blob: 82f95b3af1d190ba91277c644ebce79db0b7bb67 [file] [log] [blame]
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +01001=pod
2
Richard Levitteaec3ecd2016-05-21 20:49:33 +02003=head1 NAME
4
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +01005OCSP_response_status, OCSP_response_get1_basic, OCSP_response_create,
Matt Caswelle12c0be2016-09-12 17:39:55 +01006OCSP_RESPONSE_free, OCSP_RESPID_set_by_name,
David Coopercace14b2018-01-24 11:47:23 -05007OCSP_RESPID_set_by_key, OCSP_RESPID_match,
8OCSP_basic_sign, OCSP_basic_sign_ctx - OCSP response functions
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +01009
10=head1 SYNOPSIS
11
12 #include <openssl/ocsp.h>
13
14 int OCSP_response_status(OCSP_RESPONSE *resp);
15 OCSP_BASICRESP *OCSP_response_get1_basic(OCSP_RESPONSE *resp);
16 OCSP_RESPONSE *OCSP_response_create(int status, OCSP_BASICRESP *bs);
17 void OCSP_RESPONSE_free(OCSP_RESPONSE *resp);
18
Matt Caswelle12c0be2016-09-12 17:39:55 +010019 int OCSP_RESPID_set_by_name(OCSP_RESPID *respid, X509 *cert);
20 int OCSP_RESPID_set_by_key(OCSP_RESPID *respid, X509 *cert);
Matt Caswella671b3e2016-09-13 23:26:53 +010021 int OCSP_RESPID_match(OCSP_RESPID *respid, X509 *cert);
Matt Caswelle12c0be2016-09-12 17:39:55 +010022
David Coopercace14b2018-01-24 11:47:23 -050023 int OCSP_basic_sign(OCSP_BASICRESP *brsp, X509 *signer, EVP_PKEY *key,
24 const EVP_MD *dgst, STACK_OF(X509) *certs,
25 unsigned long flags);
26 int OCSP_basic_sign_ctx(OCSP_BASICRESP *brsp, X509 *signer, EVP_MD_CTX *ctx,
27 STACK_OF(X509) *certs, unsigned long flags);
28
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +010029=head1 DESCRIPTION
30
31OCSP_response_status() returns the OCSP response status of B<resp>. It returns
32one of the values: B<OCSP_RESPONSE_STATUS_SUCCESSFUL>,
33B<OCSP_RESPONSE_STATUS_MALFORMEDREQUEST>,
34B<OCSP_RESPONSE_STATUS_INTERNALERROR>, B<OCSP_RESPONSE_STATUS_TRYLATER>
35B<OCSP_RESPONSE_STATUS_SIGREQUIRED>, or B<OCSP_RESPONSE_STATUS_UNAUTHORIZED>.
36
37OCSP_response_get1_basic() decodes and returns the B<OCSP_BASICRESP> structure
Rich Salz1bc74512016-05-20 08:11:46 -040038contained in B<resp>.
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +010039
40OCSP_response_create() creates and returns an B<OCSP_RESPONSE> structure for
41B<status> and optionally including basic response B<bs>.
42
Alex Gaynorb9b6a7e2016-03-20 11:51:06 -040043OCSP_RESPONSE_free() frees up OCSP response B<resp>.
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +010044
Matt Caswelle12c0be2016-09-12 17:39:55 +010045OCSP_RESPID_set_by_name() sets the name of the OCSP_RESPID to be the same as the
46subject name in the supplied X509 certificate B<cert> for the OCSP responder.
47
48OCSP_RESPID_set_by_key() sets the key of the OCSP_RESPID to be the same as the
49key in the supplied X509 certificate B<cert> for the OCSP responder. The key is
50stored as a SHA1 hash.
51
52Note that an OCSP_RESPID can only have one of the name, or the key set. Calling
53OCSP_RESPID_set_by_name() or OCSP_RESPID_set_by_key() will clear any existing
54setting.
55
Matt Caswella671b3e2016-09-13 23:26:53 +010056OCSP_RESPID_match() tests whether the OCSP_RESPID given in B<respid> matches
57with the X509 certificate B<cert>.
58
David Coopere23ac622018-01-24 12:27:19 -050059OCSP_basic_sign() signs OCSP response B<brsp> using certificate B<signer>, private key
60B<key>, digest B<dgst> and additional certificates B<certs>. If the B<flags> option
61B<OCSP_NOCERTS> is set then no certificates will be included in the request. If the
62B<flags> option B<OCSP_RESPID_KEY> is set then the responder is identified by key ID
63rather than by name. OCSP_basic_sign_ctx() also signs OCSP response B<brsp> but
64uses the parameters contained in digest context B<ctx>.
David Coopercace14b2018-01-24 11:47:23 -050065
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +010066=head1 RETURN VALUES
67
68OCSP_RESPONSE_status() returns a status value.
69
70OCSP_response_get1_basic() returns an B<OCSP_BASICRESP> structure pointer or
71B<NULL> if an error occurred.
72
73OCSP_response_create() returns an B<OCSP_RESPONSE> structure pointer or B<NULL>
74if an error occurred.
75
76OCSP_RESPONSE_free() does not return a value.
77
David Coopercace14b2018-01-24 11:47:23 -050078OCSP_RESPID_set_by_name(), OCSP_RESPID_set_by_key(), OCSP_basic_sign(), and
79OCSP_basic_sign_ctx() return 1 on success or 0
Matt Caswelle12c0be2016-09-12 17:39:55 +010080on failure.
81
Matt Caswella671b3e2016-09-13 23:26:53 +010082OCSP_RESPID_match() returns 1 if the OCSP_RESPID and the X509 certificate match
83or 0 otherwise.
84
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +010085=head1 NOTES
86
87OCSP_response_get1_basic() is only called if the status of a response is
88B<OCSP_RESPONSE_STATUS_SUCCESSFUL>.
89
90=head1 SEE ALSO
91
Richard Levitteb97fdb52016-11-11 09:33:09 +010092L<crypto(7)>
Rich Salz9b869742015-08-17 15:21:33 -040093L<OCSP_cert_to_id(3)>
94L<OCSP_request_add1_nonce(3)>
95L<OCSP_REQUEST_new(3)>
Richard Levitteb97fdb52016-11-11 09:33:09 +010096L<OCSP_resp_find_status(3)>
Rich Salz9b869742015-08-17 15:21:33 -040097L<OCSP_sendreq_new(3)>
Matt Caswelle12c0be2016-09-12 17:39:55 +010098L<OCSP_RESPID_new(3)>
99L<OCSP_RESPID_free(3)>
100
101=head1 HISTORY
102
Matt Caswella671b3e2016-09-13 23:26:53 +0100103The OCSP_RESPID_set_by_name(), OCSP_RESPID_set_by_key() and OCSP_RESPID_match()
Rich Salze90fc052017-07-15 09:39:45 -0400104functions were added in OpenSSL 1.1.0a.
Dr. Stephen Henson797a89a2014-06-21 20:13:37 +0100105
David Coopercace14b2018-01-24 11:47:23 -0500106The OCSP_basic_sign_ctx() function was added in OpenSSL 1.1.1.
107
Rich Salze2f92612016-05-18 11:44:05 -0400108=head1 COPYRIGHT
109
Matt Caswell6738bf12018-02-13 12:51:29 +0000110Copyright 2015-2018 The OpenSSL Project Authors. All Rights Reserved.
Rich Salze2f92612016-05-18 11:44:05 -0400111
112Licensed under the OpenSSL license (the "License"). You may not use
113this file except in compliance with the License. You can obtain a copy
114in the file LICENSE in the source distribution or at
115L<https://www.openssl.org/source/license.html>.
116
117=cut