summaryrefslogtreecommitdiffstats
path: root/dirmngr/validate.h
blob: 5b23cb4de2b043733d723b1615f0046ab7b77b5a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
/* validate.h - Certificate validation
 *      Copyright (C) 2004 g10 Code GmbH
 *
 * This file is part of DirMngr.
 *
 * DirMngr is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License as published by
 * the Free Software Foundation; either version 2 of the License, or
 * (at your option) any later version.
 *
 * DirMngr is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
 */

#ifndef VALIDATE_H
#define VALIDATE_H


/* Flag values matching the CERTTRUST_CLASS values and a MASK for
 * them.  check_header_constants() checks their consistency.  */
#define VALIDATE_FLAG_TRUST_SYSTEM     1
#define VALIDATE_FLAG_TRUST_CONFIG     2
#define VALIDATE_FLAG_TRUST_HKP        4
#define VALIDATE_FLAG_TRUST_HKPSPOOL   8
#define VALIDATE_FLAG_MASK_TRUST      0x0f

/* Standard CRL issuer certificate validation; i.e. CRLs are not
 * considered for CRL issuer certificates.  */
#define VALIDATE_FLAG_CRL          64

/* If this flag is set along with VALIDATE_FLAG_CRL a full CRL
 * verification is done.  */
#define VALIDATE_FLAG_RECURSIVE    128

/* Validation mode as used for OCSP.  */
#define VALIDATE_FLAG_OCSP         256

/* Validation mode as used with TLS.  */
#define VALIDATE_FLAG_TLS          512

/* Don't do CRL checks.  */
#define VALIDATE_FLAG_NOCRLCHECK  1024


/* Helper to get the public key algo from a public key.  */
int pk_algo_from_sexp (gcry_sexp_t pkey);

/* Validate the certificate CHAIN up to the trust anchor. Optionally
   return the closest expiration time in R_EXPTIME. */
gpg_error_t validate_cert_chain (ctrl_t ctrl,
                                 ksba_cert_t cert, ksba_isotime_t r_exptime,
                                 unsigned int flags, char **r_trust_anchor);

/* Return 0 if the certificate CERT is usable for certification.  */
gpg_error_t check_cert_use_cert (ksba_cert_t cert);

/* Return 0 if the certificate CERT is usable for signing OCSP
   responses.  */
gpg_error_t check_cert_use_ocsp (ksba_cert_t cert);

/* Return 0 if the certificate CERT is usable for signing CRLs. */
gpg_error_t check_cert_use_crl (ksba_cert_t cert);


#endif /*VALIDATE_H*/