1109998Smarkm/* ocsp.h */
2109998Smarkm/* Written by Tom Titchener <Tom_Titchener@groove.net> for the OpenSSL
3109998Smarkm * project. */
4109998Smarkm
5109998Smarkm/* History:
6109998Smarkm   This file was transfered to Richard Levitte from CertCo by Kathy
7109998Smarkm   Weinhold in mid-spring 2000 to be included in OpenSSL or released
8109998Smarkm   as a patch kit. */
9109998Smarkm
10109998Smarkm/* ====================================================================
11109998Smarkm * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved.
12109998Smarkm *
13109998Smarkm * Redistribution and use in source and binary forms, with or without
14109998Smarkm * modification, are permitted provided that the following conditions
15109998Smarkm * are met:
16109998Smarkm *
17109998Smarkm * 1. Redistributions of source code must retain the above copyright
18109998Smarkm *    notice, this list of conditions and the following disclaimer.
19109998Smarkm *
20109998Smarkm * 2. Redistributions in binary form must reproduce the above copyright
21109998Smarkm *    notice, this list of conditions and the following disclaimer in
22109998Smarkm *    the documentation and/or other materials provided with the
23109998Smarkm *    distribution.
24109998Smarkm *
25109998Smarkm * 3. All advertising materials mentioning features or use of this
26109998Smarkm *    software must display the following acknowledgment:
27109998Smarkm *    "This product includes software developed by the OpenSSL Project
28109998Smarkm *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
29109998Smarkm *
30109998Smarkm * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
31109998Smarkm *    endorse or promote products derived from this software without
32109998Smarkm *    prior written permission. For written permission, please contact
33109998Smarkm *    openssl-core@openssl.org.
34109998Smarkm *
35109998Smarkm * 5. Products derived from this software may not be called "OpenSSL"
36109998Smarkm *    nor may "OpenSSL" appear in their names without prior written
37109998Smarkm *    permission of the OpenSSL Project.
38109998Smarkm *
39109998Smarkm * 6. Redistributions of any form whatsoever must retain the following
40109998Smarkm *    acknowledgment:
41109998Smarkm *    "This product includes software developed by the OpenSSL Project
42109998Smarkm *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
43109998Smarkm *
44109998Smarkm * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
45109998Smarkm * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
46109998Smarkm * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
47109998Smarkm * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
48109998Smarkm * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
49109998Smarkm * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
50109998Smarkm * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
51109998Smarkm * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
52109998Smarkm * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
53109998Smarkm * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
54109998Smarkm * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
55109998Smarkm * OF THE POSSIBILITY OF SUCH DAMAGE.
56109998Smarkm * ====================================================================
57109998Smarkm *
58109998Smarkm * This product includes cryptographic software written by Eric Young
59109998Smarkm * (eay@cryptsoft.com).  This product includes software written by Tim
60109998Smarkm * Hudson (tjh@cryptsoft.com).
61109998Smarkm *
62109998Smarkm */
63109998Smarkm
64109998Smarkm#ifndef HEADER_OCSP_H
65109998Smarkm#define HEADER_OCSP_H
66109998Smarkm
67238405Sjkim#include <openssl/ossl_typ.h>
68109998Smarkm#include <openssl/x509.h>
69109998Smarkm#include <openssl/x509v3.h>
70109998Smarkm#include <openssl/safestack.h>
71109998Smarkm
72109998Smarkm#ifdef  __cplusplus
73109998Smarkmextern "C" {
74109998Smarkm#endif
75109998Smarkm
76109998Smarkm/* Various flags and values */
77109998Smarkm
78109998Smarkm#define OCSP_DEFAULT_NONCE_LENGTH	16
79109998Smarkm
80109998Smarkm#define OCSP_NOCERTS			0x1
81109998Smarkm#define OCSP_NOINTERN			0x2
82109998Smarkm#define OCSP_NOSIGS			0x4
83109998Smarkm#define OCSP_NOCHAIN			0x8
84109998Smarkm#define OCSP_NOVERIFY			0x10
85109998Smarkm#define OCSP_NOEXPLICIT			0x20
86109998Smarkm#define OCSP_NOCASIGN			0x40
87109998Smarkm#define OCSP_NODELEGATED		0x80
88109998Smarkm#define OCSP_NOCHECKS			0x100
89109998Smarkm#define OCSP_TRUSTOTHER			0x200
90109998Smarkm#define OCSP_RESPID_KEY			0x400
91109998Smarkm#define OCSP_NOTIME			0x800
92109998Smarkm
93109998Smarkm/*   CertID ::= SEQUENCE {
94109998Smarkm *       hashAlgorithm            AlgorithmIdentifier,
95109998Smarkm *       issuerNameHash     OCTET STRING, -- Hash of Issuer's DN
96109998Smarkm *       issuerKeyHash      OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields)
97109998Smarkm *       serialNumber       CertificateSerialNumber }
98109998Smarkm */
99109998Smarkmtypedef struct ocsp_cert_id_st
100109998Smarkm	{
101109998Smarkm	X509_ALGOR *hashAlgorithm;
102109998Smarkm	ASN1_OCTET_STRING *issuerNameHash;
103109998Smarkm	ASN1_OCTET_STRING *issuerKeyHash;
104109998Smarkm	ASN1_INTEGER *serialNumber;
105109998Smarkm	} OCSP_CERTID;
106109998Smarkm
107109998SmarkmDECLARE_STACK_OF(OCSP_CERTID)
108109998Smarkm
109109998Smarkm/*   Request ::=     SEQUENCE {
110109998Smarkm *       reqCert                    CertID,
111109998Smarkm *       singleRequestExtensions    [0] EXPLICIT Extensions OPTIONAL }
112109998Smarkm */
113109998Smarkmtypedef struct ocsp_one_request_st
114109998Smarkm	{
115109998Smarkm	OCSP_CERTID *reqCert;
116109998Smarkm	STACK_OF(X509_EXTENSION) *singleRequestExtensions;
117109998Smarkm	} OCSP_ONEREQ;
118109998Smarkm
119109998SmarkmDECLARE_STACK_OF(OCSP_ONEREQ)
120109998SmarkmDECLARE_ASN1_SET_OF(OCSP_ONEREQ)
121109998Smarkm
122109998Smarkm
123109998Smarkm/*   TBSRequest      ::=     SEQUENCE {
124109998Smarkm *       version             [0] EXPLICIT Version DEFAULT v1,
125109998Smarkm *       requestorName       [1] EXPLICIT GeneralName OPTIONAL,
126109998Smarkm *       requestList             SEQUENCE OF Request,
127109998Smarkm *       requestExtensions   [2] EXPLICIT Extensions OPTIONAL }
128109998Smarkm */
129109998Smarkmtypedef struct ocsp_req_info_st
130109998Smarkm	{
131109998Smarkm	ASN1_INTEGER *version;
132109998Smarkm	GENERAL_NAME *requestorName;
133109998Smarkm	STACK_OF(OCSP_ONEREQ) *requestList;
134109998Smarkm	STACK_OF(X509_EXTENSION) *requestExtensions;
135109998Smarkm	} OCSP_REQINFO;
136109998Smarkm
137109998Smarkm/*   Signature       ::=     SEQUENCE {
138109998Smarkm *       signatureAlgorithm   AlgorithmIdentifier,
139109998Smarkm *       signature            BIT STRING,
140109998Smarkm *       certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
141109998Smarkm */
142109998Smarkmtypedef struct ocsp_signature_st
143109998Smarkm	{
144109998Smarkm	X509_ALGOR *signatureAlgorithm;
145109998Smarkm	ASN1_BIT_STRING *signature;
146109998Smarkm	STACK_OF(X509) *certs;
147109998Smarkm	} OCSP_SIGNATURE;
148109998Smarkm
149109998Smarkm/*   OCSPRequest     ::=     SEQUENCE {
150109998Smarkm *       tbsRequest                  TBSRequest,
151109998Smarkm *       optionalSignature   [0]     EXPLICIT Signature OPTIONAL }
152109998Smarkm */
153109998Smarkmtypedef struct ocsp_request_st
154109998Smarkm	{
155109998Smarkm	OCSP_REQINFO *tbsRequest;
156109998Smarkm	OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */
157109998Smarkm	} OCSP_REQUEST;
158109998Smarkm
159109998Smarkm/*   OCSPResponseStatus ::= ENUMERATED {
160109998Smarkm *       successful            (0),      --Response has valid confirmations
161109998Smarkm *       malformedRequest      (1),      --Illegal confirmation request
162109998Smarkm *       internalError         (2),      --Internal error in issuer
163109998Smarkm *       tryLater              (3),      --Try again later
164109998Smarkm *                                       --(4) is not used
165109998Smarkm *       sigRequired           (5),      --Must sign the request
166109998Smarkm *       unauthorized          (6)       --Request unauthorized
167109998Smarkm *   }
168109998Smarkm */
169109998Smarkm#define OCSP_RESPONSE_STATUS_SUCCESSFUL          0
170109998Smarkm#define OCSP_RESPONSE_STATUS_MALFORMEDREQUEST     1
171109998Smarkm#define OCSP_RESPONSE_STATUS_INTERNALERROR        2
172109998Smarkm#define OCSP_RESPONSE_STATUS_TRYLATER             3
173109998Smarkm#define OCSP_RESPONSE_STATUS_SIGREQUIRED          5
174109998Smarkm#define OCSP_RESPONSE_STATUS_UNAUTHORIZED         6
175109998Smarkm
176109998Smarkm/*   ResponseBytes ::=       SEQUENCE {
177109998Smarkm *       responseType   OBJECT IDENTIFIER,
178109998Smarkm *       response       OCTET STRING }
179109998Smarkm */
180109998Smarkmtypedef struct ocsp_resp_bytes_st
181109998Smarkm	{
182109998Smarkm	ASN1_OBJECT *responseType;
183109998Smarkm	ASN1_OCTET_STRING *response;
184109998Smarkm	} OCSP_RESPBYTES;
185109998Smarkm
186109998Smarkm/*   OCSPResponse ::= SEQUENCE {
187109998Smarkm *      responseStatus         OCSPResponseStatus,
188109998Smarkm *      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL }
189109998Smarkm */
190194206Ssimonstruct ocsp_response_st
191109998Smarkm	{
192109998Smarkm	ASN1_ENUMERATED *responseStatus;
193109998Smarkm	OCSP_RESPBYTES  *responseBytes;
194194206Ssimon	};
195109998Smarkm
196109998Smarkm/*   ResponderID ::= CHOICE {
197109998Smarkm *      byName   [1] Name,
198109998Smarkm *      byKey    [2] KeyHash }
199109998Smarkm */
200109998Smarkm#define V_OCSP_RESPID_NAME 0
201109998Smarkm#define V_OCSP_RESPID_KEY  1
202194206Ssimonstruct ocsp_responder_id_st
203109998Smarkm	{
204109998Smarkm	int type;
205109998Smarkm	union   {
206109998Smarkm		X509_NAME* byName;
207109998Smarkm        	ASN1_OCTET_STRING *byKey;
208109998Smarkm		} value;
209194206Ssimon	};
210194206Ssimon
211194206SsimonDECLARE_STACK_OF(OCSP_RESPID)
212194206SsimonDECLARE_ASN1_FUNCTIONS(OCSP_RESPID)
213194206Ssimon
214109998Smarkm/*   KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key
215109998Smarkm *                            --(excluding the tag and length fields)
216109998Smarkm */
217109998Smarkm
218109998Smarkm/*   RevokedInfo ::= SEQUENCE {
219109998Smarkm *       revocationTime              GeneralizedTime,
220109998Smarkm *       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL }
221109998Smarkm */
222109998Smarkmtypedef struct ocsp_revoked_info_st
223109998Smarkm	{
224109998Smarkm	ASN1_GENERALIZEDTIME *revocationTime;
225109998Smarkm	ASN1_ENUMERATED *revocationReason;
226109998Smarkm	} OCSP_REVOKEDINFO;
227109998Smarkm
228109998Smarkm/*   CertStatus ::= CHOICE {
229109998Smarkm *       good                [0]     IMPLICIT NULL,
230109998Smarkm *       revoked             [1]     IMPLICIT RevokedInfo,
231109998Smarkm *       unknown             [2]     IMPLICIT UnknownInfo }
232109998Smarkm */
233109998Smarkm#define V_OCSP_CERTSTATUS_GOOD    0
234109998Smarkm#define V_OCSP_CERTSTATUS_REVOKED 1
235109998Smarkm#define V_OCSP_CERTSTATUS_UNKNOWN 2
236109998Smarkmtypedef struct ocsp_cert_status_st
237109998Smarkm	{
238109998Smarkm	int type;
239109998Smarkm	union	{
240109998Smarkm		ASN1_NULL *good;
241109998Smarkm		OCSP_REVOKEDINFO *revoked;
242109998Smarkm		ASN1_NULL *unknown;
243109998Smarkm		} value;
244109998Smarkm	} OCSP_CERTSTATUS;
245109998Smarkm
246109998Smarkm/*   SingleResponse ::= SEQUENCE {
247109998Smarkm *      certID                       CertID,
248109998Smarkm *      certStatus                   CertStatus,
249109998Smarkm *      thisUpdate                   GeneralizedTime,
250109998Smarkm *      nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL,
251109998Smarkm *      singleExtensions     [1]     EXPLICIT Extensions OPTIONAL }
252109998Smarkm */
253109998Smarkmtypedef struct ocsp_single_response_st
254109998Smarkm	{
255109998Smarkm	OCSP_CERTID *certId;
256109998Smarkm	OCSP_CERTSTATUS *certStatus;
257109998Smarkm	ASN1_GENERALIZEDTIME *thisUpdate;
258109998Smarkm	ASN1_GENERALIZEDTIME *nextUpdate;
259109998Smarkm	STACK_OF(X509_EXTENSION) *singleExtensions;
260109998Smarkm	} OCSP_SINGLERESP;
261109998Smarkm
262109998SmarkmDECLARE_STACK_OF(OCSP_SINGLERESP)
263109998SmarkmDECLARE_ASN1_SET_OF(OCSP_SINGLERESP)
264109998Smarkm
265109998Smarkm/*   ResponseData ::= SEQUENCE {
266109998Smarkm *      version              [0] EXPLICIT Version DEFAULT v1,
267109998Smarkm *      responderID              ResponderID,
268109998Smarkm *      producedAt               GeneralizedTime,
269109998Smarkm *      responses                SEQUENCE OF SingleResponse,
270109998Smarkm *      responseExtensions   [1] EXPLICIT Extensions OPTIONAL }
271109998Smarkm */
272109998Smarkmtypedef struct ocsp_response_data_st
273109998Smarkm	{
274109998Smarkm	ASN1_INTEGER *version;
275109998Smarkm	OCSP_RESPID  *responderId;
276109998Smarkm	ASN1_GENERALIZEDTIME *producedAt;
277109998Smarkm	STACK_OF(OCSP_SINGLERESP) *responses;
278109998Smarkm	STACK_OF(X509_EXTENSION) *responseExtensions;
279109998Smarkm	} OCSP_RESPDATA;
280109998Smarkm
281109998Smarkm/*   BasicOCSPResponse       ::= SEQUENCE {
282109998Smarkm *      tbsResponseData      ResponseData,
283109998Smarkm *      signatureAlgorithm   AlgorithmIdentifier,
284109998Smarkm *      signature            BIT STRING,
285109998Smarkm *      certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL }
286109998Smarkm */
287109998Smarkm  /* Note 1:
288109998Smarkm     The value for "signature" is specified in the OCSP rfc2560 as follows:
289109998Smarkm     "The value for the signature SHALL be computed on the hash of the DER
290109998Smarkm     encoding ResponseData."  This means that you must hash the DER-encoded
291109998Smarkm     tbsResponseData, and then run it through a crypto-signing function, which
292109998Smarkm     will (at least w/RSA) do a hash-'n'-private-encrypt operation.  This seems
293109998Smarkm     a bit odd, but that's the spec.  Also note that the data structures do not
294109998Smarkm     leave anywhere to independently specify the algorithm used for the initial
295109998Smarkm     hash. So, we look at the signature-specification algorithm, and try to do
296109998Smarkm     something intelligent.	-- Kathy Weinhold, CertCo */
297109998Smarkm  /* Note 2:
298109998Smarkm     It seems that the mentioned passage from RFC 2560 (section 4.2.1) is open
299109998Smarkm     for interpretation.  I've done tests against another responder, and found
300109998Smarkm     that it doesn't do the double hashing that the RFC seems to say one
301109998Smarkm     should.  Therefore, all relevant functions take a flag saying which
302109998Smarkm     variant should be used.	-- Richard Levitte, OpenSSL team and CeloCom */
303109998Smarkmtypedef struct ocsp_basic_response_st
304109998Smarkm	{
305109998Smarkm	OCSP_RESPDATA *tbsResponseData;
306109998Smarkm	X509_ALGOR *signatureAlgorithm;
307109998Smarkm	ASN1_BIT_STRING *signature;
308109998Smarkm	STACK_OF(X509) *certs;
309109998Smarkm	} OCSP_BASICRESP;
310109998Smarkm
311109998Smarkm/*
312109998Smarkm *   CRLReason ::= ENUMERATED {
313109998Smarkm *        unspecified             (0),
314109998Smarkm *        keyCompromise           (1),
315109998Smarkm *        cACompromise            (2),
316109998Smarkm *        affiliationChanged      (3),
317109998Smarkm *        superseded              (4),
318109998Smarkm *        cessationOfOperation    (5),
319109998Smarkm *        certificateHold         (6),
320109998Smarkm *        removeFromCRL           (8) }
321109998Smarkm */
322109998Smarkm#define OCSP_REVOKED_STATUS_NOSTATUS               -1
323109998Smarkm#define OCSP_REVOKED_STATUS_UNSPECIFIED             0
324109998Smarkm#define OCSP_REVOKED_STATUS_KEYCOMPROMISE           1
325109998Smarkm#define OCSP_REVOKED_STATUS_CACOMPROMISE            2
326109998Smarkm#define OCSP_REVOKED_STATUS_AFFILIATIONCHANGED      3
327109998Smarkm#define OCSP_REVOKED_STATUS_SUPERSEDED              4
328109998Smarkm#define OCSP_REVOKED_STATUS_CESSATIONOFOPERATION    5
329109998Smarkm#define OCSP_REVOKED_STATUS_CERTIFICATEHOLD         6
330109998Smarkm#define OCSP_REVOKED_STATUS_REMOVEFROMCRL           8
331109998Smarkm
332109998Smarkm/* CrlID ::= SEQUENCE {
333109998Smarkm *     crlUrl               [0]     EXPLICIT IA5String OPTIONAL,
334109998Smarkm *     crlNum               [1]     EXPLICIT INTEGER OPTIONAL,
335109998Smarkm *     crlTime              [2]     EXPLICIT GeneralizedTime OPTIONAL }
336109998Smarkm */
337109998Smarkmtypedef struct ocsp_crl_id_st
338109998Smarkm        {
339109998Smarkm	ASN1_IA5STRING *crlUrl;
340109998Smarkm	ASN1_INTEGER *crlNum;
341109998Smarkm	ASN1_GENERALIZEDTIME *crlTime;
342109998Smarkm        } OCSP_CRLID;
343109998Smarkm
344109998Smarkm/* ServiceLocator ::= SEQUENCE {
345109998Smarkm *      issuer    Name,
346109998Smarkm *      locator   AuthorityInfoAccessSyntax OPTIONAL }
347109998Smarkm */
348109998Smarkmtypedef struct ocsp_service_locator_st
349109998Smarkm        {
350109998Smarkm	X509_NAME* issuer;
351109998Smarkm	STACK_OF(ACCESS_DESCRIPTION) *locator;
352109998Smarkm        } OCSP_SERVICELOC;
353109998Smarkm
354109998Smarkm#define PEM_STRING_OCSP_REQUEST	"OCSP REQUEST"
355109998Smarkm#define PEM_STRING_OCSP_RESPONSE "OCSP RESPONSE"
356109998Smarkm
357160814Ssimon#define d2i_OCSP_REQUEST_bio(bp,p) ASN1_d2i_bio_of(OCSP_REQUEST,OCSP_REQUEST_new,d2i_OCSP_REQUEST,bp,p)
358109998Smarkm
359160814Ssimon#define d2i_OCSP_RESPONSE_bio(bp,p) ASN1_d2i_bio_of(OCSP_RESPONSE,OCSP_RESPONSE_new,d2i_OCSP_RESPONSE,bp,p)
360109998Smarkm
361109998Smarkm#define	PEM_read_bio_OCSP_REQUEST(bp,x,cb) (OCSP_REQUEST *)PEM_ASN1_read_bio( \
362109998Smarkm     (char *(*)())d2i_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,bp,(char **)x,cb,NULL)
363109998Smarkm
364109998Smarkm#define	PEM_read_bio_OCSP_RESPONSE(bp,x,cb)(OCSP_RESPONSE *)PEM_ASN1_read_bio(\
365109998Smarkm     (char *(*)())d2i_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,bp,(char **)x,cb,NULL)
366109998Smarkm
367109998Smarkm#define PEM_write_bio_OCSP_REQUEST(bp,o) \
368109998Smarkm    PEM_ASN1_write_bio((int (*)())i2d_OCSP_REQUEST,PEM_STRING_OCSP_REQUEST,\
369109998Smarkm			bp,(char *)o, NULL,NULL,0,NULL,NULL)
370109998Smarkm
371109998Smarkm#define PEM_write_bio_OCSP_RESPONSE(bp,o) \
372109998Smarkm    PEM_ASN1_write_bio((int (*)())i2d_OCSP_RESPONSE,PEM_STRING_OCSP_RESPONSE,\
373109998Smarkm			bp,(char *)o, NULL,NULL,0,NULL,NULL)
374109998Smarkm
375160814Ssimon#define i2d_OCSP_RESPONSE_bio(bp,o) ASN1_i2d_bio_of(OCSP_RESPONSE,i2d_OCSP_RESPONSE,bp,o)
376109998Smarkm
377160814Ssimon#define i2d_OCSP_REQUEST_bio(bp,o) ASN1_i2d_bio_of(OCSP_REQUEST,i2d_OCSP_REQUEST,bp,o)
378109998Smarkm
379109998Smarkm#define OCSP_REQUEST_sign(o,pkey,md) \
380109998Smarkm	ASN1_item_sign(ASN1_ITEM_rptr(OCSP_REQINFO),\
381109998Smarkm		o->optionalSignature->signatureAlgorithm,NULL,\
382109998Smarkm	        o->optionalSignature->signature,o->tbsRequest,pkey,md)
383109998Smarkm
384109998Smarkm#define OCSP_BASICRESP_sign(o,pkey,md,d) \
385109998Smarkm	ASN1_item_sign(ASN1_ITEM_rptr(OCSP_RESPDATA),o->signatureAlgorithm,NULL,\
386109998Smarkm		o->signature,o->tbsResponseData,pkey,md)
387109998Smarkm
388109998Smarkm#define OCSP_REQUEST_verify(a,r) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_REQINFO),\
389109998Smarkm        a->optionalSignature->signatureAlgorithm,\
390109998Smarkm	a->optionalSignature->signature,a->tbsRequest,r)
391109998Smarkm
392109998Smarkm#define OCSP_BASICRESP_verify(a,r,d) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_RESPDATA),\
393109998Smarkm	a->signatureAlgorithm,a->signature,a->tbsResponseData,r)
394109998Smarkm
395109998Smarkm#define ASN1_BIT_STRING_digest(data,type,md,len) \
396109998Smarkm	ASN1_item_digest(ASN1_ITEM_rptr(ASN1_BIT_STRING),type,data,md,len)
397109998Smarkm
398109998Smarkm#define OCSP_CERTSTATUS_dup(cs)\
399109998Smarkm                (OCSP_CERTSTATUS*)ASN1_dup((int(*)())i2d_OCSP_CERTSTATUS,\
400109998Smarkm		(char *(*)())d2i_OCSP_CERTSTATUS,(char *)(cs))
401109998Smarkm
402238405SjkimOCSP_CERTID *OCSP_CERTID_dup(OCSP_CERTID *id);
403238405Sjkim
404109998SmarkmOCSP_RESPONSE *OCSP_sendreq_bio(BIO *b, char *path, OCSP_REQUEST *req);
405194206SsimonOCSP_REQ_CTX *OCSP_sendreq_new(BIO *io, char *path, OCSP_REQUEST *req,
406194206Ssimon								int maxline);
407194206Ssimonint OCSP_sendreq_nbio(OCSP_RESPONSE **presp, OCSP_REQ_CTX *rctx);
408194206Ssimonvoid OCSP_REQ_CTX_free(OCSP_REQ_CTX *rctx);
409238405Sjkimint OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req);
410238405Sjkimint OCSP_REQ_CTX_add1_header(OCSP_REQ_CTX *rctx,
411238405Sjkim		const char *name, const char *value);
412109998Smarkm
413109998SmarkmOCSP_CERTID *OCSP_cert_to_id(const EVP_MD *dgst, X509 *subject, X509 *issuer);
414109998Smarkm
415109998SmarkmOCSP_CERTID *OCSP_cert_id_new(const EVP_MD *dgst,
416109998Smarkm			      X509_NAME *issuerName,
417109998Smarkm			      ASN1_BIT_STRING* issuerKey,
418109998Smarkm			      ASN1_INTEGER *serialNumber);
419109998Smarkm
420109998SmarkmOCSP_ONEREQ *OCSP_request_add0_id(OCSP_REQUEST *req, OCSP_CERTID *cid);
421109998Smarkm
422109998Smarkmint OCSP_request_add1_nonce(OCSP_REQUEST *req, unsigned char *val, int len);
423109998Smarkmint OCSP_basic_add1_nonce(OCSP_BASICRESP *resp, unsigned char *val, int len);
424109998Smarkmint OCSP_check_nonce(OCSP_REQUEST *req, OCSP_BASICRESP *bs);
425109998Smarkmint OCSP_copy_nonce(OCSP_BASICRESP *resp, OCSP_REQUEST *req);
426109998Smarkm
427109998Smarkmint OCSP_request_set1_name(OCSP_REQUEST *req, X509_NAME *nm);
428109998Smarkmint OCSP_request_add1_cert(OCSP_REQUEST *req, X509 *cert);
429109998Smarkm
430109998Smarkmint OCSP_request_sign(OCSP_REQUEST   *req,
431109998Smarkm		      X509           *signer,
432109998Smarkm		      EVP_PKEY       *key,
433109998Smarkm		      const EVP_MD   *dgst,
434109998Smarkm		      STACK_OF(X509) *certs,
435109998Smarkm		      unsigned long flags);
436109998Smarkm
437109998Smarkmint OCSP_response_status(OCSP_RESPONSE *resp);
438109998SmarkmOCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp);
439109998Smarkm
440109998Smarkmint OCSP_resp_count(OCSP_BASICRESP *bs);
441109998SmarkmOCSP_SINGLERESP *OCSP_resp_get0(OCSP_BASICRESP *bs, int idx);
442109998Smarkmint OCSP_resp_find(OCSP_BASICRESP *bs, OCSP_CERTID *id, int last);
443109998Smarkmint OCSP_single_get0_status(OCSP_SINGLERESP *single, int *reason,
444109998Smarkm				ASN1_GENERALIZEDTIME **revtime,
445109998Smarkm				ASN1_GENERALIZEDTIME **thisupd,
446109998Smarkm				ASN1_GENERALIZEDTIME **nextupd);
447109998Smarkmint OCSP_resp_find_status(OCSP_BASICRESP *bs, OCSP_CERTID *id, int *status,
448109998Smarkm				int *reason,
449109998Smarkm				ASN1_GENERALIZEDTIME **revtime,
450109998Smarkm				ASN1_GENERALIZEDTIME **thisupd,
451109998Smarkm				ASN1_GENERALIZEDTIME **nextupd);
452109998Smarkmint OCSP_check_validity(ASN1_GENERALIZEDTIME *thisupd,
453109998Smarkm			ASN1_GENERALIZEDTIME *nextupd,
454109998Smarkm			long sec, long maxsec);
455109998Smarkm
456109998Smarkmint OCSP_request_verify(OCSP_REQUEST *req, STACK_OF(X509) *certs, X509_STORE *store, unsigned long flags);
457109998Smarkm
458109998Smarkmint OCSP_parse_url(char *url, char **phost, char **pport, char **ppath, int *pssl);
459109998Smarkm
460109998Smarkmint OCSP_id_issuer_cmp(OCSP_CERTID *a, OCSP_CERTID *b);
461109998Smarkmint OCSP_id_cmp(OCSP_CERTID *a, OCSP_CERTID *b);
462109998Smarkm
463109998Smarkmint OCSP_request_onereq_count(OCSP_REQUEST *req);
464109998SmarkmOCSP_ONEREQ *OCSP_request_onereq_get0(OCSP_REQUEST *req, int i);
465109998SmarkmOCSP_CERTID *OCSP_onereq_get0_id(OCSP_ONEREQ *one);
466109998Smarkmint OCSP_id_get0_info(ASN1_OCTET_STRING **piNameHash, ASN1_OBJECT **pmd,
467109998Smarkm			ASN1_OCTET_STRING **pikeyHash,
468109998Smarkm			ASN1_INTEGER **pserial, OCSP_CERTID *cid);
469109998Smarkmint OCSP_request_is_signed(OCSP_REQUEST *req);
470109998SmarkmOCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs);
471109998SmarkmOCSP_SINGLERESP *OCSP_basic_add1_status(OCSP_BASICRESP *rsp,
472109998Smarkm						OCSP_CERTID *cid,
473109998Smarkm						int status, int reason,
474109998Smarkm						ASN1_TIME *revtime,
475109998Smarkm					ASN1_TIME *thisupd, ASN1_TIME *nextupd);
476109998Smarkmint OCSP_basic_add1_cert(OCSP_BASICRESP *resp, X509 *cert);
477109998Smarkmint OCSP_basic_sign(OCSP_BASICRESP *brsp,
478109998Smarkm			X509 *signer, EVP_PKEY *key, const EVP_MD *dgst,
479109998Smarkm			STACK_OF(X509) *certs, unsigned long flags);
480109998Smarkm
481109998SmarkmX509_EXTENSION *OCSP_crlID_new(char *url, long *n, char *tim);
482109998Smarkm
483109998SmarkmX509_EXTENSION *OCSP_accept_responses_new(char **oids);
484109998Smarkm
485109998SmarkmX509_EXTENSION *OCSP_archive_cutoff_new(char* tim);
486109998Smarkm
487109998SmarkmX509_EXTENSION *OCSP_url_svcloc_new(X509_NAME* issuer, char **urls);
488109998Smarkm
489109998Smarkmint OCSP_REQUEST_get_ext_count(OCSP_REQUEST *x);
490109998Smarkmint OCSP_REQUEST_get_ext_by_NID(OCSP_REQUEST *x, int nid, int lastpos);
491109998Smarkmint OCSP_REQUEST_get_ext_by_OBJ(OCSP_REQUEST *x, ASN1_OBJECT *obj, int lastpos);
492109998Smarkmint OCSP_REQUEST_get_ext_by_critical(OCSP_REQUEST *x, int crit, int lastpos);
493109998SmarkmX509_EXTENSION *OCSP_REQUEST_get_ext(OCSP_REQUEST *x, int loc);
494109998SmarkmX509_EXTENSION *OCSP_REQUEST_delete_ext(OCSP_REQUEST *x, int loc);
495109998Smarkmvoid *OCSP_REQUEST_get1_ext_d2i(OCSP_REQUEST *x, int nid, int *crit, int *idx);
496109998Smarkmint OCSP_REQUEST_add1_ext_i2d(OCSP_REQUEST *x, int nid, void *value, int crit,
497109998Smarkm							unsigned long flags);
498109998Smarkmint OCSP_REQUEST_add_ext(OCSP_REQUEST *x, X509_EXTENSION *ex, int loc);
499109998Smarkm
500109998Smarkmint OCSP_ONEREQ_get_ext_count(OCSP_ONEREQ *x);
501109998Smarkmint OCSP_ONEREQ_get_ext_by_NID(OCSP_ONEREQ *x, int nid, int lastpos);
502109998Smarkmint OCSP_ONEREQ_get_ext_by_OBJ(OCSP_ONEREQ *x, ASN1_OBJECT *obj, int lastpos);
503109998Smarkmint OCSP_ONEREQ_get_ext_by_critical(OCSP_ONEREQ *x, int crit, int lastpos);
504109998SmarkmX509_EXTENSION *OCSP_ONEREQ_get_ext(OCSP_ONEREQ *x, int loc);
505109998SmarkmX509_EXTENSION *OCSP_ONEREQ_delete_ext(OCSP_ONEREQ *x, int loc);
506109998Smarkmvoid *OCSP_ONEREQ_get1_ext_d2i(OCSP_ONEREQ *x, int nid, int *crit, int *idx);
507109998Smarkmint OCSP_ONEREQ_add1_ext_i2d(OCSP_ONEREQ *x, int nid, void *value, int crit,
508109998Smarkm							unsigned long flags);
509109998Smarkmint OCSP_ONEREQ_add_ext(OCSP_ONEREQ *x, X509_EXTENSION *ex, int loc);
510109998Smarkm
511109998Smarkmint OCSP_BASICRESP_get_ext_count(OCSP_BASICRESP *x);
512109998Smarkmint OCSP_BASICRESP_get_ext_by_NID(OCSP_BASICRESP *x, int nid, int lastpos);
513109998Smarkmint OCSP_BASICRESP_get_ext_by_OBJ(OCSP_BASICRESP *x, ASN1_OBJECT *obj, int lastpos);
514109998Smarkmint OCSP_BASICRESP_get_ext_by_critical(OCSP_BASICRESP *x, int crit, int lastpos);
515109998SmarkmX509_EXTENSION *OCSP_BASICRESP_get_ext(OCSP_BASICRESP *x, int loc);
516109998SmarkmX509_EXTENSION *OCSP_BASICRESP_delete_ext(OCSP_BASICRESP *x, int loc);
517109998Smarkmvoid *OCSP_BASICRESP_get1_ext_d2i(OCSP_BASICRESP *x, int nid, int *crit, int *idx);
518109998Smarkmint OCSP_BASICRESP_add1_ext_i2d(OCSP_BASICRESP *x, int nid, void *value, int crit,
519109998Smarkm							unsigned long flags);
520109998Smarkmint OCSP_BASICRESP_add_ext(OCSP_BASICRESP *x, X509_EXTENSION *ex, int loc);
521109998Smarkm
522109998Smarkmint OCSP_SINGLERESP_get_ext_count(OCSP_SINGLERESP *x);
523109998Smarkmint OCSP_SINGLERESP_get_ext_by_NID(OCSP_SINGLERESP *x, int nid, int lastpos);
524109998Smarkmint OCSP_SINGLERESP_get_ext_by_OBJ(OCSP_SINGLERESP *x, ASN1_OBJECT *obj, int lastpos);
525109998Smarkmint OCSP_SINGLERESP_get_ext_by_critical(OCSP_SINGLERESP *x, int crit, int lastpos);
526109998SmarkmX509_EXTENSION *OCSP_SINGLERESP_get_ext(OCSP_SINGLERESP *x, int loc);
527109998SmarkmX509_EXTENSION *OCSP_SINGLERESP_delete_ext(OCSP_SINGLERESP *x, int loc);
528109998Smarkmvoid *OCSP_SINGLERESP_get1_ext_d2i(OCSP_SINGLERESP *x, int nid, int *crit, int *idx);
529109998Smarkmint OCSP_SINGLERESP_add1_ext_i2d(OCSP_SINGLERESP *x, int nid, void *value, int crit,
530109998Smarkm							unsigned long flags);
531109998Smarkmint OCSP_SINGLERESP_add_ext(OCSP_SINGLERESP *x, X509_EXTENSION *ex, int loc);
532109998Smarkm
533109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_SINGLERESP)
534109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_CERTSTATUS)
535109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_REVOKEDINFO)
536109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_BASICRESP)
537109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_RESPDATA)
538109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_RESPID)
539109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_RESPONSE)
540109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_RESPBYTES)
541109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_ONEREQ)
542109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_CERTID)
543109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_REQUEST)
544109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_SIGNATURE)
545109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_REQINFO)
546109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_CRLID)
547109998SmarkmDECLARE_ASN1_FUNCTIONS(OCSP_SERVICELOC)
548109998Smarkm
549238405Sjkimconst char *OCSP_response_status_str(long s);
550238405Sjkimconst char *OCSP_cert_status_str(long s);
551238405Sjkimconst char *OCSP_crl_reason_str(long s);
552109998Smarkm
553109998Smarkmint OCSP_REQUEST_print(BIO *bp, OCSP_REQUEST* a, unsigned long flags);
554109998Smarkmint OCSP_RESPONSE_print(BIO *bp, OCSP_RESPONSE* o, unsigned long flags);
555109998Smarkm
556109998Smarkmint OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
557109998Smarkm				X509_STORE *st, unsigned long flags);
558109998Smarkm
559109998Smarkm/* BEGIN ERROR CODES */
560109998Smarkm/* The following lines are auto generated by the script mkerr.pl. Any changes
561109998Smarkm * made after this point may be overwritten when the script is next run.
562109998Smarkm */
563109998Smarkmvoid ERR_load_OCSP_strings(void);
564109998Smarkm
565109998Smarkm/* Error codes for the OCSP functions. */
566109998Smarkm
567109998Smarkm/* Function codes. */
568109998Smarkm#define OCSP_F_ASN1_STRING_ENCODE			 100
569109998Smarkm#define OCSP_F_D2I_OCSP_NONCE				 102
570109998Smarkm#define OCSP_F_OCSP_BASIC_ADD1_STATUS			 103
571109998Smarkm#define OCSP_F_OCSP_BASIC_SIGN				 104
572109998Smarkm#define OCSP_F_OCSP_BASIC_VERIFY			 105
573160814Ssimon#define OCSP_F_OCSP_CERT_ID_NEW				 101
574109998Smarkm#define OCSP_F_OCSP_CHECK_DELEGATED			 106
575109998Smarkm#define OCSP_F_OCSP_CHECK_IDS				 107
576109998Smarkm#define OCSP_F_OCSP_CHECK_ISSUER			 108
577109998Smarkm#define OCSP_F_OCSP_CHECK_VALIDITY			 115
578109998Smarkm#define OCSP_F_OCSP_MATCH_ISSUERID			 109
579109998Smarkm#define OCSP_F_OCSP_PARSE_URL				 114
580109998Smarkm#define OCSP_F_OCSP_REQUEST_SIGN			 110
581109998Smarkm#define OCSP_F_OCSP_REQUEST_VERIFY			 116
582109998Smarkm#define OCSP_F_OCSP_RESPONSE_GET1_BASIC			 111
583109998Smarkm#define OCSP_F_OCSP_SENDREQ_BIO				 112
584238405Sjkim#define OCSP_F_OCSP_SENDREQ_NBIO			 117
585238405Sjkim#define OCSP_F_PARSE_HTTP_LINE1				 118
586109998Smarkm#define OCSP_F_REQUEST_VERIFY				 113
587109998Smarkm
588109998Smarkm/* Reason codes. */
589109998Smarkm#define OCSP_R_BAD_DATA					 100
590109998Smarkm#define OCSP_R_CERTIFICATE_VERIFY_ERROR			 101
591109998Smarkm#define OCSP_R_DIGEST_ERR				 102
592109998Smarkm#define OCSP_R_ERROR_IN_NEXTUPDATE_FIELD		 122
593109998Smarkm#define OCSP_R_ERROR_IN_THISUPDATE_FIELD		 123
594109998Smarkm#define OCSP_R_ERROR_PARSING_URL			 121
595109998Smarkm#define OCSP_R_MISSING_OCSPSIGNING_USAGE		 103
596109998Smarkm#define OCSP_R_NEXTUPDATE_BEFORE_THISUPDATE		 124
597109998Smarkm#define OCSP_R_NOT_BASIC_RESPONSE			 104
598109998Smarkm#define OCSP_R_NO_CERTIFICATES_IN_CHAIN			 105
599109998Smarkm#define OCSP_R_NO_CONTENT				 106
600109998Smarkm#define OCSP_R_NO_PUBLIC_KEY				 107
601109998Smarkm#define OCSP_R_NO_RESPONSE_DATA				 108
602109998Smarkm#define OCSP_R_NO_REVOKED_TIME				 109
603109998Smarkm#define OCSP_R_PRIVATE_KEY_DOES_NOT_MATCH_CERTIFICATE	 110
604109998Smarkm#define OCSP_R_REQUEST_NOT_SIGNED			 128
605109998Smarkm#define OCSP_R_RESPONSE_CONTAINS_NO_REVOCATION_DATA	 111
606109998Smarkm#define OCSP_R_ROOT_CA_NOT_TRUSTED			 112
607109998Smarkm#define OCSP_R_SERVER_READ_ERROR			 113
608109998Smarkm#define OCSP_R_SERVER_RESPONSE_ERROR			 114
609109998Smarkm#define OCSP_R_SERVER_RESPONSE_PARSE_ERROR		 115
610109998Smarkm#define OCSP_R_SERVER_WRITE_ERROR			 116
611109998Smarkm#define OCSP_R_SIGNATURE_FAILURE			 117
612109998Smarkm#define OCSP_R_SIGNER_CERTIFICATE_NOT_FOUND		 118
613109998Smarkm#define OCSP_R_STATUS_EXPIRED				 125
614109998Smarkm#define OCSP_R_STATUS_NOT_YET_VALID			 126
615109998Smarkm#define OCSP_R_STATUS_TOO_OLD				 127
616109998Smarkm#define OCSP_R_UNKNOWN_MESSAGE_DIGEST			 119
617109998Smarkm#define OCSP_R_UNKNOWN_NID				 120
618109998Smarkm#define OCSP_R_UNSUPPORTED_REQUESTORNAME_TYPE		 129
619109998Smarkm
620109998Smarkm#ifdef  __cplusplus
621109998Smarkm}
622109998Smarkm#endif
623109998Smarkm#endif
624