123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140 |
- =pod
- =head1 NAME
- CT_POLICY_EVAL_CTX_new_ex,
- CT_POLICY_EVAL_CTX_new, CT_POLICY_EVAL_CTX_free,
- CT_POLICY_EVAL_CTX_get0_cert, CT_POLICY_EVAL_CTX_set1_cert,
- CT_POLICY_EVAL_CTX_get0_issuer, CT_POLICY_EVAL_CTX_set1_issuer,
- CT_POLICY_EVAL_CTX_get0_log_store, CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE,
- CT_POLICY_EVAL_CTX_get_time, CT_POLICY_EVAL_CTX_set_time -
- Encapsulates the data required to evaluate whether SCTs meet a Certificate Transparency policy
- =head1 SYNOPSIS
- #include <openssl/ct.h>
- CT_POLICY_EVAL_CTX *CT_POLICY_EVAL_CTX_new_ex(OSSL_LIB_CTX *libctx,
- const char *propq);
- CT_POLICY_EVAL_CTX *CT_POLICY_EVAL_CTX_new(void);
- void CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx);
- X509* CT_POLICY_EVAL_CTX_get0_cert(const CT_POLICY_EVAL_CTX *ctx);
- int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
- X509* CT_POLICY_EVAL_CTX_get0_issuer(const CT_POLICY_EVAL_CTX *ctx);
- int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer);
- const CTLOG_STORE *CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *ctx);
- void CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx,
- CTLOG_STORE *log_store);
- uint64_t CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx);
- void CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms);
- =head1 DESCRIPTION
- A B<CT_POLICY_EVAL_CTX> is used by functions that evaluate whether Signed
- Certificate Timestamps (SCTs) fulfil a Certificate Transparency (CT) policy.
- This policy may be, for example, that at least one valid SCT is available. To
- determine this, an SCT's timestamp and signature must be verified.
- This requires:
- =over 2
- =item *
- the public key of the log that issued the SCT
- =item *
- the certificate that the SCT was issued for
- =item *
- the issuer certificate (if the SCT was issued for a pre-certificate)
- =item *
- the current time
- =back
- The above requirements are met using the setters described below.
- CT_POLICY_EVAL_CTX_new_ex() creates an empty policy evaluation context
- and associates it with the given library context I<libctx> and property query
- string I<propq>.
- CT_POLICY_EVAL_CTX_new() does the same thing as
- CT_POLICY_EVAL_CTX_new_ex() except that it uses the default library
- context and property query string.
- The CT_POLICY_EVAL_CTX should then be populated using:
- =over 2
- =item *
- CT_POLICY_EVAL_CTX_set1_cert() to provide the certificate the SCTs were issued for
- Increments the reference count of the certificate.
- =item *
- CT_POLICY_EVAL_CTX_set1_issuer() to provide the issuer certificate
- Increments the reference count of the certificate.
- =item *
- CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE() to provide a list of logs that are trusted as sources of SCTs
- Holds a pointer to the CTLOG_STORE, so the CTLOG_STORE must outlive the
- CT_POLICY_EVAL_CTX.
- =item *
- CT_POLICY_EVAL_CTX_set_time() to set the time SCTs should be compared with to determine if they are valid
- The SCT timestamp will be compared to this time to check whether the SCT was
- issued in the future. RFC6962 states that "TLS clients MUST reject SCTs whose
- timestamp is in the future". By default, this will be set to 5 minutes in the
- future (e.g. (time() + 300) * 1000), to allow for clock drift.
- The time should be in milliseconds since the Unix Epoch.
- =back
- Each setter has a matching getter for accessing the current value.
- When no longer required, the B<CT_POLICY_EVAL_CTX> should be passed to
- CT_POLICY_EVAL_CTX_free() to delete it.
- =head1 NOTES
- The issuer certificate only needs to be provided if at least one of the SCTs
- was issued for a pre-certificate. This will be the case for SCTs embedded in a
- certificate (i.e. those in an X.509 extension), but may not be the case for SCTs
- found in the TLS SCT extension or OCSP response.
- =head1 RETURN VALUES
- CT_POLICY_EVAL_CTX_new_ex() and CT_POLICY_EVAL_CTX_new() will return
- NULL if malloc fails.
- =head1 SEE ALSO
- L<ct(7)>
- =head1 HISTORY
- CT_POLICY_EVAL_CTX_new_ex was added in OpenSSL 3.0. All other
- functions were added in OpenSSL 1.1.0.
- =head1 COPYRIGHT
- Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- L<https://www.openssl.org/source/license.html>.
- =cut
|