xref: /openbsd/lib/libcrypto/pkcs12/p12_attr.c (revision d485f761)
1 /* p12_attr.c */
2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3  * project 1999.
4  */
5 /* ====================================================================
6  * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  *
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in
17  *    the documentation and/or other materials provided with the
18  *    distribution.
19  *
20  * 3. All advertising materials mentioning features or use of this
21  *    software must display the following acknowledgment:
22  *    "This product includes software developed by the OpenSSL Project
23  *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24  *
25  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26  *    endorse or promote products derived from this software without
27  *    prior written permission. For written permission, please contact
28  *    licensing@OpenSSL.org.
29  *
30  * 5. Products derived from this software may not be called "OpenSSL"
31  *    nor may "OpenSSL" appear in their names without prior written
32  *    permission of the OpenSSL Project.
33  *
34  * 6. Redistributions of any form whatsoever must retain the following
35  *    acknowledgment:
36  *    "This product includes software developed by the OpenSSL Project
37  *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38  *
39  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50  * OF THE POSSIBILITY OF SUCH DAMAGE.
51  * ====================================================================
52  *
53  * This product includes cryptographic software written by Eric Young
54  * (eay@cryptsoft.com).  This product includes software written by Tim
55  * Hudson (tjh@cryptsoft.com).
56  *
57  */
58 
59 #include <stdio.h>
60 #include "cryptlib.h"
61 #include <openssl/pkcs12.h>
62 
63 /* Add a local keyid to a safebag */
64 
65 int PKCS12_add_localkeyid (PKCS12_SAFEBAG *bag, unsigned char *name,
66 	     int namelen)
67 {
68 	X509_ATTRIBUTE *attrib;
69 	ASN1_BMPSTRING *oct;
70 	ASN1_TYPE *keyid;
71 	if (!(keyid = ASN1_TYPE_new ())) {
72 		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
73 		return 0;
74 	}
75 	keyid->type = V_ASN1_OCTET_STRING;
76 	if (!(oct = M_ASN1_OCTET_STRING_new())) {
77 		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
78 		return 0;
79 	}
80 	if (!M_ASN1_OCTET_STRING_set(oct, name, namelen)) {
81 		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
82 		return 0;
83 	}
84 	keyid->value.octet_string = oct;
85 	if (!(attrib = X509_ATTRIBUTE_new ())) {
86 		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
87 		return 0;
88 	}
89 	attrib->object = OBJ_nid2obj(NID_localKeyID);
90 	if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) {
91 		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
92 		return 0;
93 	}
94 	sk_ASN1_TYPE_push (attrib->value.set,keyid);
95 	attrib->set = 1;
96 	if (!bag->attrib && !(bag->attrib = sk_X509_ATTRIBUTE_new_null ())) {
97 		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
98 		return 0;
99 	}
100 	sk_X509_ATTRIBUTE_push (bag->attrib, attrib);
101 	return 1;
102 }
103 
104 /* Add key usage to PKCS#8 structure */
105 
106 int PKCS8_add_keyusage (PKCS8_PRIV_KEY_INFO *p8, int usage)
107 {
108 	X509_ATTRIBUTE *attrib;
109 	ASN1_BIT_STRING *bstr;
110 	ASN1_TYPE *keyid;
111 	unsigned char us_val;
112 	us_val = (unsigned char) usage;
113 	if (!(keyid = ASN1_TYPE_new ())) {
114 		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
115 		return 0;
116 	}
117 	keyid->type = V_ASN1_BIT_STRING;
118 	if (!(bstr = M_ASN1_BIT_STRING_new())) {
119 		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
120 		return 0;
121 	}
122 	if (!M_ASN1_BIT_STRING_set(bstr, &us_val, 1)) {
123 		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
124 		return 0;
125 	}
126 	keyid->value.bit_string = bstr;
127 	if (!(attrib = X509_ATTRIBUTE_new ())) {
128 		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
129 		return 0;
130 	}
131 	attrib->object = OBJ_nid2obj(NID_key_usage);
132 	if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) {
133 		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
134 		return 0;
135 	}
136 	sk_ASN1_TYPE_push (attrib->value.set,keyid);
137 	attrib->set = 1;
138 	if (!p8->attributes
139 	    && !(p8->attributes = sk_X509_ATTRIBUTE_new_null ())) {
140 		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
141 		return 0;
142 	}
143 	sk_X509_ATTRIBUTE_push (p8->attributes, attrib);
144 	return 1;
145 }
146 
147 /* Add a friendlyname to a safebag */
148 
149 int PKCS12_add_friendlyname_asc (PKCS12_SAFEBAG *bag, const char *name,
150 				 int namelen)
151 {
152 	unsigned char *uniname;
153 	int ret, unilen;
154 	if (!asc2uni(name, namelen, &uniname, &unilen)) {
155 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC,
156 							ERR_R_MALLOC_FAILURE);
157 		return 0;
158 	}
159 	ret = PKCS12_add_friendlyname_uni (bag, uniname, unilen);
160 	OPENSSL_free(uniname);
161 	return ret;
162 }
163 
164 
165 int PKCS12_add_friendlyname_uni (PKCS12_SAFEBAG *bag,
166 				 const unsigned char *name, int namelen)
167 {
168 	X509_ATTRIBUTE *attrib;
169 	ASN1_BMPSTRING *bmp;
170 	ASN1_TYPE *fname;
171 	/* Zap ending double null if included */
172 	if(!name[namelen - 1] && !name[namelen - 2]) namelen -= 2;
173 	if (!(fname = ASN1_TYPE_new ())) {
174 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
175 							ERR_R_MALLOC_FAILURE);
176 		return 0;
177 	}
178 	fname->type = V_ASN1_BMPSTRING;
179 	if (!(bmp = M_ASN1_BMPSTRING_new())) {
180 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
181 							ERR_R_MALLOC_FAILURE);
182 		return 0;
183 	}
184 	if (!(bmp->data = OPENSSL_malloc (namelen))) {
185 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
186 							ERR_R_MALLOC_FAILURE);
187 		return 0;
188 	}
189 	memcpy (bmp->data, name, namelen);
190 	bmp->length = namelen;
191 	fname->value.bmpstring = bmp;
192 	if (!(attrib = X509_ATTRIBUTE_new ())) {
193 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
194 							ERR_R_MALLOC_FAILURE);
195 		return 0;
196 	}
197 	attrib->object = OBJ_nid2obj(NID_friendlyName);
198 	if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) {
199 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME,
200 							ERR_R_MALLOC_FAILURE);
201 		return 0;
202 	}
203 	sk_ASN1_TYPE_push (attrib->value.set,fname);
204 	attrib->set = 1;
205 	if (!bag->attrib && !(bag->attrib = sk_X509_ATTRIBUTE_new_null ())) {
206 		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
207 							ERR_R_MALLOC_FAILURE);
208 		return 0;
209 	}
210 	sk_X509_ATTRIBUTE_push (bag->attrib, attrib);
211 	return PKCS12_OK;
212 }
213 
214 ASN1_TYPE *PKCS12_get_attr_gen (STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid)
215 {
216 	X509_ATTRIBUTE *attrib;
217 	int i;
218 	if (!attrs) return NULL;
219 	for (i = 0; i < sk_X509_ATTRIBUTE_num (attrs); i++) {
220 		attrib = sk_X509_ATTRIBUTE_value (attrs, i);
221 		if (OBJ_obj2nid (attrib->object) == attr_nid) {
222 			if (sk_ASN1_TYPE_num (attrib->value.set))
223 			    return sk_ASN1_TYPE_value(attrib->value.set, 0);
224 			else return NULL;
225 		}
226 	}
227 	return NULL;
228 }
229 
230 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag)
231 {
232 	ASN1_TYPE *atype;
233 	if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL;
234 	if (atype->type != V_ASN1_BMPSTRING) return NULL;
235 	return uni2asc(atype->value.bmpstring->data,
236 				 atype->value.bmpstring->length);
237 }
238 
239