]> git.ipfire.org Git - thirdparty/openssl.git/blame - crypto/ocsp/ocsp.h
The majority of the OCSP code from CertCo.
[thirdparty/openssl.git] / crypto / ocsp / ocsp.h
CommitLineData
eb64730b
RL
1/* ocsp.h */
2/* Written by Tom Titchener <Tom_Titchener@groove.net> for the OpenSSL
3 * project. */
4
5/* History:
6 This file was transfered to Richard Levitte from CertCo by Kathy
7 Weinhold in mid-spring 2000 to be included in OpenSSL or released
8 as a patch kit. */
9
10/* ====================================================================
11 * Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved.
12 *
13 * Redistribution and use in source and binary forms, with or without
14 * modification, are permitted provided that the following conditions
15 * are met:
16 *
17 * 1. Redistributions of source code must retain the above copyright
18 * notice, this list of conditions and the following disclaimer.
19 *
20 * 2. Redistributions in binary form must reproduce the above copyright
21 * notice, this list of conditions and the following disclaimer in
22 * the documentation and/or other materials provided with the
23 * distribution.
24 *
25 * 3. All advertising materials mentioning features or use of this
26 * software must display the following acknowledgment:
27 * "This product includes software developed by the OpenSSL Project
28 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
29 *
30 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
31 * endorse or promote products derived from this software without
32 * prior written permission. For written permission, please contact
33 * openssl-core@openssl.org.
34 *
35 * 5. Products derived from this software may not be called "OpenSSL"
36 * nor may "OpenSSL" appear in their names without prior written
37 * permission of the OpenSSL Project.
38 *
39 * 6. Redistributions of any form whatsoever must retain the following
40 * acknowledgment:
41 * "This product includes software developed by the OpenSSL Project
42 * for use in the OpenSSL Toolkit (http://www.openssl.org/)"
43 *
44 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
45 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
46 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
47 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
48 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
49 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
50 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
51 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
53 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
54 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
55 * OF THE POSSIBILITY OF SUCH DAMAGE.
56 * ====================================================================
57 *
58 * This product includes cryptographic software written by Eric Young
59 * (eay@cryptsoft.com). This product includes software written by Tim
60 * Hudson (tjh@cryptsoft.com).
61 *
62 */
63
64#ifndef HEADER_OCSP_H
65#define HEADER_OCSP_H
66
67#include <openssl/x509.h>
68#include <openssl/x509v3.h>
69#include <openssl/safestack.h>
70
71#ifdef __cplusplus
72extern "C" {
73#endif
74
75/* CertID ::= SEQUENCE {
76 * hashAlgorithm AlgorithmIdentifier,
77 * issuerNameHash OCTET STRING, -- Hash of Issuer's DN
78 * issuerKeyHash OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields)
79 * serialNumber CertificateSerialNumber }
80 */
81typedef struct ocsp_cert_id_st
82 {
83 X509_ALGOR *hashAlgorithm;
84 ASN1_OCTET_STRING *issuerNameHash;
85 ASN1_OCTET_STRING *issuerKeyHash;
86 ASN1_INTEGER *serialNumber;
87 } OCSP_CERTID;
88
89/* Request ::= SEQUENCE {
90 * reqCert CertID,
91 * singleRequestExtensions [0] EXPLICIT Extensions OPTIONAL }
92 */
93typedef struct ocsp_one_request_st
94 {
95 OCSP_CERTID *reqCert;
96 STACK_OF(X509_EXTENSION) *singleRequestExtensions;
97 } OCSP_ONEREQ;
98
99DECLARE_STACK_OF(OCSP_ONEREQ)
100DECLARE_ASN1_SET_OF(OCSP_ONEREQ)
101
102
103/* TBSRequest ::= SEQUENCE {
104 * version [0] EXPLICIT Version DEFAULT v1,
105 * requestorName [1] EXPLICIT GeneralName OPTIONAL,
106 * requestList SEQUENCE OF Request,
107 * requestExtensions [2] EXPLICIT Extensions OPTIONAL }
108 */
109typedef struct ocsp_req_info_st
110 {
111 ASN1_INTEGER *version;
112 GENERAL_NAME *requestorName;
113 STACK_OF(OCSP_ONEREQ) *requestList;
114 STACK_OF(X509_EXTENSION) *requestExtensions;
115 } OCSP_REQINFO;
116
117/* Signature ::= SEQUENCE {
118 * signatureAlgorithm AlgorithmIdentifier,
119 * signature BIT STRING,
120 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
121 */
122typedef struct ocsp_signature_st
123 {
124 X509_ALGOR *signatureAlgorithm;
125 ASN1_BIT_STRING *signature;
126 STACK_OF(X509) *certs;
127 } OCSP_SIGNATURE;
128
129/* OCSPRequest ::= SEQUENCE {
130 * tbsRequest TBSRequest,
131 * optionalSignature [0] EXPLICIT Signature OPTIONAL }
132 */
133typedef struct ocsp_request_st
134 {
135 OCSP_REQINFO *tbsRequest;
136 OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */
137 } OCSP_REQUEST;
138
139/* OCSPResponseStatus ::= ENUMERATED {
140 * successful (0), --Response has valid confirmations
141 * malformedRequest (1), --Illegal confirmation request
142 * internalError (2), --Internal error in issuer
143 * tryLater (3), --Try again later
144 * --(4) is not used
145 * sigRequired (5), --Must sign the request
146 * unauthorized (6) --Request unauthorized
147 * }
148 */
149#define OCSP_RESPONSE_STATUS_SUCCESSFULL 0
150#define OCSP_RESPONSE_STATUS_MALFORMEDREQUEST 1
151#define OCSP_RESPONSE_STATUS_INTERNALERROR 2
152#define OCSP_RESPONSE_STATUS_TRYLATER 3
153#define OCSP_RESPONSE_STATUS_SIGREQUIRED 5
154#define OCSP_RESPONSE_STATUS_UNAUTHORIZED 6
155
156/* ResponseBytes ::= SEQUENCE {
157 * responseType OBJECT IDENTIFIER,
158 * response OCTET STRING }
159 */
160typedef struct ocsp_resp_bytes_st
161 {
162 ASN1_OBJECT *responseType;
163 ASN1_OCTET_STRING *response;
164 } OCSP_RESPBYTES;
165
166/* OCSPResponse ::= SEQUENCE {
167 * responseStatus OCSPResponseStatus,
168 * responseBytes [0] EXPLICIT ResponseBytes OPTIONAL }
169 */
170typedef struct ocsp_response_st
171 {
172 ASN1_ENUMERATED *responseStatus;
173 OCSP_RESPBYTES *responseBytes;
174 } OCSP_RESPONSE;
175
176/* ResponderID ::= CHOICE {
177 * byName [1] Name,
178 * byKey [2] KeyHash }
179 */
180#define V_OCSP_RESPID_NAME 1
181#define V_OCSP_RESPID_KEY 2
182typedef struct ocsp_responder_id_st
183 {
184 int tag;
185 union {
186 X509_NAME* byName;
187 ASN1_OCTET_STRING *byKey;
188 } value;
189 } OCSP_RESPID;
190/* KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
191 * --(excluding the tag and length fields)
192 */
193
194/* RevokedInfo ::= SEQUENCE {
195 * revocationTime GeneralizedTime,
196 * revocationReason [0] EXPLICIT CRLReason OPTIONAL }
197 */
198typedef struct ocsp_revoked_info_st
199 {
200 ASN1_GENERALIZEDTIME *revocationTime;
201 ASN1_ENUMERATED *revocationReason;
202 } OCSP_REVOKEDINFO;
203
204/* CertStatus ::= CHOICE {
205 * good [0] IMPLICIT NULL,
206 * revoked [1] IMPLICIT RevokedInfo,
207 * unknown [2] IMPLICIT UnknownInfo }
208 */
209#define V_OCSP_CERTSTATUS_GOOD 0
210#define V_OCSP_CERTSTATUS_REVOKED 1
211#define V_OCSP_CERTSTATUS_UNKNOWN 2
212typedef struct ocsp_cert_status_st
213 {
214 int tag;
215 /* good [0] IMPLICIT NULL */
216 OCSP_REVOKEDINFO *revoked;
217 /* unknown [2] OCSP_UNKNOWNINFO *unknown, which is NULL */
218 } OCSP_CERTSTATUS;
219
220/* SingleResponse ::= SEQUENCE {
221 * certID CertID,
222 * certStatus CertStatus,
223 * thisUpdate GeneralizedTime,
224 * nextUpdate [0] EXPLICIT GeneralizedTime OPTIONAL,
225 * singleExtensions [1] EXPLICIT Extensions OPTIONAL }
226 */
227typedef struct ocsp_single_response_st
228 {
229 OCSP_CERTID *certId;
230 OCSP_CERTSTATUS *certStatus;
231 ASN1_GENERALIZEDTIME *thisUpdate;
232 ASN1_GENERALIZEDTIME *nextUpdate;
233 STACK_OF(X509_EXTENSION) *singleExtensions;
234 } OCSP_SINGLERESP;
235
236DECLARE_STACK_OF(OCSP_SINGLERESP)
237DECLARE_ASN1_SET_OF(OCSP_SINGLERESP)
238
239/* ResponseData ::= SEQUENCE {
240 * version [0] EXPLICIT Version DEFAULT v1,
241 * responderID ResponderID,
242 * producedAt GeneralizedTime,
243 * responses SEQUENCE OF SingleResponse,
244 * responseExtensions [1] EXPLICIT Extensions OPTIONAL }
245 */
246typedef struct ocsp_response_data_st
247 {
248 ASN1_INTEGER *version;
249 OCSP_RESPID *responderId;
250 ASN1_GENERALIZEDTIME *producedAt;
251 STACK_OF(OCSP_SINGLERESP) *responses;
252 STACK_OF(X509_EXTENSION) *responseExtensions;
253 } OCSP_RESPDATA;
254
255/* BasicOCSPResponse ::= SEQUENCE {
256 * tbsResponseData ResponseData,
257 * signatureAlgorithm AlgorithmIdentifier,
258 * signature BIT STRING,
259 * certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
260 */
261 /* Note 1:
262 The value for "signature" is specified in the OCSP rfc2560 as follows:
263 "The value for the signature SHALL be computed on the hash of the DER
264 encoding ResponseData." This means that you must hash the DER-encoded
265 tbsResponseData, and then run it through a crypto-signing function, which
266 will (at least w/RSA) do a hash-'n'-private-encrypt operation. This seems
267 a bit odd, but that's the spec. Also note that the data structures do not
268 leave anywhere to independently specify the algorithm used for the initial
269 hash. So, we look at the signature-specification algorithm, and try to do
270 something intelligent. -- Kathy Weinhold, CertCo */
271 /* Note 2:
272 It seems that the mentioned passage from RFC 2560 (section 4.2.1) is open
273 for interpretation. I've done tests against another responder, and found
274 that it doesn't do the double hashing that the RFC seems to say one
275 should. Therefore, all relevant functions take a flag saying which
276 variant should be used. -- Richard Levitte, OpenSSL team and CeloCom */
277typedef struct ocsp_basic_response_st
278 {
279 OCSP_RESPDATA *tbsResponseData;
280 X509_ALGOR *signatureAlgorithm;
281 ASN1_BIT_STRING *signature;
282 STACK_OF(X509) *certs;
283 } OCSP_BASICRESP;
284
285/*
286 * CRLReason ::= ENUMERATED {
287 * unspecified (0),
288 * keyCompromise (1),
289 * cACompromise (2),
290 * affiliationChanged (3),
291 * superseded (4),
292 * cessationOfOperation (5),
293 * certificateHold (6),
294 * removeFromCRL (8) }
295 */
296#define OCSP_REVOKED_STATUS_NOSTATUS -1
297#define OCSP_REVOKED_STATUS_UNSPECIFIED 0
298#define OCSP_REVOKED_STATUS_KEYCOMPROMISE 1
299#define OCSP_REVOKED_STATUS_CACOMPROMISE 2
300#define OCSP_REVOKED_STATUS_AFFILIATIONCHANGED 3
301#define OCSP_REVOKED_STATUS_SUPERSEDED 4
302#define OCSP_REVOKED_STATUS_CESSATIONOFOPERATION 5
303#define OCSP_REVOKED_STATUS_CERTIFICATEHOLD 6
304#define OCSP_REVOKED_STATUS_REMOVEFROMCRL 8
305
306/* CrlID ::= SEQUENCE {
307 * crlUrl [0] EXPLICIT IA5String OPTIONAL,
308 * crlNum [1] EXPLICIT INTEGER OPTIONAL,
309 * crlTime [2] EXPLICIT GeneralizedTime OPTIONAL }
310 */
311typedef struct ocsp_crl_id_st
312 {
313 ASN1_IA5STRING *crlUrl;
314 ASN1_INTEGER *crlNum;
315 ASN1_GENERALIZEDTIME *crlTime;
316 } OCSP_CRLID;
317
318/* ServiceLocator ::= SEQUENCE {
319 * issuer Name,
320 * locator AuthorityInfoAccessSyntax OPTIONAL }
321 */
322typedef struct ocsp_service_locator_st
323 {
324 X509_NAME* issuer;
325 STACK_OF(ACCESS_DESCRIPTION) *locator;
326 } OCSP_SERVICELOC;
327
328#define PEM_STRING_OCSP_REQUEST "OCSP REQUEST"
329#define PEM_STRING_OCSP_RESPONSE "OCSP RESPONSE"
330
331#define d2i_OCSP_REQUEST_bio(bp,p) (OCSP_REQUEST*)ASN1_d2i_bio((char*(*)()) \
332 OCSP_REQUEST_new,(char *(*)())d2i_OCSP_REQUEST, (bp),\
333 (unsigned char **)(p))
334
335#define d2i_OCSP_RESPONSE_bio(bp,p) (OCSP_RESPONSE*)ASN1_d2i_bio((char*(*)())\
336 OCSP_REQUEST_new,(char *(*)())d2i_OCSP_RESPONSE, (bp),\
337 (unsigned char **)(p))
338
339#define PEM_read_bio_OCSP_REQUEST(bp,x,cb) (OCSP_REQUEST *)PEM_ASN1_read_bio( \
340 (char *(*)())d2i_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,bp,(char **)x,cb,NULL)
341
342#define PEM_read_bio_OCSP_RESPONSE(bp,x,cb)(OCSP_RESPONSE *)PEM_ASN1_read_bio(\
343 (char *(*)())d2i_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,bp,(char **)x,cb,NULL)
344
345#define PEM_write_bio_OCSP_REQUEST(bp,o) \
346 PEM_ASN1_write_bio((int (*)())i2d_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,\
347 bp,(char *)o, NULL,NULL,0,NULL,NULL)
348
349#define PEM_write_bio_OCSP_RESPONSE(bp,o) \
350 PEM_ASN1_write_bio((int (*)())i2d_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,\
351 bp,(char *)o, NULL,NULL,0,NULL,NULL)
352
353#define i2d_OCSP_RESPONSE_bio(bp,o) ASN1_i2d_bio(i2d_OCSP_RESPONSE,bp,\
354 (unsigned char *)o)
355
356#define i2d_OCSP_REQUEST_bio(bp,o) ASN1_i2d_bio(i2d_OCSP_REQUEST,bp,\
357 (unsigned char *)o)
358
359#define OCSP_REQUEST_sign(o,pkey,md) \
360 ASN1_sign((int(*)())i2d_OCSP_REQINFO,\
361 o->optionalSignature->signatureAlgorithm,NULL,\
362 o->optionalSignature->signature,(char *)o->tbsRequest,pkey,md)
363
364#define OCSP_BASICRESP_sign(o,pkey,md,d) \
365 ASN1_sign((int(*)())i2d_OCSP_RESPDATA,o->signatureAlgorithm,NULL,\
366 o->signature,(char *)o->tbsResponseData,pkey,md)
367
368#define OCSP_REQUEST_verify(a,r) ASN1_verify((int (*)())i2d_OCSP_REQINFO,\
369 a->optionalSignature->signatureAlgorithm,\
370 a->optionalSignature->signature,(char *)a->tbsRequest,r)
371
372#define OCSP_BASICRESP_verify(a,r,d) ASN1_verify((int (*)())i2d_OCSP_RESPDATA,\
373 a->signatureAlgorithm,a->signature,(char *)a->tbsResponseData,r)
374
375#define ASN1_BIT_STRING_digest(data,type,md,len) \
376 ASN1_digest((int (*)())i2d_ASN1_BIT_STRING,type,(char *)data,md,len)
377
378#define OCSP_CERTID_dup(cid) (OCSP_CERTID*)ASN1_dup((int(*)())i2d_OCSP_CERTID,\
379 (char *(*)())d2i_OCSP_CERTID,(char *)(cid))
380
381#define OCSP_CERTSTATUS_dup(cs)\
382 (OCSP_CERTSTATUS*)ASN1_dup((int(*)())i2d_OCSP_CERTSTATUS,\
383 (char *(*)())d2i_OCSP_CERTSTATUS,(char *)(cs))
384
385OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst,
386 X509_NAME *issuerName,
387 ASN1_BIT_STRING* issuerKey,
388 ASN1_INTEGER *serialNumber);
389
390OCSP_CERTSTATUS *OCSP_cert_status_new(int status, int reason, char *tim);
391
392OCSP_REQUEST *OCSP_request_new(X509_NAME* name,
393 STACK_OF(X509_EXTENSION) *extensions);
394
395int OCSP_request_add(OCSP_REQUEST *req,
396 OCSP_CERTID *cid,
397 STACK_OF(X509_EXTENSION) *extensions);
398
399int OCSP_request_sign(OCSP_REQUEST *req,
400 EVP_PKEY *key,
401 const EVP_MD *dgst,
402 STACK_OF(X509) *certs);
403
404int OCSP_request_verify(OCSP_REQUEST *req, EVP_PKEY *pkey);
405
406OCSP_BASICRESP *OCSP_basic_response_new(int tag,
407 X509* cert,
408 STACK_OF(X509_EXTENSION) *extensions);
409
410int OCSP_basic_response_add(OCSP_BASICRESP *rsp,
411 OCSP_CERTID *cid,
412 OCSP_CERTSTATUS *cst,
413 char *thisUpdate,
414 char *nextUpdate,
415 STACK_OF(X509_EXTENSION) *extensions);
416
417int OCSP_basic_response_sign(OCSP_BASICRESP *brsp,
418 EVP_PKEY *key,
419 const EVP_MD *dgst,
420 STACK_OF(X509) *certs);
421
422int OCSP_response_verify(OCSP_RESPONSE *rsp, EVP_PKEY *pkey);
423
424int OCSP_basic_response_verify(OCSP_BASICRESP *rsp, EVP_PKEY *pkey);
425
426
427OCSP_RESPONSE *OCSP_response_new(int status,
428 int nid,
429 int (*i2d)(),
430 char *data);
431
432ASN1_STRING *ASN1_STRING_encode(ASN1_STRING *s, int (*i2d)(),
433 char *data, STACK *sk);
434
435X509_EXTENSION *OCSP_nonce_new(void *p, unsigned int len);
436
437X509_EXTENSION *OCSP_crlID_new(char *url, long *n, char *tim);
438
439X509_EXTENSION *OCSP_accept_responses_new(char **oids);
440
441X509_EXTENSION *OCSP_archive_cutoff_new(char* tim);
442
443X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
444
445OCSP_SINGLERESP *OCSP_SINGLERESP_new(void);
446void OCSP_SINGLERESP_free(OCSP_SINGLERESP *a);
447int i2d_OCSP_SINGLERESP(OCSP_SINGLERESP *a, unsigned char **pp);
448OCSP_SINGLERESP *d2i_OCSP_SINGLERESP(OCSP_SINGLERESP **a, unsigned char **pp, long length);
449int i2a_OCSP_SINGLERESP(BIO *bp, OCSP_SINGLERESP* a);
450
451OCSP_CERTSTATUS *OCSP_CERTSTATUS_new(void);
452void OCSP_CERTSTATUS_free(OCSP_CERTSTATUS *a);
453int i2d_OCSP_CERTSTATUS(OCSP_CERTSTATUS *a, unsigned char **pp);
454OCSP_CERTSTATUS *d2i_OCSP_CERTSTATUS(OCSP_CERTSTATUS **a, unsigned char **pp, long length);
455int i2a_OCSP_CERTSTATUS(BIO *bp, OCSP_CERTSTATUS* a);
456
457OCSP_REVOKEDINFO *OCSP_REVOKEDINFO_new(void);
458void OCSP_REVOKEDINFO_free(OCSP_REVOKEDINFO *a);
459int i2d_OCSP_REVOKEDINFO(OCSP_REVOKEDINFO *a, unsigned char **pp);
460OCSP_REVOKEDINFO *d2i_OCSP_REVOKEDINFO(OCSP_REVOKEDINFO **a, unsigned char **pp, long length);
461int i2a_OCSP_REVOKEDINFO(BIO *bp, OCSP_REVOKEDINFO* a);
462
463OCSP_BASICRESP *OCSP_BASICRESP_new(void);
464void OCSP_BASICRESP_free(OCSP_BASICRESP *a);
465int i2d_OCSP_BASICRESP(OCSP_BASICRESP *a, unsigned char **pp);
466OCSP_BASICRESP *d2i_OCSP_BASICRESP(OCSP_BASICRESP **a, unsigned char **pp, long length);
467int i2a_OCSP_BASICRESP(BIO *bp, OCSP_BASICRESP* a);
468
469OCSP_RESPDATA *OCSP_RESPDATA_new(void);
470void OCSP_RESPDATA_free(OCSP_RESPDATA *a);
471int i2d_OCSP_RESPDATA(OCSP_RESPDATA *a, unsigned char **pp);
472OCSP_RESPDATA *d2i_OCSP_RESPDATA(OCSP_RESPDATA **a, unsigned char **pp, long length);
473int i2a_OCSP_RESPDATA(BIO *bp, OCSP_RESPDATA* a);
474
475OCSP_RESPID *OCSP_RESPID_new(void);
476void OCSP_RESPID_free(OCSP_RESPID *a);
477int i2d_OCSP_RESPID(OCSP_RESPID *a, unsigned char **pp);
478OCSP_RESPID *d2i_OCSP_RESPID(OCSP_RESPID **a, unsigned char **pp, long length);
479int i2a_OCSP_RESPID(BIO *bp, OCSP_RESPID* a);
480
481OCSP_RESPONSE *OCSP_RESPONSE_new(void);
482void OCSP_RESPONSE_free(OCSP_RESPONSE *a);
483int i2d_OCSP_RESPONSE(OCSP_RESPONSE *a, unsigned char **pp);
484OCSP_RESPONSE *d2i_OCSP_RESPONSE(OCSP_RESPONSE **a, unsigned char **pp, long length);
485int i2a_OCSP_RESPONSE(BIO *bp, OCSP_RESPONSE* a);
486int OCSP_RESPONSE_print(BIO *bp, OCSP_RESPONSE* a);
487
488OCSP_RESPBYTES *OCSP_RESPBYTES_new(void);
489void OCSP_RESPBYTES_free(OCSP_RESPBYTES *a);
490int i2d_OCSP_RESPBYTES(OCSP_RESPBYTES *a, unsigned char **pp);
491OCSP_RESPBYTES *d2i_OCSP_RESPBYTES(OCSP_RESPBYTES **a, unsigned char **pp, long length);
492int i2a_OCSP_RESPBYTES(BIO *bp, OCSP_RESPBYTES* a);
493
494OCSP_ONEREQ *OCSP_ONEREQ_new(void);
495void OCSP_ONEREQ_free(OCSP_ONEREQ *a);
496int i2d_OCSP_ONEREQ(OCSP_ONEREQ *a, unsigned char **pp);
497OCSP_ONEREQ *d2i_OCSP_ONEREQ(OCSP_ONEREQ **a, unsigned char **pp, long length);
498int i2a_OCSP_ONEREQ(BIO *bp, OCSP_ONEREQ* a);
499
500OCSP_CERTID *OCSP_CERTID_new(void);
501void OCSP_CERTID_free(OCSP_CERTID *a);
502int i2d_OCSP_CERTID(OCSP_CERTID *a, unsigned char **pp);
503OCSP_CERTID *d2i_OCSP_CERTID(OCSP_CERTID **a, unsigned char **pp, long length);
504int i2a_OCSP_CERTID(BIO *bp, OCSP_CERTID* a);
505
506OCSP_REQUEST *OCSP_REQUEST_new(void);
507void OCSP_REQUEST_free(OCSP_REQUEST *a);
508int i2d_OCSP_REQUEST(OCSP_REQUEST *a, unsigned char **pp);
509OCSP_REQUEST *d2i_OCSP_REQUEST(OCSP_REQUEST **a, unsigned char **pp, long length);
510int i2a_OCSP_REQUEST(BIO *bp, OCSP_REQUEST* a);
511int OCSP_REQUEST_print(BIO *bp, OCSP_REQUEST* a);
512
513OCSP_SIGNATURE *OCSP_SIGNATURE_new(void);
514void OCSP_SIGNATURE_free(OCSP_SIGNATURE *a);
515int i2d_OCSP_SIGNATURE(OCSP_SIGNATURE *a, unsigned char **pp);
516OCSP_SIGNATURE *d2i_OCSP_SIGNATURE(OCSP_SIGNATURE **a, unsigned char **pp, long length);
517int i2a_OCSP_SIGNATURE(BIO *bp, OCSP_SIGNATURE* a);
518
519OCSP_REQINFO *OCSP_REQINFO_new(void);
520void OCSP_REQINFO_free(OCSP_REQINFO *a);
521int i2d_OCSP_REQINFO(OCSP_REQINFO *a, unsigned char **pp);
522OCSP_REQINFO *d2i_OCSP_REQINFO(OCSP_REQINFO **a, unsigned char **pp, long length);
523int i2a_OCSP_REQINFO(BIO *bp, OCSP_REQINFO* a);
524
525OCSP_CRLID *OCSP_CRLID_new(void);
526void OCSP_CRLID_free(OCSP_CRLID *a);
527int i2d_OCSP_CRLID(OCSP_CRLID *a, unsigned char **pp);
528OCSP_CRLID *d2i_OCSP_CRLID(OCSP_CRLID **a, unsigned char **pp, long length);
529int i2a_OCSP_CRLID(BIO *bp, OCSP_CRLID* a);
530int OCSP_CRLID_print(BIO *bp, OCSP_CRLID *a, int ind);
531
532OCSP_SERVICELOC *OCSP_SERVICELOC_new(void);
533void OCSP_SERVICELOC_free(OCSP_SERVICELOC *a);
534int i2d_OCSP_SERVICELOC(OCSP_SERVICELOC *a, unsigned char **pp);
535OCSP_SERVICELOC *d2i_OCSP_SERVICELOC(OCSP_SERVICELOC **a, unsigned char **pp, long length);
536int i2a_OCSP_SERVICELOC(BIO *bp, OCSP_SERVICELOC* a);
537int OCSP_SERVICELOC_print(BIO *bp, OCSP_SERVICELOC* a, int ind);
538
539int OCSP_extensions_print(BIO *bp, STACK_OF(X509_EXTENSION) *sk, char *title);
540int OCSP_extension_print(BIO *bp, X509_EXTENSION *x, int ind);
541
542void ERR_load_OCSP_strings(void);
543
544X509_EXTENSION *OCSP_nochain_new(void);
545
546char* ocspResponseStatus2string(long s);
547char* ocspCertStatus2string(long s);
548char * cRLReason2string(long s);
549
550void OCSP_add_standard_extension(void);
551
552/* BEGIN ERROR CODES */
553/* The following lines are auto generated by the script mkerr.pl. Any changes
554 * made after this point may be overwritten when the script is next run.
555 */
556
557/* Error codes for the OCSP functions. */
558
559/* Function codes. */
560#define OCSP_F_ASN1_STRING_ENCODE 106
561#define OCSP_F_BASIC_RESPONSE_NEW 100
562#define OCSP_F_BASIC_RESPONSE_VERIFY 101
563#define OCSP_F_CERT_ID_NEW 102
564#define OCSP_F_CERT_STATUS_NEW 103
565#define OCSP_F_REQUEST_VERIFY 104
566#define OCSP_F_RESPONSE_VERIFY 105
567#define OCSP_F_S2I_OCSP_NONCE 107
568#define OCSP_F_V2I_OCSP_CRLID 108
569
570/* Reason codes. */
571#define OCSP_R_BAD_DATA 108
572#define OCSP_R_BAD_TAG 100
573#define OCSP_R_DIGEST_ERR 101
574#define OCSP_R_FAILED_TO_OPEN 109
575#define OCSP_R_FAILED_TO_READ 110
576#define OCSP_R_FAILED_TO_STAT 111
577#define OCSP_R_MISSING_VALUE 112
578#define OCSP_R_NO_CERTIFICATE 102
579#define OCSP_R_NO_PUBLIC_KEY 103
580#define OCSP_R_NO_RESPONSE_DATA 104
581#define OCSP_R_NO_SIGNATURE 105
582#define OCSP_R_REVOKED_NO_TIME 106
583#define OCSP_R_UNKNOWN_NID 107
584#define OCSP_R_UNSUPPORTED_OPTION 113
585#define OCSP_R_VALUE_ALREADY 114
586
587#ifdef __cplusplus
588}
589#endif
590#endif
591