blob: 29bb503a742e1f0906340c83498d577ae509c09e [file] [log] [blame]
Nayna Jainc9deb182020-11-16 19:03:12 +00001/**
2 * \file pkcs7.h
3 *
4 * \brief PKCS7 generic defines and structures
5 * https://tools.ietf.org/html/rfc2315
6 */
7/*
8 * Copyright (C) 2019, IBM Corp, All Rights Reserved
9 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
22 *
23 * This file is part of mbed TLS (https://tls.mbed.org)
24 */
25
26/**
27 * Note: For the time being, this application of the PKCS7 cryptographic
28 * message syntax is a partial implementation of RFC 2315.
29 * Differences include:
30 * - The RFC specifies 6 different content types. The only type currently
31 * supported in MbedTLS is the signed data content type.
32 * - The only supported PKCS7 Signed Data syntax version is version 1
33 * - The RFC specifies support for BER. This application is limited to
34 * DER only.
35 * - The RFC specifies that multiple digest algorithms can be specified
36 * in the Signed Data type. Only one digest algorithm is supported in MbedTLS.
37 * - The RFC specifies the Signed Data certificate format can be
38 * X509 or PKCS6. The only type currently supported in MbedTLS is X509.
39 * - The RFC specifies the Signed Data type can contain
40 * certificate-revocation lists (crls). This application has no support
41 * for crls so it is assumed to be an empty list.
42 * - The RFC specifies support for multiple signers. This application only
43 * supports the Signed Data type with a single signer.
44 */
45
46#ifndef MBEDTLS_PKCS7_H
47#define MBEDTLS_PKCS7_H
48
Nick Child390e61a2021-08-09 13:33:14 -040049#include "mbedtls/private_access.h"
50
Nayna Jainc9deb182020-11-16 19:03:12 +000051#include "mbedtls/build_info.h"
52
53#include "asn1.h"
54#include "x509.h"
55#include "x509_crt.h"
56
57/**
58 * \name PKCS7 Module Error codes
59 * \{
60 */
61#define MBEDTLS_ERR_PKCS7_INVALID_FORMAT -0x5300 /**< The format is invalid, e.g. different type expected. */
62#define MBEDTLS_ERR_PKCS7_FEATURE_UNAVAILABLE -0x53F0 /**< Unavailable feature, e.g. anything other than signed data. */
63#define MBEDTLS_ERR_PKCS7_INVALID_VERSION -0x5400 /**< The PKCS7 version element is invalid or cannot be parsed. */
64#define MBEDTLS_ERR_PKCS7_INVALID_CONTENT_INFO -0x54F0 /**< The PKCS7 content info invalid or cannot be parsed. */
65#define MBEDTLS_ERR_PKCS7_INVALID_ALG -0x5500 /**< The algorithm tag or value is invalid or cannot be parsed. */
66#define MBEDTLS_ERR_PKCS7_INVALID_CERT -0x55F0 /**< The certificate tag or value is invalid or cannot be parsed. */
67#define MBEDTLS_ERR_PKCS7_INVALID_SIGNATURE -0x5600 /**< Error parsing the signature */
68#define MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO -0x56F0 /**< Error parsing the signer's info */
69#define MBEDTLS_ERR_PKCS7_BAD_INPUT_DATA -0x5700 /**< Input invalid. */
70#define MBEDTLS_ERR_PKCS7_ALLOC_FAILED -0x57F0 /**< Allocation of memory failed. */
71#define MBEDTLS_ERR_PKCS7_VERIFY_FAIL -0x5800 /**< Verification Failed */
72/* \} name */
73
74/**
75 * \name PKCS7 Supported Version
76 * \{
77 */
78#define MBEDTLS_PKCS7_SUPPORTED_VERSION 0x01
79/* \} name */
80
81#ifdef __cplusplus
82extern "C" {
83#endif
84
85/**
86 * Type-length-value structure that allows for ASN1 using DER.
87 */
88typedef mbedtls_asn1_buf mbedtls_pkcs7_buf;
89
90/**
91 * Container for ASN1 named information objects.
92 * It allows for Relative Distinguished Names (e.g. cn=localhost,ou=code,etc.).
93 */
94typedef mbedtls_asn1_named_data mbedtls_pkcs7_name;
95
96/**
97 * Container for a sequence of ASN.1 items
98 */
99typedef mbedtls_asn1_sequence mbedtls_pkcs7_sequence;
100
101/**
Nayna Jain673a2262020-12-14 22:44:49 +0000102 * PKCS7 types
103 */
104typedef enum {
105 MBEDTLS_PKCS7_NONE=0,
106 MBEDTLS_PKCS7_DATA,
107 MBEDTLS_PKCS7_SIGNED_DATA,
108 MBEDTLS_PKCS7_ENVELOPED_DATA,
109 MBEDTLS_PKCS7_SIGNED_AND_ENVELOPED_DATA,
110 MBEDTLS_PKCS7_DIGESTED_DATA,
111 MBEDTLS_PKCS7_ENCRYPTED_DATA,
112}
113mbedtls_pkcs7_type;
114
115/**
Nayna Jainc9deb182020-11-16 19:03:12 +0000116 * Structure holding PKCS7 signer info
117 */
118typedef struct mbedtls_pkcs7_signer_info
119{
Nick Child390e61a2021-08-09 13:33:14 -0400120 int MBEDTLS_PRIVATE(version);
121 mbedtls_x509_buf MBEDTLS_PRIVATE(serial);
122 mbedtls_x509_name MBEDTLS_PRIVATE(issuer);
123 mbedtls_x509_buf MBEDTLS_PRIVATE(issuer_raw);
124 mbedtls_x509_buf MBEDTLS_PRIVATE(alg_identifier);
125 mbedtls_x509_buf MBEDTLS_PRIVATE(sig_alg_identifier);
126 mbedtls_x509_buf MBEDTLS_PRIVATE(sig);
127 struct mbedtls_pkcs7_signer_info *MBEDTLS_PRIVATE(next);
Nayna Jainc9deb182020-11-16 19:03:12 +0000128}
129mbedtls_pkcs7_signer_info;
130
131/**
132 * Structure holding attached data as part of PKCS7 signed data format
133 */
134typedef struct mbedtls_pkcs7_data
135{
Nick Child390e61a2021-08-09 13:33:14 -0400136 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(oid);
137 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(data);
Nayna Jainc9deb182020-11-16 19:03:12 +0000138}
139mbedtls_pkcs7_data;
140
141/**
142 * Structure holding the signed data section
143 */
144typedef struct mbedtls_pkcs7_signed_data
145{
Nick Child390e61a2021-08-09 13:33:14 -0400146 int MBEDTLS_PRIVATE(version);
147 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(digest_alg_identifiers);
148 struct mbedtls_pkcs7_data MBEDTLS_PRIVATE(content);
149 int MBEDTLS_PRIVATE(no_of_certs);
150 mbedtls_x509_crt MBEDTLS_PRIVATE(certs);
151 int MBEDTLS_PRIVATE(no_of_crls);
152 mbedtls_x509_crl MBEDTLS_PRIVATE(crl);
153 int MBEDTLS_PRIVATE(no_of_signers);
154 mbedtls_pkcs7_signer_info MBEDTLS_PRIVATE(signers);
Nayna Jainc9deb182020-11-16 19:03:12 +0000155}
156mbedtls_pkcs7_signed_data;
157
158/**
159 * Structure holding PKCS7 structure, only signed data for now
160 */
161typedef struct mbedtls_pkcs7
162{
Nick Child390e61a2021-08-09 13:33:14 -0400163 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
164 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(content_type_oid);
165 mbedtls_pkcs7_signed_data MBEDTLS_PRIVATE(signed_data);
Nayna Jainc9deb182020-11-16 19:03:12 +0000166}
167mbedtls_pkcs7;
168
169/**
170 * \brief Initialize pkcs7 structure.
171 *
172 * \param pkcs7 pkcs7 structure.
173 */
174void mbedtls_pkcs7_init( mbedtls_pkcs7 *pkcs7 );
175
176/**
177 * \brief Parse a single DER formatted pkcs7 content.
178 *
179 * \param pkcs7 The pkcs7 structure to be filled by parser for the output.
180 * \param buf The buffer holding the DER encoded pkcs7.
181 * \param buflen The size in Bytes of \p buf.
182 *
183 * \note This function makes an internal copy of the PKCS7 buffer
184 * \p buf. In particular, \p buf may be destroyed or reused
185 * after this call returns.
186 *
Nayna Jain673a2262020-12-14 22:44:49 +0000187 * \return The \c mbedtls_pkcs7_type of \p buf, if successful.
Nayna Jainc9deb182020-11-16 19:03:12 +0000188 * \return A negative error code on failure.
189 */
190int mbedtls_pkcs7_parse_der( mbedtls_pkcs7 *pkcs7, const unsigned char *buf,
191 const size_t buflen );
192
193/**
194 * \brief Verification of PKCS7 signature.
195 *
196 * \param pkcs7 PKCS7 structure containing signature.
197 * \param cert Certificate containing key to verify signature.
198 * \param data Plain data on which signature has to be verified.
199 * \param datalen Length of the data.
200 *
201 * \note This function internally calculates the hash on the supplied
202 * plain data for signature verification.
203 *
204 * \return A negative error code on failure.
205 */
206int mbedtls_pkcs7_signed_data_verify( mbedtls_pkcs7 *pkcs7,
207 const mbedtls_x509_crt *cert,
208 const unsigned char *data,
209 size_t datalen );
210
211/**
212 * \brief Verification of PKCS7 signature.
213 *
214 * \param pkcs7 PKCS7 structure containing signature.
215 * \param cert Certificate containing key to verify signature.
216 * \param hash Hash of the plain data on which signature has to be verified.
217 * \param hashlen Length of the hash.
218 *
219 * \note This function is different from mbedtls_pkcs7_signed_data_verify()
220 * in a way that it directly recieves the hash of the data.
221 *
222 * \return A negative error code on failure.
223 */
224int mbedtls_pkcs7_signed_hash_verify( mbedtls_pkcs7 *pkcs7,
225 const mbedtls_x509_crt *cert,
226 const unsigned char *hash, size_t hashlen);
227
228/**
229 * \brief Unallocate all PKCS7 data and zeroize the memory.
230 * It doesn't free pkcs7 itself. It should be done by the caller.
231 *
232 * \param pkcs7 PKCS7 structure to free.
233 */
234void mbedtls_pkcs7_free( mbedtls_pkcs7 *pkcs7 );
235
236#ifdef __cplusplus
237}
238#endif
239
240#endif /* pkcs7.h */