]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/cms/cms_enc.c
Encrypted Data type processing. Add options to cms utility and run section 7
[thirdparty/openssl.git] / crypto / cms / cms_enc.c
CommitLineData
5c4436c9
DSH
1/* crypto/cms/cms_enc.c */
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project.
4 */
5/* ====================================================================
6 * Copyright (c) 2008 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
18 * distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 * acknowledgment:
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 */
53
54#include "cryptlib.h"
55#include <openssl/asn1t.h>
56#include <openssl/pem.h>
57#include <openssl/x509v3.h>
58#include <openssl/err.h>
59#include <openssl/cms.h>
60#include <openssl/rand.h>
61#include "cms_lcl.h"
62#include "asn1_locl.h"
63
64/* CMS EncryptedData Utilities */
65
66/* Set up EncryptedContentInfo based on supplied cipher bio */
67
68int cms_bio_to_EncryptedContent(CMS_EncryptedContentInfo *ec,
69 const unsigned char *key, int keylen,
70 BIO *b)
71 {
72 EVP_CIPHER_CTX *ctx = NULL;
73 unsigned char iv[EVP_MAX_IV_LENGTH], *piv;
74 int ivlen;
75
76 BIO_get_cipher_ctx(b, &ctx);
77
78 /* If necessary set key length */
79
80 if (keylen != EVP_CIPHER_CTX_key_length(ctx))
81 {
82 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0)
83 {
84 CMSerr(CMS_F_CMS_BIO_TO_ENCRYPTEDCONTENT,
85 CMS_R_INVALID_KEY_LENGTH);
86 return 0;
87 }
88 }
89
90 /* Generate a random IV if we need one */
91
92 ivlen = EVP_CIPHER_CTX_iv_length(ctx);
93 if (ivlen > 0)
94 {
95 if (RAND_pseudo_bytes(iv, ivlen) <= 0)
96 return 0;
97 piv = iv;
98 }
99 else
100 piv = NULL;
101
102 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, piv, 1) <= 0)
103 {
104 CMSerr(CMS_F_CMS_BIO_TO_ENCRYPTEDCONTENT,
105 CMS_R_CIPHER_INITIALISATION_ERROR);
106 return 0;
107 }
108
109 ec->contentEncryptionAlgorithm->algorithm =
110 OBJ_nid2obj(EVP_CIPHER_CTX_type(ctx));
111
112 if (piv)
113 {
114 ec->contentEncryptionAlgorithm->parameter = ASN1_TYPE_new();
115 if (!ec->contentEncryptionAlgorithm->parameter)
116 {
117 CMSerr(CMS_F_CMS_BIO_TO_ENCRYPTEDCONTENT,
118 ERR_R_MALLOC_FAILURE);
119 return 0;
120 }
121 if (EVP_CIPHER_param_to_asn1(ctx,
122 ec->contentEncryptionAlgorithm->parameter) <= 0)
123 {
124 CMSerr(CMS_F_CMS_BIO_TO_ENCRYPTEDCONTENT,
125 CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR);
126 return 0;
127 }
128 }
129
130 return 1;
131 }
132
133/* Return BIO based on EncryptedContentInfo and key */
134
b820455c 135int cms_EncryptedContent_to_bio(BIO *b, CMS_EncryptedContentInfo *ec,
5c4436c9
DSH
136 const unsigned char *key, int keylen)
137 {
5c4436c9
DSH
138 EVP_CIPHER_CTX *ctx;
139 const EVP_CIPHER *ciph;
5c4436c9
DSH
140 BIO_get_cipher_ctx(b, &ctx);
141
142 ciph = EVP_get_cipherbyobj(ec->contentEncryptionAlgorithm->algorithm);
143
144 if (!ciph)
145 {
146 CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_TO_BIO, CMS_R_UNKNOWN_CIPHER);
147 goto err;
148 }
149
150 if (EVP_CipherInit_ex(ctx, ciph, NULL, NULL, NULL, 0) <= 0)
151 {
152 CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_TO_BIO,
153 CMS_R_CIPHER_INITIALISATION_ERROR);
154 goto err;
155 }
156
157 /* If necessary set key length */
158
159 if (keylen != EVP_CIPHER_CTX_key_length(ctx))
160 {
161 if (EVP_CIPHER_CTX_set_key_length(ctx, keylen) <= 0)
162 {
163 CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_TO_BIO,
164 CMS_R_INVALID_KEY_LENGTH);
165 goto err;
166 }
167 }
168
169 if (EVP_CipherInit_ex(ctx, NULL, NULL, key, NULL, 0) <= 0)
170 {
171 CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_TO_BIO,
172 CMS_R_CIPHER_INITIALISATION_ERROR);
173 goto err;
174 }
175
176 if (EVP_CIPHER_asn1_to_param(ctx,
177 ec->contentEncryptionAlgorithm->parameter) <= 0)
178 {
179 CMSerr(CMS_F_CMS_ENCRYPTEDCONTENT_TO_BIO,
180 CMS_R_CIPHER_PARAMETER_INITIALISATION_ERROR);
181 goto err;
182 }
b820455c 183 return 1;
5c4436c9
DSH
184
185 err:
b820455c 186 return 0;
5c4436c9
DSH
187 }
188
b820455c
DSH
189int CMS_EncryptedData_set1_key(BIO *b, CMS_ContentInfo *cms,
190 const unsigned char *key, size_t keylen)
191 {
192 CMS_EncryptedContentInfo *ec;
193 if (OBJ_obj2nid(cms->contentType) != NID_pkcs7_encrypted)
194 return 0;
195 ec = cms->d.encryptedData->encryptedContentInfo;
196 return cms_EncryptedContent_to_bio(b, ec, key, keylen);
197 }