1 /*
2 * Copyright 1999-2020 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include <stdlib.h>
12 #include <openssl/bio.h>
13 #include <openssl/asn1.h>
14 #include <openssl/asn1t.h>
15 #include <openssl/pem.h>
16 #include <openssl/pkcs7.h>
17 #include <openssl/x509.h>
18 #include <openssl/err.h>
19
PKCS7_add_attrib_smimecap(PKCS7_SIGNER_INFO * si,STACK_OF (X509_ALGOR)* cap)20 int PKCS7_add_attrib_smimecap(PKCS7_SIGNER_INFO *si,
21 STACK_OF(X509_ALGOR) *cap)
22 {
23 ASN1_STRING *seq;
24
25 if ((seq = ASN1_STRING_new()) == NULL) {
26 ERR_raise(ERR_LIB_PKCS7, ERR_R_MALLOC_FAILURE);
27 return 0;
28 }
29 seq->length = ASN1_item_i2d((ASN1_VALUE *)cap, &seq->data,
30 ASN1_ITEM_rptr(X509_ALGORS));
31 if (!PKCS7_add_signed_attribute(si, NID_SMIMECapabilities,
32 V_ASN1_SEQUENCE, seq)) {
33 ASN1_STRING_free(seq);
34 return 0;
35 }
36 return 1;
37 }
38
STACK_OF(X509_ALGOR)39 STACK_OF(X509_ALGOR) *PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si)
40 {
41 ASN1_TYPE *cap;
42 const unsigned char *p;
43
44 cap = PKCS7_get_signed_attribute(si, NID_SMIMECapabilities);
45 if (cap == NULL || (cap->type != V_ASN1_SEQUENCE))
46 return NULL;
47 p = cap->value.sequence->data;
48 return (STACK_OF(X509_ALGOR) *)
49 ASN1_item_d2i(NULL, &p, cap->value.sequence->length,
50 ASN1_ITEM_rptr(X509_ALGORS));
51 }
52
53 /* Basic smime-capabilities OID and optional integer arg */
PKCS7_simple_smimecap(STACK_OF (X509_ALGOR)* sk,int nid,int arg)54 int PKCS7_simple_smimecap(STACK_OF(X509_ALGOR) *sk, int nid, int arg)
55 {
56 ASN1_INTEGER *nbit = NULL;
57 X509_ALGOR *alg;
58
59 if ((alg = X509_ALGOR_new()) == NULL) {
60 ERR_raise(ERR_LIB_PKCS7, ERR_R_MALLOC_FAILURE);
61 return 0;
62 }
63 ASN1_OBJECT_free(alg->algorithm);
64 alg->algorithm = OBJ_nid2obj(nid);
65 if (arg > 0) {
66 if ((alg->parameter = ASN1_TYPE_new()) == NULL) {
67 goto err;
68 }
69 if ((nbit = ASN1_INTEGER_new()) == NULL) {
70 goto err;
71 }
72 if (!ASN1_INTEGER_set(nbit, arg)) {
73 goto err;
74 }
75 alg->parameter->value.integer = nbit;
76 alg->parameter->type = V_ASN1_INTEGER;
77 nbit = NULL;
78 }
79 if (!sk_X509_ALGOR_push(sk, alg)) {
80 goto err;
81 }
82 return 1;
83 err:
84 ERR_raise(ERR_LIB_PKCS7, ERR_R_MALLOC_FAILURE);
85 ASN1_INTEGER_free(nbit);
86 X509_ALGOR_free(alg);
87 return 0;
88 }
89
PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO * si,ASN1_OBJECT * coid)90 int PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid)
91 {
92 if (PKCS7_get_signed_attribute(si, NID_pkcs9_contentType))
93 return 0;
94 if (!coid)
95 coid = OBJ_nid2obj(NID_pkcs7_data);
96 return PKCS7_add_signed_attribute(si, NID_pkcs9_contentType,
97 V_ASN1_OBJECT, coid);
98 }
99
PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO * si,ASN1_TIME * t)100 int PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t)
101 {
102 ASN1_TIME *tmp = NULL;
103
104 if (t == NULL && (tmp = t = X509_gmtime_adj(NULL, 0)) == NULL) {
105 ERR_raise(ERR_LIB_PKCS7, ERR_R_MALLOC_FAILURE);
106 return 0;
107 }
108 if (!PKCS7_add_signed_attribute(si, NID_pkcs9_signingTime,
109 V_ASN1_UTCTIME, t)) {
110 ASN1_TIME_free(tmp);
111 return 0;
112 }
113 return 1;
114 }
115
PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO * si,const unsigned char * md,int mdlen)116 int PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si,
117 const unsigned char *md, int mdlen)
118 {
119 ASN1_OCTET_STRING *os;
120 os = ASN1_OCTET_STRING_new();
121 if (os == NULL)
122 return 0;
123 if (!ASN1_STRING_set(os, md, mdlen)
124 || !PKCS7_add_signed_attribute(si, NID_pkcs9_messageDigest,
125 V_ASN1_OCTET_STRING, os)) {
126 ASN1_OCTET_STRING_free(os);
127 return 0;
128 }
129 return 1;
130 }
131