2008-04-09 06:27:10 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2009-03-08 20:01:20 +08:00
|
|
|
CMS_sign_add1_signer, CMS_SignerInfo_sign - add a signer to a CMS_ContentInfo signed data structure.
|
2008-04-09 06:27:10 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/cms.h>
|
|
|
|
|
2008-04-09 06:44:56 +08:00
|
|
|
CMS_SignerInfo *CMS_sign_add1_signer(CMS_ContentInfo *cms, X509 *signcert, EVP_PKEY *pkey, const EVP_MD *md, unsigned int flags);
|
2008-04-09 06:27:10 +08:00
|
|
|
|
2008-04-11 07:28:25 +08:00
|
|
|
int CMS_SignerInfo_sign(CMS_SignerInfo *si);
|
2008-04-09 06:27:10 +08:00
|
|
|
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
CMS_sign_add1_signer() adds a signer with certificate B<signcert> and private
|
2008-04-11 07:28:25 +08:00
|
|
|
key B<pkey> using message digest B<md> to CMS_ContentInfo SignedData
|
2008-04-09 06:27:10 +08:00
|
|
|
structure B<cms>.
|
|
|
|
|
|
|
|
The CMS_ContentInfo structure should be obtained from an initial call to
|
|
|
|
CMS_sign() with the flag B<CMS_PARTIAL> set or in the case or re-signing a
|
2008-04-11 07:28:25 +08:00
|
|
|
valid CMS_ContentInfo SignedData structure.
|
2008-04-09 06:27:10 +08:00
|
|
|
|
|
|
|
If the B<md> parameter is B<NULL> then the default digest for the public
|
|
|
|
key algorithm will be used.
|
|
|
|
|
|
|
|
Unless the B<CMS_REUSE_DIGEST> flag is set the returned CMS_ContentInfo
|
|
|
|
structure is not complete and must be finalized either by streaming (if
|
|
|
|
applicable) or a call to CMS_final().
|
|
|
|
|
|
|
|
The CMS_SignerInfo_sign() function will explicitly sign a CMS_SignerInfo
|
|
|
|
structure, its main use is when B<CMS_REUSE_DIGEST> and B<CMS_PARTIAL> flags
|
|
|
|
are both set.
|
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
2008-04-11 07:28:25 +08:00
|
|
|
The main purpose of CMS_sign_add1_signer() is to provide finer control
|
2008-04-09 06:44:56 +08:00
|
|
|
over a CMS signed data structure where the simpler CMS_sign() function defaults
|
|
|
|
are not appropriate. For example if multiple signers or non default digest
|
2008-04-09 06:27:10 +08:00
|
|
|
algorithms are needed. New attributes can also be added using the returned
|
2008-04-10 18:46:11 +08:00
|
|
|
CMS_SignerInfo structure and the CMS attribute utility functions or the
|
2008-04-10 07:13:49 +08:00
|
|
|
CMS signed receipt request functions.
|
2008-04-09 06:27:10 +08:00
|
|
|
|
|
|
|
Any of the following flags (ored together) can be passed in the B<flags>
|
|
|
|
parameter.
|
|
|
|
|
|
|
|
If B<CMS_REUSE_DIGEST> is set then an attempt is made to copy the content
|
2008-04-10 18:46:11 +08:00
|
|
|
digest value from the CMS_ContentInfo structure: to add a signer to an existing
|
2008-04-09 06:27:10 +08:00
|
|
|
structure. An error occurs if a matching digest value cannot be found to copy.
|
|
|
|
The returned CMS_ContentInfo structure will be valid and finalized when this
|
|
|
|
flag is set.
|
|
|
|
|
|
|
|
If B<CMS_PARTIAL> is set in addition to B<CMS_REUSE_DIGEST> then the
|
2008-04-09 06:44:56 +08:00
|
|
|
CMS_SignerInfo structure will not be finalized so additional attributes
|
|
|
|
can be added. In this case an explicit call to CMS_SignerInfo_sign() is
|
2008-04-09 06:27:10 +08:00
|
|
|
needed to finalize it.
|
|
|
|
|
|
|
|
If B<CMS_NOCERTS> is set the signer's certificate will not be included in the
|
|
|
|
CMS_ContentInfo structure, the signer's certificate must still be supplied in
|
|
|
|
the B<signcert> parameter though. This can reduce the size of the signature if
|
|
|
|
the signers certificate can be obtained by other means: for example a
|
|
|
|
previously signed message.
|
|
|
|
|
2008-04-11 07:28:25 +08:00
|
|
|
The SignedData structure includes several CMS signedAttributes including the
|
2008-04-09 06:27:10 +08:00
|
|
|
signing time, the CMS content type and the supported list of ciphers in an
|
|
|
|
SMIMECapabilities attribute. If B<CMS_NOATTR> is set then no signedAttributes
|
|
|
|
will be used. If B<CMS_NOSMIMECAP> is set then just the SMIMECapabilities are
|
|
|
|
omitted.
|
|
|
|
|
|
|
|
OpenSSL will by default identify signing certificates using issuer name
|
|
|
|
and serial number. If B<CMS_USE_KEYID> is set it will use the subject key
|
|
|
|
identifier value instead. An error occurs if the signing certificate does not
|
|
|
|
have a subject key identifier extension.
|
|
|
|
|
|
|
|
If present the SMIMECapabilities attribute indicates support for the following
|
2008-04-09 06:44:56 +08:00
|
|
|
algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192
|
|
|
|
bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
|
|
|
|
If any of these algorithms is not available then it will not be included: for example the GOST algorithms will not be included if the GOST ENGINE is
|
|
|
|
not loaded.
|
2008-04-09 06:27:10 +08:00
|
|
|
|
2008-04-09 06:44:56 +08:00
|
|
|
CMS_sign_add1_signer() returns an internal pointer to the CMS_SignerInfo
|
2008-04-09 06:27:10 +08:00
|
|
|
structure just added, this can be used to set additional attributes
|
|
|
|
before it is finalized.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
CMS_sign1_add_signers() returns an internal pointer to the CMS_SignerInfo
|
|
|
|
structure just added or NULL if an error occurs.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
|
|
|
L<ERR_get_error(3)|ERR_get_error(3)>, L<CMS_sign(3)|CMS_sign(3)>,
|
|
|
|
L<CMS_final(3)|CMS_final(3)>,
|
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
2008-04-10 23:56:27 +08:00
|
|
|
CMS_sign_add1_signer() was added to OpenSSL 0.9.8
|
2008-04-09 06:27:10 +08:00
|
|
|
|
|
|
|
=cut
|