2002-10-09 20:06:12 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2020-07-25 17:11:03 +08:00
|
|
|
SMIME_read_PKCS7_ex, SMIME_read_PKCS7 - parse S/MIME message
|
2002-10-09 20:06:12 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
2006-05-14 19:28:00 +08:00
|
|
|
#include <openssl/pkcs7.h>
|
|
|
|
|
2020-07-25 17:11:03 +08:00
|
|
|
PKCS7 *SMIME_read_PKCS7_ex(BIO *bio, BIO **bcont, PKCS7 **p7);
|
2006-05-14 19:28:00 +08:00
|
|
|
PKCS7 *SMIME_read_PKCS7(BIO *in, BIO **bcont);
|
2002-10-09 20:06:12 +08:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
SMIME_read_PKCS7() parses a message in S/MIME format.
|
|
|
|
|
|
|
|
B<in> is a BIO to read the message from.
|
|
|
|
|
|
|
|
If cleartext signing is used then the content is saved in
|
|
|
|
a memory bio which is written to B<*bcont>, otherwise
|
|
|
|
B<*bcont> is set to B<NULL>.
|
|
|
|
|
|
|
|
The parsed PKCS#7 structure is returned or B<NULL> if an
|
|
|
|
error occurred.
|
|
|
|
|
2020-07-25 17:11:03 +08:00
|
|
|
SMIME_read_PKCS7_ex() is similar to SMIME_read_PKCS7() but can optionally supply
|
|
|
|
a previously created I<p7> PKCS#7 object. If I<p7> is NULL then it is identical
|
|
|
|
to SMIME_read_PKCS7().
|
|
|
|
To create a I<p7> object use L<PKCS7_new_with_libctx(3)>.
|
|
|
|
|
2002-10-09 20:06:12 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
If B<*bcont> is not B<NULL> then the message is clear text
|
|
|
|
signed. B<*bcont> can then be passed to PKCS7_verify() with
|
|
|
|
the B<PKCS7_DETACHED> flag set.
|
|
|
|
|
|
|
|
Otherwise the type of the returned structure can be determined
|
2017-03-11 21:56:44 +08:00
|
|
|
using PKCS7_type_is_enveloped(), etc.
|
2002-10-09 20:06:12 +08:00
|
|
|
|
|
|
|
To support future functionality if B<bcont> is not B<NULL>
|
|
|
|
B<*bcont> should be initialized to B<NULL>. For example:
|
|
|
|
|
|
|
|
BIO *cont = NULL;
|
|
|
|
PKCS7 *p7;
|
|
|
|
|
|
|
|
p7 = SMIME_read_PKCS7(in, &cont);
|
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
|
|
|
The MIME parser used by SMIME_read_PKCS7() is somewhat primitive.
|
|
|
|
While it will handle most S/MIME messages more complex compound
|
|
|
|
formats may not work.
|
|
|
|
|
|
|
|
The parser assumes that the PKCS7 structure is always base64
|
|
|
|
encoded and will not handle the case where it is in binary format
|
|
|
|
or uses quoted printable format.
|
|
|
|
|
|
|
|
The use of a memory BIO to hold the signed content limits the size
|
|
|
|
of message which can be processed due to memory restraints: a
|
|
|
|
streaming single pass option should be available.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2020-07-25 17:11:03 +08:00
|
|
|
SMIME_read_PKCS7_ex() and SMIME_read_PKCS7() return a valid B<PKCS7> structure
|
|
|
|
or B<NULL> if an error occurred. The error can be obtained from ERR_get_error(3).
|
2002-10-09 20:06:12 +08:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2017-03-11 21:56:44 +08:00
|
|
|
L<ERR_get_error(3)>,
|
2015-08-18 03:21:33 +08:00
|
|
|
L<SMIME_read_PKCS7(3)>, L<PKCS7_sign(3)>,
|
|
|
|
L<PKCS7_verify(3)>, L<PKCS7_encrypt(3)>
|
|
|
|
L<PKCS7_decrypt(3)>
|
2002-10-09 20:06:12 +08:00
|
|
|
|
2020-07-25 17:11:03 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
The function SMIME_read_PKCS7_ex() was added in OpenSSL 3.0.
|
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-07-25 17:11:03 +08:00
|
|
|
Copyright 2002-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|