1#include <vanetza/common/byte_buffer_sink.hpp>
2#include <vanetza/common/serialization_buffer.hpp>
3#include <vanetza/security/exception.hpp>
4#include <vanetza/security/sha.hpp>
5#include <vanetza/security/v2/certificate.hpp>
6#include <vanetza/security/v2/length_coding.hpp>
7#include <vanetza/security/v2/signer_info.hpp>
8#include <vanetza/security/v2/validity_restriction.hpp>
9#include <boost/iostreams/stream.hpp>
10#include <boost/variant/apply_visitor.hpp>
11#include <boost/variant/get.hpp>
12#include <boost/variant/static_visitor.hpp>
24size_t get_size(
const Certificate& cert)
26 size_t size =
sizeof(cert.version());
27 size += get_size(cert.signer_info);
28 size += get_size(cert.subject_info);
29 size += get_size(cert.subject_attributes);
30 size += length_coding_size(get_size(cert.subject_attributes));
31 size += get_size(cert.validity_restriction);
32 size += length_coding_size(get_size(cert.validity_restriction));
33 size += get_size(cert.signature);
38void serialize(OutputArchive& ar,
const Certificate& cert)
40 serialize(ar, host_cast(cert.version()));
41 serialize(ar, cert.signer_info);
42 serialize(ar, cert.subject_info);
43 serialize(ar, cert.subject_attributes);
44 serialize(ar, cert.validity_restriction);
45 serialize(ar, cert.signature);
48size_t deserialize(InputArchive& ar, Certificate& cert)
51 deserialize(ar, version);
52 size_t size =
sizeof(cert.version());
54 size += deserialize(ar, cert.signer_info);
55 size += deserialize(ar, cert.subject_info);
56 size += deserialize(ar, cert.subject_attributes);
57 size += length_coding_size(get_size(cert.subject_attributes));
58 size += deserialize(ar, cert.validity_restriction);
59 size += length_coding_size(get_size(cert.validity_restriction));
60 size += deserialize(ar, cert.signature);
62 throw deserialization_error(
"Unsupported Certificate version");
68ByteBuffer convert_for_signing(
const Certificate& cert)
71 byte_buffer_sink sink(buf);
73 boost::iostreams::stream_buffer<byte_buffer_sink> stream(sink);
74 OutputArchive ar(stream);
76 const uint8_t version = cert.version();
78 serialize(ar, cert.signer_info);
79 serialize(ar, cert.subject_info);
80 serialize(ar, cert.subject_attributes);
81 serialize(ar, cert.validity_restriction);
87void sort(Certificate& cert)
89 cert.subject_attributes.sort([](
const SubjectAttribute& a,
const SubjectAttribute& b) {
90 const SubjectAttributeType type_a = get_type(a);
91 const SubjectAttributeType type_b = get_type(b);
94 using enum_int = std::underlying_type<SubjectAttributeType>::type;
95 return static_cast<enum_int
>(type_a) <
static_cast<enum_int
>(type_b);
98 cert.validity_restriction.sort([](
const ValidityRestriction& a,
const ValidityRestriction& b) {
99 const ValidityRestrictionType type_a = get_type(a);
100 const ValidityRestrictionType type_b = get_type(b);
103 using enum_int = std::underlying_type<ValidityRestrictionType>::type;
104 return static_cast<enum_int
>(type_a) <
static_cast<enum_int
>(type_b);
108boost::optional<Uncompressed> get_uncompressed_public_key(
const Certificate& cert, Backend& backend)
110 boost::optional<Uncompressed> public_key_coordinates;
111 for (
auto& attribute : cert.subject_attributes) {
112 if (get_type(attribute) == SubjectAttributeType::Verification_Key) {
113 const VerificationKey& verification_key = boost::get<VerificationKey>(attribute);
114 const EccPoint& ecc_point = boost::get<ecdsa_nistp256_with_sha256>(verification_key.key).public_key;
115 public_key_coordinates = backend.decompress_point(ecc_point);
120 return public_key_coordinates;
123boost::optional<ecdsa256::PublicKey> get_public_key(
const Certificate& cert, Backend& backend)
125 auto unc = get_uncompressed_public_key(cert, backend);
126 boost::optional<ecdsa256::PublicKey> result;
127 ecdsa256::PublicKey pub;
128 if (unc && unc->x.size() == pub.x.size() && unc->y.size() == pub.y.size()) {
129 std::copy_n(unc->x.begin(), pub.x.size(), pub.x.data());
130 std::copy_n(unc->y.begin(), pub.y.size(), pub.y.data());
131 result = std::move(pub);
136HashedId8 calculate_hash(
const Certificate& cert)
138 Certificate canonical_cert = cert;
141 boost::optional<EcdsaSignature> signature = extract_ecdsa_signature(cert.signature);
143 struct canonical_visitor :
public boost::static_visitor<EccPoint>
145 EccPoint operator()(
const X_Coordinate_Only& x_only)
const
150 EccPoint operator()(
const Compressed_Lsb_Y_0& y0)
const
152 return X_Coordinate_Only { y0.x };
155 EccPoint operator()(
const Compressed_Lsb_Y_1& y1)
const
157 return X_Coordinate_Only { y1.x };
160 EccPoint operator()(
const Uncompressed& unc)
const
162 return X_Coordinate_Only { unc.x };
166 EcdsaSignature canonical_sig;
167 canonical_sig.s = signature->s;
168 canonical_sig.R = boost::apply_visitor(canonical_visitor(), signature->R);
169 assert(get_type(canonical_sig.R) == EccPointType::X_Coordinate_Only);
170 canonical_cert.signature = canonical_sig;
174 serialize_into_buffer(canonical_cert, bytes);
177 Sha256Digest digest = calculate_sha256_digest(bytes.data(), bytes.size());
178 assert(digest.size() >=
id.size());
179 std::copy(digest.end() -
id.size(), digest.end(),
id.begin());
185 const SubjectAttribute* match =
nullptr;
186 for (
auto& attribute : subject_attributes) {
187 if (get_type(attribute) == sat) {
197 const ValidityRestriction* match =
nullptr;
198 for (
auto& restriction : validity_restriction) {
199 if (get_type(restriction) == vrt) {
200 match = &restriction;
209 for (
auto it = subject_attributes.begin(); it != subject_attributes.end(); ) {
210 if (get_type(*it) == type) {
211 it = subject_attributes.erase(it);
220 for (
auto it = validity_restriction.begin(); it != validity_restriction.end(); ) {
221 if (get_type(*it) == type) {
222 it = validity_restriction.erase(it);
231 for (
auto& item : subject_attributes) {
232 if (get_type(item) == SubjectAttributeType::ITS_AID_List) {
233 auto& aid_list = boost::get<std::list<IntX>>(item);
234 aid_list.push_back(
IntX(aid));
239 subject_attributes.push_back(std::list<IntX>({
IntX(aid) }));
246 for (
auto& item : subject_attributes) {
247 if (get_type(item) == SubjectAttributeType::ITS_AID_SSP_List) {
248 auto& aid_ssp_list = boost::get<std::list<ItsAidSsp> >(item);
249 aid_ssp_list.push_back(permission);
254 subject_attributes.push_back(std::list<ItsAidSsp>({ permission }));
IntX specified in TS 103 097 v1.2.1, section 4.2.1.
void add_permission(ItsAid aid)
const validity_restriction_type< T > * get_restriction() const
void remove_attribute(SubjectAttributeType type)
const subject_attribute_type< T > * get_attribute() const
void remove_restriction(ValidityRestrictionType type)
ItsAidSsp specified in TS 103 097 v1.2.1, section 6.9.