9#include <botan/certstor.h>
11#include <botan/asn1_time.h>
12#include <botan/assert.h>
13#include <botan/data_src.h>
14#include <botan/pkix_types.h>
15#include <botan/internal/filesystem.h>
30 if(cert == searching) {
39 const std::vector<uint8_t>& key_id)
const {
54class Certificate_Store_In_Memory::Impl final {
56 std::vector<X509_Certificate> m_certs;
57 std::set<X509_Certificate::Tag> m_cert_tags;
58 std::map<X509_DN, std::vector<size_t>> m_dn_to_indices;
59 std::vector<X509_CRL> m_crls;
60 std::map<X509_DN, size_t> m_issuer_dn_to_crl_idx;
66 m_impl(std::make_unique<Impl>(other.impl())) {}
75Certificate_Store_In_Memory::Impl& Certificate_Store_In_Memory::impl() {
80const Certificate_Store_In_Memory::Impl& Certificate_Store_In_Memory::impl()
const {
87 const auto tag = cert.
tag();
88 if(!store.m_cert_tags.contains(tag)) {
89 store.m_cert_tags.insert(tag);
90 const size_t idx = store.m_certs.size();
91 store.m_certs.push_back(cert);
92 store.m_dn_to_indices[cert.
subject_dn()].push_back(idx);
97 const auto& store = impl();
98 std::vector<X509_DN> subjects;
99 subjects.reserve(store.m_certs.size());
100 for(
const auto& cert : store.m_certs) {
101 subjects.push_back(cert.subject_dn());
107 const std::vector<uint8_t>& key_id)
const {
108 const auto& store = impl();
109 const auto it = store.m_dn_to_indices.find(subject_dn);
110 if(it == store.m_dn_to_indices.end()) {
114 for(
const size_t idx : it->second) {
115 const auto& cert = store.m_certs[idx];
118 if(!key_id.empty()) {
119 const std::vector<uint8_t>& skid = cert.subject_key_id();
120 if(!skid.empty() && skid != key_id) {
132 const std::vector<uint8_t>& key_id)
const {
133 const auto& store = impl();
134 std::vector<X509_Certificate> matches;
136 const auto it = store.m_dn_to_indices.find(subject_dn);
137 if(it == store.m_dn_to_indices.end()) {
141 for(
const size_t idx : it->second) {
142 const auto& cert = store.m_certs[idx];
145 if(!key_id.empty()) {
146 const std::vector<uint8_t>& skid = cert.subject_key_id();
147 if(!skid.empty() && skid != key_id) {
152 matches.push_back(cert);
159 const std::vector<uint8_t>& key_hash)
const {
160 if(key_hash.size() != 20) {
161 throw Invalid_Argument(
"Certificate_Store_In_Memory::find_cert_by_pubkey_sha1 invalid hash");
164 for(
const auto& cert : impl().m_certs) {
165 if(key_hash == cert.subject_public_key_bitstring_sha1()) {
174 const std::vector<uint8_t>& subject_hash)
const {
175 if(subject_hash.size() != 32) {
176 throw Invalid_Argument(
"Certificate_Store_In_Memory::find_cert_by_raw_subject_dn_sha256 invalid hash");
179 for(
const auto& cert : impl().m_certs) {
180 if(subject_hash == cert.raw_subject_dn_sha256()) {
189 const X509_DN& issuer_dn, std::span<const uint8_t> serial_number)
const {
190 for(
const auto& cert : impl().m_certs) {
191 if(cert.issuer_dn() == issuer_dn && std::ranges::equal(cert.serial_number(), serial_number)) {
200 auto& store = impl();
203 if(
const auto it = store.m_issuer_dn_to_crl_idx.find(crl_issuer); it != store.m_issuer_dn_to_crl_idx.end()) {
204 auto& current_crl = store.m_crls.at(it->second);
207 if(current_crl.this_update() <= crl.
this_update()) {
215 store.m_issuer_dn_to_crl_idx.emplace(crl_issuer, store.m_crls.size());
216 store.m_crls.push_back(crl);
220 const auto& store = impl();
223 const auto it = store.m_issuer_dn_to_crl_idx.find(subject.
issuer_dn());
224 if(it == store.m_issuer_dn_to_crl_idx.end()) {
228 const auto& crl = store.m_crls.at(it->second);
231 if(!key_id.empty()) {
232 const std::vector<uint8_t>& akid = crl.authority_key_id();
234 if(!akid.empty() && akid != key_id) {
243 return impl().m_cert_tags.contains(cert.
tag());
256#if defined(BOTAN_TARGET_OS_HAS_FILESYSTEM)
264 if(maybe_certs.empty()) {
265 maybe_certs.push_back(std::string(dir));
268 for(
auto&& cert_file : maybe_certs) {
270 DataSource_Stream src(cert_file, true);
271 while(!src.end_of_data()) {
273 add_certificate(X509_Certificate(src));
274 } catch(std::exception&) {
279 }
catch(std::exception&) {}
#define BOTAN_ASSERT_NOMSG(expr)
#define BOTAN_STATE_CHECK(expr)
Certificate_Store_In_Memory(const X509_Certificate &cert)
std::optional< X509_Certificate > find_cert_by_issuer_dn_and_serial_number(const X509_DN &issuer_dn, std::span< const uint8_t > serial_number) const override
Certificate_Store_In_Memory()
std::vector< X509_Certificate > find_all_certs(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const override
std::optional< X509_Certificate > find_cert_by_pubkey_sha1(const std::vector< uint8_t > &key_hash) const override
std::optional< X509_Certificate > find_cert(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const override
~Certificate_Store_In_Memory() override
Certificate_Store_In_Memory & operator=(const Certificate_Store_In_Memory &other)=delete
void add_crl(const X509_CRL &crl)
std::optional< X509_Certificate > find_cert_by_raw_subject_dn_sha256(const std::vector< uint8_t > &subject_hash) const override
std::optional< X509_CRL > find_crl_for(const X509_Certificate &subject) const override
bool contains(const X509_Certificate &cert) const override
void add_certificate(const X509_Certificate &cert)
std::vector< X509_DN > all_subjects() const override
virtual std::optional< X509_CRL > find_crl_for(const X509_Certificate &subject) const
bool certificate_known(const X509_Certificate &cert) const
virtual bool contains(const X509_Certificate &cert) const
virtual ~Certificate_Store()
virtual std::vector< X509_Certificate > find_all_certs(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const =0
virtual std::optional< X509_Certificate > find_cert(const X509_DN &subject_dn, const std::vector< uint8_t > &key_id) const
const X509_Time & this_update() const
const X509_DN & issuer_dn() const
const X509_DN & subject_dn() const
const std::vector< uint8_t > & authority_key_id() const
const std::vector< uint8_t > & subject_key_id() const
const X509_DN & issuer_dn() const
std::vector< std::string > get_files_recursive(std::string_view dir)