2008-04-08 22:27:10 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2016-06-06 04:43:05 +00:00
|
|
|
CMS_add1_signer, CMS_SignerInfo_sign - add a signer to a CMS_ContentInfo signed data structure
|
2008-04-08 22:27:10 +00:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/cms.h>
|
|
|
|
|
2017-01-20 18:58:49 +00:00
|
|
|
CMS_SignerInfo *CMS_add1_signer(CMS_ContentInfo *cms, X509 *signcert,
|
|
|
|
EVP_PKEY *pkey, const EVP_MD *md,
|
|
|
|
unsigned int flags);
|
2008-04-08 22:27:10 +00:00
|
|
|
|
2008-04-10 23:28:25 +00:00
|
|
|
int CMS_SignerInfo_sign(CMS_SignerInfo *si);
|
2008-04-08 22:27:10 +00:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
2014-09-20 00:00:55 +00:00
|
|
|
CMS_add1_signer() adds a signer with certificate B<signcert> and private
|
2008-04-10 23:28:25 +00:00
|
|
|
key B<pkey> using message digest B<md> to CMS_ContentInfo SignedData
|
2008-04-08 22:27:10 +00:00
|
|
|
structure B<cms>.
|
|
|
|
|
|
|
|
The CMS_ContentInfo structure should be obtained from an initial call to
|
|
|
|
CMS_sign() with the flag B<CMS_PARTIAL> set or in the case or re-signing a
|
2008-04-10 23:28:25 +00:00
|
|
|
valid CMS_ContentInfo SignedData structure.
|
2008-04-08 22:27:10 +00:00
|
|
|
|
|
|
|
If the B<md> parameter is B<NULL> then the default digest for the public
|
|
|
|
key algorithm will be used.
|
|
|
|
|
|
|
|
Unless the B<CMS_REUSE_DIGEST> flag is set the returned CMS_ContentInfo
|
|
|
|
structure is not complete and must be finalized either by streaming (if
|
|
|
|
applicable) or a call to CMS_final().
|
|
|
|
|
|
|
|
The CMS_SignerInfo_sign() function will explicitly sign a CMS_SignerInfo
|
|
|
|
structure, its main use is when B<CMS_REUSE_DIGEST> and B<CMS_PARTIAL> flags
|
|
|
|
are both set.
|
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
2014-09-20 00:00:55 +00:00
|
|
|
The main purpose of CMS_add1_signer() is to provide finer control
|
2008-04-08 22:44:56 +00:00
|
|
|
over a CMS signed data structure where the simpler CMS_sign() function defaults
|
|
|
|
are not appropriate. For example if multiple signers or non default digest
|
2008-04-08 22:27:10 +00:00
|
|
|
algorithms are needed. New attributes can also be added using the returned
|
2008-04-10 10:46:11 +00:00
|
|
|
CMS_SignerInfo structure and the CMS attribute utility functions or the
|
2008-04-09 23:13:49 +00:00
|
|
|
CMS signed receipt request functions.
|
2008-04-08 22:27:10 +00:00
|
|
|
|
|
|
|
Any of the following flags (ored together) can be passed in the B<flags>
|
|
|
|
parameter.
|
|
|
|
|
|
|
|
If B<CMS_REUSE_DIGEST> is set then an attempt is made to copy the content
|
2008-04-10 10:46:11 +00:00
|
|
|
digest value from the CMS_ContentInfo structure: to add a signer to an existing
|
2008-04-08 22:27:10 +00:00
|
|
|
structure. An error occurs if a matching digest value cannot be found to copy.
|
|
|
|
The returned CMS_ContentInfo structure will be valid and finalized when this
|
|
|
|
flag is set.
|
|
|
|
|
2016-05-20 12:11:46 +00:00
|
|
|
If B<CMS_PARTIAL> is set in addition to B<CMS_REUSE_DIGEST> then the
|
2008-04-08 22:44:56 +00:00
|
|
|
CMS_SignerInfo structure will not be finalized so additional attributes
|
|
|
|
can be added. In this case an explicit call to CMS_SignerInfo_sign() is
|
2008-04-08 22:27:10 +00:00
|
|
|
needed to finalize it.
|
|
|
|
|
|
|
|
If B<CMS_NOCERTS> is set the signer's certificate will not be included in the
|
|
|
|
CMS_ContentInfo structure, the signer's certificate must still be supplied in
|
|
|
|
the B<signcert> parameter though. This can reduce the size of the signature if
|
|
|
|
the signers certificate can be obtained by other means: for example a
|
|
|
|
previously signed message.
|
|
|
|
|
2008-04-10 23:28:25 +00:00
|
|
|
The SignedData structure includes several CMS signedAttributes including the
|
2008-04-08 22:27:10 +00:00
|
|
|
signing time, the CMS content type and the supported list of ciphers in an
|
|
|
|
SMIMECapabilities attribute. If B<CMS_NOATTR> is set then no signedAttributes
|
|
|
|
will be used. If B<CMS_NOSMIMECAP> is set then just the SMIMECapabilities are
|
|
|
|
omitted.
|
|
|
|
|
|
|
|
OpenSSL will by default identify signing certificates using issuer name
|
|
|
|
and serial number. If B<CMS_USE_KEYID> is set it will use the subject key
|
|
|
|
identifier value instead. An error occurs if the signing certificate does not
|
|
|
|
have a subject key identifier extension.
|
|
|
|
|
|
|
|
If present the SMIMECapabilities attribute indicates support for the following
|
2008-04-08 22:44:56 +00:00
|
|
|
algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192
|
|
|
|
bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
|
|
|
|
If any of these algorithms is not available then it will not be included: for example the GOST algorithms will not be included if the GOST ENGINE is
|
|
|
|
not loaded.
|
2008-04-08 22:27:10 +00:00
|
|
|
|
2014-09-20 00:00:55 +00:00
|
|
|
CMS_add1_signer() returns an internal pointer to the CMS_SignerInfo
|
2016-05-20 12:11:46 +00:00
|
|
|
structure just added, this can be used to set additional attributes
|
2008-04-08 22:27:10 +00:00
|
|
|
before it is finalized.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2014-09-20 00:00:55 +00:00
|
|
|
CMS_add1_signer() returns an internal pointer to the CMS_SignerInfo
|
2008-04-08 22:27:10 +00:00
|
|
|
structure just added or NULL if an error occurs.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-17 19:21:33 +00:00
|
|
|
L<ERR_get_error(3)>, L<CMS_sign(3)>,
|
|
|
|
L<CMS_final(3)>,
|
2008-04-08 22:27:10 +00:00
|
|
|
|
2016-05-18 15:44:05 +00:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
|
|
|
Copyright 2014-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
|
|
|
|
|
|
Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|