The raw certificate data (DER).
The raw certificate body (DER). The part that is To Be Signed.
The X.509 version. (1=v1, 2=v2, 3=v3).
Unique id for certificate issued by a specific CA.
Signature algorithm, e.g. sha1RSA.
The raw issuer data (DER). Used for quick comparison.
The raw subject data (DER). Used for quick comparison.
The parsed issuer data (named information object).
The parsed subject data (named information object).
Start time of certificate validity.
End time of certificate validity.
Container for the public key context.
Optional X.509 v2/v3 issuer unique identifier.
Optional X.509 v2/v3 subject unique identifier.
Optional X.509 v3 extensions.
Optional list of Subject Alternative Names (Only dNSName supported).
Bit string containing detected and parsed extensions.
Optional Basic Constraint extension value: 1 if this certificate belongs to a CA, 0 otherwise.
Optional Basic Constraint extension value: The maximum path length to the root certificate. Path length is 1 higher than RFC 5280 'meaning', so 1+.
Optional key usage extension value: See the values in x509.h.
Optional list of extended key usage OIDs.
Optional Netscape certificate type extension value: See the values in x509.h.
Signature: hash of the tbs part signed with the private key.
Internal representation of the MD algorithm of the signature algorithm, e.g. MBEDTLS_MD_SHA256.
Internal representation of the Public Key algorithm of the signature algorithm, e.g. MBEDTLS_PK_RSA.
Signature options to be passed to mbedtls_pk_verify_ext(), e.g. for RSASSA-PSS.
Next certificate in the CA-chain.