]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/pkcs7/pk7_mime.c
We cache a montgomery form for 'n' if the PUBLIC flag is set, not PRIVATE.
[thirdparty/openssl.git] / crypto / pkcs7 / pk7_mime.c
CommitLineData
5a9a4b29
DSH
1/* pk7_mime.c */
2/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3 * project 1999.
4 */
5/* ====================================================================
6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in
17 * the documentation and/or other materials provided with the
18 * distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 * software must display the following acknowledgment:
22 * "This product includes software developed by the OpenSSL Project
23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 * endorse or promote products derived from this software without
27 * prior written permission. For written permission, please contact
28 * licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 * nor may "OpenSSL" appear in their names without prior written
32 * permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 * acknowledgment:
36 * "This product includes software developed by the OpenSSL Project
37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com). This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include <stdio.h>
60#include <ctype.h>
61#include "cryptlib.h"
62#include <openssl/rand.h>
63#include <openssl/x509.h>
64
65/* MIME and related routines */
66
67/* MIME format structures
68 * Note that all are translated to lower case apart from
69 * parameter values. Quotes are stripped off
70 */
71
5a9a4b29
DSH
72typedef struct {
73char *param_name; /* Param name e.g. "micalg" */
74char *param_value; /* Param value e.g. "sha1" */
75} MIME_PARAM;
76
e20d7d71 77DECLARE_STACK_OF(MIME_PARAM)
371acb22
BL
78IMPLEMENT_STACK_OF(MIME_PARAM)
79
80typedef struct {
81char *name; /* Name of line e.g. "content-type" */
82char *value; /* Value of line e.g. "text/plain" */
83STACK_OF(MIME_PARAM) *params; /* Zero or more parameters */
84} MIME_HEADER;
85
e20d7d71 86DECLARE_STACK_OF(MIME_HEADER)
371acb22 87IMPLEMENT_STACK_OF(MIME_HEADER)
5a9a4b29
DSH
88
89static int B64_write_PKCS7(BIO *bio, PKCS7 *p7);
90static PKCS7 *B64_read_PKCS7(BIO *bio);
91static char * strip_ends(char *name);
92static char * strip_start(char *name);
93static char * strip_end(char *name);
94static MIME_HEADER *mime_hdr_new(char *name, char *value);
95static int mime_hdr_addparam(MIME_HEADER *mhdr, char *name, char *value);
371acb22 96static STACK_OF(MIME_HEADER) *mime_parse_hdr(BIO *bio);
ccd86b68
GT
97static int mime_hdr_cmp(const MIME_HEADER * const *a,
98 const MIME_HEADER * const *b);
99static int mime_param_cmp(const MIME_PARAM * const *a,
100 const MIME_PARAM * const *b);
5a9a4b29
DSH
101static void mime_param_free(MIME_PARAM *param);
102static int mime_bound_check(char *line, int linelen, char *bound, int blen);
371acb22 103static int multi_split(BIO *bio, char *bound, STACK_OF(BIO) **ret);
5a9a4b29 104static int iscrlf(char c);
371acb22 105static MIME_HEADER *mime_hdr_find(STACK_OF(MIME_HEADER) *hdrs, char *name);
5a9a4b29
DSH
106static MIME_PARAM *mime_param_find(MIME_HEADER *hdr, char *name);
107static void mime_hdr_free(MIME_HEADER *hdr);
108
109#define MAX_SMLEN 1024
110#define mime_debug(x) /* x */
111
112
113typedef void (*stkfree)();
114
115/* Base 64 read and write of PKCS#7 structure */
116
117static int B64_write_PKCS7(BIO *bio, PKCS7 *p7)
118{
119 BIO *b64;
120 if(!(b64 = BIO_new(BIO_f_base64()))) {
121 PKCS7err(PKCS7_F_B64_WRITE_PKCS7,ERR_R_MALLOC_FAILURE);
122 return 0;
123 }
124 bio = BIO_push(b64, bio);
125 i2d_PKCS7_bio(bio, p7);
126 BIO_flush(bio);
127 bio = BIO_pop(bio);
128 BIO_free(b64);
129 return 1;
130}
131
132static PKCS7 *B64_read_PKCS7(BIO *bio)
133{
134 BIO *b64;
135 PKCS7 *p7;
136 if(!(b64 = BIO_new(BIO_f_base64()))) {
137 PKCS7err(PKCS7_F_B64_READ_PKCS7,ERR_R_MALLOC_FAILURE);
138 return 0;
139 }
140 bio = BIO_push(b64, bio);
141 if(!(p7 = d2i_PKCS7_bio(bio, NULL)))
142 PKCS7err(PKCS7_F_B64_READ_PKCS7,PKCS7_R_DECODE_ERROR);
143 BIO_flush(bio);
144 bio = BIO_pop(bio);
145 BIO_free(b64);
146 return p7;
147}
148
149/* SMIME sender */
150
151int SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags)
152{
153 char linebuf[MAX_SMLEN];
154 char bound[33], c;
155 int i;
156 if((flags & PKCS7_DETACHED) && data) {
157 /* We want multipart/signed */
158 /* Generate a random boundary */
373b575f 159 RAND_pseudo_bytes((unsigned char *)bound, 32);
5a9a4b29
DSH
160 for(i = 0; i < 32; i++) {
161 c = bound[i] & 0xf;
162 if(c < 10) c += '0';
163 else c += 'A' - 10;
164 bound[i] = c;
165 }
166 bound[32] = 0;
ca6dde5d 167 BIO_printf(bio, "MIME-Version: 1.0\n");
16a44ae7
RL
168 BIO_printf(bio, "Content-Type: multipart/signed;");
169 BIO_printf(bio, " protocol=\"application/x-pkcs7-signature\";");
ca6dde5d 170 BIO_printf(bio, " micalg=sha1; boundary=\"----%s\"\n\n", bound);
5a9a4b29
DSH
171 BIO_printf(bio, "This is an S/MIME signed message\n\n");
172 /* Now write out the first part */
8e6cbcd7 173 BIO_printf(bio, "------%s\r\n", bound);
ca6dde5d 174 if(flags & PKCS7_TEXT) BIO_printf(bio, "Content-Type: text/plain\n\n");
5a9a4b29
DSH
175 while((i = BIO_read(data, linebuf, MAX_SMLEN)) > 0)
176 BIO_write(bio, linebuf, i);
ca6dde5d 177 BIO_printf(bio, "\n------%s\n", bound);
5a9a4b29
DSH
178
179 /* Headers for signature */
180
ca6dde5d
RL
181 BIO_printf(bio, "Content-Type: application/x-pkcs7-signature; name=\"smime.p7s\"\n");
182 BIO_printf(bio, "Content-Transfer-Encoding: base64\n");
183 BIO_printf(bio, "Content-Disposition: attachment; filename=\"smime.p7s\"\n\n");
5a9a4b29 184 B64_write_PKCS7(bio, p7);
ca6dde5d 185 BIO_printf(bio,"\n------%s--\n\n", bound);
5a9a4b29
DSH
186 return 1;
187 }
188 /* MIME headers */
ca6dde5d
RL
189 BIO_printf(bio, "MIME-Version: 1.0\n");
190 BIO_printf(bio, "Content-Disposition: attachment; filename=\"smime.p7m\"\n");
191 BIO_printf(bio, "Content-Type: application/x-pkcs7-mime; name=\"smime.p7m\"\n");
192 BIO_printf(bio, "Content-Transfer-Encoding: base64\n\n");
5a9a4b29 193 B64_write_PKCS7(bio, p7);
ca6dde5d 194 BIO_printf(bio, "\n");
5a9a4b29
DSH
195 return 1;
196}
197
198/* SMIME reader: handle multipart/signed and opaque signing.
199 * in multipart case the content is placed in a memory BIO
200 * pointed to by "bcont". In opaque this is set to NULL
201 */
202
203PKCS7 *SMIME_read_PKCS7(BIO *bio, BIO **bcont)
204{
205 BIO *p7in;
371acb22
BL
206 STACK_OF(MIME_HEADER) *headers = NULL;
207 STACK_OF(BIO) *parts = NULL;
5a9a4b29
DSH
208 MIME_HEADER *hdr;
209 MIME_PARAM *prm;
210 PKCS7 *p7;
211 int ret;
212
213 if(bcont) *bcont = NULL;
214
215 if (!(headers = mime_parse_hdr(bio))) {
216 PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_MIME_PARSE_ERROR);
217 return NULL;
218 }
219
220 if(!(hdr = mime_hdr_find(headers, "content-type")) || !hdr->value) {
371acb22 221 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
222 PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_CONTENT_TYPE);
223 return NULL;
224 }
225
226 /* Handle multipart/signed */
227
228 if(!strcmp(hdr->value, "multipart/signed")) {
229 /* Split into two parts */
230 prm = mime_param_find(hdr, "boundary");
231 if(!prm || !prm->param_value) {
371acb22 232 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
233 PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_MULTIPART_BOUNDARY);
234 return NULL;
235 }
236 ret = multi_split(bio, prm->param_value, &parts);
371acb22
BL
237 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
238 if(!ret || (sk_BIO_num(parts) != 2) ) {
5a9a4b29 239 PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_MULTIPART_BODY_FAILURE);
371acb22 240 sk_BIO_pop_free(parts, BIO_vfree);
5a9a4b29
DSH
241 return NULL;
242 }
243
244 /* Parse the signature piece */
371acb22 245 p7in = sk_BIO_value(parts, 1);
5a9a4b29
DSH
246
247 if (!(headers = mime_parse_hdr(p7in))) {
248 PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_MIME_SIG_PARSE_ERROR);
371acb22 249 sk_BIO_pop_free(parts, BIO_vfree);
5a9a4b29
DSH
250 return NULL;
251 }
252
253 /* Get content type */
254
255 if(!(hdr = mime_hdr_find(headers, "content-type")) ||
256 !hdr->value) {
371acb22 257 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
258 PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_SIG_CONTENT_TYPE);
259 return NULL;
260 }
261
262 if(strcmp(hdr->value, "application/x-pkcs7-signature") &&
263 strcmp(hdr->value, "application/pkcs7-signature")) {
371acb22 264 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
265 PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_SIG_INVALID_MIME_TYPE);
266 ERR_add_error_data(2, "type: ", hdr->value);
371acb22 267 sk_BIO_pop_free(parts, BIO_vfree);
5a9a4b29
DSH
268 return NULL;
269 }
371acb22 270 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
271 /* Read in PKCS#7 */
272 if(!(p7 = B64_read_PKCS7(p7in))) {
273 PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_PKCS7_SIG_PARSE_ERROR);
371acb22 274 sk_BIO_pop_free(parts, BIO_vfree);
5a9a4b29
DSH
275 return NULL;
276 }
277
278 if(bcont) {
371acb22 279 *bcont = sk_BIO_value(parts, 0);
5a9a4b29 280 BIO_free(p7in);
371acb22
BL
281 sk_BIO_free(parts);
282 } else sk_BIO_pop_free(parts, BIO_vfree);
5a9a4b29
DSH
283 return p7;
284 }
285
286 /* OK, if not multipart/signed try opaque signature */
287
288 if (strcmp (hdr->value, "application/x-pkcs7-mime") &&
289 strcmp (hdr->value, "application/pkcs7-mime")) {
290 PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_INVALID_MIME_TYPE);
291 ERR_add_error_data(2, "type: ", hdr->value);
371acb22 292 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
293 return NULL;
294 }
295
371acb22 296 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
297
298 if(!(p7 = B64_read_PKCS7(bio))) {
299 PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_PKCS7_PARSE_ERROR);
300 return NULL;
301 }
302 return p7;
303
304}
305
306/* Copy text from one BIO to another making the output CRLF at EOL */
307int SMIME_crlf_copy(BIO *in, BIO *out, int flags)
308{
309 char eol;
310 int len;
311 char linebuf[MAX_SMLEN];
312 if(flags & PKCS7_BINARY) {
313 while((len = BIO_read(in, linebuf, MAX_SMLEN)) > 0)
314 BIO_write(out, linebuf, len);
315 return 1;
316 }
317 if(flags & PKCS7_TEXT) BIO_printf(out, "Content-Type: text/plain\r\n\r\n");
318 while ((len = BIO_gets(in, linebuf, MAX_SMLEN)) > 0) {
319 eol = 0;
320 while(iscrlf(linebuf[len - 1])) {
321 len--;
322 eol = 1;
323 }
324 BIO_write(out, linebuf, len);
325 if(eol) BIO_write(out, "\r\n", 2);
326 }
327 return 1;
328}
329
330/* Strip off headers if they are text/plain */
331int SMIME_text(BIO *in, BIO *out)
332{
333 char iobuf[4096];
334 int len;
371acb22 335 STACK_OF(MIME_HEADER) *headers;
5a9a4b29 336 MIME_HEADER *hdr;
371acb22 337
5a9a4b29
DSH
338 if (!(headers = mime_parse_hdr(in))) {
339 PKCS7err(PKCS7_F_SMIME_TEXT,PKCS7_R_MIME_PARSE_ERROR);
340 return 0;
341 }
342 if(!(hdr = mime_hdr_find(headers, "content-type")) || !hdr->value) {
343 PKCS7err(PKCS7_F_SMIME_TEXT,PKCS7_R_MIME_NO_CONTENT_TYPE);
371acb22 344 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
345 return 0;
346 }
347 if (strcmp (hdr->value, "text/plain")) {
348 PKCS7err(PKCS7_F_SMIME_TEXT,PKCS7_R_INVALID_MIME_TYPE);
349 ERR_add_error_data(2, "type: ", hdr->value);
371acb22 350 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
351 return 0;
352 }
371acb22 353 sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
5a9a4b29
DSH
354 while ((len = BIO_read(in, iobuf, sizeof(iobuf))) > 0)
355 BIO_write(out, iobuf, len);
356 return 1;
357}
358
359/* Split a multipart/XXX message body into component parts: result is
360 * canonical parts in a STACK of bios
361 */
362
371acb22 363static int multi_split(BIO *bio, char *bound, STACK_OF(BIO) **ret)
5a9a4b29
DSH
364{
365 char linebuf[MAX_SMLEN];
366 int len, blen;
367 BIO *bpart = NULL;
371acb22 368 STACK_OF(BIO) *parts;
5a9a4b29 369 char state, part, first;
371acb22 370
5a9a4b29
DSH
371 blen = strlen(bound);
372 part = 0;
373 state = 0;
374 first = 1;
62324627 375 parts = sk_BIO_new_null();
5a9a4b29
DSH
376 *ret = parts;
377 while ((len = BIO_gets(bio, linebuf, MAX_SMLEN)) > 0) {
378 state = mime_bound_check(linebuf, len, bound, blen);
379 if(state == 1) {
380 first = 1;
381 part++;
382 } else if(state == 2) {
371acb22 383 sk_BIO_push(parts, bpart);
5a9a4b29
DSH
384 return 1;
385 } else if(part) {
386 if(first) {
387 first = 0;
371acb22 388 if(bpart) sk_BIO_push(parts, bpart);
5a9a4b29
DSH
389 bpart = BIO_new(BIO_s_mem());
390
391 } else BIO_write(bpart, "\r\n", 2);
392 /* Strip CR+LF from linebuf */
393 while(iscrlf(linebuf[len - 1])) len--;
394 BIO_write(bpart, linebuf, len);
395 }
396 }
397 return 0;
398}
399
400static int iscrlf(char c)
401{
402 if(c == '\r' || c == '\n') return 1;
403 return 0;
404}
405
406/* This is the big one: parse MIME header lines up to message body */
407
408#define MIME_INVALID 0
409#define MIME_START 1
410#define MIME_TYPE 2
411#define MIME_NAME 3
412#define MIME_VALUE 4
413#define MIME_QUOTE 5
414#define MIME_COMMENT 6
415
416
371acb22 417static STACK_OF(MIME_HEADER) *mime_parse_hdr(BIO *bio)
5a9a4b29
DSH
418{
419 char *p, *q, c;
420 char *ntmp;
421 char linebuf[MAX_SMLEN];
422 MIME_HEADER *mhdr = NULL;
371acb22 423 STACK_OF(MIME_HEADER) *headers;
5a9a4b29 424 int len, state, save_state = 0;
371acb22
BL
425
426 headers = sk_MIME_HEADER_new(mime_hdr_cmp);
5a9a4b29
DSH
427 while ((len = BIO_gets(bio, linebuf, MAX_SMLEN)) > 0) {
428 /* If whitespace at line start then continuation line */
a8eeb155 429 if(mhdr && isspace((unsigned char)linebuf[0])) state = MIME_NAME;
5a9a4b29
DSH
430 else state = MIME_START;
431 ntmp = NULL;
432 /* Go through all characters */
433 for(p = linebuf, q = linebuf; (c = *p) && (c!='\r') && (c!='\n'); p++) {
434
435 /* State machine to handle MIME headers
436 * if this looks horrible that's because it *is*
437 */
438
439 switch(state) {
440 case MIME_START:
441 if(c == ':') {
442 state = MIME_TYPE;
443 *p = 0;
444 ntmp = strip_ends(q);
445 q = p + 1;
446 }
447 break;
448
449 case MIME_TYPE:
450 if(c == ';') {
451 mime_debug("Found End Value\n");
452 *p = 0;
453 mhdr = mime_hdr_new(ntmp, strip_ends(q));
371acb22 454 sk_MIME_HEADER_push(headers, mhdr);
5a9a4b29
DSH
455 ntmp = NULL;
456 q = p + 1;
457 state = MIME_NAME;
458 } else if(c == '(') {
459 save_state = state;
460 state = MIME_COMMENT;
461 }
462 break;
463
464 case MIME_COMMENT:
465 if(c == ')') {
466 state = save_state;
467 }
468 break;
469
470 case MIME_NAME:
471 if(c == '=') {
472 state = MIME_VALUE;
473 *p = 0;
474 ntmp = strip_ends(q);
475 q = p + 1;
476 }
477 break ;
478
479 case MIME_VALUE:
480 if(c == ';') {
481 state = MIME_NAME;
482 *p = 0;
483 mime_hdr_addparam(mhdr, ntmp, strip_ends(q));
484 ntmp = NULL;
485 q = p + 1;
486 } else if (c == '"') {
487 mime_debug("Found Quote\n");
488 state = MIME_QUOTE;
489 } else if(c == '(') {
490 save_state = state;
491 state = MIME_COMMENT;
492 }
493 break;
494
495 case MIME_QUOTE:
496 if(c == '"') {
497 mime_debug("Found Match Quote\n");
498 state = MIME_VALUE;
499 }
500 break;
501 }
502 }
503
504 if(state == MIME_TYPE) {
505 mhdr = mime_hdr_new(ntmp, strip_ends(q));
371acb22 506 sk_MIME_HEADER_push(headers, mhdr);
5a9a4b29
DSH
507 } else if(state == MIME_VALUE)
508 mime_hdr_addparam(mhdr, ntmp, strip_ends(q));
509 if(p == linebuf) break; /* Blank line means end of headers */
510}
511
512return headers;
513
514}
515
516static char *strip_ends(char *name)
517{
518 return strip_end(strip_start(name));
519}
520
521/* Strip a parameter of whitespace from start of param */
522static char *strip_start(char *name)
523{
524 char *p, c;
525 /* Look for first non white space or quote */
526 for(p = name; (c = *p) ;p++) {
527 if(c == '"') {
528 /* Next char is start of string if non null */
529 if(p[1]) return p + 1;
530 /* Else null string */
531 return NULL;
532 }
a8eeb155 533 if(!isspace((unsigned char)c)) return p;
5a9a4b29
DSH
534 }
535 return NULL;
536}
537
538/* As above but strip from end of string : maybe should handle brackets? */
539static char *strip_end(char *name)
540{
541 char *p, c;
542 if(!name) return NULL;
543 /* Look for first non white space or quote */
544 for(p = name + strlen(name) - 1; p >= name ;p--) {
545 c = *p;
546 if(c == '"') {
547 if(p - 1 == name) return NULL;
548 *p = 0;
549 return name;
550 }
a8eeb155 551 if(isspace((unsigned char)c)) *p = 0;
5a9a4b29
DSH
552 else return name;
553 }
554 return NULL;
555}
556
557static MIME_HEADER *mime_hdr_new(char *name, char *value)
558{
559 MIME_HEADER *mhdr;
560 char *tmpname, *tmpval, *p;
561 int c;
562 if(name) {
563 if(!(tmpname = BUF_strdup(name))) return NULL;
564 for(p = tmpname ; *p; p++) {
565 c = *p;
566 if(isupper(c)) {
567 c = tolower(c);
568 *p = c;
569 }
570 }
571 } else tmpname = NULL;
572 if(value) {
573 if(!(tmpval = BUF_strdup(value))) return NULL;
574 for(p = tmpval ; *p; p++) {
575 c = *p;
576 if(isupper(c)) {
577 c = tolower(c);
578 *p = c;
579 }
580 }
581 } else tmpval = NULL;
26a3a48d 582 mhdr = (MIME_HEADER *) OPENSSL_malloc(sizeof(MIME_HEADER));
5a9a4b29
DSH
583 if(!mhdr) return NULL;
584 mhdr->name = tmpname;
585 mhdr->value = tmpval;
371acb22 586 if(!(mhdr->params = sk_MIME_PARAM_new(mime_param_cmp))) return NULL;
5a9a4b29
DSH
587 return mhdr;
588}
589
590static int mime_hdr_addparam(MIME_HEADER *mhdr, char *name, char *value)
591{
592 char *tmpname, *tmpval, *p;
593 int c;
594 MIME_PARAM *mparam;
595 if(name) {
596 tmpname = BUF_strdup(name);
597 if(!tmpname) return 0;
598 for(p = tmpname ; *p; p++) {
599 c = *p;
600 if(isupper(c)) {
601 c = tolower(c);
602 *p = c;
603 }
604 }
605 } else tmpname = NULL;
606 if(value) {
607 tmpval = BUF_strdup(value);
608 if(!tmpval) return 0;
609 } else tmpval = NULL;
657e60fa 610 /* Parameter values are case sensitive so leave as is */
26a3a48d 611 mparam = (MIME_PARAM *) OPENSSL_malloc(sizeof(MIME_PARAM));
5a9a4b29
DSH
612 if(!mparam) return 0;
613 mparam->param_name = tmpname;
614 mparam->param_value = tmpval;
371acb22 615 sk_MIME_PARAM_push(mhdr->params, mparam);
5a9a4b29
DSH
616 return 1;
617}
618
ccd86b68
GT
619static int mime_hdr_cmp(const MIME_HEADER * const *a,
620 const MIME_HEADER * const *b)
5a9a4b29
DSH
621{
622 return(strcmp((*a)->name, (*b)->name));
623}
624
ccd86b68
GT
625static int mime_param_cmp(const MIME_PARAM * const *a,
626 const MIME_PARAM * const *b)
5a9a4b29
DSH
627{
628 return(strcmp((*a)->param_name, (*b)->param_name));
629}
630
631/* Find a header with a given name (if possible) */
632
371acb22 633static MIME_HEADER *mime_hdr_find(STACK_OF(MIME_HEADER) *hdrs, char *name)
5a9a4b29
DSH
634{
635 MIME_HEADER htmp;
636 int idx;
637 htmp.name = name;
371acb22 638 idx = sk_MIME_HEADER_find(hdrs, &htmp);
5a9a4b29 639 if(idx < 0) return NULL;
371acb22 640 return sk_MIME_HEADER_value(hdrs, idx);
5a9a4b29
DSH
641}
642
643static MIME_PARAM *mime_param_find(MIME_HEADER *hdr, char *name)
644{
645 MIME_PARAM param;
646 int idx;
647 param.param_name = name;
371acb22 648 idx = sk_MIME_PARAM_find(hdr->params, &param);
5a9a4b29 649 if(idx < 0) return NULL;
371acb22 650 return sk_MIME_PARAM_value(hdr->params, idx);
5a9a4b29
DSH
651}
652
653static void mime_hdr_free(MIME_HEADER *hdr)
654{
26a3a48d
RL
655 if(hdr->name) OPENSSL_free(hdr->name);
656 if(hdr->value) OPENSSL_free(hdr->value);
371acb22 657 if(hdr->params) sk_MIME_PARAM_pop_free(hdr->params, mime_param_free);
26a3a48d 658 OPENSSL_free(hdr);
5a9a4b29
DSH
659}
660
661static void mime_param_free(MIME_PARAM *param)
662{
26a3a48d
RL
663 if(param->param_name) OPENSSL_free(param->param_name);
664 if(param->param_value) OPENSSL_free(param->param_value);
665 OPENSSL_free(param);
5a9a4b29
DSH
666}
667
668/* Check for a multipart boundary. Returns:
669 * 0 : no boundary
670 * 1 : part boundary
671 * 2 : final boundary
672 */
673static int mime_bound_check(char *line, int linelen, char *bound, int blen)
674{
675 if(linelen == -1) linelen = strlen(line);
676 if(blen == -1) blen = strlen(bound);
677 /* Quickly eliminate if line length too short */
678 if(blen + 2 > linelen) return 0;
679 /* Check for part boundary */
680 if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) {
681 if(!strncmp(line + blen + 2, "--", 2)) return 2;
682 else return 1;
683 }
684 return 0;
685}