|
1 /* crypto/x509/x509.h */ |
|
2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
|
3 * All rights reserved. |
|
4 * |
|
5 * This package is an SSL implementation written |
|
6 * by Eric Young (eay@cryptsoft.com). |
|
7 * The implementation was written so as to conform with Netscapes SSL. |
|
8 * |
|
9 * This library is free for commercial and non-commercial use as long as |
|
10 * the following conditions are aheared to. The following conditions |
|
11 * apply to all code found in this distribution, be it the RC4, RSA, |
|
12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation |
|
13 * included with this distribution is covered by the same copyright terms |
|
14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). |
|
15 * |
|
16 * Copyright remains Eric Young's, and as such any Copyright notices in |
|
17 * the code are not to be removed. |
|
18 * If this package is used in a product, Eric Young should be given attribution |
|
19 * as the author of the parts of the library used. |
|
20 * This can be in the form of a textual message at program startup or |
|
21 * in documentation (online or textual) provided with the package. |
|
22 * |
|
23 * Redistribution and use in source and binary forms, with or without |
|
24 * modification, are permitted provided that the following conditions |
|
25 * are met: |
|
26 * 1. Redistributions of source code must retain the copyright |
|
27 * notice, this list of conditions and the following disclaimer. |
|
28 * 2. Redistributions in binary form must reproduce the above copyright |
|
29 * notice, this list of conditions and the following disclaimer in the |
|
30 * documentation and/or other materials provided with the distribution. |
|
31 * 3. All advertising materials mentioning features or use of this software |
|
32 * must display the following acknowledgement: |
|
33 * "This product includes cryptographic software written by |
|
34 * Eric Young (eay@cryptsoft.com)" |
|
35 * The word 'cryptographic' can be left out if the rouines from the library |
|
36 * being used are not cryptographic related :-). |
|
37 * 4. If you include any Windows specific code (or a derivative thereof) from |
|
38 * the apps directory (application code) you must include an acknowledgement: |
|
39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" |
|
40 * |
|
41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND |
|
42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
|
43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
|
44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
|
45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
|
46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
|
47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
|
48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
|
49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
|
50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
|
51 * SUCH DAMAGE. |
|
52 * |
|
53 * The licence and distribution terms for any publically available version or |
|
54 * derivative of this code cannot be changed. i.e. this code cannot simply be |
|
55 * copied and put under another distribution licence |
|
56 * [including the GNU Public Licence.] |
|
57 */ |
|
58 |
|
59 #ifndef HEADER_X509_H |
|
60 #define HEADER_X509_H |
|
61 |
|
62 #include <openssl/symhacks.h> |
|
63 #ifndef OPENSSL_NO_BUFFER |
|
64 #include <openssl/buffer.h> |
|
65 #endif |
|
66 #ifndef OPENSSL_NO_EVP |
|
67 #include <openssl/evp.h> |
|
68 #endif |
|
69 #ifndef OPENSSL_NO_BIO |
|
70 #include <openssl/bio.h> |
|
71 #endif |
|
72 #include <openssl/stack.h> |
|
73 #include <openssl/asn1.h> |
|
74 #include <openssl/safestack.h> |
|
75 |
|
76 #ifndef OPENSSL_NO_RSA |
|
77 #include <openssl/rsa.h> |
|
78 #endif |
|
79 |
|
80 #ifndef OPENSSL_NO_DSA |
|
81 #include <openssl/dsa.h> |
|
82 #endif |
|
83 |
|
84 #ifndef OPENSSL_NO_DH |
|
85 #include <openssl/dh.h> |
|
86 #endif |
|
87 #ifndef OPENSSL_NO_SHA |
|
88 #include <openssl/sha.h> |
|
89 #endif |
|
90 #include <openssl/e_os2.h> |
|
91 #include <openssl/ossl_typ.h> |
|
92 |
|
93 #ifdef __cplusplus |
|
94 extern "C" { |
|
95 #endif |
|
96 |
|
97 #ifdef OPENSSL_SYS_WIN32 |
|
98 /* Under Win32 this is defined in wincrypt.h */ |
|
99 #undef X509_NAME |
|
100 #endif |
|
101 |
|
102 #define X509_FILETYPE_PEM 1 |
|
103 #define X509_FILETYPE_ASN1 2 |
|
104 #define X509_FILETYPE_DEFAULT 3 |
|
105 |
|
106 #define X509v3_KU_DIGITAL_SIGNATURE 0x0080 |
|
107 #define X509v3_KU_NON_REPUDIATION 0x0040 |
|
108 #define X509v3_KU_KEY_ENCIPHERMENT 0x0020 |
|
109 #define X509v3_KU_DATA_ENCIPHERMENT 0x0010 |
|
110 #define X509v3_KU_KEY_AGREEMENT 0x0008 |
|
111 #define X509v3_KU_KEY_CERT_SIGN 0x0004 |
|
112 #define X509v3_KU_CRL_SIGN 0x0002 |
|
113 #define X509v3_KU_ENCIPHER_ONLY 0x0001 |
|
114 #define X509v3_KU_DECIPHER_ONLY 0x8000 |
|
115 #define X509v3_KU_UNDEF 0xffff |
|
116 |
|
117 typedef struct X509_objects_st |
|
118 { |
|
119 int nid; |
|
120 int (*a2i)(); |
|
121 int (*i2a)(); |
|
122 } X509_OBJECTS; |
|
123 |
|
124 struct X509_algor_st |
|
125 { |
|
126 ASN1_OBJECT *algorithm; |
|
127 ASN1_TYPE *parameter; |
|
128 } /* X509_ALGOR */; |
|
129 |
|
130 DECLARE_STACK_OF(X509_ALGOR) |
|
131 DECLARE_ASN1_SET_OF(X509_ALGOR) |
|
132 |
|
133 typedef struct X509_val_st |
|
134 { |
|
135 ASN1_TIME *notBefore; |
|
136 ASN1_TIME *notAfter; |
|
137 } X509_VAL; |
|
138 |
|
139 typedef struct X509_pubkey_st |
|
140 { |
|
141 X509_ALGOR *algor; |
|
142 ASN1_BIT_STRING *public_key; |
|
143 EVP_PKEY *pkey; |
|
144 } X509_PUBKEY; |
|
145 |
|
146 typedef struct X509_sig_st |
|
147 { |
|
148 X509_ALGOR *algor; |
|
149 ASN1_OCTET_STRING *digest; |
|
150 } X509_SIG; |
|
151 |
|
152 typedef struct X509_name_entry_st |
|
153 { |
|
154 ASN1_OBJECT *object; |
|
155 ASN1_STRING *value; |
|
156 int set; |
|
157 int size; /* temp variable */ |
|
158 } X509_NAME_ENTRY; |
|
159 |
|
160 DECLARE_STACK_OF(X509_NAME_ENTRY) |
|
161 DECLARE_ASN1_SET_OF(X509_NAME_ENTRY) |
|
162 |
|
163 /* we always keep X509_NAMEs in 2 forms. */ |
|
164 struct X509_name_st |
|
165 { |
|
166 STACK_OF(X509_NAME_ENTRY) *entries; |
|
167 int modified; /* true if 'bytes' needs to be built */ |
|
168 #ifndef OPENSSL_NO_BUFFER |
|
169 BUF_MEM *bytes; |
|
170 #else |
|
171 char *bytes; |
|
172 #endif |
|
173 unsigned long hash; /* Keep the hash around for lookups */ |
|
174 } /* X509_NAME */; |
|
175 |
|
176 DECLARE_STACK_OF(X509_NAME) |
|
177 |
|
178 #define X509_EX_V_NETSCAPE_HACK 0x8000 |
|
179 #define X509_EX_V_INIT 0x0001 |
|
180 typedef struct X509_extension_st |
|
181 { |
|
182 ASN1_OBJECT *object; |
|
183 ASN1_BOOLEAN critical; |
|
184 ASN1_OCTET_STRING *value; |
|
185 } X509_EXTENSION; |
|
186 |
|
187 DECLARE_STACK_OF(X509_EXTENSION) |
|
188 DECLARE_ASN1_SET_OF(X509_EXTENSION) |
|
189 |
|
190 /* a sequence of these are used */ |
|
191 typedef struct x509_attributes_st |
|
192 { |
|
193 ASN1_OBJECT *object; |
|
194 int single; /* 0 for a set, 1 for a single item (which is wrong) */ |
|
195 union { |
|
196 char *ptr; |
|
197 /* 0 */ STACK_OF(ASN1_TYPE) *set; |
|
198 /* 1 */ ASN1_TYPE *single; |
|
199 } value; |
|
200 } X509_ATTRIBUTE; |
|
201 |
|
202 DECLARE_STACK_OF(X509_ATTRIBUTE) |
|
203 DECLARE_ASN1_SET_OF(X509_ATTRIBUTE) |
|
204 |
|
205 |
|
206 typedef struct X509_req_info_st |
|
207 { |
|
208 ASN1_ENCODING enc; |
|
209 ASN1_INTEGER *version; |
|
210 X509_NAME *subject; |
|
211 X509_PUBKEY *pubkey; |
|
212 /* d=2 hl=2 l= 0 cons: cont: 00 */ |
|
213 STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ |
|
214 } X509_REQ_INFO; |
|
215 |
|
216 typedef struct X509_req_st |
|
217 { |
|
218 X509_REQ_INFO *req_info; |
|
219 X509_ALGOR *sig_alg; |
|
220 ASN1_BIT_STRING *signature; |
|
221 int references; |
|
222 } X509_REQ; |
|
223 |
|
224 typedef struct x509_cinf_st |
|
225 { |
|
226 ASN1_INTEGER *version; /* [ 0 ] default of v1 */ |
|
227 ASN1_INTEGER *serialNumber; |
|
228 X509_ALGOR *signature; |
|
229 X509_NAME *issuer; |
|
230 X509_VAL *validity; |
|
231 X509_NAME *subject; |
|
232 X509_PUBKEY *key; |
|
233 ASN1_BIT_STRING *issuerUID; /* [ 1 ] optional in v2 */ |
|
234 ASN1_BIT_STRING *subjectUID; /* [ 2 ] optional in v2 */ |
|
235 STACK_OF(X509_EXTENSION) *extensions; /* [ 3 ] optional in v3 */ |
|
236 } X509_CINF; |
|
237 |
|
238 /* This stuff is certificate "auxiliary info" |
|
239 * it contains details which are useful in certificate |
|
240 * stores and databases. When used this is tagged onto |
|
241 * the end of the certificate itself |
|
242 */ |
|
243 |
|
244 typedef struct x509_cert_aux_st |
|
245 { |
|
246 STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ |
|
247 STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */ |
|
248 ASN1_UTF8STRING *alias; /* "friendly name" */ |
|
249 ASN1_OCTET_STRING *keyid; /* key id of private key */ |
|
250 STACK_OF(X509_ALGOR) *other; /* other unspecified info */ |
|
251 } X509_CERT_AUX; |
|
252 |
|
253 struct x509_st |
|
254 { |
|
255 X509_CINF *cert_info; |
|
256 X509_ALGOR *sig_alg; |
|
257 ASN1_BIT_STRING *signature; |
|
258 int valid; |
|
259 int references; |
|
260 char *name; |
|
261 CRYPTO_EX_DATA ex_data; |
|
262 /* These contain copies of various extension values */ |
|
263 long ex_pathlen; |
|
264 unsigned long ex_flags; |
|
265 unsigned long ex_kusage; |
|
266 unsigned long ex_xkusage; |
|
267 unsigned long ex_nscert; |
|
268 ASN1_OCTET_STRING *skid; |
|
269 struct AUTHORITY_KEYID_st *akid; |
|
270 #ifndef OPENSSL_NO_SHA |
|
271 unsigned char sha1_hash[SHA_DIGEST_LENGTH]; |
|
272 #endif |
|
273 X509_CERT_AUX *aux; |
|
274 } /* X509 */; |
|
275 |
|
276 DECLARE_STACK_OF(X509) |
|
277 DECLARE_ASN1_SET_OF(X509) |
|
278 |
|
279 /* This is used for a table of trust checking functions */ |
|
280 |
|
281 typedef struct x509_trust_st { |
|
282 int trust; |
|
283 int flags; |
|
284 int (*check_trust)(struct x509_trust_st *, X509 *, int); |
|
285 char *name; |
|
286 int arg1; |
|
287 void *arg2; |
|
288 } X509_TRUST; |
|
289 |
|
290 DECLARE_STACK_OF(X509_TRUST) |
|
291 |
|
292 /* standard trust ids */ |
|
293 |
|
294 #define X509_TRUST_DEFAULT -1 /* Only valid in purpose settings */ |
|
295 |
|
296 #define X509_TRUST_COMPAT 1 |
|
297 #define X509_TRUST_SSL_CLIENT 2 |
|
298 #define X509_TRUST_SSL_SERVER 3 |
|
299 #define X509_TRUST_EMAIL 4 |
|
300 #define X509_TRUST_OBJECT_SIGN 5 |
|
301 #define X509_TRUST_OCSP_SIGN 6 |
|
302 #define X509_TRUST_OCSP_REQUEST 7 |
|
303 |
|
304 /* Keep these up to date! */ |
|
305 #define X509_TRUST_MIN 1 |
|
306 #define X509_TRUST_MAX 7 |
|
307 |
|
308 |
|
309 /* trust_flags values */ |
|
310 #define X509_TRUST_DYNAMIC 1 |
|
311 #define X509_TRUST_DYNAMIC_NAME 2 |
|
312 |
|
313 /* check_trust return codes */ |
|
314 |
|
315 #define X509_TRUST_TRUSTED 1 |
|
316 #define X509_TRUST_REJECTED 2 |
|
317 #define X509_TRUST_UNTRUSTED 3 |
|
318 |
|
319 /* Flags for X509_print_ex() */ |
|
320 |
|
321 #define X509_FLAG_COMPAT 0 |
|
322 #define X509_FLAG_NO_HEADER 1L |
|
323 #define X509_FLAG_NO_VERSION (1L << 1) |
|
324 #define X509_FLAG_NO_SERIAL (1L << 2) |
|
325 #define X509_FLAG_NO_SIGNAME (1L << 3) |
|
326 #define X509_FLAG_NO_ISSUER (1L << 4) |
|
327 #define X509_FLAG_NO_VALIDITY (1L << 5) |
|
328 #define X509_FLAG_NO_SUBJECT (1L << 6) |
|
329 #define X509_FLAG_NO_PUBKEY (1L << 7) |
|
330 #define X509_FLAG_NO_EXTENSIONS (1L << 8) |
|
331 #define X509_FLAG_NO_SIGDUMP (1L << 9) |
|
332 #define X509_FLAG_NO_AUX (1L << 10) |
|
333 #define X509_FLAG_NO_ATTRIBUTES (1L << 11) |
|
334 |
|
335 /* Flags specific to X509_NAME_print_ex() */ |
|
336 |
|
337 /* The field separator information */ |
|
338 |
|
339 #define XN_FLAG_SEP_MASK (0xf << 16) |
|
340 |
|
341 #define XN_FLAG_COMPAT 0 /* Traditional SSLeay: use old X509_NAME_print */ |
|
342 #define XN_FLAG_SEP_COMMA_PLUS (1 << 16) /* RFC2253 ,+ */ |
|
343 #define XN_FLAG_SEP_CPLUS_SPC (2 << 16) /* ,+ spaced: more readable */ |
|
344 #define XN_FLAG_SEP_SPLUS_SPC (3 << 16) /* ;+ spaced */ |
|
345 #define XN_FLAG_SEP_MULTILINE (4 << 16) /* One line per field */ |
|
346 |
|
347 #define XN_FLAG_DN_REV (1 << 20) /* Reverse DN order */ |
|
348 |
|
349 /* How the field name is shown */ |
|
350 |
|
351 #define XN_FLAG_FN_MASK (0x3 << 21) |
|
352 |
|
353 #define XN_FLAG_FN_SN 0 /* Object short name */ |
|
354 #define XN_FLAG_FN_LN (1 << 21) /* Object long name */ |
|
355 #define XN_FLAG_FN_OID (2 << 21) /* Always use OIDs */ |
|
356 #define XN_FLAG_FN_NONE (3 << 21) /* No field names */ |
|
357 |
|
358 #define XN_FLAG_SPC_EQ (1 << 23) /* Put spaces round '=' */ |
|
359 |
|
360 /* This determines if we dump fields we don't recognise: |
|
361 * RFC2253 requires this. |
|
362 */ |
|
363 |
|
364 #define XN_FLAG_DUMP_UNKNOWN_FIELDS (1 << 24) |
|
365 |
|
366 #define XN_FLAG_FN_ALIGN (1 << 25) /* Align field names to 20 characters */ |
|
367 |
|
368 /* Complete set of RFC2253 flags */ |
|
369 |
|
370 #define XN_FLAG_RFC2253 (ASN1_STRFLGS_RFC2253 | \ |
|
371 XN_FLAG_SEP_COMMA_PLUS | \ |
|
372 XN_FLAG_DN_REV | \ |
|
373 XN_FLAG_FN_SN | \ |
|
374 XN_FLAG_DUMP_UNKNOWN_FIELDS) |
|
375 |
|
376 /* readable oneline form */ |
|
377 |
|
378 #define XN_FLAG_ONELINE (ASN1_STRFLGS_RFC2253 | \ |
|
379 ASN1_STRFLGS_ESC_QUOTE | \ |
|
380 XN_FLAG_SEP_CPLUS_SPC | \ |
|
381 XN_FLAG_SPC_EQ | \ |
|
382 XN_FLAG_FN_SN) |
|
383 |
|
384 /* readable multiline form */ |
|
385 |
|
386 #define XN_FLAG_MULTILINE (ASN1_STRFLGS_ESC_CTRL | \ |
|
387 ASN1_STRFLGS_ESC_MSB | \ |
|
388 XN_FLAG_SEP_MULTILINE | \ |
|
389 XN_FLAG_SPC_EQ | \ |
|
390 XN_FLAG_FN_LN | \ |
|
391 XN_FLAG_FN_ALIGN) |
|
392 |
|
393 typedef struct X509_revoked_st |
|
394 { |
|
395 ASN1_INTEGER *serialNumber; |
|
396 ASN1_TIME *revocationDate; |
|
397 STACK_OF(X509_EXTENSION) /* optional */ *extensions; |
|
398 int sequence; /* load sequence */ |
|
399 } X509_REVOKED; |
|
400 |
|
401 DECLARE_STACK_OF(X509_REVOKED) |
|
402 DECLARE_ASN1_SET_OF(X509_REVOKED) |
|
403 |
|
404 typedef struct X509_crl_info_st |
|
405 { |
|
406 ASN1_INTEGER *version; |
|
407 X509_ALGOR *sig_alg; |
|
408 X509_NAME *issuer; |
|
409 ASN1_TIME *lastUpdate; |
|
410 ASN1_TIME *nextUpdate; |
|
411 STACK_OF(X509_REVOKED) *revoked; |
|
412 STACK_OF(X509_EXTENSION) /* [0] */ *extensions; |
|
413 } X509_CRL_INFO; |
|
414 |
|
415 struct X509_crl_st |
|
416 { |
|
417 /* actual signature */ |
|
418 X509_CRL_INFO *crl; |
|
419 X509_ALGOR *sig_alg; |
|
420 ASN1_BIT_STRING *signature; |
|
421 int references; |
|
422 } /* X509_CRL */; |
|
423 |
|
424 DECLARE_STACK_OF(X509_CRL) |
|
425 DECLARE_ASN1_SET_OF(X509_CRL) |
|
426 |
|
427 typedef struct private_key_st |
|
428 { |
|
429 int version; |
|
430 /* The PKCS#8 data types */ |
|
431 X509_ALGOR *enc_algor; |
|
432 ASN1_OCTET_STRING *enc_pkey; /* encrypted pub key */ |
|
433 |
|
434 /* When decrypted, the following will not be NULL */ |
|
435 EVP_PKEY *dec_pkey; |
|
436 |
|
437 /* used to encrypt and decrypt */ |
|
438 int key_length; |
|
439 char *key_data; |
|
440 int key_free; /* true if we should auto free key_data */ |
|
441 |
|
442 /* expanded version of 'enc_algor' */ |
|
443 EVP_CIPHER_INFO cipher; |
|
444 |
|
445 int references; |
|
446 } X509_PKEY; |
|
447 |
|
448 #ifndef OPENSSL_NO_EVP |
|
449 typedef struct X509_info_st |
|
450 { |
|
451 X509 *x509; |
|
452 X509_CRL *crl; |
|
453 X509_PKEY *x_pkey; |
|
454 |
|
455 EVP_CIPHER_INFO enc_cipher; |
|
456 int enc_len; |
|
457 char *enc_data; |
|
458 |
|
459 int references; |
|
460 } X509_INFO; |
|
461 |
|
462 DECLARE_STACK_OF(X509_INFO) |
|
463 #endif |
|
464 |
|
465 /* The next 2 structures and their 8 routines were sent to me by |
|
466 * Pat Richard <patr@x509.com> and are used to manipulate |
|
467 * Netscapes spki structures - useful if you are writing a CA web page |
|
468 */ |
|
469 typedef struct Netscape_spkac_st |
|
470 { |
|
471 X509_PUBKEY *pubkey; |
|
472 ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ |
|
473 } NETSCAPE_SPKAC; |
|
474 |
|
475 typedef struct Netscape_spki_st |
|
476 { |
|
477 NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ |
|
478 X509_ALGOR *sig_algor; |
|
479 ASN1_BIT_STRING *signature; |
|
480 } NETSCAPE_SPKI; |
|
481 |
|
482 /* Netscape certificate sequence structure */ |
|
483 typedef struct Netscape_certificate_sequence |
|
484 { |
|
485 ASN1_OBJECT *type; |
|
486 STACK_OF(X509) *certs; |
|
487 } NETSCAPE_CERT_SEQUENCE; |
|
488 |
|
489 /* Unused (and iv length is wrong) |
|
490 typedef struct CBCParameter_st |
|
491 { |
|
492 unsigned char iv[8]; |
|
493 } CBC_PARAM; |
|
494 */ |
|
495 |
|
496 /* Password based encryption structure */ |
|
497 |
|
498 typedef struct PBEPARAM_st { |
|
499 ASN1_OCTET_STRING *salt; |
|
500 ASN1_INTEGER *iter; |
|
501 } PBEPARAM; |
|
502 |
|
503 /* Password based encryption V2 structures */ |
|
504 |
|
505 typedef struct PBE2PARAM_st { |
|
506 X509_ALGOR *keyfunc; |
|
507 X509_ALGOR *encryption; |
|
508 } PBE2PARAM; |
|
509 |
|
510 typedef struct PBKDF2PARAM_st { |
|
511 ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ |
|
512 ASN1_INTEGER *iter; |
|
513 ASN1_INTEGER *keylength; |
|
514 X509_ALGOR *prf; |
|
515 } PBKDF2PARAM; |
|
516 |
|
517 |
|
518 /* PKCS#8 private key info structure */ |
|
519 |
|
520 typedef struct pkcs8_priv_key_info_st |
|
521 { |
|
522 int broken; /* Flag for various broken formats */ |
|
523 #define PKCS8_OK 0 |
|
524 #define PKCS8_NO_OCTET 1 |
|
525 #define PKCS8_EMBEDDED_PARAM 2 |
|
526 #define PKCS8_NS_DB 3 |
|
527 ASN1_INTEGER *version; |
|
528 X509_ALGOR *pkeyalg; |
|
529 ASN1_TYPE *pkey; /* Should be OCTET STRING but some are broken */ |
|
530 STACK_OF(X509_ATTRIBUTE) *attributes; |
|
531 } PKCS8_PRIV_KEY_INFO; |
|
532 |
|
533 #ifdef __cplusplus |
|
534 } |
|
535 #endif |
|
536 |
|
537 #include <openssl/x509_vfy.h> |
|
538 #include <openssl/pkcs7.h> |
|
539 |
|
540 #ifdef __cplusplus |
|
541 extern "C" { |
|
542 #endif |
|
543 |
|
544 #ifdef SSLEAY_MACROS |
|
545 #define X509_verify(a,r) ASN1_verify((int (*)())i2d_X509_CINF,a->sig_alg,\ |
|
546 a->signature,(char *)a->cert_info,r) |
|
547 #define X509_REQ_verify(a,r) ASN1_verify((int (*)())i2d_X509_REQ_INFO, \ |
|
548 a->sig_alg,a->signature,(char *)a->req_info,r) |
|
549 #define X509_CRL_verify(a,r) ASN1_verify((int (*)())i2d_X509_CRL_INFO, \ |
|
550 a->sig_alg, a->signature,(char *)a->crl,r) |
|
551 |
|
552 #define X509_sign(x,pkey,md) \ |
|
553 ASN1_sign((int (*)())i2d_X509_CINF, x->cert_info->signature, \ |
|
554 x->sig_alg, x->signature, (char *)x->cert_info,pkey,md) |
|
555 #define X509_REQ_sign(x,pkey,md) \ |
|
556 ASN1_sign((int (*)())i2d_X509_REQ_INFO,x->sig_alg, NULL, \ |
|
557 x->signature, (char *)x->req_info,pkey,md) |
|
558 #define X509_CRL_sign(x,pkey,md) \ |
|
559 ASN1_sign((int (*)())i2d_X509_CRL_INFO,x->crl->sig_alg,x->sig_alg, \ |
|
560 x->signature, (char *)x->crl,pkey,md) |
|
561 #define NETSCAPE_SPKI_sign(x,pkey,md) \ |
|
562 ASN1_sign((int (*)())i2d_NETSCAPE_SPKAC, x->sig_algor,NULL, \ |
|
563 x->signature, (char *)x->spkac,pkey,md) |
|
564 |
|
565 #define X509_dup(x509) (X509 *)ASN1_dup((int (*)())i2d_X509, \ |
|
566 (char *(*)())d2i_X509,(char *)x509) |
|
567 #define X509_ATTRIBUTE_dup(xa) (X509_ATTRIBUTE *)ASN1_dup(\ |
|
568 (int (*)())i2d_X509_ATTRIBUTE, \ |
|
569 (char *(*)())d2i_X509_ATTRIBUTE,(char *)xa) |
|
570 #define X509_EXTENSION_dup(ex) (X509_EXTENSION *)ASN1_dup( \ |
|
571 (int (*)())i2d_X509_EXTENSION, \ |
|
572 (char *(*)())d2i_X509_EXTENSION,(char *)ex) |
|
573 #define d2i_X509_fp(fp,x509) (X509 *)ASN1_d2i_fp((char *(*)())X509_new, \ |
|
574 (char *(*)())d2i_X509, (fp),(unsigned char **)(x509)) |
|
575 #define i2d_X509_fp(fp,x509) ASN1_i2d_fp(i2d_X509,fp,(unsigned char *)x509) |
|
576 #define d2i_X509_bio(bp,x509) (X509 *)ASN1_d2i_bio((char *(*)())X509_new, \ |
|
577 (char *(*)())d2i_X509, (bp),(unsigned char **)(x509)) |
|
578 #define i2d_X509_bio(bp,x509) ASN1_i2d_bio(i2d_X509,bp,(unsigned char *)x509) |
|
579 |
|
580 #define X509_CRL_dup(crl) (X509_CRL *)ASN1_dup((int (*)())i2d_X509_CRL, \ |
|
581 (char *(*)())d2i_X509_CRL,(char *)crl) |
|
582 #define d2i_X509_CRL_fp(fp,crl) (X509_CRL *)ASN1_d2i_fp((char *(*)()) \ |
|
583 X509_CRL_new,(char *(*)())d2i_X509_CRL, (fp),\ |
|
584 (unsigned char **)(crl)) |
|
585 #define i2d_X509_CRL_fp(fp,crl) ASN1_i2d_fp(i2d_X509_CRL,fp,\ |
|
586 (unsigned char *)crl) |
|
587 #define d2i_X509_CRL_bio(bp,crl) (X509_CRL *)ASN1_d2i_bio((char *(*)()) \ |
|
588 X509_CRL_new,(char *(*)())d2i_X509_CRL, (bp),\ |
|
589 (unsigned char **)(crl)) |
|
590 #define i2d_X509_CRL_bio(bp,crl) ASN1_i2d_bio(i2d_X509_CRL,bp,\ |
|
591 (unsigned char *)crl) |
|
592 |
|
593 #define PKCS7_dup(p7) (PKCS7 *)ASN1_dup((int (*)())i2d_PKCS7, \ |
|
594 (char *(*)())d2i_PKCS7,(char *)p7) |
|
595 #define d2i_PKCS7_fp(fp,p7) (PKCS7 *)ASN1_d2i_fp((char *(*)()) \ |
|
596 PKCS7_new,(char *(*)())d2i_PKCS7, (fp),\ |
|
597 (unsigned char **)(p7)) |
|
598 #define i2d_PKCS7_fp(fp,p7) ASN1_i2d_fp(i2d_PKCS7,fp,\ |
|
599 (unsigned char *)p7) |
|
600 #define d2i_PKCS7_bio(bp,p7) (PKCS7 *)ASN1_d2i_bio((char *(*)()) \ |
|
601 PKCS7_new,(char *(*)())d2i_PKCS7, (bp),\ |
|
602 (unsigned char **)(p7)) |
|
603 #define i2d_PKCS7_bio(bp,p7) ASN1_i2d_bio(i2d_PKCS7,bp,\ |
|
604 (unsigned char *)p7) |
|
605 |
|
606 #define X509_REQ_dup(req) (X509_REQ *)ASN1_dup((int (*)())i2d_X509_REQ, \ |
|
607 (char *(*)())d2i_X509_REQ,(char *)req) |
|
608 #define d2i_X509_REQ_fp(fp,req) (X509_REQ *)ASN1_d2i_fp((char *(*)())\ |
|
609 X509_REQ_new, (char *(*)())d2i_X509_REQ, (fp),\ |
|
610 (unsigned char **)(req)) |
|
611 #define i2d_X509_REQ_fp(fp,req) ASN1_i2d_fp(i2d_X509_REQ,fp,\ |
|
612 (unsigned char *)req) |
|
613 #define d2i_X509_REQ_bio(bp,req) (X509_REQ *)ASN1_d2i_bio((char *(*)())\ |
|
614 X509_REQ_new, (char *(*)())d2i_X509_REQ, (bp),\ |
|
615 (unsigned char **)(req)) |
|
616 #define i2d_X509_REQ_bio(bp,req) ASN1_i2d_bio(i2d_X509_REQ,bp,\ |
|
617 (unsigned char *)req) |
|
618 |
|
619 #define RSAPublicKey_dup(rsa) (RSA *)ASN1_dup((int (*)())i2d_RSAPublicKey, \ |
|
620 (char *(*)())d2i_RSAPublicKey,(char *)rsa) |
|
621 #define RSAPrivateKey_dup(rsa) (RSA *)ASN1_dup((int (*)())i2d_RSAPrivateKey, \ |
|
622 (char *(*)())d2i_RSAPrivateKey,(char *)rsa) |
|
623 |
|
624 #define d2i_RSAPrivateKey_fp(fp,rsa) (RSA *)ASN1_d2i_fp((char *(*)())\ |
|
625 RSA_new,(char *(*)())d2i_RSAPrivateKey, (fp), \ |
|
626 (unsigned char **)(rsa)) |
|
627 #define i2d_RSAPrivateKey_fp(fp,rsa) ASN1_i2d_fp(i2d_RSAPrivateKey,fp, \ |
|
628 (unsigned char *)rsa) |
|
629 #define d2i_RSAPrivateKey_bio(bp,rsa) (RSA *)ASN1_d2i_bio((char *(*)())\ |
|
630 RSA_new,(char *(*)())d2i_RSAPrivateKey, (bp), \ |
|
631 (unsigned char **)(rsa)) |
|
632 #define i2d_RSAPrivateKey_bio(bp,rsa) ASN1_i2d_bio(i2d_RSAPrivateKey,bp, \ |
|
633 (unsigned char *)rsa) |
|
634 |
|
635 #define d2i_RSAPublicKey_fp(fp,rsa) (RSA *)ASN1_d2i_fp((char *(*)())\ |
|
636 RSA_new,(char *(*)())d2i_RSAPublicKey, (fp), \ |
|
637 (unsigned char **)(rsa)) |
|
638 #define i2d_RSAPublicKey_fp(fp,rsa) ASN1_i2d_fp(i2d_RSAPublicKey,fp, \ |
|
639 (unsigned char *)rsa) |
|
640 #define d2i_RSAPublicKey_bio(bp,rsa) (RSA *)ASN1_d2i_bio((char *(*)())\ |
|
641 RSA_new,(char *(*)())d2i_RSAPublicKey, (bp), \ |
|
642 (unsigned char **)(rsa)) |
|
643 #define i2d_RSAPublicKey_bio(bp,rsa) ASN1_i2d_bio(i2d_RSAPublicKey,bp, \ |
|
644 (unsigned char *)rsa) |
|
645 |
|
646 #define d2i_DSAPrivateKey_fp(fp,dsa) (DSA *)ASN1_d2i_fp((char *(*)())\ |
|
647 DSA_new,(char *(*)())d2i_DSAPrivateKey, (fp), \ |
|
648 (unsigned char **)(dsa)) |
|
649 #define i2d_DSAPrivateKey_fp(fp,dsa) ASN1_i2d_fp(i2d_DSAPrivateKey,fp, \ |
|
650 (unsigned char *)dsa) |
|
651 #define d2i_DSAPrivateKey_bio(bp,dsa) (DSA *)ASN1_d2i_bio((char *(*)())\ |
|
652 DSA_new,(char *(*)())d2i_DSAPrivateKey, (bp), \ |
|
653 (unsigned char **)(dsa)) |
|
654 #define i2d_DSAPrivateKey_bio(bp,dsa) ASN1_i2d_bio(i2d_DSAPrivateKey,bp, \ |
|
655 (unsigned char *)dsa) |
|
656 |
|
657 #define X509_ALGOR_dup(xn) (X509_ALGOR *)ASN1_dup((int (*)())i2d_X509_ALGOR,\ |
|
658 (char *(*)())d2i_X509_ALGOR,(char *)xn) |
|
659 |
|
660 #define X509_NAME_dup(xn) (X509_NAME *)ASN1_dup((int (*)())i2d_X509_NAME, \ |
|
661 (char *(*)())d2i_X509_NAME,(char *)xn) |
|
662 #define X509_NAME_ENTRY_dup(ne) (X509_NAME_ENTRY *)ASN1_dup( \ |
|
663 (int (*)())i2d_X509_NAME_ENTRY, \ |
|
664 (char *(*)())d2i_X509_NAME_ENTRY,\ |
|
665 (char *)ne) |
|
666 |
|
667 #define X509_digest(data,type,md,len) \ |
|
668 ASN1_digest((int (*)())i2d_X509,type,(char *)data,md,len) |
|
669 #define X509_NAME_digest(data,type,md,len) \ |
|
670 ASN1_digest((int (*)())i2d_X509_NAME,type,(char *)data,md,len) |
|
671 #ifndef PKCS7_ISSUER_AND_SERIAL_digest |
|
672 #define PKCS7_ISSUER_AND_SERIAL_digest(data,type,md,len) \ |
|
673 ASN1_digest((int (*)())i2d_PKCS7_ISSUER_AND_SERIAL,type,\ |
|
674 (char *)data,md,len) |
|
675 #endif |
|
676 #endif |
|
677 |
|
678 #define X509_EXT_PACK_UNKNOWN 1 |
|
679 #define X509_EXT_PACK_STRING 2 |
|
680 |
|
681 #define X509_get_version(x) ASN1_INTEGER_get((x)->cert_info->version) |
|
682 /* #define X509_get_serialNumber(x) ((x)->cert_info->serialNumber) */ |
|
683 #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) |
|
684 #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) |
|
685 #define X509_extract_key(x) X509_get_pubkey(x) /*****/ |
|
686 #define X509_REQ_get_version(x) ASN1_INTEGER_get((x)->req_info->version) |
|
687 #define X509_REQ_get_subject_name(x) ((x)->req_info->subject) |
|
688 #define X509_REQ_extract_key(a) X509_REQ_get_pubkey(a) |
|
689 #define X509_name_cmp(a,b) X509_NAME_cmp((a),(b)) |
|
690 #define X509_get_signature_type(x) EVP_PKEY_type(OBJ_obj2nid((x)->sig_alg->algorithm)) |
|
691 |
|
692 #define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) |
|
693 #define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) |
|
694 #define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) |
|
695 #define X509_CRL_get_issuer(x) ((x)->crl->issuer) |
|
696 #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) |
|
697 |
|
698 /* This one is only used so that a binary form can output, as in |
|
699 * i2d_X509_NAME(X509_get_X509_PUBKEY(x),&buf) */ |
|
700 #define X509_get_X509_PUBKEY(x) ((x)->cert_info->key) |
|
701 |
|
702 |
|
703 const char *X509_verify_cert_error_string(long n); |
|
704 |
|
705 #ifndef SSLEAY_MACROS |
|
706 #ifndef OPENSSL_NO_EVP |
|
707 int X509_verify(X509 *a, EVP_PKEY *r); |
|
708 |
|
709 int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r); |
|
710 int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r); |
|
711 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r); |
|
712 |
|
713 NETSCAPE_SPKI * NETSCAPE_SPKI_b64_decode(const char *str, int len); |
|
714 char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *x); |
|
715 EVP_PKEY *NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x); |
|
716 int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey); |
|
717 |
|
718 int NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki); |
|
719 |
|
720 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); |
|
721 |
|
722 int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); |
|
723 int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); |
|
724 int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); |
|
725 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); |
|
726 |
|
727 int X509_pubkey_digest(const X509 *data,const EVP_MD *type, |
|
728 unsigned char *md, unsigned int *len); |
|
729 int X509_digest(const X509 *data,const EVP_MD *type, |
|
730 unsigned char *md, unsigned int *len); |
|
731 int X509_CRL_digest(const X509_CRL *data,const EVP_MD *type, |
|
732 unsigned char *md, unsigned int *len); |
|
733 int X509_REQ_digest(const X509_REQ *data,const EVP_MD *type, |
|
734 unsigned char *md, unsigned int *len); |
|
735 int X509_NAME_digest(const X509_NAME *data,const EVP_MD *type, |
|
736 unsigned char *md, unsigned int *len); |
|
737 #endif |
|
738 |
|
739 #ifndef OPENSSL_NO_FP_API |
|
740 X509 *d2i_X509_fp(FILE *fp, X509 **x509); |
|
741 int i2d_X509_fp(FILE *fp,X509 *x509); |
|
742 X509_CRL *d2i_X509_CRL_fp(FILE *fp,X509_CRL **crl); |
|
743 int i2d_X509_CRL_fp(FILE *fp,X509_CRL *crl); |
|
744 X509_REQ *d2i_X509_REQ_fp(FILE *fp,X509_REQ **req); |
|
745 int i2d_X509_REQ_fp(FILE *fp,X509_REQ *req); |
|
746 #ifndef OPENSSL_NO_RSA |
|
747 RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa); |
|
748 int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa); |
|
749 RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa); |
|
750 int i2d_RSAPublicKey_fp(FILE *fp,RSA *rsa); |
|
751 RSA *d2i_RSA_PUBKEY_fp(FILE *fp,RSA **rsa); |
|
752 int i2d_RSA_PUBKEY_fp(FILE *fp,RSA *rsa); |
|
753 #endif |
|
754 #ifndef OPENSSL_NO_DSA |
|
755 DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); |
|
756 int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa); |
|
757 DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); |
|
758 int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa); |
|
759 #endif |
|
760 X509_SIG *d2i_PKCS8_fp(FILE *fp,X509_SIG **p8); |
|
761 int i2d_PKCS8_fp(FILE *fp,X509_SIG *p8); |
|
762 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, |
|
763 PKCS8_PRIV_KEY_INFO **p8inf); |
|
764 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,PKCS8_PRIV_KEY_INFO *p8inf); |
|
765 int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key); |
|
766 int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey); |
|
767 EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a); |
|
768 int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey); |
|
769 EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a); |
|
770 #endif |
|
771 |
|
772 #ifndef OPENSSL_NO_BIO |
|
773 X509 *d2i_X509_bio(BIO *bp,X509 **x509); |
|
774 int i2d_X509_bio(BIO *bp,X509 *x509); |
|
775 X509_CRL *d2i_X509_CRL_bio(BIO *bp,X509_CRL **crl); |
|
776 int i2d_X509_CRL_bio(BIO *bp,X509_CRL *crl); |
|
777 X509_REQ *d2i_X509_REQ_bio(BIO *bp,X509_REQ **req); |
|
778 int i2d_X509_REQ_bio(BIO *bp,X509_REQ *req); |
|
779 #ifndef OPENSSL_NO_RSA |
|
780 RSA *d2i_RSAPrivateKey_bio(BIO *bp,RSA **rsa); |
|
781 int i2d_RSAPrivateKey_bio(BIO *bp,RSA *rsa); |
|
782 RSA *d2i_RSAPublicKey_bio(BIO *bp,RSA **rsa); |
|
783 int i2d_RSAPublicKey_bio(BIO *bp,RSA *rsa); |
|
784 RSA *d2i_RSA_PUBKEY_bio(BIO *bp,RSA **rsa); |
|
785 int i2d_RSA_PUBKEY_bio(BIO *bp,RSA *rsa); |
|
786 #endif |
|
787 #ifndef OPENSSL_NO_DSA |
|
788 DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa); |
|
789 int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa); |
|
790 DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa); |
|
791 int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa); |
|
792 #endif |
|
793 X509_SIG *d2i_PKCS8_bio(BIO *bp,X509_SIG **p8); |
|
794 int i2d_PKCS8_bio(BIO *bp,X509_SIG *p8); |
|
795 PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, |
|
796 PKCS8_PRIV_KEY_INFO **p8inf); |
|
797 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,PKCS8_PRIV_KEY_INFO *p8inf); |
|
798 int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key); |
|
799 int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey); |
|
800 EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a); |
|
801 int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey); |
|
802 EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a); |
|
803 #endif |
|
804 |
|
805 X509 *X509_dup(X509 *x509); |
|
806 X509_ATTRIBUTE *X509_ATTRIBUTE_dup(X509_ATTRIBUTE *xa); |
|
807 X509_EXTENSION *X509_EXTENSION_dup(X509_EXTENSION *ex); |
|
808 X509_CRL *X509_CRL_dup(X509_CRL *crl); |
|
809 X509_REQ *X509_REQ_dup(X509_REQ *req); |
|
810 X509_ALGOR *X509_ALGOR_dup(X509_ALGOR *xn); |
|
811 X509_NAME *X509_NAME_dup(X509_NAME *xn); |
|
812 X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne); |
|
813 #ifndef OPENSSL_NO_RSA |
|
814 RSA *RSAPublicKey_dup(RSA *rsa); |
|
815 RSA *RSAPrivateKey_dup(RSA *rsa); |
|
816 #endif |
|
817 |
|
818 #endif /* !SSLEAY_MACROS */ |
|
819 |
|
820 int X509_cmp_time(ASN1_TIME *s, time_t *t); |
|
821 int X509_cmp_current_time(ASN1_TIME *s); |
|
822 ASN1_TIME * X509_time_adj(ASN1_TIME *s, long adj, time_t *t); |
|
823 ASN1_TIME * X509_gmtime_adj(ASN1_TIME *s, long adj); |
|
824 |
|
825 const char * X509_get_default_cert_area(void ); |
|
826 const char * X509_get_default_cert_dir(void ); |
|
827 const char * X509_get_default_cert_file(void ); |
|
828 const char * X509_get_default_cert_dir_env(void ); |
|
829 const char * X509_get_default_cert_file_env(void ); |
|
830 const char * X509_get_default_private_dir(void ); |
|
831 |
|
832 X509_REQ * X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); |
|
833 X509 * X509_REQ_to_X509(X509_REQ *r, int days,EVP_PKEY *pkey); |
|
834 |
|
835 DECLARE_ASN1_FUNCTIONS(X509_ALGOR) |
|
836 DECLARE_ASN1_FUNCTIONS(X509_VAL) |
|
837 |
|
838 DECLARE_ASN1_FUNCTIONS(X509_PUBKEY) |
|
839 |
|
840 int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey); |
|
841 EVP_PKEY * X509_PUBKEY_get(X509_PUBKEY *key); |
|
842 int X509_get_pubkey_parameters(EVP_PKEY *pkey, |
|
843 STACK_OF(X509) *chain); |
|
844 int i2d_PUBKEY(EVP_PKEY *a,unsigned char **pp); |
|
845 EVP_PKEY * d2i_PUBKEY(EVP_PKEY **a,unsigned char **pp, |
|
846 long length); |
|
847 #ifndef OPENSSL_NO_RSA |
|
848 int i2d_RSA_PUBKEY(RSA *a,unsigned char **pp); |
|
849 RSA * d2i_RSA_PUBKEY(RSA **a,unsigned char **pp, |
|
850 long length); |
|
851 #endif |
|
852 #ifndef OPENSSL_NO_DSA |
|
853 int i2d_DSA_PUBKEY(DSA *a,unsigned char **pp); |
|
854 DSA * d2i_DSA_PUBKEY(DSA **a,unsigned char **pp, |
|
855 long length); |
|
856 #endif |
|
857 |
|
858 DECLARE_ASN1_FUNCTIONS(X509_SIG) |
|
859 DECLARE_ASN1_FUNCTIONS(X509_REQ_INFO) |
|
860 DECLARE_ASN1_FUNCTIONS(X509_REQ) |
|
861 |
|
862 DECLARE_ASN1_FUNCTIONS(X509_ATTRIBUTE) |
|
863 X509_ATTRIBUTE *X509_ATTRIBUTE_create(int nid, int atrtype, void *value); |
|
864 |
|
865 DECLARE_ASN1_FUNCTIONS(X509_EXTENSION) |
|
866 |
|
867 DECLARE_ASN1_FUNCTIONS(X509_NAME_ENTRY) |
|
868 |
|
869 DECLARE_ASN1_FUNCTIONS(X509_NAME) |
|
870 |
|
871 int X509_NAME_set(X509_NAME **xn, X509_NAME *name); |
|
872 |
|
873 DECLARE_ASN1_FUNCTIONS(X509_CINF) |
|
874 |
|
875 DECLARE_ASN1_FUNCTIONS(X509) |
|
876 DECLARE_ASN1_FUNCTIONS(X509_CERT_AUX) |
|
877 |
|
878 int X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
|
879 CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); |
|
880 int X509_set_ex_data(X509 *r, int idx, void *arg); |
|
881 void *X509_get_ex_data(X509 *r, int idx); |
|
882 int i2d_X509_AUX(X509 *a,unsigned char **pp); |
|
883 X509 * d2i_X509_AUX(X509 **a,unsigned char **pp,long length); |
|
884 |
|
885 int X509_alias_set1(X509 *x, unsigned char *name, int len); |
|
886 int X509_keyid_set1(X509 *x, unsigned char *id, int len); |
|
887 unsigned char * X509_alias_get0(X509 *x, int *len); |
|
888 int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); |
|
889 int X509_TRUST_set(int *t, int trust); |
|
890 int X509_add1_trust_object(X509 *x, ASN1_OBJECT *obj); |
|
891 int X509_add1_reject_object(X509 *x, ASN1_OBJECT *obj); |
|
892 void X509_trust_clear(X509 *x); |
|
893 void X509_reject_clear(X509 *x); |
|
894 |
|
895 DECLARE_ASN1_FUNCTIONS(X509_REVOKED) |
|
896 DECLARE_ASN1_FUNCTIONS(X509_CRL_INFO) |
|
897 DECLARE_ASN1_FUNCTIONS(X509_CRL) |
|
898 |
|
899 int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev); |
|
900 |
|
901 X509_PKEY * X509_PKEY_new(void ); |
|
902 void X509_PKEY_free(X509_PKEY *a); |
|
903 int i2d_X509_PKEY(X509_PKEY *a,unsigned char **pp); |
|
904 X509_PKEY * d2i_X509_PKEY(X509_PKEY **a,unsigned char **pp,long length); |
|
905 |
|
906 DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKI) |
|
907 DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKAC) |
|
908 DECLARE_ASN1_FUNCTIONS(NETSCAPE_CERT_SEQUENCE) |
|
909 |
|
910 #ifndef OPENSSL_NO_EVP |
|
911 X509_INFO * X509_INFO_new(void); |
|
912 void X509_INFO_free(X509_INFO *a); |
|
913 char * X509_NAME_oneline(X509_NAME *a,char *buf,int size); |
|
914 |
|
915 int ASN1_verify(int (*i2d)(), X509_ALGOR *algor1, |
|
916 ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); |
|
917 |
|
918 int ASN1_digest(int (*i2d)(),const EVP_MD *type,char *data, |
|
919 unsigned char *md,unsigned int *len); |
|
920 |
|
921 int ASN1_sign(int (*i2d)(), X509_ALGOR *algor1, X509_ALGOR *algor2, |
|
922 ASN1_BIT_STRING *signature, |
|
923 char *data,EVP_PKEY *pkey, const EVP_MD *type); |
|
924 |
|
925 int ASN1_item_digest(const ASN1_ITEM *it,const EVP_MD *type,void *data, |
|
926 unsigned char *md,unsigned int *len); |
|
927 |
|
928 int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *algor1, |
|
929 ASN1_BIT_STRING *signature,void *data,EVP_PKEY *pkey); |
|
930 |
|
931 int ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, |
|
932 ASN1_BIT_STRING *signature, |
|
933 void *data, EVP_PKEY *pkey, const EVP_MD *type); |
|
934 #endif |
|
935 |
|
936 int X509_set_version(X509 *x,long version); |
|
937 int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial); |
|
938 ASN1_INTEGER * X509_get_serialNumber(X509 *x); |
|
939 int X509_set_issuer_name(X509 *x, X509_NAME *name); |
|
940 X509_NAME * X509_get_issuer_name(X509 *a); |
|
941 int X509_set_subject_name(X509 *x, X509_NAME *name); |
|
942 X509_NAME * X509_get_subject_name(X509 *a); |
|
943 int X509_set_notBefore(X509 *x, ASN1_TIME *tm); |
|
944 int X509_set_notAfter(X509 *x, ASN1_TIME *tm); |
|
945 int X509_set_pubkey(X509 *x, EVP_PKEY *pkey); |
|
946 EVP_PKEY * X509_get_pubkey(X509 *x); |
|
947 ASN1_BIT_STRING * X509_get0_pubkey_bitstr(const X509 *x); |
|
948 int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); |
|
949 |
|
950 int X509_REQ_set_version(X509_REQ *x,long version); |
|
951 int X509_REQ_set_subject_name(X509_REQ *req,X509_NAME *name); |
|
952 int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey); |
|
953 EVP_PKEY * X509_REQ_get_pubkey(X509_REQ *req); |
|
954 int X509_REQ_extension_nid(int nid); |
|
955 int * X509_REQ_get_extension_nids(void); |
|
956 void X509_REQ_set_extension_nids(int *nids); |
|
957 STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); |
|
958 int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, |
|
959 int nid); |
|
960 int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts); |
|
961 int X509_REQ_get_attr_count(const X509_REQ *req); |
|
962 int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, |
|
963 int lastpos); |
|
964 int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj, |
|
965 int lastpos); |
|
966 X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc); |
|
967 X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc); |
|
968 int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr); |
|
969 int X509_REQ_add1_attr_by_OBJ(X509_REQ *req, |
|
970 const ASN1_OBJECT *obj, int type, |
|
971 const unsigned char *bytes, int len); |
|
972 int X509_REQ_add1_attr_by_NID(X509_REQ *req, |
|
973 int nid, int type, |
|
974 const unsigned char *bytes, int len); |
|
975 int X509_REQ_add1_attr_by_txt(X509_REQ *req, |
|
976 const char *attrname, int type, |
|
977 const unsigned char *bytes, int len); |
|
978 |
|
979 int X509_CRL_set_version(X509_CRL *x, long version); |
|
980 int X509_CRL_set_issuer_name(X509_CRL *x, X509_NAME *name); |
|
981 int X509_CRL_set_lastUpdate(X509_CRL *x, ASN1_TIME *tm); |
|
982 int X509_CRL_set_nextUpdate(X509_CRL *x, ASN1_TIME *tm); |
|
983 int X509_CRL_sort(X509_CRL *crl); |
|
984 |
|
985 int X509_REVOKED_set_serialNumber(X509_REVOKED *x, ASN1_INTEGER *serial); |
|
986 int X509_REVOKED_set_revocationDate(X509_REVOKED *r, ASN1_TIME *tm); |
|
987 |
|
988 int X509_check_private_key(X509 *x509,EVP_PKEY *pkey); |
|
989 |
|
990 int X509_issuer_and_serial_cmp(const X509 *a, const X509 *b); |
|
991 unsigned long X509_issuer_and_serial_hash(X509 *a); |
|
992 |
|
993 int X509_issuer_name_cmp(const X509 *a, const X509 *b); |
|
994 unsigned long X509_issuer_name_hash(X509 *a); |
|
995 |
|
996 int X509_subject_name_cmp(const X509 *a, const X509 *b); |
|
997 unsigned long X509_subject_name_hash(X509 *x); |
|
998 |
|
999 int X509_cmp(const X509 *a, const X509 *b); |
|
1000 int X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b); |
|
1001 unsigned long X509_NAME_hash(X509_NAME *x); |
|
1002 |
|
1003 int X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b); |
|
1004 #ifndef OPENSSL_NO_FP_API |
|
1005 int X509_print_ex_fp(FILE *bp,X509 *x, unsigned long nmflag, unsigned long cflag); |
|
1006 int X509_print_fp(FILE *bp,X509 *x); |
|
1007 int X509_CRL_print_fp(FILE *bp,X509_CRL *x); |
|
1008 int X509_REQ_print_fp(FILE *bp,X509_REQ *req); |
|
1009 int X509_NAME_print_ex_fp(FILE *fp, X509_NAME *nm, int indent, unsigned long flags); |
|
1010 #endif |
|
1011 |
|
1012 #ifndef OPENSSL_NO_BIO |
|
1013 int X509_NAME_print(BIO *bp, X509_NAME *name, int obase); |
|
1014 int X509_NAME_print_ex(BIO *out, X509_NAME *nm, int indent, unsigned long flags); |
|
1015 int X509_print_ex(BIO *bp,X509 *x, unsigned long nmflag, unsigned long cflag); |
|
1016 int X509_print(BIO *bp,X509 *x); |
|
1017 int X509_ocspid_print(BIO *bp,X509 *x); |
|
1018 int X509_CERT_AUX_print(BIO *bp,X509_CERT_AUX *x, int indent); |
|
1019 int X509_CRL_print(BIO *bp,X509_CRL *x); |
|
1020 int X509_REQ_print_ex(BIO *bp, X509_REQ *x, unsigned long nmflag, unsigned long cflag); |
|
1021 int X509_REQ_print(BIO *bp,X509_REQ *req); |
|
1022 #endif |
|
1023 |
|
1024 int X509_NAME_entry_count(X509_NAME *name); |
|
1025 int X509_NAME_get_text_by_NID(X509_NAME *name, int nid, |
|
1026 char *buf,int len); |
|
1027 int X509_NAME_get_text_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, |
|
1028 char *buf,int len); |
|
1029 |
|
1030 /* NOTE: you should be passsing -1, not 0 as lastpos. The functions that use |
|
1031 * lastpos, search after that position on. */ |
|
1032 int X509_NAME_get_index_by_NID(X509_NAME *name,int nid,int lastpos); |
|
1033 int X509_NAME_get_index_by_OBJ(X509_NAME *name,ASN1_OBJECT *obj, |
|
1034 int lastpos); |
|
1035 X509_NAME_ENTRY *X509_NAME_get_entry(X509_NAME *name, int loc); |
|
1036 X509_NAME_ENTRY *X509_NAME_delete_entry(X509_NAME *name, int loc); |
|
1037 int X509_NAME_add_entry(X509_NAME *name,X509_NAME_ENTRY *ne, |
|
1038 int loc, int set); |
|
1039 int X509_NAME_add_entry_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, int type, |
|
1040 unsigned char *bytes, int len, int loc, int set); |
|
1041 int X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, |
|
1042 unsigned char *bytes, int len, int loc, int set); |
|
1043 X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, |
|
1044 char *field, int type, unsigned char *bytes, int len); |
|
1045 X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, |
|
1046 int type,unsigned char *bytes, int len); |
|
1047 int X509_NAME_add_entry_by_txt(X509_NAME *name, char *field, int type, |
|
1048 unsigned char *bytes, int len, int loc, int set); |
|
1049 X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, |
|
1050 ASN1_OBJECT *obj, int type,unsigned char *bytes, |
|
1051 int len); |
|
1052 int X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, |
|
1053 ASN1_OBJECT *obj); |
|
1054 int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, |
|
1055 unsigned char *bytes, int len); |
|
1056 ASN1_OBJECT * X509_NAME_ENTRY_get_object(X509_NAME_ENTRY *ne); |
|
1057 ASN1_STRING * X509_NAME_ENTRY_get_data(X509_NAME_ENTRY *ne); |
|
1058 |
|
1059 int X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x); |
|
1060 int X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, |
|
1061 int nid, int lastpos); |
|
1062 int X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *x, |
|
1063 ASN1_OBJECT *obj,int lastpos); |
|
1064 int X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *x, |
|
1065 int crit, int lastpos); |
|
1066 X509_EXTENSION *X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc); |
|
1067 X509_EXTENSION *X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc); |
|
1068 STACK_OF(X509_EXTENSION) *X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, |
|
1069 X509_EXTENSION *ex, int loc); |
|
1070 |
|
1071 int X509_get_ext_count(X509 *x); |
|
1072 int X509_get_ext_by_NID(X509 *x, int nid, int lastpos); |
|
1073 int X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,int lastpos); |
|
1074 int X509_get_ext_by_critical(X509 *x, int crit, int lastpos); |
|
1075 X509_EXTENSION *X509_get_ext(X509 *x, int loc); |
|
1076 X509_EXTENSION *X509_delete_ext(X509 *x, int loc); |
|
1077 int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc); |
|
1078 void * X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx); |
|
1079 int X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, |
|
1080 unsigned long flags); |
|
1081 |
|
1082 int X509_CRL_get_ext_count(X509_CRL *x); |
|
1083 int X509_CRL_get_ext_by_NID(X509_CRL *x, int nid, int lastpos); |
|
1084 int X509_CRL_get_ext_by_OBJ(X509_CRL *x,ASN1_OBJECT *obj,int lastpos); |
|
1085 int X509_CRL_get_ext_by_critical(X509_CRL *x, int crit, int lastpos); |
|
1086 X509_EXTENSION *X509_CRL_get_ext(X509_CRL *x, int loc); |
|
1087 X509_EXTENSION *X509_CRL_delete_ext(X509_CRL *x, int loc); |
|
1088 int X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc); |
|
1089 void * X509_CRL_get_ext_d2i(X509_CRL *x, int nid, int *crit, int *idx); |
|
1090 int X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, |
|
1091 unsigned long flags); |
|
1092 |
|
1093 int X509_REVOKED_get_ext_count(X509_REVOKED *x); |
|
1094 int X509_REVOKED_get_ext_by_NID(X509_REVOKED *x, int nid, int lastpos); |
|
1095 int X509_REVOKED_get_ext_by_OBJ(X509_REVOKED *x,ASN1_OBJECT *obj,int lastpos); |
|
1096 int X509_REVOKED_get_ext_by_critical(X509_REVOKED *x, int crit, int lastpos); |
|
1097 X509_EXTENSION *X509_REVOKED_get_ext(X509_REVOKED *x, int loc); |
|
1098 X509_EXTENSION *X509_REVOKED_delete_ext(X509_REVOKED *x, int loc); |
|
1099 int X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc); |
|
1100 void * X509_REVOKED_get_ext_d2i(X509_REVOKED *x, int nid, int *crit, int *idx); |
|
1101 int X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, |
|
1102 unsigned long flags); |
|
1103 |
|
1104 X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, |
|
1105 int nid, int crit, ASN1_OCTET_STRING *data); |
|
1106 X509_EXTENSION *X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, |
|
1107 ASN1_OBJECT *obj,int crit,ASN1_OCTET_STRING *data); |
|
1108 int X509_EXTENSION_set_object(X509_EXTENSION *ex,ASN1_OBJECT *obj); |
|
1109 int X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit); |
|
1110 int X509_EXTENSION_set_data(X509_EXTENSION *ex, |
|
1111 ASN1_OCTET_STRING *data); |
|
1112 ASN1_OBJECT * X509_EXTENSION_get_object(X509_EXTENSION *ex); |
|
1113 ASN1_OCTET_STRING *X509_EXTENSION_get_data(X509_EXTENSION *ne); |
|
1114 int X509_EXTENSION_get_critical(X509_EXTENSION *ex); |
|
1115 |
|
1116 int X509at_get_attr_count(const STACK_OF(X509_ATTRIBUTE) *x); |
|
1117 int X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, |
|
1118 int lastpos); |
|
1119 int X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, ASN1_OBJECT *obj, |
|
1120 int lastpos); |
|
1121 X509_ATTRIBUTE *X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc); |
|
1122 X509_ATTRIBUTE *X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc); |
|
1123 STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, |
|
1124 X509_ATTRIBUTE *attr); |
|
1125 STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, |
|
1126 const ASN1_OBJECT *obj, int type, |
|
1127 const unsigned char *bytes, int len); |
|
1128 STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, |
|
1129 int nid, int type, |
|
1130 const unsigned char *bytes, int len); |
|
1131 STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, |
|
1132 const char *attrname, int type, |
|
1133 const unsigned char *bytes, int len); |
|
1134 X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, |
|
1135 int atrtype, const void *data, int len); |
|
1136 X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, |
|
1137 const ASN1_OBJECT *obj, int atrtype, const void *data, int len); |
|
1138 X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, |
|
1139 const char *atrname, int type, const unsigned char *bytes, int len); |
|
1140 int X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, const ASN1_OBJECT *obj); |
|
1141 int X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, const void *data, int len); |
|
1142 void *X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, |
|
1143 int atrtype, void *data); |
|
1144 int X509_ATTRIBUTE_count(X509_ATTRIBUTE *attr); |
|
1145 ASN1_OBJECT *X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr); |
|
1146 ASN1_TYPE *X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx); |
|
1147 |
|
1148 int X509_verify_cert(X509_STORE_CTX *ctx); |
|
1149 |
|
1150 /* lookup a cert from a X509 STACK */ |
|
1151 X509 *X509_find_by_issuer_and_serial(STACK_OF(X509) *sk,X509_NAME *name, |
|
1152 ASN1_INTEGER *serial); |
|
1153 X509 *X509_find_by_subject(STACK_OF(X509) *sk,X509_NAME *name); |
|
1154 |
|
1155 DECLARE_ASN1_FUNCTIONS(PBEPARAM) |
|
1156 DECLARE_ASN1_FUNCTIONS(PBE2PARAM) |
|
1157 DECLARE_ASN1_FUNCTIONS(PBKDF2PARAM) |
|
1158 |
|
1159 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen); |
|
1160 X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, |
|
1161 unsigned char *salt, int saltlen); |
|
1162 |
|
1163 /* PKCS#8 utilities */ |
|
1164 |
|
1165 DECLARE_ASN1_FUNCTIONS(PKCS8_PRIV_KEY_INFO) |
|
1166 |
|
1167 EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8); |
|
1168 PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey); |
|
1169 PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken); |
|
1170 PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken); |
|
1171 |
|
1172 int X509_check_trust(X509 *x, int id, int flags); |
|
1173 int X509_TRUST_get_count(void); |
|
1174 X509_TRUST * X509_TRUST_get0(int idx); |
|
1175 int X509_TRUST_get_by_id(int id); |
|
1176 int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), |
|
1177 char *name, int arg1, void *arg2); |
|
1178 void X509_TRUST_cleanup(void); |
|
1179 int X509_TRUST_get_flags(X509_TRUST *xp); |
|
1180 char *X509_TRUST_get0_name(X509_TRUST *xp); |
|
1181 int X509_TRUST_get_trust(X509_TRUST *xp); |
|
1182 |
|
1183 /* BEGIN ERROR CODES */ |
|
1184 /* The following lines are auto generated by the script mkerr.pl. Any changes |
|
1185 * made after this point may be overwritten when the script is next run. |
|
1186 */ |
|
1187 void ERR_load_X509_strings(void); |
|
1188 |
|
1189 /* Error codes for the X509 functions. */ |
|
1190 |
|
1191 /* Function codes. */ |
|
1192 #define X509_F_ADD_CERT_DIR 100 |
|
1193 #define X509_F_BY_FILE_CTRL 101 |
|
1194 #define X509_F_DIR_CTRL 102 |
|
1195 #define X509_F_GET_CERT_BY_SUBJECT 103 |
|
1196 #define X509_F_NETSCAPE_SPKI_B64_DECODE 129 |
|
1197 #define X509_F_NETSCAPE_SPKI_B64_ENCODE 130 |
|
1198 #define X509_F_X509V3_ADD_EXT 104 |
|
1199 #define X509_F_X509_ADD_ATTR 135 |
|
1200 #define X509_F_X509_ATTRIBUTE_CREATE_BY_NID 136 |
|
1201 #define X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ 137 |
|
1202 #define X509_F_X509_ATTRIBUTE_CREATE_BY_TXT 140 |
|
1203 #define X509_F_X509_ATTRIBUTE_GET0_DATA 139 |
|
1204 #define X509_F_X509_ATTRIBUTE_SET1_DATA 138 |
|
1205 #define X509_F_X509_CHECK_PRIVATE_KEY 128 |
|
1206 #define X509_F_X509_EXTENSION_CREATE_BY_NID 108 |
|
1207 #define X509_F_X509_EXTENSION_CREATE_BY_OBJ 109 |
|
1208 #define X509_F_X509_GET_PUBKEY_PARAMETERS 110 |
|
1209 #define X509_F_X509_LOAD_CERT_CRL_FILE 132 |
|
1210 #define X509_F_X509_LOAD_CERT_FILE 111 |
|
1211 #define X509_F_X509_LOAD_CRL_FILE 112 |
|
1212 #define X509_F_X509_NAME_ADD_ENTRY 113 |
|
1213 #define X509_F_X509_NAME_ENTRY_CREATE_BY_NID 114 |
|
1214 #define X509_F_X509_NAME_ENTRY_CREATE_BY_TXT 131 |
|
1215 #define X509_F_X509_NAME_ENTRY_SET_OBJECT 115 |
|
1216 #define X509_F_X509_NAME_ONELINE 116 |
|
1217 #define X509_F_X509_NAME_PRINT 117 |
|
1218 #define X509_F_X509_PRINT_FP 118 |
|
1219 #define X509_F_X509_PUBKEY_GET 119 |
|
1220 #define X509_F_X509_PUBKEY_SET 120 |
|
1221 #define X509_F_X509_REQ_PRINT 121 |
|
1222 #define X509_F_X509_REQ_PRINT_FP 122 |
|
1223 #define X509_F_X509_REQ_TO_X509 123 |
|
1224 #define X509_F_X509_STORE_ADD_CERT 124 |
|
1225 #define X509_F_X509_STORE_ADD_CRL 125 |
|
1226 #define X509_F_X509_STORE_CTX_INIT 143 |
|
1227 #define X509_F_X509_STORE_CTX_NEW 142 |
|
1228 #define X509_F_X509_STORE_CTX_PURPOSE_INHERIT 134 |
|
1229 #define X509_F_X509_TO_X509_REQ 126 |
|
1230 #define X509_F_X509_TRUST_ADD 133 |
|
1231 #define X509_F_X509_TRUST_SET 141 |
|
1232 #define X509_F_X509_VERIFY_CERT 127 |
|
1233 |
|
1234 /* Reason codes. */ |
|
1235 #define X509_R_BAD_X509_FILETYPE 100 |
|
1236 #define X509_R_BASE64_DECODE_ERROR 118 |
|
1237 #define X509_R_CANT_CHECK_DH_KEY 114 |
|
1238 #define X509_R_CERT_ALREADY_IN_HASH_TABLE 101 |
|
1239 #define X509_R_ERR_ASN1_LIB 102 |
|
1240 #define X509_R_INVALID_DIRECTORY 113 |
|
1241 #define X509_R_INVALID_FIELD_NAME 119 |
|
1242 #define X509_R_INVALID_TRUST 123 |
|
1243 #define X509_R_KEY_TYPE_MISMATCH 115 |
|
1244 #define X509_R_KEY_VALUES_MISMATCH 116 |
|
1245 #define X509_R_LOADING_CERT_DIR 103 |
|
1246 #define X509_R_LOADING_DEFAULTS 104 |
|
1247 #define X509_R_NO_CERT_SET_FOR_US_TO_VERIFY 105 |
|
1248 #define X509_R_SHOULD_RETRY 106 |
|
1249 #define X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN 107 |
|
1250 #define X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY 108 |
|
1251 #define X509_R_UNKNOWN_KEY_TYPE 117 |
|
1252 #define X509_R_UNKNOWN_NID 109 |
|
1253 #define X509_R_UNKNOWN_PURPOSE_ID 121 |
|
1254 #define X509_R_UNKNOWN_TRUST_ID 120 |
|
1255 #define X509_R_UNSUPPORTED_ALGORITHM 111 |
|
1256 #define X509_R_WRONG_LOOKUP_TYPE 112 |
|
1257 #define X509_R_WRONG_TYPE 122 |
|
1258 |
|
1259 #ifdef __cplusplus |
|
1260 } |
|
1261 #endif |
|
1262 #endif |
|
1263 |