/* * X.509 Cert Path Validation * (C) 2010-2011 Jack Lloyd * * Botan is released under the Simplified BSD License (see license.txt) */ #ifndef BOTAN_X509_CERT_PATH_VALIDATION_H__ #define BOTAN_X509_CERT_PATH_VALIDATION_H__ #include #include #include #include namespace Botan { /** * Specifies restrictions on the PKIX path validation */ class BOTAN_DLL Path_Validation_Restrictions { public: /** * @param require_rev if true, revocation information is required * @param minimum_key_strength is the minimum strength (in terms of * operations, eg 80 means 2^80) of a signature. Signatures * weaker than this are rejected. If more than 80, SHA-1 * signatures are also rejected. */ Path_Validation_Restrictions(bool require_rev = false, size_t minimum_key_strength = 80, bool ocsp_all_intermediates = false); /** * @param require_rev if true, revocation information is required * @param minimum_key_strength is the minimum strength (in terms of * operations, eg 80 means 2^80) of a signature. Signatures * weaker than this are rejected. * @param trusted_hashes a set of trusted hashes. Any signatures * created using a hash other than one of these will be * rejected. */ Path_Validation_Restrictions(bool require_rev, size_t minimum_key_strength, bool ocsp_all_intermediates, const std::set& trusted_hashes) : m_require_revocation_information(require_rev), m_ocsp_all_intermediates(ocsp_all_intermediates), m_trusted_hashes(trusted_hashes), m_minimum_key_strength(minimum_key_strength) {} bool require_revocation_information() const { return m_require_revocation_information; } bool ocsp_all_intermediates() const { return m_ocsp_all_intermediates; } const std::set& trusted_hashes() const { return m_trusted_hashes; } size_t minimum_key_strength() const { return m_minimum_key_strength; } private: bool m_require_revocation_information; bool m_ocsp_all_intermediates; std::set m_trusted_hashes; size_t m_minimum_key_strength; }; /** * Represents the result of a PKIX path validation */ class BOTAN_DLL Path_Validation_Result { public: typedef Certificate_Status_Code Code; /** * @return the set of hash functions you are implicitly * trusting by trusting this result. */ std::set trusted_hashes() const; /** * @return the trust root of the validation */ const X509_Certificate& trust_root() const; /** * @return the full path from subject to trust root */ const std::vector& cert_path() const { return m_cert_path; } /** * @return true iff the validation was successful */ bool successful_validation() const; /** * @return overall validation result code */ Certificate_Status_Code result() const { return m_overall; } /** * Return a set of status codes for each certificate in the chain */ const std::vector>& all_statuses() const { return m_all_status; } /** * @return string representation of the validation result */ std::string result_string() const; static const char* status_string(Certificate_Status_Code code); Path_Validation_Result(std::vector> status, std::vector&& cert_chain); Path_Validation_Result(Certificate_Status_Code status) : m_overall(status) {} private: friend Path_Validation_Result BOTAN_DLL x509_path_validate( const std::vector& end_certs, const Path_Validation_Restrictions& restrictions, const std::vector& certstores); Certificate_Status_Code m_overall; std::vector> m_all_status; std::vector m_cert_path; }; /** * PKIX Path Validation */ Path_Validation_Result BOTAN_DLL x509_path_validate( const std::vector& end_certs, const Path_Validation_Restrictions& restrictions, const std::vector& certstores); /** * PKIX Path Validation */ Path_Validation_Result BOTAN_DLL x509_path_validate( const X509_Certificate& end_cert, const Path_Validation_Restrictions& restrictions, const std::vector& certstores); /** * PKIX Path Validation */ Path_Validation_Result BOTAN_DLL x509_path_validate( const X509_Certificate& end_cert, const Path_Validation_Restrictions& restrictions, const Certificate_Store& store); /** * PKIX Path Validation */ Path_Validation_Result BOTAN_DLL x509_path_validate( const std::vector& end_certs, const Path_Validation_Restrictions& restrictions, const Certificate_Store& store); } #endif