blob: e896a699138840d31a2f6a37894c56b3ae34ad01 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
|
/*
* Certificate Status
* (C) 2016 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include <botan/tls_messages.h>
#include <botan/tls_extensions.h>
#include <botan/internal/tls_reader.h>
#include <botan/internal/tls_handshake_io.h>
#include <botan/internal/tls_handshake_hash.h>
#include <botan/der_enc.h>
#include <botan/ber_dec.h>
#include <botan/ocsp.h>
namespace Botan::TLS {
Certificate_Status::Certificate_Status(const std::vector<uint8_t>& buf)
{
if(buf.size() < 5)
throw Decoding_Error("Invalid Certificate_Status message: too small");
if(buf[0] != 1) // not OCSP
throw Decoding_Error("Unexpected Certificate_Status message: unexpected response type");
size_t len = make_uint32(0, buf[1], buf[2], buf[3]);
// Verify the redundant length field...
if(buf.size() != len + 4)
throw Decoding_Error("Invalid Certificate_Status: invalid length field");
m_response.assign(buf.begin() + 4, buf.end());
}
Certificate_Status::Certificate_Status(Handshake_IO& io,
Handshake_Hash& hash,
const OCSP::Response& ocsp) :
m_response(ocsp.raw_bits())
{
hash.update(io.send(*this));
}
Certificate_Status::Certificate_Status(Handshake_IO& io,
Handshake_Hash& hash,
const std::vector<uint8_t>& raw_response_bytes) :
m_response(raw_response_bytes)
{
hash.update(io.send(*this));
}
std::vector<uint8_t> Certificate_Status::serialize() const
{
if(m_response.size() > 0xFFFFFF) // unlikely
throw Encoding_Error("OCSP response too long to encode in TLS");
const uint32_t response_len = static_cast<uint32_t>(m_response.size());
std::vector<uint8_t> buf;
buf.push_back(1); // type OCSP
for(size_t i = 1; i < 4; ++i)
buf.push_back(get_byte_var(i, response_len));
buf += m_response;
return buf;
}
}
|