9#include <botan/certstor.h>
11#include <botan/data_src.h>
12#include <botan/hash.h>
13#include <botan/pkix_types.h>
14#include <botan/internal/filesystem.h>
22 if(cert == searching) {
31 const std::vector<uint8_t>& key_id)
const {
47 for(
const auto& c : m_certs) {
53 m_certs.push_back(cert);
57 std::vector<X509_DN> subjects;
58 subjects.reserve(m_certs.size());
59 for(
const auto& cert : m_certs) {
60 subjects.push_back(cert.subject_dn());
66 const std::vector<uint8_t>& key_id)
const {
67 for(
const auto& cert : m_certs) {
70 const std::vector<uint8_t>& skid = cert.subject_key_id();
72 if(!skid.empty() && skid != key_id) {
77 if(cert.subject_dn() == subject_dn) {
86 const std::vector<uint8_t>& key_id)
const {
87 std::vector<X509_Certificate> matches;
89 for(
const auto& cert : m_certs) {
91 const std::vector<uint8_t>& skid = cert.subject_key_id();
93 if(!skid.empty() && skid != key_id) {
98 if(cert.subject_dn() == subject_dn) {
99 matches.push_back(cert);
107 const std::vector<uint8_t>& key_hash)
const {
108 if(key_hash.size() != 20) {
109 throw Invalid_Argument(
"Certificate_Store_In_Memory::find_cert_by_pubkey_sha1 invalid hash");
114 for(
const auto& cert : m_certs) {
115 hash->update(cert.subject_public_key_bitstring());
116 if(key_hash == hash->final_stdvec()) {
125 const std::vector<uint8_t>& subject_hash)
const {
126 if(subject_hash.size() != 32) {
127 throw Invalid_Argument(
"Certificate_Store_In_Memory::find_cert_by_raw_subject_dn_sha256 invalid hash");
132 for(
const auto& cert : m_certs) {
133 hash->update(cert.raw_subject_dn());
134 if(subject_hash == hash->final_stdvec()) {
145 for(
auto& c : m_crls) {
147 if(c.issuer_dn() == crl_issuer) {
156 m_crls.push_back(crl);
162 for(
const auto& c : m_crls) {
164 if(!key_id.empty()) {
165 const std::vector<uint8_t>& akid = c.authority_key_id();
167 if(!akid.empty() && akid != key_id) {
172 if(c.issuer_dn() == subject.
issuer_dn()) {
184#if defined(BOTAN_TARGET_OS_HAS_FILESYSTEM)
192 if(maybe_certs.empty()) {
193 maybe_certs.push_back(std::string(dir));
196 for(
auto&& cert_file : maybe_certs) {
198 DataSource_Stream src(cert_file,
true);
199 while(!src.end_of_data()) {
201 X509_Certificate cert(src);
202 m_certs.push_back(cert);
203 }
catch(std::exception&) {
208 }
catch(std::exception&) {}
std::vector< X509_Certificate > find_all_certs(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const override
std::optional< X509_Certificate > find_cert_by_pubkey_sha1(const std::vector< uint8_t > &key_hash) const override
std::optional< X509_Certificate > find_cert(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const override
Certificate_Store_In_Memory()=default
void add_crl(const X509_CRL &crl)
std::optional< X509_Certificate > find_cert_by_raw_subject_dn_sha256(const std::vector< uint8_t > &subject_hash) const override
std::optional< X509_CRL > find_crl_for(const X509_Certificate &subject) const override
void add_certificate(const X509_Certificate &cert)
std::vector< X509_DN > all_subjects() const override
virtual std::optional< X509_CRL > find_crl_for(const X509_Certificate &subject) const
bool certificate_known(const X509_Certificate &cert) const
virtual ~Certificate_Store()
virtual std::vector< X509_Certificate > find_all_certs(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const =0
virtual std::optional< X509_Certificate > find_cert(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const
static std::unique_ptr< HashFunction > create(std::string_view algo_spec, std::string_view provider="")
const X509_Time & this_update() const
const X509_DN & issuer_dn() const
const X509_DN & subject_dn() const
const std::vector< uint8_t > & authority_key_id() const
const std::vector< uint8_t > & subject_key_id() const
const X509_DN & issuer_dn() const
std::vector< std::string > get_files_recursive(std::string_view dir)