pineapple-src/externals/libressl/crypto/cms/cms_asn1.c

1628 lines
42 KiB
C
Raw Normal View History

2020-12-28 15:15:37 +00:00
/* $OpenBSD: cms_asn1.c,v 1.18 2019/08/11 10:43:57 jsing Exp $ */
/*
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
* project.
*/
/* ====================================================================
* Copyright (c) 2008 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* licensing@OpenSSL.org.
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*/
#include <openssl/asn1t.h>
#include <openssl/pem.h>
#include <openssl/x509v3.h>
#include <openssl/cms.h>
#include "cms_lcl.h"
static const ASN1_TEMPLATE CMS_IssuerAndSerialNumber_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_IssuerAndSerialNumber, issuer),
.field_name = "issuer",
.item = &X509_NAME_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_IssuerAndSerialNumber, serialNumber),
.field_name = "serialNumber",
.item = &ASN1_INTEGER_it,
},
};
const ASN1_ITEM CMS_IssuerAndSerialNumber_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_IssuerAndSerialNumber_seq_tt,
.tcount = sizeof(CMS_IssuerAndSerialNumber_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_IssuerAndSerialNumber),
.sname = "CMS_IssuerAndSerialNumber",
};
static const ASN1_TEMPLATE CMS_OtherCertificateFormat_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OtherCertificateFormat, otherCertFormat),
.field_name = "otherCertFormat",
.item = &ASN1_OBJECT_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_OtherCertificateFormat, otherCert),
.field_name = "otherCert",
.item = &ASN1_ANY_it,
},
};
static const ASN1_ITEM CMS_OtherCertificateFormat_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_OtherCertificateFormat_seq_tt,
.tcount = sizeof(CMS_OtherCertificateFormat_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OtherCertificateFormat),
.sname = "CMS_OtherCertificateFormat",
};
static const ASN1_TEMPLATE CMS_CertificateChoices_ch_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_CertificateChoices, d.certificate),
.field_name = "d.certificate",
.item = &X509_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 0,
.offset = offsetof(CMS_CertificateChoices, d.extendedCertificate),
.field_name = "d.extendedCertificate",
.item = &ASN1_SEQUENCE_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 1,
.offset = offsetof(CMS_CertificateChoices, d.v1AttrCert),
.field_name = "d.v1AttrCert",
.item = &ASN1_SEQUENCE_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 2,
.offset = offsetof(CMS_CertificateChoices, d.v2AttrCert),
.field_name = "d.v2AttrCert",
.item = &ASN1_SEQUENCE_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 3,
.offset = offsetof(CMS_CertificateChoices, d.other),
.field_name = "d.other",
.item = &CMS_OtherCertificateFormat_it,
},
};
const ASN1_ITEM CMS_CertificateChoices_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_CertificateChoices, type),
.templates = CMS_CertificateChoices_ch_tt,
.tcount = sizeof(CMS_CertificateChoices_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_CertificateChoices),
.sname = "CMS_CertificateChoices",
};
static const ASN1_TEMPLATE CMS_SignerIdentifier_ch_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignerIdentifier, d.issuerAndSerialNumber),
.field_name = "d.issuerAndSerialNumber",
.item = &CMS_IssuerAndSerialNumber_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 0,
.offset = offsetof(CMS_SignerIdentifier, d.subjectKeyIdentifier),
.field_name = "d.subjectKeyIdentifier",
.item = &ASN1_OCTET_STRING_it,
},
};
static const ASN1_ITEM CMS_SignerIdentifier_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_SignerIdentifier, type),
.templates = CMS_SignerIdentifier_ch_tt,
.tcount = sizeof(CMS_SignerIdentifier_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_SignerIdentifier),
.sname = "CMS_SignerIdentifier",
};
static const ASN1_TEMPLATE CMS_EncapsulatedContentInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EncapsulatedContentInfo, eContentType),
.field_name = "eContentType",
.item = &ASN1_OBJECT_it,
},
{
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_EncapsulatedContentInfo, eContent),
.field_name = "eContent",
.item = &ASN1_OCTET_STRING_NDEF_it,
},
};
static const ASN1_ITEM CMS_EncapsulatedContentInfo_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_EncapsulatedContentInfo_seq_tt,
.tcount = sizeof(CMS_EncapsulatedContentInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_EncapsulatedContentInfo),
.sname = "CMS_EncapsulatedContentInfo",
};
/* Minor tweak to operation: free up signer key, cert */
static int
cms_si_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg)
{
if (operation == ASN1_OP_FREE_POST) {
CMS_SignerInfo *si = (CMS_SignerInfo *)*pval;
EVP_PKEY_free(si->pkey);
X509_free(si->signer);
EVP_MD_CTX_free(si->mctx);
}
return 1;
}
static const ASN1_AUX CMS_SignerInfo_aux = {
.app_data = NULL,
.flags = 0,
.ref_offset = 0,
.ref_lock = 0,
.asn1_cb = cms_si_cb,
.enc_offset = 0,
};
static const ASN1_TEMPLATE CMS_SignerInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignerInfo, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignerInfo, sid),
.field_name = "sid",
.item = &CMS_SignerIdentifier_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignerInfo, digestAlgorithm),
.field_name = "digestAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_SignerInfo, signedAttrs),
.field_name = "signedAttrs",
.item = &X509_ATTRIBUTE_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignerInfo, signatureAlgorithm),
.field_name = "signatureAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignerInfo, signature),
.field_name = "signature",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 1,
.offset = offsetof(CMS_SignerInfo, unsignedAttrs),
.field_name = "unsignedAttrs",
.item = &X509_ATTRIBUTE_it,
},
};
const ASN1_ITEM CMS_SignerInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_SignerInfo_seq_tt,
.tcount = sizeof(CMS_SignerInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = &CMS_SignerInfo_aux,
.size = sizeof(CMS_SignerInfo),
.sname = "CMS_SignerInfo",
};
static const ASN1_TEMPLATE CMS_OtherRevocationInfoFormat_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OtherRevocationInfoFormat, otherRevInfoFormat),
.field_name = "otherRevInfoFormat",
.item = &ASN1_OBJECT_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_OtherRevocationInfoFormat, otherRevInfo),
.field_name = "otherRevInfo",
.item = &ASN1_ANY_it,
},
};
static const ASN1_ITEM CMS_OtherRevocationInfoFormat_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_OtherRevocationInfoFormat_seq_tt,
.tcount = sizeof(CMS_OtherRevocationInfoFormat_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OtherRevocationInfoFormat),
.sname = "CMS_OtherRevocationInfoFormat",
};
static const ASN1_TEMPLATE CMS_RevocationInfoChoice_ch_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_RevocationInfoChoice, d.crl),
.field_name = "d.crl",
.item = &X509_CRL_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 1,
.offset = offsetof(CMS_RevocationInfoChoice, d.other),
.field_name = "d.other",
.item = &CMS_OtherRevocationInfoFormat_it,
},
};
const ASN1_ITEM CMS_RevocationInfoChoice_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_RevocationInfoChoice, type),
.templates = CMS_RevocationInfoChoice_ch_tt,
.tcount = sizeof(CMS_RevocationInfoChoice_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_RevocationInfoChoice),
.sname = "CMS_RevocationInfoChoice",
};
static const ASN1_TEMPLATE CMS_SignedData_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignedData, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = ASN1_TFLG_SET_OF,
.tag = 0,
.offset = offsetof(CMS_SignedData, digestAlgorithms),
.field_name = "digestAlgorithms",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SignedData, encapContentInfo),
.field_name = "encapContentInfo",
.item = &CMS_EncapsulatedContentInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_SignedData, certificates),
.field_name = "certificates",
.item = &CMS_CertificateChoices_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 1,
.offset = offsetof(CMS_SignedData, crls),
.field_name = "crls",
.item = &CMS_RevocationInfoChoice_it,
},
{
.flags = ASN1_TFLG_SET_OF,
.tag = 0,
.offset = offsetof(CMS_SignedData, signerInfos),
.field_name = "signerInfos",
.item = &CMS_SignerInfo_it,
},
};
const ASN1_ITEM CMS_SignedData_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_SignedData_seq_tt,
.tcount = sizeof(CMS_SignedData_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_SignedData),
.sname = "CMS_SignedData",
};
static const ASN1_TEMPLATE CMS_OriginatorInfo_seq_tt[] = {
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_OriginatorInfo, certificates),
.field_name = "certificates",
.item = &CMS_CertificateChoices_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 1,
.offset = offsetof(CMS_OriginatorInfo, crls),
.field_name = "crls",
.item = &CMS_RevocationInfoChoice_it,
},
};
static const ASN1_ITEM CMS_OriginatorInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_OriginatorInfo_seq_tt,
.tcount = sizeof(CMS_OriginatorInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OriginatorInfo),
.sname = "CMS_OriginatorInfo",
};
static const ASN1_TEMPLATE CMS_EncryptedContentInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EncryptedContentInfo, contentType),
.field_name = "contentType",
.item = &ASN1_OBJECT_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EncryptedContentInfo, contentEncryptionAlgorithm),
.field_name = "contentEncryptionAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_EncryptedContentInfo, encryptedContent),
.field_name = "encryptedContent",
.item = &ASN1_OCTET_STRING_NDEF_it,
},
};
static const ASN1_ITEM CMS_EncryptedContentInfo_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_EncryptedContentInfo_seq_tt,
.tcount = sizeof(CMS_EncryptedContentInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_EncryptedContentInfo),
.sname = "CMS_EncryptedContentInfo",
};
static const ASN1_TEMPLATE CMS_KeyTransRecipientInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyTransRecipientInfo, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyTransRecipientInfo, rid),
.field_name = "rid",
.item = &CMS_SignerIdentifier_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyTransRecipientInfo, keyEncryptionAlgorithm),
.field_name = "keyEncryptionAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyTransRecipientInfo, encryptedKey),
.field_name = "encryptedKey",
.item = &ASN1_OCTET_STRING_it,
},
};
const ASN1_ITEM CMS_KeyTransRecipientInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_KeyTransRecipientInfo_seq_tt,
.tcount = sizeof(CMS_KeyTransRecipientInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_KeyTransRecipientInfo),
.sname = "CMS_KeyTransRecipientInfo",
};
static const ASN1_TEMPLATE CMS_OtherKeyAttribute_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OtherKeyAttribute, keyAttrId),
.field_name = "keyAttrId",
.item = &ASN1_OBJECT_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_OtherKeyAttribute, keyAttr),
.field_name = "keyAttr",
.item = &ASN1_ANY_it,
},
};
const ASN1_ITEM CMS_OtherKeyAttribute_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_OtherKeyAttribute_seq_tt,
.tcount = sizeof(CMS_OtherKeyAttribute_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OtherKeyAttribute),
.sname = "CMS_OtherKeyAttribute",
};
static const ASN1_TEMPLATE CMS_RecipientKeyIdentifier_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_RecipientKeyIdentifier, subjectKeyIdentifier),
.field_name = "subjectKeyIdentifier",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_RecipientKeyIdentifier, date),
.field_name = "date",
.item = &ASN1_GENERALIZEDTIME_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_RecipientKeyIdentifier, other),
.field_name = "other",
.item = &CMS_OtherKeyAttribute_it,
},
};
const ASN1_ITEM CMS_RecipientKeyIdentifier_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_RecipientKeyIdentifier_seq_tt,
.tcount = sizeof(CMS_RecipientKeyIdentifier_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_RecipientKeyIdentifier),
.sname = "CMS_RecipientKeyIdentifier",
};
static const ASN1_TEMPLATE CMS_KeyAgreeRecipientIdentifier_ch_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyAgreeRecipientIdentifier, d.issuerAndSerialNumber),
.field_name = "d.issuerAndSerialNumber",
.item = &CMS_IssuerAndSerialNumber_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 0,
.offset = offsetof(CMS_KeyAgreeRecipientIdentifier, d.rKeyId),
.field_name = "d.rKeyId",
.item = &CMS_RecipientKeyIdentifier_it,
},
};
static const ASN1_ITEM CMS_KeyAgreeRecipientIdentifier_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_KeyAgreeRecipientIdentifier, type),
.templates = CMS_KeyAgreeRecipientIdentifier_ch_tt,
.tcount = sizeof(CMS_KeyAgreeRecipientIdentifier_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_KeyAgreeRecipientIdentifier),
.sname = "CMS_KeyAgreeRecipientIdentifier",
};
static int
cms_rek_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg)
{
CMS_RecipientEncryptedKey *rek = (CMS_RecipientEncryptedKey *)*pval;
if (operation == ASN1_OP_FREE_POST) {
EVP_PKEY_free(rek->pkey);
}
return 1;
}
static const ASN1_AUX CMS_RecipientEncryptedKey_aux = {
.app_data = NULL,
.flags = 0,
.ref_offset = 0,
.ref_lock = 0,
.asn1_cb = cms_rek_cb,
.enc_offset = 0,
};
static const ASN1_TEMPLATE CMS_RecipientEncryptedKey_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_RecipientEncryptedKey, rid),
.field_name = "rid",
.item = &CMS_KeyAgreeRecipientIdentifier_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_RecipientEncryptedKey, encryptedKey),
.field_name = "encryptedKey",
.item = &ASN1_OCTET_STRING_it,
},
};
const ASN1_ITEM CMS_RecipientEncryptedKey_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_RecipientEncryptedKey_seq_tt,
.tcount = sizeof(CMS_RecipientEncryptedKey_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = &CMS_RecipientEncryptedKey_aux,
.size = sizeof(CMS_RecipientEncryptedKey),
.sname = "CMS_RecipientEncryptedKey",
};
static const ASN1_TEMPLATE CMS_OriginatorPublicKey_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OriginatorPublicKey, algorithm),
.field_name = "algorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OriginatorPublicKey, publicKey),
.field_name = "publicKey",
.item = &ASN1_BIT_STRING_it,
},
};
const ASN1_ITEM CMS_OriginatorPublicKey_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_OriginatorPublicKey_seq_tt,
.tcount = sizeof(CMS_OriginatorPublicKey_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OriginatorPublicKey),
.sname = "CMS_OriginatorPublicKey",
};
static const ASN1_TEMPLATE CMS_OriginatorIdentifierOrKey_ch_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OriginatorIdentifierOrKey, d.issuerAndSerialNumber),
.field_name = "d.issuerAndSerialNumber",
.item = &CMS_IssuerAndSerialNumber_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 0,
.offset = offsetof(CMS_OriginatorIdentifierOrKey, d.subjectKeyIdentifier),
.field_name = "d.subjectKeyIdentifier",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 1,
.offset = offsetof(CMS_OriginatorIdentifierOrKey, d.originatorKey),
.field_name = "d.originatorKey",
.item = &CMS_OriginatorPublicKey_it,
},
};
static const ASN1_ITEM CMS_OriginatorIdentifierOrKey_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_OriginatorIdentifierOrKey, type),
.templates = CMS_OriginatorIdentifierOrKey_ch_tt,
.tcount = sizeof(CMS_OriginatorIdentifierOrKey_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OriginatorIdentifierOrKey),
.sname = "CMS_OriginatorIdentifierOrKey",
};
static int
cms_kari_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg)
{
CMS_KeyAgreeRecipientInfo *kari = (CMS_KeyAgreeRecipientInfo *)*pval;
if (operation == ASN1_OP_NEW_POST) {
kari->ctx = EVP_CIPHER_CTX_new();
if (kari->ctx == NULL)
return 0;
EVP_CIPHER_CTX_set_flags(kari->ctx, EVP_CIPHER_CTX_FLAG_WRAP_ALLOW);
kari->pctx = NULL;
} else if (operation == ASN1_OP_FREE_POST) {
EVP_PKEY_CTX_free(kari->pctx);
EVP_CIPHER_CTX_free(kari->ctx);
}
return 1;
}
static const ASN1_AUX CMS_KeyAgreeRecipientInfo_aux = {
.app_data = NULL,
.flags = 0,
.ref_offset = 0,
.ref_lock = 0,
.asn1_cb = cms_kari_cb,
.enc_offset = 0,
};
static const ASN1_TEMPLATE CMS_KeyAgreeRecipientInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyAgreeRecipientInfo, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = ASN1_TFLG_EXPLICIT,
.tag = 0,
.offset = offsetof(CMS_KeyAgreeRecipientInfo, originator),
.field_name = "originator",
.item = &CMS_OriginatorIdentifierOrKey_it,
},
{
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 1,
.offset = offsetof(CMS_KeyAgreeRecipientInfo, ukm),
.field_name = "ukm",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KeyAgreeRecipientInfo, keyEncryptionAlgorithm),
.field_name = "keyEncryptionAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = ASN1_TFLG_SEQUENCE_OF,
.tag = 0,
.offset = offsetof(CMS_KeyAgreeRecipientInfo, recipientEncryptedKeys),
.field_name = "recipientEncryptedKeys",
.item = &CMS_RecipientEncryptedKey_it,
},
};
const ASN1_ITEM CMS_KeyAgreeRecipientInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_KeyAgreeRecipientInfo_seq_tt,
.tcount = sizeof(CMS_KeyAgreeRecipientInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = &CMS_KeyAgreeRecipientInfo_aux,
.size = sizeof(CMS_KeyAgreeRecipientInfo),
.sname = "CMS_KeyAgreeRecipientInfo",
};
static const ASN1_TEMPLATE CMS_KEKIdentifier_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KEKIdentifier, keyIdentifier),
.field_name = "keyIdentifier",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_KEKIdentifier, date),
.field_name = "date",
.item = &ASN1_GENERALIZEDTIME_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_KEKIdentifier, other),
.field_name = "other",
.item = &CMS_OtherKeyAttribute_it,
},
};
static const ASN1_ITEM CMS_KEKIdentifier_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_KEKIdentifier_seq_tt,
.tcount = sizeof(CMS_KEKIdentifier_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_KEKIdentifier),
.sname = "CMS_KEKIdentifier",
};
static const ASN1_TEMPLATE CMS_KEKRecipientInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KEKRecipientInfo, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KEKRecipientInfo, kekid),
.field_name = "kekid",
.item = &CMS_KEKIdentifier_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KEKRecipientInfo, keyEncryptionAlgorithm),
.field_name = "keyEncryptionAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_KEKRecipientInfo, encryptedKey),
.field_name = "encryptedKey",
.item = &ASN1_OCTET_STRING_it,
},
};
const ASN1_ITEM CMS_KEKRecipientInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_KEKRecipientInfo_seq_tt,
.tcount = sizeof(CMS_KEKRecipientInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_KEKRecipientInfo),
.sname = "CMS_KEKRecipientInfo",
};
static const ASN1_TEMPLATE CMS_PasswordRecipientInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_PasswordRecipientInfo, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_PasswordRecipientInfo, keyDerivationAlgorithm),
.field_name = "keyDerivationAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_PasswordRecipientInfo, keyEncryptionAlgorithm),
.field_name = "keyEncryptionAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_PasswordRecipientInfo, encryptedKey),
.field_name = "encryptedKey",
.item = &ASN1_OCTET_STRING_it,
},
};
const ASN1_ITEM CMS_PasswordRecipientInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_PasswordRecipientInfo_seq_tt,
.tcount = sizeof(CMS_PasswordRecipientInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_PasswordRecipientInfo),
.sname = "CMS_PasswordRecipientInfo",
};
static const ASN1_TEMPLATE CMS_OtherRecipientInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_OtherRecipientInfo, oriType),
.field_name = "oriType",
.item = &ASN1_OBJECT_it,
},
{
.flags = ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_OtherRecipientInfo, oriValue),
.field_name = "oriValue",
.item = &ASN1_ANY_it,
},
};
static const ASN1_ITEM CMS_OtherRecipientInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_OtherRecipientInfo_seq_tt,
.tcount = sizeof(CMS_OtherRecipientInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_OtherRecipientInfo),
.sname = "CMS_OtherRecipientInfo",
};
/* Free up RecipientInfo additional data */
static int
cms_ri_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg)
{
if (operation == ASN1_OP_FREE_PRE) {
CMS_RecipientInfo *ri = (CMS_RecipientInfo *)*pval;
if (ri->type == CMS_RECIPINFO_TRANS) {
CMS_KeyTransRecipientInfo *ktri = ri->d.ktri;
EVP_PKEY_free(ktri->pkey);
X509_free(ktri->recip);
EVP_PKEY_CTX_free(ktri->pctx);
} else if (ri->type == CMS_RECIPINFO_KEK) {
CMS_KEKRecipientInfo *kekri = ri->d.kekri;
freezero(kekri->key, kekri->keylen);
} else if (ri->type == CMS_RECIPINFO_PASS) {
CMS_PasswordRecipientInfo *pwri = ri->d.pwri;
freezero(pwri->pass, pwri->passlen);
}
}
return 1;
}
static const ASN1_AUX CMS_RecipientInfo_aux = {
.app_data = NULL,
.flags = 0,
.ref_offset = 0,
.ref_lock = 0,
.asn1_cb = cms_ri_cb,
.enc_offset = 0,
};
static const ASN1_TEMPLATE CMS_RecipientInfo_ch_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_RecipientInfo, d.ktri),
.field_name = "d.ktri",
.item = &CMS_KeyTransRecipientInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 1,
.offset = offsetof(CMS_RecipientInfo, d.kari),
.field_name = "d.kari",
.item = &CMS_KeyAgreeRecipientInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 2,
.offset = offsetof(CMS_RecipientInfo, d.kekri),
.field_name = "d.kekri",
.item = &CMS_KEKRecipientInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 3,
.offset = offsetof(CMS_RecipientInfo, d.pwri),
.field_name = "d.pwri",
.item = &CMS_PasswordRecipientInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 4,
.offset = offsetof(CMS_RecipientInfo, d.ori),
.field_name = "d.ori",
.item = &CMS_OtherRecipientInfo_it,
},
};
const ASN1_ITEM CMS_RecipientInfo_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_RecipientInfo, type),
.templates = CMS_RecipientInfo_ch_tt,
.tcount = sizeof(CMS_RecipientInfo_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = &CMS_RecipientInfo_aux,
.size = sizeof(CMS_RecipientInfo),
.sname = "CMS_RecipientInfo",
};
static const ASN1_TEMPLATE CMS_EnvelopedData_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EnvelopedData, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_EnvelopedData, originatorInfo),
.field_name = "originatorInfo",
.item = &CMS_OriginatorInfo_it,
},
{
.flags = ASN1_TFLG_SET_OF,
.tag = 0,
.offset = offsetof(CMS_EnvelopedData, recipientInfos),
.field_name = "recipientInfos",
.item = &CMS_RecipientInfo_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EnvelopedData, encryptedContentInfo),
.field_name = "encryptedContentInfo",
.item = &CMS_EncryptedContentInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 1,
.offset = offsetof(CMS_EnvelopedData, unprotectedAttrs),
.field_name = "unprotectedAttrs",
.item = &X509_ATTRIBUTE_it,
},
};
const ASN1_ITEM CMS_EnvelopedData_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_EnvelopedData_seq_tt,
.tcount = sizeof(CMS_EnvelopedData_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_EnvelopedData),
.sname = "CMS_EnvelopedData",
};
static const ASN1_TEMPLATE CMS_DigestedData_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_DigestedData, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_DigestedData, digestAlgorithm),
.field_name = "digestAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_DigestedData, encapContentInfo),
.field_name = "encapContentInfo",
.item = &CMS_EncapsulatedContentInfo_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_DigestedData, digest),
.field_name = "digest",
.item = &ASN1_OCTET_STRING_it,
},
};
const ASN1_ITEM CMS_DigestedData_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_DigestedData_seq_tt,
.tcount = sizeof(CMS_DigestedData_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_DigestedData),
.sname = "CMS_DigestedData",
};
static const ASN1_TEMPLATE CMS_EncryptedData_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EncryptedData, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_EncryptedData, encryptedContentInfo),
.field_name = "encryptedContentInfo",
.item = &CMS_EncryptedContentInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 1,
.offset = offsetof(CMS_EncryptedData, unprotectedAttrs),
.field_name = "unprotectedAttrs",
.item = &X509_ATTRIBUTE_it,
},
};
const ASN1_ITEM CMS_EncryptedData_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_EncryptedData_seq_tt,
.tcount = sizeof(CMS_EncryptedData_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_EncryptedData),
.sname = "CMS_EncryptedData",
};
static const ASN1_TEMPLATE CMS_AuthenticatedData_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_AuthenticatedData, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_AuthenticatedData, originatorInfo),
.field_name = "originatorInfo",
.item = &CMS_OriginatorInfo_it,
},
{
.flags = ASN1_TFLG_SET_OF,
.tag = 0,
.offset = offsetof(CMS_AuthenticatedData, recipientInfos),
.field_name = "recipientInfos",
.item = &CMS_RecipientInfo_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_AuthenticatedData, macAlgorithm),
.field_name = "macAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 1,
.offset = offsetof(CMS_AuthenticatedData, digestAlgorithm),
.field_name = "digestAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_AuthenticatedData, encapContentInfo),
.field_name = "encapContentInfo",
.item = &CMS_EncapsulatedContentInfo_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 2,
.offset = offsetof(CMS_AuthenticatedData, authAttrs),
.field_name = "authAttrs",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_AuthenticatedData, mac),
.field_name = "mac",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SET_OF | ASN1_TFLG_OPTIONAL,
.tag = 3,
.offset = offsetof(CMS_AuthenticatedData, unauthAttrs),
.field_name = "unauthAttrs",
.item = &X509_ALGOR_it,
},
};
static const ASN1_ITEM CMS_AuthenticatedData_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_AuthenticatedData_seq_tt,
.tcount = sizeof(CMS_AuthenticatedData_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_AuthenticatedData),
.sname = "CMS_AuthenticatedData",
};
static const ASN1_TEMPLATE CMS_CompressedData_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_CompressedData, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_CompressedData, compressionAlgorithm),
.field_name = "compressionAlgorithm",
.item = &X509_ALGOR_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_CompressedData, encapContentInfo),
.field_name = "encapContentInfo",
.item = &CMS_EncapsulatedContentInfo_it,
},
};
const ASN1_ITEM CMS_CompressedData_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_CompressedData_seq_tt,
.tcount = sizeof(CMS_CompressedData_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_CompressedData),
.sname = "CMS_CompressedData",
};
/* This is the ANY DEFINED BY table for the top level ContentInfo structure */
static const ASN1_TEMPLATE cms_default_tt = {
.flags = ASN1_TFLG_EXPLICIT,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.other),
.field_name = "d.other",
.item = &ASN1_ANY_it,
};
static const ASN1_ADB_TABLE CMS_ContentInfo_adbtbl[] = {
{
.value = NID_pkcs7_data,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.data),
.field_name = "d.data",
.item = &ASN1_OCTET_STRING_NDEF_it,
},
},
{
.value = NID_pkcs7_signed,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.signedData),
.field_name = "d.signedData",
.item = &CMS_SignedData_it,
},
},
{
.value = NID_pkcs7_enveloped,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.envelopedData),
.field_name = "d.envelopedData",
.item = &CMS_EnvelopedData_it,
},
},
{
.value = NID_pkcs7_digest,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.digestedData),
.field_name = "d.digestedData",
.item = &CMS_DigestedData_it,
},
},
{
.value = NID_pkcs7_encrypted,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.encryptedData),
.field_name = "d.encryptedData",
.item = &CMS_EncryptedData_it,
},
},
{
.value = NID_id_smime_ct_authData,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.authenticatedData),
.field_name = "d.authenticatedData",
.item = &CMS_AuthenticatedData_it,
},
},
{
.value = NID_id_smime_ct_compressedData,
.tt = {
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_NDEF,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, d.compressedData),
.field_name = "d.compressedData",
.item = &CMS_CompressedData_it,
},
},
};
static const ASN1_ADB CMS_ContentInfo_adb = {
.flags = 0,
.offset = offsetof(CMS_ContentInfo, contentType),
.app_items = 0,
.tbl = CMS_ContentInfo_adbtbl,
.tblcount = sizeof(CMS_ContentInfo_adbtbl) / sizeof(ASN1_ADB_TABLE),
.default_tt = &cms_default_tt,
.null_tt = NULL,
};
/* CMS streaming support */
static int
cms_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, void *exarg)
{
ASN1_STREAM_ARG *sarg = exarg;
CMS_ContentInfo *cms = NULL;
if (pval)
cms = (CMS_ContentInfo *)*pval;
else
return 1;
switch (operation) {
case ASN1_OP_STREAM_PRE:
if (CMS_stream(&sarg->boundary, cms) <= 0)
return 0;
/* fall thru */
case ASN1_OP_DETACHED_PRE:
sarg->ndef_bio = CMS_dataInit(cms, sarg->out);
if (!sarg->ndef_bio)
return 0;
break;
case ASN1_OP_STREAM_POST:
case ASN1_OP_DETACHED_POST:
if (CMS_dataFinal(cms, sarg->ndef_bio) <= 0)
return 0;
break;
}
return 1;
}
static const ASN1_AUX CMS_ContentInfo_aux = {
.app_data = NULL,
.flags = 0,
.ref_offset = 0,
.ref_lock = 0,
.asn1_cb = cms_cb,
.enc_offset = 0,
};
static const ASN1_TEMPLATE CMS_ContentInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_ContentInfo, contentType),
.field_name = "contentType",
.item = &ASN1_OBJECT_it,
},
{
.flags = ASN1_TFLG_ADB_OID,
.tag = -1,
.offset = 0,
.field_name = "CMS_ContentInfo",
.item = (const ASN1_ITEM *)&CMS_ContentInfo_adb,
},
};
const ASN1_ITEM CMS_ContentInfo_it = {
.itype = ASN1_ITYPE_NDEF_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_ContentInfo_seq_tt,
.tcount = sizeof(CMS_ContentInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = &CMS_ContentInfo_aux,
.size = sizeof(CMS_ContentInfo),
.sname = "CMS_ContentInfo",
};
/* Specials for signed attributes */
/*
* When signing attributes we want to reorder them to match the sorted
* encoding.
*/
static const ASN1_TEMPLATE CMS_Attributes_Sign_item_tt = {
.flags = ASN1_TFLG_SET_ORDER,
.tag = 0,
.offset = 0,
.field_name = "CMS_ATTRIBUTES",
.item = &X509_ATTRIBUTE_it,
};
const ASN1_ITEM CMS_Attributes_Sign_it = {
.itype = ASN1_ITYPE_PRIMITIVE,
.utype = -1,
.templates = &CMS_Attributes_Sign_item_tt,
.tcount = 0,
.funcs = NULL,
.size = 0,
.sname = "CMS_Attributes_Sign",
};
/*
* When verifying attributes we need to use the received order. So we use
* SEQUENCE OF and tag it to SET OF
*/
static const ASN1_TEMPLATE CMS_Attributes_Verify_item_tt = {
.flags = ASN1_TFLG_SEQUENCE_OF | ASN1_TFLG_IMPTAG | ASN1_TFLG_UNIVERSAL,
.tag = V_ASN1_SET,
.offset = 0,
.field_name = "CMS_ATTRIBUTES",
.item = &X509_ATTRIBUTE_it,
};
const ASN1_ITEM CMS_Attributes_Verify_it = {
.itype = ASN1_ITYPE_PRIMITIVE,
.utype = -1,
.templates = &CMS_Attributes_Verify_item_tt,
.tcount = 0,
.funcs = NULL,
.size = 0,
.sname = "CMS_Attributes_Verify",
};
static const ASN1_TEMPLATE CMS_ReceiptsFrom_ch_tt[] = {
{
.flags = ASN1_TFLG_IMPLICIT,
.tag = 0,
.offset = offsetof(CMS_ReceiptsFrom, d.allOrFirstTier),
.field_name = "d.allOrFirstTier",
.item = &LONG_it,
},
{
.flags = ASN1_TFLG_IMPLICIT | ASN1_TFLG_SEQUENCE_OF,
.tag = 1,
.offset = offsetof(CMS_ReceiptsFrom, d.receiptList),
.field_name = "d.receiptList",
.item = &GENERAL_NAMES_it,
},
};
static const ASN1_ITEM CMS_ReceiptsFrom_it = {
.itype = ASN1_ITYPE_CHOICE,
.utype = offsetof(CMS_ReceiptsFrom, type),
.templates = CMS_ReceiptsFrom_ch_tt,
.tcount = sizeof(CMS_ReceiptsFrom_ch_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_ReceiptsFrom),
.sname = "CMS_ReceiptsFrom",
};
static const ASN1_TEMPLATE CMS_ReceiptRequest_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_ReceiptRequest, signedContentIdentifier),
.field_name = "signedContentIdentifier",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_ReceiptRequest, receiptsFrom),
.field_name = "receiptsFrom",
.item = &CMS_ReceiptsFrom_it,
},
{
.flags = ASN1_TFLG_SEQUENCE_OF,
.tag = 0,
.offset = offsetof(CMS_ReceiptRequest, receiptsTo),
.field_name = "receiptsTo",
.item = &GENERAL_NAMES_it,
},
};
const ASN1_ITEM CMS_ReceiptRequest_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_ReceiptRequest_seq_tt,
.tcount = sizeof(CMS_ReceiptRequest_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_ReceiptRequest),
.sname = "CMS_ReceiptRequest",
};
static const ASN1_TEMPLATE CMS_Receipt_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_Receipt, version),
.field_name = "version",
.item = &LONG_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_Receipt, contentType),
.field_name = "contentType",
.item = &ASN1_OBJECT_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_Receipt, signedContentIdentifier),
.field_name = "signedContentIdentifier",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_Receipt, originatorSignatureValue),
.field_name = "originatorSignatureValue",
.item = &ASN1_OCTET_STRING_it,
},
};
const ASN1_ITEM CMS_Receipt_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_Receipt_seq_tt,
.tcount = sizeof(CMS_Receipt_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_Receipt),
.sname = "CMS_Receipt",
};
/*
* Utilities to encode the CMS_SharedInfo structure used during key
* derivation.
*/
typedef struct {
X509_ALGOR *keyInfo;
ASN1_OCTET_STRING *entityUInfo;
ASN1_OCTET_STRING *suppPubInfo;
} CMS_SharedInfo;
static const ASN1_TEMPLATE CMS_SharedInfo_seq_tt[] = {
{
.flags = 0,
.tag = 0,
.offset = offsetof(CMS_SharedInfo, keyInfo),
.field_name = "keyInfo",
.item = &X509_ALGOR_it,
},
{
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 0,
.offset = offsetof(CMS_SharedInfo, entityUInfo),
.field_name = "entityUInfo",
.item = &ASN1_OCTET_STRING_it,
},
{
.flags = ASN1_TFLG_EXPLICIT | ASN1_TFLG_OPTIONAL,
.tag = 2,
.offset = offsetof(CMS_SharedInfo, suppPubInfo),
.field_name = "suppPubInfo",
.item = &ASN1_OCTET_STRING_it,
},
};
static const ASN1_ITEM CMS_SharedInfo_it = {
.itype = ASN1_ITYPE_SEQUENCE,
.utype = V_ASN1_SEQUENCE,
.templates = CMS_SharedInfo_seq_tt,
.tcount = sizeof(CMS_SharedInfo_seq_tt) / sizeof(ASN1_TEMPLATE),
.funcs = NULL,
.size = sizeof(CMS_SharedInfo),
.sname = "CMS_SharedInfo",
};
int
CMS_SharedInfo_encode(unsigned char **pder, X509_ALGOR *kekalg,
ASN1_OCTET_STRING *ukm, int keylen)
{
union {
CMS_SharedInfo *pecsi;
ASN1_VALUE *a;
} intsi = {
NULL
};
ASN1_OCTET_STRING oklen;
unsigned char kl[4];
CMS_SharedInfo ecsi;
keylen <<= 3;
kl[0] = (keylen >> 24) & 0xff;
kl[1] = (keylen >> 16) & 0xff;
kl[2] = (keylen >> 8) & 0xff;
kl[3] = keylen & 0xff;
oklen.length = 4;
oklen.data = kl;
oklen.type = V_ASN1_OCTET_STRING;
oklen.flags = 0;
ecsi.keyInfo = kekalg;
ecsi.entityUInfo = ukm;
ecsi.suppPubInfo = &oklen;
intsi.pecsi = &ecsi;
return ASN1_item_i2d(intsi.a, pder, &CMS_SharedInfo_it);
}