os/ossrv/ssl/libcrypto/src/crypto/ocsp/ocsp.h
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/* ocsp.h */
sl@0
     2
/* Written by Tom Titchener <Tom_Titchener@groove.net> for the OpenSSL
sl@0
     3
 * project. */
sl@0
     4
sl@0
     5
/* History:
sl@0
     6
   This file was transfered to Richard Levitte from CertCo by Kathy
sl@0
     7
   Weinhold in mid-spring 2000 to be included in OpenSSL or released
sl@0
     8
   as a patch kit. */
sl@0
     9
sl@0
    10
/* ====================================================================
sl@0
    11
 * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved.
sl@0
    12
 *
sl@0
    13
 * Redistribution and use in source and binary forms, with or without
sl@0
    14
 * modification, are permitted provided that the following conditions
sl@0
    15
 * are met:
sl@0
    16
 *
sl@0
    17
 * 1. Redistributions of source code must retain the above copyright
sl@0
    18
 *    notice, this list of conditions and the following disclaimer. 
sl@0
    19
 *
sl@0
    20
 * 2. Redistributions in binary form must reproduce the above copyright
sl@0
    21
 *    notice, this list of conditions and the following disclaimer in
sl@0
    22
 *    the documentation and/or other materials provided with the
sl@0
    23
 *    distribution.
sl@0
    24
 *
sl@0
    25
 * 3. All advertising materials mentioning features or use of this
sl@0
    26
 *    software must display the following acknowledgment:
sl@0
    27
 *    "This product includes software developed by the OpenSSL Project
sl@0
    28
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
sl@0
    29
 *
sl@0
    30
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
sl@0
    31
 *    endorse or promote products derived from this software without
sl@0
    32
 *    prior written permission. For written permission, please contact
sl@0
    33
 *    openssl-core@openssl.org.
sl@0
    34
 *
sl@0
    35
 * 5. Products derived from this software may not be called "OpenSSL"
sl@0
    36
 *    nor may "OpenSSL" appear in their names without prior written
sl@0
    37
 *    permission of the OpenSSL Project.
sl@0
    38
 *
sl@0
    39
 * 6. Redistributions of any form whatsoever must retain the following
sl@0
    40
 *    acknowledgment:
sl@0
    41
 *    "This product includes software developed by the OpenSSL Project
sl@0
    42
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
sl@0
    43
 *
sl@0
    44
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
sl@0
    45
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
sl@0
    46
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
sl@0
    47
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
sl@0
    48
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
sl@0
    49
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
sl@0
    50
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
sl@0
    51
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
sl@0
    52
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
sl@0
    53
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
sl@0
    54
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
sl@0
    55
 * OF THE POSSIBILITY OF SUCH DAMAGE.
sl@0
    56
 * ====================================================================
sl@0
    57
 *
sl@0
    58
 * This product includes cryptographic software written by Eric Young
sl@0
    59
 * (eay@cryptsoft.com).  This product includes software written by Tim
sl@0
    60
 * Hudson (tjh@cryptsoft.com).
sl@0
    61
 *
sl@0
    62
 */
sl@0
    63
/*
sl@0
    64
 © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
sl@0
    65
 */
sl@0
    66
sl@0
    67
#ifndef HEADER_OCSP_H
sl@0
    68
#define HEADER_OCSP_H
sl@0
    69
#ifdef SYMBIAN
sl@0
    70
#include <e32def.h>
sl@0
    71
#endif
sl@0
    72
#include <openssl/x509.h>
sl@0
    73
#include <openssl/x509v3.h>
sl@0
    74
#include <openssl/safestack.h>
sl@0
    75
sl@0
    76
#ifdef  __cplusplus
sl@0
    77
extern "C" {
sl@0
    78
#endif
sl@0
    79
sl@0
    80
/* Various flags and values */
sl@0
    81
sl@0
    82
#define OCSP_DEFAULT_NONCE_LENGTH	16
sl@0
    83
sl@0
    84
#define OCSP_NOCERTS			0x1
sl@0
    85
#define OCSP_NOINTERN			0x2
sl@0
    86
#define OCSP_NOSIGS			0x4
sl@0
    87
#define OCSP_NOCHAIN			0x8
sl@0
    88
#define OCSP_NOVERIFY			0x10
sl@0
    89
#define OCSP_NOEXPLICIT			0x20
sl@0
    90
#define OCSP_NOCASIGN			0x40
sl@0
    91
#define OCSP_NODELEGATED		0x80
sl@0
    92
#define OCSP_NOCHECKS			0x100
sl@0
    93
#define OCSP_TRUSTOTHER			0x200
sl@0
    94
#define OCSP_RESPID_KEY			0x400
sl@0
    95
#define OCSP_NOTIME			0x800
sl@0
    96
sl@0
    97
/*   CertID ::= SEQUENCE {
sl@0
    98
 *       hashAlgorithm            AlgorithmIdentifier,
sl@0
    99
 *       issuerNameHash     OCTET STRING, -- Hash of Issuer's DN
sl@0
   100
 *       issuerKeyHash      OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields)
sl@0
   101
 *       serialNumber       CertificateSerialNumber }
sl@0
   102
 */
sl@0
   103
typedef struct ocsp_cert_id_st
sl@0
   104
	{
sl@0
   105
	X509_ALGOR *hashAlgorithm;
sl@0
   106
	ASN1_OCTET_STRING *issuerNameHash;
sl@0
   107
	ASN1_OCTET_STRING *issuerKeyHash;
sl@0
   108
	ASN1_INTEGER *serialNumber;
sl@0
   109
	} OCSP_CERTID;
sl@0
   110
sl@0
   111
DECLARE_STACK_OF(OCSP_CERTID)
sl@0
   112
sl@0
   113
/*   Request ::=     SEQUENCE {
sl@0
   114
 *       reqCert                    CertID,
sl@0
   115
 *       singleRequestExtensions    [0] EXPLICIT Extensions OPTIONAL }
sl@0
   116
 */
sl@0
   117
typedef struct ocsp_one_request_st
sl@0
   118
	{
sl@0
   119
	OCSP_CERTID *reqCert;
sl@0
   120
	STACK_OF(X509_EXTENSION) *singleRequestExtensions;
sl@0
   121
	} OCSP_ONEREQ;
sl@0
   122
sl@0
   123
DECLARE_STACK_OF(OCSP_ONEREQ)
sl@0
   124
DECLARE_ASN1_SET_OF(OCSP_ONEREQ)
sl@0
   125
sl@0
   126
sl@0
   127
/*   TBSRequest      ::=     SEQUENCE {
sl@0
   128
 *       version             [0] EXPLICIT Version DEFAULT v1,
sl@0
   129
 *       requestorName       [1] EXPLICIT GeneralName OPTIONAL,
sl@0
   130
 *       requestList             SEQUENCE OF Request,
sl@0
   131
 *       requestExtensions   [2] EXPLICIT Extensions OPTIONAL }
sl@0
   132
 */
sl@0
   133
typedef struct ocsp_req_info_st
sl@0
   134
	{
sl@0
   135
	ASN1_INTEGER *version;
sl@0
   136
	GENERAL_NAME *requestorName;
sl@0
   137
	STACK_OF(OCSP_ONEREQ) *requestList;
sl@0
   138
	STACK_OF(X509_EXTENSION) *requestExtensions;
sl@0
   139
	} OCSP_REQINFO;
sl@0
   140
sl@0
   141
/*   Signature       ::=     SEQUENCE {
sl@0
   142
 *       signatureAlgorithm   AlgorithmIdentifier,
sl@0
   143
 *       signature            BIT STRING,
sl@0
   144
 *       certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
sl@0
   145
 */
sl@0
   146
typedef struct ocsp_signature_st
sl@0
   147
	{
sl@0
   148
	X509_ALGOR *signatureAlgorithm;
sl@0
   149
	ASN1_BIT_STRING *signature;
sl@0
   150
	STACK_OF(X509) *certs;
sl@0
   151
	} OCSP_SIGNATURE;
sl@0
   152
sl@0
   153
/*   OCSPRequest     ::=     SEQUENCE {
sl@0
   154
 *       tbsRequest                  TBSRequest,
sl@0
   155
 *       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }
sl@0
   156
 */
sl@0
   157
typedef struct ocsp_request_st
sl@0
   158
	{
sl@0
   159
	OCSP_REQINFO *tbsRequest;
sl@0
   160
	OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */
sl@0
   161
	} OCSP_REQUEST;
sl@0
   162
sl@0
   163
/*   OCSPResponseStatus ::= ENUMERATED {
sl@0
   164
 *       successful            (0),      --Response has valid confirmations
sl@0
   165
 *       malformedRequest      (1),      --Illegal confirmation request
sl@0
   166
 *       internalError         (2),      --Internal error in issuer
sl@0
   167
 *       tryLater              (3),      --Try again later
sl@0
   168
 *                                       --(4) is not used
sl@0
   169
 *       sigRequired           (5),      --Must sign the request
sl@0
   170
 *       unauthorized          (6)       --Request unauthorized
sl@0
   171
 *   }
sl@0
   172
 */
sl@0
   173
#define OCSP_RESPONSE_STATUS_SUCCESSFUL          0
sl@0
   174
#define OCSP_RESPONSE_STATUS_MALFORMEDREQUEST     1
sl@0
   175
#define OCSP_RESPONSE_STATUS_INTERNALERROR        2
sl@0
   176
#define OCSP_RESPONSE_STATUS_TRYLATER             3
sl@0
   177
#define OCSP_RESPONSE_STATUS_SIGREQUIRED          5
sl@0
   178
#define OCSP_RESPONSE_STATUS_UNAUTHORIZED         6
sl@0
   179
sl@0
   180
/*   ResponseBytes ::=       SEQUENCE {
sl@0
   181
 *       responseType   OBJECT IDENTIFIER,
sl@0
   182
 *       response       OCTET STRING }
sl@0
   183
 */
sl@0
   184
typedef struct ocsp_resp_bytes_st
sl@0
   185
	{
sl@0
   186
	ASN1_OBJECT *responseType;
sl@0
   187
	ASN1_OCTET_STRING *response;
sl@0
   188
	} OCSP_RESPBYTES;
sl@0
   189
sl@0
   190
/*   OCSPResponse ::= SEQUENCE {
sl@0
   191
 *      responseStatus         OCSPResponseStatus,
sl@0
   192
 *      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }
sl@0
   193
 */
sl@0
   194
typedef struct ocsp_response_st
sl@0
   195
	{
sl@0
   196
	ASN1_ENUMERATED *responseStatus;
sl@0
   197
	OCSP_RESPBYTES  *responseBytes;
sl@0
   198
	} OCSP_RESPONSE;
sl@0
   199
sl@0
   200
/*   ResponderID ::= CHOICE {
sl@0
   201
 *      byName   [1] Name,
sl@0
   202
 *      byKey    [2] KeyHash }
sl@0
   203
 */
sl@0
   204
#define V_OCSP_RESPID_NAME 0
sl@0
   205
#define V_OCSP_RESPID_KEY  1
sl@0
   206
typedef struct ocsp_responder_id_st
sl@0
   207
	{
sl@0
   208
	int type;
sl@0
   209
	union   {
sl@0
   210
		X509_NAME* byName;
sl@0
   211
        	ASN1_OCTET_STRING *byKey;
sl@0
   212
		} value;
sl@0
   213
	} OCSP_RESPID;
sl@0
   214
/*   KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
sl@0
   215
 *                            --(excluding the tag and length fields)
sl@0
   216
 */
sl@0
   217
sl@0
   218
/*   RevokedInfo ::= SEQUENCE {
sl@0
   219
 *       revocationTime              GeneralizedTime,
sl@0
   220
 *       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }
sl@0
   221
 */
sl@0
   222
typedef struct ocsp_revoked_info_st
sl@0
   223
	{
sl@0
   224
	ASN1_GENERALIZEDTIME *revocationTime;
sl@0
   225
	ASN1_ENUMERATED *revocationReason;
sl@0
   226
	} OCSP_REVOKEDINFO;
sl@0
   227
sl@0
   228
/*   CertStatus ::= CHOICE {
sl@0
   229
 *       good                [0]     IMPLICIT NULL,
sl@0
   230
 *       revoked             [1]     IMPLICIT RevokedInfo,
sl@0
   231
 *       unknown             [2]     IMPLICIT UnknownInfo }
sl@0
   232
 */
sl@0
   233
#define V_OCSP_CERTSTATUS_GOOD    0
sl@0
   234
#define V_OCSP_CERTSTATUS_REVOKED 1
sl@0
   235
#define V_OCSP_CERTSTATUS_UNKNOWN 2
sl@0
   236
typedef struct ocsp_cert_status_st
sl@0
   237
	{
sl@0
   238
	int type;
sl@0
   239
	union	{
sl@0
   240
		ASN1_NULL *good;
sl@0
   241
		OCSP_REVOKEDINFO *revoked;
sl@0
   242
		ASN1_NULL *unknown;
sl@0
   243
		} value;
sl@0
   244
	} OCSP_CERTSTATUS;
sl@0
   245
sl@0
   246
/*   SingleResponse ::= SEQUENCE {
sl@0
   247
 *      certID                       CertID,
sl@0
   248
 *      certStatus                   CertStatus,
sl@0
   249
 *      thisUpdate                   GeneralizedTime,
sl@0
   250
 *      nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL,
sl@0
   251
 *      singleExtensions     [1]     EXPLICIT Extensions OPTIONAL }
sl@0
   252
 */
sl@0
   253
typedef struct ocsp_single_response_st
sl@0
   254
	{
sl@0
   255
	OCSP_CERTID *certId;
sl@0
   256
	OCSP_CERTSTATUS *certStatus;
sl@0
   257
	ASN1_GENERALIZEDTIME *thisUpdate;
sl@0
   258
	ASN1_GENERALIZEDTIME *nextUpdate;
sl@0
   259
	STACK_OF(X509_EXTENSION) *singleExtensions;
sl@0
   260
	} OCSP_SINGLERESP;
sl@0
   261
sl@0
   262
DECLARE_STACK_OF(OCSP_SINGLERESP)
sl@0
   263
DECLARE_ASN1_SET_OF(OCSP_SINGLERESP)
sl@0
   264
sl@0
   265
/*   ResponseData ::= SEQUENCE {
sl@0
   266
 *      version              [0] EXPLICIT Version DEFAULT v1,
sl@0
   267
 *      responderID              ResponderID,
sl@0
   268
 *      producedAt               GeneralizedTime,
sl@0
   269
 *      responses                SEQUENCE OF SingleResponse,
sl@0
   270
 *      responseExtensions   [1] EXPLICIT Extensions OPTIONAL }
sl@0
   271
 */
sl@0
   272
typedef struct ocsp_response_data_st
sl@0
   273
	{
sl@0
   274
	ASN1_INTEGER *version;
sl@0
   275
	OCSP_RESPID  *responderId;
sl@0
   276
	ASN1_GENERALIZEDTIME *producedAt;
sl@0
   277
	STACK_OF(OCSP_SINGLERESP) *responses;
sl@0
   278
	STACK_OF(X509_EXTENSION) *responseExtensions;
sl@0
   279
	} OCSP_RESPDATA;
sl@0
   280
sl@0
   281
/*   BasicOCSPResponse       ::= SEQUENCE {
sl@0
   282
 *      tbsResponseData      ResponseData,
sl@0
   283
 *      signatureAlgorithm   AlgorithmIdentifier,
sl@0
   284
 *      signature            BIT STRING,
sl@0
   285
 *      certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
sl@0
   286
 */
sl@0
   287
  /* Note 1:
sl@0
   288
     The value for "signature" is specified in the OCSP rfc2560 as follows:
sl@0
   289
     "The value for the signature SHALL be computed on the hash of the DER
sl@0
   290
     encoding ResponseData."  This means that you must hash the DER-encoded
sl@0
   291
     tbsResponseData, and then run it through a crypto-signing function, which
sl@0
   292
     will (at least w/RSA) do a hash-'n'-private-encrypt operation.  This seems
sl@0
   293
     a bit odd, but that's the spec.  Also note that the data structures do not
sl@0
   294
     leave anywhere to independently specify the algorithm used for the initial
sl@0
   295
     hash. So, we look at the signature-specification algorithm, and try to do
sl@0
   296
     something intelligent.	-- Kathy Weinhold, CertCo */
sl@0
   297
  /* Note 2:
sl@0
   298
     It seems that the mentioned passage from RFC 2560 (section 4.2.1) is open
sl@0
   299
     for interpretation.  I've done tests against another responder, and found
sl@0
   300
     that it doesn't do the double hashing that the RFC seems to say one
sl@0
   301
     should.  Therefore, all relevant functions take a flag saying which
sl@0
   302
     variant should be used.	-- Richard Levitte, OpenSSL team and CeloCom */
sl@0
   303
typedef struct ocsp_basic_response_st
sl@0
   304
	{
sl@0
   305
	OCSP_RESPDATA *tbsResponseData;
sl@0
   306
	X509_ALGOR *signatureAlgorithm;
sl@0
   307
	ASN1_BIT_STRING *signature;
sl@0
   308
	STACK_OF(X509) *certs;
sl@0
   309
	} OCSP_BASICRESP;
sl@0
   310
sl@0
   311
/*
sl@0
   312
 *   CRLReason ::= ENUMERATED {
sl@0
   313
 *        unspecified             (0),
sl@0
   314
 *        keyCompromise           (1),
sl@0
   315
 *        cACompromise            (2),
sl@0
   316
 *        affiliationChanged      (3),
sl@0
   317
 *        superseded              (4),
sl@0
   318
 *        cessationOfOperation    (5),
sl@0
   319
 *        certificateHold         (6),
sl@0
   320
 *        removeFromCRL           (8) }
sl@0
   321
 */
sl@0
   322
#define OCSP_REVOKED_STATUS_NOSTATUS               -1
sl@0
   323
#define OCSP_REVOKED_STATUS_UNSPECIFIED             0
sl@0
   324
#define OCSP_REVOKED_STATUS_KEYCOMPROMISE           1
sl@0
   325
#define OCSP_REVOKED_STATUS_CACOMPROMISE            2
sl@0
   326
#define OCSP_REVOKED_STATUS_AFFILIATIONCHANGED      3
sl@0
   327
#define OCSP_REVOKED_STATUS_SUPERSEDED              4
sl@0
   328
#define OCSP_REVOKED_STATUS_CESSATIONOFOPERATION    5
sl@0
   329
#define OCSP_REVOKED_STATUS_CERTIFICATEHOLD         6
sl@0
   330
#define OCSP_REVOKED_STATUS_REMOVEFROMCRL           8
sl@0
   331
sl@0
   332
/* CrlID ::= SEQUENCE {
sl@0
   333
 *     crlUrl               [0]     EXPLICIT IA5String OPTIONAL,
sl@0
   334
 *     crlNum               [1]     EXPLICIT INTEGER OPTIONAL,
sl@0
   335
 *     crlTime              [2]     EXPLICIT GeneralizedTime OPTIONAL }
sl@0
   336
 */
sl@0
   337
typedef struct ocsp_crl_id_st
sl@0
   338
        {
sl@0
   339
	ASN1_IA5STRING *crlUrl;
sl@0
   340
	ASN1_INTEGER *crlNum;
sl@0
   341
	ASN1_GENERALIZEDTIME *crlTime;
sl@0
   342
        } OCSP_CRLID;
sl@0
   343
sl@0
   344
/* ServiceLocator ::= SEQUENCE {
sl@0
   345
 *      issuer    Name,
sl@0
   346
 *      locator   AuthorityInfoAccessSyntax OPTIONAL }
sl@0
   347
 */
sl@0
   348
typedef struct ocsp_service_locator_st
sl@0
   349
        {
sl@0
   350
	X509_NAME* issuer;
sl@0
   351
	STACK_OF(ACCESS_DESCRIPTION) *locator;
sl@0
   352
        } OCSP_SERVICELOC;
sl@0
   353
 
sl@0
   354
#define PEM_STRING_OCSP_REQUEST	"OCSP REQUEST"
sl@0
   355
#define PEM_STRING_OCSP_RESPONSE "OCSP RESPONSE"
sl@0
   356
sl@0
   357
#define d2i_OCSP_REQUEST_bio(bp,p) ASN1_d2i_bio_of(OCSP_REQUEST,OCSP_REQUEST_new,d2i_OCSP_REQUEST,bp,p)
sl@0
   358
sl@0
   359
#define d2i_OCSP_RESPONSE_bio(bp,p) ASN1_d2i_bio_of(OCSP_RESPONSE,OCSP_RESPONSE_new,d2i_OCSP_RESPONSE,bp,p)
sl@0
   360
sl@0
   361
#define	PEM_read_bio_OCSP_REQUEST(bp,x,cb) (OCSP_REQUEST *)PEM_ASN1_read_bio( \
sl@0
   362
     (char *(*)())d2i_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,bp,(char **)x,cb,NULL)
sl@0
   363
sl@0
   364
#define	PEM_read_bio_OCSP_RESPONSE(bp,x,cb)(OCSP_RESPONSE *)PEM_ASN1_read_bio(\
sl@0
   365
     (char *(*)())d2i_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,bp,(char **)x,cb,NULL)
sl@0
   366
sl@0
   367
#define PEM_write_bio_OCSP_REQUEST(bp,o) \
sl@0
   368
    PEM_ASN1_write_bio((int (*)())i2d_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,\
sl@0
   369
			bp,(char *)o, NULL,NULL,0,NULL,NULL)
sl@0
   370
sl@0
   371
#define PEM_write_bio_OCSP_RESPONSE(bp,o) \
sl@0
   372
    PEM_ASN1_write_bio((int (*)())i2d_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,\
sl@0
   373
			bp,(char *)o, NULL,NULL,0,NULL,NULL)
sl@0
   374
sl@0
   375
#define i2d_OCSP_RESPONSE_bio(bp,o) ASN1_i2d_bio_of(OCSP_RESPONSE,i2d_OCSP_RESPONSE,bp,o)
sl@0
   376
sl@0
   377
#define i2d_OCSP_REQUEST_bio(bp,o) ASN1_i2d_bio_of(OCSP_REQUEST,i2d_OCSP_REQUEST,bp,o)
sl@0
   378
sl@0
   379
#define OCSP_REQUEST_sign(o,pkey,md) \
sl@0
   380
	ASN1_item_sign(ASN1_ITEM_rptr(OCSP_REQINFO),\
sl@0
   381
		o->optionalSignature->signatureAlgorithm,NULL,\
sl@0
   382
	        o->optionalSignature->signature,o->tbsRequest,pkey,md)
sl@0
   383
sl@0
   384
#define OCSP_BASICRESP_sign(o,pkey,md,d) \
sl@0
   385
	ASN1_item_sign(ASN1_ITEM_rptr(OCSP_RESPDATA),o->signatureAlgorithm,NULL,\
sl@0
   386
		o->signature,o->tbsResponseData,pkey,md)
sl@0
   387
sl@0
   388
#define OCSP_REQUEST_verify(a,r) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_REQINFO),\
sl@0
   389
        a->optionalSignature->signatureAlgorithm,\
sl@0
   390
	a->optionalSignature->signature,a->tbsRequest,r)
sl@0
   391
sl@0
   392
#define OCSP_BASICRESP_verify(a,r,d) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_RESPDATA),\
sl@0
   393
	a->signatureAlgorithm,a->signature,a->tbsResponseData,r)
sl@0
   394
sl@0
   395
#define ASN1_BIT_STRING_digest(data,type,md,len) \
sl@0
   396
	ASN1_item_digest(ASN1_ITEM_rptr(ASN1_BIT_STRING),type,data,md,len)
sl@0
   397
sl@0
   398
#define OCSP_CERTID_dup(cid) ASN1_dup_of(OCSP_CERTID,i2d_OCSP_CERTID,d2i_OCSP_CERTID,cid)
sl@0
   399
sl@0
   400
#define OCSP_CERTSTATUS_dup(cs)\
sl@0
   401
                (OCSP_CERTSTATUS*)ASN1_dup((int(*)())i2d_OCSP_CERTSTATUS,\
sl@0
   402
		(char *(*)())d2i_OCSP_CERTSTATUS,(char *)(cs))
sl@0
   403
sl@0
   404
IMPORT_C OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req);
sl@0
   405
sl@0
   406
IMPORT_C OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer);
sl@0
   407
sl@0
   408
IMPORT_C OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst, 
sl@0
   409
			      X509_NAME *issuerName, 
sl@0
   410
			      ASN1_BIT_STRING* issuerKey, 
sl@0
   411
			      ASN1_INTEGER *serialNumber);
sl@0
   412
sl@0
   413
IMPORT_C OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid);
sl@0
   414
sl@0
   415
IMPORT_C int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len);
sl@0
   416
IMPORT_C int OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len);
sl@0
   417
IMPORT_C int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs);
sl@0
   418
IMPORT_C int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req);
sl@0
   419
sl@0
   420
IMPORT_C int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm);
sl@0
   421
IMPORT_C int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
sl@0
   422
sl@0
   423
IMPORT_C int OCSP_request_sign(OCSP_REQUEST   *req,
sl@0
   424
		      X509           *signer,
sl@0
   425
		      EVP_PKEY       *key,
sl@0
   426
		      const EVP_MD   *dgst,
sl@0
   427
		      STACK_OF(X509) *certs,
sl@0
   428
		      unsigned long flags);
sl@0
   429
sl@0
   430
IMPORT_C int OCSP_response_status(OCSP_RESPONSE *resp);
sl@0
   431
IMPORT_C OCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp);
sl@0
   432
sl@0
   433
IMPORT_C int OCSP_resp_count(OCSP_BASICRESP *bs);
sl@0
   434
IMPORT_C OCSP_SINGLERESP *OCSP_resp_get0(OCSP_BASICRESP *bs, int idx);
sl@0
   435
IMPORT_C int OCSP_resp_find(OCSP_BASICRESP *bs, OCSP_CERTID *id, int last);
sl@0
   436
IMPORT_C int OCSP_single_get0_status(OCSP_SINGLERESP *single, int *reason,
sl@0
   437
				ASN1_GENERALIZEDTIME **revtime,
sl@0
   438
				ASN1_GENERALIZEDTIME **thisupd,
sl@0
   439
				ASN1_GENERALIZEDTIME **nextupd);
sl@0
   440
IMPORT_C int OCSP_resp_find_status(OCSP_BASICRESP *bs, OCSP_CERTID *id, int *status,
sl@0
   441
				int *reason,
sl@0
   442
				ASN1_GENERALIZEDTIME **revtime,
sl@0
   443
				ASN1_GENERALIZEDTIME **thisupd,
sl@0
   444
				ASN1_GENERALIZEDTIME **nextupd);
sl@0
   445
IMPORT_C int OCSP_check_validity(ASN1_GENERALIZEDTIME *thisupd,
sl@0
   446
			ASN1_GENERALIZEDTIME *nextupd,
sl@0
   447
			long sec, long maxsec);
sl@0
   448
sl@0
   449
IMPORT_C int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
sl@0
   450
sl@0
   451
IMPORT_C int OCSP_parse_url(char *url, char **phost, char **pport, char **ppath, int *pssl);
sl@0
   452
sl@0
   453
IMPORT_C int OCSP_id_issuer_cmp(OCSP_CERTID *a, OCSP_CERTID *b);
sl@0
   454
IMPORT_C int OCSP_id_cmp(OCSP_CERTID *a, OCSP_CERTID *b);
sl@0
   455
sl@0
   456
IMPORT_C int OCSP_request_onereq_count(OCSP_REQUEST *req);
sl@0
   457
IMPORT_C OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i);
sl@0
   458
IMPORT_C OCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one);
sl@0
   459
IMPORT_C int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd,
sl@0
   460
			ASN1_OCTET_STRING **pikeyHash,
sl@0
   461
			ASN1_INTEGER **pserial, OCSP_CERTID *cid);
sl@0
   462
IMPORT_C int OCSP_request_is_signed(OCSP_REQUEST *req);
sl@0
   463
IMPORT_C OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs);
sl@0
   464
IMPORT_C OCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp,
sl@0
   465
						OCSP_CERTID *cid,
sl@0
   466
						int status, int reason,
sl@0
   467
						ASN1_TIME *revtime,
sl@0
   468
					ASN1_TIME *thisupd, ASN1_TIME *nextupd);
sl@0
   469
IMPORT_C int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
sl@0
   470
IMPORT_C int OCSP_basic_sign(OCSP_BASICRESP *brsp, 
sl@0
   471
			X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
sl@0
   472
			STACK_OF(X509) *certs, unsigned long flags);
sl@0
   473
sl@0
   474
IMPORT_C ASN1_STRING *ASN1_STRING_encode(ASN1_STRING *s, i2d_of_void *i2d,
sl@0
   475
				void *data, STACK_OF(ASN1_OBJECT) *sk);
sl@0
   476
#define ASN1_STRING_encode_of(type,s,i2d,data,sk) \
sl@0
   477
	ASN1_STRING_encode(s, CHECKED_I2D_OF(type, i2d), data, sk)
sl@0
   478
sl@0
   479
IMPORT_C X509_EXTENSION *OCSP_crlID_new(char *url, long *n, char *tim);
sl@0
   480
sl@0
   481
IMPORT_C X509_EXTENSION *OCSP_accept_responses_new(char **oids);
sl@0
   482
sl@0
   483
IMPORT_C X509_EXTENSION *OCSP_archive_cutoff_new(char* tim);
sl@0
   484
sl@0
   485
IMPORT_C X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
sl@0
   486
sl@0
   487
IMPORT_C int OCSP_REQUEST_get_ext_count(OCSP_REQUEST *x);
sl@0
   488
IMPORT_C int OCSP_REQUEST_get_ext_by_NID(OCSP_REQUEST *x, int nid, int lastpos);
sl@0
   489
IMPORT_C int OCSP_REQUEST_get_ext_by_OBJ(OCSP_REQUEST *x, ASN1_OBJECT *obj, int lastpos);
sl@0
   490
IMPORT_C int OCSP_REQUEST_get_ext_by_critical(OCSP_REQUEST *x, int crit, int lastpos);
sl@0
   491
IMPORT_C X509_EXTENSION *OCSP_REQUEST_get_ext(OCSP_REQUEST *x, int loc);
sl@0
   492
IMPORT_C X509_EXTENSION *OCSP_REQUEST_delete_ext(OCSP_REQUEST *x, int loc);
sl@0
   493
IMPORT_C void *OCSP_REQUEST_get1_ext_d2i(OCSP_REQUEST *x, int nid, int *crit, int *idx);
sl@0
   494
IMPORT_C int OCSP_REQUEST_add1_ext_i2d(OCSP_REQUEST *x, int nid, void *value, int crit,
sl@0
   495
							unsigned long flags);
sl@0
   496
IMPORT_C int OCSP_REQUEST_add_ext(OCSP_REQUEST *x, X509_EXTENSION *ex, int loc);
sl@0
   497
sl@0
   498
IMPORT_C int OCSP_ONEREQ_get_ext_count(OCSP_ONEREQ *x);
sl@0
   499
IMPORT_C int OCSP_ONEREQ_get_ext_by_NID(OCSP_ONEREQ *x, int nid, int lastpos);
sl@0
   500
IMPORT_C int OCSP_ONEREQ_get_ext_by_OBJ(OCSP_ONEREQ *x, ASN1_OBJECT *obj, int lastpos);
sl@0
   501
IMPORT_C int OCSP_ONEREQ_get_ext_by_critical(OCSP_ONEREQ *x, int crit, int lastpos);
sl@0
   502
IMPORT_C X509_EXTENSION *OCSP_ONEREQ_get_ext(OCSP_ONEREQ *x, int loc);
sl@0
   503
IMPORT_C X509_EXTENSION *OCSP_ONEREQ_delete_ext(OCSP_ONEREQ *x, int loc);
sl@0
   504
IMPORT_C void *OCSP_ONEREQ_get1_ext_d2i(OCSP_ONEREQ *x, int nid, int *crit, int *idx);
sl@0
   505
IMPORT_C int OCSP_ONEREQ_add1_ext_i2d(OCSP_ONEREQ *x, int nid, void *value, int crit,
sl@0
   506
							unsigned long flags);
sl@0
   507
IMPORT_C int OCSP_ONEREQ_add_ext(OCSP_ONEREQ *x, X509_EXTENSION *ex, int loc);
sl@0
   508
sl@0
   509
IMPORT_C int OCSP_BASICRESP_get_ext_count(OCSP_BASICRESP *x);
sl@0
   510
IMPORT_C int OCSP_BASICRESP_get_ext_by_NID(OCSP_BASICRESP *x, int nid, int lastpos);
sl@0
   511
IMPORT_C int OCSP_BASICRESP_get_ext_by_OBJ(OCSP_BASICRESP *x, ASN1_OBJECT *obj, int lastpos);
sl@0
   512
IMPORT_C int OCSP_BASICRESP_get_ext_by_critical(OCSP_BASICRESP *x, int crit, int lastpos);
sl@0
   513
IMPORT_C X509_EXTENSION *OCSP_BASICRESP_get_ext(OCSP_BASICRESP *x, int loc);
sl@0
   514
IMPORT_C X509_EXTENSION *OCSP_BASICRESP_delete_ext(OCSP_BASICRESP *x, int loc);
sl@0
   515
IMPORT_C void *OCSP_BASICRESP_get1_ext_d2i(OCSP_BASICRESP *x, int nid, int *crit, int *idx);
sl@0
   516
IMPORT_C int OCSP_BASICRESP_add1_ext_i2d(OCSP_BASICRESP *x, int nid, void *value, int crit,
sl@0
   517
							unsigned long flags);
sl@0
   518
IMPORT_C int OCSP_BASICRESP_add_ext(OCSP_BASICRESP *x, X509_EXTENSION *ex, int loc);
sl@0
   519
sl@0
   520
IMPORT_C int OCSP_SINGLERESP_get_ext_count(OCSP_SINGLERESP *x);
sl@0
   521
IMPORT_C int OCSP_SINGLERESP_get_ext_by_NID(OCSP_SINGLERESP *x, int nid, int lastpos);
sl@0
   522
IMPORT_C int OCSP_SINGLERESP_get_ext_by_OBJ(OCSP_SINGLERESP *x, ASN1_OBJECT *obj, int lastpos);
sl@0
   523
IMPORT_C int OCSP_SINGLERESP_get_ext_by_critical(OCSP_SINGLERESP *x, int crit, int lastpos);
sl@0
   524
IMPORT_C X509_EXTENSION *OCSP_SINGLERESP_get_ext(OCSP_SINGLERESP *x, int loc);
sl@0
   525
IMPORT_C X509_EXTENSION *OCSP_SINGLERESP_delete_ext(OCSP_SINGLERESP *x, int loc);
sl@0
   526
IMPORT_C void *OCSP_SINGLERESP_get1_ext_d2i(OCSP_SINGLERESP *x, int nid, int *crit, int *idx);
sl@0
   527
IMPORT_C int OCSP_SINGLERESP_add1_ext_i2d(OCSP_SINGLERESP *x, int nid, void *value, int crit,
sl@0
   528
							unsigned long flags);
sl@0
   529
IMPORT_C int OCSP_SINGLERESP_add_ext(OCSP_SINGLERESP *x, X509_EXTENSION *ex, int loc);
sl@0
   530
sl@0
   531
DECLARE_ASN1_FUNCTIONS(OCSP_SINGLERESP)
sl@0
   532
DECLARE_ASN1_FUNCTIONS(OCSP_CERTSTATUS)
sl@0
   533
DECLARE_ASN1_FUNCTIONS(OCSP_REVOKEDINFO)
sl@0
   534
DECLARE_ASN1_FUNCTIONS(OCSP_BASICRESP)
sl@0
   535
DECLARE_ASN1_FUNCTIONS(OCSP_RESPDATA)
sl@0
   536
DECLARE_ASN1_FUNCTIONS(OCSP_RESPID)
sl@0
   537
DECLARE_ASN1_FUNCTIONS(OCSP_RESPONSE)
sl@0
   538
DECLARE_ASN1_FUNCTIONS(OCSP_RESPBYTES)
sl@0
   539
DECLARE_ASN1_FUNCTIONS(OCSP_ONEREQ)
sl@0
   540
DECLARE_ASN1_FUNCTIONS(OCSP_CERTID)
sl@0
   541
DECLARE_ASN1_FUNCTIONS(OCSP_REQUEST)
sl@0
   542
DECLARE_ASN1_FUNCTIONS(OCSP_SIGNATURE)
sl@0
   543
DECLARE_ASN1_FUNCTIONS(OCSP_REQINFO)
sl@0
   544
DECLARE_ASN1_FUNCTIONS(OCSP_CRLID)
sl@0
   545
DECLARE_ASN1_FUNCTIONS(OCSP_SERVICELOC)
sl@0
   546
sl@0
   547
IMPORT_C char *OCSP_response_status_str(long s);
sl@0
   548
IMPORT_C char *OCSP_cert_status_str(long s);
sl@0
   549
IMPORT_C char *OCSP_crl_reason_str(long s);
sl@0
   550
sl@0
   551
IMPORT_C int OCSP_REQUEST_print(BIO *bp, OCSP_REQUEST* a, unsigned long flags);
sl@0
   552
IMPORT_C int OCSP_RESPONSE_print(BIO *bp, OCSP_RESPONSE* o, unsigned long flags);
sl@0
   553
sl@0
   554
IMPORT_C int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
sl@0
   555
				X509_STORE *st, unsigned long flags);
sl@0
   556
sl@0
   557
/* BEGIN ERROR CODES */
sl@0
   558
/* The following lines are auto generated by the script mkerr.pl. Any changes
sl@0
   559
 * made after this point may be overwritten when the script is next run.
sl@0
   560
 */
sl@0
   561
IMPORT_C void ERR_load_OCSP_strings(void);
sl@0
   562
sl@0
   563
/* Error codes for the OCSP functions. */
sl@0
   564
sl@0
   565
/* Function codes. */
sl@0
   566
#define OCSP_F_ASN1_STRING_ENCODE			 100
sl@0
   567
#define OCSP_F_D2I_OCSP_NONCE				 102
sl@0
   568
#define OCSP_F_OCSP_BASIC_ADD1_STATUS			 103
sl@0
   569
#define OCSP_F_OCSP_BASIC_SIGN				 104
sl@0
   570
#define OCSP_F_OCSP_BASIC_VERIFY			 105
sl@0
   571
#define OCSP_F_OCSP_CERT_ID_NEW				 101
sl@0
   572
#define OCSP_F_OCSP_CHECK_DELEGATED			 106
sl@0
   573
#define OCSP_F_OCSP_CHECK_IDS				 107
sl@0
   574
#define OCSP_F_OCSP_CHECK_ISSUER			 108
sl@0
   575
#define OCSP_F_OCSP_CHECK_VALIDITY			 115
sl@0
   576
#define OCSP_F_OCSP_MATCH_ISSUERID			 109
sl@0
   577
#define OCSP_F_OCSP_PARSE_URL				 114
sl@0
   578
#define OCSP_F_OCSP_REQUEST_SIGN			 110
sl@0
   579
#define OCSP_F_OCSP_REQUEST_VERIFY			 116
sl@0
   580
#define OCSP_F_OCSP_RESPONSE_GET1_BASIC			 111
sl@0
   581
#define OCSP_F_OCSP_SENDREQ_BIO				 112
sl@0
   582
#define OCSP_F_REQUEST_VERIFY				 113
sl@0
   583
sl@0
   584
/* Reason codes. */
sl@0
   585
#define OCSP_R_BAD_DATA					 100
sl@0
   586
#define OCSP_R_CERTIFICATE_VERIFY_ERROR			 101
sl@0
   587
#define OCSP_R_DIGEST_ERR				 102
sl@0
   588
#define OCSP_R_ERROR_IN_NEXTUPDATE_FIELD		 122
sl@0
   589
#define OCSP_R_ERROR_IN_THISUPDATE_FIELD		 123
sl@0
   590
#define OCSP_R_ERROR_PARSING_URL			 121
sl@0
   591
#define OCSP_R_MISSING_OCSPSIGNING_USAGE		 103
sl@0
   592
#define OCSP_R_NEXTUPDATE_BEFORE_THISUPDATE		 124
sl@0
   593
#define OCSP_R_NOT_BASIC_RESPONSE			 104
sl@0
   594
#define OCSP_R_NO_CERTIFICATES_IN_CHAIN			 105
sl@0
   595
#define OCSP_R_NO_CONTENT				 106
sl@0
   596
#define OCSP_R_NO_PUBLIC_KEY				 107
sl@0
   597
#define OCSP_R_NO_RESPONSE_DATA				 108
sl@0
   598
#define OCSP_R_NO_REVOKED_TIME				 109
sl@0
   599
#define OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE	 110
sl@0
   600
#define OCSP_R_REQUEST_NOT_SIGNED			 128
sl@0
   601
#define OCSP_R_RESPONSE_CONTAINS_NO_REVOCATION_DATA	 111
sl@0
   602
#define OCSP_R_ROOT_CA_NOT_TRUSTED			 112
sl@0
   603
#define OCSP_R_SERVER_READ_ERROR			 113
sl@0
   604
#define OCSP_R_SERVER_RESPONSE_ERROR			 114
sl@0
   605
#define OCSP_R_SERVER_RESPONSE_PARSE_ERROR		 115
sl@0
   606
#define OCSP_R_SERVER_WRITE_ERROR			 116
sl@0
   607
#define OCSP_R_SIGNATURE_FAILURE			 117
sl@0
   608
#define OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND		 118
sl@0
   609
#define OCSP_R_STATUS_EXPIRED				 125
sl@0
   610
#define OCSP_R_STATUS_NOT_YET_VALID			 126
sl@0
   611
#define OCSP_R_STATUS_TOO_OLD				 127
sl@0
   612
#define OCSP_R_UNKNOWN_MESSAGE_DIGEST			 119
sl@0
   613
#define OCSP_R_UNKNOWN_NID				 120
sl@0
   614
#define OCSP_R_UNSUPPORTED_REQUESTORNAME_TYPE		 129
sl@0
   615
sl@0
   616
#ifdef  __cplusplus
sl@0
   617
}
sl@0
   618
#endif
sl@0
   619
#endif