8#include <botan/tls_messages.h>
9#include <botan/tls_extensions.h>
10#include <botan/tls_exceptn.h>
11#include <botan/tls_alert.h>
12#include <botan/internal/tls_reader.h>
13#include <botan/internal/tls_handshake_io.h>
14#include <botan/internal/tls_handshake_hash.h>
15#include <botan/loadstor.h>
16#include <botan/data_src.h>
27 const std::vector<X509_Certificate>& cert_list) :
41 const size_t total_size =
make_uint32(0, buf[0], buf[1], buf[2]);
43 if(total_size != buf.size() - 3)
47 if(max_size > 0 && total_size > max_size)
48 throw Decoding_Error(
"Certificate chain exceeds policy specified maximum size");
50 const uint8_t* certs = buf.data() + 3;
52 while(
size_t remaining_bytes = buf.data() + buf.size() - certs)
54 if(remaining_bytes < 3)
57 const size_t cert_size =
make_uint32(0, certs[0], certs[1], certs[2]);
59 if(remaining_bytes < (3 + cert_size))
65 certs += cert_size + 3;
75 if(m_certs.size() > 0 && m_certs[0].x509_version() != 3)
78 "The leaf certificate must be v3");
85std::vector<uint8_t> Certificate::serialize()
const
87 std::vector<uint8_t> buf(3);
89 for(
size_t i = 0; i != m_certs.size(); ++i)
91 std::vector<uint8_t> raw_cert = m_certs[i].BER_encode();
92 const size_t cert_size = raw_cert.size();
93 for(
size_t j = 0; j != 3; ++j)
95 buf.push_back(
get_byte(j+1,
static_cast<uint32_t
>(cert_size)));
100 const size_t buf_size = buf.size() - 3;
101 for(
size_t i = 0; i != 3; ++i)
102 buf[i] =
get_byte(i+1,
static_cast<uint32_t
>(buf_size));
Certificate(Handshake_IO &io, Handshake_Hash &hash, const std::vector< X509_Certificate > &certs)
virtual std::vector< uint8_t > send(const Handshake_Message &msg)=0
virtual size_t maximum_certificate_chain_size() const
constexpr uint32_t make_uint32(uint8_t i0, uint8_t i1, uint8_t i2, uint8_t i3)
constexpr uint8_t get_byte(size_t byte_num, T input)