openssl-custom 2.2.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. checksums.yaml +7 -0
  2. data/BSDL +22 -0
  3. data/CONTRIBUTING.md +132 -0
  4. data/History.md +485 -0
  5. data/LICENSE.txt +56 -0
  6. data/README.md +66 -0
  7. data/ext/openssl/extconf.rb +190 -0
  8. data/ext/openssl/openssl_missing.c +106 -0
  9. data/ext/openssl/openssl_missing.h +257 -0
  10. data/ext/openssl/ossl.c +1282 -0
  11. data/ext/openssl/ossl.h +181 -0
  12. data/ext/openssl/ossl_asn1.c +1878 -0
  13. data/ext/openssl/ossl_asn1.h +62 -0
  14. data/ext/openssl/ossl_bio.c +42 -0
  15. data/ext/openssl/ossl_bio.h +16 -0
  16. data/ext/openssl/ossl_bn.c +1270 -0
  17. data/ext/openssl/ossl_bn.h +26 -0
  18. data/ext/openssl/ossl_cipher.c +1075 -0
  19. data/ext/openssl/ossl_cipher.h +20 -0
  20. data/ext/openssl/ossl_config.c +89 -0
  21. data/ext/openssl/ossl_config.h +19 -0
  22. data/ext/openssl/ossl_digest.c +425 -0
  23. data/ext/openssl/ossl_digest.h +20 -0
  24. data/ext/openssl/ossl_engine.c +567 -0
  25. data/ext/openssl/ossl_engine.h +19 -0
  26. data/ext/openssl/ossl_hmac.c +389 -0
  27. data/ext/openssl/ossl_hmac.h +18 -0
  28. data/ext/openssl/ossl_kdf.c +303 -0
  29. data/ext/openssl/ossl_kdf.h +6 -0
  30. data/ext/openssl/ossl_ns_spki.c +405 -0
  31. data/ext/openssl/ossl_ns_spki.h +19 -0
  32. data/ext/openssl/ossl_ocsp.c +2013 -0
  33. data/ext/openssl/ossl_ocsp.h +23 -0
  34. data/ext/openssl/ossl_pkcs12.c +257 -0
  35. data/ext/openssl/ossl_pkcs12.h +13 -0
  36. data/ext/openssl/ossl_pkcs7.c +1098 -0
  37. data/ext/openssl/ossl_pkcs7.h +36 -0
  38. data/ext/openssl/ossl_pkey.c +673 -0
  39. data/ext/openssl/ossl_pkey.h +241 -0
  40. data/ext/openssl/ossl_pkey_dh.c +650 -0
  41. data/ext/openssl/ossl_pkey_dsa.c +664 -0
  42. data/ext/openssl/ossl_pkey_ec.c +1827 -0
  43. data/ext/openssl/ossl_pkey_rsa.c +966 -0
  44. data/ext/openssl/ossl_rand.c +200 -0
  45. data/ext/openssl/ossl_rand.h +18 -0
  46. data/ext/openssl/ossl_ssl.c +3080 -0
  47. data/ext/openssl/ossl_ssl.h +36 -0
  48. data/ext/openssl/ossl_ssl_session.c +332 -0
  49. data/ext/openssl/ossl_ts.c +1524 -0
  50. data/ext/openssl/ossl_ts.h +16 -0
  51. data/ext/openssl/ossl_x509.c +262 -0
  52. data/ext/openssl/ossl_x509.h +115 -0
  53. data/ext/openssl/ossl_x509attr.c +324 -0
  54. data/ext/openssl/ossl_x509cert.c +846 -0
  55. data/ext/openssl/ossl_x509crl.c +542 -0
  56. data/ext/openssl/ossl_x509ext.c +491 -0
  57. data/ext/openssl/ossl_x509name.c +590 -0
  58. data/ext/openssl/ossl_x509req.c +441 -0
  59. data/ext/openssl/ossl_x509revoked.c +300 -0
  60. data/ext/openssl/ossl_x509store.c +902 -0
  61. data/ext/openssl/ruby_missing.h +24 -0
  62. data/lib/openssl/bn.rb +40 -0
  63. data/lib/openssl/buffering.rb +478 -0
  64. data/lib/openssl/cipher.rb +67 -0
  65. data/lib/openssl/config.rb +501 -0
  66. data/lib/openssl/digest.rb +73 -0
  67. data/lib/openssl/hmac.rb +13 -0
  68. data/lib/openssl/marshal.rb +30 -0
  69. data/lib/openssl/pkcs5.rb +22 -0
  70. data/lib/openssl/pkey.rb +42 -0
  71. data/lib/openssl/ssl.rb +542 -0
  72. data/lib/openssl/version.rb +5 -0
  73. data/lib/openssl/x509.rb +369 -0
  74. data/lib/openssl.rb +38 -0
  75. metadata +196 -0
@@ -0,0 +1,1098 @@
1
+ /*
2
+ * 'OpenSSL for Ruby' project
3
+ * Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
4
+ * All rights reserved.
5
+ */
6
+ /*
7
+ * This program is licensed under the same licence as Ruby.
8
+ * (See the file 'LICENCE'.)
9
+ */
10
+ #include "ossl.h"
11
+
12
+ #define NewPKCS7si(klass) \
13
+ TypedData_Wrap_Struct((klass), &ossl_pkcs7_signer_info_type, 0)
14
+ #define SetPKCS7si(obj, p7si) do { \
15
+ if (!(p7si)) { \
16
+ ossl_raise(rb_eRuntimeError, "PKCS7si wasn't initialized."); \
17
+ } \
18
+ RTYPEDDATA_DATA(obj) = (p7si); \
19
+ } while (0)
20
+ #define GetPKCS7si(obj, p7si) do { \
21
+ TypedData_Get_Struct((obj), PKCS7_SIGNER_INFO, &ossl_pkcs7_signer_info_type, (p7si)); \
22
+ if (!(p7si)) { \
23
+ ossl_raise(rb_eRuntimeError, "PKCS7si wasn't initialized."); \
24
+ } \
25
+ } while (0)
26
+
27
+ #define NewPKCS7ri(klass) \
28
+ TypedData_Wrap_Struct((klass), &ossl_pkcs7_recip_info_type, 0)
29
+ #define SetPKCS7ri(obj, p7ri) do { \
30
+ if (!(p7ri)) { \
31
+ ossl_raise(rb_eRuntimeError, "PKCS7ri wasn't initialized."); \
32
+ } \
33
+ RTYPEDDATA_DATA(obj) = (p7ri); \
34
+ } while (0)
35
+ #define GetPKCS7ri(obj, p7ri) do { \
36
+ TypedData_Get_Struct((obj), PKCS7_RECIP_INFO, &ossl_pkcs7_recip_info_type, (p7ri)); \
37
+ if (!(p7ri)) { \
38
+ ossl_raise(rb_eRuntimeError, "PKCS7ri wasn't initialized."); \
39
+ } \
40
+ } while (0)
41
+
42
+ #define numberof(ary) (int)(sizeof(ary)/sizeof((ary)[0]))
43
+
44
+ #define ossl_pkcs7_set_data(o,v) rb_iv_set((o), "@data", (v))
45
+ #define ossl_pkcs7_get_data(o) rb_iv_get((o), "@data")
46
+ #define ossl_pkcs7_set_err_string(o,v) rb_iv_set((o), "@error_string", (v))
47
+ #define ossl_pkcs7_get_err_string(o) rb_iv_get((o), "@error_string")
48
+
49
+ /*
50
+ * Classes
51
+ */
52
+ VALUE cPKCS7;
53
+ VALUE cPKCS7Signer;
54
+ VALUE cPKCS7Recipient;
55
+ VALUE ePKCS7Error;
56
+
57
+ static void
58
+ ossl_pkcs7_free(void *ptr)
59
+ {
60
+ PKCS7_free(ptr);
61
+ }
62
+
63
+ const rb_data_type_t ossl_pkcs7_type = {
64
+ "OpenSSL/PKCS7",
65
+ {
66
+ 0, ossl_pkcs7_free,
67
+ },
68
+ 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
69
+ };
70
+
71
+ static void
72
+ ossl_pkcs7_signer_info_free(void *ptr)
73
+ {
74
+ PKCS7_SIGNER_INFO_free(ptr);
75
+ }
76
+
77
+ static const rb_data_type_t ossl_pkcs7_signer_info_type = {
78
+ "OpenSSL/PKCS7/SIGNER_INFO",
79
+ {
80
+ 0, ossl_pkcs7_signer_info_free,
81
+ },
82
+ 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
83
+ };
84
+
85
+ static void
86
+ ossl_pkcs7_recip_info_free(void *ptr)
87
+ {
88
+ PKCS7_RECIP_INFO_free(ptr);
89
+ }
90
+
91
+ static const rb_data_type_t ossl_pkcs7_recip_info_type = {
92
+ "OpenSSL/PKCS7/RECIP_INFO",
93
+ {
94
+ 0, ossl_pkcs7_recip_info_free,
95
+ },
96
+ 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
97
+ };
98
+
99
+ /*
100
+ * Public
101
+ * (MADE PRIVATE UNTIL SOMEBODY WILL NEED THEM)
102
+ */
103
+ static PKCS7_SIGNER_INFO *
104
+ ossl_PKCS7_SIGNER_INFO_dup(const PKCS7_SIGNER_INFO *si)
105
+ {
106
+ return (PKCS7_SIGNER_INFO *)ASN1_dup((i2d_of_void *)i2d_PKCS7_SIGNER_INFO,
107
+ (d2i_of_void *)d2i_PKCS7_SIGNER_INFO,
108
+ (char *)si);
109
+ }
110
+
111
+ static PKCS7_RECIP_INFO *
112
+ ossl_PKCS7_RECIP_INFO_dup(const PKCS7_RECIP_INFO *si)
113
+ {
114
+ return (PKCS7_RECIP_INFO *)ASN1_dup((i2d_of_void *)i2d_PKCS7_RECIP_INFO,
115
+ (d2i_of_void *)d2i_PKCS7_RECIP_INFO,
116
+ (char *)si);
117
+ }
118
+
119
+ static VALUE
120
+ ossl_pkcs7si_new(PKCS7_SIGNER_INFO *p7si)
121
+ {
122
+ PKCS7_SIGNER_INFO *pkcs7;
123
+ VALUE obj;
124
+
125
+ obj = NewPKCS7si(cPKCS7Signer);
126
+ pkcs7 = p7si ? ossl_PKCS7_SIGNER_INFO_dup(p7si) : PKCS7_SIGNER_INFO_new();
127
+ if (!pkcs7) ossl_raise(ePKCS7Error, NULL);
128
+ SetPKCS7si(obj, pkcs7);
129
+
130
+ return obj;
131
+ }
132
+
133
+ static PKCS7_SIGNER_INFO *
134
+ DupPKCS7SignerPtr(VALUE obj)
135
+ {
136
+ PKCS7_SIGNER_INFO *p7si, *pkcs7;
137
+
138
+ GetPKCS7si(obj, p7si);
139
+ if (!(pkcs7 = ossl_PKCS7_SIGNER_INFO_dup(p7si))) {
140
+ ossl_raise(ePKCS7Error, NULL);
141
+ }
142
+
143
+ return pkcs7;
144
+ }
145
+
146
+ static VALUE
147
+ ossl_pkcs7ri_new(PKCS7_RECIP_INFO *p7ri)
148
+ {
149
+ PKCS7_RECIP_INFO *pkcs7;
150
+ VALUE obj;
151
+
152
+ obj = NewPKCS7ri(cPKCS7Recipient);
153
+ pkcs7 = p7ri ? ossl_PKCS7_RECIP_INFO_dup(p7ri) : PKCS7_RECIP_INFO_new();
154
+ if (!pkcs7) ossl_raise(ePKCS7Error, NULL);
155
+ SetPKCS7ri(obj, pkcs7);
156
+
157
+ return obj;
158
+ }
159
+
160
+ static PKCS7_RECIP_INFO *
161
+ DupPKCS7RecipientPtr(VALUE obj)
162
+ {
163
+ PKCS7_RECIP_INFO *p7ri, *pkcs7;
164
+
165
+ GetPKCS7ri(obj, p7ri);
166
+ if (!(pkcs7 = ossl_PKCS7_RECIP_INFO_dup(p7ri))) {
167
+ ossl_raise(ePKCS7Error, NULL);
168
+ }
169
+
170
+ return pkcs7;
171
+ }
172
+
173
+ /*
174
+ * call-seq:
175
+ * PKCS7.read_smime(string) => pkcs7
176
+ */
177
+ static VALUE
178
+ ossl_pkcs7_s_read_smime(VALUE klass, VALUE arg)
179
+ {
180
+ BIO *in, *out;
181
+ PKCS7 *pkcs7;
182
+ VALUE ret, data;
183
+
184
+ ret = NewPKCS7(cPKCS7);
185
+ in = ossl_obj2bio(&arg);
186
+ out = NULL;
187
+ pkcs7 = SMIME_read_PKCS7(in, &out);
188
+ BIO_free(in);
189
+ if(!pkcs7) ossl_raise(ePKCS7Error, NULL);
190
+ data = out ? ossl_membio2str(out) : Qnil;
191
+ SetPKCS7(ret, pkcs7);
192
+ ossl_pkcs7_set_data(ret, data);
193
+ ossl_pkcs7_set_err_string(ret, Qnil);
194
+
195
+ return ret;
196
+ }
197
+
198
+ /*
199
+ * call-seq:
200
+ * PKCS7.write_smime(pkcs7 [, data [, flags]]) => string
201
+ */
202
+ static VALUE
203
+ ossl_pkcs7_s_write_smime(int argc, VALUE *argv, VALUE klass)
204
+ {
205
+ VALUE pkcs7, data, flags;
206
+ BIO *out, *in;
207
+ PKCS7 *p7;
208
+ VALUE str;
209
+ int flg;
210
+
211
+ rb_scan_args(argc, argv, "12", &pkcs7, &data, &flags);
212
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
213
+ if(NIL_P(data)) data = ossl_pkcs7_get_data(pkcs7);
214
+ GetPKCS7(pkcs7, p7);
215
+ if(!NIL_P(data) && PKCS7_is_detached(p7))
216
+ flg |= PKCS7_DETACHED;
217
+ in = NIL_P(data) ? NULL : ossl_obj2bio(&data);
218
+ if(!(out = BIO_new(BIO_s_mem()))){
219
+ BIO_free(in);
220
+ ossl_raise(ePKCS7Error, NULL);
221
+ }
222
+ if(!SMIME_write_PKCS7(out, p7, in, flg)){
223
+ BIO_free(out);
224
+ BIO_free(in);
225
+ ossl_raise(ePKCS7Error, NULL);
226
+ }
227
+ BIO_free(in);
228
+ str = ossl_membio2str(out);
229
+
230
+ return str;
231
+ }
232
+
233
+ /*
234
+ * call-seq:
235
+ * PKCS7.sign(cert, key, data, [, certs [, flags]]) => pkcs7
236
+ */
237
+ static VALUE
238
+ ossl_pkcs7_s_sign(int argc, VALUE *argv, VALUE klass)
239
+ {
240
+ VALUE cert, key, data, certs, flags;
241
+ X509 *x509;
242
+ EVP_PKEY *pkey;
243
+ BIO *in;
244
+ STACK_OF(X509) *x509s;
245
+ int flg, status = 0;
246
+ PKCS7 *pkcs7;
247
+ VALUE ret;
248
+
249
+ rb_scan_args(argc, argv, "32", &cert, &key, &data, &certs, &flags);
250
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
251
+ pkey = GetPrivPKeyPtr(key); /* NO NEED TO DUP */
252
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
253
+ ret = NewPKCS7(cPKCS7);
254
+ in = ossl_obj2bio(&data);
255
+ if(NIL_P(certs)) x509s = NULL;
256
+ else{
257
+ x509s = ossl_protect_x509_ary2sk(certs, &status);
258
+ if(status){
259
+ BIO_free(in);
260
+ rb_jump_tag(status);
261
+ }
262
+ }
263
+ if(!(pkcs7 = PKCS7_sign(x509, pkey, x509s, in, flg))){
264
+ BIO_free(in);
265
+ sk_X509_pop_free(x509s, X509_free);
266
+ ossl_raise(ePKCS7Error, NULL);
267
+ }
268
+ SetPKCS7(ret, pkcs7);
269
+ ossl_pkcs7_set_data(ret, data);
270
+ ossl_pkcs7_set_err_string(ret, Qnil);
271
+ BIO_free(in);
272
+ sk_X509_pop_free(x509s, X509_free);
273
+
274
+ return ret;
275
+ }
276
+
277
+ /*
278
+ * call-seq:
279
+ * PKCS7.encrypt(certs, data, [, cipher [, flags]]) => pkcs7
280
+ */
281
+ static VALUE
282
+ ossl_pkcs7_s_encrypt(int argc, VALUE *argv, VALUE klass)
283
+ {
284
+ VALUE certs, data, cipher, flags;
285
+ STACK_OF(X509) *x509s;
286
+ BIO *in;
287
+ const EVP_CIPHER *ciph;
288
+ int flg, status = 0;
289
+ VALUE ret;
290
+ PKCS7 *p7;
291
+
292
+ rb_scan_args(argc, argv, "22", &certs, &data, &cipher, &flags);
293
+ if(NIL_P(cipher)){
294
+ #if !defined(OPENSSL_NO_RC2)
295
+ ciph = EVP_rc2_40_cbc();
296
+ #elif !defined(OPENSSL_NO_DES)
297
+ ciph = EVP_des_ede3_cbc();
298
+ #elif !defined(OPENSSL_NO_RC2)
299
+ ciph = EVP_rc2_40_cbc();
300
+ #elif !defined(OPENSSL_NO_AES)
301
+ ciph = EVP_EVP_aes_128_cbc();
302
+ #else
303
+ ossl_raise(ePKCS7Error, "Must specify cipher");
304
+ #endif
305
+
306
+ }
307
+ else ciph = ossl_evp_get_cipherbyname(cipher);
308
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
309
+ ret = NewPKCS7(cPKCS7);
310
+ in = ossl_obj2bio(&data);
311
+ x509s = ossl_protect_x509_ary2sk(certs, &status);
312
+ if(status){
313
+ BIO_free(in);
314
+ rb_jump_tag(status);
315
+ }
316
+ if(!(p7 = PKCS7_encrypt(x509s, in, (EVP_CIPHER*)ciph, flg))){
317
+ BIO_free(in);
318
+ sk_X509_pop_free(x509s, X509_free);
319
+ ossl_raise(ePKCS7Error, NULL);
320
+ }
321
+ BIO_free(in);
322
+ SetPKCS7(ret, p7);
323
+ ossl_pkcs7_set_data(ret, data);
324
+ sk_X509_pop_free(x509s, X509_free);
325
+
326
+ return ret;
327
+ }
328
+
329
+ static VALUE
330
+ ossl_pkcs7_alloc(VALUE klass)
331
+ {
332
+ PKCS7 *pkcs7;
333
+ VALUE obj;
334
+
335
+ obj = NewPKCS7(klass);
336
+ if (!(pkcs7 = PKCS7_new())) {
337
+ ossl_raise(ePKCS7Error, NULL);
338
+ }
339
+ SetPKCS7(obj, pkcs7);
340
+
341
+ return obj;
342
+ }
343
+
344
+ /*
345
+ * call-seq:
346
+ * PKCS7.new => pkcs7
347
+ * PKCS7.new(string) => pkcs7
348
+ *
349
+ * Many methods in this class aren't documented.
350
+ */
351
+ static VALUE
352
+ ossl_pkcs7_initialize(int argc, VALUE *argv, VALUE self)
353
+ {
354
+ PKCS7 *p7, *pkcs = DATA_PTR(self);
355
+ BIO *in;
356
+ VALUE arg;
357
+
358
+ if(rb_scan_args(argc, argv, "01", &arg) == 0)
359
+ return self;
360
+ arg = ossl_to_der_if_possible(arg);
361
+ in = ossl_obj2bio(&arg);
362
+ p7 = PEM_read_bio_PKCS7(in, &pkcs, NULL, NULL);
363
+ if (!p7) {
364
+ OSSL_BIO_reset(in);
365
+ p7 = d2i_PKCS7_bio(in, &pkcs);
366
+ if (!p7) {
367
+ BIO_free(in);
368
+ PKCS7_free(pkcs);
369
+ DATA_PTR(self) = NULL;
370
+ ossl_raise(rb_eArgError, "Could not parse the PKCS7");
371
+ }
372
+ }
373
+ DATA_PTR(self) = pkcs;
374
+ BIO_free(in);
375
+ ossl_pkcs7_set_data(self, Qnil);
376
+ ossl_pkcs7_set_err_string(self, Qnil);
377
+
378
+ return self;
379
+ }
380
+
381
+ static VALUE
382
+ ossl_pkcs7_copy(VALUE self, VALUE other)
383
+ {
384
+ PKCS7 *a, *b, *pkcs7;
385
+
386
+ rb_check_frozen(self);
387
+ if (self == other) return self;
388
+
389
+ GetPKCS7(self, a);
390
+ GetPKCS7(other, b);
391
+
392
+ pkcs7 = PKCS7_dup(b);
393
+ if (!pkcs7) {
394
+ ossl_raise(ePKCS7Error, NULL);
395
+ }
396
+ DATA_PTR(self) = pkcs7;
397
+ PKCS7_free(a);
398
+
399
+ return self;
400
+ }
401
+
402
+ static int
403
+ ossl_pkcs7_sym2typeid(VALUE sym)
404
+ {
405
+ int i, ret = Qnil;
406
+ const char *s;
407
+ size_t l;
408
+
409
+ static const struct {
410
+ char name[20];
411
+ int nid;
412
+ } p7_type_tab[] = {
413
+ { "signed", NID_pkcs7_signed },
414
+ { "data", NID_pkcs7_data },
415
+ { "signedAndEnveloped", NID_pkcs7_signedAndEnveloped },
416
+ { "enveloped", NID_pkcs7_enveloped },
417
+ { "encrypted", NID_pkcs7_encrypted },
418
+ { "digest", NID_pkcs7_digest },
419
+ };
420
+
421
+ if (SYMBOL_P(sym)) sym = rb_sym2str(sym);
422
+ else StringValue(sym);
423
+ RSTRING_GETMEM(sym, s, l);
424
+
425
+ for(i = 0; ; i++){
426
+ if(i == numberof(p7_type_tab))
427
+ ossl_raise(ePKCS7Error, "unknown type \"%"PRIsVALUE"\"", sym);
428
+ if(strlen(p7_type_tab[i].name) != l) continue;
429
+ if(strcmp(p7_type_tab[i].name, s) == 0){
430
+ ret = p7_type_tab[i].nid;
431
+ break;
432
+ }
433
+ }
434
+
435
+ return ret;
436
+ }
437
+
438
+ /*
439
+ * call-seq:
440
+ * pkcs7.type = type => type
441
+ */
442
+ static VALUE
443
+ ossl_pkcs7_set_type(VALUE self, VALUE type)
444
+ {
445
+ PKCS7 *p7;
446
+
447
+ GetPKCS7(self, p7);
448
+ if(!PKCS7_set_type(p7, ossl_pkcs7_sym2typeid(type)))
449
+ ossl_raise(ePKCS7Error, NULL);
450
+
451
+ return type;
452
+ }
453
+
454
+ /*
455
+ * call-seq:
456
+ * pkcs7.type => string or nil
457
+ */
458
+ static VALUE
459
+ ossl_pkcs7_get_type(VALUE self)
460
+ {
461
+ PKCS7 *p7;
462
+
463
+ GetPKCS7(self, p7);
464
+ if(PKCS7_type_is_signed(p7))
465
+ return ID2SYM(rb_intern("signed"));
466
+ if(PKCS7_type_is_encrypted(p7))
467
+ return ID2SYM(rb_intern("encrypted"));
468
+ if(PKCS7_type_is_enveloped(p7))
469
+ return ID2SYM(rb_intern("enveloped"));
470
+ if(PKCS7_type_is_signedAndEnveloped(p7))
471
+ return ID2SYM(rb_intern("signedAndEnveloped"));
472
+ if(PKCS7_type_is_data(p7))
473
+ return ID2SYM(rb_intern("data"));
474
+ return Qnil;
475
+ }
476
+
477
+ static VALUE
478
+ ossl_pkcs7_set_detached(VALUE self, VALUE flag)
479
+ {
480
+ PKCS7 *p7;
481
+
482
+ GetPKCS7(self, p7);
483
+ if(flag != Qtrue && flag != Qfalse)
484
+ ossl_raise(ePKCS7Error, "must specify a boolean");
485
+ if(!PKCS7_set_detached(p7, flag == Qtrue ? 1 : 0))
486
+ ossl_raise(ePKCS7Error, NULL);
487
+
488
+ return flag;
489
+ }
490
+
491
+ static VALUE
492
+ ossl_pkcs7_get_detached(VALUE self)
493
+ {
494
+ PKCS7 *p7;
495
+ GetPKCS7(self, p7);
496
+ return PKCS7_get_detached(p7) ? Qtrue : Qfalse;
497
+ }
498
+
499
+ static VALUE
500
+ ossl_pkcs7_detached_p(VALUE self)
501
+ {
502
+ PKCS7 *p7;
503
+ GetPKCS7(self, p7);
504
+ return PKCS7_is_detached(p7) ? Qtrue : Qfalse;
505
+ }
506
+
507
+ static VALUE
508
+ ossl_pkcs7_set_cipher(VALUE self, VALUE cipher)
509
+ {
510
+ PKCS7 *pkcs7;
511
+
512
+ GetPKCS7(self, pkcs7);
513
+ if (!PKCS7_set_cipher(pkcs7, ossl_evp_get_cipherbyname(cipher))) {
514
+ ossl_raise(ePKCS7Error, NULL);
515
+ }
516
+
517
+ return cipher;
518
+ }
519
+
520
+ static VALUE
521
+ ossl_pkcs7_add_signer(VALUE self, VALUE signer)
522
+ {
523
+ PKCS7 *pkcs7;
524
+ PKCS7_SIGNER_INFO *p7si;
525
+
526
+ p7si = DupPKCS7SignerPtr(signer); /* NEED TO DUP */
527
+ GetPKCS7(self, pkcs7);
528
+ if (!PKCS7_add_signer(pkcs7, p7si)) {
529
+ PKCS7_SIGNER_INFO_free(p7si);
530
+ ossl_raise(ePKCS7Error, "Could not add signer.");
531
+ }
532
+ if (PKCS7_type_is_signed(pkcs7)){
533
+ PKCS7_add_signed_attribute(p7si, NID_pkcs9_contentType,
534
+ V_ASN1_OBJECT, OBJ_nid2obj(NID_pkcs7_data));
535
+ }
536
+
537
+ return self;
538
+ }
539
+
540
+ static VALUE
541
+ ossl_pkcs7_get_signer(VALUE self)
542
+ {
543
+ PKCS7 *pkcs7;
544
+ STACK_OF(PKCS7_SIGNER_INFO) *sk;
545
+ PKCS7_SIGNER_INFO *si;
546
+ int num, i;
547
+ VALUE ary;
548
+
549
+ GetPKCS7(self, pkcs7);
550
+ if (!(sk = PKCS7_get_signer_info(pkcs7))) {
551
+ OSSL_Debug("OpenSSL::PKCS7#get_signer_info == NULL!");
552
+ return rb_ary_new();
553
+ }
554
+ if ((num = sk_PKCS7_SIGNER_INFO_num(sk)) < 0) {
555
+ ossl_raise(ePKCS7Error, "Negative number of signers!");
556
+ }
557
+ ary = rb_ary_new2(num);
558
+ for (i=0; i<num; i++) {
559
+ si = sk_PKCS7_SIGNER_INFO_value(sk, i);
560
+ rb_ary_push(ary, ossl_pkcs7si_new(si));
561
+ }
562
+
563
+ return ary;
564
+ }
565
+
566
+ static VALUE
567
+ ossl_pkcs7_add_recipient(VALUE self, VALUE recip)
568
+ {
569
+ PKCS7 *pkcs7;
570
+ PKCS7_RECIP_INFO *ri;
571
+
572
+ ri = DupPKCS7RecipientPtr(recip); /* NEED TO DUP */
573
+ GetPKCS7(self, pkcs7);
574
+ if (!PKCS7_add_recipient_info(pkcs7, ri)) {
575
+ PKCS7_RECIP_INFO_free(ri);
576
+ ossl_raise(ePKCS7Error, "Could not add recipient.");
577
+ }
578
+
579
+ return self;
580
+ }
581
+
582
+ static VALUE
583
+ ossl_pkcs7_get_recipient(VALUE self)
584
+ {
585
+ PKCS7 *pkcs7;
586
+ STACK_OF(PKCS7_RECIP_INFO) *sk;
587
+ PKCS7_RECIP_INFO *si;
588
+ int num, i;
589
+ VALUE ary;
590
+
591
+ GetPKCS7(self, pkcs7);
592
+ if (PKCS7_type_is_enveloped(pkcs7))
593
+ sk = pkcs7->d.enveloped->recipientinfo;
594
+ else if (PKCS7_type_is_signedAndEnveloped(pkcs7))
595
+ sk = pkcs7->d.signed_and_enveloped->recipientinfo;
596
+ else sk = NULL;
597
+ if (!sk) return rb_ary_new();
598
+ if ((num = sk_PKCS7_RECIP_INFO_num(sk)) < 0) {
599
+ ossl_raise(ePKCS7Error, "Negative number of recipient!");
600
+ }
601
+ ary = rb_ary_new2(num);
602
+ for (i=0; i<num; i++) {
603
+ si = sk_PKCS7_RECIP_INFO_value(sk, i);
604
+ rb_ary_push(ary, ossl_pkcs7ri_new(si));
605
+ }
606
+
607
+ return ary;
608
+ }
609
+
610
+ static VALUE
611
+ ossl_pkcs7_add_certificate(VALUE self, VALUE cert)
612
+ {
613
+ PKCS7 *pkcs7;
614
+ X509 *x509;
615
+
616
+ GetPKCS7(self, pkcs7);
617
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
618
+ if (!PKCS7_add_certificate(pkcs7, x509)){
619
+ ossl_raise(ePKCS7Error, NULL);
620
+ }
621
+
622
+ return self;
623
+ }
624
+
625
+ static STACK_OF(X509) *
626
+ pkcs7_get_certs(VALUE self)
627
+ {
628
+ PKCS7 *pkcs7;
629
+ STACK_OF(X509) *certs;
630
+ int i;
631
+
632
+ GetPKCS7(self, pkcs7);
633
+ i = OBJ_obj2nid(pkcs7->type);
634
+ switch(i){
635
+ case NID_pkcs7_signed:
636
+ certs = pkcs7->d.sign->cert;
637
+ break;
638
+ case NID_pkcs7_signedAndEnveloped:
639
+ certs = pkcs7->d.signed_and_enveloped->cert;
640
+ break;
641
+ default:
642
+ certs = NULL;
643
+ }
644
+
645
+ return certs;
646
+ }
647
+
648
+ static STACK_OF(X509_CRL) *
649
+ pkcs7_get_crls(VALUE self)
650
+ {
651
+ PKCS7 *pkcs7;
652
+ STACK_OF(X509_CRL) *crls;
653
+ int i;
654
+
655
+ GetPKCS7(self, pkcs7);
656
+ i = OBJ_obj2nid(pkcs7->type);
657
+ switch(i){
658
+ case NID_pkcs7_signed:
659
+ crls = pkcs7->d.sign->crl;
660
+ break;
661
+ case NID_pkcs7_signedAndEnveloped:
662
+ crls = pkcs7->d.signed_and_enveloped->crl;
663
+ break;
664
+ default:
665
+ crls = NULL;
666
+ }
667
+
668
+ return crls;
669
+ }
670
+
671
+ static VALUE
672
+ ossl_pkcs7_set_certs_i(RB_BLOCK_CALL_FUNC_ARGLIST(i, arg))
673
+ {
674
+ return ossl_pkcs7_add_certificate(arg, i);
675
+ }
676
+
677
+ static VALUE
678
+ ossl_pkcs7_set_certificates(VALUE self, VALUE ary)
679
+ {
680
+ STACK_OF(X509) *certs;
681
+ X509 *cert;
682
+
683
+ certs = pkcs7_get_certs(self);
684
+ while((cert = sk_X509_pop(certs))) X509_free(cert);
685
+ rb_block_call(ary, rb_intern("each"), 0, 0, ossl_pkcs7_set_certs_i, self);
686
+
687
+ return ary;
688
+ }
689
+
690
+ static VALUE
691
+ ossl_pkcs7_get_certificates(VALUE self)
692
+ {
693
+ return ossl_x509_sk2ary(pkcs7_get_certs(self));
694
+ }
695
+
696
+ static VALUE
697
+ ossl_pkcs7_add_crl(VALUE self, VALUE crl)
698
+ {
699
+ PKCS7 *pkcs7;
700
+ X509_CRL *x509crl;
701
+
702
+ GetPKCS7(self, pkcs7); /* NO DUP needed! */
703
+ x509crl = GetX509CRLPtr(crl);
704
+ if (!PKCS7_add_crl(pkcs7, x509crl)) {
705
+ ossl_raise(ePKCS7Error, NULL);
706
+ }
707
+
708
+ return self;
709
+ }
710
+
711
+ static VALUE
712
+ ossl_pkcs7_set_crls_i(RB_BLOCK_CALL_FUNC_ARGLIST(i, arg))
713
+ {
714
+ return ossl_pkcs7_add_crl(arg, i);
715
+ }
716
+
717
+ static VALUE
718
+ ossl_pkcs7_set_crls(VALUE self, VALUE ary)
719
+ {
720
+ STACK_OF(X509_CRL) *crls;
721
+ X509_CRL *crl;
722
+
723
+ crls = pkcs7_get_crls(self);
724
+ while((crl = sk_X509_CRL_pop(crls))) X509_CRL_free(crl);
725
+ rb_block_call(ary, rb_intern("each"), 0, 0, ossl_pkcs7_set_crls_i, self);
726
+
727
+ return ary;
728
+ }
729
+
730
+ static VALUE
731
+ ossl_pkcs7_get_crls(VALUE self)
732
+ {
733
+ return ossl_x509crl_sk2ary(pkcs7_get_crls(self));
734
+ }
735
+
736
+ static VALUE
737
+ ossl_pkcs7_verify(int argc, VALUE *argv, VALUE self)
738
+ {
739
+ VALUE certs, store, indata, flags;
740
+ STACK_OF(X509) *x509s;
741
+ X509_STORE *x509st;
742
+ int flg, ok, status = 0;
743
+ BIO *in, *out;
744
+ PKCS7 *p7;
745
+ VALUE data;
746
+ const char *msg;
747
+
748
+ GetPKCS7(self, p7);
749
+ rb_scan_args(argc, argv, "22", &certs, &store, &indata, &flags);
750
+ x509st = GetX509StorePtr(store);
751
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
752
+ if(NIL_P(indata)) indata = ossl_pkcs7_get_data(self);
753
+ in = NIL_P(indata) ? NULL : ossl_obj2bio(&indata);
754
+ if(NIL_P(certs)) x509s = NULL;
755
+ else{
756
+ x509s = ossl_protect_x509_ary2sk(certs, &status);
757
+ if(status){
758
+ BIO_free(in);
759
+ rb_jump_tag(status);
760
+ }
761
+ }
762
+ if(!(out = BIO_new(BIO_s_mem()))){
763
+ BIO_free(in);
764
+ sk_X509_pop_free(x509s, X509_free);
765
+ ossl_raise(ePKCS7Error, NULL);
766
+ }
767
+ ok = PKCS7_verify(p7, x509s, x509st, in, out, flg);
768
+ BIO_free(in);
769
+ sk_X509_pop_free(x509s, X509_free);
770
+ if (ok < 0) ossl_raise(ePKCS7Error, "PKCS7_verify");
771
+ msg = ERR_reason_error_string(ERR_peek_error());
772
+ ossl_pkcs7_set_err_string(self, msg ? rb_str_new2(msg) : Qnil);
773
+ ossl_clear_error();
774
+ data = ossl_membio2str(out);
775
+ ossl_pkcs7_set_data(self, data);
776
+
777
+ return (ok == 1) ? Qtrue : Qfalse;
778
+ }
779
+
780
+ static VALUE
781
+ ossl_pkcs7_decrypt(int argc, VALUE *argv, VALUE self)
782
+ {
783
+ VALUE pkey, cert, flags;
784
+ EVP_PKEY *key;
785
+ X509 *x509;
786
+ int flg;
787
+ PKCS7 *p7;
788
+ BIO *out;
789
+ VALUE str;
790
+
791
+ rb_scan_args(argc, argv, "12", &pkey, &cert, &flags);
792
+ key = GetPrivPKeyPtr(pkey); /* NO NEED TO DUP */
793
+ x509 = NIL_P(cert) ? NULL : GetX509CertPtr(cert); /* NO NEED TO DUP */
794
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
795
+ GetPKCS7(self, p7);
796
+ if(!(out = BIO_new(BIO_s_mem())))
797
+ ossl_raise(ePKCS7Error, NULL);
798
+ if(!PKCS7_decrypt(p7, key, x509, out, flg)){
799
+ BIO_free(out);
800
+ ossl_raise(ePKCS7Error, NULL);
801
+ }
802
+ str = ossl_membio2str(out); /* out will be free */
803
+
804
+ return str;
805
+ }
806
+
807
+ static VALUE
808
+ ossl_pkcs7_add_data(VALUE self, VALUE data)
809
+ {
810
+ PKCS7 *pkcs7;
811
+ BIO *out, *in;
812
+ char buf[4096];
813
+ int len;
814
+
815
+ GetPKCS7(self, pkcs7);
816
+ if(PKCS7_type_is_signed(pkcs7)){
817
+ if(!PKCS7_content_new(pkcs7, NID_pkcs7_data))
818
+ ossl_raise(ePKCS7Error, NULL);
819
+ }
820
+ in = ossl_obj2bio(&data);
821
+ if(!(out = PKCS7_dataInit(pkcs7, NULL))) goto err;
822
+ for(;;){
823
+ if((len = BIO_read(in, buf, sizeof(buf))) <= 0)
824
+ break;
825
+ if(BIO_write(out, buf, len) != len)
826
+ goto err;
827
+ }
828
+ if(!PKCS7_dataFinal(pkcs7, out)) goto err;
829
+ ossl_pkcs7_set_data(self, Qnil);
830
+
831
+ err:
832
+ BIO_free_all(out);
833
+ BIO_free(in);
834
+ if(ERR_peek_error()){
835
+ ossl_raise(ePKCS7Error, NULL);
836
+ }
837
+
838
+ return data;
839
+ }
840
+
841
+ static VALUE
842
+ ossl_pkcs7_to_der(VALUE self)
843
+ {
844
+ PKCS7 *pkcs7;
845
+ VALUE str;
846
+ long len;
847
+ unsigned char *p;
848
+
849
+ GetPKCS7(self, pkcs7);
850
+ if((len = i2d_PKCS7(pkcs7, NULL)) <= 0)
851
+ ossl_raise(ePKCS7Error, NULL);
852
+ str = rb_str_new(0, len);
853
+ p = (unsigned char *)RSTRING_PTR(str);
854
+ if(i2d_PKCS7(pkcs7, &p) <= 0)
855
+ ossl_raise(ePKCS7Error, NULL);
856
+ ossl_str_adjust(str, p);
857
+
858
+ return str;
859
+ }
860
+
861
+ static VALUE
862
+ ossl_pkcs7_to_pem(VALUE self)
863
+ {
864
+ PKCS7 *pkcs7;
865
+ BIO *out;
866
+ VALUE str;
867
+
868
+ GetPKCS7(self, pkcs7);
869
+ if (!(out = BIO_new(BIO_s_mem()))) {
870
+ ossl_raise(ePKCS7Error, NULL);
871
+ }
872
+ if (!PEM_write_bio_PKCS7(out, pkcs7)) {
873
+ BIO_free(out);
874
+ ossl_raise(ePKCS7Error, NULL);
875
+ }
876
+ str = ossl_membio2str(out);
877
+
878
+ return str;
879
+ }
880
+
881
+ /*
882
+ * SIGNER INFO
883
+ */
884
+ static VALUE
885
+ ossl_pkcs7si_alloc(VALUE klass)
886
+ {
887
+ PKCS7_SIGNER_INFO *p7si;
888
+ VALUE obj;
889
+
890
+ obj = NewPKCS7si(klass);
891
+ if (!(p7si = PKCS7_SIGNER_INFO_new())) {
892
+ ossl_raise(ePKCS7Error, NULL);
893
+ }
894
+ SetPKCS7si(obj, p7si);
895
+
896
+ return obj;
897
+ }
898
+
899
+ static VALUE
900
+ ossl_pkcs7si_initialize(VALUE self, VALUE cert, VALUE key, VALUE digest)
901
+ {
902
+ PKCS7_SIGNER_INFO *p7si;
903
+ EVP_PKEY *pkey;
904
+ X509 *x509;
905
+ const EVP_MD *md;
906
+
907
+ pkey = GetPrivPKeyPtr(key); /* NO NEED TO DUP */
908
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
909
+ md = ossl_evp_get_digestbyname(digest);
910
+ GetPKCS7si(self, p7si);
911
+ if (!(PKCS7_SIGNER_INFO_set(p7si, x509, pkey, (EVP_MD*)md))) {
912
+ ossl_raise(ePKCS7Error, NULL);
913
+ }
914
+
915
+ return self;
916
+ }
917
+
918
+ static VALUE
919
+ ossl_pkcs7si_get_issuer(VALUE self)
920
+ {
921
+ PKCS7_SIGNER_INFO *p7si;
922
+
923
+ GetPKCS7si(self, p7si);
924
+
925
+ return ossl_x509name_new(p7si->issuer_and_serial->issuer);
926
+ }
927
+
928
+ static VALUE
929
+ ossl_pkcs7si_get_serial(VALUE self)
930
+ {
931
+ PKCS7_SIGNER_INFO *p7si;
932
+
933
+ GetPKCS7si(self, p7si);
934
+
935
+ return asn1integer_to_num(p7si->issuer_and_serial->serial);
936
+ }
937
+
938
+ static VALUE
939
+ ossl_pkcs7si_get_signed_time(VALUE self)
940
+ {
941
+ PKCS7_SIGNER_INFO *p7si;
942
+ ASN1_TYPE *asn1obj;
943
+
944
+ GetPKCS7si(self, p7si);
945
+
946
+ if (!(asn1obj = PKCS7_get_signed_attribute(p7si, NID_pkcs9_signingTime))) {
947
+ ossl_raise(ePKCS7Error, NULL);
948
+ }
949
+ if (asn1obj->type == V_ASN1_UTCTIME) {
950
+ return asn1time_to_time(asn1obj->value.utctime);
951
+ }
952
+ /*
953
+ * OR
954
+ * ossl_raise(ePKCS7Error, "...");
955
+ * ?
956
+ */
957
+
958
+ return Qnil;
959
+ }
960
+
961
+ /*
962
+ * RECIPIENT INFO
963
+ */
964
+ static VALUE
965
+ ossl_pkcs7ri_alloc(VALUE klass)
966
+ {
967
+ PKCS7_RECIP_INFO *p7ri;
968
+ VALUE obj;
969
+
970
+ obj = NewPKCS7ri(klass);
971
+ if (!(p7ri = PKCS7_RECIP_INFO_new())) {
972
+ ossl_raise(ePKCS7Error, NULL);
973
+ }
974
+ SetPKCS7ri(obj, p7ri);
975
+
976
+ return obj;
977
+ }
978
+
979
+ static VALUE
980
+ ossl_pkcs7ri_initialize(VALUE self, VALUE cert)
981
+ {
982
+ PKCS7_RECIP_INFO *p7ri;
983
+ X509 *x509;
984
+
985
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
986
+ GetPKCS7ri(self, p7ri);
987
+ if (!PKCS7_RECIP_INFO_set(p7ri, x509)) {
988
+ ossl_raise(ePKCS7Error, NULL);
989
+ }
990
+
991
+ return self;
992
+ }
993
+
994
+ static VALUE
995
+ ossl_pkcs7ri_get_issuer(VALUE self)
996
+ {
997
+ PKCS7_RECIP_INFO *p7ri;
998
+
999
+ GetPKCS7ri(self, p7ri);
1000
+
1001
+ return ossl_x509name_new(p7ri->issuer_and_serial->issuer);
1002
+ }
1003
+
1004
+ static VALUE
1005
+ ossl_pkcs7ri_get_serial(VALUE self)
1006
+ {
1007
+ PKCS7_RECIP_INFO *p7ri;
1008
+
1009
+ GetPKCS7ri(self, p7ri);
1010
+
1011
+ return asn1integer_to_num(p7ri->issuer_and_serial->serial);
1012
+ }
1013
+
1014
+ static VALUE
1015
+ ossl_pkcs7ri_get_enc_key(VALUE self)
1016
+ {
1017
+ PKCS7_RECIP_INFO *p7ri;
1018
+
1019
+ GetPKCS7ri(self, p7ri);
1020
+
1021
+ return asn1str_to_str(p7ri->enc_key);
1022
+ }
1023
+
1024
+ /*
1025
+ * INIT
1026
+ */
1027
+ void
1028
+ Init_ossl_pkcs7(void)
1029
+ {
1030
+ #undef rb_intern
1031
+ #if 0
1032
+ mOSSL = rb_define_module("OpenSSL");
1033
+ eOSSLError = rb_define_class_under(mOSSL, "OpenSSLError", rb_eStandardError);
1034
+ #endif
1035
+
1036
+ cPKCS7 = rb_define_class_under(mOSSL, "PKCS7", rb_cObject);
1037
+ ePKCS7Error = rb_define_class_under(cPKCS7, "PKCS7Error", eOSSLError);
1038
+ rb_define_singleton_method(cPKCS7, "read_smime", ossl_pkcs7_s_read_smime, 1);
1039
+ rb_define_singleton_method(cPKCS7, "write_smime", ossl_pkcs7_s_write_smime, -1);
1040
+ rb_define_singleton_method(cPKCS7, "sign", ossl_pkcs7_s_sign, -1);
1041
+ rb_define_singleton_method(cPKCS7, "encrypt", ossl_pkcs7_s_encrypt, -1);
1042
+ rb_attr(cPKCS7, rb_intern("data"), 1, 0, Qfalse);
1043
+ rb_attr(cPKCS7, rb_intern("error_string"), 1, 1, Qfalse);
1044
+ rb_define_alloc_func(cPKCS7, ossl_pkcs7_alloc);
1045
+ rb_define_method(cPKCS7, "initialize_copy", ossl_pkcs7_copy, 1);
1046
+ rb_define_method(cPKCS7, "initialize", ossl_pkcs7_initialize, -1);
1047
+ rb_define_method(cPKCS7, "type=", ossl_pkcs7_set_type, 1);
1048
+ rb_define_method(cPKCS7, "type", ossl_pkcs7_get_type, 0);
1049
+ rb_define_method(cPKCS7, "detached=", ossl_pkcs7_set_detached, 1);
1050
+ rb_define_method(cPKCS7, "detached", ossl_pkcs7_get_detached, 0);
1051
+ rb_define_method(cPKCS7, "detached?", ossl_pkcs7_detached_p, 0);
1052
+ rb_define_method(cPKCS7, "cipher=", ossl_pkcs7_set_cipher, 1);
1053
+ rb_define_method(cPKCS7, "add_signer", ossl_pkcs7_add_signer, 1);
1054
+ rb_define_method(cPKCS7, "signers", ossl_pkcs7_get_signer, 0);
1055
+ rb_define_method(cPKCS7, "add_recipient", ossl_pkcs7_add_recipient, 1);
1056
+ rb_define_method(cPKCS7, "recipients", ossl_pkcs7_get_recipient, 0);
1057
+ rb_define_method(cPKCS7, "add_certificate", ossl_pkcs7_add_certificate, 1);
1058
+ rb_define_method(cPKCS7, "certificates=", ossl_pkcs7_set_certificates, 1);
1059
+ rb_define_method(cPKCS7, "certificates", ossl_pkcs7_get_certificates, 0);
1060
+ rb_define_method(cPKCS7, "add_crl", ossl_pkcs7_add_crl, 1);
1061
+ rb_define_method(cPKCS7, "crls=", ossl_pkcs7_set_crls, 1);
1062
+ rb_define_method(cPKCS7, "crls", ossl_pkcs7_get_crls, 0);
1063
+ rb_define_method(cPKCS7, "add_data", ossl_pkcs7_add_data, 1);
1064
+ rb_define_alias(cPKCS7, "data=", "add_data");
1065
+ rb_define_method(cPKCS7, "verify", ossl_pkcs7_verify, -1);
1066
+ rb_define_method(cPKCS7, "decrypt", ossl_pkcs7_decrypt, -1);
1067
+ rb_define_method(cPKCS7, "to_pem", ossl_pkcs7_to_pem, 0);
1068
+ rb_define_alias(cPKCS7, "to_s", "to_pem");
1069
+ rb_define_method(cPKCS7, "to_der", ossl_pkcs7_to_der, 0);
1070
+
1071
+ cPKCS7Signer = rb_define_class_under(cPKCS7, "SignerInfo", rb_cObject);
1072
+ rb_define_const(cPKCS7, "Signer", cPKCS7Signer);
1073
+ rb_define_alloc_func(cPKCS7Signer, ossl_pkcs7si_alloc);
1074
+ rb_define_method(cPKCS7Signer, "initialize", ossl_pkcs7si_initialize,3);
1075
+ rb_define_method(cPKCS7Signer, "issuer", ossl_pkcs7si_get_issuer, 0);
1076
+ rb_define_method(cPKCS7Signer, "serial", ossl_pkcs7si_get_serial,0);
1077
+ rb_define_method(cPKCS7Signer,"signed_time",ossl_pkcs7si_get_signed_time,0);
1078
+
1079
+ cPKCS7Recipient = rb_define_class_under(cPKCS7,"RecipientInfo",rb_cObject);
1080
+ rb_define_alloc_func(cPKCS7Recipient, ossl_pkcs7ri_alloc);
1081
+ rb_define_method(cPKCS7Recipient, "initialize", ossl_pkcs7ri_initialize,1);
1082
+ rb_define_method(cPKCS7Recipient, "issuer", ossl_pkcs7ri_get_issuer,0);
1083
+ rb_define_method(cPKCS7Recipient, "serial", ossl_pkcs7ri_get_serial,0);
1084
+ rb_define_method(cPKCS7Recipient, "enc_key", ossl_pkcs7ri_get_enc_key,0);
1085
+
1086
+ #define DefPKCS7Const(x) rb_define_const(cPKCS7, #x, INT2NUM(PKCS7_##x))
1087
+
1088
+ DefPKCS7Const(TEXT);
1089
+ DefPKCS7Const(NOCERTS);
1090
+ DefPKCS7Const(NOSIGS);
1091
+ DefPKCS7Const(NOCHAIN);
1092
+ DefPKCS7Const(NOINTERN);
1093
+ DefPKCS7Const(NOVERIFY);
1094
+ DefPKCS7Const(DETACHED);
1095
+ DefPKCS7Const(BINARY);
1096
+ DefPKCS7Const(NOATTR);
1097
+ DefPKCS7Const(NOSMIMECAP);
1098
+ }