summaryrefslogtreecommitdiffstats
path: root/src/certtool-common.h
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 07:33:12 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-28 07:33:12 +0000
commit36082a2fe36ecd800d784ae44c14f1f18c66a7e9 (patch)
tree6c68e0c0097987aff85a01dabddd34b862309a7c /src/certtool-common.h
parentInitial commit. (diff)
downloadgnutls28-36082a2fe36ecd800d784ae44c14f1f18c66a7e9.tar.xz
gnutls28-36082a2fe36ecd800d784ae44c14f1f18c66a7e9.zip
Adding upstream version 3.7.9.upstream/3.7.9upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'src/certtool-common.h')
-rw-r--r--src/certtool-common.h201
1 files changed, 201 insertions, 0 deletions
diff --git a/src/certtool-common.h b/src/certtool-common.h
new file mode 100644
index 0000000..0c8c695
--- /dev/null
+++ b/src/certtool-common.h
@@ -0,0 +1,201 @@
+/*
+ * Copyright (C) 2003-2012 Free Software Foundation, Inc.
+ * Copyright (C) 2017 Red Hat, Inc.
+ *
+ * This file is part of GnuTLS.
+ *
+ * GnuTLS is free software: you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * GnuTLS is distributed in the hope that it will be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ * General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program. If not, see
+ * <https://www.gnu.org/licenses/>.
+ */
+
+#ifndef GNUTLS_SRC_CERTTOOL_COMMON_H
+#define GNUTLS_SRC_CERTTOOL_COMMON_H
+
+#include <gnutls/x509.h>
+#include <stdio.h>
+#include <stdbool.h>
+#include "attribute.h"
+
+#define TYPE_CRT 1
+#define TYPE_CRQ 2
+
+#define SERIAL_MAX_BYTES 20
+
+void certtool_version(void);
+
+#include <gnutls/x509.h>
+#include <gnutls/abstract.h>
+
+typedef struct common_info {
+ const char *secret_key;
+ const char *privkey;
+ const char *pubkey;
+ int pkcs8;
+ int incert_format;
+ int outcert_format;
+ int outtext;
+ const char *cert;
+
+ const char *request;
+ const char *crl;
+ const char *ca;
+ const char *data_file;
+ const char *ca_privkey;
+ unsigned bits;
+ const char *sec_param;
+ const char *pkcs_cipher;
+ const char *password;
+ int null_password;
+ int empty_password;
+ int ask_pass;
+ unsigned int crq_extensions;
+ unsigned int v1_cert;
+ /* for key generation */
+ unsigned provable;
+
+ unsigned char *seed;
+ unsigned seed_size;
+
+ const char *pin;
+ const char *so_pin;
+
+ gnutls_digest_algorithm_t hash;
+ int cprint;
+ unsigned key_usage;
+
+ unsigned int batch;
+ /* when printing PKCS #11 objects, only print urls */
+ unsigned int only_urls;
+ unsigned int verbose;
+
+ unsigned rsa_pss_sign;
+ unsigned sort_chain;
+
+ gnutls_sec_param_t verification_profile;
+} common_info_st;
+
+static inline
+void switch_to_pkcs8_when_needed(common_info_st *cinfo, gnutls_x509_privkey_t key, unsigned key_type)
+{
+ if (cinfo->pkcs8)
+ return;
+
+ if (key_type == GNUTLS_PK_RSA_PSS || key_type == GNUTLS_PK_EDDSA_ED25519 || key_type == GNUTLS_PK_EDDSA_ED448 ||
+ key_type == GNUTLS_PK_ECDH_X25519 || key_type == GNUTLS_PK_ECDH_X448 ||
+ key_type == GNUTLS_PK_GOST_01 || key_type == GNUTLS_PK_GOST_12_256 ||
+ key_type == GNUTLS_PK_GOST_12_512) {
+ if (cinfo->verbose)
+ fprintf(stderr, "Assuming --pkcs8 is given; %s private keys can only be exported in PKCS#8 format\n",
+ gnutls_pk_algorithm_get_name(key_type));
+ cinfo->pkcs8 = 1;
+ if (cinfo->password == NULL)
+ cinfo->password = "";
+ }
+
+ if (gnutls_x509_privkey_get_seed(key, NULL, NULL, 0) != GNUTLS_E_INVALID_REQUEST) {
+ if (cinfo->verbose)
+ fprintf(stderr, "Assuming --pkcs8 is given; provable private keys can only be exported in PKCS#8 format\n");
+ cinfo->pkcs8 = 1;
+ if (cinfo->password == NULL)
+ cinfo->password = "";
+ }
+}
+
+/* this must be provided by the app */
+const char *get_pass(void);
+const char *get_confirmed_pass(bool empty_ok);
+void app_exit(int val)
+#ifdef __GNUC__
+__attribute__ ((__noreturn__))
+#endif
+;
+int cipher_to_flags(const char *cipher);
+
+void
+print_private_key(FILE *outfile, common_info_st * cinfo, gnutls_x509_privkey_t key);
+gnutls_pubkey_t load_public_key_or_import(int mand,
+ gnutls_privkey_t privkey,
+ common_info_st * info);
+gnutls_privkey_t load_private_key(int mand, common_info_st * info);
+gnutls_x509_privkey_t load_x509_private_key(int mand,
+ common_info_st * info);
+gnutls_x509_privkey_t *load_privkey_list(int mand, size_t * privkey_size,
+ common_info_st * info);
+gnutls_x509_crq_t load_request(common_info_st * info);
+gnutls_privkey_t load_ca_private_key(common_info_st * info);
+gnutls_x509_crt_t load_ca_cert(unsigned mand, common_info_st * info);
+gnutls_x509_crt_t load_cert(int mand, common_info_st * info);
+gnutls_datum_t *load_secret_key(int mand, common_info_st * info);
+gnutls_pubkey_t load_pubkey(int mand, common_info_st * info);
+gnutls_x509_crt_t *load_cert_list(int mand, size_t * size,
+ common_info_st * info);
+gnutls_x509_crl_t *load_crl_list(int mand, size_t * size,
+ common_info_st * info);
+int get_bits(gnutls_pk_algorithm_t key_type, int info_bits,
+ const char *info_sec_param, int warn);
+
+gnutls_sec_param_t str_to_sec_param(const char *str);
+gnutls_ecc_curve_t str_to_curve(const char *str);
+
+/* prime.c */
+int generate_prime(FILE * outfile, int how, common_info_st * info);
+void dh_info(FILE * infile, FILE * outfile, common_info_st * ci);
+
+gnutls_x509_privkey_t *load_privkey_list(int mand, size_t * privkey_size,
+ common_info_st * info);
+
+void print_pubkey_info(gnutls_pubkey_t pubkey,
+ FILE *outfile,
+ gnutls_certificate_print_formats_t format,
+ gnutls_x509_crt_fmt_t outcert_format,
+ unsigned int outtext);
+void print_ecc_pkey(FILE * outfile, gnutls_ecc_curve_t curve,
+ gnutls_datum_t * k, gnutls_datum_t * x,
+ gnutls_datum_t * y, int cprint);
+void print_gost_pkey(FILE * outfile, gnutls_ecc_curve_t curve,
+ gnutls_digest_algorithm_t digest,
+ gnutls_gost_paramset_t paramset,
+ gnutls_datum_t * k, gnutls_datum_t * x,
+ gnutls_datum_t * y, int cprint);
+void print_rsa_pkey(FILE * outfile, gnutls_datum_t * m, gnutls_datum_t * e,
+ gnutls_datum_t * d, gnutls_datum_t * p,
+ gnutls_datum_t * q, gnutls_datum_t * u,
+ gnutls_datum_t * exp1, gnutls_datum_t * exp2,
+ int cprint);
+void print_dsa_pkey(FILE * outfile, gnutls_datum_t * x, gnutls_datum_t * y,
+ gnutls_datum_t * p, gnutls_datum_t * q,
+ gnutls_datum_t * g, int cprint);
+
+ATTRIBUTE_MALLOC
+FILE *safe_open_rw(const char *file, int privkey_op);
+
+const char *get_password(common_info_st * cinfo, unsigned int *flags,
+ int confirm);
+
+extern unsigned char *lbuffer;
+extern unsigned long lbuffer_size;
+
+void fix_lbuffer(unsigned long);
+
+void decode_seed(gnutls_datum_t *seed, const char *hex, unsigned hex_size);
+
+#define GNUTLS_PK_IS_RSA(pk) ((pk) == GNUTLS_PK_RSA || (pk) == GNUTLS_PK_RSA_PSS)
+
+gnutls_pk_algorithm_t figure_key_type(const char *key_type);
+
+gnutls_digest_algorithm_t hash_to_id(const char *hash);
+
+void sign_params_to_flags(common_info_st *cinfo, const char *params);
+
+#endif /* GNUTLS_SRC_CERTTOOL_COMMON_H */