]> git.ipfire.org Git - thirdparty/openssl.git/blob - doc/man3/OSSL_CMP_exec_certreq.pod
CMP: add support for genm/genp messages with id-it-caCerts
[thirdparty/openssl.git] / doc / man3 / OSSL_CMP_exec_certreq.pod
1 =pod
2
3 =head1 NAME
4
5 OSSL_CMP_exec_certreq,
6 OSSL_CMP_exec_IR_ses,
7 OSSL_CMP_exec_CR_ses,
8 OSSL_CMP_exec_P10CR_ses,
9 OSSL_CMP_exec_KUR_ses,
10 OSSL_CMP_IR,
11 OSSL_CMP_CR,
12 OSSL_CMP_P10CR,
13 OSSL_CMP_KUR,
14 OSSL_CMP_try_certreq,
15 OSSL_CMP_exec_RR_ses,
16 OSSL_CMP_exec_GENM_ses,
17 OSSL_CMP_get_caCerts
18 - functions implementing CMP client transactions
19
20 =head1 SYNOPSIS
21
22 #include <openssl/cmp.h>
23
24 X509 *OSSL_CMP_exec_certreq(OSSL_CMP_CTX *ctx, int req_type,
25 const OSSL_CRMF_MSG *crm);
26 X509 *OSSL_CMP_exec_IR_ses(OSSL_CMP_CTX *ctx);
27 X509 *OSSL_CMP_exec_CR_ses(OSSL_CMP_CTX *ctx);
28 X509 *OSSL_CMP_exec_P10CR_ses(OSSL_CMP_CTX *ctx);
29 X509 *OSSL_CMP_exec_KUR_ses(OSSL_CMP_CTX *ctx);
30 #define OSSL_CMP_IR
31 #define OSSL_CMP_CR
32 #define OSSL_CMP_P10CR
33 #define OSSL_CMP_KUR
34 int OSSL_CMP_try_certreq(OSSL_CMP_CTX *ctx, int req_type,
35 const OSSL_CRMF_MSG *crm, int *checkAfter);
36 int OSSL_CMP_exec_RR_ses(OSSL_CMP_CTX *ctx);
37 STACK_OF(OSSL_CMP_ITAV) *OSSL_CMP_exec_GENM_ses(OSSL_CMP_CTX *ctx);
38 int OSSL_CMP_get_caCerts(OSSL_CMP_CTX *ctx, STACK_OF(X509) **out);
39
40 =head1 DESCRIPTION
41
42 This is the OpenSSL API for doing CMP (Certificate Management Protocol)
43 client-server transactions, i.e., sequences of CMP requests and responses.
44
45 All functions take a populated OSSL_CMP_CTX structure as their first argument.
46 Usually the server name, port, and path ("CMP alias") need to be set, as well as
47 credentials the client can use for authenticating itself to the client.
48 In order to authenticate the server the client typically needs a trust store.
49 The functions return their respective main results directly, while there are
50 also accessor functions for retrieving various results and status information
51 from the I<ctx>. See L<OSSL_CMP_CTX_new(3)> etc. for details.
52
53 The default conveying protocol is HTTP.
54 Timeout values may be given per request-response pair and per transaction.
55 See L<OSSL_CMP_MSG_http_perform(3)> for details.
56
57 OSSL_CMP_exec_IR_ses() requests an initial certificate from the given PKI.
58
59 OSSL_CMP_exec_CR_ses() requests an additional certificate.
60
61 OSSL_CMP_exec_P10CR_ses() conveys a legacy PKCS#10 CSR requesting a certificate.
62
63 OSSL_CMP_exec_KUR_ses() obtains an updated certificate.
64
65 These four types of certificate enrollment are implemented as macros
66 calling OSSL_CMP_exec_certreq().
67
68 OSSL_CMP_exec_certreq() performs a certificate request of the type specified
69 by the I<req_type> parameter, which may be IR, CR, P10CR, or KUR.
70 For IR, CR, and KUR, the certificate template to be used in the request
71 may be supplied via the I<crm> parameter pointing to a CRMF structure.
72 Typically I<crm> is NULL, then the template ingredients are taken from I<ctx>
73 and need to be filled in using L<OSSL_CMP_CTX_set1_subjectName(3)>,
74 L<OSSL_CMP_CTX_set0_newPkey(3)>, L<OSSL_CMP_CTX_set1_oldCert(3)>, etc.
75 For P10CR, L<OSSL_CMP_CTX_set1_p10CSR(3)> needs to be used instead.
76 The enrollment session may be blocked by sleeping until the addressed
77 CA (or an intermedate PKI component) can fully process and answer the request.
78
79 OSSL_CMP_try_certreq() is an alternative to the above functions that is
80 more flexible regarding what to do after receiving a checkAfter value.
81 When called for the first time (with no certificate request in progress for
82 the given I<ctx>) it starts a new transaction by sending a certificate request
83 constructed as stated above using the I<req_type> and optional I<crm> parameter.
84 Otherwise (when according to I<ctx> a 'waiting' status has been received before)
85 it continues polling for the pending request
86 unless the I<req_type> argument is < 0, which aborts the request.
87 If the requested certificate is available the function returns 1 and the
88 caller can use L<OSSL_CMP_CTX_get0_newCert(3)> to retrieve the new certificate.
89 If no error occurred but no certificate is available yet then
90 OSSL_CMP_try_certreq() remembers in the CMP context that it should be retried
91 and returns -1 after assigning the received checkAfter value
92 via the output pointer argument (unless it is NULL).
93 The checkAfter value indicates the number of seconds the caller should let pass
94 before trying again. The caller is free to sleep for the given number of seconds
95 or for some other time and/or to do anything else before retrying by calling
96 OSSL_CMP_try_certreq() again with the same parameter values as before.
97 OSSL_CMP_try_certreq() then polls
98 to see whether meanwhile the requested certificate is available.
99 If the caller decides to abort the pending certificate request and provides
100 a negative value as the I<req_type> argument then OSSL_CMP_try_certreq()
101 aborts the CMP transaction by sending an error message to the server.
102
103 OSSL_CMP_exec_RR_ses() requests the revocation of the certificate
104 specified in the I<ctx> using L<OSSL_CMP_CTX_set1_oldCert(3)>.
105 RFC 4210 is vague in which PKIStatus should be returned by the server.
106 We take "accepted" and "grantedWithMods" as clear success and handle
107 "revocationWarning" and "revocationNotification" just as warnings because CAs
108 typically return them as an indication that the certificate was already revoked.
109 "rejection" is a clear error. The values "waiting" and "keyUpdateWarning"
110 make no sense for revocation and thus are treated as an error as well.
111
112 OSSL_CMP_exec_GENM_ses() sends a general message containing the sequence of
113 infoType and infoValue pairs (InfoTypeAndValue; short: B<ITAV>)
114 optionally provided in the I<ctx> using L<OSSL_CMP_CTX_push0_genm_ITAV(3)>.
115 On success it records in I<ctx> the status B<OSSL_CMP_PKISTATUS_accepted>
116 and returns the list of B<ITAV>s received in the GENP message.
117 This can be used, for instance, to poll for CRLs or CA Key Updates.
118 See RFC 4210 section 5.3.19 and appendix E.5 for details.
119
120 OSSL_CMP_get_caCerts() uses a genm/gemp message exchange with infoType caCerts
121 to obtain a list of CA certificates from the CMP server referenced by I<ctx>.
122 On success it assigns to I<*out> the list of certificates received,
123 which must be freed by the caller.
124 NULL means that no CA certificate is available at the server.
125
126 =head1 NOTES
127
128 CMP is defined in RFC 4210 (and CRMF in RFC 4211).
129
130 So far the CMP client implementation is limited to one request per CMP message
131 (and consequently to at most one response component per CMP message).
132
133 =head1 RETURN VALUES
134
135 OSSL_CMP_exec_certreq(), OSSL_CMP_exec_IR_ses(), OSSL_CMP_exec_CR_ses(),
136 OSSL_CMP_exec_P10CR_ses(), and OSSL_CMP_exec_KUR_ses() return a
137 pointer to the newly obtained X509 certificate on success, NULL on error.
138 This pointer will be freed implicitly by OSSL_CMP_CTX_free() or
139 CSSL_CMP_CTX_reinit().
140
141 OSSL_CMP_try_certreq() returns 1 if the requested certificate is available
142 via L<OSSL_CMP_CTX_get0_newCert(3)>
143 or on successfully aborting a pending certificate request, 0 on error, and -1
144 in case a 'waiting' status has been received and checkAfter value is available.
145 In the latter case L<OSSL_CMP_CTX_get0_newCert(3)> yields NULL
146 and the output parameter I<checkAfter> has been used to
147 assign the received value unless I<checkAfter> is NULL.
148
149 OSSL_CMP_exec_RR_ses() and OSSL_CMP_get_caCerts()
150 return 1 on success, 0 on error.
151
152 OSSL_CMP_exec_GENM_ses() returns NULL on error,
153 otherwise a pointer to the sequence of B<ITAV> received, which may be empty.
154 This pointer must be freed by the caller.
155
156 =head1 EXAMPLES
157
158 See OSSL_CMP_CTX for examples on how to prepare the context for these
159 functions.
160
161 =head1 SEE ALSO
162
163 L<OSSL_CMP_CTX_new(3)>, L<OSSL_CMP_CTX_free(3)>,
164 L<OSSL_CMP_CTX_set1_subjectName(3)>, L<OSSL_CMP_CTX_set0_newPkey(3)>,
165 L<OSSL_CMP_CTX_set1_p10CSR(3)>, L<OSSL_CMP_CTX_set1_oldCert(3)>,
166 L<OSSL_CMP_CTX_get0_newCert(3)>, L<OSSL_CMP_CTX_push0_genm_ITAV(3)>,
167 L<OSSL_CMP_MSG_http_perform(3)>
168
169 =head1 HISTORY
170
171 The OpenSSL CMP support was added in OpenSSL 3.0.
172
173 OSSL_CMP_get_caCerts() was added in OpenSSL 3.2.
174
175 =head1 COPYRIGHT
176
177 Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
178
179 Licensed under the Apache License 2.0 (the "License"). You may not use
180 this file except in compliance with the License. You can obtain a copy
181 in the file LICENSE in the source distribution or at
182 L<https://www.openssl.org/source/license.html>.
183
184 =cut