2 * The contents of this file are subject to the Mozilla Public
3 * License Version 1.1 (the "License"); you may not use this file
4 * except in compliance with the License. You may obtain a copy of
5 * the License at http://www.mozilla.org/MPL/
7 * Software distributed under the License is distributed on an "AS
8 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
9 * implied. See the License for the specific language governing
10 * rights and limitations under the License.
12 * The Original Code is the Netscape security libraries.
14 * The Initial Developer of the Original Code is Netscape
15 * Communications Corporation. Portions created by Netscape are
16 * Copyright (C) 1994-2000 Netscape Communications Corporation. All
21 * Alternatively, the contents of this file may be used under the
22 * terms of the GNU General Public License Version 2 or later (the
23 * "GPL"), in which case the provisions of the GPL are applicable
24 * instead of those above. If you wish to allow use of your
25 * version of this file only under the terms of the GPL and not to
26 * allow others to use your version of this file under the MPL,
27 * indicate your decision by deleting the provisions above and
28 * replace them with the notice and other provisions required by
29 * the GPL. If you do not delete the provisions above, a recipient
30 * may use your version of this file under either the MPL or the
35 * CMS contentInfo methods.
38 #include <Security/SecCmsContentInfo.h>
40 #include <Security/SecCmsDigestContext.h>
41 #include <Security/SecCmsDigestedData.h>
42 #include <Security/SecCmsEncryptedData.h>
43 #include <Security/SecCmsEnvelopedData.h>
44 #include <Security/SecCmsSignedData.h>
48 //#include "pk11func.h"
50 #include "SecAsn1Item.h"
52 #include <security_asn1/secerr.h>
53 #include <security_asn1/secport.h>
55 #include <Security/SecBase.h>
58 * SecCmsContentInfoDestroy - destroy a CMS contentInfo and all of its sub-pieces.
61 SecCmsContentInfoDestroy(SecCmsContentInfoRef cinfo
)
67 kind
= SecCmsContentInfoGetContentTypeTag(cinfo
);
69 case SEC_OID_PKCS7_ENVELOPED_DATA
:
70 SecCmsEnvelopedDataDestroy(cinfo
->content
.envelopedData
);
72 case SEC_OID_PKCS7_SIGNED_DATA
:
73 SecCmsSignedDataDestroy(cinfo
->content
.signedData
);
75 case SEC_OID_PKCS7_ENCRYPTED_DATA
:
76 SecCmsEncryptedDataDestroy(cinfo
->content
.encryptedData
);
78 case SEC_OID_PKCS7_DIGESTED_DATA
:
79 SecCmsDigestedDataDestroy(cinfo
->content
.digestedData
);
82 /* XXX Anything else that needs to be "manually" freed/destroyed? */
86 /* must destroy digest objects */
87 SecCmsDigestContextCancel(cinfo
->digcx
);
91 CFRelease(cinfo
->bulkkey
);
92 /* @@@ private key is only here as a workaround for 3401088. Note this *must* be released after bulkkey */
94 CFRelease(cinfo
->privkey
);
97 SecCmsCipherContextDestroy(cinfo
->ciphcx
);
101 /* we live in a pool, so no need to worry about storage */
105 * SecCmsContentInfoGetChildContentInfo - get content's contentInfo (if it exists)
108 SecCmsContentInfoGetChildContentInfo(SecCmsContentInfoRef cinfo
)
111 SecCmsContentInfoRef ccinfo
= NULL
;
112 SECOidTag tag
= SecCmsContentInfoGetContentTypeTag(cinfo
);
114 case SEC_OID_PKCS7_SIGNED_DATA
:
115 ptr
= (void *)cinfo
->content
.signedData
;
116 ccinfo
= &(cinfo
->content
.signedData
->contentInfo
);
118 case SEC_OID_PKCS7_ENVELOPED_DATA
:
119 ptr
= (void *)cinfo
->content
.envelopedData
;
120 ccinfo
= &(cinfo
->content
.envelopedData
->contentInfo
);
122 case SEC_OID_PKCS7_DIGESTED_DATA
:
123 ptr
= (void *)cinfo
->content
.digestedData
;
124 ccinfo
= &(cinfo
->content
.digestedData
->contentInfo
);
126 case SEC_OID_PKCS7_ENCRYPTED_DATA
:
127 ptr
= (void *)cinfo
->content
.encryptedData
;
128 ccinfo
= &(cinfo
->content
.encryptedData
->contentInfo
);
130 case SEC_OID_PKCS7_DATA
:
134 return (ptr
? ccinfo
: NULL
);
138 * SecCmsContentInfoSetContent - set content type & content
141 SecCmsContentInfoSetContent(SecCmsContentInfoRef cinfo
, SECOidTag type
, void *ptr
)
145 cinfo
->contentTypeTag
= SECOID_FindOIDByTag(type
);
146 if (cinfo
->contentTypeTag
== NULL
)
149 /* do not copy the oid, just create a reference */
150 rv
= SECITEM_CopyItem (cinfo
->cmsg
->poolp
, &(cinfo
->contentType
), &(cinfo
->contentTypeTag
->oid
));
151 if (rv
!= SECSuccess
)
152 return errSecAllocate
;
154 cinfo
->content
.pointer
= ptr
;
156 if (type
!= SEC_OID_PKCS7_DATA
) {
157 /* as we always have some inner data,
158 * we need to set it to something, just to fool the encoder enough to work on it
159 * and get us into nss_cms_encoder_notify at that point */
160 cinfo
->rawContent
= SECITEM_AllocItem(cinfo
->cmsg
->poolp
, NULL
, 1);
161 if (cinfo
->rawContent
== NULL
) {
162 PORT_SetError(SEC_ERROR_NO_MEMORY
);
163 return errSecAllocate
;
167 return errSecSuccess
;
171 * SecCmsContentInfoSetContentXXXX - typesafe wrappers for SecCmsContentInfoSetContent
175 * data == NULL -> pass in data via SecCmsEncoderUpdate
176 * data != NULL -> take this data
179 SecCmsContentInfoSetContentData(SecCmsContentInfoRef cinfo
, CFDataRef dataRef
, Boolean detached
)
181 SecAsn1Item
* data
= NULL
;
183 /* @@@ Fixme CFRetain the passed in data rather than
184 always copying it for performance. */
185 data
= PORT_ArenaAlloc(cinfo
->cmsg
->poolp
, sizeof(SecAsn1Item
));
186 data
->Length
= CFDataGetLength(dataRef
);
188 data
->Data
= PORT_ArenaAlloc(cinfo
->cmsg
->poolp
, data
->Length
);
189 memcpy(data
->Data
, CFDataGetBytePtr(dataRef
), data
->Length
);
195 if (SecCmsContentInfoSetContent(cinfo
, SEC_OID_PKCS7_DATA
, (void *)data
) != SECSuccess
) {
196 OSStatus status
= PORT_GetError();
197 PORT_SetError(0); // clean the thread since we've returned this error
200 cinfo
->rawContent
= (detached
) ?
202 data
: SECITEM_AllocItem(cinfo
->cmsg
->poolp
, NULL
, 1);
203 return errSecSuccess
;
207 SecCmsContentInfoSetContentSignedData(SecCmsContentInfoRef cinfo
, SecCmsSignedDataRef sigd
)
209 return SecCmsContentInfoSetContent(cinfo
, SEC_OID_PKCS7_SIGNED_DATA
, (void *)sigd
);
213 SecCmsContentInfoSetContentEnvelopedData(SecCmsContentInfoRef cinfo
, SecCmsEnvelopedDataRef envd
)
215 return SecCmsContentInfoSetContent(cinfo
, SEC_OID_PKCS7_ENVELOPED_DATA
, (void *)envd
);
219 SecCmsContentInfoSetContentDigestedData(SecCmsContentInfoRef cinfo
, SecCmsDigestedDataRef digd
)
221 return SecCmsContentInfoSetContent(cinfo
, SEC_OID_PKCS7_DIGESTED_DATA
, (void *)digd
);
225 SecCmsContentInfoSetContentEncryptedData(SecCmsContentInfoRef cinfo
, SecCmsEncryptedDataRef encd
)
227 return SecCmsContentInfoSetContent(cinfo
, SEC_OID_PKCS7_ENCRYPTED_DATA
, (void *)encd
);
231 SecCmsContentInfoSetContentOther(SecCmsContentInfoRef cinfo
, SecAsn1Item
*data
, Boolean detached
, const SecAsn1Oid
*eContentType
)
234 SECOidData
*tmpOidData
;
236 /* just like SecCmsContentInfoSetContentData, except override the contentType and
237 * contentTypeTag. This OID is for encoding... */
238 srtn
= SECITEM_CopyItem (cinfo
->cmsg
->poolp
, &(cinfo
->contentType
), eContentType
);
239 if (srtn
!= SECSuccess
) {
240 return errSecAllocate
;
243 /* this serves up a contentTypeTag with an empty OID */
244 tmpOidData
= SECOID_FindOIDByTag(SEC_OID_OTHER
);
245 /* but that's const: cook up a new one we can write to */
246 cinfo
->contentTypeTag
= (SECOidData
*)PORT_ArenaZAlloc(cinfo
->cmsg
->poolp
, sizeof(SECOidData
));
247 *cinfo
->contentTypeTag
= *tmpOidData
;
248 /* now fill in the OID */
249 srtn
= SECITEM_CopyItem (cinfo
->cmsg
->poolp
, &(cinfo
->contentTypeTag
->oid
), eContentType
);
250 if (srtn
!= SECSuccess
) {
251 return errSecAllocate
;
253 cinfo
->content
.pointer
= data
;
254 cinfo
->rawContent
= (detached
) ? NULL
: (data
) ?
255 data
: SECITEM_AllocItem(cinfo
->cmsg
->poolp
, NULL
, 1);
260 * SecCmsContentInfoGetContent - get pointer to inner content
262 * needs to be casted...
265 SecCmsContentInfoGetContent(SecCmsContentInfoRef cinfo
)
267 SECOidTag tag
= (cinfo
&& cinfo
->contentTypeTag
)
268 ? cinfo
->contentTypeTag
->offset
271 case SEC_OID_PKCS7_DATA
:
272 case SEC_OID_PKCS7_SIGNED_DATA
:
273 case SEC_OID_PKCS7_ENVELOPED_DATA
:
274 case SEC_OID_PKCS7_DIGESTED_DATA
:
275 case SEC_OID_PKCS7_ENCRYPTED_DATA
:
276 return cinfo
->content
.pointer
;
283 * SecCmsContentInfoGetInnerContent - get pointer to innermost content
285 * this is typically only called by SecCmsMessageGetContent()
288 SecCmsContentInfoGetInnerContent(SecCmsContentInfoRef cinfo
)
290 SecCmsContentInfoRef ccinfo
;
294 tag
= SecCmsContentInfoGetContentTypeTag(cinfo
);
296 case SEC_OID_PKCS7_DATA
:
297 /* end of recursion - every message has to have a data cinfo */
298 pItem
= cinfo
->content
.data
;
300 case SEC_OID_PKCS7_DIGESTED_DATA
:
301 case SEC_OID_PKCS7_ENCRYPTED_DATA
:
302 case SEC_OID_PKCS7_ENVELOPED_DATA
:
303 case SEC_OID_PKCS7_SIGNED_DATA
:
304 ccinfo
= SecCmsContentInfoGetChildContentInfo(cinfo
);
308 pItem
= SecCmsContentInfoGetContent(ccinfo
);
319 * SecCmsContentInfoGetContentType{Tag,OID} - find out (saving pointer to lookup result
320 * for future reference) and return the inner content type.
323 SecCmsContentInfoGetContentTypeTag(SecCmsContentInfoRef cinfo
)
325 if (cinfo
->contentTypeTag
== NULL
)
326 cinfo
->contentTypeTag
= SECOID_FindOID(&(cinfo
->contentType
));
328 if (cinfo
->contentTypeTag
== NULL
)
329 return SEC_OID_UNKNOWN
;
331 return cinfo
->contentTypeTag
->offset
;
335 SecCmsContentInfoGetContentTypeOID(SecCmsContentInfoRef cinfo
)
337 if (cinfo
->contentTypeTag
== NULL
)
338 cinfo
->contentTypeTag
= SECOID_FindOID(&(cinfo
->contentType
));
340 if (cinfo
->contentTypeTag
== NULL
)
343 return &(cinfo
->contentTypeTag
->oid
);
347 * SecCmsContentInfoGetContentEncAlgTag - find out (saving pointer to lookup result
348 * for future reference) and return the content encryption algorithm tag.
351 SecCmsContentInfoGetContentEncAlgTag(SecCmsContentInfoRef cinfo
)
353 if (cinfo
->contentEncAlgTag
== SEC_OID_UNKNOWN
)
354 cinfo
->contentEncAlgTag
= SECOID_GetAlgorithmTag(&(cinfo
->contentEncAlg
));
356 return cinfo
->contentEncAlgTag
;
360 * SecCmsContentInfoGetContentEncAlg - find out and return the content encryption algorithm tag.
363 SecCmsContentInfoGetContentEncAlg(SecCmsContentInfoRef cinfo
)
365 return &(cinfo
->contentEncAlg
);
369 SecCmsContentInfoSetContentEncAlg(SecCmsContentInfoRef cinfo
,
370 SECOidTag bulkalgtag
, const SecAsn1Item
*parameters
, int keysize
)
372 PLArenaPool
*poolp
= cinfo
->cmsg
->poolp
;
375 rv
= SECOID_SetAlgorithmID(poolp
, &(cinfo
->contentEncAlg
), bulkalgtag
, parameters
);
376 if (rv
!= SECSuccess
)
378 cinfo
->keysize
= keysize
;
383 SecCmsContentInfoSetContentEncAlgID(SecCmsContentInfoRef cinfo
,
384 SECAlgorithmID
*algid
, int keysize
)
386 PLArenaPool
*poolp
= cinfo
->cmsg
->poolp
;
389 rv
= SECOID_CopyAlgorithmID(poolp
, &(cinfo
->contentEncAlg
), algid
);
390 if (rv
!= SECSuccess
)
393 cinfo
->keysize
= keysize
;
398 SecCmsContentInfoSetBulkKey(SecCmsContentInfoRef cinfo
, SecSymmetricKeyRef bulkkey
)
400 #ifdef USE_CDSA_CRYPTO
401 const CSSM_KEY
*cssmKey
= NULL
;
403 if (!bulkkey
|| !cinfo
) return;
404 cinfo
->bulkkey
= bulkkey
;
405 CFRetain(cinfo
->bulkkey
);
406 #ifdef USE_CDSA_CRYPTO
407 SecKeyGetCSSMKey(cinfo
->bulkkey
, &cssmKey
);
408 cinfo
->keysize
= cssmKey
? cssmKey
->KeyHeader
.LogicalKeySizeInBits
: 0;
410 long long bulkKeySize
= CFDataGetLength((CFDataRef
)bulkkey
) * 8;
411 if (bulkKeySize
< INT_MAX
) {
412 cinfo
->keysize
= (int)bulkKeySize
;
414 CFRelease(cinfo
->bulkkey
);
415 cinfo
->bulkkey
= NULL
;
422 SecCmsContentInfoGetBulkKey(SecCmsContentInfoRef cinfo
)
424 if (cinfo
->bulkkey
== NULL
)
427 CFRetain(cinfo
->bulkkey
);
428 return cinfo
->bulkkey
;
432 SecCmsContentInfoGetBulkKeySize(SecCmsContentInfoRef cinfo
)
434 return cinfo
->keysize
;