1*e71b7053SJung-uk Kim=pod 2*e71b7053SJung-uk Kim 3*e71b7053SJung-uk Kim=head1 NAME 4*e71b7053SJung-uk Kim 5*e71b7053SJung-uk KimCMS_encrypt - create a CMS envelopedData structure 6*e71b7053SJung-uk Kim 7*e71b7053SJung-uk Kim=head1 SYNOPSIS 8*e71b7053SJung-uk Kim 9*e71b7053SJung-uk Kim #include <openssl/cms.h> 10*e71b7053SJung-uk Kim 11*e71b7053SJung-uk Kim CMS_ContentInfo *CMS_encrypt(STACK_OF(X509) *certs, BIO *in, 12*e71b7053SJung-uk Kim const EVP_CIPHER *cipher, unsigned int flags); 13*e71b7053SJung-uk Kim 14*e71b7053SJung-uk Kim=head1 DESCRIPTION 15*e71b7053SJung-uk Kim 16*e71b7053SJung-uk KimCMS_encrypt() creates and returns a CMS EnvelopedData structure. B<certs> 17*e71b7053SJung-uk Kimis a list of recipient certificates. B<in> is the content to be encrypted. 18*e71b7053SJung-uk KimB<cipher> is the symmetric cipher to use. B<flags> is an optional set of flags. 19*e71b7053SJung-uk Kim 20*e71b7053SJung-uk Kim=head1 NOTES 21*e71b7053SJung-uk Kim 22*e71b7053SJung-uk KimOnly certificates carrying RSA, Diffie-Hellman or EC keys are supported by this 23*e71b7053SJung-uk Kimfunction. 24*e71b7053SJung-uk Kim 25*e71b7053SJung-uk KimEVP_des_ede3_cbc() (triple DES) is the algorithm of choice for S/MIME use 26*e71b7053SJung-uk Kimbecause most clients will support it. 27*e71b7053SJung-uk Kim 28*e71b7053SJung-uk KimThe algorithm passed in the B<cipher> parameter must support ASN1 encoding of 29*e71b7053SJung-uk Kimits parameters. 30*e71b7053SJung-uk Kim 31*e71b7053SJung-uk KimMany browsers implement a "sign and encrypt" option which is simply an S/MIME 32*e71b7053SJung-uk KimenvelopedData containing an S/MIME signed message. This can be readily produced 33*e71b7053SJung-uk Kimby storing the S/MIME signed message in a memory BIO and passing it to 34*e71b7053SJung-uk KimCMS_encrypt(). 35*e71b7053SJung-uk Kim 36*e71b7053SJung-uk KimThe following flags can be passed in the B<flags> parameter. 37*e71b7053SJung-uk Kim 38*e71b7053SJung-uk KimIf the B<CMS_TEXT> flag is set MIME headers for type B<text/plain> are 39*e71b7053SJung-uk Kimprepended to the data. 40*e71b7053SJung-uk Kim 41*e71b7053SJung-uk KimNormally the supplied content is translated into MIME canonical format (as 42*e71b7053SJung-uk Kimrequired by the S/MIME specifications) if B<CMS_BINARY> is set no translation 43*e71b7053SJung-uk Kimoccurs. This option should be used if the supplied data is in binary format 44*e71b7053SJung-uk Kimotherwise the translation will corrupt it. If B<CMS_BINARY> is set then 45*e71b7053SJung-uk KimB<CMS_TEXT> is ignored. 46*e71b7053SJung-uk Kim 47*e71b7053SJung-uk KimOpenSSL will by default identify recipient certificates using issuer name 48*e71b7053SJung-uk Kimand serial number. If B<CMS_USE_KEYID> is set it will use the subject key 49*e71b7053SJung-uk Kimidentifier value instead. An error occurs if all recipient certificates do not 50*e71b7053SJung-uk Kimhave a subject key identifier extension. 51*e71b7053SJung-uk Kim 52*e71b7053SJung-uk KimIf the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is 53*e71b7053SJung-uk Kimreturned suitable for streaming I/O: no data is read from the BIO B<in>. 54*e71b7053SJung-uk Kim 55*e71b7053SJung-uk KimIf the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is 56*e71b7053SJung-uk Kimreturned to which additional recipients and attributes can be added before 57*e71b7053SJung-uk Kimfinalization. 58*e71b7053SJung-uk Kim 59*e71b7053SJung-uk KimThe data being encrypted is included in the CMS_ContentInfo structure, unless 60*e71b7053SJung-uk KimB<CMS_DETACHED> is set in which case it is omitted. This is rarely used in 61*e71b7053SJung-uk Kimpractice and is not supported by SMIME_write_CMS(). 62*e71b7053SJung-uk Kim 63*e71b7053SJung-uk Kim=head1 NOTES 64*e71b7053SJung-uk Kim 65*e71b7053SJung-uk KimIf the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is 66*e71b7053SJung-uk KimB<not> complete and outputting its contents via a function that does not 67*e71b7053SJung-uk Kimproperly finalize the B<CMS_ContentInfo> structure will give unpredictable 68*e71b7053SJung-uk Kimresults. 69*e71b7053SJung-uk Kim 70*e71b7053SJung-uk KimSeveral functions including SMIME_write_CMS(), i2d_CMS_bio_stream(), 71*e71b7053SJung-uk KimPEM_write_bio_CMS_stream() finalize the structure. Alternatively finalization 72*e71b7053SJung-uk Kimcan be performed by obtaining the streaming ASN1 B<BIO> directly using 73*e71b7053SJung-uk KimBIO_new_CMS(). 74*e71b7053SJung-uk Kim 75*e71b7053SJung-uk KimThe recipients specified in B<certs> use a CMS KeyTransRecipientInfo info 76*e71b7053SJung-uk Kimstructure. KEKRecipientInfo is also supported using the flag B<CMS_PARTIAL> 77*e71b7053SJung-uk Kimand CMS_add0_recipient_key(). 78*e71b7053SJung-uk Kim 79*e71b7053SJung-uk KimThe parameter B<certs> may be NULL if B<CMS_PARTIAL> is set and recipients 80*e71b7053SJung-uk Kimadded later using CMS_add1_recipient_cert() or CMS_add0_recipient_key(). 81*e71b7053SJung-uk Kim 82*e71b7053SJung-uk Kim=head1 RETURN VALUES 83*e71b7053SJung-uk Kim 84*e71b7053SJung-uk KimCMS_encrypt() returns either a CMS_ContentInfo structure or NULL if an error 85*e71b7053SJung-uk Kimoccurred. The error can be obtained from ERR_get_error(3). 86*e71b7053SJung-uk Kim 87*e71b7053SJung-uk Kim=head1 SEE ALSO 88*e71b7053SJung-uk Kim 89*e71b7053SJung-uk KimL<ERR_get_error(3)>, L<CMS_decrypt(3)> 90*e71b7053SJung-uk Kim 91*e71b7053SJung-uk Kim=head1 HISTORY 92*e71b7053SJung-uk Kim 93*e71b7053SJung-uk KimThe B<CMS_STREAM> flag was first supported in OpenSSL 1.0.0. 94*e71b7053SJung-uk Kim 95*e71b7053SJung-uk Kim=head1 COPYRIGHT 96*e71b7053SJung-uk Kim 97*e71b7053SJung-uk KimCopyright 2008-2018 The OpenSSL Project Authors. All Rights Reserved. 98*e71b7053SJung-uk Kim 99*e71b7053SJung-uk KimLicensed under the OpenSSL license (the "License"). You may not use 100*e71b7053SJung-uk Kimthis file except in compliance with the License. You can obtain a copy 101*e71b7053SJung-uk Kimin the file LICENSE in the source distribution or at 102*e71b7053SJung-uk KimL<https://www.openssl.org/source/license.html>. 103*e71b7053SJung-uk Kim 104*e71b7053SJung-uk Kim=cut 105