File: tls_select.h

package info (click to toggle)
openser 1.1.0-9etch1
  • links: PTS
  • area: main
  • in suites: etch, etch-m68k
  • size: 9,828 kB
  • ctags: 11,809
  • sloc: ansic: 120,528; sh: 5,249; yacc: 1,716; makefile: 1,261; php: 656; perl: 205; sql: 190
file content (94 lines) | stat: -rw-r--r-- 3,208 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
/*
 * $Id: tls_select.h,v 1.1 2006/05/22 15:12:23 bogdan_iancu Exp $
 *
 * Copyright (C) 2006 enum.at
 *
 * This file is part of openser, a free SIP server.
 *
 * openser is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version
 *
 * openser is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License 
 * along with this program; if not, write to the Free Software 
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */

#ifndef _TLS_SELECT_H_
#define _TLS_SELECT_H_

#include <openssl/ssl.h>

#include "../../parser/msg_parser.h"
#include "../../items.h"

enum {
	CERT_LOCAL      = 1<<0,   /* Select local certificate */
	CERT_PEER       = 1<<1,   /* Select peer certificate */
	CERT_SUBJECT    = 1<<2,   /* Select subject part of certificate */
	CERT_ISSUER     = 1<<3,   /* Select issuer part of certificate */

	CERT_VERIFIED   = 1<<4,   /* Test for verified certificate */
	CERT_REVOKED    = 1<<5,   /* Test for revoked certificate */
	CERT_EXPIRED    = 1<<6,   /* Expiration certificate test */
	CERT_SELFSIGNED = 1<<7,   /* self-signed certificate test */
	CERT_NOTBEFORE  = 1<<8,   /* Select validity end from certificate */
	CERT_NOTAFTER   = 1<<9,   /* Select validity start from certificate */

	COMP_CN = 1<<10,          /* Common name */
	COMP_O  = 1<<11,          /* Organization name */
	COMP_OU = 1<<12,          /* Organization unit */
	COMP_C  = 1<<13,          /* Country name */
	COMP_ST = 1<<14,          /* State */
	COMP_L  = 1<<15,          /* Locality/town */

	COMP_HOST = 1<<16,        /* hostname from subject/alternative */
	COMP_URI  = 1<<17,        /* URI from subject/alternative */
	COMP_E    = 1<<18,        /* Email address */
	COMP_IP   = 1<<19         /* IP from subject/alternative */
};


typedef int select_t;

int tlsops_cipher(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_bits(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_version(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_desc(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_cert_version(struct sip_msg *msg, xl_value_t *res, 
		xl_param_t *param, int flags);

/*
 * Check whether peer certificate exists and verify the result
 * of certificate verification
 */
int tlsops_check_cert(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_validity(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_sn(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_comp(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

int tlsops_alt(struct sip_msg *msg, xl_value_t *res, xl_param_t *param,
		int flags);

#endif