Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(450)

Side by Side Diff: nss/lib/libpkix/include/pkix_checker.h

Issue 2078763002: Delete bundled copy of NSS and replace with README. (Closed) Base URL: https://chromium.googlesource.com/chromium/deps/nss@master
Patch Set: Delete bundled copy of NSS and replace with README. Created 4 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « nss/lib/libpkix/include/pkix_certstore.h ('k') | nss/lib/libpkix/include/pkix_crlsel.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
4 /*
5 * This file defines functions associated with the PKIX_CertChainChecker type.
6 *
7 */
8
9 #ifndef _PKIX_CHECKER_H
10 #define _PKIX_CHECKER_H
11
12 #include "pkixt.h"
13
14 #ifdef __cplusplus
15 extern "C" {
16 #endif
17
18 /* General
19 *
20 * Please refer to the libpkix Programmer's Guide for detailed information
21 * about how to use the libpkix library. Certain key warnings and notices from
22 * that document are repeated here for emphasis.
23 *
24 * All identifiers in this file (and all public identifiers defined in
25 * libpkix) begin with "PKIX_". Private identifiers only intended for use
26 * within the library begin with "pkix_".
27 *
28 * A function returns NULL upon success, and a PKIX_Error pointer upon failure.
29 *
30 * Unless otherwise noted, for all accessor (gettor) functions that return a
31 * PKIX_PL_Object pointer, callers should assume that this pointer refers to a
32 * shared object. Therefore, the caller should treat this shared object as
33 * read-only and should not modify this shared object. When done using the
34 * shared object, the caller should release the reference to the object by
35 * using the PKIX_PL_Object_DecRef function.
36 *
37 * While a function is executing, if its arguments (or anything referred to by
38 * its arguments) are modified, free'd, or destroyed, the function's behavior
39 * is undefined.
40 *
41 */
42
43 /* PKIX_CertChainChecker
44 *
45 * PKIX_CertChainCheckers provide a standard way for the caller to insert their
46 * own custom checks to validate certificates. This may be useful in many
47 * scenarios, including when the caller wishes to validate private certificate
48 * extensions. The CheckCallback allows custom certificate processing to take
49 * place. Additionally, a CertChainChecker can optionally maintain state
50 * between successive calls to the CheckCallback. This certChainCheckerState
51 * must be an Object (although any object type), allowing it to be
52 * reference-counted and allowing it to provide the standard Object functions
53 * (Equals, Hashcode, ToString, Compare, Duplicate). If the caller wishes
54 * their CertChainChecker to be used during chain building, their
55 * certChainCheckerState object must implement an appropriate Duplicate
56 * function. The builder uses this Duplicate function when backtracking.
57 *
58 * Once the caller has created a CertChainChecker object, the caller then
59 * specifies a CertChainChecker object in a ProcessingParams object
60 * and passes the ProcessingParams object to PKIX_ValidateChain or
61 * PKIX_BuildChain, which uses the objects to call the user's callback
62 * functions as needed during the validation or building process.
63 *
64 * A CertChainChecker may be presented certificates in the "reverse" direction
65 * (from trust anchor to target) or in the "forward" direction (from target to
66 * trust anchor). All CertChainCheckers must support "reverse checking", while
67 * support for "forward checking" is optional, but recommended. If "forward
68 * checking" is not supported, building chains may be much less efficient. The
69 * PKIX_CertChainChecker_IsForwardCheckingSupported function is used to
70 * determine whether forward checking is supported, and the
71 * PKIX_CertChainChecker_IsForwardDirectionExpected function is used to
72 * determine whether the CertChainChecker has been initialized to expect the
73 * certificates to be presented in the "forward" direction.
74 */
75
76 /*
77 * FUNCTION: PKIX_CertChainChecker_CheckCallback
78 * DESCRIPTION:
79 *
80 * This callback function checks whether the specified Cert pointed to by
81 * "cert" is valid using "checker's" internal certChainCheckerState (if any)
82 * and removes the critical extensions that it processes (if any) from the
83 * List of OIDs (possibly empty) pointed to by "unresolvedCriticalExtensions".
84 * If the checker finds that the certificate is not valid, an Error pointer is
85 * returned.
86 *
87 * If the checker uses non-blocking I/O, the address of a platform-dependent
88 * non-blocking I/O context ("nbioContext") will be stored at "pNBIOContext",
89 * which the caller may use, in a platform-dependent way, to wait, poll, or
90 * otherwise determine when to try again. If the checker does not use
91 * non-blocking I/O, NULL will always be stored at "pNBIOContext". If a non-NUL L
92 * value was stored, on a subsequent call the checker will attempt to complete
93 * the pending I/O and, if successful, NULL will be stored at "pNBIOContext".
94 *
95 * PARAMETERS:
96 * "checker"
97 * Address of CertChainChecker whose certChainCheckerState and
98 * CheckCallback logic is to be used. Must be non-NULL.
99 * "cert"
100 * Address of Cert that is to be validated using "checker".
101 * Must be non-NULL.
102 * "unresolvedCriticalExtensions"
103 * Address of List of OIDs that represents the critical certificate
104 * extensions that have yet to be resolved. This parameter may be
105 * modified during the function call. Must be non-NULL.
106 * "pNBIOContext"
107 * Address at which is stored a platform-dependent structure indicating
108 * whether checking was suspended for non-blocking I/O. Must be non-NULL.
109 * "plContext"
110 * Platform-specific context pointer.
111 * THREAD SAFETY:
112 * Thread Safe
113 *
114 * Multiple threads must be able to safely call this function without
115 * worrying about conflicts, even if they're operating on the same object.
116 * RETURNS:
117 * Returns NULL if the function succeeds.
118 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
119 * Returns a Fatal Error if the function fails in an unrecoverable way.
120 */
121 typedef PKIX_Error *
122 (*PKIX_CertChainChecker_CheckCallback)(
123 PKIX_CertChainChecker *checker,
124 PKIX_PL_Cert *cert,
125 PKIX_List *unresolvedCriticalExtensions, /* list of PKIX_PL_OID */
126 void **pNBIOContext,
127 void *plContext);
128
129 /*
130 * FUNCTION: PKIX_CertChainChecker_Create
131 * DESCRIPTION:
132 *
133 * Creates a new CertChainChecker and stores it at "pChecker". The new
134 * CertChainChecker uses the CheckCallback pointed to by "callback" as its
135 * callback function. It uses the Object pointed to by "initialState" (if
136 * any) as its initial state. As noted above, the initial state Object must
137 * provide a custom implementation of PKIX_PL_Object_Duplicate if the
138 * CertChainChecker is to be used during certificate chain building.
139 *
140 * A CertChainChecker may be presented certificates in the "reverse"
141 * direction (from trust anchor to target) or in the "forward" direction
142 * (from target to trust anchor). All CertChainCheckers must support
143 * "reverse checking", while support for "forward checking" is optional. The
144 * CertChainChecker is initialized with two Boolean flags that deal with this
145 * distinction: "forwardCheckingSupported" and "forwardDirectionExpected".
146 * If the "forwardCheckingSupported" Boolean flag is TRUE, it indicates that
147 * this CertChainChecker is capable of checking certificates in the "forward"
148 * direction (as well as the "reverse" direction, which all CertChainCheckers
149 * MUST support). The "forwardDirectionExpected" Boolean flag indicates in
150 * which direction the CertChainChecker should expect the certificates to be
151 * presented. This is particularly useful for CertChainCheckers that are
152 * capable of checking in either the "forward" direction or the "reverse"
153 * direction, but have different processing steps depending on the direction.
154 *
155 * The CertChainChecker also uses the List of OIDs pointed to by "extensions"
156 * as the supported certificate extensions. All certificate extensions that
157 * the CertChainChecker might possibly recognize and be able to process
158 * should be included in the List of supported extensions. If "checker" does
159 * not recognize or process any certificate extensions, "extensions" should
160 * be set to NULL.
161 *
162 * PARAMETERS:
163 * "callback"
164 * The CheckCallback function to be used. Must be non-NULL.
165 * "forwardCheckingSupported"
166 * A Boolean value indicating whether or not this CertChainChecker is
167 * capable of checking certificates in the "forward" direction.
168 * "forwardDirectionExpected"
169 * A Boolean value indicating whether or not this CertChainChecker should
170 * be used to check in the "forward" direction.
171 * "extensions"
172 * Address of List of OIDs representing the supported extensions.
173 * "initialState"
174 * Address of Object representing the CertChainChecker's initial state
175 * (if any).
176 * "pChecker"
177 * Address where object pointer will be stored. Must be non-NULL.
178 * "plContext"
179 * Platform-specific context pointer.
180 * THREAD SAFETY:
181 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
182 * RETURNS:
183 * Returns NULL if the function succeeds.
184 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
185 * Returns a Fatal Error if the function fails in an unrecoverable way.
186 */
187 PKIX_Error *
188 PKIX_CertChainChecker_Create(
189 PKIX_CertChainChecker_CheckCallback callback,
190 PKIX_Boolean forwardCheckingSupported,
191 PKIX_Boolean forwardDirectionExpected,
192 PKIX_List *extensions, /* list of PKIX_PL_OID */
193 PKIX_PL_Object *initialState,
194 PKIX_CertChainChecker **pChecker,
195 void *plContext);
196
197 /*
198 * FUNCTION: PKIX_CertChainChecker_GetCheckCallback
199 * DESCRIPTION:
200 *
201 * Retrieves a pointer to "checker's" Check callback function and puts it in
202 * "pCallback".
203 *
204 * PARAMETERS:
205 * "checker"
206 * The CertChainChecker whose Check callback is desired. Must be non-NULL.
207 * "pCallback"
208 * Address where Check callback function pointer will be stored.
209 * Must be non-NULL.
210 * "plContext"
211 * Platform-specific context pointer.
212 * THREAD SAFETY:
213 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
214 * RETURNS:
215 * Returns NULL if the function succeeds.
216 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
217 * Returns a Fatal Error if the function fails in an unrecoverable way.
218 */
219 PKIX_Error *
220 PKIX_CertChainChecker_GetCheckCallback(
221 PKIX_CertChainChecker *checker,
222 PKIX_CertChainChecker_CheckCallback *pCallback,
223 void *plContext);
224
225 /*
226 * FUNCTION: PKIX_CertChainChecker_IsForwardCheckingSupported
227 * DESCRIPTION:
228 *
229 * Checks whether forward checking is supported by the CertChainChecker
230 * pointed to by "checker" and stores the Boolean result at
231 * "pForwardCheckingSupported".
232 *
233 * A CertChainChecker may be presented certificates in the "reverse"
234 * direction (from trust anchor to target) or in the "forward" direction
235 * (from target to trust anchor). All CertChainCheckers must support
236 * "reverse checking", while support for "forward checking" is optional. This
237 * function is used to determine whether forward checking is supported.
238 *
239 * PARAMETERS:
240 * "checker"
241 * The CertChainChecker whose ability to validate certificates in the
242 * "forward" direction is to be checked. Must be non-NULL.
243 * "pForwardCheckingSupported"
244 * Destination of the Boolean result. Must be non-NULL.
245 * "plContext"
246 * Platform-specific context pointer.
247 * THREAD SAFETY:
248 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
249 * RETURNS:
250 * Returns NULL if the function succeeds.
251 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
252 * Returns a Fatal Error if the function fails in an unrecoverable way.
253 */
254 PKIX_Error *
255 PKIX_CertChainChecker_IsForwardCheckingSupported(
256 PKIX_CertChainChecker *checker,
257 PKIX_Boolean *pForwardCheckingSupported,
258 void *plContext);
259
260 /*
261 * FUNCTION: PKIX_CertChainChecker_IsForwardDirectionExpected
262 * DESCRIPTION:
263 *
264 * Checks whether the CertChainChecker pointed to by "checker" has been
265 * initialized to expect the certificates to be presented in the "forward"
266 * direction and stores the Boolean result at "pForwardDirectionExpected".
267 *
268 * A CertChainChecker may be presented certificates in the "reverse"
269 * direction (from trust anchor to target) or in the "forward" direction
270 * (from target to trust anchor). All CertChainCheckers must support
271 * "reverse checking", while support for "forward checking" is optional. This
272 * function is used to determine in which direction the CertChainChecker
273 * expects the certificates to be presented.
274 *
275 * PARAMETERS:
276 * "checker"
277 * The CertChainChecker that has been initialized to expect certificates
278 * in either the "forward" or "reverse" directions. Must be non-NULL.
279 * "pForwardDirectionExpected"
280 * Destination of the Boolean result. Must be non-NULL.
281 * "plContext"
282 * Platform-specific context pointer.
283 * THREAD SAFETY:
284 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
285 * RETURNS:
286 * Returns NULL if the function succeeds.
287 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
288 * Returns a Fatal Error if the function fails in an unrecoverable way.
289 */
290 PKIX_Error *
291 PKIX_CertChainChecker_IsForwardDirectionExpected(
292 PKIX_CertChainChecker *checker,
293 PKIX_Boolean *pForwardDirectionExpected,
294 void *plContext);
295
296 /*
297 * FUNCTION: PKIX_CertChainChecker_GetSupportedExtensions
298 * DESCRIPTION:
299 *
300 * Retrieves a pointer to a List of OIDs (each OID corresponding to a
301 * certificate extension supported by the CertChainChecker pointed to by
302 * "checker") and stores it at "pExtensions". All certificate extensions that
303 * the CertChainChecker might possibly recognize and be able to process
304 * should be included in the List of supported extensions. If "checker" does
305 * not recognize or process any certificate extensions, this function stores
306 * NULL at "pExtensions".
307 *
308 * Note that the List returned by this function is immutable.
309 *
310 * PARAMETERS:
311 * "checker"
312 * Address of CertChainChecker whose supported extension OIDs are to be
313 * stored. Must be non-NULL.
314 * "pExtensions"
315 * Address where object pointer will be stored. Must be non-NULL.
316 * "plContext"
317 * Platform-specific context pointer.
318 * THREAD SAFETY:
319 * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
320 * RETURNS:
321 * Returns NULL if the function succeeds.
322 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
323 * Returns a Fatal Error if the function fails in an unrecoverable way.
324 */
325 PKIX_Error *
326 PKIX_CertChainChecker_GetSupportedExtensions(
327 PKIX_CertChainChecker *checker,
328 PKIX_List **pExtensions, /* list of PKIX_PL_OID */
329 void *plContext);
330
331 /*
332 * FUNCTION: PKIX_CertChainChecker_GetCertChainCheckerState
333 * DESCRIPTION:
334 *
335 * Retrieves a pointer to a PKIX_PL_Object representing the internal state
336 * (if any) of the CertChainChecker pointed to by "checker" and stores it at
337 * "pCertChainCheckerState".
338 *
339 * PARAMETERS:
340 * "checker"
341 * Address of CertChainChecker whose state is to be stored.
342 * Must be non-NULL.
343 * "pCertChainCheckerState"
344 * Address where object pointer will be stored. Must be non-NULL.
345 * "plContext"
346 * Platform-specific context pointer.
347 * THREAD SAFETY:
348 * Conditionally Thread Safe
349 * (see Thread Safety Definitions in Programmer's Guide)
350 * RETURNS:
351 * Returns NULL if the function succeeds.
352 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
353 * Returns a Fatal Error if the function fails in an unrecoverable way.
354 */
355 PKIX_Error *
356 PKIX_CertChainChecker_GetCertChainCheckerState(
357 PKIX_CertChainChecker *checker,
358 PKIX_PL_Object **pCertChainCheckerState,
359 void *plContext);
360
361 /*
362 * FUNCTION: PKIX_CertChainChecker_SetCertChainCheckerState
363 * DESCRIPTION:
364 *
365 * Sets the internal state of the CertChainChecker pointed to by "checker"
366 * using the Object pointed to by "certChainCheckerState". If "checker" needs
367 * a NULL internal state, "certChainCheckerState" should be set to NULL.
368 *
369 * PARAMETERS:
370 * "checker"
371 * Address of CertChainChecker whose state is to be set. Must be non-NULL.
372 * "certChainCheckerState"
373 * Address of Object representing internal state.
374 * "plContext"
375 * Platform-specific context pointer.
376 * THREAD SAFETY:
377 * Not Thread Safe - assumes exclusive access to "checker"
378 * (see Thread Safety Definitions in Programmer's Guide)
379 * RETURNS:
380 * Returns NULL if the function succeeds.
381 * Returns a CertChainChecker Error if the function fails in a non-fatal way.
382 * Returns a Fatal Error if the function fails in an unrecoverable way.
383 */
384 PKIX_Error *
385 PKIX_CertChainChecker_SetCertChainCheckerState(
386 PKIX_CertChainChecker *checker,
387 PKIX_PL_Object *certChainCheckerState,
388 void *plContext);
389
390 #ifdef __cplusplus
391 }
392 #endif
393
394 #endif /* _PKIX_CHECKER_H */
OLDNEW
« no previous file with comments | « nss/lib/libpkix/include/pkix_certstore.h ('k') | nss/lib/libpkix/include/pkix_crlsel.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698