Mercurial > repos > rliterman > csp2
comparison CSP2/CSP2_env/env-d9b9114564458d9d-741b3de822f2aaca6c6caa4325c4afce/include/openssl/x509_vfy.h @ 69:33d812a61356
planemo upload commit 2e9511a184a1ca667c7be0c6321a36dc4e3d116d
author | jpayne |
---|---|
date | Tue, 18 Mar 2025 17:55:14 -0400 |
parents | |
children |
comparison
equal
deleted
inserted
replaced
67:0e9998148a16 | 69:33d812a61356 |
---|---|
1 /* | |
2 * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. | |
3 * | |
4 * Licensed under the OpenSSL license (the "License"). You may not use | |
5 * this file except in compliance with the License. You can obtain a copy | |
6 * in the file LICENSE in the source distribution or at | |
7 * https://www.openssl.org/source/license.html | |
8 */ | |
9 | |
10 #ifndef HEADER_X509_VFY_H | |
11 # define HEADER_X509_VFY_H | |
12 | |
13 /* | |
14 * Protect against recursion, x509.h and x509_vfy.h each include the other. | |
15 */ | |
16 # ifndef HEADER_X509_H | |
17 # include <openssl/x509.h> | |
18 # endif | |
19 | |
20 # include <openssl/opensslconf.h> | |
21 # include <openssl/lhash.h> | |
22 # include <openssl/bio.h> | |
23 # include <openssl/crypto.h> | |
24 # include <openssl/symhacks.h> | |
25 | |
26 #ifdef __cplusplus | |
27 extern "C" { | |
28 #endif | |
29 | |
30 /*- | |
31 SSL_CTX -> X509_STORE | |
32 -> X509_LOOKUP | |
33 ->X509_LOOKUP_METHOD | |
34 -> X509_LOOKUP | |
35 ->X509_LOOKUP_METHOD | |
36 | |
37 SSL -> X509_STORE_CTX | |
38 ->X509_STORE | |
39 | |
40 The X509_STORE holds the tables etc for verification stuff. | |
41 A X509_STORE_CTX is used while validating a single certificate. | |
42 The X509_STORE has X509_LOOKUPs for looking up certs. | |
43 The X509_STORE then calls a function to actually verify the | |
44 certificate chain. | |
45 */ | |
46 | |
47 typedef enum { | |
48 X509_LU_NONE = 0, | |
49 X509_LU_X509, X509_LU_CRL | |
50 } X509_LOOKUP_TYPE; | |
51 | |
52 #if OPENSSL_API_COMPAT < 0x10100000L | |
53 #define X509_LU_RETRY -1 | |
54 #define X509_LU_FAIL 0 | |
55 #endif | |
56 | |
57 DEFINE_STACK_OF(X509_LOOKUP) | |
58 DEFINE_STACK_OF(X509_OBJECT) | |
59 DEFINE_STACK_OF(X509_VERIFY_PARAM) | |
60 | |
61 int X509_STORE_set_depth(X509_STORE *store, int depth); | |
62 | |
63 typedef int (*X509_STORE_CTX_verify_cb)(int, X509_STORE_CTX *); | |
64 typedef int (*X509_STORE_CTX_verify_fn)(X509_STORE_CTX *); | |
65 typedef int (*X509_STORE_CTX_get_issuer_fn)(X509 **issuer, | |
66 X509_STORE_CTX *ctx, X509 *x); | |
67 typedef int (*X509_STORE_CTX_check_issued_fn)(X509_STORE_CTX *ctx, | |
68 X509 *x, X509 *issuer); | |
69 typedef int (*X509_STORE_CTX_check_revocation_fn)(X509_STORE_CTX *ctx); | |
70 typedef int (*X509_STORE_CTX_get_crl_fn)(X509_STORE_CTX *ctx, | |
71 X509_CRL **crl, X509 *x); | |
72 typedef int (*X509_STORE_CTX_check_crl_fn)(X509_STORE_CTX *ctx, X509_CRL *crl); | |
73 typedef int (*X509_STORE_CTX_cert_crl_fn)(X509_STORE_CTX *ctx, | |
74 X509_CRL *crl, X509 *x); | |
75 typedef int (*X509_STORE_CTX_check_policy_fn)(X509_STORE_CTX *ctx); | |
76 typedef STACK_OF(X509) *(*X509_STORE_CTX_lookup_certs_fn)(X509_STORE_CTX *ctx, | |
77 X509_NAME *nm); | |
78 typedef STACK_OF(X509_CRL) *(*X509_STORE_CTX_lookup_crls_fn)(X509_STORE_CTX *ctx, | |
79 X509_NAME *nm); | |
80 typedef int (*X509_STORE_CTX_cleanup_fn)(X509_STORE_CTX *ctx); | |
81 | |
82 | |
83 void X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth); | |
84 | |
85 # define X509_STORE_CTX_set_app_data(ctx,data) \ | |
86 X509_STORE_CTX_set_ex_data(ctx,0,data) | |
87 # define X509_STORE_CTX_get_app_data(ctx) \ | |
88 X509_STORE_CTX_get_ex_data(ctx,0) | |
89 | |
90 # define X509_L_FILE_LOAD 1 | |
91 # define X509_L_ADD_DIR 2 | |
92 | |
93 # define X509_LOOKUP_load_file(x,name,type) \ | |
94 X509_LOOKUP_ctrl((x),X509_L_FILE_LOAD,(name),(long)(type),NULL) | |
95 | |
96 # define X509_LOOKUP_add_dir(x,name,type) \ | |
97 X509_LOOKUP_ctrl((x),X509_L_ADD_DIR,(name),(long)(type),NULL) | |
98 | |
99 # define X509_V_OK 0 | |
100 # define X509_V_ERR_UNSPECIFIED 1 | |
101 # define X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT 2 | |
102 # define X509_V_ERR_UNABLE_TO_GET_CRL 3 | |
103 # define X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE 4 | |
104 # define X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE 5 | |
105 # define X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY 6 | |
106 # define X509_V_ERR_CERT_SIGNATURE_FAILURE 7 | |
107 # define X509_V_ERR_CRL_SIGNATURE_FAILURE 8 | |
108 # define X509_V_ERR_CERT_NOT_YET_VALID 9 | |
109 # define X509_V_ERR_CERT_HAS_EXPIRED 10 | |
110 # define X509_V_ERR_CRL_NOT_YET_VALID 11 | |
111 # define X509_V_ERR_CRL_HAS_EXPIRED 12 | |
112 # define X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD 13 | |
113 # define X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD 14 | |
114 # define X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD 15 | |
115 # define X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD 16 | |
116 # define X509_V_ERR_OUT_OF_MEM 17 | |
117 # define X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT 18 | |
118 # define X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN 19 | |
119 # define X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY 20 | |
120 # define X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE 21 | |
121 # define X509_V_ERR_CERT_CHAIN_TOO_LONG 22 | |
122 # define X509_V_ERR_CERT_REVOKED 23 | |
123 # define X509_V_ERR_INVALID_CA 24 | |
124 # define X509_V_ERR_PATH_LENGTH_EXCEEDED 25 | |
125 # define X509_V_ERR_INVALID_PURPOSE 26 | |
126 # define X509_V_ERR_CERT_UNTRUSTED 27 | |
127 # define X509_V_ERR_CERT_REJECTED 28 | |
128 /* These are 'informational' when looking for issuer cert */ | |
129 # define X509_V_ERR_SUBJECT_ISSUER_MISMATCH 29 | |
130 # define X509_V_ERR_AKID_SKID_MISMATCH 30 | |
131 # define X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH 31 | |
132 # define X509_V_ERR_KEYUSAGE_NO_CERTSIGN 32 | |
133 # define X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER 33 | |
134 # define X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION 34 | |
135 # define X509_V_ERR_KEYUSAGE_NO_CRL_SIGN 35 | |
136 # define X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION 36 | |
137 # define X509_V_ERR_INVALID_NON_CA 37 | |
138 # define X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED 38 | |
139 # define X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE 39 | |
140 # define X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED 40 | |
141 # define X509_V_ERR_INVALID_EXTENSION 41 | |
142 # define X509_V_ERR_INVALID_POLICY_EXTENSION 42 | |
143 # define X509_V_ERR_NO_EXPLICIT_POLICY 43 | |
144 # define X509_V_ERR_DIFFERENT_CRL_SCOPE 44 | |
145 # define X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE 45 | |
146 # define X509_V_ERR_UNNESTED_RESOURCE 46 | |
147 # define X509_V_ERR_PERMITTED_VIOLATION 47 | |
148 # define X509_V_ERR_EXCLUDED_VIOLATION 48 | |
149 # define X509_V_ERR_SUBTREE_MINMAX 49 | |
150 /* The application is not happy */ | |
151 # define X509_V_ERR_APPLICATION_VERIFICATION 50 | |
152 # define X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE 51 | |
153 # define X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX 52 | |
154 # define X509_V_ERR_UNSUPPORTED_NAME_SYNTAX 53 | |
155 # define X509_V_ERR_CRL_PATH_VALIDATION_ERROR 54 | |
156 /* Another issuer check debug option */ | |
157 # define X509_V_ERR_PATH_LOOP 55 | |
158 /* Suite B mode algorithm violation */ | |
159 # define X509_V_ERR_SUITE_B_INVALID_VERSION 56 | |
160 # define X509_V_ERR_SUITE_B_INVALID_ALGORITHM 57 | |
161 # define X509_V_ERR_SUITE_B_INVALID_CURVE 58 | |
162 # define X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM 59 | |
163 # define X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED 60 | |
164 # define X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 61 | |
165 /* Host, email and IP check errors */ | |
166 # define X509_V_ERR_HOSTNAME_MISMATCH 62 | |
167 # define X509_V_ERR_EMAIL_MISMATCH 63 | |
168 # define X509_V_ERR_IP_ADDRESS_MISMATCH 64 | |
169 /* DANE TLSA errors */ | |
170 # define X509_V_ERR_DANE_NO_MATCH 65 | |
171 /* security level errors */ | |
172 # define X509_V_ERR_EE_KEY_TOO_SMALL 66 | |
173 # define X509_V_ERR_CA_KEY_TOO_SMALL 67 | |
174 # define X509_V_ERR_CA_MD_TOO_WEAK 68 | |
175 /* Caller error */ | |
176 # define X509_V_ERR_INVALID_CALL 69 | |
177 /* Issuer lookup error */ | |
178 # define X509_V_ERR_STORE_LOOKUP 70 | |
179 /* Certificate transparency */ | |
180 # define X509_V_ERR_NO_VALID_SCTS 71 | |
181 | |
182 # define X509_V_ERR_PROXY_SUBJECT_NAME_VIOLATION 72 | |
183 /* OCSP status errors */ | |
184 # define X509_V_ERR_OCSP_VERIFY_NEEDED 73 /* Need OCSP verification */ | |
185 # define X509_V_ERR_OCSP_VERIFY_FAILED 74 /* Couldn't verify cert through OCSP */ | |
186 # define X509_V_ERR_OCSP_CERT_UNKNOWN 75 /* Certificate wasn't recognized by the OCSP responder */ | |
187 # define X509_V_ERR_SIGNATURE_ALGORITHM_MISMATCH 76 | |
188 # define X509_V_ERR_NO_ISSUER_PUBLIC_KEY 77 | |
189 # define X509_V_ERR_UNSUPPORTED_SIGNATURE_ALGORITHM 78 | |
190 # define X509_V_ERR_EC_KEY_EXPLICIT_PARAMS 79 | |
191 | |
192 /* Certificate verify flags */ | |
193 | |
194 # if OPENSSL_API_COMPAT < 0x10100000L | |
195 # define X509_V_FLAG_CB_ISSUER_CHECK 0x0 /* Deprecated */ | |
196 # endif | |
197 /* Use check time instead of current time */ | |
198 # define X509_V_FLAG_USE_CHECK_TIME 0x2 | |
199 /* Lookup CRLs */ | |
200 # define X509_V_FLAG_CRL_CHECK 0x4 | |
201 /* Lookup CRLs for whole chain */ | |
202 # define X509_V_FLAG_CRL_CHECK_ALL 0x8 | |
203 /* Ignore unhandled critical extensions */ | |
204 # define X509_V_FLAG_IGNORE_CRITICAL 0x10 | |
205 /* Disable workarounds for broken certificates */ | |
206 # define X509_V_FLAG_X509_STRICT 0x20 | |
207 /* Enable proxy certificate validation */ | |
208 # define X509_V_FLAG_ALLOW_PROXY_CERTS 0x40 | |
209 /* Enable policy checking */ | |
210 # define X509_V_FLAG_POLICY_CHECK 0x80 | |
211 /* Policy variable require-explicit-policy */ | |
212 # define X509_V_FLAG_EXPLICIT_POLICY 0x100 | |
213 /* Policy variable inhibit-any-policy */ | |
214 # define X509_V_FLAG_INHIBIT_ANY 0x200 | |
215 /* Policy variable inhibit-policy-mapping */ | |
216 # define X509_V_FLAG_INHIBIT_MAP 0x400 | |
217 /* Notify callback that policy is OK */ | |
218 # define X509_V_FLAG_NOTIFY_POLICY 0x800 | |
219 /* Extended CRL features such as indirect CRLs, alternate CRL signing keys */ | |
220 # define X509_V_FLAG_EXTENDED_CRL_SUPPORT 0x1000 | |
221 /* Delta CRL support */ | |
222 # define X509_V_FLAG_USE_DELTAS 0x2000 | |
223 /* Check self-signed CA signature */ | |
224 # define X509_V_FLAG_CHECK_SS_SIGNATURE 0x4000 | |
225 /* Use trusted store first */ | |
226 # define X509_V_FLAG_TRUSTED_FIRST 0x8000 | |
227 /* Suite B 128 bit only mode: not normally used */ | |
228 # define X509_V_FLAG_SUITEB_128_LOS_ONLY 0x10000 | |
229 /* Suite B 192 bit only mode */ | |
230 # define X509_V_FLAG_SUITEB_192_LOS 0x20000 | |
231 /* Suite B 128 bit mode allowing 192 bit algorithms */ | |
232 # define X509_V_FLAG_SUITEB_128_LOS 0x30000 | |
233 /* Allow partial chains if at least one certificate is in trusted store */ | |
234 # define X509_V_FLAG_PARTIAL_CHAIN 0x80000 | |
235 /* | |
236 * If the initial chain is not trusted, do not attempt to build an alternative | |
237 * chain. Alternate chain checking was introduced in 1.1.0. Setting this flag | |
238 * will force the behaviour to match that of previous versions. | |
239 */ | |
240 # define X509_V_FLAG_NO_ALT_CHAINS 0x100000 | |
241 /* Do not check certificate/CRL validity against current time */ | |
242 # define X509_V_FLAG_NO_CHECK_TIME 0x200000 | |
243 | |
244 # define X509_VP_FLAG_DEFAULT 0x1 | |
245 # define X509_VP_FLAG_OVERWRITE 0x2 | |
246 # define X509_VP_FLAG_RESET_FLAGS 0x4 | |
247 # define X509_VP_FLAG_LOCKED 0x8 | |
248 # define X509_VP_FLAG_ONCE 0x10 | |
249 | |
250 /* Internal use: mask of policy related options */ | |
251 # define X509_V_FLAG_POLICY_MASK (X509_V_FLAG_POLICY_CHECK \ | |
252 | X509_V_FLAG_EXPLICIT_POLICY \ | |
253 | X509_V_FLAG_INHIBIT_ANY \ | |
254 | X509_V_FLAG_INHIBIT_MAP) | |
255 | |
256 int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, X509_LOOKUP_TYPE type, | |
257 X509_NAME *name); | |
258 X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h, | |
259 X509_LOOKUP_TYPE type, | |
260 X509_NAME *name); | |
261 X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h, | |
262 X509_OBJECT *x); | |
263 int X509_OBJECT_up_ref_count(X509_OBJECT *a); | |
264 X509_OBJECT *X509_OBJECT_new(void); | |
265 void X509_OBJECT_free(X509_OBJECT *a); | |
266 X509_LOOKUP_TYPE X509_OBJECT_get_type(const X509_OBJECT *a); | |
267 X509 *X509_OBJECT_get0_X509(const X509_OBJECT *a); | |
268 int X509_OBJECT_set1_X509(X509_OBJECT *a, X509 *obj); | |
269 X509_CRL *X509_OBJECT_get0_X509_CRL(X509_OBJECT *a); | |
270 int X509_OBJECT_set1_X509_CRL(X509_OBJECT *a, X509_CRL *obj); | |
271 X509_STORE *X509_STORE_new(void); | |
272 void X509_STORE_free(X509_STORE *v); | |
273 int X509_STORE_lock(X509_STORE *ctx); | |
274 int X509_STORE_unlock(X509_STORE *ctx); | |
275 int X509_STORE_up_ref(X509_STORE *v); | |
276 STACK_OF(X509_OBJECT) *X509_STORE_get0_objects(X509_STORE *v); | |
277 | |
278 STACK_OF(X509) *X509_STORE_CTX_get1_certs(X509_STORE_CTX *st, X509_NAME *nm); | |
279 STACK_OF(X509_CRL) *X509_STORE_CTX_get1_crls(X509_STORE_CTX *st, X509_NAME *nm); | |
280 int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags); | |
281 int X509_STORE_set_purpose(X509_STORE *ctx, int purpose); | |
282 int X509_STORE_set_trust(X509_STORE *ctx, int trust); | |
283 int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *pm); | |
284 X509_VERIFY_PARAM *X509_STORE_get0_param(X509_STORE *ctx); | |
285 | |
286 void X509_STORE_set_verify(X509_STORE *ctx, X509_STORE_CTX_verify_fn verify); | |
287 #define X509_STORE_set_verify_func(ctx, func) \ | |
288 X509_STORE_set_verify((ctx),(func)) | |
289 void X509_STORE_CTX_set_verify(X509_STORE_CTX *ctx, | |
290 X509_STORE_CTX_verify_fn verify); | |
291 X509_STORE_CTX_verify_fn X509_STORE_get_verify(X509_STORE *ctx); | |
292 void X509_STORE_set_verify_cb(X509_STORE *ctx, | |
293 X509_STORE_CTX_verify_cb verify_cb); | |
294 # define X509_STORE_set_verify_cb_func(ctx,func) \ | |
295 X509_STORE_set_verify_cb((ctx),(func)) | |
296 X509_STORE_CTX_verify_cb X509_STORE_get_verify_cb(X509_STORE *ctx); | |
297 void X509_STORE_set_get_issuer(X509_STORE *ctx, | |
298 X509_STORE_CTX_get_issuer_fn get_issuer); | |
299 X509_STORE_CTX_get_issuer_fn X509_STORE_get_get_issuer(X509_STORE *ctx); | |
300 void X509_STORE_set_check_issued(X509_STORE *ctx, | |
301 X509_STORE_CTX_check_issued_fn check_issued); | |
302 X509_STORE_CTX_check_issued_fn X509_STORE_get_check_issued(X509_STORE *ctx); | |
303 void X509_STORE_set_check_revocation(X509_STORE *ctx, | |
304 X509_STORE_CTX_check_revocation_fn check_revocation); | |
305 X509_STORE_CTX_check_revocation_fn X509_STORE_get_check_revocation(X509_STORE *ctx); | |
306 void X509_STORE_set_get_crl(X509_STORE *ctx, | |
307 X509_STORE_CTX_get_crl_fn get_crl); | |
308 X509_STORE_CTX_get_crl_fn X509_STORE_get_get_crl(X509_STORE *ctx); | |
309 void X509_STORE_set_check_crl(X509_STORE *ctx, | |
310 X509_STORE_CTX_check_crl_fn check_crl); | |
311 X509_STORE_CTX_check_crl_fn X509_STORE_get_check_crl(X509_STORE *ctx); | |
312 void X509_STORE_set_cert_crl(X509_STORE *ctx, | |
313 X509_STORE_CTX_cert_crl_fn cert_crl); | |
314 X509_STORE_CTX_cert_crl_fn X509_STORE_get_cert_crl(X509_STORE *ctx); | |
315 void X509_STORE_set_check_policy(X509_STORE *ctx, | |
316 X509_STORE_CTX_check_policy_fn check_policy); | |
317 X509_STORE_CTX_check_policy_fn X509_STORE_get_check_policy(X509_STORE *ctx); | |
318 void X509_STORE_set_lookup_certs(X509_STORE *ctx, | |
319 X509_STORE_CTX_lookup_certs_fn lookup_certs); | |
320 X509_STORE_CTX_lookup_certs_fn X509_STORE_get_lookup_certs(X509_STORE *ctx); | |
321 void X509_STORE_set_lookup_crls(X509_STORE *ctx, | |
322 X509_STORE_CTX_lookup_crls_fn lookup_crls); | |
323 #define X509_STORE_set_lookup_crls_cb(ctx, func) \ | |
324 X509_STORE_set_lookup_crls((ctx), (func)) | |
325 X509_STORE_CTX_lookup_crls_fn X509_STORE_get_lookup_crls(X509_STORE *ctx); | |
326 void X509_STORE_set_cleanup(X509_STORE *ctx, | |
327 X509_STORE_CTX_cleanup_fn cleanup); | |
328 X509_STORE_CTX_cleanup_fn X509_STORE_get_cleanup(X509_STORE *ctx); | |
329 | |
330 #define X509_STORE_get_ex_new_index(l, p, newf, dupf, freef) \ | |
331 CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE, l, p, newf, dupf, freef) | |
332 int X509_STORE_set_ex_data(X509_STORE *ctx, int idx, void *data); | |
333 void *X509_STORE_get_ex_data(X509_STORE *ctx, int idx); | |
334 | |
335 X509_STORE_CTX *X509_STORE_CTX_new(void); | |
336 | |
337 int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x); | |
338 | |
339 void X509_STORE_CTX_free(X509_STORE_CTX *ctx); | |
340 int X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store, | |
341 X509 *x509, STACK_OF(X509) *chain); | |
342 void X509_STORE_CTX_set0_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); | |
343 void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx); | |
344 | |
345 X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx); | |
346 X509 *X509_STORE_CTX_get0_cert(X509_STORE_CTX *ctx); | |
347 STACK_OF(X509)* X509_STORE_CTX_get0_untrusted(X509_STORE_CTX *ctx); | |
348 void X509_STORE_CTX_set0_untrusted(X509_STORE_CTX *ctx, STACK_OF(X509) *sk); | |
349 void X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx, | |
350 X509_STORE_CTX_verify_cb verify); | |
351 X509_STORE_CTX_verify_cb X509_STORE_CTX_get_verify_cb(X509_STORE_CTX *ctx); | |
352 X509_STORE_CTX_verify_fn X509_STORE_CTX_get_verify(X509_STORE_CTX *ctx); | |
353 X509_STORE_CTX_get_issuer_fn X509_STORE_CTX_get_get_issuer(X509_STORE_CTX *ctx); | |
354 X509_STORE_CTX_check_issued_fn X509_STORE_CTX_get_check_issued(X509_STORE_CTX *ctx); | |
355 X509_STORE_CTX_check_revocation_fn X509_STORE_CTX_get_check_revocation(X509_STORE_CTX *ctx); | |
356 X509_STORE_CTX_get_crl_fn X509_STORE_CTX_get_get_crl(X509_STORE_CTX *ctx); | |
357 X509_STORE_CTX_check_crl_fn X509_STORE_CTX_get_check_crl(X509_STORE_CTX *ctx); | |
358 X509_STORE_CTX_cert_crl_fn X509_STORE_CTX_get_cert_crl(X509_STORE_CTX *ctx); | |
359 X509_STORE_CTX_check_policy_fn X509_STORE_CTX_get_check_policy(X509_STORE_CTX *ctx); | |
360 X509_STORE_CTX_lookup_certs_fn X509_STORE_CTX_get_lookup_certs(X509_STORE_CTX *ctx); | |
361 X509_STORE_CTX_lookup_crls_fn X509_STORE_CTX_get_lookup_crls(X509_STORE_CTX *ctx); | |
362 X509_STORE_CTX_cleanup_fn X509_STORE_CTX_get_cleanup(X509_STORE_CTX *ctx); | |
363 | |
364 #if OPENSSL_API_COMPAT < 0x10100000L | |
365 # define X509_STORE_CTX_get_chain X509_STORE_CTX_get0_chain | |
366 # define X509_STORE_CTX_set_chain X509_STORE_CTX_set0_untrusted | |
367 # define X509_STORE_CTX_trusted_stack X509_STORE_CTX_set0_trusted_stack | |
368 # define X509_STORE_get_by_subject X509_STORE_CTX_get_by_subject | |
369 # define X509_STORE_get1_certs X509_STORE_CTX_get1_certs | |
370 # define X509_STORE_get1_crls X509_STORE_CTX_get1_crls | |
371 /* the following macro is misspelled; use X509_STORE_get1_certs instead */ | |
372 # define X509_STORE_get1_cert X509_STORE_CTX_get1_certs | |
373 /* the following macro is misspelled; use X509_STORE_get1_crls instead */ | |
374 # define X509_STORE_get1_crl X509_STORE_CTX_get1_crls | |
375 #endif | |
376 | |
377 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m); | |
378 X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void); | |
379 X509_LOOKUP_METHOD *X509_LOOKUP_file(void); | |
380 | |
381 typedef int (*X509_LOOKUP_ctrl_fn)(X509_LOOKUP *ctx, int cmd, const char *argc, | |
382 long argl, char **ret); | |
383 typedef int (*X509_LOOKUP_get_by_subject_fn)(X509_LOOKUP *ctx, | |
384 X509_LOOKUP_TYPE type, | |
385 X509_NAME *name, | |
386 X509_OBJECT *ret); | |
387 typedef int (*X509_LOOKUP_get_by_issuer_serial_fn)(X509_LOOKUP *ctx, | |
388 X509_LOOKUP_TYPE type, | |
389 X509_NAME *name, | |
390 ASN1_INTEGER *serial, | |
391 X509_OBJECT *ret); | |
392 typedef int (*X509_LOOKUP_get_by_fingerprint_fn)(X509_LOOKUP *ctx, | |
393 X509_LOOKUP_TYPE type, | |
394 const unsigned char* bytes, | |
395 int len, | |
396 X509_OBJECT *ret); | |
397 typedef int (*X509_LOOKUP_get_by_alias_fn)(X509_LOOKUP *ctx, | |
398 X509_LOOKUP_TYPE type, | |
399 const char *str, | |
400 int len, | |
401 X509_OBJECT *ret); | |
402 | |
403 X509_LOOKUP_METHOD *X509_LOOKUP_meth_new(const char *name); | |
404 void X509_LOOKUP_meth_free(X509_LOOKUP_METHOD *method); | |
405 | |
406 int X509_LOOKUP_meth_set_new_item(X509_LOOKUP_METHOD *method, | |
407 int (*new_item) (X509_LOOKUP *ctx)); | |
408 int (*X509_LOOKUP_meth_get_new_item(const X509_LOOKUP_METHOD* method)) | |
409 (X509_LOOKUP *ctx); | |
410 | |
411 int X509_LOOKUP_meth_set_free(X509_LOOKUP_METHOD *method, | |
412 void (*free_fn) (X509_LOOKUP *ctx)); | |
413 void (*X509_LOOKUP_meth_get_free(const X509_LOOKUP_METHOD* method)) | |
414 (X509_LOOKUP *ctx); | |
415 | |
416 int X509_LOOKUP_meth_set_init(X509_LOOKUP_METHOD *method, | |
417 int (*init) (X509_LOOKUP *ctx)); | |
418 int (*X509_LOOKUP_meth_get_init(const X509_LOOKUP_METHOD* method)) | |
419 (X509_LOOKUP *ctx); | |
420 | |
421 int X509_LOOKUP_meth_set_shutdown(X509_LOOKUP_METHOD *method, | |
422 int (*shutdown) (X509_LOOKUP *ctx)); | |
423 int (*X509_LOOKUP_meth_get_shutdown(const X509_LOOKUP_METHOD* method)) | |
424 (X509_LOOKUP *ctx); | |
425 | |
426 int X509_LOOKUP_meth_set_ctrl(X509_LOOKUP_METHOD *method, | |
427 X509_LOOKUP_ctrl_fn ctrl_fn); | |
428 X509_LOOKUP_ctrl_fn X509_LOOKUP_meth_get_ctrl(const X509_LOOKUP_METHOD *method); | |
429 | |
430 int X509_LOOKUP_meth_set_get_by_subject(X509_LOOKUP_METHOD *method, | |
431 X509_LOOKUP_get_by_subject_fn fn); | |
432 X509_LOOKUP_get_by_subject_fn X509_LOOKUP_meth_get_get_by_subject( | |
433 const X509_LOOKUP_METHOD *method); | |
434 | |
435 int X509_LOOKUP_meth_set_get_by_issuer_serial(X509_LOOKUP_METHOD *method, | |
436 X509_LOOKUP_get_by_issuer_serial_fn fn); | |
437 X509_LOOKUP_get_by_issuer_serial_fn X509_LOOKUP_meth_get_get_by_issuer_serial( | |
438 const X509_LOOKUP_METHOD *method); | |
439 | |
440 int X509_LOOKUP_meth_set_get_by_fingerprint(X509_LOOKUP_METHOD *method, | |
441 X509_LOOKUP_get_by_fingerprint_fn fn); | |
442 X509_LOOKUP_get_by_fingerprint_fn X509_LOOKUP_meth_get_get_by_fingerprint( | |
443 const X509_LOOKUP_METHOD *method); | |
444 | |
445 int X509_LOOKUP_meth_set_get_by_alias(X509_LOOKUP_METHOD *method, | |
446 X509_LOOKUP_get_by_alias_fn fn); | |
447 X509_LOOKUP_get_by_alias_fn X509_LOOKUP_meth_get_get_by_alias( | |
448 const X509_LOOKUP_METHOD *method); | |
449 | |
450 | |
451 int X509_STORE_add_cert(X509_STORE *ctx, X509 *x); | |
452 int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x); | |
453 | |
454 int X509_STORE_CTX_get_by_subject(X509_STORE_CTX *vs, X509_LOOKUP_TYPE type, | |
455 X509_NAME *name, X509_OBJECT *ret); | |
456 X509_OBJECT *X509_STORE_CTX_get_obj_by_subject(X509_STORE_CTX *vs, | |
457 X509_LOOKUP_TYPE type, | |
458 X509_NAME *name); | |
459 | |
460 int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc, | |
461 long argl, char **ret); | |
462 | |
463 int X509_load_cert_file(X509_LOOKUP *ctx, const char *file, int type); | |
464 int X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type); | |
465 int X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type); | |
466 | |
467 X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method); | |
468 void X509_LOOKUP_free(X509_LOOKUP *ctx); | |
469 int X509_LOOKUP_init(X509_LOOKUP *ctx); | |
470 int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |
471 X509_NAME *name, X509_OBJECT *ret); | |
472 int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |
473 X509_NAME *name, ASN1_INTEGER *serial, | |
474 X509_OBJECT *ret); | |
475 int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |
476 const unsigned char *bytes, int len, | |
477 X509_OBJECT *ret); | |
478 int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, X509_LOOKUP_TYPE type, | |
479 const char *str, int len, X509_OBJECT *ret); | |
480 int X509_LOOKUP_set_method_data(X509_LOOKUP *ctx, void *data); | |
481 void *X509_LOOKUP_get_method_data(const X509_LOOKUP *ctx); | |
482 X509_STORE *X509_LOOKUP_get_store(const X509_LOOKUP *ctx); | |
483 int X509_LOOKUP_shutdown(X509_LOOKUP *ctx); | |
484 | |
485 int X509_STORE_load_locations(X509_STORE *ctx, | |
486 const char *file, const char *dir); | |
487 int X509_STORE_set_default_paths(X509_STORE *ctx); | |
488 | |
489 #define X509_STORE_CTX_get_ex_new_index(l, p, newf, dupf, freef) \ | |
490 CRYPTO_get_ex_new_index(CRYPTO_EX_INDEX_X509_STORE_CTX, l, p, newf, dupf, freef) | |
491 int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data); | |
492 void *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx); | |
493 int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx); | |
494 void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int s); | |
495 int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx); | |
496 void X509_STORE_CTX_set_error_depth(X509_STORE_CTX *ctx, int depth); | |
497 X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx); | |
498 void X509_STORE_CTX_set_current_cert(X509_STORE_CTX *ctx, X509 *x); | |
499 X509 *X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx); | |
500 X509_CRL *X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx); | |
501 X509_STORE_CTX *X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx); | |
502 STACK_OF(X509) *X509_STORE_CTX_get0_chain(X509_STORE_CTX *ctx); | |
503 STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx); | |
504 void X509_STORE_CTX_set_cert(X509_STORE_CTX *c, X509 *x); | |
505 void X509_STORE_CTX_set0_verified_chain(X509_STORE_CTX *c, STACK_OF(X509) *sk); | |
506 void X509_STORE_CTX_set0_crls(X509_STORE_CTX *c, STACK_OF(X509_CRL) *sk); | |
507 int X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose); | |
508 int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust); | |
509 int X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose, | |
510 int purpose, int trust); | |
511 void X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags); | |
512 void X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags, | |
513 time_t t); | |
514 | |
515 X509_POLICY_TREE *X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx); | |
516 int X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx); | |
517 int X509_STORE_CTX_get_num_untrusted(X509_STORE_CTX *ctx); | |
518 | |
519 X509_VERIFY_PARAM *X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx); | |
520 void X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param); | |
521 int X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name); | |
522 | |
523 /* | |
524 * Bridge opacity barrier between libcrypt and libssl, also needed to support | |
525 * offline testing in test/danetest.c | |
526 */ | |
527 void X509_STORE_CTX_set0_dane(X509_STORE_CTX *ctx, SSL_DANE *dane); | |
528 #define DANE_FLAG_NO_DANE_EE_NAMECHECKS (1L << 0) | |
529 | |
530 /* X509_VERIFY_PARAM functions */ | |
531 | |
532 X509_VERIFY_PARAM *X509_VERIFY_PARAM_new(void); | |
533 void X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param); | |
534 int X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *to, | |
535 const X509_VERIFY_PARAM *from); | |
536 int X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to, | |
537 const X509_VERIFY_PARAM *from); | |
538 int X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name); | |
539 int X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param, | |
540 unsigned long flags); | |
541 int X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param, | |
542 unsigned long flags); | |
543 unsigned long X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param); | |
544 int X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose); | |
545 int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust); | |
546 void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth); | |
547 void X509_VERIFY_PARAM_set_auth_level(X509_VERIFY_PARAM *param, int auth_level); | |
548 time_t X509_VERIFY_PARAM_get_time(const X509_VERIFY_PARAM *param); | |
549 void X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t); | |
550 int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param, | |
551 ASN1_OBJECT *policy); | |
552 int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param, | |
553 STACK_OF(ASN1_OBJECT) *policies); | |
554 | |
555 int X509_VERIFY_PARAM_set_inh_flags(X509_VERIFY_PARAM *param, | |
556 uint32_t flags); | |
557 uint32_t X509_VERIFY_PARAM_get_inh_flags(const X509_VERIFY_PARAM *param); | |
558 | |
559 int X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param, | |
560 const char *name, size_t namelen); | |
561 int X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param, | |
562 const char *name, size_t namelen); | |
563 void X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param, | |
564 unsigned int flags); | |
565 unsigned int X509_VERIFY_PARAM_get_hostflags(const X509_VERIFY_PARAM *param); | |
566 char *X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *); | |
567 void X509_VERIFY_PARAM_move_peername(X509_VERIFY_PARAM *, X509_VERIFY_PARAM *); | |
568 int X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param, | |
569 const char *email, size_t emaillen); | |
570 int X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param, | |
571 const unsigned char *ip, size_t iplen); | |
572 int X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param, | |
573 const char *ipasc); | |
574 | |
575 int X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param); | |
576 int X509_VERIFY_PARAM_get_auth_level(const X509_VERIFY_PARAM *param); | |
577 const char *X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param); | |
578 | |
579 int X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param); | |
580 int X509_VERIFY_PARAM_get_count(void); | |
581 const X509_VERIFY_PARAM *X509_VERIFY_PARAM_get0(int id); | |
582 const X509_VERIFY_PARAM *X509_VERIFY_PARAM_lookup(const char *name); | |
583 void X509_VERIFY_PARAM_table_cleanup(void); | |
584 | |
585 /* Non positive return values are errors */ | |
586 #define X509_PCY_TREE_FAILURE -2 /* Failure to satisfy explicit policy */ | |
587 #define X509_PCY_TREE_INVALID -1 /* Inconsistent or invalid extensions */ | |
588 #define X509_PCY_TREE_INTERNAL 0 /* Internal error, most likely malloc */ | |
589 | |
590 /* | |
591 * Positive return values form a bit mask, all but the first are internal to | |
592 * the library and don't appear in results from X509_policy_check(). | |
593 */ | |
594 #define X509_PCY_TREE_VALID 1 /* The policy tree is valid */ | |
595 #define X509_PCY_TREE_EMPTY 2 /* The policy tree is empty */ | |
596 #define X509_PCY_TREE_EXPLICIT 4 /* Explicit policy required */ | |
597 | |
598 int X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy, | |
599 STACK_OF(X509) *certs, | |
600 STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags); | |
601 | |
602 void X509_policy_tree_free(X509_POLICY_TREE *tree); | |
603 | |
604 int X509_policy_tree_level_count(const X509_POLICY_TREE *tree); | |
605 X509_POLICY_LEVEL *X509_policy_tree_get0_level(const X509_POLICY_TREE *tree, | |
606 int i); | |
607 | |
608 STACK_OF(X509_POLICY_NODE) *X509_policy_tree_get0_policies(const | |
609 X509_POLICY_TREE | |
610 *tree); | |
611 | |
612 STACK_OF(X509_POLICY_NODE) *X509_policy_tree_get0_user_policies(const | |
613 X509_POLICY_TREE | |
614 *tree); | |
615 | |
616 int X509_policy_level_node_count(X509_POLICY_LEVEL *level); | |
617 | |
618 X509_POLICY_NODE *X509_policy_level_get0_node(X509_POLICY_LEVEL *level, | |
619 int i); | |
620 | |
621 const ASN1_OBJECT *X509_policy_node_get0_policy(const X509_POLICY_NODE *node); | |
622 | |
623 STACK_OF(POLICYQUALINFO) *X509_policy_node_get0_qualifiers(const | |
624 X509_POLICY_NODE | |
625 *node); | |
626 const X509_POLICY_NODE *X509_policy_node_get0_parent(const X509_POLICY_NODE | |
627 *node); | |
628 | |
629 #ifdef __cplusplus | |
630 } | |
631 #endif | |
632 #endif |