/*
* Copyright (C) 2002-2012 Free Software Foundation, Inc.
* Copyright (C) 2016-2017 Red Hat, Inc.
*
* Author: Nikos Mavrogiannopoulos
*
* This file is part of GnuTLS.
*
* The GnuTLS is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public License
* as published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public License
* along with this program. If not, see
*
*/
#ifndef AUTH_CERT_H
#define AUTH_CERT_H
#include "auth.h"
#include
#include
#include
#include
#include
#define MAX_OCSP_RESPONSES 8
typedef struct {
gnutls_pcert_st *cert_list; /* a certificate chain */
unsigned int cert_list_length; /* its length */
gnutls_str_array_t names; /* the names in the first certificate */
gnutls_status_request_ocsp_func ocsp_func;
void *ocsp_func_ptr; /* corresponding OCSP response function + ptr */
gnutls_ocsp_data_st ocsp_data[MAX_OCSP_RESPONSES];
unsigned int ocsp_data_length;
/* the private key corresponding to certificate */
gnutls_privkey_t pkey;
} certs_st;
/* This structure may be complex, but it's the only way to
* support a server that has multiple certificates
*/
typedef struct gnutls_certificate_credentials_st {
gnutls_dh_params_t dh_params;
unsigned deinit_dh_params; /* if the internal values are set */
gnutls_sec_param_t dh_sec_param; /* used in RFC7919 negotiation */
/* this callback is used to retrieve the DH or RSA
* parameters.
*/
gnutls_params_function *params_func;
certs_st *certs;
unsigned ncerts; /* the number of certs */
/* contains sorted index values for certs. Sorted in a way
* that RSA-PSS keys always take precedence over plain RSA keys
* to ensure that we use only RSA-PSS keys if present for RSA-PSS
* operations. We keep indexes to certs structures above.
*/
unsigned int *sorted_cert_idx;
/* X509 specific stuff */
gnutls_x509_trust_list_t tlist;
unsigned flags; /* gnutls_certificate_flags */
unsigned int verify_flags; /* flags to be used at
* certificate verification.
*/
unsigned int verify_depth;
unsigned int verify_bits;
/* It's a mess here. However we need to keep the old 3 functions
* for compatibility */
gnutls_certificate_retrieve_function *legacy_cert_cb1; /* deprecated */
gnutls_certificate_retrieve_function2 *legacy_cert_cb2;
gnutls_certificate_retrieve_function3 *get_cert_callback3;
gnutls_certificate_verify_function *verify_callback;
struct pin_info_st pin;
/* temporarily hold the PIN if set_key_file2() is used with a PIN */
char pin_tmp[GNUTLS_PKCS11_MAX_PIN_LEN];
/* OCSP */
gnutls_status_request_ocsp_func glob_ocsp_func;
void *glob_ocsp_func_ptr; /* corresponding OCSP response function */
} certificate_credentials_st;
/* This is the information we keep for the peer
* certificate.
*/
typedef struct cert_auth_info_st {
/* These (dh/rsa) are just copies from the credentials_t structure.
* They must be freed.
*/
dh_info_st dh;
/* we store the peer's OCSP responses received during
* this session. */
gnutls_datum_t *raw_ocsp_list;
unsigned int nocsp;
/* we store the peer's certificates received during
* this ession */
gnutls_datum_t *raw_certificate_list;
unsigned int ncerts;
gnutls_certificate_type_t cert_type;
} *cert_auth_info_t;
typedef struct cert_auth_info_st cert_auth_info_st;
/* AUTH X509 functions */
int _gnutls_gen_cert_server_crt(gnutls_session_t, gnutls_buffer_st *);
int _gnutls_gen_cert_client_crt(gnutls_session_t, gnutls_buffer_st *);
int _gnutls_gen_cert_client_crt_vrfy(gnutls_session_t, gnutls_buffer_st *);
int _gnutls_gen_cert_server_cert_req(gnutls_session_t, gnutls_buffer_st *);
int _gnutls_proc_cert_cert_req(gnutls_session_t, uint8_t *, size_t);
int _gnutls_proc_cert_client_crt_vrfy(gnutls_session_t, uint8_t *, size_t);
int _gnutls_proc_crt(gnutls_session_t, uint8_t *, size_t);
int _gnutls_get_selected_cert(gnutls_session_t session,
gnutls_pcert_st ** apr_cert_list,
int *apr_cert_list_length,
gnutls_privkey_t * apr_pkey);
int
_gnutls_select_client_cert(gnutls_session_t session,
const uint8_t * _data, size_t _data_size,
gnutls_pk_algorithm_t * pk_algos, int pk_algos_length);
int _gnutls_pcert_to_auth_info(cert_auth_info_t info, gnutls_pcert_st * certs, size_t ncerts);
int
_gnutls_server_select_cert(gnutls_session_t session, const gnutls_cipher_suite_entry_st *cs);
void _gnutls_selected_certs_deinit(gnutls_session_t session);
int _gnutls_get_auth_info_pcert(gnutls_pcert_st * gcert,
gnutls_certificate_type_t type,
cert_auth_info_t info);
int _gnutls_selected_cert_supported_kx(struct gnutls_session_int *session,
gnutls_kx_algorithm_t * alg,
int *alg_size);
int _gnutls_check_key_cert_match(gnutls_certificate_credentials_t res);
int _gnutls_gen_dhe_signature(gnutls_session_t session,
gnutls_buffer_st * data, uint8_t * plain,
unsigned plain_size);
int _gnutls_proc_dhe_signature(gnutls_session_t session, uint8_t * data,
size_t _data_size,
gnutls_datum_t * vparams);
#endif