diff options
Diffstat (limited to 'src/lib/libcrypto/pkcs12')
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_add.c | 229 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_asn.c | 485 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_attr.c | 158 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_crt.c | 336 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_decr.c | 184 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_init.c | 100 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_key.c | 197 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_kiss.c | 299 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_mutl.c | 265 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_npas.c | 300 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_p8d.c | 72 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_p8e.c | 104 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_sbag.c | 235 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/p12_utl.c | 157 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/pk12err.c | 113 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/pkcs12.h | 284 | ||||
| -rw-r--r-- | src/lib/libcrypto/pkcs12/pkcs12_local.h | 174 |
17 files changed, 0 insertions, 3692 deletions
diff --git a/src/lib/libcrypto/pkcs12/p12_add.c b/src/lib/libcrypto/pkcs12/p12_add.c deleted file mode 100644 index f6f42c558c..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_add.c +++ /dev/null | |||
| @@ -1,229 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_add.c,v 1.25 2024/03/02 10:20:27 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/err.h> | ||
| 62 | #include <openssl/pkcs12.h> | ||
| 63 | |||
| 64 | #include "pkcs12_local.h" | ||
| 65 | #include "x509_local.h" | ||
| 66 | |||
| 67 | /* Pack an object into an OCTET STRING and turn into a safebag */ | ||
| 68 | |||
| 69 | PKCS12_SAFEBAG * | ||
| 70 | PKCS12_item_pack_safebag(void *obj, const ASN1_ITEM *it, int nid1, int nid2) | ||
| 71 | { | ||
| 72 | PKCS12_BAGS *bag; | ||
| 73 | PKCS12_SAFEBAG *safebag; | ||
| 74 | |||
| 75 | if (!(bag = PKCS12_BAGS_new())) { | ||
| 76 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 77 | return NULL; | ||
| 78 | } | ||
| 79 | bag->type = OBJ_nid2obj(nid1); | ||
| 80 | if (!ASN1_item_pack(obj, it, &bag->value.octet)) { | ||
| 81 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 82 | PKCS12_BAGS_free(bag); | ||
| 83 | return NULL; | ||
| 84 | } | ||
| 85 | if (!(safebag = PKCS12_SAFEBAG_new())) { | ||
| 86 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 87 | PKCS12_BAGS_free(bag); | ||
| 88 | return NULL; | ||
| 89 | } | ||
| 90 | safebag->value.bag = bag; | ||
| 91 | safebag->type = OBJ_nid2obj(nid2); | ||
| 92 | return safebag; | ||
| 93 | } | ||
| 94 | |||
| 95 | /* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */ | ||
| 96 | PKCS7 * | ||
| 97 | PKCS12_pack_p7data(STACK_OF(PKCS12_SAFEBAG) *sk) | ||
| 98 | { | ||
| 99 | PKCS7 *p7; | ||
| 100 | |||
| 101 | if (!(p7 = PKCS7_new())) { | ||
| 102 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 103 | return NULL; | ||
| 104 | } | ||
| 105 | p7->type = OBJ_nid2obj(NID_pkcs7_data); | ||
| 106 | if (!(p7->d.data = ASN1_OCTET_STRING_new())) { | ||
| 107 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 108 | goto err; | ||
| 109 | } | ||
| 110 | |||
| 111 | if (!ASN1_item_pack(sk, &PKCS12_SAFEBAGS_it, &p7->d.data)) { | ||
| 112 | PKCS12error(PKCS12_R_CANT_PACK_STRUCTURE); | ||
| 113 | goto err; | ||
| 114 | } | ||
| 115 | return p7; | ||
| 116 | |||
| 117 | err: | ||
| 118 | PKCS7_free(p7); | ||
| 119 | return NULL; | ||
| 120 | } | ||
| 121 | |||
| 122 | /* Unpack SAFEBAGS from PKCS#7 data ContentInfo */ | ||
| 123 | STACK_OF(PKCS12_SAFEBAG) * | ||
| 124 | PKCS12_unpack_p7data(PKCS7 *p7) | ||
| 125 | { | ||
| 126 | ASN1_OCTET_STRING *aos; | ||
| 127 | |||
| 128 | if (!PKCS7_type_is_data(p7)) { | ||
| 129 | PKCS12error(PKCS12_R_CONTENT_TYPE_NOT_DATA); | ||
| 130 | return NULL; | ||
| 131 | } | ||
| 132 | if ((aos = PKCS7_get_octet_string(p7)) == NULL) | ||
| 133 | return NULL; | ||
| 134 | return ASN1_item_unpack(aos, &PKCS12_SAFEBAGS_it); | ||
| 135 | } | ||
| 136 | LCRYPTO_ALIAS(PKCS12_unpack_p7data); | ||
| 137 | |||
| 138 | /* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */ | ||
| 139 | |||
| 140 | PKCS7 * | ||
| 141 | PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, | ||
| 142 | unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags) | ||
| 143 | { | ||
| 144 | PKCS7 *p7; | ||
| 145 | X509_ALGOR *pbe; | ||
| 146 | const EVP_CIPHER *pbe_ciph; | ||
| 147 | |||
| 148 | if (!(p7 = PKCS7_new())) { | ||
| 149 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 150 | return NULL; | ||
| 151 | } | ||
| 152 | if (!PKCS7_set_type(p7, NID_pkcs7_encrypted)) { | ||
| 153 | PKCS12error(PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE); | ||
| 154 | goto err; | ||
| 155 | } | ||
| 156 | |||
| 157 | pbe_ciph = EVP_get_cipherbynid(pbe_nid); | ||
| 158 | |||
| 159 | if (pbe_ciph) | ||
| 160 | pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen); | ||
| 161 | else | ||
| 162 | pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); | ||
| 163 | |||
| 164 | if (!pbe) { | ||
| 165 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 166 | goto err; | ||
| 167 | } | ||
| 168 | X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); | ||
| 169 | p7->d.encrypted->enc_data->algorithm = pbe; | ||
| 170 | ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data); | ||
| 171 | if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt( | ||
| 172 | pbe, &PKCS12_SAFEBAGS_it, pass, passlen, bags, 1))) { | ||
| 173 | PKCS12error(PKCS12_R_ENCRYPT_ERROR); | ||
| 174 | goto err; | ||
| 175 | } | ||
| 176 | |||
| 177 | return p7; | ||
| 178 | |||
| 179 | err: | ||
| 180 | PKCS7_free(p7); | ||
| 181 | return NULL; | ||
| 182 | } | ||
| 183 | |||
| 184 | STACK_OF(PKCS12_SAFEBAG) * | ||
| 185 | PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen) | ||
| 186 | { | ||
| 187 | PKCS7_ENC_CONTENT *content; | ||
| 188 | |||
| 189 | if (!PKCS7_type_is_encrypted(p7)) | ||
| 190 | return NULL; | ||
| 191 | if (p7->d.encrypted == NULL) | ||
| 192 | return NULL; | ||
| 193 | if ((content = p7->d.encrypted->enc_data) == NULL) | ||
| 194 | return NULL; | ||
| 195 | return PKCS12_item_decrypt_d2i(content->algorithm, &PKCS12_SAFEBAGS_it, | ||
| 196 | pass, passlen, content->enc_data, 1); | ||
| 197 | } | ||
| 198 | LCRYPTO_ALIAS(PKCS12_unpack_p7encdata); | ||
| 199 | |||
| 200 | PKCS8_PRIV_KEY_INFO * | ||
| 201 | PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen) | ||
| 202 | { | ||
| 203 | return PKCS8_decrypt(bag->value.shkeybag, pass, passlen); | ||
| 204 | } | ||
| 205 | LCRYPTO_ALIAS(PKCS12_decrypt_skey); | ||
| 206 | |||
| 207 | int | ||
| 208 | PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes) | ||
| 209 | { | ||
| 210 | if (ASN1_item_pack(safes, &PKCS12_AUTHSAFES_it, | ||
| 211 | &p12->authsafes->d.data)) | ||
| 212 | return 1; | ||
| 213 | return 0; | ||
| 214 | } | ||
| 215 | |||
| 216 | STACK_OF(PKCS7) * | ||
| 217 | PKCS12_unpack_authsafes(const PKCS12 *p12) | ||
| 218 | { | ||
| 219 | ASN1_OCTET_STRING *aos; | ||
| 220 | |||
| 221 | if (!PKCS7_type_is_data(p12->authsafes)) { | ||
| 222 | PKCS12error(PKCS12_R_CONTENT_TYPE_NOT_DATA); | ||
| 223 | return NULL; | ||
| 224 | } | ||
| 225 | if ((aos = PKCS7_get_octet_string(p12->authsafes)) == NULL) | ||
| 226 | return NULL; | ||
| 227 | return ASN1_item_unpack(aos, &PKCS12_AUTHSAFES_it); | ||
| 228 | } | ||
| 229 | LCRYPTO_ALIAS(PKCS12_unpack_authsafes); | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_asn.c b/src/lib/libcrypto/pkcs12/p12_asn.c deleted file mode 100644 index fd2f431f46..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_asn.c +++ /dev/null | |||
| @@ -1,485 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_asn.c,v 1.16 2024/07/09 06:13:22 beck Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/asn1t.h> | ||
| 62 | #include <openssl/pkcs12.h> | ||
| 63 | |||
| 64 | #include "pkcs12_local.h" | ||
| 65 | |||
| 66 | /* PKCS#12 ASN1 module */ | ||
| 67 | |||
| 68 | static const ASN1_TEMPLATE PKCS12_seq_tt[] = { | ||
| 69 | { | ||
| 70 | .flags = 0, | ||
| 71 | .tag = 0, | ||
| 72 | .offset = offsetof(PKCS12, version), | ||
| 73 | .field_name = "version", | ||
| 74 | .item = &ASN1_INTEGER_it, | ||
| 75 | }, | ||
| 76 | { | ||
| 77 | .flags = 0, | ||
| 78 | .tag = 0, | ||
| 79 | .offset = offsetof(PKCS12, authsafes), | ||
| 80 | .field_name = "authsafes", | ||
| 81 | .item = &PKCS7_it, | ||
| 82 | }, | ||
| 83 | { | ||
| 84 | .flags = ASN1_TFLG_OPTIONAL, | ||
| 85 | .tag = 0, | ||
| 86 | .offset = offsetof(PKCS12, mac), | ||
| 87 | .field_name = "mac", | ||
| 88 | .item = &PKCS12_MAC_DATA_it, | ||
| 89 | }, | ||
| 90 | }; | ||
| 91 | |||
| 92 | const ASN1_ITEM PKCS12_it = { | ||
| 93 | .itype = ASN1_ITYPE_SEQUENCE, | ||
| 94 | .utype = V_ASN1_SEQUENCE, | ||
| 95 | .templates = PKCS12_seq_tt, | ||
| 96 | .tcount = sizeof(PKCS12_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
| 97 | .funcs = NULL, | ||
| 98 | .size = sizeof(PKCS12), | ||
| 99 | .sname = "PKCS12", | ||
| 100 | }; | ||
| 101 | LCRYPTO_ALIAS(PKCS12_it); | ||
| 102 | |||
| 103 | |||
| 104 | PKCS12 * | ||
| 105 | d2i_PKCS12(PKCS12 **a, const unsigned char **in, long len) | ||
| 106 | { | ||
| 107 | return (PKCS12 *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
| 108 | &PKCS12_it); | ||
| 109 | } | ||
| 110 | LCRYPTO_ALIAS(d2i_PKCS12); | ||
| 111 | |||
| 112 | int | ||
| 113 | i2d_PKCS12(PKCS12 *a, unsigned char **out) | ||
| 114 | { | ||
| 115 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_it); | ||
| 116 | } | ||
| 117 | LCRYPTO_ALIAS(i2d_PKCS12); | ||
| 118 | |||
| 119 | PKCS12 * | ||
| 120 | PKCS12_new(void) | ||
| 121 | { | ||
| 122 | return (PKCS12 *)ASN1_item_new(&PKCS12_it); | ||
| 123 | } | ||
| 124 | LCRYPTO_ALIAS(PKCS12_new); | ||
| 125 | |||
| 126 | void | ||
| 127 | PKCS12_free(PKCS12 *a) | ||
| 128 | { | ||
| 129 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_it); | ||
| 130 | } | ||
| 131 | LCRYPTO_ALIAS(PKCS12_free); | ||
| 132 | |||
| 133 | static const ASN1_TEMPLATE PKCS12_MAC_DATA_seq_tt[] = { | ||
| 134 | { | ||
| 135 | .flags = 0, | ||
| 136 | .tag = 0, | ||
| 137 | .offset = offsetof(PKCS12_MAC_DATA, dinfo), | ||
| 138 | .field_name = "dinfo", | ||
| 139 | .item = &X509_SIG_it, | ||
| 140 | }, | ||
| 141 | { | ||
| 142 | .flags = 0, | ||
| 143 | .tag = 0, | ||
| 144 | .offset = offsetof(PKCS12_MAC_DATA, salt), | ||
| 145 | .field_name = "salt", | ||
| 146 | .item = &ASN1_OCTET_STRING_it, | ||
| 147 | }, | ||
| 148 | { | ||
| 149 | .flags = ASN1_TFLG_OPTIONAL, | ||
| 150 | .tag = 0, | ||
| 151 | .offset = offsetof(PKCS12_MAC_DATA, iter), | ||
| 152 | .field_name = "iter", | ||
| 153 | .item = &ASN1_INTEGER_it, | ||
| 154 | }, | ||
| 155 | }; | ||
| 156 | |||
| 157 | const ASN1_ITEM PKCS12_MAC_DATA_it = { | ||
| 158 | .itype = ASN1_ITYPE_SEQUENCE, | ||
| 159 | .utype = V_ASN1_SEQUENCE, | ||
| 160 | .templates = PKCS12_MAC_DATA_seq_tt, | ||
| 161 | .tcount = sizeof(PKCS12_MAC_DATA_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
| 162 | .funcs = NULL, | ||
| 163 | .size = sizeof(PKCS12_MAC_DATA), | ||
| 164 | .sname = "PKCS12_MAC_DATA", | ||
| 165 | }; | ||
| 166 | |||
| 167 | |||
| 168 | PKCS12_MAC_DATA * | ||
| 169 | d2i_PKCS12_MAC_DATA(PKCS12_MAC_DATA **a, const unsigned char **in, long len) | ||
| 170 | { | ||
| 171 | return (PKCS12_MAC_DATA *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
| 172 | &PKCS12_MAC_DATA_it); | ||
| 173 | } | ||
| 174 | |||
| 175 | int | ||
| 176 | i2d_PKCS12_MAC_DATA(PKCS12_MAC_DATA *a, unsigned char **out) | ||
| 177 | { | ||
| 178 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_MAC_DATA_it); | ||
| 179 | } | ||
| 180 | |||
| 181 | PKCS12_MAC_DATA * | ||
| 182 | PKCS12_MAC_DATA_new(void) | ||
| 183 | { | ||
| 184 | return (PKCS12_MAC_DATA *)ASN1_item_new(&PKCS12_MAC_DATA_it); | ||
| 185 | } | ||
| 186 | |||
| 187 | void | ||
| 188 | PKCS12_MAC_DATA_free(PKCS12_MAC_DATA *a) | ||
| 189 | { | ||
| 190 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_MAC_DATA_it); | ||
| 191 | } | ||
| 192 | |||
| 193 | static const ASN1_TEMPLATE bag_default_tt = { | ||
| 194 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 195 | .tag = 0, | ||
| 196 | .offset = offsetof(PKCS12_BAGS, value.other), | ||
| 197 | .field_name = "value.other", | ||
| 198 | .item = &ASN1_ANY_it, | ||
| 199 | }; | ||
| 200 | |||
| 201 | static const ASN1_ADB_TABLE PKCS12_BAGS_adbtbl[] = { | ||
| 202 | { | ||
| 203 | .value = NID_x509Certificate, | ||
| 204 | .tt = { | ||
| 205 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 206 | .tag = 0, | ||
| 207 | .offset = offsetof(PKCS12_BAGS, value.x509cert), | ||
| 208 | .field_name = "value.x509cert", | ||
| 209 | .item = &ASN1_OCTET_STRING_it, | ||
| 210 | }, | ||
| 211 | |||
| 212 | }, | ||
| 213 | { | ||
| 214 | .value = NID_x509Crl, | ||
| 215 | .tt = { | ||
| 216 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 217 | .tag = 0, | ||
| 218 | .offset = offsetof(PKCS12_BAGS, value.x509crl), | ||
| 219 | .field_name = "value.x509crl", | ||
| 220 | .item = &ASN1_OCTET_STRING_it, | ||
| 221 | }, | ||
| 222 | |||
| 223 | }, | ||
| 224 | { | ||
| 225 | .value = NID_sdsiCertificate, | ||
| 226 | .tt = { | ||
| 227 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 228 | .tag = 0, | ||
| 229 | .offset = offsetof(PKCS12_BAGS, value.sdsicert), | ||
| 230 | .field_name = "value.sdsicert", | ||
| 231 | .item = &ASN1_IA5STRING_it, | ||
| 232 | }, | ||
| 233 | |||
| 234 | }, | ||
| 235 | }; | ||
| 236 | |||
| 237 | static const ASN1_ADB PKCS12_BAGS_adb = { | ||
| 238 | .flags = 0, | ||
| 239 | .offset = offsetof(PKCS12_BAGS, type), | ||
| 240 | .tbl = PKCS12_BAGS_adbtbl, | ||
| 241 | .tblcount = sizeof(PKCS12_BAGS_adbtbl) / sizeof(ASN1_ADB_TABLE), | ||
| 242 | .default_tt = &bag_default_tt, | ||
| 243 | .null_tt = NULL, | ||
| 244 | }; | ||
| 245 | |||
| 246 | static const ASN1_TEMPLATE PKCS12_BAGS_seq_tt[] = { | ||
| 247 | { | ||
| 248 | .flags = 0, | ||
| 249 | .tag = 0, | ||
| 250 | .offset = offsetof(PKCS12_BAGS, type), | ||
| 251 | .field_name = "type", | ||
| 252 | .item = &ASN1_OBJECT_it, | ||
| 253 | }, | ||
| 254 | { | ||
| 255 | .flags = ASN1_TFLG_ADB_OID, | ||
| 256 | .tag = -1, | ||
| 257 | .offset = 0, | ||
| 258 | .field_name = "PKCS12_BAGS", | ||
| 259 | .item = (const ASN1_ITEM *)&PKCS12_BAGS_adb, | ||
| 260 | }, | ||
| 261 | }; | ||
| 262 | |||
| 263 | const ASN1_ITEM PKCS12_BAGS_it = { | ||
| 264 | .itype = ASN1_ITYPE_SEQUENCE, | ||
| 265 | .utype = V_ASN1_SEQUENCE, | ||
| 266 | .templates = PKCS12_BAGS_seq_tt, | ||
| 267 | .tcount = sizeof(PKCS12_BAGS_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
| 268 | .funcs = NULL, | ||
| 269 | .size = sizeof(PKCS12_BAGS), | ||
| 270 | .sname = "PKCS12_BAGS", | ||
| 271 | }; | ||
| 272 | |||
| 273 | |||
| 274 | PKCS12_BAGS * | ||
| 275 | d2i_PKCS12_BAGS(PKCS12_BAGS **a, const unsigned char **in, long len) | ||
| 276 | { | ||
| 277 | return (PKCS12_BAGS *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
| 278 | &PKCS12_BAGS_it); | ||
| 279 | } | ||
| 280 | |||
| 281 | int | ||
| 282 | i2d_PKCS12_BAGS(PKCS12_BAGS *a, unsigned char **out) | ||
| 283 | { | ||
| 284 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_BAGS_it); | ||
| 285 | } | ||
| 286 | |||
| 287 | PKCS12_BAGS * | ||
| 288 | PKCS12_BAGS_new(void) | ||
| 289 | { | ||
| 290 | return (PKCS12_BAGS *)ASN1_item_new(&PKCS12_BAGS_it); | ||
| 291 | } | ||
| 292 | |||
| 293 | void | ||
| 294 | PKCS12_BAGS_free(PKCS12_BAGS *a) | ||
| 295 | { | ||
| 296 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_BAGS_it); | ||
| 297 | } | ||
| 298 | |||
| 299 | static const ASN1_TEMPLATE safebag_default_tt = { | ||
| 300 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 301 | .tag = 0, | ||
| 302 | .offset = offsetof(PKCS12_SAFEBAG, value.other), | ||
| 303 | .field_name = "value.other", | ||
| 304 | .item = &ASN1_ANY_it, | ||
| 305 | }; | ||
| 306 | |||
| 307 | static const ASN1_ADB_TABLE PKCS12_SAFEBAG_adbtbl[] = { | ||
| 308 | { | ||
| 309 | .value = NID_keyBag, | ||
| 310 | .tt = { | ||
| 311 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 312 | .tag = 0, | ||
| 313 | .offset = offsetof(PKCS12_SAFEBAG, value.keybag), | ||
| 314 | .field_name = "value.keybag", | ||
| 315 | .item = &PKCS8_PRIV_KEY_INFO_it, | ||
| 316 | }, | ||
| 317 | |||
| 318 | }, | ||
| 319 | { | ||
| 320 | .value = NID_pkcs8ShroudedKeyBag, | ||
| 321 | .tt = { | ||
| 322 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 323 | .tag = 0, | ||
| 324 | .offset = offsetof(PKCS12_SAFEBAG, value.shkeybag), | ||
| 325 | .field_name = "value.shkeybag", | ||
| 326 | .item = &X509_SIG_it, | ||
| 327 | }, | ||
| 328 | |||
| 329 | }, | ||
| 330 | { | ||
| 331 | .value = NID_safeContentsBag, | ||
| 332 | .tt = { | ||
| 333 | .flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_SEQUENCE_OF, | ||
| 334 | .tag = 0, | ||
| 335 | .offset = offsetof(PKCS12_SAFEBAG, value.safes), | ||
| 336 | .field_name = "value.safes", | ||
| 337 | .item = &PKCS12_SAFEBAG_it, | ||
| 338 | }, | ||
| 339 | }, | ||
| 340 | { | ||
| 341 | .value = NID_certBag, | ||
| 342 | .tt = { | ||
| 343 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 344 | .tag = 0, | ||
| 345 | .offset = offsetof(PKCS12_SAFEBAG, value.bag), | ||
| 346 | .field_name = "value.bag", | ||
| 347 | .item = &PKCS12_BAGS_it, | ||
| 348 | }, | ||
| 349 | |||
| 350 | }, | ||
| 351 | { | ||
| 352 | .value = NID_crlBag, | ||
| 353 | .tt = { | ||
| 354 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 355 | .tag = 0, | ||
| 356 | .offset = offsetof(PKCS12_SAFEBAG, value.bag), | ||
| 357 | .field_name = "value.bag", | ||
| 358 | .item = &PKCS12_BAGS_it, | ||
| 359 | }, | ||
| 360 | |||
| 361 | }, | ||
| 362 | { | ||
| 363 | .value = NID_secretBag, | ||
| 364 | .tt = { | ||
| 365 | .flags = ASN1_TFLG_EXPLICIT, | ||
| 366 | .tag = 0, | ||
| 367 | .offset = offsetof(PKCS12_SAFEBAG, value.bag), | ||
| 368 | .field_name = "value.bag", | ||
| 369 | .item = &PKCS12_BAGS_it, | ||
| 370 | }, | ||
| 371 | |||
| 372 | }, | ||
| 373 | }; | ||
| 374 | |||
| 375 | static const ASN1_ADB PKCS12_SAFEBAG_adb = { | ||
| 376 | .flags = 0, | ||
| 377 | .offset = offsetof(PKCS12_SAFEBAG, type), | ||
| 378 | .tbl = PKCS12_SAFEBAG_adbtbl, | ||
| 379 | .tblcount = sizeof(PKCS12_SAFEBAG_adbtbl) / sizeof(ASN1_ADB_TABLE), | ||
| 380 | .default_tt = &safebag_default_tt, | ||
| 381 | .null_tt = NULL, | ||
| 382 | }; | ||
| 383 | |||
| 384 | static const ASN1_TEMPLATE PKCS12_SAFEBAG_seq_tt[] = { | ||
| 385 | { | ||
| 386 | .flags = 0, | ||
| 387 | .tag = 0, | ||
| 388 | .offset = offsetof(PKCS12_SAFEBAG, type), | ||
| 389 | .field_name = "type", | ||
| 390 | .item = &ASN1_OBJECT_it, | ||
| 391 | }, | ||
| 392 | { | ||
| 393 | .flags = ASN1_TFLG_ADB_OID, | ||
| 394 | .tag = -1, | ||
| 395 | .offset = 0, | ||
| 396 | .field_name = "PKCS12_SAFEBAG", | ||
| 397 | .item = (const ASN1_ITEM *)&PKCS12_SAFEBAG_adb, | ||
| 398 | }, | ||
| 399 | { | ||
| 400 | .flags = ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL, | ||
| 401 | .tag = 0, | ||
| 402 | .offset = offsetof(PKCS12_SAFEBAG, attrib), | ||
| 403 | .field_name = "attrib", | ||
| 404 | .item = &X509_ATTRIBUTE_it, | ||
| 405 | }, | ||
| 406 | }; | ||
| 407 | |||
| 408 | const ASN1_ITEM PKCS12_SAFEBAG_it = { | ||
| 409 | .itype = ASN1_ITYPE_SEQUENCE, | ||
| 410 | .utype = V_ASN1_SEQUENCE, | ||
| 411 | .templates = PKCS12_SAFEBAG_seq_tt, | ||
| 412 | .tcount = sizeof(PKCS12_SAFEBAG_seq_tt) / sizeof(ASN1_TEMPLATE), | ||
| 413 | .funcs = NULL, | ||
| 414 | .size = sizeof(PKCS12_SAFEBAG), | ||
| 415 | .sname = "PKCS12_SAFEBAG", | ||
| 416 | }; | ||
| 417 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_it); | ||
| 418 | |||
| 419 | |||
| 420 | PKCS12_SAFEBAG * | ||
| 421 | d2i_PKCS12_SAFEBAG(PKCS12_SAFEBAG **a, const unsigned char **in, long len) | ||
| 422 | { | ||
| 423 | return (PKCS12_SAFEBAG *)ASN1_item_d2i((ASN1_VALUE **)a, in, len, | ||
| 424 | &PKCS12_SAFEBAG_it); | ||
| 425 | } | ||
| 426 | LCRYPTO_ALIAS(d2i_PKCS12_SAFEBAG); | ||
| 427 | |||
| 428 | int | ||
| 429 | i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **out) | ||
| 430 | { | ||
| 431 | return ASN1_item_i2d((ASN1_VALUE *)a, out, &PKCS12_SAFEBAG_it); | ||
| 432 | } | ||
| 433 | LCRYPTO_ALIAS(i2d_PKCS12_SAFEBAG); | ||
| 434 | |||
| 435 | PKCS12_SAFEBAG * | ||
| 436 | PKCS12_SAFEBAG_new(void) | ||
| 437 | { | ||
| 438 | return (PKCS12_SAFEBAG *)ASN1_item_new(&PKCS12_SAFEBAG_it); | ||
| 439 | } | ||
| 440 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_new); | ||
| 441 | |||
| 442 | void | ||
| 443 | PKCS12_SAFEBAG_free(PKCS12_SAFEBAG *a) | ||
| 444 | { | ||
| 445 | ASN1_item_free((ASN1_VALUE *)a, &PKCS12_SAFEBAG_it); | ||
| 446 | } | ||
| 447 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_free); | ||
| 448 | |||
| 449 | /* SEQUENCE OF SafeBag */ | ||
| 450 | static const ASN1_TEMPLATE PKCS12_SAFEBAGS_item_tt = { | ||
| 451 | .flags = ASN1_TFLG_SEQUENCE_OF, | ||
| 452 | .tag = 0, | ||
| 453 | .offset = 0, | ||
| 454 | .field_name = "PKCS12_SAFEBAGS", | ||
| 455 | .item = &PKCS12_SAFEBAG_it, | ||
| 456 | }; | ||
| 457 | |||
| 458 | const ASN1_ITEM PKCS12_SAFEBAGS_it = { | ||
| 459 | .itype = ASN1_ITYPE_PRIMITIVE, | ||
| 460 | .utype = -1, | ||
| 461 | .templates = &PKCS12_SAFEBAGS_item_tt, | ||
| 462 | .tcount = 0, | ||
| 463 | .funcs = NULL, | ||
| 464 | .size = 0, | ||
| 465 | .sname = "PKCS12_SAFEBAGS", | ||
| 466 | }; | ||
| 467 | |||
| 468 | /* Authsafes: SEQUENCE OF PKCS7 */ | ||
| 469 | static const ASN1_TEMPLATE PKCS12_AUTHSAFES_item_tt = { | ||
| 470 | .flags = ASN1_TFLG_SEQUENCE_OF, | ||
| 471 | .tag = 0, | ||
| 472 | .offset = 0, | ||
| 473 | .field_name = "PKCS12_AUTHSAFES", | ||
| 474 | .item = &PKCS7_it, | ||
| 475 | }; | ||
| 476 | |||
| 477 | const ASN1_ITEM PKCS12_AUTHSAFES_it = { | ||
| 478 | .itype = ASN1_ITYPE_PRIMITIVE, | ||
| 479 | .utype = -1, | ||
| 480 | .templates = &PKCS12_AUTHSAFES_item_tt, | ||
| 481 | .tcount = 0, | ||
| 482 | .funcs = NULL, | ||
| 483 | .size = 0, | ||
| 484 | .sname = "PKCS12_AUTHSAFES", | ||
| 485 | }; | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_attr.c b/src/lib/libcrypto/pkcs12/p12_attr.c deleted file mode 100644 index 533be3b69c..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_attr.c +++ /dev/null | |||
| @@ -1,158 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_attr.c,v 1.21 2024/03/24 06:48:03 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/pkcs12.h> | ||
| 62 | |||
| 63 | #include "pkcs12_local.h" | ||
| 64 | #include "x509_local.h" | ||
| 65 | |||
| 66 | /* Add a local keyid to a safebag */ | ||
| 67 | |||
| 68 | int | ||
| 69 | PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, int namelen) | ||
| 70 | { | ||
| 71 | if (X509at_add1_attr_by_NID(&bag->attrib, NID_localKeyID, | ||
| 72 | V_ASN1_OCTET_STRING, name, namelen)) | ||
| 73 | return 1; | ||
| 74 | else | ||
| 75 | return 0; | ||
| 76 | } | ||
| 77 | |||
| 78 | /* Add key usage to PKCS#8 structure */ | ||
| 79 | |||
| 80 | int | ||
| 81 | PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage) | ||
| 82 | { | ||
| 83 | unsigned char us_val = (unsigned char)usage; | ||
| 84 | |||
| 85 | return PKCS8_pkey_add1_attr_by_NID(p8, NID_key_usage, V_ASN1_BIT_STRING, | ||
| 86 | &us_val, 1); | ||
| 87 | } | ||
| 88 | LCRYPTO_ALIAS(PKCS8_add_keyusage); | ||
| 89 | |||
| 90 | /* Add a friendlyname to a safebag */ | ||
| 91 | |||
| 92 | int | ||
| 93 | PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) | ||
| 94 | { | ||
| 95 | if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, | ||
| 96 | MBSTRING_ASC, (unsigned char *)name, namelen)) | ||
| 97 | return 1; | ||
| 98 | else | ||
| 99 | return 0; | ||
| 100 | } | ||
| 101 | |||
| 102 | int | ||
| 103 | PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, const unsigned char *name, | ||
| 104 | int namelen) | ||
| 105 | { | ||
| 106 | if (X509at_add1_attr_by_NID(&bag->attrib, NID_friendlyName, | ||
| 107 | MBSTRING_BMP, name, namelen)) | ||
| 108 | return 1; | ||
| 109 | else | ||
| 110 | return 0; | ||
| 111 | } | ||
| 112 | |||
| 113 | int | ||
| 114 | PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, int namelen) | ||
| 115 | { | ||
| 116 | if (X509at_add1_attr_by_NID(&bag->attrib, NID_ms_csp_name, | ||
| 117 | MBSTRING_ASC, (unsigned char *)name, namelen)) | ||
| 118 | return 1; | ||
| 119 | else | ||
| 120 | return 0; | ||
| 121 | } | ||
| 122 | |||
| 123 | ASN1_TYPE * | ||
| 124 | PKCS12_get_attr_gen(const STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid) | ||
| 125 | { | ||
| 126 | X509_ATTRIBUTE *attrib; | ||
| 127 | int i; | ||
| 128 | |||
| 129 | if (!attrs) | ||
| 130 | return NULL; | ||
| 131 | for (i = 0; i < sk_X509_ATTRIBUTE_num(attrs); i++) { | ||
| 132 | attrib = sk_X509_ATTRIBUTE_value(attrs, i); | ||
| 133 | if (OBJ_obj2nid(attrib->object) == attr_nid) | ||
| 134 | return sk_ASN1_TYPE_value(attrib->set, 0); | ||
| 135 | } | ||
| 136 | return NULL; | ||
| 137 | } | ||
| 138 | |||
| 139 | char * | ||
| 140 | PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) | ||
| 141 | { | ||
| 142 | const ASN1_TYPE *atype; | ||
| 143 | |||
| 144 | if (!(atype = PKCS12_SAFEBAG_get0_attr(bag, NID_friendlyName))) | ||
| 145 | return NULL; | ||
| 146 | if (atype->type != V_ASN1_BMPSTRING) | ||
| 147 | return NULL; | ||
| 148 | return OPENSSL_uni2asc(atype->value.bmpstring->data, | ||
| 149 | atype->value.bmpstring->length); | ||
| 150 | } | ||
| 151 | LCRYPTO_ALIAS(PKCS12_get_friendlyname); | ||
| 152 | |||
| 153 | const STACK_OF(X509_ATTRIBUTE) * | ||
| 154 | PKCS12_SAFEBAG_get0_attrs(const PKCS12_SAFEBAG *bag) | ||
| 155 | { | ||
| 156 | return bag->attrib; | ||
| 157 | } | ||
| 158 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_attrs); | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_crt.c b/src/lib/libcrypto/pkcs12/p12_crt.c deleted file mode 100644 index 502ccecd25..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_crt.c +++ /dev/null | |||
| @@ -1,336 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_crt.c,v 1.26 2024/08/22 12:22:42 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999-2002 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/err.h> | ||
| 62 | #include <openssl/pkcs12.h> | ||
| 63 | #include <openssl/x509.h> | ||
| 64 | |||
| 65 | #include "evp_local.h" | ||
| 66 | #include "pkcs12_local.h" | ||
| 67 | #include "x509_local.h" | ||
| 68 | |||
| 69 | static int pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, | ||
| 70 | PKCS12_SAFEBAG *bag); | ||
| 71 | |||
| 72 | PKCS12 * | ||
| 73 | PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, X509 *cert, | ||
| 74 | STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, int mac_iter, | ||
| 75 | int keytype) | ||
| 76 | { | ||
| 77 | PKCS12 *p12 = NULL; | ||
| 78 | STACK_OF(PKCS7) *safes = NULL; | ||
| 79 | STACK_OF(PKCS12_SAFEBAG) *bags = NULL; | ||
| 80 | PKCS12_SAFEBAG *bag = NULL; | ||
| 81 | int i; | ||
| 82 | unsigned char keyid[EVP_MAX_MD_SIZE]; | ||
| 83 | unsigned int keyidlen = 0; | ||
| 84 | |||
| 85 | /* Set defaults */ | ||
| 86 | if (!nid_cert) { | ||
| 87 | nid_cert = NID_pbe_WithSHA1And40BitRC2_CBC; | ||
| 88 | } | ||
| 89 | if (!nid_key) | ||
| 90 | nid_key = NID_pbe_WithSHA1And3_Key_TripleDES_CBC; | ||
| 91 | if (!iter) | ||
| 92 | iter = PKCS12_DEFAULT_ITER; | ||
| 93 | if (!mac_iter) | ||
| 94 | mac_iter = 1; | ||
| 95 | |||
| 96 | if (!pkey && !cert && !ca) { | ||
| 97 | PKCS12error(PKCS12_R_INVALID_NULL_ARGUMENT); | ||
| 98 | return NULL; | ||
| 99 | } | ||
| 100 | |||
| 101 | if (pkey && cert) { | ||
| 102 | if (!X509_check_private_key(cert, pkey)) | ||
| 103 | return NULL; | ||
| 104 | if (!X509_digest(cert, EVP_sha1(), keyid, &keyidlen)) | ||
| 105 | return NULL; | ||
| 106 | } | ||
| 107 | |||
| 108 | if (cert) { | ||
| 109 | bag = PKCS12_add_cert(&bags, cert); | ||
| 110 | if (name && !PKCS12_add_friendlyname(bag, name, -1)) | ||
| 111 | goto err; | ||
| 112 | if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) | ||
| 113 | goto err; | ||
| 114 | } | ||
| 115 | |||
| 116 | /* Add all other certificates */ | ||
| 117 | for (i = 0; i < sk_X509_num(ca); i++) { | ||
| 118 | if (!PKCS12_add_cert(&bags, sk_X509_value(ca, i))) | ||
| 119 | goto err; | ||
| 120 | } | ||
| 121 | |||
| 122 | if (bags && !PKCS12_add_safe(&safes, bags, nid_cert, iter, pass)) | ||
| 123 | goto err; | ||
| 124 | |||
| 125 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 126 | bags = NULL; | ||
| 127 | |||
| 128 | if (pkey) { | ||
| 129 | bag = PKCS12_add_key(&bags, pkey, keytype, iter, nid_key, pass); | ||
| 130 | |||
| 131 | if (!bag) | ||
| 132 | goto err; | ||
| 133 | |||
| 134 | if (name && !PKCS12_add_friendlyname(bag, name, -1)) | ||
| 135 | goto err; | ||
| 136 | if (keyidlen && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) | ||
| 137 | goto err; | ||
| 138 | } | ||
| 139 | |||
| 140 | if (bags && !PKCS12_add_safe(&safes, bags, -1, 0, NULL)) | ||
| 141 | goto err; | ||
| 142 | |||
| 143 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 144 | bags = NULL; | ||
| 145 | |||
| 146 | p12 = PKCS12_add_safes(safes, 0); | ||
| 147 | |||
| 148 | if (!p12) | ||
| 149 | goto err; | ||
| 150 | |||
| 151 | sk_PKCS7_pop_free(safes, PKCS7_free); | ||
| 152 | |||
| 153 | safes = NULL; | ||
| 154 | |||
| 155 | if ((mac_iter != -1) && | ||
| 156 | !PKCS12_set_mac(p12, pass, -1, NULL, 0, mac_iter, NULL)) | ||
| 157 | goto err; | ||
| 158 | |||
| 159 | return p12; | ||
| 160 | |||
| 161 | err: | ||
| 162 | if (p12) | ||
| 163 | PKCS12_free(p12); | ||
| 164 | if (safes) | ||
| 165 | sk_PKCS7_pop_free(safes, PKCS7_free); | ||
| 166 | if (bags) | ||
| 167 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 168 | return NULL; | ||
| 169 | } | ||
| 170 | LCRYPTO_ALIAS(PKCS12_create); | ||
| 171 | |||
| 172 | PKCS12_SAFEBAG * | ||
| 173 | PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert) | ||
| 174 | { | ||
| 175 | PKCS12_SAFEBAG *bag = NULL; | ||
| 176 | char *name; | ||
| 177 | int namelen = -1; | ||
| 178 | unsigned char *keyid; | ||
| 179 | int keyidlen = -1; | ||
| 180 | |||
| 181 | /* Add user certificate */ | ||
| 182 | if (!(bag = PKCS12_x5092certbag(cert))) | ||
| 183 | goto err; | ||
| 184 | |||
| 185 | /* Use friendlyName and localKeyID in certificate. | ||
| 186 | * (if present) | ||
| 187 | */ | ||
| 188 | name = (char *)X509_alias_get0(cert, &namelen); | ||
| 189 | if (name && !PKCS12_add_friendlyname(bag, name, namelen)) | ||
| 190 | goto err; | ||
| 191 | |||
| 192 | keyid = X509_keyid_get0(cert, &keyidlen); | ||
| 193 | |||
| 194 | if (keyid && !PKCS12_add_localkeyid(bag, keyid, keyidlen)) | ||
| 195 | goto err; | ||
| 196 | |||
| 197 | if (!pkcs12_add_bag(pbags, bag)) | ||
| 198 | goto err; | ||
| 199 | |||
| 200 | return bag; | ||
| 201 | |||
| 202 | err: | ||
| 203 | if (bag) | ||
| 204 | PKCS12_SAFEBAG_free(bag); | ||
| 205 | |||
| 206 | return NULL; | ||
| 207 | } | ||
| 208 | |||
| 209 | PKCS12_SAFEBAG * | ||
| 210 | PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key, int key_usage, | ||
| 211 | int iter, int nid_key, const char *pass) | ||
| 212 | { | ||
| 213 | PKCS12_SAFEBAG *bag = NULL; | ||
| 214 | PKCS8_PRIV_KEY_INFO *p8 = NULL; | ||
| 215 | |||
| 216 | /* Make a PKCS#8 structure */ | ||
| 217 | if (!(p8 = EVP_PKEY2PKCS8(key))) | ||
| 218 | goto err; | ||
| 219 | if (key_usage && !PKCS8_add_keyusage(p8, key_usage)) | ||
| 220 | goto err; | ||
| 221 | if (nid_key != -1) { | ||
| 222 | bag = PKCS12_SAFEBAG_create_pkcs8_encrypt(nid_key, pass, -1, | ||
| 223 | NULL, 0, iter, p8); | ||
| 224 | PKCS8_PRIV_KEY_INFO_free(p8); | ||
| 225 | p8 = NULL; | ||
| 226 | } else { | ||
| 227 | bag = PKCS12_SAFEBAG_create0_p8inf(p8); | ||
| 228 | if (bag != NULL) | ||
| 229 | p8 = NULL; | ||
| 230 | } | ||
| 231 | |||
| 232 | if (!bag) | ||
| 233 | goto err; | ||
| 234 | |||
| 235 | if (!pkcs12_add_bag(pbags, bag)) | ||
| 236 | goto err; | ||
| 237 | |||
| 238 | return bag; | ||
| 239 | |||
| 240 | err: | ||
| 241 | if (bag) | ||
| 242 | PKCS12_SAFEBAG_free(bag); | ||
| 243 | if (p8) | ||
| 244 | PKCS8_PRIV_KEY_INFO_free(p8); | ||
| 245 | |||
| 246 | return NULL; | ||
| 247 | } | ||
| 248 | |||
| 249 | int | ||
| 250 | PKCS12_add_safe(STACK_OF(PKCS7) **psafes, STACK_OF(PKCS12_SAFEBAG) *bags, | ||
| 251 | int nid_safe, int iter, const char *pass) | ||
| 252 | { | ||
| 253 | PKCS7 *p7 = NULL; | ||
| 254 | int free_safes = 0; | ||
| 255 | |||
| 256 | if (!*psafes) { | ||
| 257 | *psafes = sk_PKCS7_new_null(); | ||
| 258 | if (!*psafes) | ||
| 259 | return 0; | ||
| 260 | free_safes = 1; | ||
| 261 | } else | ||
| 262 | free_safes = 0; | ||
| 263 | |||
| 264 | if (nid_safe == 0) | ||
| 265 | nid_safe = NID_pbe_WithSHA1And40BitRC2_CBC; | ||
| 266 | |||
| 267 | if (nid_safe == -1) | ||
| 268 | p7 = PKCS12_pack_p7data(bags); | ||
| 269 | else | ||
| 270 | p7 = PKCS12_pack_p7encdata(nid_safe, pass, -1, NULL, 0, | ||
| 271 | iter, bags); | ||
| 272 | if (!p7) | ||
| 273 | goto err; | ||
| 274 | |||
| 275 | if (!sk_PKCS7_push(*psafes, p7)) | ||
| 276 | goto err; | ||
| 277 | |||
| 278 | return 1; | ||
| 279 | |||
| 280 | err: | ||
| 281 | if (free_safes) { | ||
| 282 | sk_PKCS7_free(*psafes); | ||
| 283 | *psafes = NULL; | ||
| 284 | } | ||
| 285 | |||
| 286 | if (p7) | ||
| 287 | PKCS7_free(p7); | ||
| 288 | |||
| 289 | return 0; | ||
| 290 | } | ||
| 291 | |||
| 292 | static int | ||
| 293 | pkcs12_add_bag(STACK_OF(PKCS12_SAFEBAG) **pbags, PKCS12_SAFEBAG *bag) | ||
| 294 | { | ||
| 295 | int free_bags; | ||
| 296 | |||
| 297 | if (!pbags) | ||
| 298 | return 1; | ||
| 299 | if (!*pbags) { | ||
| 300 | *pbags = sk_PKCS12_SAFEBAG_new_null(); | ||
| 301 | if (!*pbags) | ||
| 302 | return 0; | ||
| 303 | free_bags = 1; | ||
| 304 | } else | ||
| 305 | free_bags = 0; | ||
| 306 | |||
| 307 | if (!sk_PKCS12_SAFEBAG_push(*pbags, bag)) { | ||
| 308 | if (free_bags) { | ||
| 309 | sk_PKCS12_SAFEBAG_free(*pbags); | ||
| 310 | *pbags = NULL; | ||
| 311 | } | ||
| 312 | return 0; | ||
| 313 | } | ||
| 314 | |||
| 315 | return 1; | ||
| 316 | } | ||
| 317 | |||
| 318 | PKCS12 * | ||
| 319 | PKCS12_add_safes(STACK_OF(PKCS7) *safes, int nid_p7) | ||
| 320 | { | ||
| 321 | PKCS12 *p12; | ||
| 322 | |||
| 323 | if (nid_p7 <= 0) | ||
| 324 | nid_p7 = NID_pkcs7_data; | ||
| 325 | p12 = PKCS12_init(nid_p7); | ||
| 326 | |||
| 327 | if (!p12) | ||
| 328 | return NULL; | ||
| 329 | |||
| 330 | if (!PKCS12_pack_authsafes(p12, safes)) { | ||
| 331 | PKCS12_free(p12); | ||
| 332 | return NULL; | ||
| 333 | } | ||
| 334 | |||
| 335 | return p12; | ||
| 336 | } | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_decr.c b/src/lib/libcrypto/pkcs12/p12_decr.c deleted file mode 100644 index 907d4e52a6..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_decr.c +++ /dev/null | |||
| @@ -1,184 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_decr.c,v 1.26 2024/03/02 10:15:16 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <string.h> | ||
| 61 | |||
| 62 | #include <openssl/err.h> | ||
| 63 | #include <openssl/pkcs12.h> | ||
| 64 | |||
| 65 | #include "evp_local.h" | ||
| 66 | |||
| 67 | /* Encrypt/Decrypt a buffer based on password and algor, result in a | ||
| 68 | * malloc'ed buffer | ||
| 69 | */ | ||
| 70 | |||
| 71 | unsigned char * | ||
| 72 | PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, int passlen, | ||
| 73 | const unsigned char *in, int inlen, unsigned char **data, int *datalen, | ||
| 74 | int en_de) | ||
| 75 | { | ||
| 76 | unsigned char *out; | ||
| 77 | int outlen, i; | ||
| 78 | EVP_CIPHER_CTX ctx; | ||
| 79 | |||
| 80 | EVP_CIPHER_CTX_legacy_clear(&ctx); | ||
| 81 | /* Decrypt data */ | ||
| 82 | if (!EVP_PBE_CipherInit(algor->algorithm, pass, passlen, | ||
| 83 | algor->parameter, &ctx, en_de)) { | ||
| 84 | out = NULL; | ||
| 85 | PKCS12error(PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR); | ||
| 86 | goto err; | ||
| 87 | } | ||
| 88 | |||
| 89 | if (!(out = malloc(inlen + EVP_CIPHER_CTX_block_size(&ctx)))) { | ||
| 90 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 91 | goto err; | ||
| 92 | } | ||
| 93 | |||
| 94 | if (!EVP_CipherUpdate(&ctx, out, &i, in, inlen)) { | ||
| 95 | free(out); | ||
| 96 | out = NULL; | ||
| 97 | PKCS12error(ERR_R_EVP_LIB); | ||
| 98 | goto err; | ||
| 99 | } | ||
| 100 | |||
| 101 | outlen = i; | ||
| 102 | if (!EVP_CipherFinal_ex(&ctx, out + i, &i)) { | ||
| 103 | free(out); | ||
| 104 | out = NULL; | ||
| 105 | PKCS12error(PKCS12_R_PKCS12_CIPHERFINAL_ERROR); | ||
| 106 | goto err; | ||
| 107 | } | ||
| 108 | outlen += i; | ||
| 109 | if (datalen) | ||
| 110 | *datalen = outlen; | ||
| 111 | if (data) | ||
| 112 | *data = out; | ||
| 113 | |||
| 114 | err: | ||
| 115 | EVP_CIPHER_CTX_cleanup(&ctx); | ||
| 116 | return out; | ||
| 117 | |||
| 118 | } | ||
| 119 | |||
| 120 | /* Decrypt an OCTET STRING and decode ASN1 structure | ||
| 121 | * if zbuf set zero buffer after use. | ||
| 122 | */ | ||
| 123 | |||
| 124 | void * | ||
| 125 | PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, | ||
| 126 | const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf) | ||
| 127 | { | ||
| 128 | unsigned char *out; | ||
| 129 | const unsigned char *p; | ||
| 130 | void *ret; | ||
| 131 | int outlen; | ||
| 132 | |||
| 133 | if (!PKCS12_pbe_crypt(algor, pass, passlen, oct->data, oct->length, | ||
| 134 | &out, &outlen, 0)) { | ||
| 135 | PKCS12error(PKCS12_R_PKCS12_PBE_CRYPT_ERROR); | ||
| 136 | return NULL; | ||
| 137 | } | ||
| 138 | p = out; | ||
| 139 | ret = ASN1_item_d2i(NULL, &p, outlen, it); | ||
| 140 | if (zbuf) | ||
| 141 | explicit_bzero(out, outlen); | ||
| 142 | if (!ret) | ||
| 143 | PKCS12error(PKCS12_R_DECODE_ERROR); | ||
| 144 | free(out); | ||
| 145 | return ret; | ||
| 146 | } | ||
| 147 | |||
| 148 | /* Encode ASN1 structure and encrypt, return OCTET STRING | ||
| 149 | * if zbuf set zero encoding. | ||
| 150 | */ | ||
| 151 | |||
| 152 | ASN1_OCTET_STRING * | ||
| 153 | PKCS12_item_i2d_encrypt(X509_ALGOR *algor, const ASN1_ITEM *it, | ||
| 154 | const char *pass, int passlen, | ||
| 155 | void *obj, int zbuf) | ||
| 156 | { | ||
| 157 | ASN1_OCTET_STRING *oct; | ||
| 158 | unsigned char *in = NULL; | ||
| 159 | int inlen; | ||
| 160 | |||
| 161 | if (!(oct = ASN1_OCTET_STRING_new())) { | ||
| 162 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 163 | return NULL; | ||
| 164 | } | ||
| 165 | inlen = ASN1_item_i2d(obj, &in, it); | ||
| 166 | if (!in) { | ||
| 167 | PKCS12error(PKCS12_R_ENCODE_ERROR); | ||
| 168 | goto err; | ||
| 169 | } | ||
| 170 | if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, | ||
| 171 | &oct->length, 1)) { | ||
| 172 | PKCS12error(PKCS12_R_ENCRYPT_ERROR); | ||
| 173 | goto err; | ||
| 174 | } | ||
| 175 | if (zbuf) | ||
| 176 | explicit_bzero(in, inlen); | ||
| 177 | free(in); | ||
| 178 | return oct; | ||
| 179 | |||
| 180 | err: | ||
| 181 | free(in); | ||
| 182 | ASN1_OCTET_STRING_free(oct); | ||
| 183 | return NULL; | ||
| 184 | } | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_init.c b/src/lib/libcrypto/pkcs12/p12_init.c deleted file mode 100644 index cd9422d215..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_init.c +++ /dev/null | |||
| @@ -1,100 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_init.c,v 1.17 2024/03/24 06:48:03 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/err.h> | ||
| 62 | #include <openssl/pkcs12.h> | ||
| 63 | |||
| 64 | #include "pkcs12_local.h" | ||
| 65 | |||
| 66 | /* Initialise a PKCS12 structure to take data */ | ||
| 67 | |||
| 68 | PKCS12 * | ||
| 69 | PKCS12_init(int mode) | ||
| 70 | { | ||
| 71 | PKCS12 *pkcs12; | ||
| 72 | |||
| 73 | if (!(pkcs12 = PKCS12_new())) { | ||
| 74 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 75 | return NULL; | ||
| 76 | } | ||
| 77 | if (!ASN1_INTEGER_set(pkcs12->version, 3)) | ||
| 78 | goto err; | ||
| 79 | if ((pkcs12->authsafes->type = OBJ_nid2obj(mode)) == NULL) | ||
| 80 | goto err; | ||
| 81 | switch (mode) { | ||
| 82 | case NID_pkcs7_data: | ||
| 83 | if (!(pkcs12->authsafes->d.data = | ||
| 84 | ASN1_OCTET_STRING_new())) { | ||
| 85 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 86 | goto err; | ||
| 87 | } | ||
| 88 | break; | ||
| 89 | default: | ||
| 90 | PKCS12error(PKCS12_R_UNSUPPORTED_PKCS12_MODE); | ||
| 91 | goto err; | ||
| 92 | } | ||
| 93 | |||
| 94 | return pkcs12; | ||
| 95 | |||
| 96 | err: | ||
| 97 | if (pkcs12 != NULL) | ||
| 98 | PKCS12_free(pkcs12); | ||
| 99 | return NULL; | ||
| 100 | } | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_key.c b/src/lib/libcrypto/pkcs12/p12_key.c deleted file mode 100644 index 443d632c87..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_key.c +++ /dev/null | |||
| @@ -1,197 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_key.c,v 1.36 2025/03/09 15:45:52 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <string.h> | ||
| 61 | |||
| 62 | #include <openssl/bn.h> | ||
| 63 | #include <openssl/err.h> | ||
| 64 | #include <openssl/pkcs12.h> | ||
| 65 | |||
| 66 | #include "evp_local.h" | ||
| 67 | #include "pkcs12_local.h" | ||
| 68 | |||
| 69 | /* PKCS12 compatible key/IV generation */ | ||
| 70 | #ifndef min | ||
| 71 | #define min(a,b) ((a) < (b) ? (a) : (b)) | ||
| 72 | #endif | ||
| 73 | |||
| 74 | int | ||
| 75 | PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, | ||
| 76 | int saltlen, int id, int iter, int n, unsigned char *out, | ||
| 77 | const EVP_MD *md_type) | ||
| 78 | { | ||
| 79 | int ret; | ||
| 80 | unsigned char *unipass; | ||
| 81 | int uniplen; | ||
| 82 | |||
| 83 | if (!pass) { | ||
| 84 | unipass = NULL; | ||
| 85 | uniplen = 0; | ||
| 86 | } else if (!OPENSSL_asc2uni(pass, passlen, &unipass, &uniplen)) { | ||
| 87 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 88 | return 0; | ||
| 89 | } | ||
| 90 | ret = PKCS12_key_gen_uni(unipass, uniplen, salt, saltlen, | ||
| 91 | id, iter, n, out, md_type); | ||
| 92 | if (ret <= 0) | ||
| 93 | return 0; | ||
| 94 | freezero(unipass, uniplen); | ||
| 95 | return ret; | ||
| 96 | } | ||
| 97 | |||
| 98 | int | ||
| 99 | PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, | ||
| 100 | int saltlen, int id, int iter, int n, unsigned char *out, | ||
| 101 | const EVP_MD *md_type) | ||
| 102 | { | ||
| 103 | EVP_MD_CTX *ctx = NULL; | ||
| 104 | unsigned char *B = NULL, *D = NULL, *I = NULL, *Ai = NULL; | ||
| 105 | unsigned char *p; | ||
| 106 | int Slen, Plen, Ilen; | ||
| 107 | int i, j, u, v; | ||
| 108 | int ret = 0; | ||
| 109 | |||
| 110 | if ((ctx = EVP_MD_CTX_new()) == NULL) | ||
| 111 | goto err; | ||
| 112 | |||
| 113 | if ((v = EVP_MD_block_size(md_type)) <= 0) | ||
| 114 | goto err; | ||
| 115 | if ((u = EVP_MD_size(md_type)) <= 0) | ||
| 116 | goto err; | ||
| 117 | |||
| 118 | if ((D = malloc(v)) == NULL) | ||
| 119 | goto err; | ||
| 120 | if ((Ai = malloc(u)) == NULL) | ||
| 121 | goto err; | ||
| 122 | if ((B = malloc(v + 1)) == NULL) | ||
| 123 | goto err; | ||
| 124 | |||
| 125 | Slen = v * ((saltlen + v - 1) / v); | ||
| 126 | |||
| 127 | Plen = 0; | ||
| 128 | if (passlen) | ||
| 129 | Plen = v * ((passlen + v - 1) / v); | ||
| 130 | |||
| 131 | Ilen = Slen + Plen; | ||
| 132 | |||
| 133 | if ((I = malloc(Ilen)) == NULL) | ||
| 134 | goto err; | ||
| 135 | |||
| 136 | for (i = 0; i < v; i++) | ||
| 137 | D[i] = id; | ||
| 138 | |||
| 139 | p = I; | ||
| 140 | for (i = 0; i < Slen; i++) | ||
| 141 | *p++ = salt[i % saltlen]; | ||
| 142 | for (i = 0; i < Plen; i++) | ||
| 143 | *p++ = pass[i % passlen]; | ||
| 144 | |||
| 145 | for (;;) { | ||
| 146 | if (!EVP_DigestInit_ex(ctx, md_type, NULL)) | ||
| 147 | goto err; | ||
| 148 | if (!EVP_DigestUpdate(ctx, D, v)) | ||
| 149 | goto err; | ||
| 150 | if (!EVP_DigestUpdate(ctx, I, Ilen)) | ||
| 151 | goto err; | ||
| 152 | if (!EVP_DigestFinal_ex(ctx, Ai, NULL)) | ||
| 153 | goto err; | ||
| 154 | for (j = 1; j < iter; j++) { | ||
| 155 | if (!EVP_DigestInit_ex(ctx, md_type, NULL)) | ||
| 156 | goto err; | ||
| 157 | if (!EVP_DigestUpdate(ctx, Ai, u)) | ||
| 158 | goto err; | ||
| 159 | if (!EVP_DigestFinal_ex(ctx, Ai, NULL)) | ||
| 160 | goto err; | ||
| 161 | } | ||
| 162 | memcpy(out, Ai, min(n, u)); | ||
| 163 | if (u >= n) { | ||
| 164 | ret = 1; | ||
| 165 | goto end; | ||
| 166 | } | ||
| 167 | n -= u; | ||
| 168 | out += u; | ||
| 169 | for (j = 0; j < v; j++) | ||
| 170 | B[j] = Ai[j % u]; | ||
| 171 | |||
| 172 | for (j = 0; j < Ilen; j += v) { | ||
| 173 | uint16_t c = 1; | ||
| 174 | int k; | ||
| 175 | |||
| 176 | /* Work out I[j] = I[j] + B + 1. */ | ||
| 177 | for (k = v - 1; k >= 0; k--) { | ||
| 178 | c += I[j + k] + B[k]; | ||
| 179 | I[j + k] = (unsigned char)c; | ||
| 180 | c >>= 8; | ||
| 181 | } | ||
| 182 | } | ||
| 183 | } | ||
| 184 | |||
| 185 | err: | ||
| 186 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 187 | |||
| 188 | end: | ||
| 189 | free(Ai); | ||
| 190 | free(B); | ||
| 191 | free(D); | ||
| 192 | free(I); | ||
| 193 | EVP_MD_CTX_free(ctx); | ||
| 194 | |||
| 195 | return ret; | ||
| 196 | } | ||
| 197 | LCRYPTO_ALIAS(PKCS12_key_gen_uni); | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_kiss.c b/src/lib/libcrypto/pkcs12/p12_kiss.c deleted file mode 100644 index e4de2eb61c..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_kiss.c +++ /dev/null | |||
| @@ -1,299 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_kiss.c,v 1.28 2025/01/06 23:35:25 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/err.h> | ||
| 62 | #include <openssl/pkcs12.h> | ||
| 63 | |||
| 64 | #include "pkcs12_local.h" | ||
| 65 | |||
| 66 | /* Simplified PKCS#12 routines */ | ||
| 67 | |||
| 68 | static int parse_pk12( PKCS12 *p12, const char *pass, int passlen, | ||
| 69 | EVP_PKEY **pkey, STACK_OF(X509) *ocerts); | ||
| 70 | |||
| 71 | static int parse_bags( STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, | ||
| 72 | int passlen, EVP_PKEY **pkey, STACK_OF(X509) *ocerts); | ||
| 73 | |||
| 74 | static int parse_bag( PKCS12_SAFEBAG *bag, const char *pass, int passlen, | ||
| 75 | EVP_PKEY **pkey, STACK_OF(X509) *ocerts); | ||
| 76 | |||
| 77 | /* Parse and decrypt a PKCS#12 structure returning user key, user cert | ||
| 78 | * and other (CA) certs. Note either ca should be NULL, *ca should be NULL, | ||
| 79 | * or it should point to a valid STACK structure. pkey and cert can be | ||
| 80 | * passed uninitialised. | ||
| 81 | */ | ||
| 82 | |||
| 83 | int | ||
| 84 | PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, | ||
| 85 | STACK_OF(X509) **ca) | ||
| 86 | { | ||
| 87 | STACK_OF(X509) *ocerts = NULL; | ||
| 88 | X509 *x = NULL; | ||
| 89 | |||
| 90 | if (pkey != NULL) | ||
| 91 | *pkey = NULL; | ||
| 92 | if (cert != NULL) | ||
| 93 | *cert = NULL; | ||
| 94 | |||
| 95 | if (p12 == NULL) { | ||
| 96 | PKCS12error(PKCS12_R_INVALID_NULL_PKCS12_POINTER); | ||
| 97 | goto err; | ||
| 98 | } | ||
| 99 | |||
| 100 | /* Check the mac */ | ||
| 101 | |||
| 102 | /* If password is zero length or NULL then try verifying both cases | ||
| 103 | * to determine which password is correct. The reason for this is that | ||
| 104 | * under PKCS#12 password based encryption no password and a zero length | ||
| 105 | * password are two different things... | ||
| 106 | */ | ||
| 107 | |||
| 108 | if (pass == NULL || *pass == '\0') { | ||
| 109 | if (PKCS12_verify_mac(p12, NULL, 0)) | ||
| 110 | pass = NULL; | ||
| 111 | else if (PKCS12_verify_mac(p12, "", 0)) | ||
| 112 | pass = ""; | ||
| 113 | else { | ||
| 114 | PKCS12error(PKCS12_R_MAC_VERIFY_FAILURE); | ||
| 115 | goto err; | ||
| 116 | } | ||
| 117 | } else if (!PKCS12_verify_mac(p12, pass, -1)) { | ||
| 118 | PKCS12error(PKCS12_R_MAC_VERIFY_FAILURE); | ||
| 119 | goto err; | ||
| 120 | } | ||
| 121 | |||
| 122 | /* Allocate stack for other certificates */ | ||
| 123 | if ((ocerts = sk_X509_new_null()) == NULL) { | ||
| 124 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 125 | goto err; | ||
| 126 | } | ||
| 127 | |||
| 128 | if (!parse_pk12(p12, pass, -1, pkey, ocerts)) { | ||
| 129 | PKCS12error(PKCS12_R_PARSE_ERROR); | ||
| 130 | goto err; | ||
| 131 | } | ||
| 132 | |||
| 133 | while ((x = sk_X509_pop(ocerts)) != NULL) { | ||
| 134 | if (pkey != NULL && *pkey != NULL && | ||
| 135 | cert != NULL && *cert == NULL) { | ||
| 136 | ERR_set_mark(); | ||
| 137 | if (X509_check_private_key(x, *pkey)) { | ||
| 138 | *cert = x; | ||
| 139 | x = NULL; | ||
| 140 | } | ||
| 141 | ERR_pop_to_mark(); | ||
| 142 | } | ||
| 143 | |||
| 144 | if (ca != NULL && x != NULL) { | ||
| 145 | if (*ca == NULL) | ||
| 146 | *ca = sk_X509_new_null(); | ||
| 147 | if (*ca == NULL) | ||
| 148 | goto err; | ||
| 149 | if (!sk_X509_push(*ca, x)) | ||
| 150 | goto err; | ||
| 151 | x = NULL; | ||
| 152 | } | ||
| 153 | X509_free(x); | ||
| 154 | x = NULL; | ||
| 155 | } | ||
| 156 | |||
| 157 | sk_X509_pop_free(ocerts, X509_free); | ||
| 158 | |||
| 159 | return 1; | ||
| 160 | |||
| 161 | err: | ||
| 162 | if (pkey != NULL) | ||
| 163 | EVP_PKEY_free(*pkey); | ||
| 164 | if (cert != NULL) | ||
| 165 | X509_free(*cert); | ||
| 166 | X509_free(x); | ||
| 167 | sk_X509_pop_free(ocerts, X509_free); | ||
| 168 | |||
| 169 | return 0; | ||
| 170 | } | ||
| 171 | LCRYPTO_ALIAS(PKCS12_parse); | ||
| 172 | |||
| 173 | /* Parse the outer PKCS#12 structure */ | ||
| 174 | |||
| 175 | static int | ||
| 176 | parse_pk12(PKCS12 *p12, const char *pass, int passlen, EVP_PKEY **pkey, | ||
| 177 | STACK_OF(X509) *ocerts) | ||
| 178 | { | ||
| 179 | STACK_OF(PKCS7) *asafes; | ||
| 180 | STACK_OF(PKCS12_SAFEBAG) *bags; | ||
| 181 | int i, bagnid; | ||
| 182 | PKCS7 *p7; | ||
| 183 | |||
| 184 | if (!(asafes = PKCS12_unpack_authsafes(p12))) | ||
| 185 | return 0; | ||
| 186 | for (i = 0; i < sk_PKCS7_num(asafes); i++) { | ||
| 187 | p7 = sk_PKCS7_value(asafes, i); | ||
| 188 | bagnid = OBJ_obj2nid(p7->type); | ||
| 189 | if (bagnid == NID_pkcs7_data) { | ||
| 190 | bags = PKCS12_unpack_p7data(p7); | ||
| 191 | } else if (bagnid == NID_pkcs7_encrypted) { | ||
| 192 | bags = PKCS12_unpack_p7encdata(p7, pass, passlen); | ||
| 193 | } else | ||
| 194 | continue; | ||
| 195 | if (!bags) { | ||
| 196 | sk_PKCS7_pop_free(asafes, PKCS7_free); | ||
| 197 | return 0; | ||
| 198 | } | ||
| 199 | if (!parse_bags(bags, pass, passlen, pkey, ocerts)) { | ||
| 200 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 201 | sk_PKCS7_pop_free(asafes, PKCS7_free); | ||
| 202 | return 0; | ||
| 203 | } | ||
| 204 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 205 | } | ||
| 206 | sk_PKCS7_pop_free(asafes, PKCS7_free); | ||
| 207 | return 1; | ||
| 208 | } | ||
| 209 | |||
| 210 | static int | ||
| 211 | parse_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *pass, int passlen, | ||
| 212 | EVP_PKEY **pkey, STACK_OF(X509) *ocerts) | ||
| 213 | { | ||
| 214 | int i; | ||
| 215 | |||
| 216 | for (i = 0; i < sk_PKCS12_SAFEBAG_num(bags); i++) { | ||
| 217 | if (!parse_bag(sk_PKCS12_SAFEBAG_value(bags, i), pass, passlen, | ||
| 218 | pkey, ocerts)) | ||
| 219 | return 0; | ||
| 220 | } | ||
| 221 | return 1; | ||
| 222 | } | ||
| 223 | |||
| 224 | static int | ||
| 225 | parse_bag(PKCS12_SAFEBAG *bag, const char *pass, int passlen, EVP_PKEY **pkey, | ||
| 226 | STACK_OF(X509) *ocerts) | ||
| 227 | { | ||
| 228 | PKCS8_PRIV_KEY_INFO *p8; | ||
| 229 | X509 *x509; | ||
| 230 | const ASN1_TYPE *attrib; | ||
| 231 | ASN1_BMPSTRING *fname = NULL; | ||
| 232 | ASN1_OCTET_STRING *lkid = NULL; | ||
| 233 | |||
| 234 | if ((attrib = PKCS12_SAFEBAG_get0_attr(bag, NID_friendlyName))) | ||
| 235 | fname = attrib->value.bmpstring; | ||
| 236 | |||
| 237 | if ((attrib = PKCS12_SAFEBAG_get0_attr(bag, NID_localKeyID))) | ||
| 238 | lkid = attrib->value.octet_string; | ||
| 239 | |||
| 240 | switch (OBJ_obj2nid(bag->type)) { | ||
| 241 | case NID_keyBag: | ||
| 242 | if (!pkey || *pkey) | ||
| 243 | return 1; | ||
| 244 | if (!(*pkey = EVP_PKCS82PKEY(bag->value.keybag))) | ||
| 245 | return 0; | ||
| 246 | break; | ||
| 247 | |||
| 248 | case NID_pkcs8ShroudedKeyBag: | ||
| 249 | if (!pkey || *pkey) | ||
| 250 | return 1; | ||
| 251 | if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen))) | ||
| 252 | return 0; | ||
| 253 | *pkey = EVP_PKCS82PKEY(p8); | ||
| 254 | PKCS8_PRIV_KEY_INFO_free(p8); | ||
| 255 | if (!(*pkey)) | ||
| 256 | return 0; | ||
| 257 | break; | ||
| 258 | |||
| 259 | case NID_certBag: | ||
| 260 | if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Certificate ) | ||
| 261 | return 1; | ||
| 262 | if (!(x509 = PKCS12_certbag2x509(bag))) | ||
| 263 | return 0; | ||
| 264 | if (lkid && !X509_keyid_set1(x509, lkid->data, lkid->length)) { | ||
| 265 | X509_free(x509); | ||
| 266 | return 0; | ||
| 267 | } | ||
| 268 | if (fname) { | ||
| 269 | int len, r; | ||
| 270 | unsigned char *data = NULL; | ||
| 271 | len = ASN1_STRING_to_UTF8(&data, fname); | ||
| 272 | if (len >= 0) { | ||
| 273 | r = X509_alias_set1(x509, data, len); | ||
| 274 | free(data); | ||
| 275 | if (!r) { | ||
| 276 | X509_free(x509); | ||
| 277 | return 0; | ||
| 278 | } | ||
| 279 | } | ||
| 280 | } | ||
| 281 | |||
| 282 | if (!sk_X509_push(ocerts, x509)) { | ||
| 283 | X509_free(x509); | ||
| 284 | return 0; | ||
| 285 | } | ||
| 286 | |||
| 287 | break; | ||
| 288 | |||
| 289 | case NID_safeContentsBag: | ||
| 290 | return parse_bags(bag->value.safes, pass, passlen, | ||
| 291 | pkey, ocerts); | ||
| 292 | break; | ||
| 293 | |||
| 294 | default: | ||
| 295 | return 1; | ||
| 296 | break; | ||
| 297 | } | ||
| 298 | return 1; | ||
| 299 | } | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_mutl.c b/src/lib/libcrypto/pkcs12/p12_mutl.c deleted file mode 100644 index 2060358188..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_mutl.c +++ /dev/null | |||
| @@ -1,265 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_mutl.c,v 1.38 2024/03/24 06:48:03 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <stdlib.h> | ||
| 61 | #include <string.h> | ||
| 62 | |||
| 63 | #include <openssl/opensslconf.h> | ||
| 64 | |||
| 65 | #ifndef OPENSSL_NO_HMAC | ||
| 66 | |||
| 67 | #include <openssl/err.h> | ||
| 68 | #include <openssl/hmac.h> | ||
| 69 | #include <openssl/pkcs12.h> | ||
| 70 | |||
| 71 | #include "evp_local.h" | ||
| 72 | #include "hmac_local.h" | ||
| 73 | #include "pkcs12_local.h" | ||
| 74 | #include "x509_local.h" | ||
| 75 | |||
| 76 | int | ||
| 77 | PKCS12_mac_present(const PKCS12 *p12) | ||
| 78 | { | ||
| 79 | return p12->mac != NULL; | ||
| 80 | } | ||
| 81 | LCRYPTO_ALIAS(PKCS12_mac_present); | ||
| 82 | |||
| 83 | void | ||
| 84 | PKCS12_get0_mac(const ASN1_OCTET_STRING **pmac, const X509_ALGOR **pmacalg, | ||
| 85 | const ASN1_OCTET_STRING **psalt, const ASN1_INTEGER **piter, | ||
| 86 | const PKCS12 *p12) | ||
| 87 | { | ||
| 88 | if (p12->mac == NULL) { | ||
| 89 | if (pmac != NULL) | ||
| 90 | *pmac = NULL; | ||
| 91 | if (pmacalg != NULL) | ||
| 92 | *pmacalg = NULL; | ||
| 93 | if (psalt != NULL) | ||
| 94 | *psalt = NULL; | ||
| 95 | if (piter != NULL) | ||
| 96 | *piter = NULL; | ||
| 97 | return; | ||
| 98 | } | ||
| 99 | |||
| 100 | if (pmac != NULL) | ||
| 101 | *pmac = p12->mac->dinfo->digest; | ||
| 102 | if (pmacalg != NULL) | ||
| 103 | *pmacalg = p12->mac->dinfo->algor; | ||
| 104 | if (psalt != NULL) | ||
| 105 | *psalt = p12->mac->salt; | ||
| 106 | if (piter != NULL) | ||
| 107 | *piter = p12->mac->iter; | ||
| 108 | } | ||
| 109 | LCRYPTO_ALIAS(PKCS12_get0_mac); | ||
| 110 | |||
| 111 | /* Generate a MAC */ | ||
| 112 | int | ||
| 113 | PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, | ||
| 114 | unsigned char *mac, unsigned int *maclen) | ||
| 115 | { | ||
| 116 | const EVP_MD *md_type; | ||
| 117 | HMAC_CTX *hmac = NULL; | ||
| 118 | ASN1_OCTET_STRING *aos; | ||
| 119 | unsigned char key[EVP_MAX_MD_SIZE], *salt; | ||
| 120 | int saltlen, iter; | ||
| 121 | int md_size; | ||
| 122 | int ret = 0; | ||
| 123 | |||
| 124 | if (!PKCS7_type_is_data(p12->authsafes)) { | ||
| 125 | PKCS12error(PKCS12_R_CONTENT_TYPE_NOT_DATA); | ||
| 126 | goto err; | ||
| 127 | } | ||
| 128 | if ((aos = PKCS7_get_octet_string(p12->authsafes)) == NULL) { | ||
| 129 | PKCS12error(PKCS12_R_DECODE_ERROR); | ||
| 130 | goto err; | ||
| 131 | } | ||
| 132 | |||
| 133 | salt = p12->mac->salt->data; | ||
| 134 | saltlen = p12->mac->salt->length; | ||
| 135 | |||
| 136 | iter = 1; | ||
| 137 | if (p12->mac->iter != NULL) { | ||
| 138 | if ((iter = ASN1_INTEGER_get(p12->mac->iter)) <= 0) { | ||
| 139 | PKCS12error(PKCS12_R_DECODE_ERROR); | ||
| 140 | goto err; | ||
| 141 | } | ||
| 142 | } | ||
| 143 | |||
| 144 | md_type = EVP_get_digestbyobj(p12->mac->dinfo->algor->algorithm); | ||
| 145 | if (md_type == NULL) { | ||
| 146 | PKCS12error(PKCS12_R_UNKNOWN_DIGEST_ALGORITHM); | ||
| 147 | goto err; | ||
| 148 | } | ||
| 149 | |||
| 150 | if ((md_size = EVP_MD_size(md_type)) < 0) | ||
| 151 | goto err; | ||
| 152 | |||
| 153 | if (!PKCS12_key_gen(pass, passlen, salt, saltlen, PKCS12_MAC_ID, iter, | ||
| 154 | md_size, key, md_type)) { | ||
| 155 | PKCS12error(PKCS12_R_KEY_GEN_ERROR); | ||
| 156 | goto err; | ||
| 157 | } | ||
| 158 | |||
| 159 | if ((hmac = HMAC_CTX_new()) == NULL) | ||
| 160 | goto err; | ||
| 161 | if (!HMAC_Init_ex(hmac, key, md_size, md_type, NULL)) | ||
| 162 | goto err; | ||
| 163 | if (!HMAC_Update(hmac, aos->data, aos->length)) | ||
| 164 | goto err; | ||
| 165 | if (!HMAC_Final(hmac, mac, maclen)) | ||
| 166 | goto err; | ||
| 167 | |||
| 168 | ret = 1; | ||
| 169 | |||
| 170 | err: | ||
| 171 | explicit_bzero(key, sizeof(key)); | ||
| 172 | HMAC_CTX_free(hmac); | ||
| 173 | |||
| 174 | return ret; | ||
| 175 | } | ||
| 176 | |||
| 177 | /* Verify the mac */ | ||
| 178 | int | ||
| 179 | PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen) | ||
| 180 | { | ||
| 181 | unsigned char mac[EVP_MAX_MD_SIZE]; | ||
| 182 | unsigned int maclen; | ||
| 183 | |||
| 184 | if (p12->mac == NULL) { | ||
| 185 | PKCS12error(PKCS12_R_MAC_ABSENT); | ||
| 186 | return 0; | ||
| 187 | } | ||
| 188 | if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { | ||
| 189 | PKCS12error(PKCS12_R_MAC_GENERATION_ERROR); | ||
| 190 | return 0; | ||
| 191 | } | ||
| 192 | if ((maclen != (unsigned int)p12->mac->dinfo->digest->length) || | ||
| 193 | memcmp(mac, p12->mac->dinfo->digest->data, maclen)) | ||
| 194 | return 0; | ||
| 195 | return 1; | ||
| 196 | } | ||
| 197 | LCRYPTO_ALIAS(PKCS12_verify_mac); | ||
| 198 | |||
| 199 | /* Set a mac */ | ||
| 200 | |||
| 201 | int | ||
| 202 | PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, unsigned char *salt, | ||
| 203 | int saltlen, int iter, const EVP_MD *md_type) | ||
| 204 | { | ||
| 205 | unsigned char mac[EVP_MAX_MD_SIZE]; | ||
| 206 | unsigned int maclen; | ||
| 207 | |||
| 208 | if (!md_type) | ||
| 209 | md_type = EVP_sha1(); | ||
| 210 | if (PKCS12_setup_mac(p12, iter, salt, saltlen, md_type) == | ||
| 211 | PKCS12_ERROR) { | ||
| 212 | PKCS12error(PKCS12_R_MAC_SETUP_ERROR); | ||
| 213 | return 0; | ||
| 214 | } | ||
| 215 | if (!PKCS12_gen_mac(p12, pass, passlen, mac, &maclen)) { | ||
| 216 | PKCS12error(PKCS12_R_MAC_GENERATION_ERROR); | ||
| 217 | return 0; | ||
| 218 | } | ||
| 219 | if (!(ASN1_STRING_set(p12->mac->dinfo->digest, mac, maclen))) { | ||
| 220 | PKCS12error(PKCS12_R_MAC_STRING_SET_ERROR); | ||
| 221 | return 0; | ||
| 222 | } | ||
| 223 | return 1; | ||
| 224 | } | ||
| 225 | LCRYPTO_ALIAS(PKCS12_set_mac); | ||
| 226 | |||
| 227 | /* Set up a mac structure */ | ||
| 228 | int | ||
| 229 | PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, int saltlen, | ||
| 230 | const EVP_MD *md_type) | ||
| 231 | { | ||
| 232 | PKCS12_MAC_DATA_free(p12->mac); | ||
| 233 | if ((p12->mac = PKCS12_MAC_DATA_new()) == NULL) | ||
| 234 | return PKCS12_ERROR; | ||
| 235 | if (iter > 1) { | ||
| 236 | if (!(p12->mac->iter = ASN1_INTEGER_new())) { | ||
| 237 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 238 | return 0; | ||
| 239 | } | ||
| 240 | if (!ASN1_INTEGER_set(p12->mac->iter, iter)) { | ||
| 241 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 242 | return 0; | ||
| 243 | } | ||
| 244 | } | ||
| 245 | if (!saltlen) | ||
| 246 | saltlen = PKCS12_SALT_LEN; | ||
| 247 | if (!(p12->mac->salt->data = malloc(saltlen))) { | ||
| 248 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 249 | return 0; | ||
| 250 | } | ||
| 251 | p12->mac->salt->length = saltlen; | ||
| 252 | if (!salt) | ||
| 253 | arc4random_buf(p12->mac->salt->data, saltlen); | ||
| 254 | else | ||
| 255 | memcpy(p12->mac->salt->data, salt, saltlen); | ||
| 256 | p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type)); | ||
| 257 | if (!(p12->mac->dinfo->algor->parameter = ASN1_TYPE_new())) { | ||
| 258 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 259 | return 0; | ||
| 260 | } | ||
| 261 | p12->mac->dinfo->algor->parameter->type = V_ASN1_NULL; | ||
| 262 | |||
| 263 | return 1; | ||
| 264 | } | ||
| 265 | #endif | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_npas.c b/src/lib/libcrypto/pkcs12/p12_npas.c deleted file mode 100644 index 6d3b43ce22..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_npas.c +++ /dev/null | |||
| @@ -1,300 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_npas.c,v 1.27 2024/01/25 15:33:35 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | #include <stdlib.h> | ||
| 61 | #include <string.h> | ||
| 62 | #include <openssl/pem.h> | ||
| 63 | #include <openssl/err.h> | ||
| 64 | #include <openssl/pkcs12.h> | ||
| 65 | |||
| 66 | #include "pkcs12_local.h" | ||
| 67 | #include "x509_local.h" | ||
| 68 | |||
| 69 | /* PKCS#12 password change routine */ | ||
| 70 | |||
| 71 | static int | ||
| 72 | alg_get(X509_ALGOR *alg, int *nid, int *iter, int *salt_len) | ||
| 73 | { | ||
| 74 | const ASN1_OBJECT *aobj; | ||
| 75 | int param_type; | ||
| 76 | const void *param; | ||
| 77 | PBEPARAM *pbe = NULL; | ||
| 78 | int ret = 0; | ||
| 79 | |||
| 80 | *nid = *iter = *salt_len = 0; | ||
| 81 | |||
| 82 | X509_ALGOR_get0(&aobj, ¶m_type, ¶m, alg); | ||
| 83 | if (param_type != V_ASN1_SEQUENCE) | ||
| 84 | goto err; | ||
| 85 | if ((pbe = ASN1_item_unpack(param, &PBEPARAM_it)) == NULL) | ||
| 86 | goto err; | ||
| 87 | |||
| 88 | /* XXX - can we validate these somehow? */ | ||
| 89 | *nid = OBJ_obj2nid(alg->algorithm); | ||
| 90 | *iter = ASN1_INTEGER_get(pbe->iter); | ||
| 91 | *salt_len = pbe->salt->length; | ||
| 92 | |||
| 93 | ret = 1; | ||
| 94 | |||
| 95 | err: | ||
| 96 | PBEPARAM_free(pbe); | ||
| 97 | |||
| 98 | return ret; | ||
| 99 | } | ||
| 100 | |||
| 101 | /* Change password of safebag: only needs handle shrouded keybags */ | ||
| 102 | static int | ||
| 103 | newpass_bag(PKCS12_SAFEBAG *bag, const char *oldpass, const char *newpass) | ||
| 104 | { | ||
| 105 | PKCS8_PRIV_KEY_INFO *p8 = NULL; | ||
| 106 | X509_SIG *keybag; | ||
| 107 | int nid, salt_len, iter; | ||
| 108 | int ret = 0; | ||
| 109 | |||
| 110 | if (OBJ_obj2nid(bag->type) != NID_pkcs8ShroudedKeyBag) | ||
| 111 | goto done; | ||
| 112 | |||
| 113 | if ((p8 = PKCS8_decrypt(bag->value.shkeybag, oldpass, -1)) == NULL) | ||
| 114 | goto err; | ||
| 115 | if (!alg_get(bag->value.shkeybag->algor, &nid, &iter, &salt_len)) | ||
| 116 | goto err; | ||
| 117 | |||
| 118 | if ((keybag = PKCS8_encrypt(nid, NULL, newpass, -1, NULL, salt_len, | ||
| 119 | iter, p8)) == NULL) | ||
| 120 | goto err; | ||
| 121 | |||
| 122 | X509_SIG_free(bag->value.shkeybag); | ||
| 123 | bag->value.shkeybag = keybag; | ||
| 124 | |||
| 125 | done: | ||
| 126 | ret = 1; | ||
| 127 | |||
| 128 | err: | ||
| 129 | PKCS8_PRIV_KEY_INFO_free(p8); | ||
| 130 | |||
| 131 | return ret; | ||
| 132 | } | ||
| 133 | |||
| 134 | static int | ||
| 135 | newpass_bags(STACK_OF(PKCS12_SAFEBAG) *bags, const char *oldpass, | ||
| 136 | const char *newpass) | ||
| 137 | { | ||
| 138 | int i; | ||
| 139 | |||
| 140 | for (i = 0; i < sk_PKCS12_SAFEBAG_num(bags); i++) { | ||
| 141 | PKCS12_SAFEBAG *bag = sk_PKCS12_SAFEBAG_value(bags, i); | ||
| 142 | |||
| 143 | if (!newpass_bag(bag, oldpass, newpass)) | ||
| 144 | return 0; | ||
| 145 | } | ||
| 146 | |||
| 147 | return 1; | ||
| 148 | } | ||
| 149 | |||
| 150 | static int | ||
| 151 | pkcs7_repack_data(PKCS7 *pkcs7, STACK_OF(PKCS7) *safes, const char *oldpass, | ||
| 152 | const char *newpass) | ||
| 153 | { | ||
| 154 | STACK_OF(PKCS12_SAFEBAG) *bags; | ||
| 155 | PKCS7 *data = NULL; | ||
| 156 | int ret = 0; | ||
| 157 | |||
| 158 | if ((bags = PKCS12_unpack_p7data(pkcs7)) == NULL) | ||
| 159 | goto err; | ||
| 160 | if (!newpass_bags(bags, oldpass, newpass)) | ||
| 161 | goto err; | ||
| 162 | if ((data = PKCS12_pack_p7data(bags)) == NULL) | ||
| 163 | goto err; | ||
| 164 | if (sk_PKCS7_push(safes, data) == 0) | ||
| 165 | goto err; | ||
| 166 | data = NULL; | ||
| 167 | |||
| 168 | ret = 1; | ||
| 169 | |||
| 170 | err: | ||
| 171 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 172 | PKCS7_free(data); | ||
| 173 | |||
| 174 | return ret; | ||
| 175 | } | ||
| 176 | |||
| 177 | static int | ||
| 178 | pkcs7_repack_encdata(PKCS7 *pkcs7, STACK_OF(PKCS7) *safes, const char *oldpass, | ||
| 179 | const char *newpass) | ||
| 180 | { | ||
| 181 | STACK_OF(PKCS12_SAFEBAG) *bags; | ||
| 182 | int nid, iter, salt_len; | ||
| 183 | PKCS7 *data = NULL; | ||
| 184 | int ret = 0; | ||
| 185 | |||
| 186 | if ((bags = PKCS12_unpack_p7encdata(pkcs7, oldpass, -1)) == NULL) | ||
| 187 | goto err; | ||
| 188 | if (!alg_get(pkcs7->d.encrypted->enc_data->algorithm, &nid, | ||
| 189 | &iter, &salt_len)) | ||
| 190 | goto err; | ||
| 191 | if (!newpass_bags(bags, oldpass, newpass)) | ||
| 192 | goto err; | ||
| 193 | if ((data = PKCS12_pack_p7encdata(nid, newpass, -1, NULL, salt_len, | ||
| 194 | iter, bags)) == NULL) | ||
| 195 | goto err; | ||
| 196 | if (!sk_PKCS7_push(safes, data)) | ||
| 197 | goto err; | ||
| 198 | data = NULL; | ||
| 199 | |||
| 200 | ret = 1; | ||
| 201 | |||
| 202 | err: | ||
| 203 | sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free); | ||
| 204 | PKCS7_free(data); | ||
| 205 | |||
| 206 | return ret; | ||
| 207 | } | ||
| 208 | |||
| 209 | static int | ||
| 210 | pkcs12_repack_authsafes(PKCS12 *pkcs12, STACK_OF(PKCS7) *safes, | ||
| 211 | const char *newpass) | ||
| 212 | { | ||
| 213 | ASN1_OCTET_STRING *old_data; | ||
| 214 | ASN1_OCTET_STRING *new_mac = NULL; | ||
| 215 | unsigned char mac[EVP_MAX_MD_SIZE]; | ||
| 216 | unsigned int mac_len; | ||
| 217 | int ret = 0; | ||
| 218 | |||
| 219 | if ((old_data = pkcs12->authsafes->d.data) == NULL) | ||
| 220 | goto err; | ||
| 221 | if ((pkcs12->authsafes->d.data = ASN1_OCTET_STRING_new()) == NULL) | ||
| 222 | goto err; | ||
| 223 | if (!PKCS12_pack_authsafes(pkcs12, safes)) | ||
| 224 | goto err; | ||
| 225 | if (!PKCS12_gen_mac(pkcs12, newpass, -1, mac, &mac_len)) | ||
| 226 | goto err; | ||
| 227 | if ((new_mac = ASN1_OCTET_STRING_new()) == NULL) | ||
| 228 | goto err; | ||
| 229 | if (!ASN1_OCTET_STRING_set(new_mac, mac, mac_len)) | ||
| 230 | goto err; | ||
| 231 | |||
| 232 | ASN1_OCTET_STRING_free(pkcs12->mac->dinfo->digest); | ||
| 233 | pkcs12->mac->dinfo->digest = new_mac; | ||
| 234 | new_mac = NULL; | ||
| 235 | |||
| 236 | ASN1_OCTET_STRING_free(old_data); | ||
| 237 | old_data = NULL; | ||
| 238 | |||
| 239 | ret = 1; | ||
| 240 | |||
| 241 | err: | ||
| 242 | if (old_data != NULL) { | ||
| 243 | ASN1_OCTET_STRING_free(pkcs12->authsafes->d.data); | ||
| 244 | pkcs12->authsafes->d.data = old_data; | ||
| 245 | } | ||
| 246 | explicit_bzero(mac, sizeof(mac)); | ||
| 247 | ASN1_OCTET_STRING_free(new_mac); | ||
| 248 | |||
| 249 | return ret; | ||
| 250 | } | ||
| 251 | |||
| 252 | int | ||
| 253 | PKCS12_newpass(PKCS12 *pkcs12, const char *oldpass, const char *newpass) | ||
| 254 | { | ||
| 255 | STACK_OF(PKCS7) *authsafes = NULL, *safes = NULL; | ||
| 256 | int i; | ||
| 257 | int ret = 0; | ||
| 258 | |||
| 259 | if (pkcs12 == NULL) { | ||
| 260 | PKCS12error(PKCS12_R_INVALID_NULL_PKCS12_POINTER); | ||
| 261 | goto err; | ||
| 262 | } | ||
| 263 | |||
| 264 | if (!PKCS12_verify_mac(pkcs12, oldpass, -1)) { | ||
| 265 | PKCS12error(PKCS12_R_MAC_VERIFY_FAILURE); | ||
| 266 | goto err; | ||
| 267 | } | ||
| 268 | |||
| 269 | if ((authsafes = PKCS12_unpack_authsafes(pkcs12)) == NULL) | ||
| 270 | goto err; | ||
| 271 | if ((safes = sk_PKCS7_new_null()) == NULL) | ||
| 272 | goto err; | ||
| 273 | |||
| 274 | for (i = 0; i < sk_PKCS7_num(authsafes); i++) { | ||
| 275 | PKCS7 *pkcs7 = sk_PKCS7_value(authsafes, i); | ||
| 276 | |||
| 277 | switch (OBJ_obj2nid(pkcs7->type)) { | ||
| 278 | case NID_pkcs7_data: | ||
| 279 | if (pkcs7_repack_data(pkcs7, safes, oldpass, newpass)) | ||
| 280 | goto err; | ||
| 281 | break; | ||
| 282 | case NID_pkcs7_encrypted: | ||
| 283 | if (pkcs7_repack_encdata(pkcs7, safes, oldpass, newpass)) | ||
| 284 | goto err; | ||
| 285 | break; | ||
| 286 | } | ||
| 287 | } | ||
| 288 | |||
| 289 | if (!pkcs12_repack_authsafes(pkcs12, safes, newpass)) | ||
| 290 | goto err; | ||
| 291 | |||
| 292 | ret = 1; | ||
| 293 | |||
| 294 | err: | ||
| 295 | sk_PKCS7_pop_free(authsafes, PKCS7_free); | ||
| 296 | sk_PKCS7_pop_free(safes, PKCS7_free); | ||
| 297 | |||
| 298 | return ret; | ||
| 299 | } | ||
| 300 | LCRYPTO_ALIAS(PKCS12_newpass); | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_p8d.c b/src/lib/libcrypto/pkcs12/p12_p8d.c deleted file mode 100644 index d4874e3b73..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_p8d.c +++ /dev/null | |||
| @@ -1,72 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_p8d.c,v 1.12 2024/03/02 10:15:16 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 2001. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 2001 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/pkcs12.h> | ||
| 62 | |||
| 63 | #include "pkcs12_local.h" | ||
| 64 | #include "x509_local.h" | ||
| 65 | |||
| 66 | PKCS8_PRIV_KEY_INFO * | ||
| 67 | PKCS8_decrypt(const X509_SIG *p8, const char *pass, int passlen) | ||
| 68 | { | ||
| 69 | return PKCS12_item_decrypt_d2i(p8->algor, | ||
| 70 | &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8->digest, 1); | ||
| 71 | } | ||
| 72 | LCRYPTO_ALIAS(PKCS8_decrypt); | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_p8e.c b/src/lib/libcrypto/pkcs12/p12_p8e.c deleted file mode 100644 index bf61593266..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_p8e.c +++ /dev/null | |||
| @@ -1,104 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_p8e.c,v 1.13 2024/03/02 10:15:16 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 2001. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 2001 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <stdio.h> | ||
| 60 | |||
| 61 | #include <openssl/err.h> | ||
| 62 | #include <openssl/pkcs12.h> | ||
| 63 | |||
| 64 | #include "pkcs12_local.h" | ||
| 65 | #include "x509_local.h" | ||
| 66 | |||
| 67 | X509_SIG * | ||
| 68 | PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, const char *pass, | ||
| 69 | int passlen, unsigned char *salt, int saltlen, int iter, | ||
| 70 | PKCS8_PRIV_KEY_INFO *p8inf) | ||
| 71 | { | ||
| 72 | X509_SIG *p8 = NULL; | ||
| 73 | X509_ALGOR *pbe; | ||
| 74 | |||
| 75 | if (!(p8 = X509_SIG_new())) { | ||
| 76 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 77 | goto err; | ||
| 78 | } | ||
| 79 | |||
| 80 | if (pbe_nid == -1) | ||
| 81 | pbe = PKCS5_pbe2_set(cipher, iter, salt, saltlen); | ||
| 82 | else | ||
| 83 | pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen); | ||
| 84 | if (!pbe) { | ||
| 85 | PKCS12error(ERR_R_ASN1_LIB); | ||
| 86 | goto err; | ||
| 87 | } | ||
| 88 | X509_ALGOR_free(p8->algor); | ||
| 89 | p8->algor = pbe; | ||
| 90 | ASN1_OCTET_STRING_free(p8->digest); | ||
| 91 | p8->digest = PKCS12_item_i2d_encrypt(pbe, | ||
| 92 | &PKCS8_PRIV_KEY_INFO_it, pass, passlen, p8inf, 1); | ||
| 93 | if (!p8->digest) { | ||
| 94 | PKCS12error(PKCS12_R_ENCRYPT_ERROR); | ||
| 95 | goto err; | ||
| 96 | } | ||
| 97 | |||
| 98 | return p8; | ||
| 99 | |||
| 100 | err: | ||
| 101 | X509_SIG_free(p8); | ||
| 102 | return NULL; | ||
| 103 | } | ||
| 104 | LCRYPTO_ALIAS(PKCS8_encrypt); | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_sbag.c b/src/lib/libcrypto/pkcs12/p12_sbag.c deleted file mode 100644 index 1664e9409d..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_sbag.c +++ /dev/null | |||
| @@ -1,235 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_sbag.c,v 1.9 2024/03/24 06:48:03 tb Exp $ */ | ||
| 2 | /* | ||
| 3 | * Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project | ||
| 4 | * 1999-2018. | ||
| 5 | */ | ||
| 6 | /* ==================================================================== | ||
| 7 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 8 | * | ||
| 9 | * Redistribution and use in source and binary forms, with or without | ||
| 10 | * modification, are permitted provided that the following conditions | ||
| 11 | * are met: | ||
| 12 | * | ||
| 13 | * 1. Redistributions of source code must retain the above copyright | ||
| 14 | * notice, this list of conditions and the following disclaimer. | ||
| 15 | * | ||
| 16 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 17 | * notice, this list of conditions and the following disclaimer in | ||
| 18 | * the documentation and/or other materials provided with the | ||
| 19 | * distribution. | ||
| 20 | * | ||
| 21 | * 3. All advertising materials mentioning features or use of this | ||
| 22 | * software must display the following acknowledgment: | ||
| 23 | * "This product includes software developed by the OpenSSL Project | ||
| 24 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 25 | * | ||
| 26 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 27 | * endorse or promote products derived from this software without | ||
| 28 | * prior written permission. For written permission, please contact | ||
| 29 | * licensing@OpenSSL.org. | ||
| 30 | * | ||
| 31 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 32 | * nor may "OpenSSL" appear in their names without prior written | ||
| 33 | * permission of the OpenSSL Project. | ||
| 34 | * | ||
| 35 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 36 | * acknowledgment: | ||
| 37 | * "This product includes software developed by the OpenSSL Project | ||
| 38 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 39 | * | ||
| 40 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 41 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 42 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 43 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 44 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 45 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 46 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 47 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 49 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 50 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 51 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 52 | * ==================================================================== | ||
| 53 | * | ||
| 54 | * This product includes cryptographic software written by Eric Young | ||
| 55 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 56 | * Hudson (tjh@cryptsoft.com). | ||
| 57 | * | ||
| 58 | */ | ||
| 59 | |||
| 60 | #include <stdio.h> | ||
| 61 | |||
| 62 | #include <openssl/err.h> | ||
| 63 | #include <openssl/pkcs12.h> | ||
| 64 | |||
| 65 | #include "pkcs12_local.h" | ||
| 66 | #include "x509_local.h" | ||
| 67 | |||
| 68 | const ASN1_TYPE * | ||
| 69 | PKCS12_SAFEBAG_get0_attr(const PKCS12_SAFEBAG *bag, int attr_nid) | ||
| 70 | { | ||
| 71 | return PKCS12_get_attr_gen(bag->attrib, attr_nid); | ||
| 72 | } | ||
| 73 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_attr); | ||
| 74 | |||
| 75 | ASN1_TYPE * | ||
| 76 | PKCS8_get_attr(PKCS8_PRIV_KEY_INFO *p8, int attr_nid) | ||
| 77 | { | ||
| 78 | return PKCS12_get_attr_gen(p8->attributes, attr_nid); | ||
| 79 | } | ||
| 80 | LCRYPTO_ALIAS(PKCS8_get_attr); | ||
| 81 | |||
| 82 | const PKCS8_PRIV_KEY_INFO * | ||
| 83 | PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag) | ||
| 84 | { | ||
| 85 | if (PKCS12_SAFEBAG_get_nid(bag) != NID_keyBag) | ||
| 86 | return NULL; | ||
| 87 | |||
| 88 | return bag->value.keybag; | ||
| 89 | } | ||
| 90 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_p8inf); | ||
| 91 | |||
| 92 | const X509_SIG * | ||
| 93 | PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag) | ||
| 94 | { | ||
| 95 | if (PKCS12_SAFEBAG_get_nid(bag) != NID_pkcs8ShroudedKeyBag) | ||
| 96 | return NULL; | ||
| 97 | |||
| 98 | return bag->value.shkeybag; | ||
| 99 | } | ||
| 100 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_pkcs8); | ||
| 101 | |||
| 102 | const STACK_OF(PKCS12_SAFEBAG) * | ||
| 103 | PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag) | ||
| 104 | { | ||
| 105 | if (PKCS12_SAFEBAG_get_nid(bag) != NID_safeContentsBag) | ||
| 106 | return NULL; | ||
| 107 | |||
| 108 | return bag->value.safes; | ||
| 109 | } | ||
| 110 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_safes); | ||
| 111 | |||
| 112 | const ASN1_OBJECT * | ||
| 113 | PKCS12_SAFEBAG_get0_type(const PKCS12_SAFEBAG *bag) | ||
| 114 | { | ||
| 115 | return bag->type; | ||
| 116 | } | ||
| 117 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get0_type); | ||
| 118 | |||
| 119 | int | ||
| 120 | PKCS12_SAFEBAG_get_nid(const PKCS12_SAFEBAG *bag) | ||
| 121 | { | ||
| 122 | return OBJ_obj2nid(bag->type); | ||
| 123 | } | ||
| 124 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get_nid); | ||
| 125 | |||
| 126 | int | ||
| 127 | PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag) | ||
| 128 | { | ||
| 129 | int bag_type; | ||
| 130 | |||
| 131 | bag_type = PKCS12_SAFEBAG_get_nid(bag); | ||
| 132 | |||
| 133 | if (bag_type == NID_certBag || bag_type == NID_crlBag || | ||
| 134 | bag_type == NID_secretBag) | ||
| 135 | return OBJ_obj2nid(bag->value.bag->type); | ||
| 136 | |||
| 137 | return -1; | ||
| 138 | } | ||
| 139 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get_bag_nid); | ||
| 140 | |||
| 141 | X509 * | ||
| 142 | PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag) | ||
| 143 | { | ||
| 144 | if (OBJ_obj2nid(bag->type) != NID_certBag) | ||
| 145 | return NULL; | ||
| 146 | if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Certificate) | ||
| 147 | return NULL; | ||
| 148 | return ASN1_item_unpack(bag->value.bag->value.octet, &X509_it); | ||
| 149 | } | ||
| 150 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get1_cert); | ||
| 151 | |||
| 152 | X509_CRL * | ||
| 153 | PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag) | ||
| 154 | { | ||
| 155 | if (OBJ_obj2nid(bag->type) != NID_crlBag) | ||
| 156 | return NULL; | ||
| 157 | if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Crl) | ||
| 158 | return NULL; | ||
| 159 | return ASN1_item_unpack(bag->value.bag->value.octet, &X509_CRL_it); | ||
| 160 | } | ||
| 161 | LCRYPTO_ALIAS(PKCS12_SAFEBAG_get1_crl); | ||
| 162 | |||
| 163 | PKCS12_SAFEBAG * | ||
| 164 | PKCS12_SAFEBAG_create_cert(X509 *x509) | ||
| 165 | { | ||
| 166 | return PKCS12_item_pack_safebag(x509, &X509_it, | ||
| 167 | NID_x509Certificate, NID_certBag); | ||
| 168 | } | ||
| 169 | |||
| 170 | PKCS12_SAFEBAG * | ||
| 171 | PKCS12_SAFEBAG_create_crl(X509_CRL *crl) | ||
| 172 | { | ||
| 173 | return PKCS12_item_pack_safebag(crl, &X509_CRL_it, | ||
| 174 | NID_x509Crl, NID_crlBag); | ||
| 175 | } | ||
| 176 | |||
| 177 | /* Turn PKCS8 object into a keybag */ | ||
| 178 | |||
| 179 | PKCS12_SAFEBAG * | ||
| 180 | PKCS12_SAFEBAG_create0_p8inf(PKCS8_PRIV_KEY_INFO *p8) | ||
| 181 | { | ||
| 182 | PKCS12_SAFEBAG *bag; | ||
| 183 | |||
| 184 | if ((bag = PKCS12_SAFEBAG_new()) == NULL) { | ||
| 185 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 186 | return NULL; | ||
| 187 | } | ||
| 188 | |||
| 189 | bag->type = OBJ_nid2obj(NID_keyBag); | ||
| 190 | bag->value.keybag = p8; | ||
| 191 | |||
| 192 | return bag; | ||
| 193 | } | ||
| 194 | |||
| 195 | /* Turn PKCS8 object into a shrouded keybag */ | ||
| 196 | |||
| 197 | PKCS12_SAFEBAG * | ||
| 198 | PKCS12_SAFEBAG_create0_pkcs8(X509_SIG *p8) | ||
| 199 | { | ||
| 200 | PKCS12_SAFEBAG *bag; | ||
| 201 | |||
| 202 | /* Set up the safe bag */ | ||
| 203 | if ((bag = PKCS12_SAFEBAG_new()) == NULL) { | ||
| 204 | PKCS12error(ERR_R_MALLOC_FAILURE); | ||
| 205 | return NULL; | ||
| 206 | } | ||
| 207 | |||
| 208 | bag->type = OBJ_nid2obj(NID_pkcs8ShroudedKeyBag); | ||
| 209 | bag->value.shkeybag = p8; | ||
| 210 | |||
| 211 | return bag; | ||
| 212 | } | ||
| 213 | |||
| 214 | PKCS12_SAFEBAG * | ||
| 215 | PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, const char *pass, int passlen, | ||
| 216 | unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8info) | ||
| 217 | { | ||
| 218 | const EVP_CIPHER *pbe_ciph; | ||
| 219 | X509_SIG *p8; | ||
| 220 | PKCS12_SAFEBAG *bag; | ||
| 221 | |||
| 222 | if ((pbe_ciph = EVP_get_cipherbynid(pbe_nid)) != NULL) | ||
| 223 | pbe_nid = -1; | ||
| 224 | |||
| 225 | if ((p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, | ||
| 226 | iter, p8info)) == NULL) | ||
| 227 | return NULL; | ||
| 228 | |||
| 229 | if ((bag = PKCS12_SAFEBAG_create0_pkcs8(p8)) == NULL) { | ||
| 230 | X509_SIG_free(p8); | ||
| 231 | return NULL; | ||
| 232 | } | ||
| 233 | |||
| 234 | return bag; | ||
| 235 | } | ||
diff --git a/src/lib/libcrypto/pkcs12/p12_utl.c b/src/lib/libcrypto/pkcs12/p12_utl.c deleted file mode 100644 index 72692a9eae..0000000000 --- a/src/lib/libcrypto/pkcs12/p12_utl.c +++ /dev/null | |||
| @@ -1,157 +0,0 @@ | |||
| 1 | /* $OpenBSD: p12_utl.c,v 1.21 2023/02/16 08:38:17 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #include <limits.h> | ||
| 60 | #include <stdio.h> | ||
| 61 | #include <string.h> | ||
| 62 | |||
| 63 | #include <openssl/pkcs12.h> | ||
| 64 | |||
| 65 | #include "pkcs12_local.h" | ||
| 66 | |||
| 67 | /* Cheap and nasty Unicode stuff */ | ||
| 68 | |||
| 69 | unsigned char * | ||
| 70 | OPENSSL_asc2uni(const char *asc, int asclen, unsigned char **uni, int *unilen) | ||
| 71 | { | ||
| 72 | size_t ulen, i; | ||
| 73 | unsigned char *unitmp; | ||
| 74 | |||
| 75 | if (asclen < 0) | ||
| 76 | ulen = strlen(asc); | ||
| 77 | else | ||
| 78 | ulen = (size_t)asclen; | ||
| 79 | ulen++; | ||
| 80 | if (ulen == 0) /* unlikely overflow */ | ||
| 81 | return NULL; | ||
| 82 | if ((unitmp = reallocarray(NULL, ulen, 2)) == NULL) | ||
| 83 | return NULL; | ||
| 84 | ulen *= 2; | ||
| 85 | /* XXX This interface ought to use unsigned types */ | ||
| 86 | if (ulen > INT_MAX) { | ||
| 87 | free(unitmp); | ||
| 88 | return NULL; | ||
| 89 | } | ||
| 90 | for (i = 0; i < ulen - 2; i += 2) { | ||
| 91 | unitmp[i] = 0; | ||
| 92 | unitmp[i + 1] = *asc++; | ||
| 93 | } | ||
| 94 | /* Make result double-NUL terminated */ | ||
| 95 | unitmp[ulen - 2] = 0; | ||
| 96 | unitmp[ulen - 1] = 0; | ||
| 97 | if (unilen) | ||
| 98 | *unilen = ulen; | ||
| 99 | if (uni) | ||
| 100 | *uni = unitmp; | ||
| 101 | return unitmp; | ||
| 102 | } | ||
| 103 | LCRYPTO_ALIAS(OPENSSL_asc2uni); | ||
| 104 | |||
| 105 | char * | ||
| 106 | OPENSSL_uni2asc(const unsigned char *uni, int unilen) | ||
| 107 | { | ||
| 108 | size_t asclen, u16len, i; | ||
| 109 | char *asctmp; | ||
| 110 | |||
| 111 | if (unilen < 0) | ||
| 112 | return NULL; | ||
| 113 | |||
| 114 | asclen = u16len = (size_t)unilen / 2; | ||
| 115 | /* If no terminating NUL, allow for one */ | ||
| 116 | if (unilen == 0 || uni[unilen - 1] != '\0') | ||
| 117 | asclen++; | ||
| 118 | if ((asctmp = malloc(asclen)) == NULL) | ||
| 119 | return NULL; | ||
| 120 | /* Skip first zero byte */ | ||
| 121 | uni++; | ||
| 122 | for (i = 0; i < u16len; i++) { | ||
| 123 | asctmp[i] = *uni; | ||
| 124 | uni += 2; | ||
| 125 | } | ||
| 126 | asctmp[asclen - 1] = '\0'; | ||
| 127 | return asctmp; | ||
| 128 | } | ||
| 129 | LCRYPTO_ALIAS(OPENSSL_uni2asc); | ||
| 130 | |||
| 131 | int | ||
| 132 | i2d_PKCS12_bio(BIO *bp, PKCS12 *p12) | ||
| 133 | { | ||
| 134 | return ASN1_item_i2d_bio(&PKCS12_it, bp, p12); | ||
| 135 | } | ||
| 136 | LCRYPTO_ALIAS(i2d_PKCS12_bio); | ||
| 137 | |||
| 138 | int | ||
| 139 | i2d_PKCS12_fp(FILE *fp, PKCS12 *p12) | ||
| 140 | { | ||
| 141 | return ASN1_item_i2d_fp(&PKCS12_it, fp, p12); | ||
| 142 | } | ||
| 143 | LCRYPTO_ALIAS(i2d_PKCS12_fp); | ||
| 144 | |||
| 145 | PKCS12 * | ||
| 146 | d2i_PKCS12_bio(BIO *bp, PKCS12 **p12) | ||
| 147 | { | ||
| 148 | return ASN1_item_d2i_bio(&PKCS12_it, bp, p12); | ||
| 149 | } | ||
| 150 | LCRYPTO_ALIAS(d2i_PKCS12_bio); | ||
| 151 | |||
| 152 | PKCS12 * | ||
| 153 | d2i_PKCS12_fp(FILE *fp, PKCS12 **p12) | ||
| 154 | { | ||
| 155 | return ASN1_item_d2i_fp(&PKCS12_it, fp, p12); | ||
| 156 | } | ||
| 157 | LCRYPTO_ALIAS(d2i_PKCS12_fp); | ||
diff --git a/src/lib/libcrypto/pkcs12/pk12err.c b/src/lib/libcrypto/pkcs12/pk12err.c deleted file mode 100644 index c04c83c4f1..0000000000 --- a/src/lib/libcrypto/pkcs12/pk12err.c +++ /dev/null | |||
| @@ -1,113 +0,0 @@ | |||
| 1 | /* $OpenBSD: pk12err.c,v 1.15 2024/06/24 06:43:22 tb Exp $ */ | ||
| 2 | /* ==================================================================== | ||
| 3 | * Copyright (c) 1999-2006 The OpenSSL Project. All rights reserved. | ||
| 4 | * | ||
| 5 | * Redistribution and use in source and binary forms, with or without | ||
| 6 | * modification, are permitted provided that the following conditions | ||
| 7 | * are met: | ||
| 8 | * | ||
| 9 | * 1. Redistributions of source code must retain the above copyright | ||
| 10 | * notice, this list of conditions and the following disclaimer. | ||
| 11 | * | ||
| 12 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer in | ||
| 14 | * the documentation and/or other materials provided with the | ||
| 15 | * distribution. | ||
| 16 | * | ||
| 17 | * 3. All advertising materials mentioning features or use of this | ||
| 18 | * software must display the following acknowledgment: | ||
| 19 | * "This product includes software developed by the OpenSSL Project | ||
| 20 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 21 | * | ||
| 22 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 23 | * endorse or promote products derived from this software without | ||
| 24 | * prior written permission. For written permission, please contact | ||
| 25 | * openssl-core@OpenSSL.org. | ||
| 26 | * | ||
| 27 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 28 | * nor may "OpenSSL" appear in their names without prior written | ||
| 29 | * permission of the OpenSSL Project. | ||
| 30 | * | ||
| 31 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 32 | * acknowledgment: | ||
| 33 | * "This product includes software developed by the OpenSSL Project | ||
| 34 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 35 | * | ||
| 36 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 37 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 38 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 39 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 40 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 41 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 42 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 43 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 44 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 45 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 46 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 47 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 48 | * ==================================================================== | ||
| 49 | * | ||
| 50 | * This product includes cryptographic software written by Eric Young | ||
| 51 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 52 | * Hudson (tjh@cryptsoft.com). | ||
| 53 | * | ||
| 54 | */ | ||
| 55 | |||
| 56 | #include <stdio.h> | ||
| 57 | |||
| 58 | #include <openssl/opensslconf.h> | ||
| 59 | |||
| 60 | #include <openssl/err.h> | ||
| 61 | #include <openssl/pkcs12.h> | ||
| 62 | |||
| 63 | #include "err_local.h" | ||
| 64 | |||
| 65 | #ifndef OPENSSL_NO_ERR | ||
| 66 | |||
| 67 | #define ERR_FUNC(func) ERR_PACK(ERR_LIB_PKCS12,func,0) | ||
| 68 | #define ERR_REASON(reason) ERR_PACK(ERR_LIB_PKCS12,0,reason) | ||
| 69 | |||
| 70 | static const ERR_STRING_DATA PKCS12_str_functs[] = { | ||
| 71 | {ERR_FUNC(0xfff), "CRYPTO_internal"}, | ||
| 72 | {0, NULL} | ||
| 73 | }; | ||
| 74 | |||
| 75 | static const ERR_STRING_DATA PKCS12_str_reasons[] = { | ||
| 76 | {ERR_REASON(PKCS12_R_CANT_PACK_STRUCTURE), "cant pack structure"}, | ||
| 77 | {ERR_REASON(PKCS12_R_CONTENT_TYPE_NOT_DATA), "content type not data"}, | ||
| 78 | {ERR_REASON(PKCS12_R_DECODE_ERROR) , "decode error"}, | ||
| 79 | {ERR_REASON(PKCS12_R_ENCODE_ERROR) , "encode error"}, | ||
| 80 | {ERR_REASON(PKCS12_R_ENCRYPT_ERROR) , "encrypt error"}, | ||
| 81 | {ERR_REASON(PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE), "error setting encrypted data type"}, | ||
| 82 | {ERR_REASON(PKCS12_R_INVALID_NULL_ARGUMENT), "invalid null argument"}, | ||
| 83 | {ERR_REASON(PKCS12_R_INVALID_NULL_PKCS12_POINTER), "invalid null pkcs12 pointer"}, | ||
| 84 | {ERR_REASON(PKCS12_R_IV_GEN_ERROR) , "iv gen error"}, | ||
| 85 | {ERR_REASON(PKCS12_R_KEY_GEN_ERROR) , "key gen error"}, | ||
| 86 | {ERR_REASON(PKCS12_R_MAC_ABSENT) , "mac absent"}, | ||
| 87 | {ERR_REASON(PKCS12_R_MAC_GENERATION_ERROR), "mac generation error"}, | ||
| 88 | {ERR_REASON(PKCS12_R_MAC_SETUP_ERROR) , "mac setup error"}, | ||
| 89 | {ERR_REASON(PKCS12_R_MAC_STRING_SET_ERROR), "mac string set error"}, | ||
| 90 | {ERR_REASON(PKCS12_R_MAC_VERIFY_ERROR) , "mac verify error"}, | ||
| 91 | {ERR_REASON(PKCS12_R_MAC_VERIFY_FAILURE) , "mac verify failure"}, | ||
| 92 | {ERR_REASON(PKCS12_R_PARSE_ERROR) , "parse error"}, | ||
| 93 | {ERR_REASON(PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR), "pkcs12 algor cipherinit error"}, | ||
| 94 | {ERR_REASON(PKCS12_R_PKCS12_CIPHERFINAL_ERROR), "pkcs12 cipherfinal error"}, | ||
| 95 | {ERR_REASON(PKCS12_R_PKCS12_PBE_CRYPT_ERROR), "pkcs12 pbe crypt error"}, | ||
| 96 | {ERR_REASON(PKCS12_R_UNKNOWN_DIGEST_ALGORITHM), "unknown digest algorithm"}, | ||
| 97 | {ERR_REASON(PKCS12_R_UNSUPPORTED_PKCS12_MODE), "unsupported pkcs12 mode"}, | ||
| 98 | {0, NULL} | ||
| 99 | }; | ||
| 100 | |||
| 101 | #endif | ||
| 102 | |||
| 103 | void | ||
| 104 | ERR_load_PKCS12_strings(void) | ||
| 105 | { | ||
| 106 | #ifndef OPENSSL_NO_ERR | ||
| 107 | if (ERR_func_error_string(PKCS12_str_functs[0].error) == NULL) { | ||
| 108 | ERR_load_const_strings(PKCS12_str_functs); | ||
| 109 | ERR_load_const_strings(PKCS12_str_reasons); | ||
| 110 | } | ||
| 111 | #endif | ||
| 112 | } | ||
| 113 | LCRYPTO_ALIAS(ERR_load_PKCS12_strings); | ||
diff --git a/src/lib/libcrypto/pkcs12/pkcs12.h b/src/lib/libcrypto/pkcs12/pkcs12.h deleted file mode 100644 index 200712039b..0000000000 --- a/src/lib/libcrypto/pkcs12/pkcs12.h +++ /dev/null | |||
| @@ -1,284 +0,0 @@ | |||
| 1 | /* $OpenBSD: pkcs12.h,v 1.29 2025/03/09 15:45:52 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #ifndef HEADER_PKCS12_H | ||
| 60 | #define HEADER_PKCS12_H | ||
| 61 | |||
| 62 | #include <openssl/bio.h> | ||
| 63 | #include <openssl/x509.h> | ||
| 64 | |||
| 65 | #ifdef __cplusplus | ||
| 66 | extern "C" { | ||
| 67 | #endif | ||
| 68 | |||
| 69 | #define PKCS12_KEY_ID 1 | ||
| 70 | #define PKCS12_IV_ID 2 | ||
| 71 | #define PKCS12_MAC_ID 3 | ||
| 72 | |||
| 73 | /* Default iteration count */ | ||
| 74 | #ifndef PKCS12_DEFAULT_ITER | ||
| 75 | #define PKCS12_DEFAULT_ITER PKCS5_DEFAULT_ITER | ||
| 76 | #endif | ||
| 77 | |||
| 78 | #define PKCS12_MAC_KEY_LENGTH 20 | ||
| 79 | |||
| 80 | #define PKCS12_SALT_LEN 8 | ||
| 81 | |||
| 82 | /* Uncomment out next line for unicode password and names, otherwise ASCII */ | ||
| 83 | |||
| 84 | /*#define PBE_UNICODE*/ | ||
| 85 | |||
| 86 | #ifdef PBE_UNICODE | ||
| 87 | #define PKCS12_key_gen PKCS12_key_gen_uni | ||
| 88 | #define PKCS12_add_friendlyname PKCS12_add_friendlyname_uni | ||
| 89 | #else | ||
| 90 | #define PKCS12_key_gen PKCS12_key_gen_asc | ||
| 91 | #define PKCS12_add_friendlyname PKCS12_add_friendlyname_asc | ||
| 92 | #endif | ||
| 93 | |||
| 94 | /* MS key usage constants */ | ||
| 95 | |||
| 96 | #define KEY_EX 0x10 | ||
| 97 | #define KEY_SIG 0x80 | ||
| 98 | |||
| 99 | typedef struct PKCS12_MAC_DATA_st PKCS12_MAC_DATA; | ||
| 100 | |||
| 101 | typedef struct PKCS12_st PKCS12; | ||
| 102 | |||
| 103 | typedef struct PKCS12_SAFEBAG_st PKCS12_SAFEBAG; | ||
| 104 | |||
| 105 | DECLARE_STACK_OF(PKCS12_SAFEBAG) | ||
| 106 | DECLARE_PKCS12_STACK_OF(PKCS12_SAFEBAG) | ||
| 107 | |||
| 108 | typedef struct pkcs12_bag_st PKCS12_BAGS; | ||
| 109 | |||
| 110 | #define PKCS12_ERROR 0 | ||
| 111 | #define PKCS12_OK 1 | ||
| 112 | |||
| 113 | #ifndef LIBRESSL_INTERNAL | ||
| 114 | |||
| 115 | /* Compatibility macros */ | ||
| 116 | |||
| 117 | #define M_PKCS12_x5092certbag PKCS12_x5092certbag | ||
| 118 | #define M_PKCS12_x509crl2certbag PKCS12_x509crl2certbag | ||
| 119 | |||
| 120 | #define M_PKCS12_certbag2x509 PKCS12_certbag2x509 | ||
| 121 | #define M_PKCS12_certbag2x509crl PKCS12_certbag2x509crl | ||
| 122 | |||
| 123 | #define M_PKCS12_unpack_p7data PKCS12_unpack_p7data | ||
| 124 | #define M_PKCS12_pack_authsafes PKCS12_pack_authsafes | ||
| 125 | #define M_PKCS12_unpack_authsafes PKCS12_unpack_authsafes | ||
| 126 | #define M_PKCS12_unpack_p7encdata PKCS12_unpack_p7encdata | ||
| 127 | |||
| 128 | #define M_PKCS12_decrypt_skey PKCS12_decrypt_skey | ||
| 129 | #define M_PKCS8_decrypt PKCS8_decrypt | ||
| 130 | |||
| 131 | #endif /* !LIBRESSL_INTERNAL */ | ||
| 132 | |||
| 133 | #define M_PKCS12_bag_type PKCS12_bag_type | ||
| 134 | #define M_PKCS12_cert_bag_type PKCS12_cert_bag_type | ||
| 135 | #define M_PKCS12_crl_bag_type PKCS12_cert_bag_type | ||
| 136 | |||
| 137 | #define PKCS12_bag_type PKCS12_SAFEBAG_get_nid | ||
| 138 | #define PKCS12_cert_bag_type PKCS12_SAFEBAG_get_bag_nid | ||
| 139 | |||
| 140 | #define PKCS12_certbag2x509 PKCS12_SAFEBAG_get1_cert | ||
| 141 | #define PKCS12_certbag2x509crl PKCS12_SAFEBAG_get1_crl | ||
| 142 | |||
| 143 | #define PKCS12_x5092certbag PKCS12_SAFEBAG_create_cert | ||
| 144 | #define PKCS12_x509crl2certbag PKCS12_SAFEBAG_create_crl | ||
| 145 | #define PKCS12_MAKE_KEYBAG PKCS12_SAFEBAG_create0_p8inf | ||
| 146 | #define PKCS12_MAKE_SHKEYBAG PKCS12_SAFEBAG_create_pkcs8_encrypt | ||
| 147 | |||
| 148 | const ASN1_TYPE *PKCS12_SAFEBAG_get0_attr(const PKCS12_SAFEBAG *bag, | ||
| 149 | int attr_nid); | ||
| 150 | const STACK_OF(X509_ATTRIBUTE) * | ||
| 151 | PKCS12_SAFEBAG_get0_attrs(const PKCS12_SAFEBAG *bag); | ||
| 152 | int PKCS12_SAFEBAG_get_nid(const PKCS12_SAFEBAG *bag); | ||
| 153 | int PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag); | ||
| 154 | |||
| 155 | X509 *PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag); | ||
| 156 | X509_CRL *PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag); | ||
| 157 | |||
| 158 | ASN1_TYPE *PKCS8_get_attr(PKCS8_PRIV_KEY_INFO *p8, int attr_nid); | ||
| 159 | int PKCS12_mac_present(const PKCS12 *p12); | ||
| 160 | void PKCS12_get0_mac(const ASN1_OCTET_STRING **pmac, const X509_ALGOR **pmacalg, | ||
| 161 | const ASN1_OCTET_STRING **psalt, const ASN1_INTEGER **piter, | ||
| 162 | const PKCS12 *p12); | ||
| 163 | |||
| 164 | const PKCS8_PRIV_KEY_INFO *PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag); | ||
| 165 | const X509_SIG *PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag); | ||
| 166 | const STACK_OF(PKCS12_SAFEBAG) * | ||
| 167 | PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag); | ||
| 168 | const ASN1_OBJECT *PKCS12_SAFEBAG_get0_type(const PKCS12_SAFEBAG *bag); | ||
| 169 | |||
| 170 | PKCS8_PRIV_KEY_INFO *PKCS8_decrypt(const X509_SIG *p8, const char *pass, | ||
| 171 | int passlen); | ||
| 172 | PKCS8_PRIV_KEY_INFO *PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, | ||
| 173 | const char *pass, int passlen); | ||
| 174 | X509_SIG *PKCS8_encrypt(int pbe_nid, const EVP_CIPHER *cipher, | ||
| 175 | const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, | ||
| 176 | PKCS8_PRIV_KEY_INFO *p8); | ||
| 177 | |||
| 178 | STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7data(PKCS7 *p7); | ||
| 179 | STACK_OF(PKCS12_SAFEBAG) *PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, | ||
| 180 | int passlen); | ||
| 181 | STACK_OF(PKCS7) *PKCS12_unpack_authsafes(const PKCS12 *p12); | ||
| 182 | |||
| 183 | int PKCS8_add_keyusage(PKCS8_PRIV_KEY_INFO *p8, int usage); | ||
| 184 | char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag); | ||
| 185 | int PKCS12_key_gen_uni(unsigned char *pass, int passlen, unsigned char *salt, | ||
| 186 | int saltlen, int id, int iter, int n, unsigned char *out, | ||
| 187 | const EVP_MD *md_type); | ||
| 188 | int PKCS12_verify_mac(PKCS12 *p12, const char *pass, int passlen); | ||
| 189 | int PKCS12_set_mac(PKCS12 *p12, const char *pass, int passlen, | ||
| 190 | unsigned char *salt, int saltlen, int iter, | ||
| 191 | const EVP_MD *md_type); | ||
| 192 | |||
| 193 | unsigned char *OPENSSL_asc2uni(const char *asc, int asclen, | ||
| 194 | unsigned char **uni, int *unilen); | ||
| 195 | char *OPENSSL_uni2asc(const unsigned char *uni, int unilen); | ||
| 196 | |||
| 197 | PKCS12 *PKCS12_new(void); | ||
| 198 | void PKCS12_free(PKCS12 *a); | ||
| 199 | PKCS12 *d2i_PKCS12(PKCS12 **a, const unsigned char **in, long len); | ||
| 200 | int i2d_PKCS12(PKCS12 *a, unsigned char **out); | ||
| 201 | extern const ASN1_ITEM PKCS12_it; | ||
| 202 | |||
| 203 | PKCS12_SAFEBAG *PKCS12_SAFEBAG_new(void); | ||
| 204 | void PKCS12_SAFEBAG_free(PKCS12_SAFEBAG *a); | ||
| 205 | PKCS12_SAFEBAG *d2i_PKCS12_SAFEBAG(PKCS12_SAFEBAG **a, const unsigned char **in, long len); | ||
| 206 | int i2d_PKCS12_SAFEBAG(PKCS12_SAFEBAG *a, unsigned char **out); | ||
| 207 | extern const ASN1_ITEM PKCS12_SAFEBAG_it; | ||
| 208 | |||
| 209 | void PKCS12_PBE_add(void); | ||
| 210 | int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert, | ||
| 211 | STACK_OF(X509) **ca); | ||
| 212 | PKCS12 *PKCS12_create(const char *pass, const char *name, EVP_PKEY *pkey, | ||
| 213 | X509 *cert, STACK_OF(X509) *ca, int nid_key, int nid_cert, int iter, | ||
| 214 | int mac_iter, int keytype); | ||
| 215 | |||
| 216 | int i2d_PKCS12_bio(BIO *bp, PKCS12 *p12); | ||
| 217 | int i2d_PKCS12_fp(FILE *fp, PKCS12 *p12); | ||
| 218 | PKCS12 *d2i_PKCS12_bio(BIO *bp, PKCS12 **p12); | ||
| 219 | PKCS12 *d2i_PKCS12_fp(FILE *fp, PKCS12 **p12); | ||
| 220 | int PKCS12_newpass(PKCS12 *p12, const char *oldpass, const char *newpass); | ||
| 221 | |||
| 222 | void ERR_load_PKCS12_strings(void); | ||
| 223 | |||
| 224 | /* Error codes for the PKCS12 functions. */ | ||
| 225 | |||
| 226 | /* Function codes. */ | ||
| 227 | #define PKCS12_F_PARSE_BAG 129 | ||
| 228 | #define PKCS12_F_PARSE_BAGS 103 | ||
| 229 | #define PKCS12_F_PKCS12_ADD_FRIENDLYNAME 100 | ||
| 230 | #define PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC 127 | ||
| 231 | #define PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI 102 | ||
| 232 | #define PKCS12_F_PKCS12_ADD_LOCALKEYID 104 | ||
| 233 | #define PKCS12_F_PKCS12_CREATE 105 | ||
| 234 | #define PKCS12_F_PKCS12_GEN_MAC 107 | ||
| 235 | #define PKCS12_F_PKCS12_INIT 109 | ||
| 236 | #define PKCS12_F_PKCS12_ITEM_DECRYPT_D2I 106 | ||
| 237 | #define PKCS12_F_PKCS12_ITEM_I2D_ENCRYPT 108 | ||
| 238 | #define PKCS12_F_PKCS12_ITEM_PACK_SAFEBAG 117 | ||
| 239 | #define PKCS12_F_PKCS12_KEY_GEN_ASC 110 | ||
| 240 | #define PKCS12_F_PKCS12_KEY_GEN_UNI 111 | ||
| 241 | #define PKCS12_F_PKCS12_MAKE_KEYBAG 112 | ||
| 242 | #define PKCS12_F_PKCS12_MAKE_SHKEYBAG 113 | ||
| 243 | #define PKCS12_F_PKCS12_NEWPASS 128 | ||
| 244 | #define PKCS12_F_PKCS12_PACK_P7DATA 114 | ||
| 245 | #define PKCS12_F_PKCS12_PACK_P7ENCDATA 115 | ||
| 246 | #define PKCS12_F_PKCS12_PARSE 118 | ||
| 247 | #define PKCS12_F_PKCS12_PBE_CRYPT 119 | ||
| 248 | #define PKCS12_F_PKCS12_PBE_KEYIVGEN 120 | ||
| 249 | #define PKCS12_F_PKCS12_SETUP_MAC 122 | ||
| 250 | #define PKCS12_F_PKCS12_SET_MAC 123 | ||
| 251 | #define PKCS12_F_PKCS12_UNPACK_AUTHSAFES 130 | ||
| 252 | #define PKCS12_F_PKCS12_UNPACK_P7DATA 131 | ||
| 253 | #define PKCS12_F_PKCS12_VERIFY_MAC 126 | ||
| 254 | #define PKCS12_F_PKCS8_ADD_KEYUSAGE 124 | ||
| 255 | #define PKCS12_F_PKCS8_ENCRYPT 125 | ||
| 256 | |||
| 257 | /* Reason codes. */ | ||
| 258 | #define PKCS12_R_CANT_PACK_STRUCTURE 100 | ||
| 259 | #define PKCS12_R_CONTENT_TYPE_NOT_DATA 121 | ||
| 260 | #define PKCS12_R_DECODE_ERROR 101 | ||
| 261 | #define PKCS12_R_ENCODE_ERROR 102 | ||
| 262 | #define PKCS12_R_ENCRYPT_ERROR 103 | ||
| 263 | #define PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE 120 | ||
| 264 | #define PKCS12_R_INVALID_NULL_ARGUMENT 104 | ||
| 265 | #define PKCS12_R_INVALID_NULL_PKCS12_POINTER 105 | ||
| 266 | #define PKCS12_R_IV_GEN_ERROR 106 | ||
| 267 | #define PKCS12_R_KEY_GEN_ERROR 107 | ||
| 268 | #define PKCS12_R_MAC_ABSENT 108 | ||
| 269 | #define PKCS12_R_MAC_GENERATION_ERROR 109 | ||
| 270 | #define PKCS12_R_MAC_SETUP_ERROR 110 | ||
| 271 | #define PKCS12_R_MAC_STRING_SET_ERROR 111 | ||
| 272 | #define PKCS12_R_MAC_VERIFY_ERROR 112 | ||
| 273 | #define PKCS12_R_MAC_VERIFY_FAILURE 113 | ||
| 274 | #define PKCS12_R_PARSE_ERROR 114 | ||
| 275 | #define PKCS12_R_PKCS12_ALGOR_CIPHERINIT_ERROR 115 | ||
| 276 | #define PKCS12_R_PKCS12_CIPHERFINAL_ERROR 116 | ||
| 277 | #define PKCS12_R_PKCS12_PBE_CRYPT_ERROR 117 | ||
| 278 | #define PKCS12_R_UNKNOWN_DIGEST_ALGORITHM 118 | ||
| 279 | #define PKCS12_R_UNSUPPORTED_PKCS12_MODE 119 | ||
| 280 | |||
| 281 | #ifdef __cplusplus | ||
| 282 | } | ||
| 283 | #endif | ||
| 284 | #endif | ||
diff --git a/src/lib/libcrypto/pkcs12/pkcs12_local.h b/src/lib/libcrypto/pkcs12/pkcs12_local.h deleted file mode 100644 index 4a3ce4b3f0..0000000000 --- a/src/lib/libcrypto/pkcs12/pkcs12_local.h +++ /dev/null | |||
| @@ -1,174 +0,0 @@ | |||
| 1 | /* $OpenBSD: pkcs12_local.h,v 1.6 2025/03/09 15:45:52 tb Exp $ */ | ||
| 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | ||
| 3 | * project 1999. | ||
| 4 | */ | ||
| 5 | /* ==================================================================== | ||
| 6 | * Copyright (c) 1999 The OpenSSL Project. All rights reserved. | ||
| 7 | * | ||
| 8 | * Redistribution and use in source and binary forms, with or without | ||
| 9 | * modification, are permitted provided that the following conditions | ||
| 10 | * are met: | ||
| 11 | * | ||
| 12 | * 1. Redistributions of source code must retain the above copyright | ||
| 13 | * notice, this list of conditions and the following disclaimer. | ||
| 14 | * | ||
| 15 | * 2. Redistributions in binary form must reproduce the above copyright | ||
| 16 | * notice, this list of conditions and the following disclaimer in | ||
| 17 | * the documentation and/or other materials provided with the | ||
| 18 | * distribution. | ||
| 19 | * | ||
| 20 | * 3. All advertising materials mentioning features or use of this | ||
| 21 | * software must display the following acknowledgment: | ||
| 22 | * "This product includes software developed by the OpenSSL Project | ||
| 23 | * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" | ||
| 24 | * | ||
| 25 | * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to | ||
| 26 | * endorse or promote products derived from this software without | ||
| 27 | * prior written permission. For written permission, please contact | ||
| 28 | * licensing@OpenSSL.org. | ||
| 29 | * | ||
| 30 | * 5. Products derived from this software may not be called "OpenSSL" | ||
| 31 | * nor may "OpenSSL" appear in their names without prior written | ||
| 32 | * permission of the OpenSSL Project. | ||
| 33 | * | ||
| 34 | * 6. Redistributions of any form whatsoever must retain the following | ||
| 35 | * acknowledgment: | ||
| 36 | * "This product includes software developed by the OpenSSL Project | ||
| 37 | * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" | ||
| 38 | * | ||
| 39 | * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY | ||
| 40 | * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | ||
| 41 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR | ||
| 42 | * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR | ||
| 43 | * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | ||
| 44 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT | ||
| 45 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; | ||
| 46 | * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | ||
| 47 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, | ||
| 48 | * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) | ||
| 49 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED | ||
| 50 | * OF THE POSSIBILITY OF SUCH DAMAGE. | ||
| 51 | * ==================================================================== | ||
| 52 | * | ||
| 53 | * This product includes cryptographic software written by Eric Young | ||
| 54 | * (eay@cryptsoft.com). This product includes software written by Tim | ||
| 55 | * Hudson (tjh@cryptsoft.com). | ||
| 56 | * | ||
| 57 | */ | ||
| 58 | |||
| 59 | #ifndef HEADER_PKCS12_LOCAL_H | ||
| 60 | #define HEADER_PKCS12_LOCAL_H | ||
| 61 | |||
| 62 | __BEGIN_HIDDEN_DECLS | ||
| 63 | |||
| 64 | struct PKCS12_MAC_DATA_st { | ||
| 65 | X509_SIG *dinfo; | ||
| 66 | ASN1_OCTET_STRING *salt; | ||
| 67 | ASN1_INTEGER *iter; /* defaults to 1 */ | ||
| 68 | }; | ||
| 69 | |||
| 70 | struct PKCS12_st { | ||
| 71 | ASN1_INTEGER *version; | ||
| 72 | PKCS12_MAC_DATA *mac; | ||
| 73 | PKCS7 *authsafes; | ||
| 74 | }; | ||
| 75 | |||
| 76 | struct PKCS12_SAFEBAG_st { | ||
| 77 | ASN1_OBJECT *type; | ||
| 78 | union { | ||
| 79 | struct pkcs12_bag_st *bag; /* secret, crl and certbag */ | ||
| 80 | struct pkcs8_priv_key_info_st *keybag; /* keybag */ | ||
| 81 | X509_SIG *shkeybag; /* shrouded key bag */ | ||
| 82 | STACK_OF(PKCS12_SAFEBAG) *safes; | ||
| 83 | ASN1_TYPE *other; | ||
| 84 | } value; | ||
| 85 | STACK_OF(X509_ATTRIBUTE) *attrib; | ||
| 86 | }; | ||
| 87 | |||
| 88 | struct pkcs12_bag_st { | ||
| 89 | ASN1_OBJECT *type; | ||
| 90 | union { | ||
| 91 | ASN1_OCTET_STRING *x509cert; | ||
| 92 | ASN1_OCTET_STRING *x509crl; | ||
| 93 | ASN1_OCTET_STRING *octet; | ||
| 94 | ASN1_IA5STRING *sdsicert; | ||
| 95 | ASN1_TYPE *other; /* Secret or other bag */ | ||
| 96 | } value; | ||
| 97 | }; | ||
| 98 | |||
| 99 | extern const ASN1_ITEM PKCS12_SAFEBAGS_it; | ||
| 100 | extern const ASN1_ITEM PKCS12_AUTHSAFES_it; | ||
| 101 | |||
| 102 | PKCS12_BAGS *PKCS12_BAGS_new(void); | ||
| 103 | void PKCS12_BAGS_free(PKCS12_BAGS *a); | ||
| 104 | PKCS12_BAGS *d2i_PKCS12_BAGS(PKCS12_BAGS **a, const unsigned char **in, long len); | ||
| 105 | int i2d_PKCS12_BAGS(PKCS12_BAGS *a, unsigned char **out); | ||
| 106 | extern const ASN1_ITEM PKCS12_BAGS_it; | ||
| 107 | |||
| 108 | PKCS12_MAC_DATA *PKCS12_MAC_DATA_new(void); | ||
| 109 | void PKCS12_MAC_DATA_free(PKCS12_MAC_DATA *a); | ||
| 110 | PKCS12_MAC_DATA *d2i_PKCS12_MAC_DATA(PKCS12_MAC_DATA **a, const unsigned char **in, long len); | ||
| 111 | int i2d_PKCS12_MAC_DATA(PKCS12_MAC_DATA *a, unsigned char **out); | ||
| 112 | extern const ASN1_ITEM PKCS12_MAC_DATA_it; | ||
| 113 | |||
| 114 | PKCS12_SAFEBAG *PKCS12_SAFEBAG_create0_p8inf(PKCS8_PRIV_KEY_INFO *p8); | ||
| 115 | PKCS12_SAFEBAG *PKCS12_SAFEBAG_create0_pkcs8(X509_SIG *p8); | ||
| 116 | PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_cert(X509 *x509); | ||
| 117 | PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_crl(X509_CRL *crl); | ||
| 118 | PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid, | ||
| 119 | const char *pass, int passlen, unsigned char *salt, int saltlen, int iter, | ||
| 120 | PKCS8_PRIV_KEY_INFO *p8); | ||
| 121 | |||
| 122 | PKCS12_SAFEBAG *PKCS12_add_cert(STACK_OF(PKCS12_SAFEBAG) **pbags, X509 *cert); | ||
| 123 | PKCS12_SAFEBAG *PKCS12_add_key(STACK_OF(PKCS12_SAFEBAG) **pbags, EVP_PKEY *key, | ||
| 124 | int key_usage, int iter, int key_nid, const char *pass); | ||
| 125 | int PKCS12_add_safe(STACK_OF(PKCS7) **psafes, STACK_OF(PKCS12_SAFEBAG) *bags, | ||
| 126 | int safe_nid, int iter, const char *pass); | ||
| 127 | PKCS12 *PKCS12_add_safes(STACK_OF(PKCS7) *safes, int p7_nid); | ||
| 128 | |||
| 129 | int PKCS12_add_CSPName_asc(PKCS12_SAFEBAG *bag, const char *name, | ||
| 130 | int namelen); | ||
| 131 | int PKCS12_add_friendlyname_asc(PKCS12_SAFEBAG *bag, const char *name, | ||
| 132 | int namelen); | ||
| 133 | int PKCS12_add_friendlyname_uni(PKCS12_SAFEBAG *bag, const unsigned char *name, | ||
| 134 | int namelen); | ||
| 135 | int PKCS12_add_localkeyid(PKCS12_SAFEBAG *bag, unsigned char *name, | ||
| 136 | int namelen); | ||
| 137 | |||
| 138 | int PKCS12_gen_mac(PKCS12 *p12, const char *pass, int passlen, | ||
| 139 | unsigned char *mac, unsigned int *maclen); | ||
| 140 | |||
| 141 | ASN1_TYPE *PKCS12_get_attr_gen(const STACK_OF(X509_ATTRIBUTE) *attrs, | ||
| 142 | int attr_nid); | ||
| 143 | |||
| 144 | PKCS12 *PKCS12_init(int mode); | ||
| 145 | |||
| 146 | void *PKCS12_item_decrypt_d2i(const X509_ALGOR *algor, const ASN1_ITEM *it, | ||
| 147 | const char *pass, int passlen, const ASN1_OCTET_STRING *oct, int zbuf); | ||
| 148 | ASN1_OCTET_STRING *PKCS12_item_i2d_encrypt(X509_ALGOR *algor, | ||
| 149 | const ASN1_ITEM *it, const char *pass, int passlen, void *obj, int zbuf); | ||
| 150 | PKCS12_SAFEBAG *PKCS12_item_pack_safebag(void *obj, const ASN1_ITEM *it, | ||
| 151 | int nid1, int nid2); | ||
| 152 | |||
| 153 | int PKCS12_key_gen_asc(const char *pass, int passlen, unsigned char *salt, | ||
| 154 | int saltlen, int id, int iter, int n, unsigned char *out, | ||
| 155 | const EVP_MD *md_type); | ||
| 156 | |||
| 157 | int PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes); | ||
| 158 | PKCS7 *PKCS12_pack_p7data(STACK_OF(PKCS12_SAFEBAG) *sk); | ||
| 159 | PKCS7 *PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen, | ||
| 160 | unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags); | ||
| 161 | |||
| 162 | unsigned char *PKCS12_pbe_crypt(const X509_ALGOR *algor, const char *pass, | ||
| 163 | int passlen, const unsigned char *in, int inlen, unsigned char **data, | ||
| 164 | int *datalen, int en_de); | ||
| 165 | |||
| 166 | int PKCS12_setup_mac(PKCS12 *p12, int iter, unsigned char *salt, | ||
| 167 | int saltlen, const EVP_MD *md_type); | ||
| 168 | |||
| 169 | /* XXX - should go into pkcs7_local.h. */ | ||
| 170 | ASN1_OCTET_STRING *PKCS7_get_octet_string(PKCS7 *p7); | ||
| 171 | |||
| 172 | __END_HIDDEN_DECLS | ||
| 173 | |||
| 174 | #endif /* !HEADER_PKCS12_LOCAL_H */ | ||
