mirror of
https://github.com/go-i2p/go-i2p.git
synced 2025-07-06 22:38:30 -04:00
112 lines
2.8 KiB
Go
112 lines
2.8 KiB
Go
package common
|
|
|
|
import (
|
|
"errors"
|
|
)
|
|
|
|
const (
|
|
CERT_NULL = iota
|
|
CERT_HASHCASH
|
|
CERT_HIDDEN
|
|
CERT_SIGNED
|
|
CERT_MULTIPLE
|
|
CERT_KEY
|
|
)
|
|
|
|
const (
|
|
KEYCERT_SIGN_DSA_SHA1 = iota
|
|
KEYCERT_SIGN_P256
|
|
KEYCERT_SIGN_P384
|
|
KEYCERT_SIGN_P521
|
|
KEYCERT_SIGN_RSA2048
|
|
KEYCERT_SIGN_RSA3072
|
|
KEYCERT_SIGN_RSA4096
|
|
KEYCERT_SIGN_ED25519
|
|
)
|
|
|
|
const (
|
|
KEYCERT_CRYPTO_ELG = iota
|
|
)
|
|
|
|
type Certificate []byte
|
|
|
|
func (certificate Certificate) Type() byte {
|
|
return certificate[0]
|
|
}
|
|
|
|
//
|
|
// Look up the length of the certificate, reporting
|
|
// errors if the certificate is invalid or the specified
|
|
// length does not match the provided data.
|
|
//
|
|
func (certificate Certificate) Length() (int, error) {
|
|
if len(certificate) < 3 {
|
|
// log
|
|
return 0, errors.New("error parsing certificate length: certificate is too short")
|
|
}
|
|
length := Integer(certificate[1:3])
|
|
inferred_len := length + 3
|
|
cert_len := len(certificate)
|
|
if inferred_len > cert_len {
|
|
// log
|
|
return length, errors.New("certificate parsing warning: certificate data is shorter than specified by length")
|
|
} else if cert_len > inferred_len {
|
|
//log
|
|
return length, errors.New("certificate parsing warning: certificate contains data beyond length")
|
|
}
|
|
return length, nil
|
|
}
|
|
|
|
//
|
|
// Return the certificate data and any errors
|
|
// encountered by Length.
|
|
//
|
|
func (certificate Certificate) Data() ([]byte, error) {
|
|
length, err := certificate.Length()
|
|
if err != nil {
|
|
switch err.Error() {
|
|
case "error parsing certificate length: certificate is too short":
|
|
return make([]byte, 0), err
|
|
case "certificate parsing warning: certificate data is shorter than specified by length":
|
|
return certificate[3:], err
|
|
case "certificate parsing warning: certificate contains data beyond length":
|
|
return certificate[3 : length+3], err
|
|
}
|
|
}
|
|
return certificate[3:], nil
|
|
}
|
|
|
|
func (certificate Certificate) SignatureSize() int {
|
|
sizes := map[int]int{
|
|
KEYCERT_SIGN_DSA_SHA1: 40,
|
|
KEYCERT_SIGN_P256: 64,
|
|
KEYCERT_SIGN_P384: 96,
|
|
KEYCERT_SIGN_P521: 132,
|
|
KEYCERT_SIGN_RSA2048: 256,
|
|
KEYCERT_SIGN_RSA3072: 384,
|
|
KEYCERT_SIGN_RSA4096: 512,
|
|
KEYCERT_SIGN_ED25519: 64,
|
|
}
|
|
return sizes[int(certificate.Type())]
|
|
}
|
|
|
|
//
|
|
// Read a certificate from a slice of bytes, returning
|
|
// any extra data on the end of the slice.
|
|
//
|
|
func ReadCertificate(data []byte) (Certificate, []byte, error) {
|
|
certificate := Certificate(data)
|
|
length, err := certificate.Length()
|
|
if err != nil {
|
|
switch err.Error() {
|
|
case "error parsing certificate length: certificate is too short":
|
|
return Certificate{}, make([]byte, 0), err
|
|
case "certificate parsing warning: certificate data is shorter than specified by length":
|
|
return certificate, make([]byte, 0), err
|
|
case "certificate parsing warning: certificate contains data beyond length":
|
|
return Certificate(certificate[:length+3]), certificate[length+3:], nil
|
|
}
|
|
}
|
|
return certificate, make([]byte, 0), nil
|
|
}
|