PKCS7_sign.pod 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103
  1. =pod
  2. =head1 NAME
  3. PKCS7_sign - create a PKCS#7 signedData structure
  4. =head1 SYNOPSIS
  5. #include <openssl/pkcs7.h>
  6. PKCS7 *PKCS7_sign(X509 *signcert, EVP_PKEY *pkey, STACK_OF(X509) *certs, BIO *data, int flags);
  7. =head1 DESCRIPTION
  8. PKCS7_sign() creates and returns a PKCS#7 signedData structure. B<signcert>
  9. is the certificate to sign with, B<pkey> is the corresponsding private key.
  10. B<certs> is an optional additional set of certificates to include in the
  11. PKCS#7 structure (for example any intermediate CAs in the chain).
  12. The data to be signed is read from BIO B<data>.
  13. B<flags> is an optional set of flags.
  14. =head1 NOTES
  15. Any of the following flags (ored together) can be passed in the B<flags> parameter.
  16. Many S/MIME clients expect the signed content to include valid MIME headers. If
  17. the B<PKCS7_TEXT> flag is set MIME headers for type B<text/plain> are prepended
  18. to the data.
  19. If B<PKCS7_NOCERTS> is set the signer's certificate will not be included in the
  20. PKCS7 structure, the signer's certificate must still be supplied in the B<signcert>
  21. parameter though. This can reduce the size of the signature if the signers certificate
  22. can be obtained by other means: for example a previously signed message.
  23. The data being signed is included in the PKCS7 structure, unless B<PKCS7_DETACHED>
  24. is set in which case it is omitted. This is used for PKCS7 detached signatures
  25. which are used in S/MIME plaintext signed messages for example.
  26. Normally the supplied content is translated into MIME canonical format (as required
  27. by the S/MIME specifications) if B<PKCS7_BINARY> is set no translation occurs. This
  28. option should be used if the supplied data is in binary format otherwise the translation
  29. will corrupt it.
  30. The signedData structure includes several PKCS#7 autenticatedAttributes including
  31. the signing time, the PKCS#7 content type and the supported list of ciphers in
  32. an SMIMECapabilities attribute. If B<PKCS7_NOATTR> is set then no authenticatedAttributes
  33. will be used. If B<PKCS7_NOSMIMECAP> is set then just the SMIMECapabilities are
  34. omitted.
  35. If present the SMIMECapabilities attribute indicates support for the following
  36. algorithms: triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2. If any
  37. of these algorithms is disabled then it will not be included.
  38. If the flags B<PKCS7_PARTSIGN> is set then the returned B<PKCS7> structure
  39. is just initialized ready to perform the signing operation. The signing
  40. is however B<not> performed and the data to be signed is not read from
  41. the B<data> parameter. Signing is deferred until after the data has been
  42. written. In this way data can be signed in a single pass. Currently the
  43. flag B<PKCS7_DETACHED> B<must> also be set.
  44. =head1 NOTES
  45. Currently the flag B<PKCS7_PARTSIGN> is only supported for detached
  46. data. If this flag is set the returned B<PKCS7> structure is B<not>
  47. complete and outputting its contents via a function that does not
  48. properly finalize the B<PKCS7> structure will give unpredictable
  49. results.
  50. At present only the SMIME_write_PKCS7() function properly finalizes the
  51. structure.
  52. =head1 BUGS
  53. PKCS7_sign() is somewhat limited. It does not support multiple signers, some
  54. advanced attributes such as counter signatures are not supported.
  55. The SHA1 digest algorithm is currently always used.
  56. When the signed data is not detached it will be stored in memory within the
  57. B<PKCS7> structure. This effectively limits the size of messages which can be
  58. signed due to memory restraints. There should be a way to sign data without
  59. having to hold it all in memory, this would however require fairly major
  60. revisions of the OpenSSL ASN1 code.
  61. =head1 RETURN VALUES
  62. PKCS7_sign() returns either a valid PKCS7 structure or NULL if an error occurred.
  63. The error can be obtained from ERR_get_error(3).
  64. =head1 SEE ALSO
  65. L<ERR_get_error(3)|ERR_get_error(3)>, L<PKCS7_verify(3)|PKCS7_verify(3)>
  66. =head1 HISTORY
  67. PKCS7_sign() was added to OpenSSL 0.9.5
  68. The B<PKCS7_PARTSIGN> flag was added in OpenSSL 0.9.8
  69. =cut