123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263 |
- /* This Source Code Form is subject to the terms of the Mozilla Public
- * License, v. 2.0. If a copy of the MPL was not distributed with this
- * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
- /*
- * CMS encryptedData methods.
- */
- #include "cmslocal.h"
- #include "keyhi.h"
- #include "secasn1.h"
- #include "secitem.h"
- #include "secoid.h"
- #include "pk11func.h"
- #include "prtime.h"
- #include "secerr.h"
- #include "secpkcs5.h"
- /*
- * NSS_CMSEncryptedData_Create - create an empty encryptedData object.
- *
- * "algorithm" specifies the bulk encryption algorithm to use.
- * "keysize" is the key size.
- *
- * An error results in a return value of NULL and an error set.
- * (Retrieve specific errors via PORT_GetError()/XP_GetError().)
- */
- NSSCMSEncryptedData *
- NSS_CMSEncryptedData_Create(NSSCMSMessage *cmsg, SECOidTag algorithm,
- int keysize)
- {
- void *mark;
- NSSCMSEncryptedData *encd;
- PLArenaPool *poolp;
- SECAlgorithmID *pbe_algid;
- SECStatus rv;
- poolp = cmsg->poolp;
- mark = PORT_ArenaMark(poolp);
- encd = PORT_ArenaZNew(poolp, NSSCMSEncryptedData);
- if (encd == NULL)
- goto loser;
- encd->cmsg = cmsg;
- /* version is set in NSS_CMSEncryptedData_Encode_BeforeStart() */
- if (!SEC_PKCS5IsAlgorithmPBEAlgTag(algorithm)) {
- rv = NSS_CMSContentInfo_SetContentEncAlg(poolp, &(encd->contentInfo),
- algorithm, NULL, keysize);
- } else {
- /* Assume password-based-encryption.
- * Note: we can't generate pkcs5v2 from this interface.
- * PK11_CreateBPEAlgorithmID generates pkcs5v2 by accepting
- * non-PBE oids and assuming that they are pkcs5v2 oids, but
- * NSS_CMSEncryptedData_Create accepts non-PBE oids as regular
- * CMS encrypted data, so we can't tell NSS_CMS_EncryptedData_Create
- * to create pkcs5v2 PBEs */
- pbe_algid = PK11_CreatePBEAlgorithmID(algorithm, 1, NULL);
- if (pbe_algid == NULL) {
- rv = SECFailure;
- } else {
- rv = NSS_CMSContentInfo_SetContentEncAlgID(poolp,
- &(encd->contentInfo),
- pbe_algid, keysize);
- SECOID_DestroyAlgorithmID(pbe_algid, PR_TRUE);
- }
- }
- if (rv != SECSuccess)
- goto loser;
- PORT_ArenaUnmark(poolp, mark);
- return encd;
- loser:
- PORT_ArenaRelease(poolp, mark);
- return NULL;
- }
- /*
- * NSS_CMSEncryptedData_Destroy - destroy an encryptedData object
- */
- void
- NSS_CMSEncryptedData_Destroy(NSSCMSEncryptedData *encd)
- {
- /* everything's in a pool, so don't worry about the storage */
- if (encd != NULL) {
- NSS_CMSContentInfo_Destroy(&(encd->contentInfo));
- }
- return;
- }
- /*
- * NSS_CMSEncryptedData_GetContentInfo - return pointer to encryptedData object's contentInfo
- */
- NSSCMSContentInfo *
- NSS_CMSEncryptedData_GetContentInfo(NSSCMSEncryptedData *encd)
- {
- return &(encd->contentInfo);
- }
- /*
- * NSS_CMSEncryptedData_Encode_BeforeStart - do all the necessary things to a EncryptedData
- * before encoding begins.
- *
- * In particular:
- * - set the correct version value.
- * - get the encryption key
- */
- SECStatus
- NSS_CMSEncryptedData_Encode_BeforeStart(NSSCMSEncryptedData *encd)
- {
- int version;
- PK11SymKey *bulkkey = NULL;
- SECItem *dummy;
- NSSCMSContentInfo *cinfo = &(encd->contentInfo);
- if (NSS_CMSArray_IsEmpty((void **)encd->unprotectedAttr))
- version = NSS_CMS_ENCRYPTED_DATA_VERSION;
- else
- version = NSS_CMS_ENCRYPTED_DATA_VERSION_UPATTR;
- dummy = SEC_ASN1EncodeInteger(encd->cmsg->poolp, &(encd->version), version);
- if (dummy == NULL)
- return SECFailure;
- /* now get content encryption key (bulk key) by using our cmsg callback */
- if (encd->cmsg->decrypt_key_cb)
- bulkkey = (*encd->cmsg->decrypt_key_cb)(encd->cmsg->decrypt_key_cb_arg,
- NSS_CMSContentInfo_GetContentEncAlg(cinfo));
- if (bulkkey == NULL)
- return SECFailure;
- /* store the bulk key in the contentInfo so that the encoder can find it */
- NSS_CMSContentInfo_SetBulkKey(cinfo, bulkkey);
- PK11_FreeSymKey(bulkkey);
- return SECSuccess;
- }
- /*
- * NSS_CMSEncryptedData_Encode_BeforeData - set up encryption
- */
- SECStatus
- NSS_CMSEncryptedData_Encode_BeforeData(NSSCMSEncryptedData *encd)
- {
- NSSCMSContentInfo *cinfo;
- PK11SymKey *bulkkey;
- SECAlgorithmID *algid;
- SECStatus rv;
- cinfo = &(encd->contentInfo);
- /* find bulkkey and algorithm - must have been set by NSS_CMSEncryptedData_Encode_BeforeStart */
- bulkkey = NSS_CMSContentInfo_GetBulkKey(cinfo);
- if (bulkkey == NULL)
- return SECFailure;
- algid = NSS_CMSContentInfo_GetContentEncAlg(cinfo);
- if (algid == NULL)
- return SECFailure;
- rv = NSS_CMSContentInfo_Private_Init(cinfo);
- if (rv != SECSuccess) {
- return SECFailure;
- }
- /* this may modify algid (with IVs generated in a token).
- * it is therefore essential that algid is a pointer to the "real" contentEncAlg,
- * not just to a copy */
- cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartEncrypt(encd->cmsg->poolp,
- bulkkey, algid);
- PK11_FreeSymKey(bulkkey);
- if (cinfo->privateInfo->ciphcx == NULL)
- return SECFailure;
- return SECSuccess;
- }
- /*
- * NSS_CMSEncryptedData_Encode_AfterData - finalize this encryptedData for encoding
- */
- SECStatus
- NSS_CMSEncryptedData_Encode_AfterData(NSSCMSEncryptedData *encd)
- {
- if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
- NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
- encd->contentInfo.privateInfo->ciphcx = NULL;
- }
- /* nothing to do after data */
- return SECSuccess;
- }
- /*
- * NSS_CMSEncryptedData_Decode_BeforeData - find bulk key & set up decryption
- */
- SECStatus
- NSS_CMSEncryptedData_Decode_BeforeData(NSSCMSEncryptedData *encd)
- {
- PK11SymKey *bulkkey = NULL;
- NSSCMSContentInfo *cinfo;
- SECAlgorithmID *bulkalg;
- SECStatus rv = SECFailure;
- cinfo = &(encd->contentInfo);
- bulkalg = NSS_CMSContentInfo_GetContentEncAlg(cinfo);
- if (encd->cmsg->decrypt_key_cb == NULL) /* no callback? no key../ */
- goto loser;
- bulkkey = (*encd->cmsg->decrypt_key_cb)(encd->cmsg->decrypt_key_cb_arg, bulkalg);
- if (bulkkey == NULL)
- /* no success finding a bulk key */
- goto loser;
- NSS_CMSContentInfo_SetBulkKey(cinfo, bulkkey);
- rv = NSS_CMSContentInfo_Private_Init(cinfo);
- if (rv != SECSuccess) {
- goto loser;
- }
- rv = SECFailure;
- cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
- if (cinfo->privateInfo->ciphcx == NULL)
- goto loser; /* error has been set by NSS_CMSCipherContext_StartDecrypt */
- /* we are done with (this) bulkkey now. */
- PK11_FreeSymKey(bulkkey);
- rv = SECSuccess;
- loser:
- return rv;
- }
- /*
- * NSS_CMSEncryptedData_Decode_AfterData - finish decrypting this encryptedData's content
- */
- SECStatus
- NSS_CMSEncryptedData_Decode_AfterData(NSSCMSEncryptedData *encd)
- {
- if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
- NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
- encd->contentInfo.privateInfo->ciphcx = NULL;
- }
- return SECSuccess;
- }
- /*
- * NSS_CMSEncryptedData_Decode_AfterEnd - finish decoding this encryptedData
- */
- SECStatus
- NSS_CMSEncryptedData_Decode_AfterEnd(NSSCMSEncryptedData *encd)
- {
- /* apply final touches */
- return SECSuccess;
- }
|