Current Path : /usr/opt/openssl11/share/doc/openssl/html/man3/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //usr/opt/openssl11/share/doc/openssl/html/man3/X509_get_pathlen.html |
<?xml version="1.0" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>X509_get_extension_flags</title> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <link rev="made" href="mailto:root@hsxx.drive.ne.jp" /> </head> <body style="background-color: white"> <!-- INDEX BEGIN --> <div name="index"> <p><a name="__index__"></a></p> <ul> <li><a href="#name">NAME</a></li> <li><a href="#synopsis">SYNOPSIS</a></li> <li><a href="#description">DESCRIPTION</a></li> <li><a href="#notes">NOTES</a></li> <li><a href="#return_values">RETURN VALUES</a></li> <li><a href="#see_also">SEE ALSO</a></li> <li><a href="#history">HISTORY</a></li> <li><a href="#copyright">COPYRIGHT</a></li> </ul> <hr name="index" /> </div> <!-- INDEX END --> <p> </p> <hr /> <h1><a name="name">NAME</a></h1> <p>X509_get0_subject_key_id, X509_get0_authority_key_id, X509_get0_authority_issuer, X509_get0_authority_serial, X509_get_pathlen, X509_get_extension_flags, X509_get_key_usage, X509_get_extended_key_usage, X509_set_proxy_flag, X509_set_proxy_pathlen, X509_get_proxy_pathlen - retrieve certificate extension data</p> <p> </p> <hr /> <h1><a name="synopsis">SYNOPSIS</a></h1> <pre> #include <openssl/x509v3.h></pre> <pre> long X509_get_pathlen(X509 *x); uint32_t X509_get_extension_flags(X509 *x); uint32_t X509_get_key_usage(X509 *x); uint32_t X509_get_extended_key_usage(X509 *x); const ASN1_OCTET_STRING *X509_get0_subject_key_id(X509 *x); const ASN1_OCTET_STRING *X509_get0_authority_key_id(X509 *x); const GENERAL_NAMES *X509_get0_authority_issuer(X509 *x); const ASN1_INTEGER *X509_get0_authority_serial(X509 *x); void X509_set_proxy_flag(X509 *x); void X509_set_proxy_pathlen(int l); long X509_get_proxy_pathlen(X509 *x);</pre> <p> </p> <hr /> <h1><a name="description">DESCRIPTION</a></h1> <p>These functions retrieve information related to commonly used certificate extensions.</p> <p>X509_get_pathlen() retrieves the path length extension from a certificate. This extension is used to limit the length of a cert chain that may be issued from that CA.</p> <p>X509_get_extension_flags() retrieves general information about a certificate, it will return one or more of the following flags ored together.</p> <dl> <dt><strong><a name="exflag_v1" class="item"><strong>EXFLAG_V1</strong></a></strong></dt> <dd> <p>The certificate is an obsolete version 1 certificate.</p> </dd> <dt><strong><a name="exflag_bcons" class="item"><strong>EXFLAG_BCONS</strong></a></strong></dt> <dd> <p>The certificate contains a basic constraints extension.</p> </dd> <dt><strong><a name="exflag_ca" class="item"><strong>EXFLAG_CA</strong></a></strong></dt> <dd> <p>The certificate contains basic constraints and asserts the CA flag.</p> </dd> <dt><strong><a name="exflag_proxy" class="item"><strong>EXFLAG_PROXY</strong></a></strong></dt> <dd> <p>The certificate is a valid proxy certificate.</p> </dd> <dt><strong><a name="exflag_si" class="item"><strong>EXFLAG_SI</strong></a></strong></dt> <dd> <p>The certificate is self issued (that is subject and issuer names match).</p> </dd> <dt><strong><a name="exflag_ss" class="item"><strong>EXFLAG_SS</strong></a></strong></dt> <dd> <p>The subject and issuer names match and extension values imply it is self signed.</p> </dd> <dt><strong><a name="exflag_freshest" class="item"><strong>EXFLAG_FRESHEST</strong></a></strong></dt> <dd> <p>The freshest CRL extension is present in the certificate.</p> </dd> <dt><strong><a name="exflag_critical" class="item"><strong>EXFLAG_CRITICAL</strong></a></strong></dt> <dd> <p>The certificate contains an unhandled critical extension.</p> </dd> <dt><strong><a name="exflag_invalid" class="item"><strong>EXFLAG_INVALID</strong></a></strong></dt> <dd> <p>Some certificate extension values are invalid or inconsistent. The certificate should be rejected. This bit may also be raised after an out-of-memory error while processing the X509 object, so it may not be related to the processed ASN1 object itself.</p> </dd> <dt><strong><a name="exflag_no_fingerprint" class="item"><strong>EXFLAG_NO_FINGERPRINT</strong></a></strong></dt> <dd> <p>Failed to compute the internal SHA1 hash value of the certificate. This may be due to malloc failure or because no SHA1 implementation was found.</p> </dd> <dt><strong><a name="exflag_invalid_policy" class="item"><strong>EXFLAG_INVALID_POLICY</strong></a></strong></dt> <dd> <p>The NID_certificate_policies certificate extension is invalid or inconsistent. The certificate should be rejected. This bit may also be raised after an out-of-memory error while processing the X509 object, so it may not be related to the processed ASN1 object itself.</p> </dd> <dt><strong><a name="exflag_kusage" class="item"><strong>EXFLAG_KUSAGE</strong></a></strong></dt> <dd> <p>The certificate contains a key usage extension. The value can be retrieved using X509_get_key_usage().</p> </dd> <dt><strong><a name="exflag_xkusage" class="item"><strong>EXFLAG_XKUSAGE</strong></a></strong></dt> <dd> <p>The certificate contains an extended key usage extension. The value can be retrieved using X509_get_extended_key_usage().</p> </dd> </dl> <p>X509_get_key_usage() returns the value of the key usage extension. If key usage is present will return zero or more of the flags: <strong>KU_DIGITAL_SIGNATURE</strong>, <strong>KU_NON_REPUDIATION</strong>, <strong>KU_KEY_ENCIPHERMENT</strong>, <strong>KU_DATA_ENCIPHERMENT</strong>, <strong>KU_KEY_AGREEMENT</strong>, <strong>KU_KEY_CERT_SIGN</strong>, <strong>KU_CRL_SIGN</strong>, <strong>KU_ENCIPHER_ONLY</strong> or <strong>KU_DECIPHER_ONLY</strong> corresponding to individual key usage bits. If key usage is absent then <strong>UINT32_MAX</strong> is returned.</p> <p>X509_get_extended_key_usage() returns the value of the extended key usage extension. If extended key usage is present it will return zero or more of the flags: <strong>XKU_SSL_SERVER</strong>, <strong>XKU_SSL_CLIENT</strong>, <strong>XKU_SMIME</strong>, <strong>XKU_CODE_SIGN</strong> <strong>XKU_OCSP_SIGN</strong>, <strong>XKU_TIMESTAMP</strong>, <strong>XKU_DVCS</strong> or <strong>XKU_ANYEKU</strong>. These correspond to the OIDs <strong>id-kp-serverAuth</strong>, <strong>id-kp-clientAuth</strong>, <strong>id-kp-emailProtection</strong>, <strong>id-kp-codeSigning</strong>, <strong>id-kp-OCSPSigning</strong>, <strong>id-kp-timeStamping</strong>, <strong>id-kp-dvcs</strong> and <strong>anyExtendedKeyUsage</strong> respectively. Additionally <strong>XKU_SGC</strong> is set if either Netscape or Microsoft SGC OIDs are present.</p> <p>X509_get0_subject_key_id() returns an internal pointer to the subject key identifier of <strong>x</strong> as an <strong>ASN1_OCTET_STRING</strong> or <strong>NULL</strong> if the extension is not present or cannot be parsed.</p> <p>X509_get0_authority_key_id() returns an internal pointer to the authority key identifier of <strong>x</strong> as an <strong>ASN1_OCTET_STRING</strong> or <strong>NULL</strong> if the extension is not present or cannot be parsed.</p> <p>X509_get0_authority_issuer() returns an internal pointer to the authority certificate issuer of <strong>x</strong> as a stack of <strong>GENERAL_NAME</strong> structures or <strong>NULL</strong> if the extension is not present or cannot be parsed.</p> <p>X509_get0_authority_serial() returns an internal pointer to the authority certificate serial number of <strong>x</strong> as an <strong>ASN1_INTEGER</strong> or <strong>NULL</strong> if the extension is not present or cannot be parsed.</p> <p>X509_set_proxy_flag() marks the certificate with the <strong>EXFLAG_PROXY</strong> flag. This is for the users who need to mark non-<a href="http://www.ietf.org/rfc/rfc3820.txt" class="rfc">RFC3820</a> proxy certificates as such, as OpenSSL only detects <a href="http://www.ietf.org/rfc/rfc3820.txt" class="rfc">RFC3820</a> compliant ones.</p> <p>X509_set_proxy_pathlen() sets the proxy certificate path length for the given certificate <strong>x</strong>. This is for the users who need to mark non-<a href="http://www.ietf.org/rfc/rfc3820.txt" class="rfc">RFC3820</a> proxy certificates as such, as OpenSSL only detects <a href="http://www.ietf.org/rfc/rfc3820.txt" class="rfc">RFC3820</a> compliant ones.</p> <p>X509_get_proxy_pathlen() returns the proxy certificate path length for the given certificate <strong>x</strong> if it is a proxy certificate.</p> <p> </p> <hr /> <h1><a name="notes">NOTES</a></h1> <p>The value of the flags correspond to extension values which are cached in the <strong>X509</strong> structure. If the flags returned do not provide sufficient information an application should examine extension values directly for example using X509_get_ext_d2i().</p> <p>If the key usage or extended key usage extension is absent then typically usage is unrestricted. For this reason X509_get_key_usage() and X509_get_extended_key_usage() return <strong>UINT32_MAX</strong> when the corresponding extension is absent. Applications can additionally check the return value of X509_get_extension_flags() and take appropriate action is an extension is absent.</p> <p>If X509_get0_subject_key_id() returns <strong>NULL</strong> then the extension may be absent or malformed. Applications can determine the precise reason using X509_get_ext_d2i().</p> <p> </p> <hr /> <h1><a name="return_values">RETURN VALUES</a></h1> <p>X509_get_pathlen() returns the path length value, or -1 if the extension is not present.</p> <p>X509_get_extension_flags(), X509_get_key_usage() and X509_get_extended_key_usage() return sets of flags corresponding to the certificate extension values.</p> <p>X509_get0_subject_key_id() returns the subject key identifier as a pointer to an <strong>ASN1_OCTET_STRING</strong> structure or <strong>NULL</strong> if the extension is absent or an error occurred during parsing.</p> <p>X509_get_proxy_pathlen() returns the path length value if the given certificate is a proxy one and has a path length set, and -1 otherwise.</p> <p> </p> <hr /> <h1><a name="see_also">SEE ALSO</a></h1> <p><em>X509_check_purpose(3)</em></p> <p> </p> <hr /> <h1><a name="history">HISTORY</a></h1> <p>X509_get_pathlen(), X509_set_proxy_flag(), X509_set_proxy_pathlen() and X509_get_proxy_pathlen() were added in OpenSSL 1.1.0.</p> <p> </p> <hr /> <h1><a name="copyright">COPYRIGHT</a></h1> <p>Copyright 2015-2021 The OpenSSL Project Authors. All Rights Reserved.</p> <p>Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <a href="https://www.openssl.org/source/license.html">https://www.openssl.org/source/license.html</a>.</p> </body> </html>