Download TSA certificates and embed their OCSP/CRL
This commit is contained in:
11
sign.go
11
sign.go
@@ -110,11 +110,6 @@ func main() {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
log.Fatal(err)
|
log.Fatal(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
chain_data_block, _ := pem.Decode(chain_data)
|
|
||||||
if chain_data_block == nil {
|
|
||||||
log.Fatal(errors.New("failed to parse PEM block containing the chain"))
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
err = sign.SignFile(input, output, sign.SignData{
|
err = sign.SignFile(input, output, sign.SignData{
|
||||||
@@ -129,11 +124,11 @@ func main() {
|
|||||||
CertType: 2,
|
CertType: 2,
|
||||||
Approval: false,
|
Approval: false,
|
||||||
},
|
},
|
||||||
Signer: pkey,
|
Signer: pkey,
|
||||||
Certificate: cert,
|
Certificate: cert,
|
||||||
CertificateChains: certificate_chains,
|
CertificateChains: certificate_chains,
|
||||||
TSA: sign.TSA{
|
TSA: sign.TSA{
|
||||||
URL: "http://aatl-timestamp.globalsign.com/tsa/aohfewat2389535fnasgnlg5m23",
|
URL: "http://aatl-timestamp.globalsign.com/tsa/aohfewat2389535fnasgnlg5m23",
|
||||||
},
|
},
|
||||||
RevocationData: revocation.InfoArchival{},
|
RevocationData: revocation.InfoArchival{},
|
||||||
RevocationFunction: sign.DefaultEmbedRevocationStatusFunction,
|
RevocationFunction: sign.DefaultEmbedRevocationStatusFunction,
|
||||||
|
@@ -12,9 +12,9 @@ import (
|
|||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
|
"crypto/x509"
|
||||||
"github.com/digitorus/pkcs7"
|
"github.com/digitorus/pkcs7"
|
||||||
"github.com/digitorus/timestamp"
|
"github.com/digitorus/timestamp"
|
||||||
"crypto/x509"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type pkiStatusInfo struct {
|
type pkiStatusInfo struct {
|
||||||
@@ -109,6 +109,8 @@ func (context *SignContext) createSignature() ([]byte, error) {
|
|||||||
|
|
||||||
signer_config := pkcs7.SignerInfoConfig{}
|
signer_config := pkcs7.SignerInfoConfig{}
|
||||||
|
|
||||||
|
TSATokenChain := make([][]*x509.Certificate, 0)
|
||||||
|
|
||||||
if context.SignData.TSA.URL != "" {
|
if context.SignData.TSA.URL != "" {
|
||||||
timestamp_response, err := context.GetTSA(sign_content)
|
timestamp_response, err := context.GetTSA(sign_content)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -128,6 +130,11 @@ func (context *SignContext) createSignature() ([]byte, error) {
|
|||||||
return nil, errors.New(fmt.Sprintf("%s: %s", timestamp.FailureInfo(resp.Status.FailInfo).String(), resp.Status.StatusString))
|
return nil, errors.New(fmt.Sprintf("%s: %s", timestamp.FailureInfo(resp.Status.FailInfo).String(), resp.Status.StatusString))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
timestamp_p7, err := pkcs7.Parse(resp.TimeStampToken.FullBytes)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
if len(resp.TimeStampToken.Bytes) == 0 {
|
if len(resp.TimeStampToken.Bytes) == 0 {
|
||||||
return nil, errors.New("no pkcs7 data in Time-Stamp response")
|
return nil, errors.New("no pkcs7 data in Time-Stamp response")
|
||||||
}
|
}
|
||||||
@@ -137,15 +144,45 @@ func (context *SignContext) createSignature() ([]byte, error) {
|
|||||||
Value: resp.TimeStampToken,
|
Value: resp.TimeStampToken,
|
||||||
}
|
}
|
||||||
signer_config.ExtraUnsignedAttributes = append(signer_config.ExtraUnsignedAttributes, timestamp_attribute)
|
signer_config.ExtraUnsignedAttributes = append(signer_config.ExtraUnsignedAttributes, timestamp_attribute)
|
||||||
|
|
||||||
|
tsa_certificate_pool := x509.NewCertPool()
|
||||||
|
for _, certificate := range timestamp_p7.Certificates {
|
||||||
|
tsa_certificate_pool.AddCert(certificate)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(timestamp_p7.Certificates) > 0 {
|
||||||
|
TSATokenChain, err = timestamp_p7.Certificates[len(timestamp_p7.Certificates)-1].Verify(x509.VerifyOptions{
|
||||||
|
Intermediates: tsa_certificate_pool,
|
||||||
|
})
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if context.SignData.RevocationFunction != nil {
|
if context.SignData.RevocationFunction != nil {
|
||||||
if (len(context.SignData.CertificateChains) > 0) {
|
if context.SignData.CertificateChains != nil && (len(context.SignData.CertificateChains) > 0) {
|
||||||
certificate_chain := context.SignData.CertificateChains[0]
|
certificate_chain := context.SignData.CertificateChains[0]
|
||||||
if (len(certificate_chain) > 0) {
|
if certificate_chain != nil && (len(certificate_chain) > 0) {
|
||||||
for i, certificate := range certificate_chain {
|
for i, certificate := range certificate_chain {
|
||||||
if i < len(certificate_chain)-1 {
|
if i < len(certificate_chain)-1 {
|
||||||
err = context.SignData.RevocationFunction(certificate, certificate_chain[i + 1], &context.SignData.RevocationData)
|
err = context.SignData.RevocationFunction(certificate, certificate_chain[i+1], &context.SignData.RevocationData)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
err = context.SignData.RevocationFunction(certificate, nil, &context.SignData.RevocationData)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if TSATokenChain != nil && (len(TSATokenChain) > 0) {
|
||||||
|
certificate_chain := TSATokenChain[0]
|
||||||
|
if certificate_chain != nil && (len(certificate_chain) > 0) {
|
||||||
|
for i, certificate := range certificate_chain {
|
||||||
|
if i < len(certificate_chain)-1 {
|
||||||
|
err = context.SignData.RevocationFunction(certificate, certificate_chain[i+1], &context.SignData.RevocationData)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
@@ -168,7 +205,7 @@ func (context *SignContext) createSignature() ([]byte, error) {
|
|||||||
|
|
||||||
// Add the first certificate chain without our own certificate.
|
// Add the first certificate chain without our own certificate.
|
||||||
var certificate_chain []*x509.Certificate
|
var certificate_chain []*x509.Certificate
|
||||||
if (len(context.SignData.CertificateChains) > 0 && len(context.SignData.CertificateChains[0]) > 1) {
|
if len(context.SignData.CertificateChains) > 0 && len(context.SignData.CertificateChains[0]) > 1 {
|
||||||
certificate_chain = context.SignData.CertificateChains[0][1:]
|
certificate_chain = context.SignData.CertificateChains[0][1:]
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -185,7 +222,9 @@ func (context *SignContext) createSignature() ([]byte, error) {
|
|||||||
|
|
||||||
func (context *SignContext) GetTSA(sign_content []byte) (timestamp_response []byte, err error) {
|
func (context *SignContext) GetTSA(sign_content []byte) (timestamp_response []byte, err error) {
|
||||||
sign_reader := bytes.NewReader(sign_content)
|
sign_reader := bytes.NewReader(sign_content)
|
||||||
ts_request, err := timestamp.CreateRequest(sign_reader, nil)
|
ts_request, err := timestamp.CreateRequest(sign_reader, ×tamp.RequestOptions{
|
||||||
|
Certificates: true,
|
||||||
|
})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user