2 * Copyright (c) 2004,2011-2012,2014 Apple Inc. All Rights Reserved.
4 * @APPLE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
21 * @APPLE_LICENSE_HEADER_END@
25 @header SecCmsSignerInfo.h
26 @Copyright (c) 2004,2011-2012,2014 Apple Inc. All Rights Reserved.
28 @availability 10.4 and later
29 @abstract Interfaces of the CMS implementation.
30 @discussion The functions here implement functions for encoding
31 and decoding Cryptographic Message Syntax (CMS) objects
32 as described in rfc3369.
35 #ifndef _SECURITY_SECCMSSIGNERINFO_H_
36 #define _SECURITY_SECCMSSIGNERINFO_H_ 1
38 #include <Security/SecCmsBase.h>
40 #include <Security/SecTrust.h>
43 #if defined(__cplusplus)
50 extern SecCmsSignerInfoRef
51 SecCmsSignerInfoCreate(SecCmsMessageRef cmsg
, SecIdentityRef identity
, SECOidTag digestalgtag
);
56 extern SecCmsSignerInfoRef
57 SecCmsSignerInfoCreateWithSubjKeyID(SecCmsMessageRef cmsg
, CSSM_DATA_PTR subjKeyID
, SecPublicKeyRef pubKey
, SecPrivateKeyRef signingKey
, SECOidTag digestalgtag
);
61 @abstract Destroy a SignerInfo data structure.
64 SecCmsSignerInfoDestroy(SecCmsSignerInfoRef si
);
69 extern SecCmsVerificationStatus
70 SecCmsSignerInfoGetVerificationStatus(SecCmsSignerInfoRef signerinfo
);
76 SecCmsSignerInfoVerifyUnAuthAttrs(SecCmsSignerInfoRef signerinfo
);
82 SecCmsSignerInfoVerifyUnAuthAttrsWithPolicy(SecCmsSignerInfoRef signerinfo
,CFTypeRef timeStampPolicy
);
88 SecCmsSignerInfoGetEncDigest(SecCmsSignerInfoRef signerinfo
);
94 SecCmsSignerInfoGetDigestAlg(SecCmsSignerInfoRef signerinfo
);
100 SecCmsSignerInfoGetDigestAlgTag(SecCmsSignerInfoRef signerinfo
);
106 SecCmsSignerInfoGetCertList(SecCmsSignerInfoRef signerinfo
);
112 SecCmsSignerInfoGetTimestampCertList(SecCmsSignerInfoRef signerinfo
);
116 @abstract Return the signing time, in UTCTime format, of a CMS signerInfo.
117 @param sinfo SignerInfo data for this signer.
118 @discussion Returns a pointer to XXXX (what?)
119 @result A return value of NULL is an error.
122 SecCmsSignerInfoGetSigningTime(SecCmsSignerInfoRef sinfo
, CFAbsoluteTime
*stime
);
126 @abstract Return the timestamp time, in UTCTime format, of a CMS signerInfo.
127 @param sinfo SignerInfo data for this signer.
128 @discussion Returns a pointer to XXXX (what?)
129 @result A return value of NULL is an error.
132 SecCmsSignerInfoGetTimestampTime(SecCmsSignerInfoRef sinfo
, CFAbsoluteTime
*stime
);
136 @abstract Return the timestamp time, in UTCTime format, of a CMS signerInfo.
137 @param sinfo SignerInfo data for this signer, timeStampPolicy the policy to verify the timestamp signer
138 @discussion Returns a pointer to XXXX (what?)
139 @result A return value of NULL is an error.
142 SecCmsSignerInfoGetTimestampTimeWithPolicy(SecCmsSignerInfoRef sinfo
, CFTypeRef timeStampPolicy
, CFAbsoluteTime
*stime
);
146 @abstract Return the data in the signed Codesigning Hash Agility attribute.
147 @param sinfo SignerInfo data for this signer, pointer to a CFDataRef for attribute value
148 @discussion Returns a CFDataRef containing the value of the attribute
149 @result A return value of SECFailure is an error.
152 SecCmsSignerInfoGetAppleCodesigningHashAgility(SecCmsSignerInfoRef sinfo
, CFDataRef
*sdata
);
156 @abstract Return the signing cert of a CMS signerInfo.
157 @discussion The certs in the enclosing SignedData must have been imported already.
159 extern SecCertificateRef
160 SecCmsSignerInfoGetSigningCertificate(SecCmsSignerInfoRef signerinfo
, SecKeychainRef keychainOrArray
);
164 @abstract Return the common name of the signer.
165 @param sinfo SignerInfo data for this signer.
166 @discussion Returns a CFStringRef containing the common name of the signer.
167 @result A return value of NULL is an error.
170 SecCmsSignerInfoGetSignerCommonName(SecCmsSignerInfoRef sinfo
);
174 @abstract Return the email address of the signer
175 @param sinfo SignerInfo data for this signer.
176 @discussion Returns a CFStringRef containing the name of the signer.
177 @result A return value of NULL is an error.
180 SecCmsSignerInfoGetSignerEmailAddress(SecCmsSignerInfoRef sinfo
);
184 @abstract Add the signing time to the authenticated (i.e. signed) attributes of "signerinfo".
185 @discussion This is expected to be included in outgoing signed
186 messages for email (S/MIME) but is likely useful in other situations.
188 This should only be added once; a second call will do nothing.
190 XXX This will probably just shove the current time into "signerinfo"
191 but it will not actually get signed until the entire item is
192 processed for encoding. Is this (expected to be small) delay okay?
195 SecCmsSignerInfoAddSigningTime(SecCmsSignerInfoRef signerinfo
, CFAbsoluteTime t
);
199 @abstract Add a SMIMECapabilities attribute to the authenticated (i.e. signed) attributes of "signerinfo".
200 @discussion This is expected to be included in outgoing signed messages for email (S/MIME).
203 SecCmsSignerInfoAddSMIMECaps(SecCmsSignerInfoRef signerinfo
);
207 @abstract Add a SMIMEEncryptionKeyPreferences attribute to the authenticated (i.e. signed) attributes of "signerinfo".
208 @discussion This is expected to be included in outgoing signed messages for email (S/MIME).
211 SecCmsSignerInfoAddSMIMEEncKeyPrefs(SecCmsSignerInfoRef signerinfo
, SecCertificateRef cert
, SecKeychainRef keychainOrArray
);
215 @abstract Add a SMIMEEncryptionKeyPreferences attribute to the authenticated (i.e. signed) attributes of "signerinfo", using the OID prefered by Microsoft.
216 @discussion This is expected to be included in outgoing signed messages for email (S/MIME), if compatibility with Microsoft mail clients is wanted.
219 SecCmsSignerInfoAddMSSMIMEEncKeyPrefs(SecCmsSignerInfoRef signerinfo
, SecCertificateRef cert
, SecKeychainRef keychainOrArray
);
223 @abstract Create a timestamp unsigned attribute with a TimeStampToken.
226 SecCmsSignerInfoAddTimeStamp(SecCmsSignerInfoRef signerinfo
, CSSM_DATA
*tstoken
);
230 @abstract Countersign a signerinfo.
233 SecCmsSignerInfoAddCounterSignature(SecCmsSignerInfoRef signerinfo
,
234 SECOidTag digestalg
, SecIdentityRef identity
);
238 @abstract Add the Apple Codesigning Hash Agility attribute to the authenticated (i.e. signed) attributes of "signerinfo".
239 @discussion This is expected to be included in outgoing signed Apple code signatures.
242 SecCmsSignerInfoAddAppleCodesigningHashAgility(SecCmsSignerInfoRef signerinfo
, CFDataRef attrValue
);
246 @abstract The following needs to be done in the S/MIME layer code after signature of a signerinfo has been verified.
247 @param signerinfo The SecCmsSignerInfo object for which we verified the signature.
248 @result The preferred encryption certificate of the user who signed this message will be added to the users default Keychain and it will be marked as the preferred certificate to use when sending that person messages from now on.
251 SecCmsSignerInfoSaveSMIMEProfile(SecCmsSignerInfoRef signerinfo
);
255 @abstract Set cert chain inclusion mode for this signer.
258 SecCmsSignerInfoIncludeCerts(SecCmsSignerInfoRef signerinfo
, SecCmsCertChainMode cm
, SECCertUsage usage
);
260 /*! @functiongroup CMS misc utility functions */
263 Convert a SecCmsVerificationStatus to a human readable string.
266 SecCmsUtilVerificationStatusToString(SecCmsVerificationStatus vs
);
269 * Preference domain and key for the Microsoft ECDSA compatibility flag.
270 * Default if not present is TRUE, meaning we generate ECDSA-signed messages
271 * which are compatible with Microsoft Entourage. FALSE means we adhere to
272 * the spec (RFC 3278 section 2.1.1).
274 #define kMSCompatibilityDomain "com.apple.security.smime"
275 #define kMSCompatibilityMode CFSTR("MSCompatibilityMode")
277 #if defined(__cplusplus)
281 #endif /* _SECURITY_SECCMSSIGNERINFO_H_ */