9#include <botan/x509path.h>
11#include <botan/assert.h>
12#include <botan/ocsp.h>
13#include <botan/pk_keys.h>
14#include <botan/x509_ext.h>
15#include <botan/internal/concat_util.h>
21#include <unordered_set>
24#if defined(BOTAN_HAS_ONLINE_REVOCATION_CHECKS)
25 #include <botan/internal/http_util.h>
50class CertificatePathBuilder final {
52 CertificatePathBuilder(
const std::vector<Certificate_Store*>& trusted_certstores,
53 const X509_Certificate& end_entity,
54 const std::vector<X509_Certificate>& end_entity_extra,
55 bool require_self_signed =
false) :
56 m_trusted_certstores(trusted_certstores), m_require_self_signed(require_self_signed) {
57 if(std::ranges::any_of(trusted_certstores, [](
auto* ptr) {
return ptr ==
nullptr; })) {
58 throw Invalid_Argument(
"Certificate store list must not contain nullptr");
61 for(
const auto& cert : end_entity_extra) {
62 if(!cert_in_any_trusted_store(cert)) {
63 m_ee_extras.add_certificate(cert);
67 m_stack.push_back({end_entity, cert_in_any_trusted_store(end_entity)});
70 std::optional<std::vector<X509_Certificate>> next() {
73 while(!m_stack.empty()) {
74 constexpr size_t MAX_DFS_STEPS = 1000;
78 if(steps > MAX_DFS_STEPS) {
84 auto [last, trusted] = std::move(m_stack.back());
88 if(!last.has_value()) {
89 m_certs_seen.erase(m_path_so_far.back().tag());
90 m_path_so_far.pop_back();
95 const auto tag = last->tag();
96 if(m_certs_seen.contains(tag)) {
97 if(!m_error.has_value()) {
108 auto path = m_path_so_far;
109 path.push_back(*last);
112 if(!m_require_self_signed || last->is_self_signed()) {
125 if(last->is_self_signed()) {
126 if(!m_error.has_value()) {
144 if(m_error.has_value()) {
147 return m_error.value();
154 bool cert_in_any_trusted_store(
const X509_Certificate& cert)
const {
155 return std::ranges::any_of(m_trusted_certstores,
156 [&](
const Certificate_Store* store) {
return store->contains(cert); });
159 void push_issuers(
const X509_Certificate& cert) {
160 const X509_DN& issuer_dn = cert.issuer_dn();
161 const std::vector<uint8_t>& auth_key_id = cert.authority_key_id();
164 std::vector<X509_Certificate> trusted_issuers;
165 for(
const Certificate_Store* store : m_trusted_certstores) {
166 auto new_issuers = store->find_all_certs(issuer_dn, auth_key_id);
167 trusted_issuers.insert(trusted_issuers.end(), new_issuers.begin(), new_issuers.end());
171 const std::vector<X509_Certificate> misc_issuers = m_ee_extras.find_all_certs(issuer_dn, auth_key_id);
174 if(trusted_issuers.empty() && misc_issuers.empty()) {
175 if(!m_error.has_value()) {
181 m_path_so_far.push_back(cert);
182 m_certs_seen.emplace(cert.tag());
185 m_stack.push_back({std::nullopt,
false});
187 for(
const auto& trusted_cert : trusted_issuers) {
188 m_stack.push_back({trusted_cert,
true});
190 for(
const auto& misc : misc_issuers) {
191 m_stack.push_back({misc,
false});
195 const std::vector<Certificate_Store*> m_trusted_certstores;
196 const bool m_require_self_signed;
197 Certificate_Store_In_Memory m_ee_extras;
198 std::vector<std::pair<std::optional<X509_Certificate>,
bool>> m_stack;
199 std::vector<X509_Certificate> m_path_so_far;
200 std::unordered_set<X509_Certificate::Tag, X509_Certificate::TagHash> m_certs_seen;
201 std::optional<Certificate_Status_Code> m_error;
210 std::chrono::system_clock::time_point ref_time,
211 std::string_view hostname,
214 if(cert_path.empty()) {
218 const bool is_end_entity_trust_anchor = (cert_path.size() == 1);
220 const X509_Time validation_time(ref_time);
225 for(
size_t i = 0; i != cert_path.size(); ++i) {
226 std::set<Certificate_Status_Code>& status = cert_status.at(i);
228 const bool at_trust_anchor = (i == cert_path.size() - 1);
239 const X509_Certificate& issuer = cert_path[at_trust_anchor ? (i) : (i + 1)];
245 std::unique_ptr<Public_Key> issuer_key;
260 status.insert(sig_status.first);
263 const std::string hash_used_for_signature = sig_status.second;
268 if(!trusted_hashes.empty() && !at_trust_anchor) {
269 if(!trusted_hashes.contains(hash_used_for_signature)) {
284 for(
size_t i = 0; i != cert_path.size(); ++i) {
285 for(
auto status : cert_status.at(i)) {
288 if(
static_cast<uint32_t
>(status) >= 5000) {
294 if(!hostname.empty() && !cert_path[0].matches_dns_name(hostname)) {
298 if(!cert_path[0].allowed_usage(usage)) {
317 for(
size_t i = 0; i != cert_path.size(); ++i) {
318 std::set<Certificate_Status_Code>& status = cert_status.at(i);
320 const bool at_trust_anchor = (i == cert_path.size() - 1);
323 const auto issuer = [&]() -> std::optional<X509_Certificate> {
324 if(!at_trust_anchor) {
325 return cert_path[i + 1];
338 if(issuer.has_value() && subject.
issuer_dn() != issuer->subject_dn()) {
352 if(dn_ub > 0 && dn_pair.second.size() > dn_ub) {
362 if(enforce_validity_period) {
369 if(validation_time > subject.
not_after()) {
370 if(enforce_validity_period) {
378 if(issuer.has_value() && !issuer->is_CA_cert() && !is_end_entity_trust_anchor) {
391 const auto& extensions_vec = extensions.
extensions();
392 if(subject.
x509_version() < 3 && !extensions_vec.empty()) {
396 for(
const auto& extension : extensions_vec) {
397 extension.first->validate(subject, issuer, cert_path, cert_status, i);
406 size_t max_path_length = cert_path.size();
407 for(
size_t i = cert_path.size() - 1; i > 0; --i) {
408 std::set<Certificate_Status_Code>& status = cert_status.at(i);
416 if(max_path_length > 0) {
417 max_path_length -= 1;
428 max_path_length = std::min(max_path_length, *path_len_constraint);
439 const std::vector<X509_Certificate>& extra_certs,
440 const std::vector<Certificate_Store*>& certstores,
441 std::chrono::system_clock::time_point ref_time,
459 if(signing_cert == ca) {
480 if(!aki.empty() && !ski.empty() && aki != ski) {
495 const auto ocsp_timeout = std::chrono::milliseconds::zero();
496 const auto relaxed_restrictions =
503 relaxed_restrictions,
510 return validation_result.
result();
513std::set<Certificate_Status_Code> evaluate_ocsp_response(
const OCSP::Response& ocsp_response,
516 const std::vector<X509_Certificate>& cert_path,
517 const std::vector<Certificate_Store*>& certstores,
518 std::chrono::system_clock::time_point ref_time,
521 if(
auto dummy_status = ocsp_response.dummy_status()) {
522 return {dummy_status.value()};
526 auto signing_cert = ocsp_response.find_signing_certificate(ca, restrictions.trusted_ocsp_responders());
532 auto cert_status = verify_ocsp_signing_cert(
533 signing_cert.value(), ca,
concat(ocsp_response.certificates(), cert_path), certstores, ref_time, restrictions);
539 auto sig_status = ocsp_response.verify_signature(signing_cert.value(), restrictions);
545 return {ocsp_response.status_for(ca, subject, ref_time, restrictions.max_ocsp_age())};
551 const std::vector<std::optional<OCSP::Response>>& ocsp_responses,
552 const std::vector<Certificate_Store*>& certstores,
553 std::chrono::system_clock::time_point ref_time,
555 if(cert_path.empty()) {
561 for(
size_t i = 0; i != cert_path.size() - 1; ++i) {
565 if(i < ocsp_responses.size() && ocsp_responses.at(i).has_value() &&
568 cert_status.at(i) = evaluate_ocsp_response(
569 ocsp_responses.at(i).value(), subject, ca, cert_path, certstores, ref_time, restrictions);
580 const std::vector<std::optional<X509_CRL>>& crls,
581 std::chrono::system_clock::time_point ref_time) {
582 if(cert_path.empty()) {
587 const X509_Time validation_time(ref_time);
589 for(
size_t i = 0; i != cert_path.size() - 1; ++i) {
590 std::set<Certificate_Status_Code>& status = cert_status.at(i);
592 if(i < crls.size() && crls[i].has_value()) {
600 if(validation_time < crls[i]->this_update()) {
604 if(crls[i]->next_update().time_is_set() && validation_time > crls[i]->next_update()) {
609 if(crls[i]->check_signature(*ca_key) ==
false) {
614 if(crls[i]->is_revoked(subject)) {
618 if(!crls[i]->has_matching_distribution_point(subject)) {
622 for(
const auto& [extension, critical] : crls[i]->extensions().extensions()) {
637 while(!cert_status.empty() && cert_status.back().empty()) {
638 cert_status.pop_back();
645 const std::vector<Certificate_Store*>& certstores,
646 std::chrono::system_clock::time_point ref_time) {
647 if(cert_path.empty()) {
651 if(certstores.empty()) {
655 std::vector<std::optional<X509_CRL>> crls(cert_path.size());
657 for(
size_t i = 0; i != cert_path.size(); ++i) {
658 for(
auto* certstore : certstores) {
659 crls[i] = certstore->find_crl_for(cert_path[i]);
669#if defined(BOTAN_HAS_ONLINE_REVOCATION_CHECKS)
672 const std::vector<Certificate_Store*>& trusted_certstores,
673 std::chrono::system_clock::time_point ref_time,
674 std::chrono::milliseconds timeout,
676 if(cert_path.empty()) {
680 std::vector<std::future<std::optional<OCSP::Response>>> ocsp_response_futures;
685 to_ocsp = cert_path.size() - 1;
687 if(cert_path.size() == 1) {
691 for(
size_t i = 0; i < to_ocsp; ++i) {
692 const auto& subject = cert_path.at(i);
693 const auto& issuer = cert_path.at(i + 1);
695 if(subject.ocsp_responder().empty()) {
696 ocsp_response_futures.emplace_back(std::async(std::launch::deferred, []() -> std::optional<OCSP::Response> {
700 auto ocsp_url = subject.ocsp_responder();
702 ocsp_response_futures.emplace_back(
703 std::async(std::launch::async, [ocsp_url, ocsp_req, timeout]() -> std::optional<OCSP::Response> {
707 "application/ocsp-request",
708 ocsp_req.BER_encode(),
712 if(http.status_code() != 200) {
717 }
catch(std::exception&) {
724 std::vector<std::optional<OCSP::Response>> ocsp_responses;
725 ocsp_responses.reserve(ocsp_response_futures.size());
727 for(
auto& ocsp_response_future : ocsp_response_futures) {
728 ocsp_responses.push_back(ocsp_response_future.get());
731 return PKIX::check_ocsp(cert_path, ocsp_responses, trusted_certstores, ref_time, restrictions);
735 const std::vector<Certificate_Store*>& certstores,
737 std::chrono::system_clock::time_point ref_time,
738 std::chrono::milliseconds timeout) {
739 if(cert_path.empty()) {
742 if(certstores.empty()) {
746 std::vector<std::future<std::optional<X509_CRL>>> future_crls;
747 std::vector<std::optional<X509_CRL>> crls(cert_path.size());
749 for(
size_t i = 0; i != cert_path.size(); ++i) {
750 const auto& cert = cert_path.at(i);
751 for(
auto* certstore : certstores) {
752 crls[i] = certstore->find_crl_for(cert);
753 if(crls[i].has_value()) {
766 future_crls.emplace_back(std::future<std::optional<X509_CRL>>());
767 }
else if(cert.crl_distribution_point().empty()) {
769 future_crls.emplace_back(std::async(std::launch::deferred, []() -> std::optional<X509_CRL> {
770 throw Not_Implemented(
"No CRL distribution point for this certificate");
773 auto cdp = cert.crl_distribution_point();
774 future_crls.emplace_back(std::async(std::launch::async, [cdp, timeout]() -> std::optional<X509_CRL> {
779 http.throw_unless_ok();
786 for(
size_t i = 0; i != future_crls.size(); ++i) {
787 if(future_crls[i].valid()) {
789 crls[i] = future_crls[i].get();
790 }
catch(std::exception&) {
799 if(crl_store !=
nullptr) {
800 for(
size_t i = 0; i != crl_status.size(); ++i) {
804 crl_store->add_crl(*crls[i]);
815 const std::vector<Certificate_Store*>& trusted_certstores,
817 const std::vector<X509_Certificate>& end_entity_extra) {
818 CertificatePathBuilder builder(trusted_certstores, end_entity, end_entity_extra);
820 std::vector<X509_Certificate> first_path;
822 while(
auto path = builder.next()) {
826 if(path->back().is_self_signed()) {
827 cert_path.insert(cert_path.end(), path->begin(), path->end());
832 if(first_path.empty()) {
833 first_path = std::move(*path);
837 if(!first_path.empty()) {
839 cert_path.insert(cert_path.end(), first_path.begin(), first_path.end());
844 return builder.error();
848 const std::vector<Certificate_Store*>& trusted_certstores,
850 const std::vector<X509_Certificate>& end_entity_extra) {
851 if(!cert_paths_out.empty()) {
852 throw Invalid_Argument(
"PKIX::build_all_certificate_paths: cert_paths_out must be empty");
854 CertificatePathBuilder builder(trusted_certstores, end_entity, end_entity_extra);
856 while(
auto path = builder.next()) {
858 cert_paths_out.push_back(std::move(*path));
861 if(!cert_paths_out.empty()) {
866 return builder.error();
874 if(chain_status.empty()) {
875 throw Invalid_Argument(
"PKIX::merge_revocation_status chain_status was empty");
878 for(
size_t i = 0; i != chain_status.size() - 1; ++i) {
879 bool had_crl =
false;
880 bool had_ocsp =
false;
882 if(i < crl_status.size() && !crl_status[i].empty()) {
883 for(
auto&& code : crl_status[i]) {
887 chain_status[i].insert(code);
891 if(i < ocsp_status.size() && !ocsp_status[i].empty()) {
892 for(
auto&& code : ocsp_status[i]) {
900 chain_status[i].insert(code);
904 if(had_crl ==
false && had_ocsp ==
false) {
914 if(cert_status.empty()) {
921 for(
const std::set<Certificate_Status_Code>& s : cert_status) {
923 auto worst = *s.rbegin();
935 const std::vector<Certificate_Store*>& trusted_roots,
936 std::string_view hostname,
938 std::chrono::system_clock::time_point ref_time,
939 std::chrono::milliseconds ocsp_timeout,
940 const std::vector<std::optional<OCSP::Response>>& ocsp_resp) {
941 if(end_certs.empty()) {
946 std::vector<X509_Certificate> end_entity_extra;
947 for(
size_t i = 1; i < end_certs.size(); ++i) {
948 end_entity_extra.push_back(end_certs[i]);
953 CertificatePathBuilder builder(trusted_roots, end_entity, end_entity_extra, require_self_signed);
955 constexpr size_t max_paths = 50;
956 constexpr size_t max_verifications = 200;
958 std::optional<Path_Validation_Result> first_path_error;
959 size_t paths_checked = 0;
960 size_t certs_checked = 0;
962 while(
auto cert_path = builder.next()) {
966 certs_checked += cert_path->size();
967 if(paths_checked > max_paths || certs_checked > max_verifications) {
980 if(!ocsp_resp.empty()) {
981 ocsp_status =
PKIX::check_ocsp(*cert_path, ocsp_resp, trusted_roots, ref_time, restrictions);
984 if(ocsp_timeout != std::chrono::milliseconds(0)) {
986 bool need_online =
false;
987 for(
size_t i = 0; i < to_online; ++i) {
988 if(i >= ocsp_status.size() || ocsp_status[i].empty()) {
995#if defined(BOTAN_TARGET_OS_HAS_THREADS) && defined(BOTAN_HAS_HTTP_UTIL)
997 PKIX::check_ocsp_online(*cert_path, trusted_roots, ref_time, ocsp_timeout, restrictions);
998 if(ocsp_status.size() < online_status.size()) {
999 ocsp_status.resize(online_status.size());
1001 for(
size_t i = 0; i < online_status.size(); ++i) {
1002 if(ocsp_status[i].empty()) {
1003 ocsp_status[i] = std::move(online_status[i]);
1007 if(ocsp_status.size() < to_online) {
1008 ocsp_status.resize(to_online);
1010 for(
size_t i = 0; i < to_online; ++i) {
1011 if(ocsp_status[i].empty()) {
1025 }
else if(!first_path_error.has_value()) {
1027 first_path_error = std::move(pvd);
1031 if(first_path_error.has_value()) {
1034 return first_path_error.value();
1043 const std::vector<Certificate_Store*>& trusted_roots,
1044 std::string_view hostname,
1046 std::chrono::system_clock::time_point when,
1047 std::chrono::milliseconds ocsp_timeout,
1048 const std::vector<std::optional<OCSP::Response>>& ocsp_resp) {
1049 std::vector<X509_Certificate> certs;
1050 certs.push_back(end_cert);
1051 return x509_path_validate(certs, restrictions, trusted_roots, hostname, usage, when, ocsp_timeout, ocsp_resp);
1057 std::string_view hostname,
1059 std::chrono::system_clock::time_point when,
1060 std::chrono::milliseconds ocsp_timeout,
1061 const std::vector<std::optional<OCSP::Response>>& ocsp_resp) {
1062 std::vector<Certificate_Store*> trusted_roots;
1065 return x509_path_validate(end_certs, restrictions, trusted_roots, hostname, usage, when, ocsp_timeout, ocsp_resp);
1071 std::string_view hostname,
1073 std::chrono::system_clock::time_point when,
1074 std::chrono::milliseconds ocsp_timeout,
1075 const std::vector<std::optional<OCSP::Response>>& ocsp_resp) {
1076 std::vector<X509_Certificate> certs;
1077 certs.push_back(end_cert);
1079 std::vector<Certificate_Store*> trusted_roots;
1082 return x509_path_validate(certs, restrictions, trusted_roots, hostname, usage, when, ocsp_timeout, ocsp_resp);
1086 size_t key_strength,
1087 bool ocsp_intermediates,
1092 m_require_revocation_information(require_rev),
1093 m_ocsp_all_intermediates(ocsp_intermediates),
1094 m_minimum_key_strength(key_strength),
1099 if(key_strength <= 80) {
1100 m_trusted_hashes.insert(
"SHA-1");
1103 m_trusted_hashes.insert(
"SHA-224");
1104 m_trusted_hashes.insert(
"SHA-256");
1105 m_trusted_hashes.insert(
"SHA-384");
1106 m_trusted_hashes.insert(
"SHA-512");
1107 m_trusted_hashes.insert(
"SHAKE-256(512)");
1108 m_trusted_hashes.insert(
"SHAKE-256(912)");
1114 for(
const auto& status_set_i : all_statuses) {
1115 std::set<Certificate_Status_Code> warning_set_i;
1116 for(
const auto& code : status_set_i) {
1119 warning_set_i.insert(code);
1122 warnings.push_back(warning_set_i);
1129 std::vector<X509_Certificate>&& cert_chain) :
1130 m_all_status(std::move(status)),
1131 m_warnings(find_warnings(m_all_status)),
1132 m_cert_path(std::move(cert_chain)),
1133 m_overall(
PKIX::overall_status(m_all_status)) {}
1136 if(m_cert_path.empty()) {
1137 throw Invalid_State(
"Path_Validation_Result::trust_root no path set");
1140 throw Invalid_State(
"Path_Validation_Result::trust_root meaningless with invalid status");
1143 return m_cert_path[m_cert_path.size() - 1];
1152 for(
const auto& status_set_i : m_warnings) {
1153 if(!status_set_i.empty()) {
1173 return "Unknown error";
1177 const std::string sep(
", ");
1178 std::ostringstream oss;
1179 for(
size_t i = 0; i < m_warnings.size(); i++) {
1180 for(
auto code : m_warnings[i]) {
1181 oss <<
"[" << std::to_string(i) <<
"] " <<
status_string(code) << sep;
1185 std::string res = oss.str();
1187 if(res.size() >= sep.size()) {
1188 res = res.substr(0, res.size() - sep.size());
#define BOTAN_ASSERT_NOMSG(expr)
static BigInt from_bytes(std::span< const uint8_t > bytes)
virtual bool contains(const X509_Certificate &cert) const
const std::vector< OID > & get_extension_oids() const
std::vector< std::pair< std::unique_ptr< Certificate_Extension >, bool > > extensions() const
bool registered_oid() const
bool require_revocation_information() const
bool ocsp_all_intermediates() const
const std::set< std::string > & trusted_hashes() const
std::chrono::seconds max_ocsp_age() const
bool ignore_trusted_root_time_range() const
bool require_self_signed_trust_anchors() const
size_t minimum_key_strength() const
const Certificate_Store * trusted_ocsp_responders() const
BOTAN_FUTURE_EXPLICIT Path_Validation_Restrictions(bool require_rev=false, size_t minimum_key_strength=110, bool ocsp_all_intermediates=false, std::chrono::seconds max_ocsp_age=std::chrono::seconds::zero(), std::unique_ptr< Certificate_Store > trusted_ocsp_responders=std::make_unique< Certificate_Store_In_Memory >(), bool ignore_trusted_root_time_range=false, bool require_self_signed_trust_anchors=true)
Certificate_Status_Code result() const
Path_Validation_Result(CertificatePathStatusCodes status, std::vector< X509_Certificate > &&cert_chain)
bool successful_validation() const
static const char * status_string(Certificate_Status_Code code)
const X509_Certificate & trust_root() const
std::string result_string() const
std::string warnings_string() const
CertificatePathStatusCodes warnings() const
const X509_DN & subject_dn() const
const X509_Time & not_after() const
const std::vector< uint8_t > & authority_key_id() const
const std::vector< uint8_t > & subject_key_id() const
std::optional< size_t > path_length_constraint() const
const Extensions & v3_extensions() const
bool allowed_usage(Key_Constraints usage) const
const X509_DN & issuer_dn() const
const std::vector< uint8_t > & v2_issuer_key_id() const
uint32_t x509_version() const
bool is_self_signed() const
bool is_serial_negative() const
std::unique_ptr< Public_Key > subject_public_key() const
const std::vector< uint8_t > & v2_subject_key_id() const
const X509_Time & not_before() const
static size_t lookup_ub(const OID &oid)
const std::vector< std::pair< OID, ASN1_String > > & dn_info() const
const AlgorithmIdentifier & signature_algorithm() const
std::pair< Certificate_Status_Code, std::string > verify_signature(const Public_Key &key) const
Response POST_sync(std::string_view url, std::string_view content_type, const std::vector< uint8_t > &body, size_t allowable_redirects, std::chrono::milliseconds timeout)
Response GET_sync(std::string_view url, size_t allowable_redirects, std::chrono::milliseconds timeout)
Certificate_Status_Code build_all_certificate_paths(std::vector< std::vector< X509_Certificate > > &cert_paths, const std::vector< Certificate_Store * > &trusted_certstores, const X509_Certificate &end_entity, const std::vector< X509_Certificate > &end_entity_extra)
void merge_revocation_status(CertificatePathStatusCodes &chain_status, const CertificatePathStatusCodes &crl_status, const CertificatePathStatusCodes &ocsp_status, const Path_Validation_Restrictions &restrictions)
Certificate_Status_Code build_certificate_path(std::vector< X509_Certificate > &cert_path_out, const std::vector< Certificate_Store * > &trusted_certstores, const X509_Certificate &end_entity, const std::vector< X509_Certificate > &end_entity_extra)
Certificate_Status_Code overall_status(const CertificatePathStatusCodes &cert_status)
CertificatePathStatusCodes check_ocsp(const std::vector< X509_Certificate > &cert_path, const std::vector< std::optional< OCSP::Response > > &ocsp_responses, const std::vector< Certificate_Store * > &certstores, std::chrono::system_clock::time_point ref_time, const Path_Validation_Restrictions &restrictions)
CertificatePathStatusCodes check_chain(const std::vector< X509_Certificate > &cert_path, std::chrono::system_clock::time_point ref_time, std::string_view hostname, Usage_Type usage, const Path_Validation_Restrictions &restrictions)
CertificatePathStatusCodes check_crl(const std::vector< X509_Certificate > &cert_path, const std::vector< std::optional< X509_CRL > > &crls, std::chrono::system_clock::time_point ref_time)
std::vector< std::set< Certificate_Status_Code > > CertificatePathStatusCodes
@ TRUSTED_CERT_NOT_YET_VALID
@ DUPLICATE_CERT_EXTENSION
@ OCSP_RESPONSE_MISSING_KEYUSAGE
@ TRUSTED_CERT_HAS_EXPIRED
@ OCSP_ISSUER_NOT_TRUSTED
@ CA_CERT_NOT_FOR_CRL_ISSUER
@ CA_CERT_NOT_FOR_CERT_ISSUER
@ FIRST_ERROR_STATUS_TO_SKIP_REVOCATION
@ OCSP_SERVER_NOT_AVAILABLE
@ V2_IDENTIFIERS_IN_V1_CERT
@ SIGNATURE_METHOD_TOO_WEAK
Path_Validation_Result x509_path_validate(const std::vector< X509_Certificate > &end_certs, const Path_Validation_Restrictions &restrictions, const std::vector< Certificate_Store * > &trusted_roots, std::string_view hostname, Usage_Type usage, std::chrono::system_clock::time_point ref_time, std::chrono::milliseconds ocsp_timeout, const std::vector< std::optional< OCSP::Response > > &ocsp_resp)
constexpr auto concat(Rs &&... ranges)
std::string to_string(ErrorType type)
Convert an ErrorType to string.