diff options
Diffstat (limited to 'src/lib/libcrypto/pkcs7/pk7_doit.c')
-rw-r--r-- | src/lib/libcrypto/pkcs7/pk7_doit.c | 134 |
1 files changed, 53 insertions, 81 deletions
diff --git a/src/lib/libcrypto/pkcs7/pk7_doit.c b/src/lib/libcrypto/pkcs7/pk7_doit.c index e84eee6d8f..484620a686 100644 --- a/src/lib/libcrypto/pkcs7/pk7_doit.c +++ b/src/lib/libcrypto/pkcs7/pk7_doit.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: pk7_doit.c,v 1.40 2016/12/30 15:38:13 jsing Exp $ */ | 1 | /* $OpenBSD: pk7_doit.c,v 1.41 2017/01/29 17:49:23 beck Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -110,14 +110,13 @@ PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg) | |||
110 | BIO *btmp; | 110 | BIO *btmp; |
111 | const EVP_MD *md; | 111 | const EVP_MD *md; |
112 | if ((btmp = BIO_new(BIO_f_md())) == NULL) { | 112 | if ((btmp = BIO_new(BIO_f_md())) == NULL) { |
113 | PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST, ERR_R_BIO_LIB); | 113 | PKCS7error(ERR_R_BIO_LIB); |
114 | goto err; | 114 | goto err; |
115 | } | 115 | } |
116 | 116 | ||
117 | md = EVP_get_digestbyobj(alg->algorithm); | 117 | md = EVP_get_digestbyobj(alg->algorithm); |
118 | if (md == NULL) { | 118 | if (md == NULL) { |
119 | PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST, | 119 | PKCS7error(PKCS7_R_UNKNOWN_DIGEST_TYPE); |
120 | PKCS7_R_UNKNOWN_DIGEST_TYPE); | ||
121 | goto err; | 120 | goto err; |
122 | } | 121 | } |
123 | 122 | ||
@@ -125,7 +124,7 @@ PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg) | |||
125 | if (*pbio == NULL) | 124 | if (*pbio == NULL) |
126 | *pbio = btmp; | 125 | *pbio = btmp; |
127 | else if (!BIO_push(*pbio, btmp)) { | 126 | else if (!BIO_push(*pbio, btmp)) { |
128 | PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST, ERR_R_BIO_LIB); | 127 | PKCS7error(ERR_R_BIO_LIB); |
129 | goto err; | 128 | goto err; |
130 | } | 129 | } |
131 | btmp = NULL; | 130 | btmp = NULL; |
@@ -160,7 +159,7 @@ pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, unsigned char *key, int keylen) | |||
160 | 159 | ||
161 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_ENCRYPT, | 160 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_ENCRYPT, |
162 | EVP_PKEY_CTRL_PKCS7_ENCRYPT, 0, ri) <= 0) { | 161 | EVP_PKEY_CTRL_PKCS7_ENCRYPT, 0, ri) <= 0) { |
163 | PKCS7err(PKCS7_F_PKCS7_ENCODE_RINFO, PKCS7_R_CTRL_ERROR); | 162 | PKCS7error(PKCS7_R_CTRL_ERROR); |
164 | goto err; | 163 | goto err; |
165 | } | 164 | } |
166 | 165 | ||
@@ -170,7 +169,7 @@ pkcs7_encode_rinfo(PKCS7_RECIP_INFO *ri, unsigned char *key, int keylen) | |||
170 | ek = malloc(eklen); | 169 | ek = malloc(eklen); |
171 | 170 | ||
172 | if (ek == NULL) { | 171 | if (ek == NULL) { |
173 | PKCS7err(PKCS7_F_PKCS7_ENCODE_RINFO, ERR_R_MALLOC_FAILURE); | 172 | PKCS7error(ERR_R_MALLOC_FAILURE); |
174 | goto err; | 173 | goto err; |
175 | } | 174 | } |
176 | 175 | ||
@@ -209,7 +208,7 @@ pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, | |||
209 | 208 | ||
210 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_DECRYPT, | 209 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_DECRYPT, |
211 | EVP_PKEY_CTRL_PKCS7_DECRYPT, 0, ri) <= 0) { | 210 | EVP_PKEY_CTRL_PKCS7_DECRYPT, 0, ri) <= 0) { |
212 | PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, PKCS7_R_CTRL_ERROR); | 211 | PKCS7error(PKCS7_R_CTRL_ERROR); |
213 | goto err; | 212 | goto err; |
214 | } | 213 | } |
215 | 214 | ||
@@ -219,14 +218,14 @@ pkcs7_decrypt_rinfo(unsigned char **pek, int *peklen, PKCS7_RECIP_INFO *ri, | |||
219 | 218 | ||
220 | ek = malloc(eklen); | 219 | ek = malloc(eklen); |
221 | if (ek == NULL) { | 220 | if (ek == NULL) { |
222 | PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, ERR_R_MALLOC_FAILURE); | 221 | PKCS7error(ERR_R_MALLOC_FAILURE); |
223 | goto err; | 222 | goto err; |
224 | } | 223 | } |
225 | 224 | ||
226 | if (EVP_PKEY_decrypt(pctx, ek, &eklen, | 225 | if (EVP_PKEY_decrypt(pctx, ek, &eklen, |
227 | ri->enc_key->data, ri->enc_key->length) <= 0) { | 226 | ri->enc_key->data, ri->enc_key->length) <= 0) { |
228 | ret = 0; | 227 | ret = 0; |
229 | PKCS7err(PKCS7_F_PKCS7_DECRYPT_RINFO, ERR_R_EVP_LIB); | 228 | PKCS7error(ERR_R_EVP_LIB); |
230 | goto err; | 229 | goto err; |
231 | } | 230 | } |
232 | 231 | ||
@@ -262,7 +261,7 @@ PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |||
262 | ASN1_OCTET_STRING *os = NULL; | 261 | ASN1_OCTET_STRING *os = NULL; |
263 | 262 | ||
264 | if (p7 == NULL) { | 263 | if (p7 == NULL) { |
265 | PKCS7err(PKCS7_F_PKCS7_DATAINIT, PKCS7_R_INVALID_NULL_POINTER); | 264 | PKCS7error(PKCS7_R_INVALID_NULL_POINTER); |
266 | return NULL; | 265 | return NULL; |
267 | } | 266 | } |
268 | 267 | ||
@@ -279,7 +278,7 @@ PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |||
279 | * an error. | 278 | * an error. |
280 | */ | 279 | */ |
281 | if (p7->d.ptr == NULL) { | 280 | if (p7->d.ptr == NULL) { |
282 | PKCS7err(PKCS7_F_PKCS7_DATAINIT, PKCS7_R_NO_CONTENT); | 281 | PKCS7error(PKCS7_R_NO_CONTENT); |
283 | return NULL; | 282 | return NULL; |
284 | } | 283 | } |
285 | 284 | ||
@@ -297,8 +296,7 @@ PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |||
297 | xalg = p7->d.signed_and_enveloped->enc_data->algorithm; | 296 | xalg = p7->d.signed_and_enveloped->enc_data->algorithm; |
298 | evp_cipher = p7->d.signed_and_enveloped->enc_data->cipher; | 297 | evp_cipher = p7->d.signed_and_enveloped->enc_data->cipher; |
299 | if (evp_cipher == NULL) { | 298 | if (evp_cipher == NULL) { |
300 | PKCS7err(PKCS7_F_PKCS7_DATAINIT, | 299 | PKCS7error(PKCS7_R_CIPHER_NOT_INITIALIZED); |
301 | PKCS7_R_CIPHER_NOT_INITIALIZED); | ||
302 | goto err; | 300 | goto err; |
303 | } | 301 | } |
304 | break; | 302 | break; |
@@ -307,8 +305,7 @@ PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |||
307 | xalg = p7->d.enveloped->enc_data->algorithm; | 305 | xalg = p7->d.enveloped->enc_data->algorithm; |
308 | evp_cipher = p7->d.enveloped->enc_data->cipher; | 306 | evp_cipher = p7->d.enveloped->enc_data->cipher; |
309 | if (evp_cipher == NULL) { | 307 | if (evp_cipher == NULL) { |
310 | PKCS7err(PKCS7_F_PKCS7_DATAINIT, | 308 | PKCS7error(PKCS7_R_CIPHER_NOT_INITIALIZED); |
311 | PKCS7_R_CIPHER_NOT_INITIALIZED); | ||
312 | goto err; | 309 | goto err; |
313 | } | 310 | } |
314 | break; | 311 | break; |
@@ -319,8 +316,7 @@ PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |||
319 | case NID_pkcs7_data: | 316 | case NID_pkcs7_data: |
320 | break; | 317 | break; |
321 | default: | 318 | default: |
322 | PKCS7err(PKCS7_F_PKCS7_DATAINIT, | 319 | PKCS7error(PKCS7_R_UNSUPPORTED_CONTENT_TYPE); |
323 | PKCS7_R_UNSUPPORTED_CONTENT_TYPE); | ||
324 | goto err; | 320 | goto err; |
325 | } | 321 | } |
326 | 322 | ||
@@ -338,7 +334,7 @@ PKCS7_dataInit(PKCS7 *p7, BIO *bio) | |||
338 | EVP_CIPHER_CTX *ctx; | 334 | EVP_CIPHER_CTX *ctx; |
339 | 335 | ||
340 | if ((btmp = BIO_new(BIO_f_cipher())) == NULL) { | 336 | if ((btmp = BIO_new(BIO_f_cipher())) == NULL) { |
341 | PKCS7err(PKCS7_F_PKCS7_DATAINIT, ERR_R_BIO_LIB); | 337 | PKCS7error(ERR_R_BIO_LIB); |
342 | goto err; | 338 | goto err; |
343 | } | 339 | } |
344 | BIO_get_cipher_ctx(btmp, &ctx); | 340 | BIO_get_cipher_ctx(btmp, &ctx); |
@@ -440,13 +436,12 @@ PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
440 | int eklen = 0, tkeylen = 0; | 436 | int eklen = 0, tkeylen = 0; |
441 | 437 | ||
442 | if (p7 == NULL) { | 438 | if (p7 == NULL) { |
443 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 439 | PKCS7error(PKCS7_R_INVALID_NULL_POINTER); |
444 | PKCS7_R_INVALID_NULL_POINTER); | ||
445 | return NULL; | 440 | return NULL; |
446 | } | 441 | } |
447 | 442 | ||
448 | if (p7->d.ptr == NULL) { | 443 | if (p7->d.ptr == NULL) { |
449 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, PKCS7_R_NO_CONTENT); | 444 | PKCS7error(PKCS7_R_NO_CONTENT); |
450 | return NULL; | 445 | return NULL; |
451 | } | 446 | } |
452 | 447 | ||
@@ -465,8 +460,7 @@ PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
465 | enc_alg = p7->d.signed_and_enveloped->enc_data->algorithm; | 460 | enc_alg = p7->d.signed_and_enveloped->enc_data->algorithm; |
466 | evp_cipher = EVP_get_cipherbyobj(enc_alg->algorithm); | 461 | evp_cipher = EVP_get_cipherbyobj(enc_alg->algorithm); |
467 | if (evp_cipher == NULL) { | 462 | if (evp_cipher == NULL) { |
468 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 463 | PKCS7error(PKCS7_R_UNSUPPORTED_CIPHER_TYPE); |
469 | PKCS7_R_UNSUPPORTED_CIPHER_TYPE); | ||
470 | goto err; | 464 | goto err; |
471 | } | 465 | } |
472 | break; | 466 | break; |
@@ -476,14 +470,12 @@ PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
476 | data_body = p7->d.enveloped->enc_data->enc_data; | 470 | data_body = p7->d.enveloped->enc_data->enc_data; |
477 | evp_cipher = EVP_get_cipherbyobj(enc_alg->algorithm); | 471 | evp_cipher = EVP_get_cipherbyobj(enc_alg->algorithm); |
478 | if (evp_cipher == NULL) { | 472 | if (evp_cipher == NULL) { |
479 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 473 | PKCS7error(PKCS7_R_UNSUPPORTED_CIPHER_TYPE); |
480 | PKCS7_R_UNSUPPORTED_CIPHER_TYPE); | ||
481 | goto err; | 474 | goto err; |
482 | } | 475 | } |
483 | break; | 476 | break; |
484 | default: | 477 | default: |
485 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 478 | PKCS7error(PKCS7_R_UNSUPPORTED_CONTENT_TYPE); |
486 | PKCS7_R_UNSUPPORTED_CONTENT_TYPE); | ||
487 | goto err; | 479 | goto err; |
488 | } | 480 | } |
489 | 481 | ||
@@ -492,16 +484,14 @@ PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
492 | for (i = 0; i < sk_X509_ALGOR_num(md_sk); i++) { | 484 | for (i = 0; i < sk_X509_ALGOR_num(md_sk); i++) { |
493 | xa = sk_X509_ALGOR_value(md_sk, i); | 485 | xa = sk_X509_ALGOR_value(md_sk, i); |
494 | if ((btmp = BIO_new(BIO_f_md())) == NULL) { | 486 | if ((btmp = BIO_new(BIO_f_md())) == NULL) { |
495 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 487 | PKCS7error(ERR_R_BIO_LIB); |
496 | ERR_R_BIO_LIB); | ||
497 | goto err; | 488 | goto err; |
498 | } | 489 | } |
499 | 490 | ||
500 | j = OBJ_obj2nid(xa->algorithm); | 491 | j = OBJ_obj2nid(xa->algorithm); |
501 | evp_md = EVP_get_digestbynid(j); | 492 | evp_md = EVP_get_digestbynid(j); |
502 | if (evp_md == NULL) { | 493 | if (evp_md == NULL) { |
503 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 494 | PKCS7error(PKCS7_R_UNKNOWN_DIGEST_TYPE); |
504 | PKCS7_R_UNKNOWN_DIGEST_TYPE); | ||
505 | goto err; | 495 | goto err; |
506 | } | 496 | } |
507 | 497 | ||
@@ -516,7 +506,7 @@ PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
516 | 506 | ||
517 | if (evp_cipher != NULL) { | 507 | if (evp_cipher != NULL) { |
518 | if ((etmp = BIO_new(BIO_f_cipher())) == NULL) { | 508 | if ((etmp = BIO_new(BIO_f_cipher())) == NULL) { |
519 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, ERR_R_BIO_LIB); | 509 | PKCS7error(ERR_R_BIO_LIB); |
520 | goto err; | 510 | goto err; |
521 | } | 511 | } |
522 | 512 | ||
@@ -534,8 +524,7 @@ PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert) | |||
534 | ri = NULL; | 524 | ri = NULL; |
535 | } | 525 | } |
536 | if (ri == NULL) { | 526 | if (ri == NULL) { |
537 | PKCS7err(PKCS7_F_PKCS7_DATADECODE, | 527 | PKCS7error(PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE); |
538 | PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE); | ||
539 | goto err; | 528 | goto err; |
540 | } | 529 | } |
541 | } | 530 | } |
@@ -659,14 +648,12 @@ PKCS7_find_digest(EVP_MD_CTX **pmd, BIO *bio, int nid) | |||
659 | for (;;) { | 648 | for (;;) { |
660 | bio = BIO_find_type(bio, BIO_TYPE_MD); | 649 | bio = BIO_find_type(bio, BIO_TYPE_MD); |
661 | if (bio == NULL) { | 650 | if (bio == NULL) { |
662 | PKCS7err(PKCS7_F_PKCS7_FIND_DIGEST, | 651 | PKCS7error(PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); |
663 | PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); | ||
664 | return NULL; | 652 | return NULL; |
665 | } | 653 | } |
666 | BIO_get_md_ctx(bio, pmd); | 654 | BIO_get_md_ctx(bio, pmd); |
667 | if (*pmd == NULL) { | 655 | if (*pmd == NULL) { |
668 | PKCS7err(PKCS7_F_PKCS7_FIND_DIGEST, | 656 | PKCS7error(ERR_R_INTERNAL_ERROR); |
669 | ERR_R_INTERNAL_ERROR); | ||
670 | return NULL; | 657 | return NULL; |
671 | } | 658 | } |
672 | if (EVP_MD_CTX_type(*pmd) == nid) | 659 | if (EVP_MD_CTX_type(*pmd) == nid) |
@@ -685,19 +672,18 @@ do_pkcs7_signed_attrib(PKCS7_SIGNER_INFO *si, EVP_MD_CTX *mctx) | |||
685 | /* Add signing time if not already present */ | 672 | /* Add signing time if not already present */ |
686 | if (!PKCS7_get_signed_attribute(si, NID_pkcs9_signingTime)) { | 673 | if (!PKCS7_get_signed_attribute(si, NID_pkcs9_signingTime)) { |
687 | if (!PKCS7_add0_attrib_signing_time(si, NULL)) { | 674 | if (!PKCS7_add0_attrib_signing_time(si, NULL)) { |
688 | PKCS7err(PKCS7_F_DO_PKCS7_SIGNED_ATTRIB, | 675 | PKCS7error(ERR_R_MALLOC_FAILURE); |
689 | ERR_R_MALLOC_FAILURE); | ||
690 | return 0; | 676 | return 0; |
691 | } | 677 | } |
692 | } | 678 | } |
693 | 679 | ||
694 | /* Add digest */ | 680 | /* Add digest */ |
695 | if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { | 681 | if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { |
696 | PKCS7err(PKCS7_F_DO_PKCS7_SIGNED_ATTRIB, ERR_R_EVP_LIB); | 682 | PKCS7error(ERR_R_EVP_LIB); |
697 | return 0; | 683 | return 0; |
698 | } | 684 | } |
699 | if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { | 685 | if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { |
700 | PKCS7err(PKCS7_F_DO_PKCS7_SIGNED_ATTRIB, ERR_R_MALLOC_FAILURE); | 686 | PKCS7error(ERR_R_MALLOC_FAILURE); |
701 | return 0; | 687 | return 0; |
702 | } | 688 | } |
703 | 689 | ||
@@ -722,13 +708,12 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
722 | ASN1_OCTET_STRING *os = NULL; | 708 | ASN1_OCTET_STRING *os = NULL; |
723 | 709 | ||
724 | if (p7 == NULL) { | 710 | if (p7 == NULL) { |
725 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | 711 | PKCS7error(PKCS7_R_INVALID_NULL_POINTER); |
726 | PKCS7_R_INVALID_NULL_POINTER); | ||
727 | return 0; | 712 | return 0; |
728 | } | 713 | } |
729 | 714 | ||
730 | if (p7->d.ptr == NULL) { | 715 | if (p7->d.ptr == NULL) { |
731 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, PKCS7_R_NO_CONTENT); | 716 | PKCS7error(PKCS7_R_NO_CONTENT); |
732 | return 0; | 717 | return 0; |
733 | } | 718 | } |
734 | 719 | ||
@@ -747,8 +732,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
747 | if (!os) { | 732 | if (!os) { |
748 | os = ASN1_OCTET_STRING_new(); | 733 | os = ASN1_OCTET_STRING_new(); |
749 | if (!os) { | 734 | if (!os) { |
750 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | 735 | PKCS7error(ERR_R_MALLOC_FAILURE); |
751 | ERR_R_MALLOC_FAILURE); | ||
752 | goto err; | 736 | goto err; |
753 | } | 737 | } |
754 | p7->d.signed_and_enveloped->enc_data->enc_data = os; | 738 | p7->d.signed_and_enveloped->enc_data->enc_data = os; |
@@ -760,8 +744,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
760 | if (!os) { | 744 | if (!os) { |
761 | os = ASN1_OCTET_STRING_new(); | 745 | os = ASN1_OCTET_STRING_new(); |
762 | if (!os) { | 746 | if (!os) { |
763 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | 747 | PKCS7error(ERR_R_MALLOC_FAILURE); |
764 | ERR_R_MALLOC_FAILURE); | ||
765 | goto err; | 748 | goto err; |
766 | } | 749 | } |
767 | p7->d.enveloped->enc_data->enc_data = os; | 750 | p7->d.enveloped->enc_data->enc_data = os; |
@@ -771,7 +754,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
771 | si_sk = p7->d.sign->signer_info; | 754 | si_sk = p7->d.sign->signer_info; |
772 | os = PKCS7_get_octet_string(p7->d.sign->contents); | 755 | os = PKCS7_get_octet_string(p7->d.sign->contents); |
773 | if (!PKCS7_is_detached(p7) && os == NULL) { | 756 | if (!PKCS7_is_detached(p7) && os == NULL) { |
774 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, PKCS7_R_DECODE_ERROR); | 757 | PKCS7error(PKCS7_R_DECODE_ERROR); |
775 | goto err; | 758 | goto err; |
776 | } | 759 | } |
777 | /* If detached data then the content is excluded */ | 760 | /* If detached data then the content is excluded */ |
@@ -785,7 +768,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
785 | case NID_pkcs7_digest: | 768 | case NID_pkcs7_digest: |
786 | os = PKCS7_get_octet_string(p7->d.digest->contents); | 769 | os = PKCS7_get_octet_string(p7->d.digest->contents); |
787 | if (os == NULL) { | 770 | if (os == NULL) { |
788 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, PKCS7_R_DECODE_ERROR); | 771 | PKCS7error(PKCS7_R_DECODE_ERROR); |
789 | goto err; | 772 | goto err; |
790 | } | 773 | } |
791 | /* If detached data then the content is excluded */ | 774 | /* If detached data then the content is excluded */ |
@@ -798,8 +781,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
798 | break; | 781 | break; |
799 | 782 | ||
800 | default: | 783 | default: |
801 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | 784 | PKCS7error(PKCS7_R_UNSUPPORTED_CONTENT_TYPE); |
802 | PKCS7_R_UNSUPPORTED_CONTENT_TYPE); | ||
803 | goto err; | 785 | goto err; |
804 | } | 786 | } |
805 | 787 | ||
@@ -836,8 +818,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
836 | 818 | ||
837 | if (!EVP_SignFinal(&ctx_tmp, abuf, &abuflen, | 819 | if (!EVP_SignFinal(&ctx_tmp, abuf, &abuflen, |
838 | si->pkey)) { | 820 | si->pkey)) { |
839 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | 821 | PKCS7error(ERR_R_EVP_LIB); |
840 | ERR_R_EVP_LIB); | ||
841 | goto err; | 822 | goto err; |
842 | } | 823 | } |
843 | ASN1_STRING_set0(si->enc_digest, abuf, abuflen); | 824 | ASN1_STRING_set0(si->enc_digest, abuf, abuflen); |
@@ -870,8 +851,7 @@ PKCS7_dataFinal(PKCS7 *p7, BIO *bio) | |||
870 | 851 | ||
871 | btmp = BIO_find_type(bio, BIO_TYPE_MEM); | 852 | btmp = BIO_find_type(bio, BIO_TYPE_MEM); |
872 | if (btmp == NULL) { | 853 | if (btmp == NULL) { |
873 | PKCS7err(PKCS7_F_PKCS7_DATAFINAL, | 854 | PKCS7error(PKCS7_R_UNABLE_TO_FIND_MEM_BIO); |
874 | PKCS7_R_UNABLE_TO_FIND_MEM_BIO); | ||
875 | goto err; | 855 | goto err; |
876 | } | 856 | } |
877 | contlen = BIO_get_mem_data(btmp, &cont); | 857 | contlen = BIO_get_mem_data(btmp, &cont); |
@@ -910,7 +890,7 @@ PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) | |||
910 | 890 | ||
911 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN, | 891 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN, |
912 | EVP_PKEY_CTRL_PKCS7_SIGN, 0, si) <= 0) { | 892 | EVP_PKEY_CTRL_PKCS7_SIGN, 0, si) <= 0) { |
913 | PKCS7err(PKCS7_F_PKCS7_SIGNER_INFO_SIGN, PKCS7_R_CTRL_ERROR); | 893 | PKCS7error(PKCS7_R_CTRL_ERROR); |
914 | goto err; | 894 | goto err; |
915 | } | 895 | } |
916 | 896 | ||
@@ -932,7 +912,7 @@ PKCS7_SIGNER_INFO_sign(PKCS7_SIGNER_INFO *si) | |||
932 | 912 | ||
933 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN, | 913 | if (EVP_PKEY_CTX_ctrl(pctx, -1, EVP_PKEY_OP_SIGN, |
934 | EVP_PKEY_CTRL_PKCS7_SIGN, 1, si) <= 0) { | 914 | EVP_PKEY_CTRL_PKCS7_SIGN, 1, si) <= 0) { |
935 | PKCS7err(PKCS7_F_PKCS7_SIGNER_INFO_SIGN, PKCS7_R_CTRL_ERROR); | 915 | PKCS7error(PKCS7_R_CTRL_ERROR); |
936 | goto err; | 916 | goto err; |
937 | } | 917 | } |
938 | 918 | ||
@@ -958,13 +938,12 @@ PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, | |||
958 | X509 *x509; | 938 | X509 *x509; |
959 | 939 | ||
960 | if (p7 == NULL) { | 940 | if (p7 == NULL) { |
961 | PKCS7err(PKCS7_F_PKCS7_DATAVERIFY, | 941 | PKCS7error(PKCS7_R_INVALID_NULL_POINTER); |
962 | PKCS7_R_INVALID_NULL_POINTER); | ||
963 | return 0; | 942 | return 0; |
964 | } | 943 | } |
965 | 944 | ||
966 | if (p7->d.ptr == NULL) { | 945 | if (p7->d.ptr == NULL) { |
967 | PKCS7err(PKCS7_F_PKCS7_DATAVERIFY, PKCS7_R_NO_CONTENT); | 946 | PKCS7error(PKCS7_R_NO_CONTENT); |
968 | return 0; | 947 | return 0; |
969 | } | 948 | } |
970 | 949 | ||
@@ -973,7 +952,7 @@ PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, | |||
973 | } else if (PKCS7_type_is_signedAndEnveloped(p7)) { | 952 | } else if (PKCS7_type_is_signedAndEnveloped(p7)) { |
974 | cert = p7->d.signed_and_enveloped->cert; | 953 | cert = p7->d.signed_and_enveloped->cert; |
975 | } else { | 954 | } else { |
976 | PKCS7err(PKCS7_F_PKCS7_DATAVERIFY, PKCS7_R_WRONG_PKCS7_TYPE); | 955 | PKCS7error(PKCS7_R_WRONG_PKCS7_TYPE); |
977 | goto err; | 956 | goto err; |
978 | } | 957 | } |
979 | /* XXXX */ | 958 | /* XXXX */ |
@@ -983,14 +962,13 @@ PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, | |||
983 | 962 | ||
984 | /* were we able to find the cert in passed to us */ | 963 | /* were we able to find the cert in passed to us */ |
985 | if (x509 == NULL) { | 964 | if (x509 == NULL) { |
986 | PKCS7err(PKCS7_F_PKCS7_DATAVERIFY, | 965 | PKCS7error(PKCS7_R_UNABLE_TO_FIND_CERTIFICATE); |
987 | PKCS7_R_UNABLE_TO_FIND_CERTIFICATE); | ||
988 | goto err; | 966 | goto err; |
989 | } | 967 | } |
990 | 968 | ||
991 | /* Lets verify */ | 969 | /* Lets verify */ |
992 | if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) { | 970 | if (!X509_STORE_CTX_init(ctx, cert_store, x509, cert)) { |
993 | PKCS7err(PKCS7_F_PKCS7_DATAVERIFY, ERR_R_X509_LIB); | 971 | PKCS7error(ERR_R_X509_LIB); |
994 | goto err; | 972 | goto err; |
995 | } | 973 | } |
996 | if (X509_STORE_CTX_set_purpose(ctx, X509_PURPOSE_SMIME_SIGN) == 0) { | 974 | if (X509_STORE_CTX_set_purpose(ctx, X509_PURPOSE_SMIME_SIGN) == 0) { |
@@ -999,7 +977,7 @@ PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio, | |||
999 | } | 977 | } |
1000 | i = X509_verify_cert(ctx); | 978 | i = X509_verify_cert(ctx); |
1001 | if (i <= 0) { | 979 | if (i <= 0) { |
1002 | PKCS7err(PKCS7_F_PKCS7_DATAVERIFY, ERR_R_X509_LIB); | 980 | PKCS7error(ERR_R_X509_LIB); |
1003 | X509_STORE_CTX_cleanup(ctx); | 981 | X509_STORE_CTX_cleanup(ctx); |
1004 | goto err; | 982 | goto err; |
1005 | } | 983 | } |
@@ -1026,8 +1004,7 @@ PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) | |||
1026 | 1004 | ||
1027 | if (!PKCS7_type_is_signed(p7) && | 1005 | if (!PKCS7_type_is_signed(p7) && |
1028 | !PKCS7_type_is_signedAndEnveloped(p7)) { | 1006 | !PKCS7_type_is_signedAndEnveloped(p7)) { |
1029 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | 1007 | PKCS7error(PKCS7_R_WRONG_PKCS7_TYPE); |
1030 | PKCS7_R_WRONG_PKCS7_TYPE); | ||
1031 | goto err; | 1008 | goto err; |
1032 | } | 1009 | } |
1033 | 1010 | ||
@@ -1037,14 +1014,12 @@ PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) | |||
1037 | for (;;) { | 1014 | for (;;) { |
1038 | if ((btmp == NULL) || | 1015 | if ((btmp == NULL) || |
1039 | ((btmp = BIO_find_type(btmp, BIO_TYPE_MD)) == NULL)) { | 1016 | ((btmp = BIO_find_type(btmp, BIO_TYPE_MD)) == NULL)) { |
1040 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | 1017 | PKCS7error(PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); |
1041 | PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); | ||
1042 | goto err; | 1018 | goto err; |
1043 | } | 1019 | } |
1044 | BIO_get_md_ctx(btmp, &mdc); | 1020 | BIO_get_md_ctx(btmp, &mdc); |
1045 | if (mdc == NULL) { | 1021 | if (mdc == NULL) { |
1046 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | 1022 | PKCS7error(ERR_R_INTERNAL_ERROR); |
1047 | ERR_R_INTERNAL_ERROR); | ||
1048 | goto err; | 1023 | goto err; |
1049 | } | 1024 | } |
1050 | if (EVP_MD_CTX_type(mdc) == md_type) | 1025 | if (EVP_MD_CTX_type(mdc) == md_type) |
@@ -1073,14 +1048,12 @@ PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) | |||
1073 | goto err; | 1048 | goto err; |
1074 | message_digest = PKCS7_digest_from_attributes(sk); | 1049 | message_digest = PKCS7_digest_from_attributes(sk); |
1075 | if (!message_digest) { | 1050 | if (!message_digest) { |
1076 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | 1051 | PKCS7error(PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); |
1077 | PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST); | ||
1078 | goto err; | 1052 | goto err; |
1079 | } | 1053 | } |
1080 | if ((message_digest->length != (int)md_len) || | 1054 | if ((message_digest->length != (int)md_len) || |
1081 | (memcmp(message_digest->data, md_dat, md_len))) { | 1055 | (memcmp(message_digest->data, md_dat, md_len))) { |
1082 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | 1056 | PKCS7error(PKCS7_R_DIGEST_FAILURE); |
1083 | PKCS7_R_DIGEST_FAILURE); | ||
1084 | ret = -1; | 1057 | ret = -1; |
1085 | goto err; | 1058 | goto err; |
1086 | } | 1059 | } |
@@ -1092,7 +1065,7 @@ PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) | |||
1092 | alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf, | 1065 | alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf, |
1093 | &PKCS7_ATTR_VERIFY_it); | 1066 | &PKCS7_ATTR_VERIFY_it); |
1094 | if (alen <= 0) { | 1067 | if (alen <= 0) { |
1095 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, ERR_R_ASN1_LIB); | 1068 | PKCS7error(ERR_R_ASN1_LIB); |
1096 | ret = -1; | 1069 | ret = -1; |
1097 | goto err; | 1070 | goto err; |
1098 | } | 1071 | } |
@@ -1112,8 +1085,7 @@ PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si, X509 *x509) | |||
1112 | i = EVP_VerifyFinal(&mdc_tmp, os->data, os->length, pkey); | 1085 | i = EVP_VerifyFinal(&mdc_tmp, os->data, os->length, pkey); |
1113 | EVP_PKEY_free(pkey); | 1086 | EVP_PKEY_free(pkey); |
1114 | if (i <= 0) { | 1087 | if (i <= 0) { |
1115 | PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY, | 1088 | PKCS7error(PKCS7_R_SIGNATURE_FAILURE); |
1116 | PKCS7_R_SIGNATURE_FAILURE); | ||
1117 | ret = -1; | 1089 | ret = -1; |
1118 | goto err; | 1090 | goto err; |
1119 | } else | 1091 | } else |