mbedtls_x509_crt_profile Struct Reference
Security profile for certificate verification.
#include <x509_crt.h>
Data Fields |
|
uint32_t | allowed_mds |
MDs for signatures
|
|
uint32_t | allowed_pks |
PK algs for public keys; this applies to all certificates in the provided chain.
|
|
uint32_t | allowed_curves |
Elliptic curves for ECDSA
|
|
uint32_t | rsa_min_bitlen |
Minimum size for RSA keys
|
|
Security profile for certificate verification.
All lists are bitfields, built by ORing flags from MBEDTLS_X509_ID_FLAG() .
The fields of this structure are part of the public API and can be manipulated directly by applications. Future versions of the library may add extra fields or reorder existing fields.
You can create custom profiles by starting from a copy of an existing profile, such as mbedtls_x509_crt_profile_default or mbedtls_x509_ctr_profile_none and then tune it to your needs.
For example to allow SHA-224 in addition to the default:
mbedtls_x509_crt_profile my_profile = mbedtls_x509_crt_profile_default; my_profile.allowed_mds |= MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA224 ) ;
Or to allow only RSA-3072+ with SHA-256:
mbedtls_x509_crt_profile my_profile = mbedtls_x509_crt_profile_none; my_profile.allowed_mds = MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA256 ) ; my_profile.allowed_pks = MBEDTLS_X509_ID_FLAG( MBEDTLS_PK_RSA ) ; my_profile.rsa_min_bitlen = 3072;
Field Documentation
◆ allowed_mds
uint32_t mbedtls_x509_crt_profile::allowed_mds |
MDs for signatures
◆ allowed_pks
uint32_t mbedtls_x509_crt_profile::allowed_pks |
PK algs for public keys; this applies to all certificates in the provided chain.
◆ allowed_curves
uint32_t mbedtls_x509_crt_profile::allowed_curves |
Elliptic curves for ECDSA
◆ rsa_min_bitlen
uint32_t mbedtls_x509_crt_profile::rsa_min_bitlen |
Minimum size for RSA keys