<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/xhtml;charset=UTF-8"/> <meta http-equiv="X-UA-Compatible" content="IE=9"/> <meta name="generator" content="Doxygen 1.8.5"/> <title>PolarSSL v1.3.9: x509_crt.h File Reference</title> <link href="tabs.css" rel="stylesheet" type="text/css"/> <script type="text/javascript" src="jquery.js"></script> <script type="text/javascript" src="dynsections.js"></script> <link href="doxygen.css" rel="stylesheet" type="text/css" /> </head> <body> <div id="top"><!-- do not remove this div, it is closed by doxygen! --> <div id="titlearea"> <table cellspacing="0" cellpadding="0"> <tbody> <tr style="height: 56px;"> <td style="padding-left: 0.5em;"> <div id="projectname">PolarSSL v1.3.9 </div> </td> </tr> </tbody> </table> </div> <!-- end header part --> <!-- Generated by Doxygen 1.8.5 --> <div id="navrow1" class="tabs"> <ul class="tablist"> <li><a href="index.html"><span>Main Page</span></a></li> <li><a href="modules.html"><span>Modules</span></a></li> <li><a href="annotated.html"><span>Data Structures</span></a></li> <li class="current"><a href="files.html"><span>Files</span></a></li> </ul> </div> <div id="navrow2" class="tabs2"> <ul class="tablist"> <li><a href="files.html"><span>File List</span></a></li> <li><a href="globals.html"><span>Globals</span></a></li> </ul> </div> <div id="nav-path" class="navpath"> <ul> <li class="navelem"><a class="el" href="dir_fe5d89da45ebcc1a7ff7bc3c5e7e1db0.html">include</a></li><li class="navelem"><a class="el" href="dir_a7a97f5a70c18a81e14d82e1a0dd0021.html">polarssl</a></li> </ul> </div> </div><!-- top --> <div class="header"> <div class="summary"> <a href="#nested-classes">Data Structures</a> | <a href="#func-members">Functions</a> </div> <div class="headertitle"> <div class="title">x509_crt.h File Reference</div> </div> </div><!--header--> <div class="contents"> <p>X.509 certificate parsing and writing. <a href="#details">More...</a></p> <div class="textblock"><code>#include "<a class="el" href="config_8h_source.html">config.h</a>"</code><br/> <code>#include "<a class="el" href="x509_8h_source.html">x509.h</a>"</code><br/> <code>#include "<a class="el" href="x509__crl_8h_source.html">x509_crl.h</a>"</code><br/> </div><div class="textblock"><div class="dynheader"> Include dependency graph for x509_crt.h:</div> <div class="dyncontent"> <div class="center"><img src="x509__crt_8h__incl.png" border="0" usemap="#x509__crt_8h" alt=""/></div> <map name="x509__crt_8h" id="x509__crt_8h"> <area shape="rect" id="node2" href="config_8h.html" title="Configuration options (set of defines) " alt="" coords="615,528,717,555"/><area shape="rect" id="node4" href="x509_8h.html" title="X.509 generic defines and structures. " alt="" coords="528,155,609,181"/><area shape="rect" id="node18" href="x509__crl_8h.html" title="X.509 certificate revocation list parsing. " alt="" coords="673,80,796,107"/><area shape="rect" id="node3" href="check__config_8h.html" title="Consistency checks for configuration options. " alt="" coords="585,603,748,629"/><area shape="rect" id="node5" href="asn1_8h.html" title="Generic ASN.1 parsing. " alt="" coords="5,379,87,405"/><area shape="rect" id="node10" href="pk_8h.html" title="Public Key abstraction layer. " alt="" coords="303,229,365,256"/><area shape="rect" id="node12" href="rsa_8h.html" title="The RSA public-key cryptosystem. " alt="" coords="433,304,505,331"/><area shape="rect" id="node6" href="bignum_8h.html" title="Multi-precision integer library. " alt="" coords="135,453,237,480"/><area shape="rect" id="node11" href="md_8h.html" title="Generic message digest wrapper. " alt="" coords="113,379,175,405"/><area shape="rect" id="node16" href="ecp_8h.html" title="Elliptic curves over GF(p) " alt="" coords="200,379,272,405"/><area shape="rect" id="node17" href="ecdsa_8h.html" title="Elliptic curve DSA. " alt="" coords="179,304,271,331"/><area shape="rect" id="node13" href="threading_8h.html" title="Threading abstraction layer. " alt="" coords="439,379,571,405"/></map> </div> </div><div class="textblock"><div class="dynheader"> This graph shows which files directly or indirectly include this file:</div> <div class="dyncontent"> <div class="center"><img src="x509__crt_8h__dep__incl.png" border="0" usemap="#x509__crt_8hdep" alt=""/></div> <map name="x509__crt_8hdep" id="x509__crt_8hdep"> <area shape="rect" id="node2" href="compat-1_82_8h.html" title="Backwards compatibility header for PolarSSL-1.2 from PolarSSL-1.3. " alt="" coords="5,80,147,107"/><area shape="rect" id="node3" href="ssl_8h.html" title="SSL/TLS functions. " alt="" coords="172,80,244,107"/><area shape="rect" id="node4" href="debug_8h.html" title="Debug functions. " alt="" coords="94,155,185,181"/><area shape="rect" id="node5" href="ssl__cache_8h.html" title="SSL session cache implementation. " alt="" coords="210,155,341,181"/></map> </div> </div> <p><a href="x509__crt_8h_source.html">Go to the source code of this file.</a></p> <table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="nested-classes"></a> Data Structures</h2></td></tr> <tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="struct__x509__crt.html">_x509_crt</a></td></tr> <tr class="memdesc:"><td class="mdescLeft"> </td><td class="mdescRight">Container for an X.509 certificate. <a href="struct__x509__crt.html#details">More...</a><br/></td></tr> <tr class="separator:"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:"><td class="memItemLeft" align="right" valign="top">struct  </td><td class="memItemRight" valign="bottom"><a class="el" href="struct__x509write__cert.html">_x509write_cert</a></td></tr> <tr class="memdesc:"><td class="mdescLeft"> </td><td class="mdescRight">Container for writing a certificate (CRT) <a href="struct__x509write__cert.html#details">More...</a><br/></td></tr> <tr class="separator:"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="func-members"></a> Functions</h2></td></tr> <tr class="memitem:a00d51bcf5acb9b8ffd43dc2cd9c91bf0"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a00d51bcf5acb9b8ffd43dc2cd9c91bf0">x509write_crt_init</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr> <tr class="memdesc:a00d51bcf5acb9b8ffd43dc2cd9c91bf0"><td class="mdescLeft"> </td><td class="mdescRight">Initialize a CRT writing context. <a href="#a00d51bcf5acb9b8ffd43dc2cd9c91bf0">More...</a><br/></td></tr> <tr class="separator:a00d51bcf5acb9b8ffd43dc2cd9c91bf0"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a40e28129171de7c02f41999be09f1225"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a40e28129171de7c02f41999be09f1225">x509write_crt_set_version</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, int version)</td></tr> <tr class="memdesc:a40e28129171de7c02f41999be09f1225"><td class="mdescLeft"> </td><td class="mdescRight">Set the verion for a Certificate Default: X509_CRT_VERSION_3. <a href="#a40e28129171de7c02f41999be09f1225">More...</a><br/></td></tr> <tr class="separator:a40e28129171de7c02f41999be09f1225"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a74bafc1a3cfa1044bdfb33f6d31f1b21"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a74bafc1a3cfa1044bdfb33f6d31f1b21">x509write_crt_set_serial</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const <a class="el" href="structmpi.html">mpi</a> *serial)</td></tr> <tr class="memdesc:a74bafc1a3cfa1044bdfb33f6d31f1b21"><td class="mdescLeft"> </td><td class="mdescRight">Set the serial number for a Certificate. <a href="#a74bafc1a3cfa1044bdfb33f6d31f1b21">More...</a><br/></td></tr> <tr class="separator:a74bafc1a3cfa1044bdfb33f6d31f1b21"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a2aae935adeb9aed5abc72eafe31701da"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a2aae935adeb9aed5abc72eafe31701da">x509write_crt_set_validity</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *not_before, const char *not_after)</td></tr> <tr class="memdesc:a2aae935adeb9aed5abc72eafe31701da"><td class="mdescLeft"> </td><td class="mdescRight">Set the validity period for a Certificate Timestamps should be in string format for UTC timezone i.e. <a href="#a2aae935adeb9aed5abc72eafe31701da">More...</a><br/></td></tr> <tr class="separator:a2aae935adeb9aed5abc72eafe31701da"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a470b8fd3056f61183351189fff62a2dd"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a470b8fd3056f61183351189fff62a2dd">x509write_crt_set_issuer_name</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *issuer_name)</td></tr> <tr class="memdesc:a470b8fd3056f61183351189fff62a2dd"><td class="mdescLeft"> </td><td class="mdescRight">Set the issuer name for a Certificate Issuer names should contain a comma-separated list of OID types and values: e.g. <a href="#a470b8fd3056f61183351189fff62a2dd">More...</a><br/></td></tr> <tr class="separator:a470b8fd3056f61183351189fff62a2dd"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a3e99cbb5deaac1854a5f2dd5523bf501"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a3e99cbb5deaac1854a5f2dd5523bf501">x509write_crt_set_subject_name</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *subject_name)</td></tr> <tr class="memdesc:a3e99cbb5deaac1854a5f2dd5523bf501"><td class="mdescLeft"> </td><td class="mdescRight">Set the subject name for a Certificate Subject names should contain a comma-separated list of OID types and values: e.g. <a href="#a3e99cbb5deaac1854a5f2dd5523bf501">More...</a><br/></td></tr> <tr class="separator:a3e99cbb5deaac1854a5f2dd5523bf501"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a6dea2b3a87be62a618d66ef8a18c8920"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a6dea2b3a87be62a618d66ef8a18c8920">x509write_crt_set_subject_key</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, <a class="el" href="structpk__context.html">pk_context</a> *key)</td></tr> <tr class="memdesc:a6dea2b3a87be62a618d66ef8a18c8920"><td class="mdescLeft"> </td><td class="mdescRight">Set the subject public key for the certificate. <a href="#a6dea2b3a87be62a618d66ef8a18c8920">More...</a><br/></td></tr> <tr class="separator:a6dea2b3a87be62a618d66ef8a18c8920"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ae4d75450c4b979b19adc3c4fec8202bf"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#ae4d75450c4b979b19adc3c4fec8202bf">x509write_crt_set_issuer_key</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, <a class="el" href="structpk__context.html">pk_context</a> *key)</td></tr> <tr class="memdesc:ae4d75450c4b979b19adc3c4fec8202bf"><td class="mdescLeft"> </td><td class="mdescRight">Set the issuer key used for signing the certificate. <a href="#ae4d75450c4b979b19adc3c4fec8202bf">More...</a><br/></td></tr> <tr class="separator:ae4d75450c4b979b19adc3c4fec8202bf"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:aceba04da0ec2a3530c7d3befeb022052"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#aceba04da0ec2a3530c7d3befeb022052">x509write_crt_set_md_alg</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, <a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> md_alg)</td></tr> <tr class="memdesc:aceba04da0ec2a3530c7d3befeb022052"><td class="mdescLeft"> </td><td class="mdescRight">Set the MD algorithm to use for the signature (e.g. <a href="#aceba04da0ec2a3530c7d3befeb022052">More...</a><br/></td></tr> <tr class="separator:aceba04da0ec2a3530c7d3befeb022052"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a86d4318af644578d56d2fc30111b552a"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a86d4318af644578d56d2fc30111b552a">x509write_crt_set_extension</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, const char *oid, size_t oid_len, int critical, const unsigned char *val, size_t val_len)</td></tr> <tr class="memdesc:a86d4318af644578d56d2fc30111b552a"><td class="mdescLeft"> </td><td class="mdescRight">Generic function to add to or replace an extension in the CRT. <a href="#a86d4318af644578d56d2fc30111b552a">More...</a><br/></td></tr> <tr class="separator:a86d4318af644578d56d2fc30111b552a"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a61a8cb196cce7f6b239be8e3e659d630"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a61a8cb196cce7f6b239be8e3e659d630">x509write_crt_set_basic_constraints</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, int is_ca, int max_pathlen)</td></tr> <tr class="memdesc:a61a8cb196cce7f6b239be8e3e659d630"><td class="mdescLeft"> </td><td class="mdescRight">Set the basicConstraints extension for a CRT. <a href="#a61a8cb196cce7f6b239be8e3e659d630">More...</a><br/></td></tr> <tr class="separator:a61a8cb196cce7f6b239be8e3e659d630"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a8f1fbf2b803612f4fbf6497ef10cdd9b"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a8f1fbf2b803612f4fbf6497ef10cdd9b">x509write_crt_set_subject_key_identifier</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr> <tr class="memdesc:a8f1fbf2b803612f4fbf6497ef10cdd9b"><td class="mdescLeft"> </td><td class="mdescRight">Set the subjectKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#a6dea2b3a87be62a618d66ef8a18c8920" title="Set the subject public key for the certificate. ">x509write_crt_set_subject_key()</a> has been called before. <a href="#a8f1fbf2b803612f4fbf6497ef10cdd9b">More...</a><br/></td></tr> <tr class="separator:a8f1fbf2b803612f4fbf6497ef10cdd9b"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ad59ee28b4bdee43a8579bdb0d9487a0f"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#ad59ee28b4bdee43a8579bdb0d9487a0f">x509write_crt_set_authority_key_identifier</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr> <tr class="memdesc:ad59ee28b4bdee43a8579bdb0d9487a0f"><td class="mdescLeft"> </td><td class="mdescRight">Set the authorityKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#ae4d75450c4b979b19adc3c4fec8202bf" title="Set the issuer key used for signing the certificate. ">x509write_crt_set_issuer_key()</a> has been called before. <a href="#ad59ee28b4bdee43a8579bdb0d9487a0f">More...</a><br/></td></tr> <tr class="separator:ad59ee28b4bdee43a8579bdb0d9487a0f"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a91cb154550fe39cfd578856633a87db0"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a91cb154550fe39cfd578856633a87db0">x509write_crt_set_key_usage</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char key_usage)</td></tr> <tr class="memdesc:a91cb154550fe39cfd578856633a87db0"><td class="mdescLeft"> </td><td class="mdescRight">Set the Key Usage Extension flags (e.g. <a href="#a91cb154550fe39cfd578856633a87db0">More...</a><br/></td></tr> <tr class="separator:a91cb154550fe39cfd578856633a87db0"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a1957691b91b68abcb8685fa348c77234"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a1957691b91b68abcb8685fa348c77234">x509write_crt_set_ns_cert_type</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char ns_cert_type)</td></tr> <tr class="memdesc:a1957691b91b68abcb8685fa348c77234"><td class="mdescLeft"> </td><td class="mdescRight">Set the Netscape Cert Type flags (e.g. <a href="#a1957691b91b68abcb8685fa348c77234">More...</a><br/></td></tr> <tr class="separator:a1957691b91b68abcb8685fa348c77234"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ac1e8ce08e2b45dc92105b589b34b2b27"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#ac1e8ce08e2b45dc92105b589b34b2b27">x509write_crt_free</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx)</td></tr> <tr class="memdesc:ac1e8ce08e2b45dc92105b589b34b2b27"><td class="mdescLeft"> </td><td class="mdescRight">Free the contents of a CRT write context. <a href="#ac1e8ce08e2b45dc92105b589b34b2b27">More...</a><br/></td></tr> <tr class="separator:ac1e8ce08e2b45dc92105b589b34b2b27"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a7300897079a27c5fa424c9653081b286"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a7300897079a27c5fa424c9653081b286">x509write_crt_der</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char *buf, size_t size, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</td></tr> <tr class="memdesc:a7300897079a27c5fa424c9653081b286"><td class="mdescLeft"> </td><td class="mdescRight">Write a built up certificate to a X509 DER structure Note: data is written at the end of the buffer! Use the return value to determine where you should start using the buffer. <a href="#a7300897079a27c5fa424c9653081b286">More...</a><br/></td></tr> <tr class="separator:a7300897079a27c5fa424c9653081b286"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:a65d982a2325fff3f0c6806a512ef25cd"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="x509__crt_8h.html#a65d982a2325fff3f0c6806a512ef25cd">x509write_crt_pem</a> (<a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> *ctx, unsigned char *buf, size_t size, int(*f_rng)(void *, unsigned char *, size_t), void *p_rng)</td></tr> <tr class="memdesc:a65d982a2325fff3f0c6806a512ef25cd"><td class="mdescLeft"> </td><td class="mdescRight">Write a built up certificate to a X509 PEM string. <a href="#a65d982a2325fff3f0c6806a512ef25cd">More...</a><br/></td></tr> <tr class="separator:a65d982a2325fff3f0c6806a512ef25cd"><td class="memSeparator" colspan="2"> </td></tr> </table><table class="memberdecls"> <tr class="heading"><td colspan="2"><h2 class="groupheader"><a name="member-group"></a> Structures and functions for parsing and writing X.509 certificates</h2></td></tr> <tr class="memitem:ga803eb771dce23b32e873b94fa42ae3eb"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga803eb771dce23b32e873b94fa42ae3eb">X509_CRT_VERSION_1</a>   0</td></tr> <tr class="separator:ga803eb771dce23b32e873b94fa42ae3eb"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:gaff0395a0a007c3515967f958879926cf"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gaff0395a0a007c3515967f958879926cf">X509_CRT_VERSION_2</a>   1</td></tr> <tr class="separator:gaff0395a0a007c3515967f958879926cf"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga5aa7c22740f9d1271b76fe9dffe5ce18"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga5aa7c22740f9d1271b76fe9dffe5ce18">X509_CRT_VERSION_3</a>   2</td></tr> <tr class="separator:ga5aa7c22740f9d1271b76fe9dffe5ce18"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga8099883128d3a26dc00e33814def210b"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga8099883128d3a26dc00e33814def210b">X509_RFC5280_MAX_SERIAL_LEN</a>   32</td></tr> <tr class="separator:ga8099883128d3a26dc00e33814def210b"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:gabc0cae2aafa220212a00ae64dffa49b4"><td class="memItemLeft" align="right" valign="top">#define </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gabc0cae2aafa220212a00ae64dffa49b4">X509_RFC5280_UTC_TIME_LEN</a>   15</td></tr> <tr class="separator:gabc0cae2aafa220212a00ae64dffa49b4"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:gabc08a73588a59be2dd8943ebfc29ec9a"><td class="memItemLeft" align="right" valign="top">typedef struct <a class="el" href="struct__x509__crt.html">_x509_crt</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a></td></tr> <tr class="memdesc:gabc08a73588a59be2dd8943ebfc29ec9a"><td class="mdescLeft"> </td><td class="mdescRight">Container for an X.509 certificate. <a href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">More...</a><br/></td></tr> <tr class="separator:gabc08a73588a59be2dd8943ebfc29ec9a"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga5d89c77a8179fb09753045b8ce8f4076"><td class="memItemLeft" align="right" valign="top">typedef struct <a class="el" href="struct__x509write__cert.html">_x509write_cert</a> </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a></td></tr> <tr class="memdesc:ga5d89c77a8179fb09753045b8ce8f4076"><td class="mdescLeft"> </td><td class="mdescRight">Container for writing a certificate (CRT) <a href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">More...</a><br/></td></tr> <tr class="separator:ga5d89c77a8179fb09753045b8ce8f4076"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga2d8d1c87fa24f176a160041f11ad3c72"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga2d8d1c87fa24f176a160041f11ad3c72">x509_crt_parse_der</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const unsigned char *buf, size_t buflen)</td></tr> <tr class="memdesc:ga2d8d1c87fa24f176a160041f11ad3c72"><td class="mdescLeft"> </td><td class="mdescRight">Parse a single DER formatted certificate and add it to the chained list. <a href="group__x509__module.html#ga2d8d1c87fa24f176a160041f11ad3c72">More...</a><br/></td></tr> <tr class="separator:ga2d8d1c87fa24f176a160041f11ad3c72"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:gafc724dee6827c47fed1eec64bb13727b"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gafc724dee6827c47fed1eec64bb13727b">x509_crt_parse</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const unsigned char *buf, size_t buflen)</td></tr> <tr class="memdesc:gafc724dee6827c47fed1eec64bb13727b"><td class="mdescLeft"> </td><td class="mdescRight">Parse one or more certificates and add them to the chained list. <a href="group__x509__module.html#gafc724dee6827c47fed1eec64bb13727b">More...</a><br/></td></tr> <tr class="separator:gafc724dee6827c47fed1eec64bb13727b"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga2f937df6c64b400210dbeb5ad26cc8c2"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga2f937df6c64b400210dbeb5ad26cc8c2">x509_crt_parse_file</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const char *path)</td></tr> <tr class="memdesc:ga2f937df6c64b400210dbeb5ad26cc8c2"><td class="mdescLeft"> </td><td class="mdescRight">Load one or more certificates and add them to the chained list. <a href="group__x509__module.html#ga2f937df6c64b400210dbeb5ad26cc8c2">More...</a><br/></td></tr> <tr class="separator:ga2f937df6c64b400210dbeb5ad26cc8c2"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga34939a983156816784e3d1a64fe0bac9"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga34939a983156816784e3d1a64fe0bac9">x509_crt_parse_path</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *chain, const char *path)</td></tr> <tr class="memdesc:ga34939a983156816784e3d1a64fe0bac9"><td class="mdescLeft"> </td><td class="mdescRight">Load one or more certificate files from a path and add them to the chained list. <a href="group__x509__module.html#ga34939a983156816784e3d1a64fe0bac9">More...</a><br/></td></tr> <tr class="separator:ga34939a983156816784e3d1a64fe0bac9"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga81299c99c393f6f58eff0471efb65ef7"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga81299c99c393f6f58eff0471efb65ef7">x509_crt_info</a> (char *buf, size_t size, const char *prefix, const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt)</td></tr> <tr class="memdesc:ga81299c99c393f6f58eff0471efb65ef7"><td class="mdescLeft"> </td><td class="mdescRight">Returns an informational string about the certificate. <a href="group__x509__module.html#ga81299c99c393f6f58eff0471efb65ef7">More...</a><br/></td></tr> <tr class="separator:ga81299c99c393f6f58eff0471efb65ef7"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:gaceaeaa6cd00a5c20e71a9a11122d58df"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gaceaeaa6cd00a5c20e71a9a11122d58df">x509_crt_verify</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *trust_ca, <a class="el" href="group__x509__module.html#ga6d6714f926c6cc578e0f983aa6ddaf2a">x509_crl</a> *ca_crl, const char *cn, int *flags, int(*f_vrfy)(void *, <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *, int, int *), void *p_vrfy)</td></tr> <tr class="memdesc:gaceaeaa6cd00a5c20e71a9a11122d58df"><td class="mdescLeft"> </td><td class="mdescRight">Verify the certificate signature. <a href="group__x509__module.html#gaceaeaa6cd00a5c20e71a9a11122d58df">More...</a><br/></td></tr> <tr class="separator:gaceaeaa6cd00a5c20e71a9a11122d58df"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga166632ed129cf4900d1d911adaa8ae74"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga166632ed129cf4900d1d911adaa8ae74">x509_crt_check_key_usage</a> (const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, int usage)</td></tr> <tr class="memdesc:ga166632ed129cf4900d1d911adaa8ae74"><td class="mdescLeft"> </td><td class="mdescRight">Check usage of certificate against keyUsage extension. <a href="group__x509__module.html#ga166632ed129cf4900d1d911adaa8ae74">More...</a><br/></td></tr> <tr class="separator:ga166632ed129cf4900d1d911adaa8ae74"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:gad0a4670e68ac4ce67dd163907880b513"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#gad0a4670e68ac4ce67dd163907880b513">x509_crt_check_extended_key_usage</a> (const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, const char *usage_oid, size_t usage_len)</td></tr> <tr class="memdesc:gad0a4670e68ac4ce67dd163907880b513"><td class="mdescLeft"> </td><td class="mdescRight">Check usage of certificate against extentedJeyUsage. <a href="group__x509__module.html#gad0a4670e68ac4ce67dd163907880b513">More...</a><br/></td></tr> <tr class="separator:gad0a4670e68ac4ce67dd163907880b513"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga4479c58d8c7274c50d940d2ea2dfd765"><td class="memItemLeft" align="right" valign="top">int </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga4479c58d8c7274c50d940d2ea2dfd765">x509_crt_revoked</a> (const <a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt, const <a class="el" href="group__x509__module.html#ga6d6714f926c6cc578e0f983aa6ddaf2a">x509_crl</a> *crl)</td></tr> <tr class="memdesc:ga4479c58d8c7274c50d940d2ea2dfd765"><td class="mdescLeft"> </td><td class="mdescRight">Verify the certificate revocation status. <a href="group__x509__module.html#ga4479c58d8c7274c50d940d2ea2dfd765">More...</a><br/></td></tr> <tr class="separator:ga4479c58d8c7274c50d940d2ea2dfd765"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga27ba872627e98561bd04b0fd3aca1297"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga27ba872627e98561bd04b0fd3aca1297">x509_crt_init</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt)</td></tr> <tr class="memdesc:ga27ba872627e98561bd04b0fd3aca1297"><td class="mdescLeft"> </td><td class="mdescRight">Initialize a certificate (chain) <a href="group__x509__module.html#ga27ba872627e98561bd04b0fd3aca1297">More...</a><br/></td></tr> <tr class="separator:ga27ba872627e98561bd04b0fd3aca1297"><td class="memSeparator" colspan="2"> </td></tr> <tr class="memitem:ga63b4c873caf7b95bd4b081e476a60f1a"><td class="memItemLeft" align="right" valign="top">void </td><td class="memItemRight" valign="bottom"><a class="el" href="group__x509__module.html#ga63b4c873caf7b95bd4b081e476a60f1a">x509_crt_free</a> (<a class="el" href="group__x509__module.html#gabc08a73588a59be2dd8943ebfc29ec9a">x509_crt</a> *crt)</td></tr> <tr class="memdesc:ga63b4c873caf7b95bd4b081e476a60f1a"><td class="mdescLeft"> </td><td class="mdescRight">Unallocate all certificate data. <a href="group__x509__module.html#ga63b4c873caf7b95bd4b081e476a60f1a">More...</a><br/></td></tr> <tr class="separator:ga63b4c873caf7b95bd4b081e476a60f1a"><td class="memSeparator" colspan="2"> </td></tr> </table> <a name="details" id="details"></a><h2 class="groupheader">Detailed Description</h2> <div class="textblock"><p>X.509 certificate parsing and writing. </p> <p>Copyright (C) 2006-2013, Brainspark B.V.</p> <p>This file is part of PolarSSL (<a href="http://www.polarssl.org">http://www.polarssl.org</a>) Lead Maintainer: Paul Bakker <polarssl_maintainer at polarssl.org></p> <p>All rights reserved.</p> <p>This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.</p> <p>This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.</p> <p>You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. </p> <p>Definition in file <a class="el" href="x509__crt_8h_source.html">x509_crt.h</a>.</p> </div><h2 class="groupheader">Function Documentation</h2> <a class="anchor" id="a7300897079a27c5fa424c9653081b286"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_der </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>buf</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>size</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Write a built up certificate to a X509 DER structure Note: data is written at the end of the buffer! Use the return value to determine where you should start using the buffer. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>certificate to write away </td></tr> <tr><td class="paramname">buf</td><td>buffer to write to </td></tr> <tr><td class="paramname">size</td><td>size of the buffer </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (for signature, see note) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>length of data written if successful, or a specific error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>f_rng may be NULL if RSA is used for signature and the signature is made offline (otherwise f_rng is desirable for countermeasures against timing attacks). ECDSA signatures always require a non-NULL f_rng. </dd></dl> </div> </div> <a class="anchor" id="ac1e8ce08e2b45dc92105b589b34b2b27"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void x509write_crt_free </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Free the contents of a CRT write context. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to free </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a00d51bcf5acb9b8ffd43dc2cd9c91bf0"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void x509write_crt_init </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Initialize a CRT writing context. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to initialize </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a65d982a2325fff3f0c6806a512ef25cd"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_pem </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char * </td> <td class="paramname"><em>buf</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>size</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int(*)(void *, unsigned char *, size_t) </td> <td class="paramname"><em>f_rng</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">void * </td> <td class="paramname"><em>p_rng</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Write a built up certificate to a X509 PEM string. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>certificate to write away </td></tr> <tr><td class="paramname">buf</td><td>buffer to write to </td></tr> <tr><td class="paramname">size</td><td>size of the buffer </td></tr> <tr><td class="paramname">f_rng</td><td>RNG function (for signature, see note) </td></tr> <tr><td class="paramname">p_rng</td><td>RNG parameter</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 successful, or a specific error code</dd></dl> <dl class="section note"><dt>Note</dt><dd>f_rng may be NULL if RSA is used for signature and the signature is made offline (otherwise f_rng is desirable for countermeasures against timing attacks). ECDSA signatures always require a non-NULL f_rng. </dd></dl> </div> </div> <a class="anchor" id="ad59ee28b4bdee43a8579bdb0d9487a0f"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_authority_key_identifier </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Set the authorityKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#ae4d75450c4b979b19adc3c4fec8202bf" title="Set the issuer key used for signing the certificate. ">x509write_crt_set_issuer_key()</a> has been called before. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl> </div> </div> <a class="anchor" id="a61a8cb196cce7f6b239be8e3e659d630"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_basic_constraints </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>is_ca</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>max_pathlen</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the basicConstraints extension for a CRT. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">is_ca</td><td>is this a CA certificate </td></tr> <tr><td class="paramname">max_pathlen</td><td>maximum length of certificate chains below this certificate (only for CA certificates, -1 is inlimited)</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl> </div> </div> <a class="anchor" id="a86d4318af644578d56d2fc30111b552a"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_extension </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char * </td> <td class="paramname"><em>oid</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>oid_len</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>critical</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const unsigned char * </td> <td class="paramname"><em>val</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">size_t </td> <td class="paramname"><em>val_len</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Generic function to add to or replace an extension in the CRT. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">oid</td><td>OID of the extension </td></tr> <tr><td class="paramname">oid_len</td><td>length of the OID </td></tr> <tr><td class="paramname">critical</td><td>if the extension is critical (per the RFC's definition) </td></tr> <tr><td class="paramname">val</td><td>value of the extension OCTET STRING </td></tr> <tr><td class="paramname">val_len</td><td>length of the value data</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl> </div> </div> <a class="anchor" id="ae4d75450c4b979b19adc3c4fec8202bf"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void x509write_crt_set_issuer_key </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="structpk__context.html">pk_context</a> * </td> <td class="paramname"><em>key</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the issuer key used for signing the certificate. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">key</td><td>private key to sign with </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a470b8fd3056f61183351189fff62a2dd"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_issuer_name </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char * </td> <td class="paramname"><em>issuer_name</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the issuer name for a Certificate Issuer names should contain a comma-separated list of OID types and values: e.g. </p> <p>"C=NL,O=Offspark,CN=PolarSSL CA"</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">issuer_name</td><td>issuer name to set</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if issuer name was parsed successfully, or a specific error code </dd></dl> </div> </div> <a class="anchor" id="a91cb154550fe39cfd578856633a87db0"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_key_usage </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>key_usage</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the Key Usage Extension flags (e.g. </p> <p>KU_DIGITAL_SIGNATURE | KU_KEY_CERT_SIGN)</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">key_usage</td><td>key usage flags to set</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl> </div> </div> <a class="anchor" id="aceba04da0ec2a3530c7d3befeb022052"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void x509write_crt_set_md_alg </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="md_8h.html#af1fbbb67afa0daee4090cde8864e0b68">md_type_t</a> </td> <td class="paramname"><em>md_alg</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the MD algorithm to use for the signature (e.g. </p> <p>POLARSSL_MD_SHA1)</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">md_alg</td><td>MD algorithm to use </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a1957691b91b68abcb8685fa348c77234"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_ns_cert_type </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">unsigned char </td> <td class="paramname"><em>ns_cert_type</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the Netscape Cert Type flags (e.g. </p> <p>NS_CERT_TYPE_SSL_CLIENT | NS_CERT_TYPE_EMAIL)</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">ns_cert_type</td><td>Netscape Cert Type flags to set</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl> </div> </div> <a class="anchor" id="a74bafc1a3cfa1044bdfb33f6d31f1b21"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_serial </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const <a class="el" href="structmpi.html">mpi</a> * </td> <td class="paramname"><em>serial</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the serial number for a Certificate. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">serial</td><td>serial number to set</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful </dd></dl> </div> </div> <a class="anchor" id="a6dea2b3a87be62a618d66ef8a18c8920"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void x509write_crt_set_subject_key </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype"><a class="el" href="structpk__context.html">pk_context</a> * </td> <td class="paramname"><em>key</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the subject public key for the certificate. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">key</td><td>public key to include </td></tr> </table> </dd> </dl> </div> </div> <a class="anchor" id="a8f1fbf2b803612f4fbf6497ef10cdd9b"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_subject_key_identifier </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em></td><td>)</td> <td></td> </tr> </table> </div><div class="memdoc"> <p>Set the subjectKeyIdentifier extension for a CRT Requires that <a class="el" href="x509__crt_8h.html#a6dea2b3a87be62a618d66ef8a18c8920" title="Set the subject public key for the certificate. ">x509write_crt_set_subject_key()</a> has been called before. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if successful, or a POLARSSL_ERR_X509WRITE_MALLOC_FAILED </dd></dl> </div> </div> <a class="anchor" id="a3e99cbb5deaac1854a5f2dd5523bf501"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_subject_name </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char * </td> <td class="paramname"><em>subject_name</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the subject name for a Certificate Subject names should contain a comma-separated list of OID types and values: e.g. </p> <p>"C=NL,O=Offspark,CN=PolarSSL Server 1"</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">subject_name</td><td>subject name to set</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if subject name was parsed successfully, or a specific error code </dd></dl> </div> </div> <a class="anchor" id="a2aae935adeb9aed5abc72eafe31701da"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">int x509write_crt_set_validity </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char * </td> <td class="paramname"><em>not_before</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">const char * </td> <td class="paramname"><em>not_after</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the validity period for a Certificate Timestamps should be in string format for UTC timezone i.e. </p> <p>"YYYYMMDDhhmmss" e.g. "20131231235959" for December 31st 2013 at 23:59:59</p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">not_before</td><td>not_before timestamp </td></tr> <tr><td class="paramname">not_after</td><td>not_after timestamp</td></tr> </table> </dd> </dl> <dl class="section return"><dt>Returns</dt><dd>0 if timestamp was parsed successfully, or a specific error code </dd></dl> </div> </div> <a class="anchor" id="a40e28129171de7c02f41999be09f1225"></a> <div class="memitem"> <div class="memproto"> <table class="memname"> <tr> <td class="memname">void x509write_crt_set_version </td> <td>(</td> <td class="paramtype"><a class="el" href="group__x509__module.html#ga5d89c77a8179fb09753045b8ce8f4076">x509write_cert</a> * </td> <td class="paramname"><em>ctx</em>, </td> </tr> <tr> <td class="paramkey"></td> <td></td> <td class="paramtype">int </td> <td class="paramname"><em>version</em> </td> </tr> <tr> <td></td> <td>)</td> <td></td><td></td> </tr> </table> </div><div class="memdoc"> <p>Set the verion for a Certificate Default: X509_CRT_VERSION_3. </p> <dl class="params"><dt>Parameters</dt><dd> <table class="params"> <tr><td class="paramname">ctx</td><td>CRT context to use </td></tr> <tr><td class="paramname">version</td><td>version to set (X509_CRT_VERSION_1, X509_CRT_VERSION_2 or X509_CRT_VERSION_3) </td></tr> </table> </dd> </dl> </div> </div> </div><!-- contents --> <!-- start footer part --> <hr class="footer"/><address class="footer"><small> Generated on Mon May 4 2015 10:42:42 for PolarSSL v1.3.9 by  <a href="http://www.doxygen.org/index.html"> <img class="footer" src="doxygen.png" alt="doxygen"/> </a> 1.8.5 </small></address> </body> </html>