| Index: nss/mozilla/security/nss/lib/libpkix/include/pkix_checker.h
|
| ===================================================================
|
| --- nss/mozilla/security/nss/lib/libpkix/include/pkix_checker.h (revision 0)
|
| +++ nss/mozilla/security/nss/lib/libpkix/include/pkix_checker.h (revision 0)
|
| @@ -0,0 +1,427 @@
|
| +/* ***** BEGIN LICENSE BLOCK *****
|
| + * Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
| + *
|
| + * The contents of this file are subject to the Mozilla Public License Version
|
| + * 1.1 (the "License"); you may not use this file except in compliance with
|
| + * the License. You may obtain a copy of the License at
|
| + * http://www.mozilla.org/MPL/
|
| + *
|
| + * Software distributed under the License is distributed on an "AS IS" basis,
|
| + * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
| + * for the specific language governing rights and limitations under the
|
| + * License.
|
| + *
|
| + * The Original Code is the PKIX-C library.
|
| + *
|
| + * The Initial Developer of the Original Code is
|
| + * Sun Microsystems, Inc.
|
| + * Portions created by the Initial Developer are
|
| + * Copyright 2004-2007 Sun Microsystems, Inc. All Rights Reserved.
|
| + *
|
| + * Contributor(s):
|
| + * Sun Microsystems, Inc.
|
| + *
|
| + * Alternatively, the contents of this file may be used under the terms of
|
| + * either the GNU General Public License Version 2 or later (the "GPL"), or
|
| + * the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
| + * in which case the provisions of the GPL or the LGPL are applicable instead
|
| + * of those above. If you wish to allow use of your version of this file only
|
| + * under the terms of either the GPL or the LGPL, and not to allow others to
|
| + * use your version of this file under the terms of the MPL, indicate your
|
| + * decision by deleting the provisions above and replace them with the notice
|
| + * and other provisions required by the GPL or the LGPL. If you do not delete
|
| + * the provisions above, a recipient may use your version of this file under
|
| + * the terms of any one of the MPL, the GPL or the LGPL.
|
| + *
|
| + * ***** END LICENSE BLOCK ***** */
|
| +/*
|
| + * This file defines functions associated with the PKIX_CertChainChecker type.
|
| + *
|
| + */
|
| +
|
| +#ifndef _PKIX_CHECKER_H
|
| +#define _PKIX_CHECKER_H
|
| +
|
| +#include "pkixt.h"
|
| +
|
| +#ifdef __cplusplus
|
| +extern "C" {
|
| +#endif
|
| +
|
| +/* General
|
| + *
|
| + * Please refer to the libpkix Programmer's Guide for detailed information
|
| + * about how to use the libpkix library. Certain key warnings and notices from
|
| + * that document are repeated here for emphasis.
|
| + *
|
| + * All identifiers in this file (and all public identifiers defined in
|
| + * libpkix) begin with "PKIX_". Private identifiers only intended for use
|
| + * within the library begin with "pkix_".
|
| + *
|
| + * A function returns NULL upon success, and a PKIX_Error pointer upon failure.
|
| + *
|
| + * Unless otherwise noted, for all accessor (gettor) functions that return a
|
| + * PKIX_PL_Object pointer, callers should assume that this pointer refers to a
|
| + * shared object. Therefore, the caller should treat this shared object as
|
| + * read-only and should not modify this shared object. When done using the
|
| + * shared object, the caller should release the reference to the object by
|
| + * using the PKIX_PL_Object_DecRef function.
|
| + *
|
| + * While a function is executing, if its arguments (or anything referred to by
|
| + * its arguments) are modified, free'd, or destroyed, the function's behavior
|
| + * is undefined.
|
| + *
|
| + */
|
| +
|
| +/* PKIX_CertChainChecker
|
| + *
|
| + * PKIX_CertChainCheckers provide a standard way for the caller to insert their
|
| + * own custom checks to validate certificates. This may be useful in many
|
| + * scenarios, including when the caller wishes to validate private certificate
|
| + * extensions. The CheckCallback allows custom certificate processing to take
|
| + * place. Additionally, a CertChainChecker can optionally maintain state
|
| + * between successive calls to the CheckCallback. This certChainCheckerState
|
| + * must be an Object (although any object type), allowing it to be
|
| + * reference-counted and allowing it to provide the standard Object functions
|
| + * (Equals, Hashcode, ToString, Compare, Duplicate). If the caller wishes
|
| + * their CertChainChecker to be used during chain building, their
|
| + * certChainCheckerState object must implement an appropriate Duplicate
|
| + * function. The builder uses this Duplicate function when backtracking.
|
| + *
|
| + * Once the caller has created a CertChainChecker object, the caller then
|
| + * specifies a CertChainChecker object in a ProcessingParams object
|
| + * and passes the ProcessingParams object to PKIX_ValidateChain or
|
| + * PKIX_BuildChain, which uses the objects to call the user's callback
|
| + * functions as needed during the validation or building process.
|
| + *
|
| + * A CertChainChecker may be presented certificates in the "reverse" direction
|
| + * (from trust anchor to target) or in the "forward" direction (from target to
|
| + * trust anchor). All CertChainCheckers must support "reverse checking", while
|
| + * support for "forward checking" is optional, but recommended. If "forward
|
| + * checking" is not supported, building chains may be much less efficient. The
|
| + * PKIX_CertChainChecker_IsForwardCheckingSupported function is used to
|
| + * determine whether forward checking is supported, and the
|
| + * PKIX_CertChainChecker_IsForwardDirectionExpected function is used to
|
| + * determine whether the CertChainChecker has been initialized to expect the
|
| + * certificates to be presented in the "forward" direction.
|
| + */
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_CheckCallback
|
| + * DESCRIPTION:
|
| + *
|
| + * This callback function checks whether the specified Cert pointed to by
|
| + * "cert" is valid using "checker's" internal certChainCheckerState (if any)
|
| + * and removes the critical extensions that it processes (if any) from the
|
| + * List of OIDs (possibly empty) pointed to by "unresolvedCriticalExtensions".
|
| + * If the checker finds that the certificate is not valid, an Error pointer is
|
| + * returned.
|
| + *
|
| + * If the checker uses non-blocking I/O, the address of a platform-dependent
|
| + * non-blocking I/O context ("nbioContext") will be stored at "pNBIOContext",
|
| + * which the caller may use, in a platform-dependent way, to wait, poll, or
|
| + * otherwise determine when to try again. If the checker does not use
|
| + * non-blocking I/O, NULL will always be stored at "pNBIOContext". If a non-NULL
|
| + * value was stored, on a subsequent call the checker will attempt to complete
|
| + * the pending I/O and, if successful, NULL will be stored at "pNBIOContext".
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * Address of CertChainChecker whose certChainCheckerState and
|
| + * CheckCallback logic is to be used. Must be non-NULL.
|
| + * "cert"
|
| + * Address of Cert that is to be validated using "checker".
|
| + * Must be non-NULL.
|
| + * "unresolvedCriticalExtensions"
|
| + * Address of List of OIDs that represents the critical certificate
|
| + * extensions that have yet to be resolved. This parameter may be
|
| + * modified during the function call. Must be non-NULL.
|
| + * "pNBIOContext"
|
| + * Address at which is stored a platform-dependent structure indicating
|
| + * whether checking was suspended for non-blocking I/O. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe
|
| + *
|
| + * Multiple threads must be able to safely call this function without
|
| + * worrying about conflicts, even if they're operating on the same object.
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +typedef PKIX_Error *
|
| +(*PKIX_CertChainChecker_CheckCallback)(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_PL_Cert *cert,
|
| + PKIX_List *unresolvedCriticalExtensions, /* list of PKIX_PL_OID */
|
| + void **pNBIOContext,
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_Create
|
| + * DESCRIPTION:
|
| + *
|
| + * Creates a new CertChainChecker and stores it at "pChecker". The new
|
| + * CertChainChecker uses the CheckCallback pointed to by "callback" as its
|
| + * callback function. It uses the Object pointed to by "initialState" (if
|
| + * any) as its initial state. As noted above, the initial state Object must
|
| + * provide a custom implementation of PKIX_PL_Object_Duplicate if the
|
| + * CertChainChecker is to be used during certificate chain building.
|
| + *
|
| + * A CertChainChecker may be presented certificates in the "reverse"
|
| + * direction (from trust anchor to target) or in the "forward" direction
|
| + * (from target to trust anchor). All CertChainCheckers must support
|
| + * "reverse checking", while support for "forward checking" is optional. The
|
| + * CertChainChecker is initialized with two Boolean flags that deal with this
|
| + * distinction: "forwardCheckingSupported" and "forwardDirectionExpected".
|
| + * If the "forwardCheckingSupported" Boolean flag is TRUE, it indicates that
|
| + * this CertChainChecker is capable of checking certificates in the "forward"
|
| + * direction (as well as the "reverse" direction, which all CertChainCheckers
|
| + * MUST support). The "forwardDirectionExpected" Boolean flag indicates in
|
| + * which direction the CertChainChecker should expect the certificates to be
|
| + * presented. This is particularly useful for CertChainCheckers that are
|
| + * capable of checking in either the "forward" direction or the "reverse"
|
| + * direction, but have different processing steps depending on the direction.
|
| + *
|
| + * The CertChainChecker also uses the List of OIDs pointed to by "extensions"
|
| + * as the supported certificate extensions. All certificate extensions that
|
| + * the CertChainChecker might possibly recognize and be able to process
|
| + * should be included in the List of supported extensions. If "checker" does
|
| + * not recognize or process any certificate extensions, "extensions" should
|
| + * be set to NULL.
|
| + *
|
| + * PARAMETERS:
|
| + * "callback"
|
| + * The CheckCallback function to be used. Must be non-NULL.
|
| + * "forwardCheckingSupported"
|
| + * A Boolean value indicating whether or not this CertChainChecker is
|
| + * capable of checking certificates in the "forward" direction.
|
| + * "forwardDirectionExpected"
|
| + * A Boolean value indicating whether or not this CertChainChecker should
|
| + * be used to check in the "forward" direction.
|
| + * "extensions"
|
| + * Address of List of OIDs representing the supported extensions.
|
| + * "initialState"
|
| + * Address of Object representing the CertChainChecker's initial state
|
| + * (if any).
|
| + * "pChecker"
|
| + * Address where object pointer will be stored. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_Create(
|
| + PKIX_CertChainChecker_CheckCallback callback,
|
| + PKIX_Boolean forwardCheckingSupported,
|
| + PKIX_Boolean forwardDirectionExpected,
|
| + PKIX_List *extensions, /* list of PKIX_PL_OID */
|
| + PKIX_PL_Object *initialState,
|
| + PKIX_CertChainChecker **pChecker,
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_GetCheckCallback
|
| + * DESCRIPTION:
|
| + *
|
| + * Retrieves a pointer to "checker's" Check callback function and puts it in
|
| + * "pCallback".
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * The CertChainChecker whose Check callback is desired. Must be non-NULL.
|
| + * "pCallback"
|
| + * Address where Check callback function pointer will be stored.
|
| + * Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_GetCheckCallback(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_CertChainChecker_CheckCallback *pCallback,
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_IsForwardCheckingSupported
|
| + * DESCRIPTION:
|
| + *
|
| + * Checks whether forward checking is supported by the CertChainChecker
|
| + * pointed to by "checker" and stores the Boolean result at
|
| + * "pForwardCheckingSupported".
|
| + *
|
| + * A CertChainChecker may be presented certificates in the "reverse"
|
| + * direction (from trust anchor to target) or in the "forward" direction
|
| + * (from target to trust anchor). All CertChainCheckers must support
|
| + * "reverse checking", while support for "forward checking" is optional. This
|
| + * function is used to determine whether forward checking is supported.
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * The CertChainChecker whose ability to validate certificates in the
|
| + * "forward" direction is to be checked. Must be non-NULL.
|
| + * "pForwardCheckingSupported"
|
| + * Destination of the Boolean result. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_IsForwardCheckingSupported(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_Boolean *pForwardCheckingSupported,
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_IsForwardDirectionExpected
|
| + * DESCRIPTION:
|
| + *
|
| + * Checks whether the CertChainChecker pointed to by "checker" has been
|
| + * initialized to expect the certificates to be presented in the "forward"
|
| + * direction and stores the Boolean result at "pForwardDirectionExpected".
|
| + *
|
| + * A CertChainChecker may be presented certificates in the "reverse"
|
| + * direction (from trust anchor to target) or in the "forward" direction
|
| + * (from target to trust anchor). All CertChainCheckers must support
|
| + * "reverse checking", while support for "forward checking" is optional. This
|
| + * function is used to determine in which direction the CertChainChecker
|
| + * expects the certificates to be presented.
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * The CertChainChecker that has been initialized to expect certificates
|
| + * in either the "forward" or "reverse" directions. Must be non-NULL.
|
| + * "pForwardDirectionExpected"
|
| + * Destination of the Boolean result. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_IsForwardDirectionExpected(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_Boolean *pForwardDirectionExpected,
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_GetSupportedExtensions
|
| + * DESCRIPTION:
|
| + *
|
| + * Retrieves a pointer to a List of OIDs (each OID corresponding to a
|
| + * certificate extension supported by the CertChainChecker pointed to by
|
| + * "checker") and stores it at "pExtensions". All certificate extensions that
|
| + * the CertChainChecker might possibly recognize and be able to process
|
| + * should be included in the List of supported extensions. If "checker" does
|
| + * not recognize or process any certificate extensions, this function stores
|
| + * NULL at "pExtensions".
|
| + *
|
| + * Note that the List returned by this function is immutable.
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * Address of CertChainChecker whose supported extension OIDs are to be
|
| + * stored. Must be non-NULL.
|
| + * "pExtensions"
|
| + * Address where object pointer will be stored. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Thread Safe (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_GetSupportedExtensions(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_List **pExtensions, /* list of PKIX_PL_OID */
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_GetCertChainCheckerState
|
| + * DESCRIPTION:
|
| + *
|
| + * Retrieves a pointer to a PKIX_PL_Object representing the internal state
|
| + * (if any) of the CertChainChecker pointed to by "checker" and stores it at
|
| + * "pCertChainCheckerState".
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * Address of CertChainChecker whose state is to be stored.
|
| + * Must be non-NULL.
|
| + * "pCertChainCheckerState"
|
| + * Address where object pointer will be stored. Must be non-NULL.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Conditionally Thread Safe
|
| + * (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_GetCertChainCheckerState(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_PL_Object **pCertChainCheckerState,
|
| + void *plContext);
|
| +
|
| +/*
|
| + * FUNCTION: PKIX_CertChainChecker_SetCertChainCheckerState
|
| + * DESCRIPTION:
|
| + *
|
| + * Sets the internal state of the CertChainChecker pointed to by "checker"
|
| + * using the Object pointed to by "certChainCheckerState". If "checker" needs
|
| + * a NULL internal state, "certChainCheckerState" should be set to NULL.
|
| + *
|
| + * PARAMETERS:
|
| + * "checker"
|
| + * Address of CertChainChecker whose state is to be set. Must be non-NULL.
|
| + * "certChainCheckerState"
|
| + * Address of Object representing internal state.
|
| + * "plContext"
|
| + * Platform-specific context pointer.
|
| + * THREAD SAFETY:
|
| + * Not Thread Safe - assumes exclusive access to "checker"
|
| + * (see Thread Safety Definitions in Programmer's Guide)
|
| + * RETURNS:
|
| + * Returns NULL if the function succeeds.
|
| + * Returns a CertChainChecker Error if the function fails in a non-fatal way.
|
| + * Returns a Fatal Error if the function fails in an unrecoverable way.
|
| + */
|
| +PKIX_Error *
|
| +PKIX_CertChainChecker_SetCertChainCheckerState(
|
| + PKIX_CertChainChecker *checker,
|
| + PKIX_PL_Object *certChainCheckerState,
|
| + void *plContext);
|
| +
|
| +#ifdef __cplusplus
|
| +}
|
| +#endif
|
| +
|
| +#endif /* _PKIX_CHECKER_H */
|
|
|
| Property changes on: nss/mozilla/security/nss/lib/libpkix/include/pkix_checker.h
|
| ___________________________________________________________________
|
| Added: svn:executable
|
| + *
|
| Added: svn:eol-style
|
| + LF
|
|
|
|
|