2022-04-30 18:12:14 +02:00
|
|
|
// Copyright (C) 2022 Jakub Melka
|
|
|
|
//
|
|
|
|
// This file is part of PDF4QT.
|
|
|
|
//
|
|
|
|
// PDF4QT is free software: you can redistribute it and/or modify
|
|
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
|
|
// with the written consent of the copyright owner, any later version.
|
|
|
|
//
|
|
|
|
// PDF4QT is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU Lesser General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
|
|
// along with PDF4QT. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
#include "pdfcertificatemanager.h"
|
2022-04-30 18:12:14 +02:00
|
|
|
|
2022-05-03 20:00:47 +02:00
|
|
|
#include <QDir>
|
|
|
|
#include <QFile>
|
|
|
|
#include <QStandardPaths>
|
|
|
|
|
2022-09-11 17:54:11 +02:00
|
|
|
#if defined(PDF4QT_COMPILER_MINGW) || defined(PDF4QT_COMPILER_GCC)
|
|
|
|
#pragma GCC diagnostic push
|
|
|
|
#pragma GCC diagnostic ignored "-Wdeprecated-declarations"
|
|
|
|
#endif
|
|
|
|
|
2022-09-17 13:56:41 +02:00
|
|
|
#if defined(PDF4QT_COMPILER_MSVC)
|
|
|
|
#pragma warning(push)
|
|
|
|
#pragma warning(disable: 4996)
|
|
|
|
#endif
|
|
|
|
|
2022-04-30 18:12:14 +02:00
|
|
|
#include <openssl/bio.h>
|
|
|
|
#include <openssl/rsa.h>
|
|
|
|
#include <openssl/rsaerr.h>
|
|
|
|
#include <openssl/x509.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
#include <openssl/pem.h>
|
|
|
|
#include <openssl/x509v3.h>
|
2022-05-03 20:00:47 +02:00
|
|
|
#include <openssl/pkcs12.h>
|
2022-04-30 18:12:14 +02:00
|
|
|
|
|
|
|
#include <memory>
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
namespace pdf
|
2022-04-30 18:12:14 +02:00
|
|
|
{
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
PDFCertificateManager::PDFCertificateManager()
|
2022-04-30 18:12:14 +02:00
|
|
|
{
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
template<typename T>
|
|
|
|
using openssl_ptr = std::unique_ptr<T, void(*)(T*)>;
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
void PDFCertificateManager::createCertificate(const NewCertificateInfo& info)
|
2022-04-30 18:12:14 +02:00
|
|
|
{
|
2022-05-03 20:00:47 +02:00
|
|
|
openssl_ptr<BIO> pksBuffer(BIO_new(BIO_s_mem()), &BIO_free_all);
|
2022-04-30 18:12:14 +02:00
|
|
|
|
2022-05-03 20:00:47 +02:00
|
|
|
if (pksBuffer)
|
2022-04-30 18:12:14 +02:00
|
|
|
{
|
|
|
|
openssl_ptr<BIGNUM> bignumber(BN_new(), &BN_free);
|
|
|
|
openssl_ptr<RSA> rsaKey(RSA_new(), &RSA_free);
|
|
|
|
|
|
|
|
BN_set_word(bignumber.get(), RSA_F4);
|
|
|
|
const int rsaResult = RSA_generate_key_ex(rsaKey.get(), info.rsaKeyLength, bignumber.get(), nullptr);
|
|
|
|
if (rsaResult)
|
|
|
|
{
|
|
|
|
openssl_ptr<X509> certificate(X509_new(), &X509_free);
|
|
|
|
openssl_ptr<EVP_PKEY> privateKey(EVP_PKEY_new(), &EVP_PKEY_free);
|
|
|
|
|
|
|
|
EVP_PKEY_set1_RSA(privateKey.get(), rsaKey.get());
|
|
|
|
ASN1_INTEGER* serialNumber = X509_get_serialNumber(certificate.get());
|
|
|
|
ASN1_INTEGER_set(serialNumber, info.serialNumber);
|
|
|
|
|
|
|
|
// Set validity of the certificate
|
|
|
|
X509_gmtime_adj(X509_getm_notBefore(certificate.get()), 0);
|
2022-05-07 17:36:19 +02:00
|
|
|
X509_gmtime_adj(X509_getm_notAfter(certificate.get()), info.validityInSeconds);
|
2022-04-30 18:12:14 +02:00
|
|
|
|
|
|
|
// Set name
|
|
|
|
X509_NAME* name = X509_get_subject_name(certificate.get());
|
|
|
|
|
|
|
|
auto addString = [name](const char* identifier, QString string)
|
|
|
|
{
|
|
|
|
if (string.isEmpty())
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
QByteArray stringUtf8 = string.toUtf8();
|
|
|
|
X509_NAME_add_entry_by_txt(name, identifier, MBSTRING_UTF8, reinterpret_cast<const unsigned char*>(stringUtf8.constData()), stringUtf8.length(), -1, 0);
|
|
|
|
};
|
|
|
|
addString("C", info.certCountryCode);
|
|
|
|
addString("O", info.certOrganization);
|
|
|
|
addString("OU", info.certOrganizationUnit);
|
|
|
|
addString("CN", info.certCommonName);
|
|
|
|
addString("E", info.certEmail);
|
|
|
|
|
|
|
|
X509_EXTENSION* extension = nullptr;
|
2022-05-03 20:00:47 +02:00
|
|
|
X509V3_CTX context = { };
|
2022-04-30 18:12:14 +02:00
|
|
|
X509V3_set_ctx_nodb(&context);
|
|
|
|
X509V3_set_ctx(&context, certificate.get(), certificate.get(), nullptr, nullptr, 0);
|
|
|
|
extension = X509V3_EXT_conf_nid (NULL, &context, NID_key_usage, "digitalSignature, keyAgreement");
|
2022-05-03 20:00:47 +02:00
|
|
|
X509_add_ext(certificate.get(), extension, -1);
|
|
|
|
X509_EXTENSION_free(extension);
|
2022-04-30 18:12:14 +02:00
|
|
|
|
|
|
|
X509_set_issuer_name(certificate.get(), name);
|
|
|
|
|
|
|
|
// Set public key
|
|
|
|
X509_set_pubkey(certificate.get(), privateKey.get());
|
|
|
|
X509_sign(certificate.get(), privateKey.get(), EVP_sha512());
|
|
|
|
|
|
|
|
// Private key password
|
|
|
|
QByteArray privateKeyPaswordUtf8 = info.privateKeyPasword.toUtf8();
|
|
|
|
|
|
|
|
// Write the data
|
2022-05-07 17:36:19 +02:00
|
|
|
openssl_ptr<PKCS12> pkcs12(PKCS12_create(privateKeyPaswordUtf8.constData(),
|
|
|
|
nullptr,
|
|
|
|
privateKey.get(),
|
|
|
|
certificate.get(),
|
|
|
|
nullptr,
|
|
|
|
0,
|
|
|
|
0,
|
|
|
|
PKCS12_DEFAULT_ITER,
|
|
|
|
PKCS12_DEFAULT_ITER,
|
|
|
|
0), &PKCS12_free);
|
|
|
|
i2d_PKCS12_bio(pksBuffer.get(), pkcs12.get());
|
2022-05-03 20:00:47 +02:00
|
|
|
|
|
|
|
BUF_MEM* pksMemoryBuffer = nullptr;
|
|
|
|
BIO_get_mem_ptr(pksBuffer.get(), &pksMemoryBuffer);
|
|
|
|
|
|
|
|
if (!info.fileName.isEmpty())
|
2022-04-30 18:12:14 +02:00
|
|
|
{
|
2022-05-03 20:00:47 +02:00
|
|
|
QFile file(info.fileName);
|
|
|
|
if (file.open(QFile::WriteOnly | QFile::Truncate))
|
|
|
|
{
|
2022-05-07 17:36:19 +02:00
|
|
|
file.write(pksMemoryBuffer->data, pksMemoryBuffer->length);
|
2022-05-03 20:00:47 +02:00
|
|
|
file.close();
|
|
|
|
}
|
2022-04-30 18:12:14 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
QFileInfoList PDFCertificateManager::getCertificates()
|
2022-05-14 17:38:28 +02:00
|
|
|
{
|
|
|
|
QDir directory(getCertificateDirectory());
|
|
|
|
return directory.entryInfoList(QStringList() << "*.pfx", QDir::Files | QDir::NoDotAndDotDot | QDir::Readable, QDir::Name);
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
QString PDFCertificateManager::getCertificateDirectory()
|
2022-05-03 20:00:47 +02:00
|
|
|
{
|
2022-06-18 14:05:10 +02:00
|
|
|
QString standardDataLocation = QStandardPaths::standardLocations(QStandardPaths::AppDataLocation).front();
|
|
|
|
QDir directory(standardDataLocation + "/certificates/");
|
2022-05-03 20:00:47 +02:00
|
|
|
return directory.absolutePath();
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
QString PDFCertificateManager::generateCertificateFileName()
|
2022-05-03 20:00:47 +02:00
|
|
|
{
|
|
|
|
QString directoryString = getCertificateDirectory();
|
|
|
|
QDir directory(directoryString);
|
|
|
|
|
|
|
|
int certificateIndex = 1;
|
|
|
|
while (true)
|
|
|
|
{
|
|
|
|
QString fileName = directory.absoluteFilePath(QString("cert_%1.pfx").arg(certificateIndex++));
|
|
|
|
if (!QFile::exists(fileName))
|
|
|
|
{
|
|
|
|
return fileName;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return QString();
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
bool PDFCertificateManager::isCertificateValid(QString fileName, QString password)
|
2022-05-14 17:38:28 +02:00
|
|
|
{
|
|
|
|
QFile file(fileName);
|
|
|
|
if (file.open(QFile::ReadOnly))
|
|
|
|
{
|
|
|
|
QByteArray data = file.readAll();
|
|
|
|
file.close();
|
|
|
|
|
|
|
|
openssl_ptr<BIO> pksBuffer(BIO_new(BIO_s_mem()), &BIO_free_all);
|
|
|
|
BIO_write(pksBuffer.get(), data.constData(), data.length());
|
|
|
|
|
|
|
|
openssl_ptr<PKCS12> pkcs12(d2i_PKCS12_bio(pksBuffer.get(), nullptr), &PKCS12_free);
|
|
|
|
if (pkcs12)
|
|
|
|
{
|
|
|
|
const char* passwordPointer = nullptr;
|
|
|
|
QByteArray passwordByteArray = password.isEmpty() ? QByteArray() : password.toUtf8();
|
|
|
|
if (!passwordByteArray.isEmpty())
|
|
|
|
{
|
|
|
|
passwordPointer = passwordByteArray.constData();
|
|
|
|
}
|
|
|
|
|
|
|
|
return PKCS12_parse(pkcs12.get(), passwordPointer, nullptr, nullptr, nullptr) == 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
bool PDFSignatureFactory::sign(QString certificateName, QString password, QByteArray data, QByteArray& result)
|
2022-05-20 19:57:35 +02:00
|
|
|
{
|
|
|
|
QFile file(certificateName);
|
|
|
|
if (file.open(QFile::ReadOnly))
|
|
|
|
{
|
|
|
|
QByteArray certificateData = file.readAll();
|
|
|
|
file.close();
|
|
|
|
|
|
|
|
openssl_ptr<BIO> certificateBuffer(BIO_new(BIO_s_mem()), &BIO_free_all);
|
|
|
|
BIO_write(certificateBuffer.get(), certificateData.constData(), certificateData.length());
|
|
|
|
|
|
|
|
openssl_ptr<PKCS12> pkcs12(d2i_PKCS12_bio(certificateBuffer.get(), nullptr), &PKCS12_free);
|
|
|
|
if (pkcs12)
|
|
|
|
{
|
|
|
|
const char* passwordPointer = nullptr;
|
|
|
|
QByteArray passwordByteArray = password.isEmpty() ? QByteArray() : password.toUtf8();
|
|
|
|
if (!passwordByteArray.isEmpty())
|
|
|
|
{
|
|
|
|
passwordPointer = passwordByteArray.constData();
|
|
|
|
}
|
|
|
|
|
|
|
|
EVP_PKEY* key = nullptr;
|
|
|
|
X509* certificate = nullptr;
|
|
|
|
STACK_OF(X509)* certificates = nullptr;
|
|
|
|
if (PKCS12_parse(pkcs12.get(), passwordPointer, &key, &certificate, &certificates) == 1)
|
|
|
|
{
|
|
|
|
openssl_ptr<BIO> signedDataBuffer(BIO_new(BIO_s_mem()), &BIO_free_all);
|
|
|
|
BIO_write(signedDataBuffer.get(), data.constData(), data.length());
|
|
|
|
|
|
|
|
PKCS7* signature = PKCS7_sign(certificate, key, certificates, signedDataBuffer.get(), PKCS7_DETACHED | PKCS7_BINARY);
|
|
|
|
if (signature)
|
|
|
|
{
|
|
|
|
openssl_ptr<BIO> outputBuffer(BIO_new(BIO_s_mem()), &BIO_free_all);
|
|
|
|
i2d_PKCS7_bio(outputBuffer.get(), signature);
|
|
|
|
|
|
|
|
BUF_MEM* pksMemoryBuffer = nullptr;
|
|
|
|
BIO_get_mem_ptr(outputBuffer.get(), &pksMemoryBuffer);
|
|
|
|
|
|
|
|
result = QByteArray(pksMemoryBuffer->data, int(pksMemoryBuffer->length));
|
|
|
|
|
|
|
|
EVP_PKEY_free(key);
|
|
|
|
X509_free(certificate);
|
|
|
|
sk_X509_free(certificates);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
EVP_PKEY_free(key);
|
|
|
|
X509_free(certificate);
|
|
|
|
sk_X509_free(certificates);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2022-06-12 15:45:32 +02:00
|
|
|
} // namespace pdf
|
2022-09-11 17:54:11 +02:00
|
|
|
|
|
|
|
#if defined(PDF4QT_COMPILER_MINGW) || defined(PDF4QT_COMPILER_GCC)
|
|
|
|
#pragma GCC diagnostic pop
|
|
|
|
#endif
|
2022-09-17 13:56:41 +02:00
|
|
|
|
|
|
|
#if defined(PDF4QT_COMPILER_MSVC)
|
|
|
|
#pragma warning(pop)
|
|
|
|
#endif
|