Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Handling of certificate revocation lists (CRLs) #264

Open
Niederb opened this issue Oct 24, 2022 · 0 comments
Open

Handling of certificate revocation lists (CRLs) #264

Niederb opened this issue Oct 24, 2022 · 0 comments

Comments

@Niederb
Copy link

Niederb commented Oct 24, 2022

I need to implement a certificate check that also checks for revoked certificates with X.509 CRLs (RFC 5280). I would like to use webpki to do this. For the moment it would be enough if I can verify the certificate path of a X.509 CRL to the root CA.
Basically I would like an implementation of `EndEntityCert::verify_is_valid_tls_server_cert(..)] where the EndEntityCert is a CRL.

  • I saw some comments that support for CRL is planned but as far as I can see this is currently not supported. Is this correct?
  • Maybe you are aware of another crate that supports this? x509-cert allows to parse RCL but the verification part is missing
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant