use asn1_rs::nom::AsBytes;
use async_generic::async_generic;
use bcder::decode::Constructed;
use ciborium::value::Value;
use coset::{sig_structure_data, HeaderBuilder, Label, ProtectedHeader, SignatureContext};
use serde::{Deserialize, Serialize};
use serde_bytes::ByteBuf;
use crate::{
asn1::rfc3161::{TimeStampResp, TstInfo},
cose::{CoseError, TimeStampStorage},
raw_signature::{AsyncRawSigner, RawSigner},
time_stamp::{verify_time_stamp, verify_time_stamp_async, ContentInfo, TimeStampResponse},
};
#[async_generic]
pub(crate) fn validate_cose_tst_info(
sign1: &coset::CoseSign1,
data: &[u8],
) -> Result<TstInfo, CoseError> {
let Some((sigtst, tss)) = &sign1
.unprotected
.rest
.iter()
.find_map(|x: &(Label, Value)| {
if x.0 == Label::Text("sigTst2".to_string()) {
Some((x.1.clone(), TimeStampStorage::V2_sigTst2_CTT))
} else if x.0 == Label::Text("sigTst".to_string()) {
Some((x.1.clone(), TimeStampStorage::V1_sigTst))
} else {
None
}
})
else {
return Err(CoseError::NoTimeStampToken);
};
let mut maybe_sig_data: Vec<u8> = vec![];
let tbs = match tss {
TimeStampStorage::V1_sigTst => data,
TimeStampStorage::V2_sigTst2_CTT => {
let sig_data = ByteBuf::from(sign1.signature.clone());
ciborium::into_writer(&sig_data, &mut maybe_sig_data)
.map_err(|e| CoseError::CborParsingError(e.to_string()))?;
maybe_sig_data.as_slice()
}
};
let mut time_cbor: Vec<u8> = vec![];
ciborium::into_writer(sigtst, &mut time_cbor)
.map_err(|e| CoseError::InternalError(e.to_string()))?;
let tst_infos = if _sync {
parse_and_validate_sigtst(&time_cbor, tbs, &sign1.protected)?
} else {
parse_and_validate_sigtst_async(&time_cbor, tbs, &sign1.protected).await?
};
let Some(tst_info) = tst_infos.into_iter().next() else {
return Err(CoseError::NoTimeStampToken);
};
Ok(tst_info)
}
#[async_generic]
pub(crate) fn parse_and_validate_sigtst(
sigtst_cbor: &[u8],
data: &[u8],
p_header: &ProtectedHeader,
) -> Result<Vec<TstInfo>, CoseError> {
let tst_container: TstContainer = ciborium::from_reader(sigtst_cbor)
.map_err(|err| CoseError::CborParsingError(err.to_string()))?;
let mut tstinfos: Vec<TstInfo> = vec![];
for token in &tst_container.tst_tokens {
let tbs = cose_countersign_data(data, p_header);
let tst_info = if _sync {
verify_time_stamp(&token.val, &tbs)?
} else {
verify_time_stamp_async(&token.val, &tbs).await?
};
tstinfos.push(tst_info);
}
if tstinfos.is_empty() {
Err(CoseError::NoTimeStampToken)
} else {
Ok(tstinfos)
}
}
pub fn cose_countersign_data(data: &[u8], p_header: &ProtectedHeader) -> Vec<u8> {
let aad: Vec<u8> = vec![];
sig_structure_data(
SignatureContext::CounterSignature,
p_header.clone(),
None,
&aad,
data,
)
}
#[derive(Clone, Debug, Deserialize, Eq, PartialEq, Serialize)]
pub(crate) struct TstToken {
#[allow(missing_docs)]
#[serde(with = "serde_bytes")]
pub val: Vec<u8>,
}
#[derive(Debug, Default, Deserialize, Eq, PartialEq, Serialize)]
struct TstContainer {
#[serde(rename = "tstTokens")]
tst_tokens: Vec<TstToken>,
}
impl TstContainer {
pub(crate) fn add_token(&mut self, token: TstToken) {
self.tst_tokens.push(token);
}
}
#[async_generic(
async_signature(
ts_provider: &dyn AsyncRawSigner,
data: &[u8],
p_header: &ProtectedHeader,
mut header_builder: HeaderBuilder,
tss: TimeStampStorage,
))]
pub(crate) fn add_sigtst_header(
ts_provider: &dyn RawSigner,
data: &[u8],
p_header: &ProtectedHeader,
mut header_builder: HeaderBuilder,
tss: TimeStampStorage,
) -> Result<HeaderBuilder, CoseError> {
let sd = cose_countersign_data(data, p_header);
let maybe_cts = if _sync {
ts_provider.send_time_stamp_request(&sd)
} else {
ts_provider.send_time_stamp_request(&sd).await
};
if let Some(cts) = maybe_cts {
let mut cts = cts?;
if tss == TimeStampStorage::V2_sigTst2_CTT {
cts = timestamptoken_from_timestamprsp(&cts).ok_or(CoseError::CborGenerationError(
"unable to generate time stamp token".to_string(),
))?;
}
let cts = make_cose_timestamp(&cts);
let mut sigtst_vec: Vec<u8> = vec![];
ciborium::into_writer(&cts, &mut sigtst_vec)
.map_err(|e| CoseError::CborGenerationError(e.to_string()))?;
let sigtst_cbor: Value = ciborium::from_reader(sigtst_vec.as_slice())
.map_err(|e| CoseError::CborGenerationError(e.to_string()))?;
match tss {
TimeStampStorage::V1_sigTst => {
header_builder = header_builder.text_value("sigTst".to_string(), sigtst_cbor);
}
TimeStampStorage::V2_sigTst2_CTT => {
header_builder = header_builder.text_value("sigTst2".to_string(), sigtst_cbor);
}
}
}
Ok(header_builder)
}
fn make_cose_timestamp(ts_data: &[u8]) -> TstContainer {
let token = TstToken {
val: ts_data.to_vec(),
};
let mut container = TstContainer::default();
container.add_token(token);
container
}
fn timestamptoken_from_timestamprsp(ts: &[u8]) -> Option<Vec<u8>> {
let ts_resp = TimeStampResponse(
Constructed::decode(ts, bcder::Mode::Der, TimeStampResp::take_from).ok()?,
);
let tst = ts_resp.0.time_stamp_token?;
let a: Result<Vec<u32>, CoseError> = tst
.content_type
.iter()
.map(|v| {
v.to_u32()
.ok_or(CoseError::InternalError("invalid component".to_string()))
})
.collect();
let ci = ContentInfo {
content_type: rasn::types::ObjectIdentifier::new(a.ok()?)?,
content: rasn::types::Any::new(tst.content.as_bytes().to_vec()),
};
rasn::der::encode(&ci).ok()
}