#include <stdio.h>
#include <openssl/asn1.h>
#include <openssl/objects.h>
#include <openssl/pkcs7.h>
#include <openssl/x509.h>
#include "asn1_local.h"
#include "err_local.h"
#include "x509_local.h"
int
PKCS7_add_attrib_smimecap(PKCS7_SIGNER_INFO *si, STACK_OF(X509_ALGOR) *cap)
{
ASN1_STRING *seq = NULL;
unsigned char *data = NULL;
int len = 0;
int ret = 0;
if ((len = i2d_X509_ALGORS(cap, &data)) <= 0) {
len = 0;
goto err;
}
if ((seq = ASN1_STRING_new()) == NULL) {
PKCS7error(ERR_R_MALLOC_FAILURE);
goto err;
}
ASN1_STRING_set0(seq, data, len);
data = NULL;
len = 0;
if (!PKCS7_add_signed_attribute(si, NID_SMIMECapabilities,
V_ASN1_SEQUENCE, seq))
goto err;
seq = NULL;
ret = 1;
err:
ASN1_STRING_free(seq);
freezero(data, len);
return ret;
}
LCRYPTO_ALIAS(PKCS7_add_attrib_smimecap);
STACK_OF(X509_ALGOR) *
PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si)
{
ASN1_TYPE *cap;
const unsigned char *p;
int len;
if ((cap = PKCS7_get_signed_attribute(si, NID_SMIMECapabilities)) == NULL)
return NULL;
if (cap->type != V_ASN1_SEQUENCE)
return NULL;
p = cap->value.sequence->data;
len = cap->value.sequence->length;
return d2i_X509_ALGORS(NULL, &p, len);
}
LCRYPTO_ALIAS(PKCS7_get_smimecap);
int
PKCS7_simple_smimecap(STACK_OF(X509_ALGOR) *sk, int nid, int keysize)
{
X509_ALGOR *alg = NULL;
ASN1_INTEGER *parameter = NULL;
int parameter_type = V_ASN1_UNDEF;
int ret = 0;
if (keysize > 0) {
if ((parameter = ASN1_INTEGER_new()) == NULL)
goto err;
if (!ASN1_INTEGER_set(parameter, keysize))
goto err;
parameter_type = V_ASN1_INTEGER;
}
if ((alg = X509_ALGOR_new()) == NULL)
goto err;
if (!X509_ALGOR_set0_by_nid(alg, nid, parameter_type, parameter))
goto err;
parameter = NULL;
if (sk_X509_ALGOR_push(sk, alg) <= 0)
goto err;
alg = NULL;
ret = 1;
err:
X509_ALGOR_free(alg);
ASN1_INTEGER_free(parameter);
return ret;
}
LCRYPTO_ALIAS(PKCS7_simple_smimecap);
int
PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid)
{
if (PKCS7_get_signed_attribute(si, NID_pkcs9_contentType))
return 0;
if (!coid)
coid = OBJ_nid2obj(NID_pkcs7_data);
return PKCS7_add_signed_attribute(si, NID_pkcs9_contentType,
V_ASN1_OBJECT, coid);
}
LCRYPTO_ALIAS(PKCS7_add_attrib_content_type);
int
PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t)
{
ASN1_TIME *tm;
int ret = 0;
if ((tm = t) == NULL)
tm = X509_gmtime_adj(NULL, 0);
if (tm == NULL) {
PKCS7error(ERR_R_MALLOC_FAILURE);
goto err;
}
if (ASN1_time_parse(tm->data, tm->length, NULL, tm->type) == -1)
goto err;
if (!PKCS7_add_signed_attribute(si, NID_pkcs9_signingTime, tm->type, tm))
goto err;
tm = NULL;
ret = 1;
err:
if (tm != t)
ASN1_TIME_free(tm);
return ret;
}
LCRYPTO_ALIAS(PKCS7_add0_attrib_signing_time);
int
PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si, const unsigned char *md,
int md_len)
{
ASN1_OCTET_STRING *os;
int ret = 0;
if ((os = ASN1_OCTET_STRING_new()) == NULL)
goto err;
if (!ASN1_STRING_set(os, md, md_len))
goto err;
if (!PKCS7_add_signed_attribute(si, NID_pkcs9_messageDigest,
V_ASN1_OCTET_STRING, os))
goto err;
os = NULL;
ret = 1;
err:
ASN1_OCTET_STRING_free(os);
return ret;
}
LCRYPTO_ALIAS(PKCS7_add1_attrib_digest);