diff options
author | jsing <> | 2019-08-10 16:42:20 +0000 |
---|---|---|
committer | jsing <> | 2019-08-10 16:42:20 +0000 |
commit | 348e8055f6b4ea773466a117767c16e615a549ab (patch) | |
tree | fd2cdff41f524a9488d8863f2cd9058c06fe6058 /src/lib/libcrypto/cms/cms_lib.c | |
parent | d2294fe6ec6b67e094cc8b699125f5d1027c17e3 (diff) | |
download | openbsd-348e8055f6b4ea773466a117767c16e615a549ab.tar.gz openbsd-348e8055f6b4ea773466a117767c16e615a549ab.tar.bz2 openbsd-348e8055f6b4ea773466a117767c16e615a549ab.zip |
First pass at style(9).
Whitespace only and no change according to diff -w.
Diffstat (limited to 'src/lib/libcrypto/cms/cms_lib.c')
-rw-r--r-- | src/lib/libcrypto/cms/cms_lib.c | 814 |
1 files changed, 407 insertions, 407 deletions
diff --git a/src/lib/libcrypto/cms/cms_lib.c b/src/lib/libcrypto/cms/cms_lib.c index dd192f9775..baee32c398 100644 --- a/src/lib/libcrypto/cms/cms_lib.c +++ b/src/lib/libcrypto/cms/cms_lib.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: cms_lib.c,v 1.8 2019/08/10 16:03:54 jsing Exp $ */ | 1 | /* $OpenBSD: cms_lib.c,v 1.9 2019/08/10 16:42:20 jsing Exp $ */ |
2 | /* | 2 | /* |
3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
4 | * project. | 4 | * project. |
@@ -66,131 +66,131 @@ IMPLEMENT_ASN1_PRINT_FUNCTION(CMS_ContentInfo) | |||
66 | 66 | ||
67 | const ASN1_OBJECT *CMS_get0_type(const CMS_ContentInfo *cms) | 67 | const ASN1_OBJECT *CMS_get0_type(const CMS_ContentInfo *cms) |
68 | { | 68 | { |
69 | return cms->contentType; | 69 | return cms->contentType; |
70 | } | 70 | } |
71 | 71 | ||
72 | CMS_ContentInfo *cms_Data_create(void) | 72 | CMS_ContentInfo *cms_Data_create(void) |
73 | { | 73 | { |
74 | CMS_ContentInfo *cms; | 74 | CMS_ContentInfo *cms; |
75 | cms = CMS_ContentInfo_new(); | 75 | cms = CMS_ContentInfo_new(); |
76 | if (cms != NULL) { | 76 | if (cms != NULL) { |
77 | cms->contentType = OBJ_nid2obj(NID_pkcs7_data); | 77 | cms->contentType = OBJ_nid2obj(NID_pkcs7_data); |
78 | /* Never detached */ | 78 | /* Never detached */ |
79 | CMS_set_detached(cms, 0); | 79 | CMS_set_detached(cms, 0); |
80 | } | 80 | } |
81 | return cms; | 81 | return cms; |
82 | } | 82 | } |
83 | 83 | ||
84 | BIO *cms_content_bio(CMS_ContentInfo *cms) | 84 | BIO *cms_content_bio(CMS_ContentInfo *cms) |
85 | { | 85 | { |
86 | ASN1_OCTET_STRING **pos = CMS_get0_content(cms); | 86 | ASN1_OCTET_STRING **pos = CMS_get0_content(cms); |
87 | if (!pos) | 87 | if (!pos) |
88 | return NULL; | 88 | return NULL; |
89 | /* If content detached data goes nowhere: create NULL BIO */ | 89 | /* If content detached data goes nowhere: create NULL BIO */ |
90 | if (!*pos) | 90 | if (!*pos) |
91 | return BIO_new(BIO_s_null()); | 91 | return BIO_new(BIO_s_null()); |
92 | /* | 92 | /* |
93 | * If content not detached and created return memory BIO | 93 | * If content not detached and created return memory BIO |
94 | */ | 94 | */ |
95 | if (!*pos || ((*pos)->flags == ASN1_STRING_FLAG_CONT)) | 95 | if (!*pos || ((*pos)->flags == ASN1_STRING_FLAG_CONT)) |
96 | return BIO_new(BIO_s_mem()); | 96 | return BIO_new(BIO_s_mem()); |
97 | /* Else content was read in: return read only BIO for it */ | 97 | /* Else content was read in: return read only BIO for it */ |
98 | return BIO_new_mem_buf((*pos)->data, (*pos)->length); | 98 | return BIO_new_mem_buf((*pos)->data, (*pos)->length); |
99 | } | 99 | } |
100 | 100 | ||
101 | BIO *CMS_dataInit(CMS_ContentInfo *cms, BIO *icont) | 101 | BIO *CMS_dataInit(CMS_ContentInfo *cms, BIO *icont) |
102 | { | 102 | { |
103 | BIO *cmsbio, *cont; | 103 | BIO *cmsbio, *cont; |
104 | if (icont) | 104 | if (icont) |
105 | cont = icont; | 105 | cont = icont; |
106 | else | 106 | else |
107 | cont = cms_content_bio(cms); | 107 | cont = cms_content_bio(cms); |
108 | if (!cont) { | 108 | if (!cont) { |
109 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_NO_CONTENT); | 109 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_NO_CONTENT); |
110 | return NULL; | 110 | return NULL; |
111 | } | 111 | } |
112 | switch (OBJ_obj2nid(cms->contentType)) { | 112 | switch (OBJ_obj2nid(cms->contentType)) { |
113 | 113 | ||
114 | case NID_pkcs7_data: | 114 | case NID_pkcs7_data: |
115 | return cont; | 115 | return cont; |
116 | 116 | ||
117 | case NID_pkcs7_signed: | 117 | case NID_pkcs7_signed: |
118 | cmsbio = cms_SignedData_init_bio(cms); | 118 | cmsbio = cms_SignedData_init_bio(cms); |
119 | break; | 119 | break; |
120 | 120 | ||
121 | case NID_pkcs7_digest: | 121 | case NID_pkcs7_digest: |
122 | cmsbio = cms_DigestedData_init_bio(cms); | 122 | cmsbio = cms_DigestedData_init_bio(cms); |
123 | break; | 123 | break; |
124 | #ifdef ZLIB | 124 | #ifdef ZLIB |
125 | case NID_id_smime_ct_compressedData: | 125 | case NID_id_smime_ct_compressedData: |
126 | cmsbio = cms_CompressedData_init_bio(cms); | 126 | cmsbio = cms_CompressedData_init_bio(cms); |
127 | break; | 127 | break; |
128 | #endif | 128 | #endif |
129 | 129 | ||
130 | case NID_pkcs7_encrypted: | 130 | case NID_pkcs7_encrypted: |
131 | cmsbio = cms_EncryptedData_init_bio(cms); | 131 | cmsbio = cms_EncryptedData_init_bio(cms); |
132 | break; | 132 | break; |
133 | 133 | ||
134 | case NID_pkcs7_enveloped: | 134 | case NID_pkcs7_enveloped: |
135 | cmsbio = cms_EnvelopedData_init_bio(cms); | 135 | cmsbio = cms_EnvelopedData_init_bio(cms); |
136 | break; | 136 | break; |
137 | 137 | ||
138 | default: | 138 | default: |
139 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_UNSUPPORTED_TYPE); | 139 | CMSerr(CMS_F_CMS_DATAINIT, CMS_R_UNSUPPORTED_TYPE); |
140 | return NULL; | 140 | return NULL; |
141 | } | 141 | } |
142 | 142 | ||
143 | if (cmsbio) | 143 | if (cmsbio) |
144 | return BIO_push(cmsbio, cont); | 144 | return BIO_push(cmsbio, cont); |
145 | 145 | ||
146 | if (!icont) | 146 | if (!icont) |
147 | BIO_free(cont); | 147 | BIO_free(cont); |
148 | return NULL; | 148 | return NULL; |
149 | 149 | ||
150 | } | 150 | } |
151 | 151 | ||
152 | int CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) | 152 | int CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) |
153 | { | 153 | { |
154 | ASN1_OCTET_STRING **pos = CMS_get0_content(cms); | 154 | ASN1_OCTET_STRING **pos = CMS_get0_content(cms); |
155 | if (!pos) | 155 | if (!pos) |
156 | return 0; | 156 | return 0; |
157 | /* If embedded content find memory BIO and set content */ | 157 | /* If embedded content find memory BIO and set content */ |
158 | if (*pos && ((*pos)->flags & ASN1_STRING_FLAG_CONT)) { | 158 | if (*pos && ((*pos)->flags & ASN1_STRING_FLAG_CONT)) { |
159 | BIO *mbio; | 159 | BIO *mbio; |
160 | unsigned char *cont; | 160 | unsigned char *cont; |
161 | long contlen; | 161 | long contlen; |
162 | mbio = BIO_find_type(cmsbio, BIO_TYPE_MEM); | 162 | mbio = BIO_find_type(cmsbio, BIO_TYPE_MEM); |
163 | if (!mbio) { | 163 | if (!mbio) { |
164 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_CONTENT_NOT_FOUND); | 164 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_CONTENT_NOT_FOUND); |
165 | return 0; | 165 | return 0; |
166 | } | 166 | } |
167 | contlen = BIO_get_mem_data(mbio, &cont); | 167 | contlen = BIO_get_mem_data(mbio, &cont); |
168 | /* Set bio as read only so its content can't be clobbered */ | 168 | /* Set bio as read only so its content can't be clobbered */ |
169 | BIO_set_flags(mbio, BIO_FLAGS_MEM_RDONLY); | 169 | BIO_set_flags(mbio, BIO_FLAGS_MEM_RDONLY); |
170 | BIO_set_mem_eof_return(mbio, 0); | 170 | BIO_set_mem_eof_return(mbio, 0); |
171 | ASN1_STRING_set0(*pos, cont, contlen); | 171 | ASN1_STRING_set0(*pos, cont, contlen); |
172 | (*pos)->flags &= ~ASN1_STRING_FLAG_CONT; | 172 | (*pos)->flags &= ~ASN1_STRING_FLAG_CONT; |
173 | } | 173 | } |
174 | 174 | ||
175 | switch (OBJ_obj2nid(cms->contentType)) { | 175 | switch (OBJ_obj2nid(cms->contentType)) { |
176 | 176 | ||
177 | case NID_pkcs7_data: | 177 | case NID_pkcs7_data: |
178 | case NID_pkcs7_enveloped: | 178 | case NID_pkcs7_enveloped: |
179 | case NID_pkcs7_encrypted: | 179 | case NID_pkcs7_encrypted: |
180 | case NID_id_smime_ct_compressedData: | 180 | case NID_id_smime_ct_compressedData: |
181 | /* Nothing to do */ | 181 | /* Nothing to do */ |
182 | return 1; | 182 | return 1; |
183 | 183 | ||
184 | case NID_pkcs7_signed: | 184 | case NID_pkcs7_signed: |
185 | return cms_SignedData_final(cms, cmsbio); | 185 | return cms_SignedData_final(cms, cmsbio); |
186 | 186 | ||
187 | case NID_pkcs7_digest: | 187 | case NID_pkcs7_digest: |
188 | return cms_DigestedData_do_final(cms, cmsbio, 0); | 188 | return cms_DigestedData_do_final(cms, cmsbio, 0); |
189 | 189 | ||
190 | default: | 190 | default: |
191 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_UNSUPPORTED_TYPE); | 191 | CMSerr(CMS_F_CMS_DATAFINAL, CMS_R_UNSUPPORTED_TYPE); |
192 | return 0; | 192 | return 0; |
193 | } | 193 | } |
194 | } | 194 | } |
195 | 195 | ||
196 | /* | 196 | /* |
@@ -200,36 +200,36 @@ int CMS_dataFinal(CMS_ContentInfo *cms, BIO *cmsbio) | |||
200 | 200 | ||
201 | ASN1_OCTET_STRING **CMS_get0_content(CMS_ContentInfo *cms) | 201 | ASN1_OCTET_STRING **CMS_get0_content(CMS_ContentInfo *cms) |
202 | { | 202 | { |
203 | switch (OBJ_obj2nid(cms->contentType)) { | 203 | switch (OBJ_obj2nid(cms->contentType)) { |
204 | 204 | ||
205 | case NID_pkcs7_data: | 205 | case NID_pkcs7_data: |
206 | return &cms->d.data; | 206 | return &cms->d.data; |
207 | 207 | ||
208 | case NID_pkcs7_signed: | 208 | case NID_pkcs7_signed: |
209 | return &cms->d.signedData->encapContentInfo->eContent; | 209 | return &cms->d.signedData->encapContentInfo->eContent; |
210 | 210 | ||
211 | case NID_pkcs7_enveloped: | 211 | case NID_pkcs7_enveloped: |
212 | return &cms->d.envelopedData->encryptedContentInfo->encryptedContent; | 212 | return &cms->d.envelopedData->encryptedContentInfo->encryptedContent; |
213 | 213 | ||
214 | case NID_pkcs7_digest: | 214 | case NID_pkcs7_digest: |
215 | return &cms->d.digestedData->encapContentInfo->eContent; | 215 | return &cms->d.digestedData->encapContentInfo->eContent; |
216 | 216 | ||
217 | case NID_pkcs7_encrypted: | 217 | case NID_pkcs7_encrypted: |
218 | return &cms->d.encryptedData->encryptedContentInfo->encryptedContent; | 218 | return &cms->d.encryptedData->encryptedContentInfo->encryptedContent; |
219 | 219 | ||
220 | case NID_id_smime_ct_authData: | 220 | case NID_id_smime_ct_authData: |
221 | return &cms->d.authenticatedData->encapContentInfo->eContent; | 221 | return &cms->d.authenticatedData->encapContentInfo->eContent; |
222 | 222 | ||
223 | case NID_id_smime_ct_compressedData: | 223 | case NID_id_smime_ct_compressedData: |
224 | return &cms->d.compressedData->encapContentInfo->eContent; | 224 | return &cms->d.compressedData->encapContentInfo->eContent; |
225 | 225 | ||
226 | default: | 226 | default: |
227 | if (cms->d.other->type == V_ASN1_OCTET_STRING) | 227 | if (cms->d.other->type == V_ASN1_OCTET_STRING) |
228 | return &cms->d.other->value.octet_string; | 228 | return &cms->d.other->value.octet_string; |
229 | CMSerr(CMS_F_CMS_GET0_CONTENT, CMS_R_UNSUPPORTED_CONTENT_TYPE); | 229 | CMSerr(CMS_F_CMS_GET0_CONTENT, CMS_R_UNSUPPORTED_CONTENT_TYPE); |
230 | return NULL; | 230 | return NULL; |
231 | 231 | ||
232 | } | 232 | } |
233 | } | 233 | } |
234 | 234 | ||
235 | /* | 235 | /* |
@@ -239,394 +239,394 @@ ASN1_OCTET_STRING **CMS_get0_content(CMS_ContentInfo *cms) | |||
239 | 239 | ||
240 | static ASN1_OBJECT **cms_get0_econtent_type(CMS_ContentInfo *cms) | 240 | static ASN1_OBJECT **cms_get0_econtent_type(CMS_ContentInfo *cms) |
241 | { | 241 | { |
242 | switch (OBJ_obj2nid(cms->contentType)) { | 242 | switch (OBJ_obj2nid(cms->contentType)) { |
243 | 243 | ||
244 | case NID_pkcs7_signed: | 244 | case NID_pkcs7_signed: |
245 | return &cms->d.signedData->encapContentInfo->eContentType; | 245 | return &cms->d.signedData->encapContentInfo->eContentType; |
246 | 246 | ||
247 | case NID_pkcs7_enveloped: | 247 | case NID_pkcs7_enveloped: |
248 | return &cms->d.envelopedData->encryptedContentInfo->contentType; | 248 | return &cms->d.envelopedData->encryptedContentInfo->contentType; |
249 | 249 | ||
250 | case NID_pkcs7_digest: | 250 | case NID_pkcs7_digest: |
251 | return &cms->d.digestedData->encapContentInfo->eContentType; | 251 | return &cms->d.digestedData->encapContentInfo->eContentType; |
252 | 252 | ||
253 | case NID_pkcs7_encrypted: | 253 | case NID_pkcs7_encrypted: |
254 | return &cms->d.encryptedData->encryptedContentInfo->contentType; | 254 | return &cms->d.encryptedData->encryptedContentInfo->contentType; |
255 | 255 | ||
256 | case NID_id_smime_ct_authData: | 256 | case NID_id_smime_ct_authData: |
257 | return &cms->d.authenticatedData->encapContentInfo->eContentType; | 257 | return &cms->d.authenticatedData->encapContentInfo->eContentType; |
258 | 258 | ||
259 | case NID_id_smime_ct_compressedData: | 259 | case NID_id_smime_ct_compressedData: |
260 | return &cms->d.compressedData->encapContentInfo->eContentType; | 260 | return &cms->d.compressedData->encapContentInfo->eContentType; |
261 | 261 | ||
262 | default: | 262 | default: |
263 | CMSerr(CMS_F_CMS_GET0_ECONTENT_TYPE, CMS_R_UNSUPPORTED_CONTENT_TYPE); | 263 | CMSerr(CMS_F_CMS_GET0_ECONTENT_TYPE, CMS_R_UNSUPPORTED_CONTENT_TYPE); |
264 | return NULL; | 264 | return NULL; |
265 | 265 | ||
266 | } | 266 | } |
267 | } | 267 | } |
268 | 268 | ||
269 | const ASN1_OBJECT *CMS_get0_eContentType(CMS_ContentInfo *cms) | 269 | const ASN1_OBJECT *CMS_get0_eContentType(CMS_ContentInfo *cms) |
270 | { | 270 | { |
271 | ASN1_OBJECT **petype; | 271 | ASN1_OBJECT **petype; |
272 | petype = cms_get0_econtent_type(cms); | 272 | petype = cms_get0_econtent_type(cms); |
273 | if (petype) | 273 | if (petype) |
274 | return *petype; | 274 | return *petype; |
275 | return NULL; | 275 | return NULL; |
276 | } | 276 | } |
277 | 277 | ||
278 | int CMS_set1_eContentType(CMS_ContentInfo *cms, const ASN1_OBJECT *oid) | 278 | int CMS_set1_eContentType(CMS_ContentInfo *cms, const ASN1_OBJECT *oid) |
279 | { | 279 | { |
280 | ASN1_OBJECT **petype, *etype; | 280 | ASN1_OBJECT **petype, *etype; |
281 | petype = cms_get0_econtent_type(cms); | 281 | petype = cms_get0_econtent_type(cms); |
282 | if (!petype) | 282 | if (!petype) |
283 | return 0; | 283 | return 0; |
284 | if (!oid) | 284 | if (!oid) |
285 | return 1; | 285 | return 1; |
286 | etype = OBJ_dup(oid); | 286 | etype = OBJ_dup(oid); |
287 | if (!etype) | 287 | if (!etype) |
288 | return 0; | 288 | return 0; |
289 | ASN1_OBJECT_free(*petype); | 289 | ASN1_OBJECT_free(*petype); |
290 | *petype = etype; | 290 | *petype = etype; |
291 | return 1; | 291 | return 1; |
292 | } | 292 | } |
293 | 293 | ||
294 | int CMS_is_detached(CMS_ContentInfo *cms) | 294 | int CMS_is_detached(CMS_ContentInfo *cms) |
295 | { | 295 | { |
296 | ASN1_OCTET_STRING **pos; | 296 | ASN1_OCTET_STRING **pos; |
297 | pos = CMS_get0_content(cms); | 297 | pos = CMS_get0_content(cms); |
298 | if (!pos) | 298 | if (!pos) |
299 | return -1; | 299 | return -1; |
300 | if (*pos) | 300 | if (*pos) |
301 | return 0; | 301 | return 0; |
302 | return 1; | 302 | return 1; |
303 | } | 303 | } |
304 | 304 | ||
305 | int CMS_set_detached(CMS_ContentInfo *cms, int detached) | 305 | int CMS_set_detached(CMS_ContentInfo *cms, int detached) |
306 | { | 306 | { |
307 | ASN1_OCTET_STRING **pos; | 307 | ASN1_OCTET_STRING **pos; |
308 | pos = CMS_get0_content(cms); | 308 | pos = CMS_get0_content(cms); |
309 | if (!pos) | 309 | if (!pos) |
310 | return 0; | 310 | return 0; |
311 | if (detached) { | 311 | if (detached) { |
312 | ASN1_OCTET_STRING_free(*pos); | 312 | ASN1_OCTET_STRING_free(*pos); |
313 | *pos = NULL; | 313 | *pos = NULL; |
314 | return 1; | 314 | return 1; |
315 | } | 315 | } |
316 | if (*pos == NULL) | 316 | if (*pos == NULL) |
317 | *pos = ASN1_OCTET_STRING_new(); | 317 | *pos = ASN1_OCTET_STRING_new(); |
318 | if (*pos != NULL) { | 318 | if (*pos != NULL) { |
319 | /* | 319 | /* |
320 | * NB: special flag to show content is created and not read in. | 320 | * NB: special flag to show content is created and not read in. |
321 | */ | 321 | */ |
322 | (*pos)->flags |= ASN1_STRING_FLAG_CONT; | 322 | (*pos)->flags |= ASN1_STRING_FLAG_CONT; |
323 | return 1; | 323 | return 1; |
324 | } | 324 | } |
325 | CMSerr(CMS_F_CMS_SET_DETACHED, ERR_R_MALLOC_FAILURE); | 325 | CMSerr(CMS_F_CMS_SET_DETACHED, ERR_R_MALLOC_FAILURE); |
326 | return 0; | 326 | return 0; |
327 | } | 327 | } |
328 | 328 | ||
329 | /* Create a digest BIO from an X509_ALGOR structure */ | 329 | /* Create a digest BIO from an X509_ALGOR structure */ |
330 | 330 | ||
331 | BIO *cms_DigestAlgorithm_init_bio(X509_ALGOR *digestAlgorithm) | 331 | BIO *cms_DigestAlgorithm_init_bio(X509_ALGOR *digestAlgorithm) |
332 | { | 332 | { |
333 | BIO *mdbio = NULL; | 333 | BIO *mdbio = NULL; |
334 | const ASN1_OBJECT *digestoid; | 334 | const ASN1_OBJECT *digestoid; |
335 | const EVP_MD *digest; | 335 | const EVP_MD *digest; |
336 | X509_ALGOR_get0(&digestoid, NULL, NULL, digestAlgorithm); | 336 | X509_ALGOR_get0(&digestoid, NULL, NULL, digestAlgorithm); |
337 | digest = EVP_get_digestbyobj(digestoid); | 337 | digest = EVP_get_digestbyobj(digestoid); |
338 | if (!digest) { | 338 | if (!digest) { |
339 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, | 339 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, |
340 | CMS_R_UNKNOWN_DIGEST_ALGORITHM); | 340 | CMS_R_UNKNOWN_DIGEST_ALGORITHM); |
341 | goto err; | 341 | goto err; |
342 | } | 342 | } |
343 | mdbio = BIO_new(BIO_f_md()); | 343 | mdbio = BIO_new(BIO_f_md()); |
344 | if (mdbio == NULL || !BIO_set_md(mdbio, digest)) { | 344 | if (mdbio == NULL || !BIO_set_md(mdbio, digest)) { |
345 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, CMS_R_MD_BIO_INIT_ERROR); | 345 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_INIT_BIO, CMS_R_MD_BIO_INIT_ERROR); |
346 | goto err; | 346 | goto err; |
347 | } | 347 | } |
348 | return mdbio; | 348 | return mdbio; |
349 | err: | 349 | err: |
350 | BIO_free(mdbio); | 350 | BIO_free(mdbio); |
351 | return NULL; | 351 | return NULL; |
352 | } | 352 | } |
353 | 353 | ||
354 | /* Locate a message digest content from a BIO chain based on SignerInfo */ | 354 | /* Locate a message digest content from a BIO chain based on SignerInfo */ |
355 | 355 | ||
356 | int cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, | 356 | int cms_DigestAlgorithm_find_ctx(EVP_MD_CTX *mctx, BIO *chain, |
357 | X509_ALGOR *mdalg) | 357 | X509_ALGOR *mdalg) |
358 | { | 358 | { |
359 | int nid; | 359 | int nid; |
360 | const ASN1_OBJECT *mdoid; | 360 | const ASN1_OBJECT *mdoid; |
361 | X509_ALGOR_get0(&mdoid, NULL, NULL, mdalg); | 361 | X509_ALGOR_get0(&mdoid, NULL, NULL, mdalg); |
362 | nid = OBJ_obj2nid(mdoid); | 362 | nid = OBJ_obj2nid(mdoid); |
363 | /* Look for digest type to match signature */ | 363 | /* Look for digest type to match signature */ |
364 | for (;;) { | 364 | for (;;) { |
365 | EVP_MD_CTX *mtmp; | 365 | EVP_MD_CTX *mtmp; |
366 | chain = BIO_find_type(chain, BIO_TYPE_MD); | 366 | chain = BIO_find_type(chain, BIO_TYPE_MD); |
367 | if (chain == NULL) { | 367 | if (chain == NULL) { |
368 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_FIND_CTX, | 368 | CMSerr(CMS_F_CMS_DIGESTALGORITHM_FIND_CTX, |
369 | CMS_R_NO_MATCHING_DIGEST); | 369 | CMS_R_NO_MATCHING_DIGEST); |
370 | return 0; | 370 | return 0; |
371 | } | 371 | } |
372 | BIO_get_md_ctx(chain, &mtmp); | 372 | BIO_get_md_ctx(chain, &mtmp); |
373 | if (EVP_MD_CTX_type(mtmp) == nid | 373 | if (EVP_MD_CTX_type(mtmp) == nid |
374 | /* | 374 | /* |
375 | * Workaround for broken implementations that use signature | 375 | * Workaround for broken implementations that use signature |
376 | * algorithm OID instead of digest. | 376 | * algorithm OID instead of digest. |
377 | */ | 377 | */ |
378 | || EVP_MD_pkey_type(EVP_MD_CTX_md(mtmp)) == nid) | 378 | || EVP_MD_pkey_type(EVP_MD_CTX_md(mtmp)) == nid) |
379 | return EVP_MD_CTX_copy_ex(mctx, mtmp); | 379 | return EVP_MD_CTX_copy_ex(mctx, mtmp); |
380 | chain = BIO_next(chain); | 380 | chain = BIO_next(chain); |
381 | } | 381 | } |
382 | } | 382 | } |
383 | 383 | ||
384 | static STACK_OF(CMS_CertificateChoices) | 384 | static STACK_OF(CMS_CertificateChoices) |
385 | **cms_get0_certificate_choices(CMS_ContentInfo *cms) | 385 | **cms_get0_certificate_choices(CMS_ContentInfo *cms) |
386 | { | 386 | { |
387 | switch (OBJ_obj2nid(cms->contentType)) { | 387 | switch (OBJ_obj2nid(cms->contentType)) { |
388 | 388 | ||
389 | case NID_pkcs7_signed: | 389 | case NID_pkcs7_signed: |
390 | return &cms->d.signedData->certificates; | 390 | return &cms->d.signedData->certificates; |
391 | 391 | ||
392 | case NID_pkcs7_enveloped: | 392 | case NID_pkcs7_enveloped: |
393 | if (cms->d.envelopedData->originatorInfo == NULL) | 393 | if (cms->d.envelopedData->originatorInfo == NULL) |
394 | return NULL; | 394 | return NULL; |
395 | return &cms->d.envelopedData->originatorInfo->certificates; | 395 | return &cms->d.envelopedData->originatorInfo->certificates; |
396 | 396 | ||
397 | default: | 397 | default: |
398 | CMSerr(CMS_F_CMS_GET0_CERTIFICATE_CHOICES, | 398 | CMSerr(CMS_F_CMS_GET0_CERTIFICATE_CHOICES, |
399 | CMS_R_UNSUPPORTED_CONTENT_TYPE); | 399 | CMS_R_UNSUPPORTED_CONTENT_TYPE); |
400 | return NULL; | 400 | return NULL; |
401 | 401 | ||
402 | } | 402 | } |
403 | } | 403 | } |
404 | 404 | ||
405 | CMS_CertificateChoices *CMS_add0_CertificateChoices(CMS_ContentInfo *cms) | 405 | CMS_CertificateChoices *CMS_add0_CertificateChoices(CMS_ContentInfo *cms) |
406 | { | 406 | { |
407 | STACK_OF(CMS_CertificateChoices) **pcerts; | 407 | STACK_OF(CMS_CertificateChoices) **pcerts; |
408 | CMS_CertificateChoices *cch; | 408 | CMS_CertificateChoices *cch; |
409 | pcerts = cms_get0_certificate_choices(cms); | 409 | pcerts = cms_get0_certificate_choices(cms); |
410 | if (!pcerts) | 410 | if (!pcerts) |
411 | return NULL; | 411 | return NULL; |
412 | if (!*pcerts) | 412 | if (!*pcerts) |
413 | *pcerts = sk_CMS_CertificateChoices_new_null(); | 413 | *pcerts = sk_CMS_CertificateChoices_new_null(); |
414 | if (!*pcerts) | 414 | if (!*pcerts) |
415 | return NULL; | 415 | return NULL; |
416 | cch = M_ASN1_new_of(CMS_CertificateChoices); | 416 | cch = M_ASN1_new_of(CMS_CertificateChoices); |
417 | if (!cch) | 417 | if (!cch) |
418 | return NULL; | 418 | return NULL; |
419 | if (!sk_CMS_CertificateChoices_push(*pcerts, cch)) { | 419 | if (!sk_CMS_CertificateChoices_push(*pcerts, cch)) { |
420 | M_ASN1_free_of(cch, CMS_CertificateChoices); | 420 | M_ASN1_free_of(cch, CMS_CertificateChoices); |
421 | return NULL; | 421 | return NULL; |
422 | } | 422 | } |
423 | return cch; | 423 | return cch; |
424 | } | 424 | } |
425 | 425 | ||
426 | int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) | 426 | int CMS_add0_cert(CMS_ContentInfo *cms, X509 *cert) |
427 | { | 427 | { |
428 | CMS_CertificateChoices *cch; | 428 | CMS_CertificateChoices *cch; |
429 | STACK_OF(CMS_CertificateChoices) **pcerts; | 429 | STACK_OF(CMS_CertificateChoices) **pcerts; |
430 | int i; | 430 | int i; |
431 | pcerts = cms_get0_certificate_choices(cms); | 431 | pcerts = cms_get0_certificate_choices(cms); |
432 | if (!pcerts) | 432 | if (!pcerts) |
433 | return 0; | 433 | return 0; |
434 | for (i = 0; i < sk_CMS_CertificateChoices_num(*pcerts); i++) { | 434 | for (i = 0; i < sk_CMS_CertificateChoices_num(*pcerts); i++) { |
435 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); | 435 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); |
436 | if (cch->type == CMS_CERTCHOICE_CERT) { | 436 | if (cch->type == CMS_CERTCHOICE_CERT) { |
437 | if (!X509_cmp(cch->d.certificate, cert)) { | 437 | if (!X509_cmp(cch->d.certificate, cert)) { |
438 | CMSerr(CMS_F_CMS_ADD0_CERT, | 438 | CMSerr(CMS_F_CMS_ADD0_CERT, |
439 | CMS_R_CERTIFICATE_ALREADY_PRESENT); | 439 | CMS_R_CERTIFICATE_ALREADY_PRESENT); |
440 | return 0; | 440 | return 0; |
441 | } | 441 | } |
442 | } | 442 | } |
443 | } | 443 | } |
444 | cch = CMS_add0_CertificateChoices(cms); | 444 | cch = CMS_add0_CertificateChoices(cms); |
445 | if (!cch) | 445 | if (!cch) |
446 | return 0; | 446 | return 0; |
447 | cch->type = CMS_CERTCHOICE_CERT; | 447 | cch->type = CMS_CERTCHOICE_CERT; |
448 | cch->d.certificate = cert; | 448 | cch->d.certificate = cert; |
449 | return 1; | 449 | return 1; |
450 | } | 450 | } |
451 | 451 | ||
452 | int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) | 452 | int CMS_add1_cert(CMS_ContentInfo *cms, X509 *cert) |
453 | { | 453 | { |
454 | int r; | 454 | int r; |
455 | r = CMS_add0_cert(cms, cert); | 455 | r = CMS_add0_cert(cms, cert); |
456 | if (r > 0) | 456 | if (r > 0) |
457 | X509_up_ref(cert); | 457 | X509_up_ref(cert); |
458 | return r; | 458 | return r; |
459 | } | 459 | } |
460 | 460 | ||
461 | static STACK_OF(CMS_RevocationInfoChoice) | 461 | static STACK_OF(CMS_RevocationInfoChoice) |
462 | **cms_get0_revocation_choices(CMS_ContentInfo *cms) | 462 | **cms_get0_revocation_choices(CMS_ContentInfo *cms) |
463 | { | 463 | { |
464 | switch (OBJ_obj2nid(cms->contentType)) { | 464 | switch (OBJ_obj2nid(cms->contentType)) { |
465 | 465 | ||
466 | case NID_pkcs7_signed: | 466 | case NID_pkcs7_signed: |
467 | return &cms->d.signedData->crls; | 467 | return &cms->d.signedData->crls; |
468 | 468 | ||
469 | case NID_pkcs7_enveloped: | 469 | case NID_pkcs7_enveloped: |
470 | if (cms->d.envelopedData->originatorInfo == NULL) | 470 | if (cms->d.envelopedData->originatorInfo == NULL) |
471 | return NULL; | 471 | return NULL; |
472 | return &cms->d.envelopedData->originatorInfo->crls; | 472 | return &cms->d.envelopedData->originatorInfo->crls; |
473 | 473 | ||
474 | default: | 474 | default: |
475 | CMSerr(CMS_F_CMS_GET0_REVOCATION_CHOICES, | 475 | CMSerr(CMS_F_CMS_GET0_REVOCATION_CHOICES, |
476 | CMS_R_UNSUPPORTED_CONTENT_TYPE); | 476 | CMS_R_UNSUPPORTED_CONTENT_TYPE); |
477 | return NULL; | 477 | return NULL; |
478 | 478 | ||
479 | } | 479 | } |
480 | } | 480 | } |
481 | 481 | ||
482 | CMS_RevocationInfoChoice *CMS_add0_RevocationInfoChoice(CMS_ContentInfo *cms) | 482 | CMS_RevocationInfoChoice *CMS_add0_RevocationInfoChoice(CMS_ContentInfo *cms) |
483 | { | 483 | { |
484 | STACK_OF(CMS_RevocationInfoChoice) **pcrls; | 484 | STACK_OF(CMS_RevocationInfoChoice) **pcrls; |
485 | CMS_RevocationInfoChoice *rch; | 485 | CMS_RevocationInfoChoice *rch; |
486 | pcrls = cms_get0_revocation_choices(cms); | 486 | pcrls = cms_get0_revocation_choices(cms); |
487 | if (!pcrls) | 487 | if (!pcrls) |
488 | return NULL; | 488 | return NULL; |
489 | if (!*pcrls) | 489 | if (!*pcrls) |
490 | *pcrls = sk_CMS_RevocationInfoChoice_new_null(); | 490 | *pcrls = sk_CMS_RevocationInfoChoice_new_null(); |
491 | if (!*pcrls) | 491 | if (!*pcrls) |
492 | return NULL; | 492 | return NULL; |
493 | rch = M_ASN1_new_of(CMS_RevocationInfoChoice); | 493 | rch = M_ASN1_new_of(CMS_RevocationInfoChoice); |
494 | if (!rch) | 494 | if (!rch) |
495 | return NULL; | 495 | return NULL; |
496 | if (!sk_CMS_RevocationInfoChoice_push(*pcrls, rch)) { | 496 | if (!sk_CMS_RevocationInfoChoice_push(*pcrls, rch)) { |
497 | M_ASN1_free_of(rch, CMS_RevocationInfoChoice); | 497 | M_ASN1_free_of(rch, CMS_RevocationInfoChoice); |
498 | return NULL; | 498 | return NULL; |
499 | } | 499 | } |
500 | return rch; | 500 | return rch; |
501 | } | 501 | } |
502 | 502 | ||
503 | int CMS_add0_crl(CMS_ContentInfo *cms, X509_CRL *crl) | 503 | int CMS_add0_crl(CMS_ContentInfo *cms, X509_CRL *crl) |
504 | { | 504 | { |
505 | CMS_RevocationInfoChoice *rch; | 505 | CMS_RevocationInfoChoice *rch; |
506 | rch = CMS_add0_RevocationInfoChoice(cms); | 506 | rch = CMS_add0_RevocationInfoChoice(cms); |
507 | if (!rch) | 507 | if (!rch) |
508 | return 0; | 508 | return 0; |
509 | rch->type = CMS_REVCHOICE_CRL; | 509 | rch->type = CMS_REVCHOICE_CRL; |
510 | rch->d.crl = crl; | 510 | rch->d.crl = crl; |
511 | return 1; | 511 | return 1; |
512 | } | 512 | } |
513 | 513 | ||
514 | int CMS_add1_crl(CMS_ContentInfo *cms, X509_CRL *crl) | 514 | int CMS_add1_crl(CMS_ContentInfo *cms, X509_CRL *crl) |
515 | { | 515 | { |
516 | int r; | 516 | int r; |
517 | r = CMS_add0_crl(cms, crl); | 517 | r = CMS_add0_crl(cms, crl); |
518 | if (r > 0) | 518 | if (r > 0) |
519 | X509_CRL_up_ref(crl); | 519 | X509_CRL_up_ref(crl); |
520 | return r; | 520 | return r; |
521 | } | 521 | } |
522 | 522 | ||
523 | STACK_OF(X509) *CMS_get1_certs(CMS_ContentInfo *cms) | 523 | STACK_OF(X509) *CMS_get1_certs(CMS_ContentInfo *cms) |
524 | { | 524 | { |
525 | STACK_OF(X509) *certs = NULL; | 525 | STACK_OF(X509) *certs = NULL; |
526 | CMS_CertificateChoices *cch; | 526 | CMS_CertificateChoices *cch; |
527 | STACK_OF(CMS_CertificateChoices) **pcerts; | 527 | STACK_OF(CMS_CertificateChoices) **pcerts; |
528 | int i; | 528 | int i; |
529 | pcerts = cms_get0_certificate_choices(cms); | 529 | pcerts = cms_get0_certificate_choices(cms); |
530 | if (!pcerts) | 530 | if (!pcerts) |
531 | return NULL; | 531 | return NULL; |
532 | for (i = 0; i < sk_CMS_CertificateChoices_num(*pcerts); i++) { | 532 | for (i = 0; i < sk_CMS_CertificateChoices_num(*pcerts); i++) { |
533 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); | 533 | cch = sk_CMS_CertificateChoices_value(*pcerts, i); |
534 | if (cch->type == 0) { | 534 | if (cch->type == 0) { |
535 | if (!certs) { | 535 | if (!certs) { |
536 | certs = sk_X509_new_null(); | 536 | certs = sk_X509_new_null(); |
537 | if (!certs) | 537 | if (!certs) |
538 | return NULL; | 538 | return NULL; |
539 | } | 539 | } |
540 | if (!sk_X509_push(certs, cch->d.certificate)) { | 540 | if (!sk_X509_push(certs, cch->d.certificate)) { |
541 | sk_X509_pop_free(certs, X509_free); | 541 | sk_X509_pop_free(certs, X509_free); |
542 | return NULL; | 542 | return NULL; |
543 | } | 543 | } |
544 | X509_up_ref(cch->d.certificate); | 544 | X509_up_ref(cch->d.certificate); |
545 | } | 545 | } |
546 | } | 546 | } |
547 | return certs; | 547 | return certs; |
548 | 548 | ||
549 | } | 549 | } |
550 | 550 | ||
551 | STACK_OF(X509_CRL) *CMS_get1_crls(CMS_ContentInfo *cms) | 551 | STACK_OF(X509_CRL) *CMS_get1_crls(CMS_ContentInfo *cms) |
552 | { | 552 | { |
553 | STACK_OF(X509_CRL) *crls = NULL; | 553 | STACK_OF(X509_CRL) *crls = NULL; |
554 | STACK_OF(CMS_RevocationInfoChoice) **pcrls; | 554 | STACK_OF(CMS_RevocationInfoChoice) **pcrls; |
555 | CMS_RevocationInfoChoice *rch; | 555 | CMS_RevocationInfoChoice *rch; |
556 | int i; | 556 | int i; |
557 | pcrls = cms_get0_revocation_choices(cms); | 557 | pcrls = cms_get0_revocation_choices(cms); |
558 | if (!pcrls) | 558 | if (!pcrls) |
559 | return NULL; | 559 | return NULL; |
560 | for (i = 0; i < sk_CMS_RevocationInfoChoice_num(*pcrls); i++) { | 560 | for (i = 0; i < sk_CMS_RevocationInfoChoice_num(*pcrls); i++) { |
561 | rch = sk_CMS_RevocationInfoChoice_value(*pcrls, i); | 561 | rch = sk_CMS_RevocationInfoChoice_value(*pcrls, i); |
562 | if (rch->type == 0) { | 562 | if (rch->type == 0) { |
563 | if (!crls) { | 563 | if (!crls) { |
564 | crls = sk_X509_CRL_new_null(); | 564 | crls = sk_X509_CRL_new_null(); |
565 | if (!crls) | 565 | if (!crls) |
566 | return NULL; | 566 | return NULL; |
567 | } | 567 | } |
568 | if (!sk_X509_CRL_push(crls, rch->d.crl)) { | 568 | if (!sk_X509_CRL_push(crls, rch->d.crl)) { |
569 | sk_X509_CRL_pop_free(crls, X509_CRL_free); | 569 | sk_X509_CRL_pop_free(crls, X509_CRL_free); |
570 | return NULL; | 570 | return NULL; |
571 | } | 571 | } |
572 | X509_CRL_up_ref(rch->d.crl); | 572 | X509_CRL_up_ref(rch->d.crl); |
573 | } | 573 | } |
574 | } | 574 | } |
575 | return crls; | 575 | return crls; |
576 | } | 576 | } |
577 | 577 | ||
578 | int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) | 578 | int cms_ias_cert_cmp(CMS_IssuerAndSerialNumber *ias, X509 *cert) |
579 | { | 579 | { |
580 | int ret; | 580 | int ret; |
581 | ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); | 581 | ret = X509_NAME_cmp(ias->issuer, X509_get_issuer_name(cert)); |
582 | if (ret) | 582 | if (ret) |
583 | return ret; | 583 | return ret; |
584 | return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert)); | 584 | return ASN1_INTEGER_cmp(ias->serialNumber, X509_get_serialNumber(cert)); |
585 | } | 585 | } |
586 | 586 | ||
587 | int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) | 587 | int cms_keyid_cert_cmp(ASN1_OCTET_STRING *keyid, X509 *cert) |
588 | { | 588 | { |
589 | const ASN1_OCTET_STRING *cert_keyid = X509_get0_subject_key_id(cert); | 589 | const ASN1_OCTET_STRING *cert_keyid = X509_get0_subject_key_id(cert); |
590 | 590 | ||
591 | if (cert_keyid == NULL) | 591 | if (cert_keyid == NULL) |
592 | return -1; | 592 | return -1; |
593 | return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); | 593 | return ASN1_OCTET_STRING_cmp(keyid, cert_keyid); |
594 | } | 594 | } |
595 | 595 | ||
596 | int cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) | 596 | int cms_set1_ias(CMS_IssuerAndSerialNumber **pias, X509 *cert) |
597 | { | 597 | { |
598 | CMS_IssuerAndSerialNumber *ias; | 598 | CMS_IssuerAndSerialNumber *ias; |
599 | ias = M_ASN1_new_of(CMS_IssuerAndSerialNumber); | 599 | ias = M_ASN1_new_of(CMS_IssuerAndSerialNumber); |
600 | if (!ias) | 600 | if (!ias) |
601 | goto err; | 601 | goto err; |
602 | if (!X509_NAME_set(&ias->issuer, X509_get_issuer_name(cert))) | 602 | if (!X509_NAME_set(&ias->issuer, X509_get_issuer_name(cert))) |
603 | goto err; | 603 | goto err; |
604 | if (!ASN1_STRING_copy(ias->serialNumber, X509_get_serialNumber(cert))) | 604 | if (!ASN1_STRING_copy(ias->serialNumber, X509_get_serialNumber(cert))) |
605 | goto err; | 605 | goto err; |
606 | M_ASN1_free_of(*pias, CMS_IssuerAndSerialNumber); | 606 | M_ASN1_free_of(*pias, CMS_IssuerAndSerialNumber); |
607 | *pias = ias; | 607 | *pias = ias; |
608 | return 1; | 608 | return 1; |
609 | err: | 609 | err: |
610 | M_ASN1_free_of(ias, CMS_IssuerAndSerialNumber); | 610 | M_ASN1_free_of(ias, CMS_IssuerAndSerialNumber); |
611 | CMSerr(CMS_F_CMS_SET1_IAS, ERR_R_MALLOC_FAILURE); | 611 | CMSerr(CMS_F_CMS_SET1_IAS, ERR_R_MALLOC_FAILURE); |
612 | return 0; | 612 | return 0; |
613 | } | 613 | } |
614 | 614 | ||
615 | int cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) | 615 | int cms_set1_keyid(ASN1_OCTET_STRING **pkeyid, X509 *cert) |
616 | { | 616 | { |
617 | ASN1_OCTET_STRING *keyid = NULL; | 617 | ASN1_OCTET_STRING *keyid = NULL; |
618 | const ASN1_OCTET_STRING *cert_keyid; | 618 | const ASN1_OCTET_STRING *cert_keyid; |
619 | cert_keyid = X509_get0_subject_key_id(cert); | 619 | cert_keyid = X509_get0_subject_key_id(cert); |
620 | if (cert_keyid == NULL) { | 620 | if (cert_keyid == NULL) { |
621 | CMSerr(CMS_F_CMS_SET1_KEYID, CMS_R_CERTIFICATE_HAS_NO_KEYID); | 621 | CMSerr(CMS_F_CMS_SET1_KEYID, CMS_R_CERTIFICATE_HAS_NO_KEYID); |
622 | return 0; | 622 | return 0; |
623 | } | 623 | } |
624 | keyid = ASN1_STRING_dup(cert_keyid); | 624 | keyid = ASN1_STRING_dup(cert_keyid); |
625 | if (!keyid) { | 625 | if (!keyid) { |
626 | CMSerr(CMS_F_CMS_SET1_KEYID, ERR_R_MALLOC_FAILURE); | 626 | CMSerr(CMS_F_CMS_SET1_KEYID, ERR_R_MALLOC_FAILURE); |
627 | return 0; | 627 | return 0; |
628 | } | 628 | } |
629 | ASN1_OCTET_STRING_free(*pkeyid); | 629 | ASN1_OCTET_STRING_free(*pkeyid); |
630 | *pkeyid = keyid; | 630 | *pkeyid = keyid; |
631 | return 1; | 631 | return 1; |
632 | } | 632 | } |