xref: /openbsd/lib/libcrypto/pkcs7/pk7_mime.c (revision 404b540a)
1 /* pk7_mime.c */
2 /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3  * project.
4  */
5 /* ====================================================================
6  * Copyright (c) 1999-2005 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com).
56  *
57  */
58 
59 #include <stdio.h>
60 #include <ctype.h>
61 #include "cryptlib.h"
62 #include <openssl/rand.h>
63 #include <openssl/x509.h>
64 
65 /* MIME and related routines */
66 
67 /* MIME format structures
68  * Note that all are translated to lower case apart from
69  * parameter values. Quotes are stripped off
70  */
71 
72 typedef struct {
73 char *param_name;			/* Param name e.g. "micalg" */
74 char *param_value;			/* Param value e.g. "sha1" */
75 } MIME_PARAM;
76 
77 DECLARE_STACK_OF(MIME_PARAM)
78 IMPLEMENT_STACK_OF(MIME_PARAM)
79 
80 typedef struct {
81 char *name;				/* Name of line e.g. "content-type" */
82 char *value;				/* Value of line e.g. "text/plain" */
83 STACK_OF(MIME_PARAM) *params;		/* Zero or more parameters */
84 } MIME_HEADER;
85 
86 DECLARE_STACK_OF(MIME_HEADER)
87 IMPLEMENT_STACK_OF(MIME_HEADER)
88 
89 static int pkcs7_output_data(BIO *bio, BIO *data, PKCS7 *p7, int flags);
90 static int B64_write_PKCS7(BIO *bio, PKCS7 *p7);
91 static PKCS7 *B64_read_PKCS7(BIO *bio);
92 static char * strip_ends(char *name);
93 static char * strip_start(char *name);
94 static char * strip_end(char *name);
95 static MIME_HEADER *mime_hdr_new(char *name, char *value);
96 static int mime_hdr_addparam(MIME_HEADER *mhdr, char *name, char *value);
97 static STACK_OF(MIME_HEADER) *mime_parse_hdr(BIO *bio);
98 static int mime_hdr_cmp(const MIME_HEADER * const *a,
99 			const MIME_HEADER * const *b);
100 static int mime_param_cmp(const MIME_PARAM * const *a,
101 			const MIME_PARAM * const *b);
102 static void mime_param_free(MIME_PARAM *param);
103 static int mime_bound_check(char *line, int linelen, char *bound, int blen);
104 static int multi_split(BIO *bio, char *bound, STACK_OF(BIO) **ret);
105 static int strip_eol(char *linebuf, int *plen);
106 static MIME_HEADER *mime_hdr_find(STACK_OF(MIME_HEADER) *hdrs, char *name);
107 static MIME_PARAM *mime_param_find(MIME_HEADER *hdr, char *name);
108 static void mime_hdr_free(MIME_HEADER *hdr);
109 
110 #define MAX_SMLEN 1024
111 #define mime_debug(x) /* x */
112 
113 /* Base 64 read and write of PKCS#7 structure */
114 
115 static int B64_write_PKCS7(BIO *bio, PKCS7 *p7)
116 {
117 	BIO *b64;
118 	if(!(b64 = BIO_new(BIO_f_base64()))) {
119 		PKCS7err(PKCS7_F_B64_WRITE_PKCS7,ERR_R_MALLOC_FAILURE);
120 		return 0;
121 	}
122 	bio = BIO_push(b64, bio);
123 	i2d_PKCS7_bio(bio, p7);
124 	(void)BIO_flush(bio);
125 	bio = BIO_pop(bio);
126 	BIO_free(b64);
127 	return 1;
128 }
129 
130 static PKCS7 *B64_read_PKCS7(BIO *bio)
131 {
132 	BIO *b64;
133 	PKCS7 *p7;
134 	if(!(b64 = BIO_new(BIO_f_base64()))) {
135 		PKCS7err(PKCS7_F_B64_READ_PKCS7,ERR_R_MALLOC_FAILURE);
136 		return 0;
137 	}
138 	bio = BIO_push(b64, bio);
139 	if(!(p7 = d2i_PKCS7_bio(bio, NULL)))
140 		PKCS7err(PKCS7_F_B64_READ_PKCS7,PKCS7_R_DECODE_ERROR);
141 	(void)BIO_flush(bio);
142 	bio = BIO_pop(bio);
143 	BIO_free(b64);
144 	return p7;
145 }
146 
147 /* SMIME sender */
148 
149 int SMIME_write_PKCS7(BIO *bio, PKCS7 *p7, BIO *data, int flags)
150 {
151 	char bound[33], c;
152 	int i;
153 	char *mime_prefix, *mime_eol, *msg_type=NULL;
154 	if (flags & PKCS7_NOOLDMIMETYPE)
155 		mime_prefix = "application/pkcs7-";
156 	else
157 		mime_prefix = "application/x-pkcs7-";
158 
159 	if (flags & PKCS7_CRLFEOL)
160 		mime_eol = "\r\n";
161 	else
162 		mime_eol = "\n";
163 	if((flags & PKCS7_DETACHED) && data) {
164 	/* We want multipart/signed */
165 		/* Generate a random boundary */
166 		RAND_pseudo_bytes((unsigned char *)bound, 32);
167 		for(i = 0; i < 32; i++) {
168 			c = bound[i] & 0xf;
169 			if(c < 10) c += '0';
170 			else c += 'A' - 10;
171 			bound[i] = c;
172 		}
173 		bound[32] = 0;
174 		BIO_printf(bio, "MIME-Version: 1.0%s", mime_eol);
175 		BIO_printf(bio, "Content-Type: multipart/signed;");
176 		BIO_printf(bio, " protocol=\"%ssignature\";", mime_prefix);
177 		BIO_printf(bio, " micalg=sha1; boundary=\"----%s\"%s%s",
178 						bound, mime_eol, mime_eol);
179 		BIO_printf(bio, "This is an S/MIME signed message%s%s",
180 						mime_eol, mime_eol);
181 		/* Now write out the first part */
182 		BIO_printf(bio, "------%s%s", bound, mime_eol);
183 		pkcs7_output_data(bio, data, p7, flags);
184 		BIO_printf(bio, "%s------%s%s", mime_eol, bound, mime_eol);
185 
186 		/* Headers for signature */
187 
188 		BIO_printf(bio, "Content-Type: %ssignature;", mime_prefix);
189 		BIO_printf(bio, " name=\"smime.p7s\"%s", mime_eol);
190 		BIO_printf(bio, "Content-Transfer-Encoding: base64%s",
191 								mime_eol);
192 		BIO_printf(bio, "Content-Disposition: attachment;");
193 		BIO_printf(bio, " filename=\"smime.p7s\"%s%s",
194 							mime_eol, mime_eol);
195 		B64_write_PKCS7(bio, p7);
196 		BIO_printf(bio,"%s------%s--%s%s", mime_eol, bound,
197 							mime_eol, mime_eol);
198 		return 1;
199 	}
200 
201 	/* Determine smime-type header */
202 
203 	if (PKCS7_type_is_enveloped(p7))
204 		msg_type = "enveloped-data";
205 	else if (PKCS7_type_is_signed(p7))
206 		{
207 		/* If we have any signers it is signed-data othewise
208 		 * certs-only.
209 		 */
210 		STACK_OF(PKCS7_SIGNER_INFO) *sinfos;
211 		sinfos = PKCS7_get_signer_info(p7);
212 		if (sk_PKCS7_SIGNER_INFO_num(sinfos) > 0)
213 			msg_type = "signed-data";
214 		else
215 			msg_type = "certs-only";
216 		}
217 	/* MIME headers */
218 	BIO_printf(bio, "MIME-Version: 1.0%s", mime_eol);
219 	BIO_printf(bio, "Content-Disposition: attachment;");
220 	BIO_printf(bio, " filename=\"smime.p7m\"%s", mime_eol);
221 	BIO_printf(bio, "Content-Type: %smime;", mime_prefix);
222 	if (msg_type)
223 		BIO_printf(bio, " smime-type=%s;", msg_type);
224 	BIO_printf(bio, " name=\"smime.p7m\"%s", mime_eol);
225 	BIO_printf(bio, "Content-Transfer-Encoding: base64%s%s",
226 						mime_eol, mime_eol);
227 	B64_write_PKCS7(bio, p7);
228 	BIO_printf(bio, "%s", mime_eol);
229 	return 1;
230 }
231 
232 /* Handle output of PKCS#7 data */
233 
234 
235 static int pkcs7_output_data(BIO *out, BIO *data, PKCS7 *p7, int flags)
236 	{
237 	BIO *tmpbio, *p7bio;
238 
239 	if (!(flags & PKCS7_STREAM))
240 		{
241 		SMIME_crlf_copy(data, out, flags);
242 		return 1;
243 		}
244 
245 	/* Partial sign operation */
246 
247 	/* Initialize sign operation */
248 	p7bio = PKCS7_dataInit(p7, out);
249 
250 	/* Copy data across, computing digests etc */
251 	SMIME_crlf_copy(data, p7bio, flags);
252 
253 	/* Must be detached */
254 	PKCS7_set_detached(p7, 1);
255 
256 	/* Finalize signatures */
257 	PKCS7_dataFinal(p7, p7bio);
258 
259 	/* Now remove any digests prepended to the BIO */
260 
261 	while (p7bio != out)
262 		{
263 		tmpbio = BIO_pop(p7bio);
264 		BIO_free(p7bio);
265 		p7bio = tmpbio;
266 		}
267 
268 	return 1;
269 
270 	}
271 
272 /* SMIME reader: handle multipart/signed and opaque signing.
273  * in multipart case the content is placed in a memory BIO
274  * pointed to by "bcont". In opaque this is set to NULL
275  */
276 
277 PKCS7 *SMIME_read_PKCS7(BIO *bio, BIO **bcont)
278 {
279 	BIO *p7in;
280 	STACK_OF(MIME_HEADER) *headers = NULL;
281 	STACK_OF(BIO) *parts = NULL;
282 	MIME_HEADER *hdr;
283 	MIME_PARAM *prm;
284 	PKCS7 *p7;
285 	int ret;
286 
287 	if(bcont) *bcont = NULL;
288 
289 	if (!(headers = mime_parse_hdr(bio))) {
290 		PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_MIME_PARSE_ERROR);
291 		return NULL;
292 	}
293 
294 	if(!(hdr = mime_hdr_find(headers, "content-type")) || !hdr->value) {
295 		sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
296 		PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_CONTENT_TYPE);
297 		return NULL;
298 	}
299 
300 	/* Handle multipart/signed */
301 
302 	if(!strcmp(hdr->value, "multipart/signed")) {
303 		/* Split into two parts */
304 		prm = mime_param_find(hdr, "boundary");
305 		if(!prm || !prm->param_value) {
306 			sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
307 			PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_MULTIPART_BOUNDARY);
308 			return NULL;
309 		}
310 		ret = multi_split(bio, prm->param_value, &parts);
311 		sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
312 		if(!ret || (sk_BIO_num(parts) != 2) ) {
313 			PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_MULTIPART_BODY_FAILURE);
314 			sk_BIO_pop_free(parts, BIO_vfree);
315 			return NULL;
316 		}
317 
318 		/* Parse the signature piece */
319 		p7in = sk_BIO_value(parts, 1);
320 
321 		if (!(headers = mime_parse_hdr(p7in))) {
322 			PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_MIME_SIG_PARSE_ERROR);
323 			sk_BIO_pop_free(parts, BIO_vfree);
324 			return NULL;
325 		}
326 
327 		/* Get content type */
328 
329 		if(!(hdr = mime_hdr_find(headers, "content-type")) ||
330 								 !hdr->value) {
331 			sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
332 			PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_NO_SIG_CONTENT_TYPE);
333 			return NULL;
334 		}
335 
336 		if(strcmp(hdr->value, "application/x-pkcs7-signature") &&
337 			strcmp(hdr->value, "application/pkcs7-signature")) {
338 			sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
339 			PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_SIG_INVALID_MIME_TYPE);
340 			ERR_add_error_data(2, "type: ", hdr->value);
341 			sk_BIO_pop_free(parts, BIO_vfree);
342 			return NULL;
343 		}
344 		sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
345 		/* Read in PKCS#7 */
346 		if(!(p7 = B64_read_PKCS7(p7in))) {
347 			PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_PKCS7_SIG_PARSE_ERROR);
348 			sk_BIO_pop_free(parts, BIO_vfree);
349 			return NULL;
350 		}
351 
352 		if(bcont) {
353 			*bcont = sk_BIO_value(parts, 0);
354 			BIO_free(p7in);
355 			sk_BIO_free(parts);
356 		} else sk_BIO_pop_free(parts, BIO_vfree);
357 		return p7;
358 	}
359 
360 	/* OK, if not multipart/signed try opaque signature */
361 
362 	if (strcmp (hdr->value, "application/x-pkcs7-mime") &&
363 	    strcmp (hdr->value, "application/pkcs7-mime")) {
364 		PKCS7err(PKCS7_F_SMIME_READ_PKCS7,PKCS7_R_INVALID_MIME_TYPE);
365 		ERR_add_error_data(2, "type: ", hdr->value);
366 		sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
367 		return NULL;
368 	}
369 
370 	sk_MIME_HEADER_pop_free(headers, mime_hdr_free);
371 
372 	if(!(p7 = B64_read_PKCS7(bio))) {
373 		PKCS7err(PKCS7_F_SMIME_READ_PKCS7, PKCS7_R_PKCS7_PARSE_ERROR);
374 		return NULL;
375 	}
376 	return p7;
377 
378 }
379 
380 /* Split a multipart/XXX message body into component parts: result is
381  * canonical parts in a STACK of bios
382  */
383 
384 static int multi_split(BIO *bio, char *bound, STACK_OF(BIO) **ret)
385 {
386 	char linebuf[MAX_SMLEN];
387 	int len, blen;
388 	int eol = 0, next_eol = 0;
389 	BIO *bpart = NULL;
390 	STACK_OF(BIO) *parts;
391 	char state, part, first;
392 
393 	blen = strlen(bound);
394 	part = 0;
395 	state = 0;
396 	first = 1;
397 	parts = sk_BIO_new_null();
398 	*ret = parts;
399 	while ((len = BIO_gets(bio, linebuf, MAX_SMLEN)) > 0) {
400 		state = mime_bound_check(linebuf, len, bound, blen);
401 		if(state == 1) {
402 			first = 1;
403 			part++;
404 		} else if(state == 2) {
405 			sk_BIO_push(parts, bpart);
406 			return 1;
407 		} else if(part) {
408 			/* Strip CR+LF from linebuf */
409 			next_eol = strip_eol(linebuf, &len);
410 			if(first) {
411 				first = 0;
412 				if(bpart) sk_BIO_push(parts, bpart);
413 				bpart = BIO_new(BIO_s_mem());
414 				BIO_set_mem_eof_return(bpart, 0);
415 			} else if (eol)
416 				BIO_write(bpart, "\r\n", 2);
417 			eol = next_eol;
418 			if (len)
419 				BIO_write(bpart, linebuf, len);
420 		}
421 	}
422 	return 0;
423 }
424 
425 /* This is the big one: parse MIME header lines up to message body */
426 
427 #define MIME_INVALID	0
428 #define MIME_START	1
429 #define MIME_TYPE	2
430 #define MIME_NAME	3
431 #define MIME_VALUE	4
432 #define MIME_QUOTE	5
433 #define MIME_COMMENT	6
434 
435 
436 static STACK_OF(MIME_HEADER) *mime_parse_hdr(BIO *bio)
437 {
438 	char *p, *q, c;
439 	char *ntmp;
440 	char linebuf[MAX_SMLEN];
441 	MIME_HEADER *mhdr = NULL;
442 	STACK_OF(MIME_HEADER) *headers;
443 	int len, state, save_state = 0;
444 
445 	headers = sk_MIME_HEADER_new(mime_hdr_cmp);
446 	while ((len = BIO_gets(bio, linebuf, MAX_SMLEN)) > 0) {
447 	/* If whitespace at line start then continuation line */
448 	if(mhdr && isspace((unsigned char)linebuf[0])) state = MIME_NAME;
449 	else state = MIME_START;
450 	ntmp = NULL;
451 	/* Go through all characters */
452 	for(p = linebuf, q = linebuf; (c = *p) && (c!='\r') && (c!='\n'); p++) {
453 
454 	/* State machine to handle MIME headers
455 	 * if this looks horrible that's because it *is*
456          */
457 
458 		switch(state) {
459 			case MIME_START:
460 			if(c == ':') {
461 				state = MIME_TYPE;
462 				*p = 0;
463 				ntmp = strip_ends(q);
464 				q = p + 1;
465 			}
466 			break;
467 
468 			case MIME_TYPE:
469 			if(c == ';') {
470 				mime_debug("Found End Value\n");
471 				*p = 0;
472 				mhdr = mime_hdr_new(ntmp, strip_ends(q));
473 				sk_MIME_HEADER_push(headers, mhdr);
474 				ntmp = NULL;
475 				q = p + 1;
476 				state = MIME_NAME;
477 			} else if(c == '(') {
478 				save_state = state;
479 				state = MIME_COMMENT;
480 			}
481 			break;
482 
483 			case MIME_COMMENT:
484 			if(c == ')') {
485 				state = save_state;
486 			}
487 			break;
488 
489 			case MIME_NAME:
490 			if(c == '=') {
491 				state = MIME_VALUE;
492 				*p = 0;
493 				ntmp = strip_ends(q);
494 				q = p + 1;
495 			}
496 			break ;
497 
498 			case MIME_VALUE:
499 			if(c == ';') {
500 				state = MIME_NAME;
501 				*p = 0;
502 				mime_hdr_addparam(mhdr, ntmp, strip_ends(q));
503 				ntmp = NULL;
504 				q = p + 1;
505 			} else if (c == '"') {
506 				mime_debug("Found Quote\n");
507 				state = MIME_QUOTE;
508 			} else if(c == '(') {
509 				save_state = state;
510 				state = MIME_COMMENT;
511 			}
512 			break;
513 
514 			case MIME_QUOTE:
515 			if(c == '"') {
516 				mime_debug("Found Match Quote\n");
517 				state = MIME_VALUE;
518 			}
519 			break;
520 		}
521 	}
522 
523 	if(state == MIME_TYPE) {
524 		mhdr = mime_hdr_new(ntmp, strip_ends(q));
525 		sk_MIME_HEADER_push(headers, mhdr);
526 	} else if(state == MIME_VALUE)
527 			 mime_hdr_addparam(mhdr, ntmp, strip_ends(q));
528 	if(p == linebuf) break;	/* Blank line means end of headers */
529 }
530 
531 return headers;
532 
533 }
534 
535 static char *strip_ends(char *name)
536 {
537 	return strip_end(strip_start(name));
538 }
539 
540 /* Strip a parameter of whitespace from start of param */
541 static char *strip_start(char *name)
542 {
543 	char *p, c;
544 	/* Look for first non white space or quote */
545 	for(p = name; (c = *p) ;p++) {
546 		if(c == '"') {
547 			/* Next char is start of string if non null */
548 			if(p[1]) return p + 1;
549 			/* Else null string */
550 			return NULL;
551 		}
552 		if(!isspace((unsigned char)c)) return p;
553 	}
554 	return NULL;
555 }
556 
557 /* As above but strip from end of string : maybe should handle brackets? */
558 static char *strip_end(char *name)
559 {
560 	char *p, c;
561 	if(!name) return NULL;
562 	/* Look for first non white space or quote */
563 	for(p = name + strlen(name) - 1; p >= name ;p--) {
564 		c = *p;
565 		if(c == '"') {
566 			if(p - 1 == name) return NULL;
567 			*p = 0;
568 			return name;
569 		}
570 		if(isspace((unsigned char)c)) *p = 0;
571 		else return name;
572 	}
573 	return NULL;
574 }
575 
576 static MIME_HEADER *mime_hdr_new(char *name, char *value)
577 {
578 	MIME_HEADER *mhdr;
579 	char *tmpname, *tmpval, *p;
580 	int c;
581 	if(name) {
582 		if(!(tmpname = BUF_strdup(name))) return NULL;
583 		for(p = tmpname ; *p; p++) {
584 			c = *p;
585 			if(isupper(c)) {
586 				c = tolower(c);
587 				*p = c;
588 			}
589 		}
590 	} else tmpname = NULL;
591 	if(value) {
592 		if(!(tmpval = BUF_strdup(value))) return NULL;
593 		for(p = tmpval ; *p; p++) {
594 			c = *p;
595 			if(isupper(c)) {
596 				c = tolower(c);
597 				*p = c;
598 			}
599 		}
600 	} else tmpval = NULL;
601 	mhdr = (MIME_HEADER *) OPENSSL_malloc(sizeof(MIME_HEADER));
602 	if(!mhdr) return NULL;
603 	mhdr->name = tmpname;
604 	mhdr->value = tmpval;
605 	if(!(mhdr->params = sk_MIME_PARAM_new(mime_param_cmp))) return NULL;
606 	return mhdr;
607 }
608 
609 static int mime_hdr_addparam(MIME_HEADER *mhdr, char *name, char *value)
610 {
611 	char *tmpname, *tmpval, *p;
612 	int c;
613 	MIME_PARAM *mparam;
614 	if(name) {
615 		tmpname = BUF_strdup(name);
616 		if(!tmpname) return 0;
617 		for(p = tmpname ; *p; p++) {
618 			c = *p;
619 			if(isupper(c)) {
620 				c = tolower(c);
621 				*p = c;
622 			}
623 		}
624 	} else tmpname = NULL;
625 	if(value) {
626 		tmpval = BUF_strdup(value);
627 		if(!tmpval) return 0;
628 	} else tmpval = NULL;
629 	/* Parameter values are case sensitive so leave as is */
630 	mparam = (MIME_PARAM *) OPENSSL_malloc(sizeof(MIME_PARAM));
631 	if(!mparam) return 0;
632 	mparam->param_name = tmpname;
633 	mparam->param_value = tmpval;
634 	sk_MIME_PARAM_push(mhdr->params, mparam);
635 	return 1;
636 }
637 
638 static int mime_hdr_cmp(const MIME_HEADER * const *a,
639 			const MIME_HEADER * const *b)
640 {
641 	return(strcmp((*a)->name, (*b)->name));
642 }
643 
644 static int mime_param_cmp(const MIME_PARAM * const *a,
645 			const MIME_PARAM * const *b)
646 {
647 	return(strcmp((*a)->param_name, (*b)->param_name));
648 }
649 
650 /* Find a header with a given name (if possible) */
651 
652 static MIME_HEADER *mime_hdr_find(STACK_OF(MIME_HEADER) *hdrs, char *name)
653 {
654 	MIME_HEADER htmp;
655 	int idx;
656 	htmp.name = name;
657 	idx = sk_MIME_HEADER_find(hdrs, &htmp);
658 	if(idx < 0) return NULL;
659 	return sk_MIME_HEADER_value(hdrs, idx);
660 }
661 
662 static MIME_PARAM *mime_param_find(MIME_HEADER *hdr, char *name)
663 {
664 	MIME_PARAM param;
665 	int idx;
666 	param.param_name = name;
667 	idx = sk_MIME_PARAM_find(hdr->params, &param);
668 	if(idx < 0) return NULL;
669 	return sk_MIME_PARAM_value(hdr->params, idx);
670 }
671 
672 static void mime_hdr_free(MIME_HEADER *hdr)
673 {
674 	if(hdr->name) OPENSSL_free(hdr->name);
675 	if(hdr->value) OPENSSL_free(hdr->value);
676 	if(hdr->params) sk_MIME_PARAM_pop_free(hdr->params, mime_param_free);
677 	OPENSSL_free(hdr);
678 }
679 
680 static void mime_param_free(MIME_PARAM *param)
681 {
682 	if(param->param_name) OPENSSL_free(param->param_name);
683 	if(param->param_value) OPENSSL_free(param->param_value);
684 	OPENSSL_free(param);
685 }
686 
687 /* Check for a multipart boundary. Returns:
688  * 0 : no boundary
689  * 1 : part boundary
690  * 2 : final boundary
691  */
692 static int mime_bound_check(char *line, int linelen, char *bound, int blen)
693 {
694 	if(linelen == -1) linelen = strlen(line);
695 	if(blen == -1) blen = strlen(bound);
696 	/* Quickly eliminate if line length too short */
697 	if(blen + 2 > linelen) return 0;
698 	/* Check for part boundary */
699 	if(!strncmp(line, "--", 2) && !strncmp(line + 2, bound, blen)) {
700 		if(!strncmp(line + blen + 2, "--", 2)) return 2;
701 		else return 1;
702 	}
703 	return 0;
704 }
705 
706 static int strip_eol(char *linebuf, int *plen)
707 	{
708 	int len = *plen;
709 	char *p, c;
710 	int is_eol = 0;
711 	p = linebuf + len - 1;
712 	for (p = linebuf + len - 1; len > 0; len--, p--)
713 		{
714 		c = *p;
715 		if (c == '\n')
716 			is_eol = 1;
717 		else if (c != '\r')
718 			break;
719 		}
720 	*plen = len;
721 	return is_eol;
722 	}
723