1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66
|
/* NSS certificate verification routines for libreswan
*
* Copyright (C) 2015 Matt Rogers <mrogers@libreswan.org>
* Copyright (C) 2018-2019 Andrew Cagney <cagney@gnu.org>
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*
*/
#ifndef NSS_CERT_VFY_H
#define NSS_CERT_VFY_H
#include <cert.h>
#include "defs.h"
#include "chunk.h"
struct certs;
struct payload_digest;
struct root_certs;
struct logger;
/*
* Try to find and verify the end cert. Sets CRL_NEEDED and BAD (for
* instance, revoked) when required. Logs then returns NULL if the
* certs were discarded.
*/
/* rev_opts index */
struct rev_opts {
bool ocsp;
bool ocsp_strict;
bool ocsp_post;
bool crl_strict;
};
struct verified_certs {
struct certs *cert_chain;
struct pubkey_list *pubkey_db;
bool crl_update_needed;
bool harmless;
bool groundhog;
};
struct verified_certs find_and_verify_certs(struct logger *log,
enum ike_version ike_version,
struct payload_digest *cert_payloads,
const struct rev_opts *rev_opts,
struct root_certs *root_cert,
const struct id *keyid);
extern diag_t cert_verify_subject_alt_name(const char *who, const CERTCertificate *cert,
const struct id *id);
extern SECItem *nss_pkcs7_blob(const struct cert *cert, bool send_full_chain);
extern bool groundhogday;
#endif /* NSS_CERT_VFY_H */
|