2
0

OCSP_resp_find_status.pod 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192
  1. =pod
  2. =head1 NAME
  3. OCSP_resp_get0_certs,
  4. OCSP_resp_get0_signer,
  5. OCSP_resp_get0_id,
  6. OCSP_resp_get0_produced_at,
  7. OCSP_resp_get0_signature,
  8. OCSP_resp_get0_tbs_sigalg,
  9. OCSP_resp_get0_respdata,
  10. OCSP_resp_find_status, OCSP_resp_count, OCSP_resp_get0, OCSP_resp_find,
  11. OCSP_single_get0_status, OCSP_check_validity,
  12. OCSP_basic_verify
  13. - OCSP response utility functions
  14. =head1 SYNOPSIS
  15. #include <openssl/ocsp.h>
  16. int OCSP_resp_find_status(OCSP_BASICRESP *bs, OCSP_CERTID *id, int *status,
  17. int *reason,
  18. ASN1_GENERALIZEDTIME **revtime,
  19. ASN1_GENERALIZEDTIME **thisupd,
  20. ASN1_GENERALIZEDTIME **nextupd);
  21. int OCSP_resp_count(OCSP_BASICRESP *bs);
  22. OCSP_SINGLERESP *OCSP_resp_get0(OCSP_BASICRESP *bs, int idx);
  23. int OCSP_resp_find(OCSP_BASICRESP *bs, OCSP_CERTID *id, int last);
  24. int OCSP_single_get0_status(OCSP_SINGLERESP *single, int *reason,
  25. ASN1_GENERALIZEDTIME **revtime,
  26. ASN1_GENERALIZEDTIME **thisupd,
  27. ASN1_GENERALIZEDTIME **nextupd);
  28. const ASN1_GENERALIZEDTIME *OCSP_resp_get0_produced_at(
  29. const OCSP_BASICRESP* single);
  30. const ASN1_OCTET_STRING *OCSP_resp_get0_signature(const OCSP_BASICRESP *bs);
  31. const X509_ALGOR *OCSP_resp_get0_tbs_sigalg(const OCSP_BASICRESP *bs);
  32. const OCSP_RESPDATA *OCSP_resp_get0_respdata(const OCSP_BASICRESP *bs);
  33. const STACK_OF(X509) *OCSP_resp_get0_certs(const OCSP_BASICRESP *bs);
  34. int OCSP_resp_get0_signer(OCSP_BASICRESP *bs, X509 **signer,
  35. STACK_OF(X509) *extra_certs);
  36. int OCSP_resp_get0_id(const OCSP_BASICRESP *bs,
  37. const ASN1_OCTET_STRING **pid,
  38. const X509_NAME **pname);
  39. int OCSP_check_validity(ASN1_GENERALIZEDTIME *thisupd,
  40. ASN1_GENERALIZEDTIME *nextupd,
  41. long sec, long maxsec);
  42. int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs,
  43. X509_STORE *st, unsigned long flags);
  44. =head1 DESCRIPTION
  45. OCSP_resp_find_status() searches B<bs> for an OCSP response for B<id>. If it is
  46. successful the fields of the response are returned in B<*status>, B<*reason>,
  47. B<*revtime>, B<*thisupd> and B<*nextupd>. The B<*status> value will be one of
  48. B<V_OCSP_CERTSTATUS_GOOD>, B<V_OCSP_CERTSTATUS_REVOKED> or
  49. B<V_OCSP_CERTSTATUS_UNKNOWN>. The B<*reason> and B<*revtime> fields are only
  50. set if the status is B<V_OCSP_CERTSTATUS_REVOKED>. If set the B<*reason> field
  51. will be set to the revocation reason which will be one of
  52. B<OCSP_REVOKED_STATUS_NOSTATUS>, B<OCSP_REVOKED_STATUS_UNSPECIFIED>,
  53. B<OCSP_REVOKED_STATUS_KEYCOMPROMISE>, B<OCSP_REVOKED_STATUS_CACOMPROMISE>,
  54. B<OCSP_REVOKED_STATUS_AFFILIATIONCHANGED>, B<OCSP_REVOKED_STATUS_SUPERSEDED>,
  55. B<OCSP_REVOKED_STATUS_CESSATIONOFOPERATION>,
  56. B<OCSP_REVOKED_STATUS_CERTIFICATEHOLD> or B<OCSP_REVOKED_STATUS_REMOVEFROMCRL>.
  57. OCSP_resp_count() returns the number of B<OCSP_SINGLERESP> structures in B<bs>.
  58. OCSP_resp_get0() returns the B<OCSP_SINGLERESP> structure in B<bs>
  59. corresponding to index B<idx>. Where B<idx> runs from 0 to
  60. OCSP_resp_count(bs) - 1.
  61. OCSP_resp_find() searches B<bs> for B<id> and returns the index of the first
  62. matching entry after B<last> or starting from the beginning if B<last> is -1.
  63. OCSP_single_get0_status() extracts the fields of B<single> in B<*reason>,
  64. B<*revtime>, B<*thisupd> and B<*nextupd>.
  65. OCSP_resp_get0_produced_at() extracts the B<producedAt> field from the
  66. single response B<bs>.
  67. OCSP_resp_get0_signature() returns the signature from B<bs>.
  68. OCSP_resp_get0_tbs_sigalg() returns the B<signatureAlgorithm> from B<bs>.
  69. OCSP_resp_get0_respdata() returns the B<tbsResponseData> from B<bs>.
  70. OCSP_resp_get0_certs() returns any certificates included in B<bs>.
  71. OCSP_resp_get0_signer() attempts to retrieve the certificate that directly
  72. signed B<bs>. The OCSP protocol does not require that this certificate
  73. is included in the B<certs> field of the response, so additional certificates
  74. can be supplied in B<extra_certs> if the certificates that may have
  75. signed the response are known via some out-of-band mechanism.
  76. OCSP_resp_get0_id() gets the responder id of B<bs>. If the responder ID is
  77. a name then <*pname> is set to the name and B<*pid> is set to NULL. If the
  78. responder ID is by key ID then B<*pid> is set to the key ID and B<*pname>
  79. is set to NULL.
  80. OCSP_check_validity() checks the validity of B<thisupd> and B<nextupd> values
  81. which will be typically obtained from OCSP_resp_find_status() or
  82. OCSP_single_get0_status(). If B<sec> is non-zero it indicates how many seconds
  83. leeway should be allowed in the check. If B<maxsec> is positive it indicates
  84. the maximum age of B<thisupd> in seconds.
  85. OCSP_basic_verify() checks that the basic response message B<bs> is correctly
  86. signed and that the signer certificate can be validated. It takes B<st> as
  87. the trusted store and B<certs> as a set of untrusted intermediate certificates.
  88. The function first tries to find the signer certificate of the response
  89. in <certs>. It also searches the certificates the responder may have included
  90. in B<bs> unless the B<flags> contain B<OCSP_NOINTERN>.
  91. It fails if the signer certificate cannot be found.
  92. Next, the function checks the signature of B<bs> and fails on error
  93. unless the B<flags> contain B<OCSP_NOSIGS>. Then the function already returns
  94. success if the B<flags> contain B<OCSP_NOVERIFY> or if the signer certificate
  95. was found in B<certs> and the B<flags> contain B<OCSP_TRUSTOTHER>.
  96. Otherwise the function continues by validating the signer certificate.
  97. To this end, all certificates in B<cert> and in B<bs> are considered as
  98. untrusted certificates for the construction of the validation path for the
  99. signer certificate unless the B<OCSP_NOCHAIN> flag is set. After successful path
  100. validation the function returns success if the B<OCSP_NOCHECKS> flag is set.
  101. Otherwise it verifies that the signer certificate meets the OCSP issuer
  102. criteria including potential delegation. If this does not succeed and the
  103. B<flags> do not contain B<OCSP_NOEXPLICIT> the function checks for explicit
  104. trust for OCSP signing in the root CA certificate.
  105. =head1 RETURN VALUES
  106. OCSP_resp_find_status() returns 1 if B<id> is found in B<bs> and 0 otherwise.
  107. OCSP_resp_count() returns the total number of B<OCSP_SINGLERESP> fields in
  108. B<bs>.
  109. OCSP_resp_get0() returns a pointer to an B<OCSP_SINGLERESP> structure or
  110. B<NULL> if B<idx> is out of range.
  111. OCSP_resp_find() returns the index of B<id> in B<bs> (which may be 0) or -1 if
  112. B<id> was not found.
  113. OCSP_single_get0_status() returns the status of B<single> or -1 if an error
  114. occurred.
  115. OCSP_resp_get0_signer() returns 1 if the signing certificate was located,
  116. or 0 on error.
  117. OCSP_basic_verify() returns 1 on success, 0 on error, or -1 on fatal error such
  118. as malloc failure.
  119. =head1 NOTES
  120. Applications will typically call OCSP_resp_find_status() using the certificate
  121. ID of interest and then check its validity using OCSP_check_validity(). They
  122. can then take appropriate action based on the status of the certificate.
  123. An OCSP response for a certificate contains B<thisUpdate> and B<nextUpdate>
  124. fields. Normally the current time should be between these two values. To
  125. account for clock skew the B<maxsec> field can be set to non-zero in
  126. OCSP_check_validity(). Some responders do not set the B<nextUpdate> field, this
  127. would otherwise mean an ancient response would be considered valid: the
  128. B<maxsec> parameter to OCSP_check_validity() can be used to limit the permitted
  129. age of responses.
  130. The values written to B<*revtime>, B<*thisupd> and B<*nextupd> by
  131. OCSP_resp_find_status() and OCSP_single_get0_status() are internal pointers
  132. which B<MUST NOT> be freed up by the calling application. Any or all of these
  133. parameters can be set to NULL if their value is not required.
  134. =head1 SEE ALSO
  135. L<crypto(3)>,
  136. L<OCSP_cert_to_id(3)>,
  137. L<OCSP_request_add1_nonce(3)>,
  138. L<OCSP_REQUEST_new(3)>,
  139. L<OCSP_response_status(3)>,
  140. L<OCSP_sendreq_new(3)>
  141. =head1 COPYRIGHT
  142. Copyright 2015-2018 The OpenSSL Project Authors. All Rights Reserved.
  143. Licensed under the OpenSSL license (the "License"). You may not use
  144. this file except in compliance with the License. You can obtain a copy
  145. in the file LICENSE in the source distribution or at
  146. L<https://www.openssl.org/source/license.html>.
  147. =cut