Blame crypto/ts/ts_local.h

Packit c4476c
/*
Packit c4476c
 * Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
Packit c4476c
 *
Packit c4476c
 * Licensed under the OpenSSL license (the "License").  You may not use
Packit c4476c
 * this file except in compliance with the License.  You can obtain a copy
Packit c4476c
 * in the file LICENSE in the source distribution or at
Packit c4476c
 * https://www.openssl.org/source/license.html
Packit c4476c
 */
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * MessageImprint ::= SEQUENCE  {
Packit c4476c
 *      hashAlgorithm                AlgorithmIdentifier,
Packit c4476c
 *      hashedMessage                OCTET STRING  }
Packit c4476c
 */
Packit c4476c
struct TS_msg_imprint_st {
Packit c4476c
    X509_ALGOR *hash_algo;
Packit c4476c
    ASN1_OCTET_STRING *hashed_msg;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * TimeStampResp ::= SEQUENCE  {
Packit c4476c
 *     status                  PKIStatusInfo,
Packit c4476c
 *     timeStampToken          TimeStampToken     OPTIONAL }
Packit c4476c
 */
Packit c4476c
struct TS_resp_st {
Packit c4476c
    TS_STATUS_INFO *status_info;
Packit c4476c
    PKCS7 *token;
Packit c4476c
    TS_TST_INFO *tst_info;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * TimeStampReq ::= SEQUENCE  {
Packit c4476c
 *    version                  INTEGER  { v1(1) },
Packit c4476c
 *    messageImprint           MessageImprint,
Packit c4476c
 *      --a hash algorithm OID and the hash value of the data to be
Packit c4476c
 *      --time-stamped
Packit c4476c
 *    reqPolicy                TSAPolicyId                OPTIONAL,
Packit c4476c
 *    nonce                    INTEGER                    OPTIONAL,
Packit c4476c
 *    certReq                  BOOLEAN                    DEFAULT FALSE,
Packit c4476c
 *    extensions               [0] IMPLICIT Extensions    OPTIONAL  }
Packit c4476c
 */
Packit c4476c
struct TS_req_st {
Packit c4476c
    ASN1_INTEGER *version;
Packit c4476c
    TS_MSG_IMPRINT *msg_imprint;
Packit c4476c
    ASN1_OBJECT *policy_id;
Packit c4476c
    ASN1_INTEGER *nonce;
Packit c4476c
    ASN1_BOOLEAN cert_req;
Packit c4476c
    STACK_OF(X509_EXTENSION) *extensions;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * Accuracy ::= SEQUENCE {
Packit c4476c
 *                 seconds        INTEGER           OPTIONAL,
Packit c4476c
 *                 millis     [0] INTEGER  (1..999) OPTIONAL,
Packit c4476c
 *                 micros     [1] INTEGER  (1..999) OPTIONAL  }
Packit c4476c
 */
Packit c4476c
struct TS_accuracy_st {
Packit c4476c
    ASN1_INTEGER *seconds;
Packit c4476c
    ASN1_INTEGER *millis;
Packit c4476c
    ASN1_INTEGER *micros;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * TSTInfo ::= SEQUENCE  {
Packit c4476c
 *     version                      INTEGER  { v1(1) },
Packit c4476c
 *     policy                       TSAPolicyId,
Packit c4476c
 *     messageImprint               MessageImprint,
Packit c4476c
 *       -- MUST have the same value as the similar field in
Packit c4476c
 *       -- TimeStampReq
Packit c4476c
 *     serialNumber                 INTEGER,
Packit c4476c
 *      -- Time-Stamping users MUST be ready to accommodate integers
Packit c4476c
 *      -- up to 160 bits.
Packit c4476c
 *     genTime                      GeneralizedTime,
Packit c4476c
 *     accuracy                     Accuracy                 OPTIONAL,
Packit c4476c
 *     ordering                     BOOLEAN             DEFAULT FALSE,
Packit c4476c
 *     nonce                        INTEGER                  OPTIONAL,
Packit c4476c
 *       -- MUST be present if the similar field was present
Packit c4476c
 *       -- in TimeStampReq.  In that case it MUST have the same value.
Packit c4476c
 *     tsa                          [0] GeneralName          OPTIONAL,
Packit c4476c
 *     extensions                   [1] IMPLICIT Extensions  OPTIONAL   }
Packit c4476c
 */
Packit c4476c
struct TS_tst_info_st {
Packit c4476c
    ASN1_INTEGER *version;
Packit c4476c
    ASN1_OBJECT *policy_id;
Packit c4476c
    TS_MSG_IMPRINT *msg_imprint;
Packit c4476c
    ASN1_INTEGER *serial;
Packit c4476c
    ASN1_GENERALIZEDTIME *time;
Packit c4476c
    TS_ACCURACY *accuracy;
Packit c4476c
    ASN1_BOOLEAN ordering;
Packit c4476c
    ASN1_INTEGER *nonce;
Packit c4476c
    GENERAL_NAME *tsa;
Packit c4476c
    STACK_OF(X509_EXTENSION) *extensions;
Packit c4476c
};
Packit c4476c
Packit c4476c
struct TS_status_info_st {
Packit c4476c
    ASN1_INTEGER *status;
Packit c4476c
    STACK_OF(ASN1_UTF8STRING) *text;
Packit c4476c
    ASN1_BIT_STRING *failure_info;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * IssuerSerial ::= SEQUENCE {
Packit c4476c
 *         issuer                   GeneralNames,
Packit c4476c
 *         serialNumber             CertificateSerialNumber
Packit c4476c
 *         }
Packit c4476c
 */
Packit c4476c
struct ESS_issuer_serial {
Packit c4476c
    STACK_OF(GENERAL_NAME) *issuer;
Packit c4476c
    ASN1_INTEGER *serial;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * ESSCertID ::=  SEQUENCE {
Packit c4476c
 *         certHash                 Hash,
Packit c4476c
 *         issuerSerial             IssuerSerial OPTIONAL
Packit c4476c
 * }
Packit c4476c
 */
Packit c4476c
struct ESS_cert_id {
Packit c4476c
    ASN1_OCTET_STRING *hash;    /* Always SHA-1 digest. */
Packit c4476c
    ESS_ISSUER_SERIAL *issuer_serial;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * SigningCertificate ::=  SEQUENCE {
Packit c4476c
 *        certs        SEQUENCE OF ESSCertID,
Packit c4476c
 *        policies     SEQUENCE OF PolicyInformation OPTIONAL
Packit c4476c
 * }
Packit c4476c
 */
Packit c4476c
struct ESS_signing_cert {
Packit c4476c
    STACK_OF(ESS_CERT_ID) *cert_ids;
Packit c4476c
    STACK_OF(POLICYINFO) *policy_info;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * ESSCertIDv2 ::=  SEQUENCE {
Packit c4476c
 *        hashAlgorithm           AlgorithmIdentifier
Packit c4476c
 *                DEFAULT {algorithm id-sha256},
Packit c4476c
 *        certHash                Hash,
Packit c4476c
 *        issuerSerial            IssuerSerial OPTIONAL
Packit c4476c
 * }
Packit c4476c
 */
Packit c4476c
Packit c4476c
struct ESS_cert_id_v2_st {
Packit c4476c
    X509_ALGOR *hash_alg;       /* Default: SHA-256 */
Packit c4476c
    ASN1_OCTET_STRING *hash;
Packit c4476c
    ESS_ISSUER_SERIAL *issuer_serial;
Packit c4476c
};
Packit c4476c
Packit c4476c
/*-
Packit c4476c
 * SigningCertificateV2 ::= SEQUENCE {
Packit c4476c
 *        certs                   SEQUENCE OF ESSCertIDv2,
Packit c4476c
 *        policies                SEQUENCE OF PolicyInformation OPTIONAL
Packit c4476c
 * }
Packit c4476c
 */
Packit c4476c
Packit c4476c
struct ESS_signing_cert_v2_st {
Packit c4476c
    STACK_OF(ESS_CERT_ID_V2) *cert_ids;
Packit c4476c
    STACK_OF(POLICYINFO) *policy_info;
Packit c4476c
};
Packit c4476c
Packit c4476c
Packit c4476c
struct TS_resp_ctx {
Packit c4476c
    X509 *signer_cert;
Packit c4476c
    EVP_PKEY *signer_key;
Packit c4476c
    const EVP_MD *signer_md;
Packit c4476c
    const EVP_MD *ess_cert_id_digest;
Packit c4476c
    STACK_OF(X509) *certs;      /* Certs to include in signed data. */
Packit c4476c
    STACK_OF(ASN1_OBJECT) *policies; /* Acceptable policies. */
Packit c4476c
    ASN1_OBJECT *default_policy; /* It may appear in policies, too. */
Packit c4476c
    STACK_OF(EVP_MD) *mds;      /* Acceptable message digests. */
Packit c4476c
    ASN1_INTEGER *seconds;      /* accuracy, 0 means not specified. */
Packit c4476c
    ASN1_INTEGER *millis;       /* accuracy, 0 means not specified. */
Packit c4476c
    ASN1_INTEGER *micros;       /* accuracy, 0 means not specified. */
Packit c4476c
    unsigned clock_precision_digits; /* fraction of seconds in time stamp
Packit c4476c
                                      * token. */
Packit c4476c
    unsigned flags;             /* Optional info, see values above. */
Packit c4476c
    /* Callback functions. */
Packit c4476c
    TS_serial_cb serial_cb;
Packit c4476c
    void *serial_cb_data;       /* User data for serial_cb. */
Packit c4476c
    TS_time_cb time_cb;
Packit c4476c
    void *time_cb_data;         /* User data for time_cb. */
Packit c4476c
    TS_extension_cb extension_cb;
Packit c4476c
    void *extension_cb_data;    /* User data for extension_cb. */
Packit c4476c
    /* These members are used only while creating the response. */
Packit c4476c
    TS_REQ *request;
Packit c4476c
    TS_RESP *response;
Packit c4476c
    TS_TST_INFO *tst_info;
Packit c4476c
};
Packit c4476c
Packit c4476c
struct TS_verify_ctx {
Packit c4476c
    /* Set this to the union of TS_VFY_... flags you want to carry out. */
Packit c4476c
    unsigned flags;
Packit c4476c
    /* Must be set only with TS_VFY_SIGNATURE. certs is optional. */
Packit c4476c
    X509_STORE *store;
Packit c4476c
    STACK_OF(X509) *certs;
Packit c4476c
    /* Must be set only with TS_VFY_POLICY. */
Packit c4476c
    ASN1_OBJECT *policy;
Packit c4476c
    /*
Packit c4476c
     * Must be set only with TS_VFY_IMPRINT. If md_alg is NULL, the
Packit c4476c
     * algorithm from the response is used.
Packit c4476c
     */
Packit c4476c
    X509_ALGOR *md_alg;
Packit c4476c
    unsigned char *imprint;
Packit c4476c
    unsigned imprint_len;
Packit c4476c
    /* Must be set only with TS_VFY_DATA. */
Packit c4476c
    BIO *data;
Packit c4476c
    /* Must be set only with TS_VFY_TSA_NAME. */
Packit c4476c
    ASN1_INTEGER *nonce;
Packit c4476c
    /* Must be set only with TS_VFY_TSA_NAME. */
Packit c4476c
    GENERAL_NAME *tsa_name;
Packit c4476c
};