/* -*- Mode: C; tab-width: 8; indent-tabs-mode: t; c-basic-offset: 8 -*- */ /* * The Initial Developer of the Original Code is Netscape * Communications Corporation. Portions created by Netscape are * Copyright (C) 1994-2000 Netscape Communications Corporation. All * Rights Reserved. * * Copyright (C) 1999-2008 Novell, Inc. (www.novell.com) * * This library is free software: you can redistribute it and/or modify it * under the terms of the GNU Lesser General Public License as published by * the Free Software Foundation. * * This library is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License * for more details. * * You should have received a copy of the GNU Lesser General Public License * along with this library. If not, see . * * Authors: Jeffrey Stedfast * Michael Zucchi */ #ifdef HAVE_CONFIG_H #include #endif #ifdef ENABLE_SMIME #include "nss.h" #include #include #include #include #include #include #include #include #include #include #include #include "camel-data-wrapper.h" #include "camel-mime-filter-basic.h" #include "camel-mime-filter-canon.h" #include "camel-mime-part.h" #include "camel-multipart-signed.h" #include "camel-operation.h" #include "camel-session.h" #include "camel-smime-context.h" #include "camel-stream-filter.h" #include "camel-stream-fs.h" #include "camel-stream-mem.h" #define d(x) #define CAMEL_SMIME_CONTEXT_GET_PRIVATE(obj) \ (G_TYPE_INSTANCE_GET_PRIVATE \ ((obj), CAMEL_TYPE_SMIME_CONTEXT, CamelSMIMEContextPrivate)) struct _CamelSMIMEContextPrivate { CERTCertDBHandle *certdb; gchar *encrypt_key; camel_smime_sign_t sign_mode; gint password_tries; guint send_encrypt_key_prefs : 1; }; G_DEFINE_TYPE (CamelSMIMEContext, camel_smime_context, CAMEL_TYPE_CIPHER_CONTEXT) static void smime_cert_data_free (gpointer cert_data) { g_return_if_fail (cert_data != NULL); CERT_DestroyCertificate (cert_data); } static gpointer smime_cert_data_clone (gpointer cert_data) { g_return_val_if_fail (cert_data != NULL, NULL); return CERT_DupCertificate (cert_data); } /* used for decode content callback, for streaming decode */ static void sm_write_stream (gpointer arg, const gchar *buf, gulong len) { camel_stream_write ((CamelStream *) arg, buf, len, NULL, NULL); } static PK11SymKey * sm_decrypt_key (gpointer arg, SECAlgorithmID *algid) { printf ("Decrypt key called\n"); return (PK11SymKey *) arg; } static const gchar * nss_error_to_string (glong errorcode) { #define cs(a,b) case a: return b; switch (errorcode) { cs (SEC_ERROR_IO, "An I/O error occurred during security authorization.") cs (SEC_ERROR_LIBRARY_FAILURE, "security library failure.") cs (SEC_ERROR_BAD_DATA, "security library: received bad data.") cs (SEC_ERROR_OUTPUT_LEN, "security library: output length error.") cs (SEC_ERROR_INPUT_LEN, "security library has experienced an input length error.") cs (SEC_ERROR_INVALID_ARGS, "security library: invalid arguments.") cs (SEC_ERROR_INVALID_ALGORITHM, "security library: invalid algorithm.") cs (SEC_ERROR_INVALID_AVA, "security library: invalid AVA.") cs (SEC_ERROR_INVALID_TIME, "Improperly formatted time string.") cs (SEC_ERROR_BAD_DER, "security library: improperly formatted DER-encoded message.") cs (SEC_ERROR_BAD_SIGNATURE, "Peer's certificate has an invalid signature.") cs (SEC_ERROR_EXPIRED_CERTIFICATE, "Peer's Certificate has expired.") cs (SEC_ERROR_REVOKED_CERTIFICATE, "Peer's Certificate has been revoked.") cs (SEC_ERROR_UNKNOWN_ISSUER, "Peer's Certificate issuer is not recognized.") cs (SEC_ERROR_BAD_KEY, "Peer's public key is invalid.") cs (SEC_ERROR_BAD_PASSWORD, "The security password entered is incorrect.") cs (SEC_ERROR_RETRY_PASSWORD, "New password entered incorrectly. Please try again.") cs (SEC_ERROR_NO_NODELOCK, "security library: no nodelock.") cs (SEC_ERROR_BAD_DATABASE, "security library: bad database.") cs (SEC_ERROR_NO_MEMORY, "security library: memory allocation failure.") cs (SEC_ERROR_UNTRUSTED_ISSUER, "Peer's certificate issuer has been marked as not trusted by the user.") cs (SEC_ERROR_UNTRUSTED_CERT, "Peer's certificate has been marked as not trusted by the user.") cs (SEC_ERROR_DUPLICATE_CERT, "Certificate already exists in your database.") cs (SEC_ERROR_DUPLICATE_CERT_NAME, "Downloaded certificate's name duplicates one already in your database.") cs (SEC_ERROR_ADDING_CERT, "Error adding certificate to database.") cs (SEC_ERROR_FILING_KEY, "Error refiling the key for this certificate.") cs (SEC_ERROR_NO_KEY, "The private key for this certificate cannot be found in key database") cs (SEC_ERROR_CERT_VALID, "This certificate is valid.") cs (SEC_ERROR_CERT_NOT_VALID, "This certificate is not valid.") cs (SEC_ERROR_CERT_NO_RESPONSE, "Cert Library: No Response") cs (SEC_ERROR_EXPIRED_ISSUER_CERTIFICATE, "The certificate issuer's certificate has expired. Check your system date and time.") cs (SEC_ERROR_CRL_EXPIRED, "The CRL for the certificate's issuer has expired. Update it or check your system date and time.") cs (SEC_ERROR_CRL_BAD_SIGNATURE, "The CRL for the certificate's issuer has an invalid signature.") cs (SEC_ERROR_CRL_INVALID, "New CRL has an invalid format.") cs (SEC_ERROR_EXTENSION_VALUE_INVALID, "Certificate extension value is invalid.") cs (SEC_ERROR_EXTENSION_NOT_FOUND, "Certificate extension not found.") cs (SEC_ERROR_CA_CERT_INVALID, "Issuer certificate is invalid.") cs (SEC_ERROR_PATH_LEN_CONSTRAINT_INVALID, "Certificate path length constraint is invalid.") cs (SEC_ERROR_CERT_USAGES_INVALID, "Certificate usages field is invalid.") cs (SEC_INTERNAL_ONLY, "**Internal ONLY module**") cs (SEC_ERROR_INVALID_KEY, "The key does not support the requested operation.") cs (SEC_ERROR_UNKNOWN_CRITICAL_EXTENSION, "Certificate contains unknown critical extension.") cs (SEC_ERROR_OLD_CRL, "New CRL is not later than the current one.") cs (SEC_ERROR_NO_EMAIL_CERT, "Not encrypted or signed: you do not yet have an email certificate.") cs (SEC_ERROR_NO_RECIPIENT_CERTS_QUERY, "Not encrypted: you do not have certificates for each of the recipients.") cs (SEC_ERROR_NOT_A_RECIPIENT, "Cannot decrypt: you are not a recipient, or matching certificate and private key not found.") cs (SEC_ERROR_PKCS7_KEYALG_MISMATCH, "Cannot decrypt: key encryption algorithm does not match your certificate.") cs (SEC_ERROR_PKCS7_BAD_SIGNATURE, "Signature verification failed: no signer found, too many signers found, or improper or corrupted data.") cs (SEC_ERROR_UNSUPPORTED_KEYALG, "Unsupported or unknown key algorithm.") cs (SEC_ERROR_DECRYPTION_DISALLOWED, "Cannot decrypt: encrypted using a disallowed algorithm or key size.") cs (XP_SEC_FORTEZZA_BAD_CARD, "Fortezza card has not been properly initialized. Please remove it and return it to your issuer.") cs (XP_SEC_FORTEZZA_NO_CARD, "No Fortezza cards Found") cs (XP_SEC_FORTEZZA_NONE_SELECTED, "No Fortezza card selected") cs (XP_SEC_FORTEZZA_MORE_INFO, "Please select a personality to get more info on") cs (XP_SEC_FORTEZZA_PERSON_NOT_FOUND, "Personality not found") cs (XP_SEC_FORTEZZA_NO_MORE_INFO, "No more information on that Personality") cs (XP_SEC_FORTEZZA_BAD_PIN, "Invalid Pin") cs (XP_SEC_FORTEZZA_PERSON_ERROR, "Couldn't initialize Fortezza personalities.") cs (SEC_ERROR_NO_KRL, "No KRL for this site's certificate has been found.") cs (SEC_ERROR_KRL_EXPIRED, "The KRL for this site's certificate has expired.") cs (SEC_ERROR_KRL_BAD_SIGNATURE, "The KRL for this site's certificate has an invalid signature.") cs (SEC_ERROR_REVOKED_KEY, "The key for this site's certificate has been revoked.") cs (SEC_ERROR_KRL_INVALID, "New KRL has an invalid format.") cs (SEC_ERROR_NEED_RANDOM, "security library: need random data.") cs (SEC_ERROR_NO_MODULE, "security library: no security module can perform the requested operation.") cs (SEC_ERROR_NO_TOKEN, "The security card or token does not exist, needs to be initialized, or has been removed.") cs (SEC_ERROR_READ_ONLY, "security library: read-only database.") cs (SEC_ERROR_NO_SLOT_SELECTED, "No slot or token was selected.") cs (SEC_ERROR_CERT_NICKNAME_COLLISION, "A certificate with the same nickname already exists.") cs (SEC_ERROR_KEY_NICKNAME_COLLISION, "A key with the same nickname already exists.") cs (SEC_ERROR_SAFE_NOT_CREATED, "error while creating safe object") cs (SEC_ERROR_BAGGAGE_NOT_CREATED, "error while creating baggage object") cs (XP_JAVA_REMOVE_PRINCIPAL_ERROR, "Couldn't remove the principal") cs (XP_JAVA_DELETE_PRIVILEGE_ERROR, "Couldn't delete the privilege") cs (XP_JAVA_CERT_NOT_EXISTS_ERROR, "This principal doesn't have a certificate") cs (SEC_ERROR_BAD_EXPORT_ALGORITHM, "Required algorithm is not allowed.") cs (SEC_ERROR_EXPORTING_CERTIFICATES, "Error attempting to export certificates.") cs (SEC_ERROR_IMPORTING_CERTIFICATES, "Error attempting to import certificates.") cs (SEC_ERROR_PKCS12_DECODING_PFX, "Unable to import. Decoding error. File not valid.") cs (SEC_ERROR_PKCS12_INVALID_MAC, "Unable to import. Invalid MAC. Incorrect password or corrupt file.") cs (SEC_ERROR_PKCS12_UNSUPPORTED_MAC_ALGORITHM, "Unable to import. MAC algorithm not supported.") cs (SEC_ERROR_PKCS12_UNSUPPORTED_TRANSPORT_MODE, "Unable to import. Only password integrity and privacy modes supported.") cs (SEC_ERROR_PKCS12_CORRUPT_PFX_STRUCTURE, "Unable to import. File structure is corrupt.") cs (SEC_ERROR_PKCS12_UNSUPPORTED_PBE_ALGORITHM, "Unable to import. Encryption algorithm not supported.") cs (SEC_ERROR_PKCS12_UNSUPPORTED_VERSION, "Unable to import. File version not supported.") cs (SEC_ERROR_PKCS12_PRIVACY_PASSWORD_INCORRECT, "Unable to import. Incorrect privacy password.") cs (SEC_ERROR_PKCS12_CERT_COLLISION, "Unable to import. Same nickname already exists in database.") cs (SEC_ERROR_USER_CANCELLED, "The user pressed cancel.") cs (SEC_ERROR_PKCS12_DUPLICATE_DATA, "Not imported, already in database.") cs (SEC_ERROR_MESSAGE_SEND_ABORTED, "Message not sent.") cs (SEC_ERROR_INADEQUATE_KEY_USAGE, "Certificate key usage inadequate for attempted operation.") cs (SEC_ERROR_INADEQUATE_CERT_TYPE, "Certificate type not approved for application.") cs (SEC_ERROR_CERT_ADDR_MISMATCH, "Address in signing certificate does not match address in message headers.") cs (SEC_ERROR_PKCS12_UNABLE_TO_IMPORT_KEY, "Unable to import. Error attempting to import private key.") cs (SEC_ERROR_PKCS12_IMPORTING_CERT_CHAIN, "Unable to import. Error attempting to import certificate chain.") cs (SEC_ERROR_PKCS12_UNABLE_TO_LOCATE_OBJECT_BY_NAME, "Unable to export. Unable to locate certificate or key by nickname.") cs (SEC_ERROR_PKCS12_UNABLE_TO_EXPORT_KEY, "Unable to export. Private Key could not be located and exported.") cs (SEC_ERROR_PKCS12_UNABLE_TO_WRITE, "Unable to export. Unable to write the export file.") cs (SEC_ERROR_PKCS12_UNABLE_TO_READ, "Unable to import. Unable to read the import file.") cs (SEC_ERROR_PKCS12_KEY_DATABASE_NOT_INITIALIZED, "Unable to export. Key database corrupt or deleted.") cs (SEC_ERROR_KEYGEN_FAIL, "Unable to generate public/private key pair.") cs (SEC_ERROR_INVALID_PASSWORD, "Password entered is invalid. Please pick a different one.") cs (SEC_ERROR_RETRY_OLD_PASSWORD, "Old password entered incorrectly. Please try again.") cs (SEC_ERROR_BAD_NICKNAME, "Certificate nickname already in use.") cs (SEC_ERROR_NOT_FORTEZZA_ISSUER, "Peer FORTEZZA chain has a non-FORTEZZA Certificate.") cs (SEC_ERROR_CANNOT_MOVE_SENSITIVE_KEY, "A sensitive key cannot be moved to the slot where it is needed.") cs (SEC_ERROR_JS_INVALID_MODULE_NAME, "Invalid module name.") cs (SEC_ERROR_JS_INVALID_DLL, "Invalid module path/filename") cs (SEC_ERROR_JS_ADD_MOD_FAILURE, "Unable to add module") cs (SEC_ERROR_JS_DEL_MOD_FAILURE, "Unable to delete module") cs (SEC_ERROR_OLD_KRL, "New KRL is not later than the current one.") cs (SEC_ERROR_CKL_CONFLICT, "New CKL has different issuer than current CKL. Delete current CKL.") cs (SEC_ERROR_CERT_NOT_IN_NAME_SPACE, "The Certifying Authority for this certificate is not permitted to issue a certificate with this name.") cs (SEC_ERROR_KRL_NOT_YET_VALID, "The key revocation list for this certificate is not yet valid.") cs (SEC_ERROR_CRL_NOT_YET_VALID, "The certificate revocation list for this certificate is not yet valid.") cs (SEC_ERROR_UNKNOWN_CERT, "The requested certificate could not be found.") cs (SEC_ERROR_UNKNOWN_SIGNER, "The signer's certificate could not be found.") cs (SEC_ERROR_CERT_BAD_ACCESS_LOCATION, "The location for the certificate status server has invalid format.") cs (SEC_ERROR_OCSP_UNKNOWN_RESPONSE_TYPE, "The OCSP response cannot be fully decoded; it is of an unknown type.") cs (SEC_ERROR_OCSP_BAD_HTTP_RESPONSE, "The OCSP server returned unexpected/invalid HTTP data.") cs (SEC_ERROR_OCSP_MALFORMED_REQUEST, "The OCSP server found the request to be corrupted or improperly formed.") cs (SEC_ERROR_OCSP_SERVER_ERROR, "The OCSP server experienced an internal error.") cs (SEC_ERROR_OCSP_TRY_SERVER_LATER, "The OCSP server suggests trying again later.") cs (SEC_ERROR_OCSP_REQUEST_NEEDS_SIG, "The OCSP server requires a signature on this request.") cs (SEC_ERROR_OCSP_UNAUTHORIZED_REQUEST, "The OCSP server has refused this request as unauthorized.") cs (SEC_ERROR_OCSP_UNKNOWN_RESPONSE_STATUS, "The OCSP server returned an unrecognizable status.") cs (SEC_ERROR_OCSP_UNKNOWN_CERT, "The OCSP server has no status for the certificate.") cs (SEC_ERROR_OCSP_NOT_ENABLED, "You must enable OCSP before performing this operation.") cs (SEC_ERROR_OCSP_NO_DEFAULT_RESPONDER, "You must set the OCSP default responder before performing this operation.") cs (SEC_ERROR_OCSP_MALFORMED_RESPONSE, "The response from the OCSP server was corrupted or improperly formed.") cs (SEC_ERROR_OCSP_UNAUTHORIZED_RESPONSE, "The signer of the OCSP response is not authorized to give status for this certificate.") cs (SEC_ERROR_OCSP_FUTURE_RESPONSE, "The OCSP response is not yet valid (contains a date in the future).") cs (SEC_ERROR_OCSP_OLD_RESPONSE, "The OCSP response contains out-of-date information.") cs (SEC_ERROR_DIGEST_NOT_FOUND, "The CMS or PKCS #7 Digest was not found in signed message.") cs (SEC_ERROR_UNSUPPORTED_MESSAGE_TYPE, "The CMS or PKCS #7 Message type is unsupported.") cs (SEC_ERROR_MODULE_STUCK, "PKCS #11 module could not be removed because it is still in use.") cs (SEC_ERROR_BAD_TEMPLATE, "Could not decode ASN.1 data. Specified template was invalid.") cs (SEC_ERROR_CRL_NOT_FOUND, "No matching CRL was found.") cs (SEC_ERROR_REUSED_ISSUER_AND_SERIAL, "You are attempting to import a cert with the same issuer/serial as an existing cert, but that is not the same cert.") cs (SEC_ERROR_BUSY, "NSS could not shutdown. Objects are still in use.") cs (SEC_ERROR_EXTRA_INPUT, "DER-encoded message contained extra unused data.") cs (SEC_ERROR_UNSUPPORTED_ELLIPTIC_CURVE, "Unsupported elliptic curve.") cs (SEC_ERROR_UNSUPPORTED_EC_POINT_FORM, "Unsupported elliptic curve point form.") cs (SEC_ERROR_UNRECOGNIZED_OID, "Unrecognized Object Identifier.") cs (SEC_ERROR_OCSP_INVALID_SIGNING_CERT, "Invalid OCSP signing certificate in OCSP response.") cs (SEC_ERROR_REVOKED_CERTIFICATE_CRL, "Certificate is revoked in issuer's certificate revocation list.") cs (SEC_ERROR_REVOKED_CERTIFICATE_OCSP, "Issuer's OCSP responder reports certificate is revoked.") cs (SEC_ERROR_CRL_INVALID_VERSION, "Issuer's Certificate Revocation List has an unknown version number.") cs (SEC_ERROR_CRL_V1_CRITICAL_EXTENSION, "Issuer's V1 Certificate Revocation List has a critical extension.") cs (SEC_ERROR_CRL_UNKNOWN_CRITICAL_EXTENSION, "Issuer's V2 Certificate Revocation List has an unknown critical extension.") cs (SEC_ERROR_UNKNOWN_OBJECT_TYPE, "Unknown object type specified.") cs (SEC_ERROR_INCOMPATIBLE_PKCS11, "PKCS #11 driver violates the spec in an incompatible way.") cs (SEC_ERROR_NO_EVENT, "No new slot event is available at this time.") cs (SEC_ERROR_CRL_ALREADY_EXISTS, "CRL already exists.") cs (SEC_ERROR_NOT_INITIALIZED, "NSS is not initialized.") cs (SEC_ERROR_TOKEN_NOT_LOGGED_IN, "The operation failed because the PKCS#11 token is not logged in.") cs (SEC_ERROR_OCSP_RESPONDER_CERT_INVALID, "Configured OCSP responder's certificate is invalid.") cs (SEC_ERROR_OCSP_BAD_SIGNATURE, "OCSP response has an invalid signature.") #if defined (NSS_VMAJOR) && defined (NSS_VMINOR) && defined (NSS_VPATCH) && (NSS_VMAJOR > 3 || (NSS_VMAJOR == 3 && NSS_VMINOR > 12) || (NSS_VMAJOR == 3 && NSS_VMINOR == 12 && NSS_VPATCH >= 2)) cs (SEC_ERROR_OUT_OF_SEARCH_LIMITS, "Cert validation search is out of search limits") cs (SEC_ERROR_INVALID_POLICY_MAPPING, "Policy mapping contains anypolicy") cs (SEC_ERROR_POLICY_VALIDATION_FAILED, "Cert chain fails policy validation") cs (SEC_ERROR_UNKNOWN_AIA_LOCATION_TYPE, "Unknown location type in cert AIA extension") cs (SEC_ERROR_BAD_HTTP_RESPONSE, "Server returned bad HTTP response") cs (SEC_ERROR_BAD_LDAP_RESPONSE, "Server returned bad LDAP response") cs (SEC_ERROR_FAILED_TO_ENCODE_DATA, "Failed to encode data with ASN1 encoder") cs (SEC_ERROR_BAD_INFO_ACCESS_LOCATION, "Bad information access location in cert extension") cs (SEC_ERROR_LIBPKIX_INTERNAL, "Libpkix internal error occurred during cert validation.") cs (SEC_ERROR_PKCS11_GENERAL_ERROR, "A PKCS #11 module returned CKR_GENERAL_ERROR, indicating that an unrecoverable error has occurred.") cs (SEC_ERROR_PKCS11_FUNCTION_FAILED, "A PKCS #11 module returned CKR_FUNCTION_FAILED, indicating that the requested function could not be performed. Trying the same operation again might succeed.") cs (SEC_ERROR_PKCS11_DEVICE_ERROR, "A PKCS #11 module returned CKR_DEVICE_ERROR, indicating that a problem has occurred with the token or slot.") #endif } #undef cs return NULL; } static void set_nss_error (GError **error, const gchar *def_error) { glong err_code; g_return_if_fail (def_error != NULL); err_code = PORT_GetError (); if (!err_code) { g_set_error ( error, CAMEL_SERVICE_ERROR, CAMEL_SERVICE_ERROR_CANT_AUTHENTICATE, "%s", def_error); } else { const gchar *err_str; err_str = nss_error_to_string (err_code); if (!err_str) err_str = "Uknown error."; g_set_error ( error, CAMEL_SERVICE_ERROR, CAMEL_SERVICE_ERROR_CANT_AUTHENTICATE, "%s (%d) - %s", err_str, (gint) err_code, def_error); } } static NSSCMSMessage * sm_signing_cmsmessage (CamelSMIMEContext *context, const gchar *nick, SECOidTag *hash, gint detached, GError **error) { CamelSMIMEContextPrivate *p = context->priv; NSSCMSMessage *cmsg = NULL; NSSCMSContentInfo *cinfo; NSSCMSSignedData *sigd; NSSCMSSignerInfo *signerinfo; CERTCertificate *cert= NULL, *ekpcert = NULL; g_return_val_if_fail (hash != NULL, NULL); if ((cert = CERT_FindUserCertByUsage (p->certdb, (gchar *) nick, certUsageEmailSigner, PR_TRUE, NULL)) == NULL) { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Cannot find certificate for '%s'"), nick); return NULL; } if (*hash == SEC_OID_UNKNOWN) { /* use signature algorithm from the certificate */ switch (SECOID_GetAlgorithmTag (&cert->signature)) { case SEC_OID_PKCS1_SHA256_WITH_RSA_ENCRYPTION: *hash = SEC_OID_SHA256; break; case SEC_OID_PKCS1_SHA384_WITH_RSA_ENCRYPTION: *hash = SEC_OID_SHA384; break; case SEC_OID_PKCS1_SHA512_WITH_RSA_ENCRYPTION: *hash = SEC_OID_SHA512; break; case SEC_OID_PKCS1_MD5_WITH_RSA_ENCRYPTION: *hash = SEC_OID_MD5; break; case SEC_OID_PKCS1_SHA1_WITH_RSA_ENCRYPTION: default: *hash = SEC_OID_SHA1; break; } } cmsg = NSS_CMSMessage_Create (NULL); /* create a message on its own pool */ if (cmsg == NULL) { set_nss_error (error, _("Cannot create CMS message")); goto fail; } if ((sigd = NSS_CMSSignedData_Create (cmsg)) == NULL) { set_nss_error (error, _("Cannot create CMS signed data")); goto fail; } cinfo = NSS_CMSMessage_GetContentInfo (cmsg); if (NSS_CMSContentInfo_SetContent_SignedData (cmsg, cinfo, sigd) != SECSuccess) { set_nss_error (error, _("Cannot attach CMS signed data")); goto fail; } /* if !detatched, the contentinfo will alloc a data item for us */ cinfo = NSS_CMSSignedData_GetContentInfo (sigd); if (NSS_CMSContentInfo_SetContent_Data (cmsg, cinfo, NULL, detached) != SECSuccess) { set_nss_error (error, _("Cannot attach CMS data")); goto fail; } signerinfo = NSS_CMSSignerInfo_Create (cmsg, cert, *hash); if (signerinfo == NULL) { set_nss_error (error, _("Cannot create CMS Signer information")); goto fail; } /* we want the cert chain included for this one */ if (NSS_CMSSignerInfo_IncludeCerts (signerinfo, NSSCMSCM_CertChain, certUsageEmailSigner) != SECSuccess) { set_nss_error (error, _("Cannot find certificate chain")); goto fail; } /* SMIME RFC says signing time should always be added */ if (NSS_CMSSignerInfo_AddSigningTime (signerinfo, PR_Now ()) != SECSuccess) { set_nss_error (error, _("Cannot add CMS Signing time")); goto fail; } #if 0 /* this can but needn't be added. not sure what general usage is */ if (NSS_CMSSignerInfo_AddSMIMECaps (signerinfo) != SECSuccess) { fprintf (stderr, "ERROR: cannot add SMIMECaps attribute.\n"); goto loser; } #endif /* Check if we need to send along our return encrypt cert, rfc2633 2.5.3 */ if (p->send_encrypt_key_prefs) { CERTCertificate *enccert = NULL; if (p->encrypt_key) { /* encrypt key has its own nick */ if ((ekpcert = CERT_FindUserCertByUsage ( p->certdb, p->encrypt_key, certUsageEmailRecipient, PR_TRUE, NULL)) == NULL) { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Encryption certificate for '%s' does not exist"), p->encrypt_key); goto fail; } enccert = ekpcert; } else if (CERT_CheckCertUsage (cert, certUsageEmailRecipient) == SECSuccess) { /* encrypt key is signing key */ enccert = cert; } else { /* encrypt key uses same nick */ if ((ekpcert = CERT_FindUserCertByUsage ( p->certdb, (gchar *) nick, certUsageEmailRecipient, PR_TRUE, NULL)) == NULL) { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Encryption certificate for '%s' does not exist"), nick); goto fail; } enccert = ekpcert; } if (NSS_CMSSignerInfo_AddSMIMEEncKeyPrefs (signerinfo, enccert, p->certdb) != SECSuccess) { set_nss_error (error, _("Cannot add SMIMEEncKeyPrefs attribute")); goto fail; } if (NSS_CMSSignerInfo_AddMSSMIMEEncKeyPrefs (signerinfo, enccert, p->certdb) != SECSuccess) { set_nss_error (error, _("Cannot add MS SMIMEEncKeyPrefs attribute")); goto fail; } if (ekpcert != NULL && NSS_CMSSignedData_AddCertificate (sigd, ekpcert) != SECSuccess) { set_nss_error (error, _("Cannot add encryption certificate")); goto fail; } } if (NSS_CMSSignedData_AddSignerInfo (sigd, signerinfo) != SECSuccess) { set_nss_error (error, _("Cannot add CMS Signer information")); goto fail; } if (ekpcert) CERT_DestroyCertificate (ekpcert); if (cert) CERT_DestroyCertificate (cert); return cmsg; fail: if (ekpcert) CERT_DestroyCertificate (ekpcert); if (cert) CERT_DestroyCertificate (cert); NSS_CMSMessage_Destroy (cmsg); return NULL; } static const gchar * sm_status_description (NSSCMSVerificationStatus status) { /* could use this but then we can't control i18n? */ /*NSS_CMSUtil_VerificationStatusToString (status));*/ switch (status) { case NSSCMSVS_Unverified: default: /* Translators: A fallback message when couldn't verify an SMIME signature */ return _("Unverified"); case NSSCMSVS_GoodSignature: return _("Good signature"); case NSSCMSVS_BadSignature: return _("Bad signature"); case NSSCMSVS_DigestMismatch: return _("Content tampered with or altered in transit"); case NSSCMSVS_SigningCertNotFound: return _("Signing certificate not found"); case NSSCMSVS_SigningCertNotTrusted: return _("Signing certificate not trusted"); case NSSCMSVS_SignatureAlgorithmUnknown: return _("Signature algorithm unknown"); case NSSCMSVS_SignatureAlgorithmUnsupported: return _("Signature algorithm unsupported"); case NSSCMSVS_MalformedSignature: return _("Malformed signature"); case NSSCMSVS_ProcessingError: return _("Processing error"); } } static CamelCipherValidity * sm_verify_cmsg (CamelCipherContext *context, NSSCMSMessage *cmsg, CamelStream *extstream, GCancellable *cancellable, GError **error) { CamelSMIMEContextPrivate *p = ((CamelSMIMEContext *) context)->priv; NSSCMSSignedData *sigd = NULL; #if 0 NSSCMSEnvelopedData *envd; NSSCMSEncryptedData *encd; #endif SECAlgorithmID **digestalgs; NSSCMSDigestContext *digcx; gint count, i, nsigners, j; SECItem **digests; PLArenaPool *poolp = NULL; CamelStream *mem; NSSCMSVerificationStatus status; CamelCipherValidity *valid; GString *description; description = g_string_new (""); valid = camel_cipher_validity_new (); camel_cipher_validity_set_valid (valid, TRUE); status = NSSCMSVS_Unverified; /* NB: this probably needs to go into a decoding routine that can be used for processing * enveloped data too */ count = NSS_CMSMessage_ContentLevelCount (cmsg); for (i = 0; i < count; i++) { NSSCMSContentInfo *cinfo = NSS_CMSMessage_ContentLevel (cmsg, i); SECOidTag typetag = NSS_CMSContentInfo_GetContentTypeTag (cinfo); GByteArray *buffer; gint which_digest; switch (typetag) { case SEC_OID_PKCS7_SIGNED_DATA: sigd = (NSSCMSSignedData *) NSS_CMSContentInfo_GetContent (cinfo); if (sigd == NULL) { set_nss_error (error, _("No signed data in signature")); goto fail; } if (extstream == NULL) { set_nss_error (error, _("Digests missing from enveloped data")); goto fail; } if ((poolp = PORT_NewArena (1024)) == NULL) { set_nss_error (error, g_strerror (ENOMEM)); goto fail; } digestalgs = NSS_CMSSignedData_GetDigestAlgs (sigd); digcx = NSS_CMSDigestContext_StartMultiple (digestalgs); if (digcx == NULL) { set_nss_error (error, _("Cannot calculate digests")); goto fail; } buffer = g_byte_array_new (); mem = camel_stream_mem_new_with_byte_array (buffer); camel_stream_write_to_stream (extstream, mem, cancellable, NULL); NSS_CMSDigestContext_Update (digcx, buffer->data, buffer->len); g_object_unref (mem); if (NSS_CMSDigestContext_FinishMultiple (digcx, poolp, &digests) != SECSuccess) { set_nss_error (error, _("Cannot calculate digests")); goto fail; } for (which_digest = 0; digests[which_digest] != NULL; which_digest++) { SECOidData *digest_alg = SECOID_FindOID (&digestalgs[which_digest]->algorithm); if (digest_alg == NULL) { set_nss_error (error, _("Cannot set message digests")); goto fail; } if (NSS_CMSSignedData_SetDigestValue (sigd, digest_alg->offset, digests[which_digest]) != SECSuccess) { set_nss_error (error, _("Cannot set message digests")); goto fail; } } PORT_FreeArena (poolp, PR_FALSE); poolp = NULL; /* import all certificates present */ if (NSS_CMSSignedData_ImportCerts (sigd, p->certdb, certUsageEmailSigner, PR_TRUE) != SECSuccess) { set_nss_error (error, _("Certificate import failed")); goto fail; } if (NSS_CMSSignedData_ImportCerts (sigd, p->certdb, certUsageEmailRecipient, PR_TRUE) != SECSuccess) { set_nss_error (error, _("Certificate import failed")); goto fail; } /* check for certs-only message */ nsigners = NSS_CMSSignedData_SignerInfoCount (sigd); if (nsigners == 0) { /* already imported certs above, not sure what usage we should use here or if this isn't handled above */ if (NSS_CMSSignedData_VerifyCertsOnly (sigd, p->certdb, certUsageEmailSigner) != SECSuccess) { g_string_printf (description, _("Certificate is the only message, cannot verify certificates")); } else { status = NSSCMSVS_GoodSignature; g_string_printf (description, _("Certificate is the only message, certificates imported and verified")); } } else { if (!NSS_CMSSignedData_HasDigests (sigd)) { set_nss_error (error, _("Cannot find signature digests")); goto fail; } for (j = 0; j < nsigners; j++) { NSSCMSSignerInfo *si; gchar *cn, *em; si = NSS_CMSSignedData_GetSignerInfo (sigd, j); NSS_CMSSignedData_VerifySignerInfo (sigd, j, p->certdb, certUsageEmailSigner); status = NSS_CMSSignerInfo_GetVerificationStatus (si); cn = NSS_CMSSignerInfo_GetSignerCommonName (si); em = NSS_CMSSignerInfo_GetSignerEmailAddress (si); g_string_append_printf ( description, _("Signer: %s <%s>: %s\n"), cn ? cn:"", em ? em:"", sm_status_description (status)); camel_cipher_validity_add_certinfo_ex ( valid, CAMEL_CIPHER_VALIDITY_SIGN, cn, em, smime_cert_data_clone (NSS_CMSSignerInfo_GetSigningCertificate (si, p->certdb)), smime_cert_data_free, smime_cert_data_clone); if (cn) PORT_Free (cn); if (em) PORT_Free (em); if (status != NSSCMSVS_GoodSignature) camel_cipher_validity_set_valid (valid, FALSE); } } break; case SEC_OID_PKCS7_ENVELOPED_DATA: /* FIXME Do something with this? */ /*envd = (NSSCMSEnvelopedData *)NSS_CMSContentInfo_GetContent (cinfo);*/ break; case SEC_OID_PKCS7_ENCRYPTED_DATA: /* FIXME Do something with this? */ /*encd = (NSSCMSEncryptedData *)NSS_CMSContentInfo_GetContent (cinfo);*/ break; case SEC_OID_PKCS7_DATA: break; default: break; } } camel_cipher_validity_set_valid (valid, status == NSSCMSVS_GoodSignature); camel_cipher_validity_set_description (valid, description->str); g_string_free (description, TRUE); return valid; fail: camel_cipher_validity_free (valid); g_string_free (description, TRUE); return NULL; } static const gchar * smime_context_hash_to_id (CamelCipherContext *context, CamelCipherHash hash) { switch (hash) { /* Support registered IANA hash function textual names. * http://www.iana.org/assignments/hash-function-text-names */ case CAMEL_CIPHER_HASH_MD5: return "md5"; case CAMEL_CIPHER_HASH_SHA1: case CAMEL_CIPHER_HASH_DEFAULT: return "sha-1"; case CAMEL_CIPHER_HASH_SHA256: return "sha-256"; case CAMEL_CIPHER_HASH_SHA384: return "sha-384"; case CAMEL_CIPHER_HASH_SHA512: return "sha-512"; default: return NULL; } } static CamelCipherHash smime_context_id_to_hash (CamelCipherContext *context, const gchar *id) { if (id != NULL) { /* Support registered IANA hash function textual names. * http://www.iana.org/assignments/hash-function-text-names */ if (g_str_equal (id, "md5")) return CAMEL_CIPHER_HASH_MD5; if (g_str_equal (id, "sha-1")) return CAMEL_CIPHER_HASH_SHA1; if (g_str_equal (id, "sha-256")) return CAMEL_CIPHER_HASH_SHA256; if (g_str_equal (id, "sha-384")) return CAMEL_CIPHER_HASH_SHA384; if (g_str_equal (id, "sha-512")) return CAMEL_CIPHER_HASH_SHA512; /* Non-standard names. */ if (g_str_equal (id, "sha1")) return CAMEL_CIPHER_HASH_SHA1; if (g_str_equal (id, "sha256")) return CAMEL_CIPHER_HASH_SHA256; if (g_str_equal (id, "sha384")) return CAMEL_CIPHER_HASH_SHA384; if (g_str_equal (id, "sha512")) return CAMEL_CIPHER_HASH_SHA512; } return CAMEL_CIPHER_HASH_DEFAULT; } static CamelCipherHash get_hash_from_oid (SECOidTag oidTag) { switch (oidTag) { case SEC_OID_SHA1: return CAMEL_CIPHER_HASH_SHA1; case SEC_OID_SHA256: return CAMEL_CIPHER_HASH_SHA256; case SEC_OID_SHA384: return CAMEL_CIPHER_HASH_SHA384; case SEC_OID_SHA512: return CAMEL_CIPHER_HASH_SHA512; case SEC_OID_MD5: return CAMEL_CIPHER_HASH_MD5; default: break; } return CAMEL_CIPHER_HASH_DEFAULT; } static gboolean smime_context_sign_sync (CamelCipherContext *context, const gchar *userid, CamelCipherHash hash, CamelMimePart *ipart, CamelMimePart *opart, GCancellable *cancellable, GError **error) { CamelCipherContextClass *class; NSSCMSMessage *cmsg; CamelStream *ostream, *istream; GByteArray *buffer; SECOidTag sechash; NSSCMSEncoderContext *enc; CamelDataWrapper *dw; CamelContentType *ct; gboolean success = FALSE; class = CAMEL_CIPHER_CONTEXT_GET_CLASS (context); switch (hash) { case CAMEL_CIPHER_HASH_DEFAULT: default: sechash = SEC_OID_UNKNOWN; break; case CAMEL_CIPHER_HASH_SHA1: sechash = SEC_OID_SHA1; break; case CAMEL_CIPHER_HASH_SHA256: sechash = SEC_OID_SHA256; break; case CAMEL_CIPHER_HASH_SHA384: sechash = SEC_OID_SHA384; break; case CAMEL_CIPHER_HASH_SHA512: sechash = SEC_OID_SHA512; break; case CAMEL_CIPHER_HASH_MD5: sechash = SEC_OID_MD5; break; } cmsg = sm_signing_cmsmessage ( (CamelSMIMEContext *) context, userid, &sechash, ((CamelSMIMEContext *) context)->priv->sign_mode == CAMEL_SMIME_SIGN_CLEARSIGN, error); if (cmsg == NULL) return FALSE; ostream = camel_stream_mem_new (); /* FIXME: stream this, we stream output at least */ buffer = g_byte_array_new (); istream = camel_stream_mem_new_with_byte_array (buffer); if (camel_cipher_canonical_to_stream ( ipart, CAMEL_MIME_FILTER_CANON_STRIP | CAMEL_MIME_FILTER_CANON_CRLF | CAMEL_MIME_FILTER_CANON_FROM, istream, cancellable, error) == -1) { g_prefix_error ( error, _("Could not generate signing data: ")); goto fail; } enc = NSS_CMSEncoder_Start ( cmsg, sm_write_stream, ostream, /* DER output callback */ NULL, NULL, /* destination storage */ NULL, NULL, /* password callback */ NULL, NULL, /* decrypt key callback */ NULL, NULL ); /* detached digests */ if (!enc) { set_nss_error (error, _("Cannot create encoder context")); goto fail; } if (NSS_CMSEncoder_Update (enc, (gchar *) buffer->data, buffer->len) != SECSuccess) { NSS_CMSEncoder_Cancel (enc); set_nss_error (error, _("Failed to add data to CMS encoder")); goto fail; } if (NSS_CMSEncoder_Finish (enc) != SECSuccess) { set_nss_error (error, _("Failed to encode data")); goto fail; } success = TRUE; dw = camel_data_wrapper_new (); g_seekable_seek (G_SEEKABLE (ostream), 0, G_SEEK_SET, NULL, NULL); camel_data_wrapper_construct_from_stream_sync ( dw, ostream, cancellable, NULL); dw->encoding = CAMEL_TRANSFER_ENCODING_BINARY; if (((CamelSMIMEContext *) context)->priv->sign_mode == CAMEL_SMIME_SIGN_CLEARSIGN) { CamelMultipartSigned *mps; CamelMimePart *sigpart; sigpart = camel_mime_part_new (); ct = camel_content_type_new ("application", "x-pkcs7-signature"); camel_content_type_set_param (ct, "name", "smime.p7s"); camel_data_wrapper_set_mime_type_field (dw, ct); camel_content_type_unref (ct); camel_medium_set_content ((CamelMedium *) sigpart, dw); camel_mime_part_set_filename (sigpart, "smime.p7s"); camel_mime_part_set_disposition (sigpart, "attachment"); camel_mime_part_set_encoding (sigpart, CAMEL_TRANSFER_ENCODING_BASE64); mps = camel_multipart_signed_new (); ct = camel_content_type_new ("multipart", "signed"); camel_content_type_set_param (ct, "micalg", camel_cipher_context_hash_to_id (context, get_hash_from_oid (sechash))); camel_content_type_set_param (ct, "protocol", class->sign_protocol); camel_data_wrapper_set_mime_type_field ((CamelDataWrapper *) mps, ct); camel_content_type_unref (ct); camel_multipart_set_boundary ((CamelMultipart *) mps, NULL); camel_multipart_signed_set_signature (mps, sigpart); camel_multipart_signed_set_content_stream (mps, istream); g_object_unref (sigpart); g_seekable_seek ( G_SEEKABLE (istream), 0, G_SEEK_SET, NULL, NULL); camel_medium_set_content ((CamelMedium *) opart, (CamelDataWrapper *) mps); } else { ct = camel_content_type_new ("application", "x-pkcs7-mime"); camel_content_type_set_param (ct, "name", "smime.p7m"); camel_content_type_set_param (ct, "smime-type", "signed-data"); camel_data_wrapper_set_mime_type_field (dw, ct); camel_content_type_unref (ct); camel_medium_set_content ((CamelMedium *) opart, dw); camel_mime_part_set_filename (opart, "smime.p7m"); camel_mime_part_set_description (opart, "S/MIME Signed Message"); camel_mime_part_set_disposition (opart, "attachment"); camel_mime_part_set_encoding (opart, CAMEL_TRANSFER_ENCODING_BASE64); } g_object_unref (dw); fail: g_object_unref (ostream); g_object_unref (istream); return success; } static CamelCipherValidity * smime_context_verify_sync (CamelCipherContext *context, CamelMimePart *ipart, GCancellable *cancellable, GError **error) { CamelCipherContextClass *class; NSSCMSDecoderContext *dec; NSSCMSMessage *cmsg; CamelStream *mem; CamelStream *constream = NULL; CamelCipherValidity *valid = NULL; CamelContentType *ct; const gchar *tmp; CamelMimePart *sigpart; CamelDataWrapper *dw; GByteArray *buffer; class = CAMEL_CIPHER_CONTEXT_GET_CLASS (context); dw = camel_medium_get_content ((CamelMedium *) ipart); ct = dw->mime_type; /* FIXME: we should stream this to the decoder */ buffer = g_byte_array_new (); mem = camel_stream_mem_new_with_byte_array (buffer); if (camel_content_type_is (ct, "multipart", "signed")) { CamelMultipart *mps = (CamelMultipart *) dw; tmp = camel_content_type_param (ct, "protocol"); if (!CAMEL_IS_MULTIPART_SIGNED (mps) || tmp == NULL || (g_ascii_strcasecmp (tmp, class->sign_protocol) != 0 && g_ascii_strcasecmp (tmp, "application/pkcs7-signature") != 0)) { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Cannot verify message signature: " "Incorrect message format")); goto fail; } constream = camel_multipart_signed_get_content_stream ( (CamelMultipartSigned *) mps, error); if (constream == NULL) goto fail; sigpart = camel_multipart_get_part (mps, CAMEL_MULTIPART_SIGNED_SIGNATURE); if (sigpart == NULL) { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Cannot verify message signature: " "Incorrect message format")); goto fail; } } else if (camel_content_type_is (ct, "application", "x-pkcs7-mime")) { sigpart = ipart; } else { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Cannot verify message signature: " "Incorrect message format")); goto fail; } dec = NSS_CMSDecoder_Start ( NULL, NULL, NULL, /* content callback */ NULL, NULL, /* password callback */ NULL, NULL); /* decrypt key callback */ camel_data_wrapper_decode_to_stream_sync ( camel_medium_get_content ( CAMEL_MEDIUM (sigpart)), mem, cancellable, NULL); if (NSS_CMSDecoder_Update (dec, (gchar *) buffer->data, buffer->len) != SECSuccess) { g_warning ("%s: Failed to call NSS_CMSDecoder_Update", G_STRFUNC); } cmsg = NSS_CMSDecoder_Finish (dec); if (cmsg == NULL) { set_nss_error (error, _("Decoder failed")); goto fail; } valid = sm_verify_cmsg (context, cmsg, constream, cancellable, error); NSS_CMSMessage_Destroy (cmsg); fail: g_object_unref (mem); if (constream) g_object_unref (constream); return valid; } static gboolean smime_context_encrypt_sync (CamelCipherContext *context, const gchar *userid, GPtrArray *recipients, CamelMimePart *ipart, CamelMimePart *opart, GCancellable *cancellable, GError **error) { CamelSMIMEContextPrivate *p = ((CamelSMIMEContext *) context)->priv; /*NSSCMSRecipientInfo **recipient_infos;*/ CERTCertificate **recipient_certs = NULL; NSSCMSContentInfo *cinfo; PK11SymKey *bulkkey = NULL; SECOidTag bulkalgtag; gint bulkkeysize, i; CK_MECHANISM_TYPE type; PK11SlotInfo *slot; PLArenaPool *poolp; NSSCMSMessage *cmsg = NULL; NSSCMSEnvelopedData *envd; NSSCMSEncoderContext *enc = NULL; CamelStream *mem; CamelStream *ostream = NULL; CamelDataWrapper *dw; CamelContentType *ct; GByteArray *buffer; poolp = PORT_NewArena (1024); if (poolp == NULL) { set_nss_error (error, g_strerror (ENOMEM)); return FALSE; } /* Lookup all recipients certs, for later working */ recipient_certs = (CERTCertificate **) PORT_ArenaZAlloc (poolp, sizeof (recipient_certs[0]) * (recipients->len + 1)); if (recipient_certs == NULL) { set_nss_error (error, g_strerror (ENOMEM)); goto fail; } for (i = 0; i < recipients->len; i++) { recipient_certs[i] = CERT_FindCertByNicknameOrEmailAddr (p->certdb, recipients->pdata[i]); if (recipient_certs[i] == NULL) { g_set_error ( error, CAMEL_ERROR, CAMEL_ERROR_GENERIC, _("Cannot find certificate for '%s'"), (gchar *) recipients->pdata[i]); goto fail; } } /* Find a common algorithm, probably 3DES anyway ... */ if (NSS_SMIMEUtil_FindBulkAlgForRecipients (recipient_certs, &bulkalgtag, &bulkkeysize) != SECSuccess) { set_nss_error (error, _("Cannot find common bulk encryption algorithm")); goto fail; } /* Generate a new bulk key based on the common algorithm - expensive */ type = PK11_AlgtagToMechanism (bulkalgtag); slot = PK11_GetBestSlot (type, context); if (slot == NULL) { set_nss_error (error, _("Cannot allocate slot for encryption bulk key")); goto fail; } bulkkey = PK11_KeyGen (slot, type, NULL, bulkkeysize / 8, context); PK11_FreeSlot (slot); /* Now we can start building the message */ /* msg->envelopedData->data */ cmsg = NSS_CMSMessage_Create (NULL); if (cmsg == NULL) { set_nss_error (error, _("Cannot create CMS Message")); goto fail; } envd = NSS_CMSEnvelopedData_Create (cmsg, bulkalgtag, bulkkeysize); if (envd == NULL) { set_nss_error (error, _("Cannot create CMS Enveloped data")); goto fail; } cinfo = NSS_CMSMessage_GetContentInfo (cmsg); if (NSS_CMSContentInfo_SetContent_EnvelopedData (cmsg, cinfo, envd) != SECSuccess) { set_nss_error (error, _("Cannot attach CMS Enveloped data")); goto fail; } cinfo = NSS_CMSEnvelopedData_GetContentInfo (envd); if (NSS_CMSContentInfo_SetContent_Data (cmsg, cinfo, NULL, PR_FALSE) != SECSuccess) { set_nss_error (error, _("Cannot attach CMS data object")); goto fail; } /* add recipient certs */ for (i = 0; recipient_certs[i]; i++) { NSSCMSRecipientInfo *ri = NSS_CMSRecipientInfo_Create (cmsg, recipient_certs[i]); if (ri == NULL) { set_nss_error (error, _("Cannot create CMS Recipient information")); goto fail; } if (NSS_CMSEnvelopedData_AddRecipient (envd, ri) != SECSuccess) { set_nss_error (error, _("Cannot add CMS Recipient information")); goto fail; } } /* dump it out */ ostream = camel_stream_mem_new (); enc = NSS_CMSEncoder_Start ( cmsg, sm_write_stream, ostream, NULL, NULL, NULL, NULL, sm_decrypt_key, bulkkey, NULL, NULL); if (enc == NULL) { set_nss_error (error, _("Cannot create encoder context")); goto fail; } /* FIXME: Stream the input */ buffer = g_byte_array_new (); mem = camel_stream_mem_new_with_byte_array (buffer); camel_cipher_canonical_to_stream (ipart, CAMEL_MIME_FILTER_CANON_CRLF, mem, NULL, NULL); if (NSS_CMSEncoder_Update (enc, (gchar *) buffer->data, buffer->len) != SECSuccess) { NSS_CMSEncoder_Cancel (enc); g_object_unref (mem); set_nss_error (error, _("Failed to add data to encoder")); goto fail; } g_object_unref (mem); if (NSS_CMSEncoder_Finish (enc) != SECSuccess) { set_nss_error (error, _("Failed to encode data")); goto fail; } PK11_FreeSymKey (bulkkey); NSS_CMSMessage_Destroy (cmsg); for (i = 0; recipient_certs[i]; i++) CERT_DestroyCertificate (recipient_certs[i]); PORT_FreeArena (poolp, PR_FALSE); dw = camel_data_wrapper_new (); camel_data_wrapper_construct_from_stream_sync ( dw, ostream, NULL, NULL); g_object_unref (ostream); dw->encoding = CAMEL_TRANSFER_ENCODING_BINARY; ct = camel_content_type_new ("application", "x-pkcs7-mime"); camel_content_type_set_param (ct, "name", "smime.p7m"); camel_content_type_set_param (ct, "smime-type", "enveloped-data"); camel_data_wrapper_set_mime_type_field (dw, ct); camel_content_type_unref (ct); camel_medium_set_content ((CamelMedium *) opart, dw); g_object_unref (dw); camel_mime_part_set_disposition (opart, "attachment"); camel_mime_part_set_filename (opart, "smime.p7m"); camel_mime_part_set_description (opart, "S/MIME Encrypted Message"); camel_mime_part_set_encoding (opart, CAMEL_TRANSFER_ENCODING_BASE64); return TRUE; fail: if (ostream) g_object_unref (ostream); if (cmsg) NSS_CMSMessage_Destroy (cmsg); if (bulkkey) PK11_FreeSymKey (bulkkey); if (recipient_certs) { for (i = 0; recipient_certs[i]; i++) CERT_DestroyCertificate (recipient_certs[i]); } PORT_FreeArena (poolp, PR_FALSE); return FALSE; } static CamelCipherValidity * smime_context_decrypt_sync (CamelCipherContext *context, CamelMimePart *ipart, CamelMimePart *opart, GCancellable *cancellable, GError **error) { NSSCMSDecoderContext *dec; NSSCMSMessage *cmsg; CamelStream *istream; CamelStream *ostream; CamelCipherValidity *valid = NULL; GByteArray *buffer; /* FIXME: This assumes the content is only encrypted. Perhaps its ok for * this api to do this ... */ ostream = camel_stream_mem_new (); camel_stream_mem_set_secure (CAMEL_STREAM_MEM (ostream)); /* FIXME: stream this to the decoder incrementally */ buffer = g_byte_array_new (); istream = camel_stream_mem_new_with_byte_array (buffer); if (!camel_data_wrapper_decode_to_stream_sync ( camel_medium_get_content (CAMEL_MEDIUM (ipart)), istream, cancellable, error)) { g_object_unref (istream); goto fail; } g_seekable_seek (G_SEEKABLE (istream), 0, G_SEEK_SET, NULL, NULL); dec = NSS_CMSDecoder_Start ( NULL, sm_write_stream, ostream, /* content callback */ NULL, NULL, NULL, NULL); /* decrypt key callback */ if (NSS_CMSDecoder_Update (dec, (gchar *) buffer->data, buffer->len) != SECSuccess) { cmsg = NULL; } else { cmsg = NSS_CMSDecoder_Finish (dec); } g_object_unref (istream); if (cmsg == NULL) { set_nss_error (error, _("Decoder failed")); goto fail; } #if 0 /* not sure if we really care about this? */ if (!NSS_CMSMessage_IsEncrypted (cmsg)) { set_nss_error (ex, _("S/MIME Decrypt: No encrypted content found")); NSS_CMSMessage_Destroy (cmsg); goto fail; } #endif g_seekable_seek (G_SEEKABLE (ostream), 0, G_SEEK_SET, NULL, NULL); camel_data_wrapper_construct_from_stream_sync ( CAMEL_DATA_WRAPPER (opart), ostream, NULL, NULL); if (NSS_CMSMessage_IsSigned (cmsg)) { g_seekable_seek ( G_SEEKABLE (ostream), 0, G_SEEK_SET, NULL, NULL); valid = sm_verify_cmsg ( context, cmsg, ostream, cancellable, error); } else { valid = camel_cipher_validity_new (); valid->encrypt.description = g_strdup (_("Encrypted content")); valid->encrypt.status = CAMEL_CIPHER_VALIDITY_ENCRYPT_ENCRYPTED; } NSS_CMSMessage_Destroy (cmsg); fail: g_object_unref (ostream); return valid; } static void camel_smime_context_class_init (CamelSMIMEContextClass *class) { CamelCipherContextClass *cipher_context_class; g_type_class_add_private (class, sizeof (CamelSMIMEContextPrivate)); cipher_context_class = CAMEL_CIPHER_CONTEXT_CLASS (class); cipher_context_class->sign_protocol = "application/x-pkcs7-signature"; cipher_context_class->encrypt_protocol = "application/x-pkcs7-mime"; cipher_context_class->key_protocol = "application/x-pkcs7-signature"; cipher_context_class->hash_to_id = smime_context_hash_to_id; cipher_context_class->id_to_hash = smime_context_id_to_hash; cipher_context_class->sign_sync = smime_context_sign_sync; cipher_context_class->verify_sync = smime_context_verify_sync; cipher_context_class->encrypt_sync = smime_context_encrypt_sync; cipher_context_class->decrypt_sync = smime_context_decrypt_sync; } static void camel_smime_context_init (CamelSMIMEContext *smime_context) { smime_context->priv = CAMEL_SMIME_CONTEXT_GET_PRIVATE (smime_context); smime_context->priv->certdb = CERT_GetDefaultCertDB (); smime_context->priv->sign_mode = CAMEL_SMIME_SIGN_CLEARSIGN; smime_context->priv->password_tries = 0; } /** * camel_smime_context_new: * @session: session * * Creates a new sm cipher context object. * * Returns: a new sm cipher context object. **/ CamelCipherContext * camel_smime_context_new (CamelSession *session) { g_return_val_if_fail (CAMEL_IS_SESSION (session), NULL); return g_object_new ( CAMEL_TYPE_SMIME_CONTEXT, "session", session, NULL); } void camel_smime_context_set_encrypt_key (CamelSMIMEContext *context, gboolean use, const gchar *key) { context->priv->send_encrypt_key_prefs = use; g_free (context->priv->encrypt_key); context->priv->encrypt_key = g_strdup (key); } /* set signing mode, clearsigned multipart/signed or enveloped */ void camel_smime_context_set_sign_mode (CamelSMIMEContext *context, camel_smime_sign_t type) { context->priv->sign_mode = type; } /* TODO: This is suboptimal, but the only other solution is to pass around NSSCMSMessages */ guint32 camel_smime_context_describe_part (CamelSMIMEContext *context, CamelMimePart *part) { CamelCipherContextClass *class; guint32 flags = 0; CamelContentType *ct; const gchar *tmp; if (!part) return flags; class = CAMEL_CIPHER_CONTEXT_GET_CLASS (context); ct = camel_mime_part_get_content_type (part); if (camel_content_type_is (ct, "multipart", "signed")) { tmp = camel_content_type_param (ct, "protocol"); if (tmp && (g_ascii_strcasecmp (tmp, class->sign_protocol) == 0 || g_ascii_strcasecmp (tmp, "application/pkcs7-signature") == 0)) flags = CAMEL_SMIME_SIGNED; } else if (camel_content_type_is (ct, "application", "x-pkcs7-mime")) { CamelStream *istream; NSSCMSMessage *cmsg; NSSCMSDecoderContext *dec; GByteArray *buffer; /* FIXME: stream this to the decoder incrementally */ buffer = g_byte_array_new (); istream = camel_stream_mem_new_with_byte_array (buffer); /* FIXME Pass a GCancellable and GError here. */ camel_data_wrapper_decode_to_stream_sync ( camel_medium_get_content ((CamelMedium *) part), istream, NULL, NULL); g_seekable_seek ( G_SEEKABLE (istream), 0, G_SEEK_SET, NULL, NULL); dec = NSS_CMSDecoder_Start ( NULL, NULL, NULL, NULL, NULL, /* password callback */ NULL, NULL); /* decrypt key callback */ NSS_CMSDecoder_Update (dec, (gchar *) buffer->data, buffer->len); g_object_unref (istream); cmsg = NSS_CMSDecoder_Finish (dec); if (cmsg) { if (NSS_CMSMessage_IsSigned (cmsg)) { printf ("message is signed\n"); flags |= CAMEL_SMIME_SIGNED; } if (NSS_CMSMessage_IsEncrypted (cmsg)) { printf ("message is encrypted\n"); flags |= CAMEL_SMIME_ENCRYPTED; } #if 0 if (NSS_CMSMessage_ContainsCertsOrCrls (cmsg)) { printf ("message contains certs or crls\n"); flags |= CAMEL_SMIME_CERTS; } #endif NSS_CMSMessage_Destroy (cmsg); } else { printf ("Message could not be parsed\n"); } } return flags; } #endif /* ENABLE_SMIME */