--- /dev/null
+/*
+ * Copyright (c) 2008-2010,2012-2014 Apple Inc. All Rights Reserved.
+ *
+ * @APPLE_LICENSE_HEADER_START@
+ *
+ * This file contains Original Code and/or Modifications of Original Code
+ * as defined in and that are subject to the Apple Public Source License
+ * Version 2.0 (the 'License'). You may not use this file except in
+ * compliance with the License. Please obtain a copy of the License at
+ * http://www.opensource.apple.com/apsl/ and read it before using this
+ * file.
+ *
+ * The Original Code and all software distributed under the License are
+ * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
+ * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
+ * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
+ * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
+ * Please see the License for the specific language governing rights and
+ * limitations under the License.
+ *
+ * @APPLE_LICENSE_HEADER_END@
+ */
+
+/*!
+ @header SecSCEP
+*/
+#include <stdbool.h>
+
+#include <Security/SecKey.h>
+#include <Security/SecCertificateRequest.h>
+#include <CoreFoundation/CFError.h>
+
+#ifndef _SECURITY_SECSCEP_H_
+#define _SECURITY_SECSCEP_H_
+
+__BEGIN_DECLS
+
+
+SecIdentityRef
+SecSCEPCreateTemporaryIdentity(SecKeyRef publicKey, SecKeyRef privateKey);
+
+/*!
+ @function SecSCEPGenerateCertificateRequest
+ @abstract generate a scep certificate request blob, to be presented to
+ a scep server
+ @param subject distinguished name to be put in the request
+ @param parameters additional information such as challenge and extensions
+ @param publicKey public key to be certified
+ @param privateKey accompanying private key signing the request (proof of possession)
+ @param signer identity to sign scep request with, if NULL the keypair to be
+ certified will be turned into a self-signed cert. The expired identity
+ should be passed in case automatic re-enrollment is desired.
+ @param recipient SecCertificateRef or CFArray thereof for CA (and optionally RA if used).
+*/
+CFDataRef
+SecSCEPGenerateCertificateRequest(CFArrayRef subject, CFDictionaryRef parameters,
+ SecKeyRef publicKey, SecKeyRef privateKey,
+ SecIdentityRef signer, CFTypeRef recipient) CF_RETURNS_RETAINED;
+
+/*!
+ @function SecSCEPCertifyRequest
+ @abstract take a SCEP request and issue a cert
+ @param request the request; the ra/ca identity needed to decrypt it needs to be
+ in the keychain.
+ @param ca_identity to sign the csr
+ @param serialno encoded serial number for cert to be issued
+ @param pend_request don't issue cert now
+*/
+CFDataRef
+SecSCEPCertifyRequest(CFDataRef request, SecIdentityRef ca_identity, CFDataRef serialno, bool pend_request) CF_RETURNS_RETAINED;
+
+/*!
+ @function SecSCEPVerifyReply
+ @abstract validate a reply for a sent request and retrieve the issued
+ request
+ @param request the request sent to the server
+ @param reply reply received from server
+ @param signer SecCertificateRef or CFArray thereof for CA (and optionally RA if used).
+ @param server_error @@@ unused
+ @result issued_cert certificate returned in a success reply
+*/
+CFArrayRef
+SecSCEPVerifyReply(CFDataRef request, CFDataRef reply, CFTypeRef signer,
+ CFErrorRef *server_error) CF_RETURNS_RETAINED;
+
+
+/*!
+ @function SecSCEPGetCertInitial
+ @abstract generate a scep cert initial request, to be presented to
+ a scep server, in case the first request timed out
+ */
+CF_RETURNS_RETAINED
+CFDataRef
+SecSCEPGetCertInitial(SecCertificateRef ca_certificate, CFArrayRef subject, CFDictionaryRef parameters,
+ CFDictionaryRef signed_attrs, SecIdentityRef signer, CFTypeRef recipient);
+
+/*!
+ @function SecSCEPValidateCACertMessage
+ @abstract validate GetCACert data against CA fingerprint and find
+ appropriate RA certificates if applicable.
+ @param certs a PKCS#7 GetCACert response
+ @param ca_fingerprint CFDataRef with CA fingerprint. Size indicates hash type. Recognises SHA-1 and MD5.
+ @param ca_certificate SecCertificateRef CA certificate
+ @param ra_certificate SecCertificateRef RA certificate. Use both for signing and encryption unless ra_encryption_certificate is also returned.
+ @param ra_encryption_certificate SecCertificateRef RA encryption certificate. Returned if there isn't an RA certificate that can both sign and encrypt.
+ @result status errSecSuccess on success.
+*/
+OSStatus
+SecSCEPValidateCACertMessage(CFArrayRef certs,
+ CFDataRef ca_fingerprint, SecCertificateRef *ca_certificate,
+ SecCertificateRef *ra_signing_certificate,
+ SecCertificateRef *ra_encryption_certificate);
+
+
+__END_DECLS
+
+#endif /* _SECURITY_SECSCEP_H_ */