|
Packit |
90a5c9 |
/* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
Packit |
90a5c9 |
* contributor license agreements. See the NOTICE file distributed with
|
|
Packit |
90a5c9 |
* this work for additional information regarding copyright ownership.
|
|
Packit |
90a5c9 |
* The ASF licenses this file to You under the Apache License, Version 2.0
|
|
Packit |
90a5c9 |
* (the "License"); you may not use this file except in compliance with
|
|
Packit |
90a5c9 |
* the License. You may obtain a copy of the License at
|
|
Packit |
90a5c9 |
*
|
|
Packit |
90a5c9 |
* http://www.apache.org/licenses/LICENSE-2.0
|
|
Packit |
90a5c9 |
*
|
|
Packit |
90a5c9 |
* Unless required by applicable law or agreed to in writing, software
|
|
Packit |
90a5c9 |
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
Packit |
90a5c9 |
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
Packit |
90a5c9 |
* See the License for the specific language governing permissions and
|
|
Packit |
90a5c9 |
* limitations under the License.
|
|
Packit |
90a5c9 |
*/
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
#ifndef mod_md_md_crypt_h
|
|
Packit |
90a5c9 |
#define mod_md_md_crypt_h
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
#include <apr_file_io.h>
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
struct apr_array_header_t;
|
|
Packit |
90a5c9 |
struct md_t;
|
|
Packit |
90a5c9 |
struct md_http_response_t;
|
|
Packit |
90a5c9 |
struct md_cert_t;
|
|
Packit |
90a5c9 |
struct md_pkey_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
/**************************************************************************************************/
|
|
Packit |
90a5c9 |
/* random */
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_rand_bytes(unsigned char *buf, apr_size_t len, apr_pool_t *p);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
/**************************************************************************************************/
|
|
Packit |
90a5c9 |
/* digests */
|
|
Packit |
90a5c9 |
apr_status_t md_crypt_sha256_digest64(const char **pdigest64, apr_pool_t *p,
|
|
Packit |
90a5c9 |
const char *d, size_t dlen);
|
|
Packit |
90a5c9 |
apr_status_t md_crypt_sha256_digest_hex(const char **pdigesthex, apr_pool_t *p,
|
|
Packit |
90a5c9 |
const char *d, size_t dlen);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
/**************************************************************************************************/
|
|
Packit |
90a5c9 |
/* private keys */
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
typedef struct md_pkey_t md_pkey_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
typedef enum {
|
|
Packit |
90a5c9 |
MD_PKEY_TYPE_DEFAULT,
|
|
Packit |
90a5c9 |
MD_PKEY_TYPE_RSA,
|
|
Packit |
90a5c9 |
} md_pkey_type_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
typedef struct md_pkey_rsa_spec_t {
|
|
Packit |
90a5c9 |
apr_uint32_t bits;
|
|
Packit |
90a5c9 |
} md_pkey_rsa_spec_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
typedef struct md_pkey_spec_t {
|
|
Packit |
90a5c9 |
md_pkey_type_t type;
|
|
Packit |
90a5c9 |
union {
|
|
Packit |
90a5c9 |
md_pkey_rsa_spec_t rsa;
|
|
Packit |
90a5c9 |
} params;
|
|
Packit |
90a5c9 |
} md_pkey_spec_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_crypt_init(apr_pool_t *pool);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_pkey_gen(md_pkey_t **ppkey, apr_pool_t *p, md_pkey_spec_t *spec);
|
|
Packit |
90a5c9 |
void md_pkey_free(md_pkey_t *pkey);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
const char *md_pkey_get_rsa_e64(md_pkey_t *pkey, apr_pool_t *p);
|
|
Packit |
90a5c9 |
const char *md_pkey_get_rsa_n64(md_pkey_t *pkey, apr_pool_t *p);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_pkey_fload(md_pkey_t **ppkey, apr_pool_t *p,
|
|
Packit |
90a5c9 |
const char *pass_phrase, apr_size_t pass_len,
|
|
Packit |
90a5c9 |
const char *fname);
|
|
Packit |
90a5c9 |
apr_status_t md_pkey_fsave(md_pkey_t *pkey, apr_pool_t *p,
|
|
Packit |
90a5c9 |
const char *pass_phrase, apr_size_t pass_len,
|
|
Packit |
90a5c9 |
const char *fname, apr_fileperms_t perms);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_crypt_sign64(const char **psign64, md_pkey_t *pkey, apr_pool_t *p,
|
|
Packit |
90a5c9 |
const char *d, size_t dlen);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
void *md_cert_get_X509(struct md_cert_t *cert);
|
|
Packit |
90a5c9 |
void *md_pkey_get_EVP_PKEY(struct md_pkey_t *pkey);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
struct md_json_t *md_pkey_spec_to_json(const md_pkey_spec_t *spec, apr_pool_t *p);
|
|
Packit |
90a5c9 |
md_pkey_spec_t *md_pkey_spec_from_json(struct md_json_t *json, apr_pool_t *p);
|
|
Packit |
90a5c9 |
int md_pkey_spec_eq(md_pkey_spec_t *spec1, md_pkey_spec_t *spec2);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
/**************************************************************************************************/
|
|
Packit |
90a5c9 |
/* X509 certificates */
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
typedef struct md_cert_t md_cert_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
typedef enum {
|
|
Packit |
90a5c9 |
MD_CERT_UNKNOWN,
|
|
Packit |
90a5c9 |
MD_CERT_VALID,
|
|
Packit |
90a5c9 |
MD_CERT_EXPIRED
|
|
Packit |
90a5c9 |
} md_cert_state_t;
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
void md_cert_free(md_cert_t *cert);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_cert_fload(md_cert_t **pcert, apr_pool_t *p, const char *fname);
|
|
Packit |
90a5c9 |
apr_status_t md_cert_fsave(md_cert_t *cert, apr_pool_t *p,
|
|
Packit |
90a5c9 |
const char *fname, apr_fileperms_t perms);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_cert_read_http(md_cert_t **pcert, apr_pool_t *pool,
|
|
Packit |
90a5c9 |
const struct md_http_response_t *res);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
md_cert_state_t md_cert_state_get(md_cert_t *cert);
|
|
Packit |
90a5c9 |
int md_cert_is_valid_now(const md_cert_t *cert);
|
|
Packit |
90a5c9 |
int md_cert_has_expired(const md_cert_t *cert);
|
|
Packit |
90a5c9 |
int md_cert_covers_domain(md_cert_t *cert, const char *domain_name);
|
|
Packit |
90a5c9 |
int md_cert_covers_md(md_cert_t *cert, const struct md_t *md);
|
|
Packit |
90a5c9 |
int md_cert_must_staple(md_cert_t *cert);
|
|
Packit |
90a5c9 |
apr_time_t md_cert_get_not_after(md_cert_t *cert);
|
|
Packit |
90a5c9 |
apr_time_t md_cert_get_not_before(md_cert_t *cert);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_cert_get_issuers_uri(const char **puri, md_cert_t *cert, apr_pool_t *p);
|
|
Packit |
90a5c9 |
apr_status_t md_cert_get_alt_names(apr_array_header_t **pnames, md_cert_t *cert, apr_pool_t *p);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_cert_to_base64url(const char **ps64, md_cert_t *cert, apr_pool_t *p);
|
|
Packit |
90a5c9 |
apr_status_t md_cert_from_base64url(md_cert_t **pcert, const char *s64, apr_pool_t *p);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_chain_fload(struct apr_array_header_t **pcerts,
|
|
Packit |
90a5c9 |
apr_pool_t *p, const char *fname);
|
|
Packit |
90a5c9 |
apr_status_t md_chain_fsave(struct apr_array_header_t *certs,
|
|
Packit |
90a5c9 |
apr_pool_t *p, const char *fname, apr_fileperms_t perms);
|
|
Packit |
90a5c9 |
apr_status_t md_chain_fappend(struct apr_array_header_t *certs,
|
|
Packit |
90a5c9 |
apr_pool_t *p, const char *fname);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_cert_req_create(const char **pcsr_der_64, const struct md_t *md,
|
|
Packit |
90a5c9 |
md_pkey_t *pkey, apr_pool_t *p);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
apr_status_t md_cert_self_sign(md_cert_t **pcert, const char *cn,
|
|
Packit |
90a5c9 |
struct apr_array_header_t *domains, md_pkey_t *pkey,
|
|
Packit |
90a5c9 |
apr_interval_time_t valid_for, apr_pool_t *p);
|
|
Packit |
90a5c9 |
|
|
Packit |
90a5c9 |
#endif /* md_crypt_h */
|