|
Packit |
40b132 |
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
Packit |
40b132 |
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
Packit |
40b132 |
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/*
|
|
Packit |
40b132 |
* CMS recipient list functions
|
|
Packit |
40b132 |
*/
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
#include "cmslocal.h"
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
#include "cert.h"
|
|
Packit |
40b132 |
#include "key.h"
|
|
Packit |
40b132 |
#include "secasn1.h"
|
|
Packit |
40b132 |
#include "secitem.h"
|
|
Packit |
40b132 |
#include "secoid.h"
|
|
Packit |
40b132 |
#include "pk11func.h"
|
|
Packit |
40b132 |
#include "prtime.h"
|
|
Packit |
40b132 |
#include "secerr.h"
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
static int
|
|
Packit |
40b132 |
nss_cms_recipients_traverse(NSSCMSRecipientInfo **recipientinfos, NSSCMSRecipient **recipient_list)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
int count = 0;
|
|
Packit |
40b132 |
int rlindex = 0;
|
|
Packit |
40b132 |
int i, j;
|
|
Packit |
40b132 |
NSSCMSRecipient *rle;
|
|
Packit |
40b132 |
NSSCMSRecipientInfo *ri;
|
|
Packit |
40b132 |
NSSCMSRecipientEncryptedKey *rek;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
for (i = 0; recipientinfos[i] != NULL; i++) {
|
|
Packit |
40b132 |
ri = recipientinfos[i];
|
|
Packit |
40b132 |
switch (ri->recipientInfoType) {
|
|
Packit |
40b132 |
case NSSCMSRecipientInfoID_KeyTrans:
|
|
Packit |
40b132 |
if (recipient_list) {
|
|
Packit |
40b132 |
NSSCMSRecipientIdentifier *recipId =
|
|
Packit |
40b132 |
&ri->ri.keyTransRecipientInfo.recipientIdentifier;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
if (recipId->identifierType != NSSCMSRecipientID_IssuerSN &&
|
|
Packit |
40b132 |
recipId->identifierType != NSSCMSRecipientID_SubjectKeyID) {
|
|
Packit |
40b132 |
PORT_SetError(SEC_ERROR_INVALID_ARGS);
|
|
Packit |
40b132 |
return -1;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
/* alloc one & fill it out */
|
|
Packit |
40b132 |
rle = (NSSCMSRecipient *)PORT_ZAlloc(sizeof(NSSCMSRecipient));
|
|
Packit |
40b132 |
if (!rle)
|
|
Packit |
40b132 |
return -1;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
rle->riIndex = i;
|
|
Packit |
40b132 |
rle->subIndex = -1;
|
|
Packit |
40b132 |
switch (recipId->identifierType) {
|
|
Packit |
40b132 |
case NSSCMSRecipientID_IssuerSN:
|
|
Packit |
40b132 |
rle->kind = RLIssuerSN;
|
|
Packit |
40b132 |
rle->id.issuerAndSN = recipId->id.issuerAndSN;
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
case NSSCMSRecipientID_SubjectKeyID:
|
|
Packit |
40b132 |
rle->kind = RLSubjKeyID;
|
|
Packit |
40b132 |
rle->id.subjectKeyID = recipId->id.subjectKeyID;
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
default: /* we never get here because of identifierType check
|
|
Packit |
40b132 |
we done before. Leaving it to kill compiler warning */
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
recipient_list[rlindex++] = rle;
|
|
Packit |
40b132 |
} else {
|
|
Packit |
40b132 |
count++;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
case NSSCMSRecipientInfoID_KeyAgree:
|
|
Packit |
40b132 |
if (ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys == NULL)
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
for (j=0; ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[j] != NULL; j++) {
|
|
Packit |
40b132 |
if (recipient_list) {
|
|
Packit |
40b132 |
rek = ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[j];
|
|
Packit |
40b132 |
/* alloc one & fill it out */
|
|
Packit |
40b132 |
rle = (NSSCMSRecipient *)PORT_ZAlloc(sizeof(NSSCMSRecipient));
|
|
Packit |
40b132 |
if (!rle)
|
|
Packit |
40b132 |
return -1;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
rle->riIndex = i;
|
|
Packit |
40b132 |
rle->subIndex = j;
|
|
Packit |
40b132 |
switch (rek->recipientIdentifier.identifierType) {
|
|
Packit |
40b132 |
case NSSCMSKeyAgreeRecipientID_IssuerSN:
|
|
Packit |
40b132 |
rle->kind = RLIssuerSN;
|
|
Packit |
40b132 |
rle->id.issuerAndSN = rek->recipientIdentifier.id.issuerAndSN;
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
case NSSCMSKeyAgreeRecipientID_RKeyID:
|
|
Packit |
40b132 |
rle->kind = RLSubjKeyID;
|
|
Packit |
40b132 |
rle->id.subjectKeyID = rek->recipientIdentifier.id.recipientKeyIdentifier.subjectKeyIdentifier;
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
recipient_list[rlindex++] = rle;
|
|
Packit |
40b132 |
} else {
|
|
Packit |
40b132 |
count++;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
case NSSCMSRecipientInfoID_KEK:
|
|
Packit |
40b132 |
/* KEK is not implemented */
|
|
Packit |
40b132 |
break;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
/* if we have a recipient list, we return on success (-1, above, on failure) */
|
|
Packit |
40b132 |
/* otherwise, we return the count. */
|
|
Packit |
40b132 |
if (recipient_list) {
|
|
Packit |
40b132 |
recipient_list[rlindex] = NULL;
|
|
Packit |
40b132 |
return 0;
|
|
Packit |
40b132 |
} else {
|
|
Packit |
40b132 |
return count;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
NSSCMSRecipient **
|
|
Packit |
40b132 |
nss_cms_recipient_list_create(NSSCMSRecipientInfo **recipientinfos)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
int count, rv;
|
|
Packit |
40b132 |
NSSCMSRecipient **recipient_list;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/* count the number of recipient identifiers */
|
|
Packit |
40b132 |
count = nss_cms_recipients_traverse(recipientinfos, NULL);
|
|
Packit |
40b132 |
if (count <= 0) {
|
|
Packit |
40b132 |
/* no recipients? */
|
|
Packit |
40b132 |
PORT_SetError(SEC_ERROR_BAD_DATA);
|
|
Packit |
40b132 |
#if 0
|
|
Packit |
40b132 |
PORT_SetErrorString("Cannot find recipient data in envelope.");
|
|
Packit |
40b132 |
#endif
|
|
Packit |
40b132 |
return NULL;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/* allocate an array of pointers */
|
|
Packit |
40b132 |
recipient_list = (NSSCMSRecipient **)
|
|
Packit |
40b132 |
PORT_ZAlloc((count + 1) * sizeof(NSSCMSRecipient *));
|
|
Packit |
40b132 |
if (recipient_list == NULL)
|
|
Packit |
40b132 |
return NULL;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
/* now fill in the recipient_list */
|
|
Packit |
40b132 |
rv = nss_cms_recipients_traverse(recipientinfos, recipient_list);
|
|
Packit |
40b132 |
if (rv < 0) {
|
|
Packit |
40b132 |
nss_cms_recipient_list_destroy(recipient_list);
|
|
Packit |
40b132 |
return NULL;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
return recipient_list;
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
void
|
|
Packit |
40b132 |
nss_cms_recipient_list_destroy(NSSCMSRecipient **recipient_list)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
int i;
|
|
Packit |
40b132 |
NSSCMSRecipient *recipient;
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
for (i=0; recipient_list[i] != NULL; i++) {
|
|
Packit |
40b132 |
recipient = recipient_list[i];
|
|
Packit |
40b132 |
if (recipient->cert)
|
|
Packit |
40b132 |
CERT_DestroyCertificate(recipient->cert);
|
|
Packit |
40b132 |
if (recipient->privkey)
|
|
Packit |
40b132 |
SECKEY_DestroyPrivateKey(recipient->privkey);
|
|
Packit |
40b132 |
if (recipient->slot)
|
|
Packit |
40b132 |
PK11_FreeSlot(recipient->slot);
|
|
Packit |
40b132 |
PORT_Free(recipient);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
PORT_Free(recipient_list);
|
|
Packit |
40b132 |
}
|
|
Packit |
40b132 |
|
|
Packit |
40b132 |
NSSCMSRecipientEncryptedKey *
|
|
Packit |
40b132 |
NSS_CMSRecipientEncryptedKey_Create(PLArenaPool *poolp)
|
|
Packit |
40b132 |
{
|
|
Packit |
40b132 |
return (NSSCMSRecipientEncryptedKey *)PORT_ArenaZAlloc(poolp, sizeof(NSSCMSRecipientEncryptedKey));
|
|
Packit |
40b132 |
}
|