diff options
author | cvs2svn <admin@example.com> | 2025-04-14 17:32:06 +0000 |
---|---|---|
committer | cvs2svn <admin@example.com> | 2025-04-14 17:32:06 +0000 |
commit | eb8dd9dca1228af0cd132f515509051ecfabf6f6 (patch) | |
tree | edb6da6af7e865d488dc1a29309f1e1ec226e603 /src/lib/libcrypto/x509/x509_internal.h | |
parent | 247f0352e0ed72a4f476db9dc91f4d982bc83eb2 (diff) | |
download | openbsd-tb_20250414.tar.gz openbsd-tb_20250414.tar.bz2 openbsd-tb_20250414.zip |
This commit was manufactured by cvs2git to create tag 'tb_20250414'.tb_20250414
Diffstat (limited to 'src/lib/libcrypto/x509/x509_internal.h')
-rw-r--r-- | src/lib/libcrypto/x509/x509_internal.h | 141 |
1 files changed, 0 insertions, 141 deletions
diff --git a/src/lib/libcrypto/x509/x509_internal.h b/src/lib/libcrypto/x509/x509_internal.h deleted file mode 100644 index 9b9980ece5..0000000000 --- a/src/lib/libcrypto/x509/x509_internal.h +++ /dev/null | |||
@@ -1,141 +0,0 @@ | |||
1 | /* $OpenBSD: x509_internal.h,v 1.28 2024/05/19 07:12:50 jsg Exp $ */ | ||
2 | /* | ||
3 | * Copyright (c) 2020 Bob Beck <beck@openbsd.org> | ||
4 | * | ||
5 | * Permission to use, copy, modify, and distribute this software for any | ||
6 | * purpose with or without fee is hereby granted, provided that the above | ||
7 | * copyright notice and this permission notice appear in all copies. | ||
8 | * | ||
9 | * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES | ||
10 | * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF | ||
11 | * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR | ||
12 | * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES | ||
13 | * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN | ||
14 | * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF | ||
15 | * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. | ||
16 | */ | ||
17 | #ifndef HEADER_X509_INTERNAL_H | ||
18 | #define HEADER_X509_INTERNAL_H | ||
19 | |||
20 | /* Internal use only, not public API */ | ||
21 | #include <netinet/in.h> | ||
22 | |||
23 | #include "bytestring.h" | ||
24 | #include "x509_local.h" | ||
25 | #include "x509_verify.h" | ||
26 | |||
27 | /* Hard limits on structure size and number of signature checks. */ | ||
28 | #define X509_VERIFY_MAX_CHAINS 8 /* Max validated chains */ | ||
29 | #define X509_VERIFY_MAX_CHAIN_CERTS 32 /* Max depth of a chain */ | ||
30 | #define X509_VERIFY_MAX_SIGCHECKS 256 /* Max signature checks */ | ||
31 | |||
32 | /* | ||
33 | * Limit the number of names and constraints we will check in a chain | ||
34 | * to avoid a hostile input DOS | ||
35 | */ | ||
36 | #define X509_VERIFY_MAX_CHAIN_NAMES 512 | ||
37 | #define X509_VERIFY_MAX_CHAIN_CONSTRAINTS 512 | ||
38 | |||
39 | /* | ||
40 | * Hold the parsed and validated result of names from a certificate. | ||
41 | * these typically come from a GENERALNAME, but we store the parsed | ||
42 | * and validated results, not the ASN1 bytes. | ||
43 | */ | ||
44 | struct x509_constraints_name { | ||
45 | int type; /* GEN_* types from GENERAL_NAME */ | ||
46 | char *name; /* Name to check */ | ||
47 | char *local; /* holds the local part of GEN_EMAIL */ | ||
48 | uint8_t *der; /* DER encoded value or NULL*/ | ||
49 | size_t der_len; | ||
50 | int af; /* INET and INET6 are supported */ | ||
51 | uint8_t address[32]; /* Must hold ipv6 + mask */ | ||
52 | }; | ||
53 | |||
54 | struct x509_constraints_names { | ||
55 | struct x509_constraints_name **names; | ||
56 | size_t names_count; | ||
57 | size_t names_len; | ||
58 | size_t names_max; | ||
59 | }; | ||
60 | |||
61 | struct x509_verify_chain { | ||
62 | STACK_OF(X509) *certs; /* Kept in chain order, includes leaf */ | ||
63 | int *cert_errors; /* Verify error for each cert in chain. */ | ||
64 | struct x509_constraints_names *names; /* All names from all certs */ | ||
65 | }; | ||
66 | |||
67 | struct x509_verify_ctx { | ||
68 | X509_STORE_CTX *xsc; | ||
69 | struct x509_verify_chain **chains; /* Validated chains */ | ||
70 | STACK_OF(X509) *saved_error_chain; | ||
71 | int saved_error; | ||
72 | int saved_error_depth; | ||
73 | size_t chains_count; | ||
74 | STACK_OF(X509) *roots; /* Trusted roots for this validation */ | ||
75 | STACK_OF(X509) *intermediates; /* Intermediates provided by peer */ | ||
76 | time_t *check_time; /* Time for validity checks */ | ||
77 | int purpose; /* Cert purpose we are validating */ | ||
78 | size_t max_chains; /* Max chains to return */ | ||
79 | size_t max_depth; /* Max chain depth for validation */ | ||
80 | size_t max_sigs; /* Max number of signature checks */ | ||
81 | size_t sig_checks; /* Number of signature checks done */ | ||
82 | size_t error_depth; /* Depth of last error seen */ | ||
83 | int error; /* Last error seen */ | ||
84 | }; | ||
85 | |||
86 | int ASN1_time_tm_clamp_notafter(struct tm *tm); | ||
87 | |||
88 | __BEGIN_HIDDEN_DECLS | ||
89 | |||
90 | int x509_vfy_check_id(X509_STORE_CTX *ctx); | ||
91 | int x509_vfy_check_revocation(X509_STORE_CTX *ctx); | ||
92 | int x509_vfy_check_policy(X509_STORE_CTX *ctx); | ||
93 | int x509_vfy_check_trust(X509_STORE_CTX *ctx); | ||
94 | int x509_vfy_check_chain_extensions(X509_STORE_CTX *ctx); | ||
95 | int x509_vfy_callback_indicate_completion(X509_STORE_CTX *ctx); | ||
96 | int x509v3_cache_extensions(X509 *x); | ||
97 | X509 *x509_vfy_lookup_cert_match(X509_STORE_CTX *ctx, X509 *x); | ||
98 | |||
99 | int x509_verify_asn1_time_to_time_t(const ASN1_TIME *atime, int notafter, | ||
100 | time_t *out); | ||
101 | |||
102 | struct x509_verify_ctx *x509_verify_ctx_new_from_xsc(X509_STORE_CTX *xsc); | ||
103 | |||
104 | void x509_constraints_name_clear(struct x509_constraints_name *name); | ||
105 | void x509_constraints_name_free(struct x509_constraints_name *name); | ||
106 | int x509_constraints_names_add(struct x509_constraints_names *names, | ||
107 | struct x509_constraints_name *name); | ||
108 | struct x509_constraints_names *x509_constraints_names_dup( | ||
109 | struct x509_constraints_names *names); | ||
110 | void x509_constraints_names_clear(struct x509_constraints_names *names); | ||
111 | struct x509_constraints_names *x509_constraints_names_new(size_t names_max); | ||
112 | int x509_constraints_general_to_bytes(GENERAL_NAME *name, uint8_t **bytes, | ||
113 | size_t *len); | ||
114 | void x509_constraints_names_free(struct x509_constraints_names *names); | ||
115 | int x509_constraints_valid_host(CBS *cbs, int permit_ip); | ||
116 | int x509_constraints_valid_sandns(CBS *cbs); | ||
117 | int x509_constraints_domain(char *domain, size_t dlen, char *constraint, | ||
118 | size_t len); | ||
119 | int x509_constraints_parse_mailbox(CBS *candidate, | ||
120 | struct x509_constraints_name *name); | ||
121 | int x509_constraints_valid_domain_constraint(CBS *cbs); | ||
122 | int x509_constraints_uri_host(uint8_t *uri, size_t len, char **hostp); | ||
123 | int x509_constraints_uri(uint8_t *uri, size_t ulen, uint8_t *constraint, | ||
124 | size_t len, int *error); | ||
125 | int x509_constraints_extract_names(struct x509_constraints_names *names, | ||
126 | X509 *cert, int include_cn, int *error); | ||
127 | int x509_constraints_extract_constraints(X509 *cert, | ||
128 | struct x509_constraints_names *permitted, | ||
129 | struct x509_constraints_names *excluded, int *error); | ||
130 | int x509_constraints_validate(GENERAL_NAME *constraint, | ||
131 | struct x509_constraints_name **out_name, int *error); | ||
132 | int x509_constraints_check(struct x509_constraints_names *names, | ||
133 | struct x509_constraints_names *permitted, | ||
134 | struct x509_constraints_names *excluded, int *error); | ||
135 | int x509_constraints_chain(STACK_OF(X509) *chain, int *error, | ||
136 | int *depth); | ||
137 | int x509_vfy_check_security_level(X509_STORE_CTX *ctx); | ||
138 | |||
139 | __END_HIDDEN_DECLS | ||
140 | |||
141 | #endif | ||