]> git.ipfire.org Git - thirdparty/openssl.git/blob - crypto/pkcs7/pk7_attr.c
Stop raising ERR_R_MALLOC_FAILURE in most places
[thirdparty/openssl.git] / crypto / pkcs7 / pk7_attr.c
1 /*
2 * Copyright 1999-2020 The OpenSSL Project Authors. All Rights Reserved.
3 *
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
8 */
9
10 #include <stdio.h>
11 #include <stdlib.h>
12 #include <openssl/bio.h>
13 #include <openssl/asn1.h>
14 #include <openssl/asn1t.h>
15 #include <openssl/pem.h>
16 #include <openssl/pkcs7.h>
17 #include <openssl/x509.h>
18 #include <openssl/err.h>
19
20 int PKCS7_add_attrib_smimecap(PKCS7_SIGNER_INFO *si,
21 STACK_OF(X509_ALGOR) *cap)
22 {
23 ASN1_STRING *seq;
24
25 if ((seq = ASN1_STRING_new()) == NULL) {
26 ERR_raise(ERR_LIB_PKCS7, ERR_R_ASN1_LIB);
27 return 0;
28 }
29 seq->length = ASN1_item_i2d((ASN1_VALUE *)cap, &seq->data,
30 ASN1_ITEM_rptr(X509_ALGORS));
31 return PKCS7_add_signed_attribute(si, NID_SMIMECapabilities,
32 V_ASN1_SEQUENCE, seq);
33 }
34
35 STACK_OF(X509_ALGOR) *PKCS7_get_smimecap(PKCS7_SIGNER_INFO *si)
36 {
37 ASN1_TYPE *cap;
38 const unsigned char *p;
39
40 cap = PKCS7_get_signed_attribute(si, NID_SMIMECapabilities);
41 if (cap == NULL || (cap->type != V_ASN1_SEQUENCE))
42 return NULL;
43 p = cap->value.sequence->data;
44 return (STACK_OF(X509_ALGOR) *)
45 ASN1_item_d2i(NULL, &p, cap->value.sequence->length,
46 ASN1_ITEM_rptr(X509_ALGORS));
47 }
48
49 /* Basic smime-capabilities OID and optional integer arg */
50 int PKCS7_simple_smimecap(STACK_OF(X509_ALGOR) *sk, int nid, int arg)
51 {
52 ASN1_INTEGER *nbit = NULL;
53 X509_ALGOR *alg;
54
55 if ((alg = X509_ALGOR_new()) == NULL) {
56 ERR_raise(ERR_LIB_PKCS7, ERR_R_ASN1_LIB);
57 return 0;
58 }
59 ASN1_OBJECT_free(alg->algorithm);
60 alg->algorithm = OBJ_nid2obj(nid);
61 if (arg > 0) {
62 if ((alg->parameter = ASN1_TYPE_new()) == NULL) {
63 ERR_raise(ERR_LIB_PKCS7, ERR_R_ASN1_LIB);
64 goto err;
65 }
66 if ((nbit = ASN1_INTEGER_new()) == NULL) {
67 ERR_raise(ERR_LIB_PKCS7, ERR_R_ASN1_LIB);
68 goto err;
69 }
70 if (!ASN1_INTEGER_set(nbit, arg)) {
71 ERR_raise(ERR_LIB_PKCS7, ERR_R_ASN1_LIB);
72 goto err;
73 }
74 alg->parameter->value.integer = nbit;
75 alg->parameter->type = V_ASN1_INTEGER;
76 nbit = NULL;
77 }
78 if (!sk_X509_ALGOR_push(sk, alg)) {
79 ERR_raise(ERR_LIB_PKCS7, ERR_R_CRYPTO_LIB);
80 goto err;
81 }
82 return 1;
83 err:
84 ASN1_INTEGER_free(nbit);
85 X509_ALGOR_free(alg);
86 return 0;
87 }
88
89 int PKCS7_add_attrib_content_type(PKCS7_SIGNER_INFO *si, ASN1_OBJECT *coid)
90 {
91 if (PKCS7_get_signed_attribute(si, NID_pkcs9_contentType))
92 return 0;
93 if (!coid)
94 coid = OBJ_nid2obj(NID_pkcs7_data);
95 return PKCS7_add_signed_attribute(si, NID_pkcs9_contentType,
96 V_ASN1_OBJECT, coid);
97 }
98
99 int PKCS7_add0_attrib_signing_time(PKCS7_SIGNER_INFO *si, ASN1_TIME *t)
100 {
101 if (t == NULL && (t = X509_gmtime_adj(NULL, 0)) == NULL) {
102 ERR_raise(ERR_LIB_PKCS7, ERR_R_X509_LIB);
103 return 0;
104 }
105 return PKCS7_add_signed_attribute(si, NID_pkcs9_signingTime,
106 V_ASN1_UTCTIME, t);
107 }
108
109 int PKCS7_add1_attrib_digest(PKCS7_SIGNER_INFO *si,
110 const unsigned char *md, int mdlen)
111 {
112 ASN1_OCTET_STRING *os;
113 os = ASN1_OCTET_STRING_new();
114 if (os == NULL)
115 return 0;
116 if (!ASN1_STRING_set(os, md, mdlen)
117 || !PKCS7_add_signed_attribute(si, NID_pkcs9_messageDigest,
118 V_ASN1_OCTET_STRING, os)) {
119 ASN1_OCTET_STRING_free(os);
120 return 0;
121 }
122 return 1;
123 }