1 /* crypto/x509/x509.h */ 2 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 3 * All rights reserved. 4 * 5 * This package is an SSL implementation written 6 * by Eric Young (eay@cryptsoft.com). 7 * The implementation was written so as to conform with Netscapes SSL. 8 * 9 * This library is free for commercial and non-commercial use as long as 10 * the following conditions are aheared to. The following conditions 11 * apply to all code found in this distribution, be it the RC4, RSA, 12 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 13 * included with this distribution is covered by the same copyright terms 14 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 15 * 16 * Copyright remains Eric Young's, and as such any Copyright notices in 17 * the code are not to be removed. 18 * If this package is used in a product, Eric Young should be given attribution 19 * as the author of the parts of the library used. 20 * This can be in the form of a textual message at program startup or 21 * in documentation (online or textual) provided with the package. 22 * 23 * Redistribution and use in source and binary forms, with or without 24 * modification, are permitted provided that the following conditions 25 * are met: 26 * 1. Redistributions of source code must retain the copyright 27 * notice, this list of conditions and the following disclaimer. 28 * 2. Redistributions in binary form must reproduce the above copyright 29 * notice, this list of conditions and the following disclaimer in the 30 * documentation and/or other materials provided with the distribution. 31 * 3. All advertising materials mentioning features or use of this software 32 * must display the following acknowledgement: 33 * "This product includes cryptographic software written by 34 * Eric Young (eay@cryptsoft.com)" 35 * The word 'cryptographic' can be left out if the rouines from the library 36 * being used are not cryptographic related :-). 37 * 4. If you include any Windows specific code (or a derivative thereof) from 38 * the apps directory (application code) you must include an acknowledgement: 39 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 40 * 41 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 42 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 43 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 44 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 45 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 46 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 47 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 48 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 49 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 50 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 51 * SUCH DAMAGE. 52 * 53 * The licence and distribution terms for any publically available version or 54 * derivative of this code cannot be changed. i.e. this code cannot simply be 55 * copied and put under another distribution licence 56 * [including the GNU Public Licence.] 57 */ 58 /* ==================================================================== 59 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. 60 * ECDH support in OpenSSL originally developed by 61 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. 62 */ 63 64 module deimos.openssl.x509; 65 66 import deimos.openssl._d_util; 67 68 import core.stdc.time; 69 import deimos.openssl.x509v3; // Needed for GENERAL_NAME. 70 71 public import deimos.openssl.e_os2; 72 public import deimos.openssl.symhacks; 73 version(OPENSSL_NO_BUFFER) {} else { 74 public import deimos.openssl.buffer; 75 } 76 version(OPENSSL_NO_EVP) {} else { 77 public import deimos.openssl.evp; 78 } 79 version(OPENSSL_NO_BIO) {} else { 80 public import deimos.openssl.bio; 81 } 82 public import deimos.openssl.stack; 83 public import deimos.openssl.asn1; 84 public import deimos.openssl.safestack; 85 86 version(OPENSSL_NO_EC) {} else { 87 public import deimos.openssl.ec; 88 } 89 90 version(OPENSSL_NO_ECDSA) {} else { 91 public import deimos.openssl.ecdsa; 92 } 93 94 version(OPENSSL_NO_ECDH) {} else { 95 public import deimos.openssl.ecdh; 96 } 97 98 version(OPENSSL_NO_DEPRECATED) {} else { 99 version(OPENSSL_NO_RSA) {} else { 100 public import deimos.openssl.rsa; 101 } 102 version(OPENSSL_NO_DSA) {} else { 103 public import deimos.openssl.dsa; 104 } 105 version(OPENSSL_NO_DH) {} else { 106 public import deimos.openssl.dh; 107 } 108 } 109 110 version(OPENSSL_NO_SHA) {} else { 111 public import deimos.openssl.sha; 112 } 113 public import deimos.openssl.ossl_typ; 114 115 extern (C): 116 nothrow: 117 118 //#ifdef OPENSSL_SYS_WIN32 119 ///* Under Win32 these are defined in wincrypt.h */ 120 //#undef X509_NAME 121 //#undef X509_CERT_PAIR 122 //#undef X509_EXTENSIONS 123 //#endif 124 125 enum X509_FILETYPE_PEM = 1; 126 enum X509_FILETYPE_ASN1 = 2; 127 enum X509_FILETYPE_DEFAULT = 3; 128 129 enum X509v3_KU_DIGITAL_SIGNATURE = 0x0080; 130 enum X509v3_KU_NON_REPUDIATION = 0x0040; 131 enum X509v3_KU_KEY_ENCIPHERMENT = 0x0020; 132 enum X509v3_KU_DATA_ENCIPHERMENT = 0x0010; 133 enum X509v3_KU_KEY_AGREEMENT = 0x0008; 134 enum X509v3_KU_KEY_CERT_SIGN = 0x0004; 135 enum X509v3_KU_CRL_SIGN = 0x0002; 136 enum X509v3_KU_ENCIPHER_ONLY = 0x0001; 137 enum X509v3_KU_DECIPHER_ONLY = 0x8000; 138 enum X509v3_KU_UNDEF = 0xffff; 139 140 struct X509_objects_st { 141 int nid; 142 ExternC!(int function()) a2i; 143 ExternC!(int function()) i2a; 144 } 145 alias X509_objects_st X509_OBJECTS; 146 147 struct X509_algor_st 148 { 149 ASN1_OBJECT* algorithm; 150 ASN1_TYPE* parameter; 151 } /* X509_ALGOR */; 152 153 mixin DECLARE_ASN1_SET_OF!(X509_ALGOR); 154 155 alias STACK_OF!(X509_ALGOR) X509_ALGORS; 156 157 struct X509_val_st { 158 ASN1_TIME* notBefore; 159 ASN1_TIME* notAfter; 160 } 161 alias X509_val_st X509_VAL; 162 163 struct X509_pubkey_st 164 { 165 X509_ALGOR* algor; 166 ASN1_BIT_STRING* public_key; 167 EVP_PKEY* pkey; 168 }; 169 170 struct X509_sig_st { 171 X509_ALGOR* algor; 172 ASN1_OCTET_STRING* digest; 173 } 174 alias X509_sig_st X509_SIG; 175 176 struct X509_name_entry_st { 177 ASN1_OBJECT* object; 178 ASN1_STRING* value; 179 int set; 180 int size; /* temp variable */ 181 } 182 alias X509_name_entry_st X509_NAME_ENTRY; 183 184 /+mixin DECLARE_STACK_OF!(X509_NAME_ENTRY);+/ 185 mixin DECLARE_ASN1_SET_OF!(X509_NAME_ENTRY); 186 187 /* we always keep X509_NAMEs in 2 forms. */ 188 struct X509_name_st 189 { 190 STACK_OF!(X509_NAME_ENTRY) *entries; 191 int modified; /* true if 'bytes' needs to be built */ 192 version(OPENSSL_NO_BUFFER) { 193 char* bytes; 194 } else { 195 BUF_MEM* bytes; 196 } 197 /* c_ulong hash; Keep the hash around for lookups */ 198 ubyte* canon_enc; 199 int canon_enclen; 200 } /* X509_NAME */; 201 202 /+mixin DECLARE_STACK_OF!(X509_NAME);+/ 203 204 enum X509_EX_V_NETSCAPE_HACK = 0x8000; 205 enum X509_EX_V_INIT = 0x0001; 206 struct X509_extension_st { 207 ASN1_OBJECT* object; 208 ASN1_BOOLEAN critical; 209 ASN1_OCTET_STRING* value; 210 } 211 alias X509_extension_st X509_EXTENSION; 212 213 alias STACK_OF!(X509_EXTENSION) X509_EXTENSIONS; 214 215 /+mixin DECLARE_STACK_OF!(X509_EXTENSION);+/ 216 mixin DECLARE_ASN1_SET_OF!(X509_EXTENSION); 217 218 /* a sequence of these are used */ 219 struct x509_attributes_st 220 { 221 ASN1_OBJECT* object; 222 int single; /* 0 for a set, 1 for a single item (which is wrong) */ 223 union value_ { 224 char* ptr; 225 /* 0 */ STACK_OF!(ASN1_TYPE) *set; 226 /* 1 */ ASN1_TYPE* single; 227 } 228 value_ value; 229 } 230 alias x509_attributes_st X509_ATTRIBUTE; 231 232 /+mixin DECLARE_STACK_OF!(X509_ATTRIBUTE);+/ 233 mixin DECLARE_ASN1_SET_OF!(X509_ATTRIBUTE); 234 235 236 struct X509_req_info_st { 237 ASN1_ENCODING enc; 238 ASN1_INTEGER* version_; 239 X509_NAME* subject; 240 X509_PUBKEY* pubkey; 241 /* d=2 hl=2 l= 0 cons: cont: 00 */ 242 STACK_OF!(X509_ATTRIBUTE) *attributes; /* [ 0 ] */ 243 } 244 alias X509_req_info_st X509_REQ_INFO; 245 246 struct X509_req_st { 247 X509_REQ_INFO* req_info; 248 X509_ALGOR* sig_alg; 249 ASN1_BIT_STRING* signature; 250 int references; 251 } 252 alias X509_req_st X509_REQ; 253 254 struct x509_cinf_st { 255 ASN1_INTEGER* version_; /* [ 0 ] default of v1 */ 256 ASN1_INTEGER* serialNumber; 257 X509_ALGOR* signature; 258 X509_NAME* issuer; 259 X509_VAL* validity; 260 X509_NAME* subject; 261 X509_PUBKEY* key; 262 ASN1_BIT_STRING* issuerUID; /* [ 1 ] optional in v2 */ 263 ASN1_BIT_STRING* subjectUID; /* [ 2 ] optional in v2 */ 264 STACK_OF!(X509_EXTENSION) *extensions; /* [ 3 ] optional in v3 */ 265 ASN1_ENCODING enc; 266 } 267 alias x509_cinf_st X509_CINF; 268 269 /* This stuff is certificate "auxiliary info" 270 * it contains details which are useful in certificate 271 * stores and databases. When used this is tagged onto 272 * the end of the certificate itself 273 */ 274 275 struct x509_cert_aux_st { 276 STACK_OF!(ASN1_OBJECT) *trust; /* trusted uses */ 277 STACK_OF!(ASN1_OBJECT) *reject; /* rejected uses */ 278 ASN1_UTF8STRING* alias_; /* "friendly name" */ 279 ASN1_OCTET_STRING* keyid; /* key id of private key */ 280 STACK_OF!(X509_ALGOR) *other; /* other unspecified info */ 281 } 282 alias x509_cert_aux_st X509_CERT_AUX; 283 284 struct x509_st 285 { 286 X509_CINF* cert_info; 287 X509_ALGOR* sig_alg; 288 ASN1_BIT_STRING* signature; 289 int valid; 290 int references; 291 char* name; 292 CRYPTO_EX_DATA ex_data; 293 /* These contain copies of various extension values */ 294 c_long ex_pathlen; 295 c_long ex_pcpathlen; 296 c_ulong ex_flags; 297 c_ulong ex_kusage; 298 c_ulong ex_xkusage; 299 c_ulong ex_nscert; 300 ASN1_OCTET_STRING* skid; 301 AUTHORITY_KEYID* akid; 302 X509_POLICY_CACHE* policy_cache; 303 STACK_OF!(DIST_POINT) *crldp; 304 STACK_OF!(GENERAL_NAME) *altname; 305 NAME_CONSTRAINTS* nc; 306 version(OPENSSL_NO_RFC3779) {} else { 307 STACK_OF!(IPAddressFamily) *rfc3779_addr; 308 ASIdentifiers_st* rfc3779_asid; 309 } 310 version(OPENSSL_NO_SHA) {} else { 311 ubyte[SHA_DIGEST_LENGTH] sha1_hash; 312 } 313 X509_CERT_AUX* aux; 314 } /* X509 */; 315 316 /+mixin DECLARE_STACK_OF!(X509);+/ 317 mixin DECLARE_ASN1_SET_OF!(X509); 318 319 /* This is used for a table of trust checking functions */ 320 321 struct x509_trust_st { 322 int trust; 323 int flags; 324 ExternC!(int function(x509_trust_st*, X509*, int)) check_trust; 325 char* name; 326 int arg1; 327 void* arg2; 328 } 329 alias x509_trust_st X509_TRUST; 330 331 /+mixin DECLARE_STACK_OF!(X509_TRUST);+/ 332 333 struct x509_cert_pair_st { 334 X509* forward; 335 X509* reverse; 336 } 337 alias x509_cert_pair_st X509_CERT_PAIR; 338 339 /* standard trust ids */ 340 341 enum X509_TRUST_DEFAULT = -1; /* Only valid in purpose settings */ 342 343 enum X509_TRUST_COMPAT = 1; 344 enum X509_TRUST_SSL_CLIENT = 2; 345 enum X509_TRUST_SSL_SERVER = 3; 346 enum X509_TRUST_EMAIL = 4; 347 enum X509_TRUST_OBJECT_SIGN = 5; 348 enum X509_TRUST_OCSP_SIGN = 6; 349 enum X509_TRUST_OCSP_REQUEST = 7; 350 enum X509_TRUST_TSA = 8; 351 352 /* Keep these up to date! */ 353 enum X509_TRUST_MIN = 1; 354 enum X509_TRUST_MAX = 8; 355 356 357 /* trust_flags values */ 358 enum X509_TRUST_DYNAMIC = 1; 359 enum X509_TRUST_DYNAMIC_NAME = 2; 360 361 /* check_trust return codes */ 362 363 enum X509_TRUST_TRUSTED = 1; 364 enum X509_TRUST_REJECTED = 2; 365 enum X509_TRUST_UNTRUSTED = 3; 366 367 /* Flags for X509_print_ex() */ 368 369 enum X509_FLAG_COMPAT = 0; 370 enum X509_FLAG_NO_HEADER = 1; 371 enum X509_FLAG_NO_VERSION = (1L << 1); 372 enum X509_FLAG_NO_SERIAL = (1L << 2); 373 enum X509_FLAG_NO_SIGNAME = (1L << 3); 374 enum X509_FLAG_NO_ISSUER = (1L << 4); 375 enum X509_FLAG_NO_VALIDITY = (1L << 5); 376 enum X509_FLAG_NO_SUBJECT = (1L << 6); 377 enum X509_FLAG_NO_PUBKEY = (1L << 7); 378 enum X509_FLAG_NO_EXTENSIONS = (1L << 8); 379 enum X509_FLAG_NO_SIGDUMP = (1L << 9); 380 enum X509_FLAG_NO_AUX = (1L << 10); 381 enum X509_FLAG_NO_ATTRIBUTES = (1L << 11); 382 383 /* Flags specific to X509_NAME_print_ex() */ 384 385 /* The field separator information */ 386 387 enum XN_FLAG_SEP_MASK = (0xf << 16); 388 389 enum XN_FLAG_COMPAT = 0; /* Traditional SSLeay: use old X509_NAME_print */ 390 enum XN_FLAG_SEP_COMMA_PLUS = (1 << 16); /* RFC2253 ,+ */ 391 enum XN_FLAG_SEP_CPLUS_SPC = (2 << 16); /*,+ spaced: more readable */ 392 enum XN_FLAG_SEP_SPLUS_SPC = (3 << 16); /* ;+ spaced */ 393 enum XN_FLAG_SEP_MULTILINE = (4 << 16); /* One line per field */ 394 395 enum XN_FLAG_DN_REV = (1 << 20); /* Reverse DN order */ 396 397 /* How the field name is shown */ 398 399 enum XN_FLAG_FN_MASK = (0x3 << 21); 400 401 enum XN_FLAG_FN_SN = 0; /* Object short name */ 402 enum XN_FLAG_FN_LN = (1 << 21); /* Object long name */ 403 enum XN_FLAG_FN_OID = (2 << 21); /* Always use OIDs */ 404 enum XN_FLAG_FN_NONE = (3 << 21); /* No field names */ 405 406 enum XN_FLAG_SPC_EQ = (1 << 23); /* Put spaces round '=' */ 407 408 /* This determines if we dump fields we don't recognise: 409 * RFC2253 requires this. 410 */ 411 412 enum XN_FLAG_DUMP_UNKNOWN_FIELDS = (1 << 24); 413 414 enum XN_FLAG_FN_ALIGN = (1 << 25); /* Align field names to 20 characters */ 415 416 /* Complete set of RFC2253 flags */ 417 418 enum XN_FLAG_RFC2253 = (ASN1_STRFLGS_RFC2253 | 419 XN_FLAG_SEP_COMMA_PLUS | 420 XN_FLAG_DN_REV | 421 XN_FLAG_FN_SN | 422 XN_FLAG_DUMP_UNKNOWN_FIELDS); 423 424 /* readable oneline form */ 425 426 enum XN_FLAG_ONELINE = (ASN1_STRFLGS_RFC2253 | 427 ASN1_STRFLGS_ESC_QUOTE | 428 XN_FLAG_SEP_CPLUS_SPC | 429 XN_FLAG_SPC_EQ | 430 XN_FLAG_FN_SN); 431 432 /* readable multiline form */ 433 434 enum XN_FLAG_MULTILINE = (ASN1_STRFLGS_ESC_CTRL | 435 ASN1_STRFLGS_ESC_MSB | 436 XN_FLAG_SEP_MULTILINE | 437 XN_FLAG_SPC_EQ | 438 XN_FLAG_FN_LN | 439 XN_FLAG_FN_ALIGN); 440 441 struct x509_revoked_st 442 { 443 ASN1_INTEGER* serialNumber; 444 ASN1_TIME* revocationDate; 445 STACK_OF!(X509_EXTENSION) /* optional */ *extensions; 446 /* Set up if indirect CRL */ 447 STACK_OF!(GENERAL_NAME) *issuer; 448 /* Revocation reason */ 449 int reason; 450 int sequence; /* load sequence */ 451 }; 452 453 /+mixin DECLARE_STACK_OF!(X509_REVOKED);+/ 454 mixin DECLARE_ASN1_SET_OF!(X509_REVOKED); 455 456 struct X509_crl_info_st { 457 ASN1_INTEGER* version_; 458 X509_ALGOR* sig_alg; 459 X509_NAME* issuer; 460 ASN1_TIME* lastUpdate; 461 ASN1_TIME* nextUpdate; 462 STACK_OF!(X509_REVOKED) *revoked; 463 STACK_OF!(X509_EXTENSION) /* [0] */ *extensions; 464 ASN1_ENCODING enc; 465 } 466 alias X509_crl_info_st X509_CRL_INFO; 467 468 struct X509_crl_st 469 { 470 /* actual signature */ 471 X509_CRL_INFO* crl; 472 X509_ALGOR* sig_alg; 473 ASN1_BIT_STRING* signature; 474 int references; 475 int flags; 476 /* Copies of various extensions */ 477 AUTHORITY_KEYID* akid; 478 ISSUING_DIST_POINT* idp; 479 /* Convenient breakdown of IDP */ 480 int idp_flags; 481 int idp_reasons; 482 /* CRL and base CRL numbers for delta processing */ 483 ASN1_INTEGER* crl_number; 484 ASN1_INTEGER* base_crl_number; 485 version(OPENSSL_NO_SHA) {} else { 486 ubyte[SHA_DIGEST_LENGTH] sha1_hash; 487 } 488 STACK_OF!(GENERAL_NAMES) *issuers; 489 const(X509_CRL_METHOD)* meth; 490 void* meth_data; 491 } /* X509_CRL */; 492 493 /+mixin DECLARE_STACK_OF!(X509_CRL);+/ 494 mixin DECLARE_ASN1_SET_OF!(X509_CRL); 495 496 struct private_key_st { 497 int version_; 498 /* The PKCS#8 data types */ 499 X509_ALGOR* enc_algor; 500 ASN1_OCTET_STRING* enc_pkey; /* encrypted pub key */ 501 502 /* When decrypted, the following will not be NULL */ 503 EVP_PKEY* dec_pkey; 504 505 /* used to encrypt and decrypt */ 506 int key_length; 507 char* key_data; 508 int key_free; /* true if we should auto free key_data */ 509 510 /* expanded version of 'enc_algor' */ 511 EVP_CIPHER_INFO cipher; 512 513 int references; 514 } 515 alias private_key_st X509_PKEY; 516 517 version(OPENSSL_NO_EVP) {} else { 518 struct X509_info_st { 519 X509* x509; 520 X509_CRL* crl; 521 X509_PKEY* x_pkey; 522 523 EVP_CIPHER_INFO enc_cipher; 524 int enc_len; 525 char* enc_data; 526 527 int references; 528 } 529 alias X509_info_st X509_INFO; 530 531 /+mixin DECLARE_STACK_OF!(X509_INFO);+/ 532 } 533 534 /* The next 2 structures and their 8 routines were sent to me by 535 * Pat Richard <patr@x509.com> and are used to manipulate 536 * Netscapes spki structures - useful if you are writing a CA web page 537 */ 538 struct Netscape_spkac_st { 539 X509_PUBKEY* pubkey; 540 ASN1_IA5STRING* challenge; /* challenge sent in atlas >= PR2 */ 541 } 542 alias Netscape_spkac_st NETSCAPE_SPKAC; 543 544 struct Netscape_spki_st { 545 NETSCAPE_SPKAC* spkac; /* signed public key and challenge */ 546 X509_ALGOR* sig_algor; 547 ASN1_BIT_STRING* signature; 548 } 549 alias Netscape_spki_st NETSCAPE_SPKI; 550 551 /* Netscape certificate sequence structure */ 552 struct Netscape_certificate_sequence { 553 ASN1_OBJECT* type; 554 STACK_OF!(X509) *certs; 555 } 556 alias Netscape_certificate_sequence NETSCAPE_CERT_SEQUENCE; 557 558 /* Unused (and iv length is wrong) 559 struct CBCParameter_st { 560 ubyte[8] iv; 561 } 562 alias CBCParameter_st CBC_PARAM; 563 */ 564 565 /* Password based encryption structure */ 566 567 struct PBEPARAM_st { 568 ASN1_OCTET_STRING* salt; 569 ASN1_INTEGER* iter; 570 } 571 alias PBEPARAM_st PBEPARAM; 572 573 /* Password based encryption V2 structures */ 574 575 struct PBE2PARAM_st { 576 X509_ALGOR* keyfunc; 577 X509_ALGOR* encryption; 578 } 579 alias PBE2PARAM_st PBE2PARAM; 580 581 struct PBKDF2PARAM_st { 582 ASN1_TYPE* salt; /* Usually OCTET STRING but could be anything */ 583 ASN1_INTEGER* iter; 584 ASN1_INTEGER* keylength; 585 X509_ALGOR* prf; 586 } 587 alias PBKDF2PARAM_st PBKDF2PARAM; 588 589 590 /* PKCS#8 private key info structure */ 591 592 struct pkcs8_priv_key_info_st 593 { 594 int broken; /* Flag for various broken formats */ 595 enum PKCS8_OK = 0; 596 enum PKCS8_NO_OCTET = 1; 597 enum PKCS8_EMBEDDED_PARAM = 2; 598 enum PKCS8_NS_DB = 3; 599 enum PKCS8_NEG_PRIVKEY = 4; 600 ASN1_INTEGER* version_; 601 X509_ALGOR* pkeyalg; 602 ASN1_TYPE* pkey; /* Should be OCTET STRING but some are broken */ 603 STACK_OF!(X509_ATTRIBUTE) *attributes; 604 }; 605 606 public import deimos.openssl.x509_vfy; 607 public import deimos.openssl.pkcs7; 608 609 extern (C): 610 nothrow: 611 612 enum X509_EXT_PACK_UNKNOWN = 1; 613 enum X509_EXT_PACK_STRING = 2; 614 615 auto X509_get_version()(x509_st* x) { return ASN1_INTEGER_get(x.cert_info.version_); } 616 /* auto X509_get_serialNumber()(x509_st* x) { return (x.cert_info.serialNumber); } */ 617 auto X509_get_notBefore()(x509_st* x) { return (x.cert_info.validity.notBefore); } 618 auto X509_get_notAfter()(x509_st* x) { return (x.cert_info.validity.notAfter); } 619 alias X509_get_pubkey X509_extract_key; 620 auto X509_REQ_get_version()(x509_st* x) { return ASN1_INTEGER_get(x.req_info.version_); } 621 auto X509_REQ_get_subject_name()(x509_st* x) { return (x.req_info.subject); } 622 alias X509_REQ_get_pubkey X509_REQ_extract_key; 623 alias X509_NAME_cmp X509_name_cmp; 624 auto X509_get_signature_type()(x509_st* x) { return EVP_PKEY_type(OBJ_obj2nid(x.sig_alg.algorithm)); } 625 626 auto X509_CRL_get_version()(x509_st* x) { return ASN1_INTEGER_get(x.crl.version_); } 627 auto X509_CRL_get_lastUpdate()(x509_st* x) { return (x.crl.lastUpdate); } 628 auto X509_CRL_get_nextUpdate()(x509_st* x) { return (x.crl.nextUpdate); } 629 auto X509_CRL_get_issuer()(x509_st* x) { return (x.crl.issuer); } 630 auto X509_CRL_get_REVOKED()(x509_st* x) { return (x.crl.revoked); } 631 632 void X509_CRL_set_default_method(const(X509_CRL_METHOD)* meth); 633 X509_CRL_METHOD* X509_CRL_METHOD_new( 634 ExternC!(int function(X509_CRL* crl)) crl_init, 635 ExternC!(int function(X509_CRL* crl)) crl_free, 636 ExternC!(int function(X509_CRL* crl, X509_REVOKED** ret, 637 ASN1_INTEGER* ser, X509_NAME* issuer)) crl_lookup, 638 ExternC!(int function(X509_CRL* crl, EVP_PKEY* pk)) crl_verify); 639 void X509_CRL_METHOD_free(X509_CRL_METHOD* m); 640 641 void X509_CRL_set_meth_data(X509_CRL* crl, void* dat); 642 void* X509_CRL_get_meth_data(X509_CRL* crl); 643 644 /* This one is only used so that a binary form can output, as in 645 * i2d_X509_NAME(X509_get_X509_PUBKEY(x),&buf) */ 646 auto X509_get_X509_PUBKEY()(x509_st* x) { return x.cert_info.key; } 647 648 649 const(char)* X509_verify_cert_error_string(c_long n); 650 651 version(OPENSSL_NO_EVP) {} else { 652 int X509_verify(X509* a, EVP_PKEY* r); 653 654 int X509_REQ_verify(X509_REQ* a, EVP_PKEY* r); 655 int X509_CRL_verify(X509_CRL* a, EVP_PKEY* r); 656 int NETSCAPE_SPKI_verify(NETSCAPE_SPKI* a, EVP_PKEY* r); 657 658 NETSCAPE_SPKI* NETSCAPE_SPKI_b64_decode(const(char)* str, int len); 659 char* NETSCAPE_SPKI_b64_encode(NETSCAPE_SPKI* x); 660 EVP_PKEY* NETSCAPE_SPKI_get_pubkey(NETSCAPE_SPKI* x); 661 int NETSCAPE_SPKI_set_pubkey(NETSCAPE_SPKI* x, EVP_PKEY* pkey); 662 663 int NETSCAPE_SPKI_print(BIO* out_, NETSCAPE_SPKI* spki); 664 665 int X509_signature_dump(BIO *bp,const ASN1_STRING *sig, int indent); 666 int X509_signature_print(BIO* bp,X509_ALGOR* alg, ASN1_STRING* sig); 667 668 int X509_sign(X509* x, EVP_PKEY* pkey, const(EVP_MD)* md); 669 int X509_sign_ctx(X509 *x, EVP_MD_CTX *ctx); 670 int X509_REQ_sign(X509_REQ* x, EVP_PKEY* pkey, const(EVP_MD)* md); 671 int X509_REQ_sign_ctx(X509_REQ *x, EVP_MD_CTX *ctx); 672 int X509_CRL_sign(X509_CRL* x, EVP_PKEY* pkey, const(EVP_MD)* md); 673 int X509_CRL_sign_ctx(X509_CRL *x, EVP_MD_CTX *ctx); 674 int NETSCAPE_SPKI_sign(NETSCAPE_SPKI* x, EVP_PKEY* pkey, const(EVP_MD)* md); 675 676 int X509_pubkey_digest(const(X509)* data,const(EVP_MD)* type, 677 ubyte* md, uint* len); 678 int X509_digest(const(X509)* data,const(EVP_MD)* type, 679 ubyte* md, uint* len); 680 int X509_CRL_digest(const(X509_CRL)* data,const(EVP_MD)* type, 681 ubyte* md, uint* len); 682 int X509_REQ_digest(const(X509_REQ)* data,const(EVP_MD)* type, 683 ubyte* md, uint* len); 684 int X509_NAME_digest(const(X509_NAME)* data,const(EVP_MD)* type, 685 ubyte* md, uint* len); 686 } 687 688 version(OPENSSL_NO_FP_API) {} else { 689 X509* d2i_X509_fp(FILE* fp, X509** x509); 690 int i2d_X509_fp(FILE* fp,X509* x509); 691 X509_CRL* d2i_X509_CRL_fp(FILE* fp,X509_CRL** crl); 692 int i2d_X509_CRL_fp(FILE* fp,X509_CRL* crl); 693 X509_REQ* d2i_X509_REQ_fp(FILE* fp,X509_REQ** req); 694 int i2d_X509_REQ_fp(FILE* fp,X509_REQ* req); 695 version(OPENSSL_NO_RSA) {} else { 696 RSA* d2i_RSAPrivateKey_fp(FILE* fp,RSA** rsa); 697 int i2d_RSAPrivateKey_fp(FILE* fp,RSA* rsa); 698 RSA* d2i_RSAPublicKey_fp(FILE* fp,RSA** rsa); 699 int i2d_RSAPublicKey_fp(FILE* fp,RSA* rsa); 700 RSA* d2i_RSA_PUBKEY_fp(FILE* fp,RSA** rsa); 701 int i2d_RSA_PUBKEY_fp(FILE* fp,RSA* rsa); 702 } 703 version(OPENSSL_NO_DSA) {} else { 704 DSA* d2i_DSA_PUBKEY_fp(FILE* fp, DSA** dsa); 705 int i2d_DSA_PUBKEY_fp(FILE* fp, DSA* dsa); 706 DSA* d2i_DSAPrivateKey_fp(FILE* fp, DSA** dsa); 707 int i2d_DSAPrivateKey_fp(FILE* fp, DSA* dsa); 708 } 709 version(OPENSSL_NO_EC) {} else { 710 EC_KEY* d2i_EC_PUBKEY_fp(FILE* fp, EC_KEY** eckey); 711 int i2d_EC_PUBKEY_fp(FILE* fp, EC_KEY* eckey); 712 EC_KEY* d2i_ECPrivateKey_fp(FILE* fp, EC_KEY** eckey); 713 int i2d_ECPrivateKey_fp(FILE* fp, EC_KEY* eckey); 714 } 715 X509_SIG* d2i_PKCS8_fp(FILE* fp,X509_SIG** p8); 716 int i2d_PKCS8_fp(FILE* fp,X509_SIG* p8); 717 PKCS8_PRIV_KEY_INFO* d2i_PKCS8_PRIV_KEY_INFO_fp(FILE* fp, 718 PKCS8_PRIV_KEY_INFO** p8inf); 719 int i2d_PKCS8_PRIV_KEY_INFO_fp(FILE* fp,PKCS8_PRIV_KEY_INFO* p8inf); 720 int i2d_PKCS8PrivateKeyInfo_fp(FILE* fp, EVP_PKEY* key); 721 int i2d_PrivateKey_fp(FILE* fp, EVP_PKEY* pkey); 722 EVP_PKEY* d2i_PrivateKey_fp(FILE* fp, EVP_PKEY** a); 723 int i2d_PUBKEY_fp(FILE* fp, EVP_PKEY* pkey); 724 EVP_PKEY* d2i_PUBKEY_fp(FILE* fp, EVP_PKEY** a); 725 } 726 727 version(OPENSSL_NO_BIO) {} else { 728 X509* d2i_X509_bio(BIO* bp,X509** x509); 729 int i2d_X509_bio(BIO* bp,X509* x509); 730 X509_CRL* d2i_X509_CRL_bio(BIO* bp,X509_CRL** crl); 731 int i2d_X509_CRL_bio(BIO* bp,X509_CRL* crl); 732 X509_REQ* d2i_X509_REQ_bio(BIO* bp,X509_REQ** req); 733 int i2d_X509_REQ_bio(BIO* bp,X509_REQ* req); 734 version(OPENSSL_NO_RSA) {} else { 735 RSA* d2i_RSAPrivateKey_bio(BIO* bp,RSA** rsa); 736 int i2d_RSAPrivateKey_bio(BIO* bp,RSA* rsa); 737 RSA* d2i_RSAPublicKey_bio(BIO* bp,RSA** rsa); 738 int i2d_RSAPublicKey_bio(BIO* bp,RSA* rsa); 739 RSA* d2i_RSA_PUBKEY_bio(BIO* bp,RSA** rsa); 740 int i2d_RSA_PUBKEY_bio(BIO* bp,RSA* rsa); 741 } 742 version(OPENSSL_NO_DSA) {} else { 743 DSA* d2i_DSA_PUBKEY_bio(BIO* bp, DSA** dsa); 744 int i2d_DSA_PUBKEY_bio(BIO* bp, DSA* dsa); 745 DSA* d2i_DSAPrivateKey_bio(BIO* bp, DSA** dsa); 746 int i2d_DSAPrivateKey_bio(BIO* bp, DSA* dsa); 747 } 748 version(OPENSSL_NO_EC) {} else { 749 EC_KEY* d2i_EC_PUBKEY_bio(BIO* bp, EC_KEY** eckey); 750 int i2d_EC_PUBKEY_bio(BIO* bp, EC_KEY* eckey); 751 EC_KEY* d2i_ECPrivateKey_bio(BIO* bp, EC_KEY** eckey); 752 int i2d_ECPrivateKey_bio(BIO* bp, EC_KEY* eckey); 753 } 754 X509_SIG* d2i_PKCS8_bio(BIO* bp,X509_SIG** p8); 755 int i2d_PKCS8_bio(BIO* bp,X509_SIG* p8); 756 PKCS8_PRIV_KEY_INFO* d2i_PKCS8_PRIV_KEY_INFO_bio(BIO* bp, 757 PKCS8_PRIV_KEY_INFO** p8inf); 758 int i2d_PKCS8_PRIV_KEY_INFO_bio(BIO* bp,PKCS8_PRIV_KEY_INFO* p8inf); 759 int i2d_PKCS8PrivateKeyInfo_bio(BIO* bp, EVP_PKEY* key); 760 int i2d_PrivateKey_bio(BIO* bp, EVP_PKEY* pkey); 761 EVP_PKEY* d2i_PrivateKey_bio(BIO* bp, EVP_PKEY** a); 762 int i2d_PUBKEY_bio(BIO* bp, EVP_PKEY* pkey); 763 EVP_PKEY* d2i_PUBKEY_bio(BIO* bp, EVP_PKEY** a); 764 } 765 766 X509* X509_dup(X509* x509); 767 X509_ATTRIBUTE* X509_ATTRIBUTE_dup(X509_ATTRIBUTE* xa); 768 X509_EXTENSION* X509_EXTENSION_dup(X509_EXTENSION* ex); 769 X509_CRL* X509_CRL_dup(X509_CRL* crl); 770 X509_REQ* X509_REQ_dup(X509_REQ* req); 771 X509_ALGOR* X509_ALGOR_dup(X509_ALGOR* xn); 772 int X509_ALGOR_set0(X509_ALGOR* alg, ASN1_OBJECT* aobj, int ptype, void* pval); 773 void X509_ALGOR_get0(ASN1_OBJECT** paobj, int* pptype, void** ppval, 774 X509_ALGOR* algor); 775 void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md); 776 777 X509_NAME* X509_NAME_dup(X509_NAME* xn); 778 X509_NAME_ENTRY* X509_NAME_ENTRY_dup(X509_NAME_ENTRY* ne); 779 780 int X509_cmp_time(const(ASN1_TIME)* s, time_t* t); 781 int X509_cmp_current_time(const(ASN1_TIME)* s); 782 ASN1_TIME* X509_time_adj(ASN1_TIME* s, c_long adj, time_t* t); 783 ASN1_TIME* X509_time_adj_ex(ASN1_TIME* s, 784 int offset_day, c_long offset_sec, time_t* t); 785 ASN1_TIME* X509_gmtime_adj(ASN1_TIME* s, c_long adj); 786 787 const(char)* X509_get_default_cert_area(); 788 const(char)* X509_get_default_cert_dir(); 789 const(char)* X509_get_default_cert_file(); 790 const(char)* X509_get_default_cert_dir_env(); 791 const(char)* X509_get_default_cert_file_env(); 792 const(char)* X509_get_default_private_dir(); 793 794 X509_REQ* X509_to_X509_REQ(X509* x, EVP_PKEY* pkey, const(EVP_MD)* md); 795 X509* X509_REQ_to_X509(X509_REQ* r, int days,EVP_PKEY* pkey); 796 797 mixin(DECLARE_ASN1_FUNCTIONS!"X509_ALGOR"); 798 mixin(DECLARE_ASN1_ENCODE_FUNCTIONS!("X509_ALGORS", "X509_ALGORS", "X509_ALGORS")); 799 mixin(DECLARE_ASN1_FUNCTIONS!"X509_VAL"); 800 801 mixin(DECLARE_ASN1_FUNCTIONS!"X509_PUBKEY"); 802 803 int X509_PUBKEY_set(X509_PUBKEY** x, EVP_PKEY* pkey); 804 EVP_PKEY* X509_PUBKEY_get(X509_PUBKEY* key); 805 int X509_get_pubkey_parameters(EVP_PKEY* pkey, 806 STACK_OF!(X509) *chain); 807 int i2d_PUBKEY(EVP_PKEY* a,ubyte** pp); 808 EVP_PKEY* d2i_PUBKEY(EVP_PKEY** a,const(ubyte)** pp, 809 c_long length); 810 version(OPENSSL_NO_RSA) {} else { 811 int i2d_RSA_PUBKEY(RSA* a,ubyte** pp); 812 RSA* d2i_RSA_PUBKEY(RSA** a,const(ubyte)** pp, 813 c_long length); 814 } 815 version(OPENSSL_NO_DSA) {} else { 816 int i2d_DSA_PUBKEY(DSA* a,ubyte** pp); 817 DSA* d2i_DSA_PUBKEY(DSA** a,const(ubyte)** pp, 818 c_long length); 819 } 820 version(OPENSSL_NO_EC) {} else { 821 int i2d_EC_PUBKEY(EC_KEY* a, ubyte** pp); 822 EC_KEY* d2i_EC_PUBKEY(EC_KEY** a, const(ubyte)** pp, 823 c_long length); 824 } 825 826 mixin(DECLARE_ASN1_FUNCTIONS!"X509_SIG"); 827 mixin(DECLARE_ASN1_FUNCTIONS!"X509_REQ_INFO"); 828 mixin(DECLARE_ASN1_FUNCTIONS!"X509_REQ"); 829 830 mixin(DECLARE_ASN1_FUNCTIONS!"X509_ATTRIBUTE"); 831 X509_ATTRIBUTE* X509_ATTRIBUTE_create(int nid, int atrtype, void* value); 832 833 mixin(DECLARE_ASN1_FUNCTIONS!"X509_EXTENSION"); 834 mixin(DECLARE_ASN1_ENCODE_FUNCTIONS!("X509_EXTENSIONS", "X509_EXTENSIONS", "X509_EXTENSIONS")); 835 836 mixin(DECLARE_ASN1_FUNCTIONS!"X509_NAME_ENTRY"); 837 838 mixin(DECLARE_ASN1_FUNCTIONS!"X509_NAME"); 839 840 int X509_NAME_set(X509_NAME** xn, X509_NAME* name); 841 842 mixin(DECLARE_ASN1_FUNCTIONS!"X509_CINF"); 843 844 mixin(DECLARE_ASN1_FUNCTIONS!"X509"); 845 mixin(DECLARE_ASN1_FUNCTIONS!"X509_CERT_AUX"); 846 847 mixin(DECLARE_ASN1_FUNCTIONS!"X509_CERT_PAIR"); 848 849 int X509_get_ex_new_index(c_long argl, void* argp, CRYPTO_EX_new* new_func, 850 CRYPTO_EX_dup* dup_func, CRYPTO_EX_free* free_func); 851 int X509_set_ex_data(X509* r, int idx, void* arg); 852 void* X509_get_ex_data(X509* r, int idx); 853 int i2d_X509_AUX(X509* a,ubyte** pp); 854 X509* d2i_X509_AUX(X509** a,const(ubyte)** pp,c_long length); 855 856 int X509_alias_set1(X509* x, ubyte* name, int len); 857 int X509_keyid_set1(X509* x, ubyte* id, int len); 858 ubyte* X509_alias_get0(X509* x, int* len); 859 ubyte* X509_keyid_get0(X509* x, int* len); 860 int function(int, X509*, int) X509_TRUST_set_default(ExternC!(int function(int , X509*, int)) trust); 861 int X509_TRUST_set(int* t, int trust); 862 int X509_add1_trust_object(X509* x, ASN1_OBJECT* obj); 863 int X509_add1_reject_object(X509* x, ASN1_OBJECT* obj); 864 void X509_trust_clear(X509* x); 865 void X509_reject_clear(X509* x); 866 867 mixin(DECLARE_ASN1_FUNCTIONS!"X509_REVOKED"); 868 mixin(DECLARE_ASN1_FUNCTIONS!"X509_CRL_INFO"); 869 mixin(DECLARE_ASN1_FUNCTIONS!"X509_CRL"); 870 871 int X509_CRL_add0_revoked(X509_CRL* crl, X509_REVOKED* rev); 872 int X509_CRL_get0_by_serial(X509_CRL* crl, 873 X509_REVOKED** ret, ASN1_INTEGER* serial); 874 int X509_CRL_get0_by_cert(X509_CRL* crl, X509_REVOKED** ret, X509* x); 875 876 X509_PKEY* X509_PKEY_new(); 877 void X509_PKEY_free(X509_PKEY* a); 878 int i2d_X509_PKEY(X509_PKEY* a,ubyte** pp); 879 X509_PKEY* d2i_X509_PKEY(X509_PKEY** a,const(ubyte)** pp,c_long length); 880 881 mixin(DECLARE_ASN1_FUNCTIONS!"NETSCAPE_SPKI"); 882 mixin(DECLARE_ASN1_FUNCTIONS!"NETSCAPE_SPKAC"); 883 mixin(DECLARE_ASN1_FUNCTIONS!"NETSCAPE_CERT_SEQUENCE"); 884 885 version(OPENSSL_NO_EVP) {} else { 886 X509_INFO* X509_INFO_new(); 887 void X509_INFO_free(X509_INFO* a); 888 char* X509_NAME_oneline(X509_NAME* a,char* buf,int size); 889 890 int ASN1_verify(i2d_of_void* i2d, X509_ALGOR* algor1, 891 ASN1_BIT_STRING* signature,char* data,EVP_PKEY* pkey); 892 893 int ASN1_digest(i2d_of_void* i2d,const(EVP_MD)* type,char* data, 894 ubyte* md,uint* len); 895 896 int ASN1_sign(i2d_of_void* i2d, X509_ALGOR* algor1, 897 X509_ALGOR* algor2, ASN1_BIT_STRING* signature, 898 char* data,EVP_PKEY* pkey, const(EVP_MD)* type); 899 900 int ASN1_item_digest(const(ASN1_ITEM)* it,const(EVP_MD)* type,void* data, 901 ubyte* md,uint* len); 902 903 int ASN1_item_verify(const(ASN1_ITEM)* it, X509_ALGOR* algor1, 904 ASN1_BIT_STRING* signature,void* data,EVP_PKEY* pkey); 905 906 int ASN1_item_sign(const(ASN1_ITEM)* it, X509_ALGOR* algor1, X509_ALGOR* algor2, 907 ASN1_BIT_STRING* signature, 908 void* data, EVP_PKEY* pkey, const(EVP_MD)* type); 909 int ASN1_item_sign_ctx(const ASN1_ITEM *it, 910 X509_ALGOR *algor1, X509_ALGOR *algor2, 911 ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx); 912 } 913 914 int X509_set_version(X509* x,c_long version_); 915 int X509_set_serialNumber(X509* x, ASN1_INTEGER* serial); 916 ASN1_INTEGER* X509_get_serialNumber(X509* x); 917 int X509_set_issuer_name(X509* x, X509_NAME* name); 918 X509_NAME* X509_get_issuer_name(X509* a); 919 int X509_set_subject_name(X509* x, X509_NAME* name); 920 X509_NAME* X509_get_subject_name(X509* a); 921 int X509_set_notBefore(X509* x, const(ASN1_TIME)* tm); 922 int X509_set_notAfter(X509* x, const(ASN1_TIME)* tm); 923 int X509_set_pubkey(X509* x, EVP_PKEY* pkey); 924 EVP_PKEY* X509_get_pubkey(X509* x); 925 ASN1_BIT_STRING* X509_get0_pubkey_bitstr(const(X509)* x); 926 int X509_certificate_type(X509* x,EVP_PKEY* pubkey /* optional */); 927 928 int X509_REQ_set_version(X509_REQ* x,c_long version_); 929 int X509_REQ_set_subject_name(X509_REQ* req,X509_NAME* name); 930 int X509_REQ_set_pubkey(X509_REQ* x, EVP_PKEY* pkey); 931 EVP_PKEY* X509_REQ_get_pubkey(X509_REQ* req); 932 int X509_REQ_extension_nid(int nid); 933 int* X509_REQ_get_extension_nids(); 934 void X509_REQ_set_extension_nids(int* nids); 935 STACK_OF!(X509_EXTENSION) *X509_REQ_get_extensions(X509_REQ* req); 936 int X509_REQ_add_extensions_nid(X509_REQ* req, STACK_OF!(X509_EXTENSION) *exts, 937 int nid); 938 int X509_REQ_add_extensions(X509_REQ* req, STACK_OF!(X509_EXTENSION) *exts); 939 int X509_REQ_get_attr_count(const(X509_REQ)* req); 940 int X509_REQ_get_attr_by_NID(const(X509_REQ)* req, int nid, 941 int lastpos); 942 int X509_REQ_get_attr_by_OBJ(const(X509_REQ)* req, ASN1_OBJECT* obj, 943 int lastpos); 944 X509_ATTRIBUTE* X509_REQ_get_attr(const(X509_REQ)* req, int loc); 945 X509_ATTRIBUTE* X509_REQ_delete_attr(X509_REQ* req, int loc); 946 int X509_REQ_add1_attr(X509_REQ* req, X509_ATTRIBUTE* attr); 947 int X509_REQ_add1_attr_by_OBJ(X509_REQ* req, 948 const(ASN1_OBJECT)* obj, int type, 949 const(ubyte)* bytes, int len); 950 int X509_REQ_add1_attr_by_NID(X509_REQ* req, 951 int nid, int type, 952 const(ubyte)* bytes, int len); 953 int X509_REQ_add1_attr_by_txt(X509_REQ* req, 954 const(char)* attrname, int type, 955 const(ubyte)* bytes, int len); 956 957 int X509_CRL_set_version(X509_CRL* x, c_long version_); 958 int X509_CRL_set_issuer_name(X509_CRL* x, X509_NAME* name); 959 int X509_CRL_set_lastUpdate(X509_CRL* x, const(ASN1_TIME)* tm); 960 int X509_CRL_set_nextUpdate(X509_CRL* x, const(ASN1_TIME)* tm); 961 int X509_CRL_sort(X509_CRL* crl); 962 963 int X509_REVOKED_set_serialNumber(X509_REVOKED* x, ASN1_INTEGER* serial); 964 int X509_REVOKED_set_revocationDate(X509_REVOKED* r, ASN1_TIME* tm); 965 966 int X509_REQ_check_private_key(X509_REQ* x509,EVP_PKEY* pkey); 967 968 int X509_check_private_key(X509* x509,EVP_PKEY* pkey); 969 970 int X509_issuer_and_serial_cmp(const(X509)* a, const(X509)* b); 971 c_ulong X509_issuer_and_serial_hash(X509* a); 972 973 int X509_issuer_name_cmp(const(X509)* a, const(X509)* b); 974 c_ulong X509_issuer_name_hash(X509* a); 975 976 int X509_subject_name_cmp(const(X509)* a, const(X509)* b); 977 c_ulong X509_subject_name_hash(X509* x); 978 979 version(OPENSSL_NO_MD5) {} else { 980 c_ulong X509_issuer_name_hash_old(X509* a); 981 c_ulong X509_subject_name_hash_old(X509* x); 982 } 983 984 int X509_cmp(const(X509)* a, const(X509)* b); 985 int X509_NAME_cmp(const(X509_NAME)* a, const(X509_NAME)* b); 986 c_ulong X509_NAME_hash(X509_NAME* x); 987 c_ulong X509_NAME_hash_old(X509_NAME* x); 988 989 int X509_CRL_cmp(const(X509_CRL)* a, const(X509_CRL)* b); 990 int X509_CRL_match(const(X509_CRL)* a, const(X509_CRL)* b); 991 version(OPENSSL_NO_FP_API) {} else { 992 int X509_print_ex_fp(FILE* bp,X509* x, c_ulong nmflag, c_ulong cflag); 993 int X509_print_fp(FILE* bp,X509* x); 994 int X509_CRL_print_fp(FILE* bp,X509_CRL* x); 995 int X509_REQ_print_fp(FILE* bp,X509_REQ* req); 996 int X509_NAME_print_ex_fp(FILE* fp, X509_NAME* nm, int indent, c_ulong flags); 997 } 998 999 version(OPENSSL_NO_BIO) {} else { 1000 int X509_NAME_print(BIO* bp, X509_NAME* name, int obase); 1001 int X509_NAME_print_ex(BIO* out_, X509_NAME* nm, int indent, c_ulong flags); 1002 int X509_print_ex(BIO* bp,X509* x, c_ulong nmflag, c_ulong cflag); 1003 int X509_print(BIO* bp,X509* x); 1004 int X509_ocspid_print(BIO* bp,X509* x); 1005 int X509_CERT_AUX_print(BIO* bp,X509_CERT_AUX* x, int indent); 1006 int X509_CRL_print(BIO* bp,X509_CRL* x); 1007 int X509_REQ_print_ex(BIO* bp, X509_REQ* x, c_ulong nmflag, c_ulong cflag); 1008 int X509_REQ_print(BIO* bp,X509_REQ* req); 1009 } 1010 1011 int X509_NAME_entry_count(X509_NAME* name); 1012 int X509_NAME_get_text_by_NID(X509_NAME* name, int nid, 1013 char* buf,int len); 1014 int X509_NAME_get_text_by_OBJ(X509_NAME* name, ASN1_OBJECT* obj, 1015 char* buf,int len); 1016 1017 /* NOTE: you should be passsing -1, not 0 as lastpos. The functions that use 1018 * lastpos, search after that position on. */ 1019 int X509_NAME_get_index_by_NID(X509_NAME* name,int nid,int lastpos); 1020 int X509_NAME_get_index_by_OBJ(X509_NAME* name,ASN1_OBJECT* obj, 1021 int lastpos); 1022 X509_NAME_ENTRY* X509_NAME_get_entry(X509_NAME* name, int loc); 1023 X509_NAME_ENTRY* X509_NAME_delete_entry(X509_NAME* name, int loc); 1024 int X509_NAME_add_entry(X509_NAME* name,X509_NAME_ENTRY* ne, 1025 int loc, int set); 1026 int X509_NAME_add_entry_by_OBJ(X509_NAME* name, ASN1_OBJECT* obj, int type, 1027 ubyte* bytes, int len, int loc, int set); 1028 int X509_NAME_add_entry_by_NID(X509_NAME* name, int nid, int type, 1029 ubyte* bytes, int len, int loc, int set); 1030 X509_NAME_ENTRY* X509_NAME_ENTRY_create_by_txt(X509_NAME_ENTRY** ne, 1031 const(char)* field, int type, const(ubyte)* bytes, int len); 1032 X509_NAME_ENTRY* X509_NAME_ENTRY_create_by_NID(X509_NAME_ENTRY** ne, int nid, 1033 int type,ubyte* bytes, int len); 1034 int X509_NAME_add_entry_by_txt(X509_NAME* name, const(char)* field, int type, 1035 const(ubyte)* bytes, int len, int loc, int set); 1036 X509_NAME_ENTRY* X509_NAME_ENTRY_create_by_OBJ(X509_NAME_ENTRY** ne, 1037 ASN1_OBJECT* obj, int type,const(ubyte)* bytes, 1038 int len); 1039 int X509_NAME_ENTRY_set_object(X509_NAME_ENTRY* ne, 1040 ASN1_OBJECT* obj); 1041 int X509_NAME_ENTRY_set_data(X509_NAME_ENTRY* ne, int type, 1042 const(ubyte)* bytes, int len); 1043 ASN1_OBJECT* X509_NAME_ENTRY_get_object(X509_NAME_ENTRY* ne); 1044 ASN1_STRING* X509_NAME_ENTRY_get_data(X509_NAME_ENTRY* ne); 1045 1046 int X509v3_get_ext_count(const STACK_OF!(X509_EXTENSION) *x); 1047 int X509v3_get_ext_by_NID(const STACK_OF!(X509_EXTENSION) *x, 1048 int nid, int lastpos); 1049 int X509v3_get_ext_by_OBJ(const STACK_OF!(X509_EXTENSION) *x, 1050 ASN1_OBJECT* obj,int lastpos); 1051 int X509v3_get_ext_by_critical(const STACK_OF!(X509_EXTENSION) *x, 1052 int crit, int lastpos); 1053 X509_EXTENSION* X509v3_get_ext(const STACK_OF!(X509_EXTENSION) *x, int loc); 1054 X509_EXTENSION* X509v3_delete_ext(STACK_OF!(X509_EXTENSION) *x, int loc); 1055 STACK_OF!(X509_EXTENSION) *X509v3_add_ext(STACK_OF!(X509_EXTENSION) **x, 1056 X509_EXTENSION* ex, int loc); 1057 1058 int X509_get_ext_count(X509* x); 1059 int X509_get_ext_by_NID(X509* x, int nid, int lastpos); 1060 int X509_get_ext_by_OBJ(X509* x,ASN1_OBJECT* obj,int lastpos); 1061 int X509_get_ext_by_critical(X509* x, int crit, int lastpos); 1062 X509_EXTENSION* X509_get_ext(X509* x, int loc); 1063 X509_EXTENSION* X509_delete_ext(X509* x, int loc); 1064 int X509_add_ext(X509* x, X509_EXTENSION* ex, int loc); 1065 void* X509_get_ext_d2i(X509* x, int nid, int* crit, int* idx); 1066 int X509_add1_ext_i2d(X509* x, int nid, void* value, int crit, 1067 c_ulong flags); 1068 1069 int X509_CRL_get_ext_count(X509_CRL* x); 1070 int X509_CRL_get_ext_by_NID(X509_CRL* x, int nid, int lastpos); 1071 int X509_CRL_get_ext_by_OBJ(X509_CRL* x,ASN1_OBJECT* obj,int lastpos); 1072 int X509_CRL_get_ext_by_critical(X509_CRL* x, int crit, int lastpos); 1073 X509_EXTENSION* X509_CRL_get_ext(X509_CRL* x, int loc); 1074 X509_EXTENSION* X509_CRL_delete_ext(X509_CRL* x, int loc); 1075 int X509_CRL_add_ext(X509_CRL* x, X509_EXTENSION* ex, int loc); 1076 void* X509_CRL_get_ext_d2i(X509_CRL* x, int nid, int* crit, int* idx); 1077 int X509_CRL_add1_ext_i2d(X509_CRL* x, int nid, void* value, int crit, 1078 c_ulong flags); 1079 1080 int X509_REVOKED_get_ext_count(X509_REVOKED* x); 1081 int X509_REVOKED_get_ext_by_NID(X509_REVOKED* x, int nid, int lastpos); 1082 int X509_REVOKED_get_ext_by_OBJ(X509_REVOKED* x,ASN1_OBJECT* obj,int lastpos); 1083 int X509_REVOKED_get_ext_by_critical(X509_REVOKED* x, int crit, int lastpos); 1084 X509_EXTENSION* X509_REVOKED_get_ext(X509_REVOKED* x, int loc); 1085 X509_EXTENSION* X509_REVOKED_delete_ext(X509_REVOKED* x, int loc); 1086 int X509_REVOKED_add_ext(X509_REVOKED* x, X509_EXTENSION* ex, int loc); 1087 void* X509_REVOKED_get_ext_d2i(X509_REVOKED* x, int nid, int* crit, int* idx); 1088 int X509_REVOKED_add1_ext_i2d(X509_REVOKED* x, int nid, void* value, int crit, 1089 c_ulong flags); 1090 1091 X509_EXTENSION* X509_EXTENSION_create_by_NID(X509_EXTENSION** ex, 1092 int nid, int crit, ASN1_OCTET_STRING* data); 1093 X509_EXTENSION* X509_EXTENSION_create_by_OBJ(X509_EXTENSION** ex, 1094 ASN1_OBJECT* obj,int crit,ASN1_OCTET_STRING* data); 1095 int X509_EXTENSION_set_object(X509_EXTENSION* ex,ASN1_OBJECT* obj); 1096 int X509_EXTENSION_set_critical(X509_EXTENSION* ex, int crit); 1097 int X509_EXTENSION_set_data(X509_EXTENSION* ex, 1098 ASN1_OCTET_STRING* data); 1099 ASN1_OBJECT* X509_EXTENSION_get_object(X509_EXTENSION* ex); 1100 ASN1_OCTET_STRING* X509_EXTENSION_get_data(X509_EXTENSION* ne); 1101 int X509_EXTENSION_get_critical(X509_EXTENSION* ex); 1102 1103 int X509at_get_attr_count(const STACK_OF!(X509_ATTRIBUTE) *x); 1104 int X509at_get_attr_by_NID(const STACK_OF!(X509_ATTRIBUTE) *x, int nid, 1105 int lastpos); 1106 int X509at_get_attr_by_OBJ(const STACK_OF!(X509_ATTRIBUTE) *sk, ASN1_OBJECT* obj, 1107 int lastpos); 1108 X509_ATTRIBUTE* X509at_get_attr(const STACK_OF!(X509_ATTRIBUTE) *x, int loc); 1109 X509_ATTRIBUTE* X509at_delete_attr(STACK_OF!(X509_ATTRIBUTE) *x, int loc); 1110 STACK_OF!(X509_ATTRIBUTE) *X509at_add1_attr(STACK_OF!(X509_ATTRIBUTE) **x, 1111 X509_ATTRIBUTE* attr); 1112 STACK_OF!(X509_ATTRIBUTE) *X509at_add1_attr_by_OBJ(STACK_OF!(X509_ATTRIBUTE) **x, 1113 const(ASN1_OBJECT)* obj, int type, 1114 const(ubyte)* bytes, int len); 1115 STACK_OF!(X509_ATTRIBUTE) *X509at_add1_attr_by_NID(STACK_OF!(X509_ATTRIBUTE) **x, 1116 int nid, int type, 1117 const(ubyte)* bytes, int len); 1118 STACK_OF!(X509_ATTRIBUTE) *X509at_add1_attr_by_txt(STACK_OF!(X509_ATTRIBUTE) **x, 1119 const(char)* attrname, int type, 1120 const(ubyte)* bytes, int len); 1121 void* X509at_get0_data_by_OBJ(STACK_OF!(X509_ATTRIBUTE) *x, 1122 ASN1_OBJECT* obj, int lastpos, int type); 1123 X509_ATTRIBUTE* X509_ATTRIBUTE_create_by_NID(X509_ATTRIBUTE** attr, int nid, 1124 int atrtype, const(void)* data, int len); 1125 X509_ATTRIBUTE* X509_ATTRIBUTE_create_by_OBJ(X509_ATTRIBUTE** attr, 1126 const(ASN1_OBJECT)* obj, int atrtype, const(void)* data, int len); 1127 X509_ATTRIBUTE* X509_ATTRIBUTE_create_by_txt(X509_ATTRIBUTE** attr, 1128 const(char)* atrname, int type, const(ubyte)* bytes, int len); 1129 int X509_ATTRIBUTE_set1_object(X509_ATTRIBUTE* attr, const(ASN1_OBJECT)* obj); 1130 int X509_ATTRIBUTE_set1_data(X509_ATTRIBUTE* attr, int attrtype, const(void)* data, int len); 1131 void* X509_ATTRIBUTE_get0_data(X509_ATTRIBUTE* attr, int idx, 1132 int atrtype, void* data); 1133 int X509_ATTRIBUTE_count(X509_ATTRIBUTE* attr); 1134 ASN1_OBJECT* X509_ATTRIBUTE_get0_object(X509_ATTRIBUTE* attr); 1135 ASN1_TYPE* X509_ATTRIBUTE_get0_type(X509_ATTRIBUTE* attr, int idx); 1136 1137 int EVP_PKEY_get_attr_count(const(EVP_PKEY)* key); 1138 int EVP_PKEY_get_attr_by_NID(const(EVP_PKEY)* key, int nid, 1139 int lastpos); 1140 int EVP_PKEY_get_attr_by_OBJ(const(EVP_PKEY)* key, ASN1_OBJECT* obj, 1141 int lastpos); 1142 X509_ATTRIBUTE* EVP_PKEY_get_attr(const(EVP_PKEY)* key, int loc); 1143 X509_ATTRIBUTE* EVP_PKEY_delete_attr(EVP_PKEY* key, int loc); 1144 int EVP_PKEY_add1_attr(EVP_PKEY* key, X509_ATTRIBUTE* attr); 1145 int EVP_PKEY_add1_attr_by_OBJ(EVP_PKEY* key, 1146 const(ASN1_OBJECT)* obj, int type, 1147 const(ubyte)* bytes, int len); 1148 int EVP_PKEY_add1_attr_by_NID(EVP_PKEY* key, 1149 int nid, int type, 1150 const(ubyte)* bytes, int len); 1151 int EVP_PKEY_add1_attr_by_txt(EVP_PKEY* key, 1152 const(char)* attrname, int type, 1153 const(ubyte)* bytes, int len); 1154 1155 int X509_verify_cert(X509_STORE_CTX* ctx); 1156 1157 /* lookup a cert from a X509 STACK */ 1158 X509* X509_find_by_issuer_and_serial(STACK_OF!(X509) *sk,X509_NAME* name, 1159 ASN1_INTEGER* serial); 1160 X509* X509_find_by_subject(STACK_OF!(X509) *sk,X509_NAME* name); 1161 1162 mixin(DECLARE_ASN1_FUNCTIONS!"PBEPARAM"); 1163 mixin(DECLARE_ASN1_FUNCTIONS!"PBE2PARAM"); 1164 mixin(DECLARE_ASN1_FUNCTIONS!"PBKDF2PARAM"); 1165 1166 int PKCS5_pbe_set0_algor(X509_ALGOR* algor, int alg, int iter, 1167 const(ubyte)* salt, int saltlen); 1168 1169 X509_ALGOR* PKCS5_pbe_set(int alg, int iter, 1170 const(ubyte)* salt, int saltlen); 1171 X509_ALGOR* PKCS5_pbe2_set(const(EVP_CIPHER)* cipher, int iter, 1172 ubyte* salt, int saltlen); 1173 X509_ALGOR* PKCS5_pbe2_set_iv(const(EVP_CIPHER)* cipher, int iter, 1174 ubyte* salt, int saltlen, 1175 ubyte* aiv, int prf_nid); 1176 1177 X509_ALGOR *PKCS5_pbkdf2_set(int iter, ubyte* salt, int saltlen, 1178 int prf_nid, int keylen); 1179 1180 /* PKCS#8 utilities */ 1181 1182 mixin(DECLARE_ASN1_FUNCTIONS!"PKCS8_PRIV_KEY_INFO"); 1183 1184 EVP_PKEY* EVP_PKCS82PKEY(PKCS8_PRIV_KEY_INFO* p8); 1185 PKCS8_PRIV_KEY_INFO* EVP_PKEY2PKCS8(EVP_PKEY* pkey); 1186 PKCS8_PRIV_KEY_INFO* EVP_PKEY2PKCS8_broken(EVP_PKEY* pkey, int broken); 1187 PKCS8_PRIV_KEY_INFO* PKCS8_set_broken(PKCS8_PRIV_KEY_INFO* p8, int broken); 1188 1189 int PKCS8_pkey_set0(PKCS8_PRIV_KEY_INFO* priv, ASN1_OBJECT* aobj, 1190 int version_, int ptype, void* pval, 1191 ubyte* penc, int penclen); 1192 int PKCS8_pkey_get0(ASN1_OBJECT** ppkalg, 1193 const(ubyte)** pk, int* ppklen, 1194 X509_ALGOR** pa, 1195 PKCS8_PRIV_KEY_INFO* p8); 1196 1197 int X509_PUBKEY_set0_param(X509_PUBKEY* pub, ASN1_OBJECT* aobj, 1198 int ptype, void* pval, 1199 ubyte* penc, int penclen); 1200 int X509_PUBKEY_get0_param(ASN1_OBJECT** ppkalg, 1201 const(ubyte)** pk, int* ppklen, 1202 X509_ALGOR** pa, 1203 X509_PUBKEY* pub); 1204 1205 int X509_check_trust(X509* x, int id, int flags); 1206 int X509_TRUST_get_count(); 1207 X509_TRUST* X509_TRUST_get0(int idx); 1208 int X509_TRUST_get_by_id(int id); 1209 int X509_TRUST_add(int id, int flags, ExternC!(int function(X509_TRUST*, X509*, int)) ck, 1210 char* name, int arg1, void* arg2); 1211 void X509_TRUST_cleanup(); 1212 int X509_TRUST_get_flags(X509_TRUST* xp); 1213 char* X509_TRUST_get0_name(X509_TRUST* xp); 1214 int X509_TRUST_get_trust(X509_TRUST* xp); 1215 1216 /* BEGIN ERROR CODES */ 1217 /* The following lines are auto generated by the script mkerr.pl. Any changes 1218 * made after this point may be overwritten when the script is next run. 1219 */ 1220 void ERR_load_X509_strings(); 1221 1222 /* Error codes for the X509 functions. */ 1223 1224 /* Function codes. */ 1225 enum X509_F_ADD_CERT_DIR = 100; 1226 enum X509_F_BY_FILE_CTRL = 101; 1227 enum X509_F_CHECK_POLICY = 145; 1228 enum X509_F_DIR_CTRL = 102; 1229 enum X509_F_GET_CERT_BY_SUBJECT = 103; 1230 enum X509_F_NETSCAPE_SPKI_B64_DECODE = 129; 1231 enum X509_F_NETSCAPE_SPKI_B64_ENCODE = 130; 1232 enum X509_F_X509AT_ADD1_ATTR = 135; 1233 enum X509_F_X509V3_ADD_EXT = 104; 1234 enum X509_F_X509_ATTRIBUTE_CREATE_BY_NID = 136; 1235 enum X509_F_X509_ATTRIBUTE_CREATE_BY_OBJ = 137; 1236 enum X509_F_X509_ATTRIBUTE_CREATE_BY_TXT = 140; 1237 enum X509_F_X509_ATTRIBUTE_GET0_DATA = 139; 1238 enum X509_F_X509_ATTRIBUTE_SET1_DATA = 138; 1239 enum X509_F_X509_CHECK_PRIVATE_KEY = 128; 1240 enum X509_F_X509_CRL_PRINT_FP = 147; 1241 enum X509_F_X509_EXTENSION_CREATE_BY_NID = 108; 1242 enum X509_F_X509_EXTENSION_CREATE_BY_OBJ = 109; 1243 enum X509_F_X509_GET_PUBKEY_PARAMETERS = 110; 1244 enum X509_F_X509_LOAD_CERT_CRL_FILE = 132; 1245 enum X509_F_X509_LOAD_CERT_FILE = 111; 1246 enum X509_F_X509_LOAD_CRL_FILE = 112; 1247 enum X509_F_X509_NAME_ADD_ENTRY = 113; 1248 enum X509_F_X509_NAME_ENTRY_CREATE_BY_NID = 114; 1249 enum X509_F_X509_NAME_ENTRY_CREATE_BY_TXT = 131; 1250 enum X509_F_X509_NAME_ENTRY_SET_OBJECT = 115; 1251 enum X509_F_X509_NAME_ONELINE = 116; 1252 enum X509_F_X509_NAME_PRINT = 117; 1253 enum X509_F_X509_PRINT_EX_FP = 118; 1254 enum X509_F_X509_PUBKEY_GET = 119; 1255 enum X509_F_X509_PUBKEY_SET = 120; 1256 enum X509_F_X509_REQ_CHECK_PRIVATE_KEY = 144; 1257 enum X509_F_X509_REQ_PRINT_EX = 121; 1258 enum X509_F_X509_REQ_PRINT_FP = 122; 1259 enum X509_F_X509_REQ_TO_X509 = 123; 1260 enum X509_F_X509_STORE_ADD_CERT = 124; 1261 enum X509_F_X509_STORE_ADD_CRL = 125; 1262 enum X509_F_X509_STORE_CTX_GET1_ISSUER = 146; 1263 enum X509_F_X509_STORE_CTX_INIT = 143; 1264 enum X509_F_X509_STORE_CTX_NEW = 142; 1265 enum X509_F_X509_STORE_CTX_PURPOSE_INHERIT = 134; 1266 enum X509_F_X509_TO_X509_REQ = 126; 1267 enum X509_F_X509_TRUST_ADD = 133; 1268 enum X509_F_X509_TRUST_SET = 141; 1269 enum X509_F_X509_VERIFY_CERT = 127; 1270 1271 /* Reason codes. */ 1272 enum X509_R_BAD_X509_FILETYPE = 100; 1273 enum X509_R_BASE64_DECODE_ERROR = 118; 1274 enum X509_R_CANT_CHECK_DH_KEY = 114; 1275 enum X509_R_CERT_ALREADY_IN_HASH_TABLE = 101; 1276 enum X509_R_ERR_ASN1_LIB = 102; 1277 enum X509_R_INVALID_DIRECTORY = 113; 1278 enum X509_R_INVALID_FIELD_NAME = 119; 1279 enum X509_R_INVALID_TRUST = 123; 1280 enum X509_R_KEY_TYPE_MISMATCH = 115; 1281 enum X509_R_KEY_VALUES_MISMATCH = 116; 1282 enum X509_R_LOADING_CERT_DIR = 103; 1283 enum X509_R_LOADING_DEFAULTS = 104; 1284 enum X509_R_METHOD_NOT_SUPPORTED = 124; 1285 enum X509_R_NO_CERT_SET_FOR_US_TO_VERIFY = 105; 1286 enum X509_R_PUBLIC_KEY_DECODE_ERROR = 125; 1287 enum X509_R_PUBLIC_KEY_ENCODE_ERROR = 126; 1288 enum X509_R_SHOULD_RETRY = 106; 1289 enum X509_R_UNABLE_TO_FIND_PARAMETERS_IN_CHAIN = 107; 1290 enum X509_R_UNABLE_TO_GET_CERTS_PUBLIC_KEY = 108; 1291 enum X509_R_UNKNOWN_KEY_TYPE = 117; 1292 enum X509_R_UNKNOWN_NID = 109; 1293 enum X509_R_UNKNOWN_PURPOSE_ID = 121; 1294 enum X509_R_UNKNOWN_TRUST_ID = 120; 1295 enum X509_R_UNSUPPORTED_ALGORITHM = 111; 1296 enum X509_R_WRONG_LOOKUP_TYPE = 112; 1297 enum X509_R_WRONG_TYPE = 122;