]> git.saurik.com Git - apple/security.git/blob - OSX/libsecurity_ocspd/common/ocspdClient.h
Security-57336.1.9.tar.gz
[apple/security.git] / OSX / libsecurity_ocspd / common / ocspdClient.h
1 /*
2 * Copyright (c) 2000,2002,2011,2014 Apple Inc. All Rights Reserved.
3 *
4 * @APPLE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. Please obtain a copy of the License at
10 * http://www.opensource.apple.com/apsl/ and read it before using this
11 * file.
12 *
13 * The Original Code and all software distributed under the License are
14 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
15 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
16 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
17 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
18 * Please see the License for the specific language governing rights and
19 * limitations under the License.
20 *
21 * @APPLE_LICENSE_HEADER_END@
22 */
23
24 /*
25 * ocspdClient.h - Client interface to OCSP helper daemon
26 */
27
28 #ifndef _OCSPD_CLIENT_H_
29 #define _OCSPD_CLIENT_H_
30
31 #include <Security/cssmtype.h>
32 #include <Security/SecTrustSettings.h>
33 #include <security_utilities/alloc.h>
34
35 #ifdef __cplusplus
36 extern "C" {
37 #endif
38
39 #pragma mark ----- OCSP routines -----
40
41 /*
42 * Normal OCSP request. Depending on contents of encoded SecAsn1OCSPToolRequest,
43 * this optionally performs cache lookup, local responder OCSP, and normal
44 * OCSP, in that order. If OCSP response is fetched from the net the netFetch
45 * outParam is true on return.
46 */
47 CSSM_RETURN ocspdFetch(
48 Allocator &alloc,
49 const CSSM_DATA &ocspdReq, // DER-encoded SecAsn1OCSPDRequests
50 CSSM_DATA &ocspdResp); // DER-encoded kSecAsn1OCSPDReplies
51 // mallocd via alloc and RETURNED
52
53 /*
54 * Flush all OCSP responses associated with specifed CertID from cache.
55 */
56 CSSM_RETURN ocspdCacheFlush(
57 const CSSM_DATA &certID);
58
59 /*
60 * Flush stale entries from cache.
61 */
62 CSSM_RETURN ocspdCacheFlushStale();
63
64 #pragma mark ----- CRL/Cert routines -----
65 /*
66 * fetch a certificate from the net.
67 */
68 CSSM_RETURN ocspdCertFetch(
69 Allocator &alloc,
70 const CSSM_DATA &certURL,
71 CSSM_DATA &certData); // mallocd via alloc and RETURNED
72
73 /*
74 * fetch a CRL from the net with optional cache lookup and/or store.
75 * VerifyTime argument only used for cache lookup; it must be in
76 * CSSM_TIMESTRING format.
77 * crlIssuer is optional, and is only specified when the client knows
78 * that the issuer of the CRL is the same as the issuer of the cert
79 * being verified.
80 */
81 CSSM_RETURN ocspdCRLFetch(
82 Allocator &alloc,
83 const CSSM_DATA &crlURL,
84 const CSSM_DATA *crlIssuer, // optional
85 bool cacheReadEnable,
86 bool cacheWriteEnable,
87 CSSM_TIMESTRING verifyTime,
88 CSSM_DATA &crlData); // mallocd via alloc and RETURNED
89
90 /*
91 * fetch CRL revocation status, given a certificate's serial number and
92 * its issuers, along with an identifier for the CRL (either its issuer name
93 * or distribution point URL)
94 *
95 * This may return one of the following result codes:
96 *
97 * CSSM_OK (valid CRL was found for this issuer, serial number is not on it)
98 * CSSMERR_TP_CERT_REVOKED (valid CRL was found, serial number is revoked)
99 * CSSMERR_APPLETP_NETWORK_FAILURE (crl not available, download in progress)
100 * CSSMERR_APPLETP_CRL_NOT_FOUND (crl not available, and not in progress)
101 *
102 * The first three error codes can be considered definitive answers (with the
103 * NETWORK_FAILURE case indicating a possible retry later if required); the
104 * last error requires a subsequent call to ocspdCRLFetch to either retrieve
105 * the CRL from the on-disk cache or initiate a download of the CRL.
106 *
107 * Note: CSSMERR_TP_INTERNAL_ERROR can also be returned if there is a problem
108 * with the provided arguments, or an error communicating with ocspd.
109 */
110 CSSM_RETURN ocspdCRLStatus(
111 const CSSM_DATA &serialNumber,
112 const CSSM_DATA &certIssuers,
113 const CSSM_DATA *crlIssuer, // optional if URL is supplied
114 const CSSM_DATA *crlURL); // optional if issuer is supplied
115
116 /*
117 * Refresh the CRL cache.
118 */
119 CSSM_RETURN ocspdCRLRefresh(
120 unsigned staleDays,
121 unsigned expireOverlapSeconds,
122 bool purgeAll,
123 bool fullCryptoVerify);
124
125 /*
126 * Flush all CRLs obtained from specified URL from cache. Called by client when
127 * *it* detects a bad CRL.
128 */
129 CSSM_RETURN ocspdCRLFlush(
130 const CSSM_DATA &crlURL);
131
132 /*
133 * Obtain TrustSettings.
134 */
135 OSStatus ocspdTrustSettingsRead(
136 Allocator &alloc,
137 SecTrustSettingsDomain domain,
138 CSSM_DATA &trustSettings); // mallocd via alloc and RETURNED
139
140 /*
141 * Write TrustSettings to disk. Results in authentication dialog.
142 */
143 OSStatus ocspdTrustSettingsWrite(
144 SecTrustSettingsDomain domain,
145 const CSSM_DATA &authBlob,
146 const CSSM_DATA &trustSettings);
147
148 #ifdef __cplusplus
149 }
150 #endif
151
152 #endif /* _OCSPD_CLIENT_H_ */