blob: deac88fde2472c3bfaa779866d1afd1490d47e89 [file] [log] [blame]
Paul Bakker7c6b2c32013-09-16 13:49:26 +02001/**
2 * \file x509_csr.h
3 *
4 * \brief X.509 certificate signing request parsing and writing
5 *
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +02006 * Copyright (C) 2006-2014, Brainspark B.V.
Paul Bakker7c6b2c32013-09-16 13:49:26 +02007 *
8 * This file is part of PolarSSL (http://www.polarssl.org)
9 * Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org>
10 *
11 * All rights reserved.
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License as published by
15 * the Free Software Foundation; either version 2 of the License, or
16 * (at your option) any later version.
17 *
18 * This program is distributed in the hope that it will be useful,
19 * but WITHOUT ANY WARRANTY; without even the implied warranty of
20 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 * GNU General Public License for more details.
22 *
23 * You should have received a copy of the GNU General Public License along
24 * with this program; if not, write to the Free Software Foundation, Inc.,
25 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
26 */
27#ifndef POLARSSL_X509_CSR_H
28#define POLARSSL_X509_CSR_H
29
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020030#if !defined(POLARSSL_CONFIG_FILE)
Paul Bakker7c6b2c32013-09-16 13:49:26 +020031#include "config.h"
Manuel Pégourié-Gonnardcef4ad22014-04-29 12:39:06 +020032#else
33#include POLARSSL_CONFIG_FILE
34#endif
Paul Bakker7c6b2c32013-09-16 13:49:26 +020035
36#include "x509.h"
37
38#ifdef __cplusplus
39extern "C" {
40#endif
41
42/**
43 * \addtogroup x509_module
44 * \{ */
45
46/**
47 * \name Structures and functions for X.509 Certificate Signing Requests (CSR)
48 * \{
49 */
50
51/**
52 * Certificate Signing Request (CSR) structure.
53 */
54typedef struct _x509_csr
55{
56 x509_buf raw; /**< The raw CSR data (DER). */
57 x509_buf cri; /**< The raw CertificateRequestInfo body (DER). */
58
59 int version;
60
61 x509_buf subject_raw; /**< The raw subject data (DER). */
62 x509_name subject; /**< The parsed subject data (named information object). */
63
64 pk_context pk; /**< Container for the public key context. */
65
66 x509_buf sig_oid;
67 x509_buf sig;
68 md_type_t sig_md; /**< Internal representation of the MD algorithm of the signature algorithm, e.g. POLARSSL_MD_SHA256 */
Manuel Pégourié-Gonnardf75f2f72014-06-05 15:14:28 +020069 pk_type_t sig_pk; /**< Internal representation of the Public Key algorithm of the signature algorithm, e.g. POLARSSL_PK_RSA */
Paul Bakker6dade7c2014-06-12 22:02:14 +020070 void *sig_opts; /**< Signature options to be passed to pk_verify_ext(), e.g. for RSASSA-PSS */
Paul Bakker7c6b2c32013-09-16 13:49:26 +020071}
72x509_csr;
73
74/**
75 * Container for writing a CSR
76 */
77typedef struct _x509write_csr
78{
79 pk_context *key;
80 asn1_named_data *subject;
81 md_type_t md_alg;
82 asn1_named_data *extensions;
83}
84x509write_csr;
85
86#if defined(POLARSSL_X509_CSR_PARSE_C)
87/**
88 * \brief Load a Certificate Signing Request (CSR)
89 *
90 * \param csr CSR context to fill
91 * \param buf buffer holding the CRL data
92 * \param buflen size of the buffer
93 *
94 * \return 0 if successful, or a specific X509 or PEM error code
95 */
Paul Bakkerddf26b42013-09-18 13:46:23 +020096int x509_csr_parse( x509_csr *csr, const unsigned char *buf, size_t buflen );
Paul Bakker7c6b2c32013-09-16 13:49:26 +020097
98#if defined(POLARSSL_FS_IO)
99/**
100 * \brief Load a Certificate Signing Request (CSR)
101 *
102 * \param csr CSR context to fill
103 * \param path filename to read the CSR from
104 *
105 * \return 0 if successful, or a specific X509 or PEM error code
106 */
Paul Bakkerddf26b42013-09-18 13:46:23 +0200107int x509_csr_parse_file( x509_csr *csr, const char *path );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200108#endif /* POLARSSL_FS_IO */
109
110/**
111 * \brief Returns an informational string about the
112 * CSR.
113 *
114 * \param buf Buffer to write to
115 * \param size Maximum size of buffer
116 * \param prefix A line prefix
117 * \param csr The X509 CSR to represent
118 *
Manuel Pégourié-Gonnardd77cd5d2014-06-13 11:13:15 +0200119 * \return The length of the string written (exluding the terminating
120 * null byte), or a negative value in case of an error.
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200121 */
Paul Bakkerddf26b42013-09-18 13:46:23 +0200122int x509_csr_info( char *buf, size_t size, const char *prefix,
123 const x509_csr *csr );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200124
125/**
Paul Bakker369d2eb2013-09-18 11:58:25 +0200126 * \brief Initialize a CSR
127 *
128 * \param csr CSR to initialize
129 */
130void x509_csr_init( x509_csr *csr );
131
132/**
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200133 * \brief Unallocate all CSR data
134 *
135 * \param csr CSR to free
136 */
137void x509_csr_free( x509_csr *csr );
138#endif /* POLARSSL_X509_CSR_PARSE_C */
139
140/* \} name */
141/* \} addtogroup x509_module */
142
143#if defined(POLARSSL_X509_CSR_WRITE_C)
144/**
145 * \brief Initialize a CSR context
146 *
147 * \param ctx CSR context to initialize
148 */
149void x509write_csr_init( x509write_csr *ctx );
150
151/**
152 * \brief Set the subject name for a CSR
153 * Subject names should contain a comma-separated list
154 * of OID types and values:
155 * e.g. "C=NL,O=Offspark,CN=PolarSSL Server 1"
156 *
157 * \param ctx CSR context to use
158 * \param subject_name subject name to set
159 *
160 * \return 0 if subject name was parsed successfully, or
161 * a specific error code
162 */
Paul Bakker50dc8502013-10-28 21:19:10 +0100163int x509write_csr_set_subject_name( x509write_csr *ctx,
164 const char *subject_name );
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200165
166/**
167 * \brief Set the key for a CSR (public key will be included,
168 * private key used to sign the CSR when writing it)
169 *
170 * \param ctx CSR context to use
171 * \param key Asymetric key to include
172 */
173void x509write_csr_set_key( x509write_csr *ctx, pk_context *key );
174
175/**
176 * \brief Set the MD algorithm to use for the signature
177 * (e.g. POLARSSL_MD_SHA1)
178 *
179 * \param ctx CSR context to use
180 * \param md_alg MD algorithm to use
181 */
182void x509write_csr_set_md_alg( x509write_csr *ctx, md_type_t md_alg );
183
184/**
185 * \brief Set the Key Usage Extension flags
186 * (e.g. KU_DIGITAL_SIGNATURE | KU_KEY_CERT_SIGN)
187 *
188 * \param ctx CSR context to use
189 * \param key_usage key usage flags to set
190 *
191 * \return 0 if successful, or POLARSSL_ERR_X509WRITE_MALLOC_FAILED
192 */
193int x509write_csr_set_key_usage( x509write_csr *ctx, unsigned char key_usage );
194
195/**
196 * \brief Set the Netscape Cert Type flags
197 * (e.g. NS_CERT_TYPE_SSL_CLIENT | NS_CERT_TYPE_EMAIL)
198 *
199 * \param ctx CSR context to use
200 * \param ns_cert_type Netscape Cert Type flags to set
201 *
202 * \return 0 if successful, or POLARSSL_ERR_X509WRITE_MALLOC_FAILED
203 */
204int x509write_csr_set_ns_cert_type( x509write_csr *ctx,
205 unsigned char ns_cert_type );
206
207/**
Paul Bakkerb9e4e2c2014-05-01 14:18:25 +0200208 * \brief Generic function to add to or replace an extension in the
209 * CSR
Paul Bakker7c6b2c32013-09-16 13:49:26 +0200210 *
211 * \param ctx CSR context to use
212 * \param oid OID of the extension
213 * \param oid_len length of the OID
214 * \param val value of the extension OCTET STRING
215 * \param val_len length of the value data
216 *
217 * \return 0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED
218 */
219int x509write_csr_set_extension( x509write_csr *ctx,
220 const char *oid, size_t oid_len,
221 const unsigned char *val, size_t val_len );
222
223/**
224 * \brief Free the contents of a CSR context
225 *
226 * \param ctx CSR context to free
227 */
228void x509write_csr_free( x509write_csr *ctx );
229
230/**
231 * \brief Write a CSR (Certificate Signing Request) to a
232 * DER structure
233 * Note: data is written at the end of the buffer! Use the
234 * return value to determine where you should start
235 * using the buffer
236 *
237 * \param ctx CSR to write away
238 * \param buf buffer to write to
239 * \param size size of the buffer
240 * \param f_rng RNG function (for signature, see note)
241 * \param p_rng RNG parameter
242 *
243 * \return length of data written if successful, or a specific
244 * error code
245 *
246 * \note f_rng may be NULL if RSA is used for signature and the
247 * signature is made offline (otherwise f_rng is desirable
248 * for countermeasures against timing attacks).
249 * ECDSA signatures always require a non-NULL f_rng.
250 */
251int x509write_csr_der( x509write_csr *ctx, unsigned char *buf, size_t size,
252 int (*f_rng)(void *, unsigned char *, size_t),
253 void *p_rng );
254
255#if defined(POLARSSL_PEM_WRITE_C)
256/**
257 * \brief Write a CSR (Certificate Signing Request) to a
258 * PEM string
259 *
260 * \param ctx CSR to write away
261 * \param buf buffer to write to
262 * \param size size of the buffer
263 * \param f_rng RNG function (for signature, see note)
264 * \param p_rng RNG parameter
265 *
266 * \return 0 successful, or a specific error code
267 *
268 * \note f_rng may be NULL if RSA is used for signature and the
269 * signature is made offline (otherwise f_rng is desirable
270 * for couermeasures against timing attacks).
271 * ECDSA signatures always require a non-NULL f_rng.
272 */
273int x509write_csr_pem( x509write_csr *ctx, unsigned char *buf, size_t size,
274 int (*f_rng)(void *, unsigned char *, size_t),
275 void *p_rng );
276#endif /* POLARSSL_PEM_WRITE_C */
277#endif /* POLARSSL_X509_CSR_WRITE_C */
278
279#ifdef __cplusplus
280}
281#endif
282
283#endif /* x509_csr.h */