Blame doc/man3/SCT_new.pod

Packit c4476c
=pod
Packit c4476c
Packit c4476c
=head1 NAME
Packit c4476c
Packit c4476c
SCT_new, SCT_new_from_base64, SCT_free, SCT_LIST_free,
Packit c4476c
SCT_get_version, SCT_set_version,
Packit c4476c
SCT_get_log_entry_type, SCT_set_log_entry_type,
Packit c4476c
SCT_get0_log_id, SCT_set0_log_id, SCT_set1_log_id,
Packit c4476c
SCT_get_timestamp, SCT_set_timestamp,
Packit c4476c
SCT_get_signature_nid, SCT_set_signature_nid,
Packit c4476c
SCT_get0_signature, SCT_set0_signature, SCT_set1_signature,
Packit c4476c
SCT_get0_extensions, SCT_set0_extensions, SCT_set1_extensions,
Packit c4476c
SCT_get_source, SCT_set_source
Packit c4476c
- A Certificate Transparency Signed Certificate Timestamp
Packit c4476c
Packit c4476c
=head1 SYNOPSIS
Packit c4476c
Packit c4476c
 #include <openssl/ct.h>
Packit c4476c
Packit c4476c
 typedef enum {
Packit c4476c
     CT_LOG_ENTRY_TYPE_NOT_SET = -1,
Packit c4476c
     CT_LOG_ENTRY_TYPE_X509 = 0,
Packit c4476c
     CT_LOG_ENTRY_TYPE_PRECERT = 1
Packit c4476c
 } ct_log_entry_type_t;
Packit c4476c
Packit c4476c
 typedef enum {
Packit c4476c
     SCT_VERSION_NOT_SET = -1,
Packit c4476c
     SCT_VERSION_V1 = 0
Packit c4476c
 } sct_version_t;
Packit c4476c
Packit c4476c
 typedef enum {
Packit c4476c
     SCT_SOURCE_UNKNOWN,
Packit c4476c
     SCT_SOURCE_TLS_EXTENSION,
Packit c4476c
     SCT_SOURCE_X509V3_EXTENSION,
Packit c4476c
     SCT_SOURCE_OCSP_STAPLED_RESPONSE
Packit c4476c
 } sct_source_t;
Packit c4476c
Packit c4476c
 SCT *SCT_new(void);
Packit c4476c
 SCT *SCT_new_from_base64(unsigned char version,
Packit c4476c
                          const char *logid_base64,
Packit c4476c
                          ct_log_entry_type_t entry_type,
Packit c4476c
                          uint64_t timestamp,
Packit c4476c
                          const char *extensions_base64,
Packit c4476c
                          const char *signature_base64);
Packit c4476c
Packit c4476c
 void SCT_free(SCT *sct);
Packit c4476c
 void SCT_LIST_free(STACK_OF(SCT) *a);
Packit c4476c
Packit c4476c
 sct_version_t SCT_get_version(const SCT *sct);
Packit c4476c
 int SCT_set_version(SCT *sct, sct_version_t version);
Packit c4476c
Packit c4476c
 ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
Packit c4476c
 int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
Packit c4476c
Packit c4476c
 size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
Packit c4476c
 int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
Packit c4476c
 int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len);
Packit c4476c
Packit c4476c
 uint64_t SCT_get_timestamp(const SCT *sct);
Packit c4476c
 void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
Packit c4476c
Packit c4476c
 int SCT_get_signature_nid(const SCT *sct);
Packit c4476c
 int SCT_set_signature_nid(SCT *sct, int nid);
Packit c4476c
Packit c4476c
 size_t SCT_get0_signature(const SCT *sct, unsigned char **sig);
Packit c4476c
 void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len);
Packit c4476c
 int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len);
Packit c4476c
Packit c4476c
 size_t SCT_get0_extensions(const SCT *sct, unsigned char **ext);
Packit c4476c
 void SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len);
Packit c4476c
 int SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len);
Packit c4476c
Packit c4476c
 sct_source_t SCT_get_source(const SCT *sct);
Packit c4476c
 int SCT_set_source(SCT *sct, sct_source_t source);
Packit c4476c
Packit c4476c
=head1 DESCRIPTION
Packit c4476c
Packit c4476c
Signed Certificate Timestamps (SCTs) are defined by RFC 6962, Section 3.2.
Packit c4476c
They constitute a promise by a Certificate Transparency (CT) log to publicly
Packit c4476c
record a certificate. By cryptographically verifying that a log did indeed issue
Packit c4476c
an SCT, some confidence can be gained that the certificate is publicly known.
Packit c4476c
Packit c4476c
An internal representation of an SCT can be created in one of two ways.
Packit c4476c
The first option is to create a blank SCT, using SCT_new(), and then populate
Packit c4476c
it using:
Packit c4476c
Packit c4476c
=over 2
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set_version() to set the SCT version.
Packit c4476c
Packit c4476c
Only SCT_VERSION_V1 is currently supported.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set_log_entry_type() to set the type of certificate the SCT was issued for:
Packit c4476c
Packit c4476c
B<CT_LOG_ENTRY_TYPE_X509> for a normal certificate.
Packit c4476c
B<CT_LOG_ENTRY_TYPE_PRECERT> for a pre-certificate.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set0_log_id() or SCT_set1_log_id() to set the LogID of the CT log that the SCT came from.
Packit c4476c
Packit c4476c
The former takes ownership, whereas the latter makes a copy.
Packit c4476c
See RFC 6962, Section 3.2 for the definition of LogID.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set_timestamp() to set the time the SCT was issued (epoch time in milliseconds).
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set_signature_nid() to set the NID of the signature.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set0_signature() or SCT_set1_signature() to set the raw signature value.
Packit c4476c
Packit c4476c
The former takes ownership, whereas the latter makes a copy.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
SCT_set0_extensions() or B<SCT_set1_extensions> to provide SCT extensions.
Packit c4476c
Packit c4476c
The former takes ownership, whereas the latter makes a copy.
Packit c4476c
Packit c4476c
=back
Packit c4476c
Packit c4476c
Alternatively, the SCT can be pre-populated from the following data using
Packit c4476c
SCT_new_from_base64():
Packit c4476c
Packit c4476c
=over 2
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
The SCT version (only SCT_VERSION_V1 is currently supported).
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
The LogID (see RFC 6962, Section 3.2), base64 encoded.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
The type of certificate the SCT was issued for:
Packit c4476c
B<CT_LOG_ENTRY_TYPE_X509> for a normal certificate.
Packit c4476c
B<CT_LOG_ENTRY_TYPE_PRECERT> for a pre-certificate.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
The time that the SCT was issued (epoch time in milliseconds).
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
The SCT extensions, base64 encoded.
Packit c4476c
Packit c4476c
=item *
Packit c4476c
Packit c4476c
The SCT signature, base64 encoded.
Packit c4476c
Packit c4476c
=back
Packit c4476c
Packit c4476c
SCT_set_source() can be used to record where the SCT was found
Packit c4476c
(TLS extension, X.509 certificate extension or OCSP response). This is not
Packit c4476c
required for verifying the SCT.
Packit c4476c
Packit c4476c
=head1 NOTES
Packit c4476c
Packit c4476c
Some of the setters return int, instead of void. These will all return 1 on
Packit c4476c
success, 0 on failure. They will not make changes on failure.
Packit c4476c
Packit c4476c
All of the setters will reset the validation status of the SCT to
Packit c4476c
SCT_VALIDATION_STATUS_NOT_SET (see L<SCT_validate(3)>).
Packit c4476c
Packit c4476c
SCT_set_source() will call SCT_set_log_entry_type() if the type of
Packit c4476c
certificate the SCT was issued for can be inferred from where the SCT was found.
Packit c4476c
For example, an SCT found in an X.509 extension must have been issued for a pre-
Packit c4476c
certificate.
Packit c4476c
Packit c4476c
SCT_set_source() will not refuse unknown values.
Packit c4476c
Packit c4476c
=head1 RETURN VALUES
Packit c4476c
Packit c4476c
SCT_set_version() returns 1 if the specified version is supported, 0 otherwise.
Packit c4476c
Packit c4476c
SCT_set_log_entry_type() returns 1 if the specified log entry type is supported, 0 otherwise.
Packit c4476c
Packit c4476c
SCT_set0_log_id() and B<SCT_set1_log_id> return 1 if the specified LogID is a
Packit c4476c
valid SHA-256 hash, 0 otherwise. Additionally, B<SCT_set1_log_id> returns 0 if
Packit c4476c
malloc fails.
Packit c4476c
Packit c4476c
B<SCT_set_signature_nid> returns 1 if the specified NID is supported, 0 otherwise.
Packit c4476c
Packit c4476c
B<SCT_set1_extensions> and B<SCT_set1_signature> return 1 if the supplied buffer
Packit c4476c
is copied successfully, 0 otherwise (i.e. if malloc fails).
Packit c4476c
Packit c4476c
B<SCT_set_source> returns 1 on success, 0 otherwise.
Packit c4476c
Packit c4476c
=head1 SEE ALSO
Packit c4476c
Packit c4476c
L<ct(7)>,
Packit c4476c
L<SCT_validate(3)>,
Packit c4476c
L<OBJ_nid2obj(3)>
Packit c4476c
Packit c4476c
=head1 HISTORY
Packit c4476c
Packit c4476c
These functions were added in OpenSSL 1.1.0.
Packit c4476c
Packit c4476c
=head1 COPYRIGHT
Packit c4476c
Packit c4476c
Copyright 2016-2017 The OpenSSL Project Authors. All Rights Reserved.
Packit c4476c
Packit c4476c
Licensed under the OpenSSL license (the "License").  You may not use
Packit c4476c
this file except in compliance with the License.  You can obtain a copy
Packit c4476c
in the file LICENSE in the source distribution or at
Packit c4476c
L<https://www.openssl.org/source/license.html>.
Packit c4476c
Packit c4476c
=cut