1 /**
2  * \file pkcs7.h
3  *
4  * \brief PKCS #7 generic defines and structures
5  *  https://tools.ietf.org/html/rfc2315
6  */
7 /*
8  *  Copyright The Mbed TLS Contributors
9  *  SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
10  */
11 
12 /**
13  * Note: For the time being, this implementation of the PKCS #7 cryptographic
14  * message syntax is a partial implementation of RFC 2315.
15  * Differences include:
16  *  - The RFC specifies 6 different content types. The only type currently
17  *    supported in Mbed TLS is the signed-data content type.
18  *  - The only supported PKCS #7 Signed Data syntax version is version 1
19  *  - The RFC specifies support for BER. This implementation is limited to
20  *    DER only.
21  *  - The RFC specifies that multiple digest algorithms can be specified
22  *    in the Signed Data type. Only one digest algorithm is supported in Mbed TLS.
23  *  - The RFC specifies the Signed Data type can contain multiple X.509 or PKCS #6 extended
24  *    certificates. In Mbed TLS, this list can only contain 0 or 1 certificates
25  *    and they must be in X.509 format.
26  *  - The RFC specifies the Signed Data type can contain
27  *    certificate-revocation lists (CRLs). This implementation has no support
28  *    for CRLs so it is assumed to be an empty list.
29  *  - The RFC allows for SignerInfo structure to optionally contain
30  *    unauthenticatedAttributes and authenticatedAttributes. In Mbed TLS it is
31  *    assumed these fields are empty.
32  *  - The RFC allows for the signed Data type to contain contentInfo. This
33  *    implementation assumes the type is DATA and the content is empty.
34  */
35 
36 #ifndef MBEDTLS_PKCS7_H
37 #define MBEDTLS_PKCS7_H
38 
39 #include "mbedtls/private_access.h"
40 
41 #include "mbedtls/build_info.h"
42 
43 #include "mbedtls/asn1.h"
44 #include "mbedtls/x509_crt.h"
45 
46 /**
47  * \name PKCS #7 Module Error codes
48  * \{
49  */
50 #define MBEDTLS_ERR_PKCS7_INVALID_FORMAT                   -0x5300  /**< The format is invalid, e.g. different type expected. */
51 #define MBEDTLS_ERR_PKCS7_FEATURE_UNAVAILABLE              -0x5380  /**< Unavailable feature, e.g. anything other than signed data. */
52 #define MBEDTLS_ERR_PKCS7_INVALID_VERSION                  -0x5400  /**< The PKCS #7 version element is invalid or cannot be parsed. */
53 #define MBEDTLS_ERR_PKCS7_INVALID_CONTENT_INFO             -0x5480  /**< The PKCS #7 content info is invalid or cannot be parsed. */
54 #define MBEDTLS_ERR_PKCS7_INVALID_ALG                      -0x5500  /**< The algorithm tag or value is invalid or cannot be parsed. */
55 #define MBEDTLS_ERR_PKCS7_INVALID_CERT                     -0x5580  /**< The certificate tag or value is invalid or cannot be parsed. */
56 #define MBEDTLS_ERR_PKCS7_INVALID_SIGNATURE                -0x5600  /**< Error parsing the signature */
57 #define MBEDTLS_ERR_PKCS7_INVALID_SIGNER_INFO              -0x5680  /**< Error parsing the signer's info */
58 #define MBEDTLS_ERR_PKCS7_BAD_INPUT_DATA                   -0x5700  /**< Input invalid. */
59 #define MBEDTLS_ERR_PKCS7_ALLOC_FAILED                     -0x5780  /**< Allocation of memory failed. */
60 #define MBEDTLS_ERR_PKCS7_VERIFY_FAIL                      -0x5800  /**< Verification Failed */
61 #define MBEDTLS_ERR_PKCS7_CERT_DATE_INVALID                -0x5880  /**< The PKCS #7 date issued/expired dates are invalid */
62 /* \} name */
63 
64 /**
65  * \name PKCS #7 Supported Version
66  * \{
67  */
68 #define MBEDTLS_PKCS7_SUPPORTED_VERSION                           0x01
69 /* \} name */
70 
71 #ifdef __cplusplus
72 extern "C" {
73 #endif
74 
75 /**
76  * Type-length-value structure that allows for ASN.1 using DER.
77  */
78 typedef mbedtls_asn1_buf mbedtls_pkcs7_buf;
79 
80 /**
81  * Container for ASN.1 named information objects.
82  * It allows for Relative Distinguished Names (e.g. cn=localhost,ou=code,etc.).
83  */
84 typedef mbedtls_asn1_named_data mbedtls_pkcs7_name;
85 
86 /**
87  * Container for a sequence of ASN.1 items
88  */
89 typedef mbedtls_asn1_sequence mbedtls_pkcs7_sequence;
90 
91 /**
92  * PKCS #7 types
93  */
94 typedef enum {
95     MBEDTLS_PKCS7_NONE=0,
96     MBEDTLS_PKCS7_DATA,
97     MBEDTLS_PKCS7_SIGNED_DATA,
98     MBEDTLS_PKCS7_ENVELOPED_DATA,
99     MBEDTLS_PKCS7_SIGNED_AND_ENVELOPED_DATA,
100     MBEDTLS_PKCS7_DIGESTED_DATA,
101     MBEDTLS_PKCS7_ENCRYPTED_DATA,
102 }
103 mbedtls_pkcs7_type;
104 
105 /**
106  * Structure holding PKCS #7 signer info
107  */
108 typedef struct mbedtls_pkcs7_signer_info {
109     int MBEDTLS_PRIVATE(version);
110     mbedtls_x509_buf MBEDTLS_PRIVATE(serial);
111     mbedtls_x509_name MBEDTLS_PRIVATE(issuer);
112     mbedtls_x509_buf MBEDTLS_PRIVATE(issuer_raw);
113     mbedtls_x509_buf MBEDTLS_PRIVATE(alg_identifier);
114     mbedtls_x509_buf MBEDTLS_PRIVATE(sig_alg_identifier);
115     mbedtls_x509_buf MBEDTLS_PRIVATE(sig);
116     struct mbedtls_pkcs7_signer_info *MBEDTLS_PRIVATE(next);
117 }
118 mbedtls_pkcs7_signer_info;
119 
120 /**
121  * Structure holding the signed data section
122  */
123 typedef struct mbedtls_pkcs7_signed_data {
124     int MBEDTLS_PRIVATE(version);
125     mbedtls_pkcs7_buf MBEDTLS_PRIVATE(digest_alg_identifiers);
126     int MBEDTLS_PRIVATE(no_of_certs);
127     mbedtls_x509_crt MBEDTLS_PRIVATE(certs);
128     int MBEDTLS_PRIVATE(no_of_crls);
129     mbedtls_x509_crl MBEDTLS_PRIVATE(crl);
130     int MBEDTLS_PRIVATE(no_of_signers);
131     mbedtls_pkcs7_signer_info MBEDTLS_PRIVATE(signers);
132 }
133 mbedtls_pkcs7_signed_data;
134 
135 /**
136  * Structure holding PKCS #7 structure, only signed data for now
137  */
138 typedef struct mbedtls_pkcs7 {
139     mbedtls_pkcs7_buf MBEDTLS_PRIVATE(raw);
140     mbedtls_pkcs7_signed_data MBEDTLS_PRIVATE(signed_data);
141 }
142 mbedtls_pkcs7;
143 
144 /**
145  * \brief          Initialize mbedtls_pkcs7 structure.
146  *
147  * \param pkcs7    mbedtls_pkcs7 structure.
148  */
149 void mbedtls_pkcs7_init(mbedtls_pkcs7 *pkcs7);
150 
151 /**
152  * \brief          Parse a single DER formatted PKCS #7 detached signature.
153  *
154  * \param pkcs7    The mbedtls_pkcs7 structure to be filled by the parser.
155  * \param buf      The buffer holding only the DER encoded PKCS #7 content.
156  * \param buflen   The size in bytes of \p buf. The size must be exactly the
157  *                 length of the DER encoded PKCS #7 content.
158  *
159  * \note           This function makes an internal copy of the PKCS #7 buffer
160  *                 \p buf. In particular, \p buf may be destroyed or reused
161  *                 after this call returns.
162  * \note           Signatures with internal data are not supported.
163  *
164  * \return         The \c mbedtls_pkcs7_type of \p buf, if successful.
165  * \return         A negative error code on failure.
166  */
167 int mbedtls_pkcs7_parse_der(mbedtls_pkcs7 *pkcs7, const unsigned char *buf,
168                             const size_t buflen);
169 
170 /**
171  * \brief          Verification of PKCS #7 signature against a caller-supplied
172  *                 certificate.
173  *
174  *                 For each signer in the PKCS structure, this function computes
175  *                 a signature over the supplied data, using the supplied
176  *                 certificate and the same digest algorithm as specified by the
177  *                 signer. It then compares this signature against the
178  *                 signer's signature; verification succeeds if any comparison
179  *                 matches.
180  *
181  *                 This function does not use the certificates held within the
182  *                 PKCS #7 structure itself, and does not check that the
183  *                 certificate is signed by a trusted certification authority.
184  *
185  * \param pkcs7    mbedtls_pkcs7 structure containing signature.
186  * \param cert     Certificate containing key to verify signature.
187  * \param data     Plain data on which signature has to be verified.
188  * \param datalen  Length of the data.
189  *
190  * \note           This function internally calculates the hash on the supplied
191  *                 plain data for signature verification.
192  *
193  * \return         0 if the signature verifies, or a negative error code on failure.
194  */
195 int mbedtls_pkcs7_signed_data_verify(mbedtls_pkcs7 *pkcs7,
196                                      const mbedtls_x509_crt *cert,
197                                      const unsigned char *data,
198                                      size_t datalen);
199 
200 /**
201  * \brief          Verification of PKCS #7 signature against a caller-supplied
202  *                 certificate.
203  *
204  *                 For each signer in the PKCS structure, this function
205  *                 validates a signature over the supplied hash, using the
206  *                 supplied certificate and the same digest algorithm as
207  *                 specified by the signer. Verification succeeds if any
208  *                 signature is good.
209  *
210  *                 This function does not use the certificates held within the
211  *                 PKCS #7 structure itself, and does not check that the
212  *                 certificate is signed by a trusted certification authority.
213  *
214  * \param pkcs7    PKCS #7 structure containing signature.
215  * \param cert     Certificate containing key to verify signature.
216  * \param hash     Hash of the plain data on which signature has to be verified.
217  * \param hashlen  Length of the hash.
218  *
219  * \note           This function is different from mbedtls_pkcs7_signed_data_verify()
220  *                 in that it is directly passed the hash of the data.
221  *
222  * \return         0 if the signature verifies, or a negative error code on failure.
223  */
224 int mbedtls_pkcs7_signed_hash_verify(mbedtls_pkcs7 *pkcs7,
225                                      const mbedtls_x509_crt *cert,
226                                      const unsigned char *hash, size_t hashlen);
227 
228 /**
229  * \brief          Unallocate all PKCS #7 data and zeroize the memory.
230  *                 It doesn't free \p pkcs7 itself. This should be done by the caller.
231  *
232  * \param pkcs7    mbedtls_pkcs7 structure to free.
233  */
234 void mbedtls_pkcs7_free(mbedtls_pkcs7 *pkcs7);
235 
236 #ifdef __cplusplus
237 }
238 #endif
239 
240 #endif /* pkcs7.h */
241