2 * Copyright 2006-2022 The OpenSSL Project Authors. All Rights Reserved.
4 * Licensed under the Apache License 2.0 (the "License"). You may not use
5 * this file except in compliance with the License. You can obtain a copy
6 * in the file LICENSE in the source distribution or at
7 * https://www.openssl.org/source/license.html
10 #include "internal/e_os.h"
12 #include <openssl/objects.h>
13 #include <openssl/ts.h>
14 #include <openssl/pkcs7.h>
15 #include <openssl/crypto.h>
16 #include "internal/cryptlib.h"
17 #include "internal/sizes.h"
18 #include "internal/time.h"
19 #include "crypto/ess.h"
22 DEFINE_STACK_OF_CONST(EVP_MD
)
24 static ASN1_INTEGER
*def_serial_cb(struct TS_resp_ctx
*, void *);
25 static int def_time_cb(struct TS_resp_ctx
*, void *, long *sec
, long *usec
);
26 static int def_extension_cb(struct TS_resp_ctx
*, X509_EXTENSION
*, void *);
28 static void ts_RESP_CTX_init(TS_RESP_CTX
*ctx
);
29 static void ts_RESP_CTX_cleanup(TS_RESP_CTX
*ctx
);
30 static int ts_RESP_check_request(TS_RESP_CTX
*ctx
);
31 static ASN1_OBJECT
*ts_RESP_get_policy(TS_RESP_CTX
*ctx
);
32 static TS_TST_INFO
*ts_RESP_create_tst_info(TS_RESP_CTX
*ctx
,
34 static int ts_RESP_process_extensions(TS_RESP_CTX
*ctx
);
35 static int ts_RESP_sign(TS_RESP_CTX
*ctx
);
37 static int ts_TST_INFO_content_new(PKCS7
*p7
);
39 static ASN1_GENERALIZEDTIME
40 *TS_RESP_set_genTime_with_precision(ASN1_GENERALIZEDTIME
*, long, long,
43 /* Default callback for response generation. */
44 static ASN1_INTEGER
*def_serial_cb(struct TS_resp_ctx
*ctx
, void *data
)
46 ASN1_INTEGER
*serial
= ASN1_INTEGER_new();
50 if (!ASN1_INTEGER_set(serial
, 1))
55 ERR_raise(ERR_LIB_TS
, ERR_R_ASN1_LIB
);
56 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
57 "Error during serial number generation.");
58 ASN1_INTEGER_free(serial
);
62 static int def_time_cb(struct TS_resp_ctx
*ctx
, void *data
,
63 long *sec
, long *usec
)
69 if (ossl_time_is_zero(t
)) {
70 ERR_raise(ERR_LIB_TS
, TS_R_TIME_SYSCALL_ERROR
);
71 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
72 "Time is not available.");
73 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_TIME_NOT_AVAILABLE
);
76 tv
= ossl_time_to_timeval(t
);
77 *sec
= (long int)tv
.tv_sec
;
78 *usec
= (long int)tv
.tv_usec
;
83 static int def_extension_cb(struct TS_resp_ctx
*ctx
, X509_EXTENSION
*ext
,
86 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
87 "Unsupported extension.");
88 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_UNACCEPTED_EXTENSION
);
92 /* TS_RESP_CTX management functions. */
94 TS_RESP_CTX
*TS_RESP_CTX_new_ex(OSSL_LIB_CTX
*libctx
, const char *propq
)
98 if ((ctx
= OPENSSL_zalloc(sizeof(*ctx
))) == NULL
)
102 ctx
->propq
= OPENSSL_strdup(propq
);
103 if (ctx
->propq
== NULL
) {
108 ctx
->libctx
= libctx
;
109 ctx
->serial_cb
= def_serial_cb
;
110 ctx
->time_cb
= def_time_cb
;
111 ctx
->extension_cb
= def_extension_cb
;
116 TS_RESP_CTX
*TS_RESP_CTX_new(void)
118 return TS_RESP_CTX_new_ex(NULL
, NULL
);
121 void TS_RESP_CTX_free(TS_RESP_CTX
*ctx
)
126 OPENSSL_free(ctx
->propq
);
127 X509_free(ctx
->signer_cert
);
128 EVP_PKEY_free(ctx
->signer_key
);
129 OSSL_STACK_OF_X509_free(ctx
->certs
);
130 sk_ASN1_OBJECT_pop_free(ctx
->policies
, ASN1_OBJECT_free
);
131 ASN1_OBJECT_free(ctx
->default_policy
);
132 sk_EVP_MD_free(ctx
->mds
); /* No EVP_MD_free method exists. */
133 ASN1_INTEGER_free(ctx
->seconds
);
134 ASN1_INTEGER_free(ctx
->millis
);
135 ASN1_INTEGER_free(ctx
->micros
);
139 int TS_RESP_CTX_set_signer_cert(TS_RESP_CTX
*ctx
, X509
*signer
)
141 if (X509_check_purpose(signer
, X509_PURPOSE_TIMESTAMP_SIGN
, 0) != 1) {
142 ERR_raise(ERR_LIB_TS
, TS_R_INVALID_SIGNER_CERTIFICATE_PURPOSE
);
145 X509_free(ctx
->signer_cert
);
146 ctx
->signer_cert
= signer
;
147 X509_up_ref(ctx
->signer_cert
);
151 int TS_RESP_CTX_set_signer_key(TS_RESP_CTX
*ctx
, EVP_PKEY
*key
)
153 EVP_PKEY_free(ctx
->signer_key
);
154 ctx
->signer_key
= key
;
155 EVP_PKEY_up_ref(ctx
->signer_key
);
160 int TS_RESP_CTX_set_signer_digest(TS_RESP_CTX
*ctx
, const EVP_MD
*md
)
166 int TS_RESP_CTX_set_def_policy(TS_RESP_CTX
*ctx
, const ASN1_OBJECT
*def_policy
)
168 ASN1_OBJECT_free(ctx
->default_policy
);
169 if ((ctx
->default_policy
= OBJ_dup(def_policy
)) == NULL
)
173 ERR_raise(ERR_LIB_TS
, ERR_R_OBJ_LIB
);
177 int TS_RESP_CTX_set_certs(TS_RESP_CTX
*ctx
, STACK_OF(X509
) *certs
)
179 OSSL_STACK_OF_X509_free(ctx
->certs
);
182 return certs
== NULL
|| (ctx
->certs
= X509_chain_up_ref(certs
)) != NULL
;
185 int TS_RESP_CTX_add_policy(TS_RESP_CTX
*ctx
, const ASN1_OBJECT
*policy
)
187 ASN1_OBJECT
*copy
= NULL
;
189 if (ctx
->policies
== NULL
190 && (ctx
->policies
= sk_ASN1_OBJECT_new_null()) == NULL
) {
191 ERR_raise(ERR_LIB_TS
, ERR_R_CRYPTO_LIB
);
194 if ((copy
= OBJ_dup(policy
)) == NULL
) {
195 ERR_raise(ERR_LIB_TS
, ERR_R_OBJ_LIB
);
198 if (!sk_ASN1_OBJECT_push(ctx
->policies
, copy
)) {
199 ERR_raise(ERR_LIB_TS
, ERR_R_CRYPTO_LIB
);
205 ASN1_OBJECT_free(copy
);
209 int TS_RESP_CTX_add_md(TS_RESP_CTX
*ctx
, const EVP_MD
*md
)
212 && (ctx
->mds
= sk_EVP_MD_new_null()) == NULL
)
214 if (!sk_EVP_MD_push(ctx
->mds
, md
))
219 ERR_raise(ERR_LIB_TS
, ERR_R_CRYPTO_LIB
);
223 #define TS_RESP_CTX_accuracy_free(ctx) \
224 ASN1_INTEGER_free(ctx->seconds); \
225 ctx->seconds = NULL; \
226 ASN1_INTEGER_free(ctx->millis); \
227 ctx->millis = NULL; \
228 ASN1_INTEGER_free(ctx->micros); \
231 int TS_RESP_CTX_set_accuracy(TS_RESP_CTX
*ctx
,
232 int secs
, int millis
, int micros
)
235 TS_RESP_CTX_accuracy_free(ctx
);
237 && ((ctx
->seconds
= ASN1_INTEGER_new()) == NULL
238 || !ASN1_INTEGER_set(ctx
->seconds
, secs
)))
241 && ((ctx
->millis
= ASN1_INTEGER_new()) == NULL
242 || !ASN1_INTEGER_set(ctx
->millis
, millis
)))
245 && ((ctx
->micros
= ASN1_INTEGER_new()) == NULL
246 || !ASN1_INTEGER_set(ctx
->micros
, micros
)))
251 TS_RESP_CTX_accuracy_free(ctx
);
252 ERR_raise(ERR_LIB_TS
, ERR_R_ASN1_LIB
);
256 void TS_RESP_CTX_add_flags(TS_RESP_CTX
*ctx
, int flags
)
261 void TS_RESP_CTX_set_serial_cb(TS_RESP_CTX
*ctx
, TS_serial_cb cb
, void *data
)
264 ctx
->serial_cb_data
= data
;
267 void TS_RESP_CTX_set_time_cb(TS_RESP_CTX
*ctx
, TS_time_cb cb
, void *data
)
270 ctx
->time_cb_data
= data
;
273 void TS_RESP_CTX_set_extension_cb(TS_RESP_CTX
*ctx
,
274 TS_extension_cb cb
, void *data
)
276 ctx
->extension_cb
= cb
;
277 ctx
->extension_cb_data
= data
;
280 int TS_RESP_CTX_set_status_info(TS_RESP_CTX
*ctx
,
281 int status
, const char *text
)
283 TS_STATUS_INFO
*si
= NULL
;
284 ASN1_UTF8STRING
*utf8_text
= NULL
;
287 if ((si
= TS_STATUS_INFO_new()) == NULL
) {
288 ERR_raise(ERR_LIB_TS
, ERR_R_TS_LIB
);
291 if (!ASN1_INTEGER_set(si
->status
, status
)) {
292 ERR_raise(ERR_LIB_TS
, ERR_R_ASN1_LIB
);
296 if ((utf8_text
= ASN1_UTF8STRING_new()) == NULL
297 || !ASN1_STRING_set(utf8_text
, text
, strlen(text
))) {
298 ERR_raise(ERR_LIB_TS
, ERR_R_ASN1_LIB
);
302 && (si
->text
= sk_ASN1_UTF8STRING_new_null()) == NULL
) {
303 ERR_raise(ERR_LIB_TS
, ERR_R_CRYPTO_LIB
);
306 if (!sk_ASN1_UTF8STRING_push(si
->text
, utf8_text
)) {
307 ERR_raise(ERR_LIB_TS
, ERR_R_CRYPTO_LIB
);
310 utf8_text
= NULL
; /* Ownership is lost. */
312 if (!TS_RESP_set_status_info(ctx
->response
, si
)) {
313 ERR_raise(ERR_LIB_TS
, ERR_R_TS_LIB
);
318 TS_STATUS_INFO_free(si
);
319 ASN1_UTF8STRING_free(utf8_text
);
323 int TS_RESP_CTX_set_status_info_cond(TS_RESP_CTX
*ctx
,
324 int status
, const char *text
)
327 TS_STATUS_INFO
*si
= ctx
->response
->status_info
;
329 if (ASN1_INTEGER_get(si
->status
) == TS_STATUS_GRANTED
) {
330 ret
= TS_RESP_CTX_set_status_info(ctx
, status
, text
);
335 int TS_RESP_CTX_add_failure_info(TS_RESP_CTX
*ctx
, int failure
)
337 TS_STATUS_INFO
*si
= ctx
->response
->status_info
;
338 if (si
->failure_info
== NULL
339 && (si
->failure_info
= ASN1_BIT_STRING_new()) == NULL
)
341 if (!ASN1_BIT_STRING_set_bit(si
->failure_info
, failure
, 1))
345 ERR_raise(ERR_LIB_TS
, ERR_R_ASN1_LIB
);
349 TS_REQ
*TS_RESP_CTX_get_request(TS_RESP_CTX
*ctx
)
354 TS_TST_INFO
*TS_RESP_CTX_get_tst_info(TS_RESP_CTX
*ctx
)
356 return ctx
->tst_info
;
359 int TS_RESP_CTX_set_clock_precision_digits(TS_RESP_CTX
*ctx
,
362 if (precision
> TS_MAX_CLOCK_PRECISION_DIGITS
)
364 ctx
->clock_precision_digits
= precision
;
368 /* Main entry method of the response generation. */
369 TS_RESP
*TS_RESP_create_response(TS_RESP_CTX
*ctx
, BIO
*req_bio
)
375 ts_RESP_CTX_init(ctx
);
377 if ((ctx
->response
= TS_RESP_new()) == NULL
) {
378 ERR_raise(ERR_LIB_TS
, ERR_R_TS_LIB
);
381 if ((ctx
->request
= d2i_TS_REQ_bio(req_bio
, NULL
)) == NULL
) {
382 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
383 "Bad request format or system error.");
384 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_BAD_DATA_FORMAT
);
387 if (!TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_GRANTED
, NULL
))
389 if (!ts_RESP_check_request(ctx
))
391 if ((policy
= ts_RESP_get_policy(ctx
)) == NULL
)
393 if ((ctx
->tst_info
= ts_RESP_create_tst_info(ctx
, policy
)) == NULL
)
395 if (!ts_RESP_process_extensions(ctx
))
397 if (!ts_RESP_sign(ctx
))
403 ERR_raise(ERR_LIB_TS
, TS_R_RESPONSE_SETUP_ERROR
);
404 if (ctx
->response
!= NULL
) {
405 if (TS_RESP_CTX_set_status_info_cond(ctx
,
407 "Error during response "
408 "generation.") == 0) {
409 TS_RESP_free(ctx
->response
);
410 ctx
->response
= NULL
;
414 response
= ctx
->response
;
415 ctx
->response
= NULL
; /* Ownership will be returned to caller. */
416 ts_RESP_CTX_cleanup(ctx
);
420 /* Initializes the variable part of the context. */
421 static void ts_RESP_CTX_init(TS_RESP_CTX
*ctx
)
424 ctx
->response
= NULL
;
425 ctx
->tst_info
= NULL
;
428 /* Cleans up the variable part of the context. */
429 static void ts_RESP_CTX_cleanup(TS_RESP_CTX
*ctx
)
431 TS_REQ_free(ctx
->request
);
433 TS_RESP_free(ctx
->response
);
434 ctx
->response
= NULL
;
435 TS_TST_INFO_free(ctx
->tst_info
);
436 ctx
->tst_info
= NULL
;
439 /* Checks the format and content of the request. */
440 static int ts_RESP_check_request(TS_RESP_CTX
*ctx
)
442 TS_REQ
*request
= ctx
->request
;
443 TS_MSG_IMPRINT
*msg_imprint
;
445 char md_alg_name
[OSSL_MAX_NAME_SIZE
];
446 const ASN1_OCTET_STRING
*digest
;
447 const EVP_MD
*md
= NULL
;
450 if (TS_REQ_get_version(request
) != 1) {
451 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
452 "Bad request version.");
453 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_BAD_REQUEST
);
457 msg_imprint
= request
->msg_imprint
;
458 md_alg
= msg_imprint
->hash_algo
;
459 OBJ_obj2txt(md_alg_name
, sizeof(md_alg_name
), md_alg
->algorithm
, 0);
460 for (i
= 0; !md
&& i
< sk_EVP_MD_num(ctx
->mds
); ++i
) {
461 const EVP_MD
*current_md
= sk_EVP_MD_value(ctx
->mds
, i
);
462 if (EVP_MD_is_a(current_md
, md_alg_name
))
466 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
467 "Message digest algorithm is "
469 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_BAD_ALG
);
473 if (md_alg
->parameter
&& ASN1_TYPE_get(md_alg
->parameter
) != V_ASN1_NULL
) {
474 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
475 "Superfluous message digest "
477 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_BAD_ALG
);
480 digest
= msg_imprint
->hashed_msg
;
481 if (digest
->length
!= EVP_MD_get_size(md
)) {
482 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
483 "Bad message digest.");
484 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_BAD_DATA_FORMAT
);
491 /* Returns the TSA policy based on the requested and acceptable policies. */
492 static ASN1_OBJECT
*ts_RESP_get_policy(TS_RESP_CTX
*ctx
)
494 ASN1_OBJECT
*requested
= ctx
->request
->policy_id
;
495 ASN1_OBJECT
*policy
= NULL
;
498 if (ctx
->default_policy
== NULL
) {
499 ERR_raise(ERR_LIB_TS
, TS_R_INVALID_NULL_POINTER
);
502 if (!requested
|| !OBJ_cmp(requested
, ctx
->default_policy
))
503 policy
= ctx
->default_policy
;
505 /* Check if the policy is acceptable. */
506 for (i
= 0; !policy
&& i
< sk_ASN1_OBJECT_num(ctx
->policies
); ++i
) {
507 ASN1_OBJECT
*current
= sk_ASN1_OBJECT_value(ctx
->policies
, i
);
508 if (!OBJ_cmp(requested
, current
))
511 if (policy
== NULL
) {
512 ERR_raise(ERR_LIB_TS
, TS_R_UNACCEPTABLE_POLICY
);
513 TS_RESP_CTX_set_status_info(ctx
, TS_STATUS_REJECTION
,
514 "Requested policy is not " "supported.");
515 TS_RESP_CTX_add_failure_info(ctx
, TS_INFO_UNACCEPTED_POLICY
);
520 /* Creates the TS_TST_INFO object based on the settings of the context. */
521 static TS_TST_INFO
*ts_RESP_create_tst_info(TS_RESP_CTX
*ctx
,
525 TS_TST_INFO
*tst_info
= NULL
;
526 ASN1_INTEGER
*serial
= NULL
;
527 ASN1_GENERALIZEDTIME
*asn1_time
= NULL
;
529 TS_ACCURACY
*accuracy
= NULL
;
530 const ASN1_INTEGER
*nonce
;
531 GENERAL_NAME
*tsa_name
= NULL
;
533 if ((tst_info
= TS_TST_INFO_new()) == NULL
)
535 if (!TS_TST_INFO_set_version(tst_info
, 1))
537 if (!TS_TST_INFO_set_policy_id(tst_info
, policy
))
539 if (!TS_TST_INFO_set_msg_imprint(tst_info
, ctx
->request
->msg_imprint
))
541 if ((serial
= ctx
->serial_cb(ctx
, ctx
->serial_cb_data
)) == NULL
542 || !TS_TST_INFO_set_serial(tst_info
, serial
))
544 if (!ctx
->time_cb(ctx
, ctx
->time_cb_data
, &sec
, &usec
)
546 TS_RESP_set_genTime_with_precision(NULL
, sec
, usec
,
547 ctx
->clock_precision_digits
)) == NULL
548 || !TS_TST_INFO_set_time(tst_info
, asn1_time
))
551 if ((ctx
->seconds
|| ctx
->millis
|| ctx
->micros
)
552 && (accuracy
= TS_ACCURACY_new()) == NULL
)
554 if (ctx
->seconds
&& !TS_ACCURACY_set_seconds(accuracy
, ctx
->seconds
))
556 if (ctx
->millis
&& !TS_ACCURACY_set_millis(accuracy
, ctx
->millis
))
558 if (ctx
->micros
&& !TS_ACCURACY_set_micros(accuracy
, ctx
->micros
))
560 if (accuracy
&& !TS_TST_INFO_set_accuracy(tst_info
, accuracy
))
563 if ((ctx
->flags
& TS_ORDERING
)
564 && !TS_TST_INFO_set_ordering(tst_info
, 1))
567 if ((nonce
= ctx
->request
->nonce
) != NULL
568 && !TS_TST_INFO_set_nonce(tst_info
, nonce
))
571 if (ctx
->flags
& TS_TSA_NAME
) {
572 if ((tsa_name
= GENERAL_NAME_new()) == NULL
)
574 tsa_name
->type
= GEN_DIRNAME
;
576 X509_NAME_dup(X509_get_subject_name(ctx
->signer_cert
));
577 if (!tsa_name
->d
.dirn
)
579 if (!TS_TST_INFO_set_tsa(tst_info
, tsa_name
))
586 TS_TST_INFO_free(tst_info
);
588 ERR_raise(ERR_LIB_TS
, TS_R_TST_INFO_SETUP_ERROR
);
589 TS_RESP_CTX_set_status_info_cond(ctx
, TS_STATUS_REJECTION
,
590 "Error during TSTInfo "
593 GENERAL_NAME_free(tsa_name
);
594 TS_ACCURACY_free(accuracy
);
595 ASN1_GENERALIZEDTIME_free(asn1_time
);
596 ASN1_INTEGER_free(serial
);
601 /* Processing the extensions of the request. */
602 static int ts_RESP_process_extensions(TS_RESP_CTX
*ctx
)
604 STACK_OF(X509_EXTENSION
) *exts
= ctx
->request
->extensions
;
608 for (i
= 0; ok
&& i
< sk_X509_EXTENSION_num(exts
); ++i
) {
609 X509_EXTENSION
*ext
= sk_X509_EXTENSION_value(exts
, i
);
611 * The last argument was previously (void *)ctx->extension_cb,
612 * but ISO C doesn't permit converting a function pointer to void *.
613 * For lack of better information, I'm placing a NULL there instead.
614 * The callback can pick its own address out from the ctx anyway...
616 ok
= (*ctx
->extension_cb
) (ctx
, ext
, NULL
);
622 /* Functions for signing the TS_TST_INFO structure of the context. */
623 static int ossl_ess_add1_signing_cert(PKCS7_SIGNER_INFO
*si
,
624 const ESS_SIGNING_CERT
*sc
)
626 ASN1_STRING
*seq
= NULL
;
627 int len
= i2d_ESS_SIGNING_CERT(sc
, NULL
);
628 unsigned char *p
, *pp
= OPENSSL_malloc(len
);
634 i2d_ESS_SIGNING_CERT(sc
, &p
);
635 if ((seq
= ASN1_STRING_new()) == NULL
|| !ASN1_STRING_set(seq
, pp
, len
)) {
636 ASN1_STRING_free(seq
);
642 return PKCS7_add_signed_attribute(si
, NID_id_smime_aa_signingCertificate
,
643 V_ASN1_SEQUENCE
, seq
);
646 static int ossl_ess_add1_signing_cert_v2(PKCS7_SIGNER_INFO
*si
,
647 const ESS_SIGNING_CERT_V2
*sc
)
649 ASN1_STRING
*seq
= NULL
;
650 int len
= i2d_ESS_SIGNING_CERT_V2(sc
, NULL
);
651 unsigned char *p
, *pp
= OPENSSL_malloc(len
);
657 i2d_ESS_SIGNING_CERT_V2(sc
, &p
);
658 if ((seq
= ASN1_STRING_new()) == NULL
|| !ASN1_STRING_set(seq
, pp
, len
)) {
659 ASN1_STRING_free(seq
);
665 return PKCS7_add_signed_attribute(si
, NID_id_smime_aa_signingCertificateV2
,
666 V_ASN1_SEQUENCE
, seq
);
669 static int ts_RESP_sign(TS_RESP_CTX
*ctx
)
673 PKCS7_SIGNER_INFO
*si
;
674 STACK_OF(X509
) *certs
; /* Certificates to include in sc. */
675 ESS_SIGNING_CERT_V2
*sc2
= NULL
;
676 ESS_SIGNING_CERT
*sc
= NULL
;
680 EVP_MD
*signer_md
= NULL
;
682 if (!X509_check_private_key(ctx
->signer_cert
, ctx
->signer_key
)) {
683 ERR_raise(ERR_LIB_TS
, TS_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE
);
687 if ((p7
= PKCS7_new_ex(ctx
->libctx
, ctx
->propq
)) == NULL
) {
688 ERR_raise(ERR_LIB_TS
, ERR_R_ASN1_LIB
);
691 if (!PKCS7_set_type(p7
, NID_pkcs7_signed
))
693 if (!ASN1_INTEGER_set(p7
->d
.sign
->version
, 3))
696 if (ctx
->request
->cert_req
) {
697 PKCS7_add_certificate(p7
, ctx
->signer_cert
);
699 for (i
= 0; i
< sk_X509_num(ctx
->certs
); ++i
) {
700 X509
*cert
= sk_X509_value(ctx
->certs
, i
);
701 PKCS7_add_certificate(p7
, cert
);
706 if (ctx
->signer_md
== NULL
)
707 signer_md
= EVP_MD_fetch(ctx
->libctx
, "SHA256", ctx
->propq
);
708 else if (EVP_MD_get0_provider(ctx
->signer_md
) == NULL
)
709 signer_md
= EVP_MD_fetch(ctx
->libctx
, EVP_MD_get0_name(ctx
->signer_md
),
712 signer_md
= (EVP_MD
*)ctx
->signer_md
;
714 if ((si
= PKCS7_add_signature(p7
, ctx
->signer_cert
,
715 ctx
->signer_key
, signer_md
)) == NULL
) {
716 ERR_raise(ERR_LIB_TS
, TS_R_PKCS7_ADD_SIGNATURE_ERROR
);
720 oid
= OBJ_nid2obj(NID_id_smime_ct_TSTInfo
);
721 if (!PKCS7_add_signed_attribute(si
, NID_pkcs9_contentType
,
722 V_ASN1_OBJECT
, oid
)) {
723 ERR_raise(ERR_LIB_TS
, TS_R_PKCS7_ADD_SIGNED_ATTR_ERROR
);
727 certs
= ctx
->flags
& TS_ESS_CERT_ID_CHAIN
? ctx
->certs
: NULL
;
728 if (ctx
->ess_cert_id_digest
== NULL
729 || EVP_MD_is_a(ctx
->ess_cert_id_digest
, SN_sha1
)) {
730 if ((sc
= OSSL_ESS_signing_cert_new_init(ctx
->signer_cert
,
734 if (!ossl_ess_add1_signing_cert(si
, sc
)) {
735 ERR_raise(ERR_LIB_TS
, TS_R_ESS_ADD_SIGNING_CERT_ERROR
);
739 sc2
= OSSL_ESS_signing_cert_v2_new_init(ctx
->ess_cert_id_digest
,
740 ctx
->signer_cert
, certs
, 0);
744 if (!ossl_ess_add1_signing_cert_v2(si
, sc2
)) {
745 ERR_raise(ERR_LIB_TS
, TS_R_ESS_ADD_SIGNING_CERT_V2_ERROR
);
750 if (!ts_TST_INFO_content_new(p7
))
752 if ((p7bio
= PKCS7_dataInit(p7
, NULL
)) == NULL
) {
753 ERR_raise(ERR_LIB_TS
, ERR_R_PKCS7_LIB
);
756 if (!i2d_TS_TST_INFO_bio(p7bio
, ctx
->tst_info
)) {
757 ERR_raise(ERR_LIB_TS
, TS_R_TS_DATASIGN
);
760 if (!PKCS7_dataFinal(p7
, p7bio
)) {
761 ERR_raise(ERR_LIB_TS
, TS_R_TS_DATASIGN
);
764 TS_RESP_set_tst_info(ctx
->response
, p7
, ctx
->tst_info
);
765 p7
= NULL
; /* Ownership is lost. */
766 ctx
->tst_info
= NULL
; /* Ownership is lost. */
770 if (signer_md
!= ctx
->signer_md
)
771 EVP_MD_free(signer_md
);
774 TS_RESP_CTX_set_status_info_cond(ctx
, TS_STATUS_REJECTION
,
775 "Error during signature "
778 ESS_SIGNING_CERT_V2_free(sc2
);
779 ESS_SIGNING_CERT_free(sc
);
784 static int ts_TST_INFO_content_new(PKCS7
*p7
)
787 ASN1_OCTET_STRING
*octet_string
= NULL
;
789 /* Create new encapsulated NID_id_smime_ct_TSTInfo content. */
790 if ((ret
= PKCS7_new()) == NULL
)
792 if ((ret
->d
.other
= ASN1_TYPE_new()) == NULL
)
794 ret
->type
= OBJ_nid2obj(NID_id_smime_ct_TSTInfo
);
795 if ((octet_string
= ASN1_OCTET_STRING_new()) == NULL
)
797 ASN1_TYPE_set(ret
->d
.other
, V_ASN1_OCTET_STRING
, octet_string
);
800 /* Add encapsulated content to signed PKCS7 structure. */
801 if (!PKCS7_set_content(p7
, ret
))
806 ASN1_OCTET_STRING_free(octet_string
);
811 static ASN1_GENERALIZEDTIME
*TS_RESP_set_genTime_with_precision(
812 ASN1_GENERALIZEDTIME
*asn1_time
, long sec
, long usec
,
815 time_t time_sec
= (time_t)sec
;
816 struct tm
*tm
= NULL
, tm_result
;
817 char genTime_str
[17 + TS_MAX_CLOCK_PRECISION_DIGITS
];
818 char *p
= genTime_str
;
819 char *p_end
= genTime_str
+ sizeof(genTime_str
);
821 if (precision
> TS_MAX_CLOCK_PRECISION_DIGITS
)
824 if ((tm
= OPENSSL_gmtime(&time_sec
, &tm_result
)) == NULL
)
828 * Put "genTime_str" in GeneralizedTime format. We work around the
829 * restrictions imposed by rfc3280 (i.e. "GeneralizedTime values MUST
830 * NOT include fractional seconds") and OpenSSL related functions to
831 * meet the rfc3161 requirement: "GeneralizedTime syntax can include
832 * fraction-of-second details".
834 p
+= BIO_snprintf(p
, p_end
- p
,
835 "%04d%02d%02d%02d%02d%02d",
836 tm
->tm_year
+ 1900, tm
->tm_mon
+ 1, tm
->tm_mday
,
837 tm
->tm_hour
, tm
->tm_min
, tm
->tm_sec
);
839 BIO_snprintf(p
, 2 + precision
, ".%06ld", usec
);
843 * To make things a bit harder, X.690 | ISO/IEC 8825-1 provides the
844 * following restrictions for a DER-encoding, which OpenSSL
845 * (specifically ASN1_GENERALIZEDTIME_check() function) doesn't
846 * support: "The encoding MUST terminate with a "Z" (which means
847 * "Zulu" time). The decimal point element, if present, MUST be the
848 * point option ".". The fractional-seconds elements, if present,
849 * MUST omit all trailing 0's; if the elements correspond to 0, they
850 * MUST be wholly omitted, and the decimal point element also MUST be
854 * Remove trailing zeros. The dot guarantees the exit condition of
855 * this loop even if all the digits are zero.
865 if (asn1_time
== NULL
866 && (asn1_time
= ASN1_GENERALIZEDTIME_new()) == NULL
)
868 if (!ASN1_GENERALIZEDTIME_set_string(asn1_time
, genTime_str
)) {
869 ASN1_GENERALIZEDTIME_free(asn1_time
);
875 ERR_raise(ERR_LIB_TS
, TS_R_COULD_NOT_SET_TIME
);
879 int TS_RESP_CTX_set_ess_cert_id_digest(TS_RESP_CTX
*ctx
, const EVP_MD
*md
)
881 ctx
->ess_cert_id_digest
= md
;