]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/pkcs12/p12_sbag.c
Reorganize local header files
[thirdparty/openssl.git] / crypto / pkcs12 / p12_sbag.c
CommitLineData
293042c9 1/*
fd38836b 2 * Copyright 1999-2018 The OpenSSL Project Authors. All Rights Reserved.
293042c9 3 *
54fffdf4 4 * Licensed under the Apache License 2.0 (the "License"). You may not use
b1322259
RS
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
293042c9
DSH
8 */
9
10#include <stdio.h>
11#include "internal/cryptlib.h"
12#include <openssl/pkcs12.h>
706457b7 13#include "p12_local.h"
293042c9 14
fcd2d5a6 15#if !OPENSSL_API_1_1_0
28da1455
MC
16ASN1_TYPE *PKCS12_get_attr(const PKCS12_SAFEBAG *bag, int attr_nid)
17{
18 return PKCS12_get_attr_gen(bag->attrib, attr_nid);
19}
20#endif
21
22const ASN1_TYPE *PKCS12_SAFEBAG_get0_attr(const PKCS12_SAFEBAG *bag,
23 int attr_nid)
293042c9
DSH
24{
25 return PKCS12_get_attr_gen(bag->attrib, attr_nid);
26}
27
28ASN1_TYPE *PKCS8_get_attr(PKCS8_PRIV_KEY_INFO *p8, int attr_nid)
29{
54dbf423 30 return PKCS12_get_attr_gen(PKCS8_pkey_get0_attrs(p8), attr_nid);
293042c9
DSH
31}
32
28da1455 33const PKCS8_PRIV_KEY_INFO *PKCS12_SAFEBAG_get0_p8inf(const PKCS12_SAFEBAG *bag)
293042c9
DSH
34{
35 if (PKCS12_SAFEBAG_get_nid(bag) != NID_keyBag)
36 return NULL;
37 return bag->value.keybag;
38}
39
28da1455 40const X509_SIG *PKCS12_SAFEBAG_get0_pkcs8(const PKCS12_SAFEBAG *bag)
293042c9
DSH
41{
42 if (OBJ_obj2nid(bag->type) != NID_pkcs8ShroudedKeyBag)
43 return NULL;
44 return bag->value.shkeybag;
45}
46
28da1455
MC
47const STACK_OF(PKCS12_SAFEBAG) *
48PKCS12_SAFEBAG_get0_safes(const PKCS12_SAFEBAG *bag)
293042c9
DSH
49{
50 if (OBJ_obj2nid(bag->type) != NID_safeContentsBag)
51 return NULL;
52 return bag->value.safes;
53}
54
28da1455 55const ASN1_OBJECT *PKCS12_SAFEBAG_get0_type(const PKCS12_SAFEBAG *bag)
293042c9
DSH
56{
57 return bag->type;
58}
59
28da1455 60int PKCS12_SAFEBAG_get_nid(const PKCS12_SAFEBAG *bag)
293042c9
DSH
61{
62 return OBJ_obj2nid(bag->type);
63}
64
28da1455 65int PKCS12_SAFEBAG_get_bag_nid(const PKCS12_SAFEBAG *bag)
293042c9
DSH
66{
67 int btype = PKCS12_SAFEBAG_get_nid(bag);
c9018bdf 68
b3ca5155 69 if (btype != NID_certBag && btype != NID_crlBag && btype != NID_secretBag)
293042c9
DSH
70 return -1;
71 return OBJ_obj2nid(bag->value.bag->type);
72}
73
28da1455 74X509 *PKCS12_SAFEBAG_get1_cert(const PKCS12_SAFEBAG *bag)
293042c9
DSH
75{
76 if (PKCS12_SAFEBAG_get_nid(bag) != NID_certBag)
77 return NULL;
78 if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Certificate)
79 return NULL;
80 return ASN1_item_unpack(bag->value.bag->value.octet,
81 ASN1_ITEM_rptr(X509));
82}
83
28da1455 84X509_CRL *PKCS12_SAFEBAG_get1_crl(const PKCS12_SAFEBAG *bag)
293042c9
DSH
85{
86 if (PKCS12_SAFEBAG_get_nid(bag) != NID_crlBag)
87 return NULL;
88 if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Crl)
89 return NULL;
90 return ASN1_item_unpack(bag->value.bag->value.octet,
91 ASN1_ITEM_rptr(X509_CRL));
92}
93
94PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_cert(X509 *x509)
95{
96 return PKCS12_item_pack_safebag(x509, ASN1_ITEM_rptr(X509),
97 NID_x509Certificate, NID_certBag);
98}
99
100PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_crl(X509_CRL *crl)
101{
102 return PKCS12_item_pack_safebag(crl, ASN1_ITEM_rptr(X509_CRL),
103 NID_x509Crl, NID_crlBag);
104}
105
106/* Turn PKCS8 object into a keybag */
107
425f3300 108PKCS12_SAFEBAG *PKCS12_SAFEBAG_create0_p8inf(PKCS8_PRIV_KEY_INFO *p8)
293042c9 109{
425f3300 110 PKCS12_SAFEBAG *bag = PKCS12_SAFEBAG_new();
293042c9 111
425f3300
DSH
112 if (bag == NULL) {
113 PKCS12err(PKCS12_F_PKCS12_SAFEBAG_CREATE0_P8INF, ERR_R_MALLOC_FAILURE);
293042c9
DSH
114 return NULL;
115 }
116 bag->type = OBJ_nid2obj(NID_keyBag);
117 bag->value.keybag = p8;
118 return bag;
119}
120
121/* Turn PKCS8 object into a shrouded keybag */
122
425f3300 123PKCS12_SAFEBAG *PKCS12_SAFEBAG_create0_pkcs8(X509_SIG *p8)
293042c9 124{
425f3300 125 PKCS12_SAFEBAG *bag = PKCS12_SAFEBAG_new();
c9018bdf 126
293042c9 127 /* Set up the safe bag */
425f3300
DSH
128 if (bag == NULL) {
129 PKCS12err(PKCS12_F_PKCS12_SAFEBAG_CREATE0_PKCS8, ERR_R_MALLOC_FAILURE);
293042c9
DSH
130 return NULL;
131 }
293042c9 132 bag->type = OBJ_nid2obj(NID_pkcs8ShroudedKeyBag);
425f3300
DSH
133 bag->value.shkeybag = p8;
134 return bag;
135}
136
137PKCS12_SAFEBAG *PKCS12_SAFEBAG_create_pkcs8_encrypt(int pbe_nid,
138 const char *pass,
139 int passlen,
140 unsigned char *salt,
141 int saltlen, int iter,
142 PKCS8_PRIV_KEY_INFO *p8inf)
143{
144 PKCS12_SAFEBAG *bag;
145 const EVP_CIPHER *pbe_ciph;
146 X509_SIG *p8;
293042c9
DSH
147
148 pbe_ciph = EVP_get_cipherbynid(pbe_nid);
293042c9
DSH
149 if (pbe_ciph)
150 pbe_nid = -1;
151
425f3300
DSH
152 p8 = PKCS8_encrypt(pbe_nid, pbe_ciph, pass, passlen, salt, saltlen, iter,
153 p8inf);
f2950a46 154 if (p8 == NULL)
425f3300 155 return NULL;
425f3300
DSH
156
157 bag = PKCS12_SAFEBAG_create0_pkcs8(p8);
f2950a46 158 if (bag == NULL)
425f3300 159 X509_SIG_free(p8);
293042c9
DSH
160
161 return bag;
162}