williamr@2: /* ocsp.h */
williamr@2: /* Written by Tom Titchener <Tom_Titchener@groove.net> for the OpenSSL
williamr@2:  * project. */
williamr@2: 
williamr@2: /* History:
williamr@2:    This file was transfered to Richard Levitte from CertCo by Kathy
williamr@2:    Weinhold in mid-spring 2000 to be included in OpenSSL or released
williamr@2:    as a patch kit. */
williamr@2: 
williamr@2: /* ====================================================================
williamr@2:  * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved.
williamr@2:  *
williamr@2:  * Redistribution and use in source and binary forms, with or without
williamr@2:  * modification, are permitted provided that the following conditions
williamr@2:  * are met:
williamr@2:  *
williamr@2:  * 1. Redistributions of source code must retain the above copyright
williamr@2:  *    notice, this list of conditions and the following disclaimer. 
williamr@2:  *
williamr@2:  * 2. Redistributions in binary form must reproduce the above copyright
williamr@2:  *    notice, this list of conditions and the following disclaimer in
williamr@2:  *    the documentation and/or other materials provided with the
williamr@2:  *    distribution.
williamr@2:  *
williamr@2:  * 3. All advertising materials mentioning features or use of this
williamr@2:  *    software must display the following acknowledgment:
williamr@2:  *    "This product includes software developed by the OpenSSL Project
williamr@2:  *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
williamr@2:  *
williamr@2:  * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
williamr@2:  *    endorse or promote products derived from this software without
williamr@2:  *    prior written permission. For written permission, please contact
williamr@2:  *    openssl-core@openssl.org.
williamr@2:  *
williamr@2:  * 5. Products derived from this software may not be called "OpenSSL"
williamr@2:  *    nor may "OpenSSL" appear in their names without prior written
williamr@2:  *    permission of the OpenSSL Project.
williamr@2:  *
williamr@2:  * 6. Redistributions of any form whatsoever must retain the following
williamr@2:  *    acknowledgment:
williamr@2:  *    "This product includes software developed by the OpenSSL Project
williamr@2:  *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
williamr@2:  *
williamr@2:  * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
williamr@2:  * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
williamr@2:  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
williamr@2:  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
williamr@2:  * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
williamr@2:  * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
williamr@2:  * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
williamr@2:  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
williamr@2:  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
williamr@2:  * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
williamr@2:  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
williamr@2:  * OF THE POSSIBILITY OF SUCH DAMAGE.
williamr@2:  * ====================================================================
williamr@2:  *
williamr@2:  * This product includes cryptographic software written by Eric Young
williamr@2:  * (eay@cryptsoft.com).  This product includes software written by Tim
williamr@2:  * Hudson (tjh@cryptsoft.com).
williamr@2:  *
williamr@2:  */
williamr@2: /*
williamr@2:  © Portions copyright (c) 2006 Nokia Corporation.  All rights reserved.
williamr@2:  */
williamr@2: 
williamr@2: #ifndef HEADER_OCSP_H
williamr@2: #define HEADER_OCSP_H
williamr@2: 
williamr@2: #if (defined(__SYMBIAN32__) && !defined(SYMBIAN))
williamr@2: #define SYMBIAN
williamr@2: #endif
williamr@2: 
williamr@2: #ifdef SYMBIAN
williamr@2: #include <e32def.h>
williamr@2: #endif
williamr@2: #include <openssl/x509.h>
williamr@2: #include <openssl/x509v3.h>
williamr@2: #include <openssl/safestack.h>
williamr@2: 
williamr@2: #ifdef  __cplusplus
williamr@2: extern "C" {
williamr@2: #endif
williamr@2: 
williamr@2: /* Various flags and values */
williamr@2: 
williamr@2: #define OCSP_DEFAULT_NONCE_LENGTH	16
williamr@2: 
williamr@2: #define OCSP_NOCERTS			0x1
williamr@2: #define OCSP_NOINTERN			0x2
williamr@2: #define OCSP_NOSIGS			0x4
williamr@2: #define OCSP_NOCHAIN			0x8
williamr@2: #define OCSP_NOVERIFY			0x10
williamr@2: #define OCSP_NOEXPLICIT			0x20
williamr@2: #define OCSP_NOCASIGN			0x40
williamr@2: #define OCSP_NODELEGATED		0x80
williamr@2: #define OCSP_NOCHECKS			0x100
williamr@2: #define OCSP_TRUSTOTHER			0x200
williamr@2: #define OCSP_RESPID_KEY			0x400
williamr@2: #define OCSP_NOTIME			0x800
williamr@2: 
williamr@2: /*   CertID ::= SEQUENCE {
williamr@2:  *       hashAlgorithm            AlgorithmIdentifier,
williamr@2:  *       issuerNameHash     OCTET STRING, -- Hash of Issuer's DN
williamr@2:  *       issuerKeyHash      OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields)
williamr@2:  *       serialNumber       CertificateSerialNumber }
williamr@2:  */
williamr@2: typedef struct ocsp_cert_id_st
williamr@2: 	{
williamr@2: 	X509_ALGOR *hashAlgorithm;
williamr@2: 	ASN1_OCTET_STRING *issuerNameHash;
williamr@2: 	ASN1_OCTET_STRING *issuerKeyHash;
williamr@2: 	ASN1_INTEGER *serialNumber;
williamr@2: 	} OCSP_CERTID;
williamr@2: 
williamr@2: DECLARE_STACK_OF(OCSP_CERTID)
williamr@2: 
williamr@2: /*   Request ::=     SEQUENCE {
williamr@2:  *       reqCert                    CertID,
williamr@2:  *       singleRequestExtensions    [0] EXPLICIT Extensions OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_one_request_st
williamr@2: 	{
williamr@2: 	OCSP_CERTID *reqCert;
williamr@2: 	STACK_OF(X509_EXTENSION) *singleRequestExtensions;
williamr@2: 	} OCSP_ONEREQ;
williamr@2: 
williamr@2: DECLARE_STACK_OF(OCSP_ONEREQ)
williamr@2: DECLARE_ASN1_SET_OF(OCSP_ONEREQ)
williamr@2: 
williamr@2: 
williamr@2: /*   TBSRequest      ::=     SEQUENCE {
williamr@2:  *       version             [0] EXPLICIT Version DEFAULT v1,
williamr@2:  *       requestorName       [1] EXPLICIT GeneralName OPTIONAL,
williamr@2:  *       requestList             SEQUENCE OF Request,
williamr@2:  *       requestExtensions   [2] EXPLICIT Extensions OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_req_info_st
williamr@2: 	{
williamr@2: 	ASN1_INTEGER *version;
williamr@2: 	GENERAL_NAME *requestorName;
williamr@2: 	STACK_OF(OCSP_ONEREQ) *requestList;
williamr@2: 	STACK_OF(X509_EXTENSION) *requestExtensions;
williamr@2: 	} OCSP_REQINFO;
williamr@2: 
williamr@2: /*   Signature       ::=     SEQUENCE {
williamr@2:  *       signatureAlgorithm   AlgorithmIdentifier,
williamr@2:  *       signature            BIT STRING,
williamr@2:  *       certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_signature_st
williamr@2: 	{
williamr@2: 	X509_ALGOR *signatureAlgorithm;
williamr@2: 	ASN1_BIT_STRING *signature;
williamr@2: 	STACK_OF(X509) *certs;
williamr@2: 	} OCSP_SIGNATURE;
williamr@2: 
williamr@2: /*   OCSPRequest     ::=     SEQUENCE {
williamr@2:  *       tbsRequest                  TBSRequest,
williamr@2:  *       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_request_st
williamr@2: 	{
williamr@2: 	OCSP_REQINFO *tbsRequest;
williamr@2: 	OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */
williamr@2: 	} OCSP_REQUEST;
williamr@2: 
williamr@2: /*   OCSPResponseStatus ::= ENUMERATED {
williamr@2:  *       successful            (0),      --Response has valid confirmations
williamr@2:  *       malformedRequest      (1),      --Illegal confirmation request
williamr@2:  *       internalError         (2),      --Internal error in issuer
williamr@2:  *       tryLater              (3),      --Try again later
williamr@2:  *                                       --(4) is not used
williamr@2:  *       sigRequired           (5),      --Must sign the request
williamr@2:  *       unauthorized          (6)       --Request unauthorized
williamr@2:  *   }
williamr@2:  */
williamr@2: #define OCSP_RESPONSE_STATUS_SUCCESSFUL          0
williamr@2: #define OCSP_RESPONSE_STATUS_MALFORMEDREQUEST     1
williamr@2: #define OCSP_RESPONSE_STATUS_INTERNALERROR        2
williamr@2: #define OCSP_RESPONSE_STATUS_TRYLATER             3
williamr@2: #define OCSP_RESPONSE_STATUS_SIGREQUIRED          5
williamr@2: #define OCSP_RESPONSE_STATUS_UNAUTHORIZED         6
williamr@2: 
williamr@2: /*   ResponseBytes ::=       SEQUENCE {
williamr@2:  *       responseType   OBJECT IDENTIFIER,
williamr@2:  *       response       OCTET STRING }
williamr@2:  */
williamr@2: typedef struct ocsp_resp_bytes_st
williamr@2: 	{
williamr@2: 	ASN1_OBJECT *responseType;
williamr@2: 	ASN1_OCTET_STRING *response;
williamr@2: 	} OCSP_RESPBYTES;
williamr@2: 
williamr@2: /*   OCSPResponse ::= SEQUENCE {
williamr@2:  *      responseStatus         OCSPResponseStatus,
williamr@2:  *      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_response_st
williamr@2: 	{
williamr@2: 	ASN1_ENUMERATED *responseStatus;
williamr@2: 	OCSP_RESPBYTES  *responseBytes;
williamr@2: 	} OCSP_RESPONSE;
williamr@2: 
williamr@2: /*   ResponderID ::= CHOICE {
williamr@2:  *      byName   [1] Name,
williamr@2:  *      byKey    [2] KeyHash }
williamr@2:  */
williamr@2: #define V_OCSP_RESPID_NAME 0
williamr@2: #define V_OCSP_RESPID_KEY  1
williamr@2: typedef struct ocsp_responder_id_st
williamr@2: 	{
williamr@2: 	int type;
williamr@2: 	union   {
williamr@2: 		X509_NAME* byName;
williamr@2:         	ASN1_OCTET_STRING *byKey;
williamr@2: 		} value;
williamr@2: 	} OCSP_RESPID;
williamr@2: /*   KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
williamr@2:  *                            --(excluding the tag and length fields)
williamr@2:  */
williamr@2: 
williamr@2: /*   RevokedInfo ::= SEQUENCE {
williamr@2:  *       revocationTime              GeneralizedTime,
williamr@2:  *       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_revoked_info_st
williamr@2: 	{
williamr@2: 	ASN1_GENERALIZEDTIME *revocationTime;
williamr@2: 	ASN1_ENUMERATED *revocationReason;
williamr@2: 	} OCSP_REVOKEDINFO;
williamr@2: 
williamr@2: /*   CertStatus ::= CHOICE {
williamr@2:  *       good                [0]     IMPLICIT NULL,
williamr@2:  *       revoked             [1]     IMPLICIT RevokedInfo,
williamr@2:  *       unknown             [2]     IMPLICIT UnknownInfo }
williamr@2:  */
williamr@2: #define V_OCSP_CERTSTATUS_GOOD    0
williamr@2: #define V_OCSP_CERTSTATUS_REVOKED 1
williamr@2: #define V_OCSP_CERTSTATUS_UNKNOWN 2
williamr@2: typedef struct ocsp_cert_status_st
williamr@2: 	{
williamr@2: 	int type;
williamr@2: 	union	{
williamr@2: 		ASN1_NULL *good;
williamr@2: 		OCSP_REVOKEDINFO *revoked;
williamr@2: 		ASN1_NULL *unknown;
williamr@2: 		} value;
williamr@2: 	} OCSP_CERTSTATUS;
williamr@2: 
williamr@2: /*   SingleResponse ::= SEQUENCE {
williamr@2:  *      certID                       CertID,
williamr@2:  *      certStatus                   CertStatus,
williamr@2:  *      thisUpdate                   GeneralizedTime,
williamr@2:  *      nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL,
williamr@2:  *      singleExtensions     [1]     EXPLICIT Extensions OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_single_response_st
williamr@2: 	{
williamr@2: 	OCSP_CERTID *certId;
williamr@2: 	OCSP_CERTSTATUS *certStatus;
williamr@2: 	ASN1_GENERALIZEDTIME *thisUpdate;
williamr@2: 	ASN1_GENERALIZEDTIME *nextUpdate;
williamr@2: 	STACK_OF(X509_EXTENSION) *singleExtensions;
williamr@2: 	} OCSP_SINGLERESP;
williamr@2: 
williamr@2: DECLARE_STACK_OF(OCSP_SINGLERESP)
williamr@2: DECLARE_ASN1_SET_OF(OCSP_SINGLERESP)
williamr@2: 
williamr@2: /*   ResponseData ::= SEQUENCE {
williamr@2:  *      version              [0] EXPLICIT Version DEFAULT v1,
williamr@2:  *      responderID              ResponderID,
williamr@2:  *      producedAt               GeneralizedTime,
williamr@2:  *      responses                SEQUENCE OF SingleResponse,
williamr@2:  *      responseExtensions   [1] EXPLICIT Extensions OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_response_data_st
williamr@2: 	{
williamr@2: 	ASN1_INTEGER *version;
williamr@2: 	OCSP_RESPID  *responderId;
williamr@2: 	ASN1_GENERALIZEDTIME *producedAt;
williamr@2: 	STACK_OF(OCSP_SINGLERESP) *responses;
williamr@2: 	STACK_OF(X509_EXTENSION) *responseExtensions;
williamr@2: 	} OCSP_RESPDATA;
williamr@2: 
williamr@2: /*   BasicOCSPResponse       ::= SEQUENCE {
williamr@2:  *      tbsResponseData      ResponseData,
williamr@2:  *      signatureAlgorithm   AlgorithmIdentifier,
williamr@2:  *      signature            BIT STRING,
williamr@2:  *      certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
williamr@2:  */
williamr@2:   /* Note 1:
williamr@2:      The value for "signature" is specified in the OCSP rfc2560 as follows:
williamr@2:      "The value for the signature SHALL be computed on the hash of the DER
williamr@2:      encoding ResponseData."  This means that you must hash the DER-encoded
williamr@2:      tbsResponseData, and then run it through a crypto-signing function, which
williamr@2:      will (at least w/RSA) do a hash-'n'-private-encrypt operation.  This seems
williamr@2:      a bit odd, but that's the spec.  Also note that the data structures do not
williamr@2:      leave anywhere to independently specify the algorithm used for the initial
williamr@2:      hash. So, we look at the signature-specification algorithm, and try to do
williamr@2:      something intelligent.	-- Kathy Weinhold, CertCo */
williamr@2:   /* Note 2:
williamr@2:      It seems that the mentioned passage from RFC 2560 (section 4.2.1) is open
williamr@2:      for interpretation.  I've done tests against another responder, and found
williamr@2:      that it doesn't do the double hashing that the RFC seems to say one
williamr@2:      should.  Therefore, all relevant functions take a flag saying which
williamr@2:      variant should be used.	-- Richard Levitte, OpenSSL team and CeloCom */
williamr@2: typedef struct ocsp_basic_response_st
williamr@2: 	{
williamr@2: 	OCSP_RESPDATA *tbsResponseData;
williamr@2: 	X509_ALGOR *signatureAlgorithm;
williamr@2: 	ASN1_BIT_STRING *signature;
williamr@2: 	STACK_OF(X509) *certs;
williamr@2: 	} OCSP_BASICRESP;
williamr@2: 
williamr@2: /*
williamr@2:  *   CRLReason ::= ENUMERATED {
williamr@2:  *        unspecified             (0),
williamr@2:  *        keyCompromise           (1),
williamr@2:  *        cACompromise            (2),
williamr@2:  *        affiliationChanged      (3),
williamr@2:  *        superseded              (4),
williamr@2:  *        cessationOfOperation    (5),
williamr@2:  *        certificateHold         (6),
williamr@2:  *        removeFromCRL           (8) }
williamr@2:  */
williamr@2: #define OCSP_REVOKED_STATUS_NOSTATUS               -1
williamr@2: #define OCSP_REVOKED_STATUS_UNSPECIFIED             0
williamr@2: #define OCSP_REVOKED_STATUS_KEYCOMPROMISE           1
williamr@2: #define OCSP_REVOKED_STATUS_CACOMPROMISE            2
williamr@2: #define OCSP_REVOKED_STATUS_AFFILIATIONCHANGED      3
williamr@2: #define OCSP_REVOKED_STATUS_SUPERSEDED              4
williamr@2: #define OCSP_REVOKED_STATUS_CESSATIONOFOPERATION    5
williamr@2: #define OCSP_REVOKED_STATUS_CERTIFICATEHOLD         6
williamr@2: #define OCSP_REVOKED_STATUS_REMOVEFROMCRL           8
williamr@2: 
williamr@2: /* CrlID ::= SEQUENCE {
williamr@2:  *     crlUrl               [0]     EXPLICIT IA5String OPTIONAL,
williamr@2:  *     crlNum               [1]     EXPLICIT INTEGER OPTIONAL,
williamr@2:  *     crlTime              [2]     EXPLICIT GeneralizedTime OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_crl_id_st
williamr@2:         {
williamr@2: 	ASN1_IA5STRING *crlUrl;
williamr@2: 	ASN1_INTEGER *crlNum;
williamr@2: 	ASN1_GENERALIZEDTIME *crlTime;
williamr@2:         } OCSP_CRLID;
williamr@2: 
williamr@2: /* ServiceLocator ::= SEQUENCE {
williamr@2:  *      issuer    Name,
williamr@2:  *      locator   AuthorityInfoAccessSyntax OPTIONAL }
williamr@2:  */
williamr@2: typedef struct ocsp_service_locator_st
williamr@2:         {
williamr@2: 	X509_NAME* issuer;
williamr@2: 	STACK_OF(ACCESS_DESCRIPTION) *locator;
williamr@2:         } OCSP_SERVICELOC;
williamr@2:  
williamr@2: #define PEM_STRING_OCSP_REQUEST	"OCSP REQUEST"
williamr@2: #define PEM_STRING_OCSP_RESPONSE "OCSP RESPONSE"
williamr@2: 
williamr@2: #define d2i_OCSP_REQUEST_bio(bp,p) ASN1_d2i_bio_of(OCSP_REQUEST,OCSP_REQUEST_new,d2i_OCSP_REQUEST,bp,p)
williamr@2: 
williamr@2: #define d2i_OCSP_RESPONSE_bio(bp,p) ASN1_d2i_bio_of(OCSP_RESPONSE,OCSP_RESPONSE_new,d2i_OCSP_RESPONSE,bp,p)
williamr@2: 
williamr@2: #define	PEM_read_bio_OCSP_REQUEST(bp,x,cb) (OCSP_REQUEST *)PEM_ASN1_read_bio( \
williamr@2:      (char *(*)())d2i_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,bp,(char **)x,cb,NULL)
williamr@2: 
williamr@2: #define	PEM_read_bio_OCSP_RESPONSE(bp,x,cb)(OCSP_RESPONSE *)PEM_ASN1_read_bio(\
williamr@2:      (char *(*)())d2i_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,bp,(char **)x,cb,NULL)
williamr@2: 
williamr@2: #define PEM_write_bio_OCSP_REQUEST(bp,o) \
williamr@2:     PEM_ASN1_write_bio((int (*)())i2d_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,\
williamr@2: 			bp,(char *)o, NULL,NULL,0,NULL,NULL)
williamr@2: 
williamr@2: #define PEM_write_bio_OCSP_RESPONSE(bp,o) \
williamr@2:     PEM_ASN1_write_bio((int (*)())i2d_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,\
williamr@2: 			bp,(char *)o, NULL,NULL,0,NULL,NULL)
williamr@2: 
williamr@2: #define i2d_OCSP_RESPONSE_bio(bp,o) ASN1_i2d_bio_of(OCSP_RESPONSE,i2d_OCSP_RESPONSE,bp,o)
williamr@2: 
williamr@2: #define i2d_OCSP_REQUEST_bio(bp,o) ASN1_i2d_bio_of(OCSP_REQUEST,i2d_OCSP_REQUEST,bp,o)
williamr@2: 
williamr@2: #define OCSP_REQUEST_sign(o,pkey,md) \
williamr@2: 	ASN1_item_sign(ASN1_ITEM_rptr(OCSP_REQINFO),\
williamr@2: 		o->optionalSignature->signatureAlgorithm,NULL,\
williamr@2: 	        o->optionalSignature->signature,o->tbsRequest,pkey,md)
williamr@2: 
williamr@2: #define OCSP_BASICRESP_sign(o,pkey,md,d) \
williamr@2: 	ASN1_item_sign(ASN1_ITEM_rptr(OCSP_RESPDATA),o->signatureAlgorithm,NULL,\
williamr@2: 		o->signature,o->tbsResponseData,pkey,md)
williamr@2: 
williamr@2: #define OCSP_REQUEST_verify(a,r) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_REQINFO),\
williamr@2:         a->optionalSignature->signatureAlgorithm,\
williamr@2: 	a->optionalSignature->signature,a->tbsRequest,r)
williamr@2: 
williamr@2: #define OCSP_BASICRESP_verify(a,r,d) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_RESPDATA),\
williamr@2: 	a->signatureAlgorithm,a->signature,a->tbsResponseData,r)
williamr@2: 
williamr@2: #define ASN1_BIT_STRING_digest(data,type,md,len) \
williamr@2: 	ASN1_item_digest(ASN1_ITEM_rptr(ASN1_BIT_STRING),type,data,md,len)
williamr@2: 
williamr@2: #define OCSP_CERTID_dup(cid) ASN1_dup_of(OCSP_CERTID,i2d_OCSP_CERTID,d2i_OCSP_CERTID,cid)
williamr@2: 
williamr@2: #define OCSP_CERTSTATUS_dup(cs)\
williamr@2:                 (OCSP_CERTSTATUS*)ASN1_dup((int(*)())i2d_OCSP_CERTSTATUS,\
williamr@2: 		(char *(*)())d2i_OCSP_CERTSTATUS,(char *)(cs))
williamr@2: 
williamr@2: IMPORT_C OCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req);
williamr@2: 
williamr@2: IMPORT_C OCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer);
williamr@2: 
williamr@2: IMPORT_C OCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst, 
williamr@2: 			      X509_NAME *issuerName, 
williamr@2: 			      ASN1_BIT_STRING* issuerKey, 
williamr@2: 			      ASN1_INTEGER *serialNumber);
williamr@2: 
williamr@2: IMPORT_C OCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid);
williamr@2: 
williamr@2: IMPORT_C int OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len);
williamr@2: IMPORT_C int OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len);
williamr@2: IMPORT_C int OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs);
williamr@2: IMPORT_C int OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req);
williamr@2: 
williamr@2: IMPORT_C int OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm);
williamr@2: IMPORT_C int OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
williamr@2: 
williamr@2: IMPORT_C int OCSP_request_sign(OCSP_REQUEST   *req,
williamr@2: 		      X509           *signer,
williamr@2: 		      EVP_PKEY       *key,
williamr@2: 		      const EVP_MD   *dgst,
williamr@2: 		      STACK_OF(X509) *certs,
williamr@2: 		      unsigned long flags);
williamr@2: 
williamr@2: IMPORT_C int OCSP_response_status(OCSP_RESPONSE *resp);
williamr@2: IMPORT_C OCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp);
williamr@2: 
williamr@2: IMPORT_C int OCSP_resp_count(OCSP_BASICRESP *bs);
williamr@2: IMPORT_C OCSP_SINGLERESP *OCSP_resp_get0(OCSP_BASICRESP *bs, int idx);
williamr@2: IMPORT_C int OCSP_resp_find(OCSP_BASICRESP *bs, OCSP_CERTID *id, int last);
williamr@2: IMPORT_C int OCSP_single_get0_status(OCSP_SINGLERESP *single, int *reason,
williamr@2: 				ASN1_GENERALIZEDTIME **revtime,
williamr@2: 				ASN1_GENERALIZEDTIME **thisupd,
williamr@2: 				ASN1_GENERALIZEDTIME **nextupd);
williamr@2: IMPORT_C int OCSP_resp_find_status(OCSP_BASICRESP *bs, OCSP_CERTID *id, int *status,
williamr@2: 				int *reason,
williamr@2: 				ASN1_GENERALIZEDTIME **revtime,
williamr@2: 				ASN1_GENERALIZEDTIME **thisupd,
williamr@2: 				ASN1_GENERALIZEDTIME **nextupd);
williamr@2: IMPORT_C int OCSP_check_validity(ASN1_GENERALIZEDTIME *thisupd,
williamr@2: 			ASN1_GENERALIZEDTIME *nextupd,
williamr@2: 			long sec, long maxsec);
williamr@2: 
williamr@2: IMPORT_C int OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
williamr@2: 
williamr@2: IMPORT_C int OCSP_parse_url(char *url, char **phost, char **pport, char **ppath, int *pssl);
williamr@2: 
williamr@2: IMPORT_C int OCSP_id_issuer_cmp(OCSP_CERTID *a, OCSP_CERTID *b);
williamr@2: IMPORT_C int OCSP_id_cmp(OCSP_CERTID *a, OCSP_CERTID *b);
williamr@2: 
williamr@2: IMPORT_C int OCSP_request_onereq_count(OCSP_REQUEST *req);
williamr@2: IMPORT_C OCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i);
williamr@2: IMPORT_C OCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one);
williamr@2: IMPORT_C int OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd,
williamr@2: 			ASN1_OCTET_STRING **pikeyHash,
williamr@2: 			ASN1_INTEGER **pserial, OCSP_CERTID *cid);
williamr@2: IMPORT_C int OCSP_request_is_signed(OCSP_REQUEST *req);
williamr@2: IMPORT_C OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs);
williamr@2: IMPORT_C OCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp,
williamr@2: 						OCSP_CERTID *cid,
williamr@2: 						int status, int reason,
williamr@2: 						ASN1_TIME *revtime,
williamr@2: 					ASN1_TIME *thisupd, ASN1_TIME *nextupd);
williamr@2: IMPORT_C int OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
williamr@2: IMPORT_C int OCSP_basic_sign(OCSP_BASICRESP *brsp, 
williamr@2: 			X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
williamr@2: 			STACK_OF(X509) *certs, unsigned long flags);
williamr@2: 
williamr@2: IMPORT_C ASN1_STRING *ASN1_STRING_encode(ASN1_STRING *s, i2d_of_void *i2d,
williamr@2: 				void *data, STACK_OF(ASN1_OBJECT) *sk);
williamr@2: #define ASN1_STRING_encode_of(type,s,i2d,data,sk) \
williamr@2: 	ASN1_STRING_encode(s, CHECKED_I2D_OF(type, i2d), data, sk)
williamr@2: 
williamr@2: IMPORT_C X509_EXTENSION *OCSP_crlID_new(char *url, long *n, char *tim);
williamr@2: 
williamr@2: IMPORT_C X509_EXTENSION *OCSP_accept_responses_new(char **oids);
williamr@2: 
williamr@2: IMPORT_C X509_EXTENSION *OCSP_archive_cutoff_new(char* tim);
williamr@2: 
williamr@2: IMPORT_C X509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
williamr@2: 
williamr@2: IMPORT_C int OCSP_REQUEST_get_ext_count(OCSP_REQUEST *x);
williamr@2: IMPORT_C int OCSP_REQUEST_get_ext_by_NID(OCSP_REQUEST *x, int nid, int lastpos);
williamr@2: IMPORT_C int OCSP_REQUEST_get_ext_by_OBJ(OCSP_REQUEST *x, ASN1_OBJECT *obj, int lastpos);
williamr@2: IMPORT_C int OCSP_REQUEST_get_ext_by_critical(OCSP_REQUEST *x, int crit, int lastpos);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_REQUEST_get_ext(OCSP_REQUEST *x, int loc);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_REQUEST_delete_ext(OCSP_REQUEST *x, int loc);
williamr@2: IMPORT_C void *OCSP_REQUEST_get1_ext_d2i(OCSP_REQUEST *x, int nid, int *crit, int *idx);
williamr@2: IMPORT_C int OCSP_REQUEST_add1_ext_i2d(OCSP_REQUEST *x, int nid, void *value, int crit,
williamr@2: 							unsigned long flags);
williamr@2: IMPORT_C int OCSP_REQUEST_add_ext(OCSP_REQUEST *x, X509_EXTENSION *ex, int loc);
williamr@2: 
williamr@2: IMPORT_C int OCSP_ONEREQ_get_ext_count(OCSP_ONEREQ *x);
williamr@2: IMPORT_C int OCSP_ONEREQ_get_ext_by_NID(OCSP_ONEREQ *x, int nid, int lastpos);
williamr@2: IMPORT_C int OCSP_ONEREQ_get_ext_by_OBJ(OCSP_ONEREQ *x, ASN1_OBJECT *obj, int lastpos);
williamr@2: IMPORT_C int OCSP_ONEREQ_get_ext_by_critical(OCSP_ONEREQ *x, int crit, int lastpos);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_ONEREQ_get_ext(OCSP_ONEREQ *x, int loc);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_ONEREQ_delete_ext(OCSP_ONEREQ *x, int loc);
williamr@2: IMPORT_C void *OCSP_ONEREQ_get1_ext_d2i(OCSP_ONEREQ *x, int nid, int *crit, int *idx);
williamr@2: IMPORT_C int OCSP_ONEREQ_add1_ext_i2d(OCSP_ONEREQ *x, int nid, void *value, int crit,
williamr@2: 							unsigned long flags);
williamr@2: IMPORT_C int OCSP_ONEREQ_add_ext(OCSP_ONEREQ *x, X509_EXTENSION *ex, int loc);
williamr@2: 
williamr@2: IMPORT_C int OCSP_BASICRESP_get_ext_count(OCSP_BASICRESP *x);
williamr@2: IMPORT_C int OCSP_BASICRESP_get_ext_by_NID(OCSP_BASICRESP *x, int nid, int lastpos);
williamr@2: IMPORT_C int OCSP_BASICRESP_get_ext_by_OBJ(OCSP_BASICRESP *x, ASN1_OBJECT *obj, int lastpos);
williamr@2: IMPORT_C int OCSP_BASICRESP_get_ext_by_critical(OCSP_BASICRESP *x, int crit, int lastpos);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_BASICRESP_get_ext(OCSP_BASICRESP *x, int loc);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_BASICRESP_delete_ext(OCSP_BASICRESP *x, int loc);
williamr@2: IMPORT_C void *OCSP_BASICRESP_get1_ext_d2i(OCSP_BASICRESP *x, int nid, int *crit, int *idx);
williamr@2: IMPORT_C int OCSP_BASICRESP_add1_ext_i2d(OCSP_BASICRESP *x, int nid, void *value, int crit,
williamr@2: 							unsigned long flags);
williamr@2: IMPORT_C int OCSP_BASICRESP_add_ext(OCSP_BASICRESP *x, X509_EXTENSION *ex, int loc);
williamr@2: 
williamr@2: IMPORT_C int OCSP_SINGLERESP_get_ext_count(OCSP_SINGLERESP *x);
williamr@2: IMPORT_C int OCSP_SINGLERESP_get_ext_by_NID(OCSP_SINGLERESP *x, int nid, int lastpos);
williamr@2: IMPORT_C int OCSP_SINGLERESP_get_ext_by_OBJ(OCSP_SINGLERESP *x, ASN1_OBJECT *obj, int lastpos);
williamr@2: IMPORT_C int OCSP_SINGLERESP_get_ext_by_critical(OCSP_SINGLERESP *x, int crit, int lastpos);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_SINGLERESP_get_ext(OCSP_SINGLERESP *x, int loc);
williamr@2: IMPORT_C X509_EXTENSION *OCSP_SINGLERESP_delete_ext(OCSP_SINGLERESP *x, int loc);
williamr@2: IMPORT_C void *OCSP_SINGLERESP_get1_ext_d2i(OCSP_SINGLERESP *x, int nid, int *crit, int *idx);
williamr@2: IMPORT_C int OCSP_SINGLERESP_add1_ext_i2d(OCSP_SINGLERESP *x, int nid, void *value, int crit,
williamr@2: 							unsigned long flags);
williamr@2: IMPORT_C int OCSP_SINGLERESP_add_ext(OCSP_SINGLERESP *x, X509_EXTENSION *ex, int loc);
williamr@2: 
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_SINGLERESP)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_CERTSTATUS)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_REVOKEDINFO)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_BASICRESP)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_RESPDATA)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_RESPID)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_RESPONSE)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_RESPBYTES)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_ONEREQ)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_CERTID)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_REQUEST)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_SIGNATURE)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_REQINFO)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_CRLID)
williamr@2: DECLARE_ASN1_FUNCTIONS(OCSP_SERVICELOC)
williamr@2: 
williamr@2: IMPORT_C char *OCSP_response_status_str(long s);
williamr@2: IMPORT_C char *OCSP_cert_status_str(long s);
williamr@2: IMPORT_C char *OCSP_crl_reason_str(long s);
williamr@2: 
williamr@2: IMPORT_C int OCSP_REQUEST_print(BIO *bp, OCSP_REQUEST* a, unsigned long flags);
williamr@2: IMPORT_C int OCSP_RESPONSE_print(BIO *bp, OCSP_RESPONSE* o, unsigned long flags);
williamr@2: 
williamr@2: IMPORT_C int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
williamr@2: 				X509_STORE *st, unsigned long flags);
williamr@2: 
williamr@2: /* BEGIN ERROR CODES */
williamr@2: /* The following lines are auto generated by the script mkerr.pl. Any changes
williamr@2:  * made after this point may be overwritten when the script is next run.
williamr@2:  */
williamr@2: IMPORT_C void ERR_load_OCSP_strings(void);
williamr@2: 
williamr@2: /* Error codes for the OCSP functions. */
williamr@2: 
williamr@2: /* Function codes. */
williamr@2: #define OCSP_F_ASN1_STRING_ENCODE			 100
williamr@2: #define OCSP_F_D2I_OCSP_NONCE				 102
williamr@2: #define OCSP_F_OCSP_BASIC_ADD1_STATUS			 103
williamr@2: #define OCSP_F_OCSP_BASIC_SIGN				 104
williamr@2: #define OCSP_F_OCSP_BASIC_VERIFY			 105
williamr@2: #define OCSP_F_OCSP_CERT_ID_NEW				 101
williamr@2: #define OCSP_F_OCSP_CHECK_DELEGATED			 106
williamr@2: #define OCSP_F_OCSP_CHECK_IDS				 107
williamr@2: #define OCSP_F_OCSP_CHECK_ISSUER			 108
williamr@2: #define OCSP_F_OCSP_CHECK_VALIDITY			 115
williamr@2: #define OCSP_F_OCSP_MATCH_ISSUERID			 109
williamr@2: #define OCSP_F_OCSP_PARSE_URL				 114
williamr@2: #define OCSP_F_OCSP_REQUEST_SIGN			 110
williamr@2: #define OCSP_F_OCSP_REQUEST_VERIFY			 116
williamr@2: #define OCSP_F_OCSP_RESPONSE_GET1_BASIC			 111
williamr@2: #define OCSP_F_OCSP_SENDREQ_BIO				 112
williamr@2: #define OCSP_F_REQUEST_VERIFY				 113
williamr@2: 
williamr@2: /* Reason codes. */
williamr@2: #define OCSP_R_BAD_DATA					 100
williamr@2: #define OCSP_R_CERTIFICATE_VERIFY_ERROR			 101
williamr@2: #define OCSP_R_DIGEST_ERR				 102
williamr@2: #define OCSP_R_ERROR_IN_NEXTUPDATE_FIELD		 122
williamr@2: #define OCSP_R_ERROR_IN_THISUPDATE_FIELD		 123
williamr@2: #define OCSP_R_ERROR_PARSING_URL			 121
williamr@2: #define OCSP_R_MISSING_OCSPSIGNING_USAGE		 103
williamr@2: #define OCSP_R_NEXTUPDATE_BEFORE_THISUPDATE		 124
williamr@2: #define OCSP_R_NOT_BASIC_RESPONSE			 104
williamr@2: #define OCSP_R_NO_CERTIFICATES_IN_CHAIN			 105
williamr@2: #define OCSP_R_NO_CONTENT				 106
williamr@2: #define OCSP_R_NO_PUBLIC_KEY				 107
williamr@2: #define OCSP_R_NO_RESPONSE_DATA				 108
williamr@2: #define OCSP_R_NO_REVOKED_TIME				 109
williamr@2: #define OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE	 110
williamr@2: #define OCSP_R_REQUEST_NOT_SIGNED			 128
williamr@2: #define OCSP_R_RESPONSE_CONTAINS_NO_REVOCATION_DATA	 111
williamr@2: #define OCSP_R_ROOT_CA_NOT_TRUSTED			 112
williamr@2: #define OCSP_R_SERVER_READ_ERROR			 113
williamr@2: #define OCSP_R_SERVER_RESPONSE_ERROR			 114
williamr@2: #define OCSP_R_SERVER_RESPONSE_PARSE_ERROR		 115
williamr@2: #define OCSP_R_SERVER_WRITE_ERROR			 116
williamr@2: #define OCSP_R_SIGNATURE_FAILURE			 117
williamr@2: #define OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND		 118
williamr@2: #define OCSP_R_STATUS_EXPIRED				 125
williamr@2: #define OCSP_R_STATUS_NOT_YET_VALID			 126
williamr@2: #define OCSP_R_STATUS_TOO_OLD				 127
williamr@2: #define OCSP_R_UNKNOWN_MESSAGE_DIGEST			 119
williamr@2: #define OCSP_R_UNKNOWN_NID				 120
williamr@2: #define OCSP_R_UNSUPPORTED_REQUESTORNAME_TYPE		 129
williamr@2: 
williamr@2: #ifdef  __cplusplus
williamr@2: }
williamr@2: #endif
williamr@2: #endif