Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Validate CRLs for the document signer certificate and IACA root #76

Open
cobward opened this issue Nov 28, 2023 · 0 comments
Open

Validate CRLs for the document signer certificate and IACA root #76

cobward opened this issue Nov 28, 2023 · 0 comments

Comments

@cobward
Copy link
Contributor

cobward commented Nov 28, 2023

Much of the work to support full mdoc authentication is covered by #42 and this branch.

However CRL endpoint checking is still required. To facilitate this we will need a function that takes an IACA certificate and a document signer certificate. The function should validate the CRLs according to the profile defined in Annex B of 18013-5. The function should respond with an "Outcome" struct that informs the caller which if any of the certificates are revoked.

For example, something along the lines of:

pub struct Outcome {
    iaca_revoked: Option<bool>,
    ds_revoked: Option<bool>,
    errors: Vec<Error>,
}

pub async fn validate_crl(iaca: x509_cert::TbsCertificate, ds: x509::TbsCertificate) -> Outcome {
    ...
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant