2016-04-28 14:37:24 +08:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2020-09-24 17:42:23 +08:00
|
|
|
CT_POLICY_EVAL_CTX_new_ex,
|
2016-08-04 18:28:04 +08:00
|
|
|
CT_POLICY_EVAL_CTX_new, CT_POLICY_EVAL_CTX_free,
|
2016-08-24 01:41:18 +08:00
|
|
|
CT_POLICY_EVAL_CTX_get0_cert, CT_POLICY_EVAL_CTX_set1_cert,
|
|
|
|
CT_POLICY_EVAL_CTX_get0_issuer, CT_POLICY_EVAL_CTX_set1_issuer,
|
2016-09-08 23:02:46 +08:00
|
|
|
CT_POLICY_EVAL_CTX_get0_log_store, CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE,
|
|
|
|
CT_POLICY_EVAL_CTX_get_time, CT_POLICY_EVAL_CTX_set_time -
|
2016-04-28 14:37:24 +08:00
|
|
|
Encapsulates the data required to evaluate whether SCTs meet a Certificate Transparency policy
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
#include <openssl/ct.h>
|
|
|
|
|
2020-10-15 17:55:50 +08:00
|
|
|
CT_POLICY_EVAL_CTX *CT_POLICY_EVAL_CTX_new_ex(OSSL_LIB_CTX *libctx,
|
2020-09-24 17:42:23 +08:00
|
|
|
const char *propq);
|
2016-04-28 14:37:24 +08:00
|
|
|
CT_POLICY_EVAL_CTX *CT_POLICY_EVAL_CTX_new(void);
|
|
|
|
void CT_POLICY_EVAL_CTX_free(CT_POLICY_EVAL_CTX *ctx);
|
|
|
|
X509* CT_POLICY_EVAL_CTX_get0_cert(const CT_POLICY_EVAL_CTX *ctx);
|
2016-08-24 01:41:18 +08:00
|
|
|
int CT_POLICY_EVAL_CTX_set1_cert(CT_POLICY_EVAL_CTX *ctx, X509 *cert);
|
2016-04-28 14:37:24 +08:00
|
|
|
X509* CT_POLICY_EVAL_CTX_get0_issuer(const CT_POLICY_EVAL_CTX *ctx);
|
2016-08-24 01:41:18 +08:00
|
|
|
int CT_POLICY_EVAL_CTX_set1_issuer(CT_POLICY_EVAL_CTX *ctx, X509 *issuer);
|
2016-04-28 14:37:24 +08:00
|
|
|
const CTLOG_STORE *CT_POLICY_EVAL_CTX_get0_log_store(const CT_POLICY_EVAL_CTX *ctx);
|
2017-01-21 02:58:49 +08:00
|
|
|
void CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE(CT_POLICY_EVAL_CTX *ctx,
|
|
|
|
CTLOG_STORE *log_store);
|
2016-09-08 23:02:46 +08:00
|
|
|
uint64_t CT_POLICY_EVAL_CTX_get_time(const CT_POLICY_EVAL_CTX *ctx);
|
|
|
|
void CT_POLICY_EVAL_CTX_set_time(CT_POLICY_EVAL_CTX *ctx, uint64_t time_in_ms);
|
2016-04-28 14:37:24 +08:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
A B<CT_POLICY_EVAL_CTX> is used by functions that evaluate whether Signed
|
|
|
|
Certificate Timestamps (SCTs) fulfil a Certificate Transparency (CT) policy.
|
|
|
|
This policy may be, for example, that at least one valid SCT is available. To
|
2016-09-08 23:02:46 +08:00
|
|
|
determine this, an SCT's timestamp and signature must be verified.
|
|
|
|
This requires:
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=over 2
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=item *
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
the public key of the log that issued the SCT
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=item *
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
the certificate that the SCT was issued for
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
|
|
|
the issuer certificate (if the SCT was issued for a pre-certificate)
|
|
|
|
|
|
|
|
=item *
|
|
|
|
|
|
|
|
the current time
|
2016-09-08 23:02:46 +08:00
|
|
|
|
2016-04-28 14:37:24 +08:00
|
|
|
=back
|
|
|
|
|
|
|
|
The above requirements are met using the setters described below.
|
|
|
|
|
2020-09-24 17:42:23 +08:00
|
|
|
CT_POLICY_EVAL_CTX_new_ex() creates an empty policy evaluation context
|
2020-04-08 00:37:39 +08:00
|
|
|
and associates it with the given library context I<libctx> and property query
|
|
|
|
string I<propq>.
|
|
|
|
|
|
|
|
CT_POLICY_EVAL_CTX_new() does the same thing as
|
2020-09-24 17:42:23 +08:00
|
|
|
CT_POLICY_EVAL_CTX_new_ex() except that it uses the default library
|
2020-04-08 00:37:39 +08:00
|
|
|
context and property query string.
|
|
|
|
|
|
|
|
The CT_POLICY_EVAL_CTX should then be populated using:
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=over 2
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=item *
|
|
|
|
|
|
|
|
CT_POLICY_EVAL_CTX_set1_cert() to provide the certificate the SCTs were issued for
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2016-08-24 01:41:18 +08:00
|
|
|
Increments the reference count of the certificate.
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=item *
|
|
|
|
|
|
|
|
CT_POLICY_EVAL_CTX_set1_issuer() to provide the issuer certificate
|
2016-08-24 01:41:18 +08:00
|
|
|
|
|
|
|
Increments the reference count of the certificate.
|
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=item *
|
|
|
|
|
|
|
|
CT_POLICY_EVAL_CTX_set_shared_CTLOG_STORE() to provide a list of logs that are trusted as sources of SCTs
|
2016-08-24 01:41:18 +08:00
|
|
|
|
|
|
|
Holds a pointer to the CTLOG_STORE, so the CTLOG_STORE must outlive the
|
|
|
|
CT_POLICY_EVAL_CTX.
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2017-04-08 01:37:47 +08:00
|
|
|
=item *
|
|
|
|
|
|
|
|
CT_POLICY_EVAL_CTX_set_time() to set the time SCTs should be compared with to determine if they are valid
|
2016-09-08 23:02:46 +08:00
|
|
|
|
|
|
|
The SCT timestamp will be compared to this time to check whether the SCT was
|
2016-09-12 17:28:21 +08:00
|
|
|
issued in the future. RFC6962 states that "TLS clients MUST reject SCTs whose
|
2016-09-13 00:02:58 +08:00
|
|
|
timestamp is in the future". By default, this will be set to 5 minutes in the
|
|
|
|
future (e.g. (time() + 300) * 1000), to allow for clock drift.
|
2016-09-12 17:28:21 +08:00
|
|
|
|
2019-09-28 01:17:09 +08:00
|
|
|
The time should be in milliseconds since the Unix Epoch.
|
2016-09-08 23:02:46 +08:00
|
|
|
|
2016-04-28 14:37:24 +08:00
|
|
|
=back
|
|
|
|
|
|
|
|
Each setter has a matching getter for accessing the current value.
|
|
|
|
|
|
|
|
When no longer required, the B<CT_POLICY_EVAL_CTX> should be passed to
|
2016-08-02 22:39:23 +08:00
|
|
|
CT_POLICY_EVAL_CTX_free() to delete it.
|
2016-04-28 14:37:24 +08:00
|
|
|
|
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The issuer certificate only needs to be provided if at least one of the SCTs
|
|
|
|
was issued for a pre-certificate. This will be the case for SCTs embedded in a
|
|
|
|
certificate (i.e. those in an X.509 extension), but may not be the case for SCTs
|
|
|
|
found in the TLS SCT extension or OCSP response.
|
|
|
|
|
|
|
|
=head1 RETURN VALUES
|
|
|
|
|
2020-09-24 17:42:23 +08:00
|
|
|
CT_POLICY_EVAL_CTX_new_ex() and CT_POLICY_EVAL_CTX_new() will return
|
2020-04-08 00:37:39 +08:00
|
|
|
NULL if malloc fails.
|
2016-04-28 14:37:24 +08:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2016-11-11 16:33:09 +08:00
|
|
|
L<ct(7)>
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2016-08-04 23:42:42 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
2020-09-24 17:42:23 +08:00
|
|
|
CT_POLICY_EVAL_CTX_new_ex was added in OpenSSL 3.0. All other
|
2020-04-08 00:37:39 +08:00
|
|
|
functions were added in OpenSSL 1.1.0.
|
2016-08-04 23:42:42 +08:00
|
|
|
|
2016-04-28 14:37:24 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-04-28 14:37:24 +08:00
|
|
|
|
2018-12-06 21:04:44 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-04-28 14:37:24 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
2016-08-04 18:29:23 +08:00
|
|
|
=cut
|