OLD | NEW |
1 /* This Source Code Form is subject to the terms of the Mozilla Public | 1 /* This Source Code Form is subject to the terms of the Mozilla Public |
2 * License, v. 2.0. If a copy of the MPL was not distributed with this | 2 * License, v. 2.0. If a copy of the MPL was not distributed with this |
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ | 3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
4 | 4 |
5 /* | 5 /* |
6 * cert.h - public data structures and prototypes for the certificate library | 6 * cert.h - public data structures and prototypes for the certificate library |
7 */ | 7 */ |
8 | 8 |
9 #ifndef _CERT_H_ | 9 #ifndef _CERT_H_ |
10 #define _CERT_H_ | 10 #define _CERT_H_ |
11 | 11 |
12 #include "utilrename.h" | 12 #include "utilrename.h" |
13 #include "plarena.h" | 13 #include "plarena.h" |
14 #include "plhash.h" | 14 #include "plhash.h" |
15 #include "prlong.h" | 15 #include "prlong.h" |
16 #include "prlog.h" | 16 #include "prlog.h" |
17 | 17 |
18 #include "seccomon.h" | 18 #include "seccomon.h" |
19 #include "secdert.h" | 19 #include "secdert.h" |
20 #include "secoidt.h" | 20 #include "secoidt.h" |
21 #include "keyt.h" | 21 #include "keyt.h" |
22 #include "certt.h" | 22 #include "certt.h" |
23 | 23 |
24 SEC_BEGIN_PROTOS | 24 SEC_BEGIN_PROTOS |
25 | 25 |
26 /**************************************************************************** | 26 /**************************************************************************** |
27 * | 27 * |
28 * RFC1485 ascii to/from X.? RelativeDistinguishedName (aka CERTName) | 28 * RFC1485 ascii to/from X.? RelativeDistinguishedName (aka CERTName) |
29 * | 29 * |
30 ****************************************************************************/ | 30 ****************************************************************************/ |
31 | 31 |
32 /* | 32 /* |
33 ** Convert an ascii RFC1485 encoded name into its CERTName equivalent. | 33 ** Convert an ascii RFC1485 encoded name into its CERTName equivalent. |
34 */ | 34 */ |
35 extern CERTName *CERT_AsciiToName(const char *string); | 35 extern CERTName *CERT_AsciiToName(const char *string); |
36 | 36 |
37 /* | 37 /* |
38 ** Convert an CERTName into its RFC1485 encoded equivalent. | 38 ** Convert an CERTName into its RFC1485 encoded equivalent. |
39 ** Returns a string that must be freed with PORT_Free(). | 39 ** Returns a string that must be freed with PORT_Free(). |
40 ** This version produces a string for maximum human readability, | 40 ** This version produces a string for maximum human readability, |
41 ** not for strict RFC compliance. | 41 ** not for strict RFC compliance. |
42 */ | 42 */ |
43 extern char *CERT_NameToAscii(CERTName *name); | 43 extern char *CERT_NameToAscii(CERTName *name); |
44 | 44 |
45 /* | 45 /* |
46 ** Convert an CERTName into its RFC1485 encoded equivalent. | 46 ** Convert an CERTName into its RFC1485 encoded equivalent. |
47 ** Returns a string that must be freed with PORT_Free(). | 47 ** Returns a string that must be freed with PORT_Free(). |
48 ** Caller chooses encoding rules. | 48 ** Caller chooses encoding rules. |
49 */ | 49 */ |
50 extern char *CERT_NameToAsciiInvertible(CERTName *name, | 50 extern char *CERT_NameToAsciiInvertible(CERTName *name, |
51 CertStrictnessLevel strict); | 51 CertStrictnessLevel strict); |
52 | 52 |
53 extern CERTAVA *CERT_CopyAVA(PLArenaPool *arena, CERTAVA *src); | 53 extern CERTAVA *CERT_CopyAVA(PLArenaPool *arena, CERTAVA *src); |
54 | 54 |
55 /* convert an OID to dotted-decimal representation */ | 55 /* convert an OID to dotted-decimal representation */ |
56 /* Returns a string that must be freed with PR_smprintf_free(). */ | 56 /* Returns a string that must be freed with PR_smprintf_free(). */ |
57 extern char * CERT_GetOidString(const SECItem *oid); | 57 extern char *CERT_GetOidString(const SECItem *oid); |
58 | 58 |
59 /* | 59 /* |
60 ** Examine an AVA and return the tag that refers to it. The AVA tags are | 60 ** Examine an AVA and return the tag that refers to it. The AVA tags are |
61 ** defined as SEC_OID_AVA*. | 61 ** defined as SEC_OID_AVA*. |
62 */ | 62 */ |
63 extern SECOidTag CERT_GetAVATag(CERTAVA *ava); | 63 extern SECOidTag CERT_GetAVATag(CERTAVA *ava); |
64 | 64 |
65 /* | 65 /* |
66 ** Compare two AVA's, returning the difference between them. | 66 ** Compare two AVA's, returning the difference between them. |
67 */ | 67 */ |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
119 extern SECStatus CERT_AddRDN(CERTName *name, CERTRDN *rdn); | 119 extern SECStatus CERT_AddRDN(CERTName *name, CERTRDN *rdn); |
120 | 120 |
121 /* | 121 /* |
122 ** Compare two names, returning the difference between them. | 122 ** Compare two names, returning the difference between them. |
123 */ | 123 */ |
124 extern SECComparison CERT_CompareName(const CERTName *a, const CERTName *b); | 124 extern SECComparison CERT_CompareName(const CERTName *a, const CERTName *b); |
125 | 125 |
126 /* | 126 /* |
127 ** Convert a CERTName into something readable | 127 ** Convert a CERTName into something readable |
128 */ | 128 */ |
129 extern char *CERT_FormatName (CERTName *name); | 129 extern char *CERT_FormatName(CERTName *name); |
130 | 130 |
131 /* | 131 /* |
132 ** Convert a der-encoded integer to a hex printable string form. | 132 ** Convert a der-encoded integer to a hex printable string form. |
133 ** Perhaps this should be a SEC function but it's only used for certs. | 133 ** Perhaps this should be a SEC function but it's only used for certs. |
134 */ | 134 */ |
135 extern char *CERT_Hexify (SECItem *i, int do_colon); | 135 extern char *CERT_Hexify(SECItem *i, int do_colon); |
136 | 136 |
137 /* | 137 /* |
138 ** Converts DER string (with explicit length) into zString, if destination | 138 ** Converts DER string (with explicit length) into zString, if destination |
139 ** buffer is big enough to receive it. Does quoting and/or escaping as | 139 ** buffer is big enough to receive it. Does quoting and/or escaping as |
140 ** specified in RFC 1485. Input string must be single or multi-byte DER | 140 ** specified in RFC 1485. Input string must be single or multi-byte DER |
141 ** character set, (ASCII, UTF8, or ISO 8851-x) not a wide character set. | 141 ** character set, (ASCII, UTF8, or ISO 8851-x) not a wide character set. |
142 ** Returns SECSuccess or SECFailure with error code set. If output buffer | 142 ** Returns SECSuccess or SECFailure with error code set. If output buffer |
143 ** is too small, sets error code SEC_ERROR_OUTPUT_LEN. | 143 ** is too small, sets error code SEC_ERROR_OUTPUT_LEN. |
144 */ | 144 */ |
145 extern SECStatus | 145 extern SECStatus CERT_RFC1485_EscapeAndQuote(char *dst, int dstlen, char *src, |
146 CERT_RFC1485_EscapeAndQuote(char *dst, int dstlen, char *src, int srclen); | 146 int srclen); |
147 | 147 |
148 /****************************************************************************** | 148 /****************************************************************************** |
149 * | 149 * |
150 * Certificate handling operations | 150 * Certificate handling operations |
151 * | 151 * |
152 *****************************************************************************/ | 152 *****************************************************************************/ |
153 | 153 |
154 /* | 154 /* |
155 ** Create a new validity object given two unix time values. | 155 ** Create a new validity object given two unix time values. |
156 ** "notBefore" the time before which the validity is not valid | 156 ** "notBefore" the time before which the validity is not valid |
157 ** "notAfter" the time after which the validity is not valid | 157 ** "notAfter" the time after which the validity is not valid |
158 */ | 158 */ |
159 extern CERTValidity *CERT_CreateValidity(PRTime notBefore, PRTime notAfter); | 159 extern CERTValidity *CERT_CreateValidity(PRTime notBefore, PRTime notAfter); |
160 | 160 |
161 /* | 161 /* |
162 ** Destroy a validity object. | 162 ** Destroy a validity object. |
163 ** "v" the validity to destroy | 163 ** "v" the validity to destroy |
164 ** "freeit" if PR_TRUE then free the object as well as its sub-objects | 164 ** "freeit" if PR_TRUE then free the object as well as its sub-objects |
165 */ | 165 */ |
166 extern void CERT_DestroyValidity(CERTValidity *v); | 166 extern void CERT_DestroyValidity(CERTValidity *v); |
167 | 167 |
168 /* | 168 /* |
169 ** Copy the "src" object to "dest". Memory is allocated in "dest" for | 169 ** Copy the "src" object to "dest". Memory is allocated in "dest" for |
170 ** each of the appropriate sub-objects. Memory in "dest" is not freed | 170 ** each of the appropriate sub-objects. Memory in "dest" is not freed |
171 ** before memory is allocated (use CERT_DestroyValidity(v, PR_FALSE) to do | 171 ** before memory is allocated (use CERT_DestroyValidity(v, PR_FALSE) to do |
172 ** that). | 172 ** that). |
173 */ | 173 */ |
174 extern SECStatus CERT_CopyValidity | 174 extern SECStatus CERT_CopyValidity(PLArenaPool *arena, CERTValidity *dest, |
175 (PLArenaPool *arena, CERTValidity *dest, CERTValidity *src); | 175 CERTValidity *src); |
176 | 176 |
177 /* | 177 /* |
178 ** The cert lib considers a cert or CRL valid if the "notBefore" time is | 178 ** The cert lib considers a cert or CRL valid if the "notBefore" time is |
179 ** in the not-too-distant future, e.g. within the next 24 hours. This | 179 ** in the not-too-distant future, e.g. within the next 24 hours. This |
180 ** prevents freshly issued certificates from being considered invalid | 180 ** prevents freshly issued certificates from being considered invalid |
181 ** because the local system's time zone is incorrectly set. | 181 ** because the local system's time zone is incorrectly set. |
182 ** The amount of "pending slop time" is adjustable by the application. | 182 ** The amount of "pending slop time" is adjustable by the application. |
183 ** Units of SlopTime are seconds. Default is 86400 (24 hours). | 183 ** Units of SlopTime are seconds. Default is 86400 (24 hours). |
184 ** Negative SlopTime values are not allowed. | 184 ** Negative SlopTime values are not allowed. |
185 */ | 185 */ |
186 PRInt32 CERT_GetSlopTime(void); | 186 PRInt32 CERT_GetSlopTime(void); |
187 | 187 |
188 SECStatus CERT_SetSlopTime(PRInt32 slop); | 188 SECStatus CERT_SetSlopTime(PRInt32 slop); |
189 | 189 |
190 /* | 190 /* |
191 ** Create a new certificate object. The result must be wrapped with an | 191 ** Create a new certificate object. The result must be wrapped with an |
192 ** CERTSignedData to create a signed certificate. | 192 ** CERTSignedData to create a signed certificate. |
193 ** "serialNumber" the serial number | 193 ** "serialNumber" the serial number |
194 ** "issuer" the name of the certificate issuer | 194 ** "issuer" the name of the certificate issuer |
195 ** "validity" the validity period of the certificate | 195 ** "validity" the validity period of the certificate |
196 ** "req" the certificate request that prompted the certificate issuance | 196 ** "req" the certificate request that prompted the certificate issuance |
197 */ | 197 */ |
198 extern CERTCertificate * | 198 extern CERTCertificate *CERT_CreateCertificate(unsigned long serialNumber, |
199 CERT_CreateCertificate (unsigned long serialNumber, CERTName *issuer, | 199 CERTName *issuer, |
200 » » » CERTValidity *validity, CERTCertificateRequest *req); | 200 CERTValidity *validity, |
| 201 CERTCertificateRequest *req); |
201 | 202 |
202 /* | 203 /* |
203 ** Destroy a certificate object | 204 ** Destroy a certificate object |
204 ** "cert" the certificate to destroy | 205 ** "cert" the certificate to destroy |
205 ** NOTE: certificate's are reference counted. This call decrements the | 206 ** NOTE: certificate's are reference counted. This call decrements the |
206 ** reference count, and if the result is zero, then the object is destroyed | 207 ** reference count, and if the result is zero, then the object is destroyed |
207 ** and optionally freed. | 208 ** and optionally freed. |
208 */ | 209 */ |
209 extern void CERT_DestroyCertificate(CERTCertificate *cert); | 210 extern void CERT_DestroyCertificate(CERTCertificate *cert); |
210 | 211 |
211 /* | 212 /* |
212 ** Make a shallow copy of a certificate "c". Just increments the | 213 ** Make a shallow copy of a certificate "c". Just increments the |
213 ** reference count on "c". | 214 ** reference count on "c". |
214 */ | 215 */ |
215 extern CERTCertificate *CERT_DupCertificate(CERTCertificate *c); | 216 extern CERTCertificate *CERT_DupCertificate(CERTCertificate *c); |
216 | 217 |
217 /* | 218 /* |
218 ** Create a new certificate request. This result must be wrapped with an | 219 ** Create a new certificate request. This result must be wrapped with an |
219 ** CERTSignedData to create a signed certificate request. | 220 ** CERTSignedData to create a signed certificate request. |
220 ** "name" the subject name (who the certificate request is from) | 221 ** "name" the subject name (who the certificate request is from) |
221 ** "spki" describes/defines the public key the certificate is for | 222 ** "spki" describes/defines the public key the certificate is for |
222 ** "attributes" if non-zero, some optional attribute data | 223 ** "attributes" if non-zero, some optional attribute data |
223 */ | 224 */ |
224 extern CERTCertificateRequest * | 225 extern CERTCertificateRequest *CERT_CreateCertificateRequest( |
225 CERT_CreateCertificateRequest (CERTName *name, CERTSubjectPublicKeyInfo *spki, | 226 CERTName *name, CERTSubjectPublicKeyInfo *spki, SECItem **attributes); |
226 » » » SECItem **attributes); | |
227 | 227 |
228 /* | 228 /* |
229 ** Destroy a certificate-request object | 229 ** Destroy a certificate-request object |
230 ** "r" the certificate-request to destroy | 230 ** "r" the certificate-request to destroy |
231 ** "freeit" if PR_TRUE then free the object as well as its sub-objects | 231 ** "freeit" if PR_TRUE then free the object as well as its sub-objects |
232 */ | 232 */ |
233 extern void CERT_DestroyCertificateRequest(CERTCertificateRequest *r); | 233 extern void CERT_DestroyCertificateRequest(CERTCertificateRequest *r); |
234 | 234 |
235 /* | 235 /* |
236 ** Start adding extensions to a certificate request. | 236 ** Start adding extensions to a certificate request. |
237 */ | 237 */ |
238 void * | 238 void *CERT_StartCertificateRequestAttributes(CERTCertificateRequest *req); |
239 CERT_StartCertificateRequestAttributes(CERTCertificateRequest *req); | |
240 | 239 |
241 /* | 240 /* |
242 ** Reformat the certificate extension list into a CertificateRequest | 241 ** Reformat the certificate extension list into a CertificateRequest |
243 ** attribute list. | 242 ** attribute list. |
244 */ | 243 */ |
245 SECStatus | 244 SECStatus CERT_FinishCertificateRequestAttributes(CERTCertificateRequest *req); |
246 CERT_FinishCertificateRequestAttributes(CERTCertificateRequest *req); | |
247 | 245 |
248 /* | 246 /* |
249 ** Extract the Extension Requests from a DER CertRequest attribute list. | 247 ** Extract the Extension Requests from a DER CertRequest attribute list. |
250 */ | 248 */ |
251 SECStatus | 249 SECStatus CERT_GetCertificateRequestExtensions(CERTCertificateRequest *req, |
252 CERT_GetCertificateRequestExtensions(CERTCertificateRequest *req, | 250 CERTCertExtension ***exts); |
253 CERTCertExtension ***exts); | |
254 | 251 |
255 /* | 252 /* |
256 ** Extract a public key object from a certificate | 253 ** Extract a public key object from a certificate |
257 */ | 254 */ |
258 extern SECKEYPublicKey *CERT_ExtractPublicKey(CERTCertificate *cert); | 255 extern SECKEYPublicKey *CERT_ExtractPublicKey(CERTCertificate *cert); |
259 | 256 |
260 /* | 257 /* |
261 ** Retrieve the Key Type associated with the cert we're dealing with | 258 ** Retrieve the Key Type associated with the cert we're dealing with |
262 */ | 259 */ |
263 | 260 |
264 extern KeyType CERT_GetCertKeyType (const CERTSubjectPublicKeyInfo *spki); | 261 extern KeyType CERT_GetCertKeyType(const CERTSubjectPublicKeyInfo *spki); |
265 | 262 |
266 /* | 263 /* |
267 ** Initialize the certificate database. This is called to create | 264 ** Initialize the certificate database. This is called to create |
268 ** the initial list of certificates in the database. | 265 ** the initial list of certificates in the database. |
269 */ | 266 */ |
270 extern SECStatus CERT_InitCertDB(CERTCertDBHandle *handle); | 267 extern SECStatus CERT_InitCertDB(CERTCertDBHandle *handle); |
271 | 268 |
272 extern int CERT_GetDBContentVersion(CERTCertDBHandle *handle); | 269 extern int CERT_GetDBContentVersion(CERTCertDBHandle *handle); |
273 | 270 |
274 /* | 271 /* |
275 ** Default certificate database routines | 272 ** Default certificate database routines |
276 */ | 273 */ |
277 extern void CERT_SetDefaultCertDB(CERTCertDBHandle *handle); | 274 extern void CERT_SetDefaultCertDB(CERTCertDBHandle *handle); |
278 | 275 |
279 extern CERTCertDBHandle *CERT_GetDefaultCertDB(void); | 276 extern CERTCertDBHandle *CERT_GetDefaultCertDB(void); |
280 | 277 |
281 extern CERTCertList *CERT_GetCertChainFromCert(CERTCertificate *cert, | 278 extern CERTCertList *CERT_GetCertChainFromCert(CERTCertificate *cert, |
282 » » » » » PRTime time, | 279 PRTime time, SECCertUsage usage); |
283 » » » » » SECCertUsage usage); | 280 extern CERTCertificate *CERT_NewTempCertificate(CERTCertDBHandle *handle, |
284 extern CERTCertificate * | 281 SECItem *derCert, |
285 CERT_NewTempCertificate (CERTCertDBHandle *handle, SECItem *derCert, | 282 char *nickname, PRBool isperm, |
286 char *nickname, PRBool isperm, PRBool copyDER); | 283 PRBool copyDER); |
287 | |
288 | 284 |
289 /****************************************************************************** | 285 /****************************************************************************** |
290 * | 286 * |
291 * X.500 Name handling operations | 287 * X.500 Name handling operations |
292 * | 288 * |
293 *****************************************************************************/ | 289 *****************************************************************************/ |
294 | 290 |
295 /* | 291 /* |
296 ** Create an AVA (attribute-value-assertion) | 292 ** Create an AVA (attribute-value-assertion) |
297 ** "arena" the memory arena to alloc from | 293 ** "arena" the memory arena to alloc from |
298 ** "kind" is one of SEC_OID_AVA_* | 294 ** "kind" is one of SEC_OID_AVA_* |
299 ** "valueType" is one of DER_PRINTABLE_STRING, DER_IA5_STRING, or | 295 ** "valueType" is one of DER_PRINTABLE_STRING, DER_IA5_STRING, or |
300 ** DER_T61_STRING | 296 ** DER_T61_STRING |
301 ** "value" is the null terminated string containing the value | 297 ** "value" is the null terminated string containing the value |
302 */ | 298 */ |
303 extern CERTAVA *CERT_CreateAVA | 299 extern CERTAVA *CERT_CreateAVA(PLArenaPool *arena, SECOidTag kind, |
304 (PLArenaPool *arena, SECOidTag kind, int valueType, char *value); | 300 int valueType, char *value); |
305 | 301 |
306 /* | 302 /* |
307 ** Extract the Distinguished Name from a DER encoded certificate | 303 ** Extract the Distinguished Name from a DER encoded certificate |
308 ** "derCert" is the DER encoded certificate | 304 ** "derCert" is the DER encoded certificate |
309 ** "derName" is the SECItem that the name is returned in | 305 ** "derName" is the SECItem that the name is returned in |
310 */ | 306 */ |
311 extern SECStatus CERT_NameFromDERCert(SECItem *derCert, SECItem *derName); | 307 extern SECStatus CERT_NameFromDERCert(SECItem *derCert, SECItem *derName); |
312 | 308 |
313 /* | 309 /* |
314 ** Extract the Issuers Distinguished Name from a DER encoded certificate | 310 ** Extract the Issuers Distinguished Name from a DER encoded certificate |
315 ** "derCert" is the DER encoded certificate | 311 ** "derCert" is the DER encoded certificate |
316 ** "derName" is the SECItem that the name is returned in | 312 ** "derName" is the SECItem that the name is returned in |
317 */ | 313 */ |
318 extern SECStatus CERT_IssuerNameFromDERCert(SECItem *derCert, | 314 extern SECStatus CERT_IssuerNameFromDERCert(SECItem *derCert, SECItem *derName); |
319 » » » » » SECItem *derName); | |
320 | 315 |
321 extern SECItem * | 316 extern SECItem *CERT_EncodeGeneralName(CERTGeneralName *genName, SECItem *dest, |
322 CERT_EncodeGeneralName(CERTGeneralName *genName, SECItem *dest, | 317 PLArenaPool *arena); |
323 » » PLArenaPool *arena); | |
324 | 318 |
325 extern CERTGeneralName * | 319 extern CERTGeneralName *CERT_DecodeGeneralName(PLArenaPool *reqArena, |
326 CERT_DecodeGeneralName(PLArenaPool *reqArena, SECItem *encodedName, | 320 SECItem *encodedName, |
327 » » CERTGeneralName *genName); | 321 CERTGeneralName *genName); |
328 | |
329 | |
330 | 322 |
331 /* | 323 /* |
332 ** Generate a database search key for a certificate, based on the | 324 ** Generate a database search key for a certificate, based on the |
333 ** issuer and serial number. | 325 ** issuer and serial number. |
334 ** "arena" the memory arena to alloc from | 326 ** "arena" the memory arena to alloc from |
335 ** "derCert" the DER encoded certificate | 327 ** "derCert" the DER encoded certificate |
336 ** "key" the returned key | 328 ** "key" the returned key |
337 */ | 329 */ |
338 extern SECStatus CERT_KeyFromDERCert(PLArenaPool *reqArena, SECItem *derCert, | 330 extern SECStatus CERT_KeyFromDERCert(PLArenaPool *reqArena, SECItem *derCert, |
339 SECItem *key); | 331 SECItem *key); |
340 | 332 |
341 extern SECStatus CERT_KeyFromIssuerAndSN(PLArenaPool *arena, SECItem *issuer, | 333 extern SECStatus CERT_KeyFromIssuerAndSN(PLArenaPool *arena, SECItem *issuer, |
342 » » » » » SECItem *sn, SECItem *key); | 334 SECItem *sn, SECItem *key); |
343 | 335 |
344 extern SECStatus CERT_SerialNumberFromDERCert(SECItem *derCert, | 336 extern SECStatus CERT_SerialNumberFromDERCert(SECItem *derCert, |
345 » » » » » » SECItem *derName); | 337 SECItem *derName); |
346 | |
347 | 338 |
348 /* | 339 /* |
349 ** Generate a database search key for a crl, based on the | 340 ** Generate a database search key for a crl, based on the |
350 ** issuer. | 341 ** issuer. |
351 ** "arena" the memory arena to alloc from | 342 ** "arena" the memory arena to alloc from |
352 ** "derCrl" the DER encoded crl | 343 ** "derCrl" the DER encoded crl |
353 ** "key" the returned key | 344 ** "key" the returned key |
354 */ | 345 */ |
355 extern SECStatus CERT_KeyFromDERCrl(PLArenaPool *arena, SECItem *derCrl, SECItem
*key); | 346 extern SECStatus CERT_KeyFromDERCrl(PLArenaPool *arena, SECItem *derCrl, |
| 347 SECItem *key); |
356 | 348 |
357 /* | 349 /* |
358 ** Open the certificate database. Use callback to get name of database. | 350 ** Open the certificate database. Use callback to get name of database. |
359 */ | 351 */ |
360 extern SECStatus CERT_OpenCertDB(CERTCertDBHandle *handle, PRBool readOnly, | 352 extern SECStatus CERT_OpenCertDB(CERTCertDBHandle *handle, PRBool readOnly, |
361 » » » » CERTDBNameFunc namecb, void *cbarg); | 353 CERTDBNameFunc namecb, void *cbarg); |
362 | 354 |
363 /* Open the certificate database. Use given filename for database. */ | 355 /* Open the certificate database. Use given filename for database. */ |
364 extern SECStatus CERT_OpenCertDBFilename(CERTCertDBHandle *handle, | 356 extern SECStatus CERT_OpenCertDBFilename(CERTCertDBHandle *handle, |
365 » » » » » char *certdbname, PRBool readOnly); | 357 char *certdbname, PRBool readOnly); |
366 | 358 |
367 /* | 359 /* |
368 ** Open and initialize a cert database that is entirely in memory. This | 360 ** Open and initialize a cert database that is entirely in memory. This |
369 ** can be used when the permanent database can not be opened or created. | 361 ** can be used when the permanent database can not be opened or created. |
370 */ | 362 */ |
371 extern SECStatus CERT_OpenVolatileCertDB(CERTCertDBHandle *handle); | 363 extern SECStatus CERT_OpenVolatileCertDB(CERTCertDBHandle *handle); |
372 | 364 |
373 /* | 365 /* |
374 ** Extract the list of host names, host name patters, IP address strings | 366 ** Extract the list of host names, host name patters, IP address strings |
375 ** this cert is valid for. | 367 ** this cert is valid for. |
376 ** This function does NOT return nicknames. | 368 ** This function does NOT return nicknames. |
377 ** Type CERTCertNicknames is being used because it's a convenient | 369 ** Type CERTCertNicknames is being used because it's a convenient |
378 ** data structure to carry a list of strings and its count. | 370 ** data structure to carry a list of strings and its count. |
379 */ | 371 */ |
380 extern CERTCertNicknames * | 372 extern CERTCertNicknames *CERT_GetValidDNSPatternsFromCert( |
381 CERT_GetValidDNSPatternsFromCert(CERTCertificate *cert); | 373 CERTCertificate *cert); |
382 | 374 |
383 /* | 375 /* |
384 ** Check the hostname to make sure that it matches the shexp that | 376 ** Check the hostname to make sure that it matches the shexp that |
385 ** is given in the common name of the certificate. | 377 ** is given in the common name of the certificate. |
386 */ | 378 */ |
387 extern SECStatus CERT_VerifyCertName(const CERTCertificate *cert, | 379 extern SECStatus CERT_VerifyCertName(const CERTCertificate *cert, |
388 const char *hostname); | 380 const char *hostname); |
389 | 381 |
390 /* | 382 /* |
391 ** Add a domain name to the list of names that the user has explicitly | 383 ** Add a domain name to the list of names that the user has explicitly |
392 ** allowed (despite cert name mismatches) for use with a server cert. | 384 ** allowed (despite cert name mismatches) for use with a server cert. |
393 */ | 385 */ |
394 extern SECStatus CERT_AddOKDomainName(CERTCertificate *cert, const char *hostnam
e); | 386 extern SECStatus CERT_AddOKDomainName(CERTCertificate *cert, |
| 387 const char *hostname); |
395 | 388 |
396 /* | 389 /* |
397 ** Decode a DER encoded certificate into an CERTCertificate structure | 390 ** Decode a DER encoded certificate into an CERTCertificate structure |
398 ** "derSignedCert" is the DER encoded signed certificate | 391 ** "derSignedCert" is the DER encoded signed certificate |
399 ** "copyDER" is true if the DER should be copied, false if the | 392 ** "copyDER" is true if the DER should be copied, false if the |
400 ** existing copy should be referenced | 393 ** existing copy should be referenced |
401 ** "nickname" is the nickname to use in the database. If it is NULL | 394 ** "nickname" is the nickname to use in the database. If it is NULL |
402 ** then a temporary nickname is generated. | 395 ** then a temporary nickname is generated. |
403 */ | 396 */ |
404 extern CERTCertificate * | 397 extern CERTCertificate *CERT_DecodeDERCertificate(SECItem *derSignedCert, |
405 CERT_DecodeDERCertificate (SECItem *derSignedCert, PRBool copyDER, char *nicknam
e); | 398 PRBool copyDER, |
| 399 char *nickname); |
406 /* | 400 /* |
407 ** Decode a DER encoded CRL into a CERTSignedCrl structure | 401 ** Decode a DER encoded CRL into a CERTSignedCrl structure |
408 ** "derSignedCrl" is the DER encoded signed CRL. | 402 ** "derSignedCrl" is the DER encoded signed CRL. |
409 ** "type" must be SEC_CRL_TYPE. | 403 ** "type" must be SEC_CRL_TYPE. |
410 */ | 404 */ |
411 #define SEC_CRL_TYPE» 1 | 405 #define SEC_CRL_TYPE 1 |
412 #define SEC_KRL_TYPE» 0 /* deprecated */ | 406 #define SEC_KRL_TYPE 0 /* deprecated */ |
413 | 407 |
414 extern CERTSignedCrl * | 408 extern CERTSignedCrl *CERT_DecodeDERCrl(PLArenaPool *arena, |
415 CERT_DecodeDERCrl (PLArenaPool *arena, SECItem *derSignedCrl,int type); | 409 SECItem *derSignedCrl, int type); |
416 | 410 |
417 /* | 411 /* |
418 * same as CERT_DecodeDERCrl, plus allow options to be passed in | 412 * same as CERT_DecodeDERCrl, plus allow options to be passed in |
419 */ | 413 */ |
420 | 414 |
421 extern CERTSignedCrl * | 415 extern CERTSignedCrl *CERT_DecodeDERCrlWithFlags(PLArenaPool *narena, |
422 CERT_DecodeDERCrlWithFlags(PLArenaPool *narena, SECItem *derSignedCrl, | 416 SECItem *derSignedCrl, |
423 int type, PRInt32 options); | 417 int type, PRInt32 options); |
424 | 418 |
425 /* CRL options to pass */ | 419 /* CRL options to pass */ |
426 | 420 |
427 #define CRL_DECODE_DEFAULT_OPTIONS 0x00000000 | 421 #define CRL_DECODE_DEFAULT_OPTIONS 0x00000000 |
428 | 422 |
429 /* when CRL_DECODE_DONT_COPY_DER is set, the DER is not copied . The | 423 /* when CRL_DECODE_DONT_COPY_DER is set, the DER is not copied . The |
430 application must then keep derSignedCrl until it destroys the | 424 application must then keep derSignedCrl until it destroys the |
431 CRL . Ideally, it should allocate derSignedCrl in an arena | 425 CRL . Ideally, it should allocate derSignedCrl in an arena |
432 and pass that arena in as the first argument to | 426 and pass that arena in as the first argument to |
433 CERT_DecodeDERCrlWithFlags */ | 427 CERT_DecodeDERCrlWithFlags */ |
434 | 428 |
435 #define CRL_DECODE_DONT_COPY_DER 0x00000001 | 429 #define CRL_DECODE_DONT_COPY_DER 0x00000001 |
436 #define CRL_DECODE_SKIP_ENTRIES 0x00000002 | 430 #define CRL_DECODE_SKIP_ENTRIES 0x00000002 |
437 #define CRL_DECODE_KEEP_BAD_CRL 0x00000004 | 431 #define CRL_DECODE_KEEP_BAD_CRL 0x00000004 |
438 #define CRL_DECODE_ADOPT_HEAP_DER 0x00000008 | 432 #define CRL_DECODE_ADOPT_HEAP_DER 0x00000008 |
439 | 433 |
440 /* complete the decoding of a partially decoded CRL, ie. decode the | 434 /* complete the decoding of a partially decoded CRL, ie. decode the |
441 entries. Note that entries is an optional field in a CRL, so the | 435 entries. Note that entries is an optional field in a CRL, so the |
442 "entries" pointer in CERTCrlStr may still be NULL even after | 436 "entries" pointer in CERTCrlStr may still be NULL even after |
443 function returns SECSuccess */ | 437 function returns SECSuccess */ |
444 | 438 |
445 extern SECStatus CERT_CompleteCRLDecodeEntries(CERTSignedCrl* crl); | 439 extern SECStatus CERT_CompleteCRLDecodeEntries(CERTSignedCrl *crl); |
446 | 440 |
447 /* Validate CRL then import it to the dbase. If there is already a CRL with the | 441 /* Validate CRL then import it to the dbase. If there is already a CRL with the |
448 * same CA in the dbase, it will be replaced if derCRL is more up to date. | 442 * same CA in the dbase, it will be replaced if derCRL is more up to date. |
449 * If the process successes, a CRL will be returned. Otherwise, a NULL will | 443 * If the process successes, a CRL will be returned. Otherwise, a NULL will |
450 * be returned. The caller should call PORT_GetError() for the exactly error | 444 * be returned. The caller should call PORT_GetError() for the exactly error |
451 * code. | 445 * code. |
452 */ | 446 */ |
453 extern CERTSignedCrl * | 447 extern CERTSignedCrl *CERT_ImportCRL(CERTCertDBHandle *handle, SECItem *derCRL, |
454 CERT_ImportCRL (CERTCertDBHandle *handle, SECItem *derCRL, char *url, | 448 char *url, int type, void *wincx); |
455 » » » » » » int type, void * wincx); | |
456 | 449 |
457 extern void CERT_DestroyCrl (CERTSignedCrl *crl); | 450 extern void CERT_DestroyCrl(CERTSignedCrl *crl); |
458 | 451 |
459 /* this is a hint to flush the CRL cache. crlKey is the DER subject of | 452 /* this is a hint to flush the CRL cache. crlKey is the DER subject of |
460 the issuer (CA). */ | 453 the issuer (CA). */ |
461 void CERT_CRLCacheRefreshIssuer(CERTCertDBHandle* dbhandle, SECItem* crlKey); | 454 void CERT_CRLCacheRefreshIssuer(CERTCertDBHandle *dbhandle, SECItem *crlKey); |
462 | 455 |
463 /* add the specified DER CRL object to the CRL cache. Doing so will allow | 456 /* add the specified DER CRL object to the CRL cache. Doing so will allow |
464 certificate verification functions (such as CERT_VerifyCertificate) | 457 certificate verification functions (such as CERT_VerifyCertificate) |
465 to automatically find and make use of this CRL object. | 458 to automatically find and make use of this CRL object. |
466 Once a CRL is added to the CRL cache, the application must hold on to | 459 Once a CRL is added to the CRL cache, the application must hold on to |
467 the object's memory, because the cache will reference it directly. The | 460 the object's memory, because the cache will reference it directly. The |
468 application can only free the object after it calls CERT_UncacheCRL to | 461 application can only free the object after it calls CERT_UncacheCRL to |
469 remove it from the CRL cache. | 462 remove it from the CRL cache. |
470 */ | 463 */ |
471 SECStatus CERT_CacheCRL(CERTCertDBHandle* dbhandle, SECItem* newcrl); | 464 SECStatus CERT_CacheCRL(CERTCertDBHandle *dbhandle, SECItem *newcrl); |
472 | 465 |
473 /* remove a previously added CRL object from the CRL cache. It is OK | 466 /* remove a previously added CRL object from the CRL cache. It is OK |
474 for the application to free the memory after a successful removal | 467 for the application to free the memory after a successful removal |
475 */ | 468 */ |
476 SECStatus CERT_UncacheCRL(CERTCertDBHandle* dbhandle, SECItem* oldcrl); | 469 SECStatus CERT_UncacheCRL(CERTCertDBHandle *dbhandle, SECItem *oldcrl); |
477 | 470 |
478 /* | 471 /* |
479 ** Find a certificate in the database | 472 ** Find a certificate in the database |
480 ** "key" is the database key to look for | 473 ** "key" is the database key to look for |
481 */ | 474 */ |
482 extern CERTCertificate *CERT_FindCertByKey(CERTCertDBHandle *handle, SECItem *ke
y); | 475 extern CERTCertificate *CERT_FindCertByKey(CERTCertDBHandle *handle, |
| 476 SECItem *key); |
483 | 477 |
484 /* | 478 /* |
485 ** Find a certificate in the database by name | 479 ** Find a certificate in the database by name |
486 ** "name" is the distinguished name to look up | 480 ** "name" is the distinguished name to look up |
487 */ | 481 */ |
488 extern CERTCertificate * | 482 extern CERTCertificate *CERT_FindCertByName(CERTCertDBHandle *handle, |
489 CERT_FindCertByName (CERTCertDBHandle *handle, SECItem *name); | 483 SECItem *name); |
490 | 484 |
491 /* | 485 /* |
492 ** Find a certificate in the database by name | 486 ** Find a certificate in the database by name |
493 ** "name" is the distinguished name to look up (in ascii) | 487 ** "name" is the distinguished name to look up (in ascii) |
494 */ | 488 */ |
495 extern CERTCertificate * | 489 extern CERTCertificate *CERT_FindCertByNameString(CERTCertDBHandle *handle, |
496 CERT_FindCertByNameString (CERTCertDBHandle *handle, char *name); | 490 char *name); |
497 | 491 |
498 /* | 492 /* |
499 ** Find a certificate in the database by name and keyid | 493 ** Find a certificate in the database by name and keyid |
500 ** "name" is the distinguished name to look up | 494 ** "name" is the distinguished name to look up |
501 ** "keyID" is the value of the subjectKeyID to match | 495 ** "keyID" is the value of the subjectKeyID to match |
502 */ | 496 */ |
503 extern CERTCertificate * | 497 extern CERTCertificate *CERT_FindCertByKeyID(CERTCertDBHandle *handle, |
504 CERT_FindCertByKeyID (CERTCertDBHandle *handle, SECItem *name, SECItem *keyID); | 498 SECItem *name, SECItem *keyID); |
505 | 499 |
506 /* | 500 /* |
507 ** Generate a certificate key from the issuer and serialnumber, then look it | 501 ** Generate a certificate key from the issuer and serialnumber, then look it |
508 ** up in the database. Return the cert if found. | 502 ** up in the database. Return the cert if found. |
509 ** "issuerAndSN" is the issuer and serial number to look for | 503 ** "issuerAndSN" is the issuer and serial number to look for |
510 */ | 504 */ |
511 extern CERTCertificate * | 505 extern CERTCertificate *CERT_FindCertByIssuerAndSN( |
512 CERT_FindCertByIssuerAndSN (CERTCertDBHandle *handle, CERTIssuerAndSN *issuerAnd
SN); | 506 CERTCertDBHandle *handle, CERTIssuerAndSN *issuerAndSN); |
513 | 507 |
514 /* | 508 /* |
515 ** Find a certificate in the database by a subject key ID | 509 ** Find a certificate in the database by a subject key ID |
516 ** "subjKeyID" is the subject Key ID to look for | 510 ** "subjKeyID" is the subject Key ID to look for |
517 */ | 511 */ |
518 extern CERTCertificate * | 512 extern CERTCertificate *CERT_FindCertBySubjectKeyID(CERTCertDBHandle *handle, |
519 CERT_FindCertBySubjectKeyID (CERTCertDBHandle *handle, SECItem *subjKeyID); | 513 SECItem *subjKeyID); |
520 | 514 |
521 /* | 515 /* |
522 ** Encode Certificate SKID (Subject Key ID) extension. | 516 ** Encode Certificate SKID (Subject Key ID) extension. |
523 ** | 517 ** |
524 */ | 518 */ |
525 extern SECStatus | 519 extern SECStatus CERT_EncodeSubjectKeyID(PLArenaPool *arena, |
526 CERT_EncodeSubjectKeyID(PLArenaPool *arena, const SECItem* srcString, | 520 const SECItem *srcString, |
527 SECItem *encodedValue); | 521 SECItem *encodedValue); |
528 | 522 |
529 /* | 523 /* |
530 ** Find a certificate in the database by a nickname | 524 ** Find a certificate in the database by a nickname |
531 ** "nickname" is the ascii string nickname to look for | 525 ** "nickname" is the ascii string nickname to look for |
532 */ | 526 */ |
533 extern CERTCertificate * | 527 extern CERTCertificate *CERT_FindCertByNickname(CERTCertDBHandle *handle, |
534 CERT_FindCertByNickname (CERTCertDBHandle *handle, const char *nickname); | 528 const char *nickname); |
535 | 529 |
536 /* | 530 /* |
537 ** Find a certificate in the database by a DER encoded certificate | 531 ** Find a certificate in the database by a DER encoded certificate |
538 ** "derCert" is the DER encoded certificate | 532 ** "derCert" is the DER encoded certificate |
539 */ | 533 */ |
540 extern CERTCertificate * | 534 extern CERTCertificate *CERT_FindCertByDERCert(CERTCertDBHandle *handle, |
541 CERT_FindCertByDERCert(CERTCertDBHandle *handle, SECItem *derCert); | 535 SECItem *derCert); |
542 | 536 |
543 /* | 537 /* |
544 ** Find a certificate in the database by a email address | 538 ** Find a certificate in the database by a email address |
545 ** "emailAddr" is the email address to look up | 539 ** "emailAddr" is the email address to look up |
546 */ | 540 */ |
547 CERTCertificate * | 541 CERTCertificate *CERT_FindCertByEmailAddr(CERTCertDBHandle *handle, |
548 CERT_FindCertByEmailAddr(CERTCertDBHandle *handle, char *emailAddr); | 542 char *emailAddr); |
549 | 543 |
550 /* | 544 /* |
551 ** Find a certificate in the database by a email address or nickname | 545 ** Find a certificate in the database by a email address or nickname |
552 ** "name" is the email address or nickname to look up | 546 ** "name" is the email address or nickname to look up |
553 */ | 547 */ |
554 CERTCertificate * | 548 CERTCertificate *CERT_FindCertByNicknameOrEmailAddr(CERTCertDBHandle *handle, |
555 CERT_FindCertByNicknameOrEmailAddr(CERTCertDBHandle *handle, const char *name); | 549 const char *name); |
556 | 550 |
557 /* | 551 /* |
558 ** Find a certificate in the database by a email address or nickname | 552 ** Find a certificate in the database by a email address or nickname |
559 ** and require it to have the given usage. | 553 ** and require it to have the given usage. |
560 ** "name" is the email address or nickname to look up | 554 ** "name" is the email address or nickname to look up |
561 */ | 555 */ |
562 CERTCertificate * | 556 CERTCertificate *CERT_FindCertByNicknameOrEmailAddrForUsage( |
563 CERT_FindCertByNicknameOrEmailAddrForUsage(CERTCertDBHandle *handle, | 557 CERTCertDBHandle *handle, const char *name, SECCertUsage lookingForUsage); |
564 const char *name, | |
565 SECCertUsage lookingForUsage); | |
566 | 558 |
567 /* | 559 /* |
568 ** Find a certificate in the database by a digest of a subject public key | 560 ** Find a certificate in the database by a digest of a subject public key |
569 ** "spkDigest" is the digest to look up | 561 ** "spkDigest" is the digest to look up |
570 */ | 562 */ |
571 extern CERTCertificate * | 563 extern CERTCertificate *CERT_FindCertBySPKDigest(CERTCertDBHandle *handle, |
572 CERT_FindCertBySPKDigest(CERTCertDBHandle *handle, SECItem *spkDigest); | 564 SECItem *spkDigest); |
573 | 565 |
574 /* | 566 /* |
575 * Find the issuer of a cert | 567 * Find the issuer of a cert |
576 */ | 568 */ |
577 CERTCertificate * | 569 CERTCertificate *CERT_FindCertIssuer(CERTCertificate *cert, PRTime validTime, |
578 CERT_FindCertIssuer(CERTCertificate *cert, PRTime validTime, SECCertUsage usage)
; | 570 SECCertUsage usage); |
579 | 571 |
580 /* | 572 /* |
581 ** Check the validity times of a certificate vs. time 't', allowing | 573 ** Check the validity times of a certificate vs. time 't', allowing |
582 ** some slop for broken clocks and stuff. | 574 ** some slop for broken clocks and stuff. |
583 ** "cert" is the certificate to be checked | 575 ** "cert" is the certificate to be checked |
584 ** "t" is the time to check against | 576 ** "t" is the time to check against |
585 ** "allowOverride" if true then check to see if the invalidity has | 577 ** "allowOverride" if true then check to see if the invalidity has |
586 ** been overridden by the user. | 578 ** been overridden by the user. |
587 */ | 579 */ |
588 extern SECCertTimeValidity CERT_CheckCertValidTimes(const CERTCertificate *cert, | 580 extern SECCertTimeValidity CERT_CheckCertValidTimes(const CERTCertificate *cert, |
589 » » » » » » PRTime t, | 581 PRTime t, |
590 » » » » » » PRBool allowOverride); | 582 PRBool allowOverride); |
591 | 583 |
592 /* | 584 /* |
593 ** WARNING - this function is deprecated, and will either go away or have | 585 ** WARNING - this function is deprecated, and will either go away or have |
594 ** a new API in the near future. | 586 ** a new API in the near future. |
595 ** | 587 ** |
596 ** Check the validity times of a certificate vs. the current time, allowing | 588 ** Check the validity times of a certificate vs. the current time, allowing |
597 ** some slop for broken clocks and stuff. | 589 ** some slop for broken clocks and stuff. |
598 ** "cert" is the certificate to be checked | 590 ** "cert" is the certificate to be checked |
599 */ | 591 */ |
600 extern SECStatus CERT_CertTimesValid(CERTCertificate *cert); | 592 extern SECStatus CERT_CertTimesValid(CERTCertificate *cert); |
601 | 593 |
602 /* | 594 /* |
603 ** Extract the validity times from a certificate | 595 ** Extract the validity times from a certificate |
604 ** "c" is the certificate | 596 ** "c" is the certificate |
605 ** "notBefore" is the start of the validity period | 597 ** "notBefore" is the start of the validity period |
606 ** "notAfter" is the end of the validity period | 598 ** "notAfter" is the end of the validity period |
607 */ | 599 */ |
608 extern SECStatus | 600 extern SECStatus CERT_GetCertTimes(const CERTCertificate *c, PRTime *notBefore, |
609 CERT_GetCertTimes (const CERTCertificate *c, PRTime *notBefore, | 601 PRTime *notAfter); |
610 » » PRTime *notAfter); | |
611 | 602 |
612 /* | 603 /* |
613 ** Extract the issuer and serial number from a certificate | 604 ** Extract the issuer and serial number from a certificate |
614 */ | 605 */ |
615 extern CERTIssuerAndSN *CERT_GetCertIssuerAndSN(PLArenaPool *, | 606 extern CERTIssuerAndSN *CERT_GetCertIssuerAndSN(PLArenaPool *, |
616 » » » » » » » CERTCertificate *); | 607 CERTCertificate *); |
617 | 608 |
618 /* | 609 /* |
619 ** verify the signature of a signed data object with a given certificate | 610 ** verify the signature of a signed data object with a given certificate |
620 ** "sd" the signed data object to be verified | 611 ** "sd" the signed data object to be verified |
621 ** "cert" the certificate to use to check the signature | 612 ** "cert" the certificate to use to check the signature |
622 */ | 613 */ |
623 extern SECStatus CERT_VerifySignedData(CERTSignedData *sd, | 614 extern SECStatus CERT_VerifySignedData(CERTSignedData *sd, |
624 » » » » CERTCertificate *cert, | 615 CERTCertificate *cert, PRTime t, |
625 » » » » PRTime t, | 616 void *wincx); |
626 » » » » void *wincx); | |
627 /* | 617 /* |
628 ** verify the signature of a signed data object with the given DER publickey | 618 ** verify the signature of a signed data object with the given DER publickey |
629 */ | 619 */ |
630 extern SECStatus | 620 extern SECStatus CERT_VerifySignedDataWithPublicKeyInfo( |
631 CERT_VerifySignedDataWithPublicKeyInfo(CERTSignedData *sd, | 621 CERTSignedData *sd, CERTSubjectPublicKeyInfo *pubKeyInfo, void *wincx); |
632 CERTSubjectPublicKeyInfo *pubKeyInfo, | |
633 void *wincx); | |
634 | 622 |
635 /* | 623 /* |
636 ** verify the signature of a signed data object with a SECKEYPublicKey. | 624 ** verify the signature of a signed data object with a SECKEYPublicKey. |
637 */ | 625 */ |
638 extern SECStatus | 626 extern SECStatus CERT_VerifySignedDataWithPublicKey(const CERTSignedData *sd, |
639 CERT_VerifySignedDataWithPublicKey(const CERTSignedData *sd, | 627 SECKEYPublicKey *pubKey, |
640 SECKEYPublicKey *pubKey, void *wincx); | 628 void *wincx); |
641 | 629 |
642 /* | 630 /* |
643 ** NEW FUNCTIONS with new bit-field-FIELD SECCertificateUsage - please use | 631 ** NEW FUNCTIONS with new bit-field-FIELD SECCertificateUsage - please use |
644 ** verify a certificate by checking validity times against a certain time, | 632 ** verify a certificate by checking validity times against a certain time, |
645 ** that we trust the issuer, and that the signature on the certificate is | 633 ** that we trust the issuer, and that the signature on the certificate is |
646 ** valid. | 634 ** valid. |
647 ** "cert" the certificate to verify | 635 ** "cert" the certificate to verify |
648 ** "checkSig" only check signatures if true | 636 ** "checkSig" only check signatures if true |
649 */ | 637 */ |
650 extern SECStatus | 638 extern SECStatus CERT_VerifyCertificate(CERTCertDBHandle *handle, |
651 CERT_VerifyCertificate(CERTCertDBHandle *handle, CERTCertificate *cert, | 639 CERTCertificate *cert, PRBool checkSig, |
652 » » PRBool checkSig, SECCertificateUsage requiredUsages, | 640 SECCertificateUsage requiredUsages, |
653 PRTime t, void *wincx, CERTVerifyLog *log, | 641 PRTime t, void *wincx, |
654 SECCertificateUsage* returnedUsages); | 642 CERTVerifyLog *log, |
| 643 SECCertificateUsage *returnedUsages); |
655 | 644 |
656 /* same as above, but uses current time */ | 645 /* same as above, but uses current time */ |
657 extern SECStatus | 646 extern SECStatus CERT_VerifyCertificateNow(CERTCertDBHandle *handle, |
658 CERT_VerifyCertificateNow(CERTCertDBHandle *handle, CERTCertificate *cert, | 647 CERTCertificate *cert, |
659 » » PRBool checkSig, SECCertificateUsage requiredUsages, | 648 PRBool checkSig, |
660 void *wincx, SECCertificateUsage* returnedUsages); | 649 SECCertificateUsage requiredUsages, |
| 650 void *wincx, |
| 651 SECCertificateUsage *returnedUsages); |
661 | 652 |
662 /* | 653 /* |
663 ** Verify that a CA cert can certify some (unspecified) leaf cert for a given | 654 ** Verify that a CA cert can certify some (unspecified) leaf cert for a given |
664 ** purpose. This is used by UI code to help identify where a chain may be | 655 ** purpose. This is used by UI code to help identify where a chain may be |
665 ** broken and why. This takes identical parameters to CERT_VerifyCert | 656 ** broken and why. This takes identical parameters to CERT_VerifyCert |
666 */ | 657 */ |
667 extern SECStatus | 658 extern SECStatus CERT_VerifyCACertForUsage(CERTCertDBHandle *handle, |
668 CERT_VerifyCACertForUsage(CERTCertDBHandle *handle, CERTCertificate *cert, | 659 CERTCertificate *cert, |
669 » » PRBool checkSig, SECCertUsage certUsage, PRTime t, | 660 PRBool checkSig, |
670 » » void *wincx, CERTVerifyLog *log); | 661 SECCertUsage certUsage, PRTime t, |
| 662 void *wincx, CERTVerifyLog *log); |
671 | 663 |
672 /* | 664 /* |
673 ** OLD OBSOLETE FUNCTIONS with enum SECCertUsage - DO NOT USE FOR NEW CODE | 665 ** OLD OBSOLETE FUNCTIONS with enum SECCertUsage - DO NOT USE FOR NEW CODE |
674 ** verify a certificate by checking validity times against a certain time, | 666 ** verify a certificate by checking validity times against a certain time, |
675 ** that we trust the issuer, and that the signature on the certificate is | 667 ** that we trust the issuer, and that the signature on the certificate is |
676 ** valid. | 668 ** valid. |
677 ** "cert" the certificate to verify | 669 ** "cert" the certificate to verify |
678 ** "checkSig" only check signatures if true | 670 ** "checkSig" only check signatures if true |
679 */ | 671 */ |
680 extern SECStatus | 672 extern SECStatus CERT_VerifyCert(CERTCertDBHandle *handle, |
681 CERT_VerifyCert(CERTCertDBHandle *handle, CERTCertificate *cert, | 673 CERTCertificate *cert, PRBool checkSig, |
682 » » PRBool checkSig, SECCertUsage certUsage, PRTime t, | 674 SECCertUsage certUsage, PRTime t, void *wincx, |
683 » » void *wincx, CERTVerifyLog *log); | 675 CERTVerifyLog *log); |
684 | 676 |
685 /* same as above, but uses current time */ | 677 /* same as above, but uses current time */ |
686 extern SECStatus | 678 extern SECStatus CERT_VerifyCertNow(CERTCertDBHandle *handle, |
687 CERT_VerifyCertNow(CERTCertDBHandle *handle, CERTCertificate *cert, | 679 CERTCertificate *cert, PRBool checkSig, |
688 » » PRBool checkSig, SECCertUsage certUsage, void *wincx); | 680 SECCertUsage certUsage, void *wincx); |
689 | 681 |
690 SECStatus | 682 SECStatus CERT_VerifyCertChain(CERTCertDBHandle *handle, CERTCertificate *cert, |
691 CERT_VerifyCertChain(CERTCertDBHandle *handle, CERTCertificate *cert, | 683 PRBool checkSig, SECCertUsage certUsage, |
692 » » PRBool checkSig, SECCertUsage certUsage, PRTime t, | 684 PRTime t, void *wincx, CERTVerifyLog *log); |
693 » » void *wincx, CERTVerifyLog *log); | |
694 | 685 |
695 /* | 686 /* |
696 ** Read a base64 ascii encoded DER certificate and convert it to our | 687 ** Read a base64 ascii encoded DER certificate and convert it to our |
697 ** internal format. | 688 ** internal format. |
698 ** "certstr" is a null-terminated string containing the certificate | 689 ** "certstr" is a null-terminated string containing the certificate |
699 */ | 690 */ |
700 extern CERTCertificate *CERT_ConvertAndDecodeCertificate(char *certstr); | 691 extern CERTCertificate *CERT_ConvertAndDecodeCertificate(char *certstr); |
701 | 692 |
702 /* | 693 /* |
703 ** Read a certificate in some foreign format, and convert it to our | 694 ** Read a certificate in some foreign format, and convert it to our |
704 ** internal format. | 695 ** internal format. |
705 ** "certbuf" is the buffer containing the certificate | 696 ** "certbuf" is the buffer containing the certificate |
706 ** "certlen" is the length of the buffer | 697 ** "certlen" is the length of the buffer |
707 ** NOTE - currently supports netscape base64 ascii encoded raw certs | 698 ** NOTE - currently supports netscape base64 ascii encoded raw certs |
708 ** and netscape binary DER typed files. | 699 ** and netscape binary DER typed files. |
709 */ | 700 */ |
710 extern CERTCertificate *CERT_DecodeCertFromPackage(char *certbuf, int certlen); | 701 extern CERTCertificate *CERT_DecodeCertFromPackage(char *certbuf, int certlen); |
711 | 702 |
712 extern SECStatus | 703 extern SECStatus CERT_ImportCAChain(SECItem *certs, int numcerts, |
713 CERT_ImportCAChain (SECItem *certs, int numcerts, SECCertUsage certUsage); | 704 SECCertUsage certUsage); |
714 | 705 |
715 extern SECStatus | 706 extern SECStatus CERT_ImportCAChainTrusted(SECItem *certs, int numcerts, |
716 CERT_ImportCAChainTrusted(SECItem *certs, int numcerts, SECCertUsage certUsage); | 707 SECCertUsage certUsage); |
717 | 708 |
718 /* | 709 /* |
719 ** Read a certificate chain in some foreign format, and pass it to a | 710 ** Read a certificate chain in some foreign format, and pass it to a |
720 ** callback function. | 711 ** callback function. |
721 ** "certbuf" is the buffer containing the certificate | 712 ** "certbuf" is the buffer containing the certificate |
722 ** "certlen" is the length of the buffer | 713 ** "certlen" is the length of the buffer |
723 ** "f" is the callback function | 714 ** "f" is the callback function |
724 ** "arg" is the callback argument | 715 ** "arg" is the callback argument |
725 */ | 716 */ |
726 typedef SECStatus (PR_CALLBACK *CERTImportCertificateFunc) | 717 typedef SECStatus(PR_CALLBACK *CERTImportCertificateFunc)(void *arg, |
727 (void *arg, SECItem **certs, int numcerts); | 718 SECItem **certs, |
| 719 int numcerts); |
728 | 720 |
729 extern SECStatus | 721 extern SECStatus CERT_DecodeCertPackage(char *certbuf, int certlen, |
730 CERT_DecodeCertPackage(char *certbuf, int certlen, CERTImportCertificateFunc f, | 722 CERTImportCertificateFunc f, void *arg); |
731 » » void *arg); | |
732 | 723 |
733 /* | 724 /* |
734 ** Returns the value of an AVA. This was a formerly static | 725 ** Returns the value of an AVA. This was a formerly static |
735 ** function that has been exposed due to the need to decode | 726 ** function that has been exposed due to the need to decode |
736 ** and convert unicode strings to UTF8. | 727 ** and convert unicode strings to UTF8. |
737 ** | 728 ** |
738 ** XXX This function resides in certhtml.c, should it be | 729 ** XXX This function resides in certhtml.c, should it be |
739 ** moved elsewhere? | 730 ** moved elsewhere? |
740 */ | 731 */ |
741 extern SECItem *CERT_DecodeAVAValue(const SECItem *derAVAValue); | 732 extern SECItem *CERT_DecodeAVAValue(const SECItem *derAVAValue); |
742 | 733 |
743 | |
744 | |
745 /* | 734 /* |
746 ** extract various element strings from a distinguished name. | 735 ** extract various element strings from a distinguished name. |
747 ** "name" the distinguished name | 736 ** "name" the distinguished name |
748 */ | 737 */ |
749 | 738 |
750 extern char *CERT_GetCertificateEmailAddress(CERTCertificate *cert); | 739 extern char *CERT_GetCertificateEmailAddress(CERTCertificate *cert); |
751 | 740 |
752 extern char *CERT_GetCertEmailAddress(const CERTName *name); | 741 extern char *CERT_GetCertEmailAddress(const CERTName *name); |
753 | 742 |
754 extern const char * CERT_GetFirstEmailAddress(CERTCertificate * cert); | 743 extern const char *CERT_GetFirstEmailAddress(CERTCertificate *cert); |
755 | 744 |
756 extern const char * CERT_GetNextEmailAddress(CERTCertificate * cert, | 745 extern const char *CERT_GetNextEmailAddress(CERTCertificate *cert, |
757 const char * prev); | 746 const char *prev); |
758 | 747 |
759 /* The return value must be freed with PORT_Free. */ | 748 /* The return value must be freed with PORT_Free. */ |
760 extern char *CERT_GetCommonName(const CERTName *name); | 749 extern char *CERT_GetCommonName(const CERTName *name); |
761 | 750 |
762 extern char *CERT_GetCountryName(const CERTName *name); | 751 extern char *CERT_GetCountryName(const CERTName *name); |
763 | 752 |
764 extern char *CERT_GetLocalityName(const CERTName *name); | 753 extern char *CERT_GetLocalityName(const CERTName *name); |
765 | 754 |
766 extern char *CERT_GetStateName(const CERTName *name); | 755 extern char *CERT_GetStateName(const CERTName *name); |
767 | 756 |
768 extern char *CERT_GetOrgName(const CERTName *name); | 757 extern char *CERT_GetOrgName(const CERTName *name); |
769 | 758 |
770 extern char *CERT_GetOrgUnitName(const CERTName *name); | 759 extern char *CERT_GetOrgUnitName(const CERTName *name); |
771 | 760 |
772 extern char *CERT_GetDomainComponentName(const CERTName *name); | 761 extern char *CERT_GetDomainComponentName(const CERTName *name); |
773 | 762 |
774 extern char *CERT_GetCertUid(const CERTName *name); | 763 extern char *CERT_GetCertUid(const CERTName *name); |
775 | 764 |
776 /* manipulate the trust parameters of a certificate */ | 765 /* manipulate the trust parameters of a certificate */ |
777 | 766 |
778 extern SECStatus CERT_GetCertTrust(const CERTCertificate *cert, | 767 extern SECStatus CERT_GetCertTrust(const CERTCertificate *cert, |
779 CERTCertTrust *trust); | 768 CERTCertTrust *trust); |
780 | 769 |
781 extern SECStatus | 770 extern SECStatus CERT_ChangeCertTrust(CERTCertDBHandle *handle, |
782 CERT_ChangeCertTrust (CERTCertDBHandle *handle, CERTCertificate *cert, | 771 CERTCertificate *cert, |
783 » » CERTCertTrust *trust); | 772 CERTCertTrust *trust); |
784 | 773 |
785 extern SECStatus | 774 extern SECStatus CERT_ChangeCertTrustByUsage(CERTCertDBHandle *certdb, |
786 CERT_ChangeCertTrustByUsage(CERTCertDBHandle *certdb, CERTCertificate *cert, | 775 CERTCertificate *cert, |
787 » » » SECCertUsage usage); | 776 SECCertUsage usage); |
788 | 777 |
789 /************************************************************************* | 778 /************************************************************************* |
790 * | 779 * |
791 * manipulate the extensions of a certificate | 780 * manipulate the extensions of a certificate |
792 * | 781 * |
793 ************************************************************************/ | 782 ************************************************************************/ |
794 | 783 |
795 /* | 784 /* |
796 ** Set up a cert for adding X509v3 extensions. Returns an opaque handle | 785 ** Set up a cert for adding X509v3 extensions. Returns an opaque handle |
797 ** used by the next two routines. | 786 ** used by the next two routines. |
798 ** "cert" is the certificate we are adding extensions to | 787 ** "cert" is the certificate we are adding extensions to |
799 */ | 788 */ |
800 extern void *CERT_StartCertExtensions(CERTCertificate *cert); | 789 extern void *CERT_StartCertExtensions(CERTCertificate *cert); |
801 | 790 |
802 /* | 791 /* |
803 ** Add an extension to a certificate. | 792 ** Add an extension to a certificate. |
804 ** "exthandle" is the handle returned by the previous function | 793 ** "exthandle" is the handle returned by the previous function |
805 ** "idtag" is the integer tag for the OID that should ID this extension | 794 ** "idtag" is the integer tag for the OID that should ID this extension |
806 ** "value" is the value of the extension | 795 ** "value" is the value of the extension |
807 ** "critical" is the critical extension flag | 796 ** "critical" is the critical extension flag |
808 ** "copyData" is a flag indicating whether the value data should be | 797 ** "copyData" is a flag indicating whether the value data should be |
809 ** copied. | 798 ** copied. |
810 */ | 799 */ |
811 extern SECStatus CERT_AddExtension (void *exthandle, int idtag, | 800 extern SECStatus CERT_AddExtension(void *exthandle, int idtag, SECItem *value, |
812 » » » SECItem *value, PRBool critical, PRBool copyData); | 801 PRBool critical, PRBool copyData); |
813 | 802 |
814 extern SECStatus CERT_AddExtensionByOID (void *exthandle, SECItem *oid, | 803 extern SECStatus CERT_AddExtensionByOID(void *exthandle, SECItem *oid, |
815 » » » SECItem *value, PRBool critical, PRBool copyData); | 804 SECItem *value, PRBool critical, |
| 805 PRBool copyData); |
816 | 806 |
817 extern SECStatus CERT_EncodeAndAddExtension | 807 extern SECStatus CERT_EncodeAndAddExtension(void *exthandle, int idtag, |
818 (void *exthandle, int idtag, void *value, PRBool critical, | 808 void *value, PRBool critical, |
819 const SEC_ASN1Template *atemplate); | 809 const SEC_ASN1Template *atemplate); |
820 | 810 |
821 extern SECStatus CERT_EncodeAndAddBitStrExtension | 811 extern SECStatus CERT_EncodeAndAddBitStrExtension(void *exthandle, int idtag, |
822 (void *exthandle, int idtag, SECItem *value, PRBool critical); | 812 SECItem *value, |
| 813 PRBool critical); |
823 | 814 |
824 | 815 extern SECStatus CERT_EncodeAltNameExtension(PLArenaPool *arena, |
825 extern SECStatus | 816 CERTGeneralName *value, |
826 CERT_EncodeAltNameExtension(PLArenaPool *arena, CERTGeneralName *value, SECIte
m *encodedValue); | 817 SECItem *encodedValue); |
827 | |
828 | 818 |
829 /* | 819 /* |
830 ** Finish adding cert extensions. Does final processing on extension | 820 ** Finish adding cert extensions. Does final processing on extension |
831 ** data, putting it in the right format, and freeing any temporary | 821 ** data, putting it in the right format, and freeing any temporary |
832 ** storage. | 822 ** storage. |
833 ** "exthandle" is the handle used to add extensions to a certificate | 823 ** "exthandle" is the handle used to add extensions to a certificate |
834 */ | 824 */ |
835 extern SECStatus CERT_FinishExtensions(void *exthandle); | 825 extern SECStatus CERT_FinishExtensions(void *exthandle); |
836 | 826 |
837 /* | 827 /* |
838 ** Merge an external list of extensions into a cert's extension list, adding one | 828 ** Merge an external list of extensions into a cert's extension list, adding one |
839 ** only when its OID matches none of the cert's existing extensions. Call this | 829 ** only when its OID matches none of the cert's existing extensions. Call this |
840 ** immediately before calling CERT_FinishExtensions(). | 830 ** immediately before calling CERT_FinishExtensions(). |
841 */ | 831 */ |
842 SECStatus | 832 SECStatus CERT_MergeExtensions(void *exthandle, CERTCertExtension **exts); |
843 CERT_MergeExtensions(void *exthandle, CERTCertExtension **exts); | |
844 | 833 |
845 /* If the extension is found, return its criticality and value. | 834 /* If the extension is found, return its criticality and value. |
846 ** This allocate storage for the returning extension value. | 835 ** This allocate storage for the returning extension value. |
847 */ | 836 */ |
848 extern SECStatus CERT_GetExtenCriticality | 837 extern SECStatus CERT_GetExtenCriticality(CERTCertExtension **extensions, |
849 (CERTCertExtension **extensions, int tag, PRBool *isCritical); | 838 int tag, PRBool *isCritical); |
850 | 839 |
851 extern void | 840 extern void CERT_DestroyOidSequence(CERTOidSequence *oidSeq); |
852 CERT_DestroyOidSequence(CERTOidSequence *oidSeq); | |
853 | 841 |
854 /**************************************************************************** | 842 /**************************************************************************** |
855 * | 843 * |
856 * DER encode and decode extension values | 844 * DER encode and decode extension values |
857 * | 845 * |
858 ****************************************************************************/ | 846 ****************************************************************************/ |
859 | 847 |
860 /* Encode the value of the basicConstraint extension. | 848 /* Encode the value of the basicConstraint extension. |
861 ** arena - where to allocate memory for the encoded value. | 849 ** arena - where to allocate memory for the encoded value. |
862 ** value - extension value to encode | 850 ** value - extension value to encode |
863 ** encodedValue - output encoded value | 851 ** encodedValue - output encoded value |
864 */ | 852 */ |
865 extern SECStatus CERT_EncodeBasicConstraintValue | 853 extern SECStatus CERT_EncodeBasicConstraintValue(PLArenaPool *arena, |
866 (PLArenaPool *arena, CERTBasicConstraints *value, SECItem *encodedValue); | 854 CERTBasicConstraints *value, |
| 855 SECItem *encodedValue); |
867 | 856 |
868 /* | 857 /* |
869 ** Encode the value of the authorityKeyIdentifier extension. | 858 ** Encode the value of the authorityKeyIdentifier extension. |
870 */ | 859 */ |
871 extern SECStatus CERT_EncodeAuthKeyID | 860 extern SECStatus CERT_EncodeAuthKeyID(PLArenaPool *arena, CERTAuthKeyID *value, |
872 (PLArenaPool *arena, CERTAuthKeyID *value, SECItem *encodedValue); | 861 SECItem *encodedValue); |
873 | 862 |
874 /* | 863 /* |
875 ** Encode the value of the crlDistributionPoints extension. | 864 ** Encode the value of the crlDistributionPoints extension. |
876 */ | 865 */ |
877 extern SECStatus CERT_EncodeCRLDistributionPoints | 866 extern SECStatus CERT_EncodeCRLDistributionPoints( |
878 (PLArenaPool *arena, CERTCrlDistributionPoints *value,SECItem *derValue); | 867 PLArenaPool *arena, CERTCrlDistributionPoints *value, SECItem *derValue); |
879 | 868 |
880 /* | 869 /* |
881 ** Decodes a DER encoded basicConstaint extension value into a readable format | 870 ** Decodes a DER encoded basicConstaint extension value into a readable format |
882 ** value - decoded value | 871 ** value - decoded value |
883 ** encodedValue - value to decoded | 872 ** encodedValue - value to decoded |
884 */ | 873 */ |
885 extern SECStatus CERT_DecodeBasicConstraintValue | 874 extern SECStatus CERT_DecodeBasicConstraintValue(CERTBasicConstraints *value, |
886 (CERTBasicConstraints *value, const SECItem *encodedValue); | 875 const SECItem *encodedValue); |
887 | 876 |
888 /* Decodes a DER encoded authorityKeyIdentifier extension value into a | 877 /* Decodes a DER encoded authorityKeyIdentifier extension value into a |
889 ** readable format. | 878 ** readable format. |
890 ** arena - where to allocate memory for the decoded value | 879 ** arena - where to allocate memory for the decoded value |
891 ** encodedValue - value to be decoded | 880 ** encodedValue - value to be decoded |
892 ** Returns a CERTAuthKeyID structure which contains the decoded value | 881 ** Returns a CERTAuthKeyID structure which contains the decoded value |
893 */ | 882 */ |
894 extern CERTAuthKeyID *CERT_DecodeAuthKeyID | 883 extern CERTAuthKeyID *CERT_DecodeAuthKeyID(PLArenaPool *arena, |
895 » » » (PLArenaPool *arena, const SECItem *encodedValue); | 884 const SECItem *encodedValue); |
896 | 885 |
897 /* Decodes a DER encoded crlDistributionPoints extension value into a | 886 /* Decodes a DER encoded crlDistributionPoints extension value into a |
898 ** readable format. | 887 ** readable format. |
899 ** arena - where to allocate memory for the decoded value | 888 ** arena - where to allocate memory for the decoded value |
900 ** der - value to be decoded | 889 ** der - value to be decoded |
901 **» Returns a CERTCrlDistributionPoints structure which contains the | 890 **» Returns a CERTCrlDistributionPoints structure which contains the |
902 ** decoded value | 891 ** decoded value |
903 */ | 892 */ |
904 extern CERTCrlDistributionPoints * CERT_DecodeCRLDistributionPoints | 893 extern CERTCrlDistributionPoints *CERT_DecodeCRLDistributionPoints( |
905 (PLArenaPool *arena, SECItem *der); | 894 PLArenaPool *arena, SECItem *der); |
906 | 895 |
907 /* Extract certain name type from a generalName */ | 896 /* Extract certain name type from a generalName */ |
908 extern void *CERT_GetGeneralNameByType | 897 extern void *CERT_GetGeneralNameByType(CERTGeneralName *genNames, |
909 (CERTGeneralName *genNames, CERTGeneralNameType type, PRBool derFormat); | 898 CERTGeneralNameType type, |
| 899 PRBool derFormat); |
910 | 900 |
911 | 901 extern CERTOidSequence *CERT_DecodeOidSequence(const SECItem *seqItem); |
912 extern CERTOidSequence * | |
913 CERT_DecodeOidSequence(const SECItem *seqItem); | |
914 | |
915 | |
916 | |
917 | 902 |
918 /**************************************************************************** | 903 /**************************************************************************** |
919 * | 904 * |
920 * Find extension values of a certificate | 905 * Find extension values of a certificate |
921 * | 906 * |
922 ***************************************************************************/ | 907 ***************************************************************************/ |
923 | 908 |
924 extern SECStatus CERT_FindCertExtension | 909 extern SECStatus CERT_FindCertExtension(const CERTCertificate *cert, int tag, |
925 (const CERTCertificate *cert, int tag, SECItem *value); | 910 SECItem *value); |
926 | 911 |
927 extern SECStatus CERT_FindNSCertTypeExtension | 912 extern SECStatus CERT_FindNSCertTypeExtension(CERTCertificate *cert, |
928 (CERTCertificate *cert, SECItem *value); | 913 SECItem *value); |
929 | 914 |
930 extern char * CERT_FindNSStringExtension (CERTCertificate *cert, int oidtag); | 915 extern char *CERT_FindNSStringExtension(CERTCertificate *cert, int oidtag); |
931 | 916 |
932 extern SECStatus CERT_FindCertExtensionByOID | 917 extern SECStatus CERT_FindCertExtensionByOID(CERTCertificate *cert, |
933 (CERTCertificate *cert, SECItem *oid, SECItem *value); | 918 SECItem *oid, SECItem *value); |
934 | 919 |
935 /* Returns the decoded value of the authKeyID extension. | 920 /* Returns the decoded value of the authKeyID extension. |
936 ** Note that this uses passed in the arena to allocate storage for the result | 921 ** Note that this uses passed in the arena to allocate storage for the result |
937 */ | 922 */ |
938 extern CERTAuthKeyID * CERT_FindAuthKeyIDExten (PLArenaPool *arena,CERTCertifica
te *cert); | 923 extern CERTAuthKeyID *CERT_FindAuthKeyIDExten(PLArenaPool *arena, |
| 924 CERTCertificate *cert); |
939 | 925 |
940 /* Returns the decoded value of the basicConstraint extension. | 926 /* Returns the decoded value of the basicConstraint extension. |
941 */ | 927 */ |
942 extern SECStatus CERT_FindBasicConstraintExten | 928 extern SECStatus CERT_FindBasicConstraintExten(CERTCertificate *cert, |
943 (CERTCertificate *cert, CERTBasicConstraints *value); | 929 CERTBasicConstraints *value); |
944 | 930 |
945 /* Returns the decoded value of the crlDistributionPoints extension. | 931 /* Returns the decoded value of the crlDistributionPoints extension. |
946 ** Note that the arena in cert is used to allocate storage for the result | 932 ** Note that the arena in cert is used to allocate storage for the result |
947 */ | 933 */ |
948 extern CERTCrlDistributionPoints * CERT_FindCRLDistributionPoints | 934 extern CERTCrlDistributionPoints *CERT_FindCRLDistributionPoints( |
949 (CERTCertificate *cert); | 935 CERTCertificate *cert); |
950 | 936 |
951 /* Returns value of the keyUsage extension. This uses PR_Alloc to allocate | 937 /* Returns value of the keyUsage extension. This uses PR_Alloc to allocate |
952 ** buffer for the decoded value. The caller should free up the storage | 938 ** buffer for the decoded value. The caller should free up the storage |
953 ** allocated in value->data. | 939 ** allocated in value->data. |
954 */ | 940 */ |
955 extern SECStatus CERT_FindKeyUsageExtension (CERTCertificate *cert, | 941 extern SECStatus CERT_FindKeyUsageExtension(CERTCertificate *cert, |
956 » » » » » » » SECItem *value); | 942 SECItem *value); |
957 | 943 |
958 /* Return the decoded value of the subjectKeyID extension. The caller should | 944 /* Return the decoded value of the subjectKeyID extension. The caller should |
959 ** free up the storage allocated in retItem->data. | 945 ** free up the storage allocated in retItem->data. |
960 */ | 946 */ |
961 extern SECStatus CERT_FindSubjectKeyIDExtension (CERTCertificate *cert, | 947 extern SECStatus CERT_FindSubjectKeyIDExtension(CERTCertificate *cert, |
962 » » » » » » » SECItem *retItem); | 948 SECItem *retItem); |
963 | 949 |
964 /* | 950 /* |
965 ** If cert is a v3 certificate, and a critical keyUsage extension is included, | 951 ** If cert is a v3 certificate, and a critical keyUsage extension is included, |
966 ** then check the usage against the extension value. If a non-critical | 952 ** then check the usage against the extension value. If a non-critical |
967 ** keyUsage extension is included, this will return SECSuccess without | 953 ** keyUsage extension is included, this will return SECSuccess without |
968 ** checking, since the extension is an advisory field, not a restriction. | 954 ** checking, since the extension is an advisory field, not a restriction. |
969 ** If cert is not a v3 certificate, this will return SECSuccess. | 955 ** If cert is not a v3 certificate, this will return SECSuccess. |
970 ** cert - certificate | 956 ** cert - certificate |
971 ** usage - one of the x.509 v3 the Key Usage Extension flags | 957 ** usage - one of the x.509 v3 the Key Usage Extension flags |
972 */ | 958 */ |
973 extern SECStatus CERT_CheckCertUsage (CERTCertificate *cert, | 959 extern SECStatus CERT_CheckCertUsage(CERTCertificate *cert, |
974 » » » » » » » unsigned char usage); | 960 unsigned char usage); |
975 | 961 |
976 /**************************************************************************** | 962 /**************************************************************************** |
977 * | 963 * |
978 * CRL v2 Extensions supported routines | 964 * CRL v2 Extensions supported routines |
979 * | 965 * |
980 ****************************************************************************/ | 966 ****************************************************************************/ |
981 | 967 |
982 extern SECStatus CERT_FindCRLExtensionByOID | 968 extern SECStatus CERT_FindCRLExtensionByOID(CERTCrl *crl, SECItem *oid, |
983 (CERTCrl *crl, SECItem *oid, SECItem *value); | 969 SECItem *value); |
984 | 970 |
985 extern SECStatus CERT_FindCRLExtension | 971 extern SECStatus CERT_FindCRLExtension(CERTCrl *crl, int tag, SECItem *value); |
986 (CERTCrl *crl, int tag, SECItem *value); | |
987 | 972 |
988 extern SECStatus | 973 extern SECStatus CERT_FindInvalidDateExten(CERTCrl *crl, PRTime *value); |
989 CERT_FindInvalidDateExten (CERTCrl *crl, PRTime *value); | |
990 | 974 |
991 /* | 975 /* |
992 ** Set up a crl for adding X509v3 extensions. Returns an opaque handle | 976 ** Set up a crl for adding X509v3 extensions. Returns an opaque handle |
993 ** used by routines that take an exthandle (void*) argument . | 977 ** used by routines that take an exthandle (void*) argument . |
994 ** "crl" is the CRL we are adding extensions to | 978 ** "crl" is the CRL we are adding extensions to |
995 */ | 979 */ |
996 extern void *CERT_StartCRLExtensions(CERTCrl *crl); | 980 extern void *CERT_StartCRLExtensions(CERTCrl *crl); |
997 | 981 |
998 /* | 982 /* |
999 ** Set up a crl entry for adding X509v3 extensions. Returns an opaque handle | 983 ** Set up a crl entry for adding X509v3 extensions. Returns an opaque handle |
1000 ** used by routines that take an exthandle (void*) argument . | 984 ** used by routines that take an exthandle (void*) argument . |
1001 ** "crl" is the crl we are adding certs entries to | 985 ** "crl" is the crl we are adding certs entries to |
1002 ** "entry" is the crl entry we are adding extensions to | 986 ** "entry" is the crl entry we are adding extensions to |
1003 */ | 987 */ |
1004 extern void *CERT_StartCRLEntryExtensions(CERTCrl *crl, CERTCrlEntry *entry); | 988 extern void *CERT_StartCRLEntryExtensions(CERTCrl *crl, CERTCrlEntry *entry); |
1005 | 989 |
1006 extern CERTCertNicknames *CERT_GetCertNicknames (CERTCertDBHandle *handle, | 990 extern CERTCertNicknames *CERT_GetCertNicknames(CERTCertDBHandle *handle, |
1007 » » » » » » int what, void *wincx); | 991 int what, void *wincx); |
1008 | 992 |
1009 /* | 993 /* |
1010 ** Finds the crlNumber extension and decodes its value into 'value' | 994 ** Finds the crlNumber extension and decodes its value into 'value' |
1011 */ | 995 */ |
1012 extern SECStatus CERT_FindCRLNumberExten (PLArenaPool *arena, CERTCrl *crl, | 996 extern SECStatus CERT_FindCRLNumberExten(PLArenaPool *arena, CERTCrl *crl, |
1013 SECItem *value); | 997 SECItem *value); |
1014 | 998 |
1015 extern SECStatus CERT_FindCRLEntryReasonExten (CERTCrlEntry *crlEntry, | 999 extern SECStatus CERT_FindCRLEntryReasonExten(CERTCrlEntry *crlEntry, |
1016 » » » » » CERTCRLEntryReasonCode *value); | 1000 CERTCRLEntryReasonCode *value); |
1017 | 1001 |
1018 extern void CERT_FreeNicknames(CERTCertNicknames *nicknames); | 1002 extern void CERT_FreeNicknames(CERTCertNicknames *nicknames); |
1019 | 1003 |
1020 extern PRBool CERT_CompareCerts(const CERTCertificate *c1, | 1004 extern PRBool CERT_CompareCerts(const CERTCertificate *c1, |
1021 const CERTCertificate *c2); | 1005 const CERTCertificate *c2); |
1022 | 1006 |
1023 extern PRBool CERT_CompareCertsForRedirection(CERTCertificate *c1, | 1007 extern PRBool CERT_CompareCertsForRedirection(CERTCertificate *c1, |
1024 » » » » » » » CERTCertificate *c2); | 1008 CERTCertificate *c2); |
1025 | 1009 |
1026 /* | 1010 /* |
1027 ** Generate an array of the Distinguished Names that the given cert database | 1011 ** Generate an array of the Distinguished Names that the given cert database |
1028 ** "trusts" | 1012 ** "trusts" |
1029 */ | 1013 */ |
1030 extern CERTDistNames *CERT_GetSSLCACerts(CERTCertDBHandle *handle); | 1014 extern CERTDistNames *CERT_GetSSLCACerts(CERTCertDBHandle *handle); |
1031 | 1015 |
1032 extern void CERT_FreeDistNames(CERTDistNames *names); | 1016 extern void CERT_FreeDistNames(CERTDistNames *names); |
1033 | 1017 |
1034 /* Duplicate distinguished name array */ | 1018 /* Duplicate distinguished name array */ |
1035 extern CERTDistNames *CERT_DupDistNames(CERTDistNames *orig); | 1019 extern CERTDistNames *CERT_DupDistNames(CERTDistNames *orig); |
1036 | 1020 |
1037 /* | 1021 /* |
1038 ** Generate an array of Distinguished names from an array of nicknames | 1022 ** Generate an array of Distinguished names from an array of nicknames |
1039 */ | 1023 */ |
1040 extern CERTDistNames *CERT_DistNamesFromNicknames | 1024 extern CERTDistNames *CERT_DistNamesFromNicknames(CERTCertDBHandle *handle, |
1041 (CERTCertDBHandle *handle, char **nicknames, int nnames); | 1025 char **nicknames, int nnames); |
1042 | 1026 |
1043 /* | 1027 /* |
1044 ** Generate an array of Distinguished names from a list of certs. | 1028 ** Generate an array of Distinguished names from a list of certs. |
1045 */ | 1029 */ |
1046 extern CERTDistNames *CERT_DistNamesFromCertList(CERTCertList *list); | 1030 extern CERTDistNames *CERT_DistNamesFromCertList(CERTCertList *list); |
1047 | 1031 |
1048 /* | 1032 /* |
1049 ** Generate a certificate chain from a certificate. | 1033 ** Generate a certificate chain from a certificate. |
1050 */ | 1034 */ |
1051 extern CERTCertificateList * | 1035 extern CERTCertificateList *CERT_CertChainFromCert(CERTCertificate *cert, |
1052 CERT_CertChainFromCert(CERTCertificate *cert, SECCertUsage usage, | 1036 SECCertUsage usage, |
1053 » » PRBool includeRoot); | 1037 PRBool includeRoot); |
1054 | 1038 |
1055 extern CERTCertificateList * | 1039 extern CERTCertificateList *CERT_CertListFromCert(CERTCertificate *cert); |
1056 CERT_CertListFromCert(CERTCertificate *cert); | |
1057 | 1040 |
1058 extern CERTCertificateList * | 1041 extern CERTCertificateList *CERT_DupCertList( |
1059 CERT_DupCertList(const CERTCertificateList * oldList); | 1042 const CERTCertificateList *oldList); |
1060 | 1043 |
1061 extern void CERT_DestroyCertificateList(CERTCertificateList *list); | 1044 extern void CERT_DestroyCertificateList(CERTCertificateList *list); |
1062 | 1045 |
1063 /* | 1046 /* |
1064 ** is cert a user cert? i.e. does it have CERTDB_USER trust, | 1047 ** is cert a user cert? i.e. does it have CERTDB_USER trust, |
1065 ** i.e. a private key? | 1048 ** i.e. a private key? |
1066 */ | 1049 */ |
1067 PRBool CERT_IsUserCert(CERTCertificate* cert); | 1050 PRBool CERT_IsUserCert(CERTCertificate *cert); |
1068 | 1051 |
1069 /* is cert a newer than cert b? */ | 1052 /* is cert a newer than cert b? */ |
1070 PRBool CERT_IsNewer(CERTCertificate *certa, CERTCertificate *certb); | 1053 PRBool CERT_IsNewer(CERTCertificate *certa, CERTCertificate *certb); |
1071 | 1054 |
1072 /* currently a stub for address book */ | 1055 /* currently a stub for address book */ |
1073 PRBool | 1056 PRBool CERT_IsCertRevoked(CERTCertificate *cert); |
1074 CERT_IsCertRevoked(CERTCertificate *cert); | 1057 |
1075 | 1058 void CERT_DestroyCertArray(CERTCertificate **certs, unsigned int ncerts); |
1076 void | |
1077 CERT_DestroyCertArray(CERTCertificate **certs, unsigned int ncerts); | |
1078 | 1059 |
1079 /* convert an email address to lower case */ | 1060 /* convert an email address to lower case */ |
1080 char *CERT_FixupEmailAddr(const char *emailAddr); | 1061 char *CERT_FixupEmailAddr(const char *emailAddr); |
1081 | 1062 |
1082 /* decode string representation of trust flags into trust struct */ | 1063 /* decode string representation of trust flags into trust struct */ |
1083 SECStatus | 1064 SECStatus CERT_DecodeTrustString(CERTCertTrust *trust, const char *trusts); |
1084 CERT_DecodeTrustString(CERTCertTrust *trust, const char *trusts); | |
1085 | 1065 |
1086 /* encode trust struct into string representation of trust flags */ | 1066 /* encode trust struct into string representation of trust flags */ |
1087 char * | 1067 char *CERT_EncodeTrustString(CERTCertTrust *trust); |
1088 CERT_EncodeTrustString(CERTCertTrust *trust); | |
1089 | 1068 |
1090 /* find the next or prev cert in a subject list */ | 1069 /* find the next or prev cert in a subject list */ |
1091 CERTCertificate * | 1070 CERTCertificate *CERT_PrevSubjectCert(CERTCertificate *cert); |
1092 CERT_PrevSubjectCert(CERTCertificate *cert); | 1071 CERTCertificate *CERT_NextSubjectCert(CERTCertificate *cert); |
1093 CERTCertificate * | |
1094 CERT_NextSubjectCert(CERTCertificate *cert); | |
1095 | 1072 |
1096 /* | 1073 /* |
1097 * import a collection of certs into the temporary or permanent cert | 1074 * import a collection of certs into the temporary or permanent cert |
1098 * database | 1075 * database |
1099 */ | 1076 */ |
1100 SECStatus | 1077 SECStatus CERT_ImportCerts(CERTCertDBHandle *certdb, SECCertUsage usage, |
1101 CERT_ImportCerts(CERTCertDBHandle *certdb, SECCertUsage usage, | 1078 unsigned int ncerts, SECItem **derCerts, |
1102 » » unsigned int ncerts, SECItem **derCerts, | 1079 CERTCertificate ***retCerts, PRBool keepCerts, |
1103 » » CERTCertificate ***retCerts, PRBool keepCerts, | 1080 PRBool caOnly, char *nickname); |
1104 » » PRBool caOnly, char *nickname); | 1081 |
1105 | 1082 char *CERT_MakeCANickname(CERTCertificate *cert); |
1106 char * | 1083 |
1107 CERT_MakeCANickname(CERTCertificate *cert); | 1084 PRBool CERT_IsCACert(CERTCertificate *cert, unsigned int *rettype); |
1108 | 1085 |
1109 PRBool | 1086 PRBool CERT_IsCADERCert(SECItem *derCert, unsigned int *rettype); |
1110 CERT_IsCACert(CERTCertificate *cert, unsigned int *rettype); | 1087 |
1111 | 1088 PRBool CERT_IsRootDERCert(SECItem *derCert); |
1112 PRBool | 1089 |
1113 CERT_IsCADERCert(SECItem *derCert, unsigned int *rettype); | 1090 SECStatus CERT_SaveSMimeProfile(CERTCertificate *cert, SECItem *emailProfile, |
1114 | 1091 SECItem *profileTime); |
1115 PRBool | |
1116 CERT_IsRootDERCert(SECItem *derCert); | |
1117 | |
1118 SECStatus | |
1119 CERT_SaveSMimeProfile(CERTCertificate *cert, SECItem *emailProfile, | |
1120 » » SECItem *profileTime); | |
1121 | 1092 |
1122 /* | 1093 /* |
1123 * find the smime symmetric capabilities profile for a given cert | 1094 * find the smime symmetric capabilities profile for a given cert |
1124 */ | 1095 */ |
1125 SECItem * | 1096 SECItem *CERT_FindSMimeProfile(CERTCertificate *cert); |
1126 CERT_FindSMimeProfile(CERTCertificate *cert); | 1097 |
1127 | 1098 SECStatus CERT_AddNewCerts(CERTCertDBHandle *handle); |
1128 SECStatus | 1099 |
1129 CERT_AddNewCerts(CERTCertDBHandle *handle); | 1100 CERTCertificatePolicies *CERT_DecodeCertificatePoliciesExtension( |
1130 | 1101 const SECItem *extnValue); |
1131 CERTCertificatePolicies * | 1102 |
1132 CERT_DecodeCertificatePoliciesExtension(const SECItem *extnValue); | 1103 void CERT_DestroyCertificatePoliciesExtension( |
1133 | 1104 CERTCertificatePolicies *policies); |
1134 void | 1105 |
1135 CERT_DestroyCertificatePoliciesExtension(CERTCertificatePolicies *policies); | 1106 CERTCertificatePolicyMappings *CERT_DecodePolicyMappingsExtension( |
1136 | 1107 SECItem *encodedCertPolicyMaps); |
1137 CERTCertificatePolicyMappings * | 1108 |
1138 CERT_DecodePolicyMappingsExtension(SECItem *encodedCertPolicyMaps); | 1109 SECStatus CERT_DestroyPolicyMappingsExtension( |
1139 | 1110 CERTCertificatePolicyMappings *mappings); |
1140 SECStatus | 1111 |
1141 CERT_DestroyPolicyMappingsExtension(CERTCertificatePolicyMappings *mappings); | 1112 SECStatus CERT_DecodePolicyConstraintsExtension( |
1142 | |
1143 SECStatus | |
1144 CERT_DecodePolicyConstraintsExtension( | |
1145 CERTCertificatePolicyConstraints *decodedValue, | 1113 CERTCertificatePolicyConstraints *decodedValue, |
1146 const SECItem *encodedValue); | 1114 const SECItem *encodedValue); |
1147 | 1115 |
1148 SECStatus CERT_DecodeInhibitAnyExtension | 1116 SECStatus CERT_DecodeInhibitAnyExtension( |
1149 (CERTCertificateInhibitAny *decodedValue, SECItem *extnValue); | 1117 CERTCertificateInhibitAny *decodedValue, SECItem *extnValue); |
1150 | 1118 |
1151 CERTUserNotice * | 1119 CERTUserNotice *CERT_DecodeUserNotice(SECItem *noticeItem); |
1152 CERT_DecodeUserNotice(SECItem *noticeItem); | 1120 |
1153 | 1121 extern CERTGeneralName *CERT_DecodeAltNameExtension(PLArenaPool *reqArena, |
1154 extern CERTGeneralName * | 1122 SECItem *EncodedAltName); |
1155 CERT_DecodeAltNameExtension(PLArenaPool *reqArena, SECItem *EncodedAltName); | 1123 |
1156 | 1124 extern CERTNameConstraints *CERT_DecodeNameConstraintsExtension( |
1157 extern CERTNameConstraints * | 1125 PLArenaPool *arena, const SECItem *encodedConstraints); |
1158 CERT_DecodeNameConstraintsExtension(PLArenaPool *arena, | |
1159 const SECItem *encodedConstraints); | |
1160 | 1126 |
1161 /* returns addr of a NULL termainated array of pointers to CERTAuthInfoAccess */ | 1127 /* returns addr of a NULL termainated array of pointers to CERTAuthInfoAccess */ |
1162 extern CERTAuthInfoAccess ** | 1128 extern CERTAuthInfoAccess **CERT_DecodeAuthInfoAccessExtension( |
1163 CERT_DecodeAuthInfoAccessExtension(PLArenaPool *reqArena, | 1129 PLArenaPool *reqArena, const SECItem *encodedExtension); |
1164 » » » » const SECItem *encodedExtension); | 1130 |
1165 | 1131 extern CERTPrivKeyUsagePeriod *CERT_DecodePrivKeyUsagePeriodExtension( |
1166 extern CERTPrivKeyUsagePeriod * | 1132 PLArenaPool *arena, SECItem *extnValue); |
1167 CERT_DecodePrivKeyUsagePeriodExtension(PLArenaPool *arena, SECItem *extnValue); | 1133 |
1168 | 1134 extern CERTGeneralName *CERT_GetNextGeneralName(CERTGeneralName *current); |
1169 extern CERTGeneralName * | 1135 |
1170 CERT_GetNextGeneralName(CERTGeneralName *current); | 1136 extern CERTGeneralName *CERT_GetPrevGeneralName(CERTGeneralName *current); |
1171 | |
1172 extern CERTGeneralName * | |
1173 CERT_GetPrevGeneralName(CERTGeneralName *current); | |
1174 | 1137 |
1175 /* | 1138 /* |
1176 * Look up name constraints for some certs that do not include name constraints | 1139 * Look up name constraints for some certs that do not include name constraints |
1177 * (Most importantly, root certificates) | 1140 * (Most importantly, root certificates) |
1178 * | 1141 * |
1179 * If a matching subject is found, |extensions| will be populated with a copy of
the | 1142 * If a matching subject is found, |extensions| will be populated with a copy of |
1180 * DER-encoded name constraints extension. The data in |extensions| will point t
o | 1143 * the |
| 1144 * DER-encoded name constraints extension. The data in |extensions| will point |
| 1145 * to |
1181 * memory that the caller owns. | 1146 * memory that the caller owns. |
1182 * | 1147 * |
1183 * There is no mechanism to configure imposed name constraints right now. All | 1148 * There is no mechanism to configure imposed name constraints right now. All |
1184 * imposed name constraints are built into NSS. | 1149 * imposed name constraints are built into NSS. |
1185 */ | 1150 */ |
1186 SECStatus | 1151 SECStatus CERT_GetImposedNameConstraints(const SECItem *derSubject, |
1187 CERT_GetImposedNameConstraints(const SECItem *derSubject, SECItem *extensions); | 1152 SECItem *extensions); |
1188 | 1153 |
1189 CERTNameConstraint * | 1154 CERTNameConstraint *CERT_GetNextNameConstraint(CERTNameConstraint *current); |
1190 CERT_GetNextNameConstraint(CERTNameConstraint *current); | 1155 |
1191 | 1156 CERTNameConstraint *CERT_GetPrevNameConstraint(CERTNameConstraint *current); |
1192 CERTNameConstraint * | 1157 |
1193 CERT_GetPrevNameConstraint(CERTNameConstraint *current); | 1158 void CERT_DestroyUserNotice(CERTUserNotice *userNotice); |
1194 | 1159 |
1195 void | 1160 typedef char *(*CERTPolicyStringCallback)(char *org, unsigned long noticeNumber, |
1196 CERT_DestroyUserNotice(CERTUserNotice *userNotice); | 1161 void *arg); |
1197 | 1162 void CERT_SetCAPolicyStringCallback(CERTPolicyStringCallback cb, void *cbarg); |
1198 typedef char * (* CERTPolicyStringCallback)(char *org, | 1163 |
1199 » » » » » unsigned long noticeNumber, | 1164 char *CERT_GetCertCommentString(CERTCertificate *cert); |
1200 » » » » » void *arg); | 1165 |
1201 void | 1166 PRBool CERT_GovtApprovedBitSet(CERTCertificate *cert); |
1202 CERT_SetCAPolicyStringCallback(CERTPolicyStringCallback cb, void *cbarg); | 1167 |
1203 | 1168 SECStatus CERT_AddPermNickname(CERTCertificate *cert, char *nickname); |
1204 char * | 1169 |
1205 CERT_GetCertCommentString(CERTCertificate *cert); | 1170 CERTCertList *CERT_MatchUserCert(CERTCertDBHandle *handle, SECCertUsage usage, |
1206 | 1171 int nCANames, char **caNames, void *proto_win); |
1207 PRBool | 1172 |
1208 CERT_GovtApprovedBitSet(CERTCertificate *cert); | 1173 CERTCertList *CERT_NewCertList(void); |
1209 | |
1210 SECStatus | |
1211 CERT_AddPermNickname(CERTCertificate *cert, char *nickname); | |
1212 | |
1213 CERTCertList * | |
1214 CERT_MatchUserCert(CERTCertDBHandle *handle, | |
1215 » » SECCertUsage usage, | |
1216 » » int nCANames, char **caNames, | |
1217 » » void *proto_win); | |
1218 | |
1219 CERTCertList * | |
1220 CERT_NewCertList(void); | |
1221 | 1174 |
1222 /* free the cert list and all the certs in the list */ | 1175 /* free the cert list and all the certs in the list */ |
1223 void | 1176 void CERT_DestroyCertList(CERTCertList *certs); |
1224 CERT_DestroyCertList(CERTCertList *certs); | |
1225 | 1177 |
1226 /* remove the node and free the cert */ | 1178 /* remove the node and free the cert */ |
1227 void | 1179 void CERT_RemoveCertListNode(CERTCertListNode *node); |
1228 CERT_RemoveCertListNode(CERTCertListNode *node); | |
1229 | 1180 |
1230 /* equivalent to CERT_AddCertToListTailWithData(certs, cert, NULL) */ | 1181 /* equivalent to CERT_AddCertToListTailWithData(certs, cert, NULL) */ |
1231 SECStatus | 1182 SECStatus CERT_AddCertToListTail(CERTCertList *certs, CERTCertificate *cert); |
1232 CERT_AddCertToListTail(CERTCertList *certs, CERTCertificate *cert); | |
1233 | 1183 |
1234 /* equivalent to CERT_AddCertToListHeadWithData(certs, cert, NULL) */ | 1184 /* equivalent to CERT_AddCertToListHeadWithData(certs, cert, NULL) */ |
1235 SECStatus | 1185 SECStatus CERT_AddCertToListHead(CERTCertList *certs, CERTCertificate *cert); |
1236 CERT_AddCertToListHead(CERTCertList *certs, CERTCertificate *cert); | |
1237 | 1186 |
1238 /* | 1187 /* |
1239 * The new cert list node takes ownership of "cert". "cert" is freed | 1188 * The new cert list node takes ownership of "cert". "cert" is freed |
1240 * when the list node is removed. | 1189 * when the list node is removed. |
1241 */ | 1190 */ |
1242 SECStatus | 1191 SECStatus CERT_AddCertToListTailWithData(CERTCertList *certs, |
1243 CERT_AddCertToListTailWithData(CERTCertList *certs, CERTCertificate *cert, | 1192 CERTCertificate *cert, void *appData); |
1244 » » » » » » » void *appData); | |
1245 | 1193 |
1246 /* | 1194 /* |
1247 * The new cert list node takes ownership of "cert". "cert" is freed | 1195 * The new cert list node takes ownership of "cert". "cert" is freed |
1248 * when the list node is removed. | 1196 * when the list node is removed. |
1249 */ | 1197 */ |
1250 SECStatus | 1198 SECStatus CERT_AddCertToListHeadWithData(CERTCertList *certs, |
1251 CERT_AddCertToListHeadWithData(CERTCertList *certs, CERTCertificate *cert, | 1199 CERTCertificate *cert, void *appData); |
1252 » » » » » » » void *appData); | 1200 |
1253 | 1201 typedef PRBool (*CERTSortCallback)(CERTCertificate *certa, |
1254 typedef PRBool (* CERTSortCallback)(CERTCertificate *certa, | 1202 CERTCertificate *certb, void *arg); |
1255 » » » » CERTCertificate *certb, | 1203 SECStatus CERT_AddCertToListSorted(CERTCertList *certs, CERTCertificate *cert, |
1256 » » » » void *arg); | 1204 CERTSortCallback f, void *arg); |
1257 SECStatus | |
1258 CERT_AddCertToListSorted(CERTCertList *certs, CERTCertificate *cert, | |
1259 » » » CERTSortCallback f, void *arg); | |
1260 | 1205 |
1261 /* callback for CERT_AddCertToListSorted that sorts based on validity | 1206 /* callback for CERT_AddCertToListSorted that sorts based on validity |
1262 * period and a given time. | 1207 * period and a given time. |
1263 */ | 1208 */ |
1264 PRBool | 1209 PRBool CERT_SortCBValidity(CERTCertificate *certa, CERTCertificate *certb, |
1265 CERT_SortCBValidity(CERTCertificate *certa, | 1210 void *arg); |
1266 » » CERTCertificate *certb, | 1211 |
1267 » » void *arg); | 1212 SECStatus CERT_CheckForEvilCert(CERTCertificate *cert); |
1268 | 1213 |
1269 SECStatus | 1214 CERTGeneralName *CERT_GetCertificateNames(CERTCertificate *cert, |
1270 CERT_CheckForEvilCert(CERTCertificate *cert); | 1215 PLArenaPool *arena); |
1271 | 1216 |
1272 CERTGeneralName * | 1217 CERTGeneralName *CERT_GetConstrainedCertificateNames( |
1273 CERT_GetCertificateNames(CERTCertificate *cert, PLArenaPool *arena); | 1218 const CERTCertificate *cert, PLArenaPool *arena, |
1274 | 1219 PRBool includeSubjectCommonName); |
1275 CERTGeneralName * | |
1276 CERT_GetConstrainedCertificateNames(const CERTCertificate *cert, | |
1277 PLArenaPool *arena, | |
1278 PRBool includeSubjectCommonName); | |
1279 | 1220 |
1280 /* | 1221 /* |
1281 * Creates or adds to a list of all certs with a give subject name, sorted by | 1222 * Creates or adds to a list of all certs with a give subject name, sorted by |
1282 * validity time, newest first. Invalid certs are considered older than | 1223 * validity time, newest first. Invalid certs are considered older than |
1283 * valid certs. If validOnly is set, do not include invalid certs on list. | 1224 * valid certs. If validOnly is set, do not include invalid certs on list. |
1284 */ | 1225 */ |
1285 CERTCertList * | 1226 CERTCertList *CERT_CreateSubjectCertList(CERTCertList *certList, |
1286 CERT_CreateSubjectCertList(CERTCertList *certList, CERTCertDBHandle *handle, | 1227 CERTCertDBHandle *handle, |
1287 » » » const SECItem *name, PRTime sorttime, | 1228 const SECItem *name, PRTime sorttime, |
1288 » » » PRBool validOnly); | 1229 PRBool validOnly); |
1289 | 1230 |
1290 /* | 1231 /* |
1291 * remove certs from a list that don't have keyUsage and certType | 1232 * remove certs from a list that don't have keyUsage and certType |
1292 * that match the given usage. | 1233 * that match the given usage. |
1293 */ | 1234 */ |
1294 SECStatus | 1235 SECStatus CERT_FilterCertListByUsage(CERTCertList *certList, SECCertUsage usage, |
1295 CERT_FilterCertListByUsage(CERTCertList *certList, SECCertUsage usage, | 1236 PRBool ca); |
1296 » » » PRBool ca); | |
1297 | 1237 |
1298 /* | 1238 /* |
1299 * check the key usage of a cert against a set of required values | 1239 * check the key usage of a cert against a set of required values |
1300 */ | 1240 */ |
1301 SECStatus | 1241 SECStatus CERT_CheckKeyUsage(CERTCertificate *cert, unsigned int requiredUsage); |
1302 CERT_CheckKeyUsage(CERTCertificate *cert, unsigned int requiredUsage); | |
1303 | 1242 |
1304 /* | 1243 /* |
1305 * return required key usage and cert type based on cert usage | 1244 * return required key usage and cert type based on cert usage |
1306 */ | 1245 */ |
1307 SECStatus | 1246 SECStatus CERT_KeyUsageAndTypeForCertUsage(SECCertUsage usage, PRBool ca, |
1308 CERT_KeyUsageAndTypeForCertUsage(SECCertUsage usage, | 1247 unsigned int *retKeyUsage, |
1309 » » » » PRBool ca, | 1248 unsigned int *retCertType); |
1310 » » » » unsigned int *retKeyUsage, | |
1311 » » » » unsigned int *retCertType); | |
1312 /* | 1249 /* |
1313 * return required trust flags for various cert usages for CAs | 1250 * return required trust flags for various cert usages for CAs |
1314 */ | 1251 */ |
1315 SECStatus | 1252 SECStatus CERT_TrustFlagsForCACertUsage(SECCertUsage usage, |
1316 CERT_TrustFlagsForCACertUsage(SECCertUsage usage, | 1253 unsigned int *retFlags, |
1317 » » » unsigned int *retFlags, | 1254 SECTrustType *retTrustType); |
1318 » » » SECTrustType *retTrustType); | |
1319 | 1255 |
1320 /* | 1256 /* |
1321 * Find all user certificates that match the given criteria. | 1257 * Find all user certificates that match the given criteria. |
1322 * | 1258 * |
1323 * "handle" - database to search | 1259 * "handle" - database to search |
1324 * "usage" - certificate usage to match | 1260 * "usage" - certificate usage to match |
1325 * "oneCertPerName" - if set then only return the "best" cert per | 1261 * "oneCertPerName" - if set then only return the "best" cert per |
1326 * name | 1262 * name |
1327 * "validOnly" - only return certs that are curently valid | 1263 * "validOnly" - only return certs that are curently valid |
1328 * "proto_win" - window handle passed to pkcs11 | 1264 * "proto_win" - window handle passed to pkcs11 |
1329 */ | 1265 */ |
1330 CERTCertList * | 1266 CERTCertList *CERT_FindUserCertsByUsage(CERTCertDBHandle *handle, |
1331 CERT_FindUserCertsByUsage(CERTCertDBHandle *handle, | 1267 SECCertUsage usage, |
1332 » » » SECCertUsage usage, | 1268 PRBool oneCertPerName, PRBool validOnly, |
1333 » » » PRBool oneCertPerName, | 1269 void *proto_win); |
1334 » » » PRBool validOnly, | |
1335 » » » void *proto_win); | |
1336 | 1270 |
1337 /* | 1271 /* |
1338 * Find a user certificate that matchs the given criteria. | 1272 * Find a user certificate that matchs the given criteria. |
1339 * | 1273 * |
1340 * "handle" - database to search | 1274 * "handle" - database to search |
1341 * "nickname" - nickname to match | 1275 * "nickname" - nickname to match |
1342 * "usage" - certificate usage to match | 1276 * "usage" - certificate usage to match |
1343 * "validOnly" - only return certs that are curently valid | 1277 * "validOnly" - only return certs that are curently valid |
1344 * "proto_win" - window handle passed to pkcs11 | 1278 * "proto_win" - window handle passed to pkcs11 |
1345 */ | 1279 */ |
1346 CERTCertificate * | 1280 CERTCertificate *CERT_FindUserCertByUsage(CERTCertDBHandle *handle, |
1347 CERT_FindUserCertByUsage(CERTCertDBHandle *handle, | 1281 const char *nickname, |
1348 » » » const char *nickname, | 1282 SECCertUsage usage, PRBool validOnly, |
1349 » » » SECCertUsage usage, | 1283 void *proto_win); |
1350 » » » PRBool validOnly, | |
1351 » » » void *proto_win); | |
1352 | 1284 |
1353 /* | 1285 /* |
1354 * Filter a list of certificates, removing those certs that do not have | 1286 * Filter a list of certificates, removing those certs that do not have |
1355 * one of the named CA certs somewhere in their cert chain. | 1287 * one of the named CA certs somewhere in their cert chain. |
1356 * | 1288 * |
1357 * "certList" - the list of certificates to filter | 1289 * "certList" - the list of certificates to filter |
1358 * "nCANames" - number of CA names | 1290 * "nCANames" - number of CA names |
1359 * "caNames" - array of CA names in string(rfc 1485) form | 1291 * "caNames" - array of CA names in string(rfc 1485) form |
1360 * "usage" - what use the certs are for, this is used when | 1292 * "usage" - what use the certs are for, this is used when |
1361 * selecting CA certs | 1293 * selecting CA certs |
1362 */ | 1294 */ |
1363 SECStatus | 1295 SECStatus CERT_FilterCertListByCANames(CERTCertList *certList, int nCANames, |
1364 CERT_FilterCertListByCANames(CERTCertList *certList, int nCANames, | 1296 char **caNames, SECCertUsage usage); |
1365 » » » char **caNames, SECCertUsage usage); | |
1366 | 1297 |
1367 /* | 1298 /* |
1368 * Filter a list of certificates, removing those certs that aren't user certs | 1299 * Filter a list of certificates, removing those certs that aren't user certs |
1369 */ | 1300 */ |
1370 SECStatus | 1301 SECStatus CERT_FilterCertListForUserCerts(CERTCertList *certList); |
1371 CERT_FilterCertListForUserCerts(CERTCertList *certList); | |
1372 | 1302 |
1373 /* | 1303 /* |
1374 * Collect the nicknames from all certs in a CertList. If the cert is not | 1304 * Collect the nicknames from all certs in a CertList. If the cert is not |
1375 * valid, append a string to that nickname. | 1305 * valid, append a string to that nickname. |
1376 * | 1306 * |
1377 * "certList" - the list of certificates | 1307 * "certList" - the list of certificates |
1378 * "expiredString" - the string to append to the nickname of any expired cert | 1308 * "expiredString" - the string to append to the nickname of any expired cert |
1379 * "notYetGoodString" - the string to append to the nickname of any cert | 1309 * "notYetGoodString" - the string to append to the nickname of any cert |
1380 * that is not yet valid | 1310 * that is not yet valid |
1381 */ | 1311 */ |
1382 CERTCertNicknames * | 1312 CERTCertNicknames *CERT_NicknameStringsFromCertList(CERTCertList *certList, |
1383 CERT_NicknameStringsFromCertList(CERTCertList *certList, char *expiredString, | 1313 char *expiredString, |
1384 » » » » char *notYetGoodString); | 1314 char *notYetGoodString); |
1385 | 1315 |
1386 /* | 1316 /* |
1387 * Extract the nickname from a nickmake string that may have either | 1317 * Extract the nickname from a nickmake string that may have either |
1388 * expiredString or notYetGoodString appended. | 1318 * expiredString or notYetGoodString appended. |
1389 * | 1319 * |
1390 * Args: | 1320 * Args: |
1391 * "namestring" - the string containing the nickname, and possibly | 1321 * "namestring" - the string containing the nickname, and possibly |
1392 * one of the validity label strings | 1322 * one of the validity label strings |
1393 * "expiredString" - the expired validity label string | 1323 * "expiredString" - the expired validity label string |
1394 * "notYetGoodString" - the not yet good validity label string | 1324 * "notYetGoodString" - the not yet good validity label string |
1395 * | 1325 * |
1396 * Returns the raw nickname | 1326 * Returns the raw nickname |
1397 */ | 1327 */ |
1398 char * | 1328 char *CERT_ExtractNicknameString(char *namestring, char *expiredString, |
1399 CERT_ExtractNicknameString(char *namestring, char *expiredString, | 1329 char *notYetGoodString); |
1400 » » » char *notYetGoodString); | |
1401 | 1330 |
1402 /* | 1331 /* |
1403 * Given a certificate, return a string containing the nickname, and possibly | 1332 * Given a certificate, return a string containing the nickname, and possibly |
1404 * one of the validity strings, based on the current validity state of the | 1333 * one of the validity strings, based on the current validity state of the |
1405 * certificate. | 1334 * certificate. |
1406 * | 1335 * |
1407 * "arena" - arena to allocate returned string from. If NULL, then heap | 1336 * "arena" - arena to allocate returned string from. If NULL, then heap |
1408 * is used. | 1337 * is used. |
1409 * "cert" - the cert to get nickname from | 1338 * "cert" - the cert to get nickname from |
1410 * "expiredString" - the string to append to the nickname if the cert is | 1339 * "expiredString" - the string to append to the nickname if the cert is |
1411 * expired. | 1340 * expired. |
1412 * "notYetGoodString" - the string to append to the nickname if the cert is | 1341 * "notYetGoodString" - the string to append to the nickname if the cert is |
1413 * not yet good. | 1342 * not yet good. |
1414 */ | 1343 */ |
1415 char * | 1344 char *CERT_GetCertNicknameWithValidity(PLArenaPool *arena, |
1416 CERT_GetCertNicknameWithValidity(PLArenaPool *arena, CERTCertificate *cert, | 1345 CERTCertificate *cert, |
1417 » » » » char *expiredString, char *notYetGoodString); | 1346 char *expiredString, |
| 1347 char *notYetGoodString); |
1418 | 1348 |
1419 /* | 1349 /* |
1420 * Return the string representation of a DER encoded distinguished name | 1350 * Return the string representation of a DER encoded distinguished name |
1421 * "dername" - The DER encoded name to convert | 1351 * "dername" - The DER encoded name to convert |
1422 */ | 1352 */ |
1423 char * | 1353 char *CERT_DerNameToAscii(SECItem *dername); |
1424 CERT_DerNameToAscii(SECItem *dername); | |
1425 | 1354 |
1426 /* | 1355 /* |
1427 * Supported usage values and types: | 1356 * Supported usage values and types: |
1428 * certUsageSSLClient | 1357 * certUsageSSLClient |
1429 * certUsageSSLServer | 1358 * certUsageSSLServer |
1430 * certUsageSSLServerWithStepUp | 1359 * certUsageSSLServerWithStepUp |
1431 * certUsageEmailSigner | 1360 * certUsageEmailSigner |
1432 * certUsageEmailRecipient | 1361 * certUsageEmailRecipient |
1433 * certUsageObjectSigner | 1362 * certUsageObjectSigner |
1434 */ | 1363 */ |
1435 | 1364 |
1436 CERTCertificate * | 1365 CERTCertificate *CERT_FindMatchingCert(CERTCertDBHandle *handle, |
1437 CERT_FindMatchingCert(CERTCertDBHandle *handle, SECItem *derName, | 1366 SECItem *derName, CERTCertOwner owner, |
1438 » » CERTCertOwner owner, SECCertUsage usage, | 1367 SECCertUsage usage, PRBool preferTrusted, |
1439 » » PRBool preferTrusted, PRTime validTime, PRBool validOnly); | 1368 PRTime validTime, PRBool validOnly); |
1440 | 1369 |
1441 /* | 1370 /* |
1442 * Acquire the global lock on the cert database. | 1371 * Acquire the global lock on the cert database. |
1443 * This lock is currently used for the following operations: | 1372 * This lock is currently used for the following operations: |
1444 * adding or deleting a cert to either the temp or perm databases | 1373 * adding or deleting a cert to either the temp or perm databases |
1445 * converting a temp to perm or perm to temp | 1374 * converting a temp to perm or perm to temp |
1446 * changing(maybe just adding?) the trust of a cert | 1375 * changing(maybe just adding?) the trust of a cert |
1447 * adjusting the reference count of a cert | 1376 * adjusting the reference count of a cert |
1448 */ | 1377 */ |
1449 void | 1378 void CERT_LockDB(CERTCertDBHandle *handle); |
1450 CERT_LockDB(CERTCertDBHandle *handle); | |
1451 | 1379 |
1452 /* | 1380 /* |
1453 * Free the global cert database lock. | 1381 * Free the global cert database lock. |
1454 */ | 1382 */ |
1455 void | 1383 void CERT_UnlockDB(CERTCertDBHandle *handle); |
1456 CERT_UnlockDB(CERTCertDBHandle *handle); | |
1457 | 1384 |
1458 /* | 1385 /* |
1459 * Get the certificate status checking configuratino data for | 1386 * Get the certificate status checking configuratino data for |
1460 * the certificate database | 1387 * the certificate database |
1461 */ | 1388 */ |
1462 CERTStatusConfig * | 1389 CERTStatusConfig *CERT_GetStatusConfig(CERTCertDBHandle *handle); |
1463 CERT_GetStatusConfig(CERTCertDBHandle *handle); | |
1464 | 1390 |
1465 /* | 1391 /* |
1466 * Set the certificate status checking information for the | 1392 * Set the certificate status checking information for the |
1467 * database. The input structure becomes part of the certificate | 1393 * database. The input structure becomes part of the certificate |
1468 * database and will be freed by calling the 'Destroy' function in | 1394 * database and will be freed by calling the 'Destroy' function in |
1469 * the configuration object. | 1395 * the configuration object. |
1470 */ | 1396 */ |
1471 void | 1397 void CERT_SetStatusConfig(CERTCertDBHandle *handle, CERTStatusConfig *config); |
1472 CERT_SetStatusConfig(CERTCertDBHandle *handle, CERTStatusConfig *config); | |
1473 | |
1474 | |
1475 | 1398 |
1476 /* | 1399 /* |
1477 * Acquire the cert reference count lock | 1400 * Acquire the cert reference count lock |
1478 * There is currently one global lock for all certs, but I'm putting a cert | 1401 * There is currently one global lock for all certs, but I'm putting a cert |
1479 * arg here so that it will be easy to make it per-cert in the future if | 1402 * arg here so that it will be easy to make it per-cert in the future if |
1480 * that turns out to be necessary. | 1403 * that turns out to be necessary. |
1481 */ | 1404 */ |
1482 void | 1405 void CERT_LockCertRefCount(CERTCertificate *cert); |
1483 CERT_LockCertRefCount(CERTCertificate *cert); | |
1484 | 1406 |
1485 /* | 1407 /* |
1486 * Free the cert reference count lock | 1408 * Free the cert reference count lock |
1487 */ | 1409 */ |
1488 void | 1410 void CERT_UnlockCertRefCount(CERTCertificate *cert); |
1489 CERT_UnlockCertRefCount(CERTCertificate *cert); | |
1490 | 1411 |
1491 /* | 1412 /* |
1492 * Acquire the cert trust lock | 1413 * Acquire the cert trust lock |
1493 * There is currently one global lock for all certs, but I'm putting a cert | 1414 * There is currently one global lock for all certs, but I'm putting a cert |
1494 * arg here so that it will be easy to make it per-cert in the future if | 1415 * arg here so that it will be easy to make it per-cert in the future if |
1495 * that turns out to be necessary. | 1416 * that turns out to be necessary. |
1496 */ | 1417 */ |
1497 void | 1418 void CERT_LockCertTrust(const CERTCertificate *cert); |
1498 CERT_LockCertTrust(const CERTCertificate *cert); | |
1499 | 1419 |
1500 /* | 1420 /* |
1501 * Free the cert trust lock | 1421 * Free the cert trust lock |
1502 */ | 1422 */ |
1503 void | 1423 void CERT_UnlockCertTrust(const CERTCertificate *cert); |
1504 CERT_UnlockCertTrust(const CERTCertificate *cert); | |
1505 | 1424 |
1506 /* | 1425 /* |
1507 * Digest the cert's subject public key using the specified algorithm. | 1426 * Digest the cert's subject public key using the specified algorithm. |
1508 * NOTE: this digests the value of the BIT STRING subjectPublicKey (excluding | 1427 * NOTE: this digests the value of the BIT STRING subjectPublicKey (excluding |
1509 * the tag, length, and number of unused bits) rather than the whole | 1428 * the tag, length, and number of unused bits) rather than the whole |
1510 * subjectPublicKeyInfo field. | 1429 * subjectPublicKeyInfo field. |
1511 * | 1430 * |
1512 * The necessary storage for the digest data is allocated. If "fill" is | 1431 * The necessary storage for the digest data is allocated. If "fill" is |
1513 * non-null, the data is put there, otherwise a SECItem is allocated. | 1432 * non-null, the data is put there, otherwise a SECItem is allocated. |
1514 * Allocation from "arena" if it is non-null, heap otherwise. Any problem | 1433 * Allocation from "arena" if it is non-null, heap otherwise. Any problem |
1515 * results in a NULL being returned (and an appropriate error set). | 1434 * results in a NULL being returned (and an appropriate error set). |
1516 */ | 1435 */ |
1517 extern SECItem * | 1436 extern SECItem *CERT_GetSubjectPublicKeyDigest(PLArenaPool *arena, |
1518 CERT_GetSubjectPublicKeyDigest(PLArenaPool *arena, const CERTCertificate *cert, | 1437 const CERTCertificate *cert, |
1519 SECOidTag digestAlg, SECItem *fill); | 1438 SECOidTag digestAlg, |
| 1439 SECItem *fill); |
1520 | 1440 |
1521 /* | 1441 /* |
1522 * Digest the cert's subject name using the specified algorithm. | 1442 * Digest the cert's subject name using the specified algorithm. |
1523 */ | 1443 */ |
1524 extern SECItem * | 1444 extern SECItem *CERT_GetSubjectNameDigest(PLArenaPool *arena, |
1525 CERT_GetSubjectNameDigest(PLArenaPool *arena, const CERTCertificate *cert, | 1445 const CERTCertificate *cert, |
1526 SECOidTag digestAlg, SECItem *fill); | 1446 SECOidTag digestAlg, SECItem *fill); |
1527 | 1447 |
1528 SECStatus CERT_CheckCRL(CERTCertificate* cert, CERTCertificate* issuer, | 1448 SECStatus CERT_CheckCRL(CERTCertificate *cert, CERTCertificate *issuer, |
1529 const SECItem* dp, PRTime t, void* wincx); | 1449 const SECItem *dp, PRTime t, void *wincx); |
1530 | |
1531 | 1450 |
1532 /* | 1451 /* |
1533 * Add a CERTNameConstraint to the CERTNameConstraint list | 1452 * Add a CERTNameConstraint to the CERTNameConstraint list |
1534 */ | 1453 */ |
1535 extern CERTNameConstraint * | 1454 extern CERTNameConstraint *CERT_AddNameConstraint( |
1536 CERT_AddNameConstraint(CERTNameConstraint *list, | 1455 CERTNameConstraint *list, CERTNameConstraint *constraint); |
1537 » » CERTNameConstraint *constraint); | |
1538 | 1456 |
1539 /* | 1457 /* |
1540 * Allocate space and copy CERTNameConstraint from src to dest. | 1458 * Allocate space and copy CERTNameConstraint from src to dest. |
1541 * Arena is used to allocate result(if dest eq NULL) and its members | 1459 * Arena is used to allocate result(if dest eq NULL) and its members |
1542 * SECItem data. | 1460 * SECItem data. |
1543 */ | 1461 */ |
1544 extern CERTNameConstraint * | 1462 extern CERTNameConstraint *CERT_CopyNameConstraint(PLArenaPool *arena, |
1545 CERT_CopyNameConstraint(PLArenaPool *arena, | 1463 CERTNameConstraint *dest, |
1546 » » » CERTNameConstraint *dest, | 1464 CERTNameConstraint *src); |
1547 » » » CERTNameConstraint *src); | |
1548 | 1465 |
1549 /* | 1466 /* |
1550 * Verify name against all the constraints relevant to that type of | 1467 * Verify name against all the constraints relevant to that type of |
1551 * the name. | 1468 * the name. |
1552 */ | 1469 */ |
1553 extern SECStatus | 1470 extern SECStatus CERT_CheckNameSpace(PLArenaPool *arena, |
1554 CERT_CheckNameSpace(PLArenaPool *arena, | 1471 const CERTNameConstraints *constraints, |
1555 » » const CERTNameConstraints *constraints, | 1472 const CERTGeneralName *currentName); |
1556 » » const CERTGeneralName *currentName); | |
1557 | 1473 |
1558 /* | 1474 /* |
1559 * Extract and allocate the name constraints extension from the CA cert. | 1475 * Extract and allocate the name constraints extension from the CA cert. |
1560 * If the certificate contains no name constraints extension, but | 1476 * If the certificate contains no name constraints extension, but |
1561 * CERT_GetImposedNameConstraints returns a name constraints extension | 1477 * CERT_GetImposedNameConstraints returns a name constraints extension |
1562 * for the subject of the certificate, then that extension will be returned. | 1478 * for the subject of the certificate, then that extension will be returned. |
1563 */ | 1479 */ |
1564 extern SECStatus | 1480 extern SECStatus CERT_FindNameConstraintsExten( |
1565 CERT_FindNameConstraintsExten(PLArenaPool *arena, | 1481 PLArenaPool *arena, CERTCertificate *cert, |
1566 » » » CERTCertificate *cert, | 1482 CERTNameConstraints **constraints); |
1567 » » » CERTNameConstraints **constraints); | |
1568 | 1483 |
1569 /* | 1484 /* |
1570 * Initialize a new GERTGeneralName fields (link) | 1485 * Initialize a new GERTGeneralName fields (link) |
1571 */ | 1486 */ |
1572 extern CERTGeneralName * | 1487 extern CERTGeneralName *CERT_NewGeneralName(PLArenaPool *arena, |
1573 CERT_NewGeneralName(PLArenaPool *arena, CERTGeneralNameType type); | 1488 CERTGeneralNameType type); |
1574 | 1489 |
1575 /* | 1490 /* |
1576 * Lookup a CERTGeneralNameType constant by its human readable string. | 1491 * Lookup a CERTGeneralNameType constant by its human readable string. |
1577 */ | 1492 */ |
1578 extern CERTGeneralNameType | 1493 extern CERTGeneralNameType CERT_GetGeneralNameTypeFromString( |
1579 CERT_GetGeneralNameTypeFromString(const char *string); | 1494 const char *string); |
1580 | 1495 |
1581 /* | 1496 /* |
1582 * PKIX extension encoding routines | 1497 * PKIX extension encoding routines |
1583 */ | 1498 */ |
1584 extern SECStatus | 1499 extern SECStatus CERT_EncodePolicyConstraintsExtension( |
1585 CERT_EncodePolicyConstraintsExtension(PLArenaPool *arena, | 1500 PLArenaPool *arena, CERTCertificatePolicyConstraints *constr, |
1586 CERTCertificatePolicyConstraints *constr, | 1501 SECItem *dest); |
1587 SECItem *dest); | 1502 extern SECStatus CERT_EncodeInhibitAnyExtension( |
1588 extern SECStatus | 1503 PLArenaPool *arena, CERTCertificateInhibitAny *inhibitAny, SECItem *dest); |
1589 CERT_EncodeInhibitAnyExtension(PLArenaPool *arena, | 1504 extern SECStatus CERT_EncodePolicyMappingExtension( |
1590 CERTCertificateInhibitAny *inhibitAny, | 1505 PLArenaPool *arena, CERTCertificatePolicyMappings *maps, SECItem *dest); |
1591 SECItem *dest); | |
1592 extern SECStatus | |
1593 CERT_EncodePolicyMappingExtension(PLArenaPool *arena, | |
1594 CERTCertificatePolicyMappings *maps, | |
1595 SECItem *dest); | |
1596 | 1506 |
1597 extern SECStatus CERT_EncodeInfoAccessExtension(PLArenaPool *arena, | 1507 extern SECStatus CERT_EncodeInfoAccessExtension(PLArenaPool *arena, |
1598 CERTAuthInfoAccess **info, | 1508 CERTAuthInfoAccess **info, |
1599 SECItem *dest); | 1509 SECItem *dest); |
1600 extern SECStatus | 1510 extern SECStatus CERT_EncodeUserNotice(PLArenaPool *arena, |
1601 CERT_EncodeUserNotice(PLArenaPool *arena, | 1511 CERTUserNotice *notice, SECItem *dest); |
1602 CERTUserNotice *notice, | |
1603 SECItem *dest); | |
1604 | 1512 |
1605 extern SECStatus | 1513 extern SECStatus CERT_EncodeDisplayText(PLArenaPool *arena, SECItem *text, |
1606 CERT_EncodeDisplayText(PLArenaPool *arena, | 1514 SECItem *dest); |
1607 SECItem *text, | |
1608 SECItem *dest); | |
1609 | 1515 |
1610 extern SECStatus | 1516 extern SECStatus CERT_EncodeCertPoliciesExtension(PLArenaPool *arena, |
1611 CERT_EncodeCertPoliciesExtension(PLArenaPool *arena, | 1517 CERTPolicyInfo **info, |
1612 CERTPolicyInfo **info, | 1518 SECItem *dest); |
1613 SECItem *dest); | 1519 extern SECStatus CERT_EncodeNoticeReference(PLArenaPool *arena, |
1614 extern SECStatus | 1520 CERTNoticeReference *reference, |
1615 CERT_EncodeNoticeReference(PLArenaPool *arena, | 1521 SECItem *dest); |
1616 CERTNoticeReference *reference, | |
1617 SECItem *dest); | |
1618 | 1522 |
1619 /* | 1523 /* |
1620 * Returns a pointer to a static structure. | 1524 * Returns a pointer to a static structure. |
1621 */ | 1525 */ |
1622 extern const CERTRevocationFlags* | 1526 extern const CERTRevocationFlags *CERT_GetPKIXVerifyNistRevocationPolicy(void); |
1623 CERT_GetPKIXVerifyNistRevocationPolicy(void); | |
1624 | 1527 |
1625 /* | 1528 /* |
1626 * Returns a pointer to a static structure. | 1529 * Returns a pointer to a static structure. |
1627 */ | 1530 */ |
1628 extern const CERTRevocationFlags* | 1531 extern const CERTRevocationFlags *CERT_GetClassicOCSPEnabledSoftFailurePolicy( |
1629 CERT_GetClassicOCSPEnabledSoftFailurePolicy(void); | 1532 void); |
1630 | 1533 |
1631 /* | 1534 /* |
1632 * Returns a pointer to a static structure. | 1535 * Returns a pointer to a static structure. |
1633 */ | 1536 */ |
1634 extern const CERTRevocationFlags* | 1537 extern const CERTRevocationFlags *CERT_GetClassicOCSPEnabledHardFailurePolicy( |
1635 CERT_GetClassicOCSPEnabledHardFailurePolicy(void); | 1538 void); |
1636 | 1539 |
1637 /* | 1540 /* |
1638 * Returns a pointer to a static structure. | 1541 * Returns a pointer to a static structure. |
1639 */ | 1542 */ |
1640 extern const CERTRevocationFlags* | 1543 extern const CERTRevocationFlags *CERT_GetClassicOCSPDisabledPolicy(void); |
1641 CERT_GetClassicOCSPDisabledPolicy(void); | |
1642 | 1544 |
1643 /* | 1545 /* |
1644 * Verify a Cert with libpkix | 1546 * Verify a Cert with libpkix |
1645 * paramsIn control the verification options. If a value isn't specified | 1547 * paramsIn control the verification options. If a value isn't specified |
1646 * in paramsIn, it reverts to the application default. | 1548 * in paramsIn, it reverts to the application default. |
1647 * paramsOut specifies the parameters the caller would like to get back. | 1549 * paramsOut specifies the parameters the caller would like to get back. |
1648 * the caller may pass NULL, in which case no parameters are returned. | 1550 * the caller may pass NULL, in which case no parameters are returned. |
1649 */ | 1551 */ |
1650 extern SECStatus CERT_PKIXVerifyCert( | 1552 extern SECStatus CERT_PKIXVerifyCert(CERTCertificate *cert, |
1651 » CERTCertificate *cert, | 1553 SECCertificateUsage usages, |
1652 » SECCertificateUsage usages, | 1554 CERTValInParam *paramsIn, |
1653 » CERTValInParam *paramsIn, | 1555 CERTValOutParam *paramsOut, void *wincx); |
1654 » CERTValOutParam *paramsOut, | |
1655 » void *wincx); | |
1656 | 1556 |
1657 /* Makes old cert validation APIs(CERT_VerifyCert, CERT_VerifyCertificate) | 1557 /* Makes old cert validation APIs(CERT_VerifyCert, CERT_VerifyCertificate) |
1658 * to use libpkix validation engine. The function should be called ones at | 1558 * to use libpkix validation engine. The function should be called ones at |
1659 * application initialization time. | 1559 * application initialization time. |
1660 * Function is not thread safe.*/ | 1560 * Function is not thread safe.*/ |
1661 extern SECStatus CERT_SetUsePKIXForValidation(PRBool enable); | 1561 extern SECStatus CERT_SetUsePKIXForValidation(PRBool enable); |
1662 | 1562 |
1663 /* The function return PR_TRUE if cert validation should use | 1563 /* The function return PR_TRUE if cert validation should use |
1664 * libpkix cert validation engine. */ | 1564 * libpkix cert validation engine. */ |
1665 extern PRBool CERT_GetUsePKIXForValidation(void); | 1565 extern PRBool CERT_GetUsePKIXForValidation(void); |
1666 | 1566 |
1667 /* | 1567 /* |
1668 * Allocate a parameter container of type CERTRevocationFlags, | 1568 * Allocate a parameter container of type CERTRevocationFlags, |
1669 * and allocate the inner arrays of the given sizes. | 1569 * and allocate the inner arrays of the given sizes. |
1670 * To cleanup call CERT_DestroyCERTRevocationFlags. | 1570 * To cleanup call CERT_DestroyCERTRevocationFlags. |
1671 */ | 1571 */ |
1672 extern CERTRevocationFlags * | 1572 extern CERTRevocationFlags *CERT_AllocCERTRevocationFlags( |
1673 CERT_AllocCERTRevocationFlags( | |
1674 PRUint32 number_leaf_methods, PRUint32 number_leaf_pref_methods, | 1573 PRUint32 number_leaf_methods, PRUint32 number_leaf_pref_methods, |
1675 PRUint32 number_chain_methods, PRUint32 number_chain_pref_methods); | 1574 PRUint32 number_chain_methods, PRUint32 number_chain_pref_methods); |
1676 | 1575 |
1677 /* | 1576 /* |
1678 * Destroy the arrays inside flags, | 1577 * Destroy the arrays inside flags, |
1679 * and destroy the object pointed to by flags, too. | 1578 * and destroy the object pointed to by flags, too. |
1680 */ | 1579 */ |
1681 extern void | 1580 extern void CERT_DestroyCERTRevocationFlags(CERTRevocationFlags *flags); |
1682 CERT_DestroyCERTRevocationFlags(CERTRevocationFlags *flags); | |
1683 | 1581 |
1684 SEC_END_PROTOS | 1582 SEC_END_PROTOS |
1685 | 1583 |
1686 #endif /* _CERT_H_ */ | 1584 #endif /* _CERT_H_ */ |
OLD | NEW |