Add validation

This commit is contained in:
Miek Gieben 2012-09-14 11:56:02 +02:00
parent 646ce89f6d
commit f6cf2ae240
1 changed files with 39 additions and 30 deletions

69
tlsa.go
View File

@ -12,48 +12,57 @@ import (
// TLSA support functions
// certToTLSACert returns the hex data suitable for inclusion in a TLSA record
func certToTLSACert(selector, matchingType uint8, cert *x509.Certificate) string {
switch matchingType {
case 0:
switch selector {
case 0:
return hex.EncodeToString(cert.Raw)
case 1:
return hex.EncodeToString(cert.RawSubjectPublicKeyInfo)
}
case 1:
h := sha256.New()
switch selector {
case 0:
return hex.EncodeToString(cert.Raw)
case 1:
io.WriteString(h, string(cert.RawSubjectPublicKeyInfo))
return hex.EncodeToString(h.Sum(nil))
}
case 2:
h := sha512.New()
switch selector {
case 0:
return hex.EncodeToString(cert.Raw)
case 1:
io.WriteString(h, string(cert.RawSubjectPublicKeyInfo))
return hex.EncodeToString(h.Sum(nil))
}
}
return ""
}
// Sign creates a TLSA record from a SSL certificate.
func (r *RR_TLSA) Sign(usage, selector, matchingType int, cert *x509.Certificate) error {
r.Hdr.Rrtype = TypeTLSA
r.Usage = uint8(usage)
r.Selector = uint8(selector)
r.MatchingType = uint8(matchingType)
// Checks on the value!?
switch r.MatchingType {
case 0:
switch r.Selector {
case 0:
r.Certificate = hex.EncodeToString(cert.Raw)
case 1:
r.Certificate = hex.EncodeToString(cert.RawSubjectPublicKeyInfo)
}
case 1:
h := sha256.New()
switch r.Selector {
case 0:
r.Certificate = hex.EncodeToString(cert.Raw)
case 1:
io.WriteString(h, string(cert.RawSubjectPublicKeyInfo))
r.Certificate = hex.EncodeToString(h.Sum(nil))
}
case 2:
h := sha512.New()
switch r.Selector {
case 0:
r.Certificate = hex.EncodeToString(cert.Raw)
case 1:
io.WriteString(h, string(cert.RawSubjectPublicKeyInfo))
r.Certificate = hex.EncodeToString(h.Sum(nil))
}
}
r.Certificate = certToTLSACert(r.Selector, r.MatchingType, cert)
return nil
}
// Verify verifies a TLSA record against a SSL certificate. If it is OK
// a nil error is returned.
func (r *RR_TLSA) Verify(cert *x509.Certifcate) error {
return nil
func (r *RR_TLSA) Verify(cert *x509.Certificate) error {
if r.Certificate == certToTLSACert(r.Selector, r.MatchingType, cert) {
return nil
}
return ErrSig // ErrSig, really?
}
// Name set the ownername of the TLSA record according to the