1#include <vanetza/security/v2/recipient_info.hpp>
2#include <vanetza/security/v2/length_coding.hpp>
3#include <boost/variant/static_visitor.hpp>
4#include <boost/variant/apply_visitor.hpp>
13PublicKeyAlgorithm get_type(
const Key& key)
15 struct key_visitor :
public boost::static_visitor<PublicKeyAlgorithm>
17 PublicKeyAlgorithm operator()(
const EciesEncryptedKey& key)
19 return PublicKeyAlgorithm::ECIES_NISTP256;
22 PublicKeyAlgorithm operator()(
const OpaqueKey& key)
25 return PublicKeyAlgorithm::ECDSA_NISTP256_With_SHA256;
30 return boost::apply_visitor(visitor, key);
33PublicKeyAlgorithm RecipientInfo::pk_encryption()
const
35 return get_type(enc_key);
40 size_t size = info.cert_id.size();
41 size +=
sizeof(PublicKeyAlgorithm);
42 struct RecipientInfoKey_visitor :
public boost::static_visitor<size_t>
44 size_t operator()(
const EciesEncryptedKey& key)
46 return key.c.size() + key.t.size() + get_size(key.v);
49 size_t operator()(
const OpaqueKey& key)
51 return length_coding_size(key.data.size()) + key.data.size();
55 RecipientInfoKey_visitor visit;
56 size += boost::apply_visitor(visit, info.enc_key);
60void serialize(OutputArchive& ar,
const RecipientInfo& info, SymmetricAlgorithm sym_algo)
62 struct key_visitor :
public boost::static_visitor<>
64 key_visitor(OutputArchive& ar, SymmetricAlgorithm sym_algo, PublicKeyAlgorithm pk_algo) :
65 m_archive(ar), m_sym_algo(sym_algo), m_pk_algo(pk_algo)
68 void operator()(
const EciesEncryptedKey& key)
70 assert(key.c.size() == field_size(m_sym_algo));
71 serialize(m_archive, key.v, m_pk_algo);
72 for (
auto&
byte : key.c) {
75 for (
auto&
byte : key.t) {
80 void operator()(
const OpaqueKey& key)
82 serialize_length(m_archive, key.data.size());
83 for (
auto byte : key.data) {
88 OutputArchive& m_archive;
89 SymmetricAlgorithm m_sym_algo;
90 PublicKeyAlgorithm m_pk_algo;
93 for (
auto&
byte : info.cert_id) {
96 const PublicKeyAlgorithm pk_algo = info.pk_encryption();
97 serialize(ar, pk_algo);
98 key_visitor visitor(ar, sym_algo, pk_algo);
99 boost::apply_visitor(visitor, info.enc_key);
102EciesEncryptedKey deserialize_ecies(InputArchive& ar,
const SymmetricAlgorithm& symAlgo)
105 deserialize(ar, ecies.v, PublicKeyAlgorithm::ECIES_NISTP256);
106 const size_t fieldSize = field_size(symAlgo);
107 for (
size_t c = 0; c < fieldSize; ++c) {
110 ecies.c.push_back(tmp);
112 for (
size_t c = 0; c < ecies.t.size(); ++c) {
120OpaqueKey deserialize_opaque(InputArchive& ar)
122 static const std::uintmax_t length_limit = 512;
123 const std::uintmax_t length = deserialize_length(ar);
125 if (length <= length_limit) {
126 ByteBuffer opaque(length);
127 for (std::uintmax_t i = 0; i < length; ++i) {
136size_t deserialize(InputArchive& ar,
RecipientInfo& info,
const SymmetricAlgorithm& symAlgo)
138 for (
size_t c = 0; c < info.cert_id.size(); ++c) {
139 ar >> info.cert_id[c];
141 PublicKeyAlgorithm algo;
142 deserialize(ar, algo);
144 case PublicKeyAlgorithm::ECIES_NISTP256:
145 info.enc_key = deserialize_ecies(ar, symAlgo);
148 info.enc_key = deserialize_opaque(ar);
151 return get_size(info);
EciesEncryptedKey specified in TS 103 097 v1.2.1, section 5.9.
OpaqueKey specified in TS 103 097 v1.2.1, section 5.8.
RecipientInfo specified in TS 103 097 v1.2.1, section 5.8.