123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- /*
- * CMS contentInfo methods.
- */
- #include "cmslocal.h"
- #include "pk11func.h"
- #include "secitem.h"
- #include "secoid.h"
- #include "secerr.h"
- /*
- * NSS_CMSContentInfo_Create - create a content info
- *
- * version is set in the _Finalize procedures for each content type
- */
- SECStatus
- NSS_CMSContentInfo_Private_Init(NSSCMSContentInfo *cinfo)
- {
- if (cinfo->privateInfo) {
- return SECSuccess;
- }
- cinfo->privateInfo = PORT_ZNew(NSSCMSContentInfoPrivate);
- return (cinfo->privateInfo) ? SECSuccess : SECFailure;
- }
- static void
- nss_cmsContentInfo_private_destroy(NSSCMSContentInfoPrivate *privateInfo)
- {
- if (privateInfo->digcx) {
- /* must destroy digest objects */
- NSS_CMSDigestContext_Cancel(privateInfo->digcx);
- privateInfo->digcx = NULL;
- }
- if (privateInfo->ciphcx) {
- NSS_CMSCipherContext_Destroy(privateInfo->ciphcx);
- privateInfo->ciphcx = NULL;
- }
- PORT_Free(privateInfo);
- }
- /*
- * NSS_CMSContentInfo_Destroy - destroy a CMS contentInfo and all of its sub-pieces.
- */
- void
- NSS_CMSContentInfo_Destroy(NSSCMSContentInfo *cinfo)
- {
- SECOidTag kind;
- if (cinfo == NULL) {
- return;
- }
- kind = NSS_CMSContentInfo_GetContentTypeTag(cinfo);
- switch (kind) {
- case SEC_OID_PKCS7_ENVELOPED_DATA:
- NSS_CMSEnvelopedData_Destroy(cinfo->content.envelopedData);
- break;
- case SEC_OID_PKCS7_SIGNED_DATA:
- NSS_CMSSignedData_Destroy(cinfo->content.signedData);
- break;
- case SEC_OID_PKCS7_ENCRYPTED_DATA:
- NSS_CMSEncryptedData_Destroy(cinfo->content.encryptedData);
- break;
- case SEC_OID_PKCS7_DIGESTED_DATA:
- NSS_CMSDigestedData_Destroy(cinfo->content.digestedData);
- break;
- default:
- NSS_CMSGenericWrapperData_Destroy(kind, cinfo->content.genericData);
- /* XXX Anything else that needs to be "manually" freed/destroyed? */
- break;
- }
- if (cinfo->privateInfo) {
- nss_cmsContentInfo_private_destroy(cinfo->privateInfo);
- cinfo->privateInfo = NULL;
- }
- if (cinfo->bulkkey) {
- PK11_FreeSymKey(cinfo->bulkkey);
- }
- }
- /*
- * NSS_CMSContentInfo_GetChildContentInfo - get content's contentInfo (if it exists)
- */
- NSSCMSContentInfo *
- NSS_CMSContentInfo_GetChildContentInfo(NSSCMSContentInfo *cinfo)
- {
- NSSCMSContentInfo *ccinfo = NULL;
- if (cinfo == NULL) {
- return NULL;
- }
- SECOidTag tag = NSS_CMSContentInfo_GetContentTypeTag(cinfo);
- switch (tag) {
- case SEC_OID_PKCS7_SIGNED_DATA:
- if (cinfo->content.signedData != NULL) {
- ccinfo = &(cinfo->content.signedData->contentInfo);
- }
- break;
- case SEC_OID_PKCS7_ENVELOPED_DATA:
- if (cinfo->content.envelopedData != NULL) {
- ccinfo = &(cinfo->content.envelopedData->contentInfo);
- }
- break;
- case SEC_OID_PKCS7_DIGESTED_DATA:
- if (cinfo->content.digestedData != NULL) {
- ccinfo = &(cinfo->content.digestedData->contentInfo);
- }
- break;
- case SEC_OID_PKCS7_ENCRYPTED_DATA:
- if (cinfo->content.encryptedData != NULL) {
- ccinfo = &(cinfo->content.encryptedData->contentInfo);
- }
- break;
- case SEC_OID_PKCS7_DATA:
- default:
- if (NSS_CMSType_IsWrapper(tag)) {
- if (cinfo->content.genericData != NULL) {
- ccinfo = &(cinfo->content.genericData->contentInfo);
- }
- }
- break;
- }
- if (ccinfo && !ccinfo->privateInfo) {
- NSS_CMSContentInfo_Private_Init(ccinfo);
- }
- return ccinfo;
- }
- SECStatus
- NSS_CMSContentInfo_SetDontStream(NSSCMSContentInfo *cinfo, PRBool dontStream)
- {
- SECStatus rv;
- if (cinfo == NULL) {
- return SECFailure;
- }
- rv = NSS_CMSContentInfo_Private_Init(cinfo);
- if (rv != SECSuccess) {
- /* default is streaming, failure to get ccinfo will not effect this */
- return dontStream ? SECFailure : SECSuccess;
- }
- cinfo->privateInfo->dontStream = dontStream;
- return SECSuccess;
- }
- /*
- * NSS_CMSContentInfo_SetContent - set content type & content
- */
- SECStatus
- NSS_CMSContentInfo_SetContent(NSSCMSMessage *cmsg, NSSCMSContentInfo *cinfo,
- SECOidTag type, void *ptr)
- {
- SECStatus rv;
- if (cinfo == NULL || cmsg == NULL) {
- return SECFailure;
- }
- cinfo->contentTypeTag = SECOID_FindOIDByTag(type);
- if (cinfo->contentTypeTag == NULL) {
- return SECFailure;
- }
- /* do not copy the oid, just create a reference */
- rv = SECITEM_CopyItem(cmsg->poolp, &(cinfo->contentType), &(cinfo->contentTypeTag->oid));
- if (rv != SECSuccess) {
- return SECFailure;
- }
- cinfo->content.pointer = ptr;
- if (NSS_CMSType_IsData(type) && ptr) {
- cinfo->rawContent = ptr;
- } else {
- /* as we always have some inner data,
- * we need to set it to something, just to fool the encoder enough to work on it
- * and get us into nss_cms_encoder_notify at that point */
- cinfo->rawContent = SECITEM_AllocItem(cmsg->poolp, NULL, 1);
- if (cinfo->rawContent == NULL) {
- PORT_SetError(SEC_ERROR_NO_MEMORY);
- return SECFailure;
- }
- }
- return SECSuccess;
- }
- /*
- * NSS_CMSContentInfo_SetContent_XXXX - typesafe wrappers for NSS_CMSContentInfo_SetContent
- */
- /*
- * data == NULL -> pass in data via NSS_CMSEncoder_Update
- * data != NULL -> take this data
- */
- SECStatus
- NSS_CMSContentInfo_SetContent_Data(NSSCMSMessage *cmsg, NSSCMSContentInfo *cinfo,
- SECItem *data, PRBool detached)
- {
- if (NSS_CMSContentInfo_SetContent(cmsg, cinfo, SEC_OID_PKCS7_DATA, (void *)data) != SECSuccess) {
- return SECFailure;
- }
- if (detached) {
- cinfo->rawContent = NULL;
- }
- return SECSuccess;
- }
- SECStatus
- NSS_CMSContentInfo_SetContent_SignedData(NSSCMSMessage *cmsg, NSSCMSContentInfo *cinfo,
- NSSCMSSignedData *sigd)
- {
- return NSS_CMSContentInfo_SetContent(cmsg, cinfo, SEC_OID_PKCS7_SIGNED_DATA, (void *)sigd);
- }
- SECStatus
- NSS_CMSContentInfo_SetContent_EnvelopedData(NSSCMSMessage *cmsg, NSSCMSContentInfo *cinfo,
- NSSCMSEnvelopedData *envd)
- {
- return NSS_CMSContentInfo_SetContent(cmsg, cinfo, SEC_OID_PKCS7_ENVELOPED_DATA, (void *)envd);
- }
- SECStatus
- NSS_CMSContentInfo_SetContent_DigestedData(NSSCMSMessage *cmsg, NSSCMSContentInfo *cinfo,
- NSSCMSDigestedData *digd)
- {
- return NSS_CMSContentInfo_SetContent(cmsg, cinfo, SEC_OID_PKCS7_DIGESTED_DATA, (void *)digd);
- }
- SECStatus
- NSS_CMSContentInfo_SetContent_EncryptedData(NSSCMSMessage *cmsg, NSSCMSContentInfo *cinfo,
- NSSCMSEncryptedData *encd)
- {
- return NSS_CMSContentInfo_SetContent(cmsg, cinfo, SEC_OID_PKCS7_ENCRYPTED_DATA, (void *)encd);
- }
- /*
- * NSS_CMSContentInfo_GetContent - get pointer to inner content
- *
- * needs to be casted...
- */
- void *
- NSS_CMSContentInfo_GetContent(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL) {
- return NULL;
- }
- SECOidTag tag = cinfo->contentTypeTag
- ? cinfo->contentTypeTag->offset
- : SEC_OID_UNKNOWN;
- switch (tag) {
- case SEC_OID_PKCS7_DATA:
- case SEC_OID_PKCS7_SIGNED_DATA:
- case SEC_OID_PKCS7_ENVELOPED_DATA:
- case SEC_OID_PKCS7_DIGESTED_DATA:
- case SEC_OID_PKCS7_ENCRYPTED_DATA:
- return cinfo->content.pointer;
- default:
- return NSS_CMSType_IsWrapper(tag) ? cinfo->content.pointer
- : (NSS_CMSType_IsData(tag) ? cinfo->rawContent
- : NULL);
- }
- }
- /*
- * NSS_CMSContentInfo_GetInnerContent - get pointer to innermost content
- *
- * this is typically only called by NSS_CMSMessage_GetContent()
- */
- SECItem *
- NSS_CMSContentInfo_GetInnerContent(NSSCMSContentInfo *cinfo)
- {
- NSSCMSContentInfo *ccinfo;
- SECOidTag tag;
- SECItem *pItem = NULL;
- if (cinfo == NULL) {
- return NULL;
- }
- tag = NSS_CMSContentInfo_GetContentTypeTag(cinfo);
- if (NSS_CMSType_IsData(tag)) {
- pItem = cinfo->content.data;
- } else if (NSS_CMSType_IsWrapper(tag)) {
- ccinfo = NSS_CMSContentInfo_GetChildContentInfo(cinfo);
- if (ccinfo != NULL) {
- pItem = NSS_CMSContentInfo_GetContent(ccinfo);
- }
- } else {
- PORT_Assert(0);
- }
- return pItem;
- }
- /*
- * NSS_CMSContentInfo_GetContentType{Tag,OID} - find out (saving pointer to lookup result
- * for future reference) and return the inner content type.
- */
- SECOidTag
- NSS_CMSContentInfo_GetContentTypeTag(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL) {
- return SEC_OID_UNKNOWN;
- }
- if (cinfo->contentTypeTag == NULL)
- cinfo->contentTypeTag = SECOID_FindOID(&(cinfo->contentType));
- if (cinfo->contentTypeTag == NULL)
- return SEC_OID_UNKNOWN;
- return cinfo->contentTypeTag->offset;
- }
- SECItem *
- NSS_CMSContentInfo_GetContentTypeOID(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL) {
- return NULL;
- }
- if (cinfo->contentTypeTag == NULL) {
- cinfo->contentTypeTag = SECOID_FindOID(&(cinfo->contentType));
- }
- if (cinfo->contentTypeTag == NULL) {
- return NULL;
- }
- return &(cinfo->contentTypeTag->oid);
- }
- /*
- * NSS_CMSContentInfo_GetContentEncAlgTag - find out (saving pointer to lookup result
- * for future reference) and return the content encryption algorithm tag.
- */
- SECOidTag
- NSS_CMSContentInfo_GetContentEncAlgTag(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL) {
- return SEC_OID_UNKNOWN;
- }
- if (cinfo->contentEncAlgTag == SEC_OID_UNKNOWN) {
- cinfo->contentEncAlgTag = SECOID_GetAlgorithmTag(&(cinfo->contentEncAlg));
- }
- return cinfo->contentEncAlgTag;
- }
- /*
- * NSS_CMSContentInfo_GetContentEncAlg - find out and return the content encryption algorithm tag.
- */
- SECAlgorithmID *
- NSS_CMSContentInfo_GetContentEncAlg(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL) {
- return NULL;
- }
- return &(cinfo->contentEncAlg);
- }
- SECStatus
- NSS_CMSContentInfo_SetContentEncAlg(PLArenaPool *poolp, NSSCMSContentInfo *cinfo,
- SECOidTag bulkalgtag, SECItem *parameters, int keysize)
- {
- SECStatus rv;
- if (cinfo == NULL) {
- return SECFailure;
- }
- rv = SECOID_SetAlgorithmID(poolp, &(cinfo->contentEncAlg), bulkalgtag, parameters);
- if (rv != SECSuccess) {
- return SECFailure;
- }
- cinfo->keysize = keysize;
- return SECSuccess;
- }
- SECStatus
- NSS_CMSContentInfo_SetContentEncAlgID(PLArenaPool *poolp, NSSCMSContentInfo *cinfo,
- SECAlgorithmID *algid, int keysize)
- {
- SECStatus rv;
- if (cinfo == NULL) {
- return SECFailure;
- }
- rv = SECOID_CopyAlgorithmID(poolp, &(cinfo->contentEncAlg), algid);
- if (rv != SECSuccess) {
- return SECFailure;
- }
- if (keysize >= 0) {
- cinfo->keysize = keysize;
- }
- return SECSuccess;
- }
- void
- NSS_CMSContentInfo_SetBulkKey(NSSCMSContentInfo *cinfo, PK11SymKey *bulkkey)
- {
- if (cinfo == NULL) {
- return;
- }
- if (bulkkey == NULL) {
- cinfo->bulkkey = NULL;
- cinfo->keysize = 0;
- } else {
- cinfo->bulkkey = PK11_ReferenceSymKey(bulkkey);
- cinfo->keysize = PK11_GetKeyStrength(cinfo->bulkkey, &(cinfo->contentEncAlg));
- }
- }
- PK11SymKey *
- NSS_CMSContentInfo_GetBulkKey(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL || cinfo->bulkkey == NULL) {
- return NULL;
- }
- return PK11_ReferenceSymKey(cinfo->bulkkey);
- }
- int
- NSS_CMSContentInfo_GetBulkKeySize(NSSCMSContentInfo *cinfo)
- {
- if (cinfo == NULL) {
- return 0;
- }
- return cinfo->keysize;
- }
|