GCC Code Coverage Report
Directory: ./ Exec Total Coverage
File: lib/libcrypto/crypto/../../libssl/src/crypto/pkcs12/p12_add.c Lines: 0 85 0.0 %
Date: 2016-12-06 Branches: 0 38 0.0 %

Line Branch Exec Source
1
/* $OpenBSD: p12_add.c,v 1.13 2015/09/30 18:41:06 jsing Exp $ */
2
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3
 * project 1999.
4
 */
5
/* ====================================================================
6
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
7
 *
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 *
12
 * 1. Redistributions of source code must retain the above copyright
13
 *    notice, this list of conditions and the following disclaimer.
14
 *
15
 * 2. Redistributions in binary form must reproduce the above copyright
16
 *    notice, this list of conditions and the following disclaimer in
17
 *    the documentation and/or other materials provided with the
18
 *    distribution.
19
 *
20
 * 3. All advertising materials mentioning features or use of this
21
 *    software must display the following acknowledgment:
22
 *    "This product includes software developed by the OpenSSL Project
23
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24
 *
25
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26
 *    endorse or promote products derived from this software without
27
 *    prior written permission. For written permission, please contact
28
 *    licensing@OpenSSL.org.
29
 *
30
 * 5. Products derived from this software may not be called "OpenSSL"
31
 *    nor may "OpenSSL" appear in their names without prior written
32
 *    permission of the OpenSSL Project.
33
 *
34
 * 6. Redistributions of any form whatsoever must retain the following
35
 *    acknowledgment:
36
 *    "This product includes software developed by the OpenSSL Project
37
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38
 *
39
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50
 * OF THE POSSIBILITY OF SUCH DAMAGE.
51
 * ====================================================================
52
 *
53
 * This product includes cryptographic software written by Eric Young
54
 * (eay@cryptsoft.com).  This product includes software written by Tim
55
 * Hudson (tjh@cryptsoft.com).
56
 *
57
 */
58
59
#include <stdio.h>
60
61
#include <openssl/err.h>
62
#include <openssl/pkcs12.h>
63
64
/* Pack an object into an OCTET STRING and turn into a safebag */
65
66
PKCS12_SAFEBAG *
67
PKCS12_item_pack_safebag(void *obj, const ASN1_ITEM *it, int nid1, int nid2)
68
{
69
	PKCS12_BAGS *bag;
70
	PKCS12_SAFEBAG *safebag;
71
72
	if (!(bag = PKCS12_BAGS_new())) {
73
		PKCS12err(PKCS12_F_PKCS12_ITEM_PACK_SAFEBAG,
74
		    ERR_R_MALLOC_FAILURE);
75
		return NULL;
76
	}
77
	bag->type = OBJ_nid2obj(nid1);
78
	if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
79
		PKCS12err(PKCS12_F_PKCS12_ITEM_PACK_SAFEBAG,
80
		    ERR_R_MALLOC_FAILURE);
81
		PKCS12_BAGS_free(bag);
82
		return NULL;
83
	}
84
	if (!(safebag = PKCS12_SAFEBAG_new())) {
85
		PKCS12err(PKCS12_F_PKCS12_ITEM_PACK_SAFEBAG,
86
		    ERR_R_MALLOC_FAILURE);
87
		PKCS12_BAGS_free(bag);
88
		return NULL;
89
	}
90
	safebag->value.bag = bag;
91
	safebag->type = OBJ_nid2obj(nid2);
92
	return safebag;
93
}
94
95
/* Turn PKCS8 object into a keybag */
96
97
PKCS12_SAFEBAG *
98
PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8)
99
{
100
	PKCS12_SAFEBAG *bag;
101
102
	if (!(bag = PKCS12_SAFEBAG_new())) {
103
		PKCS12err(PKCS12_F_PKCS12_MAKE_KEYBAG, ERR_R_MALLOC_FAILURE);
104
		return NULL;
105
	}
106
	bag->type = OBJ_nid2obj(NID_keyBag);
107
	bag->value.keybag = p8;
108
	return bag;
109
}
110
111
/* Turn PKCS8 object into a shrouded keybag */
112
113
PKCS12_SAFEBAG *
114
PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen,
115
    unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8)
116
{
117
	PKCS12_SAFEBAG *bag;
118
	const EVP_CIPHER *pbe_ciph;
119
120
	/* Set up the safe bag */
121
	if (!(bag = PKCS12_SAFEBAG_new())) {
122
		PKCS12err(PKCS12_F_PKCS12_MAKE_SHKEYBAG, ERR_R_MALLOC_FAILURE);
123
		return NULL;
124
	}
125
126
	bag->type = OBJ_nid2obj(NID_pkcs8ShroudedKeyBag);
127
128
	pbe_ciph = EVP_get_cipherbynid(pbe_nid);
129
130
	if (pbe_ciph)
131
		pbe_nid = -1;
132
133
	if (!(bag->value.shkeybag = PKCS8_encrypt(pbe_nid, pbe_ciph, pass,
134
	    passlen, salt, saltlen, iter, p8))) {
135
		PKCS12err(PKCS12_F_PKCS12_MAKE_SHKEYBAG, ERR_R_MALLOC_FAILURE);
136
		PKCS12_SAFEBAG_free(bag);
137
		return NULL;
138
	}
139
140
	return bag;
141
}
142
143
/* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */
144
PKCS7 *
145
PKCS12_pack_p7data(STACK_OF(PKCS12_SAFEBAG) *sk)
146
{
147
	PKCS7 *p7;
148
149
	if (!(p7 = PKCS7_new())) {
150
		PKCS12err(PKCS12_F_PKCS12_PACK_P7DATA, ERR_R_MALLOC_FAILURE);
151
		return NULL;
152
	}
153
	p7->type = OBJ_nid2obj(NID_pkcs7_data);
154
	if (!(p7->d.data = ASN1_OCTET_STRING_new())) {
155
		PKCS12err(PKCS12_F_PKCS12_PACK_P7DATA, ERR_R_MALLOC_FAILURE);
156
		goto err;
157
	}
158
159
	if (!ASN1_item_pack(sk, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), &p7->d.data)) {
160
		PKCS12err(PKCS12_F_PKCS12_PACK_P7DATA,
161
		    PKCS12_R_CANT_PACK_STRUCTURE);
162
		goto err;
163
	}
164
	return p7;
165
166
err:
167
	PKCS7_free(p7);
168
	return NULL;
169
}
170
171
/* Unpack SAFEBAGS from PKCS#7 data ContentInfo */
172
STACK_OF(PKCS12_SAFEBAG) *
173
PKCS12_unpack_p7data(PKCS7 *p7)
174
{
175
	if (!PKCS7_type_is_data(p7)) {
176
		PKCS12err(PKCS12_F_PKCS12_UNPACK_P7DATA,
177
		    PKCS12_R_CONTENT_TYPE_NOT_DATA);
178
		return NULL;
179
	}
180
	return ASN1_item_unpack(p7->d.data, ASN1_ITEM_rptr(PKCS12_SAFEBAGS));
181
}
182
183
/* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
184
185
PKCS7 *
186
PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
187
    unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags)
188
{
189
	PKCS7 *p7;
190
	X509_ALGOR *pbe;
191
	const EVP_CIPHER *pbe_ciph;
192
193
	if (!(p7 = PKCS7_new())) {
194
		PKCS12err(PKCS12_F_PKCS12_PACK_P7ENCDATA, ERR_R_MALLOC_FAILURE);
195
		return NULL;
196
	}
197
	if (!PKCS7_set_type(p7, NID_pkcs7_encrypted)) {
198
		PKCS12err(PKCS12_F_PKCS12_PACK_P7ENCDATA,
199
		    PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE);
200
		goto err;
201
	}
202
203
	pbe_ciph = EVP_get_cipherbynid(pbe_nid);
204
205
	if (pbe_ciph)
206
		pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
207
	else
208
		pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
209
210
	if (!pbe) {
211
		PKCS12err(PKCS12_F_PKCS12_PACK_P7ENCDATA, ERR_R_MALLOC_FAILURE);
212
		goto err;
213
	}
214
	X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
215
	p7->d.encrypted->enc_data->algorithm = pbe;
216
	ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
217
	if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt(
218
	    pbe, ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen, bags, 1))) {
219
		PKCS12err(PKCS12_F_PKCS12_PACK_P7ENCDATA,
220
		    PKCS12_R_ENCRYPT_ERROR);
221
		goto err;
222
	}
223
224
	return p7;
225
226
err:
227
	PKCS7_free(p7);
228
	return NULL;
229
}
230
231
STACK_OF(PKCS12_SAFEBAG) *
232
PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
233
{
234
	if (!PKCS7_type_is_encrypted(p7))
235
		return NULL;
236
	return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
237
	    ASN1_ITEM_rptr(PKCS12_SAFEBAGS), pass, passlen,
238
	    p7->d.encrypted->enc_data->enc_data, 1);
239
}
240
241
PKCS8_PRIV_KEY_INFO *
242
PKCS12_decrypt_skey(PKCS12_SAFEBAG *bag, const char *pass, int passlen)
243
{
244
	return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
245
}
246
247
int
248
PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes)
249
{
250
	if (ASN1_item_pack(safes, ASN1_ITEM_rptr(PKCS12_AUTHSAFES),
251
	    &p12->authsafes->d.data))
252
		return 1;
253
	return 0;
254
}
255
256
STACK_OF(PKCS7) *
257
PKCS12_unpack_authsafes(PKCS12 *p12)
258
{
259
	if (!PKCS7_type_is_data(p12->authsafes)) {
260
		PKCS12err(PKCS12_F_PKCS12_UNPACK_AUTHSAFES,
261
		    PKCS12_R_CONTENT_TYPE_NOT_DATA);
262
		return NULL;
263
	}
264
	return ASN1_item_unpack(p12->authsafes->d.data,
265
	    ASN1_ITEM_rptr(PKCS12_AUTHSAFES));
266
}