⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 cms_smime.c

📁 OpenSSL 0.9.8k 最新版OpenSSL
💻 C
📖 第 1 页 / 共 2 页
字号:
/* crypto/cms/cms_smime.c *//* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL * project. *//* ==================================================================== * Copyright (c) 2008 The OpenSSL Project.  All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer.  * * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in *    the documentation and/or other materials provided with the *    distribution. * * 3. All advertising materials mentioning features or use of this *    software must display the following acknowledgment: *    "This product includes software developed by the OpenSSL Project *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" * * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to *    endorse or promote products derived from this software without *    prior written permission. For written permission, please contact *    licensing@OpenSSL.org. * * 5. Products derived from this software may not be called "OpenSSL" *    nor may "OpenSSL" appear in their names without prior written *    permission of the OpenSSL Project. * * 6. Redistributions of any form whatsoever must retain the following *    acknowledgment: *    "This product includes software developed by the OpenSSL Project *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" * * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== */#include "cryptlib.h"#include <openssl/asn1t.h>#include <openssl/x509.h>#include <openssl/x509v3.h>#include <openssl/err.h>#include <openssl/cms.h>#include "cms_lcl.h"static int cms_copy_content(BIO *out, BIO *in, unsigned int flags)	{	unsigned char buf[4096];	int r = 0, i;	BIO *tmpout = NULL;	if (out == NULL)		tmpout = BIO_new(BIO_s_null());	else if (flags & CMS_TEXT)		{		tmpout = BIO_new(BIO_s_mem());		BIO_set_mem_eof_return(tmpout, 0);		}	else		tmpout = out;	if(!tmpout)		{		CMSerr(CMS_F_CMS_COPY_CONTENT,ERR_R_MALLOC_FAILURE);		goto err;		}	/* Read all content through chain to process digest, decrypt etc */	for (;;)	{		i=BIO_read(in,buf,sizeof(buf));		if (i <= 0)			{			if (BIO_method_type(in) == BIO_TYPE_CIPHER)				{				if (!BIO_get_cipher_status(in))					goto err;				}			if (i < 0)				goto err;			break;			}						if (tmpout && (BIO_write(tmpout, buf, i) != i))			goto err;	}	if(flags & CMS_TEXT)		{		if(!SMIME_text(tmpout, out))			{			CMSerr(CMS_F_CMS_COPY_CONTENT,CMS_R_SMIME_TEXT_ERROR);			goto err;			}		}	r = 1;	err:	if (tmpout && (tmpout != out))		BIO_free(tmpout);	return r;	}static int check_content(CMS_ContentInfo *cms)	{	ASN1_OCTET_STRING **pos = CMS_get0_content(cms);	if (!pos || !*pos)		{		CMSerr(CMS_F_CHECK_CONTENT, CMS_R_NO_CONTENT);		return 0;		}	return 1;	}static void do_free_upto(BIO *f, BIO *upto)	{	if (upto)		{		BIO *tbio;		do 			{			tbio = BIO_pop(f);			BIO_free(f);			f = tbio;			}		while (f != upto);		}	else		BIO_free_all(f);	}int CMS_data(CMS_ContentInfo *cms, BIO *out, unsigned int flags)	{	BIO *cont;	int r;	if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_data)		{		CMSerr(CMS_F_CMS_DATA, CMS_R_TYPE_NOT_DATA);		return 0;		}	cont = CMS_dataInit(cms, NULL);	if (!cont)		return 0;	r = cms_copy_content(out, cont, flags);	BIO_free_all(cont);	return r;	}CMS_ContentInfo *CMS_data_create(BIO *in, unsigned int flags)	{	CMS_ContentInfo *cms;	cms = cms_Data_create();	if (!cms)		return NULL;	if (CMS_final(cms, in, NULL, flags))		return cms;	CMS_ContentInfo_free(cms);	return NULL;	}int CMS_digest_verify(CMS_ContentInfo *cms, BIO *dcont, BIO *out,							unsigned int flags)	{	BIO *cont;	int r;	if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_digest)		{		CMSerr(CMS_F_CMS_DIGEST_VERIFY, CMS_R_TYPE_NOT_DIGESTED_DATA);		return 0;		}	if (!dcont && !check_content(cms))		return 0;	cont = CMS_dataInit(cms, dcont);	if (!cont)		return 0;	r = cms_copy_content(out, cont, flags);	if (r)		r = cms_DigestedData_do_final(cms, cont, 1);	do_free_upto(cont, dcont);	return r;	}CMS_ContentInfo *CMS_digest_create(BIO *in, const EVP_MD *md,					unsigned int flags)	{	CMS_ContentInfo *cms;	if (!md)		md = EVP_sha1();	cms = cms_DigestedData_create(md);	if (!cms)		return NULL;	if(!(flags & CMS_DETACHED))		{		flags &= ~CMS_STREAM;		CMS_set_detached(cms, 0);		}	if ((flags & CMS_STREAM) || CMS_final(cms, in, NULL, flags))		return cms;	CMS_ContentInfo_free(cms);	return NULL;	}int CMS_EncryptedData_decrypt(CMS_ContentInfo *cms,				const unsigned char *key, size_t keylen,				BIO *dcont, BIO *out, unsigned int flags)	{	BIO *cont;	int r;	if (OBJ_obj2nid(CMS_get0_type(cms)) != NID_pkcs7_encrypted)		{		CMSerr(CMS_F_CMS_ENCRYPTEDDATA_DECRYPT,					CMS_R_TYPE_NOT_ENCRYPTED_DATA);		return 0;		}	if (!dcont && !check_content(cms))		return 0;	if (CMS_EncryptedData_set1_key(cms, NULL, key, keylen) <= 0)		return 0;	cont = CMS_dataInit(cms, dcont);	if (!cont)		return 0;	r = cms_copy_content(out, cont, flags);	do_free_upto(cont, dcont);	return r;	}CMS_ContentInfo *CMS_EncryptedData_encrypt(BIO *in, const EVP_CIPHER *cipher,					const unsigned char *key, size_t keylen,					unsigned int flags)	{	CMS_ContentInfo *cms;	if (!cipher)		{		CMSerr(CMS_F_CMS_ENCRYPTEDDATA_ENCRYPT, CMS_R_NO_CIPHER);		return NULL;		}	cms = CMS_ContentInfo_new();	if (!cms)		return NULL;	if (!CMS_EncryptedData_set1_key(cms, cipher, key, keylen))		return NULL;	if(!(flags & CMS_DETACHED))		{		flags &= ~CMS_STREAM;		CMS_set_detached(cms, 0);		}	if ((flags & (CMS_STREAM|CMS_PARTIAL))		|| CMS_final(cms, in, NULL, flags))		return cms;	CMS_ContentInfo_free(cms);	return NULL;	}static int cms_signerinfo_verify_cert(CMS_SignerInfo *si,					X509_STORE *store,					STACK_OF(X509) *certs,					STACK_OF(X509_CRL) *crls,					unsigned int flags)	{	X509_STORE_CTX ctx;	X509 *signer;	int i, j, r = 0;	CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);	if (!X509_STORE_CTX_init(&ctx, store, signer, certs))		{		CMSerr(CMS_F_CMS_SIGNERINFO_VERIFY_CERT,						CMS_R_STORE_INIT_ERROR);		goto err;		}	X509_STORE_CTX_set_default(&ctx, "smime_sign");	if (crls)		X509_STORE_CTX_set0_crls(&ctx, crls);	i = X509_verify_cert(&ctx);	if (i <= 0)		{		j = X509_STORE_CTX_get_error(&ctx);		CMSerr(CMS_F_CMS_SIGNERINFO_VERIFY_CERT,						CMS_R_CERTIFICATE_VERIFY_ERROR);		ERR_add_error_data(2, "Verify error:",					 X509_verify_cert_error_string(j));		goto err;		}	r = 1;	err:	X509_STORE_CTX_cleanup(&ctx);	return r;	}int CMS_verify(CMS_ContentInfo *cms, STACK_OF(X509) *certs,		 X509_STORE *store, BIO *dcont, BIO *out, unsigned int flags)	{	CMS_SignerInfo *si;	STACK_OF(CMS_SignerInfo) *sinfos;	STACK_OF(X509) *cms_certs = NULL;	STACK_OF(X509_CRL) *crls = NULL;	X509 *signer;	int i, scount = 0, ret = 0;	BIO *cmsbio = NULL, *tmpin = NULL;	if (!dcont && !check_content(cms))		return 0;	/* Attempt to find all signer certificates */	sinfos = CMS_get0_SignerInfos(cms);	if (sk_CMS_SignerInfo_num(sinfos) <= 0)		{		CMSerr(CMS_F_CMS_VERIFY, CMS_R_NO_SIGNERS);		goto err;		}	for (i = 0; i < sk_CMS_SignerInfo_num(sinfos); i++)		{		si = sk_CMS_SignerInfo_value(sinfos, i);		CMS_SignerInfo_get0_algs(si, NULL, &signer, NULL, NULL);		if (signer)			scount++;		}	if (scount != sk_CMS_SignerInfo_num(sinfos))		scount += CMS_set1_signers_certs(cms, certs, flags);	if (scount != sk_CMS_SignerInfo_num(sinfos))		{		CMSerr(CMS_F_CMS_VERIFY, CMS_R_SIGNER_CERTIFICATE_NOT_FOUND);		goto err;		}	/* Attempt to verify all signers certs */	if (!(flags & CMS_NO_SIGNER_CERT_VERIFY))		{		cms_certs = CMS_get1_certs(cms);		if (!(flags & CMS_NOCRL))			crls = CMS_get1_crls(cms);		for (i = 0; i < sk_CMS_SignerInfo_num(sinfos); i++)			{			si = sk_CMS_SignerInfo_value(sinfos, i);			if (!cms_signerinfo_verify_cert(si, store,							cms_certs, crls, flags))				goto err;			}		}	/* Attempt to verify all SignerInfo signed attribute signatures */	if (!(flags & CMS_NO_ATTR_VERIFY))		{		for (i = 0; i < sk_CMS_SignerInfo_num(sinfos); i++)			{			si = sk_CMS_SignerInfo_value(sinfos, i);			if (CMS_signed_get_attr_count(si) < 0)				continue;			if (CMS_SignerInfo_verify(si) <= 0)				goto err;			}		}	/* Performance optimization: if the content is a memory BIO then	 * store its contents in a temporary read only memory BIO. This	 * avoids potentially large numbers of slow copies of data which will	 * occur when reading from a read write memory BIO when signatures	 * are calculated.	 */	if (dcont && (BIO_method_type(dcont) == BIO_TYPE_MEM))		{		char *ptr;		long len;		len = BIO_get_mem_data(dcont, &ptr);		tmpin = BIO_new_mem_buf(ptr, len);		if (tmpin == NULL)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -