1
/* ***** BEGIN LICENSE BLOCK *****
2
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
4
* The contents of this file are subject to the Mozilla Public License Version
5
* 1.1 (the "License"); you may not use this file except in compliance with
6
* the License. You may obtain a copy of the License at
7
* http://www.mozilla.org/MPL/
9
* Software distributed under the License is distributed on an "AS IS" basis,
10
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
11
* for the specific language governing rights and limitations under the
14
* The Original Code is the Netscape security libraries.
16
* The Initial Developer of the Original Code is
17
* Netscape Communications Corporation.
18
* Portions created by the Initial Developer are Copyright (C) 1994-2000
19
* the Initial Developer. All Rights Reserved.
23
* Alternatively, the contents of this file may be used under the terms of
24
* either the GNU General Public License Version 2 or later (the "GPL"), or
25
* the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
26
* in which case the provisions of the GPL or the LGPL are applicable instead
27
* of those above. If you wish to allow use of your version of this file only
28
* under the terms of either the GPL or the LGPL, and not to allow others to
29
* use your version of this file under the terms of the MPL, indicate your
30
* decision by deleting the provisions above and replace them with the notice
31
* and other provisions required by the GPL or the LGPL. If you do not delete
32
* the provisions above, a recipient may use your version of this file under
33
* the terms of any one of the MPL, the GPL or the LGPL.
35
* ***** END LICENSE BLOCK ***** */
38
* CMS recipient list functions
40
* $Id: cmsreclist.c,v 1.4.2.1 2006/07/17 21:57:12 alexei.volkov.bugs%sun.com Exp $
55
nss_cms_recipients_traverse(NSSCMSRecipientInfo **recipientinfos, NSSCMSRecipient **recipient_list)
61
NSSCMSRecipientInfo *ri;
62
NSSCMSRecipientEncryptedKey *rek;
64
for (i = 0; recipientinfos[i] != NULL; i++) {
65
ri = recipientinfos[i];
66
switch (ri->recipientInfoType) {
67
case NSSCMSRecipientInfoID_KeyTrans:
69
NSSCMSRecipientIdentifier *recipId =
70
&ri->ri.keyTransRecipientInfo.recipientIdentifier;
72
if (recipId->identifierType != NSSCMSRecipientID_IssuerSN &&
73
recipId->identifierType != NSSCMSRecipientID_SubjectKeyID) {
74
PORT_SetError(SEC_ERROR_INVALID_ARGS);
77
/* alloc one & fill it out */
78
rle = (NSSCMSRecipient *)PORT_ZAlloc(sizeof(NSSCMSRecipient));
84
switch (recipId->identifierType) {
85
case NSSCMSRecipientID_IssuerSN:
86
rle->kind = RLIssuerSN;
87
rle->id.issuerAndSN = recipId->id.issuerAndSN;
89
case NSSCMSRecipientID_SubjectKeyID:
90
rle->kind = RLSubjKeyID;
91
rle->id.subjectKeyID = recipId->id.subjectKeyID;
93
default: /* we never get here because of identifierType check
94
we done before. Leaving it to kill compiler warning */
97
recipient_list[rlindex++] = rle;
102
case NSSCMSRecipientInfoID_KeyAgree:
103
if (ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys == NULL)
105
for (j=0; ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[j] != NULL; j++) {
106
if (recipient_list) {
107
rek = ri->ri.keyAgreeRecipientInfo.recipientEncryptedKeys[j];
108
/* alloc one & fill it out */
109
rle = (NSSCMSRecipient *)PORT_ZAlloc(sizeof(NSSCMSRecipient));
115
switch (rek->recipientIdentifier.identifierType) {
116
case NSSCMSKeyAgreeRecipientID_IssuerSN:
117
rle->kind = RLIssuerSN;
118
rle->id.issuerAndSN = rek->recipientIdentifier.id.issuerAndSN;
120
case NSSCMSKeyAgreeRecipientID_RKeyID:
121
rle->kind = RLSubjKeyID;
122
rle->id.subjectKeyID = rek->recipientIdentifier.id.recipientKeyIdentifier.subjectKeyIdentifier;
125
recipient_list[rlindex++] = rle;
131
case NSSCMSRecipientInfoID_KEK:
132
/* KEK is not implemented */
136
/* if we have a recipient list, we return on success (-1, above, on failure) */
137
/* otherwise, we return the count. */
138
if (recipient_list) {
139
recipient_list[rlindex] = NULL;
147
nss_cms_recipient_list_create(NSSCMSRecipientInfo **recipientinfos)
150
NSSCMSRecipient **recipient_list;
152
/* count the number of recipient identifiers */
153
count = nss_cms_recipients_traverse(recipientinfos, NULL);
156
PORT_SetError(SEC_ERROR_BAD_DATA);
158
PORT_SetErrorString("Cannot find recipient data in envelope.");
163
/* allocate an array of pointers */
164
recipient_list = (NSSCMSRecipient **)
165
PORT_ZAlloc((count + 1) * sizeof(NSSCMSRecipient *));
166
if (recipient_list == NULL)
169
/* now fill in the recipient_list */
170
rv = nss_cms_recipients_traverse(recipientinfos, recipient_list);
172
nss_cms_recipient_list_destroy(recipient_list);
175
return recipient_list;
179
nss_cms_recipient_list_destroy(NSSCMSRecipient **recipient_list)
182
NSSCMSRecipient *recipient;
184
for (i=0; recipient_list[i] != NULL; i++) {
185
recipient = recipient_list[i];
187
CERT_DestroyCertificate(recipient->cert);
188
if (recipient->privkey)
189
SECKEY_DestroyPrivateKey(recipient->privkey);
191
PK11_FreeSlot(recipient->slot);
192
PORT_Free(recipient);
194
PORT_Free(recipient_list);
197
NSSCMSRecipientEncryptedKey *
198
NSS_CMSRecipientEncryptedKey_Create(PLArenaPool *poolp)
200
return (NSSCMSRecipientEncryptedKey *)PORT_ArenaZAlloc(poolp, sizeof(NSSCMSRecipientEncryptedKey));