1 | /** @file
|
---|
2 | * IPRT - Cryptographic (Certificate) Store.
|
---|
3 | */
|
---|
4 |
|
---|
5 | /*
|
---|
6 | * Copyright (C) 2006-2017 Oracle Corporation
|
---|
7 | *
|
---|
8 | * This file is part of VirtualBox Open Source Edition (OSE), as
|
---|
9 | * available from http://www.virtualbox.org. This file is free software;
|
---|
10 | * you can redistribute it and/or modify it under the terms of the GNU
|
---|
11 | * General Public License (GPL) as published by the Free Software
|
---|
12 | * Foundation, in version 2 as it comes in the "COPYING" file of the
|
---|
13 | * VirtualBox OSE distribution. VirtualBox OSE is distributed in the
|
---|
14 | * hope that it will be useful, but WITHOUT ANY WARRANTY of any kind.
|
---|
15 | *
|
---|
16 | * The contents of this file may alternatively be used under the terms
|
---|
17 | * of the Common Development and Distribution License Version 1.0
|
---|
18 | * (CDDL) only, as it comes in the "COPYING.CDDL" file of the
|
---|
19 | * VirtualBox OSE distribution, in which case the provisions of the
|
---|
20 | * CDDL are applicable instead of those of the GPL.
|
---|
21 | *
|
---|
22 | * You may elect to license modified versions of this file under the
|
---|
23 | * terms and conditions of either the GPL or the CDDL or both.
|
---|
24 | */
|
---|
25 |
|
---|
26 | #ifndef ___iprt_crypto_store_h
|
---|
27 | #define ___iprt_crypto_store_h
|
---|
28 |
|
---|
29 | #include <iprt/crypto/x509.h>
|
---|
30 | #include <iprt/crypto/taf.h>
|
---|
31 | #include <iprt/sha.h>
|
---|
32 |
|
---|
33 |
|
---|
34 | RT_C_DECLS_BEGIN
|
---|
35 |
|
---|
36 | /** @defgroup grp_rt_crstore RTCrStore - Crypotgraphic (Certificate) Store.
|
---|
37 | * @ingroup grp_rt_crypto
|
---|
38 | * @{
|
---|
39 | */
|
---|
40 |
|
---|
41 |
|
---|
42 | /**
|
---|
43 | * A certificate store search.
|
---|
44 | *
|
---|
45 | * Used by the store provider to keep track of the current location of a
|
---|
46 | * certificate search.
|
---|
47 | */
|
---|
48 | typedef struct RTCRSTORECERTSEARCH
|
---|
49 | {
|
---|
50 | /** Opaque provider specific storage.
|
---|
51 | *
|
---|
52 | * Provider restriction: The provider is only allowed to use the two first
|
---|
53 | * entries for the find-all searches, because the front-end API may want the
|
---|
54 | * last two for implementing specific searches on top of it. */
|
---|
55 | uintptr_t auOpaque[4];
|
---|
56 | } RTCRSTORECERTSEARCH;
|
---|
57 | /** Pointer to a certificate store search. */
|
---|
58 | typedef RTCRSTORECERTSEARCH *PRTCRSTORECERTSEARCH;
|
---|
59 |
|
---|
60 |
|
---|
61 | /**
|
---|
62 | * Info about a wanted certificate.
|
---|
63 | *
|
---|
64 | * All the search criteria are optional, but for a safe and efficient search
|
---|
65 | * it's recommended to specify all possible ones. If none are given, the search
|
---|
66 | * function will fail.
|
---|
67 | *
|
---|
68 | * For use with RTCrStoreCertAddFromFishingExpedition and others.
|
---|
69 | */
|
---|
70 | typedef struct RTCRCERTWANTED
|
---|
71 | {
|
---|
72 | /** The certificate subject name, optional.
|
---|
73 | * The format is: "C=US, ST=California, L=Redwood Shores, O=Oracle Corporation" */
|
---|
74 | const char *pszSubject;
|
---|
75 | /** The size of the DER (ASN.1) encoded certificate, optional (0). */
|
---|
76 | uint16_t cbEncoded;
|
---|
77 | /** Set if abSha1 contains a valid SHA-1 fingerprint. */
|
---|
78 | bool fSha1Fingerprint;
|
---|
79 | /** Set if abSha512 contains a valid SHA-512 fingerprint. */
|
---|
80 | bool fSha512Fingerprint;
|
---|
81 | /** The SHA-1 fingerprint (of the encoded data). */
|
---|
82 | uint8_t abSha1[RTSHA1_HASH_SIZE];
|
---|
83 | /** The SHA-512 fingerprint (of the encoded data). */
|
---|
84 | uint8_t abSha512[RTSHA512_HASH_SIZE];
|
---|
85 | /** User pointer for directly associating other data with the entry.
|
---|
86 | * Subclassing the structure isn't possible because it's passed as an array. */
|
---|
87 | void const *pvUser;
|
---|
88 | } RTCRCERTWANTED;
|
---|
89 | /** Pointer to a const certificat wanted structure. */
|
---|
90 | typedef RTCRCERTWANTED const *PCRTCRCERTWANTED;
|
---|
91 |
|
---|
92 |
|
---|
93 | /**
|
---|
94 | * Standard store identifiers.
|
---|
95 | *
|
---|
96 | * This is a least common denominator approach to system specific certificate
|
---|
97 | * stores, could be extended to include things other than certificates later if
|
---|
98 | * we need it.
|
---|
99 | *
|
---|
100 | * Windows has lots of different stores, they'll be combined by the
|
---|
101 | * implementation, possibly leading to duplicates. The user stores on Windows
|
---|
102 | * seems to be unioned with the system (machine) stores.
|
---|
103 | *
|
---|
104 | * Linux may have different stores depending on the distro/version/installation,
|
---|
105 | * in which case we'll combine them, which will most likely lead to
|
---|
106 | * duplicates just like on windows. Haven't found any easily accessible
|
---|
107 | * per-user certificate stores on linux yet, so they'll all be empty.
|
---|
108 | *
|
---|
109 | * Mac OS X seems a lot simpler, at least from the GUI point of view. Each
|
---|
110 | * keychains as a "Certificates" folder (the "My Certificates" folder seems to
|
---|
111 | * only be a matching of "Keys" and "Certificates"). However, there are two
|
---|
112 | * system keychains that we need to combine, "System" and "System Roots". As
|
---|
113 | * with Windows and Linux, there is a possibility for duplicates here.
|
---|
114 | *
|
---|
115 | * On solaris we have currently no idea where to look for a certificate store,
|
---|
116 | * so that doesn't yet work.
|
---|
117 | *
|
---|
118 | * Because of the OS X setup, we do not provide any purpose specific
|
---|
119 | */
|
---|
120 | typedef enum RTCRSTOREID
|
---|
121 | {
|
---|
122 | /** Mandatory invalid zero value. */
|
---|
123 | RTCRSTOREID_INVALID = 0,
|
---|
124 | /** Open the certificate store of the current user containing trusted
|
---|
125 | * CAs and certificates.
|
---|
126 | * @remarks This may or may not include all the certificates in the system
|
---|
127 | * store, that's host dependent. So, you better look in both. */
|
---|
128 | RTCRSTOREID_USER_TRUSTED_CAS_AND_CERTIFICATES,
|
---|
129 | /** Open the certificate store of the system containg trusted CAs
|
---|
130 | * and certificates. */
|
---|
131 | RTCRSTOREID_SYSTEM_TRUSTED_CAS_AND_CERTIFICATES,
|
---|
132 | /** End of valid values. */
|
---|
133 | RTCRSTOREID_END,
|
---|
134 | /** Traditional enum type compression prevention hack. */
|
---|
135 | RTCRSTOREID_32BIT_HACK = 0x7fffffff
|
---|
136 | } RTCRSTOREID;
|
---|
137 |
|
---|
138 | /**
|
---|
139 | * Creates a snapshot of a standard store.
|
---|
140 | *
|
---|
141 | * This will return an in-memory store containing all data from the given store.
|
---|
142 | * There will be no duplicates in this one.
|
---|
143 | *
|
---|
144 | * @returns IPRT status code.
|
---|
145 | * @retval VWRN_ALREADY_EXISTS if the certificate is already present and
|
---|
146 | * RTCRCERTCTX_F_ADD_IF_NOT_FOUND was specified.
|
---|
147 | * @param phStore Where to return the store handle. Use
|
---|
148 | * RTCrStoreRelease to release it.
|
---|
149 | * @param enmStoreId The store to snapshot.
|
---|
150 | * @param pErrInfo Where to return additional error/warning info.
|
---|
151 | * Optional.
|
---|
152 | */
|
---|
153 | RTDECL(int) RTCrStoreCreateSnapshotById(PRTCRSTORE phStore, RTCRSTOREID enmStoreId, PRTERRINFO pErrInfo);
|
---|
154 |
|
---|
155 | RTDECL(int) RTCrStoreCreateSnapshotOfUserAndSystemTrustedCAsAndCerts(PRTCRSTORE phStore, PRTERRINFO pErrInfo);
|
---|
156 |
|
---|
157 | RTDECL(int) RTCrStoreCreateInMem(PRTCRSTORE phStore, uint32_t cSizeHint);
|
---|
158 |
|
---|
159 | RTDECL(uint32_t) RTCrStoreRetain(RTCRSTORE hStore);
|
---|
160 | RTDECL(uint32_t) RTCrStoreRelease(RTCRSTORE hStore);
|
---|
161 | RTDECL(PCRTCRCERTCTX) RTCrStoreCertByIssuerAndSerialNo(RTCRSTORE hStore, PCRTCRX509NAME pIssuer, PCRTASN1INTEGER pSerialNo);
|
---|
162 |
|
---|
163 | /**
|
---|
164 | * Add a certificate to the store.
|
---|
165 | *
|
---|
166 | * @returns IPRT status code.
|
---|
167 | * @retval VWRN_ALREADY_EXISTS if the certificate is already present and
|
---|
168 | * RTCRCERTCTX_F_ADD_IF_NOT_FOUND was specified.
|
---|
169 | * @retval VERR_WRITE_PROTECT if the store doesn't support adding.
|
---|
170 | * @param hStore The store to add the certificate to.
|
---|
171 | * @param fFlags RTCRCERTCTX_F_XXX. Encoding must be specified.
|
---|
172 | * RTCRCERTCTX_F_ADD_IF_NOT_FOUND is supported.
|
---|
173 | * @param pvSrc The encoded certificate bytes.
|
---|
174 | * @param cbSrc The size of the encoded certificate.
|
---|
175 | * @param pErrInfo Where to return additional error/warning info.
|
---|
176 | * Optional.
|
---|
177 | */
|
---|
178 | RTDECL(int) RTCrStoreCertAddEncoded(RTCRSTORE hStore, uint32_t fFlags, void const *pvSrc, size_t cbSrc, PRTERRINFO pErrInfo);
|
---|
179 |
|
---|
180 | /**
|
---|
181 | * Adds certificates from files in the specified directory.
|
---|
182 | *
|
---|
183 | * @returns IPRT status code. Even when RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR is
|
---|
184 | * used, an error is returned as an error (and not a warning).
|
---|
185 | *
|
---|
186 | * @param hStore The store to add the certificate(s) to.
|
---|
187 | * @param fFlags RTCRCERTCTX_F_ADD_IF_NOT_FOUND and/or
|
---|
188 | * RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR.
|
---|
189 | * @param pszDir The path to the directory.
|
---|
190 | * @param paSuffixes List of suffixes of files to process.
|
---|
191 | * @param cSuffixes Number of suffixes. If this is 0, all files are
|
---|
192 | * processed.
|
---|
193 | * @param pErrInfo Where to return additional error/warning info.
|
---|
194 | * Optional.
|
---|
195 | */
|
---|
196 | RTDECL(int) RTCrStoreCertAddFromDir(RTCRSTORE hStore, uint32_t fFlags, const char *pszDir,
|
---|
197 | PCRTSTRTUPLE paSuffixes, size_t cSuffixes, PRTERRINFO pErrInfo);
|
---|
198 |
|
---|
199 | RTDECL(int) RTCrStoreCertAddWantedFromDir(RTCRSTORE hStore, uint32_t fFlags,
|
---|
200 | const char *pszDir, PCRTSTRTUPLE paSuffixes, size_t cSuffixes,
|
---|
201 | PCRTCRCERTWANTED paWanted, size_t cWanted, bool *pafFound, PRTERRINFO pErrInfo);
|
---|
202 |
|
---|
203 | /**
|
---|
204 | * Adds certificates from the specified file.
|
---|
205 | *
|
---|
206 | * The supported file formats are:
|
---|
207 | * - PEM (base 64 blobs wrapped in -----BEGIN / END----). Support multiple
|
---|
208 | * certificates in one file.
|
---|
209 | * - Binary DER ASN.1 certificate. Only one per file.
|
---|
210 | * - Java key store version 2.
|
---|
211 | *
|
---|
212 | * @returns IPRT status code. Even when RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR is
|
---|
213 | * used, an error is returned as an error (and not a warning).
|
---|
214 | *
|
---|
215 | * @param hStore The store to add the certificate(s) to.
|
---|
216 | * @param fFlags RTCRCERTCTX_F_ADD_IF_NOT_FOUND and/or
|
---|
217 | * RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR.
|
---|
218 | * @param pszFilename The filename.
|
---|
219 | * @param pErrInfo Where to return additional error/warning info.
|
---|
220 | * Optional.
|
---|
221 | */
|
---|
222 | RTDECL(int) RTCrStoreCertAddFromFile(RTCRSTORE hStore, uint32_t fFlags, const char *pszFilename, PRTERRINFO pErrInfo);
|
---|
223 |
|
---|
224 | RTDECL(int) RTCrStoreCertAddWantedFromFile(RTCRSTORE hStore, uint32_t fFlags, const char *pszFilename,
|
---|
225 | PCRTCRCERTWANTED paWanted, size_t cWanted, bool *pafFound, PRTERRINFO pErrInfo);
|
---|
226 |
|
---|
227 | /**
|
---|
228 | * Adds certificates from the specified java key store file.
|
---|
229 | *
|
---|
230 | * @returns IPRT status code. Even when RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR is
|
---|
231 | * used, an error is returned as an error (and not a warning).
|
---|
232 | *
|
---|
233 | * @param hStore The store to add the certificate(s) to.
|
---|
234 | * @param fFlags RTCRCERTCTX_F_ADD_IF_NOT_FOUND and/or
|
---|
235 | * RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR.
|
---|
236 | * @param pszFilename The path to the JKS file.
|
---|
237 | * @param pErrInfo Where to return additional error/warning info.
|
---|
238 | * Optional.
|
---|
239 | */
|
---|
240 | RTDECL(int) RTCrStoreCertAddFromJavaKeyStore(RTCRSTORE hStore, uint32_t fFlags, const char *pszFilename, PRTERRINFO pErrInfo);
|
---|
241 |
|
---|
242 | /**
|
---|
243 | * Adds certificates from an in-memory java key store.
|
---|
244 | *
|
---|
245 | * @returns IPRT status code. Even when RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR is
|
---|
246 | * used, an error is returned as an error (and not a warning).
|
---|
247 | *
|
---|
248 | * @param hStore The store to add the certificate(s) to.
|
---|
249 | * @param fFlags RTCRCERTCTX_F_ADD_IF_NOT_FOUND and/or
|
---|
250 | * RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR.
|
---|
251 | * @param pvContent Pointer to the key store bytes.
|
---|
252 | * @param cbContent The size of the key store.
|
---|
253 | * @param pszErrorName The file name or whatever helpful indicator the
|
---|
254 | * caller want in the error messages.
|
---|
255 | * @param pErrInfo Where to return additional error/warning info.
|
---|
256 | * Optional.
|
---|
257 | */
|
---|
258 | RTDECL(int) RTCrStoreCertAddFromJavaKeyStoreInMem(RTCRSTORE hStore, uint32_t fFlags, void const *pvContent, size_t cbContent,
|
---|
259 | const char *pszErrorName, PRTERRINFO pErrInfo);
|
---|
260 |
|
---|
261 | /**
|
---|
262 | * Adds all certificates from @a hStoreSrc into @a hStore.
|
---|
263 | *
|
---|
264 | * @returns IPRT status code. Even when RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR is
|
---|
265 | * used, an error is returned as an error (and not a warning).
|
---|
266 | *
|
---|
267 | * @param hStore The destination store.
|
---|
268 | * @param fFlags RTCRCERTCTX_F_ADD_IF_NOT_FOUND and/or
|
---|
269 | * RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR.
|
---|
270 | * @param hStoreSrc The source store.
|
---|
271 | */
|
---|
272 | RTDECL(int) RTCrStoreCertAddFromStore(RTCRSTORE hStore, uint32_t fFlags, RTCRSTORE hStoreSrc);
|
---|
273 |
|
---|
274 | RTDECL(int) RTCrStoreCertAddWantedFromStore(RTCRSTORE hStore, uint32_t fFlags, RTCRSTORE hSrcStore,
|
---|
275 | PCRTCRCERTWANTED paWanted, size_t cWanted, bool *pafFound);
|
---|
276 |
|
---|
277 | RTDECL(int) RTCrStoreCertCheckWanted(RTCRSTORE hStore, PCRTCRCERTWANTED paWanted, size_t cWanted, bool *pafFound);
|
---|
278 |
|
---|
279 |
|
---|
280 | RTDECL(int) RTCrStoreCertAddWantedFromFishingExpedition(RTCRSTORE hStore, uint32_t fFlags,
|
---|
281 | PCRTCRCERTWANTED paWanted, size_t cWanted,
|
---|
282 | bool *pafFound, PRTERRINFO pErrInfo);
|
---|
283 |
|
---|
284 | /**
|
---|
285 | * Exports the certificates in the store to a PEM file
|
---|
286 | *
|
---|
287 | * @returns IPRT status code.
|
---|
288 | * @param hStore The store which certificates should be exported.
|
---|
289 | * @param fFlags Reserved for the future, MBZ.
|
---|
290 | * @param pszFilename The name of the destination PEM file. This will
|
---|
291 | * be truncated.
|
---|
292 | */
|
---|
293 | RTDECL(int) RTCrStoreCertExportAsPem(RTCRSTORE hStore, uint32_t fFlags, const char *pszFilename);
|
---|
294 |
|
---|
295 | /**
|
---|
296 | * Counts the number of certificates in the store.
|
---|
297 | *
|
---|
298 | * @returns Certificate count on success, UINT32_MAX on failure.
|
---|
299 | * @param hStore The store which certificates should be counted.
|
---|
300 | */
|
---|
301 | RTDECL(uint32_t) RTCrStoreCertCount(RTCRSTORE hStore);
|
---|
302 |
|
---|
303 | RTDECL(int) RTCrStoreCertFindAll(RTCRSTORE hStore, PRTCRSTORECERTSEARCH pSearch);
|
---|
304 | RTDECL(int) RTCrStoreCertFindBySubjectOrAltSubjectByRfc5280(RTCRSTORE hStore, PCRTCRX509NAME pSubject,
|
---|
305 | PRTCRSTORECERTSEARCH pSearch);
|
---|
306 | RTDECL(PCRTCRCERTCTX) RTCrStoreCertSearchNext(RTCRSTORE hStore, PRTCRSTORECERTSEARCH pSearch);
|
---|
307 | RTDECL(int) RTCrStoreCertSearchDestroy(RTCRSTORE hStore, PRTCRSTORECERTSEARCH pSearch);
|
---|
308 |
|
---|
309 | RTDECL(int) RTCrStoreConvertToOpenSslCertStore(RTCRSTORE hStore, uint32_t fFlags, void **ppvOpenSslStore);
|
---|
310 | RTDECL(int) RTCrStoreConvertToOpenSslCertStack(RTCRSTORE hStore, uint32_t fFlags, void **ppvOpenSslStack);
|
---|
311 |
|
---|
312 |
|
---|
313 | /** @} */
|
---|
314 |
|
---|
315 |
|
---|
316 | /** @defgroup grp_rt_crcertctx RTCrCertCtx - (Store) Certificate Context.
|
---|
317 | * @{ */
|
---|
318 |
|
---|
319 |
|
---|
320 | /**
|
---|
321 | * Certificate context.
|
---|
322 | *
|
---|
323 | * This is returned by the certificate store APIs and is part of a larger
|
---|
324 | * reference counted structure. All the data is read only.
|
---|
325 | */
|
---|
326 | typedef struct RTCRCERTCTX
|
---|
327 | {
|
---|
328 | /** Flags, RTCRCERTCTX_F_XXX. */
|
---|
329 | uint32_t fFlags;
|
---|
330 | /** The size of the (DER) encoded certificate. */
|
---|
331 | uint32_t cbEncoded;
|
---|
332 | /** Pointer to the (DER) encoded certificate. */
|
---|
333 | uint8_t const *pabEncoded;
|
---|
334 | /** Pointer to the decoded X.509 representation of the certificate.
|
---|
335 | * This can be NULL when pTaInfo is present. */
|
---|
336 | PCRTCRX509CERTIFICATE pCert;
|
---|
337 | /** Pointer to the decoded TrustAnchorInfo for the certificate. This can be
|
---|
338 | * NULL, even for trust anchors, as long as pCert isn't. */
|
---|
339 | PCRTCRTAFTRUSTANCHORINFO pTaInfo;
|
---|
340 | /** Reserved for future use. */
|
---|
341 | void *paReserved[2];
|
---|
342 | } RTCRCERTCTX;
|
---|
343 |
|
---|
344 | /** @name RTCRCERTCTX_F_XXX.
|
---|
345 | * @{ */
|
---|
346 | /** Encoding mask. */
|
---|
347 | #define RTCRCERTCTX_F_ENC_MASK UINT32_C(0x000000ff)
|
---|
348 | /** X.509 certificate, DER encoded. */
|
---|
349 | #define RTCRCERTCTX_F_ENC_X509_DER UINT32_C(0x00000000)
|
---|
350 | /** RTF-5914 trust anchor info, DER encoded. */
|
---|
351 | #define RTCRCERTCTX_F_ENC_TAF_DER UINT32_C(0x00000001)
|
---|
352 | #if 0
|
---|
353 | /** Extended certificate, DER encoded. */
|
---|
354 | #define RTCRCERTCTX_F_ENC_PKCS6_DER UINT32_C(0x00000002)
|
---|
355 | #endif
|
---|
356 | /** Mask containing the flags that ends up in the certificate context. */
|
---|
357 | #define RTCRCERTCTX_F_MASK UINT32_C(0x000000ff)
|
---|
358 |
|
---|
359 | /** Add APIs: Add the certificate if not found. */
|
---|
360 | #define RTCRCERTCTX_F_ADD_IF_NOT_FOUND UINT32_C(0x00010000)
|
---|
361 | /** Add APIs: Continue on error when possible. */
|
---|
362 | #define RTCRCERTCTX_F_ADD_CONTINUE_ON_ERROR UINT32_C(0x00020000)
|
---|
363 | /** @} */
|
---|
364 |
|
---|
365 |
|
---|
366 | RTDECL(uint32_t) RTCrCertCtxRetain(PCRTCRCERTCTX pCertCtx);
|
---|
367 | RTDECL(uint32_t) RTCrCertCtxRelease(PCRTCRCERTCTX pCertCtx);
|
---|
368 |
|
---|
369 | /** @} */
|
---|
370 |
|
---|
371 | RT_C_DECLS_END
|
---|
372 |
|
---|
373 | #endif
|
---|
374 |
|
---|