52#if !defined(MBEDTLS_CONFIG_FILE)
55#include MBEDTLS_CONFIG_FILE
61#if defined(MBEDTLS_RSA_C)
70#if !defined(MBEDTLS_X509_MAX_INTERMEDIATE_CA)
79#define MBEDTLS_X509_MAX_INTERMEDIATE_CA 8
86#define MBEDTLS_ERR_X509_FEATURE_UNAVAILABLE -0x2080
87#define MBEDTLS_ERR_X509_UNKNOWN_OID -0x2100
88#define MBEDTLS_ERR_X509_INVALID_FORMAT -0x2180
89#define MBEDTLS_ERR_X509_INVALID_VERSION -0x2200
90#define MBEDTLS_ERR_X509_INVALID_SERIAL -0x2280
91#define MBEDTLS_ERR_X509_INVALID_ALG -0x2300
92#define MBEDTLS_ERR_X509_INVALID_NAME -0x2380
93#define MBEDTLS_ERR_X509_INVALID_DATE -0x2400
94#define MBEDTLS_ERR_X509_INVALID_SIGNATURE -0x2480
95#define MBEDTLS_ERR_X509_INVALID_EXTENSIONS -0x2500
96#define MBEDTLS_ERR_X509_UNKNOWN_VERSION -0x2580
97#define MBEDTLS_ERR_X509_UNKNOWN_SIG_ALG -0x2600
98#define MBEDTLS_ERR_X509_SIG_MISMATCH -0x2680
99#define MBEDTLS_ERR_X509_CERT_VERIFY_FAILED -0x2700
100#define MBEDTLS_ERR_X509_CERT_UNKNOWN_FORMAT -0x2780
101#define MBEDTLS_ERR_X509_BAD_INPUT_DATA -0x2800
102#define MBEDTLS_ERR_X509_ALLOC_FAILED -0x2880
103#define MBEDTLS_ERR_X509_FILE_IO_ERROR -0x2900
104#define MBEDTLS_ERR_X509_BUFFER_TOO_SMALL -0x2980
105#define MBEDTLS_ERR_X509_FATAL_ERROR -0x3000
113#define MBEDTLS_X509_BADCERT_EXPIRED 0x01
114#define MBEDTLS_X509_BADCERT_REVOKED 0x02
115#define MBEDTLS_X509_BADCERT_CN_MISMATCH 0x04
116#define MBEDTLS_X509_BADCERT_NOT_TRUSTED 0x08
117#define MBEDTLS_X509_BADCRL_NOT_TRUSTED 0x10
118#define MBEDTLS_X509_BADCRL_EXPIRED 0x20
119#define MBEDTLS_X509_BADCERT_MISSING 0x40
120#define MBEDTLS_X509_BADCERT_SKIP_VERIFY 0x80
121#define MBEDTLS_X509_BADCERT_OTHER 0x0100
122#define MBEDTLS_X509_BADCERT_FUTURE 0x0200
123#define MBEDTLS_X509_BADCRL_FUTURE 0x0400
124#define MBEDTLS_X509_BADCERT_KEY_USAGE 0x0800
125#define MBEDTLS_X509_BADCERT_EXT_KEY_USAGE 0x1000
126#define MBEDTLS_X509_BADCERT_NS_CERT_TYPE 0x2000
127#define MBEDTLS_X509_BADCERT_BAD_MD 0x4000
128#define MBEDTLS_X509_BADCERT_BAD_PK 0x8000
129#define MBEDTLS_X509_BADCERT_BAD_KEY 0x010000
130#define MBEDTLS_X509_BADCRL_BAD_MD 0x020000
131#define MBEDTLS_X509_BADCRL_BAD_PK 0x040000
132#define MBEDTLS_X509_BADCRL_BAD_KEY 0x080000
141#define MBEDTLS_X509_KU_DIGITAL_SIGNATURE (0x80)
142#define MBEDTLS_X509_KU_NON_REPUDIATION (0x40)
143#define MBEDTLS_X509_KU_KEY_ENCIPHERMENT (0x20)
144#define MBEDTLS_X509_KU_DATA_ENCIPHERMENT (0x10)
145#define MBEDTLS_X509_KU_KEY_AGREEMENT (0x08)
146#define MBEDTLS_X509_KU_KEY_CERT_SIGN (0x04)
147#define MBEDTLS_X509_KU_CRL_SIGN (0x02)
148#define MBEDTLS_X509_KU_ENCIPHER_ONLY (0x01)
149#define MBEDTLS_X509_KU_DECIPHER_ONLY (0x8000)
156#define MBEDTLS_X509_NS_CERT_TYPE_SSL_CLIENT (0x80)
157#define MBEDTLS_X509_NS_CERT_TYPE_SSL_SERVER (0x40)
158#define MBEDTLS_X509_NS_CERT_TYPE_EMAIL (0x20)
159#define MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING (0x10)
160#define MBEDTLS_X509_NS_CERT_TYPE_RESERVED (0x08)
161#define MBEDTLS_X509_NS_CERT_TYPE_SSL_CA (0x04)
162#define MBEDTLS_X509_NS_CERT_TYPE_EMAIL_CA (0x02)
163#define MBEDTLS_X509_NS_CERT_TYPE_OBJECT_SIGNING_CA (0x01)
171#define MBEDTLS_X509_EXT_AUTHORITY_KEY_IDENTIFIER (1 << 0)
172#define MBEDTLS_X509_EXT_SUBJECT_KEY_IDENTIFIER (1 << 1)
173#define MBEDTLS_X509_EXT_KEY_USAGE (1 << 2)
174#define MBEDTLS_X509_EXT_CERTIFICATE_POLICIES (1 << 3)
175#define MBEDTLS_X509_EXT_POLICY_MAPPINGS (1 << 4)
176#define MBEDTLS_X509_EXT_SUBJECT_ALT_NAME (1 << 5)
177#define MBEDTLS_X509_EXT_ISSUER_ALT_NAME (1 << 6)
178#define MBEDTLS_X509_EXT_SUBJECT_DIRECTORY_ATTRS (1 << 7)
179#define MBEDTLS_X509_EXT_BASIC_CONSTRAINTS (1 << 8)
180#define MBEDTLS_X509_EXT_NAME_CONSTRAINTS (1 << 9)
181#define MBEDTLS_X509_EXT_POLICY_CONSTRAINTS (1 << 10)
182#define MBEDTLS_X509_EXT_EXTENDED_KEY_USAGE (1 << 11)
183#define MBEDTLS_X509_EXT_CRL_DISTRIBUTION_POINTS (1 << 12)
184#define MBEDTLS_X509_EXT_INIHIBIT_ANYPOLICY (1 << 13)
185#define MBEDTLS_X509_EXT_FRESHEST_CRL (1 << 14)
187#define MBEDTLS_X509_EXT_NS_CERT_TYPE (1 << 16)
193#define MBEDTLS_X509_FORMAT_DER 1
194#define MBEDTLS_X509_FORMAT_PEM 2
196#define MBEDTLS_X509_MAX_DN_NAME_SIZE 256
297#if defined(MBEDTLS_SELF_TEST)
304int mbedtls_x509_self_test(
int verbose );
318#if defined(MBEDTLS_X509_RSASSA_PSS_SUPPORT)
335 const void *sig_opts );
339 int critical,
const unsigned char *
val,
346 const char *oid,
size_t oid_len,
347 unsigned char *sig,
size_t size );
349#define MBEDTLS_X509_SAFE_SNPRINTF \
351 if( ret < 0 || (size_t) ret >= n ) \
352 return( MBEDTLS_ERR_X509_BUFFER_TOO_SMALL ); \
struct outqueuenode * head
static const WCHAR *const ext[]
GLenum const GLfloat * params
GLenum GLuint GLenum GLsizei const GLchar * buf
int mbedtls_x509_time_is_past(const mbedtls_x509_time *to)
Check a given mbedtls_x509_time against the system time and tell if it's in the past.
int mbedtls_x509_write_extensions(unsigned char **p, unsigned char *start, mbedtls_asn1_named_data *first)
int mbedtls_x509_time_is_future(const mbedtls_x509_time *from)
Check a given mbedtls_x509_time against the system time and tell if it's in the future.
int mbedtls_x509_write_sig(unsigned char **p, unsigned char *start, const char *oid, size_t oid_len, unsigned char *sig, size_t size)
int mbedtls_x509_get_rsassa_pss_params(const mbedtls_x509_buf *params, mbedtls_md_type_t *md_alg, mbedtls_md_type_t *mgf_md, int *salt_len)
int mbedtls_x509_get_name(unsigned char **p, const unsigned char *end, mbedtls_x509_name *cur)
mbedtls_asn1_named_data mbedtls_x509_name
int mbedtls_x509_set_extension(mbedtls_asn1_named_data **head, const char *oid, size_t oid_len, int critical, const unsigned char *val, size_t val_len)
int mbedtls_x509_write_names(unsigned char **p, unsigned char *start, mbedtls_asn1_named_data *first)
mbedtls_asn1_buf mbedtls_x509_buf
int mbedtls_x509_dn_gets(char *buf, size_t size, const mbedtls_x509_name *dn)
Store the certificate DN in printable form into buf; no more than size characters will be written.
int mbedtls_x509_get_alg_null(unsigned char **p, const unsigned char *end, mbedtls_x509_buf *alg)
int mbedtls_x509_get_sig_alg(const mbedtls_x509_buf *sig_oid, const mbedtls_x509_buf *sig_params, mbedtls_md_type_t *md_alg, mbedtls_pk_type_t *pk_alg, void **sig_opts)
int mbedtls_x509_get_alg(unsigned char **p, const unsigned char *end, mbedtls_x509_buf *alg, mbedtls_x509_buf *params)
int mbedtls_x509_get_ext(unsigned char **p, const unsigned char *end, mbedtls_x509_buf *ext, int tag)
int mbedtls_x509_key_size_helper(char *buf, size_t buf_size, const char *name)
mbedtls_asn1_sequence mbedtls_x509_sequence
int mbedtls_x509_sig_alg_gets(char *buf, size_t size, const mbedtls_x509_buf *sig_oid, mbedtls_pk_type_t pk_alg, mbedtls_md_type_t md_alg, const void *sig_opts)
int mbedtls_x509_get_serial(unsigned char **p, const unsigned char *end, mbedtls_x509_buf *serial)
int mbedtls_x509_get_sig(unsigned char **p, const unsigned char *end, mbedtls_x509_buf *sig)
int mbedtls_x509_get_time(unsigned char **p, const unsigned char *end, mbedtls_x509_time *t)
mbedtls_asn1_bitstring mbedtls_x509_bitstring
int mbedtls_x509_string_to_names(mbedtls_asn1_named_data **head, const char *name)
int mbedtls_x509_serial_gets(char *buf, size_t size, const mbedtls_x509_buf *serial)
Store the certificate serial in printable form into buf; no more than size characters will be written...
mbedtls_md_type_t
Supported message digests.
Public Key abstraction layer.
mbedtls_pk_type_t
Public key types.
This file provides an API for the RSA public-key cryptosystem.