p12_attr.c revision 68651
1/* p12_attr.c */
2/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
3 * project 1999.
4 */
5/* ====================================================================
6 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 *    notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in
17 *    the documentation and/or other materials provided with the
18 *    distribution.
19 *
20 * 3. All advertising materials mentioning features or use of this
21 *    software must display the following acknowledgment:
22 *    "This product includes software developed by the OpenSSL Project
23 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
24 *
25 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
26 *    endorse or promote products derived from this software without
27 *    prior written permission. For written permission, please contact
28 *    licensing@OpenSSL.org.
29 *
30 * 5. Products derived from this software may not be called "OpenSSL"
31 *    nor may "OpenSSL" appear in their names without prior written
32 *    permission of the OpenSSL Project.
33 *
34 * 6. Redistributions of any form whatsoever must retain the following
35 *    acknowledgment:
36 *    "This product includes software developed by the OpenSSL Project
37 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
38 *
39 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
40 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
41 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
42 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
43 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
44 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
45 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
46 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
47 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
48 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
49 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
50 * OF THE POSSIBILITY OF SUCH DAMAGE.
51 * ====================================================================
52 *
53 * This product includes cryptographic software written by Eric Young
54 * (eay@cryptsoft.com).  This product includes software written by Tim
55 * Hudson (tjh@cryptsoft.com).
56 *
57 */
58
59#include <stdio.h>
60#include "cryptlib.h"
61#include <openssl/pkcs12.h>
62
63/* Add a local keyid to a safebag */
64
65int PKCS12_add_localkeyid (PKCS12_SAFEBAG *bag, unsigned char *name,
66	     int namelen)
67{
68	X509_ATTRIBUTE *attrib;
69	ASN1_BMPSTRING *oct;
70	ASN1_TYPE *keyid;
71	if (!(keyid = ASN1_TYPE_new ())) {
72		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
73		return 0;
74	}
75	keyid->type = V_ASN1_OCTET_STRING;
76	if (!(oct = M_ASN1_OCTET_STRING_new())) {
77		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
78		return 0;
79	}
80	if (!M_ASN1_OCTET_STRING_set(oct, name, namelen)) {
81		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
82		return 0;
83	}
84	keyid->value.octet_string = oct;
85	if (!(attrib = X509_ATTRIBUTE_new ())) {
86		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
87		return 0;
88	}
89	attrib->object = OBJ_nid2obj(NID_localKeyID);
90	if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) {
91		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
92		return 0;
93	}
94	sk_ASN1_TYPE_push (attrib->value.set,keyid);
95	attrib->set = 1;
96	if (!bag->attrib && !(bag->attrib = sk_X509_ATTRIBUTE_new_null ())) {
97		PKCS12err(PKCS12_F_PKCS12_ADD_LOCALKEYID, ERR_R_MALLOC_FAILURE);
98		return 0;
99	}
100	sk_X509_ATTRIBUTE_push (bag->attrib, attrib);
101	return 1;
102}
103
104/* Add key usage to PKCS#8 structure */
105
106int PKCS8_add_keyusage (PKCS8_PRIV_KEY_INFO *p8, int usage)
107{
108	X509_ATTRIBUTE *attrib;
109	ASN1_BIT_STRING *bstr;
110	ASN1_TYPE *keyid;
111	unsigned char us_val;
112	us_val = (unsigned char) usage;
113	if (!(keyid = ASN1_TYPE_new ())) {
114		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
115		return 0;
116	}
117	keyid->type = V_ASN1_BIT_STRING;
118	if (!(bstr = M_ASN1_BIT_STRING_new())) {
119		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
120		return 0;
121	}
122	if (!M_ASN1_BIT_STRING_set(bstr, &us_val, 1)) {
123		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
124		return 0;
125	}
126	keyid->value.bit_string = bstr;
127	if (!(attrib = X509_ATTRIBUTE_new ())) {
128		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
129		return 0;
130	}
131	attrib->object = OBJ_nid2obj(NID_key_usage);
132	if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) {
133		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
134		return 0;
135	}
136	sk_ASN1_TYPE_push (attrib->value.set,keyid);
137	attrib->set = 1;
138	if (!p8->attributes
139	    && !(p8->attributes = sk_X509_ATTRIBUTE_new_null ())) {
140		PKCS12err(PKCS12_F_PKCS8_ADD_KEYUSAGE, ERR_R_MALLOC_FAILURE);
141		return 0;
142	}
143	sk_X509_ATTRIBUTE_push (p8->attributes, attrib);
144	return 1;
145}
146
147/* Add a friendlyname to a safebag */
148
149int PKCS12_add_friendlyname_asc (PKCS12_SAFEBAG *bag, const char *name,
150				 int namelen)
151{
152	unsigned char *uniname;
153	int ret, unilen;
154	if (!asc2uni(name, &uniname, &unilen)) {
155		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_ASC,
156							ERR_R_MALLOC_FAILURE);
157		return 0;
158	}
159	ret = PKCS12_add_friendlyname_uni (bag, uniname, unilen);
160	OPENSSL_free(uniname);
161	return ret;
162}
163
164
165int PKCS12_add_friendlyname_uni (PKCS12_SAFEBAG *bag,
166				 const unsigned char *name, int namelen)
167{
168	X509_ATTRIBUTE *attrib;
169	ASN1_BMPSTRING *bmp;
170	ASN1_TYPE *fname;
171	/* Zap ending double null if included */
172	if(!name[namelen - 1] && !name[namelen - 2]) namelen -= 2;
173	if (!(fname = ASN1_TYPE_new ())) {
174		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
175							ERR_R_MALLOC_FAILURE);
176		return 0;
177	}
178	fname->type = V_ASN1_BMPSTRING;
179	if (!(bmp = M_ASN1_BMPSTRING_new())) {
180		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
181							ERR_R_MALLOC_FAILURE);
182		return 0;
183	}
184	if (!(bmp->data = OPENSSL_malloc (namelen))) {
185		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
186							ERR_R_MALLOC_FAILURE);
187		return 0;
188	}
189	memcpy (bmp->data, name, namelen);
190	bmp->length = namelen;
191	fname->value.bmpstring = bmp;
192	if (!(attrib = X509_ATTRIBUTE_new ())) {
193		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
194							ERR_R_MALLOC_FAILURE);
195		return 0;
196	}
197	attrib->object = OBJ_nid2obj(NID_friendlyName);
198	if (!(attrib->value.set = sk_ASN1_TYPE_new_null())) {
199		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME,
200							ERR_R_MALLOC_FAILURE);
201		return 0;
202	}
203	sk_ASN1_TYPE_push (attrib->value.set,fname);
204	attrib->set = 1;
205	if (!bag->attrib && !(bag->attrib = sk_X509_ATTRIBUTE_new_null ())) {
206		PKCS12err(PKCS12_F_PKCS12_ADD_FRIENDLYNAME_UNI,
207							ERR_R_MALLOC_FAILURE);
208		return 0;
209	}
210	sk_X509_ATTRIBUTE_push (bag->attrib, attrib);
211	return PKCS12_OK;
212}
213
214ASN1_TYPE *PKCS12_get_attr_gen (STACK_OF(X509_ATTRIBUTE) *attrs, int attr_nid)
215{
216	X509_ATTRIBUTE *attrib;
217	int i;
218	if (!attrs) return NULL;
219	for (i = 0; i < sk_X509_ATTRIBUTE_num (attrs); i++) {
220		attrib = sk_X509_ATTRIBUTE_value (attrs, i);
221		if (OBJ_obj2nid (attrib->object) == attr_nid) {
222			if (sk_ASN1_TYPE_num (attrib->value.set))
223			    return sk_ASN1_TYPE_value(attrib->value.set, 0);
224			else return NULL;
225		}
226	}
227	return NULL;
228}
229
230char *PKCS12_get_friendlyname(PKCS12_SAFEBAG *bag)
231{
232	ASN1_TYPE *atype;
233	if (!(atype = PKCS12_get_attr(bag, NID_friendlyName))) return NULL;
234	if (atype->type != V_ASN1_BMPSTRING) return NULL;
235	return uni2asc(atype->value.bmpstring->data,
236				 atype->value.bmpstring->length);
237}
238
239