aboutsummaryrefslogtreecommitdiffstats
path: root/src/tls/msg_cert_req.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/tls/msg_cert_req.cpp')
-rw-r--r--src/tls/msg_cert_req.cpp163
1 files changed, 0 insertions, 163 deletions
diff --git a/src/tls/msg_cert_req.cpp b/src/tls/msg_cert_req.cpp
deleted file mode 100644
index 23d59c6d4..000000000
--- a/src/tls/msg_cert_req.cpp
+++ /dev/null
@@ -1,163 +0,0 @@
-/*
-* Certificate Request Message
-* (C) 2004-2006,2012 Jack Lloyd
-*
-* Released under the terms of the Botan license
-*/
-
-#include <botan/internal/tls_messages.h>
-#include <botan/internal/tls_reader.h>
-#include <botan/internal/tls_extensions.h>
-#include <botan/internal/tls_handshake_io.h>
-#include <botan/der_enc.h>
-#include <botan/ber_dec.h>
-#include <botan/loadstor.h>
-
-namespace Botan {
-
-namespace TLS {
-
-namespace {
-
-std::string cert_type_code_to_name(byte code)
- {
- switch(code)
- {
- case 1:
- return "RSA";
- case 2:
- return "DSA";
- case 64:
- return "ECDSA";
- default:
- return ""; // DH or something else
- }
- }
-
-byte cert_type_name_to_code(const std::string& name)
- {
- if(name == "RSA")
- return 1;
- if(name == "DSA")
- return 2;
- if(name == "ECDSA")
- return 64;
-
- throw Invalid_Argument("Unknown cert type " + name);
- }
-
-}
-
-/**
-* Create a new Certificate Request message
-*/
-Certificate_Req::Certificate_Req(Handshake_IO& io,
- Handshake_Hash& hash,
- const Policy& policy,
- const std::vector<X509_DN>& ca_certs,
- Protocol_Version version) :
- m_names(ca_certs),
- m_cert_key_types({ "RSA", "DSA", "ECDSA" })
- {
- if(version.supports_negotiable_signature_algorithms())
- {
- std::vector<std::string> hashes = policy.allowed_signature_hashes();
- std::vector<std::string> sigs = policy.allowed_signature_methods();
-
- for(size_t i = 0; i != hashes.size(); ++i)
- for(size_t j = 0; j != sigs.size(); ++j)
- m_supported_algos.push_back(std::make_pair(hashes[i], sigs[j]));
- }
-
- hash.update(io.send(*this));
- }
-
-/**
-* Deserialize a Certificate Request message
-*/
-Certificate_Req::Certificate_Req(const std::vector<byte>& buf,
- Protocol_Version version)
- {
- if(buf.size() < 4)
- throw Decoding_Error("Certificate_Req: Bad certificate request");
-
- TLS_Data_Reader reader(buf);
-
- std::vector<byte> cert_type_codes = reader.get_range_vector<byte>(1, 1, 255);
-
- for(size_t i = 0; i != cert_type_codes.size(); ++i)
- {
- const std::string cert_type_name = cert_type_code_to_name(cert_type_codes[i]);
-
- if(cert_type_name == "") // something we don't know
- continue;
-
- m_cert_key_types.push_back(cert_type_name);
- }
-
- if(version.supports_negotiable_signature_algorithms())
- {
- std::vector<byte> sig_hash_algs = reader.get_range_vector<byte>(2, 2, 65534);
-
- if(sig_hash_algs.size() % 2 != 0)
- throw Decoding_Error("Bad length for signature IDs in certificate request");
-
- for(size_t i = 0; i != sig_hash_algs.size(); i += 2)
- {
- std::string hash = Signature_Algorithms::hash_algo_name(sig_hash_algs[i]);
- std::string sig = Signature_Algorithms::sig_algo_name(sig_hash_algs[i+1]);
- m_supported_algos.push_back(std::make_pair(hash, sig));
- }
- }
-
- const u16bit purported_size = reader.get_u16bit();
-
- if(reader.remaining_bytes() != purported_size)
- throw Decoding_Error("Inconsistent length in certificate request");
-
- while(reader.has_remaining())
- {
- std::vector<byte> name_bits = reader.get_range_vector<byte>(2, 0, 65535);
-
- BER_Decoder decoder(&name_bits[0], name_bits.size());
- X509_DN name;
- decoder.decode(name);
- m_names.push_back(name);
- }
- }
-
-/**
-* Serialize a Certificate Request message
-*/
-std::vector<byte> Certificate_Req::serialize() const
- {
- std::vector<byte> buf;
-
- std::vector<byte> cert_types;
-
- for(size_t i = 0; i != m_cert_key_types.size(); ++i)
- cert_types.push_back(cert_type_name_to_code(m_cert_key_types[i]));
-
- append_tls_length_value(buf, cert_types, 1);
-
- if(!m_supported_algos.empty())
- buf += Signature_Algorithms(m_supported_algos).serialize();
-
- std::vector<byte> encoded_names;
-
- for(size_t i = 0; i != m_names.size(); ++i)
- {
- DER_Encoder encoder;
- encoder.encode(m_names[i]);
-
- append_tls_length_value(encoded_names, encoder.get_contents(), 2);
- }
-
- append_tls_length_value(buf, encoded_names, 2);
-
- return buf;
- }
-
-}
-
-}