blob: fcdb510c5f36e37134749080359c3a5991a8bf45 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
/*
* X.509 Certificate Options
* (C) 1999-2007 Jack Lloyd
*
* Botan is released under the Simplified BSD License (see license.txt)
*/
#include <botan/x509self.h>
#include <botan/internal/parsing.h>
#include <chrono>
namespace Botan {
/*
* Set when the certificate should become valid
*/
void X509_Cert_Options::not_before(const std::string& time_string)
{
start = X509_Time(time_string, ASN1_Tag::UTC_OR_GENERALIZED_TIME);
}
/*
* Set when the certificate should expire
*/
void X509_Cert_Options::not_after(const std::string& time_string)
{
end = X509_Time(time_string, ASN1_Tag::UTC_OR_GENERALIZED_TIME);
}
/*
* Set key constraint information
*/
void X509_Cert_Options::add_constraints(Key_Constraints usage)
{
constraints = usage;
}
/*
* Set key constraint information
*/
void X509_Cert_Options::add_ex_constraint(const OID& oid)
{
ex_constraints.push_back(oid);
}
/*
* Set key constraint information
*/
void X509_Cert_Options::add_ex_constraint(const std::string& oid_str)
{
ex_constraints.push_back(OID::from_string(oid_str));
}
/*
* Mark this certificate for CA usage
*/
void X509_Cert_Options::CA_key(size_t limit)
{
is_CA = true;
path_limit = limit;
}
void X509_Cert_Options::set_padding_scheme(const std::string& scheme)
{
padding_scheme = scheme;
}
/*
* Initialize the certificate options
*/
X509_Cert_Options::X509_Cert_Options(const std::string& initial_opts,
uint32_t expiration_time)
{
is_CA = false;
path_limit = 0;
constraints = NO_CONSTRAINTS;
// use default for chosen algorithm
padding_scheme = "";
auto now = std::chrono::system_clock::now();
start = X509_Time(now);
end = X509_Time(now + std::chrono::seconds(expiration_time));
if(initial_opts.empty())
return;
std::vector<std::string> parsed = split_on(initial_opts, '/');
if(parsed.size() > 4)
throw Invalid_Argument("X.509 cert options: Too many names: "
+ initial_opts);
if(parsed.size() >= 1) common_name = parsed[0];
if(parsed.size() >= 2) country = parsed[1];
if(parsed.size() >= 3) organization = parsed[2];
if(parsed.size() == 4) org_unit = parsed[3];
}
}
|