blob: 7699b60d53eb8054216d0ce09a226cda3de6ee58 [file] [log] [blame]
Nayna Jainc9deb182020-11-16 19:03:12 +00001/**
2 * \file pkcs7.h
3 *
4 * \brief PKCS7 generic defines and structures
5 * https://tools.ietf.org/html/rfc2315
6 */
7/*
Nick Child5d881c32022-02-28 10:09:16 -06008 * Copyright The Mbed TLS Contributors
Nayna Jainc9deb182020-11-16 19:03:12 +00009 * SPDX-License-Identifier: Apache-2.0
10 *
11 * Licensed under the Apache License, Version 2.0 (the "License"); you may
12 * not use this file except in compliance with the License.
13 * You may obtain a copy of the License at
14 *
15 * http://www.apache.org/licenses/LICENSE-2.0
16 *
17 * Unless required by applicable law or agreed to in writing, software
18 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
19 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
20 * See the License for the specific language governing permissions and
21 * limitations under the License.
Nayna Jainc9deb182020-11-16 19:03:12 +000022 */
23
24/**
25 * Note: For the time being, this application of the PKCS7 cryptographic
26 * message syntax is a partial implementation of RFC 2315.
27 * Differences include:
28 * - The RFC specifies 6 different content types. The only type currently
29 * supported in MbedTLS is the signed data content type.
30 * - The only supported PKCS7 Signed Data syntax version is version 1
31 * - The RFC specifies support for BER. This application is limited to
32 * DER only.
33 * - The RFC specifies that multiple digest algorithms can be specified
34 * in the Signed Data type. Only one digest algorithm is supported in MbedTLS.
35 * - The RFC specifies the Signed Data certificate format can be
36 * X509 or PKCS6. The only type currently supported in MbedTLS is X509.
37 * - The RFC specifies the Signed Data type can contain
38 * certificate-revocation lists (crls). This application has no support
39 * for crls so it is assumed to be an empty list.
40 * - The RFC specifies support for multiple signers. This application only
41 * supports the Signed Data type with a single signer.
42 */
43
44#ifndef MBEDTLS_PKCS7_H
45#define MBEDTLS_PKCS7_H
46
Nick Child390e61a2021-08-09 13:33:14 -040047#include "mbedtls/private_access.h"
48
Nayna Jainc9deb182020-11-16 19:03:12 +000049#include "mbedtls/build_info.h"
50
51#include "asn1.h"
52#include "x509.h"
53#include "x509_crt.h"
54
55/**
56 * \name PKCS7 Module Error codes
57 * \{
58 */
59#define MBEDTLS_ERR_PKCS7_INVALID_FORMAT -0x5300 /**< The format is invalid, e.g. different type expected. */
60#define MBEDTLS_ERR_PKCS7_FEATURE_UNAVAILABLE -0x53F0 /**< Unavailable feature, e.g. anything other than signed data. */
61#define MBEDTLS_ERR_PKCS7_INVALID_VERSION -0x5400 /**< The PKCS7 version element is invalid or cannot be parsed. */
62#define MBEDTLS_ERR_PKCS7_INVALID_CONTENT_INFO -0x54F0 /**< The PKCS7 content info invalid or cannot be parsed. */
63#define MBEDTLS_ERR_PKCS7_INVALID_ALG -0x5500 /**< The algorithm tag or value is invalid or cannot be parsed. */
64#define MBEDTLS_ERR_PKCS7_INVALID_CERT -0x55F0 /**< The certificate tag or value is invalid or cannot be parsed. */
65#define MBEDTLS_ERR_PKCS7_INVALID_SIGNATURE -0x5600 /**< Error parsing the signature */
66#define MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO -0x56F0 /**< Error parsing the signer's info */
67#define MBEDTLS_ERR_PKCS7_BAD_INPUT_DATA -0x5700 /**< Input invalid. */
68#define MBEDTLS_ERR_PKCS7_ALLOC_FAILED -0x57F0 /**< Allocation of memory failed. */
69#define MBEDTLS_ERR_PKCS7_VERIFY_FAIL -0x5800 /**< Verification Failed */
70/* \} name */
71
72/**
73 * \name PKCS7 Supported Version
74 * \{
75 */
76#define MBEDTLS_PKCS7_SUPPORTED_VERSION 0x01
77/* \} name */
78
79#ifdef __cplusplus
80extern "C" {
81#endif
82
83/**
84 * Type-length-value structure that allows for ASN1 using DER.
85 */
86typedef mbedtls_asn1_buf mbedtls_pkcs7_buf;
87
88/**
89 * Container for ASN1 named information objects.
90 * It allows for Relative Distinguished Names (e.g. cn=localhost,ou=code,etc.).
91 */
92typedef mbedtls_asn1_named_data mbedtls_pkcs7_name;
93
94/**
95 * Container for a sequence of ASN.1 items
96 */
97typedef mbedtls_asn1_sequence mbedtls_pkcs7_sequence;
98
99/**
Nayna Jain673a2262020-12-14 22:44:49 +0000100 * PKCS7 types
101 */
102typedef enum {
103 MBEDTLS_PKCS7_NONE=0,
104 MBEDTLS_PKCS7_DATA,
105 MBEDTLS_PKCS7_SIGNED_DATA,
106 MBEDTLS_PKCS7_ENVELOPED_DATA,
107 MBEDTLS_PKCS7_SIGNED_AND_ENVELOPED_DATA,
108 MBEDTLS_PKCS7_DIGESTED_DATA,
109 MBEDTLS_PKCS7_ENCRYPTED_DATA,
110}
111mbedtls_pkcs7_type;
112
113/**
Nayna Jainc9deb182020-11-16 19:03:12 +0000114 * Structure holding PKCS7 signer info
115 */
116typedef struct mbedtls_pkcs7_signer_info
117{
Nick Child390e61a2021-08-09 13:33:14 -0400118 int MBEDTLS_PRIVATE(version);
119 mbedtls_x509_buf MBEDTLS_PRIVATE(serial);
120 mbedtls_x509_name MBEDTLS_PRIVATE(issuer);
121 mbedtls_x509_buf MBEDTLS_PRIVATE(issuer_raw);
122 mbedtls_x509_buf MBEDTLS_PRIVATE(alg_identifier);
123 mbedtls_x509_buf MBEDTLS_PRIVATE(sig_alg_identifier);
124 mbedtls_x509_buf MBEDTLS_PRIVATE(sig);
125 struct mbedtls_pkcs7_signer_info *MBEDTLS_PRIVATE(next);
Nayna Jainc9deb182020-11-16 19:03:12 +0000126}
127mbedtls_pkcs7_signer_info;
128
129/**
130 * Structure holding attached data as part of PKCS7 signed data format
131 */
132typedef struct mbedtls_pkcs7_data
133{
Nick Child390e61a2021-08-09 13:33:14 -0400134 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(oid);
135 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(data);
Nayna Jainc9deb182020-11-16 19:03:12 +0000136}
137mbedtls_pkcs7_data;
138
139/**
140 * Structure holding the signed data section
141 */
142typedef struct mbedtls_pkcs7_signed_data
143{
Nick Child390e61a2021-08-09 13:33:14 -0400144 int MBEDTLS_PRIVATE(version);
145 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(digest_alg_identifiers);
146 struct mbedtls_pkcs7_data MBEDTLS_PRIVATE(content);
147 int MBEDTLS_PRIVATE(no_of_certs);
148 mbedtls_x509_crt MBEDTLS_PRIVATE(certs);
149 int MBEDTLS_PRIVATE(no_of_crls);
150 mbedtls_x509_crl MBEDTLS_PRIVATE(crl);
151 int MBEDTLS_PRIVATE(no_of_signers);
152 mbedtls_pkcs7_signer_info MBEDTLS_PRIVATE(signers);
Nayna Jainc9deb182020-11-16 19:03:12 +0000153}
154mbedtls_pkcs7_signed_data;
155
156/**
157 * Structure holding PKCS7 structure, only signed data for now
158 */
159typedef struct mbedtls_pkcs7
160{
Nick Child390e61a2021-08-09 13:33:14 -0400161 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
162 mbedtls_pkcs7_buf MBEDTLS_PRIVATE(content_type_oid);
163 mbedtls_pkcs7_signed_data MBEDTLS_PRIVATE(signed_data);
Nayna Jainc9deb182020-11-16 19:03:12 +0000164}
165mbedtls_pkcs7;
166
167/**
168 * \brief Initialize pkcs7 structure.
169 *
170 * \param pkcs7 pkcs7 structure.
171 */
172void mbedtls_pkcs7_init( mbedtls_pkcs7 *pkcs7 );
173
174/**
175 * \brief Parse a single DER formatted pkcs7 content.
176 *
177 * \param pkcs7 The pkcs7 structure to be filled by parser for the output.
178 * \param buf The buffer holding the DER encoded pkcs7.
179 * \param buflen The size in Bytes of \p buf.
180 *
181 * \note This function makes an internal copy of the PKCS7 buffer
182 * \p buf. In particular, \p buf may be destroyed or reused
183 * after this call returns.
184 *
Nayna Jain673a2262020-12-14 22:44:49 +0000185 * \return The \c mbedtls_pkcs7_type of \p buf, if successful.
Nayna Jainc9deb182020-11-16 19:03:12 +0000186 * \return A negative error code on failure.
187 */
188int mbedtls_pkcs7_parse_der( mbedtls_pkcs7 *pkcs7, const unsigned char *buf,
189 const size_t buflen );
190
191/**
192 * \brief Verification of PKCS7 signature.
193 *
194 * \param pkcs7 PKCS7 structure containing signature.
195 * \param cert Certificate containing key to verify signature.
196 * \param data Plain data on which signature has to be verified.
197 * \param datalen Length of the data.
198 *
199 * \note This function internally calculates the hash on the supplied
200 * plain data for signature verification.
201 *
202 * \return A negative error code on failure.
203 */
204int mbedtls_pkcs7_signed_data_verify( mbedtls_pkcs7 *pkcs7,
205 const mbedtls_x509_crt *cert,
206 const unsigned char *data,
207 size_t datalen );
208
209/**
210 * \brief Verification of PKCS7 signature.
211 *
212 * \param pkcs7 PKCS7 structure containing signature.
213 * \param cert Certificate containing key to verify signature.
214 * \param hash Hash of the plain data on which signature has to be verified.
215 * \param hashlen Length of the hash.
216 *
217 * \note This function is different from mbedtls_pkcs7_signed_data_verify()
218 * in a way that it directly recieves the hash of the data.
219 *
220 * \return A negative error code on failure.
221 */
222int mbedtls_pkcs7_signed_hash_verify( mbedtls_pkcs7 *pkcs7,
223 const mbedtls_x509_crt *cert,
224 const unsigned char *hash, size_t hashlen);
225
226/**
227 * \brief Unallocate all PKCS7 data and zeroize the memory.
228 * It doesn't free pkcs7 itself. It should be done by the caller.
229 *
230 * \param pkcs7 PKCS7 structure to free.
231 */
232void mbedtls_pkcs7_free( mbedtls_pkcs7 *pkcs7 );
233
234#ifdef __cplusplus
235}
236#endif
237
238#endif /* pkcs7.h */