mirror of
https://github.com/openssl/openssl.git
synced 2024-12-27 06:21:43 +08:00
e85d19c68e
A CAdES Basic Electronic Signature (CAdES-BES) contains, among other specifications, a collection of Signing Certificate reference attributes, stored in the signedData ether as ESS signing-certificate or as ESS signing-certificate-v2. These are described in detail in Section 5.7.2 of RFC 5126 - CMS Advanced Electronic Signatures (CAdES). This patch adds support for adding ESS signing-certificate[-v2] attributes to CMS signedData. Although it implements only a small part of the RFC, it is sufficient many cases to enable the `openssl cms` app to create signatures which comply with legal requirements of some European States (e.g Italy). Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/7893)
79 lines
2.1 KiB
C
79 lines
2.1 KiB
C
/*
|
|
* Copyright 2019 The OpenSSL Project Authors. All Rights Reserved.
|
|
*
|
|
* Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
* this file except in compliance with the License. You can obtain a copy
|
|
* in the file LICENSE in the source distribution or at
|
|
* https://www.openssl.org/source/license.html
|
|
*/
|
|
|
|
/* internal ESS related stuff */
|
|
|
|
ESS_SIGNING_CERT *ESS_SIGNING_CERT_get(PKCS7_SIGNER_INFO *si);
|
|
int ESS_SIGNING_CERT_add(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT *sc);
|
|
|
|
ESS_SIGNING_CERT_V2 *ESS_SIGNING_CERT_V2_get(PKCS7_SIGNER_INFO *si);
|
|
int ESS_SIGNING_CERT_V2_add(PKCS7_SIGNER_INFO *si, ESS_SIGNING_CERT_V2 *sc);
|
|
|
|
/*-
|
|
* IssuerSerial ::= SEQUENCE {
|
|
* issuer GeneralNames,
|
|
* serialNumber CertificateSerialNumber
|
|
* }
|
|
*/
|
|
|
|
struct ESS_issuer_serial {
|
|
STACK_OF(GENERAL_NAME) *issuer;
|
|
ASN1_INTEGER *serial;
|
|
};
|
|
|
|
/*-
|
|
* ESSCertID ::= SEQUENCE {
|
|
* certHash Hash,
|
|
* issuerSerial IssuerSerial OPTIONAL
|
|
* }
|
|
*/
|
|
|
|
struct ESS_cert_id {
|
|
ASN1_OCTET_STRING *hash; /* Always SHA-1 digest. */
|
|
ESS_ISSUER_SERIAL *issuer_serial;
|
|
};
|
|
|
|
/*-
|
|
* SigningCertificate ::= SEQUENCE {
|
|
* certs SEQUENCE OF ESSCertID,
|
|
* policies SEQUENCE OF PolicyInformation OPTIONAL
|
|
* }
|
|
*/
|
|
|
|
struct ESS_signing_cert {
|
|
STACK_OF(ESS_CERT_ID) *cert_ids;
|
|
STACK_OF(POLICYINFO) *policy_info;
|
|
};
|
|
|
|
/*-
|
|
* ESSCertIDv2 ::= SEQUENCE {
|
|
* hashAlgorithm AlgorithmIdentifier DEFAULT id-sha256,
|
|
* certHash Hash,
|
|
* issuerSerial IssuerSerial OPTIONAL
|
|
* }
|
|
*/
|
|
|
|
struct ESS_cert_id_v2_st {
|
|
X509_ALGOR *hash_alg; /* Default: SHA-256 */
|
|
ASN1_OCTET_STRING *hash;
|
|
ESS_ISSUER_SERIAL *issuer_serial;
|
|
};
|
|
|
|
/*-
|
|
* SigningCertificateV2 ::= SEQUENCE {
|
|
* certs SEQUENCE OF ESSCertIDv2,
|
|
* policies SEQUENCE OF PolicyInformation OPTIONAL
|
|
* }
|
|
*/
|
|
|
|
struct ESS_signing_cert_v2_st {
|
|
STACK_OF(ESS_CERT_ID_V2) *cert_ids;
|
|
STACK_OF(POLICYINFO) *policy_info;
|
|
};
|