aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/libs/openssl/crypto/ocsp/ocsp_local.h
blob: ea185f736049a16a29036aa7e86f32d5a67dd986 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
/* 
 * Copyright 2015-2018 The OpenSSL Project Authors. All Rights Reserved. 
 * 
 * Licensed under the OpenSSL license (the "License").  You may not use 
 * this file except in compliance with the License.  You can obtain a copy 
 * in the file LICENSE in the source distribution or at 
 * https://www.openssl.org/source/license.html 
 */ 
 
/*-  CertID ::= SEQUENCE { 
 *       hashAlgorithm            AlgorithmIdentifier, 
 *       issuerNameHash     OCTET STRING, -- Hash of Issuer's DN 
 *       issuerKeyHash      OCTET STRING, -- Hash of Issuers public key (excluding the tag & length fields) 
 *       serialNumber       CertificateSerialNumber } 
 */ 
struct ocsp_cert_id_st { 
    X509_ALGOR hashAlgorithm; 
    ASN1_OCTET_STRING issuerNameHash; 
    ASN1_OCTET_STRING issuerKeyHash; 
    ASN1_INTEGER serialNumber; 
}; 
 
/*-  Request ::=     SEQUENCE { 
 *       reqCert                    CertID, 
 *       singleRequestExtensions    [0] EXPLICIT Extensions OPTIONAL } 
 */ 
struct ocsp_one_request_st { 
    OCSP_CERTID *reqCert; 
    STACK_OF(X509_EXTENSION) *singleRequestExtensions; 
}; 
 
/*-  TBSRequest      ::=     SEQUENCE { 
 *       version             [0] EXPLICIT Version DEFAULT v1, 
 *       requestorName       [1] EXPLICIT GeneralName OPTIONAL, 
 *       requestList             SEQUENCE OF Request, 
 *       requestExtensions   [2] EXPLICIT Extensions OPTIONAL } 
 */ 
struct ocsp_req_info_st { 
    ASN1_INTEGER *version; 
    GENERAL_NAME *requestorName; 
    STACK_OF(OCSP_ONEREQ) *requestList; 
    STACK_OF(X509_EXTENSION) *requestExtensions; 
}; 
 
/*-  Signature       ::=     SEQUENCE { 
 *       signatureAlgorithm   AlgorithmIdentifier, 
 *       signature            BIT STRING, 
 *       certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 
 */ 
struct ocsp_signature_st { 
    X509_ALGOR signatureAlgorithm; 
    ASN1_BIT_STRING *signature; 
    STACK_OF(X509) *certs; 
}; 
 
/*-  OCSPRequest     ::=     SEQUENCE { 
 *       tbsRequest                  TBSRequest, 
 *       optionalSignature   [0]     EXPLICIT Signature OPTIONAL } 
 */ 
struct ocsp_request_st { 
    OCSP_REQINFO tbsRequest; 
    OCSP_SIGNATURE *optionalSignature; /* OPTIONAL */ 
}; 
 
/*-  OCSPResponseStatus ::= ENUMERATED { 
 *       successful            (0),      --Response has valid confirmations 
 *       malformedRequest      (1),      --Illegal confirmation request 
 *       internalError         (2),      --Internal error in issuer 
 *       tryLater              (3),      --Try again later 
 *                                       --(4) is not used 
 *       sigRequired           (5),      --Must sign the request 
 *       unauthorized          (6)       --Request unauthorized 
 *   } 
 */ 
 
/*-  ResponseBytes ::=       SEQUENCE { 
 *       responseType   OBJECT IDENTIFIER, 
 *       response       OCTET STRING } 
 */ 
struct ocsp_resp_bytes_st { 
    ASN1_OBJECT *responseType; 
    ASN1_OCTET_STRING *response; 
}; 
 
/*-  OCSPResponse ::= SEQUENCE { 
 *      responseStatus         OCSPResponseStatus, 
 *      responseBytes          [0] EXPLICIT ResponseBytes OPTIONAL } 
 */ 
struct ocsp_response_st { 
    ASN1_ENUMERATED *responseStatus; 
    OCSP_RESPBYTES *responseBytes; 
}; 
 
/*-  ResponderID ::= CHOICE { 
 *      byName   [1] Name, 
 *      byKey    [2] KeyHash } 
 */ 
struct ocsp_responder_id_st { 
    int type; 
    union { 
        X509_NAME *byName; 
        ASN1_OCTET_STRING *byKey; 
    } value; 
}; 
 
/*-  KeyHash ::= OCTET STRING --SHA-1 hash of responder's public key 
 *                            --(excluding the tag and length fields) 
 */ 
 
/*-  RevokedInfo ::= SEQUENCE { 
 *       revocationTime              GeneralizedTime, 
 *       revocationReason    [0]     EXPLICIT CRLReason OPTIONAL } 
 */ 
struct ocsp_revoked_info_st { 
    ASN1_GENERALIZEDTIME *revocationTime; 
    ASN1_ENUMERATED *revocationReason; 
}; 
 
/*-  CertStatus ::= CHOICE { 
 *       good                [0]     IMPLICIT NULL, 
 *       revoked             [1]     IMPLICIT RevokedInfo, 
 *       unknown             [2]     IMPLICIT UnknownInfo } 
 */ 
struct ocsp_cert_status_st { 
    int type; 
    union { 
        ASN1_NULL *good; 
        OCSP_REVOKEDINFO *revoked; 
        ASN1_NULL *unknown; 
    } value; 
}; 
 
/*-  SingleResponse ::= SEQUENCE { 
 *      certID                       CertID, 
 *      certStatus                   CertStatus, 
 *      thisUpdate                   GeneralizedTime, 
 *      nextUpdate           [0]     EXPLICIT GeneralizedTime OPTIONAL, 
 *      singleExtensions     [1]     EXPLICIT Extensions OPTIONAL } 
 */ 
struct ocsp_single_response_st { 
    OCSP_CERTID *certId; 
    OCSP_CERTSTATUS *certStatus; 
    ASN1_GENERALIZEDTIME *thisUpdate; 
    ASN1_GENERALIZEDTIME *nextUpdate; 
    STACK_OF(X509_EXTENSION) *singleExtensions; 
}; 
 
/*-  ResponseData ::= SEQUENCE { 
 *      version              [0] EXPLICIT Version DEFAULT v1, 
 *      responderID              ResponderID, 
 *      producedAt               GeneralizedTime, 
 *      responses                SEQUENCE OF SingleResponse, 
 *      responseExtensions   [1] EXPLICIT Extensions OPTIONAL } 
 */ 
struct ocsp_response_data_st { 
    ASN1_INTEGER *version; 
    OCSP_RESPID responderId; 
    ASN1_GENERALIZEDTIME *producedAt; 
    STACK_OF(OCSP_SINGLERESP) *responses; 
    STACK_OF(X509_EXTENSION) *responseExtensions; 
}; 
 
/*-  BasicOCSPResponse       ::= SEQUENCE { 
 *      tbsResponseData      ResponseData, 
 *      signatureAlgorithm   AlgorithmIdentifier, 
 *      signature            BIT STRING, 
 *      certs                [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL } 
 */ 
  /* 
   * Note 1: The value for "signature" is specified in the OCSP rfc2560 as 
   * follows: "The value for the signature SHALL be computed on the hash of 
   * the DER encoding ResponseData." This means that you must hash the 
   * DER-encoded tbsResponseData, and then run it through a crypto-signing 
   * function, which will (at least w/RSA) do a hash-'n'-private-encrypt 
   * operation.  This seems a bit odd, but that's the spec.  Also note that 
   * the data structures do not leave anywhere to independently specify the 
   * algorithm used for the initial hash. So, we look at the 
   * signature-specification algorithm, and try to do something intelligent. 
   * -- Kathy Weinhold, CertCo 
   */ 
  /* 
   * Note 2: It seems that the mentioned passage from RFC 2560 (section 
   * 4.2.1) is open for interpretation.  I've done tests against another 
   * responder, and found that it doesn't do the double hashing that the RFC 
   * seems to say one should.  Therefore, all relevant functions take a flag 
   * saying which variant should be used.  -- Richard Levitte, OpenSSL team 
   * and CeloCom 
   */ 
struct ocsp_basic_response_st { 
    OCSP_RESPDATA tbsResponseData; 
    X509_ALGOR signatureAlgorithm; 
    ASN1_BIT_STRING *signature; 
    STACK_OF(X509) *certs; 
}; 
 
/*- 
 * CrlID ::= SEQUENCE { 
 *     crlUrl               [0]     EXPLICIT IA5String OPTIONAL, 
 *     crlNum               [1]     EXPLICIT INTEGER OPTIONAL, 
 *     crlTime              [2]     EXPLICIT GeneralizedTime OPTIONAL } 
 */ 
struct ocsp_crl_id_st { 
    ASN1_IA5STRING *crlUrl; 
    ASN1_INTEGER *crlNum; 
    ASN1_GENERALIZEDTIME *crlTime; 
}; 
 
/*- 
 * ServiceLocator ::= SEQUENCE { 
 *      issuer    Name, 
 *      locator   AuthorityInfoAccessSyntax OPTIONAL } 
 */ 
struct ocsp_service_locator_st { 
    X509_NAME *issuer; 
    STACK_OF(ACCESS_DESCRIPTION) *locator; 
}; 
 
#  define OCSP_REQUEST_sign(o,pkey,md) \ 
        ASN1_item_sign(ASN1_ITEM_rptr(OCSP_REQINFO),\ 
                &(o)->optionalSignature->signatureAlgorithm,NULL,\ 
                (o)->optionalSignature->signature,&(o)->tbsRequest,pkey,md) 
 
#  define OCSP_BASICRESP_sign(o,pkey,md,d) \ 
        ASN1_item_sign(ASN1_ITEM_rptr(OCSP_RESPDATA),&(o)->signatureAlgorithm,\ 
                NULL,(o)->signature,&(o)->tbsResponseData,pkey,md) 
 
#  define OCSP_BASICRESP_sign_ctx(o,ctx,d) \ 
        ASN1_item_sign_ctx(ASN1_ITEM_rptr(OCSP_RESPDATA),&(o)->signatureAlgorithm,\ 
                NULL,(o)->signature,&(o)->tbsResponseData,ctx) 
 
#  define OCSP_REQUEST_verify(a,r) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_REQINFO),\ 
        &(a)->optionalSignature->signatureAlgorithm,\ 
        (a)->optionalSignature->signature,&(a)->tbsRequest,r) 
 
#  define OCSP_BASICRESP_verify(a,r,d) ASN1_item_verify(ASN1_ITEM_rptr(OCSP_RESPDATA),\ 
        &(a)->signatureAlgorithm,(a)->signature,&(a)->tbsResponseData,r)