root / lab4 / .minix-src / include / openssl / x509.h @ 13
History | View | Annotate | Download (50.6 KB)
1 | 13 | up20180614 | /* crypto/x509/x509.h */
|
---|---|---|---|
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
||
3 | * All rights reserved.
|
||
4 | *
|
||
5 | * This package is an SSL implementation written
|
||
6 | * by Eric Young (eay@cryptsoft.com).
|
||
7 | * The implementation was written so as to conform with Netscapes SSL.
|
||
8 | *
|
||
9 | * This library is free for commercial and non-commercial use as long as
|
||
10 | * the following conditions are aheared to. The following conditions
|
||
11 | * apply to all code found in this distribution, be it the RC4, RSA,
|
||
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||
13 | * included with this distribution is covered by the same copyright terms
|
||
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||
15 | *
|
||
16 | * Copyright remains Eric Young's, and as such any Copyright notices in
|
||
17 | * the code are not to be removed.
|
||
18 | * If this package is used in a product, Eric Young should be given attribution
|
||
19 | * as the author of the parts of the library used.
|
||
20 | * This can be in the form of a textual message at program startup or
|
||
21 | * in documentation (online or textual) provided with the package.
|
||
22 | *
|
||
23 | * Redistribution and use in source and binary forms, with or without
|
||
24 | * modification, are permitted provided that the following conditions
|
||
25 | * are met:
|
||
26 | * 1. Redistributions of source code must retain the copyright
|
||
27 | * notice, this list of conditions and the following disclaimer.
|
||
28 | * 2. Redistributions in binary form must reproduce the above copyright
|
||
29 | * notice, this list of conditions and the following disclaimer in the
|
||
30 | * documentation and/or other materials provided with the distribution.
|
||
31 | * 3. All advertising materials mentioning features or use of this software
|
||
32 | * must display the following acknowledgement:
|
||
33 | * "This product includes cryptographic software written by
|
||
34 | * Eric Young (eay@cryptsoft.com)"
|
||
35 | * The word 'cryptographic' can be left out if the rouines from the library
|
||
36 | * being used are not cryptographic related :-).
|
||
37 | * 4. If you include any Windows specific code (or a derivative thereof) from
|
||
38 | * the apps directory (application code) you must include an acknowledgement:
|
||
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||
40 | *
|
||
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
||
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
51 | * SUCH DAMAGE.
|
||
52 | *
|
||
53 | * The licence and distribution terms for any publically available version or
|
||
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be
|
||
55 | * copied and put under another distribution licence
|
||
56 | * [including the GNU Public Licence.]
|
||
57 | */
|
||
58 | /* ====================================================================
|
||
59 | * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
|
||
60 | * ECDH support in OpenSSL originally developed by
|
||
61 | * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
||
62 | */
|
||
63 | |||
64 | #ifndef HEADER_X509_H
|
||
65 | # define HEADER_X509_H
|
||
66 | |||
67 | # include <openssl/e_os2.h> |
||
68 | # include <openssl/symhacks.h> |
||
69 | # ifndef OPENSSL_NO_BUFFER
|
||
70 | # include <openssl/buffer.h> |
||
71 | # endif
|
||
72 | # ifndef OPENSSL_NO_EVP
|
||
73 | # include <openssl/evp.h> |
||
74 | # endif
|
||
75 | # ifndef OPENSSL_NO_BIO
|
||
76 | # include <openssl/bio.h> |
||
77 | # endif
|
||
78 | # include <openssl/stack.h> |
||
79 | # include <openssl/asn1.h> |
||
80 | # include <openssl/safestack.h> |
||
81 | |||
82 | # ifndef OPENSSL_NO_EC
|
||
83 | # include <openssl/ec.h> |
||
84 | # endif
|
||
85 | |||
86 | # ifndef OPENSSL_NO_ECDSA
|
||
87 | # include <openssl/ecdsa.h> |
||
88 | # endif
|
||
89 | |||
90 | # ifndef OPENSSL_NO_ECDH
|
||
91 | # include <openssl/ecdh.h> |
||
92 | # endif
|
||
93 | |||
94 | # ifndef OPENSSL_NO_DEPRECATED
|
||
95 | # ifndef OPENSSL_NO_RSA
|
||
96 | # include <openssl/rsa.h> |
||
97 | # endif
|
||
98 | # ifndef OPENSSL_NO_DSA
|
||
99 | # include <openssl/dsa.h> |
||
100 | # endif
|
||
101 | # ifndef OPENSSL_NO_DH
|
||
102 | # include <openssl/dh.h> |
||
103 | # endif
|
||
104 | # endif
|
||
105 | |||
106 | # ifndef OPENSSL_NO_SHA
|
||
107 | # include <openssl/sha.h> |
||
108 | # endif
|
||
109 | # include <openssl/ossl_typ.h> |
||
110 | |||
111 | #ifdef __cplusplus
|
||
112 | extern "C" { |
||
113 | #endif
|
||
114 | |||
115 | # ifdef OPENSSL_SYS_WIN32
|
||
116 | /* Under Win32 these are defined in wincrypt.h */
|
||
117 | # undef X509_NAME
|
||
118 | # undef X509_CERT_PAIR
|
||
119 | # undef X509_EXTENSIONS
|
||
120 | # endif
|
||
121 | |||
122 | # define X509_FILETYPE_PEM 1 |
||
123 | # define X509_FILETYPE_ASN1 2 |
||
124 | # define X509_FILETYPE_DEFAULT 3 |
||
125 | |||
126 | # define X509v3_KU_DIGITAL_SIGNATURE 0x0080 |
||
127 | # define X509v3_KU_NON_REPUDIATION 0x0040 |
||
128 | # define X509v3_KU_KEY_ENCIPHERMENT 0x0020 |
||
129 | # define X509v3_KU_DATA_ENCIPHERMENT 0x0010 |
||
130 | # define X509v3_KU_KEY_AGREEMENT 0x0008 |
||
131 | # define X509v3_KU_KEY_CERT_SIGN 0x0004 |
||
132 | # define X509v3_KU_CRL_SIGN 0x0002 |
||
133 | # define X509v3_KU_ENCIPHER_ONLY 0x0001 |
||
134 | # define X509v3_KU_DECIPHER_ONLY 0x8000 |
||
135 | # define X509v3_KU_UNDEF 0xffff |
||
136 | |||
137 | typedef struct X509_objects_st { |
||
138 | int nid;
|
||
139 | int (*a2i) (void); |
||
140 | int (*i2a) (void); |
||
141 | } X509_OBJECTS; |
||
142 | |||
143 | struct X509_algor_st {
|
||
144 | ASN1_OBJECT *algorithm; |
||
145 | ASN1_TYPE *parameter; |
||
146 | } /* X509_ALGOR */ ;
|
||
147 | |||
148 | DECLARE_ASN1_SET_OF(X509_ALGOR) |
||
149 | |||
150 | typedef STACK_OF(X509_ALGOR) X509_ALGORS;
|
||
151 | |||
152 | typedef struct X509_val_st { |
||
153 | ASN1_TIME *notBefore; |
||
154 | ASN1_TIME *notAfter; |
||
155 | } X509_VAL; |
||
156 | |||
157 | struct X509_pubkey_st {
|
||
158 | X509_ALGOR *algor; |
||
159 | ASN1_BIT_STRING *public_key; |
||
160 | EVP_PKEY *pkey; |
||
161 | }; |
||
162 | |||
163 | typedef struct X509_sig_st { |
||
164 | X509_ALGOR *algor; |
||
165 | ASN1_OCTET_STRING *digest; |
||
166 | } X509_SIG; |
||
167 | |||
168 | typedef struct X509_name_entry_st { |
||
169 | ASN1_OBJECT *object; |
||
170 | ASN1_STRING *value; |
||
171 | int set;
|
||
172 | int size; /* temp variable */ |
||
173 | } X509_NAME_ENTRY; |
||
174 | |||
175 | DECLARE_STACK_OF(X509_NAME_ENTRY) |
||
176 | DECLARE_ASN1_SET_OF(X509_NAME_ENTRY) |
||
177 | |||
178 | /* we always keep X509_NAMEs in 2 forms. */
|
||
179 | struct X509_name_st {
|
||
180 | STACK_OF(X509_NAME_ENTRY) *entries; |
||
181 | int modified; /* true if 'bytes' needs to be built */ |
||
182 | # ifndef OPENSSL_NO_BUFFER
|
||
183 | BUF_MEM *bytes; |
||
184 | # else
|
||
185 | char *bytes;
|
||
186 | # endif
|
||
187 | /* unsigned long hash; Keep the hash around for lookups */
|
||
188 | unsigned char *canon_enc; |
||
189 | int canon_enclen;
|
||
190 | } /* X509_NAME */ ;
|
||
191 | |||
192 | DECLARE_STACK_OF(X509_NAME) |
||
193 | |||
194 | # define X509_EX_V_NETSCAPE_HACK 0x8000 |
||
195 | # define X509_EX_V_INIT 0x0001 |
||
196 | typedef struct X509_extension_st { |
||
197 | ASN1_OBJECT *object; |
||
198 | ASN1_BOOLEAN critical; |
||
199 | ASN1_OCTET_STRING *value; |
||
200 | } X509_EXTENSION; |
||
201 | |||
202 | typedef STACK_OF(X509_EXTENSION) X509_EXTENSIONS;
|
||
203 | |||
204 | DECLARE_STACK_OF(X509_EXTENSION) |
||
205 | DECLARE_ASN1_SET_OF(X509_EXTENSION) |
||
206 | |||
207 | /* a sequence of these are used */
|
||
208 | typedef struct x509_attributes_st { |
||
209 | ASN1_OBJECT *object; |
||
210 | int single; /* 0 for a set, 1 for a single item (which is |
||
211 | * wrong) */
|
||
212 | union {
|
||
213 | char *ptr;
|
||
214 | /*
|
||
215 | * 0
|
||
216 | */ STACK_OF(ASN1_TYPE) *set;
|
||
217 | /*
|
||
218 | * 1
|
||
219 | */ ASN1_TYPE *single;
|
||
220 | } value; |
||
221 | } X509_ATTRIBUTE; |
||
222 | |||
223 | DECLARE_STACK_OF(X509_ATTRIBUTE) |
||
224 | DECLARE_ASN1_SET_OF(X509_ATTRIBUTE) |
||
225 | |||
226 | typedef struct X509_req_info_st { |
||
227 | ASN1_ENCODING enc; |
||
228 | ASN1_INTEGER *version; |
||
229 | X509_NAME *subject; |
||
230 | X509_PUBKEY *pubkey; |
||
231 | /* d=2 hl=2 l= 0 cons: cont: 00 */
|
||
232 | STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */
|
||
233 | } X509_REQ_INFO; |
||
234 | |||
235 | typedef struct X509_req_st { |
||
236 | X509_REQ_INFO *req_info; |
||
237 | X509_ALGOR *sig_alg; |
||
238 | ASN1_BIT_STRING *signature; |
||
239 | int references;
|
||
240 | } X509_REQ; |
||
241 | |||
242 | typedef struct x509_cinf_st { |
||
243 | ASN1_INTEGER *version; /* [ 0 ] default of v1 */
|
||
244 | ASN1_INTEGER *serialNumber; |
||
245 | X509_ALGOR *signature; |
||
246 | X509_NAME *issuer; |
||
247 | X509_VAL *validity; |
||
248 | X509_NAME *subject; |
||
249 | X509_PUBKEY *key; |
||
250 | ASN1_BIT_STRING *issuerUID; /* [ 1 ] optional in v2 */
|
||
251 | ASN1_BIT_STRING *subjectUID; /* [ 2 ] optional in v2 */
|
||
252 | STACK_OF(X509_EXTENSION) *extensions; /* [ 3 ] optional in v3 */
|
||
253 | ASN1_ENCODING enc; |
||
254 | } X509_CINF; |
||
255 | |||
256 | /*
|
||
257 | * This stuff is certificate "auxiliary info" it contains details which are
|
||
258 | * useful in certificate stores and databases. When used this is tagged onto
|
||
259 | * the end of the certificate itself
|
||
260 | */
|
||
261 | |||
262 | typedef struct x509_cert_aux_st { |
||
263 | STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */
|
||
264 | STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */
|
||
265 | ASN1_UTF8STRING *alias; /* "friendly name" */
|
||
266 | ASN1_OCTET_STRING *keyid; /* key id of private key */
|
||
267 | STACK_OF(X509_ALGOR) *other; /* other unspecified info */
|
||
268 | } X509_CERT_AUX; |
||
269 | |||
270 | struct x509_st {
|
||
271 | X509_CINF *cert_info; |
||
272 | X509_ALGOR *sig_alg; |
||
273 | ASN1_BIT_STRING *signature; |
||
274 | int valid;
|
||
275 | int references;
|
||
276 | char *name;
|
||
277 | CRYPTO_EX_DATA ex_data; |
||
278 | /* These contain copies of various extension values */
|
||
279 | long ex_pathlen;
|
||
280 | long ex_pcpathlen;
|
||
281 | unsigned long ex_flags; |
||
282 | unsigned long ex_kusage; |
||
283 | unsigned long ex_xkusage; |
||
284 | unsigned long ex_nscert; |
||
285 | ASN1_OCTET_STRING *skid; |
||
286 | AUTHORITY_KEYID *akid; |
||
287 | X509_POLICY_CACHE *policy_cache; |
||
288 | STACK_OF(DIST_POINT) *crldp; |
||
289 | STACK_OF(GENERAL_NAME) *altname; |
||
290 | NAME_CONSTRAINTS *nc; |
||
291 | # ifndef OPENSSL_NO_RFC3779
|
||
292 | STACK_OF(IPAddressFamily) *rfc3779_addr; |
||
293 | struct ASIdentifiers_st *rfc3779_asid;
|
||
294 | # endif
|
||
295 | # ifndef OPENSSL_NO_SHA
|
||
296 | unsigned char sha1_hash[SHA_DIGEST_LENGTH]; |
||
297 | # endif
|
||
298 | X509_CERT_AUX *aux; |
||
299 | } /* X509 */ ;
|
||
300 | |||
301 | DECLARE_STACK_OF(X509) |
||
302 | DECLARE_ASN1_SET_OF(X509) |
||
303 | |||
304 | /* This is used for a table of trust checking functions */
|
||
305 | |||
306 | typedef struct x509_trust_st { |
||
307 | int trust;
|
||
308 | int flags;
|
||
309 | int (*check_trust) (struct x509_trust_st *, X509 *, int); |
||
310 | char *name;
|
||
311 | int arg1;
|
||
312 | void *arg2;
|
||
313 | } X509_TRUST; |
||
314 | |||
315 | DECLARE_STACK_OF(X509_TRUST) |
||
316 | |||
317 | typedef struct x509_cert_pair_st { |
||
318 | X509 *forward; |
||
319 | X509 *reverse; |
||
320 | } X509_CERT_PAIR; |
||
321 | |||
322 | /* standard trust ids */
|
||
323 | |||
324 | # define X509_TRUST_DEFAULT -1/* Only valid in purpose settings */ |
||
325 | |||
326 | # define X509_TRUST_COMPAT 1 |
||
327 | # define X509_TRUST_SSL_CLIENT 2 |
||
328 | # define X509_TRUST_SSL_SERVER 3 |
||
329 | # define X509_TRUST_EMAIL 4 |
||
330 | # define X509_TRUST_OBJECT_SIGN 5 |
||
331 | # define X509_TRUST_OCSP_SIGN 6 |
||
332 | # define X509_TRUST_OCSP_REQUEST 7 |
||
333 | # define X509_TRUST_TSA 8 |
||
334 | |||
335 | /* Keep these up to date! */
|
||
336 | # define X509_TRUST_MIN 1 |
||
337 | # define X509_TRUST_MAX 8 |
||
338 | |||
339 | /* trust_flags values */
|
||
340 | # define X509_TRUST_DYNAMIC 1 |
||
341 | # define X509_TRUST_DYNAMIC_NAME 2 |
||
342 | |||
343 | /* check_trust return codes */
|
||
344 | |||
345 | # define X509_TRUST_TRUSTED 1 |
||
346 | # define X509_TRUST_REJECTED 2 |
||
347 | # define X509_TRUST_UNTRUSTED 3 |
||
348 | |||
349 | /* Flags for X509_print_ex() */
|
||
350 | |||
351 | # define X509_FLAG_COMPAT 0 |
||
352 | # define X509_FLAG_NO_HEADER 1L |
||
353 | # define X509_FLAG_NO_VERSION (1L << 1) |
||
354 | # define X509_FLAG_NO_SERIAL (1L << 2) |
||
355 | # define X509_FLAG_NO_SIGNAME (1L << 3) |
||
356 | # define X509_FLAG_NO_ISSUER (1L << 4) |
||
357 | # define X509_FLAG_NO_VALIDITY (1L << 5) |
||
358 | # define X509_FLAG_NO_SUBJECT (1L << 6) |
||
359 | # define X509_FLAG_NO_PUBKEY (1L << 7) |
||
360 | # define X509_FLAG_NO_EXTENSIONS (1L << 8) |
||
361 | # define X509_FLAG_NO_SIGDUMP (1L << 9) |
||
362 | # define X509_FLAG_NO_AUX (1L << 10) |
||
363 | # define X509_FLAG_NO_ATTRIBUTES (1L << 11) |
||
364 | |||
365 | /* Flags specific to X509_NAME_print_ex() */
|
||
366 | |||
367 | /* The field separator information */
|
||
368 | |||
369 | # define XN_FLAG_SEP_MASK (0xf << 16) |
||
370 | |||
371 | # define XN_FLAG_COMPAT 0/* Traditional SSLeay: use old |
||
372 | * X509_NAME_print */
|
||
373 | # define XN_FLAG_SEP_COMMA_PLUS (1 << 16)/* RFC2253 ,+ */ |
||
374 | # define XN_FLAG_SEP_CPLUS_SPC (2 << 16)/* ,+ spaced: more readable */ |
||
375 | # define XN_FLAG_SEP_SPLUS_SPC (3 << 16)/* ;+ spaced */ |
||
376 | # define XN_FLAG_SEP_MULTILINE (4 << 16)/* One line per field */ |
||
377 | |||
378 | # define XN_FLAG_DN_REV (1 << 20)/* Reverse DN order */ |
||
379 | |||
380 | /* How the field name is shown */
|
||
381 | |||
382 | # define XN_FLAG_FN_MASK (0x3 << 21) |
||
383 | |||
384 | # define XN_FLAG_FN_SN 0/* Object short name */ |
||
385 | # define XN_FLAG_FN_LN (1 << 21)/* Object long name */ |
||
386 | # define XN_FLAG_FN_OID (2 << 21)/* Always use OIDs */ |
||
387 | # define XN_FLAG_FN_NONE (3 << 21)/* No field names */ |
||
388 | |||
389 | # define XN_FLAG_SPC_EQ (1 << 23)/* Put spaces round '=' */ |
||
390 | |||
391 | /*
|
||
392 | * This determines if we dump fields we don't recognise: RFC2253 requires
|
||
393 | * this.
|
||
394 | */
|
||
395 | |||
396 | # define XN_FLAG_DUMP_UNKNOWN_FIELDS (1 << 24) |
||
397 | |||
398 | # define XN_FLAG_FN_ALIGN (1 << 25)/* Align field names to 20 |
||
399 | * characters */
|
||
400 | |||
401 | /* Complete set of RFC2253 flags */
|
||
402 | |||
403 | # define XN_FLAG_RFC2253 (ASN1_STRFLGS_RFC2253 | \
|
||
404 | XN_FLAG_SEP_COMMA_PLUS | \ |
||
405 | XN_FLAG_DN_REV | \ |
||
406 | XN_FLAG_FN_SN | \ |
||
407 | XN_FLAG_DUMP_UNKNOWN_FIELDS) |
||
408 | |||
409 | /* readable oneline form */
|
||
410 | |||
411 | # define XN_FLAG_ONELINE (ASN1_STRFLGS_RFC2253 | \
|
||
412 | ASN1_STRFLGS_ESC_QUOTE | \ |
||
413 | XN_FLAG_SEP_CPLUS_SPC | \ |
||
414 | XN_FLAG_SPC_EQ | \ |
||
415 | XN_FLAG_FN_SN) |
||
416 | |||
417 | /* readable multiline form */
|
||
418 | |||
419 | # define XN_FLAG_MULTILINE (ASN1_STRFLGS_ESC_CTRL | \
|
||
420 | ASN1_STRFLGS_ESC_MSB | \ |
||
421 | XN_FLAG_SEP_MULTILINE | \ |
||
422 | XN_FLAG_SPC_EQ | \ |
||
423 | XN_FLAG_FN_LN | \ |
||
424 | XN_FLAG_FN_ALIGN) |
||
425 | |||
426 | struct x509_revoked_st {
|
||
427 | ASN1_INTEGER *serialNumber; |
||
428 | ASN1_TIME *revocationDate; |
||
429 | STACK_OF(X509_EXTENSION) /* optional */ *extensions;
|
||
430 | /* Set up if indirect CRL */
|
||
431 | STACK_OF(GENERAL_NAME) *issuer; |
||
432 | /* Revocation reason */
|
||
433 | int reason;
|
||
434 | int sequence; /* load sequence */ |
||
435 | }; |
||
436 | |||
437 | DECLARE_STACK_OF(X509_REVOKED) |
||
438 | DECLARE_ASN1_SET_OF(X509_REVOKED) |
||
439 | |||
440 | typedef struct X509_crl_info_st { |
||
441 | ASN1_INTEGER *version; |
||
442 | X509_ALGOR *sig_alg; |
||
443 | X509_NAME *issuer; |
||
444 | ASN1_TIME *lastUpdate; |
||
445 | ASN1_TIME *nextUpdate; |
||
446 | STACK_OF(X509_REVOKED) *revoked; |
||
447 | STACK_OF(X509_EXTENSION) /* [0] */ *extensions;
|
||
448 | ASN1_ENCODING enc; |
||
449 | } X509_CRL_INFO; |
||
450 | |||
451 | struct X509_crl_st {
|
||
452 | /* actual signature */
|
||
453 | X509_CRL_INFO *crl; |
||
454 | X509_ALGOR *sig_alg; |
||
455 | ASN1_BIT_STRING *signature; |
||
456 | int references;
|
||
457 | int flags;
|
||
458 | /* Copies of various extensions */
|
||
459 | AUTHORITY_KEYID *akid; |
||
460 | ISSUING_DIST_POINT *idp; |
||
461 | /* Convenient breakdown of IDP */
|
||
462 | int idp_flags;
|
||
463 | int idp_reasons;
|
||
464 | /* CRL and base CRL numbers for delta processing */
|
||
465 | ASN1_INTEGER *crl_number; |
||
466 | ASN1_INTEGER *base_crl_number; |
||
467 | # ifndef OPENSSL_NO_SHA
|
||
468 | unsigned char sha1_hash[SHA_DIGEST_LENGTH]; |
||
469 | # endif
|
||
470 | STACK_OF(GENERAL_NAMES) *issuers; |
||
471 | const X509_CRL_METHOD *meth;
|
||
472 | void *meth_data;
|
||
473 | } /* X509_CRL */ ;
|
||
474 | |||
475 | DECLARE_STACK_OF(X509_CRL) |
||
476 | DECLARE_ASN1_SET_OF(X509_CRL) |
||
477 | |||
478 | typedef struct private_key_st { |
||
479 | int version;
|
||
480 | /* The PKCS#8 data types */
|
||
481 | X509_ALGOR *enc_algor; |
||
482 | ASN1_OCTET_STRING *enc_pkey; /* encrypted pub key */
|
||
483 | /* When decrypted, the following will not be NULL */
|
||
484 | EVP_PKEY *dec_pkey; |
||
485 | /* used to encrypt and decrypt */
|
||
486 | int key_length;
|
||
487 | char *key_data;
|
||
488 | int key_free; /* true if we should auto free key_data */ |
||
489 | /* expanded version of 'enc_algor' */
|
||
490 | EVP_CIPHER_INFO cipher; |
||
491 | int references;
|
||
492 | } X509_PKEY; |
||
493 | |||
494 | # ifndef OPENSSL_NO_EVP
|
||
495 | typedef struct X509_info_st { |
||
496 | X509 *x509; |
||
497 | X509_CRL *crl; |
||
498 | X509_PKEY *x_pkey; |
||
499 | EVP_CIPHER_INFO enc_cipher; |
||
500 | int enc_len;
|
||
501 | char *enc_data;
|
||
502 | int references;
|
||
503 | } X509_INFO; |
||
504 | |||
505 | DECLARE_STACK_OF(X509_INFO) |
||
506 | # endif
|
||
507 | |||
508 | /*
|
||
509 | * The next 2 structures and their 8 routines were sent to me by Pat Richard
|
||
510 | * <patr@x509.com> and are used to manipulate Netscapes spki structures -
|
||
511 | * useful if you are writing a CA web page
|
||
512 | */
|
||
513 | typedef struct Netscape_spkac_st { |
||
514 | X509_PUBKEY *pubkey; |
||
515 | ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */
|
||
516 | } NETSCAPE_SPKAC; |
||
517 | |||
518 | typedef struct Netscape_spki_st { |
||
519 | NETSCAPE_SPKAC *spkac; /* signed public key and challenge */
|
||
520 | X509_ALGOR *sig_algor; |
||
521 | ASN1_BIT_STRING *signature; |
||
522 | } NETSCAPE_SPKI; |
||
523 | |||
524 | /* Netscape certificate sequence structure */
|
||
525 | typedef struct Netscape_certificate_sequence { |
||
526 | ASN1_OBJECT *type; |
||
527 | STACK_OF(X509) *certs; |
||
528 | } NETSCAPE_CERT_SEQUENCE; |
||
529 | |||
530 | /*- Unused (and iv length is wrong)
|
||
531 | typedef struct CBCParameter_st
|
||
532 | {
|
||
533 | unsigned char iv[8];
|
||
534 | } CBC_PARAM;
|
||
535 | */
|
||
536 | |||
537 | /* Password based encryption structure */
|
||
538 | |||
539 | typedef struct PBEPARAM_st { |
||
540 | ASN1_OCTET_STRING *salt; |
||
541 | ASN1_INTEGER *iter; |
||
542 | } PBEPARAM; |
||
543 | |||
544 | /* Password based encryption V2 structures */
|
||
545 | |||
546 | typedef struct PBE2PARAM_st { |
||
547 | X509_ALGOR *keyfunc; |
||
548 | X509_ALGOR *encryption; |
||
549 | } PBE2PARAM; |
||
550 | |||
551 | typedef struct PBKDF2PARAM_st { |
||
552 | /* Usually OCTET STRING but could be anything */
|
||
553 | ASN1_TYPE *salt; |
||
554 | ASN1_INTEGER *iter; |
||
555 | ASN1_INTEGER *keylength; |
||
556 | X509_ALGOR *prf; |
||
557 | } PBKDF2PARAM; |
||
558 | |||
559 | /* PKCS#8 private key info structure */
|
||
560 | |||
561 | struct pkcs8_priv_key_info_st {
|
||
562 | /* Flag for various broken formats */
|
||
563 | int broken;
|
||
564 | # define PKCS8_OK 0 |
||
565 | # define PKCS8_NO_OCTET 1 |
||
566 | # define PKCS8_EMBEDDED_PARAM 2 |
||
567 | # define PKCS8_NS_DB 3 |
||
568 | # define PKCS8_NEG_PRIVKEY 4 |
||
569 | ASN1_INTEGER *version; |
||
570 | X509_ALGOR *pkeyalg; |
||
571 | /* Should be OCTET STRING but some are broken */
|
||
572 | ASN1_TYPE *pkey; |
||
573 | STACK_OF(X509_ATTRIBUTE) *attributes; |
||
574 | }; |
||
575 | |||
576 | #ifdef __cplusplus
|
||
577 | } |
||
578 | #endif
|
||
579 | |||
580 | # include <openssl/x509_vfy.h> |
||
581 | # include <openssl/pkcs7.h> |
||
582 | |||
583 | #ifdef __cplusplus
|
||
584 | extern "C" { |
||
585 | #endif
|
||
586 | |||
587 | # define X509_EXT_PACK_UNKNOWN 1 |
||
588 | # define X509_EXT_PACK_STRING 2 |
||
589 | |||
590 | # define X509_get_version(x) ASN1_INTEGER_get((x)->cert_info->version)
|
||
591 | /* #define X509_get_serialNumber(x) ((x)->cert_info->serialNumber) */
|
||
592 | # define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore)
|
||
593 | # define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter)
|
||
594 | # define X509_extract_key(x) X509_get_pubkey(x)/*****/ |
||
595 | # define X509_REQ_get_version(x) ASN1_INTEGER_get((x)->req_info->version)
|
||
596 | # define X509_REQ_get_subject_name(x) ((x)->req_info->subject)
|
||
597 | # define X509_REQ_extract_key(a) X509_REQ_get_pubkey(a)
|
||
598 | # define X509_name_cmp(a,b) X509_NAME_cmp((a),(b))
|
||
599 | # define X509_get_signature_type(x) EVP_PKEY_type(OBJ_obj2nid((x)->sig_alg->algorithm))
|
||
600 | |||
601 | # define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version)
|
||
602 | # define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate)
|
||
603 | # define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate)
|
||
604 | # define X509_CRL_get_issuer(x) ((x)->crl->issuer)
|
||
605 | # define X509_CRL_get_REVOKED(x) ((x)->crl->revoked)
|
||
606 | |||
607 | void X509_CRL_set_default_method(const X509_CRL_METHOD *meth); |
||
608 | X509_CRL_METHOD *X509_CRL_METHOD_new(int (*crl_init) (X509_CRL *crl),
|
||
609 | int (*crl_free) (X509_CRL *crl),
|
||
610 | int (*crl_lookup) (X509_CRL *crl,
|
||
611 | X509_REVOKED **ret, |
||
612 | ASN1_INTEGER *ser, |
||
613 | X509_NAME *issuer), |
||
614 | int (*crl_verify) (X509_CRL *crl,
|
||
615 | EVP_PKEY *pk)); |
||
616 | void X509_CRL_METHOD_free(X509_CRL_METHOD *m);
|
||
617 | |||
618 | void X509_CRL_set_meth_data(X509_CRL *crl, void *dat); |
||
619 | void *X509_CRL_get_meth_data(X509_CRL *crl);
|
||
620 | |||
621 | /*
|
||
622 | * This one is only used so that a binary form can output, as in
|
||
623 | * i2d_X509_NAME(X509_get_X509_PUBKEY(x),&buf)
|
||
624 | */
|
||
625 | # define X509_get_X509_PUBKEY(x) ((x)->cert_info->key)
|
||
626 | |||
627 | const char *X509_verify_cert_error_string(long n); |
||
628 | |||
629 | # ifndef OPENSSL_NO_EVP
|
||
630 | int X509_verify(X509 *a, EVP_PKEY *r);
|
||
631 | |||
632 | int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r);
|
||
633 | int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r);
|
||
634 | int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r);
|
||
635 | |||
636 | NETSCAPE_SPKI *NETSCAPE_SPKI_b64_decode(const char *str, int len); |
||
637 | char *NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *x);
|
||
638 | EVP_PKEY *NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x); |
||
639 | int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey);
|
||
640 | |||
641 | int NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki);
|
||
642 | |||
643 | int X509_signature_dump(BIO *bp, const ASN1_STRING *sig, int indent); |
||
644 | int X509_signature_print(BIO *bp, X509_ALGOR *alg, ASN1_STRING *sig);
|
||
645 | |||
646 | int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); |
||
647 | int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx);
|
||
648 | int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); |
||
649 | int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx);
|
||
650 | int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); |
||
651 | int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx);
|
||
652 | int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); |
||
653 | |||
654 | int X509_pubkey_digest(const X509 *data, const EVP_MD *type, |
||
655 | unsigned char *md, unsigned int *len); |
||
656 | int X509_digest(const X509 *data, const EVP_MD *type, |
||
657 | unsigned char *md, unsigned int *len); |
||
658 | int X509_CRL_digest(const X509_CRL *data, const EVP_MD *type, |
||
659 | unsigned char *md, unsigned int *len); |
||
660 | int X509_REQ_digest(const X509_REQ *data, const EVP_MD *type, |
||
661 | unsigned char *md, unsigned int *len); |
||
662 | int X509_NAME_digest(const X509_NAME *data, const EVP_MD *type, |
||
663 | unsigned char *md, unsigned int *len); |
||
664 | # endif
|
||
665 | |||
666 | # ifndef OPENSSL_NO_FP_API
|
||
667 | X509 *d2i_X509_fp(FILE *fp, X509 **x509); |
||
668 | int i2d_X509_fp(FILE *fp, X509 *x509);
|
||
669 | X509_CRL *d2i_X509_CRL_fp(FILE *fp, X509_CRL **crl); |
||
670 | int i2d_X509_CRL_fp(FILE *fp, X509_CRL *crl);
|
||
671 | X509_REQ *d2i_X509_REQ_fp(FILE *fp, X509_REQ **req); |
||
672 | int i2d_X509_REQ_fp(FILE *fp, X509_REQ *req);
|
||
673 | # ifndef OPENSSL_NO_RSA
|
||
674 | RSA *d2i_RSAPrivateKey_fp(FILE *fp, RSA **rsa); |
||
675 | int i2d_RSAPrivateKey_fp(FILE *fp, RSA *rsa);
|
||
676 | RSA *d2i_RSAPublicKey_fp(FILE *fp, RSA **rsa); |
||
677 | int i2d_RSAPublicKey_fp(FILE *fp, RSA *rsa);
|
||
678 | RSA *d2i_RSA_PUBKEY_fp(FILE *fp, RSA **rsa); |
||
679 | int i2d_RSA_PUBKEY_fp(FILE *fp, RSA *rsa);
|
||
680 | # endif
|
||
681 | # ifndef OPENSSL_NO_DSA
|
||
682 | DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); |
||
683 | int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa);
|
||
684 | DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); |
||
685 | int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa);
|
||
686 | # endif
|
||
687 | # ifndef OPENSSL_NO_EC
|
||
688 | EC_KEY *d2i_EC_PUBKEY_fp(FILE *fp, EC_KEY **eckey); |
||
689 | int i2d_EC_PUBKEY_fp(FILE *fp, EC_KEY *eckey);
|
||
690 | EC_KEY *d2i_ECPrivateKey_fp(FILE *fp, EC_KEY **eckey); |
||
691 | int i2d_ECPrivateKey_fp(FILE *fp, EC_KEY *eckey);
|
||
692 | # endif
|
||
693 | X509_SIG *d2i_PKCS8_fp(FILE *fp, X509_SIG **p8); |
||
694 | int i2d_PKCS8_fp(FILE *fp, X509_SIG *p8);
|
||
695 | PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, |
||
696 | PKCS8_PRIV_KEY_INFO **p8inf); |
||
697 | int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, PKCS8_PRIV_KEY_INFO *p8inf);
|
||
698 | int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key);
|
||
699 | int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey);
|
||
700 | EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a); |
||
701 | int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey);
|
||
702 | EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a); |
||
703 | # endif
|
||
704 | |||
705 | # ifndef OPENSSL_NO_BIO
|
||
706 | X509 *d2i_X509_bio(BIO *bp, X509 **x509); |
||
707 | int i2d_X509_bio(BIO *bp, X509 *x509);
|
||
708 | X509_CRL *d2i_X509_CRL_bio(BIO *bp, X509_CRL **crl); |
||
709 | int i2d_X509_CRL_bio(BIO *bp, X509_CRL *crl);
|
||
710 | X509_REQ *d2i_X509_REQ_bio(BIO *bp, X509_REQ **req); |
||
711 | int i2d_X509_REQ_bio(BIO *bp, X509_REQ *req);
|
||
712 | # ifndef OPENSSL_NO_RSA
|
||
713 | RSA *d2i_RSAPrivateKey_bio(BIO *bp, RSA **rsa); |
||
714 | int i2d_RSAPrivateKey_bio(BIO *bp, RSA *rsa);
|
||
715 | RSA *d2i_RSAPublicKey_bio(BIO *bp, RSA **rsa); |
||
716 | int i2d_RSAPublicKey_bio(BIO *bp, RSA *rsa);
|
||
717 | RSA *d2i_RSA_PUBKEY_bio(BIO *bp, RSA **rsa); |
||
718 | int i2d_RSA_PUBKEY_bio(BIO *bp, RSA *rsa);
|
||
719 | # endif
|
||
720 | # ifndef OPENSSL_NO_DSA
|
||
721 | DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa); |
||
722 | int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa);
|
||
723 | DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa); |
||
724 | int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa);
|
||
725 | # endif
|
||
726 | # ifndef OPENSSL_NO_EC
|
||
727 | EC_KEY *d2i_EC_PUBKEY_bio(BIO *bp, EC_KEY **eckey); |
||
728 | int i2d_EC_PUBKEY_bio(BIO *bp, EC_KEY *eckey);
|
||
729 | EC_KEY *d2i_ECPrivateKey_bio(BIO *bp, EC_KEY **eckey); |
||
730 | int i2d_ECPrivateKey_bio(BIO *bp, EC_KEY *eckey);
|
||
731 | # endif
|
||
732 | X509_SIG *d2i_PKCS8_bio(BIO *bp, X509_SIG **p8); |
||
733 | int i2d_PKCS8_bio(BIO *bp, X509_SIG *p8);
|
||
734 | PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, |
||
735 | PKCS8_PRIV_KEY_INFO **p8inf); |
||
736 | int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, PKCS8_PRIV_KEY_INFO *p8inf);
|
||
737 | int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key);
|
||
738 | int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey);
|
||
739 | EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a); |
||
740 | int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey);
|
||
741 | EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a); |
||
742 | # endif
|
||
743 | |||
744 | X509 *X509_dup(X509 *x509); |
||
745 | X509_ATTRIBUTE *X509_ATTRIBUTE_dup(X509_ATTRIBUTE *xa); |
||
746 | X509_EXTENSION *X509_EXTENSION_dup(X509_EXTENSION *ex); |
||
747 | X509_CRL *X509_CRL_dup(X509_CRL *crl); |
||
748 | X509_REQ *X509_REQ_dup(X509_REQ *req); |
||
749 | X509_ALGOR *X509_ALGOR_dup(X509_ALGOR *xn); |
||
750 | int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, |
||
751 | void *pval);
|
||
752 | void X509_ALGOR_get0(ASN1_OBJECT **paobj, int *pptype, void **ppval, |
||
753 | X509_ALGOR *algor); |
||
754 | void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md); |
||
755 | int X509_ALGOR_cmp(const X509_ALGOR *a, const X509_ALGOR *b); |
||
756 | |||
757 | X509_NAME *X509_NAME_dup(X509_NAME *xn); |
||
758 | X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne); |
||
759 | |||
760 | int X509_cmp_time(const ASN1_TIME *s, time_t *t); |
||
761 | int X509_cmp_current_time(const ASN1_TIME *s); |
||
762 | ASN1_TIME *X509_time_adj(ASN1_TIME *s, long adj, time_t *t);
|
||
763 | ASN1_TIME *X509_time_adj_ex(ASN1_TIME *s, |
||
764 | int offset_day, long offset_sec, time_t *t); |
||
765 | ASN1_TIME *X509_gmtime_adj(ASN1_TIME *s, long adj);
|
||
766 | |||
767 | const char *X509_get_default_cert_area(void); |
||
768 | const char *X509_get_default_cert_dir(void); |
||
769 | const char *X509_get_default_cert_file(void); |
||
770 | const char *X509_get_default_cert_dir_env(void); |
||
771 | const char *X509_get_default_cert_file_env(void); |
||
772 | const char *X509_get_default_private_dir(void); |
||
773 | |||
774 | X509_REQ *X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md);
|
||
775 | X509 *X509_REQ_to_X509(X509_REQ *r, int days, EVP_PKEY *pkey);
|
||
776 | |||
777 | DECLARE_ASN1_FUNCTIONS(X509_ALGOR) |
||
778 | DECLARE_ASN1_ENCODE_FUNCTIONS(X509_ALGORS, X509_ALGORS, X509_ALGORS) |
||
779 | DECLARE_ASN1_FUNCTIONS(X509_VAL) |
||
780 | |||
781 | DECLARE_ASN1_FUNCTIONS(X509_PUBKEY) |
||
782 | |||
783 | int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey);
|
||
784 | EVP_PKEY *X509_PUBKEY_get(X509_PUBKEY *key); |
||
785 | int X509_get_pubkey_parameters(EVP_PKEY *pkey, STACK_OF(X509) *chain);
|
||
786 | int i2d_PUBKEY(EVP_PKEY *a, unsigned char **pp); |
||
787 | EVP_PKEY *d2i_PUBKEY(EVP_PKEY **a, const unsigned char **pp, long length); |
||
788 | # ifndef OPENSSL_NO_RSA
|
||
789 | int i2d_RSA_PUBKEY(RSA *a, unsigned char **pp); |
||
790 | RSA *d2i_RSA_PUBKEY(RSA **a, const unsigned char **pp, long length); |
||
791 | # endif
|
||
792 | # ifndef OPENSSL_NO_DSA
|
||
793 | int i2d_DSA_PUBKEY(DSA *a, unsigned char **pp); |
||
794 | DSA *d2i_DSA_PUBKEY(DSA **a, const unsigned char **pp, long length); |
||
795 | # endif
|
||
796 | # ifndef OPENSSL_NO_EC
|
||
797 | int i2d_EC_PUBKEY(EC_KEY *a, unsigned char **pp); |
||
798 | EC_KEY *d2i_EC_PUBKEY(EC_KEY **a, const unsigned char **pp, long length); |
||
799 | # endif
|
||
800 | |||
801 | DECLARE_ASN1_FUNCTIONS(X509_SIG) |
||
802 | DECLARE_ASN1_FUNCTIONS(X509_REQ_INFO) |
||
803 | DECLARE_ASN1_FUNCTIONS(X509_REQ) |
||
804 | |||
805 | DECLARE_ASN1_FUNCTIONS(X509_ATTRIBUTE) |
||
806 | X509_ATTRIBUTE *X509_ATTRIBUTE_create(int nid, int atrtype, void *value); |
||
807 | |||
808 | DECLARE_ASN1_FUNCTIONS(X509_EXTENSION) |
||
809 | DECLARE_ASN1_ENCODE_FUNCTIONS(X509_EXTENSIONS, X509_EXTENSIONS, X509_EXTENSIONS) |
||
810 | |||
811 | DECLARE_ASN1_FUNCTIONS(X509_NAME_ENTRY) |
||
812 | |||
813 | DECLARE_ASN1_FUNCTIONS(X509_NAME) |
||
814 | |||
815 | int X509_NAME_set(X509_NAME **xn, X509_NAME *name);
|
||
816 | |||
817 | DECLARE_ASN1_FUNCTIONS(X509_CINF) |
||
818 | |||
819 | DECLARE_ASN1_FUNCTIONS(X509) |
||
820 | DECLARE_ASN1_FUNCTIONS(X509_CERT_AUX) |
||
821 | |||
822 | DECLARE_ASN1_FUNCTIONS(X509_CERT_PAIR) |
||
823 | |||
824 | int X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
||
825 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); |
||
826 | int X509_set_ex_data(X509 *r, int idx, void *arg); |
||
827 | void *X509_get_ex_data(X509 *r, int idx); |
||
828 | int i2d_X509_AUX(X509 *a, unsigned char **pp); |
||
829 | X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, long length); |
||
830 | |||
831 | int X509_alias_set1(X509 *x, unsigned char *name, int len); |
||
832 | int X509_keyid_set1(X509 *x, unsigned char *id, int len); |
||
833 | unsigned char *X509_alias_get0(X509 *x, int *len); |
||
834 | unsigned char *X509_keyid_get0(X509 *x, int *len); |
||
835 | int (*X509_TRUST_set_default(int (*trust) (int, X509 *, int))) (int, X509 *, |
||
836 | int);
|
||
837 | int X509_TRUST_set(int *t, int trust); |
||
838 | int X509_add1_trust_object(X509 *x, ASN1_OBJECT *obj);
|
||
839 | int X509_add1_reject_object(X509 *x, ASN1_OBJECT *obj);
|
||
840 | void X509_trust_clear(X509 *x);
|
||
841 | void X509_reject_clear(X509 *x);
|
||
842 | |||
843 | DECLARE_ASN1_FUNCTIONS(X509_REVOKED) |
||
844 | DECLARE_ASN1_FUNCTIONS(X509_CRL_INFO) |
||
845 | DECLARE_ASN1_FUNCTIONS(X509_CRL) |
||
846 | |||
847 | int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev);
|
||
848 | int X509_CRL_get0_by_serial(X509_CRL *crl,
|
||
849 | X509_REVOKED **ret, ASN1_INTEGER *serial); |
||
850 | int X509_CRL_get0_by_cert(X509_CRL *crl, X509_REVOKED **ret, X509 *x);
|
||
851 | |||
852 | X509_PKEY *X509_PKEY_new(void);
|
||
853 | void X509_PKEY_free(X509_PKEY *a);
|
||
854 | int i2d_X509_PKEY(X509_PKEY *a, unsigned char **pp); |
||
855 | X509_PKEY *d2i_X509_PKEY(X509_PKEY **a, const unsigned char **pp, |
||
856 | long length);
|
||
857 | |||
858 | DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKI) |
||
859 | DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKAC) |
||
860 | DECLARE_ASN1_FUNCTIONS(NETSCAPE_CERT_SEQUENCE) |
||
861 | |||
862 | # ifndef OPENSSL_NO_EVP
|
||
863 | X509_INFO *X509_INFO_new(void);
|
||
864 | void X509_INFO_free(X509_INFO *a);
|
||
865 | char *X509_NAME_oneline(X509_NAME *a, char *buf, int size); |
||
866 | |||
867 | int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *algor1,
|
||
868 | ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey);
|
||
869 | |||
870 | int ASN1_digest(i2d_of_void *i2d, const EVP_MD *type, char *data, |
||
871 | unsigned char *md, unsigned int *len); |
||
872 | |||
873 | int ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1,
|
||
874 | X509_ALGOR *algor2, ASN1_BIT_STRING *signature, |
||
875 | char *data, EVP_PKEY *pkey, const EVP_MD *type); |
||
876 | |||
877 | int ASN1_item_digest(const ASN1_ITEM *it, const EVP_MD *type, void *data, |
||
878 | unsigned char *md, unsigned int *len); |
||
879 | |||
880 | int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *algor1, |
||
881 | ASN1_BIT_STRING *signature, void *data, EVP_PKEY *pkey);
|
||
882 | |||
883 | int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, |
||
884 | X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *data,
|
||
885 | EVP_PKEY *pkey, const EVP_MD *type);
|
||
886 | int ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, |
||
887 | X509_ALGOR *algor2, ASN1_BIT_STRING *signature, |
||
888 | void *asn, EVP_MD_CTX *ctx);
|
||
889 | # endif
|
||
890 | |||
891 | int X509_set_version(X509 *x, long version); |
||
892 | int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial);
|
||
893 | ASN1_INTEGER *X509_get_serialNumber(X509 *x); |
||
894 | int X509_set_issuer_name(X509 *x, X509_NAME *name);
|
||
895 | X509_NAME *X509_get_issuer_name(X509 *a); |
||
896 | int X509_set_subject_name(X509 *x, X509_NAME *name);
|
||
897 | X509_NAME *X509_get_subject_name(X509 *a); |
||
898 | int X509_set_notBefore(X509 *x, const ASN1_TIME *tm); |
||
899 | int X509_set_notAfter(X509 *x, const ASN1_TIME *tm); |
||
900 | int X509_set_pubkey(X509 *x, EVP_PKEY *pkey);
|
||
901 | EVP_PKEY *X509_get_pubkey(X509 *x); |
||
902 | ASN1_BIT_STRING *X509_get0_pubkey_bitstr(const X509 *x);
|
||
903 | int X509_certificate_type(X509 *x, EVP_PKEY *pubkey /* optional */ ); |
||
904 | |||
905 | int X509_REQ_set_version(X509_REQ *x, long version); |
||
906 | int X509_REQ_set_subject_name(X509_REQ *req, X509_NAME *name);
|
||
907 | int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey);
|
||
908 | EVP_PKEY *X509_REQ_get_pubkey(X509_REQ *req); |
||
909 | int X509_REQ_extension_nid(int nid); |
||
910 | int *X509_REQ_get_extension_nids(void); |
||
911 | void X509_REQ_set_extension_nids(int *nids); |
||
912 | STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); |
||
913 | int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts,
|
||
914 | int nid);
|
||
915 | int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts);
|
||
916 | int X509_REQ_get_attr_count(const X509_REQ *req); |
||
917 | int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, int lastpos); |
||
918 | int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj, |
||
919 | int lastpos);
|
||
920 | X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc); |
||
921 | X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc);
|
||
922 | int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr);
|
||
923 | int X509_REQ_add1_attr_by_OBJ(X509_REQ *req,
|
||
924 | const ASN1_OBJECT *obj, int type, |
||
925 | const unsigned char *bytes, int len); |
||
926 | int X509_REQ_add1_attr_by_NID(X509_REQ *req,
|
||
927 | int nid, int type, |
||
928 | const unsigned char *bytes, int len); |
||
929 | int X509_REQ_add1_attr_by_txt(X509_REQ *req,
|
||
930 | const char *attrname, int type, |
||
931 | const unsigned char *bytes, int len); |
||
932 | |||
933 | int X509_CRL_set_version(X509_CRL *x, long version); |
||
934 | int X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name);
|
||
935 | int X509_CRL_set_lastUpdate(X509_CRL *x, const ASN1_TIME *tm); |
||
936 | int X509_CRL_set_nextUpdate(X509_CRL *x, const ASN1_TIME *tm); |
||
937 | int X509_CRL_sort(X509_CRL *crl);
|
||
938 | |||
939 | int X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial);
|
||
940 | int X509_REVOKED_set_revocationDate(X509_REVOKED *r, ASN1_TIME *tm);
|
||
941 | |||
942 | int X509_REQ_check_private_key(X509_REQ *x509, EVP_PKEY *pkey);
|
||
943 | |||
944 | int X509_check_private_key(X509 *x509, EVP_PKEY *pkey);
|
||
945 | |||
946 | int X509_issuer_and_serial_cmp(const X509 *a, const X509 *b); |
||
947 | unsigned long X509_issuer_and_serial_hash(X509 *a); |
||
948 | |||
949 | int X509_issuer_name_cmp(const X509 *a, const X509 *b); |
||
950 | unsigned long X509_issuer_name_hash(X509 *a); |
||
951 | |||
952 | int X509_subject_name_cmp(const X509 *a, const X509 *b); |
||
953 | unsigned long X509_subject_name_hash(X509 *x); |
||
954 | |||
955 | # ifndef OPENSSL_NO_MD5
|
||
956 | unsigned long X509_issuer_name_hash_old(X509 *a); |
||
957 | unsigned long X509_subject_name_hash_old(X509 *x); |
||
958 | # endif
|
||
959 | |||
960 | int X509_cmp(const X509 *a, const X509 *b); |
||
961 | int X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b); |
||
962 | unsigned long X509_NAME_hash(X509_NAME *x); |
||
963 | unsigned long X509_NAME_hash_old(X509_NAME *x); |
||
964 | |||
965 | int X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b); |
||
966 | int X509_CRL_match(const X509_CRL *a, const X509_CRL *b); |
||
967 | # ifndef OPENSSL_NO_FP_API
|
||
968 | int X509_print_ex_fp(FILE *bp, X509 *x, unsigned long nmflag, |
||
969 | unsigned long cflag); |
||
970 | int X509_print_fp(FILE *bp, X509 *x);
|
||
971 | int X509_CRL_print_fp(FILE *bp, X509_CRL *x);
|
||
972 | int X509_REQ_print_fp(FILE *bp, X509_REQ *req);
|
||
973 | int X509_NAME_print_ex_fp(FILE *fp, X509_NAME *nm, int indent, |
||
974 | unsigned long flags); |
||
975 | # endif
|
||
976 | |||
977 | # ifndef OPENSSL_NO_BIO
|
||
978 | int X509_NAME_print(BIO *bp, X509_NAME *name, int obase); |
||
979 | int X509_NAME_print_ex(BIO *out, X509_NAME *nm, int indent, |
||
980 | unsigned long flags); |
||
981 | int X509_print_ex(BIO *bp, X509 *x, unsigned long nmflag, |
||
982 | unsigned long cflag); |
||
983 | int X509_print(BIO *bp, X509 *x);
|
||
984 | int X509_ocspid_print(BIO *bp, X509 *x);
|
||
985 | int X509_CERT_AUX_print(BIO *bp, X509_CERT_AUX *x, int indent); |
||
986 | int X509_CRL_print(BIO *bp, X509_CRL *x);
|
||
987 | int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflag, |
||
988 | unsigned long cflag); |
||
989 | int X509_REQ_print(BIO *bp, X509_REQ *req);
|
||
990 | # endif
|
||
991 | |||
992 | int X509_NAME_entry_count(X509_NAME *name);
|
||
993 | int X509_NAME_get_text_by_NID(X509_NAME *name, int nid, char *buf, int len); |
||
994 | int X509_NAME_get_text_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj,
|
||
995 | char *buf, int len); |
||
996 | |||
997 | /*
|
||
998 | * NOTE: you should be passsing -1, not 0 as lastpos. The functions that use
|
||
999 | * lastpos, search after that position on.
|
||
1000 | */
|
||
1001 | int X509_NAME_get_index_by_NID(X509_NAME *name, int nid, int lastpos); |
||
1002 | int X509_NAME_get_index_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj,
|
||
1003 | int lastpos);
|
||
1004 | X509_NAME_ENTRY *X509_NAME_get_entry(X509_NAME *name, int loc);
|
||
1005 | X509_NAME_ENTRY *X509_NAME_delete_entry(X509_NAME *name, int loc);
|
||
1006 | int X509_NAME_add_entry(X509_NAME *name, X509_NAME_ENTRY *ne,
|
||
1007 | int loc, int set); |
||
1008 | int X509_NAME_add_entry_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, int type, |
||
1009 | unsigned char *bytes, int len, int loc, |
||
1010 | int set);
|
||
1011 | int X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, |
||
1012 | unsigned char *bytes, int len, int loc, |
||
1013 | int set);
|
||
1014 | X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, |
||
1015 | const char *field, int type, |
||
1016 | const unsigned char *bytes, |
||
1017 | int len);
|
||
1018 | X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid,
|
||
1019 | int type, unsigned char *bytes, |
||
1020 | int len);
|
||
1021 | int X509_NAME_add_entry_by_txt(X509_NAME *name, const char *field, int type, |
||
1022 | const unsigned char *bytes, int len, int loc, |
||
1023 | int set);
|
||
1024 | X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, |
||
1025 | ASN1_OBJECT *obj, int type,
|
||
1026 | const unsigned char *bytes, |
||
1027 | int len);
|
||
1028 | int X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, ASN1_OBJECT *obj);
|
||
1029 | int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, |
||
1030 | const unsigned char *bytes, int len); |
||
1031 | ASN1_OBJECT *X509_NAME_ENTRY_get_object(X509_NAME_ENTRY *ne); |
||
1032 | ASN1_STRING *X509_NAME_ENTRY_get_data(X509_NAME_ENTRY *ne); |
||
1033 | |||
1034 | int X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x); |
||
1035 | int X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, |
||
1036 | int nid, int lastpos); |
||
1037 | int X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *x, |
||
1038 | ASN1_OBJECT *obj, int lastpos);
|
||
1039 | int X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *x, |
||
1040 | int crit, int lastpos); |
||
1041 | X509_EXTENSION *X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc); |
||
1042 | X509_EXTENSION *X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc);
|
||
1043 | STACK_OF(X509_EXTENSION) *X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, |
||
1044 | X509_EXTENSION *ex, int loc);
|
||
1045 | |||
1046 | int X509_get_ext_count(X509 *x);
|
||
1047 | int X509_get_ext_by_NID(X509 *x, int nid, int lastpos); |
||
1048 | int X509_get_ext_by_OBJ(X509 *x, ASN1_OBJECT *obj, int lastpos); |
||
1049 | int X509_get_ext_by_critical(X509 *x, int crit, int lastpos); |
||
1050 | X509_EXTENSION *X509_get_ext(X509 *x, int loc);
|
||
1051 | X509_EXTENSION *X509_delete_ext(X509 *x, int loc);
|
||
1052 | int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc); |
||
1053 | void *X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx); |
||
1054 | int X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, |
||
1055 | unsigned long flags); |
||
1056 | |||
1057 | int X509_CRL_get_ext_count(X509_CRL *x);
|
||
1058 | int X509_CRL_get_ext_by_NID(X509_CRL *x, int nid, int lastpos); |
||
1059 | int X509_CRL_get_ext_by_OBJ(X509_CRL *x, ASN1_OBJECT *obj, int lastpos); |
||
1060 | int X509_CRL_get_ext_by_critical(X509_CRL *x, int crit, int lastpos); |
||
1061 | X509_EXTENSION *X509_CRL_get_ext(X509_CRL *x, int loc);
|
||
1062 | X509_EXTENSION *X509_CRL_delete_ext(X509_CRL *x, int loc);
|
||
1063 | int X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc); |
||
1064 | void *X509_CRL_get_ext_d2i(X509_CRL *x, int nid, int *crit, int *idx); |
||
1065 | int X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, |
||
1066 | unsigned long flags); |
||
1067 | |||
1068 | int X509_REVOKED_get_ext_count(X509_REVOKED *x);
|
||
1069 | int X509_REVOKED_get_ext_by_NID(X509_REVOKED *x, int nid, int lastpos); |
||
1070 | int X509_REVOKED_get_ext_by_OBJ(X509_REVOKED *x, ASN1_OBJECT *obj,
|
||
1071 | int lastpos);
|
||
1072 | int X509_REVOKED_get_ext_by_critical(X509_REVOKED *x, int crit, int lastpos); |
||
1073 | X509_EXTENSION *X509_REVOKED_get_ext(X509_REVOKED *x, int loc);
|
||
1074 | X509_EXTENSION *X509_REVOKED_delete_ext(X509_REVOKED *x, int loc);
|
||
1075 | int X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc); |
||
1076 | void *X509_REVOKED_get_ext_d2i(X509_REVOKED *x, int nid, int *crit, int *idx); |
||
1077 | int X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, |
||
1078 | unsigned long flags); |
||
1079 | |||
1080 | X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, |
||
1081 | int nid, int crit, |
||
1082 | ASN1_OCTET_STRING *data); |
||
1083 | X509_EXTENSION *X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, |
||
1084 | ASN1_OBJECT *obj, int crit,
|
||
1085 | ASN1_OCTET_STRING *data); |
||
1086 | int X509_EXTENSION_set_object(X509_EXTENSION *ex, ASN1_OBJECT *obj);
|
||
1087 | int X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit); |
||
1088 | int X509_EXTENSION_set_data(X509_EXTENSION *ex, ASN1_OCTET_STRING *data);
|
||
1089 | ASN1_OBJECT *X509_EXTENSION_get_object(X509_EXTENSION *ex); |
||
1090 | ASN1_OCTET_STRING *X509_EXTENSION_get_data(X509_EXTENSION *ne); |
||
1091 | int X509_EXTENSION_get_critical(X509_EXTENSION *ex);
|
||
1092 | |||
1093 | int X509at_get_attr_count(const STACK_OF(X509_ATTRIBUTE) *x); |
||
1094 | int X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, |
||
1095 | int lastpos);
|
||
1096 | int X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, |
||
1097 | ASN1_OBJECT *obj, int lastpos);
|
||
1098 | X509_ATTRIBUTE *X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc); |
||
1099 | X509_ATTRIBUTE *X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc);
|
||
1100 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, |
||
1101 | X509_ATTRIBUTE *attr); |
||
1102 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) |
||
1103 | **x, const ASN1_OBJECT *obj,
|
||
1104 | int type,
|
||
1105 | const unsigned char *bytes, |
||
1106 | int len);
|
||
1107 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) |
||
1108 | **x, int nid, int type, |
||
1109 | const unsigned char *bytes, |
||
1110 | int len);
|
||
1111 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) |
||
1112 | **x, const char *attrname, |
||
1113 | int type,
|
||
1114 | const unsigned char *bytes, |
||
1115 | int len);
|
||
1116 | void *X509at_get0_data_by_OBJ(STACK_OF(X509_ATTRIBUTE) *x, ASN1_OBJECT *obj,
|
||
1117 | int lastpos, int type); |
||
1118 | X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid,
|
||
1119 | int atrtype, const void *data, |
||
1120 | int len);
|
||
1121 | X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, |
||
1122 | const ASN1_OBJECT *obj,
|
||
1123 | int atrtype, const void *data, |
||
1124 | int len);
|
||
1125 | X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, |
||
1126 | const char *atrname, int type, |
||
1127 | const unsigned char *bytes, |
||
1128 | int len);
|
||
1129 | int X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj); |
||
1130 | int X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, |
||
1131 | const void *data, int len); |
||
1132 | void *X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, int atrtype, |
||
1133 | void *data);
|
||
1134 | int X509_ATTRIBUTE_count(X509_ATTRIBUTE *attr);
|
||
1135 | ASN1_OBJECT *X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr); |
||
1136 | ASN1_TYPE *X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx);
|
||
1137 | |||
1138 | int EVP_PKEY_get_attr_count(const EVP_PKEY *key); |
||
1139 | int EVP_PKEY_get_attr_by_NID(const EVP_PKEY *key, int nid, int lastpos); |
||
1140 | int EVP_PKEY_get_attr_by_OBJ(const EVP_PKEY *key, ASN1_OBJECT *obj, |
||
1141 | int lastpos);
|
||
1142 | X509_ATTRIBUTE *EVP_PKEY_get_attr(const EVP_PKEY *key, int loc); |
||
1143 | X509_ATTRIBUTE *EVP_PKEY_delete_attr(EVP_PKEY *key, int loc);
|
||
1144 | int EVP_PKEY_add1_attr(EVP_PKEY *key, X509_ATTRIBUTE *attr);
|
||
1145 | int EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY *key,
|
||
1146 | const ASN1_OBJECT *obj, int type, |
||
1147 | const unsigned char *bytes, int len); |
||
1148 | int EVP_PKEY_add1_attr_by_NID(EVP_PKEY *key,
|
||
1149 | int nid, int type, |
||
1150 | const unsigned char *bytes, int len); |
||
1151 | int EVP_PKEY_add1_attr_by_txt(EVP_PKEY *key,
|
||
1152 | const char *attrname, int type, |
||
1153 | const unsigned char *bytes, int len); |
||
1154 | |||
1155 | int X509_verify_cert(X509_STORE_CTX *ctx);
|
||
1156 | |||
1157 | /* lookup a cert from a X509 STACK */
|
||
1158 | X509 *X509_find_by_issuer_and_serial(STACK_OF(X509) *sk, X509_NAME *name, |
||
1159 | ASN1_INTEGER *serial); |
||
1160 | X509 *X509_find_by_subject(STACK_OF(X509) *sk, X509_NAME *name); |
||
1161 | |||
1162 | DECLARE_ASN1_FUNCTIONS(PBEPARAM) |
||
1163 | DECLARE_ASN1_FUNCTIONS(PBE2PARAM) |
||
1164 | DECLARE_ASN1_FUNCTIONS(PBKDF2PARAM) |
||
1165 | |||
1166 | int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, |
||
1167 | const unsigned char *salt, int saltlen); |
||
1168 | |||
1169 | X509_ALGOR *PKCS5_pbe_set(int alg, int iter, |
||
1170 | const unsigned char *salt, int saltlen); |
||
1171 | X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, |
||
1172 | unsigned char *salt, int saltlen); |
||
1173 | X509_ALGOR *PKCS5_pbe2_set_iv(const EVP_CIPHER *cipher, int iter, |
||
1174 | unsigned char *salt, int saltlen, |
||
1175 | unsigned char *aiv, int prf_nid); |
||
1176 | |||
1177 | X509_ALGOR *PKCS5_pbkdf2_set(int iter, unsigned char *salt, int saltlen, |
||
1178 | int prf_nid, int keylen); |
||
1179 | |||
1180 | /* PKCS#8 utilities */
|
||
1181 | |||
1182 | DECLARE_ASN1_FUNCTIONS(PKCS8_PRIV_KEY_INFO) |
||
1183 | |||
1184 | EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8); |
||
1185 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey); |
||
1186 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken);
|
||
1187 | PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken);
|
||
1188 | |||
1189 | int PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO *priv, ASN1_OBJECT *aobj,
|
||
1190 | int version, int ptype, void *pval, |
||
1191 | unsigned char *penc, int penclen); |
||
1192 | int PKCS8_pkey_get0(ASN1_OBJECT **ppkalg,
|
||
1193 | const unsigned char **pk, int *ppklen, |
||
1194 | X509_ALGOR **pa, PKCS8_PRIV_KEY_INFO *p8); |
||
1195 | |||
1196 | int X509_PUBKEY_set0_param(X509_PUBKEY *pub, ASN1_OBJECT *aobj,
|
||
1197 | int ptype, void *pval, |
||
1198 | unsigned char *penc, int penclen); |
||
1199 | int X509_PUBKEY_get0_param(ASN1_OBJECT **ppkalg,
|
||
1200 | const unsigned char **pk, int *ppklen, |
||
1201 | X509_ALGOR **pa, X509_PUBKEY *pub); |
||
1202 | |||
1203 | int X509_check_trust(X509 *x, int id, int flags); |
||
1204 | int X509_TRUST_get_count(void); |
||
1205 | X509_TRUST *X509_TRUST_get0(int idx);
|
||
1206 | int X509_TRUST_get_by_id(int id); |
||
1207 | int X509_TRUST_add(int id, int flags, int (*ck) (X509_TRUST *, X509 *, int), |
||
1208 | char *name, int arg1, void *arg2); |
||
1209 | void X509_TRUST_cleanup(void); |
||
1210 | int X509_TRUST_get_flags(X509_TRUST *xp);
|
||
1211 | char *X509_TRUST_get0_name(X509_TRUST *xp);
|
||
1212 | int X509_TRUST_get_trust(X509_TRUST *xp);
|
||
1213 | |||
1214 | /* BEGIN ERROR CODES */
|
||
1215 | /*
|
||
1216 | * The following lines are auto generated by the script mkerr.pl. Any changes
|
||
1217 | * made after this point may be overwritten when the script is next run.
|
||
1218 | */
|
||
1219 | void ERR_load_X509_strings(void); |
||
1220 | |||
1221 | /* Error codes for the X509 functions. */
|
||
1222 | |||
1223 | /* Function codes. */
|
||
1224 | # define X509_F_ADD_CERT_DIR 100 |
||
1225 | # define X509_F_BY_FILE_CTRL 101 |
||
1226 | # define X509_F_CHECK_POLICY 145 |
||
1227 | # define X509_F_DIR_CTRL 102 |
||
1228 | # define X509_F_GET_CERT_BY_SUBJECT 103 |
||
1229 | # define X509_F_NETSCAPE_SPKI_B64_DECODE 129 |
||
1230 | # define X509_F_NETSCAPE_SPKI_B64_ENCODE 130 |
||
1231 | # define X509_F_X509AT_ADD1_ATTR 135 |
||
1232 | # define X509_F_X509V3_ADD_EXT 104 |
||
1233 | # define X509_F_X509_ATTRIBUTE_CREATE_BY_NID 136 |
||
1234 | # define X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ 137 |
||
1235 | # define X509_F_X509_ATTRIBUTE_CREATE_BY_TXT 140 |
||
1236 | # define X509_F_X509_ATTRIBUTE_GET0_DATA 139 |
||
1237 | # define X509_F_X509_ATTRIBUTE_SET1_DATA 138 |
||
1238 | # define X509_F_X509_CHECK_PRIVATE_KEY 128 |
||
1239 | # define X509_F_X509_CRL_PRINT_FP 147 |
||
1240 | # define X509_F_X509_EXTENSION_CREATE_BY_NID 108 |
||
1241 | # define X509_F_X509_EXTENSION_CREATE_BY_OBJ 109 |
||
1242 | # define X509_F_X509_GET_PUBKEY_PARAMETERS 110 |
||
1243 | # define X509_F_X509_LOAD_CERT_CRL_FILE 132 |
||
1244 | # define X509_F_X509_LOAD_CERT_FILE 111 |
||
1245 | # define X509_F_X509_LOAD_CRL_FILE 112 |
||
1246 | # define X509_F_X509_NAME_ADD_ENTRY 113 |
||
1247 | # define X509_F_X509_NAME_ENTRY_CREATE_BY_NID 114 |
||
1248 | # define X509_F_X509_NAME_ENTRY_CREATE_BY_TXT 131 |
||
1249 | # define X509_F_X509_NAME_ENTRY_SET_OBJECT 115 |
||
1250 | # define X509_F_X509_NAME_ONELINE 116 |
||
1251 | # define X509_F_X509_NAME_PRINT 117 |
||
1252 | # define X509_F_X509_PRINT_EX_FP 118 |
||
1253 | # define X509_F_X509_PUBKEY_GET 119 |
||
1254 | # define X509_F_X509_PUBKEY_SET 120 |
||
1255 | # define X509_F_X509_REQ_CHECK_PRIVATE_KEY 144 |
||
1256 | # define X509_F_X509_REQ_PRINT_EX 121 |
||
1257 | # define X509_F_X509_REQ_PRINT_FP 122 |
||
1258 | # define X509_F_X509_REQ_TO_X509 123 |
||
1259 | # define X509_F_X509_STORE_ADD_CERT 124 |
||
1260 | # define X509_F_X509_STORE_ADD_CRL 125 |
||
1261 | # define X509_F_X509_STORE_CTX_GET1_ISSUER 146 |
||
1262 | # define X509_F_X509_STORE_CTX_INIT 143 |
||
1263 | # define X509_F_X509_STORE_CTX_NEW 142 |
||
1264 | # define X509_F_X509_STORE_CTX_PURPOSE_INHERIT 134 |
||
1265 | # define X509_F_X509_TO_X509_REQ 126 |
||
1266 | # define X509_F_X509_TRUST_ADD 133 |
||
1267 | # define X509_F_X509_TRUST_SET 141 |
||
1268 | # define X509_F_X509_VERIFY_CERT 127 |
||
1269 | |||
1270 | /* Reason codes. */
|
||
1271 | # define X509_R_BAD_X509_FILETYPE 100 |
||
1272 | # define X509_R_BASE64_DECODE_ERROR 118 |
||
1273 | # define X509_R_CANT_CHECK_DH_KEY 114 |
||
1274 | # define X509_R_CERT_ALREADY_IN_HASH_TABLE 101 |
||
1275 | # define X509_R_ERR_ASN1_LIB 102 |
||
1276 | # define X509_R_INVALID_DIRECTORY 113 |
||
1277 | # define X509_R_INVALID_FIELD_NAME 119 |
||
1278 | # define X509_R_INVALID_TRUST 123 |
||
1279 | # define X509_R_KEY_TYPE_MISMATCH 115 |
||
1280 | # define X509_R_KEY_VALUES_MISMATCH 116 |
||
1281 | # define X509_R_LOADING_CERT_DIR 103 |
||
1282 | # define X509_R_LOADING_DEFAULTS 104 |
||
1283 | # define X509_R_METHOD_NOT_SUPPORTED 124 |
||
1284 | # define X509_R_NO_CERT_SET_FOR_US_TO_VERIFY 105 |
||
1285 | # define X509_R_PUBLIC_KEY_DECODE_ERROR 125 |
||
1286 | # define X509_R_PUBLIC_KEY_ENCODE_ERROR 126 |
||
1287 | # define X509_R_SHOULD_RETRY 106 |
||
1288 | # define X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN 107 |
||
1289 | # define X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY 108 |
||
1290 | # define X509_R_UNKNOWN_KEY_TYPE 117 |
||
1291 | # define X509_R_UNKNOWN_NID 109 |
||
1292 | # define X509_R_UNKNOWN_PURPOSE_ID 121 |
||
1293 | # define X509_R_UNKNOWN_TRUST_ID 120 |
||
1294 | # define X509_R_UNSUPPORTED_ALGORITHM 111 |
||
1295 | # define X509_R_WRONG_LOOKUP_TYPE 112 |
||
1296 | # define X509_R_WRONG_TYPE 122 |
||
1297 | |||
1298 | #ifdef __cplusplus
|
||
1299 | } |
||
1300 | #endif
|
||
1301 | #endif |