diff options
Diffstat (limited to 'src/tls/msg_cert_req.cpp')
-rw-r--r-- | src/tls/msg_cert_req.cpp | 163 |
1 files changed, 0 insertions, 163 deletions
diff --git a/src/tls/msg_cert_req.cpp b/src/tls/msg_cert_req.cpp deleted file mode 100644 index 23d59c6d4..000000000 --- a/src/tls/msg_cert_req.cpp +++ /dev/null @@ -1,163 +0,0 @@ -/* -* Certificate Request Message -* (C) 2004-2006,2012 Jack Lloyd -* -* Released under the terms of the Botan license -*/ - -#include <botan/internal/tls_messages.h> -#include <botan/internal/tls_reader.h> -#include <botan/internal/tls_extensions.h> -#include <botan/internal/tls_handshake_io.h> -#include <botan/der_enc.h> -#include <botan/ber_dec.h> -#include <botan/loadstor.h> - -namespace Botan { - -namespace TLS { - -namespace { - -std::string cert_type_code_to_name(byte code) - { - switch(code) - { - case 1: - return "RSA"; - case 2: - return "DSA"; - case 64: - return "ECDSA"; - default: - return ""; // DH or something else - } - } - -byte cert_type_name_to_code(const std::string& name) - { - if(name == "RSA") - return 1; - if(name == "DSA") - return 2; - if(name == "ECDSA") - return 64; - - throw Invalid_Argument("Unknown cert type " + name); - } - -} - -/** -* Create a new Certificate Request message -*/ -Certificate_Req::Certificate_Req(Handshake_IO& io, - Handshake_Hash& hash, - const Policy& policy, - const std::vector<X509_DN>& ca_certs, - Protocol_Version version) : - m_names(ca_certs), - m_cert_key_types({ "RSA", "DSA", "ECDSA" }) - { - if(version.supports_negotiable_signature_algorithms()) - { - std::vector<std::string> hashes = policy.allowed_signature_hashes(); - std::vector<std::string> sigs = policy.allowed_signature_methods(); - - for(size_t i = 0; i != hashes.size(); ++i) - for(size_t j = 0; j != sigs.size(); ++j) - m_supported_algos.push_back(std::make_pair(hashes[i], sigs[j])); - } - - hash.update(io.send(*this)); - } - -/** -* Deserialize a Certificate Request message -*/ -Certificate_Req::Certificate_Req(const std::vector<byte>& buf, - Protocol_Version version) - { - if(buf.size() < 4) - throw Decoding_Error("Certificate_Req: Bad certificate request"); - - TLS_Data_Reader reader(buf); - - std::vector<byte> cert_type_codes = reader.get_range_vector<byte>(1, 1, 255); - - for(size_t i = 0; i != cert_type_codes.size(); ++i) - { - const std::string cert_type_name = cert_type_code_to_name(cert_type_codes[i]); - - if(cert_type_name == "") // something we don't know - continue; - - m_cert_key_types.push_back(cert_type_name); - } - - if(version.supports_negotiable_signature_algorithms()) - { - std::vector<byte> sig_hash_algs = reader.get_range_vector<byte>(2, 2, 65534); - - if(sig_hash_algs.size() % 2 != 0) - throw Decoding_Error("Bad length for signature IDs in certificate request"); - - for(size_t i = 0; i != sig_hash_algs.size(); i += 2) - { - std::string hash = Signature_Algorithms::hash_algo_name(sig_hash_algs[i]); - std::string sig = Signature_Algorithms::sig_algo_name(sig_hash_algs[i+1]); - m_supported_algos.push_back(std::make_pair(hash, sig)); - } - } - - const u16bit purported_size = reader.get_u16bit(); - - if(reader.remaining_bytes() != purported_size) - throw Decoding_Error("Inconsistent length in certificate request"); - - while(reader.has_remaining()) - { - std::vector<byte> name_bits = reader.get_range_vector<byte>(2, 0, 65535); - - BER_Decoder decoder(&name_bits[0], name_bits.size()); - X509_DN name; - decoder.decode(name); - m_names.push_back(name); - } - } - -/** -* Serialize a Certificate Request message -*/ -std::vector<byte> Certificate_Req::serialize() const - { - std::vector<byte> buf; - - std::vector<byte> cert_types; - - for(size_t i = 0; i != m_cert_key_types.size(); ++i) - cert_types.push_back(cert_type_name_to_code(m_cert_key_types[i])); - - append_tls_length_value(buf, cert_types, 1); - - if(!m_supported_algos.empty()) - buf += Signature_Algorithms(m_supported_algos).serialize(); - - std::vector<byte> encoded_names; - - for(size_t i = 0; i != m_names.size(); ++i) - { - DER_Encoder encoder; - encoder.encode(m_names[i]); - - append_tls_length_value(encoded_names, encoder.get_contents(), 2); - } - - append_tls_length_value(buf, encoded_names, 2); - - return buf; - } - -} - -} |