mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
b49af54726
--HG-- rename : security/coreconf/AIX.mk => security/nss/coreconf/AIX.mk rename : security/coreconf/Android.mk => security/nss/coreconf/Android.mk rename : security/coreconf/BSD_OS.mk => security/nss/coreconf/BSD_OS.mk rename : security/coreconf/BeOS.mk => security/nss/coreconf/BeOS.mk rename : security/coreconf/Darwin.mk => security/nss/coreconf/Darwin.mk rename : security/coreconf/FreeBSD.mk => security/nss/coreconf/FreeBSD.mk rename : security/coreconf/HP-UX.mk => security/nss/coreconf/HP-UX.mk rename : security/coreconf/HP-UXA.09.03.mk => security/nss/coreconf/HP-UXA.09.03.mk rename : security/coreconf/HP-UXA.09.07.mk => security/nss/coreconf/HP-UXA.09.07.mk rename : security/coreconf/HP-UXA.09.mk => security/nss/coreconf/HP-UXA.09.mk rename : security/coreconf/HP-UXB.10.01.mk => security/nss/coreconf/HP-UXB.10.01.mk rename : security/coreconf/HP-UXB.10.10.mk => security/nss/coreconf/HP-UXB.10.10.mk rename : security/coreconf/HP-UXB.10.20.mk => security/nss/coreconf/HP-UXB.10.20.mk rename : security/coreconf/HP-UXB.10.30.mk => security/nss/coreconf/HP-UXB.10.30.mk rename : security/coreconf/HP-UXB.10.mk => security/nss/coreconf/HP-UXB.10.mk rename : security/coreconf/HP-UXB.11.00.mk => security/nss/coreconf/HP-UXB.11.00.mk rename : security/coreconf/HP-UXB.11.11.mk => security/nss/coreconf/HP-UXB.11.11.mk rename : security/coreconf/HP-UXB.11.20.mk => security/nss/coreconf/HP-UXB.11.20.mk rename : security/coreconf/HP-UXB.11.22.mk => security/nss/coreconf/HP-UXB.11.22.mk rename : security/coreconf/HP-UXB.11.23.mk => security/nss/coreconf/HP-UXB.11.23.mk rename : security/coreconf/HP-UXB.11.mk => security/nss/coreconf/HP-UXB.11.mk rename : security/coreconf/IRIX.mk => security/nss/coreconf/IRIX.mk rename : security/coreconf/IRIX5.2.mk => security/nss/coreconf/IRIX5.2.mk rename : security/coreconf/IRIX5.3.mk => security/nss/coreconf/IRIX5.3.mk rename : security/coreconf/IRIX5.mk => security/nss/coreconf/IRIX5.mk rename : security/coreconf/IRIX6.2.mk => security/nss/coreconf/IRIX6.2.mk rename : security/coreconf/IRIX6.3.mk => security/nss/coreconf/IRIX6.3.mk rename : security/coreconf/IRIX6.5.mk => security/nss/coreconf/IRIX6.5.mk rename : security/coreconf/IRIX6.mk => security/nss/coreconf/IRIX6.mk rename : security/coreconf/Linux.mk => security/nss/coreconf/Linux.mk rename : security/coreconf/Makefile => security/nss/coreconf/Makefile rename : security/coreconf/NCR3.0.mk => security/nss/coreconf/NCR3.0.mk rename : security/coreconf/NEC4.2.mk => security/nss/coreconf/NEC4.2.mk rename : security/coreconf/NetBSD.mk => security/nss/coreconf/NetBSD.mk rename : security/coreconf/OS2.mk => security/nss/coreconf/OS2.mk rename : security/coreconf/OSF1.mk => security/nss/coreconf/OSF1.mk rename : security/coreconf/OSF1V3.0.mk => security/nss/coreconf/OSF1V2.0.mk rename : security/coreconf/OSF1V3.0.mk => security/nss/coreconf/OSF1V3.0.mk rename : security/coreconf/OSF1V3.2.mk => security/nss/coreconf/OSF1V3.2.mk rename : security/coreconf/OSF1V4.0.mk => security/nss/coreconf/OSF1V4.0.mk rename : security/coreconf/OSF1V4.0B.mk => security/nss/coreconf/OSF1V4.0B.mk rename : security/coreconf/OSF1V4.0D.mk => security/nss/coreconf/OSF1V4.0D.mk rename : security/coreconf/OSF1V5.0.mk => security/nss/coreconf/OSF1V5.0.mk rename : security/coreconf/OSF1V5.1.mk => security/nss/coreconf/OSF1V5.1.mk rename : security/coreconf/OpenBSD.mk => security/nss/coreconf/OpenBSD.mk rename : security/coreconf/OpenUNIX.mk => security/nss/coreconf/OpenUNIX.mk rename : security/coreconf/QNX.mk => security/nss/coreconf/QNX.mk rename : security/coreconf/README => security/nss/coreconf/README rename : security/coreconf/RISCOS.mk => security/nss/coreconf/RISCOS.mk rename : security/coreconf/ReliantUNIX.mk => security/nss/coreconf/ReliantUNIX.mk rename : security/coreconf/ReliantUNIX5.4.mk => security/nss/coreconf/ReliantUNIX5.4.mk rename : security/coreconf/SCOOS5.0.mk => security/nss/coreconf/SCOOS5.0.mk rename : security/coreconf/SCO_SV3.2.mk => security/nss/coreconf/SCO_SV3.2.mk rename : security/coreconf/SunOS4.1.3_U1.mk => security/nss/coreconf/SunOS4.1.3_U1.mk rename : security/coreconf/UNIX.mk => security/nss/coreconf/UNIX.mk rename : security/coreconf/UNIXWARE2.1.mk => security/nss/coreconf/UNIXWARE2.1.mk rename : security/coreconf/WIN95.mk => security/nss/coreconf/WIN95.mk rename : security/coreconf/WINNT.mk => security/nss/coreconf/WINNT.mk rename : security/coreconf/arch.mk => security/nss/coreconf/arch.mk rename : security/coreconf/command.mk => security/nss/coreconf/command.mk rename : security/coreconf/coreconf.pl => security/nss/coreconf/coreconf.pl rename : security/coreconf/cpdist.pl => security/nss/coreconf/cpdist.pl rename : security/coreconf/headers.mk => security/nss/coreconf/headers.mk rename : security/coreconf/import.pl => security/nss/coreconf/import.pl rename : security/coreconf/jdk.mk => security/nss/coreconf/jdk.mk rename : security/coreconf/jniregen.pl => security/nss/coreconf/jniregen.pl rename : security/coreconf/location.mk => security/nss/coreconf/location.mk rename : security/coreconf/mkdepend/Makefile => security/nss/coreconf/mkdepend/Makefile rename : security/coreconf/mkdepend/cppsetup.c => security/nss/coreconf/mkdepend/cppsetup.c rename : security/coreconf/mkdepend/def.h => security/nss/coreconf/mkdepend/def.h rename : security/coreconf/mkdepend/ifparser.c => security/nss/coreconf/mkdepend/ifparser.c rename : security/coreconf/mkdepend/ifparser.h => security/nss/coreconf/mkdepend/ifparser.h rename : security/coreconf/mkdepend/imakemdep.h => security/nss/coreconf/mkdepend/imakemdep.h rename : security/coreconf/mkdepend/include.c => security/nss/coreconf/mkdepend/include.c rename : security/coreconf/mkdepend/main.c => security/nss/coreconf/mkdepend/main.c rename : security/coreconf/mkdepend/mkdepend.man => security/nss/coreconf/mkdepend/mkdepend.man rename : security/coreconf/mkdepend/parse.c => security/nss/coreconf/mkdepend/parse.c rename : security/coreconf/mkdepend/pr.c => security/nss/coreconf/mkdepend/pr.c rename : security/coreconf/module.mk => security/nss/coreconf/module.mk rename : security/coreconf/nsinstall/Makefile => security/nss/coreconf/nsinstall/Makefile rename : security/coreconf/nsinstall/nsinstall.c => security/nss/coreconf/nsinstall/nsinstall.c rename : security/coreconf/nsinstall/pathsub.c => security/nss/coreconf/nsinstall/pathsub.c rename : security/coreconf/nsinstall/pathsub.h => security/nss/coreconf/nsinstall/pathsub.h rename : security/coreconf/nsinstall/sunos4.h => security/nss/coreconf/nsinstall/sunos4.h rename : security/coreconf/outofdate.pl => security/nss/coreconf/outofdate.pl rename : security/coreconf/prefix.mk => security/nss/coreconf/prefix.mk rename : security/coreconf/release.pl => security/nss/coreconf/release.pl rename : security/coreconf/rules.mk => security/nss/coreconf/rules.mk rename : security/coreconf/ruleset.mk => security/nss/coreconf/ruleset.mk rename : security/coreconf/source.mk => security/nss/coreconf/source.mk rename : security/coreconf/suffix.mk => security/nss/coreconf/suffix.mk rename : security/coreconf/tree.mk => security/nss/coreconf/tree.mk rename : security/coreconf/version.mk => security/nss/coreconf/version.mk rename : security/coreconf/version.pl => security/nss/coreconf/version.pl rename : security/dbm/config/config.mk => security/nss/lib/dbm/config/config.mk rename : dbm/include/cdefs.h => security/nss/lib/dbm/include/cdefs.h rename : dbm/include/extern.h => security/nss/lib/dbm/include/extern.h rename : dbm/include/hash.h => security/nss/lib/dbm/include/hash.h rename : dbm/include/search.h => security/nss/lib/dbm/include/hsearch.h rename : dbm/include/mcom_db.h => security/nss/lib/dbm/include/mcom_db.h rename : dbm/include/mpool.h => security/nss/lib/dbm/include/mpool.h rename : dbm/include/ncompat.h => security/nss/lib/dbm/include/ncompat.h rename : dbm/include/page.h => security/nss/lib/dbm/include/page.h rename : dbm/include/queue.h => security/nss/lib/dbm/include/queue.h rename : dbm/include/search.h => security/nss/lib/dbm/include/search.h rename : dbm/include/winfile.h => security/nss/lib/dbm/include/winfile.h rename : dbm/src/db.c => security/nss/lib/dbm/src/db.c rename : security/dbm/src/dirent.c => security/nss/lib/dbm/src/dirent.c rename : security/dbm/src/dirent.h => security/nss/lib/dbm/src/dirent.h rename : dbm/src/h_bigkey.c => security/nss/lib/dbm/src/h_bigkey.c rename : dbm/src/h_func.c => security/nss/lib/dbm/src/h_func.c rename : dbm/src/h_log2.c => security/nss/lib/dbm/src/h_log2.c rename : dbm/src/h_page.c => security/nss/lib/dbm/src/h_page.c rename : dbm/src/hash.c => security/nss/lib/dbm/src/hash.c rename : dbm/src/hash_buf.c => security/nss/lib/dbm/src/hash_buf.c rename : dbm/src/memmove.c => security/nss/lib/dbm/src/memmove.c rename : dbm/src/mktemp.c => security/nss/lib/dbm/src/mktemp.c rename : dbm/src/snprintf.c => security/nss/lib/dbm/src/snprintf.c rename : dbm/src/strerror.c => security/nss/lib/dbm/src/strerror.c rename : dbm/tests/dbmtest.pkg => security/nss/lib/dbm/tests/dbmtest.pkg rename : dbm/tests/lots.c => security/nss/lib/dbm/tests/lots.c extra : rebase_source : 119dad5f824e8e760182047fd32e2a0d0f944172 extra : amend_source : 98e24aa51f9044d9091a26f013b643925e8f9dcf
294 lines
7.5 KiB
C
294 lines
7.5 KiB
C
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
/*
|
|
* CMS message methods.
|
|
*
|
|
* $Id$
|
|
*/
|
|
|
|
#include "cmslocal.h"
|
|
|
|
#include "cert.h"
|
|
#include "secasn1.h"
|
|
#include "secitem.h"
|
|
#include "secoid.h"
|
|
#include "pk11func.h"
|
|
#include "secerr.h"
|
|
|
|
/*
|
|
* NSS_CMSMessage_Create - create a CMS message object
|
|
*
|
|
* "poolp" - arena to allocate memory from, or NULL if new arena should be created
|
|
*/
|
|
NSSCMSMessage *
|
|
NSS_CMSMessage_Create(PLArenaPool *poolp)
|
|
{
|
|
void *mark = NULL;
|
|
NSSCMSMessage *cmsg;
|
|
PRBool poolp_is_ours = PR_FALSE;
|
|
|
|
if (poolp == NULL) {
|
|
poolp = PORT_NewArena (1024); /* XXX what is right value? */
|
|
if (poolp == NULL)
|
|
return NULL;
|
|
poolp_is_ours = PR_TRUE;
|
|
}
|
|
|
|
if (!poolp_is_ours)
|
|
mark = PORT_ArenaMark(poolp);
|
|
|
|
cmsg = (NSSCMSMessage *)PORT_ArenaZAlloc (poolp, sizeof(NSSCMSMessage));
|
|
if (cmsg == NULL) {
|
|
if (!poolp_is_ours) {
|
|
if (mark) {
|
|
PORT_ArenaRelease(poolp, mark);
|
|
}
|
|
} else
|
|
PORT_FreeArena(poolp, PR_FALSE);
|
|
return NULL;
|
|
}
|
|
NSS_CMSContentInfo_Private_Init(&(cmsg->contentInfo));
|
|
|
|
cmsg->poolp = poolp;
|
|
cmsg->poolp_is_ours = poolp_is_ours;
|
|
cmsg->refCount = 1;
|
|
|
|
if (mark)
|
|
PORT_ArenaUnmark(poolp, mark);
|
|
|
|
return cmsg;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_SetEncodingParams - set up a CMS message object for encoding or decoding
|
|
*
|
|
* "cmsg" - message object
|
|
* "pwfn", pwfn_arg" - callback function for getting token password
|
|
* "decrypt_key_cb", "decrypt_key_cb_arg" - callback function for getting bulk key for encryptedData
|
|
* "detached_digestalgs", "detached_digests" - digests from detached content
|
|
*/
|
|
void
|
|
NSS_CMSMessage_SetEncodingParams(NSSCMSMessage *cmsg,
|
|
PK11PasswordFunc pwfn, void *pwfn_arg,
|
|
NSSCMSGetDecryptKeyCallback decrypt_key_cb, void *decrypt_key_cb_arg,
|
|
SECAlgorithmID **detached_digestalgs, SECItem **detached_digests)
|
|
{
|
|
if (pwfn)
|
|
PK11_SetPasswordFunc(pwfn);
|
|
cmsg->pwfn_arg = pwfn_arg;
|
|
cmsg->decrypt_key_cb = decrypt_key_cb;
|
|
cmsg->decrypt_key_cb_arg = decrypt_key_cb_arg;
|
|
cmsg->detached_digestalgs = detached_digestalgs;
|
|
cmsg->detached_digests = detached_digests;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_Destroy - destroy a CMS message and all of its sub-pieces.
|
|
*/
|
|
void
|
|
NSS_CMSMessage_Destroy(NSSCMSMessage *cmsg)
|
|
{
|
|
PORT_Assert (cmsg->refCount > 0);
|
|
if (cmsg->refCount <= 0) /* oops */
|
|
return;
|
|
|
|
cmsg->refCount--; /* thread safety? */
|
|
if (cmsg->refCount > 0)
|
|
return;
|
|
|
|
NSS_CMSContentInfo_Destroy(&(cmsg->contentInfo));
|
|
|
|
/* if poolp is not NULL, cmsg is the owner of its arena */
|
|
if (cmsg->poolp_is_ours)
|
|
PORT_FreeArena (cmsg->poolp, PR_FALSE); /* XXX clear it? */
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_Copy - return a copy of the given message.
|
|
*
|
|
* The copy may be virtual or may be real -- either way, the result needs
|
|
* to be passed to NSS_CMSMessage_Destroy later (as does the original).
|
|
*/
|
|
NSSCMSMessage *
|
|
NSS_CMSMessage_Copy(NSSCMSMessage *cmsg)
|
|
{
|
|
if (cmsg == NULL)
|
|
return NULL;
|
|
|
|
PORT_Assert (cmsg->refCount > 0);
|
|
|
|
cmsg->refCount++; /* XXX chrisk thread safety? */
|
|
return cmsg;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_GetArena - return a pointer to the message's arena pool
|
|
*/
|
|
PLArenaPool *
|
|
NSS_CMSMessage_GetArena(NSSCMSMessage *cmsg)
|
|
{
|
|
return cmsg->poolp;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_GetContentInfo - return a pointer to the top level contentInfo
|
|
*/
|
|
NSSCMSContentInfo *
|
|
NSS_CMSMessage_GetContentInfo(NSSCMSMessage *cmsg)
|
|
{
|
|
return &(cmsg->contentInfo);
|
|
}
|
|
|
|
/*
|
|
* Return a pointer to the actual content.
|
|
* In the case of those types which are encrypted, this returns the *plain* content.
|
|
* In case of nested contentInfos, this descends and retrieves the innermost content.
|
|
*/
|
|
SECItem *
|
|
NSS_CMSMessage_GetContent(NSSCMSMessage *cmsg)
|
|
{
|
|
/* this is a shortcut */
|
|
NSSCMSContentInfo * cinfo = NSS_CMSMessage_GetContentInfo(cmsg);
|
|
SECItem * pItem = NSS_CMSContentInfo_GetInnerContent(cinfo);
|
|
return pItem;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_ContentLevelCount - count number of levels of CMS content objects in this message
|
|
*
|
|
* CMS data content objects do not count.
|
|
*/
|
|
int
|
|
NSS_CMSMessage_ContentLevelCount(NSSCMSMessage *cmsg)
|
|
{
|
|
int count = 0;
|
|
NSSCMSContentInfo *cinfo;
|
|
|
|
/* walk down the chain of contentinfos */
|
|
for (cinfo = &(cmsg->contentInfo); cinfo != NULL; ) {
|
|
count++;
|
|
cinfo = NSS_CMSContentInfo_GetChildContentInfo(cinfo);
|
|
}
|
|
return count;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_ContentLevel - find content level #n
|
|
*
|
|
* CMS data content objects do not count.
|
|
*/
|
|
NSSCMSContentInfo *
|
|
NSS_CMSMessage_ContentLevel(NSSCMSMessage *cmsg, int n)
|
|
{
|
|
int count = 0;
|
|
NSSCMSContentInfo *cinfo;
|
|
|
|
/* walk down the chain of contentinfos */
|
|
for (cinfo = &(cmsg->contentInfo); cinfo != NULL && count < n; cinfo = NSS_CMSContentInfo_GetChildContentInfo(cinfo)) {
|
|
count++;
|
|
}
|
|
|
|
return cinfo;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_ContainsCertsOrCrls - see if message contains certs along the way
|
|
*/
|
|
PRBool
|
|
NSS_CMSMessage_ContainsCertsOrCrls(NSSCMSMessage *cmsg)
|
|
{
|
|
NSSCMSContentInfo *cinfo;
|
|
|
|
/* descend into CMS message */
|
|
for (cinfo = &(cmsg->contentInfo); cinfo != NULL; cinfo = NSS_CMSContentInfo_GetChildContentInfo(cinfo)) {
|
|
if (!NSS_CMSType_IsData(NSS_CMSContentInfo_GetContentTypeTag(cinfo)))
|
|
continue; /* next level */
|
|
|
|
if (NSS_CMSSignedData_ContainsCertsOrCrls(cinfo->content.signedData))
|
|
return PR_TRUE;
|
|
/* callback here for generic wrappers? */
|
|
}
|
|
return PR_FALSE;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_IsEncrypted - see if message contains a encrypted submessage
|
|
*/
|
|
PRBool
|
|
NSS_CMSMessage_IsEncrypted(NSSCMSMessage *cmsg)
|
|
{
|
|
NSSCMSContentInfo *cinfo;
|
|
|
|
/* walk down the chain of contentinfos */
|
|
for (cinfo = &(cmsg->contentInfo); cinfo != NULL; cinfo = NSS_CMSContentInfo_GetChildContentInfo(cinfo))
|
|
{
|
|
switch (NSS_CMSContentInfo_GetContentTypeTag(cinfo)) {
|
|
case SEC_OID_PKCS7_ENVELOPED_DATA:
|
|
case SEC_OID_PKCS7_ENCRYPTED_DATA:
|
|
return PR_TRUE;
|
|
default:
|
|
/* callback here for generic wrappers? */
|
|
break;
|
|
}
|
|
}
|
|
return PR_FALSE;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_IsSigned - see if message contains a signed submessage
|
|
*
|
|
* If the CMS message has a SignedData with a signature (not just a SignedData)
|
|
* return true; false otherwise. This can/should be called before calling
|
|
* VerifySignature, which will always indicate failure if no signature is
|
|
* present, but that does not mean there even was a signature!
|
|
* Note that the content itself can be empty (detached content was sent
|
|
* another way); it is the presence of the signature that matters.
|
|
*/
|
|
PRBool
|
|
NSS_CMSMessage_IsSigned(NSSCMSMessage *cmsg)
|
|
{
|
|
NSSCMSContentInfo *cinfo;
|
|
|
|
/* walk down the chain of contentinfos */
|
|
for (cinfo = &(cmsg->contentInfo); cinfo != NULL; cinfo = NSS_CMSContentInfo_GetChildContentInfo(cinfo))
|
|
{
|
|
switch (NSS_CMSContentInfo_GetContentTypeTag(cinfo)) {
|
|
case SEC_OID_PKCS7_SIGNED_DATA:
|
|
if (!NSS_CMSArray_IsEmpty((void **)cinfo->content.signedData->signerInfos))
|
|
return PR_TRUE;
|
|
break;
|
|
default:
|
|
/* callback here for generic wrappers? */
|
|
break;
|
|
}
|
|
}
|
|
return PR_FALSE;
|
|
}
|
|
|
|
/*
|
|
* NSS_CMSMessage_IsContentEmpty - see if content is empty
|
|
*
|
|
* returns PR_TRUE is innermost content length is < minLen
|
|
* XXX need the encrypted content length (why?)
|
|
*/
|
|
PRBool
|
|
NSS_CMSMessage_IsContentEmpty(NSSCMSMessage *cmsg, unsigned int minLen)
|
|
{
|
|
SECItem *item = NULL;
|
|
|
|
if (cmsg == NULL)
|
|
return PR_TRUE;
|
|
|
|
item = NSS_CMSContentInfo_GetContent(NSS_CMSMessage_GetContentInfo(cmsg));
|
|
|
|
if (!item) {
|
|
return PR_TRUE;
|
|
} else if(item->len <= minLen) {
|
|
return PR_TRUE;
|
|
}
|
|
|
|
return PR_FALSE;
|
|
}
|