Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 1 | /** |
| 2 | * \file pkcs7.h |
| 3 | * |
| 4 | * \brief PKCS7 generic defines and structures |
| 5 | * https://tools.ietf.org/html/rfc2315 |
| 6 | */ |
| 7 | /* |
Nick Child | 5d881c3 | 2022-02-28 10:09:16 -0600 | [diff] [blame] | 8 | * Copyright The Mbed TLS Contributors |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 9 | * SPDX-License-Identifier: Apache-2.0 |
| 10 | * |
| 11 | * Licensed under the Apache License, Version 2.0 (the "License"); you may |
| 12 | * not use this file except in compliance with the License. |
| 13 | * You may obtain a copy of the License at |
| 14 | * |
| 15 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 16 | * |
| 17 | * Unless required by applicable law or agreed to in writing, software |
| 18 | * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 19 | * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 20 | * See the License for the specific language governing permissions and |
| 21 | * limitations under the License. |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 22 | */ |
| 23 | |
| 24 | /** |
Nick Child | 8ce1b1a | 2022-09-14 14:51:23 -0500 | [diff] [blame^] | 25 | * Note: For the time being, this implementation of the PKCS7 cryptographic |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 26 | * message syntax is a partial implementation of RFC 2315. |
| 27 | * Differences include: |
| 28 | * - The RFC specifies 6 different content types. The only type currently |
Nick Child | 8ce1b1a | 2022-09-14 14:51:23 -0500 | [diff] [blame^] | 29 | * supported in Mbed TLS is the signed data content type. |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 30 | * - The only supported PKCS7 Signed Data syntax version is version 1 |
Nick Child | 8ce1b1a | 2022-09-14 14:51:23 -0500 | [diff] [blame^] | 31 | * - The RFC specifies support for BER. This implementation is limited to |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 32 | * DER only. |
| 33 | * - The RFC specifies that multiple digest algorithms can be specified |
Nick Child | 8ce1b1a | 2022-09-14 14:51:23 -0500 | [diff] [blame^] | 34 | * in the Signed Data type. Only one digest algorithm is supported in Mbed TLS. |
| 35 | * - The RFC specifies the Signed Data type can contain multiple X509 or PKCS6 |
| 36 | * certificates. In Mbed TLS, this list can only contain 0 or 1 certificates |
| 37 | * and they must be in X509 format. |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 38 | * - The RFC specifies the Signed Data type can contain |
Nick Child | 8ce1b1a | 2022-09-14 14:51:23 -0500 | [diff] [blame^] | 39 | * certificate-revocation lists (crls). This implementation has no support |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 40 | * for crls so it is assumed to be an empty list. |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 41 | */ |
| 42 | |
| 43 | #ifndef MBEDTLS_PKCS7_H |
| 44 | #define MBEDTLS_PKCS7_H |
| 45 | |
Nick Child | 390e61a | 2021-08-09 13:33:14 -0400 | [diff] [blame] | 46 | #include "mbedtls/private_access.h" |
| 47 | |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 48 | #include "mbedtls/build_info.h" |
| 49 | |
| 50 | #include "asn1.h" |
| 51 | #include "x509.h" |
| 52 | #include "x509_crt.h" |
| 53 | |
| 54 | /** |
| 55 | * \name PKCS7 Module Error codes |
| 56 | * \{ |
| 57 | */ |
| 58 | #define MBEDTLS_ERR_PKCS7_INVALID_FORMAT -0x5300 /**< The format is invalid, e.g. different type expected. */ |
| 59 | #define MBEDTLS_ERR_PKCS7_FEATURE_UNAVAILABLE -0x53F0 /**< Unavailable feature, e.g. anything other than signed data. */ |
| 60 | #define MBEDTLS_ERR_PKCS7_INVALID_VERSION -0x5400 /**< The PKCS7 version element is invalid or cannot be parsed. */ |
| 61 | #define MBEDTLS_ERR_PKCS7_INVALID_CONTENT_INFO -0x54F0 /**< The PKCS7 content info invalid or cannot be parsed. */ |
| 62 | #define MBEDTLS_ERR_PKCS7_INVALID_ALG -0x5500 /**< The algorithm tag or value is invalid or cannot be parsed. */ |
| 63 | #define MBEDTLS_ERR_PKCS7_INVALID_CERT -0x55F0 /**< The certificate tag or value is invalid or cannot be parsed. */ |
| 64 | #define MBEDTLS_ERR_PKCS7_INVALID_SIGNATURE -0x5600 /**< Error parsing the signature */ |
| 65 | #define MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO -0x56F0 /**< Error parsing the signer's info */ |
| 66 | #define MBEDTLS_ERR_PKCS7_BAD_INPUT_DATA -0x5700 /**< Input invalid. */ |
| 67 | #define MBEDTLS_ERR_PKCS7_ALLOC_FAILED -0x57F0 /**< Allocation of memory failed. */ |
| 68 | #define MBEDTLS_ERR_PKCS7_VERIFY_FAIL -0x5800 /**< Verification Failed */ |
| 69 | /* \} name */ |
| 70 | |
| 71 | /** |
| 72 | * \name PKCS7 Supported Version |
| 73 | * \{ |
| 74 | */ |
| 75 | #define MBEDTLS_PKCS7_SUPPORTED_VERSION 0x01 |
| 76 | /* \} name */ |
| 77 | |
| 78 | #ifdef __cplusplus |
| 79 | extern "C" { |
| 80 | #endif |
| 81 | |
| 82 | /** |
| 83 | * Type-length-value structure that allows for ASN1 using DER. |
| 84 | */ |
| 85 | typedef mbedtls_asn1_buf mbedtls_pkcs7_buf; |
| 86 | |
| 87 | /** |
| 88 | * Container for ASN1 named information objects. |
| 89 | * It allows for Relative Distinguished Names (e.g. cn=localhost,ou=code,etc.). |
| 90 | */ |
| 91 | typedef mbedtls_asn1_named_data mbedtls_pkcs7_name; |
| 92 | |
| 93 | /** |
| 94 | * Container for a sequence of ASN.1 items |
| 95 | */ |
| 96 | typedef mbedtls_asn1_sequence mbedtls_pkcs7_sequence; |
| 97 | |
| 98 | /** |
Nayna Jain | 673a226 | 2020-12-14 22:44:49 +0000 | [diff] [blame] | 99 | * PKCS7 types |
| 100 | */ |
| 101 | typedef enum { |
| 102 | MBEDTLS_PKCS7_NONE=0, |
| 103 | MBEDTLS_PKCS7_DATA, |
| 104 | MBEDTLS_PKCS7_SIGNED_DATA, |
| 105 | MBEDTLS_PKCS7_ENVELOPED_DATA, |
| 106 | MBEDTLS_PKCS7_SIGNED_AND_ENVELOPED_DATA, |
| 107 | MBEDTLS_PKCS7_DIGESTED_DATA, |
| 108 | MBEDTLS_PKCS7_ENCRYPTED_DATA, |
| 109 | } |
| 110 | mbedtls_pkcs7_type; |
| 111 | |
| 112 | /** |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 113 | * Structure holding PKCS7 signer info |
| 114 | */ |
| 115 | typedef struct mbedtls_pkcs7_signer_info |
| 116 | { |
Nick Child | 390e61a | 2021-08-09 13:33:14 -0400 | [diff] [blame] | 117 | int MBEDTLS_PRIVATE(version); |
| 118 | mbedtls_x509_buf MBEDTLS_PRIVATE(serial); |
| 119 | mbedtls_x509_name MBEDTLS_PRIVATE(issuer); |
| 120 | mbedtls_x509_buf MBEDTLS_PRIVATE(issuer_raw); |
| 121 | mbedtls_x509_buf MBEDTLS_PRIVATE(alg_identifier); |
| 122 | mbedtls_x509_buf MBEDTLS_PRIVATE(sig_alg_identifier); |
| 123 | mbedtls_x509_buf MBEDTLS_PRIVATE(sig); |
| 124 | struct mbedtls_pkcs7_signer_info *MBEDTLS_PRIVATE(next); |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 125 | } |
| 126 | mbedtls_pkcs7_signer_info; |
| 127 | |
| 128 | /** |
| 129 | * Structure holding attached data as part of PKCS7 signed data format |
| 130 | */ |
| 131 | typedef struct mbedtls_pkcs7_data |
| 132 | { |
Nick Child | 390e61a | 2021-08-09 13:33:14 -0400 | [diff] [blame] | 133 | mbedtls_pkcs7_buf MBEDTLS_PRIVATE(oid); |
| 134 | mbedtls_pkcs7_buf MBEDTLS_PRIVATE(data); |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 135 | } |
| 136 | mbedtls_pkcs7_data; |
| 137 | |
| 138 | /** |
| 139 | * Structure holding the signed data section |
| 140 | */ |
| 141 | typedef struct mbedtls_pkcs7_signed_data |
| 142 | { |
Nick Child | 390e61a | 2021-08-09 13:33:14 -0400 | [diff] [blame] | 143 | int MBEDTLS_PRIVATE(version); |
| 144 | mbedtls_pkcs7_buf MBEDTLS_PRIVATE(digest_alg_identifiers); |
| 145 | struct mbedtls_pkcs7_data MBEDTLS_PRIVATE(content); |
| 146 | int MBEDTLS_PRIVATE(no_of_certs); |
| 147 | mbedtls_x509_crt MBEDTLS_PRIVATE(certs); |
| 148 | int MBEDTLS_PRIVATE(no_of_crls); |
| 149 | mbedtls_x509_crl MBEDTLS_PRIVATE(crl); |
| 150 | int MBEDTLS_PRIVATE(no_of_signers); |
| 151 | mbedtls_pkcs7_signer_info MBEDTLS_PRIVATE(signers); |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 152 | } |
| 153 | mbedtls_pkcs7_signed_data; |
| 154 | |
| 155 | /** |
| 156 | * Structure holding PKCS7 structure, only signed data for now |
| 157 | */ |
| 158 | typedef struct mbedtls_pkcs7 |
| 159 | { |
Nick Child | 390e61a | 2021-08-09 13:33:14 -0400 | [diff] [blame] | 160 | mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw); |
| 161 | mbedtls_pkcs7_buf MBEDTLS_PRIVATE(content_type_oid); |
| 162 | mbedtls_pkcs7_signed_data MBEDTLS_PRIVATE(signed_data); |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 163 | } |
| 164 | mbedtls_pkcs7; |
| 165 | |
| 166 | /** |
| 167 | * \brief Initialize pkcs7 structure. |
| 168 | * |
| 169 | * \param pkcs7 pkcs7 structure. |
| 170 | */ |
| 171 | void mbedtls_pkcs7_init( mbedtls_pkcs7 *pkcs7 ); |
| 172 | |
| 173 | /** |
| 174 | * \brief Parse a single DER formatted pkcs7 content. |
| 175 | * |
| 176 | * \param pkcs7 The pkcs7 structure to be filled by parser for the output. |
| 177 | * \param buf The buffer holding the DER encoded pkcs7. |
| 178 | * \param buflen The size in Bytes of \p buf. |
| 179 | * |
| 180 | * \note This function makes an internal copy of the PKCS7 buffer |
| 181 | * \p buf. In particular, \p buf may be destroyed or reused |
| 182 | * after this call returns. |
| 183 | * |
Nayna Jain | 673a226 | 2020-12-14 22:44:49 +0000 | [diff] [blame] | 184 | * \return The \c mbedtls_pkcs7_type of \p buf, if successful. |
Nayna Jain | c9deb18 | 2020-11-16 19:03:12 +0000 | [diff] [blame] | 185 | * \return A negative error code on failure. |
| 186 | */ |
| 187 | int mbedtls_pkcs7_parse_der( mbedtls_pkcs7 *pkcs7, const unsigned char *buf, |
| 188 | const size_t buflen ); |
| 189 | |
| 190 | /** |
| 191 | * \brief Verification of PKCS7 signature. |
| 192 | * |
| 193 | * \param pkcs7 PKCS7 structure containing signature. |
| 194 | * \param cert Certificate containing key to verify signature. |
| 195 | * \param data Plain data on which signature has to be verified. |
| 196 | * \param datalen Length of the data. |
| 197 | * |
| 198 | * \note This function internally calculates the hash on the supplied |
| 199 | * plain data for signature verification. |
| 200 | * |
| 201 | * \return A negative error code on failure. |
| 202 | */ |
| 203 | int mbedtls_pkcs7_signed_data_verify( mbedtls_pkcs7 *pkcs7, |
| 204 | const mbedtls_x509_crt *cert, |
| 205 | const unsigned char *data, |
| 206 | size_t datalen ); |
| 207 | |
| 208 | /** |
| 209 | * \brief Verification of PKCS7 signature. |
| 210 | * |
| 211 | * \param pkcs7 PKCS7 structure containing signature. |
| 212 | * \param cert Certificate containing key to verify signature. |
| 213 | * \param hash Hash of the plain data on which signature has to be verified. |
| 214 | * \param hashlen Length of the hash. |
| 215 | * |
| 216 | * \note This function is different from mbedtls_pkcs7_signed_data_verify() |
| 217 | * in a way that it directly recieves the hash of the data. |
| 218 | * |
| 219 | * \return A negative error code on failure. |
| 220 | */ |
| 221 | int mbedtls_pkcs7_signed_hash_verify( mbedtls_pkcs7 *pkcs7, |
| 222 | const mbedtls_x509_crt *cert, |
| 223 | const unsigned char *hash, size_t hashlen); |
| 224 | |
| 225 | /** |
| 226 | * \brief Unallocate all PKCS7 data and zeroize the memory. |
| 227 | * It doesn't free pkcs7 itself. It should be done by the caller. |
| 228 | * |
| 229 | * \param pkcs7 PKCS7 structure to free. |
| 230 | */ |
| 231 | void mbedtls_pkcs7_free( mbedtls_pkcs7 *pkcs7 ); |
| 232 | |
| 233 | #ifdef __cplusplus |
| 234 | } |
| 235 | #endif |
| 236 | |
| 237 | #endif /* pkcs7.h */ |