asn1_alt_name.cpp |
Create an AlternativeName
|
6831 |
asn1_alt_name.h |
|
220 |
asn1_attribute.h |
|
223 |
cert_status.cpp |
|
5757 |
cert_status.h |
|
224 |
certstor.cpp |
|
6147 |
certstor.h |
Certificate Store Interface
|
5414 |
certstor_flatfile |
|
|
certstor_sql |
|
|
certstor_sqlite3 |
|
|
certstor_system |
|
|
certstor_system_macos |
|
|
certstor_system_windows |
|
|
crl_ent.cpp |
Create a CRL_Entry
|
2858 |
crl_ent.h |
|
204 |
datastor.cpp |
Data_Store Equality Comparison
|
4632 |
datastor.h |
Data Store
This class is used internally by the library, and exposed for ABI
reasons. There is no reason for applications to use this type directly.
It will be removed in a future major release.
|
2272 |
info.txt |
|
134 |
key_constraint.cpp |
Make sure the given key constraints are permitted for the given key type
|
2667 |
key_constraint.h |
|
223 |
name_constraint.cpp |
|
6316 |
name_constraint.h |
|
226 |
ocsp.cpp |
|
10892 |
ocsp.h |
An OCSP request.
|
8551 |
ocsp_types.cpp |
In practice it seems some responders, including, notably,
ocsp.verisign.com, will reject anything but SHA-1 here
|
2771 |
ocsp_types.h |
|
205 |
pkcs10.cpp |
Decode the CertificateRequestInfo
|
7748 |
pkcs10.h |
PKCS #10 Certificate Request.
|
4144 |
pkix_enums.h |
Certificate validation status code
|
3453 |
pkix_types.h |
Check that key constraints are permitted for a specific public key.
@param pub_key the public key on which the constraints shall be enforced on
@param constraints the constraints that shall be enforced on the key
@throw Invalid_Argument if the given constraints are not permitted for this key
|
19478 |
x509_attribute.cpp |
Create an Attribute
|
1092 |
x509_ca.cpp |
Load the certificate and private key
|
10864 |
x509_ca.h |
This class represents X.509 Certificate Authorities (CAs).
|
10403 |
x509_crl.cpp |
Check if this particular certificate is listed in the CRL
|
6195 |
x509_crl.h |
This class represents CRL entries
|
5327 |
x509_dn.cpp |
Add an attribute to a X509_DN
|
9303 |
x509_dn.h |
|
202 |
x509_dn_ub.cpp |
Upper bounds for the length of distinguished name fields as given in RFC 5280, Appendix A.
Only OIDS recognized by botan are considered, so far.
Maps OID string representations instead of human readable strings in order
to avoid an additional lookup.
|
1794 |
x509_ext.cpp |
Create a Certificate_Extension object of some kind to handle
|
26695 |
x509_ext.h |
Basic Constraints Extension
|
17411 |
x509_obj.cpp |
Read a PEM or BER X.509 object
|
12727 |
x509_obj.h |
This class represents abstract X.509 signed objects as in the X.500
SIGNED macro
|
4270 |
x509cert.cpp |
|
28659 |
x509cert.h |
This class represents an X.509 Certificate
|
14510 |
x509opt.cpp |
Set when the certificate should become valid
|
2250 |
x509path.cpp |
PKIX path validation
|
37931 |
x509path.h |
This type represents the validation status of an entire certificate path.
There is one set of status codes for each certificate in the path.
|
20497 |
x509self.cpp |
Load information from the X509_Cert_Options
|
4809 |
x509self.h |
Options for X.509 certificates.
|
5193 |