Botan 3.6.1
Crypto and TLS for C&
x509self.cpp
Go to the documentation of this file.
1/*
2* PKCS #10/Self Signed Cert Creation
3* (C) 1999-2008,2018 Jack Lloyd
4*
5* Botan is released under the Simplified BSD License (see license.txt)
6*/
7
8#include <botan/x509self.h>
9
10#include <botan/der_enc.h>
11#include <botan/hash.h>
12#include <botan/pubkey.h>
13#include <botan/x509_ca.h>
14#include <botan/x509_ext.h>
15#include <botan/x509_key.h>
16#include <botan/internal/fmt.h>
17#include <botan/internal/parsing.h>
18
19namespace Botan {
20
21namespace {
22
23/*
24* Load information from the X509_Cert_Options
25*/
26X509_DN load_dn_info(const X509_Cert_Options& opts) {
27 X509_DN subject_dn;
28
29 subject_dn.add_attribute("X520.CommonName", opts.common_name);
30 subject_dn.add_attribute("X520.Country", opts.country);
31 subject_dn.add_attribute("X520.State", opts.state);
32 subject_dn.add_attribute("X520.Locality", opts.locality);
33 subject_dn.add_attribute("X520.Organization", opts.organization);
34 subject_dn.add_attribute("X520.OrganizationalUnit", opts.org_unit);
35 subject_dn.add_attribute("X520.SerialNumber", opts.serial_number);
36
37 for(const auto& extra_ou : opts.more_org_units) {
38 subject_dn.add_attribute("X520.OrganizationalUnit", extra_ou);
39 }
40
41 return subject_dn;
42}
43
44auto create_alt_name_ext(const X509_Cert_Options& opts, Extensions& extensions) {
45 AlternativeName subject_alt;
46
47 /*
48 If the extension was already created in opts.extension we need to
49 merge the values provied in opts with the values set in the extension.
50 */
51 if(auto ext = extensions.get_extension_object_as<Cert_Extension::Subject_Alternative_Name>()) {
52 subject_alt = ext->get_alt_name();
53 }
54
55 subject_alt.add_dns(opts.dns);
56 for(const auto& nm : opts.more_dns) {
57 subject_alt.add_dns(nm);
58 }
59 subject_alt.add_uri(opts.uri);
60 subject_alt.add_email(opts.email);
61 if(!opts.ip.empty()) {
62 if(auto ipv4 = string_to_ipv4(opts.ip)) {
63 subject_alt.add_ipv4_address(*ipv4);
64 } else {
65 throw Invalid_Argument(fmt("Invalid IPv4 address '{}'", opts.ip));
66 }
67 }
68
69 if(!opts.xmpp.empty()) {
70 subject_alt.add_other_name(OID::from_string("PKIX.XMPPAddr"), ASN1_String(opts.xmpp, ASN1_Type::Utf8String));
71 }
72
73 return std::make_unique<Cert_Extension::Subject_Alternative_Name>(subject_alt);
74}
75
76} // namespace
77
78namespace X509 {
79
80/*
81* Create a new self-signed X.509 certificate
82*/
84 const Private_Key& key,
85 std::string_view hash_fn,
87 const std::vector<uint8_t> pub_key = X509::BER_encode(key);
88 auto signer = X509_Object::choose_sig_format(key, rng, hash_fn, opts.padding_scheme);
89 const AlgorithmIdentifier sig_algo = signer->algorithm_identifier();
90 BOTAN_ASSERT_NOMSG(sig_algo.oid().has_value());
91
92 const auto subject_dn = load_dn_info(opts);
93
94 Extensions extensions = opts.extensions;
95
96 const auto constraints = opts.is_CA ? Key_Constraints::ca_constraints() : opts.constraints;
97
98 if(!constraints.compatible_with(key)) {
99 throw Invalid_Argument("The requested key constraints are incompatible with the algorithm");
100 }
101
102 extensions.add_new(std::make_unique<Cert_Extension::Basic_Constraints>(opts.is_CA, opts.path_limit), true);
103
104 if(!constraints.empty()) {
105 extensions.add_new(std::make_unique<Cert_Extension::Key_Usage>(constraints), true);
106 }
107
108 auto skid = std::make_unique<Cert_Extension::Subject_Key_ID>(pub_key, signer->hash_function());
109
110 extensions.add_new(std::make_unique<Cert_Extension::Authority_Key_ID>(skid->get_key_id()));
111 extensions.add_new(std::move(skid));
112
113 extensions.replace(create_alt_name_ext(opts, extensions));
114
115 extensions.add_new(std::make_unique<Cert_Extension::Extended_Key_Usage>(opts.ex_constraints));
116
117 return X509_CA::make_cert(*signer, rng, sig_algo, pub_key, opts.start, opts.end, subject_dn, subject_dn, extensions);
118}
119
120/*
121* Create a PKCS #10 certificate request
122*/
124 const Private_Key& key,
125 std::string_view hash_fn,
127 const auto subject_dn = load_dn_info(opts);
128
129 const auto constraints = opts.is_CA ? Key_Constraints::ca_constraints() : opts.constraints;
130
131 if(!constraints.compatible_with(key)) {
132 throw Invalid_Argument("The requested key constraints are incompatible with the algorithm");
133 }
134
135 Extensions extensions = opts.extensions;
136
137 extensions.add_new(std::make_unique<Cert_Extension::Basic_Constraints>(opts.is_CA, opts.path_limit));
138
139 if(!constraints.empty()) {
140 extensions.add_new(std::make_unique<Cert_Extension::Key_Usage>(constraints));
141 }
142
143 extensions.replace(create_alt_name_ext(opts, extensions));
144
145 create_alt_name_ext(opts, extensions);
146
147 return PKCS10_Request::create(key, subject_dn, extensions, hash_fn, rng, opts.padding_scheme, opts.challenge);
148}
149
150} // namespace X509
151
152} // namespace Botan
#define BOTAN_ASSERT_NOMSG(expr)
Definition assert.h:59
const OID & oid() const
Definition asn1_obj.h:464
void replace(std::unique_ptr< Certificate_Extension > extn, bool critical=false)
Definition x509_ext.cpp:177
bool add_new(std::unique_ptr< Certificate_Extension > extn, bool critical=false)
Definition x509_ext.cpp:155
static Key_Constraints ca_constraints()
Definition pkix_enums.h:151
bool has_value() const
Definition asn1_obj.h:272
static OID from_string(std::string_view str)
Definition asn1_oid.cpp:86
static PKCS10_Request create(const Private_Key &key, const X509_DN &subject_dn, const Extensions &extensions, std::string_view hash_fn, RandomNumberGenerator &rng, std::string_view padding_scheme="", std::string_view challenge="")
Definition pkcs10.cpp:53
static X509_Certificate make_cert(PK_Signer &signer, RandomNumberGenerator &rng, const AlgorithmIdentifier &sig_algo, const std::vector< uint8_t > &pub_key, const X509_Time &not_before, const X509_Time &not_after, const X509_DN &issuer_dn, const X509_DN &subject_dn, const Extensions &extensions)
Definition x509_ca.cpp:106
std::vector< OID > ex_constraints
Definition x509self.h:129
Key_Constraints constraints
Definition x509self.h:124
std::string challenge
Definition x509self.h:98
std::string padding_scheme
Definition x509self.h:119
static std::unique_ptr< PK_Signer > choose_sig_format(const Private_Key &key, RandomNumberGenerator &rng, std::string_view hash_fn, std::string_view padding_algo)
Definition x509_obj.cpp:209
PKCS10_Request create_cert_req(const X509_Cert_Options &opts, const Private_Key &key, std::string_view hash_fn, RandomNumberGenerator &rng)
Definition x509self.cpp:123
std::vector< uint8_t > BER_encode(const Public_Key &key)
Definition x509_key.h:23
X509_Certificate create_self_signed_cert(const X509_Cert_Options &opts, const Private_Key &key, std::string_view hash_fn, RandomNumberGenerator &rng)
Definition x509self.cpp:83
std::string fmt(std::string_view format, const T &... args)
Definition fmt.h:53
std::optional< uint32_t > string_to_ipv4(std::string_view str)
Definition parsing.cpp:156