Coverage Report

Created: 2022-08-24 06:31

/src/libressl/crypto/pkcs12/p12_add.c
Line
Count
Source (jump to first uncovered line)
1
/* $OpenBSD: p12_add.c,v 1.18 2022/08/03 20:16:06 tb Exp $ */
2
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3
 * project 1999.
4
 */
5
/* ====================================================================
6
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
7
 *
8
 * Redistribution and use in source and binary forms, with or without
9
 * modification, are permitted provided that the following conditions
10
 * are met:
11
 *
12
 * 1. Redistributions of source code must retain the above copyright
13
 *    notice, this list of conditions and the following disclaimer.
14
 *
15
 * 2. Redistributions in binary form must reproduce the above copyright
16
 *    notice, this list of conditions and the following disclaimer in
17
 *    the documentation and/or other materials provided with the
18
 *    distribution.
19
 *
20
 * 3. All advertising materials mentioning features or use of this
21
 *    software must display the following acknowledgment:
22
 *    "This product includes software developed by the OpenSSL Project
23
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24
 *
25
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26
 *    endorse or promote products derived from this software without
27
 *    prior written permission. For written permission, please contact
28
 *    licensing@OpenSSL.org.
29
 *
30
 * 5. Products derived from this software may not be called "OpenSSL"
31
 *    nor may "OpenSSL" appear in their names without prior written
32
 *    permission of the OpenSSL Project.
33
 *
34
 * 6. Redistributions of any form whatsoever must retain the following
35
 *    acknowledgment:
36
 *    "This product includes software developed by the OpenSSL Project
37
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38
 *
39
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50
 * OF THE POSSIBILITY OF SUCH DAMAGE.
51
 * ====================================================================
52
 *
53
 * This product includes cryptographic software written by Eric Young
54
 * (eay@cryptsoft.com).  This product includes software written by Tim
55
 * Hudson (tjh@cryptsoft.com).
56
 *
57
 */
58
59
#include <stdio.h>
60
61
#include <openssl/err.h>
62
#include <openssl/pkcs12.h>
63
64
/* Pack an object into an OCTET STRING and turn into a safebag */
65
66
PKCS12_SAFEBAG *
67
PKCS12_item_pack_safebag(void *obj, const ASN1_ITEM *it, int nid1, int nid2)
68
0
{
69
0
  PKCS12_BAGS *bag;
70
0
  PKCS12_SAFEBAG *safebag;
71
72
0
  if (!(bag = PKCS12_BAGS_new())) {
73
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
74
0
    return NULL;
75
0
  }
76
0
  bag->type = OBJ_nid2obj(nid1);
77
0
  if (!ASN1_item_pack(obj, it, &bag->value.octet)) {
78
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
79
0
    PKCS12_BAGS_free(bag);
80
0
    return NULL;
81
0
  }
82
0
  if (!(safebag = PKCS12_SAFEBAG_new())) {
83
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
84
0
    PKCS12_BAGS_free(bag);
85
0
    return NULL;
86
0
  }
87
0
  safebag->value.bag = bag;
88
0
  safebag->type = OBJ_nid2obj(nid2);
89
0
  return safebag;
90
0
}
91
92
#if !defined(LIBRESSL_NEXT_API)
93
#undef PKCS12_MAKE_KEYBAG
94
#undef PKCS12_MAKE_SHKEYBAG
95
/* Turn PKCS8 object into a keybag */
96
97
PKCS12_SAFEBAG *
98
PKCS12_MAKE_KEYBAG(PKCS8_PRIV_KEY_INFO *p8)
99
0
{
100
0
  PKCS12_SAFEBAG *bag;
101
102
0
  if (!(bag = PKCS12_SAFEBAG_new())) {
103
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
104
0
    return NULL;
105
0
  }
106
0
  bag->type = OBJ_nid2obj(NID_keyBag);
107
0
  bag->value.keybag = p8;
108
0
  return bag;
109
0
}
110
111
/* Turn PKCS8 object into a shrouded keybag */
112
113
PKCS12_SAFEBAG *
114
PKCS12_MAKE_SHKEYBAG(int pbe_nid, const char *pass, int passlen,
115
    unsigned char *salt, int saltlen, int iter, PKCS8_PRIV_KEY_INFO *p8)
116
0
{
117
0
  PKCS12_SAFEBAG *bag;
118
0
  const EVP_CIPHER *pbe_ciph;
119
120
  /* Set up the safe bag */
121
0
  if (!(bag = PKCS12_SAFEBAG_new())) {
122
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
123
0
    return NULL;
124
0
  }
125
126
0
  bag->type = OBJ_nid2obj(NID_pkcs8ShroudedKeyBag);
127
128
0
  pbe_ciph = EVP_get_cipherbynid(pbe_nid);
129
130
0
  if (pbe_ciph)
131
0
    pbe_nid = -1;
132
133
0
  if (!(bag->value.shkeybag = PKCS8_encrypt(pbe_nid, pbe_ciph, pass,
134
0
      passlen, salt, saltlen, iter, p8))) {
135
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
136
0
    PKCS12_SAFEBAG_free(bag);
137
0
    return NULL;
138
0
  }
139
140
0
  return bag;
141
0
}
142
#endif
143
144
/* Turn a stack of SAFEBAGS into a PKCS#7 data Contentinfo */
145
PKCS7 *
146
PKCS12_pack_p7data(STACK_OF(PKCS12_SAFEBAG) *sk)
147
0
{
148
0
  PKCS7 *p7;
149
150
0
  if (!(p7 = PKCS7_new())) {
151
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
152
0
    return NULL;
153
0
  }
154
0
  p7->type = OBJ_nid2obj(NID_pkcs7_data);
155
0
  if (!(p7->d.data = ASN1_OCTET_STRING_new())) {
156
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
157
0
    goto err;
158
0
  }
159
160
0
  if (!ASN1_item_pack(sk, &PKCS12_SAFEBAGS_it, &p7->d.data)) {
161
0
    PKCS12error(PKCS12_R_CANT_PACK_STRUCTURE);
162
0
    goto err;
163
0
  }
164
0
  return p7;
165
166
0
err:
167
0
  PKCS7_free(p7);
168
0
  return NULL;
169
0
}
170
171
/* Unpack SAFEBAGS from PKCS#7 data ContentInfo */
172
STACK_OF(PKCS12_SAFEBAG) *
173
PKCS12_unpack_p7data(PKCS7 *p7)
174
0
{
175
0
  if (!PKCS7_type_is_data(p7)) {
176
0
    PKCS12error(PKCS12_R_CONTENT_TYPE_NOT_DATA);
177
0
    return NULL;
178
0
  }
179
0
  return ASN1_item_unpack(p7->d.data, &PKCS12_SAFEBAGS_it);
180
0
}
181
182
/* Turn a stack of SAFEBAGS into a PKCS#7 encrypted data ContentInfo */
183
184
PKCS7 *
185
PKCS12_pack_p7encdata(int pbe_nid, const char *pass, int passlen,
186
    unsigned char *salt, int saltlen, int iter, STACK_OF(PKCS12_SAFEBAG) *bags)
187
0
{
188
0
  PKCS7 *p7;
189
0
  X509_ALGOR *pbe;
190
0
  const EVP_CIPHER *pbe_ciph;
191
192
0
  if (!(p7 = PKCS7_new())) {
193
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
194
0
    return NULL;
195
0
  }
196
0
  if (!PKCS7_set_type(p7, NID_pkcs7_encrypted)) {
197
0
    PKCS12error(PKCS12_R_ERROR_SETTING_ENCRYPTED_DATA_TYPE);
198
0
    goto err;
199
0
  }
200
201
0
  pbe_ciph = EVP_get_cipherbynid(pbe_nid);
202
203
0
  if (pbe_ciph)
204
0
    pbe = PKCS5_pbe2_set(pbe_ciph, iter, salt, saltlen);
205
0
  else
206
0
    pbe = PKCS5_pbe_set(pbe_nid, iter, salt, saltlen);
207
208
0
  if (!pbe) {
209
0
    PKCS12error(ERR_R_MALLOC_FAILURE);
210
0
    goto err;
211
0
  }
212
0
  X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm);
213
0
  p7->d.encrypted->enc_data->algorithm = pbe;
214
0
  ASN1_OCTET_STRING_free(p7->d.encrypted->enc_data->enc_data);
215
0
  if (!(p7->d.encrypted->enc_data->enc_data = PKCS12_item_i2d_encrypt(
216
0
      pbe, &PKCS12_SAFEBAGS_it, pass, passlen, bags, 1))) {
217
0
    PKCS12error(PKCS12_R_ENCRYPT_ERROR);
218
0
    goto err;
219
0
  }
220
221
0
  return p7;
222
223
0
err:
224
0
  PKCS7_free(p7);
225
0
  return NULL;
226
0
}
227
228
STACK_OF(PKCS12_SAFEBAG) *
229
PKCS12_unpack_p7encdata(PKCS7 *p7, const char *pass, int passlen)
230
0
{
231
0
  if (!PKCS7_type_is_encrypted(p7))
232
0
    return NULL;
233
0
  return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm,
234
0
      &PKCS12_SAFEBAGS_it, pass, passlen,
235
0
      p7->d.encrypted->enc_data->enc_data, 1);
236
0
}
237
238
PKCS8_PRIV_KEY_INFO *
239
PKCS12_decrypt_skey(const PKCS12_SAFEBAG *bag, const char *pass, int passlen)
240
0
{
241
0
  return PKCS8_decrypt(bag->value.shkeybag, pass, passlen);
242
0
}
243
244
int
245
PKCS12_pack_authsafes(PKCS12 *p12, STACK_OF(PKCS7) *safes)
246
0
{
247
0
  if (ASN1_item_pack(safes, &PKCS12_AUTHSAFES_it,
248
0
      &p12->authsafes->d.data))
249
0
    return 1;
250
0
  return 0;
251
0
}
252
253
STACK_OF(PKCS7) *
254
PKCS12_unpack_authsafes(const PKCS12 *p12)
255
0
{
256
0
  if (!PKCS7_type_is_data(p12->authsafes)) {
257
0
    PKCS12error(PKCS12_R_CONTENT_TYPE_NOT_DATA);
258
0
    return NULL;
259
0
  }
260
0
  return ASN1_item_unpack(p12->authsafes->d.data,
261
0
      &PKCS12_AUTHSAFES_it);
262
0
}