2 * The contents of this file are subject to the Mozilla Public
3 * License Version 1.1 (the "License"); you may not use this file
4 * except in compliance with the License. You may obtain a copy of
5 * the License at http://www.mozilla.org/MPL/
7 * Software distributed under the License is distributed on an "AS
8 * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
9 * implied. See the License for the specific language governing
10 * rights and limitations under the License.
12 * The Original Code is the Netscape security libraries.
14 * The Initial Developer of the Original Code is Netscape
15 * Communications Corporation. Portions created by Netscape are
16 * Copyright (C) 1994-2000 Netscape Communications Corporation. All
21 * Alternatively, the contents of this file may be used under the
22 * terms of the GNU General Public License Version 2 or later (the
23 * "GPL"), in which case the provisions of the GPL are applicable
24 * instead of those above. If you wish to allow use of your
25 * version of this file only under the terms of the GPL and not to
26 * allow others to use your version of this file under the MPL,
27 * indicate your decision by deleting the provisions above and
28 * replace them with the notice and other provisions required by
29 * the GPL. If you do not delete the provisions above, a recipient
30 * may use your version of this file under either the MPL or the
35 * CMS encryptedData methods.
38 #include <Security/SecCmsEncryptedData.h>
40 #include <Security/SecCmsContentInfo.h>
44 #include "SecAsn1Item.h"
47 #include <security_asn1/secasn1.h>
48 #include <security_asn1/secerr.h>
49 #include <security_asn1/secport.h>
52 * SecCmsEncryptedDataCreate - create an empty encryptedData object.
54 * "algorithm" specifies the bulk encryption algorithm to use.
55 * "keysize" is the key size.
57 * An error results in a return value of NULL and an error set.
58 * (Retrieve specific errors via PORT_GetError()/XP_GetError().)
60 SecCmsEncryptedDataRef
61 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg
, SECOidTag algorithm
, int keysize
)
64 SecCmsEncryptedDataRef encd
;
67 SECAlgorithmID
*pbe_algid
;
73 mark
= PORT_ArenaMark(poolp
);
75 encd
= (SecCmsEncryptedDataRef
)PORT_ArenaZAlloc(poolp
, sizeof(SecCmsEncryptedData
));
79 encd
->contentInfo
.cmsg
= cmsg
;
81 /* version is set in SecCmsEncryptedDataEncodeBeforeStart() */
84 /* XXX hmmm... hardcoded algorithms? */
85 case SEC_OID_AES_128_CBC
:
86 case SEC_OID_AES_192_CBC
:
87 case SEC_OID_AES_256_CBC
:
89 case SEC_OID_DES_EDE3_CBC
:
91 rv
= SecCmsContentInfoSetContentEncAlg(&(encd
->contentInfo
), algorithm
, NULL
, keysize
);
94 /* Assume password-based-encryption. At least, try that. */
100 pbe_algid
= PK11_CreatePBEAlgorithmID(algorithm
, 1, NULL
);
101 if (pbe_algid
== NULL
) {
105 rv
= SecCmsContentInfoSetContentEncAlgID(&(encd
->contentInfo
), pbe_algid
, keysize
);
106 SECOID_DestroyAlgorithmID (pbe_algid
, PR_TRUE
);
110 if (rv
!= SECSuccess
)
113 PORT_ArenaUnmark(poolp
, mark
);
117 PORT_ArenaRelease(poolp
, mark
);
122 * SecCmsEncryptedDataDestroy - destroy an encryptedData object
125 SecCmsEncryptedDataDestroy(SecCmsEncryptedDataRef encd
)
130 /* everything's in a pool, so don't worry about the storage */
131 SecCmsContentInfoDestroy(&(encd
->contentInfo
));
136 * SecCmsEncryptedDataGetContentInfo - return pointer to encryptedData object's contentInfo
139 SecCmsEncryptedDataGetContentInfo(SecCmsEncryptedDataRef encd
)
141 return &(encd
->contentInfo
);
145 * SecCmsEncryptedDataEncodeBeforeStart - do all the necessary things to a EncryptedData
146 * before encoding begins.
149 * - set the correct version value.
150 * - get the encryption key
153 SecCmsEncryptedDataEncodeBeforeStart(SecCmsEncryptedDataRef encd
)
156 SecSymmetricKeyRef bulkkey
= NULL
;
158 SecCmsContentInfoRef cinfo
= &(encd
->contentInfo
);
160 if (SecCmsArrayIsEmpty((void **)encd
->unprotectedAttr
))
161 version
= SEC_CMS_ENCRYPTED_DATA_VERSION
;
163 version
= SEC_CMS_ENCRYPTED_DATA_VERSION_UPATTR
;
165 dummy
= SEC_ASN1EncodeInteger (encd
->contentInfo
.cmsg
->poolp
, &(encd
->version
), version
);
169 /* now get content encryption key (bulk key) by using our cmsg callback */
170 if (encd
->contentInfo
.cmsg
->decrypt_key_cb
)
171 bulkkey
= (*encd
->contentInfo
.cmsg
->decrypt_key_cb
)(encd
->contentInfo
.cmsg
->decrypt_key_cb_arg
,
172 SecCmsContentInfoGetContentEncAlg(cinfo
));
176 /* store the bulk key in the contentInfo so that the encoder can find it */
177 SecCmsContentInfoSetBulkKey(cinfo
, bulkkey
);
178 CFRelease(bulkkey
); /* This assumes the decrypt_key_cb hands us a copy of the key --mb */
184 * SecCmsEncryptedDataEncodeBeforeData - set up encryption
187 SecCmsEncryptedDataEncodeBeforeData(SecCmsEncryptedDataRef encd
)
189 SecCmsContentInfoRef cinfo
;
190 SecSymmetricKeyRef bulkkey
;
191 SECAlgorithmID
*algid
;
193 cinfo
= &(encd
->contentInfo
);
195 /* find bulkkey and algorithm - must have been set by SecCmsEncryptedDataEncodeBeforeStart */
196 bulkkey
= SecCmsContentInfoGetBulkKey(cinfo
);
199 algid
= SecCmsContentInfoGetContentEncAlg(cinfo
);
203 /* this may modify algid (with IVs generated in a token).
204 * it is therefore essential that algid is a pointer to the "real" contentEncAlg,
205 * not just to a copy */
206 cinfo
->ciphcx
= SecCmsCipherContextStartEncrypt(encd
->contentInfo
.cmsg
->poolp
, bulkkey
, algid
);
208 if (cinfo
->ciphcx
== NULL
)
215 * SecCmsEncryptedDataEncodeAfterData - finalize this encryptedData for encoding
218 SecCmsEncryptedDataEncodeAfterData(SecCmsEncryptedDataRef encd
)
220 if (encd
->contentInfo
.ciphcx
) {
221 SecCmsCipherContextDestroy(encd
->contentInfo
.ciphcx
);
222 encd
->contentInfo
.ciphcx
= NULL
;
225 /* nothing to do after data */
231 * SecCmsEncryptedDataDecodeBeforeData - find bulk key & set up decryption
234 SecCmsEncryptedDataDecodeBeforeData(SecCmsEncryptedDataRef encd
)
236 SecSymmetricKeyRef bulkkey
= NULL
;
237 SecCmsContentInfoRef cinfo
;
238 SECAlgorithmID
*bulkalg
;
239 OSStatus rv
= SECFailure
;
241 cinfo
= &(encd
->contentInfo
);
243 bulkalg
= SecCmsContentInfoGetContentEncAlg(cinfo
);
245 if (encd
->contentInfo
.cmsg
->decrypt_key_cb
== NULL
) /* no callback? no key../ */
248 bulkkey
= (*encd
->contentInfo
.cmsg
->decrypt_key_cb
)(encd
->contentInfo
.cmsg
->decrypt_key_cb_arg
, bulkalg
);
250 /* no success finding a bulk key */
253 SecCmsContentInfoSetBulkKey(cinfo
, bulkkey
);
255 cinfo
->ciphcx
= SecCmsCipherContextStartDecrypt(bulkkey
, bulkalg
);
256 if (cinfo
->ciphcx
== NULL
)
257 goto loser
; /* error has been set by SecCmsCipherContextStartDecrypt */
264 * For PKCS5 Encryption Algorithms, the bulkkey is actually a different
265 * structure. Therefore, we need to set the bulkkey to the actual key
266 * prior to freeing it.
268 if (SEC_PKCS5IsAlgorithmPBEAlg(bulkalg
)) {
269 SEC_PKCS5KeyAndPassword
*keyPwd
= (SEC_PKCS5KeyAndPassword
*)bulkkey
;
270 bulkkey
= keyPwd
->key
;
274 /* we are done with (this) bulkkey now. */
284 * SecCmsEncryptedDataDecodeAfterData - finish decrypting this encryptedData's content
287 SecCmsEncryptedDataDecodeAfterData(SecCmsEncryptedDataRef encd
)
289 if (encd
->contentInfo
.ciphcx
) {
290 SecCmsCipherContextDestroy(encd
->contentInfo
.ciphcx
);
291 encd
->contentInfo
.ciphcx
= NULL
;
298 * SecCmsEncryptedDataDecodeAfterEnd - finish decoding this encryptedData
301 SecCmsEncryptedDataDecodeAfterEnd(SecCmsEncryptedDataRef encd
)
303 /* apply final touches */