8#include <botan/tls_messages.h>
9#include <botan/tls_extensions.h>
10#include <botan/tls_exceptn.h>
11#include <botan/tls_alert.h>
12#include <botan/internal/tls_reader.h>
13#include <botan/internal/tls_handshake_io.h>
14#include <botan/internal/tls_handshake_hash.h>
15#include <botan/internal/loadstor.h>
16#include <botan/data_src.h>
25 const std::vector<X509_Certificate>& cert_list) :
39 const size_t total_size =
make_uint32(0, buf[0], buf[1], buf[2]);
41 if(total_size != buf.size() - 3)
45 if(max_size > 0 && total_size > max_size)
46 throw Decoding_Error(
"Certificate chain exceeds policy specified maximum size");
48 const uint8_t* certs = buf.data() + 3;
50 while(
size_t remaining_bytes = buf.data() + buf.size() - certs)
52 if(remaining_bytes < 3)
55 const size_t cert_size =
make_uint32(0, certs[0], certs[1], certs[2]);
57 if(remaining_bytes < (3 + cert_size))
63 certs += cert_size + 3;
73 if(!m_certs.empty() && m_certs[0].x509_version() != 3)
76 "The leaf certificate must be v3");
85 std::vector<uint8_t> buf(3);
87 for(
const auto& cert : m_certs)
89 const auto raw_cert = cert.BER_encode();
90 const size_t cert_size = raw_cert.size();
91 for(
size_t j = 0; j != 3; ++j)
93 buf.push_back(
get_byte_var(j+1,
static_cast<uint32_t
>(cert_size)));
98 const size_t buf_size = buf.size() - 3;
99 for(
size_t i = 0; i != 3; ++i)
100 buf[i] =
get_byte_var(i+1,
static_cast<uint32_t
>(buf_size));
Certificate_12(Handshake_IO &io, Handshake_Hash &hash, const std::vector< X509_Certificate > &certs)
std::vector< uint8_t > serialize() const override
void update(const uint8_t in[], size_t length)
virtual std::vector< uint8_t > send(const Handshake_Message &msg)=0
virtual size_t maximum_certificate_chain_size() const
constexpr uint32_t make_uint32(uint8_t i0, uint8_t i1, uint8_t i2, uint8_t i3)
constexpr uint8_t get_byte_var(size_t byte_num, T input)