| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257 | 
							- /**
 
-  * Javascript implementation of PKCS#7 v1.5.
 
-  *
 
-  * @author Stefan Siegl
 
-  * @author Dave Longley
 
-  *
 
-  * Copyright (c) 2012 Stefan Siegl <stesie@brokenpipe.de>
 
-  * Copyright (c) 2012-2015 Digital Bazaar, Inc.
 
-  *
 
-  * Currently this implementation only supports ContentType of EnvelopedData,
 
-  * EncryptedData, or SignedData at the root level. The top level elements may
 
-  * contain only a ContentInfo of ContentType Data, i.e. plain data. Further
 
-  * nesting is not (yet) supported.
 
-  *
 
-  * The Forge validators for PKCS #7's ASN.1 structures are available from
 
-  * a separate file pkcs7asn1.js, since those are referenced from other
 
-  * PKCS standards like PKCS #12.
 
-  */
 
- var forge = require('./forge');
 
- require('./aes');
 
- require('./asn1');
 
- require('./des');
 
- require('./oids');
 
- require('./pem');
 
- require('./pkcs7asn1');
 
- require('./random');
 
- require('./util');
 
- require('./x509');
 
- // shortcut for ASN.1 API
 
- var asn1 = forge.asn1;
 
- // shortcut for PKCS#7 API
 
- var p7 = module.exports = forge.pkcs7 = forge.pkcs7 || {};
 
- /**
 
-  * Converts a PKCS#7 message from PEM format.
 
-  *
 
-  * @param pem the PEM-formatted PKCS#7 message.
 
-  *
 
-  * @return the PKCS#7 message.
 
-  */
 
- p7.messageFromPem = function(pem) {
 
-   var msg = forge.pem.decode(pem)[0];
 
-   if(msg.type !== 'PKCS7') {
 
-     var error = new Error('Could not convert PKCS#7 message from PEM; PEM ' +
 
-       'header type is not "PKCS#7".');
 
-     error.headerType = msg.type;
 
-     throw error;
 
-   }
 
-   if(msg.procType && msg.procType.type === 'ENCRYPTED') {
 
-     throw new Error('Could not convert PKCS#7 message from PEM; PEM is encrypted.');
 
-   }
 
-   // convert DER to ASN.1 object
 
-   var obj = asn1.fromDer(msg.body);
 
-   return p7.messageFromAsn1(obj);
 
- };
 
- /**
 
-  * Converts a PKCS#7 message to PEM format.
 
-  *
 
-  * @param msg The PKCS#7 message object
 
-  * @param maxline The maximum characters per line, defaults to 64.
 
-  *
 
-  * @return The PEM-formatted PKCS#7 message.
 
-  */
 
- p7.messageToPem = function(msg, maxline) {
 
-   // convert to ASN.1, then DER, then PEM-encode
 
-   var pemObj = {
 
-     type: 'PKCS7',
 
-     body: asn1.toDer(msg.toAsn1()).getBytes()
 
-   };
 
-   return forge.pem.encode(pemObj, {maxline: maxline});
 
- };
 
- /**
 
-  * Converts a PKCS#7 message from an ASN.1 object.
 
-  *
 
-  * @param obj the ASN.1 representation of a ContentInfo.
 
-  *
 
-  * @return the PKCS#7 message.
 
-  */
 
- p7.messageFromAsn1 = function(obj) {
 
-   // validate root level ContentInfo and capture data
 
-   var capture = {};
 
-   var errors = [];
 
-   if(!asn1.validate(obj, p7.asn1.contentInfoValidator, capture, errors)) {
 
-     var error = new Error('Cannot read PKCS#7 message. ' +
 
-       'ASN.1 object is not an PKCS#7 ContentInfo.');
 
-     error.errors = errors;
 
-     throw error;
 
-   }
 
-   var contentType = asn1.derToOid(capture.contentType);
 
-   var msg;
 
-   switch(contentType) {
 
-     case forge.pki.oids.envelopedData:
 
-       msg = p7.createEnvelopedData();
 
-       break;
 
-     case forge.pki.oids.encryptedData:
 
-       msg = p7.createEncryptedData();
 
-       break;
 
-     case forge.pki.oids.signedData:
 
-       msg = p7.createSignedData();
 
-       break;
 
-     default:
 
-       throw new Error('Cannot read PKCS#7 message. ContentType with OID ' +
 
-         contentType + ' is not (yet) supported.');
 
-   }
 
-   msg.fromAsn1(capture.content.value[0]);
 
-   return msg;
 
- };
 
- p7.createSignedData = function() {
 
-   var msg = null;
 
-   msg = {
 
-     type: forge.pki.oids.signedData,
 
-     version: 1,
 
-     certificates: [],
 
-     crls: [],
 
-     // TODO: add json-formatted signer stuff here?
 
-     signers: [],
 
-     // populated during sign()
 
-     digestAlgorithmIdentifiers: [],
 
-     contentInfo: null,
 
-     signerInfos: [],
 
-     fromAsn1: function(obj) {
 
-       // validate SignedData content block and capture data.
 
-       _fromAsn1(msg, obj, p7.asn1.signedDataValidator);
 
-       msg.certificates = [];
 
-       msg.crls = [];
 
-       msg.digestAlgorithmIdentifiers = [];
 
-       msg.contentInfo = null;
 
-       msg.signerInfos = [];
 
-       if(msg.rawCapture.certificates) {
 
-         var certs = msg.rawCapture.certificates.value;
 
-         for(var i = 0; i < certs.length; ++i) {
 
-           msg.certificates.push(forge.pki.certificateFromAsn1(certs[i]));
 
-         }
 
-       }
 
-       // TODO: parse crls
 
-     },
 
-     toAsn1: function() {
 
-       // degenerate case with no content
 
-       if(!msg.contentInfo) {
 
-         msg.sign();
 
-       }
 
-       var certs = [];
 
-       for(var i = 0; i < msg.certificates.length; ++i) {
 
-         certs.push(forge.pki.certificateToAsn1(msg.certificates[i]));
 
-       }
 
-       var crls = [];
 
-       // TODO: implement CRLs
 
-       // [0] SignedData
 
-       var signedData = asn1.create(asn1.Class.CONTEXT_SPECIFIC, 0, true, [
 
-         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-           // Version
 
-           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
 
-             asn1.integerToDer(msg.version).getBytes()),
 
-           // DigestAlgorithmIdentifiers
 
-           asn1.create(
 
-             asn1.Class.UNIVERSAL, asn1.Type.SET, true,
 
-             msg.digestAlgorithmIdentifiers),
 
-           // ContentInfo
 
-           msg.contentInfo
 
-         ])
 
-       ]);
 
-       if(certs.length > 0) {
 
-         // [0] IMPLICIT ExtendedCertificatesAndCertificates OPTIONAL
 
-         signedData.value[0].value.push(
 
-           asn1.create(asn1.Class.CONTEXT_SPECIFIC, 0, true, certs));
 
-       }
 
-       if(crls.length > 0) {
 
-         // [1] IMPLICIT CertificateRevocationLists OPTIONAL
 
-         signedData.value[0].value.push(
 
-           asn1.create(asn1.Class.CONTEXT_SPECIFIC, 1, true, crls));
 
-       }
 
-       // SignerInfos
 
-       signedData.value[0].value.push(
 
-         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SET, true,
 
-           msg.signerInfos));
 
-       // ContentInfo
 
-       return asn1.create(
 
-         asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-           // ContentType
 
-           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-             asn1.oidToDer(msg.type).getBytes()),
 
-           // [0] SignedData
 
-           signedData
 
-         ]);
 
-     },
 
-     /**
 
-      * Add (another) entity to list of signers.
 
-      *
 
-      * Note: If authenticatedAttributes are provided, then, per RFC 2315,
 
-      * they must include at least two attributes: content type and
 
-      * message digest. The message digest attribute value will be
 
-      * auto-calculated during signing and will be ignored if provided.
 
-      *
 
-      * Here's an example of providing these two attributes:
 
-      *
 
-      * forge.pkcs7.createSignedData();
 
-      * p7.addSigner({
 
-      *   issuer: cert.issuer.attributes,
 
-      *   serialNumber: cert.serialNumber,
 
-      *   key: privateKey,
 
-      *   digestAlgorithm: forge.pki.oids.sha1,
 
-      *   authenticatedAttributes: [{
 
-      *     type: forge.pki.oids.contentType,
 
-      *     value: forge.pki.oids.data
 
-      *   }, {
 
-      *     type: forge.pki.oids.messageDigest
 
-      *   }]
 
-      * });
 
-      *
 
-      * TODO: Support [subjectKeyIdentifier] as signer's ID.
 
-      *
 
-      * @param signer the signer information:
 
-      *          key the signer's private key.
 
-      *          [certificate] a certificate containing the public key
 
-      *            associated with the signer's private key; use this option as
 
-      *            an alternative to specifying signer.issuer and
 
-      *            signer.serialNumber.
 
-      *          [issuer] the issuer attributes (eg: cert.issuer.attributes).
 
-      *          [serialNumber] the signer's certificate's serial number in
 
-      *           hexadecimal (eg: cert.serialNumber).
 
-      *          [digestAlgorithm] the message digest OID, as a string, to use
 
-      *            (eg: forge.pki.oids.sha1).
 
-      *          [authenticatedAttributes] an optional array of attributes
 
-      *            to also sign along with the content.
 
-      */
 
-     addSigner: function(signer) {
 
-       var issuer = signer.issuer;
 
-       var serialNumber = signer.serialNumber;
 
-       if(signer.certificate) {
 
-         var cert = signer.certificate;
 
-         if(typeof cert === 'string') {
 
-           cert = forge.pki.certificateFromPem(cert);
 
-         }
 
-         issuer = cert.issuer.attributes;
 
-         serialNumber = cert.serialNumber;
 
-       }
 
-       var key = signer.key;
 
-       if(!key) {
 
-         throw new Error(
 
-           'Could not add PKCS#7 signer; no private key specified.');
 
-       }
 
-       if(typeof key === 'string') {
 
-         key = forge.pki.privateKeyFromPem(key);
 
-       }
 
-       // ensure OID known for digest algorithm
 
-       var digestAlgorithm = signer.digestAlgorithm || forge.pki.oids.sha1;
 
-       switch(digestAlgorithm) {
 
-       case forge.pki.oids.sha1:
 
-       case forge.pki.oids.sha256:
 
-       case forge.pki.oids.sha384:
 
-       case forge.pki.oids.sha512:
 
-       case forge.pki.oids.md5:
 
-         break;
 
-       default:
 
-         throw new Error(
 
-           'Could not add PKCS#7 signer; unknown message digest algorithm: ' +
 
-           digestAlgorithm);
 
-       }
 
-       // if authenticatedAttributes is present, then the attributes
 
-       // must contain at least PKCS #9 content-type and message-digest
 
-       var authenticatedAttributes = signer.authenticatedAttributes || [];
 
-       if(authenticatedAttributes.length > 0) {
 
-         var contentType = false;
 
-         var messageDigest = false;
 
-         for(var i = 0; i < authenticatedAttributes.length; ++i) {
 
-           var attr = authenticatedAttributes[i];
 
-           if(!contentType && attr.type === forge.pki.oids.contentType) {
 
-             contentType = true;
 
-             if(messageDigest) {
 
-               break;
 
-             }
 
-             continue;
 
-           }
 
-           if(!messageDigest && attr.type === forge.pki.oids.messageDigest) {
 
-             messageDigest = true;
 
-             if(contentType) {
 
-               break;
 
-             }
 
-             continue;
 
-           }
 
-         }
 
-         if(!contentType || !messageDigest) {
 
-           throw new Error('Invalid signer.authenticatedAttributes. If ' +
 
-             'signer.authenticatedAttributes is specified, then it must ' +
 
-             'contain at least two attributes, PKCS #9 content-type and ' +
 
-             'PKCS #9 message-digest.');
 
-         }
 
-       }
 
-       msg.signers.push({
 
-         key: key,
 
-         version: 1,
 
-         issuer: issuer,
 
-         serialNumber: serialNumber,
 
-         digestAlgorithm: digestAlgorithm,
 
-         signatureAlgorithm: forge.pki.oids.rsaEncryption,
 
-         signature: null,
 
-         authenticatedAttributes: authenticatedAttributes,
 
-         unauthenticatedAttributes: []
 
-       });
 
-     },
 
-     /**
 
-      * Signs the content.
 
-      * @param options Options to apply when signing:
 
-      *    [detached] boolean. If signing should be done in detached mode. Defaults to false.
 
-      */
 
-     sign: function(options) {
 
-       options = options || {};
 
-       // auto-generate content info
 
-       if(typeof msg.content !== 'object' || msg.contentInfo === null) {
 
-         // use Data ContentInfo
 
-         msg.contentInfo = asn1.create(
 
-           asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-             // ContentType
 
-             asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-               asn1.oidToDer(forge.pki.oids.data).getBytes())
 
-           ]);
 
-         // add actual content, if present
 
-         if('content' in msg) {
 
-           var content;
 
-           if(msg.content instanceof forge.util.ByteBuffer) {
 
-             content = msg.content.bytes();
 
-           } else if(typeof msg.content === 'string') {
 
-             content = forge.util.encodeUtf8(msg.content);
 
-           }
 
-           if (options.detached) {
 
-             msg.detachedContent = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, content);
 
-           } else {
 
-             msg.contentInfo.value.push(
 
-               // [0] EXPLICIT content
 
-               asn1.create(asn1.Class.CONTEXT_SPECIFIC, 0, true, [
 
-                 asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false,
 
-                   content)
 
-               ]));
 
-           }
 
-         }
 
-       }
 
-       // no signers, return early (degenerate case for certificate container)
 
-       if(msg.signers.length === 0) {
 
-         return;
 
-       }
 
-       // generate digest algorithm identifiers
 
-       var mds = addDigestAlgorithmIds();
 
-       // generate signerInfos
 
-       addSignerInfos(mds);
 
-     },
 
-     verify: function() {
 
-       throw new Error('PKCS#7 signature verification not yet implemented.');
 
-     },
 
-     /**
 
-      * Add a certificate.
 
-      *
 
-      * @param cert the certificate to add.
 
-      */
 
-     addCertificate: function(cert) {
 
-       // convert from PEM
 
-       if(typeof cert === 'string') {
 
-         cert = forge.pki.certificateFromPem(cert);
 
-       }
 
-       msg.certificates.push(cert);
 
-     },
 
-     /**
 
-      * Add a certificate revokation list.
 
-      *
 
-      * @param crl the certificate revokation list to add.
 
-      */
 
-     addCertificateRevokationList: function(crl) {
 
-       throw new Error('PKCS#7 CRL support not yet implemented.');
 
-     }
 
-   };
 
-   return msg;
 
-   function addDigestAlgorithmIds() {
 
-     var mds = {};
 
-     for(var i = 0; i < msg.signers.length; ++i) {
 
-       var signer = msg.signers[i];
 
-       var oid = signer.digestAlgorithm;
 
-       if(!(oid in mds)) {
 
-         // content digest
 
-         mds[oid] = forge.md[forge.pki.oids[oid]].create();
 
-       }
 
-       if(signer.authenticatedAttributes.length === 0) {
 
-         // no custom attributes to digest; use content message digest
 
-         signer.md = mds[oid];
 
-       } else {
 
-         // custom attributes to be digested; use own message digest
 
-         // TODO: optimize to just copy message digest state if that
 
-         // feature is ever supported with message digests
 
-         signer.md = forge.md[forge.pki.oids[oid]].create();
 
-       }
 
-     }
 
-     // add unique digest algorithm identifiers
 
-     msg.digestAlgorithmIdentifiers = [];
 
-     for(var oid in mds) {
 
-       msg.digestAlgorithmIdentifiers.push(
 
-         // AlgorithmIdentifier
 
-         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-           // algorithm
 
-           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-             asn1.oidToDer(oid).getBytes()),
 
-           // parameters (null)
 
-           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '')
 
-         ]));
 
-     }
 
-     return mds;
 
-   }
 
-   function addSignerInfos(mds) {
 
-     var content;
 
-     if (msg.detachedContent) {
 
-       // Signature has been made in detached mode.
 
-       content = msg.detachedContent;
 
-     } else {
 
-       // Note: ContentInfo is a SEQUENCE with 2 values, second value is
 
-       // the content field and is optional for a ContentInfo but required here
 
-       // since signers are present
 
-       // get ContentInfo content
 
-       content = msg.contentInfo.value[1];
 
-       // skip [0] EXPLICIT content wrapper
 
-       content = content.value[0];
 
-     }
 
-     if(!content) {
 
-       throw new Error(
 
-         'Could not sign PKCS#7 message; there is no content to sign.');
 
-     }
 
-     // get ContentInfo content type
 
-     var contentType = asn1.derToOid(msg.contentInfo.value[0].value);
 
-     // serialize content
 
-     var bytes = asn1.toDer(content);
 
-     // skip identifier and length per RFC 2315 9.3
 
-     // skip identifier (1 byte)
 
-     bytes.getByte();
 
-     // read and discard length bytes
 
-     asn1.getBerValueLength(bytes);
 
-     bytes = bytes.getBytes();
 
-     // digest content DER value bytes
 
-     for(var oid in mds) {
 
-       mds[oid].start().update(bytes);
 
-     }
 
-     // sign content
 
-     var signingTime = new Date();
 
-     for(var i = 0; i < msg.signers.length; ++i) {
 
-       var signer = msg.signers[i];
 
-       if(signer.authenticatedAttributes.length === 0) {
 
-         // if ContentInfo content type is not "Data", then
 
-         // authenticatedAttributes must be present per RFC 2315
 
-         if(contentType !== forge.pki.oids.data) {
 
-           throw new Error(
 
-             'Invalid signer; authenticatedAttributes must be present ' +
 
-             'when the ContentInfo content type is not PKCS#7 Data.');
 
-         }
 
-       } else {
 
-         // process authenticated attributes
 
-         // [0] IMPLICIT
 
-         signer.authenticatedAttributesAsn1 = asn1.create(
 
-           asn1.Class.CONTEXT_SPECIFIC, 0, true, []);
 
-         // per RFC 2315, attributes are to be digested using a SET container
 
-         // not the above [0] IMPLICIT container
 
-         var attrsAsn1 = asn1.create(
 
-           asn1.Class.UNIVERSAL, asn1.Type.SET, true, []);
 
-         for(var ai = 0; ai < signer.authenticatedAttributes.length; ++ai) {
 
-           var attr = signer.authenticatedAttributes[ai];
 
-           if(attr.type === forge.pki.oids.messageDigest) {
 
-             // use content message digest as value
 
-             attr.value = mds[signer.digestAlgorithm].digest();
 
-           } else if(attr.type === forge.pki.oids.signingTime) {
 
-             // auto-populate signing time if not already set
 
-             if(!attr.value) {
 
-               attr.value = signingTime;
 
-             }
 
-           }
 
-           // convert to ASN.1 and push onto Attributes SET (for signing) and
 
-           // onto authenticatedAttributesAsn1 to complete SignedData ASN.1
 
-           // TODO: optimize away duplication
 
-           attrsAsn1.value.push(_attributeToAsn1(attr));
 
-           signer.authenticatedAttributesAsn1.value.push(_attributeToAsn1(attr));
 
-         }
 
-         // DER-serialize and digest SET OF attributes only
 
-         bytes = asn1.toDer(attrsAsn1).getBytes();
 
-         signer.md.start().update(bytes);
 
-       }
 
-       // sign digest
 
-       signer.signature = signer.key.sign(signer.md, 'RSASSA-PKCS1-V1_5');
 
-     }
 
-     // add signer info
 
-     msg.signerInfos = _signersToAsn1(msg.signers);
 
-   }
 
- };
 
- /**
 
-  * Creates an empty PKCS#7 message of type EncryptedData.
 
-  *
 
-  * @return the message.
 
-  */
 
- p7.createEncryptedData = function() {
 
-   var msg = null;
 
-   msg = {
 
-     type: forge.pki.oids.encryptedData,
 
-     version: 0,
 
-     encryptedContent: {
 
-       algorithm: forge.pki.oids['aes256-CBC']
 
-     },
 
-     /**
 
-      * Reads an EncryptedData content block (in ASN.1 format)
 
-      *
 
-      * @param obj The ASN.1 representation of the EncryptedData content block
 
-      */
 
-     fromAsn1: function(obj) {
 
-       // Validate EncryptedData content block and capture data.
 
-       _fromAsn1(msg, obj, p7.asn1.encryptedDataValidator);
 
-     },
 
-     /**
 
-      * Decrypt encrypted content
 
-      *
 
-      * @param key The (symmetric) key as a byte buffer
 
-      */
 
-     decrypt: function(key) {
 
-       if(key !== undefined) {
 
-         msg.encryptedContent.key = key;
 
-       }
 
-       _decryptContent(msg);
 
-     }
 
-   };
 
-   return msg;
 
- };
 
- /**
 
-  * Creates an empty PKCS#7 message of type EnvelopedData.
 
-  *
 
-  * @return the message.
 
-  */
 
- p7.createEnvelopedData = function() {
 
-   var msg = null;
 
-   msg = {
 
-     type: forge.pki.oids.envelopedData,
 
-     version: 0,
 
-     recipients: [],
 
-     encryptedContent: {
 
-       algorithm: forge.pki.oids['aes256-CBC']
 
-     },
 
-     /**
 
-      * Reads an EnvelopedData content block (in ASN.1 format)
 
-      *
 
-      * @param obj the ASN.1 representation of the EnvelopedData content block.
 
-      */
 
-     fromAsn1: function(obj) {
 
-       // validate EnvelopedData content block and capture data
 
-       var capture = _fromAsn1(msg, obj, p7.asn1.envelopedDataValidator);
 
-       msg.recipients = _recipientsFromAsn1(capture.recipientInfos.value);
 
-     },
 
-     toAsn1: function() {
 
-       // ContentInfo
 
-       return asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-         // ContentType
 
-         asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-           asn1.oidToDer(msg.type).getBytes()),
 
-         // [0] EnvelopedData
 
-         asn1.create(asn1.Class.CONTEXT_SPECIFIC, 0, true, [
 
-           asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-             // Version
 
-             asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
 
-               asn1.integerToDer(msg.version).getBytes()),
 
-             // RecipientInfos
 
-             asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SET, true,
 
-               _recipientsToAsn1(msg.recipients)),
 
-             // EncryptedContentInfo
 
-             asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true,
 
-               _encryptedContentToAsn1(msg.encryptedContent))
 
-           ])
 
-         ])
 
-       ]);
 
-     },
 
-     /**
 
-      * Find recipient by X.509 certificate's issuer.
 
-      *
 
-      * @param cert the certificate with the issuer to look for.
 
-      *
 
-      * @return the recipient object.
 
-      */
 
-     findRecipient: function(cert) {
 
-       var sAttr = cert.issuer.attributes;
 
-       for(var i = 0; i < msg.recipients.length; ++i) {
 
-         var r = msg.recipients[i];
 
-         var rAttr = r.issuer;
 
-         if(r.serialNumber !== cert.serialNumber) {
 
-           continue;
 
-         }
 
-         if(rAttr.length !== sAttr.length) {
 
-           continue;
 
-         }
 
-         var match = true;
 
-         for(var j = 0; j < sAttr.length; ++j) {
 
-           if(rAttr[j].type !== sAttr[j].type ||
 
-             rAttr[j].value !== sAttr[j].value) {
 
-             match = false;
 
-             break;
 
-           }
 
-         }
 
-         if(match) {
 
-           return r;
 
-         }
 
-       }
 
-       return null;
 
-     },
 
-     /**
 
-      * Decrypt enveloped content
 
-      *
 
-      * @param recipient The recipient object related to the private key
 
-      * @param privKey The (RSA) private key object
 
-      */
 
-     decrypt: function(recipient, privKey) {
 
-       if(msg.encryptedContent.key === undefined && recipient !== undefined &&
 
-         privKey !== undefined) {
 
-         switch(recipient.encryptedContent.algorithm) {
 
-           case forge.pki.oids.rsaEncryption:
 
-           case forge.pki.oids.desCBC:
 
-             var key = privKey.decrypt(recipient.encryptedContent.content);
 
-             msg.encryptedContent.key = forge.util.createBuffer(key);
 
-             break;
 
-           default:
 
-             throw new Error('Unsupported asymmetric cipher, ' +
 
-               'OID ' + recipient.encryptedContent.algorithm);
 
-         }
 
-       }
 
-       _decryptContent(msg);
 
-     },
 
-     /**
 
-      * Add (another) entity to list of recipients.
 
-      *
 
-      * @param cert The certificate of the entity to add.
 
-      */
 
-     addRecipient: function(cert) {
 
-       msg.recipients.push({
 
-         version: 0,
 
-         issuer: cert.issuer.attributes,
 
-         serialNumber: cert.serialNumber,
 
-         encryptedContent: {
 
-           // We simply assume rsaEncryption here, since forge.pki only
 
-           // supports RSA so far.  If the PKI module supports other
 
-           // ciphers one day, we need to modify this one as well.
 
-           algorithm: forge.pki.oids.rsaEncryption,
 
-           key: cert.publicKey
 
-         }
 
-       });
 
-     },
 
-     /**
 
-      * Encrypt enveloped content.
 
-      *
 
-      * This function supports two optional arguments, cipher and key, which
 
-      * can be used to influence symmetric encryption.  Unless cipher is
 
-      * provided, the cipher specified in encryptedContent.algorithm is used
 
-      * (defaults to AES-256-CBC).  If no key is provided, encryptedContent.key
 
-      * is (re-)used.  If that one's not set, a random key will be generated
 
-      * automatically.
 
-      *
 
-      * @param [key] The key to be used for symmetric encryption.
 
-      * @param [cipher] The OID of the symmetric cipher to use.
 
-      */
 
-     encrypt: function(key, cipher) {
 
-       // Part 1: Symmetric encryption
 
-       if(msg.encryptedContent.content === undefined) {
 
-         cipher = cipher || msg.encryptedContent.algorithm;
 
-         key = key || msg.encryptedContent.key;
 
-         var keyLen, ivLen, ciphFn;
 
-         switch(cipher) {
 
-           case forge.pki.oids['aes128-CBC']:
 
-             keyLen = 16;
 
-             ivLen = 16;
 
-             ciphFn = forge.aes.createEncryptionCipher;
 
-             break;
 
-           case forge.pki.oids['aes192-CBC']:
 
-             keyLen = 24;
 
-             ivLen = 16;
 
-             ciphFn = forge.aes.createEncryptionCipher;
 
-             break;
 
-           case forge.pki.oids['aes256-CBC']:
 
-             keyLen = 32;
 
-             ivLen = 16;
 
-             ciphFn = forge.aes.createEncryptionCipher;
 
-             break;
 
-           case forge.pki.oids['des-EDE3-CBC']:
 
-             keyLen = 24;
 
-             ivLen = 8;
 
-             ciphFn = forge.des.createEncryptionCipher;
 
-             break;
 
-           default:
 
-             throw new Error('Unsupported symmetric cipher, OID ' + cipher);
 
-         }
 
-         if(key === undefined) {
 
-           key = forge.util.createBuffer(forge.random.getBytes(keyLen));
 
-         } else if(key.length() != keyLen) {
 
-           throw new Error('Symmetric key has wrong length; ' +
 
-             'got ' + key.length() + ' bytes, expected ' + keyLen + '.');
 
-         }
 
-         // Keep a copy of the key & IV in the object, so the caller can
 
-         // use it for whatever reason.
 
-         msg.encryptedContent.algorithm = cipher;
 
-         msg.encryptedContent.key = key;
 
-         msg.encryptedContent.parameter = forge.util.createBuffer(
 
-           forge.random.getBytes(ivLen));
 
-         var ciph = ciphFn(key);
 
-         ciph.start(msg.encryptedContent.parameter.copy());
 
-         ciph.update(msg.content);
 
-         // The finish function does PKCS#7 padding by default, therefore
 
-         // no action required by us.
 
-         if(!ciph.finish()) {
 
-           throw new Error('Symmetric encryption failed.');
 
-         }
 
-         msg.encryptedContent.content = ciph.output;
 
-       }
 
-       // Part 2: asymmetric encryption for each recipient
 
-       for(var i = 0; i < msg.recipients.length; ++i) {
 
-         var recipient = msg.recipients[i];
 
-         // Nothing to do, encryption already done.
 
-         if(recipient.encryptedContent.content !== undefined) {
 
-           continue;
 
-         }
 
-         switch(recipient.encryptedContent.algorithm) {
 
-           case forge.pki.oids.rsaEncryption:
 
-             recipient.encryptedContent.content =
 
-               recipient.encryptedContent.key.encrypt(
 
-                 msg.encryptedContent.key.data);
 
-             break;
 
-           default:
 
-             throw new Error('Unsupported asymmetric cipher, OID ' +
 
-               recipient.encryptedContent.algorithm);
 
-         }
 
-       }
 
-     }
 
-   };
 
-   return msg;
 
- };
 
- /**
 
-  * Converts a single recipient from an ASN.1 object.
 
-  *
 
-  * @param obj the ASN.1 RecipientInfo.
 
-  *
 
-  * @return the recipient object.
 
-  */
 
- function _recipientFromAsn1(obj) {
 
-   // validate EnvelopedData content block and capture data
 
-   var capture = {};
 
-   var errors = [];
 
-   if(!asn1.validate(obj, p7.asn1.recipientInfoValidator, capture, errors)) {
 
-     var error = new Error('Cannot read PKCS#7 RecipientInfo. ' +
 
-       'ASN.1 object is not an PKCS#7 RecipientInfo.');
 
-     error.errors = errors;
 
-     throw error;
 
-   }
 
-   return {
 
-     version: capture.version.charCodeAt(0),
 
-     issuer: forge.pki.RDNAttributesAsArray(capture.issuer),
 
-     serialNumber: forge.util.createBuffer(capture.serial).toHex(),
 
-     encryptedContent: {
 
-       algorithm: asn1.derToOid(capture.encAlgorithm),
 
-       parameter: capture.encParameter.value,
 
-       content: capture.encKey
 
-     }
 
-   };
 
- }
 
- /**
 
-  * Converts a single recipient object to an ASN.1 object.
 
-  *
 
-  * @param obj the recipient object.
 
-  *
 
-  * @return the ASN.1 RecipientInfo.
 
-  */
 
- function _recipientToAsn1(obj) {
 
-   return asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-     // Version
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
 
-       asn1.integerToDer(obj.version).getBytes()),
 
-     // IssuerAndSerialNumber
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-       // Name
 
-       forge.pki.distinguishedNameToAsn1({attributes: obj.issuer}),
 
-       // Serial
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
 
-         forge.util.hexToBytes(obj.serialNumber))
 
-     ]),
 
-     // KeyEncryptionAlgorithmIdentifier
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-       // Algorithm
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-         asn1.oidToDer(obj.encryptedContent.algorithm).getBytes()),
 
-       // Parameter, force NULL, only RSA supported for now.
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '')
 
-     ]),
 
-     // EncryptedKey
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false,
 
-       obj.encryptedContent.content)
 
-   ]);
 
- }
 
- /**
 
-  * Map a set of RecipientInfo ASN.1 objects to recipient objects.
 
-  *
 
-  * @param infos an array of ASN.1 representations RecipientInfo (i.e. SET OF).
 
-  *
 
-  * @return an array of recipient objects.
 
-  */
 
- function _recipientsFromAsn1(infos) {
 
-   var ret = [];
 
-   for(var i = 0; i < infos.length; ++i) {
 
-     ret.push(_recipientFromAsn1(infos[i]));
 
-   }
 
-   return ret;
 
- }
 
- /**
 
-  * Map an array of recipient objects to ASN.1 RecipientInfo objects.
 
-  *
 
-  * @param recipients an array of recipientInfo objects.
 
-  *
 
-  * @return an array of ASN.1 RecipientInfos.
 
-  */
 
- function _recipientsToAsn1(recipients) {
 
-   var ret = [];
 
-   for(var i = 0; i < recipients.length; ++i) {
 
-     ret.push(_recipientToAsn1(recipients[i]));
 
-   }
 
-   return ret;
 
- }
 
- /**
 
-  * Converts a single signer from an ASN.1 object.
 
-  *
 
-  * @param obj the ASN.1 representation of a SignerInfo.
 
-  *
 
-  * @return the signer object.
 
-  */
 
- function _signerFromAsn1(obj) {
 
-   // validate EnvelopedData content block and capture data
 
-   var capture = {};
 
-   var errors = [];
 
-   if(!asn1.validate(obj, p7.asn1.signerInfoValidator, capture, errors)) {
 
-     var error = new Error('Cannot read PKCS#7 SignerInfo. ' +
 
-       'ASN.1 object is not an PKCS#7 SignerInfo.');
 
-     error.errors = errors;
 
-     throw error;
 
-   }
 
-   var rval = {
 
-     version: capture.version.charCodeAt(0),
 
-     issuer: forge.pki.RDNAttributesAsArray(capture.issuer),
 
-     serialNumber: forge.util.createBuffer(capture.serial).toHex(),
 
-     digestAlgorithm: asn1.derToOid(capture.digestAlgorithm),
 
-     signatureAlgorithm: asn1.derToOid(capture.signatureAlgorithm),
 
-     signature: capture.signature,
 
-     authenticatedAttributes: [],
 
-     unauthenticatedAttributes: []
 
-   };
 
-   // TODO: convert attributes
 
-   var authenticatedAttributes = capture.authenticatedAttributes || [];
 
-   var unauthenticatedAttributes = capture.unauthenticatedAttributes || [];
 
-   return rval;
 
- }
 
- /**
 
-  * Converts a single signerInfo object to an ASN.1 object.
 
-  *
 
-  * @param obj the signerInfo object.
 
-  *
 
-  * @return the ASN.1 representation of a SignerInfo.
 
-  */
 
- function _signerToAsn1(obj) {
 
-   // SignerInfo
 
-   var rval = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-     // version
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
 
-       asn1.integerToDer(obj.version).getBytes()),
 
-     // issuerAndSerialNumber
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-       // name
 
-       forge.pki.distinguishedNameToAsn1({attributes: obj.issuer}),
 
-       // serial
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.INTEGER, false,
 
-         forge.util.hexToBytes(obj.serialNumber))
 
-     ]),
 
-     // digestAlgorithm
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-       // algorithm
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-         asn1.oidToDer(obj.digestAlgorithm).getBytes()),
 
-       // parameters (null)
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '')
 
-     ])
 
-   ]);
 
-   // authenticatedAttributes (OPTIONAL)
 
-   if(obj.authenticatedAttributesAsn1) {
 
-     // add ASN.1 previously generated during signing
 
-     rval.value.push(obj.authenticatedAttributesAsn1);
 
-   }
 
-   // digestEncryptionAlgorithm
 
-   rval.value.push(asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-     // algorithm
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-       asn1.oidToDer(obj.signatureAlgorithm).getBytes()),
 
-     // parameters (null)
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.NULL, false, '')
 
-   ]));
 
-   // encryptedDigest
 
-   rval.value.push(asn1.create(
 
-     asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false, obj.signature));
 
-   // unauthenticatedAttributes (OPTIONAL)
 
-   if(obj.unauthenticatedAttributes.length > 0) {
 
-     // [1] IMPLICIT
 
-     var attrsAsn1 = asn1.create(asn1.Class.CONTEXT_SPECIFIC, 1, true, []);
 
-     for(var i = 0; i < obj.unauthenticatedAttributes.length; ++i) {
 
-       var attr = obj.unauthenticatedAttributes[i];
 
-       attrsAsn1.values.push(_attributeToAsn1(attr));
 
-     }
 
-     rval.value.push(attrsAsn1);
 
-   }
 
-   return rval;
 
- }
 
- /**
 
-  * Map a set of SignerInfo ASN.1 objects to an array of signer objects.
 
-  *
 
-  * @param signerInfoAsn1s an array of ASN.1 SignerInfos (i.e. SET OF).
 
-  *
 
-  * @return an array of signers objects.
 
-  */
 
- function _signersFromAsn1(signerInfoAsn1s) {
 
-   var ret = [];
 
-   for(var i = 0; i < signerInfoAsn1s.length; ++i) {
 
-     ret.push(_signerFromAsn1(signerInfoAsn1s[i]));
 
-   }
 
-   return ret;
 
- }
 
- /**
 
-  * Map an array of signer objects to ASN.1 objects.
 
-  *
 
-  * @param signers an array of signer objects.
 
-  *
 
-  * @return an array of ASN.1 SignerInfos.
 
-  */
 
- function _signersToAsn1(signers) {
 
-   var ret = [];
 
-   for(var i = 0; i < signers.length; ++i) {
 
-     ret.push(_signerToAsn1(signers[i]));
 
-   }
 
-   return ret;
 
- }
 
- /**
 
-  * Convert an attribute object to an ASN.1 Attribute.
 
-  *
 
-  * @param attr the attribute object.
 
-  *
 
-  * @return the ASN.1 Attribute.
 
-  */
 
- function _attributeToAsn1(attr) {
 
-   var value;
 
-   // TODO: generalize to support more attributes
 
-   if(attr.type === forge.pki.oids.contentType) {
 
-     value = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-       asn1.oidToDer(attr.value).getBytes());
 
-   } else if(attr.type === forge.pki.oids.messageDigest) {
 
-     value = asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false,
 
-       attr.value.bytes());
 
-   } else if(attr.type === forge.pki.oids.signingTime) {
 
-     /* Note per RFC 2985: Dates between 1 January 1950 and 31 December 2049
 
-       (inclusive) MUST be encoded as UTCTime. Any dates with year values
 
-       before 1950 or after 2049 MUST be encoded as GeneralizedTime. [Further,]
 
-       UTCTime values MUST be expressed in Greenwich Mean Time (Zulu) and MUST
 
-       include seconds (i.e., times are YYMMDDHHMMSSZ), even where the
 
-       number of seconds is zero.  Midnight (GMT) must be represented as
 
-       "YYMMDD000000Z". */
 
-     // TODO: make these module-level constants
 
-     var jan_1_1950 = new Date('1950-01-01T00:00:00Z');
 
-     var jan_1_2050 = new Date('2050-01-01T00:00:00Z');
 
-     var date = attr.value;
 
-     if(typeof date === 'string') {
 
-       // try to parse date
 
-       var timestamp = Date.parse(date);
 
-       if(!isNaN(timestamp)) {
 
-         date = new Date(timestamp);
 
-       } else if(date.length === 13) {
 
-         // YYMMDDHHMMSSZ (13 chars for UTCTime)
 
-         date = asn1.utcTimeToDate(date);
 
-       } else {
 
-         // assume generalized time
 
-         date = asn1.generalizedTimeToDate(date);
 
-       }
 
-     }
 
-     if(date >= jan_1_1950 && date < jan_1_2050) {
 
-       value = asn1.create(
 
-         asn1.Class.UNIVERSAL, asn1.Type.UTCTIME, false,
 
-         asn1.dateToUtcTime(date));
 
-     } else {
 
-       value = asn1.create(
 
-         asn1.Class.UNIVERSAL, asn1.Type.GENERALIZEDTIME, false,
 
-         asn1.dateToGeneralizedTime(date));
 
-     }
 
-   }
 
-   // TODO: expose as common API call
 
-   // create a RelativeDistinguishedName set
 
-   // each value in the set is an AttributeTypeAndValue first
 
-   // containing the type (an OID) and second the value
 
-   return asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-     // AttributeType
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-       asn1.oidToDer(attr.type).getBytes()),
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SET, true, [
 
-       // AttributeValue
 
-       value
 
-     ])
 
-   ]);
 
- }
 
- /**
 
-  * Map messages encrypted content to ASN.1 objects.
 
-  *
 
-  * @param ec The encryptedContent object of the message.
 
-  *
 
-  * @return ASN.1 representation of the encryptedContent object (SEQUENCE).
 
-  */
 
- function _encryptedContentToAsn1(ec) {
 
-   return [
 
-     // ContentType, always Data for the moment
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-       asn1.oidToDer(forge.pki.oids.data).getBytes()),
 
-     // ContentEncryptionAlgorithmIdentifier
 
-     asn1.create(asn1.Class.UNIVERSAL, asn1.Type.SEQUENCE, true, [
 
-       // Algorithm
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OID, false,
 
-         asn1.oidToDer(ec.algorithm).getBytes()),
 
-       // Parameters (IV)
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false,
 
-         ec.parameter.getBytes())
 
-     ]),
 
-     // [0] EncryptedContent
 
-     asn1.create(asn1.Class.CONTEXT_SPECIFIC, 0, true, [
 
-       asn1.create(asn1.Class.UNIVERSAL, asn1.Type.OCTETSTRING, false,
 
-         ec.content.getBytes())
 
-     ])
 
-   ];
 
- }
 
- /**
 
-  * Reads the "common part" of an PKCS#7 content block (in ASN.1 format)
 
-  *
 
-  * This function reads the "common part" of the PKCS#7 content blocks
 
-  * EncryptedData and EnvelopedData, i.e. version number and symmetrically
 
-  * encrypted content block.
 
-  *
 
-  * The result of the ASN.1 validate and capture process is returned
 
-  * to allow the caller to extract further data, e.g. the list of recipients
 
-  * in case of a EnvelopedData object.
 
-  *
 
-  * @param msg the PKCS#7 object to read the data to.
 
-  * @param obj the ASN.1 representation of the content block.
 
-  * @param validator the ASN.1 structure validator object to use.
 
-  *
 
-  * @return the value map captured by validator object.
 
-  */
 
- function _fromAsn1(msg, obj, validator) {
 
-   var capture = {};
 
-   var errors = [];
 
-   if(!asn1.validate(obj, validator, capture, errors)) {
 
-     var error = new Error('Cannot read PKCS#7 message. ' +
 
-       'ASN.1 object is not a supported PKCS#7 message.');
 
-     error.errors = error;
 
-     throw error;
 
-   }
 
-   // Check contentType, so far we only support (raw) Data.
 
-   var contentType = asn1.derToOid(capture.contentType);
 
-   if(contentType !== forge.pki.oids.data) {
 
-     throw new Error('Unsupported PKCS#7 message. ' +
 
-       'Only wrapped ContentType Data supported.');
 
-   }
 
-   if(capture.encryptedContent) {
 
-     var content = '';
 
-     if(forge.util.isArray(capture.encryptedContent)) {
 
-       for(var i = 0; i < capture.encryptedContent.length; ++i) {
 
-         if(capture.encryptedContent[i].type !== asn1.Type.OCTETSTRING) {
 
-           throw new Error('Malformed PKCS#7 message, expecting encrypted ' +
 
-             'content constructed of only OCTET STRING objects.');
 
-         }
 
-         content += capture.encryptedContent[i].value;
 
-       }
 
-     } else {
 
-       content = capture.encryptedContent;
 
-     }
 
-     msg.encryptedContent = {
 
-       algorithm: asn1.derToOid(capture.encAlgorithm),
 
-       parameter: forge.util.createBuffer(capture.encParameter.value),
 
-       content: forge.util.createBuffer(content)
 
-     };
 
-   }
 
-   if(capture.content) {
 
-     var content = '';
 
-     if(forge.util.isArray(capture.content)) {
 
-       for(var i = 0; i < capture.content.length; ++i) {
 
-         if(capture.content[i].type !== asn1.Type.OCTETSTRING) {
 
-           throw new Error('Malformed PKCS#7 message, expecting ' +
 
-             'content constructed of only OCTET STRING objects.');
 
-         }
 
-         content += capture.content[i].value;
 
-       }
 
-     } else {
 
-       content = capture.content;
 
-     }
 
-     msg.content = forge.util.createBuffer(content);
 
-   }
 
-   msg.version = capture.version.charCodeAt(0);
 
-   msg.rawCapture = capture;
 
-   return capture;
 
- }
 
- /**
 
-  * Decrypt the symmetrically encrypted content block of the PKCS#7 message.
 
-  *
 
-  * Decryption is skipped in case the PKCS#7 message object already has a
 
-  * (decrypted) content attribute.  The algorithm, key and cipher parameters
 
-  * (probably the iv) are taken from the encryptedContent attribute of the
 
-  * message object.
 
-  *
 
-  * @param The PKCS#7 message object.
 
-  */
 
- function _decryptContent(msg) {
 
-   if(msg.encryptedContent.key === undefined) {
 
-     throw new Error('Symmetric key not available.');
 
-   }
 
-   if(msg.content === undefined) {
 
-     var ciph;
 
-     switch(msg.encryptedContent.algorithm) {
 
-       case forge.pki.oids['aes128-CBC']:
 
-       case forge.pki.oids['aes192-CBC']:
 
-       case forge.pki.oids['aes256-CBC']:
 
-         ciph = forge.aes.createDecryptionCipher(msg.encryptedContent.key);
 
-         break;
 
-       case forge.pki.oids['desCBC']:
 
-       case forge.pki.oids['des-EDE3-CBC']:
 
-         ciph = forge.des.createDecryptionCipher(msg.encryptedContent.key);
 
-         break;
 
-       default:
 
-         throw new Error('Unsupported symmetric cipher, OID ' +
 
-           msg.encryptedContent.algorithm);
 
-     }
 
-     ciph.start(msg.encryptedContent.parameter);
 
-     ciph.update(msg.encryptedContent.content);
 
-     if(!ciph.finish()) {
 
-       throw new Error('Symmetric decryption failed.');
 
-     }
 
-     msg.content = ciph.output;
 
-   }
 
- }
 
 
  |