1 /* p12_attr.c */ 2 /* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL 3 * project 1999. 4 */ 5 /* ==================================================================== 6 * Copyright (c) 1999 The OpenSSL Project. All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in 17 * the documentation and/or other materials provided with the 18 * distribution. 19 * 20 * 3. All advertising materials mentioning features or use of this 21 * software must display the following acknowledgment: 22 * "This product includes software developed by the OpenSSL Project 23 * for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)" 24 * 25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 26 * endorse or promote products derived from this software without 27 * prior written permission. For written permission, please contact 28 * licensing@OpenSSL.org. 29 * 30 * 5. Products derived from this software may not be called "OpenSSL" 31 * nor may "OpenSSL" appear in their names without prior written 32 * permission of the OpenSSL Project. 33 * 34 * 6. Redistributions of any form whatsoever must retain the following 35 * acknowledgment: 36 * "This product includes software developed by the OpenSSL Project 37 * for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)" 38 * 39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 42 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 50 * OF THE POSSIBILITY OF SUCH DAMAGE. 51 * ==================================================================== 52 * 53 * This product includes cryptographic software written by Eric Young 54 * (eay@cryptsoft.com). This product includes software written by Tim 55 * Hudson (tjh@cryptsoft.com). 56 * 57 */ 58 59 #include <stdio.h> 60 #include "cryptlib.h" 61 #include <openssl/pkcs12.h> 62 63 /* Add a local keyid to a safebag */ 64 65 int PKCS12_add_localkeyid (PKCS12_SAFEBAG *bag, unsigned char *name, 66 int namelen) 67 { 68 X509_ATTRIBUTE *attrib; 69 ASN1_BMPSTRING *oct; 70 ASN1_TYPE *keyid; 71 if (!(keyid = ASN1_TYPE_new ())) { 72 PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE); 73 return 0; 74 } 75 keyid->type = V_ASN1_OCTET_STRING; 76 if (!(oct = M_ASN1_OCTET_STRING_new())) { 77 PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE); 78 return 0; 79 } 80 if (!M_ASN1_OCTET_STRING_set(oct, name, namelen)) { 81 PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE); 82 return 0; 83 } 84 keyid->value.octet_string = oct; 85 if (!(attrib = X509_ATTRIBUTE_new ())) { 86 PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE); 87 return 0; 88 } 89 attrib->object = OBJ_nid2obj(NID_localKeyID); 90 if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) { 91 PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE); 92 return 0; 93 } 94 sk_ASN1_TYPE_push (attrib->value.set,keyid); 95 attrib->set = 1; 96 if (!bag->attrib && !(bag->attrib = sk_X509_ATTRIBUTE_new_null ())) { 97 PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE); 98 return 0; 99 } 100 sk_X509_ATTRIBUTE_push (bag->attrib, attrib); 101 return 1; 102 } 103 104 /* Add key usage to PKCS#8 structure */ 105 106 int PKCS8_add_keyusage (PKCS8_PRIV_KEY_INFO *p8, int usage) 107 { 108 X509_ATTRIBUTE *attrib; 109 ASN1_BIT_STRING *bstr; 110 ASN1_TYPE *keyid; 111 unsigned char us_val; 112 us_val = (unsigned char) usage; 113 if (!(keyid = ASN1_TYPE_new ())) { 114 PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE); 115 return 0; 116 } 117 keyid->type = V_ASN1_BIT_STRING; 118 if (!(bstr = M_ASN1_BIT_STRING_new())) { 119 PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE); 120 return 0; 121 } 122 if (!M_ASN1_BIT_STRING_set(bstr, &us_val, 1)) { 123 PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE); 124 return 0; 125 } 126 keyid->value.bit_string = bstr; 127 if (!(attrib = X509_ATTRIBUTE_new ())) { 128 PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE); 129 return 0; 130 } 131 attrib->object = OBJ_nid2obj(NID_key_usage); 132 if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) { 133 PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE); 134 return 0; 135 } 136 sk_ASN1_TYPE_push (attrib->value.set,keyid); 137 attrib->set = 1; 138 if (!p8->attributes 139 && !(p8->attributes = sk_X509_ATTRIBUTE_new_null ())) { 140 PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE); 141 return 0; 142 } 143 sk_X509_ATTRIBUTE_push (p8->attributes, attrib); 144 return 1; 145 } 146 147 /* Add a friendlyname to a safebag */ 148 149 int PKCS12_add_friendlyname_asc (PKCS12_SAFEBAG *bag, const char *name, 150 int namelen) 151 { 152 unsigned char *uniname; 153 int ret, unilen; 154 if (!asc2uni(name, namelen, &uniname, &unilen)) { 155 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC, 156 ERR_R_MALLOC_FAILURE); 157 return 0; 158 } 159 ret = PKCS12_add_friendlyname_uni (bag, uniname, unilen); 160 OPENSSL_free(uniname); 161 return ret; 162 } 163 164 165 int PKCS12_add_friendlyname_uni (PKCS12_SAFEBAG *bag, 166 const unsigned char *name, int namelen) 167 { 168 X509_ATTRIBUTE *attrib; 169 ASN1_BMPSTRING *bmp; 170 ASN1_TYPE *fname; 171 /* Zap ending double null if included */ 172 if(!name[namelen - 1] && !name[namelen - 2]) namelen -= 2; 173 if (!(fname = ASN1_TYPE_new ())) { 174 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI, 175 ERR_R_MALLOC_FAILURE); 176 return 0; 177 } 178 fname->type = V_ASN1_BMPSTRING; 179 if (!(bmp = M_ASN1_BMPSTRING_new())) { 180 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI, 181 ERR_R_MALLOC_FAILURE); 182 return 0; 183 } 184 if (!(bmp->data = OPENSSL_malloc (namelen))) { 185 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI, 186 ERR_R_MALLOC_FAILURE); 187 return 0; 188 } 189 memcpy (bmp->data, name, namelen); 190 bmp->length = namelen; 191 fname->value.bmpstring = bmp; 192 if (!(attrib = X509_ATTRIBUTE_new ())) { 193 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI, 194 ERR_R_MALLOC_FAILURE); 195 return 0; 196 } 197 attrib->object = OBJ_nid2obj(NID_friendlyName); 198 if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) { 199 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME, 200 ERR_R_MALLOC_FAILURE); 201 return 0; 202 } 203 sk_ASN1_TYPE_push (attrib->value.set,fname); 204 attrib->set = 1; 205 if (!bag->attrib && !(bag->attrib = sk_X509_ATTRIBUTE_new_null ())) { 206 PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI, 207 ERR_R_MALLOC_FAILURE); 208 return 0; 209 } 210 sk_X509_ATTRIBUTE_push (bag->attrib, attrib); 211 return PKCS12_OK; 212 } 213 214 ASN1_TYPE *PKCS12_get_attr_gen (STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid) 215 { 216 X509_ATTRIBUTE *attrib; 217 int i; 218 if (!attrs) return NULL; 219 for (i = 0; i < sk_X509_ATTRIBUTE_num (attrs); i++) { 220 attrib = sk_X509_ATTRIBUTE_value (attrs, i); 221 if (OBJ_obj2nid (attrib->object) == attr_nid) { 222 if (sk_ASN1_TYPE_num (attrib->value.set)) 223 return sk_ASN1_TYPE_value(attrib->value.set, 0); 224 else return NULL; 225 } 226 } 227 return NULL; 228 } 229 230 char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag) 231 { 232 ASN1_TYPE *atype; 233 if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL; 234 if (atype->type != V_ASN1_BMPSTRING) return NULL; 235 return uni2asc(atype->value.bmpstring->data, 236 atype->value.bmpstring->length); 237 } 238 239