11#include <botan/asn1_obj.h>
12#include <botan/asn1_time.h>
13#include <botan/bigint.h>
14#include <botan/pkix_types.h>
15#include <botan/x509cert.h>
43 std::vector<uint8_t> m_issuer_dn_hash;
44 std::vector<uint8_t> m_issuer_key_hash;
66 size_t m_cert_status = 2;
69 bool m_has_unknown_critical_ext =
false;
109 const std::vector<uint8_t>&
issuer_key_hash()
const {
return m_certid.issuer_key_hash(); }
148 Response(response_bits.data(), response_bits.size()) {}
155 Response(
const uint8_t response_bits[],
size_t response_bits_len);
167 std::optional<X509_Certificate> find_signing_certificate(
218 const std::vector<uint8_t>&
raw_bits()
const {
return m_response_bits; }
239 std::chrono::system_clock::time_point ref_time = std::chrono::system_clock::now(),
240 std::chrono::seconds max_age = std::chrono::seconds::zero())
const;
245 const std::vector<X509_Certificate>&
certificates()
const {
return m_certs; }
250 std::optional<Certificate_Status_Code>
dummy_status()
const {
return m_dummy_response_status; }
257 std::vector<uint8_t> m_response_bits;
260 std::vector<uint8_t> m_key_hash;
261 std::vector<uint8_t> m_tbs_bits;
263 std::vector<uint8_t> m_signature;
264 std::vector<X509_Certificate> m_certs;
266 std::vector<SingleResponse> m_responses;
268 std::optional<Certificate_Status_Code> m_dummy_response_status;
270 bool m_has_unknown_critical_ext =
false;
273#if defined(BOTAN_HAS_HTTP_UTIL)
285 const
BigInt& subject_serial,
286 std::string_view ocsp_responder,
287 std::chrono::milliseconds timeout = std::chrono::milliseconds(3000));
299 std::chrono::milliseconds timeout = std::chrono::milliseconds(3000));
#define BOTAN_PUBLIC_API(maj, min)
#define BOTAN_FUTURE_EXPLICIT
void decode_from(BER_Decoder &from) override
const std::vector< uint8_t > & issuer_key_hash() const
void encode_into(DER_Encoder &to) const override
bool is_id_for(const X509_Certificate &issuer, const X509_Certificate &subject) const
std::string base64_encode() const
const X509_Certificate & subject() const
const std::vector< uint8_t > & issuer_key_hash() const
Request(const X509_Certificate &issuer_cert, const X509_Certificate &subject_cert)
const X509_Certificate & issuer() const
std::vector< uint8_t > BER_encode() const
BOTAN_FUTURE_EXPLICIT Response(Certificate_Status_Code status)
Response_Status_Code status() const
const X509_DN & signer_name() const
const X509_Time & produced_at() const
std::optional< Certificate_Status_Code > dummy_status() const
const std::vector< X509_Certificate > & certificates() const
const std::vector< uint8_t > & raw_bits() const
const std::vector< uint8_t > & signer_key_hash() const
BOTAN_FUTURE_EXPLICIT Response(const std::vector< uint8_t > &response_bits)
const CertID & certid() const
const X509_Time & next_update() const
bool has_unknown_critical_extension() const
const X509_Time & this_update() const
size_t cert_status() const
bool verify_signature(std::span< const uint8_t, ED448_LEN > pk, bool phflag, std::span< const uint8_t > context, std::span< const uint8_t > sig, std::span< const uint8_t > msg)
Verify a signature(RFC 8032 5.2.7).