⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 pk7_doit.c

📁 openssl是ssl的开源项目
💻 C
📖 第 1 页 / 共 2 页
字号:
/* crypto/pkcs7/pk7_doit.c *//* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. *  * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.  The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code; not just the SSL code.  The SSL documentation * included with this distribution is covered by the same copyright terms * except that the holder is Tim Hudson (tjh@cryptsoft.com). *  * Copyright remains Eric Young's, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package. *  * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software *    must display the following acknowledgement: *    "This product includes cryptographic software written by *     Eric Young (eay@cryptsoft.com)" *    The word 'cryptographic' can be left out if the rouines from the library *    being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from  *    the apps directory (application code) you must include an acknowledgement: *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" *  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. *  * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed.  i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] */#include <stdio.h>#include "cryptlib.h"#include "rand.h"#include "objects.h"#include "x509.h"static int add_attribute(STACK **sk, int nid, int atrtype, char *value);static ASN1_TYPE *get_attribute(STACK *sk, int nid);#if 1BIO *PKCS7_dataInit(p7,bio)PKCS7 *p7;BIO *bio;	{	int i,j;	BIO *out=NULL,*btmp=NULL;	X509_ALGOR *xa;	EVP_MD *evp_md;	EVP_CIPHER *evp_cipher=NULL;	STACK *md_sk=NULL,*rsk=NULL;	X509_ALGOR *xalg=NULL;	PKCS7_RECIP_INFO *ri=NULL;	EVP_PKEY *pkey;	i=OBJ_obj2nid(p7->type);	p7->state=PKCS7_S_HEADER;	switch (i)		{	case NID_pkcs7_signed:		md_sk=p7->d.sign->md_algs;		break;	case NID_pkcs7_signedAndEnveloped:		rsk=p7->d.signed_and_enveloped->recipientinfo;		md_sk=p7->d.signed_and_enveloped->md_algs;		evp_cipher=EVP_get_cipherbyname(OBJ_nid2sn(OBJ_obj2nid(p7->d.signed_and_enveloped->enc_data->algorithm->algorithm)));		if (evp_cipher == NULL)			{			PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);			goto err;			}		xalg=p7->d.signed_and_enveloped->enc_data->algorithm;		break;	case NID_pkcs7_enveloped:		rsk=p7->d.enveloped->recipientinfo;		evp_cipher=EVP_get_cipherbyname(OBJ_nid2sn(OBJ_obj2nid(p7->d.enveloped->enc_data->algorithm->algorithm)));		if (evp_cipher == NULL)			{			PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);			goto err;			}		xalg=p7->d.enveloped->enc_data->algorithm;		break;	default:		PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNSUPPORTED_CONTENT_TYPE);	        goto err;		}	if (md_sk != NULL)		{		for (i=0; i<sk_num(md_sk); i++)			{			xa=(X509_ALGOR *)sk_value(md_sk,i);			if ((btmp=BIO_new(BIO_f_md())) == NULL)				{				PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_BIO_LIB);				goto err;				}			j=OBJ_obj2nid(xa->algorithm);			evp_md=EVP_get_digestbyname(OBJ_nid2sn(j));			if (evp_md == NULL)				{				PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_UNKNOWN_DIGEST_TYPE);				goto err;				}			BIO_set_md(btmp,evp_md);			if (out == NULL)				out=btmp;			else				BIO_push(out,btmp);			btmp=NULL;			}		}	if (evp_cipher != NULL)		{		unsigned char key[EVP_MAX_KEY_LENGTH];		unsigned char iv[EVP_MAX_IV_LENGTH];		int keylen,ivlen;		int jj,max;		unsigned char *tmp;		if ((btmp=BIO_new(BIO_f_cipher())) == NULL)			{			PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_BIO_LIB);			goto err;			}		keylen=EVP_CIPHER_key_length(evp_cipher);		ivlen=EVP_CIPHER_iv_length(evp_cipher);		if (ivlen > 0)			{			ASN1_OCTET_STRING *os;			RAND_bytes(iv,ivlen);			os=ASN1_OCTET_STRING_new();			ASN1_OCTET_STRING_set(os,iv,ivlen);/* XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX this needs to change */			if (xalg->parameter == NULL)				xalg->parameter=ASN1_TYPE_new();			ASN1_TYPE_set(xalg->parameter,V_ASN1_OCTET_STRING,				(char *)os);			}		RAND_bytes(key,keylen);		/* Lets do the pub key stuff :-) */		max=0;		for (i=0; i<sk_num(rsk); i++)			{			ri=(PKCS7_RECIP_INFO *)sk_value(rsk,i);			if (ri->cert == NULL)				{				PKCS7err(PKCS7_F_PKCS7_DATAINIT,PKCS7_R_MISSING_CERIPEND_INFO);				goto err;				}			pkey=X509_get_pubkey(ri->cert);			jj=EVP_PKEY_size(pkey);			if (max < jj) max=jj;			}		if ((tmp=(unsigned char *)Malloc(max)) == NULL)			{			PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_MALLOC_FAILURE);			goto err;			}		for (i=0; i<sk_num(rsk); i++)			{			ri=(PKCS7_RECIP_INFO *)sk_value(rsk,i);			pkey=X509_get_pubkey(ri->cert);			jj=EVP_PKEY_encrypt(tmp,key,keylen,pkey);			if (jj <= 0)				{				PKCS7err(PKCS7_F_PKCS7_DATAINIT,ERR_R_EVP_LIB);				Free(tmp);				goto err;				}			ASN1_OCTET_STRING_set(ri->enc_key,tmp,jj);			}		Free(tmp);		BIO_set_cipher(btmp,evp_cipher,key,iv,1);		if (out == NULL)			out=btmp;		else			BIO_push(out,btmp);		btmp=NULL;		}	if (bio == NULL) /* ??????????? */		{		if (p7->detached)			bio=BIO_new(BIO_s_null());		else			{			bio=BIO_new(BIO_s_mem());			/* We need to set this so that when we have read all			 * the data, the encrypt BIO, if present, will read			 * EOF and encode the last few bytes */			BIO_set_mem_eof_return(bio,0);			if (PKCS7_type_is_signed(p7) &&				PKCS7_type_is_data(p7->d.sign->contents))				{				ASN1_OCTET_STRING *os;				os=p7->d.sign->contents->d.data;				if (os->length > 0)					BIO_write(bio,(char *)os->data,						os->length);				}			}		}	BIO_push(out,bio);	bio=NULL;	if (0)		{err:		if (out != NULL)			BIO_free_all(out);		if (btmp != NULL)			BIO_free_all(btmp);		out=NULL;		}	return(out);	}/* int */BIO *PKCS7_dataDecode(p7,pkey,in_bio,xs)PKCS7 *p7;EVP_PKEY *pkey;BIO *in_bio;X509_STORE *xs;	{	int i,j;	BIO *out=NULL,*btmp=NULL,*etmp=NULL,*bio=NULL;	char *tmp=NULL;	X509_ALGOR *xa;	ASN1_OCTET_STRING *data_body=NULL;	EVP_MD *evp_md;	EVP_CIPHER *evp_cipher=NULL;	EVP_CIPHER_CTX *evp_ctx=NULL;	X509_ALGOR *enc_alg=NULL;	STACK *md_sk=NULL,*rsk=NULL;	X509_ALGOR *xalg=NULL;	PKCS7_RECIP_INFO *ri=NULL;/*	EVP_PKEY *pkey; */#if 0	X509_STORE_CTX s_ctx;#endif	i=OBJ_obj2nid(p7->type);	p7->state=PKCS7_S_HEADER;	switch (i)		{	case NID_pkcs7_signed:		data_body=p7->d.sign->contents->d.data;		md_sk=p7->d.sign->md_algs;		break;	case NID_pkcs7_signedAndEnveloped:		rsk=p7->d.signed_and_enveloped->recipientinfo;		md_sk=p7->d.signed_and_enveloped->md_algs;		data_body=p7->d.signed_and_enveloped->enc_data->enc_data;		enc_alg=p7->d.signed_and_enveloped->enc_data->algorithm;		evp_cipher=EVP_get_cipherbyname(OBJ_nid2sn(OBJ_obj2nid(enc_alg->algorithm)));		if (evp_cipher == NULL)			{			PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);			goto err;			}		xalg=p7->d.signed_and_enveloped->enc_data->algorithm;		break;	case NID_pkcs7_enveloped:		rsk=p7->d.enveloped->recipientinfo;		enc_alg=p7->d.enveloped->enc_data->algorithm;		data_body=p7->d.enveloped->enc_data->enc_data;		evp_cipher=EVP_get_cipherbyname(OBJ_nid2sn(OBJ_obj2nid(enc_alg->algorithm)));		if (evp_cipher == NULL)			{			PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,PKCS7_R_UNSUPPORTED_CIPHER_TYPE);			goto err;			}		xalg=p7->d.enveloped->enc_data->algorithm;		break;	default:		PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,PKCS7_R_UNSUPPORTED_CONTENT_TYPE);	        goto err;		}	/* We will be checking the signature */	if (md_sk != NULL)		{		for (i=0; i<sk_num(md_sk); i++)			{			xa=(X509_ALGOR *)sk_value(md_sk,i);			if ((btmp=BIO_new(BIO_f_md())) == NULL)				{				PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,ERR_R_BIO_LIB);				goto err;				}			j=OBJ_obj2nid(xa->algorithm);			evp_md=EVP_get_digestbyname(OBJ_nid2sn(j));			if (evp_md == NULL)				{				PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,PKCS7_R_UNKNOWN_DIGEST_TYPE);				goto err;				}			BIO_set_md(btmp,evp_md);			if (out == NULL)				out=btmp;			else				BIO_push(out,btmp);			btmp=NULL;			}		}	if (evp_cipher != NULL)		{#if 0		unsigned char key[EVP_MAX_KEY_LENGTH];		unsigned char iv[EVP_MAX_IV_LENGTH];		unsigned char *p;		int keylen,ivlen;		int max;		X509_OBJECT ret;#endif		int jj;		if ((etmp=BIO_new(BIO_f_cipher())) == NULL)			{			PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,ERR_R_BIO_LIB);			goto err;			}		/* It was encrypted, we need to decrypt the secret key		 * with the private key */		/* We need to find a private key for one of the people in the		 * recipentinfo list */		if (rsk == NULL)			return(NULL);		ri=(PKCS7_RECIP_INFO *)sk_value(rsk,0);#if 0		X509_STORE_CTX_init(&s_ctx,xs,NULL,NULL);		for (i=0; i<sk_num(rsk); i++)			{			ri=(PKCS7_RECIP_INFO *)sk_value(rsk,i);			uf (X509_STORE_get_by_issuer_serial(&s_ctx,				X509_LU_PKEY,				ri->issuer_and_serial->issuer,				ri->issuer_and_serial->serial,				&ret))				break;			ri=NULL;			}		if (ri == NULL) return(NULL);			pkey=ret.data.pkey;#endif		if (pkey == NULL)			{			return(NULL);			}		jj=EVP_PKEY_size(pkey);		tmp=Malloc(jj+10);		if (tmp == NULL)			{			PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,ERR_R_MALLOC_FAILURE);			goto err;			}		jj=EVP_PKEY_decrypt((unsigned char *)tmp,			ASN1_STRING_data(ri->enc_key),			ASN1_STRING_length(ri->enc_key),			pkey);		if (jj <= 0)			{			PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,ERR_R_EVP_LIB);			goto err;			}		evp_ctx=NULL;		BIO_get_cipher_ctx(etmp,&evp_ctx);		EVP_CipherInit(evp_ctx,evp_cipher,NULL,NULL,0);		if (EVP_CIPHER_asn1_to_param(evp_ctx,enc_alg->parameter) < 0)			return(NULL);		if (jj != EVP_CIPHER_CTX_key_length(evp_ctx))			{			PKCS7err(PKCS7_F_PKCS7_SIGNENVELOPEDECRYPT,PKCS7_R_DECRYPTED_KEY_IS_WRONG_LENGTH);			goto err;			}		EVP_CipherInit(evp_ctx,NULL,(unsigned char *)tmp,NULL,0);		memset(tmp,0,jj);		if (out == NULL)			out=etmp;		else			BIO_push(out,etmp);		etmp=NULL;		}#if 1	if (p7->detached || (in_bio != NULL))		{		bio=in_bio;		}	else 		{		bio=BIO_new(BIO_s_mem());		/* We need to set this so that when we have read all		 * the data, the encrypt BIO, if present, will read		 * EOF and encode the last few bytes */		BIO_set_mem_eof_return(bio,0);		if (data_body->length > 0)			BIO_write(bio,(char *)data_body->data,data_body->length);		}	BIO_push(out,bio);	bio=NULL;#endif	if (0)		{err:		if (out != NULL) BIO_free_all(out);		if (btmp != NULL) BIO_free_all(btmp);		if (etmp != NULL) BIO_free_all(etmp);		if (bio != NULL) BIO_free_all(bio);		out=NULL;		}	if (tmp != NULL)		Free(tmp);	return(out);	}#endifint PKCS7_dataFinal(p7,bio)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -