1#include <vanetza/common/byte_buffer_sink.hpp>
2#include <vanetza/common/serialization_buffer.hpp>
3#include <vanetza/security/exception.hpp>
4#include <vanetza/security/sha.hpp>
5#include <vanetza/security/v2/certificate.hpp>
6#include <vanetza/security/v2/length_coding.hpp>
7#include <vanetza/security/v2/signer_info.hpp>
8#include <vanetza/security/v2/validity_restriction.hpp>
9#include <boost/iostreams/stream.hpp>
10#include <boost/variant/apply_visitor.hpp>
11#include <boost/variant/get.hpp>
12#include <boost/variant/static_visitor.hpp>
26 size_t size =
sizeof(cert.version());
27 size += get_size(cert.signer_info);
28 size += get_size(cert.subject_info);
29 size += get_size(cert.subject_attributes);
30 size += length_coding_size(get_size(cert.subject_attributes));
31 size += get_size(cert.validity_restriction);
32 size += length_coding_size(get_size(cert.validity_restriction));
33 size += get_size(cert.signature);
40 serialize(ar, host_cast(cert.version()));
41 serialize(ar, cert.signer_info);
42 serialize(ar, cert.subject_info);
43 serialize(ar, cert.subject_attributes);
44 serialize(ar, cert.validity_restriction);
45 serialize(ar, cert.signature);
51 deserialize(ar, version);
52 size_t size =
sizeof(cert.version());
54 size += deserialize(ar, cert.signer_info);
55 size += deserialize(ar, cert.subject_info);
56 size += deserialize(ar, cert.subject_attributes);
57 size += length_coding_size(get_size(cert.subject_attributes));
58 size += deserialize(ar, cert.validity_restriction);
59 size += length_coding_size(get_size(cert.validity_restriction));
60 size += deserialize(ar, cert.signature);
68ByteBuffer convert_for_signing(
const Certificate& cert)
73 boost::iostreams::stream_buffer<byte_buffer_sink> stream(sink);
76 const uint8_t version = cert.version();
78 serialize(ar, cert.signer_info);
79 serialize(ar, cert.subject_info);
80 serialize(ar, cert.subject_attributes);
81 serialize(ar, cert.validity_restriction);
89 cert.subject_attributes.sort([](
const SubjectAttribute& a,
const SubjectAttribute& b) {
90 const SubjectAttributeType type_a = get_type(a);
91 const SubjectAttributeType type_b = get_type(b);
94 using enum_int = std::underlying_type<SubjectAttributeType>::type;
95 return static_cast<enum_int>(type_a) <
static_cast<enum_int>(type_b);
98 cert.validity_restriction.sort([](
const ValidityRestriction& a,
const ValidityRestriction& b) {
99 const ValidityRestrictionType type_a = get_type(a);
100 const ValidityRestrictionType type_b = get_type(b);
103 using enum_int = std::underlying_type<ValidityRestrictionType>::type;
104 return static_cast<enum_int>(type_a) <
static_cast<enum_int>(type_b);
111 for (
auto& attribute : cert.subject_attributes) {
112 if (get_type(attribute) == SubjectAttributeType::Verification_Key) {
113 const VerificationKey& verification_key = boost::get<VerificationKey>(attribute);
114 const EccPoint& ecc_point = boost::get<ecdsa_nistp256_with_sha256>(verification_key.key).public_key;
115 public_key_coordinates = backend.decompress_point(ecc_point);
120 return public_key_coordinates;
125 auto unc = get_uncompressed_public_key(cert, backend);
126 boost::optional<ecdsa256::
PublicKey> result;
128 if (unc && unc->x.size() == pub.x.size() && unc->y.size() == pub.y.size()) {
129 std::copy_n(unc->x.begin(), pub.x.size(), pub.x.data());
130 std::copy_n(unc->y.begin(), pub.y.size(), pub.y.data());
131 result = std::move(pub);
141 boost::optional<
EcdsaSignature> signature = extract_ecdsa_signature(cert.signature);
143 struct canonical_visitor :
public boost::static_visitor<EccPoint>
167 canonical_sig.s = signature->s;
168 canonical_sig.R = boost::apply_visitor(canonical_visitor(), signature->R);
169 assert(get_type(canonical_sig.R) == EccPointType::X_Coordinate_Only);
170 canonical_cert.signature = canonical_sig;
174 serialize_into_buffer(canonical_cert, bytes);
177 Sha256Digest digest = calculate_sha256_digest(bytes.data(), bytes.size());
178 assert(digest.size() >= id.size());
179 std::copy(digest.end() - id.size(), digest.end(), id.begin());
185 const SubjectAttribute* match =
nullptr;
186 for (
auto& attribute : subject_attributes) {
187 if (get_type(attribute) == sat) {
197 const ValidityRestriction* match =
nullptr;
198 for (
auto& restriction : validity_restriction) {
199 if (get_type(restriction) == vrt) {
200 match = &restriction;
209 for (
auto it = subject_attributes.begin(); it != subject_attributes.end(); ) {
210 if (get_type(*it) == type) {
211 it = subject_attributes.erase(it);
220 for (
auto it = validity_restriction.begin(); it != validity_restriction.end(); ) {
221 if (get_type(*it) == type) {
222 it = validity_restriction.erase(it);
231 for (
auto& item : subject_attributes) {
232 if (get_type(item) == SubjectAttributeType::ITS_AID_List) {
233 auto& aid_list = boost::get<std::list<IntX>>(item);
234 aid_list.push_back(IntX(aid));
239 subject_attributes.push_back(std::list<IntX>({ IntX(aid) }));
242void Certificate::add_permission(ItsAid aid,
const ByteBuffer& ssp)
246 for (
auto& item : subject_attributes) {
247 if (get_type(item) == SubjectAttributeType::ITS_AID_SSP_List) {
248 auto& aid_ssp_list = boost::get<std::list<ItsAidSsp> >(item);
249 aid_ssp_list.push_back(permission);
254 subject_attributes.push_back(std::list<ItsAidSsp>({ permission }));
258
259
260
261
262
263
264
265
266
267
thrown when a deserialization error occurred
IntX specified in TS 103 097 v1.2.1, section 4.2.1.
Compressed_Lsb_Y_0 specified in TS 103 097 v1.2.1 in section 4.2.5.
Compressed_Lsb_Y_1 specified in TS 103 097 v1.2.1 in section 4.2.5.
EcdsaSignature specified in TS 103 097 v1.2.1, section 4.2.9.
Uncompressed specified in TS 103 097 v1.2.1 in section 4.2.5.
X_Coordinate_Only specified in TS 103 097 v1.2.1 in section 4.2.5.
described in TS 103 097 v1.2.1 (2015-06), section 6.1
const ValidityRestriction * get_restriction(ValidityRestrictionType type) const
const SubjectAttribute * get_attribute(SubjectAttributeType type) const
void remove_attribute(SubjectAttributeType type)
void remove_restriction(ValidityRestrictionType type)
void add_permission(ItsAid aid)
ItsAidSsp specified in TS 103 097 v1.2.1, section 6.9.