VirtualBox

source: vbox/trunk/src/VBox/Runtime/common/crypto/pkcs7-sign.cpp@ 93115

Last change on this file since 93115 was 93115, checked in by vboxsync, 3 years ago

scm --update-copyright-year

  • Property svn:eol-style set to native
  • Property svn:keywords set to Author Date Id Revision
File size: 8.9 KB
Line 
1/* $Id: pkcs7-sign.cpp 93115 2022-01-01 11:31:46Z vboxsync $ */
2/** @file
3 * IPRT - Crypto - PKCS \#7, Signing
4 */
5
6/*
7 * Copyright (C) 2006-2022 Oracle Corporation
8 *
9 * This file is part of VirtualBox Open Source Edition (OSE), as
10 * available from http://www.virtualbox.org. This file is free software;
11 * you can redistribute it and/or modify it under the terms of the GNU
12 * General Public License (GPL) as published by the Free Software
13 * Foundation, in version 2 as it comes in the "COPYING" file of the
14 * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
15 * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
16 *
17 * The contents of this file may alternatively be used under the terms
18 * of the Common Development and Distribution License Version 1.0
19 * (CDDL) only, as it comes in the "COPYING.CDDL" file of the
20 * VirtualBox OSE distribution, in which case the provisions of the
21 * CDDL are applicable instead of those of the GPL.
22 *
23 * You may elect to license modified versions of this file under the
24 * terms and conditions of either the GPL or the CDDL or both.
25 */
26
27
28/*********************************************************************************************************************************
29* Header Files *
30*********************************************************************************************************************************/
31#include "internal/iprt.h"
32#include <iprt/crypto/pkcs7.h>
33
34#include <iprt/errcore.h>
35#include <iprt/string.h>
36#include <iprt/crypto/digest.h>
37#include <iprt/crypto/key.h>
38#include <iprt/crypto/pkix.h>
39#include <iprt/crypto/store.h>
40#include <iprt/crypto/x509.h>
41
42#ifdef IPRT_WITH_OPENSSL
43# include "internal/iprt-openssl.h"
44# include "internal/openssl-pre.h"
45# include <openssl/pkcs7.h>
46# include <openssl/cms.h>
47# include <openssl/x509.h>
48# include <openssl/err.h>
49# include "internal/openssl-post.h"
50#endif
51
52
53/*********************************************************************************************************************************
54* Structures and Typedefs *
55*********************************************************************************************************************************/
56/**
57 * PKCS\#7 / CMS signing operation instance.
58 */
59typedef struct RTCRPKCS7SIGNINGJOBINT
60{
61 /** Magic value (RTCRPKCS7SIGNINGJOBINT). */
62 uint32_t u32Magic;
63 /** Reference counter. */
64 uint32_t volatile cRefs;
65 /** RTCRPKCS7SIGN_F_XXX. */
66 uint64_t fFlags;
67 /** Set if finalized. */
68 bool fFinallized;
69
70 //....
71} RTCRPKCS7SIGNINGJOBINT;
72
73/** Magic value for RTCRPKCS7SIGNINGJOBINT (Jonathan Lethem). */
74#define RTCRPKCS7SIGNINGJOBINT_MAGIC UINT32_C(0x19640219)
75
76/** Handle to PKCS\#7/CMS signing operation. */
77typedef struct RTCRPKCS7SIGNINGJOBINT *RTCRPKCS7SIGNINGJOB;
78/** Pointer to a PKCS\#7/CMS signing operation handle. */
79typedef RTCRPKCS7SIGNINGJOB *PRTCRPKCS7SIGNINGJOB;
80
81//// CMS_sign
82//RTDECL(int) RTCrPkcs7Sign(PRTCRPKCS7SIGNINGJOB *phJob, uint64_t fFlags, PCRTCRX509CERTIFICATE pSigner, RTCRKEY hPrivateKey,
83// RTCRSTORE hAdditionalCerts,
84//
85
86
87
88RTDECL(int) RTCrPkcs7SimpleSignSignedData(uint32_t fFlags, PCRTCRX509CERTIFICATE pSigner, RTCRKEY hPrivateKey,
89 void const *pvData, size_t cbData, RTDIGESTTYPE enmDigestType,
90 RTCRSTORE hAdditionalCerts, void *pvResult, size_t *pcbResult, PRTERRINFO pErrInfo)
91{
92 size_t const cbResultBuf = *pcbResult;
93 *pcbResult = 0;
94 AssertReturn(!(fFlags & ~RTCRPKCS7SIGN_SD_F_VALID_MASK), VERR_INVALID_FLAGS);
95#ifdef IPRT_WITH_OPENSSL
96 AssertReturn((int)cbData >= 0 && (unsigned)cbData == cbData, VERR_TOO_MUCH_DATA);
97
98 /*
99 * Resolve the digest type.
100 */
101 const EVP_MD *pEvpMd = NULL;
102 if (enmDigestType != RTDIGESTTYPE_UNKNOWN)
103 {
104 pEvpMd = (const EVP_MD *)rtCrOpenSslConvertDigestType(enmDigestType, pErrInfo);
105 AssertReturn(pEvpMd, pErrInfo ? pErrInfo->rc : VERR_INVALID_PARAMETER);
106 }
107
108 /*
109 * Convert the private key.
110 */
111 EVP_PKEY *pEvpPrivateKey = NULL;
112 int rc = rtCrKeyToOpenSslKey(hPrivateKey, false /*fNeedPublic*/, (void **)&pEvpPrivateKey, pErrInfo);
113 if (RT_SUCCESS(rc))
114 {
115 /*
116 * Convert the signing certificate.
117 */
118 X509 *pOsslSigner = NULL;
119 rc = rtCrOpenSslConvertX509Cert((void **)&pOsslSigner, pSigner, pErrInfo);
120 if (RT_SUCCESS(rc))
121 {
122 /*
123 * Convert any additional certificates.
124 */
125 STACK_OF(X509) *pOsslAdditionalCerts = NULL;
126 if (hAdditionalCerts != NIL_RTCRSTORE)
127 rc = RTCrStoreConvertToOpenSslCertStack(hAdditionalCerts, 0 /*fFlags*/, (void **)&pOsslAdditionalCerts, pErrInfo);
128 if (RT_SUCCESS(rc))
129 {
130 /*
131 * Create a BIO for the data buffer.
132 */
133 BIO *pOsslData = BIO_new_mem_buf((void *)pvData, (int)cbData);
134 if (pOsslData)
135 {
136 /*
137 * Do the signing.
138 */
139 unsigned int fOsslSign = CMS_BINARY | CMS_PARTIAL;
140 if (fFlags & RTCRPKCS7SIGN_SD_F_DEATCHED)
141 fOsslSign |= CMS_DETACHED;
142 if (fFlags & RTCRPKCS7SIGN_SD_F_NO_SMIME_CAP)
143 fOsslSign |= CMS_NOSMIMECAP;
144 CMS_ContentInfo *pCms = CMS_sign(NULL, NULL, pOsslAdditionalCerts, NULL, fOsslSign);
145 if (pCms != NULL)
146 {
147 if (CMS_add1_signer(pCms, pOsslSigner, pEvpPrivateKey, pEvpMd, fOsslSign) != NULL)
148 {
149 rc = CMS_final(pCms, pOsslData, NULL /*dcont*/, fOsslSign);
150 if (rc > 0)
151 {
152 /*
153 * Get the output and copy it into the result buffer.
154 */
155 BIO *pOsslResult = BIO_new(BIO_s_mem());
156 if (pOsslResult)
157 {
158 rc = i2d_CMS_bio(pOsslResult, pCms);
159 if (rc > 0)
160 {
161 BUF_MEM *pBuf = NULL;
162 rc = (int)BIO_get_mem_ptr(pOsslResult, &pBuf);
163 if (rc > 0)
164 {
165 AssertPtr(pBuf);
166 size_t const cbResult = pBuf->length;
167 if ( cbResultBuf >= cbResult
168 && pvResult != NULL)
169 {
170 memcpy(pvResult, pBuf->data, cbResult);
171 rc = VINF_SUCCESS;
172 }
173 else
174 rc = VERR_BUFFER_OVERFLOW;
175 *pcbResult = cbResult;
176 }
177 else
178 rc = RTErrInfoSet(pErrInfo, VERR_GENERAL_FAILURE, "BIO_get_mem_ptr");
179 }
180 else
181 rc = RTErrInfoSet(pErrInfo, VERR_GENERAL_FAILURE, "i2d_CMS_bio");
182 BIO_free(pOsslResult);
183 }
184 else
185 rc = RTErrInfoSet(pErrInfo, VERR_NO_MEMORY, "BIO_new/BIO_s_mem");
186 }
187 else
188 rc = RTErrInfoSet(pErrInfo, VERR_GENERAL_FAILURE, "CMS_final");
189 }
190 else
191 rc = RTErrInfoSet(pErrInfo, VERR_GENERAL_FAILURE, "CMS_add1_signer");
192 CMS_ContentInfo_free(pCms);
193 }
194 else
195 rc = RTErrInfoSet(pErrInfo, VERR_GENERAL_FAILURE, "CMS_sign");
196 BIO_free(pOsslData);
197 }
198 }
199 rtCrOpenSslFreeConvertedX509Cert(pOsslSigner);
200 }
201 EVP_PKEY_free(pEvpPrivateKey);
202 }
203 return rc;
204#else
205 RT_NOREF(fFlags, pSigner, hPrivateKey, pvData, cbData, enmDigestType, hAdditionalCerts, pvResult, pErrInfo, cbResultBuf);
206 *pcbResult = 0;
207 return VERR_NOT_IMPLEMENTED;
208#endif
209}
210
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette