2020-02-15 21:57:32 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
OSSL_CMP_validate_msg,
|
|
|
|
OSSL_CMP_validate_cert_path
|
|
|
|
- functions for verifying CMP message protection
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/cmp.h>
|
|
|
|
int OSSL_CMP_validate_msg(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
|
|
|
|
int OSSL_CMP_validate_cert_path(const OSSL_CMP_CTX *ctx,
|
|
|
|
X509_STORE *trusted_store, X509 *cert);
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
This is the API for validating the protection of CMP messages,
|
|
|
|
which includes validating CMP message sender certificates and their paths
|
|
|
|
while optionally checking the revocation status of the certificates(s).
|
|
|
|
|
2021-01-12 22:41:10 +08:00
|
|
|
OSSL_CMP_validate_msg() validates the protection of the given I<msg>
|
2020-02-15 21:57:32 +08:00
|
|
|
using either password-based mac (PBM) or a signature algorithm.
|
|
|
|
|
|
|
|
In case of signature algorithm, the certificate to use for the signature check
|
|
|
|
is preferably the one provided by a call to L<OSSL_CMP_CTX_set1_srvCert(3)>.
|
|
|
|
If no such sender cert has been pinned then candidate sender certificates are
|
2021-01-12 22:41:10 +08:00
|
|
|
taken from the list of certificates received in the I<msg> extraCerts, then any
|
2020-08-28 18:42:47 +08:00
|
|
|
certificates provided before via L<OSSL_CMP_CTX_set1_untrusted(3)>, and
|
2021-12-16 03:28:34 +08:00
|
|
|
then all trusted certificates provided via L<OSSL_CMP_CTX_set0_trusted(3)>,
|
2020-02-15 21:57:32 +08:00
|
|
|
where a candidate is acceptable only if has not expired, its subject DN matches
|
2021-01-12 22:41:10 +08:00
|
|
|
the I<msg> sender DN (as far as present), and its subject key identifier
|
2020-02-15 21:57:32 +08:00
|
|
|
is present and matches the senderKID (as far as the latter present).
|
|
|
|
Each acceptable cert is tried in the given order to see if the message
|
|
|
|
signature check succeeds and the cert and its path can be verified
|
2021-12-16 03:28:34 +08:00
|
|
|
using any trust store set via L<OSSL_CMP_CTX_set0_trusted(3)>.
|
2020-02-15 21:57:32 +08:00
|
|
|
|
|
|
|
If the option OSSL_CMP_OPT_PERMIT_TA_IN_EXTRACERTS_FOR_IR was set by calling
|
|
|
|
L<OSSL_CMP_CTX_set_option(3)>, for an Initialization Response (IP) message
|
2021-01-12 22:41:10 +08:00
|
|
|
any self-issued certificate from the I<msg> extraCerts field may also be used
|
2020-02-15 21:57:32 +08:00
|
|
|
as trust anchor for the path verification of an acceptable cert if it can be
|
|
|
|
used also to validate the issued certificate returned in the IP message. This is
|
|
|
|
according to TS 33.310 [Network Domain Security (NDS); Authentication Framework
|
|
|
|
(AF)] document specified by the The 3rd Generation Partnership Project (3GPP).
|
|
|
|
|
|
|
|
Any cert that has been found as described above is cached and tried first when
|
|
|
|
validating the signatures of subsequent messages in the same transaction.
|
|
|
|
|
|
|
|
OSSL_CMP_validate_cert_path() attempts to validate the given certificate and its
|
|
|
|
path using the given store of trusted certs (possibly including CRLs and a cert
|
2021-01-12 22:41:10 +08:00
|
|
|
verification callback) and non-trusted intermediate certs from the I<ctx>.
|
2020-02-15 21:57:32 +08:00
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
CMP is defined in RFC 4210 (and CRMF in RFC 4211).
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
|
|
|
OSSL_CMP_validate_msg() and OSSL_CMP_validate_cert_path()
|
|
|
|
return 1 on success, 0 on error or validation failed.
|
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2020-07-13 20:12:02 +08:00
|
|
|
L<OSSL_CMP_CTX_new(3)>, L<OSSL_CMP_exec_certreq(3)>
|
2020-02-15 21:57:32 +08:00
|
|
|
|
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
The OpenSSL CMP support was added in OpenSSL 3.0.
|
|
|
|
|
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2021-01-28 20:54:57 +08:00
|
|
|
Copyright 2007-2021 The OpenSSL Project Authors. All Rights Reserved.
|
2020-02-15 21:57:32 +08:00
|
|
|
|
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|