Crate rasn_pkix

Source
Expand description

§Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

rasn-pkix is an implementation of the data types defined in IETF RFC 5280 also known PKIX.

This does not provide an implementation of a PKIX certificate generator or validator, rasn-pkix provides a implementation of the underlying data types used decode and encode certificates from DER.

Modules§

attribute_certificate
est
Enrollment over Secure Transport

Structs§

AccessDescription
AlgorithmIdentifier
Identifies what algorithm was used, along with any parameters used as input.
Attribute
AttributeTypeAndValue
AuthorityKeyIdentifier
Identifying the public key corresponding to the private key used to sign a certificate.
BasicConstraints
BuiltInDomainDefinedAttribute
BuiltInDomainDefinedAttributes
BuiltInStandardAttributes
CertPathControls
CertPathControls provides the controls needed to initialize an X.509
Certificate
An X.509 certificate
CertificateList
A signed list of revoked certificates.
CommonName
DistributionPoint
E1634Address
EdiPartyName
Extension
Extension to an X.509 certificate.
ExtensionAttribute
ExtensionAttributes
Extensions
GeneralSubtree
IssuingDistributionPoint
NameConstraints
NoticeReference
OrAddress
OrganisationalUnitName
OrganisationalUnitNames
PdsName
PdsParameter
PersonalName
PolicyConstraints
PolicyInformation
PolicyMapping
PolicyQualifierInfo
PresentationAddress
PrintableAddress
RelativeDistinguishedName
RevokedCerificate
Identifies a revoked certificate.
SubjectPublicKeyInfo
The subject’s public key, and the algorithm used to encode it.
TbsCertList
The list of revoked certificates along with associated metadata.
TbsCertificate
Information associated with the subject of the certificate and the CA that issued it.
TeletexAddress
TeletexCommonName
TeletexDomainDefinedAttribute
TeletexDomainDefinedAttributes
TeletexOrganisationalUnitName
TeletexOrganisationalUnitNames
TeletexOrganizationName
TeletexPersonalName
TrustAnchorInfo
Trust anchors are widely used to verify digital signatures and validate certification paths [RFC5280][X.509]. They are required when validating certification paths. Though widely used, there is no standard format for representing trust anchor information. The RFC-5914 document describes the TrustAnchorInfo structure.
UnformattedPostalAddress
UserNotice
Validity
The validity period of the certificate.
Version
The version of a encoded certificate.
X520CountryName
X520SerialNumber

Enums§

AdministrationDomainName
CountryName
CrlReason
DirectoryString
DisplayText
DistributionPointName
ExtendedNetworkAddress
GeneralName
Name
PhysicalDeliveryCountryName
PostalCode
PrivateDomainName
Time
A general time type.
TrustAnchorChoice
TrustAnchorChoice provides three options for representing a trust anchor.
X520CommonName
X520LocalityName
X520Name
X520OrganisationName
X520OrganisationalUnitName
X520Pseudonym
X520StateOrProvinceName
X520Title

Type Aliases§

AttributeType
AttributeValue
AuthorityInfoAccessSyntax
BaseCrlNumber
BaseDistance
CertPolicyFlags
CertPolicyId
CertificateIssuer
CertificatePolicies
CertificateSerialNumber
CpsUri
CrlDistributionPoints
CrlNumber
DomainComponent
EmailAddress
ExtKeyUsageSyntax
FreshestCrl
GeneralNames
GeneralSubtrees
InhibitAnyPolicy
InvalidityDate
KeyIdentifier
KeyPurposeId
KeyUsage
NetworkAddress
NumericUserIdentifier
OrganisationName
PolicyMappings
PolicyQualifierId
RdnSequence
ReasonFlags
SkipCerts
SubjectAltName
SubjectDirectoryAttributes
SubjectInfoAccessSyntax
SubjectKeyIdentifier
TerminalIdentifier
TerminalType
TrustAnchorInfoVersion
TrustAnchorList
TrustAnchorTitle
UniqueIdentifier
X121Address
X520DnQualifier