2 * Copyright 1999-2020 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
11 #include "internal/cryptlib.h"
12 #include <openssl/pkcs12.h>
13 #include "p12_local.h"
15 #ifndef OPENSSL_NO_DEPRECATED_1_1_0
16 ASN1_TYPE *PKCS12_get_attr(const PKCS12_SAFEBAG *bag, int attr_nid)
18 return PKCS12_get_attr_gen(bag->attrib, attr_nid);
22 const ASN1_TYPE *PKCS12_SAFEBAG_get0_attr(const PKCS12_SAFEBAG *bag,
25 return PKCS12_get_attr_gen(bag->attrib, attr_nid);
28 ASN1_TYPE *PKCS8_get_attr(PKCS8_PRIV_KEY_INFO *p8, int attr_nid)
30 return PKCS12_get_attr_gen(PKCS8_pkey_get0_attrs(p8), attr_nid);
33 const PKCS8_PRIV_KEY_INFO *PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag)
35 if (PKCS12_SAFEBAG_get_nid(bag) != NID_keyBag)
37 return bag->value.keybag;
40 const X509_SIG *PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag)
42 if (OBJ_obj2nid(bag->type) != NID_pkcs8ShroudedKeyBag)
44 return bag->value.shkeybag;
47 const STACK_OF(PKCS12_SAFEBAG) *
48 PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag)
50 if (OBJ_obj2nid(bag->type) != NID_safeContentsBag)
52 return bag->value.safes;
55 const ASN1_OBJECT *PKCS12_SAFEBAG_get0_type(const PKCS12_SAFEBAG *bag)
60 int PKCS12_SAFEBAG_get_nid(const PKCS12_SAFEBAG *bag)
62 return OBJ_obj2nid(bag->type);
65 int PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag)
67 int btype = PKCS12_SAFEBAG_get_nid(bag);
69 if (btype != NID_certBag && btype != NID_crlBag && btype != NID_secretBag)
71 return OBJ_obj2nid(bag->value.bag->type);
74 const ASN1_OBJECT *PKCS12_SAFEBAG_get0_bag_type(const PKCS12_SAFEBAG *bag)
76 return bag->value.bag->type;
79 const ASN1_TYPE *PKCS12_SAFEBAG_get0_bag_obj(const PKCS12_SAFEBAG *bag)
81 return bag->value.bag->value.other;
84 X509 *PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag)
86 if (PKCS12_SAFEBAG_get_nid(bag) != NID_certBag)
88 if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Certificate)
90 return ASN1_item_unpack(bag->value.bag->value.octet,
91 ASN1_ITEM_rptr(X509));
94 X509_CRL *PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag)
96 if (PKCS12_SAFEBAG_get_nid(bag) != NID_crlBag)
98 if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Crl)
100 return ASN1_item_unpack(bag->value.bag->value.octet,
101 ASN1_ITEM_rptr(X509_CRL));
104 PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_cert(X509 *x509)
106 return PKCS12_item_pack_safebag(x509, ASN1_ITEM_rptr(X509),
107 NID_x509Certificate, NID_certBag);
110 PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_crl(X509_CRL *crl)
112 return PKCS12_item_pack_safebag(crl, ASN1_ITEM_rptr(X509_CRL),
113 NID_x509Crl, NID_crlBag);
116 PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_secret(int type, int vtype, const unsigned char *value, int len)
119 PKCS12_SAFEBAG *safebag;
121 if ((bag = PKCS12_BAGS_new()) == NULL) {
122 ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE);
125 bag->type = OBJ_nid2obj(type);
128 case V_ASN1_OCTET_STRING:
130 ASN1_OCTET_STRING *strtmp = ASN1_OCTET_STRING_new();
132 if (strtmp == NULL) {
133 ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE);
136 /* Pack data into an octet string */
137 if (!ASN1_OCTET_STRING_set(strtmp, value, len)) {
138 ASN1_OCTET_STRING_free(strtmp);
139 ERR_raise(ERR_LIB_PKCS12, PKCS12_R_ENCODE_ERROR);
142 bag->value.other = ASN1_TYPE_new();
143 if (bag->value.other == NULL) {
144 ASN1_OCTET_STRING_free(strtmp);
145 ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE);
148 ASN1_TYPE_set(bag->value.other, vtype, strtmp);
153 ERR_raise(ERR_LIB_PKCS12, PKCS12_R_INVALID_TYPE);
157 if ((safebag = PKCS12_SAFEBAG_new()) == NULL) {
158 ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE);
161 safebag->value.bag = bag;
162 safebag->type = OBJ_nid2obj(NID_secretBag);
166 PKCS12_BAGS_free(bag);
170 /* Turn PKCS8 object into a keybag */
172 PKCS12_SAFEBAG *PKCS12_SAFEBAG_create0_p8inf(PKCS8_PRIV_KEY_INFO *p8)
174 PKCS12_SAFEBAG *bag = PKCS12_SAFEBAG_new();
177 ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE);
180 bag->type = OBJ_nid2obj(NID_keyBag);
181 bag->value.keybag = p8;
185 /* Turn PKCS8 object into a shrouded keybag */
187 PKCS12_SAFEBAG *PKCS12_SAFEBAG_create0_pkcs8(X509_SIG *p8)
189 PKCS12_SAFEBAG *bag = PKCS12_SAFEBAG_new();
191 /* Set up the safe bag */
193 ERR_raise(ERR_LIB_PKCS12, ERR_R_MALLOC_FAILURE);
196 bag->type = OBJ_nid2obj(NID_pkcs8ShroudedKeyBag);
197 bag->value.shkeybag = p8;
201 PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid,
205 int saltlen, int iter,
206 PKCS8_PRIV_KEY_INFO *p8inf)
209 const EVP_CIPHER *pbe_ciph;
212 pbe_ciph = EVP_get_cipherbynid(pbe_nid);
216 p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
221 bag = PKCS12_SAFEBAG_create0_pkcs8(p8);