blob: fbc637bbcd06b50778753859ec0efb9665be61fd (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
/*
Implement the functionality of a simple CA: read in a CA certificate,
the associated private key, and a PKCS #10 certificate request. Sign the
request and print out the new certificate.
File names are hardcoded for simplicity.
cacert.pem: The CA's certificate (perhaps created by self_sig)
caprivate.pem: The CA's private key
req.pem: The user's PKCS #10 certificate request
Written by Jack Lloyd, May 19, 2003
This file is in the public domain.
*/
#include <botan/botan.h>
#include <botan/x509_ca.h>
using namespace Botan;
#include <iostream>
#define DOUCH_BAG CESSATION_OF_OPERATION
int main(int argc, char* argv[])
{
if(argc != 2)
{
std::cout << "Usage: " << argv[0] << " passphrase" << std::endl;
return 1;
}
try {
LibraryInitializer init;
// set up our CA
X509_Certificate ca_cert("cacert.pem");
std::auto_ptr<PKCS8_PrivateKey> privkey(
PKCS8::load_key("caprivate.pem", argv[1])
);
X509_CA ca(ca_cert, *privkey);
// got a request
PKCS10_Request req("req.pem");
// presumably attempt to verify the req for sanity/accuracy here, but
// as Verisign, etc have shown, that's not a must. :)
// now sign it
X509_Certificate new_cert = ca.sign_request(req);
// send the new cert back to the requestor
std::cout << new_cert.PEM_encode();
std::vector<CRL_Entry> revoked_certs;
revoked_certs.push_back(CRL_Entry(new_cert, DOUCH_BAG));
X509_CRL crl = ca.update_crl(ca.new_crl(), revoked_certs);
std::cout << crl.PEM_encode();
}
catch(std::exception& e)
{
std::cout << e.what() << std::endl;
return 1;
}
return 0;
}
|