]> git.saurik.com Git - apple/security.git/blobdiff - OSX/libsecurity_smime/lib/cmsreclist.c
Security-57336.1.9.tar.gz
[apple/security.git] / OSX / libsecurity_smime / lib / cmsreclist.c
diff --git a/OSX/libsecurity_smime/lib/cmsreclist.c b/OSX/libsecurity_smime/lib/cmsreclist.c
new file mode 100644 (file)
index 0000000..f9b194b
--- /dev/null
@@ -0,0 +1,237 @@
+/*
+ * The contents of this file are subject to the Mozilla Public
+ * License Version 1.1 (the "License"); you may not use this file
+ * except in compliance with the License. You may obtain a copy of
+ * the License at http://www.mozilla.org/MPL/
+ * 
+ * Software distributed under the License is distributed on an "AS
+ * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or
+ * implied. See the License for the specific language governing
+ * rights and limitations under the License.
+ * 
+ * The Original Code is the Netscape security libraries.
+ * 
+ * The Initial Developer of the Original Code is Netscape
+ * Communications Corporation.  Portions created by Netscape are 
+ * Copyright (C) 1994-2000 Netscape Communications Corporation.  All
+ * Rights Reserved.
+ * 
+ * Contributor(s):
+ * 
+ * Alternatively, the contents of this file may be used under the
+ * terms of the GNU General Public License Version 2 or later (the
+ * "GPL"), in which case the provisions of the GPL are applicable 
+ * instead of those above.  If you wish to allow use of your 
+ * version of this file only under the terms of the GPL and not to
+ * allow others to use your version of this file under the MPL,
+ * indicate your decision by deleting the provisions above and
+ * replace them with the notice and other provisions required by
+ * the GPL.  If you do not delete the provisions above, a recipient
+ * may use your version of this file under either the MPL or the
+ * GPL.
+ */
+
+#include "cmslocal.h"
+
+#include "cert.h"
+#include "secitem.h"
+#include "secoid.h"
+
+#include <security_asn1/secasn1.h>
+#include <security_asn1/secerr.h>
+#include <Security/SecIdentity.h>
+
+static int
+nss_cms_recipients_traverse(SecCmsRecipientInfoRef *recipientinfos, SecCmsRecipient **recipient_list)
+{
+    int count = 0;
+    int rlindex = 0;
+    int i, j;
+    SecCmsRecipient *rle;
+    SecCmsRecipientInfoRef ri;
+    SecCmsRecipientEncryptedKey *rek;
+
+    for (i = 0; recipientinfos[i] != NULL; i++) {
+       ri = recipientinfos[i];
+       switch (ri->recipientInfoType) {
+       case SecCmsRecipientInfoIDKeyTrans:
+           if (recipient_list) {
+               /* alloc one & fill it out */
+               rle = (SecCmsRecipient *)PORT_ZAlloc(sizeof(SecCmsRecipient));
+               if (rle == NULL)
+                   return -1;
+               
+               rle->riIndex = i;
+               rle->subIndex = -1;
+               switch (ri->ri.keyTransRecipientInfo.recipientIdentifier.identifierType) {
+               case SecCmsRecipientIDIssuerSN:
+                   rle->kind = RLIssuerSN;
+                   rle->id.issuerAndSN = ri->ri.keyTransRecipientInfo.recipientIdentifier.id.issuerAndSN;
+                   break;
+               case SecCmsRecipientIDSubjectKeyID:
+                   rle->kind = RLSubjKeyID;
+                   rle->id.subjectKeyID = ri->ri.keyTransRecipientInfo.recipientIdentifier.id.subjectKeyID;
+                   break;
+               }
+               recipient_list[rlindex++] = rle;
+           } else {
+               count++;
+           }
+           break;
+       case SecCmsRecipientInfoIDKeyAgree:
+           if (ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys == NULL)
+               break;
+           for (j=0; ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[j] != NULL; j++) {
+               if (recipient_list) {
+                   rek = ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[j];
+                   /* alloc one & fill it out */
+                   rle = (SecCmsRecipient *)PORT_ZAlloc(sizeof(SecCmsRecipient));
+                   if (rle == NULL)
+                       return -1;
+                   
+                   rle->riIndex = i;
+                   rle->subIndex = j;
+                   switch (rek->recipientIdentifier.identifierType) {
+                   case SecCmsKeyAgreeRecipientIDIssuerSN:
+                       rle->kind = RLIssuerSN;
+                       rle->id.issuerAndSN = rek->recipientIdentifier.id.issuerAndSN;
+                       break;
+                   case SecCmsKeyAgreeRecipientIDRKeyID:
+                       rle->kind = RLSubjKeyID;
+                       rle->id.subjectKeyID = rek->recipientIdentifier.id.recipientKeyIdentifier.subjectKeyIdentifier;
+                       break;
+                   }
+                   recipient_list[rlindex++] = rle;
+               } else {
+                   count++;
+               }
+           }
+           break;
+       case SecCmsRecipientInfoIDKEK:
+           /* KEK is not implemented */
+           break;
+       }
+    }
+    /* if we have a recipient list, we return on success (-1, above, on failure) */
+    /* otherwise, we return the count. */
+    if (recipient_list) {
+       recipient_list[rlindex] = NULL;
+       return 0;
+    } else {
+       return count;
+    }
+}
+
+SecCmsRecipient **
+nss_cms_recipient_list_create(SecCmsRecipientInfoRef *recipientinfos)
+{
+    int count, rv;
+    SecCmsRecipient **recipient_list;
+
+    /* count the number of recipient identifiers */
+    count = nss_cms_recipients_traverse(recipientinfos, NULL);
+    if (count <= 0 || count>=(int)((INT_MAX/sizeof(SecCmsRecipient *))-1)) {
+       /* no recipients? or risk of underallocation 20130783 */
+       PORT_SetError(SEC_ERROR_BAD_DATA);
+#if 0
+       PORT_SetErrorString("Cannot find recipient data in envelope.");
+#endif
+       return NULL;
+    }
+
+    /* allocate an array of pointers */
+    recipient_list = (SecCmsRecipient **)
+                   PORT_ZAlloc((count + 1) * sizeof(SecCmsRecipient *));
+    if (recipient_list == NULL)
+       return NULL;
+
+    /* now fill in the recipient_list */
+    rv = nss_cms_recipients_traverse(recipientinfos, recipient_list);
+    if (rv < 0) {
+       nss_cms_recipient_list_destroy(recipient_list);
+       return NULL;
+    }
+    return recipient_list;
+}
+
+void
+nss_cms_recipient_list_destroy(SecCmsRecipient **recipient_list)
+{
+    int i;
+    SecCmsRecipient *recipient;
+
+    for (i=0; recipient_list[i] != NULL; i++) {
+       recipient = recipient_list[i];
+       if (recipient->cert)
+           CFRelease(recipient->cert);
+       if (recipient->privkey)
+           CFRelease(recipient->privkey);
+#if 0
+       // @@@ Eliminate slot stuff.
+       if (recipient->slot)
+           PK11_FreeSlot(recipient->slot);
+#endif
+       PORT_Free(recipient);
+    }
+    PORT_Free(recipient_list);
+}
+
+SecCmsRecipientEncryptedKey *
+SecCmsRecipientEncryptedKeyCreate(PLArenaPool *poolp)
+{
+    return (SecCmsRecipientEncryptedKey *)PORT_ArenaZAlloc(poolp, sizeof(SecCmsRecipientEncryptedKey));
+}
+
+
+int
+nss_cms_FindCertAndKeyByRecipientList(SecCmsRecipient **recipient_list, void *wincx)
+{
+    SecCmsRecipient *recipient = NULL;
+    SecCertificateRef cert = NULL;
+    SecPrivateKeyRef privKey = NULL;
+    SecIdentityRef identity = NULL;
+    CFTypeRef keychainOrArray = NULL; // @@@ The caller should be able to pass this in somehow.
+    int index;
+
+    for (index = 0; recipient_list[index] != NULL; ++index)
+    {
+       recipient = recipient_list[index];
+
+       switch (recipient->kind)
+       {
+       case RLIssuerSN:
+           identity = CERT_FindIdentityByIssuerAndSN(keychainOrArray, recipient->id.issuerAndSN);
+           break;
+       case RLSubjKeyID:
+           identity = CERT_FindIdentityBySubjectKeyID(keychainOrArray, recipient->id.subjectKeyID);
+           break;
+       }
+
+       if (identity)
+           break;
+    }
+
+    if (!recipient)
+       goto loser;
+
+    if (SecIdentityCopyCertificate(identity, &cert))
+       goto loser;
+    if (SecIdentityCopyPrivateKey(identity, &privKey))
+       goto loser;
+    CFRelease(identity);
+
+    recipient->cert = cert;
+    recipient->privkey = privKey;
+
+    return index;
+
+loser:
+    if (identity)
+       CFRelease(identity);
+    if (cert)
+       CFRelease(cert);
+    if (privKey)
+       CFRelease(privKey);
+
+    return -1;
+}