#include nn::pki::SignatureBlock::SignatureBlock() { clear(); } nn::pki::SignatureBlock::SignatureBlock(const SignatureBlock& other) { *this = other; } void nn::pki::SignatureBlock::operator=(const SignatureBlock& other) { mRawBinary = other.mRawBinary; mSignType = other.mSignType; mIsLittleEndian = other.mIsLittleEndian; mSignature = other.mSignature; } bool nn::pki::SignatureBlock::operator==(const SignatureBlock& other) const { return (mSignType == other.mSignType) \ && (mIsLittleEndian == other.mIsLittleEndian) \ && (mSignature == other.mSignature); } bool nn::pki::SignatureBlock::operator!=(const SignatureBlock& other) const { return !(*this == other); } void nn::pki::SignatureBlock::toBytes() { size_t totalSize = 0; size_t sigSize = 0; switch (mSignType) { case (sign::SIGN_ID_RSA4096_SHA1): case (sign::SIGN_ID_RSA4096_SHA256): totalSize = sizeof(sRsa4096SignBlock); sigSize = fnd::rsa::kRsa4096Size; break; case (sign::SIGN_ID_RSA2048_SHA1): case (sign::SIGN_ID_RSA2048_SHA256): totalSize = sizeof(sRsa2048SignBlock); sigSize = fnd::rsa::kRsa2048Size; break; case (sign::SIGN_ID_ECDSA240_SHA1): case (sign::SIGN_ID_ECDSA240_SHA256): totalSize = sizeof(sEcdsa240SignBlock); sigSize = sign::kEcdsaSigSize; break; default: throw fnd::Exception(kModuleName, "Unknown signature type"); } if (mSignature.size() != sigSize) throw fnd::Exception(kModuleName, "Signature size is incorrect"); // commit to binary mRawBinary.alloc(totalSize); if (mIsLittleEndian) *(le_uint32_t*)(mRawBinary.data()) = mSignType; else *(be_uint32_t*)(mRawBinary.data()) = mSignType; memcpy(mRawBinary.data() + 4, mSignature.data(), sigSize); } void nn::pki::SignatureBlock::fromBytes(const byte_t* src, size_t size) { clear(); size_t totalSize = 0; size_t sigSize = 0; uint32_t signType = 0; // try Big Endian sign type signType = ((be_uint32_t*)src)->get(); switch (signType) { case (sign::SIGN_ID_RSA4096_SHA1): case (sign::SIGN_ID_RSA4096_SHA256): totalSize = sizeof(sRsa4096SignBlock); sigSize = fnd::rsa::kRsa4096Size; break; case (sign::SIGN_ID_RSA2048_SHA1): case (sign::SIGN_ID_RSA2048_SHA256): totalSize = sizeof(sRsa2048SignBlock); sigSize = fnd::rsa::kRsa2048Size; break; case (sign::SIGN_ID_ECDSA240_SHA1): case (sign::SIGN_ID_ECDSA240_SHA256): totalSize = sizeof(sEcdsa240SignBlock); sigSize = sign::kEcdsaSigSize; break; } // try Big Endian sign type if (totalSize == 0) { signType = ((le_uint32_t*)src)->get(); switch (signType) { case (sign::SIGN_ID_RSA4096_SHA1): case (sign::SIGN_ID_RSA4096_SHA256): totalSize = sizeof(sRsa4096SignBlock); sigSize = fnd::rsa::kRsa4096Size; break; case (sign::SIGN_ID_RSA2048_SHA1): case (sign::SIGN_ID_RSA2048_SHA256): totalSize = sizeof(sRsa2048SignBlock); sigSize = fnd::rsa::kRsa2048Size; break; case (sign::SIGN_ID_ECDSA240_SHA1): case (sign::SIGN_ID_ECDSA240_SHA256): totalSize = sizeof(sEcdsa240SignBlock); sigSize = sign::kEcdsaSigSize; break; default: throw fnd::Exception(kModuleName, "Unknown signature type"); } mIsLittleEndian = true; } if (totalSize > size) { throw fnd::Exception(kModuleName, "Certificate too small"); } mRawBinary.alloc(totalSize); memcpy(mRawBinary.data(), src, totalSize); mSignType = (sign::SignatureId)signType; mSignature.alloc(sigSize); memcpy(mSignature.data(), mRawBinary.data() + 4, sigSize); } const fnd::Vec& nn::pki::SignatureBlock::getBytes() const { return mRawBinary; } void nn::pki::SignatureBlock::clear() { mRawBinary.clear(); mSignType = sign::SIGN_ID_RSA4096_SHA1; mIsLittleEndian = false; mSignature.clear(); } nn::pki::sign::SignatureId nn::pki::SignatureBlock::getSignType() const { return mSignType; } void nn::pki::SignatureBlock::setSignType(nn::pki::sign::SignatureId type) { mSignType = type; } bool nn::pki::SignatureBlock::isLittleEndian() const { return mIsLittleEndian; } void nn::pki::SignatureBlock::setLittleEndian(bool isLE) { mIsLittleEndian = isLE; } const fnd::Vec& nn::pki::SignatureBlock::getSignature() const { return mSignature; } void nn::pki::SignatureBlock::setSignature(const fnd::Vec& signature) { mSignature = signature; }