Botan 3.6.1
Crypto and TLS for C&
msg_certificate_12.cpp
Go to the documentation of this file.
1/*
2* Certificate Message
3* (C) 2004-2006,2012,2020 Jack Lloyd
4*
5* Botan is released under the Simplified BSD License (see license.txt)
6*/
7
8#include <botan/tls_messages.h>
9
10#include <botan/data_src.h>
11#include <botan/tls_alert.h>
12#include <botan/tls_exceptn.h>
13#include <botan/tls_extensions.h>
14#include <botan/internal/loadstor.h>
15#include <botan/internal/tls_handshake_hash.h>
16#include <botan/internal/tls_handshake_io.h>
17#include <botan/internal/tls_reader.h>
18
19namespace Botan::TLS {
20
21/**
22* Create a new Certificate message
23*/
24Certificate_12::Certificate_12(Handshake_IO& io, Handshake_Hash& hash, const std::vector<X509_Certificate>& cert_list) :
25 m_certs(cert_list) {
26 hash.update(io.send(*this));
27}
28
29/**
30* Deserialize a Certificate message
31*/
32Certificate_12::Certificate_12(const std::vector<uint8_t>& buf, const Policy& policy) {
33 if(buf.size() < 3) {
34 throw Decoding_Error("Certificate: Message malformed");
35 }
36
37 const size_t total_size = make_uint32(0, buf[0], buf[1], buf[2]);
38
39 if(total_size != buf.size() - 3) {
40 throw Decoding_Error("Certificate: Message malformed");
41 }
42
43 const size_t max_size = policy.maximum_certificate_chain_size();
44 if(max_size > 0 && total_size > max_size) {
45 throw Decoding_Error("Certificate chain exceeds policy specified maximum size");
46 }
47
48 const uint8_t* certs = buf.data() + 3;
49
50 while(size_t remaining_bytes = buf.data() + buf.size() - certs) {
51 if(remaining_bytes < 3) {
52 throw Decoding_Error("Certificate: Message malformed");
53 }
54
55 const size_t cert_size = make_uint32(0, certs[0], certs[1], certs[2]);
56
57 if(remaining_bytes < (3 + cert_size)) {
58 throw Decoding_Error("Certificate: Message malformed");
59 }
60
61 DataSource_Memory cert_buf(&certs[3], cert_size);
62 m_certs.push_back(X509_Certificate(cert_buf));
63
64 certs += cert_size + 3;
65 }
66
67 /*
68 * TLS 1.0 through 1.2 all seem to require that the certificate be
69 * precisely a v3 certificate. In fact the strict wording would seem
70 * to require that every certificate in the chain be v3. But often
71 * the intermediates are outside of the control of the server.
72 * But, require that the leaf certificate be v3
73 */
74 if(!m_certs.empty() && m_certs[0].x509_version() != 3) {
75 throw TLS_Exception(Alert::BadCertificate, "The leaf certificate must be v3");
76 }
77}
78
79/**
80* Serialize a Certificate message
81*/
82std::vector<uint8_t> Certificate_12::serialize() const {
83 std::vector<uint8_t> buf(3);
84
85 for(const auto& cert : m_certs) {
86 const auto raw_cert = cert.BER_encode();
87 const size_t cert_size = raw_cert.size();
88 for(size_t j = 0; j != 3; ++j) {
89 buf.push_back(get_byte_var(j + 1, static_cast<uint32_t>(cert_size)));
90 }
91 buf += raw_cert;
92 }
93
94 const size_t buf_size = buf.size() - 3;
95 for(size_t i = 0; i != 3; ++i) {
96 buf[i] = get_byte_var(i + 1, static_cast<uint32_t>(buf_size));
97 }
98
99 return buf;
100}
101
102} // namespace Botan::TLS
Certificate_12(Handshake_IO &io, Handshake_Hash &hash, const std::vector< X509_Certificate > &certs)
std::vector< uint8_t > serialize() const override
void update(const uint8_t in[], size_t length)
virtual std::vector< uint8_t > send(const Handshake_Message &msg)=0
virtual size_t maximum_certificate_chain_size() const
constexpr uint32_t make_uint32(uint8_t i0, uint8_t i1, uint8_t i2, uint8_t i3)
Definition loadstor.h:100
constexpr uint8_t get_byte_var(size_t byte_num, T input)
Definition loadstor.h:65