2134e0974afc82d86030cfd404261ab5861cb021
[openssl.git] / crypto / asn1 / p7_lib.c
1 /* crypto/asn1/p7_lib.c */
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3  * All rights reserved.
4  *
5  * This package is an SSL implementation written
6  * by Eric Young (eay@cryptsoft.com).
7  * The implementation was written so as to conform with Netscapes SSL.
8  * 
9  * This library is free for commercial and non-commercial use as long as
10  * the following conditions are aheared to.  The following conditions
11  * apply to all code found in this distribution, be it the RC4, RSA,
12  * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
13  * included with this distribution is covered by the same copyright terms
14  * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15  * 
16  * Copyright remains Eric Young's, and as such any Copyright notices in
17  * the code are not to be removed.
18  * If this package is used in a product, Eric Young should be given attribution
19  * as the author of the parts of the library used.
20  * This can be in the form of a textual message at program startup or
21  * in documentation (online or textual) provided with the package.
22  * 
23  * Redistribution and use in source and binary forms, with or without
24  * modification, are permitted provided that the following conditions
25  * are met:
26  * 1. Redistributions of source code must retain the copyright
27  *    notice, this list of conditions and the following disclaimer.
28  * 2. Redistributions in binary form must reproduce the above copyright
29  *    notice, this list of conditions and the following disclaimer in the
30  *    documentation and/or other materials provided with the distribution.
31  * 3. All advertising materials mentioning features or use of this software
32  *    must display the following acknowledgement:
33  *    "This product includes cryptographic software written by
34  *     Eric Young (eay@cryptsoft.com)"
35  *    The word 'cryptographic' can be left out if the rouines from the library
36  *    being used are not cryptographic related :-).
37  * 4. If you include any Windows specific code (or a derivative thereof) from 
38  *    the apps directory (application code) you must include an acknowledgement:
39  *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40  * 
41  * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51  * SUCH DAMAGE.
52  * 
53  * The licence and distribution terms for any publically available version or
54  * derivative of this code cannot be changed.  i.e. this code cannot simply be
55  * copied and put under another distribution licence
56  * [including the GNU Public Licence.]
57  */
58
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include "asn1_mac.h"
62 #include "objects.h"
63
64 /* ASN1err(ASN1_F_D2I_PKCS7,ASN1_R_BAD_PKCS7_CONTENT);
65  * ASN1err(ASN1_F_I2D_PKCS7,ASN1_R_BAD_PKCS7_TYPE);
66  * ASN1err(ASN1_F_PKCS7_NEW,ASN1_R_BAD_PKCS7_TYPE);
67  */
68
69 int i2d_PKCS7(a,pp)
70 PKCS7 *a;
71 unsigned char **pp;
72         {
73         M_ASN1_I2D_vars(a);
74
75         if (a->asn1 != NULL)
76                 {
77                 if (pp == NULL)
78                         return((int)a->length);
79                 memcpy(*pp,a->asn1,(int)a->length);
80                 *pp+=a->length;
81                 return((int)a->length);
82                 }
83
84         ret+=4; /* sequence, BER header plus '0 0' end padding */
85         M_ASN1_I2D_len(a->type,i2d_ASN1_OBJECT);
86         if (a->d.ptr != NULL)
87                 {
88                 ret+=4; /* explicit tag [ 0 ] BER plus '0 0' */
89                 switch (OBJ_obj2nid(a->type))
90                         {
91                 case NID_pkcs7_data:
92                         M_ASN1_I2D_len(a->d.data,i2d_ASN1_OCTET_STRING);
93                         break;
94                 case NID_pkcs7_signed:
95                         M_ASN1_I2D_len(a->d.sign,i2d_PKCS7_SIGNED);
96                         break;
97                 case NID_pkcs7_enveloped:
98                         M_ASN1_I2D_len(a->d.enveloped,i2d_PKCS7_ENVELOPE);
99                         break;
100                 case NID_pkcs7_signedAndEnveloped:
101                         M_ASN1_I2D_len(a->d.signed_and_enveloped,
102                                 i2d_PKCS7_SIGN_ENVELOPE);
103                         break;
104                 case NID_pkcs7_digest:
105                         M_ASN1_I2D_len(a->d.digest,i2d_PKCS7_DIGEST);
106                         break;
107                 case NID_pkcs7_encrypted:
108                         M_ASN1_I2D_len(a->d.encrypted,i2d_PKCS7_ENCRYPT);
109                         break;
110                 default:
111                         break;
112                         }
113                 }
114         r=ret;
115         if (pp == NULL) return(r);
116         p= *pp;
117         M_ASN1_I2D_INF_seq_start(V_ASN1_SEQUENCE,V_ASN1_UNIVERSAL);
118         M_ASN1_I2D_put(a->type,i2d_ASN1_OBJECT);
119
120         if (a->d.ptr != NULL)
121                 {
122                 M_ASN1_I2D_INF_seq_start(0,V_ASN1_CONTEXT_SPECIFIC);
123                 switch (OBJ_obj2nid(a->type))
124                         {
125                 case NID_pkcs7_data:
126                         M_ASN1_I2D_put(a->d.data,i2d_ASN1_OCTET_STRING);
127                         break;
128                 case NID_pkcs7_signed:
129                         M_ASN1_I2D_put(a->d.sign,i2d_PKCS7_SIGNED);
130                         break;
131                 case NID_pkcs7_enveloped:
132                         M_ASN1_I2D_put(a->d.enveloped,i2d_PKCS7_ENVELOPE);
133                         break;
134                 case NID_pkcs7_signedAndEnveloped:
135                         M_ASN1_I2D_put(a->d.signed_and_enveloped,
136                                 i2d_PKCS7_SIGN_ENVELOPE);
137                         break;
138                 case NID_pkcs7_digest:
139                         M_ASN1_I2D_put(a->d.digest,i2d_PKCS7_DIGEST);
140                         break;
141                 case NID_pkcs7_encrypted:
142                         M_ASN1_I2D_put(a->d.encrypted,i2d_PKCS7_ENCRYPT);
143                         break;
144                 default:
145                         break;
146                         }
147                 M_ASN1_I2D_INF_seq_end();
148                 }
149         M_ASN1_I2D_INF_seq_end();
150         M_ASN1_I2D_finish();
151         }
152
153 PKCS7 *d2i_PKCS7(a,pp,length)
154 PKCS7 **a;
155 unsigned char **pp;
156 long length;
157         {
158         M_ASN1_D2I_vars(a,PKCS7 *,PKCS7_new);
159
160         if ((a != NULL) && ((*a) != NULL))
161                 {
162                 if ((*a)->asn1 != NULL)
163                         {
164                         Free((char *)(*a)->asn1);
165                         (*a)->asn1=NULL;
166                         }
167                 (*a)->length=0;
168                 }
169
170         M_ASN1_D2I_Init();
171         M_ASN1_D2I_start_sequence();
172         M_ASN1_D2I_get(ret->type,d2i_ASN1_OBJECT);
173         if (!M_ASN1_D2I_end_sequence())
174                 {
175                 int Tinf,Ttag,Tclass;
176                 long Tlen;
177
178                 if (M_ASN1_next != (V_ASN1_CONSTRUCTED|
179                         V_ASN1_CONTEXT_SPECIFIC|0))
180                         {
181                         c.error=ASN1_R_BAD_PKCS7_CONTENT;
182                         goto err;
183                         }
184
185                 ret->detached=0;
186
187                 c.q=c.p;
188                 Tinf=ASN1_get_object(&c.p,&Tlen,&Ttag,&Tclass,
189                         (c.inf & 1)?(length+ *pp-c.q):c.slen);
190                 if (Tinf & 0x80) goto err;
191                 c.slen-=(c.p-c.q);
192
193                 switch (OBJ_obj2nid(ret->type))
194                         {
195                 case NID_pkcs7_data:
196                         M_ASN1_D2I_get(ret->d.data,d2i_ASN1_OCTET_STRING);
197                         break;
198                 case NID_pkcs7_signed:
199                         M_ASN1_D2I_get(ret->d.sign,d2i_PKCS7_SIGNED);
200                         if (ret->d.sign->contents->d.ptr == NULL)
201                                 ret->detached=1;
202                         break;
203                 case NID_pkcs7_enveloped:
204                         M_ASN1_D2I_get(ret->d.enveloped,d2i_PKCS7_ENVELOPE);
205                         break;
206                 case NID_pkcs7_signedAndEnveloped:
207                         M_ASN1_D2I_get(ret->d.signed_and_enveloped,
208                                 d2i_PKCS7_SIGN_ENVELOPE);
209                         break;
210                 case NID_pkcs7_digest:
211                         M_ASN1_D2I_get(ret->d.digest,d2i_PKCS7_DIGEST);
212                         break;
213                 case NID_pkcs7_encrypted:
214                         M_ASN1_D2I_get(ret->d.encrypted,d2i_PKCS7_ENCRYPT);
215                         break;
216                 default:
217                         c.error=ASN1_R_BAD_PKCS7_TYPE;
218                         goto err;
219                         break;
220                         }
221                 if (Tinf == (1|V_ASN1_CONSTRUCTED))
222                         {
223                         if (!ASN1_check_infinite_end(&c.p,c.slen))
224                                 {
225                                 c.error=ASN1_R_MISSING_EOS;
226                                 goto err;
227                                 }
228                         }
229                 }
230         else
231                 ret->detached=1;
232                 
233         M_ASN1_D2I_Finish(a,PKCS7_free,ASN1_F_D2I_PKCS7);
234         }
235
236 PKCS7 *PKCS7_new()
237         {
238         PKCS7 *ret=NULL;
239
240         M_ASN1_New_Malloc(ret,PKCS7);
241         ret->type=ASN1_OBJECT_new();
242         ret->asn1=NULL;
243         ret->length=0;
244         ret->detached=0;
245         ret->d.ptr=NULL;
246         return(ret);
247         M_ASN1_New_Error(ASN1_F_PKCS7_NEW);
248         }
249
250 void PKCS7_free(a)
251 PKCS7 *a;
252         {
253         if (a == NULL) return;
254
255         PKCS7_content_free(a);
256         if (a->type != NULL)
257                 {
258                 ASN1_OBJECT_free(a->type);
259                 }
260         Free((char *)(char *)a);
261         }
262
263 void PKCS7_content_free(a)
264 PKCS7 *a;
265         {
266         if (a->asn1 != NULL) Free((char *)a->asn1);
267
268         if (a->d.ptr != NULL)
269                 {
270                 if (a->type == NULL) return;
271
272                 switch (OBJ_obj2nid(a->type))
273                         {
274                 case NID_pkcs7_data:
275                         ASN1_OCTET_STRING_free(a->d.data);
276                         break;
277                 case NID_pkcs7_signed:
278                         PKCS7_SIGNED_free(a->d.sign);
279                         break;
280                 case NID_pkcs7_enveloped:
281                         PKCS7_ENVELOPE_free(a->d.enveloped);
282                         break;
283                 case NID_pkcs7_signedAndEnveloped:
284                         PKCS7_SIGN_ENVELOPE_free(a->d.signed_and_enveloped);
285                         break;
286                 case NID_pkcs7_digest:
287                         PKCS7_DIGEST_free(a->d.digest);
288                         break;
289                 case NID_pkcs7_encrypted:
290                         PKCS7_ENCRYPT_free(a->d.encrypted);
291                         break;
292                 default:
293                         /* MEMORY LEAK */
294                         break;
295                         }
296                 }
297         a->d.ptr=NULL;
298         }
299