SCT_new.3ossl 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322
  1. .\" Automatically generated by Pod::Man 4.14 (Pod::Simple 3.42)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sp \" Vertical space (when we can't use .PP)
  6. .if t .sp .5v
  7. .if n .sp
  8. ..
  9. .de Vb \" Begin verbatim text
  10. .ft CW
  11. .nf
  12. .ne \\$1
  13. ..
  14. .de Ve \" End verbatim text
  15. .ft R
  16. .fi
  17. ..
  18. .\" Set up some character translations and predefined strings. \*(-- will
  19. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  20. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  21. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  22. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  23. .\" nothing in troff, for use with C<>.
  24. .tr \(*W-
  25. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  26. .ie n \{\
  27. . ds -- \(*W-
  28. . ds PI pi
  29. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  30. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  31. . ds L" ""
  32. . ds R" ""
  33. . ds C` ""
  34. . ds C' ""
  35. 'br\}
  36. .el\{\
  37. . ds -- \|\(em\|
  38. . ds PI \(*p
  39. . ds L" ``
  40. . ds R" ''
  41. . ds C`
  42. . ds C'
  43. 'br\}
  44. .\"
  45. .\" Escape single quotes in literal strings from groff's Unicode transform.
  46. .ie \n(.g .ds Aq \(aq
  47. .el .ds Aq '
  48. .\"
  49. .\" If the F register is >0, we'll generate index entries on stderr for
  50. .\" titles (.TH), headers (.SH), subsections (.SS), items (.Ip), and index
  51. .\" entries marked with X<> in POD. Of course, you'll have to process the
  52. .\" output yourself in some meaningful fashion.
  53. .\"
  54. .\" Avoid warning from groff about undefined register 'F'.
  55. .de IX
  56. ..
  57. .nr rF 0
  58. .if \n(.g .if rF .nr rF 1
  59. .if (\n(rF:(\n(.g==0)) \{\
  60. . if \nF \{\
  61. . de IX
  62. . tm Index:\\$1\t\\n%\t"\\$2"
  63. ..
  64. . if !\nF==2 \{\
  65. . nr % 0
  66. . nr F 2
  67. . \}
  68. . \}
  69. .\}
  70. .rr rF
  71. .\"
  72. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  73. .\" Fear. Run. Save yourself. No user-serviceable parts.
  74. . \" fudge factors for nroff and troff
  75. .if n \{\
  76. . ds #H 0
  77. . ds #V .8m
  78. . ds #F .3m
  79. . ds #[ \f1
  80. . ds #] \fP
  81. .\}
  82. .if t \{\
  83. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  84. . ds #V .6m
  85. . ds #F 0
  86. . ds #[ \&
  87. . ds #] \&
  88. .\}
  89. . \" simple accents for nroff and troff
  90. .if n \{\
  91. . ds ' \&
  92. . ds ` \&
  93. . ds ^ \&
  94. . ds , \&
  95. . ds ~ ~
  96. . ds /
  97. .\}
  98. .if t \{\
  99. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  100. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  101. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  102. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  103. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  104. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  105. .\}
  106. . \" troff and (daisy-wheel) nroff accents
  107. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  108. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  109. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  110. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  111. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  112. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  113. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  114. .ds ae a\h'-(\w'a'u*4/10)'e
  115. .ds Ae A\h'-(\w'A'u*4/10)'E
  116. . \" corrections for vroff
  117. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  118. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  119. . \" for low resolution devices (crt and lpr)
  120. .if \n(.H>23 .if \n(.V>19 \
  121. \{\
  122. . ds : e
  123. . ds 8 ss
  124. . ds o a
  125. . ds d- d\h'-1'\(ga
  126. . ds D- D\h'-1'\(hy
  127. . ds th \o'bp'
  128. . ds Th \o'LP'
  129. . ds ae ae
  130. . ds Ae AE
  131. .\}
  132. .rm #[ #] #H #V #F C
  133. .\" ========================================================================
  134. .\"
  135. .IX Title "SCT_NEW 3ossl"
  136. .TH SCT_NEW 3ossl "2024-09-03" "3.3.2" "OpenSSL"
  137. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  138. .\" way too many mistakes in technical documents.
  139. .if n .ad l
  140. .nh
  141. .SH "NAME"
  142. SCT_new, SCT_new_from_base64, SCT_free, SCT_LIST_free,
  143. SCT_get_version, SCT_set_version,
  144. SCT_get_log_entry_type, SCT_set_log_entry_type,
  145. SCT_get0_log_id, SCT_set0_log_id, SCT_set1_log_id,
  146. SCT_get_timestamp, SCT_set_timestamp,
  147. SCT_get_signature_nid, SCT_set_signature_nid,
  148. SCT_get0_signature, SCT_set0_signature, SCT_set1_signature,
  149. SCT_get0_extensions, SCT_set0_extensions, SCT_set1_extensions,
  150. SCT_get_source, SCT_set_source
  151. \&\- A Certificate Transparency Signed Certificate Timestamp
  152. .SH "SYNOPSIS"
  153. .IX Header "SYNOPSIS"
  154. .Vb 1
  155. \& #include <openssl/ct.h>
  156. \&
  157. \& typedef enum {
  158. \& CT_LOG_ENTRY_TYPE_NOT_SET = \-1,
  159. \& CT_LOG_ENTRY_TYPE_X509 = 0,
  160. \& CT_LOG_ENTRY_TYPE_PRECERT = 1
  161. \& } ct_log_entry_type_t;
  162. \&
  163. \& typedef enum {
  164. \& SCT_VERSION_NOT_SET = \-1,
  165. \& SCT_VERSION_V1 = 0
  166. \& } sct_version_t;
  167. \&
  168. \& typedef enum {
  169. \& SCT_SOURCE_UNKNOWN,
  170. \& SCT_SOURCE_TLS_EXTENSION,
  171. \& SCT_SOURCE_X509V3_EXTENSION,
  172. \& SCT_SOURCE_OCSP_STAPLED_RESPONSE
  173. \& } sct_source_t;
  174. \&
  175. \& SCT *SCT_new(void);
  176. \& SCT *SCT_new_from_base64(unsigned char version,
  177. \& const char *logid_base64,
  178. \& ct_log_entry_type_t entry_type,
  179. \& uint64_t timestamp,
  180. \& const char *extensions_base64,
  181. \& const char *signature_base64);
  182. \&
  183. \& void SCT_free(SCT *sct);
  184. \& void SCT_LIST_free(STACK_OF(SCT) *a);
  185. \&
  186. \& sct_version_t SCT_get_version(const SCT *sct);
  187. \& int SCT_set_version(SCT *sct, sct_version_t version);
  188. \&
  189. \& ct_log_entry_type_t SCT_get_log_entry_type(const SCT *sct);
  190. \& int SCT_set_log_entry_type(SCT *sct, ct_log_entry_type_t entry_type);
  191. \&
  192. \& size_t SCT_get0_log_id(const SCT *sct, unsigned char **log_id);
  193. \& int SCT_set0_log_id(SCT *sct, unsigned char *log_id, size_t log_id_len);
  194. \& int SCT_set1_log_id(SCT *sct, const unsigned char *log_id, size_t log_id_len);
  195. \&
  196. \& uint64_t SCT_get_timestamp(const SCT *sct);
  197. \& void SCT_set_timestamp(SCT *sct, uint64_t timestamp);
  198. \&
  199. \& int SCT_get_signature_nid(const SCT *sct);
  200. \& int SCT_set_signature_nid(SCT *sct, int nid);
  201. \&
  202. \& size_t SCT_get0_signature(const SCT *sct, unsigned char **sig);
  203. \& void SCT_set0_signature(SCT *sct, unsigned char *sig, size_t sig_len);
  204. \& int SCT_set1_signature(SCT *sct, const unsigned char *sig, size_t sig_len);
  205. \&
  206. \& size_t SCT_get0_extensions(const SCT *sct, unsigned char **ext);
  207. \& void SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len);
  208. \& int SCT_set1_extensions(SCT *sct, const unsigned char *ext, size_t ext_len);
  209. \&
  210. \& sct_source_t SCT_get_source(const SCT *sct);
  211. \& int SCT_set_source(SCT *sct, sct_source_t source);
  212. .Ve
  213. .SH "DESCRIPTION"
  214. .IX Header "DESCRIPTION"
  215. Signed Certificate Timestamps (SCTs) are defined by \s-1RFC 6962,\s0 Section 3.2.
  216. They constitute a promise by a Certificate Transparency (\s-1CT\s0) log to publicly
  217. record a certificate. By cryptographically verifying that a log did indeed issue
  218. an \s-1SCT,\s0 some confidence can be gained that the certificate is publicly known.
  219. .PP
  220. An internal representation of an \s-1SCT\s0 can be created in one of two ways.
  221. The first option is to create a blank \s-1SCT,\s0 using \fBSCT_new()\fR, and then populate
  222. it using:
  223. .IP "\(bu" 2
  224. \&\fBSCT_set_version()\fR to set the \s-1SCT\s0 version.
  225. .Sp
  226. Only \s-1SCT_VERSION_V1\s0 is currently supported.
  227. .IP "\(bu" 2
  228. \&\fBSCT_set_log_entry_type()\fR to set the type of certificate the \s-1SCT\s0 was issued for:
  229. .Sp
  230. \&\fB\s-1CT_LOG_ENTRY_TYPE_X509\s0\fR for a normal certificate.
  231. \&\fB\s-1CT_LOG_ENTRY_TYPE_PRECERT\s0\fR for a pre-certificate.
  232. .IP "\(bu" 2
  233. \&\fBSCT_set0_log_id()\fR or \fBSCT_set1_log_id()\fR to set the LogID of the \s-1CT\s0 log that the \s-1SCT\s0 came from.
  234. .Sp
  235. The former takes ownership, whereas the latter makes a copy.
  236. See \s-1RFC 6962,\s0 Section 3.2 for the definition of LogID.
  237. .IP "\(bu" 2
  238. \&\fBSCT_set_timestamp()\fR to set the time the \s-1SCT\s0 was issued (time in milliseconds
  239. since the Unix Epoch).
  240. .IP "\(bu" 2
  241. \&\fBSCT_set_signature_nid()\fR to set the \s-1NID\s0 of the signature.
  242. .IP "\(bu" 2
  243. \&\fBSCT_set0_signature()\fR or \fBSCT_set1_signature()\fR to set the raw signature value.
  244. .Sp
  245. The former takes ownership, whereas the latter makes a copy.
  246. .IP "\(bu" 2
  247. \&\fBSCT_set0_extensions()\fR or \fBSCT_set1_extensions\fR to provide \s-1SCT\s0 extensions.
  248. .Sp
  249. The former takes ownership, whereas the latter makes a copy.
  250. .PP
  251. Alternatively, the \s-1SCT\s0 can be pre-populated from the following data using
  252. \&\fBSCT_new_from_base64()\fR:
  253. .IP "\(bu" 2
  254. The \s-1SCT\s0 version (only \s-1SCT_VERSION_V1\s0 is currently supported).
  255. .IP "\(bu" 2
  256. The LogID (see \s-1RFC 6962,\s0 Section 3.2), base64 encoded.
  257. .IP "\(bu" 2
  258. The type of certificate the \s-1SCT\s0 was issued for:
  259. \&\fB\s-1CT_LOG_ENTRY_TYPE_X509\s0\fR for a normal certificate.
  260. \&\fB\s-1CT_LOG_ENTRY_TYPE_PRECERT\s0\fR for a pre-certificate.
  261. .IP "\(bu" 2
  262. The time that the \s-1SCT\s0 was issued (time in milliseconds since the Unix Epoch).
  263. .IP "\(bu" 2
  264. The \s-1SCT\s0 extensions, base64 encoded.
  265. .IP "\(bu" 2
  266. The \s-1SCT\s0 signature, base64 encoded.
  267. .PP
  268. \&\fBSCT_set_source()\fR can be used to record where the \s-1SCT\s0 was found
  269. (\s-1TLS\s0 extension, X.509 certificate extension or \s-1OCSP\s0 response). This is not
  270. required for verifying the \s-1SCT.\s0
  271. .PP
  272. \&\fBSCT_free()\fR frees the specified \s-1SCT.\s0
  273. If the argument is \s-1NULL,\s0 nothing is done.
  274. .PP
  275. \&\fBSCT_LIST_free()\fR frees the specified stack of SCTs.
  276. If the argument is \s-1NULL,\s0 nothing is done.
  277. .SH "NOTES"
  278. .IX Header "NOTES"
  279. Some of the setters return int, instead of void. These will all return 1 on
  280. success, 0 on failure. They will not make changes on failure.
  281. .PP
  282. All of the setters will reset the validation status of the \s-1SCT\s0 to
  283. \&\s-1SCT_VALIDATION_STATUS_NOT_SET\s0 (see \fBSCT_validate\fR\|(3)).
  284. .PP
  285. \&\fBSCT_set_source()\fR will call \fBSCT_set_log_entry_type()\fR if the type of
  286. certificate the \s-1SCT\s0 was issued for can be inferred from where the \s-1SCT\s0 was found.
  287. For example, an \s-1SCT\s0 found in an X.509 extension must have been issued for a pre\-
  288. certificate.
  289. .PP
  290. \&\fBSCT_set_source()\fR will not refuse unknown values.
  291. .SH "RETURN VALUES"
  292. .IX Header "RETURN VALUES"
  293. \&\fBSCT_set_version()\fR returns 1 if the specified version is supported, 0 otherwise.
  294. .PP
  295. \&\fBSCT_set_log_entry_type()\fR returns 1 if the specified log entry type is supported, 0 otherwise.
  296. .PP
  297. \&\fBSCT_set0_log_id()\fR and \fBSCT_set1_log_id\fR return 1 if the specified LogID is a
  298. valid \s-1SHA\-256\s0 hash, 0 otherwise. Additionally, \fBSCT_set1_log_id\fR returns 0 if
  299. malloc fails.
  300. .PP
  301. \&\fBSCT_set_signature_nid\fR returns 1 if the specified \s-1NID\s0 is supported, 0 otherwise.
  302. .PP
  303. \&\fBSCT_set1_extensions\fR and \fBSCT_set1_signature\fR return 1 if the supplied buffer
  304. is copied successfully, 0 otherwise (i.e. if malloc fails).
  305. .PP
  306. \&\fBSCT_set_source\fR returns 1 on success, 0 otherwise.
  307. .SH "SEE ALSO"
  308. .IX Header "SEE ALSO"
  309. \&\fBct\fR\|(7),
  310. \&\fBSCT_validate\fR\|(3),
  311. \&\fBOBJ_nid2obj\fR\|(3)
  312. .SH "HISTORY"
  313. .IX Header "HISTORY"
  314. These functions were added in OpenSSL 1.1.0.
  315. .SH "COPYRIGHT"
  316. .IX Header "COPYRIGHT"
  317. Copyright 2016\-2024 The OpenSSL Project Authors. All Rights Reserved.
  318. .PP
  319. Licensed under the Apache License 2.0 (the \*(L"License\*(R"). You may not use
  320. this file except in compliance with the License. You can obtain a copy
  321. in the file \s-1LICENSE\s0 in the source distribution or at
  322. <https://www.openssl.org/source/license.html>.