openssl-custom 2.2.2

Sign up to get free protection for your applications and to get access to all the features.
Files changed (75) hide show
  1. checksums.yaml +7 -0
  2. data/BSDL +22 -0
  3. data/CONTRIBUTING.md +132 -0
  4. data/History.md +485 -0
  5. data/LICENSE.txt +56 -0
  6. data/README.md +66 -0
  7. data/ext/openssl/extconf.rb +190 -0
  8. data/ext/openssl/openssl_missing.c +106 -0
  9. data/ext/openssl/openssl_missing.h +257 -0
  10. data/ext/openssl/ossl.c +1282 -0
  11. data/ext/openssl/ossl.h +181 -0
  12. data/ext/openssl/ossl_asn1.c +1878 -0
  13. data/ext/openssl/ossl_asn1.h +62 -0
  14. data/ext/openssl/ossl_bio.c +42 -0
  15. data/ext/openssl/ossl_bio.h +16 -0
  16. data/ext/openssl/ossl_bn.c +1270 -0
  17. data/ext/openssl/ossl_bn.h +26 -0
  18. data/ext/openssl/ossl_cipher.c +1075 -0
  19. data/ext/openssl/ossl_cipher.h +20 -0
  20. data/ext/openssl/ossl_config.c +89 -0
  21. data/ext/openssl/ossl_config.h +19 -0
  22. data/ext/openssl/ossl_digest.c +425 -0
  23. data/ext/openssl/ossl_digest.h +20 -0
  24. data/ext/openssl/ossl_engine.c +567 -0
  25. data/ext/openssl/ossl_engine.h +19 -0
  26. data/ext/openssl/ossl_hmac.c +389 -0
  27. data/ext/openssl/ossl_hmac.h +18 -0
  28. data/ext/openssl/ossl_kdf.c +303 -0
  29. data/ext/openssl/ossl_kdf.h +6 -0
  30. data/ext/openssl/ossl_ns_spki.c +405 -0
  31. data/ext/openssl/ossl_ns_spki.h +19 -0
  32. data/ext/openssl/ossl_ocsp.c +2013 -0
  33. data/ext/openssl/ossl_ocsp.h +23 -0
  34. data/ext/openssl/ossl_pkcs12.c +257 -0
  35. data/ext/openssl/ossl_pkcs12.h +13 -0
  36. data/ext/openssl/ossl_pkcs7.c +1098 -0
  37. data/ext/openssl/ossl_pkcs7.h +36 -0
  38. data/ext/openssl/ossl_pkey.c +673 -0
  39. data/ext/openssl/ossl_pkey.h +241 -0
  40. data/ext/openssl/ossl_pkey_dh.c +650 -0
  41. data/ext/openssl/ossl_pkey_dsa.c +664 -0
  42. data/ext/openssl/ossl_pkey_ec.c +1827 -0
  43. data/ext/openssl/ossl_pkey_rsa.c +966 -0
  44. data/ext/openssl/ossl_rand.c +200 -0
  45. data/ext/openssl/ossl_rand.h +18 -0
  46. data/ext/openssl/ossl_ssl.c +3080 -0
  47. data/ext/openssl/ossl_ssl.h +36 -0
  48. data/ext/openssl/ossl_ssl_session.c +332 -0
  49. data/ext/openssl/ossl_ts.c +1524 -0
  50. data/ext/openssl/ossl_ts.h +16 -0
  51. data/ext/openssl/ossl_x509.c +262 -0
  52. data/ext/openssl/ossl_x509.h +115 -0
  53. data/ext/openssl/ossl_x509attr.c +324 -0
  54. data/ext/openssl/ossl_x509cert.c +846 -0
  55. data/ext/openssl/ossl_x509crl.c +542 -0
  56. data/ext/openssl/ossl_x509ext.c +491 -0
  57. data/ext/openssl/ossl_x509name.c +590 -0
  58. data/ext/openssl/ossl_x509req.c +441 -0
  59. data/ext/openssl/ossl_x509revoked.c +300 -0
  60. data/ext/openssl/ossl_x509store.c +902 -0
  61. data/ext/openssl/ruby_missing.h +24 -0
  62. data/lib/openssl/bn.rb +40 -0
  63. data/lib/openssl/buffering.rb +478 -0
  64. data/lib/openssl/cipher.rb +67 -0
  65. data/lib/openssl/config.rb +501 -0
  66. data/lib/openssl/digest.rb +73 -0
  67. data/lib/openssl/hmac.rb +13 -0
  68. data/lib/openssl/marshal.rb +30 -0
  69. data/lib/openssl/pkcs5.rb +22 -0
  70. data/lib/openssl/pkey.rb +42 -0
  71. data/lib/openssl/ssl.rb +542 -0
  72. data/lib/openssl/version.rb +5 -0
  73. data/lib/openssl/x509.rb +369 -0
  74. data/lib/openssl.rb +38 -0
  75. metadata +196 -0
@@ -0,0 +1,1098 @@
1
+ /*
2
+ * 'OpenSSL for Ruby' project
3
+ * Copyright (C) 2001-2002 Michal Rokos <m.rokos@sh.cvut.cz>
4
+ * All rights reserved.
5
+ */
6
+ /*
7
+ * This program is licensed under the same licence as Ruby.
8
+ * (See the file 'LICENCE'.)
9
+ */
10
+ #include "ossl.h"
11
+
12
+ #define NewPKCS7si(klass) \
13
+ TypedData_Wrap_Struct((klass), &ossl_pkcs7_signer_info_type, 0)
14
+ #define SetPKCS7si(obj, p7si) do { \
15
+ if (!(p7si)) { \
16
+ ossl_raise(rb_eRuntimeError, "PKCS7si wasn't initialized."); \
17
+ } \
18
+ RTYPEDDATA_DATA(obj) = (p7si); \
19
+ } while (0)
20
+ #define GetPKCS7si(obj, p7si) do { \
21
+ TypedData_Get_Struct((obj), PKCS7_SIGNER_INFO, &ossl_pkcs7_signer_info_type, (p7si)); \
22
+ if (!(p7si)) { \
23
+ ossl_raise(rb_eRuntimeError, "PKCS7si wasn't initialized."); \
24
+ } \
25
+ } while (0)
26
+
27
+ #define NewPKCS7ri(klass) \
28
+ TypedData_Wrap_Struct((klass), &ossl_pkcs7_recip_info_type, 0)
29
+ #define SetPKCS7ri(obj, p7ri) do { \
30
+ if (!(p7ri)) { \
31
+ ossl_raise(rb_eRuntimeError, "PKCS7ri wasn't initialized."); \
32
+ } \
33
+ RTYPEDDATA_DATA(obj) = (p7ri); \
34
+ } while (0)
35
+ #define GetPKCS7ri(obj, p7ri) do { \
36
+ TypedData_Get_Struct((obj), PKCS7_RECIP_INFO, &ossl_pkcs7_recip_info_type, (p7ri)); \
37
+ if (!(p7ri)) { \
38
+ ossl_raise(rb_eRuntimeError, "PKCS7ri wasn't initialized."); \
39
+ } \
40
+ } while (0)
41
+
42
+ #define numberof(ary) (int)(sizeof(ary)/sizeof((ary)[0]))
43
+
44
+ #define ossl_pkcs7_set_data(o,v) rb_iv_set((o), "@data", (v))
45
+ #define ossl_pkcs7_get_data(o) rb_iv_get((o), "@data")
46
+ #define ossl_pkcs7_set_err_string(o,v) rb_iv_set((o), "@error_string", (v))
47
+ #define ossl_pkcs7_get_err_string(o) rb_iv_get((o), "@error_string")
48
+
49
+ /*
50
+ * Classes
51
+ */
52
+ VALUE cPKCS7;
53
+ VALUE cPKCS7Signer;
54
+ VALUE cPKCS7Recipient;
55
+ VALUE ePKCS7Error;
56
+
57
+ static void
58
+ ossl_pkcs7_free(void *ptr)
59
+ {
60
+ PKCS7_free(ptr);
61
+ }
62
+
63
+ const rb_data_type_t ossl_pkcs7_type = {
64
+ "OpenSSL/PKCS7",
65
+ {
66
+ 0, ossl_pkcs7_free,
67
+ },
68
+ 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
69
+ };
70
+
71
+ static void
72
+ ossl_pkcs7_signer_info_free(void *ptr)
73
+ {
74
+ PKCS7_SIGNER_INFO_free(ptr);
75
+ }
76
+
77
+ static const rb_data_type_t ossl_pkcs7_signer_info_type = {
78
+ "OpenSSL/PKCS7/SIGNER_INFO",
79
+ {
80
+ 0, ossl_pkcs7_signer_info_free,
81
+ },
82
+ 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
83
+ };
84
+
85
+ static void
86
+ ossl_pkcs7_recip_info_free(void *ptr)
87
+ {
88
+ PKCS7_RECIP_INFO_free(ptr);
89
+ }
90
+
91
+ static const rb_data_type_t ossl_pkcs7_recip_info_type = {
92
+ "OpenSSL/PKCS7/RECIP_INFO",
93
+ {
94
+ 0, ossl_pkcs7_recip_info_free,
95
+ },
96
+ 0, 0, RUBY_TYPED_FREE_IMMEDIATELY,
97
+ };
98
+
99
+ /*
100
+ * Public
101
+ * (MADE PRIVATE UNTIL SOMEBODY WILL NEED THEM)
102
+ */
103
+ static PKCS7_SIGNER_INFO *
104
+ ossl_PKCS7_SIGNER_INFO_dup(const PKCS7_SIGNER_INFO *si)
105
+ {
106
+ return (PKCS7_SIGNER_INFO *)ASN1_dup((i2d_of_void *)i2d_PKCS7_SIGNER_INFO,
107
+ (d2i_of_void *)d2i_PKCS7_SIGNER_INFO,
108
+ (char *)si);
109
+ }
110
+
111
+ static PKCS7_RECIP_INFO *
112
+ ossl_PKCS7_RECIP_INFO_dup(const PKCS7_RECIP_INFO *si)
113
+ {
114
+ return (PKCS7_RECIP_INFO *)ASN1_dup((i2d_of_void *)i2d_PKCS7_RECIP_INFO,
115
+ (d2i_of_void *)d2i_PKCS7_RECIP_INFO,
116
+ (char *)si);
117
+ }
118
+
119
+ static VALUE
120
+ ossl_pkcs7si_new(PKCS7_SIGNER_INFO *p7si)
121
+ {
122
+ PKCS7_SIGNER_INFO *pkcs7;
123
+ VALUE obj;
124
+
125
+ obj = NewPKCS7si(cPKCS7Signer);
126
+ pkcs7 = p7si ? ossl_PKCS7_SIGNER_INFO_dup(p7si) : PKCS7_SIGNER_INFO_new();
127
+ if (!pkcs7) ossl_raise(ePKCS7Error, NULL);
128
+ SetPKCS7si(obj, pkcs7);
129
+
130
+ return obj;
131
+ }
132
+
133
+ static PKCS7_SIGNER_INFO *
134
+ DupPKCS7SignerPtr(VALUE obj)
135
+ {
136
+ PKCS7_SIGNER_INFO *p7si, *pkcs7;
137
+
138
+ GetPKCS7si(obj, p7si);
139
+ if (!(pkcs7 = ossl_PKCS7_SIGNER_INFO_dup(p7si))) {
140
+ ossl_raise(ePKCS7Error, NULL);
141
+ }
142
+
143
+ return pkcs7;
144
+ }
145
+
146
+ static VALUE
147
+ ossl_pkcs7ri_new(PKCS7_RECIP_INFO *p7ri)
148
+ {
149
+ PKCS7_RECIP_INFO *pkcs7;
150
+ VALUE obj;
151
+
152
+ obj = NewPKCS7ri(cPKCS7Recipient);
153
+ pkcs7 = p7ri ? ossl_PKCS7_RECIP_INFO_dup(p7ri) : PKCS7_RECIP_INFO_new();
154
+ if (!pkcs7) ossl_raise(ePKCS7Error, NULL);
155
+ SetPKCS7ri(obj, pkcs7);
156
+
157
+ return obj;
158
+ }
159
+
160
+ static PKCS7_RECIP_INFO *
161
+ DupPKCS7RecipientPtr(VALUE obj)
162
+ {
163
+ PKCS7_RECIP_INFO *p7ri, *pkcs7;
164
+
165
+ GetPKCS7ri(obj, p7ri);
166
+ if (!(pkcs7 = ossl_PKCS7_RECIP_INFO_dup(p7ri))) {
167
+ ossl_raise(ePKCS7Error, NULL);
168
+ }
169
+
170
+ return pkcs7;
171
+ }
172
+
173
+ /*
174
+ * call-seq:
175
+ * PKCS7.read_smime(string) => pkcs7
176
+ */
177
+ static VALUE
178
+ ossl_pkcs7_s_read_smime(VALUE klass, VALUE arg)
179
+ {
180
+ BIO *in, *out;
181
+ PKCS7 *pkcs7;
182
+ VALUE ret, data;
183
+
184
+ ret = NewPKCS7(cPKCS7);
185
+ in = ossl_obj2bio(&arg);
186
+ out = NULL;
187
+ pkcs7 = SMIME_read_PKCS7(in, &out);
188
+ BIO_free(in);
189
+ if(!pkcs7) ossl_raise(ePKCS7Error, NULL);
190
+ data = out ? ossl_membio2str(out) : Qnil;
191
+ SetPKCS7(ret, pkcs7);
192
+ ossl_pkcs7_set_data(ret, data);
193
+ ossl_pkcs7_set_err_string(ret, Qnil);
194
+
195
+ return ret;
196
+ }
197
+
198
+ /*
199
+ * call-seq:
200
+ * PKCS7.write_smime(pkcs7 [, data [, flags]]) => string
201
+ */
202
+ static VALUE
203
+ ossl_pkcs7_s_write_smime(int argc, VALUE *argv, VALUE klass)
204
+ {
205
+ VALUE pkcs7, data, flags;
206
+ BIO *out, *in;
207
+ PKCS7 *p7;
208
+ VALUE str;
209
+ int flg;
210
+
211
+ rb_scan_args(argc, argv, "12", &pkcs7, &data, &flags);
212
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
213
+ if(NIL_P(data)) data = ossl_pkcs7_get_data(pkcs7);
214
+ GetPKCS7(pkcs7, p7);
215
+ if(!NIL_P(data) && PKCS7_is_detached(p7))
216
+ flg |= PKCS7_DETACHED;
217
+ in = NIL_P(data) ? NULL : ossl_obj2bio(&data);
218
+ if(!(out = BIO_new(BIO_s_mem()))){
219
+ BIO_free(in);
220
+ ossl_raise(ePKCS7Error, NULL);
221
+ }
222
+ if(!SMIME_write_PKCS7(out, p7, in, flg)){
223
+ BIO_free(out);
224
+ BIO_free(in);
225
+ ossl_raise(ePKCS7Error, NULL);
226
+ }
227
+ BIO_free(in);
228
+ str = ossl_membio2str(out);
229
+
230
+ return str;
231
+ }
232
+
233
+ /*
234
+ * call-seq:
235
+ * PKCS7.sign(cert, key, data, [, certs [, flags]]) => pkcs7
236
+ */
237
+ static VALUE
238
+ ossl_pkcs7_s_sign(int argc, VALUE *argv, VALUE klass)
239
+ {
240
+ VALUE cert, key, data, certs, flags;
241
+ X509 *x509;
242
+ EVP_PKEY *pkey;
243
+ BIO *in;
244
+ STACK_OF(X509) *x509s;
245
+ int flg, status = 0;
246
+ PKCS7 *pkcs7;
247
+ VALUE ret;
248
+
249
+ rb_scan_args(argc, argv, "32", &cert, &key, &data, &certs, &flags);
250
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
251
+ pkey = GetPrivPKeyPtr(key); /* NO NEED TO DUP */
252
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
253
+ ret = NewPKCS7(cPKCS7);
254
+ in = ossl_obj2bio(&data);
255
+ if(NIL_P(certs)) x509s = NULL;
256
+ else{
257
+ x509s = ossl_protect_x509_ary2sk(certs, &status);
258
+ if(status){
259
+ BIO_free(in);
260
+ rb_jump_tag(status);
261
+ }
262
+ }
263
+ if(!(pkcs7 = PKCS7_sign(x509, pkey, x509s, in, flg))){
264
+ BIO_free(in);
265
+ sk_X509_pop_free(x509s, X509_free);
266
+ ossl_raise(ePKCS7Error, NULL);
267
+ }
268
+ SetPKCS7(ret, pkcs7);
269
+ ossl_pkcs7_set_data(ret, data);
270
+ ossl_pkcs7_set_err_string(ret, Qnil);
271
+ BIO_free(in);
272
+ sk_X509_pop_free(x509s, X509_free);
273
+
274
+ return ret;
275
+ }
276
+
277
+ /*
278
+ * call-seq:
279
+ * PKCS7.encrypt(certs, data, [, cipher [, flags]]) => pkcs7
280
+ */
281
+ static VALUE
282
+ ossl_pkcs7_s_encrypt(int argc, VALUE *argv, VALUE klass)
283
+ {
284
+ VALUE certs, data, cipher, flags;
285
+ STACK_OF(X509) *x509s;
286
+ BIO *in;
287
+ const EVP_CIPHER *ciph;
288
+ int flg, status = 0;
289
+ VALUE ret;
290
+ PKCS7 *p7;
291
+
292
+ rb_scan_args(argc, argv, "22", &certs, &data, &cipher, &flags);
293
+ if(NIL_P(cipher)){
294
+ #if !defined(OPENSSL_NO_RC2)
295
+ ciph = EVP_rc2_40_cbc();
296
+ #elif !defined(OPENSSL_NO_DES)
297
+ ciph = EVP_des_ede3_cbc();
298
+ #elif !defined(OPENSSL_NO_RC2)
299
+ ciph = EVP_rc2_40_cbc();
300
+ #elif !defined(OPENSSL_NO_AES)
301
+ ciph = EVP_EVP_aes_128_cbc();
302
+ #else
303
+ ossl_raise(ePKCS7Error, "Must specify cipher");
304
+ #endif
305
+
306
+ }
307
+ else ciph = ossl_evp_get_cipherbyname(cipher);
308
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
309
+ ret = NewPKCS7(cPKCS7);
310
+ in = ossl_obj2bio(&data);
311
+ x509s = ossl_protect_x509_ary2sk(certs, &status);
312
+ if(status){
313
+ BIO_free(in);
314
+ rb_jump_tag(status);
315
+ }
316
+ if(!(p7 = PKCS7_encrypt(x509s, in, (EVP_CIPHER*)ciph, flg))){
317
+ BIO_free(in);
318
+ sk_X509_pop_free(x509s, X509_free);
319
+ ossl_raise(ePKCS7Error, NULL);
320
+ }
321
+ BIO_free(in);
322
+ SetPKCS7(ret, p7);
323
+ ossl_pkcs7_set_data(ret, data);
324
+ sk_X509_pop_free(x509s, X509_free);
325
+
326
+ return ret;
327
+ }
328
+
329
+ static VALUE
330
+ ossl_pkcs7_alloc(VALUE klass)
331
+ {
332
+ PKCS7 *pkcs7;
333
+ VALUE obj;
334
+
335
+ obj = NewPKCS7(klass);
336
+ if (!(pkcs7 = PKCS7_new())) {
337
+ ossl_raise(ePKCS7Error, NULL);
338
+ }
339
+ SetPKCS7(obj, pkcs7);
340
+
341
+ return obj;
342
+ }
343
+
344
+ /*
345
+ * call-seq:
346
+ * PKCS7.new => pkcs7
347
+ * PKCS7.new(string) => pkcs7
348
+ *
349
+ * Many methods in this class aren't documented.
350
+ */
351
+ static VALUE
352
+ ossl_pkcs7_initialize(int argc, VALUE *argv, VALUE self)
353
+ {
354
+ PKCS7 *p7, *pkcs = DATA_PTR(self);
355
+ BIO *in;
356
+ VALUE arg;
357
+
358
+ if(rb_scan_args(argc, argv, "01", &arg) == 0)
359
+ return self;
360
+ arg = ossl_to_der_if_possible(arg);
361
+ in = ossl_obj2bio(&arg);
362
+ p7 = PEM_read_bio_PKCS7(in, &pkcs, NULL, NULL);
363
+ if (!p7) {
364
+ OSSL_BIO_reset(in);
365
+ p7 = d2i_PKCS7_bio(in, &pkcs);
366
+ if (!p7) {
367
+ BIO_free(in);
368
+ PKCS7_free(pkcs);
369
+ DATA_PTR(self) = NULL;
370
+ ossl_raise(rb_eArgError, "Could not parse the PKCS7");
371
+ }
372
+ }
373
+ DATA_PTR(self) = pkcs;
374
+ BIO_free(in);
375
+ ossl_pkcs7_set_data(self, Qnil);
376
+ ossl_pkcs7_set_err_string(self, Qnil);
377
+
378
+ return self;
379
+ }
380
+
381
+ static VALUE
382
+ ossl_pkcs7_copy(VALUE self, VALUE other)
383
+ {
384
+ PKCS7 *a, *b, *pkcs7;
385
+
386
+ rb_check_frozen(self);
387
+ if (self == other) return self;
388
+
389
+ GetPKCS7(self, a);
390
+ GetPKCS7(other, b);
391
+
392
+ pkcs7 = PKCS7_dup(b);
393
+ if (!pkcs7) {
394
+ ossl_raise(ePKCS7Error, NULL);
395
+ }
396
+ DATA_PTR(self) = pkcs7;
397
+ PKCS7_free(a);
398
+
399
+ return self;
400
+ }
401
+
402
+ static int
403
+ ossl_pkcs7_sym2typeid(VALUE sym)
404
+ {
405
+ int i, ret = Qnil;
406
+ const char *s;
407
+ size_t l;
408
+
409
+ static const struct {
410
+ char name[20];
411
+ int nid;
412
+ } p7_type_tab[] = {
413
+ { "signed", NID_pkcs7_signed },
414
+ { "data", NID_pkcs7_data },
415
+ { "signedAndEnveloped", NID_pkcs7_signedAndEnveloped },
416
+ { "enveloped", NID_pkcs7_enveloped },
417
+ { "encrypted", NID_pkcs7_encrypted },
418
+ { "digest", NID_pkcs7_digest },
419
+ };
420
+
421
+ if (SYMBOL_P(sym)) sym = rb_sym2str(sym);
422
+ else StringValue(sym);
423
+ RSTRING_GETMEM(sym, s, l);
424
+
425
+ for(i = 0; ; i++){
426
+ if(i == numberof(p7_type_tab))
427
+ ossl_raise(ePKCS7Error, "unknown type \"%"PRIsVALUE"\"", sym);
428
+ if(strlen(p7_type_tab[i].name) != l) continue;
429
+ if(strcmp(p7_type_tab[i].name, s) == 0){
430
+ ret = p7_type_tab[i].nid;
431
+ break;
432
+ }
433
+ }
434
+
435
+ return ret;
436
+ }
437
+
438
+ /*
439
+ * call-seq:
440
+ * pkcs7.type = type => type
441
+ */
442
+ static VALUE
443
+ ossl_pkcs7_set_type(VALUE self, VALUE type)
444
+ {
445
+ PKCS7 *p7;
446
+
447
+ GetPKCS7(self, p7);
448
+ if(!PKCS7_set_type(p7, ossl_pkcs7_sym2typeid(type)))
449
+ ossl_raise(ePKCS7Error, NULL);
450
+
451
+ return type;
452
+ }
453
+
454
+ /*
455
+ * call-seq:
456
+ * pkcs7.type => string or nil
457
+ */
458
+ static VALUE
459
+ ossl_pkcs7_get_type(VALUE self)
460
+ {
461
+ PKCS7 *p7;
462
+
463
+ GetPKCS7(self, p7);
464
+ if(PKCS7_type_is_signed(p7))
465
+ return ID2SYM(rb_intern("signed"));
466
+ if(PKCS7_type_is_encrypted(p7))
467
+ return ID2SYM(rb_intern("encrypted"));
468
+ if(PKCS7_type_is_enveloped(p7))
469
+ return ID2SYM(rb_intern("enveloped"));
470
+ if(PKCS7_type_is_signedAndEnveloped(p7))
471
+ return ID2SYM(rb_intern("signedAndEnveloped"));
472
+ if(PKCS7_type_is_data(p7))
473
+ return ID2SYM(rb_intern("data"));
474
+ return Qnil;
475
+ }
476
+
477
+ static VALUE
478
+ ossl_pkcs7_set_detached(VALUE self, VALUE flag)
479
+ {
480
+ PKCS7 *p7;
481
+
482
+ GetPKCS7(self, p7);
483
+ if(flag != Qtrue && flag != Qfalse)
484
+ ossl_raise(ePKCS7Error, "must specify a boolean");
485
+ if(!PKCS7_set_detached(p7, flag == Qtrue ? 1 : 0))
486
+ ossl_raise(ePKCS7Error, NULL);
487
+
488
+ return flag;
489
+ }
490
+
491
+ static VALUE
492
+ ossl_pkcs7_get_detached(VALUE self)
493
+ {
494
+ PKCS7 *p7;
495
+ GetPKCS7(self, p7);
496
+ return PKCS7_get_detached(p7) ? Qtrue : Qfalse;
497
+ }
498
+
499
+ static VALUE
500
+ ossl_pkcs7_detached_p(VALUE self)
501
+ {
502
+ PKCS7 *p7;
503
+ GetPKCS7(self, p7);
504
+ return PKCS7_is_detached(p7) ? Qtrue : Qfalse;
505
+ }
506
+
507
+ static VALUE
508
+ ossl_pkcs7_set_cipher(VALUE self, VALUE cipher)
509
+ {
510
+ PKCS7 *pkcs7;
511
+
512
+ GetPKCS7(self, pkcs7);
513
+ if (!PKCS7_set_cipher(pkcs7, ossl_evp_get_cipherbyname(cipher))) {
514
+ ossl_raise(ePKCS7Error, NULL);
515
+ }
516
+
517
+ return cipher;
518
+ }
519
+
520
+ static VALUE
521
+ ossl_pkcs7_add_signer(VALUE self, VALUE signer)
522
+ {
523
+ PKCS7 *pkcs7;
524
+ PKCS7_SIGNER_INFO *p7si;
525
+
526
+ p7si = DupPKCS7SignerPtr(signer); /* NEED TO DUP */
527
+ GetPKCS7(self, pkcs7);
528
+ if (!PKCS7_add_signer(pkcs7, p7si)) {
529
+ PKCS7_SIGNER_INFO_free(p7si);
530
+ ossl_raise(ePKCS7Error, "Could not add signer.");
531
+ }
532
+ if (PKCS7_type_is_signed(pkcs7)){
533
+ PKCS7_add_signed_attribute(p7si, NID_pkcs9_contentType,
534
+ V_ASN1_OBJECT, OBJ_nid2obj(NID_pkcs7_data));
535
+ }
536
+
537
+ return self;
538
+ }
539
+
540
+ static VALUE
541
+ ossl_pkcs7_get_signer(VALUE self)
542
+ {
543
+ PKCS7 *pkcs7;
544
+ STACK_OF(PKCS7_SIGNER_INFO) *sk;
545
+ PKCS7_SIGNER_INFO *si;
546
+ int num, i;
547
+ VALUE ary;
548
+
549
+ GetPKCS7(self, pkcs7);
550
+ if (!(sk = PKCS7_get_signer_info(pkcs7))) {
551
+ OSSL_Debug("OpenSSL::PKCS7#get_signer_info == NULL!");
552
+ return rb_ary_new();
553
+ }
554
+ if ((num = sk_PKCS7_SIGNER_INFO_num(sk)) < 0) {
555
+ ossl_raise(ePKCS7Error, "Negative number of signers!");
556
+ }
557
+ ary = rb_ary_new2(num);
558
+ for (i=0; i<num; i++) {
559
+ si = sk_PKCS7_SIGNER_INFO_value(sk, i);
560
+ rb_ary_push(ary, ossl_pkcs7si_new(si));
561
+ }
562
+
563
+ return ary;
564
+ }
565
+
566
+ static VALUE
567
+ ossl_pkcs7_add_recipient(VALUE self, VALUE recip)
568
+ {
569
+ PKCS7 *pkcs7;
570
+ PKCS7_RECIP_INFO *ri;
571
+
572
+ ri = DupPKCS7RecipientPtr(recip); /* NEED TO DUP */
573
+ GetPKCS7(self, pkcs7);
574
+ if (!PKCS7_add_recipient_info(pkcs7, ri)) {
575
+ PKCS7_RECIP_INFO_free(ri);
576
+ ossl_raise(ePKCS7Error, "Could not add recipient.");
577
+ }
578
+
579
+ return self;
580
+ }
581
+
582
+ static VALUE
583
+ ossl_pkcs7_get_recipient(VALUE self)
584
+ {
585
+ PKCS7 *pkcs7;
586
+ STACK_OF(PKCS7_RECIP_INFO) *sk;
587
+ PKCS7_RECIP_INFO *si;
588
+ int num, i;
589
+ VALUE ary;
590
+
591
+ GetPKCS7(self, pkcs7);
592
+ if (PKCS7_type_is_enveloped(pkcs7))
593
+ sk = pkcs7->d.enveloped->recipientinfo;
594
+ else if (PKCS7_type_is_signedAndEnveloped(pkcs7))
595
+ sk = pkcs7->d.signed_and_enveloped->recipientinfo;
596
+ else sk = NULL;
597
+ if (!sk) return rb_ary_new();
598
+ if ((num = sk_PKCS7_RECIP_INFO_num(sk)) < 0) {
599
+ ossl_raise(ePKCS7Error, "Negative number of recipient!");
600
+ }
601
+ ary = rb_ary_new2(num);
602
+ for (i=0; i<num; i++) {
603
+ si = sk_PKCS7_RECIP_INFO_value(sk, i);
604
+ rb_ary_push(ary, ossl_pkcs7ri_new(si));
605
+ }
606
+
607
+ return ary;
608
+ }
609
+
610
+ static VALUE
611
+ ossl_pkcs7_add_certificate(VALUE self, VALUE cert)
612
+ {
613
+ PKCS7 *pkcs7;
614
+ X509 *x509;
615
+
616
+ GetPKCS7(self, pkcs7);
617
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
618
+ if (!PKCS7_add_certificate(pkcs7, x509)){
619
+ ossl_raise(ePKCS7Error, NULL);
620
+ }
621
+
622
+ return self;
623
+ }
624
+
625
+ static STACK_OF(X509) *
626
+ pkcs7_get_certs(VALUE self)
627
+ {
628
+ PKCS7 *pkcs7;
629
+ STACK_OF(X509) *certs;
630
+ int i;
631
+
632
+ GetPKCS7(self, pkcs7);
633
+ i = OBJ_obj2nid(pkcs7->type);
634
+ switch(i){
635
+ case NID_pkcs7_signed:
636
+ certs = pkcs7->d.sign->cert;
637
+ break;
638
+ case NID_pkcs7_signedAndEnveloped:
639
+ certs = pkcs7->d.signed_and_enveloped->cert;
640
+ break;
641
+ default:
642
+ certs = NULL;
643
+ }
644
+
645
+ return certs;
646
+ }
647
+
648
+ static STACK_OF(X509_CRL) *
649
+ pkcs7_get_crls(VALUE self)
650
+ {
651
+ PKCS7 *pkcs7;
652
+ STACK_OF(X509_CRL) *crls;
653
+ int i;
654
+
655
+ GetPKCS7(self, pkcs7);
656
+ i = OBJ_obj2nid(pkcs7->type);
657
+ switch(i){
658
+ case NID_pkcs7_signed:
659
+ crls = pkcs7->d.sign->crl;
660
+ break;
661
+ case NID_pkcs7_signedAndEnveloped:
662
+ crls = pkcs7->d.signed_and_enveloped->crl;
663
+ break;
664
+ default:
665
+ crls = NULL;
666
+ }
667
+
668
+ return crls;
669
+ }
670
+
671
+ static VALUE
672
+ ossl_pkcs7_set_certs_i(RB_BLOCK_CALL_FUNC_ARGLIST(i, arg))
673
+ {
674
+ return ossl_pkcs7_add_certificate(arg, i);
675
+ }
676
+
677
+ static VALUE
678
+ ossl_pkcs7_set_certificates(VALUE self, VALUE ary)
679
+ {
680
+ STACK_OF(X509) *certs;
681
+ X509 *cert;
682
+
683
+ certs = pkcs7_get_certs(self);
684
+ while((cert = sk_X509_pop(certs))) X509_free(cert);
685
+ rb_block_call(ary, rb_intern("each"), 0, 0, ossl_pkcs7_set_certs_i, self);
686
+
687
+ return ary;
688
+ }
689
+
690
+ static VALUE
691
+ ossl_pkcs7_get_certificates(VALUE self)
692
+ {
693
+ return ossl_x509_sk2ary(pkcs7_get_certs(self));
694
+ }
695
+
696
+ static VALUE
697
+ ossl_pkcs7_add_crl(VALUE self, VALUE crl)
698
+ {
699
+ PKCS7 *pkcs7;
700
+ X509_CRL *x509crl;
701
+
702
+ GetPKCS7(self, pkcs7); /* NO DUP needed! */
703
+ x509crl = GetX509CRLPtr(crl);
704
+ if (!PKCS7_add_crl(pkcs7, x509crl)) {
705
+ ossl_raise(ePKCS7Error, NULL);
706
+ }
707
+
708
+ return self;
709
+ }
710
+
711
+ static VALUE
712
+ ossl_pkcs7_set_crls_i(RB_BLOCK_CALL_FUNC_ARGLIST(i, arg))
713
+ {
714
+ return ossl_pkcs7_add_crl(arg, i);
715
+ }
716
+
717
+ static VALUE
718
+ ossl_pkcs7_set_crls(VALUE self, VALUE ary)
719
+ {
720
+ STACK_OF(X509_CRL) *crls;
721
+ X509_CRL *crl;
722
+
723
+ crls = pkcs7_get_crls(self);
724
+ while((crl = sk_X509_CRL_pop(crls))) X509_CRL_free(crl);
725
+ rb_block_call(ary, rb_intern("each"), 0, 0, ossl_pkcs7_set_crls_i, self);
726
+
727
+ return ary;
728
+ }
729
+
730
+ static VALUE
731
+ ossl_pkcs7_get_crls(VALUE self)
732
+ {
733
+ return ossl_x509crl_sk2ary(pkcs7_get_crls(self));
734
+ }
735
+
736
+ static VALUE
737
+ ossl_pkcs7_verify(int argc, VALUE *argv, VALUE self)
738
+ {
739
+ VALUE certs, store, indata, flags;
740
+ STACK_OF(X509) *x509s;
741
+ X509_STORE *x509st;
742
+ int flg, ok, status = 0;
743
+ BIO *in, *out;
744
+ PKCS7 *p7;
745
+ VALUE data;
746
+ const char *msg;
747
+
748
+ GetPKCS7(self, p7);
749
+ rb_scan_args(argc, argv, "22", &certs, &store, &indata, &flags);
750
+ x509st = GetX509StorePtr(store);
751
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
752
+ if(NIL_P(indata)) indata = ossl_pkcs7_get_data(self);
753
+ in = NIL_P(indata) ? NULL : ossl_obj2bio(&indata);
754
+ if(NIL_P(certs)) x509s = NULL;
755
+ else{
756
+ x509s = ossl_protect_x509_ary2sk(certs, &status);
757
+ if(status){
758
+ BIO_free(in);
759
+ rb_jump_tag(status);
760
+ }
761
+ }
762
+ if(!(out = BIO_new(BIO_s_mem()))){
763
+ BIO_free(in);
764
+ sk_X509_pop_free(x509s, X509_free);
765
+ ossl_raise(ePKCS7Error, NULL);
766
+ }
767
+ ok = PKCS7_verify(p7, x509s, x509st, in, out, flg);
768
+ BIO_free(in);
769
+ sk_X509_pop_free(x509s, X509_free);
770
+ if (ok < 0) ossl_raise(ePKCS7Error, "PKCS7_verify");
771
+ msg = ERR_reason_error_string(ERR_peek_error());
772
+ ossl_pkcs7_set_err_string(self, msg ? rb_str_new2(msg) : Qnil);
773
+ ossl_clear_error();
774
+ data = ossl_membio2str(out);
775
+ ossl_pkcs7_set_data(self, data);
776
+
777
+ return (ok == 1) ? Qtrue : Qfalse;
778
+ }
779
+
780
+ static VALUE
781
+ ossl_pkcs7_decrypt(int argc, VALUE *argv, VALUE self)
782
+ {
783
+ VALUE pkey, cert, flags;
784
+ EVP_PKEY *key;
785
+ X509 *x509;
786
+ int flg;
787
+ PKCS7 *p7;
788
+ BIO *out;
789
+ VALUE str;
790
+
791
+ rb_scan_args(argc, argv, "12", &pkey, &cert, &flags);
792
+ key = GetPrivPKeyPtr(pkey); /* NO NEED TO DUP */
793
+ x509 = NIL_P(cert) ? NULL : GetX509CertPtr(cert); /* NO NEED TO DUP */
794
+ flg = NIL_P(flags) ? 0 : NUM2INT(flags);
795
+ GetPKCS7(self, p7);
796
+ if(!(out = BIO_new(BIO_s_mem())))
797
+ ossl_raise(ePKCS7Error, NULL);
798
+ if(!PKCS7_decrypt(p7, key, x509, out, flg)){
799
+ BIO_free(out);
800
+ ossl_raise(ePKCS7Error, NULL);
801
+ }
802
+ str = ossl_membio2str(out); /* out will be free */
803
+
804
+ return str;
805
+ }
806
+
807
+ static VALUE
808
+ ossl_pkcs7_add_data(VALUE self, VALUE data)
809
+ {
810
+ PKCS7 *pkcs7;
811
+ BIO *out, *in;
812
+ char buf[4096];
813
+ int len;
814
+
815
+ GetPKCS7(self, pkcs7);
816
+ if(PKCS7_type_is_signed(pkcs7)){
817
+ if(!PKCS7_content_new(pkcs7, NID_pkcs7_data))
818
+ ossl_raise(ePKCS7Error, NULL);
819
+ }
820
+ in = ossl_obj2bio(&data);
821
+ if(!(out = PKCS7_dataInit(pkcs7, NULL))) goto err;
822
+ for(;;){
823
+ if((len = BIO_read(in, buf, sizeof(buf))) <= 0)
824
+ break;
825
+ if(BIO_write(out, buf, len) != len)
826
+ goto err;
827
+ }
828
+ if(!PKCS7_dataFinal(pkcs7, out)) goto err;
829
+ ossl_pkcs7_set_data(self, Qnil);
830
+
831
+ err:
832
+ BIO_free_all(out);
833
+ BIO_free(in);
834
+ if(ERR_peek_error()){
835
+ ossl_raise(ePKCS7Error, NULL);
836
+ }
837
+
838
+ return data;
839
+ }
840
+
841
+ static VALUE
842
+ ossl_pkcs7_to_der(VALUE self)
843
+ {
844
+ PKCS7 *pkcs7;
845
+ VALUE str;
846
+ long len;
847
+ unsigned char *p;
848
+
849
+ GetPKCS7(self, pkcs7);
850
+ if((len = i2d_PKCS7(pkcs7, NULL)) <= 0)
851
+ ossl_raise(ePKCS7Error, NULL);
852
+ str = rb_str_new(0, len);
853
+ p = (unsigned char *)RSTRING_PTR(str);
854
+ if(i2d_PKCS7(pkcs7, &p) <= 0)
855
+ ossl_raise(ePKCS7Error, NULL);
856
+ ossl_str_adjust(str, p);
857
+
858
+ return str;
859
+ }
860
+
861
+ static VALUE
862
+ ossl_pkcs7_to_pem(VALUE self)
863
+ {
864
+ PKCS7 *pkcs7;
865
+ BIO *out;
866
+ VALUE str;
867
+
868
+ GetPKCS7(self, pkcs7);
869
+ if (!(out = BIO_new(BIO_s_mem()))) {
870
+ ossl_raise(ePKCS7Error, NULL);
871
+ }
872
+ if (!PEM_write_bio_PKCS7(out, pkcs7)) {
873
+ BIO_free(out);
874
+ ossl_raise(ePKCS7Error, NULL);
875
+ }
876
+ str = ossl_membio2str(out);
877
+
878
+ return str;
879
+ }
880
+
881
+ /*
882
+ * SIGNER INFO
883
+ */
884
+ static VALUE
885
+ ossl_pkcs7si_alloc(VALUE klass)
886
+ {
887
+ PKCS7_SIGNER_INFO *p7si;
888
+ VALUE obj;
889
+
890
+ obj = NewPKCS7si(klass);
891
+ if (!(p7si = PKCS7_SIGNER_INFO_new())) {
892
+ ossl_raise(ePKCS7Error, NULL);
893
+ }
894
+ SetPKCS7si(obj, p7si);
895
+
896
+ return obj;
897
+ }
898
+
899
+ static VALUE
900
+ ossl_pkcs7si_initialize(VALUE self, VALUE cert, VALUE key, VALUE digest)
901
+ {
902
+ PKCS7_SIGNER_INFO *p7si;
903
+ EVP_PKEY *pkey;
904
+ X509 *x509;
905
+ const EVP_MD *md;
906
+
907
+ pkey = GetPrivPKeyPtr(key); /* NO NEED TO DUP */
908
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
909
+ md = ossl_evp_get_digestbyname(digest);
910
+ GetPKCS7si(self, p7si);
911
+ if (!(PKCS7_SIGNER_INFO_set(p7si, x509, pkey, (EVP_MD*)md))) {
912
+ ossl_raise(ePKCS7Error, NULL);
913
+ }
914
+
915
+ return self;
916
+ }
917
+
918
+ static VALUE
919
+ ossl_pkcs7si_get_issuer(VALUE self)
920
+ {
921
+ PKCS7_SIGNER_INFO *p7si;
922
+
923
+ GetPKCS7si(self, p7si);
924
+
925
+ return ossl_x509name_new(p7si->issuer_and_serial->issuer);
926
+ }
927
+
928
+ static VALUE
929
+ ossl_pkcs7si_get_serial(VALUE self)
930
+ {
931
+ PKCS7_SIGNER_INFO *p7si;
932
+
933
+ GetPKCS7si(self, p7si);
934
+
935
+ return asn1integer_to_num(p7si->issuer_and_serial->serial);
936
+ }
937
+
938
+ static VALUE
939
+ ossl_pkcs7si_get_signed_time(VALUE self)
940
+ {
941
+ PKCS7_SIGNER_INFO *p7si;
942
+ ASN1_TYPE *asn1obj;
943
+
944
+ GetPKCS7si(self, p7si);
945
+
946
+ if (!(asn1obj = PKCS7_get_signed_attribute(p7si, NID_pkcs9_signingTime))) {
947
+ ossl_raise(ePKCS7Error, NULL);
948
+ }
949
+ if (asn1obj->type == V_ASN1_UTCTIME) {
950
+ return asn1time_to_time(asn1obj->value.utctime);
951
+ }
952
+ /*
953
+ * OR
954
+ * ossl_raise(ePKCS7Error, "...");
955
+ * ?
956
+ */
957
+
958
+ return Qnil;
959
+ }
960
+
961
+ /*
962
+ * RECIPIENT INFO
963
+ */
964
+ static VALUE
965
+ ossl_pkcs7ri_alloc(VALUE klass)
966
+ {
967
+ PKCS7_RECIP_INFO *p7ri;
968
+ VALUE obj;
969
+
970
+ obj = NewPKCS7ri(klass);
971
+ if (!(p7ri = PKCS7_RECIP_INFO_new())) {
972
+ ossl_raise(ePKCS7Error, NULL);
973
+ }
974
+ SetPKCS7ri(obj, p7ri);
975
+
976
+ return obj;
977
+ }
978
+
979
+ static VALUE
980
+ ossl_pkcs7ri_initialize(VALUE self, VALUE cert)
981
+ {
982
+ PKCS7_RECIP_INFO *p7ri;
983
+ X509 *x509;
984
+
985
+ x509 = GetX509CertPtr(cert); /* NO NEED TO DUP */
986
+ GetPKCS7ri(self, p7ri);
987
+ if (!PKCS7_RECIP_INFO_set(p7ri, x509)) {
988
+ ossl_raise(ePKCS7Error, NULL);
989
+ }
990
+
991
+ return self;
992
+ }
993
+
994
+ static VALUE
995
+ ossl_pkcs7ri_get_issuer(VALUE self)
996
+ {
997
+ PKCS7_RECIP_INFO *p7ri;
998
+
999
+ GetPKCS7ri(self, p7ri);
1000
+
1001
+ return ossl_x509name_new(p7ri->issuer_and_serial->issuer);
1002
+ }
1003
+
1004
+ static VALUE
1005
+ ossl_pkcs7ri_get_serial(VALUE self)
1006
+ {
1007
+ PKCS7_RECIP_INFO *p7ri;
1008
+
1009
+ GetPKCS7ri(self, p7ri);
1010
+
1011
+ return asn1integer_to_num(p7ri->issuer_and_serial->serial);
1012
+ }
1013
+
1014
+ static VALUE
1015
+ ossl_pkcs7ri_get_enc_key(VALUE self)
1016
+ {
1017
+ PKCS7_RECIP_INFO *p7ri;
1018
+
1019
+ GetPKCS7ri(self, p7ri);
1020
+
1021
+ return asn1str_to_str(p7ri->enc_key);
1022
+ }
1023
+
1024
+ /*
1025
+ * INIT
1026
+ */
1027
+ void
1028
+ Init_ossl_pkcs7(void)
1029
+ {
1030
+ #undef rb_intern
1031
+ #if 0
1032
+ mOSSL = rb_define_module("OpenSSL");
1033
+ eOSSLError = rb_define_class_under(mOSSL, "OpenSSLError", rb_eStandardError);
1034
+ #endif
1035
+
1036
+ cPKCS7 = rb_define_class_under(mOSSL, "PKCS7", rb_cObject);
1037
+ ePKCS7Error = rb_define_class_under(cPKCS7, "PKCS7Error", eOSSLError);
1038
+ rb_define_singleton_method(cPKCS7, "read_smime", ossl_pkcs7_s_read_smime, 1);
1039
+ rb_define_singleton_method(cPKCS7, "write_smime", ossl_pkcs7_s_write_smime, -1);
1040
+ rb_define_singleton_method(cPKCS7, "sign", ossl_pkcs7_s_sign, -1);
1041
+ rb_define_singleton_method(cPKCS7, "encrypt", ossl_pkcs7_s_encrypt, -1);
1042
+ rb_attr(cPKCS7, rb_intern("data"), 1, 0, Qfalse);
1043
+ rb_attr(cPKCS7, rb_intern("error_string"), 1, 1, Qfalse);
1044
+ rb_define_alloc_func(cPKCS7, ossl_pkcs7_alloc);
1045
+ rb_define_method(cPKCS7, "initialize_copy", ossl_pkcs7_copy, 1);
1046
+ rb_define_method(cPKCS7, "initialize", ossl_pkcs7_initialize, -1);
1047
+ rb_define_method(cPKCS7, "type=", ossl_pkcs7_set_type, 1);
1048
+ rb_define_method(cPKCS7, "type", ossl_pkcs7_get_type, 0);
1049
+ rb_define_method(cPKCS7, "detached=", ossl_pkcs7_set_detached, 1);
1050
+ rb_define_method(cPKCS7, "detached", ossl_pkcs7_get_detached, 0);
1051
+ rb_define_method(cPKCS7, "detached?", ossl_pkcs7_detached_p, 0);
1052
+ rb_define_method(cPKCS7, "cipher=", ossl_pkcs7_set_cipher, 1);
1053
+ rb_define_method(cPKCS7, "add_signer", ossl_pkcs7_add_signer, 1);
1054
+ rb_define_method(cPKCS7, "signers", ossl_pkcs7_get_signer, 0);
1055
+ rb_define_method(cPKCS7, "add_recipient", ossl_pkcs7_add_recipient, 1);
1056
+ rb_define_method(cPKCS7, "recipients", ossl_pkcs7_get_recipient, 0);
1057
+ rb_define_method(cPKCS7, "add_certificate", ossl_pkcs7_add_certificate, 1);
1058
+ rb_define_method(cPKCS7, "certificates=", ossl_pkcs7_set_certificates, 1);
1059
+ rb_define_method(cPKCS7, "certificates", ossl_pkcs7_get_certificates, 0);
1060
+ rb_define_method(cPKCS7, "add_crl", ossl_pkcs7_add_crl, 1);
1061
+ rb_define_method(cPKCS7, "crls=", ossl_pkcs7_set_crls, 1);
1062
+ rb_define_method(cPKCS7, "crls", ossl_pkcs7_get_crls, 0);
1063
+ rb_define_method(cPKCS7, "add_data", ossl_pkcs7_add_data, 1);
1064
+ rb_define_alias(cPKCS7, "data=", "add_data");
1065
+ rb_define_method(cPKCS7, "verify", ossl_pkcs7_verify, -1);
1066
+ rb_define_method(cPKCS7, "decrypt", ossl_pkcs7_decrypt, -1);
1067
+ rb_define_method(cPKCS7, "to_pem", ossl_pkcs7_to_pem, 0);
1068
+ rb_define_alias(cPKCS7, "to_s", "to_pem");
1069
+ rb_define_method(cPKCS7, "to_der", ossl_pkcs7_to_der, 0);
1070
+
1071
+ cPKCS7Signer = rb_define_class_under(cPKCS7, "SignerInfo", rb_cObject);
1072
+ rb_define_const(cPKCS7, "Signer", cPKCS7Signer);
1073
+ rb_define_alloc_func(cPKCS7Signer, ossl_pkcs7si_alloc);
1074
+ rb_define_method(cPKCS7Signer, "initialize", ossl_pkcs7si_initialize,3);
1075
+ rb_define_method(cPKCS7Signer, "issuer", ossl_pkcs7si_get_issuer, 0);
1076
+ rb_define_method(cPKCS7Signer, "serial", ossl_pkcs7si_get_serial,0);
1077
+ rb_define_method(cPKCS7Signer,"signed_time",ossl_pkcs7si_get_signed_time,0);
1078
+
1079
+ cPKCS7Recipient = rb_define_class_under(cPKCS7,"RecipientInfo",rb_cObject);
1080
+ rb_define_alloc_func(cPKCS7Recipient, ossl_pkcs7ri_alloc);
1081
+ rb_define_method(cPKCS7Recipient, "initialize", ossl_pkcs7ri_initialize,1);
1082
+ rb_define_method(cPKCS7Recipient, "issuer", ossl_pkcs7ri_get_issuer,0);
1083
+ rb_define_method(cPKCS7Recipient, "serial", ossl_pkcs7ri_get_serial,0);
1084
+ rb_define_method(cPKCS7Recipient, "enc_key", ossl_pkcs7ri_get_enc_key,0);
1085
+
1086
+ #define DefPKCS7Const(x) rb_define_const(cPKCS7, #x, INT2NUM(PKCS7_##x))
1087
+
1088
+ DefPKCS7Const(TEXT);
1089
+ DefPKCS7Const(NOCERTS);
1090
+ DefPKCS7Const(NOSIGS);
1091
+ DefPKCS7Const(NOCHAIN);
1092
+ DefPKCS7Const(NOINTERN);
1093
+ DefPKCS7Const(NOVERIFY);
1094
+ DefPKCS7Const(DETACHED);
1095
+ DefPKCS7Const(BINARY);
1096
+ DefPKCS7Const(NOATTR);
1097
+ DefPKCS7Const(NOSMIMECAP);
1098
+ }