLD; |
| 530 } |
| 531 |
| 532 rv = SEC_ASN1DecodeItem(asafe->poolp, safe, theTemplate, src); |
| 533 |
| 534 /* if we could not decode the item, password was probably invalid */ |
| 535 if(rv != SECSuccess) { |
| 536 safe = NULL; |
| 537 PORT_SetError(SEC_ERROR_PKCS12_PRIVACY_PASSWORD_INCORRECT); |
| 538 } |
| 539 } else { |
| 540 PORT_SetError(SEC_ERROR_PKCS12_CORRUPT_PFX_STRUCTURE); |
| 541 rv = SECFailure; |
| 542 } |
| 543 |
| 544 return safe; |
| 545 } |
| 546 |
| 547 /* import PFX item |
| 548 * der_pfx is the der encoded pfx structure |
| 549 * pbef and pbearg are the integrity/encryption password call back |
| 550 * ncCall is the nickname collision calllback |
| 551 * slot is the destination token |
| 552 * wincx window handler |
| 553 * |
| 554 * on error, error code set and SECFailure returned |
| 555 */ |
| 556 SECStatus |
| 557 SEC_PKCS12PutPFX(SECItem *der_pfx, SECItem *pwitem, |
| 558 SEC_PKCS12NicknameCollisionCallback ncCall, |
| 559 PK11SlotInfo *slot, |
| 560 void *wincx) |
| 561 { |
| 562 SEC_PKCS12PFXItem *pfx; |
| 563 SEC_PKCS12AuthenticatedSafe *asafe; |
| 564 SEC_PKCS12SafeContents *safe_contents = NULL; |
| 565 SECStatus rv; |
| 566 |
| 567 if(!der_pfx || !pwitem || !slot) { |
| 568 return SECFailure; |
| 569 } |
| 570 |
| 571 /* decode and validate each section */ |
| 572 rv = SECFailure; |
| 573 |
| 574 pfx = sec_pkcs12_get_pfx(der_pfx, pwitem); |
| 575 if(pfx != NULL) { |
| 576 asafe = sec_pkcs12_get_auth_safe(pfx); |
| 577 if(asafe != NULL) { |
| 578 |
| 579 /* decrypt safe -- only if not empty */ |
| 580 if(asafe->emptySafe != PR_TRUE) { |
| 581 rv = sec_pkcs12_decrypt_auth_safe(asafe, pwitem, wincx); |
| 582 if(rv == SECSuccess) { |
| 583 safe_contents = sec_pkcs12_get_safe_contents(asafe); |
| 584 if(safe_contents == NULL) { |
| 585 rv = SECFailure; |
| 586 } |
| 587 } |
| 588 } else { |
| 589 safe_contents = sec_pkcs12_create_safe_contents(asafe->poolp); |
| 590 if(safe_contents == NULL) { |
| 591 rv = SECFailure; |
| 592 } else { |
| 593 safe_contents->swapUnicode = pfx->swapUnicode; |
| 594 rv = SECSuccess; |
| 595 } |
| 596 } |
| 597 |
| 598 /* get safe contents and begin import */ |
| 599 if(rv == SECSuccess) { |
| 600 SEC_PKCS12DecoderContext *p12dcx; |
| 601 |
| 602 p12dcx = sec_PKCS12ConvertOldSafeToNew(pfx->poolp, slot, |
| 603 pfx->swapUnicode, |
| 604 pwitem, wincx, safe_contents, |
| 605 &asafe->baggage); |
| 606 if(!p12dcx) { |
| 607 rv = SECFailure; |
| 608 goto loser; |
| 609 } |
| 610 |
| 611 if(SEC_PKCS12DecoderValidateBags(p12dcx, ncCall) |
| 612 != SECSuccess) { |
| 613 rv = SECFailure; |
| 614 goto loser; |
| 615 } |
| 616 |
| 617 rv = SEC_PKCS12DecoderImportBags(p12dcx); |
| 618 } |
| 619 |
| 620 } |
| 621 } |
| 622 |
| 623 loser: |
| 624 |
| 625 if(pfx) { |
| 626 SEC_PKCS12DestroyPFX(pfx); |
| 627 } |
| 628 |
| 629 return rv; |
| 630 } |
| 631 |
| 632 PRBool |
| 633 SEC_PKCS12ValidData(char *buf, int bufLen, long int totalLength) |
| 634 { |
| 635 int lengthLength; |
| 636 |
| 637 PRBool valid = PR_FALSE; |
| 638 |
| 639 if(buf == NULL) { |
| 640 return PR_FALSE; |
| 641 } |
| 642 |
| 643 /* check for constructed sequence identifier tag */ |
| 644 if(*buf == (SEC_ASN1_CONSTRUCTED | SEC_ASN1_SEQUENCE)) { |
| 645 totalLength--; /* header byte taken care of */ |
| 646 buf++; |
| 647 |
| 648 lengthLength = (long int)SEC_ASN1LengthLength(totalLength - 1); |
| 649 if(totalLength > 0x7f) { |
| 650 lengthLength--; |
| 651 *buf &= 0x7f; /* remove bit 8 indicator */ |
| 652 if((*buf - (char)lengthLength) == 0) { |
| 653 valid = PR_TRUE; |
| 654 } |
| 655 } else { |
| 656 lengthLength--; |
| 657 if((*buf - (char)lengthLength) == 0) { |
| 658 valid = PR_TRUE; |
| 659 } |
| 660 } |
| 661 } |
| 662 |
| 663 return valid; |
| 664 } |
| OLD | NEW |