]>
Commit | Line | Data |
---|---|---|
d02b48c6 | 1 | /* crypto/x509/x509.h */ |
58964a49 | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
d02b48c6 RE |
3 | * All rights reserved. |
4 | * | |
5 | * This package is an SSL implementation written | |
6 | * by Eric Young (eay@cryptsoft.com). | |
7 | * The implementation was written so as to conform with Netscapes SSL. | |
8 | * | |
9 | * This library is free for commercial and non-commercial use as long as | |
10 | * the following conditions are aheared to. The following conditions | |
11 | * apply to all code found in this distribution, be it the RC4, RSA, | |
12 | * lhash, DES, etc., code; not just the SSL code. The SSL documentation | |
13 | * included with this distribution is covered by the same copyright terms | |
14 | * except that the holder is Tim Hudson (tjh@cryptsoft.com). | |
15 | * | |
16 | * Copyright remains Eric Young's, and as such any Copyright notices in | |
17 | * the code are not to be removed. | |
18 | * If this package is used in a product, Eric Young should be given attribution | |
19 | * as the author of the parts of the library used. | |
20 | * This can be in the form of a textual message at program startup or | |
21 | * in documentation (online or textual) provided with the package. | |
22 | * | |
23 | * Redistribution and use in source and binary forms, with or without | |
24 | * modification, are permitted provided that the following conditions | |
25 | * are met: | |
26 | * 1. Redistributions of source code must retain the copyright | |
27 | * notice, this list of conditions and the following disclaimer. | |
28 | * 2. Redistributions in binary form must reproduce the above copyright | |
29 | * notice, this list of conditions and the following disclaimer in the | |
30 | * documentation and/or other materials provided with the distribution. | |
31 | * 3. All advertising materials mentioning features or use of this software | |
32 | * must display the following acknowledgement: | |
33 | * "This product includes cryptographic software written by | |
34 | * Eric Young (eay@cryptsoft.com)" | |
35 | * The word 'cryptographic' can be left out if the rouines from the library | |
36 | * being used are not cryptographic related :-). | |
37 | * 4. If you include any Windows specific code (or a derivative thereof) from | |
38 | * the apps directory (application code) you must include an acknowledgement: | |
39 | * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" | |
40 | * | |
41 | * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND | |
42 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | |
43 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | |
44 | * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE | |
45 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | |
46 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | |
47 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | |
48 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | |
49 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | |
50 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | |
51 | * SUCH DAMAGE. | |
52 | * | |
53 | * The licence and distribution terms for any publically available version or | |
54 | * derivative of this code cannot be changed. i.e. this code cannot simply be | |
55 | * copied and put under another distribution licence | |
56 | * [including the GNU Public Licence.] | |
57 | */ | |
58 | ||
59 | #ifndef HEADER_X509_H | |
60 | #define HEADER_X509_H | |
61 | ||
9fc25706 | 62 | #include <openssl/symhacks.h> |
ef33b970 RL |
63 | #ifndef NO_BUFFER |
64 | #include <openssl/buffer.h> | |
65 | #endif | |
66 | #ifndef NO_EVP | |
67 | #include <openssl/evp.h> | |
68 | #endif | |
69 | #ifndef NO_BIO | |
70 | #include <openssl/bio.h> | |
71 | #endif | |
ec577822 BM |
72 | #include <openssl/stack.h> |
73 | #include <openssl/asn1.h> | |
74 | #include <openssl/safestack.h> | |
d02b48c6 RE |
75 | |
76 | #ifndef NO_RSA | |
ec577822 | 77 | #include <openssl/rsa.h> |
d02b48c6 RE |
78 | #endif |
79 | ||
80 | #ifndef NO_DSA | |
ec577822 | 81 | #include <openssl/dsa.h> |
d02b48c6 RE |
82 | #endif |
83 | ||
84 | #ifndef NO_DH | |
ec577822 | 85 | #include <openssl/dh.h> |
d02b48c6 RE |
86 | #endif |
87 | ||
ec577822 | 88 | #include <openssl/evp.h> |
d02b48c6 | 89 | |
4b55c2a3 | 90 | |
82271cee RL |
91 | #ifdef __cplusplus |
92 | extern "C" { | |
93 | #endif | |
94 | ||
4b55c2a3 DSH |
95 | #ifdef WIN32 |
96 | /* Under Win32 this is defined in wincrypt.h */ | |
97 | #undef X509_NAME | |
98 | #endif | |
99 | ||
5de603ab | 100 | /* If placed in pkcs12.h, we end up with a circular depency with pkcs7.h */ |
7ef82068 DSH |
101 | #define DECLARE_PKCS12_STACK_OF(type) /* Nothing */ |
102 | #define IMPLEMENT_PKCS12_STACK_OF(type) /* Nothing */ | |
5de603ab | 103 | |
d02b48c6 RE |
104 | #define X509_FILETYPE_PEM 1 |
105 | #define X509_FILETYPE_ASN1 2 | |
106 | #define X509_FILETYPE_DEFAULT 3 | |
107 | ||
58964a49 RE |
108 | #define X509v3_KU_DIGITAL_SIGNATURE 0x0080 |
109 | #define X509v3_KU_NON_REPUDIATION 0x0040 | |
110 | #define X509v3_KU_KEY_ENCIPHERMENT 0x0020 | |
111 | #define X509v3_KU_DATA_ENCIPHERMENT 0x0010 | |
112 | #define X509v3_KU_KEY_AGREEMENT 0x0008 | |
113 | #define X509v3_KU_KEY_CERT_SIGN 0x0004 | |
114 | #define X509v3_KU_CRL_SIGN 0x0002 | |
115 | #define X509v3_KU_ENCIPHER_ONLY 0x0001 | |
116 | #define X509v3_KU_DECIPHER_ONLY 0x8000 | |
117 | #define X509v3_KU_UNDEF 0xffff | |
118 | ||
119 | typedef struct X509_objects_st | |
120 | { | |
121 | int nid; | |
122 | int (*a2i)(); | |
123 | int (*i2a)(); | |
124 | } X509_OBJECTS; | |
125 | ||
d02b48c6 RE |
126 | typedef struct X509_algor_st |
127 | { | |
128 | ASN1_OBJECT *algorithm; | |
129 | ASN1_TYPE *parameter; | |
130 | } X509_ALGOR; | |
131 | ||
426edadf BL |
132 | DECLARE_STACK_OF(X509_ALGOR) |
133 | DECLARE_ASN1_SET_OF(X509_ALGOR) | |
134 | ||
d02b48c6 RE |
135 | typedef struct X509_val_st |
136 | { | |
284ef5f3 DSH |
137 | ASN1_TIME *notBefore; |
138 | ASN1_TIME *notAfter; | |
d02b48c6 RE |
139 | } X509_VAL; |
140 | ||
141 | typedef struct X509_pubkey_st | |
142 | { | |
143 | X509_ALGOR *algor; | |
144 | ASN1_BIT_STRING *public_key; | |
cfdcfede | 145 | EVP_PKEY *pkey; |
d02b48c6 RE |
146 | } X509_PUBKEY; |
147 | ||
148 | typedef struct X509_sig_st | |
149 | { | |
150 | X509_ALGOR *algor; | |
151 | ASN1_OCTET_STRING *digest; | |
152 | } X509_SIG; | |
153 | ||
154 | typedef struct X509_name_entry_st | |
155 | { | |
156 | ASN1_OBJECT *object; | |
157 | ASN1_STRING *value; | |
158 | int set; | |
159 | int size; /* temp variable */ | |
160 | } X509_NAME_ENTRY; | |
161 | ||
65d4927b BL |
162 | DECLARE_STACK_OF(X509_NAME_ENTRY) |
163 | DECLARE_ASN1_SET_OF(X509_NAME_ENTRY) | |
164 | ||
d02b48c6 RE |
165 | /* we always keep X509_NAMEs in 2 forms. */ |
166 | typedef struct X509_name_st | |
167 | { | |
65d4927b | 168 | STACK_OF(X509_NAME_ENTRY) *entries; |
d02b48c6 | 169 | int modified; /* true if 'bytes' needs to be built */ |
ef33b970 | 170 | #ifndef NO_BUFFER |
d02b48c6 RE |
171 | BUF_MEM *bytes; |
172 | #else | |
173 | char *bytes; | |
174 | #endif | |
58964a49 | 175 | unsigned long hash; /* Keep the hash around for lookups */ |
d02b48c6 RE |
176 | } X509_NAME; |
177 | ||
f73e07cf BL |
178 | DECLARE_STACK_OF(X509_NAME) |
179 | ||
58964a49 RE |
180 | #define X509_EX_V_NETSCAPE_HACK 0x8000 |
181 | #define X509_EX_V_INIT 0x0001 | |
d02b48c6 RE |
182 | typedef struct X509_extension_st |
183 | { | |
184 | ASN1_OBJECT *object; | |
9d6b1ce6 | 185 | ASN1_BOOLEAN critical; |
d02b48c6 RE |
186 | ASN1_OCTET_STRING *value; |
187 | } X509_EXTENSION; | |
188 | ||
0b3f827c BL |
189 | DECLARE_STACK_OF(X509_EXTENSION) |
190 | DECLARE_ASN1_SET_OF(X509_EXTENSION) | |
191 | ||
d500de16 BL |
192 | /* a sequence of these are used */ |
193 | typedef struct x509_attributes_st | |
194 | { | |
195 | ASN1_OBJECT *object; | |
9d6b1ce6 | 196 | int single; /* 0 for a set, 1 for a single item (which is wrong) */ |
d500de16 BL |
197 | union { |
198 | char *ptr; | |
9d6b1ce6 DSH |
199 | /* 0 */ STACK_OF(ASN1_TYPE) *set; |
200 | /* 1 */ ASN1_TYPE *single; | |
d500de16 BL |
201 | } value; |
202 | } X509_ATTRIBUTE; | |
203 | ||
204 | DECLARE_STACK_OF(X509_ATTRIBUTE) | |
205 | DECLARE_ASN1_SET_OF(X509_ATTRIBUTE) | |
206 | ||
9d6b1ce6 | 207 | |
d02b48c6 RE |
208 | typedef struct X509_req_info_st |
209 | { | |
9d6b1ce6 | 210 | ASN1_ENCODING enc; |
d02b48c6 RE |
211 | ASN1_INTEGER *version; |
212 | X509_NAME *subject; | |
213 | X509_PUBKEY *pubkey; | |
214 | /* d=2 hl=2 l= 0 cons: cont: 00 */ | |
d500de16 | 215 | STACK_OF(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ |
d02b48c6 RE |
216 | } X509_REQ_INFO; |
217 | ||
218 | typedef struct X509_req_st | |
219 | { | |
220 | X509_REQ_INFO *req_info; | |
221 | X509_ALGOR *sig_alg; | |
222 | ASN1_BIT_STRING *signature; | |
223 | int references; | |
224 | } X509_REQ; | |
225 | ||
226 | typedef struct x509_cinf_st | |
227 | { | |
228 | ASN1_INTEGER *version; /* [ 0 ] default of v1 */ | |
229 | ASN1_INTEGER *serialNumber; | |
230 | X509_ALGOR *signature; | |
231 | X509_NAME *issuer; | |
232 | X509_VAL *validity; | |
233 | X509_NAME *subject; | |
234 | X509_PUBKEY *key; | |
235 | ASN1_BIT_STRING *issuerUID; /* [ 1 ] optional in v2 */ | |
236 | ASN1_BIT_STRING *subjectUID; /* [ 2 ] optional in v2 */ | |
0b3f827c | 237 | STACK_OF(X509_EXTENSION) *extensions; /* [ 3 ] optional in v3 */ |
d02b48c6 RE |
238 | } X509_CINF; |
239 | ||
ce1b4fe1 DSH |
240 | /* This stuff is certificate "auxiliary info" |
241 | * it contains details which are useful in certificate | |
242 | * stores and databases. When used this is tagged onto | |
243 | * the end of the certificate itself | |
244 | */ | |
245 | ||
ce1b4fe1 DSH |
246 | typedef struct x509_cert_aux_st |
247 | { | |
6447cce3 DSH |
248 | STACK_OF(ASN1_OBJECT) *trust; /* trusted uses */ |
249 | STACK_OF(ASN1_OBJECT) *reject; /* rejected uses */ | |
ce1b4fe1 | 250 | ASN1_UTF8STRING *alias; /* "friendly name" */ |
6447cce3 | 251 | ASN1_OCTET_STRING *keyid; /* key id of private key */ |
d754b385 | 252 | STACK_OF(X509_ALGOR) *other; /* other unspecified info */ |
ce1b4fe1 DSH |
253 | } X509_CERT_AUX; |
254 | ||
d02b48c6 RE |
255 | typedef struct x509_st |
256 | { | |
257 | X509_CINF *cert_info; | |
258 | X509_ALGOR *sig_alg; | |
259 | ASN1_BIT_STRING *signature; | |
260 | int valid; | |
261 | int references; | |
262 | char *name; | |
56a3fec1 | 263 | CRYPTO_EX_DATA ex_data; |
673b102c DSH |
264 | /* These contain copies of various extension values */ |
265 | long ex_pathlen; | |
266 | unsigned long ex_flags; | |
267 | unsigned long ex_kusage; | |
268 | unsigned long ex_xkusage; | |
269 | unsigned long ex_nscert; | |
2f043896 DSH |
270 | ASN1_OCTET_STRING *skid; |
271 | struct AUTHORITY_KEYID_st *akid; | |
731d9c5f | 272 | #ifndef NO_SHA |
e947f396 | 273 | unsigned char sha1_hash[SHA_DIGEST_LENGTH]; |
731d9c5f | 274 | #endif |
ce1b4fe1 | 275 | X509_CERT_AUX *aux; |
d02b48c6 RE |
276 | } X509; |
277 | ||
f73e07cf BL |
278 | DECLARE_STACK_OF(X509) |
279 | DECLARE_ASN1_SET_OF(X509) | |
280 | ||
d4cec6a1 DSH |
281 | /* This is used for a table of trust checking functions */ |
282 | ||
283 | typedef struct x509_trust_st { | |
dd413410 DSH |
284 | int trust; |
285 | int flags; | |
d4cec6a1 | 286 | int (*check_trust)(struct x509_trust_st *, X509 *, int); |
dd413410 | 287 | char *name; |
9868232a DSH |
288 | int arg1; |
289 | void *arg2; | |
d4cec6a1 DSH |
290 | } X509_TRUST; |
291 | ||
9868232a DSH |
292 | DECLARE_STACK_OF(X509_TRUST) |
293 | ||
294 | /* standard trust ids */ | |
d4cec6a1 | 295 | |
068fdce8 DSH |
296 | #define X509_TRUST_DEFAULT -1 /* Only valid in purpose settings */ |
297 | ||
298 | #define X509_TRUST_COMPAT 1 | |
d4cec6a1 DSH |
299 | #define X509_TRUST_SSL_CLIENT 2 |
300 | #define X509_TRUST_SSL_SERVER 3 | |
301 | #define X509_TRUST_EMAIL 4 | |
9868232a DSH |
302 | #define X509_TRUST_OBJECT_SIGN 5 |
303 | ||
dd413410 DSH |
304 | /* Keep these up to date! */ |
305 | #define X509_TRUST_MIN 1 | |
306 | #define X509_TRUST_MAX 5 | |
307 | ||
308 | ||
9868232a DSH |
309 | /* trust_flags values */ |
310 | #define X509_TRUST_DYNAMIC 1 | |
311 | #define X509_TRUST_DYNAMIC_NAME 2 | |
312 | ||
313 | /* check_trust return codes */ | |
314 | ||
315 | #define X509_TRUST_TRUSTED 1 | |
316 | #define X509_TRUST_REJECTED 2 | |
317 | #define X509_TRUST_UNTRUSTED 3 | |
d4cec6a1 | 318 | |
d0c98589 DSH |
319 | /* Flags for X509_print_ex() */ |
320 | ||
321 | #define X509_FLAG_COMPAT 0 | |
322 | #define X509_FLAG_NO_HEADER 1L | |
323 | #define X509_FLAG_NO_VERSION (1L << 1) | |
324 | #define X509_FLAG_NO_SERIAL (1L << 2) | |
325 | #define X509_FLAG_NO_SIGNAME (1L << 3) | |
326 | #define X509_FLAG_NO_ISSUER (1L << 4) | |
327 | #define X509_FLAG_NO_VALIDITY (1L << 5) | |
328 | #define X509_FLAG_NO_SUBJECT (1L << 6) | |
329 | #define X509_FLAG_NO_PUBKEY (1L << 7) | |
330 | #define X509_FLAG_NO_EXTENSIONS (1L << 8) | |
331 | #define X509_FLAG_NO_SIGDUMP (1L << 9) | |
332 | #define X509_FLAG_NO_AUX (1L << 10) | |
333 | ||
a657546f DSH |
334 | /* Flags specific to X509_NAME_print_ex() */ |
335 | ||
336 | /* The field separator information */ | |
337 | ||
338 | #define XN_FLAG_SEP_MASK (0xf << 16) | |
339 | ||
340 | #define XN_FLAG_COMPAT 0 /* Traditional SSLeay: use old X509_NAME_print */ | |
341 | #define XN_FLAG_SEP_COMMA_PLUS (1 << 16) /* RFC2253 ,+ */ | |
342 | #define XN_FLAG_SEP_CPLUS_SPC (2 << 16) /* ,+ spaced: more readable */ | |
343 | #define XN_FLAG_SEP_SPLUS_SPC (3 << 16) /* ;+ spaced */ | |
344 | #define XN_FLAG_SEP_MULTILINE (4 << 16) /* One line per field */ | |
345 | ||
346 | #define XN_FLAG_DN_REV (1 << 20) /* Reverse DN order */ | |
347 | ||
348 | /* How the field name is shown */ | |
349 | ||
350 | #define XN_FLAG_FN_MASK (0x3 << 21) | |
351 | ||
bd4e1527 DSH |
352 | #define XN_FLAG_FN_SN 0 /* Object short name */ |
353 | #define XN_FLAG_FN_LN (1 << 21) /* Object long name */ | |
354 | #define XN_FLAG_FN_OID (2 << 21) /* Always use OIDs */ | |
355 | #define XN_FLAG_FN_NONE (3 << 21) /* No field names */ | |
a657546f DSH |
356 | |
357 | #define XN_FLAG_SPC_EQ (1 << 23) /* Put spaces round '=' */ | |
358 | ||
359 | /* This determines if we dump fields we don't recognise: | |
360 | * RFC2253 requires this. | |
361 | */ | |
362 | ||
363 | #define XN_FLAG_DUMP_UNKNOWN_FIELDS (1 << 24) | |
364 | ||
365 | /* Complete set of RFC2253 flags */ | |
366 | ||
367 | #define XN_FLAG_RFC2253 (ASN1_STRFLGS_RFC2253 | \ | |
368 | XN_FLAG_SEP_COMMA_PLUS | \ | |
369 | XN_FLAG_DN_REV | \ | |
370 | XN_FLAG_FN_SN | \ | |
371 | XN_FLAG_DUMP_UNKNOWN_FIELDS) | |
372 | ||
373 | /* readable oneline form */ | |
374 | ||
375 | #define XN_FLAG_ONELINE (ASN1_STRFLGS_RFC2253 | \ | |
376 | ASN1_STRFLGS_ESC_QUOTE | \ | |
377 | XN_FLAG_SEP_CPLUS_SPC | \ | |
378 | XN_FLAG_SPC_EQ | \ | |
379 | XN_FLAG_FN_SN) | |
380 | ||
381 | /* readable multiline form */ | |
382 | ||
383 | #define XN_FLAG_MULTILINE (ASN1_STRFLGS_ESC_CTRL | \ | |
384 | ASN1_STRFLGS_ESC_MSB | \ | |
385 | XN_FLAG_SEP_MULTILINE | \ | |
386 | XN_FLAG_SPC_EQ | \ | |
387 | XN_FLAG_FN_LN) | |
388 | ||
d02b48c6 RE |
389 | typedef struct X509_revoked_st |
390 | { | |
391 | ASN1_INTEGER *serialNumber; | |
284ef5f3 | 392 | ASN1_TIME *revocationDate; |
0b3f827c | 393 | STACK_OF(X509_EXTENSION) /* optional */ *extensions; |
d02b48c6 RE |
394 | int sequence; /* load sequence */ |
395 | } X509_REVOKED; | |
396 | ||
ee8ba0b2 BL |
397 | DECLARE_STACK_OF(X509_REVOKED) |
398 | DECLARE_ASN1_SET_OF(X509_REVOKED) | |
399 | ||
d02b48c6 RE |
400 | typedef struct X509_crl_info_st |
401 | { | |
402 | ASN1_INTEGER *version; | |
403 | X509_ALGOR *sig_alg; | |
404 | X509_NAME *issuer; | |
284ef5f3 DSH |
405 | ASN1_TIME *lastUpdate; |
406 | ASN1_TIME *nextUpdate; | |
ee8ba0b2 | 407 | STACK_OF(X509_REVOKED) *revoked; |
0b3f827c | 408 | STACK_OF(X509_EXTENSION) /* [0] */ *extensions; |
d02b48c6 RE |
409 | } X509_CRL_INFO; |
410 | ||
411 | typedef struct X509_crl_st | |
412 | { | |
413 | /* actual signature */ | |
414 | X509_CRL_INFO *crl; | |
415 | X509_ALGOR *sig_alg; | |
416 | ASN1_BIT_STRING *signature; | |
417 | int references; | |
418 | } X509_CRL; | |
419 | ||
6d114240 BL |
420 | DECLARE_STACK_OF(X509_CRL) |
421 | DECLARE_ASN1_SET_OF(X509_CRL) | |
422 | ||
d02b48c6 RE |
423 | typedef struct private_key_st |
424 | { | |
425 | int version; | |
426 | /* The PKCS#8 data types */ | |
427 | X509_ALGOR *enc_algor; | |
428 | ASN1_OCTET_STRING *enc_pkey; /* encrypted pub key */ | |
429 | ||
430 | /* When decrypted, the following will not be NULL */ | |
431 | EVP_PKEY *dec_pkey; | |
432 | ||
433 | /* used to encrypt and decrypt */ | |
434 | int key_length; | |
435 | char *key_data; | |
436 | int key_free; /* true if we should auto free key_data */ | |
437 | ||
438 | /* expanded version of 'enc_algor' */ | |
439 | EVP_CIPHER_INFO cipher; | |
440 | ||
441 | int references; | |
442 | } X509_PKEY; | |
443 | ||
ef33b970 | 444 | #ifndef NO_EVP |
d02b48c6 RE |
445 | typedef struct X509_info_st |
446 | { | |
447 | X509 *x509; | |
448 | X509_CRL *crl; | |
449 | X509_PKEY *x_pkey; | |
450 | ||
451 | EVP_CIPHER_INFO enc_cipher; | |
452 | int enc_len; | |
453 | char *enc_data; | |
454 | ||
455 | int references; | |
456 | } X509_INFO; | |
20b85fdd RE |
457 | |
458 | DECLARE_STACK_OF(X509_INFO) | |
d02b48c6 RE |
459 | #endif |
460 | ||
461 | /* The next 2 structures and their 8 routines were sent to me by | |
462 | * Pat Richard <patr@x509.com> and are used to manipulate | |
657e60fa | 463 | * Netscapes spki structures - useful if you are writing a CA web page |
d02b48c6 RE |
464 | */ |
465 | typedef struct Netscape_spkac_st | |
466 | { | |
467 | X509_PUBKEY *pubkey; | |
468 | ASN1_IA5STRING *challenge; /* challenge sent in atlas >= PR2 */ | |
469 | } NETSCAPE_SPKAC; | |
470 | ||
471 | typedef struct Netscape_spki_st | |
472 | { | |
473 | NETSCAPE_SPKAC *spkac; /* signed public key and challenge */ | |
474 | X509_ALGOR *sig_algor; | |
475 | ASN1_BIT_STRING *signature; | |
476 | } NETSCAPE_SPKI; | |
477 | ||
92c046ca DSH |
478 | /* Netscape certificate sequence structure */ |
479 | typedef struct Netscape_certificate_sequence | |
480 | { | |
481 | ASN1_OBJECT *type; | |
e5e932d2 | 482 | STACK_OF(X509) *certs; |
92c046ca DSH |
483 | } NETSCAPE_CERT_SEQUENCE; |
484 | ||
d02b48c6 RE |
485 | typedef struct CBCParameter_st |
486 | { | |
487 | unsigned char iv[8]; | |
488 | } CBC_PARAM; | |
489 | ||
cfcefcbe DSH |
490 | /* Password based encryption structure */ |
491 | ||
492 | typedef struct PBEPARAM_st { | |
493 | ASN1_OCTET_STRING *salt; | |
494 | ASN1_INTEGER *iter; | |
495 | } PBEPARAM; | |
496 | ||
d2e26dcc DSH |
497 | /* Password based encryption V2 structures */ |
498 | ||
499 | typedef struct PBE2PARAM_st { | |
500 | X509_ALGOR *keyfunc; | |
501 | X509_ALGOR *encryption; | |
502 | } PBE2PARAM; | |
503 | ||
504 | typedef struct PBKDF2PARAM_st { | |
8e21c146 | 505 | ASN1_TYPE *salt; /* Usually OCTET STRING but could be anything */ |
d2e26dcc DSH |
506 | ASN1_INTEGER *iter; |
507 | ASN1_INTEGER *keylength; | |
508 | X509_ALGOR *prf; | |
509 | } PBKDF2PARAM; | |
510 | ||
511 | ||
cfcefcbe DSH |
512 | /* PKCS#8 private key info structure */ |
513 | ||
514 | typedef struct pkcs8_priv_key_info_st | |
515 | { | |
516 | int broken; /* Flag for various broken formats */ | |
66430207 DSH |
517 | #define PKCS8_OK 0 |
518 | #define PKCS8_NO_OCTET 1 | |
519 | #define PKCS8_EMBEDDED_PARAM 2 | |
520 | #define PKCS8_NS_DB 3 | |
cfcefcbe DSH |
521 | ASN1_INTEGER *version; |
522 | X509_ALGOR *pkeyalg; | |
523 | ASN1_TYPE *pkey; /* Should be OCTET STRING but some are broken */ | |
fc875472 | 524 | STACK_OF(X509_ATTRIBUTE) *attributes; |
cfcefcbe DSH |
525 | } PKCS8_PRIV_KEY_INFO; |
526 | ||
82271cee RL |
527 | #ifdef __cplusplus |
528 | } | |
529 | #endif | |
530 | ||
ec577822 BM |
531 | #include <openssl/x509_vfy.h> |
532 | #include <openssl/pkcs7.h> | |
d02b48c6 | 533 | |
82271cee RL |
534 | #ifdef __cplusplus |
535 | extern "C" { | |
536 | #endif | |
537 | ||
d02b48c6 RE |
538 | #ifdef SSLEAY_MACROS |
539 | #define X509_verify(a,r) ASN1_verify((int (*)())i2d_X509_CINF,a->sig_alg,\ | |
540 | a->signature,(char *)a->cert_info,r) | |
541 | #define X509_REQ_verify(a,r) ASN1_verify((int (*)())i2d_X509_REQ_INFO, \ | |
542 | a->sig_alg,a->signature,(char *)a->req_info,r) | |
543 | #define X509_CRL_verify(a,r) ASN1_verify((int (*)())i2d_X509_CRL_INFO, \ | |
544 | a->sig_alg, a->signature,(char *)a->crl,r) | |
d02b48c6 RE |
545 | |
546 | #define X509_sign(x,pkey,md) \ | |
547 | ASN1_sign((int (*)())i2d_X509_CINF, x->cert_info->signature, \ | |
548 | x->sig_alg, x->signature, (char *)x->cert_info,pkey,md) | |
549 | #define X509_REQ_sign(x,pkey,md) \ | |
550 | ASN1_sign((int (*)())i2d_X509_REQ_INFO,x->sig_alg, NULL, \ | |
551 | x->signature, (char *)x->req_info,pkey,md) | |
552 | #define X509_CRL_sign(x,pkey,md) \ | |
553 | ASN1_sign((int (*)())i2d_X509_CRL_INFO,x->crl->sig_alg,x->sig_alg, \ | |
554 | x->signature, (char *)x->crl,pkey,md) | |
555 | #define NETSCAPE_SPKI_sign(x,pkey,md) \ | |
556 | ASN1_sign((int (*)())i2d_NETSCAPE_SPKAC, x->sig_algor,NULL, \ | |
557 | x->signature, (char *)x->spkac,pkey,md) | |
558 | ||
559 | #define X509_dup(x509) (X509 *)ASN1_dup((int (*)())i2d_X509, \ | |
560 | (char *(*)())d2i_X509,(char *)x509) | |
dfeab068 RE |
561 | #define X509_ATTRIBUTE_dup(xa) (X509_ATTRIBUTE *)ASN1_dup(\ |
562 | (int (*)())i2d_X509_ATTRIBUTE, \ | |
563 | (char *(*)())d2i_X509_ATTRIBUTE,(char *)xa) | |
d02b48c6 RE |
564 | #define X509_EXTENSION_dup(ex) (X509_EXTENSION *)ASN1_dup( \ |
565 | (int (*)())i2d_X509_EXTENSION, \ | |
566 | (char *(*)())d2i_X509_EXTENSION,(char *)ex) | |
567 | #define d2i_X509_fp(fp,x509) (X509 *)ASN1_d2i_fp((char *(*)())X509_new, \ | |
568 | (char *(*)())d2i_X509, (fp),(unsigned char **)(x509)) | |
569 | #define i2d_X509_fp(fp,x509) ASN1_i2d_fp(i2d_X509,fp,(unsigned char *)x509) | |
570 | #define d2i_X509_bio(bp,x509) (X509 *)ASN1_d2i_bio((char *(*)())X509_new, \ | |
571 | (char *(*)())d2i_X509, (bp),(unsigned char **)(x509)) | |
572 | #define i2d_X509_bio(bp,x509) ASN1_i2d_bio(i2d_X509,bp,(unsigned char *)x509) | |
573 | ||
574 | #define X509_CRL_dup(crl) (X509_CRL *)ASN1_dup((int (*)())i2d_X509_CRL, \ | |
575 | (char *(*)())d2i_X509_CRL,(char *)crl) | |
576 | #define d2i_X509_CRL_fp(fp,crl) (X509_CRL *)ASN1_d2i_fp((char *(*)()) \ | |
577 | X509_CRL_new,(char *(*)())d2i_X509_CRL, (fp),\ | |
578 | (unsigned char **)(crl)) | |
579 | #define i2d_X509_CRL_fp(fp,crl) ASN1_i2d_fp(i2d_X509_CRL,fp,\ | |
580 | (unsigned char *)crl) | |
581 | #define d2i_X509_CRL_bio(bp,crl) (X509_CRL *)ASN1_d2i_bio((char *(*)()) \ | |
582 | X509_CRL_new,(char *(*)())d2i_X509_CRL, (bp),\ | |
583 | (unsigned char **)(crl)) | |
584 | #define i2d_X509_CRL_bio(bp,crl) ASN1_i2d_bio(i2d_X509_CRL,bp,\ | |
585 | (unsigned char *)crl) | |
586 | ||
587 | #define PKCS7_dup(p7) (PKCS7 *)ASN1_dup((int (*)())i2d_PKCS7, \ | |
588 | (char *(*)())d2i_PKCS7,(char *)p7) | |
589 | #define d2i_PKCS7_fp(fp,p7) (PKCS7 *)ASN1_d2i_fp((char *(*)()) \ | |
590 | PKCS7_new,(char *(*)())d2i_PKCS7, (fp),\ | |
591 | (unsigned char **)(p7)) | |
592 | #define i2d_PKCS7_fp(fp,p7) ASN1_i2d_fp(i2d_PKCS7,fp,\ | |
593 | (unsigned char *)p7) | |
594 | #define d2i_PKCS7_bio(bp,p7) (PKCS7 *)ASN1_d2i_bio((char *(*)()) \ | |
595 | PKCS7_new,(char *(*)())d2i_PKCS7, (bp),\ | |
596 | (unsigned char **)(p7)) | |
597 | #define i2d_PKCS7_bio(bp,p7) ASN1_i2d_bio(i2d_PKCS7,bp,\ | |
598 | (unsigned char *)p7) | |
599 | ||
600 | #define X509_REQ_dup(req) (X509_REQ *)ASN1_dup((int (*)())i2d_X509_REQ, \ | |
601 | (char *(*)())d2i_X509_REQ,(char *)req) | |
602 | #define d2i_X509_REQ_fp(fp,req) (X509_REQ *)ASN1_d2i_fp((char *(*)())\ | |
603 | X509_REQ_new, (char *(*)())d2i_X509_REQ, (fp),\ | |
604 | (unsigned char **)(req)) | |
605 | #define i2d_X509_REQ_fp(fp,req) ASN1_i2d_fp(i2d_X509_REQ,fp,\ | |
606 | (unsigned char *)req) | |
607 | #define d2i_X509_REQ_bio(bp,req) (X509_REQ *)ASN1_d2i_bio((char *(*)())\ | |
608 | X509_REQ_new, (char *(*)())d2i_X509_REQ, (bp),\ | |
609 | (unsigned char **)(req)) | |
610 | #define i2d_X509_REQ_bio(bp,req) ASN1_i2d_bio(i2d_X509_REQ,bp,\ | |
611 | (unsigned char *)req) | |
612 | ||
613 | #define RSAPublicKey_dup(rsa) (RSA *)ASN1_dup((int (*)())i2d_RSAPublicKey, \ | |
614 | (char *(*)())d2i_RSAPublicKey,(char *)rsa) | |
615 | #define RSAPrivateKey_dup(rsa) (RSA *)ASN1_dup((int (*)())i2d_RSAPrivateKey, \ | |
616 | (char *(*)())d2i_RSAPrivateKey,(char *)rsa) | |
617 | ||
618 | #define d2i_RSAPrivateKey_fp(fp,rsa) (RSA *)ASN1_d2i_fp((char *(*)())\ | |
619 | RSA_new,(char *(*)())d2i_RSAPrivateKey, (fp), \ | |
620 | (unsigned char **)(rsa)) | |
621 | #define i2d_RSAPrivateKey_fp(fp,rsa) ASN1_i2d_fp(i2d_RSAPrivateKey,fp, \ | |
622 | (unsigned char *)rsa) | |
623 | #define d2i_RSAPrivateKey_bio(bp,rsa) (RSA *)ASN1_d2i_bio((char *(*)())\ | |
624 | RSA_new,(char *(*)())d2i_RSAPrivateKey, (bp), \ | |
625 | (unsigned char **)(rsa)) | |
626 | #define i2d_RSAPrivateKey_bio(bp,rsa) ASN1_i2d_bio(i2d_RSAPrivateKey,bp, \ | |
627 | (unsigned char *)rsa) | |
628 | ||
629 | #define d2i_RSAPublicKey_fp(fp,rsa) (RSA *)ASN1_d2i_fp((char *(*)())\ | |
630 | RSA_new,(char *(*)())d2i_RSAPublicKey, (fp), \ | |
631 | (unsigned char **)(rsa)) | |
632 | #define i2d_RSAPublicKey_fp(fp,rsa) ASN1_i2d_fp(i2d_RSAPublicKey,fp, \ | |
633 | (unsigned char *)rsa) | |
634 | #define d2i_RSAPublicKey_bio(bp,rsa) (RSA *)ASN1_d2i_bio((char *(*)())\ | |
635 | RSA_new,(char *(*)())d2i_RSAPublicKey, (bp), \ | |
636 | (unsigned char **)(rsa)) | |
637 | #define i2d_RSAPublicKey_bio(bp,rsa) ASN1_i2d_bio(i2d_RSAPublicKey,bp, \ | |
638 | (unsigned char *)rsa) | |
639 | ||
640 | #define d2i_DSAPrivateKey_fp(fp,dsa) (DSA *)ASN1_d2i_fp((char *(*)())\ | |
641 | DSA_new,(char *(*)())d2i_DSAPrivateKey, (fp), \ | |
642 | (unsigned char **)(dsa)) | |
643 | #define i2d_DSAPrivateKey_fp(fp,dsa) ASN1_i2d_fp(i2d_DSAPrivateKey,fp, \ | |
644 | (unsigned char *)dsa) | |
645 | #define d2i_DSAPrivateKey_bio(bp,dsa) (DSA *)ASN1_d2i_bio((char *(*)())\ | |
646 | DSA_new,(char *(*)())d2i_DSAPrivateKey, (bp), \ | |
647 | (unsigned char **)(dsa)) | |
648 | #define i2d_DSAPrivateKey_bio(bp,dsa) ASN1_i2d_bio(i2d_DSAPrivateKey,bp, \ | |
649 | (unsigned char *)dsa) | |
650 | ||
dfeab068 RE |
651 | #define X509_ALGOR_dup(xn) (X509_ALGOR *)ASN1_dup((int (*)())i2d_X509_ALGOR,\ |
652 | (char *(*)())d2i_X509_ALGOR,(char *)xn) | |
653 | ||
d02b48c6 RE |
654 | #define X509_NAME_dup(xn) (X509_NAME *)ASN1_dup((int (*)())i2d_X509_NAME, \ |
655 | (char *(*)())d2i_X509_NAME,(char *)xn) | |
656 | #define X509_NAME_ENTRY_dup(ne) (X509_NAME_ENTRY *)ASN1_dup( \ | |
657 | (int (*)())i2d_X509_NAME_ENTRY, \ | |
658 | (char *(*)())d2i_X509_NAME_ENTRY,\ | |
659 | (char *)ne) | |
660 | ||
661 | #define X509_digest(data,type,md,len) \ | |
662 | ASN1_digest((int (*)())i2d_X509,type,(char *)data,md,len) | |
663 | #define X509_NAME_digest(data,type,md,len) \ | |
664 | ASN1_digest((int (*)())i2d_X509_NAME,type,(char *)data,md,len) | |
dfeab068 | 665 | #ifndef PKCS7_ISSUER_AND_SERIAL_digest |
d02b48c6 RE |
666 | #define PKCS7_ISSUER_AND_SERIAL_digest(data,type,md,len) \ |
667 | ASN1_digest((int (*)())i2d_PKCS7_ISSUER_AND_SERIAL,type,\ | |
668 | (char *)data,md,len) | |
669 | #endif | |
dfeab068 | 670 | #endif |
d02b48c6 | 671 | |
58964a49 RE |
672 | #define X509_EXT_PACK_UNKNOWN 1 |
673 | #define X509_EXT_PACK_STRING 2 | |
674 | ||
d02b48c6 RE |
675 | #define X509_get_version(x) ASN1_INTEGER_get((x)->cert_info->version) |
676 | /* #define X509_get_serialNumber(x) ((x)->cert_info->serialNumber) */ | |
677 | #define X509_get_notBefore(x) ((x)->cert_info->validity->notBefore) | |
678 | #define X509_get_notAfter(x) ((x)->cert_info->validity->notAfter) | |
679 | #define X509_extract_key(x) X509_get_pubkey(x) /*****/ | |
680 | #define X509_REQ_get_version(x) ASN1_INTEGER_get((x)->req_info->version) | |
681 | #define X509_REQ_get_subject_name(x) ((x)->req_info->subject) | |
682 | #define X509_REQ_extract_key(a) X509_REQ_get_pubkey(a) | |
683 | #define X509_name_cmp(a,b) X509_NAME_cmp((a),(b)) | |
684 | #define X509_get_signature_type(x) EVP_PKEY_type(OBJ_obj2nid((x)->sig_alg->algorithm)) | |
685 | ||
0ca5f8b1 DSH |
686 | #define X509_CRL_get_version(x) ASN1_INTEGER_get((x)->crl->version) |
687 | #define X509_CRL_get_lastUpdate(x) ((x)->crl->lastUpdate) | |
688 | #define X509_CRL_get_nextUpdate(x) ((x)->crl->nextUpdate) | |
689 | #define X509_CRL_get_issuer(x) ((x)->crl->issuer) | |
690 | #define X509_CRL_get_REVOKED(x) ((x)->crl->revoked) | |
691 | ||
d02b48c6 RE |
692 | /* This one is only used so that a binary form can output, as in |
693 | * i2d_X509_NAME(X509_get_X509_PUBKEY(x),&buf) */ | |
694 | #define X509_get_X509_PUBKEY(x) ((x)->cert_info->key) | |
695 | ||
d02b48c6 | 696 | |
16bc9fea BM |
697 | const char *X509_verify_cert_error_string(long n); |
698 | ||
d02b48c6 | 699 | #ifndef SSLEAY_MACROS |
ef33b970 | 700 | #ifndef NO_EVP |
d02b48c6 | 701 | int X509_verify(X509 *a, EVP_PKEY *r); |
d02b48c6 RE |
702 | |
703 | int X509_REQ_verify(X509_REQ *a, EVP_PKEY *r); | |
704 | int X509_CRL_verify(X509_CRL *a, EVP_PKEY *r); | |
705 | int NETSCAPE_SPKI_verify(NETSCAPE_SPKI *a, EVP_PKEY *r); | |
706 | ||
092ec334 | 707 | NETSCAPE_SPKI * NETSCAPE_SPKI_b64_decode(const char *str, int len); |
8ce97163 DSH |
708 | char * NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI *x); |
709 | EVP_PKEY *NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI *x); | |
710 | int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI *x, EVP_PKEY *pkey); | |
711 | ||
712 | int NETSCAPE_SPKI_print(BIO *out, NETSCAPE_SPKI *spki); | |
713 | ||
e778802f BL |
714 | int X509_sign(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); |
715 | int X509_REQ_sign(X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md); | |
716 | int X509_CRL_sign(X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md); | |
717 | int NETSCAPE_SPKI_sign(NETSCAPE_SPKI *x, EVP_PKEY *pkey, const EVP_MD *md); | |
d02b48c6 | 718 | |
ccd86b68 GT |
719 | int X509_digest(const X509 *data,const EVP_MD *type, |
720 | unsigned char *md, unsigned int *len); | |
721 | int X509_CRL_digest(const X509_CRL *data,const EVP_MD *type, | |
722 | unsigned char *md, unsigned int *len); | |
723 | int X509_REQ_digest(const X509_REQ *data,const EVP_MD *type, | |
724 | unsigned char *md, unsigned int *len); | |
725 | int X509_NAME_digest(const X509_NAME *data,const EVP_MD *type, | |
726 | unsigned char *md, unsigned int *len); | |
d02b48c6 RE |
727 | #endif |
728 | ||
58964a49 | 729 | #ifndef NO_FP_API |
31a352d1 | 730 | X509 *d2i_X509_fp(FILE *fp, X509 **x509); |
d02b48c6 | 731 | int i2d_X509_fp(FILE *fp,X509 *x509); |
31a352d1 | 732 | X509_CRL *d2i_X509_CRL_fp(FILE *fp,X509_CRL **crl); |
d02b48c6 | 733 | int i2d_X509_CRL_fp(FILE *fp,X509_CRL *crl); |
31a352d1 | 734 | X509_REQ *d2i_X509_REQ_fp(FILE *fp,X509_REQ **req); |
d02b48c6 | 735 | int i2d_X509_REQ_fp(FILE *fp,X509_REQ *req); |
f5d7a031 | 736 | #ifndef NO_RSA |
31a352d1 | 737 | RSA *d2i_RSAPrivateKey_fp(FILE *fp,RSA **rsa); |
d02b48c6 | 738 | int i2d_RSAPrivateKey_fp(FILE *fp,RSA *rsa); |
31a352d1 | 739 | RSA *d2i_RSAPublicKey_fp(FILE *fp,RSA **rsa); |
d02b48c6 | 740 | int i2d_RSAPublicKey_fp(FILE *fp,RSA *rsa); |
52664f50 DSH |
741 | RSA *d2i_RSA_PUBKEY_fp(FILE *fp,RSA **rsa); |
742 | int i2d_RSA_PUBKEY_fp(FILE *fp,RSA *rsa); | |
d02b48c6 | 743 | #endif |
f5d7a031 | 744 | #ifndef NO_DSA |
52664f50 DSH |
745 | DSA *d2i_DSA_PUBKEY_fp(FILE *fp, DSA **dsa); |
746 | int i2d_DSA_PUBKEY_fp(FILE *fp, DSA *dsa); | |
31a352d1 | 747 | DSA *d2i_DSAPrivateKey_fp(FILE *fp, DSA **dsa); |
f5d7a031 | 748 | int i2d_DSAPrivateKey_fp(FILE *fp, DSA *dsa); |
e6f3c585 | 749 | #endif |
3cbb7937 DSH |
750 | X509_SIG *d2i_PKCS8_fp(FILE *fp,X509_SIG **p8); |
751 | int i2d_PKCS8_fp(FILE *fp,X509_SIG *p8); | |
752 | PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_fp(FILE *fp, | |
753 | PKCS8_PRIV_KEY_INFO **p8inf); | |
754 | int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE *fp,PKCS8_PRIV_KEY_INFO *p8inf); | |
36217a94 | 755 | int i2d_PKCS8PrivateKeyInfo_fp(FILE *fp, EVP_PKEY *key); |
e6f3c585 | 756 | int i2d_PrivateKey_fp(FILE *fp, EVP_PKEY *pkey); |
20432eae | 757 | EVP_PKEY *d2i_PrivateKey_fp(FILE *fp, EVP_PKEY **a); |
bd08a2bd DSH |
758 | int i2d_PUBKEY_fp(FILE *fp, EVP_PKEY *pkey); |
759 | EVP_PKEY *d2i_PUBKEY_fp(FILE *fp, EVP_PKEY **a); | |
f5d7a031 | 760 | #endif |
d02b48c6 | 761 | |
ef33b970 | 762 | #ifndef NO_BIO |
31a352d1 | 763 | X509 *d2i_X509_bio(BIO *bp,X509 **x509); |
d02b48c6 | 764 | int i2d_X509_bio(BIO *bp,X509 *x509); |
31a352d1 | 765 | X509_CRL *d2i_X509_CRL_bio(BIO *bp,X509_CRL **crl); |
d02b48c6 | 766 | int i2d_X509_CRL_bio(BIO *bp,X509_CRL *crl); |
31a352d1 | 767 | X509_REQ *d2i_X509_REQ_bio(BIO *bp,X509_REQ **req); |
d02b48c6 | 768 | int i2d_X509_REQ_bio(BIO *bp,X509_REQ *req); |
f5d7a031 | 769 | #ifndef NO_RSA |
31a352d1 | 770 | RSA *d2i_RSAPrivateKey_bio(BIO *bp,RSA **rsa); |
d02b48c6 | 771 | int i2d_RSAPrivateKey_bio(BIO *bp,RSA *rsa); |
31a352d1 | 772 | RSA *d2i_RSAPublicKey_bio(BIO *bp,RSA **rsa); |
d02b48c6 | 773 | int i2d_RSAPublicKey_bio(BIO *bp,RSA *rsa); |
52664f50 DSH |
774 | RSA *d2i_RSA_PUBKEY_bio(BIO *bp,RSA **rsa); |
775 | int i2d_RSA_PUBKEY_bio(BIO *bp,RSA *rsa); | |
d02b48c6 | 776 | #endif |
f5d7a031 | 777 | #ifndef NO_DSA |
52664f50 DSH |
778 | DSA *d2i_DSA_PUBKEY_bio(BIO *bp, DSA **dsa); |
779 | int i2d_DSA_PUBKEY_bio(BIO *bp, DSA *dsa); | |
31a352d1 | 780 | DSA *d2i_DSAPrivateKey_bio(BIO *bp, DSA **dsa); |
f5d7a031 | 781 | int i2d_DSAPrivateKey_bio(BIO *bp, DSA *dsa); |
5271ebd9 | 782 | #endif |
3cbb7937 DSH |
783 | X509_SIG *d2i_PKCS8_bio(BIO *bp,X509_SIG **p8); |
784 | int i2d_PKCS8_bio(BIO *bp,X509_SIG *p8); | |
785 | PKCS8_PRIV_KEY_INFO *d2i_PKCS8_PRIV_KEY_INFO_bio(BIO *bp, | |
786 | PKCS8_PRIV_KEY_INFO **p8inf); | |
787 | int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO *bp,PKCS8_PRIV_KEY_INFO *p8inf); | |
36217a94 | 788 | int i2d_PKCS8PrivateKeyInfo_bio(BIO *bp, EVP_PKEY *key); |
e6f3c585 | 789 | int i2d_PrivateKey_bio(BIO *bp, EVP_PKEY *pkey); |
20432eae | 790 | EVP_PKEY *d2i_PrivateKey_bio(BIO *bp, EVP_PKEY **a); |
bd08a2bd DSH |
791 | int i2d_PUBKEY_bio(BIO *bp, EVP_PKEY *pkey); |
792 | EVP_PKEY *d2i_PUBKEY_bio(BIO *bp, EVP_PKEY **a); | |
f5d7a031 | 793 | #endif |
d02b48c6 RE |
794 | |
795 | X509 *X509_dup(X509 *x509); | |
dfeab068 | 796 | X509_ATTRIBUTE *X509_ATTRIBUTE_dup(X509_ATTRIBUTE *xa); |
d02b48c6 RE |
797 | X509_EXTENSION *X509_EXTENSION_dup(X509_EXTENSION *ex); |
798 | X509_CRL *X509_CRL_dup(X509_CRL *crl); | |
799 | X509_REQ *X509_REQ_dup(X509_REQ *req); | |
dfeab068 | 800 | X509_ALGOR *X509_ALGOR_dup(X509_ALGOR *xn); |
d02b48c6 RE |
801 | X509_NAME *X509_NAME_dup(X509_NAME *xn); |
802 | X509_NAME_ENTRY *X509_NAME_ENTRY_dup(X509_NAME_ENTRY *ne); | |
f5d7a031 | 803 | #ifndef NO_RSA |
d02b48c6 RE |
804 | RSA *RSAPublicKey_dup(RSA *rsa); |
805 | RSA *RSAPrivateKey_dup(RSA *rsa); | |
f5d7a031 | 806 | #endif |
d02b48c6 RE |
807 | |
808 | #endif /* !SSLEAY_MACROS */ | |
809 | ||
bbb72003 | 810 | int X509_cmp_time(ASN1_TIME *s, time_t *t); |
284ef5f3 | 811 | int X509_cmp_current_time(ASN1_TIME *s); |
bbb72003 | 812 | ASN1_TIME * X509_time_adj(ASN1_TIME *s, long adj, time_t *t); |
284ef5f3 | 813 | ASN1_TIME * X509_gmtime_adj(ASN1_TIME *s, long adj); |
d02b48c6 | 814 | |
e778802f BL |
815 | const char * X509_get_default_cert_area(void ); |
816 | const char * X509_get_default_cert_dir(void ); | |
817 | const char * X509_get_default_cert_file(void ); | |
818 | const char * X509_get_default_cert_dir_env(void ); | |
819 | const char * X509_get_default_cert_file_env(void ); | |
820 | const char * X509_get_default_private_dir(void ); | |
d02b48c6 | 821 | |
9868232a | 822 | X509_REQ * X509_to_X509_REQ(X509 *x, EVP_PKEY *pkey, const EVP_MD *md); |
d02b48c6 RE |
823 | X509 * X509_REQ_to_X509(X509_REQ *r, int days,EVP_PKEY *pkey); |
824 | void ERR_load_X509_strings(void ); | |
825 | ||
9d6b1ce6 DSH |
826 | DECLARE_ASN1_FUNCTIONS(X509_ALGOR) |
827 | DECLARE_ASN1_FUNCTIONS(X509_VAL) | |
d02b48c6 | 828 | |
9d6b1ce6 | 829 | DECLARE_ASN1_FUNCTIONS(X509_PUBKEY) |
d02b48c6 | 830 | |
d02b48c6 RE |
831 | int X509_PUBKEY_set(X509_PUBKEY **x, EVP_PKEY *pkey); |
832 | EVP_PKEY * X509_PUBKEY_get(X509_PUBKEY *key); | |
7e258a56 BL |
833 | int X509_get_pubkey_parameters(EVP_PKEY *pkey, |
834 | STACK_OF(X509) *chain); | |
52664f50 DSH |
835 | int i2d_PUBKEY(EVP_PKEY *a,unsigned char **pp); |
836 | EVP_PKEY * d2i_PUBKEY(EVP_PKEY **a,unsigned char **pp, | |
837 | long length); | |
12aefe78 | 838 | #ifndef NO_RSA |
52664f50 DSH |
839 | int i2d_RSA_PUBKEY(RSA *a,unsigned char **pp); |
840 | RSA * d2i_RSA_PUBKEY(RSA **a,unsigned char **pp, | |
841 | long length); | |
12aefe78 DSH |
842 | #endif |
843 | #ifndef NO_DSA | |
52664f50 DSH |
844 | int i2d_DSA_PUBKEY(DSA *a,unsigned char **pp); |
845 | DSA * d2i_DSA_PUBKEY(DSA **a,unsigned char **pp, | |
846 | long length); | |
12aefe78 | 847 | #endif |
d02b48c6 | 848 | |
9d6b1ce6 DSH |
849 | DECLARE_ASN1_FUNCTIONS(X509_SIG) |
850 | DECLARE_ASN1_FUNCTIONS(X509_REQ_INFO) | |
851 | DECLARE_ASN1_FUNCTIONS(X509_REQ) | |
d02b48c6 | 852 | |
9d6b1ce6 | 853 | DECLARE_ASN1_FUNCTIONS(X509_ATTRIBUTE) |
c8b41850 | 854 | X509_ATTRIBUTE *X509_ATTRIBUTE_create(int nid, int atrtype, void *value); |
dfeab068 | 855 | |
9d6b1ce6 | 856 | DECLARE_ASN1_FUNCTIONS(X509_EXTENSION) |
d02b48c6 | 857 | |
9d6b1ce6 | 858 | DECLARE_ASN1_FUNCTIONS(X509_NAME_ENTRY) |
d02b48c6 | 859 | |
9d6b1ce6 | 860 | DECLARE_ASN1_FUNCTIONS(X509_NAME) |
d02b48c6 | 861 | |
d02b48c6 RE |
862 | int X509_NAME_set(X509_NAME **xn, X509_NAME *name); |
863 | ||
9d6b1ce6 | 864 | DECLARE_ASN1_FUNCTIONS(X509_CINF) |
d02b48c6 | 865 | |
9d6b1ce6 DSH |
866 | DECLARE_ASN1_FUNCTIONS(X509) |
867 | DECLARE_ASN1_FUNCTIONS(X509_CERT_AUX) | |
d02b48c6 | 868 | |
dd9d233e DSH |
869 | int X509_get_ex_new_index(long argl, void *argp, CRYPTO_EX_new *new_func, |
870 | CRYPTO_EX_dup *dup_func, CRYPTO_EX_free *free_func); | |
871 | int X509_set_ex_data(X509 *r, int idx, void *arg); | |
872 | void *X509_get_ex_data(X509 *r, int idx); | |
ce1b4fe1 DSH |
873 | int i2d_X509_AUX(X509 *a,unsigned char **pp); |
874 | X509 * d2i_X509_AUX(X509 **a,unsigned char **pp,long length); | |
875 | ||
6d0d5431 | 876 | int X509_alias_set1(X509 *x, unsigned char *name, int len); |
84b65340 | 877 | int X509_keyid_set1(X509 *x, unsigned char *id, int len); |
6d0d5431 | 878 | unsigned char * X509_alias_get0(X509 *x, int *len); |
6447cce3 | 879 | int (*X509_TRUST_set_default(int (*trust)(int , X509 *, int)))(int, X509 *, int); |
c7cb16a8 DSH |
880 | int X509_add1_trust_object(X509 *x, ASN1_OBJECT *obj); |
881 | int X509_add1_reject_object(X509 *x, ASN1_OBJECT *obj); | |
6447cce3 DSH |
882 | void X509_trust_clear(X509 *x); |
883 | void X509_reject_clear(X509 *x); | |
d02b48c6 | 884 | |
9d6b1ce6 DSH |
885 | DECLARE_ASN1_FUNCTIONS(X509_REVOKED) |
886 | DECLARE_ASN1_FUNCTIONS(X509_CRL_INFO) | |
887 | DECLARE_ASN1_FUNCTIONS(X509_CRL) | |
d02b48c6 | 888 | |
9d6b1ce6 | 889 | int X509_CRL_add0_revoked(X509_CRL *crl, X509_REVOKED *rev); |
d02b48c6 RE |
890 | |
891 | X509_PKEY * X509_PKEY_new(void ); | |
892 | void X509_PKEY_free(X509_PKEY *a); | |
893 | int i2d_X509_PKEY(X509_PKEY *a,unsigned char **pp); | |
894 | X509_PKEY * d2i_X509_PKEY(X509_PKEY **a,unsigned char **pp,long length); | |
895 | ||
9d6b1ce6 DSH |
896 | DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKI) |
897 | DECLARE_ASN1_FUNCTIONS(NETSCAPE_SPKAC) | |
898 | DECLARE_ASN1_FUNCTIONS(NETSCAPE_CERT_SEQUENCE) | |
92c046ca | 899 | |
ef33b970 | 900 | #ifndef NO_EVP |
d02b48c6 RE |
901 | X509_INFO * X509_INFO_new(void); |
902 | void X509_INFO_free(X509_INFO *a); | |
903 | char * X509_NAME_oneline(X509_NAME *a,char *buf,int size); | |
904 | ||
905 | int ASN1_verify(int (*i2d)(), X509_ALGOR *algor1, | |
906 | ASN1_BIT_STRING *signature,char *data,EVP_PKEY *pkey); | |
907 | ||
9868232a | 908 | int ASN1_digest(int (*i2d)(),const EVP_MD *type,char *data, |
d02b48c6 RE |
909 | unsigned char *md,unsigned int *len); |
910 | ||
911 | int ASN1_sign(int (*i2d)(), X509_ALGOR *algor1, X509_ALGOR *algor2, | |
912 | ASN1_BIT_STRING *signature, | |
e778802f | 913 | char *data,EVP_PKEY *pkey, const EVP_MD *type); |
d02b48c6 RE |
914 | #endif |
915 | ||
916 | int X509_set_version(X509 *x,long version); | |
917 | int X509_set_serialNumber(X509 *x, ASN1_INTEGER *serial); | |
918 | ASN1_INTEGER * X509_get_serialNumber(X509 *x); | |
919 | int X509_set_issuer_name(X509 *x, X509_NAME *name); | |
920 | X509_NAME * X509_get_issuer_name(X509 *a); | |
921 | int X509_set_subject_name(X509 *x, X509_NAME *name); | |
922 | X509_NAME * X509_get_subject_name(X509 *a); | |
284ef5f3 DSH |
923 | int X509_set_notBefore(X509 *x, ASN1_TIME *tm); |
924 | int X509_set_notAfter(X509 *x, ASN1_TIME *tm); | |
d02b48c6 RE |
925 | int X509_set_pubkey(X509 *x, EVP_PKEY *pkey); |
926 | EVP_PKEY * X509_get_pubkey(X509 *x); | |
927 | int X509_certificate_type(X509 *x,EVP_PKEY *pubkey /* optional */); | |
928 | ||
929 | int X509_REQ_set_version(X509_REQ *x,long version); | |
930 | int X509_REQ_set_subject_name(X509_REQ *req,X509_NAME *name); | |
931 | int X509_REQ_set_pubkey(X509_REQ *x, EVP_PKEY *pkey); | |
932 | EVP_PKEY * X509_REQ_get_pubkey(X509_REQ *req); | |
87c49f62 | 933 | int X509_REQ_extension_nid(int nid); |
657e60fa | 934 | int * X509_REQ_get_extension_nids(void); |
87c49f62 DSH |
935 | void X509_REQ_set_extension_nids(int *nids); |
936 | STACK_OF(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ *req); | |
fd520577 DSH |
937 | int X509_REQ_add_extensions_nid(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts, |
938 | int nid); | |
939 | int X509_REQ_add_extensions(X509_REQ *req, STACK_OF(X509_EXTENSION) *exts); | |
6e6bc352 DSH |
940 | int X509_REQ_get_attr_count(const X509_REQ *req); |
941 | int X509_REQ_get_attr_by_NID(const X509_REQ *req, int nid, | |
942 | int lastpos); | |
943 | int X509_REQ_get_attr_by_OBJ(const X509_REQ *req, ASN1_OBJECT *obj, | |
944 | int lastpos); | |
945 | X509_ATTRIBUTE *X509_REQ_get_attr(const X509_REQ *req, int loc); | |
946 | X509_ATTRIBUTE *X509_REQ_delete_attr(X509_REQ *req, int loc); | |
c7cb16a8 DSH |
947 | int X509_REQ_add1_attr(X509_REQ *req, X509_ATTRIBUTE *attr); |
948 | int X509_REQ_add1_attr_by_OBJ(X509_REQ *req, | |
6e6bc352 DSH |
949 | ASN1_OBJECT *obj, int type, |
950 | unsigned char *bytes, int len); | |
c7cb16a8 | 951 | int X509_REQ_add1_attr_by_NID(X509_REQ *req, |
6e6bc352 DSH |
952 | int nid, int type, |
953 | unsigned char *bytes, int len); | |
c7cb16a8 | 954 | int X509_REQ_add1_attr_by_txt(X509_REQ *req, |
6e6bc352 DSH |
955 | char *attrname, int type, |
956 | unsigned char *bytes, int len); | |
d02b48c6 RE |
957 | |
958 | int X509_check_private_key(X509 *x509,EVP_PKEY *pkey); | |
959 | ||
ccd86b68 | 960 | int X509_issuer_and_serial_cmp(const X509 *a, const X509 *b); |
d02b48c6 RE |
961 | unsigned long X509_issuer_and_serial_hash(X509 *a); |
962 | ||
ccd86b68 | 963 | int X509_issuer_name_cmp(const X509 *a, const X509 *b); |
d02b48c6 RE |
964 | unsigned long X509_issuer_name_hash(X509 *a); |
965 | ||
ccd86b68 | 966 | int X509_subject_name_cmp(const X509 *a, const X509 *b); |
d02b48c6 RE |
967 | unsigned long X509_subject_name_hash(X509 *x); |
968 | ||
ccd86b68 GT |
969 | int X509_cmp(const X509 *a, const X509 *b); |
970 | int X509_NAME_cmp(const X509_NAME *a, const X509_NAME *b); | |
d02b48c6 RE |
971 | unsigned long X509_NAME_hash(X509_NAME *x); |
972 | ||
ccd86b68 | 973 | int X509_CRL_cmp(const X509_CRL *a, const X509_CRL *b); |
58964a49 | 974 | #ifndef NO_FP_API |
d0c98589 | 975 | int X509_print_ex_fp(FILE *bp,X509 *x, unsigned long nmflag, unsigned long cflag); |
d02b48c6 | 976 | int X509_print_fp(FILE *bp,X509 *x); |
0ca5f8b1 | 977 | int X509_CRL_print_fp(FILE *bp,X509_CRL *x); |
d02b48c6 | 978 | int X509_REQ_print_fp(FILE *bp,X509_REQ *req); |
a657546f | 979 | int X509_NAME_print_ex_fp(FILE *fp, X509_NAME *nm, int indent, unsigned long flags); |
d02b48c6 RE |
980 | #endif |
981 | ||
ef33b970 | 982 | #ifndef NO_BIO |
d02b48c6 | 983 | int X509_NAME_print(BIO *bp, X509_NAME *name, int obase); |
a657546f | 984 | int X509_NAME_print_ex(BIO *out, X509_NAME *nm, int indent, unsigned long flags); |
d0c98589 | 985 | int X509_print_ex(BIO *bp,X509 *x, unsigned long nmflag, unsigned long cflag); |
d02b48c6 | 986 | int X509_print(BIO *bp,X509 *x); |
eb64730b | 987 | int X509_ocspid_print(BIO *bp,X509 *x); |
ce1b4fe1 | 988 | int X509_CERT_AUX_print(BIO *bp,X509_CERT_AUX *x, int indent); |
0ca5f8b1 | 989 | int X509_CRL_print(BIO *bp,X509_CRL *x); |
d02b48c6 RE |
990 | int X509_REQ_print(BIO *bp,X509_REQ *req); |
991 | #endif | |
992 | ||
993 | int X509_NAME_entry_count(X509_NAME *name); | |
994 | int X509_NAME_get_text_by_NID(X509_NAME *name, int nid, | |
995 | char *buf,int len); | |
996 | int X509_NAME_get_text_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, | |
997 | char *buf,int len); | |
998 | ||
58964a49 | 999 | /* NOTE: you should be passsing -1, not 0 as lastpos. The functions that use |
657e60fa | 1000 | * lastpos, search after that position on. */ |
58964a49 | 1001 | int X509_NAME_get_index_by_NID(X509_NAME *name,int nid,int lastpos); |
d02b48c6 | 1002 | int X509_NAME_get_index_by_OBJ(X509_NAME *name,ASN1_OBJECT *obj, |
58964a49 | 1003 | int lastpos); |
d02b48c6 RE |
1004 | X509_NAME_ENTRY *X509_NAME_get_entry(X509_NAME *name, int loc); |
1005 | X509_NAME_ENTRY *X509_NAME_delete_entry(X509_NAME *name, int loc); | |
1006 | int X509_NAME_add_entry(X509_NAME *name,X509_NAME_ENTRY *ne, | |
1007 | int loc, int set); | |
74400f73 DSH |
1008 | int X509_NAME_add_entry_by_OBJ(X509_NAME *name, ASN1_OBJECT *obj, int type, |
1009 | unsigned char *bytes, int len, int loc, int set); | |
1010 | int X509_NAME_add_entry_by_NID(X509_NAME *name, int nid, int type, | |
1011 | unsigned char *bytes, int len, int loc, int set); | |
1012 | X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY **ne, | |
1013 | char *field, int type, unsigned char *bytes, int len); | |
d02b48c6 RE |
1014 | X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY **ne, int nid, |
1015 | int type,unsigned char *bytes, int len); | |
74400f73 DSH |
1016 | int X509_NAME_add_entry_by_txt(X509_NAME *name, char *field, int type, |
1017 | unsigned char *bytes, int len, int loc, int set); | |
d02b48c6 RE |
1018 | X509_NAME_ENTRY *X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY **ne, |
1019 | ASN1_OBJECT *obj, int type,unsigned char *bytes, | |
1020 | int len); | |
1021 | int X509_NAME_ENTRY_set_object(X509_NAME_ENTRY *ne, | |
1022 | ASN1_OBJECT *obj); | |
1023 | int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY *ne, int type, | |
1024 | unsigned char *bytes, int len); | |
281959aa DSH |
1025 | ASN1_OBJECT * X509_NAME_ENTRY_get_object(X509_NAME_ENTRY *ne); |
1026 | ASN1_STRING * X509_NAME_ENTRY_get_data(X509_NAME_ENTRY *ne); | |
d02b48c6 | 1027 | |
0b3f827c BL |
1028 | int X509v3_get_ext_count(const STACK_OF(X509_EXTENSION) *x); |
1029 | int X509v3_get_ext_by_NID(const STACK_OF(X509_EXTENSION) *x, | |
1030 | int nid, int lastpos); | |
1031 | int X509v3_get_ext_by_OBJ(const STACK_OF(X509_EXTENSION) *x, | |
1032 | ASN1_OBJECT *obj,int lastpos); | |
1033 | int X509v3_get_ext_by_critical(const STACK_OF(X509_EXTENSION) *x, | |
1034 | int crit, int lastpos); | |
1035 | X509_EXTENSION *X509v3_get_ext(const STACK_OF(X509_EXTENSION) *x, int loc); | |
1036 | X509_EXTENSION *X509v3_delete_ext(STACK_OF(X509_EXTENSION) *x, int loc); | |
1037 | STACK_OF(X509_EXTENSION) *X509v3_add_ext(STACK_OF(X509_EXTENSION) **x, | |
1038 | X509_EXTENSION *ex, int loc); | |
58964a49 | 1039 | |
d02b48c6 | 1040 | int X509_get_ext_count(X509 *x); |
58964a49 RE |
1041 | int X509_get_ext_by_NID(X509 *x, int nid, int lastpos); |
1042 | int X509_get_ext_by_OBJ(X509 *x,ASN1_OBJECT *obj,int lastpos); | |
1043 | int X509_get_ext_by_critical(X509 *x, int crit, int lastpos); | |
d02b48c6 RE |
1044 | X509_EXTENSION *X509_get_ext(X509 *x, int loc); |
1045 | X509_EXTENSION *X509_delete_ext(X509 *x, int loc); | |
1046 | int X509_add_ext(X509 *x, X509_EXTENSION *ex, int loc); | |
ff8a4c47 | 1047 | void * X509_get_ext_d2i(X509 *x, int nid, int *crit, int *idx); |
d02b48c6 RE |
1048 | |
1049 | int X509_CRL_get_ext_count(X509_CRL *x); | |
58964a49 RE |
1050 | int X509_CRL_get_ext_by_NID(X509_CRL *x, int nid, int lastpos); |
1051 | int X509_CRL_get_ext_by_OBJ(X509_CRL *x,ASN1_OBJECT *obj,int lastpos); | |
1052 | int X509_CRL_get_ext_by_critical(X509_CRL *x, int crit, int lastpos); | |
d02b48c6 RE |
1053 | X509_EXTENSION *X509_CRL_get_ext(X509_CRL *x, int loc); |
1054 | X509_EXTENSION *X509_CRL_delete_ext(X509_CRL *x, int loc); | |
1055 | int X509_CRL_add_ext(X509_CRL *x, X509_EXTENSION *ex, int loc); | |
ff8a4c47 | 1056 | void * X509_CRL_get_ext_d2i(X509_CRL *x, int nid, int *crit, int *idx); |
d02b48c6 RE |
1057 | |
1058 | int X509_REVOKED_get_ext_count(X509_REVOKED *x); | |
58964a49 RE |
1059 | int X509_REVOKED_get_ext_by_NID(X509_REVOKED *x, int nid, int lastpos); |
1060 | int X509_REVOKED_get_ext_by_OBJ(X509_REVOKED *x,ASN1_OBJECT *obj,int lastpos); | |
1061 | int X509_REVOKED_get_ext_by_critical(X509_REVOKED *x, int crit, int lastpos); | |
d02b48c6 RE |
1062 | X509_EXTENSION *X509_REVOKED_get_ext(X509_REVOKED *x, int loc); |
1063 | X509_EXTENSION *X509_REVOKED_delete_ext(X509_REVOKED *x, int loc); | |
1064 | int X509_REVOKED_add_ext(X509_REVOKED *x, X509_EXTENSION *ex, int loc); | |
ff8a4c47 | 1065 | void * X509_REVOKED_get_ext_d2i(X509_REVOKED *x, int nid, int *crit, int *idx); |
d02b48c6 RE |
1066 | |
1067 | X509_EXTENSION *X509_EXTENSION_create_by_NID(X509_EXTENSION **ex, | |
1068 | int nid, int crit, ASN1_OCTET_STRING *data); | |
1069 | X509_EXTENSION *X509_EXTENSION_create_by_OBJ(X509_EXTENSION **ex, | |
1070 | ASN1_OBJECT *obj,int crit,ASN1_OCTET_STRING *data); | |
1071 | int X509_EXTENSION_set_object(X509_EXTENSION *ex,ASN1_OBJECT *obj); | |
1072 | int X509_EXTENSION_set_critical(X509_EXTENSION *ex, int crit); | |
1073 | int X509_EXTENSION_set_data(X509_EXTENSION *ex, | |
1074 | ASN1_OCTET_STRING *data); | |
1075 | ASN1_OBJECT * X509_EXTENSION_get_object(X509_EXTENSION *ex); | |
1076 | ASN1_OCTET_STRING *X509_EXTENSION_get_data(X509_EXTENSION *ne); | |
1077 | int X509_EXTENSION_get_critical(X509_EXTENSION *ex); | |
d02b48c6 | 1078 | |
77b47b90 DSH |
1079 | int X509at_get_attr_count(const STACK_OF(X509_ATTRIBUTE) *x); |
1080 | int X509at_get_attr_by_NID(const STACK_OF(X509_ATTRIBUTE) *x, int nid, | |
b38f9f66 | 1081 | int lastpos); |
77b47b90 | 1082 | int X509at_get_attr_by_OBJ(const STACK_OF(X509_ATTRIBUTE) *sk, ASN1_OBJECT *obj, |
b38f9f66 | 1083 | int lastpos); |
77b47b90 DSH |
1084 | X509_ATTRIBUTE *X509at_get_attr(const STACK_OF(X509_ATTRIBUTE) *x, int loc); |
1085 | X509_ATTRIBUTE *X509at_delete_attr(STACK_OF(X509_ATTRIBUTE) *x, int loc); | |
c7cb16a8 | 1086 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr(STACK_OF(X509_ATTRIBUTE) **x, |
77b47b90 | 1087 | X509_ATTRIBUTE *attr); |
c7cb16a8 | 1088 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_OBJ(STACK_OF(X509_ATTRIBUTE) **x, |
77b47b90 DSH |
1089 | ASN1_OBJECT *obj, int type, |
1090 | unsigned char *bytes, int len); | |
c7cb16a8 | 1091 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_NID(STACK_OF(X509_ATTRIBUTE) **x, |
77b47b90 DSH |
1092 | int nid, int type, |
1093 | unsigned char *bytes, int len); | |
c7cb16a8 | 1094 | STACK_OF(X509_ATTRIBUTE) *X509at_add1_attr_by_txt(STACK_OF(X509_ATTRIBUTE) **x, |
77b47b90 DSH |
1095 | char *attrname, int type, |
1096 | unsigned char *bytes, int len); | |
b38f9f66 | 1097 | X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE **attr, int nid, |
35f4850a | 1098 | int atrtype, void *data, int len); |
b38f9f66 | 1099 | X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE **attr, |
35f4850a | 1100 | ASN1_OBJECT *obj, int atrtype, void *data, int len); |
77b47b90 DSH |
1101 | X509_ATTRIBUTE *X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE **attr, |
1102 | char *atrname, int type, unsigned char *bytes, int len); | |
c7cb16a8 DSH |
1103 | int X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE *attr, ASN1_OBJECT *obj); |
1104 | int X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE *attr, int attrtype, void *data, int len); | |
1105 | void *X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE *attr, int idx, | |
b38f9f66 | 1106 | int atrtype, void *data); |
35f4850a | 1107 | int X509_ATTRIBUTE_count(X509_ATTRIBUTE *attr); |
c7cb16a8 DSH |
1108 | ASN1_OBJECT *X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE *attr); |
1109 | ASN1_TYPE *X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE *attr, int idx); | |
b38f9f66 | 1110 | |
d02b48c6 RE |
1111 | int X509_verify_cert(X509_STORE_CTX *ctx); |
1112 | ||
1113 | /* lookup a cert from a X509 STACK */ | |
f73e07cf BL |
1114 | X509 *X509_find_by_issuer_and_serial(STACK_OF(X509) *sk,X509_NAME *name, |
1115 | ASN1_INTEGER *serial); | |
1116 | X509 *X509_find_by_subject(STACK_OF(X509) *sk,X509_NAME *name); | |
d02b48c6 | 1117 | |
9d6b1ce6 DSH |
1118 | DECLARE_ASN1_FUNCTIONS(PBEPARAM) |
1119 | DECLARE_ASN1_FUNCTIONS(PBE2PARAM) | |
1120 | DECLARE_ASN1_FUNCTIONS(PBKDF2PARAM) | |
1121 | ||
8d8c7266 | 1122 | X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen); |
8eb57af5 DSH |
1123 | X509_ALGOR *PKCS5_pbe2_set(const EVP_CIPHER *cipher, int iter, |
1124 | unsigned char *salt, int saltlen); | |
cfcefcbe DSH |
1125 | |
1126 | /* PKCS#8 utilities */ | |
1127 | ||
9d6b1ce6 | 1128 | DECLARE_ASN1_FUNCTIONS(PKCS8_PRIV_KEY_INFO) |
cfcefcbe DSH |
1129 | |
1130 | EVP_PKEY *EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO *p8); | |
1131 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8(EVP_PKEY *pkey); | |
66430207 | 1132 | PKCS8_PRIV_KEY_INFO *EVP_PKEY2PKCS8_broken(EVP_PKEY *pkey, int broken); |
cfcefcbe DSH |
1133 | PKCS8_PRIV_KEY_INFO *PKCS8_set_broken(PKCS8_PRIV_KEY_INFO *p8, int broken); |
1134 | ||
9868232a DSH |
1135 | int X509_check_trust(X509 *x, int id, int flags); |
1136 | int X509_TRUST_get_count(void); | |
6d0d5431 | 1137 | X509_TRUST * X509_TRUST_get0(int idx); |
9868232a | 1138 | int X509_TRUST_get_by_id(int id); |
dd413410 DSH |
1139 | int X509_TRUST_add(int id, int flags, int (*ck)(X509_TRUST *, X509 *, int), |
1140 | char *name, int arg1, void *arg2); | |
9868232a | 1141 | void X509_TRUST_cleanup(void); |
dd413410 | 1142 | int X509_TRUST_get_flags(X509_TRUST *xp); |
c7cb16a8 | 1143 | char *X509_TRUST_get0_name(X509_TRUST *xp); |
9868232a DSH |
1144 | int X509_TRUST_get_trust(X509_TRUST *xp); |
1145 | ||
d02b48c6 | 1146 | /* BEGIN ERROR CODES */ |
6d311938 DSH |
1147 | /* The following lines are auto generated by the script mkerr.pl. Any changes |
1148 | * made after this point may be overwritten when the script is next run. | |
1149 | */ | |
1150 | ||
d02b48c6 RE |
1151 | /* Error codes for the X509 functions. */ |
1152 | ||
1153 | /* Function codes. */ | |
1154 | #define X509_F_ADD_CERT_DIR 100 | |
1155 | #define X509_F_BY_FILE_CTRL 101 | |
1156 | #define X509_F_DIR_CTRL 102 | |
1157 | #define X509_F_GET_CERT_BY_SUBJECT 103 | |
8ce97163 DSH |
1158 | #define X509_F_NETSCAPE_SPKI_B64_DECODE 129 |
1159 | #define X509_F_NETSCAPE_SPKI_B64_ENCODE 130 | |
d02b48c6 | 1160 | #define X509_F_X509V3_ADD_EXT 104 |
b38f9f66 DSH |
1161 | #define X509_F_X509_ADD_ATTR 135 |
1162 | #define X509_F_X509_ATTRIBUTE_CREATE_BY_NID 136 | |
1163 | #define X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ 137 | |
77b47b90 | 1164 | #define X509_F_X509_ATTRIBUTE_CREATE_BY_TXT 140 |
c7cb16a8 DSH |
1165 | #define X509_F_X509_ATTRIBUTE_GET0_DATA 139 |
1166 | #define X509_F_X509_ATTRIBUTE_SET1_DATA 138 | |
4004dbb7 | 1167 | #define X509_F_X509_CHECK_PRIVATE_KEY 128 |
d02b48c6 RE |
1168 | #define X509_F_X509_EXTENSION_CREATE_BY_NID 108 |
1169 | #define X509_F_X509_EXTENSION_CREATE_BY_OBJ 109 | |
1170 | #define X509_F_X509_GET_PUBKEY_PARAMETERS 110 | |
52664f50 | 1171 | #define X509_F_X509_LOAD_CERT_CRL_FILE 132 |
d02b48c6 | 1172 | #define X509_F_X509_LOAD_CERT_FILE 111 |
58964a49 RE |
1173 | #define X509_F_X509_LOAD_CRL_FILE 112 |
1174 | #define X509_F_X509_NAME_ADD_ENTRY 113 | |
1175 | #define X509_F_X509_NAME_ENTRY_CREATE_BY_NID 114 | |
74400f73 | 1176 | #define X509_F_X509_NAME_ENTRY_CREATE_BY_TXT 131 |
58964a49 RE |
1177 | #define X509_F_X509_NAME_ENTRY_SET_OBJECT 115 |
1178 | #define X509_F_X509_NAME_ONELINE 116 | |
1179 | #define X509_F_X509_NAME_PRINT 117 | |
1180 | #define X509_F_X509_PRINT_FP 118 | |
1181 | #define X509_F_X509_PUBKEY_GET 119 | |
1182 | #define X509_F_X509_PUBKEY_SET 120 | |
1183 | #define X509_F_X509_REQ_PRINT 121 | |
1184 | #define X509_F_X509_REQ_PRINT_FP 122 | |
1185 | #define X509_F_X509_REQ_TO_X509 123 | |
1186 | #define X509_F_X509_STORE_ADD_CERT 124 | |
1187 | #define X509_F_X509_STORE_ADD_CRL 125 | |
13938ace | 1188 | #define X509_F_X509_STORE_CTX_PURPOSE_INHERIT 134 |
58964a49 | 1189 | #define X509_F_X509_TO_X509_REQ 126 |
9868232a | 1190 | #define X509_F_X509_TRUST_ADD 133 |
58964a49 | 1191 | #define X509_F_X509_VERIFY_CERT 127 |
d02b48c6 RE |
1192 | |
1193 | /* Reason codes. */ | |
1194 | #define X509_R_BAD_X509_FILETYPE 100 | |
8ce97163 | 1195 | #define X509_R_BASE64_DECODE_ERROR 118 |
4004dbb7 | 1196 | #define X509_R_CANT_CHECK_DH_KEY 114 |
d02b48c6 RE |
1197 | #define X509_R_CERT_ALREADY_IN_HASH_TABLE 101 |
1198 | #define X509_R_ERR_ASN1_LIB 102 | |
fdc71ecc | 1199 | #define X509_R_INVALID_DIRECTORY 113 |
74400f73 | 1200 | #define X509_R_INVALID_FIELD_NAME 119 |
4004dbb7 BL |
1201 | #define X509_R_KEY_TYPE_MISMATCH 115 |
1202 | #define X509_R_KEY_VALUES_MISMATCH 116 | |
d02b48c6 RE |
1203 | #define X509_R_LOADING_CERT_DIR 103 |
1204 | #define X509_R_LOADING_DEFAULTS 104 | |
1205 | #define X509_R_NO_CERT_SET_FOR_US_TO_VERIFY 105 | |
1206 | #define X509_R_SHOULD_RETRY 106 | |
1207 | #define X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN 107 | |
1208 | #define X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY 108 | |
4004dbb7 | 1209 | #define X509_R_UNKNOWN_KEY_TYPE 117 |
d02b48c6 | 1210 | #define X509_R_UNKNOWN_NID 109 |
13938ace | 1211 | #define X509_R_UNKNOWN_PURPOSE_ID 121 |
51630a37 | 1212 | #define X509_R_UNKNOWN_TRUST_ID 120 |
d02b48c6 | 1213 | #define X509_R_UNSUPPORTED_ALGORITHM 111 |
58964a49 | 1214 | #define X509_R_WRONG_LOOKUP_TYPE 112 |
b38f9f66 | 1215 | #define X509_R_WRONG_TYPE 122 |
6d311938 | 1216 | |
d02b48c6 RE |
1217 | #ifdef __cplusplus |
1218 | } | |
1219 | #endif | |
1220 | #endif | |
1221 |