motion-openssl 0.1.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (88) hide show
  1. checksums.yaml +7 -0
  2. data/README.md +53 -0
  3. data/lib/OpenSSL/aes.h +149 -0
  4. data/lib/OpenSSL/asn1.h +1419 -0
  5. data/lib/OpenSSL/asn1_mac.h +579 -0
  6. data/lib/OpenSSL/asn1t.h +973 -0
  7. data/lib/OpenSSL/bio.h +879 -0
  8. data/lib/OpenSSL/blowfish.h +130 -0
  9. data/lib/OpenSSL/bn.h +939 -0
  10. data/lib/OpenSSL/buffer.h +125 -0
  11. data/lib/OpenSSL/camellia.h +132 -0
  12. data/lib/OpenSSL/cast.h +107 -0
  13. data/lib/OpenSSL/cmac.h +82 -0
  14. data/lib/OpenSSL/cms.h +555 -0
  15. data/lib/OpenSSL/comp.h +79 -0
  16. data/lib/OpenSSL/conf.h +267 -0
  17. data/lib/OpenSSL/conf_api.h +89 -0
  18. data/lib/OpenSSL/crypto.h +661 -0
  19. data/lib/OpenSSL/des.h +257 -0
  20. data/lib/OpenSSL/des_old.h +497 -0
  21. data/lib/OpenSSL/dh.h +392 -0
  22. data/lib/OpenSSL/dsa.h +332 -0
  23. data/lib/OpenSSL/dso.h +451 -0
  24. data/lib/OpenSSL/dtls1.h +272 -0
  25. data/lib/OpenSSL/e_os2.h +328 -0
  26. data/lib/OpenSSL/ebcdic.h +26 -0
  27. data/lib/OpenSSL/ec.h +1282 -0
  28. data/lib/OpenSSL/ecdh.h +134 -0
  29. data/lib/OpenSSL/ecdsa.h +335 -0
  30. data/lib/OpenSSL/engine.h +960 -0
  31. data/lib/OpenSSL/err.h +389 -0
  32. data/lib/OpenSSL/evp.h +1534 -0
  33. data/lib/OpenSSL/hmac.h +109 -0
  34. data/lib/OpenSSL/idea.h +105 -0
  35. data/lib/OpenSSL/krb5_asn.h +240 -0
  36. data/lib/OpenSSL/kssl.h +197 -0
  37. data/lib/OpenSSL/lhash.h +240 -0
  38. data/lib/OpenSSL/libcrypto-tvOS.a +0 -0
  39. data/lib/OpenSSL/libcrypto.a +0 -0
  40. data/lib/OpenSSL/libssl-tvOS.a +0 -0
  41. data/lib/OpenSSL/libssl.a +0 -0
  42. data/lib/OpenSSL/md4.h +119 -0
  43. data/lib/OpenSSL/md5.h +119 -0
  44. data/lib/OpenSSL/mdc2.h +94 -0
  45. data/lib/OpenSSL/modes.h +163 -0
  46. data/lib/OpenSSL/obj_mac.h +4194 -0
  47. data/lib/OpenSSL/objects.h +1143 -0
  48. data/lib/OpenSSL/ocsp.h +637 -0
  49. data/lib/OpenSSL/opensslconf.h +262 -0
  50. data/lib/OpenSSL/opensslv.h +97 -0
  51. data/lib/OpenSSL/ossl_typ.h +211 -0
  52. data/lib/OpenSSL/pem.h +615 -0
  53. data/lib/OpenSSL/pem2.h +70 -0
  54. data/lib/OpenSSL/pkcs12.h +342 -0
  55. data/lib/OpenSSL/pkcs7.h +481 -0
  56. data/lib/OpenSSL/pqueue.h +99 -0
  57. data/lib/OpenSSL/rand.h +150 -0
  58. data/lib/OpenSSL/rc2.h +103 -0
  59. data/lib/OpenSSL/rc4.h +88 -0
  60. data/lib/OpenSSL/ripemd.h +105 -0
  61. data/lib/OpenSSL/rsa.h +664 -0
  62. data/lib/OpenSSL/safestack.h +2672 -0
  63. data/lib/OpenSSL/seed.h +149 -0
  64. data/lib/OpenSSL/sha.h +214 -0
  65. data/lib/OpenSSL/srp.h +169 -0
  66. data/lib/OpenSSL/srtp.h +147 -0
  67. data/lib/OpenSSL/ssl.h +3168 -0
  68. data/lib/OpenSSL/ssl2.h +265 -0
  69. data/lib/OpenSSL/ssl23.h +84 -0
  70. data/lib/OpenSSL/ssl3.h +774 -0
  71. data/lib/OpenSSL/stack.h +107 -0
  72. data/lib/OpenSSL/symhacks.h +516 -0
  73. data/lib/OpenSSL/tls1.h +810 -0
  74. data/lib/OpenSSL/ts.h +862 -0
  75. data/lib/OpenSSL/txt_db.h +112 -0
  76. data/lib/OpenSSL/ui.h +415 -0
  77. data/lib/OpenSSL/ui_compat.h +88 -0
  78. data/lib/OpenSSL/whrlpool.h +41 -0
  79. data/lib/OpenSSL/x509.h +1327 -0
  80. data/lib/OpenSSL/x509_vfy.h +647 -0
  81. data/lib/OpenSSL/x509v3.h +1055 -0
  82. data/lib/motion-openssl.rb +8 -0
  83. data/lib/motion-openssl/hooks.rb +8 -0
  84. data/lib/motion-openssl/hooks/openssl.rb +20 -0
  85. data/lib/motion-openssl/version.rb +5 -0
  86. data/motion/openssl.rb +1 -0
  87. data/motion/openssl/random.rb +18 -0
  88. metadata +229 -0
@@ -0,0 +1,647 @@
1
+ /* crypto/x509/x509_vfy.h */
2
+ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3
+ * All rights reserved.
4
+ *
5
+ * This package is an SSL implementation written
6
+ * by Eric Young (eay@cryptsoft.com).
7
+ * The implementation was written so as to conform with Netscapes SSL.
8
+ *
9
+ * This library is free for commercial and non-commercial use as long as
10
+ * the following conditions are aheared to. The following conditions
11
+ * apply to all code found in this distribution, be it the RC4, RSA,
12
+ * lhash, DES, etc., code; not just the SSL code. The SSL documentation
13
+ * included with this distribution is covered by the same copyright terms
14
+ * except that the holder is Tim Hudson (tjh@cryptsoft.com).
15
+ *
16
+ * Copyright remains Eric Young's, and as such any Copyright notices in
17
+ * the code are not to be removed.
18
+ * If this package is used in a product, Eric Young should be given attribution
19
+ * as the author of the parts of the library used.
20
+ * This can be in the form of a textual message at program startup or
21
+ * in documentation (online or textual) provided with the package.
22
+ *
23
+ * Redistribution and use in source and binary forms, with or without
24
+ * modification, are permitted provided that the following conditions
25
+ * are met:
26
+ * 1. Redistributions of source code must retain the copyright
27
+ * notice, this list of conditions and the following disclaimer.
28
+ * 2. Redistributions in binary form must reproduce the above copyright
29
+ * notice, this list of conditions and the following disclaimer in the
30
+ * documentation and/or other materials provided with the distribution.
31
+ * 3. All advertising materials mentioning features or use of this software
32
+ * must display the following acknowledgement:
33
+ * "This product includes cryptographic software written by
34
+ * Eric Young (eay@cryptsoft.com)"
35
+ * The word 'cryptographic' can be left out if the rouines from the library
36
+ * being used are not cryptographic related :-).
37
+ * 4. If you include any Windows specific code (or a derivative thereof) from
38
+ * the apps directory (application code) you must include an acknowledgement:
39
+ * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
40
+ *
41
+ * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
42
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
43
+ * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
44
+ * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
45
+ * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
46
+ * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
47
+ * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
48
+ * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
49
+ * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
50
+ * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
51
+ * SUCH DAMAGE.
52
+ *
53
+ * The licence and distribution terms for any publically available version or
54
+ * derivative of this code cannot be changed. i.e. this code cannot simply be
55
+ * copied and put under another distribution licence
56
+ * [including the GNU Public Licence.]
57
+ */
58
+
59
+ #ifndef HEADER_X509_H
60
+ # include <openssl/x509.h>
61
+ /*
62
+ * openssl/x509.h ends up #include-ing this file at about the only
63
+ * appropriate moment.
64
+ */
65
+ #endif
66
+
67
+ #ifndef HEADER_X509_VFY_H
68
+ # define HEADER_X509_VFY_H
69
+
70
+ # include <openssl/opensslconf.h>
71
+ # ifndef OPENSSL_NO_LHASH
72
+ # include <openssl/lhash.h>
73
+ # endif
74
+ # include <openssl/bio.h>
75
+ # include <openssl/crypto.h>
76
+ # include <openssl/symhacks.h>
77
+
78
+ #ifdef __cplusplus
79
+ extern "C" {
80
+ #endif
81
+
82
+ # if 0
83
+ /* Outer object */
84
+ typedef struct x509_hash_dir_st {
85
+ int num_dirs;
86
+ char **dirs;
87
+ int *dirs_type;
88
+ int num_dirs_alloced;
89
+ } X509_HASH_DIR_CTX;
90
+ # endif
91
+
92
+ typedef struct x509_file_st {
93
+ int num_paths; /* number of paths to files or directories */
94
+ int num_alloced;
95
+ char **paths; /* the list of paths or directories */
96
+ int *path_type;
97
+ } X509_CERT_FILE_CTX;
98
+
99
+ /*******************************/
100
+ /*-
101
+ SSL_CTX -> X509_STORE
102
+ -> X509_LOOKUP
103
+ ->X509_LOOKUP_METHOD
104
+ -> X509_LOOKUP
105
+ ->X509_LOOKUP_METHOD
106
+
107
+ SSL -> X509_STORE_CTX
108
+ ->X509_STORE
109
+
110
+ The X509_STORE holds the tables etc for verification stuff.
111
+ A X509_STORE_CTX is used while validating a single certificate.
112
+ The X509_STORE has X509_LOOKUPs for looking up certs.
113
+ The X509_STORE then calls a function to actually verify the
114
+ certificate chain.
115
+ */
116
+
117
+ # define X509_LU_RETRY -1
118
+ # define X509_LU_FAIL 0
119
+ # define X509_LU_X509 1
120
+ # define X509_LU_CRL 2
121
+ # define X509_LU_PKEY 3
122
+
123
+ typedef struct x509_object_st {
124
+ /* one of the above types */
125
+ int type;
126
+ union {
127
+ char *ptr;
128
+ X509 *x509;
129
+ X509_CRL *crl;
130
+ EVP_PKEY *pkey;
131
+ } data;
132
+ } X509_OBJECT;
133
+
134
+ typedef struct x509_lookup_st X509_LOOKUP;
135
+
136
+ DECLARE_STACK_OF(X509_LOOKUP)
137
+ DECLARE_STACK_OF(X509_OBJECT)
138
+
139
+ /* This is a static that defines the function interface */
140
+ typedef struct x509_lookup_method_st {
141
+ const char *name;
142
+ int (*new_item) (X509_LOOKUP *ctx);
143
+ void (*free) (X509_LOOKUP *ctx);
144
+ int (*init) (X509_LOOKUP *ctx);
145
+ int (*shutdown) (X509_LOOKUP *ctx);
146
+ int (*ctrl) (X509_LOOKUP *ctx, int cmd, const char *argc, long argl,
147
+ char **ret);
148
+ int (*get_by_subject) (X509_LOOKUP *ctx, int type, X509_NAME *name,
149
+ X509_OBJECT *ret);
150
+ int (*get_by_issuer_serial) (X509_LOOKUP *ctx, int type, X509_NAME *name,
151
+ ASN1_INTEGER *serial, X509_OBJECT *ret);
152
+ int (*get_by_fingerprint) (X509_LOOKUP *ctx, int type,
153
+ unsigned char *bytes, int len,
154
+ X509_OBJECT *ret);
155
+ int (*get_by_alias) (X509_LOOKUP *ctx, int type, char *str, int len,
156
+ X509_OBJECT *ret);
157
+ } X509_LOOKUP_METHOD;
158
+
159
+ typedef struct X509_VERIFY_PARAM_ID_st X509_VERIFY_PARAM_ID;
160
+
161
+ /*
162
+ * This structure hold all parameters associated with a verify operation by
163
+ * including an X509_VERIFY_PARAM structure in related structures the
164
+ * parameters used can be customized
165
+ */
166
+
167
+ typedef struct X509_VERIFY_PARAM_st {
168
+ char *name;
169
+ time_t check_time; /* Time to use */
170
+ unsigned long inh_flags; /* Inheritance flags */
171
+ unsigned long flags; /* Various verify flags */
172
+ int purpose; /* purpose to check untrusted certificates */
173
+ int trust; /* trust setting to check */
174
+ int depth; /* Verify depth */
175
+ STACK_OF(ASN1_OBJECT) *policies; /* Permissible policies */
176
+ X509_VERIFY_PARAM_ID *id; /* opaque ID data */
177
+ } X509_VERIFY_PARAM;
178
+
179
+ DECLARE_STACK_OF(X509_VERIFY_PARAM)
180
+
181
+ /*
182
+ * This is used to hold everything. It is used for all certificate
183
+ * validation. Once we have a certificate chain, the 'verify' function is
184
+ * then called to actually check the cert chain.
185
+ */
186
+ struct x509_store_st {
187
+ /* The following is a cache of trusted certs */
188
+ int cache; /* if true, stash any hits */
189
+ STACK_OF(X509_OBJECT) *objs; /* Cache of all objects */
190
+ /* These are external lookup methods */
191
+ STACK_OF(X509_LOOKUP) *get_cert_methods;
192
+ X509_VERIFY_PARAM *param;
193
+ /* Callbacks for various operations */
194
+ /* called to verify a certificate */
195
+ int (*verify) (X509_STORE_CTX *ctx);
196
+ /* error callback */
197
+ int (*verify_cb) (int ok, X509_STORE_CTX *ctx);
198
+ /* get issuers cert from ctx */
199
+ int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
200
+ /* check issued */
201
+ int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
202
+ /* Check revocation status of chain */
203
+ int (*check_revocation) (X509_STORE_CTX *ctx);
204
+ /* retrieve CRL */
205
+ int (*get_crl) (X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x);
206
+ /* Check CRL validity */
207
+ int (*check_crl) (X509_STORE_CTX *ctx, X509_CRL *crl);
208
+ /* Check certificate against CRL */
209
+ int (*cert_crl) (X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x);
210
+ STACK_OF(X509) *(*lookup_certs) (X509_STORE_CTX *ctx, X509_NAME *nm);
211
+ STACK_OF(X509_CRL) *(*lookup_crls) (X509_STORE_CTX *ctx, X509_NAME *nm);
212
+ int (*cleanup) (X509_STORE_CTX *ctx);
213
+ CRYPTO_EX_DATA ex_data;
214
+ int references;
215
+ } /* X509_STORE */ ;
216
+
217
+ int X509_STORE_set_depth(X509_STORE *store, int depth);
218
+
219
+ # define X509_STORE_set_verify_cb_func(ctx,func) ((ctx)->verify_cb=(func))
220
+ # define X509_STORE_set_verify_func(ctx,func) ((ctx)->verify=(func))
221
+
222
+ /* This is the functions plus an instance of the local variables. */
223
+ struct x509_lookup_st {
224
+ int init; /* have we been started */
225
+ int skip; /* don't use us. */
226
+ X509_LOOKUP_METHOD *method; /* the functions */
227
+ char *method_data; /* method data */
228
+ X509_STORE *store_ctx; /* who owns us */
229
+ } /* X509_LOOKUP */ ;
230
+
231
+ /*
232
+ * This is a used when verifying cert chains. Since the gathering of the
233
+ * cert chain can take some time (and have to be 'retried', this needs to be
234
+ * kept and passed around.
235
+ */
236
+ struct x509_store_ctx_st { /* X509_STORE_CTX */
237
+ X509_STORE *ctx;
238
+ /* used when looking up certs */
239
+ int current_method;
240
+ /* The following are set by the caller */
241
+ /* The cert to check */
242
+ X509 *cert;
243
+ /* chain of X509s - untrusted - passed in */
244
+ STACK_OF(X509) *untrusted;
245
+ /* set of CRLs passed in */
246
+ STACK_OF(X509_CRL) *crls;
247
+ X509_VERIFY_PARAM *param;
248
+ /* Other info for use with get_issuer() */
249
+ void *other_ctx;
250
+ /* Callbacks for various operations */
251
+ /* called to verify a certificate */
252
+ int (*verify) (X509_STORE_CTX *ctx);
253
+ /* error callback */
254
+ int (*verify_cb) (int ok, X509_STORE_CTX *ctx);
255
+ /* get issuers cert from ctx */
256
+ int (*get_issuer) (X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
257
+ /* check issued */
258
+ int (*check_issued) (X509_STORE_CTX *ctx, X509 *x, X509 *issuer);
259
+ /* Check revocation status of chain */
260
+ int (*check_revocation) (X509_STORE_CTX *ctx);
261
+ /* retrieve CRL */
262
+ int (*get_crl) (X509_STORE_CTX *ctx, X509_CRL **crl, X509 *x);
263
+ /* Check CRL validity */
264
+ int (*check_crl) (X509_STORE_CTX *ctx, X509_CRL *crl);
265
+ /* Check certificate against CRL */
266
+ int (*cert_crl) (X509_STORE_CTX *ctx, X509_CRL *crl, X509 *x);
267
+ int (*check_policy) (X509_STORE_CTX *ctx);
268
+ STACK_OF(X509) *(*lookup_certs) (X509_STORE_CTX *ctx, X509_NAME *nm);
269
+ STACK_OF(X509_CRL) *(*lookup_crls) (X509_STORE_CTX *ctx, X509_NAME *nm);
270
+ int (*cleanup) (X509_STORE_CTX *ctx);
271
+ /* The following is built up */
272
+ /* if 0, rebuild chain */
273
+ int valid;
274
+ /* index of last untrusted cert */
275
+ int last_untrusted;
276
+ /* chain of X509s - built up and trusted */
277
+ STACK_OF(X509) *chain;
278
+ /* Valid policy tree */
279
+ X509_POLICY_TREE *tree;
280
+ /* Require explicit policy value */
281
+ int explicit_policy;
282
+ /* When something goes wrong, this is why */
283
+ int error_depth;
284
+ int error;
285
+ X509 *current_cert;
286
+ /* cert currently being tested as valid issuer */
287
+ X509 *current_issuer;
288
+ /* current CRL */
289
+ X509_CRL *current_crl;
290
+ /* score of current CRL */
291
+ int current_crl_score;
292
+ /* Reason mask */
293
+ unsigned int current_reasons;
294
+ /* For CRL path validation: parent context */
295
+ X509_STORE_CTX *parent;
296
+ CRYPTO_EX_DATA ex_data;
297
+ } /* X509_STORE_CTX */ ;
298
+
299
+ void X509_STORE_CTX_set_depth(X509_STORE_CTX *ctx, int depth);
300
+
301
+ # define X509_STORE_CTX_set_app_data(ctx,data) \
302
+ X509_STORE_CTX_set_ex_data(ctx,0,data)
303
+ # define X509_STORE_CTX_get_app_data(ctx) \
304
+ X509_STORE_CTX_get_ex_data(ctx,0)
305
+
306
+ # define X509_L_FILE_LOAD 1
307
+ # define X509_L_ADD_DIR 2
308
+
309
+ # define X509_LOOKUP_load_file(x,name,type) \
310
+ X509_LOOKUP_ctrl((x),X509_L_FILE_LOAD,(name),(long)(type),NULL)
311
+
312
+ # define X509_LOOKUP_add_dir(x,name,type) \
313
+ X509_LOOKUP_ctrl((x),X509_L_ADD_DIR,(name),(long)(type),NULL)
314
+
315
+ # define X509_V_OK 0
316
+ /* illegal error (for uninitialized values, to avoid X509_V_OK): 1 */
317
+
318
+ # define X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT 2
319
+ # define X509_V_ERR_UNABLE_TO_GET_CRL 3
320
+ # define X509_V_ERR_UNABLE_TO_DECRYPT_CERT_SIGNATURE 4
321
+ # define X509_V_ERR_UNABLE_TO_DECRYPT_CRL_SIGNATURE 5
322
+ # define X509_V_ERR_UNABLE_TO_DECODE_ISSUER_PUBLIC_KEY 6
323
+ # define X509_V_ERR_CERT_SIGNATURE_FAILURE 7
324
+ # define X509_V_ERR_CRL_SIGNATURE_FAILURE 8
325
+ # define X509_V_ERR_CERT_NOT_YET_VALID 9
326
+ # define X509_V_ERR_CERT_HAS_EXPIRED 10
327
+ # define X509_V_ERR_CRL_NOT_YET_VALID 11
328
+ # define X509_V_ERR_CRL_HAS_EXPIRED 12
329
+ # define X509_V_ERR_ERROR_IN_CERT_NOT_BEFORE_FIELD 13
330
+ # define X509_V_ERR_ERROR_IN_CERT_NOT_AFTER_FIELD 14
331
+ # define X509_V_ERR_ERROR_IN_CRL_LAST_UPDATE_FIELD 15
332
+ # define X509_V_ERR_ERROR_IN_CRL_NEXT_UPDATE_FIELD 16
333
+ # define X509_V_ERR_OUT_OF_MEM 17
334
+ # define X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT 18
335
+ # define X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN 19
336
+ # define X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT_LOCALLY 20
337
+ # define X509_V_ERR_UNABLE_TO_VERIFY_LEAF_SIGNATURE 21
338
+ # define X509_V_ERR_CERT_CHAIN_TOO_LONG 22
339
+ # define X509_V_ERR_CERT_REVOKED 23
340
+ # define X509_V_ERR_INVALID_CA 24
341
+ # define X509_V_ERR_PATH_LENGTH_EXCEEDED 25
342
+ # define X509_V_ERR_INVALID_PURPOSE 26
343
+ # define X509_V_ERR_CERT_UNTRUSTED 27
344
+ # define X509_V_ERR_CERT_REJECTED 28
345
+ /* These are 'informational' when looking for issuer cert */
346
+ # define X509_V_ERR_SUBJECT_ISSUER_MISMATCH 29
347
+ # define X509_V_ERR_AKID_SKID_MISMATCH 30
348
+ # define X509_V_ERR_AKID_ISSUER_SERIAL_MISMATCH 31
349
+ # define X509_V_ERR_KEYUSAGE_NO_CERTSIGN 32
350
+
351
+ # define X509_V_ERR_UNABLE_TO_GET_CRL_ISSUER 33
352
+ # define X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION 34
353
+ # define X509_V_ERR_KEYUSAGE_NO_CRL_SIGN 35
354
+ # define X509_V_ERR_UNHANDLED_CRITICAL_CRL_EXTENSION 36
355
+ # define X509_V_ERR_INVALID_NON_CA 37
356
+ # define X509_V_ERR_PROXY_PATH_LENGTH_EXCEEDED 38
357
+ # define X509_V_ERR_KEYUSAGE_NO_DIGITAL_SIGNATURE 39
358
+ # define X509_V_ERR_PROXY_CERTIFICATES_NOT_ALLOWED 40
359
+
360
+ # define X509_V_ERR_INVALID_EXTENSION 41
361
+ # define X509_V_ERR_INVALID_POLICY_EXTENSION 42
362
+ # define X509_V_ERR_NO_EXPLICIT_POLICY 43
363
+ # define X509_V_ERR_DIFFERENT_CRL_SCOPE 44
364
+ # define X509_V_ERR_UNSUPPORTED_EXTENSION_FEATURE 45
365
+
366
+ # define X509_V_ERR_UNNESTED_RESOURCE 46
367
+
368
+ # define X509_V_ERR_PERMITTED_VIOLATION 47
369
+ # define X509_V_ERR_EXCLUDED_VIOLATION 48
370
+ # define X509_V_ERR_SUBTREE_MINMAX 49
371
+ # define X509_V_ERR_UNSUPPORTED_CONSTRAINT_TYPE 51
372
+ # define X509_V_ERR_UNSUPPORTED_CONSTRAINT_SYNTAX 52
373
+ # define X509_V_ERR_UNSUPPORTED_NAME_SYNTAX 53
374
+ # define X509_V_ERR_CRL_PATH_VALIDATION_ERROR 54
375
+
376
+ /* Suite B mode algorithm violation */
377
+ # define X509_V_ERR_SUITE_B_INVALID_VERSION 56
378
+ # define X509_V_ERR_SUITE_B_INVALID_ALGORITHM 57
379
+ # define X509_V_ERR_SUITE_B_INVALID_CURVE 58
380
+ # define X509_V_ERR_SUITE_B_INVALID_SIGNATURE_ALGORITHM 59
381
+ # define X509_V_ERR_SUITE_B_LOS_NOT_ALLOWED 60
382
+ # define X509_V_ERR_SUITE_B_CANNOT_SIGN_P_384_WITH_P_256 61
383
+
384
+ /* Host, email and IP check errors */
385
+ # define X509_V_ERR_HOSTNAME_MISMATCH 62
386
+ # define X509_V_ERR_EMAIL_MISMATCH 63
387
+ # define X509_V_ERR_IP_ADDRESS_MISMATCH 64
388
+
389
+ /* The application is not happy */
390
+ # define X509_V_ERR_APPLICATION_VERIFICATION 50
391
+
392
+ /* Certificate verify flags */
393
+
394
+ /* Send issuer+subject checks to verify_cb */
395
+ # define X509_V_FLAG_CB_ISSUER_CHECK 0x1
396
+ /* Use check time instead of current time */
397
+ # define X509_V_FLAG_USE_CHECK_TIME 0x2
398
+ /* Lookup CRLs */
399
+ # define X509_V_FLAG_CRL_CHECK 0x4
400
+ /* Lookup CRLs for whole chain */
401
+ # define X509_V_FLAG_CRL_CHECK_ALL 0x8
402
+ /* Ignore unhandled critical extensions */
403
+ # define X509_V_FLAG_IGNORE_CRITICAL 0x10
404
+ /* Disable workarounds for broken certificates */
405
+ # define X509_V_FLAG_X509_STRICT 0x20
406
+ /* Enable proxy certificate validation */
407
+ # define X509_V_FLAG_ALLOW_PROXY_CERTS 0x40
408
+ /* Enable policy checking */
409
+ # define X509_V_FLAG_POLICY_CHECK 0x80
410
+ /* Policy variable require-explicit-policy */
411
+ # define X509_V_FLAG_EXPLICIT_POLICY 0x100
412
+ /* Policy variable inhibit-any-policy */
413
+ # define X509_V_FLAG_INHIBIT_ANY 0x200
414
+ /* Policy variable inhibit-policy-mapping */
415
+ # define X509_V_FLAG_INHIBIT_MAP 0x400
416
+ /* Notify callback that policy is OK */
417
+ # define X509_V_FLAG_NOTIFY_POLICY 0x800
418
+ /* Extended CRL features such as indirect CRLs, alternate CRL signing keys */
419
+ # define X509_V_FLAG_EXTENDED_CRL_SUPPORT 0x1000
420
+ /* Delta CRL support */
421
+ # define X509_V_FLAG_USE_DELTAS 0x2000
422
+ /* Check selfsigned CA signature */
423
+ # define X509_V_FLAG_CHECK_SS_SIGNATURE 0x4000
424
+ /* Use trusted store first */
425
+ # define X509_V_FLAG_TRUSTED_FIRST 0x8000
426
+ /* Suite B 128 bit only mode: not normally used */
427
+ # define X509_V_FLAG_SUITEB_128_LOS_ONLY 0x10000
428
+ /* Suite B 192 bit only mode */
429
+ # define X509_V_FLAG_SUITEB_192_LOS 0x20000
430
+ /* Suite B 128 bit mode allowing 192 bit algorithms */
431
+ # define X509_V_FLAG_SUITEB_128_LOS 0x30000
432
+
433
+ /* Allow partial chains if at least one certificate is in trusted store */
434
+ # define X509_V_FLAG_PARTIAL_CHAIN 0x80000
435
+ /*
436
+ * If the initial chain is not trusted, do not attempt to build an alternative
437
+ * chain. Alternate chain checking was introduced in 1.0.2b. Setting this flag
438
+ * will force the behaviour to match that of previous versions.
439
+ */
440
+ # define X509_V_FLAG_NO_ALT_CHAINS 0x100000
441
+
442
+ # define X509_VP_FLAG_DEFAULT 0x1
443
+ # define X509_VP_FLAG_OVERWRITE 0x2
444
+ # define X509_VP_FLAG_RESET_FLAGS 0x4
445
+ # define X509_VP_FLAG_LOCKED 0x8
446
+ # define X509_VP_FLAG_ONCE 0x10
447
+
448
+ /* Internal use: mask of policy related options */
449
+ # define X509_V_FLAG_POLICY_MASK (X509_V_FLAG_POLICY_CHECK \
450
+ | X509_V_FLAG_EXPLICIT_POLICY \
451
+ | X509_V_FLAG_INHIBIT_ANY \
452
+ | X509_V_FLAG_INHIBIT_MAP)
453
+
454
+ int X509_OBJECT_idx_by_subject(STACK_OF(X509_OBJECT) *h, int type,
455
+ X509_NAME *name);
456
+ X509_OBJECT *X509_OBJECT_retrieve_by_subject(STACK_OF(X509_OBJECT) *h,
457
+ int type, X509_NAME *name);
458
+ X509_OBJECT *X509_OBJECT_retrieve_match(STACK_OF(X509_OBJECT) *h,
459
+ X509_OBJECT *x);
460
+ void X509_OBJECT_up_ref_count(X509_OBJECT *a);
461
+ void X509_OBJECT_free_contents(X509_OBJECT *a);
462
+ X509_STORE *X509_STORE_new(void);
463
+ void X509_STORE_free(X509_STORE *v);
464
+
465
+ STACK_OF(X509) *X509_STORE_get1_certs(X509_STORE_CTX *st, X509_NAME *nm);
466
+ STACK_OF(X509_CRL) *X509_STORE_get1_crls(X509_STORE_CTX *st, X509_NAME *nm);
467
+ int X509_STORE_set_flags(X509_STORE *ctx, unsigned long flags);
468
+ int X509_STORE_set_purpose(X509_STORE *ctx, int purpose);
469
+ int X509_STORE_set_trust(X509_STORE *ctx, int trust);
470
+ int X509_STORE_set1_param(X509_STORE *ctx, X509_VERIFY_PARAM *pm);
471
+
472
+ void X509_STORE_set_verify_cb(X509_STORE *ctx,
473
+ int (*verify_cb) (int, X509_STORE_CTX *));
474
+
475
+ void X509_STORE_set_lookup_crls_cb(X509_STORE *ctx,
476
+ STACK_OF(X509_CRL) *(*cb) (X509_STORE_CTX
477
+ *ctx,
478
+ X509_NAME *nm));
479
+
480
+ X509_STORE_CTX *X509_STORE_CTX_new(void);
481
+
482
+ int X509_STORE_CTX_get1_issuer(X509 **issuer, X509_STORE_CTX *ctx, X509 *x);
483
+
484
+ void X509_STORE_CTX_free(X509_STORE_CTX *ctx);
485
+ int X509_STORE_CTX_init(X509_STORE_CTX *ctx, X509_STORE *store,
486
+ X509 *x509, STACK_OF(X509) *chain);
487
+ void X509_STORE_CTX_trusted_stack(X509_STORE_CTX *ctx, STACK_OF(X509) *sk);
488
+ void X509_STORE_CTX_cleanup(X509_STORE_CTX *ctx);
489
+
490
+ X509_STORE *X509_STORE_CTX_get0_store(X509_STORE_CTX *ctx);
491
+
492
+ X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *v, X509_LOOKUP_METHOD *m);
493
+
494
+ X509_LOOKUP_METHOD *X509_LOOKUP_hash_dir(void);
495
+ X509_LOOKUP_METHOD *X509_LOOKUP_file(void);
496
+
497
+ int X509_STORE_add_cert(X509_STORE *ctx, X509 *x);
498
+ int X509_STORE_add_crl(X509_STORE *ctx, X509_CRL *x);
499
+
500
+ int X509_STORE_get_by_subject(X509_STORE_CTX *vs, int type, X509_NAME *name,
501
+ X509_OBJECT *ret);
502
+
503
+ int X509_LOOKUP_ctrl(X509_LOOKUP *ctx, int cmd, const char *argc,
504
+ long argl, char **ret);
505
+
506
+ # ifndef OPENSSL_NO_STDIO
507
+ int X509_load_cert_file(X509_LOOKUP *ctx, const char *file, int type);
508
+ int X509_load_crl_file(X509_LOOKUP *ctx, const char *file, int type);
509
+ int X509_load_cert_crl_file(X509_LOOKUP *ctx, const char *file, int type);
510
+ # endif
511
+
512
+ X509_LOOKUP *X509_LOOKUP_new(X509_LOOKUP_METHOD *method);
513
+ void X509_LOOKUP_free(X509_LOOKUP *ctx);
514
+ int X509_LOOKUP_init(X509_LOOKUP *ctx);
515
+ int X509_LOOKUP_by_subject(X509_LOOKUP *ctx, int type, X509_NAME *name,
516
+ X509_OBJECT *ret);
517
+ int X509_LOOKUP_by_issuer_serial(X509_LOOKUP *ctx, int type, X509_NAME *name,
518
+ ASN1_INTEGER *serial, X509_OBJECT *ret);
519
+ int X509_LOOKUP_by_fingerprint(X509_LOOKUP *ctx, int type,
520
+ unsigned char *bytes, int len,
521
+ X509_OBJECT *ret);
522
+ int X509_LOOKUP_by_alias(X509_LOOKUP *ctx, int type, char *str, int len,
523
+ X509_OBJECT *ret);
524
+ int X509_LOOKUP_shutdown(X509_LOOKUP *ctx);
525
+
526
+ # ifndef OPENSSL_NO_STDIO
527
+ int X509_STORE_load_locations(X509_STORE *ctx,
528
+ const char *file, const char *dir);
529
+ int X509_STORE_set_default_paths(X509_STORE *ctx);
530
+ # endif
531
+
532
+ int X509_STORE_CTX_get_ex_new_index(long argl, void *argp,
533
+ CRYPTO_EX_new *new_func,
534
+ CRYPTO_EX_dup *dup_func,
535
+ CRYPTO_EX_free *free_func);
536
+ int X509_STORE_CTX_set_ex_data(X509_STORE_CTX *ctx, int idx, void *data);
537
+ void *X509_STORE_CTX_get_ex_data(X509_STORE_CTX *ctx, int idx);
538
+ int X509_STORE_CTX_get_error(X509_STORE_CTX *ctx);
539
+ void X509_STORE_CTX_set_error(X509_STORE_CTX *ctx, int s);
540
+ int X509_STORE_CTX_get_error_depth(X509_STORE_CTX *ctx);
541
+ X509 *X509_STORE_CTX_get_current_cert(X509_STORE_CTX *ctx);
542
+ X509 *X509_STORE_CTX_get0_current_issuer(X509_STORE_CTX *ctx);
543
+ X509_CRL *X509_STORE_CTX_get0_current_crl(X509_STORE_CTX *ctx);
544
+ X509_STORE_CTX *X509_STORE_CTX_get0_parent_ctx(X509_STORE_CTX *ctx);
545
+ STACK_OF(X509) *X509_STORE_CTX_get_chain(X509_STORE_CTX *ctx);
546
+ STACK_OF(X509) *X509_STORE_CTX_get1_chain(X509_STORE_CTX *ctx);
547
+ void X509_STORE_CTX_set_cert(X509_STORE_CTX *c, X509 *x);
548
+ void X509_STORE_CTX_set_chain(X509_STORE_CTX *c, STACK_OF(X509) *sk);
549
+ void X509_STORE_CTX_set0_crls(X509_STORE_CTX *c, STACK_OF(X509_CRL) *sk);
550
+ int X509_STORE_CTX_set_purpose(X509_STORE_CTX *ctx, int purpose);
551
+ int X509_STORE_CTX_set_trust(X509_STORE_CTX *ctx, int trust);
552
+ int X509_STORE_CTX_purpose_inherit(X509_STORE_CTX *ctx, int def_purpose,
553
+ int purpose, int trust);
554
+ void X509_STORE_CTX_set_flags(X509_STORE_CTX *ctx, unsigned long flags);
555
+ void X509_STORE_CTX_set_time(X509_STORE_CTX *ctx, unsigned long flags,
556
+ time_t t);
557
+ void X509_STORE_CTX_set_verify_cb(X509_STORE_CTX *ctx,
558
+ int (*verify_cb) (int, X509_STORE_CTX *));
559
+
560
+ X509_POLICY_TREE *X509_STORE_CTX_get0_policy_tree(X509_STORE_CTX *ctx);
561
+ int X509_STORE_CTX_get_explicit_policy(X509_STORE_CTX *ctx);
562
+
563
+ X509_VERIFY_PARAM *X509_STORE_CTX_get0_param(X509_STORE_CTX *ctx);
564
+ void X509_STORE_CTX_set0_param(X509_STORE_CTX *ctx, X509_VERIFY_PARAM *param);
565
+ int X509_STORE_CTX_set_default(X509_STORE_CTX *ctx, const char *name);
566
+
567
+ /* X509_VERIFY_PARAM functions */
568
+
569
+ X509_VERIFY_PARAM *X509_VERIFY_PARAM_new(void);
570
+ void X509_VERIFY_PARAM_free(X509_VERIFY_PARAM *param);
571
+ int X509_VERIFY_PARAM_inherit(X509_VERIFY_PARAM *to,
572
+ const X509_VERIFY_PARAM *from);
573
+ int X509_VERIFY_PARAM_set1(X509_VERIFY_PARAM *to,
574
+ const X509_VERIFY_PARAM *from);
575
+ int X509_VERIFY_PARAM_set1_name(X509_VERIFY_PARAM *param, const char *name);
576
+ int X509_VERIFY_PARAM_set_flags(X509_VERIFY_PARAM *param,
577
+ unsigned long flags);
578
+ int X509_VERIFY_PARAM_clear_flags(X509_VERIFY_PARAM *param,
579
+ unsigned long flags);
580
+ unsigned long X509_VERIFY_PARAM_get_flags(X509_VERIFY_PARAM *param);
581
+ int X509_VERIFY_PARAM_set_purpose(X509_VERIFY_PARAM *param, int purpose);
582
+ int X509_VERIFY_PARAM_set_trust(X509_VERIFY_PARAM *param, int trust);
583
+ void X509_VERIFY_PARAM_set_depth(X509_VERIFY_PARAM *param, int depth);
584
+ void X509_VERIFY_PARAM_set_time(X509_VERIFY_PARAM *param, time_t t);
585
+ int X509_VERIFY_PARAM_add0_policy(X509_VERIFY_PARAM *param,
586
+ ASN1_OBJECT *policy);
587
+ int X509_VERIFY_PARAM_set1_policies(X509_VERIFY_PARAM *param,
588
+ STACK_OF(ASN1_OBJECT) *policies);
589
+
590
+ int X509_VERIFY_PARAM_set1_host(X509_VERIFY_PARAM *param,
591
+ const char *name, size_t namelen);
592
+ int X509_VERIFY_PARAM_add1_host(X509_VERIFY_PARAM *param,
593
+ const char *name, size_t namelen);
594
+ void X509_VERIFY_PARAM_set_hostflags(X509_VERIFY_PARAM *param,
595
+ unsigned int flags);
596
+ char *X509_VERIFY_PARAM_get0_peername(X509_VERIFY_PARAM *);
597
+ int X509_VERIFY_PARAM_set1_email(X509_VERIFY_PARAM *param,
598
+ const char *email, size_t emaillen);
599
+ int X509_VERIFY_PARAM_set1_ip(X509_VERIFY_PARAM *param,
600
+ const unsigned char *ip, size_t iplen);
601
+ int X509_VERIFY_PARAM_set1_ip_asc(X509_VERIFY_PARAM *param,
602
+ const char *ipasc);
603
+
604
+ int X509_VERIFY_PARAM_get_depth(const X509_VERIFY_PARAM *param);
605
+ const char *X509_VERIFY_PARAM_get0_name(const X509_VERIFY_PARAM *param);
606
+
607
+ int X509_VERIFY_PARAM_add0_table(X509_VERIFY_PARAM *param);
608
+ int X509_VERIFY_PARAM_get_count(void);
609
+ const X509_VERIFY_PARAM *X509_VERIFY_PARAM_get0(int id);
610
+ const X509_VERIFY_PARAM *X509_VERIFY_PARAM_lookup(const char *name);
611
+ void X509_VERIFY_PARAM_table_cleanup(void);
612
+
613
+ int X509_policy_check(X509_POLICY_TREE **ptree, int *pexplicit_policy,
614
+ STACK_OF(X509) *certs,
615
+ STACK_OF(ASN1_OBJECT) *policy_oids, unsigned int flags);
616
+
617
+ void X509_policy_tree_free(X509_POLICY_TREE *tree);
618
+
619
+ int X509_policy_tree_level_count(const X509_POLICY_TREE *tree);
620
+ X509_POLICY_LEVEL *X509_policy_tree_get0_level(const X509_POLICY_TREE *tree,
621
+ int i);
622
+
623
+ STACK_OF(X509_POLICY_NODE) *X509_policy_tree_get0_policies(const
624
+ X509_POLICY_TREE
625
+ *tree);
626
+
627
+ STACK_OF(X509_POLICY_NODE) *X509_policy_tree_get0_user_policies(const
628
+ X509_POLICY_TREE
629
+ *tree);
630
+
631
+ int X509_policy_level_node_count(X509_POLICY_LEVEL *level);
632
+
633
+ X509_POLICY_NODE *X509_policy_level_get0_node(X509_POLICY_LEVEL *level,
634
+ int i);
635
+
636
+ const ASN1_OBJECT *X509_policy_node_get0_policy(const X509_POLICY_NODE *node);
637
+
638
+ STACK_OF(POLICYQUALINFO) *X509_policy_node_get0_qualifiers(const
639
+ X509_POLICY_NODE
640
+ *node);
641
+ const X509_POLICY_NODE *X509_policy_node_get0_parent(const X509_POLICY_NODE
642
+ *node);
643
+
644
+ #ifdef __cplusplus
645
+ }
646
+ #endif
647
+ #endif