forked from sangge/tpre-python
		
	
		
			
				
	
	
		
			642 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			642 lines
		
	
	
		
			28 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  *  Copyright 2014-2023 The GmSSL Project. All Rights Reserved.
 | |
|  *
 | |
|  *  Licensed under the Apache License, Version 2.0 (the License); you may
 | |
|  *  not use this file except in compliance with the License.
 | |
|  *
 | |
|  *  http://www.apache.org/licenses/LICENSE-2.0
 | |
|  */
 | |
| 
 | |
| 
 | |
| #ifndef GMSSL_X509_EXT_H
 | |
| #define GMSSL_X509_EXT_H
 | |
| 
 | |
| 
 | |
| #include <time.h>
 | |
| #include <string.h>
 | |
| #include <stdint.h>
 | |
| #include <stdlib.h>
 | |
| #include <gmssl/sm2.h>
 | |
| #include <gmssl/oid.h>
 | |
| #include <gmssl/asn1.h>
 | |
| 
 | |
| #ifdef __cplusplus
 | |
| extern "C" {
 | |
| #endif
 | |
| 
 | |
| 
 | |
| enum {
 | |
| 	X509_non_critical = 0,
 | |
| 	X509_critical = 1,
 | |
| };
 | |
| 
 | |
| /*
 | |
| Extensions:
 | |
| 
 | |
| 	1.  AuthorityKeyIdentifier	SEQUENCE			AuthorityKeyIdentifier		MUST non-critical
 | |
| 	2.  SubjectKeyIdentifier	OCTET STRING							MUST non-critical
 | |
| 	3.  KeyUsage			BIT STRING							SHOULD critical
 | |
| 	4.  CertificatePolicies		SEQUENCE OF SEQUENCE		CertificatePolicies
 | |
| 	5.  PolicyMappings		SEQUENCE OF SEQUENCE		PolicyMappings			SHOULD critical
 | |
| 	6.  SubjectAltName		SEQUENCE OF SEQUENCE		GeneralNames			SHOULD non-critical
 | |
| 	7.  IssuerAltName		SEQUENCE OF SEQUENCE		GeneralNames			SHOULD non-critical
 | |
| 	8.  SubjectDirectoryAttributes	SEQUENCE OF SEQUENCE		Attributes			MUST non-critical
 | |
| 	9.  BasicConstraints		SEQUENCE			BasicConstraints		CA: MUST critical, End-entity: MAY critical or non-critical
 | |
| 	10. NameConstraints		SEQUENCE			NameConstraints
 | |
| 	11. PolicyConstraints		SEQUENCE			PolicyConstraints		MUST critical
 | |
| 	12. ExtKeyUsageSyntax		SEQUENCE OF OBJECT IDENTIFIER					MAY critical or non-critical
 | |
| 	13. CRLDistributionPoints	SEQUENCE OF SEQUENCE		DistributionPoints
 | |
| 	14. InhibitAnyPolicy		INTEGER								MUST critical
 | |
| 	15. FreshestCRL			SEQUENCE OF SEQUENCE		DistributionPoints		MUST non-critical
 | |
| */
 | |
| 
 | |
| int x509_exts_add_authority_key_identifier(uint8_t *exts, size_t *extslen, size_t maxlen, int critical,
 | |
| 	const uint8_t *keyid, size_t keyid_len,
 | |
| 	const uint8_t *issuer, size_t issuer_len,
 | |
| 	const uint8_t *serial, size_t serial_len);
 | |
| int x509_exts_add_default_authority_key_identifier(uint8_t *exts, size_t *extslen, size_t maxlen,
 | |
| 	const SM2_KEY *public_key);
 | |
| int x509_exts_add_subject_key_identifier(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_subject_key_identifier_ex(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const SM2_KEY *subject_key);
 | |
| int x509_exts_add_key_usage(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, int bits);
 | |
| int x509_exts_add_certificate_policies(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_policy_mappings(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_subject_alt_name(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_issuer_alt_name(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_subject_directory_attributes(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_name_constraints(uint8_t *exts, size_t *extslen, size_t maxlen, int critical,
 | |
| 	const uint8_t *permitted_subtrees, size_t permitted_subtrees_len,
 | |
| 	const uint8_t *excluded_subtrees, size_t excluded_subtrees_len);
 | |
| int x509_exts_add_policy_constraints(uint8_t *exts, size_t *extslen, size_t maxlen, int critical,
 | |
| 	int require_explicit_policy, int inhibit_policy_mapping);
 | |
| int x509_exts_add_basic_constraints(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, int ca, int path_len_constraint);
 | |
| int x509_exts_add_ext_key_usage(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const int *key_purposes, size_t key_purposes_cnt);
 | |
| int x509_exts_add_crl_distribution_points_ex(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, int oid,
 | |
| 	const char *http_uri, size_t http_urilen, const char *ldap_uri, size_t ldap_urilen);
 | |
| int x509_exts_add_crl_distribution_points(uint8_t *exts, size_t *extslen, size_t maxlen, int critical,
 | |
| 	const char *http_uri, size_t http_urilen, const char *ldap_uri, size_t ldap_urilen);
 | |
| int x509_exts_add_inhibit_any_policy(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, int skip_certs);
 | |
| int x509_exts_add_freshest_crl(uint8_t *exts, size_t *extslen, size_t maxlen, int critical, const uint8_t *d, size_t dlen);
 | |
| int x509_exts_add_authority_info_access(uint8_t *exts, size_t *extslen, size_t maxlen, int critical,
 | |
| 	const char *ca_issuers_uri, size_t ca_issuers_urilen, // ca_issuers_uri is the URI (http://examaple.com/subCA.crt) of DER-encoded CA cert
 | |
| 	const char *ocsp_uri, size_t ocsp_urilen);
 | |
| 
 | |
| int x509_exts_add_sequence(uint8_t *exts, size_t *extslen, size_t maxlen,
 | |
| 	int oid, int critical, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| OtherName ::= SEQUENCE {
 | |
| 	type-id		OBJECT IDENTIFIER, -- known oid from x509_rdn_oid such as OID_at_common_name, or oid nodes
 | |
| 	value		[0] EXPLICIT ANY DEFINED BY type-id }
 | |
| */
 | |
| int x509_other_name_to_der(
 | |
| 	const uint32_t *nodes, size_t nodes_count,
 | |
| 	const uint8_t *value, size_t value_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_other_name_from_der(
 | |
| 	uint32_t *nodes, size_t *nodes_count,
 | |
| 	const uint8_t **value, size_t *valuelen,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_other_name_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| EDIPartyName ::= SEQUENCE {
 | |
| 	nameAssigner	[0] EXPLICIT DirectoryString OPTIONAL,
 | |
| 	partyName	[1] EXPLICIT DirectoryString }
 | |
| */
 | |
| int x509_edi_party_name_to_der(
 | |
| 	int assigner_tag, const uint8_t *assigner, size_t assigner_len,
 | |
| 	int party_name_tag, const uint8_t *party_name, size_t party_name_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_edi_party_name_from_der(
 | |
| 	int *assigner_tag, const uint8_t **assigner, size_t *assigner_len,
 | |
| 	int *party_name_tag, const uint8_t **party_name, size_t *party_name_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_edi_party_name_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| GeneralName ::= CHOICE {
 | |
| 	otherName			[0] IMPLICIT OtherName,	-- Only in GeneralName
 | |
| 	rfc822Name			[1] IMPLICIT IA5String,
 | |
| 	dNSName				[2] IMPLICIT IA5String,
 | |
| 	x400Address			[3] IMPLICIT ORAddress,
 | |
| 	directoryName			[4] IMPLICIT Name,	-- SEQENCE OF
 | |
| 	ediPartyName			[5] IMPLICIT EDIPartyName, -- Only in GeneralName
 | |
| 	uniformResourceIdentifier	[6] IMPLICIT IA5String,
 | |
| 	iPAddress			[7] IMPLICIT OCTET STRING, -- 4 bytes or string?
 | |
| 	registeredID			[8] IMPLICIT OBJECT IDENTIFIER }
 | |
| */
 | |
| typedef enum {
 | |
| 	X509_gn_other_name = 0,
 | |
| 	X509_gn_rfc822_name = 1,
 | |
| 	X509_gn_dns_name = 2,
 | |
| 	X509_gn_x400_address = 3,
 | |
| 	X509_gn_directory_name = 4,
 | |
| 	X509_gn_edi_party_name = 5,
 | |
| 	X509_gn_uniform_resource_identifier = 6,
 | |
| 	X509_gn_ip_address = 7,
 | |
| 	X509_gn_registered_id = 8,
 | |
| } X509_GENERAL_NAME_CHOICE;
 | |
| 
 | |
| int x509_general_name_to_der(int choice, const uint8_t *d, size_t dlen, uint8_t **out, size_t *outlen);
 | |
| int x509_general_name_from_der(int *choice, const uint8_t **d, size_t *dlen, const uint8_t **in, size_t *inlen);
 | |
| int x509_general_name_print(FILE *fp, int fmt, int ind, const char *label, int choice, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| GeneralNames ::= SEQUENCE OF GeneralName
 | |
| */
 | |
| #define x509_general_names_to_der(d,dlen,out,outlen) asn1_sequence_to_der(d,dlen,out,outlen)
 | |
| #define x509_general_names_from_der(d,dlen,in,inlen) asn1_sequence_from_der(d,dlen,in,inlen)
 | |
| int x509_general_names_add_general_name(uint8_t *gns, size_t *gnslen, size_t maxlen,
 | |
| 	int choice, const uint8_t *d, size_t dlen);
 | |
| int x509_general_names_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| int x509_general_names_add_other_name(uint8_t *gns, size_t *gnslen, size_t maxlen,
 | |
| 	const uint32_t *nodes, size_t nodes_count,
 | |
| 	const uint8_t *value, size_t value_len);
 | |
| #define x509_general_names_add_rfc822_name(a,alen,maxlen,s) x509_general_names_add_general_name(a,alen,maxlen,X509_gn_rfc822_name,(uint8_t*)s,strlen(s))
 | |
| #define x509_general_names_add_dns_name(a,alen,maxlen,s) x509_general_names_add_general_name(a,alen,maxlen,X509_gn_dns_name,(uint8_t*)s,strlen(s))
 | |
| #define x509_general_names_add_x400_address(a,alen,maxlen,d,dlen) x509_general_names_add_general_name(a,alen,maxlen,X509_gn_x400_address,d,dlen)
 | |
| #define x509_general_names_add_directory_name(a,alen,maxlen,d,dlen) x509_general_names_add_general_name(a,alen,maxlen,X509_gn_directory_name,d,dlen)
 | |
| int x509_general_names_add_edi_party_name(uint8_t *gns, size_t *gnslen, size_t maxlen,
 | |
| 	int assigner_tag, const uint8_t *assigner, size_t assigner_len,
 | |
| 	int party_name_tag, const uint8_t *party_name, size_t party_name_len);
 | |
| #define x509_general_names_add_uniform_resource_identifier(a,alen,maxlen,s) x509_general_names_add_general_name(a,alen,maxlen,X509_gn_uniform_resource_identifier,(uint8_t*)s,strlen(s))
 | |
| #define x509_general_names_add_ip_address(a,alen,maxlen,s) x509_general_names_add_general_name(a,alen,maxlen,X509_gn_ip_address,(uint8_t*)s,strlen(s))
 | |
| int x509_general_names_add_registered_id(uint8_t *gns, size_t *gnslen, size_t maxlen,
 | |
| 	const uint32_t *nodes, size_t nodes_cnt);
 | |
| 
 | |
| int x509_uri_as_general_names_to_der_ex(int tag, const char *uri, size_t urilen, uint8_t **out, size_t *outlen);
 | |
| #define x509_uri_as_general_names_to_der(uri,urilen,out,outlen) x509_uri_as_general_names_to_der_ex(ASN1_TAG_SEQUENCE,uri,urilen,out,outlen)
 | |
| 
 | |
| /*
 | |
| AuthorityKeyIdentifier ::= SEQUENCE {
 | |
| 	keyIdentifier			[0] IMPLICIT OCTET STRING OPTIONAL,
 | |
| 	authorityCertIssuer		[1] IMPLICIT GeneralNames OPTIONAL,
 | |
| 	authorityCertSerialNumber	[2] IMPLICIT INTEGER OPTIONAL }
 | |
| */
 | |
| int x509_authority_key_identifier_to_der(
 | |
| 	const uint8_t *keyid, size_t keyid_len,
 | |
| 	const uint8_t *issuer, size_t issuer_len,
 | |
| 	const uint8_t *serial, size_t serial_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_authority_key_identifier_from_der(
 | |
| 	const uint8_t **keyid, size_t *keyid_len,
 | |
| 	const uint8_t **issuer, size_t *issuer_len,
 | |
| 	const uint8_t **serial, size_t *serial_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_authority_key_identifier_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| SubjectKeyIdentifier ::= OCTET STRING
 | |
| */
 | |
| #define X509_SUBJECT_KEY_IDENTIFIER_MIN_LEN 16
 | |
| #define X509_SUBJECT_KEY_IDENTIFIER_MAX_LEN 64
 | |
| 
 | |
| /*
 | |
| KeyUsage ::= BIT STRING {
 | |
| 	digitalSignature	(0),
 | |
| 	nonRepudiation		(1), -- recent renamed contentCommitment
 | |
| 	keyEncipherment		(2),
 | |
| 	dataEncipherment	(3),
 | |
| 	keyAgreement		(4),
 | |
| 	keyCertSign		(5),
 | |
| 	cRLSign			(6),
 | |
| 	encipherOnly		(7),
 | |
| 	decipherOnly		(8) }
 | |
| */
 | |
| #define X509_KU_DIGITAL_SIGNATURE	(1 << 0)
 | |
| #define X509_KU_NON_REPUDIATION		(1 << 1)
 | |
| #define X509_KU_KEY_ENCIPHERMENT	(1 << 2)
 | |
| #define X509_KU_DATA_ENCIPHERMENT	(1 << 3)
 | |
| #define X509_KU_KEY_AGREEMENT		(1 << 4)
 | |
| #define X509_KU_KEY_CERT_SIGN		(1 << 5)
 | |
| #define X509_KU_CRL_SIGN		(1 << 6)
 | |
| #define X509_KU_ENCIPHER_ONLY		(1 << 7)
 | |
| #define X509_KU_DECIPHER_ONLY		(1 << 8)
 | |
| 
 | |
| const char *x509_key_usage_name(int flag);
 | |
| int x509_key_usage_from_name(int *flag, const char *name);
 | |
| #define x509_key_usage_to_der(bits,out,outlen) asn1_bits_to_der(bits,out,outlen)
 | |
| #define x509_key_usage_from_der(bits,in,inlen) asn1_bits_from_der(bits,in,inlen)
 | |
| int x509_key_usage_check(int bits, int cert_type);
 | |
| int x509_key_usage_print(FILE *fp, int fmt, int ind, const char *label, int bits);
 | |
| 
 | |
| /*
 | |
| DisplayText ::= CHOICE {
 | |
| 	ia5String		IA5String	(SIZE (1..200)),
 | |
| 	visibleString		VisibleString	(SIZE (1..200)),
 | |
| 	bmpString		BMPString	(SIZE (1..200)),
 | |
| 	utf8String		UTF8String	(SIZE (1..200))
 | |
| }
 | |
| */
 | |
| #define X509_DISPLAY_TEXT_MIN_LEN 1
 | |
| #define X509_DISPLAY_TEXT_MAX_LEN 200
 | |
| 
 | |
| int x509_display_text_check(int tag, const uint8_t *d, size_t dlen);
 | |
| int x509_display_text_to_der(int tag, const uint8_t *d, size_t dlen, uint8_t **out, size_t *outlen);
 | |
| int x509_display_text_from_der(int *tag, const uint8_t **d, size_t *dlen, const uint8_t **in, size_t *inlen);
 | |
| int x509_display_text_print(FILE *fp, int fmt, int ind, const char *label, int tag, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| NoticeReference ::= SEQUENCE {
 | |
| 	organization	DisplayText,
 | |
| 	noticeNumbers	SEQUENCE OF INTEGER }
 | |
| 
 | |
| UserNotice ::= SEQUENCE {
 | |
|         noticeRef	NoticeReference OPTIONAL,
 | |
|         explicitText	DisplayText OPTIONAL }
 | |
| */
 | |
| #define X509_MAX_NOTICE_NUMBERS	32
 | |
| 
 | |
| int x509_notice_reference_to_der(
 | |
| 	int org_tag, const uint8_t *org, size_t org_len,
 | |
| 	const int *notice_numbers, size_t notice_numbers_cnt,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_notice_reference_from_der(
 | |
| 	int *org_tag, const uint8_t **org, size_t *org_len,
 | |
| 	int *notice_numbers, size_t *notice_numbers_cnt, size_t max_notice_numbers,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_notice_reference_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| int x509_user_notice_to_der(
 | |
| 	int notice_ref_org_tag, const uint8_t *notice_ref_org, size_t notice_ref_org_len,
 | |
| 	const int *notice_ref_notice_numbers, size_t notice_ref_notice_numbers_cnt,
 | |
| 	int explicit_text_tag, const uint8_t *explicit_text, size_t explicit_text_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_user_notice_from_der(
 | |
| 	int *notice_ref_org_tag, const uint8_t **notice_ref_org, size_t *notice_ref_org_len,
 | |
| 	int *notice_ref_notice_numbers, size_t *notice_ref_notice_numbers_cnt, size_t max_notice_ref_notice_numbers,
 | |
| 	int *explicit_text_tag, const uint8_t **explicit_text, size_t *explicit_text_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_user_notice_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| PolicyQualifierInfo ::= SEQUENCE {
 | |
|         policyQualifierId  PolicyQualifierId,
 | |
|         qualifier          ANY DEFINED BY policyQualifierId }
 | |
| 
 | |
| id-qt
 | |
| 	OID_qt_cps
 | |
| 	OID_qt_unotice
 | |
| 
 | |
| 	switch(policyQualifierId)
 | |
| 	case id-qt-cps		: qualifier ::= IA5String
 | |
| 	case id-qt-unotice	: qualifier ::= UserNotice
 | |
| */
 | |
| const char *x509_qualifier_id_name(int oid);
 | |
| int x509_qualifier_id_from_name(const char *name);
 | |
| int x509_qualifier_id_from_der(int *oid, const uint8_t **in, size_t *inlen);
 | |
| int x509_qualifier_id_to_der(int oid, uint8_t **out, size_t *outlen);
 | |
| 
 | |
| int x509_policy_qualifier_info_to_der(
 | |
| 	int oid,
 | |
| 	const uint8_t *qualifier, size_t qualifier_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_policy_qualifier_info_from_der(
 | |
| 	int *oid,
 | |
| 	const uint8_t **qualifier, size_t *qualifier_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_policy_qualifier_info_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| #define x509_policy_qualifier_infos_to_der(d,dlen,out,outlen) asn1_sequence_to_der(d,dlen,out,outlen)
 | |
| #define x509_policy_qualifier_infos_from_der(d,dlen,in,ineln) asn1_sequence_from_der(d,dlen,in,inlen)
 | |
| int x509_policy_qualifier_infos_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| PolicyInformation ::= SEQUENCE {
 | |
|         policyIdentifier   CertPolicyId,
 | |
|         policyQualifiers   SEQUENCE SIZE (1..MAX) OF PolicyQualifierInfo OPTIONAL }
 | |
| 
 | |
| CertPolicyId ::= OBJECT IDENTIFIER -- undefined
 | |
| 
 | |
| 	OID_any_policy
 | |
| */
 | |
| char *x509_cert_policy_id_name(int oid);
 | |
| int x509_cert_policy_id_from_name(const char *name);
 | |
| int x509_cert_policy_id_from_der(int *oid, uint32_t *nodes, size_t *nodes_cnt, const uint8_t **in, size_t *inlen);
 | |
| int x509_cert_policy_id_to_der(int oid, const uint32_t *nodes, size_t nodes_cnt, uint8_t **out, size_t *outlen);
 | |
| 
 | |
| int x509_policy_information_to_der(
 | |
| 	int policy_oid, const uint32_t *policy_nodes, size_t policy_nodes_cnt,
 | |
| 	const uint8_t *qualifiers, size_t qualifiers_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_policy_information_from_der(
 | |
| 	int *policy_oid, uint32_t *policy_nodes, size_t *policy_nodes_cnt,
 | |
| 	const uint8_t **qualifiers, size_t *qualifiers_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_policy_information_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| CertificatePolicies ::= SEQUENCE SIZE (1..MAX) OF PolicyInformation
 | |
| */
 | |
| int x509_certificate_policies_add_policy_information(uint8_t *d, size_t *dlen, size_t maxlen,
 | |
| 	int policy_oid, const uint32_t *policy_nodes, size_t policy_nodes_cnt,
 | |
| 	const uint8_t *qualifiers, size_t qualifiers_len);
 | |
| int x509_certificate_policies_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| #define x509_certificate_policies_to_der(d,dlen,out,outlen) asn1_sequence_to_der(d,dlen,out,outlen)
 | |
| #define x509_certificate_policies_from_der(d,dlen,in,inlen) asn1_sequence_from_der(d,dlen,in,inlen)
 | |
| 
 | |
| /*
 | |
| PolicyMapping ::= SEQUENCE {
 | |
| 	issuerDomainPolicy	CertPolicyId, -- id-anyPolicy or other undefined
 | |
| 	subjectDomainPolicy	CertPolicyId }
 | |
| */
 | |
| int x509_policy_mapping_to_der(
 | |
| 	int issuer_policy_oid, const uint32_t *issuer_policy_nodes, size_t issuer_policy_nodes_cnt,
 | |
| 	int subject_policy_oid, const uint32_t *subject_policy_nodes, size_t subject_policy_nodes_cnt,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_policy_mapping_from_der(
 | |
| 	int *issuer_policy_oid, uint32_t *issuer_policy_nodes, size_t *issuer_policy_nodes_cnt,
 | |
| 	int *subject_policy_oid, uint32_t *subject_policy_nodes, size_t *subject_policy_nodes_cnt,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_policy_mapping_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| PolicyMappings ::= SEQUENCE OF PolicyMapping
 | |
| */
 | |
| int x509_policy_mappings_add_policy_mapping(uint8_t *d, size_t *dlen, size_t maxlen,
 | |
| 	int issuer_policy_oid, const uint32_t *issuer_policy_nodes, size_t issuer_policy_nodes_cnt,
 | |
| 	int subject_policy_oid, const uint32_t *subject_policy_nodes, size_t subject_policy_nodes_cnt);
 | |
| int x509_policy_mappings_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| #define x509_policy_mappings_to_der(d,dlen,out,outlen) asn1_sequence_to_der(d,dlen,out,outlen)
 | |
| #define x509_policy_mappings_from_der(d,dlen,in,inlen) asn1_sequence_from_der(d,dlen,in,inlen)
 | |
| 
 | |
| /*
 | |
| SubjectAltName ::= GeneralNames
 | |
| */
 | |
| #define x509_subject_alt_name_print(fp,fmt,ind,label,d,dlen) x509_general_names_print(fp,fmt,ind,label,d,dlen)
 | |
| 
 | |
| /*
 | |
| IssuerAltName ::= GeneralNames
 | |
| */
 | |
| #define x509_issuer_alt_name_print(fp,fmt,ind,label,d,dlen) x509_general_names_print(fp,fmt,ind,label,d,dlen)
 | |
| 
 | |
| /*
 | |
| SubjectDirectoryAttributes ::= SEQUENCE OF Attribute
 | |
| 
 | |
| Attribute ::= SEQUENCE {
 | |
| 	type		OBJECT IDENTIFIER,
 | |
| 	values		SET OF ANY }
 | |
| */
 | |
| int x509_attribute_to_der(
 | |
| 	const uint32_t *nodes, size_t nodes_cnt,
 | |
| 	const uint8_t *values, size_t values_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_attribute_from_der(
 | |
| 	int *oid, uint32_t *nodes, size_t *nodes_cnt,
 | |
| 	const uint8_t **values, size_t *values_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_attribute_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| int x509_attributes_add_attribute(uint8_t *d, size_t *dlen, size_t maxlen,
 | |
| 	const uint32_t *nodes, size_t nodes_cnt,
 | |
| 	const uint8_t *values, size_t values_len);
 | |
| int x509_attributes_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| #define x509_attributes_to_der(d,dlen,out,outlen) asn1_sequence_to_der(d,dlen,out,outlen)
 | |
| #define x509_attributes_from_der(d,dlen,in,inlen) asn1_sequence_from_der(d,dlen,in,inlen)
 | |
| 
 | |
| /*
 | |
| BasicConstraints ::= SEQUENCE {
 | |
| 	cA			BOOLEAN DEFAULT FALSE,
 | |
| 	pathLenConstraint	INTEGER (0..MAX) OPTIONAL }
 | |
| */
 | |
| #define X509_MAX_PATH_LEN_CONSTRAINT 6
 | |
| int x509_basic_constraints_to_der(int ca, int path_len_cons, uint8_t **out, size_t *outlen);
 | |
| int x509_basic_constraints_from_der(int *ca, int *path_len_cons, const uint8_t **in, size_t *inlen);
 | |
| int x509_basic_constraints_check(int ca, int path_len_cons, int cert_type);
 | |
| int x509_basic_constraints_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| GeneralSubtree ::= SEQUENCE {
 | |
| 	base		GeneralName,
 | |
| 	minimum		[0] IMPLICIT BaseDistance DEFAULT 0,
 | |
| 	maximum		[1] IMPLICIT BaseDistance OPTIONAL }
 | |
| 
 | |
| BaseDistance ::= INTEGER (0..MAX)
 | |
| */
 | |
| int x509_general_subtree_to_der(
 | |
| 	int base_choice, const uint8_t *base, size_t base_len,
 | |
| 	int minimum, int maximum,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_general_subtree_from_der(
 | |
| 	int *base_choice, const uint8_t **base, size_t *base_len,
 | |
| 	int *minimum, int *maximum,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_general_subtree_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| GeneralSubtrees ::= SEQUENCE SIZE (1..MAX) OF GeneralSubtree
 | |
| */
 | |
| int x509_general_subtrees_add_general_subtree(uint8_t *d, size_t *dlen, size_t maxlen,
 | |
| 	int base_choice, const uint8_t *base, size_t base_len,
 | |
| 	int minimum, int maximum);
 | |
| int x509_general_subtrees_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| #define x509_general_subtrees_to_der(d,dlen,out,outlen) asn1_sequence_to_der(d,dlen,out,outlen)
 | |
| #define x509_general_subtrees_from_der(d,dlen,in,inlen) asn1_sequence_from_der(d,dlen,in,inlen)
 | |
| 
 | |
| /*
 | |
| NameConstraints ::= SEQUENCE {
 | |
| 	permittedSubtrees	[0] GeneralSubtrees OPTIONAL,
 | |
| 	excludedSubtrees	[1] GeneralSubtrees OPTIONAL }
 | |
| */
 | |
| int x509_name_constraints_to_der(
 | |
| 	const uint8_t *permitted_subtrees, size_t permitted_subtrees_len,
 | |
| 	const uint8_t *excluded_subtrees, size_t excluded_subtrees_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_name_constraints_from_der(
 | |
| 	const uint8_t **permitted_subtrees, size_t *permitted_subtrees_len,
 | |
| 	const uint8_t **excluded_subtrees, size_t *excluded_subtrees_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_name_constraints_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| PolicyConstraints ::= SEQUENCE {
 | |
| 	requireExplicitPolicy	[0] IMPLICIT SkipCerts OPTIONAL,
 | |
| 	inhibitPolicyMapping	[1] IMPLICIT SkipCerts OPTIONAL
 | |
| }
 | |
| 
 | |
| SkipCerts ::= INTEGER (0..MAX)
 | |
| */
 | |
| int x509_policy_constraints_to_der(int require_explicit_policy, int inhibit_policy_mapping, uint8_t **out, size_t *outlen);
 | |
| int x509_policy_constraints_from_der(int *require_explicit_policy, int *inhibit_policy_mapping, const uint8_t **in, size_t *inlen);
 | |
| int x509_policy_constraints_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| ExtKeyUsageSyntax ::= SEQUENCE SIZE (1..MAX) OF KeyPurposeId
 | |
| 
 | |
| KeyPurposeId:
 | |
| 	OID_any_extended_key_usage
 | |
|   id-kp
 | |
| 	OID_kp_server_auth
 | |
| 	OID_kp_client_auth
 | |
| 	OID_kp_code_signing
 | |
| 	OID_kp_email_protection
 | |
| 	OID_kp_time_stamping
 | |
| 	OID_kp_ocsp_signing
 | |
| */
 | |
| #define X509_MAX_KEY_PURPOSES	7
 | |
| const char *x509_key_purpose_name(int oid);
 | |
| const char *x509_key_purpose_text(int oid);
 | |
| int x509_key_purpose_from_name(const char *name);
 | |
| int x509_key_purpose_from_der(int *oid, const uint8_t **in, size_t *inlen);
 | |
| int x509_key_purpose_to_der(int oid, uint8_t **out, size_t *outlen);
 | |
| 
 | |
| int x509_ext_key_usage_to_der(const int *oids, size_t oids_cnt, uint8_t **out, size_t *outlen);
 | |
| int x509_ext_key_usage_from_der(int *oids, size_t *oids_cnt, size_t max_cnt, const uint8_t **in, size_t *inlen);
 | |
| int x509_ext_key_usage_check(const int *oids, size_t oids_cnt, int cert_type);
 | |
| int x509_ext_key_usage_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| ReasonFlags ::= BIT STRING {
 | |
| 	unused			(0),
 | |
| 	keyCompromise		(1),
 | |
| 	cACompromise		(2),
 | |
| 	affiliationChanged	(3),
 | |
| 	superseded		(4),
 | |
| 	cessationOfOperation	(5),
 | |
| 	certificateHold		(6),
 | |
| 	privilegeWithdrawn	(7),
 | |
| 	aACompromise		(8) }
 | |
| */
 | |
| #define X509_RF_UNUSED			(1 << 0)
 | |
| #define X509_RF_KEY_COMPROMISE		(1 << 1)
 | |
| #define X509_RF_CA_COMPROMISE		(1 << 2)
 | |
| #define X509_RF_AFFILIATION_CHANGED	(1 << 3)
 | |
| #define X509_RF_SUPERSEDED		(1 << 4)
 | |
| #define X509_RF_CESSATION_OF_OPERATION	(1 << 5)
 | |
| #define X509_RF_CERTIFICATE_HOLD	(1 << 6)
 | |
| #define X509_RF_PRIVILEGE_WITHDRAWN	(1 << 7)
 | |
| #define X509_RF_AA_COMPROMISE		(1 << 8)
 | |
| 
 | |
| const char *x509_revoke_reason_flag_name(int flag);
 | |
| int x509_revoke_reason_flag_from_name(int *flag, const char *name);
 | |
| #define x509_revoke_reason_flags_to_der(bits,out,outlen) asn1_bits_to_der(bits,out,outlen)
 | |
| #define x509_revoke_reason_flags_from_der(bits,in,inlen) asn1_bits_from_der(bits,in,inlen)
 | |
| int x509_revoke_reason_flags_print(FILE *fp, int fmt, int ind, const char *label, int bits);
 | |
| 
 | |
| /*
 | |
| DistributionPointName ::= CHOICE {
 | |
| 	fullName		[0] IMPLICIT GeneralNames, -- SEQUENCE OF
 | |
| 	nameRelativeToCRLIssuer	[1] IMPLICIT RelativeDistinguishedName } -- SET OF
 | |
| */
 | |
| enum {
 | |
| 	X509_full_name = 0,
 | |
| 	X509_name_relative_to_crl_issuer = 1,
 | |
| };
 | |
| 
 | |
| int x509_uri_as_distribution_point_name_to_der(const char *uri, size_t urilen, uint8_t **out, size_t *outlen);
 | |
| int x509_distribution_point_name_from_der(int *choice, const uint8_t **d, size_t *dlen, const uint8_t **in, size_t *inlen);
 | |
| int x509_uri_as_distribution_point_name_from_der(const char **uri, size_t *urilen, const uint8_t **in, size_t *inlen);
 | |
| int x509_distribution_point_name_print(FILE *fp, int fmt, int ind, const char *label,const uint8_t *a, size_t alen);
 | |
| 
 | |
| int x509_uri_as_explicit_distribution_point_name_to_der(int index, const char *uri, size_t urilen, uint8_t **out, size_t *outlen);
 | |
| int x509_uri_as_explicit_distribution_point_name_from_der(int index, const char **uri, size_t *urilen, const uint8_t **in, size_t *inlen);
 | |
| 
 | |
| /*
 | |
| DistributionPoint ::= SEQUENCE {
 | |
| 	distributionPoint	[0] EXPLICIT DistributionPointName OPTIONAL,
 | |
| 	reasons			[1] IMPLICIT ReasonFlags OPTIONAL,
 | |
| 	cRLIssuer		[2] IMPLICIT GeneralNames OPTIONAL }
 | |
| */
 | |
| int x509_uri_as_distribution_point_to_der(const char *uri, size_t urilen,
 | |
| 	int reasons, const uint8_t *crl_issuer, size_t crl_issuer_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_uri_as_distribution_point_from_der(const char **uri, size_t *urilen,
 | |
| 	int *reasons, const uint8_t **crl_issuer, size_t *crl_issuer_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_distribution_point_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| /*
 | |
| DistributionPoints ::= SEQUENCE OF DistributionPoint
 | |
| */
 | |
| int x509_uri_as_distribution_points_to_der(const char *uri, size_t urilen,
 | |
| 	int reasons, const uint8_t *crl_issuer, size_t crl_issuer_len,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_uri_as_distribution_points_from_der(const char **uri, size_t *urilen,
 | |
| 	int *reasons, const uint8_t **crl_issuer, size_t *crl_issuer_len,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_distribution_points_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| 
 | |
| /*
 | |
| CRLDistributionPoints ::= SEQUENCE SIZE (1..MAX) OF DistributionPoint
 | |
| */
 | |
| #define x509_crl_distribution_points_to_der(d,dlen,out,outlen) x509_distribution_points_to_der(d,dlen,out,outlen)
 | |
| #define x509_crl_distribution_points_from_der(d,dlen,in,inlen) x509_distribution_points_from_der(d,dlen,in,inlen)
 | |
| #define x509_crl_distribution_points_print(fp,fmt,ind,label,d,dlen) x509_distribution_points_print(fp,fmt,ind,label,d,dlen)
 | |
| 
 | |
| 
 | |
| /*
 | |
| InhibitAnyPolicy ::= SkipCerts
 | |
| SkipCerts ::= INTEGER (0..MAX)
 | |
| */
 | |
| #define x509_inhibit_any_policy_to_der(val,out,outlen) asn1_int_to_der(val,out,outlen)
 | |
| #define x509_inhibit_any_policy_from_der(val,in,inlen) asn1_int_from_der(val,in,inlen)
 | |
| 
 | |
| /*
 | |
| FreshestCRL ::= CRLDistributionPoints
 | |
|  */
 | |
| #define x509_freshest_crl_to_der(d,dlen,out,outlen) x509_crl_distribution_points_to_der(d,dlen,out,outlen)
 | |
| #define x509_freshest_crl_from_der(d,dlen,in,inlen) x509_crl_distribution_points_from_der(d,dlen,in,inlen)
 | |
| #define x509_freshest_crl_print(fp,fmt,ind,label,d,dlen) x509_crl_distribution_points_print(fp,fmt,ind,label,d,dlen)
 | |
| 
 | |
| /*
 | |
| Netscape-Defined Certificate Extensions
 | |
| https://docs.oracle.com/cd/E19957-01/816-5533-10/ext.htm#1023061
 | |
| 
 | |
| NetscapeCertType ::= BIT STRING
 | |
| 
 | |
| 	bit 0: SSL Client certificate
 | |
| 	bit 1: SSL Server certificate
 | |
| 	bit 2: S/MIME certificate
 | |
| 	bit 3: Object-signing certificate
 | |
| 	bit 4: Reserved for future use
 | |
| 	bit 5: SSL CA certificate
 | |
| 	bit 6: S/MIME CA certificate
 | |
| 	bit 7: Object-signing CA certificate
 | |
| 
 | |
| NetscapeCertComment ::= IA5String
 | |
| */
 | |
| int x509_netscape_cert_type_print(FILE *fp, int fmt, int ind, const char *label, int bits);
 | |
| 
 | |
| int x509_exts_check(const uint8_t *exts, size_t extslen, int cert_type,
 | |
| 	int *path_len_constraints);
 | |
| 
 | |
| /*
 | |
| AuthorityInfoAccessSyntax ::= SEQUENCE OF AccessDescription
 | |
| 
 | |
| AccessDescription ::= SEQUENCE {
 | |
| 	accessMethod	OBJECT IDENTIFIER,
 | |
| 	accessLocation	GeneralName }
 | |
| 
 | |
| accessMethods:
 | |
| 	OID_ad_ca_issuers
 | |
| 	OID_ad_ocsp
 | |
| */
 | |
| const char *x509_access_method_name(int oid);
 | |
| int x509_access_method_from_name(const char *name);
 | |
| int x509_access_method_to_der(int oid, uint8_t **out, size_t *outlen);
 | |
| int x509_access_method_from_der(int *oid, const uint8_t **in, size_t *inlen);
 | |
| 
 | |
| int x509_access_description_to_der(int oid, const char *uri, size_t urilen, uint8_t **out, size_t *outlen);
 | |
| int x509_access_description_from_der(int *oid, const char **uri, size_t *urilen, const uint8_t **in, size_t *inlen);
 | |
| int x509_access_description_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| int x509_authority_info_access_to_der(
 | |
| 	const char *ca_issuers_uri, size_t ca_issuers_urilen,
 | |
| 	const char *ocsp_uri, size_t ocsp_urilen,
 | |
| 	uint8_t **out, size_t *outlen);
 | |
| int x509_authority_info_access_from_der(
 | |
| 	const char **ca_issuers_uri, size_t *ca_issuers_urilen,
 | |
| 	const char **ocsp_uri, size_t *ocsp_urilen,
 | |
| 	const uint8_t **in, size_t *inlen);
 | |
| int x509_authority_info_access_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
 | |
| 
 | |
| 
 | |
| #ifdef __cplusplus
 | |
| }
 | |
| #endif
 | |
| #endif
 | |
| 
 |