pk7_doit.c 24.6 KB
Newer Older
1
/* crypto/pkcs7/pk7_doit.c */
2
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60
 * All rights reserved.
 *
 * This package is an SSL implementation written
 * by Eric Young (eay@cryptsoft.com).
 * The implementation was written so as to conform with Netscapes SSL.
 * 
 * This library is free for commercial and non-commercial use as long as
 * the following conditions are aheared to.  The following conditions
 * apply to all code found in this distribution, be it the RC4, RSA,
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 * included with this distribution is covered by the same copyright terms
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 * 
 * Copyright remains Eric Young's, and as such any Copyright notices in
 * the code are not to be removed.
 * If this package is used in a product, Eric Young should be given attribution
 * as the author of the parts of the library used.
 * This can be in the form of a textual message at program startup or
 * in documentation (online or textual) provided with the package.
 * 
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 * 3. All advertising materials mentioning features or use of this software
 *    must display the following acknowledgement:
 *    "This product includes cryptographic software written by
 *     Eric Young (eay@cryptsoft.com)"
 *    The word 'cryptographic' can be left out if the rouines from the library
 *    being used are not cryptographic related :-).
 * 4. If you include any Windows specific code (or a derivative thereof) from 
 *    the apps directory (application code) you must include an acknowledgement:
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 * 
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 * 
 * The licence and distribution terms for any publically available version or
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 * copied and put under another distribution licence
 * [including the GNU Public Licence.]
 */

#include <stdio.h>
#include "cryptlib.h"
61 62 63
#include <openssl/rand.h>
#include <openssl/objects.h>
#include <openssl/x509.h>
64
#include <openssl/x509v3.h>
65

B
Ben Laurie 已提交
66 67 68
static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype,
			 void *value);
static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid);
69

70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
static int PKCS7_type_is_other(PKCS7* p7)
	{
	int isOther=1;
	
	int nid=OBJ_obj2nid(p7->type);

	switch( nid )
		{
	case NID_pkcs7_data:
	case NID_pkcs7_signed:
	case NID_pkcs7_enveloped:
	case NID_pkcs7_signedAndEnveloped:
	case NID_pkcs7_digest:
	case NID_pkcs7_encrypted:
		isOther=0;
		break;
	default:
		isOther=1;
		}

	return isOther;

	}

94
static ASN1_OCTET_STRING *PKCS7_get_octet_string(PKCS7 *p7)
95
	{
96 97 98 99 100 101
	if ( PKCS7_type_is_data(p7))
		return p7->d.data;
	if ( PKCS7_type_is_other(p7) && p7->d.other
		&& (p7->d.other->type == V_ASN1_OCTET_STRING))
		return p7->d.other->value.octet_string;
	return NULL;
102 103
	}

U
Ulf Möller 已提交
104
BIO *PKCS7_dataInit(PKCS7 *p7, BIO *bio)
105 106
	{
	int i,j;
107
	BIO *out=NULL,*btmp=NULL;
108
	X509_ALGOR *xa;
B
Ben Laurie 已提交
109 110
	const EVP_MD *evp_md;
	const EVP_CIPHER *evp_cipher=NULL;
B
Stack.  
Ben Laurie 已提交
111
	STACK_OF(X509_ALGOR) *md_sk=NULL;
B
stack.  
Ben Laurie 已提交
112
	STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL;
113 114 115
	X509_ALGOR *xalg=NULL;
	PKCS7_RECIP_INFO *ri=NULL;
	EVP_PKEY *pkey;
116 117 118 119 120 121 122

	i=OBJ_obj2nid(p7->type);
	p7->state=PKCS7_S_HEADER;

	switch (i)
		{
	case NID_pkcs7_signed:
123 124 125 126 127
		md_sk=p7->d.sign->md_algs;
		break;
	case NID_pkcs7_signedAndEnveloped:
		rsk=p7->d.signed_and_enveloped->recipientinfo;
		md_sk=p7->d.signed_and_enveloped->md_algs;
128 129
		xalg=p7->d.signed_and_enveloped->enc_data->algorithm;
		evp_cipher=p7->d.signed_and_enveloped->enc_data->cipher;
130
		if (evp_cipher == NULL)
131
			{
132 133
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,
						PKCS7_R_CIPHER_NOT_INITIALIZED);
134 135 136
			goto err;
			}
		break;
137 138
	case NID_pkcs7_enveloped:
		rsk=p7->d.enveloped->recipientinfo;
139 140
		xalg=p7->d.enveloped->enc_data->algorithm;
		evp_cipher=p7->d.enveloped->enc_data->cipher;
141 142
		if (evp_cipher == NULL)
			{
143 144
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,
						PKCS7_R_CIPHER_NOT_INITIALIZED);
145 146 147
			goto err;
			}
		break;
148 149 150 151 152 153 154
	default:
		PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNSUPPORTED_CONTENT_TYPE);
	        goto err;
		}

	if (md_sk != NULL)
		{
B
Stack.  
Ben Laurie 已提交
155
		for (i=0; i<sk_X509_ALGOR_num(md_sk); i++)
156
			{
B
Stack.  
Ben Laurie 已提交
157
			xa=sk_X509_ALGOR_value(md_sk,i);
158 159 160 161 162
			if ((btmp=BIO_new(BIO_f_md())) == NULL)
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_BIO_LIB);
				goto err;
				}
163 164 165 166 167 168 169 170 171 172 173 174 175 176

			j=OBJ_obj2nid(xa->algorithm);
			evp_md=EVP_get_digestbyname(OBJ_nid2sn(j));
			if (evp_md == NULL)
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNKNOWN_DIGEST_TYPE);
				goto err;
				}

			BIO_set_md(btmp,evp_md);
			if (out == NULL)
				out=btmp;
			else
				BIO_push(out,btmp);
177
			btmp=NULL;
178 179
			}
		}
180 181 182 183 184 185 186 187

	if (evp_cipher != NULL)
		{
		unsigned char key[EVP_MAX_KEY_LENGTH];
		unsigned char iv[EVP_MAX_IV_LENGTH];
		int keylen,ivlen;
		int jj,max;
		unsigned char *tmp;
188
		EVP_CIPHER_CTX *ctx;
189

190 191 192 193 194
		if ((btmp=BIO_new(BIO_f_cipher())) == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_BIO_LIB);
			goto err;
			}
195
		BIO_get_cipher_ctx(btmp, &ctx);
196 197
		keylen=EVP_CIPHER_key_length(evp_cipher);
		ivlen=EVP_CIPHER_iv_length(evp_cipher);
198 199
		if (RAND_bytes(key,keylen) <= 0)
			goto err;
200
		xalg->algorithm = OBJ_nid2obj(EVP_CIPHER_type(evp_cipher));
201
		if (ivlen > 0) RAND_pseudo_bytes(iv,ivlen);
202
		EVP_CipherInit_ex(ctx, evp_cipher, NULL, key, iv, 1);
203

204 205 206 207 208 209
		if (ivlen > 0) {
			if (xalg->parameter == NULL) 
						xalg->parameter=ASN1_TYPE_new();
			if(EVP_CIPHER_param_to_asn1(ctx, xalg->parameter) < 0)
								       goto err;
		}
210 211 212

		/* Lets do the pub key stuff :-) */
		max=0;
B
stack.  
Ben Laurie 已提交
213
		for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++)
214
			{
B
stack.  
Ben Laurie 已提交
215
			ri=sk_PKCS7_RECIP_INFO_value(rsk,i);
216 217 218 219 220
			if (ri->cert == NULL)
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_MISSING_CERIPEND_INFO);
				goto err;
				}
221 222
			pkey=X509_get_pubkey(ri->cert);
			jj=EVP_PKEY_size(pkey);
223
			EVP_PKEY_free(pkey);
224 225
			if (max < jj) max=jj;
			}
226
		if ((tmp=(unsigned char *)OPENSSL_malloc(max)) == NULL)
227 228 229 230
			{
			PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_MALLOC_FAILURE);
			goto err;
			}
B
stack.  
Ben Laurie 已提交
231
		for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++)
232
			{
B
stack.  
Ben Laurie 已提交
233
			ri=sk_PKCS7_RECIP_INFO_value(rsk,i);
234 235
			pkey=X509_get_pubkey(ri->cert);
			jj=EVP_PKEY_encrypt(tmp,key,keylen,pkey);
236
			EVP_PKEY_free(pkey);
237 238 239
			if (jj <= 0)
				{
				PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_EVP_LIB);
240
				OPENSSL_free(tmp);
241 242
				goto err;
				}
243
			M_ASN1_OCTET_STRING_set(ri->enc_key,tmp,jj);
244
			}
245
		OPENSSL_free(tmp);
246
		OPENSSL_cleanse(key, keylen);
247 248 249 250 251

		if (out == NULL)
			out=btmp;
		else
			BIO_push(out,btmp);
252
		btmp=NULL;
253 254
		}

255 256
	if (bio == NULL)
		{
D
 
Dr. Stephen Henson 已提交
257
		if (PKCS7_is_detached(p7))
258
			bio=BIO_new(BIO_s_null());
259 260 261 262 263 264 265 266
		else
			{
			ASN1_OCTET_STRING *os;
			os = PKCS7_get_octet_string(p7->d.sign->contents);
			if (os && os->length > 0)
				bio = BIO_new_mem_buf(os->data, os->length);
			if(bio == NULL)
				{
267 268
				bio=BIO_new(BIO_s_mem());
				BIO_set_mem_eof_return(bio,0);
269
				}
270
			}
271
	}
272
	BIO_push(out,bio);
273 274 275 276 277 278 279 280 281 282
	bio=NULL;
	if (0)
		{
err:
		if (out != NULL)
			BIO_free_all(out);
		if (btmp != NULL)
			BIO_free_all(btmp);
		out=NULL;
		}
283
	return(out);
284 285 286
	}

/* int */
287
BIO *PKCS7_dataDecode(PKCS7 *p7, EVP_PKEY *pkey, BIO *in_bio, X509 *pcert)
288 289 290
	{
	int i,j;
	BIO *out=NULL,*btmp=NULL,*etmp=NULL,*bio=NULL;
291
	unsigned char *tmp=NULL;
292 293
	X509_ALGOR *xa;
	ASN1_OCTET_STRING *data_body=NULL;
B
Ben Laurie 已提交
294 295
	const EVP_MD *evp_md;
	const EVP_CIPHER *evp_cipher=NULL;
296 297
	EVP_CIPHER_CTX *evp_ctx=NULL;
	X509_ALGOR *enc_alg=NULL;
B
Stack.  
Ben Laurie 已提交
298
	STACK_OF(X509_ALGOR) *md_sk=NULL;
B
stack.  
Ben Laurie 已提交
299
	STACK_OF(PKCS7_RECIP_INFO) *rsk=NULL;
300 301 302 303 304 305 306 307 308
	X509_ALGOR *xalg=NULL;
	PKCS7_RECIP_INFO *ri=NULL;

	i=OBJ_obj2nid(p7->type);
	p7->state=PKCS7_S_HEADER;

	switch (i)
		{
	case NID_pkcs7_signed:
309
		data_body=PKCS7_get_octet_string(p7->d.sign->contents);
310 311 312 313 314 315 316 317 318 319
		md_sk=p7->d.sign->md_algs;
		break;
	case NID_pkcs7_signedAndEnveloped:
		rsk=p7->d.signed_and_enveloped->recipientinfo;
		md_sk=p7->d.signed_and_enveloped->md_algs;
		data_body=p7->d.signed_and_enveloped->enc_data->enc_data;
		enc_alg=p7->d.signed_and_enveloped->enc_data->algorithm;
		evp_cipher=EVP_get_cipherbyname(OBJ_nid2sn(OBJ_obj2nid(enc_alg->algorithm)));
		if (evp_cipher == NULL)
			{
320
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);
321 322 323 324 325 326 327 328 329 330 331
			goto err;
			}
		xalg=p7->d.signed_and_enveloped->enc_data->algorithm;
		break;
	case NID_pkcs7_enveloped:
		rsk=p7->d.enveloped->recipientinfo;
		enc_alg=p7->d.enveloped->enc_data->algorithm;
		data_body=p7->d.enveloped->enc_data->enc_data;
		evp_cipher=EVP_get_cipherbyname(OBJ_nid2sn(OBJ_obj2nid(enc_alg->algorithm)));
		if (evp_cipher == NULL)
			{
332
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);
333 334 335 336 337
			goto err;
			}
		xalg=p7->d.enveloped->enc_data->algorithm;
		break;
	default:
338
		PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNSUPPORTED_CONTENT_TYPE);
339 340 341 342 343 344
	        goto err;
		}

	/* We will be checking the signature */
	if (md_sk != NULL)
		{
B
Stack.  
Ben Laurie 已提交
345
		for (i=0; i<sk_X509_ALGOR_num(md_sk); i++)
346
			{
B
Stack.  
Ben Laurie 已提交
347
			xa=sk_X509_ALGOR_value(md_sk,i);
348 349
			if ((btmp=BIO_new(BIO_f_md())) == NULL)
				{
350
				PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB);
351 352 353 354 355 356 357
				goto err;
				}

			j=OBJ_obj2nid(xa->algorithm);
			evp_md=EVP_get_digestbyname(OBJ_nid2sn(j));
			if (evp_md == NULL)
				{
358
				PKCS7err(PKCS7_F_PKCS7_DATADECODE,PKCS7_R_UNKNOWN_DIGEST_TYPE);
359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384
				goto err;
				}

			BIO_set_md(btmp,evp_md);
			if (out == NULL)
				out=btmp;
			else
				BIO_push(out,btmp);
			btmp=NULL;
			}
		}

	if (evp_cipher != NULL)
		{
#if 0
		unsigned char key[EVP_MAX_KEY_LENGTH];
		unsigned char iv[EVP_MAX_IV_LENGTH];
		unsigned char *p;
		int keylen,ivlen;
		int max;
		X509_OBJECT ret;
#endif
		int jj;

		if ((etmp=BIO_new(BIO_f_cipher())) == NULL)
			{
385
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_BIO_LIB);
386 387 388 389 390 391
			goto err;
			}

		/* It was encrypted, we need to decrypt the secret key
		 * with the private key */

392 393
		/* Find the recipientInfo which matches the passed certificate
		 * (if any)
394 395
		 */

B
stack.  
Ben Laurie 已提交
396 397
		for (i=0; i<sk_PKCS7_RECIP_INFO_num(rsk); i++) {
			ri=sk_PKCS7_RECIP_INFO_value(rsk,i);
398 399
			if(!X509_NAME_cmp(ri->issuer_and_serial->issuer,
					pcert->cert_info->issuer) &&
400
			     !M_ASN1_INTEGER_cmp(pcert->cert_info->serialNumber,
401
					ri->issuer_and_serial->serial)) break;
402
			ri=NULL;
403 404 405 406
		}
		if (ri == NULL) {
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,
				 PKCS7_R_NO_RECIPIENT_MATCHES_CERTIFICATE);
407
			goto err;
408
		}
409 410

		jj=EVP_PKEY_size(pkey);
411
		tmp=(unsigned char *)OPENSSL_malloc(jj+10);
412 413
		if (tmp == NULL)
			{
414
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_MALLOC_FAILURE);
415 416 417
			goto err;
			}

418 419
		jj=EVP_PKEY_decrypt(tmp, M_ASN1_STRING_data(ri->enc_key),
			M_ASN1_STRING_length(ri->enc_key), pkey);
420 421
		if (jj <= 0)
			{
422
			PKCS7err(PKCS7_F_PKCS7_DATADECODE,ERR_R_EVP_LIB);
423 424 425 426 427
			goto err;
			}

		evp_ctx=NULL;
		BIO_get_cipher_ctx(etmp,&evp_ctx);
428
		EVP_CipherInit_ex(evp_ctx,evp_cipher,NULL,NULL,NULL,0);
429
		if (EVP_CIPHER_asn1_to_param(evp_ctx,enc_alg->parameter) < 0)
430
			goto err;
431

432
		if (jj != EVP_CIPHER_CTX_key_length(evp_ctx)) {
D
 
Dr. Stephen Henson 已提交
433
			/* Some S/MIME clients don't use the same key
434 435 436
			 * and effective key length. The key length is
			 * determined by the size of the decrypted RSA key.
			 */
D
 
Dr. Stephen Henson 已提交
437
			if(!EVP_CIPHER_CTX_set_key_length(evp_ctx, jj))
B
Bodo Möller 已提交
438
				{
439
				PKCS7err(PKCS7_F_PKCS7_DATADECODE,
440
					PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH);
441
				goto err;
B
Bodo Möller 已提交
442
				}
D
 
Dr. Stephen Henson 已提交
443
		} 
444
		EVP_CipherInit_ex(evp_ctx,NULL,NULL,tmp,NULL,0);
445

446
		OPENSSL_cleanse(tmp,jj);
447 448 449 450 451 452 453 454 455

		if (out == NULL)
			out=etmp;
		else
			BIO_push(out,etmp);
		etmp=NULL;
		}

#if 1
D
 
Dr. Stephen Henson 已提交
456
	if (PKCS7_is_detached(p7) || (in_bio != NULL))
457 458 459 460 461
		{
		bio=in_bio;
		}
	else 
		{
462
#if 0
463 464 465 466 467 468 469 470
		bio=BIO_new(BIO_s_mem());
		/* We need to set this so that when we have read all
		 * the data, the encrypt BIO, if present, will read
		 * EOF and encode the last few bytes */
		BIO_set_mem_eof_return(bio,0);

		if (data_body->length > 0)
			BIO_write(bio,(char *)data_body->data,data_body->length);
471 472 473 474 475 476 477 478
#else
		if (data_body->length > 0)
		      bio = BIO_new_mem_buf(data_body->data,data_body->length);
		else {
			bio=BIO_new(BIO_s_mem());
			BIO_set_mem_eof_return(bio,0);
		}
#endif
479 480 481 482 483 484
		}
	BIO_push(out,bio);
	bio=NULL;
#endif
	if (0)
		{
485
err:
486 487 488 489 490 491 492
		if (out != NULL) BIO_free_all(out);
		if (btmp != NULL) BIO_free_all(btmp);
		if (etmp != NULL) BIO_free_all(etmp);
		if (bio != NULL) BIO_free_all(bio);
		out=NULL;
		}
	if (tmp != NULL)
493
		OPENSSL_free(tmp);
494
	return(out);
495 496
	}

U
Ulf Möller 已提交
497
int PKCS7_dataFinal(PKCS7 *p7, BIO *bio)
498 499 500 501 502 503 504 505
	{
	int ret=0;
	int i,j;
	BIO *btmp;
	BUF_MEM *buf_mem=NULL;
	BUF_MEM *buf=NULL;
	PKCS7_SIGNER_INFO *si;
	EVP_MD_CTX *mdc,ctx_tmp;
B
Ben Laurie 已提交
506
	STACK_OF(X509_ATTRIBUTE) *sk;
B
Stack.  
Ben Laurie 已提交
507
	STACK_OF(PKCS7_SIGNER_INFO) *si_sk=NULL;
508
	ASN1_OCTET_STRING *os=NULL;
509

510
	EVP_MD_CTX_init(&ctx_tmp);
511 512 513 514 515
	i=OBJ_obj2nid(p7->type);
	p7->state=PKCS7_S_HEADER;

	switch (i)
		{
516 517 518
	case NID_pkcs7_signedAndEnveloped:
		/* XXXXXXXXXXXXXXXX */
		si_sk=p7->d.signed_and_enveloped->signer_info;
519
		os=M_ASN1_OCTET_STRING_new();
520 521
		p7->d.signed_and_enveloped->enc_data->enc_data=os;
		break;
522 523
	case NID_pkcs7_enveloped:
		/* XXXXXXXXXXXXXXXX */
524
		os=M_ASN1_OCTET_STRING_new();
525 526
		p7->d.enveloped->enc_data->enc_data=os;
		break;
527
	case NID_pkcs7_signed:
528
		si_sk=p7->d.sign->signer_info;
529
		os=PKCS7_get_octet_string(p7->d.sign->contents);
530
		/* If detached data then the content is excluded */
531
		if(PKCS7_type_is_data(p7->d.sign->contents) && p7->detached) {
532
			M_ASN1_OCTET_STRING_free(os);
533 534
			p7->d.sign->contents->d.data = NULL;
		}
535 536
		break;
		}
537

538 539
	if (si_sk != NULL)
		{
540 541 542 543 544
		if ((buf=BUF_MEM_new()) == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_BIO_LIB);
			goto err;
			}
B
Stack.  
Ben Laurie 已提交
545
		for (i=0; i<sk_PKCS7_SIGNER_INFO_num(si_sk); i++)
546
			{
B
Stack.  
Ben Laurie 已提交
547
			si=sk_PKCS7_SIGNER_INFO_value(si_sk,i);
548 549 550
			if (si->pkey == NULL) continue;

			j=OBJ_obj2nid(si->digest_alg->algorithm);
551 552 553 554 555 556 557

			btmp=bio;
			for (;;)
				{
				if ((btmp=BIO_find_type(btmp,BIO_TYPE_MD)) 
					== NULL)
					{
558
					PKCS7err(PKCS7_F_PKCS7_DATASIGN,PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
559 560 561 562 563
					goto err;
					}
				BIO_get_md_ctx(btmp,&mdc);
				if (mdc == NULL)
					{
B
Bodo Möller 已提交
564
					PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_INTERNAL_ERROR);
565 566
					goto err;
					}
567
				if (EVP_MD_CTX_type(mdc) == j)
568 569
					break;
				else
D
 
Dr. Stephen Henson 已提交
570
					btmp=BIO_next(btmp);
571 572 573 574
				}
			
			/* We now have the EVP_MD_CTX, lets do the
			 * signing. */
D
 
Dr. Stephen Henson 已提交
575
			EVP_MD_CTX_copy_ex(&ctx_tmp,mdc);
576
			if (!BUF_MEM_grow_clean(buf,EVP_PKEY_size(si->pkey)))
577 578
				{
				PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_BIO_LIB);
579
				goto err;
580
				}
581 582

			sk=si->auth_attr;
583 584 585

			/* If there are attributes, we add the digest
			 * attribute and only sign the attributes */
B
Ben Laurie 已提交
586
			if ((sk != NULL) && (sk_X509_ATTRIBUTE_num(sk) != 0))
587
				{
588 589
				unsigned char md_data[EVP_MAX_MD_SIZE], *abuf=NULL;
				unsigned int md_len, alen;
590 591
				ASN1_OCTET_STRING *digest;
				ASN1_UTCTIME *sign_time;
B
Ben Laurie 已提交
592
				const EVP_MD *md_tmp;
593

D
 
Dr. Stephen Henson 已提交
594 595 596 597 598 599 600 601 602
				/* Add signing time if not already present */
				if (!PKCS7_get_signed_attribute(si,
							NID_pkcs9_signingTime))
					{
					sign_time=X509_gmtime_adj(NULL,0);
					PKCS7_add_signed_attribute(si,
						NID_pkcs9_signingTime,
						V_ASN1_UTCTIME,sign_time);
					}
603 604

				/* Add digest */
605
				md_tmp=EVP_MD_CTX_md(&ctx_tmp);
D
 
Dr. Stephen Henson 已提交
606
				EVP_DigestFinal_ex(&ctx_tmp,md_data,&md_len);
607 608
				digest=M_ASN1_OCTET_STRING_new();
				M_ASN1_OCTET_STRING_set(digest,md_data,md_len);
609 610
				PKCS7_add_signed_attribute(si,
					NID_pkcs9_messageDigest,
611
					V_ASN1_OCTET_STRING,digest);
612

613
				/* Now sign the attributes */
D
 
Dr. Stephen Henson 已提交
614
				EVP_SignInit_ex(&ctx_tmp,md_tmp,NULL);
615
				alen = ASN1_item_i2d((ASN1_VALUE *)sk,&abuf,
616
							ASN1_ITEM_rptr(PKCS7_ATTR_SIGN));
617 618 619
				if(!abuf) goto err;
				EVP_SignUpdate(&ctx_tmp,abuf,alen);
				OPENSSL_free(abuf);
620 621
				}

622
#ifndef OPENSSL_NO_DSA
623 624
			if (si->pkey->type == EVP_PKEY_DSA)
				ctx_tmp.digest=EVP_dss1();
625
#endif
B
Bodo Möller 已提交
626
#ifndef OPENSSL_NO_ECDSA
627
 			if (si->pkey->type == EVP_PKEY_EC)
B
Bodo Möller 已提交
628 629
 				ctx_tmp.digest=EVP_ecdsa();
#endif
630

631
			if (!EVP_SignFinal(&ctx_tmp,(unsigned char *)buf->data,
632
				(unsigned int *)&buf->length,si->pkey))
633 634
				{
				PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_EVP_LIB);
635
				goto err;
636
				}
637 638 639
			if (!ASN1_STRING_set(si->enc_digest,
				(unsigned char *)buf->data,buf->length))
				{
640
				PKCS7err(PKCS7_F_PKCS7_DATASIGN,ERR_R_ASN1_LIB);
641 642 643 644 645
				goto err;
				}
			}
		}

D
 
Dr. Stephen Henson 已提交
646
	if (!PKCS7_is_detached(p7))
647 648 649 650 651 652 653 654
		{
		btmp=BIO_find_type(bio,BIO_TYPE_MEM);
		if (btmp == NULL)
			{
			PKCS7err(PKCS7_F_PKCS7_DATASIGN,PKCS7_R_UNABLE_TO_FIND_MEM_BIO);
			goto err;
			}
		BIO_get_mem_ptr(btmp,&buf_mem);
655 656 657 658 659 660 661 662
		/* Mark the BIO read only then we can use its copy of the data
		 * instead of making an extra copy.
		 */
		BIO_set_flags(btmp, BIO_FLAGS_MEM_RDONLY);
		BIO_set_mem_eof_return(btmp, 0);
		os->data = (unsigned char *)buf_mem->data;
		os->length = buf_mem->length;
#if 0
663
		M_ASN1_OCTET_STRING_set(os,
664
			(unsigned char *)buf_mem->data,buf_mem->length);
665
#endif
666
		}
667 668
	ret=1;
err:
669
	EVP_MD_CTX_cleanup(&ctx_tmp);
670 671 672 673
	if (buf != NULL) BUF_MEM_free(buf);
	return(ret);
	}

U
Ulf Möller 已提交
674 675
int PKCS7_dataVerify(X509_STORE *cert_store, X509_STORE_CTX *ctx, BIO *bio,
	     PKCS7 *p7, PKCS7_SIGNER_INFO *si)
676 677
	{
	PKCS7_ISSUER_AND_SERIAL *ias;
678
	int ret=0,i;
B
Ben Laurie 已提交
679
	STACK_OF(X509) *cert;
680 681
	X509 *x509;

682 683 684 685 686 687 688 689 690 691 692 693 694
	if (PKCS7_type_is_signed(p7))
		{
		cert=p7->d.sign->cert;
		}
	else if (PKCS7_type_is_signedAndEnveloped(p7))
		{
		cert=p7->d.signed_and_enveloped->cert;
		}
	else
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_WRONG_PKCS7_TYPE);
		goto err;
		}
695
	/* XXXXXXXXXXXXXXXXXXXXXXX */
696 697
	ias=si->issuer_and_serial;

698
	x509=X509_find_by_issuer_and_serial(cert,ias->issuer,ias->serial);
699 700 701 702 703 704 705 706 707

	/* were we able to find the cert in passed to us */
	if (x509 == NULL)
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,PKCS7_R_UNABLE_TO_FIND_CERTIFICATE);
		goto err;
		}

	/* Lets verify */
708 709 710 711 712
	if(!X509_STORE_CTX_init(ctx,cert_store,x509,cert))
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,ERR_R_X509_LIB);
		goto err;
		}
713
	X509_STORE_CTX_set_purpose(ctx, X509_PURPOSE_SMIME_SIGN);
714
	i=X509_verify_cert(ctx);
715 716 717
	if (i <= 0) 
		{
		PKCS7err(PKCS7_F_PKCS7_DATAVERIFY,ERR_R_X509_LIB);
718
		X509_STORE_CTX_cleanup(ctx);
719 720
		goto err;
		}
721 722
	X509_STORE_CTX_cleanup(ctx);

723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738
	return PKCS7_signatureVerify(bio, p7, si, x509);
	err:
	return ret;
	}

int PKCS7_signatureVerify(BIO *bio, PKCS7 *p7, PKCS7_SIGNER_INFO *si,
								X509 *x509)
	{
	ASN1_OCTET_STRING *os;
	EVP_MD_CTX mdc_tmp,*mdc;
	int ret=0,i;
	int md_type;
	STACK_OF(X509_ATTRIBUTE) *sk;
	BIO *btmp;
	EVP_PKEY *pkey;

739 740
	EVP_MD_CTX_init(&mdc_tmp);

741 742 743 744 745 746 747
	if (!PKCS7_type_is_signed(p7) && 
				!PKCS7_type_is_signedAndEnveloped(p7)) {
		PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
						PKCS7_R_WRONG_PKCS7_TYPE);
		goto err;
	}

748 749 750 751 752 753 754 755
	md_type=OBJ_obj2nid(si->digest_alg->algorithm);

	btmp=bio;
	for (;;)
		{
		if ((btmp == NULL) ||
			((btmp=BIO_find_type(btmp,BIO_TYPE_MD)) == NULL))
			{
756 757
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
					PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
758 759 760 761 762
			goto err;
			}
		BIO_get_md_ctx(btmp,&mdc);
		if (mdc == NULL)
			{
763
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
B
Bodo Möller 已提交
764
							ERR_R_INTERNAL_ERROR);
765 766
			goto err;
			}
767
		if (EVP_MD_CTX_type(mdc) == md_type)
768
			break;
769 770 771 772 773
		/* Workaround for some broken clients that put the signature
		 * OID instead of the digest OID in digest_alg->algorithm
		 */
		if (EVP_MD_pkey_type(EVP_MD_CTX_md(mdc)) == md_type)
			break;
D
 
Dr. Stephen Henson 已提交
774
		btmp=BIO_next(btmp);
775 776
		}

777 778
	/* mdc is the digest ctx that we want, unless there are attributes,
	 * in which case the digest is the signed attributes */
D
 
Dr. Stephen Henson 已提交
779
	EVP_MD_CTX_copy_ex(&mdc_tmp,mdc);
780 781

	sk=si->auth_attr;
B
Ben Laurie 已提交
782
	if ((sk != NULL) && (sk_X509_ATTRIBUTE_num(sk) != 0))
783
		{
784 785
		unsigned char md_dat[EVP_MAX_MD_SIZE], *abuf = NULL;
                unsigned int md_len, alen;
786 787
		ASN1_OCTET_STRING *message_digest;

D
 
Dr. Stephen Henson 已提交
788
		EVP_DigestFinal_ex(&mdc_tmp,md_dat,&md_len);
789 790 791
		message_digest=PKCS7_digest_from_attributes(sk);
		if (!message_digest)
			{
792 793
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
					PKCS7_R_UNABLE_TO_FIND_MESSAGE_DIGEST);
794 795
			goto err;
			}
796
		if ((message_digest->length != (int)md_len) ||
797 798 799 800 801 802 803 804 805 806
			(memcmp(message_digest->data,md_dat,md_len)))
			{
#if 0
{
int ii;
for (ii=0; ii<message_digest->length; ii++)
	printf("%02X",message_digest->data[ii]); printf(" sent\n");
for (ii=0; ii<md_len; ii++) printf("%02X",md_dat[ii]); printf(" calc\n");
}
#endif
807 808
			PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
							PKCS7_R_DIGEST_FAILURE);
809 810 811 812
			ret= -1;
			goto err;
			}

D
 
Dr. Stephen Henson 已提交
813
		EVP_VerifyInit_ex(&mdc_tmp,EVP_get_digestbynid(md_type), NULL);
814 815

		alen = ASN1_item_i2d((ASN1_VALUE *)sk, &abuf,
816
						ASN1_ITEM_rptr(PKCS7_ATTR_VERIFY));
817 818 819
		EVP_VerifyUpdate(&mdc_tmp, abuf, alen);

		OPENSSL_free(abuf);
820 821 822
		}

	os=si->enc_digest;
823
	pkey = X509_get_pubkey(x509);
824 825 826 827 828
	if (!pkey)
		{
		ret = -1;
		goto err;
		}
829
#ifndef OPENSSL_NO_DSA
830
	if(pkey->type == EVP_PKEY_DSA) mdc_tmp.digest=EVP_dss1();
831
#endif
B
Bodo Möller 已提交
832
#ifndef OPENSSL_NO_ECDSA
833
	if (pkey->type == EVP_PKEY_EC) mdc_tmp.digest=EVP_ecdsa();
B
Bodo Möller 已提交
834
#endif
835

836 837
	i=EVP_VerifyFinal(&mdc_tmp,os->data,os->length, pkey);
	EVP_PKEY_free(pkey);
838 839
	if (i <= 0)
		{
840 841
		PKCS7err(PKCS7_F_PKCS7_SIGNATUREVERIFY,
						PKCS7_R_SIGNATURE_FAILURE);
842 843 844 845 846 847
		ret= -1;
		goto err;
		}
	else
		ret=1;
err:
848
	EVP_MD_CTX_cleanup(&mdc_tmp);
849 850 851
	return(ret);
	}

U
Ulf Möller 已提交
852
PKCS7_ISSUER_AND_SERIAL *PKCS7_get_issuer_and_serial(PKCS7 *p7, int idx)
853
	{
B
stack.  
Ben Laurie 已提交
854
	STACK_OF(PKCS7_RECIP_INFO) *rsk;
855 856 857 858 859 860
	PKCS7_RECIP_INFO *ri;
	int i;

	i=OBJ_obj2nid(p7->type);
	if (i != NID_pkcs7_signedAndEnveloped) return(NULL);
	rsk=p7->d.signed_and_enveloped->recipientinfo;
B
stack.  
Ben Laurie 已提交
861 862 863
	ri=sk_PKCS7_RECIP_INFO_value(rsk,0);
	if (sk_PKCS7_RECIP_INFO_num(rsk) <= idx) return(NULL);
	ri=sk_PKCS7_RECIP_INFO_value(rsk,idx);
864 865 866
	return(ri->issuer_and_serial);
	}

U
Ulf Möller 已提交
867
ASN1_TYPE *PKCS7_get_signed_attribute(PKCS7_SIGNER_INFO *si, int nid)
868 869 870 871
	{
	return(get_attribute(si->auth_attr,nid));
	}

U
Ulf Möller 已提交
872
ASN1_TYPE *PKCS7_get_attribute(PKCS7_SIGNER_INFO *si, int nid)
873 874 875 876
	{
	return(get_attribute(si->unauth_attr,nid));
	}

B
Ben Laurie 已提交
877
static ASN1_TYPE *get_attribute(STACK_OF(X509_ATTRIBUTE) *sk, int nid)
878 879 880 881 882 883
	{
	int i;
	X509_ATTRIBUTE *xa;
	ASN1_OBJECT *o;

	o=OBJ_nid2obj(nid);
884
	if (!o || !sk) return(NULL);
B
Ben Laurie 已提交
885
	for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
886
		{
B
Ben Laurie 已提交
887
		xa=sk_X509_ATTRIBUTE_value(sk,i);
888 889
		if (OBJ_cmp(xa->object,o) == 0)
			{
D
 
Dr. Stephen Henson 已提交
890
			if (!xa->single && sk_ASN1_TYPE_num(xa->value.set))
B
Ben Laurie 已提交
891
				return(sk_ASN1_TYPE_value(xa->value.set,0));
892 893 894 895 896 897 898
			else
				return(NULL);
			}
		}
	return(NULL);
	}

B
Ben Laurie 已提交
899
ASN1_OCTET_STRING *PKCS7_digest_from_attributes(STACK_OF(X509_ATTRIBUTE) *sk)
900
{
901
	ASN1_TYPE *astype;
902 903 904
	if(!(astype = get_attribute(sk, NID_pkcs9_messageDigest))) return NULL;
	return astype->value.octet_string;
}
905

B
Ben Laurie 已提交
906 907
int PKCS7_set_signed_attributes(PKCS7_SIGNER_INFO *p7si,
				STACK_OF(X509_ATTRIBUTE) *sk)
908 909 910 911
	{
	int i;

	if (p7si->auth_attr != NULL)
B
Ben Laurie 已提交
912 913 914
		sk_X509_ATTRIBUTE_pop_free(p7si->auth_attr,X509_ATTRIBUTE_free);
	p7si->auth_attr=sk_X509_ATTRIBUTE_dup(sk);
	for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
915
		{
B
Ben Laurie 已提交
916 917 918
		if ((sk_X509_ATTRIBUTE_set(p7si->auth_attr,i,
			X509_ATTRIBUTE_dup(sk_X509_ATTRIBUTE_value(sk,i))))
		    == NULL)
919 920 921 922 923
			return(0);
		}
	return(1);
	}

B
Ben Laurie 已提交
924
int PKCS7_set_attributes(PKCS7_SIGNER_INFO *p7si, STACK_OF(X509_ATTRIBUTE) *sk)
925 926 927 928
	{
	int i;

	if (p7si->unauth_attr != NULL)
B
Ben Laurie 已提交
929 930 931 932
		sk_X509_ATTRIBUTE_pop_free(p7si->unauth_attr,
					   X509_ATTRIBUTE_free);
	p7si->unauth_attr=sk_X509_ATTRIBUTE_dup(sk);
	for (i=0; i<sk_X509_ATTRIBUTE_num(sk); i++)
933
		{
B
Ben Laurie 已提交
934 935 936
		if ((sk_X509_ATTRIBUTE_set(p7si->unauth_attr,i,
                        X509_ATTRIBUTE_dup(sk_X509_ATTRIBUTE_value(sk,i))))
		    == NULL)
937 938 939 940 941
			return(0);
		}
	return(1);
	}

U
Ulf Möller 已提交
942
int PKCS7_add_signed_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype,
943
	     void *value)
944 945 946 947
	{
	return(add_attribute(&(p7si->auth_attr),nid,atrtype,value));
	}

U
Ulf Möller 已提交
948
int PKCS7_add_attribute(PKCS7_SIGNER_INFO *p7si, int nid, int atrtype,
949
	     void *value)
950 951 952 953
	{
	return(add_attribute(&(p7si->unauth_attr),nid,atrtype,value));
	}

B
Ben Laurie 已提交
954 955
static int add_attribute(STACK_OF(X509_ATTRIBUTE) **sk, int nid, int atrtype,
			 void *value)
956 957 958 959 960
	{
	X509_ATTRIBUTE *attr=NULL;

	if (*sk == NULL)
		{
961
		*sk = sk_X509_ATTRIBUTE_new_null();
962 963
new_attrib:
		attr=X509_ATTRIBUTE_create(nid,atrtype,value);
B
Ben Laurie 已提交
964
		sk_X509_ATTRIBUTE_push(*sk,attr);
965 966 967 968 969
		}
	else
		{
		int i;

B
Ben Laurie 已提交
970
		for (i=0; i<sk_X509_ATTRIBUTE_num(*sk); i++)
971
			{
B
Ben Laurie 已提交
972
			attr=sk_X509_ATTRIBUTE_value(*sk,i);
973 974 975 976
			if (OBJ_obj2nid(attr->object) == nid)
				{
				X509_ATTRIBUTE_free(attr);
				attr=X509_ATTRIBUTE_create(nid,atrtype,value);
B
Ben Laurie 已提交
977
				sk_X509_ATTRIBUTE_set(*sk,i,attr);
978 979 980 981 982 983 984 985 986
				goto end;
				}
			}
		goto new_attrib;
		}
end:
	return(1);
	}