x509_req.h 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081
  1. /*
  2. * Copyright 2014-2022 The GmSSL Project. All Rights Reserved.
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the License); you may
  5. * not use this file except in compliance with the License.
  6. *
  7. * http://www.apache.org/licenses/LICENSE-2.0
  8. */
  9. #ifndef GMSSL_X509_REQ_H
  10. #define GMSSL_X509_REQ_H
  11. #include <time.h>
  12. #include <string.h>
  13. #include <stdint.h>
  14. #include <stdlib.h>
  15. #include <gmssl/sm2.h>
  16. #include <gmssl/oid.h>
  17. #include <gmssl/asn1.h>
  18. #include <gmssl/x509.h>
  19. #ifdef __cplusplus
  20. extern "C" {
  21. #endif
  22. /*
  23. from RFC 2986
  24. CertificationRequestInfo ::= SEQUENCE {
  25. version INTEGER { v1(0) },
  26. subject Name,
  27. subjectPKInfo SubjectPublicKeyInfo,
  28. attributes [0] IMPLICIT SET OF Attribute }
  29. */
  30. int x509_request_info_to_der(int version, const uint8_t *subject, size_t subject_len,
  31. const SM2_KEY *subject_public_key, const uint8_t *attrs, size_t attrs_len,
  32. uint8_t **out, size_t *outlen);
  33. int x509_request_info_from_der(int *version, const uint8_t **subject, size_t *subject_len,
  34. SM2_KEY *subject_public_key, const uint8_t **attrs, size_t *attrs_len,
  35. const uint8_t **in, size_t *inlen);
  36. int x509_request_info_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *d, size_t dlen);
  37. /*
  38. CertificationRequest ::= SEQUENCE {
  39. certificationRequestInfo CertificationRequestInfo,
  40. signatureAlgorithm AlgorithmIdentifier,
  41. signature BIT STRING }
  42. */
  43. int x509_req_sign_to_der(
  44. int version,
  45. const uint8_t *subject, size_t subject_len,
  46. const SM2_KEY *subject_public_key,
  47. const uint8_t *attrs, size_t attrs_len,
  48. int signature_algor,
  49. const SM2_KEY *sign_key, const char *signer_id, size_t signer_id_len,
  50. uint8_t **out, size_t *outlen);
  51. int x509_req_verify(const uint8_t *req, size_t reqlen,
  52. const char *signer_id, size_t signer_id_len);
  53. int x509_req_get_details(const uint8_t *req, size_t reqlen,
  54. int *verison,
  55. const uint8_t **subject, size_t *subject_len,
  56. SM2_KEY *subject_public_key,
  57. const uint8_t **attributes, size_t *attributes_len,
  58. int *signature_algor,
  59. const uint8_t **signature, size_t *signature_len);
  60. int x509_req_to_der(const uint8_t *a, size_t alen, uint8_t **out, size_t *outlen);
  61. int x509_req_from_der(const uint8_t **a, size_t *alen, const uint8_t **in, size_t *inlen);
  62. int x509_req_to_pem(const uint8_t *req, size_t reqlen, FILE *fp);
  63. int x509_req_from_pem(uint8_t *req, size_t *reqlen, size_t maxlen, FILE *fp);
  64. int x509_req_print(FILE *fp, int fmt, int ind, const char *label, const uint8_t *req, size_t reqlen);
  65. int x509_req_new_from_pem(uint8_t **req, size_t *reqlen, FILE *fp);
  66. int x509_req_new_from_file(uint8_t **req, size_t *reqlen, const char *file);
  67. #ifdef __cplusplus
  68. }
  69. #endif
  70. #endif