# -*- encoding: utf-8; frozen_string_literal: true -*- # #-- # This file is part of HexaPDF. # # HexaPDF - A Versatile PDF Creation and Manipulation Library For Ruby # Copyright (C) 2014-2023 Thomas Leitner # # HexaPDF is free software: you can redistribute it and/or modify it # under the terms of the GNU Affero General Public License version 3 as # published by the Free Software Foundation with the addition of the # following permission added to Section 15 as permitted in Section 7(a): # FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY # THOMAS LEITNER, THOMAS LEITNER DISCLAIMS THE WARRANTY OF NON # INFRINGEMENT OF THIRD PARTY RIGHTS. # # HexaPDF is distributed in the hope that it will be useful, but WITHOUT # ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or # FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public # License for more details. # # You should have received a copy of the GNU Affero General Public License # along with HexaPDF. If not, see . # # The interactive user interfaces in modified source and object code # versions of HexaPDF must display Appropriate Legal Notices, as required # under Section 5 of the GNU Affero General Public License version 3. # # In accordance with Section 7(b) of the GNU Affero General Public # License, a covered work must retain the producer line in every PDF that # is created or manipulated using HexaPDF. # # If the GNU Affero General Public License doesn't fit your need, # commercial licenses are available at . #++ require 'hexapdf/digital_signature/verification_result' module HexaPDF module DigitalSignature # The base signature handler providing common functionality. # # Specific signature handler need to override methods if necessary and implement the needed # ones that don't have a default implementation. class Handler # The signature dictionary used by the handler. attr_reader :signature_dict # Creates a new signature handler for the given signature dictionary. def initialize(signature_dict) @signature_dict = signature_dict end # Returns the common name of the signer (/Name field of the signature dictionary). def signer_name @signature_dict[:Name] end # Returns the time of signing (/M field of the signature dictionary). def signing_time @signature_dict[:M] end # Returns the certificate chain. # # Needs to be implemented by specific handlers. def certificate_chain raise "Needs to be implemented by specific handlers" end # Returns the certificate used for signing. # # Needs to be implemented by specific handlers. def signer_certificate raise "Needs to be implemented by specific handlers" end # Verifies general signature properties and prepares the provided OpenSSL::X509::Store # object for use by concrete implementations. # # Needs to be called by specific handlers. def verify(store, allow_self_signed: false) result = VerificationResult.new check_certified_signature(result) verify_signing_time(result) store.verify_callback = store_verification_callback(result, allow_self_signed: allow_self_signed) result end protected # Verifies that the signing time was within the validity period of the signer certificate. def verify_signing_time(result) time = signing_time cert = signer_certificate if time && cert && (time < cert.not_before || time > cert.not_after) result.log(:error, "Signer certificate not valid at signing time") end end DOCMDP_PERMS_MESSAGE_MAP = { # :nodoc: 1 => "No changes allowed", 2 => "Form filling and signing allowed", 3 => "Form filling, signing and annotation manipulation allowed", } # Sets an informational message on +result+ whether the signature is a certified signature. def check_certified_signature(result) sigref = signature_dict[:Reference]&.find {|ref| ref[:TransformMethod] == :DocMDP } if sigref && signature_dict.document.catalog[:Perms]&.[](:DocMDP) == signature_dict perms = sigref[:TransformParams]&.[](:P) || 2 result.log(:info, "Certified signature (#{DOCMDP_PERMS_MESSAGE_MAP[perms]})") end end # Returns the block that should be used as the OpenSSL::X509::Store verification callback. # # +result+:: The VerificationResult object that should be updated if problems are found. # # +allow_self_signed+:: Specifies whether self-signed certificates are allowed. def store_verification_callback(result, allow_self_signed: false) lambda do |_success, context| if context.error == OpenSSL::X509::V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT || context.error == OpenSSL::X509::V_ERR_SELF_SIGNED_CERT_IN_CHAIN result.log(allow_self_signed ? :info : :error, "Self-signed certificate found") end true end end end end end