buf->append(len);
return buf;
}
-} // ssl
-} // folly
+
+std::vector<X509UniquePtr> OpenSSLCertUtils::readCertsFromBuffer(
+ ByteRange range) {
+ BioUniquePtr b(
+ BIO_new_mem_buf(const_cast<unsigned char*>(range.data()), range.size()));
+ if (!b) {
+ throw std::runtime_error("failed to create BIO");
+ }
+ std::vector<X509UniquePtr> certs;
+ while (true) {
+ X509UniquePtr x509(PEM_read_bio_X509(b.get(), nullptr, nullptr, nullptr));
+ if (!x509) {
+ break;
+ }
+ certs.push_back(std::move(x509));
+ }
+
+ return certs;
+}
+
+std::array<uint8_t, SHA_DIGEST_LENGTH> OpenSSLCertUtils::getDigestSha1(
+ X509& x509) {
+ unsigned int len;
+ std::array<uint8_t, SHA_DIGEST_LENGTH> md;
+ int rc = X509_digest(&x509, EVP_sha1(), md.data(), &len);
+
+ if (rc <= 0) {
+ throw std::runtime_error("Could not calculate SHA1 digest for cert");
+ }
+ return md;
+}
+
+std::array<uint8_t, SHA256_DIGEST_LENGTH> OpenSSLCertUtils::getDigestSha256(
+ X509& x509) {
+ unsigned int len;
+ std::array<uint8_t, SHA256_DIGEST_LENGTH> md;
+ int rc = X509_digest(&x509, EVP_sha256(), md.data(), &len);
+
+ if (rc <= 0) {
+ throw std::runtime_error("Could not calculate SHA256 digest for cert");
+ }
+ return md;
+}
+
+
+} // namespace ssl
+} // namespace folly