|
1 /* This Source Code Form is subject to the terms of the Mozilla Public |
|
2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
|
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
|
4 |
|
5 /* |
|
6 * CMS decoding. |
|
7 */ |
|
8 |
|
9 #include "cmslocal.h" |
|
10 |
|
11 #include "cert.h" |
|
12 #include "key.h" |
|
13 #include "secasn1.h" |
|
14 #include "secitem.h" |
|
15 #include "secoid.h" |
|
16 #include "prtime.h" |
|
17 #include "secerr.h" |
|
18 |
|
19 struct NSSCMSDecoderContextStr { |
|
20 SEC_ASN1DecoderContext * dcx; /* ASN.1 decoder context */ |
|
21 NSSCMSMessage * cmsg; /* backpointer to the root message */ |
|
22 SECOidTag type; /* type of message */ |
|
23 NSSCMSContent content; /* pointer to message */ |
|
24 NSSCMSDecoderContext * childp7dcx; /* inner CMS decoder context */ |
|
25 PRBool saw_contents; |
|
26 int error; |
|
27 NSSCMSContentCallback cb; |
|
28 void * cb_arg; |
|
29 PRBool first_decoded; |
|
30 PRBool need_indefinite_finish; |
|
31 }; |
|
32 |
|
33 struct NSSCMSDecoderDataStr { |
|
34 SECItem data; /* must be first */ |
|
35 unsigned int totalBufferSize; |
|
36 }; |
|
37 |
|
38 typedef struct NSSCMSDecoderDataStr NSSCMSDecoderData; |
|
39 |
|
40 static void nss_cms_decoder_update_filter (void *arg, const char *data, |
|
41 unsigned long len, int depth, SEC_ASN1EncodingPart data_kind); |
|
42 static SECStatus nss_cms_before_data(NSSCMSDecoderContext *p7dcx); |
|
43 static SECStatus nss_cms_after_data(NSSCMSDecoderContext *p7dcx); |
|
44 static SECStatus nss_cms_after_end(NSSCMSDecoderContext *p7dcx); |
|
45 static void nss_cms_decoder_work_data(NSSCMSDecoderContext *p7dcx, |
|
46 const unsigned char *data, unsigned long len, PRBool final); |
|
47 static NSSCMSDecoderData *nss_cms_create_decoder_data(PLArenaPool *poolp); |
|
48 |
|
49 extern const SEC_ASN1Template NSSCMSMessageTemplate[]; |
|
50 |
|
51 static NSSCMSDecoderData * |
|
52 nss_cms_create_decoder_data(PLArenaPool *poolp) |
|
53 { |
|
54 NSSCMSDecoderData *decoderData = NULL; |
|
55 |
|
56 decoderData = (NSSCMSDecoderData *) |
|
57 PORT_ArenaAlloc(poolp,sizeof(NSSCMSDecoderData)); |
|
58 if (!decoderData) { |
|
59 return NULL; |
|
60 } |
|
61 decoderData->data.data = NULL; |
|
62 decoderData->data.len = 0; |
|
63 decoderData->totalBufferSize = 0; |
|
64 return decoderData; |
|
65 } |
|
66 |
|
67 /* |
|
68 * nss_cms_decoder_notify - |
|
69 * this is the driver of the decoding process. It gets called by the ASN.1 |
|
70 * decoder before and after an object is decoded. |
|
71 * at various points in the decoding process, we intercept to set up and do |
|
72 * further processing. |
|
73 */ |
|
74 static void |
|
75 nss_cms_decoder_notify(void *arg, PRBool before, void *dest, int depth) |
|
76 { |
|
77 NSSCMSDecoderContext *p7dcx; |
|
78 NSSCMSContentInfo *rootcinfo, *cinfo; |
|
79 PRBool after = !before; |
|
80 |
|
81 p7dcx = (NSSCMSDecoderContext *)arg; |
|
82 rootcinfo = &(p7dcx->cmsg->contentInfo); |
|
83 |
|
84 /* XXX error handling: need to set p7dcx->error */ |
|
85 |
|
86 #ifdef CMSDEBUG |
|
87 fprintf(stderr, "%6.6s, dest = 0x%08x, depth = %d\n", before ? "before" : "after", dest, depth); |
|
88 #endif |
|
89 |
|
90 /* so what are we working on right now? */ |
|
91 if (p7dcx->type == SEC_OID_UNKNOWN) { |
|
92 /* |
|
93 * right now, we are still decoding the OUTER (root) cinfo |
|
94 * As soon as we know the inner content type, set up the info, |
|
95 * but NO inner decoder or filter. The root decoder handles the first |
|
96 * level children by itself - only for encapsulated contents (which |
|
97 * are encoded as DER inside of an OCTET STRING) we need to set up a |
|
98 * child decoder... |
|
99 */ |
|
100 if (after && dest == &(rootcinfo->contentType)) { |
|
101 p7dcx->type = NSS_CMSContentInfo_GetContentTypeTag(rootcinfo); |
|
102 p7dcx->content = rootcinfo->content; |
|
103 /* is this ready already ? need to alloc? */ |
|
104 /* XXX yes we need to alloc -- continue here */ |
|
105 } |
|
106 } else if (NSS_CMSType_IsData(p7dcx->type)) { |
|
107 /* this can only happen if the outermost cinfo has DATA in it */ |
|
108 /* otherwise, we handle this type implicitely in the inner decoders */ |
|
109 |
|
110 if (before && dest == &(rootcinfo->content)) { |
|
111 /* cause the filter to put the data in the right place... |
|
112 ** We want the ASN.1 decoder to deliver the decoded bytes to us |
|
113 ** from now on |
|
114 */ |
|
115 SEC_ASN1DecoderSetFilterProc(p7dcx->dcx, |
|
116 nss_cms_decoder_update_filter, |
|
117 p7dcx, |
|
118 (PRBool)(p7dcx->cb != NULL)); |
|
119 } else if (after && dest == &(rootcinfo->content.data)) { |
|
120 /* remove the filter */ |
|
121 SEC_ASN1DecoderClearFilterProc(p7dcx->dcx); |
|
122 } |
|
123 } else if (NSS_CMSType_IsWrapper(p7dcx->type)) { |
|
124 if (!before || dest != &(rootcinfo->content)) { |
|
125 |
|
126 if (p7dcx->content.pointer == NULL) |
|
127 p7dcx->content = rootcinfo->content; |
|
128 |
|
129 /* get this data type's inner contentInfo */ |
|
130 cinfo = NSS_CMSContent_GetContentInfo(p7dcx->content.pointer, |
|
131 p7dcx->type); |
|
132 |
|
133 if (before && dest == &(cinfo->contentType)) { |
|
134 /* at this point, set up the &%$&$ back pointer */ |
|
135 /* we cannot do it later, because the content itself |
|
136 * is optional! */ |
|
137 switch (p7dcx->type) { |
|
138 case SEC_OID_PKCS7_SIGNED_DATA: |
|
139 p7dcx->content.signedData->cmsg = p7dcx->cmsg; |
|
140 break; |
|
141 case SEC_OID_PKCS7_DIGESTED_DATA: |
|
142 p7dcx->content.digestedData->cmsg = p7dcx->cmsg; |
|
143 break; |
|
144 case SEC_OID_PKCS7_ENVELOPED_DATA: |
|
145 p7dcx->content.envelopedData->cmsg = p7dcx->cmsg; |
|
146 break; |
|
147 case SEC_OID_PKCS7_ENCRYPTED_DATA: |
|
148 p7dcx->content.encryptedData->cmsg = p7dcx->cmsg; |
|
149 break; |
|
150 default: |
|
151 p7dcx->content.genericData->cmsg = p7dcx->cmsg; |
|
152 break; |
|
153 } |
|
154 } |
|
155 |
|
156 if (before && dest == &(cinfo->rawContent)) { |
|
157 /* we want the ASN.1 decoder to deliver the decoded bytes to us |
|
158 ** from now on |
|
159 */ |
|
160 SEC_ASN1DecoderSetFilterProc(p7dcx->dcx, |
|
161 nss_cms_decoder_update_filter, |
|
162 p7dcx, (PRBool)(p7dcx->cb != NULL)); |
|
163 |
|
164 |
|
165 /* we're right in front of the data */ |
|
166 if (nss_cms_before_data(p7dcx) != SECSuccess) { |
|
167 SEC_ASN1DecoderClearFilterProc(p7dcx->dcx); |
|
168 /* stop all processing */ |
|
169 p7dcx->error = PORT_GetError(); |
|
170 } |
|
171 } |
|
172 if (after && dest == &(cinfo->rawContent)) { |
|
173 /* we're right after of the data */ |
|
174 if (nss_cms_after_data(p7dcx) != SECSuccess) |
|
175 p7dcx->error = PORT_GetError(); |
|
176 |
|
177 /* we don't need to see the contents anymore */ |
|
178 SEC_ASN1DecoderClearFilterProc(p7dcx->dcx); |
|
179 } |
|
180 } |
|
181 } else { |
|
182 /* unsupported or unknown message type - fail gracefully */ |
|
183 p7dcx->error = SEC_ERROR_UNSUPPORTED_MESSAGE_TYPE; |
|
184 } |
|
185 } |
|
186 |
|
187 /* |
|
188 * nss_cms_before_data - set up the current encoder to receive data |
|
189 */ |
|
190 static SECStatus |
|
191 nss_cms_before_data(NSSCMSDecoderContext *p7dcx) |
|
192 { |
|
193 SECStatus rv; |
|
194 SECOidTag childtype; |
|
195 PLArenaPool *poolp; |
|
196 NSSCMSDecoderContext *childp7dcx; |
|
197 NSSCMSContentInfo *cinfo; |
|
198 const SEC_ASN1Template *template; |
|
199 void *mark = NULL; |
|
200 size_t size; |
|
201 |
|
202 poolp = p7dcx->cmsg->poolp; |
|
203 |
|
204 /* call _Decode_BeforeData handlers */ |
|
205 switch (p7dcx->type) { |
|
206 case SEC_OID_PKCS7_SIGNED_DATA: |
|
207 /* we're decoding a signedData, so set up the digests */ |
|
208 rv = NSS_CMSSignedData_Decode_BeforeData(p7dcx->content.signedData); |
|
209 break; |
|
210 case SEC_OID_PKCS7_DIGESTED_DATA: |
|
211 /* we're encoding a digestedData, so set up the digest */ |
|
212 rv = NSS_CMSDigestedData_Decode_BeforeData(p7dcx->content.digestedData); |
|
213 break; |
|
214 case SEC_OID_PKCS7_ENVELOPED_DATA: |
|
215 rv = NSS_CMSEnvelopedData_Decode_BeforeData( |
|
216 p7dcx->content.envelopedData); |
|
217 break; |
|
218 case SEC_OID_PKCS7_ENCRYPTED_DATA: |
|
219 rv = NSS_CMSEncryptedData_Decode_BeforeData( |
|
220 p7dcx->content.encryptedData); |
|
221 break; |
|
222 default: |
|
223 rv = NSS_CMSGenericWrapperData_Decode_BeforeData(p7dcx->type, |
|
224 p7dcx->content.genericData); |
|
225 } |
|
226 if (rv != SECSuccess) |
|
227 return SECFailure; |
|
228 |
|
229 /* ok, now we have a pointer to cinfo */ |
|
230 /* find out what kind of data is encapsulated */ |
|
231 |
|
232 cinfo = NSS_CMSContent_GetContentInfo(p7dcx->content.pointer, p7dcx->type); |
|
233 childtype = NSS_CMSContentInfo_GetContentTypeTag(cinfo); |
|
234 |
|
235 if (NSS_CMSType_IsData(childtype)) { |
|
236 cinfo->content.pointer = (void *) nss_cms_create_decoder_data(poolp); |
|
237 if (cinfo->content.pointer == NULL) |
|
238 /* set memory error */ |
|
239 return SECFailure; |
|
240 |
|
241 p7dcx->childp7dcx = NULL; |
|
242 return SECSuccess; |
|
243 } |
|
244 |
|
245 /* set up inner decoder */ |
|
246 |
|
247 if ((template = NSS_CMSUtil_GetTemplateByTypeTag(childtype)) == NULL) |
|
248 return SECFailure; |
|
249 |
|
250 childp7dcx = PORT_ZNew(NSSCMSDecoderContext); |
|
251 if (childp7dcx == NULL) |
|
252 return SECFailure; |
|
253 |
|
254 mark = PORT_ArenaMark(poolp); |
|
255 |
|
256 /* allocate space for the stuff we're creating */ |
|
257 size = NSS_CMSUtil_GetSizeByTypeTag(childtype); |
|
258 childp7dcx->content.pointer = (void *)PORT_ArenaZAlloc(poolp, size); |
|
259 if (childp7dcx->content.pointer == NULL) |
|
260 goto loser; |
|
261 |
|
262 /* give the parent a copy of the pointer so that it doesn't get lost */ |
|
263 cinfo->content.pointer = childp7dcx->content.pointer; |
|
264 |
|
265 /* start the child decoder */ |
|
266 childp7dcx->dcx = SEC_ASN1DecoderStart(poolp, childp7dcx->content.pointer, |
|
267 template); |
|
268 if (childp7dcx->dcx == NULL) |
|
269 goto loser; |
|
270 |
|
271 /* the new decoder needs to notify, too */ |
|
272 SEC_ASN1DecoderSetNotifyProc(childp7dcx->dcx, nss_cms_decoder_notify, |
|
273 childp7dcx); |
|
274 |
|
275 /* tell the parent decoder that it needs to feed us the content data */ |
|
276 p7dcx->childp7dcx = childp7dcx; |
|
277 |
|
278 childp7dcx->type = childtype; /* our type */ |
|
279 |
|
280 childp7dcx->cmsg = p7dcx->cmsg; /* backpointer to root message */ |
|
281 |
|
282 /* should the child decoder encounter real data, |
|
283 ** it must give it to the caller |
|
284 */ |
|
285 childp7dcx->cb = p7dcx->cb; |
|
286 childp7dcx->cb_arg = p7dcx->cb_arg; |
|
287 childp7dcx->first_decoded = PR_FALSE; |
|
288 childp7dcx->need_indefinite_finish = PR_FALSE; |
|
289 if (childtype == SEC_OID_PKCS7_SIGNED_DATA) { |
|
290 childp7dcx->first_decoded = PR_TRUE; |
|
291 } |
|
292 |
|
293 /* now set up the parent to hand decoded data to the next level decoder */ |
|
294 p7dcx->cb = (NSSCMSContentCallback)NSS_CMSDecoder_Update; |
|
295 p7dcx->cb_arg = childp7dcx; |
|
296 |
|
297 PORT_ArenaUnmark(poolp, mark); |
|
298 |
|
299 return SECSuccess; |
|
300 |
|
301 loser: |
|
302 if (mark) |
|
303 PORT_ArenaRelease(poolp, mark); |
|
304 if (childp7dcx) |
|
305 PORT_Free(childp7dcx); |
|
306 p7dcx->childp7dcx = NULL; |
|
307 return SECFailure; |
|
308 } |
|
309 |
|
310 static SECStatus |
|
311 nss_cms_after_data(NSSCMSDecoderContext *p7dcx) |
|
312 { |
|
313 NSSCMSDecoderContext *childp7dcx; |
|
314 SECStatus rv = SECFailure; |
|
315 |
|
316 /* Handle last block. This is necessary to flush out the last bytes |
|
317 * of a possibly incomplete block */ |
|
318 nss_cms_decoder_work_data(p7dcx, NULL, 0, PR_TRUE); |
|
319 |
|
320 /* finish any "inner" decoders - there's no more data coming... */ |
|
321 if (p7dcx->childp7dcx != NULL) { |
|
322 childp7dcx = p7dcx->childp7dcx; |
|
323 if (childp7dcx->dcx != NULL) { |
|
324 /* we started and indefinite sequence somewhere, not complete it */ |
|
325 if (childp7dcx->need_indefinite_finish) { |
|
326 static const char lbuf[2] = { 0, 0 }; |
|
327 NSS_CMSDecoder_Update(childp7dcx, lbuf, sizeof(lbuf)); |
|
328 childp7dcx->need_indefinite_finish = PR_FALSE; |
|
329 } |
|
330 |
|
331 if (SEC_ASN1DecoderFinish(childp7dcx->dcx) != SECSuccess) { |
|
332 /* do what? free content? */ |
|
333 rv = SECFailure; |
|
334 } else { |
|
335 rv = nss_cms_after_end(childp7dcx); |
|
336 } |
|
337 if (rv != SECSuccess) |
|
338 goto done; |
|
339 } |
|
340 PORT_Free(p7dcx->childp7dcx); |
|
341 p7dcx->childp7dcx = NULL; |
|
342 } |
|
343 |
|
344 switch (p7dcx->type) { |
|
345 case SEC_OID_PKCS7_SIGNED_DATA: |
|
346 /* this will finish the digests and verify */ |
|
347 rv = NSS_CMSSignedData_Decode_AfterData(p7dcx->content.signedData); |
|
348 break; |
|
349 case SEC_OID_PKCS7_ENVELOPED_DATA: |
|
350 rv = NSS_CMSEnvelopedData_Decode_AfterData( |
|
351 p7dcx->content.envelopedData); |
|
352 break; |
|
353 case SEC_OID_PKCS7_DIGESTED_DATA: |
|
354 rv = NSS_CMSDigestedData_Decode_AfterData( |
|
355 p7dcx->content.digestedData); |
|
356 break; |
|
357 case SEC_OID_PKCS7_ENCRYPTED_DATA: |
|
358 rv = NSS_CMSEncryptedData_Decode_AfterData( |
|
359 p7dcx->content.encryptedData); |
|
360 break; |
|
361 case SEC_OID_PKCS7_DATA: |
|
362 /* do nothing */ |
|
363 break; |
|
364 default: |
|
365 rv = NSS_CMSGenericWrapperData_Decode_AfterData(p7dcx->type, |
|
366 p7dcx->content.genericData); |
|
367 break; |
|
368 } |
|
369 done: |
|
370 return rv; |
|
371 } |
|
372 |
|
373 static SECStatus |
|
374 nss_cms_after_end(NSSCMSDecoderContext *p7dcx) |
|
375 { |
|
376 SECStatus rv = SECSuccess; |
|
377 |
|
378 switch (p7dcx->type) { |
|
379 case SEC_OID_PKCS7_SIGNED_DATA: |
|
380 if (p7dcx->content.signedData) |
|
381 rv = NSS_CMSSignedData_Decode_AfterEnd(p7dcx->content.signedData); |
|
382 break; |
|
383 case SEC_OID_PKCS7_ENVELOPED_DATA: |
|
384 if (p7dcx->content.envelopedData) |
|
385 rv = NSS_CMSEnvelopedData_Decode_AfterEnd( |
|
386 p7dcx->content.envelopedData); |
|
387 break; |
|
388 case SEC_OID_PKCS7_DIGESTED_DATA: |
|
389 if (p7dcx->content.digestedData) |
|
390 rv = NSS_CMSDigestedData_Decode_AfterEnd( |
|
391 p7dcx->content.digestedData); |
|
392 break; |
|
393 case SEC_OID_PKCS7_ENCRYPTED_DATA: |
|
394 if (p7dcx->content.encryptedData) |
|
395 rv = NSS_CMSEncryptedData_Decode_AfterEnd( |
|
396 p7dcx->content.encryptedData); |
|
397 break; |
|
398 case SEC_OID_PKCS7_DATA: |
|
399 break; |
|
400 default: |
|
401 rv = NSS_CMSGenericWrapperData_Decode_AfterEnd(p7dcx->type, |
|
402 p7dcx->content.genericData); |
|
403 break; |
|
404 } |
|
405 return rv; |
|
406 } |
|
407 |
|
408 /* |
|
409 * nss_cms_decoder_work_data - handle decoded data bytes. |
|
410 * |
|
411 * This function either decrypts the data if needed, and/or calculates digests |
|
412 * on it, then either stores it or passes it on to the next level decoder. |
|
413 */ |
|
414 static void |
|
415 nss_cms_decoder_work_data(NSSCMSDecoderContext *p7dcx, |
|
416 const unsigned char *data, unsigned long len, |
|
417 PRBool final) |
|
418 { |
|
419 NSSCMSContentInfo *cinfo; |
|
420 unsigned char *buf = NULL; |
|
421 unsigned char *dest; |
|
422 unsigned int offset; |
|
423 SECStatus rv; |
|
424 |
|
425 /* |
|
426 * We should really have data to process, or we should be trying |
|
427 * to finish/flush the last block. (This is an overly paranoid |
|
428 * check since all callers are in this file and simple inspection |
|
429 * proves they do it right. But it could find a bug in future |
|
430 * modifications/development, that is why it is here.) |
|
431 */ |
|
432 PORT_Assert ((data != NULL && len) || final); |
|
433 |
|
434 cinfo = NSS_CMSContent_GetContentInfo(p7dcx->content.pointer, p7dcx->type); |
|
435 if (!cinfo) { |
|
436 /* The original programmer didn't expect this to happen */ |
|
437 p7dcx->error = SEC_ERROR_LIBRARY_FAILURE; |
|
438 goto loser; |
|
439 } |
|
440 |
|
441 if (cinfo->privateInfo && cinfo->privateInfo->ciphcx != NULL) { |
|
442 /* |
|
443 * we are decrypting. |
|
444 * |
|
445 * XXX If we get an error, we do not want to do the digest or callback, |
|
446 * but we want to keep decoding. Or maybe we want to stop decoding |
|
447 * altogether if there is a callback, because obviously we are not |
|
448 * sending the data back and they want to know that. |
|
449 */ |
|
450 |
|
451 unsigned int outlen = 0; /* length of decrypted data */ |
|
452 unsigned int buflen; /* length available for decrypted data */ |
|
453 |
|
454 /* find out about the length of decrypted data */ |
|
455 buflen = NSS_CMSCipherContext_DecryptLength(cinfo->privateInfo->ciphcx, len, final); |
|
456 |
|
457 /* |
|
458 * it might happen that we did not provide enough data for a full |
|
459 * block (decryption unit), and that there is no output available |
|
460 */ |
|
461 |
|
462 /* no output available, AND no input? */ |
|
463 if (buflen == 0 && len == 0) |
|
464 goto loser; /* bail out */ |
|
465 |
|
466 /* |
|
467 * have inner decoder: pass the data on (means inner content type is NOT data) |
|
468 * no inner decoder: we have DATA in here: either call callback or store |
|
469 */ |
|
470 if (buflen != 0) { |
|
471 /* there will be some output - need to make room for it */ |
|
472 /* allocate buffer from the heap */ |
|
473 buf = (unsigned char *)PORT_Alloc(buflen); |
|
474 if (buf == NULL) { |
|
475 p7dcx->error = SEC_ERROR_NO_MEMORY; |
|
476 goto loser; |
|
477 } |
|
478 } |
|
479 |
|
480 /* |
|
481 * decrypt incoming data |
|
482 * buf can still be NULL here (and buflen == 0) here if we don't expect |
|
483 * any output (see above), but we still need to call NSS_CMSCipherContext_Decrypt to |
|
484 * keep track of incoming data |
|
485 */ |
|
486 rv = NSS_CMSCipherContext_Decrypt(cinfo->privateInfo->ciphcx, buf, &outlen, buflen, |
|
487 data, len, final); |
|
488 if (rv != SECSuccess) { |
|
489 p7dcx->error = PORT_GetError(); |
|
490 goto loser; |
|
491 } |
|
492 |
|
493 PORT_Assert (final || outlen == buflen); |
|
494 |
|
495 /* swap decrypted data in */ |
|
496 data = buf; |
|
497 len = outlen; |
|
498 } |
|
499 |
|
500 if (len == 0) |
|
501 goto done; /* nothing more to do */ |
|
502 |
|
503 /* |
|
504 * Update the running digests with plaintext bytes (if we need to). |
|
505 */ |
|
506 if (cinfo->privateInfo && cinfo->privateInfo->digcx) |
|
507 NSS_CMSDigestContext_Update(cinfo->privateInfo->digcx, data, len); |
|
508 |
|
509 /* at this point, we have the plain decoded & decrypted data |
|
510 ** which is either more encoded DER (which we need to hand to the child |
|
511 ** decoder) or data we need to hand back to our caller |
|
512 */ |
|
513 |
|
514 /* pass the content back to our caller or */ |
|
515 /* feed our freshly decrypted and decoded data into child decoder */ |
|
516 if (p7dcx->cb != NULL) { |
|
517 (*p7dcx->cb)(p7dcx->cb_arg, (const char *)data, len); |
|
518 } |
|
519 #if 1 |
|
520 else |
|
521 #endif |
|
522 if (NSS_CMSContentInfo_GetContentTypeTag(cinfo) == SEC_OID_PKCS7_DATA) { |
|
523 /* store it in "inner" data item as well */ |
|
524 /* find the DATA item in the encapsulated cinfo and store it there */ |
|
525 NSSCMSDecoderData *decoderData = |
|
526 (NSSCMSDecoderData *)cinfo->content.pointer; |
|
527 SECItem *dataItem = &decoderData->data; |
|
528 |
|
529 offset = dataItem->len; |
|
530 if (dataItem->len+len > decoderData->totalBufferSize) { |
|
531 int needLen = (dataItem->len+len) * 2; |
|
532 dest = (unsigned char *) |
|
533 PORT_ArenaAlloc(p7dcx->cmsg->poolp, needLen); |
|
534 if (dest == NULL) { |
|
535 p7dcx->error = SEC_ERROR_NO_MEMORY; |
|
536 goto loser; |
|
537 } |
|
538 |
|
539 if (dataItem->len) { |
|
540 PORT_Memcpy(dest, dataItem->data, dataItem->len); |
|
541 } |
|
542 decoderData->totalBufferSize = needLen; |
|
543 dataItem->data = dest; |
|
544 } |
|
545 |
|
546 /* copy it in */ |
|
547 PORT_Memcpy(dataItem->data + offset, data, len); |
|
548 dataItem->len += len; |
|
549 } |
|
550 |
|
551 done: |
|
552 loser: |
|
553 if (buf) |
|
554 PORT_Free (buf); |
|
555 } |
|
556 |
|
557 /* |
|
558 * nss_cms_decoder_update_filter - process ASN.1 data |
|
559 * |
|
560 * once we have set up a filter in nss_cms_decoder_notify(), |
|
561 * all data processed by the ASN.1 decoder is also passed through here. |
|
562 * we pass the content bytes (as opposed to length and tag bytes) on to |
|
563 * nss_cms_decoder_work_data(). |
|
564 */ |
|
565 static void |
|
566 nss_cms_decoder_update_filter (void *arg, const char *data, unsigned long len, |
|
567 int depth, SEC_ASN1EncodingPart data_kind) |
|
568 { |
|
569 NSSCMSDecoderContext *p7dcx; |
|
570 |
|
571 PORT_Assert (len); /* paranoia */ |
|
572 if (len == 0) |
|
573 return; |
|
574 |
|
575 p7dcx = (NSSCMSDecoderContext*)arg; |
|
576 |
|
577 p7dcx->saw_contents = PR_TRUE; |
|
578 |
|
579 /* pass on the content bytes only */ |
|
580 if (data_kind == SEC_ASN1_Contents) |
|
581 nss_cms_decoder_work_data(p7dcx, (const unsigned char *) data, len, |
|
582 PR_FALSE); |
|
583 } |
|
584 |
|
585 /* |
|
586 * NSS_CMSDecoder_Start - set up decoding of a DER-encoded CMS message |
|
587 * |
|
588 * "poolp" - pointer to arena for message, or NULL if new pool should be created |
|
589 * "cb", "cb_arg" - callback function and argument for delivery of inner content |
|
590 * "pwfn", pwfn_arg" - callback function for getting token password |
|
591 * "decrypt_key_cb", "decrypt_key_cb_arg" - callback function for getting bulk key for encryptedData |
|
592 */ |
|
593 NSSCMSDecoderContext * |
|
594 NSS_CMSDecoder_Start(PLArenaPool *poolp, |
|
595 NSSCMSContentCallback cb, void *cb_arg, |
|
596 PK11PasswordFunc pwfn, void *pwfn_arg, |
|
597 NSSCMSGetDecryptKeyCallback decrypt_key_cb, |
|
598 void *decrypt_key_cb_arg) |
|
599 { |
|
600 NSSCMSDecoderContext *p7dcx; |
|
601 NSSCMSMessage *cmsg; |
|
602 |
|
603 cmsg = NSS_CMSMessage_Create(poolp); |
|
604 if (cmsg == NULL) |
|
605 return NULL; |
|
606 |
|
607 NSS_CMSMessage_SetEncodingParams(cmsg, pwfn, pwfn_arg, decrypt_key_cb, |
|
608 decrypt_key_cb_arg, NULL, NULL); |
|
609 |
|
610 p7dcx = PORT_ZNew(NSSCMSDecoderContext); |
|
611 if (p7dcx == NULL) { |
|
612 NSS_CMSMessage_Destroy(cmsg); |
|
613 return NULL; |
|
614 } |
|
615 |
|
616 p7dcx->dcx = SEC_ASN1DecoderStart(cmsg->poolp, cmsg, NSSCMSMessageTemplate); |
|
617 if (p7dcx->dcx == NULL) { |
|
618 PORT_Free (p7dcx); |
|
619 NSS_CMSMessage_Destroy(cmsg); |
|
620 return NULL; |
|
621 } |
|
622 |
|
623 SEC_ASN1DecoderSetNotifyProc (p7dcx->dcx, nss_cms_decoder_notify, p7dcx); |
|
624 |
|
625 p7dcx->cmsg = cmsg; |
|
626 p7dcx->type = SEC_OID_UNKNOWN; |
|
627 |
|
628 p7dcx->cb = cb; |
|
629 p7dcx->cb_arg = cb_arg; |
|
630 p7dcx->first_decoded = PR_FALSE; |
|
631 p7dcx->need_indefinite_finish = PR_FALSE; |
|
632 return p7dcx; |
|
633 } |
|
634 |
|
635 /* |
|
636 * NSS_CMSDecoder_Update - feed DER-encoded data to decoder |
|
637 */ |
|
638 SECStatus |
|
639 NSS_CMSDecoder_Update(NSSCMSDecoderContext *p7dcx, const char *buf, |
|
640 unsigned long len) |
|
641 { |
|
642 SECStatus rv = SECSuccess; |
|
643 if (p7dcx->dcx != NULL && p7dcx->error == 0) { |
|
644 /* if error is set already, don't bother */ |
|
645 if ((p7dcx->type == SEC_OID_PKCS7_SIGNED_DATA) |
|
646 && (p7dcx->first_decoded==PR_TRUE) |
|
647 && (buf[0] == SEC_ASN1_INTEGER)) { |
|
648 /* Microsoft Windows 2008 left out the Sequence wrapping in some |
|
649 * of their kerberos replies. If we are here, we most likely are |
|
650 * dealing with one of those replies. Supply the Sequence wrap |
|
651 * as indefinite encoding (since we don't know the total length |
|
652 * yet) */ |
|
653 static const char lbuf[2] = |
|
654 { SEC_ASN1_SEQUENCE|SEC_ASN1_CONSTRUCTED, 0x80 }; |
|
655 rv = SEC_ASN1DecoderUpdate(p7dcx->dcx, lbuf, sizeof(lbuf)); |
|
656 if (rv != SECSuccess) { |
|
657 goto loser; |
|
658 } |
|
659 /* ok, we're going to need the indefinite finish when we are done */ |
|
660 p7dcx->need_indefinite_finish = PR_TRUE; |
|
661 } |
|
662 |
|
663 rv = SEC_ASN1DecoderUpdate(p7dcx->dcx, buf, len); |
|
664 } |
|
665 |
|
666 loser: |
|
667 p7dcx->first_decoded = PR_FALSE; |
|
668 if (rv != SECSuccess) { |
|
669 p7dcx->error = PORT_GetError(); |
|
670 PORT_Assert (p7dcx->error); |
|
671 if (p7dcx->error == 0) |
|
672 p7dcx->error = -1; |
|
673 } |
|
674 |
|
675 if (p7dcx->error == 0) |
|
676 return SECSuccess; |
|
677 |
|
678 /* there has been a problem, let's finish the decoder */ |
|
679 if (p7dcx->dcx != NULL) { |
|
680 (void) SEC_ASN1DecoderFinish (p7dcx->dcx); |
|
681 p7dcx->dcx = NULL; |
|
682 } |
|
683 PORT_SetError (p7dcx->error); |
|
684 |
|
685 return SECFailure; |
|
686 } |
|
687 |
|
688 /* |
|
689 * NSS_CMSDecoder_Cancel - stop decoding in case of error |
|
690 */ |
|
691 void |
|
692 NSS_CMSDecoder_Cancel(NSSCMSDecoderContext *p7dcx) |
|
693 { |
|
694 if (p7dcx->dcx != NULL) |
|
695 (void)SEC_ASN1DecoderFinish(p7dcx->dcx); |
|
696 NSS_CMSMessage_Destroy(p7dcx->cmsg); |
|
697 PORT_Free(p7dcx); |
|
698 } |
|
699 |
|
700 /* |
|
701 * NSS_CMSDecoder_Finish - mark the end of inner content and finish decoding |
|
702 */ |
|
703 NSSCMSMessage * |
|
704 NSS_CMSDecoder_Finish(NSSCMSDecoderContext *p7dcx) |
|
705 { |
|
706 NSSCMSMessage *cmsg; |
|
707 |
|
708 cmsg = p7dcx->cmsg; |
|
709 |
|
710 if (p7dcx->dcx == NULL || |
|
711 SEC_ASN1DecoderFinish(p7dcx->dcx) != SECSuccess || |
|
712 nss_cms_after_end(p7dcx) != SECSuccess) |
|
713 { |
|
714 NSS_CMSMessage_Destroy(cmsg); /* get rid of pool if it's ours */ |
|
715 cmsg = NULL; |
|
716 } |
|
717 |
|
718 PORT_Free(p7dcx); |
|
719 return cmsg; |
|
720 } |
|
721 |
|
722 NSSCMSMessage * |
|
723 NSS_CMSMessage_CreateFromDER(SECItem *DERmessage, |
|
724 NSSCMSContentCallback cb, void *cb_arg, |
|
725 PK11PasswordFunc pwfn, void *pwfn_arg, |
|
726 NSSCMSGetDecryptKeyCallback decrypt_key_cb, |
|
727 void *decrypt_key_cb_arg) |
|
728 { |
|
729 NSSCMSDecoderContext *p7dcx; |
|
730 |
|
731 /* first arg(poolp) == NULL => create our own pool */ |
|
732 p7dcx = NSS_CMSDecoder_Start(NULL, cb, cb_arg, pwfn, pwfn_arg, |
|
733 decrypt_key_cb, decrypt_key_cb_arg); |
|
734 if (p7dcx == NULL) |
|
735 return NULL; |
|
736 NSS_CMSDecoder_Update(p7dcx, (char *)DERmessage->data, DERmessage->len); |
|
737 return NSS_CMSDecoder_Finish(p7dcx); |
|
738 } |
|
739 |