pk7_doit.c 26.3 KB
Newer Older
1
/* crypto/pkcs7/pk7_doit.c */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
 * All rights reserved.
 *
 * This package is an SSL implementation written
 * by Eric Young (eay@cryptsoft.com).
 * The implementation was written so as to conform with Netscapes SSL.
 * 
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 * 
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
 * 
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *    "This product includes cryptographic software written by
 *     Eric Young (eay@cryptsoft.com)"
 *    The word 'cryptographic' can be left out if the rouines from the library
 *    being used are not cryptographic related :-).
 * 4. If you include any Windows specific code (or a derivative thereof) from 
 *    the apps directory (application code) you must include an acknowledgement:
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 * 
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 * 
 * The licence and distribution terms for any publically available version or
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 * copied and put under another distribution licence
 * [including the GNU Public Licence.]
 */

#include <stdio.h>
#include "cryptlib.h"
61 62 63
#include <openssl/rand.h>
#include <openssl/objects.h>
#include <openssl/x509.h>
64
#include <openssl/x509v3.h>
65

B
Ben Laurie 已提交
66 67 68
static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype,
			 void *value);
static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid);
69

70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
static int PKCS7_type_is_other(PKCS7* p7)
	{
	int isOther=1;
	
	int nid=OBJ_obj2nid(p7->type);

	switch( nid )
		{
	case NID_pkcs7_data:
	case NID_pkcs7_signed:
	case NID_pkcs7_enveloped:
	case NID_pkcs7_signedAndEnveloped:
	case NID_pkcs7_digest:
	case NID_pkcs7_encrypted:
		isOther=0;
		break;
	default:
		isOther=1;
		}

	return isOther;

	}

94
static ASN1_OCTET_STRING *PKCS7_get_octet_string(PKCS7 *p7)
95
	{
96 97 98 99 100 101
	if ( PKCS7_type_is_data(p7))
		return p7->d.data;
	if ( PKCS7_type_is_other(p7) && p7->d.other
		&& (p7->d.other->type == V_ASN1_OCTET_STRING))
		return p7->d.other->value.octet_string;
	return NULL;
102 103
	}

104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139
static int PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg)
	{
	BIO *btmp;
	const EVP_MD *md;
	if ((btmp=BIO_new(BIO_f_md())) == NULL)
		{
		PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST,ERR_R_BIO_LIB);
		goto err;
		}

	md=EVP_get_digestbyobj(alg->algorithm);
	if (md == NULL)
		{
		PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST,PKCS7_R_UNKNOWN_DIGEST_TYPE);
		goto err;
		}

	BIO_set_md(btmp,md);
	if (*pbio == NULL)
		*pbio=btmp;
	else if (!BIO_push(*pbio,btmp))
		{
		PKCS7err(PKCS7_F_PKCS7_BIO_ADD_DIGEST,ERR_R_BIO_LIB);
		goto err;
		}
	btmp=NULL;

	return 1;

	err:
	if (btmp)
		BIO_free(btmp);
	return 0;

	}

U
Ulf Möller 已提交
140
BIO *PKCS7_dataInit(PKCS7 *p7, BIO *bio)
141
	{
142
	int i;
143
	BIO *out=NULL,*btmp=NULL;
144
	X509_ALGOR *xa = NULL;
B
Ben Laurie 已提交
145
	const EVP_CIPHER *evp_cipher=NULL;
B
Stack.  
Ben Laurie 已提交
146
	STACK_OF(X509_ALGOR) *md_sk=NULL;
B
stack.  
Ben Laurie 已提交
147
	STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL;
148 149 150
	X509_ALGOR *xalg=NULL;
	PKCS7_RECIP_INFO *ri=NULL;
	EVP_PKEY *pkey;
151
	ASN1_OCTET_STRING *os=NULL;
152 153 154 155 156 157 158

	i=OBJ_obj2nid(p7->type);
	p7->state=PKCS7_S_HEADER;

	switch (i)
		{
	case NID_pkcs7_signed:
159
		md_sk=p7->d.sign->md_algs;
160
		os = PKCS7_get_octet_string(p7->d.sign->contents);
161 162 163 164
		break;
	case NID_pkcs7_signedAndEnveloped:
		rsk=p7->d.signed_and_enveloped->recipientinfo;
		md_sk=p7->d.signed_and_enveloped->md_algs;
165 166
		xalg=p7->d.signed_and_enveloped->enc_data->algorithm;
		evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher;
167
		if (evp_cipher == NULL)
168
			{
169 170
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,
						PKCS7_R_CIPHER_NOT_INITIALIZED);
171 172 173
			goto err;
			}
		break;
174 175
	case NID_pkcs7_enveloped:
		rsk=p7->d.enveloped->recipientinfo;
176 177
		xalg=p7->d.enveloped->enc_data->algorithm;
		evp_cipher=p7->d.enveloped->enc_data->cipher;
178 179
		if (evp_cipher == NULL)
			{
180 181
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,
						PKCS7_R_CIPHER_NOT_INITIALIZED);
182 183 184
			goto err;
			}
		break;
185 186 187 188
	case NID_pkcs7_digest:
		xa = p7->d.digest->md;
		os = PKCS7_get_octet_string(p7->d.digest->contents);
		break;
189 190 191 192 193
	default:
		PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNSUPPORTED_CONTENT_TYPE);
	        goto err;
		}

194 195 196
	for (i=0; i<sk_X509_ALGOR_num(md_sk); i++)
		if (!PKCS7_bio_add_digest(&out, sk_X509_ALGOR_value(md_sk, i)))
			goto err;
197

198 199
	if (xa && !PKCS7_bio_add_digest(&out, xa))
			goto err;
200 201 202 203 204 205 206 207

	if (evp_cipher != NULL)
		{
		unsigned char key[EVP_MAX_KEY_LENGTH];
		unsigned char iv[EVP_MAX_IV_LENGTH];
		int keylen,ivlen;
		int jj,max;
		unsigned char *tmp;
208
		EVP_CIPHER_CTX *ctx;
209

210 211 212 213 214
		if ((btmp=BIO_new(BIO_f_cipher())) == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_BIO_LIB);
			goto err;
			}
215
		BIO_get_cipher_ctx(btmp, &ctx);
216 217
		keylen=EVP_CIPHER_key_length(evp_cipher);
		ivlen=EVP_CIPHER_iv_length(evp_cipher);
218
		xalg->algorithm = OBJ_nid2obj(EVP_CIPHER_type(evp_cipher));
219
		if (ivlen > 0) RAND_pseudo_bytes(iv,ivlen);
220 221 222 223 224 225
		if (EVP_CipherInit_ex(ctx, evp_cipher, NULL, NULL, NULL, 1)<=0)
			goto err;
		if (EVP_CIPHER_CTX_rand_key(ctx, key) <= 0)
			goto err;
		if (EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, 1) <= 0)
			goto err;
226

227 228 229 230 231 232
		if (ivlen > 0) {
			if (xalg->parameter == NULL) 
						xalg->parameter=ASN1_TYPE_new();
			if(EVP_CIPHER_param_to_asn1(ctx, xalg->parameter) < 0)
								       goto err;
		}
233 234 235

		/* Lets do the pub key stuff :-) */
		max=0;
B
stack.  
Ben Laurie 已提交
236
		for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++)
237
			{
B
stack.  
Ben Laurie 已提交
238
			ri=sk_PKCS7_RECIP_INFO_value(rsk,i);
239 240 241 242 243
			if (ri->cert == NULL)
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_MISSING_CERIPEND_INFO);
				goto err;
				}
244 245
			pkey=X509_get_pubkey(ri->cert);
			jj=EVP_PKEY_size(pkey);
246
			EVP_PKEY_free(pkey);
247 248
			if (max < jj) max=jj;
			}
249
		if ((tmp=(unsigned char *)OPENSSL_malloc(max)) == NULL)
250 251 252 253
			{
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_MALLOC_FAILURE);
			goto err;
			}
B
stack.  
Ben Laurie 已提交
254
		for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++)
255
			{
B
stack.  
Ben Laurie 已提交
256
			ri=sk_PKCS7_RECIP_INFO_value(rsk,i);
257 258
			pkey=X509_get_pubkey(ri->cert);
			jj=EVP_PKEY_encrypt(tmp,key,keylen,pkey);
259
			EVP_PKEY_free(pkey);
260 261 262
			if (jj <= 0)
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_EVP_LIB);
263
				OPENSSL_free(tmp);
264 265
				goto err;
				}
266 267 268 269 270 271 272
			if (!M_ASN1_OCTET_STRING_set(ri->enc_key,tmp,jj))
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,
					ERR_R_MALLOC_FAILURE);
				OPENSSL_free(tmp);
				goto err;
				}
273
			}
274
		OPENSSL_free(tmp);
275
		OPENSSL_cleanse(key, keylen);
276 277 278 279 280

		if (out == NULL)
			out=btmp;
		else
			BIO_push(out,btmp);
281
		btmp=NULL;
282 283
		}

284 285
	if (bio == NULL)
		{
D
 
Dr. Stephen Henson 已提交
286
		if (PKCS7_is_detached(p7))
287
			bio=BIO_new(BIO_s_null());
288 289 290
		else if (os && os->length > 0)
			bio = BIO_new_mem_buf(os->data, os->length);
		if(bio == NULL)
291
			{
292 293
			bio=BIO_new(BIO_s_mem());
			BIO_set_mem_eof_return(bio,0);
294
			}
295
		}
296
	BIO_push(out,bio);
297 298 299 300 301 302 303 304 305 306
	bio=NULL;
	if (0)
		{
err:
		if (out != NULL)
			BIO_free_all(out);
		if (btmp != NULL)
			BIO_free_all(btmp);
		out=NULL;
		}
307
	return(out);
308 309 310
	}

/* int */
311
BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
312 313 314
	{
	int i,j;
	BIO *out=NULL,*btmp=NULL,*etmp=NULL,*bio=NULL;
315
	unsigned char *tmp=NULL;
316 317
	X509_ALGOR *xa;
	ASN1_OCTET_STRING *data_body=NULL;
B
Ben Laurie 已提交
318 319
	const EVP_MD *evp_md;
	const EVP_CIPHER *evp_cipher=NULL;
320 321
	EVP_CIPHER_CTX *evp_ctx=NULL;
	X509_ALGOR *enc_alg=NULL;
B
Stack.  
Ben Laurie 已提交
322
	STACK_OF(X509_ALGOR) *md_sk=NULL;
B
stack.  
Ben Laurie 已提交
323
	STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL;
324 325 326 327 328 329 330 331 332
	X509_ALGOR *xalg=NULL;
	PKCS7_RECIP_INFO *ri=NULL;

	i=OBJ_obj2nid(p7->type);
	p7->state=PKCS7_S_HEADER;

	switch (i)
		{
	case NID_pkcs7_signed:
333
		data_body=PKCS7_get_octet_string(p7->d.sign->contents);
334 335 336 337 338 339 340
		md_sk=p7->d.sign->md_algs;
		break;
	case NID_pkcs7_signedAndEnveloped:
		rsk=p7->d.signed_and_enveloped->recipientinfo;
		md_sk=p7->d.signed_and_enveloped->md_algs;
		data_body=p7->d.signed_and_enveloped->enc_data->enc_data;
		enc_alg=p7->d.signed_and_enveloped->enc_data->algorithm;
341
		evp_cipher=EVP_get_cipherbyobj(enc_alg->algorithm);
342 343
		if (evp_cipher == NULL)
			{
344
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);
345 346 347 348 349 350 351 352
			goto err;
			}
		xalg=p7->d.signed_and_enveloped->enc_data->algorithm;
		break;
	case NID_pkcs7_enveloped:
		rsk=p7->d.enveloped->recipientinfo;
		enc_alg=p7->d.enveloped->enc_data->algorithm;
		data_body=p7->d.enveloped->enc_data->enc_data;
353
		evp_cipher=EVP_get_cipherbyobj(enc_alg->algorithm);
354 355
		if (evp_cipher == NULL)
			{
356
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);
357 358 359 360 361
			goto err;
			}
		xalg=p7->d.enveloped->enc_data->algorithm;
		break;
	default:
362
		PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CONTENT_TYPE);
363 364 365 366 367 368
	        goto err;
		}

	/* We will be checking the signature */
	if (md_sk != NULL)
		{
B
Stack.  
Ben Laurie 已提交
369
		for (i=0; i<sk_X509_ALGOR_num(md_sk); i++)
370
			{
B
Stack.  
Ben Laurie 已提交
371
			xa=sk_X509_ALGOR_value(md_sk,i);
372 373
			if ((btmp=BIO_new(BIO_f_md())) == NULL)
				{
374
				PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB);
375 376 377 378
				goto err;
				}

			j=OBJ_obj2nid(xa->algorithm);
379
			evp_md=EVP_get_digestbynid(j);
380 381
			if (evp_md == NULL)
				{
382
				PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNKNOWN_DIGEST_TYPE);
383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408
				goto err;
				}

			BIO_set_md(btmp,evp_md);
			if (out == NULL)
				out=btmp;
			else
				BIO_push(out,btmp);
			btmp=NULL;
			}
		}

	if (evp_cipher != NULL)
		{
#if 0
		unsigned char key[EVP_MAX_KEY_LENGTH];
		unsigned char iv[EVP_MAX_IV_LENGTH];
		unsigned char *p;
		int keylen,ivlen;
		int max;
		X509_OBJECT ret;
#endif
		int jj;

		if ((etmp=BIO_new(BIO_f_cipher())) == NULL)
			{
409
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB);
410 411 412 413 414 415
			goto err;
			}

		/* It was encrypted, we need to decrypt the secret key
		 * with the private key */

416 417
		/* Find the recipientInfo which matches the passed certificate
		 * (if any)
418 419
		 */

B
stack.  
Ben Laurie 已提交
420 421
		for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++) {
			ri=sk_PKCS7_RECIP_INFO_value(rsk,i);
422 423
			if(!X509_NAME_cmp(ri->issuer_and_serial->issuer,
					pcert->cert_info->issuer) &&
424
			     !M_ASN1_INTEGER_cmp(pcert->cert_info->serialNumber,
425
					ri->issuer_and_serial->serial)) break;
426
			ri=NULL;
427 428 429 430
		}
		if (ri == NULL) {
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,
				 PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE);
431
			goto err;
432
		}
433 434

		jj=EVP_PKEY_size(pkey);
435
		tmp=(unsigned char *)OPENSSL_malloc(jj+10);
436 437
		if (tmp == NULL)
			{
438
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_MALLOC_FAILURE);
439 440 441
			goto err;
			}

442 443
		jj=EVP_PKEY_decrypt(tmp, M_ASN1_STRING_data(ri->enc_key),
			M_ASN1_STRING_length(ri->enc_key), pkey);
444 445
		if (jj <= 0)
			{
446
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_EVP_LIB);
447 448 449 450 451
			goto err;
			}

		evp_ctx=NULL;
		BIO_get_cipher_ctx(etmp,&evp_ctx);
452 453
		if (EVP_CipherInit_ex(evp_ctx,evp_cipher,NULL,NULL,NULL,0) <= 0)
			goto err;
454
		if (EVP_CIPHER_asn1_to_param(evp_ctx,enc_alg->parameter) < 0)
455
			goto err;
456

457
		if (jj != EVP_CIPHER_CTX_key_length(evp_ctx)) {
D
 
Dr. Stephen Henson 已提交
458
			/* Some S/MIME clients don't use the same key
459 460 461
			 * and effective key length. The key length is
			 * determined by the size of the decrypted RSA key.
			 */
D
 
Dr. Stephen Henson 已提交
462
			if(!EVP_CIPHER_CTX_set_key_length(evp_ctx, jj))
B
Bodo Möller 已提交
463
				{
464
				PKCS7err(PKCS7_F_PKCS7_DATADECODE,
465
					PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH);
466
				goto err;
B
Bodo Möller 已提交
467
				}
D
 
Dr. Stephen Henson 已提交
468
		} 
469 470
		if (EVP_CipherInit_ex(evp_ctx,NULL,NULL,tmp,NULL,0) <= 0)
			goto err;
471

472
		OPENSSL_cleanse(tmp,jj);
473 474 475 476 477 478 479 480 481

		if (out == NULL)
			out=etmp;
		else
			BIO_push(out,etmp);
		etmp=NULL;
		}

#if 1
D
 
Dr. Stephen Henson 已提交
482
	if (PKCS7_is_detached(p7) || (in_bio != NULL))
483 484 485 486 487
		{
		bio=in_bio;
		}
	else 
		{
488
#if 0
489 490 491 492 493 494 495 496
		bio=BIO_new(BIO_s_mem());
		/* We need to set this so that when we have read all
		 * the data, the encrypt BIO, if present, will read
		 * EOF and encode the last few bytes */
		BIO_set_mem_eof_return(bio,0);

		if (data_body->length > 0)
			BIO_write(bio,(char *)data_body->data,data_body->length);
497 498 499 500 501 502 503 504
#else
		if (data_body->length > 0)
		      bio = BIO_new_mem_buf(data_body->data,data_body->length);
		else {
			bio=BIO_new(BIO_s_mem());
			BIO_set_mem_eof_return(bio,0);
		}
#endif
505 506 507 508 509 510
		}
	BIO_push(out,bio);
	bio=NULL;
#endif
	if (0)
		{
511
err:
512 513 514 515 516 517 518
		if (out != NULL) BIO_free_all(out);
		if (btmp != NULL) BIO_free_all(btmp);
		if (etmp != NULL) BIO_free_all(etmp);
		if (bio != NULL) BIO_free_all(bio);
		out=NULL;
		}
	if (tmp != NULL)
519
		OPENSSL_free(tmp);
520
	return(out);
521 522
	}

523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545
static BIO *PKCS7_find_digest(EVP_MD_CTX **pmd, BIO *bio, int nid)
	{
	for (;;)
		{
		bio=BIO_find_type(bio,BIO_TYPE_MD);
		if (bio == NULL)
			{
			PKCS7err(PKCS7_F_FIND_DIGEST,PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
			return NULL;	
			}
		BIO_get_md_ctx(bio,pmd);
		if (*pmd == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_INTERNAL_ERROR);
			return NULL;
			}	
		if (EVP_MD_CTX_type(*pmd) == nid)
			return bio;
		bio=BIO_next(bio);
		}
	return NULL;
	}

U
Ulf Möller 已提交
546
int PKCS7_dataFinal(PKCS7 *p7, BIO *bio)
547 548 549 550 551 552 553 554
	{
	int ret=0;
	int i,j;
	BIO *btmp;
	BUF_MEM *buf_mem=NULL;
	BUF_MEM *buf=NULL;
	PKCS7_SIGNER_INFO *si;
	EVP_MD_CTX *mdc,ctx_tmp;
B
Ben Laurie 已提交
555
	STACK_OF(X509_ATTRIBUTE) *sk;
B
Stack.  
Ben Laurie 已提交
556
	STACK_OF(PKCS7_SIGNER_INFO) *si_sk=NULL;
557
	ASN1_OCTET_STRING *os=NULL;
558

559
	EVP_MD_CTX_init(&ctx_tmp);
560 561 562 563 564
	i=OBJ_obj2nid(p7->type);
	p7->state=PKCS7_S_HEADER;

	switch (i)
		{
565 566 567
	case NID_pkcs7_signedAndEnveloped:
		/* XXXXXXXXXXXXXXXX */
		si_sk=p7->d.signed_and_enveloped->signer_info;
568 569 570 571 572
		if (!(os=M_ASN1_OCTET_STRING_new()))
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_MALLOC_FAILURE);
			goto err;
			}
573 574
		p7->d.signed_and_enveloped->enc_data->enc_data=os;
		break;
575 576
	case NID_pkcs7_enveloped:
		/* XXXXXXXXXXXXXXXX */
577 578 579 580 581
		if (!(os=M_ASN1_OCTET_STRING_new()))
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_MALLOC_FAILURE);
			goto err;
			}
582 583
		p7->d.enveloped->enc_data->enc_data=os;
		break;
584
	case NID_pkcs7_signed:
585
		si_sk=p7->d.sign->signer_info;
586
		os=PKCS7_get_octet_string(p7->d.sign->contents);
587
		/* If detached data then the content is excluded */
588
		if(PKCS7_type_is_data(p7->d.sign->contents) && p7->detached) {
589
			M_ASN1_OCTET_STRING_free(os);
590 591
			p7->d.sign->contents->d.data = NULL;
		}
592
		break;
593 594 595 596 597 598 599 600 601 602 603

	case NID_pkcs7_digest:
		os=PKCS7_get_octet_string(p7->d.digest->contents);
		/* If detached data then the content is excluded */
		if(PKCS7_type_is_data(p7->d.digest->contents) && p7->detached)
			{
			M_ASN1_OCTET_STRING_free(os);
			p7->d.digest->contents->d.data = NULL;
			}
		break;

604
		}
605

606 607
	if (si_sk != NULL)
		{
608 609 610 611 612
		if ((buf=BUF_MEM_new()) == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_BIO_LIB);
			goto err;
			}
B
Stack.  
Ben Laurie 已提交
613
		for (i=0; i<sk_PKCS7_SIGNER_INFO_num(si_sk); i++)
614
			{
B
Stack.  
Ben Laurie 已提交
615
			si=sk_PKCS7_SIGNER_INFO_value(si_sk,i);
616 617 618
			if (si->pkey == NULL) continue;

			j=OBJ_obj2nid(si->digest_alg->algorithm);
619 620

			btmp=bio;
621 622 623 624 625 626

			btmp = PKCS7_find_digest(&mdc, btmp, j);

			if (btmp == NULL)
				goto err;

627 628
			/* We now have the EVP_MD_CTX, lets do the
			 * signing. */
D
 
Dr. Stephen Henson 已提交
629
			EVP_MD_CTX_copy_ex(&ctx_tmp,mdc);
630
			if (!BUF_MEM_grow_clean(buf,EVP_PKEY_size(si->pkey)))
631 632
				{
				PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_BIO_LIB);
633
				goto err;
634
				}
635 636

			sk=si->auth_attr;
637 638 639

			/* If there are attributes, we add the digest
			 * attribute and only sign the attributes */
B
Ben Laurie 已提交
640
			if ((sk != NULL) && (sk_X509_ATTRIBUTE_num(sk) != 0))
641
				{
642 643
				unsigned char md_data[EVP_MAX_MD_SIZE], *abuf=NULL;
				unsigned int md_len, alen;
644 645
				ASN1_OCTET_STRING *digest;
				ASN1_UTCTIME *sign_time;
B
Ben Laurie 已提交
646
				const EVP_MD *md_tmp;
647

D
 
Dr. Stephen Henson 已提交
648 649 650 651
				/* Add signing time if not already present */
				if (!PKCS7_get_signed_attribute(si,
							NID_pkcs9_signingTime))
					{
652 653 654 655 656 657
					if (!(sign_time=X509_gmtime_adj(NULL,0)))
						{
						PKCS7err(PKCS7_F_PKCS7_DATASIGN,
							ERR_R_MALLOC_FAILURE);
						goto err;
						}
D
 
Dr. Stephen Henson 已提交
658 659 660 661
					PKCS7_add_signed_attribute(si,
						NID_pkcs9_signingTime,
						V_ASN1_UTCTIME,sign_time);
					}
662 663

				/* Add digest */
664
				md_tmp=EVP_MD_CTX_md(&ctx_tmp);
D
 
Dr. Stephen Henson 已提交
665
				EVP_DigestFinal_ex(&ctx_tmp,md_data,&md_len);
666 667 668 669 670 671 672 673 674 675 676 677 678
				if (!(digest=M_ASN1_OCTET_STRING_new()))
					{
					PKCS7err(PKCS7_F_PKCS7_DATASIGN,
						ERR_R_MALLOC_FAILURE);
					goto err;
					}
				if (!M_ASN1_OCTET_STRING_set(digest,md_data,
								md_len))
					{
					PKCS7err(PKCS7_F_PKCS7_DATASIGN,
						ERR_R_MALLOC_FAILURE);
					goto err;
					}
679 680
				PKCS7_add_signed_attribute(si,
					NID_pkcs9_messageDigest,
681
					V_ASN1_OCTET_STRING,digest);
682

683
				/* Now sign the attributes */
D
 
Dr. Stephen Henson 已提交
684
				EVP_SignInit_ex(&ctx_tmp,md_tmp,NULL);
685
				alen = ASN1_item_i2d((ASN1_VALUE *)sk,&abuf,
686
							ASN1_ITEM_rptr(PKCS7_ATTR_SIGN));
687 688 689
				if(!abuf) goto err;
				EVP_SignUpdate(&ctx_tmp,abuf,alen);
				OPENSSL_free(abuf);
690 691
				}

692
#ifndef OPENSSL_NO_DSA
693 694
			if (si->pkey->type == EVP_PKEY_DSA)
				ctx_tmp.digest=EVP_dss1();
695
#endif
B
Bodo Möller 已提交
696
#ifndef OPENSSL_NO_ECDSA
697
 			if (si->pkey->type == EVP_PKEY_EC)
B
Bodo Möller 已提交
698 699
 				ctx_tmp.digest=EVP_ecdsa();
#endif
700

701
			if (!EVP_SignFinal(&ctx_tmp,(unsigned char *)buf->data,
702
				(unsigned int *)&buf->length,si->pkey))
703 704
				{
				PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_EVP_LIB);
705
				goto err;
706
				}
707 708 709
			if (!ASN1_STRING_set(si->enc_digest,
				(unsigned char *)buf->data,buf->length))
				{
710
				PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_ASN1_LIB);
711 712 713 714
				goto err;
				}
			}
		}
715 716 717 718 719 720 721 722 723 724
	else if (i == NID_pkcs7_digest)
		{
		unsigned char md_data[EVP_MAX_MD_SIZE];
		unsigned int md_len;
		if (!PKCS7_find_digest(&mdc, bio,
				OBJ_obj2nid(p7->d.digest->md->algorithm)))
			goto err;
		EVP_DigestFinal_ex(mdc,md_data,&md_len);
		M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len);
		}
725

D
 
Dr. Stephen Henson 已提交
726
	if (!PKCS7_is_detached(p7))
727 728 729 730 731 732 733 734
		{
		btmp=BIO_find_type(bio,BIO_TYPE_MEM);
		if (btmp == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,PKCS7_R_UNABLE_TO_FIND_MEM_BIO);
			goto err;
			}
		BIO_get_mem_ptr(btmp,&buf_mem);
735 736 737 738 739 740 741 742
		/* Mark the BIO read only then we can use its copy of the data
		 * instead of making an extra copy.
		 */
		BIO_set_flags(btmp, BIO_FLAGS_MEM_RDONLY);
		BIO_set_mem_eof_return(btmp, 0);
		os->data = (unsigned char *)buf_mem->data;
		os->length = buf_mem->length;
#if 0
743
		M_ASN1_OCTET_STRING_set(os,
744
			(unsigned char *)buf_mem->data,buf_mem->length);
745
#endif
746
		}
747 748
	ret=1;
err:
749
	EVP_MD_CTX_cleanup(&ctx_tmp);
750 751 752 753
	if (buf != NULL) BUF_MEM_free(buf);
	return(ret);
	}

U
Ulf Möller 已提交
754 755
int PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio,
	     PKCS7 *p7, PKCS7_SIGNER_INFO *si)
756 757
	{
	PKCS7_ISSUER_AND_SERIAL *ias;
758
	int ret=0,i;
B
Ben Laurie 已提交
759
	STACK_OF(X509) *cert;
760 761
	X509 *x509;

762 763 764 765 766 767 768 769 770 771 772 773 774
	if (PKCS7_type_is_signed(p7))
		{
		cert=p7->d.sign->cert;
		}
	else if (PKCS7_type_is_signedAndEnveloped(p7))
		{
		cert=p7->d.signed_and_enveloped->cert;
		}
	else
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_WRONG_PKCS7_TYPE);
		goto err;
		}
775
	/* XXXXXXXXXXXXXXXXXXXXXXX */
776 777
	ias=si->issuer_and_serial;

778
	x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial);
779 780 781 782 783 784 785 786 787

	/* were we able to find the cert in passed to us */
	if (x509 == NULL)
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_UNABLE_TO_FIND_CERTIFICATE);
		goto err;
		}

	/* Lets verify */
788 789 790 791 792
	if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,ERR_R_X509_LIB);
		goto err;
		}
793
	X509_STORE_CTX_set_purpose(ctx, X509_PURPOSE_SMIME_SIGN);
794
	i=X509_verify_cert(ctx);
795 796 797
	if (i <= 0) 
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,ERR_R_X509_LIB);
798
		X509_STORE_CTX_cleanup(ctx);
799 800
		goto err;
		}
801 802
	X509_STORE_CTX_cleanup(ctx);

803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818
	return PKCS7_signatureVerify(bio, p7, si, x509);
	err:
	return ret;
	}

int PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si,
								X509 *x509)
	{
	ASN1_OCTET_STRING *os;
	EVP_MD_CTX mdc_tmp,*mdc;
	int ret=0,i;
	int md_type;
	STACK_OF(X509_ATTRIBUTE) *sk;
	BIO *btmp;
	EVP_PKEY *pkey;

819 820
	EVP_MD_CTX_init(&mdc_tmp);

821 822 823 824 825 826 827
	if (!PKCS7_type_is_signed(p7) && 
				!PKCS7_type_is_signedAndEnveloped(p7)) {
		PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
						PKCS7_R_WRONG_PKCS7_TYPE);
		goto err;
	}

828 829 830 831 832 833 834 835
	md_type=OBJ_obj2nid(si->digest_alg->algorithm);

	btmp=bio;
	for (;;)
		{
		if ((btmp == NULL) ||
			((btmp=BIO_find_type(btmp,BIO_TYPE_MD)) == NULL))
			{
836 837
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
					PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
838 839 840 841 842
			goto err;
			}
		BIO_get_md_ctx(btmp,&mdc);
		if (mdc == NULL)
			{
843
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
B
Bodo Möller 已提交
844
							ERR_R_INTERNAL_ERROR);
845 846
			goto err;
			}
847
		if (EVP_MD_CTX_type(mdc) == md_type)
848
			break;
849 850 851 852 853
		/* Workaround for some broken clients that put the signature
		 * OID instead of the digest OID in digest_alg->algorithm
		 */
		if (EVP_MD_pkey_type(EVP_MD_CTX_md(mdc)) == md_type)
			break;
D
 
Dr. Stephen Henson 已提交
854
		btmp=BIO_next(btmp);
855 856
		}

857 858
	/* mdc is the digest ctx that we want, unless there are attributes,
	 * in which case the digest is the signed attributes */
D
 
Dr. Stephen Henson 已提交
859
	EVP_MD_CTX_copy_ex(&mdc_tmp,mdc);
860 861

	sk=si->auth_attr;
B
Ben Laurie 已提交
862
	if ((sk != NULL) && (sk_X509_ATTRIBUTE_num(sk) != 0))
863
		{
864 865
		unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL;
                unsigned int md_len, alen;
866 867
		ASN1_OCTET_STRING *message_digest;

D
 
Dr. Stephen Henson 已提交
868
		EVP_DigestFinal_ex(&mdc_tmp,md_dat,&md_len);
869 870 871
		message_digest=PKCS7_digest_from_attributes(sk);
		if (!message_digest)
			{
872 873
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
					PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
874 875
			goto err;
			}
876
		if ((message_digest->length != (int)md_len) ||
877 878 879 880 881 882 883 884 885 886
			(memcmp(message_digest->data,md_dat,md_len)))
			{
#if 0
{
int ii;
for (ii=0; ii<message_digest->length; ii++)
	printf("%02X",message_digest->data[ii]); printf(" sent\n");
for (ii=0; ii<md_len; ii++) printf("%02X",md_dat[ii]); printf(" calc\n");
}
#endif
887 888
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
							PKCS7_R_DIGEST_FAILURE);
889 890 891 892
			ret= -1;
			goto err;
			}

D
 
Dr. Stephen Henson 已提交
893
		EVP_VerifyInit_ex(&mdc_tmp,EVP_get_digestbynid(md_type), NULL);
894 895

		alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf,
896
						ASN1_ITEM_rptr(PKCS7_ATTR_VERIFY));
897 898 899
		EVP_VerifyUpdate(&mdc_tmp, abuf, alen);

		OPENSSL_free(abuf);
900 901 902
		}

	os=si->enc_digest;
903
	pkey = X509_get_pubkey(x509);
904 905 906 907 908
	if (!pkey)
		{
		ret = -1;
		goto err;
		}
909
#ifndef OPENSSL_NO_DSA
910
	if(pkey->type == EVP_PKEY_DSA) mdc_tmp.digest=EVP_dss1();
911
#endif
B
Bodo Möller 已提交
912
#ifndef OPENSSL_NO_ECDSA
913
	if (pkey->type == EVP_PKEY_EC) mdc_tmp.digest=EVP_ecdsa();
B
Bodo Möller 已提交
914
#endif
915

916 917
	i=EVP_VerifyFinal(&mdc_tmp,os->data,os->length, pkey);
	EVP_PKEY_free(pkey);
918 919
	if (i <= 0)
		{
920 921
		PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
						PKCS7_R_SIGNATURE_FAILURE);
922 923 924 925 926 927
		ret= -1;
		goto err;
		}
	else
		ret=1;
err:
928
	EVP_MD_CTX_cleanup(&mdc_tmp);
929 930 931
	return(ret);
	}

U
Ulf Möller 已提交
932
PKCS7_ISSUER_AND_SERIAL *PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx)
933
	{
B
stack.  
Ben Laurie 已提交
934
	STACK_OF(PKCS7_RECIP_INFO) *rsk;
935 936 937 938 939 940
	PKCS7_RECIP_INFO *ri;
	int i;

	i=OBJ_obj2nid(p7->type);
	if (i != NID_pkcs7_signedAndEnveloped) return(NULL);
	rsk=p7->d.signed_and_enveloped->recipientinfo;
B
stack.  
Ben Laurie 已提交
941 942 943
	ri=sk_PKCS7_RECIP_INFO_value(rsk,0);
	if (sk_PKCS7_RECIP_INFO_num(rsk) <= idx) return(NULL);
	ri=sk_PKCS7_RECIP_INFO_value(rsk,idx);
944 945 946
	return(ri->issuer_and_serial);
	}

U
Ulf Möller 已提交
947
ASN1_TYPE *PKCS7_get_signed_attribute(PKCS7_SIGNER_INFO *si, int nid)
948 949 950 951
	{
	return(get_attribute(si->auth_attr,nid));
	}

U
Ulf Möller 已提交
952
ASN1_TYPE *PKCS7_get_attribute(PKCS7_SIGNER_INFO *si, int nid)
953 954 955 956
	{
	return(get_attribute(si->unauth_attr,nid));
	}

B
Ben Laurie 已提交
957
static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid)
958 959 960 961 962 963
	{
	int i;
	X509_ATTRIBUTE *xa;
	ASN1_OBJECT *o;

	o=OBJ_nid2obj(nid);
964
	if (!o || !sk) return(NULL);
B
Ben Laurie 已提交
965
	for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
966
		{
B
Ben Laurie 已提交
967
		xa=sk_X509_ATTRIBUTE_value(sk,i);
968 969
		if (OBJ_cmp(xa->object,o) == 0)
			{
D
 
Dr. Stephen Henson 已提交
970
			if (!xa->single && sk_ASN1_TYPE_num(xa->value.set))
B
Ben Laurie 已提交
971
				return(sk_ASN1_TYPE_value(xa->value.set,0));
972 973 974 975 976 977 978
			else
				return(NULL);
			}
		}
	return(NULL);
	}

B
Ben Laurie 已提交
979
ASN1_OCTET_STRING *PKCS7_digest_from_attributes(STACK_OF(X509_ATTRIBUTE) *sk)
980
{
981
	ASN1_TYPE *astype;
982 983 984
	if(!(astype = get_attribute(sk, NID_pkcs9_messageDigest))) return NULL;
	return astype->value.octet_string;
}
985

B
Ben Laurie 已提交
986 987
int PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si,
				STACK_OF(X509_ATTRIBUTE) *sk)
988 989 990 991
	{
	int i;

	if (p7si->auth_attr != NULL)
B
Ben Laurie 已提交
992 993 994
		sk_X509_ATTRIBUTE_pop_free(p7si->auth_attr,X509_ATTRIBUTE_free);
	p7si->auth_attr=sk_X509_ATTRIBUTE_dup(sk);
	for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
995
		{
B
Ben Laurie 已提交
996 997 998
		if ((sk_X509_ATTRIBUTE_set(p7si->auth_attr,i,
			X509_ATTRIBUTE_dup(sk_X509_ATTRIBUTE_value(sk,i))))
		    == NULL)
999 1000 1001 1002 1003
			return(0);
		}
	return(1);
	}

B
Ben Laurie 已提交
1004
int PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk)
1005 1006 1007 1008
	{
	int i;

	if (p7si->unauth_attr != NULL)
B
Ben Laurie 已提交
1009 1010 1011 1012
		sk_X509_ATTRIBUTE_pop_free(p7si->unauth_attr,
					   X509_ATTRIBUTE_free);
	p7si->unauth_attr=sk_X509_ATTRIBUTE_dup(sk);
	for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
1013
		{
B
Ben Laurie 已提交
1014 1015 1016
		if ((sk_X509_ATTRIBUTE_set(p7si->unauth_attr,i,
                        X509_ATTRIBUTE_dup(sk_X509_ATTRIBUTE_value(sk,i))))
		    == NULL)
1017 1018 1019 1020 1021
			return(0);
		}
	return(1);
	}

U
Ulf Möller 已提交
1022
int PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype,
1023
	     void *value)
1024 1025 1026 1027
	{
	return(add_attribute(&(p7si->auth_attr),nid,atrtype,value));
	}

U
Ulf Möller 已提交
1028
int PKCS7_add_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype,
1029
	     void *value)
1030 1031 1032 1033
	{
	return(add_attribute(&(p7si->unauth_attr),nid,atrtype,value));
	}

B
Ben Laurie 已提交
1034 1035
static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype,
			 void *value)
1036 1037 1038 1039 1040
	{
	X509_ATTRIBUTE *attr=NULL;

	if (*sk == NULL)
		{
1041
		*sk = sk_X509_ATTRIBUTE_new_null();
1042 1043
new_attrib:
		attr=X509_ATTRIBUTE_create(nid,atrtype,value);
B
Ben Laurie 已提交
1044
		sk_X509_ATTRIBUTE_push(*sk,attr);
1045 1046 1047 1048 1049
		}
	else
		{
		int i;

B
Ben Laurie 已提交
1050
		for (i=0; i<sk_X509_ATTRIBUTE_num(*sk); i++)
1051
			{
B
Ben Laurie 已提交
1052
			attr=sk_X509_ATTRIBUTE_value(*sk,i);
1053 1054 1055 1056
			if (OBJ_obj2nid(attr->object) == nid)
				{
				X509_ATTRIBUTE_free(attr);
				attr=X509_ATTRIBUTE_create(nid,atrtype,value);
B
Ben Laurie 已提交
1057
				sk_X509_ATTRIBUTE_set(*sk,i,attr);
1058 1059 1060 1061 1062 1063 1064 1065 1066
				goto end;
				}
			}
		goto new_attrib;
		}
end:
	return(1);
	}