Blame nss/lib/smime/cmssigdata.c

Packit 40b132
/* This Source Code Form is subject to the terms of the Mozilla Public
Packit 40b132
 * License, v. 2.0. If a copy of the MPL was not distributed with this
Packit 40b132
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * CMS signedData methods.
Packit 40b132
 */
Packit 40b132
Packit 40b132
#include "cmslocal.h"
Packit 40b132
Packit 40b132
#include "cert.h"
Packit 40b132
/*#include "cdbhdl.h"*/
Packit 40b132
#include "secasn1.h"
Packit 40b132
#include "secitem.h"
Packit 40b132
#include "secoid.h"
Packit 40b132
#include "pk11func.h"
Packit 40b132
#include "secerr.h"
Packit 40b132
Packit 40b132
NSSCMSSignedData *
Packit 40b132
NSS_CMSSignedData_Create(NSSCMSMessage *cmsg)
Packit 40b132
{
Packit 40b132
    void *mark;
Packit 40b132
    NSSCMSSignedData *sigd;
Packit 40b132
    PLArenaPool *poolp;
Packit 40b132
Packit 40b132
    if (!cmsg) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    poolp = cmsg->poolp;
Packit 40b132
Packit 40b132
    mark = PORT_ArenaMark(poolp);
Packit 40b132
Packit 40b132
    sigd = (NSSCMSSignedData *)PORT_ArenaZAlloc (poolp, sizeof(NSSCMSSignedData));
Packit 40b132
    if (sigd == NULL)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    sigd->cmsg = cmsg;
Packit 40b132
Packit 40b132
    /* signerInfos, certs, certlists, crls are all empty */
Packit 40b132
    /* version is set in NSS_CMSSignedData_Finalize() */
Packit 40b132
Packit 40b132
    PORT_ArenaUnmark(poolp, mark);
Packit 40b132
    return sigd;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    PORT_ArenaRelease(poolp, mark);
Packit 40b132
    return NULL;
Packit 40b132
}
Packit 40b132
Packit 40b132
void
Packit 40b132
NSS_CMSSignedData_Destroy(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    CERTCertificate **certs, **tempCerts, *cert;
Packit 40b132
    CERTCertificateList **certlists, *certlist;
Packit 40b132
    NSSCMSSignerInfo **signerinfos, *si;
Packit 40b132
Packit 40b132
    if (sigd == NULL)
Packit 40b132
	return;
Packit 40b132
Packit 40b132
    certs = sigd->certs;
Packit 40b132
    tempCerts = sigd->tempCerts;
Packit 40b132
    certlists = sigd->certLists;
Packit 40b132
    signerinfos = sigd->signerInfos;
Packit 40b132
Packit 40b132
    if (certs != NULL) {
Packit 40b132
	while ((cert = *certs++) != NULL)
Packit 40b132
	    CERT_DestroyCertificate (cert);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (tempCerts != NULL) {
Packit 40b132
	while ((cert = *tempCerts++) != NULL)
Packit 40b132
	    CERT_DestroyCertificate (cert);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (certlists != NULL) {
Packit 40b132
	while ((certlist = *certlists++) != NULL)
Packit 40b132
	    CERT_DestroyCertificateList (certlist);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (signerinfos != NULL) {
Packit 40b132
	while ((si = *signerinfos++) != NULL)
Packit 40b132
	    NSS_CMSSignerInfo_Destroy(si);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* everything's in a pool, so don't worry about the storage */
Packit 40b132
   NSS_CMSContentInfo_Destroy(&(sigd->contentInfo));
Packit 40b132
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_Encode_BeforeStart - do all the necessary things to a SignedData
Packit 40b132
 *     before start of encoding.
Packit 40b132
 *
Packit 40b132
 * In detail:
Packit 40b132
 *  - find out about the right value to put into sigd->version
Packit 40b132
 *  - come up with a list of digestAlgorithms (which should be the union of the algorithms
Packit 40b132
 *         in the signerinfos).
Packit 40b132
 *         If we happen to have a pre-set list of algorithms (and digest values!), we
Packit 40b132
 *         check if we have all the signerinfos' algorithms. If not, this is an error.
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_Encode_BeforeStart(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    NSSCMSSignerInfo *signerinfo;
Packit 40b132
    SECOidTag digestalgtag;
Packit 40b132
    SECItem *dummy;
Packit 40b132
    int version;
Packit 40b132
    SECStatus rv;
Packit 40b132
    PRBool haveDigests = PR_FALSE;
Packit 40b132
    int n, i;
Packit 40b132
    PLArenaPool *poolp;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    poolp = sigd->cmsg->poolp;
Packit 40b132
Packit 40b132
    /* we assume that we have precomputed digests if there is a list of algorithms, and */
Packit 40b132
    /* a chunk of data for each of those algorithms */
Packit 40b132
    if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) {
Packit 40b132
	for (i=0; sigd->digestAlgorithms[i] != NULL; i++) {
Packit 40b132
	    if (sigd->digests[i] == NULL)
Packit 40b132
		break;
Packit 40b132
	}
Packit 40b132
	if (sigd->digestAlgorithms[i] == NULL)	/* reached the end of the array? */
Packit 40b132
	    haveDigests = PR_TRUE;		/* yes: we must have all the digests */
Packit 40b132
    }
Packit 40b132
	    
Packit 40b132
    version = NSS_CMS_SIGNED_DATA_VERSION_BASIC;
Packit 40b132
Packit 40b132
    /* RFC2630 5.1 "version is the syntax version number..." */
Packit 40b132
    if (NSS_CMSContentInfo_GetContentTypeTag(&(sigd->contentInfo)) != SEC_OID_PKCS7_DATA)
Packit 40b132
	version = NSS_CMS_SIGNED_DATA_VERSION_EXT;
Packit 40b132
Packit 40b132
    /* prepare all the SignerInfos (there may be none) */
Packit 40b132
    for (i=0; i < NSS_CMSSignedData_SignerInfoCount(sigd); i++) {
Packit 40b132
	signerinfo = NSS_CMSSignedData_GetSignerInfo(sigd, i);
Packit 40b132
Packit 40b132
	/* RFC2630 5.1 "version is the syntax version number..." */
Packit 40b132
	if (NSS_CMSSignerInfo_GetVersion(signerinfo) != NSS_CMS_SIGNER_INFO_VERSION_ISSUERSN)
Packit 40b132
	    version = NSS_CMS_SIGNED_DATA_VERSION_EXT;
Packit 40b132
	
Packit 40b132
	/* collect digestAlgorithms from SignerInfos */
Packit 40b132
	/* (we need to know which algorithms we have when the content comes in) */
Packit 40b132
	/* do not overwrite any existing digestAlgorithms (and digest) */
Packit 40b132
	digestalgtag = NSS_CMSSignerInfo_GetDigestAlgTag(signerinfo);
Packit 40b132
	n = NSS_CMSAlgArray_GetIndexByAlgTag(sigd->digestAlgorithms, digestalgtag);
Packit 40b132
	if (n < 0 && haveDigests) {
Packit 40b132
	    /* oops, there is a digestalg we do not have a digest for */
Packit 40b132
	    /* but we were supposed to have all the digests already... */
Packit 40b132
	    goto loser;
Packit 40b132
	} else if (n < 0) {
Packit 40b132
	    /* add the digestAlgorithm & a NULL digest */
Packit 40b132
	    rv = NSS_CMSSignedData_AddDigest(poolp, sigd, digestalgtag, NULL);
Packit 40b132
	    if (rv != SECSuccess)
Packit 40b132
		goto loser;
Packit 40b132
	} else {
Packit 40b132
	    /* found it, nothing to do */
Packit 40b132
	}
Packit 40b132
    }
Packit 40b132
Packit 40b132
    dummy = SEC_ASN1EncodeInteger(poolp, &(sigd->version), (long)version);
Packit 40b132
    if (dummy == NULL)
Packit 40b132
	return SECFailure;
Packit 40b132
Packit 40b132
    /* this is a SET OF, so we need to sort them guys */
Packit 40b132
    rv = NSS_CMSArray_SortByDER((void **)sigd->digestAlgorithms, 
Packit 40b132
                                SEC_ASN1_GET(SECOID_AlgorithmIDTemplate),
Packit 40b132
				(void **)sigd->digests);
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	return SECFailure;
Packit 40b132
    
Packit 40b132
    return SECSuccess;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    return SECFailure;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_Encode_BeforeData(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    SECStatus rv;
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
    rv = NSS_CMSContentInfo_Private_Init(&sigd->contentInfo);
Packit 40b132
    if (rv != SECSuccess) {
Packit 40b132
	return SECFailure;
Packit 40b132
    }
Packit 40b132
    /* set up the digests */
Packit 40b132
    if (sigd->digests && sigd->digests[0]) {
Packit 40b132
	sigd->contentInfo.privateInfo->digcx = NULL; /* don't attempt to make new ones. */
Packit 40b132
    } else if (sigd->digestAlgorithms != NULL) {
Packit 40b132
	sigd->contentInfo.privateInfo->digcx =
Packit 40b132
	        NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
Packit 40b132
	if (sigd->contentInfo.privateInfo->digcx == NULL)
Packit 40b132
	    return SECFailure;
Packit 40b132
    }
Packit 40b132
    return SECSuccess;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_Encode_AfterData - do all the necessary things to a SignedData
Packit 40b132
 *     after all the encapsulated data was passed through the encoder.
Packit 40b132
 *
Packit 40b132
 * In detail:
Packit 40b132
 *  - create the signatures in all the SignerInfos
Packit 40b132
 *
Packit 40b132
 * Please note that nothing is done to the Certificates and CRLs in the message - this
Packit 40b132
 * is entirely the responsibility of our callers.
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_Encode_AfterData(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    NSSCMSSignerInfo **signerinfos, *signerinfo;
Packit 40b132
    NSSCMSContentInfo *cinfo;
Packit 40b132
    SECOidTag digestalgtag;
Packit 40b132
    SECStatus ret = SECFailure;
Packit 40b132
    SECStatus rv;
Packit 40b132
    SECItem *contentType;
Packit 40b132
    int certcount;
Packit 40b132
    int i, ci, cli, n, rci, si;
Packit 40b132
    PLArenaPool *poolp;
Packit 40b132
    CERTCertificateList *certlist;
Packit 40b132
    extern const SEC_ASN1Template NSSCMSSignerInfoTemplate[];
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    poolp = sigd->cmsg->poolp;
Packit 40b132
    cinfo = &(sigd->contentInfo);
Packit 40b132
Packit 40b132
    /* did we have digest calculation going on? */
Packit 40b132
    if (cinfo->privateInfo && cinfo->privateInfo->digcx) {
Packit 40b132
	rv = NSS_CMSDigestContext_FinishMultiple(cinfo->privateInfo->digcx, poolp,
Packit 40b132
	                                         &(sigd->digests));
Packit 40b132
	/* error has been set by NSS_CMSDigestContext_FinishMultiple */
Packit 40b132
	cinfo->privateInfo->digcx = NULL;
Packit 40b132
	if (rv != SECSuccess)
Packit 40b132
	    goto loser;		
Packit 40b132
    }
Packit 40b132
Packit 40b132
    signerinfos = sigd->signerInfos;
Packit 40b132
    certcount = 0;
Packit 40b132
Packit 40b132
    /* prepare all the SignerInfos (there may be none) */
Packit 40b132
    for (i=0; i < NSS_CMSSignedData_SignerInfoCount(sigd); i++) {
Packit 40b132
	signerinfo = NSS_CMSSignedData_GetSignerInfo(sigd, i);
Packit 40b132
Packit 40b132
	/* find correct digest for this signerinfo */
Packit 40b132
	digestalgtag = NSS_CMSSignerInfo_GetDigestAlgTag(signerinfo);
Packit 40b132
	n = NSS_CMSAlgArray_GetIndexByAlgTag(sigd->digestAlgorithms, digestalgtag);
Packit 40b132
	if (n < 0 || sigd->digests == NULL || sigd->digests[n] == NULL) {
Packit 40b132
	    /* oops - digest not found */
Packit 40b132
	    PORT_SetError(SEC_ERROR_DIGEST_NOT_FOUND);
Packit 40b132
	    goto loser;
Packit 40b132
	}
Packit 40b132
Packit 40b132
	/* XXX if our content is anything else but data, we need to force the
Packit 40b132
	 * presence of signed attributes (RFC2630 5.3 "signedAttributes is a
Packit 40b132
	 * collection...") */
Packit 40b132
Packit 40b132
	/* pass contentType here as we want a contentType attribute */
Packit 40b132
	if ((contentType = NSS_CMSContentInfo_GetContentTypeOID(cinfo)) == NULL)
Packit 40b132
	    goto loser;
Packit 40b132
Packit 40b132
	/* sign the thing */
Packit 40b132
	rv = NSS_CMSSignerInfo_Sign(signerinfo, sigd->digests[n], contentType);
Packit 40b132
	if (rv != SECSuccess)
Packit 40b132
	    goto loser;
Packit 40b132
Packit 40b132
	/* while we're at it, count number of certs in certLists */
Packit 40b132
	certlist = NSS_CMSSignerInfo_GetCertList(signerinfo);
Packit 40b132
	if (certlist)
Packit 40b132
	    certcount += certlist->len;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* this is a SET OF, so we need to sort them guys */
Packit 40b132
    rv = NSS_CMSArray_SortByDER((void **)signerinfos, NSSCMSSignerInfoTemplate, NULL);
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    /*
Packit 40b132
     * now prepare certs & crls
Packit 40b132
     */
Packit 40b132
Packit 40b132
    /* count the rest of the certs */
Packit 40b132
    if (sigd->certs != NULL) {
Packit 40b132
	for (ci = 0; sigd->certs[ci] != NULL; ci++)
Packit 40b132
	    certcount++;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (sigd->certLists != NULL) {
Packit 40b132
	for (cli = 0; sigd->certLists[cli] != NULL; cli++)
Packit 40b132
	    certcount += sigd->certLists[cli]->len;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (certcount == 0) {
Packit 40b132
	sigd->rawCerts = NULL;
Packit 40b132
    } else {
Packit 40b132
	/*
Packit 40b132
	 * Combine all of the certs and cert chains into rawcerts.
Packit 40b132
	 * Note: certcount is an upper bound; we may not need that many slots
Packit 40b132
	 * but we will allocate anyway to avoid having to do another pass.
Packit 40b132
	 * (The temporary space saving is not worth it.)
Packit 40b132
	 *
Packit 40b132
	 * XXX ARGH - this NEEDS to be fixed. need to come up with a decent
Packit 40b132
	 *  SetOfDERcertficates implementation
Packit 40b132
	 */
Packit 40b132
	sigd->rawCerts = (SECItem **)PORT_ArenaAlloc(poolp, (certcount + 1) * sizeof(SECItem *));
Packit 40b132
	if (sigd->rawCerts == NULL)
Packit 40b132
	    return SECFailure;
Packit 40b132
Packit 40b132
	/*
Packit 40b132
	 * XXX Want to check for duplicates and not add *any* cert that is
Packit 40b132
	 * already in the set.  This will be more important when we start
Packit 40b132
	 * dealing with larger sets of certs, dual-key certs (signing and
Packit 40b132
	 * encryption), etc.  For the time being we can slide by...
Packit 40b132
	 *
Packit 40b132
	 * XXX ARGH - this NEEDS to be fixed. need to come up with a decent
Packit 40b132
	 *  SetOfDERcertficates implementation
Packit 40b132
	 */
Packit 40b132
	rci = 0;
Packit 40b132
	if (signerinfos != NULL) {
Packit 40b132
	    for (si = 0; signerinfos[si] != NULL; si++) {
Packit 40b132
		signerinfo = signerinfos[si];
Packit 40b132
		for (ci = 0; ci < signerinfo->certList->len; ci++)
Packit 40b132
		    sigd->rawCerts[rci++] = &(signerinfo->certList->certs[ci]);
Packit 40b132
	    }
Packit 40b132
	}
Packit 40b132
Packit 40b132
	if (sigd->certs != NULL) {
Packit 40b132
	    for (ci = 0; sigd->certs[ci] != NULL; ci++)
Packit 40b132
		sigd->rawCerts[rci++] = &(sigd->certs[ci]->derCert);
Packit 40b132
	}
Packit 40b132
Packit 40b132
	if (sigd->certLists != NULL) {
Packit 40b132
	    for (cli = 0; sigd->certLists[cli] != NULL; cli++) {
Packit 40b132
		for (ci = 0; ci < sigd->certLists[cli]->len; ci++)
Packit 40b132
		    sigd->rawCerts[rci++] = &(sigd->certLists[cli]->certs[ci]);
Packit 40b132
	    }
Packit 40b132
	}
Packit 40b132
Packit 40b132
	sigd->rawCerts[rci] = NULL;
Packit 40b132
Packit 40b132
	/* this is a SET OF, so we need to sort them guys - we have the DER already, though */
Packit 40b132
	NSS_CMSArray_Sort((void **)sigd->rawCerts, NSS_CMSUtil_DERCompare, NULL, NULL);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    ret = SECSuccess;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    return ret;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_Decode_BeforeData(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    SECStatus rv;
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
    rv = NSS_CMSContentInfo_Private_Init(&sigd->contentInfo);
Packit 40b132
    if (rv != SECSuccess) {
Packit 40b132
	return SECFailure;
Packit 40b132
    }
Packit 40b132
    /* handle issue with Windows 2003 servers and kerberos */
Packit 40b132
    if (sigd->digestAlgorithms != NULL) {
Packit 40b132
	int i;
Packit 40b132
	for (i=0; sigd->digestAlgorithms[i] != NULL; i++) {
Packit 40b132
	    SECAlgorithmID *algid = sigd->digestAlgorithms[i];
Packit 40b132
	    SECOidTag senttag= SECOID_FindOIDTag(&algid->algorithm);
Packit 40b132
	    SECOidTag maptag = NSS_CMSUtil_MapSignAlgs(senttag);
Packit 40b132
Packit 40b132
	    if (maptag != senttag) {
Packit 40b132
		SECOidData *hashoid = SECOID_FindOIDByTag(maptag);
Packit 40b132
		rv = SECITEM_CopyItem(sigd->cmsg->poolp, &algid->algorithm 
Packit 40b132
							,&hashoid->oid);
Packit 40b132
		if (rv != SECSuccess) {
Packit 40b132
		    return rv;
Packit 40b132
		}
Packit 40b132
	    }
Packit 40b132
	}
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* set up the digests */
Packit 40b132
    if (sigd->digestAlgorithms != NULL && sigd->digests == NULL) {
Packit 40b132
	/* if digests are already there, do nothing */
Packit 40b132
	sigd->contentInfo.privateInfo->digcx = NSS_CMSDigestContext_StartMultiple(sigd->digestAlgorithms);
Packit 40b132
	if (sigd->contentInfo.privateInfo->digcx == NULL)
Packit 40b132
	    return SECFailure;
Packit 40b132
    }
Packit 40b132
    return SECSuccess;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_Decode_AfterData - do all the necessary things to a 
Packit 40b132
 *   SignedData after all the encapsulated data was passed through the decoder.
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_Decode_AfterData(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    SECStatus rv = SECSuccess;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* did we have digest calculation going on? */
Packit 40b132
    if (sigd->contentInfo.privateInfo && sigd->contentInfo.privateInfo->digcx) {
Packit 40b132
	rv = NSS_CMSDigestContext_FinishMultiple(sigd->contentInfo.privateInfo->digcx,
Packit 40b132
				       sigd->cmsg->poolp, &(sigd->digests));
Packit 40b132
	/* error set by NSS_CMSDigestContext_FinishMultiple */
Packit 40b132
	sigd->contentInfo.privateInfo->digcx = NULL;
Packit 40b132
    }
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_Decode_AfterEnd - do all the necessary things to a SignedData
Packit 40b132
 *     after all decoding is finished.
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_Decode_AfterEnd(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    NSSCMSSignerInfo **signerinfos = NULL;
Packit 40b132
    int i;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* set cmsg for all the signerinfos */
Packit 40b132
    signerinfos = sigd->signerInfos;
Packit 40b132
Packit 40b132
    /* set cmsg for all the signerinfos */
Packit 40b132
    if (signerinfos) {
Packit 40b132
	for (i = 0; signerinfos[i] != NULL; i++)
Packit 40b132
	    signerinfos[i]->cmsg = sigd->cmsg;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    return SECSuccess;
Packit 40b132
}
Packit 40b132
Packit 40b132
/* 
Packit 40b132
 * NSS_CMSSignedData_GetSignerInfos - retrieve the SignedData's signer list
Packit 40b132
 */
Packit 40b132
NSSCMSSignerInfo **
Packit 40b132
NSS_CMSSignedData_GetSignerInfos(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
    return sigd->signerInfos;
Packit 40b132
}
Packit 40b132
Packit 40b132
int
Packit 40b132
NSS_CMSSignedData_SignerInfoCount(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return 0;
Packit 40b132
    }
Packit 40b132
    return NSS_CMSArray_Count((void **)sigd->signerInfos);
Packit 40b132
}
Packit 40b132
Packit 40b132
NSSCMSSignerInfo *
Packit 40b132
NSS_CMSSignedData_GetSignerInfo(NSSCMSSignedData *sigd, int i)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
    return sigd->signerInfos[i];
Packit 40b132
}
Packit 40b132
Packit 40b132
/* 
Packit 40b132
 * NSS_CMSSignedData_GetDigestAlgs - retrieve the SignedData's digest algorithm list
Packit 40b132
 */
Packit 40b132
SECAlgorithmID **
Packit 40b132
NSS_CMSSignedData_GetDigestAlgs(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
    return sigd->digestAlgorithms;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_GetContentInfo - return pointer to this signedData's contentinfo
Packit 40b132
 */
Packit 40b132
NSSCMSContentInfo *
Packit 40b132
NSS_CMSSignedData_GetContentInfo(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
    return &(sigd->contentInfo);
Packit 40b132
}
Packit 40b132
Packit 40b132
/* 
Packit 40b132
 * NSS_CMSSignedData_GetCertificateList - retrieve the SignedData's certificate list
Packit 40b132
 */
Packit 40b132
SECItem **
Packit 40b132
NSS_CMSSignedData_GetCertificateList(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
    return sigd->rawCerts;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_ImportCerts(NSSCMSSignedData *sigd, CERTCertDBHandle *certdb,
Packit 40b132
				SECCertUsage certusage, PRBool keepcerts)
Packit 40b132
{
Packit 40b132
    int certcount;
Packit 40b132
    CERTCertificate **certArray = NULL;
Packit 40b132
    CERTCertList *certList = NULL;
Packit 40b132
    CERTCertListNode *node;
Packit 40b132
    SECStatus rv;
Packit 40b132
    SECItem **rawArray;
Packit 40b132
    int i;
Packit 40b132
    PRTime now;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    certcount = NSS_CMSArray_Count((void **)sigd->rawCerts);
Packit 40b132
Packit 40b132
    /* get the certs in the temp DB */
Packit 40b132
    rv = CERT_ImportCerts(certdb, certusage, certcount, sigd->rawCerts, 
Packit 40b132
			 &certArray, PR_FALSE, PR_FALSE, NULL);
Packit 40b132
    if (rv != SECSuccess) {
Packit 40b132
	goto loser;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* save the certs so they don't get destroyed */
Packit 40b132
    for (i=0; i < certcount; i++) {
Packit 40b132
	CERTCertificate *cert = certArray[i];
Packit 40b132
	if (cert)
Packit 40b132
            NSS_CMSSignedData_AddTempCertificate(sigd, cert);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (!keepcerts) {
Packit 40b132
	goto done;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* build a CertList for filtering */
Packit 40b132
    certList = CERT_NewCertList();
Packit 40b132
    if (certList == NULL) {
Packit 40b132
	rv = SECFailure;
Packit 40b132
	goto loser;
Packit 40b132
    }
Packit 40b132
    for (i=0; i < certcount; i++) {
Packit 40b132
	CERTCertificate *cert = certArray[i];
Packit 40b132
	if (cert)
Packit 40b132
	    cert = CERT_DupCertificate(cert);
Packit 40b132
	if (cert)
Packit 40b132
	    CERT_AddCertToListTail(certList,cert);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* filter out the certs we don't want */
Packit 40b132
    rv = CERT_FilterCertListByUsage(certList,certusage, PR_FALSE);
Packit 40b132
    if (rv != SECSuccess) {
Packit 40b132
	goto loser;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* go down the remaining list of certs and verify that they have
Packit 40b132
     * valid chains, then import them.
Packit 40b132
     */
Packit 40b132
    now = PR_Now();
Packit 40b132
    for (node = CERT_LIST_HEAD(certList) ; !CERT_LIST_END(node,certList);
Packit 40b132
						node= CERT_LIST_NEXT(node)) {
Packit 40b132
	CERTCertificateList *certChain;
Packit 40b132
Packit 40b132
	if (CERT_VerifyCert(certdb, node->cert, 
Packit 40b132
		PR_TRUE, certusage, now, NULL, NULL) != SECSuccess) {
Packit 40b132
	    continue;
Packit 40b132
	}
Packit 40b132
Packit 40b132
	certChain = CERT_CertChainFromCert(node->cert, certusage, PR_FALSE);
Packit 40b132
	if (!certChain) {
Packit 40b132
	    continue;
Packit 40b132
	}
Packit 40b132
Packit 40b132
	/*
Packit 40b132
	 * CertChain returns an array of SECItems, import expects an array of
Packit 40b132
	 * SECItem pointers. Create the SECItem Pointers from the array of
Packit 40b132
	 * SECItems.
Packit 40b132
 	 */
Packit 40b132
	rawArray = (SECItem **)PORT_Alloc(certChain->len*sizeof (SECItem *));
Packit 40b132
	if (!rawArray) {
Packit 40b132
	    CERT_DestroyCertificateList(certChain);
Packit 40b132
	    continue;
Packit 40b132
	}
Packit 40b132
	for (i=0; i < certChain->len; i++) {
Packit 40b132
	    rawArray[i] = &certChain->certs[i];
Packit 40b132
	}
Packit 40b132
	(void )CERT_ImportCerts(certdb, certusage, certChain->len, 
Packit 40b132
			rawArray,  NULL, keepcerts, PR_FALSE, NULL);
Packit 40b132
	PORT_Free(rawArray);
Packit 40b132
	CERT_DestroyCertificateList(certChain);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    rv = SECSuccess;
Packit 40b132
Packit 40b132
    /* XXX CRL handling */
Packit 40b132
Packit 40b132
done:
Packit 40b132
    if (sigd->signerInfos != NULL) {
Packit 40b132
	/* fill in all signerinfo's certs */
Packit 40b132
	for (i = 0; sigd->signerInfos[i] != NULL; i++)
Packit 40b132
	    (void)NSS_CMSSignerInfo_GetSigningCertificate(
Packit 40b132
						sigd->signerInfos[i], certdb);
Packit 40b132
    }
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    /* now free everything */
Packit 40b132
    if (certArray) {
Packit 40b132
	CERT_DestroyCertArray(certArray,certcount);
Packit 40b132
    }
Packit 40b132
    if (certList) {
Packit 40b132
	CERT_DestroyCertList(certList);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * XXX the digests need to be passed in BETWEEN the decoding and the verification in case
Packit 40b132
 *     of external signatures!
Packit 40b132
 */
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_VerifySignerInfo - check the signatures.
Packit 40b132
 *
Packit 40b132
 * The digests were either calculated during decoding (and are stored in the
Packit 40b132
 * signedData itself) or set after decoding using NSS_CMSSignedData_SetDigests.
Packit 40b132
 *
Packit 40b132
 * The verification checks if the signing cert is valid and has a trusted chain
Packit 40b132
 * for the purpose specified by "certusage".
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_VerifySignerInfo(NSSCMSSignedData *sigd, int i, 
Packit 40b132
			    CERTCertDBHandle *certdb, SECCertUsage certusage)
Packit 40b132
{
Packit 40b132
    NSSCMSSignerInfo *signerinfo;
Packit 40b132
    NSSCMSContentInfo *cinfo;
Packit 40b132
    SECOidData *algiddata;
Packit 40b132
    SECItem *contentType, *digest;
Packit 40b132
    SECOidTag oidTag;
Packit 40b132
    SECStatus rv;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    cinfo = &(sigd->contentInfo);
Packit 40b132
Packit 40b132
    signerinfo = sigd->signerInfos[i];
Packit 40b132
Packit 40b132
    /* verify certificate */
Packit 40b132
    rv = NSS_CMSSignerInfo_VerifyCertificate(signerinfo, certdb, certusage);
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	return rv; /* error is set */
Packit 40b132
Packit 40b132
    /* find digest and contentType for signerinfo */
Packit 40b132
    algiddata = NSS_CMSSignerInfo_GetDigestAlg(signerinfo);
Packit 40b132
    oidTag = algiddata ? algiddata->offset : SEC_OID_UNKNOWN;
Packit 40b132
    digest = NSS_CMSSignedData_GetDigestValue(sigd, oidTag);
Packit 40b132
    /* NULL digest is acceptable. */
Packit 40b132
    contentType = NSS_CMSContentInfo_GetContentTypeOID(cinfo);
Packit 40b132
    /* NULL contentType is acceptable. */
Packit 40b132
Packit 40b132
    /* now verify signature */
Packit 40b132
    rv = NSS_CMSSignerInfo_Verify(signerinfo, digest, contentType);
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_VerifyCertsOnly - verify the certs in a certs-only message
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_VerifyCertsOnly(NSSCMSSignedData *sigd, 
Packit 40b132
                                  CERTCertDBHandle *certdb, 
Packit 40b132
                                  SECCertUsage usage)
Packit 40b132
{
Packit 40b132
    CERTCertificate *cert;
Packit 40b132
    SECStatus rv = SECSuccess;
Packit 40b132
    int i;
Packit 40b132
    int count;
Packit 40b132
    PRTime now;
Packit 40b132
Packit 40b132
    if (!sigd || !certdb || !sigd->rawCerts) {
Packit 40b132
	PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
	return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    count = NSS_CMSArray_Count((void**)sigd->rawCerts);
Packit 40b132
    now = PR_Now();
Packit 40b132
    for (i=0; i < count; i++) {
Packit 40b132
	if (sigd->certs && sigd->certs[i]) {
Packit 40b132
	    cert = CERT_DupCertificate(sigd->certs[i]);
Packit 40b132
	} else {
Packit 40b132
	    cert = CERT_FindCertByDERCert(certdb, sigd->rawCerts[i]);
Packit 40b132
	    if (!cert) {
Packit 40b132
		rv = SECFailure;
Packit 40b132
		break;
Packit 40b132
	    }
Packit 40b132
	}
Packit 40b132
	rv |= CERT_VerifyCert(certdb, cert, PR_TRUE, usage, now, 
Packit 40b132
                              NULL, NULL);
Packit 40b132
	CERT_DestroyCertificate(cert);
Packit 40b132
    }
Packit 40b132
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_HasDigests - see if we have digests in place
Packit 40b132
 */
Packit 40b132
PRBool
Packit 40b132
NSS_CMSSignedData_HasDigests(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return PR_FALSE;
Packit 40b132
    }
Packit 40b132
    return (sigd->digests != NULL);
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_AddCertList(NSSCMSSignedData *sigd, CERTCertificateList *certlist)
Packit 40b132
{
Packit 40b132
    SECStatus rv;
Packit 40b132
Packit 40b132
    if (!sigd || !certlist) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* XXX memory?? a certlist has an arena of its own and is not refcounted!?!? */
Packit 40b132
    rv = NSS_CMSArray_Add(sigd->cmsg->poolp, (void ***)&(sigd->certLists), (void *)certlist);
Packit 40b132
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_AddCertChain - add cert and its entire chain to the set of certs 
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_AddCertChain(NSSCMSSignedData *sigd, CERTCertificate *cert)
Packit 40b132
{
Packit 40b132
    CERTCertificateList *certlist;
Packit 40b132
    SECCertUsage usage;
Packit 40b132
    SECStatus rv;
Packit 40b132
Packit 40b132
    usage = certUsageEmailSigner;
Packit 40b132
Packit 40b132
    if (!sigd || !cert) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* do not include root */
Packit 40b132
    certlist = CERT_CertChainFromCert(cert, usage, PR_FALSE);
Packit 40b132
    if (certlist == NULL)
Packit 40b132
	return SECFailure;
Packit 40b132
Packit 40b132
    rv = NSS_CMSSignedData_AddCertList(sigd, certlist);
Packit 40b132
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
extern SECStatus
Packit 40b132
NSS_CMSSignedData_AddTempCertificate(NSSCMSSignedData *sigd, CERTCertificate *cert)
Packit 40b132
{
Packit 40b132
    CERTCertificate *c;
Packit 40b132
    SECStatus rv;
Packit 40b132
Packit 40b132
    if (!sigd || !cert) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    c = CERT_DupCertificate(cert);
Packit 40b132
    rv = NSS_CMSArray_Add(sigd->cmsg->poolp, (void ***)&(sigd->tempCerts), (void *)c);
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_AddCertificate(NSSCMSSignedData *sigd, CERTCertificate *cert)
Packit 40b132
{
Packit 40b132
    CERTCertificate *c;
Packit 40b132
    SECStatus rv;
Packit 40b132
Packit 40b132
    if (!sigd || !cert) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    c = CERT_DupCertificate(cert);
Packit 40b132
    rv = NSS_CMSArray_Add(sigd->cmsg->poolp, (void ***)&(sigd->certs), (void *)c);
Packit 40b132
    return rv;
Packit 40b132
}
Packit 40b132
Packit 40b132
PRBool
Packit 40b132
NSS_CMSSignedData_ContainsCertsOrCrls(NSSCMSSignedData *sigd)
Packit 40b132
{
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return PR_FALSE;
Packit 40b132
    }
Packit 40b132
    if (sigd->rawCerts != NULL && sigd->rawCerts[0] != NULL)
Packit 40b132
	return PR_TRUE;
Packit 40b132
    else if (sigd->crls != NULL && sigd->crls[0] != NULL)
Packit 40b132
	return PR_TRUE;
Packit 40b132
    else
Packit 40b132
	return PR_FALSE;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_AddSignerInfo(NSSCMSSignedData *sigd,
Packit 40b132
				NSSCMSSignerInfo *signerinfo)
Packit 40b132
{
Packit 40b132
    void *mark;
Packit 40b132
    SECStatus rv;
Packit 40b132
    SECOidTag digestalgtag;
Packit 40b132
    PLArenaPool *poolp;
Packit 40b132
Packit 40b132
    if (!sigd || !signerinfo) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    poolp = sigd->cmsg->poolp;
Packit 40b132
Packit 40b132
    mark = PORT_ArenaMark(poolp);
Packit 40b132
Packit 40b132
    /* add signerinfo */
Packit 40b132
    rv = NSS_CMSArray_Add(poolp, (void ***)&(sigd->signerInfos), (void *)signerinfo);
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    /*
Packit 40b132
     * add empty digest
Packit 40b132
     * Empty because we don't have it yet. Either it gets created during encoding
Packit 40b132
     * (if the data is present) or has to be set externally.
Packit 40b132
     * XXX maybe pass it in optionally?
Packit 40b132
     */
Packit 40b132
    digestalgtag = NSS_CMSSignerInfo_GetDigestAlgTag(signerinfo);
Packit 40b132
    rv = NSS_CMSSignedData_SetDigestValue(sigd, digestalgtag, NULL);
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    /*
Packit 40b132
     * The last thing to get consistency would be adding the digest.
Packit 40b132
     */
Packit 40b132
Packit 40b132
    PORT_ArenaUnmark(poolp, mark);
Packit 40b132
    return SECSuccess;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    PORT_ArenaRelease (poolp, mark);
Packit 40b132
    return SECFailure;
Packit 40b132
}
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_SetDigests - set a signedData's digests member
Packit 40b132
 *
Packit 40b132
 * "digestalgs" - array of digest algorithm IDs
Packit 40b132
 * "digests"    - array of digests corresponding to the digest algorithms
Packit 40b132
 */
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_SetDigests(NSSCMSSignedData *sigd,
Packit 40b132
				SECAlgorithmID **digestalgs,
Packit 40b132
				SECItem **digests)
Packit 40b132
{
Packit 40b132
    int cnt, i, idx;
Packit 40b132
Packit 40b132
    if (!sigd || !digestalgs || !digests) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (sigd->digestAlgorithms == NULL) {
Packit 40b132
	PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
	return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* we assume that the digests array is just not there yet */
Packit 40b132
    PORT_Assert(sigd->digests == NULL);
Packit 40b132
    if (sigd->digests != NULL) {
Packit 40b132
	PORT_SetError(SEC_ERROR_LIBRARY_FAILURE);
Packit 40b132
	return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* now allocate one (same size as digestAlgorithms) */
Packit 40b132
    cnt = NSS_CMSArray_Count((void **)sigd->digestAlgorithms);
Packit 40b132
    sigd->digests = PORT_ArenaZAlloc(sigd->cmsg->poolp, (cnt + 1) * sizeof(SECItem *));
Packit 40b132
    if (sigd->digests == NULL) {
Packit 40b132
	PORT_SetError(SEC_ERROR_NO_MEMORY);
Packit 40b132
	return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    for (i = 0; sigd->digestAlgorithms[i] != NULL; i++) {
Packit 40b132
	/* try to find the sigd's i'th digest algorithm in the array we passed in */
Packit 40b132
	idx = NSS_CMSAlgArray_GetIndexByAlgID(digestalgs, sigd->digestAlgorithms[i]);
Packit 40b132
	if (idx < 0) {
Packit 40b132
	    PORT_SetError(SEC_ERROR_DIGEST_NOT_FOUND);
Packit 40b132
	    return SECFailure;
Packit 40b132
	}
Packit 40b132
	if (!digests[idx]) {
Packit 40b132
	    /* We have no digest for this algorithm, probably because it is 
Packit 40b132
	    ** unrecognized or unsupported.  We'll ignore this here.  If this 
Packit 40b132
	    ** digest is needed later, an error will be be generated then.
Packit 40b132
	    */
Packit 40b132
	    continue;
Packit 40b132
	}
Packit 40b132
Packit 40b132
	/* found it - now set it */
Packit 40b132
	if ((sigd->digests[i] = SECITEM_AllocItem(sigd->cmsg->poolp, NULL, 0)) == NULL ||
Packit 40b132
	    SECITEM_CopyItem(sigd->cmsg->poolp, sigd->digests[i], digests[idx]) != SECSuccess)
Packit 40b132
	{
Packit 40b132
	    PORT_SetError(SEC_ERROR_NO_MEMORY);
Packit 40b132
	    return SECFailure;
Packit 40b132
	}
Packit 40b132
    }
Packit 40b132
    return SECSuccess;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_SetDigestValue(NSSCMSSignedData *sigd,
Packit 40b132
				SECOidTag digestalgtag,
Packit 40b132
				SECItem *digestdata)
Packit 40b132
{
Packit 40b132
    SECItem *digest = NULL;
Packit 40b132
    PLArenaPool *poolp;
Packit 40b132
    void *mark;
Packit 40b132
    int n, cnt;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    poolp = sigd->cmsg->poolp;
Packit 40b132
Packit 40b132
    mark = PORT_ArenaMark(poolp);
Packit 40b132
Packit 40b132
   
Packit 40b132
    if (digestdata) {
Packit 40b132
        digest = (SECItem *) PORT_ArenaZAlloc(poolp,sizeof(SECItem));
Packit 40b132
Packit 40b132
	/* copy digestdata item to arena (in case we have it and are not only making room) */
Packit 40b132
	if (SECITEM_CopyItem(poolp, digest, digestdata) != SECSuccess)
Packit 40b132
	    goto loser;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    /* now allocate one (same size as digestAlgorithms) */
Packit 40b132
    if (sigd->digests == NULL) {
Packit 40b132
        cnt = NSS_CMSArray_Count((void **)sigd->digestAlgorithms);
Packit 40b132
        sigd->digests = PORT_ArenaZAlloc(sigd->cmsg->poolp, (cnt + 1) * sizeof(SECItem *));
Packit 40b132
        if (sigd->digests == NULL) {
Packit 40b132
	        PORT_SetError(SEC_ERROR_NO_MEMORY);
Packit 40b132
	        return SECFailure;
Packit 40b132
        }
Packit 40b132
    }
Packit 40b132
Packit 40b132
    n = -1;
Packit 40b132
    if (sigd->digestAlgorithms != NULL)
Packit 40b132
	n = NSS_CMSAlgArray_GetIndexByAlgTag(sigd->digestAlgorithms, digestalgtag);
Packit 40b132
Packit 40b132
    /* if not found, add a digest */
Packit 40b132
    if (n < 0) {
Packit 40b132
	if (NSS_CMSSignedData_AddDigest(poolp, sigd, digestalgtag, digest) != SECSuccess)
Packit 40b132
	    goto loser;
Packit 40b132
    } else {
Packit 40b132
	/* replace NULL pointer with digest item (and leak previous value) */
Packit 40b132
	sigd->digests[n] = digest;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    PORT_ArenaUnmark(poolp, mark);
Packit 40b132
    return SECSuccess;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    PORT_ArenaRelease(poolp, mark);
Packit 40b132
    return SECFailure;
Packit 40b132
}
Packit 40b132
Packit 40b132
SECStatus
Packit 40b132
NSS_CMSSignedData_AddDigest(PLArenaPool *poolp,
Packit 40b132
				NSSCMSSignedData *sigd,
Packit 40b132
				SECOidTag digestalgtag,
Packit 40b132
				SECItem *digest)
Packit 40b132
{
Packit 40b132
    SECAlgorithmID *digestalg;
Packit 40b132
    void *mark;
Packit 40b132
Packit 40b132
    if (!sigd || !poolp) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return SECFailure;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    mark = PORT_ArenaMark(poolp);
Packit 40b132
Packit 40b132
    digestalg = PORT_ArenaZAlloc(poolp, sizeof(SECAlgorithmID));
Packit 40b132
    if (digestalg == NULL)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    if (SECOID_SetAlgorithmID (poolp, digestalg, digestalgtag, NULL) != SECSuccess) /* no params */
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    if (NSS_CMSArray_Add(poolp, (void ***)&(sigd->digestAlgorithms), (void *)digestalg) != SECSuccess ||
Packit 40b132
	/* even if digest is NULL, add dummy to have same-size array */
Packit 40b132
	NSS_CMSArray_Add(poolp, (void ***)&(sigd->digests), (void *)digest) != SECSuccess)
Packit 40b132
    {
Packit 40b132
	goto loser;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    PORT_ArenaUnmark(poolp, mark);
Packit 40b132
    return SECSuccess;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    PORT_ArenaRelease(poolp, mark);
Packit 40b132
    return SECFailure;
Packit 40b132
}
Packit 40b132
Packit 40b132
/* XXX This function doesn't set the error code on failure. */
Packit 40b132
SECItem *
Packit 40b132
NSS_CMSSignedData_GetDigestValue(NSSCMSSignedData *sigd, SECOidTag digestalgtag)
Packit 40b132
{
Packit 40b132
    int n;
Packit 40b132
Packit 40b132
    if (!sigd) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    if (sigd->digestAlgorithms == NULL || sigd->digests == NULL) {
Packit 40b132
        PORT_SetError(SEC_ERROR_DIGEST_NOT_FOUND);
Packit 40b132
	return NULL;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    n = NSS_CMSAlgArray_GetIndexByAlgTag(sigd->digestAlgorithms, digestalgtag);
Packit 40b132
Packit 40b132
    return (n < 0) ? NULL : sigd->digests[n];
Packit 40b132
}
Packit 40b132
Packit 40b132
/* =============================================================================
Packit 40b132
 * Misc. utility functions
Packit 40b132
 */
Packit 40b132
Packit 40b132
/*
Packit 40b132
 * NSS_CMSSignedData_CreateCertsOnly - create a certs-only SignedData.
Packit 40b132
 *
Packit 40b132
 * cert          - base certificates that will be included
Packit 40b132
 * include_chain - if true, include the complete cert chain for cert
Packit 40b132
 *
Packit 40b132
 * More certs and chains can be added via AddCertificate and AddCertChain.
Packit 40b132
 *
Packit 40b132
 * An error results in a return value of NULL and an error set.
Packit 40b132
 *
Packit 40b132
 * XXXX CRLs
Packit 40b132
 */
Packit 40b132
NSSCMSSignedData *
Packit 40b132
NSS_CMSSignedData_CreateCertsOnly(NSSCMSMessage *cmsg, CERTCertificate *cert, PRBool include_chain)
Packit 40b132
{
Packit 40b132
    NSSCMSSignedData *sigd;
Packit 40b132
    void *mark;
Packit 40b132
    PLArenaPool *poolp;
Packit 40b132
    SECStatus rv;
Packit 40b132
Packit 40b132
    if (!cmsg || !cert) {
Packit 40b132
        PORT_SetError(SEC_ERROR_INVALID_ARGS);
Packit 40b132
        return NULL;
Packit 40b132
    }
Packit 40b132
Packit 40b132
    poolp = cmsg->poolp;
Packit 40b132
    mark = PORT_ArenaMark(poolp);
Packit 40b132
Packit 40b132
    sigd = NSS_CMSSignedData_Create(cmsg);
Packit 40b132
    if (sigd == NULL)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    /* no signerinfos, thus no digestAlgorithms */
Packit 40b132
Packit 40b132
    /* but certs */
Packit 40b132
    if (include_chain) {
Packit 40b132
	rv = NSS_CMSSignedData_AddCertChain(sigd, cert);
Packit 40b132
    } else {
Packit 40b132
	rv = NSS_CMSSignedData_AddCertificate(sigd, cert);
Packit 40b132
    }
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    /* RFC2630 5.2 sez:
Packit 40b132
     * In the degenerate case where there are no signers, the
Packit 40b132
     * EncapsulatedContentInfo value being "signed" is irrelevant.  In this
Packit 40b132
     * case, the content type within the EncapsulatedContentInfo value being
Packit 40b132
     * "signed" should be id-data (as defined in section 4), and the content
Packit 40b132
     * field of the EncapsulatedContentInfo value should be omitted.
Packit 40b132
     */
Packit 40b132
    rv = NSS_CMSContentInfo_SetContent_Data(cmsg, &(sigd->contentInfo), NULL, PR_TRUE);
Packit 40b132
    if (rv != SECSuccess)
Packit 40b132
	goto loser;
Packit 40b132
Packit 40b132
    PORT_ArenaUnmark(poolp, mark);
Packit 40b132
    return sigd;
Packit 40b132
Packit 40b132
loser:
Packit 40b132
    if (sigd)
Packit 40b132
	NSS_CMSSignedData_Destroy(sigd);
Packit 40b132
    PORT_ArenaRelease(poolp, mark);
Packit 40b132
    return NULL;
Packit 40b132
}
Packit 40b132
Packit 40b132
/* TODO:
Packit 40b132
 * NSS_CMSSignerInfo_GetReceiptRequest()
Packit 40b132
 * NSS_CMSSignedData_HasReceiptRequest()
Packit 40b132
 * easy way to iterate over signers
Packit 40b132
 */
Packit 40b132