mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-14 14:49:32 +01:00
d2ea21d0d8
* use certmagic for more extensible/robust ACME cert handling * accept TOS based on config option Signed-off-by: Andrew Thornton <art27@cantab.net> Co-authored-by: zeripath <art27@cantab.net> Co-authored-by: Lauris BH <lauris@nix.lv>
44 lines
1.3 KiB
Go
Vendored
44 lines
1.3 KiB
Go
Vendored
package dns
|
|
|
|
import (
|
|
"crypto/sha256"
|
|
"crypto/x509"
|
|
"encoding/hex"
|
|
)
|
|
|
|
// Sign creates a SMIMEA record from an SSL certificate.
|
|
func (r *SMIMEA) Sign(usage, selector, matchingType int, cert *x509.Certificate) (err error) {
|
|
r.Hdr.Rrtype = TypeSMIMEA
|
|
r.Usage = uint8(usage)
|
|
r.Selector = uint8(selector)
|
|
r.MatchingType = uint8(matchingType)
|
|
|
|
r.Certificate, err = CertificateToDANE(r.Selector, r.MatchingType, cert)
|
|
return err
|
|
}
|
|
|
|
// Verify verifies a SMIMEA record against an SSL certificate. If it is OK
|
|
// a nil error is returned.
|
|
func (r *SMIMEA) Verify(cert *x509.Certificate) error {
|
|
c, err := CertificateToDANE(r.Selector, r.MatchingType, cert)
|
|
if err != nil {
|
|
return err // Not also ErrSig?
|
|
}
|
|
if r.Certificate == c {
|
|
return nil
|
|
}
|
|
return ErrSig // ErrSig, really?
|
|
}
|
|
|
|
// SMIMEAName returns the ownername of a SMIMEA resource record as per the
|
|
// format specified in RFC 'draft-ietf-dane-smime-12' Section 2 and 3
|
|
func SMIMEAName(email, domain string) (string, error) {
|
|
hasher := sha256.New()
|
|
hasher.Write([]byte(email))
|
|
|
|
// RFC Section 3: "The local-part is hashed using the SHA2-256
|
|
// algorithm with the hash truncated to 28 octets and
|
|
// represented in its hexadecimal representation to become the
|
|
// left-most label in the prepared domain name"
|
|
return hex.EncodeToString(hasher.Sum(nil)[:28]) + "." + "_smimecert." + domain, nil
|
|
}
|