if( !X509_set_version( c, 2 ) ) {
throw "Setting X509-version to 3 failed";
}
+
+ X509_NAME* subjectP = X509_NAME_new();
+
+ if( !subjectP ) {
+ throw "malloc failure";
+ }
+
+ subject = std::shared_ptr<X509_NAME>( subjectP, X509_NAME_free );
+}
+
+void X509Cert::addRDN( int nid, std::string data ) {
+ if( ! X509_NAME_add_entry_by_NID( subject.get(), nid, MBSTRING_UTF8, ( unsigned char* )const_cast<char*>( data.data() ), data.size(), -1, 0 ) ) {
+ throw "malloc failure";
+ }
}
void X509Cert::setIssuerNameFrom( std::shared_ptr<X509> caCert ) {
}
}
-void X509Cert::setSerialNumber( int num ) {
- ASN1_INTEGER_set( target.get()->cert_info->serialNumber, num );
+void X509Cert::setSerialNumber( BIGNUM* num ) {
+ BN_to_ASN1_INTEGER( num , target->cert_info->serialNumber );
}
void X509Cert::setTimes( uint32_t before, uint32_t after ) {
}
std::shared_ptr<SignedCertificate> X509Cert::sign( std::shared_ptr<EVP_PKEY> caKey ) {
+ if( !X509_set_subject_name( target.get(), subject.get() ) ) {
+ throw "error setting subject";
+ }
+
if( !X509_sign( target.get(), caKey.get(), EVP_sha512() ) ) {
throw "Signing failed.";
}
BIO_get_mem_ptr( mem.get(), &buf );
std::shared_ptr<SignedCertificate> res = std::shared_ptr<SignedCertificate>( new SignedCertificate() );
res->certificate = std::string( buf->data, buf->data + buf->length );
- res->serial = ASN1_INTEGER_get( target.get()->cert_info->serialNumber );
+ BIGNUM* ser = ASN1_INTEGER_to_BN( target->cert_info->serialNumber, NULL );
+ char* serStr = BN_bn2hex( ser );
+ res->serial = std::string( serStr );
+ OPENSSL_free( serStr );
+ BN_free( ser );
return res;
}