security/nss/lib/smime/cmsencdata.c

Wed, 31 Dec 2014 06:55:50 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:55:50 +0100
changeset 2
7e26c7da4463
permissions
-rw-r--r--

Added tag UPSTREAM_283F7C6 for changeset ca08bd8f51b2

     1 /* This Source Code Form is subject to the terms of the Mozilla Public
     2  * License, v. 2.0. If a copy of the MPL was not distributed with this
     3  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     5 /*
     6  * CMS encryptedData methods.
     7  */
     9 #include "cmslocal.h"
    11 #include "key.h"
    12 #include "secasn1.h"
    13 #include "secitem.h"
    14 #include "secoid.h"
    15 #include "pk11func.h"
    16 #include "prtime.h"
    17 #include "secerr.h"
    18 #include "secpkcs5.h"
    20 /*
    21  * NSS_CMSEncryptedData_Create - create an empty encryptedData object.
    22  *
    23  * "algorithm" specifies the bulk encryption algorithm to use.
    24  * "keysize" is the key size.
    25  * 
    26  * An error results in a return value of NULL and an error set.
    27  * (Retrieve specific errors via PORT_GetError()/XP_GetError().)
    28  */
    29 NSSCMSEncryptedData *
    30 NSS_CMSEncryptedData_Create(NSSCMSMessage *cmsg, SECOidTag algorithm, 
    31 			    int keysize)
    32 {
    33     void *mark;
    34     NSSCMSEncryptedData *encd;
    35     PLArenaPool *poolp;
    36     SECAlgorithmID *pbe_algid;
    37     SECStatus rv;
    39     poolp = cmsg->poolp;
    41     mark = PORT_ArenaMark(poolp);
    43     encd = PORT_ArenaZNew(poolp, NSSCMSEncryptedData);
    44     if (encd == NULL)
    45 	goto loser;
    47     encd->cmsg = cmsg;
    49     /* version is set in NSS_CMSEncryptedData_Encode_BeforeStart() */
    51     if (!SEC_PKCS5IsAlgorithmPBEAlgTag(algorithm)) {
    52 	rv = NSS_CMSContentInfo_SetContentEncAlg(poolp, &(encd->contentInfo), 
    53 						 algorithm, NULL, keysize);
    54     } else {
    55 	/* Assume password-based-encryption.  
    56 	 * Note: we can't generate pkcs5v2 from this interface.
    57 	 * PK11_CreateBPEAlgorithmID generates pkcs5v2 by accepting
    58 	 * non-PBE oids and assuming that they are pkcs5v2 oids, but
    59 	 * NSS_CMSEncryptedData_Create accepts non-PBE oids as regular
    60 	 * CMS encrypted data, so we can't tell NSS_CMS_EncryptedData_Create
    61 	 * to create pkcs5v2 PBEs */
    62 	pbe_algid = PK11_CreatePBEAlgorithmID(algorithm, 1, NULL);
    63 	if (pbe_algid == NULL) {
    64 	    rv = SECFailure;
    65 	} else {
    66 	    rv = NSS_CMSContentInfo_SetContentEncAlgID(poolp, 
    67 				&(encd->contentInfo), pbe_algid, keysize);
    68 	    SECOID_DestroyAlgorithmID (pbe_algid, PR_TRUE);
    69 	}
    70     }
    71     if (rv != SECSuccess)
    72 	goto loser;
    74     PORT_ArenaUnmark(poolp, mark);
    75     return encd;
    77 loser:
    78     PORT_ArenaRelease(poolp, mark);
    79     return NULL;
    80 }
    82 /*
    83  * NSS_CMSEncryptedData_Destroy - destroy an encryptedData object
    84  */
    85 void
    86 NSS_CMSEncryptedData_Destroy(NSSCMSEncryptedData *encd)
    87 {
    88     /* everything's in a pool, so don't worry about the storage */
    89     NSS_CMSContentInfo_Destroy(&(encd->contentInfo));
    90     return;
    91 }
    93 /*
    94  * NSS_CMSEncryptedData_GetContentInfo - return pointer to encryptedData object's contentInfo
    95  */
    96 NSSCMSContentInfo *
    97 NSS_CMSEncryptedData_GetContentInfo(NSSCMSEncryptedData *encd)
    98 {
    99     return &(encd->contentInfo);
   100 }
   102 /*
   103  * NSS_CMSEncryptedData_Encode_BeforeStart - do all the necessary things to a EncryptedData
   104  *     before encoding begins.
   105  *
   106  * In particular:
   107  *  - set the correct version value.
   108  *  - get the encryption key
   109  */
   110 SECStatus
   111 NSS_CMSEncryptedData_Encode_BeforeStart(NSSCMSEncryptedData *encd)
   112 {
   113     int version;
   114     PK11SymKey *bulkkey = NULL;
   115     SECItem *dummy;
   116     NSSCMSContentInfo *cinfo = &(encd->contentInfo);
   118     if (NSS_CMSArray_IsEmpty((void **)encd->unprotectedAttr))
   119 	version = NSS_CMS_ENCRYPTED_DATA_VERSION;
   120     else
   121 	version = NSS_CMS_ENCRYPTED_DATA_VERSION_UPATTR;
   123     dummy = SEC_ASN1EncodeInteger (encd->cmsg->poolp, &(encd->version), version);
   124     if (dummy == NULL)
   125 	return SECFailure;
   127     /* now get content encryption key (bulk key) by using our cmsg callback */
   128     if (encd->cmsg->decrypt_key_cb)
   129 	bulkkey = (*encd->cmsg->decrypt_key_cb)(encd->cmsg->decrypt_key_cb_arg, 
   130 		    NSS_CMSContentInfo_GetContentEncAlg(cinfo));
   131     if (bulkkey == NULL)
   132 	return SECFailure;
   134     /* store the bulk key in the contentInfo so that the encoder can find it */
   135     NSS_CMSContentInfo_SetBulkKey(cinfo, bulkkey);
   136     PK11_FreeSymKey (bulkkey);
   138     return SECSuccess;
   139 }
   141 /*
   142  * NSS_CMSEncryptedData_Encode_BeforeData - set up encryption
   143  */
   144 SECStatus
   145 NSS_CMSEncryptedData_Encode_BeforeData(NSSCMSEncryptedData *encd)
   146 {
   147     NSSCMSContentInfo *cinfo;
   148     PK11SymKey *bulkkey;
   149     SECAlgorithmID *algid;
   150     SECStatus rv;
   152     cinfo = &(encd->contentInfo);
   154     /* find bulkkey and algorithm - must have been set by NSS_CMSEncryptedData_Encode_BeforeStart */
   155     bulkkey = NSS_CMSContentInfo_GetBulkKey(cinfo);
   156     if (bulkkey == NULL)
   157 	return SECFailure;
   158     algid = NSS_CMSContentInfo_GetContentEncAlg(cinfo);
   159     if (algid == NULL)
   160 	return SECFailure;
   162     rv = NSS_CMSContentInfo_Private_Init(cinfo);
   163     if (rv != SECSuccess) {
   164 	return SECFailure;
   165     }
   166     /* this may modify algid (with IVs generated in a token).
   167      * it is therefore essential that algid is a pointer to the "real" contentEncAlg,
   168      * not just to a copy */
   169     cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartEncrypt(encd->cmsg->poolp, bulkkey, algid);
   170     PK11_FreeSymKey(bulkkey);
   171     if (cinfo->privateInfo->ciphcx == NULL)
   172 	return SECFailure;
   174     return SECSuccess;
   175 }
   177 /*
   178  * NSS_CMSEncryptedData_Encode_AfterData - finalize this encryptedData for encoding
   179  */
   180 SECStatus
   181 NSS_CMSEncryptedData_Encode_AfterData(NSSCMSEncryptedData *encd)
   182 {
   183     if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
   184 	NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
   185 	encd->contentInfo.privateInfo->ciphcx = NULL;
   186     }
   188     /* nothing to do after data */
   189     return SECSuccess;
   190 }
   193 /*
   194  * NSS_CMSEncryptedData_Decode_BeforeData - find bulk key & set up decryption
   195  */
   196 SECStatus
   197 NSS_CMSEncryptedData_Decode_BeforeData(NSSCMSEncryptedData *encd)
   198 {
   199     PK11SymKey *bulkkey = NULL;
   200     NSSCMSContentInfo *cinfo;
   201     SECAlgorithmID *bulkalg;
   202     SECStatus rv = SECFailure;
   204     cinfo = &(encd->contentInfo);
   206     bulkalg = NSS_CMSContentInfo_GetContentEncAlg(cinfo);
   208     if (encd->cmsg->decrypt_key_cb == NULL)	/* no callback? no key../ */
   209 	goto loser;
   211     bulkkey = (*encd->cmsg->decrypt_key_cb)(encd->cmsg->decrypt_key_cb_arg, bulkalg);
   212     if (bulkkey == NULL)
   213 	/* no success finding a bulk key */
   214 	goto loser;
   216     NSS_CMSContentInfo_SetBulkKey(cinfo, bulkkey);
   218     rv = NSS_CMSContentInfo_Private_Init(cinfo);
   219     if (rv != SECSuccess) {
   220 	goto loser;
   221     }
   222     rv = SECFailure;
   224     cinfo->privateInfo->ciphcx = NSS_CMSCipherContext_StartDecrypt(bulkkey, bulkalg);
   225     if (cinfo->privateInfo->ciphcx == NULL)
   226 	goto loser;		/* error has been set by NSS_CMSCipherContext_StartDecrypt */
   229     /* we are done with (this) bulkkey now. */
   230     PK11_FreeSymKey(bulkkey);
   232     rv = SECSuccess;
   234 loser:
   235     return rv;
   236 }
   238 /*
   239  * NSS_CMSEncryptedData_Decode_AfterData - finish decrypting this encryptedData's content
   240  */
   241 SECStatus
   242 NSS_CMSEncryptedData_Decode_AfterData(NSSCMSEncryptedData *encd)
   243 {
   244     if (encd->contentInfo.privateInfo && encd->contentInfo.privateInfo->ciphcx) {
   245 	NSS_CMSCipherContext_Destroy(encd->contentInfo.privateInfo->ciphcx);
   246 	encd->contentInfo.privateInfo->ciphcx = NULL;
   247     }
   249     return SECSuccess;
   250 }
   252 /*
   253  * NSS_CMSEncryptedData_Decode_AfterEnd - finish decoding this encryptedData
   254  */
   255 SECStatus
   256 NSS_CMSEncryptedData_Decode_AfterEnd(NSSCMSEncryptedData *encd)
   257 {
   258     /* apply final touches */
   259     return SECSuccess;
   260 }

mercurial