Botan 3.6.1
Crypto and TLS for C&
|
#include <x509path.h>
Specifies restrictions on the PKIX path validation
Definition at line 34 of file x509path.h.
Botan::Path_Validation_Restrictions::Path_Validation_Restrictions | ( | bool | require_rev = false, |
size_t | minimum_key_strength = 110, | ||
bool | ocsp_all_intermediates = false, | ||
std::chrono::seconds | max_ocsp_age = std::chrono::seconds::zero(), | ||
std::unique_ptr< Certificate_Store > | trusted_ocsp_responders = std::make_unique<Certificate_Store_In_Memory>(), | ||
bool | ignore_trusted_root_time_range = false ) |
require_rev | if true, revocation information is required |
minimum_key_strength | is the minimum strength (in terms of operations, eg 80 means 2^80) of a signature. Signatures weaker than this are rejected. If more than 80, SHA-1 signatures are also rejected. If possible use at least setting 110. 80 bit strength requires 1024 bit RSA 110 bit strength requires 2k bit RSA 128 bit strength requires ~3k bit RSA or P-256 |
ocsp_all_intermediates | Make OCSP requests for all CAs as well as end entity (if OCSP enabled in path validation request) |
max_ocsp_age | maximum age of OCSP responses w/o next_update. If zero, there is no maximum age |
trusted_ocsp_responders | certificate store containing certificates of trusted OCSP responders (additionally to the CA's responders) |
ignore_trusted_root_time_range | if true, validity checks on the time range of the trusted root certificate only produce warnings |
Definition at line 987 of file x509path.cpp.
|
inline |
require_rev | if true, revocation information is required |
minimum_key_strength | is the minimum strength (in terms of operations, eg 80 means 2^80) of a signature. Signatures weaker than this are rejected. |
ocsp_all_intermediates | Make OCSP requests for all CAs as well as end entity (if OCSP enabled in path validation request) |
trusted_hashes | a set of trusted hashes. Any signatures created using a hash other than one of these will be rejected. |
max_ocsp_age | maximum age of OCSP responses w/o next_update. If zero, there is no maximum age |
trusted_ocsp_responders | certificate store containing certificates of trusted OCSP responders (additionally to the CA's responders) |
ignore_trusted_root_time_range | if true, validity checks on the time range of the trusted root certificate only produce warnings |
Definition at line 81 of file x509path.h.
|
inline |
RFC 5280 does not disallow trusted anchors signing certificates with wider validity ranges than theirs. When checking a certificate chain at a specific point in time, this can lead to situations where a root certificate is expired, but the lower-chain certificates are not.
If this flag is set to true, such chains are considered valid (with warning TRUSTED_CERT_HAS_EXPIRED). Otherwise, the chain is rejected with the error code CERT_HAS_EXPIRED. The same holds for not yet valid certificates with the error code CERT_NOT_YET_VALID (or warning TRUSTED_CERT_NOT_YET_VALID).
Definition at line 142 of file x509path.h.
Referenced by Botan::PKIX::check_chain().
|
inline |
Definition at line 122 of file x509path.h.
Referenced by Botan::PKIX::check_ocsp().
|
inline |
Definition at line 116 of file x509path.h.
Referenced by Botan::PKIX::check_chain().
|
inline |
Definition at line 106 of file x509path.h.
Referenced by Botan::PKIX::merge_revocation_status().
|
inline |
Definition at line 100 of file x509path.h.
Referenced by Botan::PKIX::merge_revocation_status().
|
inline |
Definition at line 111 of file x509path.h.
Referenced by Botan::PKIX::check_chain().
|
inline |
Certificates in this store are trusted to sign OCSP responses additionally to the CA's responder certificates.
Definition at line 129 of file x509path.h.
Referenced by Botan::PKIX::check_ocsp().